Skip to content

Conversation

@dave-bartolomeo
Copy link
Owner

No description provided.

@dave-bartolomeo dave-bartolomeo deleted the dave/CNewLines branch September 20, 2018 18:33
dave-bartolomeo added a commit that referenced this pull request Apr 11, 2019
We avoid putting a variable into SSA if its address is ever taken in a way that could allow mutation of the variable via indirection. We currently just look to see if the address is either "pointer to non-const" or "reference to non-const". However, if the address was cast to an integral type (e.g. `uintptr_t n = (uintptr_t)&x;`), we were treating it as unescaped. This change makes the conservative assumption that casting a pointer to an integer may result in the pointed-to value being modified later.

This fixes a customer-reported false positive (#2 from https://discuss.lgtm.com/t/2-false-positives-in-c-for-comparison-is-always-same/1943)
dave-bartolomeo pushed a commit that referenced this pull request May 29, 2019
CPP: Minor corrections to: Better overflow detection for AssignAdd/AssignSub
dave-bartolomeo pushed a commit that referenced this pull request Jun 3, 2019
JavaScript: Update expected test output.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants