SlideShare a Scribd company logo
Undefined behavior is closer than you
think
Author: Andrey Karpov
Date: 05.02.2016
Some people think that undefined behavior is caused only by gross errors (accessing outside the bounds
of the array, for instance) or inadequate constructions (i = i++ + ++i, for example). That's why it is quite
surprising when a programmer sees undefined behavior in the code that used to work correctly, without
arousing any suspicion. One should never let his guard down, programming in C/C++. Because hell is
closer than you may think.
Error description
It's been a while since I've written anything on the topic of 64-bit errors. It's time to relive a bit of the
past. In this case undefined will appear in a 64-bit program.
Consider incorrect synthetic code fragment.
size_t Count = 1024*1024*1024; // 1 Gb
if (is64bit)
Count *= 5; // 5 Gb
char *array = (char *)malloc(Count);
memset(array, 0, Count);
int index = 0;
for (size_t i = 0; i != Count; i++)
array[index++] = char(i) | 1;
if (array[Count - 1] == 0)
printf("The last array element contains 0.n");
free(array);
This code works correctly if the programmer compiles a 32-bit version of the program. But if you
compile the 64-bit program, everything is way more interesting.
64-bit program allocates a 5 gigabyte array/buffer and initially fills it with zeros. The loop then modifies
it, filling it with non-zero values we use "| 1" to ensure this.
And now try to guess how the code will run if it is compiled in x64 mode using Visual Studio 2015? Have
you got the answer? If yes, then let's continue.
If you run a debug version of this program, it'll crash because it'll index out of bounds At some point the
index variable will overflow and its value will become −2147483648 (INT_MIN).
Sounds logical, right? Nothing of the kind! This is an undefined behavior and really anything can happen.
Additional links:
 Integer overflow
 Understanding Integer Overflow in C/C++
 Is signed integer overflow still undefined behavior in C++?
When I or somebody else says that this is an example of undefined behavior, people start grumbling. I
don't know why, but it feels like they assume that they know absolutely everything about C++ and how
compilers work.
Usually we get comments like:
"This is some theoretical nonsense. Well, yes, formally the 'int' overflow leads to an undefined behavior.
But it's nothing more but some jabbering. In practice, we can always tell what we will get. If you add 1 to
INT_MAX then we'll have INT_MIN. Maybe somewhere in the universe there are some exotic
architectures, but my Visual C++ / GCC compiler gives a correct result."
And now without any magic, I will give a demonstration of UB using a simple example and not on some
fairy architecture either, but a Win64-program.
It would be enough to build the example given above in the Release x64 mode and run it. The program
will cease crashing and the warning "the last array element contains 0" won't be issued.
The undefined behavior reveals itself in the following way. The array will be completely filled, in spite of
the fact that index variable isn't wide enough to index all the array elements. Those who still don't
believe me should have a look at the assembly code:
int index = 0;
for (size_t i = 0; i != Count; i++)
000000013F6D102D xor ecx,ecx
000000013F6D102F nop
array[index++] = char(i) | 1;
000000013F6D1030 movzx edx,cl
000000013F6D1033 or dl,1
000000013F6D1036 mov byte ptr [rcx+rbx],dl
000000013F6D1039 inc rcx
000000013F6D103C cmp rcx,rdi
000000013F6D103F jne main+30h (013F6D1030h)
Here is the UB! And no exotic compilers were used, it's just VS2015.
If you replace 'int' with 'unsigned' the undefined behavior will disappear. The array will be only partially
filled and at the end we will have a message - "the last array element contains 0".
Assembly code with the 'unsigned':
unsigned index = 0;
000000013F07102D xor r9d,r9d
for (size_t i = 0; i != Count; i++)
000000013F071030 mov ecx,r9d
000000013F071033 nop dword ptr [rax]
000000013F071037 nop word ptr [rax+rax]
array[index++] = char(i) | 1;
000000013F071040 movzx r8d,cl
000000013F071044 mov edx,r9d
000000013F071047 or r8b,1
000000013F07104B inc r9d
000000013F07104E inc rcx
000000013F071051 mov byte ptr [rdx+rbx],r8b
000000013F071055 cmp rcx,rdi
000000013F071058 jne main+40h (013F071040h)
Notes about PVS-Studio
PVS-Studio analyzer doesn't detect character variable overflow straight away. This is not a very
rewarding job. It's almost impossible to predict what value one or another variable will have or if the
overflow will or will not occur. However, the analyzer can track down some erroneous patterns that it
refers to as "64-bit errors".
To tell the truth, there are no 64-bit errors. There are just those that are connected with undefined
behavior, that have been hibernating in 32-bit code, and these then show up when we recompile in x64
mode. But if we speak about UB, it wouldn't sound very interesting and people won't buy it (PVS-Studio
that is). On top of it all, they won't believe that there are any issues with it. But if the analyzer says that
this variable can overflow in the loop, and it is a "64-bit error", then it's a different story. Profit.
The code we gave above is considered incorrect by the analyzer, and it issues a warning related to 64-bit
portability issues. The idea is the following: In Win32 mode size_t is 32-bits and we cannot allocate a 5
gigabyte array, so everything works fine. In Win64, where size_t is 64-bits, we work with a bigger array,
which requires more memory. So the 64-bit code won't work. 32-bit code works, but the 64-bit code
fails. PVS-Studio calls it a 64-bit error.
Here are diagnostic messages that PVS-Studio will issue for the code given in th ebeginning:
 V127 An overflow of the 32-bit 'index' variable is possible inside a long cycle which utilizes a
memsize-type loop counter. consoleapplication1.cpp 16
 V108 Incorrect index type: array[not a memsize-type]. Use memsize type instead.
consoleapplication1.cpp 16
More details about 64-bit traps:
 Development of 64-bit C/C++ applications
 A 64-bit horse that can count
 A Collection of Examples of 64-bit Errors in Real Programs
 C++11 and 64-bit Issues
Correct code
You must use proper data types for your programs to run properly. If you are going to work with large-
size arrays, forget about int and unsigned. The proper types are ptrdiff_t, intptr_t, size_t, DWORD_PTR,
std::vector::size_type and so on. In this case it is size_t:
size_t index = 0;
for (size_t i = 0; i != Count; i++)
array[index++] = char(i) | 1;
Conclusion
If the C++ language rules result in undefined behavior, don't argue with them or try to predict the way
they'll behave in the future. Just don't write such dangerous code.
There are a whole lot of stubborn programmers who don't want to see anything suspicious in shifting
negative numbers, comparing 'this' with null or signed types overflowing.
Don't be like that. The fact that the program is working now doesn't mean that everything is fine. The
way UB will reveal itself is impossible to predict. Expected program behavior is one of the variants of UB.

More Related Content

PDF
C++11 and 64-bit Issues
PDF
A 64-bit horse that can count
PDF
The article is a report about testing of portability of Loki library with 64-...
PDF
Development of a static code analyzer for detecting errors of porting program...
PDF
Lesson 13. Pattern 5. Address arithmetic
PDF
How to avoid bugs using modern C++
PDF
A Collection of Examples of 64-bit Errors in Real Programs
PDF
A Collection of Examples of 64-bit Errors in Real Programs
C++11 and 64-bit Issues
A 64-bit horse that can count
The article is a report about testing of portability of Loki library with 64-...
Development of a static code analyzer for detecting errors of porting program...
Lesson 13. Pattern 5. Address arithmetic
How to avoid bugs using modern C++
A Collection of Examples of 64-bit Errors in Real Programs
A Collection of Examples of 64-bit Errors in Real Programs

What's hot (20)

PDF
Lesson 9. Pattern 1. Magic numbers
PDF
Static code analysis and the new language standard C++0x
PDF
Static code analysis and the new language standard C++0x
PDF
A collection of examples of 64 bit errors in real programs
PDF
Comparison of analyzers' diagnostic possibilities at checking 64-bit code
PDF
Lesson 11. Pattern 3. Shift operations
PDF
Type Conversion in C++ and C# Arithmetic Expressions
DOCX
Hennchthree
DOCX
Hennchthree 160912095304
DOCX
10 ipt python exam breakdown
PDF
The static code analysis rules for diagnosing potentially unsafe construction...
PDF
C programming part4
PDF
Program errors occurring while porting C++ code from 32-bit platforms on 64-b...
PDF
20 issues of porting C++ code on the 64-bit platform
DOCX
Java Questioner for
DOCX
Quiz test JDBC
DOC
Ques c++ minhnd
PDF
Lesson 14. Pattern 6. Changing an array's type
PDF
C# programming datatypes
DOCX
Manoch1raw 160512091436
Lesson 9. Pattern 1. Magic numbers
Static code analysis and the new language standard C++0x
Static code analysis and the new language standard C++0x
A collection of examples of 64 bit errors in real programs
Comparison of analyzers' diagnostic possibilities at checking 64-bit code
Lesson 11. Pattern 3. Shift operations
Type Conversion in C++ and C# Arithmetic Expressions
Hennchthree
Hennchthree 160912095304
10 ipt python exam breakdown
The static code analysis rules for diagnosing potentially unsafe construction...
C programming part4
Program errors occurring while porting C++ code from 32-bit platforms on 64-b...
20 issues of porting C++ code on the 64-bit platform
Java Questioner for
Quiz test JDBC
Ques c++ minhnd
Lesson 14. Pattern 6. Changing an array's type
C# programming datatypes
Manoch1raw 160512091436
Ad

Viewers also liked (19)

PPTX
200 Open Source Projects Later: Source Code Static Analysis Experience
PDF
The Ultimate Question of Programming, Refactoring, and Everything
PPTX
200 open source проектов спустя: опыт статического анализа исходного кода
PPTX
Принципы работы статического анализатора кода PVS-Studio
PPTX
PVS-Studio for Linux (CoreHard presentation)
PPTX
PVS-Studio team experience: checking various open source projects, or mistake...
PPTX
The operation principles of PVS-Studio static code analyzer
PDF
PVS-Studio vs Clang
PDF
How to capture a variable in C# and not to shoot yourself in the foot
PPTX
PVS-Studio. Статический анализатор кода. Windows/Linux, C/C++/C#
PPTX
PVS-Studio. Static code analyzer. Windows/Linux, C/C++/C#. 2017
PDF
Masters of SlideShare
PDF
What Makes Great Infographics
PDF
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
PDF
10 Ways to Win at SlideShare SEO & Presentation Optimization
PDF
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
PDF
You Suck At PowerPoint!
PDF
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
PDF
How to Make Awesome SlideShares: Tips & Tricks
200 Open Source Projects Later: Source Code Static Analysis Experience
The Ultimate Question of Programming, Refactoring, and Everything
200 open source проектов спустя: опыт статического анализа исходного кода
Принципы работы статического анализатора кода PVS-Studio
PVS-Studio for Linux (CoreHard presentation)
PVS-Studio team experience: checking various open source projects, or mistake...
The operation principles of PVS-Studio static code analyzer
PVS-Studio vs Clang
How to capture a variable in C# and not to shoot yourself in the foot
PVS-Studio. Статический анализатор кода. Windows/Linux, C/C++/C#
PVS-Studio. Static code analyzer. Windows/Linux, C/C++/C#. 2017
Masters of SlideShare
What Makes Great Infographics
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
10 Ways to Win at SlideShare SEO & Presentation Optimization
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
You Suck At PowerPoint!
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
How to Make Awesome SlideShares: Tips & Tricks
Ad

Similar to Undefined behavior is closer than you think (20)

PDF
Monitoring a program that monitors computer networks
PDF
Monitoring a program that monitors computer networks
PDF
Lesson 24. Phantom errors
PDF
Optimization in the world of 64-bit errors
PDF
I just had to check ICQ project
PDF
Lesson 6. Errors in 64-bit code
PDF
The forgotten problems of 64-bit programs development
PDF
Static code analysis for verification of the 64-bit applications
PDF
Safety of 64-bit code
PDF
64-Bit Code in 2015: New in the Diagnostics of Possible Issues
PDF
Are 64-bit errors real?
PDF
Accord.Net: Looking for a Bug that Could Help Machines Conquer Humankind
PDF
20 issues of porting C++ code on the 64-bit platform
PDF
A nice 64-bit error in C
PDF
LibRaw, Coverity SCAN, PVS-Studio
PDF
Grounded Pointers
PDF
Tesseract. Recognizing Errors in Recognition Software
PDF
Analysis of Godot Engine's Source Code
PDF
64-bit
PDF
Lesson 22. Pattern 14. Overloaded functions
Monitoring a program that monitors computer networks
Monitoring a program that monitors computer networks
Lesson 24. Phantom errors
Optimization in the world of 64-bit errors
I just had to check ICQ project
Lesson 6. Errors in 64-bit code
The forgotten problems of 64-bit programs development
Static code analysis for verification of the 64-bit applications
Safety of 64-bit code
64-Bit Code in 2015: New in the Diagnostics of Possible Issues
Are 64-bit errors real?
Accord.Net: Looking for a Bug that Could Help Machines Conquer Humankind
20 issues of porting C++ code on the 64-bit platform
A nice 64-bit error in C
LibRaw, Coverity SCAN, PVS-Studio
Grounded Pointers
Tesseract. Recognizing Errors in Recognition Software
Analysis of Godot Engine's Source Code
64-bit
Lesson 22. Pattern 14. Overloaded functions

More from Andrey Karpov (20)

PDF
60 антипаттернов для С++ программиста
PDF
60 terrible tips for a C++ developer
PPTX
Ошибки, которые сложно заметить на code review, но которые находятся статичес...
PDF
PVS-Studio in 2021 - Error Examples
PDF
PVS-Studio in 2021 - Feature Overview
PDF
PVS-Studio в 2021 - Примеры ошибок
PDF
PVS-Studio в 2021
PPTX
Make Your and Other Programmer’s Life Easier with Static Analysis (Unreal Eng...
PPTX
Best Bugs from Games: Fellow Programmers' Mistakes
PPTX
Does static analysis need machine learning?
PPTX
Typical errors in code on the example of C++, C#, and Java
PPTX
How to Fix Hundreds of Bugs in Legacy Code and Not Die (Unreal Engine 4)
PPTX
Game Engine Code Quality: Is Everything Really That Bad?
PPTX
C++ Code as Seen by a Hypercritical Reviewer
PPTX
The Use of Static Code Analysis When Teaching or Developing Open-Source Software
PPTX
Static Code Analysis for Projects, Built on Unreal Engine
PPTX
Safety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
PPTX
The Great and Mighty C++
PPTX
Static code analysis: what? how? why?
PDF
Zero, one, two, Freddy's coming for you
60 антипаттернов для С++ программиста
60 terrible tips for a C++ developer
Ошибки, которые сложно заметить на code review, но которые находятся статичес...
PVS-Studio in 2021 - Error Examples
PVS-Studio in 2021 - Feature Overview
PVS-Studio в 2021 - Примеры ошибок
PVS-Studio в 2021
Make Your and Other Programmer’s Life Easier with Static Analysis (Unreal Eng...
Best Bugs from Games: Fellow Programmers' Mistakes
Does static analysis need machine learning?
Typical errors in code on the example of C++, C#, and Java
How to Fix Hundreds of Bugs in Legacy Code and Not Die (Unreal Engine 4)
Game Engine Code Quality: Is Everything Really That Bad?
C++ Code as Seen by a Hypercritical Reviewer
The Use of Static Code Analysis When Teaching or Developing Open-Source Software
Static Code Analysis for Projects, Built on Unreal Engine
Safety on the Max: How to Write Reliable C/C++ Code for Embedded Systems
The Great and Mighty C++
Static code analysis: what? how? why?
Zero, one, two, Freddy's coming for you

Recently uploaded (20)

PPTX
CHAPTER 2 - PM Management and IT Context
PDF
System and Network Administraation Chapter 3
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Essential Infomation Tech presentation.pptx
PPTX
Introduction to Artificial Intelligence
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
top salesforce developer skills in 2025.pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
CHAPTER 2 - PM Management and IT Context
System and Network Administraation Chapter 3
Upgrade and Innovation Strategies for SAP ERP Customers
Essential Infomation Tech presentation.pptx
Introduction to Artificial Intelligence
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
top salesforce developer skills in 2025.pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
VVF-Customer-Presentation2025-Ver1.9.pptx
Odoo POS Development Services by CandidRoot Solutions
Softaken Excel to vCard Converter Software.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...

Undefined behavior is closer than you think

  • 1. Undefined behavior is closer than you think Author: Andrey Karpov Date: 05.02.2016 Some people think that undefined behavior is caused only by gross errors (accessing outside the bounds of the array, for instance) or inadequate constructions (i = i++ + ++i, for example). That's why it is quite surprising when a programmer sees undefined behavior in the code that used to work correctly, without arousing any suspicion. One should never let his guard down, programming in C/C++. Because hell is closer than you may think. Error description It's been a while since I've written anything on the topic of 64-bit errors. It's time to relive a bit of the past. In this case undefined will appear in a 64-bit program. Consider incorrect synthetic code fragment. size_t Count = 1024*1024*1024; // 1 Gb if (is64bit) Count *= 5; // 5 Gb char *array = (char *)malloc(Count); memset(array, 0, Count); int index = 0; for (size_t i = 0; i != Count; i++) array[index++] = char(i) | 1; if (array[Count - 1] == 0) printf("The last array element contains 0.n");
  • 2. free(array); This code works correctly if the programmer compiles a 32-bit version of the program. But if you compile the 64-bit program, everything is way more interesting. 64-bit program allocates a 5 gigabyte array/buffer and initially fills it with zeros. The loop then modifies it, filling it with non-zero values we use "| 1" to ensure this. And now try to guess how the code will run if it is compiled in x64 mode using Visual Studio 2015? Have you got the answer? If yes, then let's continue. If you run a debug version of this program, it'll crash because it'll index out of bounds At some point the index variable will overflow and its value will become −2147483648 (INT_MIN). Sounds logical, right? Nothing of the kind! This is an undefined behavior and really anything can happen. Additional links:  Integer overflow  Understanding Integer Overflow in C/C++  Is signed integer overflow still undefined behavior in C++? When I or somebody else says that this is an example of undefined behavior, people start grumbling. I don't know why, but it feels like they assume that they know absolutely everything about C++ and how compilers work. Usually we get comments like: "This is some theoretical nonsense. Well, yes, formally the 'int' overflow leads to an undefined behavior. But it's nothing more but some jabbering. In practice, we can always tell what we will get. If you add 1 to INT_MAX then we'll have INT_MIN. Maybe somewhere in the universe there are some exotic architectures, but my Visual C++ / GCC compiler gives a correct result." And now without any magic, I will give a demonstration of UB using a simple example and not on some fairy architecture either, but a Win64-program. It would be enough to build the example given above in the Release x64 mode and run it. The program will cease crashing and the warning "the last array element contains 0" won't be issued. The undefined behavior reveals itself in the following way. The array will be completely filled, in spite of the fact that index variable isn't wide enough to index all the array elements. Those who still don't believe me should have a look at the assembly code: int index = 0; for (size_t i = 0; i != Count; i++) 000000013F6D102D xor ecx,ecx 000000013F6D102F nop array[index++] = char(i) | 1; 000000013F6D1030 movzx edx,cl 000000013F6D1033 or dl,1 000000013F6D1036 mov byte ptr [rcx+rbx],dl 000000013F6D1039 inc rcx
  • 3. 000000013F6D103C cmp rcx,rdi 000000013F6D103F jne main+30h (013F6D1030h) Here is the UB! And no exotic compilers were used, it's just VS2015. If you replace 'int' with 'unsigned' the undefined behavior will disappear. The array will be only partially filled and at the end we will have a message - "the last array element contains 0". Assembly code with the 'unsigned': unsigned index = 0; 000000013F07102D xor r9d,r9d for (size_t i = 0; i != Count; i++) 000000013F071030 mov ecx,r9d 000000013F071033 nop dword ptr [rax] 000000013F071037 nop word ptr [rax+rax] array[index++] = char(i) | 1; 000000013F071040 movzx r8d,cl 000000013F071044 mov edx,r9d 000000013F071047 or r8b,1 000000013F07104B inc r9d 000000013F07104E inc rcx 000000013F071051 mov byte ptr [rdx+rbx],r8b 000000013F071055 cmp rcx,rdi 000000013F071058 jne main+40h (013F071040h) Notes about PVS-Studio PVS-Studio analyzer doesn't detect character variable overflow straight away. This is not a very rewarding job. It's almost impossible to predict what value one or another variable will have or if the overflow will or will not occur. However, the analyzer can track down some erroneous patterns that it refers to as "64-bit errors". To tell the truth, there are no 64-bit errors. There are just those that are connected with undefined behavior, that have been hibernating in 32-bit code, and these then show up when we recompile in x64 mode. But if we speak about UB, it wouldn't sound very interesting and people won't buy it (PVS-Studio that is). On top of it all, they won't believe that there are any issues with it. But if the analyzer says that this variable can overflow in the loop, and it is a "64-bit error", then it's a different story. Profit. The code we gave above is considered incorrect by the analyzer, and it issues a warning related to 64-bit portability issues. The idea is the following: In Win32 mode size_t is 32-bits and we cannot allocate a 5 gigabyte array, so everything works fine. In Win64, where size_t is 64-bits, we work with a bigger array, which requires more memory. So the 64-bit code won't work. 32-bit code works, but the 64-bit code fails. PVS-Studio calls it a 64-bit error. Here are diagnostic messages that PVS-Studio will issue for the code given in th ebeginning:
  • 4.  V127 An overflow of the 32-bit 'index' variable is possible inside a long cycle which utilizes a memsize-type loop counter. consoleapplication1.cpp 16  V108 Incorrect index type: array[not a memsize-type]. Use memsize type instead. consoleapplication1.cpp 16 More details about 64-bit traps:  Development of 64-bit C/C++ applications  A 64-bit horse that can count  A Collection of Examples of 64-bit Errors in Real Programs  C++11 and 64-bit Issues Correct code You must use proper data types for your programs to run properly. If you are going to work with large- size arrays, forget about int and unsigned. The proper types are ptrdiff_t, intptr_t, size_t, DWORD_PTR, std::vector::size_type and so on. In this case it is size_t: size_t index = 0; for (size_t i = 0; i != Count; i++) array[index++] = char(i) | 1; Conclusion If the C++ language rules result in undefined behavior, don't argue with them or try to predict the way they'll behave in the future. Just don't write such dangerous code. There are a whole lot of stubborn programmers who don't want to see anything suspicious in shifting negative numbers, comparing 'this' with null or signed types overflowing. Don't be like that. The fact that the program is working now doesn't mean that everything is fine. The way UB will reveal itself is impossible to predict. Expected program behavior is one of the variants of UB.