diff options
author | law <law@138bc75d-0d04-0410-961f-82ee72b054a4> | 2013-11-14 20:57:38 +0000 |
---|---|---|
committer | law <law@138bc75d-0d04-0410-961f-82ee72b054a4> | 2013-11-14 20:57:38 +0000 |
commit | b61383dde85fe042fdda2dbd99d1242ef14a5d6d (patch) | |
tree | 844c78fddcf73f2724175bb18f2bd8e1f97aef7d /gcc/gimple-ssa-isolate-paths.c | |
parent | 28ae01f12ba021f73f23fa028592a4faddc91986 (diff) | |
download | gcc-b61383dde85fe042fdda2dbd99d1242ef14a5d6d.tar.gz |
* basic-block.h (has_abnormal_outgoing_edge_p): Moved here from...
* tree-inline.c (has_abnormal_outgoing_edge_p): Remove.
* gimple-ssa-isolate-paths.c: Include tree-cfg.h.
(find_implicit_erroneous_behaviour): If a block has abnormal outgoing
edges, then ignore it. If the statement exhibiting erroneous
behaviour ends basic blocks, with the exception of GIMPLE_RETURNs,
then we can not optimize.
(find_explicit_erroneous_behaviour): Likewise.
git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@204821 138bc75d-0d04-0410-961f-82ee72b054a4
Diffstat (limited to 'gcc/gimple-ssa-isolate-paths.c')
-rw-r--r-- | gcc/gimple-ssa-isolate-paths.c | 37 |
1 files changed, 34 insertions, 3 deletions
diff --git a/gcc/gimple-ssa-isolate-paths.c b/gcc/gimple-ssa-isolate-paths.c index 108b98e2917..66c13f4cf6f 100644 --- a/gcc/gimple-ssa-isolate-paths.c +++ b/gcc/gimple-ssa-isolate-paths.c @@ -37,6 +37,7 @@ along with GCC; see the file COPYING3. If not see #include "ssa-iterators.h" #include "cfgloop.h" #include "tree-pass.h" +#include "tree-cfg.h" static bool cfg_altered; @@ -215,6 +216,17 @@ find_implicit_erroneous_behaviour (void) { gimple_stmt_iterator si; + /* Out of an abundance of caution, do not isolate paths to a + block where the block has any abnormal outgoing edges. + + We might be able to relax this in the future. We have to detect + when we have to split the block with the NULL dereference and + the trap we insert. We have to preserve abnormal edges out + of the isolated block which in turn means updating PHIs at + the targets of those abnormal outgoing edges. */ + if (has_abnormal_outgoing_edge_p (bb)) + continue; + /* First look for a PHI which sets a pointer to NULL and which is then dereferenced within BB. This is somewhat overly conservative, but probably catches most of the interesting @@ -256,8 +268,15 @@ find_implicit_erroneous_behaviour (void) { /* We only care about uses in BB. Catching cases in in other blocks would require more complex path - isolation code. */ - if (gimple_bb (use_stmt) != bb) + isolation code. + + If the statement must end a block and is not a + GIMPLE_RETURN, then additional work would be + necessary to isolate the path. Just punt it for + now. */ + if (gimple_bb (use_stmt) != bb + || (stmt_ends_bb_p (use_stmt) + && gimple_code (use_stmt) != GIMPLE_RETURN)) continue; if (infer_nonnull_range (use_stmt, lhs)) @@ -289,6 +308,17 @@ find_explicit_erroneous_behaviour (void) { gimple_stmt_iterator si; + /* Out of an abundance of caution, do not isolate paths to a + block where the block has any abnormal outgoing edges. + + We might be able to relax this in the future. We have to detect + when we have to split the block with the NULL dereference and + the trap we insert. We have to preserve abnormal edges out + of the isolated block which in turn means updating PHIs at + the targets of those abnormal outgoing edges. */ + if (has_abnormal_outgoing_edge_p (bb)) + continue; + /* Now look at the statements in the block and see if any of them explicitly dereference a NULL pointer. This happens because of jump threading and constant propagation. */ @@ -299,7 +329,8 @@ find_explicit_erroneous_behaviour (void) /* By passing null_pointer_node, we can use infer_nonnull_range to detect explicit NULL pointer dereferences and other uses where a non-NULL value is required. */ - if (infer_nonnull_range (stmt, null_pointer_node)) + if ((!stmt_ends_bb_p (stmt) || gimple_code (stmt) == GIMPLE_RETURN) + && infer_nonnull_range (stmt, null_pointer_node)) { insert_trap_and_remove_trailing_statements (&si, null_pointer_node); |