PR61409: -Wmaybe-uninitialized false-positive with -O2
Jeff Law
law@redhat.com
Sun Nov 20 18:24:00 GMT 2016
On 11/20/2016 09:36 AM, Aldy Hernandez wrote:
> On 11/16/2016 03:57 PM, Jeff Law wrote:
>> On 11/02/2016 11:16 AM, Aldy Hernandez wrote:
>>> Hi Jeff.
>>>
>>> As discussed in the PR, here is a patch exploring your idea of ignoring
>>> unguarded uses if we can prove that the guards for such uses are
>>> invalidated by the uninitialized operand paths being executed.
>>>
>>> This is an updated patch from my suggestion in the PR. It bootstraps
>>> with no regression on x86-64 Linux, and fixes the PR in question.
>>>
>>> As the "NOTE:" in the code states, we could be much smarter when
>>> invalidating predicates, but for now let's do straight negation which
>>> works for the simple case. We could expand on this in the future.
>>>
>>> OK for trunk?
>>>
>>>
>>> curr
>>>
>>>
>>> commit 8375d7e28c1a798dd0cc0f487d7fa1068d9eb124
>>> Author: Aldy Hernandez <aldyh@redhat.com>
>>> Date: Thu Aug 25 10:44:29 2016 -0400
>>>
>>> PR middle-end/61409
>>> * tree-ssa-uninit.c (use_pred_not_overlap_with_undef_path_pred):
>>> Remove reference to missing NUM_PREDS in function comment.
>>> (can_one_predicate_be_invalidated_p): New.
>>> (can_chain_union_be_invalidated_p): New.
>>> (flatten_out_predicate_chains): New.
>>> (uninit_ops_invalidate_phi_use): New.
>>> (is_use_properly_guarded): Call uninit_ops_invalidate_phi_use.
>> [ snip ]
>>
>>>
>>> +static bool
>>> +can_one_predicate_be_invalidated_p (pred_info predicate,
>>> + vec<pred_info *> worklist)
>>> +{
>>> + for (size_t i = 0; i < worklist.length (); ++i)
>>> + {
>>> + pred_info *p = worklist[i];
>>> +
>>> + /* NOTE: This is a very simple check, and only understands an
>>> + exact opposite. So, [i == 0] is currently only invalidated
>>> + by [.NOT. i == 0] or [i != 0]. Ideally we should also
>>> + invalidate with say [i > 5] or [i == 8]. There is certainly
>>> + room for improvement here. */
>>> + if (pred_neg_p (predicate, *p))
>> It's good enough for now. I saw some other routines that might allow us
>> to handle more cases. I'm OK with faulting those in if/when we see such
>> cases in real code.
>
> Ok.
>
>>
>>
>>> +
>>> +/* Return TRUE if executing the path to some uninitialized operands in
>>> + a PHI will invalidate the use of the PHI result later on.
>>> +
>>> + UNINIT_OPNDS is a bit vector specifying which PHI arguments have
>>> + arguments which are considered uninitialized.
>>> +
>>> + USE_PREDS is the pred_chain_union specifying the guard conditions
>>> + for the use of the PHI result.
>>> +
>>> + What we want to do is disprove each of the guards in the factors of
>>> + the USE_PREDS. So if we have:
>>> +
>>> + # USE_PREDS guards of:
>>> + # 1. i > 5 && i < 100
>>> + # 2. j > 10 && j < 88
>> Are USE_PREDS joined by an AND or IOR? I guess based on their type it
>> must be IOR. Thus to get to a use #1 or #2 must be true. So to prove
>> we can't reach a use, we have to prove that #1 and #2 are both not true.
>> Right?
>
> IOR, so yes.
>
>>
>>
>>> +
>>> +static bool
>>> +uninit_ops_invalidate_phi_use (gphi *phi, unsigned uninit_opnds,
>>> + pred_chain_union use_preds)
>>> +{
>>> + /* Look for the control dependencies of all the uninitialized
>>> + operands and build predicates describing them. */
>>> + unsigned i;
>>> + pred_chain_union uninit_preds[32];
>>> + memset (uninit_preds, 0, sizeof (pred_chain_union) * 32);
>>> + for (i = 0; i < MIN (32, gimple_phi_num_args (phi)); i++)
>> Can you replace the magic "32" with a file scoped const or #define? I
>> believe there's 2 existing uses of a magic "32" elsewhere in
>> tree-ssa-uninit.c as well.
>
> Done.
>
>>
>>> +
>>> + /* Build the control dependency chain for `i'... */
>>> + if (compute_control_dep_chain (find_dom (e->src),
>>> + e->src,
>>> + dep_chains,
>>> + &num_chains,
>>> + &cur_chain,
>>> + &num_calls))
>> Does this miss the control dependency carried by E itself.
>>
>> ie, if e->src ends in a conditional, shouldn't that conditional be
>> reflected in the control dependency chain as well? I guess we'd have to
>> have the notion of computing the control dependency for an edge rather
>> than a block. It doesn't look like compute_control_dep_chain is ready
>> for that. I'm willing to put that into a "future work" bucket.
>
> Hmmm, probably not. So yeah, let's put that in the future work bucket :).
>
>>
>> So I think just confirming my question about how USE_PREDS are joined at
>> the call to uninit_opts_invalidate_phi_use and fixing the magic 32 to be
>> a file scoped const or a #define and this is good to go on the trunk.
>
> I've retested with no regressions on x86-64 Linux.
>
> OK for trunk?
Yes. Thanks for taking my vague idea and making it real :-)
I've got another if you're interested...
jeff
More information about the Gcc-patches
mailing list