diff options
author | Diego Novillo <dnovillo@google.com> | 2007-08-15 13:37:33 -0400 |
---|---|---|
committer | Diego Novillo <dnovillo@gcc.gnu.org> | 2007-08-15 13:37:33 -0400 |
commit | bbe984fb21c228ea077bcb4bcde6376bb45a4899 (patch) | |
tree | fd79a84b87f517fe99964e6f19729cf28e159637 /gcc/testsuite/gcc.dg/tree-ssa/20070815.c | |
parent | b413c535af276684074dee54eb322168f52689a8 (diff) | |
download | gcc-bbe984fb21c228ea077bcb4bcde6376bb45a4899.zip gcc-bbe984fb21c228ea077bcb4bcde6376bb45a4899.tar.gz gcc-bbe984fb21c228ea077bcb4bcde6376bb45a4899.tar.bz2 |
tree-ssa-alias.c (compute_memory_partitions): Use alias_bitmap_obstack to allocate bitmaps.
* tree-ssa-alias.c (compute_memory_partitions): Use
alias_bitmap_obstack to allocate bitmaps.
(reset_alias_info): Factor out of init_alias_info.
Mark all name tags not associated to an SSA name for renaming.
(init_alias_info): Call it.
(create_name_tags): Tidy. Add comments.
(dump_points_to_info_for): Do not call get_mem_sym_stats_for.
testsuite/ChangeLog
gcc.dg/tree-ssa/20070815.c: New test.
From-SVN: r127520
Diffstat (limited to 'gcc/testsuite/gcc.dg/tree-ssa/20070815.c')
-rw-r--r-- | gcc/testsuite/gcc.dg/tree-ssa/20070815.c | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/gcc/testsuite/gcc.dg/tree-ssa/20070815.c b/gcc/testsuite/gcc.dg/tree-ssa/20070815.c new file mode 100644 index 0000000..fa0e69f --- /dev/null +++ b/gcc/testsuite/gcc.dg/tree-ssa/20070815.c @@ -0,0 +1,60 @@ +/* { dg-do compile } */ +/* { dg-options "-O -w" } */ + +/* This code snippet from glibc 2.3.5 was causing an ICE during + optimization because we were failing to update the SSA form for + stale name tags. These are tags that are associated with SSA pointers + that have been removed from the IL. This was causing the SSA + verifier to fail before we had a chance to run the cleanup pass that + finally removes all the remaining PHI nodes for the stale name tag. */ +struct _IO_wide_data +{ +}; +struct _IO_FILE { +}; +typedef struct _IO_FILE _IO_FILE; +struct _IO_jump_t +{ +}; +struct _IO_FILE_plus +{ + _IO_FILE file; +}; +extern const struct _IO_jump_t _IO_file_jumps_maybe_mmap ; +extern const struct _IO_jump_t _IO_wfile_jumps; +extern const struct _IO_jump_t _IO_wfile_jumps_maybe_mmap ; + +_IO_new_fdopen (fd, mode) + const char *mode; +{ + int read_write; + int posix_mode = 0; + struct locked_FILE + { + struct _IO_FILE_plus fp; + struct _IO_wide_data wd; + } *new_f; + int fd_flags; + int use_mmap = 0; + { + } + { + switch (*++mode) + { + case '\0': + use_mmap = 1; + } + } + if (((fd_flags & 0003) == 00 && !(read_write & 8)) + || ((fd_flags & 0003) == 01 && !(read_write & 4))) + { + } + if ((posix_mode & 02000) && !(fd_flags & 02000)) + return ((void *)0); + _IO_no_init (&new_f->fp.file, 0, 0, &new_f->wd, + (use_mmap && (read_write & 8)) + ? &_IO_wfile_jumps_maybe_mmap : + &_IO_wfile_jumps); + (use_mmap && (read_write & 8)) ? &_IO_file_jumps_maybe_mmap : + _IO_file_init (&new_f->fp); +} |