public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
From: "manu at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org>
To: gcc-bugs@gcc.gnu.org
Subject: [Bug tree-optimization/63660] -Wmaybe-uninitialized false positive (uninit pass limits)
Date: Wed, 03 Dec 2014 14:52:00 -0000	[thread overview]
Message-ID: <bug-63660-4-DYKEdk6a48@http.gcc.gnu.org/bugzilla/> (raw)
In-Reply-To: <bug-63660-4@http.gcc.gnu.org/bugzilla/>

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63660

--- Comment #3 from Manuel López-Ibáñez <manu at gcc dot gnu.org> ---
(In reply to Edward-san from comment #2)
> Isn't it possible to bailout if the limit is reached?

I guess the analysis is trying to prove that the variable is indeed initialized
(or that it is never used uninitialized). It bails out trying to prove that,
thus the warning. The warning code could be conservative and never warn if the
limit is reached, but then we will have the other problem: false-negatives.

A way to advance with this (if you want to help) is to check which limit is
actually hit by your code. Then see by how much you would need to change the
limit to warn (by for example adding a --param to control it). Then, with this
information at hand, the GCC maintainers can decide whether to increase the
limit a bit or perhaps to never warn if the limit is hit (people that want all
potential warnings not matter the compile-time cost can use the --param for a
deeper analysis).
>From gcc-bugs-return-469363-listarch-gcc-bugs=gcc.gnu.org@gcc.gnu.org Wed Dec 03 14:55:19 2014
Return-Path: <gcc-bugs-return-469363-listarch-gcc-bugs=gcc.gnu.org@gcc.gnu.org>
Delivered-To: listarch-gcc-bugs@gcc.gnu.org
Received: (qmail 7847 invoked by alias); 3 Dec 2014 14:55:19 -0000
Mailing-List: contact gcc-bugs-help@gcc.gnu.org; run by ezmlm
Precedence: bulk
List-Id: <gcc-bugs.gcc.gnu.org>
List-Archive: <http://gcc.gnu.org/ml/gcc-bugs/>
List-Post: <mailto:gcc-bugs@gcc.gnu.org>
List-Help: <mailto:gcc-bugs-help@gcc.gnu.org>
Sender: gcc-bugs-owner@gcc.gnu.org
Delivered-To: mailing list gcc-bugs@gcc.gnu.org
Received: (qmail 7774 invoked by uid 48); 3 Dec 2014 14:55:15 -0000
From: "dmalcolm at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org>
To: gcc-bugs@gcc.gnu.org
Subject: [Bug jit/64166] New: JIT does not provide a way for verifying dumpfiles from testcases
Date: Wed, 03 Dec 2014 14:55:00 -0000
X-Bugzilla-Reason: CC
X-Bugzilla-Type: new
X-Bugzilla-Watch-Reason: None
X-Bugzilla-Product: gcc
X-Bugzilla-Component: jit
X-Bugzilla-Version: 5.0
X-Bugzilla-Keywords:
X-Bugzilla-Severity: normal
X-Bugzilla-Who: dmalcolm at gcc dot gnu.org
X-Bugzilla-Status: UNCONFIRMED
X-Bugzilla-Priority: P3
X-Bugzilla-Assigned-To: dmalcolm at gcc dot gnu.org
X-Bugzilla-Target-Milestone: ---
X-Bugzilla-Flags:
X-Bugzilla-Changed-Fields: bug_id short_desc product version bug_status bug_severity priority component assigned_to reporter blocked
Message-ID: <bug-64166-4@http.gcc.gnu.org/bugzilla/>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/
Auto-Submitted: auto-generated
MIME-Version: 1.0
X-SW-Source: 2014-12/txt/msg00370.txt.bz2
Content-length: 768

https://gcc.gnu.org/bugzilla/show_bug.cgi?idd166

            Bug ID: 64166
           Summary: JIT does not provide a way for verifying dumpfiles
                    from testcases
           Product: gcc
           Version: 5.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: jit
          Assignee: dmalcolm at gcc dot gnu.org
          Reporter: dmalcolm at gcc dot gnu.org
            Blocks: 64020

In PR jit/64020 I found that there isn't currently a good way for a jit
testcase to get at a specific dumpfile and to assert properties about it (e.g.
that a particular string or regex is found).

I'm opening this bug to track this.

I'm not yet sure to what extent to expose this in the API to end-users.


  parent reply	other threads:[~2014-12-03 14:52 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-10-27 18:32 [Bug driver/63660] New: [4.8-4.9+] -Wmaybe-uninitialized false positive with -O1 and more ed0.88.prez at gmail dot com
2014-10-28  9:04 ` [Bug tree-optimization/63660] " rguenth at gcc dot gnu.org
2014-12-03 14:15 ` [Bug tree-optimization/63660] -Wmaybe-uninitialized false positive (uninit pass limits) ed0.88.prez at gmail dot com
2014-12-03 14:52 ` manu at gcc dot gnu.org [this message]
2021-03-31  2:17 ` msebor at gcc dot gnu.org
2022-08-30  8:01 ` [Bug tree-optimization/63660] -Wmaybe-uninitialized false positive on many repeated bitwise tests rguenth at gcc dot gnu.org
2022-08-30  8:05 ` cvs-commit at gcc dot gnu.org

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-63660-4-DYKEdk6a48@http.gcc.gnu.org/bugzilla/ \
    --to=gcc-bugzilla@gcc.gnu.org \
    --cc=gcc-bugs@gcc.gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).