Looks good to me. Please check it in. 2011/11/12 Yulei Sui <rocky...@gmail.com>: > Hi all, > This is a call graph scc detection bug in IPA_NystromAliasAnalyzer, > According to Nuutila's algorithm and CGO 2009 paper (Pereira and Berlin, > "Wave Propagation and Deep Propagation for Pointer Analysis"). After the > pop operation, "w" should be set in SCC. > Although this code fraction is not used in current context-insensitive alias > analysis, it would be a subtle bug for future context sensitive analysis > development. > The bug is fixed as follows: > Index: osprey/ipa/main/analyze/ipa_nystrom_alias_analyzer.cxx > > =================================================================== > --- osprey/ipa/main/analyze/ipa_nystrom_alias_analyzer.cxx (revision 3797) > +++ osprey/ipa/main/analyze/ipa_nystrom_alias_analyzer.cxx (working copy) > @@ -126,7 +126,7 @@ > break; > else { > _S.pop(); > - _nyst->inSCC(w); > + _nyst->setInSCC(w,true); > _nyst->rep(w,v); > } > } > > Could a gate keeper please check this? > ------------------------------------------------------------------------------ > RSA(R) Conference 2012 > Save $700 by Nov 18 > Register now > http://p.sf.net/sfu/rsa-sfdev2dev1 > _______________________________________________ > Open64-devel mailing list > Open64-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/open64-devel > >
-- Regards, Lai Jian-Xin ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d _______________________________________________ Open64-devel mailing list Open64-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/open64-devel