Hi,
Could a gatekeeper please help review the fix for bug924?
https://bugs.open64.net/show_bug.cgi?id=924
This is a kernel build bug, the cut-down bug case below:
typedef unsigned int __u32;
typedef unsigned long kernel_ulong_t;
struct pci_device_id {
__u32 vendor, device;
__u32 subvendor, subdevice;
__u32 class, class_mask;
kernel_ulong_t driver_data;
};
static struct pci_device_id flexcop_pci_tbl[] = {
{ .vendor = (0x13d0), .device = (0x2103), .subvendor = (~0), .subdevice =
(~0) },
{ },
};
extern const struct pci_device_id __mod_pci_device_table __attribute__
((unused, alias("flexcop_pci_tbl")));
wgen asserts,
### Compiler Error during Writing WHIRL file phase:
### Invalid Storage class (COMMON) for ST Flag: (ST_INITIALIZED)
If provided with the option -fno-common,
### Invalid Storage class (UGLOBAL) for ST Flag: (ST_INITIALIZED)
Analysis:
current wgen does not handle the common kernel code pattern (base local,
aliased extern const) correctly.
Suggested patch(comments embedded in code):
osprey/be/cg/cgemit.cxx -- 0edf22d..ea2660c 100644
--- a/osprey/be/cg/cgemit.cxx
+++ b/osprey/be/cg/cgemit.cxx
@@ -8265,7 +8265,9 @@ Process_Bss_Data (SYMTAB_IDX stab)
ST_base_idx(sym) != ST_st_idx(sym) &&
!ST_is_equivalenced(sym) &&
ST_class(ST_base(sym)) != CLASS_BLOCK &&
- pu != NULL && ! PU_ftn_lang(*pu) /* bug 13585 */)
+ // originally bug 13585. bug 924 open64.net.
+ // no pu case should also be considered.
+ ((!pu) || !PU_ftn_lang (*pu)))
goto skip_definition;
#endif
size = TY_size(ST_type(sym));
osprey/wgen/wgen_decl.cxx -- 8b37860..23f8143 100644
--- a/osprey/wgen/wgen_decl.cxx
+++ b/osprey/wgen/wgen_decl.cxx
@@ -4723,12 +4723,28 @@ WGEN_Assemble_Alias (gs_t decl, gs_t target)
else {
Set_ST_base_idx (st, ST_st_idx (base_st));
Set_ST_emit_symbol(st); // for cg
- if (ST_is_initialized (base_st))
+ if (ST_is_initialized (base_st)) {
Set_ST_is_initialized (st);
+ // bug924 open64.net. global alias symbol with base initialized
+ // should set storage class SCLASS_DGLOBAL.
+ if (ST_sclass(st) == SCLASS_COMMON || ST_sclass(st) ==
SCLASS_UGLOBAL)
+ Set_ST_sclass (st, SCLASS_DGLOBAL);
+ }
#ifdef KEY
- if (ST_init_value_zero (base_st))
+ if (ST_init_value_zero (base_st)) {
Set_ST_init_value_zero (st);
+ // bug924 open64.net. Those base initialized zero
+ // symbols should restore to SCLASS_UGLOBAL.
+ if (ST_sclass(st) == SCLASS_DGLOBAL)
+ Set_ST_sclass (st, SCLASS_UGLOBAL);
+ }
#endif
+ // bug924 open64.net aliased symbols in COMMON section should be
+ // set to be uninitialized. Since aliased symbols themselves
+ // should never be allocated.
+ if (ST_sclass(st) == SCLASS_COMMON) {
+ Set_ST_sclass (st, SCLASS_UGLOBAL);
+ }
}
#ifdef KEY
if (!lang_cplus)
Would a gatekeeper please help a review? thanks
Regards
Gang
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure
contains a definitive record of customers, application performance,
security threats, fraudulent activity, and more. Splunk takes this
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Open64-devel mailing list
Open64-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/open64-devel