Hi,
I am a beginner at Open64 development. I needed some help on the following:

My goal:
I am trying to access the inter-procedural alias analysis information
within IPA,
immediately after the completion of the inlining analysis.

These are my observations and queries:

1. The Nystrom Alias classification is performed immediately before IPAA,
within
the function Perform_Interprocedural_Analysis() [in IPA_main.cxx].
(this is in alignment with the wiki page on Nystrom Alias Analysis.)
Here we use the alias analyzer object to perform the alias analysis using
the function
solver(). However, in solver, I see that the analysis is NOT
context-sensitive
(the BOOL contextSensitive remains FALSE) Could someone please explain this?


2. Also, is it true that instantiating the Alias_Manager anytime after the
Inter-procedural analysis will
give me access to the alias_analysis information?
When I did the following at the end of Perform_Interprocedural_Analysis(),
      ALIAS_MANAGER* alias_mgr =
Create_Alias_Manager(MEM_pu_nz_pool_ptr,body);
      Dump_alias_mgr(alias_mgr, body, stdout)
      Delete_Alias_Manager (alias_mgr , MEM_pu_nz_pool_ptr);
I get the IR, the point-to info and the alias_id info but none information
beyond alias_id > 2.(so all I get is the preg aliasing information)


3. Also, while debugging (with -ipa and -Wb,-OPT=nystrom) the call
to  IPA_NystromAliasAnalyzer::aliasAnalyzer()
returns a NULL within Perform_Interprocedural_Analysis() [in IPA_main.cxx].
Is there a previous point where the ALIAS_MANAGER is called to instantiate
the NystromAliasAnalyzer class?


I would be highly obliged if someone could point me to the right direction.

Awaiting reply,
Sincerely,
Siddhartha Jana
University of Houston
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Open64-devel mailing list
Open64-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/open64-devel

Reply via email to