On December 8, 2017 3:58:11 PM GMT+01:00, Jakub Jelinek <ja...@redhat.com> 
wrote:
>On Fri, Dec 08, 2017 at 03:44:03PM +0100, Richard Biener wrote:
>> 
>> The following fixes spurious uninit warnings for zero-sized arrays.
>> 
>> Bootstrapped and tested on x86_64-unknown-linux-gnu, applied.
>> 
>> Richard.
>> 
>> 2017-12-08  Richard Biener  <rguent...@suse.de>
>> 
>>      PR middle-end/81782
>>      * tree-ssa-uninit.c (warn_uninitialized_vars): Properly
>>      handle accesses outside of zero-sized vars.
>
>Is ref.max_size == -1 always guaranteeing no access before offset, only
>after it?

Yes. 

>What I fear is e.g. ARRAY_REF with non-constant index with base of
>MEM_REF with & of a middle of array or something similar?
>struct S { int x[64]; } foo;
>MEM_REF[&foo, 40][i] with negative i.

The array type constraints the access. Invalid accesses invoke undefined 
behavior. 

>Anyway, in this case it is about not printing a warning, so we can give
>up
>even if it is theoretically possible.
>
>> --- gcc/tree-ssa-uninit.c    (revision 255499)
>> +++ gcc/tree-ssa-uninit.c    (working copy)
>> @@ -296,8 +296,8 @@ warn_uninitialized_vars (bool warn_possi
>>               variable.  */
>>            if (DECL_P (base)
>>                && ref.size != -1
>> -              && ref.max_size == ref.size
>> -              && (ref.offset + ref.size <= 0
>> +              && ((ref.max_size == ref.size
>> +                   && ref.offset + ref.size <= 0)
>>                    || (ref.offset >= 0
>>                        && DECL_SIZE (base)
>>                        && TREE_CODE (DECL_SIZE (base)) == INTEGER_CST
>
>       Jakub

Reply via email to