http://gcc.gnu.org/bugzilla/show_bug.cgi?id=57837

            Bug ID: 57837
           Summary: ARM function pointer tailcall miscompilation
                    regression
           Product: gcc
           Version: unknown
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: target
          Assignee: unassigned at gcc dot gnu.org
          Reporter: me at williamgrant dot id.au

Created attachment 30469
  --> http://gcc.gnu.org/bugzilla/attachment.cgi?id=30469&action=edit
arm.md fix

The fix for PR target/19599 in svn trunk r198928 causes predicated function
pointer tailcalls for some ARM targets to lose their predicate and execute
unconditionally, resulting in a crash or other misbehaviour. I was able to
reproduce the miscompilation, manifesting as a segfault, using -march=armv4t
-marm -O3, as below:

gcc -march=armv4t -marm -O3 -o bx-test bx-test.c

----
void baz() {};

void (*bar)() = baz;

void foo(int c) {
    if (c == 1) {
        foo(0);
    }
    bar();
}

int main(int argc, char **argv) {
    foo(1);
}
----

Today's trunk gives the following asm:

----
foo:
        cmp     r0, #1
        stmfd   sp!, {r4, lr}
        ldr     r4, .L8
        ldrne   r3, [r4]
        ldmnefd sp!, {r4, lr}
         bx     r3      @ indirect register sibling call
----

Note the bx to an r3 that is uninitialised when r0 == 1; it should actually be
a bxne. The bug in arm.md is fairly clear: the %? is missing from two bx
instructions, so the predicate is omitted. After identifying the bad code I
discovered that the issue was raised in review, but deemed irrelevant
(http://gcc.gnu.org/ml/gcc-patches/2013-05/msg01022.html).

The attached patch fixes the bug for me.

Reply via email to