[Bug target/87411] New: -fcf-protection -mindirect-branch=thunk incorrectly

2018-09-24 Thread fw at gcc dot gnu.org
Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: x86_64

[Bug target/82699] ENDBR isn't generated at function entrance (with -mfentry)

2018-09-24 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82699 Florian Weimer changed: What|Removed |Added Summary|ENDBR isn't generated at|ENDBR isn't generated at

[Bug middle-end/81035] noreturn leads to worse code due to lack of sibcall optimization

2018-09-21 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81035 Florian Weimer changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug middle-end/81035] noreturn leads to worse code due to lack of sibcall optimization

2018-09-21 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81035 --- Comment #3 from Florian Weimer --- Author: fw Date: Fri Sep 21 19:49:36 2018 New Revision: 264490 URL: https://gcc.gnu.org/viewcvs?rev=264490=gcc=rev Log: Document that attribute noreturn inhibits tail call optimization PR

[Bug c/87379] New: Warn about function pointer casts which differ in variadic-ness

2018-09-21 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org CC: msebor at gcc dot gnu.org Target Milestone: --- It is fairly common to assume that that the ... part of a variadic

[Bug middle-end/81035] noreturn leads to worse code due to lack of sibcall optimization

2018-09-21 Thread fw at gcc dot gnu.org
||2018-09-21 Assignee|unassigned at gcc dot gnu.org |fw at gcc dot gnu.org Ever confirmed|0 |1 --- Comment #2 from Florian Weimer --- Documentation patch posted: https://gcc.gnu.org/ml/gcc-patches/2018-09/msg01224.html

[Bug c/53769] [C11]: Macros __STDC_NO_THREADS__ / __STDC_NO_ATOMIC__ missing.

2018-08-27 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53769 --- Comment #9 from Florian Weimer --- (In reply to Vincent Lefèvre from comment #8) > (In reply to Florian Weimer from comment #7) > > Furthermore, if I don't misread the standard, the expectation is that if an > > implementation does not

[Bug c/53769] [C11]: Macros __STDC_NO_THREADS__ / __STDC_NO_ATOMIC__ missing.

2018-07-12 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53769 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #7

[Bug tree-optimization/86435] -fsemantic-interposition does not appear to have any effect

2018-07-08 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86435 --- Comment #4 from Florian Weimer --- (In reply to Andreas Schwab from comment #3) > But the assembler is allowed to resolve the reference directly without the > possibility for interposition. Hmm. The assembler would still produce a

[Bug tree-optimization/86435] -fsemantic-interposition does not appear to have any effect

2018-07-08 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86435 --- Comment #2 from Florian Weimer --- (In reply to Alexander Monakov from comment #1) > Without -fpic, f1 is considered not interposable. That's an odd assumption. ld can interpose the definition with -z muldefs, after all.

[Bug tree-optimization/86435] New: -fsemantic-interposition does not appear to have any effect

2018-07-08 Thread fw at gcc dot gnu.org
Priority: P3 Component: tree-optimization Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: x86_64 Consider this program: int a; int f1 (int a) { return a; } int f2 (void) { return f1

[Bug sanitizer/86275] gcc-8.1, linux 4.18-rc1, x86_64: error: redefinition of 'struct timespec'

2018-06-28 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86275 Florian Weimer changed: What|Removed |Added Status|NEW |RESOLVED See Also|

[Bug sanitizer/86275] gcc-8.1, linux 4.18-rc1, x86_64: error: redefinition of 'struct timespec'

2018-06-26 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86275 --- Comment #7 from Florian Weimer --- (In reply to Milhouse from comment #6) > Is there any other information I can add, or anything I can test (patches > etc.) that might help clarify/determine/narrow down where this problem lies? I posted a

[Bug sanitizer/86275] gcc-8.1, linux 4.18-rc1, x86_64: error: redefinition of 'struct timespec'

2018-06-22 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86275 --- Comment #5 from Florian Weimer --- (In reply to Jakub Jelinek from comment #4) > The question is if this is a problem with recent kernel headers and any > glibc, or e.g. both latest glibc and 2.27; if yes, then we probably need > some

[Bug target/86236] Stack alignment prologue clobbers %edi for fastcall functions with global register variable

2018-06-20 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86236 Florian Weimer changed: What|Removed |Added Summary|-mstackrealign prologue |Stack alignment prologue

[Bug target/86236] New: -mstackrealign prologue clobbers %edi for fastcall functions with global register variable

2018-06-20 Thread fw at gcc dot gnu.org
Keywords: wrong-code Severity: normal Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- #include void f1 (void *, int); register int edi __asm__ (&quo

[Bug tree-optimization/85929] _GLIBCXX_ASSERTIONS, subscript type mismatch, and std::vector bounds check elimination

2018-05-28 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85929 --- Comment #3 from Florian Weimer --- (In reply to Richard Biener from comment #2) > That is, > for > UINT_MAX # of elements the code will infintely loop AFAICS (but it will > not access elements out of bounds). The way I read the original

[Bug target/85939] -mstackrealign does not realign stack with local __m64 variable

2018-05-28 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85939 --- Comment #7 from Florian Weimer --- (In reply to H.J. Lu from comment #6) > I believe __m64 is 4-byte aligned. https://github.com/hjl-tools/x86-psABI/blob/801352a1470ae8542a3a1f83fb2abda35feab075/low-level-sys-info.tex#L108 says alignment

[Bug target/85939] -mstackrealign does not realign stack with local __m64 variable

2018-05-27 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85939 --- Comment #4 from Florian Weimer --- Unfortunately, -mincoming-stack-boundary=2 makes -mstackrealign useless because now any leaf function realigns the stack. The usual effect (no matter what the documentation says) is that -mstackrealign

[Bug target/85939] -mstackrealign does not realign stack with local __m64 variable

2018-05-27 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85939 --- Comment #3 from Florian Weimer --- (In reply to Uroš Bizjak from comment #1) > Please also use -mincoming-stack-boundary=2 to tell the compiler about > possible incoming stack (mis)alignment. This does change the result; alignment is

[Bug target/85939] New: -mstackrealign does not realign stack with local __m64 variable

2018-05-26 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i386-*-linux-gnu Consider this test case: #include int f1 (__m64 *); int f2 (void

[Bug middle-end/85929] New: _GLIBCXX_ASSERTIONS, subscript type mismatch, and std::vector bounds check elimination

2018-05-25 Thread fw at gcc dot gnu.org
Keywords: missed-optimization Severity: normal Priority: P3 Component: middle-end Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Compile this with “gcc -O2” on a 64-bit platform: #define

[Bug libgcc/60790] libatomic convenience library selects IFUNC implementation before obtaining cpu info.

2018-05-23 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=60790 --- Comment #11 from Florian Weimer --- Author: fw Date: Wed May 23 11:13:05 2018 New Revision: 260603 URL: https://gcc.gnu.org/viewcvs?rev=260603=gcc=rev Log: x86: libatomic: Do not assume ELF constructors run before IFUNC resolvers

[Bug libgcc/60790] libatomic convenience library selects IFUNC implementation before obtaining cpu info.

2018-03-29 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=60790 --- Comment #10 from Florian Weimer --- Patch posted: https://gcc.gnu.org/ml/gcc-patches/2018-03/msg01546.html

[Bug target/80878] -mcx16 (enable 128 bit CAS) on x86_64 seems not to work on 7.1.0

2018-03-29 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80878 --- Comment #16 from Florian Weimer --- (In reply to andysem from comment #12) > Is read-only memory a valid use case for __atomic intrinsics anyway? These > intrinsics are primarily targeted to implement std::atomic, I strongly disagree about

[Bug target/80878] -mcx16 (enable 128 bit CAS) on x86_64 seems not to work on 7.1.0

2018-03-29 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80878 Florian Weimer changed: What|Removed |Added Status|RESOLVED|NEW Last reconfirmed|

[Bug libgcc/60790] libatomic convenience library selects IFUNC implementation before obtaining cpu info.

2018-03-29 Thread fw at gcc dot gnu.org
at gcc dot gnu.org |fw at gcc dot gnu.org

[Bug libgcc/85120] New: __get_cpuid

2018-03-29 Thread fw at gcc dot gnu.org
: libgcc Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i686 __get_cpuid performs the EFLAGS check even with -march=x86-64. I think the instruction was introduced with the Pentium, so we can avoid the check

[Bug c++/48562] [C++0x] warn about uses of initializer_list that will lead to dangling pointers

2018-03-28 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=48562 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org See

[Bug sanitizer/84761] AddressSanitizer is not compatible with glibc 2.27 on x86

2018-03-19 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84761 --- Comment #3 from Florian Weimer --- (In reply to rguent...@suse.de from comment #2) > I think as there are already quite some __GLIBC_PREREQ uses in the > sanitizer lib changing the above prototype appropriately would be > good enough. If

[Bug sanitizer/84761] AddressSanitizer is not compatible with glibc 2.27 on x86

2018-03-19 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84761 --- Comment #1 from Florian Weimer --- This bit needs to change for glibc 2.27 and later: #ifdef __i386__ # define DL_INTERNAL_FUNCTION __attribute__((regparm(3), stdcall)) #else # define DL_INTERNAL_FUNCTION #endif We removed the regparm

[Bug target/84829] -mieee-fp causes to link with -lieee but that is no longer available

2018-03-12 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84829 --- Comment #6 from Florian Weimer --- (In reply to Jakub Jelinek from comment #5) > -mieee-fp does affect code generation on x86 and m68k, but I don't see how > it is related to any changes in glibc. > And besides code generation changes it

[Bug target/84829] -mieee-fp causes to link with -lieee but that is no longer available

2018-03-12 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84829 --- Comment #4 from Florian Weimer --- Does -mieee-fp still impact code generation on i386? What about x86-64 with SSE2? I would expect that existing users of -mieee-fp receive an error when they compile and link with a upgraded glibc, so I

[Bug target/84148] CET shouldn't be enabled in 32-bit run-time libraries by default

2018-01-31 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84148 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #1

[Bug target/84146] ICE with -mcet in dwarf2out_var_location, involving sigsetjmp

2018-01-31 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84146 Florian Weimer changed: What|Removed |Added See Also||https://bugzilla.redhat.com

[Bug target/84146] New: ICE with -mcet in dwarf2out_var_location, involving sigsetjmp

2018-01-31 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Blocks: 81652 Target Milestone: --- Target: x86-64 Created attachment 43306 --> https://gcc.gnu.

[Bug target/84064] ICE in ix86_expand_prologue related to -fstack-clash-protection and memcpy on i686

2018-01-30 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84064 Florian Weimer changed: What|Removed |Added See Also||https://gcc.gnu.org/bugzill

[Bug target/84128] i686: Stack spilling in -fstack-clash-protection prologue neglects %esp change

2018-01-30 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84128 --- Comment #1 from Florian Weimer --- Also seems to affect -fstack-check.

[Bug target/84128] New: i686: Stack spilling in -fstack-clash-protection prologue neglects %esp change

2018-01-30 Thread fw at gcc dot gnu.org
: wrong-code Severity: normal Priority: P3 Component: target Assignee: law at redhat dot com Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i686 Created attachment 43291 --> https://gcc.gnu.org/bugzilla/attachment.cgi

[Bug target/84064] New: ICE in ix86_expand_prologue related to -fstack-clash-protection and memcpy on i686

2018-01-26 Thread fw at gcc dot gnu.org
Keywords: ice-on-valid-code Severity: normal Priority: P3 Component: target Assignee: law at redhat dot com Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i686 Compile this with -O2 -m32 -march=i686 -fstack-clash-protection

[Bug target/84039] New: x86 retpolines and CFI

2018-01-25 Thread fw at gcc dot gnu.org
Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: x86-64 I tried this: struct C { virtual ~C(); virtual void f(); }; void f (C *p) { p->f(); p->f(); } with r256939 and -mindirect-branch

[Bug target/83994] %ebx is clobbered by stack-clash probing for regparm-3 function in PIC mode

2018-01-23 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=83994 --- Comment #2 from Florian Weimer --- It's still callee-saved, so it is picked by get_scratch_register_on_entry if it is saved by the function, under the assumption that it is used only after the prologue has saved it and there is no need to

[Bug target/83994] New: %ebx is clobbered by stack-clash probing for regparm-3 function in PIC mode

2018-01-23 Thread fw at gcc dot gnu.org
: wrong-code Severity: normal Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i686 Created attachment 43219 --> https://gcc.gnu.org/bugzilla/attachment.

[Bug middle-end/83697] New: Integer overflows in dynamically-sized stack allocations with -fstack-clash-protection

2018-01-05 Thread fw at gcc dot gnu.org
Keywords: wrong-code Severity: normal Priority: P3 Component: middle-end Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Created attachment 43039 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=43

[Bug middle-end/83654] -fstack-clash-protection probes below the stack pointer for VLA with constant size

2018-01-02 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=83654 --- Comment #2 from Florian Weimer --- I forgot to add a compiler barrier to f2 for the executable test case, so it is not strictly equivalent. With it, valgrind reports: ==375147== Invalid read of size 4 ==375147==at 0x8048403: f2 (in

[Bug middle-end/83654] -fstack-clash-protection probes below the stack pointer for VLA with constant size

2018-01-02 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=83654 --- Comment #1 from Florian Weimer --- I forgot to mention that I used “-O2 -fstack-clash-protection”, but there's a valgrind warning with -O0, too.

[Bug middle-end/83654] New: -fstack-clash-protection probes below the stack pointer for VLA with constant size

2018-01-02 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: middle-end Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Created attachment 43010 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=43010=edit const-vla.c On i

[Bug target/83641] -fstack-clash-protection generates incorrect CFI on i386

2018-01-01 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=83641 Florian Weimer changed: What|Removed |Added Attachment #42995|0 |1 is obsolete|

[Bug target/83641] New: -fstack-clash-protection generates incorrect CFI on i386

2017-12-31 Thread fw at gcc dot gnu.org
Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i386 Created attachment 42995 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=42995=edit unwind.i The attached unwin

[Bug target/81842] -fcf-protection -mcet is incompatible with makecontext family functions

2017-12-19 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81842 --- Comment #15 from Florian Weimer --- This is all very strange. How have extended makecontext for x86 AVX2/AVX-512 support? The CPU context needs to be stored somewhere, after all. I find it difficult to believe that there is no space left

[Bug target/83302] i386 stack_probe has side effects

2017-12-07 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=83302 --- Comment #5 from Florian Weimer --- FWIW, -fstack-clash-protection avoids these issues.

[Bug middle-end/61118] [6/7/8 Regression] Indirect call generated for pthread_cleanup_push with constant cleanup function

2017-11-21 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61118 Florian Weimer changed: What|Removed |Added Summary|[6/7/8 Regression] Spurious |[6/7/8 Regression] Indirect

[Bug c++/82900] Warn on initialization with self

2017-11-08 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82900 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #2

[Bug c/82528] New: Warning for conversion from bool to enum

2017-10-12 Thread fw at gcc dot gnu.org
Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- I think this program should emit a warning in C mode: #define TRUE ((_Bool) 1) #define FALSE ((_Bool) 0) typedef enum { a, b, c } result; result f (int flag) { if (flag) return

[Bug target/82104] New: __stack_chk_fail should not use lazy binding on ELF

2017-09-05 Thread fw at gcc dot gnu.org
: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- __stack_chk_fail is only called when something is critically wrong with the process. At this point, it is important to minimize the amount of work done by the process

[Bug target/81780] -finstrument-control-flow -mcet is incompatible with __attribute__ ((regparm (3)))

2017-08-09 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81780 --- Comment #1 from Florian Weimer --- Could we turn calls to regparam (3) functions into noplt calls? Some additional mechanics are probably needed if the address of such a function is taken.

[Bug target/81646] i386 SSE2 compilation mode which preserves psABI stack alignment without requiring it

2017-08-01 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81646 --- Comment #5 from Florian Weimer --- (In reply to H.J. Lu from comment #4) > You can use -mstackrealign. I don't want to realign the stack unconditionally for performance reasons. I want to preserve alignment for callback functions, and give

[Bug target/81646] i386 SSE2 compilation mode which preserves psABI stack alignment without requiring it

2017-08-01 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81646 --- Comment #3 from Florian Weimer --- (In reply to Jakub Jelinek from comment #1) > The Linux ABI says the stack should be 16-byte alignment, anything else is a > bug. The GCC manual recommends this (under -mincoming-stack-boundary):

[Bug target/81646] New: i386 SSE2 compilation mode which preserves psABI stack alignment without requiring it

2017-08-01 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i386 It would be helpful to have an i386 compilation mode which preserves the 16-byte stack

[Bug c/81577] New: -ftrack-macro-expansion=0 causes spurious “this ‘else’ clause does not guard” with -Wall

2017-07-27 Thread fw at gcc dot gnu.org
Keywords: diagnostic Severity: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Created attachment 41844 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=41844=e

[Bug target/80180] Incorrect codegen from rdseed intrinsic use

2017-07-26 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80180 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #5

[Bug sanitizer/81066] sanitizer_stoptheworld_linux_libcdep.cc:276:22: error: aggregate ‘sigaltstack handler_stack’ has incomplete type and cannot be defined

2017-07-09 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81066 --- Comment #8 from Florian Weimer --- (In reply to Khem Raj from comment #7) > (In reply to Florian Weimer from comment #6) > > (In reply to Khem Raj from comment #5) > > > +#ifndef __stack_t_defined > > > +struct stack_t; > > > +#endif > > >

[Bug other/81242] New: Clear-to-EOL in diagnostics colorization corrupts output

2017-06-28 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: other Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org CC: dmalcolm at redhat dot com Target Milestone: --- It appears that GCC suffers from the same issue as grep when it comes

[Bug middle-end/78918] missing -Wrestrict on memcpy copying over self

2017-06-21 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78918 Florian Weimer changed: What|Removed |Added See Also||https://gcc.gnu.org/bugzill

[Bug sanitizer/81066] sanitizer_stoptheworld_linux_libcdep.cc:276:22: error: aggregate ‘sigaltstack handler_stack’ has incomplete type and cannot be defined

2017-06-13 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81066 --- Comment #6 from Florian Weimer --- (In reply to Khem Raj from comment #5) > +#ifndef __stack_t_defined > +struct stack_t; > +#endif Where does __stack_t_defined come from? If this is the definition from the glibc headers, that's really

[Bug middle-end/81035] New: noreturn leads to worse code due to lack of sibcall optimization

2017-06-09 Thread fw at gcc dot gnu.org
Priority: P3 Component: middle-end Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: x86-64 Created attachment 41521 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=41521=edit C test c

[Bug middle-end/13182] -fstack-check probes too distant when allocating on stack

2017-05-30 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=13182 --- Comment #7 from Florian Weimer --- (In reply to Eric Botcazou from comment #6) > That's as expected: the probing mechanism maintains a protection area so the > program can recover from a stack overflow condition by raising an exception. >

[Bug target/78460] [7/8 Regression] [SH] OOM building glibc string tst-cmp.c

2017-05-01 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78460 --- Comment #3 from Florian Weimer --- I see ~500 GiB with GCC 7.0.1 20170501 (prerelease) [gcc-7-branch revision 247430]. This interferes rather badly with cross-compiler-based testing.

[Bug sanitizer/79341] Many Asan tests fail on s390

2017-02-15 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=79341 --- Comment #58 from Florian Weimer --- (In reply to Dominik Vogt from comment #57) > libsanitizer miscalculates the Pcs in the backtrace: > > #0 0x1000839 in NullDeref > #1 0x10006c1 in main > #2 0x3fff6e23069 in __libc_start_main

[Bug middle-end/56727] Recursive call goes through the PLT unnecessarily

2017-02-09 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=56727 --- Comment #11 from Florian Weimer --- (In reply to Jakub Jelinek from comment #10) > Don't we also inline any beneficial inline functions at -O3 even if they > could be interposed (definitely not suggesting we stop doing that, that > would

[Bug target/79439] Missing nop instruction after recursive call corrupts TOC register

2017-02-09 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=79439 --- Comment #2 from Florian Weimer --- (In reply to Segher Boessenkool from comment #1) > What command line options does this need? Sorry, I used -O2 -fpic. Indeed, GCC seems to perform target-independent optimizations based on an assumption

[Bug target/79439] New: Missing nop instruction after recursive call corrupts TOC register

2017-02-09 Thread fw at gcc dot gnu.org
Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: ppc64le-redhat-linux Consider this test case: int f (void); void g (void) { } void rec (int a) { if (f

[Bug sanitizer/79341] Many Asan tests fail on s390

2017-02-03 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=79341 --- Comment #20 from Florian Weimer --- (In reply to Andreas Krebbel from comment #19) > As a debugging tool I think asan is a special case also regarding ABI > compatibility. We probably do not want to export the internal symbol and > make it

[Bug other/79341] Many Asan tests fail on s390

2017-02-03 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=79341 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #16

[Bug target/78862] New: tile*: ICE with -fstack-protetor-strong

2016-12-19 Thread fw at gcc dot gnu.org
Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: tilepro-glibc-linux Created attachment 40369 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=40369=edit Test case extracted from glibc Compile the attac

[Bug c/78584] Bug in GCC argument parser expandargv

2016-11-29 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78584 --- Comment #5 from Florian Weimer --- Hmm. Maybe it is file-system-specific. I don't see the anomalous return values on XFS and tmpfs.

[Bug c/78584] Bug in GCC argument parser expandargv

2016-11-29 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78584 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #3

[Bug libgcc/78064] unwind-c.c never uses _Unwind_GetIPInfo

2016-11-07 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78064 --- Comment #6 from Florian Weimer --- Author: fw Date: Mon Nov 7 19:54:05 2016 New Revision: 241929 URL: https://gcc.gnu.org/viewcvs?rev=241929=gcc=rev Log: PR libgcc/78064: Add missing include directive to unwind-c.c Backport from

[Bug libgcc/78064] unwind-c.c never uses _Unwind_GetIPInfo

2016-11-07 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78064 --- Comment #5 from Florian Weimer --- Author: fw Date: Mon Nov 7 17:08:40 2016 New Revision: 241914 URL: https://gcc.gnu.org/viewcvs?rev=241914=gcc=rev Log: PR libgcc/78064: Add missing include directive to unwind-c.c Backport from

[Bug libgcc/78064] unwind-c.c never uses _Unwind_GetIPInfo

2016-10-24 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78064 Florian Weimer changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug libgcc/78064] unwind-c.c never uses _Unwind_GetIPInfo

2016-10-24 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78064 --- Comment #3 from Florian Weimer --- Author: fw Date: Mon Oct 24 18:25:09 2016 New Revision: 241491 URL: https://gcc.gnu.org/viewcvs?rev=241491=gcc=rev Log: PR libgcc/78064: Add missing include directive to unwind-c.c PR libgcc/78064

[Bug target/78091] i386: Register allocation failure with -Os

2016-10-24 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78091 --- Comment #3 from Florian Weimer --- Although I have to admit, the error variable could be a bit nicer, rejecting the register variable definition.

[Bug target/78091] i386: Register allocation failure with -Os

2016-10-24 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78091 Florian Weimer changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/78091] New: i386: Register allocation failure with -Os

2016-10-24 Thread fw at gcc dot gnu.org
Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Target: i386 Created attachment 39874 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=39874=edit posix_fallocate.i The attached test case has been extracted f

[Bug libgcc/78064] unwind-c.c never users _Unwind_GetIPInfo

2016-10-21 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78064 Florian Weimer changed: What|Removed |Added Status|UNCONFIRMED |ASSIGNED Last reconfirmed|

[Bug libgcc/78064] New: unwind-c.c never users _Unwind_GetIPInfo

2016-10-21 Thread fw at gcc dot gnu.org
Assignee: fw at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- unwind-c.c use a HAVE_GETIPINFO preprocessor conditional, but never includes auto-target.h, so the macro is always undefined. As a result, _Unwind_GetIPInfo is never used. This causes

[Bug c/38295] Support pointer difference as constant in static initializer

2016-10-12 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=38295 --- Comment #11 from Florian Weimer --- Created attachment 39799 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=39799=edit label.c (In reply to Andrew Pinski from comment #6) > Not always since they could be in different sections via

[Bug rtl-optimization/77951] New: Incorrect placement of label which does not affect execution flow

2016-10-12 Thread fw at gcc dot gnu.org
Priority: P3 Component: rtl-optimization Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Created attachment 39794 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=39794=edit label-bug.c The attached test case abo

[Bug c/38295] Support pointer difference as constant in static initializer

2016-10-07 Thread fw at gcc dot gnu.org
||fw at gcc dot gnu.org Resolution|WONTFIX |--- --- Comment #10 from Florian Weimer --- This is already implemented for differences between C && label addresses. I think there is no compelling reason why this would not work for the a

[Bug target/77894] Enable GNU indirect function support by default as it will be used in glibc.

2016-10-07 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77894 --- Comment #2 from Florian Weimer --- (In reply to nsz from comment #1) > the ifunc abi still has many problems and i don't think it's possible to > detect > dynamic linker support for cross compilation so if it is enabled do it only > if > the

[Bug c/77762] New: Incorrect destination buffer length in -Wformat-length warning

2016-09-27 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org CC: msebor at gcc dot gnu.org Target Milestone: --- Created attachment 39703 --> https://gcc.gnu.org/bugzi

[Bug target/77729] aarch64 inserts unneeded uxtb after ldrb, orr ...32

2016-09-25 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77729 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #7

[Bug tree-optimization/77627] Unexpected void * dereference in uninit warning (and missed out-of-bounds warning)

2016-09-17 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77627 --- Comment #1 from Florian Weimer --- Observed with the trunk from 2016-09-08.

[Bug tree-optimization/77627] New: Unexpected void * dereference in uninit warning (and missed out-of-bounds warning)

2016-09-17 Thread fw at gcc dot gnu.org
Severity: normal Priority: P3 Component: tree-optimization Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- This snippet, derived from code provided by Ron Garret: int main(int argc, char* argv[]) { int x[100] = {0

[Bug ada/77535] GNAT.Perfect_Hash_Generators access invalid memory with non-1-based strings

2016-09-08 Thread fw at gcc dot gnu.org
||2016-09-08 Assignee|unassigned at gcc dot gnu.org |fw at gcc dot gnu.org Ever confirmed|0 |1

[Bug ada/77535] New: GNAT.Perfect_Hash_Generators access invalid memory with non-1-based strings

2016-09-08 Thread fw at gcc dot gnu.org
: normal Priority: P3 Component: ada Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- Created attachment 39585 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=39585=edit phg2.adb Natasha Kerensikova repor

[Bug middle-end/66661] incorrect memory access in optimization with flexible array member

2016-09-07 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=1 Florian Weimer changed: What|Removed |Added Status|RESOLVED|UNCONFIRMED Resolution|INVALID

[Bug middle-end/66661] incorrect memory access in optimization with flexible array member

2016-09-06 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=1 Florian Weimer changed: What|Removed |Added CC||fw at gcc dot gnu.org --- Comment #11

[Bug middle-end/77407] New: Optimize integer i / abs (i) into the sign of i

2016-08-29 Thread fw at gcc dot gnu.org
Priority: P3 Component: middle-end Assignee: unassigned at gcc dot gnu.org Reporter: fw at gcc dot gnu.org Target Milestone: --- I found this gem in some glibc test case: if (c != 0) c /= abs (c); This could turn into: if (c < 0) c = -1; e

[Bug c/72783] Fortify scanf %s, %[ conversion specifiers

2016-08-03 Thread fw at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=72783 --- Comment #1 from Florian Weimer --- Martin and I discussed this for a bit. The %ms hack does not work due to embedded NULs, which are copied to the destination buffer by scanf, do not terminate the string, and are (in most cases) detectable

<    1   2   3   4   5   >