Illegal promotion of bool to int....

2005-04-06 Thread sjhill
Greetings. I am running up against an interesting compiler bug whereby a bool is being promoted to an int. I found a Bugzilla entry and a message on the mailing list that I thought was similar to what I am seeing: http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15484 http://gcc.gnu.org/ml/gcc/2

Re: GCC 4.1: Buildable on GHz machines only?

2005-04-27 Thread sjhill
> The alternative of course is to do only crossbuilds. Is it reasonable > to say that, for platforms where a bootstrap is no longer feasible, a > successful crossbuild is an acceptable test procedure to use instead? > Sure, and get flamed and trounced by Uli on glibc when you talk about problems

Re: GCC Compiler

2005-05-31 Thread sjhill
> I am doing a study about compilers. I have to monitor many existing > compilers and benchmark them. After I have to modify and optimize the > 'back-end' part for multithreads models. > You should go look at Scott's site (http://www.coyotegulch.com/) as he does a lot of benchmarking. > I have

Re: Major regression in 4.1.

2005-06-17 Thread sjhill
> Does this look familiar to anyone? It certainly was happening > a few days ago. Shouldn't a bootstrap and regression of all > frontend be required before someone checks in a patch to the > back-end? > Indeed. The last working GCC-4.1 compiler for both MIPS and i686 was back on 20050604. The bu

Static coverage analysis with 'gcov'.

2006-01-09 Thread sjhill
Greetings. Has anyone done or is aware of static coverage analysis tools that can be used with GCC? I know that people have used 'gcov' with the Linux kernel and User Mode Linux (UML) to do analysis with the kernel. I actually want to do coverage analysis on bootloader code from YAMON (used mostly

Re: ECCN Request - GCC

2006-02-02 Thread sjhill
> I'm trying to determine if we can export the GNU GCC product. Can you > please let me know if it contains any encryption? > You mean besides the documentation itself which is cryptic at times? No. IIRC, there some one way hashes used, but no encryption. Your question is amusing considering ever