https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114160
--- Comment #2 from Christoph Müllner ---
The fix for this issue ("riscv: xtheadmempair: Fix CFA reg notes") has been
cherry-picked from master and pushed to releases/gcc-13.
Btw, I don't have permission to change the ticket fields. So, whoever
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114160
Christoph Müllner changed:
What|Removed |Added
CC||christophm30 at gmail dot com
--- C
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100265
Christoph Müllner changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=11
Bug ID: 11
Summary: omnetpp: ICEs with dump flags, PGO and LTO
Product: gcc
Version: 14.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: debug
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109296
Christoph Müllner changed:
What|Removed |Added
CC||christophm30 at gmail dot com
--- C
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107667
--- Comment #1 from Christoph Müllner ---
RFC patch can be found on list:
https://gcc.gnu.org/pipermail/gcc-patches/2022-November/605936.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107666
--- Comment #1 from Christoph Müllner ---
RFC patch can be found on list:
https://gcc.gnu.org/pipermail/gcc-patches/2022-November/605934.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107667
Bug ID: 107667
Summary: IPA: Speculatively reuse existing specializations
Product: gcc
Version: 13.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107666
Bug ID: 107666
Summary: IPA: Speculatively dereferencing function pointers
Product: gcc
Version: 13.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Componen
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=93062
Christoph Müllner changed:
What|Removed |Added
CC||christophm30 at gmail dot com
--- Co
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106475
Christoph Müllner changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53947
Bug 53947 depends on bug 106475, which changed state.
Bug 106475 Summary: Loop vectorizer prevents vectorization
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106475
What|Removed |Added
--
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106475
--- Comment #2 from Christoph Müllner ---
Yes, you are right!
I haven't noticed that the longer sequence requires only half of the loop
iterations when compared to the shorter sequence.
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106475
Bug ID: 106475
Summary: Loop vectorizer prevents vectorization
Product: gcc
Version: 13.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: tree-opti
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105477
--- Comment #2 from Christoph Müllner ---
I've analysed this issue a bit more and want to share my observations.
I mention commit 3a7ba8fd here again as trigger of this issue, but not
as the underlying issue (which I did not fully understand so
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105477
Bug ID: 105477
Summary: RISC-V: Regression: Useless moves in conditional
select return
Product: gcc
Version: 12.0
Status: UNCONFIRMED
Severity: normal
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105314
--- Comment #8 from Christoph Müllner ---
Yes, I was wrong in my previous comment.
Jakub's patch is of course right.
The transformation in noce_try_store_flag_mask() does:
x = cond ? 0 else b // b may be x
==>
target = cond ? 0 : -1; /
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105314
--- Comment #6 from Christoph Müllner ---
The proposed fix is triggering an invalid transformation.
The pattern we need to transform is:
Convert "if (test) x = 0;" to "x &= -(test == 0);"
If there is an else branch, we can't apply the transf
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105314
--- Comment #1 from Christoph Müllner ---
A first analysis in noce_try_store_flag_mask() showed the following observation
in case of the failing conversion into the branchless sequence:
* if_info->b == const0_rtx holds
* rtx_equal_p (if_info->a
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105314
Bug ID: 105314
Summary: ifcvt regression in noce_try_store_flag_mask
Product: gcc
Version: 12.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: tre
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104895
--- Comment #2 from Christoph Müllner ---
Further analysis shows that '-flto=1' works as well and '-flto=16' fails as
well.
This brings us right to the spot:
Bad:
[...]
make -f /tmp/ccyzs8VX.mk -j16 all
Using built-in specs.
[...]
Good:
[...]
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104895
--- Comment #1 from Christoph Müllner ---
Compiling with '-v' shows the following differences:
BAD:
gcc -v -fPIC -flto=auto -shared -Wl,-soname,"lib'do it'.so" -o "lib'do it'.so"
doit.o
[...]
COLLECT_GCC_OPTIONS='-v' '-fPIC' '-flto=auto' '-sha
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104895
Bug ID: 104895
Summary: lto1: issue with space in library filename
Product: gcc
Version: 12.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: lto
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104657
--- Comment #5 from Christoph Müllner ---
Creating hard-wired object references might be a solution, but there is a lot
of existing code out there, that would need to be patched (including all the
hassle with support for old and new compilers).
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104657
--- Comment #4 from Christoph Müllner ---
Thanks for mentioning the volatile pointer method.
However, the pragma-solution results in better code (fewer instructions and
does not require a valid stack pointer).
I've used the code below to see wh
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104657
--- Comment #2 from Christoph Müllner ---
Thanks for referencing pr99578.
Based on the information there, I created the following workaround:
void foo(unsigned long v)
{
volatile unsigned long *p;
p = (volatile unsigned long*)8;
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104657
Bug ID: 104657
Summary: array subscript 0 is outside array bounds
Product: gcc
Version: 12.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: tree-o
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102793
Bug ID: 102793
Summary: AArch64: sequential comparisons with equal conditional
blocks don't use ccmp
Product: gcc
Version: 12.0
Status: UNCONFIRMED
Severity: n
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100316
Bug ID: 100316
Summary: Regression: __clear_cache() does not support
NULL-pointer arguments
Product: gcc
Version: 11.0
Status: UNCONFIRMED
Severity: normal
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100266
--- Comment #1 from Christoph M. ---
A patchset to resolve this can be found here:
https://gcc.gnu.org/pipermail/gcc-patches/2021-April/568684.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100265
--- Comment #1 from Christoph M. ---
A patchset to resolve this can be found here:
https://gcc.gnu.org/pipermail/gcc-patches/2021-April/568684.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100266
Bug ID: 100266
Summary: [RISCV] Provide programmatic implementation of CAS
Product: gcc
Version: unknown
Status: UNCONFIRMED
Severity: normal
Priority: P3
Compo
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100265
Bug ID: 100265
Summary: [RISCV] Use proper fences for atomic load/store
Product: gcc
Version: unknown
Status: UNCONFIRMED
Severity: normal
Priority: P3
Componen
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100264
--- Comment #1 from Christoph M. ---
A patch can be found here:
https://gcc.gnu.org/pipermail/gcc-patches/2021-April/568680.html
It does not show any regressions (target riscv*).
The patch does not include a new test case to demonstrate it ac
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100264
Bug ID: 100264
Summary: REE does not work on PARALLEL expressions with a
single register SET child
Product: gcc
Version: unknown
Status: UNCONFIRMED
Severity:
35 matches
Mail list logo