[Bug libbacktrace/114941] [14/15 regression] libbacktrace build is broken for FDPIC uclibc targets by r14-5173-g2b64e4a54042

2024-07-26 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114941 --- Comment #6 from jcmvbkbc at gcc dot gnu.org --- This is fixed in master by r15-2051-gc6803cdaba7a + r15-2082-gf438299ef686

[Bug libbacktrace/114941] libbacktrace build is broken for FDPIC uclibc targets by r14-5173-g2b64e4a54042

2024-05-27 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114941 --- Comment #4 from jcmvbkbc at gcc dot gnu.org --- Proposed fix: https://gcc.gnu.org/pipermail/gcc-patches/2024-May/652798.html

[Bug libbacktrace/114941] libbacktrace build is broken for FDPIC uclibc targets by r14-5173-g2b64e4a54042

2024-05-04 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114941 --- Comment #3 from jcmvbkbc at gcc dot gnu.org --- (In reply to Ian Lance Taylor from comment #2) > What is the correct way to get the address at which the shared library was > loaded when using FDPIC? There's no single base address in case of

[Bug libbacktrace/114941] New: libbacktrace build is broken for FDPIC uclibc targets by gcc-14-5173-g2b64e4a54042

2024-05-03 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114941 Bug ID: 114941 Summary: libbacktrace build is broken for FDPIC uclibc targets by gcc-14-5173-g2b64e4a54042 Product: gcc Version: 14.0 Status: UNCONFIRMED Sever

[Bug target/114158] Wrong FDPIC special-casing in crtstuff produces invalid pointer in init_array

2024-02-28 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114158 --- Comment #4 from jcmvbkbc at gcc dot gnu.org --- > It seems to have been realized that this was not working, as > 6bcbf80c6e2bd8a60d88bbcac3d70ffb67f4888f disabled initfini arrays on > ARM/FDPIC, > but didn't identify the root cause. I belie

[Bug libgcc/114158] Wrong FDPIC special-casing in crtstuff produces invalid pointer in init_array

2024-02-28 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114158 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added CC||jcmvbkbc at gcc dot gnu.org

[Bug target/98470] ICE: "error: insn does not satisfy its constraints" with hard FP on xtensa

2023-02-26 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98470 --- Comment #4 from jcmvbkbc at gcc dot gnu.org --- I've noticed that this forward-propagation of the literal load followed by not calling the secondary reload function happens when the first literal load instruction has the following in its expre

[Bug target/108919] pure nested function may clobber its static chain pointer in windowed ABI on xtensa

2023-02-25 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108919 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Resolution|--- |FIXED Status|U

[Bug target/108919] New: pure nested function may clobber its static chain pointer in windowed ABI on xtensa

2023-02-24 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108919 Bug ID: 108919 Summary: pure nested function may clobber its static chain pointer in windowed ABI on xtensa Product: gcc Version: 13.0 Status: UNCONFIRMED Seve

[Bug target/108876] return address clobbered in sibcalls resulting in gfortran tests failing on xtensa

2023-02-21 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108876 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Resolution|--- |FIXED Status|U

[Bug target/108876] New: return address clobbered in sibcalls resulting in gfortran tests failing on xtensa

2023-02-21 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108876 Bug ID: 108876 Summary: return address clobbered in sibcalls resulting in gfortran tests failing on xtensa Product: gcc Version: 13.0 Status: UNCONFIRMED Sever

[Bug rtl-optimization/107482] [10/11/12 Regression] out-of-bounds heap access in IRA since r6-3496-g86f0bef37378a0

2022-11-28 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Resolution|--- |FIXED Status|N

[Bug other/86656] [meta-bug] Issues found with -fsanitize=address

2022-11-28 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86656 Bug 86656 depends on bug 107482, which changed state. Bug 107482 Summary: [10/11/12 Regression] out-of-bounds heap access in IRA since r6-3496-g86f0bef37378a0 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 What|Removed

[Bug target/107645] internal compiler error: RTL check: expected elt 0 type 'e' or 'u', have 'E' (rtx unspec) in symbolic_operand_1, at config/m68k/predicates.md:144

2022-11-16 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107645 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Resolution|--- |FIXED Status|U

[Bug target/107645] internal compiler error: RTL check: expected elt 0 type 'e' or 'u', have 'E' (rtx unspec) in symbolic_operand_1, at config/m68k/predicates.md:144

2022-11-11 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107645 --- Comment #1 from jcmvbkbc at gcc dot gnu.org --- ICE in the reproducer is generated when predicate 'symbolic_operand' is applied to the 'const' node in the following rtl: (insn 342 341 343 35 (set (reg:SI 97) (mem/u:SI (plus:SI (reg:S

[Bug target/107645] New: internal compiler error: RTL check: expected elt 0 type 'e' or 'u', have 'E' (rtx unspec) in symbolic_operand_1, at config/m68k/predicates.md:144

2022-11-11 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107645 Bug ID: 107645 Summary: internal compiler error: RTL check: expected elt 0 type 'e' or 'u', have 'E' (rtx unspec) in symbolic_operand_1, at config/m68k/predicates.md:144 Pr

[Bug target/107549] New: heap-buffer-overflow in xt_true_regnum

2022-11-07 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107549 Bug ID: 107549 Summary: heap-buffer-overflow in xt_true_regnum Product: gcc Version: 13.0 Status: UNCONFIRMED Severity: normal Priority: P3 Component: target

[Bug rtl-optimization/107482] out-of-bounds heap access in IRA

2022-11-03 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 --- Comment #5 from jcmvbkbc at gcc dot gnu.org --- I've bisected this issue to commit 86f0bef37378 ("re PR target/61578 (Code size increase for ARM thumb compared to 4.8.x when compiling with -Os)")

[Bug target/107506] [regression] cross-xtensa-esp32s2-elf/gcc-13.0.0_pre20221023: stack smashing detected during RTL pass: expand in function __absvdi2 (gen_movdi)

2022-11-02 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107506 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added CC||jcmvbkbc at gcc dot gnu.org

[Bug rtl-optimization/107482] out-of-bounds heap access in IRA

2022-10-31 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 --- Comment #4 from jcmvbkbc at gcc dot gnu.org --- The original ASAN report from the unmodified code: ==3761891==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000450ef8 at pc 0x01a78e5c bp 0x7ffdcf35f2a0 sp 0x7ffdcf35f298 RE

[Bug rtl-optimization/107482] out-of-bounds heap access in IRA

2022-10-31 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Target|microblazeel-linux-gnu |microblazeel-linux-gnu,

[Bug middle-end/107482] out-of-bounds heap access in IRA

2022-10-31 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 --- Comment #1 from jcmvbkbc at gcc dot gnu.org --- Created attachment 53807 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=53807&action=edit color-check.patch

[Bug middle-end/107482] New: out-of-bounds heap access in IRA

2022-10-31 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107482 Bug ID: 107482 Summary: out-of-bounds heap access in IRA Product: gcc Version: 13.0 Status: UNCONFIRMED Severity: normal Priority: P3 Component: middle-end

[Bug target/105879] DI mode constants are incorrectly loaded into registers on big-endian xtensa

2022-06-08 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105879 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolutio

[Bug target/105879] DI mode constants are incorrectly loaded into registers on big-endian xtensa

2022-06-07 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105879 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Status|UNCONFIRMED |ASSIGNED Ever confirme

[Bug target/105879] New: DI mode constants are incorrectly loaded into registers on big-endian xtensa

2022-06-07 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105879 Bug ID: 105879 Summary: DI mode constants are incorrectly loaded into registers on big-endian xtensa Product: gcc Version: 13.0 Status: UNCONFIRMED Severity: n

[Bug target/102336] New: plugins for xtensa-elf gcc cannot be built because xtensa-config.h is missing

2021-09-14 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102336 Bug ID: 102336 Summary: plugins for xtensa-elf gcc cannot be built because xtensa-config.h is missing Product: gcc Version: 10.1.0 Status: UNCONFIRMED Severity

[Bug target/102115] symbol address eliminated by the xtensa size optimization

2021-09-07 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102115 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolutio

[Bug target/102115] symbol address eliminated by the xtensa size optimization

2021-09-06 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102115 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added CC||jcmvbkbc at gcc dot gnu.org

[Bug target/98470] ICE: "error: insn does not satisfy its constraints" with hard FP on xtensa

2021-01-05 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98470 --- Comment #3 from jcmvbkbc at gcc dot gnu.org --- (In reply to rsand...@gcc.gnu.org from comment #2) > What code should GCC generate if it wants to move the given > MEM into an FP register? The two main options are: > > (1) reload the literal

[Bug target/98470] ICE: "error: insn does not satisfy its constraints" with hard FP on xtensa

2020-12-28 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98470 --- Comment #1 from jcmvbkbc at gcc dot gnu.org --- It happens at the reload pass when reload transforms the following RTL that comes to it from the IRA pass: (insn 20 163 164 30 (set (reg:SF 162 [ iftmp.0_87 ]) (mem/u/c:SF (symbol_ref/u:

[Bug target/98470] New: ICE: "error: insn does not satisfy its constraints" with hard FP on xtensa

2020-12-28 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98470 Bug ID: 98470 Summary: ICE: "error: insn does not satisfy its constraints" with hard FP on xtensa Product: gcc Version: 11.0 Status: UNCONFIRMED Severity: norma

[Bug target/98285] xtensa doesn't use addx/subx instructions

2020-12-14 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98285 jcmvbkbc at gcc dot gnu.org changed: What|Removed |Added Resolution|--- |FIXED Status|UN

[Bug target/98285] New: xtensa doesn't use addx/subx instructions

2020-12-14 Thread jcmvbkbc at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98285 Bug ID: 98285 Summary: xtensa doesn't use addx/subx instructions Product: gcc Version: 11.0 Status: UNCONFIRMED Severity: normal Priority: P3 Component: target