[Bug target/95095] Feature request: support -fno-unique-section-names

2021-01-25 Thread i at maskray dot me via Gcc-bugs
nt 4. -ffunction-sections -fno-unique-section-names => .text.% .text.startup.% .text.hot.% .text.cold.% ... ? I agree that it is superior. If GCC wants to support this scheme, that looks fine to me. It is likely that I can migrate Clang to this scheme as well. I think .text% .text.startup% .text.hot% .text.cold% ... is slightly worse.

[Bug target/95095] Feature request: support -fno-unique-section-names

2021-01-25 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=95095 --- Comment #9 from Fangrui Song --- (In reply to Segher Boessenkool from comment #8) > I say nothing like that. I say that > .text.hot. > is nasty (is easily mistaken for .text.hot). > > I also say that and that named-per-function sections a

[Bug tree-optimization/98673] pass fre4 inhibit pass dom3 to create much more optimized code

2021-02-03 Thread rjiejie at me dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98673 --- Comment #5 from jojo --- Sorry for late :) Please test with following c case: long YTableLookup (long xValue, long xEntries, const long *xAxis, const long *yTable ) { int i ; long xDelta ; long outValue ; for (i=0; i<(

[Bug c/99282] New: Emit .cfi_sections without arguments for -fno-asynchronous-unwind-tables

2021-02-25 Thread i at maskray dot me via Gcc-bugs
Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- .cfi_* in inline asm is rare, but can be useful if the user wants precise unwind information. % cat a.c int main() { asm("pu

[Bug inline-asm/99282] Emit .cfi_sections without arguments for -fno-asynchronous-unwind-tables

2021-02-26 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99282 --- Comment #2 from Fangrui Song --- (In reply to Jakub Jelinek from comment #1) > There is the __GCC_HAVE_DWARF2_CFI_ASM predefined macro that tells if .cfi* > directives are used or not. And, inline asm that wishes to be usable in > both can u

[Bug demangler/100437] New: libiberty: Support more characters for function clones

2021-05-05 Thread i at maskray dot me via Gcc-bugs
Component: demangler Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- In the demangler, the ('.' (alpha|'_')+) ('.' digit+)* scheme as implemented for PR40831 allows a decimal but not a hexadecimal. It'

[Bug c/100483] New: Extend -fno-semantic-interposition to global variables

2021-05-07 Thread i at maskray dot me via Gcc-bugs
Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- % cat a.c int var; int foo() { return var; } (I implemented this for clang 11 x86) % clang -fpic -fno-semantic-interposition -O2 -S a.c % cat a.s ... foo

[Bug c/100593] New: [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-05-13 Thread i at maskray dot me via Gcc-bugs
Severity: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Most ELF targets use an absolute relocation (e.g. R_X86_64_32) to take the address of a default visibility non-definition

[Bug c/100483] Extend -fno-semantic-interposition to global variables

2021-05-13 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100483 --- Comment #1 from Fangrui Song --- Another request is a new option: -fno-semantic-interposition-function. With this option, we only assume functions cannot be interposed. -fno-semantic-interposition assumes both functions and variables cannot

[Bug c/100618] New: Add a -fno-semantic-interposition variant which allows variable interposition

2021-05-15 Thread i at maskray dot me via Gcc-bugs
: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Extracted from https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100483 The documentation says -fno-semantic-interposition applies to

[Bug c/100618] Add a -fno-semantic-interposition variant which allows variable interposition

2021-05-15 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100618 --- Comment #1 from Fangrui Song --- Perhaps -fsemantic-interposition=function,variable (default -fpic/-fPIC) -fsemantic-interposition=variable (compatible with copy relocations but enable function optimizations) -fsemantic-interposition= (a

[Bug c/100483] Extend -fno-semantic-interposition to global variables

2021-05-16 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100483 Fangrui Song changed: What|Removed |Added Resolution|--- |INVALID Status|UNCONFIRMED

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-05-16 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #2 from Fangrui Song --- (In reply to Alexander Monakov from comment #1) > It is not necessary to change -fno-pic code generation to gain most of the > -Bsymbolic benefit It is necessary, otherwise the function address taken from th

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-05-17 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #4 from Fangrui Song --- (In reply to Alexander Monakov from comment #3) > I understand what you're saying, but it seems we're talking past each other. > > I agree that if a library is linked with any -Bsymbolic* flag, the main > ex

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-05-17 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #6 from Fangrui Song --- (In reply to Alexander Monakov from comment #5) > Hm, I still don't think I'm misunderstanding what you're saying. I'm > familiar with the ELF standard (and FWIW I have read your blog posts on > related matte

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-05-18 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #8 from Fangrui Song --- Seems that -fno-plt -fno-pic does have the required properties. A side effect is that all external calls use the (x86-64) call *f@GOTPCREL(%rip) (x86-32) call *f@GOT form. The instruction is one byte long

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-05-26 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #9 from Fangrui Song --- I have a patch to implement this Clang. It'd be good to have a name even if GCC wants to postpone the implementation for now. How about -fdirect-access-external-function & -fno-direct-access-external-functio

[Bug driver/100830] New: Multilib directory picking logic handles default arguments oddly

2021-05-29 Thread mhjacobson at me dot com via Gcc-bugs
Priority: P3 Component: driver Assignee: unassigned at gcc dot gnu.org Reporter: mhjacobson at me dot com Target Milestone: --- `set_multilib_dir()` is responsible for selecting a multilib directory given (a) `multilib_select` and (b) the state of the switches

[Bug driver/100830] Multilib directory picking logic handles default arguments oddly

2021-05-30 Thread mhjacobson at me dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100830 --- Comment #1 from Matt Jacobson --- Another place that exhibits this weirdness is `print_multilib_info()` (which is used at build time for the target libraries). It also calls `default_arg()` and omits lines that match the defaults.

[Bug c/100618] Add a -fno-semantic-interposition variant which allows variable interposition

2021-06-04 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100618 Fangrui Song changed: What|Removed |Added Resolution|--- |FIXED Status|UNCONFIRMED

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-06-04 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #11 from Fangrui Song --- (In reply to Alexander Monakov from comment #10) > Is there something wrong or undesirable with making this under -fno-plt (or > the noplt attribute as in your example)? > > (after all, it is a kind of PLT-

[Bug middle-end/100593] [ELF] -fno-pic: Use GOT to take address of an external default visibility function

2021-06-06 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100593 --- Comment #13 from Fangrui Song --- (In reply to H.J. Lu from comment #12) > We should handle it in the whole Linux software stack: > > https://gitlab.com/x86-psABIs/x86-64-ABI/-/issues/8 > > not just in compiler. It is great that you have

[Bug driver/100937] New: configure: Add --enable-default-semantic-interposition

2021-06-06 Thread i at maskray dot me via Gcc-bugs
Component: driver Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Add a configure option --enable-default-semantic-interposition to customize -f(no-)semantic-interposition default. The suppression of interprocedural optimizations and

[Bug driver/100937] configure: Add --enable-default-semantic-interposition

2021-06-06 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100937 Fangrui Song changed: What|Removed |Added Resolution|WONTFIX |--- Status|RESOLVED

[Bug driver/100937] configure: Add --enable-default-semantic-interposition

2021-06-09 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100937 --- Comment #6 from Fangrui Song --- Then can you add a -fvisibility=protected variant which only applies to non-weak defined functions? Two issues need to be fixed: (1): https://sourceware.org/bugzilla/show_bug.cgi?id=27973 __attribute__((vi

[Bug gcov-profile/80223] RFE: Exclude functions from profile instrumentation

2021-06-14 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80223 Fangrui Song changed: What|Removed |Added CC||i at maskray dot me --- Comment #7 from

[Bug gcov-profile/80223] RFE: Exclude functions from profile instrumentation

2021-06-15 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80223 --- Comment #8 from Fangrui Song --- I am thinking of __attribute__((no_profile)). In Clang, -fprofile-generate(-fcs-profile-generate)/-fprofile-instr-generate/-fprofile-arcs are all different. It will make sense to have a attribute disabling al

[Bug gcov-profile/80223] RFE: Exclude functions from profile instrumentation

2021-06-21 Thread i at maskray dot me via Gcc-bugs
It's not clear to me that no_profile_instrument_function should prevent inlining. I'll argue that attributes should be orthogonal. https://lists.llvm.org/pipermail/llvm-dev/2021-April/150062.html https://reviews.llvm.org/D101011#271 If the user wants to suppress inli

[Bug gcov-profile/80223] RFE: Exclude functions from profile instrumentation

2021-06-23 Thread i at maskray dot me via Gcc-bugs
fully but strongly disagree. It's surprising to developers when > they ask for no stack protector, or no profiling instrumentation, then get > one anyways. For long call chains, it's hard for developers to diagnose on > their own which function they called that missed such

[Bug gcov-profile/80223] RFE: Exclude functions from profile instrumentation

2021-06-23 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80223 --- Comment #20 from Fangrui Song --- (In reply to Marco Elver from comment #19) I am ok with "inlining suppression" as an implementation strategy and I agree that it should be useful. What I objected strongly is "promised inlining suppression".

[Bug gcov-profile/80223] RFE: Exclude functions from profile instrumentation

2021-06-23 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80223 --- Comment #21 from Fangrui Song --- (In reply to Fangrui Song from comment #20) > For example, if an inlining pass happens after instrumentation, then the > function attribute doesn't necessarily need to suppress inlining. After > instrumentati

[Bug middle-end/108300] `abort()` macro cause bootstrap failure on *-w64-mingw32

2023-01-07 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108300 --- Comment #9 from Arsen Arsenović --- (In reply to LIU Hao from comment #8) > The commit above just lets GCC bootstrap on Windows. The cause of this issue > is still there. > > Maybe it's possible to replace all direct calls to `abort()` in g

[Bug middle-end/108300] `abort()` macro cause bootstrap failure on *-w64-mingw32

2023-01-07 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108300 --- Comment #11 from Arsen Arsenović --- (In reply to LIU Hao from comment #10) > I think Jonathan's proposal makes it unnecessarily complex. Renaming `abort` > to `gcc_fancy_abort`, as well as all invocations accordingly, should be much > simpl

[Bug other/108276] libiberty unlink_if_ordinary does not handle Windows nul device correctly

2023-01-16 Thread himalr at proton dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108276 --- Comment #5 from Himal --- (In reply to niXman from comment #4) > (In reply to niXman from comment #2) > > > I don't think the patch is correct because for WIN32 platform `unlink()` > > will never be called even for non-"nul" files. > > mor

[Bug other/108276] libiberty unlink_if_ordinary does not handle Windows nul device correctly

2023-01-17 Thread himalr at proton dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108276 --- Comment #7 from Himal --- (In reply to niXman from comment #6) > I think you don't understand me. > > with your patch after preprocessing the `unlink_if_ordinary()` will look > like: > ``` > int > unlink_if_

[Bug c++/108576] New: False positive for -Werror=return-type

2023-01-27 Thread sergey at polovko dot me via Gcc-bugs
++ Assignee: unassigned at gcc dot gnu.org Reporter: sergey at polovko dot me Target Milestone: --- Starting from GCC 12.1 I see changed compiler behaviour for following snippet of code: struct S { ~S() {} }; int func() { if (auto s = S{}; false) { } else

[Bug c++/108576] False positive for -Werror=return-type

2023-01-27 Thread sergey at polovko dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108576 --- Comment #1 from Sergey Polovko --- Sorry, this line > * https://godbolt.org/z/8Gq4fjacr (12.3) should mention GCC 11.3

[Bug c++/108585] New: Using std::byte instead of char results in different (worse?) code in array zero initialization

2023-01-28 Thread technicallyanonymous at proton dot me via Gcc-bugs
: UNCONFIRMED Severity: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: technicallyanonymous at proton dot me Target Milestone: --- This code, compiled with GCC 12.2 (-O2 -std=c++20) #include int foo(std::byte *arr

[Bug c++/108586] New: Using std::array instead of a plain array results in different (worse?) code in array zero initialization

2023-01-28 Thread technicallyanonymous at proton dot me via Gcc-bugs
: UNCONFIRMED Severity: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: technicallyanonymous at proton dot me Target Milestone: --- This code, compiled with GCC 12.2 (-O2 -std=c++20): #include int foo(char *arr

[Bug target/108622] New: x86 -fno-pic: use DW_EH_PE_indirect|DW_EH_PE_pcrel for personality/ttype encoding

2023-01-31 Thread i at maskray dot me via Gcc-bugs
Severity: normal Priority: P3 Component: target Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- In .eh_frame and .gcc_except_table, the aarch64 and riscv ports use DW_EH_PE_indirect|DW_EH_PE_pcrel for both -fno-pic

[Bug target/108622] x86 -fno-pic: use DW_EH_PE_indirect|DW_EH_PE_pcrel for personality/ttype encoding

2023-01-31 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108622 --- Comment #1 from Fangrui Song --- https://gcc.gnu.org/pipermail/gcc-patches/2023-February/611081.html [PATCH] x86: Use DW_EH_PE_indirect|DW_EH_PE_pcrel encodings for -fno-pic code

[Bug plugins/108634] [13 regression] 'undefined symbol: tree_code_type' when building kernel GCC plugins since r13-5431-gb0241ce6e37031

2023-02-01 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108634 --- Comment #1 from Arsen Arsenović --- The kernel's using wrong C(XX)FLAGS to compile the plugin. IMO, the best solution would be to dump $(ALL_COMPILERFLAGS) $(ALL_CPPFLAGS) into a makefile that gets installed, so that plugins can use that

[Bug c++/108761] New: Add option to produce a unique section for non-COMDAT __attribute__((section("foo"))) object

2023-02-10 Thread i at maskray dot me via Gcc-bugs
NCONFIRMED Severity: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- % cat a.cc __attribute__((section("foo"))) void f() {} __attribute__((section("foo

[Bug c++/108761] Add option to produce a unique section for non-COMDAT __attribute__((section("foo"))) object

2023-02-12 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108761 --- Comment #3 from Fangrui Song --- New syntax setting the flags will be useful. Also, currently there is no way to customize the section type.

[Bug c/108978] New: Add __builtin_FILE_NAME() which behaves like the __FILE_NAME__ macro

2023-02-28 Thread i at maskray dot me via Gcc-bugs
: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- PR c/42579 added __FILE_NAME__. On the Clang side someone is proposing __builtin_FILE_NAME (https://reviews.llvm.org/D144878) a la

[Bug c++/105397] New: Cannot export module initializer symbols with `-fvisibility=hidden`

2022-04-26 Thread bugzilla.gcc at me dot benboeckel.net via Gcc-bugs
Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: bugzilla.gcc at me dot benboeckel.net Target Milestone: --- There is no way to decorate an `export module X;` with an `__attribute__((visibility("default")))` such that

[Bug target/99888] Add powerpc ELFv2 support for -fpatchable-function-entry*

2022-08-11 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99888 Fangrui Song changed: What|Removed |Added CC||i at maskray dot me --- Comment #5 from

[Bug c++/106713] New: Coroutine regression in GCC 11.3.0: if (co_await ...) crashes with a jump to ud2

2022-08-22 Thread arsen at aarsen dot me via Gcc-bugs
Severity: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: arsen at aarsen dot me Target Milestone: --- I can reproduce the jump to ud2 on 11.3.0, GCC 12.2.0, as well as g:b6316324fceaef431799a8b386de5cc9881d6898 but not

[Bug c++/106713] Coroutine regression in GCC 11.3.0: if (co_await ...) crashes with a jump to ud2

2022-08-22 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106713 --- Comment #1 from Arsen Arsenović --- Created attachment 53490 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=53490&action=edit Preprocessed test (gz-compressed)

[Bug c++/106713] Coroutine regression in GCC 11.3.0: if (co_await ...) crashes with a jump to ud2

2022-08-22 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106713 --- Comment #2 from Arsen Arsenović --- Created attachment 53491 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=53491&action=edit Reduced test case Alright, managed to get a reduced test case out of C-Vise. Though, this doesn't build on c

[Bug driver/106897] New: driver: support -gz=zstd

2022-09-09 Thread i at maskray dot me via Gcc-bugs
Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Translate -gz=std to --compress-debug-sections=zstd for as and ld. This requires that binutils supports zstd, feature request: https://sourceware.org/bugzilla/show_bug.cgi?id=29397

[Bug driver/106897] driver: support -gz=zstd

2022-09-10 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106897 --- Comment #4 from Fangrui Song --- Yes, the change will be straightforward, basically the files touched by the pending https://gcc.gnu.org/pipermail/gcc-patches/2022-July/597586.html ("[PATCH] Remove legacy -gz=zlib-gnu"). I sent it because

[Bug libstdc++/103626] _GLIBCXX_HOSTED should respect -ffreestanding

2022-09-17 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103626 --- Comment #2 from Arsen Arsenović --- I started work on marking headers, and I already marked 162 headers (all of include/{std,bits,backward}, where appropriate) as part of my work on P1642. This set also lines up with the set of all installe

[Bug libstdc++/103626] _GLIBCXX_HOSTED should respect -ffreestanding

2022-09-17 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103626 --- Comment #4 from Arsen Arsenović --- (In reply to Jonathan Wakely from comment #3) > I don't think we need to add the #error to every header. For a start, users > never include the bits/* headers directly, and if they do, it's their > problem

[Bug libstdc++/103626] _GLIBCXX_HOSTED should respect -ffreestanding

2022-09-18 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103626 --- Comment #6 from Arsen Arsenović --- Agreed. Now that I think about it, it'd be just as easy to spot errors if something in freestanding is relying on a hosted feature by just trying to #include those headers on a freestanding install, so mor

[Bug c++/107104] New: semantics of __builtin_constant_p within static_assert and return value

2022-09-30 Thread me at inclyc dot cn via Gcc-bugs
: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: me at inclyc dot cn Target Milestone: --- https://godbolt.org/z/oz4e7bobT https://godbolt.org/z/hE6x9G49q illustrate different occasions about this issue. Consider passing

[Bug libstdc++/107135] array::at() method should not be in for freestanding C++

2022-10-03 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107135 Arsen Arsenović changed: What|Removed |Added CC||arsen at aarsen dot me --- Comment

[Bug libstdc++/104605] _GLIBCXX_USE_C99_STDINT_TR1 macro is not defined for canadian cross freestanding C++ toolchain

2022-10-03 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104605 Arsen Arsenović changed: What|Removed |Added CC||arsen at aarsen dot me --- Comment

[Bug c++/107147] [13 Regression] ICE in register_local_var_uses, at cp/coroutines.cc:3923

2022-10-08 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107147 Arsen Arsenović changed: What|Removed |Added CC||arsen at aarsen dot me --- Comment

[Bug c++/107147] [13 Regression] ICE in register_local_var_uses, at cp/coroutines.cc:3923

2022-10-08 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107147 --- Comment #4 from Arsen Arsenović --- Ah, my bad, I had checking off in my 12.2.0 build.

[Bug c++/106713] [11/12 Regression] Coroutine regression in GCC 11.3.0: if (co_await ...) crashes with a jump to ud2 since r12-3529-g70ee703c479081ac

2022-10-19 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106713 --- Comment #7 from Arsen Arsenović --- Yes, this and https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106188 both.

[Bug driver/93645] Support Clang 12 --ld-path=

2021-12-22 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=93645 --- Comment #13 from Fangrui Song --- (In reply to Martin Liška from comment #12) > (In reply to Fangrui Song from comment #11) > > (In reply to Martin Liška from comment #10) > > > I replied here: > > > https://gcc.gnu.org/pipermail/gcc-patches/

[Bug c++/103824] New: Enum class shadowed by class member in using-enum-declaration

2021-12-24 Thread luizfvalle at pm dot me via Gcc-bugs
Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: luizfvalle at pm dot me Target Milestone: --- Created attachment 52056 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=52056&action=edit Input file (test.cpp) A global enu

[Bug driver/93645] Support Clang 12 --ld-path=

2021-12-28 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=93645 --- Comment #15 from Fangrui Song --- -- is definitely rare, but not non-existent. In GCC, there is {-,--}specs. In Clang, there are --cuda-path, --ptxas-path, --hip-path, --classpath, etc. (In reply to Martin Liška from comment #14) > > > > I t

[Bug c++/104020] New: [coroutines] ICE in co_await function call with initializer_list arguments

2022-01-13 Thread me at xecycle dot info via Gcc-bugs
: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: me at xecycle dot info Target Milestone: --- Running example at https://godbolt.org/z/cEjTWPvYf, code with clang part removed is: #include using std::coroutine_handle

[Bug c++/104488] New: Wrong access specification in method pointer assignment

2022-02-10 Thread me at elchris dot org via Gcc-bugs
: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: me at elchris dot org Target Milestone: --- Created attachment 52405 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=52405&action=edit someFunc is made public b

[Bug target/100896] --enable-initfini-array should be enabled for cross compiler to Linux

2021-11-05 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100896 Fangrui Song changed: What|Removed |Added CC||i at maskray dot me --- Comment #4 from

[Bug target/100896] --enable-initfini-array should be enabled for cross compiler to Linux

2021-11-05 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100896 --- Comment #5 from Fangrui Song --- Ah, ok, my /tmp/glibc-many/src/gcc is at releases/gcc-11 while the fix is for 12.0? Anyway, you may want to clean up gcc/acinclude.m4

[Bug rtl-optimization/103296] New: Select satisfied register for deleting noop move instruction.

2021-11-16 Thread rjiejie at me dot com via Gcc-bugs
Priority: P3 Component: rtl-optimization Assignee: unassigned at gcc dot gnu.org Reporter: rjiejie at me dot com Target Milestone: --- I found this case in my riscv vector test case, and following is snippets of problematic RTL: before register renamer

[Bug rtl-optimization/103296] Select satisfied register for deleting noop move instruction.

2021-11-16 Thread rjiejie at me dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103296 --- Comment #1 from jojo --- My patch here: https://gcc.gnu.org/pipermail/gcc-patches/2021-November/584589.html

[Bug driver/100937] configure: Add --enable-default-semantic-interposition

2021-11-22 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100937 --- Comment #11 from Fangrui Song --- To enable interposition on Mach-O, one needs a non-default configuration like: ld -interposable, DYLD_FORCE_FLAT_NAMESPACE or __attribute__((section("__DATA,__interpose"))). On PE/COFF, such interposition ju

[Bug driver/103398] New: configure: Enable --enable-default-pie by default for Linux

2021-11-23 Thread i at maskray dot me via Gcc-bugs
Priority: P3 Component: driver Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Many Linux distros configure GCC with --enable-default-pie (at least Arch/Debian/Fedora/Gentoo/Ubuntu). I think it makes sense to default to

[Bug driver/103398] configure: Enable --enable-default-pie by default for Linux

2021-11-23 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103398 --- Comment #2 from Fangrui Song --- I want to switch the default because: * It seems to me that every Linux distro uses --enable-default-pie GCC. I use "many", but it is likely "most" at this point (2021). * When a user

[Bug driver/93645] Support Clang 12 --ld-path=

2021-12-22 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=93645 --- Comment #11 from Fangrui Song --- (In reply to Martin Liška from comment #10) > I replied here: > https://gcc.gnu.org/pipermail/gcc-patches/2021-June/573823.html There are people wanting to use mold https://www.reddit.com/r/rust/comments/rhc

[Bug rtl-optimization/102115] New: symbol address eliminated by the xtensa size optimization

2021-08-28 Thread me at jhdtl dot ru via Gcc-bugs
/issues /19#issuecomment-903203750 Status: UNCONFIRMED Severity: normal Priority: P3 Component: rtl-optimization Assignee: unassigned at gcc dot gnu.org Reporter: me at jhdtl dot ru Target Milestone

[Bug c++/102168] New: -Wnon-virtual-dtor shouldn't fire for protected dtor in a class with a friend declaration

2021-09-01 Thread i at maskray dot me via Gcc-bugs
IRMED Severity: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- class base; class b { public: void del(base *x); }; class base { friend b; public: virtual void a

[Bug target/61359] GCC Bootstrap comparison failures on hppa2.0w-hp-hpux11.23

2021-09-01 Thread me at larbob dot org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61359 Larkin Nickle changed: What|Removed |Added CC||me at larbob dot org --- Comment #5

[Bug target/61359] GCC Bootstrap comparison failures on hppa2.0w-hp-hpux11.23

2021-09-01 Thread me at larbob dot org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61359 --- Comment #6 from Larkin Nickle --- (In reply to Larkin Nickle from comment #5) > I am also running into this on HP-UX 11.23 on PA-RISC. I've started with > HP's distribution of GCC 4.7.1 and have attempted to build 4.7.4, 4.8.5, and > 4.9.4 an

[Bug target/61359] GCC Bootstrap comparison failures on hppa2.0w-hp-hpux11.23

2021-09-02 Thread me at larbob dot org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61359 --- Comment #7 from Larkin Nickle --- For anyone finding this in the future, I'm guessing 32-bit builds of GCC on HP-UX+PA-RISC were just broken for a while. Building 5.5.0 with libquadmath enabled worked fine.

[Bug c/102210] New: Invalid assembly generated while building OpenSSH on hppa64-hp-hpux11.23

2021-09-05 Thread me at larbob dot org via Gcc-bugs
: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: me at larbob dot org Target Milestone: --- Created attachment 51410 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=51410&action=edit bsd-closefrom.i from -save-temp

[Bug bootstrap/102277] New: hppa2.0w-hp-hpux11.23 bootstrap comparison failure

2021-09-10 Thread me at larbob dot org via Gcc-bugs
Component: bootstrap Assignee: unassigned at gcc dot gnu.org Reporter: me at larbob dot org Target Milestone: --- Building gcc-12-20210905 seems to result in a bootstrap comparison failure between stages 2 and 3 on hppa2.0w-hp-hpux11.*. Comparing stages 2 and 3 warning: hppa2.0w-hp

[Bug c/102502] New: C11: _Static_assert disallows const int operand in -O0 while allows it in higher -O

2021-09-27 Thread i at maskray dot me via Gcc-bugs
Severity: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Under some circumstances, const size_t allocation_size = 32768; _Static_assert (allocation_size >= sizeof (str

[Bug c/102502] C11: _Static_assert disallows const int operand in -O0 while allows it in higher -O

2021-09-27 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102502 --- Comment #3 from Fangrui Song --- OK, Andrew asked me to file it :) I just wanted to fix glibc and run away from the GCC inconsistency. I know that https://www.iso-9899.info/n1570.html#6.6 p10 says "An implementation may accept other

[Bug objc/102537] New: Objective-C: can't use >= USE_FIXUP_BEFORE paths for non-Darwin

2021-09-29 Thread mhjacobson at me dot com via Gcc-bugs
: normal Priority: P3 Component: objc Assignee: unassigned at gcc dot gnu.org Reporter: mhjacobson at me dot com Target Milestone: --- I am working on a NeXTv2-ABI-compatible Objective-C runtime for a non-Darwin platform (AVR micros). I'd like my Object

[Bug libgcc/99759] morestack.S should support .init_array.0 besides .ctors.65535

2021-10-08 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99759 Fangrui Song changed: What|Removed |Added Resolution|--- |FIXED Status|NEW

[Bug objc/102537] Objective-C: can't use >= USE_FIXUP_BEFORE paths on non-Darwin

2021-10-18 Thread mhjacobson at me dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102537 --- Comment #2 from Matt Jacobson --- I certainly haven't spent as much time thinking about this as you, but I think my personal preference would be to add new values to the `flag_objc_abi` argument. It's already the case that "objc-next-runtim

[Bug c++/107543] New: c-family/c-cppbuiltin.cc: Undefine __GNUC_STDC_INLINE__ in C++ mode?

2022-11-06 Thread i at maskray dot me via Gcc-bugs
: normal Priority: P3 Component: c++ Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- -fgnu89-inline / C99 / C++ inline modes are all different. For C++, perhaps neither __GNUC_STDC_INLINE__ nor __GNUC_GNUC_INLINE__

[Bug c/107890] New: UB on integer overflow impacts code flow

2022-11-27 Thread gcc at pkh dot me via Gcc-bugs
Assignee: unassigned at gcc dot gnu.org Reporter: gcc at pkh dot me Target Milestone: --- Following is a code that is sensible to a signed integer overflow. I was under the impression that this kind of undefined behavior essentially meant that the value of that integer could

[Bug c/107931] New: [12 Regression] -Od causes always_inline to fail

2022-11-29 Thread me at xenu dot pl via Gcc-bugs
Component: c Assignee: unassigned at gcc dot gnu.org Reporter: me at xenu dot pl Target Milestone: --- The error below occurs only with -Od. The code is accepted if one of -O0, -O1, -O2, -O3 or -Os is used instead. This happens with GCC 12.1 and 12.2, it doesn't with 11.3.

[Bug c/107931] [12 Regression] -Og causes always_inline to fail

2022-11-29 Thread me at xenu dot pl via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107931 --- Comment #1 from Tomasz Konojacki --- (In reply to Tomasz Konojacki from comment #0) > The error below occurs only with -Od. Sorry, -Og. PS. It seems that moving the definition of fun4 to the first line makes the error disappear.

[Bug ipa/107931] [12/13 Regression] -Og causes always_inline to fail since r12-6677-gc952126870c92cf2

2022-12-01 Thread me at xenu dot pl via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107931 --- Comment #5 from Tomasz Konojacki --- To sum this thread up, there are undocumented rules that can cause a semantically identical program to be rejected by the compiler under certain optimisation levels (with an uninformative error message) a

[Bug c/107963] New: Support __attribute__((disable_sanitizer_instrumentation))

2022-12-03 Thread i at maskray dot me via Gcc-bugs
Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- Clang introduced the attribute in https://reviews.llvm.org/D108029 (2021-08). It disables instrumentations for all kinds of sanitizers. For non

[Bug sanitizer/78204] ‘no_sanitize’ attribute directive ignored [-Wattributes]

2022-12-04 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78204 Fangrui Song changed: What|Removed |Added CC||i at maskray dot me --- Comment #8 from

[Bug sanitizer/107963] Support __attribute__((disable_sanitizer_instrumentation))

2022-12-04 Thread i at maskray dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107963 --- Comment #3 from Fangrui Song --- GCC doesn't implement -fsanitize=memory. In the absence of it, __attribute__((disable_sanitizer_instrumentation)) is like __attribute__((no_sanitize("all"))). When -fsanitize=memory is implemented, the two a

[Bug c++/105397] C++ modules vs -fvisibility option

2022-12-08 Thread bugzilla.gcc at me dot benboeckel.net via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105397 --- Comment #2 from Ben Boeckel --- > Perhaps the best option is to default the visibility of the implicit > functions to the widest visibility of any function or object in module > purview exposed by the TU. What to do about `extern "C"` API

[Bug modula2/107607] tools-src/calcpath uses unportable realpath(1)

2022-12-15 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107607 Arsen Arsenović changed: What|Removed |Added CC||arsen at aarsen dot me --- Comment

[Bug ipa/108250] [12/13 regression] llvm-tblgen miscompiled on powerpc-unknown-linux-gnu since r12-5383-g22c242342e38eb

2022-12-29 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108250 --- Comment #7 from Arsen Arsenović --- Created attachment 54165 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=54165&action=edit hang-testing script With the attached script, I singled out utils/TableGen/CMakeFiles/llvm-tblgen.dir/CodeGe

[Bug ipa/108250] [12/13 regression] llvm-tblgen miscompiled on powerpc-unknown-linux-gnu since r12-5383-g22c242342e38eb

2022-12-29 Thread arsen at aarsen dot me via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108250 --- Comment #8 from Arsen Arsenović --- Created attachment 54166 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=54166&action=edit xz'd preprocessed CodeGenDagPatterns.cpp Cmdline: [220/231] /usr/bin/g++-12 -DGTEST_HAS_RTTI=0 -D_FILE_OFFSE

[Bug other/108276] New: libiberty unlink_if_ordinary does not handle Windows nul device correctly

2023-01-03 Thread himalr at proton dot me via Gcc-bugs
: normal Priority: P3 Component: other Assignee: unassigned at gcc dot gnu.org Reporter: himalr at proton dot me Target Milestone: --- Created attachment 54180 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=54180&action=edit Handle Windows nul

[Bug c/105576] New: x86: Support a machine constraint to get raw symbol name

2022-05-11 Thread i at maskray dot me via Gcc-bugs
Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: i at maskray dot me Target Milestone: --- An raw symbolic operand is useful in inline asm (e.g. in C++ to get the mangled name, or in C to let the compiler do some asm checking). In aarch64 and

<    1   2   3   4   5   6   7   8   >