https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88783
--- Comment #3 from Richard Earnshaw ---
(In reply to Nick Clifton from comment #2)
> Hi tfx,
>
> Thank you vert much for reporting this bug. Unfortunately the binutils
> project does not maintain the libiberty library (which contains the
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88656
--- Comment #3 from Richard Earnshaw ---
(In reply to gerd from comment #2)
> Could it be that this is a duplicate of bug 88167?
>
> I compiled a gcc 7.4.0 patched with the fix for 88167 and now get this
> result:
>
> push{r4, lr}
>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88656
--- Comment #5 from Richard Earnshaw ---
(In reply to gerd from comment #4)
> (In reply to Richard Earnshaw from comment #3)
> > A regression is not a bug that applies in all previous releases. A
> > regression is where something worked in some
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90678
Richard Earnshaw changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=9663
--- Comment #11 from Richard Earnshaw ---
(In reply to Fredrik Hederstierna from comment #10)
> Created attachment 46457 [details]
> Testcase from CSiBE teem sources
>
> Testcase from CSiBE teem sources
> Tested with gcc-9.1.0 for ARM 32bit targe
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91034
--- Comment #10 from Richard Earnshaw ---
(In reply to Andrew Roberts from comment #9)
> For completeness I've also built gcc 8.3.0 with in tree gmp 6.1.2 using the
> newly built 9.1.0. And then in turn used this gcc 8.3.0 to rebuild gcc 9.1.0
>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86383
--- Comment #2 from Richard Earnshaw ---
I'm not sure how relevant the netbsd-elf port is these days. I believe they've
now moved onto an EABI based ABI. But no GCC port of that has been
contributed.
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86383
--- Comment #6 from Richard Earnshaw ---
(In reply to coypu from comment #5)
> (In reply to Richard Earnshaw from comment #2)
> > I'm not sure how relevant the netbsd-elf port is these days. I believe
> > they've now moved onto an EABI based ABI
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86520
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86520
--- Comment #7 from Richard Earnshaw ---
(In reply to Stephen Warren from comment #6)
> > Note that library code also assumes that misaligned accesses are safe:
> > that is the default for AArch64.
>
> I assume you're talking about gcc's default
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86538
Richard Earnshaw changed:
What|Removed |Added
Resolution|FIXED |WONTFIX
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86538
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
Component: middle-end
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
Target Milestone: ---
Use of the comma operator in source code can lead to misleading information in
the initial dump file when trying to understand the result of the initial
Priority: P3
Component: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
Target Milestone: ---
This is a meta bug to track the port status of all ports that have not yet been
updated to handle CVE-2017-5753 (Spectre variant 1).
If your
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86772
--- Comment #1 from Richard Earnshaw ---
Original patch series and discussion can be found here:
https://gcc.gnu.org/ml/gcc-patches/2018-07/msg01700.html
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: rth at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: alpha
The alpha port needs updating for this CVE. See the linked meta-bug for
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: amylaar at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: arc
The Arc port needs updating for this CVE. See the linked meta bug for details
of
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: chertykov at gmail dot com
Blocks: 86772
Target Milestone: ---
Target: avr
The Avr port needs updating for this CVE. See the linked meta bug for details
of
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: jiez at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: bfin
The bfin port needs updating for this CVE. See the linked meta bug for details
of
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: bernds at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: c6x
The C6X port needs updating for this CVE. See the linked meta bug for details
of
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: amylaar at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: epiphany
The Epiphany port needs updating for this CVE. See the linked meta bug
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: hp at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: cris
The Cris port needs updating for this CVE. See the linked meta bug for details
of
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: fr30
The fr30 port needs updating for this CVE. See the linked meta bug for details
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: aoliva at gcc dot gnu.org, nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: frv
The frv port needs updating for this CVE. See the
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: ft32
The ft32 port needs updating for this CVE. See the linked meta bug for details
of possible actions required.
Referenced
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: law at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: h8
The H8 port needs updating for this CVE. See the linked meta bug for details
of
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: dave.anglin at bell dot net, law at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: hppa
The hppa port needs updating for this CVE. See the
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: wilson at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: ia64
The ia64 port needs updating for this CVE. See the linked meta bug for details
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: iq2000
The iq2000 port needs updating for this CVE. See the linked meta bug for
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: lekernel at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: lm32
The lm32 port needs updating for this CVE. See the linked meta bug for
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: m32r
The m32r port needs updating for this CVE. See the linked meta bug for details
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: law at gcc dot gnu.org, schwab at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: m68k
The m68k port needs updating for this CVE. See the
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: mcore
The mcore port needs updating for this CVE. See the linked meta bug for
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: eager at eagercon dot com
Blocks: 86772
Target Milestone: ---
Target: microblaze
The microblaze port needs updating for this CVE. See the linked
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: mfortune at gmail dot com
Blocks: 86772
Target Milestone: ---
Target: mips
The MIPS port needs updating for this CVE. See the linked meta bug for details
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: hp at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: mmix
The mmix port needs updating for this CVE. See the linked meta bug for details
of
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: aoliva at gcc dot gnu.org, law at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: mn10300
The mn10300 port needs updating for this CVE. See
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: green at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: moxie
The Moxie port needs updating for this CVE. See the linked meta bug for
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: msp430
The msp430 port needs updating for this CVE. See the linked meta bug for
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: jasonwucj at gcc dot gnu.org, shiva0217 at gmail dot com
Blocks: 86772
Target Milestone: ---
Target: nds32
The nds32 port needs updating for this CVE
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: chunglin.tang at gmail dot com, sandra at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: nios2
The nios2 port needs updating for this CVE
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: vries at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: nvptx
The nvptx port needs updating for this CVE. See the linked meta bug for
Component: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: andrewjenner at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: powerpcspe
The powerpcspe port may need updating for this CVE. See
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: andrew at sifive dot com, kito.cheng at gmail dot com,
palmer at dabbelt dot com, wilson at gcc dot gnu.org
Blocks: 86772
Target Milestone
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: rx
The rx port needs updating for this CVE. See the linked meta bug for details
of
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: hpenner at de dot ibm.bom, krebbel at gcc dot gnu.org,
uweigand at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: s390
The
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: aoliva at gcc dot gnu.org, olegendo at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: sh
The sh port needs updating for this CVE. See the
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: davem at redhat dot com, ebotcazou at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: sparc
The sparc port needs updating for this CVE. See
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: dje at gcc dot gnu.org, tsmigiel at gcc dot gnu.org,
uweigand at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: spu
The spu
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: walt at tilera dot com
Blocks: 86772
Target Milestone: ---
Target: tilegx
The tilegx port needs updating for this CVE. See the linked meta bug for
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: walt at tilera dot com
Blocks: 86772
Target Milestone: ---
Target: tilepro
The tilepro port needs updating for this CVE. See the linked meta bug for
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: v850
The v850 port needs updating for this CVE. See the linked meta bug for details
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: m...@3am-software.com
Blocks: 86772
Target Milestone: ---
Target: vax
The Vax port needs updating for this CVE. See the linked meta bug for details
of
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: ebotcazou at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: visium
The visium port needs updating for this CVE. See the linked meta bug for
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: nickc at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: xstormy16
The xstormy16 port needs updating for this CVE. See the linked meta
: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
CC: sterling_augustine at tensilica dot com
Blocks: 86772
Target Milestone: ---
Target: xtensa
The xtensa port needs updating for this CVE. See the linked
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86800
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86772
Bug 86772 depends on bug 86800, which changed state.
Bug 86800 Summary: nvptx port needs updating for CVE-2017-5753
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86800
What|Removed |Added
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86802
--- Comment #2 from Richard Earnshaw ---
I think the best thing to do in that case is to leave the port unfixed until
such time as you know what mitigation is appropriate. That way the compiler
will not define __HAVE_SPECULATION_SAFE_VALUE and u
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86512
--- Comment #1 from Richard Earnshaw ---
Author: rearnsha
Date: Thu Aug 2 16:50:07 2018
New Revision: 263267
URL: https://gcc.gnu.org/viewcvs?rev=263267&root=gcc&view=rev
Log:
arm - correctly handle denormal results during softfp subtraction
2
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86512
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86512
Richard Earnshaw changed:
What|Removed |Added
Target Milestone|--- |9.0
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86807
--- Comment #4 from Richard Earnshaw ---
Author: rearnsha
Date: Tue Aug 7 14:33:09 2018
New Revision: 263358
URL: https://gcc.gnu.org/viewcvs?rev=263358&root=gcc&view=rev
Log:
Fix PR number for HPPA speculation patch: PR target/86807 -> PR tar
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86785
--- Comment #1 from Richard Earnshaw ---
Author: rearnsha
Date: Tue Aug 7 14:33:09 2018
New Revision: 263358
URL: https://gcc.gnu.org/viewcvs?rev=263358&root=gcc&view=rev
Log:
Fix PR number for HPPA speculation patch: PR target/86807 -> PR tar
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86772
Bug 86772 depends on bug 86785, which changed state.
Bug 86785 Summary: hppa port needs updating for CVE-2017-5753
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86785
What|Removed |Added
-
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86785
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86887
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |NEW
Last reconfirmed|
|unassigned at gcc dot gnu.org |rearnsha at gcc dot
gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86887
--- Comment #2 from Richard Earnshaw ---
Author: rearnsha
Date: Thu Aug 9 13:39:17 2018
New Revision: 263446
URL: https://gcc.gnu.org/viewcvs?rev=263446&root=gcc&view=rev
Log:
aarch64 - PR target/86887 Fix missing register constraints in carryi
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86887
Richard Earnshaw changed:
What|Removed |Added
Status|ASSIGNED|RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86799
--- Comment #1 from Richard Earnshaw ---
I nearly missed this patch for my accumulated back-porting list since it
didn't have the PR number in it.
Just adding it so that I can track things properly. The original commit
landed as r263301.
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86799
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86772
Bug 86772 depends on bug 86799, which changed state.
Bug 86799 Summary: nios2 port needs updating for CVE-2017-5753
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86799
What|Removed |Added
Severity: normal
Priority: P3
Component: target
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
Blocks: 86772
Target Milestone: ---
Target: arm
The speculation_barrier_insn pattern uses DSB and ISB
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86951
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |NEW
Last reconfirmed|
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86777
--- Comment #2 from Richard Earnshaw ---
I don't think you could do that through the API provided by this patch set; but
it's not really appropriate for this case.
I'm not familiar with the bfin architecture so cannot comment on what the best
ap
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87049
--- Comment #2 from Richard Earnshaw ---
But won't that give problems for C++ because now you'll need to cast the
pointers?
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86951
--- Comment #1 from Richard Earnshaw ---
Author: rearnsha
Date: Thu Aug 23 09:47:34 2018
New Revision: 263806
URL: https://gcc.gnu.org/viewcvs?rev=263806&root=gcc&view=rev
Log:
PR target/86951 arm - Handle speculation barriers on pre-armv7 CPUs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86772
Bug 86772 depends on bug 86951, which changed state.
Bug 86951 Summary: arm speculation barrier incompatible with ARMv6 or earlier
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86951
What|Removed |Added
-
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86951
Richard Earnshaw changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82853
--- Comment #27 from Richard Earnshaw ---
(In reply to Jakub Jelinek from comment #26)
> A test generator for x % c1 == c2 expansion for unsigned, int, unsigned long
> long, long long, unsigned int128 and int128 types (assuming ilp32 or lp64)
>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=66203
--- Comment #4 from Richard Earnshaw ---
The Arm builds that do not need anything from libgloss (and thus do not need a
specs file) while linking come from a configuration that hard codes the
underlying runtime monitor (usually the arm semihostin
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87302
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #5 from Richard Earnshaw ---
It's not clear what behaviour you think is 'proper' for a packed struct with a
volatile member. Since packed is a GNU extension, there's nothing in the C (or
C++) standards that you can call upon to reach
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #7 from Richard Earnshaw ---
(In reply to Murat Ursavaş from comment #6)
> Hi Jonathan,
>
> I just wanted a dramatic entrance :) (There was a discussion about GCC
> bugzilla on reddit recently) Of course it hasn't took that long. But
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #14 from Richard Earnshaw ---
(In reply to Murat Ursavaş from comment #13)
> Richard,
>
> Also as far as I remember GNU manual was indeed saying something on this
> case. It was saying that "if the struct is not packed, it would acce
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #15 from Richard Earnshaw ---
(In reply to Murat Ursavaş from comment #12)
> Richard,
>
> Ok I remembered things with reading the old posts on launchpad. The compiler
> was generating normal code if I use the struct variable directly
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #17 from Richard Earnshaw ---
(In reply to Murat Ursavaş from comment #16)
> OK I understand conservative action and not wait for word by word access.
> But the resulting value is not 0x401 on the test case, but it should be.
Is not
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #18 from Richard Earnshaw ---
BTW, are you really trying to say that your hardware has a register that isn't
naturally aligned? That's really weird if so. If not, there are much easier
ways to handle this sort of stuff.
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #21 from Richard Earnshaw ---
(In reply to Murat Ursavaş from comment #20)
> By the way, the hardware peripheral registers are aligned to 32bits.
So why don't you define your struct as
struct TestStructType
{
volatile unsigned o
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #22 from Richard Earnshaw ---
Or
#pragma pack(push, 1)
struct TestStructType
{
volatile unsigned one;
unsigned char two;
unsigned short three;
} __attribute__((aligned(32)));
#pragma pack(pop)
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
--- Comment #23 from Richard Earnshaw ---
(In reply to Richard Earnshaw from comment #22)
> Or
> #pragma pack(push, 1)
>
> struct TestStructType
> {
> volatile unsigned one;
> unsigned char two;
> unsigned short three;
> } __attribute__(
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87400
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87400
--- Comment #3 from Richard Earnshaw ---
(In reply to Alex Kalmuk from comment #2)
> I write about mtpcs-frame for thumb, not mapcs-frame, I know the last one
> for arm instruction set.
The tpcs is also obsolete (the tpcs was replaced by the atp
Assignee: unassigned at gcc dot gnu.org
Reporter: rearnsha at gcc dot gnu.org
Target Milestone: ---
If the GCC website is viewed on a small screen device, such as a mobile phone,
then the entire page is scaled as-is until it will fit the width of the device.
This makes it
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87373
Richard Earnshaw changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
Resolution|---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82989
Richard Earnshaw changed:
What|Removed |Added
Target Milestone|7.4 |6.5
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81647
Richard Earnshaw changed:
What|Removed |Added
Target Milestone|--- |7.4
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87565
--- Comment #1 from Richard Earnshaw ---
Not a good idea. Modern CPUs often don't predict such operations correctly
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86383
--- Comment #15 from Richard Earnshaw ---
(In reply to coypu from comment #14)
> Also, after these two patches, my own build of arm--netbsdelf is failing
> from this:
> configure: error: Pthreads are required to build libgomp
>
> Looking at conf
501 - 600 of 1354 matches
Mail list logo