Hi.
These days I began to get spam in my mail box.
I found, that my mail address ([EMAIL PROTECTED]) is published on :
http://gcc.gnu.org/ml/gcc/2006-08/msg00227.html
Please, remove it from there, thanks.
Hello!
How I can know more about implementation at 'tree' level such
extension as 'typeof'? I am not want to explore and change sources
now, maybe someone cam help?
--
Best regards,
Alexander mailto:[EMAIL PROTECTED]
regards,
Alexander mailto:[EMAIL PROTECTED]
Hello Gabriel,
Monday, December 12, 2005, 12:47:17 PM, you wrote:
> Alexander <[EMAIL PROTECTED]> writes:
> | I started exploring code base of cc1plus, and now I have little
> | question - how I can get access to tree representation of program (I
> | should
Hello Nick,
Thanks for your support.
this is the error message I'm getting:
"
...
make[4]: Leaving directory
`/proj/tec/alpeca_lite/users/alexgr/gcc/objdir1/gcc'
/proj/tec/alpeca_lite/users/alexgr/gcc/objdir1/./gcc/xgcc
-B/proj/tec/alpeca_lite/users/alexgr/gcc/objdir1/./gcc/
-B/usr/local/mcore-el
As part of adding a new pass to GCC I am intercepting addition to and
subtraction from pointers. These are represented by PLUS_EXPR and
MINUS_EXPR tree nodes. I need to be able to find out which of the node's
two operands is the actual pointer and which is the integer that has been
added to it.
is not a VAR_DECL. I don't think my theory is sounds
but if it is, is there a way to get this to work?
Thanks.
Alex.
> -Original Message-
> From: Andrew Pinski [mailto:[EMAIL PROTECTED]
> Sent: 19 March 2007 00:47
> To: Alexander Lamaison
> Cc: gcc@gcc.gnu.org
>
> -Original Message-
> From: Andrew Pinski [mailto:[EMAIL PROTECTED]
> Sent: 19 March 2007 00:47
> To: Alexander Lamaison
> Cc: gcc@gcc.gnu.org
> Subject: Re: Pointer addition/subtraction tree node
>
> On 3/18/07, Alexander Lamaison <[EMAIL PROTECTED]> wrot
I am adding a new optimisation pass to GCC and I have found that I probably
need to make use of SSA's definition-finding. The problem I am having is
that the trees I am working on don't seem to be in SSA form (i.e. not
SSA_NAME nodes).
I have looked endlessly and can't find any documentation on t
> > The tree_opt_pass for my pass has PROP_ssa set in the
> properties_required
> > field. Is this all I need to do?
>
> You need to put your pass after pass_build_ssa. Setting PROP_ssa does
> not build SSA itself, but it will cause an assertion failure if the
> pass is run while SSA is (not yet
> > I think (if I'm correctly interpreting the list in passes.c) it is.
> It's
> > right after pass_warn_function_noreturn, just before pass_mudflap_2.
> Is
> > this right? I don't get any assertion about SSA not being available.
>
> In this case, it is also after pass_del_ssa, which means SSA ha
modulo scheduling improvement. In
case this is not possible, I will seek guidance from Maxim Kuvyrkov.
Please feel free to share your thoughts and suggestions.
[1] Alias export patch by Dmitry Melnik:
http://gcc.gnu.org/ml/gcc-patches/2005-11/msg01518.html
--
Alexander Monakov
ur attention. I hope I will have a chance to ask you for
help in the frame of GSoC project.
--
Alexander Monakov
ck for suitable __FreeBSD_version__ and they
compile just fine. I also had to add Linux-compatible definition for
struct dl_phdr_info along with dl_iterate_phdr function prototype into
FreeBSD's link.h header file.
--
Alexander Kabaev
signature.asc
Description: PGP signature
On Mar 14, 2005, at 8:11 AM, Marc Espie wrote:
In article <[EMAIL PROTECTED]> you write:
Well as I said above, trampolines or an equivalent are currently
critically
needed by some front ends (and of course by anyone using the (very
useful IMO)
extension of nested functions in C).
This is your opi
On May 3, 2005, at 4:54 PM, Diego Novillo wrote:
On Tue, May 03, 2005 at 04:45:55PM -0400, Scott Robert Ladd wrote:
If you have a suggestion for better benchmarks, I'm listening. Is
your
ray tracer available?
I recently heard of Openbench, a project to create an open
version of the SPEC benchm
x27; it will be the human typing that out, and
it makes little sense to require people to meticulously type that out in caps.
Especially when the previous practice was opposite.
Thanks.
Alexander
rn a blind
> eye to such minor non-conformance.
In that case can we simply say that both 'committed' and 'COMMITTED' are okay,
if we know glibc doesn't follow that rule and anticipate we will not follow
it either?
Thanks.
Alexander
7;t it be better to load them as word and split them at the register
> level?
The question is not entirely clear to me, but usually the answer is that
it depends on the microarchitecture and details of the computations that
need to be done with loaded values. Often you'd need more than one instruction
to "split" the wide load, so it wouldn't be profitable.
Alexander
teral
for example, but triggering under-counting is trickier.
Petr, please see https://gcc.gnu.org/onlinedocs/gcc/Size-of-an-asm.html
for some more discussion.
Alexander
an "experimental" topic that may be interesting for students.
What do you think?
Thanks.
Alexander
ory with the ideas in your previous paragraph.
I agree though, CLOBBER-as-lifetime-end makes sense and does not
call for a replacement.
Thanks.
Alexander
;t use alloca().
Signed-off-by: Alexander Popov
---
scripts/gcc-plugins/stackleak_plugin.c | 51 +++---
1 file changed, 21 insertions(+), 30 deletions(-)
diff --git a/scripts/gcc-plugins/stackleak_plugin.c
b/scripts/gcc-plugins/stackleak_plugin.c
index cc75eeba0be1..1ecfe50d0bf5 1
e unneeded stackleak instrumentation for some
files.
I would like to thank Alexander Monakov for his
advisory on gcc internals.
This patch series was tested for gcc version 4.8, 5, 6, 7, 8, 9, and 10
on x86_64, i386 and arm64.
That was done using the project 'kernel-build-containers':
n grsecurity blog
https://grsecurity.net/resolving_an_unfortunate_stackleak_interaction
Signed-off-by: Alexander Popov
---
include/linux/compiler_attributes.h| 13 ++
kernel/stackleak.c | 16 +-
scripts/Makefile.gcc-plugins | 2 +
scripts/gcc-plugins
There is no need to try instrumenting functions in kernel/stackleak.c.
Otherwise that can cause issues if the cleanup pass of stackleak gcc plugin
is disabled.
Signed-off-by: Alexander Popov
---
kernel/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/kernel/Makefile b/kernel
Don't try instrumenting functions in arch/arm64/kernel/vdso/vgettimeofday.c.
Otherwise that can cause issues if the cleanup pass of stackleak gcc plugin
is disabled.
Signed-off-by: Alexander Popov
---
arch/arm64/kernel/vdso/Makefile | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
eak_plugin-verbose
Signed-off-by: Alexander Popov
---
scripts/gcc-plugins/stackleak_plugin.c | 31 +-
1 file changed, 26 insertions(+), 5 deletions(-)
diff --git a/scripts/gcc-plugins/stackleak_plugin.c
b/scripts/gcc-plugins/stackleak_plugin.c
index 0769c5b9156d..19358712d
On 04.06.2020 17:14, Jann Horn wrote:
> On Thu, Jun 4, 2020 at 3:58 PM Will Deacon wrote:
>> On Thu, Jun 04, 2020 at 04:49:57PM +0300, Alexander Popov wrote:
>>> Don't try instrumenting functions in arch/arm64/kernel/vdso/vgettimeofday.c.
>>> Otherwise that can cau
On 04.06.2020 17:25, Jann Horn wrote:
> On Thu, Jun 4, 2020 at 4:21 PM Alexander Popov wrote:
>> On 04.06.2020 17:14, Jann Horn wrote:
>>> Maybe at some point we should replace exclusions based on
>>> GCC_PLUGINS_CFLAGS and KASAN_SANITIZE and UBSAN_SANITIZE and
>&g
On 04.06.2020 17:01, Jann Horn wrote:
> On Thu, Jun 4, 2020 at 3:51 PM Alexander Popov wrote:
>> Some time ago Variable Length Arrays (VLA) were removed from the kernel.
>> The kernel is built with '-Wvla'. Let's exclude alloca() from the
>> instrumentation
On 09.06.2020 22:15, Kees Cook wrote:
> On Thu, Jun 04, 2020 at 04:49:52PM +0300, Alexander Popov wrote:
>> In this patch series I collected various improvements of the stackleak
>> gcc plugin.
>
> Thanks!
>
>> Alexander Popov (5):
>> gcc-plugins/
On 10.06.2020 10:30, Will Deacon wrote:
> On Tue, Jun 09, 2020 at 12:09:27PM -0700, Kees Cook wrote:
>> On Thu, Jun 04, 2020 at 02:58:06PM +0100, Will Deacon wrote:
>>> On Thu, Jun 04, 2020 at 04:49:57PM +0300, Alexander Popov wrote:
>>>> Don't try instrume
On 09.06.2020 21:39, Kees Cook wrote:
> On Thu, Jun 04, 2020 at 06:23:38PM +0300, Alexander Popov wrote:
>> On 04.06.2020 17:01, Jann Horn wrote:
>>> On Thu, Jun 4, 2020 at 3:51 PM Alexander Popov wrote:
>>>> Some time ago Variable Length Arrays (VLA) were removed fr
On 09.06.2020 21:46, Kees Cook wrote:
> On Thu, Jun 04, 2020 at 04:49:54PM +0300, Alexander Popov wrote:
>> Let's improve the instrumentation to avoid this:
>>
>> 1. Make stackleak_track_stack() save all register that it works with.
>> Use no_caller_saved_regis
On 09.06.2020 21:47, Kees Cook wrote:
> On Thu, Jun 04, 2020 at 04:49:55PM +0300, Alexander Popov wrote:
>> Add 'verbose' plugin parameter for stackleak gcc plugin.
>> It can be used for printing additional info about the kernel code
>> instrumentation.
>>
On 10.06.2020 23:03, Kees Cook wrote:
> On Wed, Jun 10, 2020 at 06:47:14PM +0300, Alexander Popov wrote:
>> On 09.06.2020 21:46, Kees Cook wrote:
>> The inline asm statement that is used for instrumentation is arch-specific.
>> Trying to add
>> asm volatile("ca
VDSO is built without plugin flags. So it's ok.
Best regards,
Alexander
There is no need to try instrumenting functions in kernel/stackleak.c.
Otherwise that can cause issues if the cleanup pass of stackleak gcc plugin
is disabled.
Signed-off-by: Alexander Popov
Acked-by: Kees Cook
---
kernel/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/kernel
ion during kernel building.
I would like to thank Alexander Monakov for his
advisory on gcc internals.
This patch series was tested for gcc version 4.8, 5, 6, 7, 8, 9, and 10
on x86_64, i386 and arm64.
That was done using the project 'kernel-build-containers':
https://github.com/a1
Don't use gcc plugins for building arch/arm64/kernel/vdso/vgettimeofday.c
to avoid unneeded instrumentation.
Signed-off-by: Alexander Popov
---
arch/arm64/kernel/vdso/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/arm64/kernel/vdso/Makefile b/arch/arm64/k
Don't use gcc plugins for building arch/arm/vdso/vgettimeofday.c to
avoid unneeded instrumentation.
Signed-off-by: Alexander Popov
---
arch/arm/vdso/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/arm/vdso/Makefile b/arch/arm/vdso/Makefile
index d3c9f03
eak_plugin-verbose
Signed-off-by: Alexander Popov
---
scripts/gcc-plugins/stackleak_plugin.c | 47 +++---
1 file changed, 42 insertions(+), 5 deletions(-)
diff --git a/scripts/gcc-plugins/stackleak_plugin.c
b/scripts/gcc-plugins/stackleak_plugin.c
index a18b0d4af456..48e141e07
n grsecurity blog
https://grsecurity.net/resolving_an_unfortunate_stackleak_interaction
Signed-off-by: Alexander Popov
Acked-by: Miguel Ojeda
---
include/linux/compiler_attributes.h| 13 ++
kernel/stackleak.c | 16 +-
scripts/Makefile.gcc-plugins |
On 24.06.2020 15:52, Luis Chamberlain wrote:
> On Wed, Jun 24, 2020 at 03:33:27PM +0300, Alexander Popov wrote:
>> Don't use gcc plugins for building arch/arm/vdso/vgettimeofday.c to
>> avoid unneeded instrumentation.
>>
>> Signed-off-by: Alexander Popov
>
&g
On 24.06.2020 15:53, Luis Chamberlain wrote:
> On Wed, Jun 24, 2020 at 03:33:30PM +0300, Alexander Popov wrote:
>> Add 'verbose' plugin parameter for stackleak gcc plugin.
>> It can be used for printing additional info about the kernel code
>> instrumentation.
>&
ter is static, so the compiler can observe that it does not escape
the translation unit, and all stores in the TU assign the same "const" value)
Does GCC need to be concerned about eventually "miscompiling" such cases? If
not, can we document an explicit promise that attribute-const may include
pointers-to-TLS?
Thanks.
Alexander
o "const" functions w.r.t. code with side effects, or
other throwing functions?
(all of the above in the context of Ada)
Thanks.
Alexander
I wanted to share a project we've been working on for sometime within
the context of Renjin,
a new interpreter for the R language running on the JVM.
We basically needed a way to compile C and Fortran code to JVM
classes, and for the last year or two we've been working on tool chain
that's compose
lex
On Mon, Feb 1, 2016 at 10:25 PM, Manuel López-Ibáñez
wrote:
> On 01/02/16 12:34, Bertram, Alexander wrote:
>>
>> I wanted to share a project we've been working on for sometime within
>> the context of Renjin,
>> a new interpreter for the R language runnin
els
> otherwise.
Please look at the posted code again:
static void f(const char *s)
{
do {
printf("%s\n",s);
s = NULL;
} while (s != NULL);
}
Since 's' is assigned to, the constraint from 'printf' is no longer useful for
warning at the point of comparison. It clearly looks like a false positive to
me.
Alexander
h that area when laying out arguments for the
tail call; thanks to Rich Felker for pointing that out to me).
Thus it cannot depend on attribute-pure.
Alexander
eded.
I can somewhat emulate that with whine searches restricted to "last N days".
Is anybody doing something like that?
Thanks.
Alexander
_code_evaluation' that performs a '>=' rather than '>'
test in the first place, and use it in both output_insn_latency_func and
output_maximal_insn_latency_func. If acknowledged, I volunteer to regstrap on
x86_64 and submit that in stage1.
Thoughts?
Thanks.
Alexander
rnal_insn_latency_func, as done by the patch.
As a nice bonus, it constrains prototypes of three automata functions to
accept insn_rtx rather than just rtx.
Bootstrapped and regtested on x86_64, OK?
Thanks.
Alexander
* genattr.c (main): Change 'rtx' to 'rtx_insn
er types of padding (padding in
long double, padding bytes/bits in structs/unions) in the future? Maybe
even normalization of pointers (randomly aligning misaligned pointers)?
--
Alexander Cherepanov
On 2016-06-08 10:29, Richard Biener wrote:
On Wed, Jun 8, 2016 at 8:36 AM, Alexander Cherepanov
wrote:
[skip]
But my question is about the following example:
--
#include
int main()
{
_Bool b;
*(char *)&b =
On 2016-06-08 17:37, Martin Sebor wrote:
On 06/08/2016 12:36 AM, Alexander Cherepanov wrote:
Hi!
If a variable of type _Bool contains something different from 0 and 1
its use amounts to UB in gcc and clang. There is a couple of examples in
[1] ([2] is also interesting).
[1] https://github.com
On 2016-06-13 22:51, Joseph Myers wrote:
On Mon, 13 Jun 2016, Alexander Cherepanov wrote:
Thanks for the info. IMHO this part of DR 260 has even more serious
consequences than the part about pointer provenance. It effectively prohibits
manual byte-by-byte (or any non-atomic) copying of objects
On 2016-06-14 00:13, Joseph Myers wrote:
On Tue, 14 Jun 2016, Alexander Cherepanov wrote:
The problem is that parts of representations of two different ordinary values
can form a trap representation.
Oh, you're talking about normalizing the destination rather than the
source of the
//llvm.org/docs/LangRef.html#undefined-values .
I don't see gcc treating padding in long double as indeterminate in the
same way as in structs but clang seems to treat them equally.
--
Alexander Cherepanov
rom GCC dumps are in bits, not bytes.
HTH
Alexander
env.c from icv.c (which then can use the #include "env.c"
form).
Thanks.
Alexander
,0xc(%rsi)
2e: 8b 47 0cmov0xc(%rdi),%eax
Is this behavior fully intentional, is the first example optimized too
aggressively, is an optimization missed in the second example, or is the
situation more complex?
--
Alexander Cherepanov
s gets less convenient too.
However, this actually demonstrates how the noinline+noclone was not
future-proof, and in a way backfired now. Should there be, ideally, a single
'noipa' attribute encompassing noinline, noclone, -fno-ipa-vrp, -fno-ipa-ra and
all future transforms using inter-procedural knowledge?
Alexander
ended or never at all), apply IPA-RA,
or
(perhaps in future) deduce that the callee always returns non-NULL and optimize
the caller accordingly. I think attribute-weak works to suppress IPA on the
caller side, but that is not a good solution because it also has an effect on
linking semantics, may be not available on non-ELF platforms, etc.
Alexander
ut for uses in the gcc testsuite, I believe an attribute is still needed.
Alexander
perly constrain code generation using the
language facilities: for example, using separate compilation or calling
through a volatile pointer achieves a similar effect in a portable way
[ except in case of a sufficiently advanced compiler indistinguishable from an
adversary ;) ]
Thanks.
Alexander
Hello, Richard, Jakub, community,
May I join/restart the old discussion about machine mode remapping at LTO
stream-in time. To recap, when offloading to NVPTX was introduced, there
was a problem due to differences in the set of supported modes (e.g. there
was no 'XFmode' on NVPTX that would corre
accelerator and host, but otherwise gives the most sane semantics I can imagine.
I think this implies that XFmode/TFmode don't need to exist on NVPTX to back
long_double_type_node.
Thanks.
Alexander
s it known that the OpenMP ARB
would find only this implementation behavior acceptable?
Apart from floating-point types, are there other situations where modes carry
information not deducible from the rest of the tree node?
Thanks.
Alexander
On Mon, 2 Jan 2017, Jakub Jelinek wrote:
> On Mon, Jan 02, 2017 at 09:49:55PM +0300, Alexander Monakov wrote:
> > On Mon, 2 Jan 2017, Jakub Jelinek wrote:
> > > If the host has long double the same as double, sure, PTX can use its
> > > native
> > > DFmode
p just to discover macro-fusable pairs). You'll also have to invent
something new if you want to move non-consecutive fusable insns together if
they are apart.
HTH.
Alexander
: symbol referencing errors. No output written to
/export/home/alp/srcs/tests/oi-userland/components/clang/build/i86/Release+Asserts/bin/clang-check
Undefined first referenced
symbol in file
Can someone help me to debug this issue?
--
Best regard
he specified sysroot - that is the root-cause of certain
problems.
Should search in 'include-fixed' be disabled when sysroot command line
option is specified?
--Alexander
Hello.
Is there any way to make std::locale work on illumos?
I see the following bug report
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=15992 and it is
still actual for gcc 4.8.3. (Don't know why it's marked "INVALID").
--
System Administrator of Southern Federal University Computer Center
Hi everyone,
I am trying to fix #61880
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61880 but will need some
guidance as I am a complete newbie.
The problem is concerns gccgo and the way the binaries it generates
link with the rest of the objects.
I have given a really tiny test case in the bug,
astructure)?
If so, this is quite a questionable choice (e.g. Valgrind also
prefixes the report lines with "==12345=="), and I don't see the point
in removing PIDs/addresses to please this script.
>>> Alternatively, I could patch compare_tests to sed out that part before
>>> comparing. Would that be acceptable?
>>>
>>> Cheers,
>>>
>>> Manuel.
>>>
>>
>> Added Sanitizer folks. Frankly it'd be cool if dumping PIDs and
>> addresses could be turned off.
>>
>
> Ok, this time actually added them.
>
--
Alexander Potapenko
Software Engineer
Google Moscow
failures caused by my patch.
>>
>> Can we remove the "==" part of the error? This way compare_tests
>> will ignore the failures.
>>
>> Alternatively, I could patch compare_tests to sed out that part before
>> comparing. Would that be acceptable?
>
>> __asm__("cgo_problem_example_com_demo.Cgoexp_Dummy");
>> cgo_problem_example.com_demo.Cgoexp_Dummy
> Normally the first name looks more right.
I suppose that the reason is that the dot character ('.') while
allowed is a bit more special than the rest, right?
OK I will keep this in mind.
> The
than 50%. Why not reverse the basic block reordering heuristics to
> make them under 50%? Is there anything wrong with GCC?
Your measurement includes the conditional branches at the end of loop bodies.
When loops iterate, those branches are taken, and it doesn't make sense to
reverse them.
HTH
Alexander
I compile and run my program inside Emacs (M-x compile) with
gcc 5.0.0 20150112 using `-fsanitize=bounds'. Although
this Emacs buffer is technically a tty, but it is `dumb' and does not
handle colors properly.
The gcc info concerning `-fsanitize=address' hints that there is a
parameter ASAN_OP
below:
__attribute__((naked))
void foo()
{
char [2] = {0};
};
Now gcc (trunk for aarch64 target) goes to ICE while compiling this code:
cc1 -O0 test.c
But I think that it should report something like: "local frame
unavailable (naked function?)"
Thanks in advance
--
Alexander
There's a pending patch for glibc that addresses this issue among others:
https://sourceware.org/ml/libc-alpha/2014-11/msg00469.html
([BZ#17090/17620/17621]: fix DTV race, assert, and DTV_SURPLUS Static TLS
limit)
Alexander
n the pointer to
dlopen the code like above can use dlsym(RTLD_DEFAULT, "dlopen"), but not
RTLD_NEXT (the loader precedes the fakeroot library in the lookup chain).
The preceding discussion seems to have libc and libdl switched. Normally the
implementation of dlopen is found in libdl.so, but not in libc.so.
Hope that helps,
Alexander
RTLD_DEFAULT only when resolving "dlopen", and keep
RTLD_NEXT for all other symbol names (unless later on you run into other
symbols with similar behavior). Something like
... = dlsym(strcmp(name, "dlopen") ? RTLD_NEXT : RTLD_DEFAULT, name);
Alexander
On Sun, 15 Feb 2015, Cyd Haselton wrote:
> On Sun, Feb 15, 2015 at 11:53 AM, Alexander Monakov
> wrote:
> >> Given that info...and in spite of my aforementioned limited knowledge I
> >> went back to take another look at the source and found this in
> >&g
because 'bar' might save the address of 's' in a global variable, and
therefore 's' must be live when 'doo1' or 'doo2' are invoked.
Should we remove or unbreak this test?
Thanks.
Alexander
n't match. Is that expected?
Can you also tell me why ..._pop call and sibcall instructions are predicated
on !TARGET_64BIT?
Thanks.
Alexander
ode compiled with -fno-plt the dynamic linker would not be able to
perform lazy binding (even if it was otherwise possible, e.g. -z now -z relro
weren't in effect, and profitable, i.e. the library was not already prelinked).
Alexander
_cexpi appropriately.
I wonder if it would be possible to add a fallback cexpi implementation to
libgcc.a that would be picked by the linker if there's no such symbol in libm?
Alexander
ov is worth the cost, e.g. would it make any easier for users to
mix two libraries, one linked against older libgcov, and another with a newer
(something that doesn't work at all now, but would be nice to support if I
understood Richard correctly).
Alexander
patch to achieve matching output on their Linux-hosted
vs Cygwin-hosted cross-compilers based on GCC 8:
https://gcc.gnu.org/ml/gcc-patches/2018-06/msg00751.html
Alexander
ing to
i and j).
If 'f1' dereferences 'i', GCC may deduce that dynamic type of '*i' is 'int' and
therefore 'i' must be suitably aligned. But in absence of dereferences GCC
does not make assumptions about dynamic type and alignment.
Alexander
casts.
It's not quite obvious what SSE has to do with this - any hint please?
(according to my quick check this changed between gcc-4.5 and gcc-4.6)
Alexander
optimized away quickly.
We preserve __builtin_assume_aligned up to pass-fold-all-builtins, so would it
work to emit it just before the memcpy
i_2 = __builtin_assume_aligned(i_1, 4);
__builtin_memcpy(j, i_2, 32);
in theory?
Alexander
ly started happening with gcc 6.
It's a change in register allocation, gcc selects eax instead of esi
for the shifts. Doesn't appear to be obviously intentional, could be
a bug or bad luck.
Alexander
Hello,
I'd like to report a typo in description of
«__builtin_expect_with_probability»:
https://gcc.gnu.org/onlinedocs/gcc/Other-Builtins.html#Other-Builtins
The description starts with "The built-in has same semantics as
*__builtin_expect_with_probability*", but it seems like *__builtin_expect*
On 30.11.2018 20:12, Kees Cook wrote:
> On Fri, Nov 30, 2018 at 9:09 AM Kees Cook wrote:
>>
>> On Fri, Nov 30, 2018 at 5:20 AM Alexander Popov wrote:
>>>
>>> Currently the 'stackleak_cleanup' pass deleting a CALL insn is executed
>>> after
On 03.12.2018 21:25, Alexander Popov wrote:
> But I think it's better to register the 'stackleak_cleanup' pass just one pass
> earlier -- before the '*free_cfg' pass. I'll double check it for different
> versions of gcc on all supported architectures and ret
1 - 100 of 286 matches
Mail list logo