1. 01 Oct, 2018 27 commits
    • [libiberty] Use pipe inside pex_run · df1346b4
      https://gcc.gnu.org/ml/gcc-patches/2018-10/msg00039.html
      	* configure.ac (checkfuncs): Add pipe2.
      	* config.in, configure: Rebuilt.
      	* pex-unix.c (pex_unix_exec_child): Comminicate errors from child
      	to parent with a pipe, when possible.
      
      From-SVN: r264769
      Nathan Sidwell committed
    • * ru.po: Update. · 2649038c
      From-SVN: r264766
      Joseph Myers committed
    • Update, forgot to put the PR number in the Change Log. · 84eea0f7
      gcc/ChangeLog:
      
      2018-10-01  Carl Love  <cel@us.ibm.com>
      
      	PR 69431
      	* config/rs6000/rs6000-builtin.def (__builtin_mffsl): New.
      	(__builtin_mtfsb0): New.
      	(__builtin_mtfsb1): New.
      	( __builtin_set_fpscr_rn): New.
      	(__builtin_set_fpscr_drn): New.
      	* config/rs6000/rs6000.c (rs6000_expand_mtfsb_builtin): Add.
      	(rs6000_expand_set_fpscr_rn_builtin): Add.
      	(rs6000_expand_set_fpscr_drn_builtin): Add.
      	(rs6000_expand_builtin): Add case statement entries for
      	RS6000_BUILTIN_MTFSB0, RS6000_BUILTIN_MTFSB1,
      	RS6000_BUILTIN_SET_FPSCR_RN, RS6000_BUILTIN_SET_FPSCR_DRN,
      	RS6000_BUILTIN_MFFSL.
      	(rs6000_init_builtins): Add ftype initialization and def_builtin
      	calls for __builtin_mffsl, __builtin_mtfsb0, __builtin_mtfsb1,
      	__builtin_set_fpscr_rn, __builtin_set_fpscr_drn.
      	* config/rs6000.md (rs6000_mtfsb0, rs6000_mtfsb1, rs6000_mffscrn,
      	rs6000_mffscdrn): Add define_insn.
      	(rs6000_set_fpscr_rn, rs6000_set_fpscr_drn): Add define_expand.
      	* doc/extend.texi: Add documentation for the builtins.
      
      gcc/testsuite/ChangeLog:
      
      2018-10-01  Carl Love  <cel@us.ibm.com>
      
      	PR 69431
      	* gcc.target/powerpc/test_mffsl-p9.c: New file.
      	* gcc.target/powerpc/test_fpscr_rn_builtin.c: New file.
      	* gcc.target/powerpc/test_fpscr_drn_builtin.c: New file.
      	* gcc.target/powerpc/test_fpscr_rn_builtin_error.c: New file.
      	* gcc.target/powerpc/test_fpscr_drn_builtin_error.c: New file.
      
      From-SVN: r264764
      Carl Love committed
    • rs6000-builtin.def (__builtin_mffsl): New. · 2da14663
      gcc/ChangeLog:
      
      2018-10-01  Carl Love  <cel@us.ibm.com>
      
      	* config/rs6000/rs6000-builtin.def (__builtin_mffsl): New.
      	(__builtin_mtfsb0): New.
      	(__builtin_mtfsb1): New.
      	( __builtin_set_fpscr_rn): New.
      	(__builtin_set_fpscr_drn): New.
      	* config/rs6000/rs6000.c (rs6000_expand_mtfsb_builtin): Add.
      	(rs6000_expand_set_fpscr_rn_builtin): Add.
      	(rs6000_expand_set_fpscr_drn_builtin): Add.
      	(rs6000_expand_builtin): Add case statement entries for
      	RS6000_BUILTIN_MTFSB0, RS6000_BUILTIN_MTFSB1,
      	RS6000_BUILTIN_SET_FPSCR_RN, RS6000_BUILTIN_SET_FPSCR_DRN,
      	RS6000_BUILTIN_MFFSL.
      	(rs6000_init_builtins): Add ftype initialization and def_builtin
      	calls for __builtin_mffsl, __builtin_mtfsb0, __builtin_mtfsb1,
      	__builtin_set_fpscr_rn, __builtin_set_fpscr_drn.
      	* config/rs6000.md (rs6000_mtfsb0, rs6000_mtfsb1, rs6000_mffscrn,
      	rs6000_mffscdrn): Add define_insn.
      	(rs6000_set_fpscr_rn, rs6000_set_fpscr_drn): Add define_expand.
      	* doc/extend.texi: Add documentation for the builtins.
      
      gcc/testsuite/ChangeLog:
      
      2018-10-01  Carl Love  <cel@us.ibm.com>
      
      	* gcc.target/powerpc/test_mffsl-p9.c: New file.
      	* gcc.target/powerpc/test_fpscr_rn_builtin.c: New file.
      	* gcc.target/powerpc/test_fpscr_drn_builtin.c: New file.
      	* gcc.target/powerpc/test_fpscr_rn_builtin_error.c: New file.
      	* gcc.target/powerpc/test_fpscr_drn_builtin_error.c: New file.
      
      From-SVN: r264762
      Carl Love committed
    • allocator.xml: Adjust link to "Reconsidering Custom Memory Allocation". · 3553df86
      	* doc/xml/manual/allocator.xml: Adjust link to "Reconsidering
      	Custom Memory Allocation".
      
      From-SVN: r264761
      Gerald Pfeifer committed
    • Regenerate libstdc++ HTML pages · 8e4d333b
      	* doc/html/*: Regenerate.
      
      From-SVN: r264760
      Jonathan Wakely committed
    • re PR fortran/65677 (Incomplete assignment on deferred-length character variable) · b093d688
      2018-10-01  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/65677
      	* trans-expr.c (gfc_trans_assignment_1): Set the 'identical'
      	flag in the call to gfc_check_dependency.
      
      
      2018-10-01  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/65677
      	* gfortran.dg/dependency_52.f90 : Expand the test to check both
      	the call to adjustl and direct assignment of the substring.
      
      From-SVN: r264759
      Paul Thomas committed
    • re PR tree-optimization/87465 (Loop removal regression) · fd5c626c
      2018-10-01  Richard Biener  <rguenther@suse.de>
      
      	PR tree-optimization/87465
      	* tree-ssa-loop-ivcanon.c (tree_estimate_loop_size): Fix typo
      	causing branch miscounts.
      
      	* gcc.dg/tree-ssa/cunroll-15.c: New testcase.
      
      From-SVN: r264758
      Richard Biener committed
    • Validate and set default parameters for stack-clash. · 329130cc
      This patch defines the default parameters and validation for the aarch64
      stack clash probing interval and guard sizes.  It cleans up the previous
      implementation and insures that at no point the invalidate arguments are
      present in the pipeline for AArch64.  Currently they are only corrected once
      cc1 initalizes the back-end.
      
      The default for AArch64 is 64 KB for both of these and we only support 4 KB and 64 KB
      probes.  We also enforce that any value you set here for the parameters must be
      in sync.
      
      If an invalid value is specified an error will be generated and compilation aborted.
      
      gcc/
      
      	* common/config/aarch64/aarch64-common.c (TARGET_OPTION_DEFAULT_PARAM,
      	aarch64_option_default_param):	New.
      	(params.h): Include.
      	(TARGET_OPTION_VALIDATE_PARAM, aarch64_option_validate_param): New.
      	* config/aarch64/aarch64.c (aarch64_override_options_internal): Simplify
      	stack-clash protection validation code.
      
      From-SVN: r264757
      Tamar Christina committed
    • Update options framework for parameters to properly handle and validate configure time params. · f622a56b
      
      This patch changes it so that default parameters are validated during
      initialization. This change is needed to ensure parameters set via by the
      target specific common initialization routines still keep the parameters within
      the valid range.
      
      gcc/
      
      	* params.c (validate_param): New.
      	(add_params): Use it.
      	(set_param_value): Refactor param validation into validate_param.
      	(diagnostic.h): Include.
      	* diagnostic.h (diagnostic_ready_p): New.
      
      From-SVN: r264756
      Tamar Christina committed
    • Allow back-ends to be able to do custom validations on params. · 03ced4ab
      This patch adds the ability for backends to add custom constrains to the param
      values by defining a new hook option_validate_param.
      
      This hook is invoked on every set_param_value which allows the back-end to
      ensure that the parameters are always within it's desired state.
      
      gcc/
      
      	* params.c (set_param_value):
      	Add index of parameter being validated.
      	* common/common-target.def (option_validate_param): New.
      	* common/common-targhooks.h (default_option_validate_param): New.
      	* common/common-targhooks.c (default_option_validate_param): New.
      	* doc/tm.texi.in (TARGET_OPTION_VALIDATE_PARAM): New.
      	* doc/tm.texi: Regenerate.
      
      From-SVN: r264755
      Tamar Christina committed
    • Cleanup the AArch64 testsuite when stack-clash is on. · c98f502f
      This patch cleans up the testsuite when a run is done with stack clash
      protection turned on.
      
      Concretely this switches off -fstack-clash-protection for a couple of tests:
      
      * assembler scan: some tests are quite fragile in that they check for exact
             assembly output, e.g. check for exact amount of sub etc.  These won't
             match now.
      * vla: Some of the ubsan tests negative array indices. Because the arrays weren't
             used before the incorrect $sp wouldn't have been used. The correct value is
             restored on ret.  Now however we probe the $sp which causes a segfault.
      * params: When testing the parameters we have to skip these on AArch64 because of our
                custom constraints on them.  We already test them separately so this isn't a
                loss.
      
      Note that the testsuite is not entire clean due to gdb failure caused by alloca with
      stack clash. On AArch64 we output an incorrect .loc directive, but this is already the
      case with the current implementation in GCC and is a bug unrelated to this patch series.
      
      gcc/testsuite/
      
      	PR target/86486
      	* gcc.dg/pr82788.c: Skip for AArch64.
      	* gcc.dg/guality/vla-1.c: Turn off stack-clash.
      	* gcc.target/aarch64/subsp.c: Likewise.
      	* gcc.dg/params/blocksort-part.c: Skip stack-clash checks
      	on AArch64.
      	* gcc.dg/stack-check-10.c: Add AArch64 specific checks.
      	* gcc.dg/stack-check-12.c: ILP32 fixup.
      	* gcc.dg/stack-check-5.c: Add AArch64 specific checks.
      	* gcc.dg/stack-check-6a.c: Skip on AArch64, we don't support this.
      	* testsuite/lib/target-supports.exp
      	(check_effective_target_frame_pointer_for_non_leaf): AArch64 does not
      	require frame pointer for non-leaf functions.
      
      From-SVN: r264754
      Tamar Christina committed
    • Set default values for stack-clash and do basic validation in back-end. · fbe9af50
      
      This patch enforces that the default guard size for stack-clash protection for
      AArch64 be 64KB unless the user has overriden it via configure in which case
      the user value is used as long as that value is within the valid range.
      
      It also does some basic validation to ensure that the guard size is only 4KB or
      64KB and also enforces that for aarch64 the stack-clash probing interval is
      equal to the guard size.
      
      gcc/
      
      	PR target/86486
      	* config/aarch64/aarch64.c (aarch64_override_options_internal):
      	Add validation for stack-clash parameters and set defaults.
      
      From-SVN: r264753
      Tamar Christina committed
    • Allow setting of stack-clash via configure options. · 630b1e3a
      This patch defines a configure option to allow the setting of the default
      guard size via configure flags when building the target.
      
      The new flag is:
      
       * --with-stack-clash-protection-guard-size=<num>
      
      The patch defines a new macro DEFAULT_STK_CLASH_GUARD_SIZE which targets need
      to use explicitly is they want to support this configure flag and values that
      users may have set.
      
      gcc/
      
      	PR target/86486
      	* configure.ac: Add stack-clash-protection-guard-size.
      	* doc/install.texi: Document it.
      	* config.in (DEFAULT_STK_CLASH_GUARD_SIZE): New.
      	* params.def: Update comment for guard-size.
      	(PARAM_STACK_CLASH_PROTECTION_GUARD_SIZE,
      	PARAM_STACK_CLASH_PROTECTION_PROBE_INTERVAL): Update description.
      	* configure: Regenerate.
      
      From-SVN: r264752
      Tamar Christina committed
    • Ensure that outgoing argument size is at least 8 bytes when alloca and stack-clash. · 8c6e3b23
      This patch adds a requirement that the number of outgoing arguments for a
      function is at least 8 bytes when using stack-clash protection and alloca.
      
      By using this condition we can avoid a check in the alloca code and so have
      smaller and simpler code there.
      
      A simplified version of the AArch64 stack frames is:
      
         +-----------------------+                                              
         |                       |                                                 
         |                       |                                              
         |                       |                                              
         +-----------------------+                                              
         |LR                     |                                              
         +-----------------------+                                              
         |FP                     |                                              
         +-----------------------+                                              
         |dynamic allocations    | ----  expanding area which will push the outgoing
         +-----------------------+       args down during each allocation.
         |padding                |
         +-----------------------+
         |outgoing stack args    | ---- safety buffer of 8 bytes (aligned)
         +-----------------------+
      
      By always defining an outgoing argument, alloca(0) effectively is safe to probe
      at $sp due to the reserved buffer being there.  It will never corrupt the stack.
      
      This is also safe for alloca(x) where x is 0 or x % page_size == 0.  In the
      former it is the same case as alloca(0) while the latter is safe because any
      allocation pushes the outgoing stack args down:
      
         |FP                     |                                              
         +-----------------------+                                              
         |                       |
         |dynamic allocations    | ----  alloca (x)
         |                       |
         +-----------------------+
         |padding                |
         +-----------------------+
         |outgoing stack args    | ---- safety buffer of 8 bytes (aligned)
         +-----------------------+
      
      Which means when you probe for the residual, if it's 0 you'll again just probe
      in the outgoing stack args range, which we know is non-zero (at least 8 bytes).
      
      gcc/
      
      	PR target/86486
      	* config/aarch64/aarch64.h (STACK_CLASH_MIN_BYTES_OUTGOING_ARGS,
      	STACK_DYNAMIC_OFFSET): New.
      	* config/aarch64/aarch64.c (aarch64_layout_frame):
      	Update outgoing args size.
      	(aarch64_stack_clash_protection_alloca_probe_range,
      	TARGET_STACK_CLASH_PROTECTION_ALLOCA_PROBE_RANGE): New.
      
      gcc/testsuite/
      
      	PR target/86486
      	* gcc.target/aarch64/stack-check-alloca-1.c: New.
      	* gcc.target/aarch64/stack-check-alloca-10.c: New.
      	* gcc.target/aarch64/stack-check-alloca-2.c: New.
      	* gcc.target/aarch64/stack-check-alloca-3.c: New.
      	* gcc.target/aarch64/stack-check-alloca-4.c: New.
      	* gcc.target/aarch64/stack-check-alloca-5.c: New.
      	* gcc.target/aarch64/stack-check-alloca-6.c: New.
      	* gcc.target/aarch64/stack-check-alloca-7.c: New.
      	* gcc.target/aarch64/stack-check-alloca-8.c: New.
      	* gcc.target/aarch64/stack-check-alloca-9.c: New.
      	* gcc.target/aarch64/stack-check-alloca.h: New.
      	* gcc.target/aarch64/stack-check-14.c: New.
      	* gcc.target/aarch64/stack-check-15.c: New.
      
      From-SVN: r264751
      Tamar Christina committed
    • Add a hook to support telling the mid-end when to probe the stack. · 2c25083e
      This patch adds a hook to tell the mid-end about the probing requirements of the
      target.  On AArch64 we allow a specific range for which no probing needs to
      be done.  This same range is also the amount that will have to be probed up when
      a probe is needed after dropping the stack.
      
      Defining this probe comes with the extra requirement that the outgoing arguments
      size of any function that uses alloca and stack clash be at the very least 8
      bytes.  With this invariant we can skip doing the zero checks for alloca and
      save some code.
      
      A simplified version of the AArch64 stack frame is:
      
         +-----------------------+                                              
         |                       |                                                 
         |                       |                                              
         |                       |                                              
         +-----------------------+                                              
         |LR                     |                                              
         +-----------------------+                                              
         |FP                     |                                              
         +-----------------------+                                              
         |dynamic allocations    | -\      probe range hook effects these       
         +-----------------------+   --\   and ensures that outgoing stack      
         |padding                |      -- args is always > 8 when alloca.      
         +-----------------------+  ---/   Which means it's always safe to probe
         |outgoing stack args    |-/       at SP                                
         +-----------------------+                                              
                                                                                                                 
      
      This allows us to generate better code than without the hook without affecting
      other targets.
      
      With this patch I am also removing the stack_clash_protection_final_dynamic_probe
      hook which was added specifically for AArch64 but that is no longer needed.
      
      gcc/
      
      	PR target/86486
      	* explow.c (anti_adjust_stack_and_probe_stack_clash): Support custom
      	probe ranges.
      	* target.def (stack_clash_protection_alloca_probe_range): New.
      	(stack_clash_protection_final_dynamic_probe): Remove.
      	* targhooks.h (default_stack_clash_protection_alloca_probe_range) New.
      	(default_stack_clash_protection_final_dynamic_probe): Remove.
      	* targhooks.c: Likewise.
      	* doc/tm.texi.in (TARGET_STACK_CLASH_PROTECTION_ALLOCA_PROBE_RANGE): New.
      	(TARGET_STACK_CLASH_PROTECTION_FINAL_DYNAMIC_PROBE): Remove.
      	* doc/tm.texi: Regenerate.
      
      From-SVN: r264750
      Tamar Christina committed
    • Add support for SVE stack clash probing. · eb471ba3
      This patch adds basic support for SVE stack clash protection.
      It is a first implementation and will use a loop to do the
      probing and stack adjustments.
      
      An example sequence is:
      
              .cfi_startproc
              mov     x15, sp
              cntb    x16, all, mul #11
              add     x16, x16, 304
              .cfi_def_cfa_register 15
      .SVLPSPL0:
              cmp     x16, 61440
              b.lt    .SVLPEND0
              sub     sp, sp, 61440
              str     xzr, [sp, 0]
              sub     x16, x16, 61440
              b      .SVLPSPL0
      .SVLPEND0:
              sub     sp, sp, x16
              .cfi_escape 0xf,0xc,0x8f,0,0x92,0x2e,0,0x8,0x58,0x1e,0x23,0xb0,0x2,0x22
      
      for a 64KB guard size, and for a 4KB guard size
      
              .cfi_startproc
              mov     x15, sp
              cntb    x16, all, mul #11
              add     x16, x16, 304
              .cfi_def_cfa_register 15
      .SVLPSPL0:
              cmp     x16, 3072
              b.lt    .SVLPEND0
              sub     sp, sp, 3072
              str     xzr, [sp, 0]
              sub     x16, x16, 3072
              b       .SVLPSPL0
      .SVLPEND0:
              sub     sp, sp, x16
              .cfi_escape 0xf,0xc,0x8f,0,0x92,0x2e,0,0x8,0x58,0x1e,0x23,0xb0,0x2,0x22
      
      This has about the same semantics as alloca, except we prioritize the common case
      where no probe is required.  We also change the amount we adjust the stack and
      the probing interval to be the nearest value to `guard size - abi buffer` that
      fits in the 12-bit shifted immediate used by cmp.
      
      While this would mean we probe a bit more often than we require, in practice the
      amount of SVE vectors you'd need to spill is significant. Even more so to enter the
      loop more than once.
      
      
      gcc/
      
      	PR target/86486
      	* config/aarch64/aarch64-protos.h (aarch64_output_probe_sve_stack_clash): New.
      	* config/aarch64/aarch64.c (aarch64_output_probe_sve_stack_clash,
      	aarch64_clamp_to_uimm12_shift): New.
      	(aarch64_allocate_and_probe_stack_space): Add SVE specific section.
      	* config/aarch64/aarch64.md (probe_sve_stack_clash): New.
      
      gcc/testsuite/
      
      	PR target/86486
      	* gcc.target/aarch64/stack-check-prologue-16.c: New test
      	* gcc.target/aarch64/stack-check-cfa-3.c: New test.
      	* gcc.target/aarch64/sve/struct_vect_24.c: New test.
      	* gcc.target/aarch64/sve/struct_vect_24_run.c: New test.
      
      From-SVN: r264749
      Tamar Christina committed
    • stack-clash: Add LR assert to layout_frame. · db6b62a8
      Since stack clash depends on the LR being saved for non-leaf functions this
      patch adds an assert such that if this changes we would notice this.
      
      gcc/
      	PR target/86486
      	* config/aarch64/aarch64.c (aarch64_layout_frame): Add assert.
      
      From-SVN: r264748
      Tamar Christina committed
    • Updated stack-clash implementation supporting 64k probes. · cd1bef27
      This patch implements the use of the stack clash mitigation for aarch64.
      In Aarch64 we expect both the probing interval and the guard size to be 64KB
      and we enforce them to always be equal.
      
      We also probe up by 1024 bytes in the general case when a probe is required.
      
      AArch64 has the following probing conditions:
      
       1a) Any initial adjustment less than 63KB requires no probing.  An ABI defined
           safe buffer of 1Kbytes is used and a page size of 64k is assumed.
      
        b) Any final adjustment residual requires a probe at SP + 1KB.
           We know this to be safe since you would have done at least one page worth
           of allocations already to get to that point.
      
        c) Any final adjustment more than remainder (total allocation amount) larger
           than 1K - LR offset requires a probe at SP.
      
      
        safe buffer mentioned in 1a is maintained by the storing of FP/LR.
        In the case of -fomit-frame-pointer we can still count on LR being stored
        if the function makes a call, even if it's a tail call.  The AArch64 frame
        layout code guarantees this and tests have been added to check against
        this particular case.
      
       2) Any allocations larger than 1 page size, is done in increments of page size
          and probed up by 1KB leaving the residuals.
      
       3a) Any residual for initial adjustment that is less than guard-size - 1KB
           requires no probing.  Essentially this is a sliding window.  The probing
           range determines the ABI safe buffer, and the amount to be probed up.
      
      Incrementally allocating less than the probing thresholds, e.g. recursive functions will
      not be an issue as the storing of LR counts as a probe.
      
      
                                  +-------------------+                                    
                                  |  ABI SAFE REGION  |                                    
                        +------------------------------                                    
                        |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |                                    
       maximum amount   |         |                   |                                    
       not needing a    |         |                   |                                    
       probe            |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |                                    
                        |         |                   |        Probe offset when           
                        |         ---------------------------- probe is required           
                        |         |                   |                                    
                        +-------- +-------------------+ --------  Point of first probe     
                                  |  ABI SAFE REGION  |                                    
                                  ---------------------                                    
                                  |                   |                                    
                                  |                   |                                    
                                  |                   |                                         
      
      Bootstrapped Regtested on aarch64-none-linux-gnu and no issues.
      Target was tested with stack clash on and off by default.
      
      GLIBC testsuite also ran with stack clash on by default and no new
      regressions.
      
      
      Co-Authored-By: Richard Sandiford <richard.sandiford@linaro.org>
      Co-Authored-By: Tamar Christina <tamar.christina@arm.com>
      
      From-SVN: r264747
      Jeff Law committed
    • Fix caching of tests for multiple variant runs and update existing target-supports tests. · 041bfa6f
      Currently some target supports checks such as vect_int cache their
      results in a manner that would cause them not to be rechecked when
      running the same tests against a different variant in a multi variant
      run.  This causes tests to be skipped or run when they shouldn't be.
      
      there is already an existing caching mechanism in place that does the
      caching correctly, but presumably these weren't used because some of these
      tests originally only contained static data. e.g. only checked if the target is
      aarch64*-*-* etc.
      
      This patch changes every function that needs to do any caching at all to use
      check_cached_effective_target which will cache per variant instead of globally.
      
      For those tests that already parameterize over et_index I have created
      check_cached_effective_target_indexed to handle this common case by creating a list
      containing the property name and the current value of et_index.
      
      These changes result in a much simpler implementation for most tests and a large
      reduction in lines for target-supports.exp.
      
      Regtested on
        aarch64-none-elf
        x86_64-pc-linux-gnu
        powerpc64-unknown-linux-gnu
        arm-none-eabi
      
      and no testsuite errors. Difference would depend on your site.exp.
      On arm we get about 4500 new testcases and on aarch64 the low 10s.
      On PowerPC and x86_64 no changes as expected since the default exp for these
      just test the default configuration.
      
      What this means for new target checks is that they should always use either
      check_cached_effective_target or check_cached_effective_target_indexed if the
      result of the check is to be cached.
      
      As an example the new vect_int looks like
      
      proc check_effective_target_vect_int { } {
          return [check_cached_effective_target_indexed <name> {
            expr {
               <condition>
      	}}]
      }
      
      The debug information that was once there is now all hidden in
      check_cached_effective_target, (called from check_cached_effective_target_indexed)
      and so the only thing you are required to do is give it a unique cache name and a condition.
      
      The condition doesn't need to be an if statement so simple boolean expressions are enough here:
      
               [istarget i?86-*-*] || [istarget x86_64-*-*]
               || ([istarget powerpc*-*-*]
      	     && ![istarget powerpc-*-linux*paired*])
               || ...
      
      From-SVN: r264745
      Tamar Christina committed
    • re PR tree-optimization/87261 (Optimize bool expressions) · 03cc70b5
      2018-10-01  MCC CS <deswurstes@users.noreply.github.com>
      
      	PR tree-optimization/87261
      	* match.pd: Remove trailing whitespace.
      	Add (x & y) | ~(x | y) -> ~(x ^ y),
      	(~x | y) ^ (x ^ y) -> x | ~y and (x ^ y) | ~(x | y) -> ~(x & y)
      
      	* gcc.dg/pr87261.c: New test.
      
      From-SVN: r264744
      MCC CS committed
    • c-ada-spec.c (get_underlying_decl): Get to the main type variant. · 6cc430c1
      	* c-ada-spec.c (get_underlying_decl): Get to the main type variant.
      	(dump_ada_node): Add const keyword.
      
      From-SVN: r264738
      Eric Botcazou committed
    • [ARC] Avoid specific constants to end in limm field. · e04108c7
      Avoid constants to end up in the limm field for particular
      instructions when compiling for size.
      
      gcc/
      xxxx-xx-xx  Claudiu Zissulescu  <claziss@synopsys.com>
      
      	* config/arc/arc.md (*add_n): Clean up pattern, update instruction
      	constraints.
      	(ashlsi3_insn): Update instruction constraints.
      	(ashrsi3_insn): Likewise.
      	(rotrsi3): Likewise.
      	(add_shift): Likewise.
      	* config/arc/constraints.md (Csz): New 32 bit constraint. It
      	avoids placing in the limm field small constants which, otherwise,
      	could end into a small instruction.
      
      testsuite/
      xxxx-xx-xx  Claudiu Zissulescu  <claziss@synopsys.com>
      
      	* gcc.target/arc/tph_addx.c: New test.
      
      From-SVN: r264737
      Claudiu Zissulescu committed
    • [ARC] Check for odd-even register when emitting double mac ops. · 97e1d32c
      gcc/
      	Claudiu Zissulescu  <claziss@synopsys.com>
      
      	* config/arc/arc.md (maddsidi4_split): Don't use dmac if the
      	destination register is not odd-even.
      	(umaddsidi4_split): Likewise.
      
      gcc/testsuite/
      	Claudiu Zissulescu  <claziss@synopsys.com>
      
      	* gcc.target/arc/tmac-3.c: New file.
      
      From-SVN: r264736
      Claudiu Zissulescu committed
    • tree-inline.c (expand_call_inline): Store origin of fn in BLOCK_ABSTRACT_ORIGIN… · 796a2bb2
      tree-inline.c (expand_call_inline): Store origin of fn in BLOCK_ABSTRACT_ORIGIN for the inline BLOCK.
      
      2018-10-01  Richard Biener  <rguenther@suse.de>
      
      	* tree-inline.c (expand_call_inline): Store origin of fn
      	in BLOCK_ABSTRACT_ORIGIN for the inline BLOCK.
      	* tree.c (block_ultimate_origin): Simplify and do some
      	checking.
      
      From-SVN: r264734
      Richard Biener committed
    • [Ada] use -gnatd_A to disable .ali on -fcompare-debug recompile · cb8c960e
      for  gcc/ada/ChangeLog
      
      	* gcc-interface/lang-specs.h (default_compilers): When given
      	fcompare-debug-second, adjust auxbase like cc1, and pass
      	gnatd_A.
      	* gcc-interface/misc.c (flag_compare_debug): Remove variable.
      	(gnat_post_options): Do not set it.
      	* lib-writ.adb (flag_compare_debug): Remove import.
      	(Write_ALI): Do not test it.
      
      From-SVN: r264732
      Alexandre Oliva committed
    • Daily bump. · f89d27f2
      From-SVN: r264731
      GCC Administrator committed
  2. 30 Sep, 2018 8 commits
    • mmx.md (EMMS): New int iterator. · b38ab29f
      	* config/i386/mmx.md (EMMS): New int iterator.
      	(emms): New int attribute.
      	(mmx_<emms>): Macroize insn from *mmx_emms and *mmx_femms using
      	EMMS int iterator.  Explicitly declare clobbers.
      	(mmx_emms): Remove expander.
      	(mmx_femms): Ditto.
      	* config/i386/predicates.md (emms_operation): Remove predicate.
      	(vzeroall_pattern): New predicate.
      	(vzeroupper_pattern): Rename from vzeroupper_operation.
      	* config/i386/i386.c (ix86_avx_u128_mode_after): Use
      	vzeroupper_pattern and vzeroall_pattern predicates.
      
      From-SVN: r264727
      Uros Bizjak committed
    • re PR rtl-optimization/86939 (IRA incorrectly creates an interference between a… · 0df92803
      re PR rtl-optimization/86939 (IRA incorrectly creates an interference between a pseudo register and a hard register)
      
      gcc/
      	PR rtl-optimization/86939
      	* ira-lives.c (make_hard_regno_born): Rename from this...
      	(make_hard_regno_live): ... to this.  Remove update to conflict
      	information.  Update function comment.
      	(make_hard_regno_dead): Add conflict information update.  Update
      	function comment.
      	(make_object_born): Rename from this...
      	(make_object_live): ... to this.  Remove update to conflict information.
      	Update function comment.
      	(make_object_dead):  Add conflict information update.  Update function
      	comment.
      	(mark_pseudo_regno_live): Call make_object_live.
      	(mark_pseudo_regno_subword_live): Likewise.
      	(mark_hard_reg_dead): Update function comment.
      	(mark_hard_reg_live): Call make_hard_regno_live.
      	(process_bb_node_lives): Likewise.
      	* lra-lives.c (make_hard_regno_born): Rename from this...
      	(make_hard_regno_live): ... to this.  Remove update to conflict
      	information.  Remove now uneeded check_pic_pseudo_p argument.
      	Update function comment.
      	(make_hard_regno_dead): Add check_pic_pseudo_p argument and add update
      	to conflict information.  Update function comment.
      	(mark_pseudo_live): Remove update to conflict information.  Update
      	function comment.
      	(mark_pseudo_dead): Add conflict information update.
      	(mark_regno_live): Call make_hard_regno_live.
      	(mark_regno_dead): Call make_hard_regno_dead with new arguement.
      	(process_bb_lives): Call make_hard_regno_live and make_hard_regno_dead.
      
      From-SVN: r264726
      Peter Bergner committed
    • re PR fortran/87359 (pointer being freed was not allocated) · a086078b
      2018-09-30  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/87359
      	* trans-array.c (gfc_is_reallocatable_lhs): Correct the problem
      	introduced by r264358, which prevented components of associate
      	names from being reallocated on assignment.
      
      
      2018-09-30  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/87359
      	* gfortran.dg/associate_40.f90 : New test.
      
      From-SVN: r264725
      Paul Thomas committed
    • re PR fortran/70752 (Incorrect LEN for ALLOCATABLE CHARACTER) · ba08c70a
      2018-09-30  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/70752
      	PR fortran/72709
      	* trans-array.c (gfc_conv_scalarized_array_ref): If this is a
      	deferred type and the info->descriptor is present, use the
      	info->descriptor
      	(gfc_conv_array_ref): Is the se expr is a descriptor type, pass
      	it as 'decl' rather than the symbol backend_decl.
      	(gfc_array_allocate): If the se string_length is a component
      	reference, fix it and use it for the expression string length
      	if the latter is not a variable type. If it is a variable do
      	an assignment. Make use of component ref string lengths to set
      	the descriptor 'span'.
      	(gfc_conv_expr_descriptor): For pointer assignment, do not set
      	the span field if gfc_get_array_span returns zero.
      	* trans.c (get_array_span): If the upper bound a character type
      	is zero, use the descriptor span if available.
      
      
      2018-09-30  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/70752
      	PR fortran/72709
      	* gfortran.dg/deferred_character_25.f90 : New test.
      	* gfortran.dg/deferred_character_26.f90 : New test.
      	* gfortran.dg/deferred_character_27.f90 : New test to verify
      	that PR82617 remains fixed.
      
      From-SVN: r264724
      Paul Thomas committed
    • messages.xml: Switch link to www.oracle.com to https. · f1525dd4
      	* doc/xml/manual/messages.xml: Switch link to www.oracle.com
      	to https.
      
      From-SVN: r264723
      Gerald Pfeifer committed
    • policy_data_structures_biblio.xml: Update link to Microsoft Component Model Object Technologies. · 8b3f1589
      	* doc/xml/manual/policy_data_structures_biblio.xml: Update
      	link to Microsoft Component Model Object Technologies.
      
      From-SVN: r264722
      Gerald Pfeifer committed
    • re PR fortran/70149 ([F08] Character pointer initialization causes ICE) · 8ba60ec4
      2018-09-30  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/70149
      	* trans-decl.c (gfc_get_symbol_decl): A deferred character
      	length pointer that is initialized needs the string length to
      	be initialized as well.
      
      2018-09-30  Paul Thomas  <pault@gcc.gnu.org>
      
      	PR fortran/70149
      	* gfortran.dg/deferred_character_24.f90 : New test.
      
      From-SVN: r264721
      Paul Thomas committed
    • Daily bump. · 5e8b5d90
      From-SVN: r264720
      GCC Administrator committed
  3. 29 Sep, 2018 5 commits