public inbox for gcc-bugs@sourceware.org help / color / mirror / Atom feed
From: "rguenth at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org> To: gcc-bugs@gcc.gnu.org Subject: [Bug target/100354] [9/10/11/12 regression] aarch64: non-deligitimized UNSPEC UNSPEC_TLS (76) found in variable location Date: Fri, 21 Jan 2022 12:16:33 +0000 [thread overview] Message-ID: <bug-100354-4-pj1aSQLNuo@http.gcc.gnu.org/bugzilla/> (raw) In-Reply-To: <bug-100354-4@http.gcc.gnu.org/bugzilla/> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100354 Richard Biener <rguenth at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Last reconfirmed|2021-04-30 00:00:00 |2022-1-21 Priority|P3 |P2 CC| |jakub at gcc dot gnu.org Keywords| |diagnostic --- Comment #4 from Richard Biener <rguenth at gcc dot gnu.org> --- This is dwarf2out.cc /* If delegitimize_address couldn't do anything with the UNSPEC, and the target hook doesn't explicitly allow it in debug info, assume we can't express it in the debug info. */ /* Don't complain about TLS UNSPECs, those are just too hard to delegitimize. Note this could be a non-decl SYMBOL_REF such as one in a constant pool entry, so testing SYMBOL_REF_TLS_MODEL rather than DECL_THREAD_LOCAL_P is not just an optimization. */ if (flag_checking && (XVECLEN (rtl, 0) == 0 || GET_CODE (XVECEXP (rtl, 0, 0)) != SYMBOL_REF || SYMBOL_REF_TLS_MODEL (XVECEXP (rtl, 0, 0)) == TLS_MODEL_NONE)) inform (current_function_decl ? DECL_SOURCE_LOCATION (current_function_decl) : UNKNOWN_LOCATION, #if NUM_UNSPEC_VALUES > 0 "non-delegitimized UNSPEC %s (%d) found in variable location", ((XINT (rtl, 1) >= 0 && XINT (rtl, 1) < NUM_UNSPEC_VALUES) ? unspec_strings[XINT (rtl, 1)] : "unknown"), #else "non-delegitimized UNSPEC %d found in variable location", #endif XINT (rtl, 1)); btw, the following expansion_failed () will just dump to a dumpfile, maybe the above inform was meant to do the same. Jakub, you added this in g:eb1fcdaa11c571780374065c383708826624f22d - it's guarded with -fchecking but I think this is the only place in GCC I know we have actual debug diagnostics this way.
next prev parent reply other threads:[~2022-01-21 12:16 UTC|newest] Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-04-30 12:07 [Bug target/100354] New: [9 " nsz at gcc dot gnu.org 2021-04-30 12:48 ` [Bug target/100354] [9/10/11/12 " acoplan at gcc dot gnu.org 2021-05-03 7:29 ` rguenth at gcc dot gnu.org 2021-06-01 8:20 ` rguenth at gcc dot gnu.org 2021-10-25 18:23 ` acoplan at gcc dot gnu.org 2022-01-21 12:16 ` rguenth at gcc dot gnu.org [this message] 2022-01-21 12:22 ` jakub at gcc dot gnu.org 2022-02-08 18:27 ` jakub at gcc dot gnu.org 2022-02-08 18:54 ` jakub at gcc dot gnu.org 2022-05-27 9:45 ` [Bug target/100354] [10/11/12/13 " rguenth at gcc dot gnu.org 2022-06-28 10:44 ` jakub at gcc dot gnu.org 2023-07-07 10:39 ` [Bug target/100354] [11/12/13/14 " rguenth at gcc dot gnu.org 2024-03-11 3:23 ` [Bug target/100354] [11/12/13 " law at gcc dot gnu.org 2024-03-11 3:28 ` [Bug target/100354] [11/12/13/14 " pinskia at gcc dot gnu.org
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=bug-100354-4-pj1aSQLNuo@http.gcc.gnu.org/bugzilla/ \ --to=gcc-bugzilla@gcc.gnu.org \ --cc=gcc-bugs@gcc.gnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).