public inbox for gcc-cvs@sourceware.org help / color / mirror / Atom feed
From: GCC Administrator <gccadmin@gcc.gnu.org> To: gcc-cvs@gcc.gnu.org Subject: [gcc r12-7315] Daily bump. Date: Tue, 22 Feb 2022 00:17:09 +0000 (GMT) [thread overview] Message-ID: <20220222001709.2BAEA3858C2C@sourceware.org> (raw) https://gcc.gnu.org/g:5c105adbf22f5dfa11de08fc88ee06573b3c4305 commit r12-7315-g5c105adbf22f5dfa11de08fc88ee06573b3c4305 Author: GCC Administrator <gccadmin@gcc.gnu.org> Date: Tue Feb 22 00:16:33 2022 +0000 Daily bump. Diff: --- gcc/ChangeLog | 55 +++++++++++++++++++++++++++++++++++++++++++++++++ gcc/DATESTAMP | 2 +- gcc/testsuite/ChangeLog | 23 +++++++++++++++++++++ 3 files changed, 79 insertions(+), 1 deletion(-) diff --git a/gcc/ChangeLog b/gcc/ChangeLog index 91d096d7915..60fd2bbfb84 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,58 @@ +2022-02-21 Dan Li <ashimida@linux.alibaba.com> + + * config/aarch64/aarch64.cc (SLOT_REQUIRED): + Change wb_candidate[12] to wb_push_candidate[12]. + (aarch64_layout_frame): Likewise, and + change callee_adjust when scs is enabled. + (aarch64_save_callee_saves): + Change wb_candidate[12] to wb_push_candidate[12]. + (aarch64_restore_callee_saves): + Change wb_candidate[12] to wb_pop_candidate[12]. + (aarch64_get_separate_components): + Change wb_candidate[12] to wb_push_candidate[12]. + (aarch64_expand_prologue): Push x30 onto SCS before it's + pushed onto stack. + (aarch64_expand_epilogue): Pop x30 frome SCS, while + preventing it from being popped from the regular stack again. + (aarch64_override_options_internal): Add SCS compile option check. + (TARGET_HAVE_SHADOW_CALL_STACK): New hook. + * config/aarch64/aarch64.h (struct GTY): Add is_scs_enabled, + wb_pop_candidate[12], and rename wb_candidate[12] to + wb_push_candidate[12]. + * config/aarch64/aarch64.md (scs_push): New template. + (scs_pop): Likewise. + * doc/invoke.texi: Document -fsanitize=shadow-call-stack. + * doc/tm.texi: Regenerate. + * doc/tm.texi.in: Add hook have_shadow_call_stack. + * flag-types.h (enum sanitize_code): + Add SANITIZE_SHADOW_CALL_STACK. + * opts.cc (parse_sanitizer_options): Add shadow-call-stack + and exclude SANITIZE_SHADOW_CALL_STACK. + * target.def: New hook. + * toplev.cc (process_options): Add SCS compile option check. + * ubsan.cc (ubsan_expand_null_ifn): Enum type conversion. + +2022-02-21 Tom de Vries <tdevries@suse.de> + + PR target/104440 + * config/nvptx/nvptx.cc (workaround_uninit_method_1) + (workaround_uninit_method_2, workaround_uninit_method_3) + (workaround_uninit): New function. + (nvptx_reorg): Use workaround_uninit. + * config/nvptx/nvptx.opt (minit-regs): New option. + +2022-02-21 Andre Vieira <andre.simoesdiasvieira@arm.com> + + PR rtl-optimization/104498 + * alias.cc (compare_base_symbol_refs): Correct distance computation + when swapping x and y. + +2022-02-21 Andrew Pinski <apinski@marvell.com> + + PR c/104506 + * tree-ssa.cc (tree_ssa_useless_type_conversion): + Check the inner type before calling useless_type_conversion_p. + 2022-02-19 Tom de Vries <tdevries@suse.de> * config/nvptx/nvptx.cc (nvptx_reorg_uniform_simt): Handle SET insn. diff --git a/gcc/DATESTAMP b/gcc/DATESTAMP index fe355427f10..ef3b6b163ff 100644 --- a/gcc/DATESTAMP +++ b/gcc/DATESTAMP @@ -1 +1 @@ -20220221 +20220222 diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 056dbfae541..41b22281f0c 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,26 @@ +2022-02-21 Dan Li <ashimida@linux.alibaba.com> + + * gcc.target/aarch64/shadow_call_stack_1.c: New test. + * gcc.target/aarch64/shadow_call_stack_2.c: New test. + * gcc.target/aarch64/shadow_call_stack_3.c: New test. + * gcc.target/aarch64/shadow_call_stack_4.c: New test. + * gcc.target/aarch64/shadow_call_stack_5.c: New test. + * gcc.target/aarch64/shadow_call_stack_6.c: New test. + * gcc.target/aarch64/shadow_call_stack_7.c: New test. + * gcc.target/aarch64/shadow_call_stack_8.c: New test. + +2022-02-21 Patrick Palka <ppalka@redhat.com> + + PR c++/85493 + * g++.dg/cpp0x/decltype80.C: New test. + +2022-02-21 Andrew Pinski <apinski@marvell.com> + + PR c/104506 + * gcc.dg/pr104506-1.c: New test. + * gcc.dg/pr104506-2.c: New test. + * gcc.dg/pr104506-3.c: New test. + 2022-02-20 Iain Buclaw <ibuclaw@gdcproject.org> * gdc.dg/special1.d: New file.
reply other threads:[~2022-02-22 0:17 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20220222001709.2BAEA3858C2C@sourceware.org \ --to=gccadmin@gcc.gnu.org \ --cc=gcc-cvs@gcc.gnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).