From: Richard Earnshaw <Richard.Earnshaw@foss.arm.com>
To: Alexandre Oliva <oliva@adacore.com>, gcc-patches@gcc.gnu.org
Cc: nathan@acm.org, nickc@redhat.com, richard.earnshaw@arm.com,
ramana.gcc@gmail.com, kyrylo.tkachov@arm.com
Subject: Re: C++ modules and AAPCS/ARM EABI clash on inline key methods
Date: Tue, 21 Feb 2023 16:48:38 +0000 [thread overview]
Message-ID: <4f555382-6c59-4574-c2a2-d50608c70908@foss.arm.com> (raw)
In-Reply-To: <05cf53e4-af4d-7af1-da4b-3635345db9bf@foss.arm.com>
On 21/02/2023 16:31, Richard Earnshaw via Gcc-patches wrote:
> On 17/02/2023 06:09, Alexandre Oliva via Gcc-patches wrote:
>> On Apr 5, 2022, Alexandre Oliva <oliva@adacore.com> wrote:
>>
>>> Would something like this be acceptable/desirable? It's overreaching,
>>> in that not all arm platforms are expected to fail, but the result on
>>> them will be an unexpected pass, which is not quite as bad as the
>>> unexpected fail we get on most arm variants now.
>>
>> Ping?
>> https://gcc.gnu.org/pipermail/gcc-patches/2022-April/592763.html
>>
>> [PR105224] C++ modules and AAPCS/ARM EABI clash on inline key methods
>>
>> g++.dg/modules/virt-2_a.C fails on arm-eabi and many other arm targets
>> that use the AAPCS variant. ARM is the only target that overrides
>> TARGET_CXX_KEY_METHOD_MAY_BE_INLINE. It's not clear to me which way
>> the clash between AAPCS and C++ Modules design should be resolved, but
>> currently it favors AAPCS and thus the test fails.
>>
>> Skipping the test or conditionally dropping the inline keyword breaks
>> subsequent tests, so I'm XFAILing the expectation that vtable and rtti
>> symbols are output on arm*-*-*.
>>
>> Retested on arm-vxworks7 (gcc-12) and arm-eabi (trunk). Ok to install?
>>
>
> I started looking at this a few weeks back, but I was a bit confused by
> the testcase and then never got around to following up.
>
> The Arm C++ binding rules normally exclude using an inline function
> definition from being chosen as the key function because this not
> uncommonly appears in a header file; instead a later function in the
> class is defined to take that role, if such a function exists (in effect
> an inline function is treated the same way as if the function definition
> appeared within the class definition itself).
>
> But in this class we have only the one function, so in effect this
> testcase appears to fall back to the 'no key function' rule and as such
> I'd expect the class impedimenta to be required in all instances of the
> function. That doesn't seem to be happening, so either there's
> something I'm missing, or there's something the compiler is doing wrong
> for this case.
>
> Nathan, your insights would be appreciated here.
>
> R.
>
>
>>
>> for gcc/testsuite/ChangeLog
>>
>> PR c++/105224
>> * g++.dg/modules/virt-2_a.C: XFAIL syms on arm*-*-*.
>> ---
>> gcc/testsuite/g++.dg/modules/virt-2_a.C | 6 +++---
>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>
>> diff --git a/gcc/testsuite/g++.dg/modules/virt-2_a.C
>> b/gcc/testsuite/g++.dg/modules/virt-2_a.C
>> index 580552be5a0d8..b265515e2c7fd 100644
>> --- a/gcc/testsuite/g++.dg/modules/virt-2_a.C
>> +++ b/gcc/testsuite/g++.dg/modules/virt-2_a.C
>> @@ -22,6 +22,6 @@ export int Visit (Visitor *v)
>> }
>> // Emit here
>> -// { dg-final { scan-assembler {_ZTVW3foo7Visitor:} } }
>> -// { dg-final { scan-assembler {_ZTIW3foo7Visitor:} } }
>> -// { dg-final { scan-assembler {_ZTSW3foo7Visitor:} } }
>> +// { dg-final { scan-assembler {_ZTVW3foo7Visitor:} { xfail arm*-*-*
>> } } }
>> +// { dg-final { scan-assembler {_ZTIW3foo7Visitor:} { xfail arm*-*-*
>> } } }
>> +// { dg-final { scan-assembler {_ZTSW3foo7Visitor:} { xfail arm*-*-*
>> } } }
>>
Rather than scanning for the triplet, a better test would be
{ xfail { arm_eabi } }
Or something along those lines.
R.
>>
next prev parent reply other threads:[~2023-02-21 16:48 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-03-31 7:32 Alexandre Oliva
2022-04-05 4:53 ` Alexandre Oliva
2023-02-17 6:09 ` Alexandre Oliva
2023-02-21 16:31 ` Richard Earnshaw
2023-02-21 16:48 ` Richard Earnshaw [this message]
2023-02-22 19:57 ` Alexandre Oliva
2023-02-23 10:14 ` Richard Earnshaw
2023-02-23 17:12 ` Alexandre Oliva
2023-02-23 21:20 ` Alexandre Oliva
2023-02-24 10:23 ` Richard Earnshaw
2023-02-24 10:30 ` Iain Sandoe
2023-02-24 14:39 ` Alexandre Oliva
2023-02-21 22:27 ` Nathan Sidwell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4f555382-6c59-4574-c2a2-d50608c70908@foss.arm.com \
--to=richard.earnshaw@foss.arm.com \
--cc=gcc-patches@gcc.gnu.org \
--cc=kyrylo.tkachov@arm.com \
--cc=nathan@acm.org \
--cc=nickc@redhat.com \
--cc=oliva@adacore.com \
--cc=ramana.gcc@gmail.com \
--cc=richard.earnshaw@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).