[Bug debug/113000] Generate BTF always in early-finish regardless of CO-RE

2024-10-09 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=113000 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/116718] bpf: support bpf_fastcall attributes

2024-09-15 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=116718 --- Comment #2 from Jose E. Marchesi --- As far as I can tell the feature requires no inlining to happen. From the llvm patch: After this patch-set verifier would rewrite the program below: r2 = 1 *(u64 *)(r10 - 32) = r2 call %[bpf

[Bug target/116718] New: bpf: support bpf_fastcall attributes

2024-09-15 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=116718 Bug ID: 116718 Summary: bpf: support bpf_fastcall attributes Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Priority: P3 Component: target

[Bug target/116717] New: bpf: fix built-in functions for memory model aware atomic operations.

2024-09-15 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=116717 Bug ID: 116717 Summary: bpf: fix built-in functions for memory model aware atomic operations. Product: gcc Version: unknown Status: UNCONFIRMED Severity: norma

[Bug debug/116663] [14/15 regression] CTF array dimensions dumped backwards

2024-09-10 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=116663 Jose E. Marchesi changed: What|Removed |Added CC||jemarch at gcc dot gnu.org R

[Bug target/108189] anonymous struct declared inside parameter list will not be visible outside of this definition or declaration

2024-05-06 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108189 --- Comment #13 from Jose E. Marchesi --- In bpf-next we are passing -Wno-error for the particular BPF selftests that use this construct: progs/btf_dump_test_case_bitfields.c-CFLAGS := -Wno-error progs/btf_dump_test_case_namespacing.c-CFLAGS :=

[Bug target/114523] bpf: unverifable code due to subreg usage

2024-03-28 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114523 --- Comment #13 from Jose E. Marchesi --- Thanks. The new title is way better. And thank you for the further analysis and the reproducer that also makes clang to generate the no-verifiable code! I wonder, is the issue also there when -mno-alu

[Bug target/114431] bpf: GCC generates unverifiable code for systemd restrict_fs_bpf

2024-03-28 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114431 Bug 114431 depends on bug 114523, which changed state. Bug 114523 Summary: bpf: ssa-phiopt optimization generates unverifiable code. https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114523 What|Removed |Added -

[Bug target/114523] bpf: ssa-phiopt optimization generates unverifiable code.

2024-03-28 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114523 Jose E. Marchesi changed: What|Removed |Added Ever confirmed|0 |1 Status|RESOLVED

[Bug target/114431] bpf: GCC generates unverifiable code for systemd restrict_fs_bpf

2024-03-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114431 --- Comment #4 from Jose E. Marchesi --- Created attachment 57797 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=57797&action=edit restrict-fs-.bpf.unstripped.i

[Bug target/114431] bpf: GCC generates unverifiable code for systemd restrict_fs_bpf

2024-03-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114431 --- Comment #3 from Jose E. Marchesi --- Created attachment 57796 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=57796&action=edit restrict-ifaces.bpf.unstripped.i

[Bug target/114431] bpf: GCC generates unverifiable code for systemd restrict_fs_bpf

2024-03-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114431 --- Comment #2 from Jose E. Marchesi --- Created attachment 57795 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=57795&action=edit socket-bind.bpf.unstripped.i preprocessed source

[Bug target/114431] bpf: GCC generates unverifiable code for systemd restrict_fs_bpf

2024-03-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114431 --- Comment #1 from Jose E. Marchesi --- $ bpf-gcc --version bpf-gcc (14-20240127-1+1) 14.0.1 20240127 (experimental) [master r14-8465-g5200ef26ac1] Copyright (C) 2024 Free Software Foundation, Inc. This is free software; see the source for cop

[Bug target/114431] New: bpf: GCC generates unverifiable code for systemd restrict_fs_bpf

2024-03-22 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114431 Bug ID: 114431 Summary: bpf: GCC generates unverifiable code for systemd restrict_fs_bpf Product: gcc Version: 14.0 Status: UNCONFIRMED Severity: normal

[Bug c/113825] New: missing warning for omitted parameter names in function definitions (c23 extension)

2024-02-08 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=113825 Bug ID: 113825 Summary: missing warning for omitted parameter names in function definitions (c23 extension) Product: gcc Version: 14.0 Status: UNCONFIRMED Seve

[Bug target/113225] bpf: attribute((kernel_helper)) adds inconsistent BTF extern function decl entry.

2024-01-09 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=113225 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED CC|

[Bug debug/113000] New: Generate BTF always in early-finish regardless of CO-RE

2023-12-13 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=113000 Bug ID: 113000 Summary: Generate BTF always in early-finish regardless of CO-RE Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Pr

[Bug target/109253] libbpf: failed to find BTF info for global/extern symbol '__divdi3'

2023-11-29 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109253 --- Comment #6 from Jose E. Marchesi --- (In reply to Shung-Hsi Yu from comment #5) > any chance we will also have this fix in GCC 13? Yes. We plan to backport this and many other BPF related fixes and improvements to GCC 10, 11, 12 and 13, on

[Bug target/109253] libbpf: failed to find BTF info for global/extern symbol '__divdi3'

2023-11-28 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109253 Jose E. Marchesi changed: What|Removed |Added Resolution|--- |FIXED Status|UNCONFIRMED

[Bug debug/112656] btf: function prototypes generated with name

2023-11-27 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112656 Jose E. Marchesi changed: What|Removed |Added CC||david.faust at oracle dot com --- Co

[Bug target/107844] error: argument is not a field access for __builtin_preserve_field_info

2023-11-26 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107844 Jose E. Marchesi changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug debug/112656] btf: function prototypes generated with name

2023-11-21 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112656 --- Comment #3 from Jose E. Marchesi --- clang does not emit BTF FUNC nor FUNC_PROTO entries for inlined functions. So the fix is probably to not emit CTF_K_FUNCTION entries that have not been handled in the FOR_EACH_FUNCTION loop.

[Bug debug/112656] btf: function prototypes generated with name

2023-11-21 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112656 --- Comment #2 from Jose E. Marchesi --- The btf_collect_datasec function in btf2out.cc traverses the cgraph and, for each function, transforms its CTF_K_FUNCTION into a pair of BTF_KIND_FUNC_PROTO and BTF_KIND_FUNC. But if the function is inli

[Bug debug/112656] btf: function prototypes generated with name

2023-11-21 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112656 --- Comment #1 from Jose E. Marchesi --- Smaller reproducer: static void log_event(const char *event_name, void *dev_ptr) { } void lala () { log_event ("foobar", ((void *)0)); } Note that the FUNC_PROTO for log_event seems to

[Bug debug/112656] New: btf: function prototypes generated with name

2023-11-21 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112656 Bug ID: 112656 Summary: btf: function prototypes generated with name Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Priority: P3 Component:

[Bug target/112654] bpf: bpf program load failure

2023-11-21 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112654 --- Comment #4 from Jose E. Marchesi --- I think the problem here may be that OP's kernel doesn't understand BPF V4 instructions, and the program above has been compiled with them (movs). Try to use -mcpu=v3?

[Bug target/112654] bpf: bpf program load failure

2023-11-21 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112654 --- Comment #3 from Jose E. Marchesi --- The instruction failing validation seems to be: e0: bf a4 00 00 00 00 00 00 mov %r4,%r10 Which is a regular MOV instruction with zeroes in imm32 and offset16. It has SRC=X. So I don't unde

[Bug libgcc/112465] New: libgcc: aarch64: lse runtime does not work with big data segments

2023-11-09 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112465 Bug ID: 112465 Summary: libgcc: aarch64: lse runtime does not work with big data segments Product: gcc Version: 14.0 Status: UNCONFIRMED Severity: normal

[Bug target/107481] bpf: add __builtin_preserve_enum_value

2023-10-31 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107481 Jose E. Marchesi changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug target/107480] bpf: add __builtin_preserve_type_info

2023-10-31 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107480 Jose E. Marchesi changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug target/107479] bpf: add __builtin_btf_type_id

2023-10-31 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107479 Jose E. Marchesi changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug other/44209] [meta-bug] Some warnings are not linked to diagnostics options

2023-08-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=44209 Bug 44209 depends on bug 106537, which changed state. Bug 106537 Summary: GCC doesn't support -W[no-]compare-distinct-pointer-types https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106537 What|Removed |Added ---

[Bug c/106537] GCC doesn't support -W[no-]compare-distinct-pointer-types

2023-08-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106537 Jose E. Marchesi changed: What|Removed |Added Ever confirmed|0 |1 Status|RESOLVED

[Bug target/109253] libbpf: failed to find BTF info for global/extern symbol '__divdi3'

2023-08-18 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109253 --- Comment #2 from Jose E. Marchesi --- A patch to fix this was sent https://gcc.gnu.org/pipermail/gcc-patches/2023-August/627864.html

[Bug tree-optimization/48783] ~0ULL % (a / (a & -a)) == 0 is not optimized to false on the tree level

2023-08-18 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=48783 Jose E. Marchesi changed: What|Removed |Added CC||jemarch at gcc dot gnu.org --- Commen

[Bug target/108790] bpf: gcc emits malformed ldxdw instruction at -O2

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108790 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/110782] bpf: make use of the V4 sign-extended load instructions

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110782 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/110784] bpf: make use of the V4 sign-extended move instructions

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110784 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/110770] bpf: add pseudoc assembly dialect

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110770 Jose E. Marchesi changed: What|Removed |Added CC||jemarch at gcc dot gnu.org

[Bug target/111029] bpf: GCC generates invalid instructions wN = (s8) rM

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=111029 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug other/44209] [meta-bug] Some warnings are not linked to diagnostics options

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=44209 Bug 44209 depends on bug 106537, which changed state. Bug 106537 Summary: GCC doesn't support -W[no-]compare-distinct-pointer-types https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106537 What|Removed |Added ---

[Bug c/106537] GCC doesn't support -W[no-]compare-distinct-pointer-types

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106537 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/111046] bpf: support naked functions in BPF

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=111046 Jose E. Marchesi changed: What|Removed |Added Resolution|--- |FIXED Status|UNCONFIRMED

[Bug target/111046] New: bpf: support naked functions in BPF

2023-08-17 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=111046 Bug ID: 111046 Summary: bpf: support naked functions in BPF Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Priority: P3 Component: target

[Bug target/111029] New: bpf: GCC generates invalid instructions wN = (s8) rM

2023-08-15 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=111029 Bug ID: 111029 Summary: bpf: GCC generates invalid instructions wN = (s8) rM Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Priority: P3 Co

[Bug target/109068] bpf: "error: too many function arguments for eBPF" for always_inline function

2023-08-15 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109068 Jose E. Marchesi changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[Bug target/110781] bpf: make use of the V4 long-range jump instruction (jal/gotol)

2023-07-27 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110781 Jose E. Marchesi changed: What|Removed |Added Resolution|--- |MOVED Status|UNCONFIRMED

[Bug target/110783] bpf; make sure of V4 signed division/modulus instructions

2023-07-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110783 Jose E. Marchesi changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug target/110783] bpf; make sure of V4 signed division/modulus instructions

2023-07-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110783 Jose E. Marchesi changed: What|Removed |Added Ever confirmed|0 |1 Assignee|unassigned at g

[Bug target/110786] bpf: make use of the V4 byte swap instructions

2023-07-24 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110786 Jose E. Marchesi changed: What|Removed |Added Resolution|--- |FIXED Status|ASSIGNED

[Bug target/110786] bpf: make use of the V4 byte swap instructions

2023-07-23 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110786 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |ASSIGNED Assignee|unassign

[Bug target/110786] New: bpf: make use of the V4 byte swap instructions

2023-07-23 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110786 Bug ID: 110786 Summary: bpf: make use of the V4 byte swap instructions Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Priority: P3 Component

[Bug target/110784] New: bpf: make use of the V4 sign-extended move instructions

2023-07-23 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110784 Bug ID: 110784 Summary: bpf: make use of the V4 sign-extended move instructions Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Pr

[Bug target/110783] New: bpf; make sure of V4 signed division/modulus instructions

2023-07-23 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110783 Bug ID: 110783 Summary: bpf; make sure of V4 signed division/modulus instructions Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal

[Bug target/110782] New: bpf: make use of the V4 sign-extended load instructions

2023-07-23 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110782 Bug ID: 110782 Summary: bpf: make use of the V4 sign-extended load instructions Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Pr

[Bug target/110781] New: bpf: make use of the V4 long-range jump instruction (jal/gotol)

2023-07-23 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110781 Bug ID: 110781 Summary: bpf: make use of the V4 long-range jump instruction (jal/gotol) Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal

[Bug target/110657] BPF verifier rejects generated code due to invalid stack access

2023-07-14 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110657 Jose E. Marchesi changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug target/110657] BPF verifier rejects generated code due to invalid stack access

2023-07-14 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110657 --- Comment #6 from Jose E. Marchesi --- Hello Kris. The commit above (now in gcc master) should fix the issue. Can you please confirm? Thanks!

[Bug target/110657] BPF verifier rejects generated code due to invalid stack access

2023-07-13 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110657 --- Comment #4 from Jose E. Marchesi --- Looks like `combine' is generating paradoxical subregs of mems, which seem to confuse LRA and these weird incorrect reloads end up being generated. The easiest fix for this is to make the backend to use

[Bug target/110657] BPF verifier rejects generated code due to invalid stack access

2023-07-13 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110657 Jose E. Marchesi changed: What|Removed |Added Last reconfirmed||2023-07-13 Ever confirmed|0

[Bug target/110657] BPF verifier rejects generated code due to invalid stack access

2023-07-13 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=110657 Jose E. Marchesi changed: What|Removed |Added CC||jemarch at gcc dot gnu.org

[Bug target/107479] bpf: add __builtin_btf_type_id

2023-04-19 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107479 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |ASSIGNED Last reconfirmed|

[Bug target/107480] bpf: add __builtin_preserve_type_info

2023-04-19 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107480 Jose E. Marchesi changed: What|Removed |Added Last reconfirmed||2023-04-19 Assignee|unassi

[Bug target/107481] bpf: add __builtin_preserve_enum_value

2023-04-19 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107481 Jose E. Marchesi changed: What|Removed |Added CC||jemarch at gcc dot gnu.org Last re

[Bug target/107844] error: argument is not a field access for __builtin_preserve_field_info

2023-04-19 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107844 Jose E. Marchesi changed: What|Removed |Added Status|NEW |ASSIGNED Assignee|unassign

[Bug target/109558] bpf: support BTF and DWARF tag annotations for BPF

2023-04-19 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109558 Jose E. Marchesi changed: What|Removed |Added Last reconfirmed||2023-04-19 Status|UNCONF

[Bug target/109558] New: bpf: support BTF and DWARF tag annotations for BPF

2023-04-19 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109558 Bug ID: 109558 Summary: bpf: support BTF and DWARF tag annotations for BPF Product: gcc Version: unknown Status: UNCONFIRMED Severity: normal Priority: P3 Compo

[Bug target/107848] libbpf: ELF relo #0 in section #7 has unexpected type 12

2023-03-22 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107848 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/108293] Incorrect assembly emitted for float for BPF target

2023-01-11 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108293 Jose E. Marchesi changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[Bug target/107843] error: incompatible type for argument in ___bpf_ctx_cast2

2023-01-10 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107843 Jose E. Marchesi changed: What|Removed |Added Resolution|--- |FIXED Status|NEW

[Bug target/107843] error: incompatible type for argument in ___bpf_ctx_cast2

2023-01-06 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107843 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |NEW Last reconfirmed|

[Bug target/106773] libbpf: failed to find BTF info for global/extern symbol 'bpf_link_fops'

2023-01-06 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106773 Jose E. Marchesi changed: What|Removed |Added Resolution|--- |FIXED Status|UNCONFIRMED

[Bug target/106745] segfault in bpf_core_get_sou_member_index

2023-01-06 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106745 Jose E. Marchesi changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug target/108293] Incorrect assembly emitted for float for BPF target

2023-01-05 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108293 --- Comment #3 from Jose E. Marchesi --- (In reply to Jakub Jelinek from comment #2) > Another thing is that at least for all SFmode constant one could use mov > instead of lddw. For this I guess we could expand the "I" constraint to cover cons

[Bug testsuite/106515] [13 regression] gcc.dg/debug/btf/btf-int-1.c fails after r13-1937-g5df04a7aa837a1

2022-12-22 Thread jemarch at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106515 --- Comment #6 from Jose E. Marchesi --- (In reply to Richard Biener from comment #5) > Fixed I assume. Yes indeed. Sorry about leaving all these bugs in the "open" state. Only recently I managed to get my bugzilla accounts consolidated in a