The info pages give something like
__asm__ ("xxx" : "=X" (sum));
as an example of adding a hint for gcc that the instruction clobbers "sum". 
However if the variable is an array element, gcc will clobber the variable for
you (in case you forgot) by generating a move from a random register to the
variable.  I don't know if liveness analysis is done on element basis for
arrays, but it doesn't generate warnings either.
Similarly for "=X" but not "=m" or "=r".

For example on x86,
__asm__ ("outl %%eax, (%%dx)" : "=X" (params[1]));
to indicate that the IO causes params[1] to be overwritten, results in:
  400532:       ef                      out    %eax,(%dx)
  400533:       89 45 f4                mov    %eax,-0xc(%rbp)
with all -O levels.

Similarly on ARM a move from r3 is generated that overwrites the array element.


-- 
           Summary: asm with a "=X" output overwrites the output
           Product: gcc
           Version: 4.3.3
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: c
        AssignedTo: unassigned at gcc dot gnu dot org
        ReportedBy: balrogg at gmail dot com
 GCC build triplet: x86_64-linux-gnu, arm-linux-gnueabi
  GCC host triplet: x86_64-linux-gnu, arm-linux-gnueabi


http://gcc.gnu.org/bugzilla/show_bug.cgi?id=39375

Reply via email to