This is the mail archive of the
mailing list for the GCC project.
Re: Spurious register spill with volatile function argument
- From: <Paul_Koning at Dell dot com>
- To: <fw at deneb dot enyo dot de>
- Cc: <gcc at gcc dot gnu dot org>, <cfe-dev at lists dot llvm dot org>, <sw-dev at groups dot riscv dot org>
- Date: Mon, 28 Mar 2016 14:33:40 +0000
- Subject: Re: Spurious register spill with volatile function argument
- Authentication-results: sourceware.org; auth=none
- References: <2600D96D-94BC-4259-9D39-DE4993859281 at mac dot com> <9F3C9DE6-F00B-4402-A83B-354455DEAFFA at mac dot com> <CA++6G0CK3Yu-w9fhOrvpRP49qz9=Vs20J_=R28Mq=zCJOH+-UA at mail dot gmail dot com> <238543C3-39EA-4D5D-8C54-631BF796A38B at mac dot com> <56F8F66D dot 6020002 at redhat dot com> <87egaurecx dot fsf at mid dot deneb dot enyo dot de>
> On Mar 28, 2016, at 8:11 AM, Florian Weimer <firstname.lastname@example.org> wrote:
> The problem is that âreadingâ is either not defined, or the existing
> flatly contradicts existing practice.
> For example, if p is a pointer to a struct, will the expression &p->m
> read *p?
Presumably the offset of m is substantially larger than 0? If so, my answer would be "it had better not". Does any compiler treat that statement as an access to *p ?