This is the mail archive of the
gcc-patches@gcc.gnu.org
mailing list for the GCC project.
Re: Ping on target independent stack clash protection patches
- From: Eric Botcazou <ebotcazou at adacore dot com>
- To: Jeff Law <law at redhat dot com>
- Cc: gcc-patches at gcc dot gnu dot org, Richard Biener <richard dot guenther at gmail dot com>
- Date: Fri, 18 Aug 2017 17:56:54 +0200
- Subject: Re: Ping on target independent stack clash protection patches
- Authentication-results: sourceware.org; auth=none
- References: <f19a94a8-01db-91dd-3fac-789dbc48206c@redhat.com>
> #01 of #08:
> https://gcc.gnu.org/ml/gcc-patches/2017-07/msg01971.html
>
> #02 of #08:
> https://gcc.gnu.org/ml/gcc-patches/2017-07/msg01972.html
>
> #03 of #08:
> https://gcc.gnu.org/ml/gcc-patches/2017-07/msg01974.html
>
> Need to reach some kind of closure on these, then I can start pinging
> the target maintainers for the rest of the bits...
All OK with me, thanks for your attention to the interaction with Ada.
Minor nit:
+ Stack checking is designed to detect infinite recursion for Ada
+ programs. Furthermore stack checking tries to ensure that scenario
+ that enough stack space is left to run a signal handler.
Let's use the same wording as in invoke.texi: "...infinite recursion and stack
overflows for...". Missing "in" before "that scenario'.
[Ada folks in the embedded world are mainly scared about the possibility of
tasks (threads) overwriting each other's stack; in that case, their only
requirement is to be able to run a last chance handler to terminate the
task properly. But the ACATS testsuite contains a handul of tests that
litteraly play with stack overflows and this complicates the implementation
for artificial reasons].
--
Eric Botcazou