[cxx-mem-model] bitfield tests

Richard Guenther richard.guenther@gmail.com
Thu Mar 31 15:35:00 GMT 2011


On Thu, Mar 31, 2011 at 4:47 PM, Jeff Law <law@redhat.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 03/30/11 08:19, Richard Guenther wrote:
>
>>
>> Well, I'm not sure that strict-align targets that provide byte access do
>> not simply hide the issue inside the CPU (thus, perform the read-modify-write
>> there and do not guarantee any atomicity unless you ask for it).
> Certainly some do this internally, but that's clearly out of our
> control.

Sure.  My argument is that the memory model which guarantees
this kind of things for _any_ memory access is fundamentally flawed.
They should have simply required annotating objects which should
behave that way (and then only behave that way "per object", not
for any concurrent field accesses).

Richard.

> However, some really do sub-word accesses.
>
> I even vaguely remember this being controllable by bits in page table
> entries on one architecture.  You could set the bit which meant if I ask
> for a byte access, then do it byte-wise, otherwise the processor would
> do a read-modify-write.  Clearly this was meant to make it easier for
> dealing with memory mapped devices.
>
> Jeff
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
>
> iQEcBAEBAgAGBQJNlJQWAAoJEBRtltQi2kC7t0IIAJTpXGIyWcIpWqk26ofieuLc
> T7PIBagNARbqEU2NwzgjeUyH4HMhCgwnAX8T4WXg2JJRXsZwxQPmKfk0x3mn6yBV
> z60TISwtx53LEnqbLQG5FIU4QLyOcBOGuAFabyVcsT07tKE/wmGjDBkypbsBhUuw
> ZFNEY7jausQGkaRy1ObxL4VWejk51XvcqNU2ReqjQJUvbS9UlpTNoopMixORG6Hb
> qb4LF/Fr9S9cckB3oBxy4pZrdEd7/rlAroMoRXw2JwEbGNyfc9EACKtcXbopakCu
> XnPxjsf4eVYNDl5jSf3r8w70fX5vqUimyfVeQqi49IcImqXGlfd/8US1ptOgZQE=
> =WMAs
> -----END PGP SIGNATURE-----
>



More information about the Gcc-patches mailing list