mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

854
active users

#gcc

4 posts4 participants0 posts today

My computer is in the shop for the next month. I had to find other things to do. So: a custom Bluetooth 3D Printed GC Controller! My best build yet. Made from an 8BitDo Bluetooth board, Bibben removable gate front, Olympia backshell, HandHeld Legends btns and Rienne Customs springs. #3dprint #gcc

OK, calling #gcc experts...

Is there a way to declare a function such that an argument has an attribute that restricts usage as follows.

The arg must not be a variable - so what? not an lvalue?

Why?

I have pointers to stuff that has too be freed.

I want to absolutely ensure no reuse of pointer after call (actually there is an attribute for that?).

So call with a pointer that is return from function, OK.

But call with variable you could reuse later, not OK.

Anyone here familiar with SPARC binutils internals? I'm having a rather odd case where the same instruction (and same binary sequence) gets interpreted differently depending on who compiles it :cirnothinking:

Say, I have this `decode.s` file containing the following line:
decode: addxccc %g0, %g0, %g0

One VIS3 instruction, very simple. Then assemble it with both gcc and clang:
gcc -mcpu=niagara4 -c decode.s -o decode-gcc.o
clang -mcpu=niagara4 -c decode.s -o decode-clang.o

And now, if I run objdump on the files, the results are different:
decode-clang.o: file format elf64-sparc

Disassembly of section .text:

0000000000000000 <decode>:
0: 81 b0 02 60 unknown

Compare with GCC's:
decode-gcc.o: file format elf64-sparc

Disassembly of section .text:

0000000000000000 <decode>:
0: 81 b0 02 60 addxccc %g0, %g0, %g0

In both cases the binary stream is the same, but why does objdump decodes it as "unknown" with the clang-built file?

Continued thread

#Recruitment from Kenya to the #GCC, particularly #Qatar, has long been marred by corruption, with bilateral labour agreements failing to address these issues. MR's Vani Saraswathi investigated exploitative recruitment practices in the corridor, shedding light on the role of #Gulf-based consultants.

migrant-rights.org/2022/06/hug.

“Some people close to Trump’s White House have been taken aback by the scale of security that has surrounded Musk since he became a regular presence in Trump’s orbit last year. The detail rivaled only that of the president himself, the sources observed.”

No surprise the #GCC ( #SaudiArabia, #UAE, #Oman, #Qatar, #Bahrain & #Kuwait) + #China and #Russia (GCC henchman #Putin & #Xi), are overdoing mercenaries to protect their largest investment, their top #Saudi henchman.
mastodon.social/@dangillmor/11

MastodonDan Gillmor (@dangillmor@mastodon.social)Musk's brownshirts... https://edition.cnn.com/2025/02/20/politics/elon-musk-private-security-deputized-marshals-service/
Continued thread

#Salesforce has announced a $500 million investment in #ArtificialIntelligence initiatives in #SaudiArabia, and will deploy its Hyperforce platform there through a strategic partnership with #Amazon Web Services (#AWS). Additionally, the company plans to establish a regional headquarters in #Riyadh.
nasdaq.com/articles/salesforce

Continued thread

#Salesforce announced this week that it’s planning $500 million of AI-related investments in #SaudiArabia. Like the #USA, Saudi Arabia—a major oil and gas exporter—is looking to capitalize on its abundance of wealth and fossil fuels to become an #AI superpower, including in a $100 billion initiative called #ProjectTranscendence.
newrepublic.com/article/191506

The New Republic · Why Tech Companies Are Joining the GOP-Oil AllianceThe big bet on artificial intelligence has turned tech billionaires from vocal climate advocates into Trump toadies.