[Bug 13716] Broken Android NDK x86 builds with TLS due to triggered ASM code

bugzilla at busybox.net bugzilla at busybox.net
Wed Apr 14 16:37:04 UTC 2021


--- Comment #1 from Denys Vlasenko <vda.linux at googlemail.com> ---
THe asm code should be valid for Android i386 as well. Investigate what does it
dislike about

#define INNERMUL                                          \
asm(                                                      \
   "movl %5,%%eax \n\t"                                   \
   "mull %4       \n\t"                                   \
   "addl %1,%%eax \n\t"                                   \
   "adcl $0,%%edx \n\t"                                   \
   "addl %%eax,%0 \n\t"                                   \
   "adcl $0,%%edx \n\t"                                   \
   "movl %%edx,%1 \n\t"                                   \
:"=g"(_c[LO]), "=r"(cy)                                   \
:"0"(_c[LO]), "1"(cy), "g"(mu), "g"(*tmpm++)              \
: "%eax", "%edx", "cc")

You are receiving this mail because:
You are on the CC list for the bug.

More information about the busybox-cvs mailing list