http://gcc.gnu.org/bugzilla/show_bug.cgi?id=49781
--- Comment #31 from Uros Bizjak <ubizjak at gmail dot com> 2011-08-07 13:50:17 UTC --- (In reply to comment #29) > Created attachment 24938 [details] > WIP patch that exploits addr32. > > New version of patch for testing. Survives bootstrap + regtest on > x86_64-pc-linux-gnu. Oh, I forgot to add MEM_P ..., so please change the condition to: if (TARGET_64BIT && MEM_P (x) && GET_MODE_SIZE (mode) > UNITS_PER_WORD && rclass == GENERAL_REGS && !offsettable_memref_p (x)) Patch still works OK.