--- Comment #8 from kkojima at gcc dot gnu dot org 2007-06-08 05:58 ---
Fixed.
--
kkojima at gcc dot gnu dot org changed:
What|Removed |Added
Status|NEW
--- Comment #7 from kkojima at gcc dot gnu dot org 2007-06-08 05:56 ---
Subject: Bug 32163
Author: kkojima
Date: Fri Jun 8 05:56:28 2007
New Revision: 125559
URL: http://gcc.gnu.org/viewcvs?root=gcc&view=rev&rev=125559
Log:
PR target/32163
Backport from mainline.
--- Comment #6 from kkojima at gcc dot gnu dot org 2007-06-08 05:54 ---
Subject: Bug 32163
Author: kkojima
Date: Fri Jun 8 05:53:57 2007
New Revision: 125558
URL: http://gcc.gnu.org/viewcvs?root=gcc&view=rev&rev=125558
Log:
PR target/32163
Backport from mainline.
--- Comment #5 from kkojima at gcc dot gnu dot org 2007-06-03 04:39 ---
Subject: Bug 32163
Author: kkojima
Date: Sun Jun 3 04:38:52 2007
New Revision: 125292
URL: http://gcc.gnu.org/viewcvs?root=gcc&view=rev&rev=125292
Log:
PR target/32163
* config/sh/sh.md (symGOT_loa
--- Comment #4 from kkojima at gcc dot gnu dot org 2007-06-01 00:17 ---
In the faulty case, stack protector inserts PIC codes after the result
is set to R0 register. It looks like
rX = [EMAIL PROTECTED]
A = rX + r12
B = mem[A]
and combine optimization pass makes this turn into
--- Comment #3 from kkojima at gcc dot gnu dot org 2007-05-31 13:30 ---
I've confirmed that this fails with 4.1.2, 4.2.0 and 4.3.0
on sh4-unknown-linux-gnu. A reduced testcase is:
--
int foo ()
{
char *p;
char fext[128];
p = fext;
bar (&p, (void *)0);
if (p)
free (p);