> What's the impact of this bug? If it is a wrong-code or ice-on-valid
> bug then it's ok for the 4.7 branch.
Neither, it's an out-of-bounds memory access in reload1.c with apparently no
visible effects as it has been introduced with IRA (4.4 series).
--
Eric Botcazou
On Tue, 27 Mar 2012, Eric Botcazou wrote:
> > Bootstrapped/regtested on x86_64-suse-linux, applied on mainline. Should
> > it be applied to the release branches as well?
> >
> >
> > 2012-03-26 Eric Botcazou
> >
> > PR rtl-optimization/52629
> > * reload1.c (count_pseudo): Short-circuit
> Bootstrapped/regtested on x86_64-suse-linux, applied on mainline. Should
> it be applied to the release branches as well?
>
>
> 2012-03-26 Eric Botcazou
>
> PR rtl-optimization/52629
> * reload1.c (count_pseudo): Short-circuit common case.
> (count_spilled_pseudo): Return ea
This is an out-of-bounds access in count_spilled_pseudo: we can enter the
function for a pseudo without hard reg but we immediately use the hard reg
number as an index:
static void
count_spilled_pseudo (int spilled, int spilled_nregs, int reg)
{
int freq = REG_FREQ (reg);
int r = reg_renumbe