http://gcc.gnu.org/bugzilla/show_bug.cgi?id=46878

--- Comment #20 from Jeffrey A. Law <law at redhat dot com> 2011-01-26 14:56:14 
UTC ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/26/11 07:51, mikpe at it dot uu.se wrote:
> http://gcc.gnu.org/bugzilla/show_bug.cgi?id=46878
> 
> Mikael Pettersson <mikpe at it dot uu.se> changed:
> 
>            What    |Removed                     |Added
> ----------------------------------------------------------------------------
>                  CC|                            |mikpe at it dot uu.se
> 
> --- Comment #19 from Mikael Pettersson <mikpe at it dot uu.se> 2011-01-26 
> 14:50:28 UTC ---
> (In reply to comment #18)
>> Note we're seeing this failure on m68k as well and it's a regression.
> 
> Could it be related to PR46856 (a HAVE_cc0 postreload regression from r162270
> that's breaking m68k-linux)?
It's related in the sense that both are problems with cc0 targets, but I
doubt the underlying root cause is the same.

jeff

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJNQDYBAAoJEBRtltQi2kC7r+cH/28xx5O9b7ll8SqYuNMwAIQP
vJEStmdjxFEP84DOXd7WPPPyW4qwdEfy2ufFCgorX9MYbyNkxAYGcT96CQUX5jVU
z/u+69tzrLwDwcNQ75tLb+THJVwiyUCIz52bNdXo2rHWKGy2yXM+97zdhnBmSNoA
Vrr+bLnESl0WiDFxdwlSJALTAEXyRaj4iXR+LR8yN/ewt1bsTt4hIaMmyKcNLuV+
ASOnhFl4x/q+QoURdj9Fd8d2taLVGbKtCeZkPl4nktTp6NvQl4vGBeKgZkHNkZPU
RITPyew6a3ISICFNeXlsDjbAnToJQcPoa187AcSlwOLCLdoES53B/qUEZdlZHDc=
=uQnW
-----END PGP SIGNATURE-----

--- Comment #21 from Jeffrey A. Law <law at redhat dot com> 2011-01-26 15:23:15 
UTC ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/25/11 16:42, dj at redhat dot com wrote:
> http://gcc.gnu.org/bugzilla/show_bug.cgi?id=46878
> 
> DJ Delorie <dj at redhat dot com> changed:
> 
>            What    |Removed                     |Added
> ----------------------------------------------------------------------------
>   Attachment #23074|0                           |1
>         is obsolete|                            |
> 
> --- Comment #16 from DJ Delorie <dj at redhat dot com> 2011-01-25 23:41:53 
> UTC ---
> Created attachment 23126
>   --> http://gcc.gnu.org/bugzilla/attachment.cgi?id=23126
> alternate patch 3
> 
> Another patch attempt.  In this case, we add a check for the implied 
> dependency
> created by a cc0 setter/user pair to insn_a_feeds_b() so that try_combine()
> knows that the cc0 setter is needed if the user is needed.
I think you're on the right track here.  I want to look at it a bit
more, but this might be "it".

FWIW, this code was a relatively recent addition to combine to support
four insn combinations and just happens to be the code I was concerned
might not be cc0-safe.

jeff

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJNQDxTAAoJEBRtltQi2kC7DqEH/jTegxTzt00RTBmi9pfN77TY
4XdhGv8KZsiFsiEp+IsBdQWhY7xJ12nHwjrBGqz72hDDSoYMflrceIhYqhvPqs3E
BzIGmsccr5s+LD/qBQi8bqENOxlADytFia8QpRn22s17v1VhLnk321pFHvS2552G
RDASg+ZPnYwrQL9dSKNQ4DKN/W3sTSGe3wLjpSYlhUp4jZ3MjLCMhkLAWaRZ8tWi
Q+SfJz5a9bX8sgGCG1Utio0kEhqLYzkgxvgNJoi04059WWuB6uwlsWGcjbd23UTA
hjnPRFxpetJp4En7NCOW2eo+2AC97NM909aXwAnvJWUBezDSYZu8fhSbE1rQrjA=
=lw6z
-----END PGP SIGNATURE-----

--- Comment #22 from Jeffrey A. Law <law at redhat dot com> 2011-01-26 16:40:32 
UTC ---
Patch attempt #3 is OK.  Please keep an eye out for complains about cc0 targets
not creating loop (dbra) insns.  That's my only worry.  I don't think it's
going to be a problem, but I can't completely rule it out.

Thanks for your patience,
Jeff

Reply via email to