On Tue, 27 Mar 2012, Eric Botcazou wrote:
Bootstrapped/regtested on x86_64-suse-linux, applied on mainline. Should
it be applied to the release branches as well?
2012-03-26 Eric Botcazou ebotca...@adacore.com
PR rtl-optimization/52629
* reload1.c (count_pseudo):
What's the impact of this bug? If it is a wrong-code or ice-on-valid
bug then it's ok for the 4.7 branch.
Neither, it's an out-of-bounds memory access in reload1.c with apparently no
visible effects as it has been introduced with IRA (4.4 series).
--
Eric Botcazou
Bootstrapped/regtested on x86_64-suse-linux, applied on mainline. Should
it be applied to the release branches as well?
2012-03-26 Eric Botcazou ebotca...@adacore.com
PR rtl-optimization/52629
* reload1.c (count_pseudo): Short-circuit common case.
This is an out-of-bounds access in count_spilled_pseudo: we can enter the
function for a pseudo without hard reg but we immediately use the hard reg
number as an index:
static void
count_spilled_pseudo (int spilled, int spilled_nregs, int reg)
{
int freq = REG_FREQ (reg);
int r =