This is the mail archive of the
gcc-bugs@gcc.gnu.org
mailing list for the GCC project.
[Bug target/85434] Address of stack protector guard spilled to stack on ARM
- From: "clyon at gcc dot gnu.org" <gcc-bugzilla at gcc dot gnu dot org>
- To: gcc-bugs at gcc dot gnu dot org
- Date: Thu, 02 Aug 2018 12:25:37 +0000
- Subject: [Bug target/85434] Address of stack protector guard spilled to stack on ARM
- Auto-submitted: auto-generated
- References: <bug-85434-4@http.gcc.gnu.org/bugzilla/>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85434
Christophe Lyon <clyon at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |clyon at gcc dot gnu.org
--- Comment #19 from Christophe Lyon <clyon at gcc dot gnu.org> ---
Created attachment 44489
--> https://gcc.gnu.org/bugzilla/attachment.cgi?id=44489&action=edit
Source file causing ICE on aarch64
With your patch, GCC crashes with target aarch64-none-linux-gnu
aarch64-none-linux-gnu-gcc gethnamaddr.i -fstack-protector
during RTL pass: expand
gethnamaddr.c: In function 'getanswer':
gethnamaddr.c:179:1: internal compiler error: in maybe_gen_insn, at
optabs.c:7307
getanswer (const querybuf *answer, int anslen, const char *qname, int qtype)
^~~~~~~~~
0xafcef2 maybe_gen_insn(insn_code, unsigned int, expand_operand*)
/home/christophe.lyon/src/GCC/sources/gcc-fsf/trunk/gcc/optabs.c:7307
0xaffb88 maybe_expand_insn(insn_code, unsigned int, expand_operand*)
/home/christophe.lyon/src/GCC/sources/gcc-fsf/trunk/gcc/optabs.c:7351
0x7748a0 stack_protect_prologue
/home/christophe.lyon/src/GCC/sources/gcc-fsf/trunk/gcc/cfgexpand.c:6117
0x7748a0 execute
/home/christophe.lyon/src/GCC/sources/gcc-fsf/trunk/gcc/cfgexpand.c:6357
Please submit a full bug report,