From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 29716 invoked by alias); 22 Oct 2008 16:29:25 -0000 Received: (qmail 28273 invoked by uid 48); 22 Oct 2008 16:28:05 -0000 Date: Wed, 22 Oct 2008 16:29:00 -0000 Message-ID: <20081022162805.28272.qmail@sourceware.org> X-Bugzilla-Reason: CC References: Subject: [Bug rtl-optimization/37889] [4.3/4.4 Regression] SEGV, conditional execution proactively executed the false arm. In-Reply-To: Reply-To: gcc-bugzilla@gcc.gnu.org To: gcc-bugs@gcc.gnu.org From: "jakub at gcc dot gnu dot org" Mailing-List: contact gcc-bugs-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-bugs-owner@gcc.gnu.org X-SW-Source: 2008-10/txt/msg01461.txt.bz2 ------- Comment #5 from jakub at gcc dot gnu dot org 2008-10-22 16:28 ------- If the array has known bounds, we could say that accesses above bounds trap and likely it wouldn't hurt much. But for extern const char *reg_names[]; where we don't know the bounds, we'd have to assume the worst, i.e. that all indexes may trap. I'm afraid that's going to penalize quite some code. -- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=37889