From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 13059 invoked by alias); 19 Sep 2013 20:43:20 -0000 Mailing-List: contact gcc-bugs-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-bugs-owner@gcc.gnu.org Received: (qmail 13018 invoked by uid 48); 19 Sep 2013 20:43:17 -0000 From: "martin at netbsd dot org" To: gcc-bugs@gcc.gnu.org Subject: [Bug target/58442] bootstrapping vax crashes on NetBSD Date: Thu, 19 Sep 2013 20:43:00 -0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: target X-Bugzilla-Version: 4.8.1 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: martin at netbsd dot org X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-SW-Source: 2013-09/txt/msg01457.txt.bz2 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58442 --- Comment #4 from Martin Husemann --- I stared at the assembly a bit more (but my vax fu is weak): we are in the last line of 216 #line 781 "../../gcc-4.8.1/gcc/config/vax/vax.md" 217 ((INTVAL (operands[1]) == 8 || INTVAL (operands[1]) == 16) 218 && INTVAL (operands[2]) % INTVAL (operands[1]) == 0 219 && (REG_P (operands[0]) 220 || ! mode_dependent_address_p (XEXP (operands[0], 0), 221 MEM_ADDR_SPACE (operands[0]))))) and doing: 0x92cda2 : movl *0xef3cfc <_GLOBAL_OFFSET_TABLE_+1548>,r0 this is r0 = operands[0] MEM_ADDR_SPACE(RTX) is get_mem_attrs (RTX)->addrspace) so we do the call: 0x92cda9 : pushl r0 0x92cdab : calls $0x1,0x92c99e and apparently get_mem_attrs(operand[0]) returned 4, which we then deref to ->addrspace and crash.