From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 1834 invoked by alias); 29 Apr 2009 17:29:43 -0000 Received: (qmail 1615 invoked by uid 22791); 29 Apr 2009 17:29:42 -0000 X-SWARE-Spam-Status: No, hits=-7.0 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_HI X-Spam-Check-By: sourceware.org Received: from cantor.suse.de (HELO mx1.suse.de) (195.135.220.2) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Wed, 29 Apr 2009 17:29:30 +0000 Received: from relay1.suse.de (relay-ext.suse.de [195.135.221.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.suse.de (Postfix) with ESMTP id 512185362F; Wed, 29 Apr 2009 19:29:27 +0200 (CEST) Date: Wed, 29 Apr 2009 17:41:00 -0000 From: Michael Matz To: Andreas Krebbel Cc: David Edelsohn , gcc-patches Subject: Re: [RFA] expand from SSA form (1/2) In-Reply-To: Message-ID: References: <303e1d290904270711s4c3d9ec3k5c0307bd99b9c90@mail.gmail.com> <303e1d290904270807g2dc51773y79d7f5b3e5a92d2a@mail.gmail.com> <303e1d290904271112l68094dbeq370e75624a12b1b2@mail.gmail.com> <303e1d290904280836x5a4b2363ye022cec1a2cb999b@mail.gmail.com> <303e1d290904281815q5cbbdedet74260a6437d1942c@mail.gmail.com> <49F8664A.50103@linux.vnet.ibm.com> <49F86F23.8060604@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-IsSubscribed: yes Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org X-SW-Source: 2009-04/txt/msg02367.txt.bz2 On Wed, 29 Apr 2009, Michael Matz wrote: > The machine is online again, so I had a look. cprop creates this > sharing, but it seems it's a preexisting bug (no idea why it didn't > trigger before). Bah, wires crossing :-) I retract the unsharing patch then. Ciao, Michael.