Blame SOURCES/gcc48-rh1469697-20.patch

5ed81e
5ed81e
            * explow.c (anti_adjust_stack_and_probe_stack_clash): Avoid probing
5ed81e
            the red zone for stack_clash_protection_final_dynamic_probe targets
5ed81e
            when the total dynamic stack size is zero bytes.
5ed81e
    
5ed81e
diff -Nrup a/gcc/explow.c b/gcc/explow.c
5ed81e
--- a/gcc/explow.c	2017-11-14 23:33:15.403557607 -0700
5ed81e
+++ b/gcc/explow.c	2017-11-14 23:33:56.243239120 -0700
5ed81e
@@ -1934,6 +1934,13 @@ anti_adjust_stack_and_probe_stack_clash
5ed81e
   if (size != CONST0_RTX (Pmode)
5ed81e
       && targetm.stack_clash_protection_final_dynamic_probe (residual))
5ed81e
     {
5ed81e
+      /* SIZE could be zero at runtime and in that case *sp could hold
5ed81e
+	 live data.  Furthermore, we don't want to probe into the red
5ed81e
+	 zone.
5ed81e
+
5ed81e
+	 Go ahead and just guard a probe at *sp on SIZE != 0 at runtime
5ed81e
+	 if SIZE is not a compile time constant.  */
5ed81e
+
5ed81e
       /* Ideally we would just probe at *sp.  However, if SIZE is not
5ed81e
 	 a compile-time constant, but is zero at runtime, then *sp
5ed81e
 	 might hold live data.  So probe at *sp if we know that
5ed81e
@@ -1946,9 +1953,12 @@ anti_adjust_stack_and_probe_stack_clash
5ed81e
 	}
5ed81e
       else
5ed81e
 	{
5ed81e
-	  emit_stack_probe (plus_constant (Pmode, stack_pointer_rtx,
5ed81e
-					   -GET_MODE_SIZE (word_mode)));
5ed81e
+	  rtx label = gen_label_rtx ();
5ed81e
+	  emit_cmp_and_jump_insns (size, CONST0_RTX (GET_MODE (size)),
5ed81e
+				   EQ, NULL_RTX, Pmode, 1, label);
5ed81e
+	  emit_stack_probe (stack_pointer_rtx);
5ed81e
 	  emit_insn (gen_blockage ());
5ed81e
+	  emit_label (label);
5ed81e
 	}
5ed81e
     }
5ed81e
 }