Blame SOURCES/gcc48-rh1469697-20.patch

56d343
56d343
            * explow.c (anti_adjust_stack_and_probe_stack_clash): Avoid probing
56d343
            the red zone for stack_clash_protection_final_dynamic_probe targets
56d343
            when the total dynamic stack size is zero bytes.
56d343
    
56d343
diff -Nrup a/gcc/explow.c b/gcc/explow.c
56d343
--- a/gcc/explow.c	2017-11-14 23:33:15.403557607 -0700
56d343
+++ b/gcc/explow.c	2017-11-14 23:33:56.243239120 -0700
56d343
@@ -1934,6 +1934,13 @@ anti_adjust_stack_and_probe_stack_clash
56d343
   if (size != CONST0_RTX (Pmode)
56d343
       && targetm.stack_clash_protection_final_dynamic_probe (residual))
56d343
     {
56d343
+      /* SIZE could be zero at runtime and in that case *sp could hold
56d343
+	 live data.  Furthermore, we don't want to probe into the red
56d343
+	 zone.
56d343
+
56d343
+	 Go ahead and just guard a probe at *sp on SIZE != 0 at runtime
56d343
+	 if SIZE is not a compile time constant.  */
56d343
+
56d343
       /* Ideally we would just probe at *sp.  However, if SIZE is not
56d343
 	 a compile-time constant, but is zero at runtime, then *sp
56d343
 	 might hold live data.  So probe at *sp if we know that
56d343
@@ -1946,9 +1953,12 @@ anti_adjust_stack_and_probe_stack_clash
56d343
 	}
56d343
       else
56d343
 	{
56d343
-	  emit_stack_probe (plus_constant (Pmode, stack_pointer_rtx,
56d343
-					   -GET_MODE_SIZE (word_mode)));
56d343
+	  rtx label = gen_label_rtx ();
56d343
+	  emit_cmp_and_jump_insns (size, CONST0_RTX (GET_MODE (size)),
56d343
+				   EQ, NULL_RTX, Pmode, 1, label);
56d343
+	  emit_stack_probe (stack_pointer_rtx);
56d343
 	  emit_insn (gen_blockage ());
56d343
+	  emit_label (label);
56d343
 	}
56d343
     }
56d343
 }