Hi all, Could a gatekeeper review the attached patch for bug #880?
This is caused by new rev3753, in follwoing code "TCON_R10" is only defined at x8664, so this will break other targets build. Modified: trunk/osprey/be/opt/opt_vn_expr.cxx =================================================================== --- trunk/osprey/be/opt/opt_vn_expr.cxx 2011-10-08 13:26:04 UTC (rev 3752) +++ trunk/osprey/be/opt/opt_vn_expr.cxx 2011-10-09 05:17:57 UTC (rev 3753) @@ -651,6 +651,9 @@ else if (this_mty == MTYPE_F4 && TCON_R4(other_tcon) == 0 && TCON_R4(_tcon) == 0) truth = TCON_word0(other_tcon) == TCON_word0(_tcon); + else if (this_mty == MTYPE_F10 && + TCON_R10(other_tcon) == 0 && TCON_R10(_tcon) == 0) + truth = TCON_v2(other_tcon) == TCON_v2(_tcon); #endif else { BOOL folded; The fix is to make a new fun "Targ_Is_Neg_Zero" for each target to determine whether the const is -0.0, just like "Targ_Is_Zero". Thanks zhuqing
bug880.diff
Description: Binary data
------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________ Open64-devel mailing list Open64-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/open64-devel