[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 Vittorio Zecca changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|--- |FIXED --- Comment #7 from Vittorio Zecca --- Resolved.
[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 Martin Liška changed: What|Removed |Added CC||marxin at gcc dot gnu.org --- Comment #6 from Martin Liška --- Can the bug be marked as resolved?
[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 --- Comment #5 from Jakub Jelinek --- Author: jakub Date: Tue Aug 16 16:48:16 2016 New Revision: 239507 URL: https://gcc.gnu.org/viewcvs?rev=239507&root=gcc&view=rev Log: PR middle-end/67485 * expmed.c (expand_mult_const): Change val_so_far's type to UHWI, only cast it to SHWI for the final comparison. * gcc.c-torture/compile/pr67485.c: New test. Added: trunk/gcc/testsuite/gcc.c-torture/compile/pr67485.c Modified: trunk/gcc/ChangeLog trunk/gcc/expmed.c trunk/gcc/testsuite/ChangeLog
[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 Jakub Jelinek changed: What|Removed |Added Status|NEW |ASSIGNED Assignee|unassigned at gcc dot gnu.org |jakub at gcc dot gnu.org --- Comment #4 from Jakub Jelinek --- Created attachment 39440 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=39440&action=edit gcc7-pr67485.patch Untested fix.
[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 Vittorio Zecca changed: What|Removed |Added Version|5.2.0 |7.0 --- Comment #3 from Vittorio Zecca --- Still in trunk: ~/1tb/vitti/local/gcc-7-undefined/bin/gcc -S gccerr28.c /home/vitti/1tb/vitti/test/gcc-trunk-239276/gcc/expmed.c:3115:15: runtime error: signed integer overflow: -9223372036854775808 - 1 cannot be represented in type 'long int [3]' expmed.c:3115 is ""val_so_far -= HOST_WIDE_INT_1 << log;
[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 Dominique d'Humieres changed: What|Removed |Added Status|UNCONFIRMED |NEW Last reconfirmed||2016-05-08 Ever confirmed|0 |1 --- Comment #2 from Dominique d'Humieres --- Confirmed also on trunk.
[Bug middle-end/67485] expmed.c sanitizer detects overflow
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67485 --- Comment #1 from Vittorio Zecca --- Still in 6.1.0 at line 3162 of expmed.c "val_so_far -= (HOST_WIDE_INT) 1 << log;" ../../gcc-6.1.0/gcc/expmed.c:3162:42: runtime error: signed integer overflow: -9223372036854775808 - 1 cannot be represented in type 'long int'