[Bug sanitizer/108995] Missed signed integer overflow checks in UBsan? since r8-343-g2bf54d93f159210d

2023-03-09 Thread cvs-commit at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108995 --- Comment #4 from CVS Commits --- The master branch has been updated by Richard Biener : https://gcc.gnu.org/g:ace65db9215882b95e2ead1bb0dc8c54c2ea69be commit r13-6550-gace65db9215882b95e2ead1bb0dc8c54c2ea69be Author: Richard Biener Date:

[Bug sanitizer/108995] Missed signed integer overflow checks in UBsan? since r8-343-g2bf54d93f159210d

2023-03-09 Thread rguenth at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108995 Richard Biener changed: What|Removed |Added Status|NEW |ASSIGNED Assignee|unassigned

[Bug sanitizer/108995] Missed signed integer overflow checks in UBsan? since r8-343-g2bf54d93f159210d

2023-03-06 Thread rguenth at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108995 --- Comment #2 from Richard Biener --- We already fold this on GENERIC to *c = -229690488(OVF); with optimization and *c = (int) b * 10921; without. It's almost surely through extract_muldiv, we also diagnose t.c: In function ‘main’: t

[Bug sanitizer/108995] Missed signed integer overflow checks in UBsan? since r8-343-g2bf54d93f159210d

2023-03-06 Thread marxin at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108995 Martin Liška changed: What|Removed |Added Summary|Missed signed integer |Missed signed integer