public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug rtl-optimization/104843] New: signed overflow in compute_const_anchors, at cse.cc:1180
@ 2022-03-08 18:03 xry111 at mengyan1223 dot wang
  2022-03-08 18:04 ` [Bug rtl-optimization/104843] " xry111 at mengyan1223 dot wang
  2023-07-10 20:46 ` xry111 at gcc dot gnu.org
  0 siblings, 2 replies; 3+ messages in thread
From: xry111 at mengyan1223 dot wang @ 2022-03-08 18:03 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104843

            Bug ID: 104843
           Summary: signed overflow in compute_const_anchors, at
                    cse.cc:1180
           Product: gcc
           Version: 12.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: rtl-optimization
          Assignee: unassigned at gcc dot gnu.org
          Reporter: xry111 at mengyan1223 dot wang
  Target Milestone: ---

Bootstrapping GCC on mips64el with a WIP patch for sanitizer support and
bootstrap-ubsan produces:

../../gcc/gcc/cse.cc:1180:19: runtime error: signed integer overflow:
9223372036854775807 - -9223372036854775808 cannot be represented in type 'long
int'

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2023-07-10 20:46 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-08 18:03 [Bug rtl-optimization/104843] New: signed overflow in compute_const_anchors, at cse.cc:1180 xry111 at mengyan1223 dot wang
2022-03-08 18:04 ` [Bug rtl-optimization/104843] " xry111 at mengyan1223 dot wang
2023-07-10 20:46 ` xry111 at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).