From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id AC9B03858D20; Wed, 17 Apr 2024 11:00:02 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org AC9B03858D20 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1713351602; bh=KLnRHfCoMTthHN3wIkuCygVT6Y60uPiX//zPfC4u4z8=; h=From:To:Subject:Date:In-Reply-To:References:From; b=HyF/Ehjdx/6JzwdPV5g4L9CsZHu8+5cZLu8UjSwA+c5C2ulaAmSRI1zCMEkUsTdNd N9/LwJwSnt2NmxlpkvVRlq1njNbIxu+qFu3g9h7hYdseVtCMbkrdXLwj7IDU8CTF7/ chPkSnFSH5l4u6zf2AKBxCU4PbNTqba+QKFgrAoM= From: "rguenth at gcc dot gnu.org" To: gcc-bugs@gcc.gnu.org Subject: [Bug middle-end/114753] from_chars aborts with -m32 -ftrapv when passed -9223372036854775808 Date: Wed, 17 Apr 2024 11:00:01 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: middle-end X-Bugzilla-Version: 14.0 X-Bugzilla-Keywords: wrong-code X-Bugzilla-Severity: normal X-Bugzilla-Who: rguenth at gcc dot gnu.org X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 List-Id: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D114753 Richard Biener changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jakub at gcc dot gnu.org --- Comment #4 from Richard Biener --- #0 expand_binop (mode=3DE_DImode, binoptab=3Dsmulv_optab, op0=3D0x7ffff71b= 53f0,=20 op1=3D0x7ffff71b85a0, target=3D0x0, unsignedp=3D0, methods=3DOPTAB_LIB_= WIDEN) at /space/rguenther/src/gcc/gcc/optabs.cc:1497 #1 0x000000000116edf5 in expand_mult (mode=3DE_DImode, op0=3D0x7ffff71b53f= 0,=20 op1=3D0x7ffff71b85a0, target=3D0x0, unsignedp=3D0, no_libcall=3Dfalse) at /space/rguenther/src/gcc/gcc/expmed.cc:3610 #2 0x00000000011a38e0 in expand_expr_real_2 (ops=3D0x7fffffffcef0, target= =3D0x0,=20 tmode=3DE_DImode, modifier=3DEXPAND_NORMAL) at /space/rguenther/src/gcc/gcc/expr.cc:10275 #3 0x0000000001359608 in expand_mul_overflow (loc=3D2147483653,=20 lhs=3D, arg0=3D,=20 arg1=3D, unsr_p=3Dfalse, uns0_p=3Dfalse, uns1_= p=3Dtrue,=20 is_ubsan=3Dfalse, datap=3D0x0) at /space/rguenther/src/gcc/gcc/internal-fn.cc:2359 #4 0x000000000135b7f7 in expand_arith_overflow (code=3DMULT_EXPR,=20 stmt=3D) at /space/rguenther/src/gcc/gcc/internal-fn.cc:2827 #5 0x000000000135b9c3 in expand_MUL_OVERFLOW (stmt=3D0x7ffff7019f30) at /space/rguenther/src/gcc/gcc/internal-fn.cc:2876 so a hack would be to reset flag_trapv around 2354 For unsigned multiplication when high parts are both non-zero 2355 this overflows always. */ 2356 ops.code =3D MULT_EXPR; 2357 ops.op0 =3D make_tree (type, op0); 2358 ops.op1 =3D make_tree (type, op1); 2359 tem =3D expand_expr_real_2 (&ops, NULL_RTX, mode, EXPAND_NORMAL); in expand_mul_overflow.=