From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 15728 invoked by alias); 19 Feb 2018 18:52:41 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 15710 invoked by uid 89); 19 Feb 2018 18:52:41 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-11.3 required=5.0 tests=AWL,BAYES_00,GIT_PATCH_2,GIT_PATCH_3,KAM_LAZY_DOMAIN_SECURITY,RCVD_IN_DNSWL_LOW,T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 spammy= X-HELO: mx1.redhat.com Received: from mx3-rdu2.redhat.com (HELO mx1.redhat.com) (66.187.233.73) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Mon, 19 Feb 2018 18:52:39 +0000 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B0049EAEBD; Mon, 19 Feb 2018 18:52:27 +0000 (UTC) Received: from tucnak.zalov.cz (ovpn-204-85.brq.redhat.com [10.40.204.85]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 66FA61006EA3; Mon, 19 Feb 2018 18:52:27 +0000 (UTC) Received: from tucnak.zalov.cz (localhost [127.0.0.1]) by tucnak.zalov.cz (8.15.2/8.15.2) with ESMTP id w1JIqO1Q025061; Mon, 19 Feb 2018 19:52:25 +0100 Received: (from jakub@localhost) by tucnak.zalov.cz (8.15.2/8.15.2/Submit) id w1JIqO8o025059; Mon, 19 Feb 2018 19:52:24 +0100 Date: Mon, 19 Feb 2018 18:52:00 -0000 From: Jakub Jelinek To: gcc-patches@gcc.gnu.org Cc: Martin Sebor Subject: [committed] Fix overload15.C testcase (PR c++/79064) Message-ID: <20180219185224.GM5867@tucnak> Reply-To: Jakub Jelinek MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.1 (2017-09-22) X-IsSubscribed: yes X-SW-Source: 2018-02/txt/msg01112.txt.bz2 Hi! The testcase that has been committed for this PR doesn't work on ilp32 targets, because both 0u - 1 and 0u - 1l are there 0xffffffffu. The testcase originally filed had proper 0u - 1ll in the second case, which works on all targets where long long is wider than int (not aware of any target we support where that wouldn't be true right now). Tested on x86_64-linux, -m32/-m64, committed to trunk as obvious. 2018-02-19 Jakub Jelinek PR c++/79064 * g++.dg/template/overload15.C (f): Use 0u - 1ll instead of 0u - 1l. --- gcc/testsuite/g++.dg/template/overload15.C.jj 2018-02-16 23:37:28.682364104 +0100 +++ gcc/testsuite/g++.dg/template/overload15.C 2018-02-19 19:45:48.771094113 +0100 @@ -5,7 +5,7 @@ template void f (char (*)[0u - 1 > N ? 1 : 7]); template -void f (char (*)[0u - 1l > N ? 1 : 7]); +void f (char (*)[0u - 1ll > N ? 1 : 7]); void f () { Jakub