From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) by sourceware.org (Postfix) with ESMTP id 09AD43858026 for ; Wed, 20 Jan 2021 11:34:07 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 09AD43858026 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-524-pKyBMDWLPkKa0xOsWesEtQ-1; Wed, 20 Jan 2021 06:34:04 -0500 X-MC-Unique: pKyBMDWLPkKa0xOsWesEtQ-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 6312310054FF; Wed, 20 Jan 2021 11:34:03 +0000 (UTC) Received: from tucnak.zalov.cz (ovpn-112-64.ams2.redhat.com [10.36.112.64]) by smtp.corp.redhat.com (Postfix) with ESMTPS id BA9521D7; Wed, 20 Jan 2021 11:34:02 +0000 (UTC) Received: from tucnak.zalov.cz (localhost [127.0.0.1]) by tucnak.zalov.cz (8.16.1/8.16.1) with ESMTPS id 10KBY0BK1584339 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Wed, 20 Jan 2021 12:34:00 +0100 Received: (from jakub@localhost) by tucnak.zalov.cz (8.16.1/8.16.1/Submit) id 10KBXwTh1584338; Wed, 20 Jan 2021 12:33:58 +0100 Date: Wed, 20 Jan 2021 12:33:58 +0100 From: Jakub Jelinek To: Richard Biener Cc: gcc-patches@gcc.gnu.org, richard.sandiford@arm.com Subject: Re: [PATCH] Handle overflow in dependence analysis lambda ops gracefully Message-ID: <20210120113358.GP4020736@tucnak> Reply-To: Jakub Jelinek References: MIME-Version: 1.0 In-Reply-To: X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-6.4 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H4, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Jan 2021 11:34:08 -0000 On Wed, Jan 20, 2021 at 12:29:23PM +0100, Richard Biener wrote: > +/* Compute the product of signed A and B and indicate in *OVERFLOW whether > + that operation overflowed. */ > + > +inline HOST_WIDE_INT > +mul_hwi (HOST_WIDE_INT a, HOST_WIDE_INT b, bool *overflow) > +{ > + unsigned HOST_WIDE_INT result = a * (unsigned HOST_WIDE_INT)b; > + if (a != 0 && (HOST_WIDE_INT)result / a != b) > + *overflow = true; > + else > + *overflow = false; This isn't sufficiently bulletproof. It should be if ((a == -1 && b == HOST_WIDE_INT_MIN) || (a != 0 && (HOST_WIDE_INT)result / a != b)) *overflow = true; else *overflow = false; or so. And except that a == -1 && b == min checks my recent widening_mul changes should match that to __builtin_mul_overflow, so it will not be perfect code, but at least will not be unnecessarily slow on x86. Jakub