This is the mail archive of the
gcc-patches@gcc.gnu.org
mailing list for the GCC project.
Re: [PATCH] Fix fallout from VRP strict-overflow changes
- From: Andreas Schwab <schwab at linux-m68k dot org>
- To: Richard Biener <rguenther at suse dot de>
- Cc: gcc-patches at gcc dot gnu dot org
- Date: Sat, 19 Aug 2017 00:04:11 +0200
- Subject: Re: [PATCH] Fix fallout from VRP strict-overflow changes
- Authentication-results: sourceware.org; auth=none
- References: <alpine.LSU.2.20.1708170914020.14191@zhemvz.fhfr.qr>
On Aug 17 2017, Richard Biener <rguenther@suse.de> wrote:
> I was notifed I broke proper handling of undefined overflow in
> multiplicative ops handling. The following resurrects previous
> behavior (and adds a testcase).
>
> Bootstrapped and tested on x86_64-unknown-linux-gnu, applied to trunk.
This breaks gfortran.dg/alloc_comp_auto_array_2.f90 on aarch64 with
-mabi=ilp32 (only for -O3):
FAIL: gfortran.dg/alloc_comp_auto_array_2.f90 -O3 -g (test for excess errors)
Excess errors:
/opt/gcc/gcc-20170818/gcc/testsuite/gfortran.dg/alloc_comp_auto_array_2.f90:33:0: Warning: '__builtin_memcpy' specified size between 2147483648 and 4294967295 exceeds maximum object size 2147483647 [-Wstringop-overflow=]
Andreas.
--
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5
"And now for something completely different."