[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2023-03-31 Thread zhangboyang.id at gmail dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=24542 --- Comment #12 from Zhang Boyang --- Hi, Sorry for filled a duplicate bug. But I'd like to suggest reconsider this feature request. Here are two reasons: 1) "u64 = 1 << u32", "u64 = u32 * u32" are common mistakes in beginners, 2) These

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2023-03-31 Thread pinskia at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=24542 Andrew Pinski changed: What|Removed |Added CC||zhangboyang.id at gmail dot com ---

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2006-09-17 Thread pinskia at gcc dot gnu dot org
--- Comment #9 from pinskia at gcc dot gnu dot org 2006-09-18 00:18 --- We should never warn on multiply because it is just too crazy to. This is what debugging is about, debug your program for mistakes like this. -- pinskia at gcc dot gnu dot org changed: What

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2006-09-17 Thread alexey at hyperroll dot com
--- Comment #10 from alexey at hyperroll dot com 2006-09-18 05:48 --- (In reply to comment #9) We should never warn on multiply because it is just too crazy to. This is what debugging is about, debug your program for mistakes like this. The citation may be used to eliminate every

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2006-03-13 Thread alexey at hyperroll dot com
--- Comment #7 from alexey at hyperroll dot com 2006-03-13 21:49 --- (In reply to comment #6) So, who is actually going to fix the issue? -- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=24542

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2006-03-13 Thread pinskia at gcc dot gnu dot org
--- Comment #8 from pinskia at gcc dot gnu dot org 2006-03-13 21:52 --- (In reply to comment #7) So, who is actually going to fix the issue? If you want it fixed, you should update it to the mainline and then post the patch. -- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=24542

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2005-11-01 Thread pinskia at gcc dot gnu dot org
--- Comment #6 from pinskia at gcc dot gnu dot org 2005-11-01 22:29 --- (In reply to comment #5) Sir, it's my first report here, and I see the code first time. I hope that both comments #3 and #4 are not for me. Or am I mistaken? They were the person who was written the code.

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2005-10-26 Thread pinskia at gcc dot gnu dot org
--- Comment #3 from pinskia at gcc dot gnu dot org 2005-10-26 15:59 --- You should be patching the mainline as the C parser has changed to a non bison based parser. -- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=24542

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2005-10-26 Thread pinskia at gcc dot gnu dot org
--- Comment #4 from pinskia at gcc dot gnu dot org 2005-10-26 16:00 --- Please also make the warning conditional based on an option and make the option. -- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=24542

[Bug c/24542] potential integer overflow should be warned on assignment to wider variable

2005-10-26 Thread alexey at hyperroll dot com
--- Comment #5 from alexey at hyperroll dot com 2005-10-26 17:12 --- Sir, it's my first report here, and I see the code first time. I hope that both comments #3 and #4 are not for me. Or am I mistaken? Otherwise, what document (preferably, short) should I read to understand the