GNU bug report logs - #50609
number overflow

Previous Next

Package: guile;

Reported by: Stefan Israelsson Tampe <stefan.itampe <at> gmail.com>

Date: Wed, 15 Sep 2021 19:13:01 UTC

Severity: normal

Done: lloda <lloda <at> sarc.name>

Bug is archived. No further changes may be made.

To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 50609 in the body.
You can then email your comments to 50609 AT debbugs.gnu.org in the normal way.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to bug-guile <at> gnu.org:
bug#50609; Package guile. (Wed, 15 Sep 2021 19:13:01 GMT) Full text and rfc822 format available.

Acknowledgement sent to Stefan Israelsson Tampe <stefan.itampe <at> gmail.com>:
New bug report received and forwarded. Copy sent to bug-guile <at> gnu.org. (Wed, 15 Sep 2021 19:13:01 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: Stefan Israelsson Tampe <stefan.itampe <at> gmail.com>
To: bug-guile <at> gnu.org
Subject: number overflow
Date: Wed, 15 Sep 2021 21:12:13 +0200
[Message part 1 (text/plain, inline)]
This does not compile on guile 3.0.7,

(define (f . l)
  (let lp2 ((i 0) (s 0) (l l))
    (if (and (pair? l) (< i 64))
         (lp2 (+ i 1) (if (car l) (logior (ash 1 i) s) s) (cdr l))
         s)))

While compiling expression:
Throw to key `numerical-overflow' with args `("ash" "Numerical ove
rflow" #f #f)'.
[Message part 2 (text/html, inline)]

Information forwarded to bug-guile <at> gnu.org:
bug#50609; Package guile. (Thu, 04 Nov 2021 19:13:01 GMT) Full text and rfc822 format available.

Message #8 received at 50609 <at> debbugs.gnu.org (full text, mbox):

From: lloda <lloda <at> sarc.name>
To: 50609 <at> debbugs.gnu.org
Subject: Re: number overflow
Date: Thu, 4 Nov 2021 20:12:10 +0100
[Message part 1 (text/plain, inline)]
Not quite comfortable poking around in the compiler, but find a patch attached.

I also found this related bug: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32644.


[0001-Limit-the-range-of-ash-round-ash-count-argument-to-I.patch (application/octet-stream, attachment)]
[0002-Avoid-ash-with-arguments-that-might-overflow-in-lang.patch (application/octet-stream, attachment)]
[Message part 4 (text/plain, inline)]


Reply sent to lloda <lloda <at> sarc.name>:
You have taken responsibility. (Fri, 05 Nov 2021 16:37:01 GMT) Full text and rfc822 format available.

Notification sent to Stefan Israelsson Tampe <stefan.itampe <at> gmail.com>:
bug acknowledged by developer. (Fri, 05 Nov 2021 16:37:01 GMT) Full text and rfc822 format available.

Message #13 received at 50609-done <at> debbugs.gnu.org (full text, mbox):

From: lloda <lloda <at> sarc.name>
To: 50609-done <at> debbugs.gnu.org
Subject: Re: number overflow
Date: Fri, 5 Nov 2021 17:35:56 +0100
I've applied the patch in c6b1171c6b5632ac04120f482af786444e17d3fe. Thanks for the report!





bug archived. Request was from Debbugs Internal Request <help-debbugs <at> gnu.org> to internal_control <at> debbugs.gnu.org. (Sat, 04 Dec 2021 12:24:05 GMT) Full text and rfc822 format available.

This bug report was last modified 2 years and 355 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.