From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mgamail.intel.com (unknown [134.134.136.20]) by sourceware.org (Postfix) with ESMTPS id 961FE3858D39; Thu, 27 Jul 2023 19:16:36 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 961FE3858D39 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=ecsmtp.sh.intel.com Authentication-Results: sourceware.org; spf=none smtp.mailfrom=ecsmtp.sh.intel.com X-IronPort-AV: E=McAfee;i="6600,9927,10784"; a="358427422" X-IronPort-AV: E=Sophos;i="6.01,235,1684825200"; d="scan'208";a="358427422" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Jul 2023 12:16:35 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10784"; a="850906868" X-IronPort-AV: E=Sophos;i="6.01,235,1684825200"; d="scan'208";a="850906868" Received: from shvmail03.sh.intel.com ([10.239.245.20]) by orsmga004.jf.intel.com with ESMTP; 27 Jul 2023 12:16:32 -0700 Received: from shliclel4214.sh.intel.com (shliclel4214.sh.intel.com [10.239.240.214]) by shvmail03.sh.intel.com (Postfix) with ESMTP id 682691007825; Fri, 28 Jul 2023 03:16:32 +0800 (CST) Received: from shliclel4214.sh.intel.com (localhost [127.0.0.1]) by shliclel4214.sh.intel.com (8.16.1/8.12.8/MailSET/client) with ESMTP id 36RJGVnp293208; Fri, 28 Jul 2023 03:16:31 +0800 Received: (from haochenj@localhost) by shliclel4214.sh.intel.com (8.16.1/8.12.8/MailSET/Submit) id 36RJGVNA293207; Fri, 28 Jul 2023 03:16:31 +0800 From: "haochen.jiang" Message-Id: <202307271916.36RJGVNA293207@shliclel4214.sh.intel.com> Date: Fri, 28 Jul 2023 03:16:31 +0800 To: jwakely@redhat.com, gcc-regression@gcc.gnu.org, gcc-patches@gcc.gnu.org, haochen.jiang@intel.com Subject: [r14-2797 Regression] FAIL: 23_containers/vector/bool/110807.cc (test for excess errors) on Linux/x86_64 User-Agent: s-nail v14.9.22 X-Spam-Status: No, score=-0.4 required=5.0 tests=BAYES_00,KAM_DMARC_STATUS,KAM_LAZY_DOMAIN_SECURITY,KAM_NUMSUBJECT,MAY_BE_FORGED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE,TXREP,T_SCC_BODY_TEXT_LINE,URI_HEX autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On Linux/x86_64, 7931a1de9ec87b996d51d3d60786f5c81f63919f is the first bad commit commit 7931a1de9ec87b996d51d3d60786f5c81f63919f Author: Jonathan Wakely Date: Wed Jul 26 14:09:24 2023 +0100 libstdc++: Avoid bogus overflow warnings in std::vector [PR110807] caused FAIL: 23_containers/vector/bool/110807.cc (test for excess errors) with GCC configured with ../../gcc/configure --prefix=/export/users/haochenj/src/gcc-bisect/master/master/r14-2797/usr --enable-clocale=gnu --with-system-zlib --with-demangler-in-ld --with-fpmath=sse --enable-languages=c,c++,fortran --enable-cet --without-isl --enable-libmpx x86_64-linux --disable-bootstrap To reproduce: $ cd {build_dir}/x86_64-linux/libstdc++-v3/testsuite && make check RUNTESTFLAGS="conformance.exp=23_containers/vector/bool/110807.cc --target_board='unix{-m32}'" $ cd {build_dir}/x86_64-linux/libstdc++-v3/testsuite && make check RUNTESTFLAGS="conformance.exp=23_containers/vector/bool/110807.cc --target_board='unix{-m32\ -march=cascadelake}'" (Please do not reply to this email, for question about this report, contact me at haochen dot jiang at intel.com.) (If you met problems with cascadelake related, disabling AVX512F in command line might save that.) (However, please make sure that there is no potential problems with AVX512.)