From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from xry111.site (xry111.site [89.208.246.23]) by sourceware.org (Postfix) with ESMTPS id B6B823858CDA for ; Tue, 11 Jul 2023 08:12:37 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org B6B823858CDA Authentication-Results: sourceware.org; dmarc=pass (p=reject dis=none) header.from=xry111.site Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=xry111.site DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xry111.site; s=default; t=1689063156; bh=3qaNmAH2/bVFK3xCcNsOnP+TOGFrM1MHjiqygSaAz1U=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=FVlCER0sV0myxcwtT1HmAulqASIuE/OG1Go2aEe8oAiHOkPAzeZ1IaxlGLhTyKezm p6idwgHCqAI1JeYLng6/hON2H1kPxBHk52eEiffE+HwotFfNtNlUJVXTGvttAiD/Uk 6UjSLD1f9ZD9pgaTiXYbKdO/GEqF+TcsxiYvdEC8= Received: from [IPv6:240e:358:11c0:7200:dc73:854d:832e:2] (unknown [IPv6:240e:358:11c0:7200:dc73:854d:832e:2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-384) server-digest SHA384) (Client did not present a certificate) (Authenticated sender: xry111@xry111.site) by xry111.site (Postfix) with ESMTPSA id 3DD25663DE; Tue, 11 Jul 2023 04:12:32 -0400 (EDT) Message-ID: <2a5b1036e11476a31c79b0c9d53cca3d7bbe7db2.camel@xry111.site> Subject: [PATCH pushed] testsuite: Unbreak pr110557.cc where long is 32-bit (was Re: Pushed: [PATCH v2] vect: Fix vectorized BIT_FIELD_REF for signed bit-fields [PR110557]) From: Xi Ruoyao To: Prathamesh Kulkarni Cc: Richard Biener , gcc-patches@gcc.gnu.org, Andre Vieira , Jakub Jelinek , Hongtao Liu Date: Tue, 11 Jul 2023 16:12:26 +0800 In-Reply-To: References: <20230707131857.2386125-2-xry111@xry111.site> Content-Type: multipart/mixed; boundary="=-FXdmuxMuu0D4DgXUB61L" User-Agent: Evolution 3.48.4 MIME-Version: 1.0 X-Spam-Status: No, score=-9.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,KAM_SHORT,LIKELY_SPAM_FROM,SPF_HELO_PASS,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: --=-FXdmuxMuu0D4DgXUB61L Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Tue, 2023-07-11 at 13:04 +0530, Prathamesh Kulkarni wrote: /* snip */ > Hi Xi, > Your commit: > https://gcc.gnu.org/git/?p=3Dgcc.git;a=3Dcommit;h=3D63ae6bc60c0f67fb27919= 91bf4b6e7e0a907d420, >=20 > seems to cause following regressions on arm-linux-gnueabihf: > FAIL: g++.dg/vect/pr110557.cc=C2=A0 -std=3Dc++98 (test for excess errors) > FAIL: g++.dg/vect/pr110557.cc=C2=A0 -std=3Dc++14 (test for excess errors) > FAIL: g++.dg/vect/pr110557.cc=C2=A0 -std=3Dc++17 (test for excess errors) > FAIL: g++.dg/vect/pr110557.cc=C2=A0 -std=3Dc++20 (test for excess errors) >=20 > Excess error: > gcc/testsuite/g++.dg/vect/pr110557.cc:12:8: warning: width of > 'Item::y' exceeds its type Ah sorry, I didn't consider ports with 32-bit long. The attached patch should fix the issue. It has been tested and pushed r14-2427 and r13-7555. --=20 Xi Ruoyao School of Aerospace Science and Technology, Xidian University --=-FXdmuxMuu0D4DgXUB61L Content-Disposition: attachment; filename="0001-testsuite-Unbreak-pr110557.cc-where-long-is-32-bit.patch" Content-Type: text/x-patch; name="0001-testsuite-Unbreak-pr110557.cc-where-long-is-32-bit.patch"; charset="UTF-8" Content-Transfer-Encoding: base64 RnJvbSAzMTI4Mzk2NTNiODI5NTU5OWM2M2NhZTkwMjc4YTg3YWY1MjhlZGFkIE1vbiBTZXAgMTcg MDA6MDA6MDAgMjAwMQpGcm9tOiBYaSBSdW95YW8gPHhyeTExMUB4cnkxMTEuc2l0ZT4KRGF0ZTog VHVlLCAxMSBKdWwgMjAyMyAxNTo1NTo1NCArMDgwMApTdWJqZWN0OiBbUEFUQ0hdIHRlc3RzdWl0 ZTogVW5icmVhayBwcjExMDU1Ny5jYyB3aGVyZSBsb25nIGlzIDMyLWJpdAoKT24gcG9ydHMgd2l0 aCAzMi1iaXQgbG9uZywgdGhlIHRlc3QgcHJvZHVjZWQgZXhjZXNzIGVycm9yczoKCiAgICBnY2Mv dGVzdHN1aXRlL2crKy5kZy92ZWN0L3ByMTEwNTU3LmNjOjEyOjg6IHdhcm5pbmc6IHdpZHRoIG9m CiAgICAnSXRlbTo6eScgZXhjZWVkcyBpdHMgdHlwZQoKUmVwb3J0ZWQtYnk6IFByYXRoYW1lc2gg S3Vsa2FybmkgPHByYXRoYW1lc2gua3Vsa2FybmlAbGluYXJvLm9yZz4KCmdjYy90ZXN0c3VpdGUv Q2hhbmdlTG9nOgoKCSogZysrLmRnL3ZlY3QvcHIxMTA1NTcuY2M6IFVzZSBsb25nIGxvbmcgaW5z dGVhZCBvZiBsb25nIGZvcgoJNjQtYml0IHR5cGUuCgkodGVzdCk6IFJlbW92ZSBhbiB1bm5lY2Vz c2FyeSBjYXN0LgotLS0KIGdjYy90ZXN0c3VpdGUvZysrLmRnL3ZlY3QvcHIxMTA1NTcuY2MgfCAx NCArKysrKysrKy0tLS0tLQogMSBmaWxlIGNoYW5nZWQsIDggaW5zZXJ0aW9ucygrKSwgNiBkZWxl dGlvbnMoLSkKCmRpZmYgLS1naXQgYS9nY2MvdGVzdHN1aXRlL2crKy5kZy92ZWN0L3ByMTEwNTU3 LmNjIGIvZ2NjL3Rlc3RzdWl0ZS9nKysuZGcvdmVjdC9wcjExMDU1Ny5jYwppbmRleCBlMWZiZTFj YWFjNC4uZWZmYjY3ZTJkZjMgMTAwNjQ0Ci0tLSBhL2djYy90ZXN0c3VpdGUvZysrLmRnL3ZlY3Qv cHIxMTA1NTcuY2MKKysrIGIvZ2NjL3Rlc3RzdWl0ZS9nKysuZGcvdmVjdC9wcjExMDU1Ny5jYwpA QCAtMSw3ICsxLDkgQEAKIC8vIHsgZGctYWRkaXRpb25hbC1vcHRpb25zICItbWF2eCIgeyB0YXJn ZXQgeyBhdnhfcnVudGltZSB9IH0gfQogCi1zdGF0aWMgaW5saW5lIGxvbmcKLW1pbiAobG9uZyBh LCBsb25nIGIpCit0eXBlZGVmIGxvbmcgbG9uZyBpNjQ7CisKK3N0YXRpYyBpbmxpbmUgaTY0Citt aW4gKGk2NCBhLCBpNjQgYikKIHsKICAgcmV0dXJuIGEgPCBiID8gYSA6IGI7CiB9CkBAIC05LDE2 ICsxMSwxNiBAQCBtaW4gKGxvbmcgYSwgbG9uZyBiKQogc3RydWN0IEl0ZW0KIHsKICAgaW50IHgg OiA4OwotICBsb25nIHkgOiA1NTsKKyAgaTY0IHkgOiA1NTsKICAgYm9vbCB6IDogMTsKIH07CiAK LV9fYXR0cmlidXRlX18gKChub2lwYSkpIGxvbmcKK19fYXR0cmlidXRlX18gKChub2lwYSkpIGk2 NAogdGVzdCAoSXRlbSAqYSwgaW50IGNudCkKIHsKLSAgbG9uZyBzaXplID0gMDsKKyAgaTY0IHNp emUgPSAwOwogICBmb3IgKGludCBpID0gMDsgaSA8IGNudDsgaSsrKQotICAgIHNpemUgPSBtaW4g KChsb25nKWFbaV0ueSwgc2l6ZSk7CisgICAgc2l6ZSA9IG1pbiAoYVtpXS55LCBzaXplKTsKICAg cmV0dXJuIHNpemU7CiB9CiAKLS0gCjIuNDEuMAoK --=-FXdmuxMuu0D4DgXUB61L--