From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from xry111.site (xry111.site [IPv6:2001:470:683e::1]) by sourceware.org (Postfix) with ESMTPS id DD3FC3858D33 for ; Wed, 9 Nov 2022 13:58:46 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org DD3FC3858D33 Authentication-Results: sourceware.org; dmarc=pass (p=reject dis=none) header.from=xry111.site Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=xry111.site DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xry111.site; s=default; t=1668002324; bh=efC0OmBfVlSPCP9P2gdms5fbuXCJDP1MSNwq00hEvbo=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=TNQ+nGQYiB0u6qnTF/PwhYq1sJGtWcjRB5iUd7Ks9vS3NZbWTHXBUL1VUiZg1d+Jv kSLCIVC0TtEm/e1tdIKkYw7jD38n/zXVh0tySHJ38FU26mHhQXpiznPRLAgRjn4Wd/ 5TvLgV6gxv/bbEj2sCUcBa97lXjjy7BISWaW2ehQ= Received: from localhost.localdomain (xry111.site [IPv6:2001:470:683e::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-384) server-digest SHA384) (Client did not present a certificate) (Authenticated sender: xry111@xry111.site) by xry111.site (Postfix) with ESMTPSA id BE86F66887; Wed, 9 Nov 2022 08:58:43 -0500 (EST) Message-ID: Subject: Re: [COMMITTED] [range-op-float] Implement MINUS_EXPR. From: Xi Ruoyao To: Aldy Hernandez , GCC patches Cc: Jakub Jelinek , Andrew MacLeod Date: Wed, 09 Nov 2022 21:58:41 +0800 In-Reply-To: <8b9f17ccf291b5391ff5a872748b64d94682c8fb.camel@xry111.site> References: <20221109070758.1030615-1-aldyh@redhat.com> <20221109070758.1030615-2-aldyh@redhat.com> <8b9f17ccf291b5391ff5a872748b64d94682c8fb.camel@xry111.site> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.46.0 MIME-Version: 1.0 X-Spam-Status: No, score=-0.8 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FROM_SUSPICIOUS_NTLD,LIKELY_SPAM_FROM,PDS_OTHER_BAD_TLD,SPF_HELO_PASS,SPF_PASS,TXREP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On Wed, 2022-11-09 at 21:49 +0800, Xi Ruoyao wrote: > Hi Aldy, >=20 > This commit breaks the attached test case at -O2 on x86_64-linux-gnu and ^^^^^^^^^^^ Ah, not this one. I meant r13-3842 "Implement op[12]_range operators for PLUS_EXPR and MINUS_EXPR." > loongarch64-linux-gnu :(. >=20 > The code is simplified from Glibc: the breakage causes two Glibc test > failures on loongarch64-linux-gnu. >=20 > Reverting the commit can fix the breakage. ^^^^^^^^^^ also r13-3842. /* snip */ > > The op[12]_range entries will be submitted as a follow-up. --=20 Xi Ruoyao School of Aerospace Science and Technology, Xidian University