From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by sourceware.org (Postfix) with ESMTPS id 9642A3858D20; Wed, 12 Jul 2023 16:13:15 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 9642A3858D20 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=ecsmtp.sh.intel.com Authentication-Results: sourceware.org; spf=none smtp.mailfrom=ecsmtp.sh.intel.com X-IronPort-AV: E=McAfee;i="6600,9927,10769"; a="363799249" X-IronPort-AV: E=Sophos;i="6.01,200,1684825200"; d="scan'208";a="363799249" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jul 2023 09:13:13 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10769"; a="835206508" X-IronPort-AV: E=Sophos;i="6.01,200,1684825200"; d="scan'208";a="835206508" Received: from shvmail03.sh.intel.com ([10.239.245.20]) by fmsmga002.fm.intel.com with ESMTP; 12 Jul 2023 09:13:11 -0700 Received: from shliclel4214.sh.intel.com (shliclel4214.sh.intel.com [10.239.240.214]) by shvmail03.sh.intel.com (Postfix) with ESMTP id 42B791005626; Thu, 13 Jul 2023 00:13:11 +0800 (CST) Received: from shliclel4214.sh.intel.com (localhost [127.0.0.1]) by shliclel4214.sh.intel.com (8.16.1/8.12.8/MailSET/client) with ESMTP id 36CGDAZo1891726; Thu, 13 Jul 2023 00:13:10 +0800 Received: (from haochenj@localhost) by shliclel4214.sh.intel.com (8.16.1/8.12.8/MailSET/Submit) id 36CGDAcK1891725; Thu, 13 Jul 2023 00:13:10 +0800 From: "haochen.jiang" Message-Id: <202307121613.36CGDAcK1891725@shliclel4214.sh.intel.com> Date: Thu, 13 Jul 2023 00:13:10 +0800 To: xry111@xry111.site, gcc-regression@gcc.gnu.org, gcc-patches@gcc.gnu.org, haochen.jiang@intel.com Subject: [r14-2407 Regression] FAIL: g++.dg/vect/pr110557.cc -std=c++98 (test for excess errors) on Linux/x86_64 User-Agent: s-nail v14.9.22 X-Spam-Status: No, score=-0.5 required=5.0 tests=BAYES_00,KAM_DMARC_STATUS,KAM_LAZY_DOMAIN_SECURITY,KAM_NUMSUBJECT,SPF_HELO_NONE,SPF_NONE,TXREP,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On Linux/x86_64, 63ae6bc60c0f67fb2791991bf4b6e7e0a907d420 is the first bad commit commit 63ae6bc60c0f67fb2791991bf4b6e7e0a907d420 Author: Xi Ruoyao Date: Thu Jul 6 23:08:57 2023 +0800 vect: Fix vectorized BIT_FIELD_REF for signed bit-fields [PR110557] caused FAIL: g++.dg/vect/pr110557.cc -std=c++14 (test for excess errors) FAIL: g++.dg/vect/pr110557.cc -std=c++17 (test for excess errors) FAIL: g++.dg/vect/pr110557.cc -std=c++20 (test for excess errors) FAIL: g++.dg/vect/pr110557.cc -std=c++98 (test for excess errors) with GCC configured with ../../gcc/configure --prefix=/export/users/haochenj/src/gcc-bisect/master/master/r14-2407/usr --enable-clocale=gnu --with-system-zlib --with-demangler-in-ld --with-fpmath=sse --enable-languages=c,c++,fortran --enable-cet --without-isl --enable-libmpx x86_64-linux --disable-bootstrap To reproduce: $ cd {build_dir}/gcc && make check RUNTESTFLAGS="vect.exp=g++.dg/vect/pr110557.cc --target_board='unix{-m32}'" $ cd {build_dir}/gcc && make check RUNTESTFLAGS="vect.exp=g++.dg/vect/pr110557.cc --target_board='unix{-m32\ -march=cascadelake}'" (Please do not reply to this email, for question about this report, contact me at haochen dot jiang at intel.com.) (If you met problems with cascadelake related, disabling AVX512F in command line might save that.) (However, please make sure that there is no potential problems with AVX512.)