On Wed, 30 Aug 2023 at 19:20, David Malcolm <dmalc...@redhat.com> wrote:
>
> On Wed, 2023-08-30 at 11:52 +0530, Prathamesh Kulkarni wrote:
> > On Wed, 30 Aug 2023 at 04:21, David Malcolm <dmalc...@redhat.com>
> > wrote:
> > >
> > > On Tue, 2023-08-29 at 11:01 +0530, Prathamesh Kulkarni wrote:
> > > > On Fri, 25 Aug 2023 at 18:15, David Malcolm via Gcc-patches
> > > > <gcc-patches@gcc.gnu.org> wrote:
> > > > >
> > > > > Successfully bootstrapped & regrtested on x86_64-pc-linux-gnu.
> > > > > Pushed to trunk as r14-3481-g99a3fcb8ff0bf2.
> > > > Hi David,
> > > > It seems the new tests FAIL on arm for LTO bootstrap config:
> > > > https://ci.linaro.org/job/tcwg_bootstrap_check--master-arm-check_bootstrap_lto-build/263/artifact/artifacts/06-check_regression/fails.sum/*view*/
> > >
> > > Sorry about this.
> > >
> > > Looking at e.g. the console.log.xz, I just see the status of the
> > > failing tests.
> > >
> > > Is there an easy way to get at the stderr from the tests without
> > > rerunning this?
> > >
> > > Otherwise, I'd appreciate help with reproducing this.
> > Hi David,
> > I have attached make check log for the failing tests.
> > To reproduce, I configured and built gcc with following options on
> > armv8 machine:
> > ../gcc/configure --enable-languages=c,c++,fortran --with-float=hard
> > --with-fpu=neon-fp-armv8 --with-mode=thumb --with-arch=armv8-a
> > --disable-werror --with-build-config=bootstrap-lto
> > make -j$(nproc)
>
> Thanks.
>
> Looks a lot like PR analyzer/110483, which I'm working on now (sorry!)
>
> What's the endianness of the host?
Little endian. It was built natively (host == target) on
armv8l-unknown-linux-gnueabihf.
>
>
> Specifically, the pertinent part of the log is:
>
> FAIL: gcc.dg/analyzer/out-of-bounds-diagram-17.c (test for excess errors)
> Excess errors:
>                            ┌─────┬─────┬────┬────┬────┐┌─────┬─────┬─────┐
>                            │ [1] │ [1] │[1] │[1] │[1] ││ [1] │ [1] │ [1] │
>                            ├─────┼─────┼────┼────┼────┤├─────┼─────┼─────┤
>                            │ ' ' │ 'w' │'o' │'r' │'l' ││ 'd' │ '!' │ NUL │
>                            ├─────┴─────┴────┴────┴────┴┴─────┴─────┴─────┤
>                            │      string literal (type: 'char[8]')       │
>                            └─────────────────────────────────────────────┘
>                               │     │    │    │    │      │     │     │
>                               │     │    │    │    │      │     │     │
>                               v     v    v    v    v      v     v     v
>   ┌─────┬────────────────────────────────────────┬────┐┌─────────────────┐
>   │ [0] │                  ...                   │[9] ││                 │
>   ├─────┴────────────────────────────────────────┴────┤│after valid range│
>   │             'buf' (type: 'char[10]')              ││                 │
>   └───────────────────────────────────────────────────┘└─────────────────┘
>   ├─────────────────────────┬─────────────────────────┤├────────┬────────┤
>                             │                                   │
>                   ╭─────────┴────────╮                ╭─────────┴─────────╮
>                   │capacity: 10 bytes│                │overflow of 3 bytes│
>                   ╰──────────────────╯                ╰───────────────────╯
>
> where the issue seems to be all those [1], which are meant to be index
> [0], [1], [2], etc.
Oh OK, thanks for the clarification!

Thanks,
Prathamesh
>
>
> Dave

Reply via email to