Cover Letter Detail
Show a cover letter.
GET /api/covers/2228662/?format=api
{ "id": 2228662, "url": "http://patchwork.ozlabs.org/api/covers/2228662/?format=api", "web_url": "http://patchwork.ozlabs.org/project/gcc/cover/20260427080642.371531-1-artemiy.volkov@arm.com/", "project": { "id": 17, "url": "http://patchwork.ozlabs.org/api/projects/17/?format=api", "name": "GNU Compiler Collection", "link_name": "gcc", "list_id": "gcc-patches.gcc.gnu.org", "list_email": "gcc-patches@gcc.gnu.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260427080642.371531-1-artemiy.volkov@arm.com>", "list_archive_url": null, "date": "2026-04-27T08:06:07", "name": "[0/4] aarch64: vector initialization improvements", "submitter": { "id": 91911, "url": "http://patchwork.ozlabs.org/api/people/91911/?format=api", "name": "Artemiy Volkov", "email": "artemiy.volkov@arm.com" }, "mbox": "http://patchwork.ozlabs.org/project/gcc/cover/20260427080642.371531-1-artemiy.volkov@arm.com/mbox/", "series": [ { "id": 501601, "url": "http://patchwork.ozlabs.org/api/series/501601/?format=api", "web_url": "http://patchwork.ozlabs.org/project/gcc/list/?series=501601", "date": "2026-04-27T08:06:07", "name": "aarch64: vector initialization improvements", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501601/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2228662/comments/", "headers": { "Return-Path": "<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "gcc-patches@gcc.gnu.org" ], "Delivered-To": [ "patchwork-incoming@legolas.ozlabs.org", "gcc-patches@gcc.gnu.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=SyxMpVvO;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=SyxMpVvO;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)", "sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=SyxMpVvO;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=SyxMpVvO", "sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com", "sourceware.org; spf=pass smtp.mailfrom=arm.com", "server2.sourceware.org;\n arc=pass smtp.remote-ip=40.107.159.71" ], "Received": [ "from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g3x666Cbgz1yHv\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 27 Apr 2026 18:08:46 +1000 (AEST)", "from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id E742E4B99F6C\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 27 Apr 2026 08:08:44 +0000 (GMT)", "from OSPPR02CU001.outbound.protection.outlook.com\n (mail-norwayeastazon11013071.outbound.protection.outlook.com [40.107.159.71])\n by sourceware.org (Postfix) with ESMTPS id 340524BABF0B\n for <gcc-patches@gcc.gnu.org>; Mon, 27 Apr 2026 08:08:14 +0000 (GMT)", "from AS4PR09CA0025.eurprd09.prod.outlook.com (2603:10a6:20b:5d4::15)\n by AS8PR08MB7838.eurprd08.prod.outlook.com (2603:10a6:20b:529::11)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.26; Mon, 27 Apr\n 2026 08:08:06 +0000", "from AM3PEPF00009B9E.eurprd04.prod.outlook.com\n (2603:10a6:20b:5d4:cafe::f3) by AS4PR09CA0025.outlook.office365.com\n (2603:10a6:20b:5d4::15) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.26 via Frontend Transport; Mon,\n 27 Apr 2026 08:08:06 +0000", "from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AM3PEPF00009B9E.mail.protection.outlook.com (10.167.16.23) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.18\n via Frontend Transport; Mon, 27 Apr 2026 08:08:05 +0000", "from AS4PR09CA0006.eurprd09.prod.outlook.com (2603:10a6:20b:5e0::16)\n by PAWPR08MB9030.eurprd08.prod.outlook.com (2603:10a6:102:342::5)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.26; Mon, 27 Apr\n 2026 08:06:58 +0000", "from AM2PEPF0001C710.eurprd05.prod.outlook.com\n (2603:10a6:20b:5e0:cafe::81) by AS4PR09CA0006.outlook.office365.com\n (2603:10a6:20b:5e0::16) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.26 via Frontend Transport; Mon,\n 27 Apr 2026 08:06:58 +0000", "from nebula.arm.com (172.205.89.229) by\n AM2PEPF0001C710.mail.protection.outlook.com (10.167.16.180) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9846.18 via Frontend Transport; Mon, 27 Apr 2026 08:06:58 +0000", "from AZ-NEU-EX03.Arm.com (10.240.25.137) by AZ-NEU-EX03.Arm.com\n (10.240.25.137) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.29; Mon, 27 Apr\n 2026 08:06:57 +0000", "from ip-10-249-56-202.eu-west-1.compute.internal (10.249.56.202) by\n mail.arm.com (10.240.25.137) with Microsoft SMTP Server id\n 15.2.2562.29 via Frontend Transport; Mon, 27 Apr 2026 08:06:57 +0000" ], "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 sourceware.org E742E4B99F6C", "OpenDKIM Filter v2.11.0 sourceware.org 340524BABF0B" ], "DMARC-Filter": "OpenDMARC Filter v1.4.2 sourceware.org 340524BABF0B", "ARC-Filter": "OpenARC Filter v1.0.0 sourceware.org 340524BABF0B", "ARC-Seal": [ "i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1777277294; cv=pass;\n b=Flng9oKNyWumHJtFiuPEJs45Mp7LMqBXVi4DGV75XkVtE+H02jqA8Xm726LAdPwr6iCz6RY+xLbuItblbI/p4w0xZlFy/CCbAwUiA1mw08DfzV/131+pkSKELJz8OG6aU+T8HobjbPqN6ZxeA2fWqq6jo9Ff/pkTDLrdizeL7F8=", "i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=mRuXGuIKfRLGvCVNxCeAB8oxtxlPgaQRkpsDTv62nlyAfjTQv+Z21d0pE7Fkoam9CziJvAHp4TEYxBRAl/56UJ+PKI1gAt820W/Ov1rKJYEVbpdAVnk0RgJozn/ljbIh0l8A4V/ZMZ48php9XX7yHtuo38H/mLqRpNGYvYRl5CsvgzRVmhi1R7/0xYDL9IajYF1UGq8PXAUHsN9QLZnL7Zb3y8goGT+6IphYVz47BwAD4pbu7jaocYhi4qoiEdn1Zl/8/FuGRZ5AaeaXb1htslMjyiMplUgKr0MkZlMR7HKoDsdnEtSrp04LD7/GRyE5RcBTkoO22ak/9xR0zaeRUA==", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Wb/n2G9ujNfPvdByM10TPRZGfo/VA7GZtg7oLrlfbkDzSX89xgbmcxqSSW0uJfzgipP0RAeTpEsL9rlt0dCji/JdYoiRRw0F0Oku3uPWZNe0uFzRHCNNxXcvNZbxSBWtmABlBp2ftd+oIUiARcjt3clu8reXU7sJSaLcnkS6vszFeHr7h3j85pRITUnrA0Fb9nYddCDIjhxVAkfGq7S1WOI43nCaCGs67iKOLwH2Rd25UvAITaORPJTrXX2rT1LH0z3RVsrtB4jQsB2xItI7pgV8EQ3XBkxDGU1rECyZM7KCIF3b2sVXnwcr692qJOjFxJTSdkcQPsz60g5aWFiUEw==" ], "ARC-Message-Signature": [ "i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1777277294; c=relaxed/simple;\n bh=Oq9SBMFZn7RsIE14wFBV81pgeSyybPhbZXgZTTT5htM=;\n h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID:\n MIME-Version;\n b=G+ed5Knw3XalUvI5/5jGXjJZMktWeDdz+aG0IY/lpJmSZnDL50aUb8t8n28Yb1Af+sU7YPoHhgFvJbSixy1eLRFseb8hPPKPyxTttQeVPWydbw1yH5tJe1YOW7cUzbY+dlH/RAE4CE0guWfz/yvYFkBFnj40IDnnGQaSTWLE+ZU=", "i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=kO33Q+tWiH7i39o2sQ972e3YUVuxGBxGEVBet/iSXnM=;\n b=sBDB4j/RUWuMupTCPldrS3RblHCpD7dXj7xsVYnihxmpxzyEnkpkj8WyRPdeDQffR8Q1OM7PmWbYJNSEACNDc26hlAWx6qWbSQsRns7MxMX+sJkUbybeVFx4scjzr6nZ4tG4elp/tmZQ9Vg6a9PLuDj5cbGlr4XE2ztLv0MaLMCyZK4k4yRaHH+GzNvIg2C3kCHC/RR4C2QEz0Kxd7NgCn1kNjySHxa87F6tMHrQJaTbWy9OTQ+5iX89edGqtEKDHw9BydgsyWCJWOS2/LSkpTctiAS9ksJdvjP3vXSCFyaEb77/QgNlL484weP+YflrVcu/q2Hi6+pfHR2AuAJfcg==", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=kO33Q+tWiH7i39o2sQ972e3YUVuxGBxGEVBet/iSXnM=;\n b=xOotLJ5L3wXV7V1XlH1gBLB8bv+9MVzuyMdacwdhvfcgcoiS6cLU/zJijik+dg4f8vGVn/mrOTyMkw05xFcCuqHgjofG7D5UnTRM+K6DHsmwaIJ+8bGrN5fgjwsM5VwCOT3RHat5gm36wqJGiC5F/EpPEbS7fGhGJD27JA+ZlyCi2ARj1GMD/ych2wIWI4lx/nbBnvmFos5Rc1lComtqozZ5lWRWAEMsOCNBK+Z4MP3Aw4Lh/HTu6Ed9YeemNo3VjSeiltxGqqBGykGa9iu8E6Lfbuy7rbDuZ7SrOzdaDXzncumJwbcwo6SGNAW9LtAG2W9abaGYsFGrITC9ZnIooA==" ], "ARC-Authentication-Results": [ "i=3; server2.sourceware.org", "i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com])", "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 172.205.89.229) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com;\n dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;\n dkim=none (message not signed); arc=none (0)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=kO33Q+tWiH7i39o2sQ972e3YUVuxGBxGEVBet/iSXnM=;\n b=SyxMpVvOBLQCyWihF06zsgGz1yu1DcqEllN4oikcYIEjNpr/xeYpmspudOcgMw5VyRrCO8Hcmm5QAoWr+OTNKMg3Il5iTqrrcqAHrDvjvcNbFqWdBS8YT4GAl1QmCvj3yrOLpK27a5hWeP1c+t6q8RvlGSv5uKBy0RMnD6I0iPw=", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=kO33Q+tWiH7i39o2sQ972e3YUVuxGBxGEVBet/iSXnM=;\n b=SyxMpVvOBLQCyWihF06zsgGz1yu1DcqEllN4oikcYIEjNpr/xeYpmspudOcgMw5VyRrCO8Hcmm5QAoWr+OTNKMg3Il5iTqrrcqAHrDvjvcNbFqWdBS8YT4GAl1QmCvj3yrOLpK27a5hWeP1c+t6q8RvlGSv5uKBy0RMnD6I0iPw=" ], "X-MS-Exchange-Authentication-Results": [ "spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;", "spf=pass (sender IP is 172.205.89.229)\n smtp.mailfrom=arm.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=arm.com;" ], "Received-SPF": [ "Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C", "Pass (protection.outlook.com: domain of arm.com designates\n 172.205.89.229 as permitted sender) receiver=protection.outlook.com;\n client-ip=172.205.89.229; helo=nebula.arm.com; pr=C" ], "From": "Artemiy Volkov <artemiy.volkov@arm.com>", "To": "<gcc-patches@gcc.gnu.org>", "CC": "<tamar.christina@arm.com>, <wilco.dijkstra@arm.com>,\n <andrew.pinski@oss.qualcomm.com>, <richard.earnshaw@arm.com>,\n <ktkachov@nvidia.com>, <alice.carlotti@arm.com>, <alex.coplan@arm.com>,\n Artemiy Volkov <artemiy.volkov@arm.com>", "Subject": "[PATCH 0/4] aarch64: vector initialization improvements", "Date": "Mon, 27 Apr 2026 08:06:07 +0000", "Message-ID": "<20260427080642.371531-1-artemiy.volkov@arm.com>", "X-Mailer": "git-send-email 2.43.0", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-EOPAttributedMessage": "1", "X-MS-TrafficTypeDiagnostic": "\n AM2PEPF0001C710:EE_|PAWPR08MB9030:EE_|AM3PEPF00009B9E:EE_|AS8PR08MB7838:EE_", "X-MS-Office365-Filtering-Correlation-Id": "5e7b53f3-78f4-4605-c40e-08dea4341c46", "x-checkrecipientrouted": "true", "NoDisclaimer": "true", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam-Untrusted": "BCL:0;\n ARA:13230040|30052699003|1800799024|82310400026|36860700016|376014|56012099003|18002099003;", "X-Microsoft-Antispam-Message-Info-Original": "\n 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", "X-Forefront-Antispam-Report-Untrusted": "CIP:172.205.89.229; CTRY:IE; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(30052699003)(1800799024)(82310400026)(36860700016)(376014)(56012099003)(18002099003);\n DIR:OUT; SFP:1101;", "X-Exchange-RoutingPolicyChecked": "\n eUdHpew63yWFz5xPD+v6RHaD4BpLqixFV6ssTx9YPfNfV0BRhuFNLuG8vS9ovgPvZh9R6ewhTi0guERmW72xHkVdiMe7Y8TYrtnUQUqr4rILZ8VZAwnRmyFXe0gIyBDkgk2Omq6hBtRHbtTgvlK4Rma3/OLFdGSMsf9xE7GFra21edzg2bx52oTBMn4czuQtp2Na4Giqk++wu2ZZUnAFWUTo51CWbEM/DEEwMYZzuX67/CSP7pXT9kn0bYh/nmP5SzFPTzqcoKB6Fh4fUCxI3z1ahis+ak5gDj50Ptnegq2Oud80fCB6Z5MIJs8cLrJN8vmloVKIFlr6rEgpU4rDwg==", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": [ "PAWPR08MB9030", "AS8PR08MB7838" ], "X-MS-Exchange-Transport-CrossTenantHeadersStripped": "\n AM3PEPF00009B9E.eurprd04.prod.outlook.com", "X-MS-PublicTrafficType": "Email", "X-MS-Office365-Filtering-Correlation-Id-Prvs": "\n c8ec782a-e903-44b5-32d2-08dea433f45e", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|36860700016|14060799003|35042699022|82310400026|1800799024|376014|30052699003|56012099003|18002099003;", "X-Microsoft-Antispam-Message-Info": "\n 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", "X-Forefront-Antispam-Report": "CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(36860700016)(14060799003)(35042699022)(82310400026)(1800799024)(376014)(30052699003)(56012099003)(18002099003);\n DIR:OUT; SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n Luq1+UGb2F1P5qaRA+snW5/+hl/zJro8vZrGmFVyQgzQehrmvq9gN5uvie90nas5j/iq4/uMJcs/p5xFjDaokFqaFN/r3hWbPFBJZhwRmIwCBFyEpohH8nYgh1z3xejhqNEAJ04CusEtPOCUYoL1bzxscZ6BQSU09t60s0s9tIBbwwgub572GlFo+UqMyxNGsDcg4J5dbOCg1ABi9zOae/2/pe2k9Fh4mPH/+J+SftaDiVqVJYM1TN5altbBGQsgSGchixbcFCR/oKzU2mnw0M+u5ZfkXdwvTDo3KHuwkuYx/mZ53IayyOzdXi+7v2UjQ4g1rtYRPF/nU1zBVjcvXNeoxmkdRcITs8XsITcHWMXwsb84FRPopCsO6N00Wm1an/MMnDsxAVzk6jjXWKXeStEOI/j9lgd329gl4lLPBT02zYPjZicgJ+t/ToLXjiPh", "X-OriginatorOrg": "arm.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "27 Apr 2026 08:08:05.1855 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 5e7b53f3-78f4-4605-c40e-08dea4341c46", "X-MS-Exchange-CrossTenant-Id": "f34e5979-57d9-4aaa-ad4d-b122a662184d", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]", "X-MS-Exchange-CrossTenant-AuthSource": "\n AM3PEPF00009B9E.eurprd04.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-BeenThere": "gcc-patches@gcc.gnu.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Gcc-patches mailing list <gcc-patches.gcc.gnu.org>", "List-Unsubscribe": "<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>", "List-Archive": "<https://gcc.gnu.org/pipermail/gcc-patches/>", "List-Post": "<mailto:gcc-patches@gcc.gnu.org>", "List-Help": "<mailto:gcc-patches-request@gcc.gnu.org?subject=help>", "List-Subscribe": "<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>", "Errors-To": "gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org" }, "content": "Hi all,\n\nThis patch series addresses the original motivating example:\n\nsvfloat32_t foo(float x, float y) {\n return svdupq_n_f32(x, y, x, y);\n}\n\nwhich is currently compiled to:\n\nfoo:\n dup v0.4s, v0.s[0]\n ins v0.s[1], v1.s[0]\n ins v0.s[3], v1.s[0]\n dup z0.q, z0.q[0]\n ret\n\ninstead of something like:\n\nfoo:\n\tuzp1 v0.2s, v0.2s, v1.2s\n dup z0.d, d0\n ret\n\nSince the same inefficiency exists when initializing AdvSIMD registers,\nthe first three patches tackle that first. Ideally, we want to detect a\nrepeating subsequence in the constructor element list, then instantiate\nthat intermediate quantity, and then use vec_duplicate to fill out the\nentire target register. Since vec_duplicate requires the same inner mode for\nboth source and target modes, for full flexibility we first need to define\nmissing sub-word vector modes and add some supporting code, which is done\nin patch 1.\n\nPatch 2 adds necessary vec_duplicate patterns and implements the starting\nsubsequence detection logic to aarch64_vector_init_fallback (). Patch 3\nfurther improves codegen by implementing vec_concat patterns for the new\nmodes. Some costing hooks are adjusted throughout to nudge\naarch64_vector_init () into choosing a better sequence.\n\nThe final patch extends this logic to SVE registers. Currently, we can only\nduplicate 128-bit quantities into a full SVE register, which leads to\nalways having the last \"dup\" instruction with Q operands, as in the\nexample above. As long as we already have the smaller quantity available,\nwe can use a smaller \"dup\" to fill the entire register, which is achieved\nby combining two vec_duplicates into a new insn.\n\nEach individual patch bootstrapped and regtested on aarch64-linux-gnu.\n\nArtemiy Volkov (4):\n aarch64: introduce partial AdvSIMD vector modes\n aarch64: initialize vectors from starting subsequence\n aarch64: implement vec_concat support for sub-64-bit types\n aarch64/sve: combine AdvSIMD and SVE vec_duplicates\n\n gcc/config/aarch64/aarch64-modes.def | 4 +-\n gcc/config/aarch64/aarch64-simd.md | 225 ++++++++-\n gcc/config/aarch64/aarch64-sve.md | 14 +\n gcc/config/aarch64/aarch64.cc | 154 +++++--\n gcc/config/aarch64/constraints.md | 5 +\n gcc/config/aarch64/iterators.md | 114 ++++-\n .../complex/bb-slp-complex-add-half-float.c | 2 +\n .../complex/bb-slp-complex-mla-half-float.c | 4 +-\n .../complex/bb-slp-complex-mul-half-float.c | 6 +-\n gcc/testsuite/gcc.target/aarch64/ldp_stp_16.c | 5 +-\n .../gcc.target/aarch64/sve/gather_load_10.c | 3 +-\n gcc/testsuite/gcc.target/aarch64/sve/slp_1.c | 10 +-\n .../gcc.target/aarch64/sve/vec_init_5.c | 380 ++++++++++++++++\n .../gcc.target/aarch64/vec-init-18.c | 6 +-\n .../gcc.target/aarch64/vec-init-23.c | 426 ++++++++++++++++++\n .../aarch64/vec-init-single-const.c | 6 +-\n 16 files changed, 1287 insertions(+), 77 deletions(-)\n create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/vec_init_5.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/vec-init-23.c" }