[{"id":3679756,"web_url":"http://patchwork.ozlabs.org/comment/3679756/","msgid":"<87eck8of6d.fsf@googlemail.com>","list_archive_url":null,"date":"2026-04-21T09:06:50","subject":"Re: [PATCH v2] optabs: Don't add REG_EQUAL notes with non-read-only\n MEMs [PR124894]","submitter":{"id":4363,"url":"http://patchwork.ozlabs.org/api/people/4363/","name":"Richard Sandiford","email":"rdsandiford@googlemail.com"},"content":"liuhongt <hongtao.liu@intel.com> writes:\n>>Drea Pinski 2026-04-17 23:53:17 UTC\n>>I think the REG_EQUAL is created via add_equal_note in optabs.cc.\n>>That should check for MEM in op0/op1 and not add the REG_EQUAL.\n>\n> Update in V2, Don't add REG_EQUAL notes with non-read-only MEMs.\n> Performance impact on SPEC2017/SPEC2026 is negligible.\n> Bootstrapped and regtested on x86_64-pc-linux-gnu{-m32,}\n> Ok for trunk?\n>\n>\n>\n>\n>\n> DSE can forward-substitute a stored value into a load and then delete\n> the store as dead.  This leaves REG_EQUAL notes on other insns that\n> reference the same memory location stale, since the memory now holds\n> a different (older) value.\n>\n> When late-combine propagates a register source into such a stale\n> REG_EQUAL note, the note can end up with two identical MEM references\n> (e.g. (minus (mem[X]) (mem[X]))) that simplify_binary_operation folds\n> to zero.  IRA then promotes REG_EQUAL(0) to REG_EQUIV(0), and reload\n> eliminates the computation entirely, producing wrong code.\n>\n> Fix this by not creating REG_EQUAL notes that reference non-read-only\n> MEMs in add_equal_note.  Read-only MEMs (such as constant pool\n> references) are safe since their contents cannot change.  REG_EQUAL\n> notes are just optimization hints, so not adding them is always safe.\n\nI don't think this is the right fix.  If DSE does something that\ninvalidates a note, DSE should be the one to remove the note.\nThere's nothing intrinsically wrong with a REG_EQUAL note that\nreferences non-constant memory.\n\nThanks,\nRichard\n\n>\n> gcc/ChangeLog:\n>\n> \tPR rtl-optimization/124894\n> \t* optabs.cc (add_equal_note): Don't add REG_EQUAL notes\n> \twhen operands reference non-read-only MEMs.\n>\n> gcc/testsuite/ChangeLog:\n>\n> \tPR rtl-optimization/124894\n> \t* gcc.dg/pr124894.c: New test.\n> ---\n>  gcc/optabs.cc                   |  9 +++++++++\n>  gcc/testsuite/gcc.dg/pr124894.c | 36 +++++++++++++++++++++++++++++++++\n>  2 files changed, 45 insertions(+)\n>  create mode 100644 gcc/testsuite/gcc.dg/pr124894.c\n>\n> diff --git a/gcc/optabs.cc b/gcc/optabs.cc\n> index 111b9be9913..0e314d61ec2 100644\n> --- a/gcc/optabs.cc\n> +++ b/gcc/optabs.cc\n> @@ -135,6 +135,15 @@ add_equal_note (rtx_insn *insns, rtx target, enum rtx_code code, rtx op0,\n>  \t  || ! rtx_equal_p (XEXP (SET_DEST (set), 0), target)))\n>      return true;\n>  \n> +  /* Avoid creating REG_EQUAL notes that reference non-invariant MEMs.\n> +     Such notes can become stale if an earlier store to the same MEM is\n> +     later deleted (e.g. by DSE), causing the MEM to hold a different\n> +     value than what the note assumes.  Downstream passes may then\n> +     produce incorrect simplifications from the stale note.  */\n> +  if ((MEM_P (op0) && rtx_varies_p (op0, 0))\n> +      || (op1 && MEM_P (op1) && rtx_varies_p (op1, 0)))\n> +    return true;\n> +\n>    if (GET_RTX_CLASS (code) == RTX_UNARY)\n>      switch (code)\n>        {\n> diff --git a/gcc/testsuite/gcc.dg/pr124894.c b/gcc/testsuite/gcc.dg/pr124894.c\n> new file mode 100644\n> index 00000000000..f906169c699\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.dg/pr124894.c\n> @@ -0,0 +1,36 @@\n> +/* { dg-do run } */\n> +/* { dg-require-effective-target int128 } */\n> +/* { dg-require-effective-target lp64 } */\n> +/* { dg-options \"-O2 -fno-strict-aliasing\" } */\n> +\n> +/* PR rtl-optimization/124894 */\n> +/* DSE can delete a store after forward-substituting the stored value into\n> +   a load, leaving a stale MEM in a REG_EQUAL note.  Late-combine must not\n> +   propagate into such notes, as the resulting simplification (e.g.\n> +   (minus (mem) (mem)) -> 0) would be wrong.  */\n> +\n> +short s;\n> +__int128 z;\n> +long g;\n> +\n> +__attribute__((noipa)) long\n> +foo (short a)\n> +{\n> +  long t = 0;\n> +  char c = *(char *) __builtin_memset (&z, 2, 6);\n> +  __builtin_memset (&s, c, 2);\n> +  __builtin_memmove (&t, &g, 4);\n> +  long u = -t;\n> +  long v = *(long *) __builtin_memset (&t, a | 6, 8);\n> +  __int128 w = z % s;\n> +  long r = w + t + u + v;\n> +  return r;\n> +}\n> +\n> +int\n> +main ()\n> +{\n> +  long x = foo (0);\n> +  if (x != 0x0c0c0c0c0c0c0c0c)\n> +    __builtin_abort ();\n> +}","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=YiDOcSeH;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=YiDOcSeH","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=googlemail.com","sourceware.org; spf=pass smtp.mailfrom=googlemail.com","server2.sourceware.org;\n arc=none smtp.remote-ip=209.85.128.49"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Ghh11YRz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 19:07:32 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 43AB84BA9026\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 09:07:30 +0000 (GMT)","from mail-wm1-f49.google.com (mail-wm1-f49.google.com\n [209.85.128.49])\n by sourceware.org (Postfix) with ESMTPS id 75AE04BA23F1\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 09:07:01 +0000 (GMT)","by mail-wm1-f49.google.com with SMTP id\n 5b1f17b1804b1-4891e86fabeso23821045e9.1\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 02:07:01 -0700 (PDT)","from localhost ([2a00:23c7:ef4f:7201::fad])\n by smtp.googlemail.com with ESMTPSA id\n 5b1f17b1804b1-48a525a0b1asm43139565e9.2.2026.04.21.02.06.57\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 21 Apr 2026 02:06:58 -0700 (PDT)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 43AB84BA9026","OpenDKIM Filter v2.11.0 sourceware.org 75AE04BA23F1"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 75AE04BA23F1","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 75AE04BA23F1","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776762421; cv=none;\n b=w7LnEo7WVEJBmguEfhIlLJgScAwJgYElU+Utz+wjDW9Vg8XiudEqj7ivaFHE0uZaFcwpI2UZP8DuJZ0tamhjaHCdenXWR8DVhu5MkmUZw4rtj2n90TTj8fZ54ZhvuLoZC1s7BEzjiACCAh/uE/0Oit2nzIpS/z2gNP4D/5jbEZo=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776762421; c=relaxed/simple;\n bh=i5j2HRGl19Q42KL5wP0MGxD/lSTJvrSgE4uggJGYDXo=;\n h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version;\n b=qUKfYvUh5vj+X5mSNTT/0ewnRNxdKvUDLiOaKX2vDpH8w+4Ey+Hdnn1oV6cAReORaggi2A4r+yCVhzrQr1/2S/NWYlaw0SQmyLxv5n8gSDcIunT0jNAL8orXn+s6H7w8VYhlX4LSa2JoXFWNa2I9KgvBxrJ/eAH389pfQKnphiM=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=googlemail.com; s=20251104; t=1776762420; x=1777367220; darn=gcc.gnu.org;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=JNBQkihd5a4Tgn8DLB+jrQK+1oHyU7NYlX6CqK8Ivzk=;\n b=YiDOcSeHuKXsfLVGv9EvaW6xQ/7ZxY18yT1o3QxQ9Bud/gB2AImzyAq7q8cQilMuUm\n UKdhZis5ye1Vvk9oXhvpx9YswAvKElPgdOThFk07SpcaBt4X6STyWHOzie7qKwXu4K9M\n Jmo9lLOZhtOC2sgKwW1aW8+1x75QvXntqq3p0Ug2Fysh6KJLMKTCYAcL+mh5N8K3iQ0t\n IKKbPp0S6MlvAnieMllWF2hm2A9A/vFUZIIjtsAPbNl1hggudmkgRG9Tfjiy7uItHApj\n zLMl7eZSmrnfdMkRaO3IlbR5n7hHaaljVodBTqvthQMFhmWv1ovOQGzjMaT5MlqQj2SW\n BOXw==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776762420; x=1777367220;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=JNBQkihd5a4Tgn8DLB+jrQK+1oHyU7NYlX6CqK8Ivzk=;\n b=h52hG6r9Fz/krfrcC4CZKguXCpRKqw8P+Djz0dMKOE3w9s6NJn7ibT6Pr+ZCYaRajF\n 8KbY3lgCn08tTsIEfYQ5RTeYUJdNwpR4A1TuTcGkm0b4gmW7RWvjOlX1wQjYd0TuvYN7\n oJ5iC1qlWeuIUsCB+tfbUWRp2pMNFwqG8b8mWqhm99kCci3GFjVexsjBLKhxHF8Y6izf\n 7PmK5r/Njl7Ae+emzE9HR4FiF7jmNSpBUwCghvZOB6mal6cgMb+ISLYJQD5gnadQuu/5\n iTYonSPY0ap+byuBCF9NOt/fzkPy4aqSy6Udu5tTD4/N41b7sBtwxK3u1lRgTSexGN5r\n ByWA==","X-Gm-Message-State":"AOJu0Yz9bDtjKBuQlJBNnOEWbyjW89nD1Q8NSDk6rGcpT4NHB0fyVVOb\n C/P5M+/E31fA4HiyeF0gfhEabR+zOtdbRVHzA+ItEarhO/no7lVYXaoF","X-Gm-Gg":"AeBDietMYzfL1d3PIV9XkW5MHA/hXeG8yYxbqYLJ3dS+w+vgqNun1EbXkEwHsfDpQiS\n 0eFj+GwrJeOBr+g/mue8DcHlO+halidf5dWKW5b8BzcRhCDvyyedDXWR/S0eUnN11DOw6Ve5A4A\n QDSGpR2Rcn9Mk+2jM+lT28jEMjY2PccxfrRKQMtQRxT2jdF0LBOXufoEupo7PtUzeqjq67KP9Pv\n Z/VB9hDwC17RdUtC78rOZmWMXQ/Z0kNZAlMfgdw981GJxqkij0YMO77QpdJ7G8O0cjgAkNMbGB/\n dwKkyNu09WdXk8A0yY8qBraw9najjN1ex0Noexth1pwV/dugiCXB3XyyEfyE8WvNb4flocYr6QZ\n JOOAKL5tbsdm0htjU4rs0vPgGhvA1Hg3c8Y4PRn2+gpFZJRkMXu2piLjQPwh2lirXOIO+PV+dmj\n YxtKQ8iu2sLFWetgI4J25RdYg=","X-Received":"by 2002:a05:600c:a30b:b0:487:4eb:d125 with SMTP id\n 5b1f17b1804b1-488fb74dff1mr169412695e9.9.1776762420060;\n Tue, 21 Apr 2026 02:07:00 -0700 (PDT)","From":"Richard Sandiford <rdsandiford@googlemail.com>","To":"liuhongt <hongtao.liu@intel.com>","Mail-Followup-To":"liuhongt <hongtao.liu@intel.com>,gcc-patches@gcc.gnu.org,\n andrew.pinski@oss.qualcomm.com,  ebotcazou@libertysurf.fr,\n rguenther@suse.de, rdsandiford@googlemail.com","Cc":"gcc-patches@gcc.gnu.org,  andrew.pinski@oss.qualcomm.com,\n ebotcazou@libertysurf.fr,  rguenther@suse.de","Subject":"Re: [PATCH v2] optabs: Don't add REG_EQUAL notes with non-read-only\n MEMs [PR124894]","In-Reply-To":"<20260421032029.789026-1-hongtao.liu@intel.com> (liuhongt's\n message of \"Mon, 20 Apr 2026 20:20:29 -0700\")","References":"\n <CALvbMcBDNa44EWSo8fEjW4ZdBXtbkhKZ8QYuLWOARptdHERCVg@mail.gmail.com>\n <20260421032029.789026-1-hongtao.liu@intel.com>","Date":"Tue, 21 Apr 2026 10:06:50 +0100","Message-ID":"<87eck8of6d.fsf@googlemail.com>","User-Agent":"Gnus/5.13 (Gnus v5.13)","MIME-Version":"1.0","Content-Type":"text/plain","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3681191,"web_url":"http://patchwork.ozlabs.org/comment/3681191/","msgid":"<520cd83d-6f0b-4cbe-93f6-d75c953c56ed@oss.qualcomm.com>","list_archive_url":null,"date":"2026-04-22T21:24:11","subject":"Re: [PATCH v2] optabs: Don't add REG_EQUAL notes with non-read-only\n MEMs [PR124894]","submitter":{"id":92310,"url":"http://patchwork.ozlabs.org/api/people/92310/","name":"Jeffrey Law","email":"jeffrey.law@oss.qualcomm.com"},"content":"On 4/21/2026 3:06 AM, Richard Sandiford wrote:\n> liuhongt <hongtao.liu@intel.com> writes:\n>>> Drea Pinski 2026-04-17 23:53:17 UTC\n>>> I think the REG_EQUAL is created via add_equal_note in optabs.cc.\n>>> That should check for MEM in op0/op1 and not add the REG_EQUAL.\n>> Update in V2, Don't add REG_EQUAL notes with non-read-only MEMs.\n>> Performance impact on SPEC2017/SPEC2026 is negligible.\n>> Bootstrapped and regtested on x86_64-pc-linux-gnu{-m32,}\n>> Ok for trunk?\n>>\n>>\n>>\n>>\n>>\n>> DSE can forward-substitute a stored value into a load and then delete\n>> the store as dead.  This leaves REG_EQUAL notes on other insns that\n>> reference the same memory location stale, since the memory now holds\n>> a different (older) value.\n>>\n>> When late-combine propagates a register source into such a stale\n>> REG_EQUAL note, the note can end up with two identical MEM references\n>> (e.g. (minus (mem[X]) (mem[X]))) that simplify_binary_operation folds\n>> to zero.  IRA then promotes REG_EQUAL(0) to REG_EQUIV(0), and reload\n>> eliminates the computation entirely, producing wrong code.\n>>\n>> Fix this by not creating REG_EQUAL notes that reference non-read-only\n>> MEMs in add_equal_note.  Read-only MEMs (such as constant pool\n>> references) are safe since their contents cannot change.  REG_EQUAL\n>> notes are just optimization hints, so not adding them is always safe.\n> I don't think this is the right fix.  If DSE does something that\n> invalidates a note, DSE should be the one to remove the note.\n> There's nothing intrinsically wrong with a REG_EQUAL note that\n> references non-constant memory.\nAgreed on all points.\n\n\njeff","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=ZuZdUT1P;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=SDQ9OFfd;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=ZuZdUT1P;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=SDQ9OFfd","sourceware.org; dmarc=none (p=none dis=none)\n header.from=oss.qualcomm.com","sourceware.org;\n spf=pass smtp.mailfrom=oss.qualcomm.com","server2.sourceware.org;\n arc=none smtp.remote-ip=205.220.180.131"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1Cv66KRwz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 08:04:50 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id D65624BA799A\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:04:48 +0000 (GMT)","from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com\n [205.220.180.131])\n by sourceware.org (Postfix) with ESMTPS id 3FA5E4E5DB68\n for <gcc-patches@gcc.gnu.org>; Wed, 22 Apr 2026 21:24:22 +0000 (GMT)","from pps.filterd (m0279868.ppops.net [127.0.0.1])\n by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63MHtpFJ2630173\n for <gcc-patches@gcc.gnu.org>; Wed, 22 Apr 2026 21:24:20 GMT","from mail-ot1-f70.google.com (mail-ot1-f70.google.com\n [209.85.210.70])\n by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4dq35r8pq2-1\n (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n for <gcc-patches@gcc.gnu.org>; Wed, 22 Apr 2026 21:24:20 +0000 (GMT)","by mail-ot1-f70.google.com with SMTP id\n 46e09a7af769-7dccbd50e3fso11816384a34.2\n for <gcc-patches@gcc.gnu.org>; Wed, 22 Apr 2026 14:24:20 -0700 (PDT)","from [172.19.1.129] ([99.196.128.73])\n by smtp.gmail.com with ESMTPSA id\n 46e09a7af769-7dcdcb6739csm4468395a34.4.2026.04.22.14.24.16\n for <gcc-patches@gcc.gnu.org>\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Wed, 22 Apr 2026 14:24:19 -0700 (PDT)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org D65624BA799A","OpenDKIM Filter v2.11.0 sourceware.org 3FA5E4E5DB68"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 3FA5E4E5DB68","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 3FA5E4E5DB68","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776893062; cv=none;\n b=VeTPc9h9aJmhVFsk20Lp/ka+LB6gV5puovio7/PHTsKCubvUvwHMJLRfdgiTj/ux4t326c3oHjETQ81EfjANb05b3BRqhQRyz7o4X+NKZe70dzvdqVOb/bkkNwNfGecfdWdUGZhkrJ0gucZQOaVoPp3SdTbD1Rk+lCtgr+8YuO0=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776893062; c=relaxed/simple;\n bh=yvGx7FmtF0U7dsk5AmDUjTl0zwVgtctXD7reuZ+iuxo=;\n h=DKIM-Signature:DKIM-Signature:Message-ID:Date:MIME-Version:\n Subject:To:From;\n b=ChnNNAmp4b5pP24/WmSpgyV3G5IBH9BmI4OB4Ajp8+IPlEovWF7qU+xxZ6v8abweWl+FtDVTBeD2L0vHxtFoEGOQyZ8N5jnZFCNRtsSq21rEZTjL6CnVBJdrnS4/yHtotnMRUvRHg5cpoIEgdAuMkJtSHmE+WExOCoRIICEA6Z4=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h=\n content-transfer-encoding:content-type:date:from:in-reply-to\n :message-id:mime-version:references:subject:to; s=qcppdkim1; bh=\n R/IzTk1TPMhKCvnJ1hPv5xLFW5tLQF+bwFhtUaRLh5M=; b=ZuZdUT1PlVN1yX+W\n k/NJ1mdKyM4z/ZMM/kC98csDLvLhUohKXw4I5AobPUEkUlT40XfgkSsdNTD8unDE\n GViW5wbmAPppO0Z8mRHfx/ZmLeqadDd3TJ7I2qyLB0e7lEZQCuHx7H6o5hT/rYOB\n 9pCL4HTsqqXxkcGnXLIu3dvMzw5wRmOm+N9orkAmCZZrV2nVwd483s8nBKIFVpU6\n iKSrbcSADfjus27mYecIqf7uHMiPvG9cBBX85dC2QIDQpzVogYZ+E4ACoLEQZZRn\n nn2On0ZVOWfCbJkoHcw+uzK0ChwxsNV8JhLHzA5nc8z28gJckHNQIo456QfdZeNL\n ZoKX0A==","v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=oss.qualcomm.com; s=google; t=1776893060; x=1777497860; darn=gcc.gnu.org;\n h=content-transfer-encoding:in-reply-to:from:content-language\n :references:to:subject:user-agent:mime-version:date:message-id:from\n :to:cc:subject:date:message-id:reply-to;\n bh=R/IzTk1TPMhKCvnJ1hPv5xLFW5tLQF+bwFhtUaRLh5M=;\n b=SDQ9OFfd7Z7SOk50stWOhrfsheR+GVNBb/0wZzi+dUou6OHgCmDqCHzgGCGSurdIpN\n dZVrN02Zx0iQlYe6bIFxnK+lY+QojHARpD/5sxP2eru1J7/6QCoDnhVgNJXqaY7w4jKN\n Ac0QsGC4uSAMe5Wr8EWaucBQKRx5a28gY/KZrAEh6w/VC532KD9BusPhbSaX9NZyg3DJ\n Zufp0T2iah1Il3FXfnXtZh+SkHHy5BqVNw7/lMgVBekM5yUDHALPnKL9UCI57EVrcUp4\n fCDzAj7oIMCP+qrCMGQxg8ZQE82wqvgZRZwmSEn5/POmw45+aNavYqLf33iS7I+Hrh9/\n Ltrg=="],"X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776893060; x=1777497860;\n h=content-transfer-encoding:in-reply-to:from:content-language\n :references:to:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=R/IzTk1TPMhKCvnJ1hPv5xLFW5tLQF+bwFhtUaRLh5M=;\n b=oSMMFELSFSzQVuQ6HycObz9JWe2JC+HDNDgR0Qo69Lmbm/KoQcav2mcf0YzImGxkZf\n NnhHHpXVnTE+v7ka/VD7GV8iCB33hdvMbhBaYHJEiTo2gNoWh7tKsV1nUfVXbguq8PqC\n h21fLwTm3USIKpmlWxUvn8DaODsyHQ1fsxNNv7sUxEGhEiSPTJV12EvpYHDs6rQkIDk0\n 4K5TFQNiu+ejb95HeBbnFzc/BeL1WPecCed3/e9aUUSAHnnbTnbIlJUa2gvGL5RM7l/v\n 4Ymuk2RzwpXJaw/5zLHK1o7ZdfefjfbR80qXqvSs9nzR7VQzDskv7fQwm98S91RSssjs\n uGAg==","X-Gm-Message-State":"AOJu0YwkDKEaztGQoziyPU63BeueoRmeUeFGt9fPMeLgU3au6LjBb5jW\n RjcuNX5ZEwcK0J1/ShaRxvabVjDVSX/zExvFIXNdm+r0p92y3VPKtnkZ+fh3WyA67ZKxestTNZ2\n yHX4d+OD8ghwfkAqUfgQNsUOF89JtiE4MpGsbwg+l20MZu/nhsIpHYNKWTkHAst9PdETW","X-Gm-Gg":"AeBDieu5Rolpvo28xapx4EffrkSV5FI2AKPaDMH+CYJ7JLrxw101FZIqpbd597tV7XS\n 2BOH6yEpQvYvvl1wLSewgOGok7fl/ACi8Avq5cnSySIyAAQ08PQQ4QRA0XubEJr5efbNOl5RC1p\n 4GN5LAnhx9NNmp9Oq1iULGEc/+jlpRy0KFRZivislmmsNz2/blBGPX20fyMJa57f+MdMCIEMEyh\n 7SADwDR67shh0UI81Tt9v+XiOGWclxYYBwBuE64TVjwzg84yTuaAttVux1B/c6lc2pLbz0gY1wq\n CJuNY7reb/JgU5vj7qHx3PauY9xO3LzU4nenq2NR/tMumEBhyXyvecFgDuzdppWhb9L3yLcMV/e\n uKNgJLNhT4VINC+2d","X-Received":["by 2002:a05:6830:2806:b0:7d7:ccc7:c546 with SMTP id\n 46e09a7af769-7dc95252ae8mr16030385a34.23.1776893059940;\n Wed, 22 Apr 2026 14:24:19 -0700 (PDT)","by 2002:a05:6830:2806:b0:7d7:ccc7:c546 with SMTP id\n 46e09a7af769-7dc95252ae8mr16030366a34.23.1776893059468;\n Wed, 22 Apr 2026 14:24:19 -0700 (PDT)"],"Message-ID":"<520cd83d-6f0b-4cbe-93f6-d75c953c56ed@oss.qualcomm.com>","Date":"Wed, 22 Apr 2026 15:24:11 -0600","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH v2] optabs: Don't add REG_EQUAL notes with non-read-only\n MEMs [PR124894]","To":"gcc-patches@gcc.gnu.org","References":"\n <CALvbMcBDNa44EWSo8fEjW4ZdBXtbkhKZ8QYuLWOARptdHERCVg@mail.gmail.com>\n <20260421032029.789026-1-hongtao.liu@intel.com>\n <87eck8of6d.fsf@googlemail.com>","Content-Language":"en-US","From":"Jeffrey Law <jeffrey.law@oss.qualcomm.com>","In-Reply-To":"<87eck8of6d.fsf@googlemail.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"7bit","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIyMDIwOCBTYWx0ZWRfX/CbXzs2xcyZL\n cj2RfgNLofS0dWXYkTYHlDOkQKeEJojah7DW+ynBcCnOzXBt6ug5E0lVG11wu9+aqnhHWTcKUWG\n fYp3lASmCd0i4BwVozzoaIKq5Ncm5u6CECB85PkmlOY9zK9QncFNMrG4qzfnbNtyI00my/JxAFm\n 4Ld7N9Dp3qmVSFbYJ1ky6bPOrnuhzO7q5S325l3Sj8RXBXa4HIBVmc1DHDRMHKDV5OJWD+VmjFX\n 2srXfByww9oFbdmS8YIPgdSjrKdIenXj2LFkcapCe0xevTT+nGlbb+k9Snhx6PhomFnB31vAbQT\n aZN3fmRxB0Dp8upSsINOcQW3FcyHldhybdrx/jcZCursMoJym1ED/v1iUskhRL98LvXk88XlNUI\n pcudymLbTIzIXjekXFhXUc4WgWO6nv8FeEmD7m00StmE4mWHQ75xawDhZ91m9Oh4/cvnjgaETCy\n hgrOxX7dsYoYOG8Nc+g==","X-Proofpoint-ORIG-GUID":"0xhcKU_ILflJny5Ui_XZJ2YblCJhI8Hc","X-Proofpoint-GUID":"0xhcKU_ILflJny5Ui_XZJ2YblCJhI8Hc","X-Authority-Analysis":"v=2.4 cv=f5J4wuyM c=1 sm=1 tr=0 ts=69e93c84 cx=c_pps\n a=7uPEO8VhqeOX8vTJ3z8K6Q==:117 a=pT8mMdUMRgYHG4ht1jzeRQ==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=s4-Qcg_JpJYA:10\n a=VkNPw1HP01LnGYTKEx00:22 a=u7WPNUs3qKkmUXheDGA7:22 a=ZpdpYltYx_vBUK5n70dp:22\n a=QyXUC8HyAAAA:8 a=Vdm64Q1Rhp656C6AplcA:9 a=QEXdDO2ut3YA:10\n a=EXS-LbY8YePsIyqnH6vw:22","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-22_03,2026-04-21_02,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n bulkscore=0 priorityscore=1501 phishscore=0 adultscore=0 malwarescore=0\n spamscore=0 suspectscore=0 impostorscore=0 lowpriorityscore=0 clxscore=1015\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2604200000 definitions=main-2604220208","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}}]