[{"id":3679826,"web_url":"http://patchwork.ozlabs.org/comment/3679826/","msgid":"<73po5os7-0p94-6q4n-7502-2s57r36o2060@fhfr.qr>","list_archive_url":null,"date":"2026-04-21T11:29:19","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c\n and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":4338,"url":"http://patchwork.ozlabs.org/api/people/4338/","name":"Richard Biener","email":"rguenther@suse.de"},"content":"On Tue, 21 Apr 2026, Jakub Jelinek wrote:\n\n> On Tue, Apr 21, 2026 at 12:57:49PM +0200, Jakub Jelinek wrote:\n> > On Wed, Apr 08, 2026 at 03:28:18PM +0100, Alex Coplan wrote:\n> > > I have now done so with a follow-up patch:\n> > > https://gcc.gnu.org/pipermail/gcc-patches/2026-April/712482.html\n> > > \n> > > In the end it made more sense to add these tests separately, since the\n> > > test itself won't start passing until the 3/4 aarch64 patch is applied\n> > > anyway.\n> > > \n> > > Is this patch now OK for trunk?  I'm hoping that mine and Richard's arguments\n> > > were sufficiently persuasive as to why we want this behaviour for the\n> > > relevant SME attributes.\n> > \n> > So, looking at this some more, I see that the r16-4667 commit just made\n> > C FE behave like C++ FE used to behave already since PR15774 r0-105636.\n> > And apparently clang behaves the same, both in C and C++ for many years\n> > (tried both current clang and clang++ trunk and 9.0.0, unfortunately older\n> > releases aren't on godbolt for aarch64; trying with regparm(3) instead of\n> > the aarch64 specific ABI attributes, even clang and clang++ behaves that\n> > way in 3.1, so also from at least 2011-ish).\n> > \n> > Thus, my strong preference would be to adjust the aarch64 testsuite\n> > for the new behavior, which is now consistent between the FEs and different\n> > compilers, accepting not specifying function type attributes if they have\n> > been specified before (so, there is no risk of function being used with\n> > different ABIs in between the declarations), but rejecting the case of\n> > earlier declaration not specifying ABI relevant attributes and later one\n> > which specifies those (because there is a risk of calls with a wrong ABI\n> > in between).  And I really don't buy the aarch64 ABI attributes being in any\n> > way different from any other ABI attributes, all of those are ABI changes\n> > which have to be visible to all callers of the function.  By accepting\n> > void foo () [[gnu::abi_changing_fntype_attribute]];\n> > void foo ();\n> > there is no risk of it being misused.\n> \n> So, I think we should apply something like the patch below instead.\n\nI agree (as you'd know based on my previous comments here and in\nthe bug), but I refrain from approving, leaving that to target \nmaintainers.\n\nRichard.\n\n> 2026-04-21  Jakub Jelinek  <jakub@redhat.com>\n> \n> \tPR target/122483\n> \t* gcc.target/aarch64/sme/streaming_mode_1.c Don't expect error for\n> \tsc_a, sc_c, sc_e, s_a, s_c, s_e and keyword_contradiction_1.\n> \t* gcc.target/aarch64/sme/za_state_1.c: Don't expect error for shared_a,\n> \tshared_c, shared_e, preserved_a, preserved_c, preserved_e and\n> \tkeyword_conflict_1.\n> \t* gcc.target/aarch64/sme/za_state_2.c: Don't expect error for shared_b\n> \tand shared_d.  Expect different error for shared_f and shared_h.\n> \n> --- gcc/testsuite/gcc.target/aarch64/sme/streaming_mode_1.c.jj\t2026-03-27 10:17:17.910269122 +0100\n> +++ gcc/testsuite/gcc.target/aarch64/sme/streaming_mode_1.c\t2026-04-21 13:03:24.518242099 +0200\n> @@ -1,19 +1,19 @@\n>  // { dg-options \"\" }\n>  \n>  void sc_a () [[arm::streaming_compatible]];\n> -void sc_a (); // { dg-error \"conflicting types\" }\n> +void sc_a ();\n>  \n>  void sc_b ();\n>  void sc_b () [[arm::streaming_compatible]]; // { dg-error \"conflicting types\" }\n>  \n>  void sc_c () [[arm::streaming_compatible]];\n> -void sc_c () {} // { dg-error \"conflicting types\" }\n> +void sc_c () {}\n>  \n>  void sc_d ();\n>  void sc_d () [[arm::streaming_compatible]] {} // { dg-error \"conflicting types\" }\n>  \n>  void sc_e () [[arm::streaming_compatible]] {}\n> -void sc_e (); // { dg-error \"conflicting types\" }\n> +void sc_e ();\n>  \n>  void sc_f () {}\n>  void sc_f () [[arm::streaming_compatible]]; // { dg-error \"conflicting types\" }\n> @@ -27,19 +27,19 @@ extern void (*sc_h) (); // { dg-error \"c\n>  //----------------------------------------------------------------------------\n>  \n>  void s_a () [[arm::streaming]];\n> -void s_a (); // { dg-error \"conflicting types\" }\n> +void s_a ();\n>  \n>  void s_b ();\n>  void s_b () [[arm::streaming]]; // { dg-error \"conflicting types\" }\n>  \n>  void s_c () [[arm::streaming]];\n> -void s_c () {} // { dg-error \"conflicting types\" }\n> +void s_c () {}\n>  \n>  void s_d ();\n>  void s_d () [[arm::streaming]] {} // { dg-error \"conflicting types\" }\n>  \n>  void s_e () [[arm::streaming]] {}\n> -void s_e (); // { dg-error \"conflicting types\" }\n> +void s_e ();\n>  \n>  void s_f () {}\n>  void s_f () [[arm::streaming]]; // { dg-error \"conflicting types\" }\n> @@ -118,7 +118,7 @@ void keyword_ok_5 () [[arm::streaming_co\n>  //----------------------------------------------------------------------------\n>  \n>  void keyword_contradiction_1 () __arm_streaming;\n> -void keyword_contradiction_1 (); // { dg-error \"conflicting types\" }\n> +void keyword_contradiction_1 ();\n>  \n>  void keyword_contradiction_2 ();\n>  void keyword_contradiction_2 () __arm_streaming; // { dg-error \"conflicting types\" }\n> --- gcc/testsuite/gcc.target/aarch64/sme/za_state_1.c.jj\t2026-03-27 10:17:17.911269105 +0100\n> +++ gcc/testsuite/gcc.target/aarch64/sme/za_state_1.c\t2026-04-21 13:05:01.711603896 +0200\n> @@ -1,19 +1,19 @@\n>  // { dg-options \"\" }\n>  \n>  void shared_a () [[arm::inout(\"za\")]];\n> -void shared_a (); // { dg-error \"conflicting types\" }\n> +void shared_a ();\n>  \n>  void shared_b ();\n>  void shared_b () [[arm::inout(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_c () [[arm::inout(\"za\")]];\n> -void shared_c () {} // { dg-error \"conflicting types\" }\n> +void shared_c () {}\n>  \n>  void shared_d ();\n>  void shared_d () [[arm::inout(\"za\")]] {} // { dg-error \"conflicting types\" }\n>  \n>  void shared_e () [[arm::inout(\"za\")]] {}\n> -void shared_e (); // { dg-error \"conflicting types\" }\n> +void shared_e ();\n>  \n>  void shared_f () {}\n>  void shared_f () [[arm::inout(\"za\")]]; // { dg-error \"conflicting types\" }\n> @@ -27,19 +27,19 @@ extern void (*shared_h) (); // { dg-erro\n>  //----------------------------------------------------------------------------\n>  \n>  void preserved_a () [[arm::preserves(\"za\")]];\n> -void preserved_a (); // { dg-error \"conflicting types\" }\n> +void preserved_a ();\n>  \n>  void preserved_b ();\n>  void preserved_b () [[arm::preserves(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void preserved_c () [[arm::preserves(\"za\")]];\n> -void preserved_c () {} // { dg-error \"conflicting types\" }\n> +void preserved_c () {}\n>  \n>  void preserved_d ();\n>  void preserved_d () [[arm::preserves(\"za\")]] {} // { dg-error \"conflicting types\" }\n>  \n>  void preserved_e () [[arm::preserves(\"za\")]] {}\n> -void preserved_e (); // { dg-error \"conflicting types\" }\n> +void preserved_e ();\n>  \n>  void preserved_f () {}\n>  void preserved_f () [[arm::preserves(\"za\")]]; // { dg-error \"conflicting types\" }\n> @@ -139,7 +139,7 @@ __arm_new(\"za\") void keyword_ok_6 () {}\n>  //----------------------------------------------------------------------------\n>  \n>  void keyword_conflict_1 () __arm_inout(\"za\");\n> -void keyword_conflict_1 (); // { dg-error \"conflicting types\" }\n> +void keyword_conflict_1 ();\n>  \n>  void keyword_conflict_2 ();\n>  void keyword_conflict_2 () __arm_inout(\"za\"); // { dg-error \"conflicting types\" }\n> --- gcc/testsuite/gcc.target/aarch64/sme/za_state_2.c.jj\t2026-03-27 10:17:17.911269105 +0100\n> +++ gcc/testsuite/gcc.target/aarch64/sme/za_state_2.c\t2026-04-21 13:12:03.818488094 +0200\n> @@ -24,25 +24,25 @@ void new_za_f () {}\n>  void shared_a () [[arm::inout(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_b () [[arm::inout(\"za\")]];\n> -[[arm::new(\"za\")]] void shared_b (); // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_b ();\n>  \n>  [[arm::new(\"za\")]] void shared_c ();\n>  void shared_c () [[arm::in(\"za\")]] {} // { dg-error \"conflicting types\" }\n>  \n>  void shared_d () [[arm::in(\"za\")]];\n> -[[arm::new(\"za\")]] void shared_d () {} // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_d () {}\n>  \n>  [[arm::new(\"za\")]] void shared_e () {}\n>  void shared_e () [[arm::out(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_f () [[arm::out(\"za\")]] {}\n> -[[arm::new(\"za\")]] void shared_f (); // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_f (); // { dg-error \"cannot apply attribute 'new' to 'shared_f' after the function has been defined\" }\n>  \n>  [[arm::new(\"za\")]] void shared_g () {}\n>  void shared_g () [[arm::preserves(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_h () [[arm::preserves(\"za\")]] {}\n> -[[arm::new(\"za\")]] void shared_h (); // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_h (); // { dg-error \"cannot apply attribute 'new' to 'shared_h' after the function has been defined\" }\n>  \n>  //----------------------------------------------------------------------------\n>  \n> \n> \n> \tJakub\n> \n>","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=suse.de header.i=@suse.de header.a=rsa-sha256\n header.s=susede2_rsa header.b=ovDJPT8D;\n\tdkim=pass header.d=suse.de header.i=@suse.de header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=Ok9QgwsM;\n\tdkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de\n header.a=rsa-sha256 header.s=susede2_rsa header.b=Nej/rdx1;\n\tdkim=neutral header.d=suse.de header.i=@suse.de header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=vR/orjQM;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=suse.de header.i=@suse.de header.a=rsa-sha256\n header.s=susede2_rsa header.b=ovDJPT8D;\n\tdkim=pass header.d=suse.de header.i=@suse.de header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=Ok9QgwsM;\n\tdkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de\n header.a=rsa-sha256 header.s=susede2_rsa header.b=Nej/rdx1;\n\tdkim=neutral header.d=suse.de header.i=@suse.de header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=vR/orjQM","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=suse.de","sourceware.org; spf=pass smtp.mailfrom=suse.de","server2.sourceware.org;\n arc=none smtp.remote-ip=195.135.223.131","smtp-out2.suse.de;\n\tnone"],"Received":["from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Krz1PfYz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 21:29:53 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 6B29F4BA9031\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 11:29:51 +0000 (GMT)","from smtp-out2.suse.de (smtp-out2.suse.de [195.135.223.131])\n by sourceware.org (Postfix) with ESMTPS id 199554BA2E1B\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 11:29:21 +0000 (GMT)","from murzim.nue2.suse.org (unknown [10.168.4.243])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-out2.suse.de (Postfix) with ESMTPS id D8CF15BCFB;\n Tue, 21 Apr 2026 11:29:19 +0000 (UTC)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 6B29F4BA9031","OpenDKIM Filter v2.11.0 sourceware.org 199554BA2E1B"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 199554BA2E1B","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 199554BA2E1B","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776770961; cv=none;\n b=lyEk8CnkDbktp0Oidjj+iZj+gc7gTWQOJ5UxpaQs8Hu3jOz/tNkMXuh8FnFRCyx7dRXLLSeWY977LS7TZZWBSzUx+5vZB/yNA2OIidA426YNpTNxpgr25OWGUxObYoeK8dNWICl6Mwd7my/kA+IAeTctGLqrsSzkq5sovYlunhU=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776770961; c=relaxed/simple;\n bh=wYZXK3dtIY3GmOp4oy4p4C6kedANghz00nL7Cm7iMfk=;\n h=DKIM-Signature:DKIM-Signature:DKIM-Signature:DKIM-Signature:Date:\n From:To:Subject:Message-ID:MIME-Version;\n b=XlfH4vE6afcWL+h+jw+0CkfPCnFmWf9DW+t/Jnk2RP2LmmB/Djw5oyFgWFkZvuo48cXSQSOkT0WKaexbPxRjML8G5jhcM6Jgugw6OIxVs3FJB/ICKqz3aYsZsivrOZi/F2i27fIL5PHbwlu8z2wj1nFXQ/FuCrbDVrVkTka+0ZQ=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_rsa;\n t=1776770960;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=NDe/FS0ls6nmkpcwYid/oXLQyfArFAhVYnoo1n7SAZA=;\n b=ovDJPT8Drl60VW9MXAHBFipIxuYiOO/U8kd41OO5YvOhAGBnG8JlRIpvLMUJyJtM4HFq/t\n m/Zc37y1FouQPDwrlxLvoWznmWE5HSZLJLWGk0RM4bnbNdgUSF/+N6W7nhyleep2HVdKSB\n gE2UG5zvWYaeFavXWAc+w9A5GcoS30U=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_ed25519; t=1776770960;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=NDe/FS0ls6nmkpcwYid/oXLQyfArFAhVYnoo1n7SAZA=;\n b=Ok9QgwsMyVdwy0vBW4yx7EJIvCeLJ9dE6HMMb9TDVU3HGK8zCpsxHbAtpFIX/FYFxVtQC5\n 3E+RTXNuEw5v7hAQ==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_rsa;\n t=1776770959;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=NDe/FS0ls6nmkpcwYid/oXLQyfArFAhVYnoo1n7SAZA=;\n b=Nej/rdx1aWjmXaUSh6XYXrexJvFEDz9oF5rnW1+ts5MktBoKNpNG/j9nU+lT+NDcC/xiyl\n MZoXUegf7/wq6MrFFSMw1LDaXBErXE793/OAGMHPqBycX2+1N9gTPilW81dysvMidZW6cj\n 81UOXt8YVs6kG0bLZ2iLgnoKHI17s2E=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_ed25519; t=1776770959;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=NDe/FS0ls6nmkpcwYid/oXLQyfArFAhVYnoo1n7SAZA=;\n b=vR/orjQMPD1SVoSsAW31U2tqRI60pyVjNrR2L2NCo1Mq0e/J5t4nihXy49vz/RcoStqZh9\n DkZkQo15xi5CdXDQ=="],"Date":"Tue, 21 Apr 2026 13:29:19 +0200 (CEST)","From":"Richard Biener <rguenther@suse.de>","To":"Jakub Jelinek <jakub@redhat.com>","cc":"Alex Coplan <alex.coplan@arm.com>,\n \"Joseph S. Myers\" <josmyers@redhat.com>,\n Marek Polacek <polacek@redhat.com>, gcc-patches@gcc.gnu.org,\n Alice Carlotti <alice.carlotti@arm.com>,\n Richard Sandiford <rdsandiford@googlemail.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c\n and aarch64/sme/za_state_[12].c [PR122483]","In-Reply-To":"<aedcwlyS96ASGI5e@tucnak>","Message-ID":"<73po5os7-0p94-6q4n-7502-2s57r36o2060@fhfr.qr>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com> <aczm5e6NfCLg1rvS@arm.com>\n <adZmAqLwzaIYcm_e@arm.com> <aedYLZXHJZfqHRjv@tucnak>\n <aedcwlyS96ASGI5e@tucnak>","MIME-Version":"1.0","Content-Type":"text/plain; charset=US-ASCII","X-Spamd-Result":"default: False [-4.30 / 50.00]; BAYES_HAM(-3.00)[100.00%];\n NEURAL_HAM_LONG(-1.00)[-1.000];\n NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain];\n FUZZY_RATELIMITED(0.00)[rspamd.com]; ARC_NA(0.00)[];\n MIME_TRACE(0.00)[0:+]; RCPT_COUNT_TWELVE(0.00)[12];\n MISSING_XM_UA(0.00)[]; RCVD_COUNT_ZERO(0.00)[0];\n FREEMAIL_ENVRCPT(0.00)[googlemail.com];\n DKIM_SIGNED(0.00)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519];\n FREEMAIL_CC(0.00)[arm.com,redhat.com,gcc.gnu.org,googlemail.com,nvidia.com,oss.qualcomm.com];\n TO_DN_SOME(0.00)[]; FROM_HAS_DN(0.00)[];\n TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[];\n DBL_BLOCKED_OPENRESOLVER(0.00)[suse.de:email,gnu.org:url]","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679836,"web_url":"http://patchwork.ozlabs.org/comment/3679836/","msgid":"<aedlFWvEhJTXEm2C@arm.com>","list_archive_url":null,"date":"2026-04-21T11:52:53","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":79039,"url":"http://patchwork.ozlabs.org/api/people/79039/","name":"Alex Coplan","email":"Alex.Coplan@arm.com"},"content":"On 21/04/2026 13:17, Jakub Jelinek wrote:\n> On Tue, Apr 21, 2026 at 12:57:49PM +0200, Jakub Jelinek wrote:\n> > On Wed, Apr 08, 2026 at 03:28:18PM +0100, Alex Coplan wrote:\n> > > I have now done so with a follow-up patch:\n> > > https://gcc.gnu.org/pipermail/gcc-patches/2026-April/712482.html\n> > > \n> > > In the end it made more sense to add these tests separately, since the\n> > > test itself won't start passing until the 3/4 aarch64 patch is applied\n> > > anyway.\n> > > \n> > > Is this patch now OK for trunk?  I'm hoping that mine and Richard's arguments\n> > > were sufficiently persuasive as to why we want this behaviour for the\n> > > relevant SME attributes.\n> > \n> > So, looking at this some more, I see that the r16-4667 commit just made\n> > C FE behave like C++ FE used to behave already since PR15774 r0-105636.\n> > And apparently clang behaves the same, both in C and C++ for many years\n> > (tried both current clang and clang++ trunk and 9.0.0, unfortunately older\n> > releases aren't on godbolt for aarch64; trying with regparm(3) instead of\n> > the aarch64 specific ABI attributes, even clang and clang++ behaves that\n> > way in 3.1, so also from at least 2011-ish).\n> > \n> > Thus, my strong preference would be to adjust the aarch64 testsuite\n> > for the new behavior, which is now consistent between the FEs and different\n> > compilers, accepting not specifying function type attributes if they have\n> > been specified before (so, there is no risk of function being used with\n> > different ABIs in between the declarations), but rejecting the case of\n> > earlier declaration not specifying ABI relevant attributes and later one\n> > which specifies those (because there is a risk of calls with a wrong ABI\n> > in between).  And I really don't buy the aarch64 ABI attributes being in any\n> > way different from any other ABI attributes, all of those are ABI changes\n> > which have to be visible to all callers of the function.  By accepting\n> > void foo () [[gnu::abi_changing_fntype_attribute]];\n> > void foo ();\n> > there is no risk of it being misused.\n> \n> So, I think we should apply something like the patch below instead.\n\nI'll note that this makes GCC's behaviour inconsistent from clang, at least for\nthe keyword forms of the SME attributes: https://godbolt.org/z/GGKva4ef4\n\nBut otherwise I don't have the energy to argue further on this, so I\nwon't object if the other aarch64 maintainers agree that this is the\npath we want to go down.\n\nAlex\n\n> \n> 2026-04-21  Jakub Jelinek  <jakub@redhat.com>\n> \n> \tPR target/122483\n> \t* gcc.target/aarch64/sme/streaming_mode_1.c Don't expect error for\n> \tsc_a, sc_c, sc_e, s_a, s_c, s_e and keyword_contradiction_1.\n> \t* gcc.target/aarch64/sme/za_state_1.c: Don't expect error for shared_a,\n> \tshared_c, shared_e, preserved_a, preserved_c, preserved_e and\n> \tkeyword_conflict_1.\n> \t* gcc.target/aarch64/sme/za_state_2.c: Don't expect error for shared_b\n> \tand shared_d.  Expect different error for shared_f and shared_h.\n> \n> --- gcc/testsuite/gcc.target/aarch64/sme/streaming_mode_1.c.jj\t2026-03-27 10:17:17.910269122 +0100\n> +++ gcc/testsuite/gcc.target/aarch64/sme/streaming_mode_1.c\t2026-04-21 13:03:24.518242099 +0200\n> @@ -1,19 +1,19 @@\n>  // { dg-options \"\" }\n>  \n>  void sc_a () [[arm::streaming_compatible]];\n> -void sc_a (); // { dg-error \"conflicting types\" }\n> +void sc_a ();\n>  \n>  void sc_b ();\n>  void sc_b () [[arm::streaming_compatible]]; // { dg-error \"conflicting types\" }\n>  \n>  void sc_c () [[arm::streaming_compatible]];\n> -void sc_c () {} // { dg-error \"conflicting types\" }\n> +void sc_c () {}\n>  \n>  void sc_d ();\n>  void sc_d () [[arm::streaming_compatible]] {} // { dg-error \"conflicting types\" }\n>  \n>  void sc_e () [[arm::streaming_compatible]] {}\n> -void sc_e (); // { dg-error \"conflicting types\" }\n> +void sc_e ();\n>  \n>  void sc_f () {}\n>  void sc_f () [[arm::streaming_compatible]]; // { dg-error \"conflicting types\" }\n> @@ -27,19 +27,19 @@ extern void (*sc_h) (); // { dg-error \"c\n>  //----------------------------------------------------------------------------\n>  \n>  void s_a () [[arm::streaming]];\n> -void s_a (); // { dg-error \"conflicting types\" }\n> +void s_a ();\n>  \n>  void s_b ();\n>  void s_b () [[arm::streaming]]; // { dg-error \"conflicting types\" }\n>  \n>  void s_c () [[arm::streaming]];\n> -void s_c () {} // { dg-error \"conflicting types\" }\n> +void s_c () {}\n>  \n>  void s_d ();\n>  void s_d () [[arm::streaming]] {} // { dg-error \"conflicting types\" }\n>  \n>  void s_e () [[arm::streaming]] {}\n> -void s_e (); // { dg-error \"conflicting types\" }\n> +void s_e ();\n>  \n>  void s_f () {}\n>  void s_f () [[arm::streaming]]; // { dg-error \"conflicting types\" }\n> @@ -118,7 +118,7 @@ void keyword_ok_5 () [[arm::streaming_co\n>  //----------------------------------------------------------------------------\n>  \n>  void keyword_contradiction_1 () __arm_streaming;\n> -void keyword_contradiction_1 (); // { dg-error \"conflicting types\" }\n> +void keyword_contradiction_1 ();\n>  \n>  void keyword_contradiction_2 ();\n>  void keyword_contradiction_2 () __arm_streaming; // { dg-error \"conflicting types\" }\n> --- gcc/testsuite/gcc.target/aarch64/sme/za_state_1.c.jj\t2026-03-27 10:17:17.911269105 +0100\n> +++ gcc/testsuite/gcc.target/aarch64/sme/za_state_1.c\t2026-04-21 13:05:01.711603896 +0200\n> @@ -1,19 +1,19 @@\n>  // { dg-options \"\" }\n>  \n>  void shared_a () [[arm::inout(\"za\")]];\n> -void shared_a (); // { dg-error \"conflicting types\" }\n> +void shared_a ();\n>  \n>  void shared_b ();\n>  void shared_b () [[arm::inout(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_c () [[arm::inout(\"za\")]];\n> -void shared_c () {} // { dg-error \"conflicting types\" }\n> +void shared_c () {}\n>  \n>  void shared_d ();\n>  void shared_d () [[arm::inout(\"za\")]] {} // { dg-error \"conflicting types\" }\n>  \n>  void shared_e () [[arm::inout(\"za\")]] {}\n> -void shared_e (); // { dg-error \"conflicting types\" }\n> +void shared_e ();\n>  \n>  void shared_f () {}\n>  void shared_f () [[arm::inout(\"za\")]]; // { dg-error \"conflicting types\" }\n> @@ -27,19 +27,19 @@ extern void (*shared_h) (); // { dg-erro\n>  //----------------------------------------------------------------------------\n>  \n>  void preserved_a () [[arm::preserves(\"za\")]];\n> -void preserved_a (); // { dg-error \"conflicting types\" }\n> +void preserved_a ();\n>  \n>  void preserved_b ();\n>  void preserved_b () [[arm::preserves(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void preserved_c () [[arm::preserves(\"za\")]];\n> -void preserved_c () {} // { dg-error \"conflicting types\" }\n> +void preserved_c () {}\n>  \n>  void preserved_d ();\n>  void preserved_d () [[arm::preserves(\"za\")]] {} // { dg-error \"conflicting types\" }\n>  \n>  void preserved_e () [[arm::preserves(\"za\")]] {}\n> -void preserved_e (); // { dg-error \"conflicting types\" }\n> +void preserved_e ();\n>  \n>  void preserved_f () {}\n>  void preserved_f () [[arm::preserves(\"za\")]]; // { dg-error \"conflicting types\" }\n> @@ -139,7 +139,7 @@ __arm_new(\"za\") void keyword_ok_6 () {}\n>  //----------------------------------------------------------------------------\n>  \n>  void keyword_conflict_1 () __arm_inout(\"za\");\n> -void keyword_conflict_1 (); // { dg-error \"conflicting types\" }\n> +void keyword_conflict_1 ();\n>  \n>  void keyword_conflict_2 ();\n>  void keyword_conflict_2 () __arm_inout(\"za\"); // { dg-error \"conflicting types\" }\n> --- gcc/testsuite/gcc.target/aarch64/sme/za_state_2.c.jj\t2026-03-27 10:17:17.911269105 +0100\n> +++ gcc/testsuite/gcc.target/aarch64/sme/za_state_2.c\t2026-04-21 13:12:03.818488094 +0200\n> @@ -24,25 +24,25 @@ void new_za_f () {}\n>  void shared_a () [[arm::inout(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_b () [[arm::inout(\"za\")]];\n> -[[arm::new(\"za\")]] void shared_b (); // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_b ();\n>  \n>  [[arm::new(\"za\")]] void shared_c ();\n>  void shared_c () [[arm::in(\"za\")]] {} // { dg-error \"conflicting types\" }\n>  \n>  void shared_d () [[arm::in(\"za\")]];\n> -[[arm::new(\"za\")]] void shared_d () {} // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_d () {}\n>  \n>  [[arm::new(\"za\")]] void shared_e () {}\n>  void shared_e () [[arm::out(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_f () [[arm::out(\"za\")]] {}\n> -[[arm::new(\"za\")]] void shared_f (); // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_f (); // { dg-error \"cannot apply attribute 'new' to 'shared_f' after the function has been defined\" }\n>  \n>  [[arm::new(\"za\")]] void shared_g () {}\n>  void shared_g () [[arm::preserves(\"za\")]]; // { dg-error \"conflicting types\" }\n>  \n>  void shared_h () [[arm::preserves(\"za\")]] {}\n> -[[arm::new(\"za\")]] void shared_h (); // { dg-error \"conflicting types\" }\n> +[[arm::new(\"za\")]] void shared_h (); // { dg-error \"cannot apply attribute 'new' to 'shared_h' after the function has been defined\" }\n>  \n>  //----------------------------------------------------------------------------\n>  \n> \n> \n> \tJakub\n>","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=SFcT1tmr;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=SFcT1tmr;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=SFcT1tmr;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=SFcT1tmr","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.69.33"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0LQT5311z1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 21:55:28 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id C32434BAD151\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 11:55:25 +0000 (GMT)","from AM0PR83CU005.outbound.protection.outlook.com\n (mail-westeuropeazon11010033.outbound.protection.outlook.com [52.101.69.33])\n by sourceware.org (Postfix) with ESMTPS id EB0FD4BAD167\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 11:54:06 +0000 (GMT)","from AM8P191CA0022.EURP191.PROD.OUTLOOK.COM (2603:10a6:20b:21a::27)\n by PA4PR08MB7457.eurprd08.prod.outlook.com (2603:10a6:102:2a4::8)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.32; Tue, 21 Apr\n 2026 11:54:00 +0000","from DB5PEPF00014B97.eurprd02.prod.outlook.com\n (2603:10a6:20b:21a:cafe::20) by AM8P191CA0022.outlook.office365.com\n (2603:10a6:20b:21a::27) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 11:54:00 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n DB5PEPF00014B97.mail.protection.outlook.com (10.167.8.235) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.18\n via Frontend Transport; Tue, 21 Apr 2026 11:54:00 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com (2603:10a6:102:33e::15)\n by PAXPR08MB6607.eurprd08.prod.outlook.com (2603:10a6:102:152::19)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.33; Tue, 21 Apr\n 2026 11:52:56 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377]) by PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377%4]) with mapi id 15.20.9818.032; Tue, 21 Apr 2026\n 11:52:56 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org C32434BAD151","OpenDKIM Filter v2.11.0 sourceware.org EB0FD4BAD167"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org EB0FD4BAD167","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org EB0FD4BAD167","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1776772448; cv=pass;\n b=EPaA1djhomaSyDfkypZVUysIKOeJTvaQJO4IQItdcFSfwvv9euwWs1P2/+aQyTCSzl8pFXzt7ZFXh1JcP3znfbxJADGaexkJ2B30zazblFmxNNKm+95O5rVRGG++D5XjNo+SoFw58Wl+x11UategPqH/sv6pCq3SitQgw/7eNyA=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=PZXVl45GX+4/p/wA/hFvd3k7zdtZIb4nNWZey6Dr5sZyxF5c14hso8ztxeZw3VVbxRfk/ClLSqgqlKWS2L4BuyL4uX+HrBPXoOW2Xf0MRu1pRITBWIY9kQmT6dr487AZvsYIu69Y52Y86Q+zA2EzmD4cIjMRpmmTIC25dIxy/FxcPBY5XAEgTPxd7MqU5tpyf1OYJCFq4vLV7hsjvuF1R+7D4lKn41ddwLnjF9A+v941PHXhZmdp8ytAWTMiby4y6rUefA6mGHkgmyD1KSk1DPdxAtLnchldWZ5Q6igovArd4bu5c2TM2LYqb3eu5jSI0KIR8KYfKXvzaknO24Bk6w==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=r7ORFyekvAzGjPqf5+lAO8YUAb6+CLDEmZkehc5Q04uk0oxFnzOXG12wNy3IY7LqmpcHKhACMZ2k7/4m28Vd+5xO+Ns5LdCmxmA9A6FRvSe0EVm2oBOe4sYkiW0oEdYUWx5+/solwrYL6ZYFJprifsLVkJSjhmy4x1UtJkg+7up1vmx4OpObBN0sNH5XH+CQ4fy+jrfFXcTuyuhHXEpTgMbA8kIe9tRqDr5mJNw0bsJa9QGW+wEJ3V8vt/iPuBggUDONI0DCYCjHjqQBq5QWWtikkcKSYIRTnq33Kq5wnBypia7Aguabuh+fjO+W2iLCgQMFAIgLPA5nqXOf85o9Kg=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776772448; c=relaxed/simple;\n bh=cy99ANzypMcrEpmU4MaHZEJmjxJkLbc9QltXRAxt+Eg=;\n h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID:\n MIME-Version;\n b=K4fKVMtz3UH+8SrUlpmndJUNUUzTqAUEiABjlEsL+Z9Pe8Tw2HFaNqU5OOMDwXjnTIDi6crms0MDDfY2BD4G25T+XbIaaedMFEzX+0i7V6xCsmRE7sEFci6D4Cc5Xk8wsfNNtXcUVzRo1EEEPt5qLi3r6XiIS6DIA4KBnq9DQ9c=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=9mgSn44V55b4WLolnjJEyfmucB27b3DzrOSHNIG3SgM=;\n b=osGgUdB3th9mj/4PI0oag5aY27qD8fc55VuOss76Q7tRQAruYspCzuhnW39vbD4dnalNExQxkNLEtWriubCznYakdxUBrYWkb+IahvCrjEqbSA4rRQj7TJ5JHi4vGgKV4acOfrOp9C9eY6+zbFauf76UizKfBnOy0y8q+jmAY2rPHNcv7Iv/fwRof8tidrF8eHOn6LZ+Z6wH/Y8iocpf8Ig0P/DbGc2EjYfEhd3Pl18V1y0iXGnwVJ885OW1ibyEl5IVaStSiN7LuGvt+X+aT6lhMR385QjxgNxQEUXc2MKD8Ypx2nCDdFOwBFfpcUe1DpdvNjHYKUr3hm00OWHCHA==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=9mgSn44V55b4WLolnjJEyfmucB27b3DzrOSHNIG3SgM=;\n b=Nt5zh8nKB5z/sA2tmu0oYtV0QKoGbdcR1FgTtoUWd5Oh4jTNHNSjWSHmDO8ksPr4q6CKle5fjRCtWBLoqVQg8iD64nZkVDpovC0qY48PmyvH8foX6QY9go3a0XLiO6Il+X57wc4ZXNLES3FKwYF0VGTB/0tUJ76RrkhgKMRVF4Ry9LEwz7V64DSgnTvGOL6dzzLhu6y3O7U1WjBH3FBBsTut6yi93S6R073b0PxaBaxnunhgW/pbfF8TrCJfC/j42E85uEkv7JvDhIz6Vt++atxCFE/ej8YIZYvCVctBQrk3N6BipeeYK5Q7pVsRv9z8OK9NWtOOkXrBiiIMLWA7CQ=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=redhat.com smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=9mgSn44V55b4WLolnjJEyfmucB27b3DzrOSHNIG3SgM=;\n b=SFcT1tmrLbAYihY1RG7NvQMT2c+c30NiKTC5IrnIKmx4f2prsqh17X3x5gE06XWalRNruthAl6DfLZPwuIz53BSTlvgvUGFCQ+/yzoX/DpQc3JpDDsle1CuK7Cr2C1jgnAGmIgjntMJNI/3baNZYd/kppThKtDbV7w9n4Q5iqVs=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=9mgSn44V55b4WLolnjJEyfmucB27b3DzrOSHNIG3SgM=;\n b=SFcT1tmrLbAYihY1RG7NvQMT2c+c30NiKTC5IrnIKmx4f2prsqh17X3x5gE06XWalRNruthAl6DfLZPwuIz53BSTlvgvUGFCQ+/yzoX/DpQc3JpDDsle1CuK7Cr2C1jgnAGmIgjntMJNI/3baNZYd/kppThKtDbV7w9n4Q5iqVs="],"X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","Received-SPF":"Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","Authentication-Results-Original":"dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;","Date":"Tue, 21 Apr 2026 12:52:53 +0100","From":"Alex Coplan <alex.coplan@arm.com>","To":"Jakub Jelinek <jakub@redhat.com>","Cc":"\"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>,\n Marek Polacek <polacek@redhat.com>, gcc-patches@gcc.gnu.org,\n Alice Carlotti <alice.carlotti@arm.com>,\n Richard Sandiford <rdsandiford@googlemail.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aedlFWvEhJTXEm2C@arm.com>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>","Content-Type":"text/plain; charset=utf-8","Content-Disposition":"inline","In-Reply-To":"<aedcwlyS96ASGI5e@tucnak>","X-ClientProxiedBy":"PR3P189CA0044.EURP189.PROD.OUTLOOK.COM\n (2603:10a6:102:53::19) To PAWPR08MB8958.eurprd08.prod.outlook.com\n (2603:10a6:102:33e::15)","MIME-Version":"1.0","X-MS-TrafficTypeDiagnostic":"\n PAWPR08MB8958:EE_|PAXPR08MB6607:EE_|DB5PEPF00014B97:EE_|PA4PR08MB7457:EE_","X-MS-Office365-Filtering-Correlation-Id":"706766f5-fa52-41ae-b02a-08de9f9cad24","x-checkrecipientrouted":"true","NoDisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|366016|1800799024|376014|18002099003|22082099003|56012099003;","X-Microsoft-Antispam-Message-Info-Original":"\n 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","X-Forefront-Antispam-Report-Untrusted":"CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAWPR08MB8958.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(366016)(1800799024)(376014)(18002099003)(22082099003)(56012099003);\n DIR:OUT; SFP:1101;","X-Exchange-RoutingPolicyChecked":"\n ElrFAYoRIpS/F88n29JLHwhJEtVqg4zWCBk9vfV82hLKGCf07vhwFzoN4gndXlewEI7o0t2dOAYMvP5Hdu1FfSEKSEYM7pqCvjF1MzqgqlMvhkqwaErmPzeEOq1YXelX23Utam6uYSiWL9TL7WrVEBTr+Jg73jO3KIintkjr4ZEvIdtrV9+2nw5h06SLS7xR9APNlchX3Ni8264wnV0REQODsE+9wT04UIGoQqHBwlo7g4CmDIKNzUZHTUDEXJRtrV+KMi19ZzP/Ug9TexqgwEydMgolfZHTdkig5zuvVjUGU0x6Fakz+RiSvN1hocUc9MogZ/xmk/+aq8cC4qpcEQ==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["PAXPR08MB6607","PA4PR08MB7457"],"X-EOPAttributedMessage":"0","X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n DB5PEPF00014B97.eurprd02.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n a8ff7809-2631-4acd-ec37-08de9f9c870b","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|82310400026|35042699022|14060799003|36860700016|376014|1800799024|56012099003|18002099003|22082099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(82310400026)(35042699022)(14060799003)(36860700016)(376014)(1800799024)(56012099003)(18002099003)(22082099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n V2fRfmCoiP19f3u+KAPKyX4WirsA/XWXID1h3FNBUTjSajjvhiAZwnc+wgFvtqak3d2+gtFS3eMiRJ39TBN4EdJqTfakx6LQueDxGfPiD6KgLNWA8f+jIYy0T9EaapoepFK+SpcwdSkboqb1eA5dOsQWex0V5EYIRlCBoSj8SHw2EukpWr73dQF+3SWMM3h9tWhtR5Ae7j3cs+RpwjZZOXrsM+7zGxoAzz1sumwtwKDxtC+OOyy+IxzqI3VatSqzz5JqpFp5FGhiZq+8zsO5Mht8nKHgCby0lR6a+/bDK02hcdN8NQp5Mmfm5n3CYUn3eRL/WVdo0tEq+6Q9E7V6mYI9bj/3IpCrX4+hbJaeS+J+iqwmH06yIN+fURE5tg1eRKwoq3xhKh8ALCsw9dz7NlSVf4ZgE+20AQRxwcUmGsQVy2ZepIRH0CUkcpjhPPvh","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"21 Apr 2026 11:54:00.0601 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 706766f5-fa52-41ae-b02a-08de9f9cad24","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n DB5PEPF00014B97.eurprd02.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679838,"web_url":"http://patchwork.ozlabs.org/comment/3679838/","msgid":"<875x5kmsn4.fsf@googlemail.com>","list_archive_url":null,"date":"2026-04-21T11:58:55","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":4363,"url":"http://patchwork.ozlabs.org/api/people/4363/","name":"Richard Sandiford","email":"rdsandiford@googlemail.com"},"content":"Jakub Jelinek <jakub@redhat.com> writes:\n> On Tue, Apr 21, 2026 at 12:57:49PM +0200, Jakub Jelinek wrote:\n>> On Wed, Apr 08, 2026 at 03:28:18PM +0100, Alex Coplan wrote:\n>> > I have now done so with a follow-up patch:\n>> > https://gcc.gnu.org/pipermail/gcc-patches/2026-April/712482.html\n>> > \n>> > In the end it made more sense to add these tests separately, since the\n>> > test itself won't start passing until the 3/4 aarch64 patch is applied\n>> > anyway.\n>> > \n>> > Is this patch now OK for trunk?  I'm hoping that mine and Richard's\n>> > arguments\n>> > were sufficiently persuasive as to why we want this behaviour for the\n>> > relevant SME attributes.\n>> \n>> So, looking at this some more, I see that the r16-4667 commit just made\n>> C FE behave like C++ FE used to behave already since PR15774 r0-105636.\n>> And apparently clang behaves the same, both in C and C++ for many years\n>> (tried both current clang and clang++ trunk and 9.0.0, unfortunately older\n>> releases aren't on godbolt for aarch64; trying with regparm(3) instead of\n>> the aarch64 specific ABI attributes, even clang and clang++ behaves that\n>> way in 3.1, so also from at least 2011-ish).\n>> \n>> Thus, my strong preference would be to adjust the aarch64 testsuite\n>> for the new behavior, which is now consistent between the FEs and different\n>> compilers, accepting not specifying function type attributes if they have\n>> been specified before (so, there is no risk of function being used with\n>> different ABIs in between the declarations), but rejecting the case of\n>> earlier declaration not specifying ABI relevant attributes and later one\n>> which specifies those (because there is a risk of calls with a wrong ABI\n>> in between).  And I really don't buy the aarch64 ABI attributes being\n>> in any\n>> way different from any other ABI attributes, all of those are ABI changes\n>> which have to be visible to all callers of the function.  By accepting\n>> void foo () [[gnu::abi_changing_fntype_attribute]];\n>> void foo ();\n>> there is no risk of it being misused.\n>\n> So, I think we should apply something like the patch below instead.\n\nI think we're going around in circles here.  As we've said previously,\nattributes are not the official syntax for this feature.  They are\nused by GCC as the implementation of __arm_streaming, etc., which\nin Clang are keywords.  GCC 15's behaviour wrt __arm_streaming\nwas consistent with Clang's and it's GCC 16's behaviour that is\nout of sync.  (I was going to provide a godbolt link, but I see\nthat Alex has just provided one.)\n\nIf the decision is to refuse to allow any target attributes to behave\nas these attributes did in GCC 15, then will the C and C++ frontends\ninstead accept target-specific keywords (as Clang did) and allow those\nkeywords to behave as we want?  If not, then it seems like the decision\nis that GCC is outright refusing to be compatible with Clang (and with\nthe spec).  That just doesn't feel constructive to me.\n\nNote that keywords would be significantly more invasive than Alex's patch.\n\nThanks,\nRichard","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=bzqHUNFb;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=bzqHUNFb","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=googlemail.com","sourceware.org; spf=pass smtp.mailfrom=googlemail.com","server2.sourceware.org;\n arc=none smtp.remote-ip=209.85.128.49"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0LWz2lJKz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 22:00:15 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 770A54B9DB70\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 12:00:13 +0000 (GMT)","from mail-wm1-f49.google.com (mail-wm1-f49.google.com\n [209.85.128.49])\n by sourceware.org (Postfix) with ESMTPS id F04C64BAD15C\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 11:59:05 +0000 (GMT)","by mail-wm1-f49.google.com with SMTP id\n 5b1f17b1804b1-4891f625344so22526805e9.0\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 04:59:05 -0700 (PDT)","from localhost ([2a00:23c7:ef4f:7201::fad])\n by smtp.googlemail.com with ESMTPSA id\n 5b1f17b1804b1-48a4b329542sm171450125e9.3.2026.04.21.04.59.03\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 21 Apr 2026 04:59:04 -0700 (PDT)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 770A54B9DB70","OpenDKIM Filter v2.11.0 sourceware.org F04C64BAD15C"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org F04C64BAD15C","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org F04C64BAD15C","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776772746; cv=none;\n b=c/npsno+2cGj4+FCqSzQbtZ3MfI8WOdCANz1VDvrXAai6LOXGnXbTSumZBGOf50O51JjVlSPanybCiFrSixM1QmWePF1nsVlE44gnij2AnocIaS+BcR2Zpa1RmgozK2TTd/v4XOZ1sUAi1VEqZ84Y07hGnBbh6zwFZI4NPK+sN0=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776772746; c=relaxed/simple;\n bh=kot6rAcYi3U75Swchn8xJufXq7dmOxpigeja7XpYHFs=;\n h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version;\n b=nI8/IofR9ZRrStgv0aohkuFAGU6hakxRJjA9W8CSg5lWoKx6ntRTe8AY+4YpE3+vWQEY+1WH/fCT96+AGCKjpFYwjrNFsi5WoBL1EFCaJHYkKo4ExTnhdmpXpUKCCh5WLErBlN1kq7L+VVtiFpNbm9a7tWFz6TWEM4FGXw+kjKA=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=googlemail.com; s=20251104; t=1776772745; x=1777377545; darn=gcc.gnu.org;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=VMPi6mj0KSvbnISAKyhv58X1HJ6TtsJW/kX4DfZ5hzo=;\n b=bzqHUNFbXGHC1MaH4xeZin4g2aCiqgktZ4G4n/4TYxZw6XIsodVZBjMiZU4N2e12IY\n L/baEOfYYK8QXmm5fvhYz/LfnAs1bZJc5QamWkTgnfBxabPIkQSXyDxNsFlaIXSCveM7\n JK9zfmoxmqTYw1Nm/vCsDP7mbVX4VzMii39lmw1H46U8BGX2G2sfl9S89LIVufwJb6yR\n KyAI5sS2hJIusW9fv4TBPZGx0bUjCE7bzZt9g2QwshSps2+fUWgF3oYUfgBqrzGnpytc\n zVFJ8Vh82zZdTHPNPvKqYikpoo5WnmbJxp1m5MkNC+vTGR9P4bat+xWztSq4Egz1a4Bf\n Essw==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776772745; x=1777377545;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=VMPi6mj0KSvbnISAKyhv58X1HJ6TtsJW/kX4DfZ5hzo=;\n b=h1/J8dU+4pYu/VK6rUfB5xNebsT7zW0bm5VaD55s6+IGohM6Prf7NnsBIQbMCd0t28\n 2ZsVv+8qC71Z3nP60gFm/Lap8AdLsb47qz6Bjs2vUVNQ2/+ZBavp0lPdKe9CdCoGcv/9\n 3XwTopNQiF5TNZ6VFJGAvU/S2tmsgws35RXpuhpeuzLVJdAr/rmlBaBa8f0jbXSJeUsu\n VIH+ixJ4/GDuFIlA8QbxCQfkJT11SfgFPUOwvMTOngX2UFSeJt6JXv1LJdBdLKjvUrFY\n mg8/wCS61EjYznKTk5+VVlvLWemsJsFA10z9K19MAERveMJVm2grN4Ax+wBNDSaHeOah\n QFbg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8X5Cawnv4XWW3z/S2husekaKIgAWtCpCK9PKkLVe8QoAKBukIFuMkm7CdIKOmo3it/QHTn9DuKLbrK7Q==@gcc.gnu.org","X-Gm-Message-State":"AOJu0YyWKSXUFI04RTTDDtz1uWCkylUxfUb2LlDiAI1GUuHrTkk1JMwn\n fzEqQj7EmpdGNS6PijEB8vJ5XQXSloVpMcT8aLGQJZMQQH4Y1yGTD7Wi","X-Gm-Gg":"AeBDieutK/2NqGHnJ0uQDxvINEA5gn7llGcDNdh/5nEYQVEbT+TDNiqNUUmzjB0yHbr\n aclh0Fk+7GKVkkLdFpclPULC1VOkHeLr3LzK6qiKqyye10CsioevbJYT48nyjGQCD+/MG1btTDj\n XFQkASklMldoz2hNav/WO5af9vVdvl9T+0rRmGFvIGCOUrQuRSGuJMfeILC+qtI7QItv329NFEX\n DplwNrm0VMTBTRKs1m4sFzFFudzuMNAGMqzdNg1jBdVLnG4knM7hmR2JRUlkKkdrjWXu/oZJiId\n fbRbd3L4yt3jQXtL+8vs/jfQBgv6YIhdfIXy5jRos0IMlyBPxtiPHRiNRpTuWuQxNrLTdblKsF2\n 5f3tJLsIaNQ9ZWWKiELAQ/RblEKfzS3DkU1ipRnerrkvx69D2EcCaWVJXmU68BrAr1oJZKnbJuP\n skU6ncZvzxyGD7I3iERdYUn5uylKjOOJhD5w==","X-Received":"by 2002:a05:600c:8b6b:b0:485:3c2e:60d5 with SMTP id\n 5b1f17b1804b1-488fb8859ddmr238763705e9.2.1776772744465;\n Tue, 21 Apr 2026 04:59:04 -0700 (PDT)","From":"Richard Sandiford <rdsandiford@googlemail.com>","To":"Jakub Jelinek <jakub@redhat.com>","Mail-Followup-To":"Jakub Jelinek <jakub@redhat.com>,Alex Coplan\n <alex.coplan@arm.com>,  \"Joseph S. Myers\" <josmyers@redhat.com>,  Richard\n Biener <rguenther@suse.de>,  Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org,  Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,  Tamar Christina\n <tamar.christina@arm.com>,  Kyrylo Tkachov <ktkachov@nvidia.com>,  Andrew\n Pinski <andrew.pinski@oss.qualcomm.com>,  Wilco Dijkstra\n <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Cc":"Alex Coplan <alex.coplan@arm.com>,  \"Joseph S. Myers\"\n <josmyers@redhat.com>,  Richard Biener <rguenther@suse.de>,  Marek Polacek\n <polacek@redhat.com>,  gcc-patches@gcc.gnu.org,  Alice Carlotti\n <alice.carlotti@arm.com>,  Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,  Kyrylo Tkachov\n <ktkachov@nvidia.com>,  Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","In-Reply-To":"<aedcwlyS96ASGI5e@tucnak> (Jakub Jelinek's message of \"Tue, 21\n Apr 2026 13:17:22 +0200\")","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>","Date":"Tue, 21 Apr 2026 12:58:55 +0100","Message-ID":"<875x5kmsn4.fsf@googlemail.com>","User-Agent":"Gnus/5.13 (Gnus v5.13)","MIME-Version":"1.0","Content-Type":"text/plain","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679844,"web_url":"http://patchwork.ozlabs.org/comment/3679844/","msgid":"<aedpbln-LiXs008Z@tucnak>","list_archive_url":null,"date":"2026-04-21T12:11:26","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":671,"url":"http://patchwork.ozlabs.org/api/people/671/","name":"Jakub Jelinek","email":"jakub@redhat.com"},"content":"On Tue, Apr 21, 2026 at 12:58:55PM +0100, Richard Sandiford wrote:\n> I think we're going around in circles here.  As we've said previously,\n> attributes are not the official syntax for this feature.  They are\n> used by GCC as the implementation of __arm_streaming, etc., which\n> in Clang are keywords.  GCC 15's behaviour wrt __arm_streaming\n> was consistent with Clang's and it's GCC 16's behaviour that is\n> out of sync.  (I was going to provide a godbolt link, but I see\n> that Alex has just provided one.)\n\nI was testing attributes, like __attribute__((aarch64_vector_pcs))\nand __attribute__((preserve_none)) and there clang and clang++ behaves the same\nas gcc 16 and g++ 10-16.\nThe patchset posted was changing behavior of those, so makes them\nincompatible with clang.\n\nWhere is it documented that\nvoid foo () __arm_streaming;\nvoid foo ();\nis invalid?  I don't see it in clang documentation, nor\nhttps://arm-software.github.io/acle/main/acle.html#__arm_streaming\n\n\tJakub","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=CveVmgD6;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=CveVmgD6","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","sourceware.org; spf=pass smtp.mailfrom=redhat.com","server2.sourceware.org;\n arc=none smtp.remote-ip=170.10.129.124"],"Received":["from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Lng3Smxz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 22:12:06 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 257754B9DB59\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 12:12:04 +0000 (GMT)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n by sourceware.org (Postfix) with ESMTP id 423F34BA2E0B\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 12:11:35 +0000 (GMT)","from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-215-leCCvZ5NM_iEEGdFEmy-sw-1; Tue,\n 21 Apr 2026 08:11:33 -0400","from mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.111])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id 4940819560AA; Tue, 21 Apr 2026 12:11:31 +0000 (UTC)","from tucnak.zalov.cz (unknown [10.44.48.12])\n by mx-prod-int-08.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with\n ESMTPS\n id 3ABE61800660; Tue, 21 Apr 2026 12:11:29 +0000 (UTC)","from tucnak.zalov.cz (localhost [127.0.0.1])\n by tucnak.zalov.cz (8.18.1/8.18.1) with ESMTPS id 63LCBRQu918810\n (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n Tue, 21 Apr 2026 14:11:27 +0200","(from jakub@localhost)\n by tucnak.zalov.cz (8.18.1/8.18.1/Submit) id 63LCBQiY918809;\n Tue, 21 Apr 2026 14:11:26 +0200"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 257754B9DB59","OpenDKIM Filter v2.11.0 sourceware.org 423F34BA2E0B"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 423F34BA2E0B","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 423F34BA2E0B","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776773495; cv=none;\n b=YBx/DPhpGVaRl33uK6poiEHy2ho7aEMAaLSrFm6L3E+mRPV5IVXkKODoaQqYupYnYSIa52WHG4N8TTtYz0SSzLl6SNBFxGHaERoNg+WjaDCs01RhBDP2gxiZsIi9PpMmssv/+lUh5RtiNLgYV7hAc+CtEiBFoNXr/2MCb+l7FZA=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776773495; c=relaxed/simple;\n bh=zrF4p4x5mBEBmKyR+Bm6Unc7IEPomaS0QrMXgR98qtQ=;\n h=DKIM-Signature:Date:From:To:Subject:Message-ID:MIME-Version;\n b=SlahFDgFBBx2uth+SdcotkLHTmnc3m2327KOh4Eks2T33RruJH5u1XRHac+BXBv0LUhEUOg2NEzAP+ddTPokD4dfRL4cgy2JoQunw92Yj1jm0WxWCTVmUI2w8MGQLbDdyXN3UgzGQn7W0wCg6EiaZ87noqgpKgbHfbQthsaB7gk=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776773494;\n h=from:from:reply-to:reply-to:subject:subject:date:date:\n message-id:message-id:to:to:cc:mime-version:mime-version:\n content-type:content-type:in-reply-to:in-reply-to:  references:references;\n bh=ZbCA3Le60nUwgvu728s6BRiCRBruUxKZMUWOeWZP+ls=;\n b=CveVmgD6hhoi8V9nQzsQ9HvwiRMVMRPq5xHxttgD+tiQ+FflBdvhiUrTa0Aze/75dKFoEo\n 7ksJOxriq9+yE8o2oS0LHtnS664psWEV+ilEHMnyQMBhj1F02y4pIcks/9U7dbxtfoTgvY\n idX2Bj5st3Z3YdmKVE3N18aHI8oMTck=","X-MC-Unique":"leCCvZ5NM_iEEGdFEmy-sw-1","X-Mimecast-MFC-AGG-ID":"leCCvZ5NM_iEEGdFEmy-sw_1776773491","Date":"Tue, 21 Apr 2026 14:11:26 +0200","From":"Jakub Jelinek <jakub@redhat.com>","To":"Alex Coplan <alex.coplan@arm.com>,\n \"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>, Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org, Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aedpbln-LiXs008Z@tucnak>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com>","MIME-Version":"1.0","In-Reply-To":"<875x5kmsn4.fsf@googlemail.com>","X-Scanned-By":"MIMEDefang 3.4.1 on 10.30.177.111","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"kzku5S6Y1xCJwTtBOOB90yelv4PSDJv3JBiGK5NzPow_1776773491","X-Mimecast-Originator":"redhat.com","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Reply-To":"Jakub Jelinek <jakub@redhat.com>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679847,"web_url":"http://patchwork.ozlabs.org/comment/3679847/","msgid":"<87wly0lcy8.fsf@googlemail.com>","list_archive_url":null,"date":"2026-04-21T12:23:11","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":4363,"url":"http://patchwork.ozlabs.org/api/people/4363/","name":"Richard Sandiford","email":"rdsandiford@googlemail.com"},"content":"Jakub Jelinek <jakub@redhat.com> writes:\n> On Tue, Apr 21, 2026 at 12:58:55PM +0100, Richard Sandiford wrote:\n>> I think we're going around in circles here.  As we've said previously,\n>> attributes are not the official syntax for this feature.  They are\n>> used by GCC as the implementation of __arm_streaming, etc., which\n>> in Clang are keywords.  GCC 15's behaviour wrt __arm_streaming\n>> was consistent with Clang's and it's GCC 16's behaviour that is\n>> out of sync.  (I was going to provide a godbolt link, but I see\n>> that Alex has just provided one.)\n>\n> I was testing attributes, like __attribute__((aarch64_vector_pcs))\n> and __attribute__((preserve_none)) and there clang and clang++ behaves\n> the same\n> as gcc 16 and g++ 10-16.\n> The patchset posted was changing behavior of those, so makes them\n> incompatible with clang.\n>\n> Where is it documented that\n> void foo () __arm_streaming;\n> void foo ();\n> is invalid?  I don't see it in clang documentation, nor\n> https://arm-software.github.io/acle/main/acle.html#__arm_streaming\n\nIt was supposed to be covered by:\n\n  Except where noted otherwise, function types that have an attribute\n  are incompatible with function types that do not.\n\nThus the above is invalid because the function type in the second\ndeclaration is incompatible with the function type in the first\ndeclaration.  I agree an example would have been good though...\n\nRichard","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=P0PI31++;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=P0PI31++","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=googlemail.com","sourceware.org; spf=pass smtp.mailfrom=googlemail.com","server2.sourceware.org;\n arc=none smtp.remote-ip=209.85.221.41"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0M3g3MzMz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 22:23:54 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id CEC664B9DB5E\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 12:23:51 +0000 (GMT)","from mail-wr1-f41.google.com (mail-wr1-f41.google.com\n [209.85.221.41])\n by sourceware.org (Postfix) with ESMTPS id 8DAFC4BA23F2\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 12:23:25 +0000 (GMT)","by mail-wr1-f41.google.com with SMTP id\n ffacd0b85a97d-43d572f7437so2765068f8f.1\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 05:23:25 -0700 (PDT)","from localhost ([2a00:23c7:ef4f:7201::fad])\n by smtp.googlemail.com with ESMTPSA id\n ffacd0b85a97d-43fe4e46898sm38304902f8f.27.2026.04.21.05.23.23\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 21 Apr 2026 05:23:23 -0700 (PDT)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org CEC664B9DB5E","OpenDKIM Filter v2.11.0 sourceware.org 8DAFC4BA23F2"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 8DAFC4BA23F2","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 8DAFC4BA23F2","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776774205; cv=none;\n b=BIBnspjw0DbjibGVCxvPNALAK0zEi6/IfZEwB891ZU/ZK0W76dBMKVvOtqX2AoTtiCDc7Ykh2JMl1tZroz1w1Np0vkQvi1QUDQw0Zd2Ru1zuc0wp1c9XsbpSvlhWa87TL2fxuYZ13PEnY0LT72L7gh43j3i4WLvBVn7CM1Pf1pU=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776774205; c=relaxed/simple;\n bh=KF2ewV6Tjw7i7vKED0nWYxTK0e44u38FdoIDCJ/sDmY=;\n h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version;\n b=ci7tsbwO/Lcxeyh7hLBWRRvBi9+SB3xYsdl6EMrVzX3Jg1bgDE8h5DdeIIYUjtfJ6n45sU2jAPLbX7BXVCuczCx5nk2cUmMEvl3dU0gndSEBQ9qvHDyV97avB1GrJsyFOt1+BlICx15mcBlnDtKA05Vz6huuuvjKQIoA3SO7iec=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=googlemail.com; s=20251104; t=1776774204; x=1777379004; darn=gcc.gnu.org;\n h=mime-version:message-id:date:user-agent:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=S9D/D/HUJ8VFU/C/aC0fgFqRTNgnIzEHpHV6qWL/lY8=;\n b=P0PI31++XDZtkdg3pTGC0vUnfi0QbkdN3eZaKZMY1fco3axpWEayODT1EQG4hETSDb\n vw9BWDd7tHe+cXcXo+OaIIIEKxfmes0jWN0pxoAzFTQM4zk2PoiKPKFOBCoDumATj46D\n hdmWlsl6XNM42wcN+MSXIsX7ZqLisXtPJ+Q5w3FcMwhX0todQF8x+1PPxar6Lj891hZa\n urkypQd/n/uZE+weTGyTFpP/8LSX+AHK0RBmjQpDYvrZmSV5dw56lrqhXWwpUuhQ+sA5\n Dgg5rAqPSZP20WFwFBeA+gMTic4xeTDH8eFSVWXAUBMvdDDtHP057NR6nLpxWdeJrZIn\n tRyQ==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776774204; x=1777379004;\n h=mime-version:message-id:date:user-agent:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=S9D/D/HUJ8VFU/C/aC0fgFqRTNgnIzEHpHV6qWL/lY8=;\n b=D3fV3wseExvHnF4Fexk6HSa/8EItvmWThTuAtEisnRexCrX0nINWQn/fhWdwvMP7wj\n ixZvhkwr53S/vCrEcT1o7ZBg/x9ujz6CIZ51Pf1M5aSioht4w2A9SiiXUhoEf6H20S7s\n Fz9EYMjwY3ayTSEVdqGN8hzbcy0Bjh+J804A7FAiSRW+1cf7QMlLKLEX3+nEe63q6Gkr\n /U3UYzrtO/WpLClvGomN4kk5FrWwy3FWg/qJA7MeWODc+ElPD9DUCH+z6e6HNlVki3p6\n unc/tPXKtmfcVA/zHELldDeBPvvI/SA30Gm7ALwSXdOuxgpwI4JRlQZJYUFLgc2HMxP+\n 9cTA==","X-Forwarded-Encrypted":"i=1;\n AFNElJ/Q8LUg19nCkxYqzQ9O3eh4MHVwtLJqgMK+ltS3A5fzuxDpRUuZ6cpK+cxlA6ud46SVmHDjQWZV1RKyLg==@gcc.gnu.org","X-Gm-Message-State":"AOJu0YyafC0MkWPZKSDSWG8w/smmTxs5DqFVolaMHC9GNF30zB4pr0SG\n /88DAAruDKpQ3r5RgeOYNa7VYV0Lryrvwb1wUlQBNkjg7chg/4kp57+X","X-Gm-Gg":"AeBDiesAqrhhgQqVvt1qDYhrdVXXZLTtgq2C6Dkik8ox971SIksnaWDso9nibhJa/yi\n O5lMlgJKEWW/AoBBJNVx6VlLJeWSGANAJdQbeLTWXi6RX8iIfdJ8VYJooJ/oSlO0awIlu/3SsIF\n zGgosDG4Kow8x8vygZ/uWrZ9/ZjkYS5+nPzdz2f5w8TGMtqpUWZBgrVGvaUmC64w048JLkLrLO/\n etD5LSFoPrNbfx88/g0i/J7pd7RMqexrQEd6KA0sUFkmebY/WV1TeW/sdgYfTS3aFEkM95osk9i\n txBtrqgI9B5gy4/ygwf0kiNhNXi3KWOBR75Xrxsxjztf3dL5yxuWoa52+NsIOF0qAwb9r8KqbIy\n tKfDscHl1ZhTq9LDCnTt3//7vqeoMctUy7qB8Mm5lyg47EQoV2FsYfJ4kxHHkIkKd6V3x1e8ZO0\n dMpAAOfFClaTtBUDWBpnG60Vg=","X-Received":"by 2002:a5d:64c4:0:b0:43d:7633:2665 with SMTP id\n ffacd0b85a97d-43fe3e1f739mr27088320f8f.44.1776774204046;\n Tue, 21 Apr 2026 05:23:24 -0700 (PDT)","From":"Richard Sandiford <rdsandiford@googlemail.com>","To":"Jakub Jelinek <jakub@redhat.com>","Mail-Followup-To":"Jakub Jelinek <jakub@redhat.com>,Alex Coplan\n <alex.coplan@arm.com>,  \"Joseph S. Myers\" <josmyers@redhat.com>,  Richard\n Biener <rguenther@suse.de>,  Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org,  Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>, Tamar Christina\n <tamar.christina@arm.com>,  Kyrylo Tkachov <ktkachov@nvidia.com>,  Andrew\n Pinski <andrew.pinski@oss.qualcomm.com>, Wilco Dijkstra\n <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Cc":"Alex Coplan <alex.coplan@arm.com>,  \"Joseph S. Myers\"\n <josmyers@redhat.com>,  Richard Biener <rguenther@suse.de>,  Marek Polacek\n <polacek@redhat.com>,  gcc-patches@gcc.gnu.org,  Alice Carlotti\n <alice.carlotti@arm.com>,  Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,  Kyrylo Tkachov\n <ktkachov@nvidia.com>,  Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","In-Reply-To":"<aedpbln-LiXs008Z@tucnak> (Jakub Jelinek's message of \"Tue, 21\n Apr 2026 14:11:26 +0200\")","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>","User-Agent":"Gnus/5.13 (Gnus v5.13)","Date":"Tue, 21 Apr 2026 13:23:11 +0100","Message-ID":"<87wly0lcy8.fsf@googlemail.com>","MIME-Version":"1.0","Content-Type":"text/plain","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679856,"web_url":"http://patchwork.ozlabs.org/comment/3679856/","msgid":"<aeduvREFEtSuAM2H@tucnak>","list_archive_url":null,"date":"2026-04-21T12:34:05","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":671,"url":"http://patchwork.ozlabs.org/api/people/671/","name":"Jakub Jelinek","email":"jakub@redhat.com"},"content":"On Tue, Apr 21, 2026 at 01:23:11PM +0100, Richard Sandiford wrote:\n> Jakub Jelinek <jakub@redhat.com> writes:\n> > On Tue, Apr 21, 2026 at 12:58:55PM +0100, Richard Sandiford wrote:\n> >> I think we're going around in circles here.  As we've said previously,\n> >> attributes are not the official syntax for this feature.  They are\n> >> used by GCC as the implementation of __arm_streaming, etc., which\n> >> in Clang are keywords.  GCC 15's behaviour wrt __arm_streaming\n> >> was consistent with Clang's and it's GCC 16's behaviour that is\n> >> out of sync.  (I was going to provide a godbolt link, but I see\n> >> that Alex has just provided one.)\n> >\n> > I was testing attributes, like __attribute__((aarch64_vector_pcs))\n> > and __attribute__((preserve_none)) and there clang and clang++ behaves\n> > the same\n> > as gcc 16 and g++ 10-16.\n> > The patchset posted was changing behavior of those, so makes them\n> > incompatible with clang.\n> >\n> > Where is it documented that\n> > void foo () __arm_streaming;\n> > void foo ();\n> > is invalid?  I don't see it in clang documentation, nor\n> > https://arm-software.github.io/acle/main/acle.html#__arm_streaming\n> \n> It was supposed to be covered by:\n> \n>   Except where noted otherwise, function types that have an attribute\n>   are incompatible with function types that do not.\n> \n> Thus the above is invalid because the function type in the second\n> declaration is incompatible with the function type in the first\n> declaration.  I agree an example would have been good though...\n\nThat doesn't imply it.  What g++/clang/clang++ do for years and gcc\ndoes now in 16 is just that a function redeclaration with no function\nattributes implies that the function redeclaration is handled as if it\nhas the attributes of the earlier function types.  And in that case\nit is not incompatible, there is just one merged function type in the end\nafter all.  Function declaration attributes are also merged from the\ndifferent declarations.\nObviously, if somebody declares a function pointer type without the\nattribute and tries to call the function through that function pointer\ntype, it will be incompatible, nothing changes on that.\n\n\tJakub","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=jRooaboI;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=jRooaboI","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","sourceware.org; spf=pass smtp.mailfrom=redhat.com","server2.sourceware.org;\n arc=none smtp.remote-ip=170.10.133.124"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0MHn4NKDz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 22:34:45 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id C247C4B9DB50\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 12:34:43 +0000 (GMT)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n by sourceware.org (Postfix) with ESMTP id 6DFED4B9DB72\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 12:34:15 +0000 (GMT)","from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-222-E1Zsh4RoNIWRVg53U3QjIg-1; Tue,\n 21 Apr 2026 08:34:11 -0400","from mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.12])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id EBDD81956080; Tue, 21 Apr 2026 12:34:09 +0000 (UTC)","from tucnak.zalov.cz (unknown [10.44.48.12])\n by mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with\n ESMTPS\n id E0E7419560AB; Tue, 21 Apr 2026 12:34:08 +0000 (UTC)","from tucnak.zalov.cz (localhost [127.0.0.1])\n by tucnak.zalov.cz (8.18.1/8.18.1) with ESMTPS id 63LCY5NC918895\n (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n Tue, 21 Apr 2026 14:34:05 +0200","(from jakub@localhost)\n by tucnak.zalov.cz (8.18.1/8.18.1/Submit) id 63LCY5GC918894;\n Tue, 21 Apr 2026 14:34:05 +0200"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org C247C4B9DB50","OpenDKIM Filter v2.11.0 sourceware.org 6DFED4B9DB72"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 6DFED4B9DB72","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 6DFED4B9DB72","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776774855; cv=none;\n b=HdB6RbHVXAXPoTiAb04Y6gcx3hWWZ8CCT9+/es4c7M8AjOSWh1QlZZTU/N1rC16lQGhhxgMmAnuHZVWoronN454ZWdFUbDIR4c1yz55MpaiQZg1RiiQW+VffaSxC7WjO2qBxhXHotT+OaHSr4mJToU98Thrmxsw+FhiyDKNXuK0=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776774855; c=relaxed/simple;\n bh=GK70KA7mEd+Z3Q7jGojQvbOLjBcPrgjFyuRONfa+pEs=;\n h=DKIM-Signature:Date:From:To:Subject:Message-ID:MIME-Version;\n b=tBP/k/6aiKz/luXNOLOQQZ++NzoPeUskHitOg9OPFkjps4FX3O51EKgBPC74EV3gzt3kfMX9ZfIwT2nkthoyUARXSJQRnZvkfB+JyHLqHEI+krbxCYoQAUamOOWejUOFHpYvjTGC347oMcn0V+WiTZWFJPkqDoACf0tS3JSGuJ0=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776774855;\n h=from:from:reply-to:reply-to:subject:subject:date:date:\n message-id:message-id:to:to:cc:mime-version:mime-version:\n content-type:content-type:in-reply-to:in-reply-to:  references:references;\n bh=JI376RnbLV45ECtQ9NmNFWKdc7ot55BdKCisRnFbsmA=;\n b=jRooaboI2ucnqw4oI0QaFQYnO97RjseI4jVECOo5pjL79VBt7YOXf4Ep5sBrL4sk9eqFPN\n tAWUv7zjUL96Vy03T4MLCnGk0Wz0adu8FBslxHKlyEhYZjJzAuQP86fjBwJtGvk10gCOJu\n 7lqSL47rKdRXl8XGWQ4+wu75fa1I6z8=","X-MC-Unique":"E1Zsh4RoNIWRVg53U3QjIg-1","X-Mimecast-MFC-AGG-ID":"E1Zsh4RoNIWRVg53U3QjIg_1776774850","Date":"Tue, 21 Apr 2026 14:34:05 +0200","From":"Jakub Jelinek <jakub@redhat.com>","To":"Alex Coplan <alex.coplan@arm.com>,\n \"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>, Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org, Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aeduvREFEtSuAM2H@tucnak>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>\n <87wly0lcy8.fsf@googlemail.com>","MIME-Version":"1.0","In-Reply-To":"<87wly0lcy8.fsf@googlemail.com>","X-Scanned-By":"MIMEDefang 3.0 on 10.30.177.12","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"pvdHEGEUMs3iHV5HFWjyJavXzJQEa1N5IhuvNs7s70o_1776774850","X-Mimecast-Originator":"redhat.com","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Reply-To":"Jakub Jelinek <jakub@redhat.com>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679864,"web_url":"http://patchwork.ozlabs.org/comment/3679864/","msgid":"<87qzo8lc22.fsf@googlemail.com>","list_archive_url":null,"date":"2026-04-21T12:42:29","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":4363,"url":"http://patchwork.ozlabs.org/api/people/4363/","name":"Richard Sandiford","email":"rdsandiford@googlemail.com"},"content":"Jakub Jelinek <jakub@redhat.com> writes:\n> On Tue, Apr 21, 2026 at 01:23:11PM +0100, Richard Sandiford wrote:\n>> Jakub Jelinek <jakub@redhat.com> writes:\n>> > On Tue, Apr 21, 2026 at 12:58:55PM +0100, Richard Sandiford wrote:\n>> >> I think we're going around in circles here.  As we've said previously,\n>> >> attributes are not the official syntax for this feature.  They are\n>> >> used by GCC as the implementation of __arm_streaming, etc., which\n>> >> in Clang are keywords.  GCC 15's behaviour wrt __arm_streaming\n>> >> was consistent with Clang's and it's GCC 16's behaviour that is\n>> >> out of sync.  (I was going to provide a godbolt link, but I see\n>> >> that Alex has just provided one.)\n>> >\n>> > I was testing attributes, like __attribute__((aarch64_vector_pcs))\n>> > and __attribute__((preserve_none)) and there clang and clang++ behaves\n>> > the same\n>> > as gcc 16 and g++ 10-16.\n>> > The patchset posted was changing behavior of those, so makes them\n>> > incompatible with clang.\n>> >\n>> > Where is it documented that\n>> > void foo () __arm_streaming;\n>> > void foo ();\n>> > is invalid?  I don't see it in clang documentation, nor\n>> > https://arm-software.github.io/acle/main/acle.html#__arm_streaming\n>> \n>> It was supposed to be covered by:\n>> \n>>   Except where noted otherwise, function types that have an attribute\n>>   are incompatible with function types that do not.\n>> \n>> Thus the above is invalid because the function type in the second\n>> declaration is incompatible with the function type in the first\n>> declaration.  I agree an example would have been good though...\n>\n> That doesn't imply it.  What g++/clang/clang++ do for years and gcc\n> does now in 16 is just that a function redeclaration with no function\n> attributes implies that the function redeclaration is handled as if it\n> has the attributes of the earlier function types.  And in that case\n> it is not incompatible, there is just one merged function type in the end\n> after all.  Function declaration attributes are also merged from the\n> different declarations.\n> Obviously, if somebody declares a function pointer type without the\n> attribute and tries to call the function through that function pointer\n> type, it will be incompatible, nothing changes on that.\n\nBut as said previously, __arm_inout(\"za\") adds an extra input and\noutput to the function type, like the difference between:\n\n  void (*)()\n\nand:\n\n  void (*)(za_state &)\n\nThose are clearly incompatible types in C++.  The fact that the\ninformation is conveyed by an attribute rather than an argument type\ndoesn't logically change the (in)compatibility.\n\nBut again, I'm just repeating arguments already made.  I feel this\nis being handled on a \"to a hammer, everything looks like a nail\"\nbasis, without really appreciating what the SME attributes are\ndoing are why they're there.\n\nRichard","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=mh7drcLt;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=mh7drcLt","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=googlemail.com","sourceware.org; spf=pass smtp.mailfrom=googlemail.com","server2.sourceware.org;\n arc=none smtp.remote-ip=209.85.128.46"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0MTR3Sw3z1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 22:43:06 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 344F74B9DB4F\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 12:43:04 +0000 (GMT)","from mail-wm1-f46.google.com (mail-wm1-f46.google.com\n [209.85.128.46])\n by sourceware.org (Postfix) with ESMTPS id 0530C4B9DB4F\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 12:42:36 +0000 (GMT)","by mail-wm1-f46.google.com with SMTP id\n 5b1f17b1804b1-4896c22fcbaso16685855e9.0\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 05:42:36 -0700 (PDT)","from localhost ([2a00:23c7:ef4f:7201::fad])\n by smtp.googlemail.com with ESMTPSA id\n 5b1f17b1804b1-48a55dc9f58sm106119505e9.6.2026.04.21.05.42.34\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 21 Apr 2026 05:42:35 -0700 (PDT)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 344F74B9DB4F","OpenDKIM Filter v2.11.0 sourceware.org 0530C4B9DB4F"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 0530C4B9DB4F","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 0530C4B9DB4F","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776775357; cv=none;\n b=miP9EEyOCMZT79Y6ahcfndLv6G+Q7wx9bZzYwE7aYw+dTn7u4gHrQyuJ3oj2GNoHjWImp+EARvWtxCPzZGG9TFtEn8d3pSq9IJua0kEiRTJy/rxj+SFTr14F6qJNDr40nHRDKqgtK7pd8XenHQ2qzua34oA+z9WdZevNjxvw+gs=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776775357; c=relaxed/simple;\n bh=kaeqhbPxeJbbd8/xxkKFhNOX7StRU49BsDv1PLfvAfk=;\n h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version;\n b=BE7evZQJ9HeeY0cGuZxpFqkcQRJ1YKEv7LDtS1qhfJYnuhM1f6jTrQ5YoOnOlpQxze/5aIl5yoyFuh8zHs78FVbb0wEeOAVb2OU4gkVI2U8xFpw6zUf/ZQ5CLMx2QPPglJQ3DLp3kGdXZu9j18lQaFt5/0dtshkI4iC/vyA4EJU=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=googlemail.com; s=20251104; t=1776775356; x=1777380156; darn=gcc.gnu.org;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=ky0+WYbr749MxSEKwNY6cnF6rewnL5qKDChvbMDXCGI=;\n b=mh7drcLtPbc357zQJx7cTiCd4lC1j0NpYVWSeG1RXuXl7e9Yzwtn8cHb6fsxyl/Qnd\n BMryCIe1QLyNT0GUSvCaAODvKCxd8J2qNvrgTSUtrxUjNZQse6dwDvlRD6GEGT/ypU9o\n Ejt89yD0cWUd16troBDeHNECBlGAJTwYCgckhSbnG3eVK7LiTY/WK47acRdR6fDZ4C/U\n jYzbo5O5dOvrz6oJroYIsv7QzQMnQXpdCzCsr4UMIlMoAcCd5H1IJi7dnsO9SnBWM9q5\n +fYAwNNTocSZkmzYeyOhkcEEckp8iIryaAqsupf+a1NELuCDQVMV7PHj3FBL7jxrmVTZ\n XX3A==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776775356; x=1777380156;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=ky0+WYbr749MxSEKwNY6cnF6rewnL5qKDChvbMDXCGI=;\n b=dh1u3pl9ItbyiLDbBH/tXcluVQJoiwRUnVhebcbl6B6IcttlGHB2fybKv/TMG56RFS\n /71LkUq8Bnx5ohd4R+2QvLSzaLgwzN6tDduPGC2wdI+NmoB3kZoRCIaINSNI8z4anzg/\n sZ/qmB5OlLsQXSyDrwDoOl6glDdY1jDK2aZIN8punGYyNwgWURBHofMAtw8rXDgU43W9\n tJXTdpXkkt5GBA1auDx+gVTrQDPewkgtcnSu5OHFfUpxMNxYCB3L0LX/PDrF359dOlaW\n vKQ7ky+YYEmnhHlt2ULKv0NMT/Qvh4h/N/FJ7USd0PRYcj5SsTnBltclHUyfocre0mbG\n kFUg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ+kKcPmcmebxKC4aZr2txHo9u+PpmzKSAsE5PTWlJnKrk6Mec5FkaxbMRocQJXPNOk3pR3I+cDhjho5+A==@gcc.gnu.org","X-Gm-Message-State":"AOJu0Yz4hjH6lhRpHkaqY9ecJUXHMD0cJ8cu3eaWU2K2wIbgFWUA9mK3\n jn7k4d970BXRT3vfphnXQcIYYsHYi98ObjISL9Svmwy6VCJFrH5UZSjE","X-Gm-Gg":"AeBDieuAPTorhUuhFHzgg3p36Stt6qUzXTk+pRquu0RVBC/kms8gdIrGWQY9ZpwEbP+\n xlFw4ims4rfohN2L+D7HLDKwB99dPKaF+dEMXy2xAh0RJhvpmm4GMgbyqh1NEbIlLpw2PR4hJvK\n 7rIq5IKlf0HBgJSPz74CljtdrrFki7kvEOlD6atqYttvLXFIp4s6W9eomE2O/JXIgW9VP1y16ll\n YROS1v7FodfW/7MRePwZadFw0FuzEktFH7o9btPzXJfRmfLWzoeh4VVDcMO9XHuBjjEoY4rQCQr\n EpBFgQENJMwKpOhToYZtN2Q+/n+NsoV/gPkvIJi/JtY7mQ8TjayhqirybjnicqI74HoMNo5FK9Q\n DejRjKrsuW6wsprURxEETrjk3IHy34Fkf0wTOG9Y4PMmfM5dGXB/oZea/Zu2WKEf2SpeAs6EYLR\n xvUSbTRCzFXCwM4yR9yQAOWgw=","X-Received":"by 2002:a05:600c:8592:b0:485:3ec6:e634 with SMTP id\n 5b1f17b1804b1-488fb779acbmr176104145e9.15.1776775355612;\n Tue, 21 Apr 2026 05:42:35 -0700 (PDT)","From":"Richard Sandiford <rdsandiford@googlemail.com>","To":"Jakub Jelinek <jakub@redhat.com>","Mail-Followup-To":"Jakub Jelinek <jakub@redhat.com>,Alex Coplan\n <alex.coplan@arm.com>,  \"Joseph S. Myers\" <josmyers@redhat.com>,  Richard\n Biener <rguenther@suse.de>,  Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org,  Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,  Tamar Christina\n <tamar.christina@arm.com>,  Kyrylo Tkachov <ktkachov@nvidia.com>,  Andrew\n Pinski <andrew.pinski@oss.qualcomm.com>,  Wilco Dijkstra\n <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Cc":"Alex Coplan <alex.coplan@arm.com>,  \"Joseph S. Myers\"\n <josmyers@redhat.com>,  Richard Biener <rguenther@suse.de>,  Marek Polacek\n <polacek@redhat.com>,  gcc-patches@gcc.gnu.org,  Alice Carlotti\n <alice.carlotti@arm.com>,  Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,  Kyrylo Tkachov\n <ktkachov@nvidia.com>,  Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","In-Reply-To":"<aeduvREFEtSuAM2H@tucnak> (Jakub Jelinek's message of \"Tue, 21\n Apr 2026 14:34:05 +0200\")","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>\n <87wly0lcy8.fsf@googlemail.com> <aeduvREFEtSuAM2H@tucnak>","Date":"Tue, 21 Apr 2026 13:42:29 +0100","Message-ID":"<87qzo8lc22.fsf@googlemail.com>","User-Agent":"Gnus/5.13 (Gnus v5.13)","MIME-Version":"1.0","Content-Type":"text/plain","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679892,"web_url":"http://patchwork.ozlabs.org/comment/3679892/","msgid":"<aed7fVHJ63D2FFcv@arm.com>","list_archive_url":null,"date":"2026-04-21T13:28:29","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":79039,"url":"http://patchwork.ozlabs.org/api/people/79039/","name":"Alex Coplan","email":"Alex.Coplan@arm.com"},"content":"On 21/04/2026 14:11, Jakub Jelinek wrote:\n> On Tue, Apr 21, 2026 at 12:58:55PM +0100, Richard Sandiford wrote:\n> > I think we're going around in circles here.  As we've said previously,\n> > attributes are not the official syntax for this feature.  They are\n> > used by GCC as the implementation of __arm_streaming, etc., which\n> > in Clang are keywords.  GCC 15's behaviour wrt __arm_streaming\n> > was consistent with Clang's and it's GCC 16's behaviour that is\n> > out of sync.  (I was going to provide a godbolt link, but I see\n> > that Alex has just provided one.)\n> \n> I was testing attributes, like __attribute__((aarch64_vector_pcs))\n> and __attribute__((preserve_none)) and there clang and clang++ behaves the same\n> as gcc 16 and g++ 10-16.\n> The patchset posted was changing behavior of those, so makes them\n> incompatible with clang.\n\nWe don't necessarily need to change the behaviour of those attributes.\nWe could make the target hook more fine-grained and only apply it to the\nSME attributes, if that's more palatable.\n\nI chose to change those attributes too in the initial patchset for the\nfollowing reasons:\n\n1. It simplified the implementation, we then don't need to have a hook\n   which is invoked on every attribute individually.\n2. The behaviour in previous GCC releases, at least for C code, is to\n   reject code such as:\n\n   void f(void) __attribute__((aarch64_vector_pcs));\n   void f(void);\n\n   so w.r.t. previously-released behaviour, this actually preserves what\n   we did before, at least for C code (I also expect this attribute to\n   be predominantly used in C for real-world code).\n3. It seemed the most consistent position for the aarch64 target to\n   take.\n\nBut I'm not dead set on changing the behaviour of those attributes,\nsince as Richard points out, there is a fundamental difference between\nthe SME attributes and other ABI-changing attributes, especially with\nthe ZA state-management attributes.  Those effectively change the\nsignature of the function.\n\nThanks,\nAlex\n\n> \n> Where is it documented that\n> void foo () __arm_streaming;\n> void foo ();\n> is invalid?  I don't see it in clang documentation, nor\n> https://arm-software.github.io/acle/main/acle.html#__arm_streaming\n> \n> \tJakub\n>","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=PqxhhNUJ;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=PqxhhNUJ;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=PqxhhNUJ;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=PqxhhNUJ","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.70.44"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0NWr6h0Cz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 23:30:15 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 7B14B4BAD14B\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 13:30:13 +0000 (GMT)","from AS8PR04CU009.outbound.protection.outlook.com\n (mail-westeuropeazon11011044.outbound.protection.outlook.com [52.101.70.44])\n by sourceware.org (Postfix) with ESMTPS id 18CBC4BA543C\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 13:29:43 +0000 (GMT)","from CWLP123CA0177.GBRP123.PROD.OUTLOOK.COM (2603:10a6:400:19b::14)\n by DU0PR08MB8664.eurprd08.prod.outlook.com (2603:10a6:10:400::16)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.16; Tue, 21 Apr\n 2026 13:29:38 +0000","from AMS0EPF000001AD.eurprd05.prod.outlook.com\n (2603:10a6:400:19b:cafe::63) by CWLP123CA0177.outlook.office365.com\n (2603:10a6:400:19b::14) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 13:29:36 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AMS0EPF000001AD.mail.protection.outlook.com (10.167.16.153) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48\n via Frontend Transport; Tue, 21 Apr 2026 13:29:36 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com (2603:10a6:102:33e::15)\n by DU0PR08MB8254.eurprd08.prod.outlook.com (2603:10a6:10:412::11)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.32; Tue, 21 Apr\n 2026 13:28:31 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377]) by PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377%4]) with mapi id 15.20.9818.032; Tue, 21 Apr 2026\n 13:28:31 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 7B14B4BAD14B","OpenDKIM Filter v2.11.0 sourceware.org 18CBC4BA543C"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 18CBC4BA543C","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 18CBC4BA543C","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1776778183; cv=pass;\n b=Mb5vB0d54jIbPhWD5189TaJQii4WGF0z+h8Dy3adjbvst6NBs6oRcW9T93AQr0Z70ucEyw7sLDnGr/yc3f9DSGL7hTfQOwQgEd1cSkLFZHhQfcS8zBQDYl5T0UW7+6Nx8f2jmpX5MLVioJ3g/2/IwTty56V3qTKRf7POU2Mt/xE=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=XlvvL5sSbSjxxR1UdprQFg/Kz/cWLF/ZRiN+mVWzu4cOiWdertS+jTRKHaRBsevVJQuB8bY8WVvgMqSnFIdnEJ1Aj2vvPZDlqqp1DDMZM20Vo4r25Wt1GuYinzQFv9r9FB6fnvMcgYE5bcqX7nlBgG3uFdQhQ98AXbmoa7lXUo1EuTQJMEXF325oNTg6QR33uuj82e3a/Vd/tkPH9SBA/lUsN6UjU1c7bp3BkZIVTQnr9+lse+grCjo+f6GnGp40004NnIOfQrGeG2yw2+eWutn6dDntSf/89FpMSyp5js3c6ehrjhohduv7H0KL4uifCfjVjkuy2dDhWpF6anFRQw==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=tzgDjo8VQnyq5u3bnzYTvrFrnJ9IIj0NBcmUflJnguW/ZRrjhLf/5A6sfhax4Jw6bK/fOLELAWeXjTbHWW23Tt1mXBiVisr63NVEHbh/tSt2DE5RuYGOQYMKc6yVeOa04ELbUUefeAwy7RfpEE5CrLbtW+rD4G8+joaeRyyjGKRWFcqyvAjHvQ9khhrPkIrNE0O1K5UKH11miRIdKHV2NZvkSoIgY4rQL6cCEgrjzJzc3IalWZt/H85BnWGahMcoQ1n/EXjWytgqzD52zLjOI++G5Y6A8SyDjvliosHaEFygfHdHBu/MH/F0NBoxOXLDHQ3zP4JLkOuid867ijnrNw=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776778183; c=relaxed/simple;\n bh=+Ss2WmCXH0XbHt2NCrnvbUhZsfjrNSWGSmgbGYmk7Xk=;\n h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID:\n MIME-Version;\n b=UG7h8xsiRlXUp53DI9+VFjVbckUeAfp0FoYQ6Y+HP9K8R9D4k+qjB5KM95O3ZMNpKK+kAjOnmAEUaonL8eSa3OA20E+/vSEeRoYyWuUs8VPQ7L8qNUmqSjYuZo+SOYyPLe4G/LnJMVxlGZaU61swh73OTCn/DIGsu4fJMFQN9Pw=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=luS7i5uMZNXafzWt5lUdFMYP2cEn3bQOI3GknYfALSo=;\n b=ntRDmzAF3VXD36zb+wUIH/OqCUVerYbvLly0cvQuGCjZeJReiT4RvkjqK2doztHOG5iWYngLPp54hMFPVJrjUG/20fz66ZmcPcDZRSgA6IJzsTY0HZ3r2Ey6+MncvHKLarKQBpIY7Jy4pfQ36PXhNbGNoAasiBDRx/joWxA1a3sBdODPbMLV4zHaIZKPpSqApM3kb4x7tUDy5Q2bOvZUVZb3xjZmCJSSa2N3/D01teoA2cNcSK94CzOvQ5hVaMobCOc1qlTG/WTJPI/7to81XW/kSxDN9O1Rodo3LfAlsNrrhYA1EBZ+PzVmlUhGhy2+rfSoCqKsxdEaO3WS7Priyg==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=luS7i5uMZNXafzWt5lUdFMYP2cEn3bQOI3GknYfALSo=;\n b=jDmHonm9Dr56Gx2MYS7B/xxADKH/99UdYnVKnugNG2cycncecy7DBzEAqgv9lDcaOaxMZEgPPYyycVrphYCy3Fmw//hH91O2GSsLdvhEnwBxwneXAyUwuMbeQLGr4ZG3KR4i4jD4LMtRATzlZ2Zg9NJtC6HiY0nC1QxMaNQHgIE+vx76Cc8VthsJfZpPet5IXZ2cdWQ9Azo99yfW3moiZPcaX/Gw5STTF+Qzs4znoWb2hjN2E4xyxUr9mRSSLQINenA3cniKKvbQQAjINMDKvlFwCJbf1MdXvtJNWUUF8F8jHLF4ExVaaBepBM/N+z/FlSdxya+xaAgtKGtoB10CFA=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=redhat.com smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=luS7i5uMZNXafzWt5lUdFMYP2cEn3bQOI3GknYfALSo=;\n b=PqxhhNUJAnIq1BHyLtKYhvxHKi8CorWFhz5HQybqJycwCm0qZd+iNKa18tf+KFCAIEjJNaW/yn51X/7ZpxwHz3mTOfZZFReHSL0FS382nAXJMPPRUWDN+CKr3cijuU/h+uKQJ8yDFl6SDnwdCpLOk8kcLamVfZY1vd+RcorVbzQ=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=luS7i5uMZNXafzWt5lUdFMYP2cEn3bQOI3GknYfALSo=;\n b=PqxhhNUJAnIq1BHyLtKYhvxHKi8CorWFhz5HQybqJycwCm0qZd+iNKa18tf+KFCAIEjJNaW/yn51X/7ZpxwHz3mTOfZZFReHSL0FS382nAXJMPPRUWDN+CKr3cijuU/h+uKQJ8yDFl6SDnwdCpLOk8kcLamVfZY1vd+RcorVbzQ="],"X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","Received-SPF":"Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","Authentication-Results-Original":"dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;","Date":"Tue, 21 Apr 2026 14:28:29 +0100","From":"Alex Coplan <alex.coplan@arm.com>","To":"Jakub Jelinek <jakub@redhat.com>","Cc":"\"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>,\n Marek Polacek <polacek@redhat.com>, gcc-patches@gcc.gnu.org,\n Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aed7fVHJ63D2FFcv@arm.com>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>","Content-Type":"text/plain; charset=utf-8","Content-Disposition":"inline","In-Reply-To":"<aedpbln-LiXs008Z@tucnak>","X-ClientProxiedBy":"PR3P189CA0028.EURP189.PROD.OUTLOOK.COM\n (2603:10a6:102:52::33) To PAWPR08MB8958.eurprd08.prod.outlook.com\n (2603:10a6:102:33e::15)","MIME-Version":"1.0","X-MS-TrafficTypeDiagnostic":"\n PAWPR08MB8958:EE_|DU0PR08MB8254:EE_|AMS0EPF000001AD:EE_|DU0PR08MB8664:EE_","X-MS-Office365-Filtering-Correlation-Id":"a32195c2-15d1-4337-5338-08de9faa0858","x-checkrecipientrouted":"true","NoDisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|1800799024|366016|376014|56012099003|22082099003|18002099003;","X-Microsoft-Antispam-Message-Info-Original":"\n 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","X-Forefront-Antispam-Report-Untrusted":"CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAWPR08MB8958.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(1800799024)(366016)(376014)(56012099003)(22082099003)(18002099003);\n DIR:OUT; SFP:1101;","X-Exchange-RoutingPolicyChecked":"\n rXKTqDaf+9ma8xZGl5lw3ngp1f0qQVnRYDEGYhEWeghzqrhnJoIphQ5zmX/9P7UdWh0BNOpwR2jxxs95CRIUal1eUMg1UKWdKL5hvGNR8HdLrxW7TmFTxIqktohGGKA3WltT7hjdIrupAoNc/EJ6zo68SflbAgbMOJUz4FYNL3GM8614Se19yEN/UpfH3RPmSIvwxYewiUvmOVGZJ7rVz59Gz0wy99D8aheCRyZqLtbkEiVcRir581k9ZT4YDQdQH9xJlZZeXD06zGHo3Fh2qYmQIfiy2sYgjW3LBfSnuMBaILo7nBWrHuC7koU86S5QdHD6Skw9IGAUZeOB8emygw==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["DU0PR08MB8254","DU0PR08MB8664"],"X-EOPAttributedMessage":"0","X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n AMS0EPF000001AD.eurprd05.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n e321ac2e-a937-449f-b1da-08de9fa9e176","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|14060799003|36860700016|1800799024|376014|35042699022|82310400026|18002099003|56012099003|22082099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(14060799003)(36860700016)(1800799024)(376014)(35042699022)(82310400026)(18002099003)(56012099003)(22082099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n ybGSa1jCp9hwyVPJIrFVc/2umcflMfKhU/o0Z+K8QYUaBR5/uMCgdqb9tm+mOh2CQB7Nmj7BW1L0RF/Ait7nw0gJ+EmUUB1X5Q+GL84V4k7Kjo74cjIMIIdQW2EQFd/hqj3xT3JMp5yTrNqJCGlFVKfOGlZYwIj50kMx7IsbsZOx6dAi0torSM86jat6vo2QACPgwBF2o2mhm5lfZXEPoJvifHZ68boFrxlN39tWwxhMHPvGhJkl9r7tLuOar54Vp53l8wZhEpuRqAOBM2zV+im9TU5AAcqqS4Pt6kPHR6DdlzVmnlYuv6jNbODzIMU6C6C9CsNreHedt7d0mehP+Ul8R6DH53L/HwoKaZQvpXYR9vuEuJEq/OV3VrFvlGY08gGTIquV980d7dNW998tA8OCWmAv/uY7yv70T5fN4STm4WU2njvu/jU8LnMUjxp9","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"21 Apr 2026 13:29:36.5527 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n a32195c2-15d1-4337-5338-08de9faa0858","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n AMS0EPF000001AD.eurprd05.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679898,"web_url":"http://patchwork.ozlabs.org/comment/3679898/","msgid":"<aeeAVVZ_dcV7ii_T@tucnak>","list_archive_url":null,"date":"2026-04-21T13:49:09","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":671,"url":"http://patchwork.ozlabs.org/api/people/671/","name":"Jakub Jelinek","email":"jakub@redhat.com"},"content":"On Tue, Apr 21, 2026 at 02:28:29PM +0100, Alex Coplan wrote:\n> We don't necessarily need to change the behaviour of those attributes.\n> We could make the target hook more fine-grained and only apply it to the\n> SME attributes, if that's more palatable.\n> \n> I chose to change those attributes too in the initial patchset for the\n> following reasons:\n> \n> 1. It simplified the implementation, we then don't need to have a hook\n>    which is invoked on every attribute individually.\n\nBut that is wrong, we don't want to treat the non-arch specific function type\nattributes differently between aarch64 and other arches, users have all\nrights to expect generic attributes behaving the same everywhere (whether\nexisting or any in the future added ones).\n\n> 2. The behaviour in previous GCC releases, at least for C code, is to\n>    reject code such as:\n> \n>    void f(void) __attribute__((aarch64_vector_pcs));\n>    void f(void);\n> \n>    so w.r.t. previously-released behaviour, this actually preserves what\n>    we did before, at least for C code (I also expect this attribute to\n>    be predominantly used in C for real-world code).\n\nBut it would be a regression vs. C++ or vs. clang/clang++.\n\n> 3. It seemed the most consistent position for the aarch64 target to\n>    take.\n> \n> But I'm not dead set on changing the behaviour of those attributes,\n> since as Richard points out, there is a fundamental difference between\n> the SME attributes and other ABI-changing attributes, especially with\n> the ZA state-management attributes.  Those effectively change the\n> signature of the function.\n\nAnyway, based on IRC discussions Richi seems to think that even if\nwe agree on PR122483 being accepts-invalid bug, accepts-invalid doesn't\nfeel to be a P1 blocker (while presumably the testsuite regression is).\nAnd it doesn't seem that we could reach full agreement today/tomorrow.\nRichard Earnshaw will hopefully tomorrow commit fix for another P1 and\nthe last one is going to be downgraded to P2.\n\nSo, in order to unblock the GCC 16.1 release, would it be acceptable\nto modify the testsuite patch I've posted, so that instead of removing\nthe dg-error directives it xfails them with a comment mentioning this PR\nand retarget the bug to 17.0?\n\nIf the C and C++ FE maintainers accept some version of the patches for\n17.1 (my strong preference would be that the hook just changes arm::\nnamespace attribute behavior and nothing else), then perhaps a C change\ncould be in theory backported to 16.2 (though am not sure it is a good\nidea, code accepted by 16.1 would then fail to compile with 16.2),\nbut certainly not the C++ part.\n\nAnd I'd mention something that was clearly missing in the posted patchset,\ndocumentation of the change , document the new behavior for arm:: attributes\nand document the behavior for other attributes (sure, that is preexisting\nproblem, but when we document how it behaves for arm:: we should document\nalso how it behaves normally).\n\n\tJakub","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=J5nR/Z5T;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=J5nR/Z5T","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","sourceware.org; spf=pass smtp.mailfrom=redhat.com","server2.sourceware.org;\n arc=none smtp.remote-ip=170.10.133.124"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0NyQ0M0Qz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 23:49:49 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 1DD7A4BA902C\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 13:49:48 +0000 (GMT)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n by sourceware.org (Postfix) with ESMTP id 9A78F4BA2E07\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 13:49:20 +0000 (GMT)","from mx-prod-mc-06.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-35-165-154-97.us-west-2.compute.amazonaws.com [35.165.154.97]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-680-vZWKIiBVPf2VjfuRn2b4Tg-1; Tue,\n 21 Apr 2026 09:49:17 -0400","from mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.93])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by mx-prod-mc-06.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id 21B611800265; Tue, 21 Apr 2026 13:49:14 +0000 (UTC)","from tucnak.zalov.cz (unknown [10.44.48.12])\n by mx-prod-int-06.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with\n ESMTPS\n id 07C82180047F; Tue, 21 Apr 2026 13:49:12 +0000 (UTC)","from tucnak.zalov.cz (localhost [127.0.0.1])\n by tucnak.zalov.cz (8.18.1/8.18.1) with ESMTPS id 63LDn9RR919463\n (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n Tue, 21 Apr 2026 15:49:10 +0200","(from jakub@localhost)\n by tucnak.zalov.cz (8.18.1/8.18.1/Submit) id 63LDn9Rk919462;\n Tue, 21 Apr 2026 15:49:09 +0200"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 1DD7A4BA902C","OpenDKIM Filter v2.11.0 sourceware.org 9A78F4BA2E07"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 9A78F4BA2E07","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 9A78F4BA2E07","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776779360; cv=none;\n b=Sl+EAGOuU858QNFpbSHxBcCo9+JeVXxT2gol5GGcZVwaDEMoz9WexZVYuxY1HnatdsiibRljvXDUPkpSJqyvmnIvbaPVcPmJHGP8U8WgeT/I8JVVIitujPLH7VBMvUGBME2Xuo8j9fh9Zyniry3tn3QjqR9Z+vLJkLTj9vQVFyE=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776779360; c=relaxed/simple;\n bh=9EQaRJKm2MNR6NyTBKTjpE7OXSSd9s7aKnwY9nfQR5I=;\n h=DKIM-Signature:Date:From:To:Subject:Message-ID:MIME-Version;\n b=kQDCPmKYbtAz/y/ZpVcBME13HI0cE8Cld3d5uTtBTx2fJM/9XUOUok4z8W190DI23129lwCuETwW9dz365KlI7i2zgzQOS0ouPZNnsgGRJc0imzkEyICqsmsc1D2NGIeTCmZLSRrmIbBPoThoqj/fXrf4K+5ykoUnbBlUPGBrbY=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776779360;\n h=from:from:reply-to:reply-to:subject:subject:date:date:\n message-id:message-id:to:to:cc:cc:mime-version:mime-version:\n content-type:content-type:in-reply-to:in-reply-to:  references:references;\n bh=sRh8ZYJcOmFqY28QAJQD1OMQxHcfLwy5/9TieqZG1go=;\n b=J5nR/Z5TdFNqB3K20fj32WM2bEcpyPGuJRHwS4N347Rbj9tGr2wCqU57Qb9ppTEn/YZGaH\n PkaPbvj7qaK+OqSGu3C4OQNP+dWRqxBnn4T8HNDl9WxEPWQbzVF9hj0o1jyV4Hd83nhNXk\n zG4W++GXKkpCA3Ybyk0RVlsMLF8AEW0=","X-MC-Unique":"vZWKIiBVPf2VjfuRn2b4Tg-1","X-Mimecast-MFC-AGG-ID":"vZWKIiBVPf2VjfuRn2b4Tg_1776779354","Date":"Tue, 21 Apr 2026 15:49:09 +0200","From":"Jakub Jelinek <jakub@redhat.com>","To":"Alex Coplan <alex.coplan@arm.com>","Cc":"\"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>, Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org, Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aeeAVVZ_dcV7ii_T@tucnak>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>\n <aed7fVHJ63D2FFcv@arm.com>","MIME-Version":"1.0","In-Reply-To":"<aed7fVHJ63D2FFcv@arm.com>","X-Scanned-By":"MIMEDefang 3.4.1 on 10.30.177.93","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"anboxXPUdcptWQnhy9nyz86KOzGFRz0OEdfyidc3w08_1776779354","X-Mimecast-Originator":"redhat.com","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Reply-To":"Jakub Jelinek <jakub@redhat.com>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679902,"web_url":"http://patchwork.ozlabs.org/comment/3679902/","msgid":"<aeeEKIxQKAcHsu_7@arm.com>","list_archive_url":null,"date":"2026-04-21T14:05:28","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":79039,"url":"http://patchwork.ozlabs.org/api/people/79039/","name":"Alex Coplan","email":"Alex.Coplan@arm.com"},"content":"On 21/04/2026 15:49, Jakub Jelinek wrote:\n> On Tue, Apr 21, 2026 at 02:28:29PM +0100, Alex Coplan wrote:\n> > We don't necessarily need to change the behaviour of those attributes.\n> > We could make the target hook more fine-grained and only apply it to the\n> > SME attributes, if that's more palatable.\n> > \n> > I chose to change those attributes too in the initial patchset for the\n> > following reasons:\n> > \n> > 1. It simplified the implementation, we then don't need to have a hook\n> >    which is invoked on every attribute individually.\n> \n> But that is wrong, we don't want to treat the non-arch specific function type\n> attributes differently between aarch64 and other arches, users have all\n> rights to expect generic attributes behaving the same everywhere (whether\n> existing or any in the future added ones).\n\nThat is why the patchset added target_attribute_p () and only applied\nthe \"new\" behaviour to target-specific attributes.\n\n> \n> > 2. The behaviour in previous GCC releases, at least for C code, is to\n> >    reject code such as:\n> > \n> >    void f(void) __attribute__((aarch64_vector_pcs));\n> >    void f(void);\n> > \n> >    so w.r.t. previously-released behaviour, this actually preserves what\n> >    we did before, at least for C code (I also expect this attribute to\n> >    be predominantly used in C for real-world code).\n> \n> But it would be a regression vs. C++ or vs. clang/clang++.\n\nYeah, that's fair enough; my thinking was that we could defer the C++\npatch to 17 and see if that ended up being a problem in practice, but if\nyou think it is likely to be problematic we can avoid changing behaviour\nthere.\n\n> \n> > 3. It seemed the most consistent position for the aarch64 target to\n> >    take.\n> > \n> > But I'm not dead set on changing the behaviour of those attributes,\n> > since as Richard points out, there is a fundamental difference between\n> > the SME attributes and other ABI-changing attributes, especially with\n> > the ZA state-management attributes.  Those effectively change the\n> > signature of the function.\n> \n> Anyway, based on IRC discussions Richi seems to think that even if\n> we agree on PR122483 being accepts-invalid bug, accepts-invalid doesn't\n> feel to be a P1 blocker (while presumably the testsuite regression is).\n> And it doesn't seem that we could reach full agreement today/tomorrow.\n> Richard Earnshaw will hopefully tomorrow commit fix for another P1 and\n> the last one is going to be downgraded to P2.\n> \n> So, in order to unblock the GCC 16.1 release, would it be acceptable\n> to modify the testsuite patch I've posted, so that instead of removing\n> the dg-error directives it xfails them with a comment mentioning this PR\n> and retarget the bug to 17.0?\n\nFrom my POV it's not worth blocking the release over, so this sounds OK\nto me if Richard agrees (and no objections from other aarch64\nmaintainers by EOD).\n\n> \n> If the C and C++ FE maintainers accept some version of the patches for\n> 17.1 (my strong preference would be that the hook just changes arm::\n> namespace attribute behavior and nothing else), then perhaps a C change\n> could be in theory backported to 16.2 (though am not sure it is a good\n> idea, code accepted by 16.1 would then fail to compile with 16.2),\n> but certainly not the C++ part.\n> \n> And I'd mention something that was clearly missing in the posted patchset,\n> documentation of the change , document the new behavior for arm:: attributes\n> and document the behavior for other attributes (sure, that is preexisting\n> problem, but when we document how it behaves for arm:: we should document\n> also how it behaves normally).\n\nYeah, agree the docs can be improved here, and we should probably clarify\nthe ACLE wording too; I will see what can be done about that.\n\nThanks,\nAlex\n\n> \n> \tJakub\n>","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=ETW2M8e6;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=ETW2M8e6;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=ETW2M8e6;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=ETW2M8e6","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.70.34"],"Received":["from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0PLh00VJz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 00:07:22 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id B63874BA900B\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 14:07:20 +0000 (GMT)","from AS8PR04CU009.outbound.protection.outlook.com\n (mail-westeuropeazon11011034.outbound.protection.outlook.com [52.101.70.34])\n by sourceware.org (Postfix) with ESMTPS id 31A614BA9016\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 14:06:49 +0000 (GMT)","from CWLP265CA0407.GBRP265.PROD.OUTLOOK.COM (2603:10a6:400:1b6::20)\n by AS4PR08MB7926.eurprd08.prod.outlook.com (2603:10a6:20b:575::11)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.33; Tue, 21 Apr\n 2026 14:06:41 +0000","from DB3PEPF0000885F.eurprd02.prod.outlook.com\n (2603:10a6:400:1b6:cafe::b8) by CWLP265CA0407.outlook.office365.com\n (2603:10a6:400:1b6::20) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 14:06:41 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n DB3PEPF0000885F.mail.protection.outlook.com (10.167.242.10) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48\n via Frontend Transport; Tue, 21 Apr 2026 14:06:40 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com (2603:10a6:102:33e::15)\n by VI0PR08MB10630.eurprd08.prod.outlook.com (2603:10a6:800:209::13)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.33; Tue, 21 Apr\n 2026 14:05:33 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377]) by PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377%4]) with mapi id 15.20.9818.032; Tue, 21 Apr 2026\n 14:05:30 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org B63874BA900B","OpenDKIM Filter v2.11.0 sourceware.org 31A614BA9016"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 31A614BA9016","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 31A614BA9016","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1776780409; cv=pass;\n b=Gx2zvAf8m6zUphMEjR+Sea164YnUKmPo5sVxSwz9kYCwGamESBBXzjIpaC6rhr/oQJrjBsbNfFi9VyR/Rz9IZWBNzNXC39lSt02pXH+gvVuDy/TKH7uqVucGUp9Nd5gReDe3hwd5QCDVSMWMR9OPzH2cX/OsHNHhjpYmSU2BREk=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=lfcmkkkPnR9TQfRj6c1aJEZUTfGmXh77Q/V04LBAnwIowwR13DTU9i5I/uf0LY0/jNhWkLtkUMxKlt9RKeCnT8HN8+IeO0mwD3Iybq8bHLvQbshihH677qa7qq1He+zqsP+R9RGGvsUqOuYlAnYYG42QhEczdqHjGYvCJNVwc1NFuFasxn54Z0R5NPoDFoBkkcXeNlH+Z9Mg0XHCto4PWWGDjiozsYGGt+YARINIvzKVXBPlCE8Lf+1lcOE+1Fgklfl41s8X/vJeloDFfvNEESRmhaRDD096jTp9IIOCL+eIhlXH3+9nKaYEeNhZdFwnzyGBK6A013x4ZEhluKb0yQ==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=m12atwjn395nmh0wn6D7UrZwZzt8wEnkruYS2vkbyf7g0aSgoovVkR1MyvhUlaE8nWuqiD2YArahZRc8jWXQ+M2p0FraPzQ7VTLWnqmLG7qIj4TO7rL/d41QHLEj6Mr4ib3Cb2mDppwtH7OBTKCOToMhzQI9BYMn4oOxfKm48zpwO59koo111CZli6WUwlqh+oEI+81W01A8eld1vS1P3pPA6tOeYgNN0A094+EAXGCcIa1ZX+qigqi3YZCmyOTNQA29Z4OJT6tUzvJl3QzS+ajGT4sg3yzyzTrqzgkCtjsQv619D41U3KDblG7VBz7AiOoqCtaIJ2z1s+irv+d3gA=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776780409; c=relaxed/simple;\n bh=0qAiLeeb0i+jovahZ2p1P7Wryf3NhFHlpAK78liO4+Q=;\n h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID:\n MIME-Version;\n b=E2OnVIlKXa1U9yyr5eY5JaR8MT4Yc2NNxdBPnb0rH1ohn8PSQ2mbz3IYzymvxCRIpCxy4LyL3edkQWRvZ5NOKlFNrNq/9ApWwlXz71xKL1Q93qz5kNUCe5eCzCZGgcI1Tbdxw7/8f4zQ4V7SFutg4XalpwRc8igLYpNl6drfjiQ=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=E6Dv9A4b+I581stHvp+Ci9Kt23Mo9/fytn5CkTeNDX0=;\n b=JbQYc/PPv419bXZlygFXHadaqYeACefFPFK3HUcY7oJXVrvEdzjOFHa1dtek9PA+SG6pCaXXwMCy4UzDAr3THuWwef4sxixX0xrAOhx6oFTBnz+3nQ6mN27c1RN8TcI6tOhwAH60DHz8JcFhrxBplf3WxtCLjvGAm9URK1P6lyORpScSW6TYTYp6Mh4VQzyEe/MTo61kGvGPVmhk8/QJHbVXiHaYfqcdXHaxZb67syS2dV8vdm8vvttLCWJnFexmeRFMjyL5IQoV05CC66NCxLpMCNDVOK4SBL/TcUP5jDzWbhskmxaD9l7I/ZwRiOGHoapVX/Mo8YXa1pv4t5+MGA==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=E6Dv9A4b+I581stHvp+Ci9Kt23Mo9/fytn5CkTeNDX0=;\n b=vJSOyodz8f2/vaJctmimvH1a5fYIDDtZPoVWf96IYoszKq/yiXqobdKGP/SpKXpSusvStyTO2LnU52ZklW3x9mjvc8t7SARBCgyfqtUkyJoDevUAEElalp4caHhIs+0dn4q0fwgYuXOVSzxAB/eQ7nnQt+w4paF6POnqO6IXyvZ5v/wlz071dU3VW8Vi3IPEmpQqj4CtjwmR63xFju0pjCpLdqDzIH9xmnMGz/8LslmUqHA5oSOWcqbhdXCw0vixP7KZlThn96ZKzxQ6TtoaQh/yII5y/ZX3KRP3MdOCMnxLNMnGvX1KUClcDFItmeOKs8rdUq0HP+NLt6sbAjWYYg=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=redhat.com smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=E6Dv9A4b+I581stHvp+Ci9Kt23Mo9/fytn5CkTeNDX0=;\n b=ETW2M8e6DnCMxygraGilC4wY5RXiP9Jm37QagbOALtYGhv9R1p/PNSkKoLz4f20jx4hqu7aUSseBHFGLQ4ZNbYsCoSXapMOk7NnGsx8BV/2if5FvuVVXSeLT9JlWO6W9wvfbgZld9F+rZXlAjfEEpJgDVkssEoFtKIC13ZCxaSk=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=E6Dv9A4b+I581stHvp+Ci9Kt23Mo9/fytn5CkTeNDX0=;\n b=ETW2M8e6DnCMxygraGilC4wY5RXiP9Jm37QagbOALtYGhv9R1p/PNSkKoLz4f20jx4hqu7aUSseBHFGLQ4ZNbYsCoSXapMOk7NnGsx8BV/2if5FvuVVXSeLT9JlWO6W9wvfbgZld9F+rZXlAjfEEpJgDVkssEoFtKIC13ZCxaSk="],"X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","Received-SPF":"Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","Authentication-Results-Original":"dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;","Date":"Tue, 21 Apr 2026 15:05:28 +0100","From":"Alex Coplan <alex.coplan@arm.com>","To":"Jakub Jelinek <jakub@redhat.com>","Cc":"\"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>,\n Marek Polacek <polacek@redhat.com>, gcc-patches@gcc.gnu.org,\n Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aeeEKIxQKAcHsu_7@arm.com>","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>\n <aed7fVHJ63D2FFcv@arm.com> <aeeAVVZ_dcV7ii_T@tucnak>","Content-Type":"text/plain; charset=utf-8","Content-Disposition":"inline","In-Reply-To":"<aeeAVVZ_dcV7ii_T@tucnak>","X-ClientProxiedBy":"PR3P191CA0035.EURP191.PROD.OUTLOOK.COM\n (2603:10a6:102:55::10) To PAWPR08MB8958.eurprd08.prod.outlook.com\n (2603:10a6:102:33e::15)","MIME-Version":"1.0","X-MS-TrafficTypeDiagnostic":"\n PAWPR08MB8958:EE_|VI0PR08MB10630:EE_|DB3PEPF0000885F:EE_|AS4PR08MB7926:EE_","X-MS-Office365-Filtering-Correlation-Id":"cbb021cb-60ff-496e-918b-08de9faf3637","x-checkrecipientrouted":"true","NoDisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|376014|366016|1800799024|56012099003|18002099003|22082099003;","X-Microsoft-Antispam-Message-Info-Original":"\n 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","X-Forefront-Antispam-Report-Untrusted":"CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAWPR08MB8958.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(376014)(366016)(1800799024)(56012099003)(18002099003)(22082099003);\n DIR:OUT; SFP:1101;","X-Exchange-RoutingPolicyChecked":"\n UvQlUfcB8aqe/lFnctrFXO5e4M+VSnc6IXw3Jvl0ZqTtScLWFfdwZZolHJ35OrCkErRXrHDTAA73Dtz3dw2dfd+Vk5FEdaimGXk0lQqdkX/axMyrnARmxg8+cUAbdPQ9mxtd55BgODzOkwCN+DhwV1y/524HGff4R7QH1UtrI+uOrmgA2GKObf7fQkMQiAkyr/eCjIQRKvgaegPOKc3Opmxz+r/1Rhth/NmePb875yalt8ZYvXb/SzZamK247IdDe1cuXdlXdRhlvMyyZC0okM7rCtBZ3Nija7DTqwUxccjAaJ2N0tfggsM0PoZXcRmr0dF1F5icxLRGxM4naDnHug==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["VI0PR08MB10630","AS4PR08MB7926"],"X-EOPAttributedMessage":"0","X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n DB3PEPF0000885F.eurprd02.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n b911f279-5d1b-42a8-b444-08de9faf0c04","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|82310400026|35042699022|14060799003|36860700016|376014|1800799024|56012099003|18002099003|22082099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(82310400026)(35042699022)(14060799003)(36860700016)(376014)(1800799024)(56012099003)(18002099003)(22082099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n KCoVdxjoDq9vYx6xXR+Xk60MYE9TH/0099TaswFW4rZMczxBJw3B0qxwe0Qy4xjMF2yibBjam6EYErnn+aTkxr4nZEScSYZPfPj3ZTROAWwqktX/GDcoNpyEATfxb/8OUAlItVOh6Cz869FHRZMK25T4dMVCuIcANDmdXmu0BVZiCBu6wn2yZre8WnMWW6M2ocNmBpv6Ese/BzF9An/4F/0q3XTVFO9hjrGdqwlvbUNMvJ27Z+ocNHC6lB1m0a1V965EkkEiQUB8YTdbcMAtA5/EtznzTkV2Hv58FaahMyZ6OvU00mzB2rolAZz+dDL204CPSOMBR6bqMZVb2x4chIwkdGYZV4kvl/Km3TbhM3Sa9b+6cdYtSrO91C5GIdDmjayEOsb+Ch3o/6J7EB3APAJkD22UFMBY3j5y0eXdmAEpArYozjxOPxXI2ajqCZho","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"21 Apr 2026 14:06:40.9913 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n cbb021cb-60ff-496e-918b-08de9faf3637","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n DB3PEPF0000885F.eurprd02.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679945,"web_url":"http://patchwork.ozlabs.org/comment/3679945/","msgid":"<87mrywjpsn.fsf@googlemail.com>","list_archive_url":null,"date":"2026-04-21T15:28:40","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":4363,"url":"http://patchwork.ozlabs.org/api/people/4363/","name":"Richard Sandiford","email":"rdsandiford@googlemail.com"},"content":"Alex Coplan <alex.coplan@arm.com> writes:\n> On 21/04/2026 15:49, Jakub Jelinek wrote:\n>> Anyway, based on IRC discussions Richi seems to think that even if\n>> we agree on PR122483 being accepts-invalid bug, accepts-invalid doesn't\n>> feel to be a P1 blocker (while presumably the testsuite regression is).\n>> And it doesn't seem that we could reach full agreement today/tomorrow.\n>> Richard Earnshaw will hopefully tomorrow commit fix for another P1 and\n>> the last one is going to be downgraded to P2.\n>> \n>> So, in order to unblock the GCC 16.1 release, would it be acceptable\n>> to modify the testsuite patch I've posted, so that instead of removing\n>> the dg-error directives it xfails them with a comment mentioning this PR\n>> and retarget the bug to 17.0?\n>\n> From my POV it's not worth blocking the release over, so this sounds OK\n> to me if Richard agrees (and no objections from other aarch64\n> maintainers by EOD).\n\nSounds like a reasonable compromise to me too FWIW.\n\n>> If the C and C++ FE maintainers accept some version of the patches for\n>> 17.1 (my strong preference would be that the hook just changes arm::\n>> namespace attribute behavior and nothing else), then perhaps a C change\n>> could be in theory backported to 16.2 (though am not sure it is a good\n>> idea, code accepted by 16.1 would then fail to compile with 16.2),\n>> but certainly not the C++ part.\n>> \n>> And I'd mention something that was clearly missing in the posted patchset,\n>> documentation of the change , document the new behavior for arm::\n>> attributes\n>> and document the behavior for other attributes (sure, that is preexisting\n>> problem, but when we document how it behaves for arm:: we should document\n>> also how it behaves normally).\n>\n> Yeah, agree the docs can be improved here, and we should probably clarify\n> the ACLE wording too; I will see what can be done about that.\n\nIt was a deliberate decision not to document the arm:: attributes\nin the GCC manual, since the __arm_* syntax is still the official\ncross-toolchain one.  The fact that __arm_* maps to arm::* is just\na GCC implementation detail and we don't want to encourage users\nto use the attribute syntax directly.  (It was clear from previous\ndiscussions that a Clang-style implementation wouldn't be acceptable\nin GCC.)\n\nAnd for __arm_*, I think the ACLE should be the single point of\nreference.\n\nSo on the documentation side, I think we should \"just\" make the ACLE\nstate explicitly that type incompatibilities are not expected to be\nmerged away (with examples).\n\nThanks,\nRichard","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=XGDVxNsN;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=googlemail.com header.i=@googlemail.com\n header.a=rsa-sha256 header.s=20251104 header.b=XGDVxNsN","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=googlemail.com","sourceware.org; spf=pass smtp.mailfrom=googlemail.com","server2.sourceware.org;\n arc=none smtp.remote-ip=209.85.221.48"],"Received":["from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0R9K4Y8vz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 01:29:25 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id CBBDB4B9DB55\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 15:29:23 +0000 (GMT)","from mail-wr1-f48.google.com (mail-wr1-f48.google.com\n [209.85.221.48])\n by sourceware.org (Postfix) with ESMTPS id C81244BA9021\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 15:28:51 +0000 (GMT)","by mail-wr1-f48.google.com with SMTP id\n ffacd0b85a97d-43fe3e22e33so2962361f8f.0\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 08:28:51 -0700 (PDT)","from localhost ([2a00:23c7:ef4f:7201::fad])\n by smtp.googlemail.com with ESMTPSA id\n ffacd0b85a97d-43fe4c221cdsm38820212f8f.0.2026.04.21.08.28.49\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 21 Apr 2026 08:28:49 -0700 (PDT)"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org CBBDB4B9DB55","OpenDKIM Filter v2.11.0 sourceware.org C81244BA9021"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org C81244BA9021","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org C81244BA9021","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776785332; cv=none;\n b=XS7kRHUnp1hOc4Yx9FZgVoiznxcQoihv+dejKGVJRspDGrl6uG3ljDgp9gnHw/DIjX5HYjwe+zZ4GSAOq8h4GSjv/WNl8wKS61ocF11urGbwGS1BqOAqBjB1GiLO5aWpZhzFYmBn9iGrNbs2mr9e5QLcbcdeyr0YJwmrR3YGl4c=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776785332; c=relaxed/simple;\n bh=I1uNOqiposeW4PS4JNrRDcjQaEmHDfB0j6a3cKZLC7U=;\n h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version;\n b=X/hX+T1CGhwxHrGfHxxiESr898vo7eZuniVNqZoXwhz+0Vc2B7EoKVhD7yu101Q7I+4lKILBYvbYbY5LUTB/r8vnNBgBqUrw+mrkcY0K3I1RV57ogY7AN95hpZHBkDcLxQKRdniI7bJ6m0xSFwU0DGhHjQ4uSrXyOmnl4yTTVxI=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=googlemail.com; s=20251104; t=1776785331; x=1777390131; darn=gcc.gnu.org;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=l3ScPRrnCKNgr8Q/A95m7BSB03LLpZ8cOLqXX0L1tIg=;\n b=XGDVxNsNOTRMpz61JJyKkYJWJ2ifV6NREaAKo5/Rsi943rfaJNnZMPKZ1BYfm7k+Tw\n V9/QCKmF/YMLGTw9DvzgzCLdySRz+2DzxWs6sWlZgVmPU7yBWNRnDCdXohCo32xS+iY2\n PP6BUY33OymLoR6Dd0kS1ucgmfScQKHPEfWUmRqXC9Lx82pWVuKTELJuHKucZQcqtZQn\n MfH/nVXuVwXFOZDHnKClQTEXPQSiA+BW0qiepuqvJEetUhfY8LU3H7qG41ztrsngYbFV\n 2+19LBwNvPnXzzwkqmMZpszqx2F6vrOzPcdGzaOt9JaFNbFiayFzRHeI+KJlK8qZyEHk\n Y24g==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776785331; x=1777390131;\n h=mime-version:user-agent:message-id:date:references:in-reply-to\n :subject:cc:mail-followup-to:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=l3ScPRrnCKNgr8Q/A95m7BSB03LLpZ8cOLqXX0L1tIg=;\n b=r+L9j3TL33cf14rf8gSi5UO71mnYNm781uwNdJ0W5l0p2iALY9Un+2Dp1TPGsz9FJj\n WfzKRKzBffptNke2m2F04W2WTPF146gtoxfe/zVUOl8ItV3wHOj2QKFVIo9UUfgkIrSe\n EodrVY/hL2qJvcyQyi3xORBRrtu5FPaAl44ih1JvHeCYoHu0VvSVVGJ3EbJy/hk0+lJa\n aIHFHQ5jL3blZubFkWbMLXNiydTnCyiFy/fUlkuC6Xs5zrgcWnJn3jPmRxIa6TZyzvhm\n GbNlILL8NtdYeyRsQrJMx7SKbhH8hBifNYwhdh6uvLByqhskOo6qivNNmSUP3kH1RLIA\n JMXQ==","X-Forwarded-Encrypted":"i=1;\n AFNElJ9L2LDZUvz6oxyr4SF6DePg5GKgogA4T2Dx2OMzmWfznmvj13KuY5WcCtAedWd7S+Fyd7KzD45zJJMLuA==@gcc.gnu.org","X-Gm-Message-State":"AOJu0YwgP+qyhfhrAZdUTR/AXoq9QtZHAqYKSREyFt9Ut5+E4V9WnRbn\n hW+pKgXGmf3ODcRdfTbyYXad6FQ18tS7JsosTFsiYZyeP+aoSC4ekvgw","X-Gm-Gg":"AeBDievIYrEet/xs0t6o+zF/XJF6bl8xbg7gjl7EK6BIs2AwybDUKuSjy//l1Bg1W43\n +uxVpzP0+SMr2yM2JOE1CeuBPVZNl0qTs9yoAT4yXja4l8vlczgjSDI+D6wAiNXN/2eo2yiCaVc\n LXgaK4Yfu8axSb7DB6nhIRdEQJfQQAVRPQMl4kV8dGmec4fvppNS77q5YPJ9AMXa89EX+tShdl4\n P0ons44tGRQtizayQedpWb5QjTvFBGJslcf8PtSuQFVGNxHtVcStgygichhcnuMwy6xMi6tyx7o\n kwLRApR8RmL6EDLBo9b6geBIesP6fd6qfbZgu0b1JoC82FjqKMDZRqHwReGErqMzN1xnHnN6LDl\n Ziwyu9hO51ovTGR/LoG8tj5dqQ6qFnwvCiJao5+Jfb3IHh5Nd9wcY+hi6j/jMUK/NLgZva+rCa3\n /1NHH06/y+oofzbKJVClNueaU=","X-Received":"by 2002:a5d:44cb:0:b0:43f:e414:5faf with SMTP id\n ffacd0b85a97d-43fe4146054mr20414460f8f.0.1776785330332;\n Tue, 21 Apr 2026 08:28:50 -0700 (PDT)","From":"Richard Sandiford <rdsandiford@googlemail.com>","To":"Alex Coplan <alex.coplan@arm.com>","Mail-Followup-To":"Alex Coplan <alex.coplan@arm.com>,Jakub Jelinek\n <jakub@redhat.com>,  \"Joseph S. Myers\" <josmyers@redhat.com>,  Richard\n Biener <rguenther@suse.de>,  Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org,  Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,  Tamar Christina\n <tamar.christina@arm.com>,  Kyrylo Tkachov <ktkachov@nvidia.com>,  Andrew\n Pinski <andrew.pinski@oss.qualcomm.com>,  Wilco Dijkstra\n <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Cc":"Jakub Jelinek <jakub@redhat.com>,  \"Joseph S. Myers\"\n <josmyers@redhat.com>,  Richard Biener <rguenther@suse.de>,  Marek Polacek\n <polacek@redhat.com>,  gcc-patches@gcc.gnu.org,  Alice Carlotti\n <alice.carlotti@arm.com>,  Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,  Kyrylo Tkachov\n <ktkachov@nvidia.com>,  Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","In-Reply-To":"<aeeEKIxQKAcHsu_7@arm.com> (Alex Coplan's message of \"Tue, 21 Apr\n 2026 15:05:28 +0100\")","References":"<acvYkLBYwL86lR-V@arm.com>\n <91332677-b0d8-d097-151d-3690ff42c897@redhat.com>\n <aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>\n <aed7fVHJ63D2FFcv@arm.com> <aeeAVVZ_dcV7ii_T@tucnak>\n <aeeEKIxQKAcHsu_7@arm.com>","Date":"Tue, 21 Apr 2026 16:28:40 +0100","Message-ID":"<87mrywjpsn.fsf@googlemail.com>","User-Agent":"Gnus/5.13 (Gnus v5.13)","MIME-Version":"1.0","Content-Type":"text/plain","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679956,"web_url":"http://patchwork.ozlabs.org/comment/3679956/","msgid":"<aeeacUKOAwvBBhox@arm.com>","list_archive_url":null,"date":"2026-04-21T15:40:33","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":79039,"url":"http://patchwork.ozlabs.org/api/people/79039/","name":"Alex Coplan","email":"Alex.Coplan@arm.com"},"content":"On 21/04/2026 16:28, Richard Sandiford wrote:\n> Alex Coplan <alex.coplan@arm.com> writes:\n> > On 21/04/2026 15:49, Jakub Jelinek wrote:\n> >> Anyway, based on IRC discussions Richi seems to think that even if\n> >> we agree on PR122483 being accepts-invalid bug, accepts-invalid doesn't\n> >> feel to be a P1 blocker (while presumably the testsuite regression is).\n> >> And it doesn't seem that we could reach full agreement today/tomorrow.\n> >> Richard Earnshaw will hopefully tomorrow commit fix for another P1 and\n> >> the last one is going to be downgraded to P2.\n> >> \n> >> So, in order to unblock the GCC 16.1 release, would it be acceptable\n> >> to modify the testsuite patch I've posted, so that instead of removing\n> >> the dg-error directives it xfails them with a comment mentioning this PR\n> >> and retarget the bug to 17.0?\n> >\n> > From my POV it's not worth blocking the release over, so this sounds OK\n> > to me if Richard agrees (and no objections from other aarch64\n> > maintainers by EOD).\n> \n> Sounds like a reasonable compromise to me too FWIW.\n> \n> >> If the C and C++ FE maintainers accept some version of the patches for\n> >> 17.1 (my strong preference would be that the hook just changes arm::\n> >> namespace attribute behavior and nothing else), then perhaps a C change\n> >> could be in theory backported to 16.2 (though am not sure it is a good\n> >> idea, code accepted by 16.1 would then fail to compile with 16.2),\n> >> but certainly not the C++ part.\n> >> \n> >> And I'd mention something that was clearly missing in the posted patchset,\n> >> documentation of the change , document the new behavior for arm::\n> >> attributes\n> >> and document the behavior for other attributes (sure, that is preexisting\n> >> problem, but when we document how it behaves for arm:: we should document\n> >> also how it behaves normally).\n> >\n> > Yeah, agree the docs can be improved here, and we should probably clarify\n> > the ACLE wording too; I will see what can be done about that.\n> \n> It was a deliberate decision not to document the arm:: attributes\n> in the GCC manual, since the __arm_* syntax is still the official\n> cross-toolchain one.  The fact that __arm_* maps to arm::* is just\n> a GCC implementation detail and we don't want to encourage users\n> to use the attribute syntax directly.  (It was clear from previous\n> discussions that a Clang-style implementation wouldn't be acceptable\n> in GCC.)\n\nYeah, by \"the docs can be improved\", I meant that GCC should document\nthe merging behaviour for regular, generic type attributes.  Agree that\nwe shouldn't document the arm:: attributes in the GCC manual.\n\n> \n> And for __arm_*, I think the ACLE should be the single point of\n> reference.\n> \n> So on the documentation side, I think we should \"just\" make the ACLE\n> state explicitly that type incompatibilities are not expected to be\n> merged away (with examples).\n\nAgreed, I will try to put something together.\n\nThanks,\nAlex\n\n> \n> Thanks,\n> Richard","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=iLSU95K/;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=iLSU95K/;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=iLSU95K/;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=iLSU95K/","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.70.25"],"Received":["from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0RSB2y2Sz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 01:42:16 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 56F904BA901A\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 15:42:14 +0000 (GMT)","from AS8PR04CU009.outbound.protection.outlook.com\n (mail-westeuropeazon11011025.outbound.protection.outlook.com [52.101.70.25])\n by sourceware.org (Postfix) with ESMTPS id 2401B4BA2E33\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 15:41:42 +0000 (GMT)","from AS9PR06CA0633.eurprd06.prod.outlook.com (2603:10a6:20b:46f::20)\n by DB4PR08MB9262.eurprd08.prod.outlook.com (2603:10a6:10:3f9::22)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.33; Tue, 21 Apr\n 2026 15:41:38 +0000","from AM4PEPF00027A5F.eurprd04.prod.outlook.com\n (2603:10a6:20b:46f:cafe::2f) by AS9PR06CA0633.outlook.office365.com\n (2603:10a6:20b:46f::20) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48 via Frontend Transport; Tue,\n 21 Apr 2026 15:41:38 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AM4PEPF00027A5F.mail.protection.outlook.com (10.167.16.74) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9791.48\n via Frontend Transport; Tue, 21 Apr 2026 15:41:38 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com (2603:10a6:102:33e::15)\n by AM8PR08MB6500.eurprd08.prod.outlook.com (2603:10a6:20b:361::22)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.32; Tue, 21 Apr\n 2026 15:40:35 +0000","from PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377]) by PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377%4]) with mapi id 15.20.9818.032; Tue, 21 Apr 2026\n 15:40:35 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 56F904BA901A","OpenDKIM Filter v2.11.0 sourceware.org 2401B4BA2E33"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 2401B4BA2E33","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 2401B4BA2E33","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1776786102; cv=pass;\n b=xl/0TiIn3sELhHX4YxsLzNUe53BU/MypU37rcX5/KgtFCE553Y9vU2NJm9daRPX2PvIB+5994U84JL66fzZRyI6h3N/qxct1DPobz93CpQJGp0YQc82COyGB3Yki0RIG+UC0DU3JBNJ9yjdEhhc3R1/NlP+7+pjbrakFzr8io0g=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=zMkAXeXgYqxxOfGJ6ceMiJLHC2qyt02YlpmB2/qcBylrn4hqcDstK5PBztkut1cd21xjIAmJQVPPw7s9xIvmnZ165+g203R1mYydUeNVW2JMeEtoRc38GmWQzGb/vncgcKOIRPOX9yuDF7hXnZdKWLWs8/Wlb/m9AFMaUQBJZ9ajuS6gXWChhFwF1NgxSU4J0SFnGgxwK6hCDAWDHCrWK1JJJx4AitrIQP6rTNQP6cM4eq9WnyY7itzmukQq1AcfSp+fw2/Jm2yjhd2Sf1ibHXLpNpxKol8OPiJ3DM976IziJI2kqmHmbAnCWpz/z/w8MIPFNXYptym+vUNXXKv4xQ==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=FKO9jKAXpWeCuGaxgXxjpzmiI/h3wg0XZh8zwvnyjWIOdg3QD2wkS7DSrkWhr0XBHwBO7/RXtnFFCZHpDUXdAxV22AStWT5zOwaXFm+ia3Jwq7vg6ytQVIB1zMMKo3IQf2/aOiCvctRxkLZDCxTnsBoAx4jyfiN+x/U7os1+1NlJXWNxkkvx9Ora0Pr/PE2JsO58YJVfxhLZCZsX6NuiCBsgwGcWoJ6PLfyHiJkOQ6WiNBhYovNqJU/K4Fh5uzyDa96AniWL96lnDOZDeY9GRvN2IyuUAskuO5MZ2gTL9NbBePFSs7VZL5qM+X3yQYza5uPd0oRETsfVM+NAe3EPIw=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776786102; c=relaxed/simple;\n bh=Px1RMNokC3XjOCUQgWDgsHX0REcX5xUG/LnLA8zsK7o=;\n h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID:\n MIME-Version;\n b=nV2xA+7wRQvGXZ0HQ5tyCM5BRtkMh5VmkpRyY5XgPWC1CRlH8WVyWQmlsMbHoXKxOOoEsCZkFFCTGtsPSDQIPv3TpZb0JXH8bVuccauIzjgPds31pQAtIAqaTIdxppVqe5iLB7+Etog6oLsujOK3P/pJaFZEJs0Wi3L/yNDNci0=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=VQrGPelWN9e/I6JPtaAMKQBA/2wIkQoNWSzWiYYLdCs=;\n b=UdetpRhCz2z/tbsRrHQHY15AC0XNIwow/gmFQ1EZzT2x8ZTSRY4nTPcFEsFio2x5g18dUmb17j2s6qwKxhC+k5aE2Hs/oPK8ZTqPYHa9UB78GXIo3n4sDeJ34gfwF/5xsNoGC64xX98Hk7Dm5gb7kiLUyE/fRBex7ugLFDheza5bfKKiPOCqTOZ7uicUGabRG8hr3nAeMbq53o3KAtuQaf0YU9pKSeDsaYY0z1iOQiuj3RkPtfMTNm2VNJlT4b02RGj39iXupPNo9L8XyepUSwaw0asB+qWXMVf0orM17ALlJcQeuQQyuU0L5FjQ19fkaSanJltiFa8km7CRwgjv9g==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=VQrGPelWN9e/I6JPtaAMKQBA/2wIkQoNWSzWiYYLdCs=;\n b=oqtT6L7ysWhlHzoyVQa9GsmI8jA9jCvxnK/nRPHqIe6vSvCcGJ2vcyAcCzjQgCHmHPDWBBhMOPCJD6nPkpCbEqHwO36/kWtTnD44H98c3+aWo7ZfF4MLDDQrxIMpmlHKW+P0Pf/V84+f7yKKnsICXoCuR0MPcpSd3bYieejSoDD/wTexJO+gdJWqzyvLf0HccZ4iPthyYtVZYBwaWIpgl+q1r3RlthJVkx3vccyNZO/Zl4opqcQWw7qig9OMmhpgCvmByIswJ75EMoP7qJh1ryDdePRABOvxUfc8oCQA5wNUkP2n6KRbISF4rqTWRECwonUWP7cfHAWT9sXpE+alMQ=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=redhat.com smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=VQrGPelWN9e/I6JPtaAMKQBA/2wIkQoNWSzWiYYLdCs=;\n b=iLSU95K/DwcfNrTc63QvxH5hdPDySYKB/3Y85n6i5vxiSZoAikfpA+notEa21JYMNuKfbj55pJVJwPfaKPS3JMushSkVHFcLz0sLmtgYV+ugRB8nRcIT7/H+iX0M3D3dw+PrXfU7c/JQ08ujek8F2TlK+nUurQKtUdGFtvzxrUs=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=VQrGPelWN9e/I6JPtaAMKQBA/2wIkQoNWSzWiYYLdCs=;\n b=iLSU95K/DwcfNrTc63QvxH5hdPDySYKB/3Y85n6i5vxiSZoAikfpA+notEa21JYMNuKfbj55pJVJwPfaKPS3JMushSkVHFcLz0sLmtgYV+ugRB8nRcIT7/H+iX0M3D3dw+PrXfU7c/JQ08ujek8F2TlK+nUurQKtUdGFtvzxrUs="],"X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","Received-SPF":"Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","Authentication-Results-Original":"dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;","Date":"Tue, 21 Apr 2026 16:40:33 +0100","From":"Alex Coplan <alex.coplan@arm.com>","To":"Jakub Jelinek <jakub@redhat.com>, \"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>,\n Marek Polacek <polacek@redhat.com>, gcc-patches@gcc.gnu.org,\n Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aeeacUKOAwvBBhox@arm.com>","References":"<aczm5e6NfCLg1rvS@arm.com> <adZmAqLwzaIYcm_e@arm.com>\n <aedYLZXHJZfqHRjv@tucnak> <aedcwlyS96ASGI5e@tucnak>\n <875x5kmsn4.fsf@googlemail.com> <aedpbln-LiXs008Z@tucnak>\n <aed7fVHJ63D2FFcv@arm.com> <aeeAVVZ_dcV7ii_T@tucnak>\n <aeeEKIxQKAcHsu_7@arm.com> <87mrywjpsn.fsf@googlemail.com>","Content-Type":"text/plain; charset=utf-8","Content-Disposition":"inline","In-Reply-To":"<87mrywjpsn.fsf@googlemail.com>","X-ClientProxiedBy":"LO4P265CA0324.GBRP265.PROD.OUTLOOK.COM\n (2603:10a6:600:390::8) To PAWPR08MB8958.eurprd08.prod.outlook.com\n (2603:10a6:102:33e::15)","MIME-Version":"1.0","X-MS-TrafficTypeDiagnostic":"\n PAWPR08MB8958:EE_|AM8PR08MB6500:EE_|AM4PEPF00027A5F:EE_|DB4PR08MB9262:EE_","X-MS-Office365-Filtering-Correlation-Id":"7c3158cf-59b7-4bc1-a90c-08de9fbc79f3","x-checkrecipientrouted":"true","NoDisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|376014|366016|1800799024|921020|22082099003|18002099003|56012099003;","X-Microsoft-Antispam-Message-Info-Original":"\n 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","X-Forefront-Antispam-Report-Untrusted":"CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAWPR08MB8958.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(376014)(366016)(1800799024)(921020)(22082099003)(18002099003)(56012099003);\n DIR:OUT; SFP:1101;","X-Exchange-RoutingPolicyChecked":"\n UaSnWVUIwN1sSzIm0ZUZMSBmHac90rpU0AeocoILiWM8LisNh2PU8lK5d2OWsnzOJa0ISRbOiCXRoUjNQ/9/zZoNLGE16R7KMNG8tpaz3zui9jkHgpFVAoqpRoV+ztaqqVO2zcQQQehS2EI0PmiWuj5UTlhjlw7H5Tzg1L72n0liBCl/RzI8JQJfssbYbuwiCYGLUiRS8ylN7CWHO2DBRs1HrVQTkh/39gFotXqyMOND2Ub86QL8egMdiewsRTfAwK09/Cq+kL70kp98B2mqu9FkDcb4fd2XyFETUni4gu+cMOd4sJLlDdFm39Lu2NKCBgyEqxb9Er55F0DU/whPBg==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["AM8PR08MB6500","DB4PR08MB9262"],"X-EOPAttributedMessage":"0","X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n AM4PEPF00027A5F.eurprd04.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n fb0003f7-3763-419b-812f-08de9fbc548d","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|36860700016|1800799024|376014|14060799003|82310400026|35042699022|921020|56012099003|18002099003|22082099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(36860700016)(1800799024)(376014)(14060799003)(82310400026)(35042699022)(921020)(56012099003)(18002099003)(22082099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n BI3QfiLcnGXGElky37KXk3Q4k88NzHeYDGYB3Pku0oGCwpeOqfCigpDcuPKmS0sTkEwecPtTSACEQn2tJZsJbqndvj1zp+lfxPMBwEMdrZM2hkR0Os4XmohUJMtttn0hC82/a1x63iXyQVTvIhaApVtTthQmf8Zyo25XgKQbi8Ti7WtXP1eAQDcinUrFGmu1NfQZLmJzigrT820oaVe7F+ogaCb+vezOPdB1Ejz5TITd+suOTqWnZphc0hXOc7Y13QgBRlRELCqFxDCNOR2mtvVBpOR3XSQ7kbjS2ufi8+eGPIeLT75u4jtjHH3Xi+vPFK9PQ2+VEXf1mDLllcDp1IWmKcmKmSxTg8yPvqfwMGwokhaBICPSvzvj6ei1vZng3cmOgBU9at2TIKdMoBdJ0mB5wOj5f1a3ivFp1VrHSC6DcCGYMWK6goCM1cAjyo2n","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"21 Apr 2026 15:41:38.0964 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 7c3158cf-59b7-4bc1-a90c-08de9fbc79f3","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n AM4PEPF00027A5F.eurprd04.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}},{"id":3679957,"web_url":"http://patchwork.ozlabs.org/comment/3679957/","msgid":"<aeebStef54qlkRIl@tucnak>","list_archive_url":null,"date":"2026-04-21T15:44:10","subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","submitter":{"id":671,"url":"http://patchwork.ozlabs.org/api/people/671/","name":"Jakub Jelinek","email":"jakub@redhat.com"},"content":"On Tue, Apr 21, 2026 at 04:40:33PM +0100, Alex Coplan wrote:\n> Yeah, by \"the docs can be improved\", I meant that GCC should document\n> the merging behaviour for regular, generic type attributes.  Agree that\n> we shouldn't document the arm:: attributes in the GCC manual.\n\nBut you can mention __arm_* behavior in the GCC manual.\nI mean, we mention there tons of stuff from the C and C++ standards,\nOpenMP, etc. too.\n\n\tJakub","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=QizJce8o;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=QizJce8o","sourceware.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","sourceware.org; spf=pass smtp.mailfrom=redhat.com","server2.sourceware.org;\n arc=none smtp.remote-ip=170.10.129.124"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0RW62Nj8z1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 01:44:49 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id BCF8C4BA23F9\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 15:44:47 +0000 (GMT)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n by sourceware.org (Postfix) with ESMTP id 5C3404BA2E3C\n for <gcc-patches@gcc.gnu.org>; Tue, 21 Apr 2026 15:44:21 +0000 (GMT)","from mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com\n (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by\n relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3,\n cipher=TLS_AES_256_GCM_SHA384) id us-mta-479-iBBl_pUbPZaUZAzwjmXWvQ-1; Tue,\n 21 Apr 2026 11:44:17 -0400","from mx-prod-int-05.mail-002.prod.us-west-2.aws.redhat.com\n (mx-prod-int-05.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.17])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS\n id 59C53195609E; Tue, 21 Apr 2026 15:44:15 +0000 (UTC)","from tucnak.zalov.cz (unknown [10.44.48.12])\n by mx-prod-int-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with\n ESMTPS\n id 6437D1956095; Tue, 21 Apr 2026 15:44:14 +0000 (UTC)","from tucnak.zalov.cz (localhost [127.0.0.1])\n by tucnak.zalov.cz (8.18.1/8.18.1) with ESMTPS id 63LFiBXv921834\n (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT);\n Tue, 21 Apr 2026 17:44:11 +0200","(from jakub@localhost)\n by tucnak.zalov.cz (8.18.1/8.18.1/Submit) id 63LFiA8I921833;\n Tue, 21 Apr 2026 17:44:10 +0200"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org BCF8C4BA23F9","OpenDKIM Filter v2.11.0 sourceware.org 5C3404BA2E3C"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 5C3404BA2E3C","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 5C3404BA2E3C","ARC-Seal":"i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1776786261; cv=none;\n b=VacfXAfhNcVWpSM8ybUCcqy7GCTb4D11LfheveFNx5URLaz6FhedRq4wciej/bf+Gw3owHZN0zc98U4ZE4Lq3ijpXSeUgtIkk7PMLJ2pSbWQ5fYNOTp5omD0HhGt/WOl/nme5/8EJtBE0/a55peIP6ZOjSeycl6flBsOBe4TbuQ=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776786261; c=relaxed/simple;\n bh=BMfURIJ1fj38sGgjrICpc5PHFfgW4OSZtzk2Y7UlLcI=;\n h=DKIM-Signature:Date:From:To:Subject:Message-ID:MIME-Version;\n b=ifaRsPU86Y0QLMvVbf58+8F+wHMzpAQyeCMmRkQxPLJLJurvzjpYi/nvyHK53x8F6mUzv1PLnf44pOc/Bjhhncsp9i782HM7S/cr5t8YQRjS2D7H2S+AkrbIUM2bt5Cv9hQbA1FNTbqAGjtuqkpGsRSRjcbnJCJuR5D/kZJ8Hk0=","ARC-Authentication-Results":"i=1; server2.sourceware.org","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776786261;\n h=from:from:reply-to:reply-to:subject:subject:date:date:\n message-id:message-id:to:to:cc:cc:mime-version:mime-version:\n content-type:content-type:in-reply-to:in-reply-to:  references:references;\n bh=DyoP37l5m1/cD0yOw/h10bHqulbTsv0yhlUSqIKSgL4=;\n b=QizJce8oyWT2Xuj6QdA/BlNdzbErafTmeSa/LeR52zbmqfG+/Vj47gbu0bhHooCt6j5Pgi\n QLDrzn3mXemJXxDF4yNPudVq+vsxS9bi3U/8NUiiSr/FCCdub8jPXdQnHAoQrOxkIGMq2r\n sFxE61EYubM/hngqFO4yvAOUkxzCnLo=","X-MC-Unique":"iBBl_pUbPZaUZAzwjmXWvQ-1","X-Mimecast-MFC-AGG-ID":"iBBl_pUbPZaUZAzwjmXWvQ_1776786255","Date":"Tue, 21 Apr 2026 17:44:10 +0200","From":"Jakub Jelinek <jakub@redhat.com>","To":"Alex Coplan <alex.coplan@arm.com>","Cc":"\"Joseph S. Myers\" <josmyers@redhat.com>,\n Richard Biener <rguenther@suse.de>, Marek Polacek <polacek@redhat.com>,\n gcc-patches@gcc.gnu.org, Alice Carlotti <alice.carlotti@arm.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>, rdsandiford@googlemail.com","Subject":"Re: [PATCH] testsuite: Adjust expected errors for\n aarch64/sme/streaming_mode_1.c and aarch64/sme/za_state_[12].c [PR122483]","Message-ID":"<aeebStef54qlkRIl@tucnak>","References":"<adZmAqLwzaIYcm_e@arm.com> <aedYLZXHJZfqHRjv@tucnak>\n <aedcwlyS96ASGI5e@tucnak> <875x5kmsn4.fsf@googlemail.com>\n <aedpbln-LiXs008Z@tucnak> <aed7fVHJ63D2FFcv@arm.com>\n <aeeAVVZ_dcV7ii_T@tucnak> <aeeEKIxQKAcHsu_7@arm.com>\n <87mrywjpsn.fsf@googlemail.com> <aeeacUKOAwvBBhox@arm.com>","MIME-Version":"1.0","In-Reply-To":"<aeeacUKOAwvBBhox@arm.com>","X-Scanned-By":"MIMEDefang 3.0 on 10.30.177.17","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"u8_t6bjvLzEO9hkoc3PixcH8lWOPaPT9tPbOgXViD0E_1776786255","X-Mimecast-Originator":"redhat.com","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Reply-To":"Jakub Jelinek <jakub@redhat.com>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}}]