[{"id":3685997,"web_url":"http://patchwork.ozlabs.org/comment/3685997/","msgid":"<VI0PR08MB10392099A6072BDE627E3C126FF312@VI0PR08MB10392.eurprd08.prod.outlook.com>","list_archive_url":null,"date":"2026-05-04T19:50:27","subject":"RE: [PATCH] aarch64: Fix SVE vec_perm for VL2048 VNx16QI","submitter":{"id":69689,"url":"http://patchwork.ozlabs.org/api/people/69689/","name":"Tamar Christina","email":"Tamar.Christina@arm.com"},"content":"> -----Original Message-----\n> From: Richard Sandiford <rdsandiford@googlemail.com>\n> Sent: 04 May 2026 11:36\n> To: gcc-patches@gcc.gnu.org\n> Cc: Tamar Christina <Tamar.Christina@arm.com>\n> Subject: [PATCH] aarch64: Fix SVE vec_perm for VL2048 VNx16QI\n> \n> SVE's vec_perm pattern is restricted to constant VLs.  There are two\n> expansions: one for when the selector is known to refer to only the\n> first vector, and one for the general case.\n> \n> The first expansion uses a single TBL whereas the fallback uses a\n> five-instruction sequence that includes a SUB of nunits and two TBLs.\n> \n> Normally the first expansion is purely an optimisation.  However,\n> in the specific case of a VL2048 permutation of bytes, the first\n> form is needed for correctness, since the SUB of nunits (256)\n> would be truncated to a SUB of zero.\n> \n> For example, in:\n> \n>   svint8_t f(svint8_t x, svint8_t y, svint8_t z) {\n>     return __builtin_shuffle(x, y, z);\n>   }\n> \n> \"z\" can only select from \"x\" for VL2048.  The testcase previously\n> generated:\n> \n>         tbl     z0.b, {z0.b}, z2.b\n>         tbl     z1.b, {z1.b}, z2.b\n>         orr     z0.d, z0.d, z1.d\n>         ret\n> \n> where the SUB is optimised away.  This sequence is equivalent to:\n> \n>     return __builtin_shuffle(x | y, x | y, z);\n> \n> even though \"y\" should be entirely ignored.\n> \n> I used \"<= nunits - 1U\" rather than \"< nunits\" to match the existing\n> check and as a hopefully natural way of making the rhs unsigned.\n> \n> Bootstrapped & regression-tested on aarch64-linux-gnu.  OK to install?\n> \n\nOK, thanks!\n\nSorry for the delay, bank holiday :)\n\nThanks,\nTamar\n\n> Richard\n> \n> \n> gcc/\n> \t* config/aarch64/aarch64.cc (aarch64_expand_sve_vec_perm):\n> Check\n> \twhether all indices of a variable selector refer to the first\n> \tvalues vector.\n> \n> gcc/testsuite/\n> \t* gcc.target/aarch64/sve/vec_perm_2.c: New test.\n> \t* gcc.target/aarch64/sve/vec_perm_3.c: Likewise.\n> ---\n>  gcc/config/aarch64/aarch64.cc                 |  5 ++--\n>  .../gcc.target/aarch64/sve/vec_perm_2.c       | 26 +++++++++++++++++++\n>  .../gcc.target/aarch64/sve/vec_perm_3.c       | 22 ++++++++++++++++\n>  3 files changed, 51 insertions(+), 2 deletions(-)\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/vec_perm_2.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/vec_perm_3.c\n> \n> diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc\n> index 62194b96450..e2fa6289e9b 100644\n> --- a/gcc/config/aarch64/aarch64.cc\n> +++ b/gcc/config/aarch64/aarch64.cc\n> @@ -27389,8 +27389,9 @@ aarch64_expand_sve_vec_perm (rtx target, rtx\n> op0, rtx op1, rtx sel)\n>    rtx sel_reg = force_reg (sel_mode, sel);\n> \n>    /* Check if the sel only references the first values vector.  */\n> -  if (CONST_VECTOR_P (sel)\n> -      && aarch64_const_vec_all_in_range_p (sel, 0, nunits - 1))\n> +  if (GET_MODE_MASK (GET_MODE_INNER (sel_mode)) <= nunits - 1U\n> +      || (CONST_VECTOR_P (sel)\n> +\t  && aarch64_const_vec_all_in_range_p (sel, 0, nunits - 1)))\n>      {\n>        emit_unspec2 (target, UNSPEC_TBL, op0, sel_reg);\n>        return;\n> diff --git a/gcc/testsuite/gcc.target/aarch64/sve/vec_perm_2.c\n> b/gcc/testsuite/gcc.target/aarch64/sve/vec_perm_2.c\n> new file mode 100644\n> index 00000000000..42fa5f1f97f\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/sve/vec_perm_2.c\n> @@ -0,0 +1,26 @@\n> +/* { dg-options \"-O2 -msve-vector-bits=2048\" } */\n> +/* { dg-final { check-function-bodies \"**\" \"\" } } */\n> +\n> +#include <arm_sve.h>\n> +\n> +/*\n> +** test8:\n> +**\ttbl\tz0\\.b, {z0\\.b}, z2\\.b\n> +**\tret\n> +*/\n> +svint8_t\n> +test8 (svint8_t x, svint8_t y, svint8_t z)\n> +{\n> +  return __builtin_shuffle (x, y, z);\n> +}\n> +\n> +svint16_t\n> +test16 (svint16_t x, svint16_t y, svint16_t z)\n> +{\n> +  return __builtin_shuffle (x, y, z);\n> +}\n> +\n> +/* { dg-final { scan-assembler-times {\\tand\\t} 1 } } */\n> +/* { dg-final { scan-assembler-times {\\tsub\\t} 1 } } */\n> +/* { dg-final { scan-assembler-times {\\ttbl\\t} 3 } } */\n> +/* { dg-final { scan-assembler-times {\\torr\\t} 1 } } */\n> diff --git a/gcc/testsuite/gcc.target/aarch64/sve/vec_perm_3.c\n> b/gcc/testsuite/gcc.target/aarch64/sve/vec_perm_3.c\n> new file mode 100644\n> index 00000000000..2fead0890c4\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/sve/vec_perm_3.c\n> @@ -0,0 +1,22 @@\n> +/* { dg-options \"-O2 -msve-vector-bits=1024\" } */\n> +\n> +#include <arm_sve.h>\n> +\n> +svint8_t\n> +test8 (svint8_t x, svint8_t y, svint8_t z)\n> +{\n> +  return __builtin_shuffle (x, y, z);\n> +}\n> +\n> +svint16_t\n> +test16 (svint16_t x, svint16_t y, svint16_t z)\n> +{\n> +  return __builtin_shuffle (x, y, z);\n> +}\n> +\n> +/* test8 does not need an AND.  In principle, its subtraction of 128\n> +   from the selector can be rendered as a SUB, an ADD, or an EOR.  */\n> +/* { dg-final { scan-assembler-times {\\tand\\t} 1 } } */\n> +/* { dg-final { scan-assembler-times {\\t(?:sub|add|eor)\\t} 2 } } */\n> +/* { dg-final { scan-assembler-times {\\ttbl\\t} 4 } } */\n> +/* { dg-final { scan-assembler-times {\\torr\\t} 2 } } */\n> --\n> 2.54.0","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=cGWjM+Em;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=cGWjM+Em;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=cGWjM+Em;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=cGWjM+Em","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.84.20"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g8XNl1KsPz1yJ9\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 05 May 2026 05:52:21 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id C7BFC4BABF01\n\tfor <incoming@patchwork.ozlabs.org>; Mon,  4 May 2026 19:52:19 +0000 (GMT)","from DB3PR0202CU003.outbound.protection.outlook.com\n (mail-northeuropeazon11010020.outbound.protection.outlook.com [52.101.84.20])\n by sourceware.org (Postfix) with ESMTPS id 267434BA23CD\n for <gcc-patches@gcc.gnu.org>; Mon,  4 May 2026 19:51:38 +0000 (GMT)","from AS9PR05CA0229.eurprd05.prod.outlook.com (2603:10a6:20b:494::18)\n by DU0PR08MB9107.eurprd08.prod.outlook.com (2603:10a6:10:474::6) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9870.25; Mon, 4 May\n 2026 19:51:32 +0000","from AMS0EPF000001AC.eurprd05.prod.outlook.com\n (2603:10a6:20b:494:cafe::3d) by AS9PR05CA0229.outlook.office365.com\n (2603:10a6:20b:494::18) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9870.25 via Frontend Transport; Mon,\n 4 May 2026 19:51:31 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AMS0EPF000001AC.mail.protection.outlook.com (10.167.16.152) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9891.9\n via Frontend Transport; Mon, 4 May 2026 19:51:31 +0000","from VI0PR08MB10392.eurprd08.prod.outlook.com\n (2603:10a6:800:210::10) by AS8PR08MB8993.eurprd08.prod.outlook.com\n (2603:10a6:20b:5b4::22) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9870.25; Mon, 4 May\n 2026 19:50:27 +0000","from VI0PR08MB10392.eurprd08.prod.outlook.com\n ([fe80::cd7c:e19a:2072:75cc]) by VI0PR08MB10392.eurprd08.prod.outlook.com\n ([fe80::cd7c:e19a:2072:75cc%4]) with mapi id 15.20.9870.023; Mon, 4 May 2026\n 19:50:27 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org C7BFC4BABF01","OpenDKIM Filter v2.11.0 sourceware.org 267434BA23CD"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 267434BA23CD","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 267434BA23CD","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1777924298; cv=pass;\n b=h0G3HcXvcT1SuMNjNVJ1xogqa2YG8/JZH27PaUYyYjeNYxH5e1y0++j1/s8z1UgFPli33TDXDfRvkhAwqcRzIHZTCwglsuVNo9x7ZOFRD5GvLJ4zoViy1Oa8vMEAAYyxShsiRfzuvE+7hGxypqPkSNJvFw8mnxXviDtdvlKMfiI=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=eIt+cp0swXEBsbLEoRkgUpTxu3gJGt7ksH2uufYCUIyWZhLWWkoKYvqGp/MTLUwKqcsq580xS5r0l9FYK/28OAPzcX6GAhY3JFfZVTU90tDqi0o0xzlJMTUS5O9k/YfZV16wL3dz9NxfIndGXTbzgNvJMun1xqRGJoGGKP+wAUrDQEm2m2pbY+HtqiqT7y4FBeduV3JZ7FfbZZ3kzAbKULlhO2CRLWmr9sJH0QbsN/URGi+bfnDLaF+XsW9k4RprxDWSfvdOiEeWLOKrMd26tJiBMddd3EGV1iZP/YrbbEmcTqNI5kYSeWS9DJKVcaI6gEqYJ1C/+sngHpstqR5Vog==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=ej5KhKuW3MisHSpY/Sq7YiLRIHLgCIIp3o5fZ+sy/SlhFauuLOLdLVU/m5iTRX+fEBipe9gWlYCxUhc6LrTZU6mKXpO1FvULF5sWCkZmqbVof+/527dS/ndURBVOPdCWoGa4exMzMTzQ7rxFQ0X7IwNE7ubu0DDG7Tg6RqcMOZ3Bs5t2hGioEXjWW9h9fm9oA2UrYEMAzS/FbUsSBZpQfnVk4faEU1KUK4t80rb4BUJP73DvgMxBJHAx1Akw9TUAa5oUSA0Va3twDHcYBFhYAnGo/Y8Y1hUFjV25xO2NhoCDYbE7oVUQyrbkEwGWHbZn9DbAFGe7tf5lelTmj25ekg=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1777924298; c=relaxed/simple;\n bh=xIKdvEpYn6GjGvRP+hTX5ErNyVPsMstFXsiJQ8YWPbM=;\n h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID:\n MIME-Version;\n b=GcNtrk4lD0gpl8TGKhbR29iSxtjNAQU6SiQJP6AO0YRP9GX1QJFSMplaXDeCcfOOgh1CGxetmIv7SRjiRCI/rExOwq3VUuYsIDmb7/e2KGomC4+pPsxQYdAtwQGucS1BDwoSo912Av2oqHSsDqsJGUzl3BsqlJZjDfDUU/WLJNU=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=cOmLpVlggOq5vhkAbLeK2XE4RUYQHupRKVrMOTDH1iw=;\n b=wp6FCrtlWoFShE3SA/ZgevZ/aVTJ7jBKNDjltLkX8mkmCKePrc2dII+xIaN4Ks+dlHjrFhS5Xj0ntNosOT6Nor8qChizS1YNYOBpz7EHWpzFICpG+hExwaQof3ooVAj+g+NVlR1q3rqyPfY7+e6rqs+dfe/dQC3WyHm/OR1i5Ofi1AlKCdQz5XduwPyExjsEyEc0SKNQvG9DgpbNAzjomhTw7F0b2qconnFlQZmmv3rQyskXXB52XPJcEfvc4lLYCFQ7zz5prVBmBeISSVimZX1cwOAEcj4hOncg5yjZKNxX29pQ4g6xJvOVk41+rZY/rMnWbwot14hkRnTC0jaMVA==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=cOmLpVlggOq5vhkAbLeK2XE4RUYQHupRKVrMOTDH1iw=;\n b=ejOd4kO42DpVIyCZ/kTBCz0mLQ+XhKW8xqYns5aITcGuUqQJp9M/feottIMKKPUMitGqBWFJLxzlVoPuyQa2Q4fZ7Fs4NQ0tvPrbTQIobxkBDV02hadmHzkSHntloqDqthA51SacEQyEzXoJLegPBxLzAOEvuXCiZ6JdGNrm08nSMQMZK5WskBhd4IpSv4MNuPg7kMCzH8gEVACjQkADoAXLaYGNJLz7Z/qkPKYXobpLGIgcT2LQJTfcAgedcIShU2o/ie1xMsLH5pC/Pz4Qb5tywQ6zOzXOgwlK7J3jc9EfbnxtGejqAy4cIdDnGMRLgEDO6cDXwA2gQKA+5jhRTg=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=googlemail.com smtp.mailfrom=arm.com;\n dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;\n dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=cOmLpVlggOq5vhkAbLeK2XE4RUYQHupRKVrMOTDH1iw=;\n b=cGWjM+EmHhl66NPwz3rS7KaijtV0eT/LiOWsQdcUTxHARjGSAyhmmHeHvf9CNi73PBvgwpjGdYcGjLvQwpsBVPuP68T0ylP8gCtDx5O8FuZ5gItkwph4aiW37Xfj1/v/PwDLpBiLzQVAEaCkg4sOY2S0ZEroVKsVVW4USZ9yr7A=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=cOmLpVlggOq5vhkAbLeK2XE4RUYQHupRKVrMOTDH1iw=;\n b=cGWjM+EmHhl66NPwz3rS7KaijtV0eT/LiOWsQdcUTxHARjGSAyhmmHeHvf9CNi73PBvgwpjGdYcGjLvQwpsBVPuP68T0ylP8gCtDx5O8FuZ5gItkwph4aiW37Xfj1/v/PwDLpBiLzQVAEaCkg4sOY2S0ZEroVKsVVW4USZ9yr7A="],"X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","Received-SPF":"Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","From":"Tamar Christina <Tamar.Christina@arm.com>","To":"Richard Sandiford <rdsandiford@googlemail.com>, \"gcc-patches@gcc.gnu.org\"\n <gcc-patches@gcc.gnu.org>","Subject":"RE: [PATCH] aarch64: Fix SVE vec_perm for VL2048 VNx16QI","Thread-Topic":"[PATCH] aarch64: Fix SVE vec_perm for VL2048 VNx16QI","Thread-Index":"AQHc27HggJJINiQQP0m3ZdxYY0AQfLX+Rt3w","Date":"Mon, 4 May 2026 19:50:27 +0000","Message-ID":"\n <VI0PR08MB10392099A6072BDE627E3C126FF312@VI0PR08MB10392.eurprd08.prod.outlook.com>","References":"<87qznrxxzx.fsf@googlemail.com>","In-Reply-To":"<87qznrxxzx.fsf@googlemail.com>","Accept-Language":"en-US","Content-Language":"en-US","X-MS-Has-Attach":"","X-MS-TNEF-Correlator":"","Authentication-Results-Original":"dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;","x-ms-traffictypediagnostic":"\n VI0PR08MB10392:EE_|AS8PR08MB8993:EE_|AMS0EPF000001AC:EE_|DU0PR08MB9107:EE_","X-MS-Office365-Filtering-Correlation-Id":"4e87a985-442c-43b4-4c2c-08deaa168a1d","x-checkrecipientrouted":"true","nodisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|1800799024|366016|376014|18002099003|22082099003|56012099003|38070700021;","X-Microsoft-Antispam-Message-Info-Original":"\n J9W7ougr48EqQgvE5v29h+d5bUHQMFSXPptk7aw6pc1efbFMk1IbRYCujTe/Nxbbfn5xe3zkBq73I0315mw4A/amAuiQL3IY85RuA5Yd4jUATVKuPdx8ZDValKvsQw7CwHlufYv0uUVtASLFGd/qcJJVeGViJSt17FVLGM19JMOS+OI1f2CReZxb6SKJkwVWwof2xDJeoCEpJfygBMeTk2uOja7MWtXza2lWwKnHozmHzoYes/Y2P1kJwcsrT4u0+HXd1mPA/DkZxy4D/RfdQ0qQgd3zOFZJwIBaqU2thlFGOm8LI42V8u5sJx9Wx2YFky+Uc7d/NY0W8PfI/GfFqI5bH3W2ieNskxqukvdoZuxbJGFcWX40l/bSxc/YFC9ebgIWjpfowXRzBJ1UL/yqtFEz0wHOkzpGlD7aD4tQT91Qh4fN6M7ZgpTd0CGuHOB+LI631dwdphpZsD3K2ReTCU3bTQoZ7rcS3ykfANgKxauafHgiJqEITjWW15aRn/+1sqO1KWUq3Ri+YhuSNXtw4azqOqdqtsz/0E4WTRWfDB6Lj/sGofmUdtMBNZ+6uKpKfHcXgjhLrXVsDJ5JZL3NT4OTFFvPVkZwNciPoiZO9cKRki8FVRizHk/gwoJlKA4FAHD0sHoN7Ti1n6/6aS8mh3mCgAx26BhSd/pznQaaT9C4m9r3a4T45BF1M0ZYs5pnSu4m6l1dSR2y4KhFKrI6zA==","X-Forefront-Antispam-Report-Untrusted":"CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI0PR08MB10392.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(1800799024)(366016)(376014)(18002099003)(22082099003)(56012099003)(38070700021);\n DIR:OUT; SFP:1101;","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"quoted-printable","MIME-Version":"1.0","X-Exchange-RoutingPolicyChecked":"\n fJNrCHU2isW1Wk0l5fEj69qvdIdffRJHcmf3uyrAtqEgKLUghO9vu7KcO/rB60jVUkghjISWvzAbg0+XMhb1BSJbE/V1TgKUGqoxSkOR2Z7GkVAn/d7xyquGOUVdhFg93iOOkobMSSf8T/Uii60zH0Sd8CX+hDbBLUOd0Ekx+wrZwSn2OwIywfFzOUiPxfqcPsccMfiUyotiwt6wljKXKMWYz1ZxGb0MKQivNPNuGRMHVHFItCbpnVcVm7e8eFwAq5sJveCOjOM5wUtJJPdls5nZdNWkMTII2R3lN3T2Iq3sHrfjFLOGbtICWS7MFzvwGUYfTn5oAwWhwsa93km+wg==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["AS8PR08MB8993","DU0PR08MB9107"],"X-EOPAttributedMessage":"0","X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n AMS0EPF000001AC.eurprd05.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n c29c93b5-a5e2-456f-3b69-08deaa1663fb","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|376014|36860700016|1800799024|82310400026|14060799003|35042699022|13003099007|22082099003|56012099003|18002099003;","X-Microsoft-Antispam-Message-Info":"\n iP4rYTui/hKuEbmMn2FqvmJdQh40SLMLCr+fPrAwf6SG9qvDqzSAYnis789UHMWnECu/Lj5KcuG3MBQhpY8HUMS5/nIFvMULmWdHo63YESxvH7ybtrXUyXae2DUMi36T0Z+kYVNPj1u7LQd7xg6Of2/Ze6nb3O8bHwv74W7JqRXlzPR3ls22YPGkI3Mm2TiuVRSvrGZBI3C7XJidnkNcBi+gognd195cOLD9og36AfqqA54Tz0C4Hv4YcxlxPOLn5xTFr31lOAY2CwUQ5O4cVumveZQe3zG5lT/skACcpWHM58ErmXvfqSr0sSCb63CLwKlQwFJmbLg414bqBnq1Ad5GItsl7hxqzSdO4rdeH51LQYUy3XhhCggNkR0RDrcTkcf9w6N31lQ/bY1DwKIZqFYI36g+7/7r2FZfuvfEwALUUtx+D+SSYAt18rSHB11YdugAav4lH629xAS2taXkG58aPWGRwwaYUp5M2QI6wX9Pxu3v/sN5czTojUeAZYKU/CtmcoXQCmfh27FN8T9O//6jTtsQMsUwaMhuBY9zfOiBrsmEFqKHbUyDgPIonEgNJEPRX+6C2ETuIDmUSrPjTg9+8igH9PfPiI0Bn9vs9nJVaF8VKjnahNoYk364etHnML77V6frl3kg8ZJA4fmIxy1ud0dBsH1rXCYsNmv91hBk/za5UaXlSgxJFwRUquPG","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(376014)(36860700016)(1800799024)(82310400026)(14060799003)(35042699022)(13003099007)(22082099003)(56012099003)(18002099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n qz2lBvoOCbhBs0VWlE37MmZW+sbhTtOUuin1LRzfYA+Mfs/7i8wSrpN4Rvbe9OycS12bxrKsAcZ1wU0eFhkqpc4VCT4in6jA4Woc3MSBHMHxRXbDGthvV/SQxsvMErvaL4yFeg7T6Dbagwb9/XNMDXm0OR+52ok6pVLlJ4evMtsPqq5jga9TolqdjINZI+bw5RR4OJy0ek1Rc5qFM3NySrykq12G3IzOONrcHDR3DuErpSEcpNZW1dOzeleZQyc2pMGoKi7+Wv4DRLPRxclrjucGtHpTm+VMsCulnCVlYdz+v6AcT2LStw/ybW7JVMZDaYMQoTL+Y9Jv9AY+yW/fzzPJpBzs+skZXP7U6IF926JMjDIPlXmRnjLe5fgRDgr40UEELgYGjkM9UCJRRMw0bnXv4jAKhUjDwY+UuEuRVRoaTDwUaP3ymQaj5to5NE3X","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"04 May 2026 19:51:31.5983 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 4e87a985-442c-43b4-4c2c-08deaa168a1d","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n AMS0EPF000001AC.eurprd05.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}}]