[{"id":1778647,"web_url":"http://patchwork.ozlabs.org/comment/1778647/","msgid":"<a0822e11-f557-9c69-9f16-e2ad11d0e9e1@redhat.com>","list_archive_url":null,"date":"2017-10-02T22:36:31","subject":"Re: [PATCH 5/5] New target check: vect_can_peel","submitter":{"id":4400,"url":"http://patchwork.ozlabs.org/api/people/4400/","name":"Jeff Law","email":"law@redhat.com"},"content":"On 09/28/2017 05:50 AM, Andreas Krebbel wrote:\n> gcc/ChangeLog:\n> \n> 2017-09-28  Andreas Krebbel  <krebbel@linux.vnet.ibm.com>\n> \n> \t* doc/sourcebuild.texi: Document vect_can_peel.\n> \n> gcc/testsuite/ChangeLog:\n> \n> 2017-09-28  Andreas Krebbel  <krebbel@linux.vnet.ibm.com>\n> \n> \t* g++.dg/vect/slp-pr56812.cc: xfail for targets which don't want\n> \tvector loop peeling.\n> \t* lib/target-supports.exp (check_effective_target_vect_can_peel):\n> \tNew proc.\nCan you come up with a better name than vect_can_peel?  The comments\nindicate it's more about peeling to improve alignment is profitable on\nthe target rather than the target's ability to peel.\n\nOK with a better name.\n\njeff","headers":{"Return-Path":"<gcc-patches-return-463368-incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","mailing list gcc-patches@gcc.gnu.org"],"Authentication-Results":["ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org\n\t(client-ip=209.132.180.131; helo=sourceware.org;\n\tenvelope-from=gcc-patches-return-463368-incoming=patchwork.ozlabs.org@gcc.gnu.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (1024-bit key;\n\tunprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org\n\theader.b=\"IHpxwNeT\"; dkim-atps=neutral","sourceware.org; auth=none","ext-mx03.extmail.prod.ext.phx2.redhat.com;\n\tdmarc=none (p=none dis=none) header.from=redhat.com","ext-mx03.extmail.prod.ext.phx2.redhat.com;\n\tspf=fail smtp.mailfrom=law@redhat.com"],"Received":["from sourceware.org (server1.sourceware.org [209.132.180.131])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3y5cTm4dgvz9t42\n\tfor <incoming@patchwork.ozlabs.org>;\n\tTue,  3 Oct 2017 09:36:43 +1100 (AEDT)","(qmail 27042 invoked by alias); 2 Oct 2017 22:36:36 -0000","(qmail 27033 invoked by uid 89); 2 Oct 2017 22:36:36 -0000","from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by\n\tsourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP;\n\tMon, 02 Oct 2017 22:36:35 +0000","from smtp.corp.redhat.com\n\t(int-mx02.intmail.prod.int.phx2.redhat.com\n\t[10.5.11.12])\t(using TLSv1.2 with cipher AECDH-AES256-SHA\n\t(256/256 bits))\t(No client certificate requested)\tby\n\tmx1.redhat.com (Postfix) with ESMTPS id 77CD983F3E;\n\tMon,  2 Oct 2017 22:36:34 +0000 (UTC)","from localhost.localdomain (ovpn-112-25.rdu2.redhat.com\n\t[10.10.112.25])\tby smtp.corp.redhat.com (Postfix) with ESMTP\n\tid 6936160247; Mon,  2 Oct 2017 22:36:33 +0000 (UTC)"],"DomainKey-Signature":"a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id\n\t:list-unsubscribe:list-archive:list-post:list-help:sender\n\t:subject:to:references:from:message-id:date:mime-version\n\t:in-reply-to:content-type:content-transfer-encoding; q=dns; s=\n\tdefault; b=exv/V5mnnKeECmQdyRxHZTUlKvCQ5UEJm/6Pp0dQ+NHU0FfVJgozE\n\tXLv9izDI1ubSzsMY4OZl48bU4z8GP38f7pj8k5javr7Wh8EZPnfErNMyovQd3Fkb\n\tdIsUngD/7keHMXjYhpv2V5hiUJCbVhK5XEcMnKY/x4LV02rabf2fOU=","DKIM-Signature":"v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id\n\t:list-unsubscribe:list-archive:list-post:list-help:sender\n\t:subject:to:references:from:message-id:date:mime-version\n\t:in-reply-to:content-type:content-transfer-encoding; s=default;\n\tbh=dyuLMOBXhH7WsY6pqqOpV/iy9Ig=; b=IHpxwNeTjHbLk84YjIxx1qq/P4rr\n\tQZItabcoqwFwwi+INwhNoAZPNGGodE7SNgjxu+k2yL8KZFvOHs8Pl1MmFKzYH8cS\n\tIZ5SFsd8qgDUmtjmt2nQm6NC3IsqMYwtYUXVFE+J3fSkjeZ/gdpNS6c3rFnXy7Ut\n\t/xvl+xoP+kqHi7w=","Mailing-List":"contact gcc-patches-help@gcc.gnu.org; run by ezmlm","Precedence":"bulk","List-Id":"<gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<mailto:gcc-patches-unsubscribe-incoming=patchwork.ozlabs.org@gcc.gnu.org>","List-Archive":"<http://gcc.gnu.org/ml/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-help@gcc.gnu.org>","Sender":"gcc-patches-owner@gcc.gnu.org","X-Virus-Found":"No","X-Spam-SWARE-Status":"No, score=-1.9 required=5.0 tests=BAYES_00,\n\tRP_MATCHES_RCVD,\n\tSPF_HELO_PASS autolearn=ham version=3.3.2 spammy=","X-HELO":"mx1.redhat.com","DMARC-Filter":"OpenDMARC Filter v1.3.2 mx1.redhat.com 77CD983F3E","Subject":"Re: [PATCH 5/5] New target check: vect_can_peel","To":"Andreas Krebbel <krebbel@linux.vnet.ibm.com>, gcc-patches@gcc.gnu.org","References":"<20170928115044.21422-1-krebbel@linux.vnet.ibm.com>\n\t<20170928115044.21422-6-krebbel@linux.vnet.ibm.com>","From":"Jeff Law <law@redhat.com>","Message-ID":"<a0822e11-f557-9c69-9f16-e2ad11d0e9e1@redhat.com>","Date":"Mon, 2 Oct 2017 16:36:31 -0600","User-Agent":"Mozilla/5.0 (X11; Linux x86_64;\n\trv:52.0) Gecko/20100101 Thunderbird/52.3.0","MIME-Version":"1.0","In-Reply-To":"<20170928115044.21422-6-krebbel@linux.vnet.ibm.com>","Content-Type":"text/plain; charset=utf-8","Content-Transfer-Encoding":"7bit","X-IsSubscribed":"yes"}}]