{"id":2227908,"url":"http://patchwork.ozlabs.org/api/1.1/patches/2227908/?format=json","web_url":"http://patchwork.ozlabs.org/project/gcc/patch/20260424132541.1929445-1-christophe.lyon@arm.com/","project":{"id":17,"url":"http://patchwork.ozlabs.org/api/1.1/projects/17/?format=json","name":"GNU Compiler Collection","link_name":"gcc","list_id":"gcc-patches.gcc.gnu.org","list_email":"gcc-patches@gcc.gnu.org","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<20260424132541.1929445-1-christophe.lyon@arm.com>","date":"2026-04-24T13:25:41","name":"arm: Fix MVE load/store with writeback intrinsics [PR124870]","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"9d61149ad1be41381aad4c72ac6d653483b59672","submitter":{"id":83577,"url":"http://patchwork.ozlabs.org/api/1.1/people/83577/?format=json","name":"Christophe Lyon","email":"christophe.lyon@arm.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/gcc/patch/20260424132541.1929445-1-christophe.lyon@arm.com/mbox/","series":[{"id":501362,"url":"http://patchwork.ozlabs.org/api/1.1/series/501362/?format=json","web_url":"http://patchwork.ozlabs.org/project/gcc/list/?series=501362","date":"2026-04-24T13:25:41","name":"arm: Fix MVE load/store with writeback intrinsics [PR124870]","version":1,"mbox":"http://patchwork.ozlabs.org/series/501362/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2227908/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2227908/checks/","tags":{},"headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=JNSsQfHT;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=JNSsQfHT;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=JNSsQfHT;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=JNSsQfHT","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.66.4"],"Received":["from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g2DK90Lkpz1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 23:27:25 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 2FB214BB58DA\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 13:27:23 +0000 (GMT)","from DUZPR83CU001.outbound.protection.outlook.com\n (mail-northeuropeazon11012004.outbound.protection.outlook.com [52.101.66.4])\n by sourceware.org (Postfix) with ESMTPS id 91A344BB5883\n for <gcc-patches@gcc.gnu.org>; Fri, 24 Apr 2026 13:26:51 +0000 (GMT)","from CWLP123CA0196.GBRP123.PROD.OUTLOOK.COM (2603:10a6:400:19c::9)\n by AS8PR08MB6600.eurprd08.prod.outlook.com (2603:10a6:20b:33e::20) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.22; Fri, 24 Apr\n 2026 13:26:47 +0000","from AMS0EPF0000019F.eurprd05.prod.outlook.com\n (2603:10a6:400:19c:cafe::a8) by CWLP123CA0196.outlook.office365.com\n (2603:10a6:400:19c::9) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.22 via Frontend Transport; Fri,\n 24 Apr 2026 13:26:47 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AMS0EPF0000019F.mail.protection.outlook.com (10.167.16.251) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.18\n via Frontend Transport; Fri, 24 Apr 2026 13:26:47 +0000","from AS4P189CA0039.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:5dd::16)\n by AS8PR08MB8039.eurprd08.prod.outlook.com (2603:10a6:20b:549::20)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9846.22; Fri, 24 Apr\n 2026 13:25:44 +0000","from DB3PEPF00008859.eurprd02.prod.outlook.com\n (2603:10a6:20b:5dd:cafe::81) by AS4P189CA0039.outlook.office365.com\n (2603:10a6:20b:5dd::16) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9846.22 via Frontend Transport; Fri,\n 24 Apr 2026 13:25:44 +0000","from nebula.arm.com (172.205.89.229) by\n DB3PEPF00008859.mail.protection.outlook.com (10.167.242.4) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9846.18 via Frontend Transport; Fri, 24 Apr 2026 13:25:43 +0000","from AZ-NEU-EX04.Arm.com (10.240.25.138) by AZ-NEU-EX03.Arm.com\n (10.240.25.137) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.29; Fri, 24 Apr\n 2026 13:25:43 +0000","from ip-10-249-57-33.eu-west-1.compute.internal (10.249.57.33) by\n mail.arm.com (10.240.25.138) with Microsoft SMTP Server id 15.2.2562.29 via\n Frontend Transport; Fri, 24 Apr 2026 13:25:43 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 2FB214BB58DA","OpenDKIM Filter v2.11.0 sourceware.org 91A344BB5883"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org 91A344BB5883","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org 91A344BB5883","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1777037211; cv=pass;\n b=PWYRkHJMwYx9zqrwZC5oNy23YHTHeBZivZLfJJqcLHeMHCunEloyk+88H/iFJ2rpRXMmHCkxZRvX9LZekMBy3Q1YEuxpkx8H8vmWSUngDA+xBO5+TcmYiYieUrxBtafOtrdRvUVEgYPh3WyaJYyoRSy6z1/xJJh0lIkxDGLtlT4=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=iSQ5cgLjbuCuv4hky9GLaP1ZWAAvTcBPJkmNji16uCWLCBCpskkN/KzRZa31FX/RAb1hBaxK2neT3ifT1Z93Polsik5Aq75/954Uo2ShiVS+NcfYgMd9iKFKsp+iIGQILljjEYBm5gd53m8aDT9JpGPsCOcVMeyxRWPYd90Q/1UHPSfmQaRqOcRfBBGns2lTzeYEdaJL4zBDT/TmigOmx0HN8DYywPnkcJdrhazJ3I469qCSHdk2AKTTLDpnqi9BWJM67NLVAYspBLUfTf1Gtfr8weIW95/8SFCO20009jd5aF0mK/YrrJA1FPeD5BI6RodYcWRoJlOo2YpE4lFQMA==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=W6ulc4rhuuNj8RgGyW9LxoF9ZlpOudUjX2yobnKdUNzgKA/YX4UsnFdmBazFfXgJo9g41ulW6ysHHXvgQOys7ir8r246Dl/UXJW+tueAE5xjmAjlM4phj2Tlwx3ma0kzf4G4ZVzN7QgCNsOMwJUn4hreWWCEpNPEfnGygKiqw0FeD2BEAqTOZuN5xkxsSmnDKtmLf1iPVZi66yN8u9AGlf27EmEcfdILakQjmfTlrHuvtukUtmccerKGZsO8XkV7J6HilofxE/GM8LQR4RWSh7PoqGAWjycUJYfRze8faPNHCIM5zL3ty9bG03qE98UG3zzkm/2TVyFk0v1EqFoQPg=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1777037211; c=relaxed/simple;\n bh=6//JQI77OWyyKAPGgRww1f/0nRPDh8FNVxT0maptrAQ=;\n h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID:\n MIME-Version;\n b=MRIfW8vmxuBqX3C49bUgwiv2UNA2ly2RpC6fRA9zjCOUF6zKIzzfBSO8kLZYaaLcd8Yca60Oem7ai8izXb8B/4jD2aoDyMFalQBAEzhytIkZMNDSKFMvc6wr5PclncE/orCIBKFeUVqOoyV+M0kwB3FYLXFk8gtX36Dzy/8r/Zo=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=S+l84ynRIdvQ5jK41pdd8mYi8INamY6rjtpNzc/XSeA=;\n b=LhrR4NhkX0Rvh67Y1rY70W83UkJlfiHh/ivmf4P6Apmb/d3M2CivQsf/QzYmoVUOEXgqfwkhzdx9xg/y4HYaFC0K9FHfawX94JGjJgxUHp4WSLRMchYgOZO5UQQmOiX2mIYPE3FTjtr/bEdqEvKghX2z3VhWeO7bz0Z/Zvtt2caVNQHueIqmExjeWxOkTSpyhjaYiqDIRF3ZNhexifWeQjEHRd9gTa4zfPpRUkF5m5LphR3apSDrQvgBHYFzAvDFldIVxbbkuV87MLpu0hD6O/BzIxdeE27bX/wl0TgjMtiEMf2QrbG+16kpV3Z/t7J7+lKJO3X32v7d6yw4t1a07A==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=S+l84ynRIdvQ5jK41pdd8mYi8INamY6rjtpNzc/XSeA=;\n b=B3T4ady0tTTlmYsBgUYAlVa4gA9u+nuOjYHldAzj7fEJjCgxqxCqKxSs3aB/zq1+uvUIvnVhpD52FSxjZeevWfFyg5YhhD0w4CK4/U7URlnQxNlocx8o9EKeB+WUjzipmdWLCTNHfpdCHZPVwK94qA35YmCDnESg6xt+lnUThRPQgnvOdOWZg1zprdfqJP7yct2SbVABAkx/EQgZNyzoIZ/4wlaT22wvadoijSJcuWBRGgW82K89CrtIOu0bTsW/OTdqAtXTiVvDOft3pCyoK5+NDHMTTxhWO1HmP7IkpbYJSkPlwyS/op3kATbuBwsSpJy73iBZEDB/OMl06/ep6Q=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 172.205.89.229) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com;\n dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;\n dkim=none (message not signed); arc=none (0)"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=S+l84ynRIdvQ5jK41pdd8mYi8INamY6rjtpNzc/XSeA=;\n b=JNSsQfHTfUuKPZSQCT8YtqGAUCcbKVmk2gDhi57TmbaDSoi9cj5iKz2wHyCkuzRSxZcLQmGCNBbWNslHVUuRqpi7V/9MbBxfSDAk38J3zaswXJun/AaeGGOkZVZp8wlMk2YAhkFJZ4t4G2YnCB7STQ12jpseLomJnkEMRnePPfE=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=S+l84ynRIdvQ5jK41pdd8mYi8INamY6rjtpNzc/XSeA=;\n b=JNSsQfHTfUuKPZSQCT8YtqGAUCcbKVmk2gDhi57TmbaDSoi9cj5iKz2wHyCkuzRSxZcLQmGCNBbWNslHVUuRqpi7V/9MbBxfSDAk38J3zaswXJun/AaeGGOkZVZp8wlMk2YAhkFJZ4t4G2YnCB7STQ12jpseLomJnkEMRnePPfE="],"X-MS-Exchange-Authentication-Results":["spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","spf=pass (sender IP is 172.205.89.229)\n smtp.mailfrom=arm.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=arm.com;"],"Received-SPF":["Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","Pass (protection.outlook.com: domain of arm.com designates\n 172.205.89.229 as permitted sender) receiver=protection.outlook.com;\n client-ip=172.205.89.229; helo=nebula.arm.com; pr=C"],"From":"Christophe Lyon <christophe.lyon@arm.com>","To":"<gcc-patches@gcc.gnu.org>","CC":"<rguenther@suse.de>, <richard.earnshaw@arm.com>, <jakub@redhat.com>,\n Christophe Lyon <christophe.lyon@arm.com>","Subject":"[PATCH] arm: Fix MVE load/store with writeback intrinsics [PR124870]","Date":"Fri, 24 Apr 2026 13:25:41 +0000","Message-ID":"<20260424132541.1929445-1-christophe.lyon@arm.com>","X-Mailer":"git-send-email 2.43.0","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Content-Type":"text/plain","X-EOPAttributedMessage":"1","X-MS-TrafficTypeDiagnostic":"\n DB3PEPF00008859:EE_|AS8PR08MB8039:EE_|AMS0EPF0000019F:EE_|AS8PR08MB6600:EE_","X-MS-Office365-Filtering-Correlation-Id":"df3e6c5f-2673-4aea-608d-08dea205229f","x-checkrecipientrouted":"true","NoDisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|376014|1800799024|82310400026|36860700016|18002099003|56012099003;","X-Microsoft-Antispam-Message-Info-Original":"\n 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","X-Forefront-Antispam-Report-Untrusted":"CIP:172.205.89.229; CTRY:IE; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(376014)(1800799024)(82310400026)(36860700016)(18002099003)(56012099003);\n DIR:OUT; SFP:1101;","X-Exchange-RoutingPolicyChecked":"\n PpPg0KQGxM7zNn/E8Ym05cq+eTkzLCqWP7mUdHK6fRkUNvvXECS+cRLUyxG/A9cBknC+ChK8SAX9S3YJi9dejfiHsGlQywYpkCNlBu8IslYh7lGlJiwqRpRFatxbzHDfkGCrDc29XN7A6taZZSOnX5ctXvvCnYiUpjWnINZYqBXjpDTIvVCgWdSoMOSvqWDqx95fjIOywR/CbvWmIer7ANoTJR9srge8hH3J+sZ5BKLBB6XJhPcf4U1qcYtfsNLBKo+JHFaQ6tmveTBdVZ77kkdwIT3ym+ZTwBG7iu/0C7U7DCAHbV7K0Hj42HAQ3YVAN3oWlejEbgJcpzvuwCyG3g==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["AS8PR08MB8039","AS8PR08MB6600"],"X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n AMS0EPF0000019F.eurprd05.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n b1338269-41c0-460b-2295-08dea204fce1","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|82310400026|36860700016|14060799003|35042699022|376014|1800799024|56012099003|18002099003|13003099007;","X-Microsoft-Antispam-Message-Info":"\n fn41Dhr14grm28diKhy/+9MtldgDtnbQcwgKyj0V1KKgbIdVz9i1OFfm6Ml18yZH/xjRHdQ7Vu/QpSMulSPDZfzX4nUfrMgiyA47GS4B6kcJf4pLF8mppg+k3uTPFbEH5MZ5oePx9MhGjRI/QEw8tx391eABKogJJwnFZeqNMdhH+CiablmXv45sOS+Ucz7ra0R4xZFj9SoSJsE1Y56E2mHJ6OTr/M0GIWWfsV+9FiW2gEQPG/2t6aIEZW+wj6vGEwkONkvC5t4TRuaDoJS1cD40pIQqKyGAkZXq0IrrCmiv1rlAH6eCIfFEyMuUhDN55HBkZIHS+fmX+3mgSAqIQkQ3urrEkya3eZlzo9GIjbXsBVabG6QZRtlrIgp/+nZO/jQtwiFc/doESE8V85qscDqr4ZIHGAVr8q7Q7aCjOob4RhEYcMwAbfjsVky/PJ5symSdri2AlcdAGTt0YODIagaGGiYnKK7c6alkadFxdpLN7JldEvmme4oECH49jg0KW1kfAOdJRYE7w7+PCOJ4aU2e5k4FdRMcZ6C+UviL/R4uFMTuQfE+/Optzz+FvxvLEdbcRPAGdHL1xQudSWSXzzU6igWUEHR1oxQM2JE4gVHkGWeuhtDq3KHJIf17hzRETrXz9zU0nwN5JnD+U8Z4A6QRbyaqdTr5Tj2rjigIPyH1Wt6EyvEl98XFcke2Z8U9UnPXwpeNV3WzHlofOa88BtgPUaz7ZjOEH4pZ5llvWhA=","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(82310400026)(36860700016)(14060799003)(35042699022)(376014)(1800799024)(56012099003)(18002099003)(13003099007);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n 8nzGME0XhPqZT1duJC7WwtUp7cQuE/tAFzRuK0CEP8sAkdz/TSUxUst3AKd/3n2LMTPoTxTOpBiwzyOwpbSUpkrqLYuZ1xZFSry41zWNo/xwqomLLKBWk5YpDexl5ZvLbF0+z97s5JA0nrdYdVxEABbxJnLA2G67QThaPSu4uZ6j/a84uqOm8tcSL8DKiesR0gL7Fzz7eQGfB09tgdDWgRY98LUtdCp4aqRsTZKY54ZUWzwxa2nDN0cth8ly6ehZTvkKEqScBRLLj18UMEaupu1ygtIKMqHZx9GNxf3Nr0Q4ParhXsNc/i6CEPoI96ZsLJ+Ai+oeJEUoMX0yzVOTXni0GqLKA7CVyKhwVsPXphQVSnxXOxWJ2rxkd3EWqyXUQnXADe8Wye8/4UMpLfBJo+i7PgK+PA/f4mluSew2+kqxBfvm/cVXT7j8OXjn6t2G","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"24 Apr 2026 13:26:47.1557 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n df3e6c5f-2673-4aea-608d-08dea205229f","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n AMS0EPF0000019F.eurprd05.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"},"content":"These intrinsics (vldr*_gather_base_wb, vstr*_scatter_base_wb) lacked\nmodelling of memory accesses corresponding to writeback: in this case,\nthey both read and write memory.\n\nOK for trunk, gcc-16 and gcc-15?\n\nThanks,\n\nChristophe\n\n2024-04-24  Christophe Lyon  <christophe.lyon@arm.com>\n\n\tPR target/124870\n\tgcc/\n\t* config/arm/arm-mve-builtins-base.cc (vstrq_scatter_base_impl)\n\t(vldrq_gather_base_impl): Fix call_properties.\n\n\tgcc/testsuite/\n\t* gcc.target/arm/mve/intrinsics/pr124870.c: New test.\n---\n gcc/config/arm/arm-mve-builtins-base.cc       | 15 +++++++--\n .../gcc.target/arm/mve/intrinsics/pr124870.c  | 31 +++++++++++++++++++\n 2 files changed, 44 insertions(+), 2 deletions(-)\n create mode 100644 gcc/testsuite/gcc.target/arm/mve/intrinsics/pr124870.c","diff":"diff --git a/gcc/config/arm/arm-mve-builtins-base.cc b/gcc/config/arm/arm-mve-builtins-base.cc\nindex b344aca3f55..eaac4316d6b 100644\n--- a/gcc/config/arm/arm-mve-builtins-base.cc\n+++ b/gcc/config/arm/arm-mve-builtins-base.cc\n@@ -294,9 +294,12 @@ public:\n     : m_to_int_mode (to_int_mode)\n   {}\n \n-  unsigned int call_properties (const function_instance &) const override\n+  unsigned int call_properties (const function_instance &fi) const override\n   {\n-    return CP_WRITE_MEMORY;\n+    if (fi.mode_suffix_id == MODE_wb)\n+      return CP_WRITE_MEMORY | CP_READ_MEMORY;\n+    else\n+      return CP_WRITE_MEMORY;\n   }\n \n   machine_mode memory_vector_mode (const function_instance &fi) const override\n@@ -480,6 +483,14 @@ public:\n     return type_suffixes[suffix].vector_mode;\n   }\n \n+  unsigned int call_properties (const function_instance &fi) const override\n+  {\n+    if (fi.mode_suffix_id == MODE_wb)\n+      return CP_WRITE_MEMORY | CP_READ_MEMORY;\n+    else\n+      return CP_READ_MEMORY;\n+  }\n+\n   rtx expand (function_expander &e) const override\n   {\n     insn_code icode;\ndiff --git a/gcc/testsuite/gcc.target/arm/mve/intrinsics/pr124870.c b/gcc/testsuite/gcc.target/arm/mve/intrinsics/pr124870.c\nnew file mode 100644\nindex 00000000000..cfb41da8039\n--- /dev/null\n+++ b/gcc/testsuite/gcc.target/arm/mve/intrinsics/pr124870.c\n@@ -0,0 +1,31 @@\n+/* { dg-require-effective-target arm_v8_1m_mve_fp_ok } */\n+/* { dg-add-options arm_v8_1m_mve_fp } */\n+/* { dg-additional-options \"-O2\" } */\n+\n+/* PR target/124870.  */\n+\n+#include <arm_mve.h>\n+\n+#ifdef __cplusplus\n+extern \"C\" {\n+#endif\n+\n+void fn (int n, uint32_t *strides, float32_t *f)\n+{\n+    uint32x4_t vecScGathAddr = vld1q_u32(strides);\n+    float32x4_t vecA = vldrwq_gather_base_wb_f32(&vecScGathAddr, 64);\n+    float32x4_t vecB = vecA;\n+    int i;\n+    for (i = 0; i < n; ++i)\n+    {\n+        vecA = vldrwq_gather_base_wb_f32(&vecScGathAddr, 64);\n+        vecB = vaddq_f32 (vecB, vecA);\n+    }\n+    vstrwq_f32 (f, vecB);\n+}\n+\n+#ifdef __cplusplus\n+}\n+#endif\n+\n+/* { dg-final { scan-assembler-times \"vadd.f32\\tq\\[0-9\\]+, q\\[0-9\\]+, q\\[0-9\\]+\" 1 } } */\n","prefixes":[]}