From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 524FE3858D32; Tue, 20 Jun 2023 12:20:04 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 524FE3858D32 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1687263604; bh=kFk01IA9QWgoaf/2a/iL1ItipjpqJTLE7HQsmcOkWvs=; h=From:To:Subject:Date:In-Reply-To:References:From; b=Nx9o6b/jlwj4+pp3Vlo4q4Bu3hECzyitUpsjYSAjTMVD1NiuIcNWiR8NfmcebFHgs 1V45Urrz3ufDrbTm2+ZRjmWqmJRo1rgkBrP5drlb7u+3hoB/tpzaktzYAt4BxM3kR4 bgDL0Oz8ZXtpBA8ae/NgGGnLNp7GaUKvddyf8Y6Q= From: "rguenther at suse dot de" To: gcc-bugs@gcc.gnu.org Subject: [Bug rtl-optimization/110237] gcc.dg/torture/pr58955-2.c is miscompiled by RTL scheduling after reload Date: Tue, 20 Jun 2023 12:20:04 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: rtl-optimization X-Bugzilla-Version: 14.0 X-Bugzilla-Keywords: wrong-code X-Bugzilla-Severity: normal X-Bugzilla-Who: rguenther at suse dot de X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 List-Id: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D110237 --- Comment #5 from rguenther at suse dot de --- On Tue, 20 Jun 2023, crazylht at gmail dot com wrote: > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D110237 >=20 > --- Comment #4 from Hongtao.liu --- > (In reply to Richard Biener from comment #3) > > This looks like the same issue as PR110309. We have > >=20 > > (insn 38 35 39 3 (set (mem:V16SI (plus:DI (reg:DI 40 r12 [orig:90 _22 ]= [90]) > > (const:DI (plus:DI (symbol_ref:DI ("b") [flags 0x2]=20 > > ) > > (const_int -4 [0xfffffffffffffffc])))) [1 MEM > > [(int *)vectp_b.12_28]+0 S64 A32]) > > (vec_merge:V16SI (reg:V16SI 20 xmm0 [118]) > > (mem:V16SI (plus:DI (reg:DI 40 r12 [orig:90 _22 ] [90])=20 > > (const:DI (plus:DI (symbol_ref:DI ("b") [flags 0x2]= =20 > > ) > > (const_int -4 [0xfffffffffffffffc])))) [1 M= EM > > [(int *)vectp_b.12_28]+0 S64 A32]) > >=20 > > so instead of a masked load we see a vec_merge with a (mem:V16SI ...) > > based on the vectp_b.12_28 pointer that has full size but the load of b= [1] > > we try disambiguate against refers to int b[10] which is too small for > > a load of 64 bytes so we disambiguate based on that. >=20 >=20 > /* If the pointer based access is bigger than the variable they cannot > alias. This is similar to the check below where we use TBAA to > increase the size of the pointer based access based on the dynamic > type of a containing object we can infer from it. */ > poly_int64 dsize2; > if (known_size_p (size1) --- should be unknown?? > && poly_int_tree_p (DECL_SIZE (base2), &dsize2) > && known_lt (dsize2, size1)) > return false; >=20 > Should we set MEM_SIZE_KNOWN_P to false for maskstore/maskload? > It seems to me maxsize should be 64bytes, but real size should be unknown. Yes, you shouldn't have MEM_ATTRs that indicate the size is known.=