public inbox for gcc-bugs@sourceware.org help / color / mirror / Atom feed
From: "rguenth at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org> To: gcc-bugs@gcc.gnu.org Subject: [Bug tree-optimization/114635] OpenMP reductions fail dependency analysis Date: Mon, 08 Apr 2024 12:19:21 +0000 [thread overview] Message-ID: <bug-114635-4-TfHpP0lXHZ@http.gcc.gnu.org/bugzilla/> (raw) In-Reply-To: <bug-114635-4@http.gcc.gnu.org/bugzilla/> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114635 Richard Biener <rguenth at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Keywords| |openmp Blocks| |53947 CC| |rguenth at gcc dot gnu.org, | |rsandifo at gcc dot gnu.org --- Comment #2 from Richard Biener <rguenth at gcc dot gnu.org> --- We have (compute_affine_dependence ref_a: D.5604[_33], stmt_a: _65 = D.5604[_33]; ref_b: D.5604[_33], stmt_b: D.5604[_33] = _ifc__144; ) -> dependence analysis failed but of course safelen should apply here, but we likely hit if (max_vf != MAX_VECTORIZATION_FACTOR && maybe_lt (max_vf, min_vf)) return opt_result::failure_at (vect_location, "bad data dependence.\n"); we have max_vf == 16 but min_vf is {4, 4} with E_VNx4SFmode. Maybe safelen (and thus max_vf) needs to be poly-int? Maybe somehow safelen needs to be ensured by additional masking with SVE? Referenced Bugs: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53947 [Bug 53947] [meta-bug] vectorizer missed-optimizations
next prev parent reply other threads:[~2024-04-08 12:19 UTC|newest] Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top 2024-04-08 9:58 [Bug tree-optimization/114635] New: " tnfchris at gcc dot gnu.org 2024-04-08 12:02 ` [Bug tree-optimization/114635] " rguenth at gcc dot gnu.org 2024-04-08 12:19 ` rguenth at gcc dot gnu.org [this message] 2024-04-08 12:26 ` rguenth at gcc dot gnu.org 2024-04-08 12:32 ` jakub at gcc dot gnu.org 2024-04-08 12:35 ` jakub at gcc dot gnu.org 2024-04-08 14:55 ` tnfchris at gcc dot gnu.org 2024-04-08 15:36 ` rguenther at suse dot de 2024-04-10 6:53 ` kugan at gcc dot gnu.org 2024-04-15 7:44 ` kugan at gcc dot gnu.org 2024-04-15 7:45 ` kugan at gcc dot gnu.org 2024-04-15 7:49 ` jakub at gcc dot gnu.org 2024-04-15 7:57 ` kugan at gcc dot gnu.org 2024-04-15 8:00 ` jakub at gcc dot gnu.org 2024-04-15 8:06 ` rguenth at gcc dot gnu.org 2024-04-15 8:08 ` rguenther at suse dot de 2024-04-15 8:14 ` jakub at gcc dot gnu.org 2024-04-15 8:18 ` rguenther at suse dot de 2024-04-15 9:06 ` kugan at gcc dot gnu.org 2024-05-14 15:24 ` rsandifo at gcc dot gnu.org
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=bug-114635-4-TfHpP0lXHZ@http.gcc.gnu.org/bugzilla/ \ --to=gcc-bugzilla@gcc.gnu.org \ --cc=gcc-bugs@gcc.gnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).