From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 29927 invoked by alias); 31 Jan 2017 09:05:46 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 29906 invoked by uid 89); 31 Jan 2017 09:05:45 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.9 required=5.0 tests=BAYES_00,KAM_LAZY_DOMAIN_SECURITY,RP_MATCHES_RCVD autolearn=no version=3.3.2 spammy=lyon, Lyon, H*f:sk:CAKdteO, H*MI:sk:v4sDQ@m X-HELO: foss.arm.com Received: from foss.arm.com (HELO foss.arm.com) (217.140.101.70) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 31 Jan 2017 09:05:37 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6BECA14F6; Tue, 31 Jan 2017 01:05:35 -0800 (PST) Received: from [10.2.207.77] (e100706-lin.cambridge.arm.com [10.2.207.77]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CF1483F242; Tue, 31 Jan 2017 01:05:34 -0800 (PST) Message-ID: <5890535D.3050705@foss.arm.com> Date: Tue, 31 Jan 2017 09:15:00 -0000 From: Kyrill Tkachov User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0 MIME-Version: 1.0 To: Christophe Lyon , Vladimir Makarov CC: "gcc-patches@gcc.gnu.org" Subject: Re: Patch to fix PR79131 References: <49091620-2b61-fe51-d00f-f8e567bb5f62@redhat.com> In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-SW-Source: 2017-01/txt/msg02375.txt.bz2 Hi Christophe, On 30/01/17 20:59, Christophe Lyon wrote: > Hi Vladimir, > > On 26 January 2017 at 18:09, Vladimir Makarov wrote: >> The following patch fixes >> >> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=79131 >> >> The patch also adapts IP IRA in LRA because without it GCC IP RA tests >> become broken (it was just a luck that the tests worked before the patch). >> >> The patch was successfully bootstrapped and tested on x86-64. >> >> Committed as rev. 244942. >> >> > After this patch, I've noticed regressions on arm: > FAIL: gcc.target/arm/neon-for-64bits-1.c scan-assembler-times vshr 0 > Your follow-up patch didn't fix this. > There are now 6 vshr instructions generated. > > Can you check ? I've opened PR 79282. I think it may be an issue exposed by Vladimir's patch. Kyrill > Thanks, > Christophe