From patchwork Mon May 27 05:06:15 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tejas Belagod X-Patchwork-Id: 1939603 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=nj+tXAEP; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=nj+tXAEP; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VnkCr0Hb3z20Pq for ; Mon, 27 May 2024 15:07:19 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 3BEEA3858CD9 for ; Mon, 27 May 2024 05:07:18 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on2055.outbound.protection.outlook.com [40.107.104.55]) by sourceware.org (Postfix) with ESMTPS id DAA943858D28 for ; Mon, 27 May 2024 05:06:50 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org DAA943858D28 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org DAA943858D28 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.104.55 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1716786413; cv=pass; b=mKgRu7xOlwpPOguWuWemNDNt0cLIytriqTNHx+ZRhfDSc5gd7AF35CGhacu0z7CrxbmuKN06Yr/TL4By0NWO9Xl6DYKQoW7TrLQr5GLrTpQbzc8eqWQElH0cu30AtD0tlQF3mgtyZ2jhZghntsgA1otYYtx0s7shDKhEHnfI+Y0= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1716786413; c=relaxed/simple; bh=T2Qg5niYfzKEIreMdDLfutqRDCPQDCFfi31PkjKZPOE=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=O8Oy5cTYGPMNXcnzp4llXDCJI1VfcXdyzusLYPdJcbitOLoCzS6xLlU7wiBBKm3n2zlARHpngIp4mmnNLKW+k1hBmVt8/Oz6KGba1zrgMunnCS6/tEK3YhPYJf1zDv0nMAAmp0wM6Zrk49fWTilyc6SXbVMjVFjL1NmOVzjE89A= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=EgnQnZ9Xe88yS46P6wJ67dLeDhFoj/1ImERMK29bZvgfn8YwKmCJjKhIZyOqyPOj5mpxR1Bis2LrhsZA/knOjUsolwf3W+ueDfnX8I6Vd6IvU9dheM1nGgZujnevAo155xsx4SICZpVDDnQ+8HuJug31+zVGg+/ZYaCkuOYVIkWjsK5N3RqSHtgLUxT81jlXp5z9eq0i1FVuae1sbeNN00gjoCNeqD60G8C9M/xU5cLJ24Lo0fzV6iGtGSVoAt6Wv5A63DsgfPX8SXXhGXb18bjjghkQ0gZRjifSOCgz8kefjPHNsBLytj2leipotR/OfiYRFdn3Oy9X5IbuSZVZ9Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6D8m0R00fdnlF464TiIIgh4INb+Zyf52V6S7zonzpa8=; b=L0TYbIxdu48R+uXtwE1RRWTHcfEj+uwHkSoO/pzGYoBBaLUBuKPmInDFN5iqbgQ+qe2yeEq7reXUWZbNb+uTB3HhD+JOAnGp4r1JVoh+/8mvF1DnzUmeebvHUkzSOeVDwRlhEY5tH9SkxK03msvnXL0cKYK7eFq+QmgHNiPhWZy9PgDY9cF3nH3wPxAaaD1ZqI+Bo7hkWR4ZMOfMb7zkd7Tqk1bHYOhnkCNXqurfRk8iKXkzm6ulAV6lsJbX5KaA7oMgbkkGj0Qu8gDZZ3dw6oQkkFxkHBNTMq654PxyGXJ2SRHlsuLQwUoO1DngEZYEQSeCtcUwK87h9R+7Lv73og== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6D8m0R00fdnlF464TiIIgh4INb+Zyf52V6S7zonzpa8=; b=nj+tXAEPeP09OakslEy9eBSwsz4+6+Q36gQ9X8+OumkoCeA3YiX/vVFxelfTJVPaGS5vTPyRT2iEWjClL1hW11s7JvnLrFv6+e+16Wr38yBvJnTPh+WUbWi5JAFJ7OZe/KFskCSGj4PpsmANBu5LZU/R4ClEoPrD7hCH2qvvkpU= Received: from AS8PR04CA0173.eurprd04.prod.outlook.com (2603:10a6:20b:331::28) by AS8PR08MB10169.eurprd08.prod.outlook.com (2603:10a6:20b:63d::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7611.29; Mon, 27 May 2024 05:06:46 +0000 Received: from AMS0EPF000001B1.eurprd05.prod.outlook.com (2603:10a6:20b:331:cafe::b6) by AS8PR04CA0173.outlook.office365.com (2603:10a6:20b:331::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7611.29 via Frontend Transport; Mon, 27 May 2024 05:06:46 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001B1.mail.protection.outlook.com (10.167.16.165) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7633.15 via Frontend Transport; Mon, 27 May 2024 05:06:46 +0000 Received: ("Tessian outbound 57d5075de207:v327"); Mon, 27 May 2024 05:06:46 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 587dc35646eae9e2 X-CR-MTA-TID: 64aa7808 Received: from e0edb3172d17.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id A94DDD86-D57B-401B-9F21-A8503DF4AFC5.1; Mon, 27 May 2024 05:06:40 +0000 Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e0edb3172d17.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 27 May 2024 05:06:40 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=T88AEdQTsm7yqZDDouJcgqakoBxaTZQRWJVLmR93NFCOaCwXKkD3vTVC82hmVvcTfJJCn6iH+CE+2DjoQba07UiQDWsOxh1fBi1d33OIz0dy6aftV+rRNUsIM+o1UIcRXEqBNdOZDLvs6MbfgBvRGyH/ovE37xyLn/1s41APt+tdBurp0GBpAfmnA+nIw4C2BfoAO/CNvSCps4x9a8YWpytK7fAodXFyqd2+8ooNy5TmUkqc6BleZRoEW8sI9Eo43kxfgMjDwyD6uE/YWjbYFfBcTOq8CXvPhdjMw+h/tEWUdMLLiHxyWvNmOtKK6jfCy2h3HqXlCw1QQQj83kWtIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6D8m0R00fdnlF464TiIIgh4INb+Zyf52V6S7zonzpa8=; b=TvXKUZxePt7Mu/K7EMVzlWGbTN8DPuRyCIEnMtp6c3axwfqeJ39Dz7KWVUnBaAH3fsJaORWTlzAYGogZyx8OggXQBz9thJYd/GI7cRXbCfFHygWOMcSe5GDi1aujdCzOfyS6/61Uv60WLdoofkLcC7UztsVFv6syTU0IezYqRMUKlx0IbswvP+M8sVpvkFcryFTAeAftEFOwuVN8WKcj2QqsWY9rRW7pDvYk34V6VBZamM8vxwG/4NzDeFmfUHJT1YUT5iN0EE4+5uwhf3UNptlK28Sno4VZfpQyXJAO+Smil2M6jsN0cIL7NcbcErZp06v8OuFgfqtc+d2pXWwqkg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6D8m0R00fdnlF464TiIIgh4INb+Zyf52V6S7zonzpa8=; b=nj+tXAEPeP09OakslEy9eBSwsz4+6+Q36gQ9X8+OumkoCeA3YiX/vVFxelfTJVPaGS5vTPyRT2iEWjClL1hW11s7JvnLrFv6+e+16Wr38yBvJnTPh+WUbWi5JAFJ7OZe/KFskCSGj4PpsmANBu5LZU/R4ClEoPrD7hCH2qvvkpU= Received: from DU2PR04CA0034.eurprd04.prod.outlook.com (2603:10a6:10:234::9) by GV2PR08MB9231.eurprd08.prod.outlook.com (2603:10a6:150:d3::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7611.29; Mon, 27 May 2024 05:06:36 +0000 Received: from DU6PEPF00009527.eurprd02.prod.outlook.com (2603:10a6:10:234:cafe::d8) by DU2PR04CA0034.outlook.office365.com (2603:10a6:10:234::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7611.29 via Frontend Transport; Mon, 27 May 2024 05:06:36 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DU6PEPF00009527.mail.protection.outlook.com (10.167.8.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7633.15 via Frontend Transport; Mon, 27 May 2024 05:06:36 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Mon, 27 May 2024 05:06:35 +0000 Received: from a078660.blr.arm.com (10.162.46.14) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.35 via Frontend Transport; Mon, 27 May 2024 05:06:34 +0000 From: Tejas Belagod To: CC: Tejas Belagod , , Subject: [PATCH 00/11] AArch64/OpenMP: Test SVE ACLE types with various OpenMP constructs. Date: Mon, 27 May 2024 10:36:15 +0530 Message-ID: <20240527050626.3769230-1-tejas.belagod@arm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DU6PEPF00009527:EE_|GV2PR08MB9231:EE_|AMS0EPF000001B1:EE_|AS8PR08MB10169:EE_ X-MS-Office365-Filtering-Correlation-Id: d60a7edb-c37f-4624-5f4d-08dc7e0aced8 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230031|82310400017|1800799015|36860700004|376005; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(82310400017)(1800799015)(36860700004)(376005); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV2PR08MB9231 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001B1.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 93750f73-46b0-4228-5309-08dc7e0ac8bc X-Microsoft-Antispam: BCL:0; ARA:13230031|376005|36860700004|1800799015|35042699013|82310400017; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(376005)(36860700004)(1800799015)(35042699013)(82310400017); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 May 2024 05:06:46.4202 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d60a7edb-c37f-4624-5f4d-08dc7e0aced8 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001B1.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB10169 X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, KAM_SHORT, RCVD_IN_MSPIKE_H2, SPF_HELO_NONE, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org Note: This patch series is based on Richard's initial patch https://gcc.gnu.org/pipermail/gcc-patches/2022-November/606741.html and Jakub's suggestion https://gcc.gnu.org/pipermail/gcc-patches/2023-February/611892.html The following patch series handles various scenarios with OpenMP and SVE types. The starting point for the series follows a suggestion from Jakub to cover all the possible scenarios that could arise when OMP constructs/clauses etc are used with SVE ACLE types. Here are a few instances that this patch series tests and in some cases fixes the expected output. This patch series does not follow a formal definition or a spec of how OMP interacts with SVE ACLE types, so it's more of a proposed behaviour. Comments and discussion welcome. This list is not exhaustive, but covers most scenarios of how SVE ACLE types ought to interact with OMP constructs/clauses. 1. Poly-int structures that represent variable-sized objects and OMP runtime. Currently poly-int type structures are passed by value to OpenMP runtime functions for shared clauses etc. This patch improves on this by passing around poly-int structures by address to avoid copy-overhead. 2. SVE ACLE types in OMP Shared clauses. We test the behaviour where SVE ACLE type objects are shared in the following methods into an OMP region: a. Explicit Shared clause on SVE ACLE type objects. b. Implicit shared clause. c. Implicit shared with default clause. d. SVE ALCE types in the presence of predetermined (static) shared objects. The associated tests ensure that all such shared objects are passed by address into the OMP runtime. There are runtime tests to verify the functional correctness of the change. 3. Offloading and SVE ACLE types. The target clause in OpenMP is used to offload loop kernels to accelerator peripeherals. target's 'map' clause is used to move data from and to the accelarator. When the data is SVE type, it may not be suitable because of various reasons i.e. the two SVE targets may not agree on vector size or some targets don't support variable vector size. This makes SVE unsuitable for use in OMP's 'map' clause. We diagnose all such cases and issue errors where appropriate. The cases we cover in this patch are: a. Implicitly-mapped SVE ACLE types in OMP target regions are diagnosed. b. Explicitly-mapped SVE ACLE types in OMP target regions using map clause are diagnosed. c. Explicilty-mapped SVLE ACLE types of various directions - to, from, tofrom in the map clause are diagnosed. d. target enter and exit data clauses with map on SVE ACLE types are diagnosed. e. target data map with alloc on SVE ACLE types are diagnosed. f. target update from clause on SVE ACLE types are diagnosed. g. target private firstprivate with SVE ACLE types are diagnosed. h. All combinations of target with work-sharing constructs like parallel, loop, simd, teams, distribute etc are also diagnosed when SVE ACLE types are involved. 3. Lastprivate and SVE ACLE types. Various OpenMP lastprivate clause scenarios with SVE object types are diagnosed. Worksharing constructs like sections, for, distribute bind to an implicit outer parallel region in whose scope SVE ACLE types are declared and are therefore default private. The lastprivate clause list with SVE ACLE type object items are diagnosed in this scenario. 4. Threadprivate on SVE ACLE type objects. We ensure threadprivate SVE ACLE type objects are supported. We also ensure copyin clause is also supported. 5. User-Defined Reductions on SVE ACLE types. We define a reduction using OMP declare reduction using SVE ACLE intrinsics and ensure its functional correctness with various work-sharing constructs like for, simd, parallel, task, taskloop. 6. Uniform and Aligned Clause with SVE ACLE We ensure the uniform clause's functional correctness with simd construct and associated SVE ACLE intrinsics in the simd region. There is no direct interaction between uniform and SVE ACLE type objects, but we ensure the uniform clause applies correctly to a region where SVE ACLE intrinsics are present. Similarly for the aligned clause. 7. Linear clause and SVE ACLE type. We diagnose if a linear clause list item has SVE ACLE type objects present. Its doesn't mean much if the linear clause is applied to SVE ACLE types. 8. Depend clause and SVE ACLE objects. We test for functional correctness many combinations of dependency of shared SVE ACLE type objects in parallel regions. We test if in, out dependencies and anti-dependencies are supported for SVE ACLE type objects using the depend clause with work-sharing constructs like task. 9. 'doacross' clause and SVE ACLE object types. doacross is mainly supported for scalars and loop iteration variables. We diagnose cases where SVE ACLE objects are used in doacross list items. Tejas Belagod (11): OpenMP/PolyInt: Pass poly-int structures by address to OMP libs. AArch64: Add test cases for SVE types in OpenMP shared clause. AArch64: Diagnose OpenMP offloading when SVE types involved. AArch64: Test OpenMP lastprivate clause for various constructs. AArch64: Test OpenMP threadprivate clause on SVE type. AArch64: Test OpenMP user-defined reductions with SVE types. AArch64: Test OpenMP uniform clause on SVE types. AArch64: Test OpenMP simd aligned clause with SVE types. AArch64: Diagnose OpenMP linear clause for SVE type objects. AArch64: Test OpenMP depend clause and its variations on SVE types AArch64: Diagnose SVE type objects when applied to OpenMP doacross clause. gcc/config/aarch64/aarch64-sve-builtins.cc | 31 +++ gcc/gimplify.cc | 34 ++- gcc/omp-low.cc | 3 +- gcc/target.h | 19 +- .../aarch64/sve/omp/aarch64-sve-omp.exp | 80 ++++++ .../gcc.target/aarch64/sve/omp/depend-1.c | 223 ++++++++++++++++ .../gcc.target/aarch64/sve/omp/doacross.c | 22 ++ .../gcc.target/aarch64/sve/omp/lastprivate.c | 121 +++++++++ .../gcc.target/aarch64/sve/omp/linear.c | 33 +++ .../gcc.target/aarch64/sve/omp/offload-1.c | 237 ++++++++++++++++++ .../gcc.target/aarch64/sve/omp/offload-2.c | 198 +++++++++++++++ .../aarch64/sve/omp/offload-parallel-loop.c | 236 +++++++++++++++++ .../aarch64/sve/omp/offload-parallel.c | 195 ++++++++++++++ .../gcc.target/aarch64/sve/omp/offload-simd.c | 236 +++++++++++++++++ .../sve/omp/offload-teams-distribute-simd.c | 237 ++++++++++++++++++ .../sve/omp/offload-teams-distribute.c | 236 +++++++++++++++++ .../aarch64/sve/omp/offload-teams-loop.c | 237 ++++++++++++++++++ .../aarch64/sve/omp/offload-teams.c | 195 ++++++++++++++ .../gcc.target/aarch64/sve/omp/shared.c | 186 ++++++++++++++ .../gcc.target/aarch64/sve/omp/simd-aligned.c | 50 ++++ .../gcc.target/aarch64/sve/omp/simd-uniform.c | 71 ++++++ .../aarch64/sve/omp/target-device.c | 97 +++++++ .../gcc.target/aarch64/sve/omp/target-link.c | 48 ++++ .../aarch64/sve/omp/threadprivate.c | 44 ++++ .../gcc.target/aarch64/sve/omp/udr-sve.c | 166 ++++++++++++ 25 files changed, 3232 insertions(+), 3 deletions(-) create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/aarch64-sve-omp.exp create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/depend-1.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/doacross.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/lastprivate.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/linear.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-1.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-2.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-parallel-loop.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-parallel.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-simd.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-teams-distribute-simd.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-teams-distribute.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-teams-loop.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/offload-teams.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/shared.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/simd-aligned.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/simd-uniform.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/target-device.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/target-link.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/threadprivate.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/omp/udr-sve.c