Hi Hongtao,

on 2021/10/14 下午3:11, liuhongt wrote:
> Hi Kewen:
>   Cound you help to verify if this patch fix those regressions
> for rs6000 port.
> 

The ppc64le run just finished, there are still some regresssions:

NA->XPASS: c-c++-common/Wstringop-overflow-2.c  -Wc++-compat   (test for 
warnings, line 194)
NA->XPASS: c-c++-common/Wstringop-overflow-2.c  -Wc++-compat   (test for 
warnings, line 212)
NA->XPASS: c-c++-common/Wstringop-overflow-2.c  -Wc++-compat   (test for 
warnings, line 296)
NA->XPASS: c-c++-common/Wstringop-overflow-2.c  -Wc++-compat   (test for 
warnings, line 314)
NA->FAIL: gcc.dg/Wstringop-overflow-21-novec.c (test for excess errors)
NA->FAIL: gcc.dg/Wstringop-overflow-21-novec.c  (test for warnings, line 18)
NA->FAIL: gcc.dg/Wstringop-overflow-21-novec.c  (test for warnings, line 29)
NA->FAIL: gcc.dg/Wstringop-overflow-21-novec.c  (test for warnings, line 45)
NA->FAIL: gcc.dg/Wstringop-overflow-21-novec.c  (test for warnings, line 55)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c note (test for warnings, line 
104)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c note (test for warnings, line 
137)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c note (test for warnings, line 19)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c note (test for warnings, line 39)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c note (test for warnings, line 56)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c note (test for warnings, line 70)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c (test for excess errors)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 116)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 131)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 146)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 33)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 50)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 64)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 78)
NA->FAIL: gcc.dg/Wstringop-overflow-76-novec.c  (test for warnings, line 97)
PASS->FAIL: c-c++-common/Wstringop-overflow-2.c  -std=gnu++14 (test for excess 
errors)
NA->FAIL: c-c++-common/Wstringop-overflow-2.c  -std=gnu++14  (test for 
warnings, line 229)
NA->FAIL: c-c++-common/Wstringop-overflow-2.c  -std=gnu++14  (test for 
warnings, line 230)
NA->FAIL: c-c++-common/Wstringop-overflow-2.c  -std=gnu++14  (test for 
warnings, line 331)
NA->FAIL: c-c++-common/Wstringop-overflow-2.c  -std=gnu++14  (test for 
warnings, line 332)
// omitting -std=gnu++17, -std=gnu++2a, -std=gnu++98

I'll have a look and get back to you tomorrow.

BR,
Kewen

> As discussed in [1], this patch add xfail/target selector to those
> testcases, also make a copy of them so that they can be tested w/o
> vectorization.
> 
> Newly added xfail/target selectors are used to check the vectorization
> capability of continuous byte/double bytes storage, these scenarios
> are exactly the part of the testcases that regressed after O2
> vectorization.
> 
> [1] https://gcc.gnu.org/pipermail/gcc-patches/2021-October/581456.html.
> 
> gcc/testsuite/ChangeLog
> 
>       PR middle-end/102722
>       PR middle-end/102697
>       PR middle-end/102462
>       PR middle-end/102706
>       * c-c++-common/Wstringop-overflow-2.c: Adjust testcase with new
>       xfail/target selector.
>       * gcc.dg/Warray-bounds-51.c: Ditto.
>       * gcc.dg/Warray-parameter-3.c: Ditto.
>       * gcc.dg/Wstringop-overflow-14.c: Ditto.
>       * gcc.dg/Wstringop-overflow-21.c: Ditto.
>       * gcc.dg/Wstringop-overflow-68.c: Ditto.
>       * gcc.dg/Wstringop-overflow-76.c: Ditto.
>       * gcc.dg/Warray-bounds-48.c: Ditto.
>       * lib/target-supports.exp (check_vect_slp_vnqihi_store_usage):
>       New function.
>       (check_effective_target_vect_slp_v2qi_store): Ditto.
>       (check_effective_target_vect_slp_v4qi_store): Ditto.
>       (check_effective_target_vect_slp_v8qi_store): Ditto.
>       (check_effective_target_vect_slp_v16qi_store): Ditto.
>       (check_effective_target_vect_slp_v2hi_store): Ditto.
>       (check_effective_target_vect_slp_v4hi_store): Ditto.
>       * c-c++-common/Wstringop-overflow-2-novec.c: New test.
>       * gcc.dg/Warray-bounds-51-novec.c: New test.
>       * gcc.dg/Warray-bounds-48-novec.c: New test.
>       * gcc.dg/Warray-parameter-3-novec.c: New test.
>       * gcc.dg/Wstringop-overflow-14-novec.c: New test.
>       * gcc.dg/Wstringop-overflow-21-novec.c: New test.
>       * gcc.dg/Wstringop-overflow-76-novec.c: New test.
> ---
>  .../c-c++-common/Wstringop-overflow-2-novec.c | 348 +++++++++++++++++
>  .../c-c++-common/Wstringop-overflow-2.c       |  26 +-
>  gcc/testsuite/gcc.dg/Warray-bounds-48-novec.c | 364 ++++++++++++++++++
>  gcc/testsuite/gcc.dg/Warray-bounds-48.c       |   6 +-
>  gcc/testsuite/gcc.dg/Warray-bounds-51-novec.c |  61 +++
>  gcc/testsuite/gcc.dg/Warray-bounds-51.c       |   3 +-
>  .../gcc.dg/Warray-parameter-3-novec.c         |  89 +++++
>  gcc/testsuite/gcc.dg/Warray-parameter-3.c     |   3 +-
>  .../gcc.dg/Wstringop-overflow-14-novec.c      |  56 +++
>  gcc/testsuite/gcc.dg/Wstringop-overflow-14.c  |   5 +-
>  .../gcc.dg/Wstringop-overflow-21-novec.c      |  59 +++
>  gcc/testsuite/gcc.dg/Wstringop-overflow-21.c  |  10 +-
>  gcc/testsuite/gcc.dg/Wstringop-overflow-68.c  |  17 +-
>  .../gcc.dg/Wstringop-overflow-76-novec.c      | 147 +++++++
>  gcc/testsuite/gcc.dg/Wstringop-overflow-76.c  |  26 +-
>  gcc/testsuite/lib/target-supports.exp         | 129 +++++++
>  16 files changed, 1314 insertions(+), 35 deletions(-)
>  create mode 100644 gcc/testsuite/c-c++-common/Wstringop-overflow-2-novec.c
>  create mode 100644 gcc/testsuite/gcc.dg/Warray-bounds-48-novec.c
>  create mode 100644 gcc/testsuite/gcc.dg/Warray-bounds-51-novec.c
>  create mode 100644 gcc/testsuite/gcc.dg/Warray-parameter-3-novec.c
>  create mode 100644 gcc/testsuite/gcc.dg/Wstringop-overflow-14-novec.c
>  create mode 100644 gcc/testsuite/gcc.dg/Wstringop-overflow-21-novec.c
>  create mode 100644 gcc/testsuite/gcc.dg/Wstringop-overflow-76-novec.c
> 
> diff --git a/gcc/testsuite/c-c++-common/Wstringop-overflow-2-novec.c 
> b/gcc/testsuite/c-c++-common/Wstringop-overflow-2-novec.c
> new file mode 100644
> index 00000000000..89e6a5c12c2
> --- /dev/null
> +++ b/gcc/testsuite/c-c++-common/Wstringop-overflow-2-novec.c
> @@ -0,0 +1,348 @@
> +/* PR middle-end/91458 - inconsistent warning for writing past the end
> +   of an array member
> +   { dg-do compile }
> +   { dg-options "-O2 -fno-tree-vectorize -Wall -Wno-array-bounds 
> -fno-ipa-icf" } */
> +
> +void sink (void*);
> +
> +// Exercise flexible array members.
> +
> +struct Ax
> +{
> +  char n;
> +  char a[];                     // { dg-message "destination object" "note" }
> +};
> +
> +// Verify warning for a definition with no initializer.
> +struct Ax ax_;
> +
> +void gax_ (void)
> +{
> +  ax_.a[0] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax_.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax_.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// Verify warning for access to a definition with an initializer that doesn't
> +// initialize the flexible array member.
> +struct Ax ax0 = { 0 };
> +
> +void gax0 (void)
> +{
> +  ax0.a[0] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax0.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax0.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// Verify warning for access to a definition with an initializer that
> +// initializes the flexible array member to empty.
> +struct Ax ax0_ = { 0, { } };
> +
> +void gax0_ (void)
> +{
> +  ax0_.a[0] = 0;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax0_.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax0_.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// Verify warning for out-of-bounds accesses to a definition with
> +// an initializer.
> +struct Ax ax1 = { 1, { 0 } };
> +
> +void gax1 (void)
> +{
> +  ax1.a[0] = 0;
> +  ax1.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  ax1.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +struct Ax ax2 = { 2, { 1, 0 } };
> +
> +void gax2 (void)
> +{
> +  ax2.a[0] = 0;
> +  ax2.a[1] = 1;
> +  ax2.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +
> +// Verify no warning for an unknown struct object.
> +void gaxp (struct Ax *p)
> +{
> +  p->a[0] = 0;
> +  p->a[3] = 3;
> +  p->a[9] = 9;
> +}
> +
> +
> +// Verify no warning for an extern struct object whose array may be
> +// initialized to any number of elements.
> +extern struct Ax axx;
> +
> +void gaxx (void)
> +{
> +  axx.a[0] = 0;
> +  axx.a[3] = 3;
> +  axx.a[9] = 9;
> +}
> +
> +// Exercise zero-length array members.
> +
> +struct A0
> +{
> +  char n;
> +  char a[0];                    // { dg-message "destination object" "note" }
> +};
> +
> +// Verify warning for a definition with no initializer.
> +struct A0 a0_;
> +
> +void ga0_ (void)
> +{
> +  a0_.a[0] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a0_.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a0_.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// Verify warning for access to a definition with an initializer that doesn't
> +// initialize the flexible array member.
> +struct A0 a00 = { 0 };
> +
> +void ga00 (void)
> +{
> +  a00.a[0] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a00.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a00.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// Verify warning for access to a definition with an initializer that
> +// initializes the flexible array member to empty.
> +struct A0 a00_ = { 0, { } };
> +
> +void ga00_ (void)
> +{
> +  a00_.a[0] = 0;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  a00_.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  a00_.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// The following are rejected with
> +//   error: too many initializers for 'char [0]'
> +// A0 a01 = { 1, { 0 } };
> +// A0 a02 = { 2, { 1, 0 } };
> +
> +
> +// Verify no warning for an unknown struct object.
> +void ga0p (struct A0 *p)
> +{
> +  p->a[0] = 0;
> +  p->a[3] = 3;
> +  p->a[9] = 9;
> +}
> +
> +
> +// Verify warning for an extern struct object which (unlike a true
> +// flexible array member) may not be initialized.
> +extern struct A0 a0x;
> +
> +void ga0x (void)
> +{
> +  a0x.a[0] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a0x.a[3] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a0x.a[9] = 0;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +
> +// Exercise trailing one-element array members.
> +
> +struct A1
> +{
> +  char n;
> +  char a[1];                    // { dg-message "destination object" "note" }
> +};
> +
> +// Verify warning for a definition with no initializer.
> +struct A1 a1_;
> +
> +void ga1_ (void)
> +{
> +  a1_.a[0] = 0;
> +  a1_.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1_.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1 a;
> +  a.a[0] = 0;
> +  a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +// Verify warning for access to a definition with an initializer that doesn't
> +// initialize the one-element array member.
> +struct A1 a1__ = { 0 };
> +
> +void ga1__ (void)
> +{
> +  a1__.a[0] = 0;
> +  a1__.a[1] = 1;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1__.a[2] = 2;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1 a = { 1 };
> +  a.a[0] = 0;
> +  a.a[1] = 1;                    // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 2;                    // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +// Verify warning for access to a definition with an initializer that
> +// initializes the one-element array member to empty.
> +struct A1 a1_0 = { 0, { } };
> +
> +void ga1_0_ (void)
> +{
> +  a1_0.a[0] = 0;
> +  a1_0.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1_0.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1 a = { 1, { } };
> +  a.a[0] = 0;
> +  a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +// Verify warning for access to a definition with an initializer that
> +// initializes the one-element array member.
> +struct A1 a1_1 = { 0, { 1 } };
> +
> +void ga1_1 (void)
> +{
> +  a1_1.a[0] = 0;
> +  a1_1.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1_1.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1 a = { 0, { 1 } };
> +  a.a[0] = 0;
> +  a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +
> +// Verify no warning for an unknown struct object.
> +void ga1p (struct A1 *p)
> +{
> +  p->a[0] = 0;
> +  p->a[3] = 3;
> +  p->a[9] = 9;
> +}
> +
> +
> +// Verify warning for an extern struct object.  Similar to the zero-length
> +// array case, a one-element trailing array can be initialized to at most
> +// a single element.
> +extern struct A1 a1x;
> +
> +void ga1x (void)
> +{
> +  a1x.a[0] = 0;
> +  a1x.a[3] = 3;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1x.a[9] = 9;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +// Exercise interior one-element array members (verify they're not
> +// treated as trailing.
> +
> +struct A1i
> +{
> +  char n;
> +  char a[1];                    // { dg-message "destination object" }
> +  char x;
> +};
> +
> +// Verify warning for a definition with no initializer.
> +struct A1i a1i_;
> +
> +void ga1i_ (void)
> +{
> +  a1i_.a[0] = 0;
> +  a1i_.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1i_.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1i a;
> +  a.a[0] = 1;
> +  a.a[1] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 3;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +// Verify warning for access to a definition with an initializer that doesn't
> +// initialize the one-element array member.
> +struct A1i a1i__ = { 0 };
> +
> +void ga1i__ (void)
> +{
> +  a1i__.a[0] = 0;
> +  a1i__.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1i__.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1i a = { 0 };
> +  a.a[0] = 0;
> +  a.a[1] = 1;                    // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 2;                    // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +// Verify warning for access to a definition with an initializer that
> +// initializes the one-element array member to empty.
> +struct A1 a1i_0 = { 0, { } };
> +
> +void ga1i_0_ (void)
> +{
> +  a1i_0.a[0] = 0;
> +  a1i_0.a[1] = 1;               // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1i_0.a[2] = 2;               // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1 a = { 0, { } };
> +  a.a[0] = 0;
> +  a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +// Verify warning for access to a definition with an initializer that
> +// initializes the one-element array member.
> +struct A1 a1i_1 = { 0, { 1 } };
> +
> +void ga1i_1 (void)
> +{
> +  a1i_1.a[0] = 0;
> +  a1i_1.a[1] = 1;               // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1i_1.a[2] = 2;               // { dg-warning "\\\[-Wstringop-overflow" }
> +
> +  struct A1 a = { 0, { 1 } };
> +  a.a[0] = 1;
> +  a.a[1] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  a.a[2] = 3;                   // { dg-warning "\\\[-Wstringop-overflow" }
> +  sink (&a);
> +}
> +
> +
> +// Verify no warning for an unknown struct object.
> +void ga1ip (struct A1i *p)
> +{
> +  p->a[0] = 0;
> +  p->a[3] = 3;                  // { dg-warning "\\\[-Wstringop-overflow" }
> +  p->a[9] = 9;                  // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> +
> +
> +// Verify no warning for an extern struct object.
> +extern struct A1i a1ix;
> +
> +void ga1ix (void)
> +{
> +  a1ix.a[0] = 0;
> +  a1ix.a[3] = 3;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +  a1ix.a[9] = 9;                 // { dg-warning "\\\[-Wstringop-overflow" }
> +}
> diff --git a/gcc/testsuite/c-c++-common/Wstringop-overflow-2.c 
> b/gcc/testsuite/c-c++-common/Wstringop-overflow-2.c
> index 7d29b5f48c7..cb687c69324 100644
> --- a/gcc/testsuite/c-c++-common/Wstringop-overflow-2.c
> +++ b/gcc/testsuite/c-c++-common/Wstringop-overflow-2.c
> @@ -189,8 +189,9 @@ void ga1__ (void)
>  
>    struct A1 a = { 1 };
>    a.a[0] = 0;
> +  // O2 vectorization regress Wstringop-overflow case (1), refer to pr102462.
>    a.a[1] = 1;                    // { dg-warning "\\\[-Wstringop-overflow" }
> -  a.a[2] = 2;                    // { dg-warning "\\\[-Wstringop-overflow" 
> "" { xfail { i?86-*-* x86_64-*-* } } }
> +  a.a[2] = 2;                    // { dg-warning "\\\[-Wstringop-overflow" 
> "" { xfail { vect_slp_v2qi_store } } }
>    sink (&a);
>  }
>  
> @@ -206,8 +207,9 @@ void ga1_0_ (void)
>  
>    struct A1 a = { 1, { } };
>    a.a[0] = 0;
> +  // O2 vectorization regress Wstringop-overflow case (1), refer to PR102462.
>    a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" }
> -  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { i?86-*-* x86_64-*-* } } }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { vect_slp_v2qi_store } } }
>    sink (&a);
>  }
>  
> @@ -221,10 +223,11 @@ void ga1_1 (void)
>    a1_1.a[1] = 1;                // { dg-warning "\\\[-Wstringop-overflow" }
>    a1_1.a[2] = 2;                // { dg-warning "\\\[-Wstringop-overflow" }
>  
> -  struct A1 a = { 0, { 1 } };   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { i?86-*-* x86_64-*-* } } }
> +// O2 vectorization regress Wstringop-overflow case (2), refer to PR102706
> +  struct A1 a = { 0, { 1 } };   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { vect_slp_v4qi_store } } }
>    a.a[0] = 0;
> -  a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { i?86-*-* x86_64-*-* } } }
> -  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { i?86-*-* x86_64-*-* } } }
> +  a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { vect_slp_v4qi_store } } }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { vect_slp_v4qi_store } } }
>    sink (&a);
>  }
>  
> @@ -288,8 +291,9 @@ void ga1i__ (void)
>  
>    struct A1i a = { 0 };
>    a.a[0] = 0;
> +  // O2 vectorization regress Wstringop-overflow case (1), refer to PR102462
>    a.a[1] = 1;                    // { dg-warning "\\\[-Wstringop-overflow" }
> -  a.a[2] = 2;                    // { dg-warning "\\\[-Wstringop-overflow" 
> "" { xfail { i?86-*-* x86_64-*-* } } }
> +  a.a[2] = 2;                    // { dg-warning "\\\[-Wstringop-overflow" 
> "" { xfail { vect_slp_v2qi_store } } }
>    sink (&a);
>  }
>  
> @@ -305,8 +309,9 @@ void ga1i_0_ (void)
>  
>    struct A1 a = { 0, { } };
>    a.a[0] = 0;
> +  // O2 vectorization regress Wstringop-overflow case (1), refer to PR102462
>    a.a[1] = 1;                   // { dg-warning "\\\[-Wstringop-overflow" }
> -  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { i?86-*-* x86_64-*-* } } }
> +  a.a[2] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { vect_slp_v2qi_store } } }
>    sink (&a);
>  }
>  
> @@ -320,10 +325,11 @@ void ga1i_1 (void)
>    a1i_1.a[1] = 1;               // { dg-warning "\\\[-Wstringop-overflow" }
>    a1i_1.a[2] = 2;               // { dg-warning "\\\[-Wstringop-overflow" }
>  
> -  struct A1 a = { 0, { 1 } };   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (1), refer to PR102462
> +  struct A1 a = { 0, { 1 } };   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { vect_slp_v4qi_store } } }
>    a.a[0] = 1;
> -  a.a[1] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { i?86-*-* x86_64-*-* } } }
> -  a.a[2] = 3;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { i?86-*-* x86_64-*-* } } }
> +  a.a[1] = 2;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { vect_slp_v4qi_store } } }
> +  a.a[2] = 3;                   // { dg-warning "\\\[-Wstringop-overflow" "" 
> { xfail { vect_slp_v4qi_store } } }
>    sink (&a);
>  }
>  
> diff --git a/gcc/testsuite/gcc.dg/Warray-bounds-48-novec.c 
> b/gcc/testsuite/gcc.dg/Warray-bounds-48-novec.c
> new file mode 100644
> index 00000000000..da179a2c0f5
> --- /dev/null
> +++ b/gcc/testsuite/gcc.dg/Warray-bounds-48-novec.c
> @@ -0,0 +1,364 @@
> +/* PR middle-end/91647 - missing -Warray-bounds accessing a zero-length array
> +   of a declared object
> +   { dg-do "compile" }
> +   { dg-options "-O2 -Wall -fno-tree-vectorize" }
> +   { dg-require-effective-target alloca } */
> +
> +typedef __INT16_TYPE__ int16_t;
> +typedef __INT32_TYPE__ int32_t;
> +
> +void sink (void*);
> +
> +/* Exercise a true flexible member.  */
> +
> +struct AX
> +{
> +  int32_t n;
> +  int16_t ax[];     // { dg-message "while referencing 'ax'" "member" }
> +};
> +
> +static void warn_ax_local (struct AX *p)
> +{
> +  p->ax[0] = 0;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->ax[1] = 1;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void nowarn_ax_extern (struct AX *p)
> +{
> +  p->ax[0] = 0; p->ax[99] = 99; p->ax[999] = 999; p->ax[9999] = 9999;
> +}
> +
> +static void warn_ax_local_buf (struct AX *p)
> +{
> +  p->ax[0] = 4; p->ax[1] = 5;
> +
> +  p->ax[2] = 6;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->ax[3] = 7;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->ax[4] = 8;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_ax_extern_buf (struct AX *p)
> +{
> +  p->ax[0] = 9; p->ax[1] = 10; p->ax[2] = 11;
> +
> +  p->ax[3] = 12;    // { dg-warning "\\\[-Warray-bounds" }
> +  p->ax[4] = 13;    // { dg-warning "\\\[-Warray-bounds" }
> +  p->ax[5] = 14;    // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void nowarn_ax_extern_bufx (struct AX *p)
> +{
> +  p->ax[0] = 0; p->ax[99] = 99; p->ax[999] = 999; p->ax[9999] = 9999;
> +}
> +
> +static void nowarn_ax_ref (struct AX *p)
> +{
> +  p->ax[0] = 0; p->ax[99] = 99; p->ax[999] = 999; p->ax[9999] = 9999;
> +}
> +
> +void test_ax (struct AX *p, unsigned n)
> +{
> +  {
> +    struct AX sax;  // { dg-message "defined here" "struct definition" }
> +    warn_ax_local (&sax);
> +    sink (&sax);
> +  }
> +
> +  {
> +    extern
> +      struct AX xsax;
> +    nowarn_ax_extern (&xsax);
> +    sink (&xsax);
> +  }
> +
> +  {
> +    /* Verify out-of-bounds access to the local BUF is diagnosed.  */
> +    char ax_buf_p2[sizeof (struct AX) + 2 * sizeof (int16_t)];
> +    warn_ax_local_buf ((struct AX*) ax_buf_p2);
> +    sink (ax_buf_p2);
> +  }
> +
> +  {
> +    /* Verify out-of-bounds access to the extern BUF with a known
> +       bound is diagnosed.  */
> +    extern char ax_buf_p3[sizeof (struct AX) + 3 * sizeof (int16_t)];
> +    warn_ax_extern_buf ((struct AX*) ax_buf_p3);
> +    sink (ax_buf_p3);
> +  }
> +
> +  {
> +    /* Verify that accesses to BUFX with an unknown bound are not
> +       diagnosed.  */
> +    extern char bufx[];
> +    nowarn_ax_extern_bufx ((struct AX*) bufx);
> +    sink (bufx);
> +  }
> +
> +  {
> +    /* Verify that accesses to BUFN with a runtime bound are not
> +       diagnosed.  */
> +    char bufn[n];
> +    nowarn_ax_extern_bufx ((struct AX*) bufn);
> +    sink (bufn);
> +  }
> +
> +  nowarn_ax_ref (p);
> +}
> +
> +
> +/* Exercise a zero-length trailing member array.  It's the same as above
> +   except that extern declarations with no definitions are considered to
> +   have zero elements (they can't be initialized to have any).  */
> +
> +struct A0
> +{
> +  int32_t n;
> +  int16_t a0[0];    // { dg-message "while referencing 'a0'" "member" }
> +};
> +
> +static void warn_a0_local (struct A0 *p)
> +{
> +  p->a0[0] = 0;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a0[1] = 1;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a0_extern (struct A0 *p)
> +{
> +  p->a0[0] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a0[1] = 3;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a0_local_buf (struct A0 *p)
> +{
> +  p->a0[0] = 4; p->a0[1] = 5;
> +
> +  p->a0[2] = 6;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a0[3] = 7;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a0[4] = 8;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a0_extern_buf (struct A0 *p)
> +{
> +  p->a0[0] = 9; p->a0[1] = 10; p->a0[2] = 11;
> +
> +  p->a0[3] = 12;    // { dg-warning "\\\[-Warray-bounds" }
> +  p->a0[4] = 13;    // { dg-warning "\\\[-Warray-bounds" }
> +  p->a0[5] = 14;    // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void nowarn_a0_extern_bufx (struct A0 *p)
> +{
> +  p->a0[0] = 0; p->a0[99] = 99; p->a0[999] = 999; p->a0[9999] = 9999;
> +}
> +
> +static void nowarn_a0_ref (struct A0 *p)
> +{
> +  p->a0[0] = 0; p->a0[99] = 99; p->a0[999] = 999; p->a0[9999] = 9999;
> +}
> +
> +void test_a0 (struct A0 *p, unsigned n)
> +{
> +  {
> +    struct A0 sa0;  // { dg-message "defined here" "struct definition" }
> +    warn_a0_local (&sa0);
> +    sink (&sa0);
> +  }
> +
> +  {
> +    extern
> +      struct A0 xsa0;  // { dg-message "defined here" "struct definition" }
> +    warn_a0_extern (&xsa0);
> +    sink (&xsa0);
> +  }
> +
> +  {
> +    /* Verify out-of-bounds access to the local BUF is diagnosed.  */
> +    char a0_buf_p2[sizeof (struct A0) + 2 * sizeof (int16_t)];
> +    warn_a0_local_buf ((struct A0*) a0_buf_p2);
> +    sink (a0_buf_p2);
> +  }
> +
> +  {
> +    /* Verify out-of-bounds access to the extern BUF with a known
> +       bound is diagnosed.  */
> +    extern char a0_buf_p3[sizeof (struct A0) + 3 * sizeof (int16_t)];
> +    warn_a0_extern_buf ((struct A0*) a0_buf_p3);
> +    sink (a0_buf_p3);
> +  }
> +
> +  {
> +    /* Verify that accesses to BUFX with an unknown bound are not
> +       diagnosed.  */
> +    extern char bufx[];
> +    nowarn_a0_extern_bufx ((struct A0*) bufx);
> +    sink (bufx);
> +  }
> +
> +  {
> +    /* Verify that accesses to BUFN with a runtime bound are not
> +       diagnosed.  */
> +    char bufn[n];
> +    nowarn_a0_extern_bufx ((struct A0*) bufn);
> +    sink (bufn);
> +  }
> +
> +  nowarn_a0_ref (p);
> +}
> +
> +
> +/* Exercise a one-element trailing member array.  It's the same as above
> +   except that it has exactly one element.  */
> +
> +struct A1
> +{
> +  int32_t n;
> +  int16_t a1[1];    // { dg-message "while referencing 'a1'" }
> +};
> +
> +static void warn_a1_local_noinit (struct A1 *p)
> +{
> +  p->a1[0] = 0;
> +  p->a1[1] = 1;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a1[2] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a1_extern (struct A1 *p)
> +{
> +  p->a1[0] = 0;
> +  p->a1[1] = 1;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a1[2] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a1_init (struct A1 *p)
> +{
> +  p->a1[0] = 0;
> +  p->a1[1] = 1;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a1[2] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a1_local_buf (struct A1 *p)
> +{
> +  p->a1[0] = 0; p->a1[1] = 1; p->a1[2] = 2; p->a1[3] = 3;
> +
> +  p->a1[4] = 4;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a1_extern_buf (struct A1 *p)
> +{
> +  p->a1[0] = 0; p->a1[1] = 1; p->a1[2] = 2; p->a1[3] = 3; p->a1[4] = 4;
> +
> +  p->a1[5] = 5;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void nowarn_a1_extern_bufx (struct A1 *p)
> +{
> +  p->a1[0] = 0; p->a1[99] = 99; p->a1[999] = 999; p->a1[9999] = 9999;
> +}
> +
> +static void nowarn_a1_ref (struct A1 *p)
> +{
> +  p->a1[0] = 0; p->a1[99] = 99; p->a1[999] = 999; p->a1[9999] = 9999;
> +}
> +
> +void test_a1 (struct A1 *p, unsigned n)
> +{
> +  {
> +    struct A1 a1;
> +    warn_a1_local_noinit (&a1);
> +    sink (&a1);
> +  }
> +
> +  {
> +    extern struct A1 a1x;
> +    warn_a1_extern (&a1x);
> +    sink (&a1x);
> +}
> +  {
> +    struct A1 a1 = { 0, { 1 } };
> +    warn_a1_init (&a1);
> +    sink (&a1);
> +  }
> +
> +  {
> +    /* Verify out-of-bounds access to the local BUF is diagnosed.  */
> +    char buf_p2[sizeof (struct A1) + 2 * sizeof (int16_t)];
> +    warn_a1_local_buf ((struct A1*) buf_p2);
> +    sink (buf_p2);
> +  }
> +
> +  {
> +    /* Verify out-of-bounds access to the extern BUF with a known
> +       bound is diagnosed.  */
> +    extern char a1_buf_p3[sizeof (struct A1) + 3 * sizeof (int16_t)];
> +    warn_a1_extern_buf ((struct A1*) a1_buf_p3);
> +    sink (a1_buf_p3);
> +  }
> +
> +  {
> +    /* Verify that accesses to BUFX with an unknown bound are not
> +       diagnosed.  */
> +    extern char bufx[];
> +    nowarn_a1_extern_bufx ((struct A1*) bufx);
> +    sink (bufx);
> +  }
> +
> +  {
> +    /* Verify that accesses to BUFN with a runtime bound are not
> +       diagnosed.  */
> +    char bufn[n];
> +    nowarn_a1_extern_bufx ((struct A1*) bufn);
> +    sink (bufn);
> +  }
> +
> +  nowarn_a1_ref (p);
> +}
> +
> +
> +/* Exercise a two-element trailing member array.  It's treated
> +   the same as an interior array member.  */
> +
> +struct A2
> +{
> +  int32_t n;
> +  int16_t a2[2];    // { dg-message "while referencing 'a2'" }
> +};
> +
> +static void warn_a2_noinit (struct A2 *p)
> +{
> +  p->a2[0] = 0; p->a2[1] = 1;
> +
> +  p->a2[2] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a2_init (struct A2 *p)
> +{
> +  p->a2[0] = 0; p->a2[1] = 1;
> +
> +  p->a2[2] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a2[9] = 9;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +static void warn_a2_ref (struct A2 *p)
> +{
> +  p->a2[0] = 0; p->a2[1] = 1;
> +
> +  p->a2[2] = 2;     // { dg-warning "\\\[-Warray-bounds" }
> +  p->a2[9] = 9;     // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +void test_a2 (struct A2 *p)
> +{
> +  {
> +    struct A2 a2;
> +    warn_a2_noinit (&a2);
> +    sink (&a2);
> +  }
> +
> +  {
> +    struct A2 a2 = { 0, { 1, 2 } };
> +    warn_a2_init (&a2);
> +    sink (&a2);
> +  }
> +
> +  warn_a2_ref (p);
> +}
> diff --git a/gcc/testsuite/gcc.dg/Warray-bounds-48.c 
> b/gcc/testsuite/gcc.dg/Warray-bounds-48.c
> index 13373d1e99e..27dd879de5c 100644
> --- a/gcc/testsuite/gcc.dg/Warray-bounds-48.c
> +++ b/gcc/testsuite/gcc.dg/Warray-bounds-48.c
> @@ -30,7 +30,8 @@ static void nowarn_ax_extern (struct AX *p)
>  
>  static void warn_ax_local_buf (struct AX *p)
>  {
> -  p->ax[0] = 4; p->ax[1] = 5;
> +  // Refer to 102706
> +  p->ax[0] = 4; p->ax[1] = 5;  // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { vect_slp_v2hi_store &&  { ! vect_slp_v4hi_store } } } }
>  
>    p->ax[2] = 6;     // { dg-warning "\\\[-Warray-bounds" }
>    p->ax[3] = 7;     // { dg-warning "\\\[-Warray-bounds" }
> @@ -130,7 +131,8 @@ static void warn_a0_extern (struct A0 *p)
>  
>  static void warn_a0_local_buf (struct A0 *p)
>  {
> -  p->a0[0] = 4; p->a0[1] = 5;
> +  // Refer to 102706
> +  p->a0[0] = 4; p->a0[1] = 5;  // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { vect_slp_v2hi_store && { ! vect_slp_v4hi_store } } } }
>  
>    p->a0[2] = 6;     // { dg-warning "\\\[-Warray-bounds" }
>    p->a0[3] = 7;     // { dg-warning "\\\[-Warray-bounds" }
> diff --git a/gcc/testsuite/gcc.dg/Warray-bounds-51-novec.c 
> b/gcc/testsuite/gcc.dg/Warray-bounds-51-novec.c
> new file mode 100644
> index 00000000000..24bc318f113
> --- /dev/null
> +++ b/gcc/testsuite/gcc.dg/Warray-bounds-51-novec.c
> @@ -0,0 +1,61 @@
> +/* PR middle-end/92333 - missing variable name referencing VLA in warnings
> +   PR middle-end/82608 - missing -Warray-bounds on an out-of-bounds VLA index
> +   { dg-do compile }
> +   { dg-options "-O2 -Wall -fno-tree-vectorize" }  */
> +
> +void sink (void*);
> +
> +void test_char_vla_location (void)
> +{
> +  unsigned nelts = 7;
> +
> +  char vla[nelts];    // { dg-message "declared here|while referencing" }
> +
> +  vla[0] = __LINE__;
> +  vla[nelts] = 0;     // { dg-warning "\\\[-Warray-bounds" }
> +
> +  sink (vla);
> +}
> +
> +void test_int_vla_location (void)
> +{
> +  unsigned nelts = 7;
> +
> +  int vla[nelts];     // { dg-message "declared here|while referencing" }
> +
> +  vla[0] = __LINE__;
> +  vla[nelts] = 1;     // { dg-warning "\\\[-Warray-bounds" }
> +
> +  sink (vla);
> +}
> +
> +void test_struct_char_vla_location (void)
> +{
> +  unsigned nelts = 7;
> +
> +  struct {
> +    char cvla[nelts]; // { dg-message "declared here|while referencing" }
> +  } s;
> +
> +  s.cvla[0] = __LINE__;
> +  s.cvla[nelts - 1] = 0;
> +  s.cvla[nelts] = 0;  // { dg-warning "\\\[-Warray-bounds" }
> +
> +  sink (&s);
> +}
> +
> +
> +void test_struct_int_vla_location (void)
> +{
> +  unsigned nelts = 7;
> +
> +  struct {
> +    int ivla[nelts];  // { dg-message "declared here|while referencing" }
> +  } s;
> +
> +  s.ivla[0] = __LINE__;
> +  s.ivla[nelts - 1] = 0;
> +  s.ivla[nelts] = 0;  // { dg-warning "\\\[-Warray-bounds" }
> +
> +  sink (&s);
> +}
> diff --git a/gcc/testsuite/gcc.dg/Warray-bounds-51.c 
> b/gcc/testsuite/gcc.dg/Warray-bounds-51.c
> index de60d87ab95..cc92a0fd500 100644
> --- a/gcc/testsuite/gcc.dg/Warray-bounds-51.c
> +++ b/gcc/testsuite/gcc.dg/Warray-bounds-51.c
> @@ -39,7 +39,8 @@ void test_struct_char_vla_location (void)
>    } s;
>  
>    s.cvla[0] = __LINE__;
> -  s.cvla[nelts - 1] = 0; // { dg-warning "\\\[-Wstringop-overflow" "" { 
> target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  s.cvla[nelts - 1] = 0; // { dg-warning "\\\[-Wstringop-overflow" "" { 
> target { vect_slp_v2qi_store } } }
>    s.cvla[nelts] = 0;  // { dg-warning "\\\[-Warray-bounds" }
>  
>    sink (&s);
> diff --git a/gcc/testsuite/gcc.dg/Warray-parameter-3-novec.c 
> b/gcc/testsuite/gcc.dg/Warray-parameter-3-novec.c
> new file mode 100644
> index 00000000000..0c8fdd11ec9
> --- /dev/null
> +++ b/gcc/testsuite/gcc.dg/Warray-parameter-3-novec.c
> @@ -0,0 +1,89 @@
> +/* PR c/50584 - No warning for passing small array to C99 static array
> +   declarator
> +   { dg-do compile }
> +   { dg-options "-Wall -Warray-parameter=1" } */
> +
> +/* Verify that at level 1 mismatches in the bounds of ordinary array
> +   parameters don't trigger -Warray-parameter.  */
> +void fax (int[]);
> +void fax (int[0]);
> +void fax (int[1]);
> +void fax (int[2]);
> +void fax (int[3]);
> +
> +/* Same as above but starting with an array with a specified bound.  */
> +void gax (int[3]);
> +void gax (int[2]);
> +void gax (int[1]);
> +void gax (int[0]);
> +void gax (int[]);
> +
> +/* Same for multidimensional arrays.  */
> +void fax_y (int[][3]);
> +void fax_y (int[0][3]);
> +void fax_y (int[1][3]);
> +void fax_y (int[2][3]);
> +void fax_y (int[3][3]);
> +
> +/* Same as above but starting with an array with a specified bound.  */
> +void gax_y (int[3][5]);
> +void gax_y (int[2][5]);
> +void gax_y (int[1][5]);
> +void gax_y (int[0][5]);
> +void gax_y (int[][5]);
> +
> +/* Exercise VLAs with a mismatch in the bound for an ordinary array.  */
> +void fvlax_y (int n, int[][n]);
> +void fvlax_y (int n, int[0][n]);
> +void fvlax_y (int n, int[1][n]);
> +void fvlax_y (int n, int[2][n]);
> +void fvlax_y (int n, int[3][n]);
> +
> +void fvlaxn_y (int n, int[][n]);
> +void fvlaxn_y (int n, int[0][n]);
> +void fvlaxn_y (int n, int[1][n]);
> +void fvlaxn_y (int n, int[2][n]);
> +void fvlaxn_y (int n, int[3][n]);
> +
> +void fvlaxx_y (int[][*]);
> +void fvlaxx_y (int[0][*]);
> +void fvlaxx_y (int[1][*]);
> +void fvlaxx_y (int[2][*]);
> +void fvlaxx_y (int[3][*]);
> +
> +/* Verify that mismatches in the bounds of array parameters declared
> +   static do trigger -Warray-parameter.  */
> +void fas1 (int[static 1]);    // { dg-message "previously declared as 
> 'int\\\[static 1]'" }
> +void fas1 (int[static 2]);    // { dg-warning "\\\[-Warray-parameter=" }
> +
> +
> +/* Also verify that -Warray-bounds doesn't trigger for ordinary array
> +   parameters...  */
> +#pragma GCC optimize ("2,no-tree-vectorize")
> +
> +__attribute__ ((noipa)) void
> +gca3 (char a[3])
> +{
> +  a[0] = 0; a[1] = 1; a[2] = 2; a[3] = 3;
> +}
> +
> +__attribute__ ((noipa)) void
> +gia3 (int a[3])
> +{
> +  a[0] = 0; a[1] = 1; a[2] = 2; a[3] = 3;
> +}
> +
> +/* ...but does for static arrays.  */
> +__attribute__ ((noipa)) void
> +gcas3 (char a[static 3])
> +{
> +  a[0] = 0; a[1] = 1; a[2] = 2;
> +  a[3] = 3;                   // { dg-warning "\\\[-Warray-bounds" }
> +}
> +
> +__attribute__ ((noipa)) void
> +gias3 (int a[static 3])
> +{
> +  a[0] = 0; a[1] = 1; a[2] = 2;
> +  a[3] = 3;                   // { dg-warning "\\\[-Warray-bounds" }
> +}
> diff --git a/gcc/testsuite/gcc.dg/Warray-parameter-3.c 
> b/gcc/testsuite/gcc.dg/Warray-parameter-3.c
> index e8a269c85c6..1068707973f 100644
> --- a/gcc/testsuite/gcc.dg/Warray-parameter-3.c
> +++ b/gcc/testsuite/gcc.dg/Warray-parameter-3.c
> @@ -77,7 +77,8 @@ gia3 (int a[3])
>  __attribute__ ((noipa)) void
>  gcas3 (char a[static 3])
>  {
> -  a[0] = 0; a[1] = 1; a[2] = 2; // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  a[0] = 0; a[1] = 1; a[2] = 2; // { dg-warning "\\\[-Wstringop-overflow" "" 
> { target { vect_slp_v4qi_store } } }
>    a[3] = 3;                   // { dg-warning "\\\[-Warray-bounds" }
>  }
>  
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-14-novec.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-14-novec.c
> new file mode 100644
> index 00000000000..c7b5479dc07
> --- /dev/null
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-14-novec.c
> @@ -0,0 +1,56 @@
> +/* Test to verify that past-the-end multibyte writes via lvalues of wider
> +   types than char are diagnosed.
> +   { dg-do compile }
> +   { dg-require-effective-target int32plus }
> +   { dg-options "-O2 -fno-tree-vectorize -Wall -Wno-array-bounds" }  */
> +
> +typedef __INT16_TYPE__  int16_t;
> +typedef __INT32_TYPE__  int32_t;
> +typedef __INT64_TYPE__  int64_t;
> +typedef __SIZE_TYPE__   size_t;
> +
> +void* memcpy (void*, const void*, size_t);
> +char* strcpy (char*, const char*);
> +
> +char a4[4], a8[8], a16[16];
> +
> +const char s4[] = "1234";
> +const char t4[] = "4321";
> +
> +void test_memcpy_cond (int i)
> +{
> +  char *p = a4 + 1;
> +  const char *q = i ? s4 : t4;
> +  // On strictly aligned target the call below is left unchanged and
> +  // triggers (inaccurately) a -Warray-bounds.  The test suppresses
> +  // the warning above, which then lets -Wstringop-overrflow detect
> +  // the overflow just before expansion.
> +  // On other targets it's transformed into a store of a 4-byte integer
> +  // which is detected by -Wstringop-overrflow in the strlen pass (i.e.,
> +  // before it gets to expansion).
> +  memcpy (p, q, 4);         // { dg-warning "writing 4 bytes into a region 
> of size 3" }
> +}
> +
> +
> +void test_int16 (void)
> +{
> +  char *p = a4 + 1;
> +  *(int16_t*)p = 0;
> +  *(int16_t*)(p + 2) = 0;   // { dg-warning "writing 2 bytes into a region 
> of size 1" }
> +}
> +
> +
> +void test_int32 (void)
> +{
> +  char *p = a8 + 3;
> +  *(int32_t*)p = 0;
> +  *(int32_t*)(p + 2) = 0;   // { dg-warning "writing 4 bytes into a region 
> of size 3" }
> +}
> +
> +
> +void test_int64 (void)
> +{
> +  char *p = a16 + 5;
> +  *(int64_t*)p = 0;
> +  *(int64_t*)(p + 5) = 0;   // { dg-warning "writing 8 bytes into a region 
> of size 6" }
> +}
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-14.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-14.c
> index 7683084e46e..6ad9444bc27 100644
> --- a/gcc/testsuite/gcc.dg/Wstringop-overflow-14.c
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-14.c
> @@ -36,8 +36,9 @@ void test_memcpy_cond (int i)
>  void test_int16 (void)
>  {
>    char *p = a4 + 1;
> -  *(int16_t*)p = 0;    // { dg-warning "writing 4 bytes into a region of 
> size 3" "" { target { i?86-*-* x86_64-*-* } } }
> -  *(int16_t*)(p + 2) = 0;   // { dg-warning "writing 2 bytes into a region 
> of size 1" "" { xfail { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  *(int16_t*)p = 0;    // { dg-warning "writing 4 bytes into a region of 
> size 3" "" { target { vect_slp_v2hi_store } } }
> +  *(int16_t*)(p + 2) = 0;   // { dg-warning "writing 2 bytes into a region 
> of size 1" "" { xfail { vect_slp_v2hi_store } } }
>  }
>  
>  
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-21-novec.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-21-novec.c
> new file mode 100644
> index 00000000000..b177543b186
> --- /dev/null
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-21-novec.c
> @@ -0,0 +1,59 @@
> +/* PR middle-end/92312 - bogus -Wstringop-overflow storing into a trailing
> +   array backed by larger buffer
> +   { dg-do compile }
> +   { dg-options "-O2 -fno-tree-vectorize -Wall -Wno-array-bounds" } */
> +
> +struct S0 { char a, b[0]; };
> +
> +void sink (void*);
> +
> +void test_memset_zero_length (void)
> +{
> +  char a[3];
> +  struct S0 *p = (struct S0*)a;
> +  p->a = 0;
> +  __builtin_memset (p->b, 0, 2);
> +  sink (p);
> +
> +  __builtin_memset (p->b, 0, 3);    // { dg-warning 
> "\\\[-Wstringop-overflow" }
> +  sink (p);
> +}
> +
> +void test_store_zero_length (int i)
> +{
> +  char a[3];
> +  struct S0 *p = (struct S0*)a;
> +  p->a = 0;
> +  p->b[0] = 0;
> +  p->b[1] = 1;                      // { dg-bogus "\\\[-Wstringop-overflow" }
> +  p->b[2] = 2;                      // { dg-warning 
> "\\\[-Wstringop-overflow" }
> +  p->b[i] = 2;
> +  sink (p);
> +}
> +
> +
> +struct Sx { char a, b[]; };
> +
> +void test_memset_flexarray (int i)
> +{
> +  char a[3];
> +  struct Sx *p = (struct Sx*)a;
> +  p->a = 0;
> +  __builtin_memset (p->b, 0, 2);
> +  sink (p);
> +
> +  __builtin_memset (p->b, 0, 3);    // { dg-warning 
> "\\\[-Wstringop-overflow" }
> +  sink (p);
> +}
> +
> +void test_store_flexarray (int i)
> +{
> +  char a[3];
> +  struct Sx *p = (struct Sx*)a;
> +  p->a = 0;
> +  p->b[0] = 0;
> +  p->b[1] = 1;                      // { dg-bogus "\\\[-Wstringop-overflow" }
> +  p->b[2] = 1;                      // { dg-warning 
> "\\\[-Wstringop-overflow" }
> +  p->b[i] = 2;
> +  sink (p);
> +}
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-21.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-21.c
> index d88bde9c740..8d2bfe697a5 100644
> --- a/gcc/testsuite/gcc.dg/Wstringop-overflow-21.c
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-21.c
> @@ -23,10 +23,11 @@ void test_store_zero_length (int i)
>  {
>    char a[3];
>    struct S0 *p = (struct S0*)a;
> -  p->a = 0;                         // { dg-warning 
> "\\\[-Wstringop-overflow" "" { target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  p->a = 0;                         // { dg-warning 
> "\\\[-Wstringop-overflow" "" { target { vect_slp_v4qi_store } } }
>    p->b[0] = 0;
>    p->b[1] = 1;                      // { dg-bogus "\\\[-Wstringop-overflow" }
> -  p->b[2] = 2;                      // { dg-warning 
> "\\\[-Wstringop-overflow" "" { xfail { i?86-*-* x86_64-*-* } } }
> +  p->b[2] = 2;                      // { dg-warning 
> "\\\[-Wstringop-overflow" "" { xfail { vect_slp_v4qi_store } } }
>    p->b[i] = 2;
>    sink (p);
>  }
> @@ -50,10 +51,11 @@ void test_store_flexarray (int i)
>  {
>    char a[3];
>    struct Sx *p = (struct Sx*)a;
> -  p->a = 0;                         // { dg-warning 
> "\\\[-Wstringop-overflow" "" { target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  p->a = 0;                         // { dg-warning 
> "\\\[-Wstringop-overflow" "" { target { vect_slp_v4qi_store } } }
>    p->b[0] = 0;
>    p->b[1] = 1;                      // { dg-bogus "\\\[-Wstringop-overflow" }
> -  p->b[2] = 1;                      // { dg-warning 
> "\\\[-Wstringop-overflow" "" { xfail { i?86-*-* x86_64-*-* } } }
> +  p->b[2] = 1;                      // { dg-warning 
> "\\\[-Wstringop-overflow" "" { xfail { vect_slp_v4qi_store } } }
>    p->b[i] = 2;
>    sink (p);
>  }
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-68.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-68.c
> index 09df0004991..04e91afb8bc 100644
> --- a/gcc/testsuite/gcc.dg/Wstringop-overflow-68.c
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-68.c
> @@ -58,11 +58,18 @@ void warn_comp_lit_zero (void)
>  void warn_comp_lit (void)
>  {
>    *(AC2*)a1 = Ac2;      // { dg-warning "writing 2 bytes into a region of 
> size 1" "pr101475" { xfail *-*-* } }
> -  *(AC4*)a2 = Ac4;      // { dg-warning "writing 4 bytes into a region of 
> size 2" "pr101475" { xfail { ! { i?86-*-* x86_64-*-* } } } }
> -  *(AC4*)a3 = Ac4;      // { dg-warning "writing 4 bytes into a region of 
> size 3" "pr101475" { xfail { ! { i?86-*-* x86_64-*-* } } } }
> -  *(AC8*)a4 = Ac8;      // { dg-warning "writing 8 bytes into a region of 
> size 4" "pr101475" { xfail { ! { i?86-*-* x86_64-*-* } } } }
> -  *(AC8*)a7 = Ac8;      // { dg-warning "writing 8 bytes into a region of 
> size 7" "pr101475" { xfail { ! { i?86-*-* x86_64-*-* } } } }
> -  *(AC16*)a15 = Ac16;   // { dg-warning "writing 16 bytes into a region of 
> size 15" "pr101475" { xfail { ! { i?86-*-* x86_64-*-* } } } }
> +  // After vectorization, below codes are optimized to
> +  // MEM <vector(4) char> [(char *)&a2] = { 0, 1, 2, 3 };
> +  // MEM <vector(4) char> [(char *)&a3] = { 0, 1, 2, 3 };
> +  // MEM <vector(8) char> [(char *)&a4] = { 0, 1, 2, 3, 4, 5, 6, 7 };
> +  // MEM <vector(8) char> [(char *)&a7] = { 0, 1, 2, 3, 4, 5, 6, 7 };
> +  // MEM <vector(16) char> [(char *)&a15] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 
> 10, 11, 12, 13, 14, 15 };
> +  // and warning should be expected, refer to PR102722.
> +  *(AC4*)a2 = Ac4;      // { dg-warning "writing 4 bytes into a region of 
> size 2" "pr101475" { xfail { ! { vect_slp_v4qi_store } } } }
> +  *(AC4*)a3 = Ac4;      // { dg-warning "writing 4 bytes into a region of 
> size 3" "pr101475" { xfail { ! { vect_slp_v4qi_store } } } }
> +  *(AC8*)a4 = Ac8;      // { dg-warning "writing 8 bytes into a region of 
> size 4" "pr101475" { xfail { ! { vect_slp_v8qi_store } } } }
> +  *(AC8*)a7 = Ac8;      // { dg-warning "writing 8 bytes into a region of 
> size 7" "pr101475" { xfail { ! { vect_slp_v8qi_store } } } }
> +  *(AC16*)a15 = Ac16;   // { dg-warning "writing 16 bytes into a region of 
> size 15" "pr101475" { xfail { ! { vect_slp_v16qi_store } } } }
>  }
>  
>  void warn_aggr_decl (void)
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-76-novec.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-76-novec.c
> new file mode 100644
> index 00000000000..d000b587a65
> --- /dev/null
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-76-novec.c
> @@ -0,0 +1,147 @@
> +/* Verify warnings and notes for MAX_EXPRs involving either pointers
> +   to distinct objects or one to a known object and the other to
> +   an unknown one.  Unlike for the same object, for unrelated objects
> +   the expected warnings and notes are the same as for MIN_EXPR: when
> +   the order of the objects in the address space cannot be determined
> +   the larger of them is assumed to be used.  (This is different for
> +   distinct struct members where the order is given.)
> +   The relational expressions are strictly invalid but that should be
> +   diagnosed by a separate warning.
> +   { dg-do compile }
> +   { dg-options "-O2 -Wno-array-bounds -fno-tree-vectorize" } */
> +
> +#define MAX(p, q) ((p) > (q) ? (p) : (q))
> +
> +/* Verify that even for MAX_EXPR and like for MIN_EXPR, the note points
> +   to the larger of the two objects and mentions the offset into it
> +   (although the offset might be better included in the warning).  */
> +extern char a3[3];
> +extern char a5[5];  // { dg-message "at offset 5 into destination object 
> 'a5' of size 5" "note" }
> +
> +void max_a3_a5 (int i)
> +{
> +  char *p = a3 + i;
> +  char *q = a5 + i;
> +
> +  /* The relational expression below is invalid and should be diagnosed
> +     by its own warning independently of -Wstringop-overflow.  */
> +  char *d = MAX (p, q);
> +
> +  d[2] = 0;
> +  d[3] = 0;
> +  d[4] = 0;
> +  d[5] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +// Same as above but with the larger array as the first MAX_EXPR operand.
> +extern char b4[4];
> +extern char b6[6];  // { dg-message "at offset 6 into destination object 
> 'b6' of size 6" "note" }
> +
> +void max_b6_b4 (int i)
> +{
> +  char *p = b6 + i;
> +  char *q = b4 + i;
> +  char *d = MAX (p, q);
> +
> +  d[3] = 0;
> +  d[4] = 0;
> +  d[5] = 0;
> +  d[6] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +/* Same as above but with the first MAX_EXPR operand pointing to an unknown
> +   object.  */
> +extern char c7[7];  // { dg-message "at offset 7 into destination object 
> 'c7' of size 7" "note" }
> +
> +void max_p_c7 (char *p, int i)
> +{
> +  char *q = c7 + i;
> +  char *d = MAX (p, q);
> +
> +  d[6] = 0;
> +  d[7] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +/* Same as above but with the second MIN_EXPR operand pointing to an unknown
> +   object.  */
> +extern char d8[8];  // { dg-message "at offset 8 into destination object 
> 'd8' of size 8" "note" }
> +
> +void max_d8_p (char *q, int i)
> +{
> +  char *p = d8 + i;
> +  char *d = MAX (p, q);
> +
> +  d[7] = 0;
> +  d[8] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +struct A3_5
> +{
> +  char a3[3];  // { dg-message "at offset 3 into destination object 'a3' of 
> size 3" "pr??????" { xfail *-*-* } }
> +  char a5[5];
> +};
> +
> +void max_A3_A5 (int i, struct A3_5 *pa3_5)
> +{
> +  char *p = pa3_5->a3 + i;
> +  char *q = pa3_5->a5 + i;
> +
> +  char *d = MAX (p, q);
> +  d[2] = 0;
> +  d[3] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "pr??????" { xfail *-*-* } }
> +  d[4] = 0;
> +  d[5] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +struct B4_B6
> +{
> +  char b4[4];
> +  char b6[6];       // { dg-message "at offset 6 into destination object 
> 'b6' of size 6" "note" }
> +};
> +
> +void max_B6_B4 (int i, struct B4_B6 *pb4_b6)
> +{
> +  char *p = pb4_b6->b6 + i;
> +  char *q = pb4_b6->b4 + i;
> +  char *d = MAX (p, q);
> +
> +  d[3] = 0;
> +  d[4] = 0;
> +  d[5] = 0;
> +  d[6] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +struct C7
> +{
> +  char c7[7];       // { dg-message "at offset 7 into destination object 
> 'c7' of size 7" "note" }
> +};
> +
> +void max_p_C7 (char *p, int i, struct C7 *pc7)
> +{
> +  char *q = pc7->c7 + i;
> +  char *d = MAX (p, q);
> +
> +  d[6] = 0;
> +  d[7] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> +
> +
> +struct D8
> +{
> +  char d8[8];       // { dg-message "at offset 8 into destination object 
> 'd8' of size 8" "note" }
> +};
> +
> +void max_D8_p (char *q, int i, struct D8 *pd8)
> +{
> +  char *p = pd8->d8 + i;
> +  char *d = MAX (p, q);
> +
> +  d[7] = 0;
> +  d[8] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> }
> +}
> diff --git a/gcc/testsuite/gcc.dg/Wstringop-overflow-76.c 
> b/gcc/testsuite/gcc.dg/Wstringop-overflow-76.c
> index 0c7b53ccc0b..037e66c2769 100644
> --- a/gcc/testsuite/gcc.dg/Wstringop-overflow-76.c
> +++ b/gcc/testsuite/gcc.dg/Wstringop-overflow-76.c
> @@ -27,10 +27,11 @@ void max_a3_a5 (int i)
>       by its own warning independently of -Wstringop-overflow.  */
>    char *d = MAX (p, q);
>  
> -  d[2] = 0;         // { dg-warning "writing 4 bytes into a region of size 
> 3" "" { target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  d[2] = 0;         // { dg-warning "writing 4 bytes into a region of size 
> 3" "" { target { vect_slp_v4qi_store } } }
>    d[3] = 0;
>    d[4] = 0;
> -  d[5] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { i?86-*-* x86_64-*-* } } }
> +  d[5] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { vect_slp_v4qi_store } } }
>  }
>  
>  
> @@ -44,10 +45,11 @@ void max_b6_b4 (int i)
>    char *q = b4 + i;
>    char *d = MAX (p, q);
>  
> -  d[3] = 0;         // { dg-warning "writing 4 bytes into a region of size 
> 3" "" { target { i?86-*-* x86_64-*-* } } }
> +  // O2 vectorization regress Wstringop-overflow case (2), refer to pr102706.
> +  d[3] = 0;         // { dg-warning "writing 4 bytes into a region of size 
> 3" "" { target { vect_slp_v4qi_store } } }
>    d[4] = 0;
>    d[5] = 0;
> -  d[6] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { i?86-*-* x86_64-*-* } } }
> +  d[6] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { vect_slp_v4qi_store } } }
>  }
>  
>  
> @@ -82,7 +84,7 @@ void max_d8_p (char *q, int i)
>  struct A3_5
>  {
>    char a3[3];  // { dg-message "at offset 3 into destination object 'a3' of 
> size 3" "pr??????" { xfail *-*-* } }
> -  char a5[5];  // { dg-message "at offset 5 into destination object 'a5' of 
> size 5" "note" { xfail { i?86-*-* x86_64-*-* } } }
> +  char a5[5];  // { dg-message "at offset 5 into destination object 'a5' of 
> size 5" "note" { xfail { vect_slp_v4qi_store } } }
>  };
>  
>  void max_A3_A5 (int i, struct A3_5 *pa3_5)
> @@ -91,18 +93,20 @@ void max_A3_A5 (int i, struct A3_5 *pa3_5)
>    char *q = pa3_5->a5 + i;
>  
>    char *d = MAX (p, q);
> -
> +  // After vectorization, below codes are vectorized to
> +  // MEM <vector(4) char> [(char *)&d + 3] = { 0, 0, 0, 0 };
> +  // refer to pr102697.
>    d[2] = 0;
>    d[3] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "pr??????" { xfail *-*-* } }
>    d[4] = 0;
> -  d[5] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { i?86-*-* x86_64-*-* } } }
> +  d[5] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { vect_slp_v4qi_store } } }
>  }
>  
>  
>  struct B4_B6
>  {
>    char b4[4];
> -  char b6[6];       // { dg-message "at offset 
> \[^a-zA-Z\n\r\]*6\[^a-zA-Z0-9\]* into destination object 'b6' of size 6" 
> "note" { xfail { i?86-*-* x86_64-*-* } } }
> +  char b6[6];       // { dg-message "at offset 
> \[^a-zA-Z\n\r\]*6\[^a-zA-Z0-9\]* into destination object 'b6' of size 6" 
> "note" { xfail { vect_slp_v4qi_store } } }
>  };
>  
>  void max_B6_B4 (int i, struct B4_B6 *pb4_b6)
> @@ -110,11 +114,13 @@ void max_B6_B4 (int i, struct B4_B6 *pb4_b6)
>    char *p = pb4_b6->b6 + i;
>    char *q = pb4_b6->b4 + i;
>    char *d = MAX (p, q);
> -
> +  // After vectorization, below codes are vectorized to
> +  // MEM <vector(4) char> [(char *)&d + 3] = { 0, 0, 0, 0 };
> +  // refer to pr102697.
>    d[3] = 0;
>    d[4] = 0;
>    d[5] = 0;
> -  d[6] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { i?86-*-* x86_64-*-* } } }
> +  d[6] = 0;         // { dg-warning "writing 1 byte into a region of size 0" 
> "" { xfail { vect_slp_v4qi_store } } }
>  }
>  
>  
> diff --git a/gcc/testsuite/lib/target-supports.exp 
> b/gcc/testsuite/lib/target-supports.exp
> index 9ebca7ac007..c30831ea91d 100644
> --- a/gcc/testsuite/lib/target-supports.exp
> +++ b/gcc/testsuite/lib/target-supports.exp
> @@ -7580,6 +7580,135 @@ proc 
> check_effective_target_vect_element_align_preferred { } {
>                  && [check_effective_target_vect_variable_length] }]
>  }
>  
> +# Return true if vectorization of v2qi/v4qi/v8qi/v16qi/v2hi store is enabed.
> +# Return zero if the desirable pattern isn't found.
> +# It's used by Warray-bounds/Wstringop-overflow testcases which are
> +# regressed by O2 vectorization, refer to PR102697/PR102462/PR102706
> +proc check_vect_slp_vnqihi_store_usage { pattern } {
> +    global tool
> +
> +    return [check_cached_effective_target slp_vnqihi_store_usage {
> +      set result [check_compile slp_vnqihi_store_usage assembly {
> +       char a[16] __attribute__ ((aligned (16)));
> +       void
> +       foo ()
> +       {
> +           a[0] = 0;
> +           a[1] = 1;
> +           a[2] = 2;
> +           a[3] = 3;
> +           a[4] = 4;
> +           a[5] = 5;
> +           a[6] = 6;
> +           a[7] = 7;
> +       }
> +
> +       void
> +       foo1 ()
> +       {
> +           a[0] = 0;
> +           a[1] = 1;
> +           a[2] = 2;
> +           a[3] = 3;
> +           a[4] = 4;
> +           a[5] = 5;
> +           a[6] = 6;
> +           a[7] = 7;
> +           a[8] = 8;
> +           a[9] = 9;
> +           a[10] = 10;
> +           a[11] = 11;
> +           a[12] = 12;
> +           a[13] = 13;
> +           a[14] = 14;
> +           a[15] = 15;
> +       }
> +
> +       void
> +       foo2 ()
> +       {
> +           a[0] = 0;
> +           a[1] = 1;
> +           a[2] = 2;
> +           a[3] = 3;
> +       }
> +
> +       void
> +       foo3 ()
> +       {
> +           a[0] = 0;
> +           a[1] = 1;
> +       }
> +
> +       short b[4] __attribute__((aligned(8)));
> +       void
> +       foo4 ()
> +       {
> +           b[0] = 0;
> +           b[1] = 1;
> +       }
> +
> +       void
> +       foo5 ()
> +       {
> +           b[0] = 0;
> +           b[1] = 1;
> +           b[2] = 2;
> +           b[3] = 3;
> +       }
> +
> +      } "-O2 -fopt-info-all" ]
> +
> +      # Get compiler emitted messages and delete generated file.
> +      set lines [lindex $result 0]
> +      set output [lindex $result 1]
> +      remote_file build delete $output
> +
> +      # Capture the vectorized info of v2qi, set it to zero if not found.
> +     if { ![regexp $pattern $lines whole val] } then {
> +       set val 0
> +      }
> +
> +      return $val
> +    }]
> +}
> +
> +# Return the true if target support vectorization of v2qi store.
> +proc check_effective_target_vect_slp_v2qi_store { } {
> +    set pattern {add new stmt: MEM <vector\(2\) char>}
> +    return [expr { [check_vect_slp_vnqihi_store_usage $pattern ] != 0 }]
> +}
> +
> +# Return the true if target support vectorization of v4qi store.
> +proc check_effective_target_vect_slp_v4qi_store { } {
> +    set pattern {add new stmt: MEM <vector\(4\) char>}
> +    return [expr { [check_vect_slp_vnqihi_store_usage $pattern ] != 0 }]
> +}
> +
> +# Return the true if target support vectorization of v2qi store.
> +proc check_effective_target_vect_slp_v8qi_store { } {
> +    set pattern {add new stmt: MEM <vector\(8\) char>}
> +    return [expr { [check_vect_slp_vnqihi_store_usage $pattern ] != 0 }]
> +}
> +
> +# Return the true if target support vectorization of v4qi store.
> +proc check_effective_target_vect_slp_v16qi_store { } {
> +    set pattern {add new stmt: MEM <vector\(16\) char>}
> +    return [expr { [check_vect_slp_vnqihi_store_usage $pattern ] != 0 }]
> +}
> +
> +# Return the true if target support vectorization of v2hi store.
> +proc check_effective_target_vect_slp_v2hi_store { } {
> +    set pattern {add new stmt: MEM <vector\(2\) short int>}
> +    return [expr { [check_vect_slp_vnqihi_store_usage $pattern ] != 0 }]
> +}
> +
> +# Return the true if target support vectorization of v2hi store.
> +proc check_effective_target_vect_slp_v4hi_store { } {
> +    set pattern {add new stmt: MEM <vector\(4\) short int>}
> +    return [expr { [check_vect_slp_vnqihi_store_usage $pattern ] != 0 }]
> +}
> +
>  # Return 1 if we can align stack data to the preferred vector alignment.
>  
>  proc check_effective_target_vect_align_stack_vars { } {
> 

Reply via email to