3 /* Verify we do not get a bogus access function pairs with
4 exchanged dimensions, 0, {1, +, 1}_1 vs. {2B, +, 1}_1, 0 which
5 disambiguates both accesses and leads to vectorization. */
7 extern int memcmp(const void *, const void *, __SIZE_TYPE__
);
8 extern void abort (void);
9 short a
[33] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31 };
11 char * volatile ap_
= (char *)&a
[0];
14 #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
17 if (sizeof (short) == 2)
19 for (i
= 0; i
< 64; ++i
)
21 (*((char(*)[])&ap
[i
+2]))[0] = (*((char(*)[])&ap
[0]))[i
+1];
23 if (memcmp (&a
, &b
, sizeof (a
)) != 0)