| /* Verify we do not get a bogus access function pairs with |
| exchanged dimensions, 0, {1, +, 1}_1 vs. {2B, +, 1}_1, 0 which |
| disambiguates both accesses and leads to vectorization. */ |
| extern int memcmp(const void *, const void *, __SIZE_TYPE__); |
| extern void abort (void); |
| short a[33] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31 }; |
| char * volatile ap_ = (char *)&a[0]; |
| #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__ |
| (*((char(*)[])&ap[i+2]))[0] = (*((char(*)[])&ap[0]))[i+1]; |
| if (memcmp (&a, &b, sizeof (a)) != 0) |