From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2089.outbound.protection.outlook.com [40.107.21.89]) by sourceware.org (Postfix) with ESMTPS id 3D7623875449 for ; Tue, 14 May 2024 15:00:21 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 3D7623875449 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 3D7623875449 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.21.89 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1715698823; cv=pass; b=BZkAGwdXYhLn1j05VkPPQdeZ4HLIPRpXeJR4FYZ1PCT4F84taJGAW4SHPKauFUXyFbIHntGVDk4B8X+G6k0Ass8/REe6KE+2xgNYADGGdSLdjFFl2aUGYnIV7WoZBhJSwJJSEJcGfAZK085W1hiLh8uTouny9rigjrdU0SAAYMs= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1715698823; c=relaxed/simple; bh=bGdbfQ0S/lBQNjwCIIjhX8D6sEBCxIT2fQNYiWuKZrs=; h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID: MIME-Version; b=nKzHnHvTIe2smc5RQo0Fh1166QVnmpkGPCRPif+gHASWRP6zvS/fHdmWyJRbMchP6wwm6lK3OD/Xqaj+QHIlPLb4pxL6rD7a+w645pAVzaEiHf0D3AYPdM+8AEsdbv5ipO2p7c3fX04Kn+ZyzZE0qlgmWChFXZC7ip7EcgBeKZ0= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=AiJ2fvvqFuKjCxrVGhqsLEMohJXRkqvCFRr4GEJgDgQzIuFJKhs71i1Xn++1Bv7BCFnhgsgQKm3oFFx/1DYEh360tH8GGgkE8SqZ9goJqgBliZGqzfflL5bi2GDSneZrDp+9EcS+LW35Y+FPEA56tQDk0KrPeXrLGVOmpWDIa3gP+s7yHrwgPRTvzEhR/caMEVcZSSXVtwHaiJoHw6YH/Pp1avZ8Am/lcFzOX1SNP9zXNF/jChEConJ9a/p2IaMatzzpEVFFR5qef+5AAAkKUqHuvstYgyHKkalxL4h+ywUQUUNACMpUfBUiNnGKCQjnI5r53cPo5ZcyAEd3LLwXVw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vvpaYNmrJPz9mQspgAIT7/WLvsG8Cw1jHwBWRtrdnR4=; b=m5dWyTzjtap3iOJWAJGBNFkdiJDPESjeQ2rX6UpqLItJ0/2mjxLu69EvxXz/4tHEesrIy4mM3NKZ15sCkjU9C0nNRFUUmPWdfNooAPW024PAyYMUTbS5h8dFwzyJtieQrtKhn5L6fVT6jUTbn3jaFWvU72XfsBFcu/WwbyaO+pPKJCnPkvksiNtPURhpikTiYx2pYl3oD9GcuX+WxJvJXDGlHrsNWf+w/+ulknGwQf1gG/1mKQ91AGmjBxWQ0YqFWcZVVHcaZf5+/fFMn0NMCLhjW1qCL3Pr/P9/xIpLOTb7EO7nV0J8LIIfBMKq/qqeMtixCadA1e+4AwQ/1V97zg== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vvpaYNmrJPz9mQspgAIT7/WLvsG8Cw1jHwBWRtrdnR4=; b=HktP1jxOUAuEdWPoUAKbKPoPtMOHuxrx80Js25RjQeie5cirtVy7+8aB5Zi8eZsNStAg61oCGr7ihM+0PzG3JyMmtcblG4A/PL0iAYWqAjB6RJ3KJp1sHPtuN5z3CX+pbFk0SAK1jJqZAlGFjlUdqNrmotPZOjTRu4Y2uXCcABM= Received: from AS4P189CA0030.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:5db::17) by PAWPR08MB8911.eurprd08.prod.outlook.com (2603:10a6:102:33c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.55; Tue, 14 May 2024 15:00:17 +0000 Received: from AM4PEPF00027A5F.eurprd04.prod.outlook.com (2603:10a6:20b:5db:cafe::ca) by AS4P189CA0030.outlook.office365.com (2603:10a6:20b:5db::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.55 via Frontend Transport; Tue, 14 May 2024 15:00:16 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM4PEPF00027A5F.mail.protection.outlook.com (10.167.16.74) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7587.21 via Frontend Transport; Tue, 14 May 2024 15:00:14 +0000 Received: ("Tessian outbound e46bb127ed3d:v315"); Tue, 14 May 2024 15:00:14 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: a7dcff4fe0762d93 X-CR-MTA-TID: 64aa7808 Received: from 30ce510dc0b3.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id D9284716-48C6-4676-9358-90D519BC5DC3.1; Tue, 14 May 2024 15:00:08 +0000 Received: from EUR02-AM0-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 30ce510dc0b3.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 14 May 2024 15:00:08 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SvY0nZhwuDLYI75mRtsJs/TvN1ftmfs7zrZitqKgVBfG0HgT+VU1nt0d4XaPQPkvbTZgtSDJlAZoPxq43IccsHyIUah18Ie+0O7k0YIeXWLF6LQNaGxQcWX5SwtpeoEtzZbhpgQDANi+ohdfvz0iVUmY3RdSfZMcMVYo/0gdVEFpnQ04trKrk+P7FvlIdI2fDQzKOUeYztz2uBgt4nl8hMWx9UrHI093MjpvCllw2h+Dxlik7INl2V//1joOl469UKIYKkoe+GTkR0xu5cI+n9iPA98KvH1Kpcg3ayV/qqgw9Oek4KViVmhbCWVgGa3NSeIH0hD0e+XXEvPlvg+pWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vvpaYNmrJPz9mQspgAIT7/WLvsG8Cw1jHwBWRtrdnR4=; b=i+ntg2U+W/pBJ4VXaNqB2OXv13zMtTkVVZ5c3DiJa3DYKODIkzoCJBlWNot2YvDt2rucZEho2BcF6f2tzSbDjPZPbuCiKrLeejadHwGh14/JbEh/UCZcigS3gMakH8WpnFJ2bFlzHl00ZcqzFsXbVWIvoDJKTOtPDhh/8lcMriVnw9f0H0wrNPh0/A4fA1m4v+Rx4LLX57MBKwYOh9uA7NGV1KsL4FG8nUG1RpZgiw1wNiTpQzbMqx9Ew5QEqeUZvZ6W5/gwPZfyZ4Wtu+oCWLc8qP/HyHvbyhBCRZIBWscKHcS9aL2ICm1YgqOoMZNtqgolsXe/Z29THyAijThqZg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vvpaYNmrJPz9mQspgAIT7/WLvsG8Cw1jHwBWRtrdnR4=; b=HktP1jxOUAuEdWPoUAKbKPoPtMOHuxrx80Js25RjQeie5cirtVy7+8aB5Zi8eZsNStAg61oCGr7ihM+0PzG3JyMmtcblG4A/PL0iAYWqAjB6RJ3KJp1sHPtuN5z3CX+pbFk0SAK1jJqZAlGFjlUdqNrmotPZOjTRu4Y2uXCcABM= Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; Received: from AS8PR08MB6678.eurprd08.prod.outlook.com (2603:10a6:20b:398::8) by VI1PR08MB5518.eurprd08.prod.outlook.com (2603:10a6:803:13a::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.55; Tue, 14 May 2024 15:00:06 +0000 Received: from AS8PR08MB6678.eurprd08.prod.outlook.com ([fe80::3b48:ae45:5b79:cc29]) by AS8PR08MB6678.eurprd08.prod.outlook.com ([fe80::3b48:ae45:5b79:cc29%5]) with mapi id 15.20.7544.052; Tue, 14 May 2024 15:00:06 +0000 Date: Tue, 14 May 2024 16:00:04 +0100 From: Andrew Carlotti To: gcc-patches@gcc.gnu.org Cc: Richard Sandiford Subject: [PATCH 12/12] aarch64: Extend aarch64_feature_flags to 128 bits Message-ID: <016dd9de-fb1c-2c3e-ecb9-ddf3620f8c47@e124511.cambridge.arm.com> References: <0c99ec88-434d-a9de-0e0e-c281cb2dff4d@e124511.cambridge.arm.com> Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0c99ec88-434d-a9de-0e0e-c281cb2dff4d@e124511.cambridge.arm.com> X-ClientProxiedBy: LO4P123CA0365.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:18e::10) To AS8PR08MB6678.eurprd08.prod.outlook.com (2603:10a6:20b:398::8) MIME-Version: 1.0 X-MS-TrafficTypeDiagnostic: AS8PR08MB6678:EE_|VI1PR08MB5518:EE_|AM4PEPF00027A5F:EE_|PAWPR08MB8911:EE_ X-MS-Office365-Filtering-Correlation-Id: bb01acf5-15de-4617-8dff-08dc74268fd7 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230031|366007|1800799015|376005; X-Microsoft-Antispam-Message-Info-Original: =?us-ascii?Q?bjbAGDv4SadkyDn8uwtM67HO+xGUcBgps+0N5H5LQY3iobvLRtk+mwxsGl25?= =?us-ascii?Q?rM4SaYaoCCUQOOGpd9GNkHetP7sFWmMpJEV1Ze+KY3xcw6SdWHv4NptcOEN2?= =?us-ascii?Q?Ri3lwqUX1xw5vTKSfT3hq+IzfLPNoM05kRNo/tvIJWAPBpLhmxr4P7vZA+S2?= =?us-ascii?Q?oSULacn75jIEFQy7CgK93TJeRP+qCP2mr+Ua21Sd1rnKRsUHky2Bg4IoFSFB?= =?us-ascii?Q?IRv2zZpfkxP0nwGFY7DOi4SGKrVRPXouuP2z1VmLUibP1V3g20zMo1w/6URM?= =?us-ascii?Q?a6kTVACSm/GC/Bo5U9K22uOdBZqZCampntHtYKdb6RX9I3vskH19oQ83DpeG?= =?us-ascii?Q?RnnKlWOUonLJ6aw9z80UU1Oa9omY68+j7vy2Nb+idLIfoxJeg9XfDRqrITp4?= =?us-ascii?Q?JdC9/nJLNn4L0uiDVpoLoELkNnaoquAzTNTSOqs/K4gm1F365tBA61ymuv3G?= =?us-ascii?Q?3vZH2fkooaBop6UOzgxkbE42XsRG77gIAVtC6cO/glwX3sstoeD/Q94gPfz3?= =?us-ascii?Q?rN63XvCEmx5kUgpLWbwQX1vhsflfkrXDVJiLDx+qU8VEcmQjzzyhlLjTPwak?= =?us-ascii?Q?uMBwisDhGviuWTLShO7tkj+HlXKuV0cqN/HV1c/K1xo9cDqE/H6em17/S3Kl?= =?us-ascii?Q?6sA4dCgfKd/3an+BnnIjZzaH+a/hNEIcpB5FaF/3MQQiwGqn3Wyl9Ej/MLhN?= =?us-ascii?Q?Ilrh8Y4J7xRl2Pqcz04PHwQzh6SwF5hJKaSExYVq12e5icT3uoKGJhtVQJ/W?= =?us-ascii?Q?CmD/TjmjQcxQYzBieEwIQ0duXBjskh3jkWWb1qtaQIPpJkNMzGrv/yIZo1YM?= =?us-ascii?Q?SDXdhtr8ziSpFBdI1zUz7z2grVHY4WKmRyIk34iGepGDBnpusdyo5Q7tVnhE?= =?us-ascii?Q?+C9sdh5dMAwM7RD/eoWmDiWPlYPTZUPo2KufU5MsbDoZVNmXR/BAAIUZ/TqW?= =?us-ascii?Q?7iD9BPtmbRSGB0DCvuvvUYxw22WOGLh3WHLEWNUGa/ZYWezcARvgK7WwinJA?= =?us-ascii?Q?Mh3vv2q+D5DTWZa4nv69Y5z0UxI01DYChEP1u5D9r/l8+LtO99wC/NC1i+mP?= =?us-ascii?Q?m7C9TEVISp0w2fEzzwzDdzIufCG/m9KWXKOJcJ2KPNz+nlCWJW4iUkDJxkSL?= =?us-ascii?Q?ar7oPx+oZKij5vrH4Z9d8JXZgf895u85Kfz/63ou8q1X1cbyvkyNM83s30+7?= =?us-ascii?Q?4JUTzYkrAsphLQhkIMLc4AlXsCLgTUQ5CGUf4M8BQx9yYRihxnvVsv9bf7hB?= =?us-ascii?Q?9IHm6CYjHy+7QaRoKEPNMRmItDKMKGwKg6W0iu8GZg=3D=3D?= X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR08MB6678.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366007)(1800799015)(376005);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5518 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM4PEPF00027A5F.eurprd04.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: b3ed9163-9b5e-4795-5970-08dc74268a78 X-Microsoft-Antispam: BCL:0;ARA:13230031|1800799015|376005|36860700004|35042699013|82310400017; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?AHE2l/x9sHK39DYS6SBNVZRMMhcN35CbmP8HckvWJ8oLe4G/aRFnz8SQBVaV?= =?us-ascii?Q?dfn+08MtHoCORRS0kxXarlYJp0kA+xZsb96yVEmRpe9Z0Zs6lDQkjz2gklOA?= =?us-ascii?Q?QHWzr0pYCnJ+JcaEOZ1rIcQvbrT4BRv1de1d8OSa22x326oOxOkZ33WLR9Do?= =?us-ascii?Q?k1/pIiyIyJ28jIwKiJ0dlXRFIw5VY8vI2x6Wd5xfbucW3YWIUUtaxeOUZojK?= =?us-ascii?Q?G1HLI2+FIAOs4JHEkSRKq4C0vlFkLG/ot0Mb7B+/M2i1e+lSQPc6TeEvYWdn?= =?us-ascii?Q?7HlwIg9qdkED+I64hyy/sbZSkMYz36R3uyh74LONzVHnY5lKeMkL4B5QqGxZ?= =?us-ascii?Q?C8tmFSK3zwtql9wfWWgQaOrBaGHrd7/X86Z3ZkvWHJwxEKAhbz8mhI3t6IM0?= =?us-ascii?Q?nJSDyOnIqssnTP+ORzlfSXwnPNpPNFr7r5LVwgHaLO22r8F/pLW49TdITxJ4?= =?us-ascii?Q?Fq1+ZMOtNrC3qy7IzXYO+kH26aYnGBHpYqLM4Z8fDv1QXkN1wl2sh0T4Frl0?= =?us-ascii?Q?uS/Dt4uAWTx6vktrsF8TSkQej2mwzQk1oJ6lXDFBzB23DMNdoE8+KYZq9Yl1?= =?us-ascii?Q?YYyGyvqUxaY+5gEB4pk6C7QNxuKO7rKrGyxwZuapoxZEQ/Rh7pvMV+pKLggH?= =?us-ascii?Q?ddZQtF1EiylIgHYrk3n+t8JXn3G4JNveHqoOjKiEDIuuKLMoqlHZASt8+Ws4?= =?us-ascii?Q?stxr0FrHc7lCOMO9339Zsh5FxFCQ17wrXTNwdlJ6OuLTiFoVBLMXevGjpR88?= =?us-ascii?Q?oaXIoRAvL6ICGug7AxVK6mxgRjJnyKCBb4N7eNd1baQOeFo2tJ5icXC8WtcK?= =?us-ascii?Q?++b9Dn3MewY0chCwwnqMV4iwyiLMq4gHmO0nax2QT+f37rVXwekxTDhKXziG?= =?us-ascii?Q?h19QAIJxcrv6tCvM5Co26738H4AuIkkhDJGakDLOW3DPu+L5XBxzRAxRl2Ud?= =?us-ascii?Q?H/UrELaT3OnVApIPIkVu3WdUnmxFpYlYdhSYsyPLlWcxcMo6d0YWs0+i/y/k?= =?us-ascii?Q?CtgRuQ0khMsKwGlHEEQJLVsLN+gN4wPlSGzpo7qTWwzr5wFSbqeu5/5E4Gxe?= =?us-ascii?Q?SifMLqQGJYT0AVu2M8lHwJdft+VHfO8HCvRkBEAUTCZfoUaUZ1gm4th034Sy?= =?us-ascii?Q?9Xm85VVYUPxtzJ9v+EYHQk7vrcRwT5zDBh1Le2HFZRZcKkRf0Hhxi5R+DeVM?= =?us-ascii?Q?h3j5rCmxhwDpDNHipvFf4pZDOUxyULiabg81xl/LdLCleqgQiiXaENXJeK4z?= =?us-ascii?Q?YCAK4Zbaf7hWJ6u2WMKKBK9d7iNH2SjrXooJpnn8SpfeynwA3/Cs2rHx3mSR?= =?us-ascii?Q?1cQnbiPydmiN19ozsQiUjTa7skVrZkEAYpezLygtA1Ucz2sprdybJLe66Ne1?= =?us-ascii?Q?+oXDp/YiKgf4BDSD+oM212Z50eJR?= X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230031)(1800799015)(376005)(36860700004)(35042699013)(82310400017);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 May 2024 15:00:14.9834 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: bb01acf5-15de-4617-8dff-08dc74268fd7 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM4PEPF00027A5F.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR08MB8911 X-Spam-Status: No, score=-12.5 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO,GIT_PATCH_0,KAM_LOTSOFHASH,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE,TXREP,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: Replace the existing typedef with a new class containing two private uint64_t members. Most of the preparatory work was carried out in previous commits. The most notable remaining changes are the addition of the get_isa_mode and with_isa_mode functions for conversion to or from aarch64_isa_mode types, and the use of a 'save' member function from within aarch64_set_asm_isa_flags, to avoid needing to expose the uint64_t members. gcc/ChangeLog: * common/config/aarch64/aarch64-common.cc (aarch64_set_asm_isa_flags): Use new flags.save function. * config/aarch64/aarch64-opts.h (class aarch64_feature_flags): New class. (aarch64_feature_flags_from_index): Update to handle 128 bits. (AARCH64_NO_FEATURES): Pass a second constructor parameter. * config/aarch64/aarch64.cc (aarch64_guard_switch_pstate_sm): Extract isa mode explicitly. (aarch64_expand_epilogue): Ditto. (aarch64_expand_call): Ditto (aarch64_set_current_function): Set/extract isa mode explicitly. * config/aarch64/aarch64.h (aarch64_get_asm_isa_flags): Use new option struct member. (aarch64_get_isa_flags): Use new option struct member. (aarch64_asm_isa_flags): Use second global variable. (aarch64_isa_flags): Ditto. (AARCH64_FL_ISA_MODES): Pass a second constructor parameter. (AARCH64_FL_DEFAULT_ISA_MODE): Ditto. (AARCH64_ISA_MODE): Extract isa mode explicitly. * config/aarch64/aarch64.opt (aarch64_asm_isa_flags_1): Add a second uint64_t for bitmask. (aarch64_isa_flags_1): Ditto. diff --git a/gcc/common/config/aarch64/aarch64-common.cc b/gcc/common/config/aarch64/aarch64-common.cc index 9f583bb80456709e0028c358a1bad23ad59f20f4..a84650086ba9a1054f3ba15022567a00b7fb4313 100644 --- a/gcc/common/config/aarch64/aarch64-common.cc +++ b/gcc/common/config/aarch64/aarch64-common.cc @@ -67,18 +67,18 @@ static const struct default_options aarch_option_optimization_table[] = }; -/* Set OPTS->x_aarch64_asm_isa_flags_0 to FLAGS and update - OPTS->x_aarch64_isa_flags_0 accordingly. */ +/* Set OPTS->x_aarch64_asm_isa_flags_<0..n> to FLAGS and update + OPTS->x_aarch64_isa_flags_<0..n> accordingly. */ void aarch64_set_asm_isa_flags (gcc_options *opts, aarch64_feature_flags flags) { - opts->x_aarch64_asm_isa_flags_0 = flags; + flags.save(&opts->x_aarch64_asm_isa_flags_0, &opts->x_aarch64_asm_isa_flags_1); if (opts->x_target_flags & MASK_GENERAL_REGS_ONLY) { constexpr auto flags_mask = ~feature_deps::get_flags_off (AARCH64_FL_FP); flags &= flags_mask; } - opts->x_aarch64_isa_flags_0 = flags; + flags.save(&opts->x_aarch64_isa_flags_0, &opts->x_aarch64_isa_flags_1); } /* Implement TARGET_HANDLE_OPTION. diff --git a/gcc/config/aarch64/aarch64-opts.h b/gcc/config/aarch64/aarch64-opts.h index 80926a008aa2ed7dffa79aaa425dd3d7fc9d2581..7571385740d5271ab99bcc3380899a550788592d 100644 --- a/gcc/config/aarch64/aarch64-opts.h +++ b/gcc/config/aarch64/aarch64-opts.h @@ -25,17 +25,110 @@ #ifndef USED_FOR_TARGET typedef uint64_t aarch64_isa_mode; -typedef uint64_t aarch64_feature_flags; - constexpr unsigned int AARCH64_NUM_ISA_MODES = (0 #define DEF_AARCH64_ISA_MODE(IDENT) + 1 #include "aarch64-isa-modes.def" ); +class aarch64_feature_flags +{ +private: + uint64_t flags0; + uint64_t flags1; + +public: + constexpr aarch64_feature_flags (uint64_t flags0_m, uint64_t flags1_m) + : flags0 (flags0_m), flags1 (flags1_m) {} + aarch64_feature_flags () = default; + + void save(uint64_t *save0, uint64_t *save1) + { + *save0 = flags0; + *save1 = flags1; + } + + constexpr aarch64_isa_mode get_isa_mode () + { + return flags0 & ((1 << AARCH64_NUM_ISA_MODES) - 1); + } + + constexpr aarch64_feature_flags with_isa_mode (const aarch64_isa_mode mode) const + { + return aarch64_feature_flags ((flags0 & ~((1 << AARCH64_NUM_ISA_MODES) - 1)) | mode, + flags1); + } + + constexpr aarch64_feature_flags operator&(const aarch64_feature_flags other) const + { + return aarch64_feature_flags (flags0 & other.flags0, + flags1 & other.flags1); + } + + aarch64_feature_flags operator&=(const aarch64_feature_flags other) + { + flags0 &= other.flags0; + flags1 &= other.flags1; + return *this; + } + + constexpr aarch64_feature_flags operator|(const aarch64_feature_flags other) const + { + return aarch64_feature_flags (flags0 | other.flags0, + flags1 | other.flags1); + } + + aarch64_feature_flags operator|=(const aarch64_feature_flags other) + { + flags0 |= other.flags0; + flags1 |= other.flags1; + return *this; + } + + constexpr aarch64_feature_flags operator^(const aarch64_feature_flags other) const + { + return aarch64_feature_flags (flags0 ^ other.flags0, + flags1 ^ other.flags1); + } + + aarch64_feature_flags operator^=(const aarch64_feature_flags other) + { + flags0 ^= other.flags0; + flags1 ^= other.flags1; + return *this; + } + + constexpr aarch64_feature_flags operator~() const + { + return aarch64_feature_flags (~flags0, ~flags1); + } + + constexpr bool operator!() const + { + return !flags0 && !flags1; + } + + constexpr explicit operator bool() const + { + return ((bool) flags0) || ((bool) flags1); + } + + constexpr bool operator==(const aarch64_feature_flags other) const + { + return flags0 == other.flags0 && flags1 == other.flags1; + } + + constexpr bool operator!=(const aarch64_feature_flags other) const + { + return flags0 != other.flags0 || flags1 != other.flags1; + } + +}; + #define aarch64_feature_flags_from_index(index) \ - (aarch64_feature_flags (uint64_t (1) << index)) + (aarch64_feature_flags ((index < 64) ? uint64_t (1) << index : 0, \ + (index >= 64) ? uint64_t (1) << (index - 64) : 0)) -#define AARCH64_NO_FEATURES aarch64_feature_flags (0) +#define AARCH64_NO_FEATURES aarch64_feature_flags (0, 0) #endif /* The various cores that implement AArch64. */ diff --git a/gcc/config/aarch64/aarch64.h b/gcc/config/aarch64/aarch64.h index dd3437214e1597f03ac947a09c124ea0b04e27e8..12e5b244f28ab04cf1ecc72d2255bea179f97678 100644 --- a/gcc/config/aarch64/aarch64.h +++ b/gcc/config/aarch64/aarch64.h @@ -23,17 +23,21 @@ #define GCC_AARCH64_H #define aarch64_get_asm_isa_flags(opts) \ - (aarch64_feature_flags ((opts)->x_aarch64_asm_isa_flags_0)) + (aarch64_feature_flags ((opts)->x_aarch64_asm_isa_flags_0, \ + (opts)->x_aarch64_asm_isa_flags_1)) #define aarch64_get_isa_flags(opts) \ - (aarch64_feature_flags ((opts)->x_aarch64_isa_flags_0)) + (aarch64_feature_flags ((opts)->x_aarch64_isa_flags_0, \ + (opts)->x_aarch64_isa_flags_1)) /* Make these flags read-only so that all uses go via aarch64_set_asm_isa_flags. */ #ifdef GENERATOR_FILE #undef aarch64_asm_isa_flags -#define aarch64_asm_isa_flags (aarch64_feature_flags (aarch64_asm_isa_flags_0)) +#define aarch64_asm_isa_flags (aarch64_feature_flags (aarch64_asm_isa_flags_0,\ + aarch64_asm_isa_flags_1)) #undef aarch64_isa_flags -#define aarch64_isa_flags (aarch64_feature_flags (aarch64_isa_flags_0)) +#define aarch64_isa_flags (aarch64_feature_flags (aarch64_isa_flags_0, \ + aarch64_isa_flags_1)) #else #undef aarch64_asm_isa_flags #define aarch64_asm_isa_flags (aarch64_get_asm_isa_flags (&global_options)) @@ -209,14 +213,14 @@ constexpr auto AARCH64_ISA_MODE_SM_STATE ATTRIBUTE_UNUSED /* The mask of all ISA modes. */ constexpr auto AARCH64_FL_ISA_MODES - = (aarch64_feature_flags (1) << AARCH64_NUM_ISA_MODES) - 1; + = aarch64_feature_flags ((1 << AARCH64_NUM_ISA_MODES) - 1, 0); /* The default ISA mode, for functions with no attributes that specify something to the contrary. */ constexpr auto AARCH64_DEFAULT_ISA_MODE ATTRIBUTE_UNUSED = AARCH64_ISA_MODE_SM_OFF; constexpr auto AARCH64_FL_DEFAULT_ISA_MODE ATTRIBUTE_UNUSED - = aarch64_feature_flags (AARCH64_DEFAULT_ISA_MODE); + = aarch64_feature_flags (AARCH64_DEFAULT_ISA_MODE, 0); #endif @@ -229,7 +233,7 @@ constexpr auto AARCH64_FL_DEFAULT_ISA_MODE ATTRIBUTE_UNUSED #define AARCH64_ISA_SM_OFF (aarch64_isa_flags & AARCH64_FL_SM_OFF) #define AARCH64_ISA_SM_ON (aarch64_isa_flags & AARCH64_FL_SM_ON) #define AARCH64_ISA_ZA_ON (aarch64_isa_flags & AARCH64_FL_ZA_ON) -#define AARCH64_ISA_MODE (aarch64_isa_mode) (aarch64_isa_flags & AARCH64_FL_ISA_MODES) +#define AARCH64_ISA_MODE (aarch64_isa_flags.get_isa_mode()) #define AARCH64_ISA_V8A (aarch64_isa_flags & AARCH64_FL_V8A) #define AARCH64_ISA_V8_1A (aarch64_isa_flags & AARCH64_FL_V8_1A) #define AARCH64_ISA_CRC (aarch64_isa_flags & AARCH64_FL_CRC) diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc index 052cf297e7672abf015a085ab357836cb3b235e4..f9efb462d75b9e536b89ef6d48bc5852a480cb8c 100644 --- a/gcc/config/aarch64/aarch64.cc +++ b/gcc/config/aarch64/aarch64.cc @@ -19083,7 +19083,7 @@ aarch64_set_current_function (tree fndecl) aarch64_pragma_target_parse. */ if (old_tree == new_tree && (!fndecl || aarch64_previous_fndecl) - && (aarch64_isa_mode) (isa_flags & AARCH64_FL_ISA_MODES) == new_isa_mode) + && isa_flags.get_isa_mode() == new_isa_mode) { gcc_assert (AARCH64_ISA_MODE == new_isa_mode); return; @@ -19098,11 +19098,10 @@ aarch64_set_current_function (tree fndecl) /* The ISA mode can vary based on function type attributes and function declaration attributes. Make sure that the target options correctly reflect these attributes. */ - if ((aarch64_isa_mode) (isa_flags & AARCH64_FL_ISA_MODES) != new_isa_mode) + if (isa_flags.get_isa_mode() != new_isa_mode) { - auto base_flags = (aarch64_asm_isa_flags & ~AARCH64_FL_ISA_MODES); - aarch64_set_asm_isa_flags (base_flags - | (aarch64_feature_flags) new_isa_mode); + auto new_flags = aarch64_asm_isa_flags.with_isa_mode (new_isa_mode); + aarch64_set_asm_isa_flags (new_flags); aarch64_override_options_internal (&global_options); new_tree = build_target_option_node (&global_options, diff --git a/gcc/config/aarch64/aarch64.opt b/gcc/config/aarch64/aarch64.opt index 45aab49de27bdfa0fb3f67ec06c7dcf0ac242fb3..2f90f10352af75f70112d07894ab200f48b143f4 100644 --- a/gcc/config/aarch64/aarch64.opt +++ b/gcc/config/aarch64/aarch64.opt @@ -33,9 +33,15 @@ enum aarch64_arch selected_arch = aarch64_no_arch TargetVariable uint64_t aarch64_asm_isa_flags_0 = 0 +TargetVariable +uint64_t aarch64_asm_isa_flags_1 = 0 + TargetVariable uint64_t aarch64_isa_flags_0 = 0 +TargetVariable +uint64_t aarch64_isa_flags_1 = 0 + TargetVariable unsigned aarch_enable_bti = 2