From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtpout30.security-mail.net (smtpout30.security-mail.net [85.31.212.35]) by sourceware.org (Postfix) with ESMTPS id C68563865C12 for ; Tue, 12 Sep 2023 10:12:54 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org C68563865C12 Authentication-Results: sourceware.org; dmarc=pass (p=quarantine dis=none) header.from=kalrayinc.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=kalrayinc.com Received: from localhost (fx305.security-mail.net [127.0.0.1]) by fx305.security-mail.net (Postfix) with ESMTP id DC25430F5D1 for ; Tue, 12 Sep 2023 12:12:53 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kalrayinc.com; s=sec-sig-email; t=1694513573; bh=49NEUIGg7AGno0Aow/MlHZYMUsKsO5x7MYwHHtRxV/w=; h=From:To:CC:Subject:Date:References:In-Reply-To; b=Ma+LFVRZ1kps4AxWc7nEGXXmLeiqqKkYWTVMMzILxAY382gWzdeUzTc7kFYwz5S5z Owe8hUCE23Z7tibhfgSDr7BWDhtt4hw84UmArKc4/t7scxmBr8oL2YUpRABrmty0VD iOAR5VMgfh7u21k6mhVC3CoFOnKAbbQ4wH1oG9eA= Received: from fx305 (fx305.security-mail.net [127.0.0.1]) by fx305.security-mail.net (Postfix) with ESMTP id ADDF030F5BF; Tue, 12 Sep 2023 12:12:53 +0200 (CEST) Received: from FRA01-PR2-obe.outbound.protection.outlook.com (mail-pr2fra01on0105.outbound.protection.outlook.com [104.47.24.105]) by fx305.security-mail.net (Postfix) with ESMTPS id E967830F36B; Tue, 12 Sep 2023 12:12:52 +0200 (CEST) Received: from PR1P264MB3448.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:184::6) by PR0P264MB1530.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:16d::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.35; Tue, 12 Sep 2023 10:12:52 +0000 Received: from PR1P264MB3448.FRAP264.PROD.OUTLOOK.COM ([fe80::ad9:f173:8a66:3461]) by PR1P264MB3448.FRAP264.PROD.OUTLOOK.COM ([fe80::ad9:f173:8a66:3461%7]) with mapi id 15.20.6768.029; Tue, 12 Sep 2023 10:12:52 +0000 X-Virus-Scanned: E-securemail Secumail-id: ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KulB61SbaQF4xl/i1MB78BWxbmN0dy0DN1POM74g2rE9ik9vZ1picUDx4KADG/SRmbe1UtUJV12sDnq+LXxBPbsjg914qkm9SezQ1hK5swWw5az154umkGe3Ocy9MVmssklIQb1VvHvbn2KywFpGN0hr1xYXhJpeTO7XQ0KriKAps671eqZly/LrUR2wYuY4O1sAto9TFpzrPyltOisMO6Z8U1WSZurFS381CyhpCiH1ICjRJvzkhKLFHtsj3YRqXu+aqeD9+Au2HORlh3j4QsQKEIeWHh6lq+YMWjHjZjZNaQyjbEWr7mZANkExDTVpjOxs9MQxm3oBDFnv4tyOWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6bCnUt8le5KPLvhxWewY8ZxafRk7neHcc90op4Wo20w=; b=IrYHRGOHLBQSEIt9DD6mI5M/2hoFeWocyTv6yNMjGtoNOFE7Sjg4l2WOZzz2TwG+BUb+64NNTF5OKmvbl7CKbFIeNvLmTSg/GnX9p0Ogq4hgUy39e4wOPKiwGabF3rbtiHxtssqQFDnMRBmqd7nU+cwWnCthmKoKjkqg2XG7bcwWluWh+G0XyGQZeHtMCEZbZSRjSIsfuL6l66xERV/mOVxjW379QRHDd1/Hspjz0lw+TMswJ92fN+CABzmb8PY6xnl3IXcq6DA9WgmI2VIN/Np0XXhgtjYFZZVkgQ+oLIxL21xUH1xWscC1u+BkSaMMLhbmLaBTv6LpwGUpjQHrmQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kalrayinc.com; dmarc=pass action=none header.from=kalrayinc.com; dkim=pass header.d=kalrayinc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kalrayinc.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6bCnUt8le5KPLvhxWewY8ZxafRk7neHcc90op4Wo20w=; b=TypcGNhJH/LzLxslCRyMinxX9zJQ+8YjC5MpKYyMbva5qO4qkYBsqNAcDSfyidn6Naq04j8+LskG/QodxJLOCOr15nbV7NjWkzKEXxqQ80kFCHaShdMyTgiswjyKW/RGIk7hzDS2HoZ4R1foMXGhb80Q4s4U/Z08nF91R4LOrQUJc6cMnCSbJ4/EjG+6i7UAiS6aIaGgA9w6mPDUyQeqYuKcCItq3P8ig6Z0UUSobE+38gJdbdzTdG1tfq00l7tH9jNlQb/aoEiPpU/6Vnk4oVu0E/9zDzp4kioL5w4Xj4KskkScSnPQd39oBMU3U3001LdF9VNWg9mgjPsNHzpehA== From: Sylvain Noiry To: Richard Biener CC: gcc@gcc.gnu.org, Paul Iannetta , Benoit Dinechin Subject: Re: [RFC] Exposing complex numbers to target backends Thread-Topic: [RFC] Exposing complex numbers to target backends Thread-Index: AQHZr1Gif+OatQ2Fi0+WqaI+jAlgsK+slA2AgAAub9WAEPtrU4BZppDl Date: Tue, 12 Sep 2023 10:12:52 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-us X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kalrayinc.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PR1P264MB3448:EE_|PR0P264MB1530:EE_ x-ms-office365-filtering-correlation-id: 736ec63a-58a3-41be-c52c-08dbb378d308 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: zGd85Rqy876SYR/+VlIkpdTpzpN4nFXUE6uU+zCS+bPFU26euCNS4z2rADdFdIoEZ6OMs58bf5tFjLcORv+SE0Yv5OcZDgSYSQRHij2BY8+4iwpQ7skd8qTXRstKC0YdT8ZzTK+DxECjL9JTCggqyoTr010M4T1hxMtaRFE7nHe4tBW8fKMFEWKWeCJoAhWmcc3dbBSF554ZKyj3ZPW2W43UO1C2Zb/0yujJogXRJjZFqGdejskNoD8/yuWldSDNOy+8REMb0KvzxpLB9eX9JFTBwu9fK6GI64yG9YHVsDwSmm1pouRFhzviGfvZugmfFpNJIt71PfFPBShKzc90hXjiPxLMSXWW9A/BXaSoD0uzFc5XiuVCZvqo/07GwvWUDxPJ8SgOTnDp2UngSXuxKZoKYbk412DL+tw1yI0iYaDF7xzP5MVPayDPP7szckgDgXg/yxAWHO/wCvqBJhPRmWOqpKvSysXrNdfX3ZXL3MzzDwkWrYmm/kuXPVmieziGkeezkzq1LwOB2AhMs7dP8qi0SB00sOxpo6WMATE90gTCuiy1vnIYCVRpveNrU9CkmZmGqiNQAygRP4r0meeP8dWObX3R7C/3g7tFfamxC+Y= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PR1P264MB3448.FRAP264.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230031)(376002)(39860400002)(136003)(396003)(346002)(366004)(1800799009)(186009)(451199024)(21615005)(76116006)(91956017)(2906002)(107886003)(86362001)(83380400001)(53546011)(6506007)(7696005)(26005)(166002)(55016003)(38070700005)(9686003)(122000001)(33656002)(71200400001)(478600001)(38100700002)(5660300002)(52536014)(8676002)(54906003)(8936002)(66446008)(19627405001)(66556008)(64756008)(66476007)(4326008)(6916009)(66946007)(316002)(41300700001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: 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 pDFg+0fwGFCoRiZN4Xq+KJps3k8hGUTHSx3Uo/P5KxZOnU6BWZY3HdW9VT/xD9fx8EJ7MFvAlbP4A7+K3iAxzy0REezg/MB3ibs5hYY+LUjwyDt6LCW/gFeFvZARjA0TgrdhVqw1tQ96fCQcdGi/8nBrMWXcTpssDKxjZL3xRTUSr8SJL0UJLAfcEheyP9KEvGRgc7Ni+eaIwwtOb8Uwi2vSTApqJKp+zp0RJr68tumVYgTjCNI5peAD6up+XfmcCtWblPKwee4FpJ7AXHrTbEwr5IM8ITwZvioU52GUXVXwANTCaRo3ibdsAarPTU1CEAZ51zSpbXbEY3HBmXGkyxKz+CitFKnbpEhoh7VaBVPJVZItYyvZuqSYFOG/zX4VX9BU56htwLhb/rLkwcgiZnMMPhdCA7azNDQ5NlqAfciY6RdE6nGrlilWdNJNO3lWmfDjdHmw/6o4Y3K+EO4my304dWIR592EACP2ixsnxgP9Y+G/SGqOy7Yc5ZbkVphJculL0Oq2guuu6ANYgxAT5OxnuvgXgAiwbjnIz9/s7+x0yC4P8OW4F4I4mwII8WRpdswgCvSrz/qlrOytfrNaNo/euJqXbTrn+rk1c0mUeJ1Phcc15RYVFVZTw8GIKIjT Content-Type: multipart/alternative; boundary=secu_1accf272842d5cc1993f918f607bb5f7_part1 MIME-Version: 1.0 X-OriginatorOrg: kalrayinc.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PR1P264MB3448.FRAP264.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 736ec63a-58a3-41be-c52c-08dbb378d308 X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Sep 2023 10:12:52.0740 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 8931925d-7620-4a64-b7fe-20afd86363d3 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: YUystWMs706TdezYvJziMIOjkBA6Um1pzgChHwc4pmeEMb1Z86Az0Y9QRw6Ph/Z6QfhHN4SZWHto7H+cP6Sv/A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR0P264MB1530 X-ALTERMIMEV2_out: done X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HTML_MESSAGE,KAM_SHORT,LONG_INVISIBLE_TEXT,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: This message is in MIME format. --secu_1accf272842d5cc1993f918f607bb5f7_part1 Content-Type: text/plain; charset=utf-8 Hi, > [...] > I have sent a little bit earlier a series of patches which describes my > implementation of the support for native complex operations. There are > 8 generic patches and 1 experimental x86 patch which exploits a portion > of the added features. > [...] I've updated my series of patches. Except bug fixes, two major changes have been done. Everything is explained in the message "[PATCH v2 0/11] Native complex operations" [1]. With Paul Iannetta, we will present our work on complex numbers in gcc at the GNU Cauldron 2023 ! [1] : "https://gcc.gnu.org/pipermail/gcc-patches/2023-September/630011.html" Best regards, Sylvain ________________________________ From: Sylvain Noiry Sent: Monday, July 17, 2023 11:18 AM To: Richard Biener Cc: gcc@gcc.gnu.org ; Paul Iannetta ; Benoit Dinechin Subject: Re: [RFC] Exposing complex numbers to target backends Hi, > [...] > You can find my code in this repo "https://github.com/ElectrikSpace/gcc.git" > The implementation was originally done against the main dev branch of the KVX port, > and the working proof of concept is located in the "complex/kvx" branch. > I've also tried to apply the patch of GCC master branch today, with a minimal > adaptation of the x86 backend, in "the complex/x86" branch. > Both branches have the same generic patch (that I will split later) plus a backend > specific patch. I'm a little bit lost in the x86 backend, so it's not very usable > for now, but I will work on it. I have sent a little bit earlier a series of patches which describes my implementation of the support for native complex operations. There are 8 generic patches and 1 experimental x86 patch which exploits a portion of the added features. The initial message called "[PATCH 0/9] Native complex operations" [1] explains the implementation details and illustrate it with some examples, mainly on KVX because the backend implements all the features and the ISA has native complex instructions. Some implementation details need to be discussed, especially concerning vectors of complex elements and the merge with the work from Arm. [1] : "https://gcc.gnu.org/pipermail/gcc-patches/2023-July/624644.html" Best regards, Sylvain --secu_1accf272842d5cc1993f918f607bb5f7_part1--