From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on2055.outbound.protection.outlook.com [40.107.7.55]) by sourceware.org (Postfix) with ESMTPS id 06E003858C36 for ; Thu, 27 Jul 2023 09:02:11 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 06E003858C36 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LrgR0WiW7pXeHPkqdJfA6d0podGCtU7/0qdtUheRkdI=; b=SuP5LaS+F6X8g0foh1pKY2HzUQoco6hzEvb3mFS1ZckVHmwdCo6rD349Hcfmx9TGUHEWRSHv61tamBEKVV6/botBDcL0aWI10axHH9T1w0ysgEWIAmzcyC/ySrJ8hqCn5EtMWtSH+LbFJAQaHZe6VXs99Y4vpM8mmc5e1R7xtSA= Received: from DU2P250CA0023.EURP250.PROD.OUTLOOK.COM (2603:10a6:10:231::28) by DB9PR08MB6347.eurprd08.prod.outlook.com (2603:10a6:10:253::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.29; Thu, 27 Jul 2023 09:02:05 +0000 Received: from DBAEUR03FT018.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:231:cafe::95) by DU2P250CA0023.outlook.office365.com (2603:10a6:10:231::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.29 via Frontend Transport; Thu, 27 Jul 2023 09:02:05 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DBAEUR03FT018.mail.protection.outlook.com (100.127.142.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.29 via Frontend Transport; Thu, 27 Jul 2023 09:02:05 +0000 Received: ("Tessian outbound ba2f3d95109c:v145"); Thu, 27 Jul 2023 09:02:05 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 8cbccc85e24b04ed X-CR-MTA-TID: 64aa7808 Received: from 5345792a43ba.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 15E4B006-E75F-493D-AF4E-85F1DFD41318.1; Thu, 27 Jul 2023 09:01:58 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5345792a43ba.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 27 Jul 2023 09:01:58 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Rm87XoE4C7zN4lz4iurOCljmTQC/s+dRXcCsb8vc+4remZs6b1ULdoGZZGGae34Grkbfh5Ci3A8SrPtSqKYHOh2BQWPqFapBSP3D3z2aUlMX5F2icVJit4sNA9wKmp8ltiUpmYGuGJm4R6zfAaRNMRwZHztXLjjtaJ2rN+K+qPZRmG1ZsksFV98oyXrQ/ktxZZu5wyrpH7FICmLFaXB61vzgtKGtD6Rwyv6UHnK+s3QOT49yqL5wJyvCv6bjxDw+LFjqt4TTWKrjuuDJVYkcL70uSgnClRqh5pCkz65ynA9XpQiIm2biZ76Da+zBKtZCmf/D0/yCReqoKtieHtaLDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LrgR0WiW7pXeHPkqdJfA6d0podGCtU7/0qdtUheRkdI=; b=POr8yYuU2E10a1+akBkw1Dwhu1otiTpCsJ/gzzioY3fpVjSq2yjVfIQYd8JTNs0Pxzib3HFmJiJc9E+h4E53PTHL7Lhxl5LO2ajgB/LkrEsjz0d/0J3jmMI7c9vm4tJRJSCbwkhyklNiQErGaJ1elHRjkXiKALj+eo7wD/6s+OIfyvoe9C4CPqIj9UpNpYXn02tc1MEAZJR7/NqJRXfw8b2oPe+Msy1IEW97fvoaO07tfWcOathPGCIKgz5nH6ZAbCFs7uFTtGBx6LNY3cENDlh5xtBHMcKwyPFNdk/iFtlvAJvPHaqKNDkiAXsRKQZy4R9Ge3Zm8iOoDcjKR4E/IA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LrgR0WiW7pXeHPkqdJfA6d0podGCtU7/0qdtUheRkdI=; b=SuP5LaS+F6X8g0foh1pKY2HzUQoco6hzEvb3mFS1ZckVHmwdCo6rD349Hcfmx9TGUHEWRSHv61tamBEKVV6/botBDcL0aWI10axHH9T1w0ysgEWIAmzcyC/ySrJ8hqCn5EtMWtSH+LbFJAQaHZe6VXs99Y4vpM8mmc5e1R7xtSA= Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; Received: from VI1PR08MB3919.eurprd08.prod.outlook.com (2603:10a6:803:c4::31) by GV2PR08MB8439.eurprd08.prod.outlook.com (2603:10a6:150:ba::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6609.33; Thu, 27 Jul 2023 09:01:53 +0000 Received: from VI1PR08MB3919.eurprd08.prod.outlook.com ([fe80::8a62:27dd:fe3c:cefd]) by VI1PR08MB3919.eurprd08.prod.outlook.com ([fe80::8a62:27dd:fe3c:cefd%7]) with mapi id 15.20.6631.026; Thu, 27 Jul 2023 09:01:52 +0000 Message-ID: <317fa7b7-800e-87e0-1118-acaf9d1c1008@arm.com> Date: Thu, 27 Jul 2023 10:01:50 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH v3 05/16] [gdb/aarch64] sme: Enable SME registers and pseudo-registers To: Thiago Jung Bauermann Cc: gdb-patches@sourceware.org References: <20230630134616.1238105-1-luis.machado@arm.com> <20230630134616.1238105-6-luis.machado@arm.com> <87pm4e8ms4.fsf@linaro.org> Content-Language: en-US From: Luis Machado In-Reply-To: <87pm4e8ms4.fsf@linaro.org> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-ClientProxiedBy: LO4P265CA0044.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:2ac::23) To VI1PR08MB3919.eurprd08.prod.outlook.com (2603:10a6:803:c4::31) MIME-Version: 1.0 X-MS-TrafficTypeDiagnostic: VI1PR08MB3919:EE_|GV2PR08MB8439:EE_|DBAEUR03FT018:EE_|DB9PR08MB6347:EE_ X-MS-Office365-Filtering-Correlation-Id: 697ada48-5e56-45a6-7d79-08db8e8026a9 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3919.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(4636009)(366004)(136003)(376002)(396003)(39860400002)(346002)(451199021)(31696002)(86362001)(36756003)(31686004)(30864003)(2906002)(478600001)(38100700002)(8936002)(26005)(186003)(6506007)(2616005)(53546011)(44832011)(8676002)(66476007)(41300700001)(5660300002)(6512007)(6486002)(83380400001)(316002)(4326008)(66946007)(6916009)(66556008)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV2PR08MB8439 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DBAEUR03FT018.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 84487291-b536-424c-d604-08db8e801eaf X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230028)(4636009)(346002)(39860400002)(396003)(136003)(376002)(82310400008)(451199021)(46966006)(36840700001)(40470700004)(2906002)(6486002)(30864003)(2616005)(36756003)(336012)(186003)(44832011)(5660300002)(86362001)(83380400001)(36860700001)(47076005)(31696002)(31686004)(40460700003)(41300700001)(8676002)(6862004)(316002)(8936002)(26005)(6506007)(53546011)(70206006)(6512007)(356005)(4326008)(70586007)(478600001)(40480700001)(81166007)(82740400003)(43740500002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jul 2023 09:02:05.8500 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 697ada48-5e56-45a6-7d79-08db8e8026a9 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DBAEUR03FT018.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6347 X-Spam-Status: No, score=-11.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,FORGED_SPF_HELO,GIT_PATCH_0,KAM_DMARC_NONE,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE,TXREP,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On 7/26/23 21:01, Thiago Jung Bauermann wrote: > > Hello, > > Just minor nits... > > > Luis Machado via Gdb-patches writes: > >> The SME (Scalable Matrix Extension) [1] exposes a new matrix register ZA with >> variable sizes. It also exposes a new mode called streaming mode. >> >> Similarly to SVE, the ZA register size is dictated by a vector length, but the >> SME vector length is called streaming vetor length. The total size for > > s/vetor/vector/ > Fixed. >> diff --git a/gdb/aarch64-linux-nat.c b/gdb/aarch64-linux-nat.c >> index a775631e9ec..cb97b205c86 100644 >> --- a/gdb/aarch64-linux-nat.c >> +++ b/gdb/aarch64-linux-nat.c >> @@ -55,6 +55,7 @@ >> #include "arch/aarch64-mte-linux.h" >> >> #include "nat/aarch64-mte-linux-ptrace.h" >> +#include "arch/aarch64-scalable-linux.h" >> >> #include >> >> @@ -313,8 +314,11 @@ store_fpregs_to_thread (const struct regcache *regcache) >> } >> } >> >> -/* Fill GDB's register array with the sve register values >> - from the current thread. */ >> +/* Fill GDB's REGCACHE with the valid SVE register values from the current >> + thread. > > The function uses the regcache's ptid to identify the thread, so it's > not from the current thread that it gets the register values. > Yeah, this is a bit confusing. I think what happens here (historically) is that we say current thread but we mean "this regcache's thread". And copy/pasting over the years perpetuates it. I've changed it from current thread to the thread associated with REGCACHE. >> + >> + This function handles reading data from SVE or SSVE states, depending >> + on which state is active at the moment. */ >> >> static void >> fetch_sveregs_from_thread (struct regcache *regcache) >> @@ -323,8 +327,11 @@ fetch_sveregs_from_thread (struct regcache *regcache) >> aarch64_sve_regs_copy_to_reg_buf (regcache->ptid ().lwp (), regcache); >> } >> >> -/* Store to the current thread the valid sve register >> - values in the GDB's register array. */ >> +/* Store the valid SVE register values from GDB's REGCACHE to the current >> + thread. > > Same comment about the current thread here. > Fixed. >> + >> + This function handles writing data to SVE or SSVE states, depending >> + on which state is active at the moment. */ >> >> static void >> store_sveregs_to_thread (struct regcache *regcache) >> @@ -334,6 +341,41 @@ store_sveregs_to_thread (struct regcache *regcache) >> aarch64_sve_regs_copy_from_reg_buf (regcache->ptid ().lwp (), regcache); >> } >> >> +/* Fill GDB's REGCACHE with the ZA register set contents from the >> + current thread. If there is no active ZA registe state, make the >> + ZA register contents zero. */ > > Same comment about the current thread here. > Also, s/registe/register/ > Fixed. >> + >> +static void >> +fetch_za_from_thread (struct regcache *regcache) >> +{ >> + aarch64_gdbarch_tdep *tdep >> + = gdbarch_tdep (regcache->arch ()); >> + >> + /* Read ZA state from the thread to the register cache. */ >> + aarch64_za_regs_copy_to_reg_buf (regcache->ptid ().lwp (), >> + regcache, >> + tdep->sme_za_regnum, >> + tdep->sme_svg_regnum, >> + tdep->sme_svcr_regnum); >> +} >> + >> +/* Store the NT_ARM_ZA register set contents from GDB's REGCACHE to the current >> + thread. */ > > Same comment about the current thread here. > Fixed. >> + >> +static void >> +store_za_to_thread (struct regcache *regcache) >> +{ >> + aarch64_gdbarch_tdep *tdep >> + = gdbarch_tdep (regcache->arch ()); >> + >> + /* Write ZA state from the register cache to the thread. */ >> + aarch64_za_regs_copy_from_reg_buf (regcache->ptid ().lwp (), >> + regcache, >> + tdep->sme_za_regnum, >> + tdep->sme_svg_regnum, >> + tdep->sme_svcr_regnum); >> +} >> + >> @@ -890,21 +959,27 @@ aarch64_linux_nat_target::thread_architecture (ptid_t ptid) >> if (gdbarch_bfd_arch_info (inf->gdbarch)->bits_per_word == 32) >> return inf->gdbarch; >> >> - /* Only return it if the current vector length matches the one in the tdep. */ >> + /* Only return the inferior's gdbarch if both vq and svq match the ones in >> + the tdep. */ >> aarch64_gdbarch_tdep *tdep >> = gdbarch_tdep (inf->gdbarch); >> uint64_t vq = aarch64_sve_get_vq (ptid.lwp ()); >> - if (vq == tdep->vq) >> + uint64_t svq = aarch64_za_get_svq (ptid.lwp ()); >> + if (vq == tdep->vq && svq == tdep->sme_svq) >> return inf->gdbarch; >> >> - /* We reach here if the vector length for the thread is different from its >> + /* We reach here if any vector length for the thread is different from its >> value at process start. Lookup gdbarch via info (potentially creating a >> - new one) by using a target description that corresponds to the new vq value >> - and the current architecture features. */ >> + new one) by using a target description that corresponds to the new vq/svq >> + value and the current architecture features. */ >> >> const struct target_desc *tdesc = gdbarch_target_desc (inf->gdbarch); >> aarch64_features features = aarch64_features_from_target_desc (tdesc); >> features.vq = vq; >> + /* We cast to uint8_t here because the features struct can get large, and it >> + is important to store the information in as little storage as >> + possible. */ > > Is it because features is used as a key in tdesc_aarch64_map? Mentioning > in the comment why it needs to be small would be useful. > I've changed this to: /* The svq value in the features struct is stored as uint8_t, so cast it properly in here. */ It makes me wonder if this cast is useful though. Technically we will implicitly cast it to uint8_t anyway, so the value will be truncated. When we hash things into feature bits, it will be handled properly. I'm considering removing the comment altogether and just doing the assignment with the implicit conversion. >> + features.svq = (uint8_t) svq; >> >> struct gdbarch_info info; >> info.bfd_arch_info = bfd_lookup_arch (bfd_arch_aarch64, bfd_mach_aarch64); > >> @@ -2802,6 +3124,122 @@ aarch64_pseudo_read_value_1 (struct gdbarch *gdbarch, >> return result_value; >> } >> >> +/* Helper function for reading/writing ZA pseudo-registers. Given REGNUM, >> + a ZA pseudo-register number, return, in OFFSETS, the information on positioning >> + of the bytes that must be read from/written to. */ >> + >> +static void >> +aarch64_za_offsets_from_regnum (struct gdbarch *gdbarch, int regnum, >> + struct za_offsets &offsets) >> +{ >> + aarch64_gdbarch_tdep *tdep = gdbarch_tdep (gdbarch); >> + >> + gdb_assert (tdep->has_sme ()); >> + gdb_assert (tdep->sme_svq > 0); >> + gdb_assert (tdep->sme_pseudo_base <= regnum); >> + gdb_assert (regnum < tdep->sme_pseudo_base + tdep->sme_pseudo_count); >> + >> + struct za_pseudo_encoding encoding; >> + >> + /* Decode the ZA pseudo-register number. */ >> + aarch64_za_decode_pseudos (gdbarch, regnum, encoding); >> + >> + /* Fetch the streaming vector length. */ >> + size_t svl = sve_vl_from_vq (tdep->sme_svq); >> + >> + if (is_sme_tile_slice_pseudo_register (gdbarch, regnum)) >> + { >> + if (encoding.horizontal) >> + { >> + /* Horizontal tile slices are contiguous ranges of svl bytes. */ >> + >> + /* The starting offset depends on the tile index (to locate the tile >> + in the ZA buffer), the slice index (to locate the slice within the >> + tile) and the qualifier. */ >> + offsets.starting_offset >> + = encoding.tile_index * svl + encoding.slice_index >> + * (svl >> encoding.qualifier_index); >> + /* Horizontal tile slice data is contiguous and thus doesn't have >> + a stride. */ >> + offsets.stride_size = 0; >> + /* Horizontal tile slice data is contiguous and thus only has 1 >> + chunk. */ >> + offsets.chunks = 1; >> + /* The chunk size is always svl bytes. */ >> + offsets.chunk_size = svl; >> + } >> + else >> + { >> + /* Vertical tile slices are non-contiguous ranges of >> + (1 << qualifier_index) bytes. */ >> + >> + /* The starting offset depends on the tile number (to locate the >> + tile in the ZA buffer), the slice index (to locate the element >> + within the tile slice) and the qualifier. */ >> + offsets.starting_offset >> + = encoding.tile_index * svl + encoding.slice_index >> + * (1 << encoding.qualifier_index); >> + /* The offset between vertical tile slices depends on the qualifier >> + and svl. */ >> + offsets.stride_size = svl << (encoding.qualifier_index); > > The parentheses above are unnecessary. > Yeah. Artifact of intermediate changes. Fixed all 3 cases now. >> + /* The number of chunks depends on svl and the qualifier size. */ >> + offsets.chunks = svl >> encoding.qualifier_index; >> + /* The chunk size depends on the qualifier. */ >> + offsets.chunk_size = 1 << encoding.qualifier_index; >> + } >> + } >> + else >> + { >> + /* ZA tile pseudo-register. */ >> + >> + /* Starting offset depends on the tile index and qualifier. */ >> + offsets.starting_offset = (encoding.tile_index) * svl; > > The parentheses above are unnecessary. > >> + /* The offset between tile slices depends on the qualifier and svl. */ >> + offsets.stride_size = svl << (encoding.qualifier_index); > > The parentheses above are unnecessary. > >> + /* The number of chunks depends on the qualifier and svl. */ >> + offsets.chunks = svl >> encoding.qualifier_index; >> + /* The chunk size is always svl bytes. */ >> + offsets.chunk_size = svl; >> + } >> +} > >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +bool >> +write_sve_header (int tid, const struct user_sve_header &header) >> +{ >> + struct iovec iovec; >> + >> + iovec.iov_len = sizeof (header); >> + iovec.iov_base = (void *) &header; > > Unnecessary cast. > Turns out this is necessary, as otherwise we'll get a complaint about trying to assign a (const void *) to (void *). Same for the other const struct cases where we write headers. >> + >> + if (ptrace (PTRACE_SETREGSET, tid, NT_ARM_SVE, &iovec) < 0) >> + { >> + /* SVE is not supported. */ >> + return false; >> + } >> + return true; >> +} >> + >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +bool >> +read_ssve_header (int tid, struct user_sve_header &header) >> +{ >> + struct iovec iovec; >> + >> + iovec.iov_len = sizeof (header); >> + iovec.iov_base = &header; >> + >> + if (ptrace (PTRACE_GETREGSET, tid, NT_ARM_SSVE, &iovec) < 0) >> + { >> + /* SSVE is not supported. */ >> + return false; >> + } >> + return true; >> +} >> + >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +bool >> +write_ssve_header (int tid, const struct user_sve_header &header) >> +{ >> + struct iovec iovec; >> + >> + iovec.iov_len = sizeof (header); >> + iovec.iov_base = (void *) &header; > > Unnecessary cast. > >> + >> + if (ptrace (PTRACE_SETREGSET, tid, NT_ARM_SSVE, &iovec) < 0) >> + { >> + /* SSVE is not supported. */ >> + return false; >> + } >> + return true; >> +} >> + >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +bool >> +read_za_header (int tid, struct user_za_header &header) >> +{ >> + struct iovec iovec; >> + >> + iovec.iov_len = sizeof (header); >> + iovec.iov_base = &header; >> + >> + if (ptrace (PTRACE_GETREGSET, tid, NT_ARM_ZA, &iovec) < 0) >> + { >> + /* ZA is not supported. */ >> + return false; >> + } >> + return true; >> +} >> + >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +bool >> +write_za_header (int tid, const struct user_za_header &header) >> +{ >> + struct iovec iovec; >> + >> + iovec.iov_len = sizeof (header); >> + iovec.iov_base = (void *) &header; > > Unnecessary cast. > >> + >> + if (ptrace (PTRACE_SETREGSET, tid, NT_ARM_ZA, &iovec) < 0) >> + { >> + /* ZA is not supported. */ >> + return false; >> + } >> + return true; >> +} > >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +bool >> +aarch64_store_za_regset (int tid, const gdb::byte_vector &za_state) >> +{ >> + struct iovec iovec; >> + iovec.iov_len = za_state.size (); >> + iovec.iov_base = (void *) za_state.data (); > > Unnecessary cast. > >> + >> + if (ptrace (PTRACE_SETREGSET, tid, NT_ARM_ZA, &iovec) < 0) >> + perror_with_name (_("Failed to write to the NT_ARM_ZA register set.")); >> + >> + return true; >> +} >> + >> +/* See nat/aarch64-scalable-linux-ptrace.h. */ >> + >> +void >> +aarch64_initialize_za_regset (int tid) >> +{ >> + /* First fetch the NT_ARM_ZA header so we can fetch the streaming vector >> + length. */ >> + struct user_za_header header; >> + if (!read_za_header (tid, header)) >> + error (_("Failed to read NT_ARM_ZA header.")); >> + >> + /* The vector should be default-initialized to zero, and we should account >> + for the payload as well. */ >> + std::vector za_new_state (ZA_PT_SIZE (sve_vq_from_vl (header.vl))); >> + >> + /* Adjust the header size since we are adding the initialized ZA >> + payload. */ >> + header.size = ZA_PT_SIZE (sve_vq_from_vl (header.vl)); >> + >> + /* Overlay the modified header onto the new ZA state. */ >> + const gdb_byte *base = (gdb_byte *) &header; >> + memcpy (za_new_state.data (), base, sizeof (user_za_header)); >> + >> + /* Set the ptrace request up and update the NT_ARM_ZA register set. */ >> + struct iovec iovec; >> + iovec.iov_len = za_new_state.size (); >> + iovec.iov_base = (void *) za_new_state.data (); > > Unnecessary cast. > This one is indeed not required. Fixed now. >> + >> + if (ptrace (PTRACE_SETREGSET, tid, NT_ARM_ZA, &iovec) < 0) >> + perror_with_name (_("Failed to initialize the NT_ARM_ZA register set.")); >> + >> + /* The NT_ARM_ZA register set should now contain a zero-initialized ZA >> + payload. */ >> +} >> + > Thanks!