arm: Define __ARM_FEATURE_AES and __ARM_FEATURE_SHA2 when march +crypto is selected
Message ID | 20220928121926.13280-1-andrea.corallo@arm.com |
---|---|
State | New, archived |
Headers |
Return-Path: <gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f2ce:0:0:0:0:0 with SMTP id d14csp137050wrp; Wed, 28 Sep 2022 05:22:07 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4CufwB21I6cCR2o+z/5nzO/XsVmWQV0gF0WIuCXzzlIuXa83pg/QvSXbvmKDPpXUnnWx0p X-Received: by 2002:a17:907:9483:b0:782:242:a364 with SMTP id dm3-20020a170907948300b007820242a364mr26991476ejc.595.1664367727416; Wed, 28 Sep 2022 05:22:07 -0700 (PDT) Received: from sourceware.org (server2.sourceware.org. [2620:52:3:1:0:246e:9693:128c]) by mx.google.com with ESMTPS id lg13-20020a170906f88d00b007815ca78c38si4199107ejb.235.2022.09.28.05.22.07 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Sep 2022 05:22:07 -0700 (PDT) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) client-ip=2620:52:3:1:0:246e:9693:128c; Authentication-Results: mx.google.com; dkim=pass header.i=@gcc.gnu.org header.s=default header.b="wEj/Bu0a"; arc=fail (signature failed); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnu.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 1348D385802B for <ouuuleilei@gmail.com>; Wed, 28 Sep 2022 12:22:06 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 1348D385802B DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1664367726; bh=qVpI4Vflk6z47t749N+DW+JOPiMnHZo5Kj7tLTOGBu0=; h=To:Subject:Date:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:Cc:From; b=wEj/Bu0a5kYYtpMP1TLwNI5X+wA5CBJeIxBc7u4P6L+xkU/XFmWoAmY8+KNahQn2p F7okbVpFiwiPU8KjY8X7TA5xaNNO/LgQoqfHHhkbo2xIQ3rQM/z8ph4FJiV3MlzlEg ENlAijFco+cAbH8zwSdE+MaqK1vKMmwpPsFinUuk= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on2051.outbound.protection.outlook.com [40.107.104.51]) by sourceware.org (Postfix) with ESMTPS id D6EEC3858C83 for <gcc-patches@gcc.gnu.org>; Wed, 28 Sep 2022 12:20:20 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org D6EEC3858C83 ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=QIDFXAsJ97QZ19uvecJ3CS3htCIWhVD2o4yJ4FSERkmudQ9WXo5NAmux7nEBb8taptAmUYVYXq1adK9ifQ1EAWkdiDsgVWADRVd3WCW0SDgf5nl7dwzpMuv8cjpUk4PFWBgbfsQtVSkAvuRsHlUBfPcwZeaV1a7R0msnv5ASawcka/KuHyvuIraKF/EeokekKpY+hwc/0ohhnEz2+XA5lS4I4hJYIXL9MPDmsV58xJ0x0A+ceUwuRusO8tjGplYv59ZTeVT53PnY/iXl3ggvlEroyVnLMnig3B/t4HaGYzZMIaNVor5v/7Ivur4Nw1RDBmtlGGMqw1MxD9A3+4FQfg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qVpI4Vflk6z47t749N+DW+JOPiMnHZo5Kj7tLTOGBu0=; b=nswy16xMHKhkdFN0n7NQNK+k6AnK0N+LLhuPwkPFwJi1qnsHjAw1ugXqzasXm8UUF+9eexMAmJjllZFC2EI0Qb689VNcIPGPKqf20y7aJrnJMb/G2Dy5abUR/jEgHcRtlc5q4GueuzQwAUPj5ApvXLSCS2D766ZL2gRa1wXHwqCDemchj0CiLt8rb8RYwd8ysWwdyShFKvjndjd5Pa0RVQZWBKiwg0ioso3vnOvmc/ZDIlnoZqE+kSx1SRZ8BhXBtqmt3gqS3yYc4znjJhAi1qtASSTD7ILqEryRZfQvel0RHwbXoyiDTLLCLOBk0gTRgeni2Gqg2KmLmWxh+l10+w== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) Received: from AS9PR04CA0135.eurprd04.prod.outlook.com (2603:10a6:20b:48a::10) by GV1PR08MB7873.eurprd08.prod.outlook.com (2603:10a6:150:5c::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5676.17; Wed, 28 Sep 2022 12:20:17 +0000 Received: from AM7EUR03FT063.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:48a:cafe::7a) by AS9PR04CA0135.outlook.office365.com (2603:10a6:20b:48a::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5676.17 via Frontend Transport; Wed, 28 Sep 2022 12:20:16 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM7EUR03FT063.mail.protection.outlook.com (100.127.140.221) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5676.17 via Frontend Transport; Wed, 28 Sep 2022 12:20:16 +0000 Received: ("Tessian outbound 937eed45f6ed:v128"); Wed, 28 Sep 2022 12:20:16 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: cde3436aacc3c7a1 X-CR-MTA-TID: 64aa7808 Received: from 5a22832af43f.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id EA9472CD-F4BC-4AD5-A096-E6CA6A701BB4.1; Wed, 28 Sep 2022 12:19:35 +0000 Received: from EUR04-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5a22832af43f.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 28 Sep 2022 12:19:35 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=K4O+mdVbk3yD0GTUAa3EvyqQpvzhm/D+1Ga4EjBa20Tl3InmMSNtnX924uGKfxlZRzB4IV6qBWHD+Xf5lK5zGH8uAPJkiGup3i+k/Shho1WLDGzy8nWtfEaNDstWPmM0WGHmksx1qfBWziLn1xyxgwf0x19m3yfFkcQqBXBOrPqf8rjRD2vD2Szgry7WRnUfq+LiW2w+EsC0VgL0LrUCNXzGjhSIAcaku6DYCVsLJFn4+qwSvd7XfAceqWWGuClTFWHty5rh1VMPSeyQf5yS7UQfJxSILSQ6+lHok8lsqLJYqDb3dRcI2hnYp4Gb8H/yPNAlZlyyqGewYjm/wEdUsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qVpI4Vflk6z47t749N+DW+JOPiMnHZo5Kj7tLTOGBu0=; b=SMYQqTErI1gqsd/lNirB+GEPpiNJffkOLLJMeZZ6PyytNWW+/bOtaYgEwrrJis3NHKAAZKJVtKTDfimlEoO5hk23BAOijXZ0k+3/WCJCG+A/0XSGJF8mmcnovLzFwqy+d4vYVhJWrBWIToroc7skmntB1X9NOVVbQ8dLGAGxvPAyUmJB1QqBcUa0iSUUYVV1yh6FYnuhphiX2aOACsrAAaLxcxZwTmY90qtNuPbKevXjFNGDg86lsnfwkeLv899qT37TmQ0Pug37WM3bN7Jm8MyVnOJRSOsut6QRgTjngvdfabxIHt6lC/AHYZ6Xiew+QWz9pOGP9PvKlLV1ZADmpQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none Received: from AM5PR04CA0024.eurprd04.prod.outlook.com (2603:10a6:206:1::37) by AS4PR08MB7578.eurprd08.prod.outlook.com (2603:10a6:20b:4fd::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5654.25; Wed, 28 Sep 2022 12:19:33 +0000 Received: from AM7EUR03FT036.eop-EUR03.prod.protection.outlook.com (2603:10a6:206:1:cafe::3a) by AM5PR04CA0024.outlook.office365.com (2603:10a6:206:1::37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5654.25 via Frontend Transport; Wed, 28 Sep 2022 12:19:33 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AM7EUR03FT036.mail.protection.outlook.com (100.127.140.93) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5676.17 via Frontend Transport; Wed, 28 Sep 2022 12:19:33 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9; Wed, 28 Sep 2022 12:19:31 +0000 Received: from e124257.nice.arm.com (10.34.105.24) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.9 via Frontend Transport; Wed, 28 Sep 2022 12:19:31 +0000 To: <gcc-patches@gcc.gnu.org> Subject: [PATCH] arm: Define __ARM_FEATURE_AES and __ARM_FEATURE_SHA2 when march +crypto is selected Date: Wed, 28 Sep 2022 14:19:26 +0200 Message-ID: <20220928121926.13280-1-andrea.corallo@arm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AM7EUR03FT036:EE_|AS4PR08MB7578:EE_|AM7EUR03FT063:EE_|GV1PR08MB7873:EE_ X-MS-Office365-Filtering-Correlation-Id: 1fa52d08-259a-4156-f1c2-08daa14bcd82 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: QkTxmDrvBtOIo410cFkSE60NMMyXhcp33BwXJWSsNerT/LveisyXjzuXzE57/S+n4ovIfKW3Zv6M7erKmlif/YfXGuzJg8Xi+SuMJH8kG8ieiNmfvqUtVv6aW6N7suy57VdYFPVBWlHlsSVRfDGp8xCZMZPjWzimGSo+DbrS5LNVHg6NIPJY/pMU4w+LBOfCdCpit1wgLAe+/QbqX58W4WsWCjb10d0iAH6EMZ9mFlqewsioAdrjrcNlgYfkRBeQsNVedeNJIhqs3AOAwo4/aNOiXTC8tYdPfqMstvmPTlmX76CLTW2eQaRvRSRzVS4hoizf4KRVeRzpJs4rAt9u34xxsXQlJ6ll/Ivezf+hn3JJTrEfa48N3OpPvLvCgjJdZdro1NVhfmPe8pTVTO/UgMTXHYatd4HPBJDF0Efo1EEIR15YsQA93kk7VVzfVosHEA8iE7Sv6B3SrX2wFWR/qjBCMeX/QHkSsJO/EoWBr+Zve+9FzJQdPa4raEPaIxZ3vAm5vclL1ics40NM6LbwuP5qnWUYo4oAJbJXPKcT/NgmgSi9HR60qhi1P4O47ALKHFOEYOnXJbQCuRNh5Y5KXyhktzlUxIV91vY0ms9cIPRFpx5jJ1Ubzv0hijNM2abhiGnH3wBkisasIKe+hYh3R4SmAVs6F7nEjDb0rtgBGjxiLDAkfdAuydx1PZMBS/h3iy4SwwhtkzLtREW54Mgx0ULg53+As4xkOTBledI0wHb5Rh834kDo0wF9cskdcjBFb5Yt8L0KkPoVgYoHha+zXu2AkMEbB25cgrR2A/iLBqrG9DzWrCAmI6bnUl5Hfw2z5K8LZGCSqan8d50tqlbCE8Npex5m82DP/oLoSPquEpE= X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230022)(4636009)(396003)(346002)(39860400002)(376002)(136003)(451199015)(36840700001)(40470700004)(46966006)(84970400001)(426003)(36756003)(5660300002)(2616005)(2906002)(1076003)(186003)(8936002)(336012)(41300700001)(47076005)(8676002)(70206006)(86362001)(26005)(40480700001)(44832011)(70586007)(81166007)(82740400003)(40460700003)(83380400001)(356005)(7696005)(54906003)(316002)(36860700001)(478600001)(6666004)(82310400005)(4326008)(6916009)(36900700001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7578 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM7EUR03FT063.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: a996e1a0-2ef4-4fc5-4f95-08daa14bb3aa X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230022)(4636009)(136003)(346002)(376002)(39860400002)(396003)(451199015)(36840700001)(40470700004)(46966006)(478600001)(54906003)(82740400003)(316002)(40480700001)(6916009)(86362001)(47076005)(83380400001)(40460700003)(36860700001)(186003)(336012)(426003)(2616005)(1076003)(26005)(6666004)(7696005)(82310400005)(2906002)(8936002)(84970400001)(4326008)(41300700001)(70206006)(70586007)(8676002)(81166007)(5660300002)(36756003)(44832011); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Sep 2022 12:20:16.8251 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1fa52d08-259a-4156-f1c2-08daa14bcd82 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM7EUR03FT063.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR08MB7873 X-Spam-Status: No, score=-12.4 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, GIT_PATCH_0, KAM_DMARC_NONE, KAM_SHORT, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_NONE, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list <gcc-patches.gcc.gnu.org> List-Unsubscribe: <https://gcc.gnu.org/mailman/options/gcc-patches>, <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe> List-Archive: <https://gcc.gnu.org/pipermail/gcc-patches/> List-Post: <mailto:gcc-patches@gcc.gnu.org> List-Help: <mailto:gcc-patches-request@gcc.gnu.org?subject=help> List-Subscribe: <https://gcc.gnu.org/mailman/listinfo/gcc-patches>, <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe> From: Andrea Corallo via Gcc-patches <gcc-patches@gcc.gnu.org> Reply-To: Andrea Corallo <andrea.corallo@arm.com> Cc: Richard.Earnshaw@arm.com Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org Sender: "Gcc-patches" <gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org> X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1745216053846661817?= X-GMAIL-MSGID: =?utf-8?q?1745216053846661817?= |
Series |
arm: Define __ARM_FEATURE_AES and __ARM_FEATURE_SHA2 when march +crypto is selected
|
|
Commit Message
Andrea Corallo
Sept. 28, 2022, 12:19 p.m. UTC
Hi all, this patch fixes the missing definition of __ARM_FEATURE_AES and __ARM_FEATURE_SHA2 when AES SHA1 & SHA2 crypto instructions are available [1] (read when march +crypto is selected). Okay for master? Thanks Andrea [1] <https://raw.githubusercontent.com/ARM-software/acle/main/main/acle.md> /gcc/ChangeLog 2022-09-14 Andrea Corallo <andrea.corallo@arm.com> * config/arm/arm-c.cc (arm_cpu_builtins): Define __ARM_FEATURE_AES and __ARM_FEATURE_SHA2. gcc/testsuite/ChangeLog 2022-09-14 Andrea Corallo <andrea.corallo@arm.com> * gcc.target/arm/attr-crypto.c: Update test. --- gcc/config/arm/arm-c.cc | 2 ++ gcc/testsuite/gcc.target/arm/attr-crypto.c | 8 ++++++++ 2 files changed, 10 insertions(+)
Comments
Hi Andrea, > -----Original Message----- > From: Andrea Corallo <andrea.corallo@arm.com> > Sent: Wednesday, September 28, 2022 1:19 PM > To: gcc-patches@gcc.gnu.org > Cc: Kyrylo Tkachov <Kyrylo.Tkachov@arm.com>; Richard Earnshaw > <Richard.Earnshaw@arm.com>; Andrea Corallo <Andrea.Corallo@arm.com> > Subject: [PATCH] arm: Define __ARM_FEATURE_AES and > __ARM_FEATURE_SHA2 when march +crypto is selected > > Hi all, > > this patch fixes the missing definition of __ARM_FEATURE_AES and > __ARM_FEATURE_SHA2 when AES SHA1 & SHA2 crypto instructions are > available [1] (read when march +crypto is selected). > > Okay for master? Ok. Thanks, Kyrill > > Thanks > > Andrea > > [1] <https://raw.githubusercontent.com/ARM- > software/acle/main/main/acle.md> > > /gcc/ChangeLog > > 2022-09-14 Andrea Corallo <andrea.corallo@arm.com> > > * config/arm/arm-c.cc (arm_cpu_builtins): Define > __ARM_FEATURE_AES and __ARM_FEATURE_SHA2. > > gcc/testsuite/ChangeLog > > 2022-09-14 Andrea Corallo <andrea.corallo@arm.com> > > * gcc.target/arm/attr-crypto.c: Update test. > --- > gcc/config/arm/arm-c.cc | 2 ++ > gcc/testsuite/gcc.target/arm/attr-crypto.c | 8 ++++++++ > 2 files changed, 10 insertions(+) > > diff --git a/gcc/config/arm/arm-c.cc b/gcc/config/arm/arm-c.cc > index a8697b8c62f..86c56bf2680 100644 > --- a/gcc/config/arm/arm-c.cc > +++ b/gcc/config/arm/arm-c.cc > @@ -202,6 +202,8 @@ arm_cpu_builtins (struct cpp_reader* pfile) > def_or_undef_macro (pfile, "__ARM_FEATURE_QBIT", > TARGET_ARM_QBIT); > def_or_undef_macro (pfile, "__ARM_FEATURE_SAT", TARGET_ARM_SAT); > def_or_undef_macro (pfile, "__ARM_FEATURE_CRYPTO", > TARGET_CRYPTO); > + def_or_undef_macro (pfile, "__ARM_FEATURE_AES", TARGET_CRYPTO); > + def_or_undef_macro (pfile, "__ARM_FEATURE_SHA2", TARGET_CRYPTO); > > def_or_undef_macro (pfile, "__ARM_FEATURE_UNALIGNED", > unaligned_access); > > diff --git a/gcc/testsuite/gcc.target/arm/attr-crypto.c > b/gcc/testsuite/gcc.target/arm/attr-crypto.c > index cbd13a757d8..05e458f36b6 100644 > --- a/gcc/testsuite/gcc.target/arm/attr-crypto.c > +++ b/gcc/testsuite/gcc.target/arm/attr-crypto.c > @@ -16,6 +16,14 @@ > #error __ARM_FEATURE_CRYPTO not defined. > #endif > > +#ifndef __ARM_FEATURE_AES > +#error __ARM_FEATURE_AES not defined. > +#endif > + > +#ifndef __ARM_FEATURE_SHA2 > +#error __ARM_FEATURE_SHA2 not defined. > +#endif > + > #ifndef __ARM_NEON > #error __ARM_NEON not defined. > #endif > -- > 2.25.1
Kyrylo Tkachov <Kyrylo.Tkachov@arm.com> writes: > Hi Andrea, > >> -----Original Message----- >> From: Andrea Corallo <andrea.corallo@arm.com> >> Sent: Wednesday, September 28, 2022 1:19 PM >> To: gcc-patches@gcc.gnu.org >> Cc: Kyrylo Tkachov <Kyrylo.Tkachov@arm.com>; Richard Earnshaw >> <Richard.Earnshaw@arm.com>; Andrea Corallo <Andrea.Corallo@arm.com> >> Subject: [PATCH] arm: Define __ARM_FEATURE_AES and >> __ARM_FEATURE_SHA2 when march +crypto is selected >> >> Hi all, >> >> this patch fixes the missing definition of __ARM_FEATURE_AES and >> __ARM_FEATURE_SHA2 when AES SHA1 & SHA2 crypto instructions are >> available [1] (read when march +crypto is selected). >> >> Okay for master? > > Ok. > Thanks, > Kyrill Into trunk as 5e9c4ed903c. Thanks! Andrea
diff --git a/gcc/config/arm/arm-c.cc b/gcc/config/arm/arm-c.cc index a8697b8c62f..86c56bf2680 100644 --- a/gcc/config/arm/arm-c.cc +++ b/gcc/config/arm/arm-c.cc @@ -202,6 +202,8 @@ arm_cpu_builtins (struct cpp_reader* pfile) def_or_undef_macro (pfile, "__ARM_FEATURE_QBIT", TARGET_ARM_QBIT); def_or_undef_macro (pfile, "__ARM_FEATURE_SAT", TARGET_ARM_SAT); def_or_undef_macro (pfile, "__ARM_FEATURE_CRYPTO", TARGET_CRYPTO); + def_or_undef_macro (pfile, "__ARM_FEATURE_AES", TARGET_CRYPTO); + def_or_undef_macro (pfile, "__ARM_FEATURE_SHA2", TARGET_CRYPTO); def_or_undef_macro (pfile, "__ARM_FEATURE_UNALIGNED", unaligned_access); diff --git a/gcc/testsuite/gcc.target/arm/attr-crypto.c b/gcc/testsuite/gcc.target/arm/attr-crypto.c index cbd13a757d8..05e458f36b6 100644 --- a/gcc/testsuite/gcc.target/arm/attr-crypto.c +++ b/gcc/testsuite/gcc.target/arm/attr-crypto.c @@ -16,6 +16,14 @@ #error __ARM_FEATURE_CRYPTO not defined. #endif +#ifndef __ARM_FEATURE_AES +#error __ARM_FEATURE_AES not defined. +#endif + +#ifndef __ARM_FEATURE_SHA2 +#error __ARM_FEATURE_SHA2 not defined. +#endif + #ifndef __ARM_NEON #error __ARM_NEON not defined. #endif