From patchwork Thu Dec 7 16:46:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Szabolcs Nagy X-Patchwork-Id: 175289 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:bcd1:0:b0:403:3b70:6f57 with SMTP id r17csp4913633vqy; Thu, 7 Dec 2023 08:47:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IE9YXVRMdf4VDLYys+5EguoeWfGz2hmrAzGq4fyx4G7heso4a4yAU22k2QO/22X3iBlL+Mg X-Received: by 2002:a05:620a:8a0a:b0:77f:34d0:300f with SMTP id qt10-20020a05620a8a0a00b0077f34d0300fmr1340567qkn.19.1701967660208; Thu, 07 Dec 2023 08:47:40 -0800 (PST) ARC-Seal: i=4; a=rsa-sha256; t=1701967660; cv=pass; d=google.com; s=arc-20160816; b=0uV2V3CuaIXmtz97wIxjoZrX2hnk3WpeHlX5rREmKNBPqrEOFLSqoD6OjIznGxldb2 J5JgtMJKal0VuC9z0X3a1yXqN9lpVrPetSBeQK38GMNLHJ1jAqiRO8PKBs/deJK2fp/x 1zgrhbFbGrQ7uoABzovURMrW3IpFi/Gfx/QY8w5b+jBOgDKdNJlCSufMLvDQpSKdw4lD M9DvBsK3/3kn9C3fiUzSdGBNi6GAkV0zggYRtH8rQARco4jWjdNSAwJ8MaDyZ0DZJI8Y hbpw2f0hmJRZrJ4E55nHnk9Vse+nB11a2cEbZ9uYLJhyhqLZ5EOntT20aSWrJ3OqKQAb OavQ== ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:nodisclaimer :content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:dkim-signature:dkim-signature :arc-filter:dmarc-filter:delivered-to; bh=URyu3K1fTIlTiTArQma7cU5CorFeWF7ApA20tSrKzoc=; fh=gk9A5O7Gbglvz1MjrRQ4hZ2i3c68kYkpOZJg1emXh+g=; b=Ie1qMTWsI/emcuRhWm8rJQH+t48EYiiMUnxR6eB7cEj8rni6M4a4KtkYf2LODgMQPL rHYhcUJWxGST91tepbNdfBmsvMXTBbAmMkTDwBgDLGK0RkNActi4Em9uzN0Of4zDx8Ov /79MQnEKRIH9A0p//WuB87LgB/FA8m9BdxHjWa7cHwpgQgAI9HE1g5TUd1cszPDt7/B1 gaubNPcogsNoazeZV0rPis9WMiQXw59mmAh4uoABHYlWK2MOE5k6lbsBud6E1DN3K1Pz 3aoLeb716u/+ybyiG/n6IRaGqO4+5Po1tiROFbmP+ZwXzx68UcJJV8sJFgjxKxPjIWay pWSQ== ARC-Authentication-Results: i=4; mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=9iN0v6Bt; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=9iN0v6Bt; arc=pass (i=3); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from server2.sourceware.org (server2.sourceware.org. [8.43.85.97]) by mx.google.com with ESMTPS id b5-20020a05620a0f8500b0077d9209c1c0si79372qkn.20.2023.12.07.08.47.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 08:47:40 -0800 (PST) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) client-ip=8.43.85.97; Authentication-Results: mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=9iN0v6Bt; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=9iN0v6Bt; arc=pass (i=3); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id A742838618F7 for ; Thu, 7 Dec 2023 16:47:36 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on2066.outbound.protection.outlook.com [40.107.104.66]) by sourceware.org (Postfix) with ESMTPS id A6BBB385AC1B for ; Thu, 7 Dec 2023 16:47:07 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org A6BBB385AC1B Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org A6BBB385AC1B Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.104.66 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1701967631; cv=pass; b=pRIA/YsJoyKgdLDoOoThKY0EyGsd/om+yXUMVCGh6Lw3Gwh0v/5PoSbWw4QAZq9v+/3ttV1JOaxBHVgRubiz+1/dn2f4DOQ4hit8bkwNWQmXMGqVOY38wCpU+MdbyCQ65rJ52BdGKYjgze5YKBzWQWBuSLMCBS4Lkn9J5LebTMo= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1701967631; c=relaxed/simple; bh=dUxeEmKrbLsPWzf4lIka5Si0TtquUsDi4XYIno/+rso=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=f9245L3H7W+7DCe2iHMFkG04GTo5NlfAEBgVrV8EIUTtYTIAnOcr6kxpghMoT/6WNXduK9zXtwz1e0f1PSos9jvRKQLKTw+TKIw5CPrwwoSrXc74nkxV8mWppuC9van+DQXhYOTgn1AbCvZaN0dZ/qFKwg+KIHZvqda46Ai3w5w= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=LAn6yb8105ZaespUOYwB8eqlASH1wKeWMIk8wWjz9YW+JLYWw2/sRXtlxmJYlkMXrnCncvfc+3nDWOubWImWRDtYr6z4EJHbBOj9dYHZuAgJdkvvi03+EkFSHBplJp5efH7mrB5muHRaXhNb1DBJysWcUQVKG2J24vPErrOAGxNf31rlTnWhtb9pbG4sgVgUUq5YTirVQwnZvBuzgmxit2rFYPu2c1FQ+zbWxTrL0TtPtlEhFU9msbtxQJfWebHC1e2MDnaDrNGHJSi/htypOljmB/6fgRmxhNYdTfMnZe5snVWtlAp2IAEAZ37TltC4dz4BeomVeemm+6JJ73MH4Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=URyu3K1fTIlTiTArQma7cU5CorFeWF7ApA20tSrKzoc=; b=FJ6QMGfcWd81GG37nPv/JN9EsT4aNgMjbJSS7odElB7/09jxbEXj2MNO+pB0d0ZYwb+THzkJTM+u10suLL3pcSbPrKkQGGHCg50TU4bh6rUopTz6gc2MhFZLWEHZbD1S/UsaCEEzbVeK08cuLGnrnumYfLsguRnqqxajDNMmmmXs7KLk2RSpZLFbDRuOaQQo6cm1+gFoxVAhjoDKptNFQs1AM7bymDvhIExKtePjLy2C39GbcZezVzuXkdKZJDvQRcmM1ioujMqdxV6gUrVZXTwNxK/lQ6zf0CYwf3H2IHTiIIpoeTuXnOH+HU3EHgJ91XGp3754Xo1ie+OtQwj4Lw== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=URyu3K1fTIlTiTArQma7cU5CorFeWF7ApA20tSrKzoc=; b=9iN0v6Bt3B1HO9TvRsbFRNDjqBamCQ8Q2d0AtCq77L0Lb2zdsokIpNmSkPCANBxHzHSYy1Yw34w0iOEqNaR+qFZNtxGiP2txLUGmILfOZTaahhu/s1+lNON9kgPQKiZK8rMWmYsWg7Ks4l+hFimccuzoSmpjsLLv8duUgN+LSV4= Received: from DU2P251CA0014.EURP251.PROD.OUTLOOK.COM (2603:10a6:10:230::15) by AS2PR08MB9692.eurprd08.prod.outlook.com (2603:10a6:20b:604::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.25; Thu, 7 Dec 2023 16:47:04 +0000 Received: from DB5PEPF00014B90.eurprd02.prod.outlook.com (2603:10a6:10:230:cafe::23) by DU2P251CA0014.outlook.office365.com (2603:10a6:10:230::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.34 via Frontend Transport; Thu, 7 Dec 2023 16:47:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5PEPF00014B90.mail.protection.outlook.com (10.167.8.228) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.20 via Frontend Transport; Thu, 7 Dec 2023 16:47:03 +0000 Received: ("Tessian outbound e243565b0037:v228"); Thu, 07 Dec 2023 16:47:03 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 961c84963fd97943 X-CR-MTA-TID: 64aa7808 Received: from 5807b78d9bf4.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id AB4408BB-65F3-49D1-9043-9F99076F49D2.1; Thu, 07 Dec 2023 16:46:56 +0000 Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5807b78d9bf4.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 07 Dec 2023 16:46:56 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kSRm9orCkdS75/qHBnfvczT+yVMSIi+bCo4AnqB0xN96CMObJvHUVe4LWBVYTlD62t/sVkmYPp8dkbgUEoOCVE0vvBqpN3361Q/MnXTDrSDggkCdHFoHKzR0zhSRAHSO0oBE04QF0NXGpc8EzyNDlg8ReIUPNdAJAYxzxwF+1Whmf4SqpVhjRqFFK2AI68scRx8j3hjZIyoqonyF8Hqzlrqv64Q3zXbhAtYY6tsNw+mazEebsl9tejdGGfFfB1XPeqskCDvtD/rAiFZrHo9mtxVFZ91RrP5Lr2obvk2C+5LJ3IRPO42FFbpntuVDXwYu+VEgnnjQo73YK2zyjrsIQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=URyu3K1fTIlTiTArQma7cU5CorFeWF7ApA20tSrKzoc=; b=k12ojuX/ki/UNBF8wVaCGhRG+PjfwknSB+qvefJqqxcsKP/sj2fhoTqdYrNRpUy7AXy2/BvCQAtwZaIaAuJKGhqVvbeVmB1xZx/kN/rgh2NU9tuantQ2Yg9cF5ZgexQN1bXlVQmKaumiaOD+IHvIWwMQpqX3cxvxqaPed1G1KYNmR1B5rfniXlq09eJzPJJnwo1oWsxmrjTpdmI8Z9tYq9V0j/zBHO1px1kS/sjJD+hIks340q0mRxfpjPWXLlEsM8iOmm9zKdq+MOVveZQWP02cqhzP8KkOMxfiuKRryAm/TTIOZWLmwPX3tNxWhrh7raBeZ2NANlXTmn8meoIPMA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=URyu3K1fTIlTiTArQma7cU5CorFeWF7ApA20tSrKzoc=; b=9iN0v6Bt3B1HO9TvRsbFRNDjqBamCQ8Q2d0AtCq77L0Lb2zdsokIpNmSkPCANBxHzHSYy1Yw34w0iOEqNaR+qFZNtxGiP2txLUGmILfOZTaahhu/s1+lNON9kgPQKiZK8rMWmYsWg7Ks4l+hFimccuzoSmpjsLLv8duUgN+LSV4= Received: from AS4P190CA0040.EURP190.PROD.OUTLOOK.COM (2603:10a6:20b:5d1::20) by DB9PR08MB8699.eurprd08.prod.outlook.com (2603:10a6:10:3d1::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7068.27; Thu, 7 Dec 2023 16:46:53 +0000 Received: from AM4PEPF00027A68.eurprd04.prod.outlook.com (2603:10a6:20b:5d1:cafe::e8) by AS4P190CA0040.outlook.office365.com (2603:10a6:20b:5d1::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.34 via Frontend Transport; Thu, 7 Dec 2023 16:46:52 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AM4PEPF00027A68.mail.protection.outlook.com (10.167.16.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7068.20 via Frontend Transport; Thu, 7 Dec 2023 16:46:52 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Thu, 7 Dec 2023 16:46:52 +0000 Received: from armchair.cambridge.arm.com (10.2.80.71) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2507.32 via Frontend Transport; Thu, 7 Dec 2023 16:46:52 +0000 From: Szabolcs Nagy To: Subject: [PATCH 3/4] libgcc: aarch64: Add SME runtime support Date: Thu, 7 Dec 2023 16:46:51 +0000 Message-ID: <5d8154cf64f6c0d7b09dbac44b763c97dcb408fe.1701967183.git.szabolcs.nagy@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AM4PEPF00027A68:EE_|DB9PR08MB8699:EE_|DB5PEPF00014B90:EE_|AS2PR08MB9692:EE_ X-MS-Office365-Filtering-Correlation-Id: c553c333-161b-4968-69d6-08dbf7442427 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(4636009)(376002)(136003)(39860400002)(396003)(346002)(230922051799003)(1800799012)(82310400011)(186009)(451199024)(64100799003)(46966006)(40470700004)(36840700001)(2906002)(30864003)(44832011)(40480700001)(8936002)(8676002)(5660300002)(316002)(70206006)(70586007)(40460700003)(47076005)(36860700001)(6916009)(2616005)(966005)(7696005)(36756003)(26005)(41300700001)(336012)(478600001)(82740400003)(83380400001)(426003)(356005)(81166007)(86362001)(2004002)(36900700001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB8699 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5PEPF00014B90.eurprd02.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 5fa458c5-feee-4038-3771-08dbf7441d8f X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(4636009)(136003)(376002)(39860400002)(396003)(346002)(230922051799003)(451199024)(82310400011)(186009)(64100799003)(1800799012)(46966006)(36840700001)(40470700004)(8676002)(8936002)(5660300002)(44832011)(7696005)(966005)(36756003)(2616005)(6916009)(70586007)(316002)(70206006)(478600001)(41300700001)(2906002)(30864003)(40480700001)(81166007)(82740400003)(47076005)(36860700001)(40460700003)(26005)(83380400001)(86362001)(336012)(426003)(2004002); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Dec 2023 16:47:03.9456 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c553c333-161b-4968-69d6-08dbf7442427 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5PEPF00014B90.eurprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR08MB9692 X-Spam-Status: No, score=-12.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, GIT_PATCH_0, KAM_DMARC_NONE, KAM_SHORT, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_NONE, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1784642441297175623 X-GMAIL-MSGID: 1784642441297175623 The call ABI for SME (Scalable Matrix Extension) requires a number of helper routines which are added to libgcc so they are tied to the compiler version instead of the libc version. See https://github.com/ARM-software/abi-aa/blob/main/aapcs64/aapcs64.rst#sme-support-routines The routines are in shared libgcc and static libgcc eh, even though they are not related to exception handling. This is to avoid linking a copy of the routines into dynamic linked binaries, because TPIDR2_EL0 block can be extended in the future which is better to handle in a single place per process. The support routines have to decide if SME is accessible or not. Linux tells userspace if SME is accessible via AT_HWCAP2, otherwise a new __aarch64_sme_accessible symbol was introduced that a libc can define. Due to libgcc and libc build order, the symbol availability cannot be checked so for __aarch64_sme_accessible an unistd.h feature test macro is used while such detection mechanism is not available for __getauxval so we rely on configure checks based on the target triplet. Asm helper code is added to make writing the routines easier. libgcc/ChangeLog: * config/aarch64/t-aarch64: Add sources to the build. * config/aarch64/__aarch64_have_sme.c: New file. * config/aarch64/__arm_sme_state.S: New file. * config/aarch64/__arm_tpidr2_restore.S: New file. * config/aarch64/__arm_tpidr2_save.S: New file. * config/aarch64/__arm_za_disable.S: New file. * config/aarch64/aarch64-asm.h: New file. * config/aarch64/libgcc-sme.ver: New file. --- libgcc/config/aarch64/__aarch64_have_sme.c | 71 +++++++++++++ libgcc/config/aarch64/__arm_sme_state.S | 55 ++++++++++ libgcc/config/aarch64/__arm_tpidr2_restore.S | 89 ++++++++++++++++ libgcc/config/aarch64/__arm_tpidr2_save.S | 101 +++++++++++++++++++ libgcc/config/aarch64/__arm_za_disable.S | 66 ++++++++++++ libgcc/config/aarch64/aarch64-asm.h | 98 ++++++++++++++++++ libgcc/config/aarch64/libgcc-sme.ver | 24 +++++ libgcc/config/aarch64/t-aarch64 | 10 ++ 8 files changed, 514 insertions(+) create mode 100644 libgcc/config/aarch64/__aarch64_have_sme.c create mode 100644 libgcc/config/aarch64/__arm_sme_state.S create mode 100644 libgcc/config/aarch64/__arm_tpidr2_restore.S create mode 100644 libgcc/config/aarch64/__arm_tpidr2_save.S create mode 100644 libgcc/config/aarch64/__arm_za_disable.S create mode 100644 libgcc/config/aarch64/aarch64-asm.h create mode 100644 libgcc/config/aarch64/libgcc-sme.ver diff --git a/libgcc/config/aarch64/__aarch64_have_sme.c b/libgcc/config/aarch64/__aarch64_have_sme.c new file mode 100644 index 00000000000..2dc6be63ce9 --- /dev/null +++ b/libgcc/config/aarch64/__aarch64_have_sme.c @@ -0,0 +1,71 @@ +/* Initializer for SME support. + Copyright (C) 2023 Free Software Foundation, Inc. + + This file is part of GCC. + + GCC is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GCC is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details. + + Under Section 7 of GPL version 3, you are granted additional + permissions described in the GCC Runtime Library Exception, version + 3.1, as published by the Free Software Foundation. + + You should have received a copy of the GNU General Public License and + a copy of the GCC Runtime Library Exception along with this program; + see the files COPYING3 and COPYING.RUNTIME respectively. If not, see + . */ + +#include "auto-target.h" +#include + +#if __ARM_FEATURE_SME +/* Avoid runtime SME detection if libgcc is built with SME. */ +# define HAVE_SME_CONST const +# define HAVE_SME_VALUE 1 +#elif HAVE___GETAUXVAL +/* SME access detection on Linux. */ +# define HAVE_SME_CONST +# define HAVE_SME_VALUE 0 +# define HAVE_SME_CTOR sme_accessible () + +# define AT_HWCAP2 26 +# define HWCAP2_SME (1 << 23) +unsigned long int __getauxval (unsigned long int); + +static _Bool +sme_accessible (void) +{ + unsigned long hwcap2 = __getauxval (AT_HWCAP2); + return (hwcap2 & HWCAP2_SME) != 0; +} +#elif __LIBC___AARCH64_SME_ACCESSIBLE +/* Alternative SME access detection. */ +# define HAVE_SME_CONST +# define HAVE_SME_VALUE 0 +# define HAVE_SME_CTOR __aarch64_sme_accessible () +_Bool __aarch64_sme_accessible (void); +#else +# define HAVE_SME_CONST const +# define HAVE_SME_VALUE 0 +#endif + +/* Define the symbol gating SME support in libgcc. */ +HAVE_SME_CONST _Bool __aarch64_have_sme + __attribute__((visibility("hidden"), nocommon)) = HAVE_SME_VALUE; + +#ifdef HAVE_SME_CTOR +/* Use a higher priority to ensure it runs before user constructors + with priority 100. */ +static void __attribute__((constructor (90))) +init_have_sme (void) +{ + __aarch64_have_sme = HAVE_SME_CTOR; +} +#endif diff --git a/libgcc/config/aarch64/__arm_sme_state.S b/libgcc/config/aarch64/__arm_sme_state.S new file mode 100644 index 00000000000..c4e16cac00d --- /dev/null +++ b/libgcc/config/aarch64/__arm_sme_state.S @@ -0,0 +1,55 @@ +/* Support routine for SME. + Copyright (C) 2023 Free Software Foundation, Inc. + + This file is part of GCC. + + GCC is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GCC is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details. + + Under Section 7 of GPL version 3, you are granted additional + permissions described in the GCC Runtime Library Exception, version + 3.1, as published by the Free Software Foundation. + + You should have received a copy of the GNU General Public License and + a copy of the GCC Runtime Library Exception along with this program; + see the files COPYING3 and COPYING.RUNTIME respectively. If not, see + . */ + +#include "aarch64-asm.h" + +/* Query SME state. Call ABI: + - Private ZA, streaming-compatible. + - x2-x15, x19-x29, sp and fp regs are call preserved. + - Takes no argument. + - Returns SME state in x0 and TPIDR2_EL0 in x1. */ + +.hidden __aarch64_have_sme + +variant_pcs (__arm_sme_state) + +ENTRY (__arm_sme_state) + /* Check if SME is available. */ + adrp x1, __aarch64_have_sme + ldrb w1, [x1, :lo12:__aarch64_have_sme] + cbz w1, L(nosme) + + /* Expose the bottom 2 bits of svcr (SM, ZA) in x0 and set the + top 2 bits indicating that SME and TPIDR2_EL0 are available. */ + .inst 0xd53b4240 /* mrs x0, svcr */ + .inst 0xd53bd0a1 /* mrs x1, tpidr2_el0 */ + and x0, x0, 3 + orr x0, x0, 0xc000000000000000 + ret + +L(nosme): + mov x0, 0 + mov x1, 0 + ret +END (__arm_sme_state) diff --git a/libgcc/config/aarch64/__arm_tpidr2_restore.S b/libgcc/config/aarch64/__arm_tpidr2_restore.S new file mode 100644 index 00000000000..4569d04a2d0 --- /dev/null +++ b/libgcc/config/aarch64/__arm_tpidr2_restore.S @@ -0,0 +1,89 @@ +/* Support routine for SME. + Copyright (C) 2023 Free Software Foundation, Inc. + + This file is part of GCC. + + GCC is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GCC is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details. + + Under Section 7 of GPL version 3, you are granted additional + permissions described in the GCC Runtime Library Exception, version + 3.1, as published by the Free Software Foundation. + + You should have received a copy of the GNU General Public License and + a copy of the GCC Runtime Library Exception along with this program; + see the files COPYING3 and COPYING.RUNTIME respectively. If not, see + . */ + +#include "aarch64-asm.h" + +/* Used for lazy ZA restore. Call ABI: + - Shared ZA, streaming-compatible. + - x0 is a pointer to a TPIDR2 block. + - x0-x13, x19-x29, sp and fp regs are call preserved. + - Does not return a value. + - Can abort on failure (then registers are not preserved). */ + +variant_pcs (__arm_tpidr2_restore) + +ENTRY (__arm_tpidr2_restore) + .inst 0xd53bd0ae /* mrs x14, tpidr2_el0 */ + cbnz x14, L(fail) + + /* check reserved bytes. */ + ldrh w15, [x0, 10] + ldr w16, [x0, 12] + orr w15, w15, w16 + cbnz w15, L(fail) + + ldr x16, [x0] + cbz x16, L(end) + ldrh w17, [x0, 8] + cbz w17, L(end) + + /* x0: blk, x14: 0, x15: 0, + x16: za_save_buffer, x17: num_za_save_slices. */ + +L(restore_loop): + .inst 0xe1006200 /* ldr za[w15, 0], [x16] */ + .inst 0xe1006201 /* ldr za[w15, 1], [x16, 1, mul vl] */ + .inst 0xe1006202 /* ldr za[w15, 2], [x16, 2, mul vl] */ + .inst 0xe1006203 /* ldr za[w15, 3], [x16, 3, mul vl] */ + .inst 0xe1006204 /* ldr za[w15, 4], [x16, 4, mul vl] */ + .inst 0xe1006205 /* ldr za[w15, 5], [x16, 5, mul vl] */ + .inst 0xe1006206 /* ldr za[w15, 6], [x16, 6, mul vl] */ + .inst 0xe1006207 /* ldr za[w15, 7], [x16, 7, mul vl] */ + .inst 0xe1006208 /* ldr za[w15, 8], [x16, 8, mul vl] */ + .inst 0xe1006209 /* ldr za[w15, 9], [x16, 9, mul vl] */ + .inst 0xe100620a /* ldr za[w15, 10], [x16, 10, mul vl] */ + .inst 0xe100620b /* ldr za[w15, 11], [x16, 11, mul vl] */ + .inst 0xe100620c /* ldr za[w15, 12], [x16, 12, mul vl] */ + .inst 0xe100620d /* ldr za[w15, 13], [x16, 13, mul vl] */ + .inst 0xe100620e /* ldr za[w15, 14], [x16, 14, mul vl] */ + .inst 0xe100620f /* ldr za[w15, 15], [x16, 15, mul vl] */ + add w15, w15, 16 + .inst 0x04305a10 /* addsvl x16, x16, 16 */ + cmp w17, w15 + bhi L(restore_loop) +L(end): + ret +L(fail): + PACIASP + stp x29, x30, [sp, -32]! + .cfi_adjust_cfa_offset 32 + .cfi_rel_offset x29, 0 + .cfi_rel_offset x30, 8 + mov x29, sp + .inst 0x04e0e3f0 /* cntd x16 */ + str x16, [sp, 16] + .cfi_rel_offset 46, 16 + .inst 0xd503467f /* smstop */ + bl abort +END (__arm_tpidr2_restore) diff --git a/libgcc/config/aarch64/__arm_tpidr2_save.S b/libgcc/config/aarch64/__arm_tpidr2_save.S new file mode 100644 index 00000000000..879cf798079 --- /dev/null +++ b/libgcc/config/aarch64/__arm_tpidr2_save.S @@ -0,0 +1,101 @@ +/* Support routine for SME. + Copyright (C) 2023 Free Software Foundation, Inc. + + This file is part of GCC. + + GCC is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GCC is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details. + + Under Section 7 of GPL version 3, you are granted additional + permissions described in the GCC Runtime Library Exception, version + 3.1, as published by the Free Software Foundation. + + You should have received a copy of the GNU General Public License and + a copy of the GCC Runtime Library Exception along with this program; + see the files COPYING3 and COPYING.RUNTIME respectively. If not, see + . */ + +#include "aarch64-asm.h" + +/* Used for lazy ZA save. Call ABI: + - Private ZA, streaming-compatible. + - x0-x13, x19-x29, sp and fp regs are call preserved. + - Takes no argument. + - Does not return a value. + - Can abort on failure (then registers are not preserved). */ + +.hidden __aarch64_have_sme + +variant_pcs (__arm_tpidr2_save) + +ENTRY (__arm_tpidr2_save) + /* Check if SME is available. */ + adrp x14, __aarch64_have_sme + ldrb w14, [x14, :lo12:__aarch64_have_sme] + cbz w14, L(end) + + .inst 0xd53bd0ae /* mrs x14, tpidr2_el0 */ + cbz x14, L(end) + + /* check reserved bytes. */ + ldrh w15, [x14, 10] + ldr w16, [x14, 12] + orr w15, w15, w16 + cbnz w15, L(fail) + + ldr x16, [x14] + cbz x16, L(end) + ldrh w17, [x14, 8] + cbz w17, L(end) + + /* x14: tpidr2, x15: 0, + x16: za_save_buffer, x17: num_za_save_slices. */ + +L(save_loop): + .inst 0xe1206200 /* str za[w15, 0], [x16] */ + .inst 0xe1206201 /* str za[w15, 1], [x16, 1, mul vl] */ + .inst 0xe1206202 /* str za[w15, 2], [x16, 2, mul vl] */ + .inst 0xe1206203 /* str za[w15, 3], [x16, 3, mul vl] */ + .inst 0xe1206204 /* str za[w15, 4], [x16, 4, mul vl] */ + .inst 0xe1206205 /* str za[w15, 5], [x16, 5, mul vl] */ + .inst 0xe1206206 /* str za[w15, 6], [x16, 6, mul vl] */ + .inst 0xe1206207 /* str za[w15, 7], [x16, 7, mul vl] */ + .inst 0xe1206208 /* str za[w15, 8], [x16, 8, mul vl] */ + .inst 0xe1206209 /* str za[w15, 9], [x16, 9, mul vl] */ + .inst 0xe120620a /* str za[w15, 10], [x16, 10, mul vl] */ + .inst 0xe120620b /* str za[w15, 11], [x16, 11, mul vl] */ + .inst 0xe120620c /* str za[w15, 12], [x16, 12, mul vl] */ + .inst 0xe120620d /* str za[w15, 13], [x16, 13, mul vl] */ + .inst 0xe120620e /* str za[w15, 14], [x16, 14, mul vl] */ + .inst 0xe120620f /* str za[w15, 15], [x16, 15, mul vl] */ + add w15, w15, 16 + .inst 0x04305a10 /* addsvl x16, x16, 16 */ + cmp w17, w15 + bhi L(save_loop) +L(end): + ret +L(fail): + PACIASP + stp x29, x30, [sp, -32]! + .cfi_adjust_cfa_offset 32 + .cfi_rel_offset x29, 0 + .cfi_rel_offset x30, 8 + mov x29, sp + .inst 0x04e0e3f0 /* cntd x16 */ + str x16, [sp, 16] + .cfi_rel_offset 46, 16 + .inst 0xd503467f /* smstop */ + bl abort +END (__arm_tpidr2_save) + +/* Hidden alias used by __arm_za_disable. */ +.global __libgcc_arm_tpidr2_save +.hidden __libgcc_arm_tpidr2_save +.set __libgcc_arm_tpidr2_save, __arm_tpidr2_save diff --git a/libgcc/config/aarch64/__arm_za_disable.S b/libgcc/config/aarch64/__arm_za_disable.S new file mode 100644 index 00000000000..7a888a98d49 --- /dev/null +++ b/libgcc/config/aarch64/__arm_za_disable.S @@ -0,0 +1,66 @@ +/* Support routine for SME. + Copyright (C) 2023 Free Software Foundation, Inc. + + This file is part of GCC. + + GCC is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GCC is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details. + + Under Section 7 of GPL version 3, you are granted additional + permissions described in the GCC Runtime Library Exception, version + 3.1, as published by the Free Software Foundation. + + You should have received a copy of the GNU General Public License and + a copy of the GCC Runtime Library Exception along with this program; + see the files COPYING3 and COPYING.RUNTIME respectively. If not, see + . */ + +#include "aarch64-asm.h" + +/* Disable ZA. Call ABI: + - Private ZA, streaming-compatible. + - x0-x13, x19-x29, sp and fp regs are call preserved. + - Takes no argument. + - Does not return a value. + - Can abort on failure (then registers are not preserved). */ + +.hidden __aarch64_have_sme + +.hidden __libgcc_arm_tpidr2_save + +variant_pcs (__arm_za_disable) + +ENTRY (__arm_za_disable) + /* Check if SME is available. */ + adrp x14, __aarch64_have_sme + ldrb w14, [x14, :lo12:__aarch64_have_sme] + cbz w14, L(end) + + .inst 0xd53bd0ae /* mrs x14, tpidr2_el0 */ + cbz x14, L(end) + + PACIASP + stp x29, x30, [sp, -16]! + .cfi_adjust_cfa_offset 16 + .cfi_rel_offset x29, 0 + .cfi_rel_offset x30, 8 + mov x29, sp + bl __libgcc_arm_tpidr2_save + mov x14, 0 + .inst 0xd51bd0ae /* msr tpidr2_el0, x14 */ + .inst 0xd503447f /* smstop za */ + ldp x29, x30, [sp], 16 + .cfi_adjust_cfa_offset -16 + .cfi_restore x29 + .cfi_restore x30 + AUTIASP +L(end): + ret +END (__arm_za_disable) diff --git a/libgcc/config/aarch64/aarch64-asm.h b/libgcc/config/aarch64/aarch64-asm.h new file mode 100644 index 00000000000..8969b06b09c --- /dev/null +++ b/libgcc/config/aarch64/aarch64-asm.h @@ -0,0 +1,98 @@ +/* AArch64 asm definitions. + Copyright (C) 2023 Free Software Foundation, Inc. + + This file is part of GCC. + + GCC is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GCC is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY + or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public + License for more details. + + Under Section 7 of GPL version 3, you are granted additional + permissions described in the GCC Runtime Library Exception, version + 3.1, as published by the Free Software Foundation. + + You should have received a copy of the GNU General Public License and + a copy of the GCC Runtime Library Exception along with this program; + see the files COPYING3 and COPYING.RUNTIME respectively. If not, see + . */ + +#include "auto-target.h" + +#define L(label) .L ## label + +/* Marking variant PCS symbol references is important for PLT calls + otherwise it is for documenting the PCS in the symbol table. */ +#ifdef HAVE_AS_VARIANT_PCS +# define variant_pcs(name) .variant_pcs name +#else +# define variant_pcs(name) +#endif + +/* GNU_PROPERTY_AARCH64_* macros from elf.h for use in asm code. */ +#define FEATURE_1_AND 0xc0000000 +#define FEATURE_1_BTI 1 +#define FEATURE_1_PAC 2 + +/* Supported features based on the code generation options. */ +#if defined(__ARM_FEATURE_BTI_DEFAULT) +# define BTI_FLAG FEATURE_1_BTI +# define BTI_C hint 34 +#else +# define BTI_FLAG 0 +# define BTI_C +#endif + +#if __ARM_FEATURE_PAC_DEFAULT & 3 +# define PAC_FLAG FEATURE_1_PAC +# define PACIASP hint 25; .cfi_window_save +# define AUTIASP hint 29; .cfi_window_save +#else +# define PAC_FLAG 0 +# define PACIASP +# define AUTIASP +#endif + +/* Add a NT_GNU_PROPERTY_TYPE_0 note. */ +#define GNU_PROPERTY(type, value) \ + .section .note.gnu.property, "a"; \ + .p2align 3; \ + .word 4; \ + .word 16; \ + .word 5; \ + .asciz "GNU"; \ + .word type; \ + .word 4; \ + .word value; \ + .word 0; \ + .previous + +#if defined(__linux__) || defined(__FreeBSD__) +/* Do not require executable stack. */ +.section .note.GNU-stack, "", %progbits +.previous + +/* Add GNU property note if built with branch protection. */ +# if (BTI_FLAG|PAC_FLAG) != 0 +GNU_PROPERTY (FEATURE_1_AND, BTI_FLAG|PAC_FLAG) +# endif +#endif + +#define ENTRY_ALIGN(name, align) \ + .global name; \ + .type name,%function; \ + .balign align; \ + name: \ + .cfi_startproc; \ + BTI_C + +#define ENTRY(name) ENTRY_ALIGN(name, 16) + +#define END(name) \ + .cfi_endproc; \ + .size name, .-name diff --git a/libgcc/config/aarch64/libgcc-sme.ver b/libgcc/config/aarch64/libgcc-sme.ver new file mode 100644 index 00000000000..da889c6c09e --- /dev/null +++ b/libgcc/config/aarch64/libgcc-sme.ver @@ -0,0 +1,24 @@ +# Copyright (C) 2023 Free Software Foundation, Inc. +# +# This file is part of GCC. +# +# GCC is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 3, or (at your option) +# any later version. +# +# GCC is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GCC; see the file COPYING3. If not see +# . + +GCC_14.0 { + __arm_sme_state + __arm_tpidr2_restore + __arm_tpidr2_save + __arm_za_disable +} diff --git a/libgcc/config/aarch64/t-aarch64 b/libgcc/config/aarch64/t-aarch64 index a40b6241c86..7b852022a4d 100644 --- a/libgcc/config/aarch64/t-aarch64 +++ b/libgcc/config/aarch64/t-aarch64 @@ -19,3 +19,13 @@ # . LIB2ADD += $(srcdir)/config/aarch64/sync-cache.c + +# Add sme runtime to shared libgcc +LIB2ADDEH += \ + $(srcdir)/config/aarch64/__aarch64_have_sme.c \ + $(srcdir)/config/aarch64/__arm_sme_state.S \ + $(srcdir)/config/aarch64/__arm_tpidr2_restore.S \ + $(srcdir)/config/aarch64/__arm_tpidr2_save.S \ + $(srcdir)/config/aarch64/__arm_za_disable.S + +SHLIB_MAPFILES += $(srcdir)/config/aarch64/libgcc-sme.ver