Message ID | 8ebe0679d0d92c8c39bffc98e1f30e2b29770e00.1699025214.git.szabolcs.nagy@arm.com |
---|---|
State | Accepted |
Headers |
Return-Path: <gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:8f47:0:b0:403:3b70:6f57 with SMTP id j7csp1124485vqu; Fri, 3 Nov 2023 08:37:34 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHlEKCb1LB8Y/gRTCeEWqtlciDckrbqActsTT0/jz2eY40EyRlSJ4LaYq/S7jtAYQVqFQgT X-Received: by 2002:a05:622a:208:b0:417:d600:115d with SMTP id b8-20020a05622a020800b00417d600115dmr24010402qtx.66.1699025854470; Fri, 03 Nov 2023 08:37:34 -0700 (PDT) ARC-Seal: i=4; a=rsa-sha256; t=1699025854; cv=pass; d=google.com; s=arc-20160816; b=qTIspYg+6OoWKtug3D0BSowtXLRDTWn8QV8FcakX2QCRCwYnp64VD/QaWX7VO0Z+d8 uBmKTRT3b2l8PltNydgpWFGJW0CSI72qYAKoh8wEaaAdAZ/I/IJEqicfWIuqa9ccQDaf GYCoNQEg3Lkgbkw1Suci+mamodAHl7fSRWHOcimhVx6wInJ+2zrj4YBQNkj7dfylq5gk /5R630ZtZLjyF1b6hwDG88odije4aeWwhyBLBQp1yL9Np5zVcNziGZozRHm36ANDAbHF fikGmuJj8UuB6BvT1I7jL3fWeQtW4CWD6pckaVcUXVMcfxuALIAxTlkx3ovrbStQsZdX FnpA== ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:nodisclaimer :content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:dkim-signature:dkim-signature :arc-filter:dmarc-filter:delivered-to; bh=F4q9unvZmUtJ0Eaw4piLkSRdZev3w13TJMxDdPHMb/c=; fh=gk9A5O7Gbglvz1MjrRQ4hZ2i3c68kYkpOZJg1emXh+g=; b=dmBlbEGUgQtDFv6lg7GSLvrfQH5xjEPojnnzdtQaDvlPZ6nAg1rixhTZgx8Gkpqc6e uN0DHoMQzUuH28JfQykZXdUMQUw9PBWcUD3oBepiPtyBmrmSykEsbV9IYqjAYz8OrqUP zNTgSKzkcEeR2oj+Xvrtq1QCe4rSnA/mY+KEOrMT1K5TZoSu3w6LWL8kAL9cgJya5x0X qOxEJ8MOMHUEXCx9O+3NSmf126neo0az5ZED3zOFF2r+WkbejNFvu225f6UQd/SBDMLM UzqhE31pFIFQPwgOkco6brghqYjwc9QayQewjkzuNCmJrkMEEMbcfOok+1rgooOd+slt 6Qkg== ARC-Authentication-Results: i=4; mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=vxX5FJgh; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=vxX5FJgh; arc=pass (i=3); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from server2.sourceware.org (server2.sourceware.org. [8.43.85.97]) by mx.google.com with ESMTPS id y9-20020ac85f49000000b0041805eb94ffsi1723886qta.206.2023.11.03.08.37.34 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Nov 2023 08:37:34 -0700 (PDT) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) client-ip=8.43.85.97; Authentication-Results: mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=vxX5FJgh; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=vxX5FJgh; arc=pass (i=3); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 3AE603861820 for <ouuuleilei@gmail.com>; Fri, 3 Nov 2023 15:37:23 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on2057.outbound.protection.outlook.com [40.107.7.57]) by sourceware.org (Postfix) with ESMTPS id C45163858D39 for <gcc-patches@gcc.gnu.org>; Fri, 3 Nov 2023 15:36:45 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org C45163858D39 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org C45163858D39 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.7.57 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1699025816; cv=pass; b=mppLYGFWx41B8n1h8OqQI8vSaQEUVDxXhtgTCKVXDEXFIdI7TLMczn+Rea1FomXqq3CKRp1j++VzTyIYa2jjGcstYY9iqdydzPWo8mPOXdO8iZUdTT5b94jtgh3wNejDF12vtlwaJdyGdg0D8UPQaQyCqwtSnr8EgK7ZMmTbock= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1699025816; c=relaxed/simple; bh=DpZGxcrWa22Jkcj06j3u6daGAAlg8evE6djoBNvDVJE=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=Z5W9jOwoHL4JVOB6AI5m5xnAtXyRmk/gin0dByg9HouxRgPfC15DXr69/Lu1xAolBVyiKGdzp+cfcMAJDiGDvhy7qFAEGbqUzJNRoh5VTD5CCUPNKkSyejA0PxtNZ17muzlu66AmHYpmm1+pAKmEwyFt192Dg9Opxwf4p10jPmA= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=DuzarS+ziQNT4yV5UfT6mHLfXpVHaAoAh+JO+uWfmTum9KufLjypoo+BtBBGVrye+NDj1C4SqzXH3Xyud+h1eoFqi3IrFxkDdKxXCnevKjjYwW7gifngZNXDsxfymek2KIk7QYLRIYm578AkpM8vo7JKBFelTs3BAoA+zmtuJuDSy2Z5lKTjNkN2aBstvDO4NA61YrF50UJBWBJM33vYPNEB8ZeafLeTAhDF57fyo1iqPdZvim8ujOocjg9HUrMAVez1K+PNqbCMNAIsMZ1DRodk+Wb6bM7JfIHctlAvDSX4yEw3wAohittvXOuciAY1Xqb/+zYhgB/2IYjWk3cfow== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=F4q9unvZmUtJ0Eaw4piLkSRdZev3w13TJMxDdPHMb/c=; b=gIK4Il8cBoYTB9/Xq6/UzE5GSjDFPe2UBsfuAup/gfYcMpIJMqIh9ENOiAH5Zuz0YzGFcQyL3q4mACRkp85ichNda67qIzchVcPpe89ZT+lsicz0XTa1OPFL3FjSIgAy9qKWp0f0Ns/HLgKSosrAd5a7ybhIc13VG6DFkRfqlXDxtoakThvejVv7u5egCBI51+t8WMVodNEMwE8PammufYt5VZdf07JpIzkuuonhU0YotRfQ4/uq37WT4O1VfkGqJ5VfEJg0adPjMhiFNkHeY744g9RuML8m/ibffgs/9HBVqDxEiiDuJKIUS8gFrA21KT6CS3lBKFaGdeNxoa1nrQ== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=F4q9unvZmUtJ0Eaw4piLkSRdZev3w13TJMxDdPHMb/c=; b=vxX5FJgh50e5vy1sPwA7KEjjltJ7D1phj8m8NY8o85z8hnGTcFBqel5BfaOjkdMdr5Tx2w/ZRSf6TDOT+LgJuJM+NeXHH1hnX8XMoajVOKVE5zoITvSxje1/CA/0U1ZS4AkjO+gartxhIboEg6sA6czly/RWZsNxA/la9gPkPMQ= Received: from AS8PR07CA0048.eurprd07.prod.outlook.com (2603:10a6:20b:459::22) by DB8PR08MB5482.eurprd08.prod.outlook.com (2603:10a6:10:116::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6933.29; Fri, 3 Nov 2023 15:36:42 +0000 Received: from AM2PEPF0001C716.eurprd05.prod.outlook.com (2603:10a6:20b:459:cafe::59) by AS8PR07CA0048.outlook.office365.com (2603:10a6:20b:459::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6977.10 via Frontend Transport; Fri, 3 Nov 2023 15:36:42 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM2PEPF0001C716.mail.protection.outlook.com (10.167.16.186) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.19 via Frontend Transport; Fri, 3 Nov 2023 15:36:42 +0000 Received: ("Tessian outbound 5d213238733f:v228"); Fri, 03 Nov 2023 15:36:42 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 2545605babbdbae2 X-CR-MTA-TID: 64aa7808 Received: from abc0e71c5094.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 09A3DDA2-EDC7-43DF-825E-178854F9BB0D.1; Fri, 03 Nov 2023 15:36:36 +0000 Received: from EUR02-AM0-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id abc0e71c5094.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 03 Nov 2023 15:36:36 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kmTZ2CVUVx6Pel8WrVeTUPoORAEtP8lKTtUtmvNrcjCFS4qj0FX7IkjlMu/MsXWH71L/lN2gFPQnJdMMNeHIGuR4+5L9dNM/xmf1yQFkc7jbm4gyOgPL2QeMi24DwnbfcDAUuh3+IcuFJlOvlKX32WMqV+xUmoR/Fz1KujjzPfJFFYX5MW+B2Tij7homT93chCqTMzB+87P6dxu9l5swKMgEFAvAdikFEJKsWQYcO3LgdDk0T6iXnR+ZVlmQNZlgW24DKrYrZr/nK5B+ffXhmImvBhCOl8L6U++3o42tzrRxpEa+6TEtuYqZt+/nxOC2059WA2nNviOoiTtUaiwZiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=F4q9unvZmUtJ0Eaw4piLkSRdZev3w13TJMxDdPHMb/c=; b=jOOXWuHO1kplLdglCk6EOURcLRdPgjQ90qPyCM/I807f+VlaOdUKHq3CTPtuJZkPVAQgBk7vAl6KPPuHuKWKibRvaD3AF7/ZE+FCBAiw+4SfRTwCXdHhLRKImFvKg6LEYSyUUwmbQtLaIIiumAIBXBbtUXA0WR6zo2EABChHUD08M8XB6CJ+up2KKbRat1vGYTp6MC1bVXZfvVC6Qm1TIXe9BoKuUkcIy0aEQrM5UoJTwK0buxYmVG/Jwk6nBWyjgwaCHOOdOeOWVN2oQelu4cNGa1j9MCeIeKDLW59W0NmJnmLfTyLdLmKgMiLzPtGuKohPIbzI71pTdVawF6Jnnw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=F4q9unvZmUtJ0Eaw4piLkSRdZev3w13TJMxDdPHMb/c=; b=vxX5FJgh50e5vy1sPwA7KEjjltJ7D1phj8m8NY8o85z8hnGTcFBqel5BfaOjkdMdr5Tx2w/ZRSf6TDOT+LgJuJM+NeXHH1hnX8XMoajVOKVE5zoITvSxje1/CA/0U1ZS4AkjO+gartxhIboEg6sA6czly/RWZsNxA/la9gPkPMQ= Received: from AM6P194CA0003.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:90::16) by PAWPR08MB9832.eurprd08.prod.outlook.com (2603:10a6:102:2ea::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.19; Fri, 3 Nov 2023 15:36:34 +0000 Received: from AM1PEPF000252DE.eurprd07.prod.outlook.com (2603:10a6:209:90:cafe::b1) by AM6P194CA0003.outlook.office365.com (2603:10a6:209:90::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.21 via Frontend Transport; Fri, 3 Nov 2023 15:36:34 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AM1PEPF000252DE.mail.protection.outlook.com (10.167.16.56) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.6954.19 via Frontend Transport; Fri, 3 Nov 2023 15:36:34 +0000 Received: from AZ-NEU-EX02.Emea.Arm.com (10.251.26.5) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Fri, 3 Nov 2023 15:36:33 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX02.Emea.Arm.com (10.251.26.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Fri, 3 Nov 2023 15:36:32 +0000 Received: from armchair.cambridge.arm.com (10.2.80.71) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2507.32 via Frontend Transport; Fri, 3 Nov 2023 15:36:32 +0000 From: Szabolcs Nagy <szabolcs.nagy@arm.com> To: <gcc-patches@gcc.gnu.org> Subject: [PATCH v2 5/7] aarch64,arm: Remove accepted_branch_protection_string Date: Fri, 3 Nov 2023 15:36:32 +0000 Message-ID: <8ebe0679d0d92c8c39bffc98e1f30e2b29770e00.1699025214.git.szabolcs.nagy@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <cover.1699025214.git.szabolcs.nagy@arm.com> References: <cover.1699025214.git.szabolcs.nagy@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AM1PEPF000252DE:EE_|PAWPR08MB9832:EE_|AM2PEPF0001C716:EE_|DB8PR08MB5482:EE_ X-MS-Office365-Filtering-Correlation-Id: 8e3e7c3f-0f1d-4dd2-9119-08dbdc82ae13 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: ZwjOkBk48cKCUfPIoSAniBj63JtYXAUNK76w7XgaE8InXuB+fbdqjpxqkCJIWDcgPUhIhuTPv/YBx4ft4W2qnq7GaCiS4AQZ0ve3zJNcgh+Gp/MI79jXAodaAlME0muK8l8QCJnT+6/nFjvvANQOBqIYT9r6ogHokzpPjglMDavhKT6AoLfxsu9Vfx06qELZOBuVTT1Q81Cq/I4sFQrDD1SdtMIhrcomNCQMgK6eigMQmT1s2ls7BCO5S1u3Ct3AoPQ7K3Is44FQ5q3T+jcavhuJxp75R+8jn4VQhhtUz6pr8qFhmVQxz27QpwWLjkmbDx03A4g1+EDm7WiED9lsczRvsr6sP89EcgawYKUCCrdbIcYtTxYkorOnGOoo+IUbS78bYuPTRk34VdqR2DKo1dTa6NIXetHP+RlOOc2URC+FmY8Au3jNlWVjn+e9/vBSqSWKd3/IA0zlshQ+Snc57IHrKRu/jo6RB2h4tfy3+Aegm+BGuNejWe18swGkdvdjyMLOagjeKAauId6qgst5NTopZDZB1H9pjh4nUhl+IIC8MgXWa9Rj/j9VAPxGJxWpJj8EePuG9Qfq6P4kNudH0g53QXHOlI/Cn2MRl+/LXXTDDbtWhEAS5PIu4wKjwfzm6hZJWNwlPkRdFxtpl7at1RrzDlyfA05uPsr7htJhXpDK9TThMpcZicofbHaepqCeatl95ojcLLL70YstJVQcXNIeADIUUEOUiHPv1rabHqmKe5BrFO2S2b+rwpY2nt8a7CjbwtKA/jVM/wCEdFyNzA== X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(4636009)(136003)(39860400002)(346002)(376002)(396003)(230922051799003)(64100799003)(451199024)(186009)(82310400011)(1800799009)(40470700004)(36840700001)(46966006)(83380400001)(40480700001)(2616005)(26005)(36756003)(40460700003)(81166007)(82740400003)(86362001)(356005)(2906002)(5660300002)(36860700001)(336012)(426003)(478600001)(47076005)(7696005)(8676002)(316002)(6916009)(8936002)(44832011)(41300700001)(70586007)(70206006)(36900700001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR08MB9832 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM2PEPF0001C716.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 99b698e9-5f83-436a-6d77-08dbdc82a941 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: CA/xeevJd3PZ9FFj2XiSs65SLUVGVZayjgOVbptsgalp01yCo/txRWrXDitCnC6MY0qDMWjk0BOn+d0/d4W8mlrHNaqXkke21WUXQlVVR+QNjHCuH05Unf+5Kz5KOwRF6QcwZdmUT4SAH4ew9nFsMzR/pFCuEDMJs4IqSWFzQb5FxRjVTe2WLXySu6zQwg4SJoljQa304ouWcZVtony4g7LiCinmI4xOOMKH59rPUuDWTTvjbIv93H1gWD8NuBX5Lxc0M7HOUQwURsTkG6Ni+WMqZy4pWzYbjFdYBEKLQHjBse5OLx/EHM/PtH09zis83ghTZUDlLPtdTHdZ6XDvY/y9D//5R+rhDWl8s3NoYp0JJMfNil0FCIljXYQyfXyr06NNhM38ZNPz19JLdwMRSIRpOSu7uyLnNQaha6NnQptF1V4z5jxmOu4b9fRIaUYK6VQCMrqEbVpcxiJb+TFFi1YKWcY6bq1gOW/Bthn0wmPWE2Zfa5G1Bjn3H1P9MlC4iClLZMeK6H2SZdxaJtDWtBp+n30Jite8SMcoPc/ouf8aGieKvp8D0NoM2ufOHNWQJRvq8qFo0vQ/AOAxylI0IwfHnLrV5CrgZCv2oeP6wVdH0SZ+TWfY6b6lUR8/c86i7L2REGX26M0UYeqYMtYsKc3+hc6zqu7P08Ot4SyNV/cfpA+uYMYZav1TQ8hbT4N5z8QFHr3kG7NcwJf8PdALla5FRPlIqEW1ybXTrBPFh1X+e8FsXKyweMQqj2b6hW4X X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(4636009)(396003)(376002)(136003)(39860400002)(346002)(230922051799003)(186009)(451199024)(1800799009)(82310400011)(64100799003)(46966006)(40470700004)(36840700001)(86362001)(82740400003)(36756003)(40480700001)(40460700003)(2906002)(8676002)(8936002)(44832011)(41300700001)(7696005)(478600001)(83380400001)(2616005)(70586007)(70206006)(5660300002)(426003)(26005)(316002)(6916009)(81166007)(336012)(47076005)(36860700001); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Nov 2023 15:36:42.6965 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8e3e7c3f-0f1d-4dd2-9119-08dbdc82ae13 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM2PEPF0001C716.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5482 X-Spam-Status: No, score=-11.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, FORGED_SPF_HELO, GIT_PATCH_0, KAM_DMARC_NONE, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list <gcc-patches.gcc.gnu.org> List-Unsubscribe: <https://gcc.gnu.org/mailman/options/gcc-patches>, <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe> List-Archive: <https://gcc.gnu.org/pipermail/gcc-patches/> List-Post: <mailto:gcc-patches@gcc.gnu.org> List-Help: <mailto:gcc-patches-request@gcc.gnu.org?subject=help> List-Subscribe: <https://gcc.gnu.org/mailman/listinfo/gcc-patches>, <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe> Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1781557733981342319 X-GMAIL-MSGID: 1781557733981342319 |
Series |
aarch64 GCS preliminary patches
|
|
Checks
Context | Check | Description |
---|---|---|
snail/gcc-patch-check | success | Github commit url |
Commit Message
Szabolcs Nagy
Nov. 3, 2023, 3:36 p.m. UTC
On aarch64 this caused ICE with pragma push_options since commit ae54c1b09963779c5c3914782324ff48af32e2f1 Author: Wilco Dijkstra <wilco.dijkstra@arm.com> CommitDate: 2022-06-01 18:13:57 +0100 AArch64: Cleanup option processing code The failure is at pop_options: internal compiler error: ‘global_options’ are modified in local context On arm the variable was unused. gcc/ChangeLog: * config/aarch64/aarch64.cc (aarch64_override_options_after_change_1): Do not override branch_protection options. (aarch64_override_options): Remove accepted_branch_protection_string. * config/arm/aarch-common.cc (BRANCH_PROTECT_STR_MAX): Remove. (aarch_parse_branch_protection): Remove accepted_branch_protection_string. * config/arm/arm.cc: Likewise. --- unchanged from v1 --- gcc/config/aarch64/aarch64.cc | 10 +--------- gcc/config/arm/aarch-common.cc | 16 ---------------- gcc/config/arm/arm.cc | 2 -- 3 files changed, 1 insertion(+), 27 deletions(-)
Comments
Szabolcs Nagy <szabolcs.nagy@arm.com> writes: > On aarch64 this caused ICE with pragma push_options since > > commit ae54c1b09963779c5c3914782324ff48af32e2f1 > Author: Wilco Dijkstra <wilco.dijkstra@arm.com> > CommitDate: 2022-06-01 18:13:57 +0100 > > AArch64: Cleanup option processing code > > The failure is at pop_options: > > internal compiler error: ‘global_options’ are modified in local context > > On arm the variable was unused. > > gcc/ChangeLog: > > * config/aarch64/aarch64.cc (aarch64_override_options_after_change_1): > Do not override branch_protection options. > (aarch64_override_options): Remove accepted_branch_protection_string. > * config/arm/aarch-common.cc (BRANCH_PROTECT_STR_MAX): Remove. > (aarch_parse_branch_protection): Remove > accepted_branch_protection_string. > * config/arm/arm.cc: Likewise. OK. Not sure I fully understand the subtlety of how things worked before Wilco's patch, but I agree it looks like all the results of the parsing are correctly captured by Target options or TargetVariables in aarch64.opt, and so no special handling is needed. Thanks, Richard > --- > unchanged from v1 > --- > gcc/config/aarch64/aarch64.cc | 10 +--------- > gcc/config/arm/aarch-common.cc | 16 ---------------- > gcc/config/arm/arm.cc | 2 -- > 3 files changed, 1 insertion(+), 27 deletions(-) > > diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc > index 88594bed8ce..f8e8fefc8d8 100644 > --- a/gcc/config/aarch64/aarch64.cc > +++ b/gcc/config/aarch64/aarch64.cc > @@ -323,8 +323,6 @@ bool aarch64_pcrelative_literal_loads; > /* Global flag for whether frame pointer is enabled. */ > bool aarch64_use_frame_pointer; > > -char *accepted_branch_protection_string = NULL; > - > /* Support for command line parsing of boolean flags in the tuning > structures. */ > struct aarch64_flag_desc > @@ -18101,12 +18099,6 @@ aarch64_adjust_generic_arch_tuning (struct tune_params ¤t_tune) > static void > aarch64_override_options_after_change_1 (struct gcc_options *opts) > { > - if (accepted_branch_protection_string) > - { > - opts->x_aarch64_branch_protection_string > - = xstrdup (accepted_branch_protection_string); > - } > - > /* PR 70044: We have to be careful about being called multiple times for the > same function. This means all changes should be repeatable. */ > > @@ -18715,7 +18707,7 @@ aarch64_override_options (void) > /* Return address signing is currently not supported for ILP32 targets. For > LP64 targets use the configured option in the absence of a command-line > option for -mbranch-protection. */ > - if (!TARGET_ILP32 && accepted_branch_protection_string == NULL) > + if (!TARGET_ILP32 && aarch64_branch_protection_string == NULL) > { > #ifdef TARGET_ENABLE_PAC_RET > aarch_ra_sign_scope = AARCH_FUNCTION_NON_LEAF; > diff --git a/gcc/config/arm/aarch-common.cc b/gcc/config/arm/aarch-common.cc > index 5b96ff4c2e8..cbc7f68a8bf 100644 > --- a/gcc/config/arm/aarch-common.cc > +++ b/gcc/config/arm/aarch-common.cc > @@ -659,9 +659,6 @@ arm_md_asm_adjust (vec<rtx> &outputs, vec<rtx> & /*inputs*/, > return saw_asm_flag ? seq : NULL; > } > > -#define BRANCH_PROTECT_STR_MAX 255 > -extern char *accepted_branch_protection_string; > - > static enum aarch_parse_opt_result > aarch_handle_no_branch_protection (char* str, char* rest) > { > @@ -812,19 +809,6 @@ aarch_parse_branch_protection (const char *const_str, char** last_str) > else > *last_str = NULL; > } > - > - if (res == AARCH_PARSE_OK) > - { > - /* If needed, alloc the accepted string then copy in const_str. > - Used by override_option_after_change_1. */ > - if (!accepted_branch_protection_string) > - accepted_branch_protection_string > - = (char *) xmalloc (BRANCH_PROTECT_STR_MAX + 1); > - strncpy (accepted_branch_protection_string, const_str, > - BRANCH_PROTECT_STR_MAX + 1); > - /* Forcibly null-terminate. */ > - accepted_branch_protection_string[BRANCH_PROTECT_STR_MAX] = '\0'; > - } > return res; > } > > diff --git a/gcc/config/arm/arm.cc b/gcc/config/arm/arm.cc > index 6e933c80183..f49312cace0 100644 > --- a/gcc/config/arm/arm.cc > +++ b/gcc/config/arm/arm.cc > @@ -2424,8 +2424,6 @@ const struct tune_params arm_fa726te_tune = > tune_params::SCHED_AUTOPREF_OFF > }; > > -char *accepted_branch_protection_string = NULL; > - > /* Auto-generated CPU, FPU and architecture tables. */ > #include "arm-cpu-data.h"
diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc index 88594bed8ce..f8e8fefc8d8 100644 --- a/gcc/config/aarch64/aarch64.cc +++ b/gcc/config/aarch64/aarch64.cc @@ -323,8 +323,6 @@ bool aarch64_pcrelative_literal_loads; /* Global flag for whether frame pointer is enabled. */ bool aarch64_use_frame_pointer; -char *accepted_branch_protection_string = NULL; - /* Support for command line parsing of boolean flags in the tuning structures. */ struct aarch64_flag_desc @@ -18101,12 +18099,6 @@ aarch64_adjust_generic_arch_tuning (struct tune_params ¤t_tune) static void aarch64_override_options_after_change_1 (struct gcc_options *opts) { - if (accepted_branch_protection_string) - { - opts->x_aarch64_branch_protection_string - = xstrdup (accepted_branch_protection_string); - } - /* PR 70044: We have to be careful about being called multiple times for the same function. This means all changes should be repeatable. */ @@ -18715,7 +18707,7 @@ aarch64_override_options (void) /* Return address signing is currently not supported for ILP32 targets. For LP64 targets use the configured option in the absence of a command-line option for -mbranch-protection. */ - if (!TARGET_ILP32 && accepted_branch_protection_string == NULL) + if (!TARGET_ILP32 && aarch64_branch_protection_string == NULL) { #ifdef TARGET_ENABLE_PAC_RET aarch_ra_sign_scope = AARCH_FUNCTION_NON_LEAF; diff --git a/gcc/config/arm/aarch-common.cc b/gcc/config/arm/aarch-common.cc index 5b96ff4c2e8..cbc7f68a8bf 100644 --- a/gcc/config/arm/aarch-common.cc +++ b/gcc/config/arm/aarch-common.cc @@ -659,9 +659,6 @@ arm_md_asm_adjust (vec<rtx> &outputs, vec<rtx> & /*inputs*/, return saw_asm_flag ? seq : NULL; } -#define BRANCH_PROTECT_STR_MAX 255 -extern char *accepted_branch_protection_string; - static enum aarch_parse_opt_result aarch_handle_no_branch_protection (char* str, char* rest) { @@ -812,19 +809,6 @@ aarch_parse_branch_protection (const char *const_str, char** last_str) else *last_str = NULL; } - - if (res == AARCH_PARSE_OK) - { - /* If needed, alloc the accepted string then copy in const_str. - Used by override_option_after_change_1. */ - if (!accepted_branch_protection_string) - accepted_branch_protection_string - = (char *) xmalloc (BRANCH_PROTECT_STR_MAX + 1); - strncpy (accepted_branch_protection_string, const_str, - BRANCH_PROTECT_STR_MAX + 1); - /* Forcibly null-terminate. */ - accepted_branch_protection_string[BRANCH_PROTECT_STR_MAX] = '\0'; - } return res; } diff --git a/gcc/config/arm/arm.cc b/gcc/config/arm/arm.cc index 6e933c80183..f49312cace0 100644 --- a/gcc/config/arm/arm.cc +++ b/gcc/config/arm/arm.cc @@ -2424,8 +2424,6 @@ const struct tune_params arm_fa726te_tune = tune_params::SCHED_AUTOPREF_OFF }; -char *accepted_branch_protection_string = NULL; - /* Auto-generated CPU, FPU and architecture tables. */ #include "arm-cpu-data.h"