From patchwork Fri Jul 26 16:32:51 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Claudio Bantaloukas X-Patchwork-Id: 1965357 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=ivzngwEx; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=ivzngwEx; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4WVtc95gYSz20FL for ; Sat, 27 Jul 2024 02:33:45 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id F2AEE385EC56 for ; Fri, 26 Jul 2024 16:33:43 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on20601.outbound.protection.outlook.com [IPv6:2a01:111:f403:2613::601]) by sourceware.org (Postfix) with ESMTPS id 9CD573858404 for ; Fri, 26 Jul 2024 16:33:14 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 9CD573858404 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 9CD573858404 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2613::601 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1722011596; cv=pass; b=uKQjJhMUbEZU3vq7HxvRrPQ2+hzOK+Xkh2PyQg42WLz8cexcMREfFHBjaJ5b6R+saz8Xms9YMToOCLhIZqarAA5oL6TCn4nLud9L+OYSWCNlKzABQ4am3pGEsxLiNHtL1RfIDsNyLbWhWBfRLNPjt9er9Itn2w1/eDpooMJYe2I= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1722011596; c=relaxed/simple; bh=koLeg+PN2/LmqahfEPRtpnKXoW4ungm8cKfA/xb+pdU=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=EtZlyWLqurJFzGBaC/n0TneLjoi9UWYDXPmZlilWeIdp0UroSWC9u9Qgf84kCxqWWvKMDIxz34fn/iztqwa8PTMvYDoJYWWO1guPq7BsdYRHGOn9whc5I+1hlhCFmAoUf77l6LIonWOBTH1D/AYqhBClSabC5yRuyDLumFtqf6E= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=MoFzryh9JZ6jXis/KHlLMpHkQHZ/ZF+c78p4WtaHJELEPzWJKDKq/1wCnxzpx4oVGRvdTaJy0D51oEem8fBSsjJB0wcXJtGLkbNHGRD2VBcnb+wpyRMqXaabdgnpGJLvpF4Z3raFZbudwqi28tDVFYV3IvVW0Ona8fiGB8+F97l5/tHYcA3qzAIKvYe5ZTmYFkmHIbsjA7lb9xaSgXSmmSJn2fEL3QrKMyB02WTGVq4XNwTXCJ3YSxVEqpbAuptND+V5qCMvdcf2beTgN7+gZ+h53V6nVCJ9ci8lqWdH6D4pMl5LWIqKYZZnJtBDzg0VXsz6oVVlXJMmOXM0mmv7Ew== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2AnimoyABzLwXEBxYG46hCALAMV05qv4J+QqjDcE2Gc=; b=vuTCitEcBuyTmyp8b4RhCpli6VBiBq0oWPQaJz+dl0Bk5lpDUvjPY3jKeoA2Cn+t3r/nH7/sSf9CudZ02LDRwZjQmJXsUZ29fCuW+4SElZTPYRf+HslJOgn4sArADWAMa81McUlX6cylm+f/ccQDY/WkBVTGZme7vbxNCKRe03CjmQlaQ/oq7fRfPBQJR/kzhLjvlqtBuAkP9CXuozwT6X/AdH+gUmt1I4J7xsweA/SSrxJO5a1iGb5CkKvEKWCrv/zG1lJQA1TMVU1BAiCG03KZ73HV0TWIg/xvKxq5WOFz4l4f4rtynAOaTme8bS5xsmgsozOfGt7w2BncEYCkUg== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2AnimoyABzLwXEBxYG46hCALAMV05qv4J+QqjDcE2Gc=; b=ivzngwExsnj5oMFWmJZ9x8TF2DcLXXOx71Ioq4CsMxFMqhp4ZSoUBauPYEHvK4WrZF3LVFgR/5w4vTrGZC0kaGFpX/u14mdSBY6J1Y8ouP26HO0M24prbYS2a9tzxzVW7+98Ei2n60gpDy5vPQ64/ajJyNj3eeMGrviIgtJXEAw= Received: from AM6P192CA0059.EURP192.PROD.OUTLOOK.COM (2603:10a6:209:82::36) by GVXPR08MB10615.eurprd08.prod.outlook.com (2603:10a6:150:14b::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.16; Fri, 26 Jul 2024 16:33:08 +0000 Received: from AMS0EPF000001A4.eurprd05.prod.outlook.com (2603:10a6:209:82:cafe::f9) by AM6P192CA0059.outlook.office365.com (2603:10a6:209:82::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.28 via Frontend Transport; Fri, 26 Jul 2024 16:33:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001A4.mail.protection.outlook.com (10.167.16.229) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7784.11 via Frontend Transport; Fri, 26 Jul 2024 16:33:06 +0000 Received: ("Tessian outbound 0808e8e76ea3:v365"); Fri, 26 Jul 2024 16:33:06 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: da54c59355a177d8 X-CR-MTA-TID: 64aa7808 Received: from L98993aad5a7a.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 2126356E-847D-4CC7-B6BD-DFEAD37A688D.1; Fri, 26 Jul 2024 16:32:58 +0000 Received: from EUR02-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id L98993aad5a7a.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 26 Jul 2024 16:32:58 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=AltB8hvpOEE1Ng7ZXaf1hzXapWJD/gjZyLwDff/Q9Q3EF6OgAp0o6NAppqKVGDYZ/KoAwiklcrQmN1vyrvjUTLNy9vg/0lxcC+l9vENPU4sGwMYUlJqjixMgeukgrfEwGnjsJQlGZWf6+p3uhGsT35GVHKEmmTldznhcMKKb1YF1bnzOCzwIrQNEFvjRFCkeps5MkSiqD8wfRSnWEQTcnmN7ccQHP5nrw6fWQxtMfpRaqIAWf41B4xLDc4bjqXyj+TVMLxhSIBj3ovBaQJ2xwbG/6yqAWBi6qe5PCgAItDFUdmtLkxdKo+JL541QW4LlFjBjN+jm2AVjGIBKLSeQuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2AnimoyABzLwXEBxYG46hCALAMV05qv4J+QqjDcE2Gc=; b=OcadhqFxI+7IBn12mdvO+0afYIfVbPTjZP/tXbm/Efzi7GlqWZelUS1wrUFMRjvnozUB+sMUcujiMsKn87XjITnW40CcQ4Ui/W5sxD4N30oLhXFzkfmceS4pEtWdOurf2rJ6PyOuYommPWHFZ0I2pwnoRb9xOmRKZwEy01sTWZ9dcRQvrgUy3fATgII7CMAO4TDzOBHtBEdh9ry+BkwjuNx1puypIjUeEupySMzY7082UdWIORYHmLdbOXyEk3ktr+l4OQSDTuoDWuYIFJN17GdabaCDxJwd3El7wQUkgETO1NSRpKdTXmg79OoglH86aoadObJHjA+lvmloWCn7lg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2AnimoyABzLwXEBxYG46hCALAMV05qv4J+QqjDcE2Gc=; b=ivzngwExsnj5oMFWmJZ9x8TF2DcLXXOx71Ioq4CsMxFMqhp4ZSoUBauPYEHvK4WrZF3LVFgR/5w4vTrGZC0kaGFpX/u14mdSBY6J1Y8ouP26HO0M24prbYS2a9tzxzVW7+98Ei2n60gpDy5vPQ64/ajJyNj3eeMGrviIgtJXEAw= Received: from AS4P250CA0026.EURP250.PROD.OUTLOOK.COM (2603:10a6:20b:5e3::14) by AS2PR08MB10295.eurprd08.prod.outlook.com (2603:10a6:20b:647::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.20; Fri, 26 Jul 2024 16:32:57 +0000 Received: from AM4PEPF00027A65.eurprd04.prod.outlook.com (2603:10a6:20b:5e3:cafe::9b) by AS4P250CA0026.outlook.office365.com (2603:10a6:20b:5e3::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.29 via Frontend Transport; Fri, 26 Jul 2024 16:32:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AM4PEPF00027A65.mail.protection.outlook.com (10.167.16.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7784.11 via Frontend Transport; Fri, 26 Jul 2024 16:32:57 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 26 Jul 2024 16:32:56 +0000 Received: from 221664dbf3aa.euhpc2.arm.com (10.58.86.32) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Fri, 26 Jul 2024 16:32:56 +0000 From: Claudio Bantaloukas To: CC: Claudio Bantaloukas Subject: [PATCH v3 0/3] aarch64: Add initial support for +fp8 arch extensions Date: Fri, 26 Jul 2024 16:32:51 +0000 Message-ID: <20240726163254.1174686-1-claudio.bantaloukas@arm.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AM4PEPF00027A65:EE_|AS2PR08MB10295:EE_|AMS0EPF000001A4:EE_|GVXPR08MB10615:EE_ X-MS-Office365-Filtering-Correlation-Id: 60017b81-592a-4a74-f816-08dcad90a101 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|82310400026|1800799024|376014|36860700013; X-Microsoft-Antispam-Message-Info-Original: ZC2N1+T/N1pHzKmrApnZDK+DA6+o0cgs7gySMu3WJPR9o1x64rKr7sILyMI93QNR3Oi8k2QhFaFH4EWyKaLz886QJthAhydXfBwcK8jvSu+kbHB0TcLdloI0nEehK3vjKpZsg7cNDLJGX2taPKV8C6IiZROwIHZwJ7RYlL1c7Hn4Aa1yFeskO67M71/KSpKqs3qn9+Zwm3hFYEnlMcMNsMUdgrVvXwVZLiCyTq6BF24sIZeYXOVdZqsiYmOcKBhLRwREHvF49WrEl1IwJ5JZSz2Gspaopeoxh7vi01n+m6GY64HOI3Df7NjIlt3rvyFeJpvgDQHLn6r1/ZPAG42vXwhJbNmzo8eyNuCfpLALa0PieRZzfAKpxNYBnY8+739UecodbDLkCnGxZBh/w27GmeMkODWd5V2NnTXdopi/fqnJTOvDI/P/7gBBPEU4tgZlctIj8F/8JFbC8nKilIox4R64c8euIoWFqMD6q2gOZ1AUsS0msGdVjZMLC3kk7xMd4u0/BqxoJKwBq7ZlBAFgl+lIhyJISeytDEsi1lAcTJcZ0hsUQAnevEVbN2mFCh+BKRnAVFLSaaGuYmLz0Jvv9dAGBbawY1rdOAnNo7cbzDFOR7cJsPjZnr4OlR1v5u0PAc3Y1oWqT740wSFwsEOdbI+QgppYZy+UnZ9F65f6u5U2pef8lFDomWs6yXu6rerbHt3KlE08GzaIZAoyAz0LR/QEwCBSMT90USyVur2MlhglnPEtK2SlGiheLsG0fYOyOXTwMv/Kr/chTt/nq1fyuoGXhKfFOsWVAn34127nJHUJvc9iC0kHtMFk1eJ/TWOljSkbpN9YqsVy2xIt2WIYKvh0ZNN9FsPWYxEdUvNnyW1Ie15uqTV909kHPi1eC6aI8aAVrEE7Z3jcsSAggci/S+4uFDNEhdIweoVWLaHZGp6JT53CoVnN6s9Dc9UoFcls8uOqGN382cddvZD5DTRyz8jtG+SZ89p3Pd29GF7dd39ZwnYsfA/1l3L16uGMoFZpnsR/+DIoDTQcvPpqJg8kHYYR8CR5mJ3/mFvrOMLImRkbN/hrawvyYlOjbN4OHJkpy8LULQ1tTP/x3ez2HQl72Xq4kPKlxeFVCp6/q6stDA5TbQsk0Nhj5bU1oY3SSr0mj8h6tFuubuxOpISsupl2UoUl6Fig0B+xGKuGpu2xygV2UsGzbBJ875+XJ0WT3usNch2lqEAbyknYTwZEzI4OndD8ciU++t4KHqFHbbI/icBEQZnLwVVerqr5IbviUDNpnus8vcK87yCuBcZvOftl9JpSV5iMC7Ad4W40fHn0SnGzoD8dykfW1RapYpcQWCQwvXzMK/LUU85edho7bpaktEZMDN5JY6RzXyU+U8lEdHKZMmngL2a5LBcrVHHTjiP6G1lQG1n1rkFNBqtHaVi9pGMvCRvRjUXrcV7ZALflgq6hM3Qc+AkhJRd4RtsL5D4w X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(82310400026)(1800799024)(376014)(36860700013); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR08MB10295 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:20b:5e3::14]; domain=AS4P250CA0026.EURP250.PROD.OUTLOOK.COM X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001A4.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: dfc72c20-4367-4242-9abb-08dcad909b5b X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|82310400026|35042699022|1800799024|34020700016|36860700013; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230040)(376014)(82310400026)(35042699022)(1800799024)(34020700016)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jul 2024 16:33:06.6830 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 60017b81-592a-4a74-f816-08dcad90a101 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001A4.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVXPR08MB10615 X-Spam-Status: No, score=-5.9 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, KAM_SHORT, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org This series introduces initial flags and functionality for the fp8 feature. Specifically, the following are added: - functions that enable constructing valid fpm register values. - support for the '+fp8' -march modifier. - support for reading and writing the new system register FPMR (Floating Point Mode Register) which configures the new FP8 features Tested against aarch64-unknown-linux-gnu. V1 of this patch series had "aarch64: Add march flags for +fp8 arch extensions" as cover letter title. Since then, changes in V2 are: aarch64: Add march flags for +fp8 arch extensions - Removed __ARM_FEATURE_FP8 define: will be added once the relevant features are in. - Some unnecessary whitespace changes were removed. - Helper function names now begin with __arm. aarch64: Add support for moving fpm system register - Removed a misleading comment. - Removed unnecessary modifier in .md aarch64: Add fpm register helper functions. - Helper functions and fpm_t types are available unconditionally when including arm_acle.h Changes in V3 are: aarch64: Add march flags for +fp8 arch extensions - removed unnecessary check-function-bodies check aarch64: Add support for moving fpm system register - added check-function-bodies check aarch64: Add fpm register helper functions. - moved fp8 types and helper functions into a new private header file arm_private_fp8.h - arm_neon.h and arm_sve.h now include the new header - added tests that check the helpers are available when including arm_neon.h arm_sve.h or arm_sme.h Is this ok for master? I do not have merge permissions. Can someone merge this for me please? Thanks, Claudio Bantaloukas Claudio Bantaloukas (3): aarch64: Add march flags for +fp8 arch extensions aarch64: Add support for moving fpm system register aarch64: Add fpm register helper functions. gcc/config.gcc | 2 +- .../aarch64/aarch64-option-extensions.def | 2 + gcc/config/aarch64/aarch64.cc | 8 ++ gcc/config/aarch64/aarch64.h | 17 ++- gcc/config/aarch64/aarch64.md | 30 +++-- gcc/config/aarch64/arm_neon.h | 1 + gcc/config/aarch64/arm_private_fp8.h | 80 +++++++++++ gcc/config/aarch64/arm_sve.h | 1 + gcc/config/aarch64/constraints.md | 3 + gcc/doc/invoke.texi | 2 + .../aarch64/acle/fp8-helpers-neon.c | 53 ++++++++ .../gcc.target/aarch64/acle/fp8-helpers-sme.c | 12 ++ .../gcc.target/aarch64/acle/fp8-helpers-sve.c | 12 ++ gcc/testsuite/gcc.target/aarch64/acle/fp8.c | 124 ++++++++++++++++++ 14 files changed, 332 insertions(+), 15 deletions(-) create mode 100644 gcc/config/aarch64/arm_private_fp8.h create mode 100644 gcc/testsuite/gcc.target/aarch64/acle/fp8-helpers-neon.c create mode 100644 gcc/testsuite/gcc.target/aarch64/acle/fp8-helpers-sme.c create mode 100644 gcc/testsuite/gcc.target/aarch64/acle/fp8-helpers-sve.c create mode 100644 gcc/testsuite/gcc.target/aarch64/acle/fp8.c