From patchwork Tue Aug 6 14:07:42 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthieu Longo X-Patchwork-Id: 1969596 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=UI8wO3Zg; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=UI8wO3Zg; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4WdZvf66Mjz1yXs for ; Wed, 7 Aug 2024 00:10:22 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id AF9C83858429 for ; Tue, 6 Aug 2024 14:10:20 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on20600.outbound.protection.outlook.com [IPv6:2a01:111:f403:260e::600]) by sourceware.org (Postfix) with ESMTPS id 3AD5C385B50D for ; Tue, 6 Aug 2024 14:08:48 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 3AD5C385B50D Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 3AD5C385B50D Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:260e::600 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1722953331; cv=pass; b=nb+qa/8xNBUzVpHHMnhrWiuBmpO1AhIGlRjSidhin8KjXqmdTOlzmfrlBMESMxzBhxNnk3Y8cOKWRJ7G8giV5U6EB5+vreSAmkXpU9+nrtVEko4abuNTsec/6DizNYpZbdzClO/4dqCeaDsolH1P+7sQQjypIzJ89efp8tS/2Ng= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1722953331; c=relaxed/simple; bh=ntnh878IbHXd9hySKTEZr61j0c/j4/rxAHZz3dEMuq0=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=iiiei6lUB7B6s5/LuNbDovjwfOxka0IJOGX+WeoUfLSlcPwic85gnGUFaKnAEW8kU9dv9qn5xk9uMnY4EgiBhxdDfyvxBZal06MSSoUfQ1SJPm1pIjkZnAvhGvj04h0jG8ptJaOqOz61huCjFWSOnJUM3X0mVVO/HnhPiejFPDg= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=pLTqLDZWFZmmnmq3UTU6vIqhOxk+htZ9GU2edPoRkIh03sNazILCJ6UJ5LZeIgl29bOoIBUGC1gvE0cf1b34+PoBJblJ2rIZ4doPg+r4mDFN+UiEFbA4m0ZHs2rht25pvKY6C8vGdidDYuQhPL/oYMWoQB470HjmbgAEj8L6Y2FsRKJkHc/tnFkpPAFgfA9RnIQxiu/RTrjZ1x/UpLVhqyteQPtRNO2c/Zov74eW8WlSTcbMdTqaRlTBlIvjR4bCdys5oqF3+BdARCZ5rQ2JIodXzPm3NKps9v3708HUFgWPeh3IQND7aYkpZh08YWm+cyzcU4E+nqM8tiM5huZbMQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=utnv0K7idnL9uAjXpOEQ6AuQgEp66kLNagi6bcPz93Q=; b=M44HCvOYbWdfR9G2bd9QnHpcVlvv7ekMHSff/+s9NxDzN1Ga2iTRYsc8Ov7CpBPRCUMwhCx2we9A97H/7QjqfvpWhUMJ/Ps9ACLzF5zWZZSo3uyR8X7VJMCQ/xByUkGoD0SJjvCUakefBMUhkxH+c0zuUh1i8cBjkrM2ayg4hp45zlPi73KtnkJcFnKvYUoQR862cU1hjN0nuaUaR15DAhXsACIDCMqsJHfJDWFj1iLRnL/MA/Roidx8qOI7sPGWZEDPfdBVA0LInWrjWDVjINuOB/MZwXxbbXa5jMbWK9Xvz4zSM2TfwKK2jumE+0IkJpHLF37UWRqtbXgDRAywYg== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=utnv0K7idnL9uAjXpOEQ6AuQgEp66kLNagi6bcPz93Q=; b=UI8wO3ZgfibtWMgY1JuAqNcNTArS2zL6Kbs+150ljhXIzsAWRwJknQcw7X9KDFhq+G05pkLx5j36YM1jL3ejrt7snZVTkUZY7FpuH9461MV1fsvOf+ScbWWkn0seuQj5RUqwsPTa8ANDJy+LDnIsHW+ZdHXhGWIqW6D9LeUk8n8= Received: from AM0PR04CA0131.eurprd04.prod.outlook.com (2603:10a6:208:55::36) by PAVPR08MB9578.eurprd08.prod.outlook.com (2603:10a6:102:310::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.26; Tue, 6 Aug 2024 14:08:44 +0000 Received: from AMS0EPF0000019E.eurprd05.prod.outlook.com (2603:10a6:208:55:cafe::70) by AM0PR04CA0131.outlook.office365.com (2603:10a6:208:55::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7849.11 via Frontend Transport; Tue, 6 Aug 2024 14:08:44 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF0000019E.mail.protection.outlook.com (10.167.16.250) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7849.8 via Frontend Transport; Tue, 6 Aug 2024 14:08:44 +0000 Received: ("Tessian outbound ea7ddef4508e:v365"); Tue, 06 Aug 2024 14:08:43 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: acd3d890c19f65ae X-CR-MTA-TID: 64aa7808 Received: from L3c27df1ebe4b.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id E362ADD3-26BF-4DDA-8DB9-6588AD266CE3.1; Tue, 06 Aug 2024 14:08:33 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id L3c27df1ebe4b.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 06 Aug 2024 14:08:33 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=mvJfPXcJoSgvQNCAasVDMixAaymqHhY2926FXTsGvvuNe4GorJB2enlbYoRcuNdi7Od1GQAVkMppKK7dN/Y3hiB04iuenMfoyPAcBWztXnchptirUmH8g60YnMHU4tN/gZNiRxq+Iaa1zRYCY1kB58EOCwbyvA6Cv8EL7Jdb29fE8EbZ9I/nZxS62h9lcQpBenJ8IOpWf//iwBrdnleEhhYMOokpP3rSenOg8G2+mkV78ZHlnjbJjcm9e+kXFc7GKUVXcQb2XTD7ipRW6BsDFQdmCaql7QNdPk+wwmbTOdy+giPSG60u4vnQwzWE4rONxLEpXNIxv+Bo3M4BtkYE3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=utnv0K7idnL9uAjXpOEQ6AuQgEp66kLNagi6bcPz93Q=; b=n6mY3o7NRhfvEPRj9zYdyM5MEORigtNFq4Gs/MRet69/fGhfbzbVaHTC2VAktCeQCJ181M4or2CZ3+F9R1bolVMIy1IhFIKF0/v0plwbdCzgiWf+agC7qLxYjlA4dwxdXDHHhsj7Ky/TbfEKIS9hDRXlYAhFAWpZ5D9bDiT47FnbGrtGVzZaki4ooKl+L2afPqftkOGVAC+1htM8itzPx8L8xd8RleHHx4v1+1vobD4T2/e9OnTsMEgNvXXG37s8RRheAxrYZyHi/ofF2YSJ8UwgQBFRXvtWBYdr7wVJoe9oisG5Flu5De09CiGKulOmYzNunLjuzMTCCpbcQD+n0w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=utnv0K7idnL9uAjXpOEQ6AuQgEp66kLNagi6bcPz93Q=; b=UI8wO3ZgfibtWMgY1JuAqNcNTArS2zL6Kbs+150ljhXIzsAWRwJknQcw7X9KDFhq+G05pkLx5j36YM1jL3ejrt7snZVTkUZY7FpuH9461MV1fsvOf+ScbWWkn0seuQj5RUqwsPTa8ANDJy+LDnIsHW+ZdHXhGWIqW6D9LeUk8n8= Received: from DU2PR04CA0191.eurprd04.prod.outlook.com (2603:10a6:10:28d::16) by GV2PR08MB10384.eurprd08.prod.outlook.com (2603:10a6:150:b2::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.25; Tue, 6 Aug 2024 14:08:26 +0000 Received: from DB5PEPF00014B8E.eurprd02.prod.outlook.com (2603:10a6:10:28d:cafe::b7) by DU2PR04CA0191.outlook.office365.com (2603:10a6:10:28d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.26 via Frontend Transport; Tue, 6 Aug 2024 14:08:26 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DB5PEPF00014B8E.mail.protection.outlook.com (10.167.8.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7849.8 via Frontend Transport; Tue, 6 Aug 2024 14:08:25 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 6 Aug 2024 14:08:24 +0000 Received: from PW070M4K.cambridge.arm.com (10.57.67.155) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 6 Aug 2024 14:08:23 +0000 From: Matthieu Longo To: CC: Richard Earnshaw , Richard Sandiford , "David S . Miller" , "Eric Botcazou" , Jason Merrill , "Cary Coutant" , Matthieu Longo Subject: [PATCH v1 2/4] dwarf2: add hooks for architecture-specific CFIs Date: Tue, 6 Aug 2024 15:07:42 +0100 Message-ID: <20240806140744.1082602-3-matthieu.longo@arm.com> X-Mailer: git-send-email 2.46.0 In-Reply-To: <20240806140744.1082602-1-matthieu.longo@arm.com> References: <20240806140744.1082602-1-matthieu.longo@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DB5PEPF00014B8E:EE_|GV2PR08MB10384:EE_|AMS0EPF0000019E:EE_|PAVPR08MB9578:EE_ X-MS-Office365-Filtering-Correlation-Id: e3f4aa83-d25b-4ea2-b0bd-08dcb6214840 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|82310400026|36860700013|376014|1800799024|41080700001; X-Microsoft-Antispam-Message-Info-Original: CNS8yT0UD+pDF+XmSsWNXyLhSL+NCjrkgd9qxe2NecM0mLGyrc67MM78OD6RVuBbP3VMYantSIzbPncTf5AiFHVBN+QLL8y0lvccTuXdD2oyI3a2JvD1Lx0NPVXKlGR6SAPwwa6mp1SdLr5JjuYKHMtOUXPQk/Hk+jSoaxrzYxuQArNhtYzf16IuwYstTn2+uB2RLY91RaEBYo0ataR+rFQ1HhEt+JMHw3L53jTMypQUuani2KHmtlccnshlRmlqlRhOItqDoQVXjeNNXiXHT8I+9r/YTJBa40agt49p2161blQowl7euYqLaByXlTcE4l9OLV4fcCYtoc5pbLzlQiaKovAecMU4TjR024E2lBGwMzxeVhF2Cfsd8qDyR/HGCMf5RRadVvjMkMzfjZW/uTfNB38WVhNf4LPl7YTJystCyR27RU+/zK1GgbApKhfxQfFZFu/qScccY9XU8wqYcJA5Fto1xYnyp+F2cH/1SgFiMyu9v+zhgaYt6YTgEFLvGCac0Avj/76SbSh/oEJ3W5NGFdM02Qoy+8r9iZAqrZfKsITApZHotdWkrz1jPUfXCVEHlQVlGbn/nhCDhGL83WdwgE8T8hGSLfMvF8z1iUXDJzwS2MKFO9dDRwTTamJpEj5A4xkqgyEI+U/pML2FpA+PPQRs+LQ0xuIQGxXsGmg+XcJdghJO7wTpXrhcna6DUQZG1aw0J734zzH+cCJNihNs62aTvM/4ok0Y7hTKRO+/WWQA18nOJivZdqufNnQpvDa495j4lPqQEQhsT7zRknFDs8NR63AzV6tuEnL9a7GFPxVTwmds30u5BeG5BBuuJliigls+UK7WR0aPl6Q0DuGRpOX3hi+SxsJ7HWIAKbF4ya3DrunUGU/mtg+VyWNGs7bR6dVE1kZmZlmWcmxwx+HGpXO+9JlU+XzW1GTFm314Y8uPPiY/rGYCt8XpX9LZKv7HpInJJHPNyFdkc/9zUc+Mc3E693w0e/UhDqrk72k48EaEg/t884Zt+9Gy2n92k4kyi1+TYN7VQAUrULGLC6LSiALjRzgWaTItKeYR2XhpXuR9Xyr2AyhmyRnujGCfTQwi1myMFhJAv4TBgcOGvqb3Z3rVuOQp9TweBw2LGLm2Xs4KWIns0HVwaEx7AvaTeL45iBI2945C2IAJroah6lpL7opufll/tAqIH/GAfygAphn/cIzhYOh6evOqeDXBL2Vq2t0LF0MlAJOd7zOaEHGnD1E+juXuSxMHVCvxGjTpDiNXxMLoxXgw/YNqfyuB+0SSeLyD2/A5QYf7TODdf3lLgEcZqyxeDWTavndRzdNtZK9EpU4yzM/Sw+llHxZ6xxFOjoREg8bWTpytoMQ1P+EVZXajgL+BTYzvxpkF6D2FlCT9NDApaSQI+z7N5rLqHsa1COLBAz+8vHHCci56jRSx1OkKKsZyn56UccP6ds8= X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(82310400026)(36860700013)(376014)(1800799024)(41080700001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV2PR08MB10384 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:10:28d::16]; domain=DU2PR04CA0191.eurprd04.prod.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF0000019E.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: a04fe1d3-718b-4027-cc97-08dcb6213cd6 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|376014|35042699022|36860700013; X-Microsoft-Antispam-Message-Info: XiyLITlI15uE/+rYUrio4mqsrCUbCzPh+YigI9b4XJhdftT0P4YixK4n+eWl/uB7CVMI9E04nTc6sRhWBuC7HugO7uRP9m6b7hUK//phOgu6a/bkPDT/mT7gFX1UawvO8MI4DgEuTiORQamHcPSCX/gVunON1RjX/GaI+B0+708MkLZ0lYFpDNor21b58DoHFlk/X7+ZRAScS3Xd2aty2bHNXVhsSPmOb12YgD8Nk/buU1mpUMf9dzuJ24gwUQsp7AXgrXifJwr4QQ1W68l7MuiD5zSgcBsGMvwkURyOZ75PnLMiVEgWBV+qY+1041t/3eghyOPmnw5NUnQB2YCyg5B22964e+wXrIWIID2IejN8Yy06ARSvayqgde9FTYcfcHzJ56c3CgcwIa5GiW7kJWwEBB92YE/feaIKmT3xsBTjNY0j1gCnUfUn0fJ6s1m9Uh7oFixMfcAX1dBqS/WM2Vg0UxargVSG15CQCzGJdvtCeLjh8SKlqWFf2pdlfZyyz4fmNShsKTYV3cu5VBiR1MIBRthhOJs8F7O/RHYp6D1IYHwDiWnxSZPJnSjI/evDu3zrJ/N0y9vPO4Pe/Q6Y3SoQ8sR4PfssdrLxFmssh8UQG1UmmrfC+Hkqlqk7uWnvKv6gf+On1O3ea67kVCTU6SJYmht1hOw6HoIGb/EfjV5fZ2v5KzJ6v9jsMEHWWH0tOkNzliCfbFvFsTj8CiTzrjknHLYJYdKkh4eI8IFq+oB5LvViRUUYbOBZ7x0IFs+PgqMsFEfW6bMZLZ4LZpEe77jfZLl0VH+CIjJWpwwRKBmoPIERelSn36K/SI/Zzvwhw3mppFryJjBLbeuPu25XpwYc2eU6d63Ery3xLX4H8smiFUgcg/GNEm/W3uUGZDAb5iMBldjL8tIMgQagJtNegUeFEemEzQYaU9PW16DP/ck7d66Y0sze7zwJkpVOu8OWTS57XMN7MIKFXv19Gz1yOw/wR6GE30j5kBsCG9SzTEyj4F9uQRZr9Knhlxi71tPC9RrBux2ckTuq/aHD6NEAT7S1Y19Aw3vM6yxSbOTJc9nXXLsu1bOxH+OSzRD+1ro6zrulhpoDYYf757yAQjwebdI4b0OXnWIrGKYRKHupjNp0jOqjAhbKnUWrYdYKbGGodH4sP8VYdqDpKRLAD6FIhXKIL9CjbqzjNqub9ycgxlBTUehFoNFJqIiNsFD7IBtqAScuKHnJiIch9/1nGEb3SkcjBasBuC5NAK60SqRIKAf3KptHd+A/AoN3k5vDAv5JrhN70BdvO1ZT1K2i7bmxNfskhlXFI8bssvjoO0mcWx4NTrANH3Hd/rGOPcHBUNIcR6ET8SJGjV2OXJybpfwjyi2qihyUyuG8puumYBh8XcRLgkOwtu5uS+PYNuCy1Awg X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(376014)(35042699022)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Aug 2024 14:08:44.1361 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e3f4aa83-d25b-4ea2-b0bd-08dcb6214840 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF0000019E.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAVPR08MB9578 X-Spam-Status: No, score=-11.8 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org Architecture-specific CFI directives are currently declared an processed among others architecture-independent CFI directives in gcc/dwarf2* files. This approach creates confusion, specifically in the case of DWARF instructions in the vendor space and using the same instruction code. Such a clash currently happen between DW_CFA_GNU_window_save (used on SPARC) and DW_CFA_AARCH64_negate_ra_state (used on AArch64), and both having the same instruction code 0x2d. Then AArch64 compilers generates a SPARC CFI directive (.cfi_window_save) instead of .cfi_negate_ra_state, contrarilly to what is expected in [DWARF for the Arm 64-bit Architecture (AArch64)](https://github.com/ ARM-software/abi-aa/blob/main/aadwarf64/aadwarf64.rst). This refactoring does not solve completely the problem, but improve the situation by moving some of the processing of those directives (more specifically their output in the assembly) to the backend via 2 target hooks: - DW_CFI_OPRND1_DESC: parse the first operand of the directive (if any). - OUTPUT_CFI_DIRECTIVE: output the CFI directive as a string. Additionally, this patch also contains a renaming of an enum used for return address mangling on AArch64. gcc/ChangeLog: * config/aarch64/aarch64.cc (aarch64_output_cfi_directive): New hook for CFI directives. (aarch64_dw_cfi_oprnd1_desc): Same. (TARGET_OUTPUT_CFI_DIRECTIVE): Hook for output_cfi_directive. (TARGET_DW_CFI_OPRND1_DESC): Hook for dw_cfi_oprnd1_desc. * config/sparc/sparc.cc (sparc_output_cfi_directive): New hook for CFI directives. (sparc_dw_cfi_oprnd1_desc): Same. (TARGET_OUTPUT_CFI_DIRECTIVE): Hook for output_cfi_directive. (TARGET_DW_CFI_OPRND1_DESC): Hook for dw_cfi_oprnd1_desc. * coretypes.h (struct dw_cfi_node): Forward declaration of CFI type from gcc/dwarf2out.h. (enum dw_cfi_oprnd_type): Same. * doc/tm.texi: Regenerated from doc/tm.texi.in. * doc/tm.texi.in: Add doc for OUTPUT_CFI_DIRECTIVE and DW_CFI_OPRND1_DESC. * dwarf2cfi.cc (struct dw_cfi_row): Update the description for window_save and ra_mangled. (cfi_equal_p): Adapt parameter of dw_cfi_oprnd1_desc. (dwarf2out_frame_debug_cfa_negate_ra_state): Use AArch64 CFI directive instead of the SPARC one. (change_cfi_row): Use the right CFI directive's name for RA mangling. (output_cfi): Remove explicit architecture-specific CFI directive DW_CFA_GNU_window_save that falls into default case. (output_cfi_directive): Use target hook as default. * dwarf2out.cc (dw_cfi_oprnd1_desc): Use target hook as default. * dwarf2out.h (enum dw_cfi_oprnd_type): specify underlying type of enum to allow forward declaration. (dw_cfi_oprnd1_desc): Change type of parameter. (output_cfi_directive): Use dw_cfi_ref instead of struct dw_cfi_node *. * target.def: Documentation for new hooks. libffi/ChangeLog: * include/ffi_cfi.h (cfi_negate_ra_state): Declare AArch64 cfi directive. libgcc/ChangeLog: * config/aarch64/aarch64-asm.h (PACIASP): Replace SPARC CFI directive by AArch64 one. (AUTIASP): Same. libitm/ChangeLog: * config/aarch64/sjlj.S: Replace SPARC CFI directive by AArch64 one. gcc/testsuite/ChangeLog: * g++.target/aarch64/pr94515-1.C: Replace SPARC CFI directive by AArch64 one. * g++.target/aarch64/pr94515-2.C: Same. --- gcc/config/aarch64/aarch64.cc | 32 +++++++++++++++++ gcc/config/sparc/sparc.cc | 36 ++++++++++++++++++++ gcc/coretypes.h | 6 ++++ gcc/doc/tm.texi | 28 +++++++++++++++ gcc/doc/tm.texi.in | 17 +++++++++ gcc/dwarf2cfi.cc | 29 ++++++---------- gcc/dwarf2out.cc | 13 ++++--- gcc/dwarf2out.h | 10 +++--- gcc/target.def | 20 +++++++++++ gcc/testsuite/g++.target/aarch64/pr94515-1.C | 6 ++-- gcc/testsuite/g++.target/aarch64/pr94515-2.C | 2 +- libffi/include/ffi_cfi.h | 2 ++ libgcc/config/aarch64/aarch64-asm.h | 4 +-- libitm/config/aarch64/sjlj.S | 10 +++--- 14 files changed, 176 insertions(+), 39 deletions(-) diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc index 0af5d85c36f..1f87779f40a 100644 --- a/gcc/config/aarch64/aarch64.cc +++ b/gcc/config/aarch64/aarch64.cc @@ -59,6 +59,7 @@ #include "opts.h" #include "gimplify.h" #include "dwarf2.h" +#include "dwarf2out.h" #include "gimple-iterator.h" #include "tree-vectorizer.h" #include "aarch64-cost-tables.h" @@ -1449,6 +1450,31 @@ aarch64_dwarf_frame_reg_mode (int regno) return default_dwarf_frame_reg_mode (regno); } +/* Implement TARGET_OUTPUT_CFI_DIRECTIVE. */ +static bool +aarch64_output_cfi_directive (FILE *f, dw_cfi_ref cfi) +{ + bool found = false; + if (cfi->dw_cfi_opc == DW_CFA_AARCH64_negate_ra_state) + { + fprintf (f, "\t.cfi_negate_ra_state\n"); + found = true; + } + return found; +} + +/* Implement TARGET_DW_CFI_OPRND1_DESC. */ +static bool +aarch64_dw_cfi_oprnd1_desc(dw_cfi_ref cfi, dw_cfi_oprnd_type_ref oprnd_type) +{ + if (cfi->dw_cfi_opc == DW_CFA_AARCH64_negate_ra_state) + { + oprnd_type = dw_cfi_oprnd_unused; + return true; + } + return false; +} + /* If X is a CONST_DOUBLE, return its bit representation as a constant integer, otherwise return X unmodified. */ static rtx @@ -30750,6 +30776,12 @@ aarch64_libgcc_floating_mode_supported_p #undef TARGET_DWARF_FRAME_REG_MODE #define TARGET_DWARF_FRAME_REG_MODE aarch64_dwarf_frame_reg_mode +#undef TARGET_OUTPUT_CFI_DIRECTIVE +#define TARGET_OUTPUT_CFI_DIRECTIVE aarch64_output_cfi_directive + +#undef TARGET_DW_CFI_OPRND1_DESC +#define TARGET_DW_CFI_OPRND1_DESC aarch64_dw_cfi_oprnd1_desc + #undef TARGET_PROMOTED_TYPE #define TARGET_PROMOTED_TYPE aarch64_promoted_type diff --git a/gcc/config/sparc/sparc.cc b/gcc/config/sparc/sparc.cc index 9282fb43b44..4de2f1895b6 100644 --- a/gcc/config/sparc/sparc.cc +++ b/gcc/config/sparc/sparc.cc @@ -61,6 +61,7 @@ along with GCC; see the file COPYING3. If not see #include "builtins.h" #include "tree-vector-builder.h" #include "opts.h" +#include "dwarf2out.h" /* This file should be included last. */ #include "target-def.h" @@ -681,6 +682,8 @@ static rtx sparc_libcall_value (machine_mode, const_rtx); static bool sparc_function_value_regno_p (const unsigned int); static unsigned HOST_WIDE_INT sparc_asan_shadow_offset (void); static void sparc_output_dwarf_dtprel (FILE *, int, rtx) ATTRIBUTE_UNUSED; +static bool sparc_output_cfi_directive (FILE *, dw_cfi_ref); +static bool sparc_dw_cfi_oprnd1_desc (dw_cfi_ref, dw_cfi_oprnd_type_ref); static void sparc_file_end (void); static bool sparc_frame_pointer_required (void); static bool sparc_can_eliminate (const int, const int); @@ -878,6 +881,12 @@ char sparc_hard_reg_printed[8]; #define TARGET_ASM_OUTPUT_DWARF_DTPREL sparc_output_dwarf_dtprel #endif +#undef TARGET_OUTPUT_CFI_DIRECTIVE +#define TARGET_OUTPUT_CFI_DIRECTIVE sparc_output_cfi_directive + +#undef TARGET_DW_CFI_OPRND1_DESC +#define TARGET_DW_CFI_OPRND1_DESC sparc_dw_cfi_oprnd1_desc + #undef TARGET_ASM_FILE_END #define TARGET_ASM_FILE_END sparc_file_end @@ -12621,6 +12630,33 @@ sparc_output_dwarf_dtprel (FILE *file, int size, rtx x) fputs (")", file); } +/* This is called from gcc/dwarf2cfi.cc via TARGET_OUTPUT_CFI_DIRECTIVE. + It outputs SPARC-specific CFI directives (if any). */ +static bool +sparc_output_cfi_directive (FILE *f, dw_cfi_ref cfi) +{ + if (cfi->dw_cfi_opc == DW_CFA_GNU_window_save) + { + fprintf (f, "\t.cfi_window_save\n"); + return true; + } + return false; +} + +/* This is called from gcc/dwarf2out.cc via TARGET_DW_CFI_OPRND1_DESC. + It describes for the GTY machinery what parts of the first operand + is used. */ +static bool +sparc_dw_cfi_oprnd1_desc (dw_cfi_ref cfi, dw_cfi_oprnd_type_ref oprnd_type) +{ + if (cfi->dw_cfi_opc == DW_CFA_GNU_window_save) + { + oprnd_type = dw_cfi_oprnd_unused; + return true; + } + return false; +} + /* Do whatever processing is required at the end of a file. */ static void diff --git a/gcc/coretypes.h b/gcc/coretypes.h index 0544bb8fd97..3b622961b7a 100644 --- a/gcc/coretypes.h +++ b/gcc/coretypes.h @@ -141,6 +141,12 @@ struct gomp_single; struct gomp_target; struct gomp_teams; +/* Forward declaration of CFI's and DWARF's types. */ +struct dw_cfi_node; +using dw_cfi_ref = struct dw_cfi_node *; +enum dw_cfi_oprnd_type: unsigned int; +using dw_cfi_oprnd_type_ref = enum dw_cfi_oprnd_type &; + /* Subclasses of symtab_node, using indentation to show the class hierarchy. */ diff --git a/gcc/doc/tm.texi b/gcc/doc/tm.texi index c7535d07f4d..1645e1cb0ce 100644 --- a/gcc/doc/tm.texi +++ b/gcc/doc/tm.texi @@ -3911,7 +3911,20 @@ used in .eh_frame or .debug_frame is different from that used in other debug info sections. Given a GCC hard register number, this macro should return the .eh_frame register number. The default is @code{DEBUGGER_REGNO (@var{regno})}. +@end defmac + + +@defmac OUTPUT_CFI_DIRECTIVE (@var{f}, @var{cfi}) + +Define this macro if the target has additional CFI directives. Return +true if an architecture-specific directive was found, false otherwise. +@end defmac +@defmac DW_CFI_OPRND1_DESC (@var{cfi}, @var{oprnd_type}) + +Define this macro if the target has additional CFI directives. Return +true if an architecture-specific directive was found and @var{oprnd_type} +is set, false otherwise and @var{oprnd_type} is not modified. @end defmac @defmac DWARF2_FRAME_REG_OUT (@var{regno}, @var{for_eh}) @@ -10039,6 +10052,21 @@ used to return a smaller mode than the raw mode to prevent call clobbered parts of a register altering the frame register size @end deftypefn +@deftypefn {Target Hook} bool TARGET_OUTPUT_CFI_DIRECTIVE (FILE * @var{f}, dw_cfi_ref @var{cfi}) +This hook handles architecture-specific CFI directives and prints +them out to the assembly file @var{f}. +Return true if a architecture-specific directive was found, false +otherwise. +@end deftypefn + +@deftypefn {Target Hook} bool TARGET_DW_CFI_OPRND1_DESC (dw_cfi_ref @var{cfi}, dw_cfi_oprnd_type_ref @var{oprnd_type}) +This hook informs the caller what the architecture-specific directives +takes as a first operand. +Return true if a architecture-specific directive was found and +@var{oprnd_type} is set, false otherwise and @var{oprnd_type} is not +modified. +@end deftypefn + @deftypefn {Target Hook} void TARGET_INIT_DWARF_REG_SIZES_EXTRA (tree @var{address}) If some registers are represented in Dwarf-2 unwind information in multiple pieces, define this hook to fill in information about the diff --git a/gcc/doc/tm.texi.in b/gcc/doc/tm.texi.in index 64cea3b1eda..051217d68b1 100644 --- a/gcc/doc/tm.texi.in +++ b/gcc/doc/tm.texi.in @@ -3108,7 +3108,20 @@ used in .eh_frame or .debug_frame is different from that used in other debug info sections. Given a GCC hard register number, this macro should return the .eh_frame register number. The default is @code{DEBUGGER_REGNO (@var{regno})}. +@end defmac + + +@defmac OUTPUT_CFI_DIRECTIVE (@var{f}, @var{cfi}) + +Define this macro if the target has additional CFI directives. Return +true if an architecture-specific directive was found, false otherwise. +@end defmac + +@defmac DW_CFI_OPRND1_DESC (@var{cfi}, @var{oprnd_type}) +Define this macro if the target has additional CFI directives. Return +true if an architecture-specific directive was found and @var{oprnd_type} +is set, false otherwise and @var{oprnd_type} is not modified. @end defmac @defmac DWARF2_FRAME_REG_OUT (@var{regno}, @var{for_eh}) @@ -6612,6 +6625,10 @@ the target supports DWARF 2 frame unwind information. @hook TARGET_DWARF_FRAME_REG_MODE +@hook TARGET_OUTPUT_CFI_DIRECTIVE + +@hook TARGET_DW_CFI_OPRND1_DESC + @hook TARGET_INIT_DWARF_REG_SIZES_EXTRA @hook TARGET_ASM_TTYPE diff --git a/gcc/dwarf2cfi.cc b/gcc/dwarf2cfi.cc index 4ad9acbd6fd..6c80e0b17bd 100644 --- a/gcc/dwarf2cfi.cc +++ b/gcc/dwarf2cfi.cc @@ -69,10 +69,12 @@ struct GTY(()) dw_cfi_row /* The expressions for any register column that is saved. */ cfi_vec reg_save; - /* True if the register window is saved. */ + /* Sparc extension for DW_CFA_GNU_window_save. + True if the register window is saved. */ bool window_save; - /* True if the return address is in a mangled state. */ + /* Aarch64 extension for DW_CFA_AARCH64_negate_ra_state. + True if the return address is in a mangled state. */ bool ra_mangled; }; @@ -816,7 +818,7 @@ cfi_equal_p (dw_cfi_ref a, dw_cfi_ref b) /* Compare the two operands, re-using the type of the operands as already exposed elsewhere. */ - return (cfi_oprnd_equal_p (dw_cfi_oprnd1_desc (opc), + return (cfi_oprnd_equal_p (dw_cfi_oprnd1_desc (a), &a->dw_cfi_oprnd1, &b->dw_cfi_oprnd1) && cfi_oprnd_equal_p (dw_cfi_oprnd2_desc (opc), &a->dw_cfi_oprnd2, &b->dw_cfi_oprnd2)); @@ -1547,17 +1549,13 @@ dwarf2out_frame_debug_cfa_window_save (void) cur_row->window_save = true; } -/* A subroutine of dwarf2out_frame_debug, process a REG_CFA_NEGATE_RA_STATE. - Note: DW_CFA_GNU_window_save dwarf opcode is reused for toggling RA mangle - state, this is a target specific operation on AArch64 and can only be used - on other targets if they don't use the window save operation otherwise. */ +/*A subroutine of dwarf2out_frame_debug, process REG_CFA_NEGATE_RA_STATE. */ static void dwarf2out_frame_debug_cfa_negate_ra_state (void) { dw_cfi_ref cfi = new_cfi (); - - cfi->dw_cfi_opc = DW_CFA_GNU_window_save; + cfi->dw_cfi_opc = DW_CFA_AARCH64_negate_ra_state; add_cfi (cfi); cur_row->ra_mangled = !cur_row->ra_mangled; } @@ -2426,8 +2424,7 @@ change_cfi_row (dw_cfi_row *old_row, dw_cfi_row *new_row) dw_cfi_ref cfi = new_cfi (); gcc_assert (!old_row->window_save && !new_row->window_save); - /* DW_CFA_GNU_window_save is reused for toggling RA mangle state. */ - cfi->dw_cfi_opc = DW_CFA_GNU_window_save; + cfi->dw_cfi_opc = DW_CFA_AARCH64_negate_ra_state; add_cfi (cfi); } } @@ -3516,9 +3513,6 @@ output_cfi (dw_cfi_ref cfi, dw_fde_ref fde, int for_eh) dw2_asm_output_data_sleb128 (off, NULL); break; - case DW_CFA_GNU_window_save: - break; - case DW_CFA_def_cfa_expression: case DW_CFA_expression: case DW_CFA_val_expression: @@ -3631,10 +3625,6 @@ output_cfi_directive (FILE *f, dw_cfi_ref cfi) } break; - case DW_CFA_GNU_window_save: - fprintf (f, "\t.cfi_window_save\n"); - break; - case DW_CFA_def_cfa_expression: case DW_CFA_expression: case DW_CFA_val_expression: @@ -3651,7 +3641,8 @@ output_cfi_directive (FILE *f, dw_cfi_ref cfi) break; default: - gcc_unreachable (); + if (!targetm.output_cfi_directive (f, cfi)) + gcc_unreachable (); } } diff --git a/gcc/dwarf2out.cc b/gcc/dwarf2out.cc index 357efaa5990..260593421df 100644 --- a/gcc/dwarf2out.cc +++ b/gcc/dwarf2out.cc @@ -516,12 +516,11 @@ switch_to_frame_table_section (int for_eh, bool back) /* Describe for the GTY machinery what parts of dw_cfi_oprnd1 are used. */ enum dw_cfi_oprnd_type -dw_cfi_oprnd1_desc (enum dwarf_call_frame_info cfi) +dw_cfi_oprnd1_desc (dw_cfi_ref cfi) { - switch (cfi) + switch (cfi->dw_cfi_opc) { case DW_CFA_nop: - case DW_CFA_GNU_window_save: case DW_CFA_remember_state: case DW_CFA_restore_state: return dw_cfi_oprnd_unused; @@ -557,7 +556,13 @@ dw_cfi_oprnd1_desc (enum dwarf_call_frame_info cfi) return dw_cfi_oprnd_loc; default: - gcc_unreachable (); + { + dw_cfi_oprnd_type oprnd_type; + if (targetm.dw_cfi_oprnd1_desc (cfi, oprnd_type)) + return oprnd_type; + else + gcc_unreachable (); + } } } diff --git a/gcc/dwarf2out.h b/gcc/dwarf2out.h index a424981b911..da0b0bf0203 100644 --- a/gcc/dwarf2out.h +++ b/gcc/dwarf2out.h @@ -38,7 +38,7 @@ typedef struct dw_wide_int *dw_wide_int_ptr; and address fields are provided as possible operands; their use is selected by the opcode field. */ -enum dw_cfi_oprnd_type { +enum dw_cfi_oprnd_type: unsigned int { dw_cfi_oprnd_unused, dw_cfi_oprnd_reg_num, dw_cfi_oprnd_offset, @@ -46,6 +46,7 @@ enum dw_cfi_oprnd_type { dw_cfi_oprnd_loc, dw_cfi_oprnd_cfa_loc }; +using dw_cfi_oprnd_type_ref = enum dw_cfi_oprnd_type &; typedef union GTY(()) { unsigned int GTY ((tag ("dw_cfi_oprnd_reg_num"))) dw_cfi_reg_num; @@ -58,7 +59,7 @@ typedef union GTY(()) { struct GTY(()) dw_cfi_node { enum dwarf_call_frame_info dw_cfi_opc; - dw_cfi_oprnd GTY ((desc ("dw_cfi_oprnd1_desc (%1.dw_cfi_opc)"))) + dw_cfi_oprnd GTY ((desc ("dw_cfi_oprnd1_desc (&%1)"))) dw_cfi_oprnd1; dw_cfi_oprnd GTY ((desc ("dw_cfi_oprnd2_desc (%1.dw_cfi_opc)"))) dw_cfi_oprnd2; @@ -368,12 +369,11 @@ extern void output_cfi (dw_cfi_ref, dw_fde_ref, int); extern GTY(()) cfi_vec cie_cfi_vec; /* Interface from dwarf2*.c to the rest of the compiler. */ -extern enum dw_cfi_oprnd_type dw_cfi_oprnd1_desc - (enum dwarf_call_frame_info cfi); +extern enum dw_cfi_oprnd_type dw_cfi_oprnd1_desc (dw_cfi_ref cfi); extern enum dw_cfi_oprnd_type dw_cfi_oprnd2_desc (enum dwarf_call_frame_info cfi); -extern void output_cfi_directive (FILE *f, struct dw_cfi_node *cfi); +extern void output_cfi_directive (FILE *f, dw_cfi_ref cfi); extern void dwarf2out_emit_cfi (dw_cfi_ref cfi); diff --git a/gcc/target.def b/gcc/target.def index 3de1aad4c84..6a6470f202a 100644 --- a/gcc/target.def +++ b/gcc/target.def @@ -4114,6 +4114,26 @@ clobbered parts of a register altering the frame register size", machine_mode, (int regno), default_dwarf_frame_reg_mode) +/* Print out architecture-specific CFI directives to the assembly file. */ +DEFHOOK +(output_cfi_directive, + "This hook handles architecture-specific CFI directives and prints\n\ +them out to the assembly file @var{f}.\n\ +Return true if a architecture-specific directive was found, false\n\ +otherwise.", + bool, (FILE * f, dw_cfi_ref cfi), + hook_bool_void_false) + +DEFHOOK +(dw_cfi_oprnd1_desc, + "This hook informs the caller what the architecture-specific directives\n\ +takes as a first operand.\n\ +Return true if a architecture-specific directive was found and\n\ +@var{oprnd_type} is set, false otherwise and @var{oprnd_type} is not\n\ +modified.", + bool, (dw_cfi_ref cfi, dw_cfi_oprnd_type_ref oprnd_type), + hook_bool_void_false) + /* If expand_builtin_init_dwarf_reg_sizes needs to fill in table entries not corresponding directly to registers below FIRST_PSEUDO_REGISTER, this hook should generate the necessary diff --git a/gcc/testsuite/g++.target/aarch64/pr94515-1.C b/gcc/testsuite/g++.target/aarch64/pr94515-1.C index 20ae81215fc..d5c114a83a8 100644 --- a/gcc/testsuite/g++.target/aarch64/pr94515-1.C +++ b/gcc/testsuite/g++.target/aarch64/pr94515-1.C @@ -1,4 +1,4 @@ -/* PR target/94515. Check .cfi_window_save with multiple return paths. */ +/* PR target/94515. Check .cfi_negate_ra_state with multiple return paths. */ /* { dg-do run } */ /* { dg-require-effective-target lp64 } */ /* { dg-additional-options "-O2 --save-temps" } */ @@ -38,7 +38,7 @@ int main () } /* This check only works if there are two return paths in test and - cfi_window_save is used for both instead of cfi_remember_state + cfi_negate_ra_state is used for both instead of cfi_remember_state plus cfi_restore_state. This is currently the case with -O2. */ -/* { dg-final { scan-assembler-times {\t\.cfi_window_save\n} 4 } } */ +/* { dg-final { scan-assembler-times {\t\.cfi_negate_ra_state\n} 4 } } */ diff --git a/gcc/testsuite/g++.target/aarch64/pr94515-2.C b/gcc/testsuite/g++.target/aarch64/pr94515-2.C index e73df499070..f4a3333beed 100644 --- a/gcc/testsuite/g++.target/aarch64/pr94515-2.C +++ b/gcc/testsuite/g++.target/aarch64/pr94515-2.C @@ -1,4 +1,4 @@ -/* PR target/94515. Check .cfi_window_save with multiple return paths. */ +/* PR target/94515. Check .cfi_negate_ra_state with multiple return paths. */ /* { dg-do run } */ /* { dg-require-effective-target lp64 } */ /* { dg-additional-options "-O2 -mbranch-protection=pac-ret" } */ diff --git a/libffi/include/ffi_cfi.h b/libffi/include/ffi_cfi.h index f4c292d0040..2beb165c9a1 100644 --- a/libffi/include/ffi_cfi.h +++ b/libffi/include/ffi_cfi.h @@ -46,6 +46,7 @@ # define cfi_remember_state .cfi_remember_state # define cfi_restore_state .cfi_restore_state # define cfi_window_save .cfi_window_save +# define cfi_negate_ra_state .cfi_negate_ra_state # define cfi_personality(enc, exp) .cfi_personality enc, exp # define cfi_lsda(enc, exp) .cfi_lsda enc, exp # define cfi_escape(...) .cfi_escape __VA_ARGS__ @@ -68,6 +69,7 @@ # define cfi_remember_state # define cfi_restore_state # define cfi_window_save +# define cfi_negate_ra_state # define cfi_personality(enc, exp) # define cfi_lsda(enc, exp) # define cfi_escape(...) diff --git a/libgcc/config/aarch64/aarch64-asm.h b/libgcc/config/aarch64/aarch64-asm.h index 83c2e5944b3..d8ab91d52f1 100644 --- a/libgcc/config/aarch64/aarch64-asm.h +++ b/libgcc/config/aarch64/aarch64-asm.h @@ -50,8 +50,8 @@ #if __ARM_FEATURE_PAC_DEFAULT & 3 # define PAC_FLAG FEATURE_1_PAC -# define PACIASP hint 25; .cfi_window_save -# define AUTIASP hint 29; .cfi_window_save +# define PACIASP hint 25; .cfi_negate_ra_state +# define AUTIASP hint 29; .cfi_negate_ra_state #else # define PAC_FLAG 0 # define PACIASP diff --git a/libitm/config/aarch64/sjlj.S b/libitm/config/aarch64/sjlj.S index 6b248f7c040..aeffd4d1070 100644 --- a/libitm/config/aarch64/sjlj.S +++ b/libitm/config/aarch64/sjlj.S @@ -31,20 +31,20 @@ #define AUTIBSP hint 31 #if defined(HAVE_AS_CFI_PSEUDO_OP) && defined(__GCC_HAVE_DWARF2_CFI_ASM) -# define cfi_window_save .cfi_window_save -# define cfi_b_key_frame .cfi_b_key_frame +# define cfi_negate_ra_state .cfi_negate_ra_state +# define cfi_b_key_frame .cfi_b_key_frame #else -# define cfi_window_save +# define cfi_negate_ra_state # define cfi_b_key_frame #endif #if __ARM_FEATURE_PAC_DEFAULT & 1 -# define CFI_PAC_TOGGLE cfi_window_save +# define CFI_PAC_TOGGLE cfi_negate_ra_state # define CFI_PAC_KEY # define PAC_AND_BTI PACIASP # define AUT AUTIASP #elif __ARM_FEATURE_PAC_DEFAULT & 2 -# define CFI_PAC_TOGGLE cfi_window_save +# define CFI_PAC_TOGGLE cfi_negate_ra_state # define CFI_PAC_KEY cfi_b_key_frame # define PAC_AND_BTI PACIBSP # define AUT AUTIBSP