From patchwork Mon Jan 8 06:15:54 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chung-Ju Wu X-Patchwork-Id: 1883479 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20230601 header.b=a5ETxjHg; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4T7kNC3pNsz1yPX for ; Mon, 8 Jan 2024 17:16:26 +1100 (AEDT) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id E9B5D385E455 for ; Mon, 8 Jan 2024 06:16:23 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from mail-pg1-x532.google.com (mail-pg1-x532.google.com [IPv6:2607:f8b0:4864:20::532]) by sourceware.org (Postfix) with ESMTPS id 983153858D35 for ; Mon, 8 Jan 2024 06:15:59 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 983153858D35 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=gmail.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 983153858D35 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=2607:f8b0:4864:20::532 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1704694561; cv=none; b=HpaMgeANXgqJU8caMEOebOptfjcvh/qtDoJ4NvDXf61EJWjhTuED8XoGdtUIqSRgmJPPHlqawIHs6YuMxH3g+dV+OxwjYKNjL+UrbPKH15OVROaK+W7zvYt0cB9zjwSDjTmjhIuzoLQRHJiO/u9InxE0oTF//67iDq8y/l6kVEU= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1704694561; c=relaxed/simple; bh=fe1ht/VKk5f8+fX1IzzUiHRhHBFbWLzuAGhuaCyvk1s=; h=DKIM-Signature:Message-ID:Date:MIME-Version:To:From:Subject; b=xBDoTLZZEz6LLu8OTgzwnlKIRuJDUO/aiZ1i09lKqw5u9I8Rn/VqRoT5ASBV4eOndjpKz7jAli9ffYcIGxw4o4r2ZwUoDZCLtsQl8A1uEEr7sKrUnh3pR64UUCi6rOP+xAYx66dXZtDbaqmQ1X4eqAWQtJmLk1PA80sl8+hvWxU= ARC-Authentication-Results: i=1; server2.sourceware.org Received: by mail-pg1-x532.google.com with SMTP id 41be03b00d2f7-5cddc5455aeso170048a12.1 for ; Sun, 07 Jan 2024 22:15:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704694558; x=1705299358; darn=gcc.gnu.org; h=subject:from:cc:to:content-language:user-agent:mime-version:date :message-id:from:to:cc:subject:date:message-id:reply-to; bh=fe1ht/VKk5f8+fX1IzzUiHRhHBFbWLzuAGhuaCyvk1s=; b=a5ETxjHgkHFOABPb9zqAwHX+R1vzVSRe5reTS9Erg/PUr9KeeQEy2xdkbVFVJRNXsL z33tawtEO0mEqAx01SoxR+hHbUzOoTNb3ayiXKin9CdGhSqJpM1lNiiu7RCBWT5zGpQB VIDQVBFJZqBKsNrnnuPX92CFLNv3w54LZZsv+h3lZ9jsm3Lu0/5CwkFcmFmrTMJ360kF ZhuygCcwxJbvllXPakaI/dde9Xnik4p1uvKD5OW11kfejTXdhVKfo9XxqlPguOzahRVj nalYNK0sNcEXJX/EU7zagZNAwQ0D1EdsOxrjQTxAgPcNitXmsH/Rk9yYTJ+hFFGcIr7b uBhA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704694558; x=1705299358; h=subject:from:cc:to:content-language:user-agent:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=fe1ht/VKk5f8+fX1IzzUiHRhHBFbWLzuAGhuaCyvk1s=; b=E4scWXA5cBBVltlSkXpYMiS/OsWrDuCc975iuhmxBO9M9rJqRH9b1EeJ892z+7ByRa 7aOi2anSjrVQXArIOttIMxzDHWY5gqtZ2e8hYeOJ8Ytl9GlCGKiQWQJoTfGRp/0DzBkY dHh+PUMyulyOLH0ymrMrqOONEr/GOrJoG7h9Yh/g/LoT+KQ4Omg4Qv5HEA/V5D6NhS41 //t93pscjsxFXbQl0TrMvafaERTPraObcAWz8UYqdrdBwGoj3uoDPi/qO84KoZKKJT7T 2HV8z6AFeHfpoNe45x0y8jj6txkwCuEDMyCS+OFCoiIt2AlcZLPlLo2p64IvTV1OA6UQ arhQ== X-Gm-Message-State: AOJu0YxAeb1W7zPMsIrdCJVsh3U2zLtTy02UHne0LgEgRPioawtc4wg0 WkemcLaX38N+paeZ7ykLRq+HfkeMplo= X-Google-Smtp-Source: AGHT+IGASg49sg0CR9sYrBbkRjL3KmZr/S+bKF3ZpUxFrnx7PuHpvR+YYQqyw3nEOpcqmkCX46X0+w== X-Received: by 2002:a05:6a20:3252:b0:199:474b:fcd8 with SMTP id hm18-20020a056a20325200b00199474bfcd8mr815417pzc.35.1704694558012; Sun, 07 Jan 2024 22:15:58 -0800 (PST) Received: from [10.194.16.39] (61-216-141-121.hinet-ip.hinet.net. [61.216.141.121]) by smtp.gmail.com with ESMTPSA id i2-20020a17090a65c200b00288628acf6dsm5376875pjs.14.2024.01.07.22.15.55 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 07 Jan 2024 22:15:56 -0800 (PST) Message-ID: <05750a1e-8f51-4109-9342-3b0b9670cbd2@gmail.com> Date: Mon, 8 Jan 2024 14:15:54 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: gcc-patches , Kyrylo Tkachov , Richard Earnshaw Cc: "Jason.Wu@anshingtek.com.tw" From: Chung-Ju Wu Subject: [PATCH 1/2] arm: Add cortex-m52 core X-Spam-Status: No, score=-10.2 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org Hi, Recently, Arm announced the Cortex-M52, delivering increased performance in DSP and ML along with a range of other features and benefits. For the completeness of Arm ecosystem, we hope that cortex-m52 support could be available in gcc-14. Attached is the patch to support cortex-m52 cpu with MVE and PACBTI enabled in GCC. Bootstrapped and tested on arm-none-eabi. Is it OK for trunk? Regards, jasonwucj From d0856b516c5d270a852f3edd9df5dadccde5b94e Mon Sep 17 00:00:00 2001 From: Chung-Ju Wu Date: Wed, 6 Dec 2023 15:49:58 +0800 Subject: [PATCH 1/2] arm: Add support for Arm Cortex-M52 CPU. This patch adds the -mcpu support for the Arm Cortex-M52 CPU which is an Armv8.1-M Mainline CPU supporting MVE and PACBTI by default. -mcpu=cortex-m52 switch by default matches to -march=armv8.1-m.main+pacbti+mve.fp+fp.dp. The cde feature is supported by specifying +cdecpN (e.g. -mcpu=cortex-m52+cdecp), where N is the coprocessor number 0 to 7. Also following options are provided to disable default features. +nomve.fp (disables MVE Floating point) +nomve (disables MVE Integer and MVE Floating point) +nodsp (disables dsp, MVE Integer and MVE Floating point) +nopacbti (disables pacbti) +nofp (disables floating point and MVE floating point) Signed-off-by: Chung-Ju Wu gcc/ChangeLog: * config/arm/arm-cpus.in (cortex-m52): New cpu. * config/arm/arm-tables.opt: Regenerate. * config/arm/arm-tune.md: Regenerate. --- gcc/config/arm/arm-cpus.in | 21 +++++++++++++++++++++ gcc/config/arm/arm-tables.opt | 3 +++ gcc/config/arm/arm-tune.md | 6 +++--- 3 files changed, 27 insertions(+), 3 deletions(-) diff --git a/gcc/config/arm/arm-cpus.in b/gcc/config/arm/arm-cpus.in index 6fa7e315ef0..451b15fe9f9 100644 --- a/gcc/config/arm/arm-cpus.in +++ b/gcc/config/arm/arm-cpus.in @@ -1641,6 +1641,27 @@ begin cpu cortex-m35p costs v7m end cpu cortex-m35p +begin cpu cortex-m52 + cname cortexm52 + tune flags LDSCHED + architecture armv8.1-m.main+pacbti+mve.fp+fp.dp + option nopacbti remove pacbti + option nomve.fp remove mve_float + option nomve remove mve mve_float + option nofp remove ALL_FP mve_float + option nodsp remove MVE mve_float + option cdecp0 add cdecp0 + option cdecp1 add cdecp1 + option cdecp2 add cdecp2 + option cdecp3 add cdecp3 + option cdecp4 add cdecp4 + option cdecp5 add cdecp5 + option cdecp6 add cdecp6 + option cdecp7 add cdecp7 + isa quirk_no_asmcpu quirk_vlldm + costs v7m +end cpu cortex-m52 + begin cpu cortex-m55 cname cortexm55 tune flags LDSCHED diff --git a/gcc/config/arm/arm-tables.opt b/gcc/config/arm/arm-tables.opt index 9d6ae875ede..d3eb9a97739 100644 --- a/gcc/config/arm/arm-tables.opt +++ b/gcc/config/arm/arm-tables.opt @@ -282,6 +282,9 @@ Enum(processor_type) String(cortex-m33) Value( TARGET_CPU_cortexm33) EnumValue Enum(processor_type) String(cortex-m35p) Value( TARGET_CPU_cortexm35p) +EnumValue +Enum(processor_type) String(cortex-m52) Value( TARGET_CPU_cortexm52) + EnumValue Enum(processor_type) String(cortex-m55) Value( TARGET_CPU_cortexm55) diff --git a/gcc/config/arm/arm-tune.md b/gcc/config/arm/arm-tune.md index 7318f03b97e..6a631d82966 100644 --- a/gcc/config/arm/arm-tune.md +++ b/gcc/config/arm/arm-tune.md @@ -49,7 +49,7 @@ cortexa710,cortexx1,cortexx1c, neoversen1,cortexa75cortexa55,cortexa76cortexa55, neoversev1,neoversen2,cortexm23, - cortexm33,cortexm35p,cortexm55, - starmc1,cortexm85,cortexr52, - cortexr52plus" + cortexm33,cortexm35p,cortexm52, + cortexm55,starmc1,cortexm85, + cortexr52,cortexr52plus" (const (symbol_ref "((enum attr_tune) arm_tune)"))) From patchwork Mon Jan 8 06:16:37 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chung-Ju Wu X-Patchwork-Id: 1883480 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20230601 header.b=LHeROw+H; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4T7kPL3r3Jz1yPX for ; Mon, 8 Jan 2024 17:17:26 +1100 (AEDT) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 77F61385E455 for ; Mon, 8 Jan 2024 06:17:24 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from mail-pf1-x431.google.com (mail-pf1-x431.google.com [IPv6:2607:f8b0:4864:20::431]) by sourceware.org (Postfix) with ESMTPS id 5AC5D385332C for ; Mon, 8 Jan 2024 06:16:40 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 5AC5D385332C Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=gmail.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 5AC5D385332C Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=2607:f8b0:4864:20::431 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1704694602; cv=none; b=IZhs+l9J+j8+q3+sVdt5T7uN9rAWzAkEJbOjBteels4JVAREv1xHZN36aTerd9MmqExAUV/R49DiynWwyoQUn4QEFRzw28aodPV3IYlEVOWbezELwv6zci+vl6pcoTolEBcxNUbbApwo5parwxqybcDS/vx35pI4gkqD9WsidgM= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1704694602; c=relaxed/simple; bh=JEk1YzgaxsL/pBgQwyNQ7zzLgB2BUGclRogyyEL1tFk=; h=DKIM-Signature:Message-ID:Date:MIME-Version:To:From:Subject; b=vWaznCYAc/Q7/nqrCPbWFejtxfq5lNToT8m+DQL5+qbZmqjq4zYBmQ3mZcK2Ll9JpmeldBdOOLzI7ZWLdmACuAJYlKVPrdW6KKWqEihw3Yu4J7Dxm6NuKPC5qeNPKTzeh7sbVTmnBIlBL6ZDn0SX6XafTs6RvYL5LOcK0vR8NzE= ARC-Authentication-Results: i=1; server2.sourceware.org Received: by mail-pf1-x431.google.com with SMTP id d2e1a72fcca58-6d9b267007fso325514b3a.3 for ; Sun, 07 Jan 2024 22:16:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1704694599; x=1705299399; darn=gcc.gnu.org; h=subject:from:cc:to:content-language:user-agent:mime-version:date :message-id:from:to:cc:subject:date:message-id:reply-to; bh=JEk1YzgaxsL/pBgQwyNQ7zzLgB2BUGclRogyyEL1tFk=; b=LHeROw+HGaHo2lQDjgCGZ27+NPOmMGQxVPkAX9j4ZsZLQS2YDkN0KfHqk+5Ce0j1xE vWW7+OceMk+rCBAFupunKFnSEJ3Kr1nSvlKpW7a/fp7gjSWBtmTbTClLnBJbJsMT/Y+f I/l8z4qS74ZSHksuUfw21i4KN+kpPlCjKmPGzzPC1pxumDXWqaS36GGKhJwuNVFrBZdJ wkSfaFlkzme6TzxeJbFnA6k2iMchEOC5iSy6tr/mgHzk1Tob9M56owoHMbaDAdp2AHor Q4OVl8kMV+APIEvMvbZkbZ6/FHY5yyHe0XxI/favbOwmgjQkqAiuvRSQYRjRxRW/jTqp oJlQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704694599; x=1705299399; h=subject:from:cc:to:content-language:user-agent:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=JEk1YzgaxsL/pBgQwyNQ7zzLgB2BUGclRogyyEL1tFk=; b=EHlEByWlvOdiNU3Iqq39zBy9fbscuwhzlab6qDHd//ye1wYGTxxmbOuHQsG8EJ4nsL VR95iRDEdQjM4TRQHkO1Y2o9cr2U7y+9t4VpYORdUicVCJpGXAqaCLwgLEzHhASglsYp nH58JgCr599mpiRXU8qDX8rOBqKj4fCUpfkQc1LjmxW8/anIdvqS/OaVY4hRS/6RVwA5 rAyJKj0PxAUINYq8og6U39KXmhl2fU48AT5+S6P4MYZX+LkVoF48WPm7bNhqaAHG9l9I g9/fHxx8OLogwyyR/4/KWWnnyuZq8sDiYrpcl+f685PyO0Nj21yL7HdaQAIa/rBu0axV DfDQ== X-Gm-Message-State: AOJu0YxcrYVOI6uGO5sqSgSOH7f7aZ3vK7nGm9II3GUwvCvPTQeICU56 bxa5ZQw9iOpd/DDUHYL8RD915yPbcUU= X-Google-Smtp-Source: AGHT+IFHn7xOCOXeOMP+AYrBGkYit6ZOIhOiB2kDsTi+LiXRZiUOeSVLyvaAEdiBvX2xLD/G0ybo8Q== X-Received: by 2002:a05:6a20:da86:b0:199:3699:60f9 with SMTP id iy6-20020a056a20da8600b00199369960f9mr813953pzb.4.1704694598819; Sun, 07 Jan 2024 22:16:38 -0800 (PST) Received: from [10.194.16.39] (61-216-141-121.hinet-ip.hinet.net. [61.216.141.121]) by smtp.gmail.com with ESMTPSA id i2-20020a17090a65c200b00288628acf6dsm5376875pjs.14.2024.01.07.22.16.37 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 07 Jan 2024 22:16:38 -0800 (PST) Message-ID: <0c5c7a33-93c9-46ad-85f3-b6f4bb3d5ddd@gmail.com> Date: Mon, 8 Jan 2024 14:16:37 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: gcc-patches , Kyrylo Tkachov , Richard Earnshaw Cc: "Jason.Wu@anshingtek.com.tw" From: Chung-Ju Wu Subject: [PATCH 2/2] arm: Add cortex-m52 doc X-Spam-Status: No, score=-10.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org Hi, This is the patch to add cortex-m52 in the Arm-related options sections of the gcc invoke.texi documentation. Is it OK for trunk? Regards, jasonwucj From b7ce3d499d4bf087ec54a5f834876c9108d46c3d Mon Sep 17 00:00:00 2001 From: Chung-Ju Wu Date: Thu, 7 Dec 2023 11:26:25 +0800 Subject: [PATCH 2/2] arm: Add Arm Cortex-M52 CPU documentation. Signed-off-by: Chung-Ju Wu gcc/ChangeLog: * doc/invoke.texi: Update docs. --- gcc/doc/invoke.texi | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index d71583853f0..bdbe0074cb4 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -23094,7 +23094,7 @@ Permissible names are: @samp{arm7tdmi}, @samp{arm7tdmi-s}, @samp{arm710t}, @samp{cortex-r7}, @samp{cortex-r8}, @samp{cortex-r52}, @samp{cortex-r52plus}, @samp{cortex-m0}, @samp{cortex-m0plus}, @samp{cortex-m1}, @samp{cortex-m3}, @samp{cortex-m4}, @samp{cortex-m7}, @samp{cortex-m23}, @samp{cortex-m33}, -@samp{cortex-m35p}, @samp{cortex-m55}, @samp{cortex-m85}, @samp{cortex-x1}, +@samp{cortex-m35p}, @samp{cortex-m52}, @samp{cortex-m55}, @samp{cortex-m85}, @samp{cortex-x1}, @samp{cortex-x1c}, @samp{cortex-m1.small-multiply}, @samp{cortex-m0.small-multiply}, @samp{cortex-m0plus.small-multiply}, @samp{exynos-m1}, @samp{marvell-pj4}, @samp{neoverse-n1}, @samp{neoverse-n2}, @samp{neoverse-v1}, @samp{xscale}, @@ -23160,34 +23160,34 @@ The following extension options are common to the listed CPUs: @table @samp @item +nodsp Disable the DSP instructions on @samp{cortex-m33}, @samp{cortex-m35p}, -@samp{cortex-m55} and @samp{cortex-m85}. Also disable the M-Profile Vector -Extension (MVE) integer and single precision floating-point instructions on -@samp{cortex-m55} and @samp{cortex-m85}. +@samp{cortex-m52}, @samp{cortex-m55} and @samp{cortex-m85}. +Also disable the M-Profile Vector Extension (MVE) integer and +single precision floating-point instructions on +@samp{cortex-m52}, @samp{cortex-m55} and @samp{cortex-m85}. @item +nopacbti Disable the Pointer Authentication and Branch Target Identification Extension -on @samp{cortex-m85}. +on @samp{cortex-m52} and @samp{cortex-m85}. @item +nomve Disable the M-Profile Vector Extension (MVE) integer and single precision -floating-point instructions on @samp{cortex-m55} and @samp{cortex-m85}. +floating-point instructions on @samp{cortex-m52}, @samp{cortex-m55} and @samp{cortex-m85}. @item +nomve.fp Disable the M-Profile Vector Extension (MVE) single precision floating-point -instructions on @samp{cortex-m55} and @samp{cortex-m85}. +instructions on @samp{cortex-m52}, @samp{cortex-m55} and @samp{cortex-m85}. @item +cdecp0, +cdecp1, ... , +cdecp7 Enable the Custom Datapath Extension (CDE) on selected coprocessors according -to the numbers given in the options in the range 0 to 7 on @samp{cortex-m55}. +to the numbers given in the options in the range 0 to 7 on @samp{cortex-m52} and @samp{cortex-m55}. @item +nofp Disables the floating-point instructions on @samp{arm9e}, @samp{arm946e-s}, @samp{arm966e-s}, @samp{arm968e-s}, @samp{arm10e}, @samp{arm1020e}, @samp{arm1022e}, @samp{arm926ej-s}, @samp{arm1026ej-s}, @samp{cortex-r5}, @samp{cortex-r7}, @samp{cortex-r8}, -@samp{cortex-m4}, @samp{cortex-m7}, @samp{cortex-m33}, @samp{cortex-m35p} @samp{cortex-m4}, @samp{cortex-m7}, @samp{cortex-m33}, @samp{cortex-m35p}, -@samp{cortex-m55} and @samp{cortex-m85}. +@samp{cortex-m52}, @samp{cortex-m55} and @samp{cortex-m85}. Disables the floating-point and SIMD instructions on @samp{generic-armv7-a}, @samp{cortex-a5}, @samp{cortex-a7}, @samp{cortex-a8}, @samp{cortex-a9}, @samp{cortex-a12}, @@ -23530,9 +23530,9 @@ Development Tools Engineering Specification", which can be found on Mitigate against a potential security issue with the @code{VLLDM} instruction in some M-profile devices when using CMSE (CVE-2021-365465). This option is enabled by default when the option @option{-mcpu=} is used with -@code{cortex-m33}, @code{cortex-m35p}, @code{cortex-m55}, @code{cortex-m85} -or @code{star-mc1}. The option @option{-mno-fix-cmse-cve-2021-35465} can be used -to disable the mitigation. +@code{cortex-m33}, @code{cortex-m35p}, @code{cortex-m52}, @code{cortex-m55}, +@code{cortex-m85} or @code{star-mc1}. The option @option{-mno-fix-cmse-cve-2021-35465} +can be used to disable the mitigation. @opindex mstack-protector-guard @opindex mstack-protector-guard-offset