Cover Letter Detail
Show a cover letter.
GET /api/1.2/covers/2234299/?format=api
{ "id": 2234299, "url": "http://patchwork.ozlabs.org/api/1.2/covers/2234299/?format=api", "web_url": "http://patchwork.ozlabs.org/project/gcc/cover/20260507155010.23784-1-richard.ball@arm.com/", "project": { "id": 17, "url": "http://patchwork.ozlabs.org/api/1.2/projects/17/?format=api", "name": "GNU Compiler Collection", "link_name": "gcc", "list_id": "gcc-patches.gcc.gnu.org", "list_email": "gcc-patches@gcc.gnu.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260507155010.23784-1-richard.ball@arm.com>", "list_archive_url": null, "date": "2026-05-07T15:50:08", "name": "[0/2] aarch64: Add support for FEAT_CMH", "submitter": { "id": 84470, "url": "http://patchwork.ozlabs.org/api/1.2/people/84470/?format=api", "name": "Richard Ball", "email": "richard.ball@arm.com" }, "mbox": "http://patchwork.ozlabs.org/project/gcc/cover/20260507155010.23784-1-richard.ball@arm.com/mbox/", "series": [ { "id": 503209, "url": "http://patchwork.ozlabs.org/api/1.2/series/503209/?format=api", "web_url": "http://patchwork.ozlabs.org/project/gcc/list/?series=503209", "date": "2026-05-07T15:50:08", "name": "aarch64: Add support for FEAT_CMH", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/503209/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2234299/comments/", "headers": { "Return-Path": "<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "gcc-patches@gcc.gnu.org" ], "Delivered-To": [ "patchwork-incoming@legolas.ozlabs.org", "gcc-patches@gcc.gnu.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=eAdOOxYK;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=eAdOOxYK;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)", "sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=eAdOOxYK;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=eAdOOxYK", "sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com", "sourceware.org; spf=pass smtp.mailfrom=arm.com", "sourceware.org;\n arc=pass smtp.remote-ip=2a01:111:f403:c200::3" ], "Received": [ "from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gBGwj3NPvz1yKd\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 08 May 2026 01:52:16 +1000 (AEST)", "from vm01.sourceware.org (localhost [IPv6:::1])\n\tby sourceware.org (Postfix) with ESMTP id 947954BA2E17\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 7 May 2026 15:52:13 +0000 (GMT)", "from DU2PR03CU002.outbound.protection.outlook.com\n (mail-northeuropeazlp170110003.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c200::3])\n by sourceware.org (Postfix) with ESMTPS id 02DBF4BA2E16\n for <gcc-patches@gcc.gnu.org>; Thu, 7 May 2026 15:51:27 +0000 (GMT)", "from DUZPR01CA0279.eurprd01.prod.exchangelabs.com\n (2603:10a6:10:4b9::28) by AM0PR08MB11259.eurprd08.prod.outlook.com\n (2603:10a6:20b:6fc::21) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9891.15; Thu, 7 May\n 2026 15:51:24 +0000", "from DB5PEPF00014B8B.eurprd02.prod.outlook.com\n (2603:10a6:10:4b9:cafe::e8) by DUZPR01CA0279.outlook.office365.com\n (2603:10a6:10:4b9::28) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9891.17 via Frontend Transport; Thu,\n 7 May 2026 15:51:23 +0000", "from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n DB5PEPF00014B8B.mail.protection.outlook.com (10.167.8.199) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9891.9\n via Frontend Transport; Thu, 7 May 2026 15:51:23 +0000", "from CWLP265CA0382.GBRP265.PROD.OUTLOOK.COM (2603:10a6:401:5e::34)\n by PA4PR08MB7571.eurprd08.prod.outlook.com (2603:10a6:102:270::19) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9891.15; Thu, 7 May\n 2026 15:50:19 +0000", "from AMS1EPF00000091.eurprd05.prod.outlook.com\n (2603:10a6:401:5e:cafe::5a) by CWLP265CA0382.outlook.office365.com\n (2603:10a6:401:5e::34) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9891.17 via Frontend Transport; Thu,\n 7 May 2026 15:50:18 +0000", "from nebula.arm.com (172.205.89.229) by\n AMS1EPF00000091.mail.protection.outlook.com (10.167.242.88) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9891.9 via Frontend Transport; Thu, 7 May 2026 15:50:18 +0000", "from AZ-NEU-EX04.Arm.com (10.240.25.138) by AZ-NEU-EX03.Arm.com\n (10.240.25.137) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.29; Thu, 7 May\n 2026 15:50:17 +0000", "from e137840.cambridge.arm.com (10.2.78.31) by mail.arm.com\n (10.240.25.138) with Microsoft SMTP Server id 15.2.2562.29 via Frontend\n Transport; Thu, 7 May 2026 15:50:17 +0000" ], "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 sourceware.org 947954BA2E17", "OpenDKIM Filter v2.11.0 sourceware.org 02DBF4BA2E16" ], "DMARC-Filter": "OpenDMARC Filter v1.4.2 sourceware.org 02DBF4BA2E16", "ARC-Filter": "OpenARC Filter v1.0.0 sourceware.org 02DBF4BA2E16", "ARC-Seal": [ "i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1778169087; cv=pass;\n b=EFSm9saBfYHw4u3mqGYwbPRHI2pSuwxpTXScdvcpExMsRDbdhcWXGULp0qtgueZ0FD4u3/QurM8kEACbwqkQmvO4rZmQuOjk86gCdAhIlNljvcsWoPijuNwDlFglSDSJN+Y67p+l8ilVlKRtvXcMEDTkzVAP8/CBGcMtsIBoZ5o=", "i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=Fh76TADI5ao531E4LQWvprsAqiC24m9Xy5wtlTUE6Ei2F5WvWhDo4MjQtg7LyVk7jJH5Dgy8ZkJvCIy2FnQ0sKP0q+Fh3ib0MOqRtUdUOYD14O252fdRweCkQ3kPYWq7opoODxEXaxkpmBEKWdXdf0J0Hhb8o4VT/RUEON/eh9QnBPSJZYJPl07rumtj9Y7IY8v79pGdCZXxPOePcVIla4/hAHAiTbvzPnO0miVaq9z5/V/0KymW0gybj0YhVRJQUBGohzSEQPWRZtPbDyx+5s9uTPNHZpE6G/4bIotlUBH4wdKkZZq5G85lGLtm0FBH/9rrPJsNxccg8W0iQT735Q==", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=M0kbINRjTenZvr4/QikHRb/U/LPHXU3IczolIVgXqmnhj4PEDJ9gKQ/6BdW52pEF/9v81aHwCV2pZz6TcRrHI0VuAMFK19t6vOPZUGigvxkfXXYCmnSD6Zbw0reuE9JwExfUfTmq4EMtjHsVZMDeqiwPS09d/N7LotqoArcHCMxe6tPmNx92OXtBHE1ssI39bVeUy+8vqHZZ+ciSE5ykGsLd60EescXAotM/yxgWSKTlaUhSLgZvohWsErsTOp7PNihGyfR4aBXxRROlGVLk7ixaT94kPlByPQ4uNMumOYOsBDXcaH7jfyAEU6OojZ27+0cSlh43sIxBqtvda4dm6g==" ], "ARC-Message-Signature": [ "i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1778169087; c=relaxed/simple;\n bh=AqHn9lgIWEnsOwBwzloSRaKWX1F7+XCP3IBe5oVn4JI=;\n h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID:\n MIME-Version;\n b=Z75hxG0rvwQwm+ot+gidfBadcP2t8Dj4XadMpRrIolI9h/68SxAgifWhN0Uqfjodzezl7Gg0Ack6IvSEhajUK9K9O65XghK3dnlecwdXtKDGh/UrBn18LXa1DSryAv61/jlMrrhYcudFAcgw8aWX6vB+ZW0A1XxedUHUPR6as6M=", "i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=+gg50n7z3MW3E9cj8PMj/bLl9lkl+15jyfKa9QELjrI=;\n b=osvg2DGBPQwJ3DLmHW6cjlU0RNiaeXvPJ0kSBnL+VhreGXl6KMyvU3tJeJfm65acT/IU1zeya5sP9bzkFPqiE7KSaj+6iqA4hPxFco+mUiiPmgZVii9JTOivSD5t7YKV4l5Q3cxJZoYghUhQeCfNatecdUNMOKEx/HlbJADguZRbuSkZR7sMwvU1cBRiWY8UnF17Kr4kU4p/5VGGP6HvIOr8jBUDMmatCaQquiTK2nd+UKbwJXOgO/hWy9A+yne3563CqbPVfJ+MFvraYsJM/WHwPOznMQd6ASdqqp+YREaNZXz5V0tSJ7YEZ5KH0CMzOL0L512eD/5J881zmK3Uwg==", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=+gg50n7z3MW3E9cj8PMj/bLl9lkl+15jyfKa9QELjrI=;\n b=Pr9k4oax9IPUwLMhcWyF6BeO6B+d45l0PRAzUubhyuNQ/aQjXlTKmAcjnlQ2FtfRu+oz3ddp8tHHBxctWiywJCC4Ag6uawgYKuHHHsb4CBsc7QCP/uUR4h2oKF6494cHH/d0HeKoeVauJZqOwd0h+K3808d4AXGyVNQN77a8DlAZmA0HCNmoa1BFPZbUu5OHVucBU4T92YRMLsIVqC+kv2l/rBM5riukUSJEpAFZzrIHtAALaTKXLK2xo2RTkcBGljdl2ezfixaiYc3ZxE1pLcAtVGau3FYYQwcP92bV4qTKEWOucHvXmdt53CJ30xPsYREdK0YpjP0h9HfWOkplFg==" ], "ARC-Authentication-Results": [ "i=3; sourceware.org;\n dkim=pass (1024-bit key, unprotected)\n header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1\n header.b=eAdOOxYK;\n dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=eAdOOxYK", "i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com])", "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 172.205.89.229) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com;\n dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;\n dkim=none (message not signed); arc=none (0)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=+gg50n7z3MW3E9cj8PMj/bLl9lkl+15jyfKa9QELjrI=;\n b=eAdOOxYK+nZEntDzIkAm4AtswlcvxV4mMi0yQxasPbnlTLAMjiNMshjLEGILWN1M9+ri3FleIo7sxyO+NxpRTRKjJDrhj7b77D4v/BA87Mm/mkvwnYO+Sj2VZgfQZ5zTrYE0SS1EA3v0YmzNJvywl5dCKuC9LFnRLfGKifZlTpo=", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=+gg50n7z3MW3E9cj8PMj/bLl9lkl+15jyfKa9QELjrI=;\n b=eAdOOxYK+nZEntDzIkAm4AtswlcvxV4mMi0yQxasPbnlTLAMjiNMshjLEGILWN1M9+ri3FleIo7sxyO+NxpRTRKjJDrhj7b77D4v/BA87Mm/mkvwnYO+Sj2VZgfQZ5zTrYE0SS1EA3v0YmzNJvywl5dCKuC9LFnRLfGKifZlTpo=" ], "X-MS-Exchange-Authentication-Results": [ "spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;", "spf=pass (sender IP is 172.205.89.229)\n smtp.mailfrom=arm.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=arm.com;" ], "Received-SPF": [ "Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C", "Pass (protection.outlook.com: domain of arm.com designates\n 172.205.89.229 as permitted sender) receiver=protection.outlook.com;\n client-ip=172.205.89.229; helo=nebula.arm.com; pr=C" ], "From": "<richard.ball@arm.com>", "To": "<gcc-patches@gcc.gnu.org>", "CC": "<richard.earnshaw@arm.com>, <tamar.christina@arm.com>,\n <ktkachov@nvidia.com>, <Wilco.Dijkstra@arm.com>, <Alex.Coplan@arm.com>,\n <Alice.Carlotti@arm.com>, Richard Ball <Richard.Ball@arm.com>", "Subject": "[PATCH 0/2] aarch64: Add support for FEAT_CMH", "Date": "Thu, 7 May 2026 16:50:08 +0100", "Message-ID": "<20260507155010.23784-1-richard.ball@arm.com>", "X-Mailer": "git-send-email 2.34.1", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-EOPAttributedMessage": "1", "X-MS-TrafficTypeDiagnostic": "\n AMS1EPF00000091:EE_|PA4PR08MB7571:EE_|DB5PEPF00014B8B:EE_|AM0PR08MB11259:EE_", "X-MS-Office365-Filtering-Correlation-Id": "16f538e6-778f-485d-5f9e-08deac507d91", "x-checkrecipientrouted": "true", "NoDisclaimer": "true", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam-Untrusted": "BCL:0;\n ARA:13230040|82310400026|36860700016|376014|1800799024|13003099007|18002099003|56012099003;", "X-Microsoft-Antispam-Message-Info-Original": "\n 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", "X-Forefront-Antispam-Report-Untrusted": "CIP:172.205.89.229; CTRY:IE; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(82310400026)(36860700016)(376014)(1800799024)(13003099007)(18002099003)(56012099003);\n DIR:OUT; SFP:1101;", "X-Exchange-RoutingPolicyChecked": "\n vJkcG1+7fKoKn/UbzKXIWG95kSHZwPoAfIJTlJjJP2ElwOL6wKFRDJmq0hiRmUZQ2PqDLU/4lsSS0tL3REuTiAMjP9Z2qAo1gqH6vAW8bkYwHpqlihmruw36QJHt7gM0xXd3WNL+k34HIDDgVXKDNDDvrnzP1fSGK0nyNPUr7l8PEu85lv3DqVb5fwt8Cn65PgJbBfVgIwpyezkFc0WqRo6Ee0q4WQykd5B3Yx8rIbv/+AzqjA8gZZv84hawfpRXh5gJMUqjt7t/T2aHRsfwY0lrfTR34xpn0g3lVmHvqrHIwk/hA3unMGhuV9RieKbM15XzwXuvYApNxrN3Bd1nlg==", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": [ "PA4PR08MB7571", "AM0PR08MB11259" ], "X-MS-Exchange-Transport-CrossTenantHeadersStripped": "\n DB5PEPF00014B8B.eurprd02.prod.outlook.com", "X-MS-PublicTrafficType": "Email", "X-MS-Office365-Filtering-Correlation-Id-Prvs": "\n 68aafe44-171d-4a30-de79-08deac5056c6", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|376014|82310400026|14060799003|35042699022|36860700016|1800799024|56012099003|18002099003|13003099007;", "X-Microsoft-Antispam-Message-Info": "\n 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", "X-Forefront-Antispam-Report": "CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(376014)(82310400026)(14060799003)(35042699022)(36860700016)(1800799024)(56012099003)(18002099003)(13003099007);\n DIR:OUT; SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n Gn+dQw6TLYO0dOlF/uwT9H88uOW+FsHrEaFNSM+ZPQdpoJWah3udahtAdqDNftpjO9kZnVBf6iT+Pw2xfCJPBFapp8nF/ggT9rXRFT3uqTSqZYeoviP2VkP57bZ0DEA7XAnflBbQrl/ivY9owuLQj4gt+6FTezrFAy/z+XYhm8i1pL0lc9iH1DzVCQBt+qkX83zCXK0yA6IqyRAup/Op3B4y3WSE31KTygGw4bDE/KSYEqoKNg8CyVUEKh+7yitVa+rg+yS/QFGFL957I3LNoJJjvROUx9thOLVUi0hwa+mxOK4DmuQxv/54UloC8yT7t5p5jdrN9hgZkjD69cWDaP4hZkjlNKPT9fPmYZ7GOHNOtX3cvaD/dbXPc+J5KVjzKq79A/KA3sj7x0b3cM2UXlAxi9/nu8F3usLIjUXDaRwyTq6o6nCYk43be3R+ivNf", "X-OriginatorOrg": "arm.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "07 May 2026 15:51:23.6737 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 16f538e6-778f-485d-5f9e-08deac507d91", "X-MS-Exchange-CrossTenant-Id": "f34e5979-57d9-4aaa-ad4d-b122a662184d", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]", "X-MS-Exchange-CrossTenant-AuthSource": "\n DB5PEPF00014B8B.eurprd02.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-BeenThere": "gcc-patches@gcc.gnu.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Gcc-patches mailing list <gcc-patches.gcc.gnu.org>", "List-Unsubscribe": "<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>", "List-Archive": "<https://gcc.gnu.org/pipermail/gcc-patches/>", "List-Post": "<mailto:gcc-patches@gcc.gnu.org>", "List-Help": "<mailto:gcc-patches-request@gcc.gnu.org?subject=help>", "List-Subscribe": "<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>", "Errors-To": "gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org" }, "content": "From: Richard Ball <Richard.Ball@arm.com>\n\nThis patch series adds support for FEAT_CMH,\nthis includes two patches. The first alters the previous\natomic_store from PCDPHINT to change the hint parameter,\nthis allows for the new hints to be added from CMH.\nThe second adds a new set of atomic_fetch intrinsics,\nwhich can be used with the new SHUH hint.\n\n========================================================================\n[1/2] Add support for FEAT_CMH atomic store intrinsics\ngcc/ChangeLog:\n\n\t* config/aarch64/aarch64-builtins.cc\n\t(enum aarch64_builtins): Change Function/Builtin names.\n\t(aarch64_init_pcdphint_builtins): Likewise.\n\t(aarch64_init_atomic_hints_builtins): Likewise.\n\t(aarch64_general_init_builtins): Likewise.\n\t(aarch64_expand_stshh_builtin): Likewise.\n\t(aarch64_expand_atomic_hints_builtins): Likewise.\n\t(aarch64_general_expand_builtin): Likewise.\n\t(aarch64_resolve_overloaded_builtin_stshh): Likewise.\n\t(aarch64_resolve_overloaded_builtin_atomic_hint_store): Likewise\n\t(aarch64_resolve_overloaded_builtin_general): Likewise.\n\t* config/aarch64/arm_acle.h\n\t(__atomic_store_with_stshh): Likewise.\n\t(__arm_atomic_store_with_hint): Likewise.\n\t* config/aarch64/atomics.md\n\t(@aarch64_atomic_store_stshh<mode>): Add new hints to pattern\n\t(@aarch64_atomic_hints_store<mode>): Likewise.\n\t* config/aarch64/iterators.md: Add Unspec for new hints.\n\ngcc/testsuite/ChangeLog:\n\n\t* g++.target/aarch64/atomic_store_with_stshh.C: Change Function name.\n\t* gcc.target/aarch64/atomic_store_with_stshh.c: Likewise.\n\t* gcc.target/aarch64/atomic_store_with_shuh.c: New test.\n\t* gcc.target/aarch64/atomic_store_with_stcph.c: New test.\n\n========================================================================\n[2/2] aarch64: Add support for FEAT_CMH atomic_fetch intrinsics\ngcc/ChangeLog:\n\n\t* config/aarch64/aarch64-builtins.cc\n\t(enum aarch64_builtins): Add new builtins.\n\t(aarch64_init_atomic_hints_builtins): Likewise.\n\t(aarch64_expand_atomic_hints_builtins_fetch): Handle Fetch intrinsics.\n\t(aarch64_general_expand_builtin): Add call for new builtins.\n\t(aarch64_resolve_overloaded_builtin_atomic_hint_fetch): Handle Fetch intrinsics.\n\t(aarch64_resolve_overloaded_builtin_general): Add new call.\n\t* config/aarch64/arm_acle.h\n\t(enum atomic_fetch): Store different Fetch types.\n\t(__arm_atomic_fetch_add_with_hint): Add new builtin.\n\t(__arm_atomic_fetch_sub_with_hint): Likewise.\n\t(__arm_atomic_fetch_and_with_hint): Likewise.\n\t(__arm_atomic_fetch_xor_with_hint): Likewise.\n\t(__arm_atomic_fetch_or_with_hint): Likewise.\n\t* config/aarch64/atomics.md\n\t(aarch64_atomic_fetch_<atomic_ldoptab><mode>_atomic_hint): New pattern for atomic_fetch.\n\t(@aarch64_atomic_hints_fetch<mode>): Likewise.\n\t* config/aarch64/iterators.md: New unspecs.\n\ngcc/testsuite/ChangeLog:\n\n\t* gcc.target/aarch64/atomic_fetch_add_with_shuh.c: New test.\n\t* gcc.target/aarch64/atomic_fetch_and_with_shuh.c: New test.\n\t* gcc.target/aarch64/atomic_fetch_or_with_shuh.c: New test.\n\t* gcc.target/aarch64/atomic_fetch_sub_with_shuh.c: New test.\n\t* gcc.target/aarch64/atomic_fetch_xor_with_shuh.c: New test.\n\n========================================================================\n\nRichard Ball (2):\n aarch64: Add support for FEAT_CMH atomic store intrinsics\n aarch64: Add support for FEAT_CMH atomic_fetch intrinsics\n\n gcc/config/aarch64/aarch64-builtins.cc | 324 ++++++++++++++----\n gcc/config/aarch64/arm_acle.h | 45 ++-\n gcc/config/aarch64/atomics.md | 105 +++++-\n gcc/config/aarch64/iterators.md | 4 +-\n .../aarch64/atomic_store_with_stshh.C | 22 +-\n .../aarch64/atomic_fetch_add_with_shuh.c | 186 ++++++++++\n .../aarch64/atomic_fetch_and_with_shuh.c | 186 ++++++++++\n .../aarch64/atomic_fetch_or_with_shuh.c | 186 ++++++++++\n .../aarch64/atomic_fetch_sub_with_shuh.c | 208 +++++++++++\n .../aarch64/atomic_fetch_xor_with_shuh.c | 186 ++++++++++\n .../aarch64/atomic_store_with_shuh.c | 186 ++++++++++\n .../aarch64/atomic_store_with_stcph.c | 186 ++++++++++\n .../aarch64/atomic_store_with_stshh.c | 22 +-\n 13 files changed, 1753 insertions(+), 93 deletions(-)\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_fetch_add_with_shuh.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_fetch_and_with_shuh.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_fetch_or_with_shuh.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_fetch_sub_with_shuh.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_fetch_xor_with_shuh.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_store_with_shuh.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/atomic_store_with_stcph.c" }