From patchwork Fri Mar 10 19:25:09 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Segher Boessenkool X-Patchwork-Id: 737551 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3vfy0C1RWCz9s7k for ; Sat, 11 Mar 2017 06:25:30 +1100 (AEDT) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="QW7oqND3"; dkim-atps=neutral DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id; q=dns; s=default; b=EhiNp1XVtXSJ hNY7fyYs32TdZ1foz44nitWQpZ+G0o2UUBV7jZnURYNV86I41hGA3IZXrAysbGm/ JnETJM399GXFfgzKcaWlxX1lBCJcbJkfBqMYTZHvv0aVBbhQhkDXKcKgegMQe/aw uQdkMAYio706PrE6dsXzhREd6ETUP60= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id; s=default; bh=y/ZLhoDiRX9s4Q5z72 WHuonO76E=; b=QW7oqND3Clk/o1RqcXMQND1pCdI3ET2rT7ZJcBt+yDMp5f3Um7 JkUzj2M1KEsvZd1JzS2FQbxDIPauDOBe7b3bFG0n2Qfg9Rt/eeSJlfScMbSlb7mi 3Pp/xkXjCTM3SG3TSRIxWmhsYZJkpmTmK2LXznwMCvFNNJ1/DJyWS/gcg= Received: (qmail 56369 invoked by alias); 10 Mar 2017 19:25:21 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 56344 invoked by uid 89); 10 Mar 2017 19:25:20 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-23.7 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, KAM_LAZY_DOMAIN_SECURITY, RP_MATCHES_RCVD autolearn=ham version=3.3.2 spammy= X-HELO: gcc1-power7.osuosl.org Received: from gcc1-power7.osuosl.org (HELO gcc1-power7.osuosl.org) (140.211.15.137) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 10 Mar 2017 19:25:19 +0000 Received: by gcc1-power7.osuosl.org (Postfix, from userid 10019) id 2E4E91C069A; Fri, 10 Mar 2017 19:25:15 +0000 (UTC) From: Segher Boessenkool To: gcc-patches@gcc.gnu.org Cc: dje.gcc@gmail.com, Segher Boessenkool Subject: [PATCH] Build crt*vr.S with AltiVec enabled Date: Fri, 10 Mar 2017 19:25:09 +0000 Message-Id: X-IsSubscribed: yes These files won't build on targets that do not have AltiVec enabled, breaking the build, unless we tell GAS that Altivec insns are fine. The alternative is to not build these files in that case, which is much more complicated. Tested on powerpc64-linux {-m64,-m32}, powerpc64le-linux, and on powerpc-linux-paired. Committing to trunk. Segher 2017-03-10 Segher Boessenkool libgcc/ * config/rs6000/crtrestvr.s: Use .machine altivec. * config/rs6000/crtsavevr.s: Ditto. --- libgcc/config/rs6000/crtrestvr.S | 1 + libgcc/config/rs6000/crtsavevr.S | 1 + 2 files changed, 2 insertions(+) diff --git a/libgcc/config/rs6000/crtrestvr.S b/libgcc/config/rs6000/crtrestvr.S index 592a2b4..a44ab89 100644 --- a/libgcc/config/rs6000/crtrestvr.S +++ b/libgcc/config/rs6000/crtrestvr.S @@ -31,6 +31,7 @@ /* Called with r0 pointing just beyond the end of the vector save area. */ + .machine altivec .section ".text" CFI_STARTPROC HIDDEN_FUNC(_restvr_20) diff --git a/libgcc/config/rs6000/crtsavevr.S b/libgcc/config/rs6000/crtsavevr.S index 2fd54c4..bc02019 100644 --- a/libgcc/config/rs6000/crtsavevr.S +++ b/libgcc/config/rs6000/crtsavevr.S @@ -31,6 +31,7 @@ /* Called with r0 pointing just beyond the end of the vector save area. */ + .machine altivec .section ".text" CFI_STARTPROC HIDDEN_FUNC(_savevr_20)