Message ID | 20240604115628.784729-1-rearnsha@arm.com |
---|---|
Headers |
Return-Path: <binutils-bounces+patchwork=sourceware.org@sourceware.org> X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 60A9239867E2 for <patchwork@sourceware.org>; Tue, 4 Jun 2024 12:01:01 +0000 (GMT) X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2044.outbound.protection.outlook.com [40.107.22.44]) by sourceware.org (Postfix) with ESMTPS id 8C82C395C020 for <binutils@sourceware.org>; Tue, 4 Jun 2024 11:57:27 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 8C82C395C020 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 8C82C395C020 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.22.44 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1717502250; cv=pass; b=pAax3OGYkaHD0cNT3cGJ942WVJ2rYv2KTK191f6WNtE2GLUPHo3Jef6DPQNWDATz2d1gEs4M42A94gMAPXitN5EQd3scWywQC7A58ZZtKgY5UZTeV4pi5qKwrvEjZ+R9S2OjdbmQyBFgxFbta3xL5o1xHb4PO+/4jdPZtAvfdNc= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1717502250; c=relaxed/simple; bh=Ul27na6ypALpc9xHEi7G77YL3CAz4vBtHt5y0WyKpu8=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=E5FzEQIld/KT5UtcGM7dYEveAplD81TCT9AbfaJiwiBkgOAlPmsVvHDFs2yLnSVU12NWhMq2MoG1waF+eHVx12WQ2lvmRgzRqR86YDP6HaNdHPEwcvn0gcK2BV5/ySXyvgR1R1tgmfgkq9Nme1/9BbffZLRgJjfVXdoXjGsb0SA= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=HpDxZbjmGJKZ275SqeI8levZL0Ullexf+CfyVN4Iodg2akYSZhM6/HZ3pu/1Kxa4gnIJrJjQeP8Yp1v2eRh8bSAEckl/3ElEPheq1JD8QrBwMNY6dA/OU06Zmx0EsK4FDlcxXEoyuOyZKUh2g05izv6go/QFwYEqIg2GY9R/KkRnSfZs2ZOqgJ2OrsKuDMBZOkKFkD8DEf+j37JiKg5MpS031QaTq9VznmiyKuuiThZPXIQuuU6vI75ydn1/x7D0UXDjnziq/4Uh/wRQGeoHLCH6mlepttSrPsD2/fJKuqiR+xF4+ik/Q/2n1DyjGq/pWomfwT1H0/LysxLKGbuW3w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xs0YW8lP4SoVtLeiiR4EmnqCA6pOMDn9yC1D2DLIPmU=; b=GrNdT4p4p1LaRV5qaMBxbk19dgH8vz9A6MgTpp2yaevIihvHTmxjKjsP1vg/SEI+fXt78jELJ64AOQGZ+J7DqpaKVgCn6qPCHfmTTO1cn4AaC3Pq4jGdOFrOjP6Ktjjd7DecJPCrrvCoAUW5EfuEkVsOCm/N0gANRn2GequT33vXW1Xb901LulzNwCy4T5+dyiTVuGkeHHszqdQ97m9G2TxkukMv7xmGQwoRy//I9MhajzZsfK/YVKxtdztJLQQmT1Rx2VXFXYQ1TTmNsh7NF7RtVCwoS7PSFiwekBHoq+X6GgWq5VYrEFCsAUHt3IiueXgUMEgX9nHv0AbP4dRgTA== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xs0YW8lP4SoVtLeiiR4EmnqCA6pOMDn9yC1D2DLIPmU=; b=Vug8j0EdDtoTJmm9QnVxkHgxnZjnoiZvFth/y5ap4sPe3+sIRt2gbMy0vE6iVzk9QCSs2KFmY0inLsbTrtkGgegLxBhbbR1XGywWNQSN3aA61FCXljpMK8IzwCFm6cxsiXa/rpG82H0bM7iBSANyyvWvA5SYS4N+8aKTbunPNAg= Received: from AM0PR03CA0038.eurprd03.prod.outlook.com (2603:10a6:208::15) by PAVPR08MB9379.eurprd08.prod.outlook.com (2603:10a6:102:300::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7587.35; Tue, 4 Jun 2024 11:57:21 +0000 Received: from AMS0EPF000001B3.eurprd05.prod.outlook.com (2603:10a6:208:0:cafe::1a) by AM0PR03CA0038.outlook.office365.com (2603:10a6:208::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.30 via Frontend Transport; Tue, 4 Jun 2024 11:57:19 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001B3.mail.protection.outlook.com (10.167.16.167) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7633.15 via Frontend Transport; Tue, 4 Jun 2024 11:57:18 +0000 Received: ("Tessian outbound d79ebeff6a2c:v327"); Tue, 04 Jun 2024 11:57:18 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: c886d55d4f74d5f5 X-CR-MTA-TID: 64aa7808 Received: from ce16cb479197.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id AA7EA97E-617A-4FDB-81B0-D0004A1AEDC5.1; Tue, 04 Jun 2024 11:57:11 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ce16cb479197.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 04 Jun 2024 11:57:11 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EKwwCXHNVbEVN4TNMMW/Ev/mCjv+PxC0jMQcsk2RHXf+UFliXxmW4Z3+A+TO+ucza42qF67zhqTn6JYxwxrnz7xJxlIcTLdff8Y8gOi4VA2hzKoSeVuYCUFtSC2JZu6LqJA1EMSkb4KUs8ddjK2bJUqugjHZrQgMd+VqlvBqMwEyP4+zPjVUJYQn/eUKrTe5XmXEOwxWRUVmIIzTWJhkKBrrqfW03AdQNp/88ppzvA53IpungY24IeunlyV5MHLgV1sPr9YzcfnCcJp1Ha5JrE1xCkTH8ZGuNlyqiMGkoMrTCwrM255u7clj7ViUw8Js+iWZgZlCOjgiHAXC+GVrWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xs0YW8lP4SoVtLeiiR4EmnqCA6pOMDn9yC1D2DLIPmU=; b=oAL6pbYF0zmKPJWCWhzR5NhDnLkiRvQdpocPHjfOglOoYM2iD5jPVElx7lpYI6HLN3Q5LflrLCd0vePQ/IHPTT3kjhVCFYtP07068d1nV34IXc+GKnW2KVl1/9pzt/yTheqeO/aznyGgs51XJvJpNVWDv9kGkuv/XZVUe0B4Pc6RUqr1k2nIBXPldJz4uGOo8gIVQKsBR9dIoHRQlVA3rMz7zannM6BhETO/v8uiK7jloc2nVBZqIvjUfbwqcWIMMMb4L9VsQjhQZtm2Jes46n/GicDl4cehYqpsfiZK5fOzhy6Is5Z5+B/nbGEKOJlwsw6jJBMleZEKAO9KjKGN9w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xs0YW8lP4SoVtLeiiR4EmnqCA6pOMDn9yC1D2DLIPmU=; b=Vug8j0EdDtoTJmm9QnVxkHgxnZjnoiZvFth/y5ap4sPe3+sIRt2gbMy0vE6iVzk9QCSs2KFmY0inLsbTrtkGgegLxBhbbR1XGywWNQSN3aA61FCXljpMK8IzwCFm6cxsiXa/rpG82H0bM7iBSANyyvWvA5SYS4N+8aKTbunPNAg= Received: from DU2PR04CA0213.eurprd04.prod.outlook.com (2603:10a6:10:2b1::8) by DU2PR08MB10303.eurprd08.prod.outlook.com (2603:10a6:10:491::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.23; Tue, 4 Jun 2024 11:57:09 +0000 Received: from DB5PEPF00014B94.eurprd02.prod.outlook.com (2603:10a6:10:2b1:cafe::2f) by DU2PR04CA0213.outlook.office365.com (2603:10a6:10:2b1::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.30 via Frontend Transport; Tue, 4 Jun 2024 11:57:09 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DB5PEPF00014B94.mail.protection.outlook.com (10.167.8.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7633.15 via Frontend Transport; Tue, 4 Jun 2024 11:57:08 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 4 Jun 2024 11:57:08 +0000 Received: from e120077-lin.cambridge.arm.com (10.2.78.57) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2507.35 via Frontend Transport; Tue, 4 Jun 2024 11:57:08 +0000 From: Richard Earnshaw <rearnsha@arm.com> To: <binutils@sourceware.org> CC: Richard Earnshaw <rearnsha@arm.com> Subject: [PATCH 00/11] [2nd resend] arm: Remove FPA support from gas/binutils Date: Tue, 4 Jun 2024 12:56:17 +0100 Message-ID: <20240604115628.784729-1-rearnsha@arm.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DB5PEPF00014B94:EE_|DU2PR08MB10303:EE_|AMS0EPF000001B3:EE_|PAVPR08MB9379:EE_ X-MS-Office365-Filtering-Correlation-Id: 5f784b1a-bba9-4385-392d-08dc848d7bec x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230031|376005|82310400017|1800799015|36860700004; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(376005)(82310400017)(1800799015)(36860700004); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR08MB10303 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001B3.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 38a3e3f7-1ab7-4954-1947-08dc848d764e X-Microsoft-Antispam: BCL:0; ARA:13230031|35042699013|1800799015|82310400017|36860700004|376005; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(35042699013)(1800799015)(82310400017)(36860700004)(376005); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jun 2024 11:57:18.3476 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5f784b1a-bba9-4385-392d-08dc848d7bec X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001B3.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAVPR08MB9379 X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list <binutils.sourceware.org> List-Unsubscribe: <https://sourceware.org/mailman/options/binutils>, <mailto:binutils-request@sourceware.org?subject=unsubscribe> List-Archive: <https://sourceware.org/pipermail/binutils/> List-Post: <mailto:binutils@sourceware.org> List-Help: <mailto:binutils-request@sourceware.org?subject=help> List-Subscribe: <https://sourceware.org/mailman/listinfo/binutils>, <mailto:binutils-request@sourceware.org?subject=subscribe> Errors-To: binutils-bounces+patchwork=sourceware.org@sourceware.org |
Series |
arm: Remove FPA support from gas/binutils
|
|
Message
Richard Earnshaw
June 4, 2024, 11:56 a.m. UTC
[rebased and resending after fixing line encoding issue in one affected file] As trailed when removing the support for the Maverick co-processor (https://sourceware.org/pipermail/binutils/2024-May/133947.html), this patch series removes support for the FPA co-processor as well. Support for both co-processors was removed from GCC about 12 years ago. This patch set is slightly more involved than the one for Maverick though as it affects the default behaviour of the tools in a few cases, especially on coff-based targets where we do not default a default floating point format and pick the default up from the selected CPU. To avoid silent code changes I've opted to set the default for those cases such that they generate an error if the output might have changed when no FPA instructions were generated; this affects certain directives such as .float or .double, since the FPA had a different format for floating-point values. Richard Earnshaw (11): arm: remove FPA related tests arm: rename FPU_ARCH_VFP to FPU_ARCH_SOFTVFP arm: default to softvfp on armv6 or later cores arm: adjust FPU selection logic arm: redirect fp constant data directives through a wrapper arm: change default FPUs from FPA to none arm: remove options to select the FPA arm: remove FPA instructions from assembler arm: remove disassembly support for the FPA co-processor arm: minor documentation cleanup given removal of FPA NEWS: arm: note that FPA support has been removed binutils/NEWS | 4 + gas/config/tc-arm.c | 1056 +++-------------- gas/config/te-armeabi.h | 2 +- gas/config/te-armfbsdvfp.h | 2 +- gas/config/te-armlinuxeabi.h | 2 +- gas/config/te-nacl.h | 2 +- gas/doc/c-arm.texi | 12 +- gas/testsuite/gas/all/gas.exp | 2 + gas/testsuite/gas/arm/attr-mfpu-arm7500fe.d | 11 - gas/testsuite/gas/arm/attr-mfpu-fpa.d | 11 - gas/testsuite/gas/arm/attr-mfpu-fpa10.d | 11 - gas/testsuite/gas/arm/attr-mfpu-fpa11.d | 11 - gas/testsuite/gas/arm/attr-mfpu-fpe.d | 11 - gas/testsuite/gas/arm/attr-mfpu-fpe2.d | 11 - gas/testsuite/gas/arm/attr-mfpu-fpe3.d | 11 - gas/testsuite/gas/arm/attr-mfpu-softfpa.d | 11 - gas/testsuite/gas/arm/attr-override-mcpu.s | 2 +- gas/testsuite/gas/arm/bfloat16-directive-be.d | 2 +- gas/testsuite/gas/arm/bfloat16-directive-le.d | 2 +- .../gas/arm/copro-arm_v2plus-arm_v2.d | 6 +- .../arm/copro-thumb_v6t2plus-thumb_v6t2-1.d | 6 +- gas/testsuite/gas/arm/float.d | 131 -- gas/testsuite/gas/arm/float.s | 163 --- gas/testsuite/gas/arm/float16-bad.d | 1 + gas/testsuite/gas/arm/float16-be.d | 2 +- .../gas/arm/float16-format-opt-bad.d | 2 +- gas/testsuite/gas/arm/float16-le.d | 2 +- gas/testsuite/gas/arm/fp-directive-bad.d | 4 + gas/testsuite/gas/arm/fp-directive-bad.l | 7 + gas/testsuite/gas/arm/fp-directive.d | 9 + gas/testsuite/gas/arm/fp-directive.s | 7 + gas/testsuite/gas/arm/fp-save.d | 9 - gas/testsuite/gas/arm/fp-save.s | 4 - gas/testsuite/gas/arm/fpa-dyadic.d | 166 --- gas/testsuite/gas/arm/fpa-dyadic.s | 172 --- gas/testsuite/gas/arm/fpa-mem.d | 34 - gas/testsuite/gas/arm/fpa-mem.s | 32 - gas/testsuite/gas/arm/fpa-monadic.d | 202 ---- gas/testsuite/gas/arm/fpa-monadic.s | 210 ---- .../gas/arm/group-reloc-ldc-encoding-bad.l | 192 --- .../gas/arm/group-reloc-ldc-encoding-bad.s | 72 +- .../gas/arm/group-reloc-ldc-parsing-bad.l | 80 -- .../gas/arm/group-reloc-ldc-parsing-bad.s | 20 +- gas/testsuite/gas/arm/group-reloc-ldc.d | 336 ++---- gas/testsuite/gas/arm/group-reloc-ldc.s | 45 - gas/testsuite/gas/arm/le-fpconst.d | 11 - gas/testsuite/gas/arm/le-fpconst.s | 8 - include/opcode/arm.h | 12 +- opcodes/arm-dis.c | 197 +-- 49 files changed, 369 insertions(+), 2949 deletions(-) delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-arm7500fe.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-fpa.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-fpa10.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-fpa11.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-fpe.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-fpe2.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-fpe3.d delete mode 100644 gas/testsuite/gas/arm/attr-mfpu-softfpa.d delete mode 100644 gas/testsuite/gas/arm/float.d delete mode 100644 gas/testsuite/gas/arm/float.s create mode 100644 gas/testsuite/gas/arm/fp-directive-bad.d create mode 100644 gas/testsuite/gas/arm/fp-directive-bad.l create mode 100644 gas/testsuite/gas/arm/fp-directive.d create mode 100644 gas/testsuite/gas/arm/fp-directive.s delete mode 100644 gas/testsuite/gas/arm/fp-save.d delete mode 100644 gas/testsuite/gas/arm/fp-save.s delete mode 100644 gas/testsuite/gas/arm/fpa-dyadic.d delete mode 100644 gas/testsuite/gas/arm/fpa-dyadic.s delete mode 100644 gas/testsuite/gas/arm/fpa-mem.d delete mode 100644 gas/testsuite/gas/arm/fpa-mem.s delete mode 100644 gas/testsuite/gas/arm/fpa-monadic.d delete mode 100644 gas/testsuite/gas/arm/fpa-monadic.s delete mode 100644 gas/testsuite/gas/arm/le-fpconst.d delete mode 100644 gas/testsuite/gas/arm/le-fpconst.s
Comments
I didn't verify the exact commit, but I think this series is likely the culprit for the following fails: arm-elf +FAIL: simple FP constants arm-elf +FAIL: Tag_ABI_FP_16bit_format EABI attribute written for Arm alternative format. arm-elf +FAIL: Tag_ABI_FP_16bit_format written for IEEE float16 format. arm-elf +FAIL: Tag_ABI_FP_16bit_format EABI attribute not written when format not specified arm-elf +FAIL: bad .bss / .struct data allocation directives arm-nto +FAIL: simple FP constants arm-nto +FAIL: Tag_ABI_FP_16bit_format EABI attribute written for Arm alternative format. arm-nto +FAIL: Tag_ABI_FP_16bit_format written for IEEE float16 format. arm-nto +FAIL: Tag_ABI_FP_16bit_format EABI attribute not written when format not specified arm-nto +FAIL: bad .bss / .struct data allocation directives
On 06/06/2024 02:14, Alan Modra wrote: > I didn't verify the exact commit, but I think this series is likely > the culprit for the following fails: > arm-elf +FAIL: simple FP constants > arm-elf +FAIL: Tag_ABI_FP_16bit_format EABI attribute written for Arm alternative format. > arm-elf +FAIL: Tag_ABI_FP_16bit_format written for IEEE float16 format. > arm-elf +FAIL: Tag_ABI_FP_16bit_format EABI attribute not written when format not specified > arm-elf +FAIL: bad .bss / .struct data allocation directives > arm-nto +FAIL: simple FP constants > arm-nto +FAIL: Tag_ABI_FP_16bit_format EABI attribute written for Arm alternative format. > arm-nto +FAIL: Tag_ABI_FP_16bit_format written for IEEE float16 format. > arm-nto +FAIL: Tag_ABI_FP_16bit_format EABI attribute not written when format not specified > arm-nto +FAIL: bad .bss / .struct data allocation directives > Yes it will be this patch set; it's a consequence of it adding a target-specific wrapper around the handling of floating-point data directives (.float, .double, etc). The original FPA extension for Arm used a different, incompatible, floating-point data format from that used by the VFP extension[1] and these ports fall back to FPA format if there hasn't been an explicit option passed that says that VFP is in use. Since I didn't want the tools to silently generate different code on an upgrade I chose to add a wrapper that faulted any fp-data directive when we were in a mode that would previously have treated the value in FPA format. These failing tests are occurring because of that and because these ports were defaulting back to FPA format. The arm-elf port is on my kill list. That used an ABI that was superseded 20 years ago now (give or take) by arm-eabi and really nobody should be using it any more (at least, not with current tools). I'm less sure about arm-nto (QNX Neutrino), looking through the logs I don't see much in the way of port maintenance, but that could just be because it didn't need any. It's pretty easy to fix "simple FP constants" - I already did that for arm-coff, and the float16 tests can also be easily skipped. The tricky case might be the generic "bad .bss..." test as that has a general target list pattern in the test itself and I don't know if you can also have an exclusion list as well. Anyway, I'll try to find some suitable fixes. R. [1] I think technically this difference only applies to types larger than .float, but I chose to wrap all the fp-related directives for consistency.
On 06/06/2024 11:25, Richard Earnshaw (lists) wrote: > On 06/06/2024 02:14, Alan Modra wrote: >> I didn't verify the exact commit, but I think this series is likely >> the culprit for the following fails: >> arm-elf +FAIL: simple FP constants >> arm-elf +FAIL: Tag_ABI_FP_16bit_format EABI attribute written for Arm >> alternative format. >> arm-elf +FAIL: Tag_ABI_FP_16bit_format written for IEEE float16 format. >> arm-elf +FAIL: Tag_ABI_FP_16bit_format EABI attribute not written >> when format not specified >> arm-elf +FAIL: bad .bss / .struct data allocation directives >> arm-nto +FAIL: simple FP constants >> arm-nto +FAIL: Tag_ABI_FP_16bit_format EABI attribute written for Arm >> alternative format. >> arm-nto +FAIL: Tag_ABI_FP_16bit_format written for IEEE float16 format. >> arm-nto +FAIL: Tag_ABI_FP_16bit_format EABI attribute not written >> when format not specified >> arm-nto +FAIL: bad .bss / .struct data allocation directives >> > > Yes it will be this patch set; it's a consequence of it adding a > target-specific wrapper around the handling of floating-point data > directives (.float, .double, etc). > > The original FPA extension for Arm used a different, incompatible, > floating-point data format from that used by the VFP extension[1] and > these ports fall back to FPA format if there hasn't been an explicit > option passed that says that VFP is in use. Since I didn't want the > tools to silently generate different code on an upgrade I chose to add a > wrapper that faulted any fp-data directive when we were in a mode that > would previously have treated the value in FPA format. These failing > tests are occurring because of that and because these ports were > defaulting back to FPA format. > > The arm-elf port is on my kill list. That used an ABI that was > superseded 20 years ago now (give or take) by arm-eabi and really nobody > should be using it any more (at least, not with current tools). I'm > less sure about arm-nto (QNX Neutrino), looking through the logs I don't > see much in the way of port maintenance, but that could just be because > it didn't need any. > > It's pretty easy to fix "simple FP constants" - I already did that for > arm-coff, and the float16 tests can also be easily skipped. The tricky > case might be the generic "bad .bss..." test as that has a general > target list pattern in the test itself and I don't know if you can also > have an exclusion list as well. > > Anyway, I'll try to find some suitable fixes. > > R. > > [1] I think technically this difference only applies to types larger > than .float, but I chose to wrap all the fp-related directives for > consistency. I meant to add that I've never seen one of these floating-point data directives used outside of the gas testsuite (GCC writes floating-point data out in binary format to avoid any possible rounding issues), so I don't expect many people to be affected by this faulting behaviour. R.