https://github.com/Stylie777 updated 
https://github.com/llvm/llvm-project/pull/137595

>From 2400745e8724ea8616f68899fb5b6a71a1cf522e Mon Sep 17 00:00:00 2001
From: Jack Styles <jack.sty...@arm.com>
Date: Fri, 25 Apr 2025 14:57:40 +0100
Subject: [PATCH 1/2] [ARM][Driver] Ensure NEON is enabled and Disabled
 correctly

In #130623 support was added for `+nosimd` in the clang driver.
Following this PR, it was discovered that, if NEONS is disabled in
the command line, it did not disable features that have NEON as
a requirement, such as Crypto or AES. To achieve this, clang will
now check if SIMD has been disabled when using a NEON supported
FPU. If this is the case, it will disable all features that depend
on NEON.

While working on this Patch, I spotted that for features that rely
on NEON, when used, do not enable NEON in the Driver. This meant
that when using AES for example, NEON would not be activated. NEON
is required when using features such as AES, so this is now enabled
when using such features.
---
 clang/docs/ReleaseNotes.rst                   |  2 +
 clang/lib/Driver/ToolChains/Arch/ARM.cpp      | 56 +++++++++++++++++--
 clang/test/Driver/arm-features.c              |  2 +-
 clang/test/Driver/arm-mfpu.c                  |  4 +-
 clang/test/Preprocessor/arm-target-features.c | 10 +++-
 5 files changed, 65 insertions(+), 9 deletions(-)

diff --git a/clang/docs/ReleaseNotes.rst b/clang/docs/ReleaseNotes.rst
index bec670e573ca6..b19c6faae989a 100644
--- a/clang/docs/ReleaseNotes.rst
+++ b/clang/docs/ReleaseNotes.rst
@@ -601,6 +601,8 @@ Arm and AArch64 Support
 - The ``+nosimd`` attribute is now fully supported for ARM. Previously, this 
had no effect when being used with
   ARM targets, however this will now disable NEON instructions being 
generated. The ``simd`` option is
   also now printed when the ``--print-supported-extensions`` option is used.
+- NEON is correctly enabled when using features that depend on NEON , and 
disables all features that depend on
+  NEON when using ``+nosimd``.
 
 -  Support for __ptrauth type qualifier has been added.
 
diff --git a/clang/lib/Driver/ToolChains/Arch/ARM.cpp 
b/clang/lib/Driver/ToolChains/Arch/ARM.cpp
index 5084058b3fef0..61a98475de93f 100644
--- a/clang/lib/Driver/ToolChains/Arch/ARM.cpp
+++ b/clang/lib/Driver/ToolChains/Arch/ARM.cpp
@@ -781,6 +781,30 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
   if (FPUKind == llvm::ARM::FK_FPV5_D16 || FPUKind == 
llvm::ARM::FK_FPV5_SP_D16)
     Features.push_back("-mve.fp");
 
+  // If SIMD has been disabled and the selected FPU support NEON, then features
+  // that rely on NEON Instructions should also be disabled. Cases where NEON
+  // needs activating to support another feature is handled below with the
+  // crypto feature.
+  bool HasSimd = false;
+  const auto ItSimd =
+  llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
+    return F.contains("neon");
+  });
+  const bool FoundSimd = ItSimd != Features.rend();
+  const bool FPUSupportsNeon =
+    (llvm::ARM::FPUNames[FPUKind].NeonSupport == 
llvm::ARM::NeonSupportLevel::Neon) ||
+    (llvm::ARM::FPUNames[FPUKind].NeonSupport == 
llvm::ARM::NeonSupportLevel::Crypto);
+  if(FoundSimd)
+  HasSimd = ItSimd->take_front() == "+";
+  if(!HasSimd && FPUSupportsNeon) {
+    Features.push_back("-sha2");
+    Features.push_back("-aes");
+    Features.push_back("-crypto");
+    Features.push_back("-dotprod");
+    Features.push_back("-bf16");
+    Features.push_back("-imm8");
+  }
+
   // For Arch >= ARMv8.0 && A or R profile:  crypto = sha2 + aes
   // Rather than replace within the feature vector, determine whether each
   // algorithm is enabled and append this to the end of the vector.
@@ -791,6 +815,9 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
   // FIXME: this needs reimplementation after the TargetParser rewrite
   bool HasSHA2 = false;
   bool HasAES = false;
+  bool HasBF16 = false;
+  bool HasDotprod = false;
+  bool HasI8MM = false;
   const auto ItCrypto =
       llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
         return F.contains("crypto");
@@ -803,12 +830,28 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
       llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
         return F.contains("crypto") || F.contains("aes");
       });
-  const bool FoundSHA2 = ItSHA2 != Features.rend();
-  const bool FoundAES = ItAES != Features.rend();
-  if (FoundSHA2)
+  const auto ItBF16 =
+      llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
+        return F.contains("bf16");
+      });
+  const auto ItDotprod =
+      llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
+        return F.contains("dotprod");
+      });
+  const auto ItI8MM =
+      llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
+        return F.contains("i8mm");
+      });
+  if (ItSHA2 != Features.rend())
     HasSHA2 = ItSHA2->take_front() == "+";
-  if (FoundAES)
+  if (ItAES != Features.rend())
     HasAES = ItAES->take_front() == "+";
+  if (ItBF16 != Features.rend())
+    HasBF16 = ItBF16->take_front() == "+";
+  if (ItDotprod != Features.rend())
+    HasDotprod = ItDotprod->take_front() == "+";
+  if (ItI8MM != Features.rend())
+    HasI8MM = ItI8MM->take_front() == "+";
   if (ItCrypto != Features.rend()) {
     if (HasSHA2 && HasAES)
       Features.push_back("+crypto");
@@ -823,6 +866,11 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
     else
       Features.push_back("-aes");
   }
+  // If any of these features are enabled, NEON should also be enabled.
+  if (HasAES || HasSHA2 || HasBF16 || HasDotprod || HasI8MM)
+    Features.push_back("+neon");
+
+  
 
   if (HasSHA2 || HasAES) {
     StringRef ArchSuffix = arm::getLLVMArchSuffixForARM(
diff --git a/clang/test/Driver/arm-features.c b/clang/test/Driver/arm-features.c
index eb424f5f61116..5f837667a2614 100644
--- a/clang/test/Driver/arm-features.c
+++ b/clang/test/Driver/arm-features.c
@@ -74,7 +74,7 @@
 // Check +crypto for M and R profiles:
 //
 // RUN: %clang -target arm-arm-none-eabi -march=armv8-r+crypto   -### -c %s 
2>&1 | FileCheck -check-prefix=CHECK-CRYPTO-R %s
-// CHECK-CRYPTO-R: "-cc1"{{.*}} "-target-cpu" "generic"{{.*}} 
"-target-feature" "+sha2" "-target-feature" "+aes"
+// CHECK-CRYPTO-R: "-cc1"{{.*}} "-target-cpu" "generic"{{.*}} 
"-target-feature" "+sha2" "-target-feature" "+aes" "-target-feature" "+neon"
 // RUN: %clang -target arm-arm-none-eabi -march=armv8-m.base+crypto -### -c %s 
2>&1 | FileCheck -check-prefix=CHECK-NOCRYPTO5 %s
 // RUN: %clang -target arm-arm-none-eabi -march=armv8-m.main+crypto -### -c %s 
2>&1 | FileCheck -check-prefix=CHECK-NOCRYPTO5 %s
 // RUN: %clang -target arm-arm-none-eabi -mcpu=cortex-m23+crypto -### -c %s 
2>&1 | FileCheck -check-prefix=CHECK-NOCRYPTO5 %s
diff --git a/clang/test/Driver/arm-mfpu.c b/clang/test/Driver/arm-mfpu.c
index 640e1b35c84b8..b97cc7bf12545 100644
--- a/clang/test/Driver/arm-mfpu.c
+++ b/clang/test/Driver/arm-mfpu.c
@@ -407,7 +407,7 @@
 // CHECK-ARM8-ANDROID-FP-DEFAULT-DAG: "-target-feature" "+fp-armv8"
 // CHECK-ARM8-ANDROID-FP-DEFAULT-DAG: "-target-feature" "+aes"
 // CHECK-ARM8-ANDROID-FP-DEFAULT-DAG: "-target-feature" "+sha2"
-// CHECK-ARM8-ANDROID-FP-DEFAULT-NOT: "-target-feature" "+neon"
+// CHECK-ARM8-ANDROID-FP-DEFAULT-DAG: "-target-feature" "+neon"
 
 // RUN: %clang -target armv8-linux-android %s -### -c 2>&1 \
 // RUN:   | FileCheck --check-prefix=CHECK-ARM8-ANDROID-DEFAULT %s
@@ -416,7 +416,7 @@
 // CHECK-ARM8-ANDROID-DEFAULT-DAG: "-target-feature" "+fp-armv8"
 // CHECK-ARM8-ANDROID-DEFAULT-DAG: "-target-feature" "+aes"
 // CHECK-ARM8-ANDROID-DEFAULT-DAG: "-target-feature" "+sha2"
-// CHECK-ARM8-ANDROID-DEFAULT-NOT: "-target-feature" "+neon"
+// CHECK-ARM8-ANDROID-DEFAULT-DAG: "-target-feature" "+neon"
 
 // RUN: %clang -target armv7-linux-androideabi21 %s -mfpu=vfp3-d16 -### -c 
2>&1 \
 // RUN:   | FileCheck --check-prefix=CHECK-ARM7-ANDROID-FP-D16 %s
diff --git a/clang/test/Preprocessor/arm-target-features.c 
b/clang/test/Preprocessor/arm-target-features.c
index 7b2a0ecdf9040..0f9063a27371e 100644
--- a/clang/test/Preprocessor/arm-target-features.c
+++ b/clang/test/Preprocessor/arm-target-features.c
@@ -1036,10 +1036,16 @@
 // CHECK-SIMD: #define __ARM_NEON_FP 0x6
 // CHECK-SIMD: #define __ARM_NEON__ 1
 
-// Check that on AArch32 appropriate targets, +nosimd correctly disables NEON 
instructions.
-// RUN:  %clang -target arm-none-eabi -march=armv8-a+nosimd -mfloat-abi=hard 
-x c -E -dM -o - %s | FileCheck -check-prefix=CHECK-NOSIMD %s
+// Check that on AArch32 appropriate targets, +nosimd correctly disables NEON 
instructions. All features that rely on NEON should also be disabled.
+// RUN:  %clang -target arm-none-eabi -march=armv9.6-a+nosimd -mfloat-abi=hard 
-x c -E -dM -o - %s | FileCheck -check-prefix=CHECK-NOSIMD %s
 // RUN:  %clang -target arm-none-eabi -mcpu=cortex-r52+nosimd -mfloat-abi=hard 
-x c -E -dM -o - %s | FileCheck -check-prefix=CHECK-NOSIMD %s
 // RUN:  %clang -target arm-none-eabi -mcpu=cortex-a57+nosimd -mfloat-abi=hard 
-x c -E -dM -o - %s | FileCheck -check-prefix=CHECK-NOSIMD %s
+// CHECK-NOSIMD-NOT: #define __ARM_FEATURE_BF16 1
+// CHECK-NOSIMD-NOT: #define __ARM_FEATURE_BF16_VECTOR_ARITHMETIC 1
+// CHECK-NOSIMD-NOT: #define __ARM_FEATURE_AES 1
+// CHECK-NOSIMD-NOT: #define __ARM_FEATURE_CRYPTO 1
+// CHECK-NOSIMD-NOT: #define __ARM_FEATURE_DOTPROD 1
+// CHECK-NOSIMD-NOT: #define __ARM_FEATURE_SHA2 1
 // CHECK-NOSIMD-NOT: #define __ARM_NEON 1
 // CHECK-NOSIMD-NOT: #define __ARM_NEON_FP 0x6
 // CHECK-NOSIMD-NOT: #define __ARM_NEON__ 1

>From 19f6d04b2cc7ac2ee10aa5226de82483e79b83ef Mon Sep 17 00:00:00 2001
From: Jack Styles <jack.sty...@arm.com>
Date: Mon, 28 Apr 2025 09:38:58 +0100
Subject: [PATCH 2/2] Formatting fixes

---
 clang/lib/Driver/ToolChains/Arch/ARM.cpp | 35 ++++++++++--------------
 1 file changed, 15 insertions(+), 20 deletions(-)

diff --git a/clang/lib/Driver/ToolChains/Arch/ARM.cpp 
b/clang/lib/Driver/ToolChains/Arch/ARM.cpp
index 61a98475de93f..a0db34a3ad093 100644
--- a/clang/lib/Driver/ToolChains/Arch/ARM.cpp
+++ b/clang/lib/Driver/ToolChains/Arch/ARM.cpp
@@ -787,16 +787,16 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
   // crypto feature.
   bool HasSimd = false;
   const auto ItSimd =
-  llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
-    return F.contains("neon");
-  });
+      llvm::find_if(llvm::reverse(Features),
+                    [](const StringRef F) { return F.contains("neon"); });
   const bool FoundSimd = ItSimd != Features.rend();
-  const bool FPUSupportsNeon =
-    (llvm::ARM::FPUNames[FPUKind].NeonSupport == 
llvm::ARM::NeonSupportLevel::Neon) ||
-    (llvm::ARM::FPUNames[FPUKind].NeonSupport == 
llvm::ARM::NeonSupportLevel::Crypto);
-  if(FoundSimd)
-  HasSimd = ItSimd->take_front() == "+";
-  if(!HasSimd && FPUSupportsNeon) {
+  const bool FPUSupportsNeon = (llvm::ARM::FPUNames[FPUKind].NeonSupport ==
+                                llvm::ARM::NeonSupportLevel::Neon) ||
+                               (llvm::ARM::FPUNames[FPUKind].NeonSupport ==
+                                llvm::ARM::NeonSupportLevel::Crypto);
+  if (FoundSimd)
+    HasSimd = ItSimd->take_front() == "+";
+  if (!HasSimd && FPUSupportsNeon) {
     Features.push_back("-sha2");
     Features.push_back("-aes");
     Features.push_back("-crypto");
@@ -831,17 +831,14 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
         return F.contains("crypto") || F.contains("aes");
       });
   const auto ItBF16 =
-      llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
-        return F.contains("bf16");
-      });
+      llvm::find_if(llvm::reverse(Features),
+                    [](const StringRef F) { return F.contains("bf16"); });
   const auto ItDotprod =
-      llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
-        return F.contains("dotprod");
-      });
+      llvm::find_if(llvm::reverse(Features),
+                    [](const StringRef F) { return F.contains("dotprod"); });
   const auto ItI8MM =
-      llvm::find_if(llvm::reverse(Features), [](const StringRef F) {
-        return F.contains("i8mm");
-      });
+      llvm::find_if(llvm::reverse(Features),
+                    [](const StringRef F) { return F.contains("i8mm"); });
   if (ItSHA2 != Features.rend())
     HasSHA2 = ItSHA2->take_front() == "+";
   if (ItAES != Features.rend())
@@ -870,8 +867,6 @@ llvm::ARM::FPUKind arm::getARMTargetFeatures(const Driver 
&D,
   if (HasAES || HasSHA2 || HasBF16 || HasDotprod || HasI8MM)
     Features.push_back("+neon");
 
-  
-
   if (HasSHA2 || HasAES) {
     StringRef ArchSuffix = arm::getLLVMArchSuffixForARM(
         arm::getARMTargetCPU(CPUName, ArchName, Triple), ArchName, Triple);

_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to