Keil Logo

Summary of changes between Arm Compiler 6.8 and Arm Compiler 6.9

6.5 Summary of changes between Arm® Compiler 6.8 and Arm® Compiler 6.9

A summary of the changes between Arm® Compiler 6.8 and Arm Compiler 6.9.

General changes

The following are general changes in Arm Compiler 6.9:

  • Added support for the Armv8.4-A architecture. To target Armv8.4-A, use the following options:
    State armclang options armlink, and fromelf options
    AArch64 --target=aarch64-arm-none-eabi -march=armv8.4-a Do not use the --cpu=name option.
    AArch32 --target=arm-arm-none-eabi -march=armv8.4-a Do not use the --cpu=name option.

    Note:

    The legacy assembler, armasm, does not support the Armv8.4-A architecture.
  • Added support for the optional Cryptographic Extension in Armv8.4-A. To target Armv8.4-A with the Cryptographic Extension, use the following options:
    State armclang options armlink and fromelf options
    AArch64 --target=aarch64-arm-none-eabi -march=armv8.4-a+crypto Do not use the --cpu=name option.
    AArch32 --target=arm-arm-none-eabi -march=armv8.4-a -mfpu=crypto-neon-fp-armv8 Do not use the --cpu=name option.

    Note:

    The legacy assembler, armasm, does not support the Armv8.4-A architecture.

    For more information about selecting specific cryptographic algorithms, see -mcpu in the armclang Reference Guide.

  • A change in Arm Compiler 6.9 means that compiling with -mexecute-only always generates an empty .text section that is read-only.

    For more information about handling this section, see 6.9 Compiling with -mexecute-only generates an empty .text section.

Non-ConfidentialPDF file icon PDF version100068_0613_00_en
Copyright © 2014–2019 Arm Limited or its affiliates. All rights reserved. 
  Arm logo
Important information

This site uses cookies to store information on your computer. By continuing to use our site, you consent to our cookies.

Change Settings

Privacy Policy Update

Arm’s Privacy Policy has been updated. By continuing to use our site, you consent to Arm’s Privacy Policy. Please review our Privacy Policy to learn more about our collection, use and transfers
of your data.