From patchwork Tue May 21 15:01:57 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "H.J. Lu" X-Patchwork-Id: 1102865 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=gcc-patches-return-501351-incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="ANm15gzz"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 457fBH0cRDz9s3Z for ; Wed, 22 May 2019 01:02:14 +1000 (AEST) DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:mime-version :content-transfer-encoding; q=dns; s=default; b=Wk3amD45542x6fVZ SYIbAubVEIfQb71Wq5ZNbONw6tY6mwO7NWflJcKOsQDi3rU3WqEBNaZOo8QclFYv scFAeuarXfuLH7GJUcMXfD4q+BspBpfrvZOpuy4pVX0t2tkaseqdBgPYk9PgUbzy csKRfzgVe+lCy+0E0+PTp2RGabE= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:mime-version :content-transfer-encoding; s=default; bh=ihbw6FtfssaTlOe6cvpUfA 9OgHw=; b=ANm15gzzCpNfAkR5QOPoDvM3DSvRfI75wCWPIV8U1L/URxmnROuej5 3Um1gxxFUdaYd1HGWZk1Pqa1JZG0OaJLXHAyxILdiXFlbRhXuHDFA9qps2ZL2vo4 43PjqocSCZSvRtqGk0nHfgxjkK2+BqC/1G3VueqP0eEkOuPhXGqsk= Received: (qmail 85060 invoked by alias); 21 May 2019 15:02:06 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 85050 invoked by uid 89); 21 May 2019 15:02:06 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-22.7 required=5.0 tests=AWL, BAYES_00, FREEMAIL_FROM, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, SPF_SOFTFAIL autolearn=ham version=3.3.1 spammy=entrance, i386.h, i386h, sk:can_thr X-HELO: mga18.intel.com Received: from mga18.intel.com (HELO mga18.intel.com) (134.134.136.126) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 21 May 2019 15:02:00 +0000 Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 May 2019 08:01:58 -0700 Received: from gnu-cfl-1.sc.intel.com ([172.25.70.237]) by fmsmga002.fm.intel.com with ESMTP; 21 May 2019 08:01:57 -0700 From: "H.J. Lu" To: gcc-patches@gcc.gnu.org Cc: Uros Bizjak Subject: [PATCH] x86: Don't allocate stack frame nor align stack if not needed Date: Tue, 21 May 2019 08:01:57 -0700 Message-Id: <20190521150157.2405-1-hjl.tools@gmail.com> MIME-Version: 1.0 X-IsSubscribed: yes get_frame_size () returns used stack slots during compilation, which may be optimized out later. This patch does the followings: 1. Add no_stack_frame to machine_function to indicate that the function doesn't need a stack frame. 2. Change ix86_find_max_used_stack_alignment to set no_stack_frame. 3. Always call ix86_find_max_used_stack_alignment to check if stack frame is needed. Tested on i686 and x86-64 with --with-arch=native --with-cpu=native Tested on AVX512 machine configured with --with-arch=native --with-cpu=native gcc/ PR target/88483 * config/i386/i386.c (ix86_get_frame_size): New function. (ix86_frame_pointer_required): Replace get_frame_size with ix86_get_frame_size. (ix86_compute_frame_layout): Likewise. (ix86_find_max_used_stack_alignment): Changed to void. Set no_stack_frame. (ix86_finalize_stack_frame_flags): Always call ix86_find_max_used_stack_alignment. Replace get_frame_size with ix86_get_frame_size. * config/i386/i386.h (machine_function): Add no_stack_frame. gcc/testsuite/ PR target/88483 * gcc.target/i386/stackalign/pr88483-1.c: New test. * gcc.target/i386/stackalign/pr88483-2.c: Likewise. --- gcc/config/i386/i386.c | 53 ++++++++++++------- gcc/config/i386/i386.h | 3 ++ .../gcc.target/i386/stackalign/pr88483-1.c | 18 +++++++ .../gcc.target/i386/stackalign/pr88483-2.c | 18 +++++++ 4 files changed, 74 insertions(+), 18 deletions(-) create mode 100644 gcc/testsuite/gcc.target/i386/stackalign/pr88483-1.c create mode 100644 gcc/testsuite/gcc.target/i386/stackalign/pr88483-2.c diff --git a/gcc/config/i386/i386.c b/gcc/config/i386/i386.c index 54607748b0b..d0b2a4f8b70 100644 --- a/gcc/config/i386/i386.c +++ b/gcc/config/i386/i386.c @@ -5012,6 +5012,19 @@ ix86_can_use_return_insn_p (void) && (frame.nregs + frame.nsseregs) == 0); } +/* Return stack frame size. get_frame_size () returns used stack slots + during compilation, which may be optimized out later. no_stack_frame + is set to true if stack frame isn't needed. */ + +static HOST_WIDE_INT +ix86_get_frame_size (void) +{ + if (cfun->machine->no_stack_frame) + return 0; + else + return get_frame_size (); +} + /* Value should be nonzero if functions must have frame pointers. Zero means the frame pointer need not be set up (and parms may be accessed via the stack pointer) in functions that seem suitable. */ @@ -5035,7 +5048,7 @@ ix86_frame_pointer_required (void) /* Win64 SEH, very large frames need a frame-pointer as maximum stack allocation is 4GB. */ - if (TARGET_64BIT_MS_ABI && get_frame_size () > SEH_MAX_FRAME_SIZE) + if (TARGET_64BIT_MS_ABI && ix86_get_frame_size () > SEH_MAX_FRAME_SIZE) return true; /* SSE saves require frame-pointer when stack is misaligned. */ @@ -5842,7 +5855,7 @@ ix86_compute_frame_layout (void) unsigned HOST_WIDE_INT stack_alignment_needed; HOST_WIDE_INT offset; unsigned HOST_WIDE_INT preferred_alignment; - HOST_WIDE_INT size = get_frame_size (); + HOST_WIDE_INT size = ix86_get_frame_size (); HOST_WIDE_INT to_allocate; /* m->call_ms2sysv is initially enabled in ix86_expand_call for all 64-bit @@ -7436,11 +7449,11 @@ output_probe_stack_range (rtx reg, rtx end) return ""; } -/* Return true if stack frame is required. Update STACK_ALIGNMENT - to the largest alignment, in bits, of stack slot used if stack - frame is required and CHECK_STACK_SLOT is true. */ +/* Set no_stack_frame to true if stack frame isn't required. Update + STACK_ALIGNMENT to the largest alignment, in bits, of stack slot + used if stack frame is required and CHECK_STACK_SLOT is true. */ -static bool +static void ix86_find_max_used_stack_alignment (unsigned int &stack_alignment, bool check_stack_slot) { @@ -7489,7 +7502,7 @@ ix86_find_max_used_stack_alignment (unsigned int &stack_alignment, } } - return require_stack_frame; + cfun->machine->no_stack_frame = !require_stack_frame; } /* Finalize stack_realign_needed and frame_pointer_needed flags, which @@ -7519,6 +7532,14 @@ ix86_finalize_stack_frame_flags (void) return; } + /* It is always safe to compute max_used_stack_alignment. We + compute it only if 128-bit aligned load/store may be generated + on misaligned stack slot which will lead to segfault. */ + bool check_stack_slot + = (stack_realign || crtl->max_used_stack_slot_alignment >= 128); + ix86_find_max_used_stack_alignment (stack_alignment, + check_stack_slot); + /* If the only reason for frame_pointer_needed is that we conservatively assumed stack realignment might be needed or -fno-omit-frame-pointer is used, but in the end nothing that needed the stack alignment had @@ -7538,12 +7559,11 @@ ix86_finalize_stack_frame_flags (void) && flag_exceptions && cfun->can_throw_non_call_exceptions) && !ix86_frame_pointer_required () - && get_frame_size () == 0 + && ix86_get_frame_size () == 0 && ix86_nsaved_sseregs () == 0 && ix86_varargs_gpr_size + ix86_varargs_fpr_size == 0) { - if (ix86_find_max_used_stack_alignment (stack_alignment, - stack_realign)) + if (!cfun->machine->no_stack_frame) { /* Stack frame is required. If stack alignment needed is less than incoming stack boundary, don't realign stack. */ @@ -7631,17 +7651,14 @@ ix86_finalize_stack_frame_flags (void) recompute_frame_layout_p = true; } } - else if (crtl->max_used_stack_slot_alignment >= 128) + else if (crtl->max_used_stack_slot_alignment >= 128 + && !cfun->machine->no_stack_frame) { /* We don't need to realign stack. max_used_stack_alignment is used to decide how stack frame should be aligned. This is - independent of any psABIs nor 32-bit vs 64-bit. It is always - safe to compute max_used_stack_alignment. We compute it only - if 128-bit aligned load/store may be generated on misaligned - stack slot which will lead to segfault. */ - if (ix86_find_max_used_stack_alignment (stack_alignment, true)) - cfun->machine->max_used_stack_alignment - = stack_alignment / BITS_PER_UNIT; + independent of any psABIs nor 32-bit vs 64-bit. */ + cfun->machine->max_used_stack_alignment + = stack_alignment / BITS_PER_UNIT;; } if (crtl->stack_realign_needed != stack_realign) diff --git a/gcc/config/i386/i386.h b/gcc/config/i386/i386.h index be1480fdcf8..6b4186d3dac 100644 --- a/gcc/config/i386/i386.h +++ b/gcc/config/i386/i386.h @@ -2754,6 +2754,9 @@ struct GTY(()) machine_function { /* If true, ENDBR is queued at function entrance. */ BOOL_BITFIELD endbr_queued_at_entrance : 1; + /* Nonzero if the function doesn't need a stack frame. */ + BOOL_BITFIELD no_stack_frame : 1; + /* The largest alignment, in bytes, of stack slot actually used. */ unsigned int max_used_stack_alignment; diff --git a/gcc/testsuite/gcc.target/i386/stackalign/pr88483-1.c b/gcc/testsuite/gcc.target/i386/stackalign/pr88483-1.c new file mode 100644 index 00000000000..c8bb0832fe2 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/stackalign/pr88483-1.c @@ -0,0 +1,18 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mavx2" } */ + +struct B +{ + char a[12]; + int b; +}; + +struct B +f2 (void) +{ + struct B x = {}; + return x; +} + +/* { dg-final { scan-assembler-not "(sub|add)(l|q)\[\\t \]*\\$\[0-9\]*,\[\\t \]*%\[re\]?sp" } } */ +/* { dg-final { scan-assembler-not "and\[lq\]?\[^\\n\]*-\[0-9\]+,\[^\\n\]*sp" } } */ diff --git a/gcc/testsuite/gcc.target/i386/stackalign/pr88483-2.c b/gcc/testsuite/gcc.target/i386/stackalign/pr88483-2.c new file mode 100644 index 00000000000..e94fa1d18fa --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/stackalign/pr88483-2.c @@ -0,0 +1,18 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mavx512f" } */ + +struct B +{ + char a[12]; + int b; +}; + +struct B +f2 (void) +{ + struct B x = {}; + return x; +} + +/* { dg-final { scan-assembler-not "(sub|add)(l|q)\[\\t \]*\\$\[0-9\]*,\[\\t \]*%\[re\]?sp" } } */ +/* { dg-final { scan-assembler-not "and\[lq\]?\[^\\n\]*-\[0-9\]+,\[^\\n\]*sp" } } */