From patchwork Wed Sep 20 13:50:12 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Wilco Dijkstra X-Patchwork-Id: 1837271 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=armh.onmicrosoft.com header.i=@armh.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-armh-onmicrosoft-com header.b=Ke2DdwIT; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.i=@armh.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-armh-onmicrosoft-com header.b=Ke2DdwIT; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4RrKgQ5frjz1yhR for ; Wed, 20 Sep 2023 23:50:58 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id A4B3838555B9 for ; Wed, 20 Sep 2023 13:50:56 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on2065.outbound.protection.outlook.com [40.107.105.65]) by sourceware.org (Postfix) with ESMTPS id 88346385842C for ; Wed, 20 Sep 2023 13:50:29 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 88346385842C Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nqbrT0/S8+o+sc2OnRG3v/WZ10VgspgupFYE08100RY=; b=Ke2DdwITMfnSwZN75VeNoqmpMXZxPTMeraOF6HSjxR0e0XPiXIeui58kF5itqbvJs0V78Z8Yu8Oii0sirIYNjm412U8RH43ANFKuhCWy4XuLHuavvM/0ikp9tqacUmC1pJRJ/wxhvMGh0oybbov4d7PxaSp6URZPtmkE99hFxUs= Received: from DU2P251CA0015.EURP251.PROD.OUTLOOK.COM (2603:10a6:10:230::19) by DB4PR08MB7933.eurprd08.prod.outlook.com (2603:10a6:10:37b::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.26; Wed, 20 Sep 2023 13:50:25 +0000 Received: from DBAEUR03FT031.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:230:cafe::12) by DU2P251CA0015.outlook.office365.com (2603:10a6:10:230::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.30 via Frontend Transport; Wed, 20 Sep 2023 13:50:25 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DBAEUR03FT031.mail.protection.outlook.com (100.127.142.173) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6813.16 via Frontend Transport; Wed, 20 Sep 2023 13:50:25 +0000 Received: ("Tessian outbound 1eb4e931b055:v175"); Wed, 20 Sep 2023 13:50:25 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 5366fc24313c2c7c X-CR-MTA-TID: 64aa7808 Received: from aa4572b83fa7.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 3B9E8578-62EE-4AE4-99DA-B88105C98341.1; Wed, 20 Sep 2023 13:50:15 +0000 Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id aa4572b83fa7.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 20 Sep 2023 13:50:15 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kP/k92jyFqnfxxYoj+QmjkNnVlw+WcP7SSklwyIwichvDGGGg3eY0Oii3uXlVn28mlLyx/nujYXZ3mVk/FzljZ5BnWqHDJk7Vq/2dz/r+vGC8Pci5iIdJU5PRQBATa/v8zxVaPkxbbpT9Zhd6tFIZDjoAdFRt4f3iPwN9U+F422IH/QC8Tn3TjgOCSyl8iYDwwcYsHikjvyOGcbwWCukwW9dZSXde//rmZ4MXBmQeQBIO4eiw/dHeErUSVtUAXc3cSuQC2vl596RTgunwU6rW5YJkDBppdvvoLttx0tXLagO2zGFN+yLID/ihwvJmUQa9gftsBCs85+7WzqjaClMuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nqbrT0/S8+o+sc2OnRG3v/WZ10VgspgupFYE08100RY=; b=bK2C1XX5nuImMtz17/dSqkxRzpKyBrRzLI4GUvPzWQmgjLDRcbIJYNYZ9VfRqBzOxJZa3P0ZnL3tGqduPdX8I3Tnn74J0Ao0Ha+FLJfGDc2+Ml6930UhVfGNNV8+wV/LgYjt+n2jml/2VWM+A80Nyro2Gqoxz16dHTIGSq2o4qNxKm9Ju3+kDsV8Bx/T4OLKUM5rS9I75phUy6HpZ6Yj7/XAITYGRyaOuKdDh9INnCRaSaU1Pp2EZxyoM+fykvsIkzdAygQUMPQyFN5IKsimdp9KuaylppBLuEsdKHFTNBs1Cd5nMxPtOAvZ1Xa+gnZRo/E4XJ4JFndcFffBE5HJdw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nqbrT0/S8+o+sc2OnRG3v/WZ10VgspgupFYE08100RY=; b=Ke2DdwITMfnSwZN75VeNoqmpMXZxPTMeraOF6HSjxR0e0XPiXIeui58kF5itqbvJs0V78Z8Yu8Oii0sirIYNjm412U8RH43ANFKuhCWy4XuLHuavvM/0ikp9tqacUmC1pJRJ/wxhvMGh0oybbov4d7PxaSp6URZPtmkE99hFxUs= Received: from PAWPR08MB8982.eurprd08.prod.outlook.com (2603:10a6:102:33f::20) by AS8PR08MB6407.eurprd08.prod.outlook.com (2603:10a6:20b:33e::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6813.19; Wed, 20 Sep 2023 13:50:12 +0000 Received: from PAWPR08MB8982.eurprd08.prod.outlook.com ([fe80::ff3d:6e95:9971:a7e]) by PAWPR08MB8982.eurprd08.prod.outlook.com ([fe80::ff3d:6e95:9971:a7e%5]) with mapi id 15.20.6792.026; Wed, 20 Sep 2023 13:50:12 +0000 From: Wilco Dijkstra To: GCC Patches CC: Richard Sandiford Subject: [PATCH] AArch64: Fix strict-align cpymem/setmem [PR103100] Thread-Topic: [PATCH] AArch64: Fix strict-align cpymem/setmem [PR103100] Thread-Index: AQHZ68kyoV3vN4aPuEmJ6a58b1dGdg== Date: Wed, 20 Sep 2023 13:50:12 +0000 Message-ID: Accept-Language: en-GB, en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; x-ms-traffictypediagnostic: PAWPR08MB8982:EE_|AS8PR08MB6407:EE_|DBAEUR03FT031:EE_|DB4PR08MB7933:EE_ X-MS-Office365-Filtering-Correlation-Id: e1f715f4-f424-41ef-b0db-08dbb9e08ad3 x-checkrecipientrouted: true nodisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAWPR08MB8982.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(366004)(396003)(136003)(376002)(346002)(1800799009)(186009)(451199024)(9686003)(7696005)(6506007)(478600001)(83380400001)(8936002)(8676002)(52536014)(66946007)(66446008)(66556008)(64756008)(76116006)(66476007)(71200400001)(6916009)(91956017)(316002)(5660300002)(55016003)(38070700005)(33656002)(86362001)(4326008)(2906002)(26005)(38100700002)(41300700001)(122000001); DIR:OUT; SFP:1101; MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6407 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DBAEUR03FT031.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 13e4c239-115f-443c-7c3a-08dbb9e08320 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: taltC6Dc490VrphkaGoRj5xQ3APeQeJnFytvVslRLkbxpR6AYeqgpxqlWdSeDJOkPurAJdYuOu+WJ6T/CEHCwcjX6wW/M46/eho8h3qRQif4N1189asvtucwIpBZAOYKx5dZ86f0+BTx4QKnrKN0ZiSl3S7FGcNUTBfLIhwHn8sfizJu2jVrPBfhfZW8OTtvU4eLKXvB68RplRDQdqB5C0t1oDEr+TRYytWDuiYRJMkT9JEe0uSpftVn58Iwm4hHRq20lr+MU7bDtSUFBQktnMcN4yB12yDBknhlSTLoyk6a/9tfvGuf/Hlm+wLfAHa6gqf8VKIeMXBS4prPEhsncE15Cq5Q8zQlob8Sds68xxTkIgy60T9F5dEiCCyuXNnXAGPHJu8XpHYrXwRVXXuwRuWx/unl991lh8cJ/VaiJivDCiRITWmw1oyu4OX3tx6R7fwirLfTYiWQ6k0b9u9PpDSWtq0GcmO5SsPM3D8ATrKRY9xKZlTw7Rk4TOPiEWDnXeillBHOgEaqtNw1SQyBNOzyHZm87T6Ldg6rjg7qq0551Qlb3dGebPC0HCrWQWQLmOVxal+pUrly8XnssLPB1ibckbXybj9UvwjiVmchVcafc3qeB063OPJu9S6gTK5hUAmsTBVDZWOANjfkZfKJppZXjWwjJu6CFPQ4WK2S8BZQVMKChP7f+IanP0Ttyn1bIyfP/3Hs1fXulRrzHNcyQKS47YQPCXCkTW1qNcRXmgxK/3RYSFEo9N1hkrDKchyu X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(4636009)(396003)(376002)(39860400002)(346002)(136003)(451199024)(186009)(1800799009)(82310400011)(46966006)(40470700004)(36840700001)(55016003)(40480700001)(8676002)(40460700003)(70586007)(336012)(5660300002)(86362001)(33656002)(2906002)(6916009)(82740400003)(356005)(47076005)(8936002)(316002)(41300700001)(36860700001)(70206006)(478600001)(26005)(7696005)(83380400001)(9686003)(6506007)(52536014)(4326008)(81166007); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Sep 2023 13:50:25.5999 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e1f715f4-f424-41ef-b0db-08dbb9e08ad3 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DBAEUR03FT031.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR08MB7933 X-Spam-Status: No, score=-10.8 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, FORGED_SPF_HELO, GIT_PATCH_0, KAM_DMARC_NONE, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org The cpymemdi/setmemdi implementation doesn't fully support strict alignment. Block the expansion if the alignment is less than 16 with STRICT_ALIGNMENT. Clean up the condition when to use MOPS. Passes regress/bootstrap, OK for commit? gcc/ChangeLog/ PR target/103100 * config/aarch64/aarch64.md (cpymemdi): Remove pattern condition. (setmemdi): Likewise. * config/aarch64/aarch64.cc (aarch64_expand_cpymem): Support strict-align. Cleanup condition for using MOPS. (aarch64_expand_setmem): Likewise. diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc index dd6874d13a75f20d10a244578afc355b25c73da2..8f3bfb91c0f4ec43f37fe9289a66092a29a47e4d 100644 --- a/gcc/config/aarch64/aarch64.cc +++ b/gcc/config/aarch64/aarch64.cc @@ -25261,27 +25261,23 @@ aarch64_expand_cpymem (rtx *operands) int mode_bits; rtx dst = operands[0]; rtx src = operands[1]; + unsigned align = INTVAL (operands[3]); rtx base; machine_mode cur_mode = BLKmode; + bool size_p = optimize_function_for_size_p (cfun); - /* Variable-sized memcpy can go through the MOPS expansion if available. */ - if (!CONST_INT_P (operands[2])) + /* Variable-sized or strict-align copies may use the MOPS expansion. */ + if (!CONST_INT_P (operands[2]) || (STRICT_ALIGNMENT && align < 16)) return aarch64_expand_cpymem_mops (operands); unsigned HOST_WIDE_INT size = INTVAL (operands[2]); - /* Try to inline up to 256 bytes or use the MOPS threshold if available. */ - unsigned HOST_WIDE_INT max_copy_size - = TARGET_MOPS ? aarch64_mops_memcpy_size_threshold : 256; - - bool size_p = optimize_function_for_size_p (cfun); + /* Try to inline up to 256 bytes. */ + unsigned max_copy_size = 256; + unsigned max_mops_size = aarch64_mops_memcpy_size_threshold; - /* Large constant-sized cpymem should go through MOPS when possible. - It should be a win even for size optimization in the general case. - For speed optimization the choice between MOPS and the SIMD sequence - depends on the size of the copy, rather than number of instructions, - alignment etc. */ - if (size > max_copy_size) + /* Large copies use MOPS when available or a library call. */ + if (size > max_copy_size || (TARGET_MOPS && size > max_mops_size)) return aarch64_expand_cpymem_mops (operands); int copy_bits = 256; @@ -25445,12 +25441,13 @@ aarch64_expand_setmem (rtx *operands) unsigned HOST_WIDE_INT len; rtx dst = operands[0]; rtx val = operands[2], src; + unsigned align = INTVAL (operands[3]); rtx base; machine_mode cur_mode = BLKmode, next_mode; - /* If we don't have SIMD registers or the size is variable use the MOPS - inlined sequence if possible. */ - if (!CONST_INT_P (operands[1]) || !TARGET_SIMD) + /* Variable-sized or strict-align memset may use the MOPS expansion. */ + if (!CONST_INT_P (operands[1]) || !TARGET_SIMD + || (STRICT_ALIGNMENT && align < 16)) return aarch64_expand_setmem_mops (operands); bool size_p = optimize_function_for_size_p (cfun); @@ -25458,10 +25455,13 @@ aarch64_expand_setmem (rtx *operands) /* Default the maximum to 256-bytes when considering only libcall vs SIMD broadcast sequence. */ unsigned max_set_size = 256; + unsigned max_mops_size = aarch64_mops_memset_size_threshold; len = INTVAL (operands[1]); - if (len > max_set_size && !TARGET_MOPS) - return false; + + /* Large memset uses MOPS when available or a library call. */ + if (len > max_set_size || (TARGET_MOPS && len > max_mops_size)) + return aarch64_expand_setmem_mops (operands); int cst_val = !!(CONST_INT_P (val) && (INTVAL (val) != 0)); /* The MOPS sequence takes: @@ -25474,12 +25474,6 @@ aarch64_expand_setmem (rtx *operands) the arguments + 1 for the call. */ unsigned libcall_cost = 4; - /* Upper bound check. For large constant-sized setmem use the MOPS sequence - when available. */ - if (TARGET_MOPS - && len >= (unsigned HOST_WIDE_INT) aarch64_mops_memset_size_threshold) - return aarch64_expand_setmem_mops (operands); - /* Attempt a sequence with a vector broadcast followed by stores. Count the number of operations involved to see if it's worth it against the alternatives. A simple counter simd_ops on the @@ -25521,10 +25515,8 @@ aarch64_expand_setmem (rtx *operands) simd_ops++; n -= mode_bits; - /* Do certain trailing copies as overlapping if it's going to be - cheaper. i.e. less instructions to do so. For instance doing a 15 - byte copy it's more efficient to do two overlapping 8 byte copies than - 8 + 4 + 2 + 1. Only do this when -mstrict-align is not supplied. */ + /* Emit trailing writes using overlapping unaligned accesses + (when !STRICT_ALIGNMENT) - this is smaller and faster. */ if (n > 0 && n < copy_limit / 2 && !STRICT_ALIGNMENT) { next_mode = smallest_mode_for_size (n, MODE_INT); diff --git a/gcc/config/aarch64/aarch64.md b/gcc/config/aarch64/aarch64.md index 6d0f072a9dd6d094e8764a513222a9129d8296fa..96508a2580876d1fdbdfa6c67d1a3d02608c1d24 100644 --- a/gcc/config/aarch64/aarch64.md +++ b/gcc/config/aarch64/aarch64.md @@ -1627,7 +1627,7 @@ (define_expand "cpymemdi" (match_operand:BLK 1 "memory_operand") (match_operand:DI 2 "general_operand") (match_operand:DI 3 "immediate_operand")] - "!STRICT_ALIGNMENT || TARGET_MOPS" + "" { if (aarch64_expand_cpymem (operands)) DONE; @@ -1724,7 +1724,7 @@ (define_expand "setmemdi" (match_operand:QI 2 "nonmemory_operand")) ;; Value (use (match_operand:DI 1 "general_operand")) ;; Length (match_operand 3 "immediate_operand")] ;; Align - "TARGET_SIMD || TARGET_MOPS" + "" { if (aarch64_expand_setmem (operands)) DONE;