From patchwork Fri Nov 16 03:57:02 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andi Kleen X-Patchwork-Id: 998729 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=gcc-patches-return-490216-incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=firstfloor.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="yoq+0JXg"; dkim=pass (1024-bit key; unprotected) header.d=firstfloor.org header.i=@firstfloor.org header.b="VSWAKAhu"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 42x4FN46kLz9s0t for ; Fri, 16 Nov 2018 14:57:44 +1100 (AEDT) DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; q=dns; s=default; b=gpU qqOInrgHy1wgZD4eZw4z9H4iN9Z59GciyIdacgO01cLb5GbJtYdKMh3uW2zbD+x5 XTfqKcAk5uH0HtR1ZDny6KE3YMoR88PhZZM36XrQ6zJ6rUoka3Ta5Xz4vNXoHDG/ ln1vaVuSZSkwOW1T1B8V36O6Wda0eN1AJQcSdbBk= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; s=default; bh=zOnolpg+u JmmobgbY6D5JNDiVlg=; b=yoq+0JXgEqcUNcwOy7cPiIcIIxZWgfIH/sMaBoWkc ajEFKZcHphZsKt9O+REqJwEJ/FeQ9FGwLQyEZzsj07Hcw1spT31n52/NVj7/XoI9 46nSlwsDZOk0urrgclYTmv+eNMGUwMjkj5aj04rXMxKhghR/+8UshhjGqWPhM7ig pI= Received: (qmail 66265 invoked by alias); 16 Nov 2018 03:57:25 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 66233 invoked by uid 89); 16 Nov 2018 03:57:24 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-26.9 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS, SPF_PASS autolearn=ham version=3.3.2 spammy=HContent-Transfer-Encoding:8bit X-HELO: one.firstfloor.org Received: from one.firstfloor.org (HELO one.firstfloor.org) (193.170.194.197) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 16 Nov 2018 03:57:23 +0000 Received: from firstfloor.org (c-71-238-43-142.hsd1.or.comcast.net [71.238.43.142]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by one.firstfloor.org (Postfix) with ESMTPSA id E892F86E44; Fri, 16 Nov 2018 04:57:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=firstfloor.org; s=mail; t=1542340639; bh=58lzxzjgI/8N6n76I21TR/x9Zgwehvo9eX/eZCZDbAA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VSWAKAhu+5Py/uWOdhGk1hvaHH1NeO+DA6wJ8DMCVeDmDevwauWAS/OuZ8cgNBhBP 9tziAgVHzcn2H09MNGsa3EW0wcou6r73jU9yf1KZ/xQC8TtcKM485jvsjmFzROM+eW biQZIG9LIHXe8H/EN8XNi1ToOLesLPr0Pa55oIss= Received: by firstfloor.org (Postfix, from userid 1000) id 962A5A2DD6; Thu, 15 Nov 2018 19:57:14 -0800 (PST) From: Andi Kleen To: gcc-patches@gcc.gnu.org Cc: richard.guenther@gmail.com, ubizjak@gmail.com, msebor@gmail.com, Andi Kleen Subject: [PATCH v2 1/3] Allow memory operands for PTWRITE Date: Thu, 15 Nov 2018 19:57:02 -0800 Message-Id: <20181116035704.14820-2-andi@firstfloor.org> In-Reply-To: <20181116035704.14820-1-andi@firstfloor.org> References: <20181116035704.14820-1-andi@firstfloor.org> MIME-Version: 1.0 From: Andi Kleen The earlier PTWRITE builtin definition was unnecessarily restrictive, only allowing register input to PTWRITE. The instruction actually supports memory operands too, so allow that too. gcc/: 2018-11-15 Andi Kleen * config/i386/i386.md: Allow memory operands to ptwrite. --- gcc/config/i386/i386.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/gcc/config/i386/i386.md b/gcc/config/i386/i386.md index 44db8ac954c..9c359c0ca04 100644 --- a/gcc/config/i386/i386.md +++ b/gcc/config/i386/i386.md @@ -19501,7 +19501,7 @@ (set_attr "prefix_extra" "2")]) (define_insn "ptwrite" - [(unspec_volatile [(match_operand:SWI48 0 "register_operand" "r")] + [(unspec_volatile [(match_operand:SWI48 0 "nonimmediate_operand" "rm")] UNSPECV_PTWRITE)] "TARGET_PTWRITE" "ptwrite\t%0" From patchwork Fri Nov 16 03:57:03 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andi Kleen X-Patchwork-Id: 998731 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=gcc-patches-return-490218-incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=firstfloor.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="n6Fci57V"; dkim=pass (1024-bit key; unprotected) header.d=firstfloor.org header.i=@firstfloor.org header.b="HnFWFaYs"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 42x4Fx1b8Dz9s0t for ; Fri, 16 Nov 2018 14:58:13 +1100 (AEDT) DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; q=dns; s=default; b=uyr 9N+tGfhCRtag0WRw08MesXY1c9LWA54W+koOavD/xAi+OEK56w8fqnpATaR1nJNv LEgtCMLTBNjHU777BALlt87LJzYq3ZkA2tg9RVhPpzUSqzENWk2sc06HNpmN+WIa DU5Uc+/LtMW8HHWGCX2KocKrx5r6AhC7fKVnAw0w= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; s=default; bh=nTC4Prcno DRoOAoMfyN992HD5uo=; b=n6Fci57VNPzcDkuS/Su97ScE19A1+5pPP8PwS49Q7 r3DqUNBS9uJZdImXMQTh6BJ+tm2RnyTWYz7P/Vo+80/69XRzcLnMxHNPsh01Mcj4 /IJj7cQAcstDhVU5M3rOgxIp7GC9qmXqIhjmM8Ol74pr4PWbU9Rrt1bqFutagole +8= Received: (qmail 66942 invoked by alias); 16 Nov 2018 03:57:30 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 66822 invoked by uid 89); 16 Nov 2018 03:57:29 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-26.6 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, KAM_SHORT, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS, SPF_PASS autolearn=ham version=3.3.2 spammy=silver, CODE, lake, Silver X-HELO: one.firstfloor.org Received: from one.firstfloor.org (HELO one.firstfloor.org) (193.170.194.197) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 16 Nov 2018 03:57:23 +0000 Received: from firstfloor.org (c-71-238-43-142.hsd1.or.comcast.net [71.238.43.142]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by one.firstfloor.org (Postfix) with ESMTPSA id DEBD68685D; Fri, 16 Nov 2018 04:57:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=firstfloor.org; s=mail; t=1542340639; bh=W7tjh4aVBBu6BzMQuoq6HY6I4KlOUWM4mReZZt11Q1U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HnFWFaYsXkRfWM3livuyHTorKHtJRvp/wNFrvYjHgMjpdYYYRHfvsUeag2NEqax7G kxpvUITAyy47h3c3yUOM2IiKjj102GN+C78ZJVBNw3iZn/wYKIuIo4kiBdq3U4sA82 iCLDNTkxEPsfIwL8Z3m3WoHv2pV27P3tTMHn6XVA= Received: by firstfloor.org (Postfix, from userid 1000) id 9CD72A6784; Thu, 15 Nov 2018 19:57:14 -0800 (PST) From: Andi Kleen To: gcc-patches@gcc.gnu.org Cc: richard.guenther@gmail.com, ubizjak@gmail.com, msebor@gmail.com, Andi Kleen Subject: [PATCH v2 2/3] Add a pass to automatically add ptwrite instrumentation Date: Thu, 15 Nov 2018 19:57:03 -0800 Message-Id: <20181116035704.14820-3-andi@firstfloor.org> In-Reply-To: <20181116035704.14820-2-andi@firstfloor.org> References: <20181116035704.14820-1-andi@firstfloor.org> <20181116035704.14820-2-andi@firstfloor.org> MIME-Version: 1.0 From: Andi Kleen Add a new pass to automatically instrument changes to variables with the new PTWRITE instruction on x86. PTWRITE writes a 4 or 8 byte field into an Processor Trace log, which allows low over head logging of information. Essentially it's a hardware accelerated printf. This allows to reconstruct how values later from the log, which can be useful for debugging or other analysis of the program behavior. With the compiler support this can be done with without having to manually add instrumentation to the code. Using dwarf information this can be later mapped back to the variables. The decoder decodes the PTWRITE instructions using IP information in the log, and then looks up the argument in the debug information. Then this can be used to reconstruct the original variable name to display a value history for the variable. There are new options to enable instrumentation for different types, and also a new attribute to control analysis fine grained per function or variable level. The attributes can be set on both the variable and the type level, and also on structure fields. This allows to enable tracing only for specific code in large programs in a flexible matter. The pass is generic, but only the x86 backend enables the necessary hooks. When the backend enables the necessary hooks (with -mptwrite) there is an additional pass that looks through the code for attribute vartrace enabled functions or variables. The -fvartrace=locals option is experimental: it works, but it generates redundant ptwrites because the pass doesn't use the SSA information to minimize instrumentation. This could be optimized later. Currently the code can be tested with SDE, or on a Intel Gemini Lake system with a new enough Linux kernel (v4.10+) that supports PTWRITE for PT. Gemini Lake is used in low end laptops ("Intel Pentium Silver J5...... / Celeron N4... / Celeron J4...") Linux perf can be used to record the values perf record -e intel_pt/ptw=1,branch=0/ program perf script --itrace=crw -F +synth ... I have an experimential version of perf that can also use dwarf information to symbolize many[1] values back to their variable names. So far it is not in standard perf, but available at https://git.kernel.org/pub/scm/linux/kernel/git/ak/linux-misc.git/log/?h=perf/var-resolve-4 It is currently not able to decode all variable locations to names, but a large subset. Longer term hopefully gdb will support this information too. The CPU can potentially generate very data high bandwidths when code doing a lot of computation is heavily instrumented. This can cause some data loss in both the CPU and also in perf logging the data when the disk cannot keep up. Running some larger workloads most workloads do not cause CPU level overflows, but I've seen it with -fvartrace with crafty, and with more workloads with -fvartrace-locals. Recommendation is to not fully instrument programs, but only areas of interest either at the file level or using the attributes. The other thing is that perf and the disk often cannot keep up with the data bandwidth for longer computations. In this case it's possible to use perf snapshot mode (add --snapshot to the command line above). The data will be only logged to a memory ring buffer then, and only dump the buffers on events of interest by sending SIGUSR2 to the perf binrary. In the future this will be hopefully better supported with core files and gdb. Passes bootstrap and test suite on x86_64-linux, also bootstrapped and tested gcc itself with full -fvartrace and -fvartrace=locals instrumentation. gcc/: 2018-11-15 Andi Kleen * Makefile.in: Add tree-vartrace.o. * common.opt: Add -fvartrace * opts.c (parse_vartrace_options): Add. (common_handle_option): Call parse_vartrace_options. * config/i386/i386.c (ix86_vartrace_func): Add. (TARGET_VARTRACE_FUNC): Add. * doc/extend.texi: Document vartrace/no_vartrace attributes. * doc/invoke.texi: Document -fvartrace. * doc/tm.texi (TARGET_VARTRACE_FUNC): Add. * passes.def: Add vartrace pass. * target.def (vartrace_func): Add. * tree-pass.h (make_pass_vartrace): Add. * tree-vartrace.c: New file to implement vartrace pass. gcc/c-family/: 2018-11-15 Andi Kleen * c-attribs.c (handle_vartrace_attribute, handle_no_vartrace_attribute): New functions. (attr_vartrace_exclusions): Add. config/: 2018-11-03 Andi Kleen * bootstrap-vartrace.mk: New. * bootstrap-vartrace-locals.mk: New. --- config/bootstrap-vartrace-locals.mk | 3 + config/bootstrap-vartrace.mk | 3 + gcc/Makefile.in | 1 + gcc/c-family/c-attribs.c | 77 +++++ gcc/common.opt | 8 + gcc/config/i386/i386.c | 32 ++ gcc/doc/extend.texi | 32 ++ gcc/doc/invoke.texi | 27 ++ gcc/doc/tm.texi | 6 + gcc/doc/tm.texi.in | 2 + gcc/flag-types.h | 9 + gcc/opts.c | 63 ++++ gcc/passes.def | 1 + gcc/target.def | 9 + gcc/tree-pass.h | 1 + gcc/tree-vartrace.c | 491 ++++++++++++++++++++++++++++ 16 files changed, 765 insertions(+) create mode 100644 config/bootstrap-vartrace-locals.mk create mode 100644 config/bootstrap-vartrace.mk create mode 100644 gcc/tree-vartrace.c diff --git a/config/bootstrap-vartrace-locals.mk b/config/bootstrap-vartrace-locals.mk new file mode 100644 index 00000000000..dd16640df74 --- /dev/null +++ b/config/bootstrap-vartrace-locals.mk @@ -0,0 +1,3 @@ +STAGE2_CFLAGS += -mptwrite -fvartrace=all +STAGE3_CFLAGS += -mptwrite -fvartrace=all +STAGE4_CFLAGS += -mptwrite -fvartrace=all diff --git a/config/bootstrap-vartrace.mk b/config/bootstrap-vartrace.mk new file mode 100644 index 00000000000..e29824d799b --- /dev/null +++ b/config/bootstrap-vartrace.mk @@ -0,0 +1,3 @@ +STAGE2_CFLAGS += -mptwrite -fvartrace +STAGE3_CFLAGS += -mptwrite -fvartrace +STAGE4_CFLAGS += -mptwrite -fvartrace diff --git a/gcc/Makefile.in b/gcc/Makefile.in index ec793175c3b..64a99a1ec8a 100644 --- a/gcc/Makefile.in +++ b/gcc/Makefile.in @@ -1594,6 +1594,7 @@ OBJS = \ tree-vectorizer.o \ tree-vector-builder.o \ tree-vrp.o \ + tree-vartrace.o \ tree.o \ typed-splay-tree.o \ unique-ptr-tests.o \ diff --git a/gcc/c-family/c-attribs.c b/gcc/c-family/c-attribs.c index 1657df7f9df..d50e78de830 100644 --- a/gcc/c-family/c-attribs.c +++ b/gcc/c-family/c-attribs.c @@ -104,6 +104,10 @@ static tree handle_tls_model_attribute (tree *, tree, tree, int, bool *); static tree handle_no_instrument_function_attribute (tree *, tree, tree, int, bool *); +static tree handle_vartrace_attribute (tree *, tree, + tree, int, bool *); +static tree handle_no_vartrace_attribute (tree *, tree, + tree, int, bool *); static tree handle_no_profile_instrument_function_attribute (tree *, tree, tree, int, bool *); static tree handle_malloc_attribute (tree *, tree, tree, int, bool *); @@ -235,6 +239,13 @@ static const struct attribute_spec::exclusions attr_const_pure_exclusions[] = ATTR_EXCL (NULL, false, false, false) }; +static const struct attribute_spec::exclusions attr_vartrace_exclusions[] = +{ + ATTR_EXCL ("vartrace", true, true, true), + ATTR_EXCL ("no_vartrace", true, true, true), + ATTR_EXCL (NULL, false, false, false) +}; + /* Table of machine-independent attributes common to all C-like languages. Current list of processed common attributes: nonnull. */ @@ -326,6 +337,12 @@ const struct attribute_spec c_common_attribute_table[] = { "no_instrument_function", 0, 0, true, false, false, false, handle_no_instrument_function_attribute, NULL }, + { "vartrace", 0, 0, false, false, false, false, + handle_vartrace_attribute, + attr_vartrace_exclusions }, + { "no_vartrace", 0, 0, false, false, false, false, + handle_no_vartrace_attribute, + attr_vartrace_exclusions }, { "no_profile_instrument_function", 0, 0, true, false, false, false, handle_no_profile_instrument_function_attribute, NULL }, @@ -770,6 +787,66 @@ handle_no_sanitize_undefined_attribute (tree *node, tree name, tree, int, return NULL_TREE; } +/* Handle "vartrace" attribute; arguments as in struct + attribute_spec.handler. */ + +static tree +handle_vartrace_attribute (tree *node, tree name, tree, int flags, + bool *no_add_attrs) +{ + if (!VAR_OR_FUNCTION_DECL_P (*node) && !TYPE_P (*node) && + TREE_CODE (*node) != FIELD_DECL) + { + warning (OPT_Wattributes, "%qE attribute ignored for object", name); + *no_add_attrs = true; + return NULL_TREE; + } + + if (!targetm.vartrace_func) + { + warning (OPT_Wattributes, "%qE attribute not supported for target", name); + *no_add_attrs = true; + return NULL_TREE; + } + + if (TREE_TYPE (*node) + && TREE_CODE (*node) != FUNCTION_DECL + && targetm.vartrace_func (TREE_TYPE (*node), true) == NULL_TREE) + { + warning (OPT_Wattributes, "%qE attribute not supported for type", name); + *no_add_attrs = true; + return NULL_TREE; + } + + if (TYPE_P (*node) && !(flags & (int) ATTR_FLAG_TYPE_IN_PLACE)) + *node = build_variant_type_copy (*node); + + /* We look it up later with lookup_attribute. */ + return NULL_TREE; +} + +/* Handle "no_vartrace" attribute; arguments as in struct + attribute_spec.handler. */ + +static tree +handle_no_vartrace_attribute (tree *node, tree name, tree, int flags, + bool *no_add_attrs) +{ + if (!VAR_OR_FUNCTION_DECL_P (*node) && !TYPE_P (*node) + && TREE_CODE (*node) != FIELD_DECL) + { + warning (OPT_Wattributes, "%qE attribute ignored", name); + *no_add_attrs = true; + return NULL_TREE; + } + + if (TYPE_P (*node) && !(flags & (int) ATTR_FLAG_TYPE_IN_PLACE)) + *node = build_variant_type_copy (*node); + + /* We look it up later with lookup_attribute. */ + return NULL_TREE; +} + /* Handle an "asan odr indicator" attribute; arguments as in struct attribute_spec.handler. */ diff --git a/gcc/common.opt b/gcc/common.opt index 72a713593c3..f27a57b1177 100644 --- a/gcc/common.opt +++ b/gcc/common.opt @@ -221,6 +221,10 @@ unsigned int flag_sanitize_recover = (SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NO Variable unsigned int flag_sanitize_coverage +; What to instrument with vartrace +Variable +unsigned int flag_vartrace + ; Flag whether a prefix has been added to dump_base_name Variable bool dump_base_name_prefixed = false @@ -2856,6 +2860,10 @@ ftree-scev-cprop Common Report Var(flag_tree_scev_cprop) Init(1) Optimization Enable copy propagation of scalar-evolution information. +fvartrace +Common JoinedOrMissing Report Driver +-fvartrace=default|all|locals|returns|args|reads|writes|off Enable variable tracing instrumentation. + ; -fverbose-asm causes extra commentary information to be produced in ; the generated assembly code (to make it more readable). This option ; is generally only of use to those who actually need to read the diff --git a/gcc/config/i386/i386.c b/gcc/config/i386/i386.c index c18c60a1d19..6d130bf0804 100644 --- a/gcc/config/i386/i386.c +++ b/gcc/config/i386/i386.c @@ -31900,6 +31900,35 @@ ix86_mangle_function_version_assembler_name (tree decl, tree id) return ret; } +/* Hook to determine that TYPE can be traced. Ignore target flags + if FORCE is true. Returns the tracing builtin if tracing is possible, + or otherwise NULL. */ + +static tree +ix86_vartrace_func (tree type, bool force) +{ + if (!(ix86_isa_flags2 & OPTION_MASK_ISA_PTWRITE)) + { + /* With force, as in checking for the attribute, ignore + the current target settings. Otherwise it's not + possible to declare vartrace variables outside + an __attribute__((target("ptwrite"))) function + if -mptwrite is not specified. */ + if (!force) + return NULL; + /* Initialize the builtins if missing, so that we have + something to return. */ + if (!ix86_builtins[(int)IX86_BUILTIN_PTWRITE32]) + ix86_add_new_builtins (0, OPTION_MASK_ISA_PTWRITE); + } + + if (TYPE_PRECISION (type) == 32) + return ix86_builtins[(int) IX86_BUILTIN_PTWRITE32]; + else if (TYPE_PRECISION (type) == 64) + return ix86_builtins[(int) IX86_BUILTIN_PTWRITE64]; + else + return NULL; +} static tree ix86_mangle_decl_assembler_name (tree decl, tree id) @@ -50894,6 +50923,9 @@ ix86_run_selftests (void) #undef TARGET_ASAN_SHADOW_OFFSET #define TARGET_ASAN_SHADOW_OFFSET ix86_asan_shadow_offset +#undef TARGET_VARTRACE_FUNC +#define TARGET_VARTRACE_FUNC ix86_vartrace_func + #undef TARGET_GIMPLIFY_VA_ARG_EXPR #define TARGET_GIMPLIFY_VA_ARG_EXPR ix86_gimplify_va_arg diff --git a/gcc/doc/extend.texi b/gcc/doc/extend.texi index d4b1046b6ae..f0cde5dcf0f 100644 --- a/gcc/doc/extend.texi +++ b/gcc/doc/extend.texi @@ -3228,6 +3228,13 @@ the standard C library can be guaranteed not to throw an exception with the notable exceptions of @code{qsort} and @code{bsearch} that take function pointer arguments. +@item no_vartrace +The @code{no_vartrace} attribute disables data tracing for +the function [or variable or structure field] declared with +the attribute. See @pxref{Common Variable Attributes} and +@pxref{Common Type Attributes}. When specified for a function +nothing in the function is traced. + @item optimize (@var{level}, @dots{}) @item optimize (@var{string}, @dots{}) @cindex @code{optimize} function attribute @@ -3489,6 +3496,21 @@ When applied to a member function of a C++ class template, the attribute also means that the function is instantiated if the class itself is instantiated. +@item vartrace +@cindex @code{vartrace} function or variable attribute +Enable data tracing for the function or variable or structure field +marked with this attribute. When applied to a type all instances of the type +will be traced. When applied to a structure or union all fields will be traced. +When applied to a structure field that field will be traced. +For functions will not trace locals (unless enabled on the command line or +on as an attribute the local itself) but arguments, returns, globals, pointer +references. For variables or types or structure members any reads or writes will be traced. +Only integer or pointer types can be tracked. + +Currently implemented for x86 when the @option{ptwrite} target option +is enabled for systems that support the @code{PTWRITE} instruction, +supporting 4 and 8 byte integers. + @item visibility ("@var{visibility_type}") @cindex @code{visibility} function attribute This attribute affects the linkage of the declaration to which it is attached. @@ -7196,6 +7218,16 @@ A @{ /* @r{@dots{}} */ @}; struct __attribute__ ((copy ( (struct A *)0)) B @{ /* @r{@dots{}} */ @}; @end smallexample +@cindex @code{vartrace} type attribute +@cindex @code{no_vartrace} type attribute +@item vartrace +@itemx no_vartrace +Specify that all instances of type should be variable traced +or not variable traced. Can be also also applied to function +types to disable tracing for all instances of that function type. +Can be also applied to structure fields. See the description in +@pxref{Variable Attributes} for more details. + @item deprecated @itemx deprecated (@var{msg}) @cindex @code{deprecated} type attribute diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 535b258d22b..8b9d1d71669 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -2754,6 +2754,33 @@ Don't use the @code{__cxa_get_exception_ptr} runtime routine. This causes @code{std::uncaught_exception} to be incorrect, but is necessary if the runtime routine is not available. +@item -fvartrace +@opindex -fvartrace=... +Insert trace instructions to trace variables at runtime with a tracer +such as Intel Processor Trace. + +Requires enabling a backend specific option, like @option{-mptwrite} to enable +@code{PTWRITE} instruction generation on x86. + +Additional qualifiers can be specified after the =: @option{args} +for arguments, @option{off} to disable, @option{returns} for tracing +return values, @option{reads} to trace reads, @option{writes} to trace +writes, @option{locals} to trace locals. +Default when enabled is tracing reads, writes, arguments, returns, objects +with a static or thread duration but no locals. +Multiple options can be separated by comma. + +When -fvartrace enabled, the compiler will add trace instructions. By +default these trace options act like nops, unless tracing is +enabled. For example to enable tracing on x86 Linux with Linux perf +use: + +@smallexample +gcc -fvartrace -o program -g program.c +perf record -e intel_pt/pt=1,ptw=1,branch=0/ program +perf script +@end smallexample + @item -fvisibility-inlines-hidden @opindex fvisibility-inlines-hidden This switch declares that the user does not attempt to compare diff --git a/gcc/doc/tm.texi b/gcc/doc/tm.texi index 0a2ad9a745e..861914ac646 100644 --- a/gcc/doc/tm.texi +++ b/gcc/doc/tm.texi @@ -11936,6 +11936,12 @@ Address Sanitizer shadow memory address. NULL if Address Sanitizer is not supported by the target. @end deftypefn +@deftypefn {Target Hook} tree TARGET_VARTRACE_FUNC (tree @var{type}, bool @var{force}) +Return a builtin to call to trace variables of type TYPE or NULL if not supported +by the target. Ignore target configuration if FORCE is true. The builtin gets called with a +single argument of TYPE. +@end deftypefn + @deftypefn {Target Hook} {unsigned HOST_WIDE_INT} TARGET_MEMMODEL_CHECK (unsigned HOST_WIDE_INT @var{val}) Validate target specific memory model mask bits. When NULL no target specific memory model bits are allowed. diff --git a/gcc/doc/tm.texi.in b/gcc/doc/tm.texi.in index f1ad80da467..756e84d0e07 100644 --- a/gcc/doc/tm.texi.in +++ b/gcc/doc/tm.texi.in @@ -8104,6 +8104,8 @@ and the associated definitions of those functions. @hook TARGET_ASAN_SHADOW_OFFSET +@hook TARGET_VARTRACE_FUNC + @hook TARGET_MEMMODEL_CHECK @hook TARGET_ATOMIC_TEST_AND_SET_TRUEVAL diff --git a/gcc/flag-types.h b/gcc/flag-types.h index 500f6638f36..6e5add2da9d 100644 --- a/gcc/flag-types.h +++ b/gcc/flag-types.h @@ -261,6 +261,15 @@ enum sanitize_code { | SANITIZE_BOUNDS_STRICT }; +/* Settings for flag_vartrace */ +enum flag_vartrace { + VARTRACE_LOCALS = 1 << 0, + VARTRACE_ARGS = 1 << 1, + VARTRACE_RETURNS = 1 << 2, + VARTRACE_READS = 1 << 3, + VARTRACE_WRITES = 1 << 4 +}; + /* Settings of flag_incremental_link. */ enum incremental_link { INCREMENTAL_LINK_NONE, diff --git a/gcc/opts.c b/gcc/opts.c index 318ed442057..c6c47b55a39 100644 --- a/gcc/opts.c +++ b/gcc/opts.c @@ -1872,6 +1872,65 @@ check_alignment_argument (location_t loc, const char *flag, const char *name) parse_and_check_align_values (flag, name, align_result, true, loc); } +/* Parse vartrace options in P, updating flags OPTS at LOC and return + updated flags. */ + +static int +parse_vartrace_options (const char *p, int opts, location_t loc) +{ + static struct { + const char *name; + int opt; + } vopts[] = + { + { "default", + VARTRACE_ARGS | VARTRACE_RETURNS | VARTRACE_READS + | VARTRACE_WRITES }, /* Keep as first entry. */ + { "all", + VARTRACE_ARGS | VARTRACE_RETURNS | VARTRACE_READS + | VARTRACE_WRITES | VARTRACE_LOCALS }, + { "args", VARTRACE_ARGS }, + { "returns", VARTRACE_RETURNS }, + { "reads", VARTRACE_READS }, + { "writes", VARTRACE_WRITES }, + { "locals", VARTRACE_LOCALS }, + { NULL, 0 } + }; + + if (*p == '=') + p++; + if (*p == 0) + return opts | vopts[0].opt; + + if (!strcmp (p, "off")) + return 0; + + while (*p) + { + unsigned len = strcspn (p, ","); + int i; + + for (i = 0; vopts[i].name; i++) + { + if (len == strlen (vopts[i].name) && !strncmp (p, vopts[i].name, len)) + { + opts |= vopts[i].opt; + break; + } + } + if (vopts[i].name == NULL) + { + error_at (loc, "invalid argument to %qs", "-fvartrace"); + break; + } + + p += len; + if (*p == ',') + p++; + } + return opts; +} + /* Handle target- and language-independent options. Return zero to generate an "unknown option" message. Only options that need extra handling need to be listed here; if you simply want @@ -2078,6 +2137,10 @@ common_handle_option (struct gcc_options *opts, case OPT__completion_: break; + case OPT_fvartrace: + opts->x_flag_vartrace = parse_vartrace_options (arg, opts->x_flag_vartrace, loc); + break; + case OPT_fsanitize_: opts->x_flag_sanitize = parse_sanitizer_options (arg, loc, code, diff --git a/gcc/passes.def b/gcc/passes.def index 24f212c8e31..36d14b0386a 100644 --- a/gcc/passes.def +++ b/gcc/passes.def @@ -394,6 +394,7 @@ along with GCC; see the file COPYING3. If not see NEXT_PASS (pass_asan_O0); NEXT_PASS (pass_tsan_O0); NEXT_PASS (pass_sanopt); + NEXT_PASS (pass_vartrace); NEXT_PASS (pass_cleanup_eh); NEXT_PASS (pass_lower_resx); NEXT_PASS (pass_nrv); diff --git a/gcc/target.def b/gcc/target.def index f9469d69cb0..b5d970870a4 100644 --- a/gcc/target.def +++ b/gcc/target.def @@ -4300,6 +4300,15 @@ supported by the target.", unsigned HOST_WIDE_INT, (void), NULL) +/* Defines the builtin to trace variables, or NULL. */ +DEFHOOK +(vartrace_func, + "Return a builtin to call to trace variables of type TYPE or NULL if not supported\n\ +by the target. Ignore target configuration if FORCE is true. The builtin gets called with a\n\ +single argument of TYPE.", + tree, (tree type, bool force), + NULL) + /* Functions relating to calls - argument passing, returns, etc. */ /* Members of struct call have no special macro prefix. */ HOOK_VECTOR (TARGET_CALLS, calls) diff --git a/gcc/tree-pass.h b/gcc/tree-pass.h index af15adc8e0c..2cf31785a6f 100644 --- a/gcc/tree-pass.h +++ b/gcc/tree-pass.h @@ -423,6 +423,7 @@ extern gimple_opt_pass *make_pass_strlen (gcc::context *ctxt); extern gimple_opt_pass *make_pass_fold_builtins (gcc::context *ctxt); extern gimple_opt_pass *make_pass_post_ipa_warn (gcc::context *ctxt); extern gimple_opt_pass *make_pass_stdarg (gcc::context *ctxt); +extern gimple_opt_pass *make_pass_vartrace (gcc::context *ctxt); extern gimple_opt_pass *make_pass_early_warn_uninitialized (gcc::context *ctxt); extern gimple_opt_pass *make_pass_late_warn_uninitialized (gcc::context *ctxt); extern gimple_opt_pass *make_pass_cse_reciprocals (gcc::context *ctxt); diff --git a/gcc/tree-vartrace.c b/gcc/tree-vartrace.c new file mode 100644 index 00000000000..1ef81b743fc --- /dev/null +++ b/gcc/tree-vartrace.c @@ -0,0 +1,491 @@ +/* Insert instructions for data value tracing. + Copyright (C) 2017, 2018 Free Software Foundation, Inc. + Contributed by Andi Kleen. + +This file is part of GCC. + +GCC is free software; you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation; either version 3, or (at your option) +any later version. + +GCC is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with GCC; see the file COPYING3. If not see +. */ + +#include "config.h" +#include "system.h" +#include "coretypes.h" +#include "backend.h" +#include "target.h" +#include "tree.h" +#include "tree-iterator.h" +#include "tree-pass.h" +#include "basic-block.h" +#include "gimple.h" +#include "gimple-iterator.h" +#include "gimplify.h" +#include "gimplify-me.h" +#include "gimple-ssa.h" +#include "gimple-pretty-print.h" +#include "cfghooks.h" +#include "fold-const.h" +#include "ssa.h" +#include "tree-dfa.h" +#include "attribs.h" + +namespace { + +enum attrstate { force_off, force_on, neutral }; + +/* Can we trace with attributes ATTR. */ + +attrstate +supported_attr (tree attr) +{ + if (lookup_attribute ("no_vartrace", attr)) + return force_off; + if (lookup_attribute ("vartrace", attr)) + return force_on; + return neutral; +} + +/* Is tracing enabled for ARG considering S. */ + +attrstate +supported_op (tree arg, attrstate s) +{ + if (s != neutral) + return s; + if (DECL_P (arg)) + { + s = supported_attr (DECL_ATTRIBUTES (arg)); + if (s != neutral) + return s; + } + return supported_attr (TYPE_ATTRIBUTES (TREE_TYPE (arg))); +} + +/* Can we trace DECL. */ + +bool +supported_type (tree decl) +{ + tree type = TREE_TYPE (decl); + + return POINTER_TYPE_P (type) || INTEGRAL_TYPE_P (type); +} + +/* Return true if DECL is refering to a local variable. */ + +bool +is_local (tree decl) +{ + if (!(flag_vartrace & VARTRACE_LOCALS) && supported_op (decl, neutral) != force_on) + return false; + return auto_var_in_fn_p (decl, cfun->decl); +} + +/* Is T something we can log, FORCEing the type if needed. */ + +bool +supported_mem (tree t, bool force) +{ + if (!supported_type (t)) + return false; + + enum attrstate s = supported_op (t, neutral); + if (s == force_off) + return false; + if (s == force_on) + force = true; + + switch (TREE_CODE (t)) + { + case VAR_DECL: + if (DECL_ARTIFICIAL (t)) + return false; + if (is_local (t)) + return true; + return s == force_on || force; + + case ARRAY_REF: + t = TREE_OPERAND (t, 0); + s = supported_op (t, s); + if (s == force_off) + return false; + return supported_type (TREE_TYPE (t)); + + case COMPONENT_REF: + s = supported_op (TREE_OPERAND (t, 1), s); + t = TREE_OPERAND (t, 0); + if (s == neutral && is_local (t)) + return true; + s = supported_op (t, s); + if (s != neutral) + return s == force_on ? true : false; + return supported_mem (t, force); + + // support BIT_FIELD_REF? + + case VIEW_CONVERT_EXPR: + case TARGET_MEM_REF: + case MEM_REF: + return supported_mem (TREE_OPERAND (t, 0), force); + + case SSA_NAME: + if ((flag_vartrace & VARTRACE_LOCALS) + && SSA_NAME_VAR (t) + && !DECL_IGNORED_P (SSA_NAME_VAR (t))) + return true; + return force; + + default: + break; + } + + return false; +} + +/* Print debugging for inserting CODE at ORIG_STMT with type of VAL for WHY. */ + +void +log_trace_code (gimple *orig_stmt, gimple *code, tree val, const char *why) +{ + if (!dump_file) + return; + if (orig_stmt) + fprintf (dump_file, "BB%d ", gimple_bb (orig_stmt)->index); + fprintf (dump_file, "%s inserting ", why); + print_gimple_stmt (dump_file, code, 0, TDF_VOPS|TDF_MEMSYMS); + if (orig_stmt) + { + fprintf (dump_file, "orig "); + print_gimple_stmt (dump_file, orig_stmt, 2, + TDF_VOPS|TDF_MEMSYMS); + } + fprintf (dump_file, "type "); + print_generic_expr (dump_file, TREE_TYPE (val), TDF_SLIM); + fputc ('\n', dump_file); + fputc ('\n', dump_file); +} + +/* Insert variable tracing code for VAL before iterator GI, originally + for ORIG_STMT and optionally at LOC. Normally before ORIG_STMT, but + AFTER if true. Reason is WHY. Return trace var if successfull, + or NULL_TREE. */ + +tree +insert_trace (gimple_stmt_iterator *gi, tree val, gimple *orig_stmt, + const char *why, location_t loc = -1, bool after = false) +{ + if (loc == (location_t)-1) + loc = gimple_location (orig_stmt); + + tree func = targetm.vartrace_func (TREE_TYPE (val), false); + if (!func) + return NULL_TREE; + + tree tvar = val; + if (!is_gimple_reg (val)) + { + tvar = make_ssa_name (TREE_TYPE (val)); + gassign *assign = gimple_build_assign (tvar, unshare_expr (val)); + log_trace_code (orig_stmt, assign, val, "copy"); + gimple_set_location (assign, loc); + if (after) + gsi_insert_after (gi, assign, GSI_CONTINUE_LINKING); + else + gsi_insert_before (gi, assign, GSI_SAME_STMT); + update_stmt (assign); + } + + gcall *call = gimple_build_call (func, 1, tvar); + log_trace_code (NULL, call, tvar, why); + gimple_set_location (call, loc); + if (after) + gsi_insert_after (gi, call, GSI_CONTINUE_LINKING); + else + gsi_insert_before (gi, call, GSI_SAME_STMT); + update_stmt (call); + return tvar; +} + +/* Insert trace at GI for T in FUN if suitable memory or variable + reference. Always if FORCE. Originally on ORIG_STMT. Reason is + WHY. Insert after GI if AFTER. Returns trace variable or NULL_TREE. */ + +tree +instrument_mem (gimple_stmt_iterator *gi, tree t, bool force, + gimple *orig_stmt, const char *why, bool after = false) +{ + if (supported_mem (t, force)) + return insert_trace (gi, t, orig_stmt, why, -1, after); + return NULL_TREE; +} + +/* Instrument arguments for FUN. Return true if changed. */ + +bool +instrument_args (function *fun) +{ + gimple_stmt_iterator gi; + bool changed = false; + + /* Local tracing usually takes care of the argument too, when + they are read. This avoids redundant trace instructions. */ + if (flag_vartrace & VARTRACE_LOCALS) + return false; + + for (tree arg = DECL_ARGUMENTS (current_function_decl); + arg != NULL_TREE; + arg = DECL_CHAIN (arg)) + { + gi = gsi_start_bb (BASIC_BLOCK_FOR_FN (fun, NUM_FIXED_BLOCKS)); + tree type = TREE_TYPE (arg); + if (POINTER_TYPE_P (type) || INTEGRAL_TYPE_P (type)) + { + tree func = targetm.vartrace_func (TREE_TYPE (arg), false); + if (!func) + continue; + + if (!is_gimple_reg (arg)) + continue; + tree sarg = ssa_default_def (fun, arg); + if (!sarg) + continue; + + gimple_stmt_iterator egi = gsi_after_labels (single_succ (ENTRY_BLOCK_PTR_FOR_FN (fun))); + changed |= !!insert_trace (&egi, sarg, NULL, "arg", fun->function_start_locus); + } + } + return changed; +} + +/* Generate trace call for store GAS at GI, force if FORCE. Return true + if successfull. Return true if successfully inserted. */ + +bool +instrument_store (gimple_stmt_iterator *gi, gassign *gas, bool force) +{ + tree orig = gimple_assign_lhs (gas); + + if (!supported_mem (orig, force)) + return false; + + tree func = targetm.vartrace_func (TREE_TYPE (orig), false); + if (!func) + return false; + + /* Generate another reference to target. That can be racy, but is + guaranteed to have the debug location of the target. Better + would be to use the original value to avoid any races, but we + would need to somehow force the target location of the + builtin. */ + + tree tvar = make_ssa_name (TREE_TYPE (orig)); + gassign *assign = gimple_build_assign (tvar, unshare_expr (orig)); + log_trace_code (gas, assign, orig, "store copy"); + gimple_set_location (assign, gimple_location (gas)); + gsi_insert_after (gi, assign, GSI_CONTINUE_LINKING); + update_stmt (assign); + + gcall *tcall = gimple_build_call (func, 1, tvar); + log_trace_code (gas, tcall, tvar, "store"); + gimple_set_location (tcall, gimple_location (gas)); + gsi_insert_after (gi, tcall, GSI_CONTINUE_LINKING); + update_stmt (tcall); + return true; +} + +/* Instrument STMT at GI. Force if FORCE. Return true if changed. */ + +bool +instrument_assign (gimple_stmt_iterator *gi, gassign *gas, bool force) +{ + if (gimple_clobber_p (gas)) + return false; + bool changed = false; + tree tvar = instrument_mem (gi, gimple_assign_rhs1 (gas), + (flag_vartrace & VARTRACE_READS) || force, + gas, "assign load1"); + if (tvar) + { + gimple_assign_set_rhs1 (gas, tvar); + changed = true; + } + /* Handle operators in case they read locals. */ + if (gimple_num_ops (gas) > 2) + { + tvar = instrument_mem (gi, gimple_assign_rhs2 (gas), + (flag_vartrace & VARTRACE_READS) || force, + gas, "assign load2"); + if (tvar) + { + gimple_assign_set_rhs2 (gas, tvar); + changed = true; + } + } + // handle more ops? + + if (gimple_store_p (gas)) + changed |= instrument_store (gi, gas, + (flag_vartrace & VARTRACE_WRITES) || force); + + if (changed) + update_stmt (gas); + return changed; +} + +/* Instrument return at statement STMT at GI with FORCE. Return true + if changed. */ + +bool +instrument_return (gimple_stmt_iterator *gi, greturn *gret, bool force) +{ + tree rval = gimple_return_retval (gret); + + if (!rval) + return false; + if (DECL_P (rval) && DECL_BY_REFERENCE (rval)) + rval = build_simple_mem_ref (ssa_default_def (cfun, rval)); + if (supported_mem (rval, force)) + return !!insert_trace (gi, rval, gret, "return"); + return false; +} + +/* Instrument asm at GI in statement STMT with FORCE if needed. Return + true if changed. */ + +bool +instrument_asm (gimple_stmt_iterator *gi, gasm *stmt, bool force) +{ + bool changed = false; + + for (unsigned i = 0; i < gimple_asm_ninputs (stmt); i++) + changed |= !!instrument_mem (gi, TREE_VALUE (gimple_asm_input_op (stmt, i)), + force || (flag_vartrace & VARTRACE_READS), stmt, + "asm input"); + for (unsigned i = 0; i < gimple_asm_noutputs (stmt); i++) + { + tree o = TREE_VALUE (gimple_asm_output_op (stmt, i)); + if (supported_mem (o, force | (flag_vartrace & VARTRACE_WRITES))) + changed |= !!insert_trace (gi, o, stmt, "asm output", -1, true); + } + return changed; +} + +/* Insert vartrace calls for FUN. */ + +unsigned int +vartrace_execute (function *fun) +{ + basic_block bb; + gimple_stmt_iterator gi; + bool force = 0; + + if (lookup_attribute ("vartrace", TYPE_ATTRIBUTES (TREE_TYPE (fun->decl))) + || lookup_attribute ("vartrace", DECL_ATTRIBUTES (fun->decl))) + force = true; + + bool changed = false; + + if ((flag_vartrace & VARTRACE_ARGS) || force) + changed |= instrument_args (fun); + + FOR_EACH_BB_FN (bb, fun) + for (gi = gsi_start_bb (bb); !gsi_end_p (gi); gsi_next (&gi)) + { + gimple *stmt = gsi_stmt (gi); + switch (gimple_code (stmt)) + { + case GIMPLE_ASSIGN: + changed |= instrument_assign (&gi, as_a (stmt), force); + break; + case GIMPLE_RETURN: + changed |= instrument_return (&gi, as_a (stmt), + force || (flag_vartrace & VARTRACE_RETURNS)); + break; + + // for GIMPLE_CALL we use the argument logging in the callee + // we could optionally log in the caller too to handle all possible + // reads of a local/global when the callee is not instrumented + // possibly later we could also instrument copy and clear calls. + + case GIMPLE_SWITCH: + changed |= !!instrument_mem (&gi, gimple_switch_index (as_a (stmt)), + force, stmt, "switch"); + break; + case GIMPLE_COND: + changed |= !!instrument_mem (&gi, gimple_cond_lhs (stmt), force, stmt, "if lhs"); + changed |= !!instrument_mem (&gi, gimple_cond_rhs (stmt), force, stmt, "if rhs"); + break; + + case GIMPLE_ASM: + changed |= instrument_asm (&gi, as_a (stmt), force); + break; + default: + // everything else that reads/writes variables should be lowered already + break; + } + } + + // for now, until we fix all cases that destroy ssa + return changed ? TODO_update_ssa : 0;; +} + +const pass_data pass_data_vartrace = +{ + GIMPLE_PASS, /* type */ + "vartrace", /* name */ + OPTGROUP_NONE, /* optinfo_flags */ + TV_NONE, /* tv_id */ + 0, /* properties_required */ + 0, /* properties_provided */ + 0, /* properties_destroyed */ + 0, /* todo_flags_start */ + 0, /* todo_flags_finish */ +}; + +class pass_vartrace : public gimple_opt_pass +{ +public: + pass_vartrace (gcc::context *ctxt) + : gimple_opt_pass (pass_data_vartrace, ctxt) + {} + + virtual opt_pass * clone () + { + return new pass_vartrace (m_ctxt); + } + + virtual bool gate (function *fun) + { + // check if vartrace is supported in backend + if (!targetm.vartrace_func + || targetm.vartrace_func (integer_type_node, false) == NULL) + return false; + + if (lookup_attribute ("no_vartrace", TYPE_ATTRIBUTES (TREE_TYPE (fun->decl))) + || lookup_attribute ("no_vartrace", DECL_ATTRIBUTES (fun->decl))) + return false; + + // need to run pass always to check for variable attributes + return true; + } + + virtual unsigned int execute (function *f) { return vartrace_execute (f); } +}; + +} // anon namespace + +gimple_opt_pass * +make_pass_vartrace (gcc::context *ctxt) +{ + return new pass_vartrace (ctxt); +} From patchwork Fri Nov 16 03:57:04 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andi Kleen X-Patchwork-Id: 998730 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=gcc-patches-return-490217-incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=firstfloor.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="QuQS6ywo"; dkim=pass (1024-bit key; unprotected) header.d=firstfloor.org header.i=@firstfloor.org header.b="kW5vZAnh"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 42x4Fc078bz9s0t for ; Fri, 16 Nov 2018 14:57:55 +1100 (AEDT) DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; q=dns; s=default; b=B2R ixqeA1zA8uK/iKT/L6KpcDFhjUv+2VL67IroJJ8hbTfq+bH6/60/rQaz0NFmmJ6z Au4l72BJk/epergyC3pKyKYPooaYL1iczr6UPdcACwGRAejoio8vg/CwqP9Tsk8g A2dHPefLS3manIAjs+B9vSlVSIa8hhHIf7/2ANF0= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; s=default; bh=3yuknCWDZ rbtaTbB3iQlLnktrlw=; b=QuQS6ywobqvHPQsfuGviplgfN6gGOrq1N8oVVgMAG 1uel6JkP57D95fWvHPlaTkjGubePpD6mLjDDwcswCVEpUoTyyeawIBTFzdAIbPLl Ce1TbsWSURCP3OO/3YtOJCx/5OprzD8I5LdYhAt3JItmy6SlqdLKCq8DpTEitieD pM= Received: (qmail 66469 invoked by alias); 16 Nov 2018 03:57:26 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 66360 invoked by uid 89); 16 Nov 2018 03:57:26 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-24.0 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS, SPF_PASS, UNWANTED_LANGUAGE_BODY autolearn=ham version=3.3.2 spammy= X-HELO: one.firstfloor.org Received: from one.firstfloor.org (HELO one.firstfloor.org) (193.170.194.197) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 16 Nov 2018 03:57:23 +0000 Received: from firstfloor.org (c-71-238-43-142.hsd1.or.comcast.net [71.238.43.142]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by one.firstfloor.org (Postfix) with ESMTPSA id E48EF868FF; Fri, 16 Nov 2018 04:57:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=firstfloor.org; s=mail; t=1542340639; bh=rLCWlKxT9vICvLxnFDYi6rs8Do0mJBxJZaCg43RlvBw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kW5vZAnhovGYtVHPiypc2GV+ujkKeQYdPo381agR3aVdIe31+bCGCTmJCcv/WzRNI 0Cc4xd8TL8AMRntbd6eXLmLd2qd8v7p9k3UumGCZ8s67u4Qid6yIqgTggMh73LgDuv cV5AW63CT4F1qCTtKtiP/II5prhyQKVTVr2T0Fn4= Received: by firstfloor.org (Postfix, from userid 1000) id AFDACA6E35; Thu, 15 Nov 2018 19:57:14 -0800 (PST) From: Andi Kleen To: gcc-patches@gcc.gnu.org Cc: richard.guenther@gmail.com, ubizjak@gmail.com, msebor@gmail.com, Andi Kleen Subject: [PATCH v2 3/3] Add tests for the vartrace pass Date: Thu, 15 Nov 2018 19:57:04 -0800 Message-Id: <20181116035704.14820-4-andi@firstfloor.org> In-Reply-To: <20181116035704.14820-3-andi@firstfloor.org> References: <20181116035704.14820-1-andi@firstfloor.org> <20181116035704.14820-2-andi@firstfloor.org> <20181116035704.14820-3-andi@firstfloor.org> MIME-Version: 1.0 From: Andi Kleen So far they are mostly i386 target specific. Later they could be moved up to architecture specific if some other architecture adds vartracing. gcc/testsuite/: 2018-11-15 Andi Kleen * g++.dg/vartrace-3.C: New test. * g++.dg/vartrace-ret.C: New test. * g++.dg/vartrace-ret2.C: New test. * gcc.target/i386/vartrace-1.c: New test. * gcc.target/i386/vartrace-10.c: New test. * gcc.target/i386/vartrace-11.c: New test. * gcc.target/i386/vartrace-12.c: New test. * gcc.target/i386/vartrace-13.c: New test. * gcc.target/i386/vartrace-14.c: New test. * gcc.target/i386/vartrace-15.c: New test. * gcc.target/i386/vartrace-16.c: New test. * gcc.target/i386/vartrace-17.c: New test. * gcc.target/i386/vartrace-18.c: New test. * gcc.target/i386/vartrace-19.c: New test. * gcc.target/i386/vartrace-20.c: New test. * gcc.target/i386/vartrace-2.c: New test. * gcc.target/i386/vartrace-3.c: New test. * gcc.target/i386/vartrace-4.c: New test. * gcc.target/i386/vartrace-5.c: New test. * gcc.target/i386/vartrace-6.c: New test. * gcc.target/i386/vartrace-7.c: New test. * gcc.target/i386/vartrace-8.c: New test. * gcc.target/i386/vartrace-9.c: New test. --- gcc/testsuite/g++.dg/vartrace-3.C | 14 +++++++ gcc/testsuite/g++.dg/vartrace-ret.C | 17 +++++++++ gcc/testsuite/g++.dg/vartrace-ret2.C | 24 ++++++++++++ gcc/testsuite/gcc.target/i386/vartrace-1.c | 41 +++++++++++++++++++++ gcc/testsuite/gcc.target/i386/vartrace-10.c | 13 +++++++ gcc/testsuite/gcc.target/i386/vartrace-11.c | 16 ++++++++ gcc/testsuite/gcc.target/i386/vartrace-12.c | 16 ++++++++ gcc/testsuite/gcc.target/i386/vartrace-13.c | 18 +++++++++ gcc/testsuite/gcc.target/i386/vartrace-14.c | 17 +++++++++ gcc/testsuite/gcc.target/i386/vartrace-15.c | 12 ++++++ gcc/testsuite/gcc.target/i386/vartrace-16.c | 12 ++++++ gcc/testsuite/gcc.target/i386/vartrace-17.c | 23 ++++++++++++ gcc/testsuite/gcc.target/i386/vartrace-18.c | 20 ++++++++++ gcc/testsuite/gcc.target/i386/vartrace-19.c | 22 +++++++++++ gcc/testsuite/gcc.target/i386/vartrace-2.c | 9 +++++ gcc/testsuite/gcc.target/i386/vartrace-20.c | 23 ++++++++++++ gcc/testsuite/gcc.target/i386/vartrace-3.c | 9 +++++ gcc/testsuite/gcc.target/i386/vartrace-4.c | 13 +++++++ gcc/testsuite/gcc.target/i386/vartrace-5.c | 11 ++++++ gcc/testsuite/gcc.target/i386/vartrace-6.c | 13 +++++++ gcc/testsuite/gcc.target/i386/vartrace-7.c | 11 ++++++ gcc/testsuite/gcc.target/i386/vartrace-8.c | 11 ++++++ gcc/testsuite/gcc.target/i386/vartrace-9.c | 10 +++++ gcc/testsuite/gcc.target/vartrace-19.c | 23 ++++++++++++ 24 files changed, 398 insertions(+) create mode 100644 gcc/testsuite/g++.dg/vartrace-3.C create mode 100644 gcc/testsuite/g++.dg/vartrace-ret.C create mode 100644 gcc/testsuite/g++.dg/vartrace-ret2.C create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-1.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-10.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-11.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-12.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-13.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-14.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-15.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-16.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-17.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-18.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-19.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-2.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-20.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-3.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-4.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-5.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-6.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-7.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-8.c create mode 100644 gcc/testsuite/gcc.target/i386/vartrace-9.c create mode 100644 gcc/testsuite/gcc.target/vartrace-19.c diff --git a/gcc/testsuite/g++.dg/vartrace-3.C b/gcc/testsuite/g++.dg/vartrace-3.C new file mode 100644 index 00000000000..217db297baa --- /dev/null +++ b/gcc/testsuite/g++.dg/vartrace-3.C @@ -0,0 +1,14 @@ +/* { dg-do compile { target i?86-*-* x86_64-*-* } } */ +/* { dg-options "-O2 -mptwrite -fvartrace=args " } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int a; +int b(int c) +{ + if (a) + c += 1; + else + c += b(a); + b(c); + return 0; +} diff --git a/gcc/testsuite/g++.dg/vartrace-ret.C b/gcc/testsuite/g++.dg/vartrace-ret.C new file mode 100644 index 00000000000..5824e3f3738 --- /dev/null +++ b/gcc/testsuite/g++.dg/vartrace-ret.C @@ -0,0 +1,17 @@ +/* { dg-do compile { target i?86-*-* x86_64-*-* } } */ +/* { dg-options "-O2 -mptwrite -fvartrace=returns " } */ +/* { dg-final { scan-assembler-not "ptwrite" } } */ + +class foo { +public: + short a; + short b; +}; + +foo f1() +{ + foo x = { 1, 2 }; + return x; +} + + diff --git a/gcc/testsuite/g++.dg/vartrace-ret2.C b/gcc/testsuite/g++.dg/vartrace-ret2.C new file mode 100644 index 00000000000..56842d75fb6 --- /dev/null +++ b/gcc/testsuite/g++.dg/vartrace-ret2.C @@ -0,0 +1,24 @@ +/* { dg-do compile { target i?86-*-* x86_64-*-* } } */ +/* { dg-options "-O2 -mptwrite -fvartrace " } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +typedef int a; +enum b +{ }; +struct ac +{ + a operator () (a, a, a, a, a, a); +}; +struct c +{ + ac ag; +} extern ai[]; +a d; +void +l (a e) +{ + b f; + a g, h, i, j, k; + e = d; + ai[f].ag (e, g, h, i, j, k); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-1.c b/gcc/testsuite/gcc.target/i386/vartrace-1.c new file mode 100644 index 00000000000..dde60c12d54 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-1.c @@ -0,0 +1,41 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace -fvartrace=locals" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int foo; + +extern void f2 (void); + +void +f0 (void) +{ + foo += 1; +} + +int +f3 (int a) +{ + return a * 2; +} + +extern void extfunc (int); + +int +f4 (int a, int b) +{ + extfunc (a); + extfunc (b); + return a + b; +} + +void +f5 (int a) +{ +} + +int +f (int a, int b) +{ + f2 (); + return a + b + foo; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-10.c b/gcc/testsuite/gcc.target/i386/vartrace-10.c new file mode 100644 index 00000000000..37f2ede23ee --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-10.c @@ -0,0 +1,13 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace" } */ +/* { dg-final { scan-assembler-not "ptwrite" } } */ + +int a __attribute__ ((no_vartrace)); + +extern void f2 (int); + +void +f (void) +{ + f2 (a); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-11.c b/gcc/testsuite/gcc.target/i386/vartrace-11.c new file mode 100644 index 00000000000..3ad792fee34 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-11.c @@ -0,0 +1,16 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +struct foo +{ + __attribute__ ((vartrace)) int field; +}; + +struct foo a; + +int +f (void) +{ + return a.field; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-12.c b/gcc/testsuite/gcc.target/i386/vartrace-12.c new file mode 100644 index 00000000000..7f721e3beb7 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-12.c @@ -0,0 +1,16 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +struct foo +{ + int field; +} __attribute__ ((vartrace)); + +struct foo a; + +int +f (void) +{ + return a.field; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-13.c b/gcc/testsuite/gcc.target/i386/vartrace-13.c new file mode 100644 index 00000000000..94802596d72 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-13.c @@ -0,0 +1,18 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace" } */ +/* { dg-final { scan-assembler-not "ptwrite" } } */ + +struct foo +{ + int field; +} __attribute__ ((no_vartrace)); + +struct foo a; + +extern void f2 (int); + +int +f (void) +{ + f2 (a.field); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-14.c b/gcc/testsuite/gcc.target/i386/vartrace-14.c new file mode 100644 index 00000000000..d4db8bf735b --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-14.c @@ -0,0 +1,17 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace" } */ +/* { dg-final { scan-assembler-not "ptwrite" } } */ + +struct foo +{ + int __attribute__((no_vartrace)) field; +}; + +struct foo a; + +extern void f2(int); + +int f(void) +{ + f2 (a.field); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-15.c b/gcc/testsuite/gcc.target/i386/vartrace-15.c new file mode 100644 index 00000000000..02067a016e3 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-15.c @@ -0,0 +1,12 @@ +/* { dg-do compile } */ +/* { dg-options "-mptwrite -fvartrace" } */ +/* { dg-final { scan-assembler-not "ptwrite" } } */ + +struct { + int __attribute__((vartrace)) x; +} v; + +__attribute__((target("no-ptwrite"))) int f(void) +{ + return v.x; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-16.c b/gcc/testsuite/gcc.target/i386/vartrace-16.c new file mode 100644 index 00000000000..6d3014af688 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-16.c @@ -0,0 +1,12 @@ +/* { dg-do compile } */ +/* { dg-options "" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +struct { + int __attribute__((vartrace)) x; +} v; + +__attribute__((target("ptwrite"))) int f(void) +{ + return v.x; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-17.c b/gcc/testsuite/gcc.target/i386/vartrace-17.c new file mode 100644 index 00000000000..131db24f19c --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-17.c @@ -0,0 +1,23 @@ +/* Test optimization for redundant PTWRITEs */ +/* So far XFAIL because we generate redundant PTWRITEs */ +/* { dg-do compile } */ +/* { dg-options "-fvartrace -mptwrite" } */ +/* { dg-final { scan-assembler-times "ptwrite" 8 { xfail *-*-* } } } */ + +int read_locals(int a, int b) +{ + return a+b; +} + +int x; + +int global(int a) +{ + x += a; + return x + a; +} + +int pointer_ref(int *f) +{ + return *f++; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-18.c b/gcc/testsuite/gcc.target/i386/vartrace-18.c new file mode 100644 index 00000000000..3b3b1fa9dee --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-18.c @@ -0,0 +1,20 @@ +/* { dg-do compile } */ +/* { dg-options "-fvartrace=reads -mptwrite" } */ +/* { dg-final { scan-assembler-times "ptwrite" 2 } } */ +/* Source: Martin Sebor */ + +int global __attribute__((no_vartrace)); +int array[10]; + +int f(void) +{ + return array[global]; +} + +int array2[10] __attribute__((no_vartrace)); +int global2; + +int f2(void) +{ + return array2[global2]; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-19.c b/gcc/testsuite/gcc.target/i386/vartrace-19.c new file mode 100644 index 00000000000..1d03029a3f8 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-19.c @@ -0,0 +1,22 @@ +/* { dg-do compile } */ +/* { dg-options "-fvartrace=reads,writes -mptwrite" } */ +/* { dg-final { scan-assembler-times "ptwrite" 5 } } */ +/* Should be really 4 times, but so far still one redundant ptwrite */ + +int global; +int global2; + +void f1(int i) +{ + asm("nop" :: "r" (i) : "memory"); +} + +void f2(void) +{ + asm("nop" : "=m" (global) :: "memory"); +} + +void f3(void) +{ + asm("nop" : "=m" (global) : "r" (global2) : "memory"); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-2.c b/gcc/testsuite/gcc.target/i386/vartrace-2.c new file mode 100644 index 00000000000..6c89bc32721 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-2.c @@ -0,0 +1,9 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace=args" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int +f (int a) +{ + return a; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-20.c b/gcc/testsuite/gcc.target/i386/vartrace-20.c new file mode 100644 index 00000000000..4bc58a34430 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-20.c @@ -0,0 +1,23 @@ +/* { dg-do compile } */ +/* { dg-options "-fvartrace=reads -mptwrite" } */ +/* { dg-final { scan-assembler-times "ptwrite" 2 } } */ + +int global; + +int f1(void) +{ + switch (global) + { + case 1: + return 1; + default: + return 0; + } +} + +int f2(void) +{ + if (global > 0) + return 1; + return 0; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-3.c b/gcc/testsuite/gcc.target/i386/vartrace-3.c new file mode 100644 index 00000000000..c4397ff468c --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-3.c @@ -0,0 +1,9 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace=returns" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int +f (int a) +{ + return a; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-4.c b/gcc/testsuite/gcc.target/i386/vartrace-4.c new file mode 100644 index 00000000000..d8dc1786e28 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-4.c @@ -0,0 +1,13 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace=reads" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int a; + +extern void f2 (int); + +int +f (void) +{ + f2 (a); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-5.c b/gcc/testsuite/gcc.target/i386/vartrace-5.c new file mode 100644 index 00000000000..feedab90965 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-5.c @@ -0,0 +1,11 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace=writes" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int a; + +void +f (void) +{ + a++; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-6.c b/gcc/testsuite/gcc.target/i386/vartrace-6.c new file mode 100644 index 00000000000..c78ec3322ad --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-6.c @@ -0,0 +1,13 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace=reads -fvartrace=locals" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +extern void f2 (void); + +void +f (void) +{ + int i; + for (i = 0; i < 10; i++) + f2 (); +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-7.c b/gcc/testsuite/gcc.target/i386/vartrace-7.c new file mode 100644 index 00000000000..99269d70a75 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-7.c @@ -0,0 +1,11 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int a __attribute__ ((vartrace)); + +int +f (void) +{ + return a; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-8.c b/gcc/testsuite/gcc.target/i386/vartrace-8.c new file mode 100644 index 00000000000..ceef61944ea --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-8.c @@ -0,0 +1,11 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite" } */ +/* { dg-final { scan-assembler "ptwrite" } } */ + +int a; + +__attribute__ ((vartrace)) + int f (void) +{ + return a; +} diff --git a/gcc/testsuite/gcc.target/i386/vartrace-9.c b/gcc/testsuite/gcc.target/i386/vartrace-9.c new file mode 100644 index 00000000000..9216b0776b9 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/vartrace-9.c @@ -0,0 +1,10 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -mptwrite -fvartrace" } */ +/* { dg-final { scan-assembler-not "ptwrite" } } */ + +int a; + +__attribute__ ((no_vartrace)) int f (void) +{ + return a; +} diff --git a/gcc/testsuite/gcc.target/vartrace-19.c b/gcc/testsuite/gcc.target/vartrace-19.c new file mode 100644 index 00000000000..7de0324fd34 --- /dev/null +++ b/gcc/testsuite/gcc.target/vartrace-19.c @@ -0,0 +1,23 @@ +/* { dg-do compile } */ +/* { dg-options "-fvartrace=reads,writes -mptwrite" } */ +/* { dg-final { scan-assembler-times "ptwrite" 7 } } */ +/* XXX: should be 4 ptwrites, but right now we generate redundant ones */ + +int global; +int global2; + +__attribute__((vartrace)) +void f1(int i) +{ + asm("nop" :: "r" (i) : "memory"); +} + +void f2(void) +{ + asm("nop" : "=m" (global) :: "memory"); +} + +void f3(void) +{ + asm("nop" : "=m" (global) : "r" (global2) : "memory"); +}