public inbox for gcc-cvs@sourceware.org
help / color / mirror / Atom feed
* [gcc(refs/vendors/riscv/heads/gcc-13-with-riscv-opts)] rtl-ssa: Fix ICE when deleting memory clobbers
@ 2023-10-30 18:34 Jeff Law
0 siblings, 0 replies; only message in thread
From: Jeff Law @ 2023-10-30 18:34 UTC (permalink / raw)
To: gcc-cvs
https://gcc.gnu.org/g:fb4652e46ab30af76b30657d12b77088415a611c
commit fb4652e46ab30af76b30657d12b77088415a611c
Author: Richard Sandiford <richard.sandiford@arm.com>
Date: Wed Oct 25 10:39:50 2023 +0100
rtl-ssa: Fix ICE when deleting memory clobbers
Sometimes an optimisation can remove a clobber of scratch registers
or scratch memory. We then need to update the DU chains to reflect
the removed clobber.
For registers this isn't a problem. Clobbers of registers are just
momentary blips in the register's lifetime. They act as a barrier for
moving uses later or defs earlier, but otherwise they have no effect on
the semantics of other instructions. Removing a clobber is therefore a
cheap, local operation.
In contrast, clobbers of memory are modelled as full sets.
This is because (a) a clobber of memory does not invalidate
*all* memory and (b) it's a common idiom to use (clobber (mem ...))
in stack barriers. But removing a set and redirecting all uses
to a different set is a linear operation. Doing it for potentially
every optimisation could lead to quadratic behaviour.
This patch therefore refrains from removing sets of memory that appear
to be redundant. There's an opportunity to clean this up in linear time
at the end of the pass, but as things stand, nothing would benefit from
that.
This is also a very rare event. Usually we should try to optimise the
insn before the scratch memory has been allocated.
gcc/
* rtl-ssa/changes.cc (function_info::finalize_new_accesses):
If a change describes a set of memory, ensure that that set
is kept, regardless of the insn pattern.
(cherry picked from commit 60ef0d2cdc97b4325947941834f5d3590f0af062)
Diff:
---
gcc/rtl-ssa/changes.cc | 14 ++++++++++++--
1 file changed, 12 insertions(+), 2 deletions(-)
diff --git a/gcc/rtl-ssa/changes.cc b/gcc/rtl-ssa/changes.cc
index 50328cfb3ebb..b897f9a6edb0 100644
--- a/gcc/rtl-ssa/changes.cc
+++ b/gcc/rtl-ssa/changes.cc
@@ -426,8 +426,18 @@ function_info::finalize_new_accesses (insn_change &change)
// Also keep any explicitly-recorded call clobbers, which are deliberately
// excluded from the vec_rtx_properties. Calls shouldn't move, so we can
// keep the definitions in their current position.
+ //
+ // If the change describes a set of memory, but the pattern doesn't
+ // reference memory, keep the set anyway. This can happen if the
+ // old pattern was a parallel that contained a memory clobber, and if
+ // the new pattern was recognized without that clobber. Keeping the
+ // set avoids a linear-complexity update to the set's users.
+ //
+ // ??? We could queue an update so that these bogus clobbers are
+ // removed later.
for (def_info *def : change.new_defs)
- if (def->m_has_been_superceded && def->is_call_clobber ())
+ if (def->m_has_been_superceded
+ && (def->is_call_clobber () || def->is_mem ()))
{
def->m_has_been_superceded = false;
def->set_insn (insn);
@@ -511,7 +521,7 @@ function_info::finalize_new_accesses (insn_change &change)
}
}
- // Install the new list of definitions in CHANGE.
+ // Install the new list of uses in CHANGE.
sort_accesses (m_temp_uses);
change.new_uses = use_array (temp_access_array (m_temp_uses));
m_temp_uses.truncate (0);
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2023-10-30 18:34 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-10-30 18:34 [gcc(refs/vendors/riscv/heads/gcc-13-with-riscv-opts)] rtl-ssa: Fix ICE when deleting memory clobbers Jeff Law
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).