From: Stefan Schulze Frielinghaus <stefansf@linux.ibm.com>
To: Jakub Jelinek <jakub@redhat.com>
Cc: gcc-patches@gcc.gnu.org
Subject: Re: Return slot optimization for stack protector strong
Date: Sun, 01 Mar 2020 16:38:00 -0000 [thread overview]
Message-ID: <20200301163745.GA7907@localhost.localdomain> (raw)
In-Reply-To: <20200128171841.GB28561@dyn-9-152-222-24.boeblingen.de.ibm.com>
On Tue, Jan 28, 2020 at 06:18:41PM +0100, Stefan Schulze Frielinghaus wrote:
> On Mon, Jan 27, 2020 at 06:53:51PM +0100, Jakub Jelinek wrote:
> > On Mon, Jan 27, 2020 at 06:49:23PM +0100, Stefan Schulze Frielinghaus wrote:
> > > some function calls trigger the stack-protector-strong although such
> > > calls are later on implemented via calls to internal functions.
> > > Consider the following example:
> > >
> > > long double
> > > rintl_wrapper (long double x)
> > > {
> > > return rintl (x);
> > > }
> > >
> > > On s390x a return value of type `long double` is passed via a return
> > > slot. Thus according to function `stack_protect_return_slot_p` a
> > > function call like `rintl (x)` triggers the stack-protector-strong since
> > > rintl is not an internal function. However, in a later stage, during
> > > `expand_call_stmt`, such a call is implemented via a call to an internal
> > > function. This means in the example, the call `rintl (x)` is expanded
> > > into an assembler instruction with register operands only. Thus this
> > > late time decision renders the usage of the stack protector superfluous.
> >
> > I doubt your predicate gives any guarantees that the builtin will be
> > expanded inline rather than a library call. Some builtins might be expanded
> > inline or as a library call depending on various options, or depending on
> > particular arguments etc.
>
> My predicate is more or less just a copy of what happens in
> `expand_call_stmt` where we have
>
> decl = gimple_call_fndecl (stmt);
> if (gimple_call_lhs (stmt)
> && !gimple_has_side_effects (stmt)
> && (optimize || (decl && called_as_built_in (decl))))
> {
> internal_fn ifn = replacement_internal_fn (stmt);
> if (ifn != IFN_LAST)
> {
> expand_internal_call (ifn, stmt);
> return;
> }
> }
>
> There a decision is made whether a call is implemented as a call to an
> internal function or not. Thus using the very same logic it should be
> possible to decide at an earlier stage that a call will be implemented
> as a call to an internal function. Since an internal function has no
> linkage, it is therefore guaranteed that it will be inlined.
Ping. Any chance we can have a second look at this? I just outsourced the
logic used in `expand_call_stmt` in order to determine whether a call is
realized as a call to an internal function or not, into a predicate.
This predicate I'm then using to decide whether a function call should
trigger the stack protector or not.
I would have thought that this is fine since internal functions are
guaranteed to be inlined. Am I missing something?
next prev parent reply other threads:[~2020-03-01 16:38 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-01-27 18:23 Stefan Schulze Frielinghaus
2020-01-27 18:23 ` Jakub Jelinek
2020-01-28 17:50 ` Stefan Schulze Frielinghaus
2020-03-01 16:38 ` Stefan Schulze Frielinghaus [this message]
2020-04-27 8:56 ` Stefan Schulze Frielinghaus
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200301163745.GA7907@localhost.localdomain \
--to=stefansf@linux.ibm.com \
--cc=gcc-patches@gcc.gnu.org \
--cc=jakub@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).