public inbox for gcc-patches@gcc.gnu.org
 help / color / mirror / Atom feed
From: Richard Biener <richard.guenther@gmail.com>
To: Roger Sayle <roger@nextmovesoftware.com>
Cc: GCC Patches <gcc-patches@gcc.gnu.org>,
	Uros Bizjak <ubizjak@gmail.com>,  "H.J. Lu" <hjl.tools@gmail.com>
Subject: Re: [x86 PATCH] PR target/106933: Limit TImode STV to SSA-like def-use chains.
Date: Mon, 9 Jan 2023 08:24:34 +0100	[thread overview]
Message-ID: <CAFiYyc0udbhee=N=0aefEyVQ6n=bt63E=Y8bOm2XxpUfhzPwbw@mail.gmail.com> (raw)
In-Reply-To: <001001d9165a$73e9cc30$5bbd6490$@nextmovesoftware.com>

On Fri, Dec 23, 2022 at 12:10 AM Roger Sayle <roger@nextmovesoftware.com> wrote:
>
>
> With many thanks to H.J. for doing all the hard work, this patch resolves
> two P1 regressions; PR target/106933 and PR target/106959.
>
> Although superficially similar, the i386 backend's two scalar-to-vector
> (STV) passes perform their transformations in importantly different ways.
> The original pass converting SImode and DImode operations to V4SImode
> or V2DImode operations is "soft", allowing values to be maintained in
> both integer and vector hard registers.  The newer pass converting TImode
> operations to V1TImode is "hard" (all or nothing) that converts all uses
> of a pseudo to vector form.  To implement this it invokes powerful ju-ju
> calling SET_MODE on a REG_rtx, which due to RTL sharing, often updates
> this pseudo's mode everywhere in the RTL chain.  Hence, TImode STV can only
> be performed when all uses of a pseudo are convertible to V1TImode form.
> To ensure this the STV passes currently use data-flow analysis to inspect
> all DEFs and USEs in a chain.  This works fine for chains that are in
> the usual single assignment form, but the occurrence of uninitialized
> variables, or multiple assignments that split a pseudo's usage into
> several independent chains (lifetimes) can lead to situations where
> some but not all of a pseudo's occurrences need to be updated.  This is
> safe for the SImode/DImode pass, but leads to the above bugs during
> the TImode pass.
>
> My one minor tweak to HJ's patch from comment #4 of bugzilla PR106959
> is to only perform the new single_def_chain_p check for TImode STV; it
> turns out that STV of SImode/DImode min/max operates safely on multiple-def
> chains, and prohibiting this leads to testsuite regressions.  We don't
> (yet) support V1TImode min/max, so this idiom isn't an issue during the
> TImode STV pass.
>
> For the record, the two alternate possible fixes are (i) make the TImode
> STV pass "soft", by eliminating use of SET_MODE, instead using replace_rtx
> with a new pseudo, or (ii) merging "chains" so that multiple DFA
> chains/lifetimes are considered a single STV chain.

Similar to (ii) one could also as (iii) split non-overlapping def-use
chains to use
different pseudos (run web before stv?)

In general making the pass "soft" sounds like the right thing to do in the end,
if there's cost reasons we want to go all-or-nothing then costing should already
ensure that.

I agree with Uros that the patch as proposed is best at this stage.

Note the single_def_chain_p helper looks like it should be in df*.{cc,h}.
There's the related(?) df_find_single_def_src, so a better name
could be `df_ref df_single_def (rtx)'?  I'll note the function does

      df_ref adef = DF_REG_DEF_CHAIN (REGNO (reg));
      if (adef == NULL || DF_REF_NEXT_REG (adef) != NULL
          || DF_REF_IS_ARTIFICIAL (adef)
          || (DF_REF_FLAGS (adef)
              & (DF_REF_PARTIAL | DF_REF_CONDITIONAL)))
        return NULL_RTX;

in particular it rejects DF_REF_PARTIAL/CONDITIONAL and artificial
defs as "single defs" which your function doesn't.

Richard.

>
> This patch has been tested on x86_64-pc-linux-gnu with make bootstrap
> and make -k check, both with and without --target_board=unix{-m32},
> with no new failures.  Ok for mainline?
>
>
> 2022-12-22  H.J. Lu  <hjl.tools@gmail.com>
>             Roger Sayle  <roger@nextmovesoftware.com>
>
> gcc/ChangeLog
>         PR target/106933
>         PR target/106959
>         * config/i386/i386-features.cc (single_def_chain_p): New predicate
>         function to check that a pseudo's use-def chain is in SSA form.
>         (timode_scalar_to_vector_candidate_p): Check that TImode regs that
>         are SET_DEST or SET_SRC of an insn match/are single_def_chain_p.
>
> gcc/testsuite/ChangeLog
>         PR target/106933
>         PR target/106959
>         * gcc.target/i386/pr106933-1.c: New test case.
>         * gcc.target/i386/pr106933-2.c: Likewise.
>         * gcc.target/i386/pr106959-1.c: Likewise.
>         * gcc.target/i386/pr106959-2.c: Likewise.
>         * gcc.target/i386/pr106959-3.c: Likewise.
>
> Thanks in advance,
> Roger
> --
>

      parent reply	other threads:[~2023-01-09  7:24 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-12-22 23:09 Roger Sayle
2022-12-23  7:23 ` Uros Bizjak
2023-01-09  7:24 ` Richard Biener [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAFiYyc0udbhee=N=0aefEyVQ6n=bt63E=Y8bOm2XxpUfhzPwbw@mail.gmail.com' \
    --to=richard.guenther@gmail.com \
    --cc=gcc-patches@gcc.gnu.org \
    --cc=hjl.tools@gmail.com \
    --cc=roger@nextmovesoftware.com \
    --cc=ubizjak@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).