From: Richard Biener <rguenther@suse.de>
To: Jiufu Guo <guojiufu@linux.ibm.com>
Cc: Richard Sandiford <richard.sandiford@arm.com>,
gcc-patches@gcc.gnu.org, jeffreyalaw@gmail.com,
segher@kernel.crashing.org, dje.gcc@gmail.com,
linkw@gcc.gnu.org, bergner@linux.ibm.com
Subject: Re: [PATCH] Make sure SCALAR_INT_MODE_P before invoke try_const_anchors
Date: Fri, 9 Jun 2023 12:52:59 +0000 (UTC) [thread overview]
Message-ID: <nycvar.YFH.7.77.849.2306091251440.4723@jbgna.fhfr.qr> (raw)
In-Reply-To: <7no7lohklj.fsf@ltcden2-lp1.aus.stglabs.ibm.com>
On Fri, 9 Jun 2023, Jiufu Guo wrote:
>
> Hi,
>
> Richard Biener <rguenther@suse.de> writes:
>
> > On Fri, 9 Jun 2023, Jiufu Guo wrote:
> >
> >>
> >> Hi,
> >>
> >> Richard Biener <rguenther@suse.de> writes:
> >>
> >> > On Fri, 9 Jun 2023, Richard Sandiford wrote:
> >> >
> >> >> guojiufu <guojiufu@linux.ibm.com> writes:
> >> >> > Hi,
> >> >> >
> >> >> > On 2023-06-09 16:00, Richard Biener wrote:
> >> >> >> On Fri, 9 Jun 2023, Jiufu Guo wrote:
> >> >> >>
> >> >> >>> Hi,
> >> >> >>>
> ...
> >> >> >>>
> >> >> >>> This patch is raised when drafting below one.
> >> >> >>> https://gcc.gnu.org/pipermail/gcc-patches/2022-October/603530.html.
> >> >> >>> With that patch, "{[%1:DI]=0;} stack_tie" with BLKmode runs into
> >> >> >>> try_const_anchors, and hits the assert/ice.
> >> >> >>>
> >> >> >>> Boostrap and regtest pass on ppc64{,le} and x86_64.
> >> >> >>> Is this ok for trunk?
> >> >> >>
> >> >> >> Iff the correct fix at all (how can a CONST_INT have BLKmode?) then
> >> >> >> I suggest to instead fix try_const_anchors to change
> >> >> >>
> >> >> >> /* CONST_INT is used for CC modes, but we should leave those alone.
> >> >> >> */
> >> >> >> if (GET_MODE_CLASS (mode) == MODE_CC)
> >> >> >> return NULL_RTX;
> >> >> >>
> >> >> >> gcc_assert (SCALAR_INT_MODE_P (mode));
> >> >> >>
> >> >> >> to
> >> >> >>
> >> >> >> /* CONST_INT is used for CC modes, leave any non-scalar-int mode
> >> >> >> alone. */
> >> >> >> if (!SCALAR_INT_MODE_P (mode))
> >> >> >> return NULL_RTX;
> >> >> >>
> >> >> >
> >> >> > This is also able to fix this issue. there is a "Punt on CC modes"
> >> >> > patch
> >> >> > to return NULL_RTX in try_const_anchors.
> >> >> >
> >> >> >> but as said I wonder how we arrive at a BLKmode CONST_INT and whether
> >> >> >> we should have fended this off earlier. Can you share more complete
> >> >> >> RTL of that stack_tie?
> >> >> >
> >> >> >
> >> >> > (insn 15 14 16 3 (parallel [
> >> >> > (set (mem/c:BLK (reg/f:DI 1 1) [1 A8])
> >> >> > (const_int 0 [0]))
> >> >> > ]) "/home/guojiufu/temp/gdb.c":13:3 922 {stack_tie}
> >> >> > (nil))
> >> >> >
> >> >> > It is "set (mem/c:BLK (reg/f:DI 1 1) (const_int 0 [0])".
> >> >>
> >> >> I'm not convinced this is correct RTL. (unspec:BLK [(const_int 0)] ...)
> >> >> would be though. It's arguably more accurate too, since the effect
> >> >> on the stack locations is unspecified rather than predictable.
> >> >
> >> > powerpc seems to be the only port with a stack_tie that's not
> >> > using an UNSPEC RHS.
> >> In rs6000.md, it is
> >>
> >> ; This is to explain that changes to the stack pointer should
> >> ; not be moved over loads from or stores to stack memory.
> >> (define_insn "stack_tie"
> >> [(match_parallel 0 "tie_operand"
> >> [(set (mem:BLK (reg 1)) (const_int 0))])]
> >> ""
> >> ""
> >> [(set_attr "length" "0")])
> >>
> >> This would be just an placeholder insn, and acts as the comments.
> >> UNSPEC_ would works like other targets. While, I'm wondering
> >> the concerns on "set (mem:BLK (reg 1)) (const_int 0)".
> >> MODEs between SET_DEST and SET_SRC?
> >
> > I don't think the issue is the mode but the issue is that
> > the patter as-is says some memory is zeroed while that's not
> > actually true (not specifying a size means we can't really do
> > anything with this MEM, but still). Using an UNSPEC avoids
> > implying anything for the stored value.
> >
> > Of course I think a MEM SET_DEST without a specified size is bougs
> > as well, but there's larger precedent for this...
>
> Thanks for your kindly comments!
> Using "(set (mem:BLK (reg 1)) (const_int 0))" here, may because this
> insn does not generate real thing (not a real store and no asm code),
> may like barrier.
>
> While I agree that, using UNSPEC may be more clear to avoid mis-reading.
Btw, another way to avoid the issue in CSE is to make it not process
(aka record anything for optimization) for SET from MEMs with
!MEM_SIZE_KNOWN_P
Richard.
next prev parent reply other threads:[~2023-06-09 12:53 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-06-09 5:28 Jiufu Guo
2023-06-09 8:00 ` Richard Biener
2023-06-09 8:24 ` guojiufu
2023-06-09 8:33 ` Richard Sandiford
2023-06-09 8:51 ` Richard Biener
2023-06-09 9:10 ` Jiufu Guo
2023-06-09 10:57 ` Richard Biener
2023-06-09 12:43 ` Jiufu Guo
2023-06-09 12:52 ` Richard Biener [this message]
2023-06-12 5:44 ` Jiufu Guo
2023-06-12 8:02 ` Richard Biener
2023-06-12 11:20 ` Jiufu Guo
2023-06-12 20:54 ` Jeff Law
2023-06-13 2:34 ` Jiufu Guo
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=nycvar.YFH.7.77.849.2306091251440.4723@jbgna.fhfr.qr \
--to=rguenther@suse.de \
--cc=bergner@linux.ibm.com \
--cc=dje.gcc@gmail.com \
--cc=gcc-patches@gcc.gnu.org \
--cc=guojiufu@linux.ibm.com \
--cc=jeffreyalaw@gmail.com \
--cc=linkw@gcc.gnu.org \
--cc=richard.sandiford@arm.com \
--cc=segher@kernel.crashing.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).