From: Than McIntosh Date: Wed, 20 Jun 2018 21:11:23 +0000 (+0000) Subject: re PR libgcc/86213 (-fsplit-stack runtime may clobber SSE input param reg) X-Git-Url: https://git.libre-soc.org/?a=commitdiff_plain;h=1f3fa525537199158db4373efa9d40344632f5f0;p=gcc.git re PR libgcc/86213 (-fsplit-stack runtime may clobber SSE input param reg) libgcc/: PR libgcc/86213 * generic-morestack.c (allocate_segment): Move calls to getenv and getpagesize to __morestack_load_mmap. (__morestack_load_mmap) Initialize static_pagesize and use_guard_page here so as to avoid clobbering SSE regs during a __morestack call. gcc/testsuite/: * gcc.dg/split-8.c: New. From-SVN: r261823 --- diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 0343e8e5324..2e333b41109 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,8 @@ +2018-06-20 Than McIntosh + + PR libgcc/86213 + * gcc.dg/split-8.c: New. + 2018-06-20 Kelvin Nilsen * gcc.target/powerpc/builtins-1.c: Adjust dg directives to scan diff --git a/gcc/testsuite/gcc.dg/split-8.c b/gcc/testsuite/gcc.dg/split-8.c new file mode 100644 index 00000000000..33662e24c4f --- /dev/null +++ b/gcc/testsuite/gcc.dg/split-8.c @@ -0,0 +1,43 @@ +/* { dg-do run } */ +/* { dg-require-effective-target split_stack } */ +/* { dg-options "-fsplit-stack" } */ + +/* Testcase for PR86213. On the first call to __morestack there is a live + value in xmm0, which was being clobbered by a call to getenv(). */ + +#include + +double gd[8]; +int z; + +double bar(double q) __attribute__ ((noinline)); +double foo(double q) __attribute__ ((noinline)); +int ck(double q) __attribute__ ((noinline)); +int main(int argc, char **argv) __attribute__ ((no_split_stack)); + +double bar(double q) +{ + double d[8]; + for (unsigned i = 0; i < 8; ++i) + d[i] = gd[8-i-1]; + return q + d[z&3]; +} + +double foo(double d) +{ + return bar(d); +} + +int ck(double d) +{ + if (d != 64.0) + abort(); + return 0; +} + +typedef double (*fp)(double); +fp g = foo; + +int main(int argc, char **argv) { + return ck(g(64.0)); +} diff --git a/libgcc/ChangeLog b/libgcc/ChangeLog index 65efe170755..238b08f366a 100644 --- a/libgcc/ChangeLog +++ b/libgcc/ChangeLog @@ -1,3 +1,12 @@ +2018-06-20 Than McIntosh + + PR libgcc/86213 + * generic-morestack.c (allocate_segment): Move calls to getenv and + getpagesize to __morestack_load_mmap. + (__morestack_load_mmap) Initialize static_pagesize and + use_guard_page here so as to avoid clobbering SSE regs during a + __morestack call. + 2018-06-18 Michael Meissner * config/rs6000/t-float128 (FP128_CFLAGS_SW): Compile float128 diff --git a/libgcc/generic-morestack.c b/libgcc/generic-morestack.c index 80bfd7feda7..d70ca0922ce 100644 --- a/libgcc/generic-morestack.c +++ b/libgcc/generic-morestack.c @@ -243,6 +243,12 @@ __thread struct initial_sp __morestack_initial_sp static sigset_t __morestack_fullmask; +/* Page size, as returned from getpagesize(). Set on startup. */ +static unsigned int static_pagesize; + +/* Set on startup to non-zero value if SPLIT_STACK_GUARD env var is set. */ +static int use_guard_page; + /* Convert an integer to a decimal string without using much stack space. Return a pointer to the part of the buffer to use. We this instead of sprintf because sprintf will require too much stack @@ -320,8 +326,6 @@ __morestack_fail (const char *msg, size_t len, int err) static struct stack_segment * allocate_segment (size_t frame_size) { - static unsigned int static_pagesize; - static int use_guard_page; unsigned int pagesize; unsigned int overhead; unsigned int allocate; @@ -329,27 +333,6 @@ allocate_segment (size_t frame_size) struct stack_segment *pss; pagesize = static_pagesize; - if (pagesize == 0) - { - unsigned int p; - - pagesize = getpagesize (); - -#ifdef __GCC_HAVE_SYNC_COMPARE_AND_SWAP_4 - p = __sync_val_compare_and_swap (&static_pagesize, 0, pagesize); -#else - /* Just hope this assignment is atomic. */ - static_pagesize = pagesize; - p = 0; -#endif - - use_guard_page = getenv ("SPLIT_STACK_GUARD") != 0; - - /* FIXME: I'm not sure this assert should be in the released - code. */ - assert (p == 0 || p == pagesize); - } - overhead = sizeof (struct stack_segment); allocate = pagesize; @@ -815,7 +798,10 @@ __generic_findstack (void *stack) /* This function is called at program startup time to make sure that mmap, munmap, and getpagesize are resolved if linking dynamically. We want to resolve them while we have enough stack for them, rather - than calling into the dynamic linker while low on stack space. */ + than calling into the dynamic linker while low on stack space. + Similarly, invoke getenv here to check for split-stack related control + variables, since doing do as part of the __morestack path can result + in unwanted use of SSE/AVX registers (see GCC PR 86213). */ void __morestack_load_mmap (void) @@ -825,7 +811,12 @@ __morestack_load_mmap (void) TLS accessor function is resolved. */ mmap (__morestack_current_segment, 0, PROT_READ, MAP_ANONYMOUS, -1, 0); mprotect (NULL, 0, 0); - munmap (0, getpagesize ()); + munmap (0, static_pagesize); + + /* Initialize these values here, so as to avoid dynamic linker + activity as part of a __morestack call. */ + static_pagesize = getpagesize(); + use_guard_page = getenv ("SPLIT_STACK_GUARD") != 0; } /* This function may be used to iterate over the stack segments.