From patchwork Mon Aug 1 10:04:49 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Xi Ruoyao X-Patchwork-Id: 330 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:6a10:b5d6:b0:2b9:3548:2db5 with SMTP id v22csp2233118pxt; Mon, 1 Aug 2022 03:05:46 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vf9ZB8IYYLXLxk4/FV7lSn+MjzLz/G1QbY+4yZd3I7p7GUPmP5BzlzXD9U8wtQNQ2m4naO X-Received: by 2002:aa7:db87:0:b0:43b:a0d5:8848 with SMTP id u7-20020aa7db87000000b0043ba0d58848mr15167980edt.60.1659348346278; Mon, 01 Aug 2022 03:05:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659348346; cv=none; d=google.com; s=arc-20160816; b=MrtvVGHanPKIrf1zsy3EVgXFjyORgF/jQJtbPPfGfhlIm0lFgqIQkcNSLYHSssQ/Dk s0nNSYwzMe59oVYBdg56RqUqZTnvfz9zW6jubn6OhnZAl9XeN+UtelsrwSvERsrsMLsm TZmd2i32MCxgaubFaCgOspKRiktSFozk65wYGQubTE3LO2kS8rqX/5HXvwERrvB5TWQP WhCDDMLsMbSTUFBEf5H98B2aGNqmKiL5oNW9a2Z9BWB1OcGzYRFSpsbrC4WsvhTykuPL EemoVz5AZJFWdTUMTaBl5Jbyt0BCEqumuHv8NBidCKzqkMeZ4ByHfbaZIyai/1rzPWfQ cJeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:cc:reply-to:from:list-subscribe:list-help :list-post:list-archive:list-unsubscribe:list-id:precedence :mime-version:user-agent:content-transfer-encoding:references :in-reply-to:date:to:subject:message-id:dmarc-filter:delivered-to :dkim-signature:dkim-filter; bh=7v41nV57nU5QomMn1Mk0hSs3RrXttG/dxmkEoCHsyTY=; b=OOp+gzf+7YeIUfNXqmSdkjI6ukxSyMSzwZIoQyiuUGXuOy3boxVnj3CCZjEWlOUCOs J3NqoafNQtgf6rhfJiBYaWGlM/zosx1fE0RPHA4C8vrc7XAt5OuHZYMjIrtdq/V8+Fu6 pHsNA3zpMKgV/GqfNSfLlOU+5Ne6F2N79pCiOuovZQE4Xz3th332qZUau1XqYHxd5QNf s2BAPWVLHunnBMEX0Gdl+ll8K4yOpq322yyTEEHmazJm6CEJScpxETrwcLjHz/bGwb1k 6DXxfvGESi/fH1KK8nIDgwbHHfYSUJzs9rBWyTUXLYjDXe8Z+JI8UgxfFNTbuc1r6r9s lrSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gcc.gnu.org header.s=default header.b=mDb7RyQP; spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnu.org Received: from sourceware.org (ip-8-43-85-97.sourceware.org. [8.43.85.97]) by mx.google.com with ESMTPS id oz18-20020a1709077d9200b0072f1c8d0e62si11397875ejc.95.2022.08.01.03.05.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 01 Aug 2022 03:05:46 -0700 (PDT) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) client-ip=8.43.85.97; Authentication-Results: mx.google.com; dkim=pass header.i=@gcc.gnu.org header.s=default header.b=mDb7RyQP; spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnu.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 173EA3858421 for ; Mon, 1 Aug 2022 10:05:45 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 173EA3858421 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1659348345; bh=7v41nV57nU5QomMn1Mk0hSs3RrXttG/dxmkEoCHsyTY=; h=Subject:To:Date:In-Reply-To:References:List-Id:List-Unsubscribe: List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To:Cc: From; b=mDb7RyQPAkKeiC9pctBh0jVP8IZdLX0d/BCtJiuulAgqUhV7QYcP5kcf5H9YDUfNS x6xsfXljpXtJkmp0T4g2bPqgg20437g37SIBAa6uzLSiW8LSGsuTc8dRug8CmpBiwe 6XrZ5UWBtS/yCkzBdyrZAPDPDXTmD11QnW90AUEs= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from xry111.site (xry111.site [IPv6:2001:470:683e::1]) by sourceware.org (Postfix) with ESMTPS id 81F513858C52 for ; Mon, 1 Aug 2022 10:04:56 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 81F513858C52 Received: from localhost.localdomain (xry111.site [IPv6:2001:470:683e::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-384) server-digest SHA384) (Client did not present a certificate) (Authenticated sender: xry111@xry111.site) by xry111.site (Postfix) with ESMTPSA id 0520B6678A; Mon, 1 Aug 2022 06:04:51 -0400 (EDT) Message-ID: Subject: [PATCH v4] LoongArch: add movable attribute To: Chenghua Xu , gcc-patches@gcc.gnu.org, Lulu Cheng Date: Mon, 01 Aug 2022 18:04:49 +0800 In-Reply-To: References: <9b6b0e68cfb7e87ae961ef8a7bb7987f534da19c.camel@xry111.site> User-Agent: Evolution 3.44.3 MIME-Version: 1.0 X-Spam-Status: No, score=-6.2 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FROM_SUSPICIOUS_NTLD, GIT_PATCH_0, KAM_SHORT, KAM_STOCKGEN, LIKELY_SPAM_FROM, PDS_OTHER_BAD_TLD, SPF_HELO_PASS, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Xi Ruoyao via Gcc-patches From: Xi Ruoyao Reply-To: Xi Ruoyao Cc: Jinyang He , Huacai Chen , Youling Tang , Wang Xuerui Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org Sender: "Gcc-patches" X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1739952851568647760?= X-GMAIL-MSGID: =?utf-8?q?1739952851568647760?= Changes v3 -> v4: * Use "movable" as the attribute name as Huacai says it's already used in downstream GCC fork. * Remove an inaccurate line from the doc. (Initially I tried to implement a "model(...)" like IA64 or M32R. Then I changed my mind but forgot to remove the line copied from M32R doc.) -- >8 -- A linker script and/or a section attribute may locate a local object in some way unexpected by the code model, leading to a link failure. This happens when the Linux kernel loads a module with "local" per-CPU variables. Add an attribute to explicitly mark an variable with the address unlimited by the code model so we would be able to work around such problems. gcc/ChangeLog: * config/loongarch/loongarch.cc (loongarch_attribute_table): New attribute table. (TARGET_ATTRIBUTE_TABLE): Define the target hook. (loongarch_handle_addr_global_attribute): New static function. (loongarch_classify_symbol): Return SYMBOL_GOT_DISP for SYMBOL_REF_DECL with addr_global attribute. (loongarch_use_anchors_for_symbol_p): New static function. (TARGET_USE_ANCHORS_FOR_SYMBOL_P): Define the target hook. * doc/extend.texi (Variable Attributes): Document new LoongArch specific attribute. gcc/testsuite/ChangeLog: * gcc.target/loongarch/addr-global.c: New test. --- gcc/config/loongarch/loongarch.cc | 63 +++++++++++++++++++ gcc/doc/extend.texi | 16 +++++ .../gcc.target/loongarch/attr-movable.c | 29 +++++++++ 3 files changed, 108 insertions(+) create mode 100644 gcc/testsuite/gcc.target/loongarch/attr-movable.c diff --git a/gcc/config/loongarch/loongarch.cc b/gcc/config/loongarch/loongarch.cc index 79687340dfd..6b6026700a6 100644 --- a/gcc/config/loongarch/loongarch.cc +++ b/gcc/config/loongarch/loongarch.cc @@ -1643,6 +1643,15 @@ loongarch_classify_symbol (const_rtx x) && !loongarch_symbol_binds_local_p (x)) return SYMBOL_GOT_DISP; + if (SYMBOL_REF_P (x)) + { + tree decl = SYMBOL_REF_DECL (x); + /* A movable symbol may be moved away from the +/- 2GiB range around + the PC, so we have to use GOT. */ + if (decl && lookup_attribute ("movable", DECL_ATTRIBUTES (decl))) + return SYMBOL_GOT_DISP; + } + return SYMBOL_PCREL; } @@ -6068,6 +6077,54 @@ loongarch_starting_frame_offset (void) return crtl->outgoing_args_size; } +static tree +loongarch_handle_movable_attribute (tree *node, tree name, tree, int, + bool *no_add_attrs) +{ + tree decl = *node; + if (TREE_CODE (decl) == VAR_DECL) + { + if (DECL_CONTEXT (decl) + && TREE_CODE (DECL_CONTEXT (decl)) == FUNCTION_DECL + && !TREE_STATIC (decl)) + { + error_at (DECL_SOURCE_LOCATION (decl), + "%qE attribute cannot be specified for local " + "variables", name); + *no_add_attrs = true; + } + } + else + { + warning (OPT_Wattributes, "%qE attribute ignored", name); + *no_add_attrs = true; + } + return NULL_TREE; +} + +static const struct attribute_spec loongarch_attribute_table[] = +{ + /* { name, min_len, max_len, decl_req, type_req, fn_type_req, + affects_type_identity, handler, exclude } */ + { "movable", 0, 0, true, false, false, false, + loongarch_handle_movable_attribute, NULL }, + /* The last attribute spec is set to be NULL. */ + {} +}; + +bool +loongarch_use_anchors_for_symbol_p (const_rtx symbol) +{ + tree decl = SYMBOL_REF_DECL (symbol); + + /* A movable attribute indicates the linker may move the symbol away, + so the use of anchor may cause relocation overflow. */ + if (decl && lookup_attribute ("movable", DECL_ATTRIBUTES (decl))) + return false; + + return default_use_anchors_for_symbol_p (symbol); +} + /* Initialize the GCC target structure. */ #undef TARGET_ASM_ALIGNED_HI_OP #define TARGET_ASM_ALIGNED_HI_OP "\t.half\t" @@ -6256,6 +6313,12 @@ loongarch_starting_frame_offset (void) #undef TARGET_HAVE_SPECULATION_SAFE_VALUE #define TARGET_HAVE_SPECULATION_SAFE_VALUE speculation_safe_value_not_needed +#undef TARGET_ATTRIBUTE_TABLE +#define TARGET_ATTRIBUTE_TABLE loongarch_attribute_table + +#undef TARGET_USE_ANCHORS_FOR_SYMBOL_P +#define TARGET_USE_ANCHORS_FOR_SYMBOL_P loongarch_use_anchors_for_symbol_p + struct gcc_target targetm = TARGET_INITIALIZER; #include "gt-loongarch.h" diff --git a/gcc/doc/extend.texi b/gcc/doc/extend.texi index 7fe7f8817cd..322d8c05a04 100644 --- a/gcc/doc/extend.texi +++ b/gcc/doc/extend.texi @@ -7314,6 +7314,7 @@ attributes. * Blackfin Variable Attributes:: * H8/300 Variable Attributes:: * IA-64 Variable Attributes:: +* LoongArch Variable Attributes:: * M32R/D Variable Attributes:: * MeP Variable Attributes:: * Microsoft Windows Variable Attributes:: @@ -8098,6 +8099,21 @@ defined by shared libraries. @end table +@node LoongArch Variable Attributes +@subsection LoongArch Variable Attributes + +One attribute is currently defined for the LoongArch. + +@table @code +@item movable +@cindex @code{movable} variable attribute, LoongArch +Use this attribute on the LoongArch to mark an object possible to be moved +by the linker, so its address is unlimited by the local data section range +specified by the code model even if the object is defined locally. This +attribute is mostly useful if a @code{section} attribute and/or a linker +script will move the object somewhere unexpected by the code model. +@end table + @node M32R/D Variable Attributes @subsection M32R/D Variable Attributes diff --git a/gcc/testsuite/gcc.target/loongarch/attr-movable.c b/gcc/testsuite/gcc.target/loongarch/attr-movable.c new file mode 100644 index 00000000000..85b1dd4c59a --- /dev/null +++ b/gcc/testsuite/gcc.target/loongarch/attr-movable.c @@ -0,0 +1,29 @@ +/* { dg-do compile } */ +/* { dg-options "-mexplicit-relocs -mcmodel=normal -O2" } */ +/* { dg-final { scan-assembler-not "%pc" } } */ +/* { dg-final { scan-assembler-times "%got_pc_hi20" 3 } } */ + +/* movable attribute should mark x and y possibly outside of the local + data range defined by the code model, so GOT should be used instead of + PC-relative. */ + +int x __attribute__((movable)); +int y __attribute__((movable)); + +int +test(void) +{ + return x + y; +} + +/* The following will be used for kernel per-cpu storage implemention. */ + +register char *per_cpu_base __asm__("r21"); +static int counter __attribute__((section(".data..percpu"), movable)); + +void +inc_counter(void) +{ + int *ptr = (int *)(per_cpu_base + (long)&counter); + (*ptr)++; +}