https://gcc.gnu.org/g:3fd1c1a8640bf84c32695531a3ed81d4338409aa
commit r12-10905-g3fd1c1a8640bf84c32695531a3ed81d4338409aa Author: Richard Biener <rguent...@suse.de> Date: Mon Jan 9 12:46:28 2023 +0100 middle-end/69482 - not preserving volatile accesses The following addresses a long standing issue with not preserving accesses to non-volatile objects through volatile qualified pointers in the case that object gets expanded to a register. The fix is to treat accesses to an object with a volatile qualified access as forcing that object to memory. This issue got more exposed recently so it regressed more since GCC 11. PR middle-end/69482 * cfgexpand.cc (discover_nonconstant_array_refs_r): Volatile qualified accesses also force objects to memory. * gcc.target/i386/pr69482-1.c: New testcase. * gcc.target/i386/pr69482-2.c: Likewise. (cherry picked from commit a5a8242153d078f1ebe60f00409415da260a29ee) Diff: --- gcc/cfgexpand.cc | 9 +++++++++ gcc/testsuite/gcc.target/i386/pr69482-1.c | 16 ++++++++++++++++ gcc/testsuite/gcc.target/i386/pr69482-2.c | 10 ++++++++++ 3 files changed, 35 insertions(+) diff --git a/gcc/cfgexpand.cc b/gcc/cfgexpand.cc index eadec9a2bfd2..006f46fa9db3 100644 --- a/gcc/cfgexpand.cc +++ b/gcc/cfgexpand.cc @@ -6311,6 +6311,15 @@ discover_nonconstant_array_refs_r (tree * tp, int *walk_subtrees, if (IS_TYPE_OR_DECL_P (t)) *walk_subtrees = 0; + else if (REFERENCE_CLASS_P (t) && TREE_THIS_VOLATILE (t)) + { + t = get_base_address (t); + if (t && DECL_P (t) + && DECL_MODE (t) != BLKmode + && !TREE_ADDRESSABLE (t)) + bitmap_set_bit (forced_stack_vars, DECL_UID (t)); + *walk_subtrees = 0; + } else if (TREE_CODE (t) == ARRAY_REF || TREE_CODE (t) == ARRAY_RANGE_REF) { while (((TREE_CODE (t) == ARRAY_REF || TREE_CODE (t) == ARRAY_RANGE_REF) diff --git a/gcc/testsuite/gcc.target/i386/pr69482-1.c b/gcc/testsuite/gcc.target/i386/pr69482-1.c new file mode 100644 index 000000000000..7ef0e71b17c8 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/pr69482-1.c @@ -0,0 +1,16 @@ +/* { dg-do compile } */ +/* { dg-options "-O3 -fno-stack-protector -fomit-frame-pointer" } */ + +static inline void memset_s(void* s, int n) { + volatile unsigned char * p = s; + for(int i = 0; i < n; ++i) { + p[i] = 0; + } +} + +void test() { + unsigned char x[4]; + memset_s(x, sizeof x); +} + +/* { dg-final { scan-assembler-times "mov" 4 } } */ diff --git a/gcc/testsuite/gcc.target/i386/pr69482-2.c b/gcc/testsuite/gcc.target/i386/pr69482-2.c new file mode 100644 index 000000000000..6aabe4fb3939 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/pr69482-2.c @@ -0,0 +1,10 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -fomit-frame-pointer" } */ + +void bar () +{ + int j; + *(volatile int *)&j = 0; +} + +/* { dg-final { scan-assembler-times "mov" 1 } } */