[llvm-bugs] [Bug 36221] New: Support for the mno-stack-arg-probe flag

via llvm-bugs llvm-bugs at lists.llvm.org
Sat Feb 3 00:53:33 PST 2018


https://bugs.llvm.org/show_bug.cgi?id=36221

            Bug ID: 36221
           Summary: Support for the mno-stack-arg-probe flag
           Product: libraries
           Version: trunk
          Hardware: PC
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P
         Component: Backend: X86
          Assignee: unassignedbugs at nondot.org
          Reporter: nruslan_devel at yahoo.com
                CC: llvm-bugs at lists.llvm.org

Created attachment 19802
  --> https://bugs.llvm.org/attachment.cgi?id=19802&action=edit
Patches for clang and LLVM

I created patches (attached) for LLVM and clang that add support for
mno-stack-arg-probe flag. This flag is supported by MinGW/GCC, and it
completely disables stack probes when compiling for PE/COFF (Windows)
executable targets. The patch includes changes for x86 as well as for ARM
(untested), AARCH64 (untested).

Although clang and LLVM already support a related stack-probe-size=<size> flag,
it does not seem to help when the stack usage is unknown at compile time, and
thus probes do not seem to be suppressed even if a very large value is
specified. For example, consider the following code:

extern void func2(void * buffer);

void func(unsigned long size)
{
    char buffer[size];
    func2(buffer);
}

/opt/llvm/bin/clang -Wall -O2 -target x86_64-pc-mingw32 -m64 -S
-mstack-probe-size=2147483647 test.c gives the following output (notice the
___chkstk_ms symbol):

func:                                   # @func
.Lcfi0:
.seh_proc func
# BB#0:
    pushq   %rbp
.Lcfi1:
    .seh_pushreg 5
    movq    %rsp, %rbp
.Lcfi2:
    .seh_setframe 5, 0
.Lcfi3:func:                                   # @func
.Lcfi0:
.seh_proc func
# BB#0:
    pushq   %rbp
.Lcfi1:
    .seh_pushreg 5
    movq    %rsp, %rbp
.Lcfi2:
    .seh_setframe 5, 0
.Lcfi3:func:                                   # @func
.Lcfi0:
.seh_proc func
# BB#0:
    pushq   %rbp
.Lcfi1:
    .seh_pushreg 5
    movq    %rsp, %rbp
.Lcfi2:
    .seh_setframe 5, 0
.Lcfi3:
    .seh_endprologue
    movl    %ecx, %ecx
    addq    $15, %rcx
    movabsq $8589934576, %rax       # imm = 0x1FFFFFFF0
    andq    %rcx, %rax
    callq   ___chkstk_ms
    subq    %rax, %rsp
    movq    %rsp, %rcx
    subq    $32, %rsp
    callq   func2
    nop
    movq    %rbp, %rsp
    popq    %rbp
    retq

With the patch attached, stack probes are no longer used.

/opt/llvm/bin/clang -Wall -O2 -target x86_64-pc-mingw32 -m64 -S
-mno-stack-arg-probe test.c

func:                                   # @func
.Lcfi0:
.seh_proc func
# BB#0:
    pushq   %rbp
.Lcfi1:
    .seh_pushreg 5
    movq    %rsp, %rbp
.Lcfi2:
    .seh_setframe 5, 0
.Lcfi3:
    .seh_endprologue
    movl    %ecx, %eax
    addq    $15, %rax
    movabsq $8589934576, %rax       # imm = 0x1FFFFFFF0
    subq    $-1, %rsp
    movq    %rsp, %rcx
    subq    $32, %rsp
    callq   func2
    nop
    movq    %rbp, %rsp
    popq    %rbp
    retq

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20180203/03993b9a/attachment.html>


More information about the llvm-bugs mailing list