]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/builtins.c
PR middle-end/81824 - Warn for missing attributes with function aliases
[thirdparty/gcc.git] / gcc / builtins.c
CommitLineData
53800dbe 1/* Expand builtin functions.
8e8f6434 2 Copyright (C) 1988-2018 Free Software Foundation, Inc.
53800dbe 3
f12b58b3 4This file is part of GCC.
53800dbe 5
f12b58b3 6GCC is free software; you can redistribute it and/or modify it under
7the terms of the GNU General Public License as published by the Free
8c4c00c1 8Software Foundation; either version 3, or (at your option) any later
f12b58b3 9version.
53800dbe 10
f12b58b3 11GCC is distributed in the hope that it will be useful, but WITHOUT ANY
12WARRANTY; without even the implied warranty of MERCHANTABILITY or
13FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14for more details.
53800dbe 15
16You should have received a copy of the GNU General Public License
8c4c00c1 17along with GCC; see the file COPYING3. If not see
18<http://www.gnu.org/licenses/>. */
53800dbe 19
7c2ecb89 20/* Legacy warning! Please add no further builtin simplifications here
21 (apart from pure constant folding) - builtin simplifications should go
22 to match.pd or gimple-fold.c instead. */
23
53800dbe 24#include "config.h"
25#include "system.h"
805e22b2 26#include "coretypes.h"
9ef16211 27#include "backend.h"
7c29e30e 28#include "target.h"
29#include "rtl.h"
9ef16211 30#include "tree.h"
ea36272b 31#include "memmodel.h"
9ef16211 32#include "gimple.h"
7c29e30e 33#include "predict.h"
a950155e 34#include "params.h"
7c29e30e 35#include "tm_p.h"
36#include "stringpool.h"
c296f633 37#include "tree-vrp.h"
7c29e30e 38#include "tree-ssanames.h"
39#include "expmed.h"
40#include "optabs.h"
7c29e30e 41#include "emit-rtl.h"
42#include "recog.h"
7c29e30e 43#include "diagnostic-core.h"
b20a8bb4 44#include "alias.h"
b20a8bb4 45#include "fold-const.h"
6c21be92 46#include "fold-const-call.h"
e6a18b5a 47#include "gimple-ssa-warn-restrict.h"
9ed99284 48#include "stor-layout.h"
49#include "calls.h"
50#include "varasm.h"
51#include "tree-object-size.h"
dae0b5cb 52#include "realmpfr.h"
94ea8568 53#include "cfgrtl.h"
53800dbe 54#include "except.h"
d53441c8 55#include "dojump.h"
56#include "explow.h"
d53441c8 57#include "stmt.h"
53800dbe 58#include "expr.h"
d8fc4d0b 59#include "libfuncs.h"
53800dbe 60#include "output.h"
61#include "typeclass.h"
63c62881 62#include "langhooks.h"
162719b3 63#include "value-prof.h"
3b9c3a16 64#include "builtins.h"
30a86690 65#include "stringpool.h"
66#include "attribs.h"
f9acf11a 67#include "asan.h"
1f24b8e9 68#include "internal-fn.h"
e3240774 69#include "case-cfn-macros.h"
732905bb 70#include "gimple-fold.h"
5aef8938 71#include "intl.h"
859b51f8 72#include "file-prefix-map.h" /* remap_macro_filename() */
a7babc1e 73#include "gomp-constants.h"
74#include "omp-general.h"
5383fb56 75
3b9c3a16 76struct target_builtins default_target_builtins;
77#if SWITCHABLE_TARGET
78struct target_builtins *this_target_builtins = &default_target_builtins;
79#endif
80
ab7943b9 81/* Define the names of the builtin function types and codes. */
96423453 82const char *const built_in_class_names[BUILT_IN_LAST]
ab7943b9 83 = {"NOT_BUILT_IN", "BUILT_IN_FRONTEND", "BUILT_IN_MD", "BUILT_IN_NORMAL"};
84
9cfddb70 85#define DEF_BUILTIN(X, N, C, T, LT, B, F, NA, AT, IM, COND) #X,
0dfc45b5 86const char * built_in_names[(int) END_BUILTINS] =
4e9d90c7 87{
88#include "builtins.def"
89};
ab7943b9 90
cffdfb3d 91/* Setup an array of builtin_info_type, make sure each element decl is
df94cd3b 92 initialized to NULL_TREE. */
cffdfb3d 93builtin_info_type builtin_info[(int)END_BUILTINS];
df94cd3b 94
0b049e15 95/* Non-zero if __builtin_constant_p should be folded right away. */
96bool force_folding_builtin_constant_p;
97
f77c4496 98static rtx c_readstr (const char *, scalar_int_mode);
aecda0d6 99static int target_char_cast (tree, char *);
d8ae1baa 100static rtx get_memory_rtx (tree, tree);
aecda0d6 101static int apply_args_size (void);
102static int apply_result_size (void);
aecda0d6 103static rtx result_vector (int, rtx);
aecda0d6 104static void expand_builtin_prefetch (tree);
105static rtx expand_builtin_apply_args (void);
106static rtx expand_builtin_apply_args_1 (void);
107static rtx expand_builtin_apply (rtx, rtx, rtx);
108static void expand_builtin_return (rtx);
109static enum type_class type_to_class (tree);
110static rtx expand_builtin_classify_type (tree);
6b43bae4 111static rtx expand_builtin_mathfn_3 (tree, rtx, rtx);
7e0713b1 112static rtx expand_builtin_mathfn_ternary (tree, rtx, rtx);
f97eea22 113static rtx expand_builtin_interclass_mathfn (tree, rtx);
c3147c1a 114static rtx expand_builtin_sincos (tree);
f97eea22 115static rtx expand_builtin_cexpi (tree, rtx);
ff1b14e4 116static rtx expand_builtin_int_roundingfn (tree, rtx);
117static rtx expand_builtin_int_roundingfn_2 (tree, rtx);
79012a9d 118static rtx expand_builtin_next_arg (void);
aecda0d6 119static rtx expand_builtin_va_start (tree);
120static rtx expand_builtin_va_end (tree);
121static rtx expand_builtin_va_copy (tree);
0dbefa15 122static rtx inline_expand_builtin_string_cmp (tree, rtx);
a65c4d64 123static rtx expand_builtin_strcmp (tree, rtx);
3754d046 124static rtx expand_builtin_strncmp (tree, rtx, machine_mode);
f77c4496 125static rtx builtin_memcpy_read_str (void *, HOST_WIDE_INT, scalar_int_mode);
8d6c6ef5 126static rtx expand_builtin_memchr (tree, rtx);
a65c4d64 127static rtx expand_builtin_memcpy (tree, rtx);
d0fbba1a 128static rtx expand_builtin_memory_copy_args (tree dest, tree src, tree len,
129 rtx target, tree exp, int endp);
4d317237 130static rtx expand_builtin_memmove (tree, rtx);
d0fbba1a 131static rtx expand_builtin_mempcpy (tree, rtx);
d0fbba1a 132static rtx expand_builtin_mempcpy_args (tree, tree, tree, rtx, tree, int);
5aef8938 133static rtx expand_builtin_strcat (tree, rtx);
a65c4d64 134static rtx expand_builtin_strcpy (tree, rtx);
a788aa5f 135static rtx expand_builtin_strcpy_args (tree, tree, tree, rtx);
3754d046 136static rtx expand_builtin_stpcpy (tree, rtx, machine_mode);
4d317237 137static rtx expand_builtin_stpncpy (tree, rtx);
5aef8938 138static rtx expand_builtin_strncat (tree, rtx);
a65c4d64 139static rtx expand_builtin_strncpy (tree, rtx);
f77c4496 140static rtx builtin_memset_gen_str (void *, HOST_WIDE_INT, scalar_int_mode);
3754d046 141static rtx expand_builtin_memset (tree, rtx, machine_mode);
142static rtx expand_builtin_memset_args (tree, tree, tree, rtx, machine_mode, tree);
aecda0d6 143static rtx expand_builtin_bzero (tree);
3754d046 144static rtx expand_builtin_strlen (tree, rtx, machine_mode);
864bd5de 145static rtx expand_builtin_strnlen (tree, rtx, machine_mode);
2b29cc6a 146static rtx expand_builtin_alloca (tree);
3754d046 147static rtx expand_builtin_unop (machine_mode, tree, rtx, rtx, optab);
aecda0d6 148static rtx expand_builtin_frame_address (tree, tree);
389dd41b 149static tree stabilize_va_list_loc (location_t, tree, int);
aecda0d6 150static rtx expand_builtin_expect (tree, rtx);
01107f42 151static rtx expand_builtin_expect_with_probability (tree, rtx);
aecda0d6 152static tree fold_builtin_constant_p (tree);
153static tree fold_builtin_classify_type (tree);
c7cbde74 154static tree fold_builtin_strlen (location_t, tree, tree);
389dd41b 155static tree fold_builtin_inf (location_t, tree, int);
389dd41b 156static tree rewrite_call_expr (location_t, tree, int, tree, int, ...);
184fac50 157static bool validate_arg (const_tree, enum tree_code code);
aecda0d6 158static rtx expand_builtin_fabs (tree, rtx, rtx);
27f261ef 159static rtx expand_builtin_signbit (tree, rtx);
389dd41b 160static tree fold_builtin_memcmp (location_t, tree, tree, tree);
389dd41b 161static tree fold_builtin_isascii (location_t, tree);
162static tree fold_builtin_toascii (location_t, tree);
163static tree fold_builtin_isdigit (location_t, tree);
164static tree fold_builtin_fabs (location_t, tree, tree);
165static tree fold_builtin_abs (location_t, tree, tree);
166static tree fold_builtin_unordered_cmp (location_t, tree, tree, tree, enum tree_code,
d5019fe8 167 enum tree_code);
e80cc485 168static tree fold_builtin_0 (location_t, tree);
169static tree fold_builtin_1 (location_t, tree, tree);
170static tree fold_builtin_2 (location_t, tree, tree, tree);
171static tree fold_builtin_3 (location_t, tree, tree, tree, tree);
12f08300 172static tree fold_builtin_varargs (location_t, tree, tree*, int);
389dd41b 173
174static tree fold_builtin_strpbrk (location_t, tree, tree, tree);
389dd41b 175static tree fold_builtin_strspn (location_t, tree, tree);
176static tree fold_builtin_strcspn (location_t, tree, tree);
4ee9c684 177
0a39fd54 178static rtx expand_builtin_object_size (tree);
3754d046 179static rtx expand_builtin_memory_chk (tree, rtx, machine_mode,
0a39fd54 180 enum built_in_function);
181static void maybe_emit_chk_warning (tree, enum built_in_function);
182static void maybe_emit_sprintf_chk_warning (tree, enum built_in_function);
2c281b15 183static void maybe_emit_free_warning (tree);
c2f47e15 184static tree fold_builtin_object_size (tree, tree);
99eabcc1 185
e788f202 186unsigned HOST_WIDE_INT target_newline;
b9ea678c 187unsigned HOST_WIDE_INT target_percent;
99eabcc1 188static unsigned HOST_WIDE_INT target_c;
189static unsigned HOST_WIDE_INT target_s;
aea88c77 190char target_percent_c[3];
b9ea678c 191char target_percent_s[3];
e788f202 192char target_percent_s_newline[4];
e5407ca6 193static tree do_mpfr_remquo (tree, tree, tree);
e84da7c1 194static tree do_mpfr_lgamma_r (tree, tree, tree);
1cd6e20d 195static void expand_builtin_sync_synchronize (void);
0a39fd54 196
7bfefa9d 197/* Return true if NAME starts with __builtin_ or __sync_. */
198
b29139ad 199static bool
1c47b3e8 200is_builtin_name (const char *name)
b6a5fc45 201{
b6a5fc45 202 if (strncmp (name, "__builtin_", 10) == 0)
203 return true;
204 if (strncmp (name, "__sync_", 7) == 0)
205 return true;
1cd6e20d 206 if (strncmp (name, "__atomic_", 9) == 0)
207 return true;
b6a5fc45 208 return false;
209}
4ee9c684 210
1c47b3e8 211/* Return true if NODE should be considered for inline expansion regardless
212 of the optimization level. This means whenever a function is invoked with
213 its "internal" name, which normally contains the prefix "__builtin". */
214
ae62deea 215bool
1c47b3e8 216called_as_built_in (tree node)
217{
218 /* Note that we must use DECL_NAME, not DECL_ASSEMBLER_NAME_SET_P since
219 we want the name used to call the function, not the name it
220 will have. */
221 const char *name = IDENTIFIER_POINTER (DECL_NAME (node));
222 return is_builtin_name (name);
223}
224
ceea063b 225/* Compute values M and N such that M divides (address of EXP - N) and such
226 that N < M. If these numbers can be determined, store M in alignp and N in
227 *BITPOSP and return true. Otherwise return false and store BITS_PER_UNIT to
228 *alignp and any bit-offset to *bitposp.
0d8f7716 229
230 Note that the address (and thus the alignment) computed here is based
231 on the address to which a symbol resolves, whereas DECL_ALIGN is based
232 on the address at which an object is actually located. These two
233 addresses are not always the same. For example, on ARM targets,
234 the address &foo of a Thumb function foo() has the lowest bit set,
3482bf13 235 whereas foo() itself starts on an even address.
698537d1 236
3482bf13 237 If ADDR_P is true we are taking the address of the memory reference EXP
238 and thus cannot rely on the access taking place. */
239
240static bool
241get_object_alignment_2 (tree exp, unsigned int *alignp,
242 unsigned HOST_WIDE_INT *bitposp, bool addr_p)
698537d1 243{
eaa09bfd 244 poly_int64 bitsize, bitpos;
98ab9e8f 245 tree offset;
3754d046 246 machine_mode mode;
292237f3 247 int unsignedp, reversep, volatilep;
c8a2b4ff 248 unsigned int align = BITS_PER_UNIT;
ceea063b 249 bool known_alignment = false;
698537d1 250
98ab9e8f 251 /* Get the innermost object and the constant (bitpos) and possibly
252 variable (offset) offset of the access. */
292237f3 253 exp = get_inner_reference (exp, &bitsize, &bitpos, &offset, &mode,
b3b6e4b5 254 &unsignedp, &reversep, &volatilep);
98ab9e8f 255
256 /* Extract alignment information from the innermost object and
257 possibly adjust bitpos and offset. */
3482bf13 258 if (TREE_CODE (exp) == FUNCTION_DECL)
0d8f7716 259 {
3482bf13 260 /* Function addresses can encode extra information besides their
261 alignment. However, if TARGET_PTRMEMFUNC_VBIT_LOCATION
262 allows the low bit to be used as a virtual bit, we know
263 that the address itself must be at least 2-byte aligned. */
264 if (TARGET_PTRMEMFUNC_VBIT_LOCATION == ptrmemfunc_vbit_in_pfn)
265 align = 2 * BITS_PER_UNIT;
0d8f7716 266 }
3482bf13 267 else if (TREE_CODE (exp) == LABEL_DECL)
268 ;
269 else if (TREE_CODE (exp) == CONST_DECL)
98ab9e8f 270 {
3482bf13 271 /* The alignment of a CONST_DECL is determined by its initializer. */
272 exp = DECL_INITIAL (exp);
98ab9e8f 273 align = TYPE_ALIGN (TREE_TYPE (exp));
3482bf13 274 if (CONSTANT_CLASS_P (exp))
579d67ba 275 align = targetm.constant_alignment (exp, align);
e532afed 276
3482bf13 277 known_alignment = true;
98ab9e8f 278 }
3482bf13 279 else if (DECL_P (exp))
ceea063b 280 {
3482bf13 281 align = DECL_ALIGN (exp);
ceea063b 282 known_alignment = true;
ceea063b 283 }
3482bf13 284 else if (TREE_CODE (exp) == INDIRECT_REF
285 || TREE_CODE (exp) == MEM_REF
286 || TREE_CODE (exp) == TARGET_MEM_REF)
98ab9e8f 287 {
288 tree addr = TREE_OPERAND (exp, 0);
ceea063b 289 unsigned ptr_align;
290 unsigned HOST_WIDE_INT ptr_bitpos;
ab1e78e5 291 unsigned HOST_WIDE_INT ptr_bitmask = ~0;
ceea063b 292
ab1e78e5 293 /* If the address is explicitely aligned, handle that. */
98ab9e8f 294 if (TREE_CODE (addr) == BIT_AND_EXPR
295 && TREE_CODE (TREE_OPERAND (addr, 1)) == INTEGER_CST)
296 {
ab1e78e5 297 ptr_bitmask = TREE_INT_CST_LOW (TREE_OPERAND (addr, 1));
298 ptr_bitmask *= BITS_PER_UNIT;
ac29ece2 299 align = least_bit_hwi (ptr_bitmask);
98ab9e8f 300 addr = TREE_OPERAND (addr, 0);
301 }
ceea063b 302
3482bf13 303 known_alignment
304 = get_pointer_alignment_1 (addr, &ptr_align, &ptr_bitpos);
3482bf13 305 align = MAX (ptr_align, align);
306
ab1e78e5 307 /* Re-apply explicit alignment to the bitpos. */
308 ptr_bitpos &= ptr_bitmask;
309
4083990a 310 /* The alignment of the pointer operand in a TARGET_MEM_REF
311 has to take the variable offset parts into account. */
3482bf13 312 if (TREE_CODE (exp) == TARGET_MEM_REF)
153c3b50 313 {
3482bf13 314 if (TMR_INDEX (exp))
315 {
316 unsigned HOST_WIDE_INT step = 1;
317 if (TMR_STEP (exp))
f9ae6f95 318 step = TREE_INT_CST_LOW (TMR_STEP (exp));
ac29ece2 319 align = MIN (align, least_bit_hwi (step) * BITS_PER_UNIT);
3482bf13 320 }
321 if (TMR_INDEX2 (exp))
322 align = BITS_PER_UNIT;
323 known_alignment = false;
153c3b50 324 }
ceea063b 325
3482bf13 326 /* When EXP is an actual memory reference then we can use
327 TYPE_ALIGN of a pointer indirection to derive alignment.
328 Do so only if get_pointer_alignment_1 did not reveal absolute
4083990a 329 alignment knowledge and if using that alignment would
330 improve the situation. */
700a9760 331 unsigned int talign;
4083990a 332 if (!addr_p && !known_alignment
700a9760 333 && (talign = min_align_of_type (TREE_TYPE (exp)) * BITS_PER_UNIT)
334 && talign > align)
335 align = talign;
4083990a 336 else
337 {
338 /* Else adjust bitpos accordingly. */
339 bitpos += ptr_bitpos;
340 if (TREE_CODE (exp) == MEM_REF
341 || TREE_CODE (exp) == TARGET_MEM_REF)
90ca1268 342 bitpos += mem_ref_offset (exp).force_shwi () * BITS_PER_UNIT;
4083990a 343 }
98ab9e8f 344 }
3482bf13 345 else if (TREE_CODE (exp) == STRING_CST)
153c3b50 346 {
3482bf13 347 /* STRING_CST are the only constant objects we allow to be not
348 wrapped inside a CONST_DECL. */
349 align = TYPE_ALIGN (TREE_TYPE (exp));
3482bf13 350 if (CONSTANT_CLASS_P (exp))
579d67ba 351 align = targetm.constant_alignment (exp, align);
e532afed 352
3482bf13 353 known_alignment = true;
98ab9e8f 354 }
98ab9e8f 355
356 /* If there is a non-constant offset part extract the maximum
357 alignment that can prevail. */
c8a2b4ff 358 if (offset)
98ab9e8f 359 {
ad464c56 360 unsigned int trailing_zeros = tree_ctz (offset);
c8a2b4ff 361 if (trailing_zeros < HOST_BITS_PER_INT)
98ab9e8f 362 {
c8a2b4ff 363 unsigned int inner = (1U << trailing_zeros) * BITS_PER_UNIT;
364 if (inner)
365 align = MIN (align, inner);
98ab9e8f 366 }
98ab9e8f 367 }
368
eaa09bfd 369 /* Account for the alignment of runtime coefficients, so that the constant
370 bitpos is guaranteed to be accurate. */
371 unsigned int alt_align = ::known_alignment (bitpos - bitpos.coeffs[0]);
372 if (alt_align != 0 && alt_align < align)
373 {
374 align = alt_align;
375 known_alignment = false;
376 }
377
3482bf13 378 *alignp = align;
eaa09bfd 379 *bitposp = bitpos.coeffs[0] & (align - 1);
ceea063b 380 return known_alignment;
0c883ef3 381}
382
3482bf13 383/* For a memory reference expression EXP compute values M and N such that M
384 divides (&EXP - N) and such that N < M. If these numbers can be determined,
385 store M in alignp and N in *BITPOSP and return true. Otherwise return false
386 and store BITS_PER_UNIT to *alignp and any bit-offset to *bitposp. */
387
388bool
389get_object_alignment_1 (tree exp, unsigned int *alignp,
390 unsigned HOST_WIDE_INT *bitposp)
391{
392 return get_object_alignment_2 (exp, alignp, bitposp, false);
393}
394
957d0361 395/* Return the alignment in bits of EXP, an object. */
0c883ef3 396
397unsigned int
957d0361 398get_object_alignment (tree exp)
0c883ef3 399{
400 unsigned HOST_WIDE_INT bitpos = 0;
401 unsigned int align;
402
ceea063b 403 get_object_alignment_1 (exp, &align, &bitpos);
0c883ef3 404
98ab9e8f 405 /* align and bitpos now specify known low bits of the pointer.
406 ptr & (align - 1) == bitpos. */
407
408 if (bitpos != 0)
ac29ece2 409 align = least_bit_hwi (bitpos);
957d0361 410 return align;
698537d1 411}
412
ceea063b 413/* For a pointer valued expression EXP compute values M and N such that M
414 divides (EXP - N) and such that N < M. If these numbers can be determined,
3482bf13 415 store M in alignp and N in *BITPOSP and return true. Return false if
416 the results are just a conservative approximation.
53800dbe 417
ceea063b 418 If EXP is not a pointer, false is returned too. */
53800dbe 419
ceea063b 420bool
421get_pointer_alignment_1 (tree exp, unsigned int *alignp,
422 unsigned HOST_WIDE_INT *bitposp)
53800dbe 423{
153c3b50 424 STRIP_NOPS (exp);
535e2026 425
153c3b50 426 if (TREE_CODE (exp) == ADDR_EXPR)
3482bf13 427 return get_object_alignment_2 (TREE_OPERAND (exp, 0),
428 alignp, bitposp, true);
906a9403 429 else if (TREE_CODE (exp) == POINTER_PLUS_EXPR)
430 {
431 unsigned int align;
432 unsigned HOST_WIDE_INT bitpos;
433 bool res = get_pointer_alignment_1 (TREE_OPERAND (exp, 0),
434 &align, &bitpos);
435 if (TREE_CODE (TREE_OPERAND (exp, 1)) == INTEGER_CST)
436 bitpos += TREE_INT_CST_LOW (TREE_OPERAND (exp, 1)) * BITS_PER_UNIT;
437 else
438 {
439 unsigned int trailing_zeros = tree_ctz (TREE_OPERAND (exp, 1));
440 if (trailing_zeros < HOST_BITS_PER_INT)
441 {
442 unsigned int inner = (1U << trailing_zeros) * BITS_PER_UNIT;
443 if (inner)
444 align = MIN (align, inner);
445 }
446 }
447 *alignp = align;
448 *bitposp = bitpos & (align - 1);
449 return res;
450 }
153c3b50 451 else if (TREE_CODE (exp) == SSA_NAME
452 && POINTER_TYPE_P (TREE_TYPE (exp)))
53800dbe 453 {
ceea063b 454 unsigned int ptr_align, ptr_misalign;
153c3b50 455 struct ptr_info_def *pi = SSA_NAME_PTR_INFO (exp);
ceea063b 456
457 if (pi && get_ptr_info_alignment (pi, &ptr_align, &ptr_misalign))
458 {
459 *bitposp = ptr_misalign * BITS_PER_UNIT;
460 *alignp = ptr_align * BITS_PER_UNIT;
d10da77a 461 /* Make sure to return a sensible alignment when the multiplication
462 by BITS_PER_UNIT overflowed. */
463 if (*alignp == 0)
464 *alignp = 1u << (HOST_BITS_PER_INT - 1);
3482bf13 465 /* We cannot really tell whether this result is an approximation. */
b428654a 466 return false;
ceea063b 467 }
468 else
69fbc3aa 469 {
470 *bitposp = 0;
ceea063b 471 *alignp = BITS_PER_UNIT;
472 return false;
69fbc3aa 473 }
53800dbe 474 }
0bb8b39a 475 else if (TREE_CODE (exp) == INTEGER_CST)
476 {
477 *alignp = BIGGEST_ALIGNMENT;
f9ae6f95 478 *bitposp = ((TREE_INT_CST_LOW (exp) * BITS_PER_UNIT)
0bb8b39a 479 & (BIGGEST_ALIGNMENT - 1));
480 return true;
481 }
153c3b50 482
69fbc3aa 483 *bitposp = 0;
ceea063b 484 *alignp = BITS_PER_UNIT;
485 return false;
53800dbe 486}
487
69fbc3aa 488/* Return the alignment in bits of EXP, a pointer valued expression.
489 The alignment returned is, by default, the alignment of the thing that
490 EXP points to. If it is not a POINTER_TYPE, 0 is returned.
491
492 Otherwise, look at the expression to see if we can do better, i.e., if the
493 expression is actually pointing at an object whose alignment is tighter. */
494
495unsigned int
496get_pointer_alignment (tree exp)
497{
498 unsigned HOST_WIDE_INT bitpos = 0;
499 unsigned int align;
ceea063b 500
501 get_pointer_alignment_1 (exp, &align, &bitpos);
69fbc3aa 502
503 /* align and bitpos now specify known low bits of the pointer.
504 ptr & (align - 1) == bitpos. */
505
506 if (bitpos != 0)
ac29ece2 507 align = least_bit_hwi (bitpos);
69fbc3aa 508
509 return align;
510}
511
c4183f31 512/* Return the number of leading non-zero elements in the sequence
c62d63d4 513 [ PTR, PTR + MAXELTS ) where each element's size is ELTSIZE bytes.
514 ELTSIZE must be a power of 2 less than 8. Used by c_strlen. */
515
c4183f31 516unsigned
c62d63d4 517string_length (const void *ptr, unsigned eltsize, unsigned maxelts)
518{
519 gcc_checking_assert (eltsize == 1 || eltsize == 2 || eltsize == 4);
520
521 unsigned n;
522
523 if (eltsize == 1)
524 {
525 /* Optimize the common case of plain char. */
526 for (n = 0; n < maxelts; n++)
527 {
528 const char *elt = (const char*) ptr + n;
529 if (!*elt)
530 break;
531 }
532 }
533 else
534 {
535 for (n = 0; n < maxelts; n++)
536 {
537 const char *elt = (const char*) ptr + n * eltsize;
538 if (!memcmp (elt, "\0\0\0\0", eltsize))
539 break;
540 }
541 }
542 return n;
543}
544
7af57b1c 545/* For a call at LOC to a function FN that expects a string in the argument
546 ARG, issue a diagnostic due to it being a called with an argument
547 declared at NONSTR that is a character array with no terminating NUL. */
548
549void
550warn_string_no_nul (location_t loc, const char *fn, tree arg, tree decl)
551{
552 if (TREE_NO_WARNING (arg))
553 return;
554
555 loc = expansion_point_location_if_in_system_header (loc);
556
557 if (warning_at (loc, OPT_Wstringop_overflow_,
558 "%qs argument missing terminating nul", fn))
559 {
560 inform (DECL_SOURCE_LOCATION (decl),
561 "referenced argument declared here");
562 TREE_NO_WARNING (arg) = 1;
563 }
564}
565
a788aa5f 566/* If EXP refers to an unterminated constant character array return
567 the declaration of the object of which the array is a member or
fec27bf2 568 element and if SIZE is not null, set *SIZE to the size of
569 the unterminated array and set *EXACT if the size is exact or
570 clear it otherwise. Otherwise return null. */
a788aa5f 571
50e57712 572tree
fec27bf2 573unterminated_array (tree exp, tree *size /* = NULL */, bool *exact /* = NULL */)
a788aa5f 574{
fec27bf2 575 /* C_STRLEN will return NULL and set DECL in the info
576 structure if EXP references a unterminated array. */
2b84b289 577 c_strlen_data data;
578 memset (&data, 0, sizeof (c_strlen_data));
fec27bf2 579 tree len = c_strlen (exp, 1, &data);
580 if (len == NULL_TREE && data.len && data.decl)
581 {
582 if (size)
583 {
584 len = data.len;
585 if (data.off)
586 {
587 /* Constant offsets are already accounted for in data.len, but
588 not in a SSA_NAME + CST expression. */
589 if (TREE_CODE (data.off) == INTEGER_CST)
590 *exact = true;
591 else if (TREE_CODE (data.off) == PLUS_EXPR
592 && TREE_CODE (TREE_OPERAND (data.off, 1)) == INTEGER_CST)
593 {
594 /* Subtract the offset from the size of the array. */
595 *exact = false;
596 tree temp = TREE_OPERAND (data.off, 1);
597 temp = fold_convert (ssizetype, temp);
598 len = fold_build2 (MINUS_EXPR, ssizetype, len, temp);
599 }
600 else
601 *exact = false;
602 }
603 else
604 *exact = true;
605
606 *size = len;
607 }
608 return data.decl;
609 }
610
611 return NULL_TREE;
a788aa5f 612}
613
c62d63d4 614/* Compute the length of a null-terminated character string or wide
615 character string handling character sizes of 1, 2, and 4 bytes.
616 TREE_STRING_LENGTH is not the right way because it evaluates to
617 the size of the character array in bytes (as opposed to characters)
618 and because it can contain a zero byte in the middle.
53800dbe 619
4172d65e 620 ONLY_VALUE should be nonzero if the result is not going to be emitted
c09841f6 621 into the instruction stream and zero if it is going to be expanded.
4172d65e 622 E.g. with i++ ? "foo" : "bar", if ONLY_VALUE is nonzero, constant 3
681fab1e 623 is returned, otherwise NULL, since
624 len = c_strlen (src, 1); if (len) expand_expr (len, ...); would not
625 evaluate the side-effects.
626
6bda159e 627 If ONLY_VALUE is two then we do not emit warnings about out-of-bound
628 accesses. Note that this implies the result is not going to be emitted
629 into the instruction stream.
630
2b84b289 631 Additional information about the string accessed may be recorded
632 in DATA. For example, if SRC references an unterminated string,
633 then the declaration will be stored in the DECL field. If the
634 length of the unterminated string can be determined, it'll be
635 stored in the LEN field. Note this length could well be different
636 than what a C strlen call would return.
7af57b1c 637
893c4605 638 ELTSIZE is 1 for normal single byte character strings, and 2 or
639 4 for wide characer strings. ELTSIZE is by default 1.
902de8ed 640
893c4605 641 The value returned is of type `ssizetype'. */
53800dbe 642
4ee9c684 643tree
2b84b289 644c_strlen (tree src, int only_value, c_strlen_data *data, unsigned eltsize)
53800dbe 645{
2b84b289 646 /* If we were not passed a DATA pointer, then get one to a local
647 structure. That avoids having to check DATA for NULL before
648 each time we want to use it. */
649 c_strlen_data local_strlen_data;
650 memset (&local_strlen_data, 0, sizeof (c_strlen_data));
651 if (!data)
652 data = &local_strlen_data;
653
2a0aa722 654 gcc_checking_assert (eltsize == 1 || eltsize == 2 || eltsize == 4);
681fab1e 655 STRIP_NOPS (src);
656 if (TREE_CODE (src) == COND_EXPR
657 && (only_value || !TREE_SIDE_EFFECTS (TREE_OPERAND (src, 0))))
658 {
659 tree len1, len2;
660
2b84b289 661 len1 = c_strlen (TREE_OPERAND (src, 1), only_value, data, eltsize);
662 len2 = c_strlen (TREE_OPERAND (src, 2), only_value, data, eltsize);
0862b7e9 663 if (tree_int_cst_equal (len1, len2))
681fab1e 664 return len1;
665 }
666
667 if (TREE_CODE (src) == COMPOUND_EXPR
668 && (only_value || !TREE_SIDE_EFFECTS (TREE_OPERAND (src, 0))))
2b84b289 669 return c_strlen (TREE_OPERAND (src, 1), only_value, data, eltsize);
681fab1e 670
c62d63d4 671 location_t loc = EXPR_LOC_OR_LOC (src, input_location);
da136652 672
c62d63d4 673 /* Offset from the beginning of the string in bytes. */
674 tree byteoff;
893c4605 675 tree memsize;
7af57b1c 676 tree decl;
677 src = string_constant (src, &byteoff, &memsize, &decl);
53800dbe 678 if (src == 0)
c2f47e15 679 return NULL_TREE;
902de8ed 680
c62d63d4 681 /* Determine the size of the string element. */
893c4605 682 if (eltsize != tree_to_uhwi (TYPE_SIZE_UNIT (TREE_TYPE (TREE_TYPE (src)))))
683 return NULL_TREE;
c62d63d4 684
685 /* Set MAXELTS to sizeof (SRC) / sizeof (*SRC) - 1, the maximum possible
47d2cd73 686 length of SRC. Prefer TYPE_SIZE() to TREE_STRING_LENGTH() if possible
c4183f31 687 in case the latter is less than the size of the array, such as when
688 SRC refers to a short string literal used to initialize a large array.
689 In that case, the elements of the array after the terminating NUL are
690 all NUL. */
691 HOST_WIDE_INT strelts = TREE_STRING_LENGTH (src);
9b7116a1 692 strelts = strelts / eltsize;
c4183f31 693
893c4605 694 if (!tree_fits_uhwi_p (memsize))
695 return NULL_TREE;
696
9b7116a1 697 HOST_WIDE_INT maxelts = tree_to_uhwi (memsize) / eltsize;
c62d63d4 698
699 /* PTR can point to the byte representation of any string type, including
700 char* and wchar_t*. */
701 const char *ptr = TREE_STRING_POINTER (src);
902de8ed 702
c62d63d4 703 if (byteoff && TREE_CODE (byteoff) != INTEGER_CST)
53800dbe 704 {
893c4605 705 /* The code below works only for single byte character types. */
706 if (eltsize != 1)
707 return NULL_TREE;
708
c4183f31 709 /* If the string has an internal NUL character followed by any
710 non-NUL characters (e.g., "foo\0bar"), we can't compute
711 the offset to the following NUL if we don't know where to
53800dbe 712 start searching for it. */
c4183f31 713 unsigned len = string_length (ptr, eltsize, strelts);
902de8ed 714
2b84b289 715 /* Return when an embedded null character is found or none at all.
716 In the latter case, set the DECL/LEN field in the DATA structure
717 so that callers may examine them. */
7af57b1c 718 if (len + 1 < strelts)
893c4605 719 return NULL_TREE;
7af57b1c 720 else if (len >= maxelts)
721 {
2b84b289 722 data->decl = decl;
fec27bf2 723 data->off = byteoff;
2b84b289 724 data->len = ssize_int (len);
7af57b1c 725 return NULL_TREE;
726 }
d5d661d5 727
9b7116a1 728 /* For empty strings the result should be zero. */
729 if (len == 0)
730 return ssize_int (0);
731
53800dbe 732 /* We don't know the starting offset, but we do know that the string
c4183f31 733 has no internal zero bytes. If the offset falls within the bounds
734 of the string subtract the offset from the length of the string,
735 and return that. Otherwise the length is zero. Take care to
736 use SAVE_EXPR in case the OFFSET has side-effects. */
f90ef0b2 737 tree offsave = TREE_SIDE_EFFECTS (byteoff) ? save_expr (byteoff)
738 : byteoff;
739 offsave = fold_convert_loc (loc, sizetype, offsave);
c4183f31 740 tree condexp = fold_build2_loc (loc, LE_EXPR, boolean_type_node, offsave,
f90ef0b2 741 size_int (len));
742 tree lenexp = fold_build2_loc (loc, MINUS_EXPR, sizetype, size_int (len),
743 offsave);
744 lenexp = fold_convert_loc (loc, ssizetype, lenexp);
c4183f31 745 return fold_build3_loc (loc, COND_EXPR, ssizetype, condexp, lenexp,
746 build_zero_cst (ssizetype));
53800dbe 747 }
748
c62d63d4 749 /* Offset from the beginning of the string in elements. */
750 HOST_WIDE_INT eltoff;
751
53800dbe 752 /* We have a known offset into the string. Start searching there for
27d0c333 753 a null character if we can represent it as a single HOST_WIDE_INT. */
c62d63d4 754 if (byteoff == 0)
755 eltoff = 0;
2a0aa722 756 else if (! tree_fits_uhwi_p (byteoff) || tree_to_uhwi (byteoff) % eltsize)
c62d63d4 757 eltoff = -1;
53800dbe 758 else
2a0aa722 759 eltoff = tree_to_uhwi (byteoff) / eltsize;
902de8ed 760
1f63a7d6 761 /* If the offset is known to be out of bounds, warn, and call strlen at
762 runtime. */
9b7116a1 763 if (eltoff < 0 || eltoff >= maxelts)
53800dbe 764 {
1f63a7d6 765 /* Suppress multiple warnings for propagated constant strings. */
2f1c4f17 766 if (only_value != 2
767 && !TREE_NO_WARNING (src))
1f63a7d6 768 {
d5d661d5 769 warning_at (loc, OPT_Warray_bounds,
770 "offset %qwi outside bounds of constant string",
c62d63d4 771 eltoff);
1f63a7d6 772 TREE_NO_WARNING (src) = 1;
773 }
c2f47e15 774 return NULL_TREE;
53800dbe 775 }
902de8ed 776
893c4605 777 /* If eltoff is larger than strelts but less than maxelts the
778 string length is zero, since the excess memory will be zero. */
779 if (eltoff > strelts)
780 return ssize_int (0);
781
53800dbe 782 /* Use strlen to search for the first zero byte. Since any strings
783 constructed with build_string will have nulls appended, we win even
784 if we get handed something like (char[4])"abcd".
785
c62d63d4 786 Since ELTOFF is our starting index into the string, no further
53800dbe 787 calculation is needed. */
c62d63d4 788 unsigned len = string_length (ptr + eltoff * eltsize, eltsize,
893c4605 789 strelts - eltoff);
c62d63d4 790
9b7116a1 791 /* Don't know what to return if there was no zero termination.
2b84b289 792 Ideally this would turn into a gcc_checking_assert over time.
793 Set DECL/LEN so callers can examine them. */
9b7116a1 794 if (len >= maxelts - eltoff)
7af57b1c 795 {
2b84b289 796 data->decl = decl;
fec27bf2 797 data->off = byteoff;
2b84b289 798 data->len = ssize_int (len);
7af57b1c 799 return NULL_TREE;
800 }
2a0aa722 801
c62d63d4 802 return ssize_int (len);
53800dbe 803}
804
e913b5cd 805/* Return a constant integer corresponding to target reading
8c85fcb7 806 GET_MODE_BITSIZE (MODE) bits from string constant STR. */
ecc318ff 807
6840589f 808static rtx
f77c4496 809c_readstr (const char *str, scalar_int_mode mode)
6840589f 810{
6840589f 811 HOST_WIDE_INT ch;
812 unsigned int i, j;
e913b5cd 813 HOST_WIDE_INT tmp[MAX_BITSIZE_MODE_ANY_INT / HOST_BITS_PER_WIDE_INT];
0407eaee 814
815 gcc_assert (GET_MODE_CLASS (mode) == MODE_INT);
e913b5cd 816 unsigned int len = (GET_MODE_PRECISION (mode) + HOST_BITS_PER_WIDE_INT - 1)
817 / HOST_BITS_PER_WIDE_INT;
818
a12aa4cc 819 gcc_assert (len <= MAX_BITSIZE_MODE_ANY_INT / HOST_BITS_PER_WIDE_INT);
e913b5cd 820 for (i = 0; i < len; i++)
821 tmp[i] = 0;
6840589f 822
6840589f 823 ch = 1;
824 for (i = 0; i < GET_MODE_SIZE (mode); i++)
825 {
826 j = i;
827 if (WORDS_BIG_ENDIAN)
828 j = GET_MODE_SIZE (mode) - i - 1;
829 if (BYTES_BIG_ENDIAN != WORDS_BIG_ENDIAN
ad8f8e52 830 && GET_MODE_SIZE (mode) >= UNITS_PER_WORD)
6840589f 831 j = j + UNITS_PER_WORD - 2 * (j % UNITS_PER_WORD) - 1;
832 j *= BITS_PER_UNIT;
7d3f6cc7 833
6840589f 834 if (ch)
835 ch = (unsigned char) str[i];
e913b5cd 836 tmp[j / HOST_BITS_PER_WIDE_INT] |= ch << (j % HOST_BITS_PER_WIDE_INT);
6840589f 837 }
ddb1be65 838
ab2c1de8 839 wide_int c = wide_int::from_array (tmp, len, GET_MODE_PRECISION (mode));
e913b5cd 840 return immed_wide_int_const (c, mode);
6840589f 841}
842
ecc318ff 843/* Cast a target constant CST to target CHAR and if that value fits into
5206b159 844 host char type, return zero and put that value into variable pointed to by
ecc318ff 845 P. */
846
847static int
aecda0d6 848target_char_cast (tree cst, char *p)
ecc318ff 849{
850 unsigned HOST_WIDE_INT val, hostval;
851
c19686c5 852 if (TREE_CODE (cst) != INTEGER_CST
ecc318ff 853 || CHAR_TYPE_SIZE > HOST_BITS_PER_WIDE_INT)
854 return 1;
855
e913b5cd 856 /* Do not care if it fits or not right here. */
f9ae6f95 857 val = TREE_INT_CST_LOW (cst);
e913b5cd 858
ecc318ff 859 if (CHAR_TYPE_SIZE < HOST_BITS_PER_WIDE_INT)
edc19fd0 860 val &= (HOST_WIDE_INT_1U << CHAR_TYPE_SIZE) - 1;
ecc318ff 861
862 hostval = val;
863 if (HOST_BITS_PER_CHAR < HOST_BITS_PER_WIDE_INT)
edc19fd0 864 hostval &= (HOST_WIDE_INT_1U << HOST_BITS_PER_CHAR) - 1;
ecc318ff 865
866 if (val != hostval)
867 return 1;
868
869 *p = hostval;
870 return 0;
871}
872
4ee9c684 873/* Similar to save_expr, but assumes that arbitrary code is not executed
874 in between the multiple evaluations. In particular, we assume that a
875 non-addressable local variable will not be modified. */
876
877static tree
878builtin_save_expr (tree exp)
879{
f6c35aa4 880 if (TREE_CODE (exp) == SSA_NAME
881 || (TREE_ADDRESSABLE (exp) == 0
882 && (TREE_CODE (exp) == PARM_DECL
53e9c5c4 883 || (VAR_P (exp) && !TREE_STATIC (exp)))))
4ee9c684 884 return exp;
885
886 return save_expr (exp);
887}
888
53800dbe 889/* Given TEM, a pointer to a stack frame, follow the dynamic chain COUNT
890 times to get the address of either a higher stack frame, or a return
891 address located within it (depending on FNDECL_CODE). */
902de8ed 892
c626df3d 893static rtx
869d0ef0 894expand_builtin_return_addr (enum built_in_function fndecl_code, int count)
53800dbe 895{
896 int i;
869d0ef0 897 rtx tem = INITIAL_FRAME_ADDRESS_RTX;
3f840859 898 if (tem == NULL_RTX)
e3e15c50 899 {
3f840859 900 /* For a zero count with __builtin_return_address, we don't care what
901 frame address we return, because target-specific definitions will
902 override us. Therefore frame pointer elimination is OK, and using
903 the soft frame pointer is OK.
904
905 For a nonzero count, or a zero count with __builtin_frame_address,
906 we require a stable offset from the current frame pointer to the
907 previous one, so we must use the hard frame pointer, and
908 we must disable frame pointer elimination. */
909 if (count == 0 && fndecl_code == BUILT_IN_RETURN_ADDRESS)
910 tem = frame_pointer_rtx;
911 else
912 {
913 tem = hard_frame_pointer_rtx;
e3e15c50 914
3f840859 915 /* Tell reload not to eliminate the frame pointer. */
916 crtl->accesses_prior_frames = 1;
917 }
e3e15c50 918 }
869d0ef0 919
53800dbe 920 if (count > 0)
921 SETUP_FRAME_ADDRESSES ();
53800dbe 922
3a69c60c 923 /* On the SPARC, the return address is not in the frame, it is in a
53800dbe 924 register. There is no way to access it off of the current frame
925 pointer, but it can be accessed off the previous frame pointer by
926 reading the value from the register window save area. */
a26d6c60 927 if (RETURN_ADDR_IN_PREVIOUS_FRAME && fndecl_code == BUILT_IN_RETURN_ADDRESS)
53800dbe 928 count--;
53800dbe 929
930 /* Scan back COUNT frames to the specified frame. */
931 for (i = 0; i < count; i++)
932 {
933 /* Assume the dynamic chain pointer is in the word that the
934 frame address points to, unless otherwise specified. */
53800dbe 935 tem = DYNAMIC_CHAIN_ADDRESS (tem);
53800dbe 936 tem = memory_address (Pmode, tem);
00060fc2 937 tem = gen_frame_mem (Pmode, tem);
83fc1478 938 tem = copy_to_reg (tem);
53800dbe 939 }
940
3a69c60c 941 /* For __builtin_frame_address, return what we've got. But, on
942 the SPARC for example, we may have to add a bias. */
53800dbe 943 if (fndecl_code == BUILT_IN_FRAME_ADDRESS)
3a69c60c 944 return FRAME_ADDR_RTX (tem);
53800dbe 945
3a69c60c 946 /* For __builtin_return_address, get the return address from that frame. */
53800dbe 947#ifdef RETURN_ADDR_RTX
948 tem = RETURN_ADDR_RTX (count, tem);
949#else
950 tem = memory_address (Pmode,
29c05e22 951 plus_constant (Pmode, tem, GET_MODE_SIZE (Pmode)));
00060fc2 952 tem = gen_frame_mem (Pmode, tem);
53800dbe 953#endif
954 return tem;
955}
956
f7c44134 957/* Alias set used for setjmp buffer. */
32c2fdea 958static alias_set_type setjmp_alias_set = -1;
f7c44134 959
6b7f6858 960/* Construct the leading half of a __builtin_setjmp call. Control will
2c8a1497 961 return to RECEIVER_LABEL. This is also called directly by the SJLJ
962 exception handling code. */
53800dbe 963
6b7f6858 964void
aecda0d6 965expand_builtin_setjmp_setup (rtx buf_addr, rtx receiver_label)
53800dbe 966{
3754d046 967 machine_mode sa_mode = STACK_SAVEAREA_MODE (SAVE_NONLOCAL);
53800dbe 968 rtx stack_save;
f7c44134 969 rtx mem;
53800dbe 970
f7c44134 971 if (setjmp_alias_set == -1)
972 setjmp_alias_set = new_alias_set ();
973
85d654dd 974 buf_addr = convert_memory_address (Pmode, buf_addr);
53800dbe 975
37ae8504 976 buf_addr = force_reg (Pmode, force_operand (buf_addr, NULL_RTX));
53800dbe 977
6b7f6858 978 /* We store the frame pointer and the address of receiver_label in
979 the buffer and use the rest of it for the stack save area, which
980 is machine-dependent. */
53800dbe 981
f7c44134 982 mem = gen_rtx_MEM (Pmode, buf_addr);
ab6ab77e 983 set_mem_alias_set (mem, setjmp_alias_set);
e3e026e8 984 emit_move_insn (mem, targetm.builtin_setjmp_frame_value ());
f7c44134 985
29c05e22 986 mem = gen_rtx_MEM (Pmode, plus_constant (Pmode, buf_addr,
987 GET_MODE_SIZE (Pmode))),
ab6ab77e 988 set_mem_alias_set (mem, setjmp_alias_set);
f7c44134 989
990 emit_move_insn (validize_mem (mem),
6b7f6858 991 force_reg (Pmode, gen_rtx_LABEL_REF (Pmode, receiver_label)));
53800dbe 992
993 stack_save = gen_rtx_MEM (sa_mode,
29c05e22 994 plus_constant (Pmode, buf_addr,
53800dbe 995 2 * GET_MODE_SIZE (Pmode)));
ab6ab77e 996 set_mem_alias_set (stack_save, setjmp_alias_set);
e9c97615 997 emit_stack_save (SAVE_NONLOCAL, &stack_save);
53800dbe 998
999 /* If there is further processing to do, do it. */
a3c81e61 1000 if (targetm.have_builtin_setjmp_setup ())
1001 emit_insn (targetm.gen_builtin_setjmp_setup (buf_addr));
53800dbe 1002
29f09705 1003 /* We have a nonlocal label. */
18d50ae6 1004 cfun->has_nonlocal_label = 1;
6b7f6858 1005}
53800dbe 1006
2c8a1497 1007/* Construct the trailing part of a __builtin_setjmp call. This is
4598ade9 1008 also called directly by the SJLJ exception handling code.
1009 If RECEIVER_LABEL is NULL, instead contruct a nonlocal goto handler. */
6b7f6858 1010
1011void
a3c81e61 1012expand_builtin_setjmp_receiver (rtx receiver_label)
6b7f6858 1013{
82c7907c 1014 rtx chain;
1015
4598ade9 1016 /* Mark the FP as used when we get here, so we have to make sure it's
53800dbe 1017 marked as used by this function. */
18b42941 1018 emit_use (hard_frame_pointer_rtx);
53800dbe 1019
1020 /* Mark the static chain as clobbered here so life information
1021 doesn't get messed up for it. */
3c56e0c1 1022 chain = rtx_for_static_chain (current_function_decl, true);
82c7907c 1023 if (chain && REG_P (chain))
1024 emit_clobber (chain);
53800dbe 1025
1026 /* Now put in the code to restore the frame pointer, and argument
491e04ef 1027 pointer, if needed. */
a3c81e61 1028 if (! targetm.have_nonlocal_goto ())
62dcb5c8 1029 {
1030 /* First adjust our frame pointer to its actual value. It was
1031 previously set to the start of the virtual area corresponding to
1032 the stacked variables when we branched here and now needs to be
1033 adjusted to the actual hardware fp value.
1034
1035 Assignments to virtual registers are converted by
1036 instantiate_virtual_regs into the corresponding assignment
1037 to the underlying register (fp in this case) that makes
1038 the original assignment true.
1039 So the following insn will actually be decrementing fp by
8374586c 1040 TARGET_STARTING_FRAME_OFFSET. */
62dcb5c8 1041 emit_move_insn (virtual_stack_vars_rtx, hard_frame_pointer_rtx);
1042
1043 /* Restoring the frame pointer also modifies the hard frame pointer.
1044 Mark it used (so that the previous assignment remains live once
1045 the frame pointer is eliminated) and clobbered (to represent the
1046 implicit update from the assignment). */
1047 emit_use (hard_frame_pointer_rtx);
1048 emit_clobber (hard_frame_pointer_rtx);
1049 }
53800dbe 1050
a494b6d7 1051 if (!HARD_FRAME_POINTER_IS_ARG_POINTER && fixed_regs[ARG_POINTER_REGNUM])
53800dbe 1052 {
4598ade9 1053 /* If the argument pointer can be eliminated in favor of the
1054 frame pointer, we don't need to restore it. We assume here
1055 that if such an elimination is present, it can always be used.
1056 This is the case on all known machines; if we don't make this
1057 assumption, we do unnecessary saving on many machines. */
53800dbe 1058 size_t i;
e99c3a1d 1059 static const struct elims {const int from, to;} elim_regs[] = ELIMINABLE_REGS;
53800dbe 1060
3098b2d3 1061 for (i = 0; i < ARRAY_SIZE (elim_regs); i++)
53800dbe 1062 if (elim_regs[i].from == ARG_POINTER_REGNUM
1063 && elim_regs[i].to == HARD_FRAME_POINTER_REGNUM)
1064 break;
1065
3098b2d3 1066 if (i == ARRAY_SIZE (elim_regs))
53800dbe 1067 {
1068 /* Now restore our arg pointer from the address at which it
05927e40 1069 was saved in our stack frame. */
27a7a23a 1070 emit_move_insn (crtl->args.internal_arg_pointer,
b079a207 1071 copy_to_reg (get_arg_pointer_save_area ()));
53800dbe 1072 }
1073 }
53800dbe 1074
a3c81e61 1075 if (receiver_label != NULL && targetm.have_builtin_setjmp_receiver ())
1076 emit_insn (targetm.gen_builtin_setjmp_receiver (receiver_label));
1077 else if (targetm.have_nonlocal_goto_receiver ())
1078 emit_insn (targetm.gen_nonlocal_goto_receiver ());
53800dbe 1079 else
a3c81e61 1080 { /* Nothing */ }
57f6bb94 1081
3072d30e 1082 /* We must not allow the code we just generated to be reordered by
1083 scheduling. Specifically, the update of the frame pointer must
62dcb5c8 1084 happen immediately, not later. */
3072d30e 1085 emit_insn (gen_blockage ());
6b7f6858 1086}
53800dbe 1087
53800dbe 1088/* __builtin_longjmp is passed a pointer to an array of five words (not
1089 all will be used on all machines). It operates similarly to the C
1090 library function of the same name, but is more efficient. Much of
2c8a1497 1091 the code below is copied from the handling of non-local gotos. */
53800dbe 1092
c626df3d 1093static void
aecda0d6 1094expand_builtin_longjmp (rtx buf_addr, rtx value)
53800dbe 1095{
1e0c0b35 1096 rtx fp, lab, stack;
1097 rtx_insn *insn, *last;
3754d046 1098 machine_mode sa_mode = STACK_SAVEAREA_MODE (SAVE_NONLOCAL);
53800dbe 1099
48e1416a 1100 /* DRAP is needed for stack realign if longjmp is expanded to current
27a7a23a 1101 function */
1102 if (SUPPORTS_STACK_ALIGNMENT)
1103 crtl->need_drap = true;
1104
f7c44134 1105 if (setjmp_alias_set == -1)
1106 setjmp_alias_set = new_alias_set ();
1107
85d654dd 1108 buf_addr = convert_memory_address (Pmode, buf_addr);
479e4d5e 1109
53800dbe 1110 buf_addr = force_reg (Pmode, buf_addr);
1111
82c7907c 1112 /* We require that the user must pass a second argument of 1, because
1113 that is what builtin_setjmp will return. */
64db345d 1114 gcc_assert (value == const1_rtx);
53800dbe 1115
4712c7d6 1116 last = get_last_insn ();
a3c81e61 1117 if (targetm.have_builtin_longjmp ())
1118 emit_insn (targetm.gen_builtin_longjmp (buf_addr));
53800dbe 1119 else
53800dbe 1120 {
1121 fp = gen_rtx_MEM (Pmode, buf_addr);
29c05e22 1122 lab = gen_rtx_MEM (Pmode, plus_constant (Pmode, buf_addr,
53800dbe 1123 GET_MODE_SIZE (Pmode)));
1124
29c05e22 1125 stack = gen_rtx_MEM (sa_mode, plus_constant (Pmode, buf_addr,
53800dbe 1126 2 * GET_MODE_SIZE (Pmode)));
ab6ab77e 1127 set_mem_alias_set (fp, setjmp_alias_set);
1128 set_mem_alias_set (lab, setjmp_alias_set);
1129 set_mem_alias_set (stack, setjmp_alias_set);
53800dbe 1130
1131 /* Pick up FP, label, and SP from the block and jump. This code is
1132 from expand_goto in stmt.c; see there for detailed comments. */
a3c81e61 1133 if (targetm.have_nonlocal_goto ())
53800dbe 1134 /* We have to pass a value to the nonlocal_goto pattern that will
1135 get copied into the static_chain pointer, but it does not matter
1136 what that value is, because builtin_setjmp does not use it. */
a3c81e61 1137 emit_insn (targetm.gen_nonlocal_goto (value, lab, stack, fp));
53800dbe 1138 else
53800dbe 1139 {
1140 lab = copy_to_reg (lab);
1141
18b42941 1142 emit_clobber (gen_rtx_MEM (BLKmode, gen_rtx_SCRATCH (VOIDmode)));
1143 emit_clobber (gen_rtx_MEM (BLKmode, hard_frame_pointer_rtx));
2a871ad1 1144
53800dbe 1145 emit_move_insn (hard_frame_pointer_rtx, fp);
e9c97615 1146 emit_stack_restore (SAVE_NONLOCAL, stack);
53800dbe 1147
18b42941 1148 emit_use (hard_frame_pointer_rtx);
1149 emit_use (stack_pointer_rtx);
53800dbe 1150 emit_indirect_jump (lab);
1151 }
1152 }
615166bb 1153
1154 /* Search backwards and mark the jump insn as a non-local goto.
1155 Note that this precludes the use of __builtin_longjmp to a
1156 __builtin_setjmp target in the same function. However, we've
1157 already cautioned the user that these functions are for
1158 internal exception handling use only. */
449c0509 1159 for (insn = get_last_insn (); insn; insn = PREV_INSN (insn))
1160 {
64db345d 1161 gcc_assert (insn != last);
7d3f6cc7 1162
6d7dc5b9 1163 if (JUMP_P (insn))
449c0509 1164 {
a1ddb869 1165 add_reg_note (insn, REG_NON_LOCAL_GOTO, const0_rtx);
449c0509 1166 break;
1167 }
6d7dc5b9 1168 else if (CALL_P (insn))
9342ee68 1169 break;
449c0509 1170 }
53800dbe 1171}
1172
0e80b01d 1173static inline bool
1174more_const_call_expr_args_p (const const_call_expr_arg_iterator *iter)
1175{
1176 return (iter->i < iter->n);
1177}
1178
1179/* This function validates the types of a function call argument list
1180 against a specified list of tree_codes. If the last specifier is a 0,
5cfa3fc8 1181 that represents an ellipsis, otherwise the last specifier must be a
0e80b01d 1182 VOID_TYPE. */
1183
1184static bool
1185validate_arglist (const_tree callexpr, ...)
1186{
1187 enum tree_code code;
1188 bool res = 0;
1189 va_list ap;
1190 const_call_expr_arg_iterator iter;
1191 const_tree arg;
1192
1193 va_start (ap, callexpr);
1194 init_const_call_expr_arg_iterator (callexpr, &iter);
1195
5cfa3fc8 1196 /* Get a bitmap of pointer argument numbers declared attribute nonnull. */
184fac50 1197 tree fn = CALL_EXPR_FN (callexpr);
1198 bitmap argmap = get_nonnull_args (TREE_TYPE (TREE_TYPE (fn)));
5cfa3fc8 1199
1200 for (unsigned argno = 1; ; ++argno)
0e80b01d 1201 {
1202 code = (enum tree_code) va_arg (ap, int);
5cfa3fc8 1203
0e80b01d 1204 switch (code)
1205 {
1206 case 0:
1207 /* This signifies an ellipses, any further arguments are all ok. */
1208 res = true;
1209 goto end;
1210 case VOID_TYPE:
1211 /* This signifies an endlink, if no arguments remain, return
1212 true, otherwise return false. */
1213 res = !more_const_call_expr_args_p (&iter);
1214 goto end;
5cfa3fc8 1215 case POINTER_TYPE:
1216 /* The actual argument must be nonnull when either the whole
1217 called function has been declared nonnull, or when the formal
1218 argument corresponding to the actual argument has been. */
184fac50 1219 if (argmap
1220 && (bitmap_empty_p (argmap) || bitmap_bit_p (argmap, argno)))
1221 {
1222 arg = next_const_call_expr_arg (&iter);
1223 if (!validate_arg (arg, code) || integer_zerop (arg))
1224 goto end;
1225 break;
1226 }
5cfa3fc8 1227 /* FALLTHRU */
0e80b01d 1228 default:
1229 /* If no parameters remain or the parameter's code does not
1230 match the specified code, return false. Otherwise continue
1231 checking any remaining arguments. */
1232 arg = next_const_call_expr_arg (&iter);
184fac50 1233 if (!validate_arg (arg, code))
0e80b01d 1234 goto end;
1235 break;
1236 }
1237 }
0e80b01d 1238
1239 /* We need gotos here since we can only have one VA_CLOSE in a
1240 function. */
1241 end: ;
1242 va_end (ap);
1243
5cfa3fc8 1244 BITMAP_FREE (argmap);
1245
0e80b01d 1246 return res;
1247}
1248
4ee9c684 1249/* Expand a call to __builtin_nonlocal_goto. We're passed the target label
1250 and the address of the save area. */
1251
1252static rtx
c2f47e15 1253expand_builtin_nonlocal_goto (tree exp)
4ee9c684 1254{
1255 tree t_label, t_save_area;
1e0c0b35 1256 rtx r_label, r_save_area, r_fp, r_sp;
1257 rtx_insn *insn;
4ee9c684 1258
c2f47e15 1259 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
4ee9c684 1260 return NULL_RTX;
1261
c2f47e15 1262 t_label = CALL_EXPR_ARG (exp, 0);
1263 t_save_area = CALL_EXPR_ARG (exp, 1);
4ee9c684 1264
8ec3c5c2 1265 r_label = expand_normal (t_label);
3dce56cc 1266 r_label = convert_memory_address (Pmode, r_label);
8ec3c5c2 1267 r_save_area = expand_normal (t_save_area);
3dce56cc 1268 r_save_area = convert_memory_address (Pmode, r_save_area);
d1ff492e 1269 /* Copy the address of the save location to a register just in case it was
1270 based on the frame pointer. */
51adbc8a 1271 r_save_area = copy_to_reg (r_save_area);
4ee9c684 1272 r_fp = gen_rtx_MEM (Pmode, r_save_area);
1273 r_sp = gen_rtx_MEM (STACK_SAVEAREA_MODE (SAVE_NONLOCAL),
29c05e22 1274 plus_constant (Pmode, r_save_area,
1275 GET_MODE_SIZE (Pmode)));
4ee9c684 1276
18d50ae6 1277 crtl->has_nonlocal_goto = 1;
4ee9c684 1278
4ee9c684 1279 /* ??? We no longer need to pass the static chain value, afaik. */
a3c81e61 1280 if (targetm.have_nonlocal_goto ())
1281 emit_insn (targetm.gen_nonlocal_goto (const0_rtx, r_label, r_sp, r_fp));
4ee9c684 1282 else
4ee9c684 1283 {
1284 r_label = copy_to_reg (r_label);
1285
18b42941 1286 emit_clobber (gen_rtx_MEM (BLKmode, gen_rtx_SCRATCH (VOIDmode)));
1287 emit_clobber (gen_rtx_MEM (BLKmode, hard_frame_pointer_rtx));
491e04ef 1288
d1ff492e 1289 /* Restore frame pointer for containing function. */
4ee9c684 1290 emit_move_insn (hard_frame_pointer_rtx, r_fp);
e9c97615 1291 emit_stack_restore (SAVE_NONLOCAL, r_sp);
491e04ef 1292
4ee9c684 1293 /* USE of hard_frame_pointer_rtx added for consistency;
1294 not clear if really needed. */
18b42941 1295 emit_use (hard_frame_pointer_rtx);
1296 emit_use (stack_pointer_rtx);
ad0d0af8 1297
1298 /* If the architecture is using a GP register, we must
1299 conservatively assume that the target function makes use of it.
1300 The prologue of functions with nonlocal gotos must therefore
1301 initialize the GP register to the appropriate value, and we
1302 must then make sure that this value is live at the point
1303 of the jump. (Note that this doesn't necessarily apply
1304 to targets with a nonlocal_goto pattern; they are free
1305 to implement it in their own way. Note also that this is
1306 a no-op if the GP register is a global invariant.) */
1e826931 1307 unsigned regnum = PIC_OFFSET_TABLE_REGNUM;
1308 if (regnum != INVALID_REGNUM && fixed_regs[regnum])
18b42941 1309 emit_use (pic_offset_table_rtx);
ad0d0af8 1310
4ee9c684 1311 emit_indirect_jump (r_label);
1312 }
491e04ef 1313
4ee9c684 1314 /* Search backwards to the jump insn and mark it as a
1315 non-local goto. */
1316 for (insn = get_last_insn (); insn; insn = PREV_INSN (insn))
1317 {
6d7dc5b9 1318 if (JUMP_P (insn))
4ee9c684 1319 {
a1ddb869 1320 add_reg_note (insn, REG_NON_LOCAL_GOTO, const0_rtx);
4ee9c684 1321 break;
1322 }
6d7dc5b9 1323 else if (CALL_P (insn))
4ee9c684 1324 break;
1325 }
1326
1327 return const0_rtx;
1328}
1329
843d08a9 1330/* __builtin_update_setjmp_buf is passed a pointer to an array of five words
1331 (not all will be used on all machines) that was passed to __builtin_setjmp.
97354ae4 1332 It updates the stack pointer in that block to the current value. This is
1333 also called directly by the SJLJ exception handling code. */
843d08a9 1334
97354ae4 1335void
843d08a9 1336expand_builtin_update_setjmp_buf (rtx buf_addr)
1337{
3754d046 1338 machine_mode sa_mode = STACK_SAVEAREA_MODE (SAVE_NONLOCAL);
77e843a0 1339 buf_addr = convert_memory_address (Pmode, buf_addr);
d1ff492e 1340 rtx stack_save
843d08a9 1341 = gen_rtx_MEM (sa_mode,
1342 memory_address
1343 (sa_mode,
29c05e22 1344 plus_constant (Pmode, buf_addr,
1345 2 * GET_MODE_SIZE (Pmode))));
843d08a9 1346
e9c97615 1347 emit_stack_save (SAVE_NONLOCAL, &stack_save);
843d08a9 1348}
1349
5e3608d8 1350/* Expand a call to __builtin_prefetch. For a target that does not support
1351 data prefetch, evaluate the memory address argument in case it has side
1352 effects. */
1353
1354static void
c2f47e15 1355expand_builtin_prefetch (tree exp)
5e3608d8 1356{
1357 tree arg0, arg1, arg2;
c2f47e15 1358 int nargs;
5e3608d8 1359 rtx op0, op1, op2;
1360
c2f47e15 1361 if (!validate_arglist (exp, POINTER_TYPE, 0))
26a5cadb 1362 return;
1363
c2f47e15 1364 arg0 = CALL_EXPR_ARG (exp, 0);
1365
26a5cadb 1366 /* Arguments 1 and 2 are optional; argument 1 (read/write) defaults to
1367 zero (read) and argument 2 (locality) defaults to 3 (high degree of
1368 locality). */
c2f47e15 1369 nargs = call_expr_nargs (exp);
1370 if (nargs > 1)
1371 arg1 = CALL_EXPR_ARG (exp, 1);
26a5cadb 1372 else
c2f47e15 1373 arg1 = integer_zero_node;
1374 if (nargs > 2)
1375 arg2 = CALL_EXPR_ARG (exp, 2);
1376 else
2512209b 1377 arg2 = integer_three_node;
5e3608d8 1378
1379 /* Argument 0 is an address. */
1380 op0 = expand_expr (arg0, NULL_RTX, Pmode, EXPAND_NORMAL);
1381
1382 /* Argument 1 (read/write flag) must be a compile-time constant int. */
1383 if (TREE_CODE (arg1) != INTEGER_CST)
1384 {
07e3a3d2 1385 error ("second argument to %<__builtin_prefetch%> must be a constant");
9342ee68 1386 arg1 = integer_zero_node;
5e3608d8 1387 }
8ec3c5c2 1388 op1 = expand_normal (arg1);
5e3608d8 1389 /* Argument 1 must be either zero or one. */
1390 if (INTVAL (op1) != 0 && INTVAL (op1) != 1)
1391 {
c3ceba8e 1392 warning (0, "invalid second argument to %<__builtin_prefetch%>;"
07e3a3d2 1393 " using zero");
5e3608d8 1394 op1 = const0_rtx;
1395 }
1396
1397 /* Argument 2 (locality) must be a compile-time constant int. */
1398 if (TREE_CODE (arg2) != INTEGER_CST)
1399 {
07e3a3d2 1400 error ("third argument to %<__builtin_prefetch%> must be a constant");
5e3608d8 1401 arg2 = integer_zero_node;
1402 }
8ec3c5c2 1403 op2 = expand_normal (arg2);
5e3608d8 1404 /* Argument 2 must be 0, 1, 2, or 3. */
1405 if (INTVAL (op2) < 0 || INTVAL (op2) > 3)
1406 {
c3ceba8e 1407 warning (0, "invalid third argument to %<__builtin_prefetch%>; using zero");
5e3608d8 1408 op2 = const0_rtx;
1409 }
1410
1d375a79 1411 if (targetm.have_prefetch ())
5e3608d8 1412 {
8786db1e 1413 struct expand_operand ops[3];
1414
1415 create_address_operand (&ops[0], op0);
1416 create_integer_operand (&ops[1], INTVAL (op1));
1417 create_integer_operand (&ops[2], INTVAL (op2));
1d375a79 1418 if (maybe_expand_insn (targetm.code_for_prefetch, 3, ops))
8786db1e 1419 return;
5e3608d8 1420 }
0a534ba7 1421
f0ce3b1f 1422 /* Don't do anything with direct references to volatile memory, but
1423 generate code to handle other side effects. */
e16ceb8e 1424 if (!MEM_P (op0) && side_effects_p (op0))
f0ce3b1f 1425 emit_insn (op0);
5e3608d8 1426}
1427
f7c44134 1428/* Get a MEM rtx for expression EXP which is the address of an operand
d8ae1baa 1429 to be used in a string instruction (cmpstrsi, movmemsi, ..). LEN is
1430 the maximum length of the block of memory that might be accessed or
1431 NULL if unknown. */
f7c44134 1432
53800dbe 1433static rtx
d8ae1baa 1434get_memory_rtx (tree exp, tree len)
53800dbe 1435{
ad0a178f 1436 tree orig_exp = exp;
1437 rtx addr, mem;
ad0a178f 1438
1439 /* When EXP is not resolved SAVE_EXPR, MEM_ATTRS can be still derived
1440 from its expression, for expr->a.b only <variable>.a.b is recorded. */
1441 if (TREE_CODE (exp) == SAVE_EXPR && !SAVE_EXPR_RESOLVED_P (exp))
1442 exp = TREE_OPERAND (exp, 0);
1443
1444 addr = expand_expr (orig_exp, NULL_RTX, ptr_mode, EXPAND_NORMAL);
1445 mem = gen_rtx_MEM (BLKmode, memory_address (BLKmode, addr));
2a631e19 1446
f7c44134 1447 /* Get an expression we can use to find the attributes to assign to MEM.
5dd3f78f 1448 First remove any nops. */
72dd6141 1449 while (CONVERT_EXPR_P (exp)
f7c44134 1450 && POINTER_TYPE_P (TREE_TYPE (TREE_OPERAND (exp, 0))))
1451 exp = TREE_OPERAND (exp, 0);
1452
5dd3f78f 1453 /* Build a MEM_REF representing the whole accessed area as a byte blob,
1454 (as builtin stringops may alias with anything). */
1455 exp = fold_build2 (MEM_REF,
1456 build_array_type (char_type_node,
1457 build_range_type (sizetype,
1458 size_one_node, len)),
1459 exp, build_int_cst (ptr_type_node, 0));
1460
1461 /* If the MEM_REF has no acceptable address, try to get the base object
1462 from the original address we got, and build an all-aliasing
1463 unknown-sized access to that one. */
1464 if (is_gimple_mem_ref_addr (TREE_OPERAND (exp, 0)))
1465 set_mem_attributes (mem, exp, 0);
1466 else if (TREE_CODE (TREE_OPERAND (exp, 0)) == ADDR_EXPR
1467 && (exp = get_base_address (TREE_OPERAND (TREE_OPERAND (exp, 0),
1468 0))))
eec8e941 1469 {
5dd3f78f 1470 exp = build_fold_addr_expr (exp);
1471 exp = fold_build2 (MEM_REF,
1472 build_array_type (char_type_node,
1473 build_range_type (sizetype,
1474 size_zero_node,
1475 NULL)),
1476 exp, build_int_cst (ptr_type_node, 0));
a1a25d19 1477 set_mem_attributes (mem, exp, 0);
eec8e941 1478 }
5dd3f78f 1479 set_mem_alias_set (mem, 0);
53800dbe 1480 return mem;
1481}
1482\f
1483/* Built-in functions to perform an untyped call and return. */
1484
3b9c3a16 1485#define apply_args_mode \
1486 (this_target_builtins->x_apply_args_mode)
1487#define apply_result_mode \
1488 (this_target_builtins->x_apply_result_mode)
53800dbe 1489
53800dbe 1490/* Return the size required for the block returned by __builtin_apply_args,
1491 and initialize apply_args_mode. */
1492
1493static int
aecda0d6 1494apply_args_size (void)
53800dbe 1495{
1496 static int size = -1;
58e9ce8f 1497 int align;
1498 unsigned int regno;
53800dbe 1499
1500 /* The values computed by this function never change. */
1501 if (size < 0)
1502 {
1503 /* The first value is the incoming arg-pointer. */
1504 size = GET_MODE_SIZE (Pmode);
1505
1506 /* The second value is the structure value address unless this is
1507 passed as an "invisible" first argument. */
6812c89e 1508 if (targetm.calls.struct_value_rtx (cfun ? TREE_TYPE (cfun->decl) : 0, 0))
53800dbe 1509 size += GET_MODE_SIZE (Pmode);
1510
1511 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
1512 if (FUNCTION_ARG_REGNO_P (regno))
1513 {
d8ba6ec1 1514 fixed_size_mode mode = targetm.calls.get_raw_arg_mode (regno);
0862b7e9 1515
64db345d 1516 gcc_assert (mode != VOIDmode);
53800dbe 1517
1518 align = GET_MODE_ALIGNMENT (mode) / BITS_PER_UNIT;
1519 if (size % align != 0)
1520 size = CEIL (size, align) * align;
53800dbe 1521 size += GET_MODE_SIZE (mode);
1522 apply_args_mode[regno] = mode;
1523 }
1524 else
1525 {
d8ba6ec1 1526 apply_args_mode[regno] = as_a <fixed_size_mode> (VOIDmode);
53800dbe 1527 }
1528 }
1529 return size;
1530}
1531
1532/* Return the size required for the block returned by __builtin_apply,
1533 and initialize apply_result_mode. */
1534
1535static int
aecda0d6 1536apply_result_size (void)
53800dbe 1537{
1538 static int size = -1;
1539 int align, regno;
53800dbe 1540
1541 /* The values computed by this function never change. */
1542 if (size < 0)
1543 {
1544 size = 0;
1545
1546 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
e1ce1485 1547 if (targetm.calls.function_value_regno_p (regno))
53800dbe 1548 {
d8ba6ec1 1549 fixed_size_mode mode = targetm.calls.get_raw_result_mode (regno);
0862b7e9 1550
64db345d 1551 gcc_assert (mode != VOIDmode);
53800dbe 1552
1553 align = GET_MODE_ALIGNMENT (mode) / BITS_PER_UNIT;
1554 if (size % align != 0)
1555 size = CEIL (size, align) * align;
1556 size += GET_MODE_SIZE (mode);
1557 apply_result_mode[regno] = mode;
1558 }
1559 else
d8ba6ec1 1560 apply_result_mode[regno] = as_a <fixed_size_mode> (VOIDmode);
53800dbe 1561
1562 /* Allow targets that use untyped_call and untyped_return to override
1563 the size so that machine-specific information can be stored here. */
1564#ifdef APPLY_RESULT_SIZE
1565 size = APPLY_RESULT_SIZE;
1566#endif
1567 }
1568 return size;
1569}
1570
53800dbe 1571/* Create a vector describing the result block RESULT. If SAVEP is true,
1572 the result block is used to save the values; otherwise it is used to
1573 restore the values. */
1574
1575static rtx
aecda0d6 1576result_vector (int savep, rtx result)
53800dbe 1577{
1578 int regno, size, align, nelts;
d8ba6ec1 1579 fixed_size_mode mode;
53800dbe 1580 rtx reg, mem;
364c0c59 1581 rtx *savevec = XALLOCAVEC (rtx, FIRST_PSEUDO_REGISTER);
bf8e3599 1582
53800dbe 1583 size = nelts = 0;
1584 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
1585 if ((mode = apply_result_mode[regno]) != VOIDmode)
1586 {
1587 align = GET_MODE_ALIGNMENT (mode) / BITS_PER_UNIT;
1588 if (size % align != 0)
1589 size = CEIL (size, align) * align;
1590 reg = gen_rtx_REG (mode, savep ? regno : INCOMING_REGNO (regno));
e513d163 1591 mem = adjust_address (result, mode, size);
53800dbe 1592 savevec[nelts++] = (savep
d1f9b275 1593 ? gen_rtx_SET (mem, reg)
1594 : gen_rtx_SET (reg, mem));
53800dbe 1595 size += GET_MODE_SIZE (mode);
1596 }
1597 return gen_rtx_PARALLEL (VOIDmode, gen_rtvec_v (nelts, savevec));
1598}
53800dbe 1599
1600/* Save the state required to perform an untyped call with the same
1601 arguments as were passed to the current function. */
1602
1603static rtx
aecda0d6 1604expand_builtin_apply_args_1 (void)
53800dbe 1605{
1c7e61a7 1606 rtx registers, tem;
53800dbe 1607 int size, align, regno;
d8ba6ec1 1608 fixed_size_mode mode;
6812c89e 1609 rtx struct_incoming_value = targetm.calls.struct_value_rtx (cfun ? TREE_TYPE (cfun->decl) : 0, 1);
53800dbe 1610
1611 /* Create a block where the arg-pointer, structure value address,
1612 and argument registers can be saved. */
1613 registers = assign_stack_local (BLKmode, apply_args_size (), -1);
1614
1615 /* Walk past the arg-pointer and structure value address. */
1616 size = GET_MODE_SIZE (Pmode);
6812c89e 1617 if (targetm.calls.struct_value_rtx (cfun ? TREE_TYPE (cfun->decl) : 0, 0))
53800dbe 1618 size += GET_MODE_SIZE (Pmode);
1619
1620 /* Save each register used in calling a function to the block. */
1621 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
1622 if ((mode = apply_args_mode[regno]) != VOIDmode)
1623 {
53800dbe 1624 align = GET_MODE_ALIGNMENT (mode) / BITS_PER_UNIT;
1625 if (size % align != 0)
1626 size = CEIL (size, align) * align;
1627
1628 tem = gen_rtx_REG (mode, INCOMING_REGNO (regno));
1629
e513d163 1630 emit_move_insn (adjust_address (registers, mode, size), tem);
53800dbe 1631 size += GET_MODE_SIZE (mode);
1632 }
1633
1634 /* Save the arg pointer to the block. */
27a7a23a 1635 tem = copy_to_reg (crtl->args.internal_arg_pointer);
1c7e61a7 1636 /* We need the pointer as the caller actually passed them to us, not
9d4b544c 1637 as we might have pretended they were passed. Make sure it's a valid
1638 operand, as emit_move_insn isn't expected to handle a PLUS. */
3764c94e 1639 if (STACK_GROWS_DOWNWARD)
1640 tem
1641 = force_operand (plus_constant (Pmode, tem,
1642 crtl->args.pretend_args_size),
1643 NULL_RTX);
1c7e61a7 1644 emit_move_insn (adjust_address (registers, Pmode, 0), tem);
0862b7e9 1645
53800dbe 1646 size = GET_MODE_SIZE (Pmode);
1647
1648 /* Save the structure value address unless this is passed as an
1649 "invisible" first argument. */
45550790 1650 if (struct_incoming_value)
53800dbe 1651 {
e513d163 1652 emit_move_insn (adjust_address (registers, Pmode, size),
45550790 1653 copy_to_reg (struct_incoming_value));
53800dbe 1654 size += GET_MODE_SIZE (Pmode);
1655 }
1656
1657 /* Return the address of the block. */
1658 return copy_addr_to_reg (XEXP (registers, 0));
1659}
1660
1661/* __builtin_apply_args returns block of memory allocated on
1662 the stack into which is stored the arg pointer, structure
1663 value address, static chain, and all the registers that might
1664 possibly be used in performing a function call. The code is
1665 moved to the start of the function so the incoming values are
1666 saved. */
27d0c333 1667
53800dbe 1668static rtx
aecda0d6 1669expand_builtin_apply_args (void)
53800dbe 1670{
1671 /* Don't do __builtin_apply_args more than once in a function.
1672 Save the result of the first call and reuse it. */
1673 if (apply_args_value != 0)
1674 return apply_args_value;
1675 {
1676 /* When this function is called, it means that registers must be
1677 saved on entry to this function. So we migrate the
1678 call to the first insn of this function. */
1679 rtx temp;
53800dbe 1680
1681 start_sequence ();
1682 temp = expand_builtin_apply_args_1 ();
9ed997be 1683 rtx_insn *seq = get_insns ();
53800dbe 1684 end_sequence ();
1685
1686 apply_args_value = temp;
1687
31d3e01c 1688 /* Put the insns after the NOTE that starts the function.
1689 If this is inside a start_sequence, make the outer-level insn
53800dbe 1690 chain current, so the code is placed at the start of the
0ef1a651 1691 function. If internal_arg_pointer is a non-virtual pseudo,
1692 it needs to be placed after the function that initializes
1693 that pseudo. */
53800dbe 1694 push_topmost_sequence ();
0ef1a651 1695 if (REG_P (crtl->args.internal_arg_pointer)
1696 && REGNO (crtl->args.internal_arg_pointer) > LAST_VIRTUAL_REGISTER)
1697 emit_insn_before (seq, parm_birth_insn);
1698 else
1699 emit_insn_before (seq, NEXT_INSN (entry_of_function ()));
53800dbe 1700 pop_topmost_sequence ();
1701 return temp;
1702 }
1703}
1704
1705/* Perform an untyped call and save the state required to perform an
1706 untyped return of whatever value was returned by the given function. */
1707
1708static rtx
aecda0d6 1709expand_builtin_apply (rtx function, rtx arguments, rtx argsize)
53800dbe 1710{
1711 int size, align, regno;
d8ba6ec1 1712 fixed_size_mode mode;
1e0c0b35 1713 rtx incoming_args, result, reg, dest, src;
1714 rtx_call_insn *call_insn;
53800dbe 1715 rtx old_stack_level = 0;
1716 rtx call_fusage = 0;
6812c89e 1717 rtx struct_value = targetm.calls.struct_value_rtx (cfun ? TREE_TYPE (cfun->decl) : 0, 0);
53800dbe 1718
85d654dd 1719 arguments = convert_memory_address (Pmode, arguments);
726ec87c 1720
53800dbe 1721 /* Create a block where the return registers can be saved. */
1722 result = assign_stack_local (BLKmode, apply_result_size (), -1);
1723
53800dbe 1724 /* Fetch the arg pointer from the ARGUMENTS block. */
1725 incoming_args = gen_reg_rtx (Pmode);
726ec87c 1726 emit_move_insn (incoming_args, gen_rtx_MEM (Pmode, arguments));
3764c94e 1727 if (!STACK_GROWS_DOWNWARD)
1728 incoming_args = expand_simple_binop (Pmode, MINUS, incoming_args, argsize,
1729 incoming_args, 0, OPTAB_LIB_WIDEN);
53800dbe 1730
04a46d40 1731 /* Push a new argument block and copy the arguments. Do not allow
1732 the (potential) memcpy call below to interfere with our stack
1733 manipulations. */
53800dbe 1734 do_pending_stack_adjust ();
04a46d40 1735 NO_DEFER_POP;
53800dbe 1736
2358393e 1737 /* Save the stack with nonlocal if available. */
71512c05 1738 if (targetm.have_save_stack_nonlocal ())
e9c97615 1739 emit_stack_save (SAVE_NONLOCAL, &old_stack_level);
53800dbe 1740 else
e9c97615 1741 emit_stack_save (SAVE_BLOCK, &old_stack_level);
53800dbe 1742
59647703 1743 /* Allocate a block of memory onto the stack and copy the memory
990495a7 1744 arguments to the outgoing arguments address. We can pass TRUE
1745 as the 4th argument because we just saved the stack pointer
1746 and will restore it right after the call. */
2b34677f 1747 allocate_dynamic_stack_space (argsize, 0, BIGGEST_ALIGNMENT, -1, true);
27a7a23a 1748
1749 /* Set DRAP flag to true, even though allocate_dynamic_stack_space
1750 may have already set current_function_calls_alloca to true.
1751 current_function_calls_alloca won't be set if argsize is zero,
1752 so we have to guarantee need_drap is true here. */
1753 if (SUPPORTS_STACK_ALIGNMENT)
1754 crtl->need_drap = true;
1755
59647703 1756 dest = virtual_outgoing_args_rtx;
3764c94e 1757 if (!STACK_GROWS_DOWNWARD)
1758 {
1759 if (CONST_INT_P (argsize))
1760 dest = plus_constant (Pmode, dest, -INTVAL (argsize));
1761 else
1762 dest = gen_rtx_PLUS (Pmode, dest, negate_rtx (Pmode, argsize));
1763 }
2a631e19 1764 dest = gen_rtx_MEM (BLKmode, dest);
1765 set_mem_align (dest, PARM_BOUNDARY);
1766 src = gen_rtx_MEM (BLKmode, incoming_args);
1767 set_mem_align (src, PARM_BOUNDARY);
0378dbdc 1768 emit_block_move (dest, src, argsize, BLOCK_OP_NORMAL);
53800dbe 1769
1770 /* Refer to the argument block. */
1771 apply_args_size ();
1772 arguments = gen_rtx_MEM (BLKmode, arguments);
2a631e19 1773 set_mem_align (arguments, PARM_BOUNDARY);
53800dbe 1774
1775 /* Walk past the arg-pointer and structure value address. */
1776 size = GET_MODE_SIZE (Pmode);
45550790 1777 if (struct_value)
53800dbe 1778 size += GET_MODE_SIZE (Pmode);
1779
1780 /* Restore each of the registers previously saved. Make USE insns
1781 for each of these registers for use in making the call. */
1782 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
1783 if ((mode = apply_args_mode[regno]) != VOIDmode)
1784 {
1785 align = GET_MODE_ALIGNMENT (mode) / BITS_PER_UNIT;
1786 if (size % align != 0)
1787 size = CEIL (size, align) * align;
1788 reg = gen_rtx_REG (mode, regno);
e513d163 1789 emit_move_insn (reg, adjust_address (arguments, mode, size));
53800dbe 1790 use_reg (&call_fusage, reg);
1791 size += GET_MODE_SIZE (mode);
1792 }
1793
1794 /* Restore the structure value address unless this is passed as an
1795 "invisible" first argument. */
1796 size = GET_MODE_SIZE (Pmode);
45550790 1797 if (struct_value)
53800dbe 1798 {
1799 rtx value = gen_reg_rtx (Pmode);
e513d163 1800 emit_move_insn (value, adjust_address (arguments, Pmode, size));
45550790 1801 emit_move_insn (struct_value, value);
8ad4c111 1802 if (REG_P (struct_value))
45550790 1803 use_reg (&call_fusage, struct_value);
53800dbe 1804 size += GET_MODE_SIZE (Pmode);
1805 }
1806
1807 /* All arguments and registers used for the call are set up by now! */
82c7907c 1808 function = prepare_call_address (NULL, function, NULL, &call_fusage, 0, 0);
53800dbe 1809
1810 /* Ensure address is valid. SYMBOL_REF is already valid, so no need,
1811 and we don't want to load it into a register as an optimization,
1812 because prepare_call_address already did it if it should be done. */
1813 if (GET_CODE (function) != SYMBOL_REF)
1814 function = memory_address (FUNCTION_MODE, function);
1815
1816 /* Generate the actual call instruction and save the return value. */
1d99ab0a 1817 if (targetm.have_untyped_call ())
1818 {
1819 rtx mem = gen_rtx_MEM (FUNCTION_MODE, function);
1820 emit_call_insn (targetm.gen_untyped_call (mem, result,
1821 result_vector (1, result)));
1822 }
7f265a08 1823 else if (targetm.have_call_value ())
53800dbe 1824 {
1825 rtx valreg = 0;
1826
1827 /* Locate the unique return register. It is not possible to
1828 express a call that sets more than one return register using
1829 call_value; use untyped_call for that. In fact, untyped_call
1830 only needs to save the return registers in the given block. */
1831 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
1832 if ((mode = apply_result_mode[regno]) != VOIDmode)
1833 {
7f265a08 1834 gcc_assert (!valreg); /* have_untyped_call required. */
7d3f6cc7 1835
53800dbe 1836 valreg = gen_rtx_REG (mode, regno);
1837 }
1838
7f265a08 1839 emit_insn (targetm.gen_call_value (valreg,
1840 gen_rtx_MEM (FUNCTION_MODE, function),
1841 const0_rtx, NULL_RTX, const0_rtx));
53800dbe 1842
e513d163 1843 emit_move_insn (adjust_address (result, GET_MODE (valreg), 0), valreg);
53800dbe 1844 }
1845 else
64db345d 1846 gcc_unreachable ();
53800dbe 1847
d5f9786f 1848 /* Find the CALL insn we just emitted, and attach the register usage
1849 information. */
1850 call_insn = last_call_insn ();
1851 add_function_usage_to (call_insn, call_fusage);
53800dbe 1852
1853 /* Restore the stack. */
71512c05 1854 if (targetm.have_save_stack_nonlocal ())
e9c97615 1855 emit_stack_restore (SAVE_NONLOCAL, old_stack_level);
53800dbe 1856 else
e9c97615 1857 emit_stack_restore (SAVE_BLOCK, old_stack_level);
9af5ce0c 1858 fixup_args_size_notes (call_insn, get_last_insn (), 0);
53800dbe 1859
04a46d40 1860 OK_DEFER_POP;
1861
53800dbe 1862 /* Return the address of the result block. */
85d654dd 1863 result = copy_addr_to_reg (XEXP (result, 0));
1864 return convert_memory_address (ptr_mode, result);
53800dbe 1865}
1866
1867/* Perform an untyped return. */
1868
1869static void
aecda0d6 1870expand_builtin_return (rtx result)
53800dbe 1871{
1872 int size, align, regno;
d8ba6ec1 1873 fixed_size_mode mode;
53800dbe 1874 rtx reg;
57c26b3a 1875 rtx_insn *call_fusage = 0;
53800dbe 1876
85d654dd 1877 result = convert_memory_address (Pmode, result);
726ec87c 1878
53800dbe 1879 apply_result_size ();
1880 result = gen_rtx_MEM (BLKmode, result);
1881
1d99ab0a 1882 if (targetm.have_untyped_return ())
53800dbe 1883 {
1d99ab0a 1884 rtx vector = result_vector (0, result);
1885 emit_jump_insn (targetm.gen_untyped_return (result, vector));
53800dbe 1886 emit_barrier ();
1887 return;
1888 }
53800dbe 1889
1890 /* Restore the return value and note that each value is used. */
1891 size = 0;
1892 for (regno = 0; regno < FIRST_PSEUDO_REGISTER; regno++)
1893 if ((mode = apply_result_mode[regno]) != VOIDmode)
1894 {
1895 align = GET_MODE_ALIGNMENT (mode) / BITS_PER_UNIT;
1896 if (size % align != 0)
1897 size = CEIL (size, align) * align;
1898 reg = gen_rtx_REG (mode, INCOMING_REGNO (regno));
e513d163 1899 emit_move_insn (reg, adjust_address (result, mode, size));
53800dbe 1900
1901 push_to_sequence (call_fusage);
18b42941 1902 emit_use (reg);
53800dbe 1903 call_fusage = get_insns ();
1904 end_sequence ();
1905 size += GET_MODE_SIZE (mode);
1906 }
1907
1908 /* Put the USE insns before the return. */
31d3e01c 1909 emit_insn (call_fusage);
53800dbe 1910
1911 /* Return whatever values was restored by jumping directly to the end
1912 of the function. */
62380d2d 1913 expand_naked_return ();
53800dbe 1914}
1915
539a3a92 1916/* Used by expand_builtin_classify_type and fold_builtin_classify_type. */
27d0c333 1917
539a3a92 1918static enum type_class
aecda0d6 1919type_to_class (tree type)
539a3a92 1920{
1921 switch (TREE_CODE (type))
1922 {
1923 case VOID_TYPE: return void_type_class;
1924 case INTEGER_TYPE: return integer_type_class;
539a3a92 1925 case ENUMERAL_TYPE: return enumeral_type_class;
1926 case BOOLEAN_TYPE: return boolean_type_class;
1927 case POINTER_TYPE: return pointer_type_class;
1928 case REFERENCE_TYPE: return reference_type_class;
1929 case OFFSET_TYPE: return offset_type_class;
1930 case REAL_TYPE: return real_type_class;
1931 case COMPLEX_TYPE: return complex_type_class;
1932 case FUNCTION_TYPE: return function_type_class;
1933 case METHOD_TYPE: return method_type_class;
1934 case RECORD_TYPE: return record_type_class;
1935 case UNION_TYPE:
1936 case QUAL_UNION_TYPE: return union_type_class;
1937 case ARRAY_TYPE: return (TYPE_STRING_FLAG (type)
1938 ? string_type_class : array_type_class);
539a3a92 1939 case LANG_TYPE: return lang_type_class;
1940 default: return no_type_class;
1941 }
1942}
bf8e3599 1943
c2f47e15 1944/* Expand a call EXP to __builtin_classify_type. */
27d0c333 1945
53800dbe 1946static rtx
c2f47e15 1947expand_builtin_classify_type (tree exp)
53800dbe 1948{
c2f47e15 1949 if (call_expr_nargs (exp))
1950 return GEN_INT (type_to_class (TREE_TYPE (CALL_EXPR_ARG (exp, 0))));
53800dbe 1951 return GEN_INT (no_type_class);
1952}
1953
8c32188e 1954/* This helper macro, meant to be used in mathfn_built_in below, determines
1955 which among a set of builtin math functions is appropriate for a given type
1956 mode. The `F' (float) and `L' (long double) are automatically generated
1957 from the 'double' case. If a function supports the _Float<N> and _Float<N>X
1958 types, there are additional types that are considered with 'F32', 'F64',
1959 'F128', etc. suffixes. */
e3240774 1960#define CASE_MATHFN(MATHFN) \
1961 CASE_CFN_##MATHFN: \
1962 fcode = BUILT_IN_##MATHFN; fcodef = BUILT_IN_##MATHFN##F ; \
1963 fcodel = BUILT_IN_##MATHFN##L ; break;
8c32188e 1964/* Similar to the above, but also add support for the _Float<N> and _Float<N>X
1965 types. */
1966#define CASE_MATHFN_FLOATN(MATHFN) \
1967 CASE_CFN_##MATHFN: \
1968 fcode = BUILT_IN_##MATHFN; fcodef = BUILT_IN_##MATHFN##F ; \
1969 fcodel = BUILT_IN_##MATHFN##L ; fcodef16 = BUILT_IN_##MATHFN##F16 ; \
1970 fcodef32 = BUILT_IN_##MATHFN##F32; fcodef64 = BUILT_IN_##MATHFN##F64 ; \
1971 fcodef128 = BUILT_IN_##MATHFN##F128 ; fcodef32x = BUILT_IN_##MATHFN##F32X ; \
1972 fcodef64x = BUILT_IN_##MATHFN##F64X ; fcodef128x = BUILT_IN_##MATHFN##F128X ;\
1973 break;
cd2656b0 1974/* Similar to above, but appends _R after any F/L suffix. */
e3240774 1975#define CASE_MATHFN_REENT(MATHFN) \
1976 case CFN_BUILT_IN_##MATHFN##_R: \
1977 case CFN_BUILT_IN_##MATHFN##F_R: \
1978 case CFN_BUILT_IN_##MATHFN##L_R: \
1979 fcode = BUILT_IN_##MATHFN##_R; fcodef = BUILT_IN_##MATHFN##F_R ; \
1980 fcodel = BUILT_IN_##MATHFN##L_R ; break;
07976da7 1981
6c21be92 1982/* Return a function equivalent to FN but operating on floating-point
1983 values of type TYPE, or END_BUILTINS if no such function exists.
e3240774 1984 This is purely an operation on function codes; it does not guarantee
1985 that the target actually has an implementation of the function. */
c319d56a 1986
6c21be92 1987static built_in_function
e3240774 1988mathfn_built_in_2 (tree type, combined_fn fn)
0a68165a 1989{
8c32188e 1990 tree mtype;
6c21be92 1991 built_in_function fcode, fcodef, fcodel;
8c32188e 1992 built_in_function fcodef16 = END_BUILTINS;
1993 built_in_function fcodef32 = END_BUILTINS;
1994 built_in_function fcodef64 = END_BUILTINS;
1995 built_in_function fcodef128 = END_BUILTINS;
1996 built_in_function fcodef32x = END_BUILTINS;
1997 built_in_function fcodef64x = END_BUILTINS;
1998 built_in_function fcodef128x = END_BUILTINS;
07976da7 1999
2000 switch (fn)
2001 {
e3240774 2002 CASE_MATHFN (ACOS)
2003 CASE_MATHFN (ACOSH)
2004 CASE_MATHFN (ASIN)
2005 CASE_MATHFN (ASINH)
2006 CASE_MATHFN (ATAN)
2007 CASE_MATHFN (ATAN2)
2008 CASE_MATHFN (ATANH)
2009 CASE_MATHFN (CBRT)
054e9558 2010 CASE_MATHFN_FLOATN (CEIL)
e3240774 2011 CASE_MATHFN (CEXPI)
8c32188e 2012 CASE_MATHFN_FLOATN (COPYSIGN)
e3240774 2013 CASE_MATHFN (COS)
2014 CASE_MATHFN (COSH)
2015 CASE_MATHFN (DREM)
2016 CASE_MATHFN (ERF)
2017 CASE_MATHFN (ERFC)
2018 CASE_MATHFN (EXP)
2019 CASE_MATHFN (EXP10)
2020 CASE_MATHFN (EXP2)
2021 CASE_MATHFN (EXPM1)
2022 CASE_MATHFN (FABS)
2023 CASE_MATHFN (FDIM)
054e9558 2024 CASE_MATHFN_FLOATN (FLOOR)
8c32188e 2025 CASE_MATHFN_FLOATN (FMA)
2026 CASE_MATHFN_FLOATN (FMAX)
2027 CASE_MATHFN_FLOATN (FMIN)
e3240774 2028 CASE_MATHFN (FMOD)
2029 CASE_MATHFN (FREXP)
2030 CASE_MATHFN (GAMMA)
2031 CASE_MATHFN_REENT (GAMMA) /* GAMMA_R */
2032 CASE_MATHFN (HUGE_VAL)
2033 CASE_MATHFN (HYPOT)
2034 CASE_MATHFN (ILOGB)
2035 CASE_MATHFN (ICEIL)
2036 CASE_MATHFN (IFLOOR)
2037 CASE_MATHFN (INF)
2038 CASE_MATHFN (IRINT)
2039 CASE_MATHFN (IROUND)
2040 CASE_MATHFN (ISINF)
2041 CASE_MATHFN (J0)
2042 CASE_MATHFN (J1)
2043 CASE_MATHFN (JN)
2044 CASE_MATHFN (LCEIL)
2045 CASE_MATHFN (LDEXP)
2046 CASE_MATHFN (LFLOOR)
2047 CASE_MATHFN (LGAMMA)
2048 CASE_MATHFN_REENT (LGAMMA) /* LGAMMA_R */
2049 CASE_MATHFN (LLCEIL)
2050 CASE_MATHFN (LLFLOOR)
2051 CASE_MATHFN (LLRINT)
2052 CASE_MATHFN (LLROUND)
2053 CASE_MATHFN (LOG)
2054 CASE_MATHFN (LOG10)
2055 CASE_MATHFN (LOG1P)
2056 CASE_MATHFN (LOG2)
2057 CASE_MATHFN (LOGB)
2058 CASE_MATHFN (LRINT)
2059 CASE_MATHFN (LROUND)
2060 CASE_MATHFN (MODF)
2061 CASE_MATHFN (NAN)
2062 CASE_MATHFN (NANS)
054e9558 2063 CASE_MATHFN_FLOATN (NEARBYINT)
e3240774 2064 CASE_MATHFN (NEXTAFTER)
2065 CASE_MATHFN (NEXTTOWARD)
2066 CASE_MATHFN (POW)
2067 CASE_MATHFN (POWI)
2068 CASE_MATHFN (POW10)
2069 CASE_MATHFN (REMAINDER)
2070 CASE_MATHFN (REMQUO)
054e9558 2071 CASE_MATHFN_FLOATN (RINT)
2072 CASE_MATHFN_FLOATN (ROUND)
e3240774 2073 CASE_MATHFN (SCALB)
2074 CASE_MATHFN (SCALBLN)
2075 CASE_MATHFN (SCALBN)
2076 CASE_MATHFN (SIGNBIT)
2077 CASE_MATHFN (SIGNIFICAND)
2078 CASE_MATHFN (SIN)
2079 CASE_MATHFN (SINCOS)
2080 CASE_MATHFN (SINH)
8c32188e 2081 CASE_MATHFN_FLOATN (SQRT)
e3240774 2082 CASE_MATHFN (TAN)
2083 CASE_MATHFN (TANH)
2084 CASE_MATHFN (TGAMMA)
054e9558 2085 CASE_MATHFN_FLOATN (TRUNC)
e3240774 2086 CASE_MATHFN (Y0)
2087 CASE_MATHFN (Y1)
2088 CASE_MATHFN (YN)
07976da7 2089
e3240774 2090 default:
2091 return END_BUILTINS;
2092 }
07976da7 2093
8c32188e 2094 mtype = TYPE_MAIN_VARIANT (type);
2095 if (mtype == double_type_node)
6c21be92 2096 return fcode;
8c32188e 2097 else if (mtype == float_type_node)
6c21be92 2098 return fcodef;
8c32188e 2099 else if (mtype == long_double_type_node)
6c21be92 2100 return fcodel;
8c32188e 2101 else if (mtype == float16_type_node)
2102 return fcodef16;
2103 else if (mtype == float32_type_node)
2104 return fcodef32;
2105 else if (mtype == float64_type_node)
2106 return fcodef64;
2107 else if (mtype == float128_type_node)
2108 return fcodef128;
2109 else if (mtype == float32x_type_node)
2110 return fcodef32x;
2111 else if (mtype == float64x_type_node)
2112 return fcodef64x;
2113 else if (mtype == float128x_type_node)
2114 return fcodef128x;
07976da7 2115 else
6c21be92 2116 return END_BUILTINS;
2117}
2118
2119/* Return mathematic function equivalent to FN but operating directly on TYPE,
2120 if available. If IMPLICIT_P is true use the implicit builtin declaration,
2121 otherwise use the explicit declaration. If we can't do the conversion,
2122 return null. */
2123
2124static tree
e3240774 2125mathfn_built_in_1 (tree type, combined_fn fn, bool implicit_p)
6c21be92 2126{
2127 built_in_function fcode2 = mathfn_built_in_2 (type, fn);
2128 if (fcode2 == END_BUILTINS)
c2f47e15 2129 return NULL_TREE;
b9a16870 2130
2131 if (implicit_p && !builtin_decl_implicit_p (fcode2))
2132 return NULL_TREE;
2133
2134 return builtin_decl_explicit (fcode2);
0a68165a 2135}
2136
e3240774 2137/* Like mathfn_built_in_1, but always use the implicit array. */
c319d56a 2138
2139tree
e3240774 2140mathfn_built_in (tree type, combined_fn fn)
c319d56a 2141{
2142 return mathfn_built_in_1 (type, fn, /*implicit=*/ 1);
2143}
2144
e3240774 2145/* Like mathfn_built_in_1, but take a built_in_function and
2146 always use the implicit array. */
2147
2148tree
2149mathfn_built_in (tree type, enum built_in_function fn)
2150{
2151 return mathfn_built_in_1 (type, as_combined_fn (fn), /*implicit=*/ 1);
2152}
2153
1f24b8e9 2154/* If BUILT_IN_NORMAL function FNDECL has an associated internal function,
2155 return its code, otherwise return IFN_LAST. Note that this function
2156 only tests whether the function is defined in internals.def, not whether
2157 it is actually available on the target. */
2158
2159internal_fn
2160associated_internal_fn (tree fndecl)
2161{
2162 gcc_checking_assert (DECL_BUILT_IN_CLASS (fndecl) == BUILT_IN_NORMAL);
2163 tree return_type = TREE_TYPE (TREE_TYPE (fndecl));
2164 switch (DECL_FUNCTION_CODE (fndecl))
2165 {
2166#define DEF_INTERNAL_FLT_FN(NAME, FLAGS, OPTAB, TYPE) \
2167 CASE_FLT_FN (BUILT_IN_##NAME): return IFN_##NAME;
8c32188e 2168#define DEF_INTERNAL_FLT_FLOATN_FN(NAME, FLAGS, OPTAB, TYPE) \
2169 CASE_FLT_FN (BUILT_IN_##NAME): return IFN_##NAME; \
2170 CASE_FLT_FN_FLOATN_NX (BUILT_IN_##NAME): return IFN_##NAME;
c9452b7c 2171#define DEF_INTERNAL_INT_FN(NAME, FLAGS, OPTAB, TYPE) \
2172 CASE_INT_FN (BUILT_IN_##NAME): return IFN_##NAME;
1f24b8e9 2173#include "internal-fn.def"
2174
2175 CASE_FLT_FN (BUILT_IN_POW10):
2176 return IFN_EXP10;
2177
2178 CASE_FLT_FN (BUILT_IN_DREM):
2179 return IFN_REMAINDER;
2180
2181 CASE_FLT_FN (BUILT_IN_SCALBN):
2182 CASE_FLT_FN (BUILT_IN_SCALBLN):
2183 if (REAL_MODE_FORMAT (TYPE_MODE (return_type))->b == 2)
2184 return IFN_LDEXP;
2185 return IFN_LAST;
2186
2187 default:
2188 return IFN_LAST;
2189 }
2190}
2191
2192/* If CALL is a call to a BUILT_IN_NORMAL function that could be replaced
2193 on the current target by a call to an internal function, return the
2194 code of that internal function, otherwise return IFN_LAST. The caller
2195 is responsible for ensuring that any side-effects of the built-in
2196 call are dealt with correctly. E.g. if CALL sets errno, the caller
2197 must decide that the errno result isn't needed or make it available
2198 in some other way. */
2199
2200internal_fn
2201replacement_internal_fn (gcall *call)
2202{
2203 if (gimple_call_builtin_p (call, BUILT_IN_NORMAL))
2204 {
2205 internal_fn ifn = associated_internal_fn (gimple_call_fndecl (call));
2206 if (ifn != IFN_LAST)
2207 {
2208 tree_pair types = direct_internal_fn_types (ifn, call);
acdfe9e0 2209 optimization_type opt_type = bb_optimization_type (gimple_bb (call));
2210 if (direct_internal_fn_supported_p (ifn, types, opt_type))
1f24b8e9 2211 return ifn;
2212 }
2213 }
2214 return IFN_LAST;
2215}
2216
7e0713b1 2217/* Expand a call to the builtin trinary math functions (fma).
2218 Return NULL_RTX if a normal call should be emitted rather than expanding the
2219 function in-line. EXP is the expression that is a call to the builtin
2220 function; if convenient, the result should be placed in TARGET.
2221 SUBTARGET may be used as the target for computing one of EXP's
2222 operands. */
2223
2224static rtx
2225expand_builtin_mathfn_ternary (tree exp, rtx target, rtx subtarget)
2226{
2227 optab builtin_optab;
1e0c0b35 2228 rtx op0, op1, op2, result;
2229 rtx_insn *insns;
7e0713b1 2230 tree fndecl = get_callee_fndecl (exp);
2231 tree arg0, arg1, arg2;
3754d046 2232 machine_mode mode;
7e0713b1 2233
2234 if (!validate_arglist (exp, REAL_TYPE, REAL_TYPE, REAL_TYPE, VOID_TYPE))
2235 return NULL_RTX;
2236
2237 arg0 = CALL_EXPR_ARG (exp, 0);
2238 arg1 = CALL_EXPR_ARG (exp, 1);
2239 arg2 = CALL_EXPR_ARG (exp, 2);
2240
2241 switch (DECL_FUNCTION_CODE (fndecl))
2242 {
2243 CASE_FLT_FN (BUILT_IN_FMA):
8c32188e 2244 CASE_FLT_FN_FLOATN_NX (BUILT_IN_FMA):
7e0713b1 2245 builtin_optab = fma_optab; break;
2246 default:
2247 gcc_unreachable ();
2248 }
2249
2250 /* Make a suitable register to place result in. */
2251 mode = TYPE_MODE (TREE_TYPE (exp));
2252
2253 /* Before working hard, check whether the instruction is available. */
2254 if (optab_handler (builtin_optab, mode) == CODE_FOR_nothing)
2255 return NULL_RTX;
2256
de2e453e 2257 result = gen_reg_rtx (mode);
7e0713b1 2258
2259 /* Always stabilize the argument list. */
2260 CALL_EXPR_ARG (exp, 0) = arg0 = builtin_save_expr (arg0);
2261 CALL_EXPR_ARG (exp, 1) = arg1 = builtin_save_expr (arg1);
2262 CALL_EXPR_ARG (exp, 2) = arg2 = builtin_save_expr (arg2);
2263
2264 op0 = expand_expr (arg0, subtarget, VOIDmode, EXPAND_NORMAL);
2265 op1 = expand_normal (arg1);
2266 op2 = expand_normal (arg2);
2267
2268 start_sequence ();
2269
de2e453e 2270 /* Compute into RESULT.
2271 Set RESULT to wherever the result comes back. */
2272 result = expand_ternary_op (mode, builtin_optab, op0, op1, op2,
2273 result, 0);
7e0713b1 2274
2275 /* If we were unable to expand via the builtin, stop the sequence
2276 (without outputting the insns) and call to the library function
2277 with the stabilized argument list. */
de2e453e 2278 if (result == 0)
7e0713b1 2279 {
2280 end_sequence ();
2281 return expand_call (exp, target, target == const0_rtx);
2282 }
2283
2284 /* Output the entire sequence. */
2285 insns = get_insns ();
2286 end_sequence ();
2287 emit_insn (insns);
2288
de2e453e 2289 return result;
7e0713b1 2290}
2291
6b43bae4 2292/* Expand a call to the builtin sin and cos math functions.
c2f47e15 2293 Return NULL_RTX if a normal call should be emitted rather than expanding the
6b43bae4 2294 function in-line. EXP is the expression that is a call to the builtin
2295 function; if convenient, the result should be placed in TARGET.
2296 SUBTARGET may be used as the target for computing one of EXP's
2297 operands. */
2298
2299static rtx
2300expand_builtin_mathfn_3 (tree exp, rtx target, rtx subtarget)
2301{
2302 optab builtin_optab;
1e0c0b35 2303 rtx op0;
2304 rtx_insn *insns;
6b43bae4 2305 tree fndecl = get_callee_fndecl (exp);
3754d046 2306 machine_mode mode;
abfea505 2307 tree arg;
6b43bae4 2308
c2f47e15 2309 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
2310 return NULL_RTX;
6b43bae4 2311
c2f47e15 2312 arg = CALL_EXPR_ARG (exp, 0);
6b43bae4 2313
2314 switch (DECL_FUNCTION_CODE (fndecl))
2315 {
4f35b1fc 2316 CASE_FLT_FN (BUILT_IN_SIN):
2317 CASE_FLT_FN (BUILT_IN_COS):
6b43bae4 2318 builtin_optab = sincos_optab; break;
2319 default:
64db345d 2320 gcc_unreachable ();
6b43bae4 2321 }
2322
2323 /* Make a suitable register to place result in. */
2324 mode = TYPE_MODE (TREE_TYPE (exp));
2325
6b43bae4 2326 /* Check if sincos insn is available, otherwise fallback
0bed3869 2327 to sin or cos insn. */
d6bf3b14 2328 if (optab_handler (builtin_optab, mode) == CODE_FOR_nothing)
6b43bae4 2329 switch (DECL_FUNCTION_CODE (fndecl))
2330 {
4f35b1fc 2331 CASE_FLT_FN (BUILT_IN_SIN):
6b43bae4 2332 builtin_optab = sin_optab; break;
4f35b1fc 2333 CASE_FLT_FN (BUILT_IN_COS):
6b43bae4 2334 builtin_optab = cos_optab; break;
2335 default:
64db345d 2336 gcc_unreachable ();
6b43bae4 2337 }
6b43bae4 2338
2339 /* Before working hard, check whether the instruction is available. */
d6bf3b14 2340 if (optab_handler (builtin_optab, mode) != CODE_FOR_nothing)
6b43bae4 2341 {
de2e453e 2342 rtx result = gen_reg_rtx (mode);
6b43bae4 2343
2344 /* Wrap the computation of the argument in a SAVE_EXPR, as we may
2345 need to expand the argument again. This way, we will not perform
2346 side-effects more the once. */
abfea505 2347 CALL_EXPR_ARG (exp, 0) = arg = builtin_save_expr (arg);
6b43bae4 2348
1db6d067 2349 op0 = expand_expr (arg, subtarget, VOIDmode, EXPAND_NORMAL);
6b43bae4 2350
6b43bae4 2351 start_sequence ();
2352
de2e453e 2353 /* Compute into RESULT.
2354 Set RESULT to wherever the result comes back. */
6b43bae4 2355 if (builtin_optab == sincos_optab)
2356 {
de2e453e 2357 int ok;
7d3f6cc7 2358
6b43bae4 2359 switch (DECL_FUNCTION_CODE (fndecl))
2360 {
4f35b1fc 2361 CASE_FLT_FN (BUILT_IN_SIN):
de2e453e 2362 ok = expand_twoval_unop (builtin_optab, op0, 0, result, 0);
6b43bae4 2363 break;
4f35b1fc 2364 CASE_FLT_FN (BUILT_IN_COS):
de2e453e 2365 ok = expand_twoval_unop (builtin_optab, op0, result, 0, 0);
6b43bae4 2366 break;
2367 default:
64db345d 2368 gcc_unreachable ();
6b43bae4 2369 }
de2e453e 2370 gcc_assert (ok);
6b43bae4 2371 }
2372 else
de2e453e 2373 result = expand_unop (mode, builtin_optab, op0, result, 0);
6b43bae4 2374
de2e453e 2375 if (result != 0)
6b43bae4 2376 {
6b43bae4 2377 /* Output the entire sequence. */
2378 insns = get_insns ();
2379 end_sequence ();
2380 emit_insn (insns);
de2e453e 2381 return result;
6b43bae4 2382 }
2383
2384 /* If we were unable to expand via the builtin, stop the sequence
2385 (without outputting the insns) and call to the library function
2386 with the stabilized argument list. */
2387 end_sequence ();
2388 }
2389
de2e453e 2390 return expand_call (exp, target, target == const0_rtx);
6b43bae4 2391}
2392
a65c4d64 2393/* Given an interclass math builtin decl FNDECL and it's argument ARG
2394 return an RTL instruction code that implements the functionality.
2395 If that isn't possible or available return CODE_FOR_nothing. */
a67a90e5 2396
a65c4d64 2397static enum insn_code
2398interclass_mathfn_icode (tree arg, tree fndecl)
a67a90e5 2399{
a65c4d64 2400 bool errno_set = false;
6cdd383a 2401 optab builtin_optab = unknown_optab;
3754d046 2402 machine_mode mode;
a67a90e5 2403
2404 switch (DECL_FUNCTION_CODE (fndecl))
2405 {
2406 CASE_FLT_FN (BUILT_IN_ILOGB):
12f08300 2407 errno_set = true; builtin_optab = ilogb_optab; break;
2408 CASE_FLT_FN (BUILT_IN_ISINF):
2409 builtin_optab = isinf_optab; break;
2410 case BUILT_IN_ISNORMAL:
2411 case BUILT_IN_ISFINITE:
2412 CASE_FLT_FN (BUILT_IN_FINITE):
2413 case BUILT_IN_FINITED32:
2414 case BUILT_IN_FINITED64:
2415 case BUILT_IN_FINITED128:
2416 case BUILT_IN_ISINFD32:
2417 case BUILT_IN_ISINFD64:
2418 case BUILT_IN_ISINFD128:
2419 /* These builtins have no optabs (yet). */
cde061c1 2420 break;
a67a90e5 2421 default:
2422 gcc_unreachable ();
2423 }
2424
2425 /* There's no easy way to detect the case we need to set EDOM. */
2426 if (flag_errno_math && errno_set)
a65c4d64 2427 return CODE_FOR_nothing;
a67a90e5 2428
2429 /* Optab mode depends on the mode of the input argument. */
2430 mode = TYPE_MODE (TREE_TYPE (arg));
2431
cde061c1 2432 if (builtin_optab)
d6bf3b14 2433 return optab_handler (builtin_optab, mode);
a65c4d64 2434 return CODE_FOR_nothing;
2435}
2436
2437/* Expand a call to one of the builtin math functions that operate on
12f08300 2438 floating point argument and output an integer result (ilogb, isinf,
2439 isnan, etc).
a65c4d64 2440 Return 0 if a normal call should be emitted rather than expanding the
2441 function in-line. EXP is the expression that is a call to the builtin
f97eea22 2442 function; if convenient, the result should be placed in TARGET. */
a65c4d64 2443
2444static rtx
f97eea22 2445expand_builtin_interclass_mathfn (tree exp, rtx target)
a65c4d64 2446{
2447 enum insn_code icode = CODE_FOR_nothing;
2448 rtx op0;
2449 tree fndecl = get_callee_fndecl (exp);
3754d046 2450 machine_mode mode;
a65c4d64 2451 tree arg;
2452
2453 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
2454 return NULL_RTX;
2455
2456 arg = CALL_EXPR_ARG (exp, 0);
2457 icode = interclass_mathfn_icode (arg, fndecl);
2458 mode = TYPE_MODE (TREE_TYPE (arg));
2459
a67a90e5 2460 if (icode != CODE_FOR_nothing)
2461 {
8786db1e 2462 struct expand_operand ops[1];
1e0c0b35 2463 rtx_insn *last = get_last_insn ();
4e2a2fb4 2464 tree orig_arg = arg;
a67a90e5 2465
2466 /* Wrap the computation of the argument in a SAVE_EXPR, as we may
2467 need to expand the argument again. This way, we will not perform
2468 side-effects more the once. */
abfea505 2469 CALL_EXPR_ARG (exp, 0) = arg = builtin_save_expr (arg);
a67a90e5 2470
f97eea22 2471 op0 = expand_expr (arg, NULL_RTX, VOIDmode, EXPAND_NORMAL);
a67a90e5 2472
2473 if (mode != GET_MODE (op0))
2474 op0 = convert_to_mode (mode, op0, 0);
2475
8786db1e 2476 create_output_operand (&ops[0], target, TYPE_MODE (TREE_TYPE (exp)));
2477 if (maybe_legitimize_operands (icode, 0, 1, ops)
2478 && maybe_emit_unop_insn (icode, ops[0].value, op0, UNKNOWN))
2479 return ops[0].value;
2480
4e2a2fb4 2481 delete_insns_since (last);
2482 CALL_EXPR_ARG (exp, 0) = orig_arg;
a67a90e5 2483 }
2484
a65c4d64 2485 return NULL_RTX;
a67a90e5 2486}
2487
c3147c1a 2488/* Expand a call to the builtin sincos math function.
c2f47e15 2489 Return NULL_RTX if a normal call should be emitted rather than expanding the
c3147c1a 2490 function in-line. EXP is the expression that is a call to the builtin
2491 function. */
2492
2493static rtx
2494expand_builtin_sincos (tree exp)
2495{
2496 rtx op0, op1, op2, target1, target2;
3754d046 2497 machine_mode mode;
c3147c1a 2498 tree arg, sinp, cosp;
2499 int result;
389dd41b 2500 location_t loc = EXPR_LOCATION (exp);
be5575b2 2501 tree alias_type, alias_off;
c3147c1a 2502
c2f47e15 2503 if (!validate_arglist (exp, REAL_TYPE,
2504 POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
2505 return NULL_RTX;
c3147c1a 2506
c2f47e15 2507 arg = CALL_EXPR_ARG (exp, 0);
2508 sinp = CALL_EXPR_ARG (exp, 1);
2509 cosp = CALL_EXPR_ARG (exp, 2);
c3147c1a 2510
2511 /* Make a suitable register to place result in. */
2512 mode = TYPE_MODE (TREE_TYPE (arg));
2513
2514 /* Check if sincos insn is available, otherwise emit the call. */
d6bf3b14 2515 if (optab_handler (sincos_optab, mode) == CODE_FOR_nothing)
c3147c1a 2516 return NULL_RTX;
2517
2518 target1 = gen_reg_rtx (mode);
2519 target2 = gen_reg_rtx (mode);
2520
8ec3c5c2 2521 op0 = expand_normal (arg);
be5575b2 2522 alias_type = build_pointer_type_for_mode (TREE_TYPE (arg), ptr_mode, true);
2523 alias_off = build_int_cst (alias_type, 0);
2524 op1 = expand_normal (fold_build2_loc (loc, MEM_REF, TREE_TYPE (arg),
2525 sinp, alias_off));
2526 op2 = expand_normal (fold_build2_loc (loc, MEM_REF, TREE_TYPE (arg),
2527 cosp, alias_off));
c3147c1a 2528
2529 /* Compute into target1 and target2.
2530 Set TARGET to wherever the result comes back. */
2531 result = expand_twoval_unop (sincos_optab, op0, target2, target1, 0);
2532 gcc_assert (result);
2533
2534 /* Move target1 and target2 to the memory locations indicated
2535 by op1 and op2. */
2536 emit_move_insn (op1, target1);
2537 emit_move_insn (op2, target2);
2538
2539 return const0_rtx;
2540}
2541
d735c391 2542/* Expand a call to the internal cexpi builtin to the sincos math function.
2543 EXP is the expression that is a call to the builtin function; if convenient,
f97eea22 2544 the result should be placed in TARGET. */
d735c391 2545
2546static rtx
f97eea22 2547expand_builtin_cexpi (tree exp, rtx target)
d735c391 2548{
2549 tree fndecl = get_callee_fndecl (exp);
d735c391 2550 tree arg, type;
3754d046 2551 machine_mode mode;
d735c391 2552 rtx op0, op1, op2;
389dd41b 2553 location_t loc = EXPR_LOCATION (exp);
d735c391 2554
c2f47e15 2555 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
2556 return NULL_RTX;
d735c391 2557
c2f47e15 2558 arg = CALL_EXPR_ARG (exp, 0);
d735c391 2559 type = TREE_TYPE (arg);
2560 mode = TYPE_MODE (TREE_TYPE (arg));
2561
2562 /* Try expanding via a sincos optab, fall back to emitting a libcall
18b8d8ae 2563 to sincos or cexp. We are sure we have sincos or cexp because cexpi
2564 is only generated from sincos, cexp or if we have either of them. */
d6bf3b14 2565 if (optab_handler (sincos_optab, mode) != CODE_FOR_nothing)
d735c391 2566 {
2567 op1 = gen_reg_rtx (mode);
2568 op2 = gen_reg_rtx (mode);
2569
f97eea22 2570 op0 = expand_expr (arg, NULL_RTX, VOIDmode, EXPAND_NORMAL);
d735c391 2571
2572 /* Compute into op1 and op2. */
2573 expand_twoval_unop (sincos_optab, op0, op2, op1, 0);
2574 }
30f690e0 2575 else if (targetm.libc_has_function (function_sincos))
d735c391 2576 {
c2f47e15 2577 tree call, fn = NULL_TREE;
d735c391 2578 tree top1, top2;
2579 rtx op1a, op2a;
2580
2581 if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPIF)
b9a16870 2582 fn = builtin_decl_explicit (BUILT_IN_SINCOSF);
d735c391 2583 else if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPI)
b9a16870 2584 fn = builtin_decl_explicit (BUILT_IN_SINCOS);
d735c391 2585 else if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPIL)
b9a16870 2586 fn = builtin_decl_explicit (BUILT_IN_SINCOSL);
c2f47e15 2587 else
2588 gcc_unreachable ();
48e1416a 2589
0ab48139 2590 op1 = assign_temp (TREE_TYPE (arg), 1, 1);
2591 op2 = assign_temp (TREE_TYPE (arg), 1, 1);
99182918 2592 op1a = copy_addr_to_reg (XEXP (op1, 0));
2593 op2a = copy_addr_to_reg (XEXP (op2, 0));
d735c391 2594 top1 = make_tree (build_pointer_type (TREE_TYPE (arg)), op1a);
2595 top2 = make_tree (build_pointer_type (TREE_TYPE (arg)), op2a);
2596
d735c391 2597 /* Make sure not to fold the sincos call again. */
2598 call = build1 (ADDR_EXPR, build_pointer_type (TREE_TYPE (fn)), fn);
c2f47e15 2599 expand_normal (build_call_nary (TREE_TYPE (TREE_TYPE (fn)),
2600 call, 3, arg, top1, top2));
d735c391 2601 }
18b8d8ae 2602 else
2603 {
0ecbc158 2604 tree call, fn = NULL_TREE, narg;
18b8d8ae 2605 tree ctype = build_complex_type (type);
2606
0ecbc158 2607 if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPIF)
b9a16870 2608 fn = builtin_decl_explicit (BUILT_IN_CEXPF);
0ecbc158 2609 else if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPI)
b9a16870 2610 fn = builtin_decl_explicit (BUILT_IN_CEXP);
0ecbc158 2611 else if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPIL)
b9a16870 2612 fn = builtin_decl_explicit (BUILT_IN_CEXPL);
c2f47e15 2613 else
2614 gcc_unreachable ();
fc0dfa6e 2615
2616 /* If we don't have a decl for cexp create one. This is the
2617 friendliest fallback if the user calls __builtin_cexpi
2618 without full target C99 function support. */
2619 if (fn == NULL_TREE)
2620 {
2621 tree fntype;
2622 const char *name = NULL;
2623
2624 if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPIF)
2625 name = "cexpf";
2626 else if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPI)
2627 name = "cexp";
2628 else if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_CEXPIL)
2629 name = "cexpl";
2630
2631 fntype = build_function_type_list (ctype, ctype, NULL_TREE);
2632 fn = build_fn_decl (name, fntype);
2633 }
2634
389dd41b 2635 narg = fold_build2_loc (loc, COMPLEX_EXPR, ctype,
18b8d8ae 2636 build_real (type, dconst0), arg);
2637
2638 /* Make sure not to fold the cexp call again. */
2639 call = build1 (ADDR_EXPR, build_pointer_type (TREE_TYPE (fn)), fn);
48e1416a 2640 return expand_expr (build_call_nary (ctype, call, 1, narg),
1db6d067 2641 target, VOIDmode, EXPAND_NORMAL);
18b8d8ae 2642 }
d735c391 2643
2644 /* Now build the proper return type. */
2645 return expand_expr (build2 (COMPLEX_EXPR, build_complex_type (type),
2646 make_tree (TREE_TYPE (arg), op2),
2647 make_tree (TREE_TYPE (arg), op1)),
1db6d067 2648 target, VOIDmode, EXPAND_NORMAL);
d735c391 2649}
2650
a65c4d64 2651/* Conveniently construct a function call expression. FNDECL names the
2652 function to be called, N is the number of arguments, and the "..."
2653 parameters are the argument expressions. Unlike build_call_exr
2654 this doesn't fold the call, hence it will always return a CALL_EXPR. */
2655
2656static tree
2657build_call_nofold_loc (location_t loc, tree fndecl, int n, ...)
2658{
2659 va_list ap;
2660 tree fntype = TREE_TYPE (fndecl);
2661 tree fn = build1 (ADDR_EXPR, build_pointer_type (fntype), fndecl);
2662
2663 va_start (ap, n);
2664 fn = build_call_valist (TREE_TYPE (fntype), fn, n, ap);
2665 va_end (ap);
2666 SET_EXPR_LOCATION (fn, loc);
2667 return fn;
2668}
a65c4d64 2669
7d3afc77 2670/* Expand a call to one of the builtin rounding functions gcc defines
2671 as an extension (lfloor and lceil). As these are gcc extensions we
2672 do not need to worry about setting errno to EDOM.
ad52b9b7 2673 If expanding via optab fails, lower expression to (int)(floor(x)).
2674 EXP is the expression that is a call to the builtin function;
ff1b14e4 2675 if convenient, the result should be placed in TARGET. */
ad52b9b7 2676
2677static rtx
ff1b14e4 2678expand_builtin_int_roundingfn (tree exp, rtx target)
ad52b9b7 2679{
9c42dd28 2680 convert_optab builtin_optab;
1e0c0b35 2681 rtx op0, tmp;
2682 rtx_insn *insns;
ad52b9b7 2683 tree fndecl = get_callee_fndecl (exp);
ad52b9b7 2684 enum built_in_function fallback_fn;
2685 tree fallback_fndecl;
3754d046 2686 machine_mode mode;
4de0924f 2687 tree arg;
ad52b9b7 2688
c2f47e15 2689 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
ad52b9b7 2690 gcc_unreachable ();
2691
c2f47e15 2692 arg = CALL_EXPR_ARG (exp, 0);
ad52b9b7 2693
2694 switch (DECL_FUNCTION_CODE (fndecl))
2695 {
80ff6494 2696 CASE_FLT_FN (BUILT_IN_ICEIL):
4f35b1fc 2697 CASE_FLT_FN (BUILT_IN_LCEIL):
2698 CASE_FLT_FN (BUILT_IN_LLCEIL):
ac148751 2699 builtin_optab = lceil_optab;
2700 fallback_fn = BUILT_IN_CEIL;
2701 break;
2702
80ff6494 2703 CASE_FLT_FN (BUILT_IN_IFLOOR):
4f35b1fc 2704 CASE_FLT_FN (BUILT_IN_LFLOOR):
2705 CASE_FLT_FN (BUILT_IN_LLFLOOR):
ad52b9b7 2706 builtin_optab = lfloor_optab;
2707 fallback_fn = BUILT_IN_FLOOR;
2708 break;
2709
2710 default:
2711 gcc_unreachable ();
2712 }
2713
2714 /* Make a suitable register to place result in. */
2715 mode = TYPE_MODE (TREE_TYPE (exp));
2716
9c42dd28 2717 target = gen_reg_rtx (mode);
ad52b9b7 2718
9c42dd28 2719 /* Wrap the computation of the argument in a SAVE_EXPR, as we may
2720 need to expand the argument again. This way, we will not perform
2721 side-effects more the once. */
abfea505 2722 CALL_EXPR_ARG (exp, 0) = arg = builtin_save_expr (arg);
ad52b9b7 2723
ff1b14e4 2724 op0 = expand_expr (arg, NULL, VOIDmode, EXPAND_NORMAL);
ad52b9b7 2725
9c42dd28 2726 start_sequence ();
ad52b9b7 2727
9c42dd28 2728 /* Compute into TARGET. */
2729 if (expand_sfix_optab (target, op0, builtin_optab))
2730 {
2731 /* Output the entire sequence. */
2732 insns = get_insns ();
ad52b9b7 2733 end_sequence ();
9c42dd28 2734 emit_insn (insns);
2735 return target;
ad52b9b7 2736 }
2737
9c42dd28 2738 /* If we were unable to expand via the builtin, stop the sequence
2739 (without outputting the insns). */
2740 end_sequence ();
2741
ad52b9b7 2742 /* Fall back to floating point rounding optab. */
2743 fallback_fndecl = mathfn_built_in (TREE_TYPE (arg), fallback_fn);
fc0dfa6e 2744
2745 /* For non-C99 targets we may end up without a fallback fndecl here
2746 if the user called __builtin_lfloor directly. In this case emit
2747 a call to the floor/ceil variants nevertheless. This should result
2748 in the best user experience for not full C99 targets. */
2749 if (fallback_fndecl == NULL_TREE)
2750 {
2751 tree fntype;
2752 const char *name = NULL;
2753
2754 switch (DECL_FUNCTION_CODE (fndecl))
2755 {
80ff6494 2756 case BUILT_IN_ICEIL:
fc0dfa6e 2757 case BUILT_IN_LCEIL:
2758 case BUILT_IN_LLCEIL:
2759 name = "ceil";
2760 break;
80ff6494 2761 case BUILT_IN_ICEILF:
fc0dfa6e 2762 case BUILT_IN_LCEILF:
2763 case BUILT_IN_LLCEILF:
2764 name = "ceilf";
2765 break;
80ff6494 2766 case BUILT_IN_ICEILL:
fc0dfa6e 2767 case BUILT_IN_LCEILL:
2768 case BUILT_IN_LLCEILL:
2769 name = "ceill";
2770 break;
80ff6494 2771 case BUILT_IN_IFLOOR:
fc0dfa6e 2772 case BUILT_IN_LFLOOR:
2773 case BUILT_IN_LLFLOOR:
2774 name = "floor";
2775 break;
80ff6494 2776 case BUILT_IN_IFLOORF:
fc0dfa6e 2777 case BUILT_IN_LFLOORF:
2778 case BUILT_IN_LLFLOORF:
2779 name = "floorf";
2780 break;
80ff6494 2781 case BUILT_IN_IFLOORL:
fc0dfa6e 2782 case BUILT_IN_LFLOORL:
2783 case BUILT_IN_LLFLOORL:
2784 name = "floorl";
2785 break;
2786 default:
2787 gcc_unreachable ();
2788 }
2789
2790 fntype = build_function_type_list (TREE_TYPE (arg),
2791 TREE_TYPE (arg), NULL_TREE);
2792 fallback_fndecl = build_fn_decl (name, fntype);
2793 }
2794
0568e9c1 2795 exp = build_call_nofold_loc (EXPR_LOCATION (exp), fallback_fndecl, 1, arg);
ad52b9b7 2796
d4c690af 2797 tmp = expand_normal (exp);
933eb13a 2798 tmp = maybe_emit_group_store (tmp, TREE_TYPE (exp));
ad52b9b7 2799
2800 /* Truncate the result of floating point optab to integer
2801 via expand_fix (). */
2802 target = gen_reg_rtx (mode);
2803 expand_fix (target, tmp, 0);
2804
2805 return target;
2806}
2807
7d3afc77 2808/* Expand a call to one of the builtin math functions doing integer
2809 conversion (lrint).
2810 Return 0 if a normal call should be emitted rather than expanding the
2811 function in-line. EXP is the expression that is a call to the builtin
ff1b14e4 2812 function; if convenient, the result should be placed in TARGET. */
7d3afc77 2813
2814static rtx
ff1b14e4 2815expand_builtin_int_roundingfn_2 (tree exp, rtx target)
7d3afc77 2816{
5f51ee59 2817 convert_optab builtin_optab;
1e0c0b35 2818 rtx op0;
2819 rtx_insn *insns;
7d3afc77 2820 tree fndecl = get_callee_fndecl (exp);
4de0924f 2821 tree arg;
3754d046 2822 machine_mode mode;
e951f9a4 2823 enum built_in_function fallback_fn = BUILT_IN_NONE;
7d3afc77 2824
c2f47e15 2825 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
2826 gcc_unreachable ();
48e1416a 2827
c2f47e15 2828 arg = CALL_EXPR_ARG (exp, 0);
7d3afc77 2829
2830 switch (DECL_FUNCTION_CODE (fndecl))
2831 {
80ff6494 2832 CASE_FLT_FN (BUILT_IN_IRINT):
e951f9a4 2833 fallback_fn = BUILT_IN_LRINT;
3c77f69c 2834 gcc_fallthrough ();
7d3afc77 2835 CASE_FLT_FN (BUILT_IN_LRINT):
2836 CASE_FLT_FN (BUILT_IN_LLRINT):
e951f9a4 2837 builtin_optab = lrint_optab;
2838 break;
80ff6494 2839
2840 CASE_FLT_FN (BUILT_IN_IROUND):
e951f9a4 2841 fallback_fn = BUILT_IN_LROUND;
3c77f69c 2842 gcc_fallthrough ();
ef2f1a10 2843 CASE_FLT_FN (BUILT_IN_LROUND):
2844 CASE_FLT_FN (BUILT_IN_LLROUND):
e951f9a4 2845 builtin_optab = lround_optab;
2846 break;
80ff6494 2847
7d3afc77 2848 default:
2849 gcc_unreachable ();
2850 }
2851
e951f9a4 2852 /* There's no easy way to detect the case we need to set EDOM. */
2853 if (flag_errno_math && fallback_fn == BUILT_IN_NONE)
2854 return NULL_RTX;
2855
7d3afc77 2856 /* Make a suitable register to place result in. */
2857 mode = TYPE_MODE (TREE_TYPE (exp));
2858
e951f9a4 2859 /* There's no easy way to detect the case we need to set EDOM. */
2860 if (!flag_errno_math)
2861 {
de2e453e 2862 rtx result = gen_reg_rtx (mode);
7d3afc77 2863
e951f9a4 2864 /* Wrap the computation of the argument in a SAVE_EXPR, as we may
2865 need to expand the argument again. This way, we will not perform
2866 side-effects more the once. */
2867 CALL_EXPR_ARG (exp, 0) = arg = builtin_save_expr (arg);
7d3afc77 2868
e951f9a4 2869 op0 = expand_expr (arg, NULL, VOIDmode, EXPAND_NORMAL);
7d3afc77 2870
e951f9a4 2871 start_sequence ();
7d3afc77 2872
de2e453e 2873 if (expand_sfix_optab (result, op0, builtin_optab))
e951f9a4 2874 {
2875 /* Output the entire sequence. */
2876 insns = get_insns ();
2877 end_sequence ();
2878 emit_insn (insns);
de2e453e 2879 return result;
e951f9a4 2880 }
2881
2882 /* If we were unable to expand via the builtin, stop the sequence
2883 (without outputting the insns) and call to the library function
2884 with the stabilized argument list. */
7d3afc77 2885 end_sequence ();
2886 }
2887
e951f9a4 2888 if (fallback_fn != BUILT_IN_NONE)
2889 {
2890 /* Fall back to rounding to long int. Use implicit_p 0 - for non-C99
2891 targets, (int) round (x) should never be transformed into
2892 BUILT_IN_IROUND and if __builtin_iround is called directly, emit
2893 a call to lround in the hope that the target provides at least some
2894 C99 functions. This should result in the best user experience for
2895 not full C99 targets. */
e3240774 2896 tree fallback_fndecl = mathfn_built_in_1
2897 (TREE_TYPE (arg), as_combined_fn (fallback_fn), 0);
e951f9a4 2898
2899 exp = build_call_nofold_loc (EXPR_LOCATION (exp),
2900 fallback_fndecl, 1, arg);
2901
2902 target = expand_call (exp, NULL_RTX, target == const0_rtx);
933eb13a 2903 target = maybe_emit_group_store (target, TREE_TYPE (exp));
e951f9a4 2904 return convert_to_mode (mode, target, 0);
2905 }
5f51ee59 2906
de2e453e 2907 return expand_call (exp, target, target == const0_rtx);
7d3afc77 2908}
2909
c2f47e15 2910/* Expand a call to the powi built-in mathematical function. Return NULL_RTX if
757c219d 2911 a normal call should be emitted rather than expanding the function
2912 in-line. EXP is the expression that is a call to the builtin
2913 function; if convenient, the result should be placed in TARGET. */
2914
2915static rtx
f97eea22 2916expand_builtin_powi (tree exp, rtx target)
757c219d 2917{
757c219d 2918 tree arg0, arg1;
2919 rtx op0, op1;
3754d046 2920 machine_mode mode;
2921 machine_mode mode2;
757c219d 2922
c2f47e15 2923 if (! validate_arglist (exp, REAL_TYPE, INTEGER_TYPE, VOID_TYPE))
2924 return NULL_RTX;
757c219d 2925
c2f47e15 2926 arg0 = CALL_EXPR_ARG (exp, 0);
2927 arg1 = CALL_EXPR_ARG (exp, 1);
757c219d 2928 mode = TYPE_MODE (TREE_TYPE (exp));
2929
757c219d 2930 /* Emit a libcall to libgcc. */
2931
c2f47e15 2932 /* Mode of the 2nd argument must match that of an int. */
517be012 2933 mode2 = int_mode_for_size (INT_TYPE_SIZE, 0).require ();
d0405f40 2934
757c219d 2935 if (target == NULL_RTX)
2936 target = gen_reg_rtx (mode);
2937
f97eea22 2938 op0 = expand_expr (arg0, NULL_RTX, mode, EXPAND_NORMAL);
757c219d 2939 if (GET_MODE (op0) != mode)
2940 op0 = convert_to_mode (mode, op0, 0);
1db6d067 2941 op1 = expand_expr (arg1, NULL_RTX, mode2, EXPAND_NORMAL);
d0405f40 2942 if (GET_MODE (op1) != mode2)
2943 op1 = convert_to_mode (mode2, op1, 0);
757c219d 2944
f36b9f69 2945 target = emit_library_call_value (optab_libfunc (powi_optab, mode),
9e9e5c15 2946 target, LCT_CONST, mode,
d0405f40 2947 op0, mode, op1, mode2);
757c219d 2948
2949 return target;
2950}
2951
48e1416a 2952/* Expand expression EXP which is a call to the strlen builtin. Return
864bd5de 2953 NULL_RTX if we failed and the caller should emit a normal call, otherwise
aed0bd19 2954 try to get the result in TARGET, if convenient. */
f7c44134 2955
53800dbe 2956static rtx
c2f47e15 2957expand_builtin_strlen (tree exp, rtx target,
3754d046 2958 machine_mode target_mode)
53800dbe 2959{
c2f47e15 2960 if (!validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
2961 return NULL_RTX;
6248e345 2962
5c5d012b 2963 struct expand_operand ops[4];
2964 rtx pat;
2965 tree len;
2966 tree src = CALL_EXPR_ARG (exp, 0);
2967 rtx src_reg;
2968 rtx_insn *before_strlen;
2969 machine_mode insn_mode;
2970 enum insn_code icode = CODE_FOR_nothing;
2971 unsigned int align;
681fab1e 2972
5c5d012b 2973 /* If the length can be computed at compile-time, return it. */
2974 len = c_strlen (src, 0);
2975 if (len)
2976 return expand_expr (len, target, target_mode, EXPAND_NORMAL);
2977
2978 /* If the length can be computed at compile-time and is constant
2979 integer, but there are side-effects in src, evaluate
2980 src for side-effects, then return len.
2981 E.g. x = strlen (i++ ? "xfoo" + 1 : "bar");
2982 can be optimized into: i++; x = 3; */
2983 len = c_strlen (src, 1);
2984 if (len && TREE_CODE (len) == INTEGER_CST)
2985 {
2986 expand_expr (src, const0_rtx, VOIDmode, EXPAND_NORMAL);
2987 return expand_expr (len, target, target_mode, EXPAND_NORMAL);
2988 }
53800dbe 2989
5c5d012b 2990 align = get_pointer_alignment (src) / BITS_PER_UNIT;
53800dbe 2991
5c5d012b 2992 /* If SRC is not a pointer type, don't do this operation inline. */
2993 if (align == 0)
2994 return NULL_RTX;
2995
2996 /* Bail out if we can't compute strlen in the right mode. */
2997 FOR_EACH_MODE_FROM (insn_mode, target_mode)
2998 {
2999 icode = optab_handler (strlen_optab, insn_mode);
3000 if (icode != CODE_FOR_nothing)
3001 break;
3002 }
3003 if (insn_mode == VOIDmode)
3004 return NULL_RTX;
53800dbe 3005
5c5d012b 3006 /* Make a place to hold the source address. We will not expand
3007 the actual source until we are sure that the expansion will
3008 not fail -- there are trees that cannot be expanded twice. */
3009 src_reg = gen_reg_rtx (Pmode);
53800dbe 3010
5c5d012b 3011 /* Mark the beginning of the strlen sequence so we can emit the
3012 source operand later. */
3013 before_strlen = get_last_insn ();
53800dbe 3014
5c5d012b 3015 create_output_operand (&ops[0], target, insn_mode);
3016 create_fixed_operand (&ops[1], gen_rtx_MEM (BLKmode, src_reg));
3017 create_integer_operand (&ops[2], 0);
3018 create_integer_operand (&ops[3], align);
3019 if (!maybe_expand_insn (icode, 4, ops))
3020 return NULL_RTX;
911c0150 3021
5c5d012b 3022 /* Check to see if the argument was declared attribute nonstring
3023 and if so, issue a warning since at this point it's not known
3024 to be nul-terminated. */
3025 maybe_warn_nonstring_arg (get_callee_fndecl (exp), exp);
0c45740b 3026
5c5d012b 3027 /* Now that we are assured of success, expand the source. */
3028 start_sequence ();
3029 pat = expand_expr (src, src_reg, Pmode, EXPAND_NORMAL);
3030 if (pat != src_reg)
3031 {
499eee58 3032#ifdef POINTERS_EXTEND_UNSIGNED
5c5d012b 3033 if (GET_MODE (pat) != Pmode)
3034 pat = convert_to_mode (Pmode, pat,
3035 POINTERS_EXTEND_UNSIGNED);
499eee58 3036#endif
5c5d012b 3037 emit_move_insn (src_reg, pat);
3038 }
3039 pat = get_insns ();
3040 end_sequence ();
bceb0d1f 3041
5c5d012b 3042 if (before_strlen)
3043 emit_insn_after (pat, before_strlen);
3044 else
3045 emit_insn_before (pat, get_insns ());
53800dbe 3046
5c5d012b 3047 /* Return the value in the proper mode for this function. */
3048 if (GET_MODE (ops[0].value) == target_mode)
3049 target = ops[0].value;
3050 else if (target != 0)
3051 convert_move (target, ops[0].value, 0);
3052 else
3053 target = convert_to_mode (target_mode, ops[0].value, 0);
911c0150 3054
5c5d012b 3055 return target;
53800dbe 3056}
3057
864bd5de 3058/* Expand call EXP to the strnlen built-in, returning the result
3059 and setting it in TARGET. Otherwise return NULL_RTX on failure. */
3060
3061static rtx
3062expand_builtin_strnlen (tree exp, rtx target, machine_mode target_mode)
3063{
3064 if (!validate_arglist (exp, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
3065 return NULL_RTX;
3066
3067 tree src = CALL_EXPR_ARG (exp, 0);
3068 tree bound = CALL_EXPR_ARG (exp, 1);
3069
3070 if (!bound)
3071 return NULL_RTX;
3072
3073 location_t loc = UNKNOWN_LOCATION;
3074 if (EXPR_HAS_LOCATION (exp))
3075 loc = EXPR_LOCATION (exp);
3076
3077 tree maxobjsize = max_object_size ();
3078 tree func = get_callee_fndecl (exp);
3079
55769ed6 3080 /* FIXME: Change c_strlen() to return sizetype instead of ssizetype
3081 so these conversions aren't necessary. */
fec27bf2 3082 c_strlen_data data;
3083 memset (&data, 0, sizeof (c_strlen_data));
3084 tree len = c_strlen (src, 0, &data, 1);
55769ed6 3085 if (len)
3086 len = fold_convert_loc (loc, TREE_TYPE (bound), len);
864bd5de 3087
3088 if (TREE_CODE (bound) == INTEGER_CST)
3089 {
3090 if (!TREE_NO_WARNING (exp)
3091 && tree_int_cst_lt (maxobjsize, bound)
3092 && warning_at (loc, OPT_Wstringop_overflow_,
3093 "%K%qD specified bound %E "
3094 "exceeds maximum object size %E",
3095 exp, func, bound, maxobjsize))
3096 TREE_NO_WARNING (exp) = true;
3097
fec27bf2 3098 bool exact = true;
864bd5de 3099 if (!len || TREE_CODE (len) != INTEGER_CST)
fec27bf2 3100 {
3101 /* Clear EXACT if LEN may be less than SRC suggests,
3102 such as in
3103 strnlen (&a[i], sizeof a)
3104 where the value of i is unknown. Unless i's value is
3105 zero, the call is unsafe because the bound is greater. */
3106 data.decl = unterminated_array (src, &len, &exact);
3107 if (!data.decl)
3108 return NULL_RTX;
3109 }
3110
3111 if (data.decl
3112 && !TREE_NO_WARNING (exp)
3113 && ((tree_int_cst_lt (len, bound))
3114 || !exact))
3115 {
3116 location_t warnloc
3117 = expansion_point_location_if_in_system_header (loc);
3118
3119 if (warning_at (warnloc, OPT_Wstringop_overflow_,
3120 exact
3121 ? G_("%K%qD specified bound %E exceeds the size %E "
3122 "of unterminated array")
3123 : G_("%K%qD specified bound %E may exceed the size "
3124 "of at most %E of unterminated array"),
3125 exp, func, bound, len))
3126 {
3127 inform (DECL_SOURCE_LOCATION (data.decl),
3128 "referenced argument declared here");
3129 TREE_NO_WARNING (exp) = true;
3130 return NULL_RTX;
3131 }
3132 }
3133
3134 if (!len)
864bd5de 3135 return NULL_RTX;
3136
864bd5de 3137 len = fold_build2_loc (loc, MIN_EXPR, size_type_node, len, bound);
3138 return expand_expr (len, target, target_mode, EXPAND_NORMAL);
3139 }
3140
3141 if (TREE_CODE (bound) != SSA_NAME)
3142 return NULL_RTX;
3143
3144 wide_int min, max;
be44111e 3145 enum value_range_kind rng = get_range_info (bound, &min, &max);
864bd5de 3146 if (rng != VR_RANGE)
3147 return NULL_RTX;
3148
3149 if (!TREE_NO_WARNING (exp)
3150 && wi::ltu_p (wi::to_wide (maxobjsize), min)
3151 && warning_at (loc, OPT_Wstringop_overflow_,
3152 "%K%qD specified bound [%wu, %wu] "
3153 "exceeds maximum object size %E",
3154 exp, func, min.to_uhwi (), max.to_uhwi (), maxobjsize))
3155 TREE_NO_WARNING (exp) = true;
3156
179f1960 3157 bool exact = true;
864bd5de 3158 if (!len || TREE_CODE (len) != INTEGER_CST)
179f1960 3159 {
3160 data.decl = unterminated_array (src, &len, &exact);
3161 if (!data.decl)
3162 return NULL_RTX;
3163 }
864bd5de 3164
179f1960 3165 if (data.decl
3166 && !TREE_NO_WARNING (exp)
3167 && (wi::ltu_p (wi::to_wide (len), min)
3168 || !exact))
fec27bf2 3169 {
179f1960 3170 location_t warnloc
3171 = expansion_point_location_if_in_system_header (loc);
3172
3173 if (warning_at (warnloc, OPT_Wstringop_overflow_,
3174 exact
3175 ? G_("%K%qD specified bound [%wu, %wu] exceeds "
3176 "the size %E of unterminated array")
3177 : G_("%K%qD specified bound [%wu, %wu] may exceed "
3178 "the size of at most %E of unterminated array"),
3179 exp, func, min.to_uhwi (), max.to_uhwi (), len))
3180 {
3181 inform (DECL_SOURCE_LOCATION (data.decl),
3182 "referenced argument declared here");
3183 TREE_NO_WARNING (exp) = true;
3184 }
fec27bf2 3185 }
3186
179f1960 3187 if (data.decl)
3188 return NULL_RTX;
3189
864bd5de 3190 if (wi::gtu_p (min, wi::to_wide (len)))
3191 return expand_expr (len, target, target_mode, EXPAND_NORMAL);
3192
3193 len = fold_build2_loc (loc, MIN_EXPR, TREE_TYPE (len), len, bound);
3194 return expand_expr (len, target, target_mode, EXPAND_NORMAL);
3195}
3196
6840589f 3197/* Callback routine for store_by_pieces. Read GET_MODE_BITSIZE (MODE)
3198 bytes from constant string DATA + OFFSET and return it as target
3199 constant. */
3200
3201static rtx
aecda0d6 3202builtin_memcpy_read_str (void *data, HOST_WIDE_INT offset,
f77c4496 3203 scalar_int_mode mode)
6840589f 3204{
3205 const char *str = (const char *) data;
3206
64db345d 3207 gcc_assert (offset >= 0
3208 && ((unsigned HOST_WIDE_INT) offset + GET_MODE_SIZE (mode)
3209 <= strlen (str) + 1));
6840589f 3210
3211 return c_readstr (str + offset, mode);
3212}
3213
36d63243 3214/* LEN specify length of the block of memcpy/memset operation.
9db0f34d 3215 Figure out its range and put it into MIN_SIZE/MAX_SIZE.
3216 In some cases we can make very likely guess on max size, then we
3217 set it into PROBABLE_MAX_SIZE. */
36d63243 3218
3219static void
3220determine_block_size (tree len, rtx len_rtx,
3221 unsigned HOST_WIDE_INT *min_size,
9db0f34d 3222 unsigned HOST_WIDE_INT *max_size,
3223 unsigned HOST_WIDE_INT *probable_max_size)
36d63243 3224{
3225 if (CONST_INT_P (len_rtx))
3226 {
4e140a5c 3227 *min_size = *max_size = *probable_max_size = UINTVAL (len_rtx);
36d63243 3228 return;
3229 }
3230 else
3231 {
9c1be15e 3232 wide_int min, max;
be44111e 3233 enum value_range_kind range_type = VR_UNDEFINED;
9db0f34d 3234
3235 /* Determine bounds from the type. */
3236 if (tree_fits_uhwi_p (TYPE_MIN_VALUE (TREE_TYPE (len))))
3237 *min_size = tree_to_uhwi (TYPE_MIN_VALUE (TREE_TYPE (len)));
3238 else
3239 *min_size = 0;
3240 if (tree_fits_uhwi_p (TYPE_MAX_VALUE (TREE_TYPE (len))))
4e140a5c 3241 *probable_max_size = *max_size
3242 = tree_to_uhwi (TYPE_MAX_VALUE (TREE_TYPE (len)));
9db0f34d 3243 else
3244 *probable_max_size = *max_size = GET_MODE_MASK (GET_MODE (len_rtx));
3245
3246 if (TREE_CODE (len) == SSA_NAME)
3247 range_type = get_range_info (len, &min, &max);
3248 if (range_type == VR_RANGE)
36d63243 3249 {
fe5ad926 3250 if (wi::fits_uhwi_p (min) && *min_size < min.to_uhwi ())
36d63243 3251 *min_size = min.to_uhwi ();
fe5ad926 3252 if (wi::fits_uhwi_p (max) && *max_size > max.to_uhwi ())
9db0f34d 3253 *probable_max_size = *max_size = max.to_uhwi ();
36d63243 3254 }
9db0f34d 3255 else if (range_type == VR_ANTI_RANGE)
36d63243 3256 {
4a474a5a 3257 /* Anti range 0...N lets us to determine minimal size to N+1. */
fe5ad926 3258 if (min == 0)
9db0f34d 3259 {
9c1be15e 3260 if (wi::fits_uhwi_p (max) && max.to_uhwi () + 1 != 0)
3261 *min_size = max.to_uhwi () + 1;
9db0f34d 3262 }
3263 /* Code like
3264
3265 int n;
3266 if (n < 100)
4a474a5a 3267 memcpy (a, b, n)
9db0f34d 3268
3269 Produce anti range allowing negative values of N. We still
3270 can use the information and make a guess that N is not negative.
3271 */
fe5ad926 3272 else if (!wi::leu_p (max, 1 << 30) && wi::fits_uhwi_p (min))
3273 *probable_max_size = min.to_uhwi () - 1;
36d63243 3274 }
3275 }
3276 gcc_checking_assert (*max_size <=
3277 (unsigned HOST_WIDE_INT)
3278 GET_MODE_MASK (GET_MODE (len_rtx)));
3279}
3280
5aef8938 3281/* Try to verify that the sizes and lengths of the arguments to a string
3282 manipulation function given by EXP are within valid bounds and that
e6a18b5a 3283 the operation does not lead to buffer overflow or read past the end.
3284 Arguments other than EXP may be null. When non-null, the arguments
3285 have the following meaning:
3286 DST is the destination of a copy call or NULL otherwise.
3287 SRC is the source of a copy call or NULL otherwise.
3288 DSTWRITE is the number of bytes written into the destination obtained
3289 from the user-supplied size argument to the function (such as in
3290 memcpy(DST, SRCs, DSTWRITE) or strncpy(DST, DRC, DSTWRITE).
3291 MAXREAD is the user-supplied bound on the length of the source sequence
5aef8938 3292 (such as in strncat(d, s, N). It specifies the upper limit on the number
e6a18b5a 3293 of bytes to write. If NULL, it's taken to be the same as DSTWRITE.
3294 SRCSTR is the source string (such as in strcpy(DST, SRC)) when the
3295 expression EXP is a string function call (as opposed to a memory call
3296 like memcpy). As an exception, SRCSTR can also be an integer denoting
3297 the precomputed size of the source string or object (for functions like
3298 memcpy).
3299 DSTSIZE is the size of the destination object specified by the last
5aef8938 3300 argument to the _chk builtins, typically resulting from the expansion
e6a18b5a 3301 of __builtin_object_size (such as in __builtin___strcpy_chk(DST, SRC,
3302 DSTSIZE).
5aef8938 3303
e6a18b5a 3304 When DSTWRITE is null LEN is checked to verify that it doesn't exceed
5aef8938 3305 SIZE_MAX.
3306
e6a18b5a 3307 If the call is successfully verified as safe return true, otherwise
3308 return false. */
5aef8938 3309
3310static bool
e6a18b5a 3311check_access (tree exp, tree, tree, tree dstwrite,
3312 tree maxread, tree srcstr, tree dstsize)
5aef8938 3313{
e6a18b5a 3314 int opt = OPT_Wstringop_overflow_;
3315
5aef8938 3316 /* The size of the largest object is half the address space, or
e6a18b5a 3317 PTRDIFF_MAX. (This is way too permissive.) */
3318 tree maxobjsize = max_object_size ();
5aef8938 3319
e6a18b5a 3320 /* Either the length of the source string for string functions or
3321 the size of the source object for raw memory functions. */
5aef8938 3322 tree slen = NULL_TREE;
3323
8d6c6ef5 3324 tree range[2] = { NULL_TREE, NULL_TREE };
3325
5aef8938 3326 /* Set to true when the exact number of bytes written by a string
3327 function like strcpy is not known and the only thing that is
3328 known is that it must be at least one (for the terminating nul). */
3329 bool at_least_one = false;
e6a18b5a 3330 if (srcstr)
5aef8938 3331 {
e6a18b5a 3332 /* SRCSTR is normally a pointer to string but as a special case
5aef8938 3333 it can be an integer denoting the length of a string. */
e6a18b5a 3334 if (POINTER_TYPE_P (TREE_TYPE (srcstr)))
5aef8938 3335 {
3336 /* Try to determine the range of lengths the source string
8d6c6ef5 3337 refers to. If it can be determined and is less than
e6a18b5a 3338 the upper bound given by MAXREAD add one to it for
5aef8938 3339 the terminating nul. Otherwise, set it to one for
e6a18b5a 3340 the same reason, or to MAXREAD as appropriate. */
3341 get_range_strlen (srcstr, range);
3342 if (range[0] && (!maxread || TREE_CODE (maxread) == INTEGER_CST))
8d6c6ef5 3343 {
e6a18b5a 3344 if (maxread && tree_int_cst_le (maxread, range[0]))
3345 range[0] = range[1] = maxread;
8d6c6ef5 3346 else
3347 range[0] = fold_build2 (PLUS_EXPR, size_type_node,
3348 range[0], size_one_node);
3349
e6a18b5a 3350 if (maxread && tree_int_cst_le (maxread, range[1]))
3351 range[1] = maxread;
8d6c6ef5 3352 else if (!integer_all_onesp (range[1]))
3353 range[1] = fold_build2 (PLUS_EXPR, size_type_node,
3354 range[1], size_one_node);
3355
3356 slen = range[0];
3357 }
5aef8938 3358 else
3359 {
3360 at_least_one = true;
3361 slen = size_one_node;
3362 }
3363 }
3364 else
e6a18b5a 3365 slen = srcstr;
5aef8938 3366 }
3367
e6a18b5a 3368 if (!dstwrite && !maxread)
5aef8938 3369 {
3370 /* When the only available piece of data is the object size
3371 there is nothing to do. */
3372 if (!slen)
3373 return true;
3374
3375 /* Otherwise, when the length of the source sequence is known
e6a18b5a 3376 (as with strlen), set DSTWRITE to it. */
8d6c6ef5 3377 if (!range[0])
e6a18b5a 3378 dstwrite = slen;
5aef8938 3379 }
3380
e6a18b5a 3381 if (!dstsize)
3382 dstsize = maxobjsize;
5aef8938 3383
e6a18b5a 3384 if (dstwrite)
3385 get_size_range (dstwrite, range);
5aef8938 3386
e6a18b5a 3387 tree func = get_callee_fndecl (exp);
5aef8938 3388
3389 /* First check the number of bytes to be written against the maximum
3390 object size. */
c4183f31 3391 if (range[0]
3392 && TREE_CODE (range[0]) == INTEGER_CST
3393 && tree_int_cst_lt (maxobjsize, range[0]))
5aef8938 3394 {
864bd5de 3395 if (TREE_NO_WARNING (exp))
3396 return false;
3397
5aef8938 3398 location_t loc = tree_nonartificial_location (exp);
4d317237 3399 loc = expansion_point_location_if_in_system_header (loc);
5aef8938 3400
864bd5de 3401 bool warned;
5aef8938 3402 if (range[0] == range[1])
864bd5de 3403 warned = warning_at (loc, opt,
3404 "%K%qD specified size %E "
3405 "exceeds maximum object size %E",
3406 exp, func, range[0], maxobjsize);
3407 else
3408 warned = warning_at (loc, opt,
3409 "%K%qD specified size between %E and %E "
3410 "exceeds maximum object size %E",
3411 exp, func,
3412 range[0], range[1], maxobjsize);
3413 if (warned)
3414 TREE_NO_WARNING (exp) = true;
3415
5aef8938 3416 return false;
3417 }
3418
e6a18b5a 3419 /* The number of bytes to write is "exact" if DSTWRITE is non-null,
3420 constant, and in range of unsigned HOST_WIDE_INT. */
3421 bool exactwrite = dstwrite && tree_fits_uhwi_p (dstwrite);
3422
5aef8938 3423 /* Next check the number of bytes to be written against the destination
3424 object size. */
e6a18b5a 3425 if (range[0] || !exactwrite || integer_all_onesp (dstwrite))
5aef8938 3426 {
3427 if (range[0]
c4183f31 3428 && TREE_CODE (range[0]) == INTEGER_CST
e6a18b5a 3429 && ((tree_fits_uhwi_p (dstsize)
3430 && tree_int_cst_lt (dstsize, range[0]))
c4183f31 3431 || (dstwrite
3432 && tree_fits_uhwi_p (dstwrite)
e6a18b5a 3433 && tree_int_cst_lt (dstwrite, range[0]))))
5aef8938 3434 {
080a1363 3435 if (TREE_NO_WARNING (exp))
3436 return false;
3437
5aef8938 3438 location_t loc = tree_nonartificial_location (exp);
4d317237 3439 loc = expansion_point_location_if_in_system_header (loc);
5aef8938 3440
e6a18b5a 3441 if (dstwrite == slen && at_least_one)
8d6c6ef5 3442 {
3443 /* This is a call to strcpy with a destination of 0 size
3444 and a source of unknown length. The call will write
3445 at least one byte past the end of the destination. */
3446 warning_at (loc, opt,
9098b938 3447 "%K%qD writing %E or more bytes into a region "
8d6c6ef5 3448 "of size %E overflows the destination",
e6a18b5a 3449 exp, func, range[0], dstsize);
8d6c6ef5 3450 }
3451 else if (tree_int_cst_equal (range[0], range[1]))
625a4dfc 3452 warning_n (loc, opt, tree_to_uhwi (range[0]),
3453 "%K%qD writing %E byte into a region "
3454 "of size %E overflows the destination",
3455 "%K%qD writing %E bytes into a region "
3456 "of size %E overflows the destination",
3457 exp, func, range[0], dstsize);
8d6c6ef5 3458 else if (tree_int_cst_sign_bit (range[1]))
3459 {
3460 /* Avoid printing the upper bound if it's invalid. */
3461 warning_at (loc, opt,
9098b938 3462 "%K%qD writing %E or more bytes into a region "
8d6c6ef5 3463 "of size %E overflows the destination",
e6a18b5a 3464 exp, func, range[0], dstsize);
8d6c6ef5 3465 }
5aef8938 3466 else
3467 warning_at (loc, opt,
9098b938 3468 "%K%qD writing between %E and %E bytes into "
8d6c6ef5 3469 "a region of size %E overflows the destination",
e6a18b5a 3470 exp, func, range[0], range[1],
3471 dstsize);
5aef8938 3472
3473 /* Return error when an overflow has been detected. */
3474 return false;
3475 }
3476 }
3477
3478 /* Check the maximum length of the source sequence against the size
3479 of the destination object if known, or against the maximum size
3480 of an object. */
e6a18b5a 3481 if (maxread)
5aef8938 3482 {
e6a18b5a 3483 get_size_range (maxread, range);
3484
3485 /* Use the lower end for MAXREAD from now on. */
3486 if (range[0])
3487 maxread = range[0];
5aef8938 3488
e6a18b5a 3489 if (range[0] && dstsize && tree_fits_uhwi_p (dstsize))
5aef8938 3490 {
3491 location_t loc = tree_nonartificial_location (exp);
4d317237 3492 loc = expansion_point_location_if_in_system_header (loc);
5aef8938 3493
3494 if (tree_int_cst_lt (maxobjsize, range[0]))
3495 {
080a1363 3496 if (TREE_NO_WARNING (exp))
3497 return false;
3498
5aef8938 3499 /* Warn about crazy big sizes first since that's more
3500 likely to be meaningful than saying that the bound
3501 is greater than the object size if both are big. */
3502 if (range[0] == range[1])
3503 warning_at (loc, opt,
9098b938 3504 "%K%qD specified bound %E "
8d6c6ef5 3505 "exceeds maximum object size %E",
e6a18b5a 3506 exp, func,
8d6c6ef5 3507 range[0], maxobjsize);
5aef8938 3508 else
3509 warning_at (loc, opt,
9098b938 3510 "%K%qD specified bound between %E and %E "
8d6c6ef5 3511 "exceeds maximum object size %E",
e6a18b5a 3512 exp, func,
8d6c6ef5 3513 range[0], range[1], maxobjsize);
5aef8938 3514
3515 return false;
3516 }
3517
e6a18b5a 3518 if (dstsize != maxobjsize && tree_int_cst_lt (dstsize, range[0]))
5aef8938 3519 {
080a1363 3520 if (TREE_NO_WARNING (exp))
3521 return false;
3522
8d6c6ef5 3523 if (tree_int_cst_equal (range[0], range[1]))
5aef8938 3524 warning_at (loc, opt,
9098b938 3525 "%K%qD specified bound %E "
8d6c6ef5 3526 "exceeds destination size %E",
e6a18b5a 3527 exp, func,
3528 range[0], dstsize);
5aef8938 3529 else
3530 warning_at (loc, opt,
9098b938 3531 "%K%qD specified bound between %E and %E "
8d6c6ef5 3532 "exceeds destination size %E",
e6a18b5a 3533 exp, func,
3534 range[0], range[1], dstsize);
5aef8938 3535 return false;
3536 }
3537 }
3538 }
3539
e6a18b5a 3540 /* Check for reading past the end of SRC. */
8d6c6ef5 3541 if (slen
e6a18b5a 3542 && slen == srcstr
3543 && dstwrite && range[0]
8d6c6ef5 3544 && tree_int_cst_lt (slen, range[0]))
3545 {
080a1363 3546 if (TREE_NO_WARNING (exp))
3547 return false;
3548
8d6c6ef5 3549 location_t loc = tree_nonartificial_location (exp);
3550
3551 if (tree_int_cst_equal (range[0], range[1]))
625a4dfc 3552 warning_n (loc, opt, tree_to_uhwi (range[0]),
3553 "%K%qD reading %E byte from a region of size %E",
3554 "%K%qD reading %E bytes from a region of size %E",
e6a18b5a 3555 exp, func, range[0], slen);
8d6c6ef5 3556 else if (tree_int_cst_sign_bit (range[1]))
3557 {
3558 /* Avoid printing the upper bound if it's invalid. */
3559 warning_at (loc, opt,
9098b938 3560 "%K%qD reading %E or more bytes from a region "
8d6c6ef5 3561 "of size %E",
e6a18b5a 3562 exp, func, range[0], slen);
8d6c6ef5 3563 }
3564 else
3565 warning_at (loc, opt,
9098b938 3566 "%K%qD reading between %E and %E bytes from a region "
8d6c6ef5 3567 "of size %E",
e6a18b5a 3568 exp, func, range[0], range[1], slen);
8d6c6ef5 3569 return false;
3570 }
3571
5aef8938 3572 return true;
3573}
3574
3575/* Helper to compute the size of the object referenced by the DEST
d8aad786 3576 expression which must have pointer type, using Object Size type
5aef8938 3577 OSTYPE (only the least significant 2 bits are used). Return
24e3b821 3578 an estimate of the size of the object if successful or NULL when
3579 the size cannot be determined. When the referenced object involves
3580 a non-constant offset in some range the returned value represents
3581 the largest size given the smallest non-negative offset in the
3582 range. The function is intended for diagnostics and should not
3583 be used to influence code generation or optimization. */
5aef8938 3584
d8aad786 3585tree
8d6c6ef5 3586compute_objsize (tree dest, int ostype)
5aef8938 3587{
3588 unsigned HOST_WIDE_INT size;
d8aad786 3589
3590 /* Only the two least significant bits are meaningful. */
3591 ostype &= 3;
3592
3593 if (compute_builtin_object_size (dest, ostype, &size))
5aef8938 3594 return build_int_cst (sizetype, size);
3595
d8aad786 3596 if (TREE_CODE (dest) == SSA_NAME)
3597 {
3598 gimple *stmt = SSA_NAME_DEF_STMT (dest);
3599 if (!is_gimple_assign (stmt))
3600 return NULL_TREE;
3601
24e3b821 3602 dest = gimple_assign_rhs1 (stmt);
3603
d8aad786 3604 tree_code code = gimple_assign_rhs_code (stmt);
24e3b821 3605 if (code == POINTER_PLUS_EXPR)
3606 {
3607 /* compute_builtin_object_size fails for addresses with
3608 non-constant offsets. Try to determine the range of
c1a0c86c 3609 such an offset here and use it to adjust the constant
24e3b821 3610 size. */
3611 tree off = gimple_assign_rhs2 (stmt);
c1a0c86c 3612 if (TREE_CODE (off) == INTEGER_CST)
3613 {
3614 if (tree size = compute_objsize (dest, ostype))
3615 {
3616 wide_int wioff = wi::to_wide (off);
3617 wide_int wisiz = wi::to_wide (size);
3618
3619 /* Ignore negative offsets for now. For others,
3620 use the lower bound as the most optimistic
3621 estimate of the (remaining) size. */
3622 if (wi::sign_mask (wioff))
3623 ;
3624 else if (wi::ltu_p (wioff, wisiz))
3625 return wide_int_to_tree (TREE_TYPE (size),
3626 wi::sub (wisiz, wioff));
3627 else
3628 return size_zero_node;
3629 }
3630 }
3631 else if (TREE_CODE (off) == SSA_NAME
24e3b821 3632 && INTEGRAL_TYPE_P (TREE_TYPE (off)))
3633 {
3634 wide_int min, max;
be44111e 3635 enum value_range_kind rng = get_range_info (off, &min, &max);
24e3b821 3636
3637 if (rng == VR_RANGE)
3638 {
3639 if (tree size = compute_objsize (dest, ostype))
3640 {
3641 wide_int wisiz = wi::to_wide (size);
3642
3643 /* Ignore negative offsets for now. For others,
3644 use the lower bound as the most optimistic
3645 estimate of the (remaining)size. */
3646 if (wi::sign_mask (min))
3647 ;
3648 else if (wi::ltu_p (min, wisiz))
3649 return wide_int_to_tree (TREE_TYPE (size),
3650 wi::sub (wisiz, min));
3651 else
3652 return size_zero_node;
3653 }
3654 }
3655 }
3656 }
3657 else if (code != ADDR_EXPR)
d8aad786 3658 return NULL_TREE;
d8aad786 3659 }
3660
24e3b821 3661 /* Unless computing the largest size (for memcpy and other raw memory
3662 functions), try to determine the size of the object from its type. */
3663 if (!ostype)
3664 return NULL_TREE;
3665
d8aad786 3666 if (TREE_CODE (dest) != ADDR_EXPR)
3667 return NULL_TREE;
3668
3669 tree type = TREE_TYPE (dest);
3670 if (TREE_CODE (type) == POINTER_TYPE)
3671 type = TREE_TYPE (type);
3672
3673 type = TYPE_MAIN_VARIANT (type);
3674
3675 if (TREE_CODE (type) == ARRAY_TYPE
d4ad98ea 3676 && !array_at_struct_end_p (TREE_OPERAND (dest, 0)))
d8aad786 3677 {
3678 /* Return the constant size unless it's zero (that's a zero-length
3679 array likely at the end of a struct). */
3680 tree size = TYPE_SIZE_UNIT (type);
3681 if (size && TREE_CODE (size) == INTEGER_CST
3682 && !integer_zerop (size))
3683 return size;
3684 }
3685
5aef8938 3686 return NULL_TREE;
3687}
3688
3689/* Helper to determine and check the sizes of the source and the destination
8d6c6ef5 3690 of calls to __builtin_{bzero,memcpy,mempcpy,memset} calls. EXP is the
3691 call expression, DEST is the destination argument, SRC is the source
3692 argument or null, and LEN is the number of bytes. Use Object Size type-0
3693 regardless of the OPT_Wstringop_overflow_ setting. Return true on success
5aef8938 3694 (no overflow or invalid sizes), false otherwise. */
3695
3696static bool
e6a18b5a 3697check_memop_access (tree exp, tree dest, tree src, tree size)
5aef8938 3698{
5aef8938 3699 /* For functions like memset and memcpy that operate on raw memory
8d6c6ef5 3700 try to determine the size of the largest source and destination
3701 object using type-0 Object Size regardless of the object size
3702 type specified by the option. */
3703 tree srcsize = src ? compute_objsize (src, 0) : NULL_TREE;
3704 tree dstsize = compute_objsize (dest, 0);
5aef8938 3705
e6a18b5a 3706 return check_access (exp, dest, src, size, /*maxread=*/NULL_TREE,
3707 srcsize, dstsize);
8d6c6ef5 3708}
3709
3710/* Validate memchr arguments without performing any expansion.
3711 Return NULL_RTX. */
3712
3713static rtx
3714expand_builtin_memchr (tree exp, rtx)
3715{
3716 if (!validate_arglist (exp,
3717 POINTER_TYPE, INTEGER_TYPE, INTEGER_TYPE, VOID_TYPE))
3718 return NULL_RTX;
3719
3720 tree arg1 = CALL_EXPR_ARG (exp, 0);
3721 tree len = CALL_EXPR_ARG (exp, 2);
3722
3723 /* Diagnose calls where the specified length exceeds the size
3724 of the object. */
3725 if (warn_stringop_overflow)
3726 {
3727 tree size = compute_objsize (arg1, 0);
e6a18b5a 3728 check_access (exp, /*dst=*/NULL_TREE, /*src=*/NULL_TREE, len,
3729 /*maxread=*/NULL_TREE, size, /*objsize=*/NULL_TREE);
8d6c6ef5 3730 }
3731
3732 return NULL_RTX;
5aef8938 3733}
3734
c2f47e15 3735/* Expand a call EXP to the memcpy builtin.
3736 Return NULL_RTX if we failed, the caller should emit a normal call,
3b824fa6 3737 otherwise try to get the result in TARGET, if convenient (and in
9fe0e1b8 3738 mode MODE if that's convenient). */
c2f47e15 3739
53800dbe 3740static rtx
a65c4d64 3741expand_builtin_memcpy (tree exp, rtx target)
53800dbe 3742{
c2f47e15 3743 if (!validate_arglist (exp,
3744 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
3745 return NULL_RTX;
5aef8938 3746
3747 tree dest = CALL_EXPR_ARG (exp, 0);
3748 tree src = CALL_EXPR_ARG (exp, 1);
3749 tree len = CALL_EXPR_ARG (exp, 2);
3750
e6a18b5a 3751 check_memop_access (exp, dest, src, len);
5aef8938 3752
d0fbba1a 3753 return expand_builtin_memory_copy_args (dest, src, len, target, exp,
3754 /*endp=*/ 0);
f21337ef 3755}
6840589f 3756
4d317237 3757/* Check a call EXP to the memmove built-in for validity.
3758 Return NULL_RTX on both success and failure. */
3759
3760static rtx
3761expand_builtin_memmove (tree exp, rtx)
3762{
3763 if (!validate_arglist (exp,
3764 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
3765 return NULL_RTX;
3766
3767 tree dest = CALL_EXPR_ARG (exp, 0);
8d6c6ef5 3768 tree src = CALL_EXPR_ARG (exp, 1);
4d317237 3769 tree len = CALL_EXPR_ARG (exp, 2);
3770
e6a18b5a 3771 check_memop_access (exp, dest, src, len);
4d317237 3772
3773 return NULL_RTX;
3774}
3775
c2f47e15 3776/* Expand a call EXP to the mempcpy builtin.
3777 Return NULL_RTX if we failed; the caller should emit a normal call,
647661c6 3778 otherwise try to get the result in TARGET, if convenient (and in
9fe0e1b8 3779 mode MODE if that's convenient). If ENDP is 0 return the
3780 destination pointer, if ENDP is 1 return the end pointer ala
3781 mempcpy, and if ENDP is 2 return the end pointer minus one ala
3782 stpcpy. */
647661c6 3783
3784static rtx
d0fbba1a 3785expand_builtin_mempcpy (tree exp, rtx target)
647661c6 3786{
c2f47e15 3787 if (!validate_arglist (exp,
3788 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
3789 return NULL_RTX;
5aef8938 3790
3791 tree dest = CALL_EXPR_ARG (exp, 0);
3792 tree src = CALL_EXPR_ARG (exp, 1);
3793 tree len = CALL_EXPR_ARG (exp, 2);
3794
24e3b821 3795 /* Policy does not generally allow using compute_objsize (which
3796 is used internally by check_memop_size) to change code generation
3797 or drive optimization decisions.
3798
3799 In this instance it is safe because the code we generate has
3800 the same semantics regardless of the return value of
3801 check_memop_sizes. Exactly the same amount of data is copied
3802 and the return value is exactly the same in both cases.
3803
3804 Furthermore, check_memop_size always uses mode 0 for the call to
3805 compute_objsize, so the imprecise nature of compute_objsize is
3806 avoided. */
3807
5aef8938 3808 /* Avoid expanding mempcpy into memcpy when the call is determined
3809 to overflow the buffer. This also prevents the same overflow
3810 from being diagnosed again when expanding memcpy. */
e6a18b5a 3811 if (!check_memop_access (exp, dest, src, len))
5aef8938 3812 return NULL_RTX;
3813
3814 return expand_builtin_mempcpy_args (dest, src, len,
d0fbba1a 3815 target, exp, /*endp=*/ 1);
f21337ef 3816}
3817
d0fbba1a 3818/* Helper function to do the actual work for expand of memory copy family
3819 functions (memcpy, mempcpy, stpcpy). Expansing should assign LEN bytes
3820 of memory from SRC to DEST and assign to TARGET if convenient.
3821 If ENDP is 0 return the
3822 destination pointer, if ENDP is 1 return the end pointer ala
3823 mempcpy, and if ENDP is 2 return the end pointer minus one ala
3824 stpcpy. */
c2f47e15 3825
3826static rtx
d0fbba1a 3827expand_builtin_memory_copy_args (tree dest, tree src, tree len,
3828 rtx target, tree exp, int endp)
c2f47e15 3829{
d0fbba1a 3830 const char *src_str;
3831 unsigned int src_align = get_pointer_alignment (src);
3832 unsigned int dest_align = get_pointer_alignment (dest);
3833 rtx dest_mem, src_mem, dest_addr, len_rtx;
3834 HOST_WIDE_INT expected_size = -1;
3835 unsigned int expected_align = 0;
3836 unsigned HOST_WIDE_INT min_size;
3837 unsigned HOST_WIDE_INT max_size;
3838 unsigned HOST_WIDE_INT probable_max_size;
f21337ef 3839
d0fbba1a 3840 /* If DEST is not a pointer type, call the normal function. */
3841 if (dest_align == 0)
3842 return NULL_RTX;
a0c938f0 3843
d0fbba1a 3844 /* If either SRC is not a pointer type, don't do this
3845 operation in-line. */
3846 if (src_align == 0)
3847 return NULL_RTX;
9fe0e1b8 3848
d0fbba1a 3849 if (currently_expanding_gimple_stmt)
3850 stringop_block_profile (currently_expanding_gimple_stmt,
3851 &expected_align, &expected_size);
0862b7e9 3852
d0fbba1a 3853 if (expected_align < dest_align)
3854 expected_align = dest_align;
3855 dest_mem = get_memory_rtx (dest, len);
3856 set_mem_align (dest_mem, dest_align);
3857 len_rtx = expand_normal (len);
3858 determine_block_size (len, len_rtx, &min_size, &max_size,
3859 &probable_max_size);
3860 src_str = c_getstr (src);
647661c6 3861
d0fbba1a 3862 /* If SRC is a string constant and block move would be done
3863 by pieces, we can avoid loading the string from memory
3864 and only stored the computed constants. */
3865 if (src_str
3866 && CONST_INT_P (len_rtx)
3867 && (unsigned HOST_WIDE_INT) INTVAL (len_rtx) <= strlen (src_str) + 1
3868 && can_store_by_pieces (INTVAL (len_rtx), builtin_memcpy_read_str,
3869 CONST_CAST (char *, src_str),
3870 dest_align, false))
3871 {
3872 dest_mem = store_by_pieces (dest_mem, INTVAL (len_rtx),
3873 builtin_memcpy_read_str,
d72123ce 3874 CONST_CAST (char *, src_str),
d0fbba1a 3875 dest_align, false, endp);
3876 dest_mem = force_operand (XEXP (dest_mem, 0), target);
3877 dest_mem = convert_memory_address (ptr_mode, dest_mem);
3878 return dest_mem;
3879 }
647661c6 3880
d0fbba1a 3881 src_mem = get_memory_rtx (src, len);
3882 set_mem_align (src_mem, src_align);
9fe0e1b8 3883
d0fbba1a 3884 /* Copy word part most expediently. */
21781799 3885 enum block_op_methods method = BLOCK_OP_NORMAL;
3886 if (CALL_EXPR_TAILCALL (exp) && (endp == 0 || target == const0_rtx))
3887 method = BLOCK_OP_TAILCALL;
3888 if (endp == 1 && target != const0_rtx)
3889 method = BLOCK_OP_NO_LIBCALL_RET;
3890 dest_addr = emit_block_move_hints (dest_mem, src_mem, len_rtx, method,
d0fbba1a 3891 expected_align, expected_size,
3892 min_size, max_size, probable_max_size);
21781799 3893 if (dest_addr == pc_rtx)
3894 return NULL_RTX;
d0fbba1a 3895
3896 if (dest_addr == 0)
3897 {
3898 dest_addr = force_operand (XEXP (dest_mem, 0), target);
3899 dest_addr = convert_memory_address (ptr_mode, dest_addr);
3900 }
3901
3902 if (endp && target != const0_rtx)
3903 {
3904 dest_addr = gen_rtx_PLUS (ptr_mode, dest_addr, len_rtx);
3905 /* stpcpy pointer to last byte. */
3906 if (endp == 2)
3907 dest_addr = gen_rtx_MINUS (ptr_mode, dest_addr, const1_rtx);
d72123ce 3908 }
d0fbba1a 3909
3910 return dest_addr;
3911}
3912
3913static rtx
3914expand_builtin_mempcpy_args (tree dest, tree src, tree len,
3915 rtx target, tree orig_exp, int endp)
3916{
3917 return expand_builtin_memory_copy_args (dest, src, len, target, orig_exp,
3918 endp);
647661c6 3919}
3920
c2f47e15 3921/* Expand into a movstr instruction, if one is available. Return NULL_RTX if
727c62dd 3922 we failed, the caller should emit a normal call, otherwise try to
3923 get the result in TARGET, if convenient. If ENDP is 0 return the
3924 destination pointer, if ENDP is 1 return the end pointer ala
3925 mempcpy, and if ENDP is 2 return the end pointer minus one ala
3926 stpcpy. */
3927
3928static rtx
3929expand_movstr (tree dest, tree src, rtx target, int endp)
3930{
8786db1e 3931 struct expand_operand ops[3];
727c62dd 3932 rtx dest_mem;
3933 rtx src_mem;
727c62dd 3934
8d74dc42 3935 if (!targetm.have_movstr ())
c2f47e15 3936 return NULL_RTX;
727c62dd 3937
d8ae1baa 3938 dest_mem = get_memory_rtx (dest, NULL);
3939 src_mem = get_memory_rtx (src, NULL);
727c62dd 3940 if (!endp)
3941 {
3942 target = force_reg (Pmode, XEXP (dest_mem, 0));
3943 dest_mem = replace_equiv_address (dest_mem, target);
727c62dd 3944 }
3945
8786db1e 3946 create_output_operand (&ops[0], endp ? target : NULL_RTX, Pmode);
3947 create_fixed_operand (&ops[1], dest_mem);
3948 create_fixed_operand (&ops[2], src_mem);
8d74dc42 3949 if (!maybe_expand_insn (targetm.code_for_movstr, 3, ops))
1e1d5623 3950 return NULL_RTX;
727c62dd 3951
8786db1e 3952 if (endp && target != const0_rtx)
c5aba89c 3953 {
8786db1e 3954 target = ops[0].value;
3955 /* movstr is supposed to set end to the address of the NUL
3956 terminator. If the caller requested a mempcpy-like return value,
3957 adjust it. */
3958 if (endp == 1)
3959 {
29c05e22 3960 rtx tem = plus_constant (GET_MODE (target),
3961 gen_lowpart (GET_MODE (target), target), 1);
8786db1e 3962 emit_move_insn (target, force_operand (tem, NULL_RTX));
3963 }
c5aba89c 3964 }
727c62dd 3965 return target;
3966}
3967
5aef8938 3968/* Do some very basic size validation of a call to the strcpy builtin
3969 given by EXP. Return NULL_RTX to have the built-in expand to a call
3970 to the library function. */
3971
3972static rtx
3973expand_builtin_strcat (tree exp, rtx)
3974{
3975 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE)
3976 || !warn_stringop_overflow)
3977 return NULL_RTX;
3978
3979 tree dest = CALL_EXPR_ARG (exp, 0);
3980 tree src = CALL_EXPR_ARG (exp, 1);
3981
3982 /* There is no way here to determine the length of the string in
3983 the destination to which the SRC string is being appended so
3984 just diagnose cases when the souce string is longer than
3985 the destination object. */
3986
8d6c6ef5 3987 tree destsize = compute_objsize (dest, warn_stringop_overflow - 1);
5aef8938 3988
e6a18b5a 3989 check_access (exp, dest, src, /*size=*/NULL_TREE, /*maxread=*/NULL_TREE, src,
3990 destsize);
5aef8938 3991
3992 return NULL_RTX;
3993}
3994
48e1416a 3995/* Expand expression EXP, which is a call to the strcpy builtin. Return
3996 NULL_RTX if we failed the caller should emit a normal call, otherwise
c2f47e15 3997 try to get the result in TARGET, if convenient (and in mode MODE if that's
6f428e8b 3998 convenient). */
902de8ed 3999
53800dbe 4000static rtx
a65c4d64 4001expand_builtin_strcpy (tree exp, rtx target)
53800dbe 4002{
5aef8938 4003 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
4004 return NULL_RTX;
4005
4006 tree dest = CALL_EXPR_ARG (exp, 0);
4007 tree src = CALL_EXPR_ARG (exp, 1);
4008
4009 if (warn_stringop_overflow)
4010 {
8d6c6ef5 4011 tree destsize = compute_objsize (dest, warn_stringop_overflow - 1);
e6a18b5a 4012 check_access (exp, dest, src, /*size=*/NULL_TREE, /*maxread=*/NULL_TREE,
4013 src, destsize);
5aef8938 4014 }
4015
a788aa5f 4016 if (rtx ret = expand_builtin_strcpy_args (exp, dest, src, target))
0b39ade8 4017 {
4018 /* Check to see if the argument was declared attribute nonstring
4019 and if so, issue a warning since at this point it's not known
4020 to be nul-terminated. */
4021 tree fndecl = get_callee_fndecl (exp);
4022 maybe_warn_nonstring_arg (fndecl, exp);
4023 return ret;
4024 }
4025
4026 return NULL_RTX;
c2f47e15 4027}
4028
4029/* Helper function to do the actual work for expand_builtin_strcpy. The
4030 arguments to the builtin_strcpy call DEST and SRC are broken out
4031 so that this can also be called without constructing an actual CALL_EXPR.
4032 The other arguments and return value are the same as for
4033 expand_builtin_strcpy. */
4034
4035static rtx
a788aa5f 4036expand_builtin_strcpy_args (tree exp, tree dest, tree src, rtx target)
c2f47e15 4037{
a788aa5f 4038 /* Detect strcpy calls with unterminated arrays.. */
4039 if (tree nonstr = unterminated_array (src))
4040 {
4041 /* NONSTR refers to the non-nul terminated constant array. */
4042 if (!TREE_NO_WARNING (exp))
4043 warn_string_no_nul (EXPR_LOCATION (exp), "strcpy", src, nonstr);
4044 return NULL_RTX;
4045 }
4046
c2f47e15 4047 return expand_movstr (dest, src, target, /*endp=*/0);
53800dbe 4048}
4049
c2f47e15 4050/* Expand a call EXP to the stpcpy builtin.
4051 Return NULL_RTX if we failed the caller should emit a normal call,
3b824fa6 4052 otherwise try to get the result in TARGET, if convenient (and in
4053 mode MODE if that's convenient). */
4054
4055static rtx
df6e8b42 4056expand_builtin_stpcpy_1 (tree exp, rtx target, machine_mode mode)
3b824fa6 4057{
c2f47e15 4058 tree dst, src;
389dd41b 4059 location_t loc = EXPR_LOCATION (exp);
c2f47e15 4060
4061 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
4062 return NULL_RTX;
4063
4064 dst = CALL_EXPR_ARG (exp, 0);
4065 src = CALL_EXPR_ARG (exp, 1);
4066
4d317237 4067 if (warn_stringop_overflow)
4068 {
8d6c6ef5 4069 tree destsize = compute_objsize (dst, warn_stringop_overflow - 1);
e6a18b5a 4070 check_access (exp, dst, src, /*size=*/NULL_TREE, /*maxread=*/NULL_TREE,
4071 src, destsize);
4d317237 4072 }
4073
727c62dd 4074 /* If return value is ignored, transform stpcpy into strcpy. */
b9a16870 4075 if (target == const0_rtx && builtin_decl_implicit (BUILT_IN_STRCPY))
978836e5 4076 {
b9a16870 4077 tree fn = builtin_decl_implicit (BUILT_IN_STRCPY);
0568e9c1 4078 tree result = build_call_nofold_loc (loc, fn, 2, dst, src);
c8b17b2e 4079 return expand_expr (result, target, mode, EXPAND_NORMAL);
978836e5 4080 }
3b824fa6 4081 else
4082 {
c2f47e15 4083 tree len, lenp1;
727c62dd 4084 rtx ret;
647661c6 4085
9fe0e1b8 4086 /* Ensure we get an actual string whose length can be evaluated at
a0c938f0 4087 compile-time, not an expression containing a string. This is
4088 because the latter will potentially produce pessimized code
4089 when used to produce the return value. */
2b84b289 4090 c_strlen_data data;
4091 memset (&data, 0, sizeof (c_strlen_data));
50e57712 4092 if (!c_getstr (src, NULL)
2b84b289 4093 || !(len = c_strlen (src, 0, &data, 1)))
c2f47e15 4094 return expand_movstr (dst, src, target, /*endp=*/2);
3b824fa6 4095
2b84b289 4096 if (data.decl && !TREE_NO_WARNING (exp))
4097 warn_string_no_nul (EXPR_LOCATION (exp), "stpcpy", src, data.decl);
50e57712 4098
389dd41b 4099 lenp1 = size_binop_loc (loc, PLUS_EXPR, len, ssize_int (1));
a65c4d64 4100 ret = expand_builtin_mempcpy_args (dst, src, lenp1,
d0fbba1a 4101 target, exp, /*endp=*/2);
727c62dd 4102
4103 if (ret)
4104 return ret;
4105
4106 if (TREE_CODE (len) == INTEGER_CST)
4107 {
8ec3c5c2 4108 rtx len_rtx = expand_normal (len);
727c62dd 4109
971ba038 4110 if (CONST_INT_P (len_rtx))
727c62dd 4111 {
a788aa5f 4112 ret = expand_builtin_strcpy_args (exp, dst, src, target);
727c62dd 4113
4114 if (ret)
4115 {
4116 if (! target)
7ac87324 4117 {
4118 if (mode != VOIDmode)
4119 target = gen_reg_rtx (mode);
4120 else
4121 target = gen_reg_rtx (GET_MODE (ret));
4122 }
727c62dd 4123 if (GET_MODE (target) != GET_MODE (ret))
4124 ret = gen_lowpart (GET_MODE (target), ret);
4125
29c05e22 4126 ret = plus_constant (GET_MODE (ret), ret, INTVAL (len_rtx));
c5aba89c 4127 ret = emit_move_insn (target, force_operand (ret, NULL_RTX));
64db345d 4128 gcc_assert (ret);
727c62dd 4129
4130 return target;
4131 }
4132 }
4133 }
4134
c2f47e15 4135 return expand_movstr (dst, src, target, /*endp=*/2);
3b824fa6 4136 }
4137}
4138
df6e8b42 4139/* Expand a call EXP to the stpcpy builtin and diagnose uses of nonstring
4140 arguments while being careful to avoid duplicate warnings (which could
4141 be issued if the expander were to expand the call, resulting in it
4142 being emitted in expand_call(). */
4143
4144static rtx
4145expand_builtin_stpcpy (tree exp, rtx target, machine_mode mode)
4146{
4147 if (rtx ret = expand_builtin_stpcpy_1 (exp, target, mode))
4148 {
4149 /* The call has been successfully expanded. Check for nonstring
4150 arguments and issue warnings as appropriate. */
4151 maybe_warn_nonstring_arg (get_callee_fndecl (exp), exp);
4152 return ret;
4153 }
4154
4155 return NULL_RTX;
4156}
4157
4d317237 4158/* Check a call EXP to the stpncpy built-in for validity.
4159 Return NULL_RTX on both success and failure. */
4160
4161static rtx
4162expand_builtin_stpncpy (tree exp, rtx)
4163{
4164 if (!validate_arglist (exp,
4165 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE)
4166 || !warn_stringop_overflow)
4167 return NULL_RTX;
4168
aca1a787 4169 /* The source and destination of the call. */
4d317237 4170 tree dest = CALL_EXPR_ARG (exp, 0);
4171 tree src = CALL_EXPR_ARG (exp, 1);
4172
aca1a787 4173 /* The exact number of bytes to write (not the maximum). */
4d317237 4174 tree len = CALL_EXPR_ARG (exp, 2);
4d317237 4175
aca1a787 4176 /* The size of the destination object. */
8d6c6ef5 4177 tree destsize = compute_objsize (dest, warn_stringop_overflow - 1);
4d317237 4178
e6a18b5a 4179 check_access (exp, dest, src, len, /*maxread=*/NULL_TREE, src, destsize);
4d317237 4180
4181 return NULL_RTX;
4182}
4183
6840589f 4184/* Callback routine for store_by_pieces. Read GET_MODE_BITSIZE (MODE)
4185 bytes from constant string DATA + OFFSET and return it as target
4186 constant. */
4187
09879952 4188rtx
aecda0d6 4189builtin_strncpy_read_str (void *data, HOST_WIDE_INT offset,
f77c4496 4190 scalar_int_mode mode)
6840589f 4191{
4192 const char *str = (const char *) data;
4193
4194 if ((unsigned HOST_WIDE_INT) offset > strlen (str))
4195 return const0_rtx;
4196
4197 return c_readstr (str + offset, mode);
4198}
4199
5aef8938 4200/* Helper to check the sizes of sequences and the destination of calls
4201 to __builtin_strncat and __builtin___strncat_chk. Returns true on
4202 success (no overflow or invalid sizes), false otherwise. */
4203
4204static bool
4205check_strncat_sizes (tree exp, tree objsize)
4206{
4207 tree dest = CALL_EXPR_ARG (exp, 0);
4208 tree src = CALL_EXPR_ARG (exp, 1);
e6a18b5a 4209 tree maxread = CALL_EXPR_ARG (exp, 2);
5aef8938 4210
4211 /* Try to determine the range of lengths that the source expression
4212 refers to. */
4213 tree lenrange[2];
4214 get_range_strlen (src, lenrange);
4215
4216 /* Try to verify that the destination is big enough for the shortest
4217 string. */
4218
4219 if (!objsize && warn_stringop_overflow)
4220 {
4221 /* If it hasn't been provided by __strncat_chk, try to determine
4222 the size of the destination object into which the source is
4223 being copied. */
8d6c6ef5 4224 objsize = compute_objsize (dest, warn_stringop_overflow - 1);
5aef8938 4225 }
4226
4227 /* Add one for the terminating nul. */
4228 tree srclen = (lenrange[0]
4229 ? fold_build2 (PLUS_EXPR, size_type_node, lenrange[0],
4230 size_one_node)
4231 : NULL_TREE);
4232
e6a18b5a 4233 /* The strncat function copies at most MAXREAD bytes and always appends
4234 the terminating nul so the specified upper bound should never be equal
4235 to (or greater than) the size of the destination. */
4236 if (tree_fits_uhwi_p (maxread) && tree_fits_uhwi_p (objsize)
4237 && tree_int_cst_equal (objsize, maxread))
5aef8938 4238 {
4d317237 4239 location_t loc = tree_nonartificial_location (exp);
4240 loc = expansion_point_location_if_in_system_header (loc);
4241
4242 warning_at (loc, OPT_Wstringop_overflow_,
9098b938 4243 "%K%qD specified bound %E equals destination size",
e6a18b5a 4244 exp, get_callee_fndecl (exp), maxread);
5aef8938 4245
4246 return false;
4247 }
4248
4249 if (!srclen
e6a18b5a 4250 || (maxread && tree_fits_uhwi_p (maxread)
5aef8938 4251 && tree_fits_uhwi_p (srclen)
e6a18b5a 4252 && tree_int_cst_lt (maxread, srclen)))
4253 srclen = maxread;
5aef8938 4254
e6a18b5a 4255 /* The number of bytes to write is LEN but check_access will also
5aef8938 4256 check SRCLEN if LEN's value isn't known. */
e6a18b5a 4257 return check_access (exp, dest, src, /*size=*/NULL_TREE, maxread, srclen,
4258 objsize);
5aef8938 4259}
4260
4261/* Similar to expand_builtin_strcat, do some very basic size validation
4262 of a call to the strcpy builtin given by EXP. Return NULL_RTX to have
4263 the built-in expand to a call to the library function. */
4264
4265static rtx
4266expand_builtin_strncat (tree exp, rtx)
4267{
4268 if (!validate_arglist (exp,
4269 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE)
4270 || !warn_stringop_overflow)
4271 return NULL_RTX;
4272
4273 tree dest = CALL_EXPR_ARG (exp, 0);
4274 tree src = CALL_EXPR_ARG (exp, 1);
4275 /* The upper bound on the number of bytes to write. */
e6a18b5a 4276 tree maxread = CALL_EXPR_ARG (exp, 2);
5aef8938 4277 /* The length of the source sequence. */
4278 tree slen = c_strlen (src, 1);
4279
4280 /* Try to determine the range of lengths that the source expression
4281 refers to. */
4282 tree lenrange[2];
4283 if (slen)
4284 lenrange[0] = lenrange[1] = slen;
4285 else
4286 get_range_strlen (src, lenrange);
4287
4288 /* Try to verify that the destination is big enough for the shortest
4289 string. First try to determine the size of the destination object
4290 into which the source is being copied. */
8d6c6ef5 4291 tree destsize = compute_objsize (dest, warn_stringop_overflow - 1);
5aef8938 4292
4293 /* Add one for the terminating nul. */
4294 tree srclen = (lenrange[0]
4295 ? fold_build2 (PLUS_EXPR, size_type_node, lenrange[0],
4296 size_one_node)
4297 : NULL_TREE);
4298
e6a18b5a 4299 /* The strncat function copies at most MAXREAD bytes and always appends
4300 the terminating nul so the specified upper bound should never be equal
4301 to (or greater than) the size of the destination. */
4302 if (tree_fits_uhwi_p (maxread) && tree_fits_uhwi_p (destsize)
4303 && tree_int_cst_equal (destsize, maxread))
5aef8938 4304 {
4d317237 4305 location_t loc = tree_nonartificial_location (exp);
4306 loc = expansion_point_location_if_in_system_header (loc);
4307
4308 warning_at (loc, OPT_Wstringop_overflow_,
9098b938 4309 "%K%qD specified bound %E equals destination size",
e6a18b5a 4310 exp, get_callee_fndecl (exp), maxread);
5aef8938 4311
4312 return NULL_RTX;
4313 }
4314
4315 if (!srclen
e6a18b5a 4316 || (maxread && tree_fits_uhwi_p (maxread)
5aef8938 4317 && tree_fits_uhwi_p (srclen)
e6a18b5a 4318 && tree_int_cst_lt (maxread, srclen)))
4319 srclen = maxread;
5aef8938 4320
e6a18b5a 4321 /* The number of bytes to write is SRCLEN. */
4322 check_access (exp, dest, src, NULL_TREE, maxread, srclen, destsize);
5aef8938 4323
4324 return NULL_RTX;
4325}
4326
48e1416a 4327/* Expand expression EXP, which is a call to the strncpy builtin. Return
c2f47e15 4328 NULL_RTX if we failed the caller should emit a normal call. */
ed09096d 4329
4330static rtx
a65c4d64 4331expand_builtin_strncpy (tree exp, rtx target)
ed09096d 4332{
389dd41b 4333 location_t loc = EXPR_LOCATION (exp);
c2f47e15 4334
4335 if (validate_arglist (exp,
4336 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
ed09096d 4337 {
c2f47e15 4338 tree dest = CALL_EXPR_ARG (exp, 0);
4339 tree src = CALL_EXPR_ARG (exp, 1);
5aef8938 4340 /* The number of bytes to write (not the maximum). */
c2f47e15 4341 tree len = CALL_EXPR_ARG (exp, 2);
5aef8938 4342 /* The length of the source sequence. */
c2f47e15 4343 tree slen = c_strlen (src, 1);
6840589f 4344
e6a18b5a 4345 if (warn_stringop_overflow)
4346 {
4347 tree destsize = compute_objsize (dest,
4348 warn_stringop_overflow - 1);
4349
4350 /* The number of bytes to write is LEN but check_access will also
4351 check SLEN if LEN's value isn't known. */
4352 check_access (exp, dest, src, len, /*maxread=*/NULL_TREE, src,
4353 destsize);
4354 }
5aef8938 4355
8ff6a5cd 4356 /* We must be passed a constant len and src parameter. */
e913b5cd 4357 if (!tree_fits_uhwi_p (len) || !slen || !tree_fits_uhwi_p (slen))
c2f47e15 4358 return NULL_RTX;
ed09096d 4359
389dd41b 4360 slen = size_binop_loc (loc, PLUS_EXPR, slen, ssize_int (1));
ed09096d 4361
4362 /* We're required to pad with trailing zeros if the requested
a0c938f0 4363 len is greater than strlen(s2)+1. In that case try to
6840589f 4364 use store_by_pieces, if it fails, punt. */
ed09096d 4365 if (tree_int_cst_lt (slen, len))
6840589f 4366 {
957d0361 4367 unsigned int dest_align = get_pointer_alignment (dest);
c2f47e15 4368 const char *p = c_getstr (src);
6840589f 4369 rtx dest_mem;
4370
e913b5cd 4371 if (!p || dest_align == 0 || !tree_fits_uhwi_p (len)
4372 || !can_store_by_pieces (tree_to_uhwi (len),
6840589f 4373 builtin_strncpy_read_str,
364c0c59 4374 CONST_CAST (char *, p),
4375 dest_align, false))
c2f47e15 4376 return NULL_RTX;
6840589f 4377
d8ae1baa 4378 dest_mem = get_memory_rtx (dest, len);
e913b5cd 4379 store_by_pieces (dest_mem, tree_to_uhwi (len),
6840589f 4380 builtin_strncpy_read_str,
364c0c59 4381 CONST_CAST (char *, p), dest_align, false, 0);
a65c4d64 4382 dest_mem = force_operand (XEXP (dest_mem, 0), target);
85d654dd 4383 dest_mem = convert_memory_address (ptr_mode, dest_mem);
e5716f7e 4384 return dest_mem;
6840589f 4385 }
ed09096d 4386 }
c2f47e15 4387 return NULL_RTX;
ed09096d 4388}
4389
ecc318ff 4390/* Callback routine for store_by_pieces. Read GET_MODE_BITSIZE (MODE)
4391 bytes from constant string DATA + OFFSET and return it as target
4392 constant. */
4393
f656b751 4394rtx
aecda0d6 4395builtin_memset_read_str (void *data, HOST_WIDE_INT offset ATTRIBUTE_UNUSED,
f77c4496 4396 scalar_int_mode mode)
ecc318ff 4397{
4398 const char *c = (const char *) data;
364c0c59 4399 char *p = XALLOCAVEC (char, GET_MODE_SIZE (mode));
ecc318ff 4400
4401 memset (p, *c, GET_MODE_SIZE (mode));
4402
4403 return c_readstr (p, mode);
4404}
4405
a7ec6974 4406/* Callback routine for store_by_pieces. Return the RTL of a register
4407 containing GET_MODE_SIZE (MODE) consecutive copies of the unsigned
4408 char value given in the RTL register data. For example, if mode is
4409 4 bytes wide, return the RTL for 0x01010101*data. */
4410
4411static rtx
aecda0d6 4412builtin_memset_gen_str (void *data, HOST_WIDE_INT offset ATTRIBUTE_UNUSED,
f77c4496 4413 scalar_int_mode mode)
a7ec6974 4414{
4415 rtx target, coeff;
4416 size_t size;
4417 char *p;
4418
4419 size = GET_MODE_SIZE (mode);
f0ce3b1f 4420 if (size == 1)
4421 return (rtx) data;
a7ec6974 4422
364c0c59 4423 p = XALLOCAVEC (char, size);
a7ec6974 4424 memset (p, 1, size);
4425 coeff = c_readstr (p, mode);
4426
f0ce3b1f 4427 target = convert_to_mode (mode, (rtx) data, 1);
a7ec6974 4428 target = expand_mult (mode, target, coeff, NULL_RTX, 1);
4429 return force_reg (mode, target);
4430}
4431
48e1416a 4432/* Expand expression EXP, which is a call to the memset builtin. Return
4433 NULL_RTX if we failed the caller should emit a normal call, otherwise
c2f47e15 4434 try to get the result in TARGET, if convenient (and in mode MODE if that's
6f428e8b 4435 convenient). */
902de8ed 4436
53800dbe 4437static rtx
3754d046 4438expand_builtin_memset (tree exp, rtx target, machine_mode mode)
53800dbe 4439{
c2f47e15 4440 if (!validate_arglist (exp,
4441 POINTER_TYPE, INTEGER_TYPE, INTEGER_TYPE, VOID_TYPE))
4442 return NULL_RTX;
5aef8938 4443
4444 tree dest = CALL_EXPR_ARG (exp, 0);
4445 tree val = CALL_EXPR_ARG (exp, 1);
4446 tree len = CALL_EXPR_ARG (exp, 2);
4447
e6a18b5a 4448 check_memop_access (exp, dest, NULL_TREE, len);
5aef8938 4449
4450 return expand_builtin_memset_args (dest, val, len, target, mode, exp);
c2f47e15 4451}
53800dbe 4452
c2f47e15 4453/* Helper function to do the actual work for expand_builtin_memset. The
4454 arguments to the builtin_memset call DEST, VAL, and LEN are broken out
4455 so that this can also be called without constructing an actual CALL_EXPR.
4456 The other arguments and return value are the same as for
4457 expand_builtin_memset. */
6b961939 4458
c2f47e15 4459static rtx
4460expand_builtin_memset_args (tree dest, tree val, tree len,
3754d046 4461 rtx target, machine_mode mode, tree orig_exp)
c2f47e15 4462{
4463 tree fndecl, fn;
4464 enum built_in_function fcode;
3754d046 4465 machine_mode val_mode;
c2f47e15 4466 char c;
4467 unsigned int dest_align;
4468 rtx dest_mem, dest_addr, len_rtx;
4469 HOST_WIDE_INT expected_size = -1;
4470 unsigned int expected_align = 0;
36d63243 4471 unsigned HOST_WIDE_INT min_size;
4472 unsigned HOST_WIDE_INT max_size;
9db0f34d 4473 unsigned HOST_WIDE_INT probable_max_size;
53800dbe 4474
957d0361 4475 dest_align = get_pointer_alignment (dest);
162719b3 4476
c2f47e15 4477 /* If DEST is not a pointer type, don't do this operation in-line. */
4478 if (dest_align == 0)
4479 return NULL_RTX;
6f428e8b 4480
8cee8dc0 4481 if (currently_expanding_gimple_stmt)
4482 stringop_block_profile (currently_expanding_gimple_stmt,
4483 &expected_align, &expected_size);
75a70cf9 4484
c2f47e15 4485 if (expected_align < dest_align)
4486 expected_align = dest_align;
6b961939 4487
c2f47e15 4488 /* If the LEN parameter is zero, return DEST. */
4489 if (integer_zerop (len))
4490 {
4491 /* Evaluate and ignore VAL in case it has side-effects. */
4492 expand_expr (val, const0_rtx, VOIDmode, EXPAND_NORMAL);
4493 return expand_expr (dest, target, mode, EXPAND_NORMAL);
4494 }
7a3e5564 4495
c2f47e15 4496 /* Stabilize the arguments in case we fail. */
4497 dest = builtin_save_expr (dest);
4498 val = builtin_save_expr (val);
4499 len = builtin_save_expr (len);
a7ec6974 4500
c2f47e15 4501 len_rtx = expand_normal (len);
9db0f34d 4502 determine_block_size (len, len_rtx, &min_size, &max_size,
4503 &probable_max_size);
c2f47e15 4504 dest_mem = get_memory_rtx (dest, len);
03a5dda9 4505 val_mode = TYPE_MODE (unsigned_char_type_node);
a7ec6974 4506
c2f47e15 4507 if (TREE_CODE (val) != INTEGER_CST)
4508 {
4509 rtx val_rtx;
a7ec6974 4510
c2f47e15 4511 val_rtx = expand_normal (val);
03a5dda9 4512 val_rtx = convert_to_mode (val_mode, val_rtx, 0);
53800dbe 4513
c2f47e15 4514 /* Assume that we can memset by pieces if we can store
4515 * the coefficients by pieces (in the required modes).
4516 * We can't pass builtin_memset_gen_str as that emits RTL. */
4517 c = 1;
e913b5cd 4518 if (tree_fits_uhwi_p (len)
4519 && can_store_by_pieces (tree_to_uhwi (len),
4b297e2e 4520 builtin_memset_read_str, &c, dest_align,
4521 true))
c2f47e15 4522 {
03a5dda9 4523 val_rtx = force_reg (val_mode, val_rtx);
e913b5cd 4524 store_by_pieces (dest_mem, tree_to_uhwi (len),
4b297e2e 4525 builtin_memset_gen_str, val_rtx, dest_align,
4526 true, 0);
c2f47e15 4527 }
4528 else if (!set_storage_via_setmem (dest_mem, len_rtx, val_rtx,
4529 dest_align, expected_align,
9db0f34d 4530 expected_size, min_size, max_size,
4531 probable_max_size))
6b961939 4532 goto do_libcall;
48e1416a 4533
c2f47e15 4534 dest_mem = force_operand (XEXP (dest_mem, 0), NULL_RTX);
4535 dest_mem = convert_memory_address (ptr_mode, dest_mem);
4536 return dest_mem;
4537 }
53800dbe 4538
c2f47e15 4539 if (target_char_cast (val, &c))
4540 goto do_libcall;
ecc318ff 4541
c2f47e15 4542 if (c)
4543 {
e913b5cd 4544 if (tree_fits_uhwi_p (len)
4545 && can_store_by_pieces (tree_to_uhwi (len),
4b297e2e 4546 builtin_memset_read_str, &c, dest_align,
4547 true))
e913b5cd 4548 store_by_pieces (dest_mem, tree_to_uhwi (len),
4b297e2e 4549 builtin_memset_read_str, &c, dest_align, true, 0);
03a5dda9 4550 else if (!set_storage_via_setmem (dest_mem, len_rtx,
4551 gen_int_mode (c, val_mode),
c2f47e15 4552 dest_align, expected_align,
9db0f34d 4553 expected_size, min_size, max_size,
4554 probable_max_size))
c2f47e15 4555 goto do_libcall;
48e1416a 4556
c2f47e15 4557 dest_mem = force_operand (XEXP (dest_mem, 0), NULL_RTX);
4558 dest_mem = convert_memory_address (ptr_mode, dest_mem);
4559 return dest_mem;
4560 }
ecc318ff 4561
c2f47e15 4562 set_mem_align (dest_mem, dest_align);
4563 dest_addr = clear_storage_hints (dest_mem, len_rtx,
4564 CALL_EXPR_TAILCALL (orig_exp)
4565 ? BLOCK_OP_TAILCALL : BLOCK_OP_NORMAL,
36d63243 4566 expected_align, expected_size,
9db0f34d 4567 min_size, max_size,
4568 probable_max_size);
53800dbe 4569
c2f47e15 4570 if (dest_addr == 0)
4571 {
4572 dest_addr = force_operand (XEXP (dest_mem, 0), NULL_RTX);
4573 dest_addr = convert_memory_address (ptr_mode, dest_addr);
4574 }
53800dbe 4575
c2f47e15 4576 return dest_addr;
6b961939 4577
c2f47e15 4578 do_libcall:
4579 fndecl = get_callee_fndecl (orig_exp);
4580 fcode = DECL_FUNCTION_CODE (fndecl);
1e42d5c6 4581 if (fcode == BUILT_IN_MEMSET)
0568e9c1 4582 fn = build_call_nofold_loc (EXPR_LOCATION (orig_exp), fndecl, 3,
4583 dest, val, len);
c2f47e15 4584 else if (fcode == BUILT_IN_BZERO)
0568e9c1 4585 fn = build_call_nofold_loc (EXPR_LOCATION (orig_exp), fndecl, 2,
4586 dest, len);
c2f47e15 4587 else
4588 gcc_unreachable ();
a65c4d64 4589 gcc_assert (TREE_CODE (fn) == CALL_EXPR);
4590 CALL_EXPR_TAILCALL (fn) = CALL_EXPR_TAILCALL (orig_exp);
c2f47e15 4591 return expand_call (fn, target, target == const0_rtx);
53800dbe 4592}
4593
48e1416a 4594/* Expand expression EXP, which is a call to the bzero builtin. Return
c2f47e15 4595 NULL_RTX if we failed the caller should emit a normal call. */
27d0c333 4596
ffc83088 4597static rtx
0b25db21 4598expand_builtin_bzero (tree exp)
ffc83088 4599{
c2f47e15 4600 if (!validate_arglist (exp, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
7369e7ba 4601 return NULL_RTX;
ffc83088 4602
5aef8938 4603 tree dest = CALL_EXPR_ARG (exp, 0);
4604 tree size = CALL_EXPR_ARG (exp, 1);
4605
e6a18b5a 4606 check_memop_access (exp, dest, NULL_TREE, size);
bf8e3599 4607
7369e7ba 4608 /* New argument list transforming bzero(ptr x, int y) to
6f428e8b 4609 memset(ptr x, int 0, size_t y). This is done this way
4610 so that if it isn't expanded inline, we fallback to
4611 calling bzero instead of memset. */
bf8e3599 4612
5aef8938 4613 location_t loc = EXPR_LOCATION (exp);
4614
c2f47e15 4615 return expand_builtin_memset_args (dest, integer_zero_node,
a0553bff 4616 fold_convert_loc (loc,
4617 size_type_node, size),
c2f47e15 4618 const0_rtx, VOIDmode, exp);
ffc83088 4619}
4620
d6f01a40 4621/* Try to expand cmpstr operation ICODE with the given operands.
4622 Return the result rtx on success, otherwise return null. */
4623
4624static rtx
4625expand_cmpstr (insn_code icode, rtx target, rtx arg1_rtx, rtx arg2_rtx,
4626 HOST_WIDE_INT align)
4627{
4628 machine_mode insn_mode = insn_data[icode].operand[0].mode;
4629
4630 if (target && (!REG_P (target) || HARD_REGISTER_P (target)))
4631 target = NULL_RTX;
4632
4633 struct expand_operand ops[4];
4634 create_output_operand (&ops[0], target, insn_mode);
4635 create_fixed_operand (&ops[1], arg1_rtx);
4636 create_fixed_operand (&ops[2], arg2_rtx);
4637 create_integer_operand (&ops[3], align);
4638 if (maybe_expand_insn (icode, 4, ops))
4639 return ops[0].value;
4640 return NULL_RTX;
4641}
4642
7a3f89b5 4643/* Expand expression EXP, which is a call to the memcmp built-in function.
bd021c1c 4644 Return NULL_RTX if we failed and the caller should emit a normal call,
3e346f54 4645 otherwise try to get the result in TARGET, if convenient.
4646 RESULT_EQ is true if we can relax the returned value to be either zero
4647 or nonzero, without caring about the sign. */
27d0c333 4648
53800dbe 4649static rtx
3e346f54 4650expand_builtin_memcmp (tree exp, rtx target, bool result_eq)
53800dbe 4651{
c2f47e15 4652 if (!validate_arglist (exp,
4653 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
4654 return NULL_RTX;
6f428e8b 4655
ea368aac 4656 tree arg1 = CALL_EXPR_ARG (exp, 0);
4657 tree arg2 = CALL_EXPR_ARG (exp, 1);
4658 tree len = CALL_EXPR_ARG (exp, 2);
a950155e 4659 enum built_in_function fcode = DECL_FUNCTION_CODE (get_callee_fndecl (exp));
4660 bool no_overflow = true;
8d6c6ef5 4661
4662 /* Diagnose calls where the specified length exceeds the size of either
4663 object. */
a950155e 4664 tree size = compute_objsize (arg1, 0);
4665 no_overflow = check_access (exp, /*dst=*/NULL_TREE, /*src=*/NULL_TREE,
4666 len, /*maxread=*/NULL_TREE, size,
4667 /*objsize=*/NULL_TREE);
b3e6ae76 4668 if (no_overflow)
a950155e 4669 {
4670 size = compute_objsize (arg2, 0);
4671 no_overflow = check_access (exp, /*dst=*/NULL_TREE, /*src=*/NULL_TREE,
4672 len, /*maxread=*/NULL_TREE, size,
4673 /*objsize=*/NULL_TREE);
b3e6ae76 4674 }
a950155e 4675
ee1b788e 4676 /* If the specified length exceeds the size of either object,
4677 call the function. */
4678 if (!no_overflow)
4679 return NULL_RTX;
4680
b3e6ae76 4681 /* Due to the performance benefit, always inline the calls first
a950155e 4682 when result_eq is false. */
4683 rtx result = NULL_RTX;
b3e6ae76 4684
ee1b788e 4685 if (!result_eq && fcode != BUILT_IN_BCMP)
8d6c6ef5 4686 {
0dbefa15 4687 result = inline_expand_builtin_string_cmp (exp, target);
a950155e 4688 if (result)
4689 return result;
8d6c6ef5 4690 }
4691
3e346f54 4692 machine_mode mode = TYPE_MODE (TREE_TYPE (exp));
4693 location_t loc = EXPR_LOCATION (exp);
b428c0a5 4694
ea368aac 4695 unsigned int arg1_align = get_pointer_alignment (arg1) / BITS_PER_UNIT;
4696 unsigned int arg2_align = get_pointer_alignment (arg2) / BITS_PER_UNIT;
53800dbe 4697
ea368aac 4698 /* If we don't have POINTER_TYPE, call the function. */
4699 if (arg1_align == 0 || arg2_align == 0)
4700 return NULL_RTX;
53800dbe 4701
ea368aac 4702 rtx arg1_rtx = get_memory_rtx (arg1, len);
4703 rtx arg2_rtx = get_memory_rtx (arg2, len);
3e346f54 4704 rtx len_rtx = expand_normal (fold_convert_loc (loc, sizetype, len));
53800dbe 4705
ea368aac 4706 /* Set MEM_SIZE as appropriate. */
3e346f54 4707 if (CONST_INT_P (len_rtx))
ea368aac 4708 {
3e346f54 4709 set_mem_size (arg1_rtx, INTVAL (len_rtx));
4710 set_mem_size (arg2_rtx, INTVAL (len_rtx));
ea368aac 4711 }
83f88f8e 4712
3e346f54 4713 by_pieces_constfn constfn = NULL;
4714
719f3058 4715 const char *src_str = c_getstr (arg2);
4716 if (result_eq && src_str == NULL)
4717 {
4718 src_str = c_getstr (arg1);
4719 if (src_str != NULL)
092db747 4720 std::swap (arg1_rtx, arg2_rtx);
719f3058 4721 }
3e346f54 4722
4723 /* If SRC is a string constant and block move would be done
4724 by pieces, we can avoid loading the string from memory
4725 and only stored the computed constants. */
4726 if (src_str
4727 && CONST_INT_P (len_rtx)
4728 && (unsigned HOST_WIDE_INT) INTVAL (len_rtx) <= strlen (src_str) + 1)
4729 constfn = builtin_memcpy_read_str;
4730
a950155e 4731 result = emit_block_cmp_hints (arg1_rtx, arg2_rtx, len_rtx,
4732 TREE_TYPE (len), target,
4733 result_eq, constfn,
4734 CONST_CAST (char *, src_str));
3e346f54 4735
ea368aac 4736 if (result)
4737 {
4738 /* Return the value in the proper mode for this function. */
4739 if (GET_MODE (result) == mode)
4740 return result;
83f88f8e 4741
ea368aac 4742 if (target != 0)
4743 {
4744 convert_move (target, result, 0);
4745 return target;
4746 }
0cd832f0 4747
53800dbe 4748 return convert_to_mode (mode, result, 0);
ea368aac 4749 }
53800dbe 4750
61ffc71a 4751 return NULL_RTX;
6f428e8b 4752}
4753
c2f47e15 4754/* Expand expression EXP, which is a call to the strcmp builtin. Return NULL_RTX
53800dbe 4755 if we failed the caller should emit a normal call, otherwise try to get
4756 the result in TARGET, if convenient. */
902de8ed 4757
53800dbe 4758static rtx
a65c4d64 4759expand_builtin_strcmp (tree exp, ATTRIBUTE_UNUSED rtx target)
53800dbe 4760{
c2f47e15 4761 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
4762 return NULL_RTX;
bf8e3599 4763
a950155e 4764 /* Due to the performance benefit, always inline the calls first. */
4765 rtx result = NULL_RTX;
0dbefa15 4766 result = inline_expand_builtin_string_cmp (exp, target);
a950155e 4767 if (result)
4768 return result;
4769
d6f01a40 4770 insn_code cmpstr_icode = direct_optab_handler (cmpstr_optab, SImode);
4771 insn_code cmpstrn_icode = direct_optab_handler (cmpstrn_optab, SImode);
5c5d012b 4772 if (cmpstr_icode == CODE_FOR_nothing && cmpstrn_icode == CODE_FOR_nothing)
4773 return NULL_RTX;
a0c938f0 4774
5c5d012b 4775 tree arg1 = CALL_EXPR_ARG (exp, 0);
4776 tree arg2 = CALL_EXPR_ARG (exp, 1);
6ac5504b 4777
5c5d012b 4778 unsigned int arg1_align = get_pointer_alignment (arg1) / BITS_PER_UNIT;
4779 unsigned int arg2_align = get_pointer_alignment (arg2) / BITS_PER_UNIT;
7a3f89b5 4780
5c5d012b 4781 /* If we don't have POINTER_TYPE, call the function. */
4782 if (arg1_align == 0 || arg2_align == 0)
4783 return NULL_RTX;
7a3f89b5 4784
5c5d012b 4785 /* Stabilize the arguments in case gen_cmpstr(n)si fail. */
4786 arg1 = builtin_save_expr (arg1);
4787 arg2 = builtin_save_expr (arg2);
53800dbe 4788
5c5d012b 4789 rtx arg1_rtx = get_memory_rtx (arg1, NULL);
4790 rtx arg2_rtx = get_memory_rtx (arg2, NULL);
d6f01a40 4791
5c5d012b 4792 /* Try to call cmpstrsi. */
4793 if (cmpstr_icode != CODE_FOR_nothing)
4794 result = expand_cmpstr (cmpstr_icode, target, arg1_rtx, arg2_rtx,
4795 MIN (arg1_align, arg2_align));
6ac5504b 4796
5c5d012b 4797 /* Try to determine at least one length and call cmpstrnsi. */
4798 if (!result && cmpstrn_icode != CODE_FOR_nothing)
4799 {
4800 tree len;
4801 rtx arg3_rtx;
4802
4803 tree len1 = c_strlen (arg1, 1);
4804 tree len2 = c_strlen (arg2, 1);
4805
4806 if (len1)
4807 len1 = size_binop (PLUS_EXPR, ssize_int (1), len1);
4808 if (len2)
4809 len2 = size_binop (PLUS_EXPR, ssize_int (1), len2);
4810
4811 /* If we don't have a constant length for the first, use the length
4812 of the second, if we know it. We don't require a constant for
4813 this case; some cost analysis could be done if both are available
4814 but neither is constant. For now, assume they're equally cheap,
4815 unless one has side effects. If both strings have constant lengths,
4816 use the smaller. */
4817
4818 if (!len1)
4819 len = len2;
4820 else if (!len2)
4821 len = len1;
4822 else if (TREE_SIDE_EFFECTS (len1))
4823 len = len2;
4824 else if (TREE_SIDE_EFFECTS (len2))
4825 len = len1;
4826 else if (TREE_CODE (len1) != INTEGER_CST)
4827 len = len2;
4828 else if (TREE_CODE (len2) != INTEGER_CST)
4829 len = len1;
4830 else if (tree_int_cst_lt (len1, len2))
4831 len = len1;
4832 else
4833 len = len2;
3f8aefe2 4834
5c5d012b 4835 /* If both arguments have side effects, we cannot optimize. */
4836 if (len && !TREE_SIDE_EFFECTS (len))
6ac5504b 4837 {
5c5d012b 4838 arg3_rtx = expand_normal (len);
4839 result = expand_cmpstrn_or_cmpmem
4840 (cmpstrn_icode, target, arg1_rtx, arg2_rtx, TREE_TYPE (len),
4841 arg3_rtx, MIN (arg1_align, arg2_align));
6ac5504b 4842 }
5c5d012b 4843 }
4844
5c5d012b 4845 tree fndecl = get_callee_fndecl (exp);
5c5d012b 4846 if (result)
4847 {
0b39ade8 4848 /* Check to see if the argument was declared attribute nonstring
4849 and if so, issue a warning since at this point it's not known
4850 to be nul-terminated. */
4851 maybe_warn_nonstring_arg (fndecl, exp);
4852
5c5d012b 4853 /* Return the value in the proper mode for this function. */
4854 machine_mode mode = TYPE_MODE (TREE_TYPE (exp));
4855 if (GET_MODE (result) == mode)
4856 return result;
4857 if (target == 0)
4858 return convert_to_mode (mode, result, 0);
4859 convert_move (target, result, 0);
4860 return target;
6ac5504b 4861 }
5c5d012b 4862
4863 /* Expand the library call ourselves using a stabilized argument
4864 list to avoid re-evaluating the function's arguments twice. */
4865 tree fn = build_call_nofold_loc (EXPR_LOCATION (exp), fndecl, 2, arg1, arg2);
4866 gcc_assert (TREE_CODE (fn) == CALL_EXPR);
4867 CALL_EXPR_TAILCALL (fn) = CALL_EXPR_TAILCALL (exp);
4868 return expand_call (fn, target, target == const0_rtx);
83d79705 4869}
53800dbe 4870
48e1416a 4871/* Expand expression EXP, which is a call to the strncmp builtin. Return
c2f47e15 4872 NULL_RTX if we failed the caller should emit a normal call, otherwise try to get
ed09096d 4873 the result in TARGET, if convenient. */
27d0c333 4874
ed09096d 4875static rtx
a65c4d64 4876expand_builtin_strncmp (tree exp, ATTRIBUTE_UNUSED rtx target,
3754d046 4877 ATTRIBUTE_UNUSED machine_mode mode)
ed09096d 4878{
c2f47e15 4879 if (!validate_arglist (exp,
4880 POINTER_TYPE, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
4881 return NULL_RTX;
ed09096d 4882
a950155e 4883 /* Due to the performance benefit, always inline the calls first. */
4884 rtx result = NULL_RTX;
0dbefa15 4885 result = inline_expand_builtin_string_cmp (exp, target);
a950155e 4886 if (result)
4887 return result;
4888
6e34e617 4889 /* If c_strlen can determine an expression for one of the string
6ac5504b 4890 lengths, and it doesn't have side effects, then emit cmpstrnsi
7a3f89b5 4891 using length MIN(strlen(string)+1, arg3). */
d6f01a40 4892 insn_code cmpstrn_icode = direct_optab_handler (cmpstrn_optab, SImode);
5c5d012b 4893 if (cmpstrn_icode == CODE_FOR_nothing)
4894 return NULL_RTX;
27d0c333 4895
5c5d012b 4896 tree len;
4897
4898 tree arg1 = CALL_EXPR_ARG (exp, 0);
4899 tree arg2 = CALL_EXPR_ARG (exp, 1);
4900 tree arg3 = CALL_EXPR_ARG (exp, 2);
4901
4902 unsigned int arg1_align = get_pointer_alignment (arg1) / BITS_PER_UNIT;
4903 unsigned int arg2_align = get_pointer_alignment (arg2) / BITS_PER_UNIT;
4904
4905 tree len1 = c_strlen (arg1, 1);
4906 tree len2 = c_strlen (arg2, 1);
4907
4908 location_t loc = EXPR_LOCATION (exp);
4909
4910 if (len1)
4911 len1 = size_binop_loc (loc, PLUS_EXPR, ssize_int (1), len1);
4912 if (len2)
4913 len2 = size_binop_loc (loc, PLUS_EXPR, ssize_int (1), len2);
4914
4915 tree len3 = fold_convert_loc (loc, sizetype, arg3);
4916
4917 /* If we don't have a constant length for the first, use the length
4918 of the second, if we know it. If neither string is constant length,
4919 use the given length argument. We don't require a constant for
4920 this case; some cost analysis could be done if both are available
4921 but neither is constant. For now, assume they're equally cheap,
4922 unless one has side effects. If both strings have constant lengths,
4923 use the smaller. */
4924
4925 if (!len1 && !len2)
4926 len = len3;
4927 else if (!len1)
4928 len = len2;
4929 else if (!len2)
4930 len = len1;
4931 else if (TREE_SIDE_EFFECTS (len1))
4932 len = len2;
4933 else if (TREE_SIDE_EFFECTS (len2))
4934 len = len1;
4935 else if (TREE_CODE (len1) != INTEGER_CST)
4936 len = len2;
4937 else if (TREE_CODE (len2) != INTEGER_CST)
4938 len = len1;
4939 else if (tree_int_cst_lt (len1, len2))
4940 len = len1;
4941 else
4942 len = len2;
4943
4944 /* If we are not using the given length, we must incorporate it here.
4945 The actual new length parameter will be MIN(len,arg3) in this case. */
4946 if (len != len3)
a55f0871 4947 {
4948 len = fold_convert_loc (loc, sizetype, len);
4949 len = fold_build2_loc (loc, MIN_EXPR, TREE_TYPE (len), len, len3);
4950 }
5c5d012b 4951 rtx arg1_rtx = get_memory_rtx (arg1, len);
4952 rtx arg2_rtx = get_memory_rtx (arg2, len);
4953 rtx arg3_rtx = expand_normal (len);
a950155e 4954 result = expand_cmpstrn_or_cmpmem (cmpstrn_icode, target, arg1_rtx,
4955 arg2_rtx, TREE_TYPE (len), arg3_rtx,
4956 MIN (arg1_align, arg2_align));
5c5d012b 4957
5c5d012b 4958 tree fndecl = get_callee_fndecl (exp);
5c5d012b 4959 if (result)
4960 {
0b39ade8 4961 /* Check to see if the argument was declared attribute nonstring
4962 and if so, issue a warning since at this point it's not known
4963 to be nul-terminated. */
4964 maybe_warn_nonstring_arg (fndecl, exp);
4965
5c5d012b 4966 /* Return the value in the proper mode for this function. */
4967 mode = TYPE_MODE (TREE_TYPE (exp));
4968 if (GET_MODE (result) == mode)
4969 return result;
4970 if (target == 0)
4971 return convert_to_mode (mode, result, 0);
4972 convert_move (target, result, 0);
4973 return target;
4974 }
4975
4976 /* Expand the library call ourselves using a stabilized argument
4977 list to avoid re-evaluating the function's arguments twice. */
4978 tree fn = build_call_nofold_loc (loc, fndecl, 3, arg1, arg2, len);
4979 gcc_assert (TREE_CODE (fn) == CALL_EXPR);
4980 CALL_EXPR_TAILCALL (fn) = CALL_EXPR_TAILCALL (exp);
4981 return expand_call (fn, target, target == const0_rtx);
49f0327b 4982}
4983
a66c9326 4984/* Expand a call to __builtin_saveregs, generating the result in TARGET,
4985 if that's convenient. */
902de8ed 4986
a66c9326 4987rtx
aecda0d6 4988expand_builtin_saveregs (void)
53800dbe 4989{
1e0c0b35 4990 rtx val;
4991 rtx_insn *seq;
53800dbe 4992
4993 /* Don't do __builtin_saveregs more than once in a function.
4994 Save the result of the first call and reuse it. */
4995 if (saveregs_value != 0)
4996 return saveregs_value;
53800dbe 4997
a66c9326 4998 /* When this function is called, it means that registers must be
4999 saved on entry to this function. So we migrate the call to the
5000 first insn of this function. */
5001
5002 start_sequence ();
53800dbe 5003
a66c9326 5004 /* Do whatever the machine needs done in this case. */
45550790 5005 val = targetm.calls.expand_builtin_saveregs ();
53800dbe 5006
a66c9326 5007 seq = get_insns ();
5008 end_sequence ();
53800dbe 5009
a66c9326 5010 saveregs_value = val;
53800dbe 5011
31d3e01c 5012 /* Put the insns after the NOTE that starts the function. If this
5013 is inside a start_sequence, make the outer-level insn chain current, so
a66c9326 5014 the code is placed at the start of the function. */
5015 push_topmost_sequence ();
0ec80471 5016 emit_insn_after (seq, entry_of_function ());
a66c9326 5017 pop_topmost_sequence ();
5018
5019 return val;
53800dbe 5020}
5021
79012a9d 5022/* Expand a call to __builtin_next_arg. */
27d0c333 5023
53800dbe 5024static rtx
79012a9d 5025expand_builtin_next_arg (void)
53800dbe 5026{
79012a9d 5027 /* Checking arguments is already done in fold_builtin_next_arg
5028 that must be called before this function. */
940ddc5c 5029 return expand_binop (ptr_mode, add_optab,
abe32cce 5030 crtl->args.internal_arg_pointer,
5031 crtl->args.arg_offset_rtx,
53800dbe 5032 NULL_RTX, 0, OPTAB_LIB_WIDEN);
5033}
5034
a66c9326 5035/* Make it easier for the backends by protecting the valist argument
5036 from multiple evaluations. */
5037
5038static tree
389dd41b 5039stabilize_va_list_loc (location_t loc, tree valist, int needs_lvalue)
a66c9326 5040{
5f57a8b1 5041 tree vatype = targetm.canonical_va_list_type (TREE_TYPE (valist));
5042
182cf5a9 5043 /* The current way of determining the type of valist is completely
5044 bogus. We should have the information on the va builtin instead. */
5045 if (!vatype)
5046 vatype = targetm.fn_abi_va_list (cfun->decl);
5f57a8b1 5047
5048 if (TREE_CODE (vatype) == ARRAY_TYPE)
a66c9326 5049 {
2d47cc32 5050 if (TREE_SIDE_EFFECTS (valist))
5051 valist = save_expr (valist);
11a61dea 5052
2d47cc32 5053 /* For this case, the backends will be expecting a pointer to
5f57a8b1 5054 vatype, but it's possible we've actually been given an array
5055 (an actual TARGET_CANONICAL_VA_LIST_TYPE (valist)).
2d47cc32 5056 So fix it. */
5057 if (TREE_CODE (TREE_TYPE (valist)) == ARRAY_TYPE)
8a15c04a 5058 {
5f57a8b1 5059 tree p1 = build_pointer_type (TREE_TYPE (vatype));
389dd41b 5060 valist = build_fold_addr_expr_with_type_loc (loc, valist, p1);
8a15c04a 5061 }
a66c9326 5062 }
11a61dea 5063 else
a66c9326 5064 {
182cf5a9 5065 tree pt = build_pointer_type (vatype);
11a61dea 5066
2d47cc32 5067 if (! needs_lvalue)
5068 {
11a61dea 5069 if (! TREE_SIDE_EFFECTS (valist))
5070 return valist;
bf8e3599 5071
389dd41b 5072 valist = fold_build1_loc (loc, ADDR_EXPR, pt, valist);
a66c9326 5073 TREE_SIDE_EFFECTS (valist) = 1;
a66c9326 5074 }
2d47cc32 5075
11a61dea 5076 if (TREE_SIDE_EFFECTS (valist))
2d47cc32 5077 valist = save_expr (valist);
182cf5a9 5078 valist = fold_build2_loc (loc, MEM_REF,
5079 vatype, valist, build_int_cst (pt, 0));
a66c9326 5080 }
5081
5082 return valist;
5083}
5084
2e15d750 5085/* The "standard" definition of va_list is void*. */
5086
5087tree
5088std_build_builtin_va_list (void)
5089{
5090 return ptr_type_node;
5091}
5092
5f57a8b1 5093/* The "standard" abi va_list is va_list_type_node. */
5094
5095tree
5096std_fn_abi_va_list (tree fndecl ATTRIBUTE_UNUSED)
5097{
5098 return va_list_type_node;
5099}
5100
5101/* The "standard" type of va_list is va_list_type_node. */
5102
5103tree
5104std_canonical_va_list_type (tree type)
5105{
5106 tree wtype, htype;
5107
5f57a8b1 5108 wtype = va_list_type_node;
5109 htype = type;
b6da2e41 5110
5111 if (TREE_CODE (wtype) == ARRAY_TYPE)
5f57a8b1 5112 {
5113 /* If va_list is an array type, the argument may have decayed
5114 to a pointer type, e.g. by being passed to another function.
5115 In that case, unwrap both types so that we can compare the
5116 underlying records. */
5117 if (TREE_CODE (htype) == ARRAY_TYPE
5118 || POINTER_TYPE_P (htype))
5119 {
5120 wtype = TREE_TYPE (wtype);
5121 htype = TREE_TYPE (htype);
5122 }
5123 }
5124 if (TYPE_MAIN_VARIANT (wtype) == TYPE_MAIN_VARIANT (htype))
5125 return va_list_type_node;
5126
5127 return NULL_TREE;
5128}
5129
a66c9326 5130/* The "standard" implementation of va_start: just assign `nextarg' to
5131 the variable. */
27d0c333 5132
a66c9326 5133void
aecda0d6 5134std_expand_builtin_va_start (tree valist, rtx nextarg)
a66c9326 5135{
f03c17bc 5136 rtx va_r = expand_expr (valist, NULL_RTX, VOIDmode, EXPAND_WRITE);
5137 convert_move (va_r, nextarg, 0);
a66c9326 5138}
5139
c2f47e15 5140/* Expand EXP, a call to __builtin_va_start. */
27d0c333 5141
a66c9326 5142static rtx
c2f47e15 5143expand_builtin_va_start (tree exp)
a66c9326 5144{
5145 rtx nextarg;
c2f47e15 5146 tree valist;
389dd41b 5147 location_t loc = EXPR_LOCATION (exp);
a66c9326 5148
c2f47e15 5149 if (call_expr_nargs (exp) < 2)
cb166087 5150 {
389dd41b 5151 error_at (loc, "too few arguments to function %<va_start%>");
cb166087 5152 return const0_rtx;
5153 }
a66c9326 5154
c2f47e15 5155 if (fold_builtin_next_arg (exp, true))
79012a9d 5156 return const0_rtx;
7c2f0500 5157
79012a9d 5158 nextarg = expand_builtin_next_arg ();
389dd41b 5159 valist = stabilize_va_list_loc (loc, CALL_EXPR_ARG (exp, 0), 1);
a66c9326 5160
8a58ed0a 5161 if (targetm.expand_builtin_va_start)
5162 targetm.expand_builtin_va_start (valist, nextarg);
5163 else
5164 std_expand_builtin_va_start (valist, nextarg);
a66c9326 5165
5166 return const0_rtx;
5167}
5168
c2f47e15 5169/* Expand EXP, a call to __builtin_va_end. */
f7c44134 5170
a66c9326 5171static rtx
c2f47e15 5172expand_builtin_va_end (tree exp)
a66c9326 5173{
c2f47e15 5174 tree valist = CALL_EXPR_ARG (exp, 0);
8a15c04a 5175
8a15c04a 5176 /* Evaluate for side effects, if needed. I hate macros that don't
5177 do that. */
5178 if (TREE_SIDE_EFFECTS (valist))
5179 expand_expr (valist, const0_rtx, VOIDmode, EXPAND_NORMAL);
a66c9326 5180
5181 return const0_rtx;
5182}
5183
c2f47e15 5184/* Expand EXP, a call to __builtin_va_copy. We do this as a
a66c9326 5185 builtin rather than just as an assignment in stdarg.h because of the
5186 nastiness of array-type va_list types. */
f7c44134 5187
a66c9326 5188static rtx
c2f47e15 5189expand_builtin_va_copy (tree exp)
a66c9326 5190{
5191 tree dst, src, t;
389dd41b 5192 location_t loc = EXPR_LOCATION (exp);
a66c9326 5193
c2f47e15 5194 dst = CALL_EXPR_ARG (exp, 0);
5195 src = CALL_EXPR_ARG (exp, 1);
a66c9326 5196
389dd41b 5197 dst = stabilize_va_list_loc (loc, dst, 1);
5198 src = stabilize_va_list_loc (loc, src, 0);
a66c9326 5199
5f57a8b1 5200 gcc_assert (cfun != NULL && cfun->decl != NULL_TREE);
5201
5202 if (TREE_CODE (targetm.fn_abi_va_list (cfun->decl)) != ARRAY_TYPE)
a66c9326 5203 {
5f57a8b1 5204 t = build2 (MODIFY_EXPR, targetm.fn_abi_va_list (cfun->decl), dst, src);
a66c9326 5205 TREE_SIDE_EFFECTS (t) = 1;
5206 expand_expr (t, const0_rtx, VOIDmode, EXPAND_NORMAL);
5207 }
5208 else
5209 {
11a61dea 5210 rtx dstb, srcb, size;
5211
5212 /* Evaluate to pointers. */
5213 dstb = expand_expr (dst, NULL_RTX, Pmode, EXPAND_NORMAL);
5214 srcb = expand_expr (src, NULL_RTX, Pmode, EXPAND_NORMAL);
5f57a8b1 5215 size = expand_expr (TYPE_SIZE_UNIT (targetm.fn_abi_va_list (cfun->decl)),
5216 NULL_RTX, VOIDmode, EXPAND_NORMAL);
11a61dea 5217
85d654dd 5218 dstb = convert_memory_address (Pmode, dstb);
5219 srcb = convert_memory_address (Pmode, srcb);
726ec87c 5220
11a61dea 5221 /* "Dereference" to BLKmode memories. */
5222 dstb = gen_rtx_MEM (BLKmode, dstb);
ab6ab77e 5223 set_mem_alias_set (dstb, get_alias_set (TREE_TYPE (TREE_TYPE (dst))));
5f57a8b1 5224 set_mem_align (dstb, TYPE_ALIGN (targetm.fn_abi_va_list (cfun->decl)));
11a61dea 5225 srcb = gen_rtx_MEM (BLKmode, srcb);
ab6ab77e 5226 set_mem_alias_set (srcb, get_alias_set (TREE_TYPE (TREE_TYPE (src))));
5f57a8b1 5227 set_mem_align (srcb, TYPE_ALIGN (targetm.fn_abi_va_list (cfun->decl)));
11a61dea 5228
5229 /* Copy. */
0378dbdc 5230 emit_block_move (dstb, srcb, size, BLOCK_OP_NORMAL);
a66c9326 5231 }
5232
5233 return const0_rtx;
5234}
5235
53800dbe 5236/* Expand a call to one of the builtin functions __builtin_frame_address or
5237 __builtin_return_address. */
27d0c333 5238
53800dbe 5239static rtx
c2f47e15 5240expand_builtin_frame_address (tree fndecl, tree exp)
53800dbe 5241{
53800dbe 5242 /* The argument must be a nonnegative integer constant.
5243 It counts the number of frames to scan up the stack.
5b252e95 5244 The value is either the frame pointer value or the return
5245 address saved in that frame. */
c2f47e15 5246 if (call_expr_nargs (exp) == 0)
53800dbe 5247 /* Warning about missing arg was already issued. */
5248 return const0_rtx;
e913b5cd 5249 else if (! tree_fits_uhwi_p (CALL_EXPR_ARG (exp, 0)))
53800dbe 5250 {
5b252e95 5251 error ("invalid argument to %qD", fndecl);
53800dbe 5252 return const0_rtx;
5253 }
5254 else
5255 {
5b252e95 5256 /* Number of frames to scan up the stack. */
5257 unsigned HOST_WIDE_INT count = tree_to_uhwi (CALL_EXPR_ARG (exp, 0));
5258
5259 rtx tem = expand_builtin_return_addr (DECL_FUNCTION_CODE (fndecl), count);
53800dbe 5260
5261 /* Some ports cannot access arbitrary stack frames. */
5262 if (tem == NULL)
5263 {
5b252e95 5264 warning (0, "unsupported argument to %qD", fndecl);
53800dbe 5265 return const0_rtx;
5266 }
5267
5b252e95 5268 if (count)
5269 {
5270 /* Warn since no effort is made to ensure that any frame
5271 beyond the current one exists or can be safely reached. */
5272 warning (OPT_Wframe_address, "calling %qD with "
5273 "a nonzero argument is unsafe", fndecl);
5274 }
5275
53800dbe 5276 /* For __builtin_frame_address, return what we've got. */
5277 if (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_FRAME_ADDRESS)
5278 return tem;
5279
8ad4c111 5280 if (!REG_P (tem)
53800dbe 5281 && ! CONSTANT_P (tem))
99182918 5282 tem = copy_addr_to_reg (tem);
53800dbe 5283 return tem;
5284 }
5285}
5286
990495a7 5287/* Expand EXP, a call to the alloca builtin. Return NULL_RTX if we
2b29cc6a 5288 failed and the caller should emit a normal call. */
15c6cf6b 5289
53800dbe 5290static rtx
2b29cc6a 5291expand_builtin_alloca (tree exp)
53800dbe 5292{
5293 rtx op0;
15c6cf6b 5294 rtx result;
581bf1c2 5295 unsigned int align;
370e45b9 5296 tree fndecl = get_callee_fndecl (exp);
2b34677f 5297 HOST_WIDE_INT max_size;
5298 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
2b29cc6a 5299 bool alloca_for_var = CALL_ALLOCA_FOR_VAR_P (exp);
370e45b9 5300 bool valid_arglist
2b34677f 5301 = (fcode == BUILT_IN_ALLOCA_WITH_ALIGN_AND_MAX
5302 ? validate_arglist (exp, INTEGER_TYPE, INTEGER_TYPE, INTEGER_TYPE,
5303 VOID_TYPE)
5304 : fcode == BUILT_IN_ALLOCA_WITH_ALIGN
5305 ? validate_arglist (exp, INTEGER_TYPE, INTEGER_TYPE, VOID_TYPE)
5306 : validate_arglist (exp, INTEGER_TYPE, VOID_TYPE));
581bf1c2 5307
5308 if (!valid_arglist)
c2f47e15 5309 return NULL_RTX;
53800dbe 5310
8e18705e 5311 if ((alloca_for_var
5312 && warn_vla_limit >= HOST_WIDE_INT_MAX
5313 && warn_alloc_size_limit < warn_vla_limit)
5314 || (!alloca_for_var
5315 && warn_alloca_limit >= HOST_WIDE_INT_MAX
5316 && warn_alloc_size_limit < warn_alloca_limit
5317 ))
370e45b9 5318 {
8e18705e 5319 /* -Walloca-larger-than and -Wvla-larger-than settings of
5320 less than HOST_WIDE_INT_MAX override the more general
5321 -Walloc-size-larger-than so unless either of the former
5322 options is smaller than the last one (wchich would imply
5323 that the call was already checked), check the alloca
5324 arguments for overflow. */
370e45b9 5325 tree args[] = { CALL_EXPR_ARG (exp, 0), NULL_TREE };
5326 int idx[] = { 0, -1 };
5327 maybe_warn_alloc_args_overflow (fndecl, exp, args, idx);
5328 }
5329
53800dbe 5330 /* Compute the argument. */
c2f47e15 5331 op0 = expand_normal (CALL_EXPR_ARG (exp, 0));
53800dbe 5332
581bf1c2 5333 /* Compute the alignment. */
2b34677f 5334 align = (fcode == BUILT_IN_ALLOCA
5335 ? BIGGEST_ALIGNMENT
5336 : TREE_INT_CST_LOW (CALL_EXPR_ARG (exp, 1)));
5337
5338 /* Compute the maximum size. */
5339 max_size = (fcode == BUILT_IN_ALLOCA_WITH_ALIGN_AND_MAX
5340 ? TREE_INT_CST_LOW (CALL_EXPR_ARG (exp, 2))
5341 : -1);
581bf1c2 5342
2b29cc6a 5343 /* Allocate the desired space. If the allocation stems from the declaration
5344 of a variable-sized object, it cannot accumulate. */
2b34677f 5345 result
5346 = allocate_dynamic_stack_space (op0, 0, align, max_size, alloca_for_var);
85d654dd 5347 result = convert_memory_address (ptr_mode, result);
15c6cf6b 5348
5349 return result;
53800dbe 5350}
5351
829e6a9b 5352/* Emit a call to __asan_allocas_unpoison call in EXP. Add to second argument
5353 of the call virtual_stack_dynamic_rtx - stack_pointer_rtx, which is the
5354 STACK_DYNAMIC_OFFSET value. See motivation for this in comment to
5355 handle_builtin_stack_restore function. */
d08919a7 5356
5357static rtx
5358expand_asan_emit_allocas_unpoison (tree exp)
5359{
5360 tree arg0 = CALL_EXPR_ARG (exp, 0);
829e6a9b 5361 tree arg1 = CALL_EXPR_ARG (exp, 1);
cd2ee6ee 5362 rtx top = expand_expr (arg0, NULL_RTX, ptr_mode, EXPAND_NORMAL);
829e6a9b 5363 rtx bot = expand_expr (arg1, NULL_RTX, ptr_mode, EXPAND_NORMAL);
5364 rtx off = expand_simple_binop (Pmode, MINUS, virtual_stack_dynamic_rtx,
5365 stack_pointer_rtx, NULL_RTX, 0,
5366 OPTAB_LIB_WIDEN);
5367 off = convert_modes (ptr_mode, Pmode, off, 0);
5368 bot = expand_simple_binop (ptr_mode, PLUS, bot, off, NULL_RTX, 0,
5369 OPTAB_LIB_WIDEN);
d08919a7 5370 rtx ret = init_one_libfunc ("__asan_allocas_unpoison");
9e9e5c15 5371 ret = emit_library_call_value (ret, NULL_RTX, LCT_NORMAL, ptr_mode,
5372 top, ptr_mode, bot, ptr_mode);
d08919a7 5373 return ret;
5374}
5375
74bdbe96 5376/* Expand a call to bswap builtin in EXP.
5377 Return NULL_RTX if a normal call should be emitted rather than expanding the
5378 function in-line. If convenient, the result should be placed in TARGET.
5379 SUBTARGET may be used as the target for computing one of EXP's operands. */
42791117 5380
5381static rtx
3754d046 5382expand_builtin_bswap (machine_mode target_mode, tree exp, rtx target,
74bdbe96 5383 rtx subtarget)
42791117 5384{
42791117 5385 tree arg;
5386 rtx op0;
5387
c2f47e15 5388 if (!validate_arglist (exp, INTEGER_TYPE, VOID_TYPE))
5389 return NULL_RTX;
42791117 5390
c2f47e15 5391 arg = CALL_EXPR_ARG (exp, 0);
74bdbe96 5392 op0 = expand_expr (arg,
5393 subtarget && GET_MODE (subtarget) == target_mode
5394 ? subtarget : NULL_RTX,
5395 target_mode, EXPAND_NORMAL);
5396 if (GET_MODE (op0) != target_mode)
5397 op0 = convert_to_mode (target_mode, op0, 1);
42791117 5398
74bdbe96 5399 target = expand_unop (target_mode, bswap_optab, op0, target, 1);
42791117 5400
5401 gcc_assert (target);
5402
74bdbe96 5403 return convert_to_mode (target_mode, target, 1);
42791117 5404}
5405
c2f47e15 5406/* Expand a call to a unary builtin in EXP.
5407 Return NULL_RTX if a normal call should be emitted rather than expanding the
53800dbe 5408 function in-line. If convenient, the result should be placed in TARGET.
5409 SUBTARGET may be used as the target for computing one of EXP's operands. */
15c6cf6b 5410
53800dbe 5411static rtx
3754d046 5412expand_builtin_unop (machine_mode target_mode, tree exp, rtx target,
aecda0d6 5413 rtx subtarget, optab op_optab)
53800dbe 5414{
5415 rtx op0;
c2f47e15 5416
5417 if (!validate_arglist (exp, INTEGER_TYPE, VOID_TYPE))
5418 return NULL_RTX;
53800dbe 5419
5420 /* Compute the argument. */
f97eea22 5421 op0 = expand_expr (CALL_EXPR_ARG (exp, 0),
5422 (subtarget
5423 && (TYPE_MODE (TREE_TYPE (CALL_EXPR_ARG (exp, 0)))
5424 == GET_MODE (subtarget))) ? subtarget : NULL_RTX,
1db6d067 5425 VOIDmode, EXPAND_NORMAL);
6a08d0ab 5426 /* Compute op, into TARGET if possible.
53800dbe 5427 Set TARGET to wherever the result comes back. */
c2f47e15 5428 target = expand_unop (TYPE_MODE (TREE_TYPE (CALL_EXPR_ARG (exp, 0))),
6aaa1f9e 5429 op_optab, op0, target, op_optab != clrsb_optab);
64db345d 5430 gcc_assert (target);
7d3f6cc7 5431
efb070c8 5432 return convert_to_mode (target_mode, target, 0);
53800dbe 5433}
89cfe6e5 5434
48e1416a 5435/* Expand a call to __builtin_expect. We just return our argument
5a74f77e 5436 as the builtin_expect semantic should've been already executed by
5437 tree branch prediction pass. */
89cfe6e5 5438
5439static rtx
c2f47e15 5440expand_builtin_expect (tree exp, rtx target)
89cfe6e5 5441{
1e4adcfc 5442 tree arg;
89cfe6e5 5443
c2f47e15 5444 if (call_expr_nargs (exp) < 2)
89cfe6e5 5445 return const0_rtx;
c2f47e15 5446 arg = CALL_EXPR_ARG (exp, 0);
89cfe6e5 5447
c2f47e15 5448 target = expand_expr (arg, target, VOIDmode, EXPAND_NORMAL);
5a74f77e 5449 /* When guessing was done, the hints should be already stripped away. */
07311427 5450 gcc_assert (!flag_guess_branch_prob
852f689e 5451 || optimize == 0 || seen_error ());
89cfe6e5 5452 return target;
5453}
689df48e 5454
01107f42 5455/* Expand a call to __builtin_expect_with_probability. We just return our
5456 argument as the builtin_expect semantic should've been already executed by
5457 tree branch prediction pass. */
5458
5459static rtx
5460expand_builtin_expect_with_probability (tree exp, rtx target)
5461{
5462 tree arg;
5463
5464 if (call_expr_nargs (exp) < 3)
5465 return const0_rtx;
5466 arg = CALL_EXPR_ARG (exp, 0);
5467
5468 target = expand_expr (arg, target, VOIDmode, EXPAND_NORMAL);
5469 /* When guessing was done, the hints should be already stripped away. */
5470 gcc_assert (!flag_guess_branch_prob
5471 || optimize == 0 || seen_error ());
5472 return target;
5473}
5474
5475
fca0886c 5476/* Expand a call to __builtin_assume_aligned. We just return our first
5477 argument as the builtin_assume_aligned semantic should've been already
5478 executed by CCP. */
5479
5480static rtx
5481expand_builtin_assume_aligned (tree exp, rtx target)
5482{
5483 if (call_expr_nargs (exp) < 2)
5484 return const0_rtx;
5485 target = expand_expr (CALL_EXPR_ARG (exp, 0), target, VOIDmode,
5486 EXPAND_NORMAL);
5487 gcc_assert (!TREE_SIDE_EFFECTS (CALL_EXPR_ARG (exp, 1))
5488 && (call_expr_nargs (exp) < 3
5489 || !TREE_SIDE_EFFECTS (CALL_EXPR_ARG (exp, 2))));
5490 return target;
5491}
5492
c22de3f0 5493void
aecda0d6 5494expand_builtin_trap (void)
a0ef1725 5495{
4db8dd0c 5496 if (targetm.have_trap ())
f73960eb 5497 {
4db8dd0c 5498 rtx_insn *insn = emit_insn (targetm.gen_trap ());
f73960eb 5499 /* For trap insns when not accumulating outgoing args force
5500 REG_ARGS_SIZE note to prevent crossjumping of calls with
5501 different args sizes. */
5502 if (!ACCUMULATE_OUTGOING_ARGS)
f6a1fc98 5503 add_args_size_note (insn, stack_pointer_delta);
f73960eb 5504 }
a0ef1725 5505 else
61ffc71a 5506 {
5507 tree fn = builtin_decl_implicit (BUILT_IN_ABORT);
5508 tree call_expr = build_call_expr (fn, 0);
5509 expand_call (call_expr, NULL_RTX, false);
5510 }
5511
a0ef1725 5512 emit_barrier ();
5513}
78a74442 5514
d2b48f0c 5515/* Expand a call to __builtin_unreachable. We do nothing except emit
5516 a barrier saying that control flow will not pass here.
5517
5518 It is the responsibility of the program being compiled to ensure
5519 that control flow does never reach __builtin_unreachable. */
5520static void
5521expand_builtin_unreachable (void)
5522{
5523 emit_barrier ();
5524}
5525
c2f47e15 5526/* Expand EXP, a call to fabs, fabsf or fabsl.
5527 Return NULL_RTX if a normal call should be emitted rather than expanding
78a74442 5528 the function inline. If convenient, the result should be placed
5529 in TARGET. SUBTARGET may be used as the target for computing
5530 the operand. */
5531
5532static rtx
c2f47e15 5533expand_builtin_fabs (tree exp, rtx target, rtx subtarget)
78a74442 5534{
3754d046 5535 machine_mode mode;
78a74442 5536 tree arg;
5537 rtx op0;
5538
c2f47e15 5539 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
5540 return NULL_RTX;
78a74442 5541
c2f47e15 5542 arg = CALL_EXPR_ARG (exp, 0);
c7f617c2 5543 CALL_EXPR_ARG (exp, 0) = arg = builtin_save_expr (arg);
78a74442 5544 mode = TYPE_MODE (TREE_TYPE (arg));
1db6d067 5545 op0 = expand_expr (arg, subtarget, VOIDmode, EXPAND_NORMAL);
78a74442 5546 return expand_abs (mode, op0, target, 0, safe_from_p (target, arg, 1));
5547}
5548
c2f47e15 5549/* Expand EXP, a call to copysign, copysignf, or copysignl.
270436f3 5550 Return NULL is a normal call should be emitted rather than expanding the
5551 function inline. If convenient, the result should be placed in TARGET.
5552 SUBTARGET may be used as the target for computing the operand. */
5553
5554static rtx
c2f47e15 5555expand_builtin_copysign (tree exp, rtx target, rtx subtarget)
270436f3 5556{
5557 rtx op0, op1;
5558 tree arg;
5559
c2f47e15 5560 if (!validate_arglist (exp, REAL_TYPE, REAL_TYPE, VOID_TYPE))
5561 return NULL_RTX;
270436f3 5562
c2f47e15 5563 arg = CALL_EXPR_ARG (exp, 0);
8ec3c5c2 5564 op0 = expand_expr (arg, subtarget, VOIDmode, EXPAND_NORMAL);
270436f3 5565
c2f47e15 5566 arg = CALL_EXPR_ARG (exp, 1);
8ec3c5c2 5567 op1 = expand_normal (arg);
270436f3 5568
5569 return expand_copysign (op0, op1, target);
5570}
5571
ac8fb6db 5572/* Expand a call to __builtin___clear_cache. */
5573
5574static rtx
32e17df0 5575expand_builtin___clear_cache (tree exp)
ac8fb6db 5576{
32e17df0 5577 if (!targetm.code_for_clear_cache)
5578 {
ac8fb6db 5579#ifdef CLEAR_INSN_CACHE
32e17df0 5580 /* There is no "clear_cache" insn, and __clear_cache() in libgcc
5581 does something. Just do the default expansion to a call to
5582 __clear_cache(). */
5583 return NULL_RTX;
ac8fb6db 5584#else
32e17df0 5585 /* There is no "clear_cache" insn, and __clear_cache() in libgcc
5586 does nothing. There is no need to call it. Do nothing. */
5587 return const0_rtx;
ac8fb6db 5588#endif /* CLEAR_INSN_CACHE */
32e17df0 5589 }
5590
ac8fb6db 5591 /* We have a "clear_cache" insn, and it will handle everything. */
5592 tree begin, end;
5593 rtx begin_rtx, end_rtx;
ac8fb6db 5594
5595 /* We must not expand to a library call. If we did, any
5596 fallback library function in libgcc that might contain a call to
5597 __builtin___clear_cache() would recurse infinitely. */
5598 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
5599 {
5600 error ("both arguments to %<__builtin___clear_cache%> must be pointers");
5601 return const0_rtx;
5602 }
5603
32e17df0 5604 if (targetm.have_clear_cache ())
ac8fb6db 5605 {
8786db1e 5606 struct expand_operand ops[2];
ac8fb6db 5607
5608 begin = CALL_EXPR_ARG (exp, 0);
5609 begin_rtx = expand_expr (begin, NULL_RTX, Pmode, EXPAND_NORMAL);
ac8fb6db 5610
5611 end = CALL_EXPR_ARG (exp, 1);
5612 end_rtx = expand_expr (end, NULL_RTX, Pmode, EXPAND_NORMAL);
ac8fb6db 5613
8786db1e 5614 create_address_operand (&ops[0], begin_rtx);
5615 create_address_operand (&ops[1], end_rtx);
32e17df0 5616 if (maybe_expand_insn (targetm.code_for_clear_cache, 2, ops))
8786db1e 5617 return const0_rtx;
ac8fb6db 5618 }
5619 return const0_rtx;
ac8fb6db 5620}
5621
4ee9c684 5622/* Given a trampoline address, make sure it satisfies TRAMPOLINE_ALIGNMENT. */
5623
5624static rtx
5625round_trampoline_addr (rtx tramp)
5626{
5627 rtx temp, addend, mask;
5628
5629 /* If we don't need too much alignment, we'll have been guaranteed
5630 proper alignment by get_trampoline_type. */
5631 if (TRAMPOLINE_ALIGNMENT <= STACK_BOUNDARY)
5632 return tramp;
5633
5634 /* Round address up to desired boundary. */
5635 temp = gen_reg_rtx (Pmode);
0359f9f5 5636 addend = gen_int_mode (TRAMPOLINE_ALIGNMENT / BITS_PER_UNIT - 1, Pmode);
5637 mask = gen_int_mode (-TRAMPOLINE_ALIGNMENT / BITS_PER_UNIT, Pmode);
4ee9c684 5638
5639 temp = expand_simple_binop (Pmode, PLUS, tramp, addend,
5640 temp, 0, OPTAB_LIB_WIDEN);
5641 tramp = expand_simple_binop (Pmode, AND, temp, mask,
5642 temp, 0, OPTAB_LIB_WIDEN);
5643
5644 return tramp;
5645}
5646
5647static rtx
c307f106 5648expand_builtin_init_trampoline (tree exp, bool onstack)
4ee9c684 5649{
5650 tree t_tramp, t_func, t_chain;
82c7907c 5651 rtx m_tramp, r_tramp, r_chain, tmp;
4ee9c684 5652
c2f47e15 5653 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE,
4ee9c684 5654 POINTER_TYPE, VOID_TYPE))
5655 return NULL_RTX;
5656
c2f47e15 5657 t_tramp = CALL_EXPR_ARG (exp, 0);
5658 t_func = CALL_EXPR_ARG (exp, 1);
5659 t_chain = CALL_EXPR_ARG (exp, 2);
4ee9c684 5660
8ec3c5c2 5661 r_tramp = expand_normal (t_tramp);
82c7907c 5662 m_tramp = gen_rtx_MEM (BLKmode, r_tramp);
5663 MEM_NOTRAP_P (m_tramp) = 1;
5664
c307f106 5665 /* If ONSTACK, the TRAMP argument should be the address of a field
5666 within the local function's FRAME decl. Either way, let's see if
5667 we can fill in the MEM_ATTRs for this memory. */
82c7907c 5668 if (TREE_CODE (t_tramp) == ADDR_EXPR)
f4146cb8 5669 set_mem_attributes (m_tramp, TREE_OPERAND (t_tramp, 0), true);
82c7907c 5670
c307f106 5671 /* Creator of a heap trampoline is responsible for making sure the
5672 address is aligned to at least STACK_BOUNDARY. Normally malloc
5673 will ensure this anyhow. */
82c7907c 5674 tmp = round_trampoline_addr (r_tramp);
5675 if (tmp != r_tramp)
5676 {
5677 m_tramp = change_address (m_tramp, BLKmode, tmp);
5678 set_mem_align (m_tramp, TRAMPOLINE_ALIGNMENT);
5b2a69fa 5679 set_mem_size (m_tramp, TRAMPOLINE_SIZE);
82c7907c 5680 }
5681
5682 /* The FUNC argument should be the address of the nested function.
5683 Extract the actual function decl to pass to the hook. */
5684 gcc_assert (TREE_CODE (t_func) == ADDR_EXPR);
5685 t_func = TREE_OPERAND (t_func, 0);
5686 gcc_assert (TREE_CODE (t_func) == FUNCTION_DECL);
5687
8ec3c5c2 5688 r_chain = expand_normal (t_chain);
4ee9c684 5689
5690 /* Generate insns to initialize the trampoline. */
82c7907c 5691 targetm.calls.trampoline_init (m_tramp, t_func, r_chain);
4ee9c684 5692
c307f106 5693 if (onstack)
5694 {
5695 trampolines_created = 1;
8bc8a8f4 5696
a27e3913 5697 if (targetm.calls.custom_function_descriptors != 0)
5698 warning_at (DECL_SOURCE_LOCATION (t_func), OPT_Wtrampolines,
5699 "trampoline generated for nested function %qD", t_func);
c307f106 5700 }
8bc8a8f4 5701
4ee9c684 5702 return const0_rtx;
5703}
5704
5705static rtx
c2f47e15 5706expand_builtin_adjust_trampoline (tree exp)
4ee9c684 5707{
5708 rtx tramp;
5709
c2f47e15 5710 if (!validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
4ee9c684 5711 return NULL_RTX;
5712
c2f47e15 5713 tramp = expand_normal (CALL_EXPR_ARG (exp, 0));
4ee9c684 5714 tramp = round_trampoline_addr (tramp);
82c7907c 5715 if (targetm.calls.trampoline_adjust_address)
5716 tramp = targetm.calls.trampoline_adjust_address (tramp);
4ee9c684 5717
5718 return tramp;
5719}
5720
a27e3913 5721/* Expand a call to the builtin descriptor initialization routine.
5722 A descriptor is made up of a couple of pointers to the static
5723 chain and the code entry in this order. */
5724
5725static rtx
5726expand_builtin_init_descriptor (tree exp)
5727{
5728 tree t_descr, t_func, t_chain;
5729 rtx m_descr, r_descr, r_func, r_chain;
5730
5731 if (!validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, POINTER_TYPE,
5732 VOID_TYPE))
5733 return NULL_RTX;
5734
5735 t_descr = CALL_EXPR_ARG (exp, 0);
5736 t_func = CALL_EXPR_ARG (exp, 1);
5737 t_chain = CALL_EXPR_ARG (exp, 2);
5738
5739 r_descr = expand_normal (t_descr);
5740 m_descr = gen_rtx_MEM (BLKmode, r_descr);
5741 MEM_NOTRAP_P (m_descr) = 1;
5742
5743 r_func = expand_normal (t_func);
5744 r_chain = expand_normal (t_chain);
5745
5746 /* Generate insns to initialize the descriptor. */
5747 emit_move_insn (adjust_address_nv (m_descr, ptr_mode, 0), r_chain);
5748 emit_move_insn (adjust_address_nv (m_descr, ptr_mode,
5749 POINTER_SIZE / BITS_PER_UNIT), r_func);
5750
5751 return const0_rtx;
5752}
5753
5754/* Expand a call to the builtin descriptor adjustment routine. */
5755
5756static rtx
5757expand_builtin_adjust_descriptor (tree exp)
5758{
5759 rtx tramp;
5760
5761 if (!validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
5762 return NULL_RTX;
5763
5764 tramp = expand_normal (CALL_EXPR_ARG (exp, 0));
5765
5766 /* Unalign the descriptor to allow runtime identification. */
5767 tramp = plus_constant (ptr_mode, tramp,
5768 targetm.calls.custom_function_descriptors);
5769
5770 return force_operand (tramp, NULL_RTX);
5771}
5772
93f564d6 5773/* Expand the call EXP to the built-in signbit, signbitf or signbitl
5774 function. The function first checks whether the back end provides
5775 an insn to implement signbit for the respective mode. If not, it
5776 checks whether the floating point format of the value is such that
10902624 5777 the sign bit can be extracted. If that is not the case, error out.
5778 EXP is the expression that is a call to the builtin function; if
5779 convenient, the result should be placed in TARGET. */
27f261ef 5780static rtx
5781expand_builtin_signbit (tree exp, rtx target)
5782{
5783 const struct real_format *fmt;
299dd9fa 5784 scalar_float_mode fmode;
f77c4496 5785 scalar_int_mode rmode, imode;
c2f47e15 5786 tree arg;
ca4f1f5b 5787 int word, bitpos;
27eda240 5788 enum insn_code icode;
27f261ef 5789 rtx temp;
389dd41b 5790 location_t loc = EXPR_LOCATION (exp);
27f261ef 5791
c2f47e15 5792 if (!validate_arglist (exp, REAL_TYPE, VOID_TYPE))
5793 return NULL_RTX;
27f261ef 5794
c2f47e15 5795 arg = CALL_EXPR_ARG (exp, 0);
299dd9fa 5796 fmode = SCALAR_FLOAT_TYPE_MODE (TREE_TYPE (arg));
03b7a719 5797 rmode = SCALAR_INT_TYPE_MODE (TREE_TYPE (exp));
27f261ef 5798 fmt = REAL_MODE_FORMAT (fmode);
5799
93f564d6 5800 arg = builtin_save_expr (arg);
5801
5802 /* Expand the argument yielding a RTX expression. */
5803 temp = expand_normal (arg);
5804
5805 /* Check if the back end provides an insn that handles signbit for the
5806 argument's mode. */
d6bf3b14 5807 icode = optab_handler (signbit_optab, fmode);
27eda240 5808 if (icode != CODE_FOR_nothing)
93f564d6 5809 {
1e0c0b35 5810 rtx_insn *last = get_last_insn ();
93f564d6 5811 target = gen_reg_rtx (TYPE_MODE (TREE_TYPE (exp)));
4e2a2fb4 5812 if (maybe_emit_unop_insn (icode, target, temp, UNKNOWN))
5813 return target;
5814 delete_insns_since (last);
93f564d6 5815 }
5816
27f261ef 5817 /* For floating point formats without a sign bit, implement signbit
5818 as "ARG < 0.0". */
8d564692 5819 bitpos = fmt->signbit_ro;
ca4f1f5b 5820 if (bitpos < 0)
27f261ef 5821 {
5822 /* But we can't do this if the format supports signed zero. */
10902624 5823 gcc_assert (!fmt->has_signed_zero || !HONOR_SIGNED_ZEROS (fmode));
27f261ef 5824
389dd41b 5825 arg = fold_build2_loc (loc, LT_EXPR, TREE_TYPE (exp), arg,
49d00087 5826 build_real (TREE_TYPE (arg), dconst0));
27f261ef 5827 return expand_expr (arg, target, VOIDmode, EXPAND_NORMAL);
5828 }
5829
ca4f1f5b 5830 if (GET_MODE_SIZE (fmode) <= UNITS_PER_WORD)
27f261ef 5831 {
2cf1bb25 5832 imode = int_mode_for_mode (fmode).require ();
ca4f1f5b 5833 temp = gen_lowpart (imode, temp);
24fd4260 5834 }
5835 else
5836 {
ca4f1f5b 5837 imode = word_mode;
5838 /* Handle targets with different FP word orders. */
5839 if (FLOAT_WORDS_BIG_ENDIAN)
a0c938f0 5840 word = (GET_MODE_BITSIZE (fmode) - bitpos) / BITS_PER_WORD;
ca4f1f5b 5841 else
a0c938f0 5842 word = bitpos / BITS_PER_WORD;
ca4f1f5b 5843 temp = operand_subword_force (temp, word, fmode);
5844 bitpos = bitpos % BITS_PER_WORD;
5845 }
5846
44b0f1d0 5847 /* Force the intermediate word_mode (or narrower) result into a
5848 register. This avoids attempting to create paradoxical SUBREGs
5849 of floating point modes below. */
5850 temp = force_reg (imode, temp);
5851
ca4f1f5b 5852 /* If the bitpos is within the "result mode" lowpart, the operation
5853 can be implement with a single bitwise AND. Otherwise, we need
5854 a right shift and an AND. */
5855
5856 if (bitpos < GET_MODE_BITSIZE (rmode))
5857 {
796b6678 5858 wide_int mask = wi::set_bit_in_zero (bitpos, GET_MODE_PRECISION (rmode));
27f261ef 5859
4a46f016 5860 if (GET_MODE_SIZE (imode) > GET_MODE_SIZE (rmode))
ca4f1f5b 5861 temp = gen_lowpart (rmode, temp);
24fd4260 5862 temp = expand_binop (rmode, and_optab, temp,
e913b5cd 5863 immed_wide_int_const (mask, rmode),
ca4f1f5b 5864 NULL_RTX, 1, OPTAB_LIB_WIDEN);
27f261ef 5865 }
ca4f1f5b 5866 else
5867 {
5868 /* Perform a logical right shift to place the signbit in the least
a0c938f0 5869 significant bit, then truncate the result to the desired mode
ca4f1f5b 5870 and mask just this bit. */
f5ff0b21 5871 temp = expand_shift (RSHIFT_EXPR, imode, temp, bitpos, NULL_RTX, 1);
ca4f1f5b 5872 temp = gen_lowpart (rmode, temp);
5873 temp = expand_binop (rmode, and_optab, temp, const1_rtx,
5874 NULL_RTX, 1, OPTAB_LIB_WIDEN);
5875 }
5876
27f261ef 5877 return temp;
5878}
73673831 5879
5880/* Expand fork or exec calls. TARGET is the desired target of the
c2f47e15 5881 call. EXP is the call. FN is the
73673831 5882 identificator of the actual function. IGNORE is nonzero if the
5883 value is to be ignored. */
5884
5885static rtx
c2f47e15 5886expand_builtin_fork_or_exec (tree fn, tree exp, rtx target, int ignore)
73673831 5887{
5888 tree id, decl;
5889 tree call;
5890
5891 /* If we are not profiling, just call the function. */
5892 if (!profile_arc_flag)
5893 return NULL_RTX;
5894
5895 /* Otherwise call the wrapper. This should be equivalent for the rest of
5896 compiler, so the code does not diverge, and the wrapper may run the
9c9bad97 5897 code necessary for keeping the profiling sane. */
73673831 5898
5899 switch (DECL_FUNCTION_CODE (fn))
5900 {
5901 case BUILT_IN_FORK:
5902 id = get_identifier ("__gcov_fork");
5903 break;
5904
5905 case BUILT_IN_EXECL:
5906 id = get_identifier ("__gcov_execl");
5907 break;
5908
5909 case BUILT_IN_EXECV:
5910 id = get_identifier ("__gcov_execv");
5911 break;
5912
5913 case BUILT_IN_EXECLP:
5914 id = get_identifier ("__gcov_execlp");
5915 break;
5916
5917 case BUILT_IN_EXECLE:
5918 id = get_identifier ("__gcov_execle");
5919 break;
5920
5921 case BUILT_IN_EXECVP:
5922 id = get_identifier ("__gcov_execvp");
5923 break;
5924
5925 case BUILT_IN_EXECVE:
5926 id = get_identifier ("__gcov_execve");
5927 break;
5928
5929 default:
64db345d 5930 gcc_unreachable ();
73673831 5931 }
5932
e60a6f7b 5933 decl = build_decl (DECL_SOURCE_LOCATION (fn),
5934 FUNCTION_DECL, id, TREE_TYPE (fn));
73673831 5935 DECL_EXTERNAL (decl) = 1;
5936 TREE_PUBLIC (decl) = 1;
5937 DECL_ARTIFICIAL (decl) = 1;
5938 TREE_NOTHROW (decl) = 1;
e82d310b 5939 DECL_VISIBILITY (decl) = VISIBILITY_DEFAULT;
5940 DECL_VISIBILITY_SPECIFIED (decl) = 1;
389dd41b 5941 call = rewrite_call_expr (EXPR_LOCATION (exp), exp, 0, decl, 0);
73673831 5942 return expand_call (call, target, ignore);
c2f47e15 5943 }
48e1416a 5944
b6a5fc45 5945
5946\f
3e272de8 5947/* Reconstitute a mode for a __sync intrinsic operation. Since the type of
5948 the pointer in these functions is void*, the tree optimizers may remove
5949 casts. The mode computed in expand_builtin isn't reliable either, due
5950 to __sync_bool_compare_and_swap.
5951
5952 FCODE_DIFF should be fcode - base, where base is the FOO_1 code for the
5953 group of builtins. This gives us log2 of the mode size. */
5954
3754d046 5955static inline machine_mode
3e272de8 5956get_builtin_sync_mode (int fcode_diff)
5957{
ad3a13b5 5958 /* The size is not negotiable, so ask not to get BLKmode in return
5959 if the target indicates that a smaller size would be better. */
517be012 5960 return int_mode_for_size (BITS_PER_UNIT << fcode_diff, 0).require ();
3e272de8 5961}
5962
041e0215 5963/* Expand the memory expression LOC and return the appropriate memory operand
5964 for the builtin_sync operations. */
5965
5966static rtx
3754d046 5967get_builtin_sync_mem (tree loc, machine_mode mode)
041e0215 5968{
5969 rtx addr, mem;
fcbc2234 5970 int addr_space = TYPE_ADDR_SPACE (POINTER_TYPE_P (TREE_TYPE (loc))
5971 ? TREE_TYPE (TREE_TYPE (loc))
5972 : TREE_TYPE (loc));
5973 scalar_int_mode addr_mode = targetm.addr_space.address_mode (addr_space);
041e0215 5974
fcbc2234 5975 addr = expand_expr (loc, NULL_RTX, addr_mode, EXPAND_SUM);
ed825d83 5976 addr = convert_memory_address (addr_mode, addr);
041e0215 5977
5978 /* Note that we explicitly do not want any alias information for this
5979 memory, so that we kill all other live memories. Otherwise we don't
5980 satisfy the full barrier semantics of the intrinsic. */
fcbc2234 5981 mem = gen_rtx_MEM (mode, addr);
5982
5983 set_mem_addr_space (mem, addr_space);
5984
5985 mem = validize_mem (mem);
041e0215 5986
153c3b50 5987 /* The alignment needs to be at least according to that of the mode. */
5988 set_mem_align (mem, MAX (GET_MODE_ALIGNMENT (mode),
957d0361 5989 get_pointer_alignment (loc)));
c94cfd1c 5990 set_mem_alias_set (mem, ALIAS_SET_MEMORY_BARRIER);
041e0215 5991 MEM_VOLATILE_P (mem) = 1;
5992
5993 return mem;
5994}
5995
1cd6e20d 5996/* Make sure an argument is in the right mode.
5997 EXP is the tree argument.
5998 MODE is the mode it should be in. */
5999
6000static rtx
3754d046 6001expand_expr_force_mode (tree exp, machine_mode mode)
1cd6e20d 6002{
6003 rtx val;
3754d046 6004 machine_mode old_mode;
1cd6e20d 6005
6006 val = expand_expr (exp, NULL_RTX, mode, EXPAND_NORMAL);
6007 /* If VAL is promoted to a wider mode, convert it back to MODE. Take care
6008 of CONST_INTs, where we know the old_mode only from the call argument. */
6009
6010 old_mode = GET_MODE (val);
6011 if (old_mode == VOIDmode)
6012 old_mode = TYPE_MODE (TREE_TYPE (exp));
6013 val = convert_modes (mode, old_mode, val, 1);
6014 return val;
6015}
6016
6017
b6a5fc45 6018/* Expand the __sync_xxx_and_fetch and __sync_fetch_and_xxx intrinsics.
c2f47e15 6019 EXP is the CALL_EXPR. CODE is the rtx code
b6a5fc45 6020 that corresponds to the arithmetic or logical operation from the name;
6021 an exception here is that NOT actually means NAND. TARGET is an optional
6022 place for us to store the results; AFTER is true if this is the
1cd6e20d 6023 fetch_and_xxx form. */
b6a5fc45 6024
6025static rtx
3754d046 6026expand_builtin_sync_operation (machine_mode mode, tree exp,
3e272de8 6027 enum rtx_code code, bool after,
1cd6e20d 6028 rtx target)
b6a5fc45 6029{
041e0215 6030 rtx val, mem;
e60a6f7b 6031 location_t loc = EXPR_LOCATION (exp);
b6a5fc45 6032
cf73e559 6033 if (code == NOT && warn_sync_nand)
6034 {
6035 tree fndecl = get_callee_fndecl (exp);
6036 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
6037
6038 static bool warned_f_a_n, warned_n_a_f;
6039
6040 switch (fcode)
6041 {
2797f13a 6042 case BUILT_IN_SYNC_FETCH_AND_NAND_1:
6043 case BUILT_IN_SYNC_FETCH_AND_NAND_2:
6044 case BUILT_IN_SYNC_FETCH_AND_NAND_4:
6045 case BUILT_IN_SYNC_FETCH_AND_NAND_8:
6046 case BUILT_IN_SYNC_FETCH_AND_NAND_16:
cf73e559 6047 if (warned_f_a_n)
6048 break;
6049
b9a16870 6050 fndecl = builtin_decl_implicit (BUILT_IN_SYNC_FETCH_AND_NAND_N);
e60a6f7b 6051 inform (loc, "%qD changed semantics in GCC 4.4", fndecl);
cf73e559 6052 warned_f_a_n = true;
6053 break;
6054
2797f13a 6055 case BUILT_IN_SYNC_NAND_AND_FETCH_1:
6056 case BUILT_IN_SYNC_NAND_AND_FETCH_2:
6057 case BUILT_IN_SYNC_NAND_AND_FETCH_4:
6058 case BUILT_IN_SYNC_NAND_AND_FETCH_8:
6059 case BUILT_IN_SYNC_NAND_AND_FETCH_16:
cf73e559 6060 if (warned_n_a_f)
6061 break;
6062
b9a16870 6063 fndecl = builtin_decl_implicit (BUILT_IN_SYNC_NAND_AND_FETCH_N);
e60a6f7b 6064 inform (loc, "%qD changed semantics in GCC 4.4", fndecl);
cf73e559 6065 warned_n_a_f = true;
6066 break;
6067
6068 default:
6069 gcc_unreachable ();
6070 }
6071 }
6072
b6a5fc45 6073 /* Expand the operands. */
c2f47e15 6074 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
1cd6e20d 6075 val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 1), mode);
b6a5fc45 6076
a372f7ca 6077 return expand_atomic_fetch_op (target, mem, val, code, MEMMODEL_SYNC_SEQ_CST,
1cd6e20d 6078 after);
b6a5fc45 6079}
6080
6081/* Expand the __sync_val_compare_and_swap and __sync_bool_compare_and_swap
c2f47e15 6082 intrinsics. EXP is the CALL_EXPR. IS_BOOL is
b6a5fc45 6083 true if this is the boolean form. TARGET is a place for us to store the
6084 results; this is NOT optional if IS_BOOL is true. */
6085
6086static rtx
3754d046 6087expand_builtin_compare_and_swap (machine_mode mode, tree exp,
3e272de8 6088 bool is_bool, rtx target)
b6a5fc45 6089{
041e0215 6090 rtx old_val, new_val, mem;
ba885f6a 6091 rtx *pbool, *poval;
b6a5fc45 6092
6093 /* Expand the operands. */
c2f47e15 6094 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
1cd6e20d 6095 old_val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 1), mode);
6096 new_val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 2), mode);
b6a5fc45 6097
ba885f6a 6098 pbool = poval = NULL;
6099 if (target != const0_rtx)
6100 {
6101 if (is_bool)
6102 pbool = &target;
6103 else
6104 poval = &target;
6105 }
6106 if (!expand_atomic_compare_and_swap (pbool, poval, mem, old_val, new_val,
a372f7ca 6107 false, MEMMODEL_SYNC_SEQ_CST,
6108 MEMMODEL_SYNC_SEQ_CST))
1cd6e20d 6109 return NULL_RTX;
c2f47e15 6110
1cd6e20d 6111 return target;
b6a5fc45 6112}
6113
6114/* Expand the __sync_lock_test_and_set intrinsic. Note that the most
6115 general form is actually an atomic exchange, and some targets only
6116 support a reduced form with the second argument being a constant 1.
48e1416a 6117 EXP is the CALL_EXPR; TARGET is an optional place for us to store
c2f47e15 6118 the results. */
b6a5fc45 6119
6120static rtx
3754d046 6121expand_builtin_sync_lock_test_and_set (machine_mode mode, tree exp,
1cd6e20d 6122 rtx target)
b6a5fc45 6123{
041e0215 6124 rtx val, mem;
b6a5fc45 6125
6126 /* Expand the operands. */
c2f47e15 6127 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
1cd6e20d 6128 val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 1), mode);
6129
7821cde1 6130 return expand_sync_lock_test_and_set (target, mem, val);
1cd6e20d 6131}
6132
6133/* Expand the __sync_lock_release intrinsic. EXP is the CALL_EXPR. */
6134
6135static void
3754d046 6136expand_builtin_sync_lock_release (machine_mode mode, tree exp)
1cd6e20d 6137{
6138 rtx mem;
6139
6140 /* Expand the operands. */
6141 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6142
a372f7ca 6143 expand_atomic_store (mem, const0_rtx, MEMMODEL_SYNC_RELEASE, true);
1cd6e20d 6144}
6145
6146/* Given an integer representing an ``enum memmodel'', verify its
6147 correctness and return the memory model enum. */
6148
6149static enum memmodel
6150get_memmodel (tree exp)
6151{
6152 rtx op;
7f738025 6153 unsigned HOST_WIDE_INT val;
2cb724f9 6154 source_location loc
6155 = expansion_point_location_if_in_system_header (input_location);
1cd6e20d 6156
6157 /* If the parameter is not a constant, it's a run time value so we'll just
6158 convert it to MEMMODEL_SEQ_CST to avoid annoying runtime checking. */
6159 if (TREE_CODE (exp) != INTEGER_CST)
6160 return MEMMODEL_SEQ_CST;
6161
6162 op = expand_normal (exp);
7f738025 6163
6164 val = INTVAL (op);
6165 if (targetm.memmodel_check)
6166 val = targetm.memmodel_check (val);
6167 else if (val & ~MEMMODEL_MASK)
6168 {
2cb724f9 6169 warning_at (loc, OPT_Winvalid_memory_model,
6170 "unknown architecture specifier in memory model to builtin");
7f738025 6171 return MEMMODEL_SEQ_CST;
6172 }
6173
a372f7ca 6174 /* Should never see a user explicit SYNC memodel model, so >= LAST works. */
6175 if (memmodel_base (val) >= MEMMODEL_LAST)
1cd6e20d 6176 {
2cb724f9 6177 warning_at (loc, OPT_Winvalid_memory_model,
6178 "invalid memory model argument to builtin");
1cd6e20d 6179 return MEMMODEL_SEQ_CST;
6180 }
7f738025 6181
3070f133 6182 /* Workaround for Bugzilla 59448. GCC doesn't track consume properly, so
6183 be conservative and promote consume to acquire. */
6184 if (val == MEMMODEL_CONSUME)
6185 val = MEMMODEL_ACQUIRE;
6186
7f738025 6187 return (enum memmodel) val;
1cd6e20d 6188}
6189
6190/* Expand the __atomic_exchange intrinsic:
6191 TYPE __atomic_exchange (TYPE *object, TYPE desired, enum memmodel)
6192 EXP is the CALL_EXPR.
6193 TARGET is an optional place for us to store the results. */
6194
6195static rtx
3754d046 6196expand_builtin_atomic_exchange (machine_mode mode, tree exp, rtx target)
1cd6e20d 6197{
6198 rtx val, mem;
6199 enum memmodel model;
6200
6201 model = get_memmodel (CALL_EXPR_ARG (exp, 2));
1cd6e20d 6202
6203 if (!flag_inline_atomics)
6204 return NULL_RTX;
6205
6206 /* Expand the operands. */
6207 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6208 val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 1), mode);
6209
7821cde1 6210 return expand_atomic_exchange (target, mem, val, model);
1cd6e20d 6211}
6212
6213/* Expand the __atomic_compare_exchange intrinsic:
6214 bool __atomic_compare_exchange (TYPE *object, TYPE *expect,
6215 TYPE desired, BOOL weak,
6216 enum memmodel success,
6217 enum memmodel failure)
6218 EXP is the CALL_EXPR.
6219 TARGET is an optional place for us to store the results. */
6220
6221static rtx
3754d046 6222expand_builtin_atomic_compare_exchange (machine_mode mode, tree exp,
1cd6e20d 6223 rtx target)
6224{
1e0c0b35 6225 rtx expect, desired, mem, oldval;
6226 rtx_code_label *label;
1cd6e20d 6227 enum memmodel success, failure;
6228 tree weak;
6229 bool is_weak;
2cb724f9 6230 source_location loc
6231 = expansion_point_location_if_in_system_header (input_location);
1cd6e20d 6232
6233 success = get_memmodel (CALL_EXPR_ARG (exp, 4));
6234 failure = get_memmodel (CALL_EXPR_ARG (exp, 5));
6235
086f4e33 6236 if (failure > success)
6237 {
2cb724f9 6238 warning_at (loc, OPT_Winvalid_memory_model,
6239 "failure memory model cannot be stronger than success "
6240 "memory model for %<__atomic_compare_exchange%>");
086f4e33 6241 success = MEMMODEL_SEQ_CST;
6242 }
6243
a372f7ca 6244 if (is_mm_release (failure) || is_mm_acq_rel (failure))
1cd6e20d 6245 {
2cb724f9 6246 warning_at (loc, OPT_Winvalid_memory_model,
6247 "invalid failure memory model for "
6248 "%<__atomic_compare_exchange%>");
086f4e33 6249 failure = MEMMODEL_SEQ_CST;
6250 success = MEMMODEL_SEQ_CST;
1cd6e20d 6251 }
6252
086f4e33 6253
1cd6e20d 6254 if (!flag_inline_atomics)
6255 return NULL_RTX;
6256
6257 /* Expand the operands. */
6258 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6259
6260 expect = expand_normal (CALL_EXPR_ARG (exp, 1));
6261 expect = convert_memory_address (Pmode, expect);
c401b131 6262 expect = gen_rtx_MEM (mode, expect);
1cd6e20d 6263 desired = expand_expr_force_mode (CALL_EXPR_ARG (exp, 2), mode);
6264
6265 weak = CALL_EXPR_ARG (exp, 3);
6266 is_weak = false;
e913b5cd 6267 if (tree_fits_shwi_p (weak) && tree_to_shwi (weak) != 0)
1cd6e20d 6268 is_weak = true;
6269
d86e3752 6270 if (target == const0_rtx)
6271 target = NULL;
d86e3752 6272
3c29a9ea 6273 /* Lest the rtl backend create a race condition with an imporoper store
6274 to memory, always create a new pseudo for OLDVAL. */
6275 oldval = NULL;
6276
6277 if (!expand_atomic_compare_and_swap (&target, &oldval, mem, expect, desired,
ba885f6a 6278 is_weak, success, failure))
1cd6e20d 6279 return NULL_RTX;
6280
d86e3752 6281 /* Conditionally store back to EXPECT, lest we create a race condition
6282 with an improper store to memory. */
6283 /* ??? With a rearrangement of atomics at the gimple level, we can handle
6284 the normal case where EXPECT is totally private, i.e. a register. At
6285 which point the store can be unconditional. */
6286 label = gen_label_rtx ();
62589f76 6287 emit_cmp_and_jump_insns (target, const0_rtx, NE, NULL,
6288 GET_MODE (target), 1, label);
d86e3752 6289 emit_move_insn (expect, oldval);
6290 emit_label (label);
c401b131 6291
1cd6e20d 6292 return target;
6293}
6294
5a5ef659 6295/* Helper function for expand_ifn_atomic_compare_exchange - expand
6296 internal ATOMIC_COMPARE_EXCHANGE call into __atomic_compare_exchange_N
6297 call. The weak parameter must be dropped to match the expected parameter
6298 list and the expected argument changed from value to pointer to memory
6299 slot. */
6300
6301static void
6302expand_ifn_atomic_compare_exchange_into_call (gcall *call, machine_mode mode)
6303{
6304 unsigned int z;
6305 vec<tree, va_gc> *vec;
6306
6307 vec_alloc (vec, 5);
6308 vec->quick_push (gimple_call_arg (call, 0));
6309 tree expected = gimple_call_arg (call, 1);
6310 rtx x = assign_stack_temp_for_type (mode, GET_MODE_SIZE (mode),
6311 TREE_TYPE (expected));
6312 rtx expd = expand_expr (expected, x, mode, EXPAND_NORMAL);
6313 if (expd != x)
6314 emit_move_insn (x, expd);
6315 tree v = make_tree (TREE_TYPE (expected), x);
6316 vec->quick_push (build1 (ADDR_EXPR,
6317 build_pointer_type (TREE_TYPE (expected)), v));
6318 vec->quick_push (gimple_call_arg (call, 2));
6319 /* Skip the boolean weak parameter. */
6320 for (z = 4; z < 6; z++)
6321 vec->quick_push (gimple_call_arg (call, z));
5eaf31bb 6322 /* At present we only have BUILT_IN_ATOMIC_COMPARE_EXCHANGE_{1,2,4,8,16}. */
52acb7ae 6323 unsigned int bytes_log2 = exact_log2 (GET_MODE_SIZE (mode).to_constant ());
5eaf31bb 6324 gcc_assert (bytes_log2 < 5);
5a5ef659 6325 built_in_function fncode
6326 = (built_in_function) ((int) BUILT_IN_ATOMIC_COMPARE_EXCHANGE_1
5eaf31bb 6327 + bytes_log2);
5a5ef659 6328 tree fndecl = builtin_decl_explicit (fncode);
6329 tree fn = build1 (ADDR_EXPR, build_pointer_type (TREE_TYPE (fndecl)),
6330 fndecl);
6331 tree exp = build_call_vec (boolean_type_node, fn, vec);
6332 tree lhs = gimple_call_lhs (call);
6333 rtx boolret = expand_call (exp, NULL_RTX, lhs == NULL_TREE);
6334 if (lhs)
6335 {
6336 rtx target = expand_expr (lhs, NULL_RTX, VOIDmode, EXPAND_WRITE);
6337 if (GET_MODE (boolret) != mode)
6338 boolret = convert_modes (mode, GET_MODE (boolret), boolret, 1);
6339 x = force_reg (mode, x);
6340 write_complex_part (target, boolret, true);
6341 write_complex_part (target, x, false);
6342 }
6343}
6344
6345/* Expand IFN_ATOMIC_COMPARE_EXCHANGE internal function. */
6346
6347void
6348expand_ifn_atomic_compare_exchange (gcall *call)
6349{
6350 int size = tree_to_shwi (gimple_call_arg (call, 3)) & 255;
6351 gcc_assert (size == 1 || size == 2 || size == 4 || size == 8 || size == 16);
517be012 6352 machine_mode mode = int_mode_for_size (BITS_PER_UNIT * size, 0).require ();
5a5ef659 6353 rtx expect, desired, mem, oldval, boolret;
6354 enum memmodel success, failure;
6355 tree lhs;
6356 bool is_weak;
6357 source_location loc
6358 = expansion_point_location_if_in_system_header (gimple_location (call));
6359
6360 success = get_memmodel (gimple_call_arg (call, 4));
6361 failure = get_memmodel (gimple_call_arg (call, 5));
6362
6363 if (failure > success)
6364 {
6365 warning_at (loc, OPT_Winvalid_memory_model,
6366 "failure memory model cannot be stronger than success "
6367 "memory model for %<__atomic_compare_exchange%>");
6368 success = MEMMODEL_SEQ_CST;
6369 }
6370
6371 if (is_mm_release (failure) || is_mm_acq_rel (failure))
6372 {
6373 warning_at (loc, OPT_Winvalid_memory_model,
6374 "invalid failure memory model for "
6375 "%<__atomic_compare_exchange%>");
6376 failure = MEMMODEL_SEQ_CST;
6377 success = MEMMODEL_SEQ_CST;
6378 }
6379
6380 if (!flag_inline_atomics)
6381 {
6382 expand_ifn_atomic_compare_exchange_into_call (call, mode);
6383 return;
6384 }
6385
6386 /* Expand the operands. */
6387 mem = get_builtin_sync_mem (gimple_call_arg (call, 0), mode);
6388
6389 expect = expand_expr_force_mode (gimple_call_arg (call, 1), mode);
6390 desired = expand_expr_force_mode (gimple_call_arg (call, 2), mode);
6391
6392 is_weak = (tree_to_shwi (gimple_call_arg (call, 3)) & 256) != 0;
6393
6394 boolret = NULL;
6395 oldval = NULL;
6396
6397 if (!expand_atomic_compare_and_swap (&boolret, &oldval, mem, expect, desired,
6398 is_weak, success, failure))
6399 {
6400 expand_ifn_atomic_compare_exchange_into_call (call, mode);
6401 return;
6402 }
6403
6404 lhs = gimple_call_lhs (call);
6405 if (lhs)
6406 {
6407 rtx target = expand_expr (lhs, NULL_RTX, VOIDmode, EXPAND_WRITE);
6408 if (GET_MODE (boolret) != mode)
6409 boolret = convert_modes (mode, GET_MODE (boolret), boolret, 1);
6410 write_complex_part (target, boolret, true);
6411 write_complex_part (target, oldval, false);
6412 }
6413}
6414
1cd6e20d 6415/* Expand the __atomic_load intrinsic:
6416 TYPE __atomic_load (TYPE *object, enum memmodel)
6417 EXP is the CALL_EXPR.
6418 TARGET is an optional place for us to store the results. */
6419
6420static rtx
3754d046 6421expand_builtin_atomic_load (machine_mode mode, tree exp, rtx target)
1cd6e20d 6422{
6423 rtx mem;
6424 enum memmodel model;
6425
6426 model = get_memmodel (CALL_EXPR_ARG (exp, 1));
a372f7ca 6427 if (is_mm_release (model) || is_mm_acq_rel (model))
1cd6e20d 6428 {
2cb724f9 6429 source_location loc
6430 = expansion_point_location_if_in_system_header (input_location);
6431 warning_at (loc, OPT_Winvalid_memory_model,
6432 "invalid memory model for %<__atomic_load%>");
086f4e33 6433 model = MEMMODEL_SEQ_CST;
1cd6e20d 6434 }
6435
6436 if (!flag_inline_atomics)
6437 return NULL_RTX;
6438
6439 /* Expand the operand. */
6440 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6441
6442 return expand_atomic_load (target, mem, model);
6443}
6444
6445
6446/* Expand the __atomic_store intrinsic:
6447 void __atomic_store (TYPE *object, TYPE desired, enum memmodel)
6448 EXP is the CALL_EXPR.
6449 TARGET is an optional place for us to store the results. */
6450
6451static rtx
3754d046 6452expand_builtin_atomic_store (machine_mode mode, tree exp)
1cd6e20d 6453{
6454 rtx mem, val;
6455 enum memmodel model;
6456
6457 model = get_memmodel (CALL_EXPR_ARG (exp, 2));
a372f7ca 6458 if (!(is_mm_relaxed (model) || is_mm_seq_cst (model)
6459 || is_mm_release (model)))
1cd6e20d 6460 {
2cb724f9 6461 source_location loc
6462 = expansion_point_location_if_in_system_header (input_location);
6463 warning_at (loc, OPT_Winvalid_memory_model,
6464 "invalid memory model for %<__atomic_store%>");
086f4e33 6465 model = MEMMODEL_SEQ_CST;
1cd6e20d 6466 }
6467
6468 if (!flag_inline_atomics)
6469 return NULL_RTX;
6470
6471 /* Expand the operands. */
6472 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6473 val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 1), mode);
6474
8808bf16 6475 return expand_atomic_store (mem, val, model, false);
1cd6e20d 6476}
6477
6478/* Expand the __atomic_fetch_XXX intrinsic:
6479 TYPE __atomic_fetch_XXX (TYPE *object, TYPE val, enum memmodel)
6480 EXP is the CALL_EXPR.
6481 TARGET is an optional place for us to store the results.
6482 CODE is the operation, PLUS, MINUS, ADD, XOR, or IOR.
6483 FETCH_AFTER is true if returning the result of the operation.
6484 FETCH_AFTER is false if returning the value before the operation.
6485 IGNORE is true if the result is not used.
6486 EXT_CALL is the correct builtin for an external call if this cannot be
6487 resolved to an instruction sequence. */
6488
6489static rtx
3754d046 6490expand_builtin_atomic_fetch_op (machine_mode mode, tree exp, rtx target,
1cd6e20d 6491 enum rtx_code code, bool fetch_after,
6492 bool ignore, enum built_in_function ext_call)
6493{
6494 rtx val, mem, ret;
6495 enum memmodel model;
6496 tree fndecl;
6497 tree addr;
6498
6499 model = get_memmodel (CALL_EXPR_ARG (exp, 2));
6500
6501 /* Expand the operands. */
6502 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6503 val = expand_expr_force_mode (CALL_EXPR_ARG (exp, 1), mode);
6504
6505 /* Only try generating instructions if inlining is turned on. */
6506 if (flag_inline_atomics)
6507 {
6508 ret = expand_atomic_fetch_op (target, mem, val, code, model, fetch_after);
6509 if (ret)
6510 return ret;
6511 }
6512
6513 /* Return if a different routine isn't needed for the library call. */
6514 if (ext_call == BUILT_IN_NONE)
6515 return NULL_RTX;
6516
6517 /* Change the call to the specified function. */
6518 fndecl = get_callee_fndecl (exp);
6519 addr = CALL_EXPR_FN (exp);
6520 STRIP_NOPS (addr);
6521
6522 gcc_assert (TREE_OPERAND (addr, 0) == fndecl);
9af5ce0c 6523 TREE_OPERAND (addr, 0) = builtin_decl_explicit (ext_call);
1cd6e20d 6524
a2f95d97 6525 /* If we will emit code after the call, the call can not be a tail call.
6526 If it is emitted as a tail call, a barrier is emitted after it, and
6527 then all trailing code is removed. */
6528 if (!ignore)
6529 CALL_EXPR_TAILCALL (exp) = 0;
6530
1cd6e20d 6531 /* Expand the call here so we can emit trailing code. */
6532 ret = expand_call (exp, target, ignore);
6533
6534 /* Replace the original function just in case it matters. */
6535 TREE_OPERAND (addr, 0) = fndecl;
6536
6537 /* Then issue the arithmetic correction to return the right result. */
6538 if (!ignore)
c449f851 6539 {
6540 if (code == NOT)
6541 {
6542 ret = expand_simple_binop (mode, AND, ret, val, NULL_RTX, true,
6543 OPTAB_LIB_WIDEN);
6544 ret = expand_simple_unop (mode, NOT, ret, target, true);
6545 }
6546 else
6547 ret = expand_simple_binop (mode, code, ret, val, target, true,
6548 OPTAB_LIB_WIDEN);
6549 }
1cd6e20d 6550 return ret;
6551}
6552
9c1a31e4 6553/* Expand IFN_ATOMIC_BIT_TEST_AND_* internal function. */
6554
6555void
6556expand_ifn_atomic_bit_test_and (gcall *call)
6557{
6558 tree ptr = gimple_call_arg (call, 0);
6559 tree bit = gimple_call_arg (call, 1);
6560 tree flag = gimple_call_arg (call, 2);
6561 tree lhs = gimple_call_lhs (call);
6562 enum memmodel model = MEMMODEL_SYNC_SEQ_CST;
6563 machine_mode mode = TYPE_MODE (TREE_TYPE (flag));
6564 enum rtx_code code;
6565 optab optab;
6566 struct expand_operand ops[5];
6567
6568 gcc_assert (flag_inline_atomics);
6569
6570 if (gimple_call_num_args (call) == 4)
6571 model = get_memmodel (gimple_call_arg (call, 3));
6572
6573 rtx mem = get_builtin_sync_mem (ptr, mode);
6574 rtx val = expand_expr_force_mode (bit, mode);
6575
6576 switch (gimple_call_internal_fn (call))
6577 {
6578 case IFN_ATOMIC_BIT_TEST_AND_SET:
6579 code = IOR;
6580 optab = atomic_bit_test_and_set_optab;
6581 break;
6582 case IFN_ATOMIC_BIT_TEST_AND_COMPLEMENT:
6583 code = XOR;
6584 optab = atomic_bit_test_and_complement_optab;
6585 break;
6586 case IFN_ATOMIC_BIT_TEST_AND_RESET:
6587 code = AND;
6588 optab = atomic_bit_test_and_reset_optab;
6589 break;
6590 default:
6591 gcc_unreachable ();
6592 }
6593
6594 if (lhs == NULL_TREE)
6595 {
6596 val = expand_simple_binop (mode, ASHIFT, const1_rtx,
6597 val, NULL_RTX, true, OPTAB_DIRECT);
6598 if (code == AND)
6599 val = expand_simple_unop (mode, NOT, val, NULL_RTX, true);
6600 expand_atomic_fetch_op (const0_rtx, mem, val, code, model, false);
6601 return;
6602 }
6603
6604 rtx target = expand_expr (lhs, NULL_RTX, VOIDmode, EXPAND_WRITE);
6605 enum insn_code icode = direct_optab_handler (optab, mode);
6606 gcc_assert (icode != CODE_FOR_nothing);
6607 create_output_operand (&ops[0], target, mode);
6608 create_fixed_operand (&ops[1], mem);
6609 create_convert_operand_to (&ops[2], val, mode, true);
6610 create_integer_operand (&ops[3], model);
6611 create_integer_operand (&ops[4], integer_onep (flag));
6612 if (maybe_expand_insn (icode, 5, ops))
6613 return;
6614
6615 rtx bitval = val;
6616 val = expand_simple_binop (mode, ASHIFT, const1_rtx,
6617 val, NULL_RTX, true, OPTAB_DIRECT);
6618 rtx maskval = val;
6619 if (code == AND)
6620 val = expand_simple_unop (mode, NOT, val, NULL_RTX, true);
6621 rtx result = expand_atomic_fetch_op (gen_reg_rtx (mode), mem, val,
6622 code, model, false);
6623 if (integer_onep (flag))
6624 {
6625 result = expand_simple_binop (mode, ASHIFTRT, result, bitval,
6626 NULL_RTX, true, OPTAB_DIRECT);
6627 result = expand_simple_binop (mode, AND, result, const1_rtx, target,
6628 true, OPTAB_DIRECT);
6629 }
6630 else
6631 result = expand_simple_binop (mode, AND, result, maskval, target, true,
6632 OPTAB_DIRECT);
6633 if (result != target)
6634 emit_move_insn (target, result);
6635}
6636
10b744a3 6637/* Expand an atomic clear operation.
6638 void _atomic_clear (BOOL *obj, enum memmodel)
6639 EXP is the call expression. */
6640
6641static rtx
6642expand_builtin_atomic_clear (tree exp)
6643{
3754d046 6644 machine_mode mode;
10b744a3 6645 rtx mem, ret;
6646 enum memmodel model;
6647
517be012 6648 mode = int_mode_for_size (BOOL_TYPE_SIZE, 0).require ();
10b744a3 6649 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6650 model = get_memmodel (CALL_EXPR_ARG (exp, 1));
6651
a372f7ca 6652 if (is_mm_consume (model) || is_mm_acquire (model) || is_mm_acq_rel (model))
10b744a3 6653 {
2cb724f9 6654 source_location loc
6655 = expansion_point_location_if_in_system_header (input_location);
6656 warning_at (loc, OPT_Winvalid_memory_model,
6657 "invalid memory model for %<__atomic_store%>");
086f4e33 6658 model = MEMMODEL_SEQ_CST;
10b744a3 6659 }
6660
6661 /* Try issuing an __atomic_store, and allow fallback to __sync_lock_release.
6662 Failing that, a store is issued by __atomic_store. The only way this can
6663 fail is if the bool type is larger than a word size. Unlikely, but
6664 handle it anyway for completeness. Assume a single threaded model since
6665 there is no atomic support in this case, and no barriers are required. */
6666 ret = expand_atomic_store (mem, const0_rtx, model, true);
6667 if (!ret)
6668 emit_move_insn (mem, const0_rtx);
6669 return const0_rtx;
6670}
6671
6672/* Expand an atomic test_and_set operation.
6673 bool _atomic_test_and_set (BOOL *obj, enum memmodel)
6674 EXP is the call expression. */
6675
6676static rtx
7821cde1 6677expand_builtin_atomic_test_and_set (tree exp, rtx target)
10b744a3 6678{
7821cde1 6679 rtx mem;
10b744a3 6680 enum memmodel model;
3754d046 6681 machine_mode mode;
10b744a3 6682
517be012 6683 mode = int_mode_for_size (BOOL_TYPE_SIZE, 0).require ();
10b744a3 6684 mem = get_builtin_sync_mem (CALL_EXPR_ARG (exp, 0), mode);
6685 model = get_memmodel (CALL_EXPR_ARG (exp, 1));
6686
7821cde1 6687 return expand_atomic_test_and_set (target, mem, model);
10b744a3 6688}
6689
6690
1cd6e20d 6691/* Return true if (optional) argument ARG1 of size ARG0 is always lock free on
6692 this architecture. If ARG1 is NULL, use typical alignment for size ARG0. */
6693
6694static tree
6695fold_builtin_atomic_always_lock_free (tree arg0, tree arg1)
6696{
6697 int size;
3754d046 6698 machine_mode mode;
1cd6e20d 6699 unsigned int mode_align, type_align;
6700
6701 if (TREE_CODE (arg0) != INTEGER_CST)
6702 return NULL_TREE;
b6a5fc45 6703
517be012 6704 /* We need a corresponding integer mode for the access to be lock-free. */
1cd6e20d 6705 size = INTVAL (expand_normal (arg0)) * BITS_PER_UNIT;
517be012 6706 if (!int_mode_for_size (size, 0).exists (&mode))
6707 return boolean_false_node;
6708
1cd6e20d 6709 mode_align = GET_MODE_ALIGNMENT (mode);
6710
4ca99588 6711 if (TREE_CODE (arg1) == INTEGER_CST)
6712 {
6713 unsigned HOST_WIDE_INT val = UINTVAL (expand_normal (arg1));
6714
6715 /* Either this argument is null, or it's a fake pointer encoding
6716 the alignment of the object. */
ac29ece2 6717 val = least_bit_hwi (val);
4ca99588 6718 val *= BITS_PER_UNIT;
6719
6720 if (val == 0 || mode_align < val)
6721 type_align = mode_align;
6722 else
6723 type_align = val;
6724 }
1cd6e20d 6725 else
6726 {
6727 tree ttype = TREE_TYPE (arg1);
6728
6729 /* This function is usually invoked and folded immediately by the front
6730 end before anything else has a chance to look at it. The pointer
6731 parameter at this point is usually cast to a void *, so check for that
6732 and look past the cast. */
2f8a2ead 6733 if (CONVERT_EXPR_P (arg1)
6734 && POINTER_TYPE_P (ttype)
6735 && VOID_TYPE_P (TREE_TYPE (ttype))
6736 && POINTER_TYPE_P (TREE_TYPE (TREE_OPERAND (arg1, 0))))
1cd6e20d 6737 arg1 = TREE_OPERAND (arg1, 0);
6738
6739 ttype = TREE_TYPE (arg1);
6740 gcc_assert (POINTER_TYPE_P (ttype));
6741
6742 /* Get the underlying type of the object. */
6743 ttype = TREE_TYPE (ttype);
6744 type_align = TYPE_ALIGN (ttype);
6745 }
6746
47ae02b7 6747 /* If the object has smaller alignment, the lock free routines cannot
1cd6e20d 6748 be used. */
6749 if (type_align < mode_align)
06308d2a 6750 return boolean_false_node;
1cd6e20d 6751
6752 /* Check if a compare_and_swap pattern exists for the mode which represents
6753 the required size. The pattern is not allowed to fail, so the existence
d5f5fa27 6754 of the pattern indicates support is present. Also require that an
6755 atomic load exists for the required size. */
6756 if (can_compare_and_swap_p (mode, true) && can_atomic_load_p (mode))
06308d2a 6757 return boolean_true_node;
1cd6e20d 6758 else
06308d2a 6759 return boolean_false_node;
1cd6e20d 6760}
6761
6762/* Return true if the parameters to call EXP represent an object which will
6763 always generate lock free instructions. The first argument represents the
6764 size of the object, and the second parameter is a pointer to the object
6765 itself. If NULL is passed for the object, then the result is based on
6766 typical alignment for an object of the specified size. Otherwise return
6767 false. */
6768
6769static rtx
6770expand_builtin_atomic_always_lock_free (tree exp)
6771{
6772 tree size;
6773 tree arg0 = CALL_EXPR_ARG (exp, 0);
6774 tree arg1 = CALL_EXPR_ARG (exp, 1);
6775
6776 if (TREE_CODE (arg0) != INTEGER_CST)
6777 {
6778 error ("non-constant argument 1 to __atomic_always_lock_free");
6779 return const0_rtx;
6780 }
6781
6782 size = fold_builtin_atomic_always_lock_free (arg0, arg1);
06308d2a 6783 if (size == boolean_true_node)
1cd6e20d 6784 return const1_rtx;
6785 return const0_rtx;
6786}
6787
6788/* Return a one or zero if it can be determined that object ARG1 of size ARG
6789 is lock free on this architecture. */
6790
6791static tree
6792fold_builtin_atomic_is_lock_free (tree arg0, tree arg1)
6793{
6794 if (!flag_inline_atomics)
6795 return NULL_TREE;
6796
6797 /* If it isn't always lock free, don't generate a result. */
06308d2a 6798 if (fold_builtin_atomic_always_lock_free (arg0, arg1) == boolean_true_node)
6799 return boolean_true_node;
1cd6e20d 6800
6801 return NULL_TREE;
6802}
6803
6804/* Return true if the parameters to call EXP represent an object which will
6805 always generate lock free instructions. The first argument represents the
6806 size of the object, and the second parameter is a pointer to the object
6807 itself. If NULL is passed for the object, then the result is based on
6808 typical alignment for an object of the specified size. Otherwise return
6809 NULL*/
6810
6811static rtx
6812expand_builtin_atomic_is_lock_free (tree exp)
6813{
6814 tree size;
6815 tree arg0 = CALL_EXPR_ARG (exp, 0);
6816 tree arg1 = CALL_EXPR_ARG (exp, 1);
6817
6818 if (!INTEGRAL_TYPE_P (TREE_TYPE (arg0)))
6819 {
6820 error ("non-integer argument 1 to __atomic_is_lock_free");
6821 return NULL_RTX;
6822 }
6823
6824 if (!flag_inline_atomics)
6825 return NULL_RTX;
6826
6827 /* If the value is known at compile time, return the RTX for it. */
6828 size = fold_builtin_atomic_is_lock_free (arg0, arg1);
06308d2a 6829 if (size == boolean_true_node)
1cd6e20d 6830 return const1_rtx;
6831
6832 return NULL_RTX;
6833}
6834
1cd6e20d 6835/* Expand the __atomic_thread_fence intrinsic:
6836 void __atomic_thread_fence (enum memmodel)
6837 EXP is the CALL_EXPR. */
6838
6839static void
6840expand_builtin_atomic_thread_fence (tree exp)
6841{
fe54c06b 6842 enum memmodel model = get_memmodel (CALL_EXPR_ARG (exp, 0));
6843 expand_mem_thread_fence (model);
1cd6e20d 6844}
6845
6846/* Expand the __atomic_signal_fence intrinsic:
6847 void __atomic_signal_fence (enum memmodel)
6848 EXP is the CALL_EXPR. */
6849
6850static void
6851expand_builtin_atomic_signal_fence (tree exp)
6852{
fe54c06b 6853 enum memmodel model = get_memmodel (CALL_EXPR_ARG (exp, 0));
6854 expand_mem_signal_fence (model);
b6a5fc45 6855}
6856
6857/* Expand the __sync_synchronize intrinsic. */
6858
6859static void
2797f13a 6860expand_builtin_sync_synchronize (void)
b6a5fc45 6861{
a372f7ca 6862 expand_mem_thread_fence (MEMMODEL_SYNC_SEQ_CST);
b6a5fc45 6863}
6864
badaa04c 6865static rtx
6866expand_builtin_thread_pointer (tree exp, rtx target)
6867{
6868 enum insn_code icode;
6869 if (!validate_arglist (exp, VOID_TYPE))
6870 return const0_rtx;
6871 icode = direct_optab_handler (get_thread_pointer_optab, Pmode);
6872 if (icode != CODE_FOR_nothing)
6873 {
6874 struct expand_operand op;
3ed779c3 6875 /* If the target is not sutitable then create a new target. */
6876 if (target == NULL_RTX
6877 || !REG_P (target)
6878 || GET_MODE (target) != Pmode)
badaa04c 6879 target = gen_reg_rtx (Pmode);
6880 create_output_operand (&op, target, Pmode);
6881 expand_insn (icode, 1, &op);
6882 return target;
6883 }
6884 error ("__builtin_thread_pointer is not supported on this target");
6885 return const0_rtx;
6886}
6887
6888static void
6889expand_builtin_set_thread_pointer (tree exp)
6890{
6891 enum insn_code icode;
6892 if (!validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
6893 return;
6894 icode = direct_optab_handler (set_thread_pointer_optab, Pmode);
6895 if (icode != CODE_FOR_nothing)
6896 {
6897 struct expand_operand op;
6898 rtx val = expand_expr (CALL_EXPR_ARG (exp, 0), NULL_RTX,
6899 Pmode, EXPAND_NORMAL);
6f343c10 6900 create_input_operand (&op, val, Pmode);
badaa04c 6901 expand_insn (icode, 1, &op);
6902 return;
6903 }
6904 error ("__builtin_set_thread_pointer is not supported on this target");
6905}
6906
53800dbe 6907\f
0e80b01d 6908/* Emit code to restore the current value of stack. */
6909
6910static void
6911expand_stack_restore (tree var)
6912{
1e0c0b35 6913 rtx_insn *prev;
6914 rtx sa = expand_normal (var);
0e80b01d 6915
6916 sa = convert_memory_address (Pmode, sa);
6917
6918 prev = get_last_insn ();
6919 emit_stack_restore (SAVE_BLOCK, sa);
97354ae4 6920
6921 record_new_stack_level ();
6922
0e80b01d 6923 fixup_args_size_notes (prev, get_last_insn (), 0);
6924}
6925
0e80b01d 6926/* Emit code to save the current value of stack. */
6927
6928static rtx
6929expand_stack_save (void)
6930{
6931 rtx ret = NULL_RTX;
6932
0e80b01d 6933 emit_stack_save (SAVE_BLOCK, &ret);
6934 return ret;
6935}
6936
a7babc1e 6937/* Emit code to get the openacc gang, worker or vector id or size. */
6938
6939static rtx
6940expand_builtin_goacc_parlevel_id_size (tree exp, rtx target, int ignore)
6941{
6942 const char *name;
6943 rtx fallback_retval;
6944 rtx_insn *(*gen_fn) (rtx, rtx);
6945 switch (DECL_FUNCTION_CODE (get_callee_fndecl (exp)))
6946 {
6947 case BUILT_IN_GOACC_PARLEVEL_ID:
6948 name = "__builtin_goacc_parlevel_id";
6949 fallback_retval = const0_rtx;
6950 gen_fn = targetm.gen_oacc_dim_pos;
6951 break;
6952 case BUILT_IN_GOACC_PARLEVEL_SIZE:
6953 name = "__builtin_goacc_parlevel_size";
6954 fallback_retval = const1_rtx;
6955 gen_fn = targetm.gen_oacc_dim_size;
6956 break;
6957 default:
6958 gcc_unreachable ();
6959 }
6960
6961 if (oacc_get_fn_attrib (current_function_decl) == NULL_TREE)
6962 {
6963 error ("%qs only supported in OpenACC code", name);
6964 return const0_rtx;
6965 }
6966
6967 tree arg = CALL_EXPR_ARG (exp, 0);
6968 if (TREE_CODE (arg) != INTEGER_CST)
6969 {
6970 error ("non-constant argument 0 to %qs", name);
6971 return const0_rtx;
6972 }
6973
6974 int dim = TREE_INT_CST_LOW (arg);
6975 switch (dim)
6976 {
6977 case GOMP_DIM_GANG:
6978 case GOMP_DIM_WORKER:
6979 case GOMP_DIM_VECTOR:
6980 break;
6981 default:
6982 error ("illegal argument 0 to %qs", name);
6983 return const0_rtx;
6984 }
6985
6986 if (ignore)
6987 return target;
6988
2b895374 6989 if (target == NULL_RTX)
6990 target = gen_reg_rtx (TYPE_MODE (TREE_TYPE (exp)));
6991
a7babc1e 6992 if (!targetm.have_oacc_dim_size ())
6993 {
6994 emit_move_insn (target, fallback_retval);
6995 return target;
6996 }
6997
6998 rtx reg = MEM_P (target) ? gen_reg_rtx (GET_MODE (target)) : target;
6999 emit_insn (gen_fn (reg, GEN_INT (dim)));
7000 if (reg != target)
7001 emit_move_insn (target, reg);
7002
7003 return target;
7004}
ca4c3545 7005
b3e6ae76 7006/* Expand a string compare operation using a sequence of char comparison
a950155e 7007 to get rid of the calling overhead, with result going to TARGET if
7008 that's convenient.
7009
7010 VAR_STR is the variable string source;
7011 CONST_STR is the constant string source;
7012 LENGTH is the number of chars to compare;
7013 CONST_STR_N indicates which source string is the constant string;
7014 IS_MEMCMP indicates whether it's a memcmp or strcmp.
b3e6ae76 7015
a950155e 7016 to: (assume const_str_n is 2, i.e., arg2 is a constant string)
7017
0dbefa15 7018 target = (int) (unsigned char) var_str[0]
7019 - (int) (unsigned char) const_str[0];
a950155e 7020 if (target != 0)
7021 goto ne_label;
7022 ...
0dbefa15 7023 target = (int) (unsigned char) var_str[length - 2]
7024 - (int) (unsigned char) const_str[length - 2];
a950155e 7025 if (target != 0)
7026 goto ne_label;
0dbefa15 7027 target = (int) (unsigned char) var_str[length - 1]
7028 - (int) (unsigned char) const_str[length - 1];
a950155e 7029 ne_label:
7030 */
7031
7032static rtx
b3e6ae76 7033inline_string_cmp (rtx target, tree var_str, const char *const_str,
a950155e 7034 unsigned HOST_WIDE_INT length,
0dbefa15 7035 int const_str_n, machine_mode mode)
a950155e 7036{
7037 HOST_WIDE_INT offset = 0;
b3e6ae76 7038 rtx var_rtx_array
a950155e 7039 = get_memory_rtx (var_str, build_int_cst (unsigned_type_node,length));
7040 rtx var_rtx = NULL_RTX;
b3e6ae76 7041 rtx const_rtx = NULL_RTX;
7042 rtx result = target ? target : gen_reg_rtx (mode);
7043 rtx_code_label *ne_label = gen_label_rtx ();
0dbefa15 7044 tree unit_type_node = unsigned_char_type_node;
b3e6ae76 7045 scalar_int_mode unit_mode
7046 = as_a <scalar_int_mode> TYPE_MODE (unit_type_node);
a950155e 7047
7048 start_sequence ();
7049
7050 for (unsigned HOST_WIDE_INT i = 0; i < length; i++)
7051 {
b3e6ae76 7052 var_rtx
a950155e 7053 = adjust_address (var_rtx_array, TYPE_MODE (unit_type_node), offset);
b3e6ae76 7054 const_rtx = c_readstr (const_str + offset, unit_mode);
a950155e 7055 rtx op0 = (const_str_n == 1) ? const_rtx : var_rtx;
7056 rtx op1 = (const_str_n == 1) ? var_rtx : const_rtx;
b3e6ae76 7057
0dbefa15 7058 op0 = convert_modes (mode, unit_mode, op0, 1);
7059 op1 = convert_modes (mode, unit_mode, op1, 1);
b3e6ae76 7060 result = expand_simple_binop (mode, MINUS, op0, op1,
0dbefa15 7061 result, 1, OPTAB_WIDEN);
b3e6ae76 7062 if (i < length - 1)
7063 emit_cmp_and_jump_insns (result, CONST0_RTX (mode), NE, NULL_RTX,
7064 mode, true, ne_label);
7065 offset += GET_MODE_SIZE (unit_mode);
a950155e 7066 }
7067
7068 emit_label (ne_label);
7069 rtx_insn *insns = get_insns ();
7070 end_sequence ();
7071 emit_insn (insns);
7072
7073 return result;
7074}
7075
b3e6ae76 7076/* Inline expansion a call to str(n)cmp, with result going to
a950155e 7077 TARGET if that's convenient.
7078 If the call is not been inlined, return NULL_RTX. */
7079static rtx
0dbefa15 7080inline_expand_builtin_string_cmp (tree exp, rtx target)
a950155e 7081{
7082 tree fndecl = get_callee_fndecl (exp);
7083 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
7084 unsigned HOST_WIDE_INT length = 0;
7085 bool is_ncmp = (fcode == BUILT_IN_STRNCMP || fcode == BUILT_IN_MEMCMP);
7086
9c7661c8 7087 /* Do NOT apply this inlining expansion when optimizing for size or
7088 optimization level below 2. */
7089 if (optimize < 2 || optimize_insn_for_size_p ())
7090 return NULL_RTX;
7091
a950155e 7092 gcc_checking_assert (fcode == BUILT_IN_STRCMP
b3e6ae76 7093 || fcode == BUILT_IN_STRNCMP
a950155e 7094 || fcode == BUILT_IN_MEMCMP);
7095
0dbefa15 7096 /* On a target where the type of the call (int) has same or narrower presicion
7097 than unsigned char, give up the inlining expansion. */
7098 if (TYPE_PRECISION (unsigned_char_type_node)
7099 >= TYPE_PRECISION (TREE_TYPE (exp)))
7100 return NULL_RTX;
7101
a950155e 7102 tree arg1 = CALL_EXPR_ARG (exp, 0);
7103 tree arg2 = CALL_EXPR_ARG (exp, 1);
7104 tree len3_tree = is_ncmp ? CALL_EXPR_ARG (exp, 2) : NULL_TREE;
7105
7106 unsigned HOST_WIDE_INT len1 = 0;
7107 unsigned HOST_WIDE_INT len2 = 0;
7108 unsigned HOST_WIDE_INT len3 = 0;
7109
7110 const char *src_str1 = c_getstr (arg1, &len1);
7111 const char *src_str2 = c_getstr (arg2, &len2);
b3e6ae76 7112
a950155e 7113 /* If neither strings is constant string, the call is not qualify. */
7114 if (!src_str1 && !src_str2)
7115 return NULL_RTX;
7116
7117 /* For strncmp, if the length is not a const, not qualify. */
7118 if (is_ncmp && !tree_fits_uhwi_p (len3_tree))
7119 return NULL_RTX;
7120
7121 int const_str_n = 0;
7122 if (!len1)
7123 const_str_n = 2;
7124 else if (!len2)
7125 const_str_n = 1;
7126 else if (len2 > len1)
7127 const_str_n = 1;
7128 else
7129 const_str_n = 2;
7130
7131 gcc_checking_assert (const_str_n > 0);
7132 length = (const_str_n == 1) ? len1 : len2;
7133
7134 if (is_ncmp && (len3 = tree_to_uhwi (len3_tree)) < length)
7135 length = len3;
7136
b3e6ae76 7137 /* If the length of the comparision is larger than the threshold,
a950155e 7138 do nothing. */
b3e6ae76 7139 if (length > (unsigned HOST_WIDE_INT)
a950155e 7140 PARAM_VALUE (BUILTIN_STRING_CMP_INLINE_LENGTH))
7141 return NULL_RTX;
7142
7143 machine_mode mode = TYPE_MODE (TREE_TYPE (exp));
7144
7145 /* Now, start inline expansion the call. */
b3e6ae76 7146 return inline_string_cmp (target, (const_str_n == 1) ? arg2 : arg1,
a950155e 7147 (const_str_n == 1) ? src_str1 : src_str2, length,
0dbefa15 7148 const_str_n, mode);
a950155e 7149}
7150
123081ef 7151/* Expand a call to __builtin_speculation_safe_value_<N>. MODE
7152 represents the size of the first argument to that call, or VOIDmode
7153 if the argument is a pointer. IGNORE will be true if the result
7154 isn't used. */
7155static rtx
7156expand_speculation_safe_value (machine_mode mode, tree exp, rtx target,
7157 bool ignore)
7158{
7159 rtx val, failsafe;
7160 unsigned nargs = call_expr_nargs (exp);
7161
7162 tree arg0 = CALL_EXPR_ARG (exp, 0);
7163
7164 if (mode == VOIDmode)
7165 {
7166 mode = TYPE_MODE (TREE_TYPE (arg0));
7167 gcc_assert (GET_MODE_CLASS (mode) == MODE_INT);
7168 }
7169
7170 val = expand_expr (arg0, NULL_RTX, mode, EXPAND_NORMAL);
7171
7172 /* An optional second argument can be used as a failsafe value on
7173 some machines. If it isn't present, then the failsafe value is
7174 assumed to be 0. */
7175 if (nargs > 1)
7176 {
7177 tree arg1 = CALL_EXPR_ARG (exp, 1);
7178 failsafe = expand_expr (arg1, NULL_RTX, mode, EXPAND_NORMAL);
7179 }
7180 else
7181 failsafe = const0_rtx;
7182
7183 /* If the result isn't used, the behavior is undefined. It would be
7184 nice to emit a warning here, but path splitting means this might
7185 happen with legitimate code. So simply drop the builtin
7186 expansion in that case; we've handled any side-effects above. */
7187 if (ignore)
7188 return const0_rtx;
7189
7190 /* If we don't have a suitable target, create one to hold the result. */
7191 if (target == NULL || GET_MODE (target) != mode)
7192 target = gen_reg_rtx (mode);
7193
7194 if (GET_MODE (val) != mode && GET_MODE (val) != VOIDmode)
7195 val = convert_modes (mode, VOIDmode, val, false);
7196
7197 return targetm.speculation_safe_value (mode, target, val, failsafe);
7198}
7199
53800dbe 7200/* Expand an expression EXP that calls a built-in function,
7201 with result going to TARGET if that's convenient
7202 (and in mode MODE if that's convenient).
7203 SUBTARGET may be used as the target for computing one of EXP's operands.
7204 IGNORE is nonzero if the value is to be ignored. */
7205
7206rtx
3754d046 7207expand_builtin (tree exp, rtx target, rtx subtarget, machine_mode mode,
aecda0d6 7208 int ignore)
53800dbe 7209{
c6e6ecb1 7210 tree fndecl = get_callee_fndecl (exp);
53800dbe 7211 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
3754d046 7212 machine_mode target_mode = TYPE_MODE (TREE_TYPE (exp));
67fa4078 7213 int flags;
53800dbe 7214
4e2f4ed5 7215 if (DECL_BUILT_IN_CLASS (fndecl) == BUILT_IN_MD)
7216 return targetm.expand_builtin (exp, target, subtarget, mode, ignore);
7217
f9acf11a 7218 /* When ASan is enabled, we don't want to expand some memory/string
7219 builtins and rely on libsanitizer's hooks. This allows us to avoid
7220 redundant checks and be sure, that possible overflow will be detected
7221 by ASan. */
7222
7223 if ((flag_sanitize & SANITIZE_ADDRESS) && asan_intercepted_p (fcode))
7224 return expand_call (exp, target, ignore);
7225
53800dbe 7226 /* When not optimizing, generate calls to library functions for a certain
7227 set of builtins. */
cd9ff771 7228 if (!optimize
b6a5fc45 7229 && !called_as_built_in (fndecl)
73037a1e 7230 && fcode != BUILT_IN_FORK
7231 && fcode != BUILT_IN_EXECL
7232 && fcode != BUILT_IN_EXECV
7233 && fcode != BUILT_IN_EXECLP
7234 && fcode != BUILT_IN_EXECLE
7235 && fcode != BUILT_IN_EXECVP
7236 && fcode != BUILT_IN_EXECVE
2b34677f 7237 && !ALLOCA_FUNCTION_CODE_P (fcode)
1e42d5c6 7238 && fcode != BUILT_IN_FREE)
cd9ff771 7239 return expand_call (exp, target, ignore);
53800dbe 7240
8d6d7930 7241 /* The built-in function expanders test for target == const0_rtx
7242 to determine whether the function's result will be ignored. */
7243 if (ignore)
7244 target = const0_rtx;
7245
7246 /* If the result of a pure or const built-in function is ignored, and
7247 none of its arguments are volatile, we can avoid expanding the
7248 built-in call and just evaluate the arguments for side-effects. */
7249 if (target == const0_rtx
67fa4078 7250 && ((flags = flags_from_decl_or_type (fndecl)) & (ECF_CONST | ECF_PURE))
7251 && !(flags & ECF_LOOPING_CONST_OR_PURE))
8d6d7930 7252 {
7253 bool volatilep = false;
7254 tree arg;
c2f47e15 7255 call_expr_arg_iterator iter;
8d6d7930 7256
c2f47e15 7257 FOR_EACH_CALL_EXPR_ARG (arg, iter, exp)
7258 if (TREE_THIS_VOLATILE (arg))
8d6d7930 7259 {
7260 volatilep = true;
7261 break;
7262 }
7263
7264 if (! volatilep)
7265 {
c2f47e15 7266 FOR_EACH_CALL_EXPR_ARG (arg, iter, exp)
7267 expand_expr (arg, const0_rtx, VOIDmode, EXPAND_NORMAL);
8d6d7930 7268 return const0_rtx;
7269 }
7270 }
7271
53800dbe 7272 switch (fcode)
7273 {
4f35b1fc 7274 CASE_FLT_FN (BUILT_IN_FABS):
012f068a 7275 CASE_FLT_FN_FLOATN_NX (BUILT_IN_FABS):
8aa32773 7276 case BUILT_IN_FABSD32:
7277 case BUILT_IN_FABSD64:
7278 case BUILT_IN_FABSD128:
c2f47e15 7279 target = expand_builtin_fabs (exp, target, subtarget);
78a74442 7280 if (target)
a0c938f0 7281 return target;
78a74442 7282 break;
7283
4f35b1fc 7284 CASE_FLT_FN (BUILT_IN_COPYSIGN):
012f068a 7285 CASE_FLT_FN_FLOATN_NX (BUILT_IN_COPYSIGN):
c2f47e15 7286 target = expand_builtin_copysign (exp, target, subtarget);
270436f3 7287 if (target)
7288 return target;
7289 break;
7290
7d3f6cc7 7291 /* Just do a normal library call if we were unable to fold
7292 the values. */
4f35b1fc 7293 CASE_FLT_FN (BUILT_IN_CABS):
78a74442 7294 break;
53800dbe 7295
7e0713b1 7296 CASE_FLT_FN (BUILT_IN_FMA):
8c32188e 7297 CASE_FLT_FN_FLOATN_NX (BUILT_IN_FMA):
7e0713b1 7298 target = expand_builtin_mathfn_ternary (exp, target, subtarget);
7299 if (target)
7300 return target;
7301 break;
7302
a67a90e5 7303 CASE_FLT_FN (BUILT_IN_ILOGB):
7304 if (! flag_unsafe_math_optimizations)
7305 break;
12f08300 7306 gcc_fallthrough ();
7307 CASE_FLT_FN (BUILT_IN_ISINF):
7308 CASE_FLT_FN (BUILT_IN_FINITE):
7309 case BUILT_IN_ISFINITE:
7310 case BUILT_IN_ISNORMAL:
f97eea22 7311 target = expand_builtin_interclass_mathfn (exp, target);
a67a90e5 7312 if (target)
7313 return target;
7314 break;
7315
80ff6494 7316 CASE_FLT_FN (BUILT_IN_ICEIL):
4f35b1fc 7317 CASE_FLT_FN (BUILT_IN_LCEIL):
7318 CASE_FLT_FN (BUILT_IN_LLCEIL):
7319 CASE_FLT_FN (BUILT_IN_LFLOOR):
80ff6494 7320 CASE_FLT_FN (BUILT_IN_IFLOOR):
4f35b1fc 7321 CASE_FLT_FN (BUILT_IN_LLFLOOR):
ff1b14e4 7322 target = expand_builtin_int_roundingfn (exp, target);
ad52b9b7 7323 if (target)
7324 return target;
7325 break;
7326
80ff6494 7327 CASE_FLT_FN (BUILT_IN_IRINT):
7d3afc77 7328 CASE_FLT_FN (BUILT_IN_LRINT):
7329 CASE_FLT_FN (BUILT_IN_LLRINT):
80ff6494 7330 CASE_FLT_FN (BUILT_IN_IROUND):
ef2f1a10 7331 CASE_FLT_FN (BUILT_IN_LROUND):
7332 CASE_FLT_FN (BUILT_IN_LLROUND):
ff1b14e4 7333 target = expand_builtin_int_roundingfn_2 (exp, target);
7d3afc77 7334 if (target)
7335 return target;
7336 break;
7337
4f35b1fc 7338 CASE_FLT_FN (BUILT_IN_POWI):
f97eea22 7339 target = expand_builtin_powi (exp, target);
757c219d 7340 if (target)
7341 return target;
7342 break;
7343
d735c391 7344 CASE_FLT_FN (BUILT_IN_CEXPI):
f97eea22 7345 target = expand_builtin_cexpi (exp, target);
d735c391 7346 gcc_assert (target);
7347 return target;
7348
4f35b1fc 7349 CASE_FLT_FN (BUILT_IN_SIN):
7350 CASE_FLT_FN (BUILT_IN_COS):
6b43bae4 7351 if (! flag_unsafe_math_optimizations)
7352 break;
7353 target = expand_builtin_mathfn_3 (exp, target, subtarget);
7354 if (target)
7355 return target;
7356 break;
7357
c3147c1a 7358 CASE_FLT_FN (BUILT_IN_SINCOS):
7359 if (! flag_unsafe_math_optimizations)
7360 break;
7361 target = expand_builtin_sincos (exp);
7362 if (target)
7363 return target;
7364 break;
7365
53800dbe 7366 case BUILT_IN_APPLY_ARGS:
7367 return expand_builtin_apply_args ();
7368
7369 /* __builtin_apply (FUNCTION, ARGUMENTS, ARGSIZE) invokes
7370 FUNCTION with a copy of the parameters described by
7371 ARGUMENTS, and ARGSIZE. It returns a block of memory
7372 allocated on the stack into which is stored all the registers
7373 that might possibly be used for returning the result of a
7374 function. ARGUMENTS is the value returned by
7375 __builtin_apply_args. ARGSIZE is the number of bytes of
7376 arguments that must be copied. ??? How should this value be
7377 computed? We'll also need a safe worst case value for varargs
7378 functions. */
7379 case BUILT_IN_APPLY:
c2f47e15 7380 if (!validate_arglist (exp, POINTER_TYPE,
0eb671f7 7381 POINTER_TYPE, INTEGER_TYPE, VOID_TYPE)
c2f47e15 7382 && !validate_arglist (exp, REFERENCE_TYPE,
0eb671f7 7383 POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
53800dbe 7384 return const0_rtx;
7385 else
7386 {
53800dbe 7387 rtx ops[3];
7388
c2f47e15 7389 ops[0] = expand_normal (CALL_EXPR_ARG (exp, 0));
7390 ops[1] = expand_normal (CALL_EXPR_ARG (exp, 1));
7391 ops[2] = expand_normal (CALL_EXPR_ARG (exp, 2));
53800dbe 7392
7393 return expand_builtin_apply (ops[0], ops[1], ops[2]);
7394 }
7395
7396 /* __builtin_return (RESULT) causes the function to return the
7397 value described by RESULT. RESULT is address of the block of
7398 memory returned by __builtin_apply. */
7399 case BUILT_IN_RETURN:
c2f47e15 7400 if (validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
7401 expand_builtin_return (expand_normal (CALL_EXPR_ARG (exp, 0)));
53800dbe 7402 return const0_rtx;
7403
7404 case BUILT_IN_SAVEREGS:
a66c9326 7405 return expand_builtin_saveregs ();
53800dbe 7406
48dc2227 7407 case BUILT_IN_VA_ARG_PACK:
7408 /* All valid uses of __builtin_va_arg_pack () are removed during
7409 inlining. */
b8c23db3 7410 error ("%Kinvalid use of %<__builtin_va_arg_pack ()%>", exp);
48dc2227 7411 return const0_rtx;
7412
4e1d7ea4 7413 case BUILT_IN_VA_ARG_PACK_LEN:
7414 /* All valid uses of __builtin_va_arg_pack_len () are removed during
7415 inlining. */
b8c23db3 7416 error ("%Kinvalid use of %<__builtin_va_arg_pack_len ()%>", exp);
4e1d7ea4 7417 return const0_rtx;
7418
53800dbe 7419 /* Return the address of the first anonymous stack arg. */
7420 case BUILT_IN_NEXT_ARG:
c2f47e15 7421 if (fold_builtin_next_arg (exp, false))
a0c938f0 7422 return const0_rtx;
79012a9d 7423 return expand_builtin_next_arg ();
53800dbe 7424
ac8fb6db 7425 case BUILT_IN_CLEAR_CACHE:
7426 target = expand_builtin___clear_cache (exp);
7427 if (target)
7428 return target;
7429 break;
7430
53800dbe 7431 case BUILT_IN_CLASSIFY_TYPE:
c2f47e15 7432 return expand_builtin_classify_type (exp);
53800dbe 7433
7434 case BUILT_IN_CONSTANT_P:
4ee9c684 7435 return const0_rtx;
53800dbe 7436
7437 case BUILT_IN_FRAME_ADDRESS:
7438 case BUILT_IN_RETURN_ADDRESS:
c2f47e15 7439 return expand_builtin_frame_address (fndecl, exp);
53800dbe 7440
7441 /* Returns the address of the area where the structure is returned.
7442 0 otherwise. */
7443 case BUILT_IN_AGGREGATE_INCOMING_ADDRESS:
c2f47e15 7444 if (call_expr_nargs (exp) != 0
9342ee68 7445 || ! AGGREGATE_TYPE_P (TREE_TYPE (TREE_TYPE (current_function_decl)))
e16ceb8e 7446 || !MEM_P (DECL_RTL (DECL_RESULT (current_function_decl))))
9342ee68 7447 return const0_rtx;
53800dbe 7448 else
9342ee68 7449 return XEXP (DECL_RTL (DECL_RESULT (current_function_decl)), 0);
53800dbe 7450
2b34677f 7451 CASE_BUILT_IN_ALLOCA:
2b29cc6a 7452 target = expand_builtin_alloca (exp);
53800dbe 7453 if (target)
7454 return target;
7455 break;
7456
d08919a7 7457 case BUILT_IN_ASAN_ALLOCAS_UNPOISON:
7458 return expand_asan_emit_allocas_unpoison (exp);
7459
4ee9c684 7460 case BUILT_IN_STACK_SAVE:
7461 return expand_stack_save ();
7462
7463 case BUILT_IN_STACK_RESTORE:
c2f47e15 7464 expand_stack_restore (CALL_EXPR_ARG (exp, 0));
4ee9c684 7465 return const0_rtx;
7466
74bdbe96 7467 case BUILT_IN_BSWAP16:
42791117 7468 case BUILT_IN_BSWAP32:
7469 case BUILT_IN_BSWAP64:
74bdbe96 7470 target = expand_builtin_bswap (target_mode, exp, target, subtarget);
42791117 7471 if (target)
7472 return target;
7473 break;
7474
4f35b1fc 7475 CASE_INT_FN (BUILT_IN_FFS):
c2f47e15 7476 target = expand_builtin_unop (target_mode, exp, target,
efb070c8 7477 subtarget, ffs_optab);
6a08d0ab 7478 if (target)
7479 return target;
7480 break;
7481
4f35b1fc 7482 CASE_INT_FN (BUILT_IN_CLZ):
c2f47e15 7483 target = expand_builtin_unop (target_mode, exp, target,
efb070c8 7484 subtarget, clz_optab);
6a08d0ab 7485 if (target)
7486 return target;
7487 break;
7488
4f35b1fc 7489 CASE_INT_FN (BUILT_IN_CTZ):
c2f47e15 7490 target = expand_builtin_unop (target_mode, exp, target,
efb070c8 7491 subtarget, ctz_optab);
6a08d0ab 7492 if (target)
7493 return target;
7494 break;
7495
d8492bd3 7496 CASE_INT_FN (BUILT_IN_CLRSB):
d8492bd3 7497 target = expand_builtin_unop (target_mode, exp, target,
7498 subtarget, clrsb_optab);
7499 if (target)
7500 return target;
7501 break;
7502
4f35b1fc 7503 CASE_INT_FN (BUILT_IN_POPCOUNT):
c2f47e15 7504 target = expand_builtin_unop (target_mode, exp, target,
efb070c8 7505 subtarget, popcount_optab);
6a08d0ab 7506 if (target)
7507 return target;
7508 break;
7509
4f35b1fc 7510 CASE_INT_FN (BUILT_IN_PARITY):
c2f47e15 7511 target = expand_builtin_unop (target_mode, exp, target,
efb070c8 7512 subtarget, parity_optab);
53800dbe 7513 if (target)
7514 return target;
7515 break;
7516
7517 case BUILT_IN_STRLEN:
c2f47e15 7518 target = expand_builtin_strlen (exp, target, target_mode);
53800dbe 7519 if (target)
7520 return target;
7521 break;
7522
864bd5de 7523 case BUILT_IN_STRNLEN:
7524 target = expand_builtin_strnlen (exp, target, target_mode);
7525 if (target)
7526 return target;
7527 break;
7528
5aef8938 7529 case BUILT_IN_STRCAT:
7530 target = expand_builtin_strcat (exp, target);
7531 if (target)
7532 return target;
7533 break;
7534
53800dbe 7535 case BUILT_IN_STRCPY:
a65c4d64 7536 target = expand_builtin_strcpy (exp, target);
53800dbe 7537 if (target)
7538 return target;
7539 break;
bf8e3599 7540
5aef8938 7541 case BUILT_IN_STRNCAT:
7542 target = expand_builtin_strncat (exp, target);
7543 if (target)
7544 return target;
7545 break;
7546
ed09096d 7547 case BUILT_IN_STRNCPY:
a65c4d64 7548 target = expand_builtin_strncpy (exp, target);
ed09096d 7549 if (target)
7550 return target;
7551 break;
bf8e3599 7552
3b824fa6 7553 case BUILT_IN_STPCPY:
dc369150 7554 target = expand_builtin_stpcpy (exp, target, mode);
3b824fa6 7555 if (target)
7556 return target;
7557 break;
7558
4d317237 7559 case BUILT_IN_STPNCPY:
7560 target = expand_builtin_stpncpy (exp, target);
7561 if (target)
7562 return target;
7563 break;
7564
8d6c6ef5 7565 case BUILT_IN_MEMCHR:
7566 target = expand_builtin_memchr (exp, target);
7567 if (target)
7568 return target;
7569 break;
7570
53800dbe 7571 case BUILT_IN_MEMCPY:
a65c4d64 7572 target = expand_builtin_memcpy (exp, target);
3b824fa6 7573 if (target)
7574 return target;
7575 break;
7576
4d317237 7577 case BUILT_IN_MEMMOVE:
7578 target = expand_builtin_memmove (exp, target);
7579 if (target)
7580 return target;
7581 break;
7582
3b824fa6 7583 case BUILT_IN_MEMPCPY:
d0fbba1a 7584 target = expand_builtin_mempcpy (exp, target);
53800dbe 7585 if (target)
7586 return target;
7587 break;
7588
7589 case BUILT_IN_MEMSET:
c2f47e15 7590 target = expand_builtin_memset (exp, target, mode);
53800dbe 7591 if (target)
7592 return target;
7593 break;
7594
ffc83088 7595 case BUILT_IN_BZERO:
0b25db21 7596 target = expand_builtin_bzero (exp);
ffc83088 7597 if (target)
7598 return target;
7599 break;
7600
b3e6ae76 7601 /* Expand it as BUILT_IN_MEMCMP_EQ first. If not successful, change it
72dbc21d 7602 back to a BUILT_IN_STRCMP. Remember to delete the 3rd paramater
7603 when changing it to a strcmp call. */
7604 case BUILT_IN_STRCMP_EQ:
7605 target = expand_builtin_memcmp (exp, target, true);
7606 if (target)
7607 return target;
7608
7609 /* Change this call back to a BUILT_IN_STRCMP. */
b3e6ae76 7610 TREE_OPERAND (exp, 1)
72dbc21d 7611 = build_fold_addr_expr (builtin_decl_explicit (BUILT_IN_STRCMP));
7612
7613 /* Delete the last parameter. */
7614 unsigned int i;
7615 vec<tree, va_gc> *arg_vec;
7616 vec_alloc (arg_vec, 2);
7617 for (i = 0; i < 2; i++)
7618 arg_vec->quick_push (CALL_EXPR_ARG (exp, i));
7619 exp = build_call_vec (TREE_TYPE (exp), CALL_EXPR_FN (exp), arg_vec);
7620 /* FALLTHROUGH */
7621
53800dbe 7622 case BUILT_IN_STRCMP:
a65c4d64 7623 target = expand_builtin_strcmp (exp, target);
53800dbe 7624 if (target)
7625 return target;
7626 break;
7627
72dbc21d 7628 /* Expand it as BUILT_IN_MEMCMP_EQ first. If not successful, change it
7629 back to a BUILT_IN_STRNCMP. */
7630 case BUILT_IN_STRNCMP_EQ:
7631 target = expand_builtin_memcmp (exp, target, true);
7632 if (target)
7633 return target;
7634
7635 /* Change it back to a BUILT_IN_STRNCMP. */
b3e6ae76 7636 TREE_OPERAND (exp, 1)
72dbc21d 7637 = build_fold_addr_expr (builtin_decl_explicit (BUILT_IN_STRNCMP));
7638 /* FALLTHROUGH */
7639
ed09096d 7640 case BUILT_IN_STRNCMP:
7641 target = expand_builtin_strncmp (exp, target, mode);
7642 if (target)
7643 return target;
7644 break;
7645
071f1696 7646 case BUILT_IN_BCMP:
53800dbe 7647 case BUILT_IN_MEMCMP:
3e346f54 7648 case BUILT_IN_MEMCMP_EQ:
7649 target = expand_builtin_memcmp (exp, target, fcode == BUILT_IN_MEMCMP_EQ);
53800dbe 7650 if (target)
7651 return target;
3e346f54 7652 if (fcode == BUILT_IN_MEMCMP_EQ)
7653 {
7654 tree newdecl = builtin_decl_explicit (BUILT_IN_MEMCMP);
7655 TREE_OPERAND (exp, 1) = build_fold_addr_expr (newdecl);
7656 }
53800dbe 7657 break;
53800dbe 7658
7659 case BUILT_IN_SETJMP:
12f08300 7660 /* This should have been lowered to the builtins below. */
2c8a1497 7661 gcc_unreachable ();
7662
7663 case BUILT_IN_SETJMP_SETUP:
7664 /* __builtin_setjmp_setup is passed a pointer to an array of five words
7665 and the receiver label. */
c2f47e15 7666 if (validate_arglist (exp, POINTER_TYPE, POINTER_TYPE, VOID_TYPE))
2c8a1497 7667 {
c2f47e15 7668 rtx buf_addr = expand_expr (CALL_EXPR_ARG (exp, 0), subtarget,
2c8a1497 7669 VOIDmode, EXPAND_NORMAL);
c2f47e15 7670 tree label = TREE_OPERAND (CALL_EXPR_ARG (exp, 1), 0);
9ed997be 7671 rtx_insn *label_r = label_rtx (label);
2c8a1497 7672
7673 /* This is copied from the handling of non-local gotos. */
7674 expand_builtin_setjmp_setup (buf_addr, label_r);
7675 nonlocal_goto_handler_labels
a4de1c23 7676 = gen_rtx_INSN_LIST (VOIDmode, label_r,
2c8a1497 7677 nonlocal_goto_handler_labels);
7678 /* ??? Do not let expand_label treat us as such since we would
7679 not want to be both on the list of non-local labels and on
7680 the list of forced labels. */
7681 FORCED_LABEL (label) = 0;
7682 return const0_rtx;
7683 }
7684 break;
7685
2c8a1497 7686 case BUILT_IN_SETJMP_RECEIVER:
7687 /* __builtin_setjmp_receiver is passed the receiver label. */
c2f47e15 7688 if (validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
2c8a1497 7689 {
c2f47e15 7690 tree label = TREE_OPERAND (CALL_EXPR_ARG (exp, 0), 0);
9ed997be 7691 rtx_insn *label_r = label_rtx (label);
2c8a1497 7692
7693 expand_builtin_setjmp_receiver (label_r);
7694 return const0_rtx;
7695 }
6b7f6858 7696 break;
53800dbe 7697
7698 /* __builtin_longjmp is passed a pointer to an array of five words.
7699 It's similar to the C library longjmp function but works with
7700 __builtin_setjmp above. */
7701 case BUILT_IN_LONGJMP:
c2f47e15 7702 if (validate_arglist (exp, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
53800dbe 7703 {
c2f47e15 7704 rtx buf_addr = expand_expr (CALL_EXPR_ARG (exp, 0), subtarget,
8ec3c5c2 7705 VOIDmode, EXPAND_NORMAL);
c2f47e15 7706 rtx value = expand_normal (CALL_EXPR_ARG (exp, 1));
53800dbe 7707
7708 if (value != const1_rtx)
7709 {
1e5fcbe2 7710 error ("%<__builtin_longjmp%> second argument must be 1");
53800dbe 7711 return const0_rtx;
7712 }
7713
7714 expand_builtin_longjmp (buf_addr, value);
7715 return const0_rtx;
7716 }
2c8a1497 7717 break;
53800dbe 7718
4ee9c684 7719 case BUILT_IN_NONLOCAL_GOTO:
c2f47e15 7720 target = expand_builtin_nonlocal_goto (exp);
4ee9c684 7721 if (target)
7722 return target;
7723 break;
7724
843d08a9 7725 /* This updates the setjmp buffer that is its argument with the value
7726 of the current stack pointer. */
7727 case BUILT_IN_UPDATE_SETJMP_BUF:
c2f47e15 7728 if (validate_arglist (exp, POINTER_TYPE, VOID_TYPE))
843d08a9 7729 {
7730 rtx buf_addr
c2f47e15 7731 = expand_normal (CALL_EXPR_ARG (exp, 0));
843d08a9 7732
7733 expand_builtin_update_setjmp_buf (buf_addr);
7734 return const0_rtx;
7735 }
7736 break;
7737
53800dbe 7738 case BUILT_IN_TRAP:
a0ef1725 7739 expand_builtin_trap ();
53800dbe 7740 return const0_rtx;
7741
d2b48f0c 7742 case BUILT_IN_UNREACHABLE:
7743 expand_builtin_unreachable ();
7744 return const0_rtx;
7745
4f35b1fc 7746 CASE_FLT_FN (BUILT_IN_SIGNBIT):
004e23c4 7747 case BUILT_IN_SIGNBITD32:
7748 case BUILT_IN_SIGNBITD64:
7749 case BUILT_IN_SIGNBITD128:
27f261ef 7750 target = expand_builtin_signbit (exp, target);
7751 if (target)
7752 return target;
7753 break;
7754
53800dbe 7755 /* Various hooks for the DWARF 2 __throw routine. */
7756 case BUILT_IN_UNWIND_INIT:
7757 expand_builtin_unwind_init ();
7758 return const0_rtx;
7759 case BUILT_IN_DWARF_CFA:
7760 return virtual_cfa_rtx;
7761#ifdef DWARF2_UNWIND_INFO
f8f023a5 7762 case BUILT_IN_DWARF_SP_COLUMN:
7763 return expand_builtin_dwarf_sp_column ();
695e919b 7764 case BUILT_IN_INIT_DWARF_REG_SIZES:
c2f47e15 7765 expand_builtin_init_dwarf_reg_sizes (CALL_EXPR_ARG (exp, 0));
695e919b 7766 return const0_rtx;
53800dbe 7767#endif
7768 case BUILT_IN_FROB_RETURN_ADDR:
c2f47e15 7769 return expand_builtin_frob_return_addr (CALL_EXPR_ARG (exp, 0));
53800dbe 7770 case BUILT_IN_EXTRACT_RETURN_ADDR:
c2f47e15 7771 return expand_builtin_extract_return_addr (CALL_EXPR_ARG (exp, 0));
53800dbe 7772 case BUILT_IN_EH_RETURN:
c2f47e15 7773 expand_builtin_eh_return (CALL_EXPR_ARG (exp, 0),
7774 CALL_EXPR_ARG (exp, 1));
53800dbe 7775 return const0_rtx;
df4b504c 7776 case BUILT_IN_EH_RETURN_DATA_REGNO:
c2f47e15 7777 return expand_builtin_eh_return_data_regno (exp);
26093bf4 7778 case BUILT_IN_EXTEND_POINTER:
c2f47e15 7779 return expand_builtin_extend_pointer (CALL_EXPR_ARG (exp, 0));
e38def9c 7780 case BUILT_IN_EH_POINTER:
7781 return expand_builtin_eh_pointer (exp);
7782 case BUILT_IN_EH_FILTER:
7783 return expand_builtin_eh_filter (exp);
7784 case BUILT_IN_EH_COPY_VALUES:
7785 return expand_builtin_eh_copy_values (exp);
26093bf4 7786
7ccc713a 7787 case BUILT_IN_VA_START:
c2f47e15 7788 return expand_builtin_va_start (exp);
a66c9326 7789 case BUILT_IN_VA_END:
c2f47e15 7790 return expand_builtin_va_end (exp);
a66c9326 7791 case BUILT_IN_VA_COPY:
c2f47e15 7792 return expand_builtin_va_copy (exp);
89cfe6e5 7793 case BUILT_IN_EXPECT:
c2f47e15 7794 return expand_builtin_expect (exp, target);
01107f42 7795 case BUILT_IN_EXPECT_WITH_PROBABILITY:
7796 return expand_builtin_expect_with_probability (exp, target);
fca0886c 7797 case BUILT_IN_ASSUME_ALIGNED:
7798 return expand_builtin_assume_aligned (exp, target);
5e3608d8 7799 case BUILT_IN_PREFETCH:
c2f47e15 7800 expand_builtin_prefetch (exp);
5e3608d8 7801 return const0_rtx;
7802
4ee9c684 7803 case BUILT_IN_INIT_TRAMPOLINE:
c307f106 7804 return expand_builtin_init_trampoline (exp, true);
7805 case BUILT_IN_INIT_HEAP_TRAMPOLINE:
7806 return expand_builtin_init_trampoline (exp, false);
4ee9c684 7807 case BUILT_IN_ADJUST_TRAMPOLINE:
c2f47e15 7808 return expand_builtin_adjust_trampoline (exp);
4ee9c684 7809
a27e3913 7810 case BUILT_IN_INIT_DESCRIPTOR:
7811 return expand_builtin_init_descriptor (exp);
7812 case BUILT_IN_ADJUST_DESCRIPTOR:
7813 return expand_builtin_adjust_descriptor (exp);
7814
73673831 7815 case BUILT_IN_FORK:
7816 case BUILT_IN_EXECL:
7817 case BUILT_IN_EXECV:
7818 case BUILT_IN_EXECLP:
7819 case BUILT_IN_EXECLE:
7820 case BUILT_IN_EXECVP:
7821 case BUILT_IN_EXECVE:
c2f47e15 7822 target = expand_builtin_fork_or_exec (fndecl, exp, target, ignore);
73673831 7823 if (target)
7824 return target;
7825 break;
53800dbe 7826
2797f13a 7827 case BUILT_IN_SYNC_FETCH_AND_ADD_1:
7828 case BUILT_IN_SYNC_FETCH_AND_ADD_2:
7829 case BUILT_IN_SYNC_FETCH_AND_ADD_4:
7830 case BUILT_IN_SYNC_FETCH_AND_ADD_8:
7831 case BUILT_IN_SYNC_FETCH_AND_ADD_16:
7832 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_FETCH_AND_ADD_1);
1cd6e20d 7833 target = expand_builtin_sync_operation (mode, exp, PLUS, false, target);
b6a5fc45 7834 if (target)
7835 return target;
7836 break;
7837
2797f13a 7838 case BUILT_IN_SYNC_FETCH_AND_SUB_1:
7839 case BUILT_IN_SYNC_FETCH_AND_SUB_2:
7840 case BUILT_IN_SYNC_FETCH_AND_SUB_4:
7841 case BUILT_IN_SYNC_FETCH_AND_SUB_8:
7842 case BUILT_IN_SYNC_FETCH_AND_SUB_16:
7843 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_FETCH_AND_SUB_1);
1cd6e20d 7844 target = expand_builtin_sync_operation (mode, exp, MINUS, false, target);
b6a5fc45 7845 if (target)
7846 return target;
7847 break;
7848
2797f13a 7849 case BUILT_IN_SYNC_FETCH_AND_OR_1:
7850 case BUILT_IN_SYNC_FETCH_AND_OR_2:
7851 case BUILT_IN_SYNC_FETCH_AND_OR_4:
7852 case BUILT_IN_SYNC_FETCH_AND_OR_8:
7853 case BUILT_IN_SYNC_FETCH_AND_OR_16:
7854 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_FETCH_AND_OR_1);
1cd6e20d 7855 target = expand_builtin_sync_operation (mode, exp, IOR, false, target);
b6a5fc45 7856 if (target)
7857 return target;
7858 break;
7859
2797f13a 7860 case BUILT_IN_SYNC_FETCH_AND_AND_1:
7861 case BUILT_IN_SYNC_FETCH_AND_AND_2:
7862 case BUILT_IN_SYNC_FETCH_AND_AND_4:
7863 case BUILT_IN_SYNC_FETCH_AND_AND_8:
7864 case BUILT_IN_SYNC_FETCH_AND_AND_16:
7865 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_FETCH_AND_AND_1);
1cd6e20d 7866 target = expand_builtin_sync_operation (mode, exp, AND, false, target);
b6a5fc45 7867 if (target)
7868 return target;
7869 break;
7870
2797f13a 7871 case BUILT_IN_SYNC_FETCH_AND_XOR_1:
7872 case BUILT_IN_SYNC_FETCH_AND_XOR_2:
7873 case BUILT_IN_SYNC_FETCH_AND_XOR_4:
7874 case BUILT_IN_SYNC_FETCH_AND_XOR_8:
7875 case BUILT_IN_SYNC_FETCH_AND_XOR_16:
7876 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_FETCH_AND_XOR_1);
1cd6e20d 7877 target = expand_builtin_sync_operation (mode, exp, XOR, false, target);
b6a5fc45 7878 if (target)
7879 return target;
7880 break;
7881
2797f13a 7882 case BUILT_IN_SYNC_FETCH_AND_NAND_1:
7883 case BUILT_IN_SYNC_FETCH_AND_NAND_2:
7884 case BUILT_IN_SYNC_FETCH_AND_NAND_4:
7885 case BUILT_IN_SYNC_FETCH_AND_NAND_8:
7886 case BUILT_IN_SYNC_FETCH_AND_NAND_16:
7887 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_FETCH_AND_NAND_1);
1cd6e20d 7888 target = expand_builtin_sync_operation (mode, exp, NOT, false, target);
b6a5fc45 7889 if (target)
7890 return target;
7891 break;
7892
2797f13a 7893 case BUILT_IN_SYNC_ADD_AND_FETCH_1:
7894 case BUILT_IN_SYNC_ADD_AND_FETCH_2:
7895 case BUILT_IN_SYNC_ADD_AND_FETCH_4:
7896 case BUILT_IN_SYNC_ADD_AND_FETCH_8:
7897 case BUILT_IN_SYNC_ADD_AND_FETCH_16:
7898 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_ADD_AND_FETCH_1);
1cd6e20d 7899 target = expand_builtin_sync_operation (mode, exp, PLUS, true, target);
b6a5fc45 7900 if (target)
7901 return target;
7902 break;
7903
2797f13a 7904 case BUILT_IN_SYNC_SUB_AND_FETCH_1:
7905 case BUILT_IN_SYNC_SUB_AND_FETCH_2:
7906 case BUILT_IN_SYNC_SUB_AND_FETCH_4:
7907 case BUILT_IN_SYNC_SUB_AND_FETCH_8:
7908 case BUILT_IN_SYNC_SUB_AND_FETCH_16:
7909 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_SUB_AND_FETCH_1);
1cd6e20d 7910 target = expand_builtin_sync_operation (mode, exp, MINUS, true, target);
b6a5fc45 7911 if (target)
7912 return target;
7913 break;
7914
2797f13a 7915 case BUILT_IN_SYNC_OR_AND_FETCH_1:
7916 case BUILT_IN_SYNC_OR_AND_FETCH_2:
7917 case BUILT_IN_SYNC_OR_AND_FETCH_4:
7918 case BUILT_IN_SYNC_OR_AND_FETCH_8:
7919 case BUILT_IN_SYNC_OR_AND_FETCH_16:
7920 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_OR_AND_FETCH_1);
1cd6e20d 7921 target = expand_builtin_sync_operation (mode, exp, IOR, true, target);
b6a5fc45 7922 if (target)
7923 return target;
7924 break;
7925
2797f13a 7926 case BUILT_IN_SYNC_AND_AND_FETCH_1:
7927 case BUILT_IN_SYNC_AND_AND_FETCH_2:
7928 case BUILT_IN_SYNC_AND_AND_FETCH_4:
7929 case BUILT_IN_SYNC_AND_AND_FETCH_8:
7930 case BUILT_IN_SYNC_AND_AND_FETCH_16:
7931 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_AND_AND_FETCH_1);
1cd6e20d 7932 target = expand_builtin_sync_operation (mode, exp, AND, true, target);
b6a5fc45 7933 if (target)
7934 return target;
7935 break;
7936
2797f13a 7937 case BUILT_IN_SYNC_XOR_AND_FETCH_1:
7938 case BUILT_IN_SYNC_XOR_AND_FETCH_2:
7939 case BUILT_IN_SYNC_XOR_AND_FETCH_4:
7940 case BUILT_IN_SYNC_XOR_AND_FETCH_8:
7941 case BUILT_IN_SYNC_XOR_AND_FETCH_16:
7942 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_XOR_AND_FETCH_1);
1cd6e20d 7943 target = expand_builtin_sync_operation (mode, exp, XOR, true, target);
b6a5fc45 7944 if (target)
7945 return target;
7946 break;
7947
2797f13a 7948 case BUILT_IN_SYNC_NAND_AND_FETCH_1:
7949 case BUILT_IN_SYNC_NAND_AND_FETCH_2:
7950 case BUILT_IN_SYNC_NAND_AND_FETCH_4:
7951 case BUILT_IN_SYNC_NAND_AND_FETCH_8:
7952 case BUILT_IN_SYNC_NAND_AND_FETCH_16:
7953 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_NAND_AND_FETCH_1);
1cd6e20d 7954 target = expand_builtin_sync_operation (mode, exp, NOT, true, target);
b6a5fc45 7955 if (target)
7956 return target;
7957 break;
7958
2797f13a 7959 case BUILT_IN_SYNC_BOOL_COMPARE_AND_SWAP_1:
7960 case BUILT_IN_SYNC_BOOL_COMPARE_AND_SWAP_2:
7961 case BUILT_IN_SYNC_BOOL_COMPARE_AND_SWAP_4:
7962 case BUILT_IN_SYNC_BOOL_COMPARE_AND_SWAP_8:
7963 case BUILT_IN_SYNC_BOOL_COMPARE_AND_SWAP_16:
a601d32a 7964 if (mode == VOIDmode)
7965 mode = TYPE_MODE (boolean_type_node);
b6a5fc45 7966 if (!target || !register_operand (target, mode))
7967 target = gen_reg_rtx (mode);
3e272de8 7968
2797f13a 7969 mode = get_builtin_sync_mode
7970 (fcode - BUILT_IN_SYNC_BOOL_COMPARE_AND_SWAP_1);
c2f47e15 7971 target = expand_builtin_compare_and_swap (mode, exp, true, target);
b6a5fc45 7972 if (target)
7973 return target;
7974 break;
7975
2797f13a 7976 case BUILT_IN_SYNC_VAL_COMPARE_AND_SWAP_1:
7977 case BUILT_IN_SYNC_VAL_COMPARE_AND_SWAP_2:
7978 case BUILT_IN_SYNC_VAL_COMPARE_AND_SWAP_4:
7979 case BUILT_IN_SYNC_VAL_COMPARE_AND_SWAP_8:
7980 case BUILT_IN_SYNC_VAL_COMPARE_AND_SWAP_16:
7981 mode = get_builtin_sync_mode
7982 (fcode - BUILT_IN_SYNC_VAL_COMPARE_AND_SWAP_1);
c2f47e15 7983 target = expand_builtin_compare_and_swap (mode, exp, false, target);
b6a5fc45 7984 if (target)
7985 return target;
7986 break;
7987
2797f13a 7988 case BUILT_IN_SYNC_LOCK_TEST_AND_SET_1:
7989 case BUILT_IN_SYNC_LOCK_TEST_AND_SET_2:
7990 case BUILT_IN_SYNC_LOCK_TEST_AND_SET_4:
7991 case BUILT_IN_SYNC_LOCK_TEST_AND_SET_8:
7992 case BUILT_IN_SYNC_LOCK_TEST_AND_SET_16:
7993 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_LOCK_TEST_AND_SET_1);
7994 target = expand_builtin_sync_lock_test_and_set (mode, exp, target);
b6a5fc45 7995 if (target)
7996 return target;
7997 break;
7998
2797f13a 7999 case BUILT_IN_SYNC_LOCK_RELEASE_1:
8000 case BUILT_IN_SYNC_LOCK_RELEASE_2:
8001 case BUILT_IN_SYNC_LOCK_RELEASE_4:
8002 case BUILT_IN_SYNC_LOCK_RELEASE_8:
8003 case BUILT_IN_SYNC_LOCK_RELEASE_16:
8004 mode = get_builtin_sync_mode (fcode - BUILT_IN_SYNC_LOCK_RELEASE_1);
8005 expand_builtin_sync_lock_release (mode, exp);
b6a5fc45 8006 return const0_rtx;
8007
2797f13a 8008 case BUILT_IN_SYNC_SYNCHRONIZE:
8009 expand_builtin_sync_synchronize ();
b6a5fc45 8010 return const0_rtx;
8011
1cd6e20d 8012 case BUILT_IN_ATOMIC_EXCHANGE_1:
8013 case BUILT_IN_ATOMIC_EXCHANGE_2:
8014 case BUILT_IN_ATOMIC_EXCHANGE_4:
8015 case BUILT_IN_ATOMIC_EXCHANGE_8:
8016 case BUILT_IN_ATOMIC_EXCHANGE_16:
8017 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_EXCHANGE_1);
8018 target = expand_builtin_atomic_exchange (mode, exp, target);
8019 if (target)
8020 return target;
8021 break;
8022
8023 case BUILT_IN_ATOMIC_COMPARE_EXCHANGE_1:
8024 case BUILT_IN_ATOMIC_COMPARE_EXCHANGE_2:
8025 case BUILT_IN_ATOMIC_COMPARE_EXCHANGE_4:
8026 case BUILT_IN_ATOMIC_COMPARE_EXCHANGE_8:
8027 case BUILT_IN_ATOMIC_COMPARE_EXCHANGE_16:
2c201ad1 8028 {
8029 unsigned int nargs, z;
f1f41a6c 8030 vec<tree, va_gc> *vec;
2c201ad1 8031
8032 mode =
8033 get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_COMPARE_EXCHANGE_1);
8034 target = expand_builtin_atomic_compare_exchange (mode, exp, target);
8035 if (target)
8036 return target;
8037
8038 /* If this is turned into an external library call, the weak parameter
8039 must be dropped to match the expected parameter list. */
8040 nargs = call_expr_nargs (exp);
f1f41a6c 8041 vec_alloc (vec, nargs - 1);
2c201ad1 8042 for (z = 0; z < 3; z++)
f1f41a6c 8043 vec->quick_push (CALL_EXPR_ARG (exp, z));
2c201ad1 8044 /* Skip the boolean weak parameter. */
8045 for (z = 4; z < 6; z++)
f1f41a6c 8046 vec->quick_push (CALL_EXPR_ARG (exp, z));
2c201ad1 8047 exp = build_call_vec (TREE_TYPE (exp), CALL_EXPR_FN (exp), vec);
8048 break;
8049 }
1cd6e20d 8050
8051 case BUILT_IN_ATOMIC_LOAD_1:
8052 case BUILT_IN_ATOMIC_LOAD_2:
8053 case BUILT_IN_ATOMIC_LOAD_4:
8054 case BUILT_IN_ATOMIC_LOAD_8:
8055 case BUILT_IN_ATOMIC_LOAD_16:
8056 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_LOAD_1);
8057 target = expand_builtin_atomic_load (mode, exp, target);
8058 if (target)
8059 return target;
8060 break;
8061
8062 case BUILT_IN_ATOMIC_STORE_1:
8063 case BUILT_IN_ATOMIC_STORE_2:
8064 case BUILT_IN_ATOMIC_STORE_4:
8065 case BUILT_IN_ATOMIC_STORE_8:
8066 case BUILT_IN_ATOMIC_STORE_16:
8067 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_STORE_1);
8068 target = expand_builtin_atomic_store (mode, exp);
8069 if (target)
8070 return const0_rtx;
8071 break;
8072
8073 case BUILT_IN_ATOMIC_ADD_FETCH_1:
8074 case BUILT_IN_ATOMIC_ADD_FETCH_2:
8075 case BUILT_IN_ATOMIC_ADD_FETCH_4:
8076 case BUILT_IN_ATOMIC_ADD_FETCH_8:
8077 case BUILT_IN_ATOMIC_ADD_FETCH_16:
8078 {
8079 enum built_in_function lib;
8080 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_ADD_FETCH_1);
8081 lib = (enum built_in_function)((int)BUILT_IN_ATOMIC_FETCH_ADD_1 +
8082 (fcode - BUILT_IN_ATOMIC_ADD_FETCH_1));
8083 target = expand_builtin_atomic_fetch_op (mode, exp, target, PLUS, true,
8084 ignore, lib);
8085 if (target)
8086 return target;
8087 break;
8088 }
8089 case BUILT_IN_ATOMIC_SUB_FETCH_1:
8090 case BUILT_IN_ATOMIC_SUB_FETCH_2:
8091 case BUILT_IN_ATOMIC_SUB_FETCH_4:
8092 case BUILT_IN_ATOMIC_SUB_FETCH_8:
8093 case BUILT_IN_ATOMIC_SUB_FETCH_16:
8094 {
8095 enum built_in_function lib;
8096 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_SUB_FETCH_1);
8097 lib = (enum built_in_function)((int)BUILT_IN_ATOMIC_FETCH_SUB_1 +
8098 (fcode - BUILT_IN_ATOMIC_SUB_FETCH_1));
8099 target = expand_builtin_atomic_fetch_op (mode, exp, target, MINUS, true,
8100 ignore, lib);
8101 if (target)
8102 return target;
8103 break;
8104 }
8105 case BUILT_IN_ATOMIC_AND_FETCH_1:
8106 case BUILT_IN_ATOMIC_AND_FETCH_2:
8107 case BUILT_IN_ATOMIC_AND_FETCH_4:
8108 case BUILT_IN_ATOMIC_AND_FETCH_8:
8109 case BUILT_IN_ATOMIC_AND_FETCH_16:
8110 {
8111 enum built_in_function lib;
8112 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_AND_FETCH_1);
8113 lib = (enum built_in_function)((int)BUILT_IN_ATOMIC_FETCH_AND_1 +
8114 (fcode - BUILT_IN_ATOMIC_AND_FETCH_1));
8115 target = expand_builtin_atomic_fetch_op (mode, exp, target, AND, true,
8116 ignore, lib);
8117 if (target)
8118 return target;
8119 break;
8120 }
8121 case BUILT_IN_ATOMIC_NAND_FETCH_1:
8122 case BUILT_IN_ATOMIC_NAND_FETCH_2:
8123 case BUILT_IN_ATOMIC_NAND_FETCH_4:
8124 case BUILT_IN_ATOMIC_NAND_FETCH_8:
8125 case BUILT_IN_ATOMIC_NAND_FETCH_16:
8126 {
8127 enum built_in_function lib;
8128 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_NAND_FETCH_1);
8129 lib = (enum built_in_function)((int)BUILT_IN_ATOMIC_FETCH_NAND_1 +
8130 (fcode - BUILT_IN_ATOMIC_NAND_FETCH_1));
8131 target = expand_builtin_atomic_fetch_op (mode, exp, target, NOT, true,
8132 ignore, lib);
8133 if (target)
8134 return target;
8135 break;
8136 }
8137 case BUILT_IN_ATOMIC_XOR_FETCH_1:
8138 case BUILT_IN_ATOMIC_XOR_FETCH_2:
8139 case BUILT_IN_ATOMIC_XOR_FETCH_4:
8140 case BUILT_IN_ATOMIC_XOR_FETCH_8:
8141 case BUILT_IN_ATOMIC_XOR_FETCH_16:
8142 {
8143 enum built_in_function lib;
8144 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_XOR_FETCH_1);
8145 lib = (enum built_in_function)((int)BUILT_IN_ATOMIC_FETCH_XOR_1 +
8146 (fcode - BUILT_IN_ATOMIC_XOR_FETCH_1));
8147 target = expand_builtin_atomic_fetch_op (mode, exp, target, XOR, true,
8148 ignore, lib);
8149 if (target)
8150 return target;
8151 break;
8152 }
8153 case BUILT_IN_ATOMIC_OR_FETCH_1:
8154 case BUILT_IN_ATOMIC_OR_FETCH_2:
8155 case BUILT_IN_ATOMIC_OR_FETCH_4:
8156 case BUILT_IN_ATOMIC_OR_FETCH_8:
8157 case BUILT_IN_ATOMIC_OR_FETCH_16:
8158 {
8159 enum built_in_function lib;
8160 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_OR_FETCH_1);
8161 lib = (enum built_in_function)((int)BUILT_IN_ATOMIC_FETCH_OR_1 +
8162 (fcode - BUILT_IN_ATOMIC_OR_FETCH_1));
8163 target = expand_builtin_atomic_fetch_op (mode, exp, target, IOR, true,
8164 ignore, lib);
8165 if (target)
8166 return target;
8167 break;
8168 }
8169 case BUILT_IN_ATOMIC_FETCH_ADD_1:
8170 case BUILT_IN_ATOMIC_FETCH_ADD_2:
8171 case BUILT_IN_ATOMIC_FETCH_ADD_4:
8172 case BUILT_IN_ATOMIC_FETCH_ADD_8:
8173 case BUILT_IN_ATOMIC_FETCH_ADD_16:
8174 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_FETCH_ADD_1);
8175 target = expand_builtin_atomic_fetch_op (mode, exp, target, PLUS, false,
8176 ignore, BUILT_IN_NONE);
8177 if (target)
8178 return target;
8179 break;
8180
8181 case BUILT_IN_ATOMIC_FETCH_SUB_1:
8182 case BUILT_IN_ATOMIC_FETCH_SUB_2:
8183 case BUILT_IN_ATOMIC_FETCH_SUB_4:
8184 case BUILT_IN_ATOMIC_FETCH_SUB_8:
8185 case BUILT_IN_ATOMIC_FETCH_SUB_16:
8186 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_FETCH_SUB_1);
8187 target = expand_builtin_atomic_fetch_op (mode, exp, target, MINUS, false,
8188 ignore, BUILT_IN_NONE);
8189 if (target)
8190 return target;
8191 break;
8192
8193 case BUILT_IN_ATOMIC_FETCH_AND_1:
8194 case BUILT_IN_ATOMIC_FETCH_AND_2:
8195 case BUILT_IN_ATOMIC_FETCH_AND_4:
8196 case BUILT_IN_ATOMIC_FETCH_AND_8:
8197 case BUILT_IN_ATOMIC_FETCH_AND_16:
8198 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_FETCH_AND_1);
8199 target = expand_builtin_atomic_fetch_op (mode, exp, target, AND, false,
8200 ignore, BUILT_IN_NONE);
8201 if (target)
8202 return target;
8203 break;
8204
8205 case BUILT_IN_ATOMIC_FETCH_NAND_1:
8206 case BUILT_IN_ATOMIC_FETCH_NAND_2:
8207 case BUILT_IN_ATOMIC_FETCH_NAND_4:
8208 case BUILT_IN_ATOMIC_FETCH_NAND_8:
8209 case BUILT_IN_ATOMIC_FETCH_NAND_16:
8210 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_FETCH_NAND_1);
8211 target = expand_builtin_atomic_fetch_op (mode, exp, target, NOT, false,
8212 ignore, BUILT_IN_NONE);
8213 if (target)
8214 return target;
8215 break;
8216
8217 case BUILT_IN_ATOMIC_FETCH_XOR_1:
8218 case BUILT_IN_ATOMIC_FETCH_XOR_2:
8219 case BUILT_IN_ATOMIC_FETCH_XOR_4:
8220 case BUILT_IN_ATOMIC_FETCH_XOR_8:
8221 case BUILT_IN_ATOMIC_FETCH_XOR_16:
8222 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_FETCH_XOR_1);
8223 target = expand_builtin_atomic_fetch_op (mode, exp, target, XOR, false,
8224 ignore, BUILT_IN_NONE);
8225 if (target)
8226 return target;
8227 break;
8228
8229 case BUILT_IN_ATOMIC_FETCH_OR_1:
8230 case BUILT_IN_ATOMIC_FETCH_OR_2:
8231 case BUILT_IN_ATOMIC_FETCH_OR_4:
8232 case BUILT_IN_ATOMIC_FETCH_OR_8:
8233 case BUILT_IN_ATOMIC_FETCH_OR_16:
8234 mode = get_builtin_sync_mode (fcode - BUILT_IN_ATOMIC_FETCH_OR_1);
8235 target = expand_builtin_atomic_fetch_op (mode, exp, target, IOR, false,
8236 ignore, BUILT_IN_NONE);
8237 if (target)
8238 return target;
8239 break;
10b744a3 8240
8241 case BUILT_IN_ATOMIC_TEST_AND_SET:
7821cde1 8242 return expand_builtin_atomic_test_and_set (exp, target);
10b744a3 8243
8244 case BUILT_IN_ATOMIC_CLEAR:
8245 return expand_builtin_atomic_clear (exp);
1cd6e20d 8246
8247 case BUILT_IN_ATOMIC_ALWAYS_LOCK_FREE:
8248 return expand_builtin_atomic_always_lock_free (exp);
8249
8250 case BUILT_IN_ATOMIC_IS_LOCK_FREE:
8251 target = expand_builtin_atomic_is_lock_free (exp);
8252 if (target)
8253 return target;
8254 break;
8255
8256 case BUILT_IN_ATOMIC_THREAD_FENCE:
8257 expand_builtin_atomic_thread_fence (exp);
8258 return const0_rtx;
8259
8260 case BUILT_IN_ATOMIC_SIGNAL_FENCE:
8261 expand_builtin_atomic_signal_fence (exp);
8262 return const0_rtx;
8263
0a39fd54 8264 case BUILT_IN_OBJECT_SIZE:
8265 return expand_builtin_object_size (exp);
8266
8267 case BUILT_IN_MEMCPY_CHK:
8268 case BUILT_IN_MEMPCPY_CHK:
8269 case BUILT_IN_MEMMOVE_CHK:
8270 case BUILT_IN_MEMSET_CHK:
8271 target = expand_builtin_memory_chk (exp, target, mode, fcode);
8272 if (target)
8273 return target;
8274 break;
8275
8276 case BUILT_IN_STRCPY_CHK:
8277 case BUILT_IN_STPCPY_CHK:
8278 case BUILT_IN_STRNCPY_CHK:
1063acde 8279 case BUILT_IN_STPNCPY_CHK:
0a39fd54 8280 case BUILT_IN_STRCAT_CHK:
b356dfef 8281 case BUILT_IN_STRNCAT_CHK:
0a39fd54 8282 case BUILT_IN_SNPRINTF_CHK:
8283 case BUILT_IN_VSNPRINTF_CHK:
8284 maybe_emit_chk_warning (exp, fcode);
8285 break;
8286
8287 case BUILT_IN_SPRINTF_CHK:
8288 case BUILT_IN_VSPRINTF_CHK:
8289 maybe_emit_sprintf_chk_warning (exp, fcode);
8290 break;
8291
2c281b15 8292 case BUILT_IN_FREE:
f74ea1c2 8293 if (warn_free_nonheap_object)
8294 maybe_emit_free_warning (exp);
2c281b15 8295 break;
8296
badaa04c 8297 case BUILT_IN_THREAD_POINTER:
8298 return expand_builtin_thread_pointer (exp, target);
8299
8300 case BUILT_IN_SET_THREAD_POINTER:
8301 expand_builtin_set_thread_pointer (exp);
8302 return const0_rtx;
8303
ca4c3545 8304 case BUILT_IN_ACC_ON_DEVICE:
1ae4e7aa 8305 /* Do library call, if we failed to expand the builtin when
8306 folding. */
ca4c3545 8307 break;
8308
a7babc1e 8309 case BUILT_IN_GOACC_PARLEVEL_ID:
8310 case BUILT_IN_GOACC_PARLEVEL_SIZE:
8311 return expand_builtin_goacc_parlevel_id_size (exp, target, ignore);
8312
123081ef 8313 case BUILT_IN_SPECULATION_SAFE_VALUE_PTR:
8314 return expand_speculation_safe_value (VOIDmode, exp, target, ignore);
8315
8316 case BUILT_IN_SPECULATION_SAFE_VALUE_1:
8317 case BUILT_IN_SPECULATION_SAFE_VALUE_2:
8318 case BUILT_IN_SPECULATION_SAFE_VALUE_4:
8319 case BUILT_IN_SPECULATION_SAFE_VALUE_8:
8320 case BUILT_IN_SPECULATION_SAFE_VALUE_16:
8321 mode = get_builtin_sync_mode (fcode - BUILT_IN_SPECULATION_SAFE_VALUE_1);
8322 return expand_speculation_safe_value (mode, exp, target, ignore);
8323
92482ee0 8324 default: /* just do library call, if unknown builtin */
146c1b4f 8325 break;
53800dbe 8326 }
8327
8328 /* The switch statement above can drop through to cause the function
8329 to be called normally. */
8330 return expand_call (exp, target, ignore);
8331}
650e4c94 8332
805e22b2 8333/* Determine whether a tree node represents a call to a built-in
52203a9d 8334 function. If the tree T is a call to a built-in function with
8335 the right number of arguments of the appropriate types, return
8336 the DECL_FUNCTION_CODE of the call, e.g. BUILT_IN_SQRT.
8337 Otherwise the return value is END_BUILTINS. */
aecda0d6 8338
805e22b2 8339enum built_in_function
b7bf20db 8340builtin_mathfn_code (const_tree t)
805e22b2 8341{
b7bf20db 8342 const_tree fndecl, arg, parmlist;
8343 const_tree argtype, parmtype;
8344 const_call_expr_arg_iterator iter;
805e22b2 8345
d44e3710 8346 if (TREE_CODE (t) != CALL_EXPR)
805e22b2 8347 return END_BUILTINS;
8348
c6e6ecb1 8349 fndecl = get_callee_fndecl (t);
a0e9bfbb 8350 if (fndecl == NULL_TREE || !fndecl_built_in_p (fndecl, BUILT_IN_NORMAL))
8351 return END_BUILTINS;
805e22b2 8352
52203a9d 8353 parmlist = TYPE_ARG_TYPES (TREE_TYPE (fndecl));
b7bf20db 8354 init_const_call_expr_arg_iterator (t, &iter);
52203a9d 8355 for (; parmlist; parmlist = TREE_CHAIN (parmlist))
e9f80ff5 8356 {
52203a9d 8357 /* If a function doesn't take a variable number of arguments,
8358 the last element in the list will have type `void'. */
8359 parmtype = TREE_VALUE (parmlist);
8360 if (VOID_TYPE_P (parmtype))
8361 {
b7bf20db 8362 if (more_const_call_expr_args_p (&iter))
52203a9d 8363 return END_BUILTINS;
8364 return DECL_FUNCTION_CODE (fndecl);
8365 }
8366
b7bf20db 8367 if (! more_const_call_expr_args_p (&iter))
e9f80ff5 8368 return END_BUILTINS;
48e1416a 8369
b7bf20db 8370 arg = next_const_call_expr_arg (&iter);
c2f47e15 8371 argtype = TREE_TYPE (arg);
52203a9d 8372
8373 if (SCALAR_FLOAT_TYPE_P (parmtype))
8374 {
8375 if (! SCALAR_FLOAT_TYPE_P (argtype))
8376 return END_BUILTINS;
8377 }
8378 else if (COMPLEX_FLOAT_TYPE_P (parmtype))
8379 {
8380 if (! COMPLEX_FLOAT_TYPE_P (argtype))
8381 return END_BUILTINS;
8382 }
8383 else if (POINTER_TYPE_P (parmtype))
8384 {
8385 if (! POINTER_TYPE_P (argtype))
8386 return END_BUILTINS;
8387 }
8388 else if (INTEGRAL_TYPE_P (parmtype))
8389 {
8390 if (! INTEGRAL_TYPE_P (argtype))
8391 return END_BUILTINS;
8392 }
8393 else
e9f80ff5 8394 return END_BUILTINS;
e9f80ff5 8395 }
8396
52203a9d 8397 /* Variable-length argument list. */
805e22b2 8398 return DECL_FUNCTION_CODE (fndecl);
8399}
8400
c2f47e15 8401/* Fold a call to __builtin_constant_p, if we know its argument ARG will
8402 evaluate to a constant. */
650e4c94 8403
8404static tree
c2f47e15 8405fold_builtin_constant_p (tree arg)
650e4c94 8406{
650e4c94 8407 /* We return 1 for a numeric type that's known to be a constant
8408 value at compile-time or for an aggregate type that's a
8409 literal constant. */
c2f47e15 8410 STRIP_NOPS (arg);
650e4c94 8411
8412 /* If we know this is a constant, emit the constant of one. */
c2f47e15 8413 if (CONSTANT_CLASS_P (arg)
8414 || (TREE_CODE (arg) == CONSTRUCTOR
8415 && TREE_CONSTANT (arg)))
650e4c94 8416 return integer_one_node;
c2f47e15 8417 if (TREE_CODE (arg) == ADDR_EXPR)
adcfa3a3 8418 {
c2f47e15 8419 tree op = TREE_OPERAND (arg, 0);
adcfa3a3 8420 if (TREE_CODE (op) == STRING_CST
8421 || (TREE_CODE (op) == ARRAY_REF
8422 && integer_zerop (TREE_OPERAND (op, 1))
8423 && TREE_CODE (TREE_OPERAND (op, 0)) == STRING_CST))
8424 return integer_one_node;
8425 }
650e4c94 8426
1fb4300c 8427 /* If this expression has side effects, show we don't know it to be a
8428 constant. Likewise if it's a pointer or aggregate type since in
8429 those case we only want literals, since those are only optimized
f97c71a1 8430 when generating RTL, not later.
8431 And finally, if we are compiling an initializer, not code, we
8432 need to return a definite result now; there's not going to be any
8433 more optimization done. */
c2f47e15 8434 if (TREE_SIDE_EFFECTS (arg)
8435 || AGGREGATE_TYPE_P (TREE_TYPE (arg))
8436 || POINTER_TYPE_P (TREE_TYPE (arg))
47be647d 8437 || cfun == 0
0b049e15 8438 || folding_initializer
8439 || force_folding_builtin_constant_p)
650e4c94 8440 return integer_zero_node;
8441
c2f47e15 8442 return NULL_TREE;
650e4c94 8443}
8444
01107f42 8445/* Create builtin_expect or builtin_expect_with_probability
8446 with PRED and EXPECTED as its arguments and return it as a truthvalue.
8447 Fortran FE can also produce builtin_expect with PREDICTOR as third argument.
8448 builtin_expect_with_probability instead uses third argument as PROBABILITY
8449 value. */
4ee9c684 8450
8451static tree
c83059be 8452build_builtin_expect_predicate (location_t loc, tree pred, tree expected,
01107f42 8453 tree predictor, tree probability)
4ee9c684 8454{
76f5a783 8455 tree fn, arg_types, pred_type, expected_type, call_expr, ret_type;
4ee9c684 8456
01107f42 8457 fn = builtin_decl_explicit (probability == NULL_TREE ? BUILT_IN_EXPECT
8458 : BUILT_IN_EXPECT_WITH_PROBABILITY);
76f5a783 8459 arg_types = TYPE_ARG_TYPES (TREE_TYPE (fn));
8460 ret_type = TREE_TYPE (TREE_TYPE (fn));
8461 pred_type = TREE_VALUE (arg_types);
8462 expected_type = TREE_VALUE (TREE_CHAIN (arg_types));
8463
389dd41b 8464 pred = fold_convert_loc (loc, pred_type, pred);
8465 expected = fold_convert_loc (loc, expected_type, expected);
01107f42 8466
8467 if (probability)
8468 call_expr = build_call_expr_loc (loc, fn, 3, pred, expected, probability);
8469 else
8470 call_expr = build_call_expr_loc (loc, fn, predictor ? 3 : 2, pred, expected,
8471 predictor);
76f5a783 8472
8473 return build2 (NE_EXPR, TREE_TYPE (pred), call_expr,
8474 build_int_cst (ret_type, 0));
8475}
8476
01107f42 8477/* Fold a call to builtin_expect with arguments ARG0, ARG1, ARG2, ARG3. Return
76f5a783 8478 NULL_TREE if no simplification is possible. */
8479
c83059be 8480tree
01107f42 8481fold_builtin_expect (location_t loc, tree arg0, tree arg1, tree arg2,
8482 tree arg3)
76f5a783 8483{
083bada9 8484 tree inner, fndecl, inner_arg0;
76f5a783 8485 enum tree_code code;
8486
083bada9 8487 /* Distribute the expected value over short-circuiting operators.
8488 See through the cast from truthvalue_type_node to long. */
8489 inner_arg0 = arg0;
d09ef31a 8490 while (CONVERT_EXPR_P (inner_arg0)
083bada9 8491 && INTEGRAL_TYPE_P (TREE_TYPE (inner_arg0))
8492 && INTEGRAL_TYPE_P (TREE_TYPE (TREE_OPERAND (inner_arg0, 0))))
8493 inner_arg0 = TREE_OPERAND (inner_arg0, 0);
8494
76f5a783 8495 /* If this is a builtin_expect within a builtin_expect keep the
8496 inner one. See through a comparison against a constant. It
8497 might have been added to create a thruthvalue. */
083bada9 8498 inner = inner_arg0;
8499
76f5a783 8500 if (COMPARISON_CLASS_P (inner)
8501 && TREE_CODE (TREE_OPERAND (inner, 1)) == INTEGER_CST)
8502 inner = TREE_OPERAND (inner, 0);
8503
8504 if (TREE_CODE (inner) == CALL_EXPR
8505 && (fndecl = get_callee_fndecl (inner))
a0e9bfbb 8506 && (fndecl_built_in_p (fndecl, BUILT_IN_EXPECT)
8507 || fndecl_built_in_p (fndecl, BUILT_IN_EXPECT_WITH_PROBABILITY)))
76f5a783 8508 return arg0;
8509
083bada9 8510 inner = inner_arg0;
76f5a783 8511 code = TREE_CODE (inner);
8512 if (code == TRUTH_ANDIF_EXPR || code == TRUTH_ORIF_EXPR)
8513 {
8514 tree op0 = TREE_OPERAND (inner, 0);
8515 tree op1 = TREE_OPERAND (inner, 1);
2f2a7720 8516 arg1 = save_expr (arg1);
76f5a783 8517
01107f42 8518 op0 = build_builtin_expect_predicate (loc, op0, arg1, arg2, arg3);
8519 op1 = build_builtin_expect_predicate (loc, op1, arg1, arg2, arg3);
76f5a783 8520 inner = build2 (code, TREE_TYPE (inner), op0, op1);
8521
389dd41b 8522 return fold_convert_loc (loc, TREE_TYPE (arg0), inner);
76f5a783 8523 }
8524
8525 /* If the argument isn't invariant then there's nothing else we can do. */
083bada9 8526 if (!TREE_CONSTANT (inner_arg0))
c2f47e15 8527 return NULL_TREE;
4ee9c684 8528
76f5a783 8529 /* If we expect that a comparison against the argument will fold to
8530 a constant return the constant. In practice, this means a true
8531 constant or the address of a non-weak symbol. */
083bada9 8532 inner = inner_arg0;
4ee9c684 8533 STRIP_NOPS (inner);
8534 if (TREE_CODE (inner) == ADDR_EXPR)
8535 {
8536 do
8537 {
8538 inner = TREE_OPERAND (inner, 0);
8539 }
8540 while (TREE_CODE (inner) == COMPONENT_REF
8541 || TREE_CODE (inner) == ARRAY_REF);
53e9c5c4 8542 if (VAR_OR_FUNCTION_DECL_P (inner) && DECL_WEAK (inner))
c2f47e15 8543 return NULL_TREE;
4ee9c684 8544 }
8545
76f5a783 8546 /* Otherwise, ARG0 already has the proper type for the return value. */
8547 return arg0;
4ee9c684 8548}
8549
c2f47e15 8550/* Fold a call to __builtin_classify_type with argument ARG. */
27d0c333 8551
539a3a92 8552static tree
c2f47e15 8553fold_builtin_classify_type (tree arg)
539a3a92 8554{
c2f47e15 8555 if (arg == 0)
7002a1c8 8556 return build_int_cst (integer_type_node, no_type_class);
539a3a92 8557
7002a1c8 8558 return build_int_cst (integer_type_node, type_to_class (TREE_TYPE (arg)));
539a3a92 8559}
8560
c2f47e15 8561/* Fold a call to __builtin_strlen with argument ARG. */
e6e27594 8562
8563static tree
c7cbde74 8564fold_builtin_strlen (location_t loc, tree type, tree arg)
e6e27594 8565{
c2f47e15 8566 if (!validate_arg (arg, POINTER_TYPE))
e6e27594 8567 return NULL_TREE;
8568 else
8569 {
2b84b289 8570 c_strlen_data data;
8571 memset (&data, 0, sizeof (c_strlen_data));
8572 tree len = c_strlen (arg, 0, &data);
e6e27594 8573
8574 if (len)
c7cbde74 8575 return fold_convert_loc (loc, type, len);
e6e27594 8576
2b84b289 8577 if (!data.decl)
8578 c_strlen (arg, 1, &data);
7af57b1c 8579
2b84b289 8580 if (data.decl)
7af57b1c 8581 {
8582 if (EXPR_HAS_LOCATION (arg))
8583 loc = EXPR_LOCATION (arg);
8584 else if (loc == UNKNOWN_LOCATION)
8585 loc = input_location;
2b84b289 8586 warn_string_no_nul (loc, "strlen", arg, data.decl);
7af57b1c 8587 }
8588
e6e27594 8589 return NULL_TREE;
8590 }
8591}
8592
92c43e3c 8593/* Fold a call to __builtin_inf or __builtin_huge_val. */
8594
8595static tree
389dd41b 8596fold_builtin_inf (location_t loc, tree type, int warn)
92c43e3c 8597{
aa870c1b 8598 REAL_VALUE_TYPE real;
8599
40f4dbd5 8600 /* __builtin_inff is intended to be usable to define INFINITY on all
8601 targets. If an infinity is not available, INFINITY expands "to a
8602 positive constant of type float that overflows at translation
8603 time", footnote "In this case, using INFINITY will violate the
8604 constraint in 6.4.4 and thus require a diagnostic." (C99 7.12#4).
8605 Thus we pedwarn to ensure this constraint violation is
8606 diagnosed. */
92c43e3c 8607 if (!MODE_HAS_INFINITIES (TYPE_MODE (type)) && warn)
389dd41b 8608 pedwarn (loc, 0, "target format does not support infinity");
92c43e3c 8609
aa870c1b 8610 real_inf (&real);
8611 return build_real (type, real);
92c43e3c 8612}
8613
d735c391 8614/* Fold function call to builtin sincos, sincosf, or sincosl. Return
8615 NULL_TREE if no simplification can be made. */
8616
8617static tree
389dd41b 8618fold_builtin_sincos (location_t loc,
8619 tree arg0, tree arg1, tree arg2)
d735c391 8620{
c2f47e15 8621 tree type;
6c21be92 8622 tree fndecl, call = NULL_TREE;
d735c391 8623
c2f47e15 8624 if (!validate_arg (arg0, REAL_TYPE)
8625 || !validate_arg (arg1, POINTER_TYPE)
8626 || !validate_arg (arg2, POINTER_TYPE))
d735c391 8627 return NULL_TREE;
8628
d735c391 8629 type = TREE_TYPE (arg0);
d735c391 8630
8631 /* Calculate the result when the argument is a constant. */
e3240774 8632 built_in_function fn = mathfn_built_in_2 (type, CFN_BUILT_IN_CEXPI);
6c21be92 8633 if (fn == END_BUILTINS)
d735c391 8634 return NULL_TREE;
8635
6c21be92 8636 /* Canonicalize sincos to cexpi. */
8637 if (TREE_CODE (arg0) == REAL_CST)
8638 {
8639 tree complex_type = build_complex_type (type);
744fe358 8640 call = fold_const_call (as_combined_fn (fn), complex_type, arg0);
6c21be92 8641 }
8642 if (!call)
8643 {
8644 if (!targetm.libc_has_function (function_c99_math_complex)
8645 || !builtin_decl_implicit_p (fn))
8646 return NULL_TREE;
8647 fndecl = builtin_decl_explicit (fn);
8648 call = build_call_expr_loc (loc, fndecl, 1, arg0);
8649 call = builtin_save_expr (call);
8650 }
d735c391 8651
8234e9d3 8652 tree ptype = build_pointer_type (type);
8653 arg1 = fold_convert (ptype, arg1);
8654 arg2 = fold_convert (ptype, arg2);
a75b1c71 8655 return build2 (COMPOUND_EXPR, void_type_node,
d735c391 8656 build2 (MODIFY_EXPR, void_type_node,
389dd41b 8657 build_fold_indirect_ref_loc (loc, arg1),
6c21be92 8658 fold_build1_loc (loc, IMAGPART_EXPR, type, call)),
d735c391 8659 build2 (MODIFY_EXPR, void_type_node,
389dd41b 8660 build_fold_indirect_ref_loc (loc, arg2),
6c21be92 8661 fold_build1_loc (loc, REALPART_EXPR, type, call)));
d735c391 8662}
8663
c2f47e15 8664/* Fold function call to builtin memcmp with arguments ARG1 and ARG2.
8665 Return NULL_TREE if no simplification can be made. */
9c8a1629 8666
8667static tree
389dd41b 8668fold_builtin_memcmp (location_t loc, tree arg1, tree arg2, tree len)
9c8a1629 8669{
c2f47e15 8670 if (!validate_arg (arg1, POINTER_TYPE)
8671 || !validate_arg (arg2, POINTER_TYPE)
8672 || !validate_arg (len, INTEGER_TYPE))
8673 return NULL_TREE;
9c8a1629 8674
8675 /* If the LEN parameter is zero, return zero. */
8676 if (integer_zerop (len))
389dd41b 8677 return omit_two_operands_loc (loc, integer_type_node, integer_zero_node,
c4fef134 8678 arg1, arg2);
9c8a1629 8679
8680 /* If ARG1 and ARG2 are the same (and not volatile), return zero. */
8681 if (operand_equal_p (arg1, arg2, 0))
389dd41b 8682 return omit_one_operand_loc (loc, integer_type_node, integer_zero_node, len);
c4fef134 8683
c4fef134 8684 /* If len parameter is one, return an expression corresponding to
8685 (*(const unsigned char*)arg1 - (const unsigned char*)arg2). */
e913b5cd 8686 if (tree_fits_uhwi_p (len) && tree_to_uhwi (len) == 1)
c4fef134 8687 {
8688 tree cst_uchar_node = build_type_variant (unsigned_char_type_node, 1, 0);
4f1b71c0 8689 tree cst_uchar_ptr_node
8690 = build_pointer_type_for_mode (cst_uchar_node, ptr_mode, true);
8691
389dd41b 8692 tree ind1
8693 = fold_convert_loc (loc, integer_type_node,
8694 build1 (INDIRECT_REF, cst_uchar_node,
8695 fold_convert_loc (loc,
8696 cst_uchar_ptr_node,
c4fef134 8697 arg1)));
389dd41b 8698 tree ind2
8699 = fold_convert_loc (loc, integer_type_node,
8700 build1 (INDIRECT_REF, cst_uchar_node,
8701 fold_convert_loc (loc,
8702 cst_uchar_ptr_node,
c4fef134 8703 arg2)));
389dd41b 8704 return fold_build2_loc (loc, MINUS_EXPR, integer_type_node, ind1, ind2);
c4fef134 8705 }
9c8a1629 8706
c2f47e15 8707 return NULL_TREE;
9c8a1629 8708}
8709
c2f47e15 8710/* Fold a call to builtin isascii with argument ARG. */
d49367d4 8711
8712static tree
389dd41b 8713fold_builtin_isascii (location_t loc, tree arg)
d49367d4 8714{
c2f47e15 8715 if (!validate_arg (arg, INTEGER_TYPE))
8716 return NULL_TREE;
d49367d4 8717 else
8718 {
8719 /* Transform isascii(c) -> ((c & ~0x7f) == 0). */
c90b5d40 8720 arg = fold_build2 (BIT_AND_EXPR, integer_type_node, arg,
7002a1c8 8721 build_int_cst (integer_type_node,
c90b5d40 8722 ~ (unsigned HOST_WIDE_INT) 0x7f));
389dd41b 8723 return fold_build2_loc (loc, EQ_EXPR, integer_type_node,
7002a1c8 8724 arg, integer_zero_node);
d49367d4 8725 }
8726}
8727
c2f47e15 8728/* Fold a call to builtin toascii with argument ARG. */
d49367d4 8729
8730static tree
389dd41b 8731fold_builtin_toascii (location_t loc, tree arg)
d49367d4 8732{
c2f47e15 8733 if (!validate_arg (arg, INTEGER_TYPE))
8734 return NULL_TREE;
48e1416a 8735
c2f47e15 8736 /* Transform toascii(c) -> (c & 0x7f). */
389dd41b 8737 return fold_build2_loc (loc, BIT_AND_EXPR, integer_type_node, arg,
7002a1c8 8738 build_int_cst (integer_type_node, 0x7f));
d49367d4 8739}
8740
c2f47e15 8741/* Fold a call to builtin isdigit with argument ARG. */
df1cf42e 8742
8743static tree
389dd41b 8744fold_builtin_isdigit (location_t loc, tree arg)
df1cf42e 8745{
c2f47e15 8746 if (!validate_arg (arg, INTEGER_TYPE))
8747 return NULL_TREE;
df1cf42e 8748 else
8749 {
8750 /* Transform isdigit(c) -> (unsigned)(c) - '0' <= 9. */
624d37a6 8751 /* According to the C standard, isdigit is unaffected by locale.
8752 However, it definitely is affected by the target character set. */
624d37a6 8753 unsigned HOST_WIDE_INT target_digit0
8754 = lang_hooks.to_target_charset ('0');
8755
8756 if (target_digit0 == 0)
8757 return NULL_TREE;
8758
389dd41b 8759 arg = fold_convert_loc (loc, unsigned_type_node, arg);
c90b5d40 8760 arg = fold_build2 (MINUS_EXPR, unsigned_type_node, arg,
8761 build_int_cst (unsigned_type_node, target_digit0));
389dd41b 8762 return fold_build2_loc (loc, LE_EXPR, integer_type_node, arg,
f2532264 8763 build_int_cst (unsigned_type_node, 9));
df1cf42e 8764 }
8765}
27f261ef 8766
c2f47e15 8767/* Fold a call to fabs, fabsf or fabsl with argument ARG. */
d1aade50 8768
8769static tree
389dd41b 8770fold_builtin_fabs (location_t loc, tree arg, tree type)
d1aade50 8771{
c2f47e15 8772 if (!validate_arg (arg, REAL_TYPE))
8773 return NULL_TREE;
d1aade50 8774
389dd41b 8775 arg = fold_convert_loc (loc, type, arg);
389dd41b 8776 return fold_build1_loc (loc, ABS_EXPR, type, arg);
d1aade50 8777}
8778
c2f47e15 8779/* Fold a call to abs, labs, llabs or imaxabs with argument ARG. */
d1aade50 8780
8781static tree
389dd41b 8782fold_builtin_abs (location_t loc, tree arg, tree type)
d1aade50 8783{
c2f47e15 8784 if (!validate_arg (arg, INTEGER_TYPE))
8785 return NULL_TREE;
d1aade50 8786
389dd41b 8787 arg = fold_convert_loc (loc, type, arg);
389dd41b 8788 return fold_build1_loc (loc, ABS_EXPR, type, arg);
d1aade50 8789}
8790
abe4dcf6 8791/* Fold a call to builtin carg(a+bi) -> atan2(b,a). */
8792
8793static tree
389dd41b 8794fold_builtin_carg (location_t loc, tree arg, tree type)
abe4dcf6 8795{
239d491a 8796 if (validate_arg (arg, COMPLEX_TYPE)
8797 && TREE_CODE (TREE_TYPE (TREE_TYPE (arg))) == REAL_TYPE)
abe4dcf6 8798 {
8799 tree atan2_fn = mathfn_built_in (type, BUILT_IN_ATAN2);
48e1416a 8800
abe4dcf6 8801 if (atan2_fn)
8802 {
c2f47e15 8803 tree new_arg = builtin_save_expr (arg);
389dd41b 8804 tree r_arg = fold_build1_loc (loc, REALPART_EXPR, type, new_arg);
8805 tree i_arg = fold_build1_loc (loc, IMAGPART_EXPR, type, new_arg);
8806 return build_call_expr_loc (loc, atan2_fn, 2, i_arg, r_arg);
abe4dcf6 8807 }
8808 }
48e1416a 8809
abe4dcf6 8810 return NULL_TREE;
8811}
8812
3838b9ae 8813/* Fold a call to builtin frexp, we can assume the base is 2. */
8814
8815static tree
389dd41b 8816fold_builtin_frexp (location_t loc, tree arg0, tree arg1, tree rettype)
3838b9ae 8817{
8818 if (! validate_arg (arg0, REAL_TYPE) || ! validate_arg (arg1, POINTER_TYPE))
8819 return NULL_TREE;
48e1416a 8820
3838b9ae 8821 STRIP_NOPS (arg0);
48e1416a 8822
3838b9ae 8823 if (!(TREE_CODE (arg0) == REAL_CST && ! TREE_OVERFLOW (arg0)))
8824 return NULL_TREE;
48e1416a 8825
389dd41b 8826 arg1 = build_fold_indirect_ref_loc (loc, arg1);
3838b9ae 8827
8828 /* Proceed if a valid pointer type was passed in. */
8829 if (TYPE_MAIN_VARIANT (TREE_TYPE (arg1)) == integer_type_node)
8830 {
8831 const REAL_VALUE_TYPE *const value = TREE_REAL_CST_PTR (arg0);
8832 tree frac, exp;
48e1416a 8833
3838b9ae 8834 switch (value->cl)
8835 {
8836 case rvc_zero:
8837 /* For +-0, return (*exp = 0, +-0). */
8838 exp = integer_zero_node;
8839 frac = arg0;
8840 break;
8841 case rvc_nan:
8842 case rvc_inf:
8843 /* For +-NaN or +-Inf, *exp is unspecified, return arg0. */
389dd41b 8844 return omit_one_operand_loc (loc, rettype, arg0, arg1);
3838b9ae 8845 case rvc_normal:
8846 {
8847 /* Since the frexp function always expects base 2, and in
8848 GCC normalized significands are already in the range
8849 [0.5, 1.0), we have exactly what frexp wants. */
8850 REAL_VALUE_TYPE frac_rvt = *value;
8851 SET_REAL_EXP (&frac_rvt, 0);
8852 frac = build_real (rettype, frac_rvt);
7002a1c8 8853 exp = build_int_cst (integer_type_node, REAL_EXP (value));
3838b9ae 8854 }
8855 break;
8856 default:
8857 gcc_unreachable ();
8858 }
48e1416a 8859
3838b9ae 8860 /* Create the COMPOUND_EXPR (*arg1 = trunc, frac). */
389dd41b 8861 arg1 = fold_build2_loc (loc, MODIFY_EXPR, rettype, arg1, exp);
3838b9ae 8862 TREE_SIDE_EFFECTS (arg1) = 1;
389dd41b 8863 return fold_build2_loc (loc, COMPOUND_EXPR, rettype, arg1, frac);
3838b9ae 8864 }
8865
8866 return NULL_TREE;
8867}
8868
ebf8b4f5 8869/* Fold a call to builtin modf. */
8870
8871static tree
389dd41b 8872fold_builtin_modf (location_t loc, tree arg0, tree arg1, tree rettype)
ebf8b4f5 8873{
8874 if (! validate_arg (arg0, REAL_TYPE) || ! validate_arg (arg1, POINTER_TYPE))
8875 return NULL_TREE;
48e1416a 8876
ebf8b4f5 8877 STRIP_NOPS (arg0);
48e1416a 8878
ebf8b4f5 8879 if (!(TREE_CODE (arg0) == REAL_CST && ! TREE_OVERFLOW (arg0)))
8880 return NULL_TREE;
48e1416a 8881
389dd41b 8882 arg1 = build_fold_indirect_ref_loc (loc, arg1);
ebf8b4f5 8883
8884 /* Proceed if a valid pointer type was passed in. */
8885 if (TYPE_MAIN_VARIANT (TREE_TYPE (arg1)) == TYPE_MAIN_VARIANT (rettype))
8886 {
8887 const REAL_VALUE_TYPE *const value = TREE_REAL_CST_PTR (arg0);
8888 REAL_VALUE_TYPE trunc, frac;
8889
8890 switch (value->cl)
8891 {
8892 case rvc_nan:
8893 case rvc_zero:
8894 /* For +-NaN or +-0, return (*arg1 = arg0, arg0). */
8895 trunc = frac = *value;
8896 break;
8897 case rvc_inf:
8898 /* For +-Inf, return (*arg1 = arg0, +-0). */
8899 frac = dconst0;
8900 frac.sign = value->sign;
8901 trunc = *value;
8902 break;
8903 case rvc_normal:
8904 /* Return (*arg1 = trunc(arg0), arg0-trunc(arg0)). */
8905 real_trunc (&trunc, VOIDmode, value);
8906 real_arithmetic (&frac, MINUS_EXPR, value, &trunc);
8907 /* If the original number was negative and already
8908 integral, then the fractional part is -0.0. */
8909 if (value->sign && frac.cl == rvc_zero)
8910 frac.sign = value->sign;
8911 break;
8912 }
48e1416a 8913
ebf8b4f5 8914 /* Create the COMPOUND_EXPR (*arg1 = trunc, frac). */
389dd41b 8915 arg1 = fold_build2_loc (loc, MODIFY_EXPR, rettype, arg1,
ebf8b4f5 8916 build_real (rettype, trunc));
8917 TREE_SIDE_EFFECTS (arg1) = 1;
389dd41b 8918 return fold_build2_loc (loc, COMPOUND_EXPR, rettype, arg1,
ebf8b4f5 8919 build_real (rettype, frac));
8920 }
48e1416a 8921
ebf8b4f5 8922 return NULL_TREE;
8923}
8924
12f08300 8925/* Given a location LOC, an interclass builtin function decl FNDECL
8926 and its single argument ARG, return an folded expression computing
8927 the same, or NULL_TREE if we either couldn't or didn't want to fold
8928 (the latter happen if there's an RTL instruction available). */
8929
8930static tree
8931fold_builtin_interclass_mathfn (location_t loc, tree fndecl, tree arg)
8932{
8933 machine_mode mode;
8934
8935 if (!validate_arg (arg, REAL_TYPE))
8936 return NULL_TREE;
8937
8938 if (interclass_mathfn_icode (arg, fndecl) != CODE_FOR_nothing)
8939 return NULL_TREE;
8940
8941 mode = TYPE_MODE (TREE_TYPE (arg));
8942
8943 bool is_ibm_extended = MODE_COMPOSITE_P (mode);
7f38718f 8944
12f08300 8945 /* If there is no optab, try generic code. */
8946 switch (DECL_FUNCTION_CODE (fndecl))
8947 {
8948 tree result;
a65c4d64 8949
12f08300 8950 CASE_FLT_FN (BUILT_IN_ISINF):
8951 {
8952 /* isinf(x) -> isgreater(fabs(x),DBL_MAX). */
8953 tree const isgr_fn = builtin_decl_explicit (BUILT_IN_ISGREATER);
8954 tree type = TREE_TYPE (arg);
8955 REAL_VALUE_TYPE r;
8956 char buf[128];
8957
8958 if (is_ibm_extended)
8959 {
8960 /* NaN and Inf are encoded in the high-order double value
8961 only. The low-order value is not significant. */
8962 type = double_type_node;
8963 mode = DFmode;
8964 arg = fold_build1_loc (loc, NOP_EXPR, type, arg);
8965 }
8966 get_max_float (REAL_MODE_FORMAT (mode), buf, sizeof (buf));
8967 real_from_string (&r, buf);
8968 result = build_call_expr (isgr_fn, 2,
8969 fold_build1_loc (loc, ABS_EXPR, type, arg),
8970 build_real (type, r));
8971 return result;
8972 }
8973 CASE_FLT_FN (BUILT_IN_FINITE):
8974 case BUILT_IN_ISFINITE:
8975 {
8976 /* isfinite(x) -> islessequal(fabs(x),DBL_MAX). */
8977 tree const isle_fn = builtin_decl_explicit (BUILT_IN_ISLESSEQUAL);
8978 tree type = TREE_TYPE (arg);
8979 REAL_VALUE_TYPE r;
8980 char buf[128];
8981
8982 if (is_ibm_extended)
8983 {
8984 /* NaN and Inf are encoded in the high-order double value
8985 only. The low-order value is not significant. */
8986 type = double_type_node;
8987 mode = DFmode;
8988 arg = fold_build1_loc (loc, NOP_EXPR, type, arg);
8989 }
8990 get_max_float (REAL_MODE_FORMAT (mode), buf, sizeof (buf));
8991 real_from_string (&r, buf);
8992 result = build_call_expr (isle_fn, 2,
8993 fold_build1_loc (loc, ABS_EXPR, type, arg),
8994 build_real (type, r));
8995 /*result = fold_build2_loc (loc, UNGT_EXPR,
8996 TREE_TYPE (TREE_TYPE (fndecl)),
8997 fold_build1_loc (loc, ABS_EXPR, type, arg),
8998 build_real (type, r));
8999 result = fold_build1_loc (loc, TRUTH_NOT_EXPR,
9000 TREE_TYPE (TREE_TYPE (fndecl)),
9001 result);*/
9002 return result;
9003 }
9004 case BUILT_IN_ISNORMAL:
9005 {
9006 /* isnormal(x) -> isgreaterequal(fabs(x),DBL_MIN) &
9007 islessequal(fabs(x),DBL_MAX). */
9008 tree const isle_fn = builtin_decl_explicit (BUILT_IN_ISLESSEQUAL);
9009 tree type = TREE_TYPE (arg);
9010 tree orig_arg, max_exp, min_exp;
9011 machine_mode orig_mode = mode;
9012 REAL_VALUE_TYPE rmax, rmin;
9013 char buf[128];
9014
9015 orig_arg = arg = builtin_save_expr (arg);
9016 if (is_ibm_extended)
9017 {
9018 /* Use double to test the normal range of IBM extended
9019 precision. Emin for IBM extended precision is
9020 different to emin for IEEE double, being 53 higher
9021 since the low double exponent is at least 53 lower
9022 than the high double exponent. */
9023 type = double_type_node;
9024 mode = DFmode;
9025 arg = fold_build1_loc (loc, NOP_EXPR, type, arg);
9026 }
9027 arg = fold_build1_loc (loc, ABS_EXPR, type, arg);
9028
9029 get_max_float (REAL_MODE_FORMAT (mode), buf, sizeof (buf));
9030 real_from_string (&rmax, buf);
9031 sprintf (buf, "0x1p%d", REAL_MODE_FORMAT (orig_mode)->emin - 1);
9032 real_from_string (&rmin, buf);
9033 max_exp = build_real (type, rmax);
9034 min_exp = build_real (type, rmin);
9035
9036 max_exp = build_call_expr (isle_fn, 2, arg, max_exp);
9037 if (is_ibm_extended)
9038 {
9039 /* Testing the high end of the range is done just using
9040 the high double, using the same test as isfinite().
9041 For the subnormal end of the range we first test the
9042 high double, then if its magnitude is equal to the
9043 limit of 0x1p-969, we test whether the low double is
9044 non-zero and opposite sign to the high double. */
9045 tree const islt_fn = builtin_decl_explicit (BUILT_IN_ISLESS);
9046 tree const isgt_fn = builtin_decl_explicit (BUILT_IN_ISGREATER);
9047 tree gt_min = build_call_expr (isgt_fn, 2, arg, min_exp);
9048 tree eq_min = fold_build2 (EQ_EXPR, integer_type_node,
9049 arg, min_exp);
9050 tree as_complex = build1 (VIEW_CONVERT_EXPR,
9051 complex_double_type_node, orig_arg);
9052 tree hi_dbl = build1 (REALPART_EXPR, type, as_complex);
9053 tree lo_dbl = build1 (IMAGPART_EXPR, type, as_complex);
9054 tree zero = build_real (type, dconst0);
9055 tree hilt = build_call_expr (islt_fn, 2, hi_dbl, zero);
9056 tree lolt = build_call_expr (islt_fn, 2, lo_dbl, zero);
9057 tree logt = build_call_expr (isgt_fn, 2, lo_dbl, zero);
9058 tree ok_lo = fold_build1 (TRUTH_NOT_EXPR, integer_type_node,
9059 fold_build3 (COND_EXPR,
9060 integer_type_node,
9061 hilt, logt, lolt));
9062 eq_min = fold_build2 (TRUTH_ANDIF_EXPR, integer_type_node,
9063 eq_min, ok_lo);
9064 min_exp = fold_build2 (TRUTH_ORIF_EXPR, integer_type_node,
9065 gt_min, eq_min);
9066 }
9067 else
9068 {
9069 tree const isge_fn
9070 = builtin_decl_explicit (BUILT_IN_ISGREATEREQUAL);
9071 min_exp = build_call_expr (isge_fn, 2, arg, min_exp);
9072 }
9073 result = fold_build2 (BIT_AND_EXPR, integer_type_node,
9074 max_exp, min_exp);
9075 return result;
9076 }
9077 default:
9078 break;
9079 }
9080
9081 return NULL_TREE;
9082}
9083
9084/* Fold a call to __builtin_isnan(), __builtin_isinf, __builtin_finite.
c2f47e15 9085 ARG is the argument for the call. */
726069ba 9086
9087static tree
12f08300 9088fold_builtin_classify (location_t loc, tree fndecl, tree arg, int builtin_index)
726069ba 9089{
12f08300 9090 tree type = TREE_TYPE (TREE_TYPE (fndecl));
9091
c2f47e15 9092 if (!validate_arg (arg, REAL_TYPE))
d43cee80 9093 return NULL_TREE;
726069ba 9094
726069ba 9095 switch (builtin_index)
9096 {
12f08300 9097 case BUILT_IN_ISINF:
9098 if (!HONOR_INFINITIES (arg))
9099 return omit_one_operand_loc (loc, type, integer_zero_node, arg);
9100
9101 return NULL_TREE;
9102
c319d56a 9103 case BUILT_IN_ISINF_SIGN:
9104 {
9105 /* isinf_sign(x) -> isinf(x) ? (signbit(x) ? -1 : 1) : 0 */
9106 /* In a boolean context, GCC will fold the inner COND_EXPR to
9107 1. So e.g. "if (isinf_sign(x))" would be folded to just
9108 "if (isinf(x) ? 1 : 0)" which becomes "if (isinf(x))". */
6cfc7001 9109 tree signbit_fn = builtin_decl_explicit (BUILT_IN_SIGNBIT);
b9a16870 9110 tree isinf_fn = builtin_decl_explicit (BUILT_IN_ISINF);
c319d56a 9111 tree tmp = NULL_TREE;
9112
9113 arg = builtin_save_expr (arg);
9114
9115 if (signbit_fn && isinf_fn)
9116 {
389dd41b 9117 tree signbit_call = build_call_expr_loc (loc, signbit_fn, 1, arg);
9118 tree isinf_call = build_call_expr_loc (loc, isinf_fn, 1, arg);
c319d56a 9119
389dd41b 9120 signbit_call = fold_build2_loc (loc, NE_EXPR, integer_type_node,
c319d56a 9121 signbit_call, integer_zero_node);
389dd41b 9122 isinf_call = fold_build2_loc (loc, NE_EXPR, integer_type_node,
c319d56a 9123 isinf_call, integer_zero_node);
48e1416a 9124
389dd41b 9125 tmp = fold_build3_loc (loc, COND_EXPR, integer_type_node, signbit_call,
c319d56a 9126 integer_minus_one_node, integer_one_node);
389dd41b 9127 tmp = fold_build3_loc (loc, COND_EXPR, integer_type_node,
9128 isinf_call, tmp,
c319d56a 9129 integer_zero_node);
9130 }
9131
9132 return tmp;
9133 }
9134
12f08300 9135 case BUILT_IN_ISFINITE:
9136 if (!HONOR_NANS (arg)
9137 && !HONOR_INFINITIES (arg))
9138 return omit_one_operand_loc (loc, type, integer_one_node, arg);
9139
9140 return NULL_TREE;
9141
9142 case BUILT_IN_ISNAN:
9143 if (!HONOR_NANS (arg))
9144 return omit_one_operand_loc (loc, type, integer_zero_node, arg);
9145
9146 {
9147 bool is_ibm_extended = MODE_COMPOSITE_P (TYPE_MODE (TREE_TYPE (arg)));
9148 if (is_ibm_extended)
9149 {
9150 /* NaN and Inf are encoded in the high-order double value
9151 only. The low-order value is not significant. */
9152 arg = fold_build1_loc (loc, NOP_EXPR, double_type_node, arg);
9153 }
9154 }
9155 arg = builtin_save_expr (arg);
9156 return fold_build2_loc (loc, UNORDERED_EXPR, type, arg, arg);
9157
726069ba 9158 default:
64db345d 9159 gcc_unreachable ();
726069ba 9160 }
9161}
9162
12f08300 9163/* Fold a call to __builtin_fpclassify(int, int, int, int, int, ...).
9164 This builtin will generate code to return the appropriate floating
9165 point classification depending on the value of the floating point
9166 number passed in. The possible return values must be supplied as
9167 int arguments to the call in the following order: FP_NAN, FP_INFINITE,
9168 FP_NORMAL, FP_SUBNORMAL and FP_ZERO. The ellipses is for exactly
9169 one floating point argument which is "type generic". */
9170
9171static tree
9172fold_builtin_fpclassify (location_t loc, tree *args, int nargs)
9173{
9174 tree fp_nan, fp_infinite, fp_normal, fp_subnormal, fp_zero,
9175 arg, type, res, tmp;
9176 machine_mode mode;
9177 REAL_VALUE_TYPE r;
9178 char buf[128];
9179
9180 /* Verify the required arguments in the original call. */
9181 if (nargs != 6
9182 || !validate_arg (args[0], INTEGER_TYPE)
9183 || !validate_arg (args[1], INTEGER_TYPE)
9184 || !validate_arg (args[2], INTEGER_TYPE)
9185 || !validate_arg (args[3], INTEGER_TYPE)
9186 || !validate_arg (args[4], INTEGER_TYPE)
9187 || !validate_arg (args[5], REAL_TYPE))
9188 return NULL_TREE;
9189
9190 fp_nan = args[0];
9191 fp_infinite = args[1];
9192 fp_normal = args[2];
9193 fp_subnormal = args[3];
9194 fp_zero = args[4];
9195 arg = args[5];
9196 type = TREE_TYPE (arg);
9197 mode = TYPE_MODE (type);
9198 arg = builtin_save_expr (fold_build1_loc (loc, ABS_EXPR, type, arg));
9199
9200 /* fpclassify(x) ->
9201 isnan(x) ? FP_NAN :
9202 (fabs(x) == Inf ? FP_INFINITE :
9203 (fabs(x) >= DBL_MIN ? FP_NORMAL :
9204 (x == 0 ? FP_ZERO : FP_SUBNORMAL))). */
9205
9206 tmp = fold_build2_loc (loc, EQ_EXPR, integer_type_node, arg,
9207 build_real (type, dconst0));
9208 res = fold_build3_loc (loc, COND_EXPR, integer_type_node,
9209 tmp, fp_zero, fp_subnormal);
9210
9211 sprintf (buf, "0x1p%d", REAL_MODE_FORMAT (mode)->emin - 1);
9212 real_from_string (&r, buf);
9213 tmp = fold_build2_loc (loc, GE_EXPR, integer_type_node,
9214 arg, build_real (type, r));
9215 res = fold_build3_loc (loc, COND_EXPR, integer_type_node, tmp, fp_normal, res);
9216
9217 if (HONOR_INFINITIES (mode))
9218 {
9219 real_inf (&r);
9220 tmp = fold_build2_loc (loc, EQ_EXPR, integer_type_node, arg,
9221 build_real (type, r));
9222 res = fold_build3_loc (loc, COND_EXPR, integer_type_node, tmp,
9223 fp_infinite, res);
9224 }
9225
9226 if (HONOR_NANS (mode))
9227 {
9228 tmp = fold_build2_loc (loc, ORDERED_EXPR, integer_type_node, arg, arg);
9229 res = fold_build3_loc (loc, COND_EXPR, integer_type_node, tmp, res, fp_nan);
9230 }
9231
9232 return res;
9233}
9234
9bc9f15f 9235/* Fold a call to an unordered comparison function such as
d5019fe8 9236 __builtin_isgreater(). FNDECL is the FUNCTION_DECL for the function
c2f47e15 9237 being called and ARG0 and ARG1 are the arguments for the call.
726069ba 9238 UNORDERED_CODE and ORDERED_CODE are comparison codes that give
9239 the opposite of the desired result. UNORDERED_CODE is used
9240 for modes that can hold NaNs and ORDERED_CODE is used for
9241 the rest. */
9bc9f15f 9242
9243static tree
389dd41b 9244fold_builtin_unordered_cmp (location_t loc, tree fndecl, tree arg0, tree arg1,
9bc9f15f 9245 enum tree_code unordered_code,
9246 enum tree_code ordered_code)
9247{
859f903a 9248 tree type = TREE_TYPE (TREE_TYPE (fndecl));
9bc9f15f 9249 enum tree_code code;
6978db0d 9250 tree type0, type1;
9251 enum tree_code code0, code1;
9252 tree cmp_type = NULL_TREE;
9bc9f15f 9253
6978db0d 9254 type0 = TREE_TYPE (arg0);
9255 type1 = TREE_TYPE (arg1);
a0c938f0 9256
6978db0d 9257 code0 = TREE_CODE (type0);
9258 code1 = TREE_CODE (type1);
a0c938f0 9259
6978db0d 9260 if (code0 == REAL_TYPE && code1 == REAL_TYPE)
9261 /* Choose the wider of two real types. */
9262 cmp_type = TYPE_PRECISION (type0) >= TYPE_PRECISION (type1)
9263 ? type0 : type1;
9264 else if (code0 == REAL_TYPE && code1 == INTEGER_TYPE)
9265 cmp_type = type0;
9266 else if (code0 == INTEGER_TYPE && code1 == REAL_TYPE)
9267 cmp_type = type1;
a0c938f0 9268
389dd41b 9269 arg0 = fold_convert_loc (loc, cmp_type, arg0);
9270 arg1 = fold_convert_loc (loc, cmp_type, arg1);
859f903a 9271
9272 if (unordered_code == UNORDERED_EXPR)
9273 {
93633022 9274 if (!HONOR_NANS (arg0))
389dd41b 9275 return omit_two_operands_loc (loc, type, integer_zero_node, arg0, arg1);
9276 return fold_build2_loc (loc, UNORDERED_EXPR, type, arg0, arg1);
859f903a 9277 }
9bc9f15f 9278
93633022 9279 code = HONOR_NANS (arg0) ? unordered_code : ordered_code;
389dd41b 9280 return fold_build1_loc (loc, TRUTH_NOT_EXPR, type,
9281 fold_build2_loc (loc, code, type, arg0, arg1));
9bc9f15f 9282}
9283
0c93c8a9 9284/* Fold __builtin_{,s,u}{add,sub,mul}{,l,ll}_overflow, either into normal
9285 arithmetics if it can never overflow, or into internal functions that
9286 return both result of arithmetics and overflowed boolean flag in
732905bb 9287 a complex integer result, or some other check for overflow.
9288 Similarly fold __builtin_{add,sub,mul}_overflow_p to just the overflow
9289 checking part of that. */
0c93c8a9 9290
9291static tree
9292fold_builtin_arith_overflow (location_t loc, enum built_in_function fcode,
9293 tree arg0, tree arg1, tree arg2)
9294{
9295 enum internal_fn ifn = IFN_LAST;
732905bb 9296 /* The code of the expression corresponding to the type-generic
9297 built-in, or ERROR_MARK for the type-specific ones. */
9298 enum tree_code opcode = ERROR_MARK;
9299 bool ovf_only = false;
9300
0c93c8a9 9301 switch (fcode)
9302 {
732905bb 9303 case BUILT_IN_ADD_OVERFLOW_P:
9304 ovf_only = true;
9305 /* FALLTHRU */
0c93c8a9 9306 case BUILT_IN_ADD_OVERFLOW:
732905bb 9307 opcode = PLUS_EXPR;
9308 /* FALLTHRU */
0c93c8a9 9309 case BUILT_IN_SADD_OVERFLOW:
9310 case BUILT_IN_SADDL_OVERFLOW:
9311 case BUILT_IN_SADDLL_OVERFLOW:
9312 case BUILT_IN_UADD_OVERFLOW:
9313 case BUILT_IN_UADDL_OVERFLOW:
9314 case BUILT_IN_UADDLL_OVERFLOW:
9315 ifn = IFN_ADD_OVERFLOW;
9316 break;
732905bb 9317 case BUILT_IN_SUB_OVERFLOW_P:
9318 ovf_only = true;
9319 /* FALLTHRU */
0c93c8a9 9320 case BUILT_IN_SUB_OVERFLOW:
732905bb 9321 opcode = MINUS_EXPR;
9322 /* FALLTHRU */
0c93c8a9 9323 case BUILT_IN_SSUB_OVERFLOW:
9324 case BUILT_IN_SSUBL_OVERFLOW:
9325 case BUILT_IN_SSUBLL_OVERFLOW:
9326 case BUILT_IN_USUB_OVERFLOW:
9327 case BUILT_IN_USUBL_OVERFLOW:
9328 case BUILT_IN_USUBLL_OVERFLOW:
9329 ifn = IFN_SUB_OVERFLOW;
9330 break;
732905bb 9331 case BUILT_IN_MUL_OVERFLOW_P:
9332 ovf_only = true;
9333 /* FALLTHRU */
0c93c8a9 9334 case BUILT_IN_MUL_OVERFLOW:
732905bb 9335 opcode = MULT_EXPR;
9336 /* FALLTHRU */
0c93c8a9 9337 case BUILT_IN_SMUL_OVERFLOW:
9338 case BUILT_IN_SMULL_OVERFLOW:
9339 case BUILT_IN_SMULLL_OVERFLOW:
9340 case BUILT_IN_UMUL_OVERFLOW:
9341 case BUILT_IN_UMULL_OVERFLOW:
9342 case BUILT_IN_UMULLL_OVERFLOW:
9343 ifn = IFN_MUL_OVERFLOW;
9344 break;
9345 default:
9346 gcc_unreachable ();
9347 }
732905bb 9348
9349 /* For the "generic" overloads, the first two arguments can have different
9350 types and the last argument determines the target type to use to check
9351 for overflow. The arguments of the other overloads all have the same
9352 type. */
9353 tree type = ovf_only ? TREE_TYPE (arg2) : TREE_TYPE (TREE_TYPE (arg2));
9354
9355 /* For the __builtin_{add,sub,mul}_overflow_p builtins, when the first two
9356 arguments are constant, attempt to fold the built-in call into a constant
9357 expression indicating whether or not it detected an overflow. */
9358 if (ovf_only
9359 && TREE_CODE (arg0) == INTEGER_CST
9360 && TREE_CODE (arg1) == INTEGER_CST)
9361 /* Perform the computation in the target type and check for overflow. */
9362 return omit_one_operand_loc (loc, boolean_type_node,
9363 arith_overflowed_p (opcode, type, arg0, arg1)
9364 ? boolean_true_node : boolean_false_node,
9365 arg2);
9366
0c93c8a9 9367 tree ctype = build_complex_type (type);
9368 tree call = build_call_expr_internal_loc (loc, ifn, ctype,
9369 2, arg0, arg1);
9370 tree tgt = save_expr (call);
9371 tree intres = build1_loc (loc, REALPART_EXPR, type, tgt);
9372 tree ovfres = build1_loc (loc, IMAGPART_EXPR, type, tgt);
9373 ovfres = fold_convert_loc (loc, boolean_type_node, ovfres);
732905bb 9374
9375 if (ovf_only)
9376 return omit_one_operand_loc (loc, boolean_type_node, ovfres, arg2);
9377
9378 tree mem_arg2 = build_fold_indirect_ref_loc (loc, arg2);
0c93c8a9 9379 tree store
9380 = fold_build2_loc (loc, MODIFY_EXPR, void_type_node, mem_arg2, intres);
9381 return build2_loc (loc, COMPOUND_EXPR, boolean_type_node, store, ovfres);
9382}
9383
c388a0cf 9384/* Fold a call to __builtin_FILE to a constant string. */
9385
9386static inline tree
9387fold_builtin_FILE (location_t loc)
9388{
9389 if (const char *fname = LOCATION_FILE (loc))
859b51f8 9390 {
9391 /* The documentation says this builtin is equivalent to the preprocessor
9392 __FILE__ macro so it appears appropriate to use the same file prefix
9393 mappings. */
9394 fname = remap_macro_filename (fname);
c388a0cf 9395 return build_string_literal (strlen (fname) + 1, fname);
859b51f8 9396 }
c388a0cf 9397
9398 return build_string_literal (1, "");
9399}
9400
9401/* Fold a call to __builtin_FUNCTION to a constant string. */
9402
9403static inline tree
9404fold_builtin_FUNCTION ()
9405{
c2d38635 9406 const char *name = "";
9407
c388a0cf 9408 if (current_function_decl)
c2d38635 9409 name = lang_hooks.decl_printable_name (current_function_decl, 0);
c388a0cf 9410
c2d38635 9411 return build_string_literal (strlen (name) + 1, name);
c388a0cf 9412}
9413
9414/* Fold a call to __builtin_LINE to an integer constant. */
9415
9416static inline tree
9417fold_builtin_LINE (location_t loc, tree type)
9418{
9419 return build_int_cst (type, LOCATION_LINE (loc));
9420}
9421
c2f47e15 9422/* Fold a call to built-in function FNDECL with 0 arguments.
e80cc485 9423 This function returns NULL_TREE if no simplification was possible. */
650e4c94 9424
4ee9c684 9425static tree
e80cc485 9426fold_builtin_0 (location_t loc, tree fndecl)
650e4c94 9427{
e9f80ff5 9428 tree type = TREE_TYPE (TREE_TYPE (fndecl));
c2f47e15 9429 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
189b3398 9430 switch (fcode)
650e4c94 9431 {
c388a0cf 9432 case BUILT_IN_FILE:
9433 return fold_builtin_FILE (loc);
9434
9435 case BUILT_IN_FUNCTION:
9436 return fold_builtin_FUNCTION ();
9437
9438 case BUILT_IN_LINE:
9439 return fold_builtin_LINE (loc, type);
9440
c2f47e15 9441 CASE_FLT_FN (BUILT_IN_INF):
012f068a 9442 CASE_FLT_FN_FLOATN_NX (BUILT_IN_INF):
c2f47e15 9443 case BUILT_IN_INFD32:
9444 case BUILT_IN_INFD64:
9445 case BUILT_IN_INFD128:
389dd41b 9446 return fold_builtin_inf (loc, type, true);
7c2f0500 9447
c2f47e15 9448 CASE_FLT_FN (BUILT_IN_HUGE_VAL):
012f068a 9449 CASE_FLT_FN_FLOATN_NX (BUILT_IN_HUGE_VAL):
389dd41b 9450 return fold_builtin_inf (loc, type, false);
7c2f0500 9451
c2f47e15 9452 case BUILT_IN_CLASSIFY_TYPE:
9453 return fold_builtin_classify_type (NULL_TREE);
7c2f0500 9454
c2f47e15 9455 default:
9456 break;
9457 }
9458 return NULL_TREE;
9459}
7c2f0500 9460
c2f47e15 9461/* Fold a call to built-in function FNDECL with 1 argument, ARG0.
e80cc485 9462 This function returns NULL_TREE if no simplification was possible. */
7c2f0500 9463
c2f47e15 9464static tree
e80cc485 9465fold_builtin_1 (location_t loc, tree fndecl, tree arg0)
c2f47e15 9466{
9467 tree type = TREE_TYPE (TREE_TYPE (fndecl));
9468 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
6c21be92 9469
9470 if (TREE_CODE (arg0) == ERROR_MARK)
9471 return NULL_TREE;
9472
744fe358 9473 if (tree ret = fold_const_call (as_combined_fn (fcode), type, arg0))
6c21be92 9474 return ret;
9475
c2f47e15 9476 switch (fcode)
9477 {
650e4c94 9478 case BUILT_IN_CONSTANT_P:
7c2f0500 9479 {
c2f47e15 9480 tree val = fold_builtin_constant_p (arg0);
7c2f0500 9481
7c2f0500 9482 /* Gimplification will pull the CALL_EXPR for the builtin out of
9483 an if condition. When not optimizing, we'll not CSE it back.
9484 To avoid link error types of regressions, return false now. */
9485 if (!val && !optimize)
9486 val = integer_zero_node;
9487
9488 return val;
9489 }
650e4c94 9490
539a3a92 9491 case BUILT_IN_CLASSIFY_TYPE:
c2f47e15 9492 return fold_builtin_classify_type (arg0);
539a3a92 9493
650e4c94 9494 case BUILT_IN_STRLEN:
c7cbde74 9495 return fold_builtin_strlen (loc, type, arg0);
650e4c94 9496
4f35b1fc 9497 CASE_FLT_FN (BUILT_IN_FABS):
012f068a 9498 CASE_FLT_FN_FLOATN_NX (BUILT_IN_FABS):
8aa32773 9499 case BUILT_IN_FABSD32:
9500 case BUILT_IN_FABSD64:
9501 case BUILT_IN_FABSD128:
389dd41b 9502 return fold_builtin_fabs (loc, arg0, type);
d1aade50 9503
9504 case BUILT_IN_ABS:
9505 case BUILT_IN_LABS:
9506 case BUILT_IN_LLABS:
9507 case BUILT_IN_IMAXABS:
389dd41b 9508 return fold_builtin_abs (loc, arg0, type);
c63f4ad3 9509
4f35b1fc 9510 CASE_FLT_FN (BUILT_IN_CONJ):
239d491a 9511 if (validate_arg (arg0, COMPLEX_TYPE)
48e1416a 9512 && TREE_CODE (TREE_TYPE (TREE_TYPE (arg0))) == REAL_TYPE)
389dd41b 9513 return fold_build1_loc (loc, CONJ_EXPR, type, arg0);
c2f47e15 9514 break;
36d3581d 9515
4f35b1fc 9516 CASE_FLT_FN (BUILT_IN_CREAL):
239d491a 9517 if (validate_arg (arg0, COMPLEX_TYPE)
48e1416a 9518 && TREE_CODE (TREE_TYPE (TREE_TYPE (arg0))) == REAL_TYPE)
7082509e 9519 return non_lvalue_loc (loc, fold_build1_loc (loc, REALPART_EXPR, type, arg0));
c2f47e15 9520 break;
36d3581d 9521
4f35b1fc 9522 CASE_FLT_FN (BUILT_IN_CIMAG):
b0ce8887 9523 if (validate_arg (arg0, COMPLEX_TYPE)
9524 && TREE_CODE (TREE_TYPE (TREE_TYPE (arg0))) == REAL_TYPE)
389dd41b 9525 return non_lvalue_loc (loc, fold_build1_loc (loc, IMAGPART_EXPR, type, arg0));
c2f47e15 9526 break;
36d3581d 9527
6c21be92 9528 CASE_FLT_FN (BUILT_IN_CARG):
9529 return fold_builtin_carg (loc, arg0, type);
c2373fdb 9530
6c21be92 9531 case BUILT_IN_ISASCII:
9532 return fold_builtin_isascii (loc, arg0);
48e1416a 9533
6c21be92 9534 case BUILT_IN_TOASCII:
9535 return fold_builtin_toascii (loc, arg0);
48e1416a 9536
6c21be92 9537 case BUILT_IN_ISDIGIT:
9538 return fold_builtin_isdigit (loc, arg0);
48e1416a 9539
12f08300 9540 CASE_FLT_FN (BUILT_IN_FINITE):
9541 case BUILT_IN_FINITED32:
9542 case BUILT_IN_FINITED64:
9543 case BUILT_IN_FINITED128:
9544 case BUILT_IN_ISFINITE:
9545 {
9546 tree ret = fold_builtin_classify (loc, fndecl, arg0, BUILT_IN_ISFINITE);
9547 if (ret)
9548 return ret;
9549 return fold_builtin_interclass_mathfn (loc, fndecl, arg0);
9550 }
9551
9552 CASE_FLT_FN (BUILT_IN_ISINF):
9553 case BUILT_IN_ISINFD32:
9554 case BUILT_IN_ISINFD64:
9555 case BUILT_IN_ISINFD128:
9556 {
9557 tree ret = fold_builtin_classify (loc, fndecl, arg0, BUILT_IN_ISINF);
9558 if (ret)
9559 return ret;
9560 return fold_builtin_interclass_mathfn (loc, fndecl, arg0);
9561 }
9562
9563 case BUILT_IN_ISNORMAL:
9564 return fold_builtin_interclass_mathfn (loc, fndecl, arg0);
9565
6c21be92 9566 case BUILT_IN_ISINF_SIGN:
12f08300 9567 return fold_builtin_classify (loc, fndecl, arg0, BUILT_IN_ISINF_SIGN);
9568
9569 CASE_FLT_FN (BUILT_IN_ISNAN):
9570 case BUILT_IN_ISNAND32:
9571 case BUILT_IN_ISNAND64:
9572 case BUILT_IN_ISNAND128:
9573 return fold_builtin_classify (loc, fndecl, arg0, BUILT_IN_ISNAN);
48e1416a 9574
6c21be92 9575 case BUILT_IN_FREE:
9576 if (integer_zerop (arg0))
9577 return build_empty_stmt (loc);
d064d976 9578 break;
c63f4ad3 9579
6c21be92 9580 default:
8b4af95f 9581 break;
6c21be92 9582 }
805e22b2 9583
6c21be92 9584 return NULL_TREE;
3bc5c41b 9585
6c21be92 9586}
728bac60 9587
6c21be92 9588/* Fold a call to built-in function FNDECL with 2 arguments, ARG0 and ARG1.
9589 This function returns NULL_TREE if no simplification was possible. */
c2f47e15 9590
9591static tree
e80cc485 9592fold_builtin_2 (location_t loc, tree fndecl, tree arg0, tree arg1)
c2f47e15 9593{
9594 tree type = TREE_TYPE (TREE_TYPE (fndecl));
9595 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
9596
6c21be92 9597 if (TREE_CODE (arg0) == ERROR_MARK
9598 || TREE_CODE (arg1) == ERROR_MARK)
9599 return NULL_TREE;
e5407ca6 9600
744fe358 9601 if (tree ret = fold_const_call (as_combined_fn (fcode), type, arg0, arg1))
6c21be92 9602 return ret;
e84da7c1 9603
6c21be92 9604 switch (fcode)
9605 {
e84da7c1 9606 CASE_FLT_FN_REENT (BUILT_IN_GAMMA): /* GAMMA_R */
9607 CASE_FLT_FN_REENT (BUILT_IN_LGAMMA): /* LGAMMA_R */
9608 if (validate_arg (arg0, REAL_TYPE)
9af5ce0c 9609 && validate_arg (arg1, POINTER_TYPE))
e84da7c1 9610 return do_mpfr_lgamma_r (arg0, arg1, type);
9611 break;
c2f47e15 9612
3838b9ae 9613 CASE_FLT_FN (BUILT_IN_FREXP):
389dd41b 9614 return fold_builtin_frexp (loc, arg0, arg1, type);
3838b9ae 9615
ebf8b4f5 9616 CASE_FLT_FN (BUILT_IN_MODF):
389dd41b 9617 return fold_builtin_modf (loc, arg0, arg1, type);
ebf8b4f5 9618
c2f47e15 9619 case BUILT_IN_STRSPN:
389dd41b 9620 return fold_builtin_strspn (loc, arg0, arg1);
c2f47e15 9621
9622 case BUILT_IN_STRCSPN:
389dd41b 9623 return fold_builtin_strcspn (loc, arg0, arg1);
c2f47e15 9624
c2f47e15 9625 case BUILT_IN_STRPBRK:
389dd41b 9626 return fold_builtin_strpbrk (loc, arg0, arg1, type);
c2f47e15 9627
9628 case BUILT_IN_EXPECT:
01107f42 9629 return fold_builtin_expect (loc, arg0, arg1, NULL_TREE, NULL_TREE);
c2f47e15 9630
9bc9f15f 9631 case BUILT_IN_ISGREATER:
389dd41b 9632 return fold_builtin_unordered_cmp (loc, fndecl,
9633 arg0, arg1, UNLE_EXPR, LE_EXPR);
9bc9f15f 9634 case BUILT_IN_ISGREATEREQUAL:
389dd41b 9635 return fold_builtin_unordered_cmp (loc, fndecl,
9636 arg0, arg1, UNLT_EXPR, LT_EXPR);
9bc9f15f 9637 case BUILT_IN_ISLESS:
389dd41b 9638 return fold_builtin_unordered_cmp (loc, fndecl,
9639 arg0, arg1, UNGE_EXPR, GE_EXPR);
9bc9f15f 9640 case BUILT_IN_ISLESSEQUAL:
389dd41b 9641 return fold_builtin_unordered_cmp (loc, fndecl,
9642 arg0, arg1, UNGT_EXPR, GT_EXPR);
9bc9f15f 9643 case BUILT_IN_ISLESSGREATER:
389dd41b 9644 return fold_builtin_unordered_cmp (loc, fndecl,
9645 arg0, arg1, UNEQ_EXPR, EQ_EXPR);
9bc9f15f 9646 case BUILT_IN_ISUNORDERED:
389dd41b 9647 return fold_builtin_unordered_cmp (loc, fndecl,
9648 arg0, arg1, UNORDERED_EXPR,
d5019fe8 9649 NOP_EXPR);
9bc9f15f 9650
7c2f0500 9651 /* We do the folding for va_start in the expander. */
9652 case BUILT_IN_VA_START:
9653 break;
f0613857 9654
0a39fd54 9655 case BUILT_IN_OBJECT_SIZE:
c2f47e15 9656 return fold_builtin_object_size (arg0, arg1);
0a39fd54 9657
1cd6e20d 9658 case BUILT_IN_ATOMIC_ALWAYS_LOCK_FREE:
9659 return fold_builtin_atomic_always_lock_free (arg0, arg1);
9660
9661 case BUILT_IN_ATOMIC_IS_LOCK_FREE:
9662 return fold_builtin_atomic_is_lock_free (arg0, arg1);
9663
c2f47e15 9664 default:
9665 break;
9666 }
9667 return NULL_TREE;
9668}
9669
9670/* Fold a call to built-in function FNDECL with 3 arguments, ARG0, ARG1,
e80cc485 9671 and ARG2.
c2f47e15 9672 This function returns NULL_TREE if no simplification was possible. */
9673
9674static tree
389dd41b 9675fold_builtin_3 (location_t loc, tree fndecl,
e80cc485 9676 tree arg0, tree arg1, tree arg2)
c2f47e15 9677{
9678 tree type = TREE_TYPE (TREE_TYPE (fndecl));
9679 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
6c21be92 9680
9681 if (TREE_CODE (arg0) == ERROR_MARK
9682 || TREE_CODE (arg1) == ERROR_MARK
9683 || TREE_CODE (arg2) == ERROR_MARK)
9684 return NULL_TREE;
9685
744fe358 9686 if (tree ret = fold_const_call (as_combined_fn (fcode), type,
9687 arg0, arg1, arg2))
6c21be92 9688 return ret;
9689
c2f47e15 9690 switch (fcode)
9691 {
9692
9693 CASE_FLT_FN (BUILT_IN_SINCOS):
389dd41b 9694 return fold_builtin_sincos (loc, arg0, arg1, arg2);
c2f47e15 9695
e5407ca6 9696 CASE_FLT_FN (BUILT_IN_REMQUO):
9697 if (validate_arg (arg0, REAL_TYPE)
9af5ce0c 9698 && validate_arg (arg1, REAL_TYPE)
9699 && validate_arg (arg2, POINTER_TYPE))
e5407ca6 9700 return do_mpfr_remquo (arg0, arg1, arg2);
9701 break;
e5407ca6 9702
c2f47e15 9703 case BUILT_IN_MEMCMP:
7f38a6aa 9704 return fold_builtin_memcmp (loc, arg0, arg1, arg2);
c2f47e15 9705
c83059be 9706 case BUILT_IN_EXPECT:
01107f42 9707 return fold_builtin_expect (loc, arg0, arg1, arg2, NULL_TREE);
9708
9709 case BUILT_IN_EXPECT_WITH_PROBABILITY:
9710 return fold_builtin_expect (loc, arg0, arg1, NULL_TREE, arg2);
c83059be 9711
0c93c8a9 9712 case BUILT_IN_ADD_OVERFLOW:
9713 case BUILT_IN_SUB_OVERFLOW:
9714 case BUILT_IN_MUL_OVERFLOW:
732905bb 9715 case BUILT_IN_ADD_OVERFLOW_P:
9716 case BUILT_IN_SUB_OVERFLOW_P:
9717 case BUILT_IN_MUL_OVERFLOW_P:
0c93c8a9 9718 case BUILT_IN_SADD_OVERFLOW:
9719 case BUILT_IN_SADDL_OVERFLOW:
9720 case BUILT_IN_SADDLL_OVERFLOW:
9721 case BUILT_IN_SSUB_OVERFLOW:
9722 case BUILT_IN_SSUBL_OVERFLOW:
9723 case BUILT_IN_SSUBLL_OVERFLOW:
9724 case BUILT_IN_SMUL_OVERFLOW:
9725 case BUILT_IN_SMULL_OVERFLOW:
9726 case BUILT_IN_SMULLL_OVERFLOW:
9727 case BUILT_IN_UADD_OVERFLOW:
9728 case BUILT_IN_UADDL_OVERFLOW:
9729 case BUILT_IN_UADDLL_OVERFLOW:
9730 case BUILT_IN_USUB_OVERFLOW:
9731 case BUILT_IN_USUBL_OVERFLOW:
9732 case BUILT_IN_USUBLL_OVERFLOW:
9733 case BUILT_IN_UMUL_OVERFLOW:
9734 case BUILT_IN_UMULL_OVERFLOW:
9735 case BUILT_IN_UMULLL_OVERFLOW:
9736 return fold_builtin_arith_overflow (loc, fcode, arg0, arg1, arg2);
9737
650e4c94 9738 default:
9739 break;
9740 }
c2f47e15 9741 return NULL_TREE;
9742}
650e4c94 9743
c2f47e15 9744/* Fold a call to built-in function FNDECL. ARGS is an array of NARGS
9d884767 9745 arguments. IGNORE is true if the result of the
9746 function call is ignored. This function returns NULL_TREE if no
9747 simplification was possible. */
48e1416a 9748
2165588a 9749tree
e80cc485 9750fold_builtin_n (location_t loc, tree fndecl, tree *args, int nargs, bool)
c2f47e15 9751{
9752 tree ret = NULL_TREE;
a7f5bb2d 9753
c2f47e15 9754 switch (nargs)
9755 {
9756 case 0:
e80cc485 9757 ret = fold_builtin_0 (loc, fndecl);
c2f47e15 9758 break;
9759 case 1:
e80cc485 9760 ret = fold_builtin_1 (loc, fndecl, args[0]);
c2f47e15 9761 break;
9762 case 2:
e80cc485 9763 ret = fold_builtin_2 (loc, fndecl, args[0], args[1]);
c2f47e15 9764 break;
9765 case 3:
e80cc485 9766 ret = fold_builtin_3 (loc, fndecl, args[0], args[1], args[2]);
c2f47e15 9767 break;
c2f47e15 9768 default:
12f08300 9769 ret = fold_builtin_varargs (loc, fndecl, args, nargs);
c2f47e15 9770 break;
9771 }
9772 if (ret)
9773 {
75a70cf9 9774 ret = build1 (NOP_EXPR, TREE_TYPE (ret), ret);
389dd41b 9775 SET_EXPR_LOCATION (ret, loc);
c2f47e15 9776 return ret;
9777 }
9778 return NULL_TREE;
9779}
9780
0e80b01d 9781/* Construct a new CALL_EXPR to FNDECL using the tail of the argument
9782 list ARGS along with N new arguments in NEWARGS. SKIP is the number
9783 of arguments in ARGS to be omitted. OLDNARGS is the number of
9784 elements in ARGS. */
c2f47e15 9785
9786static tree
0e80b01d 9787rewrite_call_expr_valist (location_t loc, int oldnargs, tree *args,
9788 int skip, tree fndecl, int n, va_list newargs)
c2f47e15 9789{
0e80b01d 9790 int nargs = oldnargs - skip + n;
9791 tree *buffer;
c2f47e15 9792
0e80b01d 9793 if (n > 0)
c2f47e15 9794 {
0e80b01d 9795 int i, j;
c2f47e15 9796
0e80b01d 9797 buffer = XALLOCAVEC (tree, nargs);
9798 for (i = 0; i < n; i++)
9799 buffer[i] = va_arg (newargs, tree);
9800 for (j = skip; j < oldnargs; j++, i++)
9801 buffer[i] = args[j];
9802 }
9803 else
9804 buffer = args + skip;
19fbe3a4 9805
0e80b01d 9806 return build_call_expr_loc_array (loc, fndecl, nargs, buffer);
9807}
c2f47e15 9808
198622c0 9809/* Return true if FNDECL shouldn't be folded right now.
9810 If a built-in function has an inline attribute always_inline
9811 wrapper, defer folding it after always_inline functions have
9812 been inlined, otherwise e.g. -D_FORTIFY_SOURCE checking
9813 might not be performed. */
9814
51d2c51e 9815bool
198622c0 9816avoid_folding_inline_builtin (tree fndecl)
9817{
9818 return (DECL_DECLARED_INLINE_P (fndecl)
9819 && DECL_DISREGARD_INLINE_LIMITS (fndecl)
9820 && cfun
9821 && !cfun->always_inline_functions_inlined
9822 && lookup_attribute ("always_inline", DECL_ATTRIBUTES (fndecl)));
9823}
9824
4ee9c684 9825/* A wrapper function for builtin folding that prevents warnings for
491e04ef 9826 "statement without effect" and the like, caused by removing the
4ee9c684 9827 call node earlier than the warning is generated. */
9828
9829tree
389dd41b 9830fold_call_expr (location_t loc, tree exp, bool ignore)
4ee9c684 9831{
c2f47e15 9832 tree ret = NULL_TREE;
9833 tree fndecl = get_callee_fndecl (exp);
a0e9bfbb 9834 if (fndecl && fndecl_built_in_p (fndecl)
48dc2227 9835 /* If CALL_EXPR_VA_ARG_PACK is set, the arguments aren't finalized
9836 yet. Defer folding until we see all the arguments
9837 (after inlining). */
9838 && !CALL_EXPR_VA_ARG_PACK (exp))
9839 {
9840 int nargs = call_expr_nargs (exp);
9841
9842 /* Before gimplification CALL_EXPR_VA_ARG_PACK is not set, but
9843 instead last argument is __builtin_va_arg_pack (). Defer folding
9844 even in that case, until arguments are finalized. */
9845 if (nargs && TREE_CODE (CALL_EXPR_ARG (exp, nargs - 1)) == CALL_EXPR)
9846 {
9847 tree fndecl2 = get_callee_fndecl (CALL_EXPR_ARG (exp, nargs - 1));
a0e9bfbb 9848 if (fndecl2 && fndecl_built_in_p (fndecl2, BUILT_IN_VA_ARG_PACK))
48dc2227 9849 return NULL_TREE;
9850 }
9851
198622c0 9852 if (avoid_folding_inline_builtin (fndecl))
9853 return NULL_TREE;
9854
c2f47e15 9855 if (DECL_BUILT_IN_CLASS (fndecl) == BUILT_IN_MD)
97d67146 9856 return targetm.fold_builtin (fndecl, call_expr_nargs (exp),
9857 CALL_EXPR_ARGP (exp), ignore);
c2f47e15 9858 else
9859 {
9d884767 9860 tree *args = CALL_EXPR_ARGP (exp);
9861 ret = fold_builtin_n (loc, fndecl, args, nargs, ignore);
c2f47e15 9862 if (ret)
389dd41b 9863 return ret;
c2f47e15 9864 }
4ee9c684 9865 }
c2f47e15 9866 return NULL_TREE;
9867}
48e1416a 9868
9d884767 9869/* Fold a CALL_EXPR with type TYPE with FN as the function expression.
9870 N arguments are passed in the array ARGARRAY. Return a folded
9871 expression or NULL_TREE if no simplification was possible. */
805e22b2 9872
9873tree
9d884767 9874fold_builtin_call_array (location_t loc, tree,
d01f58f9 9875 tree fn,
9876 int n,
9877 tree *argarray)
7e15618b 9878{
9d884767 9879 if (TREE_CODE (fn) != ADDR_EXPR)
9880 return NULL_TREE;
c2f47e15 9881
9d884767 9882 tree fndecl = TREE_OPERAND (fn, 0);
9883 if (TREE_CODE (fndecl) == FUNCTION_DECL
a0e9bfbb 9884 && fndecl_built_in_p (fndecl))
9d884767 9885 {
9886 /* If last argument is __builtin_va_arg_pack (), arguments to this
9887 function are not finalized yet. Defer folding until they are. */
9888 if (n && TREE_CODE (argarray[n - 1]) == CALL_EXPR)
9889 {
9890 tree fndecl2 = get_callee_fndecl (argarray[n - 1]);
a0e9bfbb 9891 if (fndecl2 && fndecl_built_in_p (fndecl2, BUILT_IN_VA_ARG_PACK))
9d884767 9892 return NULL_TREE;
9893 }
9894 if (avoid_folding_inline_builtin (fndecl))
9895 return NULL_TREE;
9896 if (DECL_BUILT_IN_CLASS (fndecl) == BUILT_IN_MD)
9897 return targetm.fold_builtin (fndecl, n, argarray, false);
9898 else
9899 return fold_builtin_n (loc, fndecl, argarray, n, false);
9900 }
c2f47e15 9901
9d884767 9902 return NULL_TREE;
c2f47e15 9903}
9904
af1409ad 9905/* Construct a new CALL_EXPR using the tail of the argument list of EXP
9906 along with N new arguments specified as the "..." parameters. SKIP
9907 is the number of arguments in EXP to be omitted. This function is used
9908 to do varargs-to-varargs transformations. */
9909
9910static tree
9911rewrite_call_expr (location_t loc, tree exp, int skip, tree fndecl, int n, ...)
9912{
9913 va_list ap;
9914 tree t;
9915
9916 va_start (ap, n);
9917 t = rewrite_call_expr_valist (loc, call_expr_nargs (exp),
9918 CALL_EXPR_ARGP (exp), skip, fndecl, n, ap);
9919 va_end (ap);
c2f47e15 9920
af1409ad 9921 return t;
c2f47e15 9922}
9923
9924/* Validate a single argument ARG against a tree code CODE representing
184fac50 9925 a type. Return true when argument is valid. */
48e1416a 9926
c2f47e15 9927static bool
184fac50 9928validate_arg (const_tree arg, enum tree_code code)
c2f47e15 9929{
9930 if (!arg)
9931 return false;
9932 else if (code == POINTER_TYPE)
184fac50 9933 return POINTER_TYPE_P (TREE_TYPE (arg));
c7f617c2 9934 else if (code == INTEGER_TYPE)
9935 return INTEGRAL_TYPE_P (TREE_TYPE (arg));
c2f47e15 9936 return code == TREE_CODE (TREE_TYPE (arg));
7e15618b 9937}
0eb671f7 9938
75a70cf9 9939/* This function validates the types of a function call argument list
9940 against a specified list of tree_codes. If the last specifier is a 0,
9941 that represents an ellipses, otherwise the last specifier must be a
9942 VOID_TYPE.
9943
9944 This is the GIMPLE version of validate_arglist. Eventually we want to
9945 completely convert builtins.c to work from GIMPLEs and the tree based
9946 validate_arglist will then be removed. */
9947
9948bool
1a91d914 9949validate_gimple_arglist (const gcall *call, ...)
75a70cf9 9950{
9951 enum tree_code code;
9952 bool res = 0;
9953 va_list ap;
9954 const_tree arg;
9955 size_t i;
9956
9957 va_start (ap, call);
9958 i = 0;
9959
9960 do
9961 {
d62e827b 9962 code = (enum tree_code) va_arg (ap, int);
75a70cf9 9963 switch (code)
9964 {
9965 case 0:
9966 /* This signifies an ellipses, any further arguments are all ok. */
9967 res = true;
9968 goto end;
9969 case VOID_TYPE:
9970 /* This signifies an endlink, if no arguments remain, return
9971 true, otherwise return false. */
9972 res = (i == gimple_call_num_args (call));
9973 goto end;
9974 default:
9975 /* If no parameters remain or the parameter's code does not
9976 match the specified code, return false. Otherwise continue
9977 checking any remaining arguments. */
9978 arg = gimple_call_arg (call, i++);
9979 if (!validate_arg (arg, code))
9980 goto end;
9981 break;
9982 }
9983 }
9984 while (1);
9985
9986 /* We need gotos here since we can only have one VA_CLOSE in a
9987 function. */
9988 end: ;
9989 va_end (ap);
9990
9991 return res;
9992}
9993
fc2a2dcb 9994/* Default target-specific builtin expander that does nothing. */
9995
9996rtx
aecda0d6 9997default_expand_builtin (tree exp ATTRIBUTE_UNUSED,
9998 rtx target ATTRIBUTE_UNUSED,
9999 rtx subtarget ATTRIBUTE_UNUSED,
3754d046 10000 machine_mode mode ATTRIBUTE_UNUSED,
aecda0d6 10001 int ignore ATTRIBUTE_UNUSED)
fc2a2dcb 10002{
10003 return NULL_RTX;
10004}
c7926a82 10005
01537105 10006/* Returns true is EXP represents data that would potentially reside
10007 in a readonly section. */
10008
b9ea678c 10009bool
01537105 10010readonly_data_expr (tree exp)
10011{
10012 STRIP_NOPS (exp);
10013
9ff0637e 10014 if (TREE_CODE (exp) != ADDR_EXPR)
10015 return false;
10016
10017 exp = get_base_address (TREE_OPERAND (exp, 0));
10018 if (!exp)
10019 return false;
10020
10021 /* Make sure we call decl_readonly_section only for trees it
10022 can handle (since it returns true for everything it doesn't
10023 understand). */
491e04ef 10024 if (TREE_CODE (exp) == STRING_CST
9ff0637e 10025 || TREE_CODE (exp) == CONSTRUCTOR
53e9c5c4 10026 || (VAR_P (exp) && TREE_STATIC (exp)))
9ff0637e 10027 return decl_readonly_section (exp, 0);
01537105 10028 else
10029 return false;
10030}
4ee9c684 10031
c2f47e15 10032/* Simplify a call to the strpbrk builtin. S1 and S2 are the arguments
10033 to the call, and TYPE is its return type.
4ee9c684 10034
c2f47e15 10035 Return NULL_TREE if no simplification was possible, otherwise return the
4ee9c684 10036 simplified form of the call as a tree.
10037
10038 The simplified form may be a constant or other expression which
10039 computes the same value, but in a more efficient manner (including
10040 calls to other builtin functions).
10041
10042 The call may contain arguments which need to be evaluated, but
10043 which are not useful to determine the result of the call. In
10044 this case we return a chain of COMPOUND_EXPRs. The LHS of each
10045 COMPOUND_EXPR will be an argument which must be evaluated.
10046 COMPOUND_EXPRs are chained through their RHS. The RHS of the last
10047 COMPOUND_EXPR in the chain will contain the tree for the simplified
10048 form of the builtin function call. */
10049
10050static tree
389dd41b 10051fold_builtin_strpbrk (location_t loc, tree s1, tree s2, tree type)
4ee9c684 10052{
c2f47e15 10053 if (!validate_arg (s1, POINTER_TYPE)
10054 || !validate_arg (s2, POINTER_TYPE))
10055 return NULL_TREE;
4ee9c684 10056 else
10057 {
4ee9c684 10058 tree fn;
10059 const char *p1, *p2;
10060
10061 p2 = c_getstr (s2);
10062 if (p2 == NULL)
c2f47e15 10063 return NULL_TREE;
4ee9c684 10064
10065 p1 = c_getstr (s1);
10066 if (p1 != NULL)
10067 {
10068 const char *r = strpbrk (p1, p2);
daa1d5f5 10069 tree tem;
4ee9c684 10070
10071 if (r == NULL)
779b4c41 10072 return build_int_cst (TREE_TYPE (s1), 0);
4ee9c684 10073
10074 /* Return an offset into the constant string argument. */
2cc66f2a 10075 tem = fold_build_pointer_plus_hwi_loc (loc, s1, r - p1);
389dd41b 10076 return fold_convert_loc (loc, type, tem);
4ee9c684 10077 }
10078
10079 if (p2[0] == '\0')
05abc81b 10080 /* strpbrk(x, "") == NULL.
10081 Evaluate and ignore s1 in case it had side-effects. */
44bfe16d 10082 return omit_one_operand_loc (loc, type, integer_zero_node, s1);
4ee9c684 10083
10084 if (p2[1] != '\0')
c2f47e15 10085 return NULL_TREE; /* Really call strpbrk. */
4ee9c684 10086
b9a16870 10087 fn = builtin_decl_implicit (BUILT_IN_STRCHR);
4ee9c684 10088 if (!fn)
c2f47e15 10089 return NULL_TREE;
4ee9c684 10090
10091 /* New argument list transforming strpbrk(s1, s2) to
10092 strchr(s1, s2[0]). */
7002a1c8 10093 return build_call_expr_loc (loc, fn, 2, s1,
10094 build_int_cst (integer_type_node, p2[0]));
4ee9c684 10095 }
10096}
10097
c2f47e15 10098/* Simplify a call to the strspn builtin. S1 and S2 are the arguments
10099 to the call.
4ee9c684 10100
c2f47e15 10101 Return NULL_TREE if no simplification was possible, otherwise return the
4ee9c684 10102 simplified form of the call as a tree.
10103
10104 The simplified form may be a constant or other expression which
10105 computes the same value, but in a more efficient manner (including
10106 calls to other builtin functions).
10107
10108 The call may contain arguments which need to be evaluated, but
10109 which are not useful to determine the result of the call. In
10110 this case we return a chain of COMPOUND_EXPRs. The LHS of each
10111 COMPOUND_EXPR will be an argument which must be evaluated.
10112 COMPOUND_EXPRs are chained through their RHS. The RHS of the last
10113 COMPOUND_EXPR in the chain will contain the tree for the simplified
10114 form of the builtin function call. */
10115
10116static tree
389dd41b 10117fold_builtin_strspn (location_t loc, tree s1, tree s2)
4ee9c684 10118{
c2f47e15 10119 if (!validate_arg (s1, POINTER_TYPE)
10120 || !validate_arg (s2, POINTER_TYPE))
10121 return NULL_TREE;
4ee9c684 10122 else
10123 {
4ee9c684 10124 const char *p1 = c_getstr (s1), *p2 = c_getstr (s2);
10125
c2f47e15 10126 /* If either argument is "", return NULL_TREE. */
4ee9c684 10127 if ((p1 && *p1 == '\0') || (p2 && *p2 == '\0'))
9bc9f15f 10128 /* Evaluate and ignore both arguments in case either one has
10129 side-effects. */
389dd41b 10130 return omit_two_operands_loc (loc, size_type_node, size_zero_node,
9bc9f15f 10131 s1, s2);
c2f47e15 10132 return NULL_TREE;
4ee9c684 10133 }
10134}
10135
c2f47e15 10136/* Simplify a call to the strcspn builtin. S1 and S2 are the arguments
10137 to the call.
4ee9c684 10138
c2f47e15 10139 Return NULL_TREE if no simplification was possible, otherwise return the
4ee9c684 10140 simplified form of the call as a tree.
10141
10142 The simplified form may be a constant or other expression which
10143 computes the same value, but in a more efficient manner (including
10144 calls to other builtin functions).
10145
10146 The call may contain arguments which need to be evaluated, but
10147 which are not useful to determine the result of the call. In
10148 this case we return a chain of COMPOUND_EXPRs. The LHS of each
10149 COMPOUND_EXPR will be an argument which must be evaluated.
10150 COMPOUND_EXPRs are chained through their RHS. The RHS of the last
10151 COMPOUND_EXPR in the chain will contain the tree for the simplified
10152 form of the builtin function call. */
10153
10154static tree
389dd41b 10155fold_builtin_strcspn (location_t loc, tree s1, tree s2)
4ee9c684 10156{
c2f47e15 10157 if (!validate_arg (s1, POINTER_TYPE)
10158 || !validate_arg (s2, POINTER_TYPE))
10159 return NULL_TREE;
4ee9c684 10160 else
10161 {
c2f47e15 10162 /* If the first argument is "", return NULL_TREE. */
b5e46e2c 10163 const char *p1 = c_getstr (s1);
4ee9c684 10164 if (p1 && *p1 == '\0')
10165 {
10166 /* Evaluate and ignore argument s2 in case it has
10167 side-effects. */
389dd41b 10168 return omit_one_operand_loc (loc, size_type_node,
39761420 10169 size_zero_node, s2);
4ee9c684 10170 }
10171
10172 /* If the second argument is "", return __builtin_strlen(s1). */
b5e46e2c 10173 const char *p2 = c_getstr (s2);
4ee9c684 10174 if (p2 && *p2 == '\0')
10175 {
b9a16870 10176 tree fn = builtin_decl_implicit (BUILT_IN_STRLEN);
4ee9c684 10177
10178 /* If the replacement _DECL isn't initialized, don't do the
10179 transformation. */
10180 if (!fn)
c2f47e15 10181 return NULL_TREE;
4ee9c684 10182
389dd41b 10183 return build_call_expr_loc (loc, fn, 1, s1);
4ee9c684 10184 }
c2f47e15 10185 return NULL_TREE;
4ee9c684 10186 }
10187}
10188
c2f47e15 10189/* Fold the next_arg or va_start call EXP. Returns true if there was an error
743b0c6a 10190 produced. False otherwise. This is done so that we don't output the error
10191 or warning twice or three times. */
75a70cf9 10192
743b0c6a 10193bool
c2f47e15 10194fold_builtin_next_arg (tree exp, bool va_start_p)
4ee9c684 10195{
10196 tree fntype = TREE_TYPE (current_function_decl);
c2f47e15 10197 int nargs = call_expr_nargs (exp);
10198 tree arg;
d98fd4a4 10199 /* There is good chance the current input_location points inside the
10200 definition of the va_start macro (perhaps on the token for
10201 builtin) in a system header, so warnings will not be emitted.
10202 Use the location in real source code. */
10203 source_location current_location =
10204 linemap_unwind_to_first_non_reserved_loc (line_table, input_location,
10205 NULL);
4ee9c684 10206
257d99c3 10207 if (!stdarg_p (fntype))
743b0c6a 10208 {
10209 error ("%<va_start%> used in function with fixed args");
10210 return true;
10211 }
c2f47e15 10212
10213 if (va_start_p)
79012a9d 10214 {
c2f47e15 10215 if (va_start_p && (nargs != 2))
10216 {
10217 error ("wrong number of arguments to function %<va_start%>");
10218 return true;
10219 }
10220 arg = CALL_EXPR_ARG (exp, 1);
79012a9d 10221 }
10222 /* We use __builtin_va_start (ap, 0, 0) or __builtin_next_arg (0, 0)
10223 when we checked the arguments and if needed issued a warning. */
c2f47e15 10224 else
4ee9c684 10225 {
c2f47e15 10226 if (nargs == 0)
10227 {
10228 /* Evidently an out of date version of <stdarg.h>; can't validate
10229 va_start's second argument, but can still work as intended. */
d98fd4a4 10230 warning_at (current_location,
7edb1062 10231 OPT_Wvarargs,
10232 "%<__builtin_next_arg%> called without an argument");
c2f47e15 10233 return true;
10234 }
10235 else if (nargs > 1)
a0c938f0 10236 {
c2f47e15 10237 error ("wrong number of arguments to function %<__builtin_next_arg%>");
a0c938f0 10238 return true;
10239 }
c2f47e15 10240 arg = CALL_EXPR_ARG (exp, 0);
10241 }
10242
a8dd994c 10243 if (TREE_CODE (arg) == SSA_NAME)
10244 arg = SSA_NAME_VAR (arg);
10245
c2f47e15 10246 /* We destructively modify the call to be __builtin_va_start (ap, 0)
48e1416a 10247 or __builtin_next_arg (0) the first time we see it, after checking
c2f47e15 10248 the arguments and if needed issuing a warning. */
10249 if (!integer_zerop (arg))
10250 {
10251 tree last_parm = tree_last (DECL_ARGUMENTS (current_function_decl));
79012a9d 10252
4ee9c684 10253 /* Strip off all nops for the sake of the comparison. This
10254 is not quite the same as STRIP_NOPS. It does more.
10255 We must also strip off INDIRECT_EXPR for C++ reference
10256 parameters. */
72dd6141 10257 while (CONVERT_EXPR_P (arg)
4ee9c684 10258 || TREE_CODE (arg) == INDIRECT_REF)
10259 arg = TREE_OPERAND (arg, 0);
10260 if (arg != last_parm)
a0c938f0 10261 {
b08cf617 10262 /* FIXME: Sometimes with the tree optimizers we can get the
10263 not the last argument even though the user used the last
10264 argument. We just warn and set the arg to be the last
10265 argument so that we will get wrong-code because of
10266 it. */
d98fd4a4 10267 warning_at (current_location,
7edb1062 10268 OPT_Wvarargs,
d98fd4a4 10269 "second parameter of %<va_start%> not last named argument");
743b0c6a 10270 }
24158ad7 10271
10272 /* Undefined by C99 7.15.1.4p4 (va_start):
10273 "If the parameter parmN is declared with the register storage
10274 class, with a function or array type, or with a type that is
10275 not compatible with the type that results after application of
10276 the default argument promotions, the behavior is undefined."
10277 */
10278 else if (DECL_REGISTER (arg))
d98fd4a4 10279 {
10280 warning_at (current_location,
7edb1062 10281 OPT_Wvarargs,
67cf9b55 10282 "undefined behavior when second parameter of "
d98fd4a4 10283 "%<va_start%> is declared with %<register%> storage");
10284 }
24158ad7 10285
79012a9d 10286 /* We want to verify the second parameter just once before the tree
a0c938f0 10287 optimizers are run and then avoid keeping it in the tree,
10288 as otherwise we could warn even for correct code like:
10289 void foo (int i, ...)
10290 { va_list ap; i++; va_start (ap, i); va_end (ap); } */
c2f47e15 10291 if (va_start_p)
10292 CALL_EXPR_ARG (exp, 1) = integer_zero_node;
10293 else
10294 CALL_EXPR_ARG (exp, 0) = integer_zero_node;
743b0c6a 10295 }
10296 return false;
4ee9c684 10297}
10298
10299
c2f47e15 10300/* Expand a call EXP to __builtin_object_size. */
0a39fd54 10301
f7715905 10302static rtx
0a39fd54 10303expand_builtin_object_size (tree exp)
10304{
10305 tree ost;
10306 int object_size_type;
10307 tree fndecl = get_callee_fndecl (exp);
0a39fd54 10308
c2f47e15 10309 if (!validate_arglist (exp, POINTER_TYPE, INTEGER_TYPE, VOID_TYPE))
0a39fd54 10310 {
8c41abe8 10311 error ("%Kfirst argument of %qD must be a pointer, second integer constant",
b8c23db3 10312 exp, fndecl);
0a39fd54 10313 expand_builtin_trap ();
10314 return const0_rtx;
10315 }
10316
c2f47e15 10317 ost = CALL_EXPR_ARG (exp, 1);
0a39fd54 10318 STRIP_NOPS (ost);
10319
10320 if (TREE_CODE (ost) != INTEGER_CST
10321 || tree_int_cst_sgn (ost) < 0
10322 || compare_tree_int (ost, 3) > 0)
10323 {
8c41abe8 10324 error ("%Klast argument of %qD is not integer constant between 0 and 3",
b8c23db3 10325 exp, fndecl);
0a39fd54 10326 expand_builtin_trap ();
10327 return const0_rtx;
10328 }
10329
e913b5cd 10330 object_size_type = tree_to_shwi (ost);
0a39fd54 10331
10332 return object_size_type < 2 ? constm1_rtx : const0_rtx;
10333}
10334
10335/* Expand EXP, a call to the __mem{cpy,pcpy,move,set}_chk builtin.
10336 FCODE is the BUILT_IN_* to use.
c2f47e15 10337 Return NULL_RTX if we failed; the caller should emit a normal call,
0a39fd54 10338 otherwise try to get the result in TARGET, if convenient (and in
10339 mode MODE if that's convenient). */
10340
10341static rtx
3754d046 10342expand_builtin_memory_chk (tree exp, rtx target, machine_mode mode,
0a39fd54 10343 enum built_in_function fcode)
10344{
c2f47e15 10345 if (!validate_arglist (exp,
0a39fd54 10346 POINTER_TYPE,
10347 fcode == BUILT_IN_MEMSET_CHK
10348 ? INTEGER_TYPE : POINTER_TYPE,
10349 INTEGER_TYPE, INTEGER_TYPE, VOID_TYPE))
c2f47e15 10350 return NULL_RTX;
0a39fd54 10351
e6a18b5a 10352 tree dest = CALL_EXPR_ARG (exp, 0);
10353 tree src = CALL_EXPR_ARG (exp, 1);
10354 tree len = CALL_EXPR_ARG (exp, 2);
10355 tree size = CALL_EXPR_ARG (exp, 3);
0a39fd54 10356
e6a18b5a 10357 bool sizes_ok = check_access (exp, dest, src, len, /*maxread=*/NULL_TREE,
10358 /*str=*/NULL_TREE, size);
5aef8938 10359
10360 if (!tree_fits_uhwi_p (size))
c2f47e15 10361 return NULL_RTX;
0a39fd54 10362
e913b5cd 10363 if (tree_fits_uhwi_p (len) || integer_all_onesp (size))
0a39fd54 10364 {
5aef8938 10365 /* Avoid transforming the checking call to an ordinary one when
10366 an overflow has been detected or when the call couldn't be
10367 validated because the size is not constant. */
10368 if (!sizes_ok && !integer_all_onesp (size) && tree_int_cst_lt (size, len))
10369 return NULL_RTX;
0a39fd54 10370
5aef8938 10371 tree fn = NULL_TREE;
0a39fd54 10372 /* If __builtin_mem{cpy,pcpy,move,set}_chk is used, assume
10373 mem{cpy,pcpy,move,set} is available. */
10374 switch (fcode)
10375 {
10376 case BUILT_IN_MEMCPY_CHK:
b9a16870 10377 fn = builtin_decl_explicit (BUILT_IN_MEMCPY);
0a39fd54 10378 break;
10379 case BUILT_IN_MEMPCPY_CHK:
b9a16870 10380 fn = builtin_decl_explicit (BUILT_IN_MEMPCPY);
0a39fd54 10381 break;
10382 case BUILT_IN_MEMMOVE_CHK:
b9a16870 10383 fn = builtin_decl_explicit (BUILT_IN_MEMMOVE);
0a39fd54 10384 break;
10385 case BUILT_IN_MEMSET_CHK:
b9a16870 10386 fn = builtin_decl_explicit (BUILT_IN_MEMSET);
0a39fd54 10387 break;
10388 default:
10389 break;
10390 }
10391
10392 if (! fn)
c2f47e15 10393 return NULL_RTX;
0a39fd54 10394
0568e9c1 10395 fn = build_call_nofold_loc (EXPR_LOCATION (exp), fn, 3, dest, src, len);
a65c4d64 10396 gcc_assert (TREE_CODE (fn) == CALL_EXPR);
10397 CALL_EXPR_TAILCALL (fn) = CALL_EXPR_TAILCALL (exp);
0a39fd54 10398 return expand_expr (fn, target, mode, EXPAND_NORMAL);
10399 }
10400 else if (fcode == BUILT_IN_MEMSET_CHK)
c2f47e15 10401 return NULL_RTX;
0a39fd54 10402 else
10403 {
957d0361 10404 unsigned int dest_align = get_pointer_alignment (dest);
0a39fd54 10405
10406 /* If DEST is not a pointer type, call the normal function. */
10407 if (dest_align == 0)
c2f47e15 10408 return NULL_RTX;
0a39fd54 10409
10410 /* If SRC and DEST are the same (and not volatile), do nothing. */
10411 if (operand_equal_p (src, dest, 0))
10412 {
10413 tree expr;
10414
10415 if (fcode != BUILT_IN_MEMPCPY_CHK)
10416 {
10417 /* Evaluate and ignore LEN in case it has side-effects. */
10418 expand_expr (len, const0_rtx, VOIDmode, EXPAND_NORMAL);
10419 return expand_expr (dest, target, mode, EXPAND_NORMAL);
10420 }
10421
2cc66f2a 10422 expr = fold_build_pointer_plus (dest, len);
0a39fd54 10423 return expand_expr (expr, target, mode, EXPAND_NORMAL);
10424 }
10425
10426 /* __memmove_chk special case. */
10427 if (fcode == BUILT_IN_MEMMOVE_CHK)
10428 {
957d0361 10429 unsigned int src_align = get_pointer_alignment (src);
0a39fd54 10430
10431 if (src_align == 0)
c2f47e15 10432 return NULL_RTX;
0a39fd54 10433
10434 /* If src is categorized for a readonly section we can use
10435 normal __memcpy_chk. */
10436 if (readonly_data_expr (src))
10437 {
b9a16870 10438 tree fn = builtin_decl_explicit (BUILT_IN_MEMCPY_CHK);
0a39fd54 10439 if (!fn)
c2f47e15 10440 return NULL_RTX;
0568e9c1 10441 fn = build_call_nofold_loc (EXPR_LOCATION (exp), fn, 4,
10442 dest, src, len, size);
a65c4d64 10443 gcc_assert (TREE_CODE (fn) == CALL_EXPR);
10444 CALL_EXPR_TAILCALL (fn) = CALL_EXPR_TAILCALL (exp);
0a39fd54 10445 return expand_expr (fn, target, mode, EXPAND_NORMAL);
10446 }
10447 }
c2f47e15 10448 return NULL_RTX;
0a39fd54 10449 }
10450}
10451
10452/* Emit warning if a buffer overflow is detected at compile time. */
10453
10454static void
10455maybe_emit_chk_warning (tree exp, enum built_in_function fcode)
10456{
5aef8938 10457 /* The source string. */
10458 tree srcstr = NULL_TREE;
10459 /* The size of the destination object. */
10460 tree objsize = NULL_TREE;
10461 /* The string that is being concatenated with (as in __strcat_chk)
10462 or null if it isn't. */
10463 tree catstr = NULL_TREE;
10464 /* The maximum length of the source sequence in a bounded operation
10465 (such as __strncat_chk) or null if the operation isn't bounded
10466 (such as __strcat_chk). */
e6a18b5a 10467 tree maxread = NULL_TREE;
f3969b49 10468 /* The exact size of the access (such as in __strncpy_chk). */
10469 tree size = NULL_TREE;
0a39fd54 10470
10471 switch (fcode)
10472 {
10473 case BUILT_IN_STRCPY_CHK:
10474 case BUILT_IN_STPCPY_CHK:
5aef8938 10475 srcstr = CALL_EXPR_ARG (exp, 1);
10476 objsize = CALL_EXPR_ARG (exp, 2);
10477 break;
10478
0a39fd54 10479 case BUILT_IN_STRCAT_CHK:
5aef8938 10480 /* For __strcat_chk the warning will be emitted only if overflowing
10481 by at least strlen (dest) + 1 bytes. */
10482 catstr = CALL_EXPR_ARG (exp, 0);
10483 srcstr = CALL_EXPR_ARG (exp, 1);
10484 objsize = CALL_EXPR_ARG (exp, 2);
0a39fd54 10485 break;
5aef8938 10486
b356dfef 10487 case BUILT_IN_STRNCAT_CHK:
5aef8938 10488 catstr = CALL_EXPR_ARG (exp, 0);
10489 srcstr = CALL_EXPR_ARG (exp, 1);
e6a18b5a 10490 maxread = CALL_EXPR_ARG (exp, 2);
5aef8938 10491 objsize = CALL_EXPR_ARG (exp, 3);
10492 break;
10493
0a39fd54 10494 case BUILT_IN_STRNCPY_CHK:
1063acde 10495 case BUILT_IN_STPNCPY_CHK:
5aef8938 10496 srcstr = CALL_EXPR_ARG (exp, 1);
f3969b49 10497 size = CALL_EXPR_ARG (exp, 2);
5aef8938 10498 objsize = CALL_EXPR_ARG (exp, 3);
0a39fd54 10499 break;
5aef8938 10500
0a39fd54 10501 case BUILT_IN_SNPRINTF_CHK:
10502 case BUILT_IN_VSNPRINTF_CHK:
e6a18b5a 10503 maxread = CALL_EXPR_ARG (exp, 1);
5aef8938 10504 objsize = CALL_EXPR_ARG (exp, 3);
0a39fd54 10505 break;
10506 default:
10507 gcc_unreachable ();
10508 }
10509
e6a18b5a 10510 if (catstr && maxread)
0a39fd54 10511 {
5aef8938 10512 /* Check __strncat_chk. There is no way to determine the length
10513 of the string to which the source string is being appended so
10514 just warn when the length of the source string is not known. */
8d6c6ef5 10515 check_strncat_sizes (exp, objsize);
10516 return;
0a39fd54 10517 }
0a39fd54 10518
e6a18b5a 10519 /* The destination argument is the first one for all built-ins above. */
10520 tree dst = CALL_EXPR_ARG (exp, 0);
10521
10522 check_access (exp, dst, srcstr, size, maxread, srcstr, objsize);
0a39fd54 10523}
10524
10525/* Emit warning if a buffer overflow is detected at compile time
10526 in __sprintf_chk/__vsprintf_chk calls. */
10527
10528static void
10529maybe_emit_sprintf_chk_warning (tree exp, enum built_in_function fcode)
10530{
1e4adcfc 10531 tree size, len, fmt;
0a39fd54 10532 const char *fmt_str;
c2f47e15 10533 int nargs = call_expr_nargs (exp);
0a39fd54 10534
10535 /* Verify the required arguments in the original call. */
48e1416a 10536
c2f47e15 10537 if (nargs < 4)
0a39fd54 10538 return;
c2f47e15 10539 size = CALL_EXPR_ARG (exp, 2);
10540 fmt = CALL_EXPR_ARG (exp, 3);
0a39fd54 10541
e913b5cd 10542 if (! tree_fits_uhwi_p (size) || integer_all_onesp (size))
0a39fd54 10543 return;
10544
10545 /* Check whether the format is a literal string constant. */
10546 fmt_str = c_getstr (fmt);
10547 if (fmt_str == NULL)
10548 return;
10549
d4473c84 10550 if (!init_target_chars ())
99eabcc1 10551 return;
10552
0a39fd54 10553 /* If the format doesn't contain % args or %%, we know its size. */
99eabcc1 10554 if (strchr (fmt_str, target_percent) == 0)
0a39fd54 10555 len = build_int_cstu (size_type_node, strlen (fmt_str));
10556 /* If the format is "%s" and first ... argument is a string literal,
10557 we know it too. */
c2f47e15 10558 else if (fcode == BUILT_IN_SPRINTF_CHK
10559 && strcmp (fmt_str, target_percent_s) == 0)
0a39fd54 10560 {
10561 tree arg;
10562
c2f47e15 10563 if (nargs < 5)
0a39fd54 10564 return;
c2f47e15 10565 arg = CALL_EXPR_ARG (exp, 4);
0a39fd54 10566 if (! POINTER_TYPE_P (TREE_TYPE (arg)))
10567 return;
10568
10569 len = c_strlen (arg, 1);
e913b5cd 10570 if (!len || ! tree_fits_uhwi_p (len))
0a39fd54 10571 return;
10572 }
10573 else
10574 return;
10575
5aef8938 10576 /* Add one for the terminating nul. */
10577 len = fold_build2 (PLUS_EXPR, TREE_TYPE (len), len, size_one_node);
e6a18b5a 10578
10579 check_access (exp, /*dst=*/NULL_TREE, /*src=*/NULL_TREE, /*size=*/NULL_TREE,
10580 /*maxread=*/NULL_TREE, len, size);
0a39fd54 10581}
10582
2c281b15 10583/* Emit warning if a free is called with address of a variable. */
10584
10585static void
10586maybe_emit_free_warning (tree exp)
10587{
10588 tree arg = CALL_EXPR_ARG (exp, 0);
10589
10590 STRIP_NOPS (arg);
10591 if (TREE_CODE (arg) != ADDR_EXPR)
10592 return;
10593
10594 arg = get_base_address (TREE_OPERAND (arg, 0));
182cf5a9 10595 if (arg == NULL || INDIRECT_REF_P (arg) || TREE_CODE (arg) == MEM_REF)
2c281b15 10596 return;
10597
10598 if (SSA_VAR_P (arg))
f74ea1c2 10599 warning_at (tree_nonartificial_location (exp), OPT_Wfree_nonheap_object,
10600 "%Kattempt to free a non-heap object %qD", exp, arg);
2c281b15 10601 else
f74ea1c2 10602 warning_at (tree_nonartificial_location (exp), OPT_Wfree_nonheap_object,
10603 "%Kattempt to free a non-heap object", exp);
2c281b15 10604}
10605
c2f47e15 10606/* Fold a call to __builtin_object_size with arguments PTR and OST,
10607 if possible. */
0a39fd54 10608
f7715905 10609static tree
c2f47e15 10610fold_builtin_object_size (tree ptr, tree ost)
0a39fd54 10611{
a6caa15f 10612 unsigned HOST_WIDE_INT bytes;
0a39fd54 10613 int object_size_type;
10614
c2f47e15 10615 if (!validate_arg (ptr, POINTER_TYPE)
10616 || !validate_arg (ost, INTEGER_TYPE))
10617 return NULL_TREE;
0a39fd54 10618
0a39fd54 10619 STRIP_NOPS (ost);
10620
10621 if (TREE_CODE (ost) != INTEGER_CST
10622 || tree_int_cst_sgn (ost) < 0
10623 || compare_tree_int (ost, 3) > 0)
c2f47e15 10624 return NULL_TREE;
0a39fd54 10625
e913b5cd 10626 object_size_type = tree_to_shwi (ost);
0a39fd54 10627
10628 /* __builtin_object_size doesn't evaluate side-effects in its arguments;
10629 if there are any side-effects, it returns (size_t) -1 for types 0 and 1
10630 and (size_t) 0 for types 2 and 3. */
10631 if (TREE_SIDE_EFFECTS (ptr))
697bbc3f 10632 return build_int_cst_type (size_type_node, object_size_type < 2 ? -1 : 0);
0a39fd54 10633
10634 if (TREE_CODE (ptr) == ADDR_EXPR)
a6caa15f 10635 {
4e91a07b 10636 compute_builtin_object_size (ptr, object_size_type, &bytes);
6da74b21 10637 if (wi::fits_to_tree_p (bytes, size_type_node))
10638 return build_int_cstu (size_type_node, bytes);
a6caa15f 10639 }
0a39fd54 10640 else if (TREE_CODE (ptr) == SSA_NAME)
10641 {
0a39fd54 10642 /* If object size is not known yet, delay folding until
10643 later. Maybe subsequent passes will help determining
10644 it. */
4e91a07b 10645 if (compute_builtin_object_size (ptr, object_size_type, &bytes)
10646 && wi::fits_to_tree_p (bytes, size_type_node))
6da74b21 10647 return build_int_cstu (size_type_node, bytes);
0a39fd54 10648 }
10649
a6caa15f 10650 return NULL_TREE;
0a39fd54 10651}
10652
12f08300 10653/* Builtins with folding operations that operate on "..." arguments
10654 need special handling; we need to store the arguments in a convenient
10655 data structure before attempting any folding. Fortunately there are
10656 only a few builtins that fall into this category. FNDECL is the
10657 function, EXP is the CALL_EXPR for the call. */
10658
10659static tree
10660fold_builtin_varargs (location_t loc, tree fndecl, tree *args, int nargs)
10661{
10662 enum built_in_function fcode = DECL_FUNCTION_CODE (fndecl);
10663 tree ret = NULL_TREE;
10664
10665 switch (fcode)
10666 {
10667 case BUILT_IN_FPCLASSIFY:
10668 ret = fold_builtin_fpclassify (loc, args, nargs);
10669 break;
10670
10671 default:
10672 break;
10673 }
10674 if (ret)
10675 {
10676 ret = build1 (NOP_EXPR, TREE_TYPE (ret), ret);
10677 SET_EXPR_LOCATION (ret, loc);
10678 TREE_NO_WARNING (ret) = 1;
10679 return ret;
10680 }
10681 return NULL_TREE;
10682}
10683
99eabcc1 10684/* Initialize format string characters in the target charset. */
10685
b9ea678c 10686bool
99eabcc1 10687init_target_chars (void)
10688{
10689 static bool init;
10690 if (!init)
10691 {
10692 target_newline = lang_hooks.to_target_charset ('\n');
10693 target_percent = lang_hooks.to_target_charset ('%');
10694 target_c = lang_hooks.to_target_charset ('c');
10695 target_s = lang_hooks.to_target_charset ('s');
10696 if (target_newline == 0 || target_percent == 0 || target_c == 0
10697 || target_s == 0)
10698 return false;
10699
10700 target_percent_c[0] = target_percent;
10701 target_percent_c[1] = target_c;
10702 target_percent_c[2] = '\0';
10703
10704 target_percent_s[0] = target_percent;
10705 target_percent_s[1] = target_s;
10706 target_percent_s[2] = '\0';
10707
10708 target_percent_s_newline[0] = target_percent;
10709 target_percent_s_newline[1] = target_s;
10710 target_percent_s_newline[2] = target_newline;
10711 target_percent_s_newline[3] = '\0';
a0c938f0 10712
99eabcc1 10713 init = true;
10714 }
10715 return true;
10716}
bffb7645 10717
f0c477f2 10718/* Helper function for do_mpfr_arg*(). Ensure M is a normal number
10719 and no overflow/underflow occurred. INEXACT is true if M was not
fa7637bd 10720 exactly calculated. TYPE is the tree type for the result. This
f0c477f2 10721 function assumes that you cleared the MPFR flags and then
10722 calculated M to see if anything subsequently set a flag prior to
10723 entering this function. Return NULL_TREE if any checks fail. */
10724
10725static tree
d4473c84 10726do_mpfr_ckconv (mpfr_srcptr m, tree type, int inexact)
f0c477f2 10727{
10728 /* Proceed iff we get a normal number, i.e. not NaN or Inf and no
10729 overflow/underflow occurred. If -frounding-math, proceed iff the
10730 result of calling FUNC was exact. */
d4473c84 10731 if (mpfr_number_p (m) && !mpfr_overflow_p () && !mpfr_underflow_p ()
f0c477f2 10732 && (!flag_rounding_math || !inexact))
10733 {
10734 REAL_VALUE_TYPE rr;
10735
66fa16e6 10736 real_from_mpfr (&rr, m, type, GMP_RNDN);
f0c477f2 10737 /* Proceed iff GCC's REAL_VALUE_TYPE can hold the MPFR value,
10738 check for overflow/underflow. If the REAL_VALUE_TYPE is zero
10739 but the mpft_t is not, then we underflowed in the
10740 conversion. */
776a7bab 10741 if (real_isfinite (&rr)
f0c477f2 10742 && (rr.cl == rvc_zero) == (mpfr_zero_p (m) != 0))
10743 {
10744 REAL_VALUE_TYPE rmode;
10745
10746 real_convert (&rmode, TYPE_MODE (type), &rr);
10747 /* Proceed iff the specified mode can hold the value. */
10748 if (real_identical (&rmode, &rr))
10749 return build_real (type, rmode);
10750 }
10751 }
10752 return NULL_TREE;
10753}
10754
239d491a 10755/* Helper function for do_mpc_arg*(). Ensure M is a normal complex
10756 number and no overflow/underflow occurred. INEXACT is true if M
10757 was not exactly calculated. TYPE is the tree type for the result.
10758 This function assumes that you cleared the MPFR flags and then
10759 calculated M to see if anything subsequently set a flag prior to
652d9409 10760 entering this function. Return NULL_TREE if any checks fail, if
10761 FORCE_CONVERT is true, then bypass the checks. */
239d491a 10762
10763static tree
652d9409 10764do_mpc_ckconv (mpc_srcptr m, tree type, int inexact, int force_convert)
239d491a 10765{
10766 /* Proceed iff we get a normal number, i.e. not NaN or Inf and no
10767 overflow/underflow occurred. If -frounding-math, proceed iff the
10768 result of calling FUNC was exact. */
652d9409 10769 if (force_convert
10770 || (mpfr_number_p (mpc_realref (m)) && mpfr_number_p (mpc_imagref (m))
10771 && !mpfr_overflow_p () && !mpfr_underflow_p ()
10772 && (!flag_rounding_math || !inexact)))
239d491a 10773 {
10774 REAL_VALUE_TYPE re, im;
10775
b0e7c4d4 10776 real_from_mpfr (&re, mpc_realref (m), TREE_TYPE (type), GMP_RNDN);
10777 real_from_mpfr (&im, mpc_imagref (m), TREE_TYPE (type), GMP_RNDN);
239d491a 10778 /* Proceed iff GCC's REAL_VALUE_TYPE can hold the MPFR values,
10779 check for overflow/underflow. If the REAL_VALUE_TYPE is zero
10780 but the mpft_t is not, then we underflowed in the
10781 conversion. */
652d9409 10782 if (force_convert
10783 || (real_isfinite (&re) && real_isfinite (&im)
10784 && (re.cl == rvc_zero) == (mpfr_zero_p (mpc_realref (m)) != 0)
10785 && (im.cl == rvc_zero) == (mpfr_zero_p (mpc_imagref (m)) != 0)))
239d491a 10786 {
10787 REAL_VALUE_TYPE re_mode, im_mode;
10788
10789 real_convert (&re_mode, TYPE_MODE (TREE_TYPE (type)), &re);
10790 real_convert (&im_mode, TYPE_MODE (TREE_TYPE (type)), &im);
10791 /* Proceed iff the specified mode can hold the value. */
652d9409 10792 if (force_convert
10793 || (real_identical (&re_mode, &re)
10794 && real_identical (&im_mode, &im)))
239d491a 10795 return build_complex (type, build_real (TREE_TYPE (type), re_mode),
10796 build_real (TREE_TYPE (type), im_mode));
10797 }
10798 }
10799 return NULL_TREE;
10800}
239d491a 10801
e5407ca6 10802/* If arguments ARG0 and ARG1 are REAL_CSTs, call mpfr_remquo() to set
10803 the pointer *(ARG_QUO) and return the result. The type is taken
10804 from the type of ARG0 and is used for setting the precision of the
10805 calculation and results. */
10806
10807static tree
10808do_mpfr_remquo (tree arg0, tree arg1, tree arg_quo)
10809{
10810 tree const type = TREE_TYPE (arg0);
10811 tree result = NULL_TREE;
48e1416a 10812
e5407ca6 10813 STRIP_NOPS (arg0);
10814 STRIP_NOPS (arg1);
48e1416a 10815
e5407ca6 10816 /* To proceed, MPFR must exactly represent the target floating point
10817 format, which only happens when the target base equals two. */
10818 if (REAL_MODE_FORMAT (TYPE_MODE (type))->b == 2
10819 && TREE_CODE (arg0) == REAL_CST && !TREE_OVERFLOW (arg0)
10820 && TREE_CODE (arg1) == REAL_CST && !TREE_OVERFLOW (arg1))
10821 {
10822 const REAL_VALUE_TYPE *const ra0 = TREE_REAL_CST_PTR (arg0);
10823 const REAL_VALUE_TYPE *const ra1 = TREE_REAL_CST_PTR (arg1);
10824
776a7bab 10825 if (real_isfinite (ra0) && real_isfinite (ra1))
e5407ca6 10826 {
e2eb2b7f 10827 const struct real_format *fmt = REAL_MODE_FORMAT (TYPE_MODE (type));
10828 const int prec = fmt->p;
10829 const mp_rnd_t rnd = fmt->round_towards_zero? GMP_RNDZ : GMP_RNDN;
e5407ca6 10830 tree result_rem;
10831 long integer_quo;
10832 mpfr_t m0, m1;
10833
10834 mpfr_inits2 (prec, m0, m1, NULL);
10835 mpfr_from_real (m0, ra0, GMP_RNDN);
10836 mpfr_from_real (m1, ra1, GMP_RNDN);
10837 mpfr_clear_flags ();
e2eb2b7f 10838 mpfr_remquo (m0, &integer_quo, m0, m1, rnd);
e5407ca6 10839 /* Remquo is independent of the rounding mode, so pass
10840 inexact=0 to do_mpfr_ckconv(). */
10841 result_rem = do_mpfr_ckconv (m0, type, /*inexact=*/ 0);
10842 mpfr_clears (m0, m1, NULL);
10843 if (result_rem)
10844 {
10845 /* MPFR calculates quo in the host's long so it may
10846 return more bits in quo than the target int can hold
10847 if sizeof(host long) > sizeof(target int). This can
10848 happen even for native compilers in LP64 mode. In
10849 these cases, modulo the quo value with the largest
10850 number that the target int can hold while leaving one
10851 bit for the sign. */
10852 if (sizeof (integer_quo) * CHAR_BIT > INT_TYPE_SIZE)
10853 integer_quo %= (long)(1UL << (INT_TYPE_SIZE - 1));
10854
10855 /* Dereference the quo pointer argument. */
10856 arg_quo = build_fold_indirect_ref (arg_quo);
10857 /* Proceed iff a valid pointer type was passed in. */
10858 if (TYPE_MAIN_VARIANT (TREE_TYPE (arg_quo)) == integer_type_node)
10859 {
10860 /* Set the value. */
7002a1c8 10861 tree result_quo
10862 = fold_build2 (MODIFY_EXPR, TREE_TYPE (arg_quo), arg_quo,
10863 build_int_cst (TREE_TYPE (arg_quo),
10864 integer_quo));
e5407ca6 10865 TREE_SIDE_EFFECTS (result_quo) = 1;
10866 /* Combine the quo assignment with the rem. */
10867 result = non_lvalue (fold_build2 (COMPOUND_EXPR, type,
10868 result_quo, result_rem));
10869 }
10870 }
10871 }
10872 }
10873 return result;
10874}
e84da7c1 10875
10876/* If ARG is a REAL_CST, call mpfr_lgamma() on it and return the
10877 resulting value as a tree with type TYPE. The mpfr precision is
10878 set to the precision of TYPE. We assume that this mpfr function
10879 returns zero if the result could be calculated exactly within the
10880 requested precision. In addition, the integer pointer represented
10881 by ARG_SG will be dereferenced and set to the appropriate signgam
10882 (-1,1) value. */
10883
10884static tree
10885do_mpfr_lgamma_r (tree arg, tree arg_sg, tree type)
10886{
10887 tree result = NULL_TREE;
10888
10889 STRIP_NOPS (arg);
48e1416a 10890
e84da7c1 10891 /* To proceed, MPFR must exactly represent the target floating point
10892 format, which only happens when the target base equals two. Also
10893 verify ARG is a constant and that ARG_SG is an int pointer. */
10894 if (REAL_MODE_FORMAT (TYPE_MODE (type))->b == 2
10895 && TREE_CODE (arg) == REAL_CST && !TREE_OVERFLOW (arg)
10896 && TREE_CODE (TREE_TYPE (arg_sg)) == POINTER_TYPE
10897 && TYPE_MAIN_VARIANT (TREE_TYPE (TREE_TYPE (arg_sg))) == integer_type_node)
10898 {
10899 const REAL_VALUE_TYPE *const ra = TREE_REAL_CST_PTR (arg);
10900
10901 /* In addition to NaN and Inf, the argument cannot be zero or a
10902 negative integer. */
776a7bab 10903 if (real_isfinite (ra)
e84da7c1 10904 && ra->cl != rvc_zero
9af5ce0c 10905 && !(real_isneg (ra) && real_isinteger (ra, TYPE_MODE (type))))
e84da7c1 10906 {
e2eb2b7f 10907 const struct real_format *fmt = REAL_MODE_FORMAT (TYPE_MODE (type));
10908 const int prec = fmt->p;
10909 const mp_rnd_t rnd = fmt->round_towards_zero? GMP_RNDZ : GMP_RNDN;
e84da7c1 10910 int inexact, sg;
10911 mpfr_t m;
10912 tree result_lg;
10913
10914 mpfr_init2 (m, prec);
10915 mpfr_from_real (m, ra, GMP_RNDN);
10916 mpfr_clear_flags ();
e2eb2b7f 10917 inexact = mpfr_lgamma (m, &sg, m, rnd);
e84da7c1 10918 result_lg = do_mpfr_ckconv (m, type, inexact);
10919 mpfr_clear (m);
10920 if (result_lg)
10921 {
10922 tree result_sg;
10923
10924 /* Dereference the arg_sg pointer argument. */
10925 arg_sg = build_fold_indirect_ref (arg_sg);
10926 /* Assign the signgam value into *arg_sg. */
10927 result_sg = fold_build2 (MODIFY_EXPR,
10928 TREE_TYPE (arg_sg), arg_sg,
7002a1c8 10929 build_int_cst (TREE_TYPE (arg_sg), sg));
e84da7c1 10930 TREE_SIDE_EFFECTS (result_sg) = 1;
10931 /* Combine the signgam assignment with the lgamma result. */
10932 result = non_lvalue (fold_build2 (COMPOUND_EXPR, type,
10933 result_sg, result_lg));
10934 }
10935 }
10936 }
10937
10938 return result;
10939}
75a70cf9 10940
c699fab8 10941/* If arguments ARG0 and ARG1 are a COMPLEX_CST, call the two-argument
10942 mpc function FUNC on it and return the resulting value as a tree
10943 with type TYPE. The mpfr precision is set to the precision of
10944 TYPE. We assume that function FUNC returns zero if the result
652d9409 10945 could be calculated exactly within the requested precision. If
10946 DO_NONFINITE is true, then fold expressions containing Inf or NaN
10947 in the arguments and/or results. */
c699fab8 10948
63e89698 10949tree
652d9409 10950do_mpc_arg2 (tree arg0, tree arg1, tree type, int do_nonfinite,
c699fab8 10951 int (*func)(mpc_ptr, mpc_srcptr, mpc_srcptr, mpc_rnd_t))
10952{
10953 tree result = NULL_TREE;
48e1416a 10954
c699fab8 10955 STRIP_NOPS (arg0);
10956 STRIP_NOPS (arg1);
10957
10958 /* To proceed, MPFR must exactly represent the target floating point
10959 format, which only happens when the target base equals two. */
10960 if (TREE_CODE (arg0) == COMPLEX_CST && !TREE_OVERFLOW (arg0)
10961 && TREE_CODE (TREE_TYPE (TREE_TYPE (arg0))) == REAL_TYPE
10962 && TREE_CODE (arg1) == COMPLEX_CST && !TREE_OVERFLOW (arg1)
10963 && TREE_CODE (TREE_TYPE (TREE_TYPE (arg1))) == REAL_TYPE
10964 && REAL_MODE_FORMAT (TYPE_MODE (TREE_TYPE (TREE_TYPE (arg0))))->b == 2)
10965 {
10966 const REAL_VALUE_TYPE *const re0 = TREE_REAL_CST_PTR (TREE_REALPART (arg0));
10967 const REAL_VALUE_TYPE *const im0 = TREE_REAL_CST_PTR (TREE_IMAGPART (arg0));
10968 const REAL_VALUE_TYPE *const re1 = TREE_REAL_CST_PTR (TREE_REALPART (arg1));
10969 const REAL_VALUE_TYPE *const im1 = TREE_REAL_CST_PTR (TREE_IMAGPART (arg1));
10970
652d9409 10971 if (do_nonfinite
10972 || (real_isfinite (re0) && real_isfinite (im0)
10973 && real_isfinite (re1) && real_isfinite (im1)))
c699fab8 10974 {
10975 const struct real_format *const fmt =
10976 REAL_MODE_FORMAT (TYPE_MODE (TREE_TYPE (type)));
10977 const int prec = fmt->p;
10978 const mp_rnd_t rnd = fmt->round_towards_zero ? GMP_RNDZ : GMP_RNDN;
10979 const mpc_rnd_t crnd = fmt->round_towards_zero ? MPC_RNDZZ : MPC_RNDNN;
10980 int inexact;
10981 mpc_t m0, m1;
48e1416a 10982
c699fab8 10983 mpc_init2 (m0, prec);
10984 mpc_init2 (m1, prec);
9af5ce0c 10985 mpfr_from_real (mpc_realref (m0), re0, rnd);
10986 mpfr_from_real (mpc_imagref (m0), im0, rnd);
10987 mpfr_from_real (mpc_realref (m1), re1, rnd);
10988 mpfr_from_real (mpc_imagref (m1), im1, rnd);
c699fab8 10989 mpfr_clear_flags ();
10990 inexact = func (m0, m0, m1, crnd);
652d9409 10991 result = do_mpc_ckconv (m0, type, inexact, do_nonfinite);
c699fab8 10992 mpc_clear (m0);
10993 mpc_clear (m1);
10994 }
10995 }
10996
10997 return result;
10998}
239d491a 10999
75a70cf9 11000/* A wrapper function for builtin folding that prevents warnings for
11001 "statement without effect" and the like, caused by removing the
11002 call node earlier than the warning is generated. */
11003
11004tree
1a91d914 11005fold_call_stmt (gcall *stmt, bool ignore)
75a70cf9 11006{
11007 tree ret = NULL_TREE;
11008 tree fndecl = gimple_call_fndecl (stmt);
389dd41b 11009 location_t loc = gimple_location (stmt);
a0e9bfbb 11010 if (fndecl && fndecl_built_in_p (fndecl)
75a70cf9 11011 && !gimple_call_va_arg_pack_p (stmt))
11012 {
11013 int nargs = gimple_call_num_args (stmt);
9845fb99 11014 tree *args = (nargs > 0
11015 ? gimple_call_arg_ptr (stmt, 0)
11016 : &error_mark_node);
75a70cf9 11017
198622c0 11018 if (avoid_folding_inline_builtin (fndecl))
11019 return NULL_TREE;
75a70cf9 11020 if (DECL_BUILT_IN_CLASS (fndecl) == BUILT_IN_MD)
11021 {
9845fb99 11022 return targetm.fold_builtin (fndecl, nargs, args, ignore);
75a70cf9 11023 }
11024 else
11025 {
9d884767 11026 ret = fold_builtin_n (loc, fndecl, args, nargs, ignore);
75a70cf9 11027 if (ret)
11028 {
11029 /* Propagate location information from original call to
11030 expansion of builtin. Otherwise things like
11031 maybe_emit_chk_warning, that operate on the expansion
11032 of a builtin, will use the wrong location information. */
11033 if (gimple_has_location (stmt))
11034 {
11035 tree realret = ret;
11036 if (TREE_CODE (ret) == NOP_EXPR)
11037 realret = TREE_OPERAND (ret, 0);
11038 if (CAN_HAVE_LOCATION_P (realret)
11039 && !EXPR_HAS_LOCATION (realret))
389dd41b 11040 SET_EXPR_LOCATION (realret, loc);
75a70cf9 11041 return realret;
11042 }
11043 return ret;
11044 }
11045 }
11046 }
11047 return NULL_TREE;
11048}
7bfefa9d 11049
b9a16870 11050/* Look up the function in builtin_decl that corresponds to DECL
7bfefa9d 11051 and set ASMSPEC as its user assembler name. DECL must be a
11052 function decl that declares a builtin. */
11053
11054void
11055set_builtin_user_assembler_name (tree decl, const char *asmspec)
11056{
a0e9bfbb 11057 gcc_assert (fndecl_built_in_p (decl, BUILT_IN_NORMAL)
7bfefa9d 11058 && asmspec != 0);
11059
61ffc71a 11060 tree builtin = builtin_decl_explicit (DECL_FUNCTION_CODE (decl));
4d8e0d6d 11061 set_user_assembler_name (builtin, asmspec);
61ffc71a 11062
11063 if (DECL_FUNCTION_CODE (decl) == BUILT_IN_FFS
11064 && INT_TYPE_SIZE < BITS_PER_WORD)
7bfefa9d 11065 {
44504d18 11066 scalar_int_mode mode = int_mode_for_size (INT_TYPE_SIZE, 0).require ();
61ffc71a 11067 set_user_assembler_libfunc ("ffs", asmspec);
44504d18 11068 set_optab_libfunc (ffs_optab, mode, "ffs");
7bfefa9d 11069 }
11070}
a6b74a67 11071
11072/* Return true if DECL is a builtin that expands to a constant or similarly
11073 simple code. */
11074bool
11075is_simple_builtin (tree decl)
11076{
a0e9bfbb 11077 if (decl && fndecl_built_in_p (decl, BUILT_IN_NORMAL))
a6b74a67 11078 switch (DECL_FUNCTION_CODE (decl))
11079 {
11080 /* Builtins that expand to constants. */
11081 case BUILT_IN_CONSTANT_P:
11082 case BUILT_IN_EXPECT:
11083 case BUILT_IN_OBJECT_SIZE:
11084 case BUILT_IN_UNREACHABLE:
11085 /* Simple register moves or loads from stack. */
fca0886c 11086 case BUILT_IN_ASSUME_ALIGNED:
a6b74a67 11087 case BUILT_IN_RETURN_ADDRESS:
11088 case BUILT_IN_EXTRACT_RETURN_ADDR:
11089 case BUILT_IN_FROB_RETURN_ADDR:
11090 case BUILT_IN_RETURN:
11091 case BUILT_IN_AGGREGATE_INCOMING_ADDRESS:
11092 case BUILT_IN_FRAME_ADDRESS:
11093 case BUILT_IN_VA_END:
11094 case BUILT_IN_STACK_SAVE:
11095 case BUILT_IN_STACK_RESTORE:
11096 /* Exception state returns or moves registers around. */
11097 case BUILT_IN_EH_FILTER:
11098 case BUILT_IN_EH_POINTER:
11099 case BUILT_IN_EH_COPY_VALUES:
11100 return true;
11101
11102 default:
11103 return false;
11104 }
11105
11106 return false;
11107}
11108
11109/* Return true if DECL is a builtin that is not expensive, i.e., they are
11110 most probably expanded inline into reasonably simple code. This is a
11111 superset of is_simple_builtin. */
11112bool
11113is_inexpensive_builtin (tree decl)
11114{
11115 if (!decl)
11116 return false;
11117 else if (DECL_BUILT_IN_CLASS (decl) == BUILT_IN_MD)
11118 return true;
11119 else if (DECL_BUILT_IN_CLASS (decl) == BUILT_IN_NORMAL)
11120 switch (DECL_FUNCTION_CODE (decl))
11121 {
11122 case BUILT_IN_ABS:
2b34677f 11123 CASE_BUILT_IN_ALLOCA:
74bdbe96 11124 case BUILT_IN_BSWAP16:
a6b74a67 11125 case BUILT_IN_BSWAP32:
11126 case BUILT_IN_BSWAP64:
11127 case BUILT_IN_CLZ:
11128 case BUILT_IN_CLZIMAX:
11129 case BUILT_IN_CLZL:
11130 case BUILT_IN_CLZLL:
11131 case BUILT_IN_CTZ:
11132 case BUILT_IN_CTZIMAX:
11133 case BUILT_IN_CTZL:
11134 case BUILT_IN_CTZLL:
11135 case BUILT_IN_FFS:
11136 case BUILT_IN_FFSIMAX:
11137 case BUILT_IN_FFSL:
11138 case BUILT_IN_FFSLL:
11139 case BUILT_IN_IMAXABS:
11140 case BUILT_IN_FINITE:
11141 case BUILT_IN_FINITEF:
11142 case BUILT_IN_FINITEL:
11143 case BUILT_IN_FINITED32:
11144 case BUILT_IN_FINITED64:
11145 case BUILT_IN_FINITED128:
11146 case BUILT_IN_FPCLASSIFY:
11147 case BUILT_IN_ISFINITE:
11148 case BUILT_IN_ISINF_SIGN:
11149 case BUILT_IN_ISINF:
11150 case BUILT_IN_ISINFF:
11151 case BUILT_IN_ISINFL:
11152 case BUILT_IN_ISINFD32:
11153 case BUILT_IN_ISINFD64:
11154 case BUILT_IN_ISINFD128:
11155 case BUILT_IN_ISNAN:
11156 case BUILT_IN_ISNANF:
11157 case BUILT_IN_ISNANL:
11158 case BUILT_IN_ISNAND32:
11159 case BUILT_IN_ISNAND64:
11160 case BUILT_IN_ISNAND128:
11161 case BUILT_IN_ISNORMAL:
11162 case BUILT_IN_ISGREATER:
11163 case BUILT_IN_ISGREATEREQUAL:
11164 case BUILT_IN_ISLESS:
11165 case BUILT_IN_ISLESSEQUAL:
11166 case BUILT_IN_ISLESSGREATER:
11167 case BUILT_IN_ISUNORDERED:
11168 case BUILT_IN_VA_ARG_PACK:
11169 case BUILT_IN_VA_ARG_PACK_LEN:
11170 case BUILT_IN_VA_COPY:
11171 case BUILT_IN_TRAP:
11172 case BUILT_IN_SAVEREGS:
11173 case BUILT_IN_POPCOUNTL:
11174 case BUILT_IN_POPCOUNTLL:
11175 case BUILT_IN_POPCOUNTIMAX:
11176 case BUILT_IN_POPCOUNT:
11177 case BUILT_IN_PARITYL:
11178 case BUILT_IN_PARITYLL:
11179 case BUILT_IN_PARITYIMAX:
11180 case BUILT_IN_PARITY:
11181 case BUILT_IN_LABS:
11182 case BUILT_IN_LLABS:
11183 case BUILT_IN_PREFETCH:
ca4c3545 11184 case BUILT_IN_ACC_ON_DEVICE:
a6b74a67 11185 return true;
11186
11187 default:
11188 return is_simple_builtin (decl);
11189 }
11190
11191 return false;
11192}
507a998e 11193
11194/* Return true if T is a constant and the value cast to a target char
11195 can be represented by a host char.
11196 Store the casted char constant in *P if so. */
11197
11198bool
11199target_char_cst_p (tree t, char *p)
11200{
11201 if (!tree_fits_uhwi_p (t) || CHAR_TYPE_SIZE != HOST_BITS_PER_CHAR)
11202 return false;
11203
11204 *p = (char)tree_to_uhwi (t);
11205 return true;
11206}
e6a18b5a 11207
11208/* Return the maximum object size. */
11209
11210tree
11211max_object_size (void)
11212{
11213 /* To do: Make this a configurable parameter. */
11214 return TYPE_MAX_VALUE (ptrdiff_type_node);
11215}