]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/tree-ssa-ccp.c
2013-10-22 Paolo Carlini <paolo.carlini@oracle.com>
[thirdparty/gcc.git] / gcc / tree-ssa-ccp.c
CommitLineData
4ee9c684 1/* Conditional constant propagation pass for the GNU compiler.
711789cc 2 Copyright (C) 2000-2013 Free Software Foundation, Inc.
4ee9c684 3 Adapted from original RTL SSA-CCP by Daniel Berlin <dberlin@dberlin.org>
4 Adapted to GIMPLE trees by Diego Novillo <dnovillo@redhat.com>
5
6This file is part of GCC.
48e1416a 7
4ee9c684 8GCC is free software; you can redistribute it and/or modify it
9under the terms of the GNU General Public License as published by the
8c4c00c1 10Free Software Foundation; either version 3, or (at your option) any
4ee9c684 11later version.
48e1416a 12
4ee9c684 13GCC is distributed in the hope that it will be useful, but WITHOUT
14ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
15FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
16for more details.
48e1416a 17
4ee9c684 18You should have received a copy of the GNU General Public License
8c4c00c1 19along with GCC; see the file COPYING3. If not see
20<http://www.gnu.org/licenses/>. */
4ee9c684 21
88dbf20f 22/* Conditional constant propagation (CCP) is based on the SSA
23 propagation engine (tree-ssa-propagate.c). Constant assignments of
24 the form VAR = CST are propagated from the assignments into uses of
25 VAR, which in turn may generate new constants. The simulation uses
26 a four level lattice to keep track of constant values associated
27 with SSA names. Given an SSA name V_i, it may take one of the
28 following values:
29
bfa30570 30 UNINITIALIZED -> the initial state of the value. This value
31 is replaced with a correct initial value
32 the first time the value is used, so the
33 rest of the pass does not need to care about
34 it. Using this value simplifies initialization
35 of the pass, and prevents us from needlessly
36 scanning statements that are never reached.
88dbf20f 37
38 UNDEFINED -> V_i is a local variable whose definition
39 has not been processed yet. Therefore we
40 don't yet know if its value is a constant
41 or not.
42
43 CONSTANT -> V_i has been found to hold a constant
44 value C.
45
46 VARYING -> V_i cannot take a constant value, or if it
47 does, it is not possible to determine it
48 at compile time.
49
50 The core of SSA-CCP is in ccp_visit_stmt and ccp_visit_phi_node:
51
52 1- In ccp_visit_stmt, we are interested in assignments whose RHS
53 evaluates into a constant and conditional jumps whose predicate
54 evaluates into a boolean true or false. When an assignment of
55 the form V_i = CONST is found, V_i's lattice value is set to
56 CONSTANT and CONST is associated with it. This causes the
57 propagation engine to add all the SSA edges coming out the
58 assignment into the worklists, so that statements that use V_i
59 can be visited.
60
61 If the statement is a conditional with a constant predicate, we
62 mark the outgoing edges as executable or not executable
63 depending on the predicate's value. This is then used when
64 visiting PHI nodes to know when a PHI argument can be ignored.
48e1416a 65
88dbf20f 66
67 2- In ccp_visit_phi_node, if all the PHI arguments evaluate to the
68 same constant C, then the LHS of the PHI is set to C. This
69 evaluation is known as the "meet operation". Since one of the
70 goals of this evaluation is to optimistically return constant
71 values as often as possible, it uses two main short cuts:
72
73 - If an argument is flowing in through a non-executable edge, it
74 is ignored. This is useful in cases like this:
75
76 if (PRED)
77 a_9 = 3;
78 else
79 a_10 = 100;
80 a_11 = PHI (a_9, a_10)
81
82 If PRED is known to always evaluate to false, then we can
83 assume that a_11 will always take its value from a_10, meaning
84 that instead of consider it VARYING (a_9 and a_10 have
85 different values), we can consider it CONSTANT 100.
86
87 - If an argument has an UNDEFINED value, then it does not affect
88 the outcome of the meet operation. If a variable V_i has an
89 UNDEFINED value, it means that either its defining statement
90 hasn't been visited yet or V_i has no defining statement, in
91 which case the original symbol 'V' is being used
92 uninitialized. Since 'V' is a local variable, the compiler
93 may assume any initial value for it.
94
95
96 After propagation, every variable V_i that ends up with a lattice
97 value of CONSTANT will have the associated constant value in the
98 array CONST_VAL[i].VALUE. That is fed into substitute_and_fold for
99 final substitution and folding.
100
4ee9c684 101 References:
102
103 Constant propagation with conditional branches,
104 Wegman and Zadeck, ACM TOPLAS 13(2):181-210.
105
106 Building an Optimizing Compiler,
107 Robert Morgan, Butterworth-Heinemann, 1998, Section 8.9.
108
109 Advanced Compiler Design and Implementation,
110 Steven Muchnick, Morgan Kaufmann, 1997, Section 12.6 */
111
112#include "config.h"
113#include "system.h"
114#include "coretypes.h"
115#include "tm.h"
4ee9c684 116#include "tree.h"
41511585 117#include "flags.h"
4ee9c684 118#include "tm_p.h"
4ee9c684 119#include "basic-block.h"
41511585 120#include "function.h"
ce084dfc 121#include "gimple-pretty-print.h"
69ee5dbb 122#include "tree-ssa.h"
4ee9c684 123#include "tree-pass.h"
41511585 124#include "tree-ssa-propagate.h"
5a4b7e1e 125#include "value-prof.h"
41511585 126#include "langhooks.h"
8782adcf 127#include "target.h"
0b205f4c 128#include "diagnostic-core.h"
43fb76c1 129#include "dbgcnt.h"
9a65cc0a 130#include "params.h"
2b15d2ba 131#include "hash-table.h"
4ee9c684 132
133
134/* Possible lattice values. */
135typedef enum
136{
bfa30570 137 UNINITIALIZED,
4ee9c684 138 UNDEFINED,
139 CONSTANT,
140 VARYING
88dbf20f 141} ccp_lattice_t;
4ee9c684 142
14f101cf 143struct prop_value_d {
144 /* Lattice value. */
145 ccp_lattice_t lattice_val;
146
147 /* Propagated value. */
148 tree value;
b7e55469 149
150 /* Mask that applies to the propagated value during CCP. For
151 X with a CONSTANT lattice value X & ~mask == value & ~mask. */
152 double_int mask;
14f101cf 153};
154
155typedef struct prop_value_d prop_value_t;
156
88dbf20f 157/* Array of propagated constant values. After propagation,
158 CONST_VAL[I].VALUE holds the constant value for SSA_NAME(I). If
159 the constant is held in an SSA name representing a memory store
4fb5e5ca 160 (i.e., a VDEF), CONST_VAL[I].MEM_REF will contain the actual
161 memory reference used to store (i.e., the LHS of the assignment
162 doing the store). */
20140406 163static prop_value_t *const_val;
285df01b 164static unsigned n_const_val;
4ee9c684 165
4af351a8 166static void canonicalize_float_value (prop_value_t *);
6688f8ec 167static bool ccp_fold_stmt (gimple_stmt_iterator *);
4af351a8 168
88dbf20f 169/* Dump constant propagation value VAL to file OUTF prefixed by PREFIX. */
01406fc0 170
171static void
88dbf20f 172dump_lattice_value (FILE *outf, const char *prefix, prop_value_t val)
01406fc0 173{
41511585 174 switch (val.lattice_val)
01406fc0 175 {
88dbf20f 176 case UNINITIALIZED:
177 fprintf (outf, "%sUNINITIALIZED", prefix);
178 break;
41511585 179 case UNDEFINED:
180 fprintf (outf, "%sUNDEFINED", prefix);
181 break;
182 case VARYING:
183 fprintf (outf, "%sVARYING", prefix);
184 break;
41511585 185 case CONSTANT:
b7e55469 186 if (TREE_CODE (val.value) != INTEGER_CST
cf8f0e63 187 || val.mask.is_zero ())
16ab4e97 188 {
189 fprintf (outf, "%sCONSTANT ", prefix);
190 print_generic_expr (outf, val.value, dump_flags);
191 }
b7e55469 192 else
193 {
cf8f0e63 194 double_int cval = tree_to_double_int (val.value).and_not (val.mask);
b7e55469 195 fprintf (outf, "%sCONSTANT " HOST_WIDE_INT_PRINT_DOUBLE_HEX,
196 prefix, cval.high, cval.low);
197 fprintf (outf, " (" HOST_WIDE_INT_PRINT_DOUBLE_HEX ")",
198 val.mask.high, val.mask.low);
199 }
41511585 200 break;
201 default:
8c0963c4 202 gcc_unreachable ();
41511585 203 }
01406fc0 204}
4ee9c684 205
4ee9c684 206
88dbf20f 207/* Print lattice value VAL to stderr. */
208
209void debug_lattice_value (prop_value_t val);
210
4b987fac 211DEBUG_FUNCTION void
88dbf20f 212debug_lattice_value (prop_value_t val)
213{
214 dump_lattice_value (stderr, "", val);
215 fprintf (stderr, "\n");
216}
4ee9c684 217
4ee9c684 218
88dbf20f 219/* Compute a default value for variable VAR and store it in the
220 CONST_VAL array. The following rules are used to get default
221 values:
01406fc0 222
88dbf20f 223 1- Global and static variables that are declared constant are
224 considered CONSTANT.
225
226 2- Any other value is considered UNDEFINED. This is useful when
41511585 227 considering PHI nodes. PHI arguments that are undefined do not
228 change the constant value of the PHI node, which allows for more
88dbf20f 229 constants to be propagated.
4ee9c684 230
8883e700 231 3- Variables defined by statements other than assignments and PHI
88dbf20f 232 nodes are considered VARYING.
4ee9c684 233
8883e700 234 4- Initial values of variables that are not GIMPLE registers are
bfa30570 235 considered VARYING. */
4ee9c684 236
88dbf20f 237static prop_value_t
238get_default_value (tree var)
239{
b7e55469 240 prop_value_t val = { UNINITIALIZED, NULL_TREE, { 0, 0 } };
8edeb88b 241 gimple stmt;
242
243 stmt = SSA_NAME_DEF_STMT (var);
244
245 if (gimple_nop_p (stmt))
4ee9c684 246 {
8edeb88b 247 /* Variables defined by an empty statement are those used
248 before being initialized. If VAR is a local variable, we
249 can assume initially that it is UNDEFINED, otherwise we must
250 consider it VARYING. */
7c782c9b 251 if (!virtual_operand_p (var)
252 && TREE_CODE (SSA_NAME_VAR (var)) == VAR_DECL)
8edeb88b 253 val.lattice_val = UNDEFINED;
254 else
b7e55469 255 {
256 val.lattice_val = VARYING;
257 val.mask = double_int_minus_one;
258 }
4ee9c684 259 }
b45b214a 260 else if (is_gimple_assign (stmt))
41511585 261 {
8edeb88b 262 tree cst;
263 if (gimple_assign_single_p (stmt)
264 && DECL_P (gimple_assign_rhs1 (stmt))
265 && (cst = get_symbol_constant_value (gimple_assign_rhs1 (stmt))))
88dbf20f 266 {
8edeb88b 267 val.lattice_val = CONSTANT;
268 val.value = cst;
88dbf20f 269 }
270 else
b45b214a 271 {
272 /* Any other variable defined by an assignment is considered
273 UNDEFINED. */
274 val.lattice_val = UNDEFINED;
275 }
276 }
277 else if ((is_gimple_call (stmt)
278 && gimple_call_lhs (stmt) != NULL_TREE)
279 || gimple_code (stmt) == GIMPLE_PHI)
280 {
281 /* A variable defined by a call or a PHI node is considered
282 UNDEFINED. */
283 val.lattice_val = UNDEFINED;
8edeb88b 284 }
285 else
286 {
287 /* Otherwise, VAR will never take on a constant value. */
288 val.lattice_val = VARYING;
b7e55469 289 val.mask = double_int_minus_one;
41511585 290 }
4ee9c684 291
41511585 292 return val;
293}
4ee9c684 294
4ee9c684 295
bfa30570 296/* Get the constant value associated with variable VAR. */
4ee9c684 297
bfa30570 298static inline prop_value_t *
299get_value (tree var)
88dbf20f 300{
e004838d 301 prop_value_t *val;
bfa30570 302
285df01b 303 if (const_val == NULL
304 || SSA_NAME_VERSION (var) >= n_const_val)
e004838d 305 return NULL;
306
307 val = &const_val[SSA_NAME_VERSION (var)];
bfa30570 308 if (val->lattice_val == UNINITIALIZED)
4ee9c684 309 *val = get_default_value (var);
310
4af351a8 311 canonicalize_float_value (val);
312
4ee9c684 313 return val;
314}
315
15d138c9 316/* Return the constant tree value associated with VAR. */
317
318static inline tree
319get_constant_value (tree var)
320{
98d92e3c 321 prop_value_t *val;
322 if (TREE_CODE (var) != SSA_NAME)
323 {
324 if (is_gimple_min_invariant (var))
325 return var;
326 return NULL_TREE;
327 }
328 val = get_value (var);
b7e55469 329 if (val
330 && val->lattice_val == CONSTANT
331 && (TREE_CODE (val->value) != INTEGER_CST
cf8f0e63 332 || val->mask.is_zero ()))
15d138c9 333 return val->value;
334 return NULL_TREE;
335}
336
bfa30570 337/* Sets the value associated with VAR to VARYING. */
338
339static inline void
340set_value_varying (tree var)
341{
342 prop_value_t *val = &const_val[SSA_NAME_VERSION (var)];
343
344 val->lattice_val = VARYING;
345 val->value = NULL_TREE;
b7e55469 346 val->mask = double_int_minus_one;
bfa30570 347}
4ee9c684 348
b31eb493 349/* For float types, modify the value of VAL to make ccp work correctly
350 for non-standard values (-0, NaN):
351
352 If HONOR_SIGNED_ZEROS is false, and VAL = -0, we canonicalize it to 0.
353 If HONOR_NANS is false, and VAL is NaN, we canonicalize it to UNDEFINED.
354 This is to fix the following problem (see PR 29921): Suppose we have
355
356 x = 0.0 * y
357
358 and we set value of y to NaN. This causes value of x to be set to NaN.
359 When we later determine that y is in fact VARYING, fold uses the fact
360 that HONOR_NANS is false, and we try to change the value of x to 0,
361 causing an ICE. With HONOR_NANS being false, the real appearance of
362 NaN would cause undefined behavior, though, so claiming that y (and x)
363 are UNDEFINED initially is correct. */
364
365static void
366canonicalize_float_value (prop_value_t *val)
367{
368 enum machine_mode mode;
369 tree type;
370 REAL_VALUE_TYPE d;
371
372 if (val->lattice_val != CONSTANT
373 || TREE_CODE (val->value) != REAL_CST)
374 return;
375
376 d = TREE_REAL_CST (val->value);
377 type = TREE_TYPE (val->value);
378 mode = TYPE_MODE (type);
379
380 if (!HONOR_SIGNED_ZEROS (mode)
381 && REAL_VALUE_MINUS_ZERO (d))
382 {
383 val->value = build_real (type, dconst0);
384 return;
385 }
386
387 if (!HONOR_NANS (mode)
388 && REAL_VALUE_ISNAN (d))
389 {
390 val->lattice_val = UNDEFINED;
391 val->value = NULL;
b31eb493 392 return;
393 }
394}
395
b7e55469 396/* Return whether the lattice transition is valid. */
397
398static bool
399valid_lattice_transition (prop_value_t old_val, prop_value_t new_val)
400{
401 /* Lattice transitions must always be monotonically increasing in
402 value. */
403 if (old_val.lattice_val < new_val.lattice_val)
404 return true;
405
406 if (old_val.lattice_val != new_val.lattice_val)
407 return false;
408
409 if (!old_val.value && !new_val.value)
410 return true;
411
412 /* Now both lattice values are CONSTANT. */
413
43c92e0a 414 /* Allow transitioning from PHI <&x, not executable> == &x
415 to PHI <&x, &y> == common alignment. */
b7e55469 416 if (TREE_CODE (old_val.value) != INTEGER_CST
417 && TREE_CODE (new_val.value) == INTEGER_CST)
418 return true;
419
420 /* Bit-lattices have to agree in the still valid bits. */
421 if (TREE_CODE (old_val.value) == INTEGER_CST
422 && TREE_CODE (new_val.value) == INTEGER_CST)
cf8f0e63 423 return tree_to_double_int (old_val.value).and_not (new_val.mask)
424 == tree_to_double_int (new_val.value).and_not (new_val.mask);
b7e55469 425
426 /* Otherwise constant values have to agree. */
427 return operand_equal_p (old_val.value, new_val.value, 0);
428}
429
88dbf20f 430/* Set the value for variable VAR to NEW_VAL. Return true if the new
431 value is different from VAR's previous value. */
4ee9c684 432
41511585 433static bool
88dbf20f 434set_lattice_value (tree var, prop_value_t new_val)
4ee9c684 435{
6d0bf6d6 436 /* We can deal with old UNINITIALIZED values just fine here. */
437 prop_value_t *old_val = &const_val[SSA_NAME_VERSION (var)];
88dbf20f 438
b31eb493 439 canonicalize_float_value (&new_val);
440
b7e55469 441 /* We have to be careful to not go up the bitwise lattice
442 represented by the mask.
443 ??? This doesn't seem to be the best place to enforce this. */
444 if (new_val.lattice_val == CONSTANT
445 && old_val->lattice_val == CONSTANT
446 && TREE_CODE (new_val.value) == INTEGER_CST
447 && TREE_CODE (old_val->value) == INTEGER_CST)
448 {
449 double_int diff;
cf8f0e63 450 diff = tree_to_double_int (new_val.value)
451 ^ tree_to_double_int (old_val->value);
452 new_val.mask = new_val.mask | old_val->mask | diff;
b7e55469 453 }
bfa30570 454
b7e55469 455 gcc_assert (valid_lattice_transition (*old_val, new_val));
88dbf20f 456
b7e55469 457 /* If *OLD_VAL and NEW_VAL are the same, return false to inform the
458 caller that this was a non-transition. */
459 if (old_val->lattice_val != new_val.lattice_val
460 || (new_val.lattice_val == CONSTANT
461 && TREE_CODE (new_val.value) == INTEGER_CST
462 && (TREE_CODE (old_val->value) != INTEGER_CST
cf8f0e63 463 || new_val.mask != old_val->mask)))
4ee9c684 464 {
b7e55469 465 /* ??? We would like to delay creation of INTEGER_CSTs from
466 partially constants here. */
467
41511585 468 if (dump_file && (dump_flags & TDF_DETAILS))
469 {
88dbf20f 470 dump_lattice_value (dump_file, "Lattice value changed to ", new_val);
bfa30570 471 fprintf (dump_file, ". Adding SSA edges to worklist.\n");
41511585 472 }
473
88dbf20f 474 *old_val = new_val;
475
6d0bf6d6 476 gcc_assert (new_val.lattice_val != UNINITIALIZED);
bfa30570 477 return true;
4ee9c684 478 }
41511585 479
480 return false;
4ee9c684 481}
482
b7e55469 483static prop_value_t get_value_for_expr (tree, bool);
484static prop_value_t bit_value_binop (enum tree_code, tree, tree, tree);
485static void bit_value_binop_1 (enum tree_code, tree, double_int *, double_int *,
486 tree, double_int, double_int,
487 tree, double_int, double_int);
488
489/* Return a double_int that can be used for bitwise simplifications
490 from VAL. */
491
492static double_int
493value_to_double_int (prop_value_t val)
494{
495 if (val.value
496 && TREE_CODE (val.value) == INTEGER_CST)
497 return tree_to_double_int (val.value);
498 else
499 return double_int_zero;
500}
501
502/* Return the value for the address expression EXPR based on alignment
503 information. */
6d0bf6d6 504
505static prop_value_t
b7e55469 506get_value_from_alignment (tree expr)
507{
f8abb542 508 tree type = TREE_TYPE (expr);
b7e55469 509 prop_value_t val;
f8abb542 510 unsigned HOST_WIDE_INT bitpos;
511 unsigned int align;
b7e55469 512
513 gcc_assert (TREE_CODE (expr) == ADDR_EXPR);
514
59da1bcd 515 get_pointer_alignment_1 (expr, &align, &bitpos);
cf8f0e63 516 val.mask = (POINTER_TYPE_P (type) || TYPE_UNSIGNED (type)
517 ? double_int::mask (TYPE_PRECISION (type))
518 : double_int_minus_one)
519 .and_not (double_int::from_uhwi (align / BITS_PER_UNIT - 1));
520 val.lattice_val = val.mask.is_minus_one () ? VARYING : CONSTANT;
f8abb542 521 if (val.lattice_val == CONSTANT)
522 val.value
cf8f0e63 523 = double_int_to_tree (type,
524 double_int::from_uhwi (bitpos / BITS_PER_UNIT));
b7e55469 525 else
f8abb542 526 val.value = NULL_TREE;
b7e55469 527
528 return val;
529}
530
531/* Return the value for the tree operand EXPR. If FOR_BITS_P is true
532 return constant bits extracted from alignment information for
533 invariant addresses. */
534
535static prop_value_t
536get_value_for_expr (tree expr, bool for_bits_p)
6d0bf6d6 537{
538 prop_value_t val;
539
540 if (TREE_CODE (expr) == SSA_NAME)
b7e55469 541 {
542 val = *get_value (expr);
543 if (for_bits_p
544 && val.lattice_val == CONSTANT
545 && TREE_CODE (val.value) == ADDR_EXPR)
546 val = get_value_from_alignment (val.value);
547 }
548 else if (is_gimple_min_invariant (expr)
549 && (!for_bits_p || TREE_CODE (expr) != ADDR_EXPR))
6d0bf6d6 550 {
551 val.lattice_val = CONSTANT;
552 val.value = expr;
b7e55469 553 val.mask = double_int_zero;
6d0bf6d6 554 canonicalize_float_value (&val);
555 }
b7e55469 556 else if (TREE_CODE (expr) == ADDR_EXPR)
557 val = get_value_from_alignment (expr);
6d0bf6d6 558 else
559 {
560 val.lattice_val = VARYING;
b7e55469 561 val.mask = double_int_minus_one;
6d0bf6d6 562 val.value = NULL_TREE;
563 }
6d0bf6d6 564 return val;
565}
566
88dbf20f 567/* Return the likely CCP lattice value for STMT.
4ee9c684 568
41511585 569 If STMT has no operands, then return CONSTANT.
4ee9c684 570
d61b9af3 571 Else if undefinedness of operands of STMT cause its value to be
572 undefined, then return UNDEFINED.
4ee9c684 573
41511585 574 Else if any operands of STMT are constants, then return CONSTANT.
4ee9c684 575
41511585 576 Else return VARYING. */
4ee9c684 577
88dbf20f 578static ccp_lattice_t
75a70cf9 579likely_value (gimple stmt)
41511585 580{
d61b9af3 581 bool has_constant_operand, has_undefined_operand, all_undefined_operands;
41511585 582 tree use;
583 ssa_op_iter iter;
8edeb88b 584 unsigned i;
4ee9c684 585
590c3166 586 enum gimple_code code = gimple_code (stmt);
75a70cf9 587
588 /* This function appears to be called only for assignments, calls,
589 conditionals, and switches, due to the logic in visit_stmt. */
590 gcc_assert (code == GIMPLE_ASSIGN
591 || code == GIMPLE_CALL
592 || code == GIMPLE_COND
593 || code == GIMPLE_SWITCH);
88dbf20f 594
595 /* If the statement has volatile operands, it won't fold to a
596 constant value. */
75a70cf9 597 if (gimple_has_volatile_ops (stmt))
88dbf20f 598 return VARYING;
599
75a70cf9 600 /* Arrive here for more complex cases. */
bfa30570 601 has_constant_operand = false;
d61b9af3 602 has_undefined_operand = false;
603 all_undefined_operands = true;
8edeb88b 604 FOR_EACH_SSA_TREE_OPERAND (use, stmt, iter, SSA_OP_USE)
41511585 605 {
bfa30570 606 prop_value_t *val = get_value (use);
41511585 607
bfa30570 608 if (val->lattice_val == UNDEFINED)
d61b9af3 609 has_undefined_operand = true;
610 else
611 all_undefined_operands = false;
88dbf20f 612
41511585 613 if (val->lattice_val == CONSTANT)
bfa30570 614 has_constant_operand = true;
4ee9c684 615 }
41511585 616
dd277d48 617 /* There may be constants in regular rhs operands. For calls we
618 have to ignore lhs, fndecl and static chain, otherwise only
619 the lhs. */
620 for (i = (is_gimple_call (stmt) ? 2 : 0) + gimple_has_lhs (stmt);
8edeb88b 621 i < gimple_num_ops (stmt); ++i)
622 {
623 tree op = gimple_op (stmt, i);
624 if (!op || TREE_CODE (op) == SSA_NAME)
625 continue;
626 if (is_gimple_min_invariant (op))
627 has_constant_operand = true;
628 }
629
87c0a9fc 630 if (has_constant_operand)
631 all_undefined_operands = false;
632
3d483a94 633 if (has_undefined_operand
634 && code == GIMPLE_CALL
635 && gimple_call_internal_p (stmt))
636 switch (gimple_call_internal_fn (stmt))
637 {
638 /* These 3 builtins use the first argument just as a magic
639 way how to find out a decl uid. */
640 case IFN_GOMP_SIMD_LANE:
641 case IFN_GOMP_SIMD_VF:
642 case IFN_GOMP_SIMD_LAST_LANE:
643 has_undefined_operand = false;
644 break;
645 default:
646 break;
647 }
648
d61b9af3 649 /* If the operation combines operands like COMPLEX_EXPR make sure to
650 not mark the result UNDEFINED if only one part of the result is
651 undefined. */
75a70cf9 652 if (has_undefined_operand && all_undefined_operands)
d61b9af3 653 return UNDEFINED;
75a70cf9 654 else if (code == GIMPLE_ASSIGN && has_undefined_operand)
d61b9af3 655 {
75a70cf9 656 switch (gimple_assign_rhs_code (stmt))
d61b9af3 657 {
658 /* Unary operators are handled with all_undefined_operands. */
659 case PLUS_EXPR:
660 case MINUS_EXPR:
d61b9af3 661 case POINTER_PLUS_EXPR:
d61b9af3 662 /* Not MIN_EXPR, MAX_EXPR. One VARYING operand may be selected.
663 Not bitwise operators, one VARYING operand may specify the
664 result completely. Not logical operators for the same reason.
05a936a0 665 Not COMPLEX_EXPR as one VARYING operand makes the result partly
666 not UNDEFINED. Not *DIV_EXPR, comparisons and shifts because
667 the undefined operand may be promoted. */
d61b9af3 668 return UNDEFINED;
669
43c92e0a 670 case ADDR_EXPR:
671 /* If any part of an address is UNDEFINED, like the index
672 of an ARRAY_EXPR, then treat the result as UNDEFINED. */
673 return UNDEFINED;
674
d61b9af3 675 default:
676 ;
677 }
678 }
679 /* If there was an UNDEFINED operand but the result may be not UNDEFINED
c91fedc5 680 fall back to CONSTANT. During iteration UNDEFINED may still drop
681 to CONSTANT. */
d61b9af3 682 if (has_undefined_operand)
c91fedc5 683 return CONSTANT;
d61b9af3 684
8edeb88b 685 /* We do not consider virtual operands here -- load from read-only
686 memory may have only VARYING virtual operands, but still be
687 constant. */
bfa30570 688 if (has_constant_operand
8edeb88b 689 || gimple_references_memory_p (stmt))
88dbf20f 690 return CONSTANT;
691
bfa30570 692 return VARYING;
4ee9c684 693}
694
bfa30570 695/* Returns true if STMT cannot be constant. */
696
697static bool
75a70cf9 698surely_varying_stmt_p (gimple stmt)
bfa30570 699{
700 /* If the statement has operands that we cannot handle, it cannot be
701 constant. */
75a70cf9 702 if (gimple_has_volatile_ops (stmt))
bfa30570 703 return true;
704
f257af64 705 /* If it is a call and does not return a value or is not a
706 builtin and not an indirect call, it is varying. */
75a70cf9 707 if (is_gimple_call (stmt))
f257af64 708 {
709 tree fndecl;
710 if (!gimple_call_lhs (stmt)
711 || ((fndecl = gimple_call_fndecl (stmt)) != NULL_TREE
5768aeb3 712 && !DECL_BUILT_IN (fndecl)))
f257af64 713 return true;
714 }
bfa30570 715
8edeb88b 716 /* Any other store operation is not interesting. */
dd277d48 717 else if (gimple_vdef (stmt))
8edeb88b 718 return true;
719
bfa30570 720 /* Anything other than assignments and conditional jumps are not
721 interesting for CCP. */
75a70cf9 722 if (gimple_code (stmt) != GIMPLE_ASSIGN
f257af64 723 && gimple_code (stmt) != GIMPLE_COND
724 && gimple_code (stmt) != GIMPLE_SWITCH
725 && gimple_code (stmt) != GIMPLE_CALL)
bfa30570 726 return true;
727
728 return false;
729}
4ee9c684 730
41511585 731/* Initialize local data structures for CCP. */
4ee9c684 732
733static void
41511585 734ccp_initialize (void)
4ee9c684 735{
41511585 736 basic_block bb;
4ee9c684 737
285df01b 738 n_const_val = num_ssa_names;
739 const_val = XCNEWVEC (prop_value_t, n_const_val);
4ee9c684 740
41511585 741 /* Initialize simulation flags for PHI nodes and statements. */
742 FOR_EACH_BB (bb)
4ee9c684 743 {
75a70cf9 744 gimple_stmt_iterator i;
4ee9c684 745
75a70cf9 746 for (i = gsi_start_bb (bb); !gsi_end_p (i); gsi_next (&i))
41511585 747 {
75a70cf9 748 gimple stmt = gsi_stmt (i);
2193544e 749 bool is_varying;
750
751 /* If the statement is a control insn, then we do not
752 want to avoid simulating the statement once. Failure
753 to do so means that those edges will never get added. */
754 if (stmt_ends_bb_p (stmt))
755 is_varying = false;
756 else
757 is_varying = surely_varying_stmt_p (stmt);
4ee9c684 758
bfa30570 759 if (is_varying)
41511585 760 {
88dbf20f 761 tree def;
762 ssa_op_iter iter;
763
764 /* If the statement will not produce a constant, mark
765 all its outputs VARYING. */
766 FOR_EACH_SSA_TREE_OPERAND (def, stmt, iter, SSA_OP_ALL_DEFS)
8edeb88b 767 set_value_varying (def);
41511585 768 }
75a70cf9 769 prop_set_simulate_again (stmt, !is_varying);
41511585 770 }
4ee9c684 771 }
772
75a70cf9 773 /* Now process PHI nodes. We never clear the simulate_again flag on
774 phi nodes, since we do not know which edges are executable yet,
775 except for phi nodes for virtual operands when we do not do store ccp. */
41511585 776 FOR_EACH_BB (bb)
4ee9c684 777 {
75a70cf9 778 gimple_stmt_iterator i;
41511585 779
75a70cf9 780 for (i = gsi_start_phis (bb); !gsi_end_p (i); gsi_next (&i))
781 {
782 gimple phi = gsi_stmt (i);
783
7c782c9b 784 if (virtual_operand_p (gimple_phi_result (phi)))
75a70cf9 785 prop_set_simulate_again (phi, false);
bfa30570 786 else
75a70cf9 787 prop_set_simulate_again (phi, true);
41511585 788 }
4ee9c684 789 }
41511585 790}
4ee9c684 791
43fb76c1 792/* Debug count support. Reset the values of ssa names
793 VARYING when the total number ssa names analyzed is
794 beyond the debug count specified. */
795
796static void
797do_dbg_cnt (void)
798{
799 unsigned i;
800 for (i = 0; i < num_ssa_names; i++)
801 {
802 if (!dbg_cnt (ccp))
803 {
804 const_val[i].lattice_val = VARYING;
b7e55469 805 const_val[i].mask = double_int_minus_one;
43fb76c1 806 const_val[i].value = NULL_TREE;
807 }
808 }
809}
810
4ee9c684 811
88dbf20f 812/* Do final substitution of propagated values, cleanup the flowgraph and
48e1416a 813 free allocated storage.
4ee9c684 814
33a34f1e 815 Return TRUE when something was optimized. */
816
817static bool
88dbf20f 818ccp_finalize (void)
4ee9c684 819{
43fb76c1 820 bool something_changed;
153c3b50 821 unsigned i;
43fb76c1 822
823 do_dbg_cnt ();
153c3b50 824
825 /* Derive alignment and misalignment information from partially
826 constant pointers in the lattice. */
827 for (i = 1; i < num_ssa_names; ++i)
828 {
829 tree name = ssa_name (i);
830 prop_value_t *val;
153c3b50 831 unsigned int tem, align;
832
833 if (!name
834 || !POINTER_TYPE_P (TREE_TYPE (name)))
835 continue;
836
837 val = get_value (name);
838 if (val->lattice_val != CONSTANT
839 || TREE_CODE (val->value) != INTEGER_CST)
840 continue;
841
842 /* Trailing constant bits specify the alignment, trailing value
843 bits the misalignment. */
844 tem = val->mask.low;
845 align = (tem & -tem);
ceea063b 846 if (align > 1)
847 set_ptr_info_alignment (get_ptr_info (name), align,
848 TREE_INT_CST_LOW (val->value) & (align - 1));
153c3b50 849 }
850
88dbf20f 851 /* Perform substitutions based on the known constant values. */
14f101cf 852 something_changed = substitute_and_fold (get_constant_value,
853 ccp_fold_stmt, true);
4ee9c684 854
88dbf20f 855 free (const_val);
e004838d 856 const_val = NULL;
33a34f1e 857 return something_changed;;
4ee9c684 858}
859
860
88dbf20f 861/* Compute the meet operator between *VAL1 and *VAL2. Store the result
862 in VAL1.
863
864 any M UNDEFINED = any
88dbf20f 865 any M VARYING = VARYING
866 Ci M Cj = Ci if (i == j)
867 Ci M Cj = VARYING if (i != j)
bfa30570 868 */
4ee9c684 869
870static void
88dbf20f 871ccp_lattice_meet (prop_value_t *val1, prop_value_t *val2)
4ee9c684 872{
88dbf20f 873 if (val1->lattice_val == UNDEFINED)
4ee9c684 874 {
88dbf20f 875 /* UNDEFINED M any = any */
876 *val1 = *val2;
41511585 877 }
88dbf20f 878 else if (val2->lattice_val == UNDEFINED)
92481a4d 879 {
88dbf20f 880 /* any M UNDEFINED = any
881 Nothing to do. VAL1 already contains the value we want. */
882 ;
92481a4d 883 }
88dbf20f 884 else if (val1->lattice_val == VARYING
885 || val2->lattice_val == VARYING)
41511585 886 {
88dbf20f 887 /* any M VARYING = VARYING. */
888 val1->lattice_val = VARYING;
b7e55469 889 val1->mask = double_int_minus_one;
88dbf20f 890 val1->value = NULL_TREE;
41511585 891 }
b7e55469 892 else if (val1->lattice_val == CONSTANT
893 && val2->lattice_val == CONSTANT
894 && TREE_CODE (val1->value) == INTEGER_CST
895 && TREE_CODE (val2->value) == INTEGER_CST)
896 {
897 /* Ci M Cj = Ci if (i == j)
898 Ci M Cj = VARYING if (i != j)
899
900 For INTEGER_CSTs mask unequal bits. If no equal bits remain,
901 drop to varying. */
cf8f0e63 902 val1->mask = val1->mask | val2->mask
903 | (tree_to_double_int (val1->value)
904 ^ tree_to_double_int (val2->value));
905 if (val1->mask.is_minus_one ())
b7e55469 906 {
907 val1->lattice_val = VARYING;
908 val1->value = NULL_TREE;
909 }
910 }
88dbf20f 911 else if (val1->lattice_val == CONSTANT
912 && val2->lattice_val == CONSTANT
61207d43 913 && simple_cst_equal (val1->value, val2->value) == 1)
41511585 914 {
88dbf20f 915 /* Ci M Cj = Ci if (i == j)
916 Ci M Cj = VARYING if (i != j)
917
b7e55469 918 VAL1 already contains the value we want for equivalent values. */
919 }
920 else if (val1->lattice_val == CONSTANT
921 && val2->lattice_val == CONSTANT
922 && (TREE_CODE (val1->value) == ADDR_EXPR
923 || TREE_CODE (val2->value) == ADDR_EXPR))
924 {
925 /* When not equal addresses are involved try meeting for
926 alignment. */
927 prop_value_t tem = *val2;
928 if (TREE_CODE (val1->value) == ADDR_EXPR)
929 *val1 = get_value_for_expr (val1->value, true);
930 if (TREE_CODE (val2->value) == ADDR_EXPR)
931 tem = get_value_for_expr (val2->value, true);
932 ccp_lattice_meet (val1, &tem);
41511585 933 }
934 else
935 {
88dbf20f 936 /* Any other combination is VARYING. */
937 val1->lattice_val = VARYING;
b7e55469 938 val1->mask = double_int_minus_one;
88dbf20f 939 val1->value = NULL_TREE;
41511585 940 }
4ee9c684 941}
942
943
41511585 944/* Loop through the PHI_NODE's parameters for BLOCK and compare their
945 lattice values to determine PHI_NODE's lattice value. The value of a
88dbf20f 946 PHI node is determined calling ccp_lattice_meet with all the arguments
41511585 947 of the PHI node that are incoming via executable edges. */
4ee9c684 948
41511585 949static enum ssa_prop_result
75a70cf9 950ccp_visit_phi_node (gimple phi)
4ee9c684 951{
75a70cf9 952 unsigned i;
88dbf20f 953 prop_value_t *old_val, new_val;
4ee9c684 954
41511585 955 if (dump_file && (dump_flags & TDF_DETAILS))
4ee9c684 956 {
41511585 957 fprintf (dump_file, "\nVisiting PHI node: ");
75a70cf9 958 print_gimple_stmt (dump_file, phi, 0, dump_flags);
4ee9c684 959 }
4ee9c684 960
75a70cf9 961 old_val = get_value (gimple_phi_result (phi));
41511585 962 switch (old_val->lattice_val)
963 {
964 case VARYING:
88dbf20f 965 return SSA_PROP_VARYING;
4ee9c684 966
41511585 967 case CONSTANT:
968 new_val = *old_val;
969 break;
4ee9c684 970
41511585 971 case UNDEFINED:
41511585 972 new_val.lattice_val = UNDEFINED;
88dbf20f 973 new_val.value = NULL_TREE;
41511585 974 break;
4ee9c684 975
41511585 976 default:
8c0963c4 977 gcc_unreachable ();
41511585 978 }
4ee9c684 979
75a70cf9 980 for (i = 0; i < gimple_phi_num_args (phi); i++)
41511585 981 {
88dbf20f 982 /* Compute the meet operator over all the PHI arguments flowing
983 through executable edges. */
75a70cf9 984 edge e = gimple_phi_arg_edge (phi, i);
4ee9c684 985
41511585 986 if (dump_file && (dump_flags & TDF_DETAILS))
987 {
988 fprintf (dump_file,
989 "\n Argument #%d (%d -> %d %sexecutable)\n",
990 i, e->src->index, e->dest->index,
991 (e->flags & EDGE_EXECUTABLE) ? "" : "not ");
992 }
993
994 /* If the incoming edge is executable, Compute the meet operator for
995 the existing value of the PHI node and the current PHI argument. */
996 if (e->flags & EDGE_EXECUTABLE)
997 {
75a70cf9 998 tree arg = gimple_phi_arg (phi, i)->def;
b7e55469 999 prop_value_t arg_val = get_value_for_expr (arg, false);
4ee9c684 1000
88dbf20f 1001 ccp_lattice_meet (&new_val, &arg_val);
4ee9c684 1002
41511585 1003 if (dump_file && (dump_flags & TDF_DETAILS))
1004 {
1005 fprintf (dump_file, "\t");
88dbf20f 1006 print_generic_expr (dump_file, arg, dump_flags);
1007 dump_lattice_value (dump_file, "\tValue: ", arg_val);
41511585 1008 fprintf (dump_file, "\n");
1009 }
4ee9c684 1010
41511585 1011 if (new_val.lattice_val == VARYING)
1012 break;
1013 }
1014 }
4ee9c684 1015
1016 if (dump_file && (dump_flags & TDF_DETAILS))
41511585 1017 {
1018 dump_lattice_value (dump_file, "\n PHI node value: ", new_val);
1019 fprintf (dump_file, "\n\n");
1020 }
1021
bfa30570 1022 /* Make the transition to the new value. */
75a70cf9 1023 if (set_lattice_value (gimple_phi_result (phi), new_val))
41511585 1024 {
1025 if (new_val.lattice_val == VARYING)
1026 return SSA_PROP_VARYING;
1027 else
1028 return SSA_PROP_INTERESTING;
1029 }
1030 else
1031 return SSA_PROP_NOT_INTERESTING;
4ee9c684 1032}
1033
15d138c9 1034/* Return the constant value for OP or OP otherwise. */
00f4f705 1035
1036static tree
15d138c9 1037valueize_op (tree op)
00f4f705 1038{
00f4f705 1039 if (TREE_CODE (op) == SSA_NAME)
1040 {
15d138c9 1041 tree tem = get_constant_value (op);
1042 if (tem)
1043 return tem;
00f4f705 1044 }
1045 return op;
1046}
1047
41511585 1048/* CCP specific front-end to the non-destructive constant folding
1049 routines.
4ee9c684 1050
1051 Attempt to simplify the RHS of STMT knowing that one or more
1052 operands are constants.
1053
1054 If simplification is possible, return the simplified RHS,
75a70cf9 1055 otherwise return the original RHS or NULL_TREE. */
4ee9c684 1056
1057static tree
75a70cf9 1058ccp_fold (gimple stmt)
4ee9c684 1059{
389dd41b 1060 location_t loc = gimple_location (stmt);
75a70cf9 1061 switch (gimple_code (stmt))
88dbf20f 1062 {
75a70cf9 1063 case GIMPLE_COND:
1064 {
1065 /* Handle comparison operators that can appear in GIMPLE form. */
15d138c9 1066 tree op0 = valueize_op (gimple_cond_lhs (stmt));
1067 tree op1 = valueize_op (gimple_cond_rhs (stmt));
75a70cf9 1068 enum tree_code code = gimple_cond_code (stmt);
389dd41b 1069 return fold_binary_loc (loc, code, boolean_type_node, op0, op1);
75a70cf9 1070 }
4ee9c684 1071
75a70cf9 1072 case GIMPLE_SWITCH:
1073 {
15d138c9 1074 /* Return the constant switch index. */
1075 return valueize_op (gimple_switch_index (stmt));
75a70cf9 1076 }
912f109f 1077
1d0b727d 1078 case GIMPLE_ASSIGN:
1079 case GIMPLE_CALL:
1080 return gimple_fold_stmt_to_constant_1 (stmt, valueize_op);
04236c3a 1081
8782adcf 1082 default:
1d0b727d 1083 gcc_unreachable ();
8782adcf 1084 }
8782adcf 1085}
75a70cf9 1086
b7e55469 1087/* Apply the operation CODE in type TYPE to the value, mask pair
1088 RVAL and RMASK representing a value of type RTYPE and set
1089 the value, mask pair *VAL and *MASK to the result. */
1090
1091static void
1092bit_value_unop_1 (enum tree_code code, tree type,
1093 double_int *val, double_int *mask,
1094 tree rtype, double_int rval, double_int rmask)
1095{
1096 switch (code)
1097 {
1098 case BIT_NOT_EXPR:
1099 *mask = rmask;
cf8f0e63 1100 *val = ~rval;
b7e55469 1101 break;
1102
1103 case NEGATE_EXPR:
1104 {
1105 double_int temv, temm;
1106 /* Return ~rval + 1. */
1107 bit_value_unop_1 (BIT_NOT_EXPR, type, &temv, &temm, type, rval, rmask);
1108 bit_value_binop_1 (PLUS_EXPR, type, val, mask,
1109 type, temv, temm,
1110 type, double_int_one, double_int_zero);
1111 break;
1112 }
1113
1114 CASE_CONVERT:
1115 {
1116 bool uns;
1117
1118 /* First extend mask and value according to the original type. */
85d86b55 1119 uns = TYPE_UNSIGNED (rtype);
cf8f0e63 1120 *mask = rmask.ext (TYPE_PRECISION (rtype), uns);
1121 *val = rval.ext (TYPE_PRECISION (rtype), uns);
b7e55469 1122
1123 /* Then extend mask and value according to the target type. */
85d86b55 1124 uns = TYPE_UNSIGNED (type);
cf8f0e63 1125 *mask = (*mask).ext (TYPE_PRECISION (type), uns);
1126 *val = (*val).ext (TYPE_PRECISION (type), uns);
b7e55469 1127 break;
1128 }
1129
1130 default:
1131 *mask = double_int_minus_one;
1132 break;
1133 }
1134}
1135
1136/* Apply the operation CODE in type TYPE to the value, mask pairs
1137 R1VAL, R1MASK and R2VAL, R2MASK representing a values of type R1TYPE
1138 and R2TYPE and set the value, mask pair *VAL and *MASK to the result. */
1139
1140static void
1141bit_value_binop_1 (enum tree_code code, tree type,
1142 double_int *val, double_int *mask,
1143 tree r1type, double_int r1val, double_int r1mask,
1144 tree r2type, double_int r2val, double_int r2mask)
1145{
85d86b55 1146 bool uns = TYPE_UNSIGNED (type);
b7e55469 1147 /* Assume we'll get a constant result. Use an initial varying value,
1148 we fall back to varying in the end if necessary. */
1149 *mask = double_int_minus_one;
1150 switch (code)
1151 {
1152 case BIT_AND_EXPR:
1153 /* The mask is constant where there is a known not
1154 set bit, (m1 | m2) & ((v1 | m1) & (v2 | m2)) */
cf8f0e63 1155 *mask = (r1mask | r2mask) & (r1val | r1mask) & (r2val | r2mask);
1156 *val = r1val & r2val;
b7e55469 1157 break;
1158
1159 case BIT_IOR_EXPR:
1160 /* The mask is constant where there is a known
1161 set bit, (m1 | m2) & ~((v1 & ~m1) | (v2 & ~m2)). */
cf8f0e63 1162 *mask = (r1mask | r2mask)
1163 .and_not (r1val.and_not (r1mask) | r2val.and_not (r2mask));
1164 *val = r1val | r2val;
b7e55469 1165 break;
1166
1167 case BIT_XOR_EXPR:
1168 /* m1 | m2 */
cf8f0e63 1169 *mask = r1mask | r2mask;
1170 *val = r1val ^ r2val;
b7e55469 1171 break;
1172
1173 case LROTATE_EXPR:
1174 case RROTATE_EXPR:
cf8f0e63 1175 if (r2mask.is_zero ())
b7e55469 1176 {
1177 HOST_WIDE_INT shift = r2val.low;
1178 if (code == RROTATE_EXPR)
1179 shift = -shift;
cf8f0e63 1180 *mask = r1mask.lrotate (shift, TYPE_PRECISION (type));
1181 *val = r1val.lrotate (shift, TYPE_PRECISION (type));
b7e55469 1182 }
1183 break;
1184
1185 case LSHIFT_EXPR:
1186 case RSHIFT_EXPR:
1187 /* ??? We can handle partially known shift counts if we know
1188 its sign. That way we can tell that (x << (y | 8)) & 255
1189 is zero. */
cf8f0e63 1190 if (r2mask.is_zero ())
b7e55469 1191 {
1192 HOST_WIDE_INT shift = r2val.low;
1193 if (code == RSHIFT_EXPR)
1194 shift = -shift;
1195 /* We need to know if we are doing a left or a right shift
1196 to properly shift in zeros for left shift and unsigned
1197 right shifts and the sign bit for signed right shifts.
1198 For signed right shifts we shift in varying in case
1199 the sign bit was varying. */
1200 if (shift > 0)
1201 {
cf8f0e63 1202 *mask = r1mask.llshift (shift, TYPE_PRECISION (type));
1203 *val = r1val.llshift (shift, TYPE_PRECISION (type));
b7e55469 1204 }
1205 else if (shift < 0)
1206 {
1207 shift = -shift;
cf8f0e63 1208 *mask = r1mask.rshift (shift, TYPE_PRECISION (type), !uns);
1209 *val = r1val.rshift (shift, TYPE_PRECISION (type), !uns);
b7e55469 1210 }
1211 else
1212 {
1213 *mask = r1mask;
1214 *val = r1val;
1215 }
1216 }
1217 break;
1218
1219 case PLUS_EXPR:
1220 case POINTER_PLUS_EXPR:
1221 {
1222 double_int lo, hi;
1223 /* Do the addition with unknown bits set to zero, to give carry-ins of
1224 zero wherever possible. */
cf8f0e63 1225 lo = r1val.and_not (r1mask) + r2val.and_not (r2mask);
1226 lo = lo.ext (TYPE_PRECISION (type), uns);
b7e55469 1227 /* Do the addition with unknown bits set to one, to give carry-ins of
1228 one wherever possible. */
cf8f0e63 1229 hi = (r1val | r1mask) + (r2val | r2mask);
1230 hi = hi.ext (TYPE_PRECISION (type), uns);
b7e55469 1231 /* Each bit in the result is known if (a) the corresponding bits in
1232 both inputs are known, and (b) the carry-in to that bit position
1233 is known. We can check condition (b) by seeing if we got the same
1234 result with minimised carries as with maximised carries. */
cf8f0e63 1235 *mask = r1mask | r2mask | (lo ^ hi);
1236 *mask = (*mask).ext (TYPE_PRECISION (type), uns);
b7e55469 1237 /* It shouldn't matter whether we choose lo or hi here. */
1238 *val = lo;
1239 break;
1240 }
1241
1242 case MINUS_EXPR:
1243 {
1244 double_int temv, temm;
1245 bit_value_unop_1 (NEGATE_EXPR, r2type, &temv, &temm,
1246 r2type, r2val, r2mask);
1247 bit_value_binop_1 (PLUS_EXPR, type, val, mask,
1248 r1type, r1val, r1mask,
1249 r2type, temv, temm);
1250 break;
1251 }
1252
1253 case MULT_EXPR:
1254 {
1255 /* Just track trailing zeros in both operands and transfer
1256 them to the other. */
cf8f0e63 1257 int r1tz = (r1val | r1mask).trailing_zeros ();
1258 int r2tz = (r2val | r2mask).trailing_zeros ();
b7e55469 1259 if (r1tz + r2tz >= HOST_BITS_PER_DOUBLE_INT)
1260 {
1261 *mask = double_int_zero;
1262 *val = double_int_zero;
1263 }
1264 else if (r1tz + r2tz > 0)
1265 {
cf8f0e63 1266 *mask = ~double_int::mask (r1tz + r2tz);
1267 *mask = (*mask).ext (TYPE_PRECISION (type), uns);
b7e55469 1268 *val = double_int_zero;
1269 }
1270 break;
1271 }
1272
1273 case EQ_EXPR:
1274 case NE_EXPR:
1275 {
cf8f0e63 1276 double_int m = r1mask | r2mask;
1277 if (r1val.and_not (m) != r2val.and_not (m))
b7e55469 1278 {
1279 *mask = double_int_zero;
1280 *val = ((code == EQ_EXPR) ? double_int_zero : double_int_one);
1281 }
1282 else
1283 {
1284 /* We know the result of a comparison is always one or zero. */
1285 *mask = double_int_one;
1286 *val = double_int_zero;
1287 }
1288 break;
1289 }
1290
1291 case GE_EXPR:
1292 case GT_EXPR:
1293 {
1294 double_int tem = r1val;
1295 r1val = r2val;
1296 r2val = tem;
1297 tem = r1mask;
1298 r1mask = r2mask;
1299 r2mask = tem;
1300 code = swap_tree_comparison (code);
1301 }
1302 /* Fallthru. */
1303 case LT_EXPR:
1304 case LE_EXPR:
1305 {
1306 int minmax, maxmin;
1307 /* If the most significant bits are not known we know nothing. */
cf8f0e63 1308 if (r1mask.is_negative () || r2mask.is_negative ())
b7e55469 1309 break;
1310
90c0f5b7 1311 /* For comparisons the signedness is in the comparison operands. */
85d86b55 1312 uns = TYPE_UNSIGNED (r1type);
90c0f5b7 1313
b7e55469 1314 /* If we know the most significant bits we know the values
1315 value ranges by means of treating varying bits as zero
1316 or one. Do a cross comparison of the max/min pairs. */
cf8f0e63 1317 maxmin = (r1val | r1mask).cmp (r2val.and_not (r2mask), uns);
1318 minmax = r1val.and_not (r1mask).cmp (r2val | r2mask, uns);
b7e55469 1319 if (maxmin < 0) /* r1 is less than r2. */
1320 {
1321 *mask = double_int_zero;
1322 *val = double_int_one;
1323 }
1324 else if (minmax > 0) /* r1 is not less or equal to r2. */
1325 {
1326 *mask = double_int_zero;
1327 *val = double_int_zero;
1328 }
1329 else if (maxmin == minmax) /* r1 and r2 are equal. */
1330 {
1331 /* This probably should never happen as we'd have
1332 folded the thing during fully constant value folding. */
1333 *mask = double_int_zero;
1334 *val = (code == LE_EXPR ? double_int_one : double_int_zero);
1335 }
1336 else
1337 {
1338 /* We know the result of a comparison is always one or zero. */
1339 *mask = double_int_one;
1340 *val = double_int_zero;
1341 }
1342 break;
1343 }
1344
1345 default:;
1346 }
1347}
1348
1349/* Return the propagation value when applying the operation CODE to
1350 the value RHS yielding type TYPE. */
1351
1352static prop_value_t
1353bit_value_unop (enum tree_code code, tree type, tree rhs)
1354{
1355 prop_value_t rval = get_value_for_expr (rhs, true);
1356 double_int value, mask;
1357 prop_value_t val;
c91fedc5 1358
1359 if (rval.lattice_val == UNDEFINED)
1360 return rval;
1361
b7e55469 1362 gcc_assert ((rval.lattice_val == CONSTANT
1363 && TREE_CODE (rval.value) == INTEGER_CST)
cf8f0e63 1364 || rval.mask.is_minus_one ());
b7e55469 1365 bit_value_unop_1 (code, type, &value, &mask,
1366 TREE_TYPE (rhs), value_to_double_int (rval), rval.mask);
cf8f0e63 1367 if (!mask.is_minus_one ())
b7e55469 1368 {
1369 val.lattice_val = CONSTANT;
1370 val.mask = mask;
1371 /* ??? Delay building trees here. */
1372 val.value = double_int_to_tree (type, value);
1373 }
1374 else
1375 {
1376 val.lattice_val = VARYING;
1377 val.value = NULL_TREE;
1378 val.mask = double_int_minus_one;
1379 }
1380 return val;
1381}
1382
1383/* Return the propagation value when applying the operation CODE to
1384 the values RHS1 and RHS2 yielding type TYPE. */
1385
1386static prop_value_t
1387bit_value_binop (enum tree_code code, tree type, tree rhs1, tree rhs2)
1388{
1389 prop_value_t r1val = get_value_for_expr (rhs1, true);
1390 prop_value_t r2val = get_value_for_expr (rhs2, true);
1391 double_int value, mask;
1392 prop_value_t val;
c91fedc5 1393
1394 if (r1val.lattice_val == UNDEFINED
1395 || r2val.lattice_val == UNDEFINED)
1396 {
1397 val.lattice_val = VARYING;
1398 val.value = NULL_TREE;
1399 val.mask = double_int_minus_one;
1400 return val;
1401 }
1402
b7e55469 1403 gcc_assert ((r1val.lattice_val == CONSTANT
1404 && TREE_CODE (r1val.value) == INTEGER_CST)
cf8f0e63 1405 || r1val.mask.is_minus_one ());
b7e55469 1406 gcc_assert ((r2val.lattice_val == CONSTANT
1407 && TREE_CODE (r2val.value) == INTEGER_CST)
cf8f0e63 1408 || r2val.mask.is_minus_one ());
b7e55469 1409 bit_value_binop_1 (code, type, &value, &mask,
1410 TREE_TYPE (rhs1), value_to_double_int (r1val), r1val.mask,
1411 TREE_TYPE (rhs2), value_to_double_int (r2val), r2val.mask);
cf8f0e63 1412 if (!mask.is_minus_one ())
b7e55469 1413 {
1414 val.lattice_val = CONSTANT;
1415 val.mask = mask;
1416 /* ??? Delay building trees here. */
1417 val.value = double_int_to_tree (type, value);
1418 }
1419 else
1420 {
1421 val.lattice_val = VARYING;
1422 val.value = NULL_TREE;
1423 val.mask = double_int_minus_one;
1424 }
1425 return val;
1426}
1427
fca0886c 1428/* Return the propagation value when applying __builtin_assume_aligned to
1429 its arguments. */
1430
1431static prop_value_t
1432bit_value_assume_aligned (gimple stmt)
1433{
1434 tree ptr = gimple_call_arg (stmt, 0), align, misalign = NULL_TREE;
1435 tree type = TREE_TYPE (ptr);
1436 unsigned HOST_WIDE_INT aligni, misaligni = 0;
1437 prop_value_t ptrval = get_value_for_expr (ptr, true);
1438 prop_value_t alignval;
1439 double_int value, mask;
1440 prop_value_t val;
1441 if (ptrval.lattice_val == UNDEFINED)
1442 return ptrval;
1443 gcc_assert ((ptrval.lattice_val == CONSTANT
1444 && TREE_CODE (ptrval.value) == INTEGER_CST)
cf8f0e63 1445 || ptrval.mask.is_minus_one ());
fca0886c 1446 align = gimple_call_arg (stmt, 1);
1447 if (!host_integerp (align, 1))
1448 return ptrval;
1449 aligni = tree_low_cst (align, 1);
1450 if (aligni <= 1
1451 || (aligni & (aligni - 1)) != 0)
1452 return ptrval;
1453 if (gimple_call_num_args (stmt) > 2)
1454 {
1455 misalign = gimple_call_arg (stmt, 2);
1456 if (!host_integerp (misalign, 1))
1457 return ptrval;
1458 misaligni = tree_low_cst (misalign, 1);
1459 if (misaligni >= aligni)
1460 return ptrval;
1461 }
1462 align = build_int_cst_type (type, -aligni);
1463 alignval = get_value_for_expr (align, true);
1464 bit_value_binop_1 (BIT_AND_EXPR, type, &value, &mask,
1465 type, value_to_double_int (ptrval), ptrval.mask,
1466 type, value_to_double_int (alignval), alignval.mask);
cf8f0e63 1467 if (!mask.is_minus_one ())
fca0886c 1468 {
1469 val.lattice_val = CONSTANT;
1470 val.mask = mask;
1471 gcc_assert ((mask.low & (aligni - 1)) == 0);
1472 gcc_assert ((value.low & (aligni - 1)) == 0);
1473 value.low |= misaligni;
1474 /* ??? Delay building trees here. */
1475 val.value = double_int_to_tree (type, value);
1476 }
1477 else
1478 {
1479 val.lattice_val = VARYING;
1480 val.value = NULL_TREE;
1481 val.mask = double_int_minus_one;
1482 }
1483 return val;
1484}
1485
75a70cf9 1486/* Evaluate statement STMT.
1487 Valid only for assignments, calls, conditionals, and switches. */
4ee9c684 1488
88dbf20f 1489static prop_value_t
75a70cf9 1490evaluate_stmt (gimple stmt)
4ee9c684 1491{
88dbf20f 1492 prop_value_t val;
4f61cce6 1493 tree simplified = NULL_TREE;
88dbf20f 1494 ccp_lattice_t likelyvalue = likely_value (stmt);
b7e55469 1495 bool is_constant = false;
581bf1c2 1496 unsigned int align;
88dbf20f 1497
b7e55469 1498 if (dump_file && (dump_flags & TDF_DETAILS))
1499 {
1500 fprintf (dump_file, "which is likely ");
1501 switch (likelyvalue)
1502 {
1503 case CONSTANT:
1504 fprintf (dump_file, "CONSTANT");
1505 break;
1506 case UNDEFINED:
1507 fprintf (dump_file, "UNDEFINED");
1508 break;
1509 case VARYING:
1510 fprintf (dump_file, "VARYING");
1511 break;
1512 default:;
1513 }
1514 fprintf (dump_file, "\n");
1515 }
add6ee5e 1516
4ee9c684 1517 /* If the statement is likely to have a CONSTANT result, then try
1518 to fold the statement to determine the constant value. */
75a70cf9 1519 /* FIXME. This is the only place that we call ccp_fold.
1520 Since likely_value never returns CONSTANT for calls, we will
1521 not attempt to fold them, including builtins that may profit. */
4ee9c684 1522 if (likelyvalue == CONSTANT)
b7e55469 1523 {
1524 fold_defer_overflow_warnings ();
1525 simplified = ccp_fold (stmt);
1526 is_constant = simplified && is_gimple_min_invariant (simplified);
1527 fold_undefer_overflow_warnings (is_constant, stmt, 0);
1528 if (is_constant)
1529 {
1530 /* The statement produced a constant value. */
1531 val.lattice_val = CONSTANT;
1532 val.value = simplified;
1533 val.mask = double_int_zero;
1534 }
1535 }
4ee9c684 1536 /* If the statement is likely to have a VARYING result, then do not
1537 bother folding the statement. */
04236c3a 1538 else if (likelyvalue == VARYING)
75a70cf9 1539 {
590c3166 1540 enum gimple_code code = gimple_code (stmt);
75a70cf9 1541 if (code == GIMPLE_ASSIGN)
1542 {
1543 enum tree_code subcode = gimple_assign_rhs_code (stmt);
48e1416a 1544
75a70cf9 1545 /* Other cases cannot satisfy is_gimple_min_invariant
1546 without folding. */
1547 if (get_gimple_rhs_class (subcode) == GIMPLE_SINGLE_RHS)
1548 simplified = gimple_assign_rhs1 (stmt);
1549 }
1550 else if (code == GIMPLE_SWITCH)
1551 simplified = gimple_switch_index (stmt);
1552 else
a65c4d64 1553 /* These cannot satisfy is_gimple_min_invariant without folding. */
1554 gcc_assert (code == GIMPLE_CALL || code == GIMPLE_COND);
b7e55469 1555 is_constant = simplified && is_gimple_min_invariant (simplified);
1556 if (is_constant)
1557 {
1558 /* The statement produced a constant value. */
1559 val.lattice_val = CONSTANT;
1560 val.value = simplified;
1561 val.mask = double_int_zero;
1562 }
75a70cf9 1563 }
4ee9c684 1564
b7e55469 1565 /* Resort to simplification for bitwise tracking. */
1566 if (flag_tree_bit_ccp
939514e9 1567 && (likelyvalue == CONSTANT || is_gimple_call (stmt))
b7e55469 1568 && !is_constant)
912f109f 1569 {
b7e55469 1570 enum gimple_code code = gimple_code (stmt);
1571 val.lattice_val = VARYING;
1572 val.value = NULL_TREE;
1573 val.mask = double_int_minus_one;
1574 if (code == GIMPLE_ASSIGN)
912f109f 1575 {
b7e55469 1576 enum tree_code subcode = gimple_assign_rhs_code (stmt);
1577 tree rhs1 = gimple_assign_rhs1 (stmt);
1578 switch (get_gimple_rhs_class (subcode))
1579 {
1580 case GIMPLE_SINGLE_RHS:
1581 if (INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1582 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1583 val = get_value_for_expr (rhs1, true);
1584 break;
1585
1586 case GIMPLE_UNARY_RHS:
1587 if ((INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1588 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1589 && (INTEGRAL_TYPE_P (gimple_expr_type (stmt))
1590 || POINTER_TYPE_P (gimple_expr_type (stmt))))
1591 val = bit_value_unop (subcode, gimple_expr_type (stmt), rhs1);
1592 break;
1593
1594 case GIMPLE_BINARY_RHS:
1595 if (INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1596 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1597 {
e47d81e0 1598 tree lhs = gimple_assign_lhs (stmt);
b7e55469 1599 tree rhs2 = gimple_assign_rhs2 (stmt);
1600 val = bit_value_binop (subcode,
e47d81e0 1601 TREE_TYPE (lhs), rhs1, rhs2);
b7e55469 1602 }
1603 break;
1604
1605 default:;
1606 }
912f109f 1607 }
b7e55469 1608 else if (code == GIMPLE_COND)
1609 {
1610 enum tree_code code = gimple_cond_code (stmt);
1611 tree rhs1 = gimple_cond_lhs (stmt);
1612 tree rhs2 = gimple_cond_rhs (stmt);
1613 if (INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1614 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1615 val = bit_value_binop (code, TREE_TYPE (rhs1), rhs1, rhs2);
1616 }
0b4f0116 1617 else if (gimple_call_builtin_p (stmt, BUILT_IN_NORMAL))
153c3b50 1618 {
0b4f0116 1619 tree fndecl = gimple_call_fndecl (stmt);
153c3b50 1620 switch (DECL_FUNCTION_CODE (fndecl))
1621 {
1622 case BUILT_IN_MALLOC:
1623 case BUILT_IN_REALLOC:
1624 case BUILT_IN_CALLOC:
939514e9 1625 case BUILT_IN_STRDUP:
1626 case BUILT_IN_STRNDUP:
153c3b50 1627 val.lattice_val = CONSTANT;
1628 val.value = build_int_cst (TREE_TYPE (gimple_get_lhs (stmt)), 0);
cf8f0e63 1629 val.mask = double_int::from_shwi
153c3b50 1630 (~(((HOST_WIDE_INT) MALLOC_ABI_ALIGNMENT)
1631 / BITS_PER_UNIT - 1));
1632 break;
1633
1634 case BUILT_IN_ALLOCA:
581bf1c2 1635 case BUILT_IN_ALLOCA_WITH_ALIGN:
1636 align = (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_ALLOCA_WITH_ALIGN
1637 ? TREE_INT_CST_LOW (gimple_call_arg (stmt, 1))
1638 : BIGGEST_ALIGNMENT);
153c3b50 1639 val.lattice_val = CONSTANT;
1640 val.value = build_int_cst (TREE_TYPE (gimple_get_lhs (stmt)), 0);
cf8f0e63 1641 val.mask = double_int::from_shwi (~(((HOST_WIDE_INT) align)
1642 / BITS_PER_UNIT - 1));
153c3b50 1643 break;
1644
939514e9 1645 /* These builtins return their first argument, unmodified. */
1646 case BUILT_IN_MEMCPY:
1647 case BUILT_IN_MEMMOVE:
1648 case BUILT_IN_MEMSET:
1649 case BUILT_IN_STRCPY:
1650 case BUILT_IN_STRNCPY:
1651 case BUILT_IN_MEMCPY_CHK:
1652 case BUILT_IN_MEMMOVE_CHK:
1653 case BUILT_IN_MEMSET_CHK:
1654 case BUILT_IN_STRCPY_CHK:
1655 case BUILT_IN_STRNCPY_CHK:
1656 val = get_value_for_expr (gimple_call_arg (stmt, 0), true);
1657 break;
1658
fca0886c 1659 case BUILT_IN_ASSUME_ALIGNED:
1660 val = bit_value_assume_aligned (stmt);
1661 break;
1662
153c3b50 1663 default:;
1664 }
1665 }
b7e55469 1666 is_constant = (val.lattice_val == CONSTANT);
912f109f 1667 }
1668
b7e55469 1669 if (!is_constant)
4ee9c684 1670 {
1671 /* The statement produced a nonconstant value. If the statement
88dbf20f 1672 had UNDEFINED operands, then the result of the statement
1673 should be UNDEFINED. Otherwise, the statement is VARYING. */
bfa30570 1674 if (likelyvalue == UNDEFINED)
b7e55469 1675 {
1676 val.lattice_val = likelyvalue;
1677 val.mask = double_int_zero;
1678 }
b765fa12 1679 else
b7e55469 1680 {
1681 val.lattice_val = VARYING;
1682 val.mask = double_int_minus_one;
1683 }
b765fa12 1684
88dbf20f 1685 val.value = NULL_TREE;
4ee9c684 1686 }
41511585 1687
1688 return val;
4ee9c684 1689}
1690
494bbaae 1691typedef hash_table <pointer_hash <gimple_statement_d> > gimple_htab;
2b15d2ba 1692
582a80ed 1693/* Given a BUILT_IN_STACK_SAVE value SAVED_VAL, insert a clobber of VAR before
1694 each matching BUILT_IN_STACK_RESTORE. Mark visited phis in VISITED. */
1695
1696static void
2b15d2ba 1697insert_clobber_before_stack_restore (tree saved_val, tree var,
1698 gimple_htab *visited)
582a80ed 1699{
1700 gimple stmt, clobber_stmt;
1701 tree clobber;
1702 imm_use_iterator iter;
1703 gimple_stmt_iterator i;
1704 gimple *slot;
1705
1706 FOR_EACH_IMM_USE_STMT (stmt, iter, saved_val)
1707 if (gimple_call_builtin_p (stmt, BUILT_IN_STACK_RESTORE))
1708 {
f1f41a6c 1709 clobber = build_constructor (TREE_TYPE (var),
1710 NULL);
582a80ed 1711 TREE_THIS_VOLATILE (clobber) = 1;
1712 clobber_stmt = gimple_build_assign (var, clobber);
1713
1714 i = gsi_for_stmt (stmt);
1715 gsi_insert_before (&i, clobber_stmt, GSI_SAME_STMT);
1716 }
1717 else if (gimple_code (stmt) == GIMPLE_PHI)
1718 {
2b15d2ba 1719 if (!visited->is_created ())
1720 visited->create (10);
582a80ed 1721
2b15d2ba 1722 slot = visited->find_slot (stmt, INSERT);
582a80ed 1723 if (*slot != NULL)
1724 continue;
1725
1726 *slot = stmt;
1727 insert_clobber_before_stack_restore (gimple_phi_result (stmt), var,
1728 visited);
1729 }
42eed683 1730 else if (gimple_assign_ssa_name_copy_p (stmt))
1731 insert_clobber_before_stack_restore (gimple_assign_lhs (stmt), var,
1732 visited);
582a80ed 1733 else
1734 gcc_assert (is_gimple_debug (stmt));
1735}
1736
1737/* Advance the iterator to the previous non-debug gimple statement in the same
1738 or dominating basic block. */
1739
1740static inline void
1741gsi_prev_dom_bb_nondebug (gimple_stmt_iterator *i)
1742{
1743 basic_block dom;
1744
1745 gsi_prev_nondebug (i);
1746 while (gsi_end_p (*i))
1747 {
1748 dom = get_immediate_dominator (CDI_DOMINATORS, i->bb);
1749 if (dom == NULL || dom == ENTRY_BLOCK_PTR)
1750 return;
1751
1752 *i = gsi_last_bb (dom);
1753 }
1754}
1755
1756/* Find a BUILT_IN_STACK_SAVE dominating gsi_stmt (I), and insert
1543f720 1757 a clobber of VAR before each matching BUILT_IN_STACK_RESTORE.
1758
1759 It is possible that BUILT_IN_STACK_SAVE cannot be find in a dominator when a
1760 previous pass (such as DOM) duplicated it along multiple paths to a BB. In
1761 that case the function gives up without inserting the clobbers. */
582a80ed 1762
1763static void
1764insert_clobbers_for_var (gimple_stmt_iterator i, tree var)
1765{
582a80ed 1766 gimple stmt;
1767 tree saved_val;
2b15d2ba 1768 gimple_htab visited;
582a80ed 1769
1543f720 1770 for (; !gsi_end_p (i); gsi_prev_dom_bb_nondebug (&i))
582a80ed 1771 {
1772 stmt = gsi_stmt (i);
1773
1774 if (!gimple_call_builtin_p (stmt, BUILT_IN_STACK_SAVE))
1775 continue;
582a80ed 1776
1777 saved_val = gimple_call_lhs (stmt);
1778 if (saved_val == NULL_TREE)
1779 continue;
1780
1781 insert_clobber_before_stack_restore (saved_val, var, &visited);
1782 break;
1783 }
1784
2b15d2ba 1785 if (visited.is_created ())
1786 visited.dispose ();
582a80ed 1787}
1788
581bf1c2 1789/* Detects a __builtin_alloca_with_align with constant size argument. Declares
1790 fixed-size array and returns the address, if found, otherwise returns
1791 NULL_TREE. */
9a65cc0a 1792
1793static tree
581bf1c2 1794fold_builtin_alloca_with_align (gimple stmt)
9a65cc0a 1795{
1796 unsigned HOST_WIDE_INT size, threshold, n_elem;
1797 tree lhs, arg, block, var, elem_type, array_type;
9a65cc0a 1798
1799 /* Get lhs. */
1800 lhs = gimple_call_lhs (stmt);
1801 if (lhs == NULL_TREE)
1802 return NULL_TREE;
1803
1804 /* Detect constant argument. */
1805 arg = get_constant_value (gimple_call_arg (stmt, 0));
6e93d308 1806 if (arg == NULL_TREE
1807 || TREE_CODE (arg) != INTEGER_CST
9a65cc0a 1808 || !host_integerp (arg, 1))
1809 return NULL_TREE;
6e93d308 1810
9a65cc0a 1811 size = TREE_INT_CST_LOW (arg);
1812
581bf1c2 1813 /* Heuristic: don't fold large allocas. */
9a65cc0a 1814 threshold = (unsigned HOST_WIDE_INT)PARAM_VALUE (PARAM_LARGE_STACK_FRAME);
581bf1c2 1815 /* In case the alloca is located at function entry, it has the same lifetime
1816 as a declared array, so we allow a larger size. */
9a65cc0a 1817 block = gimple_block (stmt);
1818 if (!(cfun->after_inlining
1819 && TREE_CODE (BLOCK_SUPERCONTEXT (block)) == FUNCTION_DECL))
1820 threshold /= 10;
1821 if (size > threshold)
1822 return NULL_TREE;
1823
1824 /* Declare array. */
1825 elem_type = build_nonstandard_integer_type (BITS_PER_UNIT, 1);
1826 n_elem = size * 8 / BITS_PER_UNIT;
9a65cc0a 1827 array_type = build_array_type_nelts (elem_type, n_elem);
1828 var = create_tmp_var (array_type, NULL);
581bf1c2 1829 DECL_ALIGN (var) = TREE_INT_CST_LOW (gimple_call_arg (stmt, 1));
3d4a0a4b 1830 {
1831 struct ptr_info_def *pi = SSA_NAME_PTR_INFO (lhs);
1832 if (pi != NULL && !pi->pt.anything)
1833 {
1834 bool singleton_p;
1835 unsigned uid;
1836 singleton_p = pt_solution_singleton_p (&pi->pt, &uid);
1837 gcc_assert (singleton_p);
1838 SET_DECL_PT_UID (var, uid);
1839 }
1840 }
9a65cc0a 1841
1842 /* Fold alloca to the address of the array. */
1843 return fold_convert (TREE_TYPE (lhs), build_fold_addr_expr (var));
1844}
1845
6688f8ec 1846/* Fold the stmt at *GSI with CCP specific information that propagating
1847 and regular folding does not catch. */
1848
1849static bool
1850ccp_fold_stmt (gimple_stmt_iterator *gsi)
1851{
1852 gimple stmt = gsi_stmt (*gsi);
6688f8ec 1853
94144e68 1854 switch (gimple_code (stmt))
1855 {
1856 case GIMPLE_COND:
1857 {
1858 prop_value_t val;
1859 /* Statement evaluation will handle type mismatches in constants
1860 more gracefully than the final propagation. This allows us to
1861 fold more conditionals here. */
1862 val = evaluate_stmt (stmt);
1863 if (val.lattice_val != CONSTANT
cf8f0e63 1864 || !val.mask.is_zero ())
94144e68 1865 return false;
1866
b7e55469 1867 if (dump_file)
1868 {
1869 fprintf (dump_file, "Folding predicate ");
1870 print_gimple_expr (dump_file, stmt, 0, 0);
1871 fprintf (dump_file, " to ");
1872 print_generic_expr (dump_file, val.value, 0);
1873 fprintf (dump_file, "\n");
1874 }
1875
94144e68 1876 if (integer_zerop (val.value))
1877 gimple_cond_make_false (stmt);
1878 else
1879 gimple_cond_make_true (stmt);
6688f8ec 1880
94144e68 1881 return true;
1882 }
6688f8ec 1883
94144e68 1884 case GIMPLE_CALL:
1885 {
1886 tree lhs = gimple_call_lhs (stmt);
3064bb7b 1887 int flags = gimple_call_flags (stmt);
15d138c9 1888 tree val;
94144e68 1889 tree argt;
1890 bool changed = false;
1891 unsigned i;
1892
1893 /* If the call was folded into a constant make sure it goes
1894 away even if we cannot propagate into all uses because of
1895 type issues. */
1896 if (lhs
1897 && TREE_CODE (lhs) == SSA_NAME
3064bb7b 1898 && (val = get_constant_value (lhs))
1899 /* Don't optimize away calls that have side-effects. */
1900 && (flags & (ECF_CONST|ECF_PURE)) != 0
1901 && (flags & ECF_LOOPING_CONST_OR_PURE) == 0)
94144e68 1902 {
15d138c9 1903 tree new_rhs = unshare_expr (val);
338cce8f 1904 bool res;
94144e68 1905 if (!useless_type_conversion_p (TREE_TYPE (lhs),
1906 TREE_TYPE (new_rhs)))
1907 new_rhs = fold_convert (TREE_TYPE (lhs), new_rhs);
338cce8f 1908 res = update_call_from_tree (gsi, new_rhs);
1909 gcc_assert (res);
94144e68 1910 return true;
1911 }
1912
fb049fba 1913 /* Internal calls provide no argument types, so the extra laxity
1914 for normal calls does not apply. */
1915 if (gimple_call_internal_p (stmt))
1916 return false;
1917
581bf1c2 1918 /* The heuristic of fold_builtin_alloca_with_align differs before and
1919 after inlining, so we don't require the arg to be changed into a
1920 constant for folding, but just to be constant. */
1921 if (gimple_call_builtin_p (stmt, BUILT_IN_ALLOCA_WITH_ALIGN))
9a65cc0a 1922 {
581bf1c2 1923 tree new_rhs = fold_builtin_alloca_with_align (stmt);
6e93d308 1924 if (new_rhs)
1925 {
1926 bool res = update_call_from_tree (gsi, new_rhs);
582a80ed 1927 tree var = TREE_OPERAND (TREE_OPERAND (new_rhs, 0),0);
6e93d308 1928 gcc_assert (res);
582a80ed 1929 insert_clobbers_for_var (*gsi, var);
6e93d308 1930 return true;
1931 }
9a65cc0a 1932 }
1933
94144e68 1934 /* Propagate into the call arguments. Compared to replace_uses_in
1935 this can use the argument slot types for type verification
1936 instead of the current argument type. We also can safely
1937 drop qualifiers here as we are dealing with constants anyway. */
2de00a2d 1938 argt = TYPE_ARG_TYPES (gimple_call_fntype (stmt));
94144e68 1939 for (i = 0; i < gimple_call_num_args (stmt) && argt;
1940 ++i, argt = TREE_CHAIN (argt))
1941 {
1942 tree arg = gimple_call_arg (stmt, i);
1943 if (TREE_CODE (arg) == SSA_NAME
15d138c9 1944 && (val = get_constant_value (arg))
94144e68 1945 && useless_type_conversion_p
1946 (TYPE_MAIN_VARIANT (TREE_VALUE (argt)),
15d138c9 1947 TYPE_MAIN_VARIANT (TREE_TYPE (val))))
94144e68 1948 {
15d138c9 1949 gimple_call_set_arg (stmt, i, unshare_expr (val));
94144e68 1950 changed = true;
1951 }
1952 }
e16f4c39 1953
94144e68 1954 return changed;
1955 }
6688f8ec 1956
6872bf3c 1957 case GIMPLE_ASSIGN:
1958 {
1959 tree lhs = gimple_assign_lhs (stmt);
15d138c9 1960 tree val;
6872bf3c 1961
1962 /* If we have a load that turned out to be constant replace it
1963 as we cannot propagate into all uses in all cases. */
1964 if (gimple_assign_single_p (stmt)
1965 && TREE_CODE (lhs) == SSA_NAME
15d138c9 1966 && (val = get_constant_value (lhs)))
6872bf3c 1967 {
15d138c9 1968 tree rhs = unshare_expr (val);
6872bf3c 1969 if (!useless_type_conversion_p (TREE_TYPE (lhs), TREE_TYPE (rhs)))
182cf5a9 1970 rhs = fold_build1 (VIEW_CONVERT_EXPR, TREE_TYPE (lhs), rhs);
6872bf3c 1971 gimple_assign_set_rhs_from_tree (gsi, rhs);
1972 return true;
1973 }
1974
1975 return false;
1976 }
1977
94144e68 1978 default:
1979 return false;
1980 }
6688f8ec 1981}
1982
41511585 1983/* Visit the assignment statement STMT. Set the value of its LHS to the
88dbf20f 1984 value computed by the RHS and store LHS in *OUTPUT_P. If STMT
1985 creates virtual definitions, set the value of each new name to that
75a70cf9 1986 of the RHS (if we can derive a constant out of the RHS).
1987 Value-returning call statements also perform an assignment, and
1988 are handled here. */
4ee9c684 1989
41511585 1990static enum ssa_prop_result
75a70cf9 1991visit_assignment (gimple stmt, tree *output_p)
4ee9c684 1992{
88dbf20f 1993 prop_value_t val;
88dbf20f 1994 enum ssa_prop_result retval;
4ee9c684 1995
75a70cf9 1996 tree lhs = gimple_get_lhs (stmt);
4ee9c684 1997
75a70cf9 1998 gcc_assert (gimple_code (stmt) != GIMPLE_CALL
1999 || gimple_call_lhs (stmt) != NULL_TREE);
2000
15d138c9 2001 if (gimple_assign_single_p (stmt)
2002 && gimple_assign_rhs_code (stmt) == SSA_NAME)
2003 /* For a simple copy operation, we copy the lattice values. */
2004 val = *get_value (gimple_assign_rhs1 (stmt));
41511585 2005 else
75a70cf9 2006 /* Evaluate the statement, which could be
2007 either a GIMPLE_ASSIGN or a GIMPLE_CALL. */
04236c3a 2008 val = evaluate_stmt (stmt);
4ee9c684 2009
88dbf20f 2010 retval = SSA_PROP_NOT_INTERESTING;
4ee9c684 2011
41511585 2012 /* Set the lattice value of the statement's output. */
88dbf20f 2013 if (TREE_CODE (lhs) == SSA_NAME)
4ee9c684 2014 {
88dbf20f 2015 /* If STMT is an assignment to an SSA_NAME, we only have one
2016 value to set. */
2017 if (set_lattice_value (lhs, val))
2018 {
2019 *output_p = lhs;
2020 if (val.lattice_val == VARYING)
2021 retval = SSA_PROP_VARYING;
2022 else
2023 retval = SSA_PROP_INTERESTING;
2024 }
4ee9c684 2025 }
88dbf20f 2026
2027 return retval;
4ee9c684 2028}
2029
4ee9c684 2030
41511585 2031/* Visit the conditional statement STMT. Return SSA_PROP_INTERESTING
2032 if it can determine which edge will be taken. Otherwise, return
2033 SSA_PROP_VARYING. */
2034
2035static enum ssa_prop_result
75a70cf9 2036visit_cond_stmt (gimple stmt, edge *taken_edge_p)
4ee9c684 2037{
88dbf20f 2038 prop_value_t val;
41511585 2039 basic_block block;
2040
75a70cf9 2041 block = gimple_bb (stmt);
41511585 2042 val = evaluate_stmt (stmt);
b7e55469 2043 if (val.lattice_val != CONSTANT
cf8f0e63 2044 || !val.mask.is_zero ())
b7e55469 2045 return SSA_PROP_VARYING;
41511585 2046
2047 /* Find which edge out of the conditional block will be taken and add it
2048 to the worklist. If no single edge can be determined statically,
2049 return SSA_PROP_VARYING to feed all the outgoing edges to the
2050 propagation engine. */
b7e55469 2051 *taken_edge_p = find_taken_edge (block, val.value);
41511585 2052 if (*taken_edge_p)
2053 return SSA_PROP_INTERESTING;
2054 else
2055 return SSA_PROP_VARYING;
4ee9c684 2056}
2057
4ee9c684 2058
41511585 2059/* Evaluate statement STMT. If the statement produces an output value and
2060 its evaluation changes the lattice value of its output, return
2061 SSA_PROP_INTERESTING and set *OUTPUT_P to the SSA_NAME holding the
2062 output value.
48e1416a 2063
41511585 2064 If STMT is a conditional branch and we can determine its truth
2065 value, set *TAKEN_EDGE_P accordingly. If STMT produces a varying
2066 value, return SSA_PROP_VARYING. */
4ee9c684 2067
41511585 2068static enum ssa_prop_result
75a70cf9 2069ccp_visit_stmt (gimple stmt, edge *taken_edge_p, tree *output_p)
41511585 2070{
41511585 2071 tree def;
2072 ssa_op_iter iter;
4ee9c684 2073
41511585 2074 if (dump_file && (dump_flags & TDF_DETAILS))
4ee9c684 2075 {
88dbf20f 2076 fprintf (dump_file, "\nVisiting statement:\n");
75a70cf9 2077 print_gimple_stmt (dump_file, stmt, 0, dump_flags);
4ee9c684 2078 }
4ee9c684 2079
75a70cf9 2080 switch (gimple_code (stmt))
4ee9c684 2081 {
75a70cf9 2082 case GIMPLE_ASSIGN:
2083 /* If the statement is an assignment that produces a single
2084 output value, evaluate its RHS to see if the lattice value of
2085 its output has changed. */
2086 return visit_assignment (stmt, output_p);
2087
2088 case GIMPLE_CALL:
2089 /* A value-returning call also performs an assignment. */
2090 if (gimple_call_lhs (stmt) != NULL_TREE)
2091 return visit_assignment (stmt, output_p);
2092 break;
2093
2094 case GIMPLE_COND:
2095 case GIMPLE_SWITCH:
2096 /* If STMT is a conditional branch, see if we can determine
2097 which branch will be taken. */
2098 /* FIXME. It appears that we should be able to optimize
2099 computed GOTOs here as well. */
2100 return visit_cond_stmt (stmt, taken_edge_p);
2101
2102 default:
2103 break;
4ee9c684 2104 }
4ee9c684 2105
41511585 2106 /* Any other kind of statement is not interesting for constant
2107 propagation and, therefore, not worth simulating. */
41511585 2108 if (dump_file && (dump_flags & TDF_DETAILS))
2109 fprintf (dump_file, "No interesting values produced. Marked VARYING.\n");
4ee9c684 2110
41511585 2111 /* Definitions made by statements other than assignments to
2112 SSA_NAMEs represent unknown modifications to their outputs.
2113 Mark them VARYING. */
88dbf20f 2114 FOR_EACH_SSA_TREE_OPERAND (def, stmt, iter, SSA_OP_ALL_DEFS)
2115 {
b7e55469 2116 prop_value_t v = { VARYING, NULL_TREE, { -1, (HOST_WIDE_INT) -1 } };
88dbf20f 2117 set_lattice_value (def, v);
2118 }
4ee9c684 2119
41511585 2120 return SSA_PROP_VARYING;
2121}
4ee9c684 2122
4ee9c684 2123
88dbf20f 2124/* Main entry point for SSA Conditional Constant Propagation. */
41511585 2125
33a34f1e 2126static unsigned int
61207d43 2127do_ssa_ccp (void)
41511585 2128{
582a80ed 2129 unsigned int todo = 0;
2130 calculate_dominance_info (CDI_DOMINATORS);
41511585 2131 ccp_initialize ();
2132 ssa_propagate (ccp_visit_stmt, ccp_visit_phi_node);
33a34f1e 2133 if (ccp_finalize ())
560965e9 2134 todo = (TODO_cleanup_cfg | TODO_update_ssa);
582a80ed 2135 free_dominance_info (CDI_DOMINATORS);
2136 return todo;
4ee9c684 2137}
2138
5664499b 2139
2140static bool
41511585 2141gate_ccp (void)
5664499b 2142{
41511585 2143 return flag_tree_ccp != 0;
5664499b 2144}
2145
4ee9c684 2146
cbe8bda8 2147namespace {
2148
2149const pass_data pass_data_ccp =
41511585 2150{
cbe8bda8 2151 GIMPLE_PASS, /* type */
2152 "ccp", /* name */
2153 OPTGROUP_NONE, /* optinfo_flags */
2154 true, /* has_gate */
2155 true, /* has_execute */
2156 TV_TREE_CCP, /* tv_id */
2157 ( PROP_cfg | PROP_ssa ), /* properties_required */
2158 0, /* properties_provided */
2159 0, /* properties_destroyed */
2160 0, /* todo_flags_start */
2161 ( TODO_verify_ssa | TODO_update_address_taken
2162 | TODO_verify_stmts ), /* todo_flags_finish */
41511585 2163};
4ee9c684 2164
cbe8bda8 2165class pass_ccp : public gimple_opt_pass
2166{
2167public:
9af5ce0c 2168 pass_ccp (gcc::context *ctxt)
2169 : gimple_opt_pass (pass_data_ccp, ctxt)
cbe8bda8 2170 {}
2171
2172 /* opt_pass methods: */
ae84f584 2173 opt_pass * clone () { return new pass_ccp (m_ctxt); }
cbe8bda8 2174 bool gate () { return gate_ccp (); }
2175 unsigned int execute () { return do_ssa_ccp (); }
2176
2177}; // class pass_ccp
2178
2179} // anon namespace
2180
2181gimple_opt_pass *
2182make_pass_ccp (gcc::context *ctxt)
2183{
2184 return new pass_ccp (ctxt);
2185}
2186
4ee9c684 2187
75a70cf9 2188
bdd0e199 2189/* Try to optimize out __builtin_stack_restore. Optimize it out
2190 if there is another __builtin_stack_restore in the same basic
2191 block and no calls or ASM_EXPRs are in between, or if this block's
2192 only outgoing edge is to EXIT_BLOCK and there are no calls or
2193 ASM_EXPRs after this __builtin_stack_restore. */
2194
2195static tree
75a70cf9 2196optimize_stack_restore (gimple_stmt_iterator i)
bdd0e199 2197{
6ea999da 2198 tree callee;
2199 gimple stmt;
75a70cf9 2200
2201 basic_block bb = gsi_bb (i);
2202 gimple call = gsi_stmt (i);
bdd0e199 2203
75a70cf9 2204 if (gimple_code (call) != GIMPLE_CALL
2205 || gimple_call_num_args (call) != 1
2206 || TREE_CODE (gimple_call_arg (call, 0)) != SSA_NAME
2207 || !POINTER_TYPE_P (TREE_TYPE (gimple_call_arg (call, 0))))
bdd0e199 2208 return NULL_TREE;
2209
75a70cf9 2210 for (gsi_next (&i); !gsi_end_p (i); gsi_next (&i))
bdd0e199 2211 {
75a70cf9 2212 stmt = gsi_stmt (i);
2213 if (gimple_code (stmt) == GIMPLE_ASM)
bdd0e199 2214 return NULL_TREE;
75a70cf9 2215 if (gimple_code (stmt) != GIMPLE_CALL)
bdd0e199 2216 continue;
2217
75a70cf9 2218 callee = gimple_call_fndecl (stmt);
c40a6f90 2219 if (!callee
2220 || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL
2221 /* All regular builtins are ok, just obviously not alloca. */
581bf1c2 2222 || DECL_FUNCTION_CODE (callee) == BUILT_IN_ALLOCA
2223 || DECL_FUNCTION_CODE (callee) == BUILT_IN_ALLOCA_WITH_ALIGN)
bdd0e199 2224 return NULL_TREE;
2225
2226 if (DECL_FUNCTION_CODE (callee) == BUILT_IN_STACK_RESTORE)
6ea999da 2227 goto second_stack_restore;
bdd0e199 2228 }
2229
6ea999da 2230 if (!gsi_end_p (i))
bdd0e199 2231 return NULL_TREE;
2232
6ea999da 2233 /* Allow one successor of the exit block, or zero successors. */
2234 switch (EDGE_COUNT (bb->succs))
2235 {
2236 case 0:
2237 break;
2238 case 1:
2239 if (single_succ_edge (bb)->dest != EXIT_BLOCK_PTR)
2240 return NULL_TREE;
2241 break;
2242 default:
2243 return NULL_TREE;
2244 }
2245 second_stack_restore:
bdd0e199 2246
6ea999da 2247 /* If there's exactly one use, then zap the call to __builtin_stack_save.
2248 If there are multiple uses, then the last one should remove the call.
2249 In any case, whether the call to __builtin_stack_save can be removed
2250 or not is irrelevant to removing the call to __builtin_stack_restore. */
2251 if (has_single_use (gimple_call_arg (call, 0)))
2252 {
2253 gimple stack_save = SSA_NAME_DEF_STMT (gimple_call_arg (call, 0));
2254 if (is_gimple_call (stack_save))
2255 {
2256 callee = gimple_call_fndecl (stack_save);
2257 if (callee
2258 && DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL
2259 && DECL_FUNCTION_CODE (callee) == BUILT_IN_STACK_SAVE)
2260 {
2261 gimple_stmt_iterator stack_save_gsi;
2262 tree rhs;
bdd0e199 2263
6ea999da 2264 stack_save_gsi = gsi_for_stmt (stack_save);
2265 rhs = build_int_cst (TREE_TYPE (gimple_call_arg (call, 0)), 0);
2266 update_call_from_tree (&stack_save_gsi, rhs);
2267 }
2268 }
2269 }
bdd0e199 2270
75a70cf9 2271 /* No effect, so the statement will be deleted. */
bdd0e199 2272 return integer_zero_node;
2273}
75a70cf9 2274
8a58ed0a 2275/* If va_list type is a simple pointer and nothing special is needed,
2276 optimize __builtin_va_start (&ap, 0) into ap = __builtin_next_arg (0),
2277 __builtin_va_end (&ap) out as NOP and __builtin_va_copy into a simple
2278 pointer assignment. */
2279
2280static tree
75a70cf9 2281optimize_stdarg_builtin (gimple call)
8a58ed0a 2282{
5f57a8b1 2283 tree callee, lhs, rhs, cfun_va_list;
8a58ed0a 2284 bool va_list_simple_ptr;
389dd41b 2285 location_t loc = gimple_location (call);
8a58ed0a 2286
75a70cf9 2287 if (gimple_code (call) != GIMPLE_CALL)
8a58ed0a 2288 return NULL_TREE;
2289
75a70cf9 2290 callee = gimple_call_fndecl (call);
5f57a8b1 2291
2292 cfun_va_list = targetm.fn_abi_va_list (callee);
2293 va_list_simple_ptr = POINTER_TYPE_P (cfun_va_list)
2294 && (TREE_TYPE (cfun_va_list) == void_type_node
2295 || TREE_TYPE (cfun_va_list) == char_type_node);
2296
8a58ed0a 2297 switch (DECL_FUNCTION_CODE (callee))
2298 {
2299 case BUILT_IN_VA_START:
2300 if (!va_list_simple_ptr
2301 || targetm.expand_builtin_va_start != NULL
e7ed5dd7 2302 || !builtin_decl_explicit_p (BUILT_IN_NEXT_ARG))
8a58ed0a 2303 return NULL_TREE;
2304
75a70cf9 2305 if (gimple_call_num_args (call) != 2)
8a58ed0a 2306 return NULL_TREE;
2307
75a70cf9 2308 lhs = gimple_call_arg (call, 0);
8a58ed0a 2309 if (!POINTER_TYPE_P (TREE_TYPE (lhs))
2310 || TYPE_MAIN_VARIANT (TREE_TYPE (TREE_TYPE (lhs)))
5f57a8b1 2311 != TYPE_MAIN_VARIANT (cfun_va_list))
8a58ed0a 2312 return NULL_TREE;
48e1416a 2313
389dd41b 2314 lhs = build_fold_indirect_ref_loc (loc, lhs);
b9a16870 2315 rhs = build_call_expr_loc (loc, builtin_decl_explicit (BUILT_IN_NEXT_ARG),
75a70cf9 2316 1, integer_zero_node);
389dd41b 2317 rhs = fold_convert_loc (loc, TREE_TYPE (lhs), rhs);
8a58ed0a 2318 return build2 (MODIFY_EXPR, TREE_TYPE (lhs), lhs, rhs);
2319
2320 case BUILT_IN_VA_COPY:
2321 if (!va_list_simple_ptr)
2322 return NULL_TREE;
2323
75a70cf9 2324 if (gimple_call_num_args (call) != 2)
8a58ed0a 2325 return NULL_TREE;
2326
75a70cf9 2327 lhs = gimple_call_arg (call, 0);
8a58ed0a 2328 if (!POINTER_TYPE_P (TREE_TYPE (lhs))
2329 || TYPE_MAIN_VARIANT (TREE_TYPE (TREE_TYPE (lhs)))
5f57a8b1 2330 != TYPE_MAIN_VARIANT (cfun_va_list))
8a58ed0a 2331 return NULL_TREE;
2332
389dd41b 2333 lhs = build_fold_indirect_ref_loc (loc, lhs);
75a70cf9 2334 rhs = gimple_call_arg (call, 1);
8a58ed0a 2335 if (TYPE_MAIN_VARIANT (TREE_TYPE (rhs))
5f57a8b1 2336 != TYPE_MAIN_VARIANT (cfun_va_list))
8a58ed0a 2337 return NULL_TREE;
2338
389dd41b 2339 rhs = fold_convert_loc (loc, TREE_TYPE (lhs), rhs);
8a58ed0a 2340 return build2 (MODIFY_EXPR, TREE_TYPE (lhs), lhs, rhs);
2341
2342 case BUILT_IN_VA_END:
75a70cf9 2343 /* No effect, so the statement will be deleted. */
8a58ed0a 2344 return integer_zero_node;
2345
2346 default:
2347 gcc_unreachable ();
2348 }
2349}
75a70cf9 2350
f87df69a 2351/* Attemp to make the block of __builtin_unreachable I unreachable by changing
2352 the incoming jumps. Return true if at least one jump was changed. */
2353
2354static bool
2355optimize_unreachable (gimple_stmt_iterator i)
2356{
2357 basic_block bb = gsi_bb (i);
2358 gimple_stmt_iterator gsi;
2359 gimple stmt;
2360 edge_iterator ei;
2361 edge e;
2362 bool ret;
2363
2364 for (gsi = gsi_start_bb (bb); !gsi_end_p (gsi); gsi_next (&gsi))
2365 {
2366 stmt = gsi_stmt (gsi);
2367
2368 if (is_gimple_debug (stmt))
2369 continue;
2370
2371 if (gimple_code (stmt) == GIMPLE_LABEL)
2372 {
2373 /* Verify we do not need to preserve the label. */
2374 if (FORCED_LABEL (gimple_label_label (stmt)))
2375 return false;
2376
2377 continue;
2378 }
2379
2380 /* Only handle the case that __builtin_unreachable is the first statement
2381 in the block. We rely on DCE to remove stmts without side-effects
2382 before __builtin_unreachable. */
2383 if (gsi_stmt (gsi) != gsi_stmt (i))
2384 return false;
2385 }
2386
2387 ret = false;
2388 FOR_EACH_EDGE (e, ei, bb->preds)
2389 {
2390 gsi = gsi_last_bb (e->src);
522f73a1 2391 if (gsi_end_p (gsi))
2392 continue;
f87df69a 2393
522f73a1 2394 stmt = gsi_stmt (gsi);
2395 if (gimple_code (stmt) == GIMPLE_COND)
f87df69a 2396 {
2397 if (e->flags & EDGE_TRUE_VALUE)
2398 gimple_cond_make_false (stmt);
2399 else if (e->flags & EDGE_FALSE_VALUE)
2400 gimple_cond_make_true (stmt);
2401 else
2402 gcc_unreachable ();
a03a52b4 2403 update_stmt (stmt);
f87df69a 2404 }
2405 else
2406 {
2407 /* Todo: handle other cases, f.i. switch statement. */
2408 continue;
2409 }
2410
2411 ret = true;
2412 }
2413
2414 return ret;
2415}
2416
4ee9c684 2417/* A simple pass that attempts to fold all builtin functions. This pass
2418 is run after we've propagated as many constants as we can. */
2419
2a1990e9 2420static unsigned int
4ee9c684 2421execute_fold_all_builtins (void)
2422{
b36237eb 2423 bool cfg_changed = false;
4ee9c684 2424 basic_block bb;
b1b7c0c4 2425 unsigned int todoflags = 0;
48e1416a 2426
4ee9c684 2427 FOR_EACH_BB (bb)
2428 {
75a70cf9 2429 gimple_stmt_iterator i;
2430 for (i = gsi_start_bb (bb); !gsi_end_p (i); )
4ee9c684 2431 {
75a70cf9 2432 gimple stmt, old_stmt;
4ee9c684 2433 tree callee, result;
0a39fd54 2434 enum built_in_function fcode;
4ee9c684 2435
75a70cf9 2436 stmt = gsi_stmt (i);
2437
2438 if (gimple_code (stmt) != GIMPLE_CALL)
0a39fd54 2439 {
896a0c42 2440 /* Remove all *ssaname_N ={v} {CLOBBER}; stmts,
2441 after the last GIMPLE DSE they aren't needed and might
2442 unnecessarily keep the SSA_NAMEs live. */
2443 if (gimple_clobber_p (stmt))
2444 {
2445 tree lhs = gimple_assign_lhs (stmt);
2446 if (TREE_CODE (lhs) == MEM_REF
2447 && TREE_CODE (TREE_OPERAND (lhs, 0)) == SSA_NAME)
2448 {
2449 unlink_stmt_vdef (stmt);
2450 gsi_remove (&i, true);
2451 release_defs (stmt);
2452 continue;
2453 }
2454 }
75a70cf9 2455 gsi_next (&i);
0a39fd54 2456 continue;
2457 }
75a70cf9 2458 callee = gimple_call_fndecl (stmt);
4ee9c684 2459 if (!callee || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL)
0a39fd54 2460 {
75a70cf9 2461 gsi_next (&i);
0a39fd54 2462 continue;
2463 }
2464 fcode = DECL_FUNCTION_CODE (callee);
4ee9c684 2465
2d18b16d 2466 result = gimple_fold_builtin (stmt);
5a4b7e1e 2467
2468 if (result)
75a70cf9 2469 gimple_remove_stmt_histograms (cfun, stmt);
5a4b7e1e 2470
4ee9c684 2471 if (!result)
2472 switch (DECL_FUNCTION_CODE (callee))
2473 {
2474 case BUILT_IN_CONSTANT_P:
2475 /* Resolve __builtin_constant_p. If it hasn't been
2476 folded to integer_one_node by now, it's fairly
2477 certain that the value simply isn't constant. */
75a70cf9 2478 result = integer_zero_node;
4ee9c684 2479 break;
2480
fca0886c 2481 case BUILT_IN_ASSUME_ALIGNED:
2482 /* Remove __builtin_assume_aligned. */
2483 result = gimple_call_arg (stmt, 0);
2484 break;
2485
bdd0e199 2486 case BUILT_IN_STACK_RESTORE:
75a70cf9 2487 result = optimize_stack_restore (i);
8a58ed0a 2488 if (result)
2489 break;
75a70cf9 2490 gsi_next (&i);
8a58ed0a 2491 continue;
2492
f87df69a 2493 case BUILT_IN_UNREACHABLE:
2494 if (optimize_unreachable (i))
2495 cfg_changed = true;
2496 break;
2497
8a58ed0a 2498 case BUILT_IN_VA_START:
2499 case BUILT_IN_VA_END:
2500 case BUILT_IN_VA_COPY:
2501 /* These shouldn't be folded before pass_stdarg. */
75a70cf9 2502 result = optimize_stdarg_builtin (stmt);
bdd0e199 2503 if (result)
2504 break;
2505 /* FALLTHRU */
2506
4ee9c684 2507 default:
75a70cf9 2508 gsi_next (&i);
4ee9c684 2509 continue;
2510 }
2511
f87df69a 2512 if (result == NULL_TREE)
2513 break;
2514
4ee9c684 2515 if (dump_file && (dump_flags & TDF_DETAILS))
2516 {
2517 fprintf (dump_file, "Simplified\n ");
75a70cf9 2518 print_gimple_stmt (dump_file, stmt, 0, dump_flags);
4ee9c684 2519 }
2520
75a70cf9 2521 old_stmt = stmt;
75a70cf9 2522 if (!update_call_from_tree (&i, result))
0fefde02 2523 {
2524 gimplify_and_update_call_from_tree (&i, result);
2525 todoflags |= TODO_update_address_taken;
2526 }
de6ed584 2527
75a70cf9 2528 stmt = gsi_stmt (i);
4c5fd53c 2529 update_stmt (stmt);
de6ed584 2530
75a70cf9 2531 if (maybe_clean_or_replace_eh_stmt (old_stmt, stmt)
2532 && gimple_purge_dead_eh_edges (bb))
b36237eb 2533 cfg_changed = true;
4ee9c684 2534
2535 if (dump_file && (dump_flags & TDF_DETAILS))
2536 {
2537 fprintf (dump_file, "to\n ");
75a70cf9 2538 print_gimple_stmt (dump_file, stmt, 0, dump_flags);
4ee9c684 2539 fprintf (dump_file, "\n");
2540 }
0a39fd54 2541
2542 /* Retry the same statement if it changed into another
2543 builtin, there might be new opportunities now. */
75a70cf9 2544 if (gimple_code (stmt) != GIMPLE_CALL)
0a39fd54 2545 {
75a70cf9 2546 gsi_next (&i);
0a39fd54 2547 continue;
2548 }
75a70cf9 2549 callee = gimple_call_fndecl (stmt);
0a39fd54 2550 if (!callee
75a70cf9 2551 || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL
0a39fd54 2552 || DECL_FUNCTION_CODE (callee) == fcode)
75a70cf9 2553 gsi_next (&i);
4ee9c684 2554 }
2555 }
48e1416a 2556
b36237eb 2557 /* Delete unreachable blocks. */
b1b7c0c4 2558 if (cfg_changed)
2559 todoflags |= TODO_cleanup_cfg;
48e1416a 2560
b1b7c0c4 2561 return todoflags;
4ee9c684 2562}
2563
41511585 2564
cbe8bda8 2565namespace {
2566
2567const pass_data pass_data_fold_builtins =
4ee9c684 2568{
cbe8bda8 2569 GIMPLE_PASS, /* type */
2570 "fab", /* name */
2571 OPTGROUP_NONE, /* optinfo_flags */
2572 false, /* has_gate */
2573 true, /* has_execute */
2574 TV_NONE, /* tv_id */
2575 ( PROP_cfg | PROP_ssa ), /* properties_required */
2576 0, /* properties_provided */
2577 0, /* properties_destroyed */
2578 0, /* todo_flags_start */
2579 ( TODO_verify_ssa | TODO_update_ssa ), /* todo_flags_finish */
4ee9c684 2580};
cbe8bda8 2581
2582class pass_fold_builtins : public gimple_opt_pass
2583{
2584public:
9af5ce0c 2585 pass_fold_builtins (gcc::context *ctxt)
2586 : gimple_opt_pass (pass_data_fold_builtins, ctxt)
cbe8bda8 2587 {}
2588
2589 /* opt_pass methods: */
ae84f584 2590 opt_pass * clone () { return new pass_fold_builtins (m_ctxt); }
cbe8bda8 2591 unsigned int execute () { return execute_fold_all_builtins (); }
2592
2593}; // class pass_fold_builtins
2594
2595} // anon namespace
2596
2597gimple_opt_pass *
2598make_pass_fold_builtins (gcc::context *ctxt)
2599{
2600 return new pass_fold_builtins (ctxt);
2601}