]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/tree-ssa-ccp.c
2015-01-29 Richard Biener <rguenther@suse.de>
[thirdparty/gcc.git] / gcc / tree-ssa-ccp.c
CommitLineData
4ee9c684 1/* Conditional constant propagation pass for the GNU compiler.
d353bf18 2 Copyright (C) 2000-2015 Free Software Foundation, Inc.
4ee9c684 3 Adapted from original RTL SSA-CCP by Daniel Berlin <dberlin@dberlin.org>
4 Adapted to GIMPLE trees by Diego Novillo <dnovillo@redhat.com>
5
6This file is part of GCC.
48e1416a 7
4ee9c684 8GCC is free software; you can redistribute it and/or modify it
9under the terms of the GNU General Public License as published by the
8c4c00c1 10Free Software Foundation; either version 3, or (at your option) any
4ee9c684 11later version.
48e1416a 12
4ee9c684 13GCC is distributed in the hope that it will be useful, but WITHOUT
14ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
15FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
16for more details.
48e1416a 17
4ee9c684 18You should have received a copy of the GNU General Public License
8c4c00c1 19along with GCC; see the file COPYING3. If not see
20<http://www.gnu.org/licenses/>. */
4ee9c684 21
88dbf20f 22/* Conditional constant propagation (CCP) is based on the SSA
23 propagation engine (tree-ssa-propagate.c). Constant assignments of
24 the form VAR = CST are propagated from the assignments into uses of
25 VAR, which in turn may generate new constants. The simulation uses
26 a four level lattice to keep track of constant values associated
27 with SSA names. Given an SSA name V_i, it may take one of the
28 following values:
29
bfa30570 30 UNINITIALIZED -> the initial state of the value. This value
31 is replaced with a correct initial value
32 the first time the value is used, so the
33 rest of the pass does not need to care about
34 it. Using this value simplifies initialization
35 of the pass, and prevents us from needlessly
36 scanning statements that are never reached.
88dbf20f 37
38 UNDEFINED -> V_i is a local variable whose definition
39 has not been processed yet. Therefore we
40 don't yet know if its value is a constant
41 or not.
42
43 CONSTANT -> V_i has been found to hold a constant
44 value C.
45
46 VARYING -> V_i cannot take a constant value, or if it
47 does, it is not possible to determine it
48 at compile time.
49
50 The core of SSA-CCP is in ccp_visit_stmt and ccp_visit_phi_node:
51
52 1- In ccp_visit_stmt, we are interested in assignments whose RHS
53 evaluates into a constant and conditional jumps whose predicate
54 evaluates into a boolean true or false. When an assignment of
55 the form V_i = CONST is found, V_i's lattice value is set to
56 CONSTANT and CONST is associated with it. This causes the
57 propagation engine to add all the SSA edges coming out the
58 assignment into the worklists, so that statements that use V_i
59 can be visited.
60
61 If the statement is a conditional with a constant predicate, we
62 mark the outgoing edges as executable or not executable
63 depending on the predicate's value. This is then used when
64 visiting PHI nodes to know when a PHI argument can be ignored.
48e1416a 65
88dbf20f 66
67 2- In ccp_visit_phi_node, if all the PHI arguments evaluate to the
68 same constant C, then the LHS of the PHI is set to C. This
69 evaluation is known as the "meet operation". Since one of the
70 goals of this evaluation is to optimistically return constant
71 values as often as possible, it uses two main short cuts:
72
73 - If an argument is flowing in through a non-executable edge, it
74 is ignored. This is useful in cases like this:
75
76 if (PRED)
77 a_9 = 3;
78 else
79 a_10 = 100;
80 a_11 = PHI (a_9, a_10)
81
82 If PRED is known to always evaluate to false, then we can
83 assume that a_11 will always take its value from a_10, meaning
84 that instead of consider it VARYING (a_9 and a_10 have
85 different values), we can consider it CONSTANT 100.
86
87 - If an argument has an UNDEFINED value, then it does not affect
88 the outcome of the meet operation. If a variable V_i has an
89 UNDEFINED value, it means that either its defining statement
90 hasn't been visited yet or V_i has no defining statement, in
91 which case the original symbol 'V' is being used
92 uninitialized. Since 'V' is a local variable, the compiler
93 may assume any initial value for it.
94
95
96 After propagation, every variable V_i that ends up with a lattice
97 value of CONSTANT will have the associated constant value in the
98 array CONST_VAL[i].VALUE. That is fed into substitute_and_fold for
99 final substitution and folding.
100
e913b5cd 101 This algorithm uses wide-ints at the max precision of the target.
102 This means that, with one uninteresting exception, variables with
103 UNSIGNED types never go to VARYING because the bits above the
104 precision of the type of the variable are always zero. The
105 uninteresting case is a variable of UNSIGNED type that has the
106 maximum precision of the target. Such variables can go to VARYING,
107 but this causes no loss of infomation since these variables will
108 never be extended.
109
4ee9c684 110 References:
111
112 Constant propagation with conditional branches,
113 Wegman and Zadeck, ACM TOPLAS 13(2):181-210.
114
115 Building an Optimizing Compiler,
116 Robert Morgan, Butterworth-Heinemann, 1998, Section 8.9.
117
118 Advanced Compiler Design and Implementation,
119 Steven Muchnick, Morgan Kaufmann, 1997, Section 12.6 */
120
121#include "config.h"
122#include "system.h"
123#include "coretypes.h"
124#include "tm.h"
b20a8bb4 125#include "hash-set.h"
126#include "machmode.h"
127#include "vec.h"
128#include "double-int.h"
129#include "input.h"
130#include "alias.h"
131#include "symtab.h"
132#include "wide-int.h"
133#include "inchash.h"
134#include "real.h"
4ee9c684 135#include "tree.h"
b20a8bb4 136#include "fold-const.h"
9ed99284 137#include "stor-layout.h"
41511585 138#include "flags.h"
4ee9c684 139#include "tm_p.h"
94ea8568 140#include "predict.h"
a3020f2f 141#include "hard-reg-set.h"
142#include "input.h"
41511585 143#include "function.h"
94ea8568 144#include "dominance.h"
145#include "cfg.h"
146#include "basic-block.h"
ce084dfc 147#include "gimple-pretty-print.h"
bc61cadb 148#include "hash-table.h"
149#include "tree-ssa-alias.h"
150#include "internal-fn.h"
151#include "gimple-fold.h"
152#include "tree-eh.h"
153#include "gimple-expr.h"
154#include "is-a.h"
073c1fd5 155#include "gimple.h"
a8783bee 156#include "gimplify.h"
dcf1a1ec 157#include "gimple-iterator.h"
073c1fd5 158#include "gimple-ssa.h"
159#include "tree-cfg.h"
160#include "tree-phinodes.h"
161#include "ssa-iterators.h"
9ed99284 162#include "stringpool.h"
073c1fd5 163#include "tree-ssanames.h"
4ee9c684 164#include "tree-pass.h"
41511585 165#include "tree-ssa-propagate.h"
5a4b7e1e 166#include "value-prof.h"
41511585 167#include "langhooks.h"
8782adcf 168#include "target.h"
0b205f4c 169#include "diagnostic-core.h"
43fb76c1 170#include "dbgcnt.h"
9a65cc0a 171#include "params.h"
e913b5cd 172#include "wide-int-print.h"
f7715905 173#include "builtins.h"
058a1b7a 174#include "tree-chkp.h"
4ee9c684 175
2dc10fae 176
4ee9c684 177/* Possible lattice values. */
178typedef enum
179{
bfa30570 180 UNINITIALIZED,
4ee9c684 181 UNDEFINED,
182 CONSTANT,
183 VARYING
88dbf20f 184} ccp_lattice_t;
4ee9c684 185
9908fe4d 186struct ccp_prop_value_t {
14f101cf 187 /* Lattice value. */
188 ccp_lattice_t lattice_val;
189
190 /* Propagated value. */
191 tree value;
b7e55469 192
e913b5cd 193 /* Mask that applies to the propagated value during CCP. For X
194 with a CONSTANT lattice value X & ~mask == value & ~mask. The
195 zero bits in the mask cover constant values. The ones mean no
196 information. */
5de9d3ed 197 widest_int mask;
14f101cf 198};
199
88dbf20f 200/* Array of propagated constant values. After propagation,
201 CONST_VAL[I].VALUE holds the constant value for SSA_NAME(I). If
202 the constant is held in an SSA name representing a memory store
4fb5e5ca 203 (i.e., a VDEF), CONST_VAL[I].MEM_REF will contain the actual
204 memory reference used to store (i.e., the LHS of the assignment
205 doing the store). */
9908fe4d 206static ccp_prop_value_t *const_val;
285df01b 207static unsigned n_const_val;
4ee9c684 208
9908fe4d 209static void canonicalize_value (ccp_prop_value_t *);
6688f8ec 210static bool ccp_fold_stmt (gimple_stmt_iterator *);
4af351a8 211
88dbf20f 212/* Dump constant propagation value VAL to file OUTF prefixed by PREFIX. */
01406fc0 213
214static void
9908fe4d 215dump_lattice_value (FILE *outf, const char *prefix, ccp_prop_value_t val)
01406fc0 216{
41511585 217 switch (val.lattice_val)
01406fc0 218 {
88dbf20f 219 case UNINITIALIZED:
220 fprintf (outf, "%sUNINITIALIZED", prefix);
221 break;
41511585 222 case UNDEFINED:
223 fprintf (outf, "%sUNDEFINED", prefix);
224 break;
225 case VARYING:
226 fprintf (outf, "%sVARYING", prefix);
227 break;
41511585 228 case CONSTANT:
b7e55469 229 if (TREE_CODE (val.value) != INTEGER_CST
796b6678 230 || val.mask == 0)
16ab4e97 231 {
232 fprintf (outf, "%sCONSTANT ", prefix);
233 print_generic_expr (outf, val.value, dump_flags);
234 }
b7e55469 235 else
236 {
28e557ef 237 widest_int cval = wi::bit_and_not (wi::to_widest (val.value),
238 val.mask);
e913b5cd 239 fprintf (outf, "%sCONSTANT ", prefix);
240 print_hex (cval, outf);
241 fprintf (outf, " (");
242 print_hex (val.mask, outf);
243 fprintf (outf, ")");
b7e55469 244 }
41511585 245 break;
246 default:
8c0963c4 247 gcc_unreachable ();
41511585 248 }
01406fc0 249}
4ee9c684 250
4ee9c684 251
88dbf20f 252/* Print lattice value VAL to stderr. */
253
9908fe4d 254void debug_lattice_value (ccp_prop_value_t val);
88dbf20f 255
4b987fac 256DEBUG_FUNCTION void
9908fe4d 257debug_lattice_value (ccp_prop_value_t val)
88dbf20f 258{
259 dump_lattice_value (stderr, "", val);
260 fprintf (stderr, "\n");
261}
4ee9c684 262
9c1be15e 263/* Extend NONZERO_BITS to a full mask, with the upper bits being set. */
264
265static widest_int
266extend_mask (const wide_int &nonzero_bits)
267{
268 return (wi::mask <widest_int> (wi::get_precision (nonzero_bits), true)
269 | widest_int::from (nonzero_bits, UNSIGNED));
270}
4ee9c684 271
88dbf20f 272/* Compute a default value for variable VAR and store it in the
273 CONST_VAL array. The following rules are used to get default
274 values:
01406fc0 275
88dbf20f 276 1- Global and static variables that are declared constant are
277 considered CONSTANT.
278
279 2- Any other value is considered UNDEFINED. This is useful when
41511585 280 considering PHI nodes. PHI arguments that are undefined do not
281 change the constant value of the PHI node, which allows for more
88dbf20f 282 constants to be propagated.
4ee9c684 283
8883e700 284 3- Variables defined by statements other than assignments and PHI
88dbf20f 285 nodes are considered VARYING.
4ee9c684 286
8883e700 287 4- Initial values of variables that are not GIMPLE registers are
bfa30570 288 considered VARYING. */
4ee9c684 289
9908fe4d 290static ccp_prop_value_t
88dbf20f 291get_default_value (tree var)
292{
9908fe4d 293 ccp_prop_value_t val = { UNINITIALIZED, NULL_TREE, 0 };
8edeb88b 294 gimple stmt;
295
296 stmt = SSA_NAME_DEF_STMT (var);
297
298 if (gimple_nop_p (stmt))
4ee9c684 299 {
8edeb88b 300 /* Variables defined by an empty statement are those used
301 before being initialized. If VAR is a local variable, we
302 can assume initially that it is UNDEFINED, otherwise we must
303 consider it VARYING. */
7c782c9b 304 if (!virtual_operand_p (var)
305 && TREE_CODE (SSA_NAME_VAR (var)) == VAR_DECL)
8edeb88b 306 val.lattice_val = UNDEFINED;
307 else
b7e55469 308 {
309 val.lattice_val = VARYING;
e913b5cd 310 val.mask = -1;
fc08b993 311 if (flag_tree_bit_ccp)
312 {
9c1be15e 313 wide_int nonzero_bits = get_nonzero_bits (var);
314 if (nonzero_bits != -1)
fc08b993 315 {
316 val.lattice_val = CONSTANT;
317 val.value = build_zero_cst (TREE_TYPE (var));
9c1be15e 318 val.mask = extend_mask (nonzero_bits);
fc08b993 319 }
320 }
b7e55469 321 }
4ee9c684 322 }
b45b214a 323 else if (is_gimple_assign (stmt))
41511585 324 {
8edeb88b 325 tree cst;
326 if (gimple_assign_single_p (stmt)
327 && DECL_P (gimple_assign_rhs1 (stmt))
328 && (cst = get_symbol_constant_value (gimple_assign_rhs1 (stmt))))
88dbf20f 329 {
8edeb88b 330 val.lattice_val = CONSTANT;
331 val.value = cst;
88dbf20f 332 }
333 else
b45b214a 334 {
335 /* Any other variable defined by an assignment is considered
336 UNDEFINED. */
337 val.lattice_val = UNDEFINED;
338 }
339 }
340 else if ((is_gimple_call (stmt)
341 && gimple_call_lhs (stmt) != NULL_TREE)
342 || gimple_code (stmt) == GIMPLE_PHI)
343 {
344 /* A variable defined by a call or a PHI node is considered
345 UNDEFINED. */
346 val.lattice_val = UNDEFINED;
8edeb88b 347 }
348 else
349 {
350 /* Otherwise, VAR will never take on a constant value. */
351 val.lattice_val = VARYING;
e913b5cd 352 val.mask = -1;
41511585 353 }
4ee9c684 354
41511585 355 return val;
356}
4ee9c684 357
4ee9c684 358
bfa30570 359/* Get the constant value associated with variable VAR. */
4ee9c684 360
9908fe4d 361static inline ccp_prop_value_t *
bfa30570 362get_value (tree var)
88dbf20f 363{
9908fe4d 364 ccp_prop_value_t *val;
bfa30570 365
285df01b 366 if (const_val == NULL
367 || SSA_NAME_VERSION (var) >= n_const_val)
e004838d 368 return NULL;
369
370 val = &const_val[SSA_NAME_VERSION (var)];
bfa30570 371 if (val->lattice_val == UNINITIALIZED)
4ee9c684 372 *val = get_default_value (var);
373
f5faab84 374 canonicalize_value (val);
4af351a8 375
4ee9c684 376 return val;
377}
378
15d138c9 379/* Return the constant tree value associated with VAR. */
380
381static inline tree
382get_constant_value (tree var)
383{
9908fe4d 384 ccp_prop_value_t *val;
98d92e3c 385 if (TREE_CODE (var) != SSA_NAME)
386 {
387 if (is_gimple_min_invariant (var))
388 return var;
389 return NULL_TREE;
390 }
391 val = get_value (var);
b7e55469 392 if (val
393 && val->lattice_val == CONSTANT
394 && (TREE_CODE (val->value) != INTEGER_CST
796b6678 395 || val->mask == 0))
15d138c9 396 return val->value;
397 return NULL_TREE;
398}
399
bfa30570 400/* Sets the value associated with VAR to VARYING. */
401
402static inline void
403set_value_varying (tree var)
404{
9908fe4d 405 ccp_prop_value_t *val = &const_val[SSA_NAME_VERSION (var)];
bfa30570 406
407 val->lattice_val = VARYING;
408 val->value = NULL_TREE;
e913b5cd 409 val->mask = -1;
bfa30570 410}
4ee9c684 411
0001b944 412/* For integer constants, make sure to drop TREE_OVERFLOW. */
b31eb493 413
414static void
9908fe4d 415canonicalize_value (ccp_prop_value_t *val)
b31eb493 416{
f5faab84 417 if (val->lattice_val != CONSTANT)
418 return;
419
420 if (TREE_OVERFLOW_P (val->value))
421 val->value = drop_tree_overflow (val->value);
b31eb493 422}
423
b7e55469 424/* Return whether the lattice transition is valid. */
425
426static bool
9908fe4d 427valid_lattice_transition (ccp_prop_value_t old_val, ccp_prop_value_t new_val)
b7e55469 428{
429 /* Lattice transitions must always be monotonically increasing in
430 value. */
431 if (old_val.lattice_val < new_val.lattice_val)
432 return true;
433
434 if (old_val.lattice_val != new_val.lattice_val)
435 return false;
436
437 if (!old_val.value && !new_val.value)
438 return true;
439
440 /* Now both lattice values are CONSTANT. */
441
43c92e0a 442 /* Allow transitioning from PHI <&x, not executable> == &x
443 to PHI <&x, &y> == common alignment. */
b7e55469 444 if (TREE_CODE (old_val.value) != INTEGER_CST
445 && TREE_CODE (new_val.value) == INTEGER_CST)
446 return true;
447
448 /* Bit-lattices have to agree in the still valid bits. */
449 if (TREE_CODE (old_val.value) == INTEGER_CST
450 && TREE_CODE (new_val.value) == INTEGER_CST)
5de9d3ed 451 return (wi::bit_and_not (wi::to_widest (old_val.value), new_val.mask)
452 == wi::bit_and_not (wi::to_widest (new_val.value), new_val.mask));
b7e55469 453
454 /* Otherwise constant values have to agree. */
0001b944 455 if (operand_equal_p (old_val.value, new_val.value, 0))
456 return true;
457
458 /* At least the kinds and types should agree now. */
459 if (TREE_CODE (old_val.value) != TREE_CODE (new_val.value)
460 || !types_compatible_p (TREE_TYPE (old_val.value),
461 TREE_TYPE (new_val.value)))
462 return false;
463
464 /* For floats and !HONOR_NANS allow transitions from (partial) NaN
465 to non-NaN. */
466 tree type = TREE_TYPE (new_val.value);
467 if (SCALAR_FLOAT_TYPE_P (type)
93633022 468 && !HONOR_NANS (type))
0001b944 469 {
470 if (REAL_VALUE_ISNAN (TREE_REAL_CST (old_val.value)))
471 return true;
472 }
473 else if (VECTOR_FLOAT_TYPE_P (type)
93633022 474 && !HONOR_NANS (type))
0001b944 475 {
476 for (unsigned i = 0; i < VECTOR_CST_NELTS (old_val.value); ++i)
477 if (!REAL_VALUE_ISNAN
478 (TREE_REAL_CST (VECTOR_CST_ELT (old_val.value, i)))
479 && !operand_equal_p (VECTOR_CST_ELT (old_val.value, i),
480 VECTOR_CST_ELT (new_val.value, i), 0))
481 return false;
482 return true;
483 }
484 else if (COMPLEX_FLOAT_TYPE_P (type)
93633022 485 && !HONOR_NANS (type))
0001b944 486 {
487 if (!REAL_VALUE_ISNAN (TREE_REAL_CST (TREE_REALPART (old_val.value)))
488 && !operand_equal_p (TREE_REALPART (old_val.value),
489 TREE_REALPART (new_val.value), 0))
490 return false;
491 if (!REAL_VALUE_ISNAN (TREE_REAL_CST (TREE_IMAGPART (old_val.value)))
492 && !operand_equal_p (TREE_IMAGPART (old_val.value),
493 TREE_IMAGPART (new_val.value), 0))
494 return false;
495 return true;
496 }
497 return false;
b7e55469 498}
499
88dbf20f 500/* Set the value for variable VAR to NEW_VAL. Return true if the new
501 value is different from VAR's previous value. */
4ee9c684 502
41511585 503static bool
9908fe4d 504set_lattice_value (tree var, ccp_prop_value_t new_val)
4ee9c684 505{
6d0bf6d6 506 /* We can deal with old UNINITIALIZED values just fine here. */
9908fe4d 507 ccp_prop_value_t *old_val = &const_val[SSA_NAME_VERSION (var)];
88dbf20f 508
f5faab84 509 canonicalize_value (&new_val);
b31eb493 510
b7e55469 511 /* We have to be careful to not go up the bitwise lattice
512 represented by the mask.
513 ??? This doesn't seem to be the best place to enforce this. */
514 if (new_val.lattice_val == CONSTANT
515 && old_val->lattice_val == CONSTANT
516 && TREE_CODE (new_val.value) == INTEGER_CST
517 && TREE_CODE (old_val->value) == INTEGER_CST)
518 {
5de9d3ed 519 widest_int diff = (wi::to_widest (new_val.value)
520 ^ wi::to_widest (old_val->value));
cf8f0e63 521 new_val.mask = new_val.mask | old_val->mask | diff;
b7e55469 522 }
bfa30570 523
0001b944 524 gcc_checking_assert (valid_lattice_transition (*old_val, new_val));
88dbf20f 525
b7e55469 526 /* If *OLD_VAL and NEW_VAL are the same, return false to inform the
527 caller that this was a non-transition. */
528 if (old_val->lattice_val != new_val.lattice_val
529 || (new_val.lattice_val == CONSTANT
530 && TREE_CODE (new_val.value) == INTEGER_CST
531 && (TREE_CODE (old_val->value) != INTEGER_CST
3a54beaf 532 || new_val.mask != old_val->mask)))
4ee9c684 533 {
b7e55469 534 /* ??? We would like to delay creation of INTEGER_CSTs from
535 partially constants here. */
536
41511585 537 if (dump_file && (dump_flags & TDF_DETAILS))
538 {
88dbf20f 539 dump_lattice_value (dump_file, "Lattice value changed to ", new_val);
bfa30570 540 fprintf (dump_file, ". Adding SSA edges to worklist.\n");
41511585 541 }
542
88dbf20f 543 *old_val = new_val;
544
6d0bf6d6 545 gcc_assert (new_val.lattice_val != UNINITIALIZED);
bfa30570 546 return true;
4ee9c684 547 }
41511585 548
549 return false;
4ee9c684 550}
551
9908fe4d 552static ccp_prop_value_t get_value_for_expr (tree, bool);
553static ccp_prop_value_t bit_value_binop (enum tree_code, tree, tree, tree);
5de9d3ed 554static void bit_value_binop_1 (enum tree_code, tree, widest_int *, widest_int *,
10c3fe8d 555 tree, const widest_int &, const widest_int &,
556 tree, const widest_int &, const widest_int &);
b7e55469 557
5de9d3ed 558/* Return a widest_int that can be used for bitwise simplifications
b7e55469 559 from VAL. */
560
5de9d3ed 561static widest_int
9908fe4d 562value_to_wide_int (ccp_prop_value_t val)
b7e55469 563{
564 if (val.value
565 && TREE_CODE (val.value) == INTEGER_CST)
5de9d3ed 566 return wi::to_widest (val.value);
e913b5cd 567
568 return 0;
b7e55469 569}
570
571/* Return the value for the address expression EXPR based on alignment
572 information. */
6d0bf6d6 573
9908fe4d 574static ccp_prop_value_t
b7e55469 575get_value_from_alignment (tree expr)
576{
f8abb542 577 tree type = TREE_TYPE (expr);
9908fe4d 578 ccp_prop_value_t val;
f8abb542 579 unsigned HOST_WIDE_INT bitpos;
580 unsigned int align;
b7e55469 581
582 gcc_assert (TREE_CODE (expr) == ADDR_EXPR);
583
59da1bcd 584 get_pointer_alignment_1 (expr, &align, &bitpos);
cf8f0e63 585 val.mask = (POINTER_TYPE_P (type) || TYPE_UNSIGNED (type)
5de9d3ed 586 ? wi::mask <widest_int> (TYPE_PRECISION (type), false)
e913b5cd 587 : -1).and_not (align / BITS_PER_UNIT - 1);
796b6678 588 val.lattice_val = val.mask == -1 ? VARYING : CONSTANT;
f8abb542 589 if (val.lattice_val == CONSTANT)
796b6678 590 val.value = build_int_cstu (type, bitpos / BITS_PER_UNIT);
b7e55469 591 else
f8abb542 592 val.value = NULL_TREE;
b7e55469 593
594 return val;
595}
596
597/* Return the value for the tree operand EXPR. If FOR_BITS_P is true
598 return constant bits extracted from alignment information for
599 invariant addresses. */
600
9908fe4d 601static ccp_prop_value_t
b7e55469 602get_value_for_expr (tree expr, bool for_bits_p)
6d0bf6d6 603{
9908fe4d 604 ccp_prop_value_t val;
6d0bf6d6 605
606 if (TREE_CODE (expr) == SSA_NAME)
b7e55469 607 {
608 val = *get_value (expr);
609 if (for_bits_p
610 && val.lattice_val == CONSTANT
611 && TREE_CODE (val.value) == ADDR_EXPR)
612 val = get_value_from_alignment (val.value);
613 }
614 else if (is_gimple_min_invariant (expr)
615 && (!for_bits_p || TREE_CODE (expr) != ADDR_EXPR))
6d0bf6d6 616 {
617 val.lattice_val = CONSTANT;
618 val.value = expr;
e913b5cd 619 val.mask = 0;
f5faab84 620 canonicalize_value (&val);
6d0bf6d6 621 }
b7e55469 622 else if (TREE_CODE (expr) == ADDR_EXPR)
623 val = get_value_from_alignment (expr);
6d0bf6d6 624 else
625 {
626 val.lattice_val = VARYING;
09b2913a 627 val.mask = -1;
6d0bf6d6 628 val.value = NULL_TREE;
629 }
6d0bf6d6 630 return val;
631}
632
88dbf20f 633/* Return the likely CCP lattice value for STMT.
4ee9c684 634
41511585 635 If STMT has no operands, then return CONSTANT.
4ee9c684 636
d61b9af3 637 Else if undefinedness of operands of STMT cause its value to be
638 undefined, then return UNDEFINED.
4ee9c684 639
41511585 640 Else if any operands of STMT are constants, then return CONSTANT.
4ee9c684 641
41511585 642 Else return VARYING. */
4ee9c684 643
88dbf20f 644static ccp_lattice_t
75a70cf9 645likely_value (gimple stmt)
41511585 646{
d61b9af3 647 bool has_constant_operand, has_undefined_operand, all_undefined_operands;
41511585 648 tree use;
649 ssa_op_iter iter;
8edeb88b 650 unsigned i;
4ee9c684 651
590c3166 652 enum gimple_code code = gimple_code (stmt);
75a70cf9 653
654 /* This function appears to be called only for assignments, calls,
655 conditionals, and switches, due to the logic in visit_stmt. */
656 gcc_assert (code == GIMPLE_ASSIGN
657 || code == GIMPLE_CALL
658 || code == GIMPLE_COND
659 || code == GIMPLE_SWITCH);
88dbf20f 660
661 /* If the statement has volatile operands, it won't fold to a
662 constant value. */
75a70cf9 663 if (gimple_has_volatile_ops (stmt))
88dbf20f 664 return VARYING;
665
75a70cf9 666 /* Arrive here for more complex cases. */
bfa30570 667 has_constant_operand = false;
d61b9af3 668 has_undefined_operand = false;
669 all_undefined_operands = true;
8edeb88b 670 FOR_EACH_SSA_TREE_OPERAND (use, stmt, iter, SSA_OP_USE)
41511585 671 {
9908fe4d 672 ccp_prop_value_t *val = get_value (use);
41511585 673
bfa30570 674 if (val->lattice_val == UNDEFINED)
d61b9af3 675 has_undefined_operand = true;
676 else
677 all_undefined_operands = false;
88dbf20f 678
41511585 679 if (val->lattice_val == CONSTANT)
bfa30570 680 has_constant_operand = true;
4ee9c684 681 }
41511585 682
dd277d48 683 /* There may be constants in regular rhs operands. For calls we
684 have to ignore lhs, fndecl and static chain, otherwise only
685 the lhs. */
686 for (i = (is_gimple_call (stmt) ? 2 : 0) + gimple_has_lhs (stmt);
8edeb88b 687 i < gimple_num_ops (stmt); ++i)
688 {
689 tree op = gimple_op (stmt, i);
690 if (!op || TREE_CODE (op) == SSA_NAME)
691 continue;
692 if (is_gimple_min_invariant (op))
693 has_constant_operand = true;
694 }
695
87c0a9fc 696 if (has_constant_operand)
697 all_undefined_operands = false;
698
3d483a94 699 if (has_undefined_operand
700 && code == GIMPLE_CALL
701 && gimple_call_internal_p (stmt))
702 switch (gimple_call_internal_fn (stmt))
703 {
704 /* These 3 builtins use the first argument just as a magic
705 way how to find out a decl uid. */
706 case IFN_GOMP_SIMD_LANE:
707 case IFN_GOMP_SIMD_VF:
708 case IFN_GOMP_SIMD_LAST_LANE:
709 has_undefined_operand = false;
710 break;
711 default:
712 break;
713 }
714
d61b9af3 715 /* If the operation combines operands like COMPLEX_EXPR make sure to
716 not mark the result UNDEFINED if only one part of the result is
717 undefined. */
75a70cf9 718 if (has_undefined_operand && all_undefined_operands)
d61b9af3 719 return UNDEFINED;
75a70cf9 720 else if (code == GIMPLE_ASSIGN && has_undefined_operand)
d61b9af3 721 {
75a70cf9 722 switch (gimple_assign_rhs_code (stmt))
d61b9af3 723 {
724 /* Unary operators are handled with all_undefined_operands. */
725 case PLUS_EXPR:
726 case MINUS_EXPR:
d61b9af3 727 case POINTER_PLUS_EXPR:
d61b9af3 728 /* Not MIN_EXPR, MAX_EXPR. One VARYING operand may be selected.
729 Not bitwise operators, one VARYING operand may specify the
730 result completely. Not logical operators for the same reason.
05a936a0 731 Not COMPLEX_EXPR as one VARYING operand makes the result partly
732 not UNDEFINED. Not *DIV_EXPR, comparisons and shifts because
733 the undefined operand may be promoted. */
d61b9af3 734 return UNDEFINED;
735
43c92e0a 736 case ADDR_EXPR:
737 /* If any part of an address is UNDEFINED, like the index
738 of an ARRAY_EXPR, then treat the result as UNDEFINED. */
739 return UNDEFINED;
740
d61b9af3 741 default:
742 ;
743 }
744 }
745 /* If there was an UNDEFINED operand but the result may be not UNDEFINED
c91fedc5 746 fall back to CONSTANT. During iteration UNDEFINED may still drop
747 to CONSTANT. */
d61b9af3 748 if (has_undefined_operand)
c91fedc5 749 return CONSTANT;
d61b9af3 750
8edeb88b 751 /* We do not consider virtual operands here -- load from read-only
752 memory may have only VARYING virtual operands, but still be
753 constant. */
bfa30570 754 if (has_constant_operand
8edeb88b 755 || gimple_references_memory_p (stmt))
88dbf20f 756 return CONSTANT;
757
bfa30570 758 return VARYING;
4ee9c684 759}
760
bfa30570 761/* Returns true if STMT cannot be constant. */
762
763static bool
75a70cf9 764surely_varying_stmt_p (gimple stmt)
bfa30570 765{
766 /* If the statement has operands that we cannot handle, it cannot be
767 constant. */
75a70cf9 768 if (gimple_has_volatile_ops (stmt))
bfa30570 769 return true;
770
f257af64 771 /* If it is a call and does not return a value or is not a
237e78b1 772 builtin and not an indirect call or a call to function with
773 assume_aligned/alloc_align attribute, it is varying. */
75a70cf9 774 if (is_gimple_call (stmt))
f257af64 775 {
237e78b1 776 tree fndecl, fntype = gimple_call_fntype (stmt);
f257af64 777 if (!gimple_call_lhs (stmt)
778 || ((fndecl = gimple_call_fndecl (stmt)) != NULL_TREE
237e78b1 779 && !DECL_BUILT_IN (fndecl)
780 && !lookup_attribute ("assume_aligned",
781 TYPE_ATTRIBUTES (fntype))
782 && !lookup_attribute ("alloc_align",
783 TYPE_ATTRIBUTES (fntype))))
f257af64 784 return true;
785 }
bfa30570 786
8edeb88b 787 /* Any other store operation is not interesting. */
dd277d48 788 else if (gimple_vdef (stmt))
8edeb88b 789 return true;
790
bfa30570 791 /* Anything other than assignments and conditional jumps are not
792 interesting for CCP. */
75a70cf9 793 if (gimple_code (stmt) != GIMPLE_ASSIGN
f257af64 794 && gimple_code (stmt) != GIMPLE_COND
795 && gimple_code (stmt) != GIMPLE_SWITCH
796 && gimple_code (stmt) != GIMPLE_CALL)
bfa30570 797 return true;
798
799 return false;
800}
4ee9c684 801
41511585 802/* Initialize local data structures for CCP. */
4ee9c684 803
804static void
41511585 805ccp_initialize (void)
4ee9c684 806{
41511585 807 basic_block bb;
4ee9c684 808
285df01b 809 n_const_val = num_ssa_names;
9908fe4d 810 const_val = XCNEWVEC (ccp_prop_value_t, n_const_val);
4ee9c684 811
41511585 812 /* Initialize simulation flags for PHI nodes and statements. */
fc00614f 813 FOR_EACH_BB_FN (bb, cfun)
4ee9c684 814 {
75a70cf9 815 gimple_stmt_iterator i;
4ee9c684 816
75a70cf9 817 for (i = gsi_start_bb (bb); !gsi_end_p (i); gsi_next (&i))
41511585 818 {
75a70cf9 819 gimple stmt = gsi_stmt (i);
2193544e 820 bool is_varying;
821
822 /* If the statement is a control insn, then we do not
823 want to avoid simulating the statement once. Failure
824 to do so means that those edges will never get added. */
825 if (stmt_ends_bb_p (stmt))
826 is_varying = false;
827 else
828 is_varying = surely_varying_stmt_p (stmt);
4ee9c684 829
bfa30570 830 if (is_varying)
41511585 831 {
88dbf20f 832 tree def;
833 ssa_op_iter iter;
834
835 /* If the statement will not produce a constant, mark
836 all its outputs VARYING. */
837 FOR_EACH_SSA_TREE_OPERAND (def, stmt, iter, SSA_OP_ALL_DEFS)
8edeb88b 838 set_value_varying (def);
41511585 839 }
75a70cf9 840 prop_set_simulate_again (stmt, !is_varying);
41511585 841 }
4ee9c684 842 }
843
75a70cf9 844 /* Now process PHI nodes. We never clear the simulate_again flag on
845 phi nodes, since we do not know which edges are executable yet,
846 except for phi nodes for virtual operands when we do not do store ccp. */
fc00614f 847 FOR_EACH_BB_FN (bb, cfun)
4ee9c684 848 {
1a91d914 849 gphi_iterator i;
41511585 850
75a70cf9 851 for (i = gsi_start_phis (bb); !gsi_end_p (i); gsi_next (&i))
852 {
1a91d914 853 gphi *phi = i.phi ();
75a70cf9 854
7c782c9b 855 if (virtual_operand_p (gimple_phi_result (phi)))
75a70cf9 856 prop_set_simulate_again (phi, false);
bfa30570 857 else
75a70cf9 858 prop_set_simulate_again (phi, true);
41511585 859 }
4ee9c684 860 }
41511585 861}
4ee9c684 862
43fb76c1 863/* Debug count support. Reset the values of ssa names
864 VARYING when the total number ssa names analyzed is
865 beyond the debug count specified. */
866
867static void
868do_dbg_cnt (void)
869{
870 unsigned i;
871 for (i = 0; i < num_ssa_names; i++)
872 {
873 if (!dbg_cnt (ccp))
874 {
875 const_val[i].lattice_val = VARYING;
e913b5cd 876 const_val[i].mask = -1;
43fb76c1 877 const_val[i].value = NULL_TREE;
878 }
879 }
880}
881
4ee9c684 882
88dbf20f 883/* Do final substitution of propagated values, cleanup the flowgraph and
48e1416a 884 free allocated storage.
4ee9c684 885
33a34f1e 886 Return TRUE when something was optimized. */
887
888static bool
88dbf20f 889ccp_finalize (void)
4ee9c684 890{
43fb76c1 891 bool something_changed;
153c3b50 892 unsigned i;
43fb76c1 893
894 do_dbg_cnt ();
153c3b50 895
896 /* Derive alignment and misalignment information from partially
fc08b993 897 constant pointers in the lattice or nonzero bits from partially
898 constant integers. */
153c3b50 899 for (i = 1; i < num_ssa_names; ++i)
900 {
901 tree name = ssa_name (i);
9908fe4d 902 ccp_prop_value_t *val;
153c3b50 903 unsigned int tem, align;
904
905 if (!name
fc08b993 906 || (!POINTER_TYPE_P (TREE_TYPE (name))
907 && (!INTEGRAL_TYPE_P (TREE_TYPE (name))
908 /* Don't record nonzero bits before IPA to avoid
909 using too much memory. */
910 || first_pass_instance)))
153c3b50 911 continue;
912
913 val = get_value (name);
914 if (val->lattice_val != CONSTANT
915 || TREE_CODE (val->value) != INTEGER_CST)
916 continue;
917
fc08b993 918 if (POINTER_TYPE_P (TREE_TYPE (name)))
919 {
920 /* Trailing mask bits specify the alignment, trailing value
921 bits the misalignment. */
aeb682a2 922 tem = val->mask.to_uhwi ();
fc08b993 923 align = (tem & -tem);
924 if (align > 1)
925 set_ptr_info_alignment (get_ptr_info (name), align,
f9ae6f95 926 (TREE_INT_CST_LOW (val->value)
fc08b993 927 & (align - 1)));
928 }
929 else
930 {
9c1be15e 931 unsigned int precision = TYPE_PRECISION (TREE_TYPE (val->value));
932 wide_int nonzero_bits = wide_int::from (val->mask, precision,
933 UNSIGNED) | val->value;
fc08b993 934 nonzero_bits &= get_nonzero_bits (name);
935 set_nonzero_bits (name, nonzero_bits);
936 }
153c3b50 937 }
938
88dbf20f 939 /* Perform substitutions based on the known constant values. */
14f101cf 940 something_changed = substitute_and_fold (get_constant_value,
941 ccp_fold_stmt, true);
4ee9c684 942
88dbf20f 943 free (const_val);
e004838d 944 const_val = NULL;
33a34f1e 945 return something_changed;;
4ee9c684 946}
947
948
88dbf20f 949/* Compute the meet operator between *VAL1 and *VAL2. Store the result
950 in VAL1.
951
952 any M UNDEFINED = any
88dbf20f 953 any M VARYING = VARYING
954 Ci M Cj = Ci if (i == j)
955 Ci M Cj = VARYING if (i != j)
bfa30570 956 */
4ee9c684 957
958static void
9908fe4d 959ccp_lattice_meet (ccp_prop_value_t *val1, ccp_prop_value_t *val2)
4ee9c684 960{
88dbf20f 961 if (val1->lattice_val == UNDEFINED)
4ee9c684 962 {
88dbf20f 963 /* UNDEFINED M any = any */
964 *val1 = *val2;
41511585 965 }
88dbf20f 966 else if (val2->lattice_val == UNDEFINED)
92481a4d 967 {
88dbf20f 968 /* any M UNDEFINED = any
969 Nothing to do. VAL1 already contains the value we want. */
970 ;
92481a4d 971 }
88dbf20f 972 else if (val1->lattice_val == VARYING
973 || val2->lattice_val == VARYING)
41511585 974 {
88dbf20f 975 /* any M VARYING = VARYING. */
976 val1->lattice_val = VARYING;
e913b5cd 977 val1->mask = -1;
88dbf20f 978 val1->value = NULL_TREE;
41511585 979 }
b7e55469 980 else if (val1->lattice_val == CONSTANT
981 && val2->lattice_val == CONSTANT
982 && TREE_CODE (val1->value) == INTEGER_CST
983 && TREE_CODE (val2->value) == INTEGER_CST)
984 {
985 /* Ci M Cj = Ci if (i == j)
986 Ci M Cj = VARYING if (i != j)
987
988 For INTEGER_CSTs mask unequal bits. If no equal bits remain,
989 drop to varying. */
e913b5cd 990 val1->mask = (val1->mask | val2->mask
5de9d3ed 991 | (wi::to_widest (val1->value)
992 ^ wi::to_widest (val2->value)));
796b6678 993 if (val1->mask == -1)
b7e55469 994 {
995 val1->lattice_val = VARYING;
996 val1->value = NULL_TREE;
997 }
998 }
88dbf20f 999 else if (val1->lattice_val == CONSTANT
1000 && val2->lattice_val == CONSTANT
61207d43 1001 && simple_cst_equal (val1->value, val2->value) == 1)
41511585 1002 {
88dbf20f 1003 /* Ci M Cj = Ci if (i == j)
1004 Ci M Cj = VARYING if (i != j)
1005
b7e55469 1006 VAL1 already contains the value we want for equivalent values. */
1007 }
1008 else if (val1->lattice_val == CONSTANT
1009 && val2->lattice_val == CONSTANT
1010 && (TREE_CODE (val1->value) == ADDR_EXPR
1011 || TREE_CODE (val2->value) == ADDR_EXPR))
1012 {
1013 /* When not equal addresses are involved try meeting for
1014 alignment. */
9908fe4d 1015 ccp_prop_value_t tem = *val2;
b7e55469 1016 if (TREE_CODE (val1->value) == ADDR_EXPR)
1017 *val1 = get_value_for_expr (val1->value, true);
1018 if (TREE_CODE (val2->value) == ADDR_EXPR)
1019 tem = get_value_for_expr (val2->value, true);
1020 ccp_lattice_meet (val1, &tem);
41511585 1021 }
1022 else
1023 {
88dbf20f 1024 /* Any other combination is VARYING. */
1025 val1->lattice_val = VARYING;
e913b5cd 1026 val1->mask = -1;
88dbf20f 1027 val1->value = NULL_TREE;
41511585 1028 }
4ee9c684 1029}
1030
1031
41511585 1032/* Loop through the PHI_NODE's parameters for BLOCK and compare their
1033 lattice values to determine PHI_NODE's lattice value. The value of a
88dbf20f 1034 PHI node is determined calling ccp_lattice_meet with all the arguments
41511585 1035 of the PHI node that are incoming via executable edges. */
4ee9c684 1036
41511585 1037static enum ssa_prop_result
1a91d914 1038ccp_visit_phi_node (gphi *phi)
4ee9c684 1039{
75a70cf9 1040 unsigned i;
9908fe4d 1041 ccp_prop_value_t *old_val, new_val;
4ee9c684 1042
41511585 1043 if (dump_file && (dump_flags & TDF_DETAILS))
4ee9c684 1044 {
41511585 1045 fprintf (dump_file, "\nVisiting PHI node: ");
75a70cf9 1046 print_gimple_stmt (dump_file, phi, 0, dump_flags);
4ee9c684 1047 }
4ee9c684 1048
75a70cf9 1049 old_val = get_value (gimple_phi_result (phi));
41511585 1050 switch (old_val->lattice_val)
1051 {
1052 case VARYING:
88dbf20f 1053 return SSA_PROP_VARYING;
4ee9c684 1054
41511585 1055 case CONSTANT:
1056 new_val = *old_val;
1057 break;
4ee9c684 1058
41511585 1059 case UNDEFINED:
41511585 1060 new_val.lattice_val = UNDEFINED;
88dbf20f 1061 new_val.value = NULL_TREE;
41511585 1062 break;
4ee9c684 1063
41511585 1064 default:
8c0963c4 1065 gcc_unreachable ();
41511585 1066 }
4ee9c684 1067
75a70cf9 1068 for (i = 0; i < gimple_phi_num_args (phi); i++)
41511585 1069 {
88dbf20f 1070 /* Compute the meet operator over all the PHI arguments flowing
1071 through executable edges. */
75a70cf9 1072 edge e = gimple_phi_arg_edge (phi, i);
4ee9c684 1073
41511585 1074 if (dump_file && (dump_flags & TDF_DETAILS))
1075 {
1076 fprintf (dump_file,
1077 "\n Argument #%d (%d -> %d %sexecutable)\n",
1078 i, e->src->index, e->dest->index,
1079 (e->flags & EDGE_EXECUTABLE) ? "" : "not ");
1080 }
1081
1082 /* If the incoming edge is executable, Compute the meet operator for
1083 the existing value of the PHI node and the current PHI argument. */
1084 if (e->flags & EDGE_EXECUTABLE)
1085 {
75a70cf9 1086 tree arg = gimple_phi_arg (phi, i)->def;
9908fe4d 1087 ccp_prop_value_t arg_val = get_value_for_expr (arg, false);
4ee9c684 1088
88dbf20f 1089 ccp_lattice_meet (&new_val, &arg_val);
4ee9c684 1090
41511585 1091 if (dump_file && (dump_flags & TDF_DETAILS))
1092 {
1093 fprintf (dump_file, "\t");
88dbf20f 1094 print_generic_expr (dump_file, arg, dump_flags);
1095 dump_lattice_value (dump_file, "\tValue: ", arg_val);
41511585 1096 fprintf (dump_file, "\n");
1097 }
4ee9c684 1098
41511585 1099 if (new_val.lattice_val == VARYING)
1100 break;
1101 }
1102 }
4ee9c684 1103
1104 if (dump_file && (dump_flags & TDF_DETAILS))
41511585 1105 {
1106 dump_lattice_value (dump_file, "\n PHI node value: ", new_val);
1107 fprintf (dump_file, "\n\n");
1108 }
1109
bfa30570 1110 /* Make the transition to the new value. */
75a70cf9 1111 if (set_lattice_value (gimple_phi_result (phi), new_val))
41511585 1112 {
1113 if (new_val.lattice_val == VARYING)
1114 return SSA_PROP_VARYING;
1115 else
1116 return SSA_PROP_INTERESTING;
1117 }
1118 else
1119 return SSA_PROP_NOT_INTERESTING;
4ee9c684 1120}
1121
15d138c9 1122/* Return the constant value for OP or OP otherwise. */
00f4f705 1123
1124static tree
15d138c9 1125valueize_op (tree op)
00f4f705 1126{
00f4f705 1127 if (TREE_CODE (op) == SSA_NAME)
1128 {
15d138c9 1129 tree tem = get_constant_value (op);
1130 if (tem)
1131 return tem;
00f4f705 1132 }
1133 return op;
1134}
1135
4e1b3545 1136/* Return the constant value for OP, but signal to not follow SSA
1137 edges if the definition may be simulated again. */
1138
1139static tree
1140valueize_op_1 (tree op)
1141{
1142 if (TREE_CODE (op) == SSA_NAME)
1143 {
4e1b3545 1144 /* If the definition may be simulated again we cannot follow
1145 this SSA edge as the SSA propagator does not necessarily
1146 re-visit the use. */
1147 gimple def_stmt = SSA_NAME_DEF_STMT (op);
1148 if (prop_simulate_again_p (def_stmt))
1149 return NULL_TREE;
bc8fa068 1150 tree tem = get_constant_value (op);
1151 if (tem)
1152 return tem;
4e1b3545 1153 }
1154 return op;
1155}
1156
41511585 1157/* CCP specific front-end to the non-destructive constant folding
1158 routines.
4ee9c684 1159
1160 Attempt to simplify the RHS of STMT knowing that one or more
1161 operands are constants.
1162
1163 If simplification is possible, return the simplified RHS,
75a70cf9 1164 otherwise return the original RHS or NULL_TREE. */
4ee9c684 1165
1166static tree
75a70cf9 1167ccp_fold (gimple stmt)
4ee9c684 1168{
389dd41b 1169 location_t loc = gimple_location (stmt);
75a70cf9 1170 switch (gimple_code (stmt))
88dbf20f 1171 {
75a70cf9 1172 case GIMPLE_COND:
1173 {
1174 /* Handle comparison operators that can appear in GIMPLE form. */
15d138c9 1175 tree op0 = valueize_op (gimple_cond_lhs (stmt));
1176 tree op1 = valueize_op (gimple_cond_rhs (stmt));
75a70cf9 1177 enum tree_code code = gimple_cond_code (stmt);
389dd41b 1178 return fold_binary_loc (loc, code, boolean_type_node, op0, op1);
75a70cf9 1179 }
4ee9c684 1180
75a70cf9 1181 case GIMPLE_SWITCH:
1182 {
15d138c9 1183 /* Return the constant switch index. */
1a91d914 1184 return valueize_op (gimple_switch_index (as_a <gswitch *> (stmt)));
75a70cf9 1185 }
912f109f 1186
1d0b727d 1187 case GIMPLE_ASSIGN:
1188 case GIMPLE_CALL:
4e1b3545 1189 return gimple_fold_stmt_to_constant_1 (stmt,
1190 valueize_op, valueize_op_1);
04236c3a 1191
8782adcf 1192 default:
1d0b727d 1193 gcc_unreachable ();
8782adcf 1194 }
8782adcf 1195}
75a70cf9 1196
b7e55469 1197/* Apply the operation CODE in type TYPE to the value, mask pair
1198 RVAL and RMASK representing a value of type RTYPE and set
1199 the value, mask pair *VAL and *MASK to the result. */
1200
1201static void
1202bit_value_unop_1 (enum tree_code code, tree type,
5de9d3ed 1203 widest_int *val, widest_int *mask,
1204 tree rtype, const widest_int &rval, const widest_int &rmask)
b7e55469 1205{
1206 switch (code)
1207 {
1208 case BIT_NOT_EXPR:
1209 *mask = rmask;
cf8f0e63 1210 *val = ~rval;
b7e55469 1211 break;
1212
1213 case NEGATE_EXPR:
1214 {
5de9d3ed 1215 widest_int temv, temm;
b7e55469 1216 /* Return ~rval + 1. */
1217 bit_value_unop_1 (BIT_NOT_EXPR, type, &temv, &temm, type, rval, rmask);
1218 bit_value_binop_1 (PLUS_EXPR, type, val, mask,
e913b5cd 1219 type, temv, temm, type, 1, 0);
b7e55469 1220 break;
1221 }
1222
1223 CASE_CONVERT:
1224 {
e913b5cd 1225 signop sgn;
b7e55469 1226
1227 /* First extend mask and value according to the original type. */
e913b5cd 1228 sgn = TYPE_SIGN (rtype);
796b6678 1229 *mask = wi::ext (rmask, TYPE_PRECISION (rtype), sgn);
1230 *val = wi::ext (rval, TYPE_PRECISION (rtype), sgn);
b7e55469 1231
1232 /* Then extend mask and value according to the target type. */
e913b5cd 1233 sgn = TYPE_SIGN (type);
796b6678 1234 *mask = wi::ext (*mask, TYPE_PRECISION (type), sgn);
1235 *val = wi::ext (*val, TYPE_PRECISION (type), sgn);
b7e55469 1236 break;
1237 }
1238
1239 default:
e913b5cd 1240 *mask = -1;
b7e55469 1241 break;
1242 }
1243}
1244
1245/* Apply the operation CODE in type TYPE to the value, mask pairs
1246 R1VAL, R1MASK and R2VAL, R2MASK representing a values of type R1TYPE
1247 and R2TYPE and set the value, mask pair *VAL and *MASK to the result. */
1248
1249static void
1250bit_value_binop_1 (enum tree_code code, tree type,
5de9d3ed 1251 widest_int *val, widest_int *mask,
10c3fe8d 1252 tree r1type, const widest_int &r1val,
1253 const widest_int &r1mask, tree r2type,
1254 const widest_int &r2val, const widest_int &r2mask)
b7e55469 1255{
e913b5cd 1256 signop sgn = TYPE_SIGN (type);
1257 int width = TYPE_PRECISION (type);
10c3fe8d 1258 bool swap_p = false;
e913b5cd 1259
1260 /* Assume we'll get a constant result. Use an initial non varying
1261 value, we fall back to varying in the end if necessary. */
1262 *mask = -1;
1263
b7e55469 1264 switch (code)
1265 {
1266 case BIT_AND_EXPR:
1267 /* The mask is constant where there is a known not
1268 set bit, (m1 | m2) & ((v1 | m1) & (v2 | m2)) */
cf8f0e63 1269 *mask = (r1mask | r2mask) & (r1val | r1mask) & (r2val | r2mask);
1270 *val = r1val & r2val;
b7e55469 1271 break;
1272
1273 case BIT_IOR_EXPR:
1274 /* The mask is constant where there is a known
1275 set bit, (m1 | m2) & ~((v1 & ~m1) | (v2 & ~m2)). */
cf8f0e63 1276 *mask = (r1mask | r2mask)
1277 .and_not (r1val.and_not (r1mask) | r2val.and_not (r2mask));
1278 *val = r1val | r2val;
b7e55469 1279 break;
1280
1281 case BIT_XOR_EXPR:
1282 /* m1 | m2 */
cf8f0e63 1283 *mask = r1mask | r2mask;
1284 *val = r1val ^ r2val;
b7e55469 1285 break;
1286
1287 case LROTATE_EXPR:
1288 case RROTATE_EXPR:
796b6678 1289 if (r2mask == 0)
b7e55469 1290 {
28e557ef 1291 widest_int shift = r2val;
796b6678 1292 if (shift == 0)
e913b5cd 1293 {
1294 *mask = r1mask;
1295 *val = r1val;
1296 }
ddb1be65 1297 else
e913b5cd 1298 {
796b6678 1299 if (wi::neg_p (shift))
e913b5cd 1300 {
1301 shift = -shift;
1302 if (code == RROTATE_EXPR)
1303 code = LROTATE_EXPR;
1304 else
1305 code = RROTATE_EXPR;
1306 }
1307 if (code == RROTATE_EXPR)
1308 {
796b6678 1309 *mask = wi::rrotate (r1mask, shift, width);
1310 *val = wi::rrotate (r1val, shift, width);
e913b5cd 1311 }
1312 else
1313 {
796b6678 1314 *mask = wi::lrotate (r1mask, shift, width);
1315 *val = wi::lrotate (r1val, shift, width);
e913b5cd 1316 }
1317 }
b7e55469 1318 }
1319 break;
1320
1321 case LSHIFT_EXPR:
1322 case RSHIFT_EXPR:
1323 /* ??? We can handle partially known shift counts if we know
1324 its sign. That way we can tell that (x << (y | 8)) & 255
1325 is zero. */
796b6678 1326 if (r2mask == 0)
b7e55469 1327 {
28e557ef 1328 widest_int shift = r2val;
796b6678 1329 if (shift == 0)
b7e55469 1330 {
1331 *mask = r1mask;
1332 *val = r1val;
1333 }
ddb1be65 1334 else
e913b5cd 1335 {
796b6678 1336 if (wi::neg_p (shift))
e913b5cd 1337 {
1338 shift = -shift;
1339 if (code == RSHIFT_EXPR)
1340 code = LSHIFT_EXPR;
1341 else
1342 code = RSHIFT_EXPR;
1343 }
1344 if (code == RSHIFT_EXPR)
1345 {
45639915 1346 *mask = wi::rshift (wi::ext (r1mask, width, sgn), shift, sgn);
1347 *val = wi::rshift (wi::ext (r1val, width, sgn), shift, sgn);
e913b5cd 1348 }
1349 else
1350 {
45639915 1351 *mask = wi::ext (wi::lshift (r1mask, shift), width, sgn);
1352 *val = wi::ext (wi::lshift (r1val, shift), width, sgn);
e913b5cd 1353 }
1354 }
b7e55469 1355 }
1356 break;
1357
1358 case PLUS_EXPR:
1359 case POINTER_PLUS_EXPR:
1360 {
b7e55469 1361 /* Do the addition with unknown bits set to zero, to give carry-ins of
1362 zero wherever possible. */
ab2c1de8 1363 widest_int lo = r1val.and_not (r1mask) + r2val.and_not (r2mask);
796b6678 1364 lo = wi::ext (lo, width, sgn);
b7e55469 1365 /* Do the addition with unknown bits set to one, to give carry-ins of
1366 one wherever possible. */
ab2c1de8 1367 widest_int hi = (r1val | r1mask) + (r2val | r2mask);
796b6678 1368 hi = wi::ext (hi, width, sgn);
b7e55469 1369 /* Each bit in the result is known if (a) the corresponding bits in
1370 both inputs are known, and (b) the carry-in to that bit position
1371 is known. We can check condition (b) by seeing if we got the same
1372 result with minimised carries as with maximised carries. */
cf8f0e63 1373 *mask = r1mask | r2mask | (lo ^ hi);
796b6678 1374 *mask = wi::ext (*mask, width, sgn);
b7e55469 1375 /* It shouldn't matter whether we choose lo or hi here. */
1376 *val = lo;
1377 break;
1378 }
1379
1380 case MINUS_EXPR:
1381 {
5de9d3ed 1382 widest_int temv, temm;
b7e55469 1383 bit_value_unop_1 (NEGATE_EXPR, r2type, &temv, &temm,
1384 r2type, r2val, r2mask);
1385 bit_value_binop_1 (PLUS_EXPR, type, val, mask,
1386 r1type, r1val, r1mask,
1387 r2type, temv, temm);
1388 break;
1389 }
1390
1391 case MULT_EXPR:
1392 {
1393 /* Just track trailing zeros in both operands and transfer
1394 them to the other. */
796b6678 1395 int r1tz = wi::ctz (r1val | r1mask);
1396 int r2tz = wi::ctz (r2val | r2mask);
e913b5cd 1397 if (r1tz + r2tz >= width)
b7e55469 1398 {
e913b5cd 1399 *mask = 0;
1400 *val = 0;
b7e55469 1401 }
1402 else if (r1tz + r2tz > 0)
1403 {
5de9d3ed 1404 *mask = wi::ext (wi::mask <widest_int> (r1tz + r2tz, true),
796b6678 1405 width, sgn);
e913b5cd 1406 *val = 0;
b7e55469 1407 }
1408 break;
1409 }
1410
1411 case EQ_EXPR:
1412 case NE_EXPR:
1413 {
5de9d3ed 1414 widest_int m = r1mask | r2mask;
cf8f0e63 1415 if (r1val.and_not (m) != r2val.and_not (m))
b7e55469 1416 {
e913b5cd 1417 *mask = 0;
1418 *val = ((code == EQ_EXPR) ? 0 : 1);
b7e55469 1419 }
1420 else
1421 {
1422 /* We know the result of a comparison is always one or zero. */
e913b5cd 1423 *mask = 1;
1424 *val = 0;
b7e55469 1425 }
1426 break;
1427 }
1428
1429 case GE_EXPR:
1430 case GT_EXPR:
10c3fe8d 1431 swap_p = true;
1432 code = swap_tree_comparison (code);
1433 /* Fall through. */
b7e55469 1434 case LT_EXPR:
1435 case LE_EXPR:
1436 {
1437 int minmax, maxmin;
e913b5cd 1438
10c3fe8d 1439 const widest_int &o1val = swap_p ? r2val : r1val;
1440 const widest_int &o1mask = swap_p ? r2mask : r1mask;
1441 const widest_int &o2val = swap_p ? r1val : r2val;
1442 const widest_int &o2mask = swap_p ? r1mask : r2mask;
1443
b7e55469 1444 /* If the most significant bits are not known we know nothing. */
796b6678 1445 if (wi::neg_p (o1mask) || wi::neg_p (o2mask))
b7e55469 1446 break;
1447
90c0f5b7 1448 /* For comparisons the signedness is in the comparison operands. */
e913b5cd 1449 sgn = TYPE_SIGN (r1type);
90c0f5b7 1450
b7e55469 1451 /* If we know the most significant bits we know the values
1452 value ranges by means of treating varying bits as zero
1453 or one. Do a cross comparison of the max/min pairs. */
796b6678 1454 maxmin = wi::cmp (o1val | o1mask, o2val.and_not (o2mask), sgn);
1455 minmax = wi::cmp (o1val.and_not (o1mask), o2val | o2mask, sgn);
e913b5cd 1456 if (maxmin < 0) /* o1 is less than o2. */
b7e55469 1457 {
e913b5cd 1458 *mask = 0;
1459 *val = 1;
b7e55469 1460 }
e913b5cd 1461 else if (minmax > 0) /* o1 is not less or equal to o2. */
b7e55469 1462 {
e913b5cd 1463 *mask = 0;
1464 *val = 0;
b7e55469 1465 }
e913b5cd 1466 else if (maxmin == minmax) /* o1 and o2 are equal. */
b7e55469 1467 {
1468 /* This probably should never happen as we'd have
1469 folded the thing during fully constant value folding. */
e913b5cd 1470 *mask = 0;
1471 *val = (code == LE_EXPR ? 1 : 0);
b7e55469 1472 }
1473 else
1474 {
1475 /* We know the result of a comparison is always one or zero. */
e913b5cd 1476 *mask = 1;
1477 *val = 0;
b7e55469 1478 }
1479 break;
1480 }
1481
1482 default:;
1483 }
1484}
1485
1486/* Return the propagation value when applying the operation CODE to
1487 the value RHS yielding type TYPE. */
1488
9908fe4d 1489static ccp_prop_value_t
b7e55469 1490bit_value_unop (enum tree_code code, tree type, tree rhs)
1491{
9908fe4d 1492 ccp_prop_value_t rval = get_value_for_expr (rhs, true);
5de9d3ed 1493 widest_int value, mask;
9908fe4d 1494 ccp_prop_value_t val;
c91fedc5 1495
1496 if (rval.lattice_val == UNDEFINED)
1497 return rval;
1498
b7e55469 1499 gcc_assert ((rval.lattice_val == CONSTANT
1500 && TREE_CODE (rval.value) == INTEGER_CST)
796b6678 1501 || rval.mask == -1);
b7e55469 1502 bit_value_unop_1 (code, type, &value, &mask,
e913b5cd 1503 TREE_TYPE (rhs), value_to_wide_int (rval), rval.mask);
796b6678 1504 if (mask != -1)
b7e55469 1505 {
1506 val.lattice_val = CONSTANT;
1507 val.mask = mask;
1508 /* ??? Delay building trees here. */
e913b5cd 1509 val.value = wide_int_to_tree (type, value);
b7e55469 1510 }
1511 else
1512 {
1513 val.lattice_val = VARYING;
1514 val.value = NULL_TREE;
e913b5cd 1515 val.mask = -1;
b7e55469 1516 }
1517 return val;
1518}
1519
1520/* Return the propagation value when applying the operation CODE to
1521 the values RHS1 and RHS2 yielding type TYPE. */
1522
9908fe4d 1523static ccp_prop_value_t
b7e55469 1524bit_value_binop (enum tree_code code, tree type, tree rhs1, tree rhs2)
1525{
9908fe4d 1526 ccp_prop_value_t r1val = get_value_for_expr (rhs1, true);
1527 ccp_prop_value_t r2val = get_value_for_expr (rhs2, true);
5de9d3ed 1528 widest_int value, mask;
9908fe4d 1529 ccp_prop_value_t val;
c91fedc5 1530
1531 if (r1val.lattice_val == UNDEFINED
1532 || r2val.lattice_val == UNDEFINED)
1533 {
1534 val.lattice_val = VARYING;
1535 val.value = NULL_TREE;
e913b5cd 1536 val.mask = -1;
c91fedc5 1537 return val;
1538 }
1539
b7e55469 1540 gcc_assert ((r1val.lattice_val == CONSTANT
1541 && TREE_CODE (r1val.value) == INTEGER_CST)
796b6678 1542 || r1val.mask == -1);
b7e55469 1543 gcc_assert ((r2val.lattice_val == CONSTANT
1544 && TREE_CODE (r2val.value) == INTEGER_CST)
796b6678 1545 || r2val.mask == -1);
b7e55469 1546 bit_value_binop_1 (code, type, &value, &mask,
e913b5cd 1547 TREE_TYPE (rhs1), value_to_wide_int (r1val), r1val.mask,
1548 TREE_TYPE (rhs2), value_to_wide_int (r2val), r2val.mask);
1549 if (mask != -1)
b7e55469 1550 {
1551 val.lattice_val = CONSTANT;
1552 val.mask = mask;
1553 /* ??? Delay building trees here. */
e913b5cd 1554 val.value = wide_int_to_tree (type, value);
b7e55469 1555 }
1556 else
1557 {
1558 val.lattice_val = VARYING;
1559 val.value = NULL_TREE;
e913b5cd 1560 val.mask = -1;
b7e55469 1561 }
1562 return val;
1563}
1564
237e78b1 1565/* Return the propagation value for __builtin_assume_aligned
1566 and functions with assume_aligned or alloc_aligned attribute.
1567 For __builtin_assume_aligned, ATTR is NULL_TREE,
1568 for assume_aligned attribute ATTR is non-NULL and ALLOC_ALIGNED
1569 is false, for alloc_aligned attribute ATTR is non-NULL and
1570 ALLOC_ALIGNED is true. */
fca0886c 1571
9908fe4d 1572static ccp_prop_value_t
1573bit_value_assume_aligned (gimple stmt, tree attr, ccp_prop_value_t ptrval,
237e78b1 1574 bool alloc_aligned)
fca0886c 1575{
237e78b1 1576 tree align, misalign = NULL_TREE, type;
fca0886c 1577 unsigned HOST_WIDE_INT aligni, misaligni = 0;
9908fe4d 1578 ccp_prop_value_t alignval;
5de9d3ed 1579 widest_int value, mask;
9908fe4d 1580 ccp_prop_value_t val;
e913b5cd 1581
237e78b1 1582 if (attr == NULL_TREE)
1583 {
1584 tree ptr = gimple_call_arg (stmt, 0);
1585 type = TREE_TYPE (ptr);
1586 ptrval = get_value_for_expr (ptr, true);
1587 }
1588 else
1589 {
1590 tree lhs = gimple_call_lhs (stmt);
1591 type = TREE_TYPE (lhs);
1592 }
1593
fca0886c 1594 if (ptrval.lattice_val == UNDEFINED)
1595 return ptrval;
1596 gcc_assert ((ptrval.lattice_val == CONSTANT
1597 && TREE_CODE (ptrval.value) == INTEGER_CST)
796b6678 1598 || ptrval.mask == -1);
237e78b1 1599 if (attr == NULL_TREE)
fca0886c 1600 {
237e78b1 1601 /* Get aligni and misaligni from __builtin_assume_aligned. */
1602 align = gimple_call_arg (stmt, 1);
1603 if (!tree_fits_uhwi_p (align))
fca0886c 1604 return ptrval;
237e78b1 1605 aligni = tree_to_uhwi (align);
1606 if (gimple_call_num_args (stmt) > 2)
1607 {
1608 misalign = gimple_call_arg (stmt, 2);
1609 if (!tree_fits_uhwi_p (misalign))
1610 return ptrval;
1611 misaligni = tree_to_uhwi (misalign);
1612 }
1613 }
1614 else
fca0886c 1615 {
237e78b1 1616 /* Get aligni and misaligni from assume_aligned or
1617 alloc_align attributes. */
1618 if (TREE_VALUE (attr) == NULL_TREE)
fca0886c 1619 return ptrval;
237e78b1 1620 attr = TREE_VALUE (attr);
1621 align = TREE_VALUE (attr);
1622 if (!tree_fits_uhwi_p (align))
fca0886c 1623 return ptrval;
237e78b1 1624 aligni = tree_to_uhwi (align);
1625 if (alloc_aligned)
1626 {
1627 if (aligni == 0 || aligni > gimple_call_num_args (stmt))
1628 return ptrval;
1629 align = gimple_call_arg (stmt, aligni - 1);
1630 if (!tree_fits_uhwi_p (align))
1631 return ptrval;
1632 aligni = tree_to_uhwi (align);
1633 }
1634 else if (TREE_CHAIN (attr) && TREE_VALUE (TREE_CHAIN (attr)))
1635 {
1636 misalign = TREE_VALUE (TREE_CHAIN (attr));
1637 if (!tree_fits_uhwi_p (misalign))
1638 return ptrval;
1639 misaligni = tree_to_uhwi (misalign);
1640 }
fca0886c 1641 }
237e78b1 1642 if (aligni <= 1 || (aligni & (aligni - 1)) != 0 || misaligni >= aligni)
1643 return ptrval;
1644
fca0886c 1645 align = build_int_cst_type (type, -aligni);
1646 alignval = get_value_for_expr (align, true);
1647 bit_value_binop_1 (BIT_AND_EXPR, type, &value, &mask,
e913b5cd 1648 type, value_to_wide_int (ptrval), ptrval.mask,
1649 type, value_to_wide_int (alignval), alignval.mask);
796b6678 1650 if (mask != -1)
fca0886c 1651 {
1652 val.lattice_val = CONSTANT;
1653 val.mask = mask;
e913b5cd 1654 gcc_assert ((mask.to_uhwi () & (aligni - 1)) == 0);
1655 gcc_assert ((value.to_uhwi () & (aligni - 1)) == 0);
1656 value |= misaligni;
fca0886c 1657 /* ??? Delay building trees here. */
e913b5cd 1658 val.value = wide_int_to_tree (type, value);
fca0886c 1659 }
1660 else
1661 {
1662 val.lattice_val = VARYING;
1663 val.value = NULL_TREE;
e913b5cd 1664 val.mask = -1;
fca0886c 1665 }
1666 return val;
1667}
1668
75a70cf9 1669/* Evaluate statement STMT.
1670 Valid only for assignments, calls, conditionals, and switches. */
4ee9c684 1671
9908fe4d 1672static ccp_prop_value_t
75a70cf9 1673evaluate_stmt (gimple stmt)
4ee9c684 1674{
9908fe4d 1675 ccp_prop_value_t val;
4f61cce6 1676 tree simplified = NULL_TREE;
88dbf20f 1677 ccp_lattice_t likelyvalue = likely_value (stmt);
b7e55469 1678 bool is_constant = false;
581bf1c2 1679 unsigned int align;
88dbf20f 1680
b7e55469 1681 if (dump_file && (dump_flags & TDF_DETAILS))
1682 {
1683 fprintf (dump_file, "which is likely ");
1684 switch (likelyvalue)
1685 {
1686 case CONSTANT:
1687 fprintf (dump_file, "CONSTANT");
1688 break;
1689 case UNDEFINED:
1690 fprintf (dump_file, "UNDEFINED");
1691 break;
1692 case VARYING:
1693 fprintf (dump_file, "VARYING");
1694 break;
1695 default:;
1696 }
1697 fprintf (dump_file, "\n");
1698 }
add6ee5e 1699
4ee9c684 1700 /* If the statement is likely to have a CONSTANT result, then try
1701 to fold the statement to determine the constant value. */
75a70cf9 1702 /* FIXME. This is the only place that we call ccp_fold.
1703 Since likely_value never returns CONSTANT for calls, we will
1704 not attempt to fold them, including builtins that may profit. */
4ee9c684 1705 if (likelyvalue == CONSTANT)
b7e55469 1706 {
1707 fold_defer_overflow_warnings ();
1708 simplified = ccp_fold (stmt);
1709 is_constant = simplified && is_gimple_min_invariant (simplified);
1710 fold_undefer_overflow_warnings (is_constant, stmt, 0);
1711 if (is_constant)
1712 {
1713 /* The statement produced a constant value. */
1714 val.lattice_val = CONSTANT;
1715 val.value = simplified;
e913b5cd 1716 val.mask = 0;
b7e55469 1717 }
1718 }
4ee9c684 1719 /* If the statement is likely to have a VARYING result, then do not
1720 bother folding the statement. */
04236c3a 1721 else if (likelyvalue == VARYING)
75a70cf9 1722 {
590c3166 1723 enum gimple_code code = gimple_code (stmt);
75a70cf9 1724 if (code == GIMPLE_ASSIGN)
1725 {
1726 enum tree_code subcode = gimple_assign_rhs_code (stmt);
48e1416a 1727
75a70cf9 1728 /* Other cases cannot satisfy is_gimple_min_invariant
1729 without folding. */
1730 if (get_gimple_rhs_class (subcode) == GIMPLE_SINGLE_RHS)
1731 simplified = gimple_assign_rhs1 (stmt);
1732 }
1733 else if (code == GIMPLE_SWITCH)
1a91d914 1734 simplified = gimple_switch_index (as_a <gswitch *> (stmt));
75a70cf9 1735 else
a65c4d64 1736 /* These cannot satisfy is_gimple_min_invariant without folding. */
1737 gcc_assert (code == GIMPLE_CALL || code == GIMPLE_COND);
b7e55469 1738 is_constant = simplified && is_gimple_min_invariant (simplified);
1739 if (is_constant)
1740 {
1741 /* The statement produced a constant value. */
1742 val.lattice_val = CONSTANT;
1743 val.value = simplified;
e913b5cd 1744 val.mask = 0;
b7e55469 1745 }
75a70cf9 1746 }
4ee9c684 1747
b7e55469 1748 /* Resort to simplification for bitwise tracking. */
1749 if (flag_tree_bit_ccp
939514e9 1750 && (likelyvalue == CONSTANT || is_gimple_call (stmt))
b7e55469 1751 && !is_constant)
912f109f 1752 {
b7e55469 1753 enum gimple_code code = gimple_code (stmt);
1754 val.lattice_val = VARYING;
1755 val.value = NULL_TREE;
e913b5cd 1756 val.mask = -1;
b7e55469 1757 if (code == GIMPLE_ASSIGN)
912f109f 1758 {
b7e55469 1759 enum tree_code subcode = gimple_assign_rhs_code (stmt);
1760 tree rhs1 = gimple_assign_rhs1 (stmt);
1761 switch (get_gimple_rhs_class (subcode))
1762 {
1763 case GIMPLE_SINGLE_RHS:
1764 if (INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1765 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1766 val = get_value_for_expr (rhs1, true);
1767 break;
1768
1769 case GIMPLE_UNARY_RHS:
1770 if ((INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1771 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1772 && (INTEGRAL_TYPE_P (gimple_expr_type (stmt))
1773 || POINTER_TYPE_P (gimple_expr_type (stmt))))
1774 val = bit_value_unop (subcode, gimple_expr_type (stmt), rhs1);
1775 break;
1776
1777 case GIMPLE_BINARY_RHS:
1778 if (INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1779 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1780 {
e47d81e0 1781 tree lhs = gimple_assign_lhs (stmt);
b7e55469 1782 tree rhs2 = gimple_assign_rhs2 (stmt);
1783 val = bit_value_binop (subcode,
e47d81e0 1784 TREE_TYPE (lhs), rhs1, rhs2);
b7e55469 1785 }
1786 break;
1787
1788 default:;
1789 }
912f109f 1790 }
b7e55469 1791 else if (code == GIMPLE_COND)
1792 {
1793 enum tree_code code = gimple_cond_code (stmt);
1794 tree rhs1 = gimple_cond_lhs (stmt);
1795 tree rhs2 = gimple_cond_rhs (stmt);
1796 if (INTEGRAL_TYPE_P (TREE_TYPE (rhs1))
1797 || POINTER_TYPE_P (TREE_TYPE (rhs1)))
1798 val = bit_value_binop (code, TREE_TYPE (rhs1), rhs1, rhs2);
1799 }
0b4f0116 1800 else if (gimple_call_builtin_p (stmt, BUILT_IN_NORMAL))
153c3b50 1801 {
0b4f0116 1802 tree fndecl = gimple_call_fndecl (stmt);
153c3b50 1803 switch (DECL_FUNCTION_CODE (fndecl))
1804 {
1805 case BUILT_IN_MALLOC:
1806 case BUILT_IN_REALLOC:
1807 case BUILT_IN_CALLOC:
939514e9 1808 case BUILT_IN_STRDUP:
1809 case BUILT_IN_STRNDUP:
153c3b50 1810 val.lattice_val = CONSTANT;
1811 val.value = build_int_cst (TREE_TYPE (gimple_get_lhs (stmt)), 0);
796b6678 1812 val.mask = ~((HOST_WIDE_INT) MALLOC_ABI_ALIGNMENT
1813 / BITS_PER_UNIT - 1);
153c3b50 1814 break;
1815
1816 case BUILT_IN_ALLOCA:
581bf1c2 1817 case BUILT_IN_ALLOCA_WITH_ALIGN:
1818 align = (DECL_FUNCTION_CODE (fndecl) == BUILT_IN_ALLOCA_WITH_ALIGN
f9ae6f95 1819 ? TREE_INT_CST_LOW (gimple_call_arg (stmt, 1))
581bf1c2 1820 : BIGGEST_ALIGNMENT);
153c3b50 1821 val.lattice_val = CONSTANT;
1822 val.value = build_int_cst (TREE_TYPE (gimple_get_lhs (stmt)), 0);
796b6678 1823 val.mask = ~((HOST_WIDE_INT) align / BITS_PER_UNIT - 1);
153c3b50 1824 break;
1825
939514e9 1826 /* These builtins return their first argument, unmodified. */
1827 case BUILT_IN_MEMCPY:
1828 case BUILT_IN_MEMMOVE:
1829 case BUILT_IN_MEMSET:
1830 case BUILT_IN_STRCPY:
1831 case BUILT_IN_STRNCPY:
1832 case BUILT_IN_MEMCPY_CHK:
1833 case BUILT_IN_MEMMOVE_CHK:
1834 case BUILT_IN_MEMSET_CHK:
1835 case BUILT_IN_STRCPY_CHK:
1836 case BUILT_IN_STRNCPY_CHK:
1837 val = get_value_for_expr (gimple_call_arg (stmt, 0), true);
1838 break;
1839
fca0886c 1840 case BUILT_IN_ASSUME_ALIGNED:
237e78b1 1841 val = bit_value_assume_aligned (stmt, NULL_TREE, val, false);
fca0886c 1842 break;
1843
060fc206 1844 case BUILT_IN_ALIGNED_ALLOC:
1845 {
1846 tree align = get_constant_value (gimple_call_arg (stmt, 0));
1847 if (align
1848 && tree_fits_uhwi_p (align))
1849 {
1850 unsigned HOST_WIDE_INT aligni = tree_to_uhwi (align);
1851 if (aligni > 1
1852 /* align must be power-of-two */
1853 && (aligni & (aligni - 1)) == 0)
1854 {
1855 val.lattice_val = CONSTANT;
1856 val.value = build_int_cst (ptr_type_node, 0);
cd89b631 1857 val.mask = -aligni;
060fc206 1858 }
1859 }
1860 break;
1861 }
1862
153c3b50 1863 default:;
1864 }
1865 }
237e78b1 1866 if (is_gimple_call (stmt) && gimple_call_lhs (stmt))
1867 {
1868 tree fntype = gimple_call_fntype (stmt);
1869 if (fntype)
1870 {
1871 tree attrs = lookup_attribute ("assume_aligned",
1872 TYPE_ATTRIBUTES (fntype));
1873 if (attrs)
1874 val = bit_value_assume_aligned (stmt, attrs, val, false);
1875 attrs = lookup_attribute ("alloc_align",
1876 TYPE_ATTRIBUTES (fntype));
1877 if (attrs)
1878 val = bit_value_assume_aligned (stmt, attrs, val, true);
1879 }
1880 }
b7e55469 1881 is_constant = (val.lattice_val == CONSTANT);
912f109f 1882 }
1883
fc08b993 1884 if (flag_tree_bit_ccp
1885 && ((is_constant && TREE_CODE (val.value) == INTEGER_CST)
1886 || (!is_constant && likelyvalue != UNDEFINED))
1887 && gimple_get_lhs (stmt)
1888 && TREE_CODE (gimple_get_lhs (stmt)) == SSA_NAME)
1889 {
1890 tree lhs = gimple_get_lhs (stmt);
9c1be15e 1891 wide_int nonzero_bits = get_nonzero_bits (lhs);
1892 if (nonzero_bits != -1)
fc08b993 1893 {
1894 if (!is_constant)
1895 {
1896 val.lattice_val = CONSTANT;
1897 val.value = build_zero_cst (TREE_TYPE (lhs));
9c1be15e 1898 val.mask = extend_mask (nonzero_bits);
fc08b993 1899 is_constant = true;
1900 }
1901 else
1902 {
9c1be15e 1903 if (wi::bit_and_not (val.value, nonzero_bits) != 0)
aeb682a2 1904 val.value = wide_int_to_tree (TREE_TYPE (lhs),
9c1be15e 1905 nonzero_bits & val.value);
aeb682a2 1906 if (nonzero_bits == 0)
1907 val.mask = 0;
fc08b993 1908 else
09b2913a 1909 val.mask = val.mask & extend_mask (nonzero_bits);
fc08b993 1910 }
1911 }
1912 }
1913
b7e55469 1914 if (!is_constant)
4ee9c684 1915 {
1916 /* The statement produced a nonconstant value. If the statement
88dbf20f 1917 had UNDEFINED operands, then the result of the statement
1918 should be UNDEFINED. Otherwise, the statement is VARYING. */
bfa30570 1919 if (likelyvalue == UNDEFINED)
b7e55469 1920 {
1921 val.lattice_val = likelyvalue;
e913b5cd 1922 val.mask = 0;
b7e55469 1923 }
b765fa12 1924 else
b7e55469 1925 {
1926 val.lattice_val = VARYING;
e913b5cd 1927 val.mask = -1;
b7e55469 1928 }
b765fa12 1929
88dbf20f 1930 val.value = NULL_TREE;
4ee9c684 1931 }
41511585 1932
1933 return val;
4ee9c684 1934}
1935
c1f445d2 1936typedef hash_table<pointer_hash<gimple_statement_base> > gimple_htab;
2b15d2ba 1937
582a80ed 1938/* Given a BUILT_IN_STACK_SAVE value SAVED_VAL, insert a clobber of VAR before
1939 each matching BUILT_IN_STACK_RESTORE. Mark visited phis in VISITED. */
1940
1941static void
2b15d2ba 1942insert_clobber_before_stack_restore (tree saved_val, tree var,
c1f445d2 1943 gimple_htab **visited)
582a80ed 1944{
1a91d914 1945 gimple stmt;
1946 gassign *clobber_stmt;
582a80ed 1947 tree clobber;
1948 imm_use_iterator iter;
1949 gimple_stmt_iterator i;
1950 gimple *slot;
1951
1952 FOR_EACH_IMM_USE_STMT (stmt, iter, saved_val)
1953 if (gimple_call_builtin_p (stmt, BUILT_IN_STACK_RESTORE))
1954 {
f1f41a6c 1955 clobber = build_constructor (TREE_TYPE (var),
1956 NULL);
582a80ed 1957 TREE_THIS_VOLATILE (clobber) = 1;
1958 clobber_stmt = gimple_build_assign (var, clobber);
1959
1960 i = gsi_for_stmt (stmt);
1961 gsi_insert_before (&i, clobber_stmt, GSI_SAME_STMT);
1962 }
1963 else if (gimple_code (stmt) == GIMPLE_PHI)
1964 {
c1f445d2 1965 if (!*visited)
1966 *visited = new gimple_htab (10);
582a80ed 1967
c1f445d2 1968 slot = (*visited)->find_slot (stmt, INSERT);
582a80ed 1969 if (*slot != NULL)
1970 continue;
1971
1972 *slot = stmt;
1973 insert_clobber_before_stack_restore (gimple_phi_result (stmt), var,
1974 visited);
1975 }
42eed683 1976 else if (gimple_assign_ssa_name_copy_p (stmt))
1977 insert_clobber_before_stack_restore (gimple_assign_lhs (stmt), var,
1978 visited);
058a1b7a 1979 else if (chkp_gimple_call_builtin_p (stmt, BUILT_IN_CHKP_BNDRET))
1980 continue;
582a80ed 1981 else
1982 gcc_assert (is_gimple_debug (stmt));
1983}
1984
1985/* Advance the iterator to the previous non-debug gimple statement in the same
1986 or dominating basic block. */
1987
1988static inline void
1989gsi_prev_dom_bb_nondebug (gimple_stmt_iterator *i)
1990{
1991 basic_block dom;
1992
1993 gsi_prev_nondebug (i);
1994 while (gsi_end_p (*i))
1995 {
1996 dom = get_immediate_dominator (CDI_DOMINATORS, i->bb);
34154e27 1997 if (dom == NULL || dom == ENTRY_BLOCK_PTR_FOR_FN (cfun))
582a80ed 1998 return;
1999
2000 *i = gsi_last_bb (dom);
2001 }
2002}
2003
2004/* Find a BUILT_IN_STACK_SAVE dominating gsi_stmt (I), and insert
1543f720 2005 a clobber of VAR before each matching BUILT_IN_STACK_RESTORE.
2006
2007 It is possible that BUILT_IN_STACK_SAVE cannot be find in a dominator when a
2008 previous pass (such as DOM) duplicated it along multiple paths to a BB. In
2009 that case the function gives up without inserting the clobbers. */
582a80ed 2010
2011static void
2012insert_clobbers_for_var (gimple_stmt_iterator i, tree var)
2013{
582a80ed 2014 gimple stmt;
2015 tree saved_val;
c1f445d2 2016 gimple_htab *visited = NULL;
582a80ed 2017
1543f720 2018 for (; !gsi_end_p (i); gsi_prev_dom_bb_nondebug (&i))
582a80ed 2019 {
2020 stmt = gsi_stmt (i);
2021
2022 if (!gimple_call_builtin_p (stmt, BUILT_IN_STACK_SAVE))
2023 continue;
582a80ed 2024
2025 saved_val = gimple_call_lhs (stmt);
2026 if (saved_val == NULL_TREE)
2027 continue;
2028
2029 insert_clobber_before_stack_restore (saved_val, var, &visited);
2030 break;
2031 }
2032
c1f445d2 2033 delete visited;
582a80ed 2034}
2035
581bf1c2 2036/* Detects a __builtin_alloca_with_align with constant size argument. Declares
2037 fixed-size array and returns the address, if found, otherwise returns
2038 NULL_TREE. */
9a65cc0a 2039
2040static tree
581bf1c2 2041fold_builtin_alloca_with_align (gimple stmt)
9a65cc0a 2042{
2043 unsigned HOST_WIDE_INT size, threshold, n_elem;
2044 tree lhs, arg, block, var, elem_type, array_type;
9a65cc0a 2045
2046 /* Get lhs. */
2047 lhs = gimple_call_lhs (stmt);
2048 if (lhs == NULL_TREE)
2049 return NULL_TREE;
2050
2051 /* Detect constant argument. */
2052 arg = get_constant_value (gimple_call_arg (stmt, 0));
6e93d308 2053 if (arg == NULL_TREE
2054 || TREE_CODE (arg) != INTEGER_CST
e913b5cd 2055 || !tree_fits_uhwi_p (arg))
9a65cc0a 2056 return NULL_TREE;
6e93d308 2057
8c53c46c 2058 size = tree_to_uhwi (arg);
9a65cc0a 2059
581bf1c2 2060 /* Heuristic: don't fold large allocas. */
9a65cc0a 2061 threshold = (unsigned HOST_WIDE_INT)PARAM_VALUE (PARAM_LARGE_STACK_FRAME);
581bf1c2 2062 /* In case the alloca is located at function entry, it has the same lifetime
2063 as a declared array, so we allow a larger size. */
9a65cc0a 2064 block = gimple_block (stmt);
2065 if (!(cfun->after_inlining
2066 && TREE_CODE (BLOCK_SUPERCONTEXT (block)) == FUNCTION_DECL))
2067 threshold /= 10;
2068 if (size > threshold)
2069 return NULL_TREE;
2070
2071 /* Declare array. */
2072 elem_type = build_nonstandard_integer_type (BITS_PER_UNIT, 1);
2073 n_elem = size * 8 / BITS_PER_UNIT;
9a65cc0a 2074 array_type = build_array_type_nelts (elem_type, n_elem);
f9e245b2 2075 var = create_tmp_var (array_type);
f9ae6f95 2076 DECL_ALIGN (var) = TREE_INT_CST_LOW (gimple_call_arg (stmt, 1));
3d4a0a4b 2077 {
2078 struct ptr_info_def *pi = SSA_NAME_PTR_INFO (lhs);
2079 if (pi != NULL && !pi->pt.anything)
2080 {
2081 bool singleton_p;
2082 unsigned uid;
2083 singleton_p = pt_solution_singleton_p (&pi->pt, &uid);
2084 gcc_assert (singleton_p);
2085 SET_DECL_PT_UID (var, uid);
2086 }
2087 }
9a65cc0a 2088
2089 /* Fold alloca to the address of the array. */
2090 return fold_convert (TREE_TYPE (lhs), build_fold_addr_expr (var));
2091}
2092
6688f8ec 2093/* Fold the stmt at *GSI with CCP specific information that propagating
2094 and regular folding does not catch. */
2095
2096static bool
2097ccp_fold_stmt (gimple_stmt_iterator *gsi)
2098{
2099 gimple stmt = gsi_stmt (*gsi);
6688f8ec 2100
94144e68 2101 switch (gimple_code (stmt))
2102 {
2103 case GIMPLE_COND:
2104 {
1a91d914 2105 gcond *cond_stmt = as_a <gcond *> (stmt);
9908fe4d 2106 ccp_prop_value_t val;
94144e68 2107 /* Statement evaluation will handle type mismatches in constants
2108 more gracefully than the final propagation. This allows us to
2109 fold more conditionals here. */
2110 val = evaluate_stmt (stmt);
2111 if (val.lattice_val != CONSTANT
796b6678 2112 || val.mask != 0)
94144e68 2113 return false;
2114
b7e55469 2115 if (dump_file)
2116 {
2117 fprintf (dump_file, "Folding predicate ");
2118 print_gimple_expr (dump_file, stmt, 0, 0);
2119 fprintf (dump_file, " to ");
2120 print_generic_expr (dump_file, val.value, 0);
2121 fprintf (dump_file, "\n");
2122 }
2123
94144e68 2124 if (integer_zerop (val.value))
1a91d914 2125 gimple_cond_make_false (cond_stmt);
94144e68 2126 else
1a91d914 2127 gimple_cond_make_true (cond_stmt);
6688f8ec 2128
94144e68 2129 return true;
2130 }
6688f8ec 2131
94144e68 2132 case GIMPLE_CALL:
2133 {
2134 tree lhs = gimple_call_lhs (stmt);
3064bb7b 2135 int flags = gimple_call_flags (stmt);
15d138c9 2136 tree val;
94144e68 2137 tree argt;
2138 bool changed = false;
2139 unsigned i;
2140
2141 /* If the call was folded into a constant make sure it goes
2142 away even if we cannot propagate into all uses because of
2143 type issues. */
2144 if (lhs
2145 && TREE_CODE (lhs) == SSA_NAME
3064bb7b 2146 && (val = get_constant_value (lhs))
2147 /* Don't optimize away calls that have side-effects. */
2148 && (flags & (ECF_CONST|ECF_PURE)) != 0
2149 && (flags & ECF_LOOPING_CONST_OR_PURE) == 0)
94144e68 2150 {
15d138c9 2151 tree new_rhs = unshare_expr (val);
338cce8f 2152 bool res;
94144e68 2153 if (!useless_type_conversion_p (TREE_TYPE (lhs),
2154 TREE_TYPE (new_rhs)))
2155 new_rhs = fold_convert (TREE_TYPE (lhs), new_rhs);
338cce8f 2156 res = update_call_from_tree (gsi, new_rhs);
2157 gcc_assert (res);
94144e68 2158 return true;
2159 }
2160
fb049fba 2161 /* Internal calls provide no argument types, so the extra laxity
2162 for normal calls does not apply. */
2163 if (gimple_call_internal_p (stmt))
2164 return false;
2165
581bf1c2 2166 /* The heuristic of fold_builtin_alloca_with_align differs before and
2167 after inlining, so we don't require the arg to be changed into a
2168 constant for folding, but just to be constant. */
2169 if (gimple_call_builtin_p (stmt, BUILT_IN_ALLOCA_WITH_ALIGN))
9a65cc0a 2170 {
581bf1c2 2171 tree new_rhs = fold_builtin_alloca_with_align (stmt);
6e93d308 2172 if (new_rhs)
2173 {
2174 bool res = update_call_from_tree (gsi, new_rhs);
582a80ed 2175 tree var = TREE_OPERAND (TREE_OPERAND (new_rhs, 0),0);
6e93d308 2176 gcc_assert (res);
582a80ed 2177 insert_clobbers_for_var (*gsi, var);
6e93d308 2178 return true;
2179 }
9a65cc0a 2180 }
2181
94144e68 2182 /* Propagate into the call arguments. Compared to replace_uses_in
2183 this can use the argument slot types for type verification
2184 instead of the current argument type. We also can safely
2185 drop qualifiers here as we are dealing with constants anyway. */
2de00a2d 2186 argt = TYPE_ARG_TYPES (gimple_call_fntype (stmt));
94144e68 2187 for (i = 0; i < gimple_call_num_args (stmt) && argt;
2188 ++i, argt = TREE_CHAIN (argt))
2189 {
2190 tree arg = gimple_call_arg (stmt, i);
2191 if (TREE_CODE (arg) == SSA_NAME
15d138c9 2192 && (val = get_constant_value (arg))
94144e68 2193 && useless_type_conversion_p
2194 (TYPE_MAIN_VARIANT (TREE_VALUE (argt)),
15d138c9 2195 TYPE_MAIN_VARIANT (TREE_TYPE (val))))
94144e68 2196 {
15d138c9 2197 gimple_call_set_arg (stmt, i, unshare_expr (val));
94144e68 2198 changed = true;
2199 }
2200 }
e16f4c39 2201
94144e68 2202 return changed;
2203 }
6688f8ec 2204
6872bf3c 2205 case GIMPLE_ASSIGN:
2206 {
2207 tree lhs = gimple_assign_lhs (stmt);
15d138c9 2208 tree val;
6872bf3c 2209
2210 /* If we have a load that turned out to be constant replace it
2211 as we cannot propagate into all uses in all cases. */
2212 if (gimple_assign_single_p (stmt)
2213 && TREE_CODE (lhs) == SSA_NAME
15d138c9 2214 && (val = get_constant_value (lhs)))
6872bf3c 2215 {
15d138c9 2216 tree rhs = unshare_expr (val);
6872bf3c 2217 if (!useless_type_conversion_p (TREE_TYPE (lhs), TREE_TYPE (rhs)))
182cf5a9 2218 rhs = fold_build1 (VIEW_CONVERT_EXPR, TREE_TYPE (lhs), rhs);
6872bf3c 2219 gimple_assign_set_rhs_from_tree (gsi, rhs);
2220 return true;
2221 }
2222
2223 return false;
2224 }
2225
94144e68 2226 default:
2227 return false;
2228 }
6688f8ec 2229}
2230
41511585 2231/* Visit the assignment statement STMT. Set the value of its LHS to the
88dbf20f 2232 value computed by the RHS and store LHS in *OUTPUT_P. If STMT
2233 creates virtual definitions, set the value of each new name to that
75a70cf9 2234 of the RHS (if we can derive a constant out of the RHS).
2235 Value-returning call statements also perform an assignment, and
2236 are handled here. */
4ee9c684 2237
41511585 2238static enum ssa_prop_result
75a70cf9 2239visit_assignment (gimple stmt, tree *output_p)
4ee9c684 2240{
9908fe4d 2241 ccp_prop_value_t val;
88dbf20f 2242 enum ssa_prop_result retval;
4ee9c684 2243
75a70cf9 2244 tree lhs = gimple_get_lhs (stmt);
4ee9c684 2245
75a70cf9 2246 gcc_assert (gimple_code (stmt) != GIMPLE_CALL
2247 || gimple_call_lhs (stmt) != NULL_TREE);
2248
15d138c9 2249 if (gimple_assign_single_p (stmt)
2250 && gimple_assign_rhs_code (stmt) == SSA_NAME)
2251 /* For a simple copy operation, we copy the lattice values. */
2252 val = *get_value (gimple_assign_rhs1 (stmt));
41511585 2253 else
75a70cf9 2254 /* Evaluate the statement, which could be
2255 either a GIMPLE_ASSIGN or a GIMPLE_CALL. */
04236c3a 2256 val = evaluate_stmt (stmt);
4ee9c684 2257
88dbf20f 2258 retval = SSA_PROP_NOT_INTERESTING;
4ee9c684 2259
41511585 2260 /* Set the lattice value of the statement's output. */
88dbf20f 2261 if (TREE_CODE (lhs) == SSA_NAME)
4ee9c684 2262 {
88dbf20f 2263 /* If STMT is an assignment to an SSA_NAME, we only have one
2264 value to set. */
2265 if (set_lattice_value (lhs, val))
2266 {
2267 *output_p = lhs;
2268 if (val.lattice_val == VARYING)
2269 retval = SSA_PROP_VARYING;
2270 else
2271 retval = SSA_PROP_INTERESTING;
2272 }
4ee9c684 2273 }
88dbf20f 2274
2275 return retval;
4ee9c684 2276}
2277
4ee9c684 2278
41511585 2279/* Visit the conditional statement STMT. Return SSA_PROP_INTERESTING
2280 if it can determine which edge will be taken. Otherwise, return
2281 SSA_PROP_VARYING. */
2282
2283static enum ssa_prop_result
75a70cf9 2284visit_cond_stmt (gimple stmt, edge *taken_edge_p)
4ee9c684 2285{
9908fe4d 2286 ccp_prop_value_t val;
41511585 2287 basic_block block;
2288
75a70cf9 2289 block = gimple_bb (stmt);
41511585 2290 val = evaluate_stmt (stmt);
b7e55469 2291 if (val.lattice_val != CONSTANT
796b6678 2292 || val.mask != 0)
b7e55469 2293 return SSA_PROP_VARYING;
41511585 2294
2295 /* Find which edge out of the conditional block will be taken and add it
2296 to the worklist. If no single edge can be determined statically,
2297 return SSA_PROP_VARYING to feed all the outgoing edges to the
2298 propagation engine. */
b7e55469 2299 *taken_edge_p = find_taken_edge (block, val.value);
41511585 2300 if (*taken_edge_p)
2301 return SSA_PROP_INTERESTING;
2302 else
2303 return SSA_PROP_VARYING;
4ee9c684 2304}
2305
4ee9c684 2306
41511585 2307/* Evaluate statement STMT. If the statement produces an output value and
2308 its evaluation changes the lattice value of its output, return
2309 SSA_PROP_INTERESTING and set *OUTPUT_P to the SSA_NAME holding the
2310 output value.
48e1416a 2311
41511585 2312 If STMT is a conditional branch and we can determine its truth
2313 value, set *TAKEN_EDGE_P accordingly. If STMT produces a varying
2314 value, return SSA_PROP_VARYING. */
4ee9c684 2315
41511585 2316static enum ssa_prop_result
75a70cf9 2317ccp_visit_stmt (gimple stmt, edge *taken_edge_p, tree *output_p)
41511585 2318{
41511585 2319 tree def;
2320 ssa_op_iter iter;
4ee9c684 2321
41511585 2322 if (dump_file && (dump_flags & TDF_DETAILS))
4ee9c684 2323 {
88dbf20f 2324 fprintf (dump_file, "\nVisiting statement:\n");
75a70cf9 2325 print_gimple_stmt (dump_file, stmt, 0, dump_flags);
4ee9c684 2326 }
4ee9c684 2327
75a70cf9 2328 switch (gimple_code (stmt))
4ee9c684 2329 {
75a70cf9 2330 case GIMPLE_ASSIGN:
2331 /* If the statement is an assignment that produces a single
2332 output value, evaluate its RHS to see if the lattice value of
2333 its output has changed. */
2334 return visit_assignment (stmt, output_p);
2335
2336 case GIMPLE_CALL:
2337 /* A value-returning call also performs an assignment. */
2338 if (gimple_call_lhs (stmt) != NULL_TREE)
2339 return visit_assignment (stmt, output_p);
2340 break;
2341
2342 case GIMPLE_COND:
2343 case GIMPLE_SWITCH:
2344 /* If STMT is a conditional branch, see if we can determine
2345 which branch will be taken. */
2346 /* FIXME. It appears that we should be able to optimize
2347 computed GOTOs here as well. */
2348 return visit_cond_stmt (stmt, taken_edge_p);
2349
2350 default:
2351 break;
4ee9c684 2352 }
4ee9c684 2353
41511585 2354 /* Any other kind of statement is not interesting for constant
2355 propagation and, therefore, not worth simulating. */
41511585 2356 if (dump_file && (dump_flags & TDF_DETAILS))
2357 fprintf (dump_file, "No interesting values produced. Marked VARYING.\n");
4ee9c684 2358
41511585 2359 /* Definitions made by statements other than assignments to
2360 SSA_NAMEs represent unknown modifications to their outputs.
2361 Mark them VARYING. */
88dbf20f 2362 FOR_EACH_SSA_TREE_OPERAND (def, stmt, iter, SSA_OP_ALL_DEFS)
2363 {
9908fe4d 2364 ccp_prop_value_t v = { VARYING, NULL_TREE, -1 };
88dbf20f 2365 set_lattice_value (def, v);
2366 }
4ee9c684 2367
41511585 2368 return SSA_PROP_VARYING;
2369}
4ee9c684 2370
4ee9c684 2371
88dbf20f 2372/* Main entry point for SSA Conditional Constant Propagation. */
41511585 2373
33a34f1e 2374static unsigned int
61207d43 2375do_ssa_ccp (void)
41511585 2376{
582a80ed 2377 unsigned int todo = 0;
2378 calculate_dominance_info (CDI_DOMINATORS);
41511585 2379 ccp_initialize ();
2380 ssa_propagate (ccp_visit_stmt, ccp_visit_phi_node);
33a34f1e 2381 if (ccp_finalize ())
560965e9 2382 todo = (TODO_cleanup_cfg | TODO_update_ssa);
582a80ed 2383 free_dominance_info (CDI_DOMINATORS);
2384 return todo;
4ee9c684 2385}
2386
5664499b 2387
cbe8bda8 2388namespace {
2389
2390const pass_data pass_data_ccp =
41511585 2391{
cbe8bda8 2392 GIMPLE_PASS, /* type */
2393 "ccp", /* name */
2394 OPTGROUP_NONE, /* optinfo_flags */
cbe8bda8 2395 TV_TREE_CCP, /* tv_id */
2396 ( PROP_cfg | PROP_ssa ), /* properties_required */
2397 0, /* properties_provided */
2398 0, /* properties_destroyed */
2399 0, /* todo_flags_start */
8b88439e 2400 TODO_update_address_taken, /* todo_flags_finish */
41511585 2401};
4ee9c684 2402
cbe8bda8 2403class pass_ccp : public gimple_opt_pass
2404{
2405public:
9af5ce0c 2406 pass_ccp (gcc::context *ctxt)
2407 : gimple_opt_pass (pass_data_ccp, ctxt)
cbe8bda8 2408 {}
2409
2410 /* opt_pass methods: */
ae84f584 2411 opt_pass * clone () { return new pass_ccp (m_ctxt); }
31315c24 2412 virtual bool gate (function *) { return flag_tree_ccp != 0; }
65b0537f 2413 virtual unsigned int execute (function *) { return do_ssa_ccp (); }
cbe8bda8 2414
2415}; // class pass_ccp
2416
2417} // anon namespace
2418
2419gimple_opt_pass *
2420make_pass_ccp (gcc::context *ctxt)
2421{
2422 return new pass_ccp (ctxt);
2423}
2424
4ee9c684 2425
75a70cf9 2426
bdd0e199 2427/* Try to optimize out __builtin_stack_restore. Optimize it out
2428 if there is another __builtin_stack_restore in the same basic
2429 block and no calls or ASM_EXPRs are in between, or if this block's
2430 only outgoing edge is to EXIT_BLOCK and there are no calls or
2431 ASM_EXPRs after this __builtin_stack_restore. */
2432
2433static tree
75a70cf9 2434optimize_stack_restore (gimple_stmt_iterator i)
bdd0e199 2435{
6ea999da 2436 tree callee;
2437 gimple stmt;
75a70cf9 2438
2439 basic_block bb = gsi_bb (i);
2440 gimple call = gsi_stmt (i);
bdd0e199 2441
75a70cf9 2442 if (gimple_code (call) != GIMPLE_CALL
2443 || gimple_call_num_args (call) != 1
2444 || TREE_CODE (gimple_call_arg (call, 0)) != SSA_NAME
2445 || !POINTER_TYPE_P (TREE_TYPE (gimple_call_arg (call, 0))))
bdd0e199 2446 return NULL_TREE;
2447
75a70cf9 2448 for (gsi_next (&i); !gsi_end_p (i); gsi_next (&i))
bdd0e199 2449 {
75a70cf9 2450 stmt = gsi_stmt (i);
2451 if (gimple_code (stmt) == GIMPLE_ASM)
bdd0e199 2452 return NULL_TREE;
75a70cf9 2453 if (gimple_code (stmt) != GIMPLE_CALL)
bdd0e199 2454 continue;
2455
75a70cf9 2456 callee = gimple_call_fndecl (stmt);
c40a6f90 2457 if (!callee
2458 || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL
2459 /* All regular builtins are ok, just obviously not alloca. */
581bf1c2 2460 || DECL_FUNCTION_CODE (callee) == BUILT_IN_ALLOCA
2461 || DECL_FUNCTION_CODE (callee) == BUILT_IN_ALLOCA_WITH_ALIGN)
bdd0e199 2462 return NULL_TREE;
2463
2464 if (DECL_FUNCTION_CODE (callee) == BUILT_IN_STACK_RESTORE)
6ea999da 2465 goto second_stack_restore;
bdd0e199 2466 }
2467
6ea999da 2468 if (!gsi_end_p (i))
bdd0e199 2469 return NULL_TREE;
2470
6ea999da 2471 /* Allow one successor of the exit block, or zero successors. */
2472 switch (EDGE_COUNT (bb->succs))
2473 {
2474 case 0:
2475 break;
2476 case 1:
34154e27 2477 if (single_succ_edge (bb)->dest != EXIT_BLOCK_PTR_FOR_FN (cfun))
6ea999da 2478 return NULL_TREE;
2479 break;
2480 default:
2481 return NULL_TREE;
2482 }
2483 second_stack_restore:
bdd0e199 2484
6ea999da 2485 /* If there's exactly one use, then zap the call to __builtin_stack_save.
2486 If there are multiple uses, then the last one should remove the call.
2487 In any case, whether the call to __builtin_stack_save can be removed
2488 or not is irrelevant to removing the call to __builtin_stack_restore. */
2489 if (has_single_use (gimple_call_arg (call, 0)))
2490 {
2491 gimple stack_save = SSA_NAME_DEF_STMT (gimple_call_arg (call, 0));
2492 if (is_gimple_call (stack_save))
2493 {
2494 callee = gimple_call_fndecl (stack_save);
2495 if (callee
2496 && DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL
2497 && DECL_FUNCTION_CODE (callee) == BUILT_IN_STACK_SAVE)
2498 {
2499 gimple_stmt_iterator stack_save_gsi;
2500 tree rhs;
bdd0e199 2501
6ea999da 2502 stack_save_gsi = gsi_for_stmt (stack_save);
2503 rhs = build_int_cst (TREE_TYPE (gimple_call_arg (call, 0)), 0);
2504 update_call_from_tree (&stack_save_gsi, rhs);
2505 }
2506 }
2507 }
bdd0e199 2508
75a70cf9 2509 /* No effect, so the statement will be deleted. */
bdd0e199 2510 return integer_zero_node;
2511}
75a70cf9 2512
8a58ed0a 2513/* If va_list type is a simple pointer and nothing special is needed,
2514 optimize __builtin_va_start (&ap, 0) into ap = __builtin_next_arg (0),
2515 __builtin_va_end (&ap) out as NOP and __builtin_va_copy into a simple
2516 pointer assignment. */
2517
2518static tree
75a70cf9 2519optimize_stdarg_builtin (gimple call)
8a58ed0a 2520{
5f57a8b1 2521 tree callee, lhs, rhs, cfun_va_list;
8a58ed0a 2522 bool va_list_simple_ptr;
389dd41b 2523 location_t loc = gimple_location (call);
8a58ed0a 2524
75a70cf9 2525 if (gimple_code (call) != GIMPLE_CALL)
8a58ed0a 2526 return NULL_TREE;
2527
75a70cf9 2528 callee = gimple_call_fndecl (call);
5f57a8b1 2529
2530 cfun_va_list = targetm.fn_abi_va_list (callee);
2531 va_list_simple_ptr = POINTER_TYPE_P (cfun_va_list)
2532 && (TREE_TYPE (cfun_va_list) == void_type_node
2533 || TREE_TYPE (cfun_va_list) == char_type_node);
2534
8a58ed0a 2535 switch (DECL_FUNCTION_CODE (callee))
2536 {
2537 case BUILT_IN_VA_START:
2538 if (!va_list_simple_ptr
2539 || targetm.expand_builtin_va_start != NULL
e7ed5dd7 2540 || !builtin_decl_explicit_p (BUILT_IN_NEXT_ARG))
8a58ed0a 2541 return NULL_TREE;
2542
75a70cf9 2543 if (gimple_call_num_args (call) != 2)
8a58ed0a 2544 return NULL_TREE;
2545
75a70cf9 2546 lhs = gimple_call_arg (call, 0);
8a58ed0a 2547 if (!POINTER_TYPE_P (TREE_TYPE (lhs))
2548 || TYPE_MAIN_VARIANT (TREE_TYPE (TREE_TYPE (lhs)))
5f57a8b1 2549 != TYPE_MAIN_VARIANT (cfun_va_list))
8a58ed0a 2550 return NULL_TREE;
48e1416a 2551
389dd41b 2552 lhs = build_fold_indirect_ref_loc (loc, lhs);
b9a16870 2553 rhs = build_call_expr_loc (loc, builtin_decl_explicit (BUILT_IN_NEXT_ARG),
75a70cf9 2554 1, integer_zero_node);
389dd41b 2555 rhs = fold_convert_loc (loc, TREE_TYPE (lhs), rhs);
8a58ed0a 2556 return build2 (MODIFY_EXPR, TREE_TYPE (lhs), lhs, rhs);
2557
2558 case BUILT_IN_VA_COPY:
2559 if (!va_list_simple_ptr)
2560 return NULL_TREE;
2561
75a70cf9 2562 if (gimple_call_num_args (call) != 2)
8a58ed0a 2563 return NULL_TREE;
2564
75a70cf9 2565 lhs = gimple_call_arg (call, 0);
8a58ed0a 2566 if (!POINTER_TYPE_P (TREE_TYPE (lhs))
2567 || TYPE_MAIN_VARIANT (TREE_TYPE (TREE_TYPE (lhs)))
5f57a8b1 2568 != TYPE_MAIN_VARIANT (cfun_va_list))
8a58ed0a 2569 return NULL_TREE;
2570
389dd41b 2571 lhs = build_fold_indirect_ref_loc (loc, lhs);
75a70cf9 2572 rhs = gimple_call_arg (call, 1);
8a58ed0a 2573 if (TYPE_MAIN_VARIANT (TREE_TYPE (rhs))
5f57a8b1 2574 != TYPE_MAIN_VARIANT (cfun_va_list))
8a58ed0a 2575 return NULL_TREE;
2576
389dd41b 2577 rhs = fold_convert_loc (loc, TREE_TYPE (lhs), rhs);
8a58ed0a 2578 return build2 (MODIFY_EXPR, TREE_TYPE (lhs), lhs, rhs);
2579
2580 case BUILT_IN_VA_END:
75a70cf9 2581 /* No effect, so the statement will be deleted. */
8a58ed0a 2582 return integer_zero_node;
2583
2584 default:
2585 gcc_unreachable ();
2586 }
2587}
75a70cf9 2588
f87df69a 2589/* Attemp to make the block of __builtin_unreachable I unreachable by changing
2590 the incoming jumps. Return true if at least one jump was changed. */
2591
2592static bool
2593optimize_unreachable (gimple_stmt_iterator i)
2594{
2595 basic_block bb = gsi_bb (i);
2596 gimple_stmt_iterator gsi;
2597 gimple stmt;
2598 edge_iterator ei;
2599 edge e;
2600 bool ret;
2601
f6b540af 2602 if (flag_sanitize & SANITIZE_UNREACHABLE)
2603 return false;
2604
f87df69a 2605 for (gsi = gsi_start_bb (bb); !gsi_end_p (gsi); gsi_next (&gsi))
2606 {
2607 stmt = gsi_stmt (gsi);
2608
2609 if (is_gimple_debug (stmt))
2610 continue;
2611
1a91d914 2612 if (glabel *label_stmt = dyn_cast <glabel *> (stmt))
f87df69a 2613 {
2614 /* Verify we do not need to preserve the label. */
1a91d914 2615 if (FORCED_LABEL (gimple_label_label (label_stmt)))
f87df69a 2616 return false;
2617
2618 continue;
2619 }
2620
2621 /* Only handle the case that __builtin_unreachable is the first statement
2622 in the block. We rely on DCE to remove stmts without side-effects
2623 before __builtin_unreachable. */
2624 if (gsi_stmt (gsi) != gsi_stmt (i))
2625 return false;
2626 }
2627
2628 ret = false;
2629 FOR_EACH_EDGE (e, ei, bb->preds)
2630 {
2631 gsi = gsi_last_bb (e->src);
522f73a1 2632 if (gsi_end_p (gsi))
2633 continue;
f87df69a 2634
522f73a1 2635 stmt = gsi_stmt (gsi);
1a91d914 2636 if (gcond *cond_stmt = dyn_cast <gcond *> (stmt))
f87df69a 2637 {
2638 if (e->flags & EDGE_TRUE_VALUE)
1a91d914 2639 gimple_cond_make_false (cond_stmt);
f87df69a 2640 else if (e->flags & EDGE_FALSE_VALUE)
1a91d914 2641 gimple_cond_make_true (cond_stmt);
f87df69a 2642 else
2643 gcc_unreachable ();
1a91d914 2644 update_stmt (cond_stmt);
f87df69a 2645 }
2646 else
2647 {
2648 /* Todo: handle other cases, f.i. switch statement. */
2649 continue;
2650 }
2651
2652 ret = true;
2653 }
2654
2655 return ret;
2656}
2657
4ee9c684 2658/* A simple pass that attempts to fold all builtin functions. This pass
2659 is run after we've propagated as many constants as we can. */
2660
65b0537f 2661namespace {
2662
2663const pass_data pass_data_fold_builtins =
2664{
2665 GIMPLE_PASS, /* type */
2666 "fab", /* name */
2667 OPTGROUP_NONE, /* optinfo_flags */
65b0537f 2668 TV_NONE, /* tv_id */
2669 ( PROP_cfg | PROP_ssa ), /* properties_required */
2670 0, /* properties_provided */
2671 0, /* properties_destroyed */
2672 0, /* todo_flags_start */
8b88439e 2673 TODO_update_ssa, /* todo_flags_finish */
65b0537f 2674};
2675
2676class pass_fold_builtins : public gimple_opt_pass
2677{
2678public:
2679 pass_fold_builtins (gcc::context *ctxt)
2680 : gimple_opt_pass (pass_data_fold_builtins, ctxt)
2681 {}
2682
2683 /* opt_pass methods: */
2684 opt_pass * clone () { return new pass_fold_builtins (m_ctxt); }
2685 virtual unsigned int execute (function *);
2686
2687}; // class pass_fold_builtins
2688
2689unsigned int
2690pass_fold_builtins::execute (function *fun)
4ee9c684 2691{
b36237eb 2692 bool cfg_changed = false;
4ee9c684 2693 basic_block bb;
b1b7c0c4 2694 unsigned int todoflags = 0;
48e1416a 2695
65b0537f 2696 FOR_EACH_BB_FN (bb, fun)
4ee9c684 2697 {
75a70cf9 2698 gimple_stmt_iterator i;
2699 for (i = gsi_start_bb (bb); !gsi_end_p (i); )
4ee9c684 2700 {
75a70cf9 2701 gimple stmt, old_stmt;
40a3eb84 2702 tree callee;
0a39fd54 2703 enum built_in_function fcode;
4ee9c684 2704
75a70cf9 2705 stmt = gsi_stmt (i);
2706
2707 if (gimple_code (stmt) != GIMPLE_CALL)
0a39fd54 2708 {
896a0c42 2709 /* Remove all *ssaname_N ={v} {CLOBBER}; stmts,
2710 after the last GIMPLE DSE they aren't needed and might
2711 unnecessarily keep the SSA_NAMEs live. */
2712 if (gimple_clobber_p (stmt))
2713 {
2714 tree lhs = gimple_assign_lhs (stmt);
2715 if (TREE_CODE (lhs) == MEM_REF
2716 && TREE_CODE (TREE_OPERAND (lhs, 0)) == SSA_NAME)
2717 {
2718 unlink_stmt_vdef (stmt);
2719 gsi_remove (&i, true);
2720 release_defs (stmt);
2721 continue;
2722 }
2723 }
75a70cf9 2724 gsi_next (&i);
0a39fd54 2725 continue;
2726 }
40a3eb84 2727
75a70cf9 2728 callee = gimple_call_fndecl (stmt);
4ee9c684 2729 if (!callee || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL)
0a39fd54 2730 {
75a70cf9 2731 gsi_next (&i);
0a39fd54 2732 continue;
2733 }
5a4b7e1e 2734
40a3eb84 2735 fcode = DECL_FUNCTION_CODE (callee);
2736 if (fold_stmt (&i))
2737 ;
2738 else
2739 {
2740 tree result = NULL_TREE;
2741 switch (DECL_FUNCTION_CODE (callee))
2742 {
2743 case BUILT_IN_CONSTANT_P:
2744 /* Resolve __builtin_constant_p. If it hasn't been
2745 folded to integer_one_node by now, it's fairly
2746 certain that the value simply isn't constant. */
2747 result = integer_zero_node;
2748 break;
5a4b7e1e 2749
40a3eb84 2750 case BUILT_IN_ASSUME_ALIGNED:
2751 /* Remove __builtin_assume_aligned. */
2752 result = gimple_call_arg (stmt, 0);
2753 break;
4ee9c684 2754
40a3eb84 2755 case BUILT_IN_STACK_RESTORE:
2756 result = optimize_stack_restore (i);
2757 if (result)
2758 break;
2759 gsi_next (&i);
2760 continue;
fca0886c 2761
40a3eb84 2762 case BUILT_IN_UNREACHABLE:
2763 if (optimize_unreachable (i))
2764 cfg_changed = true;
8a58ed0a 2765 break;
8a58ed0a 2766
40a3eb84 2767 case BUILT_IN_VA_START:
2768 case BUILT_IN_VA_END:
2769 case BUILT_IN_VA_COPY:
2770 /* These shouldn't be folded before pass_stdarg. */
2771 result = optimize_stdarg_builtin (stmt);
2772 if (result)
2773 break;
2774 /* FALLTHRU */
f87df69a 2775
40a3eb84 2776 default:;
2777 }
bdd0e199 2778
40a3eb84 2779 if (!result)
2780 {
2781 gsi_next (&i);
2782 continue;
2783 }
4ee9c684 2784
40a3eb84 2785 if (!update_call_from_tree (&i, result))
2786 gimplify_and_update_call_from_tree (&i, result);
2787 }
2788
2789 todoflags |= TODO_update_address_taken;
f87df69a 2790
4ee9c684 2791 if (dump_file && (dump_flags & TDF_DETAILS))
2792 {
2793 fprintf (dump_file, "Simplified\n ");
75a70cf9 2794 print_gimple_stmt (dump_file, stmt, 0, dump_flags);
4ee9c684 2795 }
2796
75a70cf9 2797 old_stmt = stmt;
75a70cf9 2798 stmt = gsi_stmt (i);
4c5fd53c 2799 update_stmt (stmt);
de6ed584 2800
75a70cf9 2801 if (maybe_clean_or_replace_eh_stmt (old_stmt, stmt)
2802 && gimple_purge_dead_eh_edges (bb))
b36237eb 2803 cfg_changed = true;
4ee9c684 2804
2805 if (dump_file && (dump_flags & TDF_DETAILS))
2806 {
2807 fprintf (dump_file, "to\n ");
75a70cf9 2808 print_gimple_stmt (dump_file, stmt, 0, dump_flags);
4ee9c684 2809 fprintf (dump_file, "\n");
2810 }
0a39fd54 2811
2812 /* Retry the same statement if it changed into another
2813 builtin, there might be new opportunities now. */
75a70cf9 2814 if (gimple_code (stmt) != GIMPLE_CALL)
0a39fd54 2815 {
75a70cf9 2816 gsi_next (&i);
0a39fd54 2817 continue;
2818 }
75a70cf9 2819 callee = gimple_call_fndecl (stmt);
0a39fd54 2820 if (!callee
75a70cf9 2821 || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL
0a39fd54 2822 || DECL_FUNCTION_CODE (callee) == fcode)
75a70cf9 2823 gsi_next (&i);
4ee9c684 2824 }
2825 }
48e1416a 2826
b36237eb 2827 /* Delete unreachable blocks. */
b1b7c0c4 2828 if (cfg_changed)
2829 todoflags |= TODO_cleanup_cfg;
48e1416a 2830
b1b7c0c4 2831 return todoflags;
4ee9c684 2832}
2833
cbe8bda8 2834} // anon namespace
2835
2836gimple_opt_pass *
2837make_pass_fold_builtins (gcc::context *ctxt)
2838{
2839 return new pass_fold_builtins (ctxt);
2840}