]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/tree-ssa-ccp.c
2006-10-27 Vladimir Makarov <vmakarov@redhat.com>
[thirdparty/gcc.git] / gcc / tree-ssa-ccp.c
CommitLineData
6de9cd9a 1/* Conditional constant propagation pass for the GNU compiler.
b6f65e3c 2 Copyright (C) 2000, 2001, 2002, 2003, 2004, 2005, 2006
1e052c19 3 Free Software Foundation, Inc.
6de9cd9a
DN
4 Adapted from original RTL SSA-CCP by Daniel Berlin <dberlin@dberlin.org>
5 Adapted to GIMPLE trees by Diego Novillo <dnovillo@redhat.com>
6
7This file is part of GCC.
8
9GCC is free software; you can redistribute it and/or modify it
10under the terms of the GNU General Public License as published by the
11Free Software Foundation; either version 2, or (at your option) any
12later version.
13
14GCC is distributed in the hope that it will be useful, but WITHOUT
15ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
16FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17for more details.
18
19You should have received a copy of the GNU General Public License
20along with GCC; see the file COPYING. If not, write to the Free
366ccddb
KC
21Software Foundation, 51 Franklin Street, Fifth Floor, Boston, MA
2202110-1301, USA. */
6de9cd9a 23
0bca51f0
DN
24/* Conditional constant propagation (CCP) is based on the SSA
25 propagation engine (tree-ssa-propagate.c). Constant assignments of
26 the form VAR = CST are propagated from the assignments into uses of
27 VAR, which in turn may generate new constants. The simulation uses
28 a four level lattice to keep track of constant values associated
29 with SSA names. Given an SSA name V_i, it may take one of the
30 following values:
31
32 UNINITIALIZED -> This is the default starting value. V_i
33 has not been processed yet.
34
35 UNDEFINED -> V_i is a local variable whose definition
36 has not been processed yet. Therefore we
37 don't yet know if its value is a constant
38 or not.
39
40 CONSTANT -> V_i has been found to hold a constant
41 value C.
42
43 VARYING -> V_i cannot take a constant value, or if it
44 does, it is not possible to determine it
45 at compile time.
46
47 The core of SSA-CCP is in ccp_visit_stmt and ccp_visit_phi_node:
48
49 1- In ccp_visit_stmt, we are interested in assignments whose RHS
50 evaluates into a constant and conditional jumps whose predicate
51 evaluates into a boolean true or false. When an assignment of
52 the form V_i = CONST is found, V_i's lattice value is set to
53 CONSTANT and CONST is associated with it. This causes the
54 propagation engine to add all the SSA edges coming out the
55 assignment into the worklists, so that statements that use V_i
56 can be visited.
57
58 If the statement is a conditional with a constant predicate, we
59 mark the outgoing edges as executable or not executable
60 depending on the predicate's value. This is then used when
61 visiting PHI nodes to know when a PHI argument can be ignored.
62
63
64 2- In ccp_visit_phi_node, if all the PHI arguments evaluate to the
65 same constant C, then the LHS of the PHI is set to C. This
66 evaluation is known as the "meet operation". Since one of the
67 goals of this evaluation is to optimistically return constant
68 values as often as possible, it uses two main short cuts:
69
70 - If an argument is flowing in through a non-executable edge, it
71 is ignored. This is useful in cases like this:
72
73 if (PRED)
74 a_9 = 3;
75 else
76 a_10 = 100;
77 a_11 = PHI (a_9, a_10)
78
79 If PRED is known to always evaluate to false, then we can
80 assume that a_11 will always take its value from a_10, meaning
81 that instead of consider it VARYING (a_9 and a_10 have
82 different values), we can consider it CONSTANT 100.
83
84 - If an argument has an UNDEFINED value, then it does not affect
85 the outcome of the meet operation. If a variable V_i has an
86 UNDEFINED value, it means that either its defining statement
87 hasn't been visited yet or V_i has no defining statement, in
88 which case the original symbol 'V' is being used
89 uninitialized. Since 'V' is a local variable, the compiler
90 may assume any initial value for it.
91
92
93 After propagation, every variable V_i that ends up with a lattice
94 value of CONSTANT will have the associated constant value in the
95 array CONST_VAL[i].VALUE. That is fed into substitute_and_fold for
96 final substitution and folding.
97
98
99 Constant propagation in stores and loads (STORE-CCP)
100 ----------------------------------------------------
101
102 While CCP has all the logic to propagate constants in GIMPLE
103 registers, it is missing the ability to associate constants with
104 stores and loads (i.e., pointer dereferences, structures and
105 global/aliased variables). We don't keep loads and stores in
106 SSA, but we do build a factored use-def web for them (in the
107 virtual operands).
108
109 For instance, consider the following code fragment:
110
111 struct A a;
112 const int B = 42;
113
114 void foo (int i)
115 {
116 if (i > 10)
117 a.a = 42;
118 else
119 {
120 a.b = 21;
121 a.a = a.b + 21;
122 }
123
124 if (a.a != B)
125 never_executed ();
126 }
127
128 We should be able to deduce that the predicate 'a.a != B' is always
129 false. To achieve this, we associate constant values to the SSA
130 names in the V_MAY_DEF and V_MUST_DEF operands for each store.
131 Additionally, since we also glob partial loads/stores with the base
132 symbol, we also keep track of the memory reference where the
133 constant value was stored (in the MEM_REF field of PROP_VALUE_T).
134 For instance,
135
136 # a_5 = V_MAY_DEF <a_4>
137 a.a = 2;
138
139 # VUSE <a_5>
140 x_3 = a.b;
141
142 In the example above, CCP will associate value '2' with 'a_5', but
143 it would be wrong to replace the load from 'a.b' with '2', because
144 '2' had been stored into a.a.
145
146 To support STORE-CCP, it is necessary to add a new value to the
147 constant propagation lattice. When evaluating a load for a memory
148 reference we can no longer assume a value of UNDEFINED if we
149 haven't seen a preceding store to the same memory location.
150 Consider, for instance global variables:
151
152 int A;
153
154 foo (int i)
155 {
156 if (i_3 > 10)
157 A_4 = 3;
158 # A_5 = PHI (A_4, A_2);
159
160 # VUSE <A_5>
161 A.0_6 = A;
162
163 return A.0_6;
164 }
165
166 The value of A_2 cannot be assumed to be UNDEFINED, as it may have
167 been defined outside of foo. If we were to assume it UNDEFINED, we
168 would erroneously optimize the above into 'return 3;'. Therefore,
169 when doing STORE-CCP, we introduce a fifth lattice value
170 (UNKNOWN_VAL), which overrides any other value when computing the
171 meet operation in PHI nodes.
172
173 Though STORE-CCP is not too expensive, it does have to do more work
174 than regular CCP, so it is only enabled at -O2. Both regular CCP
175 and STORE-CCP use the exact same algorithm. The only distinction
176 is that when doing STORE-CCP, the boolean variable DO_STORE_CCP is
177 set to true. This affects the evaluation of statements and PHI
178 nodes.
6de9cd9a
DN
179
180 References:
181
182 Constant propagation with conditional branches,
183 Wegman and Zadeck, ACM TOPLAS 13(2):181-210.
184
185 Building an Optimizing Compiler,
186 Robert Morgan, Butterworth-Heinemann, 1998, Section 8.9.
187
188 Advanced Compiler Design and Implementation,
189 Steven Muchnick, Morgan Kaufmann, 1997, Section 12.6 */
190
191#include "config.h"
192#include "system.h"
193#include "coretypes.h"
194#include "tm.h"
6de9cd9a 195#include "tree.h"
750628d8 196#include "flags.h"
6de9cd9a
DN
197#include "rtl.h"
198#include "tm_p.h"
750628d8 199#include "ggc.h"
6de9cd9a 200#include "basic-block.h"
750628d8 201#include "output.h"
750628d8
DN
202#include "expr.h"
203#include "function.h"
6de9cd9a 204#include "diagnostic.h"
750628d8 205#include "timevar.h"
6de9cd9a 206#include "tree-dump.h"
750628d8 207#include "tree-flow.h"
6de9cd9a 208#include "tree-pass.h"
750628d8
DN
209#include "tree-ssa-propagate.h"
210#include "langhooks.h"
ae3df618 211#include "target.h"
6de9cd9a
DN
212
213
214/* Possible lattice values. */
215typedef enum
216{
217 UNINITIALIZED = 0,
218 UNDEFINED,
173b818d 219 UNKNOWN_VAL,
6de9cd9a
DN
220 CONSTANT,
221 VARYING
0bca51f0 222} ccp_lattice_t;
6de9cd9a 223
0bca51f0
DN
224/* Array of propagated constant values. After propagation,
225 CONST_VAL[I].VALUE holds the constant value for SSA_NAME(I). If
226 the constant is held in an SSA name representing a memory store
227 (i.e., a V_MAY_DEF or V_MUST_DEF), CONST_VAL[I].MEM_REF will
228 contain the actual memory reference used to store (i.e., the LHS of
229 the assignment doing the store). */
404f4351 230static prop_value_t *const_val;
6de9cd9a 231
0bca51f0
DN
232/* True if we are also propagating constants in stores and loads. */
233static bool do_store_ccp;
6de9cd9a 234
0bca51f0 235/* Dump constant propagation value VAL to file OUTF prefixed by PREFIX. */
95eec0d6
DB
236
237static void
0bca51f0 238dump_lattice_value (FILE *outf, const char *prefix, prop_value_t val)
95eec0d6 239{
750628d8 240 switch (val.lattice_val)
95eec0d6 241 {
0bca51f0
DN
242 case UNINITIALIZED:
243 fprintf (outf, "%sUNINITIALIZED", prefix);
244 break;
750628d8
DN
245 case UNDEFINED:
246 fprintf (outf, "%sUNDEFINED", prefix);
247 break;
248 case VARYING:
249 fprintf (outf, "%sVARYING", prefix);
250 break;
251 case UNKNOWN_VAL:
252 fprintf (outf, "%sUNKNOWN_VAL", prefix);
253 break;
254 case CONSTANT:
255 fprintf (outf, "%sCONSTANT ", prefix);
0bca51f0 256 print_generic_expr (outf, val.value, dump_flags);
750628d8
DN
257 break;
258 default:
1e128c5f 259 gcc_unreachable ();
750628d8 260 }
95eec0d6 261}
6de9cd9a 262
6de9cd9a 263
0bca51f0
DN
264/* Print lattice value VAL to stderr. */
265
266void debug_lattice_value (prop_value_t val);
267
268void
269debug_lattice_value (prop_value_t val)
270{
271 dump_lattice_value (stderr, "", val);
272 fprintf (stderr, "\n");
273}
6de9cd9a 274
6de9cd9a 275
688e936d
RH
276/* The regular is_gimple_min_invariant does a shallow test of the object.
277 It assumes that full gimplification has happened, or will happen on the
278 object. For a value coming from DECL_INITIAL, this is not true, so we
6416ae7f 279 have to be more strict ourselves. */
688e936d
RH
280
281static bool
282ccp_decl_initial_min_invariant (tree t)
283{
284 if (!is_gimple_min_invariant (t))
285 return false;
286 if (TREE_CODE (t) == ADDR_EXPR)
287 {
288 /* Inline and unroll is_gimple_addressable. */
289 while (1)
290 {
291 t = TREE_OPERAND (t, 0);
292 if (is_gimple_id (t))
293 return true;
294 if (!handled_component_p (t))
295 return false;
296 }
297 }
298 return true;
299}
300
301
0bca51f0
DN
302/* Compute a default value for variable VAR and store it in the
303 CONST_VAL array. The following rules are used to get default
304 values:
95eec0d6 305
0bca51f0
DN
306 1- Global and static variables that are declared constant are
307 considered CONSTANT.
308
309 2- Any other value is considered UNDEFINED. This is useful when
750628d8
DN
310 considering PHI nodes. PHI arguments that are undefined do not
311 change the constant value of the PHI node, which allows for more
0bca51f0 312 constants to be propagated.
6de9cd9a 313
0bca51f0
DN
314 3- If SSA_NAME_VALUE is set and it is a constant, its value is
315 used.
6de9cd9a 316
0bca51f0
DN
317 4- Variables defined by statements other than assignments and PHI
318 nodes are considered VARYING.
6de9cd9a 319
0bca51f0
DN
320 5- Variables that are not GIMPLE registers are considered
321 UNKNOWN_VAL, which is really a stronger version of UNDEFINED.
322 It's used to avoid the short circuit evaluation implied by
323 UNDEFINED in ccp_lattice_meet. */
6de9cd9a 324
0bca51f0
DN
325static prop_value_t
326get_default_value (tree var)
327{
328 tree sym = SSA_NAME_VAR (var);
329 prop_value_t val = { UNINITIALIZED, NULL_TREE, NULL_TREE };
330
331 if (!do_store_ccp && !is_gimple_reg (var))
6de9cd9a 332 {
0bca51f0
DN
333 /* Short circuit for regular CCP. We are not interested in any
334 non-register when DO_STORE_CCP is false. */
750628d8 335 val.lattice_val = VARYING;
6de9cd9a 336 }
0bca51f0
DN
337 else if (SSA_NAME_VALUE (var)
338 && is_gimple_min_invariant (SSA_NAME_VALUE (var)))
750628d8 339 {
0bca51f0
DN
340 val.lattice_val = CONSTANT;
341 val.value = SSA_NAME_VALUE (var);
750628d8 342 }
0bca51f0
DN
343 else if (TREE_STATIC (sym)
344 && TREE_READONLY (sym)
326eda4b 345 && !MTAG_P (sym)
0bca51f0 346 && DECL_INITIAL (sym)
688e936d 347 && ccp_decl_initial_min_invariant (DECL_INITIAL (sym)))
750628d8 348 {
0bca51f0
DN
349 /* Globals and static variables declared 'const' take their
350 initial value. */
351 val.lattice_val = CONSTANT;
352 val.value = DECL_INITIAL (sym);
353 val.mem_ref = sym;
750628d8
DN
354 }
355 else
356 {
750628d8 357 tree stmt = SSA_NAME_DEF_STMT (var);
6de9cd9a 358
0bca51f0
DN
359 if (IS_EMPTY_STMT (stmt))
360 {
361 /* Variables defined by an empty statement are those used
362 before being initialized. If VAR is a local variable, we
363 can assume initially that it is UNDEFINED. If we are
364 doing STORE-CCP, function arguments and non-register
365 variables are initially UNKNOWN_VAL, because we cannot
366 discard the value incoming from outside of this function
367 (see ccp_lattice_meet for details). */
368 if (is_gimple_reg (sym) && TREE_CODE (sym) != PARM_DECL)
369 val.lattice_val = UNDEFINED;
370 else if (do_store_ccp)
371 val.lattice_val = UNKNOWN_VAL;
372 else
750628d8
DN
373 val.lattice_val = VARYING;
374 }
0bca51f0
DN
375 else if (TREE_CODE (stmt) == MODIFY_EXPR
376 || TREE_CODE (stmt) == PHI_NODE)
377 {
378 /* Any other variable defined by an assignment or a PHI node
379 is considered UNDEFINED (or UNKNOWN_VAL if VAR is not a
380 GIMPLE register). */
381 val.lattice_val = is_gimple_reg (sym) ? UNDEFINED : UNKNOWN_VAL;
382 }
383 else
384 {
385 /* Otherwise, VAR will never take on a constant value. */
386 val.lattice_val = VARYING;
387 }
750628d8 388 }
6de9cd9a 389
750628d8
DN
390 return val;
391}
6de9cd9a 392
6de9cd9a 393
0bca51f0
DN
394/* Get the constant value associated with variable VAR. If
395 MAY_USE_DEFAULT_P is true, call get_default_value on variables that
396 have the lattice value UNINITIALIZED. */
6de9cd9a 397
0bca51f0
DN
398static prop_value_t *
399get_value (tree var, bool may_use_default_p)
400{
401 prop_value_t *val = &const_val[SSA_NAME_VERSION (var)];
402 if (may_use_default_p && val->lattice_val == UNINITIALIZED)
6de9cd9a
DN
403 *val = get_default_value (var);
404
405 return val;
406}
407
408
0bca51f0
DN
409/* Set the value for variable VAR to NEW_VAL. Return true if the new
410 value is different from VAR's previous value. */
6de9cd9a 411
750628d8 412static bool
0bca51f0 413set_lattice_value (tree var, prop_value_t new_val)
6de9cd9a 414{
0bca51f0
DN
415 prop_value_t *old_val = get_value (var, false);
416
417 /* Lattice transitions must always be monotonically increasing in
418 value. We allow two exceptions:
419
420 1- If *OLD_VAL and NEW_VAL are the same, return false to
421 inform the caller that this was a non-transition.
422
423 2- If we are doing store-ccp (i.e., DOING_STORE_CCP is true),
424 allow CONSTANT->UNKNOWN_VAL. The UNKNOWN_VAL state is a
425 special type of UNDEFINED state which prevents the short
426 circuit evaluation of PHI arguments (see ccp_visit_phi_node
427 and ccp_lattice_meet). */
428 gcc_assert (old_val->lattice_val <= new_val.lattice_val
429 || (old_val->lattice_val == new_val.lattice_val
430 && old_val->value == new_val.value
431 && old_val->mem_ref == new_val.mem_ref)
432 || (do_store_ccp
433 && old_val->lattice_val == CONSTANT
434 && new_val.lattice_val == UNKNOWN_VAL));
435
436 if (old_val->lattice_val != new_val.lattice_val)
6de9cd9a 437 {
750628d8
DN
438 if (dump_file && (dump_flags & TDF_DETAILS))
439 {
0bca51f0
DN
440 dump_lattice_value (dump_file, "Lattice value changed to ", new_val);
441 fprintf (dump_file, ". %sdding SSA edges to worklist.\n",
442 new_val.lattice_val != UNDEFINED ? "A" : "Not a");
750628d8
DN
443 }
444
0bca51f0
DN
445 *old_val = new_val;
446
447 /* Transitions UNINITIALIZED -> UNDEFINED are never interesting
448 for propagation purposes. In these cases return false to
449 avoid doing useless work. */
450 return (new_val.lattice_val != UNDEFINED);
6de9cd9a 451 }
750628d8
DN
452
453 return false;
6de9cd9a
DN
454}
455
456
0bca51f0 457/* Return the likely CCP lattice value for STMT.
6de9cd9a 458
750628d8 459 If STMT has no operands, then return CONSTANT.
6de9cd9a 460
750628d8 461 Else if any operands of STMT are undefined, then return UNDEFINED.
6de9cd9a 462
750628d8 463 Else if any operands of STMT are constants, then return CONSTANT.
6de9cd9a 464
750628d8 465 Else return VARYING. */
6de9cd9a 466
0bca51f0 467static ccp_lattice_t
750628d8
DN
468likely_value (tree stmt)
469{
0bca51f0 470 bool found_constant;
750628d8
DN
471 stmt_ann_t ann;
472 tree use;
473 ssa_op_iter iter;
6de9cd9a 474
750628d8 475 ann = stmt_ann (stmt);
0bca51f0
DN
476
477 /* If the statement has volatile operands, it won't fold to a
478 constant value. */
479 if (ann->has_volatile_ops)
480 return VARYING;
481
482 /* If we are not doing store-ccp, statements with loads
483 and/or stores will never fold into a constant. */
484 if (!do_store_ccp
ff88c5aa 485 && !ZERO_SSA_OPERANDS (stmt, SSA_OP_ALL_VIRTUALS))
750628d8 486 return VARYING;
6de9cd9a 487
0bca51f0
DN
488
489 /* A CALL_EXPR is assumed to be varying. NOTE: This may be overly
490 conservative, in the presence of const and pure calls. */
750628d8
DN
491 if (get_call_expr_in (stmt) != NULL_TREE)
492 return VARYING;
6de9cd9a 493
0bca51f0
DN
494 /* Anything other than assignments and conditional jumps are not
495 interesting for CCP. */
496 if (TREE_CODE (stmt) != MODIFY_EXPR
497 && TREE_CODE (stmt) != COND_EXPR
498 && TREE_CODE (stmt) != SWITCH_EXPR)
499 return VARYING;
500
a318e3ac
SB
501 if (is_gimple_min_invariant (get_rhs (stmt)))
502 return CONSTANT;
503
0bca51f0
DN
504 found_constant = false;
505 FOR_EACH_SSA_TREE_OPERAND (use, stmt, iter, SSA_OP_USE|SSA_OP_VUSE)
750628d8 506 {
0bca51f0 507 prop_value_t *val = get_value (use, true);
750628d8 508
0bca51f0
DN
509 if (val->lattice_val == VARYING)
510 return VARYING;
750628d8 511
750628d8 512 if (val->lattice_val == UNKNOWN_VAL)
0bca51f0
DN
513 {
514 /* UNKNOWN_VAL is invalid when not doing STORE-CCP. */
515 gcc_assert (do_store_ccp);
516 return UNKNOWN_VAL;
517 }
518
750628d8 519 if (val->lattice_val == CONSTANT)
0bca51f0 520 found_constant = true;
6de9cd9a 521 }
750628d8 522
0bca51f0 523 if (found_constant
f47c96aa
AM
524 || ZERO_SSA_OPERANDS (stmt, SSA_OP_USE)
525 || ZERO_SSA_OPERANDS (stmt, SSA_OP_VUSE))
0bca51f0
DN
526 return CONSTANT;
527
528 return UNDEFINED;
6de9cd9a
DN
529}
530
531
750628d8 532/* Initialize local data structures for CCP. */
6de9cd9a
DN
533
534static void
750628d8 535ccp_initialize (void)
6de9cd9a 536{
750628d8 537 basic_block bb;
6de9cd9a 538
858904db 539 const_val = XNEWVEC (prop_value_t, num_ssa_names);
0bca51f0 540 memset (const_val, 0, num_ssa_names * sizeof (*const_val));
6de9cd9a 541
750628d8
DN
542 /* Initialize simulation flags for PHI nodes and statements. */
543 FOR_EACH_BB (bb)
6de9cd9a 544 {
750628d8 545 block_stmt_iterator i;
6de9cd9a 546
750628d8
DN
547 for (i = bsi_start (bb); !bsi_end_p (i); bsi_next (&i))
548 {
549 bool is_varying = false;
550 tree stmt = bsi_stmt (i);
6de9cd9a 551
0bca51f0 552 if (likely_value (stmt) == VARYING)
6de9cd9a 553
750628d8 554 {
0bca51f0
DN
555 tree def;
556 ssa_op_iter iter;
557
558 /* If the statement will not produce a constant, mark
559 all its outputs VARYING. */
560 FOR_EACH_SSA_TREE_OPERAND (def, stmt, iter, SSA_OP_ALL_DEFS)
561 get_value (def, false)->lattice_val = VARYING;
562
563 /* Never mark conditional jumps with DONT_SIMULATE_AGAIN,
564 otherwise the propagator will never add the outgoing
565 control edges. */
566 if (TREE_CODE (stmt) != COND_EXPR
567 && TREE_CODE (stmt) != SWITCH_EXPR)
568 is_varying = true;
750628d8
DN
569 }
570
750628d8
DN
571 DONT_SIMULATE_AGAIN (stmt) = is_varying;
572 }
6de9cd9a
DN
573 }
574
750628d8
DN
575 /* Now process PHI nodes. */
576 FOR_EACH_BB (bb)
6de9cd9a 577 {
0bca51f0 578 tree phi;
750628d8
DN
579
580 for (phi = phi_nodes (bb); phi; phi = PHI_CHAIN (phi))
581 {
0bca51f0
DN
582 int i;
583 tree arg;
584 prop_value_t *val = get_value (PHI_RESULT (phi), false);
750628d8 585
0bca51f0 586 for (i = 0; i < PHI_NUM_ARGS (phi); i++)
750628d8 587 {
0bca51f0 588 arg = PHI_ARG_DEF (phi, i);
750628d8 589
0bca51f0
DN
590 if (TREE_CODE (arg) == SSA_NAME
591 && get_value (arg, false)->lattice_val == VARYING)
750628d8 592 {
0bca51f0
DN
593 val->lattice_val = VARYING;
594 break;
750628d8
DN
595 }
596 }
597
598 DONT_SIMULATE_AGAIN (phi) = (val->lattice_val == VARYING);
599 }
6de9cd9a 600 }
750628d8 601}
6de9cd9a 602
6de9cd9a 603
0bca51f0
DN
604/* Do final substitution of propagated values, cleanup the flowgraph and
605 free allocated storage. */
6de9cd9a 606
0bca51f0
DN
607static void
608ccp_finalize (void)
6de9cd9a 609{
0bca51f0 610 /* Perform substitutions based on the known constant values. */
227858d1 611 substitute_and_fold (const_val, false);
6de9cd9a 612
0bca51f0 613 free (const_val);
6de9cd9a
DN
614}
615
616
0bca51f0
DN
617/* Compute the meet operator between *VAL1 and *VAL2. Store the result
618 in VAL1.
619
620 any M UNDEFINED = any
621 any M UNKNOWN_VAL = UNKNOWN_VAL
622 any M VARYING = VARYING
623 Ci M Cj = Ci if (i == j)
624 Ci M Cj = VARYING if (i != j)
625
626 Lattice values UNKNOWN_VAL and UNDEFINED are similar but have
627 different semantics at PHI nodes. Both values imply that we don't
628 know whether the variable is constant or not. However, UNKNOWN_VAL
629 values override all others. For instance, suppose that A is a
630 global variable:
631
632 +------+
633 | |
634 | / \
635 | / \
636 | | A_1 = 4
637 | \ /
638 | \ /
639 | A_3 = PHI (A_2, A_1)
640 | ... = A_3
641 | |
642 +----+
643
644 If the edge into A_2 is not executable, the first visit to A_3 will
645 yield the constant 4. But the second visit to A_3 will be with A_2
646 in state UNKNOWN_VAL. We can no longer conclude that A_3 is 4
647 because A_2 may have been set in another function. If we had used
648 the lattice value UNDEFINED, we would have had wrongly concluded
649 that A_3 is 4. */
650
6de9cd9a
DN
651
652static void
0bca51f0 653ccp_lattice_meet (prop_value_t *val1, prop_value_t *val2)
6de9cd9a 654{
0bca51f0 655 if (val1->lattice_val == UNDEFINED)
6de9cd9a 656 {
0bca51f0
DN
657 /* UNDEFINED M any = any */
658 *val1 = *val2;
750628d8 659 }
0bca51f0 660 else if (val2->lattice_val == UNDEFINED)
195da47b 661 {
0bca51f0
DN
662 /* any M UNDEFINED = any
663 Nothing to do. VAL1 already contains the value we want. */
664 ;
195da47b 665 }
0bca51f0
DN
666 else if (val1->lattice_val == UNKNOWN_VAL
667 || val2->lattice_val == UNKNOWN_VAL)
6de9cd9a 668 {
0bca51f0
DN
669 /* UNKNOWN_VAL values are invalid if we are not doing STORE-CCP. */
670 gcc_assert (do_store_ccp);
6de9cd9a 671
0bca51f0
DN
672 /* any M UNKNOWN_VAL = UNKNOWN_VAL. */
673 val1->lattice_val = UNKNOWN_VAL;
674 val1->value = NULL_TREE;
675 val1->mem_ref = NULL_TREE;
676 }
677 else if (val1->lattice_val == VARYING
678 || val2->lattice_val == VARYING)
750628d8 679 {
0bca51f0
DN
680 /* any M VARYING = VARYING. */
681 val1->lattice_val = VARYING;
682 val1->value = NULL_TREE;
683 val1->mem_ref = NULL_TREE;
750628d8 684 }
0bca51f0
DN
685 else if (val1->lattice_val == CONSTANT
686 && val2->lattice_val == CONSTANT
687 && simple_cst_equal (val1->value, val2->value) == 1
688 && (!do_store_ccp
a318e3ac
SB
689 || (val1->mem_ref && val2->mem_ref
690 && operand_equal_p (val1->mem_ref, val2->mem_ref, 0))))
750628d8 691 {
0bca51f0
DN
692 /* Ci M Cj = Ci if (i == j)
693 Ci M Cj = VARYING if (i != j)
694
695 If these two values come from memory stores, make sure that
696 they come from the same memory reference. */
697 val1->lattice_val = CONSTANT;
698 val1->value = val1->value;
699 val1->mem_ref = val1->mem_ref;
750628d8
DN
700 }
701 else
702 {
0bca51f0
DN
703 /* Any other combination is VARYING. */
704 val1->lattice_val = VARYING;
705 val1->value = NULL_TREE;
706 val1->mem_ref = NULL_TREE;
750628d8 707 }
6de9cd9a
DN
708}
709
710
750628d8
DN
711/* Loop through the PHI_NODE's parameters for BLOCK and compare their
712 lattice values to determine PHI_NODE's lattice value. The value of a
0bca51f0 713 PHI node is determined calling ccp_lattice_meet with all the arguments
750628d8 714 of the PHI node that are incoming via executable edges. */
6de9cd9a 715
750628d8
DN
716static enum ssa_prop_result
717ccp_visit_phi_node (tree phi)
6de9cd9a 718{
750628d8 719 int i;
0bca51f0 720 prop_value_t *old_val, new_val;
6de9cd9a 721
750628d8 722 if (dump_file && (dump_flags & TDF_DETAILS))
6de9cd9a 723 {
750628d8
DN
724 fprintf (dump_file, "\nVisiting PHI node: ");
725 print_generic_expr (dump_file, phi, dump_flags);
6de9cd9a 726 }
6de9cd9a 727
0bca51f0 728 old_val = get_value (PHI_RESULT (phi), false);
750628d8
DN
729 switch (old_val->lattice_val)
730 {
731 case VARYING:
0bca51f0 732 return SSA_PROP_VARYING;
6de9cd9a 733
750628d8
DN
734 case CONSTANT:
735 new_val = *old_val;
736 break;
6de9cd9a 737
750628d8
DN
738 case UNKNOWN_VAL:
739 /* To avoid the default value of UNKNOWN_VAL overriding
740 that of its possible constant arguments, temporarily
741 set the PHI node's default lattice value to be
742 UNDEFINED. If the PHI node's old value was UNKNOWN_VAL and
743 the new value is UNDEFINED, then we prevent the invalid
744 transition by not calling set_lattice_value. */
0bca51f0
DN
745 gcc_assert (do_store_ccp);
746
747 /* FALLTHRU */
6de9cd9a 748
750628d8
DN
749 case UNDEFINED:
750 case UNINITIALIZED:
751 new_val.lattice_val = UNDEFINED;
0bca51f0
DN
752 new_val.value = NULL_TREE;
753 new_val.mem_ref = NULL_TREE;
750628d8 754 break;
6de9cd9a 755
750628d8 756 default:
1e128c5f 757 gcc_unreachable ();
750628d8 758 }
6de9cd9a 759
750628d8
DN
760 for (i = 0; i < PHI_NUM_ARGS (phi); i++)
761 {
0bca51f0
DN
762 /* Compute the meet operator over all the PHI arguments flowing
763 through executable edges. */
750628d8 764 edge e = PHI_ARG_EDGE (phi, i);
6de9cd9a 765
750628d8
DN
766 if (dump_file && (dump_flags & TDF_DETAILS))
767 {
768 fprintf (dump_file,
769 "\n Argument #%d (%d -> %d %sexecutable)\n",
770 i, e->src->index, e->dest->index,
771 (e->flags & EDGE_EXECUTABLE) ? "" : "not ");
772 }
773
774 /* If the incoming edge is executable, Compute the meet operator for
775 the existing value of the PHI node and the current PHI argument. */
776 if (e->flags & EDGE_EXECUTABLE)
777 {
0bca51f0
DN
778 tree arg = PHI_ARG_DEF (phi, i);
779 prop_value_t arg_val;
6de9cd9a 780
0bca51f0 781 if (is_gimple_min_invariant (arg))
750628d8 782 {
0bca51f0
DN
783 arg_val.lattice_val = CONSTANT;
784 arg_val.value = arg;
785 arg_val.mem_ref = NULL_TREE;
750628d8
DN
786 }
787 else
0bca51f0 788 arg_val = *(get_value (arg, true));
6de9cd9a 789
0bca51f0 790 ccp_lattice_meet (&new_val, &arg_val);
6de9cd9a 791
750628d8
DN
792 if (dump_file && (dump_flags & TDF_DETAILS))
793 {
794 fprintf (dump_file, "\t");
0bca51f0
DN
795 print_generic_expr (dump_file, arg, dump_flags);
796 dump_lattice_value (dump_file, "\tValue: ", arg_val);
750628d8
DN
797 fprintf (dump_file, "\n");
798 }
6de9cd9a 799
750628d8
DN
800 if (new_val.lattice_val == VARYING)
801 break;
802 }
803 }
6de9cd9a
DN
804
805 if (dump_file && (dump_flags & TDF_DETAILS))
750628d8
DN
806 {
807 dump_lattice_value (dump_file, "\n PHI node value: ", new_val);
808 fprintf (dump_file, "\n\n");
809 }
810
8c27b7d4 811 /* Check for an invalid change from UNKNOWN_VAL to UNDEFINED. */
0bca51f0
DN
812 if (do_store_ccp
813 && old_val->lattice_val == UNKNOWN_VAL
750628d8
DN
814 && new_val.lattice_val == UNDEFINED)
815 return SSA_PROP_NOT_INTERESTING;
816
817 /* Otherwise, make the transition to the new value. */
818 if (set_lattice_value (PHI_RESULT (phi), new_val))
819 {
820 if (new_val.lattice_val == VARYING)
821 return SSA_PROP_VARYING;
822 else
823 return SSA_PROP_INTERESTING;
824 }
825 else
826 return SSA_PROP_NOT_INTERESTING;
6de9cd9a
DN
827}
828
829
750628d8
DN
830/* CCP specific front-end to the non-destructive constant folding
831 routines.
6de9cd9a
DN
832
833 Attempt to simplify the RHS of STMT knowing that one or more
834 operands are constants.
835
836 If simplification is possible, return the simplified RHS,
837 otherwise return the original RHS. */
838
839static tree
840ccp_fold (tree stmt)
841{
842 tree rhs = get_rhs (stmt);
843 enum tree_code code = TREE_CODE (rhs);
6615c446 844 enum tree_code_class kind = TREE_CODE_CLASS (code);
6de9cd9a
DN
845 tree retval = NULL_TREE;
846
6de9cd9a 847 if (TREE_CODE (rhs) == SSA_NAME)
0bca51f0
DN
848 {
849 /* If the RHS is an SSA_NAME, return its known constant value,
850 if any. */
851 return get_value (rhs, true)->value;
852 }
853 else if (do_store_ccp && stmt_makes_single_load (stmt))
854 {
855 /* If the RHS is a memory load, see if the VUSEs associated with
856 it are a valid constant for that memory load. */
857 prop_value_t *val = get_value_loaded_by (stmt, const_val);
add9e6d3
AP
858 if (val && val->mem_ref)
859 {
860 if (operand_equal_p (val->mem_ref, rhs, 0))
861 return val->value;
862
863 /* If RHS is extracting REALPART_EXPR or IMAGPART_EXPR of a
864 complex type with a known constant value, return it. */
865 if ((TREE_CODE (rhs) == REALPART_EXPR
866 || TREE_CODE (rhs) == IMAGPART_EXPR)
867 && operand_equal_p (val->mem_ref, TREE_OPERAND (rhs, 0), 0))
868 return fold_build1 (TREE_CODE (rhs), TREE_TYPE (rhs), val->value);
869 }
870 return NULL_TREE;
0bca51f0 871 }
6de9cd9a
DN
872
873 /* Unary operators. Note that we know the single operand must
874 be a constant. So this should almost always return a
875 simplified RHS. */
6615c446 876 if (kind == tcc_unary)
6de9cd9a
DN
877 {
878 /* Handle unary operators which can appear in GIMPLE form. */
879 tree op0 = TREE_OPERAND (rhs, 0);
880
881 /* Simplify the operand down to a constant. */
882 if (TREE_CODE (op0) == SSA_NAME)
883 {
0bca51f0 884 prop_value_t *val = get_value (op0, true);
6de9cd9a 885 if (val->lattice_val == CONSTANT)
0bca51f0 886 op0 = get_value (op0, true)->value;
6de9cd9a
DN
887 }
888
078152a2
JH
889 if ((code == NOP_EXPR || code == CONVERT_EXPR)
890 && tree_ssa_useless_type_conversion_1 (TREE_TYPE (rhs),
891 TREE_TYPE (op0)))
892 return op0;
615bc06a 893 return fold_unary (code, TREE_TYPE (rhs), op0);
6de9cd9a
DN
894 }
895
896 /* Binary and comparison operators. We know one or both of the
897 operands are constants. */
6615c446
JO
898 else if (kind == tcc_binary
899 || kind == tcc_comparison
6de9cd9a
DN
900 || code == TRUTH_AND_EXPR
901 || code == TRUTH_OR_EXPR
902 || code == TRUTH_XOR_EXPR)
903 {
904 /* Handle binary and comparison operators that can appear in
905 GIMPLE form. */
906 tree op0 = TREE_OPERAND (rhs, 0);
907 tree op1 = TREE_OPERAND (rhs, 1);
908
909 /* Simplify the operands down to constants when appropriate. */
910 if (TREE_CODE (op0) == SSA_NAME)
911 {
0bca51f0 912 prop_value_t *val = get_value (op0, true);
6de9cd9a 913 if (val->lattice_val == CONSTANT)
0bca51f0 914 op0 = val->value;
6de9cd9a
DN
915 }
916
917 if (TREE_CODE (op1) == SSA_NAME)
918 {
0bca51f0 919 prop_value_t *val = get_value (op1, true);
6de9cd9a 920 if (val->lattice_val == CONSTANT)
0bca51f0 921 op1 = val->value;
6de9cd9a
DN
922 }
923
615bc06a 924 return fold_binary (code, TREE_TYPE (rhs), op0, op1);
6de9cd9a
DN
925 }
926
927 /* We may be able to fold away calls to builtin functions if their
9cf737f8 928 arguments are constants. */
6de9cd9a
DN
929 else if (code == CALL_EXPR
930 && TREE_CODE (TREE_OPERAND (rhs, 0)) == ADDR_EXPR
931 && (TREE_CODE (TREE_OPERAND (TREE_OPERAND (rhs, 0), 0))
932 == FUNCTION_DECL)
933 && DECL_BUILT_IN (TREE_OPERAND (TREE_OPERAND (rhs, 0), 0)))
934 {
f47c96aa 935 if (!ZERO_SSA_OPERANDS (stmt, SSA_OP_USE))
6de9cd9a 936 {
f47c96aa 937 tree *orig, var;
49d1af89 938 tree fndecl, arglist;
f47c96aa
AM
939 size_t i = 0;
940 ssa_op_iter iter;
941 use_operand_p var_p;
6de9cd9a
DN
942
943 /* Preserve the original values of every operand. */
858904db 944 orig = XNEWVEC (tree, NUM_SSA_OPERANDS (stmt, SSA_OP_USE));
f47c96aa
AM
945 FOR_EACH_SSA_TREE_OPERAND (var, stmt, iter, SSA_OP_USE)
946 orig[i++] = var;
6de9cd9a
DN
947
948 /* Substitute operands with their values and try to fold. */
0bca51f0 949 replace_uses_in (stmt, NULL, const_val);
49d1af89
KH
950 fndecl = get_callee_fndecl (rhs);
951 arglist = TREE_OPERAND (rhs, 1);
952 retval = fold_builtin (fndecl, arglist, false);
6de9cd9a
DN
953
954 /* Restore operands to their original form. */
f47c96aa
AM
955 i = 0;
956 FOR_EACH_SSA_USE_OPERAND (var_p, stmt, iter, SSA_OP_USE)
957 SET_USE (var_p, orig[i++]);
6de9cd9a
DN
958 free (orig);
959 }
960 }
961 else
962 return rhs;
963
964 /* If we got a simplified form, see if we need to convert its type. */
965 if (retval)
a32e70c3 966 return fold_convert (TREE_TYPE (rhs), retval);
6de9cd9a
DN
967
968 /* No simplification was possible. */
969 return rhs;
970}
971
972
ae3df618
SB
973/* Return the tree representing the element referenced by T if T is an
974 ARRAY_REF or COMPONENT_REF into constant aggregates. Return
975 NULL_TREE otherwise. */
976
977static tree
978fold_const_aggregate_ref (tree t)
979{
980 prop_value_t *value;
4038c495
GB
981 tree base, ctor, idx, field;
982 unsigned HOST_WIDE_INT cnt;
983 tree cfield, cval;
ae3df618
SB
984
985 switch (TREE_CODE (t))
986 {
987 case ARRAY_REF:
988 /* Get a CONSTRUCTOR. If BASE is a VAR_DECL, get its
989 DECL_INITIAL. If BASE is a nested reference into another
990 ARRAY_REF or COMPONENT_REF, make a recursive call to resolve
991 the inner reference. */
992 base = TREE_OPERAND (t, 0);
993 switch (TREE_CODE (base))
994 {
995 case VAR_DECL:
996 if (!TREE_READONLY (base)
997 || TREE_CODE (TREE_TYPE (base)) != ARRAY_TYPE
998 || !targetm.binds_local_p (base))
999 return NULL_TREE;
1000
1001 ctor = DECL_INITIAL (base);
1002 break;
1003
1004 case ARRAY_REF:
1005 case COMPONENT_REF:
1006 ctor = fold_const_aggregate_ref (base);
1007 break;
1008
1009 default:
1010 return NULL_TREE;
1011 }
1012
1013 if (ctor == NULL_TREE
faaf1436
RG
1014 || (TREE_CODE (ctor) != CONSTRUCTOR
1015 && TREE_CODE (ctor) != STRING_CST)
ae3df618
SB
1016 || !TREE_STATIC (ctor))
1017 return NULL_TREE;
1018
1019 /* Get the index. If we have an SSA_NAME, try to resolve it
1020 with the current lattice value for the SSA_NAME. */
1021 idx = TREE_OPERAND (t, 1);
1022 switch (TREE_CODE (idx))
1023 {
1024 case SSA_NAME:
1025 if ((value = get_value (idx, true))
1026 && value->lattice_val == CONSTANT
1027 && TREE_CODE (value->value) == INTEGER_CST)
1028 idx = value->value;
1029 else
1030 return NULL_TREE;
1031 break;
1032
1033 case INTEGER_CST:
1034 break;
1035
1036 default:
1037 return NULL_TREE;
1038 }
1039
faaf1436
RG
1040 /* Fold read from constant string. */
1041 if (TREE_CODE (ctor) == STRING_CST)
1042 {
1043 if ((TYPE_MODE (TREE_TYPE (t))
1044 == TYPE_MODE (TREE_TYPE (TREE_TYPE (ctor))))
1045 && (GET_MODE_CLASS (TYPE_MODE (TREE_TYPE (TREE_TYPE (ctor))))
1046 == MODE_INT)
1047 && GET_MODE_SIZE (TYPE_MODE (TREE_TYPE (TREE_TYPE (ctor)))) == 1
1048 && compare_tree_int (idx, TREE_STRING_LENGTH (ctor)) < 0)
1049 return build_int_cst (TREE_TYPE (t), (TREE_STRING_POINTER (ctor)
1050 [TREE_INT_CST_LOW (idx)]));
1051 return NULL_TREE;
1052 }
1053
ae3df618 1054 /* Whoo-hoo! I'll fold ya baby. Yeah! */
4038c495
GB
1055 FOR_EACH_CONSTRUCTOR_ELT (CONSTRUCTOR_ELTS (ctor), cnt, cfield, cval)
1056 if (tree_int_cst_equal (cfield, idx))
1057 return cval;
ae3df618
SB
1058 break;
1059
1060 case COMPONENT_REF:
1061 /* Get a CONSTRUCTOR. If BASE is a VAR_DECL, get its
1062 DECL_INITIAL. If BASE is a nested reference into another
1063 ARRAY_REF or COMPONENT_REF, make a recursive call to resolve
1064 the inner reference. */
1065 base = TREE_OPERAND (t, 0);
1066 switch (TREE_CODE (base))
1067 {
1068 case VAR_DECL:
1069 if (!TREE_READONLY (base)
1070 || TREE_CODE (TREE_TYPE (base)) != RECORD_TYPE
1071 || !targetm.binds_local_p (base))
1072 return NULL_TREE;
1073
1074 ctor = DECL_INITIAL (base);
1075 break;
1076
1077 case ARRAY_REF:
1078 case COMPONENT_REF:
1079 ctor = fold_const_aggregate_ref (base);
1080 break;
1081
1082 default:
1083 return NULL_TREE;
1084 }
1085
1086 if (ctor == NULL_TREE
1087 || TREE_CODE (ctor) != CONSTRUCTOR
1088 || !TREE_STATIC (ctor))
1089 return NULL_TREE;
1090
1091 field = TREE_OPERAND (t, 1);
1092
4038c495
GB
1093 FOR_EACH_CONSTRUCTOR_ELT (CONSTRUCTOR_ELTS (ctor), cnt, cfield, cval)
1094 if (cfield == field
ae3df618 1095 /* FIXME: Handle bit-fields. */
4038c495
GB
1096 && ! DECL_BIT_FIELD (cfield))
1097 return cval;
ae3df618
SB
1098 break;
1099
1ebd8d9a
SB
1100 case REALPART_EXPR:
1101 case IMAGPART_EXPR:
1102 {
1103 tree c = fold_const_aggregate_ref (TREE_OPERAND (t, 0));
1104 if (c && TREE_CODE (c) == COMPLEX_CST)
1105 return fold_build1 (TREE_CODE (t), TREE_TYPE (t), c);
1106 break;
1107 }
1108
ae3df618
SB
1109 default:
1110 break;
1111 }
1112
1113 return NULL_TREE;
1114}
1115
6de9cd9a
DN
1116/* Evaluate statement STMT. */
1117
0bca51f0 1118static prop_value_t
6de9cd9a
DN
1119evaluate_stmt (tree stmt)
1120{
0bca51f0 1121 prop_value_t val;
faaf1436 1122 tree simplified = NULL_TREE;
0bca51f0
DN
1123 ccp_lattice_t likelyvalue = likely_value (stmt);
1124
1125 val.mem_ref = NULL_TREE;
6de9cd9a
DN
1126
1127 /* If the statement is likely to have a CONSTANT result, then try
1128 to fold the statement to determine the constant value. */
1129 if (likelyvalue == CONSTANT)
1130 simplified = ccp_fold (stmt);
1131 /* If the statement is likely to have a VARYING result, then do not
1132 bother folding the statement. */
faaf1436 1133 if (likelyvalue == VARYING)
6de9cd9a 1134 simplified = get_rhs (stmt);
ae3df618
SB
1135 /* If the statement is an ARRAY_REF or COMPONENT_REF into constant
1136 aggregates, extract the referenced constant. Otherwise the
1137 statement is likely to have an UNDEFINED value, and there will be
1138 nothing to do. Note that fold_const_aggregate_ref returns
1139 NULL_TREE if the first case does not match. */
faaf1436 1140 else if (!simplified)
ae3df618 1141 simplified = fold_const_aggregate_ref (get_rhs (stmt));
6de9cd9a
DN
1142
1143 if (simplified && is_gimple_min_invariant (simplified))
1144 {
1145 /* The statement produced a constant value. */
1146 val.lattice_val = CONSTANT;
0bca51f0 1147 val.value = simplified;
6de9cd9a
DN
1148 }
1149 else
1150 {
1151 /* The statement produced a nonconstant value. If the statement
0bca51f0
DN
1152 had UNDEFINED operands, then the result of the statement
1153 should be UNDEFINED. Otherwise, the statement is VARYING. */
a318e3ac
SB
1154 if (likelyvalue == UNDEFINED || likelyvalue == UNKNOWN_VAL)
1155 val.lattice_val = likelyvalue;
1156 else
1157 val.lattice_val = VARYING;
1158
0bca51f0 1159 val.value = NULL_TREE;
6de9cd9a 1160 }
750628d8
DN
1161
1162 return val;
6de9cd9a
DN
1163}
1164
1165
750628d8 1166/* Visit the assignment statement STMT. Set the value of its LHS to the
0bca51f0
DN
1167 value computed by the RHS and store LHS in *OUTPUT_P. If STMT
1168 creates virtual definitions, set the value of each new name to that
1169 of the RHS (if we can derive a constant out of the RHS). */
6de9cd9a 1170
750628d8
DN
1171static enum ssa_prop_result
1172visit_assignment (tree stmt, tree *output_p)
6de9cd9a 1173{
0bca51f0 1174 prop_value_t val;
750628d8 1175 tree lhs, rhs;
0bca51f0 1176 enum ssa_prop_result retval;
6de9cd9a 1177
750628d8
DN
1178 lhs = TREE_OPERAND (stmt, 0);
1179 rhs = TREE_OPERAND (stmt, 1);
6de9cd9a 1180
750628d8
DN
1181 if (TREE_CODE (rhs) == SSA_NAME)
1182 {
1183 /* For a simple copy operation, we copy the lattice values. */
0bca51f0 1184 prop_value_t *nval = get_value (rhs, true);
750628d8
DN
1185 val = *nval;
1186 }
0bca51f0 1187 else if (do_store_ccp && stmt_makes_single_load (stmt))
750628d8 1188 {
0bca51f0
DN
1189 /* Same as above, but the RHS is not a gimple register and yet
1190 has a known VUSE. If STMT is loading from the same memory
1191 location that created the SSA_NAMEs for the virtual operands,
1192 we can propagate the value on the RHS. */
1193 prop_value_t *nval = get_value_loaded_by (stmt, const_val);
1194
a318e3ac
SB
1195 if (nval && nval->mem_ref
1196 && operand_equal_p (nval->mem_ref, rhs, 0))
0bca51f0
DN
1197 val = *nval;
1198 else
1199 val = evaluate_stmt (stmt);
750628d8
DN
1200 }
1201 else
9390c347 1202 /* Evaluate the statement. */
750628d8 1203 val = evaluate_stmt (stmt);
6de9cd9a 1204
9390c347 1205 /* If the original LHS was a VIEW_CONVERT_EXPR, modify the constant
ae95537a 1206 value to be a VIEW_CONVERT_EXPR of the old constant value.
9390c347
RK
1207
1208 ??? Also, if this was a definition of a bitfield, we need to widen
750628d8
DN
1209 the constant value into the type of the destination variable. This
1210 should not be necessary if GCC represented bitfields properly. */
1211 {
9390c347
RK
1212 tree orig_lhs = TREE_OPERAND (stmt, 0);
1213
1214 if (TREE_CODE (orig_lhs) == VIEW_CONVERT_EXPR
1215 && val.lattice_val == CONSTANT)
1216 {
0dd4b47b
KH
1217 tree w = fold_unary (VIEW_CONVERT_EXPR,
1218 TREE_TYPE (TREE_OPERAND (orig_lhs, 0)),
1219 val.value);
ae95537a 1220
3d36fb45 1221 orig_lhs = TREE_OPERAND (orig_lhs, 0);
ae95537a 1222 if (w && is_gimple_min_invariant (w))
0bca51f0 1223 val.value = w;
ae95537a
RK
1224 else
1225 {
1226 val.lattice_val = VARYING;
0bca51f0 1227 val.value = NULL;
ae95537a 1228 }
9390c347
RK
1229 }
1230
750628d8 1231 if (val.lattice_val == CONSTANT
9390c347
RK
1232 && TREE_CODE (orig_lhs) == COMPONENT_REF
1233 && DECL_BIT_FIELD (TREE_OPERAND (orig_lhs, 1)))
6de9cd9a 1234 {
0bca51f0 1235 tree w = widen_bitfield (val.value, TREE_OPERAND (orig_lhs, 1),
9390c347 1236 orig_lhs);
750628d8
DN
1237
1238 if (w && is_gimple_min_invariant (w))
0bca51f0 1239 val.value = w;
750628d8 1240 else
6de9cd9a 1241 {
750628d8 1242 val.lattice_val = VARYING;
0bca51f0
DN
1243 val.value = NULL_TREE;
1244 val.mem_ref = NULL_TREE;
6de9cd9a 1245 }
6de9cd9a 1246 }
750628d8 1247 }
6de9cd9a 1248
0bca51f0 1249 retval = SSA_PROP_NOT_INTERESTING;
6de9cd9a 1250
750628d8 1251 /* Set the lattice value of the statement's output. */
0bca51f0 1252 if (TREE_CODE (lhs) == SSA_NAME)
6de9cd9a 1253 {
0bca51f0
DN
1254 /* If STMT is an assignment to an SSA_NAME, we only have one
1255 value to set. */
1256 if (set_lattice_value (lhs, val))
1257 {
1258 *output_p = lhs;
1259 if (val.lattice_val == VARYING)
1260 retval = SSA_PROP_VARYING;
1261 else
1262 retval = SSA_PROP_INTERESTING;
1263 }
6de9cd9a 1264 }
0bca51f0
DN
1265 else if (do_store_ccp && stmt_makes_single_store (stmt))
1266 {
1267 /* Otherwise, set the names in V_MAY_DEF/V_MUST_DEF operands
1268 to the new constant value and mark the LHS as the memory
1269 reference associated with VAL. */
1270 ssa_op_iter i;
1271 tree vdef;
1272 bool changed;
1273
1274 /* Stores cannot take on an UNDEFINED value. */
1275 if (val.lattice_val == UNDEFINED)
1276 val.lattice_val = UNKNOWN_VAL;
1277
1278 /* Mark VAL as stored in the LHS of this assignment. */
1279 val.mem_ref = lhs;
1280
1281 /* Set the value of every VDEF to VAL. */
1282 changed = false;
1283 FOR_EACH_SSA_TREE_OPERAND (vdef, stmt, i, SSA_OP_VIRTUAL_DEFS)
1284 changed |= set_lattice_value (vdef, val);
1285
1286 /* Note that for propagation purposes, we are only interested in
1287 visiting statements that load the exact same memory reference
1288 stored here. Those statements will have the exact same list
1289 of virtual uses, so it is enough to set the output of this
1290 statement to be its first virtual definition. */
1291 *output_p = first_vdef (stmt);
1292 if (changed)
1293 {
1294 if (val.lattice_val == VARYING)
1295 retval = SSA_PROP_VARYING;
1296 else
1297 retval = SSA_PROP_INTERESTING;
1298 }
1299 }
1300
1301 return retval;
6de9cd9a
DN
1302}
1303
6de9cd9a 1304
750628d8
DN
1305/* Visit the conditional statement STMT. Return SSA_PROP_INTERESTING
1306 if it can determine which edge will be taken. Otherwise, return
1307 SSA_PROP_VARYING. */
1308
1309static enum ssa_prop_result
1310visit_cond_stmt (tree stmt, edge *taken_edge_p)
6de9cd9a 1311{
0bca51f0 1312 prop_value_t val;
750628d8
DN
1313 basic_block block;
1314
1315 block = bb_for_stmt (stmt);
1316 val = evaluate_stmt (stmt);
1317
1318 /* Find which edge out of the conditional block will be taken and add it
1319 to the worklist. If no single edge can be determined statically,
1320 return SSA_PROP_VARYING to feed all the outgoing edges to the
1321 propagation engine. */
0bca51f0 1322 *taken_edge_p = val.value ? find_taken_edge (block, val.value) : 0;
750628d8
DN
1323 if (*taken_edge_p)
1324 return SSA_PROP_INTERESTING;
1325 else
1326 return SSA_PROP_VARYING;
6de9cd9a
DN
1327}
1328
6de9cd9a 1329
750628d8
DN
1330/* Evaluate statement STMT. If the statement produces an output value and
1331 its evaluation changes the lattice value of its output, return
1332 SSA_PROP_INTERESTING and set *OUTPUT_P to the SSA_NAME holding the
1333 output value.
1334
1335 If STMT is a conditional branch and we can determine its truth
1336 value, set *TAKEN_EDGE_P accordingly. If STMT produces a varying
1337 value, return SSA_PROP_VARYING. */
6de9cd9a 1338
750628d8
DN
1339static enum ssa_prop_result
1340ccp_visit_stmt (tree stmt, edge *taken_edge_p, tree *output_p)
1341{
750628d8
DN
1342 tree def;
1343 ssa_op_iter iter;
6de9cd9a 1344
750628d8 1345 if (dump_file && (dump_flags & TDF_DETAILS))
6de9cd9a 1346 {
0bca51f0
DN
1347 fprintf (dump_file, "\nVisiting statement:\n");
1348 print_generic_stmt (dump_file, stmt, dump_flags);
750628d8 1349 fprintf (dump_file, "\n");
6de9cd9a 1350 }
6de9cd9a 1351
0bca51f0 1352 if (TREE_CODE (stmt) == MODIFY_EXPR)
6de9cd9a 1353 {
750628d8
DN
1354 /* If the statement is an assignment that produces a single
1355 output value, evaluate its RHS to see if the lattice value of
1356 its output has changed. */
1357 return visit_assignment (stmt, output_p);
6de9cd9a 1358 }
750628d8 1359 else if (TREE_CODE (stmt) == COND_EXPR || TREE_CODE (stmt) == SWITCH_EXPR)
6de9cd9a 1360 {
750628d8
DN
1361 /* If STMT is a conditional branch, see if we can determine
1362 which branch will be taken. */
1363 return visit_cond_stmt (stmt, taken_edge_p);
6de9cd9a 1364 }
6de9cd9a 1365
750628d8
DN
1366 /* Any other kind of statement is not interesting for constant
1367 propagation and, therefore, not worth simulating. */
750628d8
DN
1368 if (dump_file && (dump_flags & TDF_DETAILS))
1369 fprintf (dump_file, "No interesting values produced. Marked VARYING.\n");
6de9cd9a 1370
750628d8
DN
1371 /* Definitions made by statements other than assignments to
1372 SSA_NAMEs represent unknown modifications to their outputs.
1373 Mark them VARYING. */
0bca51f0
DN
1374 FOR_EACH_SSA_TREE_OPERAND (def, stmt, iter, SSA_OP_ALL_DEFS)
1375 {
1376 prop_value_t v = { VARYING, NULL_TREE, NULL_TREE };
1377 set_lattice_value (def, v);
1378 }
6de9cd9a 1379
750628d8
DN
1380 return SSA_PROP_VARYING;
1381}
6de9cd9a 1382
6de9cd9a 1383
0bca51f0 1384/* Main entry point for SSA Conditional Constant Propagation. */
750628d8
DN
1385
1386static void
0bca51f0 1387execute_ssa_ccp (bool store_ccp)
750628d8 1388{
0bca51f0 1389 do_store_ccp = store_ccp;
750628d8
DN
1390 ccp_initialize ();
1391 ssa_propagate (ccp_visit_stmt, ccp_visit_phi_node);
1392 ccp_finalize ();
6de9cd9a
DN
1393}
1394
173b818d 1395
c2924966 1396static unsigned int
0bca51f0
DN
1397do_ssa_ccp (void)
1398{
1399 execute_ssa_ccp (false);
c2924966 1400 return 0;
0bca51f0
DN
1401}
1402
1403
173b818d 1404static bool
750628d8 1405gate_ccp (void)
173b818d 1406{
750628d8 1407 return flag_tree_ccp != 0;
173b818d
BB
1408}
1409
6de9cd9a 1410
750628d8
DN
1411struct tree_opt_pass pass_ccp =
1412{
1413 "ccp", /* name */
1414 gate_ccp, /* gate */
0bca51f0 1415 do_ssa_ccp, /* execute */
750628d8
DN
1416 NULL, /* sub */
1417 NULL, /* next */
1418 0, /* static_pass_number */
1419 TV_TREE_CCP, /* tv_id */
1420 PROP_cfg | PROP_ssa | PROP_alias, /* properties_required */
1421 0, /* properties_provided */
18cd8a03 1422 PROP_smt_usage, /* properties_destroyed */
750628d8 1423 0, /* todo_flags_start */
0bca51f0 1424 TODO_cleanup_cfg | TODO_dump_func | TODO_update_ssa
750628d8 1425 | TODO_ggc_collect | TODO_verify_ssa
18cd8a03 1426 | TODO_verify_stmts | TODO_update_smt_usage, /* todo_flags_finish */
9f8628ba 1427 0 /* letter */
750628d8 1428};
6de9cd9a 1429
6de9cd9a 1430
c2924966 1431static unsigned int
0bca51f0
DN
1432do_ssa_store_ccp (void)
1433{
1434 /* If STORE-CCP is not enabled, we just run regular CCP. */
1435 execute_ssa_ccp (flag_tree_store_ccp != 0);
c2924966 1436 return 0;
0bca51f0
DN
1437}
1438
1439static bool
1440gate_store_ccp (void)
1441{
1442 /* STORE-CCP is enabled only with -ftree-store-ccp, but when
1443 -fno-tree-store-ccp is specified, we should run regular CCP.
1444 That's why the pass is enabled with either flag. */
1445 return flag_tree_store_ccp != 0 || flag_tree_ccp != 0;
1446}
1447
1448
1449struct tree_opt_pass pass_store_ccp =
1450{
1451 "store_ccp", /* name */
1452 gate_store_ccp, /* gate */
1453 do_ssa_store_ccp, /* execute */
1454 NULL, /* sub */
1455 NULL, /* next */
1456 0, /* static_pass_number */
1457 TV_TREE_STORE_CCP, /* tv_id */
1458 PROP_cfg | PROP_ssa | PROP_alias, /* properties_required */
1459 0, /* properties_provided */
18cd8a03 1460 PROP_smt_usage, /* properties_destroyed */
0bca51f0
DN
1461 0, /* todo_flags_start */
1462 TODO_dump_func | TODO_update_ssa
1463 | TODO_ggc_collect | TODO_verify_ssa
1464 | TODO_cleanup_cfg
18cd8a03 1465 | TODO_verify_stmts | TODO_update_smt_usage, /* todo_flags_finish */
0bca51f0
DN
1466 0 /* letter */
1467};
1468
750628d8
DN
1469/* Given a constant value VAL for bitfield FIELD, and a destination
1470 variable VAR, return VAL appropriately widened to fit into VAR. If
1471 FIELD is wider than HOST_WIDE_INT, NULL is returned. */
6de9cd9a 1472
750628d8
DN
1473tree
1474widen_bitfield (tree val, tree field, tree var)
6de9cd9a 1475{
750628d8
DN
1476 unsigned HOST_WIDE_INT var_size, field_size;
1477 tree wide_val;
1478 unsigned HOST_WIDE_INT mask;
1479 unsigned int i;
6de9cd9a 1480
750628d8
DN
1481 /* We can only do this if the size of the type and field and VAL are
1482 all constants representable in HOST_WIDE_INT. */
1483 if (!host_integerp (TYPE_SIZE (TREE_TYPE (var)), 1)
1484 || !host_integerp (DECL_SIZE (field), 1)
1485 || !host_integerp (val, 0))
1486 return NULL_TREE;
6de9cd9a 1487
750628d8
DN
1488 var_size = tree_low_cst (TYPE_SIZE (TREE_TYPE (var)), 1);
1489 field_size = tree_low_cst (DECL_SIZE (field), 1);
6de9cd9a 1490
750628d8
DN
1491 /* Give up if either the bitfield or the variable are too wide. */
1492 if (field_size > HOST_BITS_PER_WIDE_INT || var_size > HOST_BITS_PER_WIDE_INT)
1493 return NULL_TREE;
6de9cd9a 1494
1e128c5f 1495 gcc_assert (var_size >= field_size);
6de9cd9a 1496
750628d8
DN
1497 /* If the sign bit of the value is not set or the field's type is unsigned,
1498 just mask off the high order bits of the value. */
1499 if (DECL_UNSIGNED (field)
1500 || !(tree_low_cst (val, 0) & (((HOST_WIDE_INT)1) << (field_size - 1))))
1501 {
1502 /* Zero extension. Build a mask with the lower 'field_size' bits
1503 set and a BIT_AND_EXPR node to clear the high order bits of
1504 the value. */
1505 for (i = 0, mask = 0; i < field_size; i++)
1506 mask |= ((HOST_WIDE_INT) 1) << i;
6de9cd9a 1507
f457cf40
JM
1508 wide_val = fold_build2 (BIT_AND_EXPR, TREE_TYPE (var), val,
1509 build_int_cst (TREE_TYPE (var), mask));
6de9cd9a 1510 }
750628d8 1511 else
173b818d 1512 {
750628d8
DN
1513 /* Sign extension. Create a mask with the upper 'field_size'
1514 bits set and a BIT_IOR_EXPR to set the high order bits of the
1515 value. */
1516 for (i = 0, mask = 0; i < (var_size - field_size); i++)
1517 mask |= ((HOST_WIDE_INT) 1) << (var_size - i - 1);
1518
f457cf40
JM
1519 wide_val = fold_build2 (BIT_IOR_EXPR, TREE_TYPE (var), val,
1520 build_int_cst (TREE_TYPE (var), mask));
173b818d 1521 }
6de9cd9a 1522
f457cf40 1523 return wide_val;
6de9cd9a
DN
1524}
1525
750628d8 1526
6de9cd9a
DN
1527/* A subroutine of fold_stmt_r. Attempts to fold *(A+O) to A[X].
1528 BASE is an array type. OFFSET is a byte displacement. ORIG_TYPE
9cf737f8 1529 is the desired result type. */
6de9cd9a
DN
1530
1531static tree
1532maybe_fold_offset_to_array_ref (tree base, tree offset, tree orig_type)
1533{
44de5aeb
RK
1534 tree min_idx, idx, elt_offset = integer_zero_node;
1535 tree array_type, elt_type, elt_size;
1536
1537 /* If BASE is an ARRAY_REF, we can pick up another offset (this time
1538 measured in units of the size of elements type) from that ARRAY_REF).
1539 We can't do anything if either is variable.
1540
1541 The case we handle here is *(&A[N]+O). */
1542 if (TREE_CODE (base) == ARRAY_REF)
1543 {
1544 tree low_bound = array_ref_low_bound (base);
1545
1546 elt_offset = TREE_OPERAND (base, 1);
1547 if (TREE_CODE (low_bound) != INTEGER_CST
1548 || TREE_CODE (elt_offset) != INTEGER_CST)
1549 return NULL_TREE;
1550
1551 elt_offset = int_const_binop (MINUS_EXPR, elt_offset, low_bound, 0);
1552 base = TREE_OPERAND (base, 0);
1553 }
6de9cd9a
DN
1554
1555 /* Ignore stupid user tricks of indexing non-array variables. */
1556 array_type = TREE_TYPE (base);
1557 if (TREE_CODE (array_type) != ARRAY_TYPE)
1558 return NULL_TREE;
1559 elt_type = TREE_TYPE (array_type);
1560 if (!lang_hooks.types_compatible_p (orig_type, elt_type))
1561 return NULL_TREE;
1562
44de5aeb
RK
1563 /* If OFFSET and ELT_OFFSET are zero, we don't care about the size of the
1564 element type (so we can use the alignment if it's not constant).
1565 Otherwise, compute the offset as an index by using a division. If the
1566 division isn't exact, then don't do anything. */
6de9cd9a 1567 elt_size = TYPE_SIZE_UNIT (elt_type);
44de5aeb
RK
1568 if (integer_zerop (offset))
1569 {
1570 if (TREE_CODE (elt_size) != INTEGER_CST)
1571 elt_size = size_int (TYPE_ALIGN (elt_type));
6de9cd9a 1572
44de5aeb
RK
1573 idx = integer_zero_node;
1574 }
1575 else
1576 {
1577 unsigned HOST_WIDE_INT lquo, lrem;
1578 HOST_WIDE_INT hquo, hrem;
1579
1580 if (TREE_CODE (elt_size) != INTEGER_CST
1581 || div_and_round_double (TRUNC_DIV_EXPR, 1,
1582 TREE_INT_CST_LOW (offset),
1583 TREE_INT_CST_HIGH (offset),
1584 TREE_INT_CST_LOW (elt_size),
1585 TREE_INT_CST_HIGH (elt_size),
1586 &lquo, &hquo, &lrem, &hrem)
1587 || lrem || hrem)
1588 return NULL_TREE;
6de9cd9a 1589
7d60be94 1590 idx = build_int_cst_wide (NULL_TREE, lquo, hquo);
44de5aeb
RK
1591 }
1592
1593 /* Assume the low bound is zero. If there is a domain type, get the
1594 low bound, if any, convert the index into that type, and add the
1595 low bound. */
1596 min_idx = integer_zero_node;
1597 if (TYPE_DOMAIN (array_type))
6de9cd9a 1598 {
44de5aeb
RK
1599 if (TYPE_MIN_VALUE (TYPE_DOMAIN (array_type)))
1600 min_idx = TYPE_MIN_VALUE (TYPE_DOMAIN (array_type));
1601 else
1602 min_idx = fold_convert (TYPE_DOMAIN (array_type), min_idx);
1603
1604 if (TREE_CODE (min_idx) != INTEGER_CST)
1605 return NULL_TREE;
1606
1607 idx = fold_convert (TYPE_DOMAIN (array_type), idx);
1608 elt_offset = fold_convert (TYPE_DOMAIN (array_type), elt_offset);
6de9cd9a
DN
1609 }
1610
44de5aeb
RK
1611 if (!integer_zerop (min_idx))
1612 idx = int_const_binop (PLUS_EXPR, idx, min_idx, 0);
1613 if (!integer_zerop (elt_offset))
1614 idx = int_const_binop (PLUS_EXPR, idx, elt_offset, 0);
1615
b4257cfc
RG
1616 return build4 (ARRAY_REF, orig_type, base, idx, min_idx,
1617 size_int (tree_low_cst (elt_size, 1)
1618 / (TYPE_ALIGN_UNIT (elt_type))));
6de9cd9a
DN
1619}
1620
750628d8 1621
6de9cd9a
DN
1622/* A subroutine of fold_stmt_r. Attempts to fold *(S+O) to S.X.
1623 BASE is a record type. OFFSET is a byte displacement. ORIG_TYPE
1624 is the desired result type. */
1625/* ??? This doesn't handle class inheritance. */
1626
1627static tree
1628maybe_fold_offset_to_component_ref (tree record_type, tree base, tree offset,
1629 tree orig_type, bool base_is_ptr)
1630{
f34fa464 1631 tree f, t, field_type, tail_array_field, field_offset;
6de9cd9a
DN
1632
1633 if (TREE_CODE (record_type) != RECORD_TYPE
1634 && TREE_CODE (record_type) != UNION_TYPE
1635 && TREE_CODE (record_type) != QUAL_UNION_TYPE)
1636 return NULL_TREE;
1637
1638 /* Short-circuit silly cases. */
1639 if (lang_hooks.types_compatible_p (record_type, orig_type))
1640 return NULL_TREE;
1641
1642 tail_array_field = NULL_TREE;
1643 for (f = TYPE_FIELDS (record_type); f ; f = TREE_CHAIN (f))
1644 {
1645 int cmp;
1646
1647 if (TREE_CODE (f) != FIELD_DECL)
1648 continue;
1649 if (DECL_BIT_FIELD (f))
1650 continue;
f34fa464
ZD
1651
1652 field_offset = byte_position (f);
1653 if (TREE_CODE (field_offset) != INTEGER_CST)
6de9cd9a
DN
1654 continue;
1655
1656 /* ??? Java creates "interesting" fields for representing base classes.
1657 They have no name, and have no context. With no context, we get into
1658 trouble with nonoverlapping_component_refs_p. Skip them. */
1659 if (!DECL_FIELD_CONTEXT (f))
1660 continue;
1661
1662 /* The previous array field isn't at the end. */
1663 tail_array_field = NULL_TREE;
1664
1665 /* Check to see if this offset overlaps with the field. */
f34fa464 1666 cmp = tree_int_cst_compare (field_offset, offset);
6de9cd9a
DN
1667 if (cmp > 0)
1668 continue;
1669
1670 field_type = TREE_TYPE (f);
6de9cd9a
DN
1671
1672 /* Here we exactly match the offset being checked. If the types match,
1673 then we can return that field. */
53dba802
ZD
1674 if (cmp == 0
1675 && lang_hooks.types_compatible_p (orig_type, field_type))
6de9cd9a
DN
1676 {
1677 if (base_is_ptr)
1678 base = build1 (INDIRECT_REF, record_type, base);
b4257cfc 1679 t = build3 (COMPONENT_REF, field_type, base, f, NULL_TREE);
6de9cd9a
DN
1680 return t;
1681 }
53dba802
ZD
1682
1683 /* Don't care about offsets into the middle of scalars. */
1684 if (!AGGREGATE_TYPE_P (field_type))
1685 continue;
6de9cd9a 1686
53dba802
ZD
1687 /* Check for array at the end of the struct. This is often
1688 used as for flexible array members. We should be able to
1689 turn this into an array access anyway. */
1690 if (TREE_CODE (field_type) == ARRAY_TYPE)
1691 tail_array_field = f;
1692
1693 /* Check the end of the field against the offset. */
1694 if (!DECL_SIZE_UNIT (f)
1695 || TREE_CODE (DECL_SIZE_UNIT (f)) != INTEGER_CST)
1696 continue;
1697 t = int_const_binop (MINUS_EXPR, offset, field_offset, 1);
1698 if (!tree_int_cst_lt (t, DECL_SIZE_UNIT (f)))
1699 continue;
6de9cd9a 1700
53dba802
ZD
1701 /* If we matched, then set offset to the displacement into
1702 this field. */
1703 offset = t;
6de9cd9a
DN
1704 goto found;
1705 }
1706
1707 if (!tail_array_field)
1708 return NULL_TREE;
1709
1710 f = tail_array_field;
1711 field_type = TREE_TYPE (f);
53dba802 1712 offset = int_const_binop (MINUS_EXPR, offset, byte_position (f), 1);
6de9cd9a
DN
1713
1714 found:
1715 /* If we get here, we've got an aggregate field, and a possibly
1ea7e6ad 1716 nonzero offset into them. Recurse and hope for a valid match. */
6de9cd9a
DN
1717 if (base_is_ptr)
1718 base = build1 (INDIRECT_REF, record_type, base);
b4257cfc 1719 base = build3 (COMPONENT_REF, field_type, base, f, NULL_TREE);
6de9cd9a
DN
1720
1721 t = maybe_fold_offset_to_array_ref (base, offset, orig_type);
1722 if (t)
1723 return t;
1724 return maybe_fold_offset_to_component_ref (field_type, base, offset,
1725 orig_type, false);
1726}
1727
750628d8 1728
6de9cd9a
DN
1729/* A subroutine of fold_stmt_r. Attempt to simplify *(BASE+OFFSET).
1730 Return the simplified expression, or NULL if nothing could be done. */
1731
1732static tree
1733maybe_fold_stmt_indirect (tree expr, tree base, tree offset)
1734{
1735 tree t;
1736
1737 /* We may well have constructed a double-nested PLUS_EXPR via multiple
1738 substitutions. Fold that down to one. Remove NON_LVALUE_EXPRs that
1739 are sometimes added. */
1740 base = fold (base);
ff7c8597 1741 STRIP_TYPE_NOPS (base);
6de9cd9a
DN
1742 TREE_OPERAND (expr, 0) = base;
1743
1744 /* One possibility is that the address reduces to a string constant. */
1745 t = fold_read_from_constant_string (expr);
1746 if (t)
1747 return t;
1748
1749 /* Add in any offset from a PLUS_EXPR. */
1750 if (TREE_CODE (base) == PLUS_EXPR)
1751 {
1752 tree offset2;
1753
1754 offset2 = TREE_OPERAND (base, 1);
1755 if (TREE_CODE (offset2) != INTEGER_CST)
1756 return NULL_TREE;
1757 base = TREE_OPERAND (base, 0);
1758
1759 offset = int_const_binop (PLUS_EXPR, offset, offset2, 1);
1760 }
1761
1762 if (TREE_CODE (base) == ADDR_EXPR)
1763 {
1764 /* Strip the ADDR_EXPR. */
1765 base = TREE_OPERAND (base, 0);
1766
0534fa56
RH
1767 /* Fold away CONST_DECL to its value, if the type is scalar. */
1768 if (TREE_CODE (base) == CONST_DECL
688e936d 1769 && ccp_decl_initial_min_invariant (DECL_INITIAL (base)))
0534fa56
RH
1770 return DECL_INITIAL (base);
1771
6de9cd9a
DN
1772 /* Try folding *(&B+O) to B[X]. */
1773 t = maybe_fold_offset_to_array_ref (base, offset, TREE_TYPE (expr));
1774 if (t)
1775 return t;
1776
1777 /* Try folding *(&B+O) to B.X. */
1778 t = maybe_fold_offset_to_component_ref (TREE_TYPE (base), base, offset,
1779 TREE_TYPE (expr), false);
1780 if (t)
1781 return t;
1782
44de5aeb
RK
1783 /* Fold *&B to B. We can only do this if EXPR is the same type
1784 as BASE. We can't do this if EXPR is the element type of an array
1785 and BASE is the array. */
1786 if (integer_zerop (offset)
1787 && lang_hooks.types_compatible_p (TREE_TYPE (base),
1788 TREE_TYPE (expr)))
6de9cd9a
DN
1789 return base;
1790 }
1791 else
1792 {
1793 /* We can get here for out-of-range string constant accesses,
1794 such as "_"[3]. Bail out of the entire substitution search
1795 and arrange for the entire statement to be replaced by a
aabcd309 1796 call to __builtin_trap. In all likelihood this will all be
6de9cd9a
DN
1797 constant-folded away, but in the meantime we can't leave with
1798 something that get_expr_operands can't understand. */
1799
1800 t = base;
1801 STRIP_NOPS (t);
1802 if (TREE_CODE (t) == ADDR_EXPR
1803 && TREE_CODE (TREE_OPERAND (t, 0)) == STRING_CST)
1804 {
1805 /* FIXME: Except that this causes problems elsewhere with dead
0e61db61 1806 code not being deleted, and we die in the rtl expanders
6de9cd9a
DN
1807 because we failed to remove some ssa_name. In the meantime,
1808 just return zero. */
1809 /* FIXME2: This condition should be signaled by
1810 fold_read_from_constant_string directly, rather than
1811 re-checking for it here. */
1812 return integer_zero_node;
1813 }
1814
1815 /* Try folding *(B+O) to B->X. Still an improvement. */
1816 if (POINTER_TYPE_P (TREE_TYPE (base)))
1817 {
1818 t = maybe_fold_offset_to_component_ref (TREE_TYPE (TREE_TYPE (base)),
1819 base, offset,
1820 TREE_TYPE (expr), true);
1821 if (t)
1822 return t;
1823 }
1824 }
1825
1826 /* Otherwise we had an offset that we could not simplify. */
1827 return NULL_TREE;
1828}
1829
750628d8 1830
6de9cd9a
DN
1831/* A subroutine of fold_stmt_r. EXPR is a PLUS_EXPR.
1832
1833 A quaint feature extant in our address arithmetic is that there
1834 can be hidden type changes here. The type of the result need
1835 not be the same as the type of the input pointer.
1836
1837 What we're after here is an expression of the form
1838 (T *)(&array + const)
1839 where the cast doesn't actually exist, but is implicit in the
1840 type of the PLUS_EXPR. We'd like to turn this into
1841 &array[x]
1842 which may be able to propagate further. */
1843
1844static tree
1845maybe_fold_stmt_addition (tree expr)
1846{
1847 tree op0 = TREE_OPERAND (expr, 0);
1848 tree op1 = TREE_OPERAND (expr, 1);
1849 tree ptr_type = TREE_TYPE (expr);
1850 tree ptd_type;
1851 tree t;
1852 bool subtract = (TREE_CODE (expr) == MINUS_EXPR);
1853
1854 /* We're only interested in pointer arithmetic. */
1855 if (!POINTER_TYPE_P (ptr_type))
1856 return NULL_TREE;
1857 /* Canonicalize the integral operand to op1. */
1858 if (INTEGRAL_TYPE_P (TREE_TYPE (op0)))
1859 {
1860 if (subtract)
1861 return NULL_TREE;
1862 t = op0, op0 = op1, op1 = t;
1863 }
1864 /* It had better be a constant. */
1865 if (TREE_CODE (op1) != INTEGER_CST)
1866 return NULL_TREE;
1867 /* The first operand should be an ADDR_EXPR. */
1868 if (TREE_CODE (op0) != ADDR_EXPR)
1869 return NULL_TREE;
1870 op0 = TREE_OPERAND (op0, 0);
1871
1872 /* If the first operand is an ARRAY_REF, expand it so that we can fold
1873 the offset into it. */
1874 while (TREE_CODE (op0) == ARRAY_REF)
1875 {
1876 tree array_obj = TREE_OPERAND (op0, 0);
1877 tree array_idx = TREE_OPERAND (op0, 1);
1878 tree elt_type = TREE_TYPE (op0);
1879 tree elt_size = TYPE_SIZE_UNIT (elt_type);
1880 tree min_idx;
1881
1882 if (TREE_CODE (array_idx) != INTEGER_CST)
1883 break;
1884 if (TREE_CODE (elt_size) != INTEGER_CST)
1885 break;
1886
1887 /* Un-bias the index by the min index of the array type. */
1888 min_idx = TYPE_DOMAIN (TREE_TYPE (array_obj));
1889 if (min_idx)
1890 {
1891 min_idx = TYPE_MIN_VALUE (min_idx);
1892 if (min_idx)
1893 {
44de5aeb
RK
1894 if (TREE_CODE (min_idx) != INTEGER_CST)
1895 break;
1896
b6f65e3c 1897 array_idx = fold_convert (TREE_TYPE (min_idx), array_idx);
6de9cd9a
DN
1898 if (!integer_zerop (min_idx))
1899 array_idx = int_const_binop (MINUS_EXPR, array_idx,
1900 min_idx, 0);
1901 }
1902 }
1903
1904 /* Convert the index to a byte offset. */
b6f65e3c 1905 array_idx = fold_convert (sizetype, array_idx);
6de9cd9a
DN
1906 array_idx = int_const_binop (MULT_EXPR, array_idx, elt_size, 0);
1907
1908 /* Update the operands for the next round, or for folding. */
1909 /* If we're manipulating unsigned types, then folding into negative
1910 values can produce incorrect results. Particularly if the type
1911 is smaller than the width of the pointer. */
1912 if (subtract
1913 && TYPE_UNSIGNED (TREE_TYPE (op1))
1914 && tree_int_cst_lt (array_idx, op1))
1915 return NULL;
1916 op1 = int_const_binop (subtract ? MINUS_EXPR : PLUS_EXPR,
1917 array_idx, op1, 0);
1918 subtract = false;
1919 op0 = array_obj;
1920 }
1921
1922 /* If we weren't able to fold the subtraction into another array reference,
1923 canonicalize the integer for passing to the array and component ref
1924 simplification functions. */
1925 if (subtract)
1926 {
1927 if (TYPE_UNSIGNED (TREE_TYPE (op1)))
1928 return NULL;
0dd4b47b 1929 op1 = fold_unary (NEGATE_EXPR, TREE_TYPE (op1), op1);
6de9cd9a 1930 /* ??? In theory fold should always produce another integer. */
0dd4b47b 1931 if (op1 == NULL || TREE_CODE (op1) != INTEGER_CST)
6de9cd9a
DN
1932 return NULL;
1933 }
1934
1935 ptd_type = TREE_TYPE (ptr_type);
1936
1937 /* At which point we can try some of the same things as for indirects. */
1938 t = maybe_fold_offset_to_array_ref (op0, op1, ptd_type);
1939 if (!t)
1940 t = maybe_fold_offset_to_component_ref (TREE_TYPE (op0), op0, op1,
1941 ptd_type, false);
1942 if (t)
1943 t = build1 (ADDR_EXPR, ptr_type, t);
1944
1945 return t;
1946}
1947
622f91ba
JL
1948/* For passing state through walk_tree into fold_stmt_r and its
1949 children. */
1950
1951struct fold_stmt_r_data
1952{
1953 bool *changed_p;
1954 bool *inside_addr_expr_p;
1955};
1956
6de9cd9a
DN
1957/* Subroutine of fold_stmt called via walk_tree. We perform several
1958 simplifications of EXPR_P, mostly having to do with pointer arithmetic. */
1959
1960static tree
1961fold_stmt_r (tree *expr_p, int *walk_subtrees, void *data)
1962{
858904db 1963 struct fold_stmt_r_data *fold_stmt_r_data = (struct fold_stmt_r_data *) data;
622f91ba
JL
1964 bool *inside_addr_expr_p = fold_stmt_r_data->inside_addr_expr_p;
1965 bool *changed_p = fold_stmt_r_data->changed_p;
6de9cd9a
DN
1966 tree expr = *expr_p, t;
1967
1968 /* ??? It'd be nice if walk_tree had a pre-order option. */
1969 switch (TREE_CODE (expr))
1970 {
1971 case INDIRECT_REF:
1972 t = walk_tree (&TREE_OPERAND (expr, 0), fold_stmt_r, data, NULL);
1973 if (t)
1974 return t;
1975 *walk_subtrees = 0;
1976
1977 t = maybe_fold_stmt_indirect (expr, TREE_OPERAND (expr, 0),
1978 integer_zero_node);
1979 break;
1980
622f91ba 1981 /* ??? Could handle more ARRAY_REFs here, as a variant of INDIRECT_REF.
6de9cd9a
DN
1982 We'd only want to bother decomposing an existing ARRAY_REF if
1983 the base array is found to have another offset contained within.
1984 Otherwise we'd be wasting time. */
622f91ba
JL
1985 case ARRAY_REF:
1986 /* If we are not processing expressions found within an
1987 ADDR_EXPR, then we can fold constant array references. */
1988 if (!*inside_addr_expr_p)
1989 t = fold_read_from_constant_string (expr);
1990 else
1991 t = NULL;
1992 break;
6de9cd9a
DN
1993
1994 case ADDR_EXPR:
622f91ba 1995 *inside_addr_expr_p = true;
6de9cd9a 1996 t = walk_tree (&TREE_OPERAND (expr, 0), fold_stmt_r, data, NULL);
622f91ba 1997 *inside_addr_expr_p = false;
6de9cd9a
DN
1998 if (t)
1999 return t;
2000 *walk_subtrees = 0;
2001
2002 /* Set TREE_INVARIANT properly so that the value is properly
2003 considered constant, and so gets propagated as expected. */
2004 if (*changed_p)
127203ac 2005 recompute_tree_invariant_for_addr_expr (expr);
6de9cd9a
DN
2006 return NULL_TREE;
2007
2008 case PLUS_EXPR:
2009 case MINUS_EXPR:
2010 t = walk_tree (&TREE_OPERAND (expr, 0), fold_stmt_r, data, NULL);
2011 if (t)
2012 return t;
2013 t = walk_tree (&TREE_OPERAND (expr, 1), fold_stmt_r, data, NULL);
2014 if (t)
2015 return t;
2016 *walk_subtrees = 0;
2017
2018 t = maybe_fold_stmt_addition (expr);
2019 break;
2020
2021 case COMPONENT_REF:
2022 t = walk_tree (&TREE_OPERAND (expr, 0), fold_stmt_r, data, NULL);
2023 if (t)
2024 return t;
2025 *walk_subtrees = 0;
2026
fa27426e
RH
2027 /* Make sure the FIELD_DECL is actually a field in the type on the lhs.
2028 We've already checked that the records are compatible, so we should
2029 come up with a set of compatible fields. */
2030 {
2031 tree expr_record = TREE_TYPE (TREE_OPERAND (expr, 0));
2032 tree expr_field = TREE_OPERAND (expr, 1);
2033
2034 if (DECL_FIELD_CONTEXT (expr_field) != TYPE_MAIN_VARIANT (expr_record))
2035 {
2036 expr_field = find_compatible_field (expr_record, expr_field);
2037 TREE_OPERAND (expr, 1) = expr_field;
2038 }
2039 }
6de9cd9a
DN
2040 break;
2041
ac182688
ZD
2042 case TARGET_MEM_REF:
2043 t = maybe_fold_tmr (expr);
2044 break;
2045
f393e7f5
RG
2046 case COND_EXPR:
2047 if (COMPARISON_CLASS_P (TREE_OPERAND (expr, 0)))
2048 {
2049 tree op0 = TREE_OPERAND (expr, 0);
2050 tree tem = fold_binary (TREE_CODE (op0), TREE_TYPE (op0),
2051 TREE_OPERAND (op0, 0), TREE_OPERAND (op0, 1));
2052 if (tem && is_gimple_condexpr (tem))
2053 TREE_OPERAND (expr, 0) = tem;
2054 t = expr;
2055 break;
2056 }
2057
6de9cd9a
DN
2058 default:
2059 return NULL_TREE;
2060 }
2061
2062 if (t)
2063 {
2064 *expr_p = t;
2065 *changed_p = true;
2066 }
2067
2068 return NULL_TREE;
2069}
2070
6de9cd9a 2071
10a0d495
JJ
2072/* Return the string length, maximum string length or maximum value of
2073 ARG in LENGTH.
2074 If ARG is an SSA name variable, follow its use-def chains. If LENGTH
2075 is not NULL and, for TYPE == 0, its value is not equal to the length
2076 we determine or if we are unable to determine the length or value,
2077 return false. VISITED is a bitmap of visited variables.
2078 TYPE is 0 if string length should be returned, 1 for maximum string
2079 length and 2 for maximum value ARG can have. */
6de9cd9a 2080
06a9b53f 2081static bool
10a0d495 2082get_maxval_strlen (tree arg, tree *length, bitmap visited, int type)
6de9cd9a 2083{
750628d8
DN
2084 tree var, def_stmt, val;
2085
2086 if (TREE_CODE (arg) != SSA_NAME)
06a9b53f 2087 {
10a0d495
JJ
2088 if (type == 2)
2089 {
2090 val = arg;
2091 if (TREE_CODE (val) != INTEGER_CST
2092 || tree_int_cst_sgn (val) < 0)
2093 return false;
2094 }
2095 else
2096 val = c_strlen (arg, 1);
750628d8 2097 if (!val)
06a9b53f 2098 return false;
cd709752 2099
10a0d495
JJ
2100 if (*length)
2101 {
2102 if (type > 0)
2103 {
2104 if (TREE_CODE (*length) != INTEGER_CST
2105 || TREE_CODE (val) != INTEGER_CST)
2106 return false;
2107
2108 if (tree_int_cst_lt (*length, val))
2109 *length = val;
2110 return true;
2111 }
2112 else if (simple_cst_equal (val, *length) != 1)
2113 return false;
2114 }
6de9cd9a 2115
750628d8
DN
2116 *length = val;
2117 return true;
6de9cd9a 2118 }
06a9b53f 2119
750628d8
DN
2120 /* If we were already here, break the infinite cycle. */
2121 if (bitmap_bit_p (visited, SSA_NAME_VERSION (arg)))
2122 return true;
2123 bitmap_set_bit (visited, SSA_NAME_VERSION (arg));
2124
2125 var = arg;
2126 def_stmt = SSA_NAME_DEF_STMT (var);
6de9cd9a 2127
750628d8
DN
2128 switch (TREE_CODE (def_stmt))
2129 {
2130 case MODIFY_EXPR:
2131 {
10a0d495
JJ
2132 tree rhs;
2133
750628d8
DN
2134 /* The RHS of the statement defining VAR must either have a
2135 constant length or come from another SSA_NAME with a constant
2136 length. */
2137 rhs = TREE_OPERAND (def_stmt, 1);
2138 STRIP_NOPS (rhs);
10a0d495 2139 return get_maxval_strlen (rhs, length, visited, type);
750628d8 2140 }
6de9cd9a 2141
750628d8
DN
2142 case PHI_NODE:
2143 {
2144 /* All the arguments of the PHI node must have the same constant
2145 length. */
2146 int i;
6de9cd9a 2147
750628d8
DN
2148 for (i = 0; i < PHI_NUM_ARGS (def_stmt); i++)
2149 {
2150 tree arg = PHI_ARG_DEF (def_stmt, i);
6de9cd9a 2151
750628d8
DN
2152 /* If this PHI has itself as an argument, we cannot
2153 determine the string length of this argument. However,
2154 if we can find a constant string length for the other
2155 PHI args then we can still be sure that this is a
2156 constant string length. So be optimistic and just
2157 continue with the next argument. */
2158 if (arg == PHI_RESULT (def_stmt))
2159 continue;
6de9cd9a 2160
10a0d495 2161 if (!get_maxval_strlen (arg, length, visited, type))
750628d8
DN
2162 return false;
2163 }
6de9cd9a 2164
750628d8 2165 return true;
173b818d 2166 }
6de9cd9a 2167
750628d8
DN
2168 default:
2169 break;
6de9cd9a
DN
2170 }
2171
750628d8
DN
2172
2173 return false;
6de9cd9a
DN
2174}
2175
2176
2177/* Fold builtin call FN in statement STMT. If it cannot be folded into a
2178 constant, return NULL_TREE. Otherwise, return its constant value. */
2179
2180static tree
2181ccp_fold_builtin (tree stmt, tree fn)
2182{
10a0d495 2183 tree result, val[3];
a32e70c3 2184 tree callee, arglist, a;
10a0d495 2185 int arg_mask, i, type;
a32e70c3
RS
2186 bitmap visited;
2187 bool ignore;
6de9cd9a 2188
a32e70c3 2189 ignore = TREE_CODE (stmt) != MODIFY_EXPR;
6de9cd9a
DN
2190
2191 /* First try the generic builtin folder. If that succeeds, return the
2192 result directly. */
49d1af89
KH
2193 callee = get_callee_fndecl (fn);
2194 arglist = TREE_OPERAND (fn, 1);
2195 result = fold_builtin (callee, arglist, ignore);
6de9cd9a 2196 if (result)
10a0d495
JJ
2197 {
2198 if (ignore)
2199 STRIP_NOPS (result);
2200 return result;
2201 }
a32e70c3
RS
2202
2203 /* Ignore MD builtins. */
a32e70c3
RS
2204 if (DECL_BUILT_IN_CLASS (callee) == BUILT_IN_MD)
2205 return NULL_TREE;
6de9cd9a
DN
2206
2207 /* If the builtin could not be folded, and it has no argument list,
2208 we're done. */
2209 if (!arglist)
2210 return NULL_TREE;
2211
2212 /* Limit the work only for builtins we know how to simplify. */
2213 switch (DECL_FUNCTION_CODE (callee))
2214 {
2215 case BUILT_IN_STRLEN:
2216 case BUILT_IN_FPUTS:
2217 case BUILT_IN_FPUTS_UNLOCKED:
10a0d495
JJ
2218 arg_mask = 1;
2219 type = 0;
6de9cd9a
DN
2220 break;
2221 case BUILT_IN_STRCPY:
2222 case BUILT_IN_STRNCPY:
10a0d495
JJ
2223 arg_mask = 2;
2224 type = 0;
2225 break;
2226 case BUILT_IN_MEMCPY_CHK:
2227 case BUILT_IN_MEMPCPY_CHK:
2228 case BUILT_IN_MEMMOVE_CHK:
2229 case BUILT_IN_MEMSET_CHK:
2230 case BUILT_IN_STRNCPY_CHK:
2231 arg_mask = 4;
2232 type = 2;
2233 break;
2234 case BUILT_IN_STRCPY_CHK:
2235 case BUILT_IN_STPCPY_CHK:
2236 arg_mask = 2;
2237 type = 1;
2238 break;
2239 case BUILT_IN_SNPRINTF_CHK:
2240 case BUILT_IN_VSNPRINTF_CHK:
2241 arg_mask = 2;
2242 type = 2;
6de9cd9a
DN
2243 break;
2244 default:
2245 return NULL_TREE;
2246 }
2247
2248 /* Try to use the dataflow information gathered by the CCP process. */
8bdbfff5 2249 visited = BITMAP_ALLOC (NULL);
6de9cd9a 2250
10a0d495 2251 memset (val, 0, sizeof (val));
6de9cd9a 2252 for (i = 0, a = arglist;
10a0d495
JJ
2253 arg_mask;
2254 i++, arg_mask >>= 1, a = TREE_CHAIN (a))
2255 if (arg_mask & 1)
6de9cd9a
DN
2256 {
2257 bitmap_clear (visited);
10a0d495
JJ
2258 if (!get_maxval_strlen (TREE_VALUE (a), &val[i], visited, type))
2259 val[i] = NULL_TREE;
6de9cd9a
DN
2260 }
2261
8bdbfff5 2262 BITMAP_FREE (visited);
6de9cd9a 2263
a32e70c3 2264 result = NULL_TREE;
6de9cd9a
DN
2265 switch (DECL_FUNCTION_CODE (callee))
2266 {
2267 case BUILT_IN_STRLEN:
10a0d495 2268 if (val[0])
6de9cd9a 2269 {
10a0d495 2270 tree new = fold_convert (TREE_TYPE (fn), val[0]);
6de9cd9a
DN
2271
2272 /* If the result is not a valid gimple value, or not a cast
2273 of a valid gimple value, then we can not use the result. */
2274 if (is_gimple_val (new)
2275 || (is_gimple_cast (new)
2276 && is_gimple_val (TREE_OPERAND (new, 0))))
2277 return new;
6de9cd9a 2278 }
a32e70c3
RS
2279 break;
2280
6de9cd9a 2281 case BUILT_IN_STRCPY:
10a0d495
JJ
2282 if (val[1] && is_gimple_val (val[1]))
2283 result = fold_builtin_strcpy (callee, arglist, val[1]);
a32e70c3
RS
2284 break;
2285
6de9cd9a 2286 case BUILT_IN_STRNCPY:
10a0d495
JJ
2287 if (val[1] && is_gimple_val (val[1]))
2288 result = fold_builtin_strncpy (callee, arglist, val[1]);
a32e70c3
RS
2289 break;
2290
6de9cd9a 2291 case BUILT_IN_FPUTS:
a32e70c3
RS
2292 result = fold_builtin_fputs (arglist,
2293 TREE_CODE (stmt) != MODIFY_EXPR, 0,
10a0d495 2294 val[0]);
a32e70c3
RS
2295 break;
2296
6de9cd9a 2297 case BUILT_IN_FPUTS_UNLOCKED:
a32e70c3
RS
2298 result = fold_builtin_fputs (arglist,
2299 TREE_CODE (stmt) != MODIFY_EXPR, 1,
10a0d495
JJ
2300 val[0]);
2301 break;
2302
2303 case BUILT_IN_MEMCPY_CHK:
2304 case BUILT_IN_MEMPCPY_CHK:
2305 case BUILT_IN_MEMMOVE_CHK:
2306 case BUILT_IN_MEMSET_CHK:
2307 if (val[2] && is_gimple_val (val[2]))
2308 result = fold_builtin_memory_chk (callee, arglist, val[2], ignore,
2309 DECL_FUNCTION_CODE (callee));
2310 break;
2311
2312 case BUILT_IN_STRCPY_CHK:
2313 case BUILT_IN_STPCPY_CHK:
2314 if (val[1] && is_gimple_val (val[1]))
2315 result = fold_builtin_stxcpy_chk (callee, arglist, val[1], ignore,
2316 DECL_FUNCTION_CODE (callee));
2317 break;
2318
2319 case BUILT_IN_STRNCPY_CHK:
2320 if (val[2] && is_gimple_val (val[2]))
2321 result = fold_builtin_strncpy_chk (arglist, val[2]);
2322 break;
2323
2324 case BUILT_IN_SNPRINTF_CHK:
2325 case BUILT_IN_VSNPRINTF_CHK:
2326 if (val[1] && is_gimple_val (val[1]))
2327 result = fold_builtin_snprintf_chk (arglist, val[1],
2328 DECL_FUNCTION_CODE (callee));
a32e70c3 2329 break;
6de9cd9a
DN
2330
2331 default:
1e128c5f 2332 gcc_unreachable ();
6de9cd9a
DN
2333 }
2334
a32e70c3 2335 if (result && ignore)
9675412f 2336 result = fold_ignored_result (result);
a32e70c3 2337 return result;
6de9cd9a
DN
2338}
2339
2340
206048bd 2341/* Fold the statement pointed to by STMT_P. In some cases, this function may
750628d8
DN
2342 replace the whole statement with a new one. Returns true iff folding
2343 makes any changes. */
6de9cd9a 2344
750628d8
DN
2345bool
2346fold_stmt (tree *stmt_p)
6de9cd9a 2347{
750628d8 2348 tree rhs, result, stmt;
622f91ba 2349 struct fold_stmt_r_data fold_stmt_r_data;
750628d8 2350 bool changed = false;
622f91ba
JL
2351 bool inside_addr_expr = false;
2352
2353 fold_stmt_r_data.changed_p = &changed;
2354 fold_stmt_r_data.inside_addr_expr_p = &inside_addr_expr;
6de9cd9a 2355
750628d8 2356 stmt = *stmt_p;
6de9cd9a 2357
750628d8
DN
2358 /* If we replaced constants and the statement makes pointer dereferences,
2359 then we may need to fold instances of *&VAR into VAR, etc. */
622f91ba 2360 if (walk_tree (stmt_p, fold_stmt_r, &fold_stmt_r_data, NULL))
750628d8
DN
2361 {
2362 *stmt_p
2363 = build_function_call_expr (implicit_built_in_decls[BUILT_IN_TRAP],
2364 NULL);
6de9cd9a
DN
2365 return true;
2366 }
2367
750628d8
DN
2368 rhs = get_rhs (stmt);
2369 if (!rhs)
2370 return changed;
2371 result = NULL_TREE;
6de9cd9a 2372
750628d8 2373 if (TREE_CODE (rhs) == CALL_EXPR)
6de9cd9a 2374 {
750628d8 2375 tree callee;
6de9cd9a 2376
750628d8
DN
2377 /* Check for builtins that CCP can handle using information not
2378 available in the generic fold routines. */
2379 callee = get_callee_fndecl (rhs);
2380 if (callee && DECL_BUILT_IN (callee))
2381 result = ccp_fold_builtin (stmt, rhs);
1809ff6b
AP
2382 else
2383 {
2384 /* Check for resolvable OBJ_TYPE_REF. The only sorts we can resolve
2385 here are when we've propagated the address of a decl into the
2386 object slot. */
2387 /* ??? Should perhaps do this in fold proper. However, doing it
2388 there requires that we create a new CALL_EXPR, and that requires
2389 copying EH region info to the new node. Easier to just do it
2390 here where we can just smash the call operand. Also
2391 CALL_EXPR_RETURN_SLOT_OPT needs to be handled correctly and
2392 copied, fold_ternary does not have not information. */
2393 callee = TREE_OPERAND (rhs, 0);
2394 if (TREE_CODE (callee) == OBJ_TYPE_REF
2395 && lang_hooks.fold_obj_type_ref
2396 && TREE_CODE (OBJ_TYPE_REF_OBJECT (callee)) == ADDR_EXPR
2397 && DECL_P (TREE_OPERAND
2398 (OBJ_TYPE_REF_OBJECT (callee), 0)))
2399 {
2400 tree t;
2401
2402 /* ??? Caution: Broken ADDR_EXPR semantics means that
2403 looking at the type of the operand of the addr_expr
2404 can yield an array type. See silly exception in
2405 check_pointer_types_r. */
2406
2407 t = TREE_TYPE (TREE_TYPE (OBJ_TYPE_REF_OBJECT (callee)));
2408 t = lang_hooks.fold_obj_type_ref (callee, t);
2409 if (t)
2410 {
2411 TREE_OPERAND (rhs, 0) = t;
2412 changed = true;
2413 }
2414 }
2415 }
6de9cd9a
DN
2416 }
2417
750628d8
DN
2418 /* If we couldn't fold the RHS, hand over to the generic fold routines. */
2419 if (result == NULL_TREE)
2420 result = fold (rhs);
6de9cd9a 2421
750628d8
DN
2422 /* Strip away useless type conversions. Both the NON_LVALUE_EXPR that
2423 may have been added by fold, and "useless" type conversions that might
2424 now be apparent due to propagation. */
2425 STRIP_USELESS_TYPE_CONVERSION (result);
2426
2427 if (result != rhs)
2428 changed |= set_rhs (stmt_p, result);
2429
2430 return changed;
6de9cd9a
DN
2431}
2432
38965eb2
ZD
2433/* Perform the minimal folding on statement STMT. Only operations like
2434 *&x created by constant propagation are handled. The statement cannot
2435 be replaced with a new one. */
2436
2437bool
2438fold_stmt_inplace (tree stmt)
2439{
2440 tree old_stmt = stmt, rhs, new_rhs;
622f91ba 2441 struct fold_stmt_r_data fold_stmt_r_data;
38965eb2 2442 bool changed = false;
622f91ba
JL
2443 bool inside_addr_expr = false;
2444
2445 fold_stmt_r_data.changed_p = &changed;
2446 fold_stmt_r_data.inside_addr_expr_p = &inside_addr_expr;
38965eb2 2447
622f91ba 2448 walk_tree (&stmt, fold_stmt_r, &fold_stmt_r_data, NULL);
38965eb2
ZD
2449 gcc_assert (stmt == old_stmt);
2450
2451 rhs = get_rhs (stmt);
2452 if (!rhs || rhs == stmt)
2453 return changed;
2454
2455 new_rhs = fold (rhs);
43e364dd 2456 STRIP_USELESS_TYPE_CONVERSION (new_rhs);
38965eb2
ZD
2457 if (new_rhs == rhs)
2458 return changed;
2459
2460 changed |= set_rhs (&stmt, new_rhs);
2461 gcc_assert (stmt == old_stmt);
2462
2463 return changed;
2464}
6de9cd9a 2465\f
b28b1600
JJ
2466/* Convert EXPR into a GIMPLE value suitable for substitution on the
2467 RHS of an assignment. Insert the necessary statements before
2468 iterator *SI_P. */
2469
2470static tree
2471convert_to_gimple_builtin (block_stmt_iterator *si_p, tree expr)
2472{
2473 tree_stmt_iterator ti;
2474 tree stmt = bsi_stmt (*si_p);
2475 tree tmp, stmts = NULL;
2476
2477 push_gimplify_context ();
2478 tmp = get_initialized_tmp_var (expr, &stmts, NULL);
2479 pop_gimplify_context (NULL);
2480
f47c96aa
AM
2481 if (EXPR_HAS_LOCATION (stmt))
2482 annotate_all_with_locus (&stmts, EXPR_LOCATION (stmt));
2483
b28b1600
JJ
2484 /* The replacement can expose previously unreferenced variables. */
2485 for (ti = tsi_start (stmts); !tsi_end_p (ti); tsi_next (&ti))
2486 {
f47c96aa 2487 tree new_stmt = tsi_stmt (ti);
b28b1600 2488 find_new_referenced_vars (tsi_stmt_ptr (ti));
f47c96aa
AM
2489 bsi_insert_before (si_p, new_stmt, BSI_NEW_STMT);
2490 mark_new_vars_to_rename (bsi_stmt (*si_p));
2491 bsi_next (si_p);
b28b1600
JJ
2492 }
2493
b28b1600
JJ
2494 return tmp;
2495}
2496
2497
6de9cd9a
DN
2498/* A simple pass that attempts to fold all builtin functions. This pass
2499 is run after we've propagated as many constants as we can. */
2500
c2924966 2501static unsigned int
6de9cd9a
DN
2502execute_fold_all_builtins (void)
2503{
a7d6ba24 2504 bool cfg_changed = false;
6de9cd9a
DN
2505 basic_block bb;
2506 FOR_EACH_BB (bb)
2507 {
2508 block_stmt_iterator i;
10a0d495 2509 for (i = bsi_start (bb); !bsi_end_p (i); )
6de9cd9a
DN
2510 {
2511 tree *stmtp = bsi_stmt_ptr (i);
af47810a 2512 tree old_stmt = *stmtp;
6de9cd9a
DN
2513 tree call = get_rhs (*stmtp);
2514 tree callee, result;
10a0d495 2515 enum built_in_function fcode;
6de9cd9a
DN
2516
2517 if (!call || TREE_CODE (call) != CALL_EXPR)
10a0d495
JJ
2518 {
2519 bsi_next (&i);
2520 continue;
2521 }
6de9cd9a
DN
2522 callee = get_callee_fndecl (call);
2523 if (!callee || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL)
10a0d495
JJ
2524 {
2525 bsi_next (&i);
2526 continue;
2527 }
2528 fcode = DECL_FUNCTION_CODE (callee);
6de9cd9a
DN
2529
2530 result = ccp_fold_builtin (*stmtp, call);
2531 if (!result)
2532 switch (DECL_FUNCTION_CODE (callee))
2533 {
2534 case BUILT_IN_CONSTANT_P:
2535 /* Resolve __builtin_constant_p. If it hasn't been
2536 folded to integer_one_node by now, it's fairly
2537 certain that the value simply isn't constant. */
2538 result = integer_zero_node;
2539 break;
2540
2541 default:
10a0d495 2542 bsi_next (&i);
6de9cd9a
DN
2543 continue;
2544 }
2545
2546 if (dump_file && (dump_flags & TDF_DETAILS))
2547 {
2548 fprintf (dump_file, "Simplified\n ");
2549 print_generic_stmt (dump_file, *stmtp, dump_flags);
2550 }
2551
b28b1600
JJ
2552 if (!set_rhs (stmtp, result))
2553 {
2554 result = convert_to_gimple_builtin (&i, result);
e16acfcd
NS
2555 if (result)
2556 {
2557 bool ok = set_rhs (stmtp, result);
2558
2559 gcc_assert (ok);
2560 }
b28b1600 2561 }
386cfa6f 2562 mark_new_vars_to_rename (*stmtp);
af47810a 2563 if (maybe_clean_or_replace_eh_stmt (old_stmt, *stmtp)
a7d6ba24
JJ
2564 && tree_purge_dead_eh_edges (bb))
2565 cfg_changed = true;
6de9cd9a
DN
2566
2567 if (dump_file && (dump_flags & TDF_DETAILS))
2568 {
2569 fprintf (dump_file, "to\n ");
2570 print_generic_stmt (dump_file, *stmtp, dump_flags);
2571 fprintf (dump_file, "\n");
2572 }
10a0d495
JJ
2573
2574 /* Retry the same statement if it changed into another
2575 builtin, there might be new opportunities now. */
2576 call = get_rhs (*stmtp);
2577 if (!call || TREE_CODE (call) != CALL_EXPR)
2578 {
2579 bsi_next (&i);
2580 continue;
2581 }
2582 callee = get_callee_fndecl (call);
2583 if (!callee
2584 || DECL_BUILT_IN_CLASS (callee) != BUILT_IN_NORMAL
2585 || DECL_FUNCTION_CODE (callee) == fcode)
2586 bsi_next (&i);
6de9cd9a
DN
2587 }
2588 }
a7d6ba24
JJ
2589
2590 /* Delete unreachable blocks. */
2591 if (cfg_changed)
2592 cleanup_tree_cfg ();
c2924966 2593 return 0;
6de9cd9a
DN
2594}
2595
750628d8 2596
6de9cd9a
DN
2597struct tree_opt_pass pass_fold_builtins =
2598{
2599 "fab", /* name */
2600 NULL, /* gate */
2601 execute_fold_all_builtins, /* execute */
2602 NULL, /* sub */
2603 NULL, /* next */
2604 0, /* static_pass_number */
2605 0, /* tv_id */
c1b763fa 2606 PROP_cfg | PROP_ssa | PROP_alias, /* properties_required */
6de9cd9a
DN
2607 0, /* properties_provided */
2608 0, /* properties_destroyed */
2609 0, /* todo_flags_start */
b28b1600
JJ
2610 TODO_dump_func
2611 | TODO_verify_ssa
0bca51f0 2612 | TODO_update_ssa, /* todo_flags_finish */
9f8628ba 2613 0 /* letter */
6de9cd9a 2614};