1*38fd1498Szrj /* Predicate aware uninitialized variable warning.
2*38fd1498Szrj Copyright (C) 2001-2018 Free Software Foundation, Inc.
3*38fd1498Szrj Contributed by Xinliang David Li <davidxl@google.com>
4*38fd1498Szrj
5*38fd1498Szrj This file is part of GCC.
6*38fd1498Szrj
7*38fd1498Szrj GCC is free software; you can redistribute it and/or modify
8*38fd1498Szrj it under the terms of the GNU General Public License as published by
9*38fd1498Szrj the Free Software Foundation; either version 3, or (at your option)
10*38fd1498Szrj any later version.
11*38fd1498Szrj
12*38fd1498Szrj GCC is distributed in the hope that it will be useful,
13*38fd1498Szrj but WITHOUT ANY WARRANTY; without even the implied warranty of
14*38fd1498Szrj MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15*38fd1498Szrj GNU General Public License for more details.
16*38fd1498Szrj
17*38fd1498Szrj You should have received a copy of the GNU General Public License
18*38fd1498Szrj along with GCC; see the file COPYING3. If not see
19*38fd1498Szrj <http://www.gnu.org/licenses/>. */
20*38fd1498Szrj
21*38fd1498Szrj #include "config.h"
22*38fd1498Szrj #include "system.h"
23*38fd1498Szrj #include "coretypes.h"
24*38fd1498Szrj #include "backend.h"
25*38fd1498Szrj #include "tree.h"
26*38fd1498Szrj #include "gimple.h"
27*38fd1498Szrj #include "tree-pass.h"
28*38fd1498Szrj #include "ssa.h"
29*38fd1498Szrj #include "gimple-pretty-print.h"
30*38fd1498Szrj #include "diagnostic-core.h"
31*38fd1498Szrj #include "fold-const.h"
32*38fd1498Szrj #include "gimple-iterator.h"
33*38fd1498Szrj #include "tree-ssa.h"
34*38fd1498Szrj #include "params.h"
35*38fd1498Szrj #include "tree-cfg.h"
36*38fd1498Szrj #include "cfghooks.h"
37*38fd1498Szrj
38*38fd1498Szrj /* This implements the pass that does predicate aware warning on uses of
39*38fd1498Szrj possibly uninitialized variables. The pass first collects the set of
40*38fd1498Szrj possibly uninitialized SSA names. For each such name, it walks through
41*38fd1498Szrj all its immediate uses. For each immediate use, it rebuilds the condition
42*38fd1498Szrj expression (the predicate) that guards the use. The predicate is then
43*38fd1498Szrj examined to see if the variable is always defined under that same condition.
44*38fd1498Szrj This is done either by pruning the unrealizable paths that lead to the
45*38fd1498Szrj default definitions or by checking if the predicate set that guards the
46*38fd1498Szrj defining paths is a superset of the use predicate. */
47*38fd1498Szrj
48*38fd1498Szrj /* Max PHI args we can handle in pass. */
49*38fd1498Szrj const unsigned max_phi_args = 32;
50*38fd1498Szrj
51*38fd1498Szrj /* Pointer set of potentially undefined ssa names, i.e.,
52*38fd1498Szrj ssa names that are defined by phi with operands that
53*38fd1498Szrj are not defined or potentially undefined. */
54*38fd1498Szrj static hash_set<tree> *possibly_undefined_names = 0;
55*38fd1498Szrj
56*38fd1498Szrj /* Bit mask handling macros. */
57*38fd1498Szrj #define MASK_SET_BIT(mask, pos) mask |= (1 << pos)
58*38fd1498Szrj #define MASK_TEST_BIT(mask, pos) (mask & (1 << pos))
59*38fd1498Szrj #define MASK_EMPTY(mask) (mask == 0)
60*38fd1498Szrj
61*38fd1498Szrj /* Returns the first bit position (starting from LSB)
62*38fd1498Szrj in mask that is non zero. Returns -1 if the mask is empty. */
63*38fd1498Szrj static int
get_mask_first_set_bit(unsigned mask)64*38fd1498Szrj get_mask_first_set_bit (unsigned mask)
65*38fd1498Szrj {
66*38fd1498Szrj int pos = 0;
67*38fd1498Szrj if (mask == 0)
68*38fd1498Szrj return -1;
69*38fd1498Szrj
70*38fd1498Szrj while ((mask & (1 << pos)) == 0)
71*38fd1498Szrj pos++;
72*38fd1498Szrj
73*38fd1498Szrj return pos;
74*38fd1498Szrj }
75*38fd1498Szrj #define MASK_FIRST_SET_BIT(mask) get_mask_first_set_bit (mask)
76*38fd1498Szrj
77*38fd1498Szrj /* Return true if T, an SSA_NAME, has an undefined value. */
78*38fd1498Szrj static bool
has_undefined_value_p(tree t)79*38fd1498Szrj has_undefined_value_p (tree t)
80*38fd1498Szrj {
81*38fd1498Szrj return (ssa_undefined_value_p (t)
82*38fd1498Szrj || (possibly_undefined_names
83*38fd1498Szrj && possibly_undefined_names->contains (t)));
84*38fd1498Szrj }
85*38fd1498Szrj
86*38fd1498Szrj /* Like has_undefined_value_p, but don't return true if TREE_NO_WARNING
87*38fd1498Szrj is set on SSA_NAME_VAR. */
88*38fd1498Szrj
89*38fd1498Szrj static inline bool
uninit_undefined_value_p(tree t)90*38fd1498Szrj uninit_undefined_value_p (tree t)
91*38fd1498Szrj {
92*38fd1498Szrj if (!has_undefined_value_p (t))
93*38fd1498Szrj return false;
94*38fd1498Szrj if (SSA_NAME_VAR (t) && TREE_NO_WARNING (SSA_NAME_VAR (t)))
95*38fd1498Szrj return false;
96*38fd1498Szrj return true;
97*38fd1498Szrj }
98*38fd1498Szrj
99*38fd1498Szrj /* Emit warnings for uninitialized variables. This is done in two passes.
100*38fd1498Szrj
101*38fd1498Szrj The first pass notices real uses of SSA names with undefined values.
102*38fd1498Szrj Such uses are unconditionally uninitialized, and we can be certain that
103*38fd1498Szrj such a use is a mistake. This pass is run before most optimizations,
104*38fd1498Szrj so that we catch as many as we can.
105*38fd1498Szrj
106*38fd1498Szrj The second pass follows PHI nodes to find uses that are potentially
107*38fd1498Szrj uninitialized. In this case we can't necessarily prove that the use
108*38fd1498Szrj is really uninitialized. This pass is run after most optimizations,
109*38fd1498Szrj so that we thread as many jumps and possible, and delete as much dead
110*38fd1498Szrj code as possible, in order to reduce false positives. We also look
111*38fd1498Szrj again for plain uninitialized variables, since optimization may have
112*38fd1498Szrj changed conditionally uninitialized to unconditionally uninitialized. */
113*38fd1498Szrj
114*38fd1498Szrj /* Emit a warning for EXPR based on variable VAR at the point in the
115*38fd1498Szrj program T, an SSA_NAME, is used being uninitialized. The exact
116*38fd1498Szrj warning text is in MSGID and DATA is the gimple stmt with info about
117*38fd1498Szrj the location in source code. When DATA is a GIMPLE_PHI, PHIARG_IDX
118*38fd1498Szrj gives which argument of the phi node to take the location from. WC
119*38fd1498Szrj is the warning code. */
120*38fd1498Szrj
121*38fd1498Szrj static void
warn_uninit(enum opt_code wc,tree t,tree expr,tree var,const char * gmsgid,void * data,location_t phiarg_loc)122*38fd1498Szrj warn_uninit (enum opt_code wc, tree t, tree expr, tree var,
123*38fd1498Szrj const char *gmsgid, void *data, location_t phiarg_loc)
124*38fd1498Szrj {
125*38fd1498Szrj gimple *context = (gimple *) data;
126*38fd1498Szrj location_t location, cfun_loc;
127*38fd1498Szrj expanded_location xloc, floc;
128*38fd1498Szrj
129*38fd1498Szrj /* Ignore COMPLEX_EXPR as initializing only a part of a complex
130*38fd1498Szrj turns in a COMPLEX_EXPR with the not initialized part being
131*38fd1498Szrj set to its previous (undefined) value. */
132*38fd1498Szrj if (is_gimple_assign (context)
133*38fd1498Szrj && gimple_assign_rhs_code (context) == COMPLEX_EXPR)
134*38fd1498Szrj return;
135*38fd1498Szrj if (!has_undefined_value_p (t))
136*38fd1498Szrj return;
137*38fd1498Szrj
138*38fd1498Szrj /* Anonymous SSA_NAMEs shouldn't be uninitialized, but ssa_undefined_value_p
139*38fd1498Szrj can return true if the def stmt of anonymous SSA_NAME is COMPLEX_EXPR
140*38fd1498Szrj created for conversion from scalar to complex. Use the underlying var of
141*38fd1498Szrj the COMPLEX_EXPRs real part in that case. See PR71581. */
142*38fd1498Szrj if (expr == NULL_TREE
143*38fd1498Szrj && var == NULL_TREE
144*38fd1498Szrj && SSA_NAME_VAR (t) == NULL_TREE
145*38fd1498Szrj && is_gimple_assign (SSA_NAME_DEF_STMT (t))
146*38fd1498Szrj && gimple_assign_rhs_code (SSA_NAME_DEF_STMT (t)) == COMPLEX_EXPR)
147*38fd1498Szrj {
148*38fd1498Szrj tree v = gimple_assign_rhs1 (SSA_NAME_DEF_STMT (t));
149*38fd1498Szrj if (TREE_CODE (v) == SSA_NAME
150*38fd1498Szrj && has_undefined_value_p (v)
151*38fd1498Szrj && zerop (gimple_assign_rhs2 (SSA_NAME_DEF_STMT (t))))
152*38fd1498Szrj {
153*38fd1498Szrj expr = SSA_NAME_VAR (v);
154*38fd1498Szrj var = expr;
155*38fd1498Szrj }
156*38fd1498Szrj }
157*38fd1498Szrj
158*38fd1498Szrj if (expr == NULL_TREE)
159*38fd1498Szrj return;
160*38fd1498Szrj
161*38fd1498Szrj /* TREE_NO_WARNING either means we already warned, or the front end
162*38fd1498Szrj wishes to suppress the warning. */
163*38fd1498Szrj if ((context
164*38fd1498Szrj && (gimple_no_warning_p (context)
165*38fd1498Szrj || (gimple_assign_single_p (context)
166*38fd1498Szrj && TREE_NO_WARNING (gimple_assign_rhs1 (context)))))
167*38fd1498Szrj || TREE_NO_WARNING (expr))
168*38fd1498Szrj return;
169*38fd1498Szrj
170*38fd1498Szrj if (context != NULL && gimple_has_location (context))
171*38fd1498Szrj location = gimple_location (context);
172*38fd1498Szrj else if (phiarg_loc != UNKNOWN_LOCATION)
173*38fd1498Szrj location = phiarg_loc;
174*38fd1498Szrj else
175*38fd1498Szrj location = DECL_SOURCE_LOCATION (var);
176*38fd1498Szrj location = linemap_resolve_location (line_table, location,
177*38fd1498Szrj LRK_SPELLING_LOCATION, NULL);
178*38fd1498Szrj cfun_loc = DECL_SOURCE_LOCATION (cfun->decl);
179*38fd1498Szrj xloc = expand_location (location);
180*38fd1498Szrj floc = expand_location (cfun_loc);
181*38fd1498Szrj if (warning_at (location, wc, gmsgid, expr))
182*38fd1498Szrj {
183*38fd1498Szrj TREE_NO_WARNING (expr) = 1;
184*38fd1498Szrj
185*38fd1498Szrj if (location == DECL_SOURCE_LOCATION (var))
186*38fd1498Szrj return;
187*38fd1498Szrj if (xloc.file != floc.file
188*38fd1498Szrj || linemap_location_before_p (line_table, location, cfun_loc)
189*38fd1498Szrj || linemap_location_before_p (line_table, cfun->function_end_locus,
190*38fd1498Szrj location))
191*38fd1498Szrj inform (DECL_SOURCE_LOCATION (var), "%qD was declared here", var);
192*38fd1498Szrj }
193*38fd1498Szrj }
194*38fd1498Szrj
195*38fd1498Szrj struct check_defs_data
196*38fd1498Szrj {
197*38fd1498Szrj /* If we found any may-defs besides must-def clobbers. */
198*38fd1498Szrj bool found_may_defs;
199*38fd1498Szrj };
200*38fd1498Szrj
201*38fd1498Szrj /* Callback for walk_aliased_vdefs. */
202*38fd1498Szrj
203*38fd1498Szrj static bool
check_defs(ao_ref * ref,tree vdef,void * data_)204*38fd1498Szrj check_defs (ao_ref *ref, tree vdef, void *data_)
205*38fd1498Szrj {
206*38fd1498Szrj check_defs_data *data = (check_defs_data *)data_;
207*38fd1498Szrj gimple *def_stmt = SSA_NAME_DEF_STMT (vdef);
208*38fd1498Szrj /* If this is a clobber then if it is not a kill walk past it. */
209*38fd1498Szrj if (gimple_clobber_p (def_stmt))
210*38fd1498Szrj {
211*38fd1498Szrj if (stmt_kills_ref_p (def_stmt, ref))
212*38fd1498Szrj return true;
213*38fd1498Szrj return false;
214*38fd1498Szrj }
215*38fd1498Szrj /* Found a may-def on this path. */
216*38fd1498Szrj data->found_may_defs = true;
217*38fd1498Szrj return true;
218*38fd1498Szrj }
219*38fd1498Szrj
220*38fd1498Szrj static unsigned int
warn_uninitialized_vars(bool warn_possibly_uninitialized)221*38fd1498Szrj warn_uninitialized_vars (bool warn_possibly_uninitialized)
222*38fd1498Szrj {
223*38fd1498Szrj gimple_stmt_iterator gsi;
224*38fd1498Szrj basic_block bb;
225*38fd1498Szrj unsigned int vdef_cnt = 0;
226*38fd1498Szrj unsigned int oracle_cnt = 0;
227*38fd1498Szrj unsigned limit = 0;
228*38fd1498Szrj
229*38fd1498Szrj FOR_EACH_BB_FN (bb, cfun)
230*38fd1498Szrj {
231*38fd1498Szrj basic_block succ = single_succ (ENTRY_BLOCK_PTR_FOR_FN (cfun));
232*38fd1498Szrj bool always_executed = dominated_by_p (CDI_POST_DOMINATORS, succ, bb);
233*38fd1498Szrj for (gsi = gsi_start_bb (bb); !gsi_end_p (gsi); gsi_next (&gsi))
234*38fd1498Szrj {
235*38fd1498Szrj gimple *stmt = gsi_stmt (gsi);
236*38fd1498Szrj use_operand_p use_p;
237*38fd1498Szrj ssa_op_iter op_iter;
238*38fd1498Szrj tree use;
239*38fd1498Szrj
240*38fd1498Szrj if (is_gimple_debug (stmt))
241*38fd1498Szrj continue;
242*38fd1498Szrj
243*38fd1498Szrj /* We only do data flow with SSA_NAMEs, so that's all we
244*38fd1498Szrj can warn about. */
245*38fd1498Szrj FOR_EACH_SSA_USE_OPERAND (use_p, stmt, op_iter, SSA_OP_USE)
246*38fd1498Szrj {
247*38fd1498Szrj /* BIT_INSERT_EXPR first operand should not be considered
248*38fd1498Szrj a use for the purpose of uninit warnings. */
249*38fd1498Szrj if (gassign *ass = dyn_cast <gassign *> (stmt))
250*38fd1498Szrj {
251*38fd1498Szrj if (gimple_assign_rhs_code (ass) == BIT_INSERT_EXPR
252*38fd1498Szrj && use_p->use == gimple_assign_rhs1_ptr (ass))
253*38fd1498Szrj continue;
254*38fd1498Szrj }
255*38fd1498Szrj use = USE_FROM_PTR (use_p);
256*38fd1498Szrj if (always_executed)
257*38fd1498Szrj warn_uninit (OPT_Wuninitialized, use, SSA_NAME_VAR (use),
258*38fd1498Szrj SSA_NAME_VAR (use),
259*38fd1498Szrj "%qD is used uninitialized in this function", stmt,
260*38fd1498Szrj UNKNOWN_LOCATION);
261*38fd1498Szrj else if (warn_possibly_uninitialized)
262*38fd1498Szrj warn_uninit (OPT_Wmaybe_uninitialized, use, SSA_NAME_VAR (use),
263*38fd1498Szrj SSA_NAME_VAR (use),
264*38fd1498Szrj "%qD may be used uninitialized in this function",
265*38fd1498Szrj stmt, UNKNOWN_LOCATION);
266*38fd1498Szrj }
267*38fd1498Szrj
268*38fd1498Szrj /* For limiting the alias walk below we count all
269*38fd1498Szrj vdefs in the function. */
270*38fd1498Szrj if (gimple_vdef (stmt))
271*38fd1498Szrj vdef_cnt++;
272*38fd1498Szrj
273*38fd1498Szrj if (gimple_assign_load_p (stmt)
274*38fd1498Szrj && gimple_has_location (stmt))
275*38fd1498Szrj {
276*38fd1498Szrj tree rhs = gimple_assign_rhs1 (stmt);
277*38fd1498Szrj tree lhs = gimple_assign_lhs (stmt);
278*38fd1498Szrj bool has_bit_insert = false;
279*38fd1498Szrj use_operand_p luse_p;
280*38fd1498Szrj imm_use_iterator liter;
281*38fd1498Szrj
282*38fd1498Szrj if (TREE_NO_WARNING (rhs))
283*38fd1498Szrj continue;
284*38fd1498Szrj
285*38fd1498Szrj ao_ref ref;
286*38fd1498Szrj ao_ref_init (&ref, rhs);
287*38fd1498Szrj
288*38fd1498Szrj /* Do not warn if the base was marked so or this is a
289*38fd1498Szrj hard register var. */
290*38fd1498Szrj tree base = ao_ref_base (&ref);
291*38fd1498Szrj if ((VAR_P (base)
292*38fd1498Szrj && DECL_HARD_REGISTER (base))
293*38fd1498Szrj || TREE_NO_WARNING (base))
294*38fd1498Szrj continue;
295*38fd1498Szrj
296*38fd1498Szrj /* Do not warn if the access is fully outside of the
297*38fd1498Szrj variable. */
298*38fd1498Szrj poly_int64 decl_size;
299*38fd1498Szrj if (DECL_P (base)
300*38fd1498Szrj && known_size_p (ref.size)
301*38fd1498Szrj && ((known_eq (ref.max_size, ref.size)
302*38fd1498Szrj && known_le (ref.offset + ref.size, 0))
303*38fd1498Szrj || (known_ge (ref.offset, 0)
304*38fd1498Szrj && DECL_SIZE (base)
305*38fd1498Szrj && poly_int_tree_p (DECL_SIZE (base), &decl_size)
306*38fd1498Szrj && known_le (decl_size, ref.offset))))
307*38fd1498Szrj continue;
308*38fd1498Szrj
309*38fd1498Szrj /* Do not warn if the access is then used for a BIT_INSERT_EXPR. */
310*38fd1498Szrj if (TREE_CODE (lhs) == SSA_NAME)
311*38fd1498Szrj FOR_EACH_IMM_USE_FAST (luse_p, liter, lhs)
312*38fd1498Szrj {
313*38fd1498Szrj gimple *use_stmt = USE_STMT (luse_p);
314*38fd1498Szrj /* BIT_INSERT_EXPR first operand should not be considered
315*38fd1498Szrj a use for the purpose of uninit warnings. */
316*38fd1498Szrj if (gassign *ass = dyn_cast <gassign *> (use_stmt))
317*38fd1498Szrj {
318*38fd1498Szrj if (gimple_assign_rhs_code (ass) == BIT_INSERT_EXPR
319*38fd1498Szrj && luse_p->use == gimple_assign_rhs1_ptr (ass))
320*38fd1498Szrj {
321*38fd1498Szrj has_bit_insert = true;
322*38fd1498Szrj break;
323*38fd1498Szrj }
324*38fd1498Szrj }
325*38fd1498Szrj }
326*38fd1498Szrj if (has_bit_insert)
327*38fd1498Szrj continue;
328*38fd1498Szrj
329*38fd1498Szrj /* Limit the walking to a constant number of stmts after
330*38fd1498Szrj we overcommit quadratic behavior for small functions
331*38fd1498Szrj and O(n) behavior. */
332*38fd1498Szrj if (oracle_cnt > 128 * 128
333*38fd1498Szrj && oracle_cnt > vdef_cnt * 2)
334*38fd1498Szrj limit = 32;
335*38fd1498Szrj check_defs_data data;
336*38fd1498Szrj bool fentry_reached = false;
337*38fd1498Szrj data.found_may_defs = false;
338*38fd1498Szrj use = gimple_vuse (stmt);
339*38fd1498Szrj int res = walk_aliased_vdefs (&ref, use,
340*38fd1498Szrj check_defs, &data, NULL,
341*38fd1498Szrj &fentry_reached, limit);
342*38fd1498Szrj if (res == -1)
343*38fd1498Szrj {
344*38fd1498Szrj oracle_cnt += limit;
345*38fd1498Szrj continue;
346*38fd1498Szrj }
347*38fd1498Szrj oracle_cnt += res;
348*38fd1498Szrj if (data.found_may_defs)
349*38fd1498Szrj continue;
350*38fd1498Szrj /* Do not warn if it can be initialized outside this function.
351*38fd1498Szrj If we did not reach function entry then we found killing
352*38fd1498Szrj clobbers on all paths to entry. */
353*38fd1498Szrj if (fentry_reached
354*38fd1498Szrj /* ??? We'd like to use ref_may_alias_global_p but that
355*38fd1498Szrj excludes global readonly memory and thus we get bougs
356*38fd1498Szrj warnings from p = cond ? "a" : "b" for example. */
357*38fd1498Szrj && (!VAR_P (base)
358*38fd1498Szrj || is_global_var (base)))
359*38fd1498Szrj continue;
360*38fd1498Szrj
361*38fd1498Szrj /* We didn't find any may-defs so on all paths either
362*38fd1498Szrj reached function entry or a killing clobber. */
363*38fd1498Szrj location_t location
364*38fd1498Szrj = linemap_resolve_location (line_table, gimple_location (stmt),
365*38fd1498Szrj LRK_SPELLING_LOCATION, NULL);
366*38fd1498Szrj if (always_executed)
367*38fd1498Szrj {
368*38fd1498Szrj if (warning_at (location, OPT_Wuninitialized,
369*38fd1498Szrj "%qE is used uninitialized in this function",
370*38fd1498Szrj rhs))
371*38fd1498Szrj /* ??? This is only effective for decls as in
372*38fd1498Szrj gcc.dg/uninit-B-O0.c. Avoid doing this for
373*38fd1498Szrj maybe-uninit uses as it may hide important
374*38fd1498Szrj locations. */
375*38fd1498Szrj TREE_NO_WARNING (rhs) = 1;
376*38fd1498Szrj }
377*38fd1498Szrj else if (warn_possibly_uninitialized)
378*38fd1498Szrj warning_at (location, OPT_Wmaybe_uninitialized,
379*38fd1498Szrj "%qE may be used uninitialized in this function",
380*38fd1498Szrj rhs);
381*38fd1498Szrj }
382*38fd1498Szrj }
383*38fd1498Szrj }
384*38fd1498Szrj
385*38fd1498Szrj return 0;
386*38fd1498Szrj }
387*38fd1498Szrj
388*38fd1498Szrj /* Checks if the operand OPND of PHI is defined by
389*38fd1498Szrj another phi with one operand defined by this PHI,
390*38fd1498Szrj but the rest operands are all defined. If yes,
391*38fd1498Szrj returns true to skip this operand as being
392*38fd1498Szrj redundant. Can be enhanced to be more general. */
393*38fd1498Szrj
394*38fd1498Szrj static bool
can_skip_redundant_opnd(tree opnd,gimple * phi)395*38fd1498Szrj can_skip_redundant_opnd (tree opnd, gimple *phi)
396*38fd1498Szrj {
397*38fd1498Szrj gimple *op_def;
398*38fd1498Szrj tree phi_def;
399*38fd1498Szrj int i, n;
400*38fd1498Szrj
401*38fd1498Szrj phi_def = gimple_phi_result (phi);
402*38fd1498Szrj op_def = SSA_NAME_DEF_STMT (opnd);
403*38fd1498Szrj if (gimple_code (op_def) != GIMPLE_PHI)
404*38fd1498Szrj return false;
405*38fd1498Szrj n = gimple_phi_num_args (op_def);
406*38fd1498Szrj for (i = 0; i < n; ++i)
407*38fd1498Szrj {
408*38fd1498Szrj tree op = gimple_phi_arg_def (op_def, i);
409*38fd1498Szrj if (TREE_CODE (op) != SSA_NAME)
410*38fd1498Szrj continue;
411*38fd1498Szrj if (op != phi_def && uninit_undefined_value_p (op))
412*38fd1498Szrj return false;
413*38fd1498Szrj }
414*38fd1498Szrj
415*38fd1498Szrj return true;
416*38fd1498Szrj }
417*38fd1498Szrj
418*38fd1498Szrj /* Returns a bit mask holding the positions of arguments in PHI
419*38fd1498Szrj that have empty (or possibly empty) definitions. */
420*38fd1498Szrj
421*38fd1498Szrj static unsigned
compute_uninit_opnds_pos(gphi * phi)422*38fd1498Szrj compute_uninit_opnds_pos (gphi *phi)
423*38fd1498Szrj {
424*38fd1498Szrj size_t i, n;
425*38fd1498Szrj unsigned uninit_opnds = 0;
426*38fd1498Szrj
427*38fd1498Szrj n = gimple_phi_num_args (phi);
428*38fd1498Szrj /* Bail out for phi with too many args. */
429*38fd1498Szrj if (n > max_phi_args)
430*38fd1498Szrj return 0;
431*38fd1498Szrj
432*38fd1498Szrj for (i = 0; i < n; ++i)
433*38fd1498Szrj {
434*38fd1498Szrj tree op = gimple_phi_arg_def (phi, i);
435*38fd1498Szrj if (TREE_CODE (op) == SSA_NAME
436*38fd1498Szrj && uninit_undefined_value_p (op)
437*38fd1498Szrj && !can_skip_redundant_opnd (op, phi))
438*38fd1498Szrj {
439*38fd1498Szrj if (cfun->has_nonlocal_label || cfun->calls_setjmp)
440*38fd1498Szrj {
441*38fd1498Szrj /* Ignore SSA_NAMEs that appear on abnormal edges
442*38fd1498Szrj somewhere. */
443*38fd1498Szrj if (SSA_NAME_OCCURS_IN_ABNORMAL_PHI (op))
444*38fd1498Szrj continue;
445*38fd1498Szrj }
446*38fd1498Szrj MASK_SET_BIT (uninit_opnds, i);
447*38fd1498Szrj }
448*38fd1498Szrj }
449*38fd1498Szrj return uninit_opnds;
450*38fd1498Szrj }
451*38fd1498Szrj
452*38fd1498Szrj /* Find the immediate postdominator PDOM of the specified
453*38fd1498Szrj basic block BLOCK. */
454*38fd1498Szrj
455*38fd1498Szrj static inline basic_block
find_pdom(basic_block block)456*38fd1498Szrj find_pdom (basic_block block)
457*38fd1498Szrj {
458*38fd1498Szrj if (block == EXIT_BLOCK_PTR_FOR_FN (cfun))
459*38fd1498Szrj return EXIT_BLOCK_PTR_FOR_FN (cfun);
460*38fd1498Szrj else
461*38fd1498Szrj {
462*38fd1498Szrj basic_block bb = get_immediate_dominator (CDI_POST_DOMINATORS, block);
463*38fd1498Szrj if (!bb)
464*38fd1498Szrj return EXIT_BLOCK_PTR_FOR_FN (cfun);
465*38fd1498Szrj return bb;
466*38fd1498Szrj }
467*38fd1498Szrj }
468*38fd1498Szrj
469*38fd1498Szrj /* Find the immediate DOM of the specified basic block BLOCK. */
470*38fd1498Szrj
471*38fd1498Szrj static inline basic_block
find_dom(basic_block block)472*38fd1498Szrj find_dom (basic_block block)
473*38fd1498Szrj {
474*38fd1498Szrj if (block == ENTRY_BLOCK_PTR_FOR_FN (cfun))
475*38fd1498Szrj return ENTRY_BLOCK_PTR_FOR_FN (cfun);
476*38fd1498Szrj else
477*38fd1498Szrj {
478*38fd1498Szrj basic_block bb = get_immediate_dominator (CDI_DOMINATORS, block);
479*38fd1498Szrj if (!bb)
480*38fd1498Szrj return ENTRY_BLOCK_PTR_FOR_FN (cfun);
481*38fd1498Szrj return bb;
482*38fd1498Szrj }
483*38fd1498Szrj }
484*38fd1498Szrj
485*38fd1498Szrj /* Returns true if BB1 is postdominating BB2 and BB1 is
486*38fd1498Szrj not a loop exit bb. The loop exit bb check is simple and does
487*38fd1498Szrj not cover all cases. */
488*38fd1498Szrj
489*38fd1498Szrj static bool
is_non_loop_exit_postdominating(basic_block bb1,basic_block bb2)490*38fd1498Szrj is_non_loop_exit_postdominating (basic_block bb1, basic_block bb2)
491*38fd1498Szrj {
492*38fd1498Szrj if (!dominated_by_p (CDI_POST_DOMINATORS, bb2, bb1))
493*38fd1498Szrj return false;
494*38fd1498Szrj
495*38fd1498Szrj if (single_pred_p (bb1) && !single_succ_p (bb2))
496*38fd1498Szrj return false;
497*38fd1498Szrj
498*38fd1498Szrj return true;
499*38fd1498Szrj }
500*38fd1498Szrj
501*38fd1498Szrj /* Find the closest postdominator of a specified BB, which is control
502*38fd1498Szrj equivalent to BB. */
503*38fd1498Szrj
504*38fd1498Szrj static inline basic_block
find_control_equiv_block(basic_block bb)505*38fd1498Szrj find_control_equiv_block (basic_block bb)
506*38fd1498Szrj {
507*38fd1498Szrj basic_block pdom;
508*38fd1498Szrj
509*38fd1498Szrj pdom = find_pdom (bb);
510*38fd1498Szrj
511*38fd1498Szrj /* Skip the postdominating bb that is also loop exit. */
512*38fd1498Szrj if (!is_non_loop_exit_postdominating (pdom, bb))
513*38fd1498Szrj return NULL;
514*38fd1498Szrj
515*38fd1498Szrj if (dominated_by_p (CDI_DOMINATORS, pdom, bb))
516*38fd1498Szrj return pdom;
517*38fd1498Szrj
518*38fd1498Szrj return NULL;
519*38fd1498Szrj }
520*38fd1498Szrj
521*38fd1498Szrj #define MAX_NUM_CHAINS 8
522*38fd1498Szrj #define MAX_CHAIN_LEN 5
523*38fd1498Szrj #define MAX_POSTDOM_CHECK 8
524*38fd1498Szrj #define MAX_SWITCH_CASES 40
525*38fd1498Szrj
526*38fd1498Szrj /* Computes the control dependence chains (paths of edges)
527*38fd1498Szrj for DEP_BB up to the dominating basic block BB (the head node of a
528*38fd1498Szrj chain should be dominated by it). CD_CHAINS is pointer to an
529*38fd1498Szrj array holding the result chains. CUR_CD_CHAIN is the current
530*38fd1498Szrj chain being computed. *NUM_CHAINS is total number of chains. The
531*38fd1498Szrj function returns true if the information is successfully computed,
532*38fd1498Szrj return false if there is no control dependence or not computed. */
533*38fd1498Szrj
534*38fd1498Szrj static bool
compute_control_dep_chain(basic_block bb,basic_block dep_bb,vec<edge> * cd_chains,size_t * num_chains,vec<edge> * cur_cd_chain,int * num_calls)535*38fd1498Szrj compute_control_dep_chain (basic_block bb, basic_block dep_bb,
536*38fd1498Szrj vec<edge> *cd_chains,
537*38fd1498Szrj size_t *num_chains,
538*38fd1498Szrj vec<edge> *cur_cd_chain,
539*38fd1498Szrj int *num_calls)
540*38fd1498Szrj {
541*38fd1498Szrj edge_iterator ei;
542*38fd1498Szrj edge e;
543*38fd1498Szrj size_t i;
544*38fd1498Szrj bool found_cd_chain = false;
545*38fd1498Szrj size_t cur_chain_len = 0;
546*38fd1498Szrj
547*38fd1498Szrj if (*num_calls > PARAM_VALUE (PARAM_UNINIT_CONTROL_DEP_ATTEMPTS))
548*38fd1498Szrj return false;
549*38fd1498Szrj ++*num_calls;
550*38fd1498Szrj
551*38fd1498Szrj /* Could use a set instead. */
552*38fd1498Szrj cur_chain_len = cur_cd_chain->length ();
553*38fd1498Szrj if (cur_chain_len > MAX_CHAIN_LEN)
554*38fd1498Szrj return false;
555*38fd1498Szrj
556*38fd1498Szrj for (i = 0; i < cur_chain_len; i++)
557*38fd1498Szrj {
558*38fd1498Szrj edge e = (*cur_cd_chain)[i];
559*38fd1498Szrj /* Cycle detected. */
560*38fd1498Szrj if (e->src == bb)
561*38fd1498Szrj return false;
562*38fd1498Szrj }
563*38fd1498Szrj
564*38fd1498Szrj FOR_EACH_EDGE (e, ei, bb->succs)
565*38fd1498Szrj {
566*38fd1498Szrj basic_block cd_bb;
567*38fd1498Szrj int post_dom_check = 0;
568*38fd1498Szrj if (e->flags & (EDGE_FAKE | EDGE_ABNORMAL))
569*38fd1498Szrj continue;
570*38fd1498Szrj
571*38fd1498Szrj cd_bb = e->dest;
572*38fd1498Szrj cur_cd_chain->safe_push (e);
573*38fd1498Szrj while (!is_non_loop_exit_postdominating (cd_bb, bb))
574*38fd1498Szrj {
575*38fd1498Szrj if (cd_bb == dep_bb)
576*38fd1498Szrj {
577*38fd1498Szrj /* Found a direct control dependence. */
578*38fd1498Szrj if (*num_chains < MAX_NUM_CHAINS)
579*38fd1498Szrj {
580*38fd1498Szrj cd_chains[*num_chains] = cur_cd_chain->copy ();
581*38fd1498Szrj (*num_chains)++;
582*38fd1498Szrj }
583*38fd1498Szrj found_cd_chain = true;
584*38fd1498Szrj /* Check path from next edge. */
585*38fd1498Szrj break;
586*38fd1498Szrj }
587*38fd1498Szrj
588*38fd1498Szrj /* Now check if DEP_BB is indirectly control dependent on BB. */
589*38fd1498Szrj if (compute_control_dep_chain (cd_bb, dep_bb, cd_chains, num_chains,
590*38fd1498Szrj cur_cd_chain, num_calls))
591*38fd1498Szrj {
592*38fd1498Szrj found_cd_chain = true;
593*38fd1498Szrj break;
594*38fd1498Szrj }
595*38fd1498Szrj
596*38fd1498Szrj cd_bb = find_pdom (cd_bb);
597*38fd1498Szrj post_dom_check++;
598*38fd1498Szrj if (cd_bb == EXIT_BLOCK_PTR_FOR_FN (cfun)
599*38fd1498Szrj || post_dom_check > MAX_POSTDOM_CHECK)
600*38fd1498Szrj break;
601*38fd1498Szrj }
602*38fd1498Szrj cur_cd_chain->pop ();
603*38fd1498Szrj gcc_assert (cur_cd_chain->length () == cur_chain_len);
604*38fd1498Szrj }
605*38fd1498Szrj gcc_assert (cur_cd_chain->length () == cur_chain_len);
606*38fd1498Szrj
607*38fd1498Szrj return found_cd_chain;
608*38fd1498Szrj }
609*38fd1498Szrj
610*38fd1498Szrj /* The type to represent a simple predicate. */
611*38fd1498Szrj
612*38fd1498Szrj struct pred_info
613*38fd1498Szrj {
614*38fd1498Szrj tree pred_lhs;
615*38fd1498Szrj tree pred_rhs;
616*38fd1498Szrj enum tree_code cond_code;
617*38fd1498Szrj bool invert;
618*38fd1498Szrj };
619*38fd1498Szrj
620*38fd1498Szrj /* The type to represent a sequence of predicates grouped
621*38fd1498Szrj with .AND. operation. */
622*38fd1498Szrj
623*38fd1498Szrj typedef vec<pred_info, va_heap, vl_ptr> pred_chain;
624*38fd1498Szrj
625*38fd1498Szrj /* The type to represent a sequence of pred_chains grouped
626*38fd1498Szrj with .OR. operation. */
627*38fd1498Szrj
628*38fd1498Szrj typedef vec<pred_chain, va_heap, vl_ptr> pred_chain_union;
629*38fd1498Szrj
630*38fd1498Szrj /* Converts the chains of control dependence edges into a set of
631*38fd1498Szrj predicates. A control dependence chain is represented by a vector
632*38fd1498Szrj edges. DEP_CHAINS points to an array of dependence chains.
633*38fd1498Szrj NUM_CHAINS is the size of the chain array. One edge in a dependence
634*38fd1498Szrj chain is mapped to predicate expression represented by pred_info
635*38fd1498Szrj type. One dependence chain is converted to a composite predicate that
636*38fd1498Szrj is the result of AND operation of pred_info mapped to each edge.
637*38fd1498Szrj A composite predicate is presented by a vector of pred_info. On
638*38fd1498Szrj return, *PREDS points to the resulting array of composite predicates.
639*38fd1498Szrj *NUM_PREDS is the number of composite predictes. */
640*38fd1498Szrj
641*38fd1498Szrj static bool
convert_control_dep_chain_into_preds(vec<edge> * dep_chains,size_t num_chains,pred_chain_union * preds)642*38fd1498Szrj convert_control_dep_chain_into_preds (vec<edge> *dep_chains,
643*38fd1498Szrj size_t num_chains,
644*38fd1498Szrj pred_chain_union *preds)
645*38fd1498Szrj {
646*38fd1498Szrj bool has_valid_pred = false;
647*38fd1498Szrj size_t i, j;
648*38fd1498Szrj if (num_chains == 0 || num_chains >= MAX_NUM_CHAINS)
649*38fd1498Szrj return false;
650*38fd1498Szrj
651*38fd1498Szrj /* Now convert the control dep chain into a set
652*38fd1498Szrj of predicates. */
653*38fd1498Szrj preds->reserve (num_chains);
654*38fd1498Szrj
655*38fd1498Szrj for (i = 0; i < num_chains; i++)
656*38fd1498Szrj {
657*38fd1498Szrj vec<edge> one_cd_chain = dep_chains[i];
658*38fd1498Szrj
659*38fd1498Szrj has_valid_pred = false;
660*38fd1498Szrj pred_chain t_chain = vNULL;
661*38fd1498Szrj for (j = 0; j < one_cd_chain.length (); j++)
662*38fd1498Szrj {
663*38fd1498Szrj gimple *cond_stmt;
664*38fd1498Szrj gimple_stmt_iterator gsi;
665*38fd1498Szrj basic_block guard_bb;
666*38fd1498Szrj pred_info one_pred;
667*38fd1498Szrj edge e;
668*38fd1498Szrj
669*38fd1498Szrj e = one_cd_chain[j];
670*38fd1498Szrj guard_bb = e->src;
671*38fd1498Szrj gsi = gsi_last_bb (guard_bb);
672*38fd1498Szrj /* Ignore empty forwarder blocks. */
673*38fd1498Szrj if (empty_block_p (guard_bb) && single_succ_p (guard_bb))
674*38fd1498Szrj continue;
675*38fd1498Szrj /* An empty basic block here is likely a PHI, and is not one
676*38fd1498Szrj of the cases we handle below. */
677*38fd1498Szrj if (gsi_end_p (gsi))
678*38fd1498Szrj {
679*38fd1498Szrj has_valid_pred = false;
680*38fd1498Szrj break;
681*38fd1498Szrj }
682*38fd1498Szrj cond_stmt = gsi_stmt (gsi);
683*38fd1498Szrj if (is_gimple_call (cond_stmt) && EDGE_COUNT (e->src->succs) >= 2)
684*38fd1498Szrj /* Ignore EH edge. Can add assertion on the other edge's flag. */
685*38fd1498Szrj continue;
686*38fd1498Szrj /* Skip if there is essentially one succesor. */
687*38fd1498Szrj if (EDGE_COUNT (e->src->succs) == 2)
688*38fd1498Szrj {
689*38fd1498Szrj edge e1;
690*38fd1498Szrj edge_iterator ei1;
691*38fd1498Szrj bool skip = false;
692*38fd1498Szrj
693*38fd1498Szrj FOR_EACH_EDGE (e1, ei1, e->src->succs)
694*38fd1498Szrj {
695*38fd1498Szrj if (EDGE_COUNT (e1->dest->succs) == 0)
696*38fd1498Szrj {
697*38fd1498Szrj skip = true;
698*38fd1498Szrj break;
699*38fd1498Szrj }
700*38fd1498Szrj }
701*38fd1498Szrj if (skip)
702*38fd1498Szrj continue;
703*38fd1498Szrj }
704*38fd1498Szrj if (gimple_code (cond_stmt) == GIMPLE_COND)
705*38fd1498Szrj {
706*38fd1498Szrj one_pred.pred_lhs = gimple_cond_lhs (cond_stmt);
707*38fd1498Szrj one_pred.pred_rhs = gimple_cond_rhs (cond_stmt);
708*38fd1498Szrj one_pred.cond_code = gimple_cond_code (cond_stmt);
709*38fd1498Szrj one_pred.invert = !!(e->flags & EDGE_FALSE_VALUE);
710*38fd1498Szrj t_chain.safe_push (one_pred);
711*38fd1498Szrj has_valid_pred = true;
712*38fd1498Szrj }
713*38fd1498Szrj else if (gswitch *gs = dyn_cast<gswitch *> (cond_stmt))
714*38fd1498Szrj {
715*38fd1498Szrj /* Avoid quadratic behavior. */
716*38fd1498Szrj if (gimple_switch_num_labels (gs) > MAX_SWITCH_CASES)
717*38fd1498Szrj {
718*38fd1498Szrj has_valid_pred = false;
719*38fd1498Szrj break;
720*38fd1498Szrj }
721*38fd1498Szrj /* Find the case label. */
722*38fd1498Szrj tree l = NULL_TREE;
723*38fd1498Szrj unsigned idx;
724*38fd1498Szrj for (idx = 0; idx < gimple_switch_num_labels (gs); ++idx)
725*38fd1498Szrj {
726*38fd1498Szrj tree tl = gimple_switch_label (gs, idx);
727*38fd1498Szrj if (e->dest == label_to_block (CASE_LABEL (tl)))
728*38fd1498Szrj {
729*38fd1498Szrj if (!l)
730*38fd1498Szrj l = tl;
731*38fd1498Szrj else
732*38fd1498Szrj {
733*38fd1498Szrj l = NULL_TREE;
734*38fd1498Szrj break;
735*38fd1498Szrj }
736*38fd1498Szrj }
737*38fd1498Szrj }
738*38fd1498Szrj /* If more than one label reaches this block or the case
739*38fd1498Szrj label doesn't have a single value (like the default one)
740*38fd1498Szrj fail. */
741*38fd1498Szrj if (!l
742*38fd1498Szrj || !CASE_LOW (l)
743*38fd1498Szrj || (CASE_HIGH (l)
744*38fd1498Szrj && !operand_equal_p (CASE_LOW (l), CASE_HIGH (l), 0)))
745*38fd1498Szrj {
746*38fd1498Szrj has_valid_pred = false;
747*38fd1498Szrj break;
748*38fd1498Szrj }
749*38fd1498Szrj one_pred.pred_lhs = gimple_switch_index (gs);
750*38fd1498Szrj one_pred.pred_rhs = CASE_LOW (l);
751*38fd1498Szrj one_pred.cond_code = EQ_EXPR;
752*38fd1498Szrj one_pred.invert = false;
753*38fd1498Szrj t_chain.safe_push (one_pred);
754*38fd1498Szrj has_valid_pred = true;
755*38fd1498Szrj }
756*38fd1498Szrj else
757*38fd1498Szrj {
758*38fd1498Szrj has_valid_pred = false;
759*38fd1498Szrj break;
760*38fd1498Szrj }
761*38fd1498Szrj }
762*38fd1498Szrj
763*38fd1498Szrj if (!has_valid_pred)
764*38fd1498Szrj break;
765*38fd1498Szrj else
766*38fd1498Szrj preds->safe_push (t_chain);
767*38fd1498Szrj }
768*38fd1498Szrj return has_valid_pred;
769*38fd1498Szrj }
770*38fd1498Szrj
771*38fd1498Szrj /* Computes all control dependence chains for USE_BB. The control
772*38fd1498Szrj dependence chains are then converted to an array of composite
773*38fd1498Szrj predicates pointed to by PREDS. PHI_BB is the basic block of
774*38fd1498Szrj the phi whose result is used in USE_BB. */
775*38fd1498Szrj
776*38fd1498Szrj static bool
find_predicates(pred_chain_union * preds,basic_block phi_bb,basic_block use_bb)777*38fd1498Szrj find_predicates (pred_chain_union *preds,
778*38fd1498Szrj basic_block phi_bb,
779*38fd1498Szrj basic_block use_bb)
780*38fd1498Szrj {
781*38fd1498Szrj size_t num_chains = 0, i;
782*38fd1498Szrj int num_calls = 0;
783*38fd1498Szrj vec<edge> dep_chains[MAX_NUM_CHAINS];
784*38fd1498Szrj auto_vec<edge, MAX_CHAIN_LEN + 1> cur_chain;
785*38fd1498Szrj bool has_valid_pred = false;
786*38fd1498Szrj basic_block cd_root = 0;
787*38fd1498Szrj
788*38fd1498Szrj /* First find the closest bb that is control equivalent to PHI_BB
789*38fd1498Szrj that also dominates USE_BB. */
790*38fd1498Szrj cd_root = phi_bb;
791*38fd1498Szrj while (dominated_by_p (CDI_DOMINATORS, use_bb, cd_root))
792*38fd1498Szrj {
793*38fd1498Szrj basic_block ctrl_eq_bb = find_control_equiv_block (cd_root);
794*38fd1498Szrj if (ctrl_eq_bb && dominated_by_p (CDI_DOMINATORS, use_bb, ctrl_eq_bb))
795*38fd1498Szrj cd_root = ctrl_eq_bb;
796*38fd1498Szrj else
797*38fd1498Szrj break;
798*38fd1498Szrj }
799*38fd1498Szrj
800*38fd1498Szrj compute_control_dep_chain (cd_root, use_bb, dep_chains, &num_chains,
801*38fd1498Szrj &cur_chain, &num_calls);
802*38fd1498Szrj
803*38fd1498Szrj has_valid_pred
804*38fd1498Szrj = convert_control_dep_chain_into_preds (dep_chains, num_chains, preds);
805*38fd1498Szrj for (i = 0; i < num_chains; i++)
806*38fd1498Szrj dep_chains[i].release ();
807*38fd1498Szrj return has_valid_pred;
808*38fd1498Szrj }
809*38fd1498Szrj
810*38fd1498Szrj /* Computes the set of incoming edges of PHI that have non empty
811*38fd1498Szrj definitions of a phi chain. The collection will be done
812*38fd1498Szrj recursively on operands that are defined by phis. CD_ROOT
813*38fd1498Szrj is the control dependence root. *EDGES holds the result, and
814*38fd1498Szrj VISITED_PHIS is a pointer set for detecting cycles. */
815*38fd1498Szrj
816*38fd1498Szrj static void
collect_phi_def_edges(gphi * phi,basic_block cd_root,auto_vec<edge> * edges,hash_set<gimple * > * visited_phis)817*38fd1498Szrj collect_phi_def_edges (gphi *phi, basic_block cd_root,
818*38fd1498Szrj auto_vec<edge> *edges,
819*38fd1498Szrj hash_set<gimple *> *visited_phis)
820*38fd1498Szrj {
821*38fd1498Szrj size_t i, n;
822*38fd1498Szrj edge opnd_edge;
823*38fd1498Szrj tree opnd;
824*38fd1498Szrj
825*38fd1498Szrj if (visited_phis->add (phi))
826*38fd1498Szrj return;
827*38fd1498Szrj
828*38fd1498Szrj n = gimple_phi_num_args (phi);
829*38fd1498Szrj for (i = 0; i < n; i++)
830*38fd1498Szrj {
831*38fd1498Szrj opnd_edge = gimple_phi_arg_edge (phi, i);
832*38fd1498Szrj opnd = gimple_phi_arg_def (phi, i);
833*38fd1498Szrj
834*38fd1498Szrj if (TREE_CODE (opnd) != SSA_NAME)
835*38fd1498Szrj {
836*38fd1498Szrj if (dump_file && (dump_flags & TDF_DETAILS))
837*38fd1498Szrj {
838*38fd1498Szrj fprintf (dump_file, "\n[CHECK] Found def edge %d in ", (int) i);
839*38fd1498Szrj print_gimple_stmt (dump_file, phi, 0);
840*38fd1498Szrj }
841*38fd1498Szrj edges->safe_push (opnd_edge);
842*38fd1498Szrj }
843*38fd1498Szrj else
844*38fd1498Szrj {
845*38fd1498Szrj gimple *def = SSA_NAME_DEF_STMT (opnd);
846*38fd1498Szrj
847*38fd1498Szrj if (gimple_code (def) == GIMPLE_PHI
848*38fd1498Szrj && dominated_by_p (CDI_DOMINATORS, gimple_bb (def), cd_root))
849*38fd1498Szrj collect_phi_def_edges (as_a<gphi *> (def), cd_root, edges,
850*38fd1498Szrj visited_phis);
851*38fd1498Szrj else if (!uninit_undefined_value_p (opnd))
852*38fd1498Szrj {
853*38fd1498Szrj if (dump_file && (dump_flags & TDF_DETAILS))
854*38fd1498Szrj {
855*38fd1498Szrj fprintf (dump_file, "\n[CHECK] Found def edge %d in ",
856*38fd1498Szrj (int) i);
857*38fd1498Szrj print_gimple_stmt (dump_file, phi, 0);
858*38fd1498Szrj }
859*38fd1498Szrj edges->safe_push (opnd_edge);
860*38fd1498Szrj }
861*38fd1498Szrj }
862*38fd1498Szrj }
863*38fd1498Szrj }
864*38fd1498Szrj
865*38fd1498Szrj /* For each use edge of PHI, computes all control dependence chains.
866*38fd1498Szrj The control dependence chains are then converted to an array of
867*38fd1498Szrj composite predicates pointed to by PREDS. */
868*38fd1498Szrj
869*38fd1498Szrj static bool
find_def_preds(pred_chain_union * preds,gphi * phi)870*38fd1498Szrj find_def_preds (pred_chain_union *preds, gphi *phi)
871*38fd1498Szrj {
872*38fd1498Szrj size_t num_chains = 0, i, n;
873*38fd1498Szrj vec<edge> dep_chains[MAX_NUM_CHAINS];
874*38fd1498Szrj auto_vec<edge, MAX_CHAIN_LEN + 1> cur_chain;
875*38fd1498Szrj auto_vec<edge> def_edges;
876*38fd1498Szrj bool has_valid_pred = false;
877*38fd1498Szrj basic_block phi_bb, cd_root = 0;
878*38fd1498Szrj
879*38fd1498Szrj phi_bb = gimple_bb (phi);
880*38fd1498Szrj /* First find the closest dominating bb to be
881*38fd1498Szrj the control dependence root. */
882*38fd1498Szrj cd_root = find_dom (phi_bb);
883*38fd1498Szrj if (!cd_root)
884*38fd1498Szrj return false;
885*38fd1498Szrj
886*38fd1498Szrj hash_set<gimple *> visited_phis;
887*38fd1498Szrj collect_phi_def_edges (phi, cd_root, &def_edges, &visited_phis);
888*38fd1498Szrj
889*38fd1498Szrj n = def_edges.length ();
890*38fd1498Szrj if (n == 0)
891*38fd1498Szrj return false;
892*38fd1498Szrj
893*38fd1498Szrj for (i = 0; i < n; i++)
894*38fd1498Szrj {
895*38fd1498Szrj size_t prev_nc, j;
896*38fd1498Szrj int num_calls = 0;
897*38fd1498Szrj edge opnd_edge;
898*38fd1498Szrj
899*38fd1498Szrj opnd_edge = def_edges[i];
900*38fd1498Szrj prev_nc = num_chains;
901*38fd1498Szrj compute_control_dep_chain (cd_root, opnd_edge->src, dep_chains,
902*38fd1498Szrj &num_chains, &cur_chain, &num_calls);
903*38fd1498Szrj
904*38fd1498Szrj /* Now update the newly added chains with
905*38fd1498Szrj the phi operand edge: */
906*38fd1498Szrj if (EDGE_COUNT (opnd_edge->src->succs) > 1)
907*38fd1498Szrj {
908*38fd1498Szrj if (prev_nc == num_chains && num_chains < MAX_NUM_CHAINS)
909*38fd1498Szrj dep_chains[num_chains++] = vNULL;
910*38fd1498Szrj for (j = prev_nc; j < num_chains; j++)
911*38fd1498Szrj dep_chains[j].safe_push (opnd_edge);
912*38fd1498Szrj }
913*38fd1498Szrj }
914*38fd1498Szrj
915*38fd1498Szrj has_valid_pred
916*38fd1498Szrj = convert_control_dep_chain_into_preds (dep_chains, num_chains, preds);
917*38fd1498Szrj for (i = 0; i < num_chains; i++)
918*38fd1498Szrj dep_chains[i].release ();
919*38fd1498Szrj return has_valid_pred;
920*38fd1498Szrj }
921*38fd1498Szrj
922*38fd1498Szrj /* Dump a pred_info. */
923*38fd1498Szrj
924*38fd1498Szrj static void
dump_pred_info(pred_info one_pred)925*38fd1498Szrj dump_pred_info (pred_info one_pred)
926*38fd1498Szrj {
927*38fd1498Szrj if (one_pred.invert)
928*38fd1498Szrj fprintf (dump_file, " (.NOT.) ");
929*38fd1498Szrj print_generic_expr (dump_file, one_pred.pred_lhs);
930*38fd1498Szrj fprintf (dump_file, " %s ", op_symbol_code (one_pred.cond_code));
931*38fd1498Szrj print_generic_expr (dump_file, one_pred.pred_rhs);
932*38fd1498Szrj }
933*38fd1498Szrj
934*38fd1498Szrj /* Dump a pred_chain. */
935*38fd1498Szrj
936*38fd1498Szrj static void
dump_pred_chain(pred_chain one_pred_chain)937*38fd1498Szrj dump_pred_chain (pred_chain one_pred_chain)
938*38fd1498Szrj {
939*38fd1498Szrj size_t np = one_pred_chain.length ();
940*38fd1498Szrj for (size_t j = 0; j < np; j++)
941*38fd1498Szrj {
942*38fd1498Szrj dump_pred_info (one_pred_chain[j]);
943*38fd1498Szrj if (j < np - 1)
944*38fd1498Szrj fprintf (dump_file, " (.AND.) ");
945*38fd1498Szrj else
946*38fd1498Szrj fprintf (dump_file, "\n");
947*38fd1498Szrj }
948*38fd1498Szrj }
949*38fd1498Szrj
950*38fd1498Szrj /* Dumps the predicates (PREDS) for USESTMT. */
951*38fd1498Szrj
952*38fd1498Szrj static void
dump_predicates(gimple * usestmt,pred_chain_union preds,const char * msg)953*38fd1498Szrj dump_predicates (gimple *usestmt, pred_chain_union preds, const char *msg)
954*38fd1498Szrj {
955*38fd1498Szrj fprintf (dump_file, "%s", msg);
956*38fd1498Szrj if (usestmt)
957*38fd1498Szrj {
958*38fd1498Szrj print_gimple_stmt (dump_file, usestmt, 0);
959*38fd1498Szrj fprintf (dump_file, "is guarded by :\n\n");
960*38fd1498Szrj }
961*38fd1498Szrj size_t num_preds = preds.length ();
962*38fd1498Szrj for (size_t i = 0; i < num_preds; i++)
963*38fd1498Szrj {
964*38fd1498Szrj dump_pred_chain (preds[i]);
965*38fd1498Szrj if (i < num_preds - 1)
966*38fd1498Szrj fprintf (dump_file, "(.OR.)\n");
967*38fd1498Szrj else
968*38fd1498Szrj fprintf (dump_file, "\n\n");
969*38fd1498Szrj }
970*38fd1498Szrj }
971*38fd1498Szrj
972*38fd1498Szrj /* Destroys the predicate set *PREDS. */
973*38fd1498Szrj
974*38fd1498Szrj static void
destroy_predicate_vecs(pred_chain_union * preds)975*38fd1498Szrj destroy_predicate_vecs (pred_chain_union *preds)
976*38fd1498Szrj {
977*38fd1498Szrj size_t i;
978*38fd1498Szrj
979*38fd1498Szrj size_t n = preds->length ();
980*38fd1498Szrj for (i = 0; i < n; i++)
981*38fd1498Szrj (*preds)[i].release ();
982*38fd1498Szrj preds->release ();
983*38fd1498Szrj }
984*38fd1498Szrj
985*38fd1498Szrj /* Computes the 'normalized' conditional code with operand
986*38fd1498Szrj swapping and condition inversion. */
987*38fd1498Szrj
988*38fd1498Szrj static enum tree_code
get_cmp_code(enum tree_code orig_cmp_code,bool swap_cond,bool invert)989*38fd1498Szrj get_cmp_code (enum tree_code orig_cmp_code, bool swap_cond, bool invert)
990*38fd1498Szrj {
991*38fd1498Szrj enum tree_code tc = orig_cmp_code;
992*38fd1498Szrj
993*38fd1498Szrj if (swap_cond)
994*38fd1498Szrj tc = swap_tree_comparison (orig_cmp_code);
995*38fd1498Szrj if (invert)
996*38fd1498Szrj tc = invert_tree_comparison (tc, false);
997*38fd1498Szrj
998*38fd1498Szrj switch (tc)
999*38fd1498Szrj {
1000*38fd1498Szrj case LT_EXPR:
1001*38fd1498Szrj case LE_EXPR:
1002*38fd1498Szrj case GT_EXPR:
1003*38fd1498Szrj case GE_EXPR:
1004*38fd1498Szrj case EQ_EXPR:
1005*38fd1498Szrj case NE_EXPR:
1006*38fd1498Szrj break;
1007*38fd1498Szrj default:
1008*38fd1498Szrj return ERROR_MARK;
1009*38fd1498Szrj }
1010*38fd1498Szrj return tc;
1011*38fd1498Szrj }
1012*38fd1498Szrj
1013*38fd1498Szrj /* Returns true if VAL falls in the range defined by BOUNDARY and CMPC, i.e.
1014*38fd1498Szrj all values in the range satisfies (x CMPC BOUNDARY) == true. */
1015*38fd1498Szrj
1016*38fd1498Szrj static bool
is_value_included_in(tree val,tree boundary,enum tree_code cmpc)1017*38fd1498Szrj is_value_included_in (tree val, tree boundary, enum tree_code cmpc)
1018*38fd1498Szrj {
1019*38fd1498Szrj bool inverted = false;
1020*38fd1498Szrj bool is_unsigned;
1021*38fd1498Szrj bool result;
1022*38fd1498Szrj
1023*38fd1498Szrj /* Only handle integer constant here. */
1024*38fd1498Szrj if (TREE_CODE (val) != INTEGER_CST || TREE_CODE (boundary) != INTEGER_CST)
1025*38fd1498Szrj return true;
1026*38fd1498Szrj
1027*38fd1498Szrj is_unsigned = TYPE_UNSIGNED (TREE_TYPE (val));
1028*38fd1498Szrj
1029*38fd1498Szrj if (cmpc == GE_EXPR || cmpc == GT_EXPR || cmpc == NE_EXPR)
1030*38fd1498Szrj {
1031*38fd1498Szrj cmpc = invert_tree_comparison (cmpc, false);
1032*38fd1498Szrj inverted = true;
1033*38fd1498Szrj }
1034*38fd1498Szrj
1035*38fd1498Szrj if (is_unsigned)
1036*38fd1498Szrj {
1037*38fd1498Szrj if (cmpc == EQ_EXPR)
1038*38fd1498Szrj result = tree_int_cst_equal (val, boundary);
1039*38fd1498Szrj else if (cmpc == LT_EXPR)
1040*38fd1498Szrj result = tree_int_cst_lt (val, boundary);
1041*38fd1498Szrj else
1042*38fd1498Szrj {
1043*38fd1498Szrj gcc_assert (cmpc == LE_EXPR);
1044*38fd1498Szrj result = tree_int_cst_le (val, boundary);
1045*38fd1498Szrj }
1046*38fd1498Szrj }
1047*38fd1498Szrj else
1048*38fd1498Szrj {
1049*38fd1498Szrj if (cmpc == EQ_EXPR)
1050*38fd1498Szrj result = tree_int_cst_equal (val, boundary);
1051*38fd1498Szrj else if (cmpc == LT_EXPR)
1052*38fd1498Szrj result = tree_int_cst_lt (val, boundary);
1053*38fd1498Szrj else
1054*38fd1498Szrj {
1055*38fd1498Szrj gcc_assert (cmpc == LE_EXPR);
1056*38fd1498Szrj result = (tree_int_cst_equal (val, boundary)
1057*38fd1498Szrj || tree_int_cst_lt (val, boundary));
1058*38fd1498Szrj }
1059*38fd1498Szrj }
1060*38fd1498Szrj
1061*38fd1498Szrj if (inverted)
1062*38fd1498Szrj result ^= 1;
1063*38fd1498Szrj
1064*38fd1498Szrj return result;
1065*38fd1498Szrj }
1066*38fd1498Szrj
1067*38fd1498Szrj /* Returns true if PRED is common among all the predicate
1068*38fd1498Szrj chains (PREDS) (and therefore can be factored out).
1069*38fd1498Szrj NUM_PRED_CHAIN is the size of array PREDS. */
1070*38fd1498Szrj
1071*38fd1498Szrj static bool
find_matching_predicate_in_rest_chains(pred_info pred,pred_chain_union preds,size_t num_pred_chains)1072*38fd1498Szrj find_matching_predicate_in_rest_chains (pred_info pred,
1073*38fd1498Szrj pred_chain_union preds,
1074*38fd1498Szrj size_t num_pred_chains)
1075*38fd1498Szrj {
1076*38fd1498Szrj size_t i, j, n;
1077*38fd1498Szrj
1078*38fd1498Szrj /* Trival case. */
1079*38fd1498Szrj if (num_pred_chains == 1)
1080*38fd1498Szrj return true;
1081*38fd1498Szrj
1082*38fd1498Szrj for (i = 1; i < num_pred_chains; i++)
1083*38fd1498Szrj {
1084*38fd1498Szrj bool found = false;
1085*38fd1498Szrj pred_chain one_chain = preds[i];
1086*38fd1498Szrj n = one_chain.length ();
1087*38fd1498Szrj for (j = 0; j < n; j++)
1088*38fd1498Szrj {
1089*38fd1498Szrj pred_info pred2 = one_chain[j];
1090*38fd1498Szrj /* Can relax the condition comparison to not
1091*38fd1498Szrj use address comparison. However, the most common
1092*38fd1498Szrj case is that multiple control dependent paths share
1093*38fd1498Szrj a common path prefix, so address comparison should
1094*38fd1498Szrj be ok. */
1095*38fd1498Szrj
1096*38fd1498Szrj if (operand_equal_p (pred2.pred_lhs, pred.pred_lhs, 0)
1097*38fd1498Szrj && operand_equal_p (pred2.pred_rhs, pred.pred_rhs, 0)
1098*38fd1498Szrj && pred2.invert == pred.invert)
1099*38fd1498Szrj {
1100*38fd1498Szrj found = true;
1101*38fd1498Szrj break;
1102*38fd1498Szrj }
1103*38fd1498Szrj }
1104*38fd1498Szrj if (!found)
1105*38fd1498Szrj return false;
1106*38fd1498Szrj }
1107*38fd1498Szrj return true;
1108*38fd1498Szrj }
1109*38fd1498Szrj
1110*38fd1498Szrj /* Forward declaration. */
1111*38fd1498Szrj static bool is_use_properly_guarded (gimple *use_stmt,
1112*38fd1498Szrj basic_block use_bb,
1113*38fd1498Szrj gphi *phi,
1114*38fd1498Szrj unsigned uninit_opnds,
1115*38fd1498Szrj pred_chain_union *def_preds,
1116*38fd1498Szrj hash_set<gphi *> *visited_phis);
1117*38fd1498Szrj
1118*38fd1498Szrj /* Returns true if all uninitialized opnds are pruned. Returns false
1119*38fd1498Szrj otherwise. PHI is the phi node with uninitialized operands,
1120*38fd1498Szrj UNINIT_OPNDS is the bitmap of the uninitialize operand positions,
1121*38fd1498Szrj FLAG_DEF is the statement defining the flag guarding the use of the
1122*38fd1498Szrj PHI output, BOUNDARY_CST is the const value used in the predicate
1123*38fd1498Szrj associated with the flag, CMP_CODE is the comparison code used in
1124*38fd1498Szrj the predicate, VISITED_PHIS is the pointer set of phis visited, and
1125*38fd1498Szrj VISITED_FLAG_PHIS is the pointer to the pointer set of flag definitions
1126*38fd1498Szrj that are also phis.
1127*38fd1498Szrj
1128*38fd1498Szrj Example scenario:
1129*38fd1498Szrj
1130*38fd1498Szrj BB1:
1131*38fd1498Szrj flag_1 = phi <0, 1> // (1)
1132*38fd1498Szrj var_1 = phi <undef, some_val>
1133*38fd1498Szrj
1134*38fd1498Szrj
1135*38fd1498Szrj BB2:
1136*38fd1498Szrj flag_2 = phi <0, flag_1, flag_1> // (2)
1137*38fd1498Szrj var_2 = phi <undef, var_1, var_1>
1138*38fd1498Szrj if (flag_2 == 1)
1139*38fd1498Szrj goto BB3;
1140*38fd1498Szrj
1141*38fd1498Szrj BB3:
1142*38fd1498Szrj use of var_2 // (3)
1143*38fd1498Szrj
1144*38fd1498Szrj Because some flag arg in (1) is not constant, if we do not look into the
1145*38fd1498Szrj flag phis recursively, it is conservatively treated as unknown and var_1
1146*38fd1498Szrj is thought to be flowed into use at (3). Since var_1 is potentially
1147*38fd1498Szrj uninitialized a false warning will be emitted.
1148*38fd1498Szrj Checking recursively into (1), the compiler can find out that only some_val
1149*38fd1498Szrj (which is defined) can flow into (3) which is OK. */
1150*38fd1498Szrj
1151*38fd1498Szrj static bool
prune_uninit_phi_opnds(gphi * phi,unsigned uninit_opnds,gphi * flag_def,tree boundary_cst,enum tree_code cmp_code,hash_set<gphi * > * visited_phis,bitmap * visited_flag_phis)1152*38fd1498Szrj prune_uninit_phi_opnds (gphi *phi, unsigned uninit_opnds, gphi *flag_def,
1153*38fd1498Szrj tree boundary_cst, enum tree_code cmp_code,
1154*38fd1498Szrj hash_set<gphi *> *visited_phis,
1155*38fd1498Szrj bitmap *visited_flag_phis)
1156*38fd1498Szrj {
1157*38fd1498Szrj unsigned i;
1158*38fd1498Szrj
1159*38fd1498Szrj for (i = 0; i < MIN (max_phi_args, gimple_phi_num_args (flag_def)); i++)
1160*38fd1498Szrj {
1161*38fd1498Szrj tree flag_arg;
1162*38fd1498Szrj
1163*38fd1498Szrj if (!MASK_TEST_BIT (uninit_opnds, i))
1164*38fd1498Szrj continue;
1165*38fd1498Szrj
1166*38fd1498Szrj flag_arg = gimple_phi_arg_def (flag_def, i);
1167*38fd1498Szrj if (!is_gimple_constant (flag_arg))
1168*38fd1498Szrj {
1169*38fd1498Szrj gphi *flag_arg_def, *phi_arg_def;
1170*38fd1498Szrj tree phi_arg;
1171*38fd1498Szrj unsigned uninit_opnds_arg_phi;
1172*38fd1498Szrj
1173*38fd1498Szrj if (TREE_CODE (flag_arg) != SSA_NAME)
1174*38fd1498Szrj return false;
1175*38fd1498Szrj flag_arg_def = dyn_cast<gphi *> (SSA_NAME_DEF_STMT (flag_arg));
1176*38fd1498Szrj if (!flag_arg_def)
1177*38fd1498Szrj return false;
1178*38fd1498Szrj
1179*38fd1498Szrj phi_arg = gimple_phi_arg_def (phi, i);
1180*38fd1498Szrj if (TREE_CODE (phi_arg) != SSA_NAME)
1181*38fd1498Szrj return false;
1182*38fd1498Szrj
1183*38fd1498Szrj phi_arg_def = dyn_cast<gphi *> (SSA_NAME_DEF_STMT (phi_arg));
1184*38fd1498Szrj if (!phi_arg_def)
1185*38fd1498Szrj return false;
1186*38fd1498Szrj
1187*38fd1498Szrj if (gimple_bb (phi_arg_def) != gimple_bb (flag_arg_def))
1188*38fd1498Szrj return false;
1189*38fd1498Szrj
1190*38fd1498Szrj if (!*visited_flag_phis)
1191*38fd1498Szrj *visited_flag_phis = BITMAP_ALLOC (NULL);
1192*38fd1498Szrj
1193*38fd1498Szrj tree phi_result = gimple_phi_result (flag_arg_def);
1194*38fd1498Szrj if (bitmap_bit_p (*visited_flag_phis, SSA_NAME_VERSION (phi_result)))
1195*38fd1498Szrj return false;
1196*38fd1498Szrj
1197*38fd1498Szrj bitmap_set_bit (*visited_flag_phis,
1198*38fd1498Szrj SSA_NAME_VERSION (gimple_phi_result (flag_arg_def)));
1199*38fd1498Szrj
1200*38fd1498Szrj /* Now recursively prune the uninitialized phi args. */
1201*38fd1498Szrj uninit_opnds_arg_phi = compute_uninit_opnds_pos (phi_arg_def);
1202*38fd1498Szrj if (!prune_uninit_phi_opnds
1203*38fd1498Szrj (phi_arg_def, uninit_opnds_arg_phi, flag_arg_def, boundary_cst,
1204*38fd1498Szrj cmp_code, visited_phis, visited_flag_phis))
1205*38fd1498Szrj return false;
1206*38fd1498Szrj
1207*38fd1498Szrj phi_result = gimple_phi_result (flag_arg_def);
1208*38fd1498Szrj bitmap_clear_bit (*visited_flag_phis, SSA_NAME_VERSION (phi_result));
1209*38fd1498Szrj continue;
1210*38fd1498Szrj }
1211*38fd1498Szrj
1212*38fd1498Szrj /* Now check if the constant is in the guarded range. */
1213*38fd1498Szrj if (is_value_included_in (flag_arg, boundary_cst, cmp_code))
1214*38fd1498Szrj {
1215*38fd1498Szrj tree opnd;
1216*38fd1498Szrj gimple *opnd_def;
1217*38fd1498Szrj
1218*38fd1498Szrj /* Now that we know that this undefined edge is not
1219*38fd1498Szrj pruned. If the operand is defined by another phi,
1220*38fd1498Szrj we can further prune the incoming edges of that
1221*38fd1498Szrj phi by checking the predicates of this operands. */
1222*38fd1498Szrj
1223*38fd1498Szrj opnd = gimple_phi_arg_def (phi, i);
1224*38fd1498Szrj opnd_def = SSA_NAME_DEF_STMT (opnd);
1225*38fd1498Szrj if (gphi *opnd_def_phi = dyn_cast <gphi *> (opnd_def))
1226*38fd1498Szrj {
1227*38fd1498Szrj edge opnd_edge;
1228*38fd1498Szrj unsigned uninit_opnds2 = compute_uninit_opnds_pos (opnd_def_phi);
1229*38fd1498Szrj if (!MASK_EMPTY (uninit_opnds2))
1230*38fd1498Szrj {
1231*38fd1498Szrj pred_chain_union def_preds = vNULL;
1232*38fd1498Szrj bool ok;
1233*38fd1498Szrj opnd_edge = gimple_phi_arg_edge (phi, i);
1234*38fd1498Szrj ok = is_use_properly_guarded (phi,
1235*38fd1498Szrj opnd_edge->src,
1236*38fd1498Szrj opnd_def_phi,
1237*38fd1498Szrj uninit_opnds2,
1238*38fd1498Szrj &def_preds,
1239*38fd1498Szrj visited_phis);
1240*38fd1498Szrj destroy_predicate_vecs (&def_preds);
1241*38fd1498Szrj if (!ok)
1242*38fd1498Szrj return false;
1243*38fd1498Szrj }
1244*38fd1498Szrj }
1245*38fd1498Szrj else
1246*38fd1498Szrj return false;
1247*38fd1498Szrj }
1248*38fd1498Szrj }
1249*38fd1498Szrj
1250*38fd1498Szrj return true;
1251*38fd1498Szrj }
1252*38fd1498Szrj
1253*38fd1498Szrj /* A helper function that determines if the predicate set
1254*38fd1498Szrj of the use is not overlapping with that of the uninit paths.
1255*38fd1498Szrj The most common senario of guarded use is in Example 1:
1256*38fd1498Szrj Example 1:
1257*38fd1498Szrj if (some_cond)
1258*38fd1498Szrj {
1259*38fd1498Szrj x = ...;
1260*38fd1498Szrj flag = true;
1261*38fd1498Szrj }
1262*38fd1498Szrj
1263*38fd1498Szrj ... some code ...
1264*38fd1498Szrj
1265*38fd1498Szrj if (flag)
1266*38fd1498Szrj use (x);
1267*38fd1498Szrj
1268*38fd1498Szrj The real world examples are usually more complicated, but similar
1269*38fd1498Szrj and usually result from inlining:
1270*38fd1498Szrj
1271*38fd1498Szrj bool init_func (int * x)
1272*38fd1498Szrj {
1273*38fd1498Szrj if (some_cond)
1274*38fd1498Szrj return false;
1275*38fd1498Szrj *x = ..
1276*38fd1498Szrj return true;
1277*38fd1498Szrj }
1278*38fd1498Szrj
1279*38fd1498Szrj void foo (..)
1280*38fd1498Szrj {
1281*38fd1498Szrj int x;
1282*38fd1498Szrj
1283*38fd1498Szrj if (!init_func (&x))
1284*38fd1498Szrj return;
1285*38fd1498Szrj
1286*38fd1498Szrj .. some_code ...
1287*38fd1498Szrj use (x);
1288*38fd1498Szrj }
1289*38fd1498Szrj
1290*38fd1498Szrj Another possible use scenario is in the following trivial example:
1291*38fd1498Szrj
1292*38fd1498Szrj Example 2:
1293*38fd1498Szrj if (n > 0)
1294*38fd1498Szrj x = 1;
1295*38fd1498Szrj ...
1296*38fd1498Szrj if (n > 0)
1297*38fd1498Szrj {
1298*38fd1498Szrj if (m < 2)
1299*38fd1498Szrj .. = x;
1300*38fd1498Szrj }
1301*38fd1498Szrj
1302*38fd1498Szrj Predicate analysis needs to compute the composite predicate:
1303*38fd1498Szrj
1304*38fd1498Szrj 1) 'x' use predicate: (n > 0) .AND. (m < 2)
1305*38fd1498Szrj 2) 'x' default value (non-def) predicate: .NOT. (n > 0)
1306*38fd1498Szrj (the predicate chain for phi operand defs can be computed
1307*38fd1498Szrj starting from a bb that is control equivalent to the phi's
1308*38fd1498Szrj bb and is dominating the operand def.)
1309*38fd1498Szrj
1310*38fd1498Szrj and check overlapping:
1311*38fd1498Szrj (n > 0) .AND. (m < 2) .AND. (.NOT. (n > 0))
1312*38fd1498Szrj <==> false
1313*38fd1498Szrj
1314*38fd1498Szrj This implementation provides framework that can handle
1315*38fd1498Szrj scenarios. (Note that many simple cases are handled properly
1316*38fd1498Szrj without the predicate analysis -- this is due to jump threading
1317*38fd1498Szrj transformation which eliminates the merge point thus makes
1318*38fd1498Szrj path sensitive analysis unnecessary.)
1319*38fd1498Szrj
1320*38fd1498Szrj PHI is the phi node whose incoming (undefined) paths need to be
1321*38fd1498Szrj pruned, and UNINIT_OPNDS is the bitmap holding uninit operand
1322*38fd1498Szrj positions. VISITED_PHIS is the pointer set of phi stmts being
1323*38fd1498Szrj checked. */
1324*38fd1498Szrj
1325*38fd1498Szrj static bool
use_pred_not_overlap_with_undef_path_pred(pred_chain_union preds,gphi * phi,unsigned uninit_opnds,hash_set<gphi * > * visited_phis)1326*38fd1498Szrj use_pred_not_overlap_with_undef_path_pred (pred_chain_union preds,
1327*38fd1498Szrj gphi *phi, unsigned uninit_opnds,
1328*38fd1498Szrj hash_set<gphi *> *visited_phis)
1329*38fd1498Szrj {
1330*38fd1498Szrj unsigned int i, n;
1331*38fd1498Szrj gimple *flag_def = 0;
1332*38fd1498Szrj tree boundary_cst = 0;
1333*38fd1498Szrj enum tree_code cmp_code;
1334*38fd1498Szrj bool swap_cond = false;
1335*38fd1498Szrj bool invert = false;
1336*38fd1498Szrj pred_chain the_pred_chain = vNULL;
1337*38fd1498Szrj bitmap visited_flag_phis = NULL;
1338*38fd1498Szrj bool all_pruned = false;
1339*38fd1498Szrj size_t num_preds = preds.length ();
1340*38fd1498Szrj
1341*38fd1498Szrj gcc_assert (num_preds > 0);
1342*38fd1498Szrj /* Find within the common prefix of multiple predicate chains
1343*38fd1498Szrj a predicate that is a comparison of a flag variable against
1344*38fd1498Szrj a constant. */
1345*38fd1498Szrj the_pred_chain = preds[0];
1346*38fd1498Szrj n = the_pred_chain.length ();
1347*38fd1498Szrj for (i = 0; i < n; i++)
1348*38fd1498Szrj {
1349*38fd1498Szrj tree cond_lhs, cond_rhs, flag = 0;
1350*38fd1498Szrj
1351*38fd1498Szrj pred_info the_pred = the_pred_chain[i];
1352*38fd1498Szrj
1353*38fd1498Szrj invert = the_pred.invert;
1354*38fd1498Szrj cond_lhs = the_pred.pred_lhs;
1355*38fd1498Szrj cond_rhs = the_pred.pred_rhs;
1356*38fd1498Szrj cmp_code = the_pred.cond_code;
1357*38fd1498Szrj
1358*38fd1498Szrj if (cond_lhs != NULL_TREE && TREE_CODE (cond_lhs) == SSA_NAME
1359*38fd1498Szrj && cond_rhs != NULL_TREE && is_gimple_constant (cond_rhs))
1360*38fd1498Szrj {
1361*38fd1498Szrj boundary_cst = cond_rhs;
1362*38fd1498Szrj flag = cond_lhs;
1363*38fd1498Szrj }
1364*38fd1498Szrj else if (cond_rhs != NULL_TREE && TREE_CODE (cond_rhs) == SSA_NAME
1365*38fd1498Szrj && cond_lhs != NULL_TREE && is_gimple_constant (cond_lhs))
1366*38fd1498Szrj {
1367*38fd1498Szrj boundary_cst = cond_lhs;
1368*38fd1498Szrj flag = cond_rhs;
1369*38fd1498Szrj swap_cond = true;
1370*38fd1498Szrj }
1371*38fd1498Szrj
1372*38fd1498Szrj if (!flag)
1373*38fd1498Szrj continue;
1374*38fd1498Szrj
1375*38fd1498Szrj flag_def = SSA_NAME_DEF_STMT (flag);
1376*38fd1498Szrj
1377*38fd1498Szrj if (!flag_def)
1378*38fd1498Szrj continue;
1379*38fd1498Szrj
1380*38fd1498Szrj if ((gimple_code (flag_def) == GIMPLE_PHI)
1381*38fd1498Szrj && (gimple_bb (flag_def) == gimple_bb (phi))
1382*38fd1498Szrj && find_matching_predicate_in_rest_chains (the_pred, preds,
1383*38fd1498Szrj num_preds))
1384*38fd1498Szrj break;
1385*38fd1498Szrj
1386*38fd1498Szrj flag_def = 0;
1387*38fd1498Szrj }
1388*38fd1498Szrj
1389*38fd1498Szrj if (!flag_def)
1390*38fd1498Szrj return false;
1391*38fd1498Szrj
1392*38fd1498Szrj /* Now check all the uninit incoming edge has a constant flag value
1393*38fd1498Szrj that is in conflict with the use guard/predicate. */
1394*38fd1498Szrj cmp_code = get_cmp_code (cmp_code, swap_cond, invert);
1395*38fd1498Szrj
1396*38fd1498Szrj if (cmp_code == ERROR_MARK)
1397*38fd1498Szrj return false;
1398*38fd1498Szrj
1399*38fd1498Szrj all_pruned = prune_uninit_phi_opnds
1400*38fd1498Szrj (phi, uninit_opnds, as_a<gphi *> (flag_def), boundary_cst, cmp_code,
1401*38fd1498Szrj visited_phis, &visited_flag_phis);
1402*38fd1498Szrj
1403*38fd1498Szrj if (visited_flag_phis)
1404*38fd1498Szrj BITMAP_FREE (visited_flag_phis);
1405*38fd1498Szrj
1406*38fd1498Szrj return all_pruned;
1407*38fd1498Szrj }
1408*38fd1498Szrj
1409*38fd1498Szrj /* The helper function returns true if two predicates X1 and X2
1410*38fd1498Szrj are equivalent. It assumes the expressions have already
1411*38fd1498Szrj properly re-associated. */
1412*38fd1498Szrj
1413*38fd1498Szrj static inline bool
pred_equal_p(pred_info x1,pred_info x2)1414*38fd1498Szrj pred_equal_p (pred_info x1, pred_info x2)
1415*38fd1498Szrj {
1416*38fd1498Szrj enum tree_code c1, c2;
1417*38fd1498Szrj if (!operand_equal_p (x1.pred_lhs, x2.pred_lhs, 0)
1418*38fd1498Szrj || !operand_equal_p (x1.pred_rhs, x2.pred_rhs, 0))
1419*38fd1498Szrj return false;
1420*38fd1498Szrj
1421*38fd1498Szrj c1 = x1.cond_code;
1422*38fd1498Szrj if (x1.invert != x2.invert
1423*38fd1498Szrj && TREE_CODE_CLASS (x2.cond_code) == tcc_comparison)
1424*38fd1498Szrj c2 = invert_tree_comparison (x2.cond_code, false);
1425*38fd1498Szrj else
1426*38fd1498Szrj c2 = x2.cond_code;
1427*38fd1498Szrj
1428*38fd1498Szrj return c1 == c2;
1429*38fd1498Szrj }
1430*38fd1498Szrj
1431*38fd1498Szrj /* Returns true if the predication is testing !=. */
1432*38fd1498Szrj
1433*38fd1498Szrj static inline bool
is_neq_relop_p(pred_info pred)1434*38fd1498Szrj is_neq_relop_p (pred_info pred)
1435*38fd1498Szrj {
1436*38fd1498Szrj
1437*38fd1498Szrj return ((pred.cond_code == NE_EXPR && !pred.invert)
1438*38fd1498Szrj || (pred.cond_code == EQ_EXPR && pred.invert));
1439*38fd1498Szrj }
1440*38fd1498Szrj
1441*38fd1498Szrj /* Returns true if pred is of the form X != 0. */
1442*38fd1498Szrj
1443*38fd1498Szrj static inline bool
is_neq_zero_form_p(pred_info pred)1444*38fd1498Szrj is_neq_zero_form_p (pred_info pred)
1445*38fd1498Szrj {
1446*38fd1498Szrj if (!is_neq_relop_p (pred) || !integer_zerop (pred.pred_rhs)
1447*38fd1498Szrj || TREE_CODE (pred.pred_lhs) != SSA_NAME)
1448*38fd1498Szrj return false;
1449*38fd1498Szrj return true;
1450*38fd1498Szrj }
1451*38fd1498Szrj
1452*38fd1498Szrj /* The helper function returns true if two predicates X1
1453*38fd1498Szrj is equivalent to X2 != 0. */
1454*38fd1498Szrj
1455*38fd1498Szrj static inline bool
pred_expr_equal_p(pred_info x1,tree x2)1456*38fd1498Szrj pred_expr_equal_p (pred_info x1, tree x2)
1457*38fd1498Szrj {
1458*38fd1498Szrj if (!is_neq_zero_form_p (x1))
1459*38fd1498Szrj return false;
1460*38fd1498Szrj
1461*38fd1498Szrj return operand_equal_p (x1.pred_lhs, x2, 0);
1462*38fd1498Szrj }
1463*38fd1498Szrj
1464*38fd1498Szrj /* Returns true of the domain of single predicate expression
1465*38fd1498Szrj EXPR1 is a subset of that of EXPR2. Returns false if it
1466*38fd1498Szrj can not be proved. */
1467*38fd1498Szrj
1468*38fd1498Szrj static bool
is_pred_expr_subset_of(pred_info expr1,pred_info expr2)1469*38fd1498Szrj is_pred_expr_subset_of (pred_info expr1, pred_info expr2)
1470*38fd1498Szrj {
1471*38fd1498Szrj enum tree_code code1, code2;
1472*38fd1498Szrj
1473*38fd1498Szrj if (pred_equal_p (expr1, expr2))
1474*38fd1498Szrj return true;
1475*38fd1498Szrj
1476*38fd1498Szrj if ((TREE_CODE (expr1.pred_rhs) != INTEGER_CST)
1477*38fd1498Szrj || (TREE_CODE (expr2.pred_rhs) != INTEGER_CST))
1478*38fd1498Szrj return false;
1479*38fd1498Szrj
1480*38fd1498Szrj if (!operand_equal_p (expr1.pred_lhs, expr2.pred_lhs, 0))
1481*38fd1498Szrj return false;
1482*38fd1498Szrj
1483*38fd1498Szrj code1 = expr1.cond_code;
1484*38fd1498Szrj if (expr1.invert)
1485*38fd1498Szrj code1 = invert_tree_comparison (code1, false);
1486*38fd1498Szrj code2 = expr2.cond_code;
1487*38fd1498Szrj if (expr2.invert)
1488*38fd1498Szrj code2 = invert_tree_comparison (code2, false);
1489*38fd1498Szrj
1490*38fd1498Szrj if ((code1 == EQ_EXPR || code1 == BIT_AND_EXPR) && code2 == BIT_AND_EXPR)
1491*38fd1498Szrj return (wi::to_wide (expr1.pred_rhs)
1492*38fd1498Szrj == (wi::to_wide (expr1.pred_rhs) & wi::to_wide (expr2.pred_rhs)));
1493*38fd1498Szrj
1494*38fd1498Szrj if (code1 != code2 && code2 != NE_EXPR)
1495*38fd1498Szrj return false;
1496*38fd1498Szrj
1497*38fd1498Szrj if (is_value_included_in (expr1.pred_rhs, expr2.pred_rhs, code2))
1498*38fd1498Szrj return true;
1499*38fd1498Szrj
1500*38fd1498Szrj return false;
1501*38fd1498Szrj }
1502*38fd1498Szrj
1503*38fd1498Szrj /* Returns true if the domain of PRED1 is a subset
1504*38fd1498Szrj of that of PRED2. Returns false if it can not be proved so. */
1505*38fd1498Szrj
1506*38fd1498Szrj static bool
is_pred_chain_subset_of(pred_chain pred1,pred_chain pred2)1507*38fd1498Szrj is_pred_chain_subset_of (pred_chain pred1, pred_chain pred2)
1508*38fd1498Szrj {
1509*38fd1498Szrj size_t np1, np2, i1, i2;
1510*38fd1498Szrj
1511*38fd1498Szrj np1 = pred1.length ();
1512*38fd1498Szrj np2 = pred2.length ();
1513*38fd1498Szrj
1514*38fd1498Szrj for (i2 = 0; i2 < np2; i2++)
1515*38fd1498Szrj {
1516*38fd1498Szrj bool found = false;
1517*38fd1498Szrj pred_info info2 = pred2[i2];
1518*38fd1498Szrj for (i1 = 0; i1 < np1; i1++)
1519*38fd1498Szrj {
1520*38fd1498Szrj pred_info info1 = pred1[i1];
1521*38fd1498Szrj if (is_pred_expr_subset_of (info1, info2))
1522*38fd1498Szrj {
1523*38fd1498Szrj found = true;
1524*38fd1498Szrj break;
1525*38fd1498Szrj }
1526*38fd1498Szrj }
1527*38fd1498Szrj if (!found)
1528*38fd1498Szrj return false;
1529*38fd1498Szrj }
1530*38fd1498Szrj return true;
1531*38fd1498Szrj }
1532*38fd1498Szrj
1533*38fd1498Szrj /* Returns true if the domain defined by
1534*38fd1498Szrj one pred chain ONE_PRED is a subset of the domain
1535*38fd1498Szrj of *PREDS. It returns false if ONE_PRED's domain is
1536*38fd1498Szrj not a subset of any of the sub-domains of PREDS
1537*38fd1498Szrj (corresponding to each individual chains in it), even
1538*38fd1498Szrj though it may be still be a subset of whole domain
1539*38fd1498Szrj of PREDS which is the union (ORed) of all its subdomains.
1540*38fd1498Szrj In other words, the result is conservative. */
1541*38fd1498Szrj
1542*38fd1498Szrj static bool
is_included_in(pred_chain one_pred,pred_chain_union preds)1543*38fd1498Szrj is_included_in (pred_chain one_pred, pred_chain_union preds)
1544*38fd1498Szrj {
1545*38fd1498Szrj size_t i;
1546*38fd1498Szrj size_t n = preds.length ();
1547*38fd1498Szrj
1548*38fd1498Szrj for (i = 0; i < n; i++)
1549*38fd1498Szrj {
1550*38fd1498Szrj if (is_pred_chain_subset_of (one_pred, preds[i]))
1551*38fd1498Szrj return true;
1552*38fd1498Szrj }
1553*38fd1498Szrj
1554*38fd1498Szrj return false;
1555*38fd1498Szrj }
1556*38fd1498Szrj
1557*38fd1498Szrj /* Compares two predicate sets PREDS1 and PREDS2 and returns
1558*38fd1498Szrj true if the domain defined by PREDS1 is a superset
1559*38fd1498Szrj of PREDS2's domain. N1 and N2 are array sizes of PREDS1 and
1560*38fd1498Szrj PREDS2 respectively. The implementation chooses not to build
1561*38fd1498Szrj generic trees (and relying on the folding capability of the
1562*38fd1498Szrj compiler), but instead performs brute force comparison of
1563*38fd1498Szrj individual predicate chains (won't be a compile time problem
1564*38fd1498Szrj as the chains are pretty short). When the function returns
1565*38fd1498Szrj false, it does not necessarily mean *PREDS1 is not a superset
1566*38fd1498Szrj of *PREDS2, but mean it may not be so since the analysis can
1567*38fd1498Szrj not prove it. In such cases, false warnings may still be
1568*38fd1498Szrj emitted. */
1569*38fd1498Szrj
1570*38fd1498Szrj static bool
is_superset_of(pred_chain_union preds1,pred_chain_union preds2)1571*38fd1498Szrj is_superset_of (pred_chain_union preds1, pred_chain_union preds2)
1572*38fd1498Szrj {
1573*38fd1498Szrj size_t i, n2;
1574*38fd1498Szrj pred_chain one_pred_chain = vNULL;
1575*38fd1498Szrj
1576*38fd1498Szrj n2 = preds2.length ();
1577*38fd1498Szrj
1578*38fd1498Szrj for (i = 0; i < n2; i++)
1579*38fd1498Szrj {
1580*38fd1498Szrj one_pred_chain = preds2[i];
1581*38fd1498Szrj if (!is_included_in (one_pred_chain, preds1))
1582*38fd1498Szrj return false;
1583*38fd1498Szrj }
1584*38fd1498Szrj
1585*38fd1498Szrj return true;
1586*38fd1498Szrj }
1587*38fd1498Szrj
1588*38fd1498Szrj /* Returns true if TC is AND or OR. */
1589*38fd1498Szrj
1590*38fd1498Szrj static inline bool
is_and_or_or_p(enum tree_code tc,tree type)1591*38fd1498Szrj is_and_or_or_p (enum tree_code tc, tree type)
1592*38fd1498Szrj {
1593*38fd1498Szrj return (tc == BIT_IOR_EXPR
1594*38fd1498Szrj || (tc == BIT_AND_EXPR
1595*38fd1498Szrj && (type == 0 || TREE_CODE (type) == BOOLEAN_TYPE)));
1596*38fd1498Szrj }
1597*38fd1498Szrj
1598*38fd1498Szrj /* Returns true if X1 is the negate of X2. */
1599*38fd1498Szrj
1600*38fd1498Szrj static inline bool
pred_neg_p(pred_info x1,pred_info x2)1601*38fd1498Szrj pred_neg_p (pred_info x1, pred_info x2)
1602*38fd1498Szrj {
1603*38fd1498Szrj enum tree_code c1, c2;
1604*38fd1498Szrj if (!operand_equal_p (x1.pred_lhs, x2.pred_lhs, 0)
1605*38fd1498Szrj || !operand_equal_p (x1.pred_rhs, x2.pred_rhs, 0))
1606*38fd1498Szrj return false;
1607*38fd1498Szrj
1608*38fd1498Szrj c1 = x1.cond_code;
1609*38fd1498Szrj if (x1.invert == x2.invert)
1610*38fd1498Szrj c2 = invert_tree_comparison (x2.cond_code, false);
1611*38fd1498Szrj else
1612*38fd1498Szrj c2 = x2.cond_code;
1613*38fd1498Szrj
1614*38fd1498Szrj return c1 == c2;
1615*38fd1498Szrj }
1616*38fd1498Szrj
1617*38fd1498Szrj /* 1) ((x IOR y) != 0) AND (x != 0) is equivalent to (x != 0);
1618*38fd1498Szrj 2) (X AND Y) OR (!X AND Y) is equivalent to Y;
1619*38fd1498Szrj 3) X OR (!X AND Y) is equivalent to (X OR Y);
1620*38fd1498Szrj 4) ((x IAND y) != 0) || (x != 0 AND y != 0)) is equivalent to
1621*38fd1498Szrj (x != 0 AND y != 0)
1622*38fd1498Szrj 5) (X AND Y) OR (!X AND Z) OR (!Y AND Z) is equivalent to
1623*38fd1498Szrj (X AND Y) OR Z
1624*38fd1498Szrj
1625*38fd1498Szrj PREDS is the predicate chains, and N is the number of chains. */
1626*38fd1498Szrj
1627*38fd1498Szrj /* Helper function to implement rule 1 above. ONE_CHAIN is
1628*38fd1498Szrj the AND predication to be simplified. */
1629*38fd1498Szrj
1630*38fd1498Szrj static void
simplify_pred(pred_chain * one_chain)1631*38fd1498Szrj simplify_pred (pred_chain *one_chain)
1632*38fd1498Szrj {
1633*38fd1498Szrj size_t i, j, n;
1634*38fd1498Szrj bool simplified = false;
1635*38fd1498Szrj pred_chain s_chain = vNULL;
1636*38fd1498Szrj
1637*38fd1498Szrj n = one_chain->length ();
1638*38fd1498Szrj
1639*38fd1498Szrj for (i = 0; i < n; i++)
1640*38fd1498Szrj {
1641*38fd1498Szrj pred_info *a_pred = &(*one_chain)[i];
1642*38fd1498Szrj
1643*38fd1498Szrj if (!a_pred->pred_lhs)
1644*38fd1498Szrj continue;
1645*38fd1498Szrj if (!is_neq_zero_form_p (*a_pred))
1646*38fd1498Szrj continue;
1647*38fd1498Szrj
1648*38fd1498Szrj gimple *def_stmt = SSA_NAME_DEF_STMT (a_pred->pred_lhs);
1649*38fd1498Szrj if (gimple_code (def_stmt) != GIMPLE_ASSIGN)
1650*38fd1498Szrj continue;
1651*38fd1498Szrj if (gimple_assign_rhs_code (def_stmt) == BIT_IOR_EXPR)
1652*38fd1498Szrj {
1653*38fd1498Szrj for (j = 0; j < n; j++)
1654*38fd1498Szrj {
1655*38fd1498Szrj pred_info *b_pred = &(*one_chain)[j];
1656*38fd1498Szrj
1657*38fd1498Szrj if (!b_pred->pred_lhs)
1658*38fd1498Szrj continue;
1659*38fd1498Szrj if (!is_neq_zero_form_p (*b_pred))
1660*38fd1498Szrj continue;
1661*38fd1498Szrj
1662*38fd1498Szrj if (pred_expr_equal_p (*b_pred, gimple_assign_rhs1 (def_stmt))
1663*38fd1498Szrj || pred_expr_equal_p (*b_pred, gimple_assign_rhs2 (def_stmt)))
1664*38fd1498Szrj {
1665*38fd1498Szrj /* Mark a_pred for removal. */
1666*38fd1498Szrj a_pred->pred_lhs = NULL;
1667*38fd1498Szrj a_pred->pred_rhs = NULL;
1668*38fd1498Szrj simplified = true;
1669*38fd1498Szrj break;
1670*38fd1498Szrj }
1671*38fd1498Szrj }
1672*38fd1498Szrj }
1673*38fd1498Szrj }
1674*38fd1498Szrj
1675*38fd1498Szrj if (!simplified)
1676*38fd1498Szrj return;
1677*38fd1498Szrj
1678*38fd1498Szrj for (i = 0; i < n; i++)
1679*38fd1498Szrj {
1680*38fd1498Szrj pred_info *a_pred = &(*one_chain)[i];
1681*38fd1498Szrj if (!a_pred->pred_lhs)
1682*38fd1498Szrj continue;
1683*38fd1498Szrj s_chain.safe_push (*a_pred);
1684*38fd1498Szrj }
1685*38fd1498Szrj
1686*38fd1498Szrj one_chain->release ();
1687*38fd1498Szrj *one_chain = s_chain;
1688*38fd1498Szrj }
1689*38fd1498Szrj
1690*38fd1498Szrj /* The helper function implements the rule 2 for the
1691*38fd1498Szrj OR predicate PREDS.
1692*38fd1498Szrj
1693*38fd1498Szrj 2) (X AND Y) OR (!X AND Y) is equivalent to Y. */
1694*38fd1498Szrj
1695*38fd1498Szrj static bool
simplify_preds_2(pred_chain_union * preds)1696*38fd1498Szrj simplify_preds_2 (pred_chain_union *preds)
1697*38fd1498Szrj {
1698*38fd1498Szrj size_t i, j, n;
1699*38fd1498Szrj bool simplified = false;
1700*38fd1498Szrj pred_chain_union s_preds = vNULL;
1701*38fd1498Szrj
1702*38fd1498Szrj /* (X AND Y) OR (!X AND Y) is equivalent to Y.
1703*38fd1498Szrj (X AND Y) OR (X AND !Y) is equivalent to X. */
1704*38fd1498Szrj
1705*38fd1498Szrj n = preds->length ();
1706*38fd1498Szrj for (i = 0; i < n; i++)
1707*38fd1498Szrj {
1708*38fd1498Szrj pred_info x, y;
1709*38fd1498Szrj pred_chain *a_chain = &(*preds)[i];
1710*38fd1498Szrj
1711*38fd1498Szrj if (a_chain->length () != 2)
1712*38fd1498Szrj continue;
1713*38fd1498Szrj
1714*38fd1498Szrj x = (*a_chain)[0];
1715*38fd1498Szrj y = (*a_chain)[1];
1716*38fd1498Szrj
1717*38fd1498Szrj for (j = 0; j < n; j++)
1718*38fd1498Szrj {
1719*38fd1498Szrj pred_chain *b_chain;
1720*38fd1498Szrj pred_info x2, y2;
1721*38fd1498Szrj
1722*38fd1498Szrj if (j == i)
1723*38fd1498Szrj continue;
1724*38fd1498Szrj
1725*38fd1498Szrj b_chain = &(*preds)[j];
1726*38fd1498Szrj if (b_chain->length () != 2)
1727*38fd1498Szrj continue;
1728*38fd1498Szrj
1729*38fd1498Szrj x2 = (*b_chain)[0];
1730*38fd1498Szrj y2 = (*b_chain)[1];
1731*38fd1498Szrj
1732*38fd1498Szrj if (pred_equal_p (x, x2) && pred_neg_p (y, y2))
1733*38fd1498Szrj {
1734*38fd1498Szrj /* Kill a_chain. */
1735*38fd1498Szrj a_chain->release ();
1736*38fd1498Szrj b_chain->release ();
1737*38fd1498Szrj b_chain->safe_push (x);
1738*38fd1498Szrj simplified = true;
1739*38fd1498Szrj break;
1740*38fd1498Szrj }
1741*38fd1498Szrj if (pred_neg_p (x, x2) && pred_equal_p (y, y2))
1742*38fd1498Szrj {
1743*38fd1498Szrj /* Kill a_chain. */
1744*38fd1498Szrj a_chain->release ();
1745*38fd1498Szrj b_chain->release ();
1746*38fd1498Szrj b_chain->safe_push (y);
1747*38fd1498Szrj simplified = true;
1748*38fd1498Szrj break;
1749*38fd1498Szrj }
1750*38fd1498Szrj }
1751*38fd1498Szrj }
1752*38fd1498Szrj /* Now clean up the chain. */
1753*38fd1498Szrj if (simplified)
1754*38fd1498Szrj {
1755*38fd1498Szrj for (i = 0; i < n; i++)
1756*38fd1498Szrj {
1757*38fd1498Szrj if ((*preds)[i].is_empty ())
1758*38fd1498Szrj continue;
1759*38fd1498Szrj s_preds.safe_push ((*preds)[i]);
1760*38fd1498Szrj }
1761*38fd1498Szrj preds->release ();
1762*38fd1498Szrj (*preds) = s_preds;
1763*38fd1498Szrj s_preds = vNULL;
1764*38fd1498Szrj }
1765*38fd1498Szrj
1766*38fd1498Szrj return simplified;
1767*38fd1498Szrj }
1768*38fd1498Szrj
1769*38fd1498Szrj /* The helper function implements the rule 2 for the
1770*38fd1498Szrj OR predicate PREDS.
1771*38fd1498Szrj
1772*38fd1498Szrj 3) x OR (!x AND y) is equivalent to x OR y. */
1773*38fd1498Szrj
1774*38fd1498Szrj static bool
simplify_preds_3(pred_chain_union * preds)1775*38fd1498Szrj simplify_preds_3 (pred_chain_union *preds)
1776*38fd1498Szrj {
1777*38fd1498Szrj size_t i, j, n;
1778*38fd1498Szrj bool simplified = false;
1779*38fd1498Szrj
1780*38fd1498Szrj /* Now iteratively simplify X OR (!X AND Z ..)
1781*38fd1498Szrj into X OR (Z ...). */
1782*38fd1498Szrj
1783*38fd1498Szrj n = preds->length ();
1784*38fd1498Szrj if (n < 2)
1785*38fd1498Szrj return false;
1786*38fd1498Szrj
1787*38fd1498Szrj for (i = 0; i < n; i++)
1788*38fd1498Szrj {
1789*38fd1498Szrj pred_info x;
1790*38fd1498Szrj pred_chain *a_chain = &(*preds)[i];
1791*38fd1498Szrj
1792*38fd1498Szrj if (a_chain->length () != 1)
1793*38fd1498Szrj continue;
1794*38fd1498Szrj
1795*38fd1498Szrj x = (*a_chain)[0];
1796*38fd1498Szrj
1797*38fd1498Szrj for (j = 0; j < n; j++)
1798*38fd1498Szrj {
1799*38fd1498Szrj pred_chain *b_chain;
1800*38fd1498Szrj pred_info x2;
1801*38fd1498Szrj size_t k;
1802*38fd1498Szrj
1803*38fd1498Szrj if (j == i)
1804*38fd1498Szrj continue;
1805*38fd1498Szrj
1806*38fd1498Szrj b_chain = &(*preds)[j];
1807*38fd1498Szrj if (b_chain->length () < 2)
1808*38fd1498Szrj continue;
1809*38fd1498Szrj
1810*38fd1498Szrj for (k = 0; k < b_chain->length (); k++)
1811*38fd1498Szrj {
1812*38fd1498Szrj x2 = (*b_chain)[k];
1813*38fd1498Szrj if (pred_neg_p (x, x2))
1814*38fd1498Szrj {
1815*38fd1498Szrj b_chain->unordered_remove (k);
1816*38fd1498Szrj simplified = true;
1817*38fd1498Szrj break;
1818*38fd1498Szrj }
1819*38fd1498Szrj }
1820*38fd1498Szrj }
1821*38fd1498Szrj }
1822*38fd1498Szrj return simplified;
1823*38fd1498Szrj }
1824*38fd1498Szrj
1825*38fd1498Szrj /* The helper function implements the rule 4 for the
1826*38fd1498Szrj OR predicate PREDS.
1827*38fd1498Szrj
1828*38fd1498Szrj 2) ((x AND y) != 0) OR (x != 0 AND y != 0) is equivalent to
1829*38fd1498Szrj (x != 0 ANd y != 0). */
1830*38fd1498Szrj
1831*38fd1498Szrj static bool
simplify_preds_4(pred_chain_union * preds)1832*38fd1498Szrj simplify_preds_4 (pred_chain_union *preds)
1833*38fd1498Szrj {
1834*38fd1498Szrj size_t i, j, n;
1835*38fd1498Szrj bool simplified = false;
1836*38fd1498Szrj pred_chain_union s_preds = vNULL;
1837*38fd1498Szrj gimple *def_stmt;
1838*38fd1498Szrj
1839*38fd1498Szrj n = preds->length ();
1840*38fd1498Szrj for (i = 0; i < n; i++)
1841*38fd1498Szrj {
1842*38fd1498Szrj pred_info z;
1843*38fd1498Szrj pred_chain *a_chain = &(*preds)[i];
1844*38fd1498Szrj
1845*38fd1498Szrj if (a_chain->length () != 1)
1846*38fd1498Szrj continue;
1847*38fd1498Szrj
1848*38fd1498Szrj z = (*a_chain)[0];
1849*38fd1498Szrj
1850*38fd1498Szrj if (!is_neq_zero_form_p (z))
1851*38fd1498Szrj continue;
1852*38fd1498Szrj
1853*38fd1498Szrj def_stmt = SSA_NAME_DEF_STMT (z.pred_lhs);
1854*38fd1498Szrj if (gimple_code (def_stmt) != GIMPLE_ASSIGN)
1855*38fd1498Szrj continue;
1856*38fd1498Szrj
1857*38fd1498Szrj if (gimple_assign_rhs_code (def_stmt) != BIT_AND_EXPR)
1858*38fd1498Szrj continue;
1859*38fd1498Szrj
1860*38fd1498Szrj for (j = 0; j < n; j++)
1861*38fd1498Szrj {
1862*38fd1498Szrj pred_chain *b_chain;
1863*38fd1498Szrj pred_info x2, y2;
1864*38fd1498Szrj
1865*38fd1498Szrj if (j == i)
1866*38fd1498Szrj continue;
1867*38fd1498Szrj
1868*38fd1498Szrj b_chain = &(*preds)[j];
1869*38fd1498Szrj if (b_chain->length () != 2)
1870*38fd1498Szrj continue;
1871*38fd1498Szrj
1872*38fd1498Szrj x2 = (*b_chain)[0];
1873*38fd1498Szrj y2 = (*b_chain)[1];
1874*38fd1498Szrj if (!is_neq_zero_form_p (x2) || !is_neq_zero_form_p (y2))
1875*38fd1498Szrj continue;
1876*38fd1498Szrj
1877*38fd1498Szrj if ((pred_expr_equal_p (x2, gimple_assign_rhs1 (def_stmt))
1878*38fd1498Szrj && pred_expr_equal_p (y2, gimple_assign_rhs2 (def_stmt)))
1879*38fd1498Szrj || (pred_expr_equal_p (x2, gimple_assign_rhs2 (def_stmt))
1880*38fd1498Szrj && pred_expr_equal_p (y2, gimple_assign_rhs1 (def_stmt))))
1881*38fd1498Szrj {
1882*38fd1498Szrj /* Kill a_chain. */
1883*38fd1498Szrj a_chain->release ();
1884*38fd1498Szrj simplified = true;
1885*38fd1498Szrj break;
1886*38fd1498Szrj }
1887*38fd1498Szrj }
1888*38fd1498Szrj }
1889*38fd1498Szrj /* Now clean up the chain. */
1890*38fd1498Szrj if (simplified)
1891*38fd1498Szrj {
1892*38fd1498Szrj for (i = 0; i < n; i++)
1893*38fd1498Szrj {
1894*38fd1498Szrj if ((*preds)[i].is_empty ())
1895*38fd1498Szrj continue;
1896*38fd1498Szrj s_preds.safe_push ((*preds)[i]);
1897*38fd1498Szrj }
1898*38fd1498Szrj
1899*38fd1498Szrj preds->release ();
1900*38fd1498Szrj (*preds) = s_preds;
1901*38fd1498Szrj s_preds = vNULL;
1902*38fd1498Szrj }
1903*38fd1498Szrj
1904*38fd1498Szrj return simplified;
1905*38fd1498Szrj }
1906*38fd1498Szrj
1907*38fd1498Szrj /* This function simplifies predicates in PREDS. */
1908*38fd1498Szrj
1909*38fd1498Szrj static void
simplify_preds(pred_chain_union * preds,gimple * use_or_def,bool is_use)1910*38fd1498Szrj simplify_preds (pred_chain_union *preds, gimple *use_or_def, bool is_use)
1911*38fd1498Szrj {
1912*38fd1498Szrj size_t i, n;
1913*38fd1498Szrj bool changed = false;
1914*38fd1498Szrj
1915*38fd1498Szrj if (dump_file && dump_flags & TDF_DETAILS)
1916*38fd1498Szrj {
1917*38fd1498Szrj fprintf (dump_file, "[BEFORE SIMPLICATION -- ");
1918*38fd1498Szrj dump_predicates (use_or_def, *preds, is_use ? "[USE]:\n" : "[DEF]:\n");
1919*38fd1498Szrj }
1920*38fd1498Szrj
1921*38fd1498Szrj for (i = 0; i < preds->length (); i++)
1922*38fd1498Szrj simplify_pred (&(*preds)[i]);
1923*38fd1498Szrj
1924*38fd1498Szrj n = preds->length ();
1925*38fd1498Szrj if (n < 2)
1926*38fd1498Szrj return;
1927*38fd1498Szrj
1928*38fd1498Szrj do
1929*38fd1498Szrj {
1930*38fd1498Szrj changed = false;
1931*38fd1498Szrj if (simplify_preds_2 (preds))
1932*38fd1498Szrj changed = true;
1933*38fd1498Szrj
1934*38fd1498Szrj /* Now iteratively simplify X OR (!X AND Z ..)
1935*38fd1498Szrj into X OR (Z ...). */
1936*38fd1498Szrj if (simplify_preds_3 (preds))
1937*38fd1498Szrj changed = true;
1938*38fd1498Szrj
1939*38fd1498Szrj if (simplify_preds_4 (preds))
1940*38fd1498Szrj changed = true;
1941*38fd1498Szrj }
1942*38fd1498Szrj while (changed);
1943*38fd1498Szrj
1944*38fd1498Szrj return;
1945*38fd1498Szrj }
1946*38fd1498Szrj
1947*38fd1498Szrj /* This is a helper function which attempts to normalize predicate chains
1948*38fd1498Szrj by following UD chains. It basically builds up a big tree of either IOR
1949*38fd1498Szrj operations or AND operations, and convert the IOR tree into a
1950*38fd1498Szrj pred_chain_union or BIT_AND tree into a pred_chain.
1951*38fd1498Szrj Example:
1952*38fd1498Szrj
1953*38fd1498Szrj _3 = _2 RELOP1 _1;
1954*38fd1498Szrj _6 = _5 RELOP2 _4;
1955*38fd1498Szrj _9 = _8 RELOP3 _7;
1956*38fd1498Szrj _10 = _3 | _6;
1957*38fd1498Szrj _12 = _9 | _0;
1958*38fd1498Szrj _t = _10 | _12;
1959*38fd1498Szrj
1960*38fd1498Szrj then _t != 0 will be normalized into a pred_chain_union
1961*38fd1498Szrj
1962*38fd1498Szrj (_2 RELOP1 _1) OR (_5 RELOP2 _4) OR (_8 RELOP3 _7) OR (_0 != 0)
1963*38fd1498Szrj
1964*38fd1498Szrj Similarly given,
1965*38fd1498Szrj
1966*38fd1498Szrj _3 = _2 RELOP1 _1;
1967*38fd1498Szrj _6 = _5 RELOP2 _4;
1968*38fd1498Szrj _9 = _8 RELOP3 _7;
1969*38fd1498Szrj _10 = _3 & _6;
1970*38fd1498Szrj _12 = _9 & _0;
1971*38fd1498Szrj
1972*38fd1498Szrj then _t != 0 will be normalized into a pred_chain:
1973*38fd1498Szrj (_2 RELOP1 _1) AND (_5 RELOP2 _4) AND (_8 RELOP3 _7) AND (_0 != 0)
1974*38fd1498Szrj
1975*38fd1498Szrj */
1976*38fd1498Szrj
1977*38fd1498Szrj /* This is a helper function that stores a PRED into NORM_PREDS. */
1978*38fd1498Szrj
1979*38fd1498Szrj inline static void
push_pred(pred_chain_union * norm_preds,pred_info pred)1980*38fd1498Szrj push_pred (pred_chain_union *norm_preds, pred_info pred)
1981*38fd1498Szrj {
1982*38fd1498Szrj pred_chain pred_chain = vNULL;
1983*38fd1498Szrj pred_chain.safe_push (pred);
1984*38fd1498Szrj norm_preds->safe_push (pred_chain);
1985*38fd1498Szrj }
1986*38fd1498Szrj
1987*38fd1498Szrj /* A helper function that creates a predicate of the form
1988*38fd1498Szrj OP != 0 and push it WORK_LIST. */
1989*38fd1498Szrj
1990*38fd1498Szrj inline static void
push_to_worklist(tree op,vec<pred_info,va_heap,vl_ptr> * work_list,hash_set<tree> * mark_set)1991*38fd1498Szrj push_to_worklist (tree op, vec<pred_info, va_heap, vl_ptr> *work_list,
1992*38fd1498Szrj hash_set<tree> *mark_set)
1993*38fd1498Szrj {
1994*38fd1498Szrj if (mark_set->contains (op))
1995*38fd1498Szrj return;
1996*38fd1498Szrj mark_set->add (op);
1997*38fd1498Szrj
1998*38fd1498Szrj pred_info arg_pred;
1999*38fd1498Szrj arg_pred.pred_lhs = op;
2000*38fd1498Szrj arg_pred.pred_rhs = integer_zero_node;
2001*38fd1498Szrj arg_pred.cond_code = NE_EXPR;
2002*38fd1498Szrj arg_pred.invert = false;
2003*38fd1498Szrj work_list->safe_push (arg_pred);
2004*38fd1498Szrj }
2005*38fd1498Szrj
2006*38fd1498Szrj /* A helper that generates a pred_info from a gimple assignment
2007*38fd1498Szrj CMP_ASSIGN with comparison rhs. */
2008*38fd1498Szrj
2009*38fd1498Szrj static pred_info
get_pred_info_from_cmp(gimple * cmp_assign)2010*38fd1498Szrj get_pred_info_from_cmp (gimple *cmp_assign)
2011*38fd1498Szrj {
2012*38fd1498Szrj pred_info n_pred;
2013*38fd1498Szrj n_pred.pred_lhs = gimple_assign_rhs1 (cmp_assign);
2014*38fd1498Szrj n_pred.pred_rhs = gimple_assign_rhs2 (cmp_assign);
2015*38fd1498Szrj n_pred.cond_code = gimple_assign_rhs_code (cmp_assign);
2016*38fd1498Szrj n_pred.invert = false;
2017*38fd1498Szrj return n_pred;
2018*38fd1498Szrj }
2019*38fd1498Szrj
2020*38fd1498Szrj /* Returns true if the PHI is a degenerated phi with
2021*38fd1498Szrj all args with the same value (relop). In that case, *PRED
2022*38fd1498Szrj will be updated to that value. */
2023*38fd1498Szrj
2024*38fd1498Szrj static bool
is_degenerated_phi(gimple * phi,pred_info * pred_p)2025*38fd1498Szrj is_degenerated_phi (gimple *phi, pred_info *pred_p)
2026*38fd1498Szrj {
2027*38fd1498Szrj int i, n;
2028*38fd1498Szrj tree op0;
2029*38fd1498Szrj gimple *def0;
2030*38fd1498Szrj pred_info pred0;
2031*38fd1498Szrj
2032*38fd1498Szrj n = gimple_phi_num_args (phi);
2033*38fd1498Szrj op0 = gimple_phi_arg_def (phi, 0);
2034*38fd1498Szrj
2035*38fd1498Szrj if (TREE_CODE (op0) != SSA_NAME)
2036*38fd1498Szrj return false;
2037*38fd1498Szrj
2038*38fd1498Szrj def0 = SSA_NAME_DEF_STMT (op0);
2039*38fd1498Szrj if (gimple_code (def0) != GIMPLE_ASSIGN)
2040*38fd1498Szrj return false;
2041*38fd1498Szrj if (TREE_CODE_CLASS (gimple_assign_rhs_code (def0)) != tcc_comparison)
2042*38fd1498Szrj return false;
2043*38fd1498Szrj pred0 = get_pred_info_from_cmp (def0);
2044*38fd1498Szrj
2045*38fd1498Szrj for (i = 1; i < n; ++i)
2046*38fd1498Szrj {
2047*38fd1498Szrj gimple *def;
2048*38fd1498Szrj pred_info pred;
2049*38fd1498Szrj tree op = gimple_phi_arg_def (phi, i);
2050*38fd1498Szrj
2051*38fd1498Szrj if (TREE_CODE (op) != SSA_NAME)
2052*38fd1498Szrj return false;
2053*38fd1498Szrj
2054*38fd1498Szrj def = SSA_NAME_DEF_STMT (op);
2055*38fd1498Szrj if (gimple_code (def) != GIMPLE_ASSIGN)
2056*38fd1498Szrj return false;
2057*38fd1498Szrj if (TREE_CODE_CLASS (gimple_assign_rhs_code (def)) != tcc_comparison)
2058*38fd1498Szrj return false;
2059*38fd1498Szrj pred = get_pred_info_from_cmp (def);
2060*38fd1498Szrj if (!pred_equal_p (pred, pred0))
2061*38fd1498Szrj return false;
2062*38fd1498Szrj }
2063*38fd1498Szrj
2064*38fd1498Szrj *pred_p = pred0;
2065*38fd1498Szrj return true;
2066*38fd1498Szrj }
2067*38fd1498Szrj
2068*38fd1498Szrj /* Normalize one predicate PRED
2069*38fd1498Szrj 1) if PRED can no longer be normlized, put it into NORM_PREDS.
2070*38fd1498Szrj 2) otherwise if PRED is of the form x != 0, follow x's definition
2071*38fd1498Szrj and put normalized predicates into WORK_LIST. */
2072*38fd1498Szrj
2073*38fd1498Szrj static void
normalize_one_pred_1(pred_chain_union * norm_preds,pred_chain * norm_chain,pred_info pred,enum tree_code and_or_code,vec<pred_info,va_heap,vl_ptr> * work_list,hash_set<tree> * mark_set)2074*38fd1498Szrj normalize_one_pred_1 (pred_chain_union *norm_preds,
2075*38fd1498Szrj pred_chain *norm_chain,
2076*38fd1498Szrj pred_info pred,
2077*38fd1498Szrj enum tree_code and_or_code,
2078*38fd1498Szrj vec<pred_info, va_heap, vl_ptr> *work_list,
2079*38fd1498Szrj hash_set<tree> *mark_set)
2080*38fd1498Szrj {
2081*38fd1498Szrj if (!is_neq_zero_form_p (pred))
2082*38fd1498Szrj {
2083*38fd1498Szrj if (and_or_code == BIT_IOR_EXPR)
2084*38fd1498Szrj push_pred (norm_preds, pred);
2085*38fd1498Szrj else
2086*38fd1498Szrj norm_chain->safe_push (pred);
2087*38fd1498Szrj return;
2088*38fd1498Szrj }
2089*38fd1498Szrj
2090*38fd1498Szrj gimple *def_stmt = SSA_NAME_DEF_STMT (pred.pred_lhs);
2091*38fd1498Szrj
2092*38fd1498Szrj if (gimple_code (def_stmt) == GIMPLE_PHI
2093*38fd1498Szrj && is_degenerated_phi (def_stmt, &pred))
2094*38fd1498Szrj work_list->safe_push (pred);
2095*38fd1498Szrj else if (gimple_code (def_stmt) == GIMPLE_PHI && and_or_code == BIT_IOR_EXPR)
2096*38fd1498Szrj {
2097*38fd1498Szrj int i, n;
2098*38fd1498Szrj n = gimple_phi_num_args (def_stmt);
2099*38fd1498Szrj
2100*38fd1498Szrj /* If we see non zero constant, we should punt. The predicate
2101*38fd1498Szrj * should be one guarding the phi edge. */
2102*38fd1498Szrj for (i = 0; i < n; ++i)
2103*38fd1498Szrj {
2104*38fd1498Szrj tree op = gimple_phi_arg_def (def_stmt, i);
2105*38fd1498Szrj if (TREE_CODE (op) == INTEGER_CST && !integer_zerop (op))
2106*38fd1498Szrj {
2107*38fd1498Szrj push_pred (norm_preds, pred);
2108*38fd1498Szrj return;
2109*38fd1498Szrj }
2110*38fd1498Szrj }
2111*38fd1498Szrj
2112*38fd1498Szrj for (i = 0; i < n; ++i)
2113*38fd1498Szrj {
2114*38fd1498Szrj tree op = gimple_phi_arg_def (def_stmt, i);
2115*38fd1498Szrj if (integer_zerop (op))
2116*38fd1498Szrj continue;
2117*38fd1498Szrj
2118*38fd1498Szrj push_to_worklist (op, work_list, mark_set);
2119*38fd1498Szrj }
2120*38fd1498Szrj }
2121*38fd1498Szrj else if (gimple_code (def_stmt) != GIMPLE_ASSIGN)
2122*38fd1498Szrj {
2123*38fd1498Szrj if (and_or_code == BIT_IOR_EXPR)
2124*38fd1498Szrj push_pred (norm_preds, pred);
2125*38fd1498Szrj else
2126*38fd1498Szrj norm_chain->safe_push (pred);
2127*38fd1498Szrj }
2128*38fd1498Szrj else if (gimple_assign_rhs_code (def_stmt) == and_or_code)
2129*38fd1498Szrj {
2130*38fd1498Szrj /* Avoid splitting up bit manipulations like x & 3 or y | 1. */
2131*38fd1498Szrj if (is_gimple_min_invariant (gimple_assign_rhs2 (def_stmt)))
2132*38fd1498Szrj {
2133*38fd1498Szrj /* But treat x & 3 as condition. */
2134*38fd1498Szrj if (and_or_code == BIT_AND_EXPR)
2135*38fd1498Szrj {
2136*38fd1498Szrj pred_info n_pred;
2137*38fd1498Szrj n_pred.pred_lhs = gimple_assign_rhs1 (def_stmt);
2138*38fd1498Szrj n_pred.pred_rhs = gimple_assign_rhs2 (def_stmt);
2139*38fd1498Szrj n_pred.cond_code = and_or_code;
2140*38fd1498Szrj n_pred.invert = false;
2141*38fd1498Szrj norm_chain->safe_push (n_pred);
2142*38fd1498Szrj }
2143*38fd1498Szrj }
2144*38fd1498Szrj else
2145*38fd1498Szrj {
2146*38fd1498Szrj push_to_worklist (gimple_assign_rhs1 (def_stmt), work_list, mark_set);
2147*38fd1498Szrj push_to_worklist (gimple_assign_rhs2 (def_stmt), work_list, mark_set);
2148*38fd1498Szrj }
2149*38fd1498Szrj }
2150*38fd1498Szrj else if (TREE_CODE_CLASS (gimple_assign_rhs_code (def_stmt))
2151*38fd1498Szrj == tcc_comparison)
2152*38fd1498Szrj {
2153*38fd1498Szrj pred_info n_pred = get_pred_info_from_cmp (def_stmt);
2154*38fd1498Szrj if (and_or_code == BIT_IOR_EXPR)
2155*38fd1498Szrj push_pred (norm_preds, n_pred);
2156*38fd1498Szrj else
2157*38fd1498Szrj norm_chain->safe_push (n_pred);
2158*38fd1498Szrj }
2159*38fd1498Szrj else
2160*38fd1498Szrj {
2161*38fd1498Szrj if (and_or_code == BIT_IOR_EXPR)
2162*38fd1498Szrj push_pred (norm_preds, pred);
2163*38fd1498Szrj else
2164*38fd1498Szrj norm_chain->safe_push (pred);
2165*38fd1498Szrj }
2166*38fd1498Szrj }
2167*38fd1498Szrj
2168*38fd1498Szrj /* Normalize PRED and store the normalized predicates into NORM_PREDS. */
2169*38fd1498Szrj
2170*38fd1498Szrj static void
normalize_one_pred(pred_chain_union * norm_preds,pred_info pred)2171*38fd1498Szrj normalize_one_pred (pred_chain_union *norm_preds, pred_info pred)
2172*38fd1498Szrj {
2173*38fd1498Szrj vec<pred_info, va_heap, vl_ptr> work_list = vNULL;
2174*38fd1498Szrj enum tree_code and_or_code = ERROR_MARK;
2175*38fd1498Szrj pred_chain norm_chain = vNULL;
2176*38fd1498Szrj
2177*38fd1498Szrj if (!is_neq_zero_form_p (pred))
2178*38fd1498Szrj {
2179*38fd1498Szrj push_pred (norm_preds, pred);
2180*38fd1498Szrj return;
2181*38fd1498Szrj }
2182*38fd1498Szrj
2183*38fd1498Szrj gimple *def_stmt = SSA_NAME_DEF_STMT (pred.pred_lhs);
2184*38fd1498Szrj if (gimple_code (def_stmt) == GIMPLE_ASSIGN)
2185*38fd1498Szrj and_or_code = gimple_assign_rhs_code (def_stmt);
2186*38fd1498Szrj if (and_or_code != BIT_IOR_EXPR && and_or_code != BIT_AND_EXPR)
2187*38fd1498Szrj {
2188*38fd1498Szrj if (TREE_CODE_CLASS (and_or_code) == tcc_comparison)
2189*38fd1498Szrj {
2190*38fd1498Szrj pred_info n_pred = get_pred_info_from_cmp (def_stmt);
2191*38fd1498Szrj push_pred (norm_preds, n_pred);
2192*38fd1498Szrj }
2193*38fd1498Szrj else
2194*38fd1498Szrj push_pred (norm_preds, pred);
2195*38fd1498Szrj return;
2196*38fd1498Szrj }
2197*38fd1498Szrj
2198*38fd1498Szrj work_list.safe_push (pred);
2199*38fd1498Szrj hash_set<tree> mark_set;
2200*38fd1498Szrj
2201*38fd1498Szrj while (!work_list.is_empty ())
2202*38fd1498Szrj {
2203*38fd1498Szrj pred_info a_pred = work_list.pop ();
2204*38fd1498Szrj normalize_one_pred_1 (norm_preds, &norm_chain, a_pred, and_or_code,
2205*38fd1498Szrj &work_list, &mark_set);
2206*38fd1498Szrj }
2207*38fd1498Szrj if (and_or_code == BIT_AND_EXPR)
2208*38fd1498Szrj norm_preds->safe_push (norm_chain);
2209*38fd1498Szrj
2210*38fd1498Szrj work_list.release ();
2211*38fd1498Szrj }
2212*38fd1498Szrj
2213*38fd1498Szrj static void
normalize_one_pred_chain(pred_chain_union * norm_preds,pred_chain one_chain)2214*38fd1498Szrj normalize_one_pred_chain (pred_chain_union *norm_preds, pred_chain one_chain)
2215*38fd1498Szrj {
2216*38fd1498Szrj vec<pred_info, va_heap, vl_ptr> work_list = vNULL;
2217*38fd1498Szrj hash_set<tree> mark_set;
2218*38fd1498Szrj pred_chain norm_chain = vNULL;
2219*38fd1498Szrj size_t i;
2220*38fd1498Szrj
2221*38fd1498Szrj for (i = 0; i < one_chain.length (); i++)
2222*38fd1498Szrj {
2223*38fd1498Szrj work_list.safe_push (one_chain[i]);
2224*38fd1498Szrj mark_set.add (one_chain[i].pred_lhs);
2225*38fd1498Szrj }
2226*38fd1498Szrj
2227*38fd1498Szrj while (!work_list.is_empty ())
2228*38fd1498Szrj {
2229*38fd1498Szrj pred_info a_pred = work_list.pop ();
2230*38fd1498Szrj normalize_one_pred_1 (0, &norm_chain, a_pred, BIT_AND_EXPR, &work_list,
2231*38fd1498Szrj &mark_set);
2232*38fd1498Szrj }
2233*38fd1498Szrj
2234*38fd1498Szrj norm_preds->safe_push (norm_chain);
2235*38fd1498Szrj work_list.release ();
2236*38fd1498Szrj }
2237*38fd1498Szrj
2238*38fd1498Szrj /* Normalize predicate chains PREDS and returns the normalized one. */
2239*38fd1498Szrj
2240*38fd1498Szrj static pred_chain_union
normalize_preds(pred_chain_union preds,gimple * use_or_def,bool is_use)2241*38fd1498Szrj normalize_preds (pred_chain_union preds, gimple *use_or_def, bool is_use)
2242*38fd1498Szrj {
2243*38fd1498Szrj pred_chain_union norm_preds = vNULL;
2244*38fd1498Szrj size_t n = preds.length ();
2245*38fd1498Szrj size_t i;
2246*38fd1498Szrj
2247*38fd1498Szrj if (dump_file && dump_flags & TDF_DETAILS)
2248*38fd1498Szrj {
2249*38fd1498Szrj fprintf (dump_file, "[BEFORE NORMALIZATION --");
2250*38fd1498Szrj dump_predicates (use_or_def, preds, is_use ? "[USE]:\n" : "[DEF]:\n");
2251*38fd1498Szrj }
2252*38fd1498Szrj
2253*38fd1498Szrj for (i = 0; i < n; i++)
2254*38fd1498Szrj {
2255*38fd1498Szrj if (preds[i].length () != 1)
2256*38fd1498Szrj normalize_one_pred_chain (&norm_preds, preds[i]);
2257*38fd1498Szrj else
2258*38fd1498Szrj {
2259*38fd1498Szrj normalize_one_pred (&norm_preds, preds[i][0]);
2260*38fd1498Szrj preds[i].release ();
2261*38fd1498Szrj }
2262*38fd1498Szrj }
2263*38fd1498Szrj
2264*38fd1498Szrj if (dump_file)
2265*38fd1498Szrj {
2266*38fd1498Szrj fprintf (dump_file, "[AFTER NORMALIZATION -- ");
2267*38fd1498Szrj dump_predicates (use_or_def, norm_preds,
2268*38fd1498Szrj is_use ? "[USE]:\n" : "[DEF]:\n");
2269*38fd1498Szrj }
2270*38fd1498Szrj
2271*38fd1498Szrj destroy_predicate_vecs (&preds);
2272*38fd1498Szrj return norm_preds;
2273*38fd1498Szrj }
2274*38fd1498Szrj
2275*38fd1498Szrj /* Return TRUE if PREDICATE can be invalidated by any individual
2276*38fd1498Szrj predicate in USE_GUARD. */
2277*38fd1498Szrj
2278*38fd1498Szrj static bool
can_one_predicate_be_invalidated_p(pred_info predicate,pred_chain use_guard)2279*38fd1498Szrj can_one_predicate_be_invalidated_p (pred_info predicate,
2280*38fd1498Szrj pred_chain use_guard)
2281*38fd1498Szrj {
2282*38fd1498Szrj if (dump_file && dump_flags & TDF_DETAILS)
2283*38fd1498Szrj {
2284*38fd1498Szrj fprintf (dump_file, "Testing if this predicate: ");
2285*38fd1498Szrj dump_pred_info (predicate);
2286*38fd1498Szrj fprintf (dump_file, "\n...can be invalidated by a USE guard of: ");
2287*38fd1498Szrj dump_pred_chain (use_guard);
2288*38fd1498Szrj }
2289*38fd1498Szrj for (size_t i = 0; i < use_guard.length (); ++i)
2290*38fd1498Szrj {
2291*38fd1498Szrj /* NOTE: This is a very simple check, and only understands an
2292*38fd1498Szrj exact opposite. So, [i == 0] is currently only invalidated
2293*38fd1498Szrj by [.NOT. i == 0] or [i != 0]. Ideally we should also
2294*38fd1498Szrj invalidate with say [i > 5] or [i == 8]. There is certainly
2295*38fd1498Szrj room for improvement here. */
2296*38fd1498Szrj if (pred_neg_p (predicate, use_guard[i]))
2297*38fd1498Szrj {
2298*38fd1498Szrj if (dump_file && dump_flags & TDF_DETAILS)
2299*38fd1498Szrj {
2300*38fd1498Szrj fprintf (dump_file, " Predicate was invalidated by: ");
2301*38fd1498Szrj dump_pred_info (use_guard[i]);
2302*38fd1498Szrj fputc ('\n', dump_file);
2303*38fd1498Szrj }
2304*38fd1498Szrj return true;
2305*38fd1498Szrj }
2306*38fd1498Szrj }
2307*38fd1498Szrj return false;
2308*38fd1498Szrj }
2309*38fd1498Szrj
2310*38fd1498Szrj /* Return TRUE if all predicates in UNINIT_PRED are invalidated by
2311*38fd1498Szrj USE_GUARD being true. */
2312*38fd1498Szrj
2313*38fd1498Szrj static bool
can_chain_union_be_invalidated_p(pred_chain_union uninit_pred,pred_chain use_guard)2314*38fd1498Szrj can_chain_union_be_invalidated_p (pred_chain_union uninit_pred,
2315*38fd1498Szrj pred_chain use_guard)
2316*38fd1498Szrj {
2317*38fd1498Szrj if (uninit_pred.is_empty ())
2318*38fd1498Szrj return false;
2319*38fd1498Szrj if (dump_file && dump_flags & TDF_DETAILS)
2320*38fd1498Szrj dump_predicates (NULL, uninit_pred,
2321*38fd1498Szrj "Testing if anything here can be invalidated: ");
2322*38fd1498Szrj for (size_t i = 0; i < uninit_pred.length (); ++i)
2323*38fd1498Szrj {
2324*38fd1498Szrj pred_chain c = uninit_pred[i];
2325*38fd1498Szrj size_t j;
2326*38fd1498Szrj for (j = 0; j < c.length (); ++j)
2327*38fd1498Szrj if (can_one_predicate_be_invalidated_p (c[j], use_guard))
2328*38fd1498Szrj break;
2329*38fd1498Szrj
2330*38fd1498Szrj /* If we were unable to invalidate any predicate in C, then there
2331*38fd1498Szrj is a viable path from entry to the PHI where the PHI takes
2332*38fd1498Szrj an uninitialized value and continues to a use of the PHI. */
2333*38fd1498Szrj if (j == c.length ())
2334*38fd1498Szrj return false;
2335*38fd1498Szrj }
2336*38fd1498Szrj return true;
2337*38fd1498Szrj }
2338*38fd1498Szrj
2339*38fd1498Szrj /* Return TRUE if none of the uninitialized operands in UNINT_OPNDS
2340*38fd1498Szrj can actually happen if we arrived at a use for PHI.
2341*38fd1498Szrj
2342*38fd1498Szrj PHI_USE_GUARDS are the guard conditions for the use of the PHI. */
2343*38fd1498Szrj
2344*38fd1498Szrj static bool
uninit_uses_cannot_happen(gphi * phi,unsigned uninit_opnds,pred_chain_union phi_use_guards)2345*38fd1498Szrj uninit_uses_cannot_happen (gphi *phi, unsigned uninit_opnds,
2346*38fd1498Szrj pred_chain_union phi_use_guards)
2347*38fd1498Szrj {
2348*38fd1498Szrj unsigned phi_args = gimple_phi_num_args (phi);
2349*38fd1498Szrj if (phi_args > max_phi_args)
2350*38fd1498Szrj return false;
2351*38fd1498Szrj
2352*38fd1498Szrj /* PHI_USE_GUARDS are OR'ed together. If we have more than one
2353*38fd1498Szrj possible guard, there's no way of knowing which guard was true.
2354*38fd1498Szrj Since we need to be absolutely sure that the uninitialized
2355*38fd1498Szrj operands will be invalidated, bail. */
2356*38fd1498Szrj if (phi_use_guards.length () != 1)
2357*38fd1498Szrj return false;
2358*38fd1498Szrj
2359*38fd1498Szrj /* Look for the control dependencies of all the uninitialized
2360*38fd1498Szrj operands and build guard predicates describing them. */
2361*38fd1498Szrj pred_chain_union uninit_preds;
2362*38fd1498Szrj bool ret = true;
2363*38fd1498Szrj for (unsigned i = 0; i < phi_args; ++i)
2364*38fd1498Szrj {
2365*38fd1498Szrj if (!MASK_TEST_BIT (uninit_opnds, i))
2366*38fd1498Szrj continue;
2367*38fd1498Szrj
2368*38fd1498Szrj edge e = gimple_phi_arg_edge (phi, i);
2369*38fd1498Szrj vec<edge> dep_chains[MAX_NUM_CHAINS];
2370*38fd1498Szrj auto_vec<edge, MAX_CHAIN_LEN + 1> cur_chain;
2371*38fd1498Szrj size_t num_chains = 0;
2372*38fd1498Szrj int num_calls = 0;
2373*38fd1498Szrj
2374*38fd1498Szrj /* Build the control dependency chain for uninit operand `i'... */
2375*38fd1498Szrj uninit_preds = vNULL;
2376*38fd1498Szrj if (!compute_control_dep_chain (ENTRY_BLOCK_PTR_FOR_FN (cfun),
2377*38fd1498Szrj e->src, dep_chains, &num_chains,
2378*38fd1498Szrj &cur_chain, &num_calls))
2379*38fd1498Szrj {
2380*38fd1498Szrj ret = false;
2381*38fd1498Szrj break;
2382*38fd1498Szrj }
2383*38fd1498Szrj /* ...and convert it into a set of predicates. */
2384*38fd1498Szrj bool has_valid_preds
2385*38fd1498Szrj = convert_control_dep_chain_into_preds (dep_chains, num_chains,
2386*38fd1498Szrj &uninit_preds);
2387*38fd1498Szrj for (size_t j = 0; j < num_chains; ++j)
2388*38fd1498Szrj dep_chains[j].release ();
2389*38fd1498Szrj if (!has_valid_preds)
2390*38fd1498Szrj {
2391*38fd1498Szrj ret = false;
2392*38fd1498Szrj break;
2393*38fd1498Szrj }
2394*38fd1498Szrj simplify_preds (&uninit_preds, NULL, false);
2395*38fd1498Szrj uninit_preds = normalize_preds (uninit_preds, NULL, false);
2396*38fd1498Szrj
2397*38fd1498Szrj /* Can the guard for this uninitialized operand be invalidated
2398*38fd1498Szrj by the PHI use? */
2399*38fd1498Szrj if (!can_chain_union_be_invalidated_p (uninit_preds, phi_use_guards[0]))
2400*38fd1498Szrj {
2401*38fd1498Szrj ret = false;
2402*38fd1498Szrj break;
2403*38fd1498Szrj }
2404*38fd1498Szrj }
2405*38fd1498Szrj destroy_predicate_vecs (&uninit_preds);
2406*38fd1498Szrj return ret;
2407*38fd1498Szrj }
2408*38fd1498Szrj
2409*38fd1498Szrj /* Computes the predicates that guard the use and checks
2410*38fd1498Szrj if the incoming paths that have empty (or possibly
2411*38fd1498Szrj empty) definition can be pruned/filtered. The function returns
2412*38fd1498Szrj true if it can be determined that the use of PHI's def in
2413*38fd1498Szrj USE_STMT is guarded with a predicate set not overlapping with
2414*38fd1498Szrj predicate sets of all runtime paths that do not have a definition.
2415*38fd1498Szrj
2416*38fd1498Szrj Returns false if it is not or it can not be determined. USE_BB is
2417*38fd1498Szrj the bb of the use (for phi operand use, the bb is not the bb of
2418*38fd1498Szrj the phi stmt, but the src bb of the operand edge).
2419*38fd1498Szrj
2420*38fd1498Szrj UNINIT_OPNDS is a bit vector. If an operand of PHI is uninitialized, the
2421*38fd1498Szrj corresponding bit in the vector is 1. VISITED_PHIS is a pointer
2422*38fd1498Szrj set of phis being visited.
2423*38fd1498Szrj
2424*38fd1498Szrj *DEF_PREDS contains the (memoized) defining predicate chains of PHI.
2425*38fd1498Szrj If *DEF_PREDS is the empty vector, the defining predicate chains of
2426*38fd1498Szrj PHI will be computed and stored into *DEF_PREDS as needed.
2427*38fd1498Szrj
2428*38fd1498Szrj VISITED_PHIS is a pointer set of phis being visited. */
2429*38fd1498Szrj
2430*38fd1498Szrj static bool
is_use_properly_guarded(gimple * use_stmt,basic_block use_bb,gphi * phi,unsigned uninit_opnds,pred_chain_union * def_preds,hash_set<gphi * > * visited_phis)2431*38fd1498Szrj is_use_properly_guarded (gimple *use_stmt,
2432*38fd1498Szrj basic_block use_bb,
2433*38fd1498Szrj gphi *phi,
2434*38fd1498Szrj unsigned uninit_opnds,
2435*38fd1498Szrj pred_chain_union *def_preds,
2436*38fd1498Szrj hash_set<gphi *> *visited_phis)
2437*38fd1498Szrj {
2438*38fd1498Szrj basic_block phi_bb;
2439*38fd1498Szrj pred_chain_union preds = vNULL;
2440*38fd1498Szrj bool has_valid_preds = false;
2441*38fd1498Szrj bool is_properly_guarded = false;
2442*38fd1498Szrj
2443*38fd1498Szrj if (visited_phis->add (phi))
2444*38fd1498Szrj return false;
2445*38fd1498Szrj
2446*38fd1498Szrj phi_bb = gimple_bb (phi);
2447*38fd1498Szrj
2448*38fd1498Szrj if (is_non_loop_exit_postdominating (use_bb, phi_bb))
2449*38fd1498Szrj return false;
2450*38fd1498Szrj
2451*38fd1498Szrj has_valid_preds = find_predicates (&preds, phi_bb, use_bb);
2452*38fd1498Szrj
2453*38fd1498Szrj if (!has_valid_preds)
2454*38fd1498Szrj {
2455*38fd1498Szrj destroy_predicate_vecs (&preds);
2456*38fd1498Szrj return false;
2457*38fd1498Szrj }
2458*38fd1498Szrj
2459*38fd1498Szrj /* Try to prune the dead incoming phi edges. */
2460*38fd1498Szrj is_properly_guarded
2461*38fd1498Szrj = use_pred_not_overlap_with_undef_path_pred (preds, phi, uninit_opnds,
2462*38fd1498Szrj visited_phis);
2463*38fd1498Szrj
2464*38fd1498Szrj /* We might be able to prove that if the control dependencies
2465*38fd1498Szrj for UNINIT_OPNDS are true, that the control dependencies for
2466*38fd1498Szrj USE_STMT can never be true. */
2467*38fd1498Szrj if (!is_properly_guarded)
2468*38fd1498Szrj is_properly_guarded |= uninit_uses_cannot_happen (phi, uninit_opnds,
2469*38fd1498Szrj preds);
2470*38fd1498Szrj
2471*38fd1498Szrj if (is_properly_guarded)
2472*38fd1498Szrj {
2473*38fd1498Szrj destroy_predicate_vecs (&preds);
2474*38fd1498Szrj return true;
2475*38fd1498Szrj }
2476*38fd1498Szrj
2477*38fd1498Szrj if (def_preds->is_empty ())
2478*38fd1498Szrj {
2479*38fd1498Szrj has_valid_preds = find_def_preds (def_preds, phi);
2480*38fd1498Szrj
2481*38fd1498Szrj if (!has_valid_preds)
2482*38fd1498Szrj {
2483*38fd1498Szrj destroy_predicate_vecs (&preds);
2484*38fd1498Szrj return false;
2485*38fd1498Szrj }
2486*38fd1498Szrj
2487*38fd1498Szrj simplify_preds (def_preds, phi, false);
2488*38fd1498Szrj *def_preds = normalize_preds (*def_preds, phi, false);
2489*38fd1498Szrj }
2490*38fd1498Szrj
2491*38fd1498Szrj simplify_preds (&preds, use_stmt, true);
2492*38fd1498Szrj preds = normalize_preds (preds, use_stmt, true);
2493*38fd1498Szrj
2494*38fd1498Szrj is_properly_guarded = is_superset_of (*def_preds, preds);
2495*38fd1498Szrj
2496*38fd1498Szrj destroy_predicate_vecs (&preds);
2497*38fd1498Szrj return is_properly_guarded;
2498*38fd1498Szrj }
2499*38fd1498Szrj
2500*38fd1498Szrj /* Searches through all uses of a potentially
2501*38fd1498Szrj uninitialized variable defined by PHI and returns a use
2502*38fd1498Szrj statement if the use is not properly guarded. It returns
2503*38fd1498Szrj NULL if all uses are guarded. UNINIT_OPNDS is a bitvector
2504*38fd1498Szrj holding the position(s) of uninit PHI operands. WORKLIST
2505*38fd1498Szrj is the vector of candidate phis that may be updated by this
2506*38fd1498Szrj function. ADDED_TO_WORKLIST is the pointer set tracking
2507*38fd1498Szrj if the new phi is already in the worklist. */
2508*38fd1498Szrj
2509*38fd1498Szrj static gimple *
find_uninit_use(gphi * phi,unsigned uninit_opnds,vec<gphi * > * worklist,hash_set<gphi * > * added_to_worklist)2510*38fd1498Szrj find_uninit_use (gphi *phi, unsigned uninit_opnds,
2511*38fd1498Szrj vec<gphi *> *worklist,
2512*38fd1498Szrj hash_set<gphi *> *added_to_worklist)
2513*38fd1498Szrj {
2514*38fd1498Szrj tree phi_result;
2515*38fd1498Szrj use_operand_p use_p;
2516*38fd1498Szrj gimple *use_stmt;
2517*38fd1498Szrj imm_use_iterator iter;
2518*38fd1498Szrj pred_chain_union def_preds = vNULL;
2519*38fd1498Szrj gimple *ret = NULL;
2520*38fd1498Szrj
2521*38fd1498Szrj phi_result = gimple_phi_result (phi);
2522*38fd1498Szrj
2523*38fd1498Szrj FOR_EACH_IMM_USE_FAST (use_p, iter, phi_result)
2524*38fd1498Szrj {
2525*38fd1498Szrj basic_block use_bb;
2526*38fd1498Szrj
2527*38fd1498Szrj use_stmt = USE_STMT (use_p);
2528*38fd1498Szrj if (is_gimple_debug (use_stmt))
2529*38fd1498Szrj continue;
2530*38fd1498Szrj
2531*38fd1498Szrj if (gphi *use_phi = dyn_cast<gphi *> (use_stmt))
2532*38fd1498Szrj use_bb = gimple_phi_arg_edge (use_phi,
2533*38fd1498Szrj PHI_ARG_INDEX_FROM_USE (use_p))->src;
2534*38fd1498Szrj else
2535*38fd1498Szrj use_bb = gimple_bb (use_stmt);
2536*38fd1498Szrj
2537*38fd1498Szrj hash_set<gphi *> visited_phis;
2538*38fd1498Szrj if (is_use_properly_guarded (use_stmt, use_bb, phi, uninit_opnds,
2539*38fd1498Szrj &def_preds, &visited_phis))
2540*38fd1498Szrj continue;
2541*38fd1498Szrj
2542*38fd1498Szrj if (dump_file && (dump_flags & TDF_DETAILS))
2543*38fd1498Szrj {
2544*38fd1498Szrj fprintf (dump_file, "[CHECK]: Found unguarded use: ");
2545*38fd1498Szrj print_gimple_stmt (dump_file, use_stmt, 0);
2546*38fd1498Szrj }
2547*38fd1498Szrj /* Found one real use, return. */
2548*38fd1498Szrj if (gimple_code (use_stmt) != GIMPLE_PHI)
2549*38fd1498Szrj {
2550*38fd1498Szrj ret = use_stmt;
2551*38fd1498Szrj break;
2552*38fd1498Szrj }
2553*38fd1498Szrj
2554*38fd1498Szrj /* Found a phi use that is not guarded,
2555*38fd1498Szrj add the phi to the worklist. */
2556*38fd1498Szrj if (!added_to_worklist->add (as_a<gphi *> (use_stmt)))
2557*38fd1498Szrj {
2558*38fd1498Szrj if (dump_file && (dump_flags & TDF_DETAILS))
2559*38fd1498Szrj {
2560*38fd1498Szrj fprintf (dump_file, "[WORKLIST]: Update worklist with phi: ");
2561*38fd1498Szrj print_gimple_stmt (dump_file, use_stmt, 0);
2562*38fd1498Szrj }
2563*38fd1498Szrj
2564*38fd1498Szrj worklist->safe_push (as_a<gphi *> (use_stmt));
2565*38fd1498Szrj possibly_undefined_names->add (phi_result);
2566*38fd1498Szrj }
2567*38fd1498Szrj }
2568*38fd1498Szrj
2569*38fd1498Szrj destroy_predicate_vecs (&def_preds);
2570*38fd1498Szrj return ret;
2571*38fd1498Szrj }
2572*38fd1498Szrj
2573*38fd1498Szrj /* Look for inputs to PHI that are SSA_NAMEs that have empty definitions
2574*38fd1498Szrj and gives warning if there exists a runtime path from the entry to a
2575*38fd1498Szrj use of the PHI def that does not contain a definition. In other words,
2576*38fd1498Szrj the warning is on the real use. The more dead paths that can be pruned
2577*38fd1498Szrj by the compiler, the fewer false positives the warning is. WORKLIST
2578*38fd1498Szrj is a vector of candidate phis to be examined. ADDED_TO_WORKLIST is
2579*38fd1498Szrj a pointer set tracking if the new phi is added to the worklist or not. */
2580*38fd1498Szrj
2581*38fd1498Szrj static void
warn_uninitialized_phi(gphi * phi,vec<gphi * > * worklist,hash_set<gphi * > * added_to_worklist)2582*38fd1498Szrj warn_uninitialized_phi (gphi *phi, vec<gphi *> *worklist,
2583*38fd1498Szrj hash_set<gphi *> *added_to_worklist)
2584*38fd1498Szrj {
2585*38fd1498Szrj unsigned uninit_opnds;
2586*38fd1498Szrj gimple *uninit_use_stmt = 0;
2587*38fd1498Szrj tree uninit_op;
2588*38fd1498Szrj int phiarg_index;
2589*38fd1498Szrj location_t loc;
2590*38fd1498Szrj
2591*38fd1498Szrj /* Don't look at virtual operands. */
2592*38fd1498Szrj if (virtual_operand_p (gimple_phi_result (phi)))
2593*38fd1498Szrj return;
2594*38fd1498Szrj
2595*38fd1498Szrj uninit_opnds = compute_uninit_opnds_pos (phi);
2596*38fd1498Szrj
2597*38fd1498Szrj if (MASK_EMPTY (uninit_opnds))
2598*38fd1498Szrj return;
2599*38fd1498Szrj
2600*38fd1498Szrj if (dump_file && (dump_flags & TDF_DETAILS))
2601*38fd1498Szrj {
2602*38fd1498Szrj fprintf (dump_file, "[CHECK]: examining phi: ");
2603*38fd1498Szrj print_gimple_stmt (dump_file, phi, 0);
2604*38fd1498Szrj }
2605*38fd1498Szrj
2606*38fd1498Szrj /* Now check if we have any use of the value without proper guard. */
2607*38fd1498Szrj uninit_use_stmt = find_uninit_use (phi, uninit_opnds,
2608*38fd1498Szrj worklist, added_to_worklist);
2609*38fd1498Szrj
2610*38fd1498Szrj /* All uses are properly guarded. */
2611*38fd1498Szrj if (!uninit_use_stmt)
2612*38fd1498Szrj return;
2613*38fd1498Szrj
2614*38fd1498Szrj phiarg_index = MASK_FIRST_SET_BIT (uninit_opnds);
2615*38fd1498Szrj uninit_op = gimple_phi_arg_def (phi, phiarg_index);
2616*38fd1498Szrj if (SSA_NAME_VAR (uninit_op) == NULL_TREE)
2617*38fd1498Szrj return;
2618*38fd1498Szrj if (gimple_phi_arg_has_location (phi, phiarg_index))
2619*38fd1498Szrj loc = gimple_phi_arg_location (phi, phiarg_index);
2620*38fd1498Szrj else
2621*38fd1498Szrj loc = UNKNOWN_LOCATION;
2622*38fd1498Szrj warn_uninit (OPT_Wmaybe_uninitialized, uninit_op, SSA_NAME_VAR (uninit_op),
2623*38fd1498Szrj SSA_NAME_VAR (uninit_op),
2624*38fd1498Szrj "%qD may be used uninitialized in this function",
2625*38fd1498Szrj uninit_use_stmt, loc);
2626*38fd1498Szrj }
2627*38fd1498Szrj
2628*38fd1498Szrj static bool
gate_warn_uninitialized(void)2629*38fd1498Szrj gate_warn_uninitialized (void)
2630*38fd1498Szrj {
2631*38fd1498Szrj return warn_uninitialized || warn_maybe_uninitialized;
2632*38fd1498Szrj }
2633*38fd1498Szrj
2634*38fd1498Szrj namespace {
2635*38fd1498Szrj
2636*38fd1498Szrj const pass_data pass_data_late_warn_uninitialized =
2637*38fd1498Szrj {
2638*38fd1498Szrj GIMPLE_PASS, /* type */
2639*38fd1498Szrj "uninit", /* name */
2640*38fd1498Szrj OPTGROUP_NONE, /* optinfo_flags */
2641*38fd1498Szrj TV_NONE, /* tv_id */
2642*38fd1498Szrj PROP_ssa, /* properties_required */
2643*38fd1498Szrj 0, /* properties_provided */
2644*38fd1498Szrj 0, /* properties_destroyed */
2645*38fd1498Szrj 0, /* todo_flags_start */
2646*38fd1498Szrj 0, /* todo_flags_finish */
2647*38fd1498Szrj };
2648*38fd1498Szrj
2649*38fd1498Szrj class pass_late_warn_uninitialized : public gimple_opt_pass
2650*38fd1498Szrj {
2651*38fd1498Szrj public:
pass_late_warn_uninitialized(gcc::context * ctxt)2652*38fd1498Szrj pass_late_warn_uninitialized (gcc::context *ctxt)
2653*38fd1498Szrj : gimple_opt_pass (pass_data_late_warn_uninitialized, ctxt)
2654*38fd1498Szrj {}
2655*38fd1498Szrj
2656*38fd1498Szrj /* opt_pass methods: */
clone()2657*38fd1498Szrj opt_pass *clone () { return new pass_late_warn_uninitialized (m_ctxt); }
gate(function *)2658*38fd1498Szrj virtual bool gate (function *) { return gate_warn_uninitialized (); }
2659*38fd1498Szrj virtual unsigned int execute (function *);
2660*38fd1498Szrj
2661*38fd1498Szrj }; // class pass_late_warn_uninitialized
2662*38fd1498Szrj
2663*38fd1498Szrj unsigned int
execute(function * fun)2664*38fd1498Szrj pass_late_warn_uninitialized::execute (function *fun)
2665*38fd1498Szrj {
2666*38fd1498Szrj basic_block bb;
2667*38fd1498Szrj gphi_iterator gsi;
2668*38fd1498Szrj vec<gphi *> worklist = vNULL;
2669*38fd1498Szrj
2670*38fd1498Szrj calculate_dominance_info (CDI_DOMINATORS);
2671*38fd1498Szrj calculate_dominance_info (CDI_POST_DOMINATORS);
2672*38fd1498Szrj /* Re-do the plain uninitialized variable check, as optimization may have
2673*38fd1498Szrj straightened control flow. Do this first so that we don't accidentally
2674*38fd1498Szrj get a "may be" warning when we'd have seen an "is" warning later. */
2675*38fd1498Szrj warn_uninitialized_vars (/*warn_possibly_uninitialized=*/1);
2676*38fd1498Szrj
2677*38fd1498Szrj timevar_push (TV_TREE_UNINIT);
2678*38fd1498Szrj
2679*38fd1498Szrj possibly_undefined_names = new hash_set<tree>;
2680*38fd1498Szrj hash_set<gphi *> added_to_worklist;
2681*38fd1498Szrj
2682*38fd1498Szrj /* Initialize worklist */
2683*38fd1498Szrj FOR_EACH_BB_FN (bb, fun)
2684*38fd1498Szrj for (gsi = gsi_start_phis (bb); !gsi_end_p (gsi); gsi_next (&gsi))
2685*38fd1498Szrj {
2686*38fd1498Szrj gphi *phi = gsi.phi ();
2687*38fd1498Szrj size_t n, i;
2688*38fd1498Szrj
2689*38fd1498Szrj n = gimple_phi_num_args (phi);
2690*38fd1498Szrj
2691*38fd1498Szrj /* Don't look at virtual operands. */
2692*38fd1498Szrj if (virtual_operand_p (gimple_phi_result (phi)))
2693*38fd1498Szrj continue;
2694*38fd1498Szrj
2695*38fd1498Szrj for (i = 0; i < n; ++i)
2696*38fd1498Szrj {
2697*38fd1498Szrj tree op = gimple_phi_arg_def (phi, i);
2698*38fd1498Szrj if (TREE_CODE (op) == SSA_NAME && uninit_undefined_value_p (op))
2699*38fd1498Szrj {
2700*38fd1498Szrj worklist.safe_push (phi);
2701*38fd1498Szrj added_to_worklist.add (phi);
2702*38fd1498Szrj if (dump_file && (dump_flags & TDF_DETAILS))
2703*38fd1498Szrj {
2704*38fd1498Szrj fprintf (dump_file, "[WORKLIST]: add to initial list: ");
2705*38fd1498Szrj print_gimple_stmt (dump_file, phi, 0);
2706*38fd1498Szrj }
2707*38fd1498Szrj break;
2708*38fd1498Szrj }
2709*38fd1498Szrj }
2710*38fd1498Szrj }
2711*38fd1498Szrj
2712*38fd1498Szrj while (worklist.length () != 0)
2713*38fd1498Szrj {
2714*38fd1498Szrj gphi *cur_phi = 0;
2715*38fd1498Szrj cur_phi = worklist.pop ();
2716*38fd1498Szrj warn_uninitialized_phi (cur_phi, &worklist, &added_to_worklist);
2717*38fd1498Szrj }
2718*38fd1498Szrj
2719*38fd1498Szrj worklist.release ();
2720*38fd1498Szrj delete possibly_undefined_names;
2721*38fd1498Szrj possibly_undefined_names = NULL;
2722*38fd1498Szrj free_dominance_info (CDI_POST_DOMINATORS);
2723*38fd1498Szrj timevar_pop (TV_TREE_UNINIT);
2724*38fd1498Szrj return 0;
2725*38fd1498Szrj }
2726*38fd1498Szrj
2727*38fd1498Szrj } // anon namespace
2728*38fd1498Szrj
2729*38fd1498Szrj gimple_opt_pass *
make_pass_late_warn_uninitialized(gcc::context * ctxt)2730*38fd1498Szrj make_pass_late_warn_uninitialized (gcc::context *ctxt)
2731*38fd1498Szrj {
2732*38fd1498Szrj return new pass_late_warn_uninitialized (ctxt);
2733*38fd1498Szrj }
2734*38fd1498Szrj
2735*38fd1498Szrj static unsigned int
execute_early_warn_uninitialized(void)2736*38fd1498Szrj execute_early_warn_uninitialized (void)
2737*38fd1498Szrj {
2738*38fd1498Szrj /* Currently, this pass runs always but
2739*38fd1498Szrj execute_late_warn_uninitialized only runs with optimization. With
2740*38fd1498Szrj optimization we want to warn about possible uninitialized as late
2741*38fd1498Szrj as possible, thus don't do it here. However, without
2742*38fd1498Szrj optimization we need to warn here about "may be uninitialized". */
2743*38fd1498Szrj calculate_dominance_info (CDI_POST_DOMINATORS);
2744*38fd1498Szrj
2745*38fd1498Szrj warn_uninitialized_vars (/*warn_possibly_uninitialized=*/!optimize);
2746*38fd1498Szrj
2747*38fd1498Szrj /* Post-dominator information can not be reliably updated. Free it
2748*38fd1498Szrj after the use. */
2749*38fd1498Szrj
2750*38fd1498Szrj free_dominance_info (CDI_POST_DOMINATORS);
2751*38fd1498Szrj return 0;
2752*38fd1498Szrj }
2753*38fd1498Szrj
2754*38fd1498Szrj namespace {
2755*38fd1498Szrj
2756*38fd1498Szrj const pass_data pass_data_early_warn_uninitialized =
2757*38fd1498Szrj {
2758*38fd1498Szrj GIMPLE_PASS, /* type */
2759*38fd1498Szrj "*early_warn_uninitialized", /* name */
2760*38fd1498Szrj OPTGROUP_NONE, /* optinfo_flags */
2761*38fd1498Szrj TV_TREE_UNINIT, /* tv_id */
2762*38fd1498Szrj PROP_ssa, /* properties_required */
2763*38fd1498Szrj 0, /* properties_provided */
2764*38fd1498Szrj 0, /* properties_destroyed */
2765*38fd1498Szrj 0, /* todo_flags_start */
2766*38fd1498Szrj 0, /* todo_flags_finish */
2767*38fd1498Szrj };
2768*38fd1498Szrj
2769*38fd1498Szrj class pass_early_warn_uninitialized : public gimple_opt_pass
2770*38fd1498Szrj {
2771*38fd1498Szrj public:
pass_early_warn_uninitialized(gcc::context * ctxt)2772*38fd1498Szrj pass_early_warn_uninitialized (gcc::context *ctxt)
2773*38fd1498Szrj : gimple_opt_pass (pass_data_early_warn_uninitialized, ctxt)
2774*38fd1498Szrj {}
2775*38fd1498Szrj
2776*38fd1498Szrj /* opt_pass methods: */
gate(function *)2777*38fd1498Szrj virtual bool gate (function *) { return gate_warn_uninitialized (); }
execute(function *)2778*38fd1498Szrj virtual unsigned int execute (function *)
2779*38fd1498Szrj {
2780*38fd1498Szrj return execute_early_warn_uninitialized ();
2781*38fd1498Szrj }
2782*38fd1498Szrj
2783*38fd1498Szrj }; // class pass_early_warn_uninitialized
2784*38fd1498Szrj
2785*38fd1498Szrj } // anon namespace
2786*38fd1498Szrj
2787*38fd1498Szrj gimple_opt_pass *
make_pass_early_warn_uninitialized(gcc::context * ctxt)2788*38fd1498Szrj make_pass_early_warn_uninitialized (gcc::context *ctxt)
2789*38fd1498Szrj {
2790*38fd1498Szrj return new pass_early_warn_uninitialized (ctxt);
2791*38fd1498Szrj }
2792