diff options
author | Kaveh R. Ghazi <ghazi@caip.rutgers.edu> | 2007-02-24 18:11:33 +0000 |
---|---|---|
committer | Kaveh Ghazi <ghazi@gcc.gnu.org> | 2007-02-24 18:11:33 +0000 |
commit | 3d577eafa1d67958e22cae9a27d8194fd47bd22f (patch) | |
tree | 02890b0b9a4814d77189e87581d3c8ea66db9fe3 | |
parent | 00c73ae6373c0a4080b9a414b43cc6efebb0705c (diff) | |
download | gcc-3d577eafa1d67958e22cae9a27d8194fd47bd22f.zip gcc-3d577eafa1d67958e22cae9a27d8194fd47bd22f.tar.gz gcc-3d577eafa1d67958e22cae9a27d8194fd47bd22f.tar.bz2 |
builtins.c (fold_builtin_modf): New.
* builtins.c (fold_builtin_modf): New.
(fold_builtin_2): Use it.
testsuite:
* gcc.dg/torture/builtin-modf-1.c: New test.
From-SVN: r122292
-rw-r--r-- | gcc/ChangeLog | 5 | ||||
-rw-r--r-- | gcc/builtins.c | 59 | ||||
-rw-r--r-- | gcc/testsuite/ChangeLog | 4 | ||||
-rw-r--r-- | gcc/testsuite/gcc.dg/torture/builtin-modf-1.c | 159 |
4 files changed, 227 insertions, 0 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index d1ce533..2e57a9b 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,8 @@ +2007-02-24 Kaveh R. Ghazi <ghazi@caip.rutgers.edu> + + * builtins.c (fold_builtin_modf): New. + (fold_builtin_2): Use it. + 2007-02-24 Bernd Schmidt <bernd.schmidt@analog.com> * loop-iv.c (implies_p): Detect additional cases where A implies B. diff --git a/gcc/builtins.c b/gcc/builtins.c index d7074ed..3e1ab59 100644 --- a/gcc/builtins.c +++ b/gcc/builtins.c @@ -9214,6 +9214,62 @@ fold_builtin_load_exponent (tree arg0, tree arg1, tree type, bool ldexp) return NULL_TREE; } +/* Fold a call to builtin modf. */ + +static tree +fold_builtin_modf (tree arg0, tree arg1, tree rettype) +{ + if (! validate_arg (arg0, REAL_TYPE) || ! validate_arg (arg1, POINTER_TYPE)) + return NULL_TREE; + + STRIP_NOPS (arg0); + + if (!(TREE_CODE (arg0) == REAL_CST && ! TREE_OVERFLOW (arg0))) + return NULL_TREE; + + arg1 = build_fold_indirect_ref (arg1); + + /* Proceed if a valid pointer type was passed in. */ + if (TYPE_MAIN_VARIANT (TREE_TYPE (arg1)) == TYPE_MAIN_VARIANT (rettype)) + { + const REAL_VALUE_TYPE *const value = TREE_REAL_CST_PTR (arg0); + REAL_VALUE_TYPE trunc, frac; + + switch (value->cl) + { + case rvc_nan: + case rvc_zero: + /* For +-NaN or +-0, return (*arg1 = arg0, arg0). */ + trunc = frac = *value; + break; + case rvc_inf: + /* For +-Inf, return (*arg1 = arg0, +-0). */ + frac = dconst0; + frac.sign = value->sign; + trunc = *value; + break; + case rvc_normal: + /* Return (*arg1 = trunc(arg0), arg0-trunc(arg0)). */ + real_trunc (&trunc, VOIDmode, value); + real_arithmetic (&frac, MINUS_EXPR, value, &trunc); + /* If the original number was negative and already + integral, then the fractional part is -0.0. */ + if (value->sign && frac.cl == rvc_zero) + frac.sign = value->sign; + break; + } + + /* Create the COMPOUND_EXPR (*arg1 = trunc, frac). */ + arg1 = fold_build2 (MODIFY_EXPR, rettype, arg1, + build_real (rettype, trunc)); + TREE_SIDE_EFFECTS (arg1) = 1; + return fold_build2 (COMPOUND_EXPR, rettype, arg1, + build_real (rettype, frac)); + } + + return NULL_TREE; +} + /* Fold a call to __builtin_isnan(), __builtin_isinf, __builtin_finite. ARG is the argument for the call. */ @@ -9690,6 +9746,9 @@ fold_builtin_2 (tree fndecl, tree arg0, tree arg1, bool ignore) CASE_FLT_FN (BUILT_IN_FREXP): return fold_builtin_frexp (arg0, arg1, type); + CASE_FLT_FN (BUILT_IN_MODF): + return fold_builtin_modf (arg0, arg1, type); + case BUILT_IN_BZERO: return fold_builtin_bzero (arg0, arg1, ignore); diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 26ad4bf..a4b1af9 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,7 @@ +2007-02-24 Kaveh R. Ghazi <ghazi@caip.rutgers.edu> + + * gcc.dg/torture/builtin-modf-1.c: New test. + 2007-02-23 Paolo Bonzini <bonzini@gnu.org> PR tree-optimization/30904 diff --git a/gcc/testsuite/gcc.dg/torture/builtin-modf-1.c b/gcc/testsuite/gcc.dg/torture/builtin-modf-1.c new file mode 100644 index 0000000..d6cfdfc --- /dev/null +++ b/gcc/testsuite/gcc.dg/torture/builtin-modf-1.c @@ -0,0 +1,159 @@ +/* Copyright (C) 2007 Free Software Foundation. + + Verify that built-in folding of modf is correctly performed by the + compiler. + + Origin: Kaveh R. Ghazi, February 23, 2007. */ + +/* { dg-do link } */ + +extern void link_error(int); + +/* Return TRUE if the sign of X != sign of Y. This is important when + comparing signed zeros. */ +#define CKSGN_F(X,Y) \ + (__builtin_copysignf(1.0F,(X)) != __builtin_copysignf(1.0F,(Y))) +#define CKSGN(X,Y) \ + (__builtin_copysign(1.0,(X)) != __builtin_copysign(1.0,(Y))) +#define CKSGN_L(X,Y) \ + (__builtin_copysignl(1.0L,(X)) != __builtin_copysignl(1.0L,(Y))) + +/* We use these macros if we can only check these when optimizing. In + some cases we rely on other optimizations to propagate the value + and fold away certain constructs. Likewise for the sign testing. + TRUE means an error occurred. */ +#ifdef __OPTIMIZE__ +#define CKRES(X) (X) +#define CKIPTR(X,Y) X != Y +#define CKSGN_IPTR_F(X,Y) CKSGN_F(X,Y) +#define CKSGN_IPTR(X,Y) CKSGN(X,Y) +#define CKSGN_IPTR_L(X,Y) CKSGN_L(X,Y) +#else +#define CKRES(X) 0 +#define CKIPTR(X,Y) 0 +#define CKSGN_IPTR_F(X,Y) 0 +#define CKSGN_IPTR(X,Y) 0 +#define CKSGN_IPTR_L(X,Y) 0 +#endif + +/* Test that modf(ARG1,&iptr) == FRACRES && iptr == INTRES. Check the + sign in case we get -0.0. */ +#define TESTIT_MODF(ARG,INTRES,FRACRES) do { \ + float iptrf = 0.5; double iptr = 0.5; long double iptrl = 0.5; \ + if (__builtin_modff(ARG##f,&iptrf) != FRACRES##f \ + || CKIPTR(iptrf,INTRES##f) \ + || CKSGN_F(__builtin_modff(ARG##f,&iptrf),FRACRES##f) \ + || CKSGN_IPTR_F(iptrf,INTRES##f)) \ + link_error(__LINE__); \ + if (__builtin_modf(ARG,&iptr) != FRACRES \ + || CKIPTR(iptr,INTRES) \ + || CKSGN(__builtin_modf(ARG,&iptr),FRACRES) \ + || CKSGN_IPTR(iptr,INTRES)) \ + link_error(__LINE__); \ + if (__builtin_modfl(ARG##l,&iptrl) != FRACRES##l \ + || CKIPTR(iptrl,INTRES##l) \ + || CKSGN_L(__builtin_modfl(ARG##l,&iptrl),FRACRES##l) \ + || CKSGN_IPTR_L(iptrl,INTRES##l)) \ + link_error(__LINE__); \ + } while (0) + +/* Test that modf(NEG FUNCARG(ARGARG, &iptr)) == FRACRES && + FUNCRES(iptr) is true. Check the sign of both as well. This is + for checking an argument of Inf. */ +#define TESTIT_MODF2(NEG,FUNCARG,ARGARG,FUNCRES,FRACRES) do { \ + float iptrf = 0.5; double iptr = 0.5; long double iptrl = 0.5; \ + if (__builtin_modff(NEG __builtin_##FUNCARG##f(ARGARG),&iptrf) != FRACRES##f \ + || CKSGN_F(__builtin_modff(NEG __builtin_##FUNCARG##f(ARGARG),&iptrf), FRACRES##f) \ + || CKIPTR(!__builtin_##FUNCRES##f(iptrf),0) \ + || CKSGN_IPTR_F(iptrf,FRACRES##f)) \ + link_error(__LINE__); \ + if (__builtin_modf(NEG __builtin_##FUNCARG(ARGARG),&iptr) != FRACRES \ + || CKSGN(__builtin_modf(NEG __builtin_##FUNCARG(ARGARG),&iptr), FRACRES) \ + || CKIPTR(!__builtin_##FUNCRES(iptr),0) \ + || CKSGN_IPTR(iptr,FRACRES)) \ + link_error(__LINE__); \ + if (__builtin_modfl(NEG __builtin_##FUNCARG##l(ARGARG),&iptrl) != FRACRES##l \ + || CKSGN_L(__builtin_modfl(NEG __builtin_##FUNCARG##l(ARGARG),&iptrl), FRACRES##l) \ + || CKIPTR(!__builtin_##FUNCRES##l(iptrl),0) \ + || CKSGN_IPTR_L(iptrl,FRACRES##l)) \ + link_error(__LINE__); \ + } while (0) + +/* Test that FUNCRES(modf(NEG FUNCARG(ARGARG, &iptr))) is true && + FUNCRES(iptr) is true. Check the sign of both as well. This is + for checking an argument of NaN. */ +#define TESTIT_MODF3(NEG,FUNCARG,ARGARG,FUNCRES) do { \ + float iptrf = 0.5; double iptr = 0.5; long double iptrl = 0.5; \ + if (CKRES(!__builtin_##FUNCRES##f(__builtin_modff(NEG __builtin_##FUNCARG##f(ARGARG),&iptrf))) \ + || CKSGN_F(__builtin_modff(NEG __builtin_##FUNCARG##f(ARGARG),&iptrf), NEG 1) \ + || CKIPTR(!__builtin_##FUNCRES##f(iptrf),0) \ + || CKSGN_IPTR_F(iptrf,NEG 1)) \ + link_error(__LINE__); \ + if (CKRES(!__builtin_##FUNCRES(__builtin_modf(NEG __builtin_##FUNCARG(ARGARG),&iptr))) \ + || CKSGN(__builtin_modf(NEG __builtin_##FUNCARG(ARGARG),&iptr), NEG 1) \ + || CKIPTR(!__builtin_##FUNCRES(iptr),0) \ + || CKSGN_IPTR(iptr,NEG 1)) \ + link_error(__LINE__); \ + if (CKRES(!__builtin_##FUNCRES##l(__builtin_modfl(NEG __builtin_##FUNCARG##l(ARGARG),&iptrl))) \ + || CKSGN_L(__builtin_modfl(NEG __builtin_##FUNCARG##l(ARGARG),&iptrl), NEG 1) \ + || CKIPTR(!__builtin_##FUNCRES##l(iptrl),0) \ + || CKSGN_IPTR_L(iptrl,NEG 1)) \ + link_error(__LINE__); \ + } while (0) + +void __attribute__ ((__noinline__)) +foo(void) +{ + /* Test that modf(ARG1,&iptr) -> ARG3 && iptr == ARG2. */ + TESTIT_MODF (0x1p10F+0.5, 0x1p10, 0.5); + TESTIT_MODF (0x1p10F+0x1p-10, 0x1p10, 0x1p-10); + TESTIT_MODF (12345678L/17.0, 726216.0, -726216L+12345678L/17.0); + TESTIT_MODF (555.555, 555.0, -555+555.555); + TESTIT_MODF (5000/11.0, 454.0, -454+5000/11.0); + TESTIT_MODF (1000/7.0, 142.0, -142+1000/7.0); + TESTIT_MODF (123/7.0, 17.0, -17+123/7.0); + TESTIT_MODF (117/7.0, 16.0, -16+117/7.0); + TESTIT_MODF (5.5, 5.0, 0.5); + TESTIT_MODF (1.5, 1.0, 0.5); + TESTIT_MODF (4/3.0, 1.0, -1+4/3.0); + TESTIT_MODF (1.0, 1.0, 0.0); + TESTIT_MODF (0.5, 0.0, 0.5); + TESTIT_MODF (4/9.0, 0.0, 4/9.0); + TESTIT_MODF (1/3.0, 0.0, 1/3.0); + TESTIT_MODF (1/9.0, 0.0, 1/9.0); + TESTIT_MODF (0.0, 0.0, 0.0); + + TESTIT_MODF (-0.0, -0.0, -0.0); + TESTIT_MODF (-1/9.0, -0.0, -1/9.0); + TESTIT_MODF (-1/3.0, -0.0, -1/3.0); + TESTIT_MODF (-4/9.0, -0.0, -4/9.0); + TESTIT_MODF (-0.5, -0.0, -0.5); + TESTIT_MODF (-1.0, -1.0, -0.0); + TESTIT_MODF (-4/3.0, -1.0, 1-4/3.0); + TESTIT_MODF (-1.5, -1.0, -0.5); + TESTIT_MODF (-5.5, -5.0, -0.5); + TESTIT_MODF (-117/7.0, -16.0, 16-117/7.0); + TESTIT_MODF (-123/7.0, -17.0, 17-123/7.0); + TESTIT_MODF (-1000/7.0, -142.0, 142-1000/7.0); + TESTIT_MODF (-5000/11.0, -454.0, 454-5000/11.0); + TESTIT_MODF (-555.555, -555.0, 555-555.555); + TESTIT_MODF (-12345678L/17.0, -726216.0, 726216L-12345678L/17.0); + TESTIT_MODF (-0x1p10F-0x1p-10, -0x1p10, -0x1p-10); + TESTIT_MODF (-0x1p10F-0.5, -0x1p10, -0.5); + + + /* Test for modf(+-Inf,&i) -> (i=+-0.0, +-Inf). */ + TESTIT_MODF2 ( ,inf, , isinf, 0.0); + TESTIT_MODF2 (- ,inf, , isinf, -0.0); + + /* Test for and modf(+-NaN,&i) -> (i=+-NaN, +-NaN). */ + TESTIT_MODF3 ( ,nan, "", isnan); + TESTIT_MODF3 (- ,nan, "", isnan); +} + +int main() +{ + foo(); + + return 0; +} |