aboutsummaryrefslogtreecommitdiff
path: root/gcc/gimple-predicate-analysis.cc
diff options
context:
space:
mode:
authorMartin Sebor <msebor@redhat.com>2021-09-17 15:39:13 -0600
committerMartin Sebor <msebor@redhat.com>2021-09-17 15:39:13 -0600
commit94c12ffac234b29a702aa7b6730f2678265857c8 (patch)
tree39a583cbfb2147f987db443568b89e135afa029e /gcc/gimple-predicate-analysis.cc
parent51166eb2c534692c3c7779def24f83c8c3811b98 (diff)
downloadgcc-94c12ffac234b29a702aa7b6730f2678265857c8.zip
gcc-94c12ffac234b29a702aa7b6730f2678265857c8.tar.gz
gcc-94c12ffac234b29a702aa7b6730f2678265857c8.tar.bz2
Factor predidacte analysis out of tree-ssa-uninit.c into its own module.
gcc/ChangeLog: * Makefile.in (OBJS): Add gimple-predicate-analysis.o. * tree-ssa-uninit.c (max_phi_args): Move to gimple-predicate-analysis. (MASK_SET_BIT, MASK_TEST_BIT, MASK_EMPTY): Same. (check_defs): Add comment. (can_skip_redundant_opnd): Update comment. (compute_uninit_opnds_pos): Adjust to namespace change. (find_pdom): Move to gimple-predicate-analysis.cc. (find_dom): Same. (struct uninit_undef_val_t): New. (is_non_loop_exit_postdominating): Move to gimple-predicate-analysis.cc. (find_control_equiv_block): Same. (MAX_NUM_CHAINS, MAX_CHAIN_LEN, MAX_POSTDOM_CHECK): Same. (MAX_SWITCH_CASES): Same. (compute_control_dep_chain): Same. (find_uninit_use): Use predicate analyzer. (struct pred_info): Move to gimple-predicate-analysis. (convert_control_dep_chain_into_preds): Same. (find_predicates): Same. (collect_phi_def_edges): Same. (warn_uninitialized_phi): Use predicate analyzer. (find_def_preds): Move to gimple-predicate-analysis. (dump_pred_info): Same. (dump_pred_chain): Same. (dump_predicates): Same. (destroy_predicate_vecs): Remove. (execute_late_warn_uninitialized): New. (get_cmp_code): Move to gimple-predicate-analysis. (is_value_included_in): Same. (value_sat_pred_p): Same. (find_matching_predicate_in_rest_chains): Same. (is_use_properly_guarded): Same. (prune_uninit_phi_opnds): Same. (find_var_cmp_const): Same. (use_pred_not_overlap_with_undef_path_pred): Same. (pred_equal_p): Same. (is_neq_relop_p): Same. (is_neq_zero_form_p): Same. (pred_expr_equal_p): Same. (is_pred_expr_subset_of): Same. (is_pred_chain_subset_of): Same. (is_included_in): Same. (is_superset_of): Same. (pred_neg_p): Same. (simplify_pred): Same. (simplify_preds_2): Same. (simplify_preds_3): Same. (simplify_preds_4): Same. (simplify_preds): Same. (push_pred): Same. (push_to_worklist): Same. (get_pred_info_from_cmp): Same. (is_degenerated_phi): Same. (normalize_one_pred_1): Same. (normalize_one_pred): Same. (normalize_one_pred_chain): Same. (normalize_preds): Same. (can_one_predicate_be_invalidated_p): Same. (can_chain_union_be_invalidated_p): Same. (uninit_uses_cannot_happen): Same. (pass_late_warn_uninitialized::execute): Define. * gimple-predicate-analysis.cc: New file. * gimple-predicate-analysis.h: New file.
Diffstat (limited to 'gcc/gimple-predicate-analysis.cc')
-rw-r--r--gcc/gimple-predicate-analysis.cc2400
1 files changed, 2400 insertions, 0 deletions
diff --git a/gcc/gimple-predicate-analysis.cc b/gcc/gimple-predicate-analysis.cc
new file mode 100644
index 0000000..3404f2d
--- /dev/null
+++ b/gcc/gimple-predicate-analysis.cc
@@ -0,0 +1,2400 @@
+/* Support for simple predicate analysis.
+
+ Copyright (C) 2001-2021 Free Software Foundation, Inc.
+ Contributed by Xinliang David Li <davidxl@google.com>
+ Generalized by Martin Sebor <msebor@redhat.com>
+
+ This file is part of GCC.
+
+ GCC is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3, or (at your option)
+ any later version.
+
+ GCC is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with GCC; see the file COPYING3. If not see
+ <http://www.gnu.org/licenses/>. */
+
+#define INCLUDE_STRING
+#include "config.h"
+#include "system.h"
+#include "coretypes.h"
+#include "backend.h"
+#include "tree.h"
+#include "gimple.h"
+#include "tree-pass.h"
+#include "ssa.h"
+#include "gimple-pretty-print.h"
+#include "diagnostic-core.h"
+#include "fold-const.h"
+#include "gimple-iterator.h"
+#include "tree-ssa.h"
+#include "tree-cfg.h"
+#include "cfghooks.h"
+#include "attribs.h"
+#include "builtins.h"
+#include "calls.h"
+#include "value-query.h"
+
+#include "gimple-predicate-analysis.h"
+
+#define DEBUG_PREDICATE_ANALYZER 1
+
+/* Find the immediate postdominator of the specified basic block BB. */
+
+static inline basic_block
+find_pdom (basic_block bb)
+{
+ basic_block exit_bb = EXIT_BLOCK_PTR_FOR_FN (cfun);
+ if (bb == exit_bb)
+ return exit_bb;
+
+ if (basic_block pdom = get_immediate_dominator (CDI_POST_DOMINATORS, bb))
+ return pdom;
+
+ return exit_bb;
+}
+
+/* Find the immediate dominator of the specified basic block BB. */
+
+static inline basic_block
+find_dom (basic_block bb)
+{
+ basic_block entry_bb = ENTRY_BLOCK_PTR_FOR_FN (cfun);
+ if (bb == entry_bb)
+ return entry_bb;
+
+ if (basic_block dom = get_immediate_dominator (CDI_DOMINATORS, bb))
+ return dom;
+
+ return entry_bb;
+}
+
+/* Return true if BB1 is postdominating BB2 and BB1 is not a loop exit
+ bb. The loop exit bb check is simple and does not cover all cases. */
+
+static bool
+is_non_loop_exit_postdominating (basic_block bb1, basic_block bb2)
+{
+ if (!dominated_by_p (CDI_POST_DOMINATORS, bb2, bb1))
+ return false;
+
+ if (single_pred_p (bb1) && !single_succ_p (bb2))
+ return false;
+
+ return true;
+}
+
+/* Find BB's closest postdominator that is its control equivalent (i.e.,
+ that's controlled by the same predicate). */
+
+static inline basic_block
+find_control_equiv_block (basic_block bb)
+{
+ basic_block pdom = find_pdom (bb);
+
+ /* Skip the postdominating bb that is also a loop exit. */
+ if (!is_non_loop_exit_postdominating (pdom, bb))
+ return NULL;
+
+ /* If the postdominator is dominated by BB, return it. */
+ if (dominated_by_p (CDI_DOMINATORS, pdom, bb))
+ return pdom;
+
+ return NULL;
+}
+
+/* Return true if X1 is the negation of X2. */
+
+static inline bool
+pred_neg_p (const pred_info &x1, const pred_info &x2)
+{
+ if (!operand_equal_p (x1.pred_lhs, x2.pred_lhs, 0)
+ || !operand_equal_p (x1.pred_rhs, x2.pred_rhs, 0))
+ return false;
+
+ tree_code c1 = x1.cond_code, c2;
+ if (x1.invert == x2.invert)
+ c2 = invert_tree_comparison (x2.cond_code, false);
+ else
+ c2 = x2.cond_code;
+
+ return c1 == c2;
+}
+
+/* Return whether the condition (VAL CMPC BOUNDARY) is true. */
+
+static bool
+is_value_included_in (tree val, tree boundary, tree_code cmpc)
+{
+ /* Only handle integer constant here. */
+ if (TREE_CODE (val) != INTEGER_CST || TREE_CODE (boundary) != INTEGER_CST)
+ return true;
+
+ bool inverted = false;
+ if (cmpc == GE_EXPR || cmpc == GT_EXPR || cmpc == NE_EXPR)
+ {
+ cmpc = invert_tree_comparison (cmpc, false);
+ inverted = true;
+ }
+
+ bool result;
+ if (cmpc == EQ_EXPR)
+ result = tree_int_cst_equal (val, boundary);
+ else if (cmpc == LT_EXPR)
+ result = tree_int_cst_lt (val, boundary);
+ else
+ {
+ gcc_assert (cmpc == LE_EXPR);
+ result = tree_int_cst_le (val, boundary);
+ }
+
+ if (inverted)
+ result ^= 1;
+
+ return result;
+}
+
+/* Format the vector of edges EV as a string. */
+
+static std::string
+format_edge_vec (const vec<edge> &ev)
+{
+ std::string str;
+
+ unsigned n = ev.length ();
+ for (unsigned i = 0; i < n; ++i)
+ {
+ char es[32];
+ const_edge e = ev[i];
+ sprintf (es, "%u", e->src->index);
+ str += es;
+ if (i + 1 < n)
+ str += " -> ";
+ }
+ return str;
+}
+
+/* Format the first N elements of the array of vector of edges EVA as
+ a string. */
+
+static std::string
+format_edge_vecs (const vec<edge> eva[], unsigned n)
+{
+ std::string str;
+
+ for (unsigned i = 0; i != n; ++i)
+ {
+ str += '{';
+ str += format_edge_vec (eva[i]);
+ str += '}';
+ if (i + 1 < n)
+ str += ", ";
+ }
+ return str;
+}
+
+/* Dump a single pred_info to DUMP_FILE. */
+
+static void
+dump_pred_info (const pred_info &pred)
+{
+ if (pred.invert)
+ fprintf (dump_file, "NOT (");
+ print_generic_expr (dump_file, pred.pred_lhs);
+ fprintf (dump_file, " %s ", op_symbol_code (pred.cond_code));
+ print_generic_expr (dump_file, pred.pred_rhs);
+ if (pred.invert)
+ fputc (')', dump_file);
+}
+
+/* Dump a pred_chain to DUMP_FILE. */
+
+static void
+dump_pred_chain (const pred_chain &chain)
+{
+ unsigned np = chain.length ();
+ if (np > 1)
+ fprintf (dump_file, "AND (");
+
+ for (unsigned j = 0; j < np; j++)
+ {
+ dump_pred_info (chain[j]);
+ if (j < np - 1)
+ fprintf (dump_file, ", ");
+ else if (j > 0)
+ fputc (')', dump_file);
+ }
+}
+
+/* Dump the predicate chain PREDS for STMT, prefixed by MSG. */
+
+static void
+dump_predicates (gimple *stmt, const pred_chain_union &preds, const char *msg)
+{
+ fprintf (dump_file, "%s", msg);
+ if (stmt)
+ {
+ print_gimple_stmt (dump_file, stmt, 0);
+ fprintf (dump_file, "is guarded by:\n");
+ }
+
+ unsigned np = preds.length ();
+ if (np > 1)
+ fprintf (dump_file, "OR (");
+ for (unsigned i = 0; i < np; i++)
+ {
+ dump_pred_chain (preds[i]);
+ if (i < np - 1)
+ fprintf (dump_file, ", ");
+ else if (i > 0)
+ fputc (')', dump_file);
+ }
+ fputc ('\n', dump_file);
+}
+
+/* Dump the first NCHAINS elements of the DEP_CHAINS array into DUMP_FILE. */
+
+static void
+dump_dep_chains (const auto_vec<edge> dep_chains[], unsigned nchains)
+{
+ if (!dump_file)
+ return;
+
+ for (unsigned i = 0; i != nchains; ++i)
+ {
+ const auto_vec<edge> &v = dep_chains[i];
+ unsigned n = v.length ();
+ for (unsigned j = 0; j != n; ++j)
+ {
+ fprintf (dump_file, "%u", v[j]->src->index);
+ if (j + 1 < n)
+ fprintf (dump_file, " -> ");
+ }
+ fputc ('\n', dump_file);
+ }
+}
+
+/* Return the 'normalized' conditional code with operand swapping
+ and condition inversion controlled by SWAP_COND and INVERT. */
+
+static tree_code
+get_cmp_code (tree_code orig_cmp_code, bool swap_cond, bool invert)
+{
+ tree_code tc = orig_cmp_code;
+
+ if (swap_cond)
+ tc = swap_tree_comparison (orig_cmp_code);
+ if (invert)
+ tc = invert_tree_comparison (tc, false);
+
+ switch (tc)
+ {
+ case LT_EXPR:
+ case LE_EXPR:
+ case GT_EXPR:
+ case GE_EXPR:
+ case EQ_EXPR:
+ case NE_EXPR:
+ break;
+ default:
+ return ERROR_MARK;
+ }
+ return tc;
+}
+
+/* Return true if PRED is common among all predicate chains in PREDS
+ (and therefore can be factored out). */
+
+static bool
+find_matching_predicate_in_rest_chains (const pred_info &pred,
+ const pred_chain_union &preds)
+{
+ /* Trival case. */
+ if (preds.length () == 1)
+ return true;
+
+ for (unsigned i = 1; i < preds.length (); i++)
+ {
+ bool found = false;
+ const pred_chain &chain = preds[i];
+ unsigned n = chain.length ();
+ for (unsigned j = 0; j < n; j++)
+ {
+ const pred_info &pred2 = chain[j];
+ /* Can relax the condition comparison to not use address
+ comparison. However, the most common case is that
+ multiple control dependent paths share a common path
+ prefix, so address comparison should be ok. */
+ if (operand_equal_p (pred2.pred_lhs, pred.pred_lhs, 0)
+ && operand_equal_p (pred2.pred_rhs, pred.pred_rhs, 0)
+ && pred2.invert == pred.invert)
+ {
+ found = true;
+ break;
+ }
+ }
+ if (!found)
+ return false;
+ }
+ return true;
+}
+
+/* Find a predicate to examine against paths of interest. If there
+ is no predicate of the "FLAG_VAR CMP CONST" form, try to find one
+ of that's the form "FLAG_VAR CMP FLAG_VAR" with value range info.
+ PHI is the phi node whose incoming (interesting) paths need to be
+ examined. On success, return the comparison code, set defintion
+ gimple of FLAG_DEF and BOUNDARY_CST. Otherwise return ERROR_MARK. */
+
+static tree_code
+find_var_cmp_const (pred_chain_union preds, gphi *phi, gimple **flag_def,
+ tree *boundary_cst)
+{
+ tree_code vrinfo_code = ERROR_MARK;
+ gimple *vrinfo_def = NULL;
+ tree vrinfo_cst = NULL;
+
+ gcc_assert (preds.length () > 0);
+ pred_chain chain = preds[0];
+ for (unsigned i = 0; i < chain.length (); i++)
+ {
+ bool use_vrinfo_p = false;
+ const pred_info &pred = chain[i];
+ tree cond_lhs = pred.pred_lhs;
+ tree cond_rhs = pred.pred_rhs;
+ if (cond_lhs == NULL_TREE || cond_rhs == NULL_TREE)
+ continue;
+
+ tree_code code = get_cmp_code (pred.cond_code, false, pred.invert);
+ if (code == ERROR_MARK)
+ continue;
+
+ /* Convert to the canonical form SSA_NAME CMP CONSTANT. */
+ if (TREE_CODE (cond_lhs) == SSA_NAME
+ && is_gimple_constant (cond_rhs))
+ ;
+ else if (TREE_CODE (cond_rhs) == SSA_NAME
+ && is_gimple_constant (cond_lhs))
+ {
+ std::swap (cond_lhs, cond_rhs);
+ if ((code = get_cmp_code (code, true, false)) == ERROR_MARK)
+ continue;
+ }
+ /* Check if we can take advantage of FLAG_VAR COMP FLAG_VAR predicate
+ with value range info. Note only first of such case is handled. */
+ else if (vrinfo_code == ERROR_MARK
+ && TREE_CODE (cond_lhs) == SSA_NAME
+ && TREE_CODE (cond_rhs) == SSA_NAME)
+ {
+ gimple* lhs_def = SSA_NAME_DEF_STMT (cond_lhs);
+ if (!lhs_def || gimple_code (lhs_def) != GIMPLE_PHI
+ || gimple_bb (lhs_def) != gimple_bb (phi))
+ {
+ std::swap (cond_lhs, cond_rhs);
+ if ((code = get_cmp_code (code, true, false)) == ERROR_MARK)
+ continue;
+ }
+
+ /* Check value range info of rhs, do following transforms:
+ flag_var < [min, max] -> flag_var < max
+ flag_var > [min, max] -> flag_var > min
+
+ We can also transform LE_EXPR/GE_EXPR to LT_EXPR/GT_EXPR:
+ flag_var <= [min, max] -> flag_var < [min, max+1]
+ flag_var >= [min, max] -> flag_var > [min-1, max]
+ if no overflow/wrap. */
+ tree type = TREE_TYPE (cond_lhs);
+ value_range r;
+ if (!INTEGRAL_TYPE_P (type)
+ || !get_range_query (cfun)->range_of_expr (r, cond_rhs)
+ || r.kind () != VR_RANGE)
+ continue;
+
+ wide_int min = r.lower_bound ();
+ wide_int max = r.upper_bound ();
+ if (code == LE_EXPR
+ && max != wi::max_value (TYPE_PRECISION (type), TYPE_SIGN (type)))
+ {
+ code = LT_EXPR;
+ max = max + 1;
+ }
+ if (code == GE_EXPR
+ && min != wi::min_value (TYPE_PRECISION (type), TYPE_SIGN (type)))
+ {
+ code = GT_EXPR;
+ min = min - 1;
+ }
+ if (code == LT_EXPR)
+ cond_rhs = wide_int_to_tree (type, max);
+ else if (code == GT_EXPR)
+ cond_rhs = wide_int_to_tree (type, min);
+ else
+ continue;
+
+ use_vrinfo_p = true;
+ }
+ else
+ continue;
+
+ if ((*flag_def = SSA_NAME_DEF_STMT (cond_lhs)) == NULL)
+ continue;
+
+ if (gimple_code (*flag_def) != GIMPLE_PHI
+ || gimple_bb (*flag_def) != gimple_bb (phi)
+ || !find_matching_predicate_in_rest_chains (pred, preds))
+ continue;
+
+ /* Return if any "flag_var comp const" predicate is found. */
+ if (!use_vrinfo_p)
+ {
+ *boundary_cst = cond_rhs;
+ return code;
+ }
+ /* Record if any "flag_var comp flag_var[vinfo]" predicate is found. */
+ else if (vrinfo_code == ERROR_MARK)
+ {
+ vrinfo_code = code;
+ vrinfo_def = *flag_def;
+ vrinfo_cst = cond_rhs;
+ }
+ }
+ /* Return the "flag_var cmp flag_var[vinfo]" predicate we found. */
+ if (vrinfo_code != ERROR_MARK)
+ {
+ *flag_def = vrinfo_def;
+ *boundary_cst = vrinfo_cst;
+ }
+ return vrinfo_code;
+}
+
+/* Return true if all interesting opnds are pruned, false otherwise.
+ PHI is the phi node with interesting operands, OPNDS is the bitmap
+ of the interesting operand positions, FLAG_DEF is the statement
+ defining the flag guarding the use of the PHI output, BOUNDARY_CST
+ is the const value used in the predicate associated with the flag,
+ CMP_CODE is the comparison code used in the predicate, VISITED_PHIS
+ is the pointer set of phis visited, and VISITED_FLAG_PHIS is
+ the pointer to the pointer set of flag definitions that are also
+ phis.
+
+ Example scenario:
+
+ BB1:
+ flag_1 = phi <0, 1> // (1)
+ var_1 = phi <undef, some_val>
+
+
+ BB2:
+ flag_2 = phi <0, flag_1, flag_1> // (2)
+ var_2 = phi <undef, var_1, var_1>
+ if (flag_2 == 1)
+ goto BB3;
+
+ BB3:
+ use of var_2 // (3)
+
+ Because some flag arg in (1) is not constant, if we do not look into
+ the flag phis recursively, it is conservatively treated as unknown and
+ var_1 is thought to flow into use at (3). Since var_1 is potentially
+ uninitialized a false warning will be emitted.
+ Checking recursively into (1), the compiler can find out that only
+ some_val (which is defined) can flow into (3) which is OK. */
+
+static bool
+prune_phi_opnds (gphi *phi, unsigned opnds, gphi *flag_def,
+ tree boundary_cst, tree_code cmp_code,
+ predicate::func_t &eval,
+ hash_set<gphi *> *visited_phis,
+ bitmap *visited_flag_phis)
+{
+ /* The Boolean predicate guarding the PHI definition. Initialized
+ lazily from PHI in the first call to is_use_guarded() and cached
+ for subsequent iterations. */
+ predicate def_preds (eval);
+
+ unsigned n = MIN (eval.max_phi_args, gimple_phi_num_args (flag_def));
+ for (unsigned i = 0; i < n; i++)
+ {
+ if (!MASK_TEST_BIT (opnds, i))
+ continue;
+
+ tree flag_arg = gimple_phi_arg_def (flag_def, i);
+ if (!is_gimple_constant (flag_arg))
+ {
+ if (TREE_CODE (flag_arg) != SSA_NAME)
+ return false;
+
+ gphi *flag_arg_def = dyn_cast<gphi *> (SSA_NAME_DEF_STMT (flag_arg));
+ if (!flag_arg_def)
+ return false;
+
+ tree phi_arg = gimple_phi_arg_def (phi, i);
+ if (TREE_CODE (phi_arg) != SSA_NAME)
+ return false;
+
+ gphi *phi_arg_def = dyn_cast<gphi *> (SSA_NAME_DEF_STMT (phi_arg));
+ if (!phi_arg_def)
+ return false;
+
+ if (gimple_bb (phi_arg_def) != gimple_bb (flag_arg_def))
+ return false;
+
+ if (!*visited_flag_phis)
+ *visited_flag_phis = BITMAP_ALLOC (NULL);
+
+ tree phi_result = gimple_phi_result (flag_arg_def);
+ if (bitmap_bit_p (*visited_flag_phis, SSA_NAME_VERSION (phi_result)))
+ return false;
+
+ bitmap_set_bit (*visited_flag_phis, SSA_NAME_VERSION (phi_result));
+
+ /* Now recursively try to prune the interesting phi args. */
+ unsigned opnds_arg_phi = eval.phi_arg_set (phi_arg_def);
+ if (!prune_phi_opnds (phi_arg_def, opnds_arg_phi, flag_arg_def,
+ boundary_cst, cmp_code, eval, visited_phis,
+ visited_flag_phis))
+ return false;
+
+ bitmap_clear_bit (*visited_flag_phis, SSA_NAME_VERSION (phi_result));
+ continue;
+ }
+
+ /* Now check if the constant is in the guarded range. */
+ if (is_value_included_in (flag_arg, boundary_cst, cmp_code))
+ {
+ /* Now that we know that this undefined edge is not pruned.
+ If the operand is defined by another phi, we can further
+ prune the incoming edges of that phi by checking
+ the predicates of this operands. */
+
+ tree opnd = gimple_phi_arg_def (phi, i);
+ gimple *opnd_def = SSA_NAME_DEF_STMT (opnd);
+ if (gphi *opnd_def_phi = dyn_cast <gphi *> (opnd_def))
+ {
+ unsigned opnds2 = eval.phi_arg_set (opnd_def_phi);
+ if (!MASK_EMPTY (opnds2))
+ {
+ edge opnd_edge = gimple_phi_arg_edge (phi, i);
+ if (def_preds.is_use_guarded (phi, opnd_edge->src,
+ opnd_def_phi, opnds2,
+ visited_phis))
+ return false;
+ }
+ }
+ else
+ return false;
+ }
+ }
+
+ return true;
+}
+
+/* Recursively compute the set PHI's incoming edges with "uninteresting"
+ operands of a phi chain, i.e., those for which EVAL returns false.
+ CD_ROOT is the control dependence root from which edges are collected
+ up the CFG nodes that it's dominated by. *EDGES holds the result, and
+ VISITED is used for detecting cycles. */
+
+static void
+collect_phi_def_edges (gphi *phi, basic_block cd_root, auto_vec<edge> *edges,
+ predicate::func_t &eval, hash_set<gimple *> *visited)
+{
+ if (visited->elements () == 0
+ && DEBUG_PREDICATE_ANALYZER
+ && dump_file)
+ {
+ fprintf (dump_file, "%s for cd_root %u and ",
+ __func__, cd_root->index);
+ print_gimple_stmt (dump_file, phi, 0);
+
+ }
+
+ if (visited->add (phi))
+ return;
+
+ unsigned n = gimple_phi_num_args (phi);
+ for (unsigned i = 0; i < n; i++)
+ {
+ edge opnd_edge = gimple_phi_arg_edge (phi, i);
+ tree opnd = gimple_phi_arg_def (phi, i);
+
+ if (TREE_CODE (opnd) == SSA_NAME)
+ {
+ gimple *def = SSA_NAME_DEF_STMT (opnd);
+
+ if (gimple_code (def) == GIMPLE_PHI
+ && dominated_by_p (CDI_DOMINATORS, gimple_bb (def), cd_root))
+ collect_phi_def_edges (as_a<gphi *> (def), cd_root, edges, eval,
+ visited);
+ else if (!eval (opnd))
+ {
+ if (dump_file && (dump_flags & TDF_DETAILS))
+ {
+ fprintf (dump_file,
+ "\tFound def edge %i -> %i for cd_root %i "
+ "and operand %u of: ",
+ opnd_edge->src->index, opnd_edge->dest->index,
+ cd_root->index, i);
+ print_gimple_stmt (dump_file, phi, 0);
+ }
+ edges->safe_push (opnd_edge);
+ }
+ }
+ else
+ {
+ if (dump_file && (dump_flags & TDF_DETAILS))
+ {
+ fprintf (dump_file,
+ "\tFound def edge %i -> %i for cd_root %i "
+ "and operand %u of: ",
+ opnd_edge->src->index, opnd_edge->dest->index,
+ cd_root->index, i);
+ print_gimple_stmt (dump_file, phi, 0);
+ }
+
+ if (!eval (opnd))
+ edges->safe_push (opnd_edge);
+ }
+ }
+}
+
+/* Return an expression corresponding to the predicate PRED. */
+
+static tree
+build_pred_expr (const pred_info &pred)
+{
+ tree_code cond_code = pred.cond_code;
+ tree lhs = pred.pred_lhs;
+ tree rhs = pred.pred_rhs;
+
+ if (pred.invert)
+ cond_code = invert_tree_comparison (cond_code, false);
+
+ return build2 (cond_code, TREE_TYPE (lhs), lhs, rhs);
+}
+
+/* Return an expression corresponding to PREDS. */
+
+static tree
+build_pred_expr (const pred_chain_union &preds, bool invert = false)
+{
+ tree_code code = invert ? TRUTH_AND_EXPR : TRUTH_OR_EXPR;
+ tree_code subcode = invert ? TRUTH_OR_EXPR : TRUTH_AND_EXPR;
+
+ tree expr = NULL_TREE;
+ for (unsigned i = 0; i != preds.length (); ++i)
+ {
+ tree subexpr = NULL_TREE;
+ for (unsigned j = 0; j != preds[i].length (); ++j)
+ {
+ const pred_info &pi = preds[i][j];
+ tree cond = build_pred_expr (pi);
+ if (invert)
+ cond = invert_truthvalue (cond);
+ subexpr = subexpr ? build2 (subcode, boolean_type_node,
+ subexpr, cond) : cond;
+ }
+ if (expr)
+ expr = build2 (code, boolean_type_node, expr, subexpr);
+ else
+ expr = subexpr;
+ }
+
+ return expr;
+}
+
+/* Return a bitset of all PHI arguments or zero if there are too many. */
+
+unsigned
+predicate::func_t::phi_arg_set (gphi *phi)
+{
+ unsigned n = gimple_phi_num_args (phi);
+
+ if (max_phi_args < n)
+ return 0;
+
+ /* Set the least significant N bits. */
+ return (1U << n) - 1;
+}
+
+/* Determine if the predicate set of the use does not overlap with that
+ of the interesting paths. The most common senario of guarded use is
+ in Example 1:
+ Example 1:
+ if (some_cond)
+ {
+ x = ...; // set x to valid
+ flag = true;
+ }
+
+ ... some code ...
+
+ if (flag)
+ use (x); // use when x is valid
+
+ The real world examples are usually more complicated, but similar
+ and usually result from inlining:
+
+ bool init_func (int * x)
+ {
+ if (some_cond)
+ return false;
+ *x = ...; // set *x to valid
+ return true;
+ }
+
+ void foo (..)
+ {
+ int x;
+
+ if (!init_func (&x))
+ return;
+
+ .. some_code ...
+ use (x); // use when x is valid
+ }
+
+ Another possible use scenario is in the following trivial example:
+
+ Example 2:
+ if (n > 0)
+ x = 1;
+ ...
+ if (n > 0)
+ {
+ if (m < 2)
+ ... = x;
+ }
+
+ Predicate analysis needs to compute the composite predicate:
+
+ 1) 'x' use predicate: (n > 0) .AND. (m < 2)
+ 2) 'x' default value (non-def) predicate: .NOT. (n > 0)
+ (the predicate chain for phi operand defs can be computed
+ starting from a bb that is control equivalent to the phi's
+ bb and is dominating the operand def.)
+
+ and check overlapping:
+ (n > 0) .AND. (m < 2) .AND. (.NOT. (n > 0))
+ <==> false
+
+ This implementation provides a framework that can handle different
+ scenarios. (Note that many simple cases are handled properly without
+ the predicate analysis if jump threading eliminates the merge point
+ thus makes path-sensitive analysis unnecessary.)
+
+ PHI is the phi node whose incoming (undefined) paths need to be
+ pruned, and OPNDS is the bitmap holding interesting operand
+ positions. VISITED is the pointer set of phi stmts being
+ checked. */
+
+bool
+predicate::overlap (gphi *phi, unsigned opnds, hash_set<gphi *> *visited)
+{
+ gimple *flag_def = NULL;
+ tree boundary_cst = NULL_TREE;
+ bitmap visited_flag_phis = NULL;
+
+ /* Find within the common prefix of multiple predicate chains
+ a predicate that is a comparison of a flag variable against
+ a constant. */
+ tree_code cmp_code = find_var_cmp_const (m_preds, phi, &flag_def,
+ &boundary_cst);
+ if (cmp_code == ERROR_MARK)
+ return true;
+
+ /* Now check all the uninit incoming edges have a constant flag
+ value that is in conflict with the use guard/predicate. */
+ gphi *phi_def = as_a<gphi *> (flag_def);
+ bool all_pruned = prune_phi_opnds (phi, opnds, phi_def, boundary_cst,
+ cmp_code, m_eval, visited,
+ &visited_flag_phis);
+
+ if (visited_flag_phis)
+ BITMAP_FREE (visited_flag_phis);
+
+ return !all_pruned;
+}
+
+/* Return true if two predicates PRED1 and X2 are equivalent. Assume
+ the expressions have already properly re-associated. */
+
+static inline bool
+pred_equal_p (const pred_info &pred1, const pred_info &pred2)
+{
+ if (!operand_equal_p (pred1.pred_lhs, pred2.pred_lhs, 0)
+ || !operand_equal_p (pred1.pred_rhs, pred2.pred_rhs, 0))
+ return false;
+
+ tree_code c1 = pred1.cond_code, c2;
+ if (pred1.invert != pred2.invert
+ && TREE_CODE_CLASS (pred2.cond_code) == tcc_comparison)
+ c2 = invert_tree_comparison (pred2.cond_code, false);
+ else
+ c2 = pred2.cond_code;
+
+ return c1 == c2;
+}
+
+/* Return true if PRED tests inequality (i.e., X != Y). */
+
+static inline bool
+is_neq_relop_p (const pred_info &pred)
+{
+
+ return ((pred.cond_code == NE_EXPR && !pred.invert)
+ || (pred.cond_code == EQ_EXPR && pred.invert));
+}
+
+/* Returns true if PRED is of the form X != 0. */
+
+static inline bool
+is_neq_zero_form_p (const pred_info &pred)
+{
+ if (!is_neq_relop_p (pred) || !integer_zerop (pred.pred_rhs)
+ || TREE_CODE (pred.pred_lhs) != SSA_NAME)
+ return false;
+ return true;
+}
+
+/* Return true if PRED is equivalent to X != 0. */
+
+static inline bool
+pred_expr_equal_p (const pred_info &pred, tree expr)
+{
+ if (!is_neq_zero_form_p (pred))
+ return false;
+
+ return operand_equal_p (pred.pred_lhs, expr, 0);
+}
+
+/* Return true if VAL satisfies (x CMPC BOUNDARY) predicate. CMPC can
+ be either one of the range comparison codes ({GE,LT,EQ,NE}_EXPR and
+ the like), or BIT_AND_EXPR. EXACT_P is only meaningful for the latter.
+ Modify the question from VAL & BOUNDARY != 0 to VAL & BOUNDARY == VAL.
+ For other values of CMPC, EXACT_P is ignored. */
+
+static bool
+value_sat_pred_p (tree val, tree boundary, tree_code cmpc,
+ bool exact_p = false)
+{
+ if (cmpc != BIT_AND_EXPR)
+ return is_value_included_in (val, boundary, cmpc);
+
+ wide_int andw = wi::to_wide (val) & wi::to_wide (boundary);
+ if (exact_p)
+ return andw == wi::to_wide (val);
+
+ return andw.to_uhwi ();
+}
+
+/* Return true if the domain of single predicate expression PRED1
+ is a subset of that of PRED2, and false if it cannot be proved. */
+
+static bool
+subset_of (const pred_info &pred1, const pred_info &pred2)
+{
+ if (pred_equal_p (pred1, pred2))
+ return true;
+
+ if ((TREE_CODE (pred1.pred_rhs) != INTEGER_CST)
+ || (TREE_CODE (pred2.pred_rhs) != INTEGER_CST))
+ return false;
+
+ if (!operand_equal_p (pred1.pred_lhs, pred2.pred_lhs, 0))
+ return false;
+
+ tree_code code1 = pred1.cond_code;
+ if (pred1.invert)
+ code1 = invert_tree_comparison (code1, false);
+ tree_code code2 = pred2.cond_code;
+ if (pred2.invert)
+ code2 = invert_tree_comparison (code2, false);
+
+ if (code2 == NE_EXPR && code1 == NE_EXPR)
+ return false;
+
+ if (code2 == NE_EXPR)
+ return !value_sat_pred_p (pred2.pred_rhs, pred1.pred_rhs, code1);
+
+ if (code1 == EQ_EXPR)
+ return value_sat_pred_p (pred1.pred_rhs, pred2.pred_rhs, code2);
+
+ if (code1 == code2)
+ return value_sat_pred_p (pred1.pred_rhs, pred2.pred_rhs, code2,
+ code1 == BIT_AND_EXPR);
+
+ return false;
+}
+
+/* Return true if the domain of CHAIN1 is a subset of that of CHAIN2.
+ Return false if it cannot be proven so. */
+
+static bool
+subset_of (const pred_chain &chain1, const pred_chain &chain2)
+{
+ unsigned np1 = chain1.length ();
+ unsigned np2 = chain2.length ();
+ for (unsigned i2 = 0; i2 < np2; i2++)
+ {
+ bool found = false;
+ const pred_info &info2 = chain2[i2];
+ for (unsigned i1 = 0; i1 < np1; i1++)
+ {
+ const pred_info &info1 = chain1[i1];
+ if (subset_of (info1, info2))
+ {
+ found = true;
+ break;
+ }
+ }
+ if (!found)
+ return false;
+ }
+ return true;
+}
+
+/* Return true if the domain defined by the predicate chain PREDS is
+ a subset of the domain of *THIS. Return false if PREDS's domain
+ is not a subset of any of the sub-domains of *THIS (corresponding
+ to each individual chains in it), even though it may be still be
+ a subset of whole domain of *THIS which is the union (ORed) of all
+ its subdomains. In other words, the result is conservative. */
+
+bool
+predicate::includes (const pred_chain &chain) const
+{
+ for (unsigned i = 0; i < m_preds.length (); i++)
+ if (subset_of (chain, m_preds[i]))
+ return true;
+
+ return false;
+}
+
+/* Return true if the domain defined by *THIS is a superset of PREDS's
+ domain.
+ Avoid building generic trees (and rely on the folding capability
+ of the compiler), and instead perform brute force comparison of
+ individual predicate chains (this won't be a computationally costly
+ since the chains are pretty short). Returning false does not
+ necessarily mean *THIS is not a superset of *PREDS, only that
+ it need not be since the analysis cannot prove it. */
+
+bool
+predicate::superset_of (const predicate &preds) const
+{
+ for (unsigned i = 0; i < preds.m_preds.length (); i++)
+ if (!includes (preds.m_preds[i]))
+ return false;
+
+ return true;
+}
+
+/* Create a predicate of the form OP != 0 and push it the work list CHAIN. */
+
+static void
+push_to_worklist (tree op, pred_chain *chain, hash_set<tree> *mark_set)
+{
+ if (mark_set->contains (op))
+ return;
+ mark_set->add (op);
+
+ pred_info arg_pred;
+ arg_pred.pred_lhs = op;
+ arg_pred.pred_rhs = integer_zero_node;
+ arg_pred.cond_code = NE_EXPR;
+ arg_pred.invert = false;
+ chain->safe_push (arg_pred);
+}
+
+/* Return a pred_info for a gimple assignment CMP_ASSIGN with comparison
+ rhs. */
+
+static pred_info
+get_pred_info_from_cmp (const gimple *cmp_assign)
+{
+ pred_info pred;
+ pred.pred_lhs = gimple_assign_rhs1 (cmp_assign);
+ pred.pred_rhs = gimple_assign_rhs2 (cmp_assign);
+ pred.cond_code = gimple_assign_rhs_code (cmp_assign);
+ pred.invert = false;
+ return pred;
+}
+
+/* If PHI is a degenerate phi with all operands having the same value (relop)
+ update *PRED to that value and return true. Otherwise return false. */
+
+static bool
+is_degenerate_phi (gimple *phi, pred_info *pred)
+{
+ tree op0 = gimple_phi_arg_def (phi, 0);
+
+ if (TREE_CODE (op0) != SSA_NAME)
+ return false;
+
+ gimple *def0 = SSA_NAME_DEF_STMT (op0);
+ if (gimple_code (def0) != GIMPLE_ASSIGN)
+ return false;
+
+ if (TREE_CODE_CLASS (gimple_assign_rhs_code (def0)) != tcc_comparison)
+ return false;
+
+ pred_info pred0 = get_pred_info_from_cmp (def0);
+
+ unsigned n = gimple_phi_num_args (phi);
+ for (unsigned i = 1; i < n; ++i)
+ {
+ tree op = gimple_phi_arg_def (phi, i);
+ if (TREE_CODE (op) != SSA_NAME)
+ return false;
+
+ gimple *def = SSA_NAME_DEF_STMT (op);
+ if (gimple_code (def) != GIMPLE_ASSIGN)
+ return false;
+
+ if (TREE_CODE_CLASS (gimple_assign_rhs_code (def)) != tcc_comparison)
+ return false;
+
+ pred_info pred = get_pred_info_from_cmp (def);
+ if (!pred_equal_p (pred, pred0))
+ return false;
+ }
+
+ *pred = pred0;
+ return true;
+}
+
+/* Recursively compute the control dependence chains (paths of edges)
+ from the dependent basic block, DEP_BB, up to the dominating basic
+ block, DOM_BB (the head node of a chain should be dominated by it),
+ storing them in the CD_CHAINS array.
+ CUR_CD_CHAIN is the current chain being computed.
+ *NUM_CHAINS is total number of chains in the CD_CHAINS array.
+ *NUM_CALLS is the number of recursive calls to control unbounded
+ recursion.
+ Return true if the information is successfully computed, false if
+ there is no control dependence or not computed. */
+
+static bool
+compute_control_dep_chain (basic_block dom_bb, const_basic_block dep_bb,
+ vec<edge> cd_chains[], unsigned *num_chains,
+ vec<edge> &cur_cd_chain, unsigned *num_calls,
+ unsigned depth = 0)
+{
+ if (*num_calls > (unsigned)param_uninit_control_dep_attempts)
+ {
+ if (dump_file)
+ fprintf (dump_file, "param_uninit_control_dep_attempts exceeded: %u\n",
+ *num_calls);
+ return false;
+ }
+ ++*num_calls;
+
+ /* FIXME: Use a set instead. */
+ unsigned cur_chain_len = cur_cd_chain.length ();
+ if (cur_chain_len > MAX_CHAIN_LEN)
+ {
+ if (dump_file)
+ fprintf (dump_file, "MAX_CHAIN_LEN exceeded: %u\n", cur_chain_len);
+
+ return false;
+ }
+
+ if (cur_chain_len > 5)
+ {
+ if (dump_file)
+ fprintf (dump_file, "chain length exceeds 5: %u\n", cur_chain_len);
+ }
+
+ for (unsigned i = 0; i < cur_chain_len; i++)
+ {
+ edge e = cur_cd_chain[i];
+ /* Cycle detected. */
+ if (e->src == dom_bb)
+ {
+ if (dump_file)
+ fprintf (dump_file, "cycle detected\n");
+ return false;
+ }
+ }
+
+ if (DEBUG_PREDICATE_ANALYZER && dump_file)
+ fprintf (dump_file,
+ "%*s%s (dom_bb = %u, dep_bb = %u, cd_chains = { %s }, ...)\n",
+ depth, "", __func__, dom_bb->index, dep_bb->index,
+ format_edge_vecs (cd_chains, *num_chains).c_str ());
+
+ bool found_cd_chain = false;
+
+ /* Iterate over DOM_BB's successors. */
+ edge e;
+ edge_iterator ei;
+ FOR_EACH_EDGE (e, ei, dom_bb->succs)
+ {
+ int post_dom_check = 0;
+ if (e->flags & (EDGE_FAKE | EDGE_ABNORMAL))
+ continue;
+
+ basic_block cd_bb = e->dest;
+ cur_cd_chain.safe_push (e);
+ while (!is_non_loop_exit_postdominating (cd_bb, dom_bb))
+ {
+ if (cd_bb == dep_bb)
+ {
+ /* Found a direct control dependence. */
+ if (*num_chains < MAX_NUM_CHAINS)
+ {
+ cd_chains[*num_chains] = cur_cd_chain.copy ();
+ (*num_chains)++;
+ }
+ found_cd_chain = true;
+ /* Check path from next edge. */
+ break;
+ }
+
+ /* Check if DEP_BB is indirectly control-dependent on DOM_BB. */
+ if (compute_control_dep_chain (cd_bb, dep_bb, cd_chains,
+ num_chains, cur_cd_chain,
+ num_calls, depth + 1))
+ {
+ found_cd_chain = true;
+ break;
+ }
+
+ cd_bb = find_pdom (cd_bb);
+ post_dom_check++;
+ if (cd_bb == EXIT_BLOCK_PTR_FOR_FN (cfun)
+ || post_dom_check > MAX_POSTDOM_CHECK)
+ break;
+ }
+ cur_cd_chain.pop ();
+ gcc_assert (cur_cd_chain.length () == cur_chain_len);
+ }
+
+ gcc_assert (cur_cd_chain.length () == cur_chain_len);
+ return found_cd_chain;
+}
+
+/* Return true if PRED can be invalidated by any predicate in GUARD. */
+
+static bool
+can_be_invalidated_p (const pred_info &pred, const pred_chain &guard)
+{
+ if (dump_file && dump_flags & TDF_DETAILS)
+ {
+ fprintf (dump_file, "Testing if predicate: ");
+ dump_pred_info (pred);
+ fprintf (dump_file, "\n...can be invalidated by a USE guard of: ");
+ dump_pred_chain (guard);
+ fputc ('\n', dump_file);
+ }
+
+ unsigned n = guard.length ();
+ for (unsigned i = 0; i < n; ++i)
+ {
+ if (pred_neg_p (pred, guard[i]))
+ {
+ if (dump_file && dump_flags & TDF_DETAILS)
+ {
+ fprintf (dump_file, " Predicate invalidated by: ");
+ dump_pred_info (guard[i]);
+ fputc ('\n', dump_file);
+ }
+ return true;
+ }
+ }
+
+ return false;
+}
+
+/* Return true if all predicates in PREDS are invalidated by GUARD being
+ true. */
+
+static bool
+can_be_invalidated_p (const pred_chain_union &preds, const pred_chain &guard)
+{
+ if (preds.is_empty ())
+ return false;
+
+ if (dump_file && dump_flags & TDF_DETAILS)
+ dump_predicates (NULL, preds,
+ "Testing if anything here can be invalidated: ");
+
+ for (unsigned i = 0; i < preds.length (); ++i)
+ {
+ const pred_chain &chain = preds[i];
+ for (unsigned j = 0; j < chain.length (); ++j)
+ if (can_be_invalidated_p (chain[j], guard))
+ return true;
+
+ /* If we were unable to invalidate any predicate in C, then there
+ is a viable path from entry to the PHI where the PHI takes
+ an interesting value and continues to a use of the PHI. */
+ return false;
+ }
+ return true;
+}
+
+/* Return true if none of the PHI arguments in OPNDS is used given
+ the use guards in *THIS that guard the PHI's use. */
+
+bool
+predicate::use_cannot_happen (gphi *phi, unsigned opnds)
+{
+ if (!m_eval.phi_arg_set (phi))
+ return false;
+
+ /* PHI_USE_GUARDS are OR'ed together. If we have more than one
+ possible guard, there's no way of knowing which guard was true.
+ Since we need to be absolutely sure that the uninitialized
+ operands will be invalidated, bail. */
+ const pred_chain_union &phi_use_guards = m_preds;
+ if (phi_use_guards.length () != 1)
+ return false;
+
+ const pred_chain &use_guard = phi_use_guards[0];
+
+ /* Look for the control dependencies of all the interesting operands
+ and build guard predicates describing them. */
+ unsigned n = gimple_phi_num_args (phi);
+ for (unsigned i = 0; i < n; ++i)
+ {
+ if (!MASK_TEST_BIT (opnds, i))
+ continue;
+
+ edge e = gimple_phi_arg_edge (phi, i);
+ auto_vec<edge> dep_chains[MAX_NUM_CHAINS];
+ auto_vec<edge, MAX_CHAIN_LEN + 1> cur_chain;
+ unsigned num_chains = 0;
+ unsigned num_calls = 0;
+
+ /* Build the control dependency chain for the PHI argument... */
+ if (!compute_control_dep_chain (ENTRY_BLOCK_PTR_FOR_FN (cfun),
+ e->src, dep_chains, &num_chains,
+ cur_chain, &num_calls))
+ return false;
+
+ if (DEBUG_PREDICATE_ANALYZER && dump_file)
+ {
+ fprintf (dump_file, "predicate::use_cannot_happen (...) "
+ "dep_chains for arg %u:\n\t", i);
+ dump_dep_chains (dep_chains, num_chains);
+ }
+
+ /* ...and convert it into a set of predicates guarding its
+ definition. */
+ predicate def_preds (m_eval);
+ def_preds.init_from_control_deps (dep_chains, num_chains);
+ if (def_preds.is_empty ())
+ /* If there's no predicate there's no basis to rule the use out. */
+ return false;
+
+ def_preds.simplify ();
+ def_preds.normalize ();
+
+ /* Can the guard for this PHI argument be negated by the one
+ guarding the PHI use? */
+ if (!can_be_invalidated_p (def_preds.chain (), use_guard))
+ return false;
+ }
+
+ return true;
+}
+
+/* Implemented simplifications:
+
+ 1) ((x IOR y) != 0) AND (x != 0) is equivalent to (x != 0);
+ 2) (X AND Y) OR (!X AND Y) is equivalent to Y;
+ 3) X OR (!X AND Y) is equivalent to (X OR Y);
+ 4) ((x IAND y) != 0) || (x != 0 AND y != 0)) is equivalent to
+ (x != 0 AND y != 0)
+ 5) (X AND Y) OR (!X AND Z) OR (!Y AND Z) is equivalent to
+ (X AND Y) OR Z
+
+ PREDS is the predicate chains, and N is the number of chains. */
+
+/* Implement rule 1 above. PREDS is the AND predicate to simplify
+ in place. */
+
+static void
+simplify_1 (pred_chain &chain)
+{
+ bool simplified = false;
+ pred_chain s_chain = vNULL;
+
+ unsigned n = chain.length ();
+ for (unsigned i = 0; i < n; i++)
+ {
+ pred_info &a_pred = chain[i];
+
+ if (!a_pred.pred_lhs
+ || !is_neq_zero_form_p (a_pred))
+ continue;
+
+ gimple *def_stmt = SSA_NAME_DEF_STMT (a_pred.pred_lhs);
+ if (gimple_code (def_stmt) != GIMPLE_ASSIGN)
+ continue;
+
+ if (gimple_assign_rhs_code (def_stmt) != BIT_IOR_EXPR)
+ continue;
+
+ for (unsigned j = 0; j < n; j++)
+ {
+ const pred_info &b_pred = chain[j];
+
+ if (!b_pred.pred_lhs
+ || !is_neq_zero_form_p (b_pred))
+ continue;
+
+ if (pred_expr_equal_p (b_pred, gimple_assign_rhs1 (def_stmt))
+ || pred_expr_equal_p (b_pred, gimple_assign_rhs2 (def_stmt)))
+ {
+ /* Mark A_PRED for removal from PREDS. */
+ a_pred.pred_lhs = NULL;
+ a_pred.pred_rhs = NULL;
+ simplified = true;
+ break;
+ }
+ }
+ }
+
+ if (!simplified)
+ return;
+
+ /* Remove predicates marked above. */
+ for (unsigned i = 0; i < n; i++)
+ {
+ pred_info &a_pred = chain[i];
+ if (!a_pred.pred_lhs)
+ continue;
+ s_chain.safe_push (a_pred);
+ }
+
+ chain.release ();
+ chain = s_chain;
+}
+
+/* Implements rule 2 for the OR predicate PREDS:
+
+ 2) (X AND Y) OR (!X AND Y) is equivalent to Y. */
+
+bool
+predicate::simplify_2 ()
+{
+ bool simplified = false;
+
+ /* (X AND Y) OR (!X AND Y) is equivalent to Y.
+ (X AND Y) OR (X AND !Y) is equivalent to X. */
+
+ unsigned n = m_preds.length ();
+ for (unsigned i = 0; i < n; i++)
+ {
+ pred_chain &a_chain = m_preds[i];
+ if (a_chain.length () != 2)
+ continue;
+
+ /* Create copies since the chain may be released below before
+ the copy is added to the other chain. */
+ const pred_info x = a_chain[0];
+ const pred_info y = a_chain[1];
+
+ for (unsigned j = 0; j < n; j++)
+ {
+ if (j == i)
+ continue;
+
+ pred_chain &b_chain = m_preds[j];
+ if (b_chain.length () != 2)
+ continue;
+
+ const pred_info &x2 = b_chain[0];
+ const pred_info &y2 = b_chain[1];
+
+ if (pred_equal_p (x, x2) && pred_neg_p (y, y2))
+ {
+ /* Kill a_chain. */
+ b_chain.release ();
+ a_chain.release ();
+ b_chain.safe_push (x);
+ simplified = true;
+ break;
+ }
+ if (pred_neg_p (x, x2) && pred_equal_p (y, y2))
+ {
+ /* Kill a_chain. */
+ a_chain.release ();
+ b_chain.release ();
+ b_chain.safe_push (y);
+ simplified = true;
+ break;
+ }
+ }
+ }
+ /* Now clean up the chain. */
+ if (simplified)
+ {
+ pred_chain_union s_preds = vNULL;
+ for (unsigned i = 0; i < n; i++)
+ {
+ if (m_preds[i].is_empty ())
+ continue;
+ s_preds.safe_push (m_preds[i]);
+ }
+ m_preds.release ();
+ m_preds = s_preds;
+ s_preds = vNULL;
+ }
+
+ return simplified;
+}
+
+/* Implement rule 3 for the OR predicate PREDS:
+
+ 3) x OR (!x AND y) is equivalent to x OR y. */
+
+bool
+predicate::simplify_3 ()
+{
+ /* Now iteratively simplify X OR (!X AND Z ..)
+ into X OR (Z ...). */
+
+ unsigned n = m_preds.length ();
+ if (n < 2)
+ return false;
+
+ bool simplified = false;
+ for (unsigned i = 0; i < n; i++)
+ {
+ const pred_chain &a_chain = m_preds[i];
+
+ if (a_chain.length () != 1)
+ continue;
+
+ const pred_info &x = a_chain[0];
+ for (unsigned j = 0; j < n; j++)
+ {
+ if (j == i)
+ continue;
+
+ pred_chain b_chain = m_preds[j];
+ if (b_chain.length () < 2)
+ continue;
+
+ for (unsigned k = 0; k < b_chain.length (); k++)
+ {
+ const pred_info &x2 = b_chain[k];
+ if (pred_neg_p (x, x2))
+ {
+ b_chain.unordered_remove (k);
+ simplified = true;
+ break;
+ }
+ }
+ }
+ }
+ return simplified;
+}
+
+/* Implement rule 4 for the OR predicate PREDS:
+
+ 2) ((x AND y) != 0) OR (x != 0 AND y != 0) is equivalent to
+ (x != 0 ANd y != 0). */
+
+bool
+predicate::simplify_4 ()
+{
+ bool simplified = false;
+ pred_chain_union s_preds = vNULL;
+
+ unsigned n = m_preds.length ();
+ for (unsigned i = 0; i < n; i++)
+ {
+ pred_chain a_chain = m_preds[i];
+ if (a_chain.length () != 1)
+ continue;
+
+ const pred_info &z = a_chain[0];
+ if (!is_neq_zero_form_p (z))
+ continue;
+
+ gimple *def_stmt = SSA_NAME_DEF_STMT (z.pred_lhs);
+ if (gimple_code (def_stmt) != GIMPLE_ASSIGN)
+ continue;
+
+ if (gimple_assign_rhs_code (def_stmt) != BIT_AND_EXPR)
+ continue;
+
+ for (unsigned j = 0; j < n; j++)
+ {
+ if (j == i)
+ continue;
+
+ pred_chain b_chain = m_preds[j];
+ if (b_chain.length () != 2)
+ continue;
+
+ const pred_info &x2 = b_chain[0];
+ const pred_info &y2 = b_chain[1];
+ if (!is_neq_zero_form_p (x2) || !is_neq_zero_form_p (y2))
+ continue;
+
+ if ((pred_expr_equal_p (x2, gimple_assign_rhs1 (def_stmt))
+ && pred_expr_equal_p (y2, gimple_assign_rhs2 (def_stmt)))
+ || (pred_expr_equal_p (x2, gimple_assign_rhs2 (def_stmt))
+ && pred_expr_equal_p (y2, gimple_assign_rhs1 (def_stmt))))
+ {
+ /* Kill a_chain. */
+ a_chain.release ();
+ simplified = true;
+ break;
+ }
+ }
+ }
+ /* Now clean up the chain. */
+ if (simplified)
+ {
+ for (unsigned i = 0; i < n; i++)
+ {
+ if (m_preds[i].is_empty ())
+ continue;
+ s_preds.safe_push (m_preds[i]);
+ }
+
+ m_preds.release ();
+ m_preds = s_preds;
+ s_preds = vNULL;
+ }
+
+ return simplified;
+}
+
+/* Simplify predicates in *THIS. */
+
+void
+predicate::simplify (gimple *use_or_def, bool is_use)
+{
+ if (dump_file && dump_flags & TDF_DETAILS)
+ {
+ fprintf (dump_file, "Before simplication ");
+ dump (use_or_def, is_use ? "[USE]:\n" : "[DEF]:\n");
+ }
+
+ unsigned n = m_preds.length ();
+ for (unsigned i = 0; i < n; i++)
+ ::simplify_1 (m_preds[i]);
+
+ if (n < 2)
+ return;
+
+ bool changed;
+ do
+ {
+ changed = false;
+ if (simplify_2 ())
+ changed = true;
+
+ if (simplify_3 ())
+ changed = true;
+
+ if (simplify_4 ())
+ changed = true;
+ }
+ while (changed);
+}
+
+/* Attempt to normalize predicate chains by following UD chains by
+ building up a big tree of either IOR operations or AND operations,
+ and converting the IOR tree into a pred_chain_union or the BIT_AND
+ tree into a pred_chain.
+ Example:
+
+ _3 = _2 RELOP1 _1;
+ _6 = _5 RELOP2 _4;
+ _9 = _8 RELOP3 _7;
+ _10 = _3 | _6;
+ _12 = _9 | _0;
+ _t = _10 | _12;
+
+ then _t != 0 will be normalized into a pred_chain_union
+
+ (_2 RELOP1 _1) OR (_5 RELOP2 _4) OR (_8 RELOP3 _7) OR (_0 != 0)
+
+ Similarly given:
+
+ _3 = _2 RELOP1 _1;
+ _6 = _5 RELOP2 _4;
+ _9 = _8 RELOP3 _7;
+ _10 = _3 & _6;
+ _12 = _9 & _0;
+
+ then _t != 0 will be normalized into a pred_chain:
+ (_2 RELOP1 _1) AND (_5 RELOP2 _4) AND (_8 RELOP3 _7) AND (_0 != 0)
+ */
+
+/* Store a PRED in *THIS. */
+
+void
+predicate::push_pred (const pred_info &pred)
+{
+ pred_chain chain = vNULL;
+ chain.safe_push (pred);
+ m_preds.safe_push (chain);
+}
+
+/* Dump predicates in *THIS for STMT prepended by MSG. */
+
+void
+predicate::dump (gimple *stmt, const char *msg) const
+{
+ fprintf (dump_file, "%s", msg);
+ if (stmt)
+ {
+ fputc ('\t', dump_file);
+ print_gimple_stmt (dump_file, stmt, 0);
+ fprintf (dump_file, " is conditional on:\n");
+ }
+
+ unsigned np = m_preds.length ();
+ if (np == 0)
+ {
+ fprintf (dump_file, "\t(empty)\n");
+ return;
+ }
+
+ {
+ tree expr = build_pred_expr (m_preds);
+ char *str = print_generic_expr_to_str (expr);
+ fprintf (dump_file, "\t%s (expanded)\n", str);
+ free (str);
+ }
+
+ if (np > 1)
+ fprintf (dump_file, "\tOR (");
+ else
+ fputc ('\t', dump_file);
+ for (unsigned i = 0; i < np; i++)
+ {
+ dump_pred_chain (m_preds[i]);
+ if (i < np - 1)
+ fprintf (dump_file, ", ");
+ else if (i > 0)
+ fputc (')', dump_file);
+ }
+ fputc ('\n', dump_file);
+}
+
+/* Initialize *THIS with the predicates of the control dependence chains
+ between the basic block DEF_BB that defines a variable of interst and
+ USE_BB that uses the variable, respectively. */
+
+predicate::predicate (basic_block def_bb, basic_block use_bb, func_t &eval)
+ : m_preds (vNULL), m_eval (eval)
+{
+ /* Set CD_ROOT to the basic block closest to USE_BB that is the control
+ equivalent of (is guarded by the same predicate as) DEF_BB that also
+ dominates USE_BB. */
+ basic_block cd_root = def_bb;
+ while (dominated_by_p (CDI_DOMINATORS, use_bb, cd_root))
+ {
+ /* Find CD_ROOT's closest postdominator that's its control
+ equivalent. */
+ if (basic_block bb = find_control_equiv_block (cd_root))
+ if (dominated_by_p (CDI_DOMINATORS, use_bb, bb))
+ {
+ cd_root = bb;
+ continue;
+ }
+
+ break;
+ }
+
+ /* Set DEP_CHAINS to the set of edges between CD_ROOT and USE_BB.
+ Each DEP_CHAINS element is a series of edges whose conditions
+ are logical conjunctions. Together, the DEP_CHAINS vector is
+ used below to initialize an OR expression of the conjunctions. */
+ unsigned num_calls = 0;
+ unsigned num_chains = 0;
+ auto_vec<edge> dep_chains[MAX_NUM_CHAINS];
+ auto_vec<edge, MAX_CHAIN_LEN + 1> cur_chain;
+
+ compute_control_dep_chain (cd_root, use_bb, dep_chains, &num_chains,
+ cur_chain, &num_calls);
+
+ if (DEBUG_PREDICATE_ANALYZER && dump_file)
+ {
+ fprintf (dump_file, "predicate::predicate (def_bb = %u, use_bb = %u, func_t) "
+ "initialized from %u dep_chains:\n\t",
+ def_bb->index, use_bb->index, num_chains);
+ dump_dep_chains (dep_chains, num_chains);
+ }
+
+ /* From the set of edges computed above initialize *THIS as the OR
+ condition under which the definition in DEF_BB is used in USE_BB.
+ Each OR subexpression is represented by one element of DEP_CHAINS,
+ where each element consists of a series of AND subexpressions. */
+ init_from_control_deps (dep_chains, num_chains);
+}
+
+/* Release resources in *THIS. */
+
+predicate::~predicate ()
+{
+ unsigned n = m_preds.length ();
+ for (unsigned i = 0; i != n; ++i)
+ m_preds[i].release ();
+ m_preds.release ();
+}
+
+/* Copy-assign RHS to *THIS. */
+
+predicate&
+predicate::operator= (const predicate &rhs)
+{
+ if (this == &rhs)
+ return *this;
+
+ /* FIXME: Make this a compile-time constraint? */
+ gcc_assert (&m_eval == &rhs.m_eval);
+
+ unsigned n = m_preds.length ();
+ for (unsigned i = 0; i != n; ++i)
+ m_preds[i].release ();
+ m_preds.release ();
+
+ n = rhs.m_preds.length ();
+ for (unsigned i = 0; i != n; ++i)
+ {
+ const pred_chain &chain = rhs.m_preds[i];
+ m_preds.safe_push (chain.copy ());
+ }
+
+ return *this;
+}
+
+/* For each use edge of PHI, compute all control dependence chains
+ and convert those to the composite predicates in M_PREDS.
+ Return true if a nonempty predicate has been obtained. */
+
+bool
+predicate::init_from_phi_def (gphi *phi)
+{
+ gcc_assert (is_empty ());
+
+ basic_block phi_bb = gimple_bb (phi);
+ /* Find the closest dominating bb to be the control dependence root. */
+ basic_block cd_root = find_dom (phi_bb);
+ if (!cd_root)
+ return false;
+
+ /* Set DEF_EDGES to the edges to the PHI from the bb's that provide
+ definitions of each of the PHI operands for which M_EVAL is false. */
+ auto_vec<edge> def_edges;
+ hash_set<gimple *> visited_phis;
+ collect_phi_def_edges (phi, cd_root, &def_edges, m_eval, &visited_phis);
+
+ unsigned nedges = def_edges.length ();
+ if (nedges == 0)
+ return false;
+
+ unsigned num_chains = 0;
+ auto_vec<edge> dep_chains[MAX_NUM_CHAINS];
+ auto_vec<edge, MAX_CHAIN_LEN + 1> cur_chain;
+ for (unsigned i = 0; i < nedges; i++)
+ {
+ edge e = def_edges[i];
+ unsigned num_calls = 0;
+ unsigned prev_nc = num_chains;
+ compute_control_dep_chain (cd_root, e->src, dep_chains,
+ &num_chains, cur_chain, &num_calls);
+
+ /* Update the newly added chains with the phi operand edge. */
+ if (EDGE_COUNT (e->src->succs) > 1)
+ {
+ if (prev_nc == num_chains && num_chains < MAX_NUM_CHAINS)
+ dep_chains[num_chains++] = vNULL;
+ for (unsigned j = prev_nc; j < num_chains; j++)
+ dep_chains[j].safe_push (e);
+ }
+ }
+
+ /* Convert control dependence chains to the predicate in *THIS under
+ which the PHI operands are defined to values for which M_EVAL is
+ false. */
+ init_from_control_deps (dep_chains, num_chains);
+ return !is_empty ();
+}
+
+/* Compute the predicates that guard the use USE_STMT and check if
+ the incoming paths that have an empty (or possibly empty) definition
+ can be pruned. Return true if it can be determined that the use of
+ PHI's def in USE_STMT is guarded by a predicate set that does not
+ overlap with the predicate sets of all runtime paths that do not
+ have a definition.
+
+ Return false if the use is not guarded or if it cannot be determined.
+ USE_BB is the bb of the use (for phi operand use, the bb is not the bb
+ of the phi stmt, but the source bb of the operand edge).
+
+ OPNDS is a bitmap with a bit set for each PHI operand of interest.
+
+ THIS->M_PREDS contains the (memoized) defining predicate chains of
+ a PHI. If THIS->M_PREDS is empty, the PHI's defining predicate
+ chains are computed and stored into THIS->M_PREDS as needed.
+
+ VISITED_PHIS is a pointer set of phis being visited. */
+
+bool
+predicate::is_use_guarded (gimple *use_stmt, basic_block use_bb,
+ gphi *phi, unsigned opnds,
+ hash_set<gphi *> *visited)
+{
+ if (visited->add (phi))
+ return false;
+
+ /* The basic block where the PHI is defined. */
+ basic_block def_bb = gimple_bb (phi);
+
+ /* Try to build the predicate expression under which the PHI flows
+ into its use. This will be empty if the PHI is defined and used
+ in the same bb. */
+ predicate use_preds (def_bb, use_bb, m_eval);
+
+ if (is_non_loop_exit_postdominating (use_bb, def_bb))
+ {
+ if (is_empty ())
+ {
+ /* Lazily initialize *THIS from the PHI and build its use
+ expression. */
+ init_from_phi_def (phi);
+ m_use_expr = build_pred_expr (use_preds.m_preds);
+ }
+
+ /* The use is not guarded. */
+ return false;
+ }
+
+ if (use_preds.is_empty ())
+ return false;
+
+ /* Try to prune the dead incoming phi edges. */
+ if (!use_preds.overlap (phi, opnds, visited))
+ {
+ if (DEBUG_PREDICATE_ANALYZER && dump_file)
+ fputs ("found predicate overlap\n", dump_file);
+
+ return true;
+ }
+
+ /* We might be able to prove that if the control dependencies for OPNDS
+ are true, the control dependencies for USE_STMT can never be true. */
+ if (use_preds.use_cannot_happen (phi, opnds))
+ return true;
+
+ if (is_empty ())
+ {
+ /* Lazily initialize *THIS from PHI. */
+ if (!init_from_phi_def (phi))
+ {
+ m_use_expr = build_pred_expr (use_preds.m_preds);
+ return false;
+ }
+
+ simplify (phi);
+ normalize (phi);
+ }
+
+ use_preds.simplify (use_stmt, /*is_use=*/true);
+ use_preds.normalize (use_stmt, /*is_use=*/true);
+
+ /* Return true if the predicate guarding the valid definition (i.e.,
+ *THIS) is a superset of the predicate guarding the use (i.e.,
+ USE_PREDS). */
+ if (superset_of (use_preds))
+ return true;
+
+ m_use_expr = build_pred_expr (use_preds.m_preds);
+
+ return false;
+}
+
+/* Public interface to the above. */
+
+bool
+predicate::is_use_guarded (gimple *stmt, basic_block use_bb, gphi *phi,
+ unsigned opnds)
+{
+ hash_set<gphi *> visited;
+ return is_use_guarded (stmt, use_bb, phi, opnds, &visited);
+}
+
+/* Normalize predicate PRED:
+ 1) if PRED can no longer be normalized, append it to *THIS.
+ 2) otherwise if PRED is of the form x != 0, follow x's definition
+ and put normalized predicates into WORK_LIST. */
+
+void
+predicate::normalize (pred_chain *norm_chain,
+ pred_info pred,
+ tree_code and_or_code,
+ pred_chain *work_list,
+ hash_set<tree> *mark_set)
+{
+ if (!is_neq_zero_form_p (pred))
+ {
+ if (and_or_code == BIT_IOR_EXPR)
+ push_pred (pred);
+ else
+ norm_chain->safe_push (pred);
+ return;
+ }
+
+ gimple *def_stmt = SSA_NAME_DEF_STMT (pred.pred_lhs);
+
+ if (gimple_code (def_stmt) == GIMPLE_PHI
+ && is_degenerate_phi (def_stmt, &pred))
+ /* PRED has been modified above. */
+ work_list->safe_push (pred);
+ else if (gimple_code (def_stmt) == GIMPLE_PHI && and_or_code == BIT_IOR_EXPR)
+ {
+ unsigned n = gimple_phi_num_args (def_stmt);
+
+ /* Punt for a nonzero constant. The predicate should be one guarding
+ the phi edge. */
+ for (unsigned i = 0; i < n; ++i)
+ {
+ tree op = gimple_phi_arg_def (def_stmt, i);
+ if (TREE_CODE (op) == INTEGER_CST && !integer_zerop (op))
+ {
+ push_pred (pred);
+ return;
+ }
+ }
+
+ for (unsigned i = 0; i < n; ++i)
+ {
+ tree op = gimple_phi_arg_def (def_stmt, i);
+ if (integer_zerop (op))
+ continue;
+
+ push_to_worklist (op, work_list, mark_set);
+ }
+ }
+ else if (gimple_code (def_stmt) != GIMPLE_ASSIGN)
+ {
+ if (and_or_code == BIT_IOR_EXPR)
+ push_pred (pred);
+ else
+ norm_chain->safe_push (pred);
+ }
+ else if (gimple_assign_rhs_code (def_stmt) == and_or_code)
+ {
+ /* Avoid splitting up bit manipulations like x & 3 or y | 1. */
+ if (is_gimple_min_invariant (gimple_assign_rhs2 (def_stmt)))
+ {
+ /* But treat x & 3 as a condition. */
+ if (and_or_code == BIT_AND_EXPR)
+ {
+ pred_info n_pred;
+ n_pred.pred_lhs = gimple_assign_rhs1 (def_stmt);
+ n_pred.pred_rhs = gimple_assign_rhs2 (def_stmt);
+ n_pred.cond_code = and_or_code;
+ n_pred.invert = false;
+ norm_chain->safe_push (n_pred);
+ }
+ }
+ else
+ {
+ push_to_worklist (gimple_assign_rhs1 (def_stmt), work_list, mark_set);
+ push_to_worklist (gimple_assign_rhs2 (def_stmt), work_list, mark_set);
+ }
+ }
+ else if (TREE_CODE_CLASS (gimple_assign_rhs_code (def_stmt))
+ == tcc_comparison)
+ {
+ pred_info n_pred = get_pred_info_from_cmp (def_stmt);
+ if (and_or_code == BIT_IOR_EXPR)
+ push_pred (n_pred);
+ else
+ norm_chain->safe_push (n_pred);
+ }
+ else
+ {
+ if (and_or_code == BIT_IOR_EXPR)
+ push_pred (pred);
+ else
+ norm_chain->safe_push (pred);
+ }
+}
+
+/* Normalize PRED and store the normalized predicates in THIS->M_PREDS. */
+
+void
+predicate::normalize (const pred_info &pred)
+{
+ if (!is_neq_zero_form_p (pred))
+ {
+ push_pred (pred);
+ return;
+ }
+
+ tree_code and_or_code = ERROR_MARK;
+
+ gimple *def_stmt = SSA_NAME_DEF_STMT (pred.pred_lhs);
+ if (gimple_code (def_stmt) == GIMPLE_ASSIGN)
+ and_or_code = gimple_assign_rhs_code (def_stmt);
+ if (and_or_code != BIT_IOR_EXPR && and_or_code != BIT_AND_EXPR)
+ {
+ if (TREE_CODE_CLASS (and_or_code) == tcc_comparison)
+ {
+ pred_info n_pred = get_pred_info_from_cmp (def_stmt);
+ push_pred (n_pred);
+ }
+ else
+ push_pred (pred);
+ return;
+ }
+
+
+ pred_chain norm_chain = vNULL;
+ pred_chain work_list = vNULL;
+ work_list.safe_push (pred);
+ hash_set<tree> mark_set;
+
+ while (!work_list.is_empty ())
+ {
+ pred_info a_pred = work_list.pop ();
+ normalize (&norm_chain, a_pred, and_or_code, &work_list, &mark_set);
+ }
+
+ if (and_or_code == BIT_AND_EXPR)
+ m_preds.safe_push (norm_chain);
+
+ work_list.release ();
+}
+
+/* Normalize a single predicate PRED_CHAIN and append it to *THIS. */
+
+void
+predicate::normalize (const pred_chain &chain)
+{
+ pred_chain work_list = vNULL;
+ hash_set<tree> mark_set;
+ for (unsigned i = 0; i < chain.length (); i++)
+ {
+ work_list.safe_push (chain[i]);
+ mark_set.add (chain[i].pred_lhs);
+ }
+
+ /* Normalized chain of predicates built up below. */
+ pred_chain norm_chain = vNULL;
+ while (!work_list.is_empty ())
+ {
+ pred_info pi = work_list.pop ();
+ predicate pred (m_eval);
+ /* The predicate object is not modified here, only NORM_CHAIN and
+ WORK_LIST are appended to. */
+ pred.normalize (&norm_chain, pi, BIT_AND_EXPR, &work_list, &mark_set);
+ }
+
+ m_preds.safe_push (norm_chain);
+ work_list.release ();
+}
+
+/* Normalize predicate chains in THIS. */
+
+void
+predicate::normalize (gimple *use_or_def, bool is_use)
+{
+ if (dump_file && dump_flags & TDF_DETAILS)
+ {
+ fprintf (dump_file, "Before normalization ");
+ dump (use_or_def, is_use ? "[USE]:\n" : "[DEF]:\n");
+ }
+
+ predicate norm_preds (m_eval);
+ for (unsigned i = 0; i < m_preds.length (); i++)
+ {
+ if (m_preds[i].length () != 1)
+ norm_preds.normalize (m_preds[i]);
+ else
+ norm_preds.normalize (m_preds[i][0]);
+ }
+
+ *this = norm_preds;
+
+ if (dump_file)
+ {
+ fprintf (dump_file, "After normalization ");
+ dump (use_or_def, is_use ? "[USE]:\n" : "[DEF]:\n");
+ }
+}
+
+/* Add a predicate for the condition or logical assignment STMT to CHAIN.
+ Expand SSA_NAME into constituent subexpressions. Invert the result
+ if INVERT is true. Return true if the predicate has been added. */
+
+static bool
+add_pred (pred_chain *chain, gimple *stmt, bool invert)
+{
+ if (gimple_code (stmt) == GIMPLE_COND)
+ {
+ tree lhs = gimple_cond_lhs (stmt);
+ if (TREE_CODE (lhs) == SSA_NAME)
+ {
+ gimple *def = SSA_NAME_DEF_STMT (lhs);
+ if (is_gimple_assign (def)
+ && add_pred (chain, def, invert))
+ return true;
+ }
+
+ pred_info pred;
+ pred.pred_lhs = lhs;
+ pred.pred_rhs = gimple_cond_rhs (stmt);
+ pred.cond_code = gimple_cond_code (stmt);
+ pred.invert = invert;
+ chain->safe_push (pred);
+ return true;
+ }
+
+ if (!is_gimple_assign (stmt))
+ return false;
+
+ if (gimple_assign_single_p (stmt))
+ // FIXME: handle this?
+ return false;
+
+ if (TREE_TYPE (gimple_assign_lhs (stmt)) != boolean_type_node)
+ return false;
+
+ tree rhs1 = gimple_assign_rhs1 (stmt);
+ tree rhs2 = gimple_assign_rhs2 (stmt);
+ tree_code code = gimple_assign_rhs_code (stmt);
+ if (code == BIT_AND_EXPR)
+ {
+ if (TREE_CODE (rhs1) == SSA_NAME
+ && add_pred (chain, SSA_NAME_DEF_STMT (rhs1), invert)
+ && TREE_CODE (rhs2) == SSA_NAME
+ /* FIXME: Need to handle failure below! */
+ && add_pred (chain, SSA_NAME_DEF_STMT (rhs2), invert))
+ return true;
+ }
+ else if (TREE_CODE_CLASS (code) != tcc_comparison)
+ return false;
+
+ pred_info pred;
+ pred.pred_lhs = rhs1;
+ pred.pred_rhs = rhs2;
+ pred.cond_code = code;
+ pred.invert = invert;
+ chain->safe_push (pred);
+ return true;
+}
+
+/* Convert the chains of control dependence edges into a set of predicates.
+ A control dependence chain is represented by a vector edges. DEP_CHAINS
+ points to an array of NUM_CHAINS dependence chains. One edge in
+ a dependence chain is mapped to predicate expression represented by
+ pred_info type. One dependence chain is converted to a composite
+ predicate that is the result of AND operation of pred_info mapped to
+ each edge. A composite predicate is represented by a vector of
+ pred_info. Sets M_PREDS to the resulting composite predicates. */
+
+void
+predicate::init_from_control_deps (const vec<edge> *dep_chains,
+ unsigned num_chains)
+{
+ gcc_assert (is_empty ());
+
+ bool has_valid_pred = false;
+ if (num_chains == 0)
+ return;
+
+ if (num_chains >= MAX_NUM_CHAINS)
+ {
+ if (dump_file)
+ fprintf (dump_file, "MAX_NUM_CHAINS exceeded: %u\n", num_chains);
+ return;
+ }
+
+ /* Convert the control dependency chain into a set of predicates. */
+ m_preds.reserve (num_chains);
+
+ for (unsigned i = 0; i < num_chains; i++)
+ {
+ /* One path through the CFG represents a logical conjunction
+ of the predicates. */
+ const vec<edge> &path = dep_chains[i];
+
+ has_valid_pred = false;
+ /* The chain of predicates guarding the definition along this path. */
+ pred_chain t_chain{ };
+ for (unsigned j = 0; j < path.length (); j++)
+ {
+ edge e = path[j];
+ basic_block guard_bb = e->src;
+ /* Ignore empty forwarder blocks. */
+ if (empty_block_p (guard_bb) && single_succ_p (guard_bb))
+ continue;
+
+ /* An empty basic block here is likely a PHI, and is not one
+ of the cases we handle below. */
+ gimple_stmt_iterator gsi = gsi_last_bb (guard_bb);
+ if (gsi_end_p (gsi))
+ {
+ has_valid_pred = false;
+ break;
+ }
+ /* Get the conditional controlling the bb exit edge. */
+ gimple *cond_stmt = gsi_stmt (gsi);
+ if (is_gimple_call (cond_stmt) && EDGE_COUNT (e->src->succs) >= 2)
+ /* Ignore EH edge. Can add assertion on the other edge's flag. */
+ continue;
+ /* Skip if there is essentially one succesor. */
+ if (EDGE_COUNT (e->src->succs) == 2)
+ {
+ edge e1;
+ edge_iterator ei1;
+ bool skip = false;
+
+ FOR_EACH_EDGE (e1, ei1, e->src->succs)
+ {
+ if (EDGE_COUNT (e1->dest->succs) == 0)
+ {
+ skip = true;
+ break;
+ }
+ }
+ if (skip)
+ continue;
+ }
+ if (gimple_code (cond_stmt) == GIMPLE_COND)
+ {
+ /* The true edge corresponds to the uninteresting condition.
+ Add the negated predicate(s) for the edge to record
+ the interesting condition. */
+ pred_info one_pred;
+ one_pred.pred_lhs = gimple_cond_lhs (cond_stmt);
+ one_pred.pred_rhs = gimple_cond_rhs (cond_stmt);
+ one_pred.cond_code = gimple_cond_code (cond_stmt);
+ one_pred.invert = !!(e->flags & EDGE_FALSE_VALUE);
+
+ t_chain.safe_push (one_pred);
+
+ if (DEBUG_PREDICATE_ANALYZER && dump_file)
+ {
+ fprintf (dump_file, "one_pred = ");
+ dump_pred_info (one_pred);
+ fputc ('\n', dump_file);
+ }
+
+ has_valid_pred = true;
+ }
+ else if (gswitch *gs = dyn_cast<gswitch *> (cond_stmt))
+ {
+ /* Avoid quadratic behavior. */
+ if (gimple_switch_num_labels (gs) > MAX_SWITCH_CASES)
+ {
+ has_valid_pred = false;
+ break;
+ }
+ /* Find the case label. */
+ tree l = NULL_TREE;
+ unsigned idx;
+ for (idx = 0; idx < gimple_switch_num_labels (gs); ++idx)
+ {
+ tree tl = gimple_switch_label (gs, idx);
+ if (e->dest == label_to_block (cfun, CASE_LABEL (tl)))
+ {
+ if (!l)
+ l = tl;
+ else
+ {
+ l = NULL_TREE;
+ break;
+ }
+ }
+ }
+ /* If more than one label reaches this block or the case
+ label doesn't have a single value (like the default one)
+ fail. */
+ if (!l
+ || !CASE_LOW (l)
+ || (CASE_HIGH (l)
+ && !operand_equal_p (CASE_LOW (l), CASE_HIGH (l), 0)))
+ {
+ has_valid_pred = false;
+ break;
+ }
+
+ pred_info one_pred;
+ one_pred.pred_lhs = gimple_switch_index (gs);
+ one_pred.pred_rhs = CASE_LOW (l);
+ one_pred.cond_code = EQ_EXPR;
+ one_pred.invert = false;
+ t_chain.safe_push (one_pred);
+ has_valid_pred = true;
+ }
+ else
+ {
+ /* Disabled. See PR 90994.
+ has_valid_pred = false; */
+ break;
+ }
+ }
+
+ if (!has_valid_pred)
+ break;
+ else
+ m_preds.safe_push (t_chain);
+ }
+
+ if (DEBUG_PREDICATE_ANALYZER && dump_file)
+ {
+ fprintf (dump_file, "init_from_control_deps {%s}:\n",
+ format_edge_vecs (dep_chains, num_chains).c_str ());
+ dump (NULL, "");
+ }
+
+ gcc_assert (has_valid_pred == (m_preds.length () > 0));
+}
+
+/* Return the predicate expression guarding the definition of
+ the interesting variable. When INVERT is set, return the logical
+ NOT of the predicate. */
+
+tree
+predicate::def_expr (bool invert /* = false */) const
+{
+ /* The predicate is stored in an inverted form. */
+ return build_pred_expr (m_preds, !invert);
+}
+
+/* Return the predicate expression guarding the use of the interesting
+ variable or null if the use predicate hasn't been determined yet. */
+
+tree
+predicate::use_expr () const
+{
+ return m_use_expr;
+}
+
+/* Return a logical AND expression with the (optionally inverted) predicate
+ expression guarding the definition of the interesting variable and one
+ guarding its use. Return null if the use predicate hasn't yet been
+ determined. */
+
+tree
+predicate::expr (bool invert /* = false */) const
+{
+ if (!m_use_expr)
+ return NULL_TREE;
+
+ tree expr = build_pred_expr (m_preds, !invert);
+ return build2 (TRUTH_AND_EXPR, boolean_type_node, expr, m_use_expr);
+}