tree.h (phi_arg_d): New field.
[gcc.git] / gcc / tree-ssa-dce.c
1 /* Dead code elimination pass for the GNU compiler.
2 Copyright (C) 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
3 Free Software Foundation, Inc.
4 Contributed by Ben Elliston <bje@redhat.com>
5 and Andrew MacLeod <amacleod@redhat.com>
6 Adapted to use control dependence by Steven Bosscher, SUSE Labs.
7
8 This file is part of GCC.
9
10 GCC is free software; you can redistribute it and/or modify it
11 under the terms of the GNU General Public License as published by the
12 Free Software Foundation; either version 3, or (at your option) any
13 later version.
14
15 GCC is distributed in the hope that it will be useful, but WITHOUT
16 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
17 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
18 for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with GCC; see the file COPYING3. If not see
22 <http://www.gnu.org/licenses/>. */
23
24 /* Dead code elimination.
25
26 References:
27
28 Building an Optimizing Compiler,
29 Robert Morgan, Butterworth-Heinemann, 1998, Section 8.9.
30
31 Advanced Compiler Design and Implementation,
32 Steven Muchnick, Morgan Kaufmann, 1997, Section 18.10.
33
34 Dead-code elimination is the removal of statements which have no
35 impact on the program's output. "Dead statements" have no impact
36 on the program's output, while "necessary statements" may have
37 impact on the output.
38
39 The algorithm consists of three phases:
40 1. Marking as necessary all statements known to be necessary,
41 e.g. most function calls, writing a value to memory, etc;
42 2. Propagating necessary statements, e.g., the statements
43 giving values to operands in necessary statements; and
44 3. Removing dead statements. */
45
46 #include "config.h"
47 #include "system.h"
48 #include "coretypes.h"
49 #include "tm.h"
50
51 #include "tree.h"
52 #include "tree-pretty-print.h"
53 #include "gimple-pretty-print.h"
54 #include "basic-block.h"
55 #include "tree-flow.h"
56 #include "gimple.h"
57 #include "tree-dump.h"
58 #include "tree-pass.h"
59 #include "timevar.h"
60 #include "flags.h"
61 #include "cfgloop.h"
62 #include "tree-scalar-evolution.h"
63
64 static struct stmt_stats
65 {
66 int total;
67 int total_phis;
68 int removed;
69 int removed_phis;
70 } stats;
71
72 #define STMT_NECESSARY GF_PLF_1
73
74 static VEC(gimple,heap) *worklist;
75
76 /* Vector indicating an SSA name has already been processed and marked
77 as necessary. */
78 static sbitmap processed;
79
80 /* Vector indicating that the last statement of a basic block has already
81 been marked as necessary. */
82 static sbitmap last_stmt_necessary;
83
84 /* Vector indicating that BB contains statements that are live. */
85 static sbitmap bb_contains_live_stmts;
86
87 /* Before we can determine whether a control branch is dead, we need to
88 compute which blocks are control dependent on which edges.
89
90 We expect each block to be control dependent on very few edges so we
91 use a bitmap for each block recording its edges. An array holds the
92 bitmap. The Ith bit in the bitmap is set if that block is dependent
93 on the Ith edge. */
94 static bitmap *control_dependence_map;
95
96 /* Vector indicating that a basic block has already had all the edges
97 processed that it is control dependent on. */
98 static sbitmap visited_control_parents;
99
100 /* TRUE if this pass alters the CFG (by removing control statements).
101 FALSE otherwise.
102
103 If this pass alters the CFG, then it will arrange for the dominators
104 to be recomputed. */
105 static bool cfg_altered;
106
107 /* Execute code that follows the macro for each edge (given number
108 EDGE_NUMBER within the CODE) for which the block with index N is
109 control dependent. */
110 #define EXECUTE_IF_CONTROL_DEPENDENT(BI, N, EDGE_NUMBER) \
111 EXECUTE_IF_SET_IN_BITMAP (control_dependence_map[(N)], 0, \
112 (EDGE_NUMBER), (BI))
113
114
115 /* Indicate block BB is control dependent on an edge with index EDGE_INDEX. */
116 static inline void
117 set_control_dependence_map_bit (basic_block bb, int edge_index)
118 {
119 if (bb == ENTRY_BLOCK_PTR)
120 return;
121 gcc_assert (bb != EXIT_BLOCK_PTR);
122 bitmap_set_bit (control_dependence_map[bb->index], edge_index);
123 }
124
125 /* Clear all control dependences for block BB. */
126 static inline void
127 clear_control_dependence_bitmap (basic_block bb)
128 {
129 bitmap_clear (control_dependence_map[bb->index]);
130 }
131
132
133 /* Find the immediate postdominator PDOM of the specified basic block BLOCK.
134 This function is necessary because some blocks have negative numbers. */
135
136 static inline basic_block
137 find_pdom (basic_block block)
138 {
139 gcc_assert (block != ENTRY_BLOCK_PTR);
140
141 if (block == EXIT_BLOCK_PTR)
142 return EXIT_BLOCK_PTR;
143 else
144 {
145 basic_block bb = get_immediate_dominator (CDI_POST_DOMINATORS, block);
146 if (! bb)
147 return EXIT_BLOCK_PTR;
148 return bb;
149 }
150 }
151
152
153 /* Determine all blocks' control dependences on the given edge with edge_list
154 EL index EDGE_INDEX, ala Morgan, Section 3.6. */
155
156 static void
157 find_control_dependence (struct edge_list *el, int edge_index)
158 {
159 basic_block current_block;
160 basic_block ending_block;
161
162 gcc_assert (INDEX_EDGE_PRED_BB (el, edge_index) != EXIT_BLOCK_PTR);
163
164 if (INDEX_EDGE_PRED_BB (el, edge_index) == ENTRY_BLOCK_PTR)
165 ending_block = single_succ (ENTRY_BLOCK_PTR);
166 else
167 ending_block = find_pdom (INDEX_EDGE_PRED_BB (el, edge_index));
168
169 for (current_block = INDEX_EDGE_SUCC_BB (el, edge_index);
170 current_block != ending_block && current_block != EXIT_BLOCK_PTR;
171 current_block = find_pdom (current_block))
172 {
173 edge e = INDEX_EDGE (el, edge_index);
174
175 /* For abnormal edges, we don't make current_block control
176 dependent because instructions that throw are always necessary
177 anyway. */
178 if (e->flags & EDGE_ABNORMAL)
179 continue;
180
181 set_control_dependence_map_bit (current_block, edge_index);
182 }
183 }
184
185
186 /* Record all blocks' control dependences on all edges in the edge
187 list EL, ala Morgan, Section 3.6. */
188
189 static void
190 find_all_control_dependences (struct edge_list *el)
191 {
192 int i;
193
194 for (i = 0; i < NUM_EDGES (el); ++i)
195 find_control_dependence (el, i);
196 }
197
198 /* If STMT is not already marked necessary, mark it, and add it to the
199 worklist if ADD_TO_WORKLIST is true. */
200
201 static inline void
202 mark_stmt_necessary (gimple stmt, bool add_to_worklist)
203 {
204 gcc_assert (stmt);
205
206 if (gimple_plf (stmt, STMT_NECESSARY))
207 return;
208
209 if (dump_file && (dump_flags & TDF_DETAILS))
210 {
211 fprintf (dump_file, "Marking useful stmt: ");
212 print_gimple_stmt (dump_file, stmt, 0, TDF_SLIM);
213 fprintf (dump_file, "\n");
214 }
215
216 gimple_set_plf (stmt, STMT_NECESSARY, true);
217 if (add_to_worklist)
218 VEC_safe_push (gimple, heap, worklist, stmt);
219 if (bb_contains_live_stmts && !is_gimple_debug (stmt))
220 SET_BIT (bb_contains_live_stmts, gimple_bb (stmt)->index);
221 }
222
223
224 /* Mark the statement defining operand OP as necessary. */
225
226 static inline void
227 mark_operand_necessary (tree op)
228 {
229 gimple stmt;
230 int ver;
231
232 gcc_assert (op);
233
234 ver = SSA_NAME_VERSION (op);
235 if (TEST_BIT (processed, ver))
236 {
237 stmt = SSA_NAME_DEF_STMT (op);
238 gcc_assert (gimple_nop_p (stmt)
239 || gimple_plf (stmt, STMT_NECESSARY));
240 return;
241 }
242 SET_BIT (processed, ver);
243
244 stmt = SSA_NAME_DEF_STMT (op);
245 gcc_assert (stmt);
246
247 if (gimple_plf (stmt, STMT_NECESSARY) || gimple_nop_p (stmt))
248 return;
249
250 if (dump_file && (dump_flags & TDF_DETAILS))
251 {
252 fprintf (dump_file, "marking necessary through ");
253 print_generic_expr (dump_file, op, 0);
254 fprintf (dump_file, " stmt ");
255 print_gimple_stmt (dump_file, stmt, 0, 0);
256 }
257
258 gimple_set_plf (stmt, STMT_NECESSARY, true);
259 if (bb_contains_live_stmts)
260 SET_BIT (bb_contains_live_stmts, gimple_bb (stmt)->index);
261 VEC_safe_push (gimple, heap, worklist, stmt);
262 }
263
264
265 /* Mark STMT as necessary if it obviously is. Add it to the worklist if
266 it can make other statements necessary.
267
268 If AGGRESSIVE is false, control statements are conservatively marked as
269 necessary. */
270
271 static void
272 mark_stmt_if_obviously_necessary (gimple stmt, bool aggressive)
273 {
274 /* With non-call exceptions, we have to assume that all statements could
275 throw. If a statement could throw, it can be deemed necessary. */
276 if (cfun->can_throw_non_call_exceptions
277 && !cfun->can_delete_dead_exceptions
278 && stmt_could_throw_p (stmt))
279 {
280 mark_stmt_necessary (stmt, true);
281 return;
282 }
283
284 /* Statements that are implicitly live. Most function calls, asm
285 and return statements are required. Labels and GIMPLE_BIND nodes
286 are kept because they are control flow, and we have no way of
287 knowing whether they can be removed. DCE can eliminate all the
288 other statements in a block, and CFG can then remove the block
289 and labels. */
290 switch (gimple_code (stmt))
291 {
292 case GIMPLE_PREDICT:
293 case GIMPLE_LABEL:
294 mark_stmt_necessary (stmt, false);
295 return;
296
297 case GIMPLE_ASM:
298 case GIMPLE_RESX:
299 case GIMPLE_RETURN:
300 mark_stmt_necessary (stmt, true);
301 return;
302
303 case GIMPLE_CALL:
304 {
305 tree callee = gimple_call_fndecl (stmt);
306 if (callee != NULL_TREE
307 && DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL)
308 switch (DECL_FUNCTION_CODE (callee))
309 {
310 case BUILT_IN_MALLOC:
311 case BUILT_IN_CALLOC:
312 case BUILT_IN_ALLOCA:
313 case BUILT_IN_ALLOCA_WITH_ALIGN:
314 return;
315
316 default:;
317 }
318 /* Most, but not all function calls are required. Function calls that
319 produce no result and have no side effects (i.e. const pure
320 functions) are unnecessary. */
321 if (gimple_has_side_effects (stmt))
322 {
323 mark_stmt_necessary (stmt, true);
324 return;
325 }
326 if (!gimple_call_lhs (stmt))
327 return;
328 break;
329 }
330
331 case GIMPLE_DEBUG:
332 /* Debug temps without a value are not useful. ??? If we could
333 easily locate the debug temp bind stmt for a use thereof,
334 would could refrain from marking all debug temps here, and
335 mark them only if they're used. */
336 if (!gimple_debug_bind_p (stmt)
337 || gimple_debug_bind_has_value_p (stmt)
338 || TREE_CODE (gimple_debug_bind_get_var (stmt)) != DEBUG_EXPR_DECL)
339 mark_stmt_necessary (stmt, false);
340 return;
341
342 case GIMPLE_GOTO:
343 gcc_assert (!simple_goto_p (stmt));
344 mark_stmt_necessary (stmt, true);
345 return;
346
347 case GIMPLE_COND:
348 gcc_assert (EDGE_COUNT (gimple_bb (stmt)->succs) == 2);
349 /* Fall through. */
350
351 case GIMPLE_SWITCH:
352 if (! aggressive)
353 mark_stmt_necessary (stmt, true);
354 break;
355
356 case GIMPLE_ASSIGN:
357 if (TREE_CODE (gimple_assign_lhs (stmt)) == SSA_NAME
358 && TREE_CLOBBER_P (gimple_assign_rhs1 (stmt)))
359 return;
360 break;
361
362 default:
363 break;
364 }
365
366 /* If the statement has volatile operands, it needs to be preserved.
367 Same for statements that can alter control flow in unpredictable
368 ways. */
369 if (gimple_has_volatile_ops (stmt) || is_ctrl_altering_stmt (stmt))
370 {
371 mark_stmt_necessary (stmt, true);
372 return;
373 }
374
375 if (stmt_may_clobber_global_p (stmt))
376 {
377 mark_stmt_necessary (stmt, true);
378 return;
379 }
380
381 return;
382 }
383
384
385 /* Mark the last statement of BB as necessary. */
386
387 static void
388 mark_last_stmt_necessary (basic_block bb)
389 {
390 gimple stmt = last_stmt (bb);
391
392 SET_BIT (last_stmt_necessary, bb->index);
393 SET_BIT (bb_contains_live_stmts, bb->index);
394
395 /* We actually mark the statement only if it is a control statement. */
396 if (stmt && is_ctrl_stmt (stmt))
397 mark_stmt_necessary (stmt, true);
398 }
399
400
401 /* Mark control dependent edges of BB as necessary. We have to do this only
402 once for each basic block so we set the appropriate bit after we're done.
403
404 When IGNORE_SELF is true, ignore BB in the list of control dependences. */
405
406 static void
407 mark_control_dependent_edges_necessary (basic_block bb, struct edge_list *el,
408 bool ignore_self)
409 {
410 bitmap_iterator bi;
411 unsigned edge_number;
412 bool skipped = false;
413
414 gcc_assert (bb != EXIT_BLOCK_PTR);
415
416 if (bb == ENTRY_BLOCK_PTR)
417 return;
418
419 EXECUTE_IF_CONTROL_DEPENDENT (bi, bb->index, edge_number)
420 {
421 basic_block cd_bb = INDEX_EDGE_PRED_BB (el, edge_number);
422
423 if (ignore_self && cd_bb == bb)
424 {
425 skipped = true;
426 continue;
427 }
428
429 if (!TEST_BIT (last_stmt_necessary, cd_bb->index))
430 mark_last_stmt_necessary (cd_bb);
431 }
432
433 if (!skipped)
434 SET_BIT (visited_control_parents, bb->index);
435 }
436
437
438 /* Find obviously necessary statements. These are things like most function
439 calls, and stores to file level variables.
440
441 If EL is NULL, control statements are conservatively marked as
442 necessary. Otherwise it contains the list of edges used by control
443 dependence analysis. */
444
445 static void
446 find_obviously_necessary_stmts (struct edge_list *el)
447 {
448 basic_block bb;
449 gimple_stmt_iterator gsi;
450 edge e;
451 gimple phi, stmt;
452 int flags;
453
454 FOR_EACH_BB (bb)
455 {
456 /* PHI nodes are never inherently necessary. */
457 for (gsi = gsi_start_phis (bb); !gsi_end_p (gsi); gsi_next (&gsi))
458 {
459 phi = gsi_stmt (gsi);
460 gimple_set_plf (phi, STMT_NECESSARY, false);
461 }
462
463 /* Check all statements in the block. */
464 for (gsi = gsi_start_bb (bb); !gsi_end_p (gsi); gsi_next (&gsi))
465 {
466 stmt = gsi_stmt (gsi);
467 gimple_set_plf (stmt, STMT_NECESSARY, false);
468 mark_stmt_if_obviously_necessary (stmt, el != NULL);
469 }
470 }
471
472 /* Pure and const functions are finite and thus have no infinite loops in
473 them. */
474 flags = flags_from_decl_or_type (current_function_decl);
475 if ((flags & (ECF_CONST|ECF_PURE)) && !(flags & ECF_LOOPING_CONST_OR_PURE))
476 return;
477
478 /* Prevent the empty possibly infinite loops from being removed. */
479 if (el)
480 {
481 loop_iterator li;
482 struct loop *loop;
483 scev_initialize ();
484 if (mark_irreducible_loops ())
485 FOR_EACH_BB (bb)
486 {
487 edge_iterator ei;
488 FOR_EACH_EDGE (e, ei, bb->succs)
489 if ((e->flags & EDGE_DFS_BACK)
490 && (e->flags & EDGE_IRREDUCIBLE_LOOP))
491 {
492 if (dump_file)
493 fprintf (dump_file, "Marking back edge of irreducible loop %i->%i\n",
494 e->src->index, e->dest->index);
495 mark_control_dependent_edges_necessary (e->dest, el, false);
496 }
497 }
498
499 FOR_EACH_LOOP (li, loop, 0)
500 if (!finite_loop_p (loop))
501 {
502 if (dump_file)
503 fprintf (dump_file, "can not prove finiteness of loop %i\n", loop->num);
504 mark_control_dependent_edges_necessary (loop->latch, el, false);
505 }
506 scev_finalize ();
507 }
508 }
509
510
511 /* Return true if REF is based on an aliased base, otherwise false. */
512
513 static bool
514 ref_may_be_aliased (tree ref)
515 {
516 gcc_assert (TREE_CODE (ref) != WITH_SIZE_EXPR);
517 while (handled_component_p (ref))
518 ref = TREE_OPERAND (ref, 0);
519 if (TREE_CODE (ref) == MEM_REF
520 && TREE_CODE (TREE_OPERAND (ref, 0)) == ADDR_EXPR)
521 ref = TREE_OPERAND (TREE_OPERAND (ref, 0), 0);
522 return !(DECL_P (ref)
523 && !may_be_aliased (ref));
524 }
525
526 static bitmap visited = NULL;
527 static unsigned int longest_chain = 0;
528 static unsigned int total_chain = 0;
529 static unsigned int nr_walks = 0;
530 static bool chain_ovfl = false;
531
532 /* Worker for the walker that marks reaching definitions of REF,
533 which is based on a non-aliased decl, necessary. It returns
534 true whenever the defining statement of the current VDEF is
535 a kill for REF, as no dominating may-defs are necessary for REF
536 anymore. DATA points to the basic-block that contains the
537 stmt that refers to REF. */
538
539 static bool
540 mark_aliased_reaching_defs_necessary_1 (ao_ref *ref, tree vdef, void *data)
541 {
542 gimple def_stmt = SSA_NAME_DEF_STMT (vdef);
543
544 /* All stmts we visit are necessary. */
545 mark_operand_necessary (vdef);
546
547 /* If the stmt lhs kills ref, then we can stop walking. */
548 if (gimple_has_lhs (def_stmt)
549 && TREE_CODE (gimple_get_lhs (def_stmt)) != SSA_NAME
550 /* The assignment is not necessarily carried out if it can throw
551 and we can catch it in the current function where we could inspect
552 the previous value.
553 ??? We only need to care about the RHS throwing. For aggregate
554 assignments or similar calls and non-call exceptions the LHS
555 might throw as well. */
556 && !stmt_can_throw_internal (def_stmt))
557 {
558 tree base, lhs = gimple_get_lhs (def_stmt);
559 HOST_WIDE_INT size, offset, max_size;
560 ao_ref_base (ref);
561 base = get_ref_base_and_extent (lhs, &offset, &size, &max_size);
562 /* We can get MEM[symbol: sZ, index: D.8862_1] here,
563 so base == refd->base does not always hold. */
564 if (base == ref->base)
565 {
566 /* For a must-alias check we need to be able to constrain
567 the accesses properly. */
568 if (size != -1 && size == max_size
569 && ref->max_size != -1)
570 {
571 if (offset <= ref->offset
572 && offset + size >= ref->offset + ref->max_size)
573 return true;
574 }
575 /* Or they need to be exactly the same. */
576 else if (ref->ref
577 /* Make sure there is no induction variable involved
578 in the references (gcc.c-torture/execute/pr42142.c).
579 The simplest way is to check if the kill dominates
580 the use. */
581 && dominated_by_p (CDI_DOMINATORS, (basic_block) data,
582 gimple_bb (def_stmt))
583 && operand_equal_p (ref->ref, lhs, 0))
584 return true;
585 }
586 }
587
588 /* Otherwise keep walking. */
589 return false;
590 }
591
592 static void
593 mark_aliased_reaching_defs_necessary (gimple stmt, tree ref)
594 {
595 unsigned int chain;
596 ao_ref refd;
597 gcc_assert (!chain_ovfl);
598 ao_ref_init (&refd, ref);
599 chain = walk_aliased_vdefs (&refd, gimple_vuse (stmt),
600 mark_aliased_reaching_defs_necessary_1,
601 gimple_bb (stmt), NULL);
602 if (chain > longest_chain)
603 longest_chain = chain;
604 total_chain += chain;
605 nr_walks++;
606 }
607
608 /* Worker for the walker that marks reaching definitions of REF, which
609 is not based on a non-aliased decl. For simplicity we need to end
610 up marking all may-defs necessary that are not based on a non-aliased
611 decl. The only job of this walker is to skip may-defs based on
612 a non-aliased decl. */
613
614 static bool
615 mark_all_reaching_defs_necessary_1 (ao_ref *ref ATTRIBUTE_UNUSED,
616 tree vdef, void *data ATTRIBUTE_UNUSED)
617 {
618 gimple def_stmt = SSA_NAME_DEF_STMT (vdef);
619
620 /* We have to skip already visited (and thus necessary) statements
621 to make the chaining work after we dropped back to simple mode. */
622 if (chain_ovfl
623 && TEST_BIT (processed, SSA_NAME_VERSION (vdef)))
624 {
625 gcc_assert (gimple_nop_p (def_stmt)
626 || gimple_plf (def_stmt, STMT_NECESSARY));
627 return false;
628 }
629
630 /* We want to skip stores to non-aliased variables. */
631 if (!chain_ovfl
632 && gimple_assign_single_p (def_stmt))
633 {
634 tree lhs = gimple_assign_lhs (def_stmt);
635 if (!ref_may_be_aliased (lhs))
636 return false;
637 }
638
639 /* We want to skip statments that do not constitute stores but have
640 a virtual definition. */
641 if (is_gimple_call (def_stmt))
642 {
643 tree callee = gimple_call_fndecl (def_stmt);
644 if (callee != NULL_TREE
645 && DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL)
646 switch (DECL_FUNCTION_CODE (callee))
647 {
648 case BUILT_IN_MALLOC:
649 case BUILT_IN_CALLOC:
650 case BUILT_IN_ALLOCA:
651 case BUILT_IN_ALLOCA_WITH_ALIGN:
652 case BUILT_IN_FREE:
653 return false;
654
655 default:;
656 }
657 }
658
659 mark_operand_necessary (vdef);
660
661 return false;
662 }
663
664 static void
665 mark_all_reaching_defs_necessary (gimple stmt)
666 {
667 walk_aliased_vdefs (NULL, gimple_vuse (stmt),
668 mark_all_reaching_defs_necessary_1, NULL, &visited);
669 }
670
671 /* Return true for PHI nodes with one or identical arguments
672 can be removed. */
673 static bool
674 degenerate_phi_p (gimple phi)
675 {
676 unsigned int i;
677 tree op = gimple_phi_arg_def (phi, 0);
678 for (i = 1; i < gimple_phi_num_args (phi); i++)
679 if (gimple_phi_arg_def (phi, i) != op)
680 return false;
681 return true;
682 }
683
684 /* Propagate necessity using the operands of necessary statements.
685 Process the uses on each statement in the worklist, and add all
686 feeding statements which contribute to the calculation of this
687 value to the worklist.
688
689 In conservative mode, EL is NULL. */
690
691 static void
692 propagate_necessity (struct edge_list *el)
693 {
694 gimple stmt;
695 bool aggressive = (el ? true : false);
696
697 if (dump_file && (dump_flags & TDF_DETAILS))
698 fprintf (dump_file, "\nProcessing worklist:\n");
699
700 while (VEC_length (gimple, worklist) > 0)
701 {
702 /* Take STMT from worklist. */
703 stmt = VEC_pop (gimple, worklist);
704
705 if (dump_file && (dump_flags & TDF_DETAILS))
706 {
707 fprintf (dump_file, "processing: ");
708 print_gimple_stmt (dump_file, stmt, 0, TDF_SLIM);
709 fprintf (dump_file, "\n");
710 }
711
712 if (aggressive)
713 {
714 /* Mark the last statement of the basic blocks on which the block
715 containing STMT is control dependent, but only if we haven't
716 already done so. */
717 basic_block bb = gimple_bb (stmt);
718 if (bb != ENTRY_BLOCK_PTR
719 && !TEST_BIT (visited_control_parents, bb->index))
720 mark_control_dependent_edges_necessary (bb, el, false);
721 }
722
723 if (gimple_code (stmt) == GIMPLE_PHI
724 /* We do not process virtual PHI nodes nor do we track their
725 necessity. */
726 && is_gimple_reg (gimple_phi_result (stmt)))
727 {
728 /* PHI nodes are somewhat special in that each PHI alternative has
729 data and control dependencies. All the statements feeding the
730 PHI node's arguments are always necessary. In aggressive mode,
731 we also consider the control dependent edges leading to the
732 predecessor block associated with each PHI alternative as
733 necessary. */
734 size_t k;
735
736 for (k = 0; k < gimple_phi_num_args (stmt); k++)
737 {
738 tree arg = PHI_ARG_DEF (stmt, k);
739 if (TREE_CODE (arg) == SSA_NAME)
740 mark_operand_necessary (arg);
741 }
742
743 /* For PHI operands it matters from where the control flow arrives
744 to the BB. Consider the following example:
745
746 a=exp1;
747 b=exp2;
748 if (test)
749 ;
750 else
751 ;
752 c=PHI(a,b)
753
754 We need to mark control dependence of the empty basic blocks, since they
755 contains computation of PHI operands.
756
757 Doing so is too restrictive in the case the predecestor block is in
758 the loop. Consider:
759
760 if (b)
761 {
762 int i;
763 for (i = 0; i<1000; ++i)
764 ;
765 j = 0;
766 }
767 return j;
768
769 There is PHI for J in the BB containing return statement.
770 In this case the control dependence of predecestor block (that is
771 within the empty loop) also contains the block determining number
772 of iterations of the block that would prevent removing of empty
773 loop in this case.
774
775 This scenario can be avoided by splitting critical edges.
776 To save the critical edge splitting pass we identify how the control
777 dependence would look like if the edge was split.
778
779 Consider the modified CFG created from current CFG by splitting
780 edge B->C. In the postdominance tree of modified CFG, C' is
781 always child of C. There are two cases how chlids of C' can look
782 like:
783
784 1) C' is leaf
785
786 In this case the only basic block C' is control dependent on is B.
787
788 2) C' has single child that is B
789
790 In this case control dependence of C' is same as control
791 dependence of B in original CFG except for block B itself.
792 (since C' postdominate B in modified CFG)
793
794 Now how to decide what case happens? There are two basic options:
795
796 a) C postdominate B. Then C immediately postdominate B and
797 case 2 happens iff there is no other way from B to C except
798 the edge B->C.
799
800 There is other way from B to C iff there is succesor of B that
801 is not postdominated by B. Testing this condition is somewhat
802 expensive, because we need to iterate all succesors of B.
803 We are safe to assume that this does not happen: we will mark B
804 as needed when processing the other path from B to C that is
805 conrol dependent on B and marking control dependencies of B
806 itself is harmless because they will be processed anyway after
807 processing control statement in B.
808
809 b) C does not postdominate B. Always case 1 happens since there is
810 path from C to exit that does not go through B and thus also C'. */
811
812 if (aggressive && !degenerate_phi_p (stmt))
813 {
814 for (k = 0; k < gimple_phi_num_args (stmt); k++)
815 {
816 basic_block arg_bb = gimple_phi_arg_edge (stmt, k)->src;
817
818 if (gimple_bb (stmt)
819 != get_immediate_dominator (CDI_POST_DOMINATORS, arg_bb))
820 {
821 if (!TEST_BIT (last_stmt_necessary, arg_bb->index))
822 mark_last_stmt_necessary (arg_bb);
823 }
824 else if (arg_bb != ENTRY_BLOCK_PTR
825 && !TEST_BIT (visited_control_parents,
826 arg_bb->index))
827 mark_control_dependent_edges_necessary (arg_bb, el, true);
828 }
829 }
830 }
831 else
832 {
833 /* Propagate through the operands. Examine all the USE, VUSE and
834 VDEF operands in this statement. Mark all the statements
835 which feed this statement's uses as necessary. */
836 ssa_op_iter iter;
837 tree use;
838
839 /* If this is a call to free which is directly fed by an
840 allocation function do not mark that necessary through
841 processing the argument. */
842 if (gimple_call_builtin_p (stmt, BUILT_IN_FREE))
843 {
844 tree ptr = gimple_call_arg (stmt, 0);
845 gimple def_stmt;
846 tree def_callee;
847 /* If the pointer we free is defined by an allocation
848 function do not add the call to the worklist. */
849 if (TREE_CODE (ptr) == SSA_NAME
850 && is_gimple_call (def_stmt = SSA_NAME_DEF_STMT (ptr))
851 && (def_callee = gimple_call_fndecl (def_stmt))
852 && DECL_BUILT_IN_CLASS (def_callee) == BUILT_IN_NORMAL
853 && (DECL_FUNCTION_CODE (def_callee) == BUILT_IN_MALLOC
854 || DECL_FUNCTION_CODE (def_callee) == BUILT_IN_CALLOC))
855 continue;
856 }
857
858 FOR_EACH_SSA_TREE_OPERAND (use, stmt, iter, SSA_OP_USE)
859 mark_operand_necessary (use);
860
861 use = gimple_vuse (stmt);
862 if (!use)
863 continue;
864
865 /* If we dropped to simple mode make all immediately
866 reachable definitions necessary. */
867 if (chain_ovfl)
868 {
869 mark_all_reaching_defs_necessary (stmt);
870 continue;
871 }
872
873 /* For statements that may load from memory (have a VUSE) we
874 have to mark all reaching (may-)definitions as necessary.
875 We partition this task into two cases:
876 1) explicit loads based on decls that are not aliased
877 2) implicit loads (like calls) and explicit loads not
878 based on decls that are not aliased (like indirect
879 references or loads from globals)
880 For 1) we mark all reaching may-defs as necessary, stopping
881 at dominating kills. For 2) we want to mark all dominating
882 references necessary, but non-aliased ones which we handle
883 in 1). By keeping a global visited bitmap for references
884 we walk for 2) we avoid quadratic behavior for those. */
885
886 if (is_gimple_call (stmt))
887 {
888 tree callee = gimple_call_fndecl (stmt);
889 unsigned i;
890
891 /* Calls to functions that are merely acting as barriers
892 or that only store to memory do not make any previous
893 stores necessary. */
894 if (callee != NULL_TREE
895 && DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL
896 && (DECL_FUNCTION_CODE (callee) == BUILT_IN_MEMSET
897 || DECL_FUNCTION_CODE (callee) == BUILT_IN_MEMSET_CHK
898 || DECL_FUNCTION_CODE (callee) == BUILT_IN_MALLOC
899 || DECL_FUNCTION_CODE (callee) == BUILT_IN_CALLOC
900 || DECL_FUNCTION_CODE (callee) == BUILT_IN_FREE
901 || DECL_FUNCTION_CODE (callee) == BUILT_IN_VA_END
902 || DECL_FUNCTION_CODE (callee) == BUILT_IN_ALLOCA
903 || (DECL_FUNCTION_CODE (callee)
904 == BUILT_IN_ALLOCA_WITH_ALIGN)
905 || DECL_FUNCTION_CODE (callee) == BUILT_IN_STACK_SAVE
906 || DECL_FUNCTION_CODE (callee) == BUILT_IN_STACK_RESTORE
907 || DECL_FUNCTION_CODE (callee) == BUILT_IN_ASSUME_ALIGNED))
908 continue;
909
910 /* Calls implicitly load from memory, their arguments
911 in addition may explicitly perform memory loads. */
912 mark_all_reaching_defs_necessary (stmt);
913 for (i = 0; i < gimple_call_num_args (stmt); ++i)
914 {
915 tree arg = gimple_call_arg (stmt, i);
916 if (TREE_CODE (arg) == SSA_NAME
917 || is_gimple_min_invariant (arg))
918 continue;
919 if (TREE_CODE (arg) == WITH_SIZE_EXPR)
920 arg = TREE_OPERAND (arg, 0);
921 if (!ref_may_be_aliased (arg))
922 mark_aliased_reaching_defs_necessary (stmt, arg);
923 }
924 }
925 else if (gimple_assign_single_p (stmt))
926 {
927 tree rhs;
928 /* If this is a load mark things necessary. */
929 rhs = gimple_assign_rhs1 (stmt);
930 if (TREE_CODE (rhs) != SSA_NAME
931 && !is_gimple_min_invariant (rhs)
932 && TREE_CODE (rhs) != CONSTRUCTOR)
933 {
934 if (!ref_may_be_aliased (rhs))
935 mark_aliased_reaching_defs_necessary (stmt, rhs);
936 else
937 mark_all_reaching_defs_necessary (stmt);
938 }
939 }
940 else if (gimple_code (stmt) == GIMPLE_RETURN)
941 {
942 tree rhs = gimple_return_retval (stmt);
943 /* A return statement may perform a load. */
944 if (rhs
945 && TREE_CODE (rhs) != SSA_NAME
946 && !is_gimple_min_invariant (rhs)
947 && TREE_CODE (rhs) != CONSTRUCTOR)
948 {
949 if (!ref_may_be_aliased (rhs))
950 mark_aliased_reaching_defs_necessary (stmt, rhs);
951 else
952 mark_all_reaching_defs_necessary (stmt);
953 }
954 }
955 else if (gimple_code (stmt) == GIMPLE_ASM)
956 {
957 unsigned i;
958 mark_all_reaching_defs_necessary (stmt);
959 /* Inputs may perform loads. */
960 for (i = 0; i < gimple_asm_ninputs (stmt); ++i)
961 {
962 tree op = TREE_VALUE (gimple_asm_input_op (stmt, i));
963 if (TREE_CODE (op) != SSA_NAME
964 && !is_gimple_min_invariant (op)
965 && TREE_CODE (op) != CONSTRUCTOR
966 && !ref_may_be_aliased (op))
967 mark_aliased_reaching_defs_necessary (stmt, op);
968 }
969 }
970 else if (gimple_code (stmt) == GIMPLE_TRANSACTION)
971 {
972 /* The beginning of a transaction is a memory barrier. */
973 /* ??? If we were really cool, we'd only be a barrier
974 for the memories touched within the transaction. */
975 mark_all_reaching_defs_necessary (stmt);
976 }
977 else
978 gcc_unreachable ();
979
980 /* If we over-used our alias oracle budget drop to simple
981 mode. The cost metric allows quadratic behavior
982 (number of uses times number of may-defs queries) up to
983 a constant maximal number of queries and after that falls back to
984 super-linear complexity. */
985 if (/* Constant but quadratic for small functions. */
986 total_chain > 128 * 128
987 /* Linear in the number of may-defs. */
988 && total_chain > 32 * longest_chain
989 /* Linear in the number of uses. */
990 && total_chain > nr_walks * 32)
991 {
992 chain_ovfl = true;
993 if (visited)
994 bitmap_clear (visited);
995 }
996 }
997 }
998 }
999
1000 /* Replace all uses of NAME by underlying variable and mark it
1001 for renaming. */
1002
1003 void
1004 mark_virtual_operand_for_renaming (tree name)
1005 {
1006 bool used = false;
1007 imm_use_iterator iter;
1008 use_operand_p use_p;
1009 gimple stmt;
1010 tree name_var;
1011
1012 name_var = SSA_NAME_VAR (name);
1013 FOR_EACH_IMM_USE_STMT (stmt, iter, name)
1014 {
1015 FOR_EACH_IMM_USE_ON_STMT (use_p, iter)
1016 SET_USE (use_p, name_var);
1017 update_stmt (stmt);
1018 used = true;
1019 }
1020 if (used)
1021 mark_sym_for_renaming (name_var);
1022 }
1023
1024 /* Replace all uses of result of PHI by underlying variable and mark it
1025 for renaming. */
1026
1027 void
1028 mark_virtual_phi_result_for_renaming (gimple phi)
1029 {
1030 if (dump_file && (dump_flags & TDF_DETAILS))
1031 {
1032 fprintf (dump_file, "Marking result for renaming : ");
1033 print_gimple_stmt (dump_file, phi, 0, TDF_SLIM);
1034 fprintf (dump_file, "\n");
1035 }
1036
1037 mark_virtual_operand_for_renaming (gimple_phi_result (phi));
1038 }
1039
1040
1041 /* Remove dead PHI nodes from block BB. */
1042
1043 static bool
1044 remove_dead_phis (basic_block bb)
1045 {
1046 bool something_changed = false;
1047 gimple phi;
1048 gimple_stmt_iterator gsi;
1049
1050 for (gsi = gsi_start_phis (bb); !gsi_end_p (gsi);)
1051 {
1052 stats.total_phis++;
1053 phi = gsi_stmt (gsi);
1054
1055 /* We do not track necessity of virtual PHI nodes. Instead do
1056 very simple dead PHI removal here. */
1057 if (!is_gimple_reg (gimple_phi_result (phi)))
1058 {
1059 /* Virtual PHI nodes with one or identical arguments
1060 can be removed. */
1061 if (degenerate_phi_p (phi))
1062 {
1063 tree vdef = gimple_phi_result (phi);
1064 tree vuse = gimple_phi_arg_def (phi, 0);
1065
1066 use_operand_p use_p;
1067 imm_use_iterator iter;
1068 gimple use_stmt;
1069 FOR_EACH_IMM_USE_STMT (use_stmt, iter, vdef)
1070 FOR_EACH_IMM_USE_ON_STMT (use_p, iter)
1071 SET_USE (use_p, vuse);
1072 if (SSA_NAME_OCCURS_IN_ABNORMAL_PHI (vdef)
1073 && TREE_CODE (vuse) == SSA_NAME)
1074 SSA_NAME_OCCURS_IN_ABNORMAL_PHI (vuse) = 1;
1075 }
1076 else
1077 gimple_set_plf (phi, STMT_NECESSARY, true);
1078 }
1079
1080 if (!gimple_plf (phi, STMT_NECESSARY))
1081 {
1082 something_changed = true;
1083 if (dump_file && (dump_flags & TDF_DETAILS))
1084 {
1085 fprintf (dump_file, "Deleting : ");
1086 print_gimple_stmt (dump_file, phi, 0, TDF_SLIM);
1087 fprintf (dump_file, "\n");
1088 }
1089
1090 remove_phi_node (&gsi, true);
1091 stats.removed_phis++;
1092 continue;
1093 }
1094
1095 gsi_next (&gsi);
1096 }
1097 return something_changed;
1098 }
1099
1100 /* Forward edge E to respective POST_DOM_BB and update PHIs. */
1101
1102 static edge
1103 forward_edge_to_pdom (edge e, basic_block post_dom_bb)
1104 {
1105 gimple_stmt_iterator gsi;
1106 edge e2 = NULL;
1107 edge_iterator ei;
1108
1109 if (dump_file && (dump_flags & TDF_DETAILS))
1110 fprintf (dump_file, "Redirecting edge %i->%i to %i\n", e->src->index,
1111 e->dest->index, post_dom_bb->index);
1112
1113 e2 = redirect_edge_and_branch (e, post_dom_bb);
1114 cfg_altered = true;
1115
1116 /* If edge was already around, no updating is neccesary. */
1117 if (e2 != e)
1118 return e2;
1119
1120 if (!gimple_seq_empty_p (phi_nodes (post_dom_bb)))
1121 {
1122 /* We are sure that for every live PHI we are seeing control dependent BB.
1123 This means that we can pick any edge to duplicate PHI args from. */
1124 FOR_EACH_EDGE (e2, ei, post_dom_bb->preds)
1125 if (e2 != e)
1126 break;
1127 for (gsi = gsi_start_phis (post_dom_bb); !gsi_end_p (gsi);)
1128 {
1129 gimple phi = gsi_stmt (gsi);
1130 tree op;
1131 source_location locus;
1132 tree block;
1133
1134 /* PHIs for virtuals have no control dependency relation on them.
1135 We are lost here and must force renaming of the symbol. */
1136 if (!is_gimple_reg (gimple_phi_result (phi)))
1137 {
1138 mark_virtual_phi_result_for_renaming (phi);
1139 remove_phi_node (&gsi, true);
1140 continue;
1141 }
1142
1143 /* Dead PHI do not imply control dependency. */
1144 if (!gimple_plf (phi, STMT_NECESSARY))
1145 {
1146 gsi_next (&gsi);
1147 continue;
1148 }
1149
1150 op = gimple_phi_arg_def (phi, e2->dest_idx);
1151 locus = gimple_phi_arg_location (phi, e2->dest_idx);
1152 block = gimple_phi_arg_block (phi, e2->dest_idx);
1153 add_phi_arg (phi, op, e, locus, block);
1154 /* The resulting PHI if not dead can only be degenerate. */
1155 gcc_assert (degenerate_phi_p (phi));
1156 gsi_next (&gsi);
1157 }
1158 }
1159 return e;
1160 }
1161
1162 /* Remove dead statement pointed to by iterator I. Receives the basic block BB
1163 containing I so that we don't have to look it up. */
1164
1165 static void
1166 remove_dead_stmt (gimple_stmt_iterator *i, basic_block bb)
1167 {
1168 gimple stmt = gsi_stmt (*i);
1169
1170 if (dump_file && (dump_flags & TDF_DETAILS))
1171 {
1172 fprintf (dump_file, "Deleting : ");
1173 print_gimple_stmt (dump_file, stmt, 0, TDF_SLIM);
1174 fprintf (dump_file, "\n");
1175 }
1176
1177 stats.removed++;
1178
1179 /* If we have determined that a conditional branch statement contributes
1180 nothing to the program, then we not only remove it, but we also change
1181 the flow graph so that the current block will simply fall-thru to its
1182 immediate post-dominator. The blocks we are circumventing will be
1183 removed by cleanup_tree_cfg if this change in the flow graph makes them
1184 unreachable. */
1185 if (is_ctrl_stmt (stmt))
1186 {
1187 basic_block post_dom_bb;
1188 edge e, e2;
1189 edge_iterator ei;
1190
1191 post_dom_bb = get_immediate_dominator (CDI_POST_DOMINATORS, bb);
1192
1193 e = find_edge (bb, post_dom_bb);
1194
1195 /* If edge is already there, try to use it. This avoids need to update
1196 PHI nodes. Also watch for cases where post dominator does not exists
1197 or is exit block. These can happen for infinite loops as we create
1198 fake edges in the dominator tree. */
1199 if (e)
1200 ;
1201 else if (! post_dom_bb || post_dom_bb == EXIT_BLOCK_PTR)
1202 e = EDGE_SUCC (bb, 0);
1203 else
1204 e = forward_edge_to_pdom (EDGE_SUCC (bb, 0), post_dom_bb);
1205 gcc_assert (e);
1206 e->probability = REG_BR_PROB_BASE;
1207 e->count = bb->count;
1208
1209 /* The edge is no longer associated with a conditional, so it does
1210 not have TRUE/FALSE flags. */
1211 e->flags &= ~(EDGE_TRUE_VALUE | EDGE_FALSE_VALUE);
1212
1213 /* The lone outgoing edge from BB will be a fallthru edge. */
1214 e->flags |= EDGE_FALLTHRU;
1215
1216 /* Remove the remaining outgoing edges. */
1217 for (ei = ei_start (bb->succs); (e2 = ei_safe_edge (ei)); )
1218 if (e != e2)
1219 {
1220 cfg_altered = true;
1221 remove_edge (e2);
1222 }
1223 else
1224 ei_next (&ei);
1225 }
1226
1227 /* If this is a store into a variable that is being optimized away,
1228 add a debug bind stmt if possible. */
1229 if (MAY_HAVE_DEBUG_STMTS
1230 && gimple_assign_single_p (stmt)
1231 && is_gimple_val (gimple_assign_rhs1 (stmt)))
1232 {
1233 tree lhs = gimple_assign_lhs (stmt);
1234 if ((TREE_CODE (lhs) == VAR_DECL || TREE_CODE (lhs) == PARM_DECL)
1235 && !DECL_IGNORED_P (lhs)
1236 && is_gimple_reg_type (TREE_TYPE (lhs))
1237 && !is_global_var (lhs)
1238 && !DECL_HAS_VALUE_EXPR_P (lhs))
1239 {
1240 tree rhs = gimple_assign_rhs1 (stmt);
1241 gimple note
1242 = gimple_build_debug_bind (lhs, unshare_expr (rhs), stmt);
1243 gsi_insert_after (i, note, GSI_SAME_STMT);
1244 }
1245 }
1246
1247 unlink_stmt_vdef (stmt);
1248 gsi_remove (i, true);
1249 release_defs (stmt);
1250 }
1251
1252 /* Eliminate unnecessary statements. Any instruction not marked as necessary
1253 contributes nothing to the program, and can be deleted. */
1254
1255 static bool
1256 eliminate_unnecessary_stmts (void)
1257 {
1258 bool something_changed = false;
1259 basic_block bb;
1260 gimple_stmt_iterator gsi, psi;
1261 gimple stmt;
1262 tree call;
1263 VEC (basic_block, heap) *h;
1264
1265 if (dump_file && (dump_flags & TDF_DETAILS))
1266 fprintf (dump_file, "\nEliminating unnecessary statements:\n");
1267
1268 clear_special_calls ();
1269
1270 /* Walking basic blocks and statements in reverse order avoids
1271 releasing SSA names before any other DEFs that refer to them are
1272 released. This helps avoid loss of debug information, as we get
1273 a chance to propagate all RHSs of removed SSAs into debug uses,
1274 rather than only the latest ones. E.g., consider:
1275
1276 x_3 = y_1 + z_2;
1277 a_5 = x_3 - b_4;
1278 # DEBUG a => a_5
1279
1280 If we were to release x_3 before a_5, when we reached a_5 and
1281 tried to substitute it into the debug stmt, we'd see x_3 there,
1282 but x_3's DEF, type, etc would have already been disconnected.
1283 By going backwards, the debug stmt first changes to:
1284
1285 # DEBUG a => x_3 - b_4
1286
1287 and then to:
1288
1289 # DEBUG a => y_1 + z_2 - b_4
1290
1291 as desired. */
1292 gcc_assert (dom_info_available_p (CDI_DOMINATORS));
1293 h = get_all_dominated_blocks (CDI_DOMINATORS, single_succ (ENTRY_BLOCK_PTR));
1294
1295 while (VEC_length (basic_block, h))
1296 {
1297 bb = VEC_pop (basic_block, h);
1298
1299 /* Remove dead statements. */
1300 for (gsi = gsi_last_bb (bb); !gsi_end_p (gsi); gsi = psi)
1301 {
1302 stmt = gsi_stmt (gsi);
1303
1304 psi = gsi;
1305 gsi_prev (&psi);
1306
1307 stats.total++;
1308
1309 /* We can mark a call to free as not necessary if the
1310 defining statement of its argument is an allocation
1311 function and that is not necessary itself. */
1312 if (gimple_call_builtin_p (stmt, BUILT_IN_FREE))
1313 {
1314 tree ptr = gimple_call_arg (stmt, 0);
1315 tree callee2;
1316 gimple def_stmt;
1317 if (TREE_CODE (ptr) != SSA_NAME)
1318 continue;
1319 def_stmt = SSA_NAME_DEF_STMT (ptr);
1320 if (!is_gimple_call (def_stmt)
1321 || gimple_plf (def_stmt, STMT_NECESSARY))
1322 continue;
1323 callee2 = gimple_call_fndecl (def_stmt);
1324 if (callee2 == NULL_TREE
1325 || DECL_BUILT_IN_CLASS (callee2) != BUILT_IN_NORMAL
1326 || (DECL_FUNCTION_CODE (callee2) != BUILT_IN_MALLOC
1327 && DECL_FUNCTION_CODE (callee2) != BUILT_IN_CALLOC))
1328 continue;
1329 gimple_set_plf (stmt, STMT_NECESSARY, false);
1330 }
1331
1332 /* If GSI is not necessary then remove it. */
1333 if (!gimple_plf (stmt, STMT_NECESSARY))
1334 {
1335 if (!is_gimple_debug (stmt))
1336 something_changed = true;
1337 remove_dead_stmt (&gsi, bb);
1338 }
1339 else if (is_gimple_call (stmt))
1340 {
1341 tree name = gimple_call_lhs (stmt);
1342
1343 notice_special_calls (stmt);
1344
1345 /* When LHS of var = call (); is dead, simplify it into
1346 call (); saving one operand. */
1347 if (name
1348 && TREE_CODE (name) == SSA_NAME
1349 && !TEST_BIT (processed, SSA_NAME_VERSION (name))
1350 /* Avoid doing so for allocation calls which we
1351 did not mark as necessary, it will confuse the
1352 special logic we apply to malloc/free pair removal. */
1353 && (!(call = gimple_call_fndecl (stmt))
1354 || DECL_BUILT_IN_CLASS (call) != BUILT_IN_NORMAL
1355 || (DECL_FUNCTION_CODE (call) != BUILT_IN_MALLOC
1356 && DECL_FUNCTION_CODE (call) != BUILT_IN_CALLOC
1357 && DECL_FUNCTION_CODE (call) != BUILT_IN_ALLOCA
1358 && (DECL_FUNCTION_CODE (call)
1359 != BUILT_IN_ALLOCA_WITH_ALIGN))))
1360 {
1361 something_changed = true;
1362 if (dump_file && (dump_flags & TDF_DETAILS))
1363 {
1364 fprintf (dump_file, "Deleting LHS of call: ");
1365 print_gimple_stmt (dump_file, stmt, 0, TDF_SLIM);
1366 fprintf (dump_file, "\n");
1367 }
1368
1369 gimple_call_set_lhs (stmt, NULL_TREE);
1370 maybe_clean_or_replace_eh_stmt (stmt, stmt);
1371 update_stmt (stmt);
1372 release_ssa_name (name);
1373 }
1374 }
1375 }
1376 }
1377
1378 VEC_free (basic_block, heap, h);
1379
1380 /* Since we don't track liveness of virtual PHI nodes, it is possible that we
1381 rendered some PHI nodes unreachable while they are still in use.
1382 Mark them for renaming. */
1383 if (cfg_altered)
1384 {
1385 basic_block prev_bb;
1386
1387 find_unreachable_blocks ();
1388
1389 /* Delete all unreachable basic blocks in reverse dominator order. */
1390 for (bb = EXIT_BLOCK_PTR->prev_bb; bb != ENTRY_BLOCK_PTR; bb = prev_bb)
1391 {
1392 prev_bb = bb->prev_bb;
1393
1394 if (!TEST_BIT (bb_contains_live_stmts, bb->index)
1395 || !(bb->flags & BB_REACHABLE))
1396 {
1397 for (gsi = gsi_start_phis (bb); !gsi_end_p (gsi); gsi_next (&gsi))
1398 if (!is_gimple_reg (gimple_phi_result (gsi_stmt (gsi))))
1399 {
1400 bool found = false;
1401 imm_use_iterator iter;
1402
1403 FOR_EACH_IMM_USE_STMT (stmt, iter, gimple_phi_result (gsi_stmt (gsi)))
1404 {
1405 if (!(gimple_bb (stmt)->flags & BB_REACHABLE))
1406 continue;
1407 if (gimple_code (stmt) == GIMPLE_PHI
1408 || gimple_plf (stmt, STMT_NECESSARY))
1409 {
1410 found = true;
1411 BREAK_FROM_IMM_USE_STMT (iter);
1412 }
1413 }
1414 if (found)
1415 mark_virtual_phi_result_for_renaming (gsi_stmt (gsi));
1416 }
1417
1418 if (!(bb->flags & BB_REACHABLE))
1419 {
1420 /* Speed up the removal of blocks that don't
1421 dominate others. Walking backwards, this should
1422 be the common case. ??? Do we need to recompute
1423 dominators because of cfg_altered? */
1424 if (!MAY_HAVE_DEBUG_STMTS
1425 || !first_dom_son (CDI_DOMINATORS, bb))
1426 delete_basic_block (bb);
1427 else
1428 {
1429 h = get_all_dominated_blocks (CDI_DOMINATORS, bb);
1430
1431 while (VEC_length (basic_block, h))
1432 {
1433 bb = VEC_pop (basic_block, h);
1434 prev_bb = bb->prev_bb;
1435 /* Rearrangements to the CFG may have failed
1436 to update the dominators tree, so that
1437 formerly-dominated blocks are now
1438 otherwise reachable. */
1439 if (!!(bb->flags & BB_REACHABLE))
1440 continue;
1441 delete_basic_block (bb);
1442 }
1443
1444 VEC_free (basic_block, heap, h);
1445 }
1446 }
1447 }
1448 }
1449 }
1450 FOR_EACH_BB (bb)
1451 {
1452 /* Remove dead PHI nodes. */
1453 something_changed |= remove_dead_phis (bb);
1454 }
1455
1456 return something_changed;
1457 }
1458
1459
1460 /* Print out removed statement statistics. */
1461
1462 static void
1463 print_stats (void)
1464 {
1465 float percg;
1466
1467 percg = ((float) stats.removed / (float) stats.total) * 100;
1468 fprintf (dump_file, "Removed %d of %d statements (%d%%)\n",
1469 stats.removed, stats.total, (int) percg);
1470
1471 if (stats.total_phis == 0)
1472 percg = 0;
1473 else
1474 percg = ((float) stats.removed_phis / (float) stats.total_phis) * 100;
1475
1476 fprintf (dump_file, "Removed %d of %d PHI nodes (%d%%)\n",
1477 stats.removed_phis, stats.total_phis, (int) percg);
1478 }
1479
1480 /* Initialization for this pass. Set up the used data structures. */
1481
1482 static void
1483 tree_dce_init (bool aggressive)
1484 {
1485 memset ((void *) &stats, 0, sizeof (stats));
1486
1487 if (aggressive)
1488 {
1489 int i;
1490
1491 control_dependence_map = XNEWVEC (bitmap, last_basic_block);
1492 for (i = 0; i < last_basic_block; ++i)
1493 control_dependence_map[i] = BITMAP_ALLOC (NULL);
1494
1495 last_stmt_necessary = sbitmap_alloc (last_basic_block);
1496 sbitmap_zero (last_stmt_necessary);
1497 bb_contains_live_stmts = sbitmap_alloc (last_basic_block);
1498 sbitmap_zero (bb_contains_live_stmts);
1499 }
1500
1501 processed = sbitmap_alloc (num_ssa_names + 1);
1502 sbitmap_zero (processed);
1503
1504 worklist = VEC_alloc (gimple, heap, 64);
1505 cfg_altered = false;
1506 }
1507
1508 /* Cleanup after this pass. */
1509
1510 static void
1511 tree_dce_done (bool aggressive)
1512 {
1513 if (aggressive)
1514 {
1515 int i;
1516
1517 for (i = 0; i < last_basic_block; ++i)
1518 BITMAP_FREE (control_dependence_map[i]);
1519 free (control_dependence_map);
1520
1521 sbitmap_free (visited_control_parents);
1522 sbitmap_free (last_stmt_necessary);
1523 sbitmap_free (bb_contains_live_stmts);
1524 bb_contains_live_stmts = NULL;
1525 }
1526
1527 sbitmap_free (processed);
1528
1529 VEC_free (gimple, heap, worklist);
1530 }
1531
1532 /* Main routine to eliminate dead code.
1533
1534 AGGRESSIVE controls the aggressiveness of the algorithm.
1535 In conservative mode, we ignore control dependence and simply declare
1536 all but the most trivially dead branches necessary. This mode is fast.
1537 In aggressive mode, control dependences are taken into account, which
1538 results in more dead code elimination, but at the cost of some time.
1539
1540 FIXME: Aggressive mode before PRE doesn't work currently because
1541 the dominance info is not invalidated after DCE1. This is
1542 not an issue right now because we only run aggressive DCE
1543 as the last tree SSA pass, but keep this in mind when you
1544 start experimenting with pass ordering. */
1545
1546 static unsigned int
1547 perform_tree_ssa_dce (bool aggressive)
1548 {
1549 struct edge_list *el = NULL;
1550 bool something_changed = 0;
1551
1552 calculate_dominance_info (CDI_DOMINATORS);
1553
1554 /* Preheaders are needed for SCEV to work.
1555 Simple lateches and recorded exits improve chances that loop will
1556 proved to be finite in testcases such as in loop-15.c and loop-24.c */
1557 if (aggressive)
1558 loop_optimizer_init (LOOPS_NORMAL
1559 | LOOPS_HAVE_RECORDED_EXITS);
1560
1561 tree_dce_init (aggressive);
1562
1563 if (aggressive)
1564 {
1565 /* Compute control dependence. */
1566 timevar_push (TV_CONTROL_DEPENDENCES);
1567 calculate_dominance_info (CDI_POST_DOMINATORS);
1568 el = create_edge_list ();
1569 find_all_control_dependences (el);
1570 timevar_pop (TV_CONTROL_DEPENDENCES);
1571
1572 visited_control_parents = sbitmap_alloc (last_basic_block);
1573 sbitmap_zero (visited_control_parents);
1574
1575 mark_dfs_back_edges ();
1576 }
1577
1578 find_obviously_necessary_stmts (el);
1579
1580 if (aggressive)
1581 loop_optimizer_finalize ();
1582
1583 longest_chain = 0;
1584 total_chain = 0;
1585 nr_walks = 0;
1586 chain_ovfl = false;
1587 visited = BITMAP_ALLOC (NULL);
1588 propagate_necessity (el);
1589 BITMAP_FREE (visited);
1590
1591 something_changed |= eliminate_unnecessary_stmts ();
1592 something_changed |= cfg_altered;
1593
1594 /* We do not update postdominators, so free them unconditionally. */
1595 free_dominance_info (CDI_POST_DOMINATORS);
1596
1597 /* If we removed paths in the CFG, then we need to update
1598 dominators as well. I haven't investigated the possibility
1599 of incrementally updating dominators. */
1600 if (cfg_altered)
1601 free_dominance_info (CDI_DOMINATORS);
1602
1603 statistics_counter_event (cfun, "Statements deleted", stats.removed);
1604 statistics_counter_event (cfun, "PHI nodes deleted", stats.removed_phis);
1605
1606 /* Debugging dumps. */
1607 if (dump_file && (dump_flags & (TDF_STATS|TDF_DETAILS)))
1608 print_stats ();
1609
1610 tree_dce_done (aggressive);
1611
1612 free_edge_list (el);
1613
1614 if (something_changed)
1615 return (TODO_update_ssa | TODO_cleanup_cfg | TODO_ggc_collect
1616 | TODO_remove_unused_locals);
1617 else
1618 return 0;
1619 }
1620
1621 /* Pass entry points. */
1622 static unsigned int
1623 tree_ssa_dce (void)
1624 {
1625 return perform_tree_ssa_dce (/*aggressive=*/false);
1626 }
1627
1628 static unsigned int
1629 tree_ssa_dce_loop (void)
1630 {
1631 unsigned int todo;
1632 todo = perform_tree_ssa_dce (/*aggressive=*/false);
1633 if (todo)
1634 {
1635 free_numbers_of_iterations_estimates ();
1636 scev_reset ();
1637 }
1638 return todo;
1639 }
1640
1641 static unsigned int
1642 tree_ssa_cd_dce (void)
1643 {
1644 return perform_tree_ssa_dce (/*aggressive=*/optimize >= 2);
1645 }
1646
1647 static bool
1648 gate_dce (void)
1649 {
1650 return flag_tree_dce != 0;
1651 }
1652
1653 struct gimple_opt_pass pass_dce =
1654 {
1655 {
1656 GIMPLE_PASS,
1657 "dce", /* name */
1658 gate_dce, /* gate */
1659 tree_ssa_dce, /* execute */
1660 NULL, /* sub */
1661 NULL, /* next */
1662 0, /* static_pass_number */
1663 TV_TREE_DCE, /* tv_id */
1664 PROP_cfg | PROP_ssa, /* properties_required */
1665 0, /* properties_provided */
1666 0, /* properties_destroyed */
1667 0, /* todo_flags_start */
1668 TODO_verify_ssa /* todo_flags_finish */
1669 }
1670 };
1671
1672 struct gimple_opt_pass pass_dce_loop =
1673 {
1674 {
1675 GIMPLE_PASS,
1676 "dceloop", /* name */
1677 gate_dce, /* gate */
1678 tree_ssa_dce_loop, /* execute */
1679 NULL, /* sub */
1680 NULL, /* next */
1681 0, /* static_pass_number */
1682 TV_TREE_DCE, /* tv_id */
1683 PROP_cfg | PROP_ssa, /* properties_required */
1684 0, /* properties_provided */
1685 0, /* properties_destroyed */
1686 0, /* todo_flags_start */
1687 TODO_verify_ssa /* todo_flags_finish */
1688 }
1689 };
1690
1691 struct gimple_opt_pass pass_cd_dce =
1692 {
1693 {
1694 GIMPLE_PASS,
1695 "cddce", /* name */
1696 gate_dce, /* gate */
1697 tree_ssa_cd_dce, /* execute */
1698 NULL, /* sub */
1699 NULL, /* next */
1700 0, /* static_pass_number */
1701 TV_TREE_CD_DCE, /* tv_id */
1702 PROP_cfg | PROP_ssa, /* properties_required */
1703 0, /* properties_provided */
1704 0, /* properties_destroyed */
1705 0, /* todo_flags_start */
1706 TODO_verify_ssa
1707 | TODO_verify_flow /* todo_flags_finish */
1708 }
1709 };