Hi Martin,

Your below patch broke linux kernel build on 32-bit ARM.  Is this on your 
radar?  Do you need help reproducing this?

Regards,

--
Maxim Kuvyrkov
https://www.linaro.org

> On 21 Sep 2021, at 05:11, ci_not...@linaro.org wrote:
> 
> [TCWG CI] Regression caused by gcc: Factor predidacte analysis out of 
> tree-ssa-uninit.c into its own module.:
> commit 94c12ffac234b29a702aa7b6730f2678265857c8
> Author: Martin Sebor <mse...@redhat.com>
> 
>    Factor predidacte analysis out of tree-ssa-uninit.c into its own module.
> 
> Results regressed to
> # reset_artifacts:
> -10
> # build_abe binutils:
> -9
> # build_abe stage1:
> -5
> # build_abe qemu:
> -2
> # linux_n_obj:
> 6240
> # First few build errors in logs:
> 
> from
> # reset_artifacts:
> -10
> # build_abe binutils:
> -9
> # build_abe stage1:
> -5
> # build_abe qemu:
> -2
> # linux_n_obj:
> 6999
> # linux build successful:
> all
> # linux boot successful:
> boot
> 
> THIS IS THE END OF INTERESTING STUFF.  BELOW ARE LINKS TO BUILDS, 
> REPRODUCTION INSTRUCTIONS, AND THE RAW COMMIT.
> 
> This commit has regressed these CI configurations:
> - tcwg_kernel/gnu-master-arm-mainline-defconfig
> 
> First_bad build: 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/build-94c12ffac234b29a702aa7b6730f2678265857c8/
> Last_good build: 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/build-51166eb2c534692c3c7779def24f83c8c3811b98/
> Baseline build: 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/build-baseline/
> Even more details: 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/
> 
> Reproduce builds:
> <cut>
> mkdir investigate-gcc-94c12ffac234b29a702aa7b6730f2678265857c8
> cd investigate-gcc-94c12ffac234b29a702aa7b6730f2678265857c8
> 
> # Fetch scripts
> git clone https://git.linaro.org/toolchain/jenkins-scripts
> 
> # Fetch manifests and test.sh script
> mkdir -p artifacts/manifests
> curl -o artifacts/manifests/build-baseline.sh 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/manifests/build-baseline.sh
>  --fail
> curl -o artifacts/manifests/build-parameters.sh 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/manifests/build-parameters.sh
>  --fail
> curl -o artifacts/test.sh 
> https://ci.linaro.org/job/tcwg_kernel-gnu-bisect-gnu-master-arm-mainline-defconfig/26/artifact/artifacts/test.sh
>  --fail
> chmod +x artifacts/test.sh
> 
> # Reproduce the baseline build (build all pre-requisites)
> ./jenkins-scripts/tcwg_kernel-build.sh @@ 
> artifacts/manifests/build-baseline.sh
> 
> # Save baseline build state (which is then restored in artifacts/test.sh)
> mkdir -p ./bisect
> rsync -a --del --delete-excluded --exclude /bisect/ --exclude /artifacts/ 
> --exclude /gcc/ ./ ./bisect/baseline/
> 
> cd gcc
> 
> # Reproduce first_bad build
> git checkout --detach 94c12ffac234b29a702aa7b6730f2678265857c8
> ../artifacts/test.sh
> 
> # Reproduce last_good build
> git checkout --detach 51166eb2c534692c3c7779def24f83c8c3811b98
> ../artifacts/test.sh
> 
> cd ..
> </cut>
> 
> Full commit (up to 1000 lines):
> <cut>
> commit 94c12ffac234b29a702aa7b6730f2678265857c8
> Author: Martin Sebor <mse...@redhat.com>
> Date:   Fri Sep 17 15:39:13 2021 -0600
> 
>    Factor predidacte analysis out of tree-ssa-uninit.c into its own module.
> 
>    gcc/ChangeLog:
> 
>            * Makefile.in (OBJS): Add gimple-predicate-analysis.o.
>            * tree-ssa-uninit.c (max_phi_args): Move to 
> gimple-predicate-analysis.
>            (MASK_SET_BIT, MASK_TEST_BIT, MASK_EMPTY): Same.
>            (check_defs): Add comment.
>            (can_skip_redundant_opnd): Update comment.
>            (compute_uninit_opnds_pos): Adjust to namespace change.
>            (find_pdom): Move to gimple-predicate-analysis.cc.
>            (find_dom): Same.
>            (struct uninit_undef_val_t): New.
>            (is_non_loop_exit_postdominating): Move to 
> gimple-predicate-analysis.cc.
>            (find_control_equiv_block): Same.
>            (MAX_NUM_CHAINS, MAX_CHAIN_LEN, MAX_POSTDOM_CHECK): Same.
>            (MAX_SWITCH_CASES): Same.
>            (compute_control_dep_chain): Same.
>            (find_uninit_use): Use predicate analyzer.
>            (struct pred_info): Move to gimple-predicate-analysis.
>            (convert_control_dep_chain_into_preds): Same.
>            (find_predicates): Same.
>            (collect_phi_def_edges): Same.
>            (warn_uninitialized_phi): Use predicate analyzer.
>            (find_def_preds): Move to gimple-predicate-analysis.
>            (dump_pred_info): Same.
>            (dump_pred_chain): Same.
>            (dump_predicates): Same.
>            (destroy_predicate_vecs): Remove.
>            (execute_late_warn_uninitialized): New.
>            (get_cmp_code): Move to gimple-predicate-analysis.
>            (is_value_included_in): Same.
>            (value_sat_pred_p): Same.
>            (find_matching_predicate_in_rest_chains): Same.
>            (is_use_properly_guarded): Same.
>            (prune_uninit_phi_opnds): Same.
>            (find_var_cmp_const): Same.
>            (use_pred_not_overlap_with_undef_path_pred): Same.
>            (pred_equal_p): Same.
>            (is_neq_relop_p): Same.
>            (is_neq_zero_form_p): Same.
>            (pred_expr_equal_p): Same.
>            (is_pred_expr_subset_of): Same.
>            (is_pred_chain_subset_of): Same.
>            (is_included_in): Same.
>            (is_superset_of): Same.
>            (pred_neg_p): Same.
>            (simplify_pred): Same.
>            (simplify_preds_2): Same.
>            (simplify_preds_3): Same.
>            (simplify_preds_4): Same.
>            (simplify_preds): Same.
>            (push_pred): Same.
>            (push_to_worklist): Same.
>            (get_pred_info_from_cmp): Same.
>            (is_degenerated_phi): Same.
>            (normalize_one_pred_1): Same.
>            (normalize_one_pred): Same.
>            (normalize_one_pred_chain): Same.
>            (normalize_preds): Same.
>            (can_one_predicate_be_invalidated_p): Same.
>            (can_chain_union_be_invalidated_p): Same.
>            (uninit_uses_cannot_happen): Same.
>            (pass_late_warn_uninitialized::execute): Define.
>            * gimple-predicate-analysis.cc: New file.
>            * gimple-predicate-analysis.h: New file.
> ---
> gcc/Makefile.in                  |    1 +
> gcc/gimple-predicate-analysis.cc | 2400 +++++++++++++++++++++++++++++++++++++
> gcc/gimple-predicate-analysis.h  |  158 +++
> gcc/tree-ssa-uninit.c            | 2431 +++-----------------------------------
> 4 files changed, 2741 insertions(+), 2249 deletions(-)
> 
> diff --git a/gcc/Makefile.in b/gcc/Makefile.in
> index b8229adf580..f36ffa4740b 100644
> --- a/gcc/Makefile.in
> +++ b/gcc/Makefile.in
> @@ -1394,6 +1394,7 @@ OBJS = \
>       gimple-loop-jam.o \
>       gimple-loop-versioning.o \
>       gimple-low.o \
> +     gimple-predicate-analysis.o \
>       gimple-pretty-print.o \
>       gimple-range.o \
>       gimple-range-cache.o \
> diff --git a/gcc/gimple-predicate-analysis.cc 
> b/gcc/gimple-predicate-analysis.cc
> new file mode 100644
> index 00000000000..3404f2d630a
> --- /dev/null
> +++ b/gcc/gimple-predicate-analysis.cc
> @@ -0,0 +1,2400 @@
> +/* Support for simple predicate analysis.
> +
> +   Copyright (C) 2001-2021 Free Software Foundation, Inc.
> +   Contributed by Xinliang David Li <davi...@google.com>
> +   Generalized by Martin Sebor <mse...@redhat.com>
> +
> +   This file is part of GCC.
> +
> +   GCC is free software; you can redistribute it and/or modify
> +   it under the terms of the GNU General Public License as published by
> +   the Free Software Foundation; either version 3, or (at your option)
> +   any later version.
> +
> +   GCC is distributed in the hope that it will be useful,
> +   but WITHOUT ANY WARRANTY; without even the implied warranty of
> +   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> +   GNU General Public License for more details.
> +
> +   You should have received a copy of the GNU General Public License
> +   along with GCC; see the file COPYING3.  If not see
> +   <http://www.gnu.org/licenses/>.  */
> +
> +#define INCLUDE_STRING
> +#include "config.h"
> +#include "system.h"
> +#include "coretypes.h"
> +#include "backend.h"
> +#include "tree.h"
> +#include "gimple.h"
> +#include "tree-pass.h"
> +#include "ssa.h"
> +#include "gimple-pretty-print.h"
> +#include "diagnostic-core.h"
> +#include "fold-const.h"
> +#include "gimple-iterator.h"
> +#include "tree-ssa.h"
> +#include "tree-cfg.h"
> +#include "cfghooks.h"
> +#include "attribs.h"
> +#include "builtins.h"
> +#include "calls.h"
> +#include "value-query.h"
> +
> +#include "gimple-predicate-analysis.h"
> +
> +#define DEBUG_PREDICATE_ANALYZER 1
> +
> +/* Find the immediate postdominator of the specified basic block BB.  */
> +
> +static inline basic_block
> +find_pdom (basic_block bb)
> +{
> +  basic_block exit_bb = EXIT_BLOCK_PTR_FOR_FN (cfun);
> +  if (bb == exit_bb)
> +    return exit_bb;
> +
> +  if (basic_block pdom = get_immediate_dominator (CDI_POST_DOMINATORS, bb))
> +    return pdom;
> +
> +  return exit_bb;
> +}
> +
> +/* Find the immediate dominator of the specified basic block BB.  */
> +
> +static inline basic_block
> +find_dom (basic_block bb)
> +{
> +  basic_block entry_bb = ENTRY_BLOCK_PTR_FOR_FN (cfun);
> +  if (bb == entry_bb)
> +    return entry_bb;
> +
> +  if (basic_block dom = get_immediate_dominator (CDI_DOMINATORS, bb))
> +    return dom;
> +
> +  return entry_bb;
> +}
> +
> +/* Return true if BB1 is postdominating BB2 and BB1 is not a loop exit
> +   bb.  The loop exit bb check is simple and does not cover all cases.  */
> +
> +static bool
> +is_non_loop_exit_postdominating (basic_block bb1, basic_block bb2)
> +{
> +  if (!dominated_by_p (CDI_POST_DOMINATORS, bb2, bb1))
> +    return false;
> +
> +  if (single_pred_p (bb1) && !single_succ_p (bb2))
> +    return false;
> +
> +  return true;
> +}
> +
> +/* Find BB's closest postdominator that is its control equivalent (i.e.,
> +   that's controlled by the same predicate).  */
> +
> +static inline basic_block
> +find_control_equiv_block (basic_block bb)
> +{
> +  basic_block pdom = find_pdom (bb);
> +
> +  /* Skip the postdominating bb that is also a loop exit.  */
> +  if (!is_non_loop_exit_postdominating (pdom, bb))
> +    return NULL;
> +
> +  /* If the postdominator is dominated by BB, return it.  */
> +  if (dominated_by_p (CDI_DOMINATORS, pdom, bb))
> +    return pdom;
> +
> +  return NULL;
> +}
> +
> +/* Return true if X1 is the negation of X2.  */
> +
> +static inline bool
> +pred_neg_p (const pred_info &x1, const pred_info &x2)
> +{
> +  if (!operand_equal_p (x1.pred_lhs, x2.pred_lhs, 0)
> +      || !operand_equal_p (x1.pred_rhs, x2.pred_rhs, 0))
> +    return false;
> +
> +  tree_code c1 = x1.cond_code, c2;
> +  if (x1.invert == x2.invert)
> +    c2 = invert_tree_comparison (x2.cond_code, false);
> +  else
> +    c2 = x2.cond_code;
> +
> +  return c1 == c2;
> +}
> +
> +/* Return whether the condition (VAL CMPC BOUNDARY) is true.  */
> +
> +static bool
> +is_value_included_in (tree val, tree boundary, tree_code cmpc)
> +{
> +  /* Only handle integer constant here.  */
> +  if (TREE_CODE (val) != INTEGER_CST || TREE_CODE (boundary) != INTEGER_CST)
> +    return true;
> +
> +  bool inverted = false;
> +  if (cmpc == GE_EXPR || cmpc == GT_EXPR || cmpc == NE_EXPR)
> +    {
> +      cmpc = invert_tree_comparison (cmpc, false);
> +      inverted = true;
> +    }
> +
> +  bool result;
> +  if (cmpc == EQ_EXPR)
> +    result = tree_int_cst_equal (val, boundary);
> +  else if (cmpc == LT_EXPR)
> +    result = tree_int_cst_lt (val, boundary);
> +  else
> +    {
> +      gcc_assert (cmpc == LE_EXPR);
> +      result = tree_int_cst_le (val, boundary);
> +    }
> +
> +  if (inverted)
> +    result ^= 1;
> +
> +  return result;
> +}
> +
> +/* Format the vector of edges EV as a string.  */
> +
> +static std::string
> +format_edge_vec (const vec<edge> &ev)
> +{
> +  std::string str;
> +
> +  unsigned n = ev.length ();
> +  for (unsigned i = 0; i < n; ++i)
> +    {
> +      char es[32];
> +      const_edge e = ev[i];
> +      sprintf (es, "%u", e->src->index);
> +      str += es;
> +      if (i + 1 < n)
> +     str += " -> ";
> +    }
> +  return str;
> +}
> +
> +/* Format the first N elements of the array of vector of edges EVA as
> +   a string.  */
> +
> +static std::string
> +format_edge_vecs (const vec<edge> eva[], unsigned n)
> +{
> +  std::string str;
> +
> +  for (unsigned i = 0; i != n; ++i)
> +    {
> +      str += '{';
> +      str += format_edge_vec (eva[i]);
> +      str += '}';
> +      if (i + 1 < n)
> +     str += ", ";
> +    }
> +  return str;
> +}
> +
> +/* Dump a single pred_info to DUMP_FILE.  */
> +
> +static void
> +dump_pred_info (const pred_info &pred)
> +{
> +  if (pred.invert)
> +    fprintf (dump_file, "NOT (");
> +  print_generic_expr (dump_file, pred.pred_lhs);
> +  fprintf (dump_file, " %s ", op_symbol_code (pred.cond_code));
> +  print_generic_expr (dump_file, pred.pred_rhs);
> +  if (pred.invert)
> +    fputc (')', dump_file);
> +}
> +
> +/* Dump a pred_chain to DUMP_FILE.  */
> +
> +static void
> +dump_pred_chain (const pred_chain &chain)
> +{
> +  unsigned np = chain.length ();
> +  if (np > 1)
> +    fprintf (dump_file, "AND (");
> +
> +  for (unsigned j = 0; j < np; j++)
> +    {
> +      dump_pred_info (chain[j]);
> +      if (j < np - 1)
> +     fprintf (dump_file, ", ");
> +      else if (j > 0)
> +     fputc (')', dump_file);
> +    }
> +}
> +
> +/* Dump the predicate chain PREDS for STMT, prefixed by MSG.  */
> +
> +static void
> +dump_predicates (gimple *stmt, const pred_chain_union &preds, const char 
> *msg)
> +{
> +  fprintf (dump_file, "%s", msg);
> +  if (stmt)
> +    {
> +      print_gimple_stmt (dump_file, stmt, 0);
> +      fprintf (dump_file, "is guarded by:\n");
> +    }
> +
> +  unsigned np = preds.length ();
> +  if (np > 1)
> +    fprintf (dump_file, "OR (");
> +  for (unsigned i = 0; i < np; i++)
> +    {
> +      dump_pred_chain (preds[i]);
> +      if (i < np - 1)
> +     fprintf (dump_file, ", ");
> +      else if (i > 0)
> +     fputc (')', dump_file);
> +    }
> +  fputc ('\n', dump_file);
> +}
> +
> +/* Dump the first NCHAINS elements of the DEP_CHAINS array into DUMP_FILE.  
> */
> +
> +static void
> +dump_dep_chains (const auto_vec<edge> dep_chains[], unsigned nchains)
> +{
> +  if (!dump_file)
> +    return;
> +
> +  for (unsigned i = 0; i != nchains; ++i)
> +    {
> +      const auto_vec<edge> &v = dep_chains[i];
> +      unsigned n = v.length ();
> +      for (unsigned j = 0; j != n; ++j)
> +     {
> +       fprintf (dump_file, "%u", v[j]->src->index);
> +       if (j + 1 < n)
> +         fprintf (dump_file, " -> ");
> +     }
> +      fputc ('\n', dump_file);
> +    }
> +}
> +
> +/* Return the 'normalized' conditional code with operand swapping
> +   and condition inversion controlled by SWAP_COND and INVERT.  */
> +
> +static tree_code
> +get_cmp_code (tree_code orig_cmp_code, bool swap_cond, bool invert)
> +{
> +  tree_code tc = orig_cmp_code;
> +
> +  if (swap_cond)
> +    tc = swap_tree_comparison (orig_cmp_code);
> +  if (invert)
> +    tc = invert_tree_comparison (tc, false);
> +
> +  switch (tc)
> +    {
> +    case LT_EXPR:
> +    case LE_EXPR:
> +    case GT_EXPR:
> +    case GE_EXPR:
> +    case EQ_EXPR:
> +    case NE_EXPR:
> +      break;
> +    default:
> +      return ERROR_MARK;
> +    }
> +  return tc;
> +}
> +
> +/* Return true if PRED is common among all predicate chains in PREDS
> +   (and therefore can be factored out).  */
> +
> +static bool
> +find_matching_predicate_in_rest_chains (const pred_info &pred,
> +                                     const pred_chain_union &preds)
> +{
> +  /* Trival case.  */
> +  if (preds.length () == 1)
> +    return true;
> +
> +  for (unsigned i = 1; i < preds.length (); i++)
> +    {
> +      bool found = false;
> +      const pred_chain &chain = preds[i];
> +      unsigned n = chain.length ();
> +      for (unsigned j = 0; j < n; j++)
> +     {
> +       const pred_info &pred2 = chain[j];
> +       /* Can relax the condition comparison to not use address
> +          comparison.  However, the most common case is that
> +          multiple control dependent paths share a common path
> +          prefix, so address comparison should be ok.  */
> +       if (operand_equal_p (pred2.pred_lhs, pred.pred_lhs, 0)
> +           && operand_equal_p (pred2.pred_rhs, pred.pred_rhs, 0)
> +           && pred2.invert == pred.invert)
> +         {
> +           found = true;
> +           break;
> +         }
> +     }
> +      if (!found)
> +     return false;
> +    }
> +  return true;
> +}
> +
> +/* Find a predicate to examine against paths of interest.  If there
> +   is no predicate of the "FLAG_VAR CMP CONST" form, try to find one
> +   of that's the form "FLAG_VAR CMP FLAG_VAR" with value range info.
> +   PHI is the phi node whose incoming (interesting) paths need to be
> +   examined.  On success, return the comparison code, set defintion
> +   gimple of FLAG_DEF and BOUNDARY_CST.  Otherwise return ERROR_MARK.  */
> +
> +static tree_code
> +find_var_cmp_const (pred_chain_union preds, gphi *phi, gimple **flag_def,
> +                 tree *boundary_cst)
> +{
> +  tree_code vrinfo_code = ERROR_MARK;
> +  gimple *vrinfo_def = NULL;
> +  tree vrinfo_cst = NULL;
> +
> +  gcc_assert (preds.length () > 0);
> +  pred_chain chain = preds[0];
> +  for (unsigned i = 0; i < chain.length (); i++)
> +    {
> +      bool use_vrinfo_p = false;
> +      const pred_info &pred = chain[i];
> +      tree cond_lhs = pred.pred_lhs;
> +      tree cond_rhs = pred.pred_rhs;
> +      if (cond_lhs == NULL_TREE || cond_rhs == NULL_TREE)
> +     continue;
> +
> +      tree_code code = get_cmp_code (pred.cond_code, false, pred.invert);
> +      if (code == ERROR_MARK)
> +     continue;
> +
> +      /* Convert to the canonical form SSA_NAME CMP CONSTANT.  */
> +      if (TREE_CODE (cond_lhs) == SSA_NAME
> +       && is_gimple_constant (cond_rhs))
> +     ;
> +      else if (TREE_CODE (cond_rhs) == SSA_NAME
> +            && is_gimple_constant (cond_lhs))
> +     {
> +       std::swap (cond_lhs, cond_rhs);
> +       if ((code = get_cmp_code (code, true, false)) == ERROR_MARK)
> +         continue;
> +     }
> +      /* Check if we can take advantage of FLAG_VAR COMP FLAG_VAR predicate
> +      with value range info.  Note only first of such case is handled.  */
> +      else if (vrinfo_code == ERROR_MARK
> +            && TREE_CODE (cond_lhs) == SSA_NAME
> +            && TREE_CODE (cond_rhs) == SSA_NAME)
> +     {
> +       gimple* lhs_def = SSA_NAME_DEF_STMT (cond_lhs);
> +       if (!lhs_def || gimple_code (lhs_def) != GIMPLE_PHI
> +           || gimple_bb (lhs_def) != gimple_bb (phi))
> +         {
> +           std::swap (cond_lhs, cond_rhs);
> +           if ((code = get_cmp_code (code, true, false)) == ERROR_MARK)
> +             continue;
> +         }
> +
> +       /* Check value range info of rhs, do following transforms:
> +            flag_var < [min, max]  ->  flag_var < max
> +            flag_var > [min, max]  ->  flag_var > min
> +
> +          We can also transform LE_EXPR/GE_EXPR to LT_EXPR/GT_EXPR:
> +            flag_var <= [min, max] ->  flag_var < [min, max+1]
> +            flag_var >= [min, max] ->  flag_var > [min-1, max]
> +          if no overflow/wrap.  */
> +       tree type = TREE_TYPE (cond_lhs);
> +       value_range r;
> +       if (!INTEGRAL_TYPE_P (type)
> +           || !get_range_query (cfun)->range_of_expr (r, cond_rhs)
> +           || r.kind () != VR_RANGE)
> +         continue;
> +
> +       wide_int min = r.lower_bound ();
> +       wide_int max = r.upper_bound ();
> +       if (code == LE_EXPR
> +           && max != wi::max_value (TYPE_PRECISION (type), TYPE_SIGN (type)))
> +         {
> +           code = LT_EXPR;
> +           max = max + 1;
> +         }
> +       if (code == GE_EXPR
> +           && min != wi::min_value (TYPE_PRECISION (type), TYPE_SIGN (type)))
> +         {
> +           code = GT_EXPR;
> +           min = min - 1;
> +         }
> +       if (code == LT_EXPR)
> +         cond_rhs = wide_int_to_tree (type, max);
> +       else if (code == GT_EXPR)
> +         cond_rhs = wide_int_to_tree (type, min);
> +       else
> +         continue;
> +
> +       use_vrinfo_p = true;
> +     }
> +      else
> +     continue;
> +
> +      if ((*flag_def = SSA_NAME_DEF_STMT (cond_lhs)) == NULL)
> +     continue;
> +
> +      if (gimple_code (*flag_def) != GIMPLE_PHI
> +       || gimple_bb (*flag_def) != gimple_bb (phi)
> +       || !find_matching_predicate_in_rest_chains (pred, preds))
> +     continue;
> +
> +      /* Return if any "flag_var comp const" predicate is found.  */
> +      if (!use_vrinfo_p)
> +     {
> +       *boundary_cst = cond_rhs;
> +       return code;
> +     }
> +      /* Record if any "flag_var comp flag_var[vinfo]" predicate is found.  
> */
> +      else if (vrinfo_code == ERROR_MARK)
> +     {
> +       vrinfo_code = code;
> +       vrinfo_def = *flag_def;
> +       vrinfo_cst = cond_rhs;
> +     }
> +    }
> +  /* Return the "flag_var cmp flag_var[vinfo]" predicate we found.  */
> +  if (vrinfo_code != ERROR_MARK)
> +    {
> +      *flag_def = vrinfo_def;
> +      *boundary_cst = vrinfo_cst;
> +    }
> +  return vrinfo_code;
> +}
> +
> +/* Return true if all interesting opnds are pruned, false otherwise.
> +   PHI is the phi node with interesting operands, OPNDS is the bitmap
> +   of the interesting operand positions, FLAG_DEF is the statement
> +   defining the flag guarding the use of the PHI output, BOUNDARY_CST
> +   is the const value used in the predicate associated with the flag,
> +   CMP_CODE is the comparison code used in the predicate, VISITED_PHIS
> +   is the pointer set of phis visited, and VISITED_FLAG_PHIS is
> +   the pointer to the pointer set of flag definitions that are also
> +   phis.
> +
> +   Example scenario:
> +
> +   BB1:
> +     flag_1 = phi <0, 1>                     // (1)
> +     var_1  = phi <undef, some_val>
> +
> +
> +   BB2:
> +     flag_2 = phi <0,   flag_1, flag_1>              // (2)
> +     var_2  = phi <undef, var_1, var_1>
> +     if (flag_2 == 1)
> +       goto BB3;
> +
> +   BB3:
> +     use of var_2                            // (3)
> +
> +   Because some flag arg in (1) is not constant, if we do not look into
> +   the flag phis recursively, it is conservatively treated as unknown and
> +   var_1 is thought to flow into use at (3).  Since var_1 is potentially
> +   uninitialized a false warning will be emitted.
> +   Checking recursively into (1), the compiler can find out that only
> +   some_val (which is defined) can flow into (3) which is OK.  */
> +
> +static bool
> +prune_phi_opnds (gphi *phi, unsigned opnds, gphi *flag_def,
> +              tree boundary_cst, tree_code cmp_code,
> +              predicate::func_t &eval,
> +              hash_set<gphi *> *visited_phis,
> +              bitmap *visited_flag_phis)
> +{
> +  /* The Boolean predicate guarding the PHI definition.  Initialized
> +     lazily from PHI in the first call to is_use_guarded() and cached
> +     for subsequent iterations.  */
> +  predicate def_preds (eval);
> +
> +  unsigned n = MIN (eval.max_phi_args, gimple_phi_num_args (flag_def));
> +  for (unsigned i = 0; i < n; i++)
> +    {
> +      if (!MASK_TEST_BIT (opnds, i))
> +     continue;
> +
> +      tree flag_arg = gimple_phi_arg_def (flag_def, i);
> +      if (!is_gimple_constant (flag_arg))
> +     {
> +       if (TREE_CODE (flag_arg) != SSA_NAME)
> +         return false;
> +
> +       gphi *flag_arg_def = dyn_cast<gphi *> (SSA_NAME_DEF_STMT (flag_arg));
> +       if (!flag_arg_def)
> +         return false;
> +
> +       tree phi_arg = gimple_phi_arg_def (phi, i);
> +       if (TREE_CODE (phi_arg) != SSA_NAME)
> +         return false;
> +
> +       gphi *phi_arg_def = dyn_cast<gphi *> (SSA_NAME_DEF_STMT (phi_arg));
> +       if (!phi_arg_def)
> +         return false;
> +
> +       if (gimple_bb (phi_arg_def) != gimple_bb (flag_arg_def))
> +         return false;
> +
> +       if (!*visited_flag_phis)
> +         *visited_flag_phis = BITMAP_ALLOC (NULL);
> +
> +       tree phi_result = gimple_phi_result (flag_arg_def);
> +       if (bitmap_bit_p (*visited_flag_phis, SSA_NAME_VERSION (phi_result)))
> +         return false;
> +
> +       bitmap_set_bit (*visited_flag_phis, SSA_NAME_VERSION (phi_result));
> +
> +       /* Now recursively try to prune the interesting phi args.  */
> +       unsigned opnds_arg_phi = eval.phi_arg_set (phi_arg_def);
> +       if (!prune_phi_opnds (phi_arg_def, opnds_arg_phi, flag_arg_def,
> +                             boundary_cst, cmp_code, eval, visited_phis,
> +                             visited_flag_phis))
> +         return false;
> +
> +       bitmap_clear_bit (*visited_flag_phis, SSA_NAME_VERSION (phi_result));
> +       continue;
> +     }
> +
> +      /* Now check if the constant is in the guarded range.  */
> +      if (is_value_included_in (flag_arg, boundary_cst, cmp_code))
> +     {
> +       /* Now that we know that this undefined edge is not pruned.
> +          If the operand is defined by another phi, we can further
> +          prune the incoming edges of that phi by checking
> +          the predicates of this operands.  */
> +
> +       tree opnd = gimple_phi_arg_def (phi, i);
> +       gimple *opnd_def = SSA_NAME_DEF_STMT (opnd);
> +       if (gphi *opnd_def_phi = dyn_cast <gphi *> (opnd_def))
> +         {
> +           unsigned opnds2 = eval.phi_arg_set (opnd_def_phi);
> +           if (!MASK_EMPTY (opnds2))
> +             {
> +               edge opnd_edge = gimple_phi_arg_edge (phi, i);
> +               if (def_preds.is_use_guarded (phi, opnd_edge->src,
> +                                             opnd_def_phi, opnds2,
> +                                             visited_phis))
> +                 return false;
> +             }
> +         }
> +       else
> +         return false;
> +     }
> +    }
> +
> +  return true;
> +}
> +
> +/* Recursively compute the set PHI's incoming edges with "uninteresting"
> +   operands of a phi chain, i.e., those for which EVAL returns false.
> +   CD_ROOT is the control dependence root from which edges are collected
> +   up the CFG nodes that it's dominated by.  *EDGES holds the result, and
> +   VISITED is used for detecting cycles.  */
> +
> +static void
> +collect_phi_def_edges (gphi *phi, basic_block cd_root, auto_vec<edge> *edges,
> +                    predicate::func_t &eval, hash_set<gimple *> *visited)
> +{
> +  if (visited->elements () == 0
> +      && DEBUG_PREDICATE_ANALYZER
> +      && dump_file)
> +    {
> +      fprintf (dump_file, "%s for cd_root %u and ",
> +            __func__, cd_root->index);
> +      print_gimple_stmt (dump_file, phi, 0);
> +
> +    }
> +
> +  if (visited->add (phi))
> +    return;
> +
> +  unsigned n = gimple_phi_num_args (phi);
> +  for (unsigned i = 0; i < n; i++)
> +    {
> +      edge opnd_edge = gimple_phi_arg_edge (phi, i);
> +      tree opnd = gimple_phi_arg_def (phi, i);
> +
> +      if (TREE_CODE (opnd) == SSA_NAME)
> +     {
> +       gimple *def = SSA_NAME_DEF_STMT (opnd);
> +
> +       if (gimple_code (def) == GIMPLE_PHI
> +           && dominated_by_p (CDI_DOMINATORS, gimple_bb (def), cd_root))
> +         collect_phi_def_edges (as_a<gphi *> (def), cd_root, edges, eval,
> +                                visited);
> +       else if (!eval (opnd))
> +         {
> +           if (dump_file && (dump_flags & TDF_DETAILS))
> +             {
> +               fprintf (dump_file,
> +                        "\tFound def edge %i -> %i for cd_root %i "
> +                        "and operand %u of: ",
> +                        opnd_edge->src->index, opnd_edge->dest->index,
> +                        cd_root->index, i);
> +               print_gimple_stmt (dump_file, phi, 0);
> +             }
> +           edges->safe_push (opnd_edge);
> +         }
> +     }
> +      else
> +     {
> +       if (dump_file && (dump_flags & TDF_DETAILS))
> +         {
> +           fprintf (dump_file,
> +                    "\tFound def edge %i -> %i for cd_root %i "
> +                    "and operand %u of: ",
> +                    opnd_edge->src->index, opnd_edge->dest->index,
> +                    cd_root->index, i);
> +           print_gimple_stmt (dump_file, phi, 0);
> +         }
> +
> +       if (!eval (opnd))
> +         edges->safe_push (opnd_edge);
> +     }
> +    }
> +}
> +
> +/* Return an expression corresponding to the predicate PRED.  */
> +
> +static tree
> +build_pred_expr (const pred_info &pred)
> +{
> +  tree_code cond_code = pred.cond_code;
> +  tree lhs = pred.pred_lhs;
> +  tree rhs = pred.pred_rhs;
> +
> +  if (pred.invert)
> +    cond_code = invert_tree_comparison (cond_code, false);
> +
> +  return build2 (cond_code, TREE_TYPE (lhs), lhs, rhs);
> +}
> +
> +/* Return an expression corresponding to PREDS.  */
> +
> +static tree
> +build_pred_expr (const pred_chain_union &preds, bool invert = false)
> +{
> +  tree_code code = invert ? TRUTH_AND_EXPR : TRUTH_OR_EXPR;
> +  tree_code subcode = invert ? TRUTH_OR_EXPR : TRUTH_AND_EXPR;
> +
> +  tree expr = NULL_TREE;
> +  for (unsigned i = 0; i != preds.length (); ++i)
> +    {
> +      tree subexpr = NULL_TREE;
> +      for (unsigned j = 0; j != preds[i].length (); ++j)
> +       {
> +         const pred_info &pi = preds[i][j];
> +         tree cond = build_pred_expr (pi);
> +      if (invert)
> +        cond = invert_truthvalue (cond);
> +         subexpr = subexpr ? build2 (subcode, boolean_type_node,
> +                                     subexpr, cond) : cond;
> +       }
> +      if (expr)
> +       expr = build2 (code, boolean_type_node, expr, subexpr);
> +      else
> +       expr = subexpr;
> +    }
> +
> +  return expr;
> +}
> +
> +/* Return a bitset of all PHI arguments or zero if there are too many.  */
> +
> +unsigned
> +predicate::func_t::phi_arg_set (gphi *phi)
> +{
> +  unsigned n = gimple_phi_num_args (phi);
> +
> +  if (max_phi_args < n)
> +    return 0;
> +
> +  /* Set the least significant N bits.  */
> +  return (1U << n) - 1;
> +}
> +
> +/* Determine if the predicate set of the use does not overlap with that
> +   of the interesting paths.  The most common senario of guarded use is
> +   in Example 1:
> +     Example 1:
> +        if (some_cond)
> +        {
> +           x = ...;   // set x to valid
> +           flag = true;
> +        }
> +
> +         ... some code ...
> +
> +        if (flag)
> +           use (x);   // use when x is valid
> +
> +     The real world examples are usually more complicated, but similar
> +     and usually result from inlining:
> +
> +      bool init_func (int * x)
> +      {
> +          if (some_cond)
> +             return false;
> +          *x  =  ...;   // set *x to valid
> +          return true;
> +      }
> +
> +      void foo (..)
> +      {
> +          int x;
> +
> +          if (!init_func (&x))
> +             return;
> +
> +          .. some_code ...
> +          use (x);      // use when x is valid
> +      }
> +
> +     Another possible use scenario is in the following trivial example:
> +
> +     Example 2:
> +       if (n > 0)
> +          x = 1;
> +       ...
> +       if (n > 0)
> +         {
> +           if (m < 2)
> +              ... = x;
> +         }
> +
> +     Predicate analysis needs to compute the composite predicate:
> +
> +       1) 'x' use predicate: (n > 0) .AND. (m < 2)
> +       2) 'x' default value  (non-def) predicate: .NOT. (n > 0)
> +       (the predicate chain for phi operand defs can be computed
> +       starting from a bb that is control equivalent to the phi's
> +       bb and is dominating the operand def.)
> +
> +       and check overlapping:
> +       (n > 0) .AND. (m < 2) .AND. (.NOT. (n > 0))
> +     <==> false
> +
> +     This implementation provides a framework that can handle different
> +     scenarios.  (Note that many simple cases are handled properly without
> +     the predicate analysis if jump threading eliminates the merge point
> +     thus makes path-sensitive analysis unnecessary.)
> +
> +     PHI is the phi node whose incoming (undefined) paths need to be
> +     pruned, and OPNDS is the bitmap holding interesting operand
> +     positions.  VISITED is the pointer set of phi stmts being
> +     checked.  */
> +
> +bool
> +predicate::overlap (gphi *phi, unsigned opnds, hash_set<gphi *> *visited)
> +{
> +  gimple *flag_def = NULL;
> +  tree boundary_cst = NULL_TREE;
> +  bitmap visited_flag_phis = NULL;
> +
> +  /* Find within the common prefix of multiple predicate chains
> +     a predicate that is a comparison of a flag variable against
> +     a constant.  */
> +  tree_code cmp_code = find_var_cmp_const (m_preds, phi, &flag_def,
> +                                        &boundary_cst);
> +  if (cmp_code == ERROR_MARK)
> +    return true;
> +
> +  /* Now check all the uninit incoming edges have a constant flag
> +     value that is in conflict with the use guard/predicate.  */
> +  gphi *phi_def = as_a<gphi *> (flag_def);
> +  bool all_pruned = prune_phi_opnds (phi, opnds, phi_def, boundary_cst,
> +                                  cmp_code, m_eval, visited,
> +                                  &visited_flag_phis);
> +
> +  if (visited_flag_phis)
> +    BITMAP_FREE (visited_flag_phis);
> +
> +  return !all_pruned;
> +}
> +
> +/* Return true if two predicates PRED1 and X2 are equivalent.  Assume
> +   the expressions have already properly re-associated.  */
> +
> +static inline bool
> +pred_equal_p (const pred_info &pred1, const pred_info &pred2)
> +{
> +  if (!operand_equal_p (pred1.pred_lhs, pred2.pred_lhs, 0)
> +      || !operand_equal_p (pred1.pred_rhs, pred2.pred_rhs, 0))
> +    return false;
> +
> +  tree_code c1 = pred1.cond_code, c2;
> +  if (pred1.invert != pred2.invert
> +      && TREE_CODE_CLASS (pred2.cond_code) == tcc_comparison)
> +    c2 = invert_tree_comparison (pred2.cond_code, false);
> +  else
> +    c2 = pred2.cond_code;
> +
> +  return c1 == c2;
> +}
> +
> +/* Return true if PRED tests inequality (i.e., X != Y).  */
> +
> +static inline bool
> +is_neq_relop_p (const pred_info &pred)
> +{
> +
> +  return ((pred.cond_code == NE_EXPR && !pred.invert)
> +       || (pred.cond_code == EQ_EXPR && pred.invert));
> +}
> +
> +/* Returns true if PRED is of the form X != 0.  */
> +
> +static inline bool
> +is_neq_zero_form_p (const pred_info &pred)
> +{
> +  if (!is_neq_relop_p (pred) || !integer_zerop (pred.pred_rhs)
> +      || TREE_CODE (pred.pred_lhs) != SSA_NAME)
> +    return false;
> +  return true;
> +}
> +
> +/* Return true if PRED is equivalent to X != 0.  */
> +
> +static inline bool
> +pred_expr_equal_p (const pred_info &pred, tree expr)
> +{
> +  if (!is_neq_zero_form_p (pred))
> +    return false;
> +
> +  return operand_equal_p (pred.pred_lhs, expr, 0);
> +}
> +
> +/* Return true if VAL satisfies (x CMPC BOUNDARY) predicate.  CMPC can
> +   be either one of the range comparison codes ({GE,LT,EQ,NE}_EXPR and
> +   the like), or BIT_AND_EXPR.  EXACT_P is only meaningful for the latter.
> +   Modify the question from VAL & BOUNDARY != 0 to VAL & BOUNDARY == VAL.
> +   For other values of CMPC, EXACT_P is ignored.  */
> +
> +static bool
> +value_sat_pred_p (tree val, tree boundary, tree_code cmpc,
> +               bool exact_p = false)
> +{
> +  if (cmpc != BIT_AND_EXPR)
> +    return is_value_included_in (val, boundary, cmpc);
> +
> +  wide_int andw = wi::to_wide (val) & wi::to_wide (boundary);
> +  if (exact_p)
> +    return andw == wi::to_wide (val);
> +
> +  return andw.to_uhwi ();
> +}
> +
> +/* Return true if the domain of single predicate expression PRED1
> +   is a subset of that of PRED2, and false if it cannot be proved.  */
> +
> +static bool
> +subset_of (const pred_info &pred1, const pred_info &pred2)
> +{
> +  if (pred_equal_p (pred1, pred2))
> +    return true;
> +
> </cut>

_______________________________________________
linaro-toolchain mailing list
linaro-toolchain@lists.linaro.org
https://lists.linaro.org/mailman/listinfo/linaro-toolchain

Reply via email to