1 /* Generic routines for manipulating PHIs
2 Copyright (C) 2003, 2005, 2007, 2008 Free Software Foundation, Inc.
4 This file is part of GCC.
6 GCC is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3, or (at your option)
11 GCC is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with GCC; see the file COPYING3. If not see
18 <http://www.gnu.org/licenses/>. */
22 #include "coretypes.h"
28 #include "basic-block.h"
29 #include "tree-flow.h"
33 /* Rewriting a function into SSA form can create a huge number of PHIs
34 many of which may be thrown away shortly after their creation if jumps
35 were threaded through PHI nodes.
37 While our garbage collection mechanisms will handle this situation, it
38 is extremely wasteful to create nodes and throw them away, especially
39 when the nodes can be reused.
41 For PR 8361, we can significantly reduce the number of nodes allocated
42 and thus the total amount of memory allocated by managing PHIs a
43 little. This additionally helps reduce the amount of work done by the
44 garbage collector. Similar results have been seen on a wider variety
45 of tests (such as the compiler itself).
47 Right now we maintain our free list on a per-function basis. It may
48 or may not make sense to maintain the free list for the duration of
51 We could also use a zone allocator for these objects since they have
52 a very well defined lifetime. If someone wants to experiment with that
53 this is the place to try it.
55 PHI nodes have different sizes, so we can't have a single list of all
56 the PHI nodes as it would be too expensive to walk down that list to
57 find a PHI of a suitable size.
59 Instead we have an array of lists of free PHI nodes. The array is
60 indexed by the number of PHI alternatives that PHI node can hold.
61 Except for the last array member, which holds all remaining PHI
64 So to find a free PHI node, we compute its index into the free PHI
65 node array and see if there are any elements with an exact match.
66 If so, then we are done. Otherwise, we test the next larger size
67 up and continue until we are in the last array element.
69 We do not actually walk members of the last array element. While it
70 might allow us to pick up a few reusable PHI nodes, it could potentially
71 be very expensive if the program has released a bunch of large PHI nodes,
72 but keeps asking for even larger PHI nodes. Experiments have shown that
73 walking the elements of the last array entry would result in finding less
74 than .1% additional reusable PHI nodes.
76 Note that we can never have less than two PHI argument slots. Thus,
77 the -2 on all the calculations below. */
79 #define NUM_BUCKETS 10
80 static GTY ((deletable (""))) VEC(gimple
,gc
) *free_phinodes
[NUM_BUCKETS
- 2];
81 static unsigned long free_phinode_count
;
83 static int ideal_phi_node_len (int);
85 #ifdef GATHER_STATISTICS
86 unsigned int phi_nodes_reused
;
87 unsigned int phi_nodes_created
;
90 /* Initialize management of PHIs. */
97 for (i
= 0; i
< NUM_BUCKETS
- 2; i
++)
98 free_phinodes
[i
] = NULL
;
99 free_phinode_count
= 0;
102 /* Finalize management of PHIs. */
109 for (i
= 0; i
< NUM_BUCKETS
- 2; i
++)
110 free_phinodes
[i
] = NULL
;
111 free_phinode_count
= 0;
114 /* Dump some simple statistics regarding the re-use of PHI nodes. */
116 #ifdef GATHER_STATISTICS
118 phinodes_print_statistics (void)
120 fprintf (stderr
, "PHI nodes allocated: %u\n", phi_nodes_created
);
121 fprintf (stderr
, "PHI nodes reused: %u\n", phi_nodes_reused
);
125 /* Allocate a PHI node with at least LEN arguments. If the free list
126 happens to contain a PHI node with LEN arguments or more, return
130 allocate_phi_node (size_t len
)
133 size_t bucket
= NUM_BUCKETS
- 2;
134 size_t size
= sizeof (struct gimple_statement_phi
)
135 + (len
- 1) * sizeof (struct phi_arg_d
);
137 if (free_phinode_count
)
138 for (bucket
= len
- 2; bucket
< NUM_BUCKETS
- 2; bucket
++)
139 if (free_phinodes
[bucket
])
142 /* If our free list has an element, then use it. */
143 if (bucket
< NUM_BUCKETS
- 2
144 && gimple_phi_capacity (VEC_index (gimple
, free_phinodes
[bucket
], 0))
147 free_phinode_count
--;
148 phi
= VEC_pop (gimple
, free_phinodes
[bucket
]);
149 if (VEC_empty (gimple
, free_phinodes
[bucket
]))
150 VEC_free (gimple
, gc
, free_phinodes
[bucket
]);
151 #ifdef GATHER_STATISTICS
157 phi
= (gimple
) ggc_alloc (size
);
158 #ifdef GATHER_STATISTICS
161 enum gimple_alloc_kind kind
= gimple_alloc_kind (GIMPLE_PHI
);
162 gimple_alloc_counts
[(int) kind
]++;
163 gimple_alloc_sizes
[(int) kind
] += size
;
171 /* Given LEN, the original number of requested PHI arguments, return
172 a new, "ideal" length for the PHI node. The "ideal" length rounds
173 the total size of the PHI node up to the next power of two bytes.
175 Rounding up will not result in wasting any memory since the size request
176 will be rounded up by the GC system anyway. [ Note this is not entirely
177 true since the original length might have fit on one of the special
178 GC pages. ] By rounding up, we may avoid the need to reallocate the
179 PHI node later if we increase the number of arguments for the PHI. */
182 ideal_phi_node_len (int len
)
184 size_t size
, new_size
;
187 /* We do not support allocations of less than two PHI argument slots. */
191 /* Compute the number of bytes of the original request. */
192 size
= sizeof (struct gimple_statement_phi
)
193 + (len
- 1) * sizeof (struct phi_arg_d
);
195 /* Round it up to the next power of two. */
196 log2
= ceil_log2 (size
);
197 new_size
= 1 << log2
;
199 /* Now compute and return the number of PHI argument slots given an
200 ideal size allocation. */
201 new_len
= len
+ (new_size
- size
) / sizeof (struct phi_arg_d
);
205 /* Return a PHI node with LEN argument slots for variable VAR. */
208 make_phi_node (tree var
, int len
)
213 capacity
= ideal_phi_node_len (len
);
215 phi
= allocate_phi_node (capacity
);
217 /* We need to clear the entire PHI node, including the argument
218 portion, because we represent a "missing PHI argument" by placing
219 NULL_TREE in PHI_ARG_DEF. */
220 memset (phi
, 0, (sizeof (struct gimple_statement_phi
)
221 - sizeof (struct phi_arg_d
)
222 + sizeof (struct phi_arg_d
) * len
));
223 phi
->gsbase
.code
= GIMPLE_PHI
;
224 phi
->gimple_phi
.nargs
= len
;
225 phi
->gimple_phi
.capacity
= capacity
;
226 if (TREE_CODE (var
) == SSA_NAME
)
227 gimple_phi_set_result (phi
, var
);
229 gimple_phi_set_result (phi
, make_ssa_name (var
, phi
));
231 for (i
= 0; i
< capacity
; i
++)
234 imm
= gimple_phi_arg_imm_use_ptr (phi
, i
);
235 imm
->use
= gimple_phi_arg_def_ptr (phi
, i
);
244 /* We no longer need PHI, release it so that it may be reused. */
247 release_phi_node (gimple phi
)
250 size_t len
= gimple_phi_capacity (phi
);
253 for (x
= 0; x
< gimple_phi_num_args (phi
); x
++)
256 imm
= gimple_phi_arg_imm_use_ptr (phi
, x
);
257 delink_imm_use (imm
);
260 bucket
= len
> NUM_BUCKETS
- 1 ? NUM_BUCKETS
- 1 : len
;
262 VEC_safe_push (gimple
, gc
, free_phinodes
[bucket
], phi
);
263 free_phinode_count
++;
267 /* Resize an existing PHI node. The only way is up. Return the
268 possibly relocated phi. */
271 resize_phi_node (gimple
*phi
, size_t len
)
276 gcc_assert (len
> gimple_phi_capacity (*phi
));
278 /* The garbage collector will not look at the PHI node beyond the
279 first PHI_NUM_ARGS elements. Therefore, all we have to copy is a
280 portion of the PHI node currently in use. */
281 old_size
= sizeof (struct gimple_statement_phi
)
282 + (gimple_phi_num_args (*phi
) - 1) * sizeof (struct phi_arg_d
);
284 new_phi
= allocate_phi_node (len
);
286 memcpy (new_phi
, *phi
, old_size
);
288 for (i
= 0; i
< gimple_phi_num_args (new_phi
); i
++)
290 use_operand_p imm
, old_imm
;
291 imm
= gimple_phi_arg_imm_use_ptr (new_phi
, i
);
292 old_imm
= gimple_phi_arg_imm_use_ptr (*phi
, i
);
293 imm
->use
= gimple_phi_arg_def_ptr (new_phi
, i
);
294 relink_imm_use_stmt (imm
, old_imm
, new_phi
);
297 new_phi
->gimple_phi
.capacity
= len
;
299 for (i
= gimple_phi_num_args (new_phi
); i
< len
; i
++)
302 imm
= gimple_phi_arg_imm_use_ptr (new_phi
, i
);
303 imm
->use
= gimple_phi_arg_def_ptr (new_phi
, i
);
306 imm
->loc
.stmt
= new_phi
;
312 /* Reserve PHI arguments for a new edge to basic block BB. */
315 reserve_phi_args_for_new_edge (basic_block bb
)
317 size_t len
= EDGE_COUNT (bb
->preds
);
318 size_t cap
= ideal_phi_node_len (len
+ 4);
319 gimple_stmt_iterator gsi
;
321 for (gsi
= gsi_start_phis (bb
); !gsi_end_p (gsi
); gsi_next (&gsi
))
323 gimple
*loc
= gsi_stmt_ptr (&gsi
);
325 if (len
> gimple_phi_capacity (*loc
))
327 gimple old_phi
= *loc
;
329 resize_phi_node (loc
, cap
);
331 /* The result of the PHI is defined by this PHI node. */
332 SSA_NAME_DEF_STMT (gimple_phi_result (*loc
)) = *loc
;
334 release_phi_node (old_phi
);
337 /* We represent a "missing PHI argument" by placing NULL_TREE in
338 the corresponding slot. If PHI arguments were added
339 immediately after an edge is created, this zeroing would not
340 be necessary, but unfortunately this is not the case. For
341 example, the loop optimizer duplicates several basic blocks,
342 redirects edges, and then fixes up PHI arguments later in
344 SET_PHI_ARG_DEF (*loc
, len
- 1, NULL_TREE
);
346 (*loc
)->gimple_phi
.nargs
++;
350 /* Adds PHI to BB. */
353 add_phi_node_to_bb (gimple phi
, basic_block bb
)
355 gimple_stmt_iterator gsi
;
356 /* Add the new PHI node to the list of PHI nodes for block BB. */
357 if (phi_nodes (bb
) == NULL
)
358 set_phi_nodes (bb
, gimple_seq_alloc ());
360 gsi
= gsi_last (phi_nodes (bb
));
361 gsi_insert_after (&gsi
, phi
, GSI_NEW_STMT
);
363 /* Associate BB to the PHI node. */
364 gimple_set_bb (phi
, bb
);
368 /* Create a new PHI node for variable VAR at basic block BB. */
371 create_phi_node (tree var
, basic_block bb
)
373 gimple phi
= make_phi_node (var
, EDGE_COUNT (bb
->preds
));
375 add_phi_node_to_bb (phi
, bb
);
380 /* Add a new argument to PHI node PHI. DEF is the incoming reaching
381 definition and E is the edge through which DEF reaches PHI. The new
382 argument is added at the end of the argument list.
383 If PHI has reached its maximum capacity, add a few slots. In this case,
384 PHI points to the reallocated phi node when we return. */
387 add_phi_arg (gimple phi
, tree def
, edge e
)
389 basic_block bb
= e
->dest
;
391 gcc_assert (bb
== gimple_bb (phi
));
393 /* We resize PHI nodes upon edge creation. We should always have
394 enough room at this point. */
395 gcc_assert (gimple_phi_num_args (phi
) <= gimple_phi_capacity (phi
));
397 /* We resize PHI nodes upon edge creation. We should always have
398 enough room at this point. */
399 gcc_assert (e
->dest_idx
< gimple_phi_num_args (phi
));
401 /* Copy propagation needs to know what object occur in abnormal
402 PHI nodes. This is a convenient place to record such information. */
403 if (e
->flags
& EDGE_ABNORMAL
)
405 SSA_NAME_OCCURS_IN_ABNORMAL_PHI (def
) = 1;
406 SSA_NAME_OCCURS_IN_ABNORMAL_PHI (PHI_RESULT (phi
)) = 1;
409 SET_PHI_ARG_DEF (phi
, e
->dest_idx
, def
);
413 /* Remove the Ith argument from PHI's argument list. This routine
414 implements removal by swapping the last alternative with the
415 alternative we want to delete and then shrinking the vector, which
416 is consistent with how we remove an edge from the edge vector. */
419 remove_phi_arg_num (gimple phi
, int i
)
421 int num_elem
= gimple_phi_num_args (phi
);
423 gcc_assert (i
< num_elem
);
425 /* Delink the item which is being removed. */
426 delink_imm_use (gimple_phi_arg_imm_use_ptr (phi
, i
));
428 /* If it is not the last element, move the last element
429 to the element we want to delete, resetting all the links. */
430 if (i
!= num_elem
- 1)
432 use_operand_p old_p
, new_p
;
433 old_p
= gimple_phi_arg_imm_use_ptr (phi
, num_elem
- 1);
434 new_p
= gimple_phi_arg_imm_use_ptr (phi
, i
);
435 /* Set use on new node, and link into last element's place. */
436 *(new_p
->use
) = *(old_p
->use
);
437 relink_imm_use (new_p
, old_p
);
440 /* Shrink the vector and return. Note that we do not have to clear
441 PHI_ARG_DEF because the garbage collector will not look at those
442 elements beyond the first PHI_NUM_ARGS elements of the array. */
443 phi
->gimple_phi
.nargs
--;
447 /* Remove all PHI arguments associated with edge E. */
450 remove_phi_args (edge e
)
452 gimple_stmt_iterator gsi
;
454 for (gsi
= gsi_start_phis (e
->dest
); !gsi_end_p (gsi
); gsi_next (&gsi
))
455 remove_phi_arg_num (gsi_stmt (gsi
), e
->dest_idx
);
459 /* Remove the PHI node pointed-to by iterator GSI from basic block BB. After
460 removal, iterator GSI is updated to point to the next PHI node in the
461 sequence. If RELEASE_LHS_P is true, the LHS of this PHI node is released
462 into the free pool of SSA names. */
465 remove_phi_node (gimple_stmt_iterator
*gsi
, bool release_lhs_p
)
467 gimple phi
= gsi_stmt (*gsi
);
468 gsi_remove (gsi
, false);
470 /* If we are deleting the PHI node, then we should release the
471 SSA_NAME node so that it can be reused. */
472 release_phi_node (phi
);
474 release_ssa_name (gimple_phi_result (phi
));
477 /* Remove all the phi nodes from BB. */
480 remove_phi_nodes (basic_block bb
)
482 gimple_stmt_iterator gsi
;
484 for (gsi
= gsi_start_phis (bb
); !gsi_end_p (gsi
); )
485 remove_phi_node (&gsi
, true);
487 set_phi_nodes (bb
, NULL
);
490 #include "gt-tree-phinodes.h"