blob: 74327d5c60b60b3b3d997b6ecc964316b35e52b8 [file] [log] [blame]
Chris Lattner3b04a8a2004-06-28 06:33:13 +00001//===- GlobalsModRef.cpp - Simple Mod/Ref Analysis for Globals ------------===//
Misha Brukman2b37d7c2005-04-21 21:13:18 +00002//
Chris Lattner3b04a8a2004-06-28 06:33:13 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattner4ee451d2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Misha Brukman2b37d7c2005-04-21 21:13:18 +00007//
Chris Lattner3b04a8a2004-06-28 06:33:13 +00008//===----------------------------------------------------------------------===//
9//
10// This simple pass provides alias and mod/ref information for global values
Chris Lattnerfe98f272004-07-27 06:40:37 +000011// that do not have their address taken, and keeps track of whether functions
12// read or write memory (are "pure"). For this simple (but very common) case,
13// we can provide pretty accurate and useful information.
Chris Lattner3b04a8a2004-06-28 06:33:13 +000014//
15//===----------------------------------------------------------------------===//
16
Chris Lattner3b27d682006-12-19 22:30:33 +000017#define DEBUG_TYPE "globalsmodref-aa"
Chris Lattner3b04a8a2004-06-28 06:33:13 +000018#include "llvm/Analysis/Passes.h"
19#include "llvm/Module.h"
20#include "llvm/Pass.h"
21#include "llvm/Instructions.h"
22#include "llvm/Constants.h"
Chris Lattnerab383582006-10-01 22:36:45 +000023#include "llvm/DerivedTypes.h"
Chris Lattner3b04a8a2004-06-28 06:33:13 +000024#include "llvm/Analysis/AliasAnalysis.h"
25#include "llvm/Analysis/CallGraph.h"
Reid Spencerd7d83db2007-02-05 23:42:17 +000026#include "llvm/Support/Compiler.h"
Reid Spencer551ccae2004-09-01 22:55:40 +000027#include "llvm/Support/CommandLine.h"
Reid Spencerd7d83db2007-02-05 23:42:17 +000028#include "llvm/Support/InstIterator.h"
Reid Spencer551ccae2004-09-01 22:55:40 +000029#include "llvm/ADT/Statistic.h"
30#include "llvm/ADT/SCCIterator.h"
Chris Lattner3b04a8a2004-06-28 06:33:13 +000031#include <set>
32using namespace llvm;
33
Chris Lattner3b27d682006-12-19 22:30:33 +000034STATISTIC(NumNonAddrTakenGlobalVars,
35 "Number of global vars without address taken");
36STATISTIC(NumNonAddrTakenFunctions,"Number of functions without address taken");
37STATISTIC(NumNoMemFunctions, "Number of functions that do not access memory");
38STATISTIC(NumReadMemFunctions, "Number of functions that only read memory");
39STATISTIC(NumIndirectGlobalVars, "Number of indirect global objects");
40
Chris Lattner3b04a8a2004-06-28 06:33:13 +000041namespace {
Chris Lattnerfe98f272004-07-27 06:40:37 +000042 /// FunctionRecord - One instance of this structure is stored for every
43 /// function in the program. Later, the entries for these functions are
44 /// removed if the function is found to call an external function (in which
45 /// case we know nothing about it.
Reid Spencerd7d83db2007-02-05 23:42:17 +000046 struct VISIBILITY_HIDDEN FunctionRecord {
Chris Lattnerfe98f272004-07-27 06:40:37 +000047 /// GlobalInfo - Maintain mod/ref info for all of the globals without
48 /// addresses taken that are read or written (transitively) by this
49 /// function.
50 std::map<GlobalValue*, unsigned> GlobalInfo;
51
Duncan Sands2bb4a4d2008-09-12 07:29:58 +000052 /// MayReadAnyGlobal - May read global variables, but it is not known which.
53 bool MayReadAnyGlobal;
54
Chris Lattnerfe98f272004-07-27 06:40:37 +000055 unsigned getInfoForGlobal(GlobalValue *GV) const {
Duncan Sands2bb4a4d2008-09-12 07:29:58 +000056 unsigned Effect = MayReadAnyGlobal ? AliasAnalysis::Ref : 0;
Chris Lattnerfe98f272004-07-27 06:40:37 +000057 std::map<GlobalValue*, unsigned>::const_iterator I = GlobalInfo.find(GV);
58 if (I != GlobalInfo.end())
Duncan Sands2bb4a4d2008-09-12 07:29:58 +000059 Effect |= I->second;
60 return Effect;
Chris Lattnerfe98f272004-07-27 06:40:37 +000061 }
Misha Brukman2b37d7c2005-04-21 21:13:18 +000062
Chris Lattnerfe98f272004-07-27 06:40:37 +000063 /// FunctionEffect - Capture whether or not this function reads or writes to
64 /// ANY memory. If not, we can do a lot of aggressive analysis on it.
65 unsigned FunctionEffect;
Chris Lattner105d26a2004-07-27 07:46:26 +000066
Duncan Sands2bb4a4d2008-09-12 07:29:58 +000067 FunctionRecord() : MayReadAnyGlobal (false), FunctionEffect(0) {}
Chris Lattnerfe98f272004-07-27 06:40:37 +000068 };
69
70 /// GlobalsModRef - The actual analysis pass.
Duncan Sands9a036b92008-09-03 12:55:42 +000071 class VISIBILITY_HIDDEN GlobalsModRef
Reid Spencerd7d83db2007-02-05 23:42:17 +000072 : public ModulePass, public AliasAnalysis {
Chris Lattnerfe98f272004-07-27 06:40:37 +000073 /// NonAddressTakenGlobals - The globals that do not have their addresses
74 /// taken.
75 std::set<GlobalValue*> NonAddressTakenGlobals;
Chris Lattner3b04a8a2004-06-28 06:33:13 +000076
Chris Lattnerab383582006-10-01 22:36:45 +000077 /// IndirectGlobals - The memory pointed to by this global is known to be
78 /// 'owned' by the global.
79 std::set<GlobalValue*> IndirectGlobals;
Duncan Sands9a036b92008-09-03 12:55:42 +000080
Chris Lattnerab383582006-10-01 22:36:45 +000081 /// AllocsForIndirectGlobals - If an instruction allocates memory for an
82 /// indirect global, this map indicates which one.
83 std::map<Value*, GlobalValue*> AllocsForIndirectGlobals;
Duncan Sands9a036b92008-09-03 12:55:42 +000084
Chris Lattner3b04a8a2004-06-28 06:33:13 +000085 /// FunctionInfo - For each function, keep track of what globals are
86 /// modified or read.
Chris Lattnerfe98f272004-07-27 06:40:37 +000087 std::map<Function*, FunctionRecord> FunctionInfo;
Chris Lattner3b04a8a2004-06-28 06:33:13 +000088
89 public:
Devang Patel19974732007-05-03 01:11:54 +000090 static char ID;
Dan Gohmanae73dc12008-09-04 17:05:41 +000091 GlobalsModRef() : ModulePass(&ID) {}
Devang Patel1cee94f2008-03-18 00:39:19 +000092
Chris Lattnerb12914b2004-09-20 04:48:05 +000093 bool runOnModule(Module &M) {
Chris Lattner3b04a8a2004-06-28 06:33:13 +000094 InitializeAliasAnalysis(this); // set up super class
95 AnalyzeGlobals(M); // find non-addr taken globals
96 AnalyzeCallGraph(getAnalysis<CallGraph>(), M); // Propagate on CG
97 return false;
98 }
99
100 virtual void getAnalysisUsage(AnalysisUsage &AU) const {
101 AliasAnalysis::getAnalysisUsage(AU);
102 AU.addRequired<CallGraph>();
103 AU.setPreservesAll(); // Does not transform code
104 }
105
106 //------------------------------------------------
107 // Implement the AliasAnalysis API
Misha Brukman2b37d7c2005-04-21 21:13:18 +0000108 //
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000109 AliasResult alias(const Value *V1, unsigned V1Size,
110 const Value *V2, unsigned V2Size);
111 ModRefResult getModRefInfo(CallSite CS, Value *P, unsigned Size);
Reid Spencer4a7ebfa2004-12-07 08:11:24 +0000112 ModRefResult getModRefInfo(CallSite CS1, CallSite CS2) {
113 return AliasAnalysis::getModRefInfo(CS1,CS2);
114 }
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000115 bool hasNoModRefInfoForCalls() const { return false; }
116
Chris Lattner0af024c2004-12-15 07:22:13 +0000117 /// getModRefBehavior - Return the behavior of the specified function if
118 /// called from the specified call site. The call site may be null in which
119 /// case the most generic behavior of this function should be returned.
Chris Lattner41925f82004-12-17 17:12:24 +0000120 virtual ModRefBehavior getModRefBehavior(Function *F, CallSite CS,
121 std::vector<PointerAccessInfo> *Info) {
Anton Korobeynikovae9f3a32008-02-20 11:08:44 +0000122 if (FunctionRecord *FR = getFunctionInfo(F)) {
Chris Lattnerfe98f272004-07-27 06:40:37 +0000123 if (FR->FunctionEffect == 0)
Chris Lattner0af024c2004-12-15 07:22:13 +0000124 return DoesNotAccessMemory;
Misha Brukmandedf2bd2005-04-22 04:01:18 +0000125 else if ((FR->FunctionEffect & Mod) == 0)
126 return OnlyReadsMemory;
Anton Korobeynikovae9f3a32008-02-20 11:08:44 +0000127 }
Misha Brukman2b37d7c2005-04-21 21:13:18 +0000128 return AliasAnalysis::getModRefBehavior(F, CS, Info);
Chris Lattnerfe98f272004-07-27 06:40:37 +0000129 }
Chris Lattnerfe98f272004-07-27 06:40:37 +0000130
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000131 virtual void deleteValue(Value *V);
132 virtual void copyValue(Value *From, Value *To);
133
134 private:
Chris Lattnerfe98f272004-07-27 06:40:37 +0000135 /// getFunctionInfo - Return the function info for the function, or null if
Duncan Sands9a036b92008-09-03 12:55:42 +0000136 /// we don't have anything useful to say about it.
Chris Lattnerfe98f272004-07-27 06:40:37 +0000137 FunctionRecord *getFunctionInfo(Function *F) {
138 std::map<Function*, FunctionRecord>::iterator I = FunctionInfo.find(F);
139 if (I != FunctionInfo.end())
140 return &I->second;
141 return 0;
142 }
143
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000144 void AnalyzeGlobals(Module &M);
145 void AnalyzeCallGraph(CallGraph &CG, Module &M);
Chris Lattnerab383582006-10-01 22:36:45 +0000146 bool AnalyzeUsesOfPointer(Value *V, std::vector<Function*> &Readers,
147 std::vector<Function*> &Writers,
148 GlobalValue *OkayStoreDest = 0);
149 bool AnalyzeIndirectGlobalMemory(GlobalValue *GV);
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000150 };
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000151}
152
Dan Gohman844731a2008-05-13 00:00:25 +0000153char GlobalsModRef::ID = 0;
154static RegisterPass<GlobalsModRef>
155X("globalsmodref-aa", "Simple mod/ref analysis for globals", false, true);
156static RegisterAnalysisGroup<AliasAnalysis> Y(X);
157
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000158Pass *llvm::createGlobalsModRefPass() { return new GlobalsModRef(); }
159
Chris Lattnerab383582006-10-01 22:36:45 +0000160/// getUnderlyingObject - This traverses the use chain to figure out what object
161/// the specified value points to. If the value points to, or is derived from,
162/// a global object, return it.
163static Value *getUnderlyingObject(Value *V) {
164 if (!isa<PointerType>(V->getType())) return V;
Duncan Sands9a036b92008-09-03 12:55:42 +0000165
Chris Lattnerab383582006-10-01 22:36:45 +0000166 // If we are at some type of object... return it.
167 if (GlobalValue *GV = dyn_cast<GlobalValue>(V)) return GV;
Duncan Sands9a036b92008-09-03 12:55:42 +0000168
Chris Lattnerab383582006-10-01 22:36:45 +0000169 // Traverse through different addressing mechanisms.
170 if (Instruction *I = dyn_cast<Instruction>(V)) {
Reid Spencer3da59db2006-11-27 01:05:10 +0000171 if (isa<BitCastInst>(I) || isa<GetElementPtrInst>(I))
Chris Lattnerab383582006-10-01 22:36:45 +0000172 return getUnderlyingObject(I->getOperand(0));
173 } else if (ConstantExpr *CE = dyn_cast<ConstantExpr>(V)) {
Duncan Sands9a036b92008-09-03 12:55:42 +0000174 if (CE->getOpcode() == Instruction::BitCast ||
Chris Lattnerab383582006-10-01 22:36:45 +0000175 CE->getOpcode() == Instruction::GetElementPtr)
176 return getUnderlyingObject(CE->getOperand(0));
177 }
Duncan Sands9a036b92008-09-03 12:55:42 +0000178
179 // Otherwise, we don't know what this is, return it as the base pointer.
Chris Lattnerab383582006-10-01 22:36:45 +0000180 return V;
181}
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000182
Chris Lattnerab383582006-10-01 22:36:45 +0000183/// AnalyzeGlobals - Scan through the users of all of the internal
Duncan Sands9a036b92008-09-03 12:55:42 +0000184/// GlobalValue's in the program. If none of them have their "address taken"
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000185/// (really, their address passed to something nontrivial), record this fact,
186/// and record the functions that they are used directly in.
187void GlobalsModRef::AnalyzeGlobals(Module &M) {
188 std::vector<Function*> Readers, Writers;
189 for (Module::iterator I = M.begin(), E = M.end(); I != E; ++I)
190 if (I->hasInternalLinkage()) {
Chris Lattnerab383582006-10-01 22:36:45 +0000191 if (!AnalyzeUsesOfPointer(I, Readers, Writers)) {
Chris Lattnerfe98f272004-07-27 06:40:37 +0000192 // Remember that we are tracking this global.
193 NonAddressTakenGlobals.insert(I);
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000194 ++NumNonAddrTakenFunctions;
195 }
196 Readers.clear(); Writers.clear();
197 }
198
Chris Lattnerf5eaf3c2005-03-23 23:51:12 +0000199 for (Module::global_iterator I = M.global_begin(), E = M.global_end();
200 I != E; ++I)
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000201 if (I->hasInternalLinkage()) {
Chris Lattnerab383582006-10-01 22:36:45 +0000202 if (!AnalyzeUsesOfPointer(I, Readers, Writers)) {
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000203 // Remember that we are tracking this global, and the mod/ref fns
Chris Lattnerfe98f272004-07-27 06:40:37 +0000204 NonAddressTakenGlobals.insert(I);
Duncan Sands9a036b92008-09-03 12:55:42 +0000205
Chris Lattnerfe98f272004-07-27 06:40:37 +0000206 for (unsigned i = 0, e = Readers.size(); i != e; ++i)
207 FunctionInfo[Readers[i]].GlobalInfo[I] |= Ref;
208
209 if (!I->isConstant()) // No need to keep track of writers to constants
210 for (unsigned i = 0, e = Writers.size(); i != e; ++i)
211 FunctionInfo[Writers[i]].GlobalInfo[I] |= Mod;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000212 ++NumNonAddrTakenGlobalVars;
Duncan Sands9a036b92008-09-03 12:55:42 +0000213
Chris Lattnerab383582006-10-01 22:36:45 +0000214 // If this global holds a pointer type, see if it is an indirect global.
215 if (isa<PointerType>(I->getType()->getElementType()) &&
216 AnalyzeIndirectGlobalMemory(I))
217 ++NumIndirectGlobalVars;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000218 }
219 Readers.clear(); Writers.clear();
220 }
221}
222
Chris Lattnerab383582006-10-01 22:36:45 +0000223/// AnalyzeUsesOfPointer - Look at all of the users of the specified pointer.
224/// If this is used by anything complex (i.e., the address escapes), return
225/// true. Also, while we are at it, keep track of those functions that read and
226/// write to the value.
227///
228/// If OkayStoreDest is non-null, stores into this global are allowed.
229bool GlobalsModRef::AnalyzeUsesOfPointer(Value *V,
230 std::vector<Function*> &Readers,
231 std::vector<Function*> &Writers,
232 GlobalValue *OkayStoreDest) {
Chris Lattnerfe98f272004-07-27 06:40:37 +0000233 if (!isa<PointerType>(V->getType())) return true;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000234
235 for (Value::use_iterator UI = V->use_begin(), E = V->use_end(); UI != E; ++UI)
236 if (LoadInst *LI = dyn_cast<LoadInst>(*UI)) {
237 Readers.push_back(LI->getParent()->getParent());
238 } else if (StoreInst *SI = dyn_cast<StoreInst>(*UI)) {
Chris Lattnerab383582006-10-01 22:36:45 +0000239 if (V == SI->getOperand(1)) {
240 Writers.push_back(SI->getParent()->getParent());
241 } else if (SI->getOperand(1) != OkayStoreDest) {
242 return true; // Storing the pointer
243 }
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000244 } else if (GetElementPtrInst *GEP = dyn_cast<GetElementPtrInst>(*UI)) {
Chris Lattnerab383582006-10-01 22:36:45 +0000245 if (AnalyzeUsesOfPointer(GEP, Readers, Writers)) return true;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000246 } else if (CallInst *CI = dyn_cast<CallInst>(*UI)) {
247 // Make sure that this is just the function being called, not that it is
248 // passing into the function.
249 for (unsigned i = 1, e = CI->getNumOperands(); i != e; ++i)
250 if (CI->getOperand(i) == V) return true;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000251 } else if (InvokeInst *II = dyn_cast<InvokeInst>(*UI)) {
252 // Make sure that this is just the function being called, not that it is
253 // passing into the function.
254 for (unsigned i = 3, e = II->getNumOperands(); i != e; ++i)
255 if (II->getOperand(i) == V) return true;
256 } else if (ConstantExpr *CE = dyn_cast<ConstantExpr>(*UI)) {
Duncan Sands9a036b92008-09-03 12:55:42 +0000257 if (CE->getOpcode() == Instruction::GetElementPtr ||
Reid Spencer3da59db2006-11-27 01:05:10 +0000258 CE->getOpcode() == Instruction::BitCast) {
Chris Lattnerab383582006-10-01 22:36:45 +0000259 if (AnalyzeUsesOfPointer(CE, Readers, Writers))
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000260 return true;
261 } else {
262 return true;
Misha Brukman2b37d7c2005-04-21 21:13:18 +0000263 }
Reid Spencere4d87aa2006-12-23 06:05:41 +0000264 } else if (ICmpInst *ICI = dyn_cast<ICmpInst>(*UI)) {
265 if (!isa<ConstantPointerNull>(ICI->getOperand(1)))
Chris Lattnerab383582006-10-01 22:36:45 +0000266 return true; // Allow comparison against null.
267 } else if (FreeInst *F = dyn_cast<FreeInst>(*UI)) {
268 Writers.push_back(F->getParent()->getParent());
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000269 } else {
270 return true;
271 }
272 return false;
273}
274
Chris Lattnerab383582006-10-01 22:36:45 +0000275/// AnalyzeIndirectGlobalMemory - We found an non-address-taken global variable
276/// which holds a pointer type. See if the global always points to non-aliased
277/// heap memory: that is, all initializers of the globals are allocations, and
278/// those allocations have no use other than initialization of the global.
279/// Further, all loads out of GV must directly use the memory, not store the
280/// pointer somewhere. If this is true, we consider the memory pointed to by
281/// GV to be owned by GV and can disambiguate other pointers from it.
282bool GlobalsModRef::AnalyzeIndirectGlobalMemory(GlobalValue *GV) {
283 // Keep track of values related to the allocation of the memory, f.e. the
284 // value produced by the malloc call and any casts.
285 std::vector<Value*> AllocRelatedValues;
Duncan Sands9a036b92008-09-03 12:55:42 +0000286
Chris Lattnerab383582006-10-01 22:36:45 +0000287 // Walk the user list of the global. If we find anything other than a direct
288 // load or store, bail out.
289 for (Value::use_iterator I = GV->use_begin(), E = GV->use_end(); I != E; ++I){
290 if (LoadInst *LI = dyn_cast<LoadInst>(*I)) {
291 // The pointer loaded from the global can only be used in simple ways:
292 // we allow addressing of it and loading storing to it. We do *not* allow
293 // storing the loaded pointer somewhere else or passing to a function.
294 std::vector<Function*> ReadersWriters;
295 if (AnalyzeUsesOfPointer(LI, ReadersWriters, ReadersWriters))
296 return false; // Loaded pointer escapes.
297 // TODO: Could try some IP mod/ref of the loaded pointer.
298 } else if (StoreInst *SI = dyn_cast<StoreInst>(*I)) {
299 // Storing the global itself.
300 if (SI->getOperand(0) == GV) return false;
Duncan Sands9a036b92008-09-03 12:55:42 +0000301
Chris Lattnerab383582006-10-01 22:36:45 +0000302 // If storing the null pointer, ignore it.
303 if (isa<ConstantPointerNull>(SI->getOperand(0)))
304 continue;
Duncan Sands9a036b92008-09-03 12:55:42 +0000305
Chris Lattnerab383582006-10-01 22:36:45 +0000306 // Check the value being stored.
307 Value *Ptr = getUnderlyingObject(SI->getOperand(0));
308
Chris Lattnerab383582006-10-01 22:36:45 +0000309 if (isa<MallocInst>(Ptr)) {
310 // Okay, easy case.
311 } else if (CallInst *CI = dyn_cast<CallInst>(Ptr)) {
312 Function *F = CI->getCalledFunction();
Reid Spencer5cbf9852007-01-30 20:08:39 +0000313 if (!F || !F->isDeclaration()) return false; // Too hard to analyze.
Chris Lattnerab383582006-10-01 22:36:45 +0000314 if (F->getName() != "calloc") return false; // Not calloc.
315 } else {
316 return false; // Too hard to analyze.
317 }
Duncan Sands9a036b92008-09-03 12:55:42 +0000318
Chris Lattnerab383582006-10-01 22:36:45 +0000319 // Analyze all uses of the allocation. If any of them are used in a
320 // non-simple way (e.g. stored to another global) bail out.
321 std::vector<Function*> ReadersWriters;
322 if (AnalyzeUsesOfPointer(Ptr, ReadersWriters, ReadersWriters, GV))
323 return false; // Loaded pointer escapes.
324
325 // Remember that this allocation is related to the indirect global.
326 AllocRelatedValues.push_back(Ptr);
327 } else {
328 // Something complex, bail out.
329 return false;
330 }
331 }
Duncan Sands9a036b92008-09-03 12:55:42 +0000332
Chris Lattnerab383582006-10-01 22:36:45 +0000333 // Okay, this is an indirect global. Remember all of the allocations for
334 // this global in AllocsForIndirectGlobals.
335 while (!AllocRelatedValues.empty()) {
336 AllocsForIndirectGlobals[AllocRelatedValues.back()] = GV;
337 AllocRelatedValues.pop_back();
338 }
339 IndirectGlobals.insert(GV);
340 return true;
341}
342
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000343/// AnalyzeCallGraph - At this point, we know the functions where globals are
344/// immediately stored to and read from. Propagate this information up the call
Chris Lattnerfe98f272004-07-27 06:40:37 +0000345/// graph to all callers and compute the mod/ref info for all memory for each
Misha Brukman2b37d7c2005-04-21 21:13:18 +0000346/// function.
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000347void GlobalsModRef::AnalyzeCallGraph(CallGraph &CG, Module &M) {
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000348 // We do a bottom-up SCC traversal of the call graph. In other words, we
349 // visit all callees before callers (leaf-first).
Duncan Sands9a036b92008-09-03 12:55:42 +0000350 for (scc_iterator<CallGraph*> I = scc_begin(&CG), E = scc_end(&CG); I != E;
351 ++I) {
352 std::vector<CallGraphNode *> &SCC = *I;
Duncan Sandsf423abc2008-09-04 19:16:20 +0000353 assert(!SCC.empty() && "SCC with no functions?");
Duncan Sands9a036b92008-09-03 12:55:42 +0000354
Duncan Sandsf423abc2008-09-04 19:16:20 +0000355 if (!SCC[0]->getFunction()) {
356 // Calls externally - can't say anything useful. Remove any existing
357 // function records (may have been created when scanning globals).
358 for (unsigned i = 0, e = SCC.size(); i != e; ++i)
359 FunctionInfo.erase(SCC[i]->getFunction());
Duncan Sands9a036b92008-09-03 12:55:42 +0000360 continue;
Duncan Sandsf423abc2008-09-04 19:16:20 +0000361 }
362
363 FunctionRecord &FR = FunctionInfo[SCC[0]->getFunction()];
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000364
Duncan Sands9a036b92008-09-03 12:55:42 +0000365 bool KnowNothing = false;
366 unsigned FunctionEffect = 0;
Chris Lattnerfe98f272004-07-27 06:40:37 +0000367
Duncan Sands9a036b92008-09-03 12:55:42 +0000368 // Collect the mod/ref properties due to called functions. We only compute
369 // one mod-ref set.
370 for (unsigned i = 0, e = SCC.size(); i != e && !KnowNothing; ++i) {
371 Function *F = SCC[i]->getFunction();
372 if (!F) {
373 KnowNothing = true;
Chris Lattnerfe98f272004-07-27 06:40:37 +0000374 break;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000375 }
Chris Lattnerfe98f272004-07-27 06:40:37 +0000376
Duncan Sands9a036b92008-09-03 12:55:42 +0000377 if (F->isDeclaration()) {
378 // Try to get mod/ref behaviour from function attributes.
Duncan Sandsd0ac3732008-09-03 15:31:24 +0000379 if (F->doesNotAccessMemory()) {
380 // Can't do better than that!
381 } else if (F->onlyReadsMemory()) {
Duncan Sands9a036b92008-09-03 12:55:42 +0000382 FunctionEffect |= Ref;
Duncan Sands2bb4a4d2008-09-12 07:29:58 +0000383 if (!F->isIntrinsic())
Duncan Sands1abe60b2008-09-11 15:43:12 +0000384 // This function might call back into the module and read a global -
Duncan Sands2bb4a4d2008-09-12 07:29:58 +0000385 // consider every global as possibly being read by this function.
386 FR.MayReadAnyGlobal = true;
Duncan Sandsd0ac3732008-09-03 15:31:24 +0000387 } else {
Duncan Sands892b8402008-09-11 19:35:55 +0000388 FunctionEffect |= ModRef;
389 // Can't say anything useful unless it's an intrinsic - they don't
390 // read or write global variables of the kind considered here.
391 KnowNothing = !F->isIntrinsic();
Duncan Sands9a036b92008-09-03 12:55:42 +0000392 }
393 continue;
394 }
Misha Brukman2b37d7c2005-04-21 21:13:18 +0000395
Duncan Sands9a036b92008-09-03 12:55:42 +0000396 for (CallGraphNode::iterator CI = SCC[i]->begin(), E = SCC[i]->end();
Duncan Sandsf423abc2008-09-04 19:16:20 +0000397 CI != E && !KnowNothing; ++CI)
Duncan Sands9a036b92008-09-03 12:55:42 +0000398 if (Function *Callee = CI->second->getFunction()) {
399 if (FunctionRecord *CalleeFR = getFunctionInfo(Callee)) {
400 // Propagate function effect up.
401 FunctionEffect |= CalleeFR->FunctionEffect;
402
403 // Incorporate callee's effects on globals into our info.
404 for (std::map<GlobalValue*, unsigned>::iterator GI =
405 CalleeFR->GlobalInfo.begin(), E = CalleeFR->GlobalInfo.end();
406 GI != E; ++GI)
Duncan Sandsf423abc2008-09-04 19:16:20 +0000407 FR.GlobalInfo[GI->first] |= GI->second;
Duncan Sands2bb4a4d2008-09-12 07:29:58 +0000408 FR.MayReadAnyGlobal |= CalleeFR->MayReadAnyGlobal;
Duncan Sands9a036b92008-09-03 12:55:42 +0000409 } else {
410 // Can't say anything about it. However, if it is inside our SCC,
411 // then nothing needs to be done.
412 CallGraphNode *CalleeNode = CG[Callee];
413 if (std::find(SCC.begin(), SCC.end(), CalleeNode) == SCC.end())
414 KnowNothing = true;
415 }
416 } else {
417 KnowNothing = true;
418 }
419 }
420
421 // If we can't say anything useful about this SCC, remove all SCC functions
422 // from the FunctionInfo map.
423 if (KnowNothing) {
424 for (unsigned i = 0, e = SCC.size(); i != e; ++i)
425 FunctionInfo.erase(SCC[i]->getFunction());
Duncan Sandsb070bee2008-09-03 16:10:55 +0000426 continue;
Duncan Sands9a036b92008-09-03 12:55:42 +0000427 }
428
429 // Scan the function bodies for explicit loads or stores.
Chris Lattnerfe98f272004-07-27 06:40:37 +0000430 for (unsigned i = 0, e = SCC.size(); i != e && FunctionEffect != ModRef;++i)
431 for (inst_iterator II = inst_begin(SCC[i]->getFunction()),
Misha Brukman2b37d7c2005-04-21 21:13:18 +0000432 E = inst_end(SCC[i]->getFunction());
Chris Lattnerfe98f272004-07-27 06:40:37 +0000433 II != E && FunctionEffect != ModRef; ++II)
Duncan Sandsb8ca4ff2008-09-13 12:45:50 +0000434 if (isa<LoadInst>(*II)) {
Chris Lattnerfe98f272004-07-27 06:40:37 +0000435 FunctionEffect |= Ref;
Duncan Sandsb8ca4ff2008-09-13 12:45:50 +0000436 if (cast<LoadInst>(*II).isVolatile())
437 // Volatile loads may have side-effects, so mark them as writing
438 // memory (for example, a flag inside the processor).
439 FunctionEffect |= Mod;
440 } else if (isa<StoreInst>(*II)) {
Chris Lattnerfe98f272004-07-27 06:40:37 +0000441 FunctionEffect |= Mod;
Duncan Sandsb8ca4ff2008-09-13 12:45:50 +0000442 if (cast<StoreInst>(*II).isVolatile())
443 // Treat volatile stores as reading memory somewhere.
444 FunctionEffect |= Ref;
445 } else if (isa<MallocInst>(*II) || isa<FreeInst>(*II)) {
Chris Lattner3fe4d3c2005-04-22 05:36:59 +0000446 FunctionEffect |= ModRef;
Duncan Sandsb8ca4ff2008-09-13 12:45:50 +0000447 }
Duncan Sands9a036b92008-09-03 12:55:42 +0000448
449 if ((FunctionEffect & Mod) == 0)
450 ++NumReadMemFunctions;
451 if (FunctionEffect == 0)
452 ++NumNoMemFunctions;
Duncan Sandsf423abc2008-09-04 19:16:20 +0000453 FR.FunctionEffect = FunctionEffect;
Duncan Sands9a036b92008-09-03 12:55:42 +0000454
455 // Finally, now that we know the full effect on this SCC, clone the
456 // information to each function in the SCC.
457 for (unsigned i = 1, e = SCC.size(); i != e; ++i)
Duncan Sandsf423abc2008-09-04 19:16:20 +0000458 FunctionInfo[SCC[i]->getFunction()] = FR;
Chris Lattnerfe98f272004-07-27 06:40:37 +0000459 }
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000460}
461
462
463
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000464/// alias - If one of the pointers is to a global that we are tracking, and the
465/// other is some random pointer, we know there cannot be an alias, because the
466/// address of the global isn't taken.
467AliasAnalysis::AliasResult
468GlobalsModRef::alias(const Value *V1, unsigned V1Size,
469 const Value *V2, unsigned V2Size) {
Chris Lattnerab383582006-10-01 22:36:45 +0000470 // Get the base object these pointers point to.
471 Value *UV1 = getUnderlyingObject(const_cast<Value*>(V1));
472 Value *UV2 = getUnderlyingObject(const_cast<Value*>(V2));
Duncan Sands9a036b92008-09-03 12:55:42 +0000473
Chris Lattnerab383582006-10-01 22:36:45 +0000474 // If either of the underlying values is a global, they may be non-addr-taken
475 // globals, which we can answer queries about.
476 GlobalValue *GV1 = dyn_cast<GlobalValue>(UV1);
477 GlobalValue *GV2 = dyn_cast<GlobalValue>(UV2);
478 if (GV1 || GV2) {
479 // If the global's address is taken, pretend we don't know it's a pointer to
480 // the global.
481 if (GV1 && !NonAddressTakenGlobals.count(GV1)) GV1 = 0;
482 if (GV2 && !NonAddressTakenGlobals.count(GV2)) GV2 = 0;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000483
Chris Lattnerab383582006-10-01 22:36:45 +0000484 // If the the two pointers are derived from two different non-addr-taken
485 // globals, or if one is and the other isn't, we know these can't alias.
486 if ((GV1 || GV2) && GV1 != GV2)
487 return NoAlias;
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000488
Chris Lattnerab383582006-10-01 22:36:45 +0000489 // Otherwise if they are both derived from the same addr-taken global, we
490 // can't know the two accesses don't overlap.
491 }
Duncan Sands9a036b92008-09-03 12:55:42 +0000492
Chris Lattnerab383582006-10-01 22:36:45 +0000493 // These pointers may be based on the memory owned by an indirect global. If
494 // so, we may be able to handle this. First check to see if the base pointer
495 // is a direct load from an indirect global.
496 GV1 = GV2 = 0;
497 if (LoadInst *LI = dyn_cast<LoadInst>(UV1))
498 if (GlobalVariable *GV = dyn_cast<GlobalVariable>(LI->getOperand(0)))
499 if (IndirectGlobals.count(GV))
500 GV1 = GV;
501 if (LoadInst *LI = dyn_cast<LoadInst>(UV2))
502 if (GlobalVariable *GV = dyn_cast<GlobalVariable>(LI->getOperand(0)))
503 if (IndirectGlobals.count(GV))
504 GV2 = GV;
Duncan Sands9a036b92008-09-03 12:55:42 +0000505
Chris Lattnerab383582006-10-01 22:36:45 +0000506 // These pointers may also be from an allocation for the indirect global. If
507 // so, also handle them.
508 if (AllocsForIndirectGlobals.count(UV1))
509 GV1 = AllocsForIndirectGlobals[UV1];
510 if (AllocsForIndirectGlobals.count(UV2))
511 GV2 = AllocsForIndirectGlobals[UV2];
Duncan Sands9a036b92008-09-03 12:55:42 +0000512
Chris Lattnerab383582006-10-01 22:36:45 +0000513 // Now that we know whether the two pointers are related to indirect globals,
514 // use this to disambiguate the pointers. If either pointer is based on an
515 // indirect global and if they are not both based on the same indirect global,
516 // they cannot alias.
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000517 if ((GV1 || GV2) && GV1 != GV2)
518 return NoAlias;
Duncan Sands9a036b92008-09-03 12:55:42 +0000519
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000520 return AliasAnalysis::alias(V1, V1Size, V2, V2Size);
521}
522
523AliasAnalysis::ModRefResult
524GlobalsModRef::getModRefInfo(CallSite CS, Value *P, unsigned Size) {
525 unsigned Known = ModRef;
526
527 // If we are asking for mod/ref info of a direct call with a pointer to a
Chris Lattnerfe98f272004-07-27 06:40:37 +0000528 // global we are tracking, return information if we have it.
Chris Lattnerab383582006-10-01 22:36:45 +0000529 if (GlobalValue *GV = dyn_cast<GlobalValue>(getUnderlyingObject(P)))
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000530 if (GV->hasInternalLinkage())
Chris Lattnerfe98f272004-07-27 06:40:37 +0000531 if (Function *F = CS.getCalledFunction())
532 if (NonAddressTakenGlobals.count(GV))
533 if (FunctionRecord *FR = getFunctionInfo(F))
534 Known = FR->getInfoForGlobal(GV);
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000535
536 if (Known == NoModRef)
537 return NoModRef; // No need to query other mod/ref analyses
538 return ModRefResult(Known & AliasAnalysis::getModRefInfo(CS, P, Size));
539}
540
541
542//===----------------------------------------------------------------------===//
543// Methods to update the analysis as a result of the client transformation.
544//
545void GlobalsModRef::deleteValue(Value *V) {
Chris Lattnerab383582006-10-01 22:36:45 +0000546 if (GlobalValue *GV = dyn_cast<GlobalValue>(V)) {
547 if (NonAddressTakenGlobals.erase(GV)) {
548 // This global might be an indirect global. If so, remove it and remove
549 // any AllocRelatedValues for it.
550 if (IndirectGlobals.erase(GV)) {
551 // Remove any entries in AllocsForIndirectGlobals for this global.
552 for (std::map<Value*, GlobalValue*>::iterator
553 I = AllocsForIndirectGlobals.begin(),
554 E = AllocsForIndirectGlobals.end(); I != E; ) {
555 if (I->second == GV) {
556 AllocsForIndirectGlobals.erase(I++);
557 } else {
558 ++I;
559 }
560 }
561 }
562 }
563 }
Duncan Sands9a036b92008-09-03 12:55:42 +0000564
Chris Lattnerab383582006-10-01 22:36:45 +0000565 // Otherwise, if this is an allocation related to an indirect global, remove
566 // it.
567 AllocsForIndirectGlobals.erase(V);
Duncan Sands9a036b92008-09-03 12:55:42 +0000568
Chris Lattnercd883f22007-11-30 18:52:58 +0000569 AliasAnalysis::deleteValue(V);
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000570}
571
572void GlobalsModRef::copyValue(Value *From, Value *To) {
Chris Lattnercd883f22007-11-30 18:52:58 +0000573 AliasAnalysis::copyValue(From, To);
Chris Lattner3b04a8a2004-06-28 06:33:13 +0000574}