blob: 9bd7af61c531f565b0b13724dacfa46c09d628b6 [file] [log] [blame]
Duncan Sands9e89ba32008-12-31 16:14:43 +00001//===- FunctionAttrs.cpp - Pass which marks functions readnone or readonly ===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file implements a simple interprocedural pass which walks the
11// call-graph, looking for functions which do not access or only read
Duncan Sandsb2f22792009-01-02 11:46:24 +000012// non-local memory, and marking them readnone/readonly. In addition,
13// it marks function arguments (of pointer type) 'nocapture' if a call
14// to the function does not create any copies of the pointer value that
15// outlive the call. This more or less means that the pointer is only
16// dereferenced, and not returned from the function or stored in a global.
17// This pass is implemented as a bottom-up traversal of the call-graph.
Duncan Sands9e89ba32008-12-31 16:14:43 +000018//
19//===----------------------------------------------------------------------===//
20
21#define DEBUG_TYPE "functionattrs"
22#include "llvm/Transforms/IPO.h"
23#include "llvm/CallGraphSCCPass.h"
24#include "llvm/GlobalVariable.h"
Devang Patelcd119912009-03-03 00:28:44 +000025#include "llvm/IntrinsicInst.h"
Nick Lewycky199aa3c2009-03-08 06:20:47 +000026#include "llvm/Analysis/AliasAnalysis.h"
Duncan Sands9e89ba32008-12-31 16:14:43 +000027#include "llvm/Analysis/CallGraph.h"
Duncan Sands8556d2a2009-01-18 12:19:30 +000028#include "llvm/Analysis/CaptureTracking.h"
Victor Hernandezf006b182009-10-27 20:05:49 +000029#include "llvm/Analysis/MemoryBuiltins.h"
Duncan Sands338cd6b2009-01-02 11:54:37 +000030#include "llvm/ADT/SmallSet.h"
Duncan Sands9e89ba32008-12-31 16:14:43 +000031#include "llvm/ADT/Statistic.h"
Nick Lewycky199aa3c2009-03-08 06:20:47 +000032#include "llvm/ADT/UniqueVector.h"
Duncan Sands9e89ba32008-12-31 16:14:43 +000033#include "llvm/Support/InstIterator.h"
34using namespace llvm;
35
36STATISTIC(NumReadNone, "Number of functions marked readnone");
37STATISTIC(NumReadOnly, "Number of functions marked readonly");
38STATISTIC(NumNoCapture, "Number of arguments marked nocapture");
Nick Lewycky199aa3c2009-03-08 06:20:47 +000039STATISTIC(NumNoAlias, "Number of function returns marked noalias");
Duncan Sands9e89ba32008-12-31 16:14:43 +000040
41namespace {
Nick Lewycky6726b6d2009-10-25 06:33:48 +000042 struct FunctionAttrs : public CallGraphSCCPass {
Duncan Sands9e89ba32008-12-31 16:14:43 +000043 static char ID; // Pass identification, replacement for typeid
44 FunctionAttrs() : CallGraphSCCPass(&ID) {}
45
46 // runOnSCC - Analyze the SCC, performing the transformation if possible.
Chris Lattner2decb222010-04-16 22:42:17 +000047 bool runOnSCC(CallGraphSCC &SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +000048
49 // AddReadAttrs - Deduce readonly/readnone attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000050 bool AddReadAttrs(const CallGraphSCC &SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +000051
52 // AddNoCaptureAttrs - Deduce nocapture attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000053 bool AddNoCaptureAttrs(const CallGraphSCC &SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +000054
Nick Lewycky199aa3c2009-03-08 06:20:47 +000055 // IsFunctionMallocLike - Does this function allocate new memory?
56 bool IsFunctionMallocLike(Function *F,
Chris Lattner98a27ce2009-08-31 04:09:04 +000057 SmallPtrSet<Function*, 8> &) const;
Nick Lewycky199aa3c2009-03-08 06:20:47 +000058
59 // AddNoAliasAttrs - Deduce noalias attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000060 bool AddNoAliasAttrs(const CallGraphSCC &SCC);
Nick Lewycky199aa3c2009-03-08 06:20:47 +000061
Duncan Sands9e89ba32008-12-31 16:14:43 +000062 virtual void getAnalysisUsage(AnalysisUsage &AU) const {
63 AU.setPreservesCFG();
64 CallGraphSCCPass::getAnalysisUsage(AU);
65 }
66
67 bool PointsToLocalMemory(Value *V);
68 };
69}
70
71char FunctionAttrs::ID = 0;
72static RegisterPass<FunctionAttrs>
73X("functionattrs", "Deduce function attributes");
74
75Pass *llvm::createFunctionAttrsPass() { return new FunctionAttrs(); }
76
77
78/// PointsToLocalMemory - Returns whether the given pointer value points to
79/// memory that is local to the function. Global constants are considered
80/// local to all functions.
81bool FunctionAttrs::PointsToLocalMemory(Value *V) {
Duncan Sands5d8ea112010-01-07 05:48:42 +000082 SmallVector<Value*, 16> Worklist;
83 unsigned MaxLookup = 8;
Duncan Sandse10920d2010-01-06 15:37:47 +000084
85 Worklist.push_back(V);
86
87 do {
88 V = Worklist.pop_back_val()->getUnderlyingObject();
89
90 // An alloca instruction defines local memory.
91 if (isa<AllocaInst>(V))
92 continue;
93
94 // A global constant counts as local memory for our purposes.
95 if (GlobalVariable *GV = dyn_cast<GlobalVariable>(V)) {
96 if (!GV->isConstant())
97 return false;
98 continue;
99 }
100
101 // If both select values point to local memory, then so does the select.
102 if (SelectInst *SI = dyn_cast<SelectInst>(V)) {
103 Worklist.push_back(SI->getTrueValue());
104 Worklist.push_back(SI->getFalseValue());
105 continue;
106 }
107
108 // If all values incoming to a phi node point to local memory, then so does
109 // the phi.
110 if (PHINode *PN = dyn_cast<PHINode>(V)) {
111 // Don't bother inspecting phi nodes with many operands.
112 if (PN->getNumIncomingValues() > MaxLookup)
113 return false;
114 for (unsigned i = 0, e = PN->getNumIncomingValues(); i != e; ++i)
115 Worklist.push_back(PN->getIncomingValue(i));
116 continue;
117 }
118
119 return false;
120 } while (!Worklist.empty() && --MaxLookup);
121
122 return Worklist.empty();
Duncan Sands9e89ba32008-12-31 16:14:43 +0000123}
124
125/// AddReadAttrs - Deduce readonly/readnone attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000126bool FunctionAttrs::AddReadAttrs(const CallGraphSCC &SCC) {
Chris Lattner98a27ce2009-08-31 04:09:04 +0000127 SmallPtrSet<Function*, 8> SCCNodes;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000128
129 // Fill SCCNodes with the elements of the SCC. Used for quickly
130 // looking up whether a given CallGraphNode is in this SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000131 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I)
132 SCCNodes.insert((*I)->getFunction());
Duncan Sands9e89ba32008-12-31 16:14:43 +0000133
134 // Check if any of the functions in the SCC read or write memory. If they
135 // write memory then they can't be marked readnone or readonly.
136 bool ReadsMemory = false;
Chris Lattner2decb222010-04-16 22:42:17 +0000137 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
138 Function *F = (*I)->getFunction();
Duncan Sands9e89ba32008-12-31 16:14:43 +0000139
140 if (F == 0)
141 // External node - may write memory. Just give up.
142 return false;
143
144 if (F->doesNotAccessMemory())
145 // Already perfect!
146 continue;
147
148 // Definitions with weak linkage may be overridden at linktime with
149 // something that writes memory, so treat them like declarations.
150 if (F->isDeclaration() || F->mayBeOverridden()) {
151 if (!F->onlyReadsMemory())
152 // May write memory. Just give up.
153 return false;
154
155 ReadsMemory = true;
156 continue;
157 }
158
159 // Scan the function body for instructions that may read or write memory.
160 for (inst_iterator II = inst_begin(F), E = inst_end(F); II != E; ++II) {
161 Instruction *I = &*II;
162
163 // Some instructions can be ignored even if they read or write memory.
164 // Detect these now, skipping to the next instruction if one is found.
165 CallSite CS = CallSite::get(I);
Chris Lattner98a27ce2009-08-31 04:09:04 +0000166 if (CS.getInstruction() && CS.getCalledFunction()) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000167 // Ignore calls to functions in the same SCC.
Chris Lattner98a27ce2009-08-31 04:09:04 +0000168 if (SCCNodes.count(CS.getCalledFunction()))
Duncan Sands9e89ba32008-12-31 16:14:43 +0000169 continue;
Duncan Sands7c422ac2010-01-06 08:45:52 +0000170 // Ignore intrinsics that only access local memory.
171 if (unsigned id = CS.getCalledFunction()->getIntrinsicID())
172 if (AliasAnalysis::getModRefBehavior(id) ==
173 AliasAnalysis::AccessesArguments) {
174 // Check that all pointer arguments point to local memory.
175 for (CallSite::arg_iterator CI = CS.arg_begin(), CE = CS.arg_end();
176 CI != CE; ++CI) {
177 Value *Arg = *CI;
Duncan Sands1df98592010-02-16 11:11:14 +0000178 if (Arg->getType()->isPointerTy() && !PointsToLocalMemory(Arg))
Duncan Sands7c422ac2010-01-06 08:45:52 +0000179 // Writes memory. Just give up.
180 return false;
181 }
182 // Only reads and writes local memory.
183 continue;
184 }
Duncan Sands9e89ba32008-12-31 16:14:43 +0000185 } else if (LoadInst *LI = dyn_cast<LoadInst>(I)) {
186 // Ignore loads from local memory.
187 if (PointsToLocalMemory(LI->getPointerOperand()))
188 continue;
189 } else if (StoreInst *SI = dyn_cast<StoreInst>(I)) {
190 // Ignore stores to local memory.
191 if (PointsToLocalMemory(SI->getPointerOperand()))
192 continue;
193 }
194
195 // Any remaining instructions need to be taken seriously! Check if they
196 // read or write memory.
197 if (I->mayWriteToMemory())
198 // Writes memory. Just give up.
199 return false;
Duncan Sandscfd0ebe2009-05-06 08:42:00 +0000200
Victor Hernandeza276c602009-10-17 01:18:07 +0000201 if (isMalloc(I))
Victor Hernandez83d63912009-09-18 22:35:49 +0000202 // malloc claims not to write memory! PR3754.
Duncan Sandscfd0ebe2009-05-06 08:42:00 +0000203 return false;
204
Duncan Sands9e89ba32008-12-31 16:14:43 +0000205 // If this instruction may read memory, remember that.
206 ReadsMemory |= I->mayReadFromMemory();
207 }
208 }
209
210 // Success! Functions in this SCC do not access memory, or only read memory.
211 // Give them the appropriate attribute.
212 bool MadeChange = false;
Chris Lattner2decb222010-04-16 22:42:17 +0000213 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
214 Function *F = (*I)->getFunction();
Duncan Sands9e89ba32008-12-31 16:14:43 +0000215
216 if (F->doesNotAccessMemory())
217 // Already perfect!
218 continue;
219
220 if (F->onlyReadsMemory() && ReadsMemory)
221 // No change.
222 continue;
223
224 MadeChange = true;
225
226 // Clear out any existing attributes.
227 F->removeAttribute(~0, Attribute::ReadOnly | Attribute::ReadNone);
228
229 // Add in the new attribute.
230 F->addAttribute(~0, ReadsMemory? Attribute::ReadOnly : Attribute::ReadNone);
231
232 if (ReadsMemory)
Duncan Sandsb2f22792009-01-02 11:46:24 +0000233 ++NumReadOnly;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000234 else
Duncan Sandsb2f22792009-01-02 11:46:24 +0000235 ++NumReadNone;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000236 }
237
238 return MadeChange;
239}
240
Duncan Sands9e89ba32008-12-31 16:14:43 +0000241/// AddNoCaptureAttrs - Deduce nocapture attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000242bool FunctionAttrs::AddNoCaptureAttrs(const CallGraphSCC &SCC) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000243 bool Changed = false;
244
245 // Check each function in turn, determining which pointer arguments are not
246 // captured.
Chris Lattner2decb222010-04-16 22:42:17 +0000247 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
248 Function *F = (*I)->getFunction();
Duncan Sands9e89ba32008-12-31 16:14:43 +0000249
250 if (F == 0)
251 // External node - skip it;
252 continue;
253
254 // Definitions with weak linkage may be overridden at linktime with
255 // something that writes memory, so treat them like declarations.
256 if (F->isDeclaration() || F->mayBeOverridden())
257 continue;
258
259 for (Function::arg_iterator A = F->arg_begin(), E = F->arg_end(); A!=E; ++A)
Duncan Sands1df98592010-02-16 11:11:14 +0000260 if (A->getType()->isPointerTy() && !A->hasNoCaptureAttr() &&
Dan Gohmanf94b5ed2009-11-19 21:57:48 +0000261 !PointerMayBeCaptured(A, true, /*StoreCaptures=*/false)) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000262 A->addAttr(Attribute::NoCapture);
Nick Lewycky6b056862009-01-02 03:46:56 +0000263 ++NumNoCapture;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000264 Changed = true;
265 }
266 }
267
268 return Changed;
269}
270
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000271/// IsFunctionMallocLike - A function is malloc-like if it returns either null
Nick Lewycky4bfba9d2009-03-08 17:08:09 +0000272/// or a pointer that doesn't alias any other pointer visible to the caller.
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000273bool FunctionAttrs::IsFunctionMallocLike(Function *F,
Chris Lattner98a27ce2009-08-31 04:09:04 +0000274 SmallPtrSet<Function*, 8> &SCCNodes) const {
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000275 UniqueVector<Value *> FlowsToReturn;
276 for (Function::iterator I = F->begin(), E = F->end(); I != E; ++I)
277 if (ReturnInst *Ret = dyn_cast<ReturnInst>(I->getTerminator()))
278 FlowsToReturn.insert(Ret->getReturnValue());
279
280 for (unsigned i = 0; i != FlowsToReturn.size(); ++i) {
281 Value *RetVal = FlowsToReturn[i+1]; // UniqueVector[0] is reserved.
282
283 if (Constant *C = dyn_cast<Constant>(RetVal)) {
284 if (!C->isNullValue() && !isa<UndefValue>(C))
285 return false;
286
287 continue;
288 }
289
290 if (isa<Argument>(RetVal))
291 return false;
292
293 if (Instruction *RVI = dyn_cast<Instruction>(RetVal))
294 switch (RVI->getOpcode()) {
295 // Extend the analysis by looking upwards.
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000296 case Instruction::BitCast:
Victor Hernandez83d63912009-09-18 22:35:49 +0000297 case Instruction::GetElementPtr:
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000298 FlowsToReturn.insert(RVI->getOperand(0));
299 continue;
300 case Instruction::Select: {
301 SelectInst *SI = cast<SelectInst>(RVI);
302 FlowsToReturn.insert(SI->getTrueValue());
303 FlowsToReturn.insert(SI->getFalseValue());
Chris Lattner439044f2009-09-27 21:29:28 +0000304 continue;
305 }
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000306 case Instruction::PHI: {
307 PHINode *PN = cast<PHINode>(RVI);
308 for (int i = 0, e = PN->getNumIncomingValues(); i != e; ++i)
309 FlowsToReturn.insert(PN->getIncomingValue(i));
Chris Lattner439044f2009-09-27 21:29:28 +0000310 continue;
311 }
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000312
313 // Check whether the pointer came from an allocation.
314 case Instruction::Alloca:
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000315 break;
316 case Instruction::Call:
317 case Instruction::Invoke: {
318 CallSite CS(RVI);
319 if (CS.paramHasAttr(0, Attribute::NoAlias))
320 break;
321 if (CS.getCalledFunction() &&
Chris Lattner98a27ce2009-08-31 04:09:04 +0000322 SCCNodes.count(CS.getCalledFunction()))
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000323 break;
324 } // fall-through
325 default:
326 return false; // Did not come from an allocation.
327 }
328
Dan Gohmanf94b5ed2009-11-19 21:57:48 +0000329 if (PointerMayBeCaptured(RetVal, false, /*StoreCaptures=*/false))
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000330 return false;
331 }
332
333 return true;
334}
335
336/// AddNoAliasAttrs - Deduce noalias attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000337bool FunctionAttrs::AddNoAliasAttrs(const CallGraphSCC &SCC) {
Chris Lattner98a27ce2009-08-31 04:09:04 +0000338 SmallPtrSet<Function*, 8> SCCNodes;
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000339
340 // Fill SCCNodes with the elements of the SCC. Used for quickly
341 // looking up whether a given CallGraphNode is in this SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000342 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I)
343 SCCNodes.insert((*I)->getFunction());
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000344
Nick Lewycky4bfba9d2009-03-08 17:08:09 +0000345 // Check each function in turn, determining which functions return noalias
346 // pointers.
Chris Lattner2decb222010-04-16 22:42:17 +0000347 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
348 Function *F = (*I)->getFunction();
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000349
350 if (F == 0)
351 // External node - skip it;
352 return false;
353
354 // Already noalias.
355 if (F->doesNotAlias(0))
356 continue;
357
358 // Definitions with weak linkage may be overridden at linktime, so
359 // treat them like declarations.
360 if (F->isDeclaration() || F->mayBeOverridden())
361 return false;
362
363 // We annotate noalias return values, which are only applicable to
364 // pointer types.
Duncan Sands1df98592010-02-16 11:11:14 +0000365 if (!F->getReturnType()->isPointerTy())
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000366 continue;
367
368 if (!IsFunctionMallocLike(F, SCCNodes))
369 return false;
370 }
371
372 bool MadeChange = false;
Chris Lattner2decb222010-04-16 22:42:17 +0000373 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
374 Function *F = (*I)->getFunction();
Duncan Sands1df98592010-02-16 11:11:14 +0000375 if (F->doesNotAlias(0) || !F->getReturnType()->isPointerTy())
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000376 continue;
377
378 F->setDoesNotAlias(0);
379 ++NumNoAlias;
380 MadeChange = true;
381 }
382
383 return MadeChange;
384}
385
Chris Lattner2decb222010-04-16 22:42:17 +0000386bool FunctionAttrs::runOnSCC(CallGraphSCC &SCC) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000387 bool Changed = AddReadAttrs(SCC);
388 Changed |= AddNoCaptureAttrs(SCC);
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000389 Changed |= AddNoAliasAttrs(SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +0000390 return Changed;
391}