blob: 3b1b13d378fcd8c000c1119f081492787ec849ec [file] [log] [blame]
Duncan Sands9e89ba32008-12-31 16:14:43 +00001//===- FunctionAttrs.cpp - Pass which marks functions readnone or readonly ===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file implements a simple interprocedural pass which walks the
11// call-graph, looking for functions which do not access or only read
Duncan Sandsb2f22792009-01-02 11:46:24 +000012// non-local memory, and marking them readnone/readonly. In addition,
13// it marks function arguments (of pointer type) 'nocapture' if a call
14// to the function does not create any copies of the pointer value that
15// outlive the call. This more or less means that the pointer is only
16// dereferenced, and not returned from the function or stored in a global.
17// This pass is implemented as a bottom-up traversal of the call-graph.
Duncan Sands9e89ba32008-12-31 16:14:43 +000018//
19//===----------------------------------------------------------------------===//
20
21#define DEBUG_TYPE "functionattrs"
22#include "llvm/Transforms/IPO.h"
23#include "llvm/CallGraphSCCPass.h"
24#include "llvm/GlobalVariable.h"
Devang Patelcd119912009-03-03 00:28:44 +000025#include "llvm/IntrinsicInst.h"
Dan Gohmanea8900f2010-11-08 17:12:04 +000026#include "llvm/LLVMContext.h"
Nick Lewycky199aa3c2009-03-08 06:20:47 +000027#include "llvm/Analysis/AliasAnalysis.h"
Duncan Sands9e89ba32008-12-31 16:14:43 +000028#include "llvm/Analysis/CallGraph.h"
Duncan Sands8556d2a2009-01-18 12:19:30 +000029#include "llvm/Analysis/CaptureTracking.h"
Duncan Sands338cd6b2009-01-02 11:54:37 +000030#include "llvm/ADT/SmallSet.h"
Duncan Sands9e89ba32008-12-31 16:14:43 +000031#include "llvm/ADT/Statistic.h"
Nick Lewycky199aa3c2009-03-08 06:20:47 +000032#include "llvm/ADT/UniqueVector.h"
Duncan Sands9e89ba32008-12-31 16:14:43 +000033#include "llvm/Support/InstIterator.h"
34using namespace llvm;
35
36STATISTIC(NumReadNone, "Number of functions marked readnone");
37STATISTIC(NumReadOnly, "Number of functions marked readonly");
38STATISTIC(NumNoCapture, "Number of arguments marked nocapture");
Nick Lewycky199aa3c2009-03-08 06:20:47 +000039STATISTIC(NumNoAlias, "Number of function returns marked noalias");
Duncan Sands9e89ba32008-12-31 16:14:43 +000040
41namespace {
Nick Lewycky6726b6d2009-10-25 06:33:48 +000042 struct FunctionAttrs : public CallGraphSCCPass {
Duncan Sands9e89ba32008-12-31 16:14:43 +000043 static char ID; // Pass identification, replacement for typeid
Dan Gohman3c97f7a2010-11-08 16:10:15 +000044 FunctionAttrs() : CallGraphSCCPass(ID), AA(0) {
Owen Anderson081c34b2010-10-19 17:21:58 +000045 initializeFunctionAttrsPass(*PassRegistry::getPassRegistry());
46 }
Duncan Sands9e89ba32008-12-31 16:14:43 +000047
48 // runOnSCC - Analyze the SCC, performing the transformation if possible.
Chris Lattner2decb222010-04-16 22:42:17 +000049 bool runOnSCC(CallGraphSCC &SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +000050
51 // AddReadAttrs - Deduce readonly/readnone attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000052 bool AddReadAttrs(const CallGraphSCC &SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +000053
54 // AddNoCaptureAttrs - Deduce nocapture attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000055 bool AddNoCaptureAttrs(const CallGraphSCC &SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +000056
Nick Lewycky199aa3c2009-03-08 06:20:47 +000057 // IsFunctionMallocLike - Does this function allocate new memory?
58 bool IsFunctionMallocLike(Function *F,
Chris Lattner98a27ce2009-08-31 04:09:04 +000059 SmallPtrSet<Function*, 8> &) const;
Nick Lewycky199aa3c2009-03-08 06:20:47 +000060
61 // AddNoAliasAttrs - Deduce noalias attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000062 bool AddNoAliasAttrs(const CallGraphSCC &SCC);
Nick Lewycky199aa3c2009-03-08 06:20:47 +000063
Duncan Sands9e89ba32008-12-31 16:14:43 +000064 virtual void getAnalysisUsage(AnalysisUsage &AU) const {
65 AU.setPreservesCFG();
Dan Gohman3c97f7a2010-11-08 16:10:15 +000066 AU.addRequired<AliasAnalysis>();
Duncan Sands9e89ba32008-12-31 16:14:43 +000067 CallGraphSCCPass::getAnalysisUsage(AU);
68 }
69
Dan Gohman3c97f7a2010-11-08 16:10:15 +000070 private:
71 AliasAnalysis *AA;
Duncan Sands9e89ba32008-12-31 16:14:43 +000072 };
73}
74
75char FunctionAttrs::ID = 0;
Owen Andersonae0a7bc2010-10-13 22:00:45 +000076INITIALIZE_PASS_BEGIN(FunctionAttrs, "functionattrs",
77 "Deduce function attributes", false, false)
78INITIALIZE_AG_DEPENDENCY(CallGraph)
79INITIALIZE_PASS_END(FunctionAttrs, "functionattrs",
Owen Andersonce665bd2010-10-07 22:25:06 +000080 "Deduce function attributes", false, false)
Duncan Sands9e89ba32008-12-31 16:14:43 +000081
82Pass *llvm::createFunctionAttrsPass() { return new FunctionAttrs(); }
83
84
Duncan Sands9e89ba32008-12-31 16:14:43 +000085/// AddReadAttrs - Deduce readonly/readnone attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000086bool FunctionAttrs::AddReadAttrs(const CallGraphSCC &SCC) {
Chris Lattner98a27ce2009-08-31 04:09:04 +000087 SmallPtrSet<Function*, 8> SCCNodes;
Duncan Sands9e89ba32008-12-31 16:14:43 +000088
89 // Fill SCCNodes with the elements of the SCC. Used for quickly
90 // looking up whether a given CallGraphNode is in this SCC.
Chris Lattner2decb222010-04-16 22:42:17 +000091 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I)
92 SCCNodes.insert((*I)->getFunction());
Duncan Sands9e89ba32008-12-31 16:14:43 +000093
94 // Check if any of the functions in the SCC read or write memory. If they
95 // write memory then they can't be marked readnone or readonly.
96 bool ReadsMemory = false;
Chris Lattner2decb222010-04-16 22:42:17 +000097 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
98 Function *F = (*I)->getFunction();
Duncan Sands9e89ba32008-12-31 16:14:43 +000099
100 if (F == 0)
101 // External node - may write memory. Just give up.
102 return false;
103
Dan Gohman6d44d642010-11-09 20:13:27 +0000104 AliasAnalysis::ModRefBehavior MRB = AA->getModRefBehavior(F);
105 if (MRB == AliasAnalysis::DoesNotAccessMemory)
Duncan Sands9e89ba32008-12-31 16:14:43 +0000106 // Already perfect!
107 continue;
108
109 // Definitions with weak linkage may be overridden at linktime with
110 // something that writes memory, so treat them like declarations.
111 if (F->isDeclaration() || F->mayBeOverridden()) {
Dan Gohman6d44d642010-11-09 20:13:27 +0000112 if (!AliasAnalysis::onlyReadsMemory(MRB))
Duncan Sands9e89ba32008-12-31 16:14:43 +0000113 // May write memory. Just give up.
114 return false;
115
116 ReadsMemory = true;
117 continue;
118 }
119
120 // Scan the function body for instructions that may read or write memory.
121 for (inst_iterator II = inst_begin(F), E = inst_end(F); II != E; ++II) {
122 Instruction *I = &*II;
123
124 // Some instructions can be ignored even if they read or write memory.
125 // Detect these now, skipping to the next instruction if one is found.
Gabor Greif7d3056b2010-07-28 22:50:26 +0000126 CallSite CS(cast<Value>(I));
Dan Gohman3c97f7a2010-11-08 16:10:15 +0000127 if (CS) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000128 // Ignore calls to functions in the same SCC.
Dan Gohman3c97f7a2010-11-08 16:10:15 +0000129 if (CS.getCalledFunction() && SCCNodes.count(CS.getCalledFunction()))
Duncan Sands9e89ba32008-12-31 16:14:43 +0000130 continue;
Dan Gohman42c31a72010-11-10 01:02:18 +0000131 AliasAnalysis::ModRefBehavior MRB = AA->getModRefBehavior(CS);
132 // If the call doesn't access arbitrary memory, we may be able to
133 // figure out something.
134 if (!(MRB & AliasAnalysis::Anywhere &
135 ~AliasAnalysis::ArgumentPointees)) {
136 // If the call accesses argument pointees, check each argument.
137 if (MRB & AliasAnalysis::AccessesArguments)
138 // Check whether all pointer arguments point to local memory, and
139 // ignore calls that only access local memory.
140 for (CallSite::arg_iterator CI = CS.arg_begin(), CE = CS.arg_end();
141 CI != CE; ++CI) {
142 Value *Arg = *CI;
143 if (Arg->getType()->isPointerTy()) {
144 AliasAnalysis::Location Loc(Arg,
145 AliasAnalysis::UnknownSize,
146 I->getMetadata(LLVMContext::MD_tbaa));
147 if (!AA->pointsToConstantMemory(Loc, /*OrLocal=*/true)) {
148 if (MRB & AliasAnalysis::Mod)
149 // Writes non-local memory. Give up.
150 return false;
151 if (MRB & AliasAnalysis::Ref)
152 // Ok, it reads non-local memory.
153 ReadsMemory = true;
154 }
Dan Gohman40b6a192010-11-09 19:56:27 +0000155 }
156 }
Dan Gohman40b6a192010-11-09 19:56:27 +0000157 continue;
Dan Gohman3c97f7a2010-11-08 16:10:15 +0000158 }
Dan Gohman42c31a72010-11-10 01:02:18 +0000159 // The call could access any memory. If that includes writes, give up.
160 if (MRB & AliasAnalysis::Mod)
161 return false;
162 // If it reads, note it.
163 if (MRB & AliasAnalysis::Ref)
164 ReadsMemory = true;
165 continue;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000166 } else if (LoadInst *LI = dyn_cast<LoadInst>(I)) {
Duncan Sandsad6f5412010-10-30 12:59:44 +0000167 // Ignore non-volatile loads from local memory.
Dan Gohmanea8900f2010-11-08 17:12:04 +0000168 if (!LI->isVolatile()) {
169 AliasAnalysis::Location Loc(LI->getPointerOperand(),
170 AA->getTypeStoreSize(LI->getType()),
171 LI->getMetadata(LLVMContext::MD_tbaa));
172 if (AA->pointsToConstantMemory(Loc, /*OrLocal=*/true))
173 continue;
174 }
Duncan Sands9e89ba32008-12-31 16:14:43 +0000175 } else if (StoreInst *SI = dyn_cast<StoreInst>(I)) {
Duncan Sandsad6f5412010-10-30 12:59:44 +0000176 // Ignore non-volatile stores to local memory.
Dan Gohmanea8900f2010-11-08 17:12:04 +0000177 if (!SI->isVolatile()) {
178 const Type *StoredType = SI->getValueOperand()->getType();
179 AliasAnalysis::Location Loc(SI->getPointerOperand(),
180 AA->getTypeStoreSize(StoredType),
181 SI->getMetadata(LLVMContext::MD_tbaa));
182 if (AA->pointsToConstantMemory(Loc, /*OrLocal=*/true))
183 continue;
184 }
Dan Gohman4cf0dcf2010-11-09 20:17:38 +0000185 } else if (VAArgInst *VI = dyn_cast<VAArgInst>(I)) {
186 // Ignore vaargs on local memory.
187 AliasAnalysis::Location Loc(VI->getPointerOperand(),
188 AliasAnalysis::UnknownSize,
189 VI->getMetadata(LLVMContext::MD_tbaa));
190 if (AA->pointsToConstantMemory(Loc, /*OrLocal=*/true))
191 continue;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000192 }
193
194 // Any remaining instructions need to be taken seriously! Check if they
195 // read or write memory.
196 if (I->mayWriteToMemory())
197 // Writes memory. Just give up.
198 return false;
Duncan Sandscfd0ebe2009-05-06 08:42:00 +0000199
Duncan Sands9e89ba32008-12-31 16:14:43 +0000200 // If this instruction may read memory, remember that.
201 ReadsMemory |= I->mayReadFromMemory();
202 }
203 }
204
205 // Success! Functions in this SCC do not access memory, or only read memory.
206 // Give them the appropriate attribute.
207 bool MadeChange = false;
Chris Lattner2decb222010-04-16 22:42:17 +0000208 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
209 Function *F = (*I)->getFunction();
Duncan Sands9e89ba32008-12-31 16:14:43 +0000210
211 if (F->doesNotAccessMemory())
212 // Already perfect!
213 continue;
214
215 if (F->onlyReadsMemory() && ReadsMemory)
216 // No change.
217 continue;
218
219 MadeChange = true;
220
221 // Clear out any existing attributes.
222 F->removeAttribute(~0, Attribute::ReadOnly | Attribute::ReadNone);
223
224 // Add in the new attribute.
225 F->addAttribute(~0, ReadsMemory? Attribute::ReadOnly : Attribute::ReadNone);
226
227 if (ReadsMemory)
Duncan Sandsb2f22792009-01-02 11:46:24 +0000228 ++NumReadOnly;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000229 else
Duncan Sandsb2f22792009-01-02 11:46:24 +0000230 ++NumReadNone;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000231 }
232
233 return MadeChange;
234}
235
Duncan Sands9e89ba32008-12-31 16:14:43 +0000236/// AddNoCaptureAttrs - Deduce nocapture attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000237bool FunctionAttrs::AddNoCaptureAttrs(const CallGraphSCC &SCC) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000238 bool Changed = false;
239
240 // Check each function in turn, determining which pointer arguments are not
241 // captured.
Chris Lattner2decb222010-04-16 22:42:17 +0000242 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
243 Function *F = (*I)->getFunction();
Duncan Sands9e89ba32008-12-31 16:14:43 +0000244
245 if (F == 0)
246 // External node - skip it;
247 continue;
248
249 // Definitions with weak linkage may be overridden at linktime with
250 // something that writes memory, so treat them like declarations.
251 if (F->isDeclaration() || F->mayBeOverridden())
252 continue;
253
254 for (Function::arg_iterator A = F->arg_begin(), E = F->arg_end(); A!=E; ++A)
Duncan Sands1df98592010-02-16 11:11:14 +0000255 if (A->getType()->isPointerTy() && !A->hasNoCaptureAttr() &&
Dan Gohmanf94b5ed2009-11-19 21:57:48 +0000256 !PointerMayBeCaptured(A, true, /*StoreCaptures=*/false)) {
Duncan Sands9e89ba32008-12-31 16:14:43 +0000257 A->addAttr(Attribute::NoCapture);
Nick Lewycky6b056862009-01-02 03:46:56 +0000258 ++NumNoCapture;
Duncan Sands9e89ba32008-12-31 16:14:43 +0000259 Changed = true;
260 }
261 }
262
263 return Changed;
264}
265
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000266/// IsFunctionMallocLike - A function is malloc-like if it returns either null
Nick Lewycky4bfba9d2009-03-08 17:08:09 +0000267/// or a pointer that doesn't alias any other pointer visible to the caller.
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000268bool FunctionAttrs::IsFunctionMallocLike(Function *F,
Chris Lattner98a27ce2009-08-31 04:09:04 +0000269 SmallPtrSet<Function*, 8> &SCCNodes) const {
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000270 UniqueVector<Value *> FlowsToReturn;
271 for (Function::iterator I = F->begin(), E = F->end(); I != E; ++I)
272 if (ReturnInst *Ret = dyn_cast<ReturnInst>(I->getTerminator()))
273 FlowsToReturn.insert(Ret->getReturnValue());
274
275 for (unsigned i = 0; i != FlowsToReturn.size(); ++i) {
276 Value *RetVal = FlowsToReturn[i+1]; // UniqueVector[0] is reserved.
277
278 if (Constant *C = dyn_cast<Constant>(RetVal)) {
279 if (!C->isNullValue() && !isa<UndefValue>(C))
280 return false;
281
282 continue;
283 }
284
285 if (isa<Argument>(RetVal))
286 return false;
287
288 if (Instruction *RVI = dyn_cast<Instruction>(RetVal))
289 switch (RVI->getOpcode()) {
290 // Extend the analysis by looking upwards.
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000291 case Instruction::BitCast:
Victor Hernandez83d63912009-09-18 22:35:49 +0000292 case Instruction::GetElementPtr:
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000293 FlowsToReturn.insert(RVI->getOperand(0));
294 continue;
295 case Instruction::Select: {
296 SelectInst *SI = cast<SelectInst>(RVI);
297 FlowsToReturn.insert(SI->getTrueValue());
298 FlowsToReturn.insert(SI->getFalseValue());
Chris Lattner439044f2009-09-27 21:29:28 +0000299 continue;
300 }
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000301 case Instruction::PHI: {
302 PHINode *PN = cast<PHINode>(RVI);
303 for (int i = 0, e = PN->getNumIncomingValues(); i != e; ++i)
304 FlowsToReturn.insert(PN->getIncomingValue(i));
Chris Lattner439044f2009-09-27 21:29:28 +0000305 continue;
306 }
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000307
308 // Check whether the pointer came from an allocation.
309 case Instruction::Alloca:
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000310 break;
311 case Instruction::Call:
312 case Instruction::Invoke: {
313 CallSite CS(RVI);
314 if (CS.paramHasAttr(0, Attribute::NoAlias))
315 break;
316 if (CS.getCalledFunction() &&
Chris Lattner98a27ce2009-08-31 04:09:04 +0000317 SCCNodes.count(CS.getCalledFunction()))
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000318 break;
319 } // fall-through
320 default:
321 return false; // Did not come from an allocation.
322 }
323
Dan Gohmanf94b5ed2009-11-19 21:57:48 +0000324 if (PointerMayBeCaptured(RetVal, false, /*StoreCaptures=*/false))
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000325 return false;
326 }
327
328 return true;
329}
330
331/// AddNoAliasAttrs - Deduce noalias attributes for the SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000332bool FunctionAttrs::AddNoAliasAttrs(const CallGraphSCC &SCC) {
Chris Lattner98a27ce2009-08-31 04:09:04 +0000333 SmallPtrSet<Function*, 8> SCCNodes;
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000334
335 // Fill SCCNodes with the elements of the SCC. Used for quickly
336 // looking up whether a given CallGraphNode is in this SCC.
Chris Lattner2decb222010-04-16 22:42:17 +0000337 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I)
338 SCCNodes.insert((*I)->getFunction());
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000339
Nick Lewycky4bfba9d2009-03-08 17:08:09 +0000340 // Check each function in turn, determining which functions return noalias
341 // pointers.
Chris Lattner2decb222010-04-16 22:42:17 +0000342 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
343 Function *F = (*I)->getFunction();
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000344
345 if (F == 0)
346 // External node - skip it;
347 return false;
348
349 // Already noalias.
350 if (F->doesNotAlias(0))
351 continue;
352
353 // Definitions with weak linkage may be overridden at linktime, so
354 // treat them like declarations.
355 if (F->isDeclaration() || F->mayBeOverridden())
356 return false;
357
358 // We annotate noalias return values, which are only applicable to
359 // pointer types.
Duncan Sands1df98592010-02-16 11:11:14 +0000360 if (!F->getReturnType()->isPointerTy())
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000361 continue;
362
363 if (!IsFunctionMallocLike(F, SCCNodes))
364 return false;
365 }
366
367 bool MadeChange = false;
Chris Lattner2decb222010-04-16 22:42:17 +0000368 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
369 Function *F = (*I)->getFunction();
Duncan Sands1df98592010-02-16 11:11:14 +0000370 if (F->doesNotAlias(0) || !F->getReturnType()->isPointerTy())
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000371 continue;
372
373 F->setDoesNotAlias(0);
374 ++NumNoAlias;
375 MadeChange = true;
376 }
377
378 return MadeChange;
379}
380
Chris Lattner2decb222010-04-16 22:42:17 +0000381bool FunctionAttrs::runOnSCC(CallGraphSCC &SCC) {
Dan Gohman3c97f7a2010-11-08 16:10:15 +0000382 AA = &getAnalysis<AliasAnalysis>();
383
Duncan Sands9e89ba32008-12-31 16:14:43 +0000384 bool Changed = AddReadAttrs(SCC);
385 Changed |= AddNoCaptureAttrs(SCC);
Nick Lewycky199aa3c2009-03-08 06:20:47 +0000386 Changed |= AddNoAliasAttrs(SCC);
Duncan Sands9e89ba32008-12-31 16:14:43 +0000387 return Changed;
388}