blob: 607c06810123ebeb1ebee7f811714a9ecd9edf64 [file] [log] [blame]
Chris Lattner26dff502004-06-28 06:33:13 +00001//===- GlobalsModRef.cpp - Simple Mod/Ref Analysis for Globals ------------===//
Misha Brukman01808ca2005-04-21 21:13:18 +00002//
Chris Lattner26dff502004-06-28 06:33:13 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattnerf3ebc3f2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Misha Brukman01808ca2005-04-21 21:13:18 +00007//
Chris Lattner26dff502004-06-28 06:33:13 +00008//===----------------------------------------------------------------------===//
9//
10// This simple pass provides alias and mod/ref information for global values
Chris Lattner3a353e82004-07-27 06:40:37 +000011// that do not have their address taken, and keeps track of whether functions
12// read or write memory (are "pure"). For this simple (but very common) case,
13// we can provide pretty accurate and useful information.
Chris Lattner26dff502004-06-28 06:33:13 +000014//
15//===----------------------------------------------------------------------===//
16
Chris Lattner26dff502004-06-28 06:33:13 +000017#include "llvm/Analysis/Passes.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000018#include "llvm/ADT/SCCIterator.h"
19#include "llvm/ADT/Statistic.h"
Chris Lattner26dff502004-06-28 06:33:13 +000020#include "llvm/Analysis/AliasAnalysis.h"
21#include "llvm/Analysis/CallGraph.h"
Victor Hernandezf390e042009-10-27 20:05:49 +000022#include "llvm/Analysis/MemoryBuiltins.h"
Dan Gohmana4fcd242010-12-15 20:02:24 +000023#include "llvm/Analysis/ValueTracking.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000024#include "llvm/IR/Constants.h"
25#include "llvm/IR/DerivedTypes.h"
Chandler Carruth83948572014-03-04 10:30:26 +000026#include "llvm/IR/InstIterator.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000027#include "llvm/IR/Instructions.h"
28#include "llvm/IR/IntrinsicInst.h"
29#include "llvm/IR/Module.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000030#include "llvm/Pass.h"
Reid Spencer7c16caa2004-09-01 22:55:40 +000031#include "llvm/Support/CommandLine.h"
Chris Lattner26dff502004-06-28 06:33:13 +000032#include <set>
33using namespace llvm;
34
Chandler Carruthf1221bd2014-04-22 02:48:03 +000035#define DEBUG_TYPE "globalsmodref-aa"
36
Chris Lattner57ef9422006-12-19 22:30:33 +000037STATISTIC(NumNonAddrTakenGlobalVars,
38 "Number of global vars without address taken");
39STATISTIC(NumNonAddrTakenFunctions,"Number of functions without address taken");
40STATISTIC(NumNoMemFunctions, "Number of functions that do not access memory");
41STATISTIC(NumReadMemFunctions, "Number of functions that only read memory");
42STATISTIC(NumIndirectGlobalVars, "Number of indirect global objects");
43
Chris Lattner26dff502004-06-28 06:33:13 +000044namespace {
Chris Lattner3a353e82004-07-27 06:40:37 +000045 /// FunctionRecord - One instance of this structure is stored for every
46 /// function in the program. Later, the entries for these functions are
47 /// removed if the function is found to call an external function (in which
48 /// case we know nothing about it.
Nick Lewycky02d5f772009-10-25 06:33:48 +000049 struct FunctionRecord {
Chris Lattner3a353e82004-07-27 06:40:37 +000050 /// GlobalInfo - Maintain mod/ref info for all of the globals without
51 /// addresses taken that are read or written (transitively) by this
52 /// function.
Dan Gohman5442c712010-08-03 21:48:53 +000053 std::map<const GlobalValue*, unsigned> GlobalInfo;
Chris Lattner3a353e82004-07-27 06:40:37 +000054
Duncan Sands06dbb122008-09-12 07:29:58 +000055 /// MayReadAnyGlobal - May read global variables, but it is not known which.
56 bool MayReadAnyGlobal;
57
Dan Gohman5442c712010-08-03 21:48:53 +000058 unsigned getInfoForGlobal(const GlobalValue *GV) const {
Duncan Sands06dbb122008-09-12 07:29:58 +000059 unsigned Effect = MayReadAnyGlobal ? AliasAnalysis::Ref : 0;
Dan Gohman5442c712010-08-03 21:48:53 +000060 std::map<const GlobalValue*, unsigned>::const_iterator I =
61 GlobalInfo.find(GV);
Chris Lattner3a353e82004-07-27 06:40:37 +000062 if (I != GlobalInfo.end())
Duncan Sands06dbb122008-09-12 07:29:58 +000063 Effect |= I->second;
64 return Effect;
Chris Lattner3a353e82004-07-27 06:40:37 +000065 }
Misha Brukman01808ca2005-04-21 21:13:18 +000066
Chris Lattner3a353e82004-07-27 06:40:37 +000067 /// FunctionEffect - Capture whether or not this function reads or writes to
68 /// ANY memory. If not, we can do a lot of aggressive analysis on it.
69 unsigned FunctionEffect;
Chris Lattnerb6964622004-07-27 07:46:26 +000070
Duncan Sands06dbb122008-09-12 07:29:58 +000071 FunctionRecord() : MayReadAnyGlobal (false), FunctionEffect(0) {}
Chris Lattner3a353e82004-07-27 06:40:37 +000072 };
73
74 /// GlobalsModRef - The actual analysis pass.
Nick Lewycky02d5f772009-10-25 06:33:48 +000075 class GlobalsModRef : public ModulePass, public AliasAnalysis {
Chris Lattner3a353e82004-07-27 06:40:37 +000076 /// NonAddressTakenGlobals - The globals that do not have their addresses
77 /// taken.
Dan Gohman5442c712010-08-03 21:48:53 +000078 std::set<const GlobalValue*> NonAddressTakenGlobals;
Chris Lattner26dff502004-06-28 06:33:13 +000079
Chris Lattnerbfdd19b2006-10-01 22:36:45 +000080 /// IndirectGlobals - The memory pointed to by this global is known to be
81 /// 'owned' by the global.
Dan Gohman5442c712010-08-03 21:48:53 +000082 std::set<const GlobalValue*> IndirectGlobals;
Duncan Sands42c644e2008-09-03 12:55:42 +000083
Chris Lattnerbfdd19b2006-10-01 22:36:45 +000084 /// AllocsForIndirectGlobals - If an instruction allocates memory for an
85 /// indirect global, this map indicates which one.
Dan Gohman5442c712010-08-03 21:48:53 +000086 std::map<const Value*, const GlobalValue*> AllocsForIndirectGlobals;
Duncan Sands42c644e2008-09-03 12:55:42 +000087
Chris Lattner26dff502004-06-28 06:33:13 +000088 /// FunctionInfo - For each function, keep track of what globals are
89 /// modified or read.
Dan Gohman5442c712010-08-03 21:48:53 +000090 std::map<const Function*, FunctionRecord> FunctionInfo;
Chris Lattner26dff502004-06-28 06:33:13 +000091
92 public:
Devang Patel8c78a0b2007-05-03 01:11:54 +000093 static char ID;
Owen Anderson6c18d1a2010-10-19 17:21:58 +000094 GlobalsModRef() : ModulePass(ID) {
95 initializeGlobalsModRefPass(*PassRegistry::getPassRegistry());
96 }
Devang Patel864970e2008-03-18 00:39:19 +000097
Craig Toppere9ba7592014-03-05 07:30:04 +000098 bool runOnModule(Module &M) override {
Chandler Carruth6378cf52013-11-26 04:19:30 +000099 InitializeAliasAnalysis(this);
100
101 // Find non-addr taken globals.
102 AnalyzeGlobals(M);
103
104 // Propagate on CG.
105 AnalyzeCallGraph(getAnalysis<CallGraphWrapperPass>().getCallGraph(), M);
Chris Lattner26dff502004-06-28 06:33:13 +0000106 return false;
107 }
108
Craig Toppere9ba7592014-03-05 07:30:04 +0000109 void getAnalysisUsage(AnalysisUsage &AU) const override {
Chris Lattner26dff502004-06-28 06:33:13 +0000110 AliasAnalysis::getAnalysisUsage(AU);
Chandler Carruth6378cf52013-11-26 04:19:30 +0000111 AU.addRequired<CallGraphWrapperPass>();
Chris Lattner26dff502004-06-28 06:33:13 +0000112 AU.setPreservesAll(); // Does not transform code
113 }
114
115 //------------------------------------------------
116 // Implement the AliasAnalysis API
Misha Brukman01808ca2005-04-21 21:13:18 +0000117 //
Craig Toppere9ba7592014-03-05 07:30:04 +0000118 AliasResult alias(const Location &LocA, const Location &LocB) override;
Dan Gohman5442c712010-08-03 21:48:53 +0000119 ModRefResult getModRefInfo(ImmutableCallSite CS,
Craig Toppere9ba7592014-03-05 07:30:04 +0000120 const Location &Loc) override;
Dan Gohman5442c712010-08-03 21:48:53 +0000121 ModRefResult getModRefInfo(ImmutableCallSite CS1,
Craig Toppere9ba7592014-03-05 07:30:04 +0000122 ImmutableCallSite CS2) override {
Dan Gohman5442c712010-08-03 21:48:53 +0000123 return AliasAnalysis::getModRefInfo(CS1, CS2);
Reid Spencer5c132bc2004-12-07 08:11:24 +0000124 }
Chris Lattner26dff502004-06-28 06:33:13 +0000125
Chris Lattner71d04bc2004-12-15 07:22:13 +0000126 /// getModRefBehavior - Return the behavior of the specified function if
127 /// called from the specified call site. The call site may be null in which
128 /// case the most generic behavior of this function should be returned.
Craig Toppere9ba7592014-03-05 07:30:04 +0000129 ModRefBehavior getModRefBehavior(const Function *F) override {
Dan Gohman2694e142010-11-10 01:02:18 +0000130 ModRefBehavior Min = UnknownModRefBehavior;
131
Anton Korobeynikov579f0712008-02-20 11:08:44 +0000132 if (FunctionRecord *FR = getFunctionInfo(F)) {
Chris Lattner3a353e82004-07-27 06:40:37 +0000133 if (FR->FunctionEffect == 0)
Dan Gohman2694e142010-11-10 01:02:18 +0000134 Min = DoesNotAccessMemory;
Misha Brukman77451162005-04-22 04:01:18 +0000135 else if ((FR->FunctionEffect & Mod) == 0)
Dan Gohman2694e142010-11-10 01:02:18 +0000136 Min = OnlyReadsMemory;
Anton Korobeynikov579f0712008-02-20 11:08:44 +0000137 }
Dan Gohman2694e142010-11-10 01:02:18 +0000138
139 return ModRefBehavior(AliasAnalysis::getModRefBehavior(F) & Min);
Owen Anderson98a36172009-02-05 23:36:27 +0000140 }
141
142 /// getModRefBehavior - Return the behavior of the specified function if
143 /// called from the specified call site. The call site may be null in which
144 /// case the most generic behavior of this function should be returned.
Craig Toppere9ba7592014-03-05 07:30:04 +0000145 ModRefBehavior getModRefBehavior(ImmutableCallSite CS) override {
Dan Gohman2694e142010-11-10 01:02:18 +0000146 ModRefBehavior Min = UnknownModRefBehavior;
147
148 if (const Function* F = CS.getCalledFunction())
149 if (FunctionRecord *FR = getFunctionInfo(F)) {
150 if (FR->FunctionEffect == 0)
151 Min = DoesNotAccessMemory;
152 else if ((FR->FunctionEffect & Mod) == 0)
153 Min = OnlyReadsMemory;
154 }
155
156 return ModRefBehavior(AliasAnalysis::getModRefBehavior(CS) & Min);
Chris Lattner3a353e82004-07-27 06:40:37 +0000157 }
Chris Lattner3a353e82004-07-27 06:40:37 +0000158
Craig Toppere9ba7592014-03-05 07:30:04 +0000159 void deleteValue(Value *V) override;
160 void copyValue(Value *From, Value *To) override;
161 void addEscapingUse(Use &U) override;
Chris Lattner26dff502004-06-28 06:33:13 +0000162
Chris Lattner3b033272010-01-20 19:53:32 +0000163 /// getAdjustedAnalysisPointer - This method is used when a pass implements
164 /// an analysis interface through multiple inheritance. If needed, it
165 /// should override this to adjust the this pointer as needed for the
166 /// specified pass info.
Craig Toppere9ba7592014-03-05 07:30:04 +0000167 void *getAdjustedAnalysisPointer(AnalysisID PI) override {
Owen Andersona7aed182010-08-06 18:33:48 +0000168 if (PI == &AliasAnalysis::ID)
Chris Lattner3b033272010-01-20 19:53:32 +0000169 return (AliasAnalysis*)this;
170 return this;
171 }
172
Chris Lattner26dff502004-06-28 06:33:13 +0000173 private:
Chris Lattner3a353e82004-07-27 06:40:37 +0000174 /// getFunctionInfo - Return the function info for the function, or null if
Duncan Sands42c644e2008-09-03 12:55:42 +0000175 /// we don't have anything useful to say about it.
Dan Gohman5442c712010-08-03 21:48:53 +0000176 FunctionRecord *getFunctionInfo(const Function *F) {
177 std::map<const Function*, FunctionRecord>::iterator I =
178 FunctionInfo.find(F);
Chris Lattner3a353e82004-07-27 06:40:37 +0000179 if (I != FunctionInfo.end())
180 return &I->second;
Craig Topper353eda42014-04-24 06:44:33 +0000181 return nullptr;
Chris Lattner3a353e82004-07-27 06:40:37 +0000182 }
183
Chris Lattner26dff502004-06-28 06:33:13 +0000184 void AnalyzeGlobals(Module &M);
185 void AnalyzeCallGraph(CallGraph &CG, Module &M);
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000186 bool AnalyzeUsesOfPointer(Value *V, std::vector<Function*> &Readers,
187 std::vector<Function*> &Writers,
Craig Topper353eda42014-04-24 06:44:33 +0000188 GlobalValue *OkayStoreDest = nullptr);
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000189 bool AnalyzeIndirectGlobalMemory(GlobalValue *GV);
Chris Lattner26dff502004-06-28 06:33:13 +0000190 };
Chris Lattner26dff502004-06-28 06:33:13 +0000191}
192
Dan Gohmand78c4002008-05-13 00:00:25 +0000193char GlobalsModRef::ID = 0;
Owen Anderson8ac477f2010-10-12 19:48:12 +0000194INITIALIZE_AG_PASS_BEGIN(GlobalsModRef, AliasAnalysis,
195 "globalsmodref-aa", "Simple mod/ref analysis for globals",
196 false, true, false)
Chandler Carruth6378cf52013-11-26 04:19:30 +0000197INITIALIZE_PASS_DEPENDENCY(CallGraphWrapperPass)
Owen Anderson8ac477f2010-10-12 19:48:12 +0000198INITIALIZE_AG_PASS_END(GlobalsModRef, AliasAnalysis,
Owen Andersond31d82d2010-08-23 17:52:01 +0000199 "globalsmodref-aa", "Simple mod/ref analysis for globals",
Owen Andersondf7a4f22010-10-07 22:25:06 +0000200 false, true, false)
Dan Gohmand78c4002008-05-13 00:00:25 +0000201
Chris Lattner26dff502004-06-28 06:33:13 +0000202Pass *llvm::createGlobalsModRefPass() { return new GlobalsModRef(); }
203
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000204/// AnalyzeGlobals - Scan through the users of all of the internal
Duncan Sands42c644e2008-09-03 12:55:42 +0000205/// GlobalValue's in the program. If none of them have their "address taken"
Chris Lattner26dff502004-06-28 06:33:13 +0000206/// (really, their address passed to something nontrivial), record this fact,
207/// and record the functions that they are used directly in.
208void GlobalsModRef::AnalyzeGlobals(Module &M) {
209 std::vector<Function*> Readers, Writers;
210 for (Module::iterator I = M.begin(), E = M.end(); I != E; ++I)
Rafael Espindola6de96a12009-01-15 20:18:42 +0000211 if (I->hasLocalLinkage()) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000212 if (!AnalyzeUsesOfPointer(I, Readers, Writers)) {
Chris Lattner3a353e82004-07-27 06:40:37 +0000213 // Remember that we are tracking this global.
214 NonAddressTakenGlobals.insert(I);
Chris Lattner26dff502004-06-28 06:33:13 +0000215 ++NumNonAddrTakenFunctions;
216 }
217 Readers.clear(); Writers.clear();
218 }
219
Chris Lattner6a3f5fd2005-03-23 23:51:12 +0000220 for (Module::global_iterator I = M.global_begin(), E = M.global_end();
221 I != E; ++I)
Rafael Espindola6de96a12009-01-15 20:18:42 +0000222 if (I->hasLocalLinkage()) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000223 if (!AnalyzeUsesOfPointer(I, Readers, Writers)) {
Chris Lattner26dff502004-06-28 06:33:13 +0000224 // Remember that we are tracking this global, and the mod/ref fns
Chris Lattner3a353e82004-07-27 06:40:37 +0000225 NonAddressTakenGlobals.insert(I);
Duncan Sands42c644e2008-09-03 12:55:42 +0000226
Chris Lattner3a353e82004-07-27 06:40:37 +0000227 for (unsigned i = 0, e = Readers.size(); i != e; ++i)
228 FunctionInfo[Readers[i]].GlobalInfo[I] |= Ref;
229
230 if (!I->isConstant()) // No need to keep track of writers to constants
231 for (unsigned i = 0, e = Writers.size(); i != e; ++i)
232 FunctionInfo[Writers[i]].GlobalInfo[I] |= Mod;
Chris Lattner26dff502004-06-28 06:33:13 +0000233 ++NumNonAddrTakenGlobalVars;
Duncan Sands42c644e2008-09-03 12:55:42 +0000234
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000235 // If this global holds a pointer type, see if it is an indirect global.
Duncan Sands19d0b472010-02-16 11:11:14 +0000236 if (I->getType()->getElementType()->isPointerTy() &&
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000237 AnalyzeIndirectGlobalMemory(I))
238 ++NumIndirectGlobalVars;
Chris Lattner26dff502004-06-28 06:33:13 +0000239 }
240 Readers.clear(); Writers.clear();
241 }
242}
243
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000244/// AnalyzeUsesOfPointer - Look at all of the users of the specified pointer.
245/// If this is used by anything complex (i.e., the address escapes), return
246/// true. Also, while we are at it, keep track of those functions that read and
247/// write to the value.
248///
249/// If OkayStoreDest is non-null, stores into this global are allowed.
250bool GlobalsModRef::AnalyzeUsesOfPointer(Value *V,
251 std::vector<Function*> &Readers,
252 std::vector<Function*> &Writers,
253 GlobalValue *OkayStoreDest) {
Duncan Sands19d0b472010-02-16 11:11:14 +0000254 if (!V->getType()->isPointerTy()) return true;
Chris Lattner26dff502004-06-28 06:33:13 +0000255
Chandler Carruthcdf47882014-03-09 03:16:01 +0000256 for (Use &U : V->uses()) {
257 User *I = U.getUser();
258 if (LoadInst *LI = dyn_cast<LoadInst>(I)) {
Chris Lattner26dff502004-06-28 06:33:13 +0000259 Readers.push_back(LI->getParent()->getParent());
Chandler Carruthcdf47882014-03-09 03:16:01 +0000260 } else if (StoreInst *SI = dyn_cast<StoreInst>(I)) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000261 if (V == SI->getOperand(1)) {
262 Writers.push_back(SI->getParent()->getParent());
263 } else if (SI->getOperand(1) != OkayStoreDest) {
264 return true; // Storing the pointer
265 }
Chandler Carruthcdf47882014-03-09 03:16:01 +0000266 } else if (Operator::getOpcode(I) == Instruction::GetElementPtr) {
267 if (AnalyzeUsesOfPointer(I, Readers, Writers))
Victor Hernandez537d8d92009-09-18 21:34:51 +0000268 return true;
Chandler Carruthcdf47882014-03-09 03:16:01 +0000269 } else if (Operator::getOpcode(I) == Instruction::BitCast) {
270 if (AnalyzeUsesOfPointer(I, Readers, Writers, OkayStoreDest))
Benjamin Kramerb8266d22014-02-10 14:17:30 +0000271 return true;
Chandler Carruthcdf47882014-03-09 03:16:01 +0000272 } else if (CallSite CS = I) {
Chris Lattner26dff502004-06-28 06:33:13 +0000273 // Make sure that this is just the function being called, not that it is
274 // passing into the function.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000275 if (!CS.isCallee(&U)) {
Benjamin Kramerb8266d22014-02-10 14:17:30 +0000276 // Detect calls to free.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000277 if (isFreeCall(I, TLI))
Benjamin Kramerb8266d22014-02-10 14:17:30 +0000278 Writers.push_back(CS->getParent()->getParent());
279 else
280 return true; // Argument of an unknown call.
Misha Brukman01808ca2005-04-21 21:13:18 +0000281 }
Chandler Carruthcdf47882014-03-09 03:16:01 +0000282 } else if (ICmpInst *ICI = dyn_cast<ICmpInst>(I)) {
Reid Spencer266e42b2006-12-23 06:05:41 +0000283 if (!isa<ConstantPointerNull>(ICI->getOperand(1)))
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000284 return true; // Allow comparison against null.
Chris Lattner26dff502004-06-28 06:33:13 +0000285 } else {
286 return true;
287 }
Gabor Greif070b9a22010-07-09 15:53:42 +0000288 }
289
Chris Lattner26dff502004-06-28 06:33:13 +0000290 return false;
291}
292
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000293/// AnalyzeIndirectGlobalMemory - We found an non-address-taken global variable
294/// which holds a pointer type. See if the global always points to non-aliased
295/// heap memory: that is, all initializers of the globals are allocations, and
296/// those allocations have no use other than initialization of the global.
297/// Further, all loads out of GV must directly use the memory, not store the
298/// pointer somewhere. If this is true, we consider the memory pointed to by
299/// GV to be owned by GV and can disambiguate other pointers from it.
300bool GlobalsModRef::AnalyzeIndirectGlobalMemory(GlobalValue *GV) {
301 // Keep track of values related to the allocation of the memory, f.e. the
302 // value produced by the malloc call and any casts.
303 std::vector<Value*> AllocRelatedValues;
Duncan Sands42c644e2008-09-03 12:55:42 +0000304
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000305 // Walk the user list of the global. If we find anything other than a direct
306 // load or store, bail out.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000307 for (User *U : GV->users()) {
Gabor Greifaa389f52010-07-09 16:22:36 +0000308 if (LoadInst *LI = dyn_cast<LoadInst>(U)) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000309 // The pointer loaded from the global can only be used in simple ways:
310 // we allow addressing of it and loading storing to it. We do *not* allow
311 // storing the loaded pointer somewhere else or passing to a function.
312 std::vector<Function*> ReadersWriters;
313 if (AnalyzeUsesOfPointer(LI, ReadersWriters, ReadersWriters))
314 return false; // Loaded pointer escapes.
315 // TODO: Could try some IP mod/ref of the loaded pointer.
Gabor Greifaa389f52010-07-09 16:22:36 +0000316 } else if (StoreInst *SI = dyn_cast<StoreInst>(U)) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000317 // Storing the global itself.
318 if (SI->getOperand(0) == GV) return false;
Duncan Sands42c644e2008-09-03 12:55:42 +0000319
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000320 // If storing the null pointer, ignore it.
321 if (isa<ConstantPointerNull>(SI->getOperand(0)))
322 continue;
Duncan Sands42c644e2008-09-03 12:55:42 +0000323
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000324 // Check the value being stored.
Dan Gohmana4fcd242010-12-15 20:02:24 +0000325 Value *Ptr = GetUnderlyingObject(SI->getOperand(0));
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000326
Benjamin Kramer8bcc9712012-08-29 15:32:21 +0000327 if (!isAllocLikeFn(Ptr, TLI))
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000328 return false; // Too hard to analyze.
Duncan Sands42c644e2008-09-03 12:55:42 +0000329
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000330 // Analyze all uses of the allocation. If any of them are used in a
331 // non-simple way (e.g. stored to another global) bail out.
332 std::vector<Function*> ReadersWriters;
333 if (AnalyzeUsesOfPointer(Ptr, ReadersWriters, ReadersWriters, GV))
334 return false; // Loaded pointer escapes.
335
336 // Remember that this allocation is related to the indirect global.
337 AllocRelatedValues.push_back(Ptr);
338 } else {
339 // Something complex, bail out.
340 return false;
341 }
342 }
Duncan Sands42c644e2008-09-03 12:55:42 +0000343
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000344 // Okay, this is an indirect global. Remember all of the allocations for
345 // this global in AllocsForIndirectGlobals.
346 while (!AllocRelatedValues.empty()) {
347 AllocsForIndirectGlobals[AllocRelatedValues.back()] = GV;
348 AllocRelatedValues.pop_back();
349 }
350 IndirectGlobals.insert(GV);
351 return true;
352}
353
Chris Lattner26dff502004-06-28 06:33:13 +0000354/// AnalyzeCallGraph - At this point, we know the functions where globals are
355/// immediately stored to and read from. Propagate this information up the call
Chris Lattner3a353e82004-07-27 06:40:37 +0000356/// graph to all callers and compute the mod/ref info for all memory for each
Misha Brukman01808ca2005-04-21 21:13:18 +0000357/// function.
Chris Lattner26dff502004-06-28 06:33:13 +0000358void GlobalsModRef::AnalyzeCallGraph(CallGraph &CG, Module &M) {
Chris Lattner26dff502004-06-28 06:33:13 +0000359 // We do a bottom-up SCC traversal of the call graph. In other words, we
360 // visit all callees before callers (leaf-first).
Duncan P. N. Exon Smith8e661ef2014-02-04 19:19:07 +0000361 for (scc_iterator<CallGraph*> I = scc_begin(&CG); !I.isAtEnd(); ++I) {
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000362 const std::vector<CallGraphNode *> &SCC = *I;
Duncan Sands21a57992008-09-04 19:16:20 +0000363 assert(!SCC.empty() && "SCC with no functions?");
Duncan Sands42c644e2008-09-03 12:55:42 +0000364
Duncan Sands21a57992008-09-04 19:16:20 +0000365 if (!SCC[0]->getFunction()) {
366 // Calls externally - can't say anything useful. Remove any existing
367 // function records (may have been created when scanning globals).
368 for (unsigned i = 0, e = SCC.size(); i != e; ++i)
369 FunctionInfo.erase(SCC[i]->getFunction());
Duncan Sands42c644e2008-09-03 12:55:42 +0000370 continue;
Duncan Sands21a57992008-09-04 19:16:20 +0000371 }
372
373 FunctionRecord &FR = FunctionInfo[SCC[0]->getFunction()];
Chris Lattner26dff502004-06-28 06:33:13 +0000374
Duncan Sands42c644e2008-09-03 12:55:42 +0000375 bool KnowNothing = false;
376 unsigned FunctionEffect = 0;
Chris Lattner3a353e82004-07-27 06:40:37 +0000377
Duncan Sands42c644e2008-09-03 12:55:42 +0000378 // Collect the mod/ref properties due to called functions. We only compute
379 // one mod-ref set.
380 for (unsigned i = 0, e = SCC.size(); i != e && !KnowNothing; ++i) {
381 Function *F = SCC[i]->getFunction();
382 if (!F) {
383 KnowNothing = true;
Chris Lattner3a353e82004-07-27 06:40:37 +0000384 break;
Chris Lattner26dff502004-06-28 06:33:13 +0000385 }
Chris Lattner3a353e82004-07-27 06:40:37 +0000386
Duncan Sands42c644e2008-09-03 12:55:42 +0000387 if (F->isDeclaration()) {
388 // Try to get mod/ref behaviour from function attributes.
Duncan Sands0eca0572008-09-03 15:31:24 +0000389 if (F->doesNotAccessMemory()) {
390 // Can't do better than that!
391 } else if (F->onlyReadsMemory()) {
Duncan Sands42c644e2008-09-03 12:55:42 +0000392 FunctionEffect |= Ref;
Duncan Sands06dbb122008-09-12 07:29:58 +0000393 if (!F->isIntrinsic())
Duncan Sandse30b36f2008-09-11 15:43:12 +0000394 // This function might call back into the module and read a global -
Duncan Sands06dbb122008-09-12 07:29:58 +0000395 // consider every global as possibly being read by this function.
396 FR.MayReadAnyGlobal = true;
Duncan Sands0eca0572008-09-03 15:31:24 +0000397 } else {
Duncan Sandsd4133ac2008-09-11 19:35:55 +0000398 FunctionEffect |= ModRef;
399 // Can't say anything useful unless it's an intrinsic - they don't
400 // read or write global variables of the kind considered here.
401 KnowNothing = !F->isIntrinsic();
Duncan Sands42c644e2008-09-03 12:55:42 +0000402 }
403 continue;
404 }
Misha Brukman01808ca2005-04-21 21:13:18 +0000405
Duncan Sands42c644e2008-09-03 12:55:42 +0000406 for (CallGraphNode::iterator CI = SCC[i]->begin(), E = SCC[i]->end();
Duncan Sands21a57992008-09-04 19:16:20 +0000407 CI != E && !KnowNothing; ++CI)
Duncan Sands42c644e2008-09-03 12:55:42 +0000408 if (Function *Callee = CI->second->getFunction()) {
409 if (FunctionRecord *CalleeFR = getFunctionInfo(Callee)) {
410 // Propagate function effect up.
411 FunctionEffect |= CalleeFR->FunctionEffect;
412
413 // Incorporate callee's effects on globals into our info.
Rafael Espindola0c4eea72014-05-08 17:57:50 +0000414 for (const auto &G : CalleeFR->GlobalInfo)
415 FR.GlobalInfo[G.first] |= G.second;
Duncan Sands06dbb122008-09-12 07:29:58 +0000416 FR.MayReadAnyGlobal |= CalleeFR->MayReadAnyGlobal;
Duncan Sands42c644e2008-09-03 12:55:42 +0000417 } else {
418 // Can't say anything about it. However, if it is inside our SCC,
419 // then nothing needs to be done.
420 CallGraphNode *CalleeNode = CG[Callee];
421 if (std::find(SCC.begin(), SCC.end(), CalleeNode) == SCC.end())
422 KnowNothing = true;
423 }
424 } else {
425 KnowNothing = true;
426 }
427 }
428
429 // If we can't say anything useful about this SCC, remove all SCC functions
430 // from the FunctionInfo map.
431 if (KnowNothing) {
432 for (unsigned i = 0, e = SCC.size(); i != e; ++i)
433 FunctionInfo.erase(SCC[i]->getFunction());
Duncan Sandse74d7502008-09-03 16:10:55 +0000434 continue;
Duncan Sands42c644e2008-09-03 12:55:42 +0000435 }
436
437 // Scan the function bodies for explicit loads or stores.
Chris Lattner3a353e82004-07-27 06:40:37 +0000438 for (unsigned i = 0, e = SCC.size(); i != e && FunctionEffect != ModRef;++i)
439 for (inst_iterator II = inst_begin(SCC[i]->getFunction()),
Misha Brukman01808ca2005-04-21 21:13:18 +0000440 E = inst_end(SCC[i]->getFunction());
Chris Lattner3a353e82004-07-27 06:40:37 +0000441 II != E && FunctionEffect != ModRef; ++II)
Nuno Lopes55fff832012-06-21 15:45:28 +0000442 if (LoadInst *LI = dyn_cast<LoadInst>(&*II)) {
Chris Lattner3a353e82004-07-27 06:40:37 +0000443 FunctionEffect |= Ref;
Nuno Lopes55fff832012-06-21 15:45:28 +0000444 if (LI->isVolatile())
Duncan Sands9ddb3142008-09-13 12:45:50 +0000445 // Volatile loads may have side-effects, so mark them as writing
446 // memory (for example, a flag inside the processor).
447 FunctionEffect |= Mod;
Nuno Lopes55fff832012-06-21 15:45:28 +0000448 } else if (StoreInst *SI = dyn_cast<StoreInst>(&*II)) {
Chris Lattner3a353e82004-07-27 06:40:37 +0000449 FunctionEffect |= Mod;
Nuno Lopes55fff832012-06-21 15:45:28 +0000450 if (SI->isVolatile())
Duncan Sands9ddb3142008-09-13 12:45:50 +0000451 // Treat volatile stores as reading memory somewhere.
452 FunctionEffect |= Ref;
Benjamin Kramer8bcc9712012-08-29 15:32:21 +0000453 } else if (isAllocationFn(&*II, TLI) || isFreeCall(&*II, TLI)) {
Chris Lattnere25cfae2005-04-22 05:36:59 +0000454 FunctionEffect |= ModRef;
Rafael Espindola5054ee82012-03-28 21:31:24 +0000455 } else if (IntrinsicInst *Intrinsic = dyn_cast<IntrinsicInst>(&*II)) {
456 // The callgraph doesn't include intrinsic calls.
457 Function *Callee = Intrinsic->getCalledFunction();
458 ModRefBehavior Behaviour = AliasAnalysis::getModRefBehavior(Callee);
459 FunctionEffect |= (Behaviour & ModRef);
Duncan Sands9ddb3142008-09-13 12:45:50 +0000460 }
Duncan Sands42c644e2008-09-03 12:55:42 +0000461
462 if ((FunctionEffect & Mod) == 0)
463 ++NumReadMemFunctions;
464 if (FunctionEffect == 0)
465 ++NumNoMemFunctions;
Duncan Sands21a57992008-09-04 19:16:20 +0000466 FR.FunctionEffect = FunctionEffect;
Duncan Sands42c644e2008-09-03 12:55:42 +0000467
468 // Finally, now that we know the full effect on this SCC, clone the
469 // information to each function in the SCC.
470 for (unsigned i = 1, e = SCC.size(); i != e; ++i)
Duncan Sands21a57992008-09-04 19:16:20 +0000471 FunctionInfo[SCC[i]->getFunction()] = FR;
Chris Lattner3a353e82004-07-27 06:40:37 +0000472 }
Chris Lattner26dff502004-06-28 06:33:13 +0000473}
474
475
476
Chris Lattner26dff502004-06-28 06:33:13 +0000477/// alias - If one of the pointers is to a global that we are tracking, and the
478/// other is some random pointer, we know there cannot be an alias, because the
479/// address of the global isn't taken.
480AliasAnalysis::AliasResult
Dan Gohman41f14cf2010-09-14 21:25:10 +0000481GlobalsModRef::alias(const Location &LocA,
482 const Location &LocB) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000483 // Get the base object these pointers point to.
Dan Gohmana4fcd242010-12-15 20:02:24 +0000484 const Value *UV1 = GetUnderlyingObject(LocA.Ptr);
485 const Value *UV2 = GetUnderlyingObject(LocB.Ptr);
Duncan Sands42c644e2008-09-03 12:55:42 +0000486
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000487 // If either of the underlying values is a global, they may be non-addr-taken
488 // globals, which we can answer queries about.
Dan Gohman5442c712010-08-03 21:48:53 +0000489 const GlobalValue *GV1 = dyn_cast<GlobalValue>(UV1);
490 const GlobalValue *GV2 = dyn_cast<GlobalValue>(UV2);
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000491 if (GV1 || GV2) {
492 // If the global's address is taken, pretend we don't know it's a pointer to
493 // the global.
Craig Topper353eda42014-04-24 06:44:33 +0000494 if (GV1 && !NonAddressTakenGlobals.count(GV1)) GV1 = nullptr;
495 if (GV2 && !NonAddressTakenGlobals.count(GV2)) GV2 = nullptr;
Chris Lattner26dff502004-06-28 06:33:13 +0000496
Dan Gohman4a618822010-02-10 16:03:48 +0000497 // If the two pointers are derived from two different non-addr-taken
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000498 // globals, or if one is and the other isn't, we know these can't alias.
499 if ((GV1 || GV2) && GV1 != GV2)
500 return NoAlias;
Chris Lattner26dff502004-06-28 06:33:13 +0000501
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000502 // Otherwise if they are both derived from the same addr-taken global, we
503 // can't know the two accesses don't overlap.
504 }
Duncan Sands42c644e2008-09-03 12:55:42 +0000505
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000506 // These pointers may be based on the memory owned by an indirect global. If
507 // so, we may be able to handle this. First check to see if the base pointer
508 // is a direct load from an indirect global.
Craig Topper353eda42014-04-24 06:44:33 +0000509 GV1 = GV2 = nullptr;
Dan Gohman5442c712010-08-03 21:48:53 +0000510 if (const LoadInst *LI = dyn_cast<LoadInst>(UV1))
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000511 if (GlobalVariable *GV = dyn_cast<GlobalVariable>(LI->getOperand(0)))
512 if (IndirectGlobals.count(GV))
513 GV1 = GV;
Dan Gohman5442c712010-08-03 21:48:53 +0000514 if (const LoadInst *LI = dyn_cast<LoadInst>(UV2))
515 if (const GlobalVariable *GV = dyn_cast<GlobalVariable>(LI->getOperand(0)))
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000516 if (IndirectGlobals.count(GV))
517 GV2 = GV;
Duncan Sands42c644e2008-09-03 12:55:42 +0000518
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000519 // These pointers may also be from an allocation for the indirect global. If
520 // so, also handle them.
521 if (AllocsForIndirectGlobals.count(UV1))
522 GV1 = AllocsForIndirectGlobals[UV1];
523 if (AllocsForIndirectGlobals.count(UV2))
524 GV2 = AllocsForIndirectGlobals[UV2];
Duncan Sands42c644e2008-09-03 12:55:42 +0000525
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000526 // Now that we know whether the two pointers are related to indirect globals,
527 // use this to disambiguate the pointers. If either pointer is based on an
528 // indirect global and if they are not both based on the same indirect global,
529 // they cannot alias.
Chris Lattner26dff502004-06-28 06:33:13 +0000530 if ((GV1 || GV2) && GV1 != GV2)
531 return NoAlias;
Duncan Sands42c644e2008-09-03 12:55:42 +0000532
Dan Gohman41f14cf2010-09-14 21:25:10 +0000533 return AliasAnalysis::alias(LocA, LocB);
Chris Lattner26dff502004-06-28 06:33:13 +0000534}
535
536AliasAnalysis::ModRefResult
Dan Gohman5442c712010-08-03 21:48:53 +0000537GlobalsModRef::getModRefInfo(ImmutableCallSite CS,
Dan Gohman41f14cf2010-09-14 21:25:10 +0000538 const Location &Loc) {
Chris Lattner26dff502004-06-28 06:33:13 +0000539 unsigned Known = ModRef;
540
541 // If we are asking for mod/ref info of a direct call with a pointer to a
Chris Lattner3a353e82004-07-27 06:40:37 +0000542 // global we are tracking, return information if we have it.
Dan Gohman41f14cf2010-09-14 21:25:10 +0000543 if (const GlobalValue *GV =
Dan Gohmana4fcd242010-12-15 20:02:24 +0000544 dyn_cast<GlobalValue>(GetUnderlyingObject(Loc.Ptr)))
Rafael Espindola6de96a12009-01-15 20:18:42 +0000545 if (GV->hasLocalLinkage())
Dan Gohman5442c712010-08-03 21:48:53 +0000546 if (const Function *F = CS.getCalledFunction())
Chris Lattner3a353e82004-07-27 06:40:37 +0000547 if (NonAddressTakenGlobals.count(GV))
Dan Gohman5442c712010-08-03 21:48:53 +0000548 if (const FunctionRecord *FR = getFunctionInfo(F))
Chris Lattner3a353e82004-07-27 06:40:37 +0000549 Known = FR->getInfoForGlobal(GV);
Chris Lattner26dff502004-06-28 06:33:13 +0000550
551 if (Known == NoModRef)
552 return NoModRef; // No need to query other mod/ref analyses
Dan Gohman41f14cf2010-09-14 21:25:10 +0000553 return ModRefResult(Known & AliasAnalysis::getModRefInfo(CS, Loc));
Chris Lattner26dff502004-06-28 06:33:13 +0000554}
555
556
557//===----------------------------------------------------------------------===//
558// Methods to update the analysis as a result of the client transformation.
559//
560void GlobalsModRef::deleteValue(Value *V) {
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000561 if (GlobalValue *GV = dyn_cast<GlobalValue>(V)) {
562 if (NonAddressTakenGlobals.erase(GV)) {
563 // This global might be an indirect global. If so, remove it and remove
564 // any AllocRelatedValues for it.
565 if (IndirectGlobals.erase(GV)) {
566 // Remove any entries in AllocsForIndirectGlobals for this global.
Dan Gohman5442c712010-08-03 21:48:53 +0000567 for (std::map<const Value*, const GlobalValue*>::iterator
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000568 I = AllocsForIndirectGlobals.begin(),
569 E = AllocsForIndirectGlobals.end(); I != E; ) {
570 if (I->second == GV) {
571 AllocsForIndirectGlobals.erase(I++);
572 } else {
573 ++I;
574 }
575 }
576 }
577 }
578 }
Duncan Sands42c644e2008-09-03 12:55:42 +0000579
Chris Lattnerbfdd19b2006-10-01 22:36:45 +0000580 // Otherwise, if this is an allocation related to an indirect global, remove
581 // it.
582 AllocsForIndirectGlobals.erase(V);
Duncan Sands42c644e2008-09-03 12:55:42 +0000583
Chris Lattner907703c2007-11-30 18:52:58 +0000584 AliasAnalysis::deleteValue(V);
Chris Lattner26dff502004-06-28 06:33:13 +0000585}
586
587void GlobalsModRef::copyValue(Value *From, Value *To) {
Chris Lattner907703c2007-11-30 18:52:58 +0000588 AliasAnalysis::copyValue(From, To);
Chris Lattner26dff502004-06-28 06:33:13 +0000589}
Owen Andersond62d3722011-01-03 23:51:43 +0000590
591void GlobalsModRef::addEscapingUse(Use &U) {
592 // For the purposes of this analysis, it is conservatively correct to treat
593 // a newly escaping value equivalently to a deleted one. We could perhaps
594 // be more precise by processing the new use and attempting to update our
Chris Lattner0ab5e2c2011-04-15 05:18:47 +0000595 // saved analysis results to accommodate it.
Owen Andersond62d3722011-01-03 23:51:43 +0000596 deleteValue(U);
597
598 AliasAnalysis::addEscapingUse(U);
599}