blob: 7c14c20ba8929752204de145e0fa23ac5ecea5d0 [file] [log] [blame]
Meador Inge6b6a1612013-03-21 00:55:59 +00001//===- FunctionAttrs.cpp - Pass which marks functions attributes ----------===//
Duncan Sands44c8cd92008-12-31 16:14:43 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
Chandler Carruth1926b702016-01-08 10:55:52 +00009///
10/// \file
11/// This file implements interprocedural passes which walk the
12/// call-graph deducing and/or propagating function attributes.
13///
Duncan Sands44c8cd92008-12-31 16:14:43 +000014//===----------------------------------------------------------------------===//
15
Chandler Carruth9c4ed172016-02-18 11:03:11 +000016#include "llvm/Transforms/IPO/FunctionAttrs.h"
Duncan Sands44c8cd92008-12-31 16:14:43 +000017#include "llvm/Transforms/IPO.h"
Nick Lewycky4c378a42011-12-28 23:24:21 +000018#include "llvm/ADT/SCCIterator.h"
Benjamin Kramer15591272012-10-31 13:45:49 +000019#include "llvm/ADT/SetVector.h"
Duncan Sandsb193a372009-01-02 11:54:37 +000020#include "llvm/ADT/SmallSet.h"
Duncan Sands44c8cd92008-12-31 16:14:43 +000021#include "llvm/ADT/Statistic.h"
James Molloy0ecdbe72015-11-19 08:49:57 +000022#include "llvm/ADT/StringSwitch.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000023#include "llvm/Analysis/AliasAnalysis.h"
Chandler Carruth7b560d42015-09-09 17:55:00 +000024#include "llvm/Analysis/AssumptionCache.h"
25#include "llvm/Analysis/BasicAliasAnalysis.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000026#include "llvm/Analysis/CallGraph.h"
Chandler Carruth839a98e2013-01-07 15:26:48 +000027#include "llvm/Analysis/CallGraphSCCPass.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000028#include "llvm/Analysis/CaptureTracking.h"
Chandler Carruth7b560d42015-09-09 17:55:00 +000029#include "llvm/Analysis/TargetLibraryInfo.h"
Philip Reamesa88caea2015-08-31 19:44:38 +000030#include "llvm/Analysis/ValueTracking.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000031#include "llvm/IR/GlobalVariable.h"
Chandler Carruth83948572014-03-04 10:30:26 +000032#include "llvm/IR/InstIterator.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000033#include "llvm/IR/IntrinsicInst.h"
34#include "llvm/IR/LLVMContext.h"
Philip Reamesa88caea2015-08-31 19:44:38 +000035#include "llvm/Support/Debug.h"
Hans Wennborg043bf5b2015-08-31 21:19:18 +000036#include "llvm/Support/raw_ostream.h"
Chandler Carruth62d42152015-01-15 02:16:27 +000037#include "llvm/Analysis/TargetLibraryInfo.h"
Duncan Sands44c8cd92008-12-31 16:14:43 +000038using namespace llvm;
39
Chandler Carruth964daaa2014-04-22 02:55:47 +000040#define DEBUG_TYPE "functionattrs"
41
Duncan Sands44c8cd92008-12-31 16:14:43 +000042STATISTIC(NumReadNone, "Number of functions marked readnone");
43STATISTIC(NumReadOnly, "Number of functions marked readonly");
44STATISTIC(NumNoCapture, "Number of arguments marked nocapture");
Nick Lewyckyc2ec0722013-07-06 00:29:58 +000045STATISTIC(NumReadNoneArg, "Number of arguments marked readnone");
46STATISTIC(NumReadOnlyArg, "Number of arguments marked readonly");
Nick Lewyckyfbed86a2009-03-08 06:20:47 +000047STATISTIC(NumNoAlias, "Number of function returns marked noalias");
Philip Reamesa88caea2015-08-31 19:44:38 +000048STATISTIC(NumNonNullReturn, "Number of function returns marked nonnull");
James Molloy7e9bdd52015-11-12 10:55:20 +000049STATISTIC(NumNoRecurse, "Number of functions marked as norecurse");
Duncan Sands44c8cd92008-12-31 16:14:43 +000050
51namespace {
Chandler Carruthc518ebd2015-10-29 18:29:15 +000052typedef SmallSetVector<Function *, 8> SCCNodeSet;
53}
54
55namespace {
Chandler Carruth7542d372015-09-21 17:39:41 +000056/// The three kinds of memory access relevant to 'readonly' and
57/// 'readnone' attributes.
58enum MemoryAccessKind {
59 MAK_ReadNone = 0,
60 MAK_ReadOnly = 1,
61 MAK_MayWrite = 2
62};
63}
64
Chandler Carruthc518ebd2015-10-29 18:29:15 +000065static MemoryAccessKind checkFunctionMemoryAccess(Function &F, AAResults &AAR,
66 const SCCNodeSet &SCCNodes) {
Chandler Carruth7542d372015-09-21 17:39:41 +000067 FunctionModRefBehavior MRB = AAR.getModRefBehavior(&F);
68 if (MRB == FMRB_DoesNotAccessMemory)
69 // Already perfect!
70 return MAK_ReadNone;
71
Sanjoy Das5ce32722016-04-08 00:48:30 +000072 // Non-exact function definitions may not be selected at link time, and an
73 // alternative version that writes to memory may be selected. See the comment
74 // on GlobalValue::isDefinitionExact for more details.
75 if (!F.hasExactDefinition()) {
Chandler Carruth7542d372015-09-21 17:39:41 +000076 if (AliasAnalysis::onlyReadsMemory(MRB))
77 return MAK_ReadOnly;
78
79 // Conservatively assume it writes to memory.
80 return MAK_MayWrite;
81 }
82
83 // Scan the function body for instructions that may read or write memory.
84 bool ReadsMemory = false;
85 for (inst_iterator II = inst_begin(F), E = inst_end(F); II != E; ++II) {
86 Instruction *I = &*II;
87
88 // Some instructions can be ignored even if they read or write memory.
89 // Detect these now, skipping to the next instruction if one is found.
90 CallSite CS(cast<Value>(I));
91 if (CS) {
Sanjoy Das10c8a042016-02-09 18:40:40 +000092 // Ignore calls to functions in the same SCC, as long as the call sites
93 // don't have operand bundles. Calls with operand bundles are allowed to
94 // have memory effects not described by the memory effects of the call
95 // target.
96 if (!CS.hasOperandBundles() && CS.getCalledFunction() &&
97 SCCNodes.count(CS.getCalledFunction()))
Chandler Carruth7542d372015-09-21 17:39:41 +000098 continue;
99 FunctionModRefBehavior MRB = AAR.getModRefBehavior(CS);
Chandler Carruth7542d372015-09-21 17:39:41 +0000100
Chandler Carruth69798fb2015-10-27 01:41:43 +0000101 // If the call doesn't access memory, we're done.
102 if (!(MRB & MRI_ModRef))
103 continue;
104
105 if (!AliasAnalysis::onlyAccessesArgPointees(MRB)) {
106 // The call could access any memory. If that includes writes, give up.
107 if (MRB & MRI_Mod)
108 return MAK_MayWrite;
109 // If it reads, note it.
110 if (MRB & MRI_Ref)
111 ReadsMemory = true;
Chandler Carruth7542d372015-09-21 17:39:41 +0000112 continue;
113 }
Chandler Carruth69798fb2015-10-27 01:41:43 +0000114
115 // Check whether all pointer arguments point to local memory, and
116 // ignore calls that only access local memory.
117 for (CallSite::arg_iterator CI = CS.arg_begin(), CE = CS.arg_end();
118 CI != CE; ++CI) {
119 Value *Arg = *CI;
Elena Demikhovsky3ec9e152015-11-17 19:30:51 +0000120 if (!Arg->getType()->isPtrOrPtrVectorTy())
Chandler Carruth69798fb2015-10-27 01:41:43 +0000121 continue;
122
123 AAMDNodes AAInfo;
124 I->getAAMetadata(AAInfo);
125 MemoryLocation Loc(Arg, MemoryLocation::UnknownSize, AAInfo);
126
127 // Skip accesses to local or constant memory as they don't impact the
128 // externally visible mod/ref behavior.
129 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
130 continue;
131
132 if (MRB & MRI_Mod)
133 // Writes non-local memory. Give up.
134 return MAK_MayWrite;
135 if (MRB & MRI_Ref)
136 // Ok, it reads non-local memory.
137 ReadsMemory = true;
138 }
Chandler Carruth7542d372015-09-21 17:39:41 +0000139 continue;
140 } else if (LoadInst *LI = dyn_cast<LoadInst>(I)) {
141 // Ignore non-volatile loads from local memory. (Atomic is okay here.)
142 if (!LI->isVolatile()) {
143 MemoryLocation Loc = MemoryLocation::get(LI);
144 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
145 continue;
146 }
147 } else if (StoreInst *SI = dyn_cast<StoreInst>(I)) {
148 // Ignore non-volatile stores to local memory. (Atomic is okay here.)
149 if (!SI->isVolatile()) {
150 MemoryLocation Loc = MemoryLocation::get(SI);
151 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
152 continue;
153 }
154 } else if (VAArgInst *VI = dyn_cast<VAArgInst>(I)) {
155 // Ignore vaargs on local memory.
156 MemoryLocation Loc = MemoryLocation::get(VI);
157 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
158 continue;
159 }
160
161 // Any remaining instructions need to be taken seriously! Check if they
162 // read or write memory.
163 if (I->mayWriteToMemory())
164 // Writes memory. Just give up.
165 return MAK_MayWrite;
166
167 // If this instruction may read memory, remember that.
168 ReadsMemory |= I->mayReadFromMemory();
169 }
170
171 return ReadsMemory ? MAK_ReadOnly : MAK_ReadNone;
172}
173
Chandler Carrutha632fb92015-09-13 06:57:25 +0000174/// Deduce readonly/readnone attributes for the SCC.
Chandler Carrutha8125352015-10-30 16:48:08 +0000175template <typename AARGetterT>
176static bool addReadAttrs(const SCCNodeSet &SCCNodes, AARGetterT AARGetter) {
Duncan Sands44c8cd92008-12-31 16:14:43 +0000177 // Check if any of the functions in the SCC read or write memory. If they
178 // write memory then they can't be marked readnone or readonly.
179 bool ReadsMemory = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000180 for (Function *F : SCCNodes) {
Chandler Carrutha8125352015-10-30 16:48:08 +0000181 // Call the callable parameter to look up AA results for this function.
182 AAResults &AAR = AARGetter(*F);
Chandler Carruth7b560d42015-09-09 17:55:00 +0000183
Chandler Carruth7542d372015-09-21 17:39:41 +0000184 switch (checkFunctionMemoryAccess(*F, AAR, SCCNodes)) {
185 case MAK_MayWrite:
186 return false;
187 case MAK_ReadOnly:
Duncan Sands44c8cd92008-12-31 16:14:43 +0000188 ReadsMemory = true;
Chandler Carruth7542d372015-09-21 17:39:41 +0000189 break;
190 case MAK_ReadNone:
191 // Nothing to do!
192 break;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000193 }
194 }
195
196 // Success! Functions in this SCC do not access memory, or only read memory.
197 // Give them the appropriate attribute.
198 bool MadeChange = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000199 for (Function *F : SCCNodes) {
Duncan Sands44c8cd92008-12-31 16:14:43 +0000200 if (F->doesNotAccessMemory())
201 // Already perfect!
202 continue;
203
204 if (F->onlyReadsMemory() && ReadsMemory)
205 // No change.
206 continue;
207
208 MadeChange = true;
209
210 // Clear out any existing attributes.
Bill Wendling50d27842012-10-15 20:35:56 +0000211 AttrBuilder B;
Chandler Carruth63559d72015-09-13 06:47:20 +0000212 B.addAttribute(Attribute::ReadOnly).addAttribute(Attribute::ReadNone);
213 F->removeAttributes(
214 AttributeSet::FunctionIndex,
215 AttributeSet::get(F->getContext(), AttributeSet::FunctionIndex, B));
Duncan Sands44c8cd92008-12-31 16:14:43 +0000216
217 // Add in the new attribute.
Bill Wendlinge94d8432012-12-07 23:16:57 +0000218 F->addAttribute(AttributeSet::FunctionIndex,
Bill Wendlingc0e2a1f2013-01-23 00:20:53 +0000219 ReadsMemory ? Attribute::ReadOnly : Attribute::ReadNone);
Duncan Sands44c8cd92008-12-31 16:14:43 +0000220
221 if (ReadsMemory)
Duncan Sandscefc8602009-01-02 11:46:24 +0000222 ++NumReadOnly;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000223 else
Duncan Sandscefc8602009-01-02 11:46:24 +0000224 ++NumReadNone;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000225 }
226
227 return MadeChange;
228}
229
Nick Lewycky4c378a42011-12-28 23:24:21 +0000230namespace {
Chandler Carrutha632fb92015-09-13 06:57:25 +0000231/// For a given pointer Argument, this retains a list of Arguments of functions
232/// in the same SCC that the pointer data flows into. We use this to build an
233/// SCC of the arguments.
Chandler Carruth63559d72015-09-13 06:47:20 +0000234struct ArgumentGraphNode {
235 Argument *Definition;
236 SmallVector<ArgumentGraphNode *, 4> Uses;
237};
Nick Lewycky4c378a42011-12-28 23:24:21 +0000238
Chandler Carruth63559d72015-09-13 06:47:20 +0000239class ArgumentGraph {
240 // We store pointers to ArgumentGraphNode objects, so it's important that
241 // that they not move around upon insert.
242 typedef std::map<Argument *, ArgumentGraphNode> ArgumentMapTy;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000243
Chandler Carruth63559d72015-09-13 06:47:20 +0000244 ArgumentMapTy ArgumentMap;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000245
Chandler Carruth63559d72015-09-13 06:47:20 +0000246 // There is no root node for the argument graph, in fact:
247 // void f(int *x, int *y) { if (...) f(x, y); }
248 // is an example where the graph is disconnected. The SCCIterator requires a
249 // single entry point, so we maintain a fake ("synthetic") root node that
250 // uses every node. Because the graph is directed and nothing points into
251 // the root, it will not participate in any SCCs (except for its own).
252 ArgumentGraphNode SyntheticRoot;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000253
Chandler Carruth63559d72015-09-13 06:47:20 +0000254public:
255 ArgumentGraph() { SyntheticRoot.Definition = nullptr; }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000256
Chandler Carruth63559d72015-09-13 06:47:20 +0000257 typedef SmallVectorImpl<ArgumentGraphNode *>::iterator iterator;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000258
Chandler Carruth63559d72015-09-13 06:47:20 +0000259 iterator begin() { return SyntheticRoot.Uses.begin(); }
260 iterator end() { return SyntheticRoot.Uses.end(); }
261 ArgumentGraphNode *getEntryNode() { return &SyntheticRoot; }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000262
Chandler Carruth63559d72015-09-13 06:47:20 +0000263 ArgumentGraphNode *operator[](Argument *A) {
264 ArgumentGraphNode &Node = ArgumentMap[A];
265 Node.Definition = A;
266 SyntheticRoot.Uses.push_back(&Node);
267 return &Node;
268 }
269};
Nick Lewycky4c378a42011-12-28 23:24:21 +0000270
Chandler Carrutha632fb92015-09-13 06:57:25 +0000271/// This tracker checks whether callees are in the SCC, and if so it does not
272/// consider that a capture, instead adding it to the "Uses" list and
273/// continuing with the analysis.
Chandler Carruth63559d72015-09-13 06:47:20 +0000274struct ArgumentUsesTracker : public CaptureTracker {
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000275 ArgumentUsesTracker(const SCCNodeSet &SCCNodes)
Nick Lewycky4c378a42011-12-28 23:24:21 +0000276 : Captured(false), SCCNodes(SCCNodes) {}
277
Chandler Carruth63559d72015-09-13 06:47:20 +0000278 void tooManyUses() override { Captured = true; }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000279
Chandler Carruth63559d72015-09-13 06:47:20 +0000280 bool captured(const Use *U) override {
281 CallSite CS(U->getUser());
282 if (!CS.getInstruction()) {
283 Captured = true;
284 return true;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000285 }
286
Chandler Carruth63559d72015-09-13 06:47:20 +0000287 Function *F = CS.getCalledFunction();
Sanjoy Das5ce32722016-04-08 00:48:30 +0000288 if (!F || !F->hasExactDefinition() || !SCCNodes.count(F)) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000289 Captured = true;
290 return true;
291 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000292
Sanjoy Das98bfe262015-11-05 03:04:40 +0000293 // Note: the callee and the two successor blocks *follow* the argument
294 // operands. This means there is no need to adjust UseIndex to account for
295 // these.
296
297 unsigned UseIndex =
298 std::distance(const_cast<const Use *>(CS.arg_begin()), U);
299
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000300 assert(UseIndex < CS.data_operands_size() &&
301 "Indirect function calls should have been filtered above!");
302
303 if (UseIndex >= CS.getNumArgOperands()) {
304 // Data operand, but not a argument operand -- must be a bundle operand
305 assert(CS.hasOperandBundles() && "Must be!");
306
307 // CaptureTracking told us that we're being captured by an operand bundle
308 // use. In this case it does not matter if the callee is within our SCC
309 // or not -- we've been captured in some unknown way, and we have to be
310 // conservative.
311 Captured = true;
312 return true;
313 }
314
Sanjoy Das98bfe262015-11-05 03:04:40 +0000315 if (UseIndex >= F->arg_size()) {
316 assert(F->isVarArg() && "More params than args in non-varargs call");
317 Captured = true;
318 return true;
Chandler Carruth63559d72015-09-13 06:47:20 +0000319 }
Sanjoy Das98bfe262015-11-05 03:04:40 +0000320
Duncan P. N. Exon Smith83c4b682015-11-07 00:01:16 +0000321 Uses.push_back(&*std::next(F->arg_begin(), UseIndex));
Chandler Carruth63559d72015-09-13 06:47:20 +0000322 return false;
323 }
324
325 bool Captured; // True only if certainly captured (used outside our SCC).
326 SmallVector<Argument *, 4> Uses; // Uses within our SCC.
327
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000328 const SCCNodeSet &SCCNodes;
Chandler Carruth63559d72015-09-13 06:47:20 +0000329};
Alexander Kornienkof00654e2015-06-23 09:49:53 +0000330}
Nick Lewycky4c378a42011-12-28 23:24:21 +0000331
332namespace llvm {
Chandler Carruth63559d72015-09-13 06:47:20 +0000333template <> struct GraphTraits<ArgumentGraphNode *> {
334 typedef ArgumentGraphNode NodeType;
335 typedef SmallVectorImpl<ArgumentGraphNode *>::iterator ChildIteratorType;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000336
Chandler Carruth63559d72015-09-13 06:47:20 +0000337 static inline NodeType *getEntryNode(NodeType *A) { return A; }
338 static inline ChildIteratorType child_begin(NodeType *N) {
339 return N->Uses.begin();
340 }
341 static inline ChildIteratorType child_end(NodeType *N) {
342 return N->Uses.end();
343 }
344};
345template <>
346struct GraphTraits<ArgumentGraph *> : public GraphTraits<ArgumentGraphNode *> {
347 static NodeType *getEntryNode(ArgumentGraph *AG) {
348 return AG->getEntryNode();
349 }
350 static ChildIteratorType nodes_begin(ArgumentGraph *AG) {
351 return AG->begin();
352 }
353 static ChildIteratorType nodes_end(ArgumentGraph *AG) { return AG->end(); }
354};
Alexander Kornienkof00654e2015-06-23 09:49:53 +0000355}
Nick Lewycky4c378a42011-12-28 23:24:21 +0000356
Chandler Carrutha632fb92015-09-13 06:57:25 +0000357/// Returns Attribute::None, Attribute::ReadOnly or Attribute::ReadNone.
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000358static Attribute::AttrKind
359determinePointerReadAttrs(Argument *A,
Chandler Carruth63559d72015-09-13 06:47:20 +0000360 const SmallPtrSet<Argument *, 8> &SCCNodes) {
361
362 SmallVector<Use *, 32> Worklist;
363 SmallSet<Use *, 32> Visited;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000364
Reid Kleckner26af2ca2014-01-28 02:38:36 +0000365 // inalloca arguments are always clobbered by the call.
366 if (A->hasInAllocaAttr())
367 return Attribute::None;
368
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000369 bool IsRead = false;
370 // We don't need to track IsWritten. If A is written to, return immediately.
371
Chandler Carruthcdf47882014-03-09 03:16:01 +0000372 for (Use &U : A->uses()) {
Chandler Carruthcdf47882014-03-09 03:16:01 +0000373 Visited.insert(&U);
374 Worklist.push_back(&U);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000375 }
376
377 while (!Worklist.empty()) {
378 Use *U = Worklist.pop_back_val();
379 Instruction *I = cast<Instruction>(U->getUser());
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000380
381 switch (I->getOpcode()) {
382 case Instruction::BitCast:
383 case Instruction::GetElementPtr:
384 case Instruction::PHI:
385 case Instruction::Select:
Matt Arsenaulte55a2c22014-01-14 19:11:52 +0000386 case Instruction::AddrSpaceCast:
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000387 // The original value is not read/written via this if the new value isn't.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000388 for (Use &UU : I->uses())
David Blaikie70573dc2014-11-19 07:49:26 +0000389 if (Visited.insert(&UU).second)
Chandler Carruthcdf47882014-03-09 03:16:01 +0000390 Worklist.push_back(&UU);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000391 break;
392
393 case Instruction::Call:
394 case Instruction::Invoke: {
Nick Lewycky59633cb2014-05-30 02:31:27 +0000395 bool Captures = true;
396
397 if (I->getType()->isVoidTy())
398 Captures = false;
399
400 auto AddUsersToWorklistIfCapturing = [&] {
401 if (Captures)
402 for (Use &UU : I->uses())
David Blaikie70573dc2014-11-19 07:49:26 +0000403 if (Visited.insert(&UU).second)
Nick Lewycky59633cb2014-05-30 02:31:27 +0000404 Worklist.push_back(&UU);
405 };
406
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000407 CallSite CS(I);
Nick Lewycky59633cb2014-05-30 02:31:27 +0000408 if (CS.doesNotAccessMemory()) {
409 AddUsersToWorklistIfCapturing();
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000410 continue;
Nick Lewycky59633cb2014-05-30 02:31:27 +0000411 }
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000412
413 Function *F = CS.getCalledFunction();
414 if (!F) {
415 if (CS.onlyReadsMemory()) {
416 IsRead = true;
Nick Lewycky59633cb2014-05-30 02:31:27 +0000417 AddUsersToWorklistIfCapturing();
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000418 continue;
419 }
420 return Attribute::None;
421 }
422
Sanjoy Das436e2392015-11-07 01:55:53 +0000423 // Note: the callee and the two successor blocks *follow* the argument
424 // operands. This means there is no need to adjust UseIndex to account
425 // for these.
426
427 unsigned UseIndex = std::distance(CS.arg_begin(), U);
428
Sanjoy Dasea1df7f2015-11-07 01:56:07 +0000429 // U cannot be the callee operand use: since we're exploring the
430 // transitive uses of an Argument, having such a use be a callee would
431 // imply the CallSite is an indirect call or invoke; and we'd take the
432 // early exit above.
433 assert(UseIndex < CS.data_operands_size() &&
434 "Data operand use expected!");
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000435
436 bool IsOperandBundleUse = UseIndex >= CS.getNumArgOperands();
437
438 if (UseIndex >= F->arg_size() && !IsOperandBundleUse) {
Sanjoy Das436e2392015-11-07 01:55:53 +0000439 assert(F->isVarArg() && "More params than args in non-varargs call");
440 return Attribute::None;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000441 }
Sanjoy Das436e2392015-11-07 01:55:53 +0000442
Tilmann Scheller925b1932015-11-20 19:17:10 +0000443 Captures &= !CS.doesNotCapture(UseIndex);
444
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000445 // Since the optimizer (by design) cannot see the data flow corresponding
446 // to a operand bundle use, these cannot participate in the optimistic SCC
447 // analysis. Instead, we model the operand bundle uses as arguments in
448 // call to a function external to the SCC.
Sanjoy Das76dd2432015-11-07 02:26:53 +0000449 if (!SCCNodes.count(&*std::next(F->arg_begin(), UseIndex)) ||
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000450 IsOperandBundleUse) {
451
452 // The accessors used on CallSite here do the right thing for calls and
453 // invokes with operand bundles.
454
Sanjoy Das436e2392015-11-07 01:55:53 +0000455 if (!CS.onlyReadsMemory() && !CS.onlyReadsMemory(UseIndex))
456 return Attribute::None;
457 if (!CS.doesNotAccessMemory(UseIndex))
458 IsRead = true;
459 }
460
Nick Lewycky59633cb2014-05-30 02:31:27 +0000461 AddUsersToWorklistIfCapturing();
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000462 break;
463 }
464
465 case Instruction::Load:
David Majnemer124bdb72016-05-25 05:53:04 +0000466 // A volatile load has side effects beyond what readonly can be relied
467 // upon.
468 if (cast<LoadInst>(I)->isVolatile())
469 return Attribute::None;
470
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000471 IsRead = true;
472 break;
473
474 case Instruction::ICmp:
475 case Instruction::Ret:
476 break;
477
478 default:
479 return Attribute::None;
480 }
481 }
482
483 return IsRead ? Attribute::ReadOnly : Attribute::ReadNone;
484}
485
Chandler Carrutha632fb92015-09-13 06:57:25 +0000486/// Deduce nocapture attributes for the SCC.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000487static bool addArgumentAttrs(const SCCNodeSet &SCCNodes) {
Duncan Sands44c8cd92008-12-31 16:14:43 +0000488 bool Changed = false;
489
Nick Lewycky4c378a42011-12-28 23:24:21 +0000490 ArgumentGraph AG;
491
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000492 AttrBuilder B;
493 B.addAttribute(Attribute::NoCapture);
494
Duncan Sands44c8cd92008-12-31 16:14:43 +0000495 // Check each function in turn, determining which pointer arguments are not
496 // captured.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000497 for (Function *F : SCCNodes) {
Sanjoy Das5ce32722016-04-08 00:48:30 +0000498 // We can infer and propagate function attributes only when we know that the
499 // definition we'll get at link time is *exactly* the definition we see now.
500 // For more details, see GlobalValue::mayBeDerefined.
501 if (!F->hasExactDefinition())
Duncan Sands44c8cd92008-12-31 16:14:43 +0000502 continue;
503
Nick Lewycky4c378a42011-12-28 23:24:21 +0000504 // Functions that are readonly (or readnone) and nounwind and don't return
505 // a value can't capture arguments. Don't analyze them.
506 if (F->onlyReadsMemory() && F->doesNotThrow() &&
507 F->getReturnType()->isVoidTy()) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000508 for (Function::arg_iterator A = F->arg_begin(), E = F->arg_end(); A != E;
509 ++A) {
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000510 if (A->getType()->isPointerTy() && !A->hasNoCaptureAttr()) {
511 A->addAttr(AttributeSet::get(F->getContext(), A->getArgNo() + 1, B));
512 ++NumNoCapture;
513 Changed = true;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000514 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000515 }
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000516 continue;
Benjamin Kramer76b7bd02013-06-22 15:51:19 +0000517 }
518
Chandler Carruth63559d72015-09-13 06:47:20 +0000519 for (Function::arg_iterator A = F->arg_begin(), E = F->arg_end(); A != E;
520 ++A) {
521 if (!A->getType()->isPointerTy())
522 continue;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000523 bool HasNonLocalUses = false;
524 if (!A->hasNoCaptureAttr()) {
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000525 ArgumentUsesTracker Tracker(SCCNodes);
Duncan P. N. Exon Smith17323402015-10-13 17:51:03 +0000526 PointerMayBeCaptured(&*A, &Tracker);
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000527 if (!Tracker.Captured) {
528 if (Tracker.Uses.empty()) {
529 // If it's trivially not captured, mark it nocapture now.
Chandler Carruth63559d72015-09-13 06:47:20 +0000530 A->addAttr(
531 AttributeSet::get(F->getContext(), A->getArgNo() + 1, B));
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000532 ++NumNoCapture;
533 Changed = true;
534 } else {
535 // If it's not trivially captured and not trivially not captured,
536 // then it must be calling into another function in our SCC. Save
537 // its particulars for Argument-SCC analysis later.
Duncan P. N. Exon Smith17323402015-10-13 17:51:03 +0000538 ArgumentGraphNode *Node = AG[&*A];
Chandler Carruth63559d72015-09-13 06:47:20 +0000539 for (SmallVectorImpl<Argument *>::iterator
540 UI = Tracker.Uses.begin(),
541 UE = Tracker.Uses.end();
542 UI != UE; ++UI) {
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000543 Node->Uses.push_back(AG[*UI]);
Duncan P. N. Exon Smithe9bc5792016-02-21 20:39:50 +0000544 if (*UI != &*A)
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000545 HasNonLocalUses = true;
546 }
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000547 }
548 }
549 // Otherwise, it's captured. Don't bother doing SCC analysis on it.
550 }
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000551 if (!HasNonLocalUses && !A->onlyReadsMemory()) {
552 // Can we determine that it's readonly/readnone without doing an SCC?
553 // Note that we don't allow any calls at all here, or else our result
554 // will be dependent on the iteration order through the functions in the
555 // SCC.
Chandler Carruth63559d72015-09-13 06:47:20 +0000556 SmallPtrSet<Argument *, 8> Self;
Duncan P. N. Exon Smith17323402015-10-13 17:51:03 +0000557 Self.insert(&*A);
558 Attribute::AttrKind R = determinePointerReadAttrs(&*A, Self);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000559 if (R != Attribute::None) {
560 AttrBuilder B;
561 B.addAttribute(R);
562 A->addAttr(AttributeSet::get(A->getContext(), A->getArgNo() + 1, B));
563 Changed = true;
564 R == Attribute::ReadOnly ? ++NumReadOnlyArg : ++NumReadNoneArg;
565 }
566 }
567 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000568 }
569
570 // The graph we've collected is partial because we stopped scanning for
571 // argument uses once we solved the argument trivially. These partial nodes
572 // show up as ArgumentGraphNode objects with an empty Uses list, and for
573 // these nodes the final decision about whether they capture has already been
574 // made. If the definition doesn't have a 'nocapture' attribute by now, it
575 // captures.
576
Chandler Carruth63559d72015-09-13 06:47:20 +0000577 for (scc_iterator<ArgumentGraph *> I = scc_begin(&AG); !I.isAtEnd(); ++I) {
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000578 const std::vector<ArgumentGraphNode *> &ArgumentSCC = *I;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000579 if (ArgumentSCC.size() == 1) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000580 if (!ArgumentSCC[0]->Definition)
581 continue; // synthetic root node
Nick Lewycky4c378a42011-12-28 23:24:21 +0000582
583 // eg. "void f(int* x) { if (...) f(x); }"
584 if (ArgumentSCC[0]->Uses.size() == 1 &&
585 ArgumentSCC[0]->Uses[0] == ArgumentSCC[0]) {
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000586 Argument *A = ArgumentSCC[0]->Definition;
587 A->addAttr(AttributeSet::get(A->getContext(), A->getArgNo() + 1, B));
Nick Lewycky7e820552009-01-02 03:46:56 +0000588 ++NumNoCapture;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000589 Changed = true;
590 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000591 continue;
592 }
593
594 bool SCCCaptured = false;
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000595 for (auto I = ArgumentSCC.begin(), E = ArgumentSCC.end();
596 I != E && !SCCCaptured; ++I) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000597 ArgumentGraphNode *Node = *I;
598 if (Node->Uses.empty()) {
599 if (!Node->Definition->hasNoCaptureAttr())
600 SCCCaptured = true;
601 }
602 }
Chandler Carruth63559d72015-09-13 06:47:20 +0000603 if (SCCCaptured)
604 continue;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000605
Chandler Carruth63559d72015-09-13 06:47:20 +0000606 SmallPtrSet<Argument *, 8> ArgumentSCCNodes;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000607 // Fill ArgumentSCCNodes with the elements of the ArgumentSCC. Used for
608 // quickly looking up whether a given Argument is in this ArgumentSCC.
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000609 for (auto I = ArgumentSCC.begin(), E = ArgumentSCC.end(); I != E; ++I) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000610 ArgumentSCCNodes.insert((*I)->Definition);
611 }
612
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000613 for (auto I = ArgumentSCC.begin(), E = ArgumentSCC.end();
614 I != E && !SCCCaptured; ++I) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000615 ArgumentGraphNode *N = *I;
Chandler Carruth63559d72015-09-13 06:47:20 +0000616 for (SmallVectorImpl<ArgumentGraphNode *>::iterator UI = N->Uses.begin(),
617 UE = N->Uses.end();
618 UI != UE; ++UI) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000619 Argument *A = (*UI)->Definition;
620 if (A->hasNoCaptureAttr() || ArgumentSCCNodes.count(A))
621 continue;
622 SCCCaptured = true;
623 break;
624 }
625 }
Chandler Carruth63559d72015-09-13 06:47:20 +0000626 if (SCCCaptured)
627 continue;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000628
Nick Lewyckyf740db32012-01-05 22:21:45 +0000629 for (unsigned i = 0, e = ArgumentSCC.size(); i != e; ++i) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000630 Argument *A = ArgumentSCC[i]->Definition;
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000631 A->addAttr(AttributeSet::get(A->getContext(), A->getArgNo() + 1, B));
Nick Lewycky4c378a42011-12-28 23:24:21 +0000632 ++NumNoCapture;
633 Changed = true;
634 }
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000635
636 // We also want to compute readonly/readnone. With a small number of false
637 // negatives, we can assume that any pointer which is captured isn't going
638 // to be provably readonly or readnone, since by definition we can't
639 // analyze all uses of a captured pointer.
640 //
641 // The false negatives happen when the pointer is captured by a function
642 // that promises readonly/readnone behaviour on the pointer, then the
643 // pointer's lifetime ends before anything that writes to arbitrary memory.
644 // Also, a readonly/readnone pointer may be returned, but returning a
645 // pointer is capturing it.
646
647 Attribute::AttrKind ReadAttr = Attribute::ReadNone;
648 for (unsigned i = 0, e = ArgumentSCC.size(); i != e; ++i) {
649 Argument *A = ArgumentSCC[i]->Definition;
650 Attribute::AttrKind K = determinePointerReadAttrs(A, ArgumentSCCNodes);
651 if (K == Attribute::ReadNone)
652 continue;
653 if (K == Attribute::ReadOnly) {
654 ReadAttr = Attribute::ReadOnly;
655 continue;
656 }
657 ReadAttr = K;
658 break;
659 }
660
661 if (ReadAttr != Attribute::None) {
Bjorn Steinbrink236446c2015-05-25 19:46:38 +0000662 AttrBuilder B, R;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000663 B.addAttribute(ReadAttr);
Chandler Carruth63559d72015-09-13 06:47:20 +0000664 R.addAttribute(Attribute::ReadOnly).addAttribute(Attribute::ReadNone);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000665 for (unsigned i = 0, e = ArgumentSCC.size(); i != e; ++i) {
666 Argument *A = ArgumentSCC[i]->Definition;
Bjorn Steinbrink236446c2015-05-25 19:46:38 +0000667 // Clear out existing readonly/readnone attributes
668 A->removeAttr(AttributeSet::get(A->getContext(), A->getArgNo() + 1, R));
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000669 A->addAttr(AttributeSet::get(A->getContext(), A->getArgNo() + 1, B));
670 ReadAttr == Attribute::ReadOnly ? ++NumReadOnlyArg : ++NumReadNoneArg;
671 Changed = true;
672 }
673 }
Duncan Sands44c8cd92008-12-31 16:14:43 +0000674 }
675
676 return Changed;
677}
678
Chandler Carrutha632fb92015-09-13 06:57:25 +0000679/// Tests whether a function is "malloc-like".
680///
681/// A function is "malloc-like" if it returns either null or a pointer that
682/// doesn't alias any other pointer visible to the caller.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000683static bool isFunctionMallocLike(Function *F, const SCCNodeSet &SCCNodes) {
Benjamin Kramer15591272012-10-31 13:45:49 +0000684 SmallSetVector<Value *, 8> FlowsToReturn;
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000685 for (Function::iterator I = F->begin(), E = F->end(); I != E; ++I)
686 if (ReturnInst *Ret = dyn_cast<ReturnInst>(I->getTerminator()))
687 FlowsToReturn.insert(Ret->getReturnValue());
688
689 for (unsigned i = 0; i != FlowsToReturn.size(); ++i) {
Benjamin Kramer15591272012-10-31 13:45:49 +0000690 Value *RetVal = FlowsToReturn[i];
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000691
692 if (Constant *C = dyn_cast<Constant>(RetVal)) {
693 if (!C->isNullValue() && !isa<UndefValue>(C))
694 return false;
695
696 continue;
697 }
698
699 if (isa<Argument>(RetVal))
700 return false;
701
702 if (Instruction *RVI = dyn_cast<Instruction>(RetVal))
703 switch (RVI->getOpcode()) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000704 // Extend the analysis by looking upwards.
705 case Instruction::BitCast:
706 case Instruction::GetElementPtr:
707 case Instruction::AddrSpaceCast:
708 FlowsToReturn.insert(RVI->getOperand(0));
709 continue;
710 case Instruction::Select: {
711 SelectInst *SI = cast<SelectInst>(RVI);
712 FlowsToReturn.insert(SI->getTrueValue());
713 FlowsToReturn.insert(SI->getFalseValue());
714 continue;
715 }
716 case Instruction::PHI: {
717 PHINode *PN = cast<PHINode>(RVI);
718 for (Value *IncValue : PN->incoming_values())
719 FlowsToReturn.insert(IncValue);
720 continue;
721 }
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000722
Chandler Carruth63559d72015-09-13 06:47:20 +0000723 // Check whether the pointer came from an allocation.
724 case Instruction::Alloca:
725 break;
726 case Instruction::Call:
727 case Instruction::Invoke: {
728 CallSite CS(RVI);
729 if (CS.paramHasAttr(0, Attribute::NoAlias))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000730 break;
Chandler Carruth63559d72015-09-13 06:47:20 +0000731 if (CS.getCalledFunction() && SCCNodes.count(CS.getCalledFunction()))
732 break;
733 } // fall-through
734 default:
735 return false; // Did not come from an allocation.
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000736 }
737
Dan Gohman94e61762009-11-19 21:57:48 +0000738 if (PointerMayBeCaptured(RetVal, false, /*StoreCaptures=*/false))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000739 return false;
740 }
741
742 return true;
743}
744
Chandler Carrutha632fb92015-09-13 06:57:25 +0000745/// Deduce noalias attributes for the SCC.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000746static bool addNoAliasAttrs(const SCCNodeSet &SCCNodes) {
Nick Lewycky9ec96d12009-03-08 17:08:09 +0000747 // Check each function in turn, determining which functions return noalias
748 // pointers.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000749 for (Function *F : SCCNodes) {
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000750 // Already noalias.
751 if (F->doesNotAlias(0))
752 continue;
753
Sanjoy Das5ce32722016-04-08 00:48:30 +0000754 // We can infer and propagate function attributes only when we know that the
755 // definition we'll get at link time is *exactly* the definition we see now.
756 // For more details, see GlobalValue::mayBeDerefined.
757 if (!F->hasExactDefinition())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000758 return false;
759
Chandler Carruth63559d72015-09-13 06:47:20 +0000760 // We annotate noalias return values, which are only applicable to
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000761 // pointer types.
Duncan Sands19d0b472010-02-16 11:11:14 +0000762 if (!F->getReturnType()->isPointerTy())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000763 continue;
764
Chandler Carruth3824f852015-09-13 08:23:27 +0000765 if (!isFunctionMallocLike(F, SCCNodes))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000766 return false;
767 }
768
769 bool MadeChange = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000770 for (Function *F : SCCNodes) {
Duncan Sands19d0b472010-02-16 11:11:14 +0000771 if (F->doesNotAlias(0) || !F->getReturnType()->isPointerTy())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000772 continue;
773
774 F->setDoesNotAlias(0);
775 ++NumNoAlias;
776 MadeChange = true;
777 }
778
779 return MadeChange;
780}
781
Chandler Carrutha632fb92015-09-13 06:57:25 +0000782/// Tests whether this function is known to not return null.
Chandler Carruth8874b782015-09-13 08:17:14 +0000783///
784/// Requires that the function returns a pointer.
785///
786/// Returns true if it believes the function will not return a null, and sets
787/// \p Speculative based on whether the returned conclusion is a speculative
788/// conclusion due to SCC calls.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000789static bool isReturnNonNull(Function *F, const SCCNodeSet &SCCNodes,
Chandler Carruth8874b782015-09-13 08:17:14 +0000790 const TargetLibraryInfo &TLI, bool &Speculative) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000791 assert(F->getReturnType()->isPointerTy() &&
792 "nonnull only meaningful on pointer types");
793 Speculative = false;
Chandler Carruth63559d72015-09-13 06:47:20 +0000794
Philip Reamesa88caea2015-08-31 19:44:38 +0000795 SmallSetVector<Value *, 8> FlowsToReturn;
796 for (BasicBlock &BB : *F)
797 if (auto *Ret = dyn_cast<ReturnInst>(BB.getTerminator()))
798 FlowsToReturn.insert(Ret->getReturnValue());
799
800 for (unsigned i = 0; i != FlowsToReturn.size(); ++i) {
801 Value *RetVal = FlowsToReturn[i];
802
803 // If this value is locally known to be non-null, we're good
Chandler Carruth8874b782015-09-13 08:17:14 +0000804 if (isKnownNonNull(RetVal, &TLI))
Philip Reamesa88caea2015-08-31 19:44:38 +0000805 continue;
806
807 // Otherwise, we need to look upwards since we can't make any local
Chandler Carruth63559d72015-09-13 06:47:20 +0000808 // conclusions.
Philip Reamesa88caea2015-08-31 19:44:38 +0000809 Instruction *RVI = dyn_cast<Instruction>(RetVal);
810 if (!RVI)
811 return false;
812 switch (RVI->getOpcode()) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000813 // Extend the analysis by looking upwards.
Philip Reamesa88caea2015-08-31 19:44:38 +0000814 case Instruction::BitCast:
815 case Instruction::GetElementPtr:
816 case Instruction::AddrSpaceCast:
817 FlowsToReturn.insert(RVI->getOperand(0));
818 continue;
819 case Instruction::Select: {
820 SelectInst *SI = cast<SelectInst>(RVI);
821 FlowsToReturn.insert(SI->getTrueValue());
822 FlowsToReturn.insert(SI->getFalseValue());
823 continue;
824 }
825 case Instruction::PHI: {
826 PHINode *PN = cast<PHINode>(RVI);
827 for (int i = 0, e = PN->getNumIncomingValues(); i != e; ++i)
828 FlowsToReturn.insert(PN->getIncomingValue(i));
829 continue;
830 }
831 case Instruction::Call:
832 case Instruction::Invoke: {
833 CallSite CS(RVI);
834 Function *Callee = CS.getCalledFunction();
835 // A call to a node within the SCC is assumed to return null until
836 // proven otherwise
837 if (Callee && SCCNodes.count(Callee)) {
838 Speculative = true;
839 continue;
840 }
841 return false;
842 }
843 default:
Chandler Carruth63559d72015-09-13 06:47:20 +0000844 return false; // Unknown source, may be null
Philip Reamesa88caea2015-08-31 19:44:38 +0000845 };
846 llvm_unreachable("should have either continued or returned");
847 }
848
849 return true;
850}
851
Chandler Carrutha632fb92015-09-13 06:57:25 +0000852/// Deduce nonnull attributes for the SCC.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000853static bool addNonNullAttrs(const SCCNodeSet &SCCNodes,
854 const TargetLibraryInfo &TLI) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000855 // Speculative that all functions in the SCC return only nonnull
856 // pointers. We may refute this as we analyze functions.
857 bool SCCReturnsNonNull = true;
858
859 bool MadeChange = false;
860
861 // Check each function in turn, determining which functions return nonnull
862 // pointers.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000863 for (Function *F : SCCNodes) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000864 // Already nonnull.
865 if (F->getAttributes().hasAttribute(AttributeSet::ReturnIndex,
866 Attribute::NonNull))
867 continue;
868
Sanjoy Das5ce32722016-04-08 00:48:30 +0000869 // We can infer and propagate function attributes only when we know that the
870 // definition we'll get at link time is *exactly* the definition we see now.
871 // For more details, see GlobalValue::mayBeDerefined.
872 if (!F->hasExactDefinition())
Philip Reamesa88caea2015-08-31 19:44:38 +0000873 return false;
874
Chandler Carruth63559d72015-09-13 06:47:20 +0000875 // We annotate nonnull return values, which are only applicable to
Philip Reamesa88caea2015-08-31 19:44:38 +0000876 // pointer types.
877 if (!F->getReturnType()->isPointerTy())
878 continue;
879
880 bool Speculative = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000881 if (isReturnNonNull(F, SCCNodes, TLI, Speculative)) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000882 if (!Speculative) {
883 // Mark the function eagerly since we may discover a function
884 // which prevents us from speculating about the entire SCC
885 DEBUG(dbgs() << "Eagerly marking " << F->getName() << " as nonnull\n");
886 F->addAttribute(AttributeSet::ReturnIndex, Attribute::NonNull);
887 ++NumNonNullReturn;
888 MadeChange = true;
889 }
890 continue;
891 }
892 // At least one function returns something which could be null, can't
893 // speculate any more.
894 SCCReturnsNonNull = false;
895 }
896
897 if (SCCReturnsNonNull) {
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000898 for (Function *F : SCCNodes) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000899 if (F->getAttributes().hasAttribute(AttributeSet::ReturnIndex,
900 Attribute::NonNull) ||
901 !F->getReturnType()->isPointerTy())
902 continue;
903
904 DEBUG(dbgs() << "SCC marking " << F->getName() << " as nonnull\n");
905 F->addAttribute(AttributeSet::ReturnIndex, Attribute::NonNull);
906 ++NumNonNullReturn;
907 MadeChange = true;
908 }
909 }
910
911 return MadeChange;
912}
913
Justin Lebar9d943972016-03-14 20:18:54 +0000914/// Remove the convergent attribute from all functions in the SCC if every
915/// callsite within the SCC is not convergent (except for calls to functions
916/// within the SCC). Returns true if changes were made.
Chandler Carruth3937bc72016-02-12 09:47:49 +0000917static bool removeConvergentAttrs(const SCCNodeSet &SCCNodes) {
Justin Lebar9d943972016-03-14 20:18:54 +0000918 // For every function in SCC, ensure that either
919 // * it is not convergent, or
920 // * we can remove its convergent attribute.
921 bool HasConvergentFn = false;
Chandler Carruth3937bc72016-02-12 09:47:49 +0000922 for (Function *F : SCCNodes) {
Justin Lebar9d943972016-03-14 20:18:54 +0000923 if (!F->isConvergent()) continue;
924 HasConvergentFn = true;
925
926 // Can't remove convergent from function declarations.
927 if (F->isDeclaration()) return false;
928
929 // Can't remove convergent if any of our functions has a convergent call to a
930 // function not in the SCC.
931 for (Instruction &I : instructions(*F)) {
932 CallSite CS(&I);
933 // Bail if CS is a convergent call to a function not in the SCC.
934 if (CS && CS.isConvergent() &&
935 SCCNodes.count(CS.getCalledFunction()) == 0)
936 return false;
937 }
938 }
939
940 // If the SCC doesn't have any convergent functions, we have nothing to do.
941 if (!HasConvergentFn) return false;
942
943 // If we got here, all of the calls the SCC makes to functions not in the SCC
944 // are non-convergent. Therefore all of the SCC's functions can also be made
945 // non-convergent. We'll remove the attr from the callsites in
946 // InstCombineCalls.
947 for (Function *F : SCCNodes) {
948 if (!F->isConvergent()) continue;
949
950 DEBUG(dbgs() << "Removing convergent attr from fn " << F->getName()
951 << "\n");
Chandler Carruth3937bc72016-02-12 09:47:49 +0000952 F->setNotConvergent();
953 }
Justin Lebar260854b2016-02-09 23:03:22 +0000954 return true;
955}
956
James Molloy7e9bdd52015-11-12 10:55:20 +0000957static bool setDoesNotRecurse(Function &F) {
958 if (F.doesNotRecurse())
959 return false;
960 F.setDoesNotRecurse();
961 ++NumNoRecurse;
962 return true;
963}
964
Chandler Carruth632d2082016-02-13 08:47:51 +0000965static bool addNoRecurseAttrs(const SCCNodeSet &SCCNodes) {
James Molloy7e9bdd52015-11-12 10:55:20 +0000966 // Try and identify functions that do not recurse.
967
968 // If the SCC contains multiple nodes we know for sure there is recursion.
Chandler Carruth632d2082016-02-13 08:47:51 +0000969 if (SCCNodes.size() != 1)
James Molloy7e9bdd52015-11-12 10:55:20 +0000970 return false;
971
Chandler Carruth632d2082016-02-13 08:47:51 +0000972 Function *F = *SCCNodes.begin();
James Molloy7e9bdd52015-11-12 10:55:20 +0000973 if (!F || F->isDeclaration() || F->doesNotRecurse())
974 return false;
975
976 // If all of the calls in F are identifiable and are to norecurse functions, F
977 // is norecurse. This check also detects self-recursion as F is not currently
978 // marked norecurse, so any called from F to F will not be marked norecurse.
Chandler Carruth632d2082016-02-13 08:47:51 +0000979 for (Instruction &I : instructions(*F))
980 if (auto CS = CallSite(&I)) {
981 Function *Callee = CS.getCalledFunction();
982 if (!Callee || Callee == F || !Callee->doesNotRecurse())
983 // Function calls a potentially recursive function.
984 return false;
985 }
James Molloy7e9bdd52015-11-12 10:55:20 +0000986
Chandler Carruth632d2082016-02-13 08:47:51 +0000987 // Every call was to a non-recursive function other than this function, and
988 // we have no indirect recursion as the SCC size is one. This function cannot
989 // recurse.
990 return setDoesNotRecurse(*F);
James Molloy7e9bdd52015-11-12 10:55:20 +0000991}
992
Chandler Carruthb47f8012016-03-11 11:05:24 +0000993PreservedAnalyses PostOrderFunctionAttrsPass::run(LazyCallGraph::SCC &C,
994 CGSCCAnalysisManager &AM) {
Chandler Carruth9c4ed172016-02-18 11:03:11 +0000995 Module &M = *C.begin()->getFunction().getParent();
996 const ModuleAnalysisManager &MAM =
Chandler Carruthb47f8012016-03-11 11:05:24 +0000997 AM.getResult<ModuleAnalysisManagerCGSCCProxy>(C).getManager();
Chandler Carruth9c4ed172016-02-18 11:03:11 +0000998 FunctionAnalysisManager &FAM =
Chandler Carruthb47f8012016-03-11 11:05:24 +0000999 AM.getResult<FunctionAnalysisManagerCGSCCProxy>(C).getManager();
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001000
1001 // FIXME: Need some way to make it more reasonable to assume that this is
1002 // always cached.
1003 TargetLibraryInfo &TLI = *MAM.getCachedResult<TargetLibraryAnalysis>(M);
1004
1005 // We pass a lambda into functions to wire them up to the analysis manager
1006 // for getting function analyses.
1007 auto AARGetter = [&](Function &F) -> AAResults & {
1008 return FAM.getResult<AAManager>(F);
1009 };
1010
1011 // Fill SCCNodes with the elements of the SCC. Also track whether there are
1012 // any external or opt-none nodes that will prevent us from optimizing any
1013 // part of the SCC.
1014 SCCNodeSet SCCNodes;
1015 bool HasUnknownCall = false;
1016 for (LazyCallGraph::Node &N : C) {
1017 Function &F = N.getFunction();
1018 if (F.hasFnAttribute(Attribute::OptimizeNone)) {
1019 // Treat any function we're trying not to optimize as if it were an
1020 // indirect call and omit it from the node set used below.
1021 HasUnknownCall = true;
1022 continue;
1023 }
1024 // Track whether any functions in this SCC have an unknown call edge.
1025 // Note: if this is ever a performance hit, we can common it with
1026 // subsequent routines which also do scans over the instructions of the
1027 // function.
1028 if (!HasUnknownCall)
1029 for (Instruction &I : instructions(F))
1030 if (auto CS = CallSite(&I))
1031 if (!CS.getCalledFunction()) {
1032 HasUnknownCall = true;
1033 break;
1034 }
1035
1036 SCCNodes.insert(&F);
1037 }
1038
1039 bool Changed = false;
1040 Changed |= addReadAttrs(SCCNodes, AARGetter);
1041 Changed |= addArgumentAttrs(SCCNodes);
1042
1043 // If we have no external nodes participating in the SCC, we can deduce some
1044 // more precise attributes as well.
1045 if (!HasUnknownCall) {
1046 Changed |= addNoAliasAttrs(SCCNodes);
1047 Changed |= addNonNullAttrs(SCCNodes, TLI);
1048 Changed |= removeConvergentAttrs(SCCNodes);
1049 Changed |= addNoRecurseAttrs(SCCNodes);
1050 }
1051
1052 return Changed ? PreservedAnalyses::none() : PreservedAnalyses::all();
1053}
1054
1055namespace {
1056struct PostOrderFunctionAttrsLegacyPass : public CallGraphSCCPass {
1057 static char ID; // Pass identification, replacement for typeid
1058 PostOrderFunctionAttrsLegacyPass() : CallGraphSCCPass(ID) {
1059 initializePostOrderFunctionAttrsLegacyPassPass(*PassRegistry::getPassRegistry());
1060 }
1061
1062 bool runOnSCC(CallGraphSCC &SCC) override;
1063
1064 void getAnalysisUsage(AnalysisUsage &AU) const override {
1065 AU.setPreservesCFG();
1066 AU.addRequired<AssumptionCacheTracker>();
1067 AU.addRequired<TargetLibraryInfoWrapperPass>();
Chandler Carruth12884f72016-03-02 15:56:53 +00001068 getAAResultsAnalysisUsage(AU);
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001069 CallGraphSCCPass::getAnalysisUsage(AU);
1070 }
1071
1072private:
1073 TargetLibraryInfo *TLI;
1074};
1075}
1076
1077char PostOrderFunctionAttrsLegacyPass::ID = 0;
1078INITIALIZE_PASS_BEGIN(PostOrderFunctionAttrsLegacyPass, "functionattrs",
1079 "Deduce function attributes", false, false)
1080INITIALIZE_PASS_DEPENDENCY(AssumptionCacheTracker)
1081INITIALIZE_PASS_DEPENDENCY(CallGraphWrapperPass)
1082INITIALIZE_PASS_DEPENDENCY(TargetLibraryInfoWrapperPass)
1083INITIALIZE_PASS_END(PostOrderFunctionAttrsLegacyPass, "functionattrs",
1084 "Deduce function attributes", false, false)
1085
1086Pass *llvm::createPostOrderFunctionAttrsLegacyPass() { return new PostOrderFunctionAttrsLegacyPass(); }
1087
1088bool PostOrderFunctionAttrsLegacyPass::runOnSCC(CallGraphSCC &SCC) {
Andrew Kayloraa641a52016-04-22 22:06:11 +00001089 if (skipSCC(SCC))
1090 return false;
1091
Chandler Carruthb98f63d2015-01-15 10:41:28 +00001092 TLI = &getAnalysis<TargetLibraryInfoWrapperPass>().getTLI();
Chandler Carruthcada2d82015-10-31 00:28:37 +00001093 bool Changed = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001094
Chandler Carrutha8125352015-10-30 16:48:08 +00001095 // We compute dedicated AA results for each function in the SCC as needed. We
1096 // use a lambda referencing external objects so that they live long enough to
1097 // be queried, but we re-use them each time.
1098 Optional<BasicAAResult> BAR;
1099 Optional<AAResults> AAR;
1100 auto AARGetter = [&](Function &F) -> AAResults & {
1101 BAR.emplace(createLegacyPMBasicAAResult(*this, F));
1102 AAR.emplace(createLegacyPMAAResults(*this, F, *BAR));
1103 return *AAR;
1104 };
1105
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001106 // Fill SCCNodes with the elements of the SCC. Used for quickly looking up
1107 // whether a given CallGraphNode is in this SCC. Also track whether there are
1108 // any external or opt-none nodes that will prevent us from optimizing any
1109 // part of the SCC.
1110 SCCNodeSet SCCNodes;
1111 bool ExternalNode = false;
1112 for (CallGraphSCC::iterator I = SCC.begin(), E = SCC.end(); I != E; ++I) {
1113 Function *F = (*I)->getFunction();
1114 if (!F || F->hasFnAttribute(Attribute::OptimizeNone)) {
1115 // External node or function we're trying not to optimize - we both avoid
1116 // transform them and avoid leveraging information they provide.
1117 ExternalNode = true;
1118 continue;
1119 }
1120
1121 SCCNodes.insert(F);
1122 }
1123
Chandler Carrutha8125352015-10-30 16:48:08 +00001124 Changed |= addReadAttrs(SCCNodes, AARGetter);
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001125 Changed |= addArgumentAttrs(SCCNodes);
1126
Chandler Carruth3a040e62015-12-27 08:41:34 +00001127 // If we have no external nodes participating in the SCC, we can deduce some
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001128 // more precise attributes as well.
1129 if (!ExternalNode) {
1130 Changed |= addNoAliasAttrs(SCCNodes);
1131 Changed |= addNonNullAttrs(SCCNodes, *TLI);
Chandler Carruth3937bc72016-02-12 09:47:49 +00001132 Changed |= removeConvergentAttrs(SCCNodes);
Chandler Carruth632d2082016-02-13 08:47:51 +00001133 Changed |= addNoRecurseAttrs(SCCNodes);
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001134 }
Chandler Carruth1926b702016-01-08 10:55:52 +00001135
James Molloy7e9bdd52015-11-12 10:55:20 +00001136 return Changed;
1137}
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001138
Chandler Carruth1926b702016-01-08 10:55:52 +00001139namespace {
1140/// A pass to do RPO deduction and propagation of function attributes.
1141///
1142/// This pass provides a general RPO or "top down" propagation of
1143/// function attributes. For a few (rare) cases, we can deduce significantly
1144/// more about function attributes by working in RPO, so this pass
1145/// provides the compliment to the post-order pass above where the majority of
1146/// deduction is performed.
1147// FIXME: Currently there is no RPO CGSCC pass structure to slide into and so
1148// this is a boring module pass, but eventually it should be an RPO CGSCC pass
1149// when such infrastructure is available.
1150struct ReversePostOrderFunctionAttrs : public ModulePass {
1151 static char ID; // Pass identification, replacement for typeid
1152 ReversePostOrderFunctionAttrs() : ModulePass(ID) {
1153 initializeReversePostOrderFunctionAttrsPass(*PassRegistry::getPassRegistry());
1154 }
1155
1156 bool runOnModule(Module &M) override;
1157
1158 void getAnalysisUsage(AnalysisUsage &AU) const override {
1159 AU.setPreservesCFG();
1160 AU.addRequired<CallGraphWrapperPass>();
Mehdi Amini0ddf4042016-05-02 18:03:33 +00001161 AU.addPreserved<CallGraphWrapperPass>();
Chandler Carruth1926b702016-01-08 10:55:52 +00001162 }
1163};
1164}
1165
1166char ReversePostOrderFunctionAttrs::ID = 0;
1167INITIALIZE_PASS_BEGIN(ReversePostOrderFunctionAttrs, "rpo-functionattrs",
1168 "Deduce function attributes in RPO", false, false)
1169INITIALIZE_PASS_DEPENDENCY(CallGraphWrapperPass)
1170INITIALIZE_PASS_END(ReversePostOrderFunctionAttrs, "rpo-functionattrs",
1171 "Deduce function attributes in RPO", false, false)
1172
1173Pass *llvm::createReversePostOrderFunctionAttrsPass() {
1174 return new ReversePostOrderFunctionAttrs();
1175}
1176
1177static bool addNoRecurseAttrsTopDown(Function &F) {
1178 // We check the preconditions for the function prior to calling this to avoid
1179 // the cost of building up a reversible post-order list. We assert them here
1180 // to make sure none of the invariants this relies on were violated.
1181 assert(!F.isDeclaration() && "Cannot deduce norecurse without a definition!");
1182 assert(!F.doesNotRecurse() &&
1183 "This function has already been deduced as norecurs!");
1184 assert(F.hasInternalLinkage() &&
1185 "Can only do top-down deduction for internal linkage functions!");
1186
1187 // If F is internal and all of its uses are calls from a non-recursive
1188 // functions, then none of its calls could in fact recurse without going
1189 // through a function marked norecurse, and so we can mark this function too
1190 // as norecurse. Note that the uses must actually be calls -- otherwise
1191 // a pointer to this function could be returned from a norecurse function but
1192 // this function could be recursively (indirectly) called. Note that this
1193 // also detects if F is directly recursive as F is not yet marked as
1194 // a norecurse function.
1195 for (auto *U : F.users()) {
1196 auto *I = dyn_cast<Instruction>(U);
1197 if (!I)
1198 return false;
1199 CallSite CS(I);
1200 if (!CS || !CS.getParent()->getParent()->doesNotRecurse())
1201 return false;
1202 }
1203 return setDoesNotRecurse(F);
1204}
1205
Sean Silvaadc79392016-06-12 05:44:51 +00001206static bool deduceFunctionAttributeInRPO(Module &M, CallGraph &CG) {
Chandler Carruth1926b702016-01-08 10:55:52 +00001207 // We only have a post-order SCC traversal (because SCCs are inherently
1208 // discovered in post-order), so we accumulate them in a vector and then walk
1209 // it in reverse. This is simpler than using the RPO iterator infrastructure
1210 // because we need to combine SCC detection and the PO walk of the call
1211 // graph. We can also cheat egregiously because we're primarily interested in
1212 // synthesizing norecurse and so we can only save the singular SCCs as SCCs
1213 // with multiple functions in them will clearly be recursive.
Chandler Carruth1926b702016-01-08 10:55:52 +00001214 SmallVector<Function *, 16> Worklist;
1215 for (scc_iterator<CallGraph *> I = scc_begin(&CG); !I.isAtEnd(); ++I) {
1216 if (I->size() != 1)
1217 continue;
1218
1219 Function *F = I->front()->getFunction();
1220 if (F && !F->isDeclaration() && !F->doesNotRecurse() &&
1221 F->hasInternalLinkage())
1222 Worklist.push_back(F);
1223 }
1224
James Molloy7e9bdd52015-11-12 10:55:20 +00001225 bool Changed = false;
Chandler Carruth1926b702016-01-08 10:55:52 +00001226 for (auto *F : reverse(Worklist))
1227 Changed |= addNoRecurseAttrsTopDown(*F);
1228
Duncan Sands44c8cd92008-12-31 16:14:43 +00001229 return Changed;
1230}
Sean Silvaadc79392016-06-12 05:44:51 +00001231
1232bool ReversePostOrderFunctionAttrs::runOnModule(Module &M) {
1233 if (skipModule(M))
1234 return false;
1235
1236 auto &CG = getAnalysis<CallGraphWrapperPass>().getCallGraph();
1237
1238 return deduceFunctionAttributeInRPO(M, CG);
1239}