Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 1 | //===- AliasAnalysis.cpp - Generic Alias Analysis Interface Implementation -==// |
Misha Brukman | 01808ca | 2005-04-21 21:13:18 +0000 | [diff] [blame] | 2 | // |
John Criswell | 482202a | 2003-10-20 19:43:21 +0000 | [diff] [blame] | 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
Chris Lattner | f3ebc3f | 2007-12-29 20:36:04 +0000 | [diff] [blame] | 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
Misha Brukman | 01808ca | 2005-04-21 21:13:18 +0000 | [diff] [blame] | 7 | // |
John Criswell | 482202a | 2003-10-20 19:43:21 +0000 | [diff] [blame] | 8 | //===----------------------------------------------------------------------===// |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 9 | // |
| 10 | // This file implements the generic AliasAnalysis interface which is used as the |
| 11 | // common interface used by all clients and implementations of alias analysis. |
| 12 | // |
| 13 | // This file also implements the default version of the AliasAnalysis interface |
| 14 | // that is to be used when no other implementation is specified. This does some |
| 15 | // simple tests that detect obvious cases: two different global pointers cannot |
| 16 | // alias, a global cannot alias a malloc, two different mallocs cannot alias, |
| 17 | // etc. |
| 18 | // |
| 19 | // This alias analysis implementation really isn't very good for anything, but |
| 20 | // it is very fast, and makes a nice clean default implementation. Because it |
| 21 | // handles lots of little corner cases, other, more complex, alias analysis |
| 22 | // implementations may choose to rely on this pass to resolve these simple and |
| 23 | // easy cases. |
| 24 | // |
| 25 | //===----------------------------------------------------------------------===// |
| 26 | |
Chris Lattner | d6a2a99 | 2003-02-26 19:41:54 +0000 | [diff] [blame] | 27 | #include "llvm/Analysis/AliasAnalysis.h" |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 28 | #include "llvm/Analysis/BasicAliasAnalysis.h" |
Nick Lewycky | 0b68245 | 2013-07-27 01:24:00 +0000 | [diff] [blame] | 29 | #include "llvm/Analysis/CFG.h" |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 30 | #include "llvm/Analysis/CFLAliasAnalysis.h" |
Chandler Carruth | 8a8cd2b | 2014-01-07 11:48:04 +0000 | [diff] [blame] | 31 | #include "llvm/Analysis/CaptureTracking.h" |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 32 | #include "llvm/Analysis/GlobalsModRef.h" |
| 33 | #include "llvm/Analysis/ObjCARCAliasAnalysis.h" |
| 34 | #include "llvm/Analysis/ScalarEvolutionAliasAnalysis.h" |
| 35 | #include "llvm/Analysis/ScopedNoAliasAA.h" |
Chandler Carruth | 62d4215 | 2015-01-15 02:16:27 +0000 | [diff] [blame] | 36 | #include "llvm/Analysis/TargetLibraryInfo.h" |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 37 | #include "llvm/Analysis/TypeBasedAliasAnalysis.h" |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 38 | #include "llvm/Analysis/ValueTracking.h" |
Chandler Carruth | 9fb823b | 2013-01-02 11:36:10 +0000 | [diff] [blame] | 39 | #include "llvm/IR/BasicBlock.h" |
| 40 | #include "llvm/IR/DataLayout.h" |
Chandler Carruth | 5ad5f15 | 2014-01-13 09:26:24 +0000 | [diff] [blame] | 41 | #include "llvm/IR/Dominators.h" |
Chandler Carruth | 9fb823b | 2013-01-02 11:36:10 +0000 | [diff] [blame] | 42 | #include "llvm/IR/Function.h" |
| 43 | #include "llvm/IR/Instructions.h" |
| 44 | #include "llvm/IR/IntrinsicInst.h" |
| 45 | #include "llvm/IR/LLVMContext.h" |
| 46 | #include "llvm/IR/Type.h" |
Chandler Carruth | ed0881b | 2012-12-03 16:50:05 +0000 | [diff] [blame] | 47 | #include "llvm/Pass.h" |
Chris Lattner | a67dbd0 | 2004-03-15 04:07:29 +0000 | [diff] [blame] | 48 | using namespace llvm; |
Brian Gaeke | 960707c | 2003-11-11 22:41:34 +0000 | [diff] [blame] | 49 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 50 | /// Allow disabling BasicAA from the AA results. This is particularly useful |
| 51 | /// when testing to isolate a single AA implementation. |
| 52 | static cl::opt<bool> DisableBasicAA("disable-basicaa", cl::Hidden, |
| 53 | cl::init(false)); |
| 54 | |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 55 | AAResults::AAResults(AAResults &&Arg) : TLI(Arg.TLI), AAs(std::move(Arg.AAs)) { |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 56 | for (auto &AA : AAs) |
| 57 | AA->setAAResults(this); |
| 58 | } |
| 59 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 60 | AAResults::~AAResults() { |
| 61 | // FIXME; It would be nice to at least clear out the pointers back to this |
| 62 | // aggregation here, but we end up with non-nesting lifetimes in the legacy |
| 63 | // pass manager that prevent this from working. In the legacy pass manager |
| 64 | // we'll end up with dangling references here in some cases. |
| 65 | #if 0 |
| 66 | for (auto &AA : AAs) |
| 67 | AA->setAAResults(nullptr); |
| 68 | #endif |
| 69 | } |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 70 | |
Chris Lattner | 62c3700 | 2004-05-23 21:15:48 +0000 | [diff] [blame] | 71 | //===----------------------------------------------------------------------===// |
| 72 | // Default chaining methods |
| 73 | //===----------------------------------------------------------------------===// |
| 74 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 75 | AliasResult AAResults::alias(const MemoryLocation &LocA, |
| 76 | const MemoryLocation &LocB) { |
| 77 | for (const auto &AA : AAs) { |
| 78 | auto Result = AA->alias(LocA, LocB); |
| 79 | if (Result != MayAlias) |
| 80 | return Result; |
| 81 | } |
| 82 | return MayAlias; |
Chris Lattner | 62c3700 | 2004-05-23 21:15:48 +0000 | [diff] [blame] | 83 | } |
| 84 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 85 | bool AAResults::pointsToConstantMemory(const MemoryLocation &Loc, |
| 86 | bool OrLocal) { |
| 87 | for (const auto &AA : AAs) |
| 88 | if (AA->pointsToConstantMemory(Loc, OrLocal)) |
| 89 | return true; |
| 90 | |
| 91 | return false; |
Chris Lattner | 62c3700 | 2004-05-23 21:15:48 +0000 | [diff] [blame] | 92 | } |
| 93 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 94 | ModRefInfo AAResults::getArgModRefInfo(ImmutableCallSite CS, unsigned ArgIdx) { |
| 95 | ModRefInfo Result = MRI_ModRef; |
| 96 | |
| 97 | for (const auto &AA : AAs) { |
| 98 | Result = ModRefInfo(Result & AA->getArgModRefInfo(CS, ArgIdx)); |
| 99 | |
| 100 | // Early-exit the moment we reach the bottom of the lattice. |
| 101 | if (Result == MRI_NoModRef) |
| 102 | return Result; |
| 103 | } |
| 104 | |
| 105 | return Result; |
Hal Finkel | 354e23b | 2014-07-17 01:28:25 +0000 | [diff] [blame] | 106 | } |
| 107 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 108 | ModRefInfo AAResults::getModRefInfo(Instruction *I, ImmutableCallSite Call) { |
Daniel Berlin | 8de312d | 2015-04-13 23:25:41 +0000 | [diff] [blame] | 109 | // We may have two calls |
| 110 | if (auto CS = ImmutableCallSite(I)) { |
| 111 | // Check if the two calls modify the same memory |
| 112 | return getModRefInfo(Call, CS); |
| 113 | } else { |
| 114 | // Otherwise, check if the call modifies or references the |
| 115 | // location this memory access defines. The best we can say |
| 116 | // is that if the call references what this instruction |
| 117 | // defines, it must be clobbered by this location. |
Chandler Carruth | ac80dc7 | 2015-06-17 07:18:54 +0000 | [diff] [blame] | 118 | const MemoryLocation DefLoc = MemoryLocation::get(I); |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 119 | if (getModRefInfo(Call, DefLoc) != MRI_NoModRef) |
| 120 | return MRI_ModRef; |
Daniel Berlin | 8de312d | 2015-04-13 23:25:41 +0000 | [diff] [blame] | 121 | } |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 122 | return MRI_NoModRef; |
Daniel Berlin | 8de312d | 2015-04-13 23:25:41 +0000 | [diff] [blame] | 123 | } |
Owen Anderson | b6e4ff0 | 2011-01-03 21:38:41 +0000 | [diff] [blame] | 124 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 125 | ModRefInfo AAResults::getModRefInfo(ImmutableCallSite CS, |
| 126 | const MemoryLocation &Loc) { |
| 127 | ModRefInfo Result = MRI_ModRef; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 128 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 129 | for (const auto &AA : AAs) { |
| 130 | Result = ModRefInfo(Result & AA->getModRefInfo(CS, Loc)); |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 131 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 132 | // Early-exit the moment we reach the bottom of the lattice. |
| 133 | if (Result == MRI_NoModRef) |
| 134 | return Result; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 135 | } |
| 136 | |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 137 | // Try to refine the mod-ref info further using other API entry points to the |
| 138 | // aggregate set of AA results. |
| 139 | auto MRB = getModRefBehavior(CS); |
| 140 | if (MRB == FMRB_DoesNotAccessMemory) |
| 141 | return MRI_NoModRef; |
| 142 | |
| 143 | if (onlyReadsMemory(MRB)) |
| 144 | Result = ModRefInfo(Result & MRI_Ref); |
| 145 | |
| 146 | if (onlyAccessesArgPointees(MRB)) { |
| 147 | bool DoesAlias = false; |
| 148 | ModRefInfo AllArgsMask = MRI_NoModRef; |
| 149 | if (doesAccessArgPointees(MRB)) { |
| 150 | for (auto AI = CS.arg_begin(), AE = CS.arg_end(); AI != AE; ++AI) { |
| 151 | const Value *Arg = *AI; |
| 152 | if (!Arg->getType()->isPointerTy()) |
| 153 | continue; |
| 154 | unsigned ArgIdx = std::distance(CS.arg_begin(), AI); |
| 155 | MemoryLocation ArgLoc = MemoryLocation::getForArgument(CS, ArgIdx, TLI); |
| 156 | AliasResult ArgAlias = alias(ArgLoc, Loc); |
| 157 | if (ArgAlias != NoAlias) { |
| 158 | ModRefInfo ArgMask = getArgModRefInfo(CS, ArgIdx); |
| 159 | DoesAlias = true; |
| 160 | AllArgsMask = ModRefInfo(AllArgsMask | ArgMask); |
| 161 | } |
| 162 | } |
| 163 | } |
| 164 | if (!DoesAlias) |
| 165 | return MRI_NoModRef; |
| 166 | Result = ModRefInfo(Result & AllArgsMask); |
| 167 | } |
| 168 | |
| 169 | // If Loc is a constant memory location, the call definitely could not |
| 170 | // modify the memory location. |
| 171 | if ((Result & MRI_Mod) && |
| 172 | pointsToConstantMemory(Loc, /*OrLocal*/ false)) |
| 173 | Result = ModRefInfo(Result & ~MRI_Mod); |
| 174 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 175 | return Result; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 176 | } |
| 177 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 178 | ModRefInfo AAResults::getModRefInfo(ImmutableCallSite CS1, |
| 179 | ImmutableCallSite CS2) { |
| 180 | ModRefInfo Result = MRI_ModRef; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 181 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 182 | for (const auto &AA : AAs) { |
| 183 | Result = ModRefInfo(Result & AA->getModRefInfo(CS1, CS2)); |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 184 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 185 | // Early-exit the moment we reach the bottom of the lattice. |
| 186 | if (Result == MRI_NoModRef) |
| 187 | return Result; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 188 | } |
| 189 | |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 190 | // Try to refine the mod-ref info further using other API entry points to the |
| 191 | // aggregate set of AA results. |
| 192 | |
| 193 | // If CS1 or CS2 are readnone, they don't interact. |
| 194 | auto CS1B = getModRefBehavior(CS1); |
| 195 | if (CS1B == FMRB_DoesNotAccessMemory) |
| 196 | return MRI_NoModRef; |
| 197 | |
| 198 | auto CS2B = getModRefBehavior(CS2); |
| 199 | if (CS2B == FMRB_DoesNotAccessMemory) |
| 200 | return MRI_NoModRef; |
| 201 | |
| 202 | // If they both only read from memory, there is no dependence. |
| 203 | if (onlyReadsMemory(CS1B) && onlyReadsMemory(CS2B)) |
| 204 | return MRI_NoModRef; |
| 205 | |
| 206 | // If CS1 only reads memory, the only dependence on CS2 can be |
| 207 | // from CS1 reading memory written by CS2. |
| 208 | if (onlyReadsMemory(CS1B)) |
| 209 | Result = ModRefInfo(Result & MRI_Ref); |
| 210 | |
| 211 | // If CS2 only access memory through arguments, accumulate the mod/ref |
| 212 | // information from CS1's references to the memory referenced by |
| 213 | // CS2's arguments. |
| 214 | if (onlyAccessesArgPointees(CS2B)) { |
| 215 | ModRefInfo R = MRI_NoModRef; |
| 216 | if (doesAccessArgPointees(CS2B)) { |
| 217 | for (auto I = CS2.arg_begin(), E = CS2.arg_end(); I != E; ++I) { |
| 218 | const Value *Arg = *I; |
| 219 | if (!Arg->getType()->isPointerTy()) |
| 220 | continue; |
| 221 | unsigned CS2ArgIdx = std::distance(CS2.arg_begin(), I); |
| 222 | auto CS2ArgLoc = MemoryLocation::getForArgument(CS2, CS2ArgIdx, TLI); |
| 223 | |
| 224 | // ArgMask indicates what CS2 might do to CS2ArgLoc, and the dependence |
| 225 | // of CS1 on that location is the inverse. |
| 226 | ModRefInfo ArgMask = getArgModRefInfo(CS2, CS2ArgIdx); |
| 227 | if (ArgMask == MRI_Mod) |
| 228 | ArgMask = MRI_ModRef; |
| 229 | else if (ArgMask == MRI_Ref) |
| 230 | ArgMask = MRI_Mod; |
| 231 | |
| 232 | ArgMask = ModRefInfo(ArgMask & getModRefInfo(CS1, CS2ArgLoc)); |
| 233 | |
| 234 | R = ModRefInfo((R | ArgMask) & Result); |
| 235 | if (R == Result) |
| 236 | break; |
| 237 | } |
| 238 | } |
| 239 | return R; |
| 240 | } |
| 241 | |
| 242 | // If CS1 only accesses memory through arguments, check if CS2 references |
| 243 | // any of the memory referenced by CS1's arguments. If not, return NoModRef. |
| 244 | if (onlyAccessesArgPointees(CS1B)) { |
| 245 | ModRefInfo R = MRI_NoModRef; |
| 246 | if (doesAccessArgPointees(CS1B)) { |
| 247 | for (auto I = CS1.arg_begin(), E = CS1.arg_end(); I != E; ++I) { |
| 248 | const Value *Arg = *I; |
| 249 | if (!Arg->getType()->isPointerTy()) |
| 250 | continue; |
| 251 | unsigned CS1ArgIdx = std::distance(CS1.arg_begin(), I); |
| 252 | auto CS1ArgLoc = MemoryLocation::getForArgument(CS1, CS1ArgIdx, TLI); |
| 253 | |
| 254 | // ArgMask indicates what CS1 might do to CS1ArgLoc; if CS1 might Mod |
| 255 | // CS1ArgLoc, then we care about either a Mod or a Ref by CS2. If CS1 |
| 256 | // might Ref, then we care only about a Mod by CS2. |
| 257 | ModRefInfo ArgMask = getArgModRefInfo(CS1, CS1ArgIdx); |
| 258 | ModRefInfo ArgR = getModRefInfo(CS2, CS1ArgLoc); |
| 259 | if (((ArgMask & MRI_Mod) != MRI_NoModRef && |
| 260 | (ArgR & MRI_ModRef) != MRI_NoModRef) || |
| 261 | ((ArgMask & MRI_Ref) != MRI_NoModRef && |
| 262 | (ArgR & MRI_Mod) != MRI_NoModRef)) |
| 263 | R = ModRefInfo((R | ArgMask) & Result); |
| 264 | |
| 265 | if (R == Result) |
| 266 | break; |
| 267 | } |
| 268 | } |
| 269 | return R; |
| 270 | } |
| 271 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 272 | return Result; |
| 273 | } |
Chandler Carruth | c41404a | 2015-06-17 07:12:40 +0000 | [diff] [blame] | 274 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 275 | FunctionModRefBehavior AAResults::getModRefBehavior(ImmutableCallSite CS) { |
| 276 | FunctionModRefBehavior Result = FMRB_UnknownModRefBehavior; |
Hal Finkel | 354e23b | 2014-07-17 01:28:25 +0000 | [diff] [blame] | 277 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 278 | for (const auto &AA : AAs) { |
| 279 | Result = FunctionModRefBehavior(Result & AA->getModRefBehavior(CS)); |
| 280 | |
| 281 | // Early-exit the moment we reach the bottom of the lattice. |
| 282 | if (Result == FMRB_DoesNotAccessMemory) |
| 283 | return Result; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 284 | } |
| 285 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 286 | return Result; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 287 | } |
| 288 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 289 | FunctionModRefBehavior AAResults::getModRefBehavior(const Function *F) { |
| 290 | FunctionModRefBehavior Result = FMRB_UnknownModRefBehavior; |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 291 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 292 | for (const auto &AA : AAs) { |
| 293 | Result = FunctionModRefBehavior(Result & AA->getModRefBehavior(F)); |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 294 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 295 | // Early-exit the moment we reach the bottom of the lattice. |
| 296 | if (Result == FMRB_DoesNotAccessMemory) |
| 297 | return Result; |
| 298 | } |
Dan Gohman | 5f1702e | 2010-08-06 01:25:49 +0000 | [diff] [blame] | 299 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 300 | return Result; |
Chris Lattner | 62c3700 | 2004-05-23 21:15:48 +0000 | [diff] [blame] | 301 | } |
| 302 | |
Chris Lattner | 62c3700 | 2004-05-23 21:15:48 +0000 | [diff] [blame] | 303 | //===----------------------------------------------------------------------===// |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 304 | // Helper method implementation |
Chris Lattner | 62c3700 | 2004-05-23 21:15:48 +0000 | [diff] [blame] | 305 | //===----------------------------------------------------------------------===// |
| 306 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 307 | ModRefInfo AAResults::getModRefInfo(const LoadInst *L, |
| 308 | const MemoryLocation &Loc) { |
Eli Friedman | 5494ada | 2011-08-15 20:54:19 +0000 | [diff] [blame] | 309 | // Be conservative in the face of volatile/atomic. |
| 310 | if (!L->isUnordered()) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 311 | return MRI_ModRef; |
Dan Gohman | 6b4671b | 2010-08-06 18:11:28 +0000 | [diff] [blame] | 312 | |
Dan Gohman | 52f9d7d | 2010-08-03 17:27:43 +0000 | [diff] [blame] | 313 | // If the load address doesn't alias the given address, it doesn't read |
| 314 | // or write the specified memory. |
Chandler Carruth | 70c61c1 | 2015-06-04 02:03:15 +0000 | [diff] [blame] | 315 | if (Loc.Ptr && !alias(MemoryLocation::get(L), Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 316 | return MRI_NoModRef; |
Dan Gohman | 52f9d7d | 2010-08-03 17:27:43 +0000 | [diff] [blame] | 317 | |
Dan Gohman | 52f9d7d | 2010-08-03 17:27:43 +0000 | [diff] [blame] | 318 | // Otherwise, a load just reads. |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 319 | return MRI_Ref; |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 320 | } |
| 321 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 322 | ModRefInfo AAResults::getModRefInfo(const StoreInst *S, |
| 323 | const MemoryLocation &Loc) { |
Eli Friedman | 5494ada | 2011-08-15 20:54:19 +0000 | [diff] [blame] | 324 | // Be conservative in the face of volatile/atomic. |
| 325 | if (!S->isUnordered()) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 326 | return MRI_ModRef; |
Dan Gohman | 6b4671b | 2010-08-06 18:11:28 +0000 | [diff] [blame] | 327 | |
Daniel Berlin | b2d2276 | 2015-04-13 23:05:45 +0000 | [diff] [blame] | 328 | if (Loc.Ptr) { |
| 329 | // If the store address cannot alias the pointer in question, then the |
| 330 | // specified memory cannot be modified by the store. |
Chandler Carruth | 70c61c1 | 2015-06-04 02:03:15 +0000 | [diff] [blame] | 331 | if (!alias(MemoryLocation::get(S), Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 332 | return MRI_NoModRef; |
Chris Lattner | 9605576 | 2004-01-30 22:16:42 +0000 | [diff] [blame] | 333 | |
Daniel Berlin | b2d2276 | 2015-04-13 23:05:45 +0000 | [diff] [blame] | 334 | // If the pointer is a pointer to constant memory, then it could not have |
| 335 | // been modified by this store. |
| 336 | if (pointsToConstantMemory(Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 337 | return MRI_NoModRef; |
Daniel Berlin | b2d2276 | 2015-04-13 23:05:45 +0000 | [diff] [blame] | 338 | } |
Dan Gohman | 52f9d7d | 2010-08-03 17:27:43 +0000 | [diff] [blame] | 339 | |
| 340 | // Otherwise, a store just writes. |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 341 | return MRI_Mod; |
Chris Lattner | 3a31183 | 2003-02-26 19:26:51 +0000 | [diff] [blame] | 342 | } |
| 343 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 344 | ModRefInfo AAResults::getModRefInfo(const VAArgInst *V, |
| 345 | const MemoryLocation &Loc) { |
Dan Gohman | e68958f | 2010-08-06 18:24:38 +0000 | [diff] [blame] | 346 | |
Daniel Berlin | ec1de3f | 2015-04-28 19:19:14 +0000 | [diff] [blame] | 347 | if (Loc.Ptr) { |
| 348 | // If the va_arg address cannot alias the pointer in question, then the |
| 349 | // specified memory cannot be accessed by the va_arg. |
Chandler Carruth | 70c61c1 | 2015-06-04 02:03:15 +0000 | [diff] [blame] | 350 | if (!alias(MemoryLocation::get(V), Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 351 | return MRI_NoModRef; |
Daniel Berlin | ec1de3f | 2015-04-28 19:19:14 +0000 | [diff] [blame] | 352 | |
| 353 | // If the pointer is a pointer to constant memory, then it could not have |
| 354 | // been modified by this va_arg. |
| 355 | if (pointsToConstantMemory(Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 356 | return MRI_NoModRef; |
Daniel Berlin | ec1de3f | 2015-04-28 19:19:14 +0000 | [diff] [blame] | 357 | } |
Dan Gohman | e68958f | 2010-08-06 18:24:38 +0000 | [diff] [blame] | 358 | |
| 359 | // Otherwise, a va_arg reads and writes. |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 360 | return MRI_ModRef; |
Dan Gohman | e68958f | 2010-08-06 18:24:38 +0000 | [diff] [blame] | 361 | } |
| 362 | |
David Majnemer | 6727c01 | 2015-11-17 08:15:14 +0000 | [diff] [blame] | 363 | ModRefInfo AAResults::getModRefInfo(const CatchPadInst *CatchPad, |
| 364 | const MemoryLocation &Loc) { |
| 365 | if (Loc.Ptr) { |
| 366 | // If the pointer is a pointer to constant memory, |
| 367 | // then it could not have been modified by this catchpad. |
| 368 | if (pointsToConstantMemory(Loc)) |
| 369 | return MRI_NoModRef; |
| 370 | } |
| 371 | |
| 372 | // Otherwise, a catchpad reads and writes. |
| 373 | return MRI_ModRef; |
| 374 | } |
| 375 | |
| 376 | ModRefInfo AAResults::getModRefInfo(const CatchReturnInst *CatchRet, |
| 377 | const MemoryLocation &Loc) { |
| 378 | if (Loc.Ptr) { |
| 379 | // If the pointer is a pointer to constant memory, |
| 380 | // then it could not have been modified by this catchpad. |
| 381 | if (pointsToConstantMemory(Loc)) |
| 382 | return MRI_NoModRef; |
| 383 | } |
| 384 | |
| 385 | // Otherwise, a catchret reads and writes. |
| 386 | return MRI_ModRef; |
| 387 | } |
| 388 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 389 | ModRefInfo AAResults::getModRefInfo(const AtomicCmpXchgInst *CX, |
| 390 | const MemoryLocation &Loc) { |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 391 | // Acquire/Release cmpxchg has properties that matter for arbitrary addresses. |
JF Bastien | 800f87a | 2016-04-06 21:19:33 +0000 | [diff] [blame] | 392 | if (isStrongerThanMonotonic(CX->getSuccessOrdering())) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 393 | return MRI_ModRef; |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 394 | |
| 395 | // If the cmpxchg address does not alias the location, it does not access it. |
Chandler Carruth | 70c61c1 | 2015-06-04 02:03:15 +0000 | [diff] [blame] | 396 | if (Loc.Ptr && !alias(MemoryLocation::get(CX), Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 397 | return MRI_NoModRef; |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 398 | |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 399 | return MRI_ModRef; |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 400 | } |
| 401 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 402 | ModRefInfo AAResults::getModRefInfo(const AtomicRMWInst *RMW, |
| 403 | const MemoryLocation &Loc) { |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 404 | // Acquire/Release atomicrmw has properties that matter for arbitrary addresses. |
JF Bastien | 800f87a | 2016-04-06 21:19:33 +0000 | [diff] [blame] | 405 | if (isStrongerThanMonotonic(RMW->getOrdering())) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 406 | return MRI_ModRef; |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 407 | |
| 408 | // If the atomicrmw address does not alias the location, it does not access it. |
Chandler Carruth | 70c61c1 | 2015-06-04 02:03:15 +0000 | [diff] [blame] | 409 | if (Loc.Ptr && !alias(MemoryLocation::get(RMW), Loc)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 410 | return MRI_NoModRef; |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 411 | |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 412 | return MRI_ModRef; |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 413 | } |
| 414 | |
Bruno Cardoso Lopes | dfc1d96 | 2015-07-31 14:31:35 +0000 | [diff] [blame] | 415 | /// \brief Return information about whether a particular call site modifies |
| 416 | /// or reads the specified memory location \p MemLoc before instruction \p I |
| 417 | /// in a BasicBlock. A ordered basic block \p OBB can be used to speed up |
| 418 | /// instruction-ordering queries inside the BasicBlock containing \p I. |
| 419 | /// FIXME: this is really just shoring-up a deficiency in alias analysis. |
| 420 | /// BasicAA isn't willing to spend linear time determining whether an alloca |
| 421 | /// was captured before or after this particular call, while we are. However, |
| 422 | /// with a smarter AA in place, this test is just wasting compile time. |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 423 | ModRefInfo AAResults::callCapturesBefore(const Instruction *I, |
| 424 | const MemoryLocation &MemLoc, |
| 425 | DominatorTree *DT, |
| 426 | OrderedBasicBlock *OBB) { |
Mehdi Amini | a28d91d | 2015-03-10 02:37:25 +0000 | [diff] [blame] | 427 | if (!DT) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 428 | return MRI_ModRef; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 429 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 430 | const Value *Object = |
| 431 | GetUnderlyingObject(MemLoc.Ptr, I->getModule()->getDataLayout()); |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 432 | if (!isIdentifiedObject(Object) || isa<GlobalValue>(Object) || |
| 433 | isa<Constant>(Object)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 434 | return MRI_ModRef; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 435 | |
| 436 | ImmutableCallSite CS(I); |
| 437 | if (!CS.getInstruction() || CS.getInstruction() == Object) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 438 | return MRI_ModRef; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 439 | |
Hal Finkel | b035621 | 2014-07-21 13:15:48 +0000 | [diff] [blame] | 440 | if (llvm::PointerMayBeCapturedBefore(Object, /* ReturnCaptures */ true, |
Hal Finkel | d32803b | 2014-07-21 21:30:22 +0000 | [diff] [blame] | 441 | /* StoreCaptures */ true, I, DT, |
Bruno Cardoso Lopes | dfc1d96 | 2015-07-31 14:31:35 +0000 | [diff] [blame] | 442 | /* include Object */ true, |
| 443 | /* OrderedBasicBlock */ OBB)) |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 444 | return MRI_ModRef; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 445 | |
| 446 | unsigned ArgNo = 0; |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 447 | ModRefInfo R = MRI_NoModRef; |
Sanjoy Das | d0bdf3e | 2016-06-13 19:55:04 +0000 | [diff] [blame^] | 448 | for (auto CI = CS.data_operands_begin(), CE = CS.data_operands_end(); |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 449 | CI != CE; ++CI, ++ArgNo) { |
| 450 | // Only look at the no-capture or byval pointer arguments. If this |
| 451 | // pointer were passed to arguments that were neither of these, then it |
| 452 | // couldn't be no-capture. |
| 453 | if (!(*CI)->getType()->isPointerTy() || |
| 454 | (!CS.doesNotCapture(ArgNo) && !CS.isByValArgument(ArgNo))) |
| 455 | continue; |
| 456 | |
| 457 | // If this is a no-capture pointer argument, see if we can tell that it |
| 458 | // is impossible to alias the pointer we're checking. If not, we have to |
| 459 | // assume that the call could touch the pointer, even though it doesn't |
| 460 | // escape. |
Chandler Carruth | ac80dc7 | 2015-06-17 07:18:54 +0000 | [diff] [blame] | 461 | if (isNoAlias(MemoryLocation(*CI), MemoryLocation(Object))) |
Nick Lewycky | c051462 | 2013-07-07 10:15:16 +0000 | [diff] [blame] | 462 | continue; |
| 463 | if (CS.doesNotAccessMemory(ArgNo)) |
| 464 | continue; |
| 465 | if (CS.onlyReadsMemory(ArgNo)) { |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 466 | R = MRI_Ref; |
Nick Lewycky | c051462 | 2013-07-07 10:15:16 +0000 | [diff] [blame] | 467 | continue; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 468 | } |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 469 | return MRI_ModRef; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 470 | } |
Nick Lewycky | c051462 | 2013-07-07 10:15:16 +0000 | [diff] [blame] | 471 | return R; |
Chad Rosier | a968caf | 2012-05-14 20:35:04 +0000 | [diff] [blame] | 472 | } |
Eli Friedman | 5c91891 | 2011-09-26 20:15:28 +0000 | [diff] [blame] | 473 | |
Chris Lattner | d922a84 | 2002-08-22 22:46:39 +0000 | [diff] [blame] | 474 | /// canBasicBlockModify - Return true if it is possible for execution of the |
Elena Demikhovsky | a5599bf | 2014-12-15 14:09:53 +0000 | [diff] [blame] | 475 | /// specified basic block to modify the location Loc. |
Chris Lattner | d922a84 | 2002-08-22 22:46:39 +0000 | [diff] [blame] | 476 | /// |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 477 | bool AAResults::canBasicBlockModify(const BasicBlock &BB, |
| 478 | const MemoryLocation &Loc) { |
Chandler Carruth | 194f59c | 2015-07-22 23:15:57 +0000 | [diff] [blame] | 479 | return canInstructionRangeModRef(BB.front(), BB.back(), Loc, MRI_Mod); |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 480 | } |
| 481 | |
Elena Demikhovsky | a5599bf | 2014-12-15 14:09:53 +0000 | [diff] [blame] | 482 | /// canInstructionRangeModRef - Return true if it is possible for the |
| 483 | /// execution of the specified instructions to mod\ref (according to the |
| 484 | /// mode) the location Loc. The instructions to consider are all |
| 485 | /// of the instructions in the range of [I1,I2] INCLUSIVE. |
Teresa Johnson | bbcf75e | 2015-05-13 15:04:14 +0000 | [diff] [blame] | 486 | /// I1 and I2 must be in the same basic block. |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 487 | bool AAResults::canInstructionRangeModRef(const Instruction &I1, |
| 488 | const Instruction &I2, |
| 489 | const MemoryLocation &Loc, |
| 490 | const ModRefInfo Mode) { |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 491 | assert(I1.getParent() == I2.getParent() && |
| 492 | "Instructions not in same basic block!"); |
Duncan P. N. Exon Smith | 5a82c91 | 2015-10-10 00:53:03 +0000 | [diff] [blame] | 493 | BasicBlock::const_iterator I = I1.getIterator(); |
| 494 | BasicBlock::const_iterator E = I2.getIterator(); |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 495 | ++E; // Convert from inclusive to exclusive range. |
| 496 | |
Chris Lattner | 3a31183 | 2003-02-26 19:26:51 +0000 | [diff] [blame] | 497 | for (; I != E; ++I) // Check every instruction in range |
Duncan P. N. Exon Smith | 5a82c91 | 2015-10-10 00:53:03 +0000 | [diff] [blame] | 498 | if (getModRefInfo(&*I, Loc) & Mode) |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 499 | return true; |
Chris Lattner | 7d58f8d | 2002-08-22 18:25:32 +0000 | [diff] [blame] | 500 | return false; |
| 501 | } |
| 502 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 503 | // Provide a definition for the root virtual destructor. |
| 504 | AAResults::Concept::~Concept() {} |
| 505 | |
NAKAMURA Takumi | df0cd72 | 2016-02-28 17:17:00 +0000 | [diff] [blame] | 506 | // Provide a definition for the static object used to identify passes. |
Chandler Carruth | b4faf13 | 2016-03-11 10:22:49 +0000 | [diff] [blame] | 507 | char AAManager::PassID; |
NAKAMURA Takumi | df0cd72 | 2016-02-28 17:17:00 +0000 | [diff] [blame] | 508 | |
Chandler Carruth | 2be1075 | 2015-10-21 12:15:19 +0000 | [diff] [blame] | 509 | namespace { |
| 510 | /// A wrapper pass for external alias analyses. This just squirrels away the |
| 511 | /// callback used to run any analyses and register their results. |
| 512 | struct ExternalAAWrapperPass : ImmutablePass { |
| 513 | typedef std::function<void(Pass &, Function &, AAResults &)> CallbackT; |
| 514 | |
| 515 | CallbackT CB; |
| 516 | |
| 517 | static char ID; |
| 518 | |
| 519 | ExternalAAWrapperPass() : ImmutablePass(ID) { |
| 520 | initializeExternalAAWrapperPassPass(*PassRegistry::getPassRegistry()); |
| 521 | } |
| 522 | explicit ExternalAAWrapperPass(CallbackT CB) |
| 523 | : ImmutablePass(ID), CB(std::move(CB)) { |
| 524 | initializeExternalAAWrapperPassPass(*PassRegistry::getPassRegistry()); |
| 525 | } |
| 526 | |
| 527 | void getAnalysisUsage(AnalysisUsage &AU) const override { |
| 528 | AU.setPreservesAll(); |
| 529 | } |
| 530 | }; |
| 531 | } |
| 532 | |
| 533 | char ExternalAAWrapperPass::ID = 0; |
| 534 | INITIALIZE_PASS(ExternalAAWrapperPass, "external-aa", "External Alias Analysis", |
| 535 | false, true) |
| 536 | |
| 537 | ImmutablePass * |
| 538 | llvm::createExternalAAWrapperPass(ExternalAAWrapperPass::CallbackT Callback) { |
| 539 | return new ExternalAAWrapperPass(std::move(Callback)); |
| 540 | } |
| 541 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 542 | AAResultsWrapperPass::AAResultsWrapperPass() : FunctionPass(ID) { |
| 543 | initializeAAResultsWrapperPassPass(*PassRegistry::getPassRegistry()); |
| 544 | } |
| 545 | |
| 546 | char AAResultsWrapperPass::ID = 0; |
| 547 | |
| 548 | INITIALIZE_PASS_BEGIN(AAResultsWrapperPass, "aa", |
| 549 | "Function Alias Analysis Results", false, true) |
| 550 | INITIALIZE_PASS_DEPENDENCY(BasicAAWrapperPass) |
| 551 | INITIALIZE_PASS_DEPENDENCY(CFLAAWrapperPass) |
Chandler Carruth | 2be1075 | 2015-10-21 12:15:19 +0000 | [diff] [blame] | 552 | INITIALIZE_PASS_DEPENDENCY(ExternalAAWrapperPass) |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 553 | INITIALIZE_PASS_DEPENDENCY(GlobalsAAWrapperPass) |
| 554 | INITIALIZE_PASS_DEPENDENCY(ObjCARCAAWrapperPass) |
| 555 | INITIALIZE_PASS_DEPENDENCY(SCEVAAWrapperPass) |
| 556 | INITIALIZE_PASS_DEPENDENCY(ScopedNoAliasAAWrapperPass) |
| 557 | INITIALIZE_PASS_DEPENDENCY(TypeBasedAAWrapperPass) |
| 558 | INITIALIZE_PASS_END(AAResultsWrapperPass, "aa", |
| 559 | "Function Alias Analysis Results", false, true) |
| 560 | |
| 561 | FunctionPass *llvm::createAAResultsWrapperPass() { |
| 562 | return new AAResultsWrapperPass(); |
| 563 | } |
| 564 | |
| 565 | /// Run the wrapper pass to rebuild an aggregation over known AA passes. |
| 566 | /// |
| 567 | /// This is the legacy pass manager's interface to the new-style AA results |
| 568 | /// aggregation object. Because this is somewhat shoe-horned into the legacy |
| 569 | /// pass manager, we hard code all the specific alias analyses available into |
| 570 | /// it. While the particular set enabled is configured via commandline flags, |
| 571 | /// adding a new alias analysis to LLVM will require adding support for it to |
| 572 | /// this list. |
| 573 | bool AAResultsWrapperPass::runOnFunction(Function &F) { |
| 574 | // NB! This *must* be reset before adding new AA results to the new |
| 575 | // AAResults object because in the legacy pass manager, each instance |
| 576 | // of these will refer to the *same* immutable analyses, registering and |
| 577 | // unregistering themselves with them. We need to carefully tear down the |
| 578 | // previous object first, in this case replacing it with an empty one, before |
| 579 | // registering new results. |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 580 | AAR.reset( |
| 581 | new AAResults(getAnalysis<TargetLibraryInfoWrapperPass>().getTLI())); |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 582 | |
| 583 | // BasicAA is always available for function analyses. Also, we add it first |
| 584 | // so that it can trump TBAA results when it proves MustAlias. |
| 585 | // FIXME: TBAA should have an explicit mode to support this and then we |
| 586 | // should reconsider the ordering here. |
| 587 | if (!DisableBasicAA) |
| 588 | AAR->addAAResult(getAnalysis<BasicAAWrapperPass>().getResult()); |
| 589 | |
| 590 | // Populate the results with the currently available AAs. |
| 591 | if (auto *WrapperPass = getAnalysisIfAvailable<ScopedNoAliasAAWrapperPass>()) |
| 592 | AAR->addAAResult(WrapperPass->getResult()); |
| 593 | if (auto *WrapperPass = getAnalysisIfAvailable<TypeBasedAAWrapperPass>()) |
| 594 | AAR->addAAResult(WrapperPass->getResult()); |
| 595 | if (auto *WrapperPass = |
| 596 | getAnalysisIfAvailable<objcarc::ObjCARCAAWrapperPass>()) |
| 597 | AAR->addAAResult(WrapperPass->getResult()); |
| 598 | if (auto *WrapperPass = getAnalysisIfAvailable<GlobalsAAWrapperPass>()) |
| 599 | AAR->addAAResult(WrapperPass->getResult()); |
| 600 | if (auto *WrapperPass = getAnalysisIfAvailable<SCEVAAWrapperPass>()) |
| 601 | AAR->addAAResult(WrapperPass->getResult()); |
| 602 | if (auto *WrapperPass = getAnalysisIfAvailable<CFLAAWrapperPass>()) |
| 603 | AAR->addAAResult(WrapperPass->getResult()); |
| 604 | |
Chandler Carruth | 2be1075 | 2015-10-21 12:15:19 +0000 | [diff] [blame] | 605 | // If available, run an external AA providing callback over the results as |
| 606 | // well. |
| 607 | if (auto *WrapperPass = getAnalysisIfAvailable<ExternalAAWrapperPass>()) |
| 608 | if (WrapperPass->CB) |
| 609 | WrapperPass->CB(*this, F, *AAR); |
| 610 | |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 611 | // Analyses don't mutate the IR, so return false. |
| 612 | return false; |
| 613 | } |
| 614 | |
| 615 | void AAResultsWrapperPass::getAnalysisUsage(AnalysisUsage &AU) const { |
| 616 | AU.setPreservesAll(); |
| 617 | AU.addRequired<BasicAAWrapperPass>(); |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 618 | AU.addRequired<TargetLibraryInfoWrapperPass>(); |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 619 | |
| 620 | // We also need to mark all the alias analysis passes we will potentially |
| 621 | // probe in runOnFunction as used here to ensure the legacy pass manager |
| 622 | // preserves them. This hard coding of lists of alias analyses is specific to |
| 623 | // the legacy pass manager. |
| 624 | AU.addUsedIfAvailable<ScopedNoAliasAAWrapperPass>(); |
| 625 | AU.addUsedIfAvailable<TypeBasedAAWrapperPass>(); |
| 626 | AU.addUsedIfAvailable<objcarc::ObjCARCAAWrapperPass>(); |
| 627 | AU.addUsedIfAvailable<GlobalsAAWrapperPass>(); |
| 628 | AU.addUsedIfAvailable<SCEVAAWrapperPass>(); |
| 629 | AU.addUsedIfAvailable<CFLAAWrapperPass>(); |
| 630 | } |
| 631 | |
| 632 | AAResults llvm::createLegacyPMAAResults(Pass &P, Function &F, |
| 633 | BasicAAResult &BAR) { |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 634 | AAResults AAR(P.getAnalysis<TargetLibraryInfoWrapperPass>().getTLI()); |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 635 | |
| 636 | // Add in our explicitly constructed BasicAA results. |
| 637 | if (!DisableBasicAA) |
| 638 | AAR.addAAResult(BAR); |
| 639 | |
| 640 | // Populate the results with the other currently available AAs. |
| 641 | if (auto *WrapperPass = |
| 642 | P.getAnalysisIfAvailable<ScopedNoAliasAAWrapperPass>()) |
| 643 | AAR.addAAResult(WrapperPass->getResult()); |
| 644 | if (auto *WrapperPass = P.getAnalysisIfAvailable<TypeBasedAAWrapperPass>()) |
| 645 | AAR.addAAResult(WrapperPass->getResult()); |
| 646 | if (auto *WrapperPass = |
| 647 | P.getAnalysisIfAvailable<objcarc::ObjCARCAAWrapperPass>()) |
| 648 | AAR.addAAResult(WrapperPass->getResult()); |
| 649 | if (auto *WrapperPass = P.getAnalysisIfAvailable<GlobalsAAWrapperPass>()) |
| 650 | AAR.addAAResult(WrapperPass->getResult()); |
Chandler Carruth | 7b560d4 | 2015-09-09 17:55:00 +0000 | [diff] [blame] | 651 | if (auto *WrapperPass = P.getAnalysisIfAvailable<CFLAAWrapperPass>()) |
| 652 | AAR.addAAResult(WrapperPass->getResult()); |
| 653 | |
| 654 | return AAR; |
| 655 | } |
| 656 | |
Dan Gohman | fb306c0 | 2009-02-03 01:28:32 +0000 | [diff] [blame] | 657 | bool llvm::isNoAliasCall(const Value *V) { |
Benjamin Kramer | 45f3954 | 2015-08-05 14:16:44 +0000 | [diff] [blame] | 658 | if (auto CS = ImmutableCallSite(V)) |
| 659 | return CS.paramHasAttr(0, Attribute::NoAlias); |
Dan Gohman | fb306c0 | 2009-02-03 01:28:32 +0000 | [diff] [blame] | 660 | return false; |
| 661 | } |
| 662 | |
Sanjay Patel | d7f613d | 2016-01-13 22:17:13 +0000 | [diff] [blame] | 663 | bool llvm::isNoAliasArgument(const Value *V) { |
Michael Kuperstein | f3e663a | 2013-05-28 08:17:48 +0000 | [diff] [blame] | 664 | if (const Argument *A = dyn_cast<Argument>(V)) |
| 665 | return A->hasNoAliasAttr(); |
| 666 | return false; |
| 667 | } |
| 668 | |
Dan Gohman | 00ef932 | 2010-07-07 14:27:09 +0000 | [diff] [blame] | 669 | bool llvm::isIdentifiedObject(const Value *V) { |
Dan Gohman | 0824aff | 2010-06-29 00:50:39 +0000 | [diff] [blame] | 670 | if (isa<AllocaInst>(V)) |
Dan Gohman | 1f59f01 | 2009-08-27 17:52:56 +0000 | [diff] [blame] | 671 | return true; |
| 672 | if (isa<GlobalValue>(V) && !isa<GlobalAlias>(V)) |
Dan Gohman | fb306c0 | 2009-02-03 01:28:32 +0000 | [diff] [blame] | 673 | return true; |
Dan Gohman | 00ef932 | 2010-07-07 14:27:09 +0000 | [diff] [blame] | 674 | if (isNoAliasCall(V)) |
| 675 | return true; |
| 676 | if (const Argument *A = dyn_cast<Argument>(V)) |
| 677 | return A->hasNoAliasAttr() || A->hasByValAttr(); |
Dan Gohman | fb306c0 | 2009-02-03 01:28:32 +0000 | [diff] [blame] | 678 | return false; |
| 679 | } |
Hal Finkel | c782aa5 | 2014-07-21 12:27:23 +0000 | [diff] [blame] | 680 | |
Sanjay Patel | d7f613d | 2016-01-13 22:17:13 +0000 | [diff] [blame] | 681 | bool llvm::isIdentifiedFunctionLocal(const Value *V) { |
Hal Finkel | c782aa5 | 2014-07-21 12:27:23 +0000 | [diff] [blame] | 682 | return isa<AllocaInst>(V) || isNoAliasCall(V) || isNoAliasArgument(V); |
| 683 | } |
Sanjoy Das | 1c481f5 | 2016-02-09 01:21:57 +0000 | [diff] [blame] | 684 | |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 685 | void llvm::getAAResultsAnalysisUsage(AnalysisUsage &AU) { |
Sanjoy Das | 1c481f5 | 2016-02-09 01:21:57 +0000 | [diff] [blame] | 686 | // This function needs to be in sync with llvm::createLegacyPMAAResults -- if |
| 687 | // more alias analyses are added to llvm::createLegacyPMAAResults, they need |
| 688 | // to be added here also. |
Chandler Carruth | 12884f7 | 2016-03-02 15:56:53 +0000 | [diff] [blame] | 689 | AU.addRequired<TargetLibraryInfoWrapperPass>(); |
Sanjoy Das | 1c481f5 | 2016-02-09 01:21:57 +0000 | [diff] [blame] | 690 | AU.addUsedIfAvailable<ScopedNoAliasAAWrapperPass>(); |
| 691 | AU.addUsedIfAvailable<TypeBasedAAWrapperPass>(); |
| 692 | AU.addUsedIfAvailable<objcarc::ObjCARCAAWrapperPass>(); |
| 693 | AU.addUsedIfAvailable<GlobalsAAWrapperPass>(); |
| 694 | AU.addUsedIfAvailable<CFLAAWrapperPass>(); |
| 695 | } |