blob: 91c855021fd0a5955d4d0dda98dff11e08c5475b [file] [log] [blame]
Meador Inge6b6a1612013-03-21 00:55:59 +00001//===- FunctionAttrs.cpp - Pass which marks functions attributes ----------===//
Duncan Sands44c8cd92008-12-31 16:14:43 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
Eugene Zelenkof27d1612017-10-19 21:21:30 +00009//
Chandler Carruth1926b702016-01-08 10:55:52 +000010/// \file
11/// This file implements interprocedural passes which walk the
12/// call-graph deducing and/or propagating function attributes.
Eugene Zelenkof27d1612017-10-19 21:21:30 +000013//
Duncan Sands44c8cd92008-12-31 16:14:43 +000014//===----------------------------------------------------------------------===//
15
Chandler Carruth9c4ed172016-02-18 11:03:11 +000016#include "llvm/Transforms/IPO/FunctionAttrs.h"
Nick Lewycky4c378a42011-12-28 23:24:21 +000017#include "llvm/ADT/SCCIterator.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000018#include "llvm/ADT/STLExtras.h"
Benjamin Kramer15591272012-10-31 13:45:49 +000019#include "llvm/ADT/SetVector.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000020#include "llvm/ADT/SmallPtrSet.h"
Duncan Sandsb193a372009-01-02 11:54:37 +000021#include "llvm/ADT/SmallSet.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000022#include "llvm/ADT/SmallVector.h"
Duncan Sands44c8cd92008-12-31 16:14:43 +000023#include "llvm/ADT/Statistic.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000024#include "llvm/Analysis/AliasAnalysis.h"
Daniel Jasperaec2fa32016-12-19 08:22:17 +000025#include "llvm/Analysis/AssumptionCache.h"
Chandler Carruth7b560d42015-09-09 17:55:00 +000026#include "llvm/Analysis/BasicAliasAnalysis.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000027#include "llvm/Analysis/CGSCCPassManager.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000028#include "llvm/Analysis/CallGraph.h"
Chandler Carruth839a98e2013-01-07 15:26:48 +000029#include "llvm/Analysis/CallGraphSCCPass.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000030#include "llvm/Analysis/CaptureTracking.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000031#include "llvm/Analysis/LazyCallGraph.h"
32#include "llvm/Analysis/MemoryLocation.h"
Philip Reamesa88caea2015-08-31 19:44:38 +000033#include "llvm/Analysis/ValueTracking.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000034#include "llvm/IR/Argument.h"
35#include "llvm/IR/Attributes.h"
36#include "llvm/IR/BasicBlock.h"
37#include "llvm/IR/CallSite.h"
38#include "llvm/IR/Constant.h"
39#include "llvm/IR/Constants.h"
40#include "llvm/IR/Function.h"
Chandler Carruth83948572014-03-04 10:30:26 +000041#include "llvm/IR/InstIterator.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000042#include "llvm/IR/InstrTypes.h"
43#include "llvm/IR/Instruction.h"
44#include "llvm/IR/Instructions.h"
45#include "llvm/IR/Metadata.h"
46#include "llvm/IR/PassManager.h"
47#include "llvm/IR/Type.h"
48#include "llvm/IR/Use.h"
49#include "llvm/IR/User.h"
50#include "llvm/IR/Value.h"
51#include "llvm/Pass.h"
52#include "llvm/Support/Casting.h"
53#include "llvm/Support/CommandLine.h"
54#include "llvm/Support/Compiler.h"
Philip Reamesa88caea2015-08-31 19:44:38 +000055#include "llvm/Support/Debug.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000056#include "llvm/Support/ErrorHandling.h"
Hans Wennborg043bf5b2015-08-31 21:19:18 +000057#include "llvm/Support/raw_ostream.h"
Chandler Carruth6bda14b2017-06-06 11:49:48 +000058#include "llvm/Transforms/IPO.h"
Eugene Zelenkof27d1612017-10-19 21:21:30 +000059#include <cassert>
60#include <iterator>
61#include <map>
62#include <vector>
63
Duncan Sands44c8cd92008-12-31 16:14:43 +000064using namespace llvm;
65
Chandler Carruth964daaa2014-04-22 02:55:47 +000066#define DEBUG_TYPE "functionattrs"
67
Duncan Sands44c8cd92008-12-31 16:14:43 +000068STATISTIC(NumReadNone, "Number of functions marked readnone");
69STATISTIC(NumReadOnly, "Number of functions marked readonly");
70STATISTIC(NumNoCapture, "Number of arguments marked nocapture");
David Majnemer5246e0b2016-07-19 18:50:26 +000071STATISTIC(NumReturned, "Number of arguments marked returned");
Nick Lewyckyc2ec0722013-07-06 00:29:58 +000072STATISTIC(NumReadNoneArg, "Number of arguments marked readnone");
73STATISTIC(NumReadOnlyArg, "Number of arguments marked readonly");
Nick Lewyckyfbed86a2009-03-08 06:20:47 +000074STATISTIC(NumNoAlias, "Number of function returns marked noalias");
Philip Reamesa88caea2015-08-31 19:44:38 +000075STATISTIC(NumNonNullReturn, "Number of function returns marked nonnull");
James Molloy7e9bdd52015-11-12 10:55:20 +000076STATISTIC(NumNoRecurse, "Number of functions marked as norecurse");
Fedor Sergeev6660fd02018-03-23 21:46:16 +000077STATISTIC(NumNoUnwind, "Number of functions marked as nounwind");
Duncan Sands44c8cd92008-12-31 16:14:43 +000078
Sanjay Patel4f742162017-02-13 23:10:51 +000079// FIXME: This is disabled by default to avoid exposing security vulnerabilities
80// in C/C++ code compiled by clang:
81// http://lists.llvm.org/pipermail/cfe-dev/2017-January/052066.html
82static cl::opt<bool> EnableNonnullArgPropagation(
83 "enable-nonnull-arg-prop", cl::Hidden,
84 cl::desc("Try to propagate nonnull argument attributes from callsites to "
85 "caller functions."));
86
Fedor Sergeev6660fd02018-03-23 21:46:16 +000087static cl::opt<bool> DisableNoUnwindInference(
88 "disable-nounwind-inference", cl::Hidden,
89 cl::desc("Stop inferring nounwind attribute during function-attrs pass"));
90
Duncan Sands44c8cd92008-12-31 16:14:43 +000091namespace {
Eugene Zelenkof27d1612017-10-19 21:21:30 +000092
93using SCCNodeSet = SmallSetVector<Function *, 8>;
94
95} // end anonymous namespace
Chandler Carruthc518ebd2015-10-29 18:29:15 +000096
Peter Collingbournec45f7f32017-02-14 00:28:13 +000097/// Returns the memory access attribute for function F using AAR for AA results,
98/// where SCCNodes is the current SCC.
99///
100/// If ThisBody is true, this function may examine the function body and will
101/// return a result pertaining to this copy of the function. If it is false, the
102/// result will be based only on AA results for the function declaration; it
103/// will be assumed that some other (perhaps less optimized) version of the
104/// function may be selected at link time.
105static MemoryAccessKind checkFunctionMemoryAccess(Function &F, bool ThisBody,
106 AAResults &AAR,
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000107 const SCCNodeSet &SCCNodes) {
Chandler Carruth7542d372015-09-21 17:39:41 +0000108 FunctionModRefBehavior MRB = AAR.getModRefBehavior(&F);
109 if (MRB == FMRB_DoesNotAccessMemory)
110 // Already perfect!
111 return MAK_ReadNone;
112
Peter Collingbournec45f7f32017-02-14 00:28:13 +0000113 if (!ThisBody) {
Chandler Carruth7542d372015-09-21 17:39:41 +0000114 if (AliasAnalysis::onlyReadsMemory(MRB))
115 return MAK_ReadOnly;
116
117 // Conservatively assume it writes to memory.
118 return MAK_MayWrite;
119 }
120
121 // Scan the function body for instructions that may read or write memory.
122 bool ReadsMemory = false;
123 for (inst_iterator II = inst_begin(F), E = inst_end(F); II != E; ++II) {
124 Instruction *I = &*II;
125
126 // Some instructions can be ignored even if they read or write memory.
127 // Detect these now, skipping to the next instruction if one is found.
128 CallSite CS(cast<Value>(I));
129 if (CS) {
Sanjoy Das10c8a042016-02-09 18:40:40 +0000130 // Ignore calls to functions in the same SCC, as long as the call sites
131 // don't have operand bundles. Calls with operand bundles are allowed to
132 // have memory effects not described by the memory effects of the call
133 // target.
134 if (!CS.hasOperandBundles() && CS.getCalledFunction() &&
135 SCCNodes.count(CS.getCalledFunction()))
Chandler Carruth7542d372015-09-21 17:39:41 +0000136 continue;
137 FunctionModRefBehavior MRB = AAR.getModRefBehavior(CS);
Alina Sbirlea63d22502017-12-05 20:12:23 +0000138 ModRefInfo MRI = createModRefInfo(MRB);
Chandler Carruth7542d372015-09-21 17:39:41 +0000139
Chandler Carruth69798fb2015-10-27 01:41:43 +0000140 // If the call doesn't access memory, we're done.
Alina Sbirlea63d22502017-12-05 20:12:23 +0000141 if (isNoModRef(MRI))
Chandler Carruth69798fb2015-10-27 01:41:43 +0000142 continue;
143
144 if (!AliasAnalysis::onlyAccessesArgPointees(MRB)) {
145 // The call could access any memory. If that includes writes, give up.
Alina Sbirlea63d22502017-12-05 20:12:23 +0000146 if (isModSet(MRI))
Chandler Carruth69798fb2015-10-27 01:41:43 +0000147 return MAK_MayWrite;
148 // If it reads, note it.
Alina Sbirlea63d22502017-12-05 20:12:23 +0000149 if (isRefSet(MRI))
Chandler Carruth69798fb2015-10-27 01:41:43 +0000150 ReadsMemory = true;
Chandler Carruth7542d372015-09-21 17:39:41 +0000151 continue;
152 }
Chandler Carruth69798fb2015-10-27 01:41:43 +0000153
154 // Check whether all pointer arguments point to local memory, and
155 // ignore calls that only access local memory.
156 for (CallSite::arg_iterator CI = CS.arg_begin(), CE = CS.arg_end();
157 CI != CE; ++CI) {
158 Value *Arg = *CI;
Elena Demikhovsky3ec9e152015-11-17 19:30:51 +0000159 if (!Arg->getType()->isPtrOrPtrVectorTy())
Chandler Carruth69798fb2015-10-27 01:41:43 +0000160 continue;
161
162 AAMDNodes AAInfo;
163 I->getAAMetadata(AAInfo);
164 MemoryLocation Loc(Arg, MemoryLocation::UnknownSize, AAInfo);
165
166 // Skip accesses to local or constant memory as they don't impact the
167 // externally visible mod/ref behavior.
168 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
169 continue;
170
Alina Sbirlea63d22502017-12-05 20:12:23 +0000171 if (isModSet(MRI))
Chandler Carruth69798fb2015-10-27 01:41:43 +0000172 // Writes non-local memory. Give up.
173 return MAK_MayWrite;
Alina Sbirlea63d22502017-12-05 20:12:23 +0000174 if (isRefSet(MRI))
Chandler Carruth69798fb2015-10-27 01:41:43 +0000175 // Ok, it reads non-local memory.
176 ReadsMemory = true;
177 }
Chandler Carruth7542d372015-09-21 17:39:41 +0000178 continue;
179 } else if (LoadInst *LI = dyn_cast<LoadInst>(I)) {
180 // Ignore non-volatile loads from local memory. (Atomic is okay here.)
181 if (!LI->isVolatile()) {
182 MemoryLocation Loc = MemoryLocation::get(LI);
183 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
184 continue;
185 }
186 } else if (StoreInst *SI = dyn_cast<StoreInst>(I)) {
187 // Ignore non-volatile stores to local memory. (Atomic is okay here.)
188 if (!SI->isVolatile()) {
189 MemoryLocation Loc = MemoryLocation::get(SI);
190 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
191 continue;
192 }
193 } else if (VAArgInst *VI = dyn_cast<VAArgInst>(I)) {
194 // Ignore vaargs on local memory.
195 MemoryLocation Loc = MemoryLocation::get(VI);
196 if (AAR.pointsToConstantMemory(Loc, /*OrLocal=*/true))
197 continue;
198 }
199
200 // Any remaining instructions need to be taken seriously! Check if they
201 // read or write memory.
202 if (I->mayWriteToMemory())
203 // Writes memory. Just give up.
204 return MAK_MayWrite;
205
206 // If this instruction may read memory, remember that.
207 ReadsMemory |= I->mayReadFromMemory();
208 }
209
210 return ReadsMemory ? MAK_ReadOnly : MAK_ReadNone;
211}
212
Peter Collingbournec45f7f32017-02-14 00:28:13 +0000213MemoryAccessKind llvm::computeFunctionBodyMemoryAccess(Function &F,
214 AAResults &AAR) {
215 return checkFunctionMemoryAccess(F, /*ThisBody=*/true, AAR, {});
216}
217
Chandler Carrutha632fb92015-09-13 06:57:25 +0000218/// Deduce readonly/readnone attributes for the SCC.
Chandler Carrutha8125352015-10-30 16:48:08 +0000219template <typename AARGetterT>
Peter Collingbournecea1e4e2017-02-09 23:11:52 +0000220static bool addReadAttrs(const SCCNodeSet &SCCNodes, AARGetterT &&AARGetter) {
Duncan Sands44c8cd92008-12-31 16:14:43 +0000221 // Check if any of the functions in the SCC read or write memory. If they
222 // write memory then they can't be marked readnone or readonly.
223 bool ReadsMemory = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000224 for (Function *F : SCCNodes) {
Chandler Carrutha8125352015-10-30 16:48:08 +0000225 // Call the callable parameter to look up AA results for this function.
226 AAResults &AAR = AARGetter(*F);
Chandler Carruth7b560d42015-09-09 17:55:00 +0000227
Peter Collingbournec45f7f32017-02-14 00:28:13 +0000228 // Non-exact function definitions may not be selected at link time, and an
229 // alternative version that writes to memory may be selected. See the
230 // comment on GlobalValue::isDefinitionExact for more details.
231 switch (checkFunctionMemoryAccess(*F, F->hasExactDefinition(),
232 AAR, SCCNodes)) {
Chandler Carruth7542d372015-09-21 17:39:41 +0000233 case MAK_MayWrite:
234 return false;
235 case MAK_ReadOnly:
Duncan Sands44c8cd92008-12-31 16:14:43 +0000236 ReadsMemory = true;
Chandler Carruth7542d372015-09-21 17:39:41 +0000237 break;
238 case MAK_ReadNone:
239 // Nothing to do!
240 break;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000241 }
242 }
243
244 // Success! Functions in this SCC do not access memory, or only read memory.
245 // Give them the appropriate attribute.
246 bool MadeChange = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000247 for (Function *F : SCCNodes) {
Duncan Sands44c8cd92008-12-31 16:14:43 +0000248 if (F->doesNotAccessMemory())
249 // Already perfect!
250 continue;
251
252 if (F->onlyReadsMemory() && ReadsMemory)
253 // No change.
254 continue;
255
256 MadeChange = true;
257
258 // Clear out any existing attributes.
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000259 F->removeFnAttr(Attribute::ReadOnly);
260 F->removeFnAttr(Attribute::ReadNone);
Duncan Sands44c8cd92008-12-31 16:14:43 +0000261
262 // Add in the new attribute.
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000263 F->addFnAttr(ReadsMemory ? Attribute::ReadOnly : Attribute::ReadNone);
Duncan Sands44c8cd92008-12-31 16:14:43 +0000264
265 if (ReadsMemory)
Duncan Sandscefc8602009-01-02 11:46:24 +0000266 ++NumReadOnly;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000267 else
Duncan Sandscefc8602009-01-02 11:46:24 +0000268 ++NumReadNone;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000269 }
270
271 return MadeChange;
272}
273
Nick Lewycky4c378a42011-12-28 23:24:21 +0000274namespace {
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000275
Chandler Carrutha632fb92015-09-13 06:57:25 +0000276/// For a given pointer Argument, this retains a list of Arguments of functions
277/// in the same SCC that the pointer data flows into. We use this to build an
278/// SCC of the arguments.
Chandler Carruth63559d72015-09-13 06:47:20 +0000279struct ArgumentGraphNode {
280 Argument *Definition;
281 SmallVector<ArgumentGraphNode *, 4> Uses;
282};
Nick Lewycky4c378a42011-12-28 23:24:21 +0000283
Chandler Carruth63559d72015-09-13 06:47:20 +0000284class ArgumentGraph {
285 // We store pointers to ArgumentGraphNode objects, so it's important that
286 // that they not move around upon insert.
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000287 using ArgumentMapTy = std::map<Argument *, ArgumentGraphNode>;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000288
Chandler Carruth63559d72015-09-13 06:47:20 +0000289 ArgumentMapTy ArgumentMap;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000290
Chandler Carruth63559d72015-09-13 06:47:20 +0000291 // There is no root node for the argument graph, in fact:
292 // void f(int *x, int *y) { if (...) f(x, y); }
293 // is an example where the graph is disconnected. The SCCIterator requires a
294 // single entry point, so we maintain a fake ("synthetic") root node that
295 // uses every node. Because the graph is directed and nothing points into
296 // the root, it will not participate in any SCCs (except for its own).
297 ArgumentGraphNode SyntheticRoot;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000298
Chandler Carruth63559d72015-09-13 06:47:20 +0000299public:
300 ArgumentGraph() { SyntheticRoot.Definition = nullptr; }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000301
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000302 using iterator = SmallVectorImpl<ArgumentGraphNode *>::iterator;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000303
Chandler Carruth63559d72015-09-13 06:47:20 +0000304 iterator begin() { return SyntheticRoot.Uses.begin(); }
305 iterator end() { return SyntheticRoot.Uses.end(); }
306 ArgumentGraphNode *getEntryNode() { return &SyntheticRoot; }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000307
Chandler Carruth63559d72015-09-13 06:47:20 +0000308 ArgumentGraphNode *operator[](Argument *A) {
309 ArgumentGraphNode &Node = ArgumentMap[A];
310 Node.Definition = A;
311 SyntheticRoot.Uses.push_back(&Node);
312 return &Node;
313 }
314};
Nick Lewycky4c378a42011-12-28 23:24:21 +0000315
Chandler Carrutha632fb92015-09-13 06:57:25 +0000316/// This tracker checks whether callees are in the SCC, and if so it does not
317/// consider that a capture, instead adding it to the "Uses" list and
318/// continuing with the analysis.
Chandler Carruth63559d72015-09-13 06:47:20 +0000319struct ArgumentUsesTracker : public CaptureTracker {
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000320 ArgumentUsesTracker(const SCCNodeSet &SCCNodes) : SCCNodes(SCCNodes) {}
Nick Lewycky4c378a42011-12-28 23:24:21 +0000321
Chandler Carruth63559d72015-09-13 06:47:20 +0000322 void tooManyUses() override { Captured = true; }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000323
Chandler Carruth63559d72015-09-13 06:47:20 +0000324 bool captured(const Use *U) override {
325 CallSite CS(U->getUser());
326 if (!CS.getInstruction()) {
327 Captured = true;
328 return true;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000329 }
330
Chandler Carruth63559d72015-09-13 06:47:20 +0000331 Function *F = CS.getCalledFunction();
Sanjoy Das5ce32722016-04-08 00:48:30 +0000332 if (!F || !F->hasExactDefinition() || !SCCNodes.count(F)) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000333 Captured = true;
334 return true;
335 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000336
Sanjoy Das98bfe262015-11-05 03:04:40 +0000337 // Note: the callee and the two successor blocks *follow* the argument
338 // operands. This means there is no need to adjust UseIndex to account for
339 // these.
340
341 unsigned UseIndex =
342 std::distance(const_cast<const Use *>(CS.arg_begin()), U);
343
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000344 assert(UseIndex < CS.data_operands_size() &&
345 "Indirect function calls should have been filtered above!");
346
347 if (UseIndex >= CS.getNumArgOperands()) {
348 // Data operand, but not a argument operand -- must be a bundle operand
349 assert(CS.hasOperandBundles() && "Must be!");
350
351 // CaptureTracking told us that we're being captured by an operand bundle
352 // use. In this case it does not matter if the callee is within our SCC
353 // or not -- we've been captured in some unknown way, and we have to be
354 // conservative.
355 Captured = true;
356 return true;
357 }
358
Sanjoy Das98bfe262015-11-05 03:04:40 +0000359 if (UseIndex >= F->arg_size()) {
360 assert(F->isVarArg() && "More params than args in non-varargs call");
361 Captured = true;
362 return true;
Chandler Carruth63559d72015-09-13 06:47:20 +0000363 }
Sanjoy Das98bfe262015-11-05 03:04:40 +0000364
Duncan P. N. Exon Smith83c4b682015-11-07 00:01:16 +0000365 Uses.push_back(&*std::next(F->arg_begin(), UseIndex));
Chandler Carruth63559d72015-09-13 06:47:20 +0000366 return false;
367 }
368
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000369 // True only if certainly captured (used outside our SCC).
370 bool Captured = false;
371
372 // Uses within our SCC.
373 SmallVector<Argument *, 4> Uses;
Chandler Carruth63559d72015-09-13 06:47:20 +0000374
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000375 const SCCNodeSet &SCCNodes;
Chandler Carruth63559d72015-09-13 06:47:20 +0000376};
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000377
378} // end anonymous namespace
Nick Lewycky4c378a42011-12-28 23:24:21 +0000379
380namespace llvm {
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000381
Chandler Carruth63559d72015-09-13 06:47:20 +0000382template <> struct GraphTraits<ArgumentGraphNode *> {
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000383 using NodeRef = ArgumentGraphNode *;
384 using ChildIteratorType = SmallVectorImpl<ArgumentGraphNode *>::iterator;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000385
Tim Shen48f814e2016-08-31 16:48:13 +0000386 static NodeRef getEntryNode(NodeRef A) { return A; }
387 static ChildIteratorType child_begin(NodeRef N) { return N->Uses.begin(); }
388 static ChildIteratorType child_end(NodeRef N) { return N->Uses.end(); }
Chandler Carruth63559d72015-09-13 06:47:20 +0000389};
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000390
Chandler Carruth63559d72015-09-13 06:47:20 +0000391template <>
392struct GraphTraits<ArgumentGraph *> : public GraphTraits<ArgumentGraphNode *> {
Tim Shenf2187ed2016-08-22 21:09:30 +0000393 static NodeRef getEntryNode(ArgumentGraph *AG) { return AG->getEntryNode(); }
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000394
Chandler Carruth63559d72015-09-13 06:47:20 +0000395 static ChildIteratorType nodes_begin(ArgumentGraph *AG) {
396 return AG->begin();
397 }
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000398
Chandler Carruth63559d72015-09-13 06:47:20 +0000399 static ChildIteratorType nodes_end(ArgumentGraph *AG) { return AG->end(); }
400};
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000401
402} // end namespace llvm
Nick Lewycky4c378a42011-12-28 23:24:21 +0000403
Chandler Carrutha632fb92015-09-13 06:57:25 +0000404/// Returns Attribute::None, Attribute::ReadOnly or Attribute::ReadNone.
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000405static Attribute::AttrKind
406determinePointerReadAttrs(Argument *A,
Chandler Carruth63559d72015-09-13 06:47:20 +0000407 const SmallPtrSet<Argument *, 8> &SCCNodes) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000408 SmallVector<Use *, 32> Worklist;
409 SmallSet<Use *, 32> Visited;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000410
Reid Kleckner26af2ca2014-01-28 02:38:36 +0000411 // inalloca arguments are always clobbered by the call.
412 if (A->hasInAllocaAttr())
413 return Attribute::None;
414
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000415 bool IsRead = false;
416 // We don't need to track IsWritten. If A is written to, return immediately.
417
Chandler Carruthcdf47882014-03-09 03:16:01 +0000418 for (Use &U : A->uses()) {
Chandler Carruthcdf47882014-03-09 03:16:01 +0000419 Visited.insert(&U);
420 Worklist.push_back(&U);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000421 }
422
423 while (!Worklist.empty()) {
424 Use *U = Worklist.pop_back_val();
425 Instruction *I = cast<Instruction>(U->getUser());
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000426
427 switch (I->getOpcode()) {
428 case Instruction::BitCast:
429 case Instruction::GetElementPtr:
430 case Instruction::PHI:
431 case Instruction::Select:
Matt Arsenaulte55a2c22014-01-14 19:11:52 +0000432 case Instruction::AddrSpaceCast:
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000433 // The original value is not read/written via this if the new value isn't.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000434 for (Use &UU : I->uses())
David Blaikie70573dc2014-11-19 07:49:26 +0000435 if (Visited.insert(&UU).second)
Chandler Carruthcdf47882014-03-09 03:16:01 +0000436 Worklist.push_back(&UU);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000437 break;
438
439 case Instruction::Call:
440 case Instruction::Invoke: {
Nick Lewycky59633cb2014-05-30 02:31:27 +0000441 bool Captures = true;
442
443 if (I->getType()->isVoidTy())
444 Captures = false;
445
446 auto AddUsersToWorklistIfCapturing = [&] {
447 if (Captures)
448 for (Use &UU : I->uses())
David Blaikie70573dc2014-11-19 07:49:26 +0000449 if (Visited.insert(&UU).second)
Nick Lewycky59633cb2014-05-30 02:31:27 +0000450 Worklist.push_back(&UU);
451 };
452
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000453 CallSite CS(I);
Nick Lewycky59633cb2014-05-30 02:31:27 +0000454 if (CS.doesNotAccessMemory()) {
455 AddUsersToWorklistIfCapturing();
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000456 continue;
Nick Lewycky59633cb2014-05-30 02:31:27 +0000457 }
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000458
459 Function *F = CS.getCalledFunction();
460 if (!F) {
461 if (CS.onlyReadsMemory()) {
462 IsRead = true;
Nick Lewycky59633cb2014-05-30 02:31:27 +0000463 AddUsersToWorklistIfCapturing();
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000464 continue;
465 }
466 return Attribute::None;
467 }
468
Sanjoy Das436e2392015-11-07 01:55:53 +0000469 // Note: the callee and the two successor blocks *follow* the argument
470 // operands. This means there is no need to adjust UseIndex to account
471 // for these.
472
473 unsigned UseIndex = std::distance(CS.arg_begin(), U);
474
Sanjoy Dasea1df7f2015-11-07 01:56:07 +0000475 // U cannot be the callee operand use: since we're exploring the
476 // transitive uses of an Argument, having such a use be a callee would
477 // imply the CallSite is an indirect call or invoke; and we'd take the
478 // early exit above.
479 assert(UseIndex < CS.data_operands_size() &&
480 "Data operand use expected!");
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000481
482 bool IsOperandBundleUse = UseIndex >= CS.getNumArgOperands();
483
484 if (UseIndex >= F->arg_size() && !IsOperandBundleUse) {
Sanjoy Das436e2392015-11-07 01:55:53 +0000485 assert(F->isVarArg() && "More params than args in non-varargs call");
486 return Attribute::None;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000487 }
Sanjoy Das436e2392015-11-07 01:55:53 +0000488
Tilmann Scheller925b1932015-11-20 19:17:10 +0000489 Captures &= !CS.doesNotCapture(UseIndex);
490
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000491 // Since the optimizer (by design) cannot see the data flow corresponding
492 // to a operand bundle use, these cannot participate in the optimistic SCC
493 // analysis. Instead, we model the operand bundle uses as arguments in
494 // call to a function external to the SCC.
Duncan P. N. Exon Smith9e3edad2016-08-17 01:23:58 +0000495 if (IsOperandBundleUse ||
496 !SCCNodes.count(&*std::next(F->arg_begin(), UseIndex))) {
Sanjoy Das71fe81f2015-11-07 01:56:00 +0000497
498 // The accessors used on CallSite here do the right thing for calls and
499 // invokes with operand bundles.
500
Sanjoy Das436e2392015-11-07 01:55:53 +0000501 if (!CS.onlyReadsMemory() && !CS.onlyReadsMemory(UseIndex))
502 return Attribute::None;
503 if (!CS.doesNotAccessMemory(UseIndex))
504 IsRead = true;
505 }
506
Nick Lewycky59633cb2014-05-30 02:31:27 +0000507 AddUsersToWorklistIfCapturing();
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000508 break;
509 }
510
511 case Instruction::Load:
David Majnemer124bdb72016-05-25 05:53:04 +0000512 // A volatile load has side effects beyond what readonly can be relied
513 // upon.
514 if (cast<LoadInst>(I)->isVolatile())
515 return Attribute::None;
516
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000517 IsRead = true;
518 break;
519
520 case Instruction::ICmp:
521 case Instruction::Ret:
522 break;
523
524 default:
525 return Attribute::None;
526 }
527 }
528
529 return IsRead ? Attribute::ReadOnly : Attribute::ReadNone;
530}
531
David Majnemer5246e0b2016-07-19 18:50:26 +0000532/// Deduce returned attributes for the SCC.
533static bool addArgumentReturnedAttrs(const SCCNodeSet &SCCNodes) {
534 bool Changed = false;
535
David Majnemer5246e0b2016-07-19 18:50:26 +0000536 // Check each function in turn, determining if an argument is always returned.
537 for (Function *F : SCCNodes) {
538 // We can infer and propagate function attributes only when we know that the
539 // definition we'll get at link time is *exactly* the definition we see now.
540 // For more details, see GlobalValue::mayBeDerefined.
541 if (!F->hasExactDefinition())
542 continue;
543
544 if (F->getReturnType()->isVoidTy())
545 continue;
546
David Majnemerc83044d2016-09-12 16:04:59 +0000547 // There is nothing to do if an argument is already marked as 'returned'.
Eugene Zelenkof27d1612017-10-19 21:21:30 +0000548 if (llvm::any_of(F->args(),
549 [](const Argument &Arg) { return Arg.hasReturnedAttr(); }))
David Majnemerc83044d2016-09-12 16:04:59 +0000550 continue;
551
David Majnemer5246e0b2016-07-19 18:50:26 +0000552 auto FindRetArg = [&]() -> Value * {
553 Value *RetArg = nullptr;
554 for (BasicBlock &BB : *F)
555 if (auto *Ret = dyn_cast<ReturnInst>(BB.getTerminator())) {
556 // Note that stripPointerCasts should look through functions with
557 // returned arguments.
558 Value *RetVal = Ret->getReturnValue()->stripPointerCasts();
559 if (!isa<Argument>(RetVal) || RetVal->getType() != F->getReturnType())
560 return nullptr;
561
562 if (!RetArg)
563 RetArg = RetVal;
564 else if (RetArg != RetVal)
565 return nullptr;
566 }
567
568 return RetArg;
569 };
570
571 if (Value *RetArg = FindRetArg()) {
572 auto *A = cast<Argument>(RetArg);
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000573 A->addAttr(Attribute::Returned);
David Majnemer5246e0b2016-07-19 18:50:26 +0000574 ++NumReturned;
575 Changed = true;
576 }
577 }
578
579 return Changed;
580}
581
Sanjay Patel4f742162017-02-13 23:10:51 +0000582/// If a callsite has arguments that are also arguments to the parent function,
583/// try to propagate attributes from the callsite's arguments to the parent's
584/// arguments. This may be important because inlining can cause information loss
585/// when attribute knowledge disappears with the inlined call.
586static bool addArgumentAttrsFromCallsites(Function &F) {
587 if (!EnableNonnullArgPropagation)
588 return false;
589
590 bool Changed = false;
591
592 // For an argument attribute to transfer from a callsite to the parent, the
593 // call must be guaranteed to execute every time the parent is called.
594 // Conservatively, just check for calls in the entry block that are guaranteed
595 // to execute.
596 // TODO: This could be enhanced by testing if the callsite post-dominates the
597 // entry block or by doing simple forward walks or backward walks to the
598 // callsite.
599 BasicBlock &Entry = F.getEntryBlock();
600 for (Instruction &I : Entry) {
601 if (auto CS = CallSite(&I)) {
602 if (auto *CalledFunc = CS.getCalledFunction()) {
603 for (auto &CSArg : CalledFunc->args()) {
604 if (!CSArg.hasNonNullAttr())
605 continue;
606
607 // If the non-null callsite argument operand is an argument to 'F'
608 // (the caller) and the call is guaranteed to execute, then the value
609 // must be non-null throughout 'F'.
610 auto *FArg = dyn_cast<Argument>(CS.getArgOperand(CSArg.getArgNo()));
611 if (FArg && !FArg->hasNonNullAttr()) {
612 FArg->addAttr(Attribute::NonNull);
613 Changed = true;
614 }
615 }
616 }
617 }
618 if (!isGuaranteedToTransferExecutionToSuccessor(&I))
619 break;
620 }
621
622 return Changed;
623}
624
Chandler Carrutha632fb92015-09-13 06:57:25 +0000625/// Deduce nocapture attributes for the SCC.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000626static bool addArgumentAttrs(const SCCNodeSet &SCCNodes) {
Duncan Sands44c8cd92008-12-31 16:14:43 +0000627 bool Changed = false;
628
Nick Lewycky4c378a42011-12-28 23:24:21 +0000629 ArgumentGraph AG;
630
Duncan Sands44c8cd92008-12-31 16:14:43 +0000631 // Check each function in turn, determining which pointer arguments are not
632 // captured.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000633 for (Function *F : SCCNodes) {
Sanjoy Das5ce32722016-04-08 00:48:30 +0000634 // We can infer and propagate function attributes only when we know that the
635 // definition we'll get at link time is *exactly* the definition we see now.
636 // For more details, see GlobalValue::mayBeDerefined.
637 if (!F->hasExactDefinition())
Duncan Sands44c8cd92008-12-31 16:14:43 +0000638 continue;
639
Sanjay Patel4f742162017-02-13 23:10:51 +0000640 Changed |= addArgumentAttrsFromCallsites(*F);
641
Nick Lewycky4c378a42011-12-28 23:24:21 +0000642 // Functions that are readonly (or readnone) and nounwind and don't return
643 // a value can't capture arguments. Don't analyze them.
644 if (F->onlyReadsMemory() && F->doesNotThrow() &&
645 F->getReturnType()->isVoidTy()) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000646 for (Function::arg_iterator A = F->arg_begin(), E = F->arg_end(); A != E;
647 ++A) {
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000648 if (A->getType()->isPointerTy() && !A->hasNoCaptureAttr()) {
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000649 A->addAttr(Attribute::NoCapture);
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000650 ++NumNoCapture;
651 Changed = true;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000652 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000653 }
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000654 continue;
Benjamin Kramer76b7bd02013-06-22 15:51:19 +0000655 }
656
Chandler Carruth63559d72015-09-13 06:47:20 +0000657 for (Function::arg_iterator A = F->arg_begin(), E = F->arg_end(); A != E;
658 ++A) {
659 if (!A->getType()->isPointerTy())
660 continue;
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000661 bool HasNonLocalUses = false;
662 if (!A->hasNoCaptureAttr()) {
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000663 ArgumentUsesTracker Tracker(SCCNodes);
Duncan P. N. Exon Smith17323402015-10-13 17:51:03 +0000664 PointerMayBeCaptured(&*A, &Tracker);
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000665 if (!Tracker.Captured) {
666 if (Tracker.Uses.empty()) {
667 // If it's trivially not captured, mark it nocapture now.
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000668 A->addAttr(Attribute::NoCapture);
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000669 ++NumNoCapture;
670 Changed = true;
671 } else {
672 // If it's not trivially captured and not trivially not captured,
673 // then it must be calling into another function in our SCC. Save
674 // its particulars for Argument-SCC analysis later.
Duncan P. N. Exon Smith17323402015-10-13 17:51:03 +0000675 ArgumentGraphNode *Node = AG[&*A];
Benjamin Kramer135f7352016-06-26 12:28:59 +0000676 for (Argument *Use : Tracker.Uses) {
677 Node->Uses.push_back(AG[Use]);
678 if (Use != &*A)
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000679 HasNonLocalUses = true;
680 }
Benjamin Kramer40d7f352013-06-22 16:56:32 +0000681 }
682 }
683 // Otherwise, it's captured. Don't bother doing SCC analysis on it.
684 }
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000685 if (!HasNonLocalUses && !A->onlyReadsMemory()) {
686 // Can we determine that it's readonly/readnone without doing an SCC?
687 // Note that we don't allow any calls at all here, or else our result
688 // will be dependent on the iteration order through the functions in the
689 // SCC.
Chandler Carruth63559d72015-09-13 06:47:20 +0000690 SmallPtrSet<Argument *, 8> Self;
Duncan P. N. Exon Smith17323402015-10-13 17:51:03 +0000691 Self.insert(&*A);
692 Attribute::AttrKind R = determinePointerReadAttrs(&*A, Self);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000693 if (R != Attribute::None) {
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000694 A->addAttr(R);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000695 Changed = true;
696 R == Attribute::ReadOnly ? ++NumReadOnlyArg : ++NumReadNoneArg;
697 }
698 }
699 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000700 }
701
702 // The graph we've collected is partial because we stopped scanning for
703 // argument uses once we solved the argument trivially. These partial nodes
704 // show up as ArgumentGraphNode objects with an empty Uses list, and for
705 // these nodes the final decision about whether they capture has already been
706 // made. If the definition doesn't have a 'nocapture' attribute by now, it
707 // captures.
708
Chandler Carruth63559d72015-09-13 06:47:20 +0000709 for (scc_iterator<ArgumentGraph *> I = scc_begin(&AG); !I.isAtEnd(); ++I) {
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000710 const std::vector<ArgumentGraphNode *> &ArgumentSCC = *I;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000711 if (ArgumentSCC.size() == 1) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000712 if (!ArgumentSCC[0]->Definition)
713 continue; // synthetic root node
Nick Lewycky4c378a42011-12-28 23:24:21 +0000714
715 // eg. "void f(int* x) { if (...) f(x); }"
716 if (ArgumentSCC[0]->Uses.size() == 1 &&
717 ArgumentSCC[0]->Uses[0] == ArgumentSCC[0]) {
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000718 Argument *A = ArgumentSCC[0]->Definition;
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000719 A->addAttr(Attribute::NoCapture);
Nick Lewycky7e820552009-01-02 03:46:56 +0000720 ++NumNoCapture;
Duncan Sands44c8cd92008-12-31 16:14:43 +0000721 Changed = true;
722 }
Nick Lewycky4c378a42011-12-28 23:24:21 +0000723 continue;
724 }
725
726 bool SCCCaptured = false;
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000727 for (auto I = ArgumentSCC.begin(), E = ArgumentSCC.end();
728 I != E && !SCCCaptured; ++I) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000729 ArgumentGraphNode *Node = *I;
730 if (Node->Uses.empty()) {
731 if (!Node->Definition->hasNoCaptureAttr())
732 SCCCaptured = true;
733 }
734 }
Chandler Carruth63559d72015-09-13 06:47:20 +0000735 if (SCCCaptured)
736 continue;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000737
Chandler Carruth63559d72015-09-13 06:47:20 +0000738 SmallPtrSet<Argument *, 8> ArgumentSCCNodes;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000739 // Fill ArgumentSCCNodes with the elements of the ArgumentSCC. Used for
740 // quickly looking up whether a given Argument is in this ArgumentSCC.
Benjamin Kramer135f7352016-06-26 12:28:59 +0000741 for (ArgumentGraphNode *I : ArgumentSCC) {
742 ArgumentSCCNodes.insert(I->Definition);
Nick Lewycky4c378a42011-12-28 23:24:21 +0000743 }
744
Duncan P. N. Exon Smithd2b2fac2014-04-25 18:24:50 +0000745 for (auto I = ArgumentSCC.begin(), E = ArgumentSCC.end();
746 I != E && !SCCCaptured; ++I) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000747 ArgumentGraphNode *N = *I;
Benjamin Kramer135f7352016-06-26 12:28:59 +0000748 for (ArgumentGraphNode *Use : N->Uses) {
749 Argument *A = Use->Definition;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000750 if (A->hasNoCaptureAttr() || ArgumentSCCNodes.count(A))
751 continue;
752 SCCCaptured = true;
753 break;
754 }
755 }
Chandler Carruth63559d72015-09-13 06:47:20 +0000756 if (SCCCaptured)
757 continue;
Nick Lewycky4c378a42011-12-28 23:24:21 +0000758
Nick Lewyckyf740db32012-01-05 22:21:45 +0000759 for (unsigned i = 0, e = ArgumentSCC.size(); i != e; ++i) {
Nick Lewycky4c378a42011-12-28 23:24:21 +0000760 Argument *A = ArgumentSCC[i]->Definition;
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000761 A->addAttr(Attribute::NoCapture);
Nick Lewycky4c378a42011-12-28 23:24:21 +0000762 ++NumNoCapture;
763 Changed = true;
764 }
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000765
766 // We also want to compute readonly/readnone. With a small number of false
767 // negatives, we can assume that any pointer which is captured isn't going
768 // to be provably readonly or readnone, since by definition we can't
769 // analyze all uses of a captured pointer.
770 //
771 // The false negatives happen when the pointer is captured by a function
772 // that promises readonly/readnone behaviour on the pointer, then the
773 // pointer's lifetime ends before anything that writes to arbitrary memory.
774 // Also, a readonly/readnone pointer may be returned, but returning a
775 // pointer is capturing it.
776
777 Attribute::AttrKind ReadAttr = Attribute::ReadNone;
778 for (unsigned i = 0, e = ArgumentSCC.size(); i != e; ++i) {
779 Argument *A = ArgumentSCC[i]->Definition;
780 Attribute::AttrKind K = determinePointerReadAttrs(A, ArgumentSCCNodes);
781 if (K == Attribute::ReadNone)
782 continue;
783 if (K == Attribute::ReadOnly) {
784 ReadAttr = Attribute::ReadOnly;
785 continue;
786 }
787 ReadAttr = K;
788 break;
789 }
790
791 if (ReadAttr != Attribute::None) {
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000792 for (unsigned i = 0, e = ArgumentSCC.size(); i != e; ++i) {
793 Argument *A = ArgumentSCC[i]->Definition;
Bjorn Steinbrink236446c2015-05-25 19:46:38 +0000794 // Clear out existing readonly/readnone attributes
Reid Kleckner9d16fa02017-04-19 17:28:52 +0000795 A->removeAttr(Attribute::ReadOnly);
796 A->removeAttr(Attribute::ReadNone);
797 A->addAttr(ReadAttr);
Nick Lewyckyc2ec0722013-07-06 00:29:58 +0000798 ReadAttr == Attribute::ReadOnly ? ++NumReadOnlyArg : ++NumReadNoneArg;
799 Changed = true;
800 }
801 }
Duncan Sands44c8cd92008-12-31 16:14:43 +0000802 }
803
804 return Changed;
805}
806
Chandler Carrutha632fb92015-09-13 06:57:25 +0000807/// Tests whether a function is "malloc-like".
808///
809/// A function is "malloc-like" if it returns either null or a pointer that
810/// doesn't alias any other pointer visible to the caller.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000811static bool isFunctionMallocLike(Function *F, const SCCNodeSet &SCCNodes) {
Benjamin Kramer15591272012-10-31 13:45:49 +0000812 SmallSetVector<Value *, 8> FlowsToReturn;
Benjamin Kramer135f7352016-06-26 12:28:59 +0000813 for (BasicBlock &BB : *F)
814 if (ReturnInst *Ret = dyn_cast<ReturnInst>(BB.getTerminator()))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000815 FlowsToReturn.insert(Ret->getReturnValue());
816
817 for (unsigned i = 0; i != FlowsToReturn.size(); ++i) {
Benjamin Kramer15591272012-10-31 13:45:49 +0000818 Value *RetVal = FlowsToReturn[i];
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000819
820 if (Constant *C = dyn_cast<Constant>(RetVal)) {
821 if (!C->isNullValue() && !isa<UndefValue>(C))
822 return false;
823
824 continue;
825 }
826
827 if (isa<Argument>(RetVal))
828 return false;
829
830 if (Instruction *RVI = dyn_cast<Instruction>(RetVal))
831 switch (RVI->getOpcode()) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000832 // Extend the analysis by looking upwards.
833 case Instruction::BitCast:
834 case Instruction::GetElementPtr:
835 case Instruction::AddrSpaceCast:
836 FlowsToReturn.insert(RVI->getOperand(0));
837 continue;
838 case Instruction::Select: {
839 SelectInst *SI = cast<SelectInst>(RVI);
840 FlowsToReturn.insert(SI->getTrueValue());
841 FlowsToReturn.insert(SI->getFalseValue());
842 continue;
843 }
844 case Instruction::PHI: {
845 PHINode *PN = cast<PHINode>(RVI);
846 for (Value *IncValue : PN->incoming_values())
847 FlowsToReturn.insert(IncValue);
848 continue;
849 }
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000850
Chandler Carruth63559d72015-09-13 06:47:20 +0000851 // Check whether the pointer came from an allocation.
852 case Instruction::Alloca:
853 break;
854 case Instruction::Call:
855 case Instruction::Invoke: {
856 CallSite CS(RVI);
Reid Klecknerfb502d22017-04-14 20:19:02 +0000857 if (CS.hasRetAttr(Attribute::NoAlias))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000858 break;
Chandler Carruth63559d72015-09-13 06:47:20 +0000859 if (CS.getCalledFunction() && SCCNodes.count(CS.getCalledFunction()))
860 break;
Justin Bognercd1d5aa2016-08-17 20:30:52 +0000861 LLVM_FALLTHROUGH;
862 }
Chandler Carruth63559d72015-09-13 06:47:20 +0000863 default:
864 return false; // Did not come from an allocation.
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000865 }
866
Dan Gohman94e61762009-11-19 21:57:48 +0000867 if (PointerMayBeCaptured(RetVal, false, /*StoreCaptures=*/false))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000868 return false;
869 }
870
871 return true;
872}
873
Chandler Carrutha632fb92015-09-13 06:57:25 +0000874/// Deduce noalias attributes for the SCC.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000875static bool addNoAliasAttrs(const SCCNodeSet &SCCNodes) {
Nick Lewycky9ec96d12009-03-08 17:08:09 +0000876 // Check each function in turn, determining which functions return noalias
877 // pointers.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000878 for (Function *F : SCCNodes) {
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000879 // Already noalias.
Reid Klecknera0b45f42017-05-03 18:17:31 +0000880 if (F->returnDoesNotAlias())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000881 continue;
882
Sanjoy Das5ce32722016-04-08 00:48:30 +0000883 // We can infer and propagate function attributes only when we know that the
884 // definition we'll get at link time is *exactly* the definition we see now.
885 // For more details, see GlobalValue::mayBeDerefined.
886 if (!F->hasExactDefinition())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000887 return false;
888
Chandler Carruth63559d72015-09-13 06:47:20 +0000889 // We annotate noalias return values, which are only applicable to
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000890 // pointer types.
Duncan Sands19d0b472010-02-16 11:11:14 +0000891 if (!F->getReturnType()->isPointerTy())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000892 continue;
893
Chandler Carruth3824f852015-09-13 08:23:27 +0000894 if (!isFunctionMallocLike(F, SCCNodes))
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000895 return false;
896 }
897
898 bool MadeChange = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000899 for (Function *F : SCCNodes) {
Reid Klecknera0b45f42017-05-03 18:17:31 +0000900 if (F->returnDoesNotAlias() ||
Reid Kleckner6652a522017-04-28 18:37:16 +0000901 !F->getReturnType()->isPointerTy())
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000902 continue;
903
Reid Klecknera0b45f42017-05-03 18:17:31 +0000904 F->setReturnDoesNotAlias();
Nick Lewyckyfbed86a2009-03-08 06:20:47 +0000905 ++NumNoAlias;
906 MadeChange = true;
907 }
908
909 return MadeChange;
910}
911
Chandler Carrutha632fb92015-09-13 06:57:25 +0000912/// Tests whether this function is known to not return null.
Chandler Carruth8874b782015-09-13 08:17:14 +0000913///
914/// Requires that the function returns a pointer.
915///
916/// Returns true if it believes the function will not return a null, and sets
917/// \p Speculative based on whether the returned conclusion is a speculative
918/// conclusion due to SCC calls.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000919static bool isReturnNonNull(Function *F, const SCCNodeSet &SCCNodes,
Sean Silva45835e72016-07-02 23:47:27 +0000920 bool &Speculative) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000921 assert(F->getReturnType()->isPointerTy() &&
922 "nonnull only meaningful on pointer types");
923 Speculative = false;
Chandler Carruth63559d72015-09-13 06:47:20 +0000924
Philip Reamesa88caea2015-08-31 19:44:38 +0000925 SmallSetVector<Value *, 8> FlowsToReturn;
926 for (BasicBlock &BB : *F)
927 if (auto *Ret = dyn_cast<ReturnInst>(BB.getTerminator()))
928 FlowsToReturn.insert(Ret->getReturnValue());
929
Nuno Lopes404f1062017-09-09 18:23:11 +0000930 auto &DL = F->getParent()->getDataLayout();
931
Philip Reamesa88caea2015-08-31 19:44:38 +0000932 for (unsigned i = 0; i != FlowsToReturn.size(); ++i) {
933 Value *RetVal = FlowsToReturn[i];
934
935 // If this value is locally known to be non-null, we're good
Nuno Lopes404f1062017-09-09 18:23:11 +0000936 if (isKnownNonZero(RetVal, DL))
Philip Reamesa88caea2015-08-31 19:44:38 +0000937 continue;
938
939 // Otherwise, we need to look upwards since we can't make any local
Chandler Carruth63559d72015-09-13 06:47:20 +0000940 // conclusions.
Philip Reamesa88caea2015-08-31 19:44:38 +0000941 Instruction *RVI = dyn_cast<Instruction>(RetVal);
942 if (!RVI)
943 return false;
944 switch (RVI->getOpcode()) {
Chandler Carruth63559d72015-09-13 06:47:20 +0000945 // Extend the analysis by looking upwards.
Philip Reamesa88caea2015-08-31 19:44:38 +0000946 case Instruction::BitCast:
947 case Instruction::GetElementPtr:
948 case Instruction::AddrSpaceCast:
949 FlowsToReturn.insert(RVI->getOperand(0));
950 continue;
951 case Instruction::Select: {
952 SelectInst *SI = cast<SelectInst>(RVI);
953 FlowsToReturn.insert(SI->getTrueValue());
954 FlowsToReturn.insert(SI->getFalseValue());
955 continue;
956 }
957 case Instruction::PHI: {
958 PHINode *PN = cast<PHINode>(RVI);
959 for (int i = 0, e = PN->getNumIncomingValues(); i != e; ++i)
960 FlowsToReturn.insert(PN->getIncomingValue(i));
961 continue;
962 }
963 case Instruction::Call:
964 case Instruction::Invoke: {
965 CallSite CS(RVI);
966 Function *Callee = CS.getCalledFunction();
967 // A call to a node within the SCC is assumed to return null until
968 // proven otherwise
969 if (Callee && SCCNodes.count(Callee)) {
970 Speculative = true;
971 continue;
972 }
973 return false;
974 }
975 default:
Chandler Carruth63559d72015-09-13 06:47:20 +0000976 return false; // Unknown source, may be null
Philip Reamesa88caea2015-08-31 19:44:38 +0000977 };
978 llvm_unreachable("should have either continued or returned");
979 }
980
981 return true;
982}
983
Chandler Carrutha632fb92015-09-13 06:57:25 +0000984/// Deduce nonnull attributes for the SCC.
Sean Silva45835e72016-07-02 23:47:27 +0000985static bool addNonNullAttrs(const SCCNodeSet &SCCNodes) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000986 // Speculative that all functions in the SCC return only nonnull
987 // pointers. We may refute this as we analyze functions.
988 bool SCCReturnsNonNull = true;
989
990 bool MadeChange = false;
991
992 // Check each function in turn, determining which functions return nonnull
993 // pointers.
Chandler Carruthc518ebd2015-10-29 18:29:15 +0000994 for (Function *F : SCCNodes) {
Philip Reamesa88caea2015-08-31 19:44:38 +0000995 // Already nonnull.
Reid Klecknerb5180542017-03-21 16:57:19 +0000996 if (F->getAttributes().hasAttribute(AttributeList::ReturnIndex,
Philip Reamesa88caea2015-08-31 19:44:38 +0000997 Attribute::NonNull))
998 continue;
999
Sanjoy Das5ce32722016-04-08 00:48:30 +00001000 // We can infer and propagate function attributes only when we know that the
1001 // definition we'll get at link time is *exactly* the definition we see now.
1002 // For more details, see GlobalValue::mayBeDerefined.
1003 if (!F->hasExactDefinition())
Philip Reamesa88caea2015-08-31 19:44:38 +00001004 return false;
1005
Chandler Carruth63559d72015-09-13 06:47:20 +00001006 // We annotate nonnull return values, which are only applicable to
Philip Reamesa88caea2015-08-31 19:44:38 +00001007 // pointer types.
1008 if (!F->getReturnType()->isPointerTy())
1009 continue;
1010
1011 bool Speculative = false;
Sean Silva45835e72016-07-02 23:47:27 +00001012 if (isReturnNonNull(F, SCCNodes, Speculative)) {
Philip Reamesa88caea2015-08-31 19:44:38 +00001013 if (!Speculative) {
1014 // Mark the function eagerly since we may discover a function
1015 // which prevents us from speculating about the entire SCC
Nicola Zaghend34e60c2018-05-14 12:53:11 +00001016 LLVM_DEBUG(dbgs() << "Eagerly marking " << F->getName()
1017 << " as nonnull\n");
Reid Klecknerb5180542017-03-21 16:57:19 +00001018 F->addAttribute(AttributeList::ReturnIndex, Attribute::NonNull);
Philip Reamesa88caea2015-08-31 19:44:38 +00001019 ++NumNonNullReturn;
1020 MadeChange = true;
1021 }
1022 continue;
1023 }
1024 // At least one function returns something which could be null, can't
1025 // speculate any more.
1026 SCCReturnsNonNull = false;
1027 }
1028
1029 if (SCCReturnsNonNull) {
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001030 for (Function *F : SCCNodes) {
Reid Klecknerb5180542017-03-21 16:57:19 +00001031 if (F->getAttributes().hasAttribute(AttributeList::ReturnIndex,
Philip Reamesa88caea2015-08-31 19:44:38 +00001032 Attribute::NonNull) ||
1033 !F->getReturnType()->isPointerTy())
1034 continue;
1035
Nicola Zaghend34e60c2018-05-14 12:53:11 +00001036 LLVM_DEBUG(dbgs() << "SCC marking " << F->getName() << " as nonnull\n");
Reid Klecknerb5180542017-03-21 16:57:19 +00001037 F->addAttribute(AttributeList::ReturnIndex, Attribute::NonNull);
Philip Reamesa88caea2015-08-31 19:44:38 +00001038 ++NumNonNullReturn;
1039 MadeChange = true;
1040 }
1041 }
1042
1043 return MadeChange;
1044}
1045
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001046namespace {
1047
1048/// Collects a set of attribute inference requests and performs them all in one
1049/// go on a single SCC Node. Inference involves scanning function bodies
1050/// looking for instructions that violate attribute assumptions.
1051/// As soon as all the bodies are fine we are free to set the attribute.
1052/// Customization of inference for individual attributes is performed by
1053/// providing a handful of predicates for each attribute.
1054class AttributeInferer {
1055public:
1056 /// Describes a request for inference of a single attribute.
1057 struct InferenceDescriptor {
1058
1059 /// Returns true if this function does not have to be handled.
1060 /// General intent for this predicate is to provide an optimization
1061 /// for functions that do not need this attribute inference at all
1062 /// (say, for functions that already have the attribute).
1063 std::function<bool(const Function &)> SkipFunction;
1064
1065 /// Returns true if this instruction violates attribute assumptions.
1066 std::function<bool(Instruction &)> InstrBreaksAttribute;
1067
1068 /// Sets the inferred attribute for this function.
1069 std::function<void(Function &)> SetAttribute;
1070
1071 /// Attribute we derive.
1072 Attribute::AttrKind AKind;
1073
1074 /// If true, only "exact" definitions can be used to infer this attribute.
1075 /// See GlobalValue::isDefinitionExact.
1076 bool RequiresExactDefinition;
1077
1078 InferenceDescriptor(Attribute::AttrKind AK,
1079 std::function<bool(const Function &)> SkipFunc,
1080 std::function<bool(Instruction &)> InstrScan,
1081 std::function<void(Function &)> SetAttr,
1082 bool ReqExactDef)
1083 : SkipFunction(SkipFunc), InstrBreaksAttribute(InstrScan),
1084 SetAttribute(SetAttr), AKind(AK),
1085 RequiresExactDefinition(ReqExactDef) {}
1086 };
1087
1088private:
1089 SmallVector<InferenceDescriptor, 4> InferenceDescriptors;
1090
1091public:
1092 void registerAttrInference(InferenceDescriptor AttrInference) {
1093 InferenceDescriptors.push_back(AttrInference);
1094 }
1095
1096 bool run(const SCCNodeSet &SCCNodes);
1097};
1098
1099/// Perform all the requested attribute inference actions according to the
1100/// attribute predicates stored before.
1101bool AttributeInferer::run(const SCCNodeSet &SCCNodes) {
1102 SmallVector<InferenceDescriptor, 4> InferInSCC = InferenceDescriptors;
1103 // Go through all the functions in SCC and check corresponding attribute
1104 // assumptions for each of them. Attributes that are invalid for this SCC
1105 // will be removed from InferInSCC.
Chandler Carruth3937bc72016-02-12 09:47:49 +00001106 for (Function *F : SCCNodes) {
Justin Lebar9d943972016-03-14 20:18:54 +00001107
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001108 // No attributes whose assumptions are still valid - done.
1109 if (InferInSCC.empty())
1110 return false;
Justin Lebar9d943972016-03-14 20:18:54 +00001111
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001112 // Check if our attributes ever need scanning/can be scanned.
1113 llvm::erase_if(InferInSCC, [F](const InferenceDescriptor &ID) {
1114 if (ID.SkipFunction(*F))
Justin Lebar9d943972016-03-14 20:18:54 +00001115 return false;
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001116
1117 // Remove from further inference (invalidate) when visiting a function
1118 // that has no instructions to scan/has an unsuitable definition.
1119 return F->isDeclaration() ||
1120 (ID.RequiresExactDefinition && !F->hasExactDefinition());
1121 });
1122
1123 // For each attribute still in InferInSCC that doesn't explicitly skip F,
1124 // set up the F instructions scan to verify assumptions of the attribute.
1125 SmallVector<InferenceDescriptor, 4> InferInThisFunc;
1126 llvm::copy_if(
1127 InferInSCC, std::back_inserter(InferInThisFunc),
1128 [F](const InferenceDescriptor &ID) { return !ID.SkipFunction(*F); });
1129
1130 if (InferInThisFunc.empty())
1131 continue;
1132
1133 // Start instruction scan.
1134 for (Instruction &I : instructions(*F)) {
1135 llvm::erase_if(InferInThisFunc, [&](const InferenceDescriptor &ID) {
1136 if (!ID.InstrBreaksAttribute(I))
1137 return false;
1138 // Remove attribute from further inference on any other functions
1139 // because attribute assumptions have just been violated.
1140 llvm::erase_if(InferInSCC, [&ID](const InferenceDescriptor &D) {
1141 return D.AKind == ID.AKind;
1142 });
1143 // Remove attribute from the rest of current instruction scan.
1144 return true;
1145 });
1146
1147 if (InferInThisFunc.empty())
1148 break;
Justin Lebar9d943972016-03-14 20:18:54 +00001149 }
1150 }
1151
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001152 if (InferInSCC.empty())
1153 return false;
Justin Lebar9d943972016-03-14 20:18:54 +00001154
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001155 bool Changed = false;
1156 for (Function *F : SCCNodes)
1157 // At this point InferInSCC contains only functions that were either:
1158 // - explicitly skipped from scan/inference, or
1159 // - verified to have no instructions that break attribute assumptions.
1160 // Hence we just go and force the attribute for all non-skipped functions.
1161 for (auto &ID : InferInSCC) {
1162 if (ID.SkipFunction(*F))
1163 continue;
1164 Changed = true;
1165 ID.SetAttribute(*F);
1166 }
1167 return Changed;
1168}
Justin Lebar9d943972016-03-14 20:18:54 +00001169
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001170} // end anonymous namespace
1171
1172/// Helper for non-Convergent inference predicate InstrBreaksAttribute.
1173static bool InstrBreaksNonConvergent(Instruction &I,
1174 const SCCNodeSet &SCCNodes) {
1175 const CallSite CS(&I);
1176 // Breaks non-convergent assumption if CS is a convergent call to a function
1177 // not in the SCC.
1178 return CS && CS.isConvergent() && SCCNodes.count(CS.getCalledFunction()) == 0;
1179}
1180
1181/// Helper for NoUnwind inference predicate InstrBreaksAttribute.
1182static bool InstrBreaksNonThrowing(Instruction &I, const SCCNodeSet &SCCNodes) {
1183 if (!I.mayThrow())
1184 return false;
1185 if (const auto *CI = dyn_cast<CallInst>(&I)) {
1186 if (Function *Callee = CI->getCalledFunction()) {
1187 // I is a may-throw call to a function inside our SCC. This doesn't
1188 // invalidate our current working assumption that the SCC is no-throw; we
1189 // just have to scan that other function.
1190 if (SCCNodes.count(Callee) > 0)
1191 return false;
1192 }
Chandler Carruth3937bc72016-02-12 09:47:49 +00001193 }
Justin Lebar260854b2016-02-09 23:03:22 +00001194 return true;
1195}
1196
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001197/// Infer attributes from all functions in the SCC by scanning every
1198/// instruction for compliance to the attribute assumptions. Currently it
1199/// does:
1200/// - removal of Convergent attribute
1201/// - addition of NoUnwind attribute
1202///
1203/// Returns true if any changes to function attributes were made.
1204static bool inferAttrsFromFunctionBodies(const SCCNodeSet &SCCNodes) {
1205
1206 AttributeInferer AI;
1207
1208 // Request to remove the convergent attribute from all functions in the SCC
1209 // if every callsite within the SCC is not convergent (except for calls
1210 // to functions within the SCC).
1211 // Note: Removal of the attr from the callsites will happen in
1212 // InstCombineCalls separately.
1213 AI.registerAttrInference(AttributeInferer::InferenceDescriptor{
1214 Attribute::Convergent,
1215 // Skip non-convergent functions.
1216 [](const Function &F) { return !F.isConvergent(); },
1217 // Instructions that break non-convergent assumption.
1218 [SCCNodes](Instruction &I) {
1219 return InstrBreaksNonConvergent(I, SCCNodes);
1220 },
1221 [](Function &F) {
Nicola Zaghend34e60c2018-05-14 12:53:11 +00001222 LLVM_DEBUG(dbgs() << "Removing convergent attr from fn " << F.getName()
1223 << "\n");
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001224 F.setNotConvergent();
1225 },
1226 /* RequiresExactDefinition= */ false});
1227
1228 if (!DisableNoUnwindInference)
1229 // Request to infer nounwind attribute for all the functions in the SCC if
1230 // every callsite within the SCC is not throwing (except for calls to
1231 // functions within the SCC). Note that nounwind attribute suffers from
1232 // derefinement - results may change depending on how functions are
1233 // optimized. Thus it can be inferred only from exact definitions.
1234 AI.registerAttrInference(AttributeInferer::InferenceDescriptor{
1235 Attribute::NoUnwind,
1236 // Skip non-throwing functions.
1237 [](const Function &F) { return F.doesNotThrow(); },
1238 // Instructions that break non-throwing assumption.
1239 [SCCNodes](Instruction &I) {
1240 return InstrBreaksNonThrowing(I, SCCNodes);
1241 },
1242 [](Function &F) {
Nicola Zaghend34e60c2018-05-14 12:53:11 +00001243 LLVM_DEBUG(dbgs()
1244 << "Adding nounwind attr to fn " << F.getName() << "\n");
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001245 F.setDoesNotThrow();
1246 ++NumNoUnwind;
1247 },
1248 /* RequiresExactDefinition= */ true});
1249
1250 // Perform all the requested attribute inference actions.
1251 return AI.run(SCCNodes);
1252}
1253
James Molloy7e9bdd52015-11-12 10:55:20 +00001254static bool setDoesNotRecurse(Function &F) {
1255 if (F.doesNotRecurse())
1256 return false;
1257 F.setDoesNotRecurse();
1258 ++NumNoRecurse;
1259 return true;
1260}
1261
Chandler Carruth632d2082016-02-13 08:47:51 +00001262static bool addNoRecurseAttrs(const SCCNodeSet &SCCNodes) {
James Molloy7e9bdd52015-11-12 10:55:20 +00001263 // Try and identify functions that do not recurse.
1264
1265 // If the SCC contains multiple nodes we know for sure there is recursion.
Chandler Carruth632d2082016-02-13 08:47:51 +00001266 if (SCCNodes.size() != 1)
James Molloy7e9bdd52015-11-12 10:55:20 +00001267 return false;
1268
Chandler Carruth632d2082016-02-13 08:47:51 +00001269 Function *F = *SCCNodes.begin();
James Molloy7e9bdd52015-11-12 10:55:20 +00001270 if (!F || F->isDeclaration() || F->doesNotRecurse())
1271 return false;
1272
1273 // If all of the calls in F are identifiable and are to norecurse functions, F
1274 // is norecurse. This check also detects self-recursion as F is not currently
1275 // marked norecurse, so any called from F to F will not be marked norecurse.
Chandler Carruth632d2082016-02-13 08:47:51 +00001276 for (Instruction &I : instructions(*F))
1277 if (auto CS = CallSite(&I)) {
1278 Function *Callee = CS.getCalledFunction();
1279 if (!Callee || Callee == F || !Callee->doesNotRecurse())
1280 // Function calls a potentially recursive function.
1281 return false;
1282 }
James Molloy7e9bdd52015-11-12 10:55:20 +00001283
Chandler Carruth632d2082016-02-13 08:47:51 +00001284 // Every call was to a non-recursive function other than this function, and
1285 // we have no indirect recursion as the SCC size is one. This function cannot
1286 // recurse.
1287 return setDoesNotRecurse(*F);
James Molloy7e9bdd52015-11-12 10:55:20 +00001288}
1289
Chandler Carruthb47f8012016-03-11 11:05:24 +00001290PreservedAnalyses PostOrderFunctionAttrsPass::run(LazyCallGraph::SCC &C,
Chandler Carruth88823462016-08-24 09:37:14 +00001291 CGSCCAnalysisManager &AM,
1292 LazyCallGraph &CG,
1293 CGSCCUpdateResult &) {
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001294 FunctionAnalysisManager &FAM =
Chandler Carruth88823462016-08-24 09:37:14 +00001295 AM.getResult<FunctionAnalysisManagerCGSCCProxy>(C, CG).getManager();
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001296
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001297 // We pass a lambda into functions to wire them up to the analysis manager
1298 // for getting function analyses.
1299 auto AARGetter = [&](Function &F) -> AAResults & {
1300 return FAM.getResult<AAManager>(F);
1301 };
1302
1303 // Fill SCCNodes with the elements of the SCC. Also track whether there are
1304 // any external or opt-none nodes that will prevent us from optimizing any
1305 // part of the SCC.
1306 SCCNodeSet SCCNodes;
1307 bool HasUnknownCall = false;
1308 for (LazyCallGraph::Node &N : C) {
1309 Function &F = N.getFunction();
Luke Cheeseman6c1e6bb2018-02-22 14:42:08 +00001310 if (F.hasFnAttribute(Attribute::OptimizeNone) ||
1311 F.hasFnAttribute(Attribute::Naked)) {
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001312 // Treat any function we're trying not to optimize as if it were an
1313 // indirect call and omit it from the node set used below.
1314 HasUnknownCall = true;
1315 continue;
1316 }
1317 // Track whether any functions in this SCC have an unknown call edge.
1318 // Note: if this is ever a performance hit, we can common it with
1319 // subsequent routines which also do scans over the instructions of the
1320 // function.
1321 if (!HasUnknownCall)
1322 for (Instruction &I : instructions(F))
1323 if (auto CS = CallSite(&I))
1324 if (!CS.getCalledFunction()) {
1325 HasUnknownCall = true;
1326 break;
1327 }
1328
1329 SCCNodes.insert(&F);
1330 }
1331
1332 bool Changed = false;
David Majnemer5246e0b2016-07-19 18:50:26 +00001333 Changed |= addArgumentReturnedAttrs(SCCNodes);
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001334 Changed |= addReadAttrs(SCCNodes, AARGetter);
1335 Changed |= addArgumentAttrs(SCCNodes);
1336
1337 // If we have no external nodes participating in the SCC, we can deduce some
1338 // more precise attributes as well.
1339 if (!HasUnknownCall) {
1340 Changed |= addNoAliasAttrs(SCCNodes);
Sean Silva45835e72016-07-02 23:47:27 +00001341 Changed |= addNonNullAttrs(SCCNodes);
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001342 Changed |= inferAttrsFromFunctionBodies(SCCNodes);
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001343 Changed |= addNoRecurseAttrs(SCCNodes);
1344 }
1345
1346 return Changed ? PreservedAnalyses::none() : PreservedAnalyses::all();
1347}
1348
1349namespace {
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001350
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001351struct PostOrderFunctionAttrsLegacyPass : public CallGraphSCCPass {
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001352 // Pass identification, replacement for typeid
1353 static char ID;
1354
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001355 PostOrderFunctionAttrsLegacyPass() : CallGraphSCCPass(ID) {
Chad Rosier611b73b2016-11-07 16:28:04 +00001356 initializePostOrderFunctionAttrsLegacyPassPass(
1357 *PassRegistry::getPassRegistry());
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001358 }
1359
1360 bool runOnSCC(CallGraphSCC &SCC) override;
1361
1362 void getAnalysisUsage(AnalysisUsage &AU) const override {
1363 AU.setPreservesCFG();
Daniel Jasperaec2fa32016-12-19 08:22:17 +00001364 AU.addRequired<AssumptionCacheTracker>();
Chandler Carruth12884f72016-03-02 15:56:53 +00001365 getAAResultsAnalysisUsage(AU);
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001366 CallGraphSCCPass::getAnalysisUsage(AU);
1367 }
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001368};
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001369
1370} // end anonymous namespace
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001371
1372char PostOrderFunctionAttrsLegacyPass::ID = 0;
1373INITIALIZE_PASS_BEGIN(PostOrderFunctionAttrsLegacyPass, "functionattrs",
1374 "Deduce function attributes", false, false)
Daniel Jasperaec2fa32016-12-19 08:22:17 +00001375INITIALIZE_PASS_DEPENDENCY(AssumptionCacheTracker)
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001376INITIALIZE_PASS_DEPENDENCY(CallGraphWrapperPass)
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001377INITIALIZE_PASS_END(PostOrderFunctionAttrsLegacyPass, "functionattrs",
1378 "Deduce function attributes", false, false)
1379
Chad Rosier611b73b2016-11-07 16:28:04 +00001380Pass *llvm::createPostOrderFunctionAttrsLegacyPass() {
1381 return new PostOrderFunctionAttrsLegacyPass();
1382}
Chandler Carruth9c4ed172016-02-18 11:03:11 +00001383
Sean Silva997cbea2016-07-03 03:35:03 +00001384template <typename AARGetterT>
1385static bool runImpl(CallGraphSCC &SCC, AARGetterT AARGetter) {
Chandler Carruthcada2d82015-10-31 00:28:37 +00001386 bool Changed = false;
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001387
1388 // Fill SCCNodes with the elements of the SCC. Used for quickly looking up
1389 // whether a given CallGraphNode is in this SCC. Also track whether there are
1390 // any external or opt-none nodes that will prevent us from optimizing any
1391 // part of the SCC.
1392 SCCNodeSet SCCNodes;
1393 bool ExternalNode = false;
Benjamin Kramer135f7352016-06-26 12:28:59 +00001394 for (CallGraphNode *I : SCC) {
1395 Function *F = I->getFunction();
Luke Cheeseman6c1e6bb2018-02-22 14:42:08 +00001396 if (!F || F->hasFnAttribute(Attribute::OptimizeNone) ||
1397 F->hasFnAttribute(Attribute::Naked)) {
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001398 // External node or function we're trying not to optimize - we both avoid
1399 // transform them and avoid leveraging information they provide.
1400 ExternalNode = true;
1401 continue;
1402 }
1403
1404 SCCNodes.insert(F);
1405 }
1406
David Blaikie6aeacaa2017-06-02 21:24:17 +00001407 // Skip it if the SCC only contains optnone functions.
1408 if (SCCNodes.empty())
1409 return Changed;
1410
David Majnemer5246e0b2016-07-19 18:50:26 +00001411 Changed |= addArgumentReturnedAttrs(SCCNodes);
Chandler Carrutha8125352015-10-30 16:48:08 +00001412 Changed |= addReadAttrs(SCCNodes, AARGetter);
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001413 Changed |= addArgumentAttrs(SCCNodes);
1414
Chandler Carruth3a040e62015-12-27 08:41:34 +00001415 // If we have no external nodes participating in the SCC, we can deduce some
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001416 // more precise attributes as well.
1417 if (!ExternalNode) {
1418 Changed |= addNoAliasAttrs(SCCNodes);
Sean Silva45835e72016-07-02 23:47:27 +00001419 Changed |= addNonNullAttrs(SCCNodes);
Fedor Sergeev6660fd02018-03-23 21:46:16 +00001420 Changed |= inferAttrsFromFunctionBodies(SCCNodes);
Chandler Carruth632d2082016-02-13 08:47:51 +00001421 Changed |= addNoRecurseAttrs(SCCNodes);
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001422 }
Chandler Carruth1926b702016-01-08 10:55:52 +00001423
James Molloy7e9bdd52015-11-12 10:55:20 +00001424 return Changed;
1425}
Chandler Carruthc518ebd2015-10-29 18:29:15 +00001426
Sean Silva997cbea2016-07-03 03:35:03 +00001427bool PostOrderFunctionAttrsLegacyPass::runOnSCC(CallGraphSCC &SCC) {
1428 if (skipSCC(SCC))
1429 return false;
Peter Collingbournecea1e4e2017-02-09 23:11:52 +00001430 return runImpl(SCC, LegacyAARGetter(*this));
Sean Silva997cbea2016-07-03 03:35:03 +00001431}
1432
Chandler Carruth1926b702016-01-08 10:55:52 +00001433namespace {
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001434
Sean Silvaf5080192016-06-12 07:48:51 +00001435struct ReversePostOrderFunctionAttrsLegacyPass : public ModulePass {
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001436 // Pass identification, replacement for typeid
1437 static char ID;
1438
Sean Silvaf5080192016-06-12 07:48:51 +00001439 ReversePostOrderFunctionAttrsLegacyPass() : ModulePass(ID) {
Chad Rosier611b73b2016-11-07 16:28:04 +00001440 initializeReversePostOrderFunctionAttrsLegacyPassPass(
1441 *PassRegistry::getPassRegistry());
Chandler Carruth1926b702016-01-08 10:55:52 +00001442 }
1443
1444 bool runOnModule(Module &M) override;
1445
1446 void getAnalysisUsage(AnalysisUsage &AU) const override {
1447 AU.setPreservesCFG();
1448 AU.addRequired<CallGraphWrapperPass>();
Mehdi Amini0ddf4042016-05-02 18:03:33 +00001449 AU.addPreserved<CallGraphWrapperPass>();
Chandler Carruth1926b702016-01-08 10:55:52 +00001450 }
1451};
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001452
1453} // end anonymous namespace
Chandler Carruth1926b702016-01-08 10:55:52 +00001454
Sean Silvaf5080192016-06-12 07:48:51 +00001455char ReversePostOrderFunctionAttrsLegacyPass::ID = 0;
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001456
Sean Silvaf5080192016-06-12 07:48:51 +00001457INITIALIZE_PASS_BEGIN(ReversePostOrderFunctionAttrsLegacyPass, "rpo-functionattrs",
Chandler Carruth1926b702016-01-08 10:55:52 +00001458 "Deduce function attributes in RPO", false, false)
1459INITIALIZE_PASS_DEPENDENCY(CallGraphWrapperPass)
Sean Silvaf5080192016-06-12 07:48:51 +00001460INITIALIZE_PASS_END(ReversePostOrderFunctionAttrsLegacyPass, "rpo-functionattrs",
Chandler Carruth1926b702016-01-08 10:55:52 +00001461 "Deduce function attributes in RPO", false, false)
1462
1463Pass *llvm::createReversePostOrderFunctionAttrsPass() {
Sean Silvaf5080192016-06-12 07:48:51 +00001464 return new ReversePostOrderFunctionAttrsLegacyPass();
Chandler Carruth1926b702016-01-08 10:55:52 +00001465}
1466
1467static bool addNoRecurseAttrsTopDown(Function &F) {
1468 // We check the preconditions for the function prior to calling this to avoid
1469 // the cost of building up a reversible post-order list. We assert them here
1470 // to make sure none of the invariants this relies on were violated.
1471 assert(!F.isDeclaration() && "Cannot deduce norecurse without a definition!");
1472 assert(!F.doesNotRecurse() &&
1473 "This function has already been deduced as norecurs!");
1474 assert(F.hasInternalLinkage() &&
1475 "Can only do top-down deduction for internal linkage functions!");
1476
1477 // If F is internal and all of its uses are calls from a non-recursive
1478 // functions, then none of its calls could in fact recurse without going
1479 // through a function marked norecurse, and so we can mark this function too
1480 // as norecurse. Note that the uses must actually be calls -- otherwise
1481 // a pointer to this function could be returned from a norecurse function but
1482 // this function could be recursively (indirectly) called. Note that this
1483 // also detects if F is directly recursive as F is not yet marked as
1484 // a norecurse function.
1485 for (auto *U : F.users()) {
1486 auto *I = dyn_cast<Instruction>(U);
1487 if (!I)
1488 return false;
1489 CallSite CS(I);
1490 if (!CS || !CS.getParent()->getParent()->doesNotRecurse())
1491 return false;
1492 }
1493 return setDoesNotRecurse(F);
1494}
1495
Sean Silvaadc79392016-06-12 05:44:51 +00001496static bool deduceFunctionAttributeInRPO(Module &M, CallGraph &CG) {
Chandler Carruth1926b702016-01-08 10:55:52 +00001497 // We only have a post-order SCC traversal (because SCCs are inherently
1498 // discovered in post-order), so we accumulate them in a vector and then walk
1499 // it in reverse. This is simpler than using the RPO iterator infrastructure
1500 // because we need to combine SCC detection and the PO walk of the call
1501 // graph. We can also cheat egregiously because we're primarily interested in
1502 // synthesizing norecurse and so we can only save the singular SCCs as SCCs
1503 // with multiple functions in them will clearly be recursive.
Chandler Carruth1926b702016-01-08 10:55:52 +00001504 SmallVector<Function *, 16> Worklist;
1505 for (scc_iterator<CallGraph *> I = scc_begin(&CG); !I.isAtEnd(); ++I) {
1506 if (I->size() != 1)
1507 continue;
1508
1509 Function *F = I->front()->getFunction();
1510 if (F && !F->isDeclaration() && !F->doesNotRecurse() &&
1511 F->hasInternalLinkage())
1512 Worklist.push_back(F);
1513 }
1514
James Molloy7e9bdd52015-11-12 10:55:20 +00001515 bool Changed = false;
Eugene Zelenkof27d1612017-10-19 21:21:30 +00001516 for (auto *F : llvm::reverse(Worklist))
Chandler Carruth1926b702016-01-08 10:55:52 +00001517 Changed |= addNoRecurseAttrsTopDown(*F);
1518
Duncan Sands44c8cd92008-12-31 16:14:43 +00001519 return Changed;
1520}
Sean Silvaadc79392016-06-12 05:44:51 +00001521
Sean Silvaf5080192016-06-12 07:48:51 +00001522bool ReversePostOrderFunctionAttrsLegacyPass::runOnModule(Module &M) {
Sean Silvaadc79392016-06-12 05:44:51 +00001523 if (skipModule(M))
1524 return false;
1525
1526 auto &CG = getAnalysis<CallGraphWrapperPass>().getCallGraph();
1527
1528 return deduceFunctionAttributeInRPO(M, CG);
1529}
Sean Silvaf5080192016-06-12 07:48:51 +00001530
1531PreservedAnalyses
Sean Silvafd03ac62016-08-09 00:28:38 +00001532ReversePostOrderFunctionAttrsPass::run(Module &M, ModuleAnalysisManager &AM) {
Sean Silvaf5080192016-06-12 07:48:51 +00001533 auto &CG = AM.getResult<CallGraphAnalysis>(M);
1534
Chandler Carruth6acdca72017-01-24 12:55:57 +00001535 if (!deduceFunctionAttributeInRPO(M, CG))
Sean Silvaf5080192016-06-12 07:48:51 +00001536 return PreservedAnalyses::all();
Chandler Carruth6acdca72017-01-24 12:55:57 +00001537
Sean Silvaf5080192016-06-12 07:48:51 +00001538 PreservedAnalyses PA;
1539 PA.preserve<CallGraphAnalysis>();
1540 return PA;
1541}