blob: 9e69342e80bd207c3e4b868269bf72837d2e5766 [file] [log] [blame]
Chris Lattner7d58f8d2002-08-22 18:25:32 +00001//===- AliasAnalysis.cpp - Generic Alias Analysis Interface Implementation -==//
Misha Brukman01808ca2005-04-21 21:13:18 +00002//
John Criswell482202a2003-10-20 19:43:21 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattnerf3ebc3f2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Misha Brukman01808ca2005-04-21 21:13:18 +00007//
John Criswell482202a2003-10-20 19:43:21 +00008//===----------------------------------------------------------------------===//
Chris Lattner7d58f8d2002-08-22 18:25:32 +00009//
10// This file implements the generic AliasAnalysis interface which is used as the
11// common interface used by all clients and implementations of alias analysis.
12//
13// This file also implements the default version of the AliasAnalysis interface
14// that is to be used when no other implementation is specified. This does some
15// simple tests that detect obvious cases: two different global pointers cannot
16// alias, a global cannot alias a malloc, two different mallocs cannot alias,
17// etc.
18//
19// This alias analysis implementation really isn't very good for anything, but
20// it is very fast, and makes a nice clean default implementation. Because it
21// handles lots of little corner cases, other, more complex, alias analysis
22// implementations may choose to rely on this pass to resolve these simple and
23// easy cases.
24//
25//===----------------------------------------------------------------------===//
26
Chris Lattnerd6a2a992003-02-26 19:41:54 +000027#include "llvm/Analysis/AliasAnalysis.h"
Nick Lewycky0b682452013-07-27 01:24:00 +000028#include "llvm/Analysis/CFG.h"
Chandler Carruth8a8cd2b2014-01-07 11:48:04 +000029#include "llvm/Analysis/CaptureTracking.h"
Chandler Carruth62d42152015-01-15 02:16:27 +000030#include "llvm/Analysis/TargetLibraryInfo.h"
Chad Rosiera968caf2012-05-14 20:35:04 +000031#include "llvm/Analysis/ValueTracking.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000032#include "llvm/IR/BasicBlock.h"
33#include "llvm/IR/DataLayout.h"
Chandler Carruth5ad5f152014-01-13 09:26:24 +000034#include "llvm/IR/Dominators.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000035#include "llvm/IR/Function.h"
36#include "llvm/IR/Instructions.h"
37#include "llvm/IR/IntrinsicInst.h"
38#include "llvm/IR/LLVMContext.h"
39#include "llvm/IR/Type.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000040#include "llvm/Pass.h"
Chris Lattnera67dbd02004-03-15 04:07:29 +000041using namespace llvm;
Brian Gaeke960707c2003-11-11 22:41:34 +000042
Chris Lattner7d58f8d2002-08-22 18:25:32 +000043// Register the AliasAnalysis interface, providing a nice name to refer to.
Owen Anderson6c18d1a2010-10-19 17:21:58 +000044INITIALIZE_ANALYSIS_GROUP(AliasAnalysis, "Alias Analysis", NoAA)
Devang Patel8c78a0b2007-05-03 01:11:54 +000045char AliasAnalysis::ID = 0;
Chris Lattner7d58f8d2002-08-22 18:25:32 +000046
Chris Lattner62c37002004-05-23 21:15:48 +000047//===----------------------------------------------------------------------===//
48// Default chaining methods
49//===----------------------------------------------------------------------===//
50
Chandler Carruthc3f49eb2015-06-22 02:16:51 +000051AliasResult AliasAnalysis::alias(const MemoryLocation &LocA,
52 const MemoryLocation &LocB) {
Chris Lattner62c37002004-05-23 21:15:48 +000053 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Dan Gohman41f14cf2010-09-14 21:25:10 +000054 return AA->alias(LocA, LocB);
Chris Lattner62c37002004-05-23 21:15:48 +000055}
56
Chandler Carruthac80dc72015-06-17 07:18:54 +000057bool AliasAnalysis::pointsToConstantMemory(const MemoryLocation &Loc,
Dan Gohman9130bad2010-11-08 16:45:26 +000058 bool OrLocal) {
Chris Lattner62c37002004-05-23 21:15:48 +000059 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Dan Gohman9130bad2010-11-08 16:45:26 +000060 return AA->pointsToConstantMemory(Loc, OrLocal);
Chris Lattner62c37002004-05-23 21:15:48 +000061}
62
Chandler Carruth194f59c2015-07-22 23:15:57 +000063ModRefInfo AliasAnalysis::getArgModRefInfo(ImmutableCallSite CS,
64 unsigned ArgIdx) {
Hal Finkel354e23b2014-07-17 01:28:25 +000065 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Chandler Carruthc41404a2015-06-17 07:12:40 +000066 return AA->getArgModRefInfo(CS, ArgIdx);
Hal Finkel354e23b2014-07-17 01:28:25 +000067}
68
Chandler Carruth194f59c2015-07-22 23:15:57 +000069ModRefInfo AliasAnalysis::getModRefInfo(Instruction *I,
70 ImmutableCallSite Call) {
Daniel Berlin8de312d2015-04-13 23:25:41 +000071 // We may have two calls
72 if (auto CS = ImmutableCallSite(I)) {
73 // Check if the two calls modify the same memory
74 return getModRefInfo(Call, CS);
75 } else {
76 // Otherwise, check if the call modifies or references the
77 // location this memory access defines. The best we can say
78 // is that if the call references what this instruction
79 // defines, it must be clobbered by this location.
Chandler Carruthac80dc72015-06-17 07:18:54 +000080 const MemoryLocation DefLoc = MemoryLocation::get(I);
Chandler Carruth194f59c2015-07-22 23:15:57 +000081 if (getModRefInfo(Call, DefLoc) != MRI_NoModRef)
82 return MRI_ModRef;
Daniel Berlin8de312d2015-04-13 23:25:41 +000083 }
Chandler Carruth194f59c2015-07-22 23:15:57 +000084 return MRI_NoModRef;
Daniel Berlin8de312d2015-04-13 23:25:41 +000085}
Owen Andersonb6e4ff02011-01-03 21:38:41 +000086
Chandler Carruth194f59c2015-07-22 23:15:57 +000087ModRefInfo AliasAnalysis::getModRefInfo(ImmutableCallSite CS,
88 const MemoryLocation &Loc) {
Dan Gohman1033ce62010-10-25 16:28:57 +000089 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Dan Gohman5f1702e2010-08-06 01:25:49 +000090
Chandler Carruth194f59c2015-07-22 23:15:57 +000091 auto MRB = getModRefBehavior(CS);
92 if (MRB == FMRB_DoesNotAccessMemory)
93 return MRI_NoModRef;
Dan Gohman5f1702e2010-08-06 01:25:49 +000094
Chandler Carruth194f59c2015-07-22 23:15:57 +000095 ModRefInfo Mask = MRI_ModRef;
Dan Gohman5d06f892010-11-09 20:06:55 +000096 if (onlyReadsMemory(MRB))
Chandler Carruth194f59c2015-07-22 23:15:57 +000097 Mask = MRI_Ref;
Dan Gohman5d06f892010-11-09 20:06:55 +000098
Dan Gohman066c1bb2010-11-10 18:17:28 +000099 if (onlyAccessesArgPointees(MRB)) {
Dan Gohman5f1702e2010-08-06 01:25:49 +0000100 bool doesAlias = false;
Chandler Carruth194f59c2015-07-22 23:15:57 +0000101 ModRefInfo AllArgsMask = MRI_NoModRef;
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000102 if (doesAccessArgPointees(MRB)) {
Dan Gohman066c1bb2010-11-10 18:17:28 +0000103 for (ImmutableCallSite::arg_iterator AI = CS.arg_begin(), AE = CS.arg_end();
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000104 AI != AE; ++AI) {
105 const Value *Arg = *AI;
106 if (!Arg->getType()->isPointerTy())
107 continue;
Chandler Carruthc41404a2015-06-17 07:12:40 +0000108 unsigned ArgIdx = std::distance(CS.arg_begin(), AI);
Chandler Carruthac80dc72015-06-17 07:18:54 +0000109 MemoryLocation ArgLoc =
110 MemoryLocation::getForArgument(CS, ArgIdx, *TLI);
Chandler Carruthc41404a2015-06-17 07:12:40 +0000111 if (!isNoAlias(ArgLoc, Loc)) {
Chandler Carruth194f59c2015-07-22 23:15:57 +0000112 ModRefInfo ArgMask = getArgModRefInfo(CS, ArgIdx);
Dan Gohman066c1bb2010-11-10 18:17:28 +0000113 doesAlias = true;
Chandler Carruth194f59c2015-07-22 23:15:57 +0000114 AllArgsMask = ModRefInfo(AllArgsMask | ArgMask);
Dan Gohman066c1bb2010-11-10 18:17:28 +0000115 }
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000116 }
117 }
Dan Gohman5f1702e2010-08-06 01:25:49 +0000118 if (!doesAlias)
Chandler Carruth194f59c2015-07-22 23:15:57 +0000119 return MRI_NoModRef;
120 Mask = ModRefInfo(Mask & AllArgsMask);
Dan Gohman5f1702e2010-08-06 01:25:49 +0000121 }
122
Dan Gohman41f14cf2010-09-14 21:25:10 +0000123 // If Loc is a constant memory location, the call definitely could not
Dan Gohman5f1702e2010-08-06 01:25:49 +0000124 // modify the memory location.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000125 if ((Mask & MRI_Mod) && pointsToConstantMemory(Loc))
126 Mask = ModRefInfo(Mask & ~MRI_Mod);
Dan Gohman5f1702e2010-08-06 01:25:49 +0000127
Dan Gohmanabaf2d82010-10-25 16:29:52 +0000128 // If this is the end of the chain, don't forward.
Dan Gohman5f1702e2010-08-06 01:25:49 +0000129 if (!AA) return Mask;
130
131 // Otherwise, fall back to the next AA in the chain. But we can merge
132 // in any mask we've managed to compute.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000133 return ModRefInfo(AA->getModRefInfo(CS, Loc) & Mask);
Dan Gohman5f1702e2010-08-06 01:25:49 +0000134}
135
Chandler Carruth194f59c2015-07-22 23:15:57 +0000136ModRefInfo AliasAnalysis::getModRefInfo(ImmutableCallSite CS1,
137 ImmutableCallSite CS2) {
Dan Gohman1033ce62010-10-25 16:28:57 +0000138 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Dan Gohman5f1702e2010-08-06 01:25:49 +0000139
140 // If CS1 or CS2 are readnone, they don't interact.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000141 auto CS1B = getModRefBehavior(CS1);
142 if (CS1B == FMRB_DoesNotAccessMemory)
143 return MRI_NoModRef;
Dan Gohman5f1702e2010-08-06 01:25:49 +0000144
Chandler Carruth194f59c2015-07-22 23:15:57 +0000145 auto CS2B = getModRefBehavior(CS2);
146 if (CS2B == FMRB_DoesNotAccessMemory)
147 return MRI_NoModRef;
Dan Gohman5f1702e2010-08-06 01:25:49 +0000148
149 // If they both only read from memory, there is no dependence.
Dan Gohman5d06f892010-11-09 20:06:55 +0000150 if (onlyReadsMemory(CS1B) && onlyReadsMemory(CS2B))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000151 return MRI_NoModRef;
Dan Gohman5f1702e2010-08-06 01:25:49 +0000152
Chandler Carruth194f59c2015-07-22 23:15:57 +0000153 ModRefInfo Mask = MRI_ModRef;
Dan Gohman5f1702e2010-08-06 01:25:49 +0000154
155 // If CS1 only reads memory, the only dependence on CS2 can be
156 // from CS1 reading memory written by CS2.
Dan Gohman5d06f892010-11-09 20:06:55 +0000157 if (onlyReadsMemory(CS1B))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000158 Mask = ModRefInfo(Mask & MRI_Ref);
Dan Gohman5f1702e2010-08-06 01:25:49 +0000159
160 // If CS2 only access memory through arguments, accumulate the mod/ref
161 // information from CS1's references to the memory referenced by
162 // CS2's arguments.
Dan Gohman066c1bb2010-11-10 18:17:28 +0000163 if (onlyAccessesArgPointees(CS2B)) {
Chandler Carruth194f59c2015-07-22 23:15:57 +0000164 ModRefInfo R = MRI_NoModRef;
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000165 if (doesAccessArgPointees(CS2B)) {
Dan Gohman066c1bb2010-11-10 18:17:28 +0000166 for (ImmutableCallSite::arg_iterator
167 I = CS2.arg_begin(), E = CS2.arg_end(); I != E; ++I) {
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000168 const Value *Arg = *I;
169 if (!Arg->getType()->isPointerTy())
170 continue;
Chandler Carruthc41404a2015-06-17 07:12:40 +0000171 unsigned CS2ArgIdx = std::distance(CS2.arg_begin(), I);
Chandler Carruthac80dc72015-06-17 07:18:54 +0000172 auto CS2ArgLoc = MemoryLocation::getForArgument(CS2, CS2ArgIdx, *TLI);
Chandler Carruthc41404a2015-06-17 07:12:40 +0000173
174 // ArgMask indicates what CS2 might do to CS2ArgLoc, and the dependence of
Hal Finkel354e23b2014-07-17 01:28:25 +0000175 // CS1 on that location is the inverse.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000176 ModRefInfo ArgMask = getArgModRefInfo(CS2, CS2ArgIdx);
177 if (ArgMask == MRI_Mod)
178 ArgMask = MRI_ModRef;
179 else if (ArgMask == MRI_Ref)
180 ArgMask = MRI_Mod;
Hal Finkel354e23b2014-07-17 01:28:25 +0000181
Chandler Carruth194f59c2015-07-22 23:15:57 +0000182 R = ModRefInfo((R | (getModRefInfo(CS1, CS2ArgLoc) & ArgMask)) & Mask);
Dan Gohman066c1bb2010-11-10 18:17:28 +0000183 if (R == Mask)
184 break;
185 }
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000186 }
Dan Gohman5f1702e2010-08-06 01:25:49 +0000187 return R;
188 }
189
190 // If CS1 only accesses memory through arguments, check if CS2 references
191 // any of the memory referenced by CS1's arguments. If not, return NoModRef.
Dan Gohman066c1bb2010-11-10 18:17:28 +0000192 if (onlyAccessesArgPointees(CS1B)) {
Chandler Carruth194f59c2015-07-22 23:15:57 +0000193 ModRefInfo R = MRI_NoModRef;
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000194 if (doesAccessArgPointees(CS1B)) {
Dan Gohman066c1bb2010-11-10 18:17:28 +0000195 for (ImmutableCallSite::arg_iterator
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000196 I = CS1.arg_begin(), E = CS1.arg_end(); I != E; ++I) {
197 const Value *Arg = *I;
198 if (!Arg->getType()->isPointerTy())
199 continue;
Chandler Carruthc41404a2015-06-17 07:12:40 +0000200 unsigned CS1ArgIdx = std::distance(CS1.arg_begin(), I);
Chandler Carruthac80dc72015-06-17 07:18:54 +0000201 auto CS1ArgLoc = MemoryLocation::getForArgument(CS1, CS1ArgIdx, *TLI);
Chandler Carruthc41404a2015-06-17 07:12:40 +0000202
203 // ArgMask indicates what CS1 might do to CS1ArgLoc; if CS1 might Mod
204 // CS1ArgLoc, then we care about either a Mod or a Ref by CS2. If CS1
NAKAMURA Takumi335a7bc2014-10-28 11:53:30 +0000205 // might Ref, then we care only about a Mod by CS2.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000206 ModRefInfo ArgMask = getArgModRefInfo(CS1, CS1ArgIdx);
207 ModRefInfo ArgR = getModRefInfo(CS2, CS1ArgLoc);
208 if (((ArgMask & MRI_Mod) != MRI_NoModRef &&
209 (ArgR & MRI_ModRef) != MRI_NoModRef) ||
210 ((ArgMask & MRI_Ref) != MRI_NoModRef &&
211 (ArgR & MRI_Mod) != MRI_NoModRef))
212 R = ModRefInfo((R | ArgMask) & Mask);
Hal Finkel354e23b2014-07-17 01:28:25 +0000213
214 if (R == Mask)
Dan Gohman066c1bb2010-11-10 18:17:28 +0000215 break;
Dan Gohman39b3a1e2011-04-27 18:39:03 +0000216 }
217 }
Hal Finkel354e23b2014-07-17 01:28:25 +0000218 return R;
Dan Gohman5f1702e2010-08-06 01:25:49 +0000219 }
220
Dan Gohmanabaf2d82010-10-25 16:29:52 +0000221 // If this is the end of the chain, don't forward.
Dan Gohman5f1702e2010-08-06 01:25:49 +0000222 if (!AA) return Mask;
223
224 // Otherwise, fall back to the next AA in the chain. But we can merge
225 // in any mask we've managed to compute.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000226 return ModRefInfo(AA->getModRefInfo(CS1, CS2) & Mask);
Dan Gohman5f1702e2010-08-06 01:25:49 +0000227}
228
Chandler Carruth194f59c2015-07-22 23:15:57 +0000229FunctionModRefBehavior AliasAnalysis::getModRefBehavior(ImmutableCallSite CS) {
Dan Gohman1033ce62010-10-25 16:28:57 +0000230 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Dan Gohman5f1702e2010-08-06 01:25:49 +0000231
Chandler Carruth194f59c2015-07-22 23:15:57 +0000232 auto Min = FMRB_UnknownModRefBehavior;
Dan Gohman5f1702e2010-08-06 01:25:49 +0000233
234 // Call back into the alias analysis with the other form of getModRefBehavior
235 // to see if it can give a better response.
236 if (const Function *F = CS.getCalledFunction())
237 Min = getModRefBehavior(F);
238
Dan Gohmanabaf2d82010-10-25 16:29:52 +0000239 // If this is the end of the chain, don't forward.
Dan Gohman5f1702e2010-08-06 01:25:49 +0000240 if (!AA) return Min;
241
242 // Otherwise, fall back to the next AA in the chain. But we can merge
243 // in any result we've managed to compute.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000244 return FunctionModRefBehavior(AA->getModRefBehavior(CS) & Min);
Dan Gohman5f1702e2010-08-06 01:25:49 +0000245}
246
Chandler Carruth194f59c2015-07-22 23:15:57 +0000247FunctionModRefBehavior AliasAnalysis::getModRefBehavior(const Function *F) {
Chris Lattner62c37002004-05-23 21:15:48 +0000248 assert(AA && "AA didn't call InitializeAliasAnalysis in its run method!");
Dan Gohman5f1702e2010-08-06 01:25:49 +0000249 return AA->getModRefBehavior(F);
Chris Lattner62c37002004-05-23 21:15:48 +0000250}
251
Chris Lattner62c37002004-05-23 21:15:48 +0000252//===----------------------------------------------------------------------===//
253// AliasAnalysis non-virtual helper method implementation
254//===----------------------------------------------------------------------===//
255
Chandler Carruth194f59c2015-07-22 23:15:57 +0000256ModRefInfo AliasAnalysis::getModRefInfo(const LoadInst *L,
257 const MemoryLocation &Loc) {
Eli Friedman5494ada2011-08-15 20:54:19 +0000258 // Be conservative in the face of volatile/atomic.
259 if (!L->isUnordered())
Chandler Carruth194f59c2015-07-22 23:15:57 +0000260 return MRI_ModRef;
Dan Gohman6b4671b2010-08-06 18:11:28 +0000261
Dan Gohman52f9d7d2010-08-03 17:27:43 +0000262 // If the load address doesn't alias the given address, it doesn't read
263 // or write the specified memory.
Chandler Carruth70c61c12015-06-04 02:03:15 +0000264 if (Loc.Ptr && !alias(MemoryLocation::get(L), Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000265 return MRI_NoModRef;
Dan Gohman52f9d7d2010-08-03 17:27:43 +0000266
Dan Gohman52f9d7d2010-08-03 17:27:43 +0000267 // Otherwise, a load just reads.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000268 return MRI_Ref;
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000269}
270
Chandler Carruth194f59c2015-07-22 23:15:57 +0000271ModRefInfo AliasAnalysis::getModRefInfo(const StoreInst *S,
272 const MemoryLocation &Loc) {
Eli Friedman5494ada2011-08-15 20:54:19 +0000273 // Be conservative in the face of volatile/atomic.
274 if (!S->isUnordered())
Chandler Carruth194f59c2015-07-22 23:15:57 +0000275 return MRI_ModRef;
Dan Gohman6b4671b2010-08-06 18:11:28 +0000276
Daniel Berlinb2d22762015-04-13 23:05:45 +0000277 if (Loc.Ptr) {
278 // If the store address cannot alias the pointer in question, then the
279 // specified memory cannot be modified by the store.
Chandler Carruth70c61c12015-06-04 02:03:15 +0000280 if (!alias(MemoryLocation::get(S), Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000281 return MRI_NoModRef;
Chris Lattner96055762004-01-30 22:16:42 +0000282
Daniel Berlinb2d22762015-04-13 23:05:45 +0000283 // If the pointer is a pointer to constant memory, then it could not have
284 // been modified by this store.
285 if (pointsToConstantMemory(Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000286 return MRI_NoModRef;
Daniel Berlinb2d22762015-04-13 23:05:45 +0000287 }
Dan Gohman52f9d7d2010-08-03 17:27:43 +0000288
289 // Otherwise, a store just writes.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000290 return MRI_Mod;
Chris Lattner3a311832003-02-26 19:26:51 +0000291}
292
Chandler Carruth194f59c2015-07-22 23:15:57 +0000293ModRefInfo AliasAnalysis::getModRefInfo(const VAArgInst *V,
294 const MemoryLocation &Loc) {
Dan Gohmane68958f2010-08-06 18:24:38 +0000295
Daniel Berlinec1de3f2015-04-28 19:19:14 +0000296 if (Loc.Ptr) {
297 // If the va_arg address cannot alias the pointer in question, then the
298 // specified memory cannot be accessed by the va_arg.
Chandler Carruth70c61c12015-06-04 02:03:15 +0000299 if (!alias(MemoryLocation::get(V), Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000300 return MRI_NoModRef;
Daniel Berlinec1de3f2015-04-28 19:19:14 +0000301
302 // If the pointer is a pointer to constant memory, then it could not have
303 // been modified by this va_arg.
304 if (pointsToConstantMemory(Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000305 return MRI_NoModRef;
Daniel Berlinec1de3f2015-04-28 19:19:14 +0000306 }
Dan Gohmane68958f2010-08-06 18:24:38 +0000307
308 // Otherwise, a va_arg reads and writes.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000309 return MRI_ModRef;
Dan Gohmane68958f2010-08-06 18:24:38 +0000310}
311
Chandler Carruth194f59c2015-07-22 23:15:57 +0000312ModRefInfo AliasAnalysis::getModRefInfo(const AtomicCmpXchgInst *CX,
313 const MemoryLocation &Loc) {
Eli Friedman5c918912011-09-26 20:15:28 +0000314 // Acquire/Release cmpxchg has properties that matter for arbitrary addresses.
Tim Northovere94a5182014-03-11 10:48:52 +0000315 if (CX->getSuccessOrdering() > Monotonic)
Chandler Carruth194f59c2015-07-22 23:15:57 +0000316 return MRI_ModRef;
Eli Friedman5c918912011-09-26 20:15:28 +0000317
318 // If the cmpxchg address does not alias the location, it does not access it.
Chandler Carruth70c61c12015-06-04 02:03:15 +0000319 if (Loc.Ptr && !alias(MemoryLocation::get(CX), Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000320 return MRI_NoModRef;
Eli Friedman5c918912011-09-26 20:15:28 +0000321
Chandler Carruth194f59c2015-07-22 23:15:57 +0000322 return MRI_ModRef;
Eli Friedman5c918912011-09-26 20:15:28 +0000323}
324
Chandler Carruth194f59c2015-07-22 23:15:57 +0000325ModRefInfo AliasAnalysis::getModRefInfo(const AtomicRMWInst *RMW,
326 const MemoryLocation &Loc) {
Eli Friedman5c918912011-09-26 20:15:28 +0000327 // Acquire/Release atomicrmw has properties that matter for arbitrary addresses.
328 if (RMW->getOrdering() > Monotonic)
Chandler Carruth194f59c2015-07-22 23:15:57 +0000329 return MRI_ModRef;
Eli Friedman5c918912011-09-26 20:15:28 +0000330
331 // If the atomicrmw address does not alias the location, it does not access it.
Chandler Carruth70c61c12015-06-04 02:03:15 +0000332 if (Loc.Ptr && !alias(MemoryLocation::get(RMW), Loc))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000333 return MRI_NoModRef;
Eli Friedman5c918912011-09-26 20:15:28 +0000334
Chandler Carruth194f59c2015-07-22 23:15:57 +0000335 return MRI_ModRef;
Eli Friedman5c918912011-09-26 20:15:28 +0000336}
337
Bruno Cardoso Lopesdfc1d962015-07-31 14:31:35 +0000338/// \brief Return information about whether a particular call site modifies
339/// or reads the specified memory location \p MemLoc before instruction \p I
340/// in a BasicBlock. A ordered basic block \p OBB can be used to speed up
341/// instruction-ordering queries inside the BasicBlock containing \p I.
342/// FIXME: this is really just shoring-up a deficiency in alias analysis.
343/// BasicAA isn't willing to spend linear time determining whether an alloca
344/// was captured before or after this particular call, while we are. However,
345/// with a smarter AA in place, this test is just wasting compile time.
Chandler Carruth194f59c2015-07-22 23:15:57 +0000346ModRefInfo AliasAnalysis::callCapturesBefore(const Instruction *I,
347 const MemoryLocation &MemLoc,
Bruno Cardoso Lopesdfc1d962015-07-31 14:31:35 +0000348 DominatorTree *DT,
349 OrderedBasicBlock *OBB) {
Mehdi Aminia28d91d2015-03-10 02:37:25 +0000350 if (!DT)
Chandler Carruth194f59c2015-07-22 23:15:57 +0000351 return MRI_ModRef;
Chad Rosiera968caf2012-05-14 20:35:04 +0000352
Mehdi Aminia28d91d2015-03-10 02:37:25 +0000353 const Value *Object = GetUnderlyingObject(MemLoc.Ptr, *DL);
Chad Rosiera968caf2012-05-14 20:35:04 +0000354 if (!isIdentifiedObject(Object) || isa<GlobalValue>(Object) ||
355 isa<Constant>(Object))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000356 return MRI_ModRef;
Chad Rosiera968caf2012-05-14 20:35:04 +0000357
358 ImmutableCallSite CS(I);
359 if (!CS.getInstruction() || CS.getInstruction() == Object)
Chandler Carruth194f59c2015-07-22 23:15:57 +0000360 return MRI_ModRef;
Chad Rosiera968caf2012-05-14 20:35:04 +0000361
Hal Finkelb0356212014-07-21 13:15:48 +0000362 if (llvm::PointerMayBeCapturedBefore(Object, /* ReturnCaptures */ true,
Hal Finkeld32803b2014-07-21 21:30:22 +0000363 /* StoreCaptures */ true, I, DT,
Bruno Cardoso Lopesdfc1d962015-07-31 14:31:35 +0000364 /* include Object */ true,
365 /* OrderedBasicBlock */ OBB))
Chandler Carruth194f59c2015-07-22 23:15:57 +0000366 return MRI_ModRef;
Chad Rosiera968caf2012-05-14 20:35:04 +0000367
368 unsigned ArgNo = 0;
Chandler Carruth194f59c2015-07-22 23:15:57 +0000369 ModRefInfo R = MRI_NoModRef;
Chad Rosiera968caf2012-05-14 20:35:04 +0000370 for (ImmutableCallSite::arg_iterator CI = CS.arg_begin(), CE = CS.arg_end();
371 CI != CE; ++CI, ++ArgNo) {
372 // Only look at the no-capture or byval pointer arguments. If this
373 // pointer were passed to arguments that were neither of these, then it
374 // couldn't be no-capture.
375 if (!(*CI)->getType()->isPointerTy() ||
376 (!CS.doesNotCapture(ArgNo) && !CS.isByValArgument(ArgNo)))
377 continue;
378
379 // If this is a no-capture pointer argument, see if we can tell that it
380 // is impossible to alias the pointer we're checking. If not, we have to
381 // assume that the call could touch the pointer, even though it doesn't
382 // escape.
Chandler Carruthac80dc72015-06-17 07:18:54 +0000383 if (isNoAlias(MemoryLocation(*CI), MemoryLocation(Object)))
Nick Lewyckyc0514622013-07-07 10:15:16 +0000384 continue;
385 if (CS.doesNotAccessMemory(ArgNo))
386 continue;
387 if (CS.onlyReadsMemory(ArgNo)) {
Chandler Carruth194f59c2015-07-22 23:15:57 +0000388 R = MRI_Ref;
Nick Lewyckyc0514622013-07-07 10:15:16 +0000389 continue;
Chad Rosiera968caf2012-05-14 20:35:04 +0000390 }
Chandler Carruth194f59c2015-07-22 23:15:57 +0000391 return MRI_ModRef;
Chad Rosiera968caf2012-05-14 20:35:04 +0000392 }
Nick Lewyckyc0514622013-07-07 10:15:16 +0000393 return R;
Chad Rosiera968caf2012-05-14 20:35:04 +0000394}
Eli Friedman5c918912011-09-26 20:15:28 +0000395
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000396// AliasAnalysis destructor: DO NOT move this to the header file for
397// AliasAnalysis or else clients of the AliasAnalysis class may not depend on
398// the AliasAnalysis.o file in the current .a file, causing alias analysis
399// support to not be included in the tool correctly!
400//
401AliasAnalysis::~AliasAnalysis() {}
402
Dan Gohman7a68b662008-05-30 00:02:02 +0000403/// InitializeAliasAnalysis - Subclasses must call this method to initialize the
Chris Lattner3a311832003-02-26 19:26:51 +0000404/// AliasAnalysis interface before any other methods are called.
405///
Mehdi Amini46a43552015-03-04 18:43:29 +0000406void AliasAnalysis::InitializeAliasAnalysis(Pass *P, const DataLayout *NewDL) {
407 DL = NewDL;
Chandler Carruthb98f63d2015-01-15 10:41:28 +0000408 auto *TLIP = P->getAnalysisIfAvailable<TargetLibraryInfoWrapperPass>();
409 TLI = TLIP ? &TLIP->getTLI() : nullptr;
Chris Lattner62c37002004-05-23 21:15:48 +0000410 AA = &P->getAnalysis<AliasAnalysis>();
Chris Lattner3a311832003-02-26 19:26:51 +0000411}
412
413// getAnalysisUsage - All alias analysis implementations should invoke this
Dan Gohman43d19d62009-07-25 00:48:42 +0000414// directly (using AliasAnalysis::getAnalysisUsage(AU)).
Chris Lattner3a311832003-02-26 19:26:51 +0000415void AliasAnalysis::getAnalysisUsage(AnalysisUsage &AU) const {
Chris Lattner62c37002004-05-23 21:15:48 +0000416 AU.addRequired<AliasAnalysis>(); // All AA's chain
Chris Lattner3a311832003-02-26 19:26:51 +0000417}
418
Micah Villmowcdfe20b2012-10-08 16:38:25 +0000419/// getTypeStoreSize - Return the DataLayout store size for the given type,
Dan Gohman43d19d62009-07-25 00:48:42 +0000420/// if known, or a conservative value otherwise.
421///
Chris Lattner229907c2011-07-18 04:54:35 +0000422uint64_t AliasAnalysis::getTypeStoreSize(Type *Ty) {
Chandler Carruthecbd1682015-06-17 07:21:38 +0000423 return DL ? DL->getTypeStoreSize(Ty) : MemoryLocation::UnknownSize;
Dan Gohman43d19d62009-07-25 00:48:42 +0000424}
425
Chris Lattnerd922a842002-08-22 22:46:39 +0000426/// canBasicBlockModify - Return true if it is possible for execution of the
Elena Demikhovskya5599bf2014-12-15 14:09:53 +0000427/// specified basic block to modify the location Loc.
Chris Lattnerd922a842002-08-22 22:46:39 +0000428///
Chris Lattner3a311832003-02-26 19:26:51 +0000429bool AliasAnalysis::canBasicBlockModify(const BasicBlock &BB,
Chandler Carruthac80dc72015-06-17 07:18:54 +0000430 const MemoryLocation &Loc) {
Chandler Carruth194f59c2015-07-22 23:15:57 +0000431 return canInstructionRangeModRef(BB.front(), BB.back(), Loc, MRI_Mod);
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000432}
433
Elena Demikhovskya5599bf2014-12-15 14:09:53 +0000434/// canInstructionRangeModRef - Return true if it is possible for the
435/// execution of the specified instructions to mod\ref (according to the
436/// mode) the location Loc. The instructions to consider are all
437/// of the instructions in the range of [I1,I2] INCLUSIVE.
Teresa Johnsonbbcf75e2015-05-13 15:04:14 +0000438/// I1 and I2 must be in the same basic block.
Elena Demikhovskya5599bf2014-12-15 14:09:53 +0000439bool AliasAnalysis::canInstructionRangeModRef(const Instruction &I1,
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000440 const Instruction &I2,
Chandler Carruthac80dc72015-06-17 07:18:54 +0000441 const MemoryLocation &Loc,
Chandler Carruth194f59c2015-07-22 23:15:57 +0000442 const ModRefInfo Mode) {
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000443 assert(I1.getParent() == I2.getParent() &&
444 "Instructions not in same basic block!");
Dan Gohman5442c712010-08-03 21:48:53 +0000445 BasicBlock::const_iterator I = &I1;
446 BasicBlock::const_iterator E = &I2;
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000447 ++E; // Convert from inclusive to exclusive range.
448
Chris Lattner3a311832003-02-26 19:26:51 +0000449 for (; I != E; ++I) // Check every instruction in range
Elena Demikhovskya5599bf2014-12-15 14:09:53 +0000450 if (getModRefInfo(I, Loc) & Mode)
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000451 return true;
Chris Lattner7d58f8d2002-08-22 18:25:32 +0000452 return false;
453}
454
Dan Gohmanfb306c02009-02-03 01:28:32 +0000455/// isNoAliasCall - Return true if this pointer is returned by a noalias
456/// function.
457bool llvm::isNoAliasCall(const Value *V) {
458 if (isa<CallInst>(V) || isa<InvokeInst>(V))
Dan Gohman5442c712010-08-03 21:48:53 +0000459 return ImmutableCallSite(cast<Instruction>(V))
Bill Wendling3d7b0b82012-12-19 07:18:57 +0000460 .paramHasAttr(0, Attribute::NoAlias);
Dan Gohmanfb306c02009-02-03 01:28:32 +0000461 return false;
462}
463
Michael Kupersteinf3e663a2013-05-28 08:17:48 +0000464/// isNoAliasArgument - Return true if this is an argument with the noalias
465/// attribute.
466bool llvm::isNoAliasArgument(const Value *V)
467{
468 if (const Argument *A = dyn_cast<Argument>(V))
469 return A->hasNoAliasAttr();
470 return false;
471}
472
Dan Gohmanfb306c02009-02-03 01:28:32 +0000473/// isIdentifiedObject - Return true if this pointer refers to a distinct and
474/// identifiable object. This returns true for:
Dan Gohman1f59f012009-08-27 17:52:56 +0000475/// Global Variables and Functions (but not Global Aliases)
Dan Gohmanfb306c02009-02-03 01:28:32 +0000476/// Allocas and Mallocs
Dan Gohman00ef9322010-07-07 14:27:09 +0000477/// ByVal and NoAlias Arguments
478/// NoAlias returns
Dan Gohmanfb306c02009-02-03 01:28:32 +0000479///
Dan Gohman00ef9322010-07-07 14:27:09 +0000480bool llvm::isIdentifiedObject(const Value *V) {
Dan Gohman0824aff2010-06-29 00:50:39 +0000481 if (isa<AllocaInst>(V))
Dan Gohman1f59f012009-08-27 17:52:56 +0000482 return true;
483 if (isa<GlobalValue>(V) && !isa<GlobalAlias>(V))
Dan Gohmanfb306c02009-02-03 01:28:32 +0000484 return true;
Dan Gohman00ef9322010-07-07 14:27:09 +0000485 if (isNoAliasCall(V))
486 return true;
487 if (const Argument *A = dyn_cast<Argument>(V))
488 return A->hasNoAliasAttr() || A->hasByValAttr();
Dan Gohmanfb306c02009-02-03 01:28:32 +0000489 return false;
490}
Hal Finkelc782aa52014-07-21 12:27:23 +0000491
492/// isIdentifiedFunctionLocal - Return true if V is umabigously identified
493/// at the function-level. Different IdentifiedFunctionLocals can't alias.
494/// Further, an IdentifiedFunctionLocal can not alias with any function
495/// arguments other than itself, which is not necessarily true for
496/// IdentifiedObjects.
497bool llvm::isIdentifiedFunctionLocal(const Value *V)
498{
499 return isa<AllocaInst>(V) || isNoAliasCall(V) || isNoAliasArgument(V);
500}