ipa-pure-const.c 66.7 KB
Newer Older
1
/* Callgraph based analysis of static variables.
2
   Copyright (C) 2004-2019 Free Software Foundation, Inc.
3 4 5 6 7 8
   Contributed by Kenneth Zadeck <zadeck@naturalbridge.com>

This file is part of GCC.

GCC is free software; you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by the Free
9
Software Foundation; either version 3, or (at your option) any later
10 11 12 13 14 15 16 17
version.

GCC is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
for more details.

You should have received a copy of the GNU General Public License
18 19
along with GCC; see the file COPYING3.  If not see
<http://www.gnu.org/licenses/>.  */
20

21 22 23
/* This file marks functions as being either const (TREE_READONLY) or
   pure (DECL_PURE_P).  It can also set a variant of these that
   are allowed to loop indefinitely (DECL_LOOPING_CONST_PURE_P).
24 25 26 27 28 29 30 31 32 33 34 35 36

   This must be run after inlining decisions have been made since
   otherwise, the local sets will not contain information that is
   consistent with post inlined state.  The global sets are not prone
   to this problem since they are by definition transitive.  */

/* The code in this module is called by the ipa pass manager. It
   should be one of the later passes since it's information is used by
   the rest of the compilation. */

#include "config.h"
#include "system.h"
#include "coretypes.h"
37
#include "backend.h"
38
#include "target.h"
39
#include "tree.h"
40
#include "gimple.h"
41 42 43 44
#include "tree-pass.h"
#include "tree-streamer.h"
#include "cgraph.h"
#include "diagnostic.h"
45
#include "calls.h"
46
#include "cfganal.h"
47
#include "tree-eh.h"
48 49
#include "gimple-iterator.h"
#include "gimple-walk.h"
50
#include "tree-cfg.h"
51
#include "tree-ssa-loop-niter.h"
52 53
#include "langhooks.h"
#include "ipa-utils.h"
54
#include "gimple-pretty-print.h"
55 56
#include "cfgloop.h"
#include "tree-scalar-evolution.h"
57 58
#include "intl.h"
#include "opts.h"
59 60 61 62 63
#include "ssa.h"
#include "alloc-pool.h"
#include "symbol-summary.h"
#include "ipa-prop.h"
#include "ipa-fnsummary.h"
64 65 66 67 68 69 70 71 72 73 74

/* Lattice values for const and pure functions.  Everything starts out
   being const, then may drop to pure and then neither depending on
   what is found.  */
enum pure_const_state_e
{
  IPA_CONST,
  IPA_PURE,
  IPA_NEITHER
};

75 76 77 78 79 80 81 82 83 84
static const char *pure_const_names[3] = {"const", "pure", "neither"};

enum malloc_state_e
{
  STATE_MALLOC_TOP,
  STATE_MALLOC,
  STATE_MALLOC_BOTTOM
};

static const char *malloc_state_names[] = {"malloc_top", "malloc", "malloc_bottom"};
85

Jan Hubicka committed
86 87
/* Holder for the const_state.  There is one of these per function
   decl.  */
88
class funct_state_d
89
{
90 91 92 93 94 95 96 97 98 99 100 101
public:
  funct_state_d (): pure_const_state (IPA_NEITHER),
    state_previously_known (IPA_NEITHER), looping_previously_known (true),
    looping (true), can_throw (true), can_free (true),
    malloc_state (STATE_MALLOC_BOTTOM) {}

  funct_state_d (const funct_state_d &s): pure_const_state (s.pure_const_state),
    state_previously_known (s.state_previously_known),
    looping_previously_known (s.looping_previously_known),
    looping (s.looping), can_throw (s.can_throw), can_free (s.can_free),
    malloc_state (s.malloc_state) {}

Jan Hubicka committed
102
  /* See above.  */
103
  enum pure_const_state_e pure_const_state;
104
  /* What user set here; we can be always sure about this.  */
H.J. Lu committed
105 106
  enum pure_const_state_e state_previously_known;
  bool looping_previously_known;
Jan Hubicka committed
107 108 109 110 111 112 113

  /* True if the function could possibly infinite loop.  There are a
     lot of ways that this could be determined.  We are pretty
     conservative here.  While it is possible to cse pure and const
     calls, it is not legal to have dce get rid of the call if there
     is a possibility that the call could infinite loop since this is
     a behavioral change.  */
Kenneth Zadeck committed
114
  bool looping;
Jan Hubicka committed
115

116
  bool can_throw;
117 118 119 120

  /* If function can call free, munmap or otherwise make previously
     non-trapping memory accesses trapping.  */
  bool can_free;
121 122

  enum malloc_state_e malloc_state;
123 124
};

125
typedef class funct_state_d * funct_state;
126

Jan Hubicka committed
127 128
/* The storage of the funct_state is abstracted because there is the
   possibility that it may be desirable to move this to the cgraph
H.J. Lu committed
129
   local info.  */
Jan Hubicka committed
130

131 132
class funct_state_summary_t:
  public fast_function_summary <funct_state_d *, va_heap>
133 134 135
{
public:
  funct_state_summary_t (symbol_table *symtab):
136
    fast_function_summary <funct_state_d *, va_heap> (symtab) {}
137 138 139 140 141 142

  virtual void insert (cgraph_node *, funct_state_d *state);
  virtual void duplicate (cgraph_node *src_node, cgraph_node *dst_node,
			  funct_state_d *src_data,
			  funct_state_d *dst_data);
};
Jan Hubicka committed
143

144
static funct_state_summary_t *funct_state_summaries = NULL;
Jan Hubicka committed
145

146 147
static bool gate_pure_const (void);

148 149 150
namespace {

const pass_data pass_data_ipa_pure_const =
151 152 153 154 155 156 157 158 159 160 161 162
{
  IPA_PASS, /* type */
  "pure-const", /* name */
  OPTGROUP_NONE, /* optinfo_flags */
  TV_IPA_PURE_CONST, /* tv_id */
  0, /* properties_required */
  0, /* properties_provided */
  0, /* properties_destroyed */
  0, /* todo_flags_start */
  0, /* todo_flags_finish */
};

163
class pass_ipa_pure_const : public ipa_opt_pass_d
164 165 166 167 168 169 170 171 172 173 174 175 176 177
{
public:
  pass_ipa_pure_const(gcc::context *ctxt);

  /* opt_pass methods: */
  bool gate (function *) { return gate_pure_const (); }
  unsigned int execute (function *fun);

  void register_hooks (void);

private:
  bool init_p;
}; // class pass_ipa_pure_const

178 179
} // anon namespace

180 181 182 183 184 185 186
/* Try to guess if function body will always be visible to compiler
   when compiling the call and whether compiler will be able
   to propagate the information by itself.  */

static bool
function_always_visible_to_compiler_p (tree decl)
{
187 188
  return (!TREE_PUBLIC (decl) || DECL_DECLARED_INLINE_P (decl)
	  || DECL_COMDAT (decl));
189 190 191 192
}

/* Emit suggestion about attribute ATTRIB_NAME for DECL.  KNOWN_FINITE
   is true if the function is known to be finite.  The diagnostic is
193
   controlled by OPTION.  WARNED_ABOUT is a hash_set<tree> unique for
194 195 196
   OPTION, this function may initialize it and it is always returned
   by the function.  */

197
static hash_set<tree> *
198
suggest_attribute (int option, tree decl, bool known_finite,
199
		   hash_set<tree> *warned_about,
200 201
		   const char * attrib_name)
{
202
  if (!option_enabled (option, lang_hooks.option_lang_mask (), &global_options))
203 204 205 206 207 208
    return warned_about;
  if (TREE_THIS_VOLATILE (decl)
      || (known_finite && function_always_visible_to_compiler_p (decl)))
    return warned_about;

  if (!warned_about)
209 210
    warned_about = new hash_set<tree>;
  if (warned_about->contains (decl))
211
    return warned_about;
212
  warned_about->add (decl);
213 214 215
  warning_at (DECL_SOURCE_LOCATION (decl),
	      option,
	      known_finite
216 217 218
	      ? G_("function might be candidate for attribute %qs")
	      : G_("function might be candidate for attribute %qs"
		   " if it is known to return normally"), attrib_name);
219 220 221 222 223 224 225 226 227
  return warned_about;
}

/* Emit suggestion about __attribute_((pure)) for DECL.  KNOWN_FINITE
   is true if the function is known to be finite.  */

static void
warn_function_pure (tree decl, bool known_finite)
{
228 229 230 231
  /* Declaring a void function pure makes no sense and is diagnosed
     by -Wattributes because calling it would have no effect.  */
  if (VOID_TYPE_P (TREE_TYPE (TREE_TYPE (decl))))
    return;
232

233 234
  static hash_set<tree> *warned_about;
  warned_about
235 236 237 238 239 240 241 242 243 244
    = suggest_attribute (OPT_Wsuggest_attribute_pure, decl,
			 known_finite, warned_about, "pure");
}

/* Emit suggestion about __attribute_((const)) for DECL.  KNOWN_FINITE
   is true if the function is known to be finite.  */

static void
warn_function_const (tree decl, bool known_finite)
{
245 246 247 248 249
  /* Declaring a void function const makes no sense is diagnosed
     by -Wattributes because calling it would have no effect.  */
  if (VOID_TYPE_P (TREE_TYPE (TREE_TYPE (decl))))
    return;

250
  static hash_set<tree> *warned_about;
251
  warned_about
252 253 254
    = suggest_attribute (OPT_Wsuggest_attribute_const, decl,
			 known_finite, warned_about, "const");
}
255

256 257 258 259 260 261 262 263
/* Emit suggestion about __attribute__((malloc)) for DECL.  */

static void
warn_function_malloc (tree decl)
{
  static hash_set<tree> *warned_about;
  warned_about
    = suggest_attribute (OPT_Wsuggest_attribute_malloc, decl,
264
			 true, warned_about, "malloc");
265 266 267 268
}

/* Emit suggestion about __attribute__((noreturn)) for DECL.  */

269
static void
270 271
warn_function_noreturn (tree decl)
{
272 273
  tree original_decl = decl;

274
  static hash_set<tree> *warned_about;
275 276
  if (!lang_hooks.missing_noreturn_ok_p (decl)
      && targetm.warn_func_return (decl))
277
    warned_about 
278
      = suggest_attribute (OPT_Wsuggest_attribute_noreturn, original_decl,
279 280
			   true, warned_about, "noreturn");
}
281

282 283 284 285 286 287 288 289 290 291 292
void
warn_function_cold (tree decl)
{
  tree original_decl = decl;

  static hash_set<tree> *warned_about;
  warned_about 
    = suggest_attribute (OPT_Wsuggest_attribute_cold, original_decl,
			 true, warned_about, "cold");
}

293
/* Check to see if the use (or definition when CHECKING_WRITE is true)
294 295
   variable T is legal in a function that is either pure or const.  */

H.J. Lu committed
296 297
static inline void
check_decl (funct_state local,
298
	    tree t, bool checking_write, bool ipa)
299 300 301
{
  /* Do not want to do anything with volatile except mark any
     function that uses one to be not const or pure.  */
H.J. Lu committed
302 303
  if (TREE_THIS_VOLATILE (t))
    {
304
      local->pure_const_state = IPA_NEITHER;
305
      if (dump_file)
306
        fprintf (dump_file, "    Volatile operand is not const/pure\n");
307 308 309 310 311 312 313
      return;
    }

  /* Do not care about a local automatic that is not static.  */
  if (!TREE_STATIC (t) && !DECL_EXTERNAL (t))
    return;

314 315
  /* If the variable has the "used" attribute, treat it as if it had a
     been touched by the devil.  */
316
  if (DECL_PRESERVE_P (t))
317 318 319 320 321 322 323
    {
      local->pure_const_state = IPA_NEITHER;
      if (dump_file)
        fprintf (dump_file, "    Used static/global variable is not const/pure\n");
      return;
    }

324 325 326 327 328
  /* In IPA mode we are not interested in checking actual loads and stores;
     they will be processed at propagation time using ipa_ref.  */
  if (ipa)
    return;

329 330 331
  /* Since we have dealt with the locals and params cases above, if we
     are CHECKING_WRITE, this cannot be a pure or constant
     function.  */
H.J. Lu committed
332
  if (checking_write)
333 334
    {
      local->pure_const_state = IPA_NEITHER;
335 336
      if (dump_file)
        fprintf (dump_file, "    static/global memory write is not const/pure\n");
337 338
      return;
    }
339 340 341

  if (DECL_EXTERNAL (t) || TREE_PUBLIC (t))
    {
342
      /* Readonly reads are safe.  */
343
      if (TREE_READONLY (t))
344
	return; /* Read of a constant, do not change the function state.  */
H.J. Lu committed
345
      else
346
	{
347 348
          if (dump_file)
            fprintf (dump_file, "    global memory read is not const\n");
349 350 351 352 353
	  /* Just a regular read.  */
	  if (local->pure_const_state == IPA_CONST)
	    local->pure_const_state = IPA_PURE;
	}
    }
354 355 356 357 358 359 360 361 362 363 364 365 366
  else
    {
      /* Compilation level statics can be read if they are readonly
	 variables.  */
      if (TREE_READONLY (t))
	return;

      if (dump_file)
	fprintf (dump_file, "    static memory read is not const\n");
      /* Just a regular read.  */
      if (local->pure_const_state == IPA_CONST)
	local->pure_const_state = IPA_PURE;
    }
367 368 369
}


370 371
/* Check to see if the use (or definition when CHECKING_WRITE is true)
   variable T is legal in a function that is either pure or const.  */
372

H.J. Lu committed
373
static inline void
374
check_op (funct_state local, tree t, bool checking_write)
375
{
376 377
  t = get_base_address (t);
  if (t && TREE_THIS_VOLATILE (t))
378
    {
379 380 381 382 383
      local->pure_const_state = IPA_NEITHER;
      if (dump_file)
	fprintf (dump_file, "    Volatile indirect ref is not const/pure\n");
      return;
    }
384
  else if (t
385
  	   && (INDIRECT_REF_P (t) || TREE_CODE (t) == MEM_REF)
386 387 388 389 390 391 392
	   && TREE_CODE (TREE_OPERAND (t, 0)) == SSA_NAME
	   && !ptr_deref_may_alias_global_p (TREE_OPERAND (t, 0)))
    {
      if (dump_file)
	fprintf (dump_file, "    Indirect ref to local memory is OK\n");
      return;
    }
393 394 395 396 397 398 399 400 401 402 403 404 405
  else if (checking_write)
    {
      local->pure_const_state = IPA_NEITHER;
      if (dump_file)
	fprintf (dump_file, "    Indirect ref write is not const/pure\n");
      return;
    }
  else
    {
      if (dump_file)
	fprintf (dump_file, "    Indirect ref read is not const\n");
      if (local->pure_const_state == IPA_CONST)
	local->pure_const_state = IPA_PURE;
406 407 408
    }
}

409 410 411 412 413 414 415 416 417 418 419
/* compute state based on ECF FLAGS and store to STATE and LOOPING.  */

static void
state_from_flags (enum pure_const_state_e *state, bool *looping,
	          int flags, bool cannot_lead_to_return)
{
  *looping = false;
  if (flags & ECF_LOOPING_CONST_OR_PURE)
    {
      *looping = true;
      if (dump_file && (dump_flags & TDF_DETAILS))
420
	fprintf (dump_file, " looping\n");
421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443
    }
  if (flags & ECF_CONST)
    {
      *state = IPA_CONST;
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, " const\n");
    }
  else if (flags & ECF_PURE)
    {
      *state = IPA_PURE;
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, " pure\n");
    }
  else if (cannot_lead_to_return)
    {
      *state = IPA_PURE;
      *looping = true;
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, " ignoring side effects->pure looping\n");
    }
  else
    {
      if (dump_file && (dump_flags & TDF_DETAILS))
444
	fprintf (dump_file, " neither\n");
445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464
      *state = IPA_NEITHER;
      *looping = true;
    }
}

/* Merge STATE and STATE2 and LOOPING and LOOPING2 and store
   into STATE and LOOPING better of the two variants.
   Be sure to merge looping correctly.  IPA_NEITHER functions
   have looping 0 even if they don't have to return.  */

static inline void
better_state (enum pure_const_state_e *state, bool *looping,
	      enum pure_const_state_e state2, bool looping2)
{
  if (state2 < *state)
    {
      if (*state == IPA_NEITHER)
	*looping = looping2;
      else
	*looping = MIN (*looping, looping2);
465
      *state = state2;
466 467 468 469 470 471
    }
  else if (state2 != IPA_NEITHER)
    *looping = MIN (*looping, looping2);
}

/* Merge STATE and STATE2 and LOOPING and LOOPING2 and store
472 473
   into STATE and LOOPING worse of the two variants.
   N is the actual node called.  */
474 475 476

static inline void
worse_state (enum pure_const_state_e *state, bool *looping,
477 478 479
	     enum pure_const_state_e state2, bool looping2,
	     struct symtab_node *from,
	     struct symtab_node *to)
480
{
481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505
  /* Consider function:

     bool a(int *p)
     {
       return *p==*p;
     }

     During early optimization we will turn this into:

     bool a(int *p)
     {
       return true;
     }

     Now if this function will be detected as CONST however when interposed it
     may end up being just pure.  We always must assume the worst scenario here.
   */
  if (*state == IPA_CONST && state2 == IPA_CONST
      && to && !TREE_READONLY (to->decl) && !to->binds_to_current_def_p (from))
    {
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, "Dropping state to PURE because call to %s may not "
		 "bind to current def.\n", to->name ());
      state2 = IPA_PURE;
    }
506 507 508 509
  *state = MAX (*state, state2);
  *looping = MAX (*looping, looping2);
}

510
/* Recognize special cases of builtins that are by themselves not pure or const
511 512
   but function using them is.  */
static bool
513
special_builtin_state (enum pure_const_state_e *state, bool *looping,
514 515 516 517 518 519 520
			tree callee)
{
  if (DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL)
    switch (DECL_FUNCTION_CODE (callee))
      {
	case BUILT_IN_RETURN:
	case BUILT_IN_UNREACHABLE:
521
	CASE_BUILT_IN_ALLOCA:
522 523 524 525 526 527 528 529 530 531
	case BUILT_IN_STACK_SAVE:
	case BUILT_IN_STACK_RESTORE:
	case BUILT_IN_EH_POINTER:
	case BUILT_IN_EH_FILTER:
	case BUILT_IN_UNWIND_RESUME:
	case BUILT_IN_CXA_END_CLEANUP:
	case BUILT_IN_EH_COPY_VALUES:
	case BUILT_IN_FRAME_ADDRESS:
	case BUILT_IN_APPLY:
	case BUILT_IN_APPLY_ARGS:
532 533
	case BUILT_IN_ASAN_BEFORE_DYNAMIC_INIT:
	case BUILT_IN_ASAN_AFTER_DYNAMIC_INIT:
534 535 536 537 538 539 540
	  *looping = false;
	  *state = IPA_CONST;
	  return true;
	case BUILT_IN_PREFETCH:
	  *looping = true;
	  *state = IPA_CONST;
	  return true;
541 542
	default:
	  break;
543 544 545 546
      }
  return false;
}

547 548 549 550 551 552 553 554
/* Check the parameters of a function call to CALL_EXPR to see if
   there are any references in the parameters that are not allowed for
   pure or const functions.  Also check to see if this is either an
   indirect call, a call outside the compilation unit, or has special
   attributes that may also effect the purity.  The CALL_EXPR node for
   the entire call expression.  */

static void
555
check_call (funct_state local, gcall *call, bool ipa)
556
{
557
  int flags = gimple_call_flags (call);
558
  tree callee_t = gimple_call_fndecl (call);
559
  bool possibly_throws = stmt_could_throw_p (cfun, call);
560
  bool possibly_throws_externally = (possibly_throws
561
  				     && stmt_can_throw_external (cfun, call));
562

563 564 565 566 567 568 569
  if (possibly_throws)
    {
      unsigned int i;
      for (i = 0; i < gimple_num_ops (call); i++)
        if (gimple_op (call, i)
	    && tree_could_throw_p (gimple_op (call, i)))
	  {
570
	    if (possibly_throws && cfun->can_throw_non_call_exceptions)
571 572 573 574 575 576 577 578 579 580 581 582 583
	      {
		if (dump_file)
		  fprintf (dump_file, "    operand can throw; looping\n");
		local->looping = true;
	      }
	    if (possibly_throws_externally)
	      {
		if (dump_file)
		  fprintf (dump_file, "    operand can throw externally\n");
		local->can_throw = true;
	      }
	  }
    }
H.J. Lu committed
584

585 586 587
  /* The const and pure flags are set by a variety of places in the
     compiler (including here).  If someone has already set the flags
     for the callee, (such as for some of the builtins) we will use
H.J. Lu committed
588 589
     them, otherwise we will compute our own information.

590 591 592 593
     Const and pure functions have less clobber effects than other
     functions so we process these first.  Otherwise if it is a call
     outside the compilation unit or an indirect call we punt.  This
     leaves local calls which will be processed by following the call
H.J. Lu committed
594
     graph.  */
595 596
  if (callee_t)
    {
597 598 599
      enum pure_const_state_e call_state;
      bool call_looping;

600 601 602 603
      if (gimple_call_builtin_p (call, BUILT_IN_NORMAL)
	  && !nonfreeing_call_p (call))
	local->can_free = true;

604
      if (special_builtin_state (&call_state, &call_looping, callee_t))
605 606
	{
	  worse_state (&local->pure_const_state, &local->looping,
607 608
		       call_state, call_looping,
		       NULL, NULL);
609 610
	  return;
	}
611 612 613
      /* When bad things happen to bad functions, they cannot be const
	 or pure.  */
      if (setjmp_call_p (callee_t))
Kenneth Zadeck committed
614
	{
615 616 617
	  if (dump_file)
	    fprintf (dump_file, "    setjmp is not const/pure\n");
          local->looping = true;
Kenneth Zadeck committed
618 619
	  local->pure_const_state = IPA_NEITHER;
	}
620 621 622 623 624 625

      if (DECL_BUILT_IN_CLASS (callee_t) == BUILT_IN_NORMAL)
	switch (DECL_FUNCTION_CODE (callee_t))
	  {
	  case BUILT_IN_LONGJMP:
	  case BUILT_IN_NONLOCAL_GOTO:
626 627
	    if (dump_file)
	      fprintf (dump_file, "    longjmp and nonlocal goto is not const/pure\n");
628
	    local->pure_const_state = IPA_NEITHER;
629
            local->looping = true;
630 631 632 633 634
	    break;
	  default:
	    break;
	  }
    }
635 636
  else if (gimple_call_internal_p (call) && !nonfreeing_call_p (call))
    local->can_free = true;
637

638
  /* When not in IPA mode, we can still handle self recursion.  */
639 640
  if (!ipa && callee_t
      && recursive_call_p (current_function_decl, callee_t))
641 642 643 644 645
    {
      if (dump_file)
        fprintf (dump_file, "    Recursive call can loop.\n");
      local->looping = true;
    }
646
  /* Either callee is unknown or we are doing local analysis.
647 648
     Look to see if there are any bits available for the callee (such as by
     declaration or because it is builtin) and process solely on the basis of
649 650 651 652
     those bits.  Handle internal calls always, those calls don't have
     corresponding cgraph edges and thus aren't processed during
     the propagation.  */
  else if (!ipa || gimple_call_internal_p (call))
653
    {
654 655
      enum pure_const_state_e call_state;
      bool call_looping;
656
      if (possibly_throws && cfun->can_throw_non_call_exceptions)
657 658 659 660 661 662 663 664 665
        {
	  if (dump_file)
	    fprintf (dump_file, "    can throw; looping\n");
          local->looping = true;
	}
      if (possibly_throws_externally)
        {
	  if (dump_file)
	    {
666 667
	      fprintf (dump_file, "    can throw externally to lp %i\n",
	      	       lookup_stmt_eh_lp (call));
668 669 670 671 672 673
	      if (callee_t)
		fprintf (dump_file, "     callee:%s\n",
			 IDENTIFIER_POINTER (DECL_ASSEMBLER_NAME (callee_t)));
	    }
          local->can_throw = true;
	}
674 675 676 677 678 679 680
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, "    checking flags for call:");
      state_from_flags (&call_state, &call_looping, flags,
			((flags & (ECF_NORETURN | ECF_NOTHROW))
			 == (ECF_NORETURN | ECF_NOTHROW))
			|| (!flag_exceptions && (flags & ECF_NORETURN)));
      worse_state (&local->pure_const_state, &local->looping,
681
		   call_state, call_looping, NULL, NULL);
682
    }
683
  /* Direct functions calls are handled by IPA propagation.  */
684 685
}

686
/* Wrapper around check_decl for loads in local more.  */
687 688

static bool
689
check_load (gimple *, tree op, tree, void *data)
690 691
{
  if (DECL_P (op))
692
    check_decl ((funct_state)data, op, false, false);
693 694 695 696 697
  else
    check_op ((funct_state)data, op, false);
  return false;
}

698
/* Wrapper around check_decl for stores in local more.  */
699 700

static bool
701
check_store (gimple *, tree op, tree, void *data)
702 703
{
  if (DECL_P (op))
704 705 706 707 708 709 710 711 712
    check_decl ((funct_state)data, op, true, false);
  else
    check_op ((funct_state)data, op, true);
  return false;
}

/* Wrapper around check_decl for loads in ipa mode.  */

static bool
713
check_ipa_load (gimple *, tree op, tree, void *data)
714 715 716 717 718 719 720 721 722 723 724
{
  if (DECL_P (op))
    check_decl ((funct_state)data, op, false, true);
  else
    check_op ((funct_state)data, op, false);
  return false;
}

/* Wrapper around check_decl for stores in ipa mode.  */

static bool
725
check_ipa_store (gimple *, tree op, tree, void *data)
726 727 728
{
  if (DECL_P (op))
    check_decl ((funct_state)data, op, true, true);
729 730 731 732 733
  else
    check_op ((funct_state)data, op, true);
  return false;
}

734 735
/* Look into pointer pointed to by GSIP and figure out what interesting side
   effects it has.  */
736 737
static void
check_stmt (gimple_stmt_iterator *gsip, funct_state local, bool ipa)
738
{
739
  gimple *stmt = gsi_stmt (*gsip);
740

741 742 743
  if (is_gimple_debug (stmt))
    return;

744 745 746 747 748 749 750 751 752 753
  /* Do consider clobber as side effects before IPA, so we rather inline
     C++ destructors and keep clobber semantics than eliminate them.

     TODO: We may get smarter during early optimizations on these and let
     functions containing only clobbers to be optimized more.  This is a common
     case of C++ destructors.  */

  if ((ipa || cfun->after_inlining) && gimple_clobber_p (stmt))
    return;

754
  if (dump_file)
755
    {
756
      fprintf (dump_file, "  scanning: ");
757
      print_gimple_stmt (dump_file, stmt, 0);
758
    }
759

760 761
  if (gimple_has_volatile_ops (stmt)
      && !gimple_clobber_p (stmt))
762 763 764 765 766 767
    {
      local->pure_const_state = IPA_NEITHER;
      if (dump_file)
	fprintf (dump_file, "    Volatile stmt is not const/pure\n");
    }

768
  /* Look for loads and stores.  */
769 770 771
  walk_stmt_load_store_ops (stmt, local,
			    ipa ? check_ipa_load : check_load,
			    ipa ? check_ipa_store :  check_store);
772 773

  if (gimple_code (stmt) != GIMPLE_CALL
774
      && stmt_could_throw_p (cfun, stmt))
775
    {
776
      if (cfun->can_throw_non_call_exceptions)
777 778
	{
	  if (dump_file)
779
	    fprintf (dump_file, "    can throw; looping\n");
780 781
	  local->looping = true;
	}
782
      if (stmt_can_throw_external (cfun, stmt))
783 784
	{
	  if (dump_file)
785
	    fprintf (dump_file, "    can throw externally\n");
786 787
	  local->can_throw = true;
	}
788 789 790
      else
	if (dump_file)
	  fprintf (dump_file, "    can throw\n");
791 792 793
    }
  switch (gimple_code (stmt))
    {
794
    case GIMPLE_CALL:
795
      check_call (local, as_a <gcall *> (stmt), ipa);
796
      break;
797
    case GIMPLE_LABEL:
798
      if (DECL_NONLOCAL (gimple_label_label (as_a <glabel *> (stmt))))
799
	/* Target of long jump. */
Kenneth Zadeck committed
800
	{
801
          if (dump_file)
802
            fprintf (dump_file, "    nonlocal label is not const/pure\n");
Kenneth Zadeck committed
803 804
	  local->pure_const_state = IPA_NEITHER;
	}
805
      break;
806
    case GIMPLE_ASM:
807
      if (gimple_asm_clobbers_memory_p (as_a <gasm *> (stmt)))
808
	{
809
	  if (dump_file)
810
	    fprintf (dump_file, "    memory asm clobber is not const/pure\n");
811 812
	  /* Abandon all hope, ye who enter here. */
	  local->pure_const_state = IPA_NEITHER;
813
	  local->can_free = true;
814
	}
815
      if (gimple_asm_volatile_p (as_a <gasm *> (stmt)))
816 817
	{
	  if (dump_file)
818
	    fprintf (dump_file, "    volatile is not const/pure\n");
819 820
	  /* Abandon all hope, ye who enter here. */
	  local->pure_const_state = IPA_NEITHER;
821 822
	  local->looping = true;
	  local->can_free = true;
823 824
	}
      return;
825 826 827 828 829
    default:
      break;
    }
}

830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875
/* Check that RETVAL is used only in STMT and in comparisons against 0.
   RETVAL is return value of the function and STMT is return stmt.  */

static bool
check_retval_uses (tree retval, gimple *stmt)
{
  imm_use_iterator use_iter;
  gimple *use_stmt;

  FOR_EACH_IMM_USE_STMT (use_stmt, use_iter, retval)
    if (gcond *cond = dyn_cast<gcond *> (use_stmt))
      {
	tree op2 = gimple_cond_rhs (cond);
	if (!integer_zerop (op2))
	  RETURN_FROM_IMM_USE_STMT (use_iter, false);
      }
    else if (gassign *ga = dyn_cast<gassign *> (use_stmt))
      {
	enum tree_code code = gimple_assign_rhs_code (ga);
	if (TREE_CODE_CLASS (code) != tcc_comparison)
	  RETURN_FROM_IMM_USE_STMT (use_iter, false);
	if (!integer_zerop (gimple_assign_rhs2 (ga)))
	  RETURN_FROM_IMM_USE_STMT (use_iter, false);
      }
    else if (is_gimple_debug (use_stmt))
      ;
    else if (use_stmt != stmt)
      RETURN_FROM_IMM_USE_STMT (use_iter, false);

  return true;
}

/* malloc_candidate_p() checks if FUN can possibly be annotated with malloc
   attribute. Currently this function does a very conservative analysis.
   FUN is considered to be a candidate if
   1) It returns a value of pointer type.
   2) SSA_NAME_DEF_STMT (return_value) is either a function call or
      a phi, and element of phi is either NULL or
      SSA_NAME_DEF_STMT(element) is function call.
   3) The return-value has immediate uses only within comparisons (gcond or gassign)
      and return_stmt (and likewise a phi arg has immediate use only within comparison
      or the phi stmt).  */

#define DUMP_AND_RETURN(reason)  \
{  \
  if (dump_file && (dump_flags & TDF_DETAILS))  \
876 877
    fprintf (dump_file, "\n%s is not a malloc candidate, reason: %s\n", \
	     (node->name()), (reason));  \
878 879 880
  return false;  \
}

881
static bool
882 883
malloc_candidate_p_1 (function *fun, tree retval, gimple *ret_stmt, bool ipa,
		      bitmap visited)
884 885
{
  cgraph_node *node = cgraph_node::get_create (fun->decl);
886 887
  if (!bitmap_set_bit (visited, SSA_NAME_VERSION (retval)))
    return true;
888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931

  if (!check_retval_uses (retval, ret_stmt))
    DUMP_AND_RETURN("Return value has uses outside return stmt"
		    " and comparisons against 0.")

  gimple *def = SSA_NAME_DEF_STMT (retval);

  if (gcall *call_stmt = dyn_cast<gcall *> (def))
    {
      tree callee_decl = gimple_call_fndecl (call_stmt);
      if (!callee_decl)
	return false;

      if (!ipa && !DECL_IS_MALLOC (callee_decl))
	DUMP_AND_RETURN("callee_decl does not have malloc attribute for"
			" non-ipa mode.")

      cgraph_edge *cs = node->get_edge (call_stmt);
      if (cs)
	{
	  ipa_call_summary *es = ipa_call_summaries->get_create (cs);
	  es->is_return_callee_uncaptured = true;
	}
    }

    else if (gphi *phi = dyn_cast<gphi *> (def))
      {
	bool all_args_zero = true;
	for (unsigned i = 0; i < gimple_phi_num_args (phi); ++i)
	  {
	    tree arg = gimple_phi_arg_def (phi, i);
	    if (integer_zerop (arg))
	      continue;

	    all_args_zero = false;
	    if (TREE_CODE (arg) != SSA_NAME)
	      DUMP_AND_RETURN ("phi arg is not SSA_NAME.");
	    if (!check_retval_uses (arg, phi))
	      DUMP_AND_RETURN ("phi arg has uses outside phi"
				 " and comparisons against 0.")

	    gimple *arg_def = SSA_NAME_DEF_STMT (arg);
	    if (is_a<gphi *> (arg_def))
	      {
932
		if (!malloc_candidate_p_1 (fun, arg, phi, ipa, visited))
933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973
		    DUMP_AND_RETURN ("nested phi fail")
		continue;
	      }

	    gcall *call_stmt = dyn_cast<gcall *> (arg_def);
	    if (!call_stmt)
	      DUMP_AND_RETURN ("phi arg is a not a call_stmt.")

	    tree callee_decl = gimple_call_fndecl (call_stmt);
	    if (!callee_decl)
	      return false;
	    if (!ipa && !DECL_IS_MALLOC (callee_decl))
	      DUMP_AND_RETURN("callee_decl does not have malloc attribute"
			      " for non-ipa mode.")

	    cgraph_edge *cs = node->get_edge (call_stmt);
	    if (cs)
	      {
		ipa_call_summary *es = ipa_call_summaries->get_create (cs);
		es->is_return_callee_uncaptured = true;
	      }
	  }

	if (all_args_zero)
	  DUMP_AND_RETURN ("Return value is a phi with all args equal to 0.")
      }

    else
      DUMP_AND_RETURN("def_stmt of return value is not a call or phi-stmt.")

  return true;
}

static bool
malloc_candidate_p (function *fun, bool ipa)
{
  basic_block exit_block = EXIT_BLOCK_PTR_FOR_FN (fun);
  edge e;
  edge_iterator ei;
  cgraph_node *node = cgraph_node::get_create (fun->decl);

974 975
  if (EDGE_COUNT (exit_block->preds) == 0
      || !flag_delete_null_pointer_checks)
976 977
    return false;

978
  auto_bitmap visited;
979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994
  FOR_EACH_EDGE (e, ei, exit_block->preds)
    {
      gimple_stmt_iterator gsi = gsi_last_bb (e->src);
      greturn *ret_stmt = dyn_cast<greturn *> (gsi_stmt (gsi));

      if (!ret_stmt)
	return false;

      tree retval = gimple_return_retval (ret_stmt);
      if (!retval)
	DUMP_AND_RETURN("No return value.")

      if (TREE_CODE (retval) != SSA_NAME
	  || TREE_CODE (TREE_TYPE (retval)) != POINTER_TYPE)
	DUMP_AND_RETURN("Return value is not SSA_NAME or not a pointer type.")

995
      if (!malloc_candidate_p_1 (fun, retval, ret_stmt, ipa, visited))
996
	return false;
997 998 999 1000 1001 1002 1003 1004
    }

  if (dump_file && (dump_flags & TDF_DETAILS))
    fprintf (dump_file, "\nFound %s to be candidate for malloc attribute\n",
	     IDENTIFIER_POINTER (DECL_NAME (fun->decl)));
  return true;
}

1005
#undef DUMP_AND_RETURN
Jan Hubicka committed
1006

1007 1008 1009
/* This is the main routine for finding the reference patterns for
   global variables within a function FN.  */

1010 1011
static funct_state
analyze_function (struct cgraph_node *fn, bool ipa)
1012
{
1013
  tree decl = fn->decl;
1014 1015
  funct_state l;
  basic_block this_block;
1016

1017
  l = XCNEW (class funct_state_d);
1018
  l->pure_const_state = IPA_CONST;
1019 1020
  l->state_previously_known = IPA_NEITHER;
  l->looping_previously_known = true;
1021 1022
  l->looping = false;
  l->can_throw = false;
1023
  l->can_free = false;
1024
  state_from_flags (&l->state_previously_known, &l->looping_previously_known,
1025
		    flags_from_decl_or_type (fn->decl),
Martin Liska committed
1026
		    fn->cannot_return_p ());
1027

1028
  if (fn->thunk.thunk_p || fn->alias)
1029 1030 1031
    {
      /* Thunk gets propagated through, so nothing interesting happens.  */
      gcc_assert (ipa);
1032 1033
      if (fn->thunk.thunk_p && fn->thunk.virtual_offset_p)
	l->pure_const_state = IPA_NEITHER;
1034 1035
      return l;
    }
1036 1037 1038

  if (dump_file)
    {
H.J. Lu committed
1039
      fprintf (dump_file, "\n\n local analysis of %s\n ",
1040
	       fn->name ());
1041
    }
H.J. Lu committed
1042

1043
  push_cfun (DECL_STRUCT_FUNCTION (decl));
H.J. Lu committed
1044

1045
  FOR_EACH_BB_FN (this_block, cfun)
1046
    {
1047 1048
      gimple_stmt_iterator gsi;
      struct walk_stmt_info wi;
1049

1050
      memset (&wi, 0, sizeof (wi));
1051 1052 1053
      for (gsi = gsi_start_bb (this_block);
	   !gsi_end_p (gsi);
	   gsi_next (&gsi))
1054
	{
1055
	  check_stmt (&gsi, l, ipa);
1056 1057 1058 1059
	  if (l->pure_const_state == IPA_NEITHER
	      && l->looping
	      && l->can_throw
	      && l->can_free)
1060
	    goto end;
1061 1062
	}
    }
1063 1064

end:
1065 1066 1067 1068 1069 1070
  if (l->pure_const_state != IPA_NEITHER)
    {
      /* Const functions cannot have back edges (an
	 indication of possible infinite loop side
	 effect.  */
      if (mark_dfs_back_edges ())
1071
        {
1072
	  /* Preheaders are needed for SCEV to work.
1073
	     Simple latches and recorded exits improve chances that loop will
1074 1075 1076 1077
	     proved to be finite in testcases such as in loop-15.c
	     and loop-24.c  */
	  loop_optimizer_init (LOOPS_HAVE_PREHEADERS
			       | LOOPS_HAVE_SIMPLE_LATCHES
1078
			       | LOOPS_HAVE_RECORDED_EXITS);
1079 1080 1081 1082 1083 1084 1085 1086
	  if (dump_file && (dump_flags & TDF_DETAILS))
	    flow_loops_dump (dump_file, NULL, 0);
	  if (mark_irreducible_loops ())
	    {
	      if (dump_file)
	        fprintf (dump_file, "    has irreducible loops\n");
	      l->looping = true;
	    }
H.J. Lu committed
1087
	  else
1088
	    {
1089
	      class loop *loop;
1090
	      scev_initialize ();
1091
	      FOR_EACH_LOOP (loop, 0)
1092 1093 1094
		if (!finite_loop_p (loop))
		  {
		    if (dump_file)
1095
		      fprintf (dump_file, "    cannot prove finiteness of "
1096
			       "loop %i\n", loop->num);
1097
		    l->looping =true;
1098
		    break;
1099 1100 1101 1102 1103
		  }
	      scev_finalize ();
	    }
          loop_optimizer_finalize ();
	}
1104 1105
    }

1106 1107 1108 1109 1110 1111
  if (dump_file && (dump_flags & TDF_DETAILS))
    fprintf (dump_file, "    checking previously known:");

  better_state (&l->pure_const_state, &l->looping,
		l->state_previously_known,
		l->looping_previously_known);
1112 1113 1114
  if (TREE_NOTHROW (decl))
    l->can_throw = false;

1115 1116 1117 1118 1119 1120 1121 1122
  l->malloc_state = STATE_MALLOC_BOTTOM;
  if (DECL_IS_MALLOC (decl))
    l->malloc_state = STATE_MALLOC;
  else if (ipa && malloc_candidate_p (DECL_STRUCT_FUNCTION (decl), true))
    l->malloc_state = STATE_MALLOC_TOP;
  else if (malloc_candidate_p (DECL_STRUCT_FUNCTION (decl), false))
    l->malloc_state = STATE_MALLOC;

1123
  pop_cfun ();
1124 1125
  if (dump_file)
    {
1126 1127 1128 1129 1130 1131 1132 1133
      if (l->looping)
        fprintf (dump_file, "Function is locally looping.\n");
      if (l->can_throw)
        fprintf (dump_file, "Function is locally throwing.\n");
      if (l->pure_const_state == IPA_CONST)
        fprintf (dump_file, "Function is locally const.\n");
      if (l->pure_const_state == IPA_PURE)
        fprintf (dump_file, "Function is locally pure.\n");
1134 1135
      if (l->can_free)
	fprintf (dump_file, "Function can locally free.\n");
1136 1137
      if (l->malloc_state == STATE_MALLOC)
	fprintf (dump_file, "Function is locally malloc.\n");
1138
    }
1139
  return l;
1140 1141
}

1142 1143
void
funct_state_summary_t::insert (cgraph_node *node, funct_state_d *state)
1144 1145 1146 1147 1148
{
  /* There are some shared nodes, in particular the initializers on
     static declarations.  We do not need to scan them more than once
     since all we would be interested in are the addressof
     operations.  */
1149
  if (opt_for_fn (node->decl, flag_ipa_pure_const))
1150
    {
1151 1152 1153
      funct_state_d *a = analyze_function (node, true);
      new (state) funct_state_d (*a);
      free (a);
1154 1155 1156 1157 1158
    }
}

/* Called when new clone is inserted to callgraph late.  */

1159 1160 1161 1162
void
funct_state_summary_t::duplicate (cgraph_node *, cgraph_node *,
				  funct_state_d *src_data,
				  funct_state_d *dst_data)
1163
{
1164
  new (dst_data) funct_state_d (*src_data);
1165 1166
}

1167

1168 1169
void
pass_ipa_pure_const::
1170
register_hooks (void)
1171
{
1172 1173 1174 1175
  if (init_p)
    return;

  init_p = true;
1176

1177
  funct_state_summaries = new funct_state_summary_t (symtab);
1178 1179 1180 1181 1182 1183
}


/* Analyze each function in the cgraph to see if it is locally PURE or
   CONST.  */

H.J. Lu committed
1184
static void
1185
pure_const_generate_summary (void)
1186 1187 1188
{
  struct cgraph_node *node;

1189 1190
  pass_ipa_pure_const *pass = static_cast <pass_ipa_pure_const *> (current_pass);
  pass->register_hooks ();
1191

H.J. Lu committed
1192
  /* Process all of the functions.
1193

1194
     We process AVAIL_INTERPOSABLE functions.  We cannot use the results
1195
     by default, but the info can be used at LTO with -fwhole-program or
1196
     when function got cloned and the clone is AVAILABLE.  */
1197

1198
  FOR_EACH_DEFINED_FUNCTION (node)
1199
    if (opt_for_fn (node->decl, flag_ipa_pure_const))
1200 1201 1202 1203 1204
      {
	funct_state_d *a = analyze_function (node, true);
	new (funct_state_summaries->get_create (node)) funct_state_d (*a);
	free (a);
      }
Jan Hubicka committed
1205 1206
}

1207 1208 1209 1210

/* Serialize the ipa info for lto.  */

static void
1211
pure_const_write_summary (void)
1212 1213 1214 1215 1216
{
  struct cgraph_node *node;
  struct lto_simple_output_block *ob
    = lto_create_simple_output_block (LTO_section_ipa_pure_const);
  unsigned int count = 0;
1217 1218
  lto_symtab_encoder_iterator lsei;
  lto_symtab_encoder_t encoder;
1219

1220 1221 1222 1223
  encoder = lto_get_out_decl_state ()->symtab_node_encoder;

  for (lsei = lsei_start_function_in_partition (encoder); !lsei_end_p (lsei);
       lsei_next_function_in_partition (&lsei))
1224
    {
1225
      node = lsei_cgraph_node (lsei);
1226
      if (node->definition && funct_state_summaries->exists (node))
1227 1228
	count++;
    }
H.J. Lu committed
1229

1230
  streamer_write_uhwi_stream (ob->main_stream, count);
H.J. Lu committed
1231

1232
  /* Process all of the functions.  */
1233 1234
  for (lsei = lsei_start_function_in_partition (encoder); !lsei_end_p (lsei);
       lsei_next_function_in_partition (&lsei))
1235
    {
1236
      node = lsei_cgraph_node (lsei);
1237 1238
      funct_state_d *fs = funct_state_summaries->get (node);
      if (node->definition && fs != NULL)
1239
	{
1240
	  struct bitpack_d bp;
1241
	  int node_ref;
1242
	  lto_symtab_encoder_t encoder;
H.J. Lu committed
1243

1244
	  encoder = ob->decl_state->symtab_node_encoder;
1245
	  node_ref = lto_symtab_encoder_encode (encoder, node);
1246
	  streamer_write_uhwi_stream (ob->main_stream, node_ref);
H.J. Lu committed
1247

1248 1249
	  /* Note that flags will need to be read in the opposite
	     order as we are pushing the bitflags into FLAGS.  */
1250 1251 1252 1253 1254 1255
	  bp = bitpack_create (ob->main_stream);
	  bp_pack_value (&bp, fs->pure_const_state, 2);
	  bp_pack_value (&bp, fs->state_previously_known, 2);
	  bp_pack_value (&bp, fs->looping_previously_known, 1);
	  bp_pack_value (&bp, fs->looping, 1);
	  bp_pack_value (&bp, fs->can_throw, 1);
1256
	  bp_pack_value (&bp, fs->can_free, 1);
1257
	  bp_pack_value (&bp, fs->malloc_state, 2);
1258
	  streamer_write_bitpack (&bp);
1259 1260 1261 1262 1263 1264 1265 1266 1267
	}
    }

  lto_destroy_simple_output_block (ob);
}


/* Deserialize the ipa info for lto.  */

H.J. Lu committed
1268
static void
1269 1270 1271 1272 1273 1274
pure_const_read_summary (void)
{
  struct lto_file_decl_data **file_data_vec = lto_get_file_decl_data ();
  struct lto_file_decl_data *file_data;
  unsigned int j = 0;

1275 1276 1277
  pass_ipa_pure_const *pass = static_cast <pass_ipa_pure_const *> (current_pass);
  pass->register_hooks ();

1278 1279 1280 1281
  while ((file_data = file_data_vec[j++]))
    {
      const char *data;
      size_t len;
1282
      class lto_input_block *ib
H.J. Lu committed
1283 1284
	= lto_create_simple_input_block (file_data,
					 LTO_section_ipa_pure_const,
1285 1286 1287 1288
					 &data, &len);
      if (ib)
	{
	  unsigned int i;
1289
	  unsigned int count = streamer_read_uhwi (ib);
1290 1291 1292 1293 1294

	  for (i = 0; i < count; i++)
	    {
	      unsigned int index;
	      struct cgraph_node *node;
1295
	      struct bitpack_d bp;
1296
	      funct_state fs;
1297
	      lto_symtab_encoder_t encoder;
1298

1299
	      index = streamer_read_uhwi (ib);
1300
	      encoder = file_data->symtab_node_encoder;
Martin Liska committed
1301 1302
	      node = dyn_cast<cgraph_node *> (lto_symtab_encoder_deref (encoder,
									index));
1303

1304
	      fs = funct_state_summaries->get_create (node);
1305 1306 1307
	      /* Note that the flags must be read in the opposite
		 order in which they were written (the bitflags were
		 pushed into FLAGS).  */
1308
	      bp = streamer_read_bitpack (ib);
1309
	      fs->pure_const_state
1310
			= (enum pure_const_state_e) bp_unpack_value (&bp, 2);
1311
	      fs->state_previously_known
1312 1313 1314 1315
			= (enum pure_const_state_e) bp_unpack_value (&bp, 2);
	      fs->looping_previously_known = bp_unpack_value (&bp, 1);
	      fs->looping = bp_unpack_value (&bp, 1);
	      fs->can_throw = bp_unpack_value (&bp, 1);
1316
	      fs->can_free = bp_unpack_value (&bp, 1);
1317 1318 1319
	      fs->malloc_state
			= (enum malloc_state_e) bp_unpack_value (&bp, 2);

1320 1321
	      if (dump_file)
		{
1322
		  int flags = flags_from_decl_or_type (node->decl);
1323
		  fprintf (dump_file, "Read info for %s ", node->dump_name ());
1324 1325 1326 1327 1328 1329 1330 1331 1332
		  if (flags & ECF_CONST)
		    fprintf (dump_file, " const");
		  if (flags & ECF_PURE)
		    fprintf (dump_file, " pure");
		  if (flags & ECF_NOTHROW)
		    fprintf (dump_file, " nothrow");
		  fprintf (dump_file, "\n  pure const state: %s\n",
			   pure_const_names[fs->pure_const_state]);
		  fprintf (dump_file, "  previously known state: %s\n",
1333
			   pure_const_names[fs->state_previously_known]);
1334 1335 1336 1337 1338 1339
		  if (fs->looping)
		    fprintf (dump_file,"  function is locally looping\n");
		  if (fs->looping_previously_known)
		    fprintf (dump_file,"  function is previously known looping\n");
		  if (fs->can_throw)
		    fprintf (dump_file,"  function is locally throwing\n");
1340 1341
		  if (fs->can_free)
		    fprintf (dump_file,"  function can locally free\n");
1342 1343
		  fprintf (dump_file, "\n malloc state: %s\n",
			   malloc_state_names[fs->malloc_state]);
1344
		}
1345 1346
	    }

H.J. Lu committed
1347 1348
	  lto_destroy_simple_input_block (file_data,
					  LTO_section_ipa_pure_const,
1349 1350 1351 1352 1353
					  ib, data, len);
	}
    }
}

1354 1355
/* We only propagate across edges that can throw externally and their callee
   is not interposable.  */
1356

1357
static bool
1358
ignore_edge_for_nothrow (struct cgraph_edge *e)
1359
{
1360 1361 1362 1363
  if (!e->can_throw_external || TREE_NOTHROW (e->callee->decl))
    return true;

  enum availability avail;
1364 1365 1366
  cgraph_node *ultimate_target
    = e->callee->function_or_virtual_thunk_symbol (&avail, e->caller);
  if (avail <= AVAIL_INTERPOSABLE || TREE_NOTHROW (ultimate_target->decl))
1367
    return true;
1368 1369 1370 1371
  return ((opt_for_fn (e->callee->decl, flag_non_call_exceptions)
	   && !e->callee->binds_to_current_def_p (e->caller))
	  || !opt_for_fn (e->caller->decl, flag_ipa_pure_const)
	  || !opt_for_fn (ultimate_target->decl, flag_ipa_pure_const));
1372 1373
}

1374
/* Return true if NODE is self recursive function.
1375 1376 1377
   Indirectly recursive functions appears as non-trivial strongly
   connected components, so we need to care about self recursion
   only.  */
1378 1379 1380 1381 1382 1383

static bool
self_recursive_p (struct cgraph_node *node)
{
  struct cgraph_edge *e;
  for (e = node->callees; e; e = e->next_callee)
Martin Liska committed
1384
    if (e->callee->function_symbol () == node)
1385 1386 1387 1388
      return true;
  return false;
}

1389 1390 1391 1392 1393 1394 1395
/* Return true if N is cdtor that is not const or pure.  In this case we may
   need to remove unreachable function if it is marked const/pure.  */

static bool
cdtor_p (cgraph_node *n, void *)
{
  if (DECL_STATIC_CONSTRUCTOR (n->decl) || DECL_STATIC_DESTRUCTOR (n->decl))
1396 1397
    return ((!TREE_READONLY (n->decl) && !DECL_PURE_P (n->decl))
	    || DECL_LOOPING_CONST_OR_PURE_P (n->decl));
1398 1399 1400
  return false;
}

1401 1402
/* Skip edges from and to nodes without ipa_pure_const enabled.
   Ignore not available symbols.  */
1403 1404 1405 1406 1407

static bool
ignore_edge_for_pure_const (struct cgraph_edge *e)
{
  enum availability avail;
1408 1409
  cgraph_node *ultimate_target
    = e->callee->function_or_virtual_thunk_symbol (&avail, e->caller);
1410

1411 1412 1413 1414 1415
  return (avail <= AVAIL_INTERPOSABLE
	  || !opt_for_fn (e->caller->decl, flag_ipa_pure_const)
	  || !opt_for_fn (ultimate_target->decl,
			  flag_ipa_pure_const));
}
1416

1417 1418
/* Produce transitive closure over the callgraph and compute pure/const
   attributes.  */
1419

1420
static bool
1421
propagate_pure_const (void)
Jan Hubicka committed
1422 1423 1424 1425
{
  struct cgraph_node *node;
  struct cgraph_node *w;
  struct cgraph_node **order =
Martin Liska committed
1426
    XCNEWVEC (struct cgraph_node *, symtab->cgraph_count);
Jan Hubicka committed
1427 1428 1429
  int order_pos;
  int i;
  struct ipa_dfs_info * w_info;
1430
  bool remove_p = false;
1431
  bool has_cdtor;
Jan Hubicka committed
1432

1433
  order_pos = ipa_reduced_postorder (order, true,
1434
				     ignore_edge_for_pure_const);
1435 1436
  if (dump_file)
    {
Martin Liska committed
1437
      cgraph_node::dump_cgraph (dump_file);
1438
      ipa_print_order (dump_file, "reduced", order, order_pos);
1439 1440
    }

Joseph Myers committed
1441
  /* Propagate the local information through the call graph to produce
1442 1443 1444 1445 1446 1447
     the global information.  All the nodes within a cycle will have
     the same info so we collapse cycles first.  Then we can do the
     propagation in one pass from the leaves to the roots.  */
  for (i = 0; i < order_pos; i++ )
    {
      enum pure_const_state_e pure_const_state = IPA_CONST;
Kenneth Zadeck committed
1448
      bool looping = false;
Kenneth Zadeck committed
1449
      int count = 0;
1450 1451
      node = order[i];

1452
      if (node->alias)
1453 1454
	continue;

1455 1456 1457
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, "Starting cycle\n");

1458 1459
      /* Find the worst state for any node in the cycle.  */
      w = node;
1460
      while (w && pure_const_state != IPA_NEITHER)
1461
	{
1462
	  struct cgraph_edge *e;
1463 1464
	  struct cgraph_edge *ie;
	  int i;
Martin Liska committed
1465
	  struct ipa_ref *ref = NULL;
1466

1467
	  funct_state w_l = funct_state_summaries->get_create (w);
1468
	  if (dump_file && (dump_flags & TDF_DETAILS))
1469 1470
	    fprintf (dump_file, "  Visiting %s state:%s looping %i\n",
		     w->dump_name (),
1471 1472
		     pure_const_names[w_l->pure_const_state],
		     w_l->looping);
1473

1474 1475 1476
	  /* First merge in function body properties.
	     We are safe to pass NULL as FROM and TO because we will take care
	     of possible interposition when walking callees.  */
1477
	  worse_state (&pure_const_state, &looping,
1478 1479
		       w_l->pure_const_state, w_l->looping,
		       NULL, NULL);
1480 1481 1482
	  if (pure_const_state == IPA_NEITHER)
	    break;

1483 1484
	  count++;

1485 1486 1487
	  /* We consider recursive cycles as possibly infinite.
	     This might be relaxed since infinite recursion leads to stack
	     overflow.  */
1488 1489
	  if (count > 1)
	    looping = true;
H.J. Lu committed
1490

1491
	  /* Now walk the edges and merge in callee properties.  */
1492 1493
	  for (e = w->callees; e && pure_const_state != IPA_NEITHER;
	       e = e->next_callee)
1494
	    {
1495
	      enum availability avail;
1496
	      struct cgraph_node *y = e->callee->
1497 1498
				function_or_virtual_thunk_symbol (&avail,
								  e->caller);
1499 1500
	      enum pure_const_state_e edge_state = IPA_CONST;
	      bool edge_looping = false;
Kenneth Zadeck committed
1501

1502 1503
	      if (dump_file && (dump_flags & TDF_DETAILS))
		{
1504 1505
		  fprintf (dump_file, "    Call to %s",
			   e->callee->dump_name ());
1506
		}
Martin Liska committed
1507
	      if (avail > AVAIL_INTERPOSABLE)
1508
		{
1509 1510
		  funct_state y_l = funct_state_summaries->get_create (y);

1511 1512 1513 1514 1515 1516 1517
		  if (dump_file && (dump_flags & TDF_DETAILS))
		    {
		      fprintf (dump_file,
			       " state:%s looping:%i\n",
			       pure_const_names[y_l->pure_const_state],
			       y_l->looping);
		    }
1518
		  if (y_l->pure_const_state > IPA_PURE
Martin Liska committed
1519
		      && e->cannot_lead_to_return_p ())
1520 1521
		    {
		      if (dump_file && (dump_flags & TDF_DETAILS))
1522 1523 1524
			fprintf (dump_file,
				 "        Ignoring side effects"
				 " -> pure, looping\n");
1525 1526 1527 1528 1529 1530 1531 1532
		      edge_state = IPA_PURE;
		      edge_looping = true;
		    }
		  else
		    {
		      edge_state = y_l->pure_const_state;
		      edge_looping = y_l->looping;
		    }
1533
		}
1534
	      else if (special_builtin_state (&edge_state, &edge_looping,
1535
					       y->decl))
1536
		;
1537
	      else
1538
		state_from_flags (&edge_state, &edge_looping,
1539
				  flags_from_decl_or_type (y->decl),
Martin Liska committed
1540
				  e->cannot_lead_to_return_p ());
1541 1542 1543 1544 1545 1546

	      /* Merge the results with what we already know.  */
	      better_state (&edge_state, &edge_looping,
			    w_l->state_previously_known,
			    w_l->looping_previously_known);
	      worse_state (&pure_const_state, &looping,
1547
			   edge_state, edge_looping, e->caller, e->callee);
1548 1549 1550
	      if (pure_const_state == IPA_NEITHER)
	        break;
	    }
1551

1552
	  /* Now process the indirect call.  */
1553 1554
          for (ie = w->indirect_calls;
	       ie && pure_const_state != IPA_NEITHER; ie = ie->next_callee)
1555 1556 1557
	    {
	      enum pure_const_state_e edge_state = IPA_CONST;
	      bool edge_looping = false;
1558

1559 1560 1561 1562
	      if (dump_file && (dump_flags & TDF_DETAILS))
		fprintf (dump_file, "    Indirect call");
	      state_from_flags (&edge_state, &edge_looping,
			        ie->indirect_info->ecf_flags,
Martin Liska committed
1563
				ie->cannot_lead_to_return_p ());
1564 1565 1566 1567 1568
	      /* Merge the results with what we already know.  */
	      better_state (&edge_state, &edge_looping,
			    w_l->state_previously_known,
			    w_l->looping_previously_known);
	      worse_state (&pure_const_state, &looping,
1569
			   edge_state, edge_looping, NULL, NULL);
1570 1571
	      if (pure_const_state == IPA_NEITHER)
	        break;
1572
	    }
1573 1574

	  /* And finally all loads and stores.  */
1575 1576
	  for (i = 0; w->iterate_reference (i, ref)
	       && pure_const_state != IPA_NEITHER; i++)
1577 1578 1579 1580 1581 1582 1583
	    {
	      enum pure_const_state_e ref_state = IPA_CONST;
	      bool ref_looping = false;
	      switch (ref->use)
		{
		case IPA_REF_LOAD:
		  /* readonly reads are safe.  */
Martin Liska committed
1584
		  if (TREE_READONLY (ref->referred->decl))
1585 1586 1587 1588 1589 1590
		    break;
		  if (dump_file && (dump_flags & TDF_DETAILS))
		    fprintf (dump_file, "    nonreadonly global var read\n");
		  ref_state = IPA_PURE;
		  break;
		case IPA_REF_STORE:
Martin Liska committed
1591
		  if (ref->cannot_lead_to_return ())
1592 1593 1594 1595 1596 1597 1598
		    break;
		  ref_state = IPA_NEITHER;
		  if (dump_file && (dump_flags & TDF_DETAILS))
		    fprintf (dump_file, "    global var write\n");
		  break;
		case IPA_REF_ADDR:
		  break;
1599 1600
		default:
		  gcc_unreachable ();
1601 1602 1603 1604 1605
		}
	      better_state (&ref_state, &ref_looping,
			    w_l->state_previously_known,
			    w_l->looping_previously_known);
	      worse_state (&pure_const_state, &looping,
1606
			   ref_state, ref_looping, NULL, NULL);
1607 1608 1609
	      if (pure_const_state == IPA_NEITHER)
		break;
	    }
1610
	  w_info = (struct ipa_dfs_info *) w->aux;
1611 1612
	  w = w_info->next_cycle;
	}
1613 1614 1615 1616
      if (dump_file && (dump_flags & TDF_DETAILS))
	fprintf (dump_file, "Result %s looping %i\n",
		 pure_const_names [pure_const_state],
		 looping);
1617

1618 1619 1620 1621 1622 1623
      /* Find the worst state of can_free for any node in the cycle.  */
      bool can_free = false;
      w = node;
      while (w && !can_free)
	{
	  struct cgraph_edge *e;
1624
	  funct_state w_l = funct_state_summaries->get (w);
1625 1626 1627 1628 1629 1630 1631 1632 1633

	  if (w_l->can_free
	      || w->get_availability () == AVAIL_INTERPOSABLE
	      || w->indirect_calls)
	    can_free = true;

	  for (e = w->callees; e && !can_free; e = e->next_callee)
	    {
	      enum availability avail;
1634
	      struct cgraph_node *y = e->callee->
1635 1636
				function_or_virtual_thunk_symbol (&avail,
								  e->caller);
1637 1638

	      if (avail > AVAIL_INTERPOSABLE)
1639
		can_free = funct_state_summaries->get (y)->can_free;
1640 1641 1642 1643 1644 1645 1646
	      else
		can_free = true;
	    }
	  w_info = (struct ipa_dfs_info *) w->aux;
	  w = w_info->next_cycle;
	}

1647 1648 1649 1650 1651
      /* Copy back the region's pure_const_state which is shared by
	 all nodes in the region.  */
      w = node;
      while (w)
	{
1652
	  funct_state w_l = funct_state_summaries->get (w);
1653 1654
	  enum pure_const_state_e this_state = pure_const_state;
	  bool this_looping = looping;
1655

1656 1657 1658 1659 1660 1661
	  w_l->can_free = can_free;
	  w->nonfreeing_fn = !can_free;
	  if (!can_free && dump_file)
	    fprintf (dump_file, "Function found not to call free: %s\n",
		     w->name ());

1662 1663
	  if (w_l->state_previously_known != IPA_NEITHER
	      && this_state > w_l->state_previously_known)
1664 1665
	    {
              this_state = w_l->state_previously_known;
1666 1667
	      if (this_state == IPA_NEITHER)
	        this_looping = w_l->looping_previously_known;
1668
	    }
1669 1670
	  if (!this_looping && self_recursive_p (w))
	    this_looping = true;
1671 1672
	  if (!w_l->looping_previously_known)
	    this_looping = false;
Jan Hubicka committed
1673

1674 1675 1676 1677
	  /* All nodes within a cycle share the same info.  */
	  w_l->pure_const_state = this_state;
	  w_l->looping = this_looping;

1678 1679 1680
	  /* Inline clones share declaration with their offline copies;
	     do not modify their declarations since the offline copy may
	     be different.  */
1681
	  if (!w->inlined_to)
1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692
	    switch (this_state)
	      {
	      case IPA_CONST:
		if (!TREE_READONLY (w->decl))
		  {
		    warn_function_const (w->decl, !this_looping);
		    if (dump_file)
		      fprintf (dump_file, "Function found to be %sconst: %s\n",
			       this_looping ? "looping " : "",
			       w->name ());
		  }
1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708
		/* Turning constructor or destructor to non-looping const/pure
		   enables us to possibly remove the function completely.  */
		if (this_looping)
		  has_cdtor = false;
		else
		  has_cdtor = w->call_for_symbol_and_aliases (cdtor_p,
							      NULL, true);
		if (w->set_const_flag (true, this_looping))
		  {
		    if (dump_file)
		      fprintf (dump_file,
			       "Declaration updated to be %sconst: %s\n",
			       this_looping ? "looping " : "",
			       w->name ());
		    remove_p |= has_cdtor;
		  }
1709
		break;
H.J. Lu committed
1710

1711 1712 1713 1714 1715 1716 1717 1718 1719
	      case IPA_PURE:
		if (!DECL_PURE_P (w->decl))
		  {
		    warn_function_pure (w->decl, !this_looping);
		    if (dump_file)
		      fprintf (dump_file, "Function found to be %spure: %s\n",
			       this_looping ? "looping " : "",
			       w->name ());
		  }
1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733
		if (this_looping)
		  has_cdtor = false;
		else
		  has_cdtor = w->call_for_symbol_and_aliases (cdtor_p,
							      NULL, true);
		if (w->set_pure_flag (true, this_looping))
		  {
		    if (dump_file)
		      fprintf (dump_file,
			       "Declaration updated to be %spure: %s\n",
			       this_looping ? "looping " : "",
			       w->name ());
		    remove_p |= has_cdtor;
		  }
1734
		break;
H.J. Lu committed
1735

1736 1737 1738
	      default:
		break;
	      }
1739
	  w_info = (struct ipa_dfs_info *) w->aux;
1740 1741 1742 1743
	  w = w_info->next_cycle;
	}
    }

1744
  ipa_free_postorder_info ();
1745
  free (order);
1746
  return remove_p;
1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757
}

/* Produce transitive closure over the callgraph and compute nothrow
   attributes.  */

static void
propagate_nothrow (void)
{
  struct cgraph_node *node;
  struct cgraph_node *w;
  struct cgraph_node **order =
Martin Liska committed
1758
    XCNEWVEC (struct cgraph_node *, symtab->cgraph_count);
1759 1760 1761 1762
  int order_pos;
  int i;
  struct ipa_dfs_info * w_info;

1763
  order_pos = ipa_reduced_postorder (order, true,
1764
				     ignore_edge_for_nothrow);
1765 1766
  if (dump_file)
    {
Martin Liska committed
1767
      cgraph_node::dump_cgraph (dump_file);
1768
      ipa_print_order (dump_file, "reduced for nothrow", order, order_pos);
1769
    }
1770

Joseph Myers committed
1771
  /* Propagate the local information through the call graph to produce
1772 1773 1774 1775 1776 1777 1778 1779
     the global information.  All the nodes within a cycle will have
     the same info so we collapse cycles first.  Then we can do the
     propagation in one pass from the leaves to the roots.  */
  for (i = 0; i < order_pos; i++ )
    {
      bool can_throw = false;
      node = order[i];

1780
      if (node->alias)
1781 1782
	continue;

1783 1784
      /* Find the worst state for any node in the cycle.  */
      w = node;
1785
      while (w && !can_throw)
1786
	{
1787
	  struct cgraph_edge *e, *ie;
1788

1789
	  if (!TREE_NOTHROW (w->decl))
1790
	    {
1791
	      funct_state w_l = funct_state_summaries->get_create (w);
1792

1793 1794 1795 1796 1797
	      if (w_l->can_throw
		  || w->get_availability () == AVAIL_INTERPOSABLE)
		can_throw = true;

	      for (e = w->callees; e && !can_throw; e = e->next_callee)
1798
		{
1799 1800 1801 1802 1803 1804
		  enum availability avail;

		  if (!e->can_throw_external || TREE_NOTHROW (e->callee->decl))
		    continue;

		  struct cgraph_node *y = e->callee->
1805 1806
				   function_or_virtual_thunk_symbol (&avail,
								     e->caller);
1807

1808 1809
		  /* We can use info about the callee only if we know it
		     cannot be interposed.
1810 1811 1812 1813
		     When callee is compiled with non-call exceptions we also
		     must check that the declaration is bound to current
		     body as other semantically equivalent body may still
		     throw.  */
1814 1815
		  if (avail <= AVAIL_INTERPOSABLE
		      || (!TREE_NOTHROW (y->decl)
1816
			  && (funct_state_summaries->get_create (y)->can_throw
1817 1818
			      || (opt_for_fn (y->decl, flag_non_call_exceptions)
				  && !e->callee->binds_to_current_def_p (w)))))
1819 1820
		    can_throw = true;
		}
1821 1822 1823 1824 1825
	      for (ie = w->indirect_calls; ie && !can_throw;
		   ie = ie->next_callee)
		if (ie->can_throw_external
		    && !(ie->indirect_info->ecf_flags & ECF_NOTHROW))
		  can_throw = true;
1826
	    }
1827
	  w_info = (struct ipa_dfs_info *) w->aux;
1828 1829 1830 1831 1832 1833 1834 1835
	  w = w_info->next_cycle;
	}

      /* Copy back the region's pure_const_state which is shared by
	 all nodes in the region.  */
      w = node;
      while (w)
	{
1836
	  funct_state w_l = funct_state_summaries->get_create (w);
1837
	  if (!can_throw && !TREE_NOTHROW (w->decl))
1838
	    {
1839 1840 1841
	      /* Inline clones share declaration with their offline copies;
		 do not modify their declarations since the offline copy may
		 be different.  */
1842
	      if (!w->inlined_to)
1843
		{
Martin Liska committed
1844
		  w->set_nothrow_flag (true);
1845 1846 1847 1848
		  if (dump_file)
		    fprintf (dump_file, "Function found to be nothrow: %s\n",
			     w->name ());
		}
1849
	    }
1850
	  else if (can_throw && !TREE_NOTHROW (w->decl))
1851
	    w_l->can_throw = true;
1852
	  w_info = (struct ipa_dfs_info *) w->aux;
1853 1854 1855 1856
	  w = w_info->next_cycle;
	}
    }

1857
  ipa_free_postorder_info ();
1858
  free (order);
1859 1860
}

1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873
/* Debugging function to dump state of malloc lattice.  */

DEBUG_FUNCTION
static void
dump_malloc_lattice (FILE *dump_file, const char *s)
{
  if (!dump_file)
    return;

  fprintf (dump_file, "\n\nMALLOC LATTICE %s:\n", s);
  cgraph_node *node;
  FOR_EACH_FUNCTION (node)
    {
1874 1875 1876 1877
      funct_state fs = funct_state_summaries->get (node);
      if (fs)
	fprintf (dump_file, "%s: %s\n", node->name (),
		 malloc_state_names[fs->malloc_state]);
1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889
    }
}

/* Propagate malloc attribute across the callgraph.  */

static void
propagate_malloc (void)
{
  cgraph_node *node;
  FOR_EACH_FUNCTION (node)
    {
      if (DECL_IS_MALLOC (node->decl))
1890
	if (!funct_state_summaries->exists (node))
1891
	  {
1892 1893
	    funct_state fs = funct_state_summaries->get_create (node);
	    fs->malloc_state = STATE_MALLOC;
1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911
	  }
    }

  dump_malloc_lattice (dump_file, "Initial");
  struct cgraph_node **order
    = XNEWVEC (struct cgraph_node *, symtab->cgraph_count);
  int order_pos = ipa_reverse_postorder (order);
  bool changed = true;

  while (changed)
    {
      changed = false;
      /* Walk in postorder.  */
      for (int i = order_pos - 1; i >= 0; --i)
	{
	  cgraph_node *node = order[i];
	  if (node->alias
	      || !node->definition
1912
	      || !funct_state_summaries->exists (node))
1913 1914
	    continue;

1915
	  funct_state l = funct_state_summaries->get (node);
1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935

	  /* FIXME: add support for indirect-calls.  */
	  if (node->indirect_calls)
	    {
	      l->malloc_state = STATE_MALLOC_BOTTOM;
	      continue;
	    }

	  if (node->get_availability () <= AVAIL_INTERPOSABLE)
	    {
	      l->malloc_state = STATE_MALLOC_BOTTOM;
	      continue;
	    }

	  if (l->malloc_state == STATE_MALLOC_BOTTOM)
	    continue;

	  vec<cgraph_node *> callees = vNULL;
	  for (cgraph_edge *cs = node->callees; cs; cs = cs->next_callee)
	    {
1936
	      ipa_call_summary *es = ipa_call_summaries->get_create (cs);
1937 1938 1939 1940 1941 1942 1943 1944
	      if (es && es->is_return_callee_uncaptured)
		callees.safe_push (cs->callee);
	    }

	  malloc_state_e new_state = l->malloc_state;
	  for (unsigned j = 0; j < callees.length (); j++)
	    {
	      cgraph_node *callee = callees[j];
1945
	      if (!funct_state_summaries->exists (node))
1946 1947 1948 1949
		{
		  new_state = STATE_MALLOC_BOTTOM;
		  break;
		}
1950 1951
	      malloc_state_e callee_state
		= funct_state_summaries->get_create (callee)->malloc_state;
1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963
	      if (new_state < callee_state)
		new_state = callee_state;
	    }
	  if (new_state != l->malloc_state)
	    {
	      changed = true;
	      l->malloc_state = new_state;
	    }
	}
    }

  FOR_EACH_DEFINED_FUNCTION (node)
1964
    if (funct_state_summaries->exists (node))
1965
      {
1966
	funct_state l = funct_state_summaries->get (node);
1967 1968
	if (!node->alias
	    && l->malloc_state == STATE_MALLOC
1969
	    && !node->inlined_to)
1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985
	  {
	    if (dump_file && (dump_flags & TDF_DETAILS))
	      fprintf (dump_file, "Function %s found to be malloc\n",
		       node->name ());

	    bool malloc_decl_p = DECL_IS_MALLOC (node->decl);
	    node->set_malloc_flag (true);
	    if (!malloc_decl_p && warn_suggest_attribute_malloc)
		warn_function_malloc (node->decl);
	  }
      }

  dump_malloc_lattice (dump_file, "after propagation");
  ipa_free_postorder_info ();
  free (order);
}
1986 1987 1988 1989

/* Produce the global information by preforming a transitive closure
   on the local information that was produced by generate_summary.  */

1990 1991 1992
unsigned int
pass_ipa_pure_const::
execute (function *)
1993
{
1994
  bool remove_p;
1995 1996 1997 1998

  /* Nothrow makes more function to not lead to return and improve
     later analysis.  */
  propagate_nothrow ();
1999
  propagate_malloc ();
2000
  remove_p = propagate_pure_const ();
2001

2002
  delete funct_state_summaries;
2003
  return remove_p ? TODO_remove_functions : 0;
2004 2005 2006 2007 2008
}

static bool
gate_pure_const (void)
{
2009
  return flag_ipa_pure_const || in_lto_p;
2010 2011
}

2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022
pass_ipa_pure_const::pass_ipa_pure_const(gcc::context *ctxt)
    : ipa_opt_pass_d(pass_data_ipa_pure_const, ctxt,
		     pure_const_generate_summary, /* generate_summary */
		     pure_const_write_summary, /* write_summary */
		     pure_const_read_summary, /* read_summary */
		     NULL, /* write_optimization_summary */
		     NULL, /* read_optimization_summary */
		     NULL, /* stmt_fixup */
		     0, /* function_transform_todo_flags_start */
		     NULL, /* function_transform */
		     NULL), /* variable_transform */
2023
  init_p (false) {}
2024 2025 2026 2027 2028 2029 2030

ipa_opt_pass_d *
make_pass_ipa_pure_const (gcc::context *ctxt)
{
  return new pass_ipa_pure_const (ctxt);
}

2031
/* Return true if function should be skipped for local pure const analysis.  */
2032

2033 2034
static bool
skip_function_for_local_pure_const (struct cgraph_node *node)
2035
{
2036 2037 2038
  /* Because we do not schedule pass_fixup_cfg over whole program after early
     optimizations we must not promote functions that are called by already
     processed functions.  */
2039 2040 2041 2042 2043

  if (function_called_by_processed_nodes_p ())
    {
      if (dump_file)
        fprintf (dump_file, "Function called in recursive cycle; ignoring\n");
2044
      return true;
2045
    }
2046 2047 2048 2049
  /* Save some work and do not analyze functions which are interposable and
     do not have any non-interposable aliases.  */
  if (node->get_availability () <= AVAIL_INTERPOSABLE
      && !node->has_aliases_p ())
2050 2051
    {
      if (dump_file)
2052
        fprintf (dump_file,
2053
		 "Function is interposable; not analyzing.\n");
2054
      return true;
2055
    }
2056 2057 2058 2059 2060 2061
  return false;
}

/* Simple local pass for pure const discovery reusing the analysis from
   ipa_pure_const.   This pass is effective when executed together with
   other optimization passes in early optimization pass queue.  */
2062

2063 2064 2065
namespace {

const pass_data pass_data_local_pure_const =
2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077
{
  GIMPLE_PASS, /* type */
  "local-pure-const", /* name */
  OPTGROUP_NONE, /* optinfo_flags */
  TV_IPA_PURE_CONST, /* tv_id */
  0, /* properties_required */
  0, /* properties_provided */
  0, /* properties_destroyed */
  0, /* todo_flags_start */
  0, /* todo_flags_finish */
};

2078
class pass_local_pure_const : public gimple_opt_pass
2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093
{
public:
  pass_local_pure_const (gcc::context *ctxt)
    : gimple_opt_pass (pass_data_local_pure_const, ctxt)
  {}

  /* opt_pass methods: */
  opt_pass * clone () { return new pass_local_pure_const (m_ctxt); }
  virtual bool gate (function *) { return gate_pure_const (); }
  virtual unsigned int execute (function *);

}; // class pass_local_pure_const

unsigned int
pass_local_pure_const::execute (function *fun)
2094 2095 2096 2097 2098 2099
{
  bool changed = false;
  funct_state l;
  bool skip;
  struct cgraph_node *node;

Martin Liska committed
2100
  node = cgraph_node::get (current_function_decl);
2101
  skip = skip_function_for_local_pure_const (node);
2102

2103 2104 2105 2106
  if (!warn_suggest_attribute_const
      && !warn_suggest_attribute_pure
      && skip)
    return 0;
2107

2108 2109 2110
  l = analyze_function (node, false);

  /* Do NORETURN discovery.  */
2111
  if (!skip && !TREE_THIS_VOLATILE (current_function_decl)
2112
      && EDGE_COUNT (EXIT_BLOCK_PTR_FOR_FN (fun)->preds) == 0)
2113
    {
2114
      warn_function_noreturn (fun->decl);
2115
      if (dump_file)
2116 2117
	fprintf (dump_file, "Function found to be noreturn: %s\n",
		 current_function_name ());
2118 2119 2120 2121

      /* Update declaration and reduce profile to executed once.  */
      TREE_THIS_VOLATILE (current_function_decl) = 1;
      if (node->frequency > NODE_FREQUENCY_EXECUTED_ONCE)
2122
	node->frequency = NODE_FREQUENCY_EXECUTED_ONCE;
2123 2124 2125

      changed = true;
    }
2126

2127 2128 2129 2130 2131
  switch (l->pure_const_state)
    {
    case IPA_CONST:
      if (!TREE_READONLY (current_function_decl))
	{
2132
	  warn_function_const (current_function_decl, !l->looping);
2133 2134 2135
	  if (dump_file)
	    fprintf (dump_file, "Function found to be %sconst: %s\n",
		     l->looping ? "looping " : "",
2136
		     current_function_name ());
2137 2138 2139 2140 2141 2142
	}
      else if (DECL_LOOPING_CONST_OR_PURE_P (current_function_decl)
	       && !l->looping)
	{
	  if (dump_file)
	    fprintf (dump_file, "Function found to be non-looping: %s\n",
2143
		     current_function_name ());
2144
	}
2145 2146 2147 2148 2149 2150 2151 2152
      if (!skip && node->set_const_flag (true, l->looping))
	{
	  if (dump_file)
	    fprintf (dump_file, "Declaration updated to be %sconst: %s\n",
		     l->looping ? "looping " : "",
		     current_function_name ());
	  changed = true;
	}
2153 2154 2155
      break;

    case IPA_PURE:
2156
      if (!DECL_PURE_P (current_function_decl))
2157
	{
2158
	  warn_function_pure (current_function_decl, !l->looping);
2159 2160 2161
	  if (dump_file)
	    fprintf (dump_file, "Function found to be %spure: %s\n",
		     l->looping ? "looping " : "",
2162
		     current_function_name ());
2163 2164 2165 2166 2167 2168
	}
      else if (DECL_LOOPING_CONST_OR_PURE_P (current_function_decl)
	       && !l->looping)
	{
	  if (dump_file)
	    fprintf (dump_file, "Function found to be non-looping: %s\n",
2169
		     current_function_name ());
2170
	}
2171 2172 2173 2174 2175 2176 2177 2178
      if (!skip && node->set_pure_flag (true, l->looping))
	{
	  if (dump_file)
	    fprintf (dump_file, "Declaration updated to be %spure: %s\n",
		     l->looping ? "looping " : "",
		     current_function_name ());
	  changed = true;
	}
2179 2180 2181 2182 2183 2184 2185
      break;

    default:
      break;
    }
  if (!l->can_throw && !TREE_NOTHROW (current_function_decl))
    {
Martin Liska committed
2186
      node->set_nothrow_flag (true);
2187 2188 2189
      changed = true;
      if (dump_file)
	fprintf (dump_file, "Function found to be nothrow: %s\n",
2190
		 current_function_name ());
2191
    }
2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204

  if (l->malloc_state == STATE_MALLOC
      && !DECL_IS_MALLOC (current_function_decl))
    {
      node->set_malloc_flag (true);
      if (warn_suggest_attribute_malloc)
	warn_function_malloc (node->decl);
      changed = true;
      if (dump_file)
	fprintf (dump_file, "Function found to be malloc: %s\n",
		 node->name ());
    }

2205
  free (l);
2206 2207 2208 2209 2210 2211
  if (changed)
    return execute_fixup_cfg ();
  else
    return 0;
}

2212 2213
} // anon namespace

2214 2215 2216 2217 2218
gimple_opt_pass *
make_pass_local_pure_const (gcc::context *ctxt)
{
  return new pass_local_pure_const (ctxt);
}
2219 2220 2221

/* Emit noreturn warnings.  */

2222 2223 2224
namespace {

const pass_data pass_data_warn_function_noreturn =
2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236
{
  GIMPLE_PASS, /* type */
  "*warn_function_noreturn", /* name */
  OPTGROUP_NONE, /* optinfo_flags */
  TV_NONE, /* tv_id */
  PROP_cfg, /* properties_required */
  0, /* properties_provided */
  0, /* properties_destroyed */
  0, /* todo_flags_start */
  0, /* todo_flags_finish */
};

2237
class pass_warn_function_noreturn : public gimple_opt_pass
2238 2239 2240 2241 2242 2243 2244
{
public:
  pass_warn_function_noreturn (gcc::context *ctxt)
    : gimple_opt_pass (pass_data_warn_function_noreturn, ctxt)
  {}

  /* opt_pass methods: */
2245
  virtual bool gate (function *) { return warn_suggest_attribute_noreturn; }
2246 2247 2248 2249 2250 2251 2252
  virtual unsigned int execute (function *fun)
    {
      if (!TREE_THIS_VOLATILE (current_function_decl)
	  && EDGE_COUNT (EXIT_BLOCK_PTR_FOR_FN (fun)->preds) == 0)
	warn_function_noreturn (current_function_decl);
      return 0;
    }
2253 2254 2255

}; // class pass_warn_function_noreturn

2256 2257
} // anon namespace

2258 2259 2260 2261 2262
gimple_opt_pass *
make_pass_warn_function_noreturn (gcc::context *ctxt)
{
  return new pass_warn_function_noreturn (ctxt);
}
2263 2264 2265 2266 2267

/* Simple local pass for pure const discovery reusing the analysis from
   ipa_pure_const.   This pass is effective when executed together with
   other optimization passes in early optimization pass queue.  */

2268 2269 2270
namespace {

const pass_data pass_data_nothrow =
2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282
{
  GIMPLE_PASS, /* type */
  "nothrow", /* name */
  OPTGROUP_NONE, /* optinfo_flags */
  TV_IPA_PURE_CONST, /* tv_id */
  0, /* properties_required */
  0, /* properties_provided */
  0, /* properties_destroyed */
  0, /* todo_flags_start */
  0, /* todo_flags_finish */
};

2283
class pass_nothrow : public gimple_opt_pass
2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307
{
public:
  pass_nothrow (gcc::context *ctxt)
    : gimple_opt_pass (pass_data_nothrow, ctxt)
  {}

  /* opt_pass methods: */
  opt_pass * clone () { return new pass_nothrow (m_ctxt); }
  virtual bool gate (function *) { return optimize; }
  virtual unsigned int execute (function *);

}; // class pass_nothrow

unsigned int
pass_nothrow::execute (function *)
{
  struct cgraph_node *node;
  basic_block this_block;

  if (TREE_NOTHROW (current_function_decl))
    return 0;

  node = cgraph_node::get (current_function_decl);

2308
  /* We run during lowering, we cannot really use availability yet.  */
2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322
  if (cgraph_node::get (current_function_decl)->get_availability ()
      <= AVAIL_INTERPOSABLE)
    {
      if (dump_file)
        fprintf (dump_file, "Function is interposable;"
	         " not analyzing.\n");
      return true;
    }

  FOR_EACH_BB_FN (this_block, cfun)
    {
      for (gimple_stmt_iterator gsi = gsi_start_bb (this_block);
	   !gsi_end_p (gsi);
	   gsi_next (&gsi))
2323
        if (stmt_can_throw_external (cfun, gsi_stmt (gsi)))
2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335
	  {
	    if (is_gimple_call (gsi_stmt (gsi)))
	      {
		tree callee_t = gimple_call_fndecl (gsi_stmt (gsi));
		if (callee_t && recursive_call_p (current_function_decl,
						  callee_t))
		  continue;
	      }
	
	    if (dump_file)
	      {
		fprintf (dump_file, "Statement can throw: ");
2336
		print_gimple_stmt (dump_file, gsi_stmt (gsi), 0);
2337 2338 2339 2340 2341 2342
	      }
	    return 0;
	  }
    }

  node->set_nothrow_flag (true);
2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357

  bool cfg_changed = false;
  if (self_recursive_p (node))
    FOR_EACH_BB_FN (this_block, cfun)
      if (gimple *g = last_stmt (this_block))
	if (is_gimple_call (g))
	  {
	    tree callee_t = gimple_call_fndecl (g);
	    if (callee_t
		&& recursive_call_p (current_function_decl, callee_t)
		&& maybe_clean_eh_stmt (g)
		&& gimple_purge_dead_eh_edges (this_block))
	      cfg_changed = true;
	  }

2358 2359 2360
  if (dump_file)
    fprintf (dump_file, "Function found to be nothrow: %s\n",
	     current_function_name ());
2361
  return cfg_changed ? TODO_cleanup_cfg : 0;
2362 2363
}

2364 2365
} // anon namespace

2366 2367 2368 2369 2370
gimple_opt_pass *
make_pass_nothrow (gcc::context *ctxt)
{
  return new pass_nothrow (ctxt);
}