]> git.ipfire.org Git - people/ms/gcc.git/blame - gcc/ipa-pure-const.cc
c++: namespace-scoped friend in local class [PR69410]
[people/ms/gcc.git] / gcc / ipa-pure-const.cc
CommitLineData
ea900239 1/* Callgraph based analysis of static variables.
aeee4812 2 Copyright (C) 2004-2023 Free Software Foundation, Inc.
ea900239
DB
3 Contributed by Kenneth Zadeck <zadeck@naturalbridge.com>
4
5This file is part of GCC.
6
7GCC is free software; you can redistribute it and/or modify it under
8the terms of the GNU General Public License as published by the Free
9dcd6f09 9Software Foundation; either version 3, or (at your option) any later
ea900239
DB
10version.
11
12GCC is distributed in the hope that it will be useful, but WITHOUT ANY
13WARRANTY; without even the implied warranty of MERCHANTABILITY or
14FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
15for more details.
16
17You should have received a copy of the GNU General Public License
9dcd6f09
NC
18along with GCC; see the file COPYING3. If not see
19<http://www.gnu.org/licenses/>. */
ea900239 20
fa10beec
RW
21/* This file marks functions as being either const (TREE_READONLY) or
22 pure (DECL_PURE_P). It can also set a variant of these that
23 are allowed to loop indefinitely (DECL_LOOPING_CONST_PURE_P).
ea900239
DB
24
25 This must be run after inlining decisions have been made since
26 otherwise, the local sets will not contain information that is
27 consistent with post inlined state. The global sets are not prone
28 to this problem since they are by definition transitive. */
29
30/* The code in this module is called by the ipa pass manager. It
31 should be one of the later passes since it's information is used by
32 the rest of the compilation. */
33
34#include "config.h"
35#include "system.h"
36#include "coretypes.h"
c7131fb2 37#include "backend.h"
957060b5 38#include "target.h"
ea900239 39#include "tree.h"
c7131fb2 40#include "gimple.h"
957060b5
AM
41#include "tree-pass.h"
42#include "tree-streamer.h"
43#include "cgraph.h"
44#include "diagnostic.h"
d8a2d370 45#include "calls.h"
60393bbc 46#include "cfganal.h"
2fb9a547 47#include "tree-eh.h"
5be5c238
AM
48#include "gimple-iterator.h"
49#include "gimple-walk.h"
442b4905 50#include "tree-cfg.h"
e28030cf 51#include "tree-ssa-loop-niter.h"
ea900239 52#include "langhooks.h"
ea900239 53#include "ipa-utils.h"
cf835838 54#include "gimple-pretty-print.h"
2de58650
JH
55#include "cfgloop.h"
56#include "tree-scalar-evolution.h"
5dc16b19
MLI
57#include "intl.h"
58#include "opts.h"
0fab169b
PK
59#include "ssa.h"
60#include "alloc-pool.h"
61#include "symbol-summary.h"
62#include "ipa-prop.h"
63#include "ipa-fnsummary.h"
67f3791f 64#include "symtab-thunks.h"
6471396d 65#include "dbgcnt.h"
ea900239
DB
66
67/* Lattice values for const and pure functions. Everything starts out
68 being const, then may drop to pure and then neither depending on
69 what is found. */
70enum pure_const_state_e
71{
72 IPA_CONST,
73 IPA_PURE,
74 IPA_NEITHER
75};
76
0fab169b
PK
77static const char *pure_const_names[3] = {"const", "pure", "neither"};
78
79enum malloc_state_e
80{
81 STATE_MALLOC_TOP,
82 STATE_MALLOC,
83 STATE_MALLOC_BOTTOM
84};
85
86static const char *malloc_state_names[] = {"malloc_top", "malloc", "malloc_bottom"};
d56026c2 87
812dbce5
JH
88/* Holder for the const_state. There is one of these per function
89 decl. */
36330f82 90class funct_state_d
ea900239 91{
36330f82
ML
92public:
93 funct_state_d (): pure_const_state (IPA_NEITHER),
94 state_previously_known (IPA_NEITHER), looping_previously_known (true),
95 looping (true), can_throw (true), can_free (true),
96 malloc_state (STATE_MALLOC_BOTTOM) {}
97
98 funct_state_d (const funct_state_d &s): pure_const_state (s.pure_const_state),
99 state_previously_known (s.state_previously_known),
100 looping_previously_known (s.looping_previously_known),
101 looping (s.looping), can_throw (s.can_throw), can_free (s.can_free),
102 malloc_state (s.malloc_state) {}
103
812dbce5 104 /* See above. */
ea900239 105 enum pure_const_state_e pure_const_state;
33977f81 106 /* What user set here; we can be always sure about this. */
b8698a0f
L
107 enum pure_const_state_e state_previously_known;
108 bool looping_previously_known;
812dbce5
JH
109
110 /* True if the function could possibly infinite loop. There are a
111 lot of ways that this could be determined. We are pretty
112 conservative here. While it is possible to cse pure and const
113 calls, it is not legal to have dce get rid of the call if there
114 is a possibility that the call could infinite loop since this is
115 a behavioral change. */
becfd6e5 116 bool looping;
812dbce5 117
33977f81 118 bool can_throw;
8413ca87
JJ
119
120 /* If function can call free, munmap or otherwise make previously
121 non-trapping memory accesses trapping. */
122 bool can_free;
0fab169b
PK
123
124 enum malloc_state_e malloc_state;
ea900239
DB
125};
126
99b1c316 127typedef class funct_state_d * funct_state;
ea900239 128
812dbce5
JH
129/* The storage of the funct_state is abstracted because there is the
130 possibility that it may be desirable to move this to the cgraph
b8698a0f 131 local info. */
812dbce5 132
db30281f
ML
133class funct_state_summary_t:
134 public fast_function_summary <funct_state_d *, va_heap>
36330f82
ML
135{
136public:
137 funct_state_summary_t (symbol_table *symtab):
db30281f 138 fast_function_summary <funct_state_d *, va_heap> (symtab) {}
36330f82 139
f31ba116
DM
140 void insert (cgraph_node *, funct_state_d *state) final override;
141 void duplicate (cgraph_node *src_node, cgraph_node *dst_node,
142 funct_state_d *src_data,
143 funct_state_d *dst_data) final override;
36330f82 144};
812dbce5 145
36330f82 146static funct_state_summary_t *funct_state_summaries = NULL;
812dbce5 147
3edf64aa
DM
148static bool gate_pure_const (void);
149
17795822
TS
150namespace {
151
152const pass_data pass_data_ipa_pure_const =
3edf64aa
DM
153{
154 IPA_PASS, /* type */
155 "pure-const", /* name */
156 OPTGROUP_NONE, /* optinfo_flags */
157 TV_IPA_PURE_CONST, /* tv_id */
158 0, /* properties_required */
159 0, /* properties_provided */
160 0, /* properties_destroyed */
161 0, /* todo_flags_start */
162 0, /* todo_flags_finish */
163};
164
17795822 165class pass_ipa_pure_const : public ipa_opt_pass_d
3edf64aa
DM
166{
167public:
168 pass_ipa_pure_const(gcc::context *ctxt);
169
170 /* opt_pass methods: */
725793af
DM
171 bool gate (function *) final override { return gate_pure_const (); }
172 unsigned int execute (function *fun) final override;
3edf64aa
DM
173
174 void register_hooks (void);
175
176private:
177 bool init_p;
3edf64aa
DM
178}; // class pass_ipa_pure_const
179
17795822
TS
180} // anon namespace
181
5dc16b19
MLI
182/* Try to guess if function body will always be visible to compiler
183 when compiling the call and whether compiler will be able
184 to propagate the information by itself. */
185
186static bool
187function_always_visible_to_compiler_p (tree decl)
188{
12b9f3ac
JH
189 return (!TREE_PUBLIC (decl) || DECL_DECLARED_INLINE_P (decl)
190 || DECL_COMDAT (decl));
5dc16b19
MLI
191}
192
193/* Emit suggestion about attribute ATTRIB_NAME for DECL. KNOWN_FINITE
194 is true if the function is known to be finite. The diagnostic is
6e2830c3 195 controlled by OPTION. WARNED_ABOUT is a hash_set<tree> unique for
5dc16b19
MLI
196 OPTION, this function may initialize it and it is always returned
197 by the function. */
198
6e2830c3 199static hash_set<tree> *
5dc16b19 200suggest_attribute (int option, tree decl, bool known_finite,
6e2830c3 201 hash_set<tree> *warned_about,
5dc16b19
MLI
202 const char * attrib_name)
203{
fa5baeed 204 if (!option_enabled (option, lang_hooks.option_lang_mask (), &global_options))
5dc16b19
MLI
205 return warned_about;
206 if (TREE_THIS_VOLATILE (decl)
207 || (known_finite && function_always_visible_to_compiler_p (decl)))
208 return warned_about;
209
210 if (!warned_about)
6e2830c3
TS
211 warned_about = new hash_set<tree>;
212 if (warned_about->contains (decl))
5dc16b19 213 return warned_about;
6e2830c3 214 warned_about->add (decl);
5dc16b19
MLI
215 warning_at (DECL_SOURCE_LOCATION (decl),
216 option,
217 known_finite
2f6f187a
DM
218 ? G_("function might be candidate for attribute %qs")
219 : G_("function might be candidate for attribute %qs"
220 " if it is known to return normally"), attrib_name);
5dc16b19
MLI
221 return warned_about;
222}
223
224/* Emit suggestion about __attribute_((pure)) for DECL. KNOWN_FINITE
225 is true if the function is known to be finite. */
226
227static void
228warn_function_pure (tree decl, bool known_finite)
229{
a594cff3
MS
230 /* Declaring a void function pure makes no sense and is diagnosed
231 by -Wattributes because calling it would have no effect. */
232 if (VOID_TYPE_P (TREE_TYPE (TREE_TYPE (decl))))
233 return;
5dc16b19 234
a594cff3
MS
235 static hash_set<tree> *warned_about;
236 warned_about
5dc16b19
MLI
237 = suggest_attribute (OPT_Wsuggest_attribute_pure, decl,
238 known_finite, warned_about, "pure");
239}
240
241/* Emit suggestion about __attribute_((const)) for DECL. KNOWN_FINITE
242 is true if the function is known to be finite. */
243
244static void
245warn_function_const (tree decl, bool known_finite)
246{
a594cff3
MS
247 /* Declaring a void function const makes no sense is diagnosed
248 by -Wattributes because calling it would have no effect. */
249 if (VOID_TYPE_P (TREE_TYPE (TREE_TYPE (decl))))
250 return;
251
6e2830c3 252 static hash_set<tree> *warned_about;
a594cff3 253 warned_about
5dc16b19
MLI
254 = suggest_attribute (OPT_Wsuggest_attribute_const, decl,
255 known_finite, warned_about, "const");
256}
7ea6b6cf 257
0fab169b
PK
258/* Emit suggestion about __attribute__((malloc)) for DECL. */
259
260static void
261warn_function_malloc (tree decl)
262{
263 static hash_set<tree> *warned_about;
264 warned_about
265 = suggest_attribute (OPT_Wsuggest_attribute_malloc, decl,
0fac5f2a 266 true, warned_about, "malloc");
0fab169b
PK
267}
268
269/* Emit suggestion about __attribute__((noreturn)) for DECL. */
270
c1bf2a39 271static void
7ea6b6cf
JH
272warn_function_noreturn (tree decl)
273{
a48018b5
ML
274 tree original_decl = decl;
275
6e2830c3 276 static hash_set<tree> *warned_about;
d45eae79
SL
277 if (!lang_hooks.missing_noreturn_ok_p (decl)
278 && targetm.warn_func_return (decl))
494bdadf 279 warned_about
a48018b5 280 = suggest_attribute (OPT_Wsuggest_attribute_noreturn, original_decl,
7ea6b6cf
JH
281 true, warned_about, "noreturn");
282}
df92c640 283
12b9f3ac
JH
284void
285warn_function_cold (tree decl)
286{
287 tree original_decl = decl;
288
12b9f3ac 289 static hash_set<tree> *warned_about;
494bdadf 290 warned_about
12b9f3ac
JH
291 = suggest_attribute (OPT_Wsuggest_attribute_cold, original_decl,
292 true, warned_about, "cold");
293}
294
fa10beec 295/* Check to see if the use (or definition when CHECKING_WRITE is true)
ea900239
DB
296 variable T is legal in a function that is either pure or const. */
297
b8698a0f
L
298static inline void
299check_decl (funct_state local,
f10ea640 300 tree t, bool checking_write, bool ipa)
ea900239 301{
ea900239
DB
302 /* Do not want to do anything with volatile except mark any
303 function that uses one to be not const or pure. */
b8698a0f
L
304 if (TREE_THIS_VOLATILE (t))
305 {
ea900239 306 local->pure_const_state = IPA_NEITHER;
33977f81 307 if (dump_file)
75622c9e 308 fprintf (dump_file, " Volatile operand is not const/pure\n");
ea900239
DB
309 return;
310 }
311
312 /* Do not care about a local automatic that is not static. */
313 if (!TREE_STATIC (t) && !DECL_EXTERNAL (t))
314 return;
315
33977f81
JH
316 /* If the variable has the "used" attribute, treat it as if it had a
317 been touched by the devil. */
b42186f1 318 if (DECL_PRESERVE_P (t))
33977f81
JH
319 {
320 local->pure_const_state = IPA_NEITHER;
321 if (dump_file)
322 fprintf (dump_file, " Used static/global variable is not const/pure\n");
323 return;
324 }
325
f10ea640
JH
326 /* In IPA mode we are not interested in checking actual loads and stores;
327 they will be processed at propagation time using ipa_ref. */
328 if (ipa)
329 return;
330
ea900239
DB
331 /* Since we have dealt with the locals and params cases above, if we
332 are CHECKING_WRITE, this cannot be a pure or constant
333 function. */
b8698a0f 334 if (checking_write)
eb80272a
ST
335 {
336 local->pure_const_state = IPA_NEITHER;
33977f81
JH
337 if (dump_file)
338 fprintf (dump_file, " static/global memory write is not const/pure\n");
eb80272a
ST
339 return;
340 }
ea900239
DB
341
342 if (DECL_EXTERNAL (t) || TREE_PUBLIC (t))
343 {
33977f81 344 /* Readonly reads are safe. */
bd78c6d5 345 if (TREE_READONLY (t))
33977f81 346 return; /* Read of a constant, do not change the function state. */
b8698a0f 347 else
ea900239 348 {
33977f81
JH
349 if (dump_file)
350 fprintf (dump_file, " global memory read is not const\n");
ea900239
DB
351 /* Just a regular read. */
352 if (local->pure_const_state == IPA_CONST)
353 local->pure_const_state = IPA_PURE;
354 }
355 }
33977f81
JH
356 else
357 {
358 /* Compilation level statics can be read if they are readonly
359 variables. */
360 if (TREE_READONLY (t))
361 return;
362
363 if (dump_file)
364 fprintf (dump_file, " static memory read is not const\n");
365 /* Just a regular read. */
366 if (local->pure_const_state == IPA_CONST)
367 local->pure_const_state = IPA_PURE;
368 }
ea900239
DB
369}
370
ea900239 371
33977f81
JH
372/* Check to see if the use (or definition when CHECKING_WRITE is true)
373 variable T is legal in a function that is either pure or const. */
ea900239 374
b8698a0f 375static inline void
346ef3fa 376check_op (funct_state local, tree t, bool checking_write)
ea900239 377{
3c1832c3
JH
378 t = get_base_address (t);
379 if (t && TREE_THIS_VOLATILE (t))
ea900239 380 {
346ef3fa
RG
381 local->pure_const_state = IPA_NEITHER;
382 if (dump_file)
383 fprintf (dump_file, " Volatile indirect ref is not const/pure\n");
384 return;
385 }
e977dd5e 386 else if (refs_local_or_readonly_memory_p (t))
3c1832c3
JH
387 {
388 if (dump_file)
e977dd5e
JH
389 fprintf (dump_file, " Indirect ref to local or readonly "
390 "memory is OK\n");
3c1832c3
JH
391 return;
392 }
346ef3fa
RG
393 else if (checking_write)
394 {
395 local->pure_const_state = IPA_NEITHER;
396 if (dump_file)
397 fprintf (dump_file, " Indirect ref write is not const/pure\n");
398 return;
399 }
400 else
401 {
402 if (dump_file)
403 fprintf (dump_file, " Indirect ref read is not const\n");
404 if (local->pure_const_state == IPA_CONST)
405 local->pure_const_state = IPA_PURE;
ea900239
DB
406 }
407}
408
f10ea640
JH
409/* compute state based on ECF FLAGS and store to STATE and LOOPING. */
410
411static void
412state_from_flags (enum pure_const_state_e *state, bool *looping,
413 int flags, bool cannot_lead_to_return)
414{
415 *looping = false;
416 if (flags & ECF_LOOPING_CONST_OR_PURE)
417 {
418 *looping = true;
419 if (dump_file && (dump_flags & TDF_DETAILS))
75622c9e 420 fprintf (dump_file, " looping\n");
f10ea640
JH
421 }
422 if (flags & ECF_CONST)
423 {
424 *state = IPA_CONST;
425 if (dump_file && (dump_flags & TDF_DETAILS))
426 fprintf (dump_file, " const\n");
427 }
428 else if (flags & ECF_PURE)
429 {
430 *state = IPA_PURE;
431 if (dump_file && (dump_flags & TDF_DETAILS))
432 fprintf (dump_file, " pure\n");
433 }
434 else if (cannot_lead_to_return)
435 {
436 *state = IPA_PURE;
437 *looping = true;
438 if (dump_file && (dump_flags & TDF_DETAILS))
439 fprintf (dump_file, " ignoring side effects->pure looping\n");
440 }
441 else
442 {
443 if (dump_file && (dump_flags & TDF_DETAILS))
df92c640 444 fprintf (dump_file, " neither\n");
f10ea640
JH
445 *state = IPA_NEITHER;
446 *looping = true;
447 }
448}
449
450/* Merge STATE and STATE2 and LOOPING and LOOPING2 and store
451 into STATE and LOOPING better of the two variants.
452 Be sure to merge looping correctly. IPA_NEITHER functions
453 have looping 0 even if they don't have to return. */
454
455static inline void
456better_state (enum pure_const_state_e *state, bool *looping,
457 enum pure_const_state_e state2, bool looping2)
458{
459 if (state2 < *state)
460 {
461 if (*state == IPA_NEITHER)
462 *looping = looping2;
463 else
464 *looping = MIN (*looping, looping2);
b0d04a5f 465 *state = state2;
f10ea640
JH
466 }
467 else if (state2 != IPA_NEITHER)
468 *looping = MIN (*looping, looping2);
469}
470
471/* Merge STATE and STATE2 and LOOPING and LOOPING2 and store
cc950f98
JH
472 into STATE and LOOPING worse of the two variants.
473 N is the actual node called. */
f10ea640
JH
474
475static inline void
476worse_state (enum pure_const_state_e *state, bool *looping,
cc950f98
JH
477 enum pure_const_state_e state2, bool looping2,
478 struct symtab_node *from,
479 struct symtab_node *to)
f10ea640 480{
cc950f98
JH
481 /* Consider function:
482
483 bool a(int *p)
484 {
485 return *p==*p;
486 }
487
488 During early optimization we will turn this into:
489
490 bool a(int *p)
491 {
492 return true;
493 }
494
495 Now if this function will be detected as CONST however when interposed it
496 may end up being just pure. We always must assume the worst scenario here.
497 */
498 if (*state == IPA_CONST && state2 == IPA_CONST
499 && to && !TREE_READONLY (to->decl) && !to->binds_to_current_def_p (from))
500 {
501 if (dump_file && (dump_flags & TDF_DETAILS))
502 fprintf (dump_file, "Dropping state to PURE because call to %s may not "
3629ff8a 503 "bind to current def.\n", to->dump_name ());
cc950f98
JH
504 state2 = IPA_PURE;
505 }
f10ea640
JH
506 *state = MAX (*state, state2);
507 *looping = MAX (*looping, looping2);
508}
509
992644c3 510/* Recognize special cases of builtins that are by themselves not const
0a42aa4e 511 but function using them is. */
992644c3
JH
512bool
513builtin_safe_for_const_function_p (bool *looping, tree callee)
0a42aa4e
JH
514{
515 if (DECL_BUILT_IN_CLASS (callee) == BUILT_IN_NORMAL)
516 switch (DECL_FUNCTION_CODE (callee))
517 {
813b70a1
JJ
518 case BUILT_IN_RETURN:
519 case BUILT_IN_UNREACHABLE:
520 CASE_BUILT_IN_ALLOCA:
521 case BUILT_IN_STACK_SAVE:
522 case BUILT_IN_STACK_RESTORE:
523 case BUILT_IN_EH_POINTER:
524 case BUILT_IN_EH_FILTER:
525 case BUILT_IN_UNWIND_RESUME:
526 case BUILT_IN_CXA_END_CLEANUP:
527 case BUILT_IN_EH_COPY_VALUES:
528 case BUILT_IN_FRAME_ADDRESS:
529 case BUILT_IN_APPLY_ARGS:
530 case BUILT_IN_ASAN_BEFORE_DYNAMIC_INIT:
531 case BUILT_IN_ASAN_AFTER_DYNAMIC_INIT:
33a7a632
JH
532 case BUILT_IN_DWARF_CFA:
533 case BUILT_IN_RETURN_ADDRESS:
813b70a1 534 *looping = false;
813b70a1
JJ
535 return true;
536 case BUILT_IN_PREFETCH:
537 *looping = true;
813b70a1
JJ
538 return true;
539 default:
540 break;
0a42aa4e
JH
541 }
542 return false;
543}
544
ea900239
DB
545/* Check the parameters of a function call to CALL_EXPR to see if
546 there are any references in the parameters that are not allowed for
547 pure or const functions. Also check to see if this is either an
548 indirect call, a call outside the compilation unit, or has special
549 attributes that may also effect the purity. The CALL_EXPR node for
550 the entire call expression. */
551
552static void
538dd0b7 553check_call (funct_state local, gcall *call, bool ipa)
ea900239 554{
726a989a 555 int flags = gimple_call_flags (call);
33977f81 556 tree callee_t = gimple_call_fndecl (call);
36bbc05d 557 bool possibly_throws = stmt_could_throw_p (cfun, call);
33977f81 558 bool possibly_throws_externally = (possibly_throws
36bbc05d 559 && stmt_can_throw_external (cfun, call));
ea900239 560
33977f81
JH
561 if (possibly_throws)
562 {
563 unsigned int i;
564 for (i = 0; i < gimple_num_ops (call); i++)
565 if (gimple_op (call, i)
566 && tree_could_throw_p (gimple_op (call, i)))
567 {
8f4f502f 568 if (possibly_throws && cfun->can_throw_non_call_exceptions)
33977f81
JH
569 {
570 if (dump_file)
571 fprintf (dump_file, " operand can throw; looping\n");
572 local->looping = true;
573 }
574 if (possibly_throws_externally)
575 {
576 if (dump_file)
577 fprintf (dump_file, " operand can throw externally\n");
578 local->can_throw = true;
579 }
580 }
581 }
b8698a0f 582
ea900239
DB
583 /* The const and pure flags are set by a variety of places in the
584 compiler (including here). If someone has already set the flags
585 for the callee, (such as for some of the builtins) we will use
b8698a0f
L
586 them, otherwise we will compute our own information.
587
ea900239
DB
588 Const and pure functions have less clobber effects than other
589 functions so we process these first. Otherwise if it is a call
590 outside the compilation unit or an indirect call we punt. This
591 leaves local calls which will be processed by following the call
b8698a0f 592 graph. */
ea900239
DB
593 if (callee_t)
594 {
0a42aa4e
JH
595 bool call_looping;
596
8413ca87
JJ
597 if (gimple_call_builtin_p (call, BUILT_IN_NORMAL)
598 && !nonfreeing_call_p (call))
599 local->can_free = true;
600
992644c3 601 if (builtin_safe_for_const_function_p (&call_looping, callee_t))
0a42aa4e
JH
602 {
603 worse_state (&local->pure_const_state, &local->looping,
992644c3 604 IPA_CONST, call_looping,
cc950f98 605 NULL, NULL);
0a42aa4e
JH
606 return;
607 }
ea900239
DB
608 /* When bad things happen to bad functions, they cannot be const
609 or pure. */
610 if (setjmp_call_p (callee_t))
becfd6e5 611 {
33977f81
JH
612 if (dump_file)
613 fprintf (dump_file, " setjmp is not const/pure\n");
614 local->looping = true;
becfd6e5 615 local->pure_const_state = IPA_NEITHER;
becfd6e5 616 }
ea900239
DB
617
618 if (DECL_BUILT_IN_CLASS (callee_t) == BUILT_IN_NORMAL)
619 switch (DECL_FUNCTION_CODE (callee_t))
620 {
621 case BUILT_IN_LONGJMP:
622 case BUILT_IN_NONLOCAL_GOTO:
33977f81 623 if (dump_file)
813b70a1
JJ
624 fprintf (dump_file,
625 " longjmp and nonlocal goto is not const/pure\n");
ea900239 626 local->pure_const_state = IPA_NEITHER;
813b70a1 627 local->looping = true;
ea900239
DB
628 break;
629 default:
630 break;
631 }
632 }
8413ca87
JJ
633 else if (gimple_call_internal_p (call) && !nonfreeing_call_p (call))
634 local->can_free = true;
ea900239 635
33977f81 636 /* When not in IPA mode, we can still handle self recursion. */
fc11f321
JH
637 if (!ipa && callee_t
638 && recursive_call_p (current_function_decl, callee_t))
5dc16b19
MLI
639 {
640 if (dump_file)
641 fprintf (dump_file, " Recursive call can loop.\n");
642 local->looping = true;
643 }
61502ca8 644 /* Either callee is unknown or we are doing local analysis.
c59f5d1b
JH
645 Look to see if there are any bits available for the callee (such as by
646 declaration or because it is builtin) and process solely on the basis of
d40790c8
JJ
647 those bits. Handle internal calls always, those calls don't have
648 corresponding cgraph edges and thus aren't processed during
649 the propagation. */
650 else if (!ipa || gimple_call_internal_p (call))
ea900239 651 {
f10ea640
JH
652 enum pure_const_state_e call_state;
653 bool call_looping;
8f4f502f 654 if (possibly_throws && cfun->can_throw_non_call_exceptions)
33977f81
JH
655 {
656 if (dump_file)
657 fprintf (dump_file, " can throw; looping\n");
658 local->looping = true;
659 }
660 if (possibly_throws_externally)
661 {
662 if (dump_file)
663 {
1d65f45c
RH
664 fprintf (dump_file, " can throw externally to lp %i\n",
665 lookup_stmt_eh_lp (call));
33977f81
JH
666 if (callee_t)
667 fprintf (dump_file, " callee:%s\n",
668 IDENTIFIER_POINTER (DECL_ASSEMBLER_NAME (callee_t)));
669 }
670 local->can_throw = true;
671 }
f10ea640
JH
672 if (dump_file && (dump_flags & TDF_DETAILS))
673 fprintf (dump_file, " checking flags for call:");
674 state_from_flags (&call_state, &call_looping, flags,
675 ((flags & (ECF_NORETURN | ECF_NOTHROW))
676 == (ECF_NORETURN | ECF_NOTHROW))
677 || (!flag_exceptions && (flags & ECF_NORETURN)));
678 worse_state (&local->pure_const_state, &local->looping,
cc950f98 679 call_state, call_looping, NULL, NULL);
ea900239 680 }
33977f81 681 /* Direct functions calls are handled by IPA propagation. */
ea900239
DB
682}
683
f10ea640 684/* Wrapper around check_decl for loads in local more. */
346ef3fa
RG
685
686static bool
355fe088 687check_load (gimple *, tree op, tree, void *data)
346ef3fa
RG
688{
689 if (DECL_P (op))
f10ea640 690 check_decl ((funct_state)data, op, false, false);
346ef3fa
RG
691 else
692 check_op ((funct_state)data, op, false);
693 return false;
694}
695
f10ea640 696/* Wrapper around check_decl for stores in local more. */
346ef3fa
RG
697
698static bool
355fe088 699check_store (gimple *, tree op, tree, void *data)
346ef3fa
RG
700{
701 if (DECL_P (op))
f10ea640
JH
702 check_decl ((funct_state)data, op, true, false);
703 else
704 check_op ((funct_state)data, op, true);
705 return false;
706}
707
708/* Wrapper around check_decl for loads in ipa mode. */
709
710static bool
355fe088 711check_ipa_load (gimple *, tree op, tree, void *data)
f10ea640
JH
712{
713 if (DECL_P (op))
714 check_decl ((funct_state)data, op, false, true);
715 else
716 check_op ((funct_state)data, op, false);
717 return false;
718}
719
720/* Wrapper around check_decl for stores in ipa mode. */
721
722static bool
355fe088 723check_ipa_store (gimple *, tree op, tree, void *data)
f10ea640
JH
724{
725 if (DECL_P (op))
726 check_decl ((funct_state)data, op, true, true);
346ef3fa
RG
727 else
728 check_op ((funct_state)data, op, true);
729 return false;
730}
731
5006671f
RG
732/* Look into pointer pointed to by GSIP and figure out what interesting side
733 effects it has. */
33977f81
JH
734static void
735check_stmt (gimple_stmt_iterator *gsip, funct_state local, bool ipa)
ea900239 736{
355fe088 737 gimple *stmt = gsi_stmt (*gsip);
ea900239 738
b5b8b0ac
AO
739 if (is_gimple_debug (stmt))
740 return;
741
38147a2a
JH
742 /* Do consider clobber as side effects before IPA, so we rather inline
743 C++ destructors and keep clobber semantics than eliminate them.
744
3991912e
JH
745 Similar logic is in ipa-modref.
746
38147a2a
JH
747 TODO: We may get smarter during early optimizations on these and let
748 functions containing only clobbers to be optimized more. This is a common
749 case of C++ destructors. */
750
751 if ((ipa || cfun->after_inlining) && gimple_clobber_p (stmt))
752 return;
753
33977f81 754 if (dump_file)
ea900239 755 {
33977f81 756 fprintf (dump_file, " scanning: ");
ef6cb4c7 757 print_gimple_stmt (dump_file, stmt, 0);
33977f81 758 }
5006671f 759
ace018f9
RG
760 if (gimple_has_volatile_ops (stmt)
761 && !gimple_clobber_p (stmt))
4e89a3fa
RG
762 {
763 local->pure_const_state = IPA_NEITHER;
764 if (dump_file)
765 fprintf (dump_file, " Volatile stmt is not const/pure\n");
766 }
767
346ef3fa 768 /* Look for loads and stores. */
f10ea640
JH
769 walk_stmt_load_store_ops (stmt, local,
770 ipa ? check_ipa_load : check_load,
771 ipa ? check_ipa_store : check_store);
33977f81
JH
772
773 if (gimple_code (stmt) != GIMPLE_CALL
36bbc05d 774 && stmt_could_throw_p (cfun, stmt))
33977f81 775 {
8f4f502f 776 if (cfun->can_throw_non_call_exceptions)
33977f81
JH
777 {
778 if (dump_file)
425b784f 779 fprintf (dump_file, " can throw; looping\n");
33977f81
JH
780 local->looping = true;
781 }
36bbc05d 782 if (stmt_can_throw_external (cfun, stmt))
33977f81
JH
783 {
784 if (dump_file)
425b784f 785 fprintf (dump_file, " can throw externally\n");
33977f81
JH
786 local->can_throw = true;
787 }
425b784f
JH
788 else
789 if (dump_file)
790 fprintf (dump_file, " can throw\n");
726a989a 791 }
726a989a
RB
792 switch (gimple_code (stmt))
793 {
33977f81 794 case GIMPLE_CALL:
538dd0b7 795 check_call (local, as_a <gcall *> (stmt), ipa);
ea900239 796 break;
726a989a 797 case GIMPLE_LABEL:
538dd0b7 798 if (DECL_NONLOCAL (gimple_label_label (as_a <glabel *> (stmt))))
ea900239 799 /* Target of long jump. */
becfd6e5 800 {
33977f81 801 if (dump_file)
425b784f 802 fprintf (dump_file, " nonlocal label is not const/pure\n");
becfd6e5 803 local->pure_const_state = IPA_NEITHER;
becfd6e5 804 }
ea900239 805 break;
726a989a 806 case GIMPLE_ASM:
538dd0b7 807 if (gimple_asm_clobbers_memory_p (as_a <gasm *> (stmt)))
33977f81 808 {
edcdea5b 809 if (dump_file)
425b784f 810 fprintf (dump_file, " memory asm clobber is not const/pure\n");
edcdea5b
NF
811 /* Abandon all hope, ye who enter here. */
812 local->pure_const_state = IPA_NEITHER;
8413ca87 813 local->can_free = true;
33977f81 814 }
538dd0b7 815 if (gimple_asm_volatile_p (as_a <gasm *> (stmt)))
33977f81
JH
816 {
817 if (dump_file)
425b784f 818 fprintf (dump_file, " volatile is not const/pure\n");
33977f81
JH
819 /* Abandon all hope, ye who enter here. */
820 local->pure_const_state = IPA_NEITHER;
8413ca87
JJ
821 local->looping = true;
822 local->can_free = true;
33977f81
JH
823 }
824 return;
ea900239
DB
825 default:
826 break;
827 }
ea900239
DB
828}
829
0fab169b
PK
830/* Check that RETVAL is used only in STMT and in comparisons against 0.
831 RETVAL is return value of the function and STMT is return stmt. */
832
833static bool
834check_retval_uses (tree retval, gimple *stmt)
835{
836 imm_use_iterator use_iter;
837 gimple *use_stmt;
838
839 FOR_EACH_IMM_USE_STMT (use_stmt, use_iter, retval)
840 if (gcond *cond = dyn_cast<gcond *> (use_stmt))
841 {
842 tree op2 = gimple_cond_rhs (cond);
843 if (!integer_zerop (op2))
640296c3 844 return false;
0fab169b
PK
845 }
846 else if (gassign *ga = dyn_cast<gassign *> (use_stmt))
847 {
848 enum tree_code code = gimple_assign_rhs_code (ga);
849 if (TREE_CODE_CLASS (code) != tcc_comparison)
640296c3 850 return false;
0fab169b 851 if (!integer_zerop (gimple_assign_rhs2 (ga)))
640296c3 852 return false;
0fab169b
PK
853 }
854 else if (is_gimple_debug (use_stmt))
855 ;
856 else if (use_stmt != stmt)
640296c3 857 return false;
0fab169b
PK
858
859 return true;
860}
861
862/* malloc_candidate_p() checks if FUN can possibly be annotated with malloc
863 attribute. Currently this function does a very conservative analysis.
864 FUN is considered to be a candidate if
865 1) It returns a value of pointer type.
866 2) SSA_NAME_DEF_STMT (return_value) is either a function call or
867 a phi, and element of phi is either NULL or
868 SSA_NAME_DEF_STMT(element) is function call.
869 3) The return-value has immediate uses only within comparisons (gcond or gassign)
870 and return_stmt (and likewise a phi arg has immediate use only within comparison
871 or the phi stmt). */
872
0fab169b
PK
873#define DUMP_AND_RETURN(reason) \
874{ \
875 if (dump_file && (dump_flags & TDF_DETAILS)) \
a8c80d03 876 fprintf (dump_file, "\n%s is not a malloc candidate, reason: %s\n", \
3629ff8a 877 (node->dump_name ()), (reason)); \
0fab169b
PK
878 return false; \
879}
880
9a471714 881static bool
4882e5ba
RB
882malloc_candidate_p_1 (function *fun, tree retval, gimple *ret_stmt, bool ipa,
883 bitmap visited)
9a471714
PK
884{
885 cgraph_node *node = cgraph_node::get_create (fun->decl);
4882e5ba
RB
886 if (!bitmap_set_bit (visited, SSA_NAME_VERSION (retval)))
887 return true;
9a471714
PK
888
889 if (!check_retval_uses (retval, ret_stmt))
890 DUMP_AND_RETURN("Return value has uses outside return stmt"
891 " and comparisons against 0.")
892
893 gimple *def = SSA_NAME_DEF_STMT (retval);
894
895 if (gcall *call_stmt = dyn_cast<gcall *> (def))
896 {
897 tree callee_decl = gimple_call_fndecl (call_stmt);
898 if (!callee_decl)
899 return false;
900
901 if (!ipa && !DECL_IS_MALLOC (callee_decl))
902 DUMP_AND_RETURN("callee_decl does not have malloc attribute for"
903 " non-ipa mode.")
904
905 cgraph_edge *cs = node->get_edge (call_stmt);
906 if (cs)
907 {
908 ipa_call_summary *es = ipa_call_summaries->get_create (cs);
909 es->is_return_callee_uncaptured = true;
910 }
911 }
912
913 else if (gphi *phi = dyn_cast<gphi *> (def))
914 {
915 bool all_args_zero = true;
916 for (unsigned i = 0; i < gimple_phi_num_args (phi); ++i)
917 {
918 tree arg = gimple_phi_arg_def (phi, i);
919 if (integer_zerop (arg))
920 continue;
921
922 all_args_zero = false;
923 if (TREE_CODE (arg) != SSA_NAME)
924 DUMP_AND_RETURN ("phi arg is not SSA_NAME.");
925 if (!check_retval_uses (arg, phi))
926 DUMP_AND_RETURN ("phi arg has uses outside phi"
927 " and comparisons against 0.")
928
929 gimple *arg_def = SSA_NAME_DEF_STMT (arg);
930 if (is_a<gphi *> (arg_def))
931 {
4882e5ba 932 if (!malloc_candidate_p_1 (fun, arg, phi, ipa, visited))
9a471714
PK
933 DUMP_AND_RETURN ("nested phi fail")
934 continue;
935 }
936
937 gcall *call_stmt = dyn_cast<gcall *> (arg_def);
938 if (!call_stmt)
939 DUMP_AND_RETURN ("phi arg is a not a call_stmt.")
940
941 tree callee_decl = gimple_call_fndecl (call_stmt);
942 if (!callee_decl)
943 return false;
944 if (!ipa && !DECL_IS_MALLOC (callee_decl))
945 DUMP_AND_RETURN("callee_decl does not have malloc attribute"
946 " for non-ipa mode.")
947
948 cgraph_edge *cs = node->get_edge (call_stmt);
949 if (cs)
950 {
951 ipa_call_summary *es = ipa_call_summaries->get_create (cs);
952 es->is_return_callee_uncaptured = true;
953 }
954 }
955
956 if (all_args_zero)
957 DUMP_AND_RETURN ("Return value is a phi with all args equal to 0.")
958 }
959
960 else
961 DUMP_AND_RETURN("def_stmt of return value is not a call or phi-stmt.")
962
963 return true;
964}
965
966static bool
967malloc_candidate_p (function *fun, bool ipa)
968{
969 basic_block exit_block = EXIT_BLOCK_PTR_FOR_FN (fun);
970 edge e;
971 edge_iterator ei;
972 cgraph_node *node = cgraph_node::get_create (fun->decl);
973
a8c80d03
PK
974 if (EDGE_COUNT (exit_block->preds) == 0
975 || !flag_delete_null_pointer_checks)
0fab169b
PK
976 return false;
977
4882e5ba 978 auto_bitmap visited;
0fab169b
PK
979 FOR_EACH_EDGE (e, ei, exit_block->preds)
980 {
981 gimple_stmt_iterator gsi = gsi_last_bb (e->src);
982 greturn *ret_stmt = dyn_cast<greturn *> (gsi_stmt (gsi));
983
984 if (!ret_stmt)
985 return false;
986
987 tree retval = gimple_return_retval (ret_stmt);
988 if (!retval)
989 DUMP_AND_RETURN("No return value.")
990
991 if (TREE_CODE (retval) != SSA_NAME
992 || TREE_CODE (TREE_TYPE (retval)) != POINTER_TYPE)
993 DUMP_AND_RETURN("Return value is not SSA_NAME or not a pointer type.")
994
4882e5ba 995 if (!malloc_candidate_p_1 (fun, retval, ret_stmt, ipa, visited))
9a471714 996 return false;
0fab169b
PK
997 }
998
999 if (dump_file && (dump_flags & TDF_DETAILS))
1000 fprintf (dump_file, "\nFound %s to be candidate for malloc attribute\n",
1001 IDENTIFIER_POINTER (DECL_NAME (fun->decl)));
1002 return true;
0fab169b
PK
1003}
1004
9a471714 1005#undef DUMP_AND_RETURN
812dbce5 1006
992644c3
JH
1007/* Return true if function is known to be finite. */
1008
1009bool
1010finite_function_p ()
1011{
1012 /* Const functions cannot have back edges (an
1013 indication of possible infinite loop side
1014 effect. */
1015 bool finite = true;
1016 if (mark_dfs_back_edges ())
1017 {
1018 /* Preheaders are needed for SCEV to work.
1019 Simple latches and recorded exits improve chances that loop will
1020 proved to be finite in testcases such as in loop-15.c
1021 and loop-24.c */
1022 loop_optimizer_init (LOOPS_HAVE_PREHEADERS
1023 | LOOPS_HAVE_SIMPLE_LATCHES
1024 | LOOPS_HAVE_RECORDED_EXITS);
1025 if (dump_file && (dump_flags & TDF_DETAILS))
1026 flow_loops_dump (dump_file, NULL, 0);
1027 if (mark_irreducible_loops ())
1028 {
1029 if (dump_file)
1030 fprintf (dump_file, " has irreducible loops\n");
1031 finite = false;
1032 }
1033 else
1034 {
1035 scev_initialize ();
1036 for (auto loop : loops_list (cfun, 0))
1037 if (!finite_loop_p (loop))
1038 {
1039 if (dump_file)
1040 fprintf (dump_file, " cannot prove finiteness of "
1041 "loop %i\n", loop->num);
1042 finite =false;
1043 break;
1044 }
1045 scev_finalize ();
1046 }
1047 loop_optimizer_finalize ();
1048 }
1049 return finite;
1050}
1051
ea900239
DB
1052/* This is the main routine for finding the reference patterns for
1053 global variables within a function FN. */
1054
33977f81
JH
1055static funct_state
1056analyze_function (struct cgraph_node *fn, bool ipa)
ea900239 1057{
67348ccc 1058 tree decl = fn->decl;
33977f81
JH
1059 funct_state l;
1060 basic_block this_block;
ea900239 1061
99b1c316 1062 l = XCNEW (class funct_state_d);
33977f81 1063 l->pure_const_state = IPA_CONST;
f87c9042
JH
1064 l->state_previously_known = IPA_NEITHER;
1065 l->looping_previously_known = true;
33977f81
JH
1066 l->looping = false;
1067 l->can_throw = false;
8413ca87 1068 l->can_free = false;
c47d0034 1069 state_from_flags (&l->state_previously_known, &l->looping_previously_known,
67348ccc 1070 flags_from_decl_or_type (fn->decl),
d52f5295 1071 fn->cannot_return_p ());
c47d0034 1072
67f3791f 1073 if (fn->thunk || fn->alias)
c47d0034
JH
1074 {
1075 /* Thunk gets propagated through, so nothing interesting happens. */
1076 gcc_assert (ipa);
67f3791f 1077 if (fn->thunk && thunk_info::get (fn)->virtual_offset_p)
6cbde2e3 1078 l->pure_const_state = IPA_NEITHER;
c47d0034
JH
1079 return l;
1080 }
ea900239
DB
1081
1082 if (dump_file)
1083 {
b8698a0f 1084 fprintf (dump_file, "\n\n local analysis of %s\n ",
3629ff8a 1085 fn->dump_name ());
ea900239 1086 }
b8698a0f 1087
33977f81 1088 push_cfun (DECL_STRUCT_FUNCTION (decl));
b8698a0f 1089
11cd3bed 1090 FOR_EACH_BB_FN (this_block, cfun)
ea900239 1091 {
33977f81
JH
1092 gimple_stmt_iterator gsi;
1093 struct walk_stmt_info wi;
ea900239 1094
c3284718 1095 memset (&wi, 0, sizeof (wi));
33977f81
JH
1096 for (gsi = gsi_start_bb (this_block);
1097 !gsi_end_p (gsi);
1098 gsi_next (&gsi))
ea900239 1099 {
e93809f6
JH
1100 /* NULL memory accesses terminates BB. These accesses are known
1101 to trip undefined behaviour. gimple-ssa-isolate-paths turns them
1102 to volatile accesses and adds builtin_trap call which would
1103 confuse us otherwise. */
1104 if (infer_nonnull_range_by_dereference (gsi_stmt (gsi),
1105 null_pointer_node))
1106 {
1107 if (dump_file)
1108 fprintf (dump_file, " NULL memory access; terminating BB%s\n",
1109 flag_non_call_exceptions ? "; looping" : "");
1110 if (flag_non_call_exceptions)
1111 {
1112 l->looping = true;
1113 if (stmt_can_throw_external (cfun, gsi_stmt (gsi)))
1114 {
1115 if (dump_file)
1116 fprintf (dump_file, " can throw externally\n");
1117 l->can_throw = true;
1118 }
1119 }
1120 break;
1121 }
33977f81 1122 check_stmt (&gsi, l, ipa);
8413ca87
JJ
1123 if (l->pure_const_state == IPA_NEITHER
1124 && l->looping
1125 && l->can_throw
1126 && l->can_free)
33977f81 1127 goto end;
ea900239
DB
1128 }
1129 }
13335ae6
AP
1130
1131end:
992644c3
JH
1132 if (l->pure_const_state != IPA_NEITHER
1133 && !l->looping
1134 && !finite_function_p ())
1135 l->looping = true;
33977f81 1136
f10ea640
JH
1137 if (dump_file && (dump_flags & TDF_DETAILS))
1138 fprintf (dump_file, " checking previously known:");
f10ea640
JH
1139
1140 better_state (&l->pure_const_state, &l->looping,
1141 l->state_previously_known,
1142 l->looping_previously_known);
33977f81
JH
1143 if (TREE_NOTHROW (decl))
1144 l->can_throw = false;
1145
0fab169b
PK
1146 l->malloc_state = STATE_MALLOC_BOTTOM;
1147 if (DECL_IS_MALLOC (decl))
1148 l->malloc_state = STATE_MALLOC;
1149 else if (ipa && malloc_candidate_p (DECL_STRUCT_FUNCTION (decl), true))
1150 l->malloc_state = STATE_MALLOC_TOP;
1151 else if (malloc_candidate_p (DECL_STRUCT_FUNCTION (decl), false))
1152 l->malloc_state = STATE_MALLOC;
1153
33977f81 1154 pop_cfun ();
13335ae6
AP
1155 if (dump_file)
1156 {
33977f81
JH
1157 if (l->looping)
1158 fprintf (dump_file, "Function is locally looping.\n");
1159 if (l->can_throw)
1160 fprintf (dump_file, "Function is locally throwing.\n");
1161 if (l->pure_const_state == IPA_CONST)
1162 fprintf (dump_file, "Function is locally const.\n");
1163 if (l->pure_const_state == IPA_PURE)
1164 fprintf (dump_file, "Function is locally pure.\n");
8413ca87
JJ
1165 if (l->can_free)
1166 fprintf (dump_file, "Function can locally free.\n");
0fab169b
PK
1167 if (l->malloc_state == STATE_MALLOC)
1168 fprintf (dump_file, "Function is locally malloc.\n");
13335ae6 1169 }
33977f81 1170 return l;
ea900239
DB
1171}
1172
36330f82
ML
1173void
1174funct_state_summary_t::insert (cgraph_node *node, funct_state_d *state)
129a37fc 1175{
129a37fc
JH
1176 /* There are some shared nodes, in particular the initializers on
1177 static declarations. We do not need to scan them more than once
1178 since all we would be interested in are the addressof
1179 operations. */
cc950f98 1180 if (opt_for_fn (node->decl, flag_ipa_pure_const))
e2c9111c 1181 {
36330f82
ML
1182 funct_state_d *a = analyze_function (node, true);
1183 new (state) funct_state_d (*a);
1184 free (a);
e2c9111c 1185 }
d5d9706f
JH
1186 else
1187 /* Do not keep stale summaries. */
1188 funct_state_summaries->remove (node);
e2c9111c
JH
1189}
1190
1191/* Called when new clone is inserted to callgraph late. */
1192
36330f82 1193void
33351ff9 1194funct_state_summary_t::duplicate (cgraph_node *, cgraph_node *dst,
36330f82
ML
1195 funct_state_d *src_data,
1196 funct_state_d *dst_data)
e2c9111c 1197{
36330f82 1198 new (dst_data) funct_state_d (*src_data);
33351ff9
ML
1199 if (dst_data->malloc_state == STATE_MALLOC
1200 && VOID_TYPE_P (TREE_TYPE (TREE_TYPE (dst->decl))))
1201 dst_data->malloc_state = STATE_MALLOC_BOTTOM;
e2c9111c
JH
1202}
1203
ea900239 1204\f
3edf64aa
DM
1205void
1206pass_ipa_pure_const::
d7f09764 1207register_hooks (void)
ea900239 1208{
d7f09764
DN
1209 if (init_p)
1210 return;
1211
1212 init_p = true;
ea900239 1213
36330f82 1214 funct_state_summaries = new funct_state_summary_t (symtab);
d7f09764
DN
1215}
1216
1217
1218/* Analyze each function in the cgraph to see if it is locally PURE or
1219 CONST. */
1220
b8698a0f 1221static void
651df1b2 1222pure_const_generate_summary (void)
d7f09764
DN
1223{
1224 struct cgraph_node *node;
1225
3edf64aa
DM
1226 pass_ipa_pure_const *pass = static_cast <pass_ipa_pure_const *> (current_pass);
1227 pass->register_hooks ();
d7f09764 1228
b8698a0f 1229 /* Process all of the functions.
ea900239 1230
67914693 1231 We process AVAIL_INTERPOSABLE functions. We cannot use the results
c59f5d1b 1232 by default, but the info can be used at LTO with -fwhole-program or
61502ca8 1233 when function got cloned and the clone is AVAILABLE. */
c59f5d1b 1234
65c70e6b 1235 FOR_EACH_DEFINED_FUNCTION (node)
cc950f98 1236 if (opt_for_fn (node->decl, flag_ipa_pure_const))
36330f82
ML
1237 {
1238 funct_state_d *a = analyze_function (node, true);
1239 new (funct_state_summaries->get_create (node)) funct_state_d (*a);
1240 free (a);
1241 }
812dbce5
JH
1242}
1243
d7f09764
DN
1244
1245/* Serialize the ipa info for lto. */
1246
1247static void
f27c1867 1248pure_const_write_summary (void)
d7f09764
DN
1249{
1250 struct cgraph_node *node;
1251 struct lto_simple_output_block *ob
1252 = lto_create_simple_output_block (LTO_section_ipa_pure_const);
1253 unsigned int count = 0;
f27c1867
JH
1254 lto_symtab_encoder_iterator lsei;
1255 lto_symtab_encoder_t encoder;
d7f09764 1256
f27c1867
JH
1257 encoder = lto_get_out_decl_state ()->symtab_node_encoder;
1258
1259 for (lsei = lsei_start_function_in_partition (encoder); !lsei_end_p (lsei);
1260 lsei_next_function_in_partition (&lsei))
d7f09764 1261 {
f27c1867 1262 node = lsei_cgraph_node (lsei);
36330f82 1263 if (node->definition && funct_state_summaries->exists (node))
d7f09764
DN
1264 count++;
1265 }
b8698a0f 1266
412288f1 1267 streamer_write_uhwi_stream (ob->main_stream, count);
b8698a0f 1268
d7f09764 1269 /* Process all of the functions. */
f27c1867
JH
1270 for (lsei = lsei_start_function_in_partition (encoder); !lsei_end_p (lsei);
1271 lsei_next_function_in_partition (&lsei))
d7f09764 1272 {
f27c1867 1273 node = lsei_cgraph_node (lsei);
36330f82
ML
1274 funct_state_d *fs = funct_state_summaries->get (node);
1275 if (node->definition && fs != NULL)
d7f09764 1276 {
2465dcc2 1277 struct bitpack_d bp;
d7f09764 1278 int node_ref;
7380e6ef 1279 lto_symtab_encoder_t encoder;
b8698a0f 1280
7380e6ef 1281 encoder = ob->decl_state->symtab_node_encoder;
67348ccc 1282 node_ref = lto_symtab_encoder_encode (encoder, node);
412288f1 1283 streamer_write_uhwi_stream (ob->main_stream, node_ref);
b8698a0f 1284
d7f09764
DN
1285 /* Note that flags will need to be read in the opposite
1286 order as we are pushing the bitflags into FLAGS. */
2465dcc2
RG
1287 bp = bitpack_create (ob->main_stream);
1288 bp_pack_value (&bp, fs->pure_const_state, 2);
1289 bp_pack_value (&bp, fs->state_previously_known, 2);
1290 bp_pack_value (&bp, fs->looping_previously_known, 1);
1291 bp_pack_value (&bp, fs->looping, 1);
1292 bp_pack_value (&bp, fs->can_throw, 1);
8413ca87 1293 bp_pack_value (&bp, fs->can_free, 1);
0fab169b 1294 bp_pack_value (&bp, fs->malloc_state, 2);
412288f1 1295 streamer_write_bitpack (&bp);
d7f09764
DN
1296 }
1297 }
1298
1299 lto_destroy_simple_output_block (ob);
1300}
1301
1302
1303/* Deserialize the ipa info for lto. */
1304
b8698a0f 1305static void
d7f09764
DN
1306pure_const_read_summary (void)
1307{
1308 struct lto_file_decl_data **file_data_vec = lto_get_file_decl_data ();
1309 struct lto_file_decl_data *file_data;
1310 unsigned int j = 0;
1311
3edf64aa
DM
1312 pass_ipa_pure_const *pass = static_cast <pass_ipa_pure_const *> (current_pass);
1313 pass->register_hooks ();
1314
d7f09764
DN
1315 while ((file_data = file_data_vec[j++]))
1316 {
1317 const char *data;
1318 size_t len;
99b1c316 1319 class lto_input_block *ib
b8698a0f
L
1320 = lto_create_simple_input_block (file_data,
1321 LTO_section_ipa_pure_const,
d7f09764
DN
1322 &data, &len);
1323 if (ib)
1324 {
1325 unsigned int i;
412288f1 1326 unsigned int count = streamer_read_uhwi (ib);
d7f09764
DN
1327
1328 for (i = 0; i < count; i++)
1329 {
1330 unsigned int index;
1331 struct cgraph_node *node;
2465dcc2 1332 struct bitpack_d bp;
d7f09764 1333 funct_state fs;
7380e6ef 1334 lto_symtab_encoder_t encoder;
d7f09764 1335
412288f1 1336 index = streamer_read_uhwi (ib);
7380e6ef 1337 encoder = file_data->symtab_node_encoder;
d52f5295
ML
1338 node = dyn_cast<cgraph_node *> (lto_symtab_encoder_deref (encoder,
1339 index));
d7f09764 1340
36330f82 1341 fs = funct_state_summaries->get_create (node);
d7f09764
DN
1342 /* Note that the flags must be read in the opposite
1343 order in which they were written (the bitflags were
1344 pushed into FLAGS). */
412288f1 1345 bp = streamer_read_bitpack (ib);
d7f09764 1346 fs->pure_const_state
2465dcc2 1347 = (enum pure_const_state_e) bp_unpack_value (&bp, 2);
d7f09764 1348 fs->state_previously_known
2465dcc2
RG
1349 = (enum pure_const_state_e) bp_unpack_value (&bp, 2);
1350 fs->looping_previously_known = bp_unpack_value (&bp, 1);
1351 fs->looping = bp_unpack_value (&bp, 1);
1352 fs->can_throw = bp_unpack_value (&bp, 1);
8413ca87 1353 fs->can_free = bp_unpack_value (&bp, 1);
0fab169b
PK
1354 fs->malloc_state
1355 = (enum malloc_state_e) bp_unpack_value (&bp, 2);
1356
d56026c2
JH
1357 if (dump_file)
1358 {
67348ccc 1359 int flags = flags_from_decl_or_type (node->decl);
464d0118 1360 fprintf (dump_file, "Read info for %s ", node->dump_name ());
d56026c2
JH
1361 if (flags & ECF_CONST)
1362 fprintf (dump_file, " const");
1363 if (flags & ECF_PURE)
1364 fprintf (dump_file, " pure");
1365 if (flags & ECF_NOTHROW)
1366 fprintf (dump_file, " nothrow");
1367 fprintf (dump_file, "\n pure const state: %s\n",
1368 pure_const_names[fs->pure_const_state]);
1369 fprintf (dump_file, " previously known state: %s\n",
cc950f98 1370 pure_const_names[fs->state_previously_known]);
d56026c2
JH
1371 if (fs->looping)
1372 fprintf (dump_file," function is locally looping\n");
1373 if (fs->looping_previously_known)
1374 fprintf (dump_file," function is previously known looping\n");
1375 if (fs->can_throw)
1376 fprintf (dump_file," function is locally throwing\n");
8413ca87
JJ
1377 if (fs->can_free)
1378 fprintf (dump_file," function can locally free\n");
0fab169b
PK
1379 fprintf (dump_file, "\n malloc state: %s\n",
1380 malloc_state_names[fs->malloc_state]);
d56026c2 1381 }
d7f09764
DN
1382 }
1383
b8698a0f
L
1384 lto_destroy_simple_input_block (file_data,
1385 LTO_section_ipa_pure_const,
d7f09764
DN
1386 ib, data, len);
1387 }
1388 }
1389}
1390
9644e52a
JH
1391/* We only propagate across edges that can throw externally and their callee
1392 is not interposable. */
d7f09764 1393
2505c5ed 1394static bool
9644e52a 1395ignore_edge_for_nothrow (struct cgraph_edge *e)
2505c5ed 1396{
9644e52a
JH
1397 if (!e->can_throw_external || TREE_NOTHROW (e->callee->decl))
1398 return true;
1399
1400 enum availability avail;
97e59627
ML
1401 cgraph_node *ultimate_target
1402 = e->callee->function_or_virtual_thunk_symbol (&avail, e->caller);
1403 if (avail <= AVAIL_INTERPOSABLE || TREE_NOTHROW (ultimate_target->decl))
a2b056a3 1404 return true;
97e59627
ML
1405 return ((opt_for_fn (e->callee->decl, flag_non_call_exceptions)
1406 && !e->callee->binds_to_current_def_p (e->caller))
1407 || !opt_for_fn (e->caller->decl, flag_ipa_pure_const)
1408 || !opt_for_fn (ultimate_target->decl, flag_ipa_pure_const));
2505c5ed
JH
1409}
1410
fede8efa 1411/* Return true if NODE is self recursive function.
fc11f321
JH
1412 Indirectly recursive functions appears as non-trivial strongly
1413 connected components, so we need to care about self recursion
1414 only. */
03ec7d01
JH
1415
1416static bool
1417self_recursive_p (struct cgraph_node *node)
1418{
1419 struct cgraph_edge *e;
1420 for (e = node->callees; e; e = e->next_callee)
d52f5295 1421 if (e->callee->function_symbol () == node)
03ec7d01
JH
1422 return true;
1423 return false;
1424}
1425
17e0fc92
JH
1426/* Return true if N is cdtor that is not const or pure. In this case we may
1427 need to remove unreachable function if it is marked const/pure. */
1428
1429static bool
1430cdtor_p (cgraph_node *n, void *)
1431{
1432 if (DECL_STATIC_CONSTRUCTOR (n->decl) || DECL_STATIC_DESTRUCTOR (n->decl))
cd6d518b
JJ
1433 return ((!TREE_READONLY (n->decl) && !DECL_PURE_P (n->decl))
1434 || DECL_LOOPING_CONST_OR_PURE_P (n->decl));
17e0fc92
JH
1435 return false;
1436}
1437
97e59627
ML
1438/* Skip edges from and to nodes without ipa_pure_const enabled.
1439 Ignore not available symbols. */
d8e3e8a5
JH
1440
1441static bool
1442ignore_edge_for_pure_const (struct cgraph_edge *e)
1443{
1444 enum availability avail;
97e59627
ML
1445 cgraph_node *ultimate_target
1446 = e->callee->function_or_virtual_thunk_symbol (&avail, e->caller);
d8e3e8a5 1447
97e59627
ML
1448 return (avail <= AVAIL_INTERPOSABLE
1449 || !opt_for_fn (e->caller->decl, flag_ipa_pure_const)
1450 || !opt_for_fn (ultimate_target->decl,
1451 flag_ipa_pure_const));
1452}
d8e3e8a5 1453
494bdadf
JH
1454/* Return true if function should be skipped for local pure const analysis. */
1455
1456static bool
1457skip_function_for_local_pure_const (struct cgraph_node *node)
1458{
1459 /* Because we do not schedule pass_fixup_cfg over whole program after early
1460 optimizations we must not promote functions that are called by already
1461 processed functions. */
1462
1463 if (function_called_by_processed_nodes_p ())
1464 {
1465 if (dump_file)
1466 fprintf (dump_file, "Function called in recursive cycle; ignoring\n");
1467 return true;
1468 }
1469 /* Save some work and do not analyze functions which are interposable and
1470 do not have any non-interposable aliases. */
1471 if (node->get_availability () <= AVAIL_INTERPOSABLE
1472 && !flag_lto
1473 && !node->has_aliases_p ())
1474 {
1475 if (dump_file)
1476 fprintf (dump_file,
1477 "Function is interposable; not analyzing.\n");
1478 return true;
1479 }
1480 return false;
1481}
1482
1483/* Make function const and output warning. If LOCAL is true,
1484 return true if anything changed. Otherwise return true if
1485 we may have introduced removale ctors. */
1486
1487bool
1488ipa_make_function_const (struct cgraph_node *node, bool looping, bool local)
1489{
1490 bool cdtor = false;
1491
1492 if (TREE_READONLY (node->decl)
1493 && (looping || !DECL_LOOPING_CONST_OR_PURE_P (node->decl)))
1494 return false;
1495 warn_function_const (node->decl, !looping);
1496 if (local && skip_function_for_local_pure_const (node))
1497 return false;
1498 if (dump_file)
1499 fprintf (dump_file, "Function found to be %sconst: %s\n",
1500 looping ? "looping " : "",
1501 node->dump_name ());
6471396d 1502 if (!local && !looping)
494bdadf 1503 cdtor = node->call_for_symbol_and_aliases (cdtor_p, NULL, true);
6471396d
JH
1504 if (!dbg_cnt (ipa_attr))
1505 return false;
494bdadf
JH
1506 if (node->set_const_flag (true, looping))
1507 {
1508 if (dump_file)
1509 fprintf (dump_file,
1510 "Declaration updated to be %sconst: %s\n",
1511 looping ? "looping " : "",
1512 node->dump_name ());
1513 if (local)
1514 return true;
1515 return cdtor;
1516 }
1517 return false;
1518}
1519
1520/* Make function const and output warning. If LOCAL is true,
1521 return true if anything changed. Otherwise return true if
1522 we may have introduced removale ctors. */
1523
1524bool
1525ipa_make_function_pure (struct cgraph_node *node, bool looping, bool local)
1526{
1527 bool cdtor = false;
1528
45e09c2e
RB
1529 if (TREE_READONLY (node->decl)
1530 || (DECL_PURE_P (node->decl)
1531 && (looping || !DECL_LOOPING_CONST_OR_PURE_P (node->decl))))
494bdadf
JH
1532 return false;
1533 warn_function_pure (node->decl, !looping);
1534 if (local && skip_function_for_local_pure_const (node))
1535 return false;
1536 if (dump_file)
1537 fprintf (dump_file, "Function found to be %spure: %s\n",
1538 looping ? "looping " : "",
1539 node->dump_name ());
6471396d 1540 if (!local && !looping)
494bdadf 1541 cdtor = node->call_for_symbol_and_aliases (cdtor_p, NULL, true);
6471396d
JH
1542 if (!dbg_cnt (ipa_attr))
1543 return false;
494bdadf
JH
1544 if (node->set_pure_flag (true, looping))
1545 {
1546 if (dump_file)
1547 fprintf (dump_file,
1548 "Declaration updated to be %spure: %s\n",
1549 looping ? "looping " : "",
1550 node->dump_name ());
1551 if (local)
1552 return true;
1553 return cdtor;
1554 }
1555 return false;
1556}
1557
15e80fc3
JH
1558/* Produce transitive closure over the callgraph and compute pure/const
1559 attributes. */
f10ea640 1560
17e0fc92 1561static bool
15e80fc3 1562propagate_pure_const (void)
812dbce5
JH
1563{
1564 struct cgraph_node *node;
1565 struct cgraph_node *w;
1566 struct cgraph_node **order =
3dafb85c 1567 XCNEWVEC (struct cgraph_node *, symtab->cgraph_count);
812dbce5
JH
1568 int order_pos;
1569 int i;
1570 struct ipa_dfs_info * w_info;
17e0fc92 1571 bool remove_p = false;
812dbce5 1572
45272fd2 1573 order_pos = ipa_reduced_postorder (order, true,
d8e3e8a5 1574 ignore_edge_for_pure_const);
ea900239
DB
1575 if (dump_file)
1576 {
d52f5295 1577 cgraph_node::dump_cgraph (dump_file);
40a7fe1e 1578 ipa_print_order (dump_file, "reduced", order, order_pos);
ea900239
DB
1579 }
1580
073a8998 1581 /* Propagate the local information through the call graph to produce
ea900239
DB
1582 the global information. All the nodes within a cycle will have
1583 the same info so we collapse cycles first. Then we can do the
1584 propagation in one pass from the leaves to the roots. */
1585 for (i = 0; i < order_pos; i++ )
1586 {
1587 enum pure_const_state_e pure_const_state = IPA_CONST;
becfd6e5 1588 bool looping = false;
17541d72 1589 int count = 0;
ea900239
DB
1590 node = order[i];
1591
67348ccc 1592 if (node->alias)
71fb4f92
JH
1593 continue;
1594
d56026c2
JH
1595 if (dump_file && (dump_flags & TDF_DETAILS))
1596 fprintf (dump_file, "Starting cycle\n");
1597
ea900239
DB
1598 /* Find the worst state for any node in the cycle. */
1599 w = node;
f10ea640 1600 while (w && pure_const_state != IPA_NEITHER)
ea900239 1601 {
33977f81 1602 struct cgraph_edge *e;
f10ea640
JH
1603 struct cgraph_edge *ie;
1604 int i;
d122681a 1605 struct ipa_ref *ref = NULL;
f10ea640 1606
36330f82 1607 funct_state w_l = funct_state_summaries->get_create (w);
d56026c2 1608 if (dump_file && (dump_flags & TDF_DETAILS))
464d0118
ML
1609 fprintf (dump_file, " Visiting %s state:%s looping %i\n",
1610 w->dump_name (),
d56026c2
JH
1611 pure_const_names[w_l->pure_const_state],
1612 w_l->looping);
ea900239 1613
cc950f98
JH
1614 /* First merge in function body properties.
1615 We are safe to pass NULL as FROM and TO because we will take care
1616 of possible interposition when walking callees. */
f10ea640 1617 worse_state (&pure_const_state, &looping,
cc950f98
JH
1618 w_l->pure_const_state, w_l->looping,
1619 NULL, NULL);
f10ea640
JH
1620 if (pure_const_state == IPA_NEITHER)
1621 break;
1622
33977f81
JH
1623 count++;
1624
f10ea640
JH
1625 /* We consider recursive cycles as possibly infinite.
1626 This might be relaxed since infinite recursion leads to stack
1627 overflow. */
33977f81
JH
1628 if (count > 1)
1629 looping = true;
b8698a0f 1630
f10ea640 1631 /* Now walk the edges and merge in callee properties. */
d8e3e8a5
JH
1632 for (e = w->callees; e && pure_const_state != IPA_NEITHER;
1633 e = e->next_callee)
ea900239 1634 {
fede8efa 1635 enum availability avail;
6cbde2e3 1636 struct cgraph_node *y = e->callee->
cc950f98
JH
1637 function_or_virtual_thunk_symbol (&avail,
1638 e->caller);
d56026c2
JH
1639 enum pure_const_state_e edge_state = IPA_CONST;
1640 bool edge_looping = false;
17541d72 1641
6e30c481
JH
1642 if (e->recursive_p ())
1643 looping = true;
1644
d56026c2
JH
1645 if (dump_file && (dump_flags & TDF_DETAILS))
1646 {
464d0118
ML
1647 fprintf (dump_file, " Call to %s",
1648 e->callee->dump_name ());
d56026c2 1649 }
d52f5295 1650 if (avail > AVAIL_INTERPOSABLE)
ea900239 1651 {
b3f2b048
ML
1652 funct_state y_l = funct_state_summaries->get_create (y);
1653
d56026c2
JH
1654 if (dump_file && (dump_flags & TDF_DETAILS))
1655 {
1656 fprintf (dump_file,
1657 " state:%s looping:%i\n",
1658 pure_const_names[y_l->pure_const_state],
1659 y_l->looping);
1660 }
da8c7675 1661 if (y_l->pure_const_state > IPA_PURE
3dafb85c 1662 && e->cannot_lead_to_return_p ())
d56026c2
JH
1663 {
1664 if (dump_file && (dump_flags & TDF_DETAILS))
f10ea640
JH
1665 fprintf (dump_file,
1666 " Ignoring side effects"
1667 " -> pure, looping\n");
d56026c2
JH
1668 edge_state = IPA_PURE;
1669 edge_looping = true;
1670 }
1671 else
1672 {
1673 edge_state = y_l->pure_const_state;
1674 edge_looping = y_l->looping;
1675 }
ea900239 1676 }
992644c3
JH
1677 else if (builtin_safe_for_const_function_p (&edge_looping,
1678 y->decl))
1679 edge_state = IPA_CONST;
c59f5d1b 1680 else
f10ea640 1681 state_from_flags (&edge_state, &edge_looping,
67348ccc 1682 flags_from_decl_or_type (y->decl),
3dafb85c 1683 e->cannot_lead_to_return_p ());
f10ea640
JH
1684
1685 /* Merge the results with what we already know. */
1686 better_state (&edge_state, &edge_looping,
1687 w_l->state_previously_known,
1688 w_l->looping_previously_known);
1689 worse_state (&pure_const_state, &looping,
cc950f98 1690 edge_state, edge_looping, e->caller, e->callee);
f10ea640
JH
1691 if (pure_const_state == IPA_NEITHER)
1692 break;
1693 }
c59f5d1b 1694
f10ea640 1695 /* Now process the indirect call. */
d8e3e8a5
JH
1696 for (ie = w->indirect_calls;
1697 ie && pure_const_state != IPA_NEITHER; ie = ie->next_callee)
f10ea640
JH
1698 {
1699 enum pure_const_state_e edge_state = IPA_CONST;
1700 bool edge_looping = false;
da8c7675 1701
f10ea640
JH
1702 if (dump_file && (dump_flags & TDF_DETAILS))
1703 fprintf (dump_file, " Indirect call");
1704 state_from_flags (&edge_state, &edge_looping,
1705 ie->indirect_info->ecf_flags,
3dafb85c 1706 ie->cannot_lead_to_return_p ());
f10ea640
JH
1707 /* Merge the results with what we already know. */
1708 better_state (&edge_state, &edge_looping,
1709 w_l->state_previously_known,
1710 w_l->looping_previously_known);
1711 worse_state (&pure_const_state, &looping,
cc950f98 1712 edge_state, edge_looping, NULL, NULL);
d56026c2
JH
1713 if (pure_const_state == IPA_NEITHER)
1714 break;
ea900239 1715 }
f10ea640
JH
1716
1717 /* And finally all loads and stores. */
d8e3e8a5
JH
1718 for (i = 0; w->iterate_reference (i, ref)
1719 && pure_const_state != IPA_NEITHER; i++)
f10ea640
JH
1720 {
1721 enum pure_const_state_e ref_state = IPA_CONST;
1722 bool ref_looping = false;
1723 switch (ref->use)
1724 {
1725 case IPA_REF_LOAD:
1726 /* readonly reads are safe. */
d122681a 1727 if (TREE_READONLY (ref->referred->decl))
f10ea640
JH
1728 break;
1729 if (dump_file && (dump_flags & TDF_DETAILS))
1730 fprintf (dump_file, " nonreadonly global var read\n");
1731 ref_state = IPA_PURE;
1732 break;
1733 case IPA_REF_STORE:
d122681a 1734 if (ref->cannot_lead_to_return ())
f10ea640
JH
1735 break;
1736 ref_state = IPA_NEITHER;
1737 if (dump_file && (dump_flags & TDF_DETAILS))
1738 fprintf (dump_file, " global var write\n");
1739 break;
1740 case IPA_REF_ADDR:
1741 break;
7d2268ea
MJ
1742 default:
1743 gcc_unreachable ();
f10ea640
JH
1744 }
1745 better_state (&ref_state, &ref_looping,
1746 w_l->state_previously_known,
1747 w_l->looping_previously_known);
1748 worse_state (&pure_const_state, &looping,
cc950f98 1749 ref_state, ref_looping, NULL, NULL);
f10ea640
JH
1750 if (pure_const_state == IPA_NEITHER)
1751 break;
1752 }
67348ccc 1753 w_info = (struct ipa_dfs_info *) w->aux;
ea900239
DB
1754 w = w_info->next_cycle;
1755 }
d56026c2
JH
1756 if (dump_file && (dump_flags & TDF_DETAILS))
1757 fprintf (dump_file, "Result %s looping %i\n",
1758 pure_const_names [pure_const_state],
1759 looping);
ea900239 1760
8413ca87
JJ
1761 /* Find the worst state of can_free for any node in the cycle. */
1762 bool can_free = false;
1763 w = node;
1764 while (w && !can_free)
1765 {
1766 struct cgraph_edge *e;
a756f161 1767 funct_state w_l = funct_state_summaries->get (w);
8413ca87
JJ
1768
1769 if (w_l->can_free
1770 || w->get_availability () == AVAIL_INTERPOSABLE
1771 || w->indirect_calls)
1772 can_free = true;
1773
1774 for (e = w->callees; e && !can_free; e = e->next_callee)
1775 {
1776 enum availability avail;
6cbde2e3 1777 struct cgraph_node *y = e->callee->
cc950f98
JH
1778 function_or_virtual_thunk_symbol (&avail,
1779 e->caller);
8413ca87
JJ
1780
1781 if (avail > AVAIL_INTERPOSABLE)
a756f161 1782 can_free = funct_state_summaries->get (y)->can_free;
8413ca87
JJ
1783 else
1784 can_free = true;
1785 }
1786 w_info = (struct ipa_dfs_info *) w->aux;
1787 w = w_info->next_cycle;
1788 }
1789
ea900239
DB
1790 /* Copy back the region's pure_const_state which is shared by
1791 all nodes in the region. */
1792 w = node;
1793 while (w)
1794 {
a756f161 1795 funct_state w_l = funct_state_summaries->get (w);
33977f81
JH
1796 enum pure_const_state_e this_state = pure_const_state;
1797 bool this_looping = looping;
ea900239 1798
8413ca87
JJ
1799 w_l->can_free = can_free;
1800 w->nonfreeing_fn = !can_free;
1801 if (!can_free && dump_file)
1802 fprintf (dump_file, "Function found not to call free: %s\n",
3629ff8a 1803 w->dump_name ());
8413ca87 1804
f87c9042
JH
1805 if (w_l->state_previously_known != IPA_NEITHER
1806 && this_state > w_l->state_previously_known)
da8c7675 1807 {
d8e3e8a5 1808 if (this_state == IPA_NEITHER)
a0e99d5b
JH
1809 this_looping = w_l->looping_previously_known;
1810 this_state = w_l->state_previously_known;
da8c7675 1811 }
03ec7d01
JH
1812 if (!this_looping && self_recursive_p (w))
1813 this_looping = true;
f87c9042
JH
1814 if (!w_l->looping_previously_known)
1815 this_looping = false;
812dbce5 1816
33977f81
JH
1817 /* All nodes within a cycle share the same info. */
1818 w_l->pure_const_state = this_state;
1819 w_l->looping = this_looping;
1820
d7636f56
JH
1821 /* Inline clones share declaration with their offline copies;
1822 do not modify their declarations since the offline copy may
1823 be different. */
a62bfab5 1824 if (!w->inlined_to)
d7636f56
JH
1825 switch (this_state)
1826 {
1827 case IPA_CONST:
6471396d 1828 remove_p |= ipa_make_function_const (w, this_looping, false);
d7636f56 1829 break;
b8698a0f 1830
d7636f56 1831 case IPA_PURE:
6471396d 1832 remove_p |= ipa_make_function_pure (w, this_looping, false);
d7636f56 1833 break;
b8698a0f 1834
d7636f56
JH
1835 default:
1836 break;
1837 }
67348ccc 1838 w_info = (struct ipa_dfs_info *) w->aux;
2505c5ed
JH
1839 w = w_info->next_cycle;
1840 }
1841 }
1842
af8bca3c 1843 ipa_free_postorder_info ();
15e80fc3 1844 free (order);
17e0fc92 1845 return remove_p;
15e80fc3
JH
1846}
1847
1848/* Produce transitive closure over the callgraph and compute nothrow
1849 attributes. */
1850
1851static void
1852propagate_nothrow (void)
1853{
1854 struct cgraph_node *node;
1855 struct cgraph_node *w;
1856 struct cgraph_node **order =
3dafb85c 1857 XCNEWVEC (struct cgraph_node *, symtab->cgraph_count);
15e80fc3
JH
1858 int order_pos;
1859 int i;
1860 struct ipa_dfs_info * w_info;
1861
45272fd2 1862 order_pos = ipa_reduced_postorder (order, true,
9644e52a 1863 ignore_edge_for_nothrow);
2505c5ed
JH
1864 if (dump_file)
1865 {
d52f5295 1866 cgraph_node::dump_cgraph (dump_file);
af8bca3c 1867 ipa_print_order (dump_file, "reduced for nothrow", order, order_pos);
2505c5ed 1868 }
15e80fc3 1869
073a8998 1870 /* Propagate the local information through the call graph to produce
2505c5ed
JH
1871 the global information. All the nodes within a cycle will have
1872 the same info so we collapse cycles first. Then we can do the
1873 propagation in one pass from the leaves to the roots. */
1874 for (i = 0; i < order_pos; i++ )
1875 {
1876 bool can_throw = false;
1877 node = order[i];
1878
67348ccc 1879 if (node->alias)
71fb4f92
JH
1880 continue;
1881
2505c5ed
JH
1882 /* Find the worst state for any node in the cycle. */
1883 w = node;
abb50207 1884 while (w && !can_throw)
2505c5ed 1885 {
f10ea640 1886 struct cgraph_edge *e, *ie;
2505c5ed 1887
9644e52a 1888 if (!TREE_NOTHROW (w->decl))
2505c5ed 1889 {
36330f82 1890 funct_state w_l = funct_state_summaries->get_create (w);
2505c5ed 1891
9644e52a
JH
1892 if (w_l->can_throw
1893 || w->get_availability () == AVAIL_INTERPOSABLE)
1894 can_throw = true;
1895
1896 for (e = w->callees; e && !can_throw; e = e->next_callee)
2505c5ed 1897 {
9644e52a
JH
1898 enum availability avail;
1899
1900 if (!e->can_throw_external || TREE_NOTHROW (e->callee->decl))
1901 continue;
1902
1903 struct cgraph_node *y = e->callee->
a2b056a3
JH
1904 function_or_virtual_thunk_symbol (&avail,
1905 e->caller);
2505c5ed 1906
155ed511
SL
1907 /* We can use info about the callee only if we know it
1908 cannot be interposed.
a2b056a3
JH
1909 When callee is compiled with non-call exceptions we also
1910 must check that the declaration is bound to current
1911 body as other semantically equivalent body may still
1912 throw. */
9644e52a
JH
1913 if (avail <= AVAIL_INTERPOSABLE
1914 || (!TREE_NOTHROW (y->decl)
36330f82 1915 && (funct_state_summaries->get_create (y)->can_throw
a2b056a3
JH
1916 || (opt_for_fn (y->decl, flag_non_call_exceptions)
1917 && !e->callee->binds_to_current_def_p (w)))))
2505c5ed
JH
1918 can_throw = true;
1919 }
9644e52a
JH
1920 for (ie = w->indirect_calls; ie && !can_throw;
1921 ie = ie->next_callee)
1922 if (ie->can_throw_external
1923 && !(ie->indirect_info->ecf_flags & ECF_NOTHROW))
1924 can_throw = true;
2505c5ed 1925 }
67348ccc 1926 w_info = (struct ipa_dfs_info *) w->aux;
2505c5ed
JH
1927 w = w_info->next_cycle;
1928 }
1929
1930 /* Copy back the region's pure_const_state which is shared by
1931 all nodes in the region. */
1932 w = node;
1933 while (w)
1934 {
61c74e84 1935 funct_state w_l = funct_state_summaries->get_create (w);
67348ccc 1936 if (!can_throw && !TREE_NOTHROW (w->decl))
33977f81 1937 {
d7636f56
JH
1938 /* Inline clones share declaration with their offline copies;
1939 do not modify their declarations since the offline copy may
1940 be different. */
a62bfab5 1941 if (!w->inlined_to)
d7636f56 1942 {
d52f5295 1943 w->set_nothrow_flag (true);
d7636f56
JH
1944 if (dump_file)
1945 fprintf (dump_file, "Function found to be nothrow: %s\n",
3629ff8a 1946 w->dump_name ());
d7636f56 1947 }
ea900239 1948 }
67348ccc 1949 else if (can_throw && !TREE_NOTHROW (w->decl))
b6fa5b01 1950 w_l->can_throw = true;
67348ccc 1951 w_info = (struct ipa_dfs_info *) w->aux;
ea900239
DB
1952 w = w_info->next_cycle;
1953 }
1954 }
1955
af8bca3c 1956 ipa_free_postorder_info ();
ea900239 1957 free (order);
15e80fc3
JH
1958}
1959
0fab169b
PK
1960/* Debugging function to dump state of malloc lattice. */
1961
1962DEBUG_FUNCTION
1963static void
1964dump_malloc_lattice (FILE *dump_file, const char *s)
1965{
1966 if (!dump_file)
1967 return;
1968
1969 fprintf (dump_file, "\n\nMALLOC LATTICE %s:\n", s);
1970 cgraph_node *node;
1971 FOR_EACH_FUNCTION (node)
1972 {
67b3b8fe
ML
1973 funct_state fs = funct_state_summaries->get (node);
1974 if (fs)
3629ff8a 1975 fprintf (dump_file, "%s: %s\n", node->dump_name (),
67b3b8fe 1976 malloc_state_names[fs->malloc_state]);
0fab169b
PK
1977 }
1978}
1979
1980/* Propagate malloc attribute across the callgraph. */
1981
1982static void
1983propagate_malloc (void)
1984{
1985 cgraph_node *node;
1986 FOR_EACH_FUNCTION (node)
1987 {
1988 if (DECL_IS_MALLOC (node->decl))
36330f82 1989 if (!funct_state_summaries->exists (node))
0fab169b 1990 {
36330f82
ML
1991 funct_state fs = funct_state_summaries->get_create (node);
1992 fs->malloc_state = STATE_MALLOC;
0fab169b
PK
1993 }
1994 }
1995
1996 dump_malloc_lattice (dump_file, "Initial");
1997 struct cgraph_node **order
1998 = XNEWVEC (struct cgraph_node *, symtab->cgraph_count);
1999 int order_pos = ipa_reverse_postorder (order);
2000 bool changed = true;
2001
2002 while (changed)
2003 {
2004 changed = false;
2005 /* Walk in postorder. */
2006 for (int i = order_pos - 1; i >= 0; --i)
2007 {
2008 cgraph_node *node = order[i];
2009 if (node->alias
2010 || !node->definition
36330f82 2011 || !funct_state_summaries->exists (node))
0fab169b
PK
2012 continue;
2013
67b3b8fe 2014 funct_state l = funct_state_summaries->get (node);
0fab169b
PK
2015
2016 /* FIXME: add support for indirect-calls. */
2017 if (node->indirect_calls)
2018 {
2019 l->malloc_state = STATE_MALLOC_BOTTOM;
2020 continue;
2021 }
2022
2023 if (node->get_availability () <= AVAIL_INTERPOSABLE)
2024 {
2025 l->malloc_state = STATE_MALLOC_BOTTOM;
2026 continue;
2027 }
2028
2029 if (l->malloc_state == STATE_MALLOC_BOTTOM)
2030 continue;
2031
9eb7669c 2032 auto_vec<cgraph_node *, 16> callees;
0fab169b
PK
2033 for (cgraph_edge *cs = node->callees; cs; cs = cs->next_callee)
2034 {
99353fcf 2035 ipa_call_summary *es = ipa_call_summaries->get_create (cs);
0fab169b
PK
2036 if (es && es->is_return_callee_uncaptured)
2037 callees.safe_push (cs->callee);
2038 }
2039
2040 malloc_state_e new_state = l->malloc_state;
2041 for (unsigned j = 0; j < callees.length (); j++)
2042 {
2043 cgraph_node *callee = callees[j];
36330f82 2044 if (!funct_state_summaries->exists (node))
0fab169b
PK
2045 {
2046 new_state = STATE_MALLOC_BOTTOM;
2047 break;
2048 }
36330f82
ML
2049 malloc_state_e callee_state
2050 = funct_state_summaries->get_create (callee)->malloc_state;
0fab169b
PK
2051 if (new_state < callee_state)
2052 new_state = callee_state;
2053 }
2054 if (new_state != l->malloc_state)
2055 {
2056 changed = true;
2057 l->malloc_state = new_state;
2058 }
2059 }
2060 }
2061
2062 FOR_EACH_DEFINED_FUNCTION (node)
36330f82 2063 if (funct_state_summaries->exists (node))
0fab169b 2064 {
67b3b8fe 2065 funct_state l = funct_state_summaries->get (node);
0fab169b
PK
2066 if (!node->alias
2067 && l->malloc_state == STATE_MALLOC
f5850e7d
ML
2068 && !node->inlined_to
2069 && !VOID_TYPE_P (TREE_TYPE (TREE_TYPE (node->decl))))
0fab169b
PK
2070 {
2071 if (dump_file && (dump_flags & TDF_DETAILS))
2072 fprintf (dump_file, "Function %s found to be malloc\n",
3629ff8a 2073 node->dump_name ());
0fab169b
PK
2074
2075 bool malloc_decl_p = DECL_IS_MALLOC (node->decl);
2076 node->set_malloc_flag (true);
2077 if (!malloc_decl_p && warn_suggest_attribute_malloc)
2078 warn_function_malloc (node->decl);
2079 }
2080 }
2081
2082 dump_malloc_lattice (dump_file, "after propagation");
2083 ipa_free_postorder_info ();
2084 free (order);
2085}
15e80fc3
JH
2086
2087/* Produce the global information by preforming a transitive closure
2088 on the local information that was produced by generate_summary. */
2089
3edf64aa
DM
2090unsigned int
2091pass_ipa_pure_const::
2092execute (function *)
15e80fc3 2093{
17e0fc92 2094 bool remove_p;
15e80fc3 2095
15e80fc3
JH
2096 /* Nothrow makes more function to not lead to return and improve
2097 later analysis. */
2098 propagate_nothrow ();
0fab169b 2099 propagate_malloc ();
17e0fc92 2100 remove_p = propagate_pure_const ();
15e80fc3 2101
36330f82 2102 delete funct_state_summaries;
17e0fc92 2103 return remove_p ? TODO_remove_functions : 0;
ea900239
DB
2104}
2105
2106static bool
2107gate_pure_const (void)
2108{
2bf86c84 2109 return flag_ipa_pure_const || in_lto_p;
ea900239
DB
2110}
2111
3edf64aa
DM
2112pass_ipa_pure_const::pass_ipa_pure_const(gcc::context *ctxt)
2113 : ipa_opt_pass_d(pass_data_ipa_pure_const, ctxt,
2114 pure_const_generate_summary, /* generate_summary */
2115 pure_const_write_summary, /* write_summary */
2116 pure_const_read_summary, /* read_summary */
2117 NULL, /* write_optimization_summary */
2118 NULL, /* read_optimization_summary */
2119 NULL, /* stmt_fixup */
2120 0, /* function_transform_todo_flags_start */
2121 NULL, /* function_transform */
2122 NULL), /* variable_transform */
36330f82 2123 init_p (false) {}
27a4cd48
DM
2124
2125ipa_opt_pass_d *
2126make_pass_ipa_pure_const (gcc::context *ctxt)
2127{
2128 return new pass_ipa_pure_const (ctxt);
2129}
2130
5dc16b19
MLI
2131/* Simple local pass for pure const discovery reusing the analysis from
2132 ipa_pure_const. This pass is effective when executed together with
2133 other optimization passes in early optimization pass queue. */
33977f81 2134
17795822
TS
2135namespace {
2136
2137const pass_data pass_data_local_pure_const =
be55bfe6
TS
2138{
2139 GIMPLE_PASS, /* type */
2140 "local-pure-const", /* name */
2141 OPTGROUP_NONE, /* optinfo_flags */
be55bfe6
TS
2142 TV_IPA_PURE_CONST, /* tv_id */
2143 0, /* properties_required */
2144 0, /* properties_provided */
2145 0, /* properties_destroyed */
2146 0, /* todo_flags_start */
2147 0, /* todo_flags_finish */
2148};
2149
17795822 2150class pass_local_pure_const : public gimple_opt_pass
be55bfe6
TS
2151{
2152public:
2153 pass_local_pure_const (gcc::context *ctxt)
2154 : gimple_opt_pass (pass_data_local_pure_const, ctxt)
2155 {}
2156
2157 /* opt_pass methods: */
725793af
DM
2158 opt_pass * clone () final override
2159 {
2160 return new pass_local_pure_const (m_ctxt);
2161 }
2162 bool gate (function *) final override { return gate_pure_const (); }
2163 unsigned int execute (function *) final override;
be55bfe6
TS
2164
2165}; // class pass_local_pure_const
2166
2167unsigned int
2168pass_local_pure_const::execute (function *fun)
5dc16b19
MLI
2169{
2170 bool changed = false;
2171 funct_state l;
2172 bool skip;
2173 struct cgraph_node *node;
2174
d52f5295 2175 node = cgraph_node::get (current_function_decl);
5dc16b19 2176 skip = skip_function_for_local_pure_const (node);
12b9f3ac 2177
5dc16b19
MLI
2178 if (!warn_suggest_attribute_const
2179 && !warn_suggest_attribute_pure
2180 && skip)
2181 return 0;
73add7fe 2182
269c80f2
JJ
2183 l = analyze_function (node, false);
2184
2185 /* Do NORETURN discovery. */
73add7fe 2186 if (!skip && !TREE_THIS_VOLATILE (current_function_decl)
be55bfe6 2187 && EDGE_COUNT (EXIT_BLOCK_PTR_FOR_FN (fun)->preds) == 0)
73add7fe 2188 {
be55bfe6 2189 warn_function_noreturn (fun->decl);
73add7fe 2190 if (dump_file)
be55bfe6
TS
2191 fprintf (dump_file, "Function found to be noreturn: %s\n",
2192 current_function_name ());
73add7fe
JH
2193
2194 /* Update declaration and reduce profile to executed once. */
61396dfb
JH
2195 if (cgraph_node::get (current_function_decl)->set_noreturn_flag (true))
2196 changed = true;
73add7fe 2197 if (node->frequency > NODE_FREQUENCY_EXECUTED_ONCE)
be55bfe6 2198 node->frequency = NODE_FREQUENCY_EXECUTED_ONCE;
73add7fe 2199 }
c59f5d1b 2200
33977f81
JH
2201 switch (l->pure_const_state)
2202 {
2203 case IPA_CONST:
494bdadf
JH
2204 changed |= ipa_make_function_const
2205 (cgraph_node::get (current_function_decl), l->looping, true);
33977f81
JH
2206 break;
2207
2208 case IPA_PURE:
494bdadf
JH
2209 changed |= ipa_make_function_pure
2210 (cgraph_node::get (current_function_decl), l->looping, true);
33977f81
JH
2211 break;
2212
2213 default:
2214 break;
2215 }
2216 if (!l->can_throw && !TREE_NOTHROW (current_function_decl))
2217 {
d52f5295 2218 node->set_nothrow_flag (true);
33977f81
JH
2219 changed = true;
2220 if (dump_file)
2221 fprintf (dump_file, "Function found to be nothrow: %s\n",
df92c640 2222 current_function_name ());
33977f81 2223 }
0fab169b
PK
2224
2225 if (l->malloc_state == STATE_MALLOC
2226 && !DECL_IS_MALLOC (current_function_decl))
2227 {
2228 node->set_malloc_flag (true);
2229 if (warn_suggest_attribute_malloc)
2230 warn_function_malloc (node->decl);
2231 changed = true;
2232 if (dump_file)
2233 fprintf (dump_file, "Function found to be malloc: %s\n",
3629ff8a 2234 node->dump_name ());
0fab169b
PK
2235 }
2236
04695783 2237 free (l);
33977f81
JH
2238 if (changed)
2239 return execute_fixup_cfg ();
2240 else
2241 return 0;
2242}
2243
17795822
TS
2244} // anon namespace
2245
27a4cd48
DM
2246gimple_opt_pass *
2247make_pass_local_pure_const (gcc::context *ctxt)
2248{
2249 return new pass_local_pure_const (ctxt);
2250}
c1bf2a39
AM
2251
2252/* Emit noreturn warnings. */
2253
17795822
TS
2254namespace {
2255
2256const pass_data pass_data_warn_function_noreturn =
c1bf2a39
AM
2257{
2258 GIMPLE_PASS, /* type */
2259 "*warn_function_noreturn", /* name */
2260 OPTGROUP_NONE, /* optinfo_flags */
c1bf2a39
AM
2261 TV_NONE, /* tv_id */
2262 PROP_cfg, /* properties_required */
2263 0, /* properties_provided */
2264 0, /* properties_destroyed */
2265 0, /* todo_flags_start */
2266 0, /* todo_flags_finish */
2267};
2268
17795822 2269class pass_warn_function_noreturn : public gimple_opt_pass
c1bf2a39
AM
2270{
2271public:
2272 pass_warn_function_noreturn (gcc::context *ctxt)
2273 : gimple_opt_pass (pass_data_warn_function_noreturn, ctxt)
2274 {}
2275
2276 /* opt_pass methods: */
725793af
DM
2277 bool gate (function *) final override
2278 {
2279 return warn_suggest_attribute_noreturn;
2280 }
2281 unsigned int execute (function *fun) final override
be55bfe6
TS
2282 {
2283 if (!TREE_THIS_VOLATILE (current_function_decl)
2284 && EDGE_COUNT (EXIT_BLOCK_PTR_FOR_FN (fun)->preds) == 0)
2285 warn_function_noreturn (current_function_decl);
2286 return 0;
2287 }
c1bf2a39
AM
2288
2289}; // class pass_warn_function_noreturn
2290
17795822
TS
2291} // anon namespace
2292
c1bf2a39
AM
2293gimple_opt_pass *
2294make_pass_warn_function_noreturn (gcc::context *ctxt)
2295{
2296 return new pass_warn_function_noreturn (ctxt);
2297}
38147a2a
JH
2298
2299/* Simple local pass for pure const discovery reusing the analysis from
2300 ipa_pure_const. This pass is effective when executed together with
2301 other optimization passes in early optimization pass queue. */
2302
17795822
TS
2303namespace {
2304
2305const pass_data pass_data_nothrow =
38147a2a
JH
2306{
2307 GIMPLE_PASS, /* type */
2308 "nothrow", /* name */
2309 OPTGROUP_NONE, /* optinfo_flags */
2310 TV_IPA_PURE_CONST, /* tv_id */
2311 0, /* properties_required */
2312 0, /* properties_provided */
2313 0, /* properties_destroyed */
2314 0, /* todo_flags_start */
2315 0, /* todo_flags_finish */
2316};
2317
17795822 2318class pass_nothrow : public gimple_opt_pass
38147a2a
JH
2319{
2320public:
2321 pass_nothrow (gcc::context *ctxt)
2322 : gimple_opt_pass (pass_data_nothrow, ctxt)
2323 {}
2324
2325 /* opt_pass methods: */
725793af
DM
2326 opt_pass * clone () final override { return new pass_nothrow (m_ctxt); }
2327 bool gate (function *) final override { return optimize; }
2328 unsigned int execute (function *) final override;
38147a2a
JH
2329
2330}; // class pass_nothrow
2331
2332unsigned int
2333pass_nothrow::execute (function *)
2334{
2335 struct cgraph_node *node;
2336 basic_block this_block;
2337
2338 if (TREE_NOTHROW (current_function_decl))
2339 return 0;
2340
2341 node = cgraph_node::get (current_function_decl);
2342
67914693 2343 /* We run during lowering, we cannot really use availability yet. */
38147a2a
JH
2344 if (cgraph_node::get (current_function_decl)->get_availability ()
2345 <= AVAIL_INTERPOSABLE)
2346 {
2347 if (dump_file)
2348 fprintf (dump_file, "Function is interposable;"
2349 " not analyzing.\n");
2350 return true;
2351 }
2352
2353 FOR_EACH_BB_FN (this_block, cfun)
2354 {
2355 for (gimple_stmt_iterator gsi = gsi_start_bb (this_block);
2356 !gsi_end_p (gsi);
2357 gsi_next (&gsi))
36bbc05d 2358 if (stmt_can_throw_external (cfun, gsi_stmt (gsi)))
38147a2a
JH
2359 {
2360 if (is_gimple_call (gsi_stmt (gsi)))
2361 {
2362 tree callee_t = gimple_call_fndecl (gsi_stmt (gsi));
2363 if (callee_t && recursive_call_p (current_function_decl,
2364 callee_t))
2365 continue;
2366 }
2367
2368 if (dump_file)
2369 {
2370 fprintf (dump_file, "Statement can throw: ");
ef6cb4c7 2371 print_gimple_stmt (dump_file, gsi_stmt (gsi), 0);
38147a2a
JH
2372 }
2373 return 0;
2374 }
2375 }
2376
2377 node->set_nothrow_flag (true);
d93c452f
JJ
2378
2379 bool cfg_changed = false;
2380 if (self_recursive_p (node))
2381 FOR_EACH_BB_FN (this_block, cfun)
2382 if (gimple *g = last_stmt (this_block))
2383 if (is_gimple_call (g))
2384 {
2385 tree callee_t = gimple_call_fndecl (g);
2386 if (callee_t
2387 && recursive_call_p (current_function_decl, callee_t)
2388 && maybe_clean_eh_stmt (g)
2389 && gimple_purge_dead_eh_edges (this_block))
2390 cfg_changed = true;
2391 }
2392
38147a2a
JH
2393 if (dump_file)
2394 fprintf (dump_file, "Function found to be nothrow: %s\n",
2395 current_function_name ());
d93c452f 2396 return cfg_changed ? TODO_cleanup_cfg : 0;
38147a2a
JH
2397}
2398
17795822
TS
2399} // anon namespace
2400
38147a2a
JH
2401gimple_opt_pass *
2402make_pass_nothrow (gcc::context *ctxt)
2403{
2404 return new pass_nothrow (ctxt);
2405}