1 /* Basic IPA utilities for type inheritance graph construction and
3 Copyright (C) 2013-2014 Free Software Foundation, Inc.
4 Contributed by Jan Hubicka
6 This file is part of GCC.
8 GCC is free software; you can redistribute it and/or modify it under
9 the terms of the GNU General Public License as published by the Free
10 Software Foundation; either version 3, or (at your option) any later
13 GCC is distributed in the hope that it will be useful, but WITHOUT ANY
14 WARRANTY; without even the implied warranty of MERCHANTABILITY or
15 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
18 You should have received a copy of the GNU General Public License
19 along with GCC; see the file COPYING3. If not see
20 <http://www.gnu.org/licenses/>. */
23 ODR = One Definition Rule
24 In short, the ODR states that:
25 1 In any translation unit, a template, type, function, or object can
26 have no more than one definition. Some of these can have any number
27 of declarations. A definition provides an instance.
28 2 In the entire program, an object or non-inline function cannot have
29 more than one definition; if an object or function is used, it must
30 have exactly one definition. You can declare an object or function
31 that is never used, in which case you don't have to provide
32 a definition. In no event can there be more than one definition.
33 3 Some things, like types, templates, and extern inline functions, can
34 be defined in more than one translation unit. For a given entity,
35 each definition must be the same. Non-extern objects and functions
36 in different translation units are different entities, even if their
37 names and types are the same.
40 This is the Gimple representation of type information of a polymorphic call.
41 It contains two parameters:
42 otr_type is a type of class whose method is called.
43 otr_token is the index into virtual table where address is taken.
46 This is the type inheritance information attached to each tree
47 RECORD_TYPE by the C++ frotend. It provides information about base
48 types and virtual tables.
50 BINFO is linked to the RECORD_TYPE by TYPE_BINFO.
51 BINFO also links to its type by BINFO_TYPE and to the virtual table by
54 Base types of a given type are enumerated by BINFO_BASE_BINFO
55 vector. Members of this vectors are not BINFOs associated
56 with a base type. Rather they are new copies of BINFOs
57 (base BINFOs). Their virtual tables may differ from
58 virtual table of the base type. Also BINFO_OFFSET specifies
59 offset of the base within the type.
61 In the case of single inheritance, the virtual table is shared
62 and BINFO_VTABLE of base BINFO is NULL. In the case of multiple
63 inheritance the individual virtual tables are pointer to by
64 BINFO_VTABLE of base binfos (that differs of BINFO_VTABLE of
65 binfo associated to the base type).
67 BINFO lookup for a given base type and offset can be done by
68 get_binfo_at_offset. It returns proper BINFO whose virtual table
69 can be used for lookup of virtual methods associated with the
73 This is an index of virtual method in virtual table associated
74 to the type defining it. Token can be looked up from OBJ_TYPE_REF
75 or from DECL_VINDEX of a given virtual table.
77 polymorphic (indirect) call
78 This is callgraph represention of virtual method call. Every
79 polymorphic call contains otr_type and otr_token taken from
80 original OBJ_TYPE_REF at callgraph construction time.
84 build_type_inheritance_graph triggers a construction of the type inheritance
87 We reconstruct it based on types of methods we see in the unit.
88 This means that the graph is not complete. Types with no methods are not
89 inserted into the graph. Also types without virtual methods are not
90 represented at all, though it may be easy to add this.
92 The inheritance graph is represented as follows:
94 Vertices are structures odr_type. Every odr_type may correspond
95 to one or more tree type nodes that are equivalent by ODR rule.
96 (the multiple type nodes appear only with linktime optimization)
98 Edges are represented by odr_type->base and odr_type->derived_types.
99 At the moment we do not track offsets of types for multiple inheritance.
102 possible_polymorphic_call_targets returns, given an parameters found in
103 indirect polymorphic edge all possible polymorphic call targets of the call.
105 pass_ipa_devirt performs simple speculative devirtualization.
110 #include "coretypes.h"
113 #include "print-tree.h"
117 #include "tree-pass.h"
118 #include "pointer-set.h"
120 #include "hash-table.h"
121 #include "tree-pretty-print.h"
122 #include "ipa-utils.h"
123 #include "tree-ssa-alias.h"
124 #include "internal-fn.h"
125 #include "gimple-fold.h"
126 #include "gimple-expr.h"
128 #include "ipa-inline.h"
129 #include "diagnostic.h"
130 #include "tree-dfa.h"
131 #include "demangle.h"
133 static bool odr_violation_reported
= false;
135 /* Dummy polymorphic call context. */
137 const ipa_polymorphic_call_context ipa_dummy_polymorphic_call_context
138 = {0, NULL
, false, true};
140 /* Pointer set of all call targets appearing in the cache. */
141 static pointer_set_t
*cached_polymorphic_call_targets
;
143 /* The node of type inheritance graph. For each type unique in
144 One Defintion Rule (ODR) sense, we produce one node linking all
145 main variants of types equivalent to it, bases and derived types. */
147 struct GTY(()) odr_type_d
152 vec
<odr_type
> GTY((skip
)) bases
;
153 /* All derrived types with virtual methods seen in unit. */
154 vec
<odr_type
> GTY((skip
)) derived_types
;
156 /* All equivalent types, if more than one. */
157 vec
<tree
, va_gc
> *types
;
158 /* Set of all equivalent types, if NON-NULL. */
159 pointer_set_t
* GTY((skip
)) types_set
;
161 /* Unique ID indexing the type in odr_types array. */
163 /* Is it in anonymous namespace? */
164 bool anonymous_namespace
;
168 /* Return true if BINFO corresponds to a type with virtual methods.
170 Every type has several BINFOs. One is the BINFO associated by the type
171 while other represents bases of derived types. The BINFOs representing
172 bases do not have BINFO_VTABLE pointer set when this is the single
173 inheritance (because vtables are shared). Look up the BINFO of type
174 and check presence of its vtable. */
177 polymorphic_type_binfo_p (tree binfo
)
179 /* See if BINFO's type has an virtual table associtated with it. */
180 return BINFO_VTABLE (TYPE_BINFO (BINFO_TYPE (binfo
)));
183 /* One Definition Rule hashtable helpers. */
187 typedef odr_type_d value_type
;
188 typedef union tree_node compare_type
;
189 static inline hashval_t
hash (const value_type
*);
190 static inline bool equal (const value_type
*, const compare_type
*);
191 static inline void remove (value_type
*);
194 /* Produce hash based on type name. */
197 hash_type_name (tree t
)
199 gcc_checking_assert (TYPE_MAIN_VARIANT (t
) == t
);
201 /* If not in LTO, all main variants are unique, so we can do
204 return htab_hash_pointer (t
);
206 /* Anonymous types are unique. */
207 if (type_in_anonymous_namespace_p (t
))
208 return htab_hash_pointer (t
);
210 /* For polymorphic types, we can simply hash the virtual table. */
211 if (TYPE_BINFO (t
) && BINFO_VTABLE (TYPE_BINFO (t
)))
213 tree v
= BINFO_VTABLE (TYPE_BINFO (t
));
216 if (TREE_CODE (v
) == POINTER_PLUS_EXPR
)
218 hash
= TREE_INT_CST_LOW (TREE_OPERAND (v
, 1));
219 v
= TREE_OPERAND (TREE_OPERAND (v
, 0), 0);
222 v
= DECL_ASSEMBLER_NAME (v
);
223 hash
= iterative_hash_hashval_t (hash
, htab_hash_pointer (v
));
227 /* Rest is not implemented yet. */
231 /* Return the computed hashcode for ODR_TYPE. */
234 odr_hasher::hash (const value_type
*odr_type
)
236 return hash_type_name (odr_type
->type
);
239 /* Compare types T1 and T2 and return true if they are
243 odr_hasher::equal (const value_type
*t1
, const compare_type
*ct2
)
245 tree t2
= const_cast <tree
> (ct2
);
247 gcc_checking_assert (TYPE_MAIN_VARIANT (ct2
) == ct2
);
252 return types_same_for_odr (t1
->type
, t2
);
255 /* Free ODR type V. */
258 odr_hasher::remove (value_type
*v
)
261 v
->derived_types
.release ();
263 pointer_set_destroy (v
->types_set
);
267 /* ODR type hash used to lookup ODR type based on tree type node. */
269 typedef hash_table
<odr_hasher
> odr_hash_type
;
270 static odr_hash_type odr_hash
;
272 /* ODR types are also stored into ODR_TYPE vector to allow consistent
273 walking. Bases appear before derived types. Vector is garbage collected
274 so we won't end up visiting empty types. */
276 static GTY(()) vec
<odr_type
, va_gc
> *odr_types_ptr
;
277 #define odr_types (*odr_types_ptr)
279 /* TYPE is equivalent to VAL by ODR, but its tree representation differs
280 from VAL->type. This may happen in LTO where tree merging did not merge
281 all variants of the same type. It may or may not mean the ODR violation.
282 Add it to the list of duplicates and warn on some violations. */
285 add_type_duplicate (odr_type val
, tree type
)
288 val
->types_set
= pointer_set_create ();
290 /* See if this duplicate is new. */
291 if (!pointer_set_insert (val
->types_set
, type
))
294 bool base_mismatch
= false;
295 gcc_assert (in_lto_p
);
296 vec_safe_push (val
->types
, type
);
299 /* First we compare memory layout. */
300 if (!types_compatible_p (val
->type
, type
))
303 odr_violation_reported
= true;
304 if (BINFO_VTABLE (TYPE_BINFO (val
->type
))
305 && warning_at (DECL_SOURCE_LOCATION (TYPE_NAME (type
)), 0,
306 "type %qD violates one definition rule ",
308 inform (DECL_SOURCE_LOCATION (TYPE_NAME (val
->type
)),
309 "a type with the same name but different layout is "
310 "defined in another translation unit");
311 if (cgraph_dump_file
)
313 fprintf (cgraph_dump_file
, "ODR violation or merging or ODR type bug?\n");
315 print_node (cgraph_dump_file
, "", val
->type
, 0);
316 putc ('\n',cgraph_dump_file
);
317 print_node (cgraph_dump_file
, "", type
, 0);
318 putc ('\n',cgraph_dump_file
);
322 /* Next sanity check that bases are the same. If not, we will end
323 up producing wrong answers. */
324 for (j
= 0, i
= 0; i
< BINFO_N_BASE_BINFOS (TYPE_BINFO (type
)); i
++)
325 if (polymorphic_type_binfo_p (BINFO_BASE_BINFO (TYPE_BINFO (type
), i
)))
327 odr_type base
= get_odr_type
329 (BINFO_BASE_BINFO (TYPE_BINFO (type
),
332 if (val
->bases
.length () <= j
|| val
->bases
[j
] != base
)
333 base_mismatch
= true;
339 odr_violation_reported
= true;
341 if (warning_at (DECL_SOURCE_LOCATION (TYPE_NAME (type
)), 0,
342 "type %qD violates one definition rule ",
344 inform (DECL_SOURCE_LOCATION (TYPE_NAME (val
->type
)),
345 "a type with the same name but different bases is "
346 "defined in another translation unit");
347 if (cgraph_dump_file
)
349 fprintf (cgraph_dump_file
, "ODR bse violation or merging bug?\n");
351 print_node (cgraph_dump_file
, "", val
->type
, 0);
352 putc ('\n',cgraph_dump_file
);
353 print_node (cgraph_dump_file
, "", type
, 0);
354 putc ('\n',cgraph_dump_file
);
358 /* Regularize things a little. During LTO same types may come with
359 different BINFOs. Either because their virtual table was
360 not merged by tree merging and only later at decl merging or
361 because one type comes with external vtable, while other
362 with internal. We want to merge equivalent binfos to conserve
363 memory and streaming overhead.
365 The external vtables are more harmful: they contain references
366 to external declarations of methods that may be defined in the
367 merged LTO unit. For this reason we absolutely need to remove
368 them and replace by internal variants. Not doing so will lead
369 to incomplete answers from possible_polymorphic_call_targets. */
370 if (!flag_ltrans
&& merge
)
372 tree master_binfo
= TYPE_BINFO (val
->type
);
373 tree v1
= BINFO_VTABLE (master_binfo
);
374 tree v2
= BINFO_VTABLE (TYPE_BINFO (type
));
376 if (TREE_CODE (v1
) == POINTER_PLUS_EXPR
)
378 gcc_assert (TREE_CODE (v2
) == POINTER_PLUS_EXPR
379 && operand_equal_p (TREE_OPERAND (v1
, 1),
380 TREE_OPERAND (v2
, 1), 0));
381 v1
= TREE_OPERAND (TREE_OPERAND (v1
, 0), 0);
382 v2
= TREE_OPERAND (TREE_OPERAND (v2
, 0), 0);
384 gcc_assert (DECL_ASSEMBLER_NAME (v1
)
385 == DECL_ASSEMBLER_NAME (v2
));
387 if (DECL_EXTERNAL (v1
) && !DECL_EXTERNAL (v2
))
391 TYPE_BINFO (val
->type
) = TYPE_BINFO (type
);
392 for (i
= 0; i
< val
->types
->length (); i
++)
394 if (TYPE_BINFO ((*val
->types
)[i
])
396 TYPE_BINFO ((*val
->types
)[i
]) = TYPE_BINFO (type
);
400 TYPE_BINFO (type
) = master_binfo
;
405 /* Get ODR type hash entry for TYPE. If INSERT is true, create
406 possibly new entry. */
409 get_odr_type (tree type
, bool insert
)
415 type
= TYPE_MAIN_VARIANT (type
);
416 gcc_checking_assert (TYPE_MAIN_VARIANT (type
) == type
);
417 hash
= hash_type_name (type
);
418 slot
= odr_hash
.find_slot_with_hash (type
, hash
, insert
? INSERT
: NO_INSERT
);
422 /* See if we already have entry for type. */
427 /* With LTO we need to support multiple tree representation of
428 the same ODR type. */
429 if (val
->type
!= type
)
430 add_type_duplicate (val
, type
);
434 tree binfo
= TYPE_BINFO (type
);
437 val
= ggc_alloc_cleared_odr_type_d ();
440 val
->derived_types
= vNULL
;
441 val
->anonymous_namespace
= type_in_anonymous_namespace_p (type
);
443 for (i
= 0; i
< BINFO_N_BASE_BINFOS (binfo
); i
++)
444 /* For now record only polymorphic types. other are
445 pointless for devirtualization and we can not precisely
446 determine ODR equivalency of these during LTO. */
447 if (polymorphic_type_binfo_p (BINFO_BASE_BINFO (binfo
, i
)))
449 odr_type base
= get_odr_type (BINFO_TYPE (BINFO_BASE_BINFO (binfo
,
452 base
->derived_types
.safe_push (val
);
453 val
->bases
.safe_push (base
);
455 /* First record bases, then add into array so ids are increasing. */
457 val
->id
= odr_types
.length ();
458 vec_safe_push (odr_types_ptr
, val
);
463 /* Dump ODR type T and all its derrived type. INDENT specify indentation for
464 recusive printing. */
467 dump_odr_type (FILE *f
, odr_type t
, int indent
=0)
470 fprintf (f
, "%*s type %i: ", indent
* 2, "", t
->id
);
471 print_generic_expr (f
, t
->type
, TDF_SLIM
);
472 fprintf (f
, "%s\n", t
->anonymous_namespace
? " (anonymous namespace)":"");
473 if (TYPE_NAME (t
->type
))
475 fprintf (f
, "%*s defined at: %s:%i\n", indent
* 2, "",
476 DECL_SOURCE_FILE (TYPE_NAME (t
->type
)),
477 DECL_SOURCE_LINE (TYPE_NAME (t
->type
)));
479 if (t
->bases
.length ())
481 fprintf (f
, "%*s base odr type ids: ", indent
* 2, "");
482 for (i
= 0; i
< t
->bases
.length (); i
++)
483 fprintf (f
, " %i", t
->bases
[i
]->id
);
486 if (t
->derived_types
.length ())
488 fprintf (f
, "%*s derived types:\n", indent
* 2, "");
489 for (i
= 0; i
< t
->derived_types
.length (); i
++)
490 dump_odr_type (f
, t
->derived_types
[i
], indent
+ 1);
495 /* Dump the type inheritance graph. */
498 dump_type_inheritance_graph (FILE *f
)
503 fprintf (f
, "\n\nType inheritance graph:\n");
504 for (i
= 0; i
< odr_types
.length (); i
++)
506 if (odr_types
[i
]->bases
.length () == 0)
507 dump_odr_type (f
, odr_types
[i
]);
509 for (i
= 0; i
< odr_types
.length (); i
++)
511 if (odr_types
[i
]->types
&& odr_types
[i
]->types
->length ())
514 fprintf (f
, "Duplicate tree types for odr type %i\n", i
);
515 print_node (f
, "", odr_types
[i
]->type
, 0);
516 for (j
= 0; j
< odr_types
[i
]->types
->length (); j
++)
519 fprintf (f
, "duplicate #%i\n", j
);
520 print_node (f
, "", (*odr_types
[i
]->types
)[j
], 0);
521 t
= (*odr_types
[i
]->types
)[j
];
522 while (TYPE_P (t
) && TYPE_CONTEXT (t
))
524 t
= TYPE_CONTEXT (t
);
525 print_node (f
, "", t
, 0);
533 /* Given method type T, return type of class it belongs to.
534 Lookup this pointer and get its type. */
537 method_class_type (tree t
)
539 tree first_parm_type
= TREE_VALUE (TYPE_ARG_TYPES (t
));
540 gcc_assert (TREE_CODE (t
) == METHOD_TYPE
);
542 return TREE_TYPE (first_parm_type
);
545 /* Initialize IPA devirt and build inheritance tree graph. */
548 build_type_inheritance_graph (void)
550 struct symtab_node
*n
;
551 FILE *inheritance_dump_file
;
554 if (odr_hash
.is_created ())
556 timevar_push (TV_IPA_INHERITANCE
);
557 inheritance_dump_file
= dump_begin (TDI_inheritance
, &flags
);
558 odr_hash
.create (23);
560 /* We reconstruct the graph starting of types of all methods seen in the
563 if (is_a
<cgraph_node
> (n
)
564 && DECL_VIRTUAL_P (n
->decl
)
565 && symtab_real_symbol_p (n
))
566 get_odr_type (method_class_type (TREE_TYPE (n
->decl
)), true);
568 /* Look also for virtual tables of types that do not define any methods.
570 We need it in a case where class B has virtual base of class A
571 re-defining its virtual method and there is class C with no virtual
572 methods with B as virtual base.
574 Here we output B's virtual method in two variant - for non-virtual
575 and virtual inheritance. B's virtual table has non-virtual version,
576 while C's has virtual.
578 For this reason we need to know about C in order to include both
579 variants of B. More correctly, record_target_from_binfo should
580 add both variants of the method when walking B, but we have no
581 link in between them.
583 We rely on fact that either the method is exported and thus we
584 assume it is called externally or C is in anonymous namespace and
585 thus we will see the vtable. */
587 else if (is_a
<varpool_node
> (n
)
588 && DECL_VIRTUAL_P (n
->decl
)
589 && TREE_CODE (DECL_CONTEXT (n
->decl
)) == RECORD_TYPE
590 && TYPE_BINFO (DECL_CONTEXT (n
->decl
))
591 && polymorphic_type_binfo_p (TYPE_BINFO (DECL_CONTEXT (n
->decl
))))
592 get_odr_type (DECL_CONTEXT (n
->decl
), true);
593 if (inheritance_dump_file
)
595 dump_type_inheritance_graph (inheritance_dump_file
);
596 dump_end (TDI_inheritance
, inheritance_dump_file
);
598 timevar_pop (TV_IPA_INHERITANCE
);
601 /* If TARGET has associated node, record it in the NODES array.
602 CAN_REFER specify if program can refer to the target directly.
603 if TARGET is unknown (NULL) or it can not be inserted (for example because
604 its body was already removed and there is no way to refer to it), clear
608 maybe_record_node (vec
<cgraph_node
*> &nodes
,
609 tree target
, pointer_set_t
*inserted
,
613 struct cgraph_node
*target_node
;
614 enum built_in_function fcode
;
618 /* The only case when method of anonymous namespace becomes unreferable
619 is when we completely optimized it out. */
622 || !type_in_anonymous_namespace_p (DECL_CONTEXT (target
)))
628 /* Those are used to mark impossible scenarios. */
629 || (fcode
= DECL_FUNCTION_CODE (target
))
630 == BUILT_IN_UNREACHABLE
631 || fcode
== BUILT_IN_TRAP
)
634 target_node
= cgraph_get_node (target
);
636 if (target_node
!= NULL
637 && (TREE_PUBLIC (target
)
638 || target_node
->definition
)
639 && symtab_real_symbol_p (target_node
))
641 gcc_assert (!target_node
->global
.inlined_to
);
642 gcc_assert (symtab_real_symbol_p (target_node
));
643 if (!pointer_set_insert (inserted
, target
))
645 pointer_set_insert (cached_polymorphic_call_targets
,
647 nodes
.safe_push (target_node
);
651 && !type_in_anonymous_namespace_p
652 (method_class_type (TREE_TYPE (target
))))
656 /* See if BINFO's type match OUTER_TYPE. If so, lookup
657 BINFO of subtype of OTR_TYPE at OFFSET and in that BINFO find
658 method in vtable and insert method to NODES array.
659 Otherwise recurse to base BINFOs.
660 This match what get_binfo_at_offset does, but with offset
663 TYPE_BINFOS is a stack of BINFOS of types with defined
664 virtual table seen on way from class type to BINFO.
666 MATCHED_VTABLES tracks virtual tables we already did lookup
667 for virtual function in. INSERTED tracks nodes we already
670 ANONYMOUS is true if BINFO is part of anonymous namespace.
672 Clear COMPLETEP when we hit unreferable target.
676 record_target_from_binfo (vec
<cgraph_node
*> &nodes
,
679 vec
<tree
> &type_binfos
,
680 HOST_WIDE_INT otr_token
,
682 HOST_WIDE_INT offset
,
683 pointer_set_t
*inserted
,
684 pointer_set_t
*matched_vtables
,
688 tree type
= BINFO_TYPE (binfo
);
693 if (BINFO_VTABLE (binfo
))
694 type_binfos
.safe_push (binfo
);
695 if (types_same_for_odr (type
, outer_type
))
698 tree type_binfo
= NULL
;
700 /* Lookup BINFO with virtual table. For normal types it is always last
702 for (i
= type_binfos
.length () - 1; i
>= 0; i
--)
703 if (BINFO_OFFSET (type_binfos
[i
]) == BINFO_OFFSET (binfo
))
705 type_binfo
= type_binfos
[i
];
708 if (BINFO_VTABLE (binfo
))
710 /* If this is duplicated BINFO for base shared by virtual inheritance,
711 we may not have its associated vtable. This is not a problem, since
712 we will walk it on the other path. */
715 tree inner_binfo
= get_binfo_at_offset (type_binfo
,
719 gcc_assert (odr_violation_reported
);
722 /* For types in anonymous namespace first check if the respective vtable
723 is alive. If not, we know the type can't be called. */
724 if (!flag_ltrans
&& anonymous
)
726 tree vtable
= BINFO_VTABLE (inner_binfo
);
729 if (TREE_CODE (vtable
) == POINTER_PLUS_EXPR
)
730 vtable
= TREE_OPERAND (TREE_OPERAND (vtable
, 0), 0);
731 vnode
= varpool_get_node (vtable
);
732 if (!vnode
|| !vnode
->definition
)
735 gcc_assert (inner_binfo
);
736 if (!pointer_set_insert (matched_vtables
, BINFO_VTABLE (inner_binfo
)))
739 tree target
= gimple_get_virt_method_for_binfo (otr_token
,
742 maybe_record_node (nodes
, target
, inserted
, can_refer
, completep
);
748 for (i
= 0; BINFO_BASE_ITERATE (binfo
, i
, base_binfo
); i
++)
749 /* Walking bases that have no virtual method is pointless excercise. */
750 if (polymorphic_type_binfo_p (base_binfo
))
751 record_target_from_binfo (nodes
, base_binfo
, otr_type
,
753 otr_token
, outer_type
, offset
, inserted
,
754 matched_vtables
, anonymous
, completep
);
755 if (BINFO_VTABLE (binfo
))
759 /* Lookup virtual methods matching OTR_TYPE (with OFFSET and OTR_TOKEN)
760 of TYPE, insert them to NODES, recurse into derived nodes.
761 INSERTED is used to avoid duplicate insertions of methods into NODES.
762 MATCHED_VTABLES are used to avoid duplicate walking vtables.
763 Clear COMPLETEP if unreferable target is found. */
766 possible_polymorphic_call_targets_1 (vec
<cgraph_node
*> &nodes
,
767 pointer_set_t
*inserted
,
768 pointer_set_t
*matched_vtables
,
771 HOST_WIDE_INT otr_token
,
773 HOST_WIDE_INT offset
,
776 tree binfo
= TYPE_BINFO (type
->type
);
778 vec
<tree
> type_binfos
= vNULL
;
780 record_target_from_binfo (nodes
, binfo
, otr_type
, type_binfos
, otr_token
,
782 inserted
, matched_vtables
,
783 type
->anonymous_namespace
, completep
);
784 type_binfos
.release ();
785 for (i
= 0; i
< type
->derived_types
.length (); i
++)
786 possible_polymorphic_call_targets_1 (nodes
, inserted
,
789 type
->derived_types
[i
],
790 otr_token
, outer_type
, offset
, completep
);
793 /* Cache of queries for polymorphic call targets.
795 Enumerating all call targets may get expensive when there are many
796 polymorphic calls in the program, so we memoize all the previous
797 queries and avoid duplicated work. */
799 struct polymorphic_call_target_d
801 HOST_WIDE_INT otr_token
;
802 ipa_polymorphic_call_context context
;
804 vec
<cgraph_node
*> targets
;
805 int nonconstruction_targets
;
809 /* Polymorphic call target cache helpers. */
811 struct polymorphic_call_target_hasher
813 typedef polymorphic_call_target_d value_type
;
814 typedef polymorphic_call_target_d compare_type
;
815 static inline hashval_t
hash (const value_type
*);
816 static inline bool equal (const value_type
*, const compare_type
*);
817 static inline void remove (value_type
*);
820 /* Return the computed hashcode for ODR_QUERY. */
823 polymorphic_call_target_hasher::hash (const value_type
*odr_query
)
827 hash
= iterative_hash_host_wide_int
828 (odr_query
->otr_token
,
829 odr_query
->type
->id
);
830 hash
= iterative_hash_hashval_t (TYPE_UID (odr_query
->context
.outer_type
),
832 hash
= iterative_hash_host_wide_int (odr_query
->context
.offset
, hash
);
833 return iterative_hash_hashval_t
834 (((int)odr_query
->context
.maybe_in_construction
<< 1)
835 | (int)odr_query
->context
.maybe_derived_type
, hash
);
838 /* Compare cache entries T1 and T2. */
841 polymorphic_call_target_hasher::equal (const value_type
*t1
,
842 const compare_type
*t2
)
844 return (t1
->type
== t2
->type
&& t1
->otr_token
== t2
->otr_token
845 && t1
->context
.offset
== t2
->context
.offset
846 && t1
->context
.outer_type
== t2
->context
.outer_type
847 && t1
->context
.maybe_in_construction
848 == t2
->context
.maybe_in_construction
849 && t1
->context
.maybe_derived_type
== t2
->context
.maybe_derived_type
);
852 /* Remove entry in polymorphic call target cache hash. */
855 polymorphic_call_target_hasher::remove (value_type
*v
)
857 v
->targets
.release ();
861 /* Polymorphic call target query cache. */
863 typedef hash_table
<polymorphic_call_target_hasher
>
864 polymorphic_call_target_hash_type
;
865 static polymorphic_call_target_hash_type polymorphic_call_target_hash
;
867 /* Destroy polymorphic call target query cache. */
870 free_polymorphic_call_targets_hash ()
872 if (cached_polymorphic_call_targets
)
874 polymorphic_call_target_hash
.dispose ();
875 pointer_set_destroy (cached_polymorphic_call_targets
);
876 cached_polymorphic_call_targets
= NULL
;
880 /* When virtual function is removed, we may need to flush the cache. */
883 devirt_node_removal_hook (struct cgraph_node
*n
, void *d ATTRIBUTE_UNUSED
)
885 if (cached_polymorphic_call_targets
886 && pointer_set_contains (cached_polymorphic_call_targets
, n
))
887 free_polymorphic_call_targets_hash ();
890 /* CONTEXT->OUTER_TYPE is a type of memory object where object of EXPECTED_TYPE
891 is contained at CONTEXT->OFFSET. Walk the memory representation of
892 CONTEXT->OUTER_TYPE and find the outermost class type that match
893 EXPECTED_TYPE or contain EXPECTED_TYPE as a base. Update CONTEXT
896 For example when CONTEXT represents type
902 and we look for type at offset sizeof(int), we end up with B and offset 0.
903 If the same is produced by multiple inheritance, we end up with A and offset
906 If we can not find corresponding class, give up by setting
907 CONTEXT->OUTER_TYPE to EXPECTED_TYPE and CONTEXT->OFFSET to NULL.
908 Return true when lookup was sucesful. */
911 get_class_context (ipa_polymorphic_call_context
*context
,
914 tree type
= context
->outer_type
;
915 HOST_WIDE_INT offset
= context
->offset
;
917 /* Find the sub-object the constant actually refers to and mark whether it is
918 an artificial one (as opposed to a user-defined one). */
921 HOST_WIDE_INT pos
, size
;
924 /* On a match, just return what we found. */
925 if (TREE_CODE (type
) == TREE_CODE (expected_type
)
926 && types_same_for_odr (type
, expected_type
))
928 /* Type can not contain itself on an non-zero offset. In that case
932 gcc_assert (offset
== 0);
936 /* Walk fields and find corresponding on at OFFSET. */
937 if (TREE_CODE (type
) == RECORD_TYPE
)
939 for (fld
= TYPE_FIELDS (type
); fld
; fld
= DECL_CHAIN (fld
))
941 if (TREE_CODE (fld
) != FIELD_DECL
)
944 pos
= int_bit_position (fld
);
945 size
= tree_to_uhwi (DECL_SIZE (fld
));
946 if (pos
<= offset
&& (pos
+ size
) > offset
)
953 type
= TREE_TYPE (fld
);
955 /* DECL_ARTIFICIAL represents a basetype. */
956 if (!DECL_ARTIFICIAL (fld
))
958 context
->outer_type
= type
;
959 context
->offset
= offset
;
960 /* As soon as we se an field containing the type,
961 we know we are not looking for derivations. */
962 context
->maybe_derived_type
= false;
965 else if (TREE_CODE (type
) == ARRAY_TYPE
)
967 tree subtype
= TREE_TYPE (type
);
969 /* Give up if we don't know array size. */
970 if (!tree_fits_shwi_p (TYPE_SIZE (subtype
))
971 || !tree_to_shwi (TYPE_SIZE (subtype
)) <= 0)
973 offset
= offset
% tree_to_shwi (TYPE_SIZE (subtype
));
975 context
->outer_type
= type
;
976 context
->offset
= offset
;
977 context
->maybe_derived_type
= false;
979 /* Give up on anything else. */
984 /* If we failed to find subtype we look for, give up and fall back to the
985 most generic query. */
987 context
->outer_type
= expected_type
;
989 context
->maybe_derived_type
= true;
993 /* Return true if OUTER_TYPE contains OTR_TYPE at OFFSET. */
996 contains_type_p (tree outer_type
, HOST_WIDE_INT offset
,
999 ipa_polymorphic_call_context context
= {offset
, outer_type
,
1001 return get_class_context (&context
, otr_type
);
1004 /* Lookup base of BINFO that has virtual table VTABLE with OFFSET. */
1007 subbinfo_with_vtable_at_offset (tree binfo
, unsigned HOST_WIDE_INT offset
,
1010 tree v
= BINFO_VTABLE (binfo
);
1013 unsigned HOST_WIDE_INT this_offset
;
1017 if (!vtable_pointer_value_to_vtable (v
, &v
, &this_offset
))
1020 if (offset
== this_offset
1021 && DECL_ASSEMBLER_NAME (v
) == DECL_ASSEMBLER_NAME (vtable
))
1025 for (i
= 0; BINFO_BASE_ITERATE (binfo
, i
, base_binfo
); i
++)
1026 if (polymorphic_type_binfo_p (base_binfo
))
1028 base_binfo
= subbinfo_with_vtable_at_offset (base_binfo
, offset
, vtable
);
1035 /* T is known constant value of virtual table pointer.
1036 Store virtual table to V and its offset to OFFSET.
1037 Return false if T does not look like virtual table reference. */
1040 vtable_pointer_value_to_vtable (tree t
, tree
*v
, unsigned HOST_WIDE_INT
*offset
)
1042 /* We expect &MEM[(void *)&virtual_table + 16B].
1043 We obtain object's BINFO from the context of the virtual table.
1044 This one contains pointer to virtual table represented via
1045 POINTER_PLUS_EXPR. Verify that this pointer match to what
1046 we propagated through.
1048 In the case of virtual inheritance, the virtual tables may
1049 be nested, i.e. the offset may be different from 16 and we may
1050 need to dive into the type representation. */
1051 if (TREE_CODE (t
) == ADDR_EXPR
1052 && TREE_CODE (TREE_OPERAND (t
, 0)) == MEM_REF
1053 && TREE_CODE (TREE_OPERAND (TREE_OPERAND (t
, 0), 0)) == ADDR_EXPR
1054 && TREE_CODE (TREE_OPERAND (TREE_OPERAND (t
, 0), 1)) == INTEGER_CST
1055 && (TREE_CODE (TREE_OPERAND (TREE_OPERAND (TREE_OPERAND (t
, 0), 0), 0))
1057 && DECL_VIRTUAL_P (TREE_OPERAND (TREE_OPERAND
1058 (TREE_OPERAND (t
, 0), 0), 0)))
1060 *v
= TREE_OPERAND (TREE_OPERAND (TREE_OPERAND (t
, 0), 0), 0);
1061 *offset
= tree_to_uhwi (TREE_OPERAND (TREE_OPERAND (t
, 0), 1));
1065 /* Alternative representation, used by C++ frontend is POINTER_PLUS_EXPR.
1066 We need to handle it when T comes from static variable initializer or
1068 if (TREE_CODE (t
) == POINTER_PLUS_EXPR
)
1070 *offset
= tree_to_uhwi (TREE_OPERAND (t
, 1));
1071 t
= TREE_OPERAND (t
, 0);
1076 if (TREE_CODE (t
) != ADDR_EXPR
)
1078 *v
= TREE_OPERAND (t
, 0);
1082 /* T is known constant value of virtual table pointer. Return BINFO of the
1086 vtable_pointer_value_to_binfo (tree t
)
1089 unsigned HOST_WIDE_INT offset
;
1091 if (!vtable_pointer_value_to_vtable (t
, &vtable
, &offset
))
1094 /* FIXME: for stores of construction vtables we return NULL,
1095 because we do not have BINFO for those. Eventually we should fix
1096 our representation to allow this case to be handled, too.
1097 In the case we see store of BINFO we however may assume
1098 that standard folding will be ale to cope with it. */
1099 return subbinfo_with_vtable_at_offset (TYPE_BINFO (DECL_CONTEXT (vtable
)),
1103 /* Proudce polymorphic call context for call method of instance
1104 that is located within BASE (that is assumed to be a decl) at OFFSET. */
1107 get_polymorphic_call_info_for_decl (ipa_polymorphic_call_context
*context
,
1108 tree base
, HOST_WIDE_INT offset
)
1110 gcc_assert (DECL_P (base
));
1112 context
->outer_type
= TREE_TYPE (base
);
1113 context
->offset
= offset
;
1114 /* Make very conservative assumption that all objects
1115 may be in construction.
1116 TODO: ipa-prop already contains code to tell better.
1118 context
->maybe_in_construction
= true;
1119 context
->maybe_derived_type
= false;
1122 /* CST is an invariant (address of decl), try to get meaningful
1123 polymorphic call context for polymorphic call of method
1124 if instance of OTR_TYPE that is located at OFFSET of this invariant.
1125 Return FALSE if nothing meaningful can be found. */
1128 get_polymorphic_call_info_from_invariant (ipa_polymorphic_call_context
*context
,
1131 HOST_WIDE_INT offset
)
1133 HOST_WIDE_INT offset2
, size
, max_size
;
1136 if (TREE_CODE (cst
) != ADDR_EXPR
)
1139 cst
= TREE_OPERAND (cst
, 0);
1140 base
= get_ref_base_and_extent (cst
, &offset2
, &size
, &max_size
);
1141 if (!DECL_P (base
) || max_size
== -1 || max_size
!= size
)
1144 /* Only type inconsistent programs can have otr_type that is
1145 not part of outer type. */
1146 if (!contains_type_p (TREE_TYPE (base
), offset
, otr_type
))
1149 get_polymorphic_call_info_for_decl (context
, base
, offset
);
1153 /* Given REF call in FNDECL, determine class of the polymorphic
1154 call (OTR_TYPE), its token (OTR_TOKEN) and CONTEXT.
1155 Return pointer to object described by the context */
1158 get_polymorphic_call_info (tree fndecl
,
1161 HOST_WIDE_INT
*otr_token
,
1162 ipa_polymorphic_call_context
*context
)
1165 *otr_type
= obj_type_ref_class (ref
);
1166 *otr_token
= tree_to_uhwi (OBJ_TYPE_REF_TOKEN (ref
));
1168 /* Set up basic info in case we find nothing interesting in the analysis. */
1169 context
->outer_type
= *otr_type
;
1170 context
->offset
= 0;
1171 base_pointer
= OBJ_TYPE_REF_OBJECT (ref
);
1172 context
->maybe_derived_type
= true;
1173 context
->maybe_in_construction
= false;
1175 /* Walk SSA for outer object. */
1178 if (TREE_CODE (base_pointer
) == SSA_NAME
1179 && !SSA_NAME_IS_DEFAULT_DEF (base_pointer
)
1180 && SSA_NAME_DEF_STMT (base_pointer
)
1181 && gimple_assign_single_p (SSA_NAME_DEF_STMT (base_pointer
)))
1183 base_pointer
= gimple_assign_rhs1 (SSA_NAME_DEF_STMT (base_pointer
));
1184 STRIP_NOPS (base_pointer
);
1186 else if (TREE_CODE (base_pointer
) == ADDR_EXPR
)
1188 HOST_WIDE_INT size
, max_size
;
1189 HOST_WIDE_INT offset2
;
1190 tree base
= get_ref_base_and_extent (TREE_OPERAND (base_pointer
, 0),
1191 &offset2
, &size
, &max_size
);
1193 /* If this is a varying address, punt. */
1194 if ((TREE_CODE (base
) == MEM_REF
|| DECL_P (base
))
1196 && max_size
== size
)
1198 /* We found dereference of a pointer. Type of the pointer
1199 and MEM_REF is meaningless, but we can look futher. */
1200 if (TREE_CODE (base
) == MEM_REF
)
1202 base_pointer
= TREE_OPERAND (base
, 0);
1204 += offset2
+ mem_ref_offset (base
).low
* BITS_PER_UNIT
;
1205 context
->outer_type
= NULL
;
1207 /* We found base object. In this case the outer_type
1209 else if (DECL_P (base
))
1211 gcc_assert (!POINTER_TYPE_P (TREE_TYPE (base
)));
1213 /* Only type inconsistent programs can have otr_type that is
1214 not part of outer type. */
1215 if (!contains_type_p (TREE_TYPE (base
),
1216 context
->offset
+ offset2
, *otr_type
))
1218 /* Use OTR_TOKEN = INT_MAX as a marker of probably type inconsistent
1219 code sequences; we arrange the calls to be builtin_unreachable
1221 *otr_token
= INT_MAX
;
1222 return base_pointer
;
1224 get_polymorphic_call_info_for_decl (context
, base
,
1225 context
->offset
+ offset2
);
1234 else if (TREE_CODE (base_pointer
) == POINTER_PLUS_EXPR
1235 && tree_fits_uhwi_p (TREE_OPERAND (base_pointer
, 1)))
1237 context
->offset
+= tree_to_shwi (TREE_OPERAND (base_pointer
, 1))
1239 base_pointer
= TREE_OPERAND (base_pointer
, 0);
1246 /* Try to determine type of the outer object. */
1247 if (TREE_CODE (base_pointer
) == SSA_NAME
1248 && SSA_NAME_IS_DEFAULT_DEF (base_pointer
)
1249 && TREE_CODE (SSA_NAME_VAR (base_pointer
)) == PARM_DECL
)
1251 /* See if parameter is THIS pointer of a method. */
1252 if (TREE_CODE (TREE_TYPE (fndecl
)) == METHOD_TYPE
1253 && SSA_NAME_VAR (base_pointer
) == DECL_ARGUMENTS (fndecl
))
1255 context
->outer_type
= TREE_TYPE (TREE_TYPE (base_pointer
));
1256 gcc_assert (TREE_CODE (context
->outer_type
) == RECORD_TYPE
);
1258 /* Dynamic casting has possibly upcasted the type
1259 in the hiearchy. In this case outer type is less
1260 informative than inner type and we should forget
1262 if (!contains_type_p (context
->outer_type
, context
->offset
,
1265 context
->outer_type
= NULL
;
1266 return base_pointer
;
1269 /* If the function is constructor or destructor, then
1270 the type is possibly in construction, but we know
1271 it is not derived type. */
1272 if (DECL_CXX_CONSTRUCTOR_P (fndecl
)
1273 || DECL_CXX_DESTRUCTOR_P (fndecl
))
1275 context
->maybe_in_construction
= true;
1276 context
->maybe_derived_type
= false;
1280 context
->maybe_derived_type
= true;
1281 context
->maybe_in_construction
= false;
1283 return base_pointer
;
1285 /* Non-PODs passed by value are really passed by invisible
1286 reference. In this case we also know the type of the
1288 if (DECL_BY_REFERENCE (SSA_NAME_VAR (base_pointer
)))
1290 context
->outer_type
= TREE_TYPE (TREE_TYPE (base_pointer
));
1291 gcc_assert (!POINTER_TYPE_P (context
->outer_type
));
1292 /* Only type inconsistent programs can have otr_type that is
1293 not part of outer type. */
1294 if (!contains_type_p (context
->outer_type
, context
->offset
,
1297 /* Use OTR_TOKEN = INT_MAX as a marker of probably type inconsistent
1298 code sequences; we arrange the calls to be builtin_unreachable
1300 *otr_token
= INT_MAX
;
1301 return base_pointer
;
1303 context
->maybe_derived_type
= false;
1304 context
->maybe_in_construction
= false;
1305 return base_pointer
;
1308 /* TODO: There are multiple ways to derive a type. For instance
1309 if BASE_POINTER is passed to an constructor call prior our refernece.
1310 We do not make this type of flow sensitive analysis yet. */
1311 return base_pointer
;
1314 /* Walk bases of OUTER_TYPE that contain OTR_TYPE at OFFSET.
1315 Lookup their respecitve virtual methods for OTR_TOKEN and OTR_TYPE
1316 and insert them to NODES.
1318 MATCHED_VTABLES and INSERTED is used to avoid duplicated work. */
1321 record_targets_from_bases (tree otr_type
,
1322 HOST_WIDE_INT otr_token
,
1324 HOST_WIDE_INT offset
,
1325 vec
<cgraph_node
*> &nodes
,
1326 pointer_set_t
*inserted
,
1327 pointer_set_t
*matched_vtables
,
1332 HOST_WIDE_INT pos
, size
;
1336 if (types_same_for_odr (outer_type
, otr_type
))
1339 for (fld
= TYPE_FIELDS (outer_type
); fld
; fld
= DECL_CHAIN (fld
))
1341 if (TREE_CODE (fld
) != FIELD_DECL
)
1344 pos
= int_bit_position (fld
);
1345 size
= tree_to_shwi (DECL_SIZE (fld
));
1346 if (pos
<= offset
&& (pos
+ size
) > offset
1347 /* Do not get confused by zero sized bases. */
1348 && polymorphic_type_binfo_p (TYPE_BINFO (TREE_TYPE (fld
))))
1351 /* Within a class type we should always find correcponding fields. */
1352 gcc_assert (fld
&& TREE_CODE (TREE_TYPE (fld
)) == RECORD_TYPE
);
1354 /* Nonbasetypes should have been stripped by outer_class_type. */
1355 gcc_assert (DECL_ARTIFICIAL (fld
));
1357 outer_type
= TREE_TYPE (fld
);
1360 base_binfo
= get_binfo_at_offset (TYPE_BINFO (outer_type
),
1364 gcc_assert (odr_violation_reported
);
1367 gcc_assert (base_binfo
);
1368 if (!pointer_set_insert (matched_vtables
, BINFO_VTABLE (base_binfo
)))
1371 tree target
= gimple_get_virt_method_for_binfo (otr_token
,
1374 maybe_record_node (nodes
, target
, inserted
, can_refer
, completep
);
1375 pointer_set_insert (matched_vtables
, BINFO_VTABLE (base_binfo
));
1380 /* When virtual table is removed, we may need to flush the cache. */
1383 devirt_variable_node_removal_hook (varpool_node
*n
,
1384 void *d ATTRIBUTE_UNUSED
)
1386 if (cached_polymorphic_call_targets
1387 && DECL_VIRTUAL_P (n
->decl
)
1388 && type_in_anonymous_namespace_p (DECL_CONTEXT (n
->decl
)))
1389 free_polymorphic_call_targets_hash ();
1392 /* Return vector containing possible targets of polymorphic call of type
1393 OTR_TYPE caling method OTR_TOKEN within type of OTR_OUTER_TYPE and OFFSET.
1394 If INCLUDE_BASES is true, walk also base types of OUTER_TYPES containig
1395 OTR_TYPE and include their virtual method. This is useful for types
1396 possibly in construction or destruction where the virtual table may
1397 temporarily change to one of base types. INCLUDE_DERIVER_TYPES make
1398 us to walk the inheritance graph for all derivations.
1400 OTR_TOKEN == INT_MAX is used to mark calls that are provably
1401 undefined and should be redirected to unreachable.
1403 If COMPLETEP is non-NULL, store true if the list is complete.
1404 CACHE_TOKEN (if non-NULL) will get stored to an unique ID of entry
1405 in the target cache. If user needs to visit every target list
1406 just once, it can memoize them.
1408 NONCONSTRUCTION_TARGETS specify number of targets with asumption that
1409 the type is not in the construction. Those targets appear first in the
1412 Returned vector is placed into cache. It is NOT caller's responsibility
1413 to free it. The vector can be freed on cgraph_remove_node call if
1414 the particular node is a virtual function present in the cache. */
1417 possible_polymorphic_call_targets (tree otr_type
,
1418 HOST_WIDE_INT otr_token
,
1419 ipa_polymorphic_call_context context
,
1422 int *nonconstruction_targetsp
)
1424 static struct cgraph_node_hook_list
*node_removal_hook_holder
;
1425 pointer_set_t
*inserted
;
1426 pointer_set_t
*matched_vtables
;
1427 vec
<cgraph_node
*> nodes
= vNULL
;
1428 odr_type type
, outer_type
;
1429 polymorphic_call_target_d key
;
1430 polymorphic_call_target_d
**slot
;
1436 /* If ODR is not initialized, return empty incomplete list. */
1437 if (!odr_hash
.is_created ())
1441 if (nonconstruction_targetsp
)
1442 *nonconstruction_targetsp
= 0;
1446 /* If we hit type inconsistency, just return empty list of targets. */
1447 if (otr_token
== INT_MAX
)
1451 if (nonconstruction_targetsp
)
1452 *nonconstruction_targetsp
= 0;
1456 type
= get_odr_type (otr_type
, true);
1458 /* Lookup the outer class type we want to walk. */
1459 if (context
.outer_type
1460 && !get_class_context (&context
, otr_type
))
1464 if (nonconstruction_targetsp
)
1465 *nonconstruction_targetsp
= 0;
1469 /* We canonicalize our query, so we do not need extra hashtable entries. */
1471 /* Without outer type, we have no use for offset. Just do the
1472 basic search from innter type */
1473 if (!context
.outer_type
)
1475 context
.outer_type
= otr_type
;
1478 /* We need to update our hiearchy if the type does not exist. */
1479 outer_type
= get_odr_type (context
.outer_type
, true);
1480 /* If outer and inner type match, there are no bases to see. */
1481 if (type
== outer_type
)
1482 context
.maybe_in_construction
= false;
1483 /* If the type is complete, there are no derivations. */
1484 if (TYPE_FINAL_P (outer_type
->type
))
1485 context
.maybe_derived_type
= false;
1487 /* Initialize query cache. */
1488 if (!cached_polymorphic_call_targets
)
1490 cached_polymorphic_call_targets
= pointer_set_create ();
1491 polymorphic_call_target_hash
.create (23);
1492 if (!node_removal_hook_holder
)
1494 node_removal_hook_holder
=
1495 cgraph_add_node_removal_hook (&devirt_node_removal_hook
, NULL
);
1496 varpool_add_node_removal_hook (&devirt_variable_node_removal_hook
,
1501 /* Lookup cached answer. */
1503 key
.otr_token
= otr_token
;
1504 key
.context
= context
;
1505 slot
= polymorphic_call_target_hash
.find_slot (&key
, INSERT
);
1507 *cache_token
= (void *)*slot
;
1511 *completep
= (*slot
)->complete
;
1512 if (nonconstruction_targetsp
)
1513 *nonconstruction_targetsp
= (*slot
)->nonconstruction_targets
;
1514 return (*slot
)->targets
;
1519 /* Do actual search. */
1520 timevar_push (TV_IPA_VIRTUAL_CALL
);
1521 *slot
= XCNEW (polymorphic_call_target_d
);
1523 *cache_token
= (void *)*slot
;
1524 (*slot
)->type
= type
;
1525 (*slot
)->otr_token
= otr_token
;
1526 (*slot
)->context
= context
;
1528 inserted
= pointer_set_create ();
1529 matched_vtables
= pointer_set_create ();
1531 /* First see virtual method of type itself. */
1532 binfo
= get_binfo_at_offset (TYPE_BINFO (outer_type
->type
),
1533 context
.offset
, otr_type
);
1535 target
= gimple_get_virt_method_for_binfo (otr_token
, binfo
,
1539 gcc_assert (odr_violation_reported
);
1543 maybe_record_node (nodes
, target
, inserted
, can_refer
, &complete
);
1547 /* In the case we get complete method, we don't need
1548 to walk derivations. */
1549 if (DECL_FINAL_P (target
))
1550 context
.maybe_derived_type
= false;
1553 gcc_assert (!complete
);
1555 pointer_set_insert (matched_vtables
, BINFO_VTABLE (binfo
));
1557 /* Next walk recursively all derived types. */
1558 if (context
.maybe_derived_type
)
1560 /* For anonymous namespace types we can attempt to build full type.
1561 All derivations must be in this unit (unless we see partial unit). */
1562 if (!type
->anonymous_namespace
|| flag_ltrans
)
1564 for (i
= 0; i
< outer_type
->derived_types
.length(); i
++)
1565 possible_polymorphic_call_targets_1 (nodes
, inserted
,
1568 outer_type
->derived_types
[i
],
1569 otr_token
, outer_type
->type
,
1570 context
.offset
, &complete
);
1573 /* Finally walk bases, if asked to. */
1574 (*slot
)->nonconstruction_targets
= nodes
.length();
1575 if (context
.maybe_in_construction
)
1576 record_targets_from_bases (otr_type
, otr_token
, outer_type
->type
,
1577 context
.offset
, nodes
, inserted
,
1578 matched_vtables
, &complete
);
1580 (*slot
)->targets
= nodes
;
1581 (*slot
)->complete
= complete
;
1583 *completep
= complete
;
1584 if (nonconstruction_targetsp
)
1585 *nonconstruction_targetsp
= (*slot
)->nonconstruction_targets
;
1587 pointer_set_destroy (inserted
);
1588 pointer_set_destroy (matched_vtables
);
1589 timevar_pop (TV_IPA_VIRTUAL_CALL
);
1593 /* Dump all possible targets of a polymorphic call. */
1596 dump_possible_polymorphic_call_targets (FILE *f
,
1598 HOST_WIDE_INT otr_token
,
1599 const ipa_polymorphic_call_context
&ctx
)
1601 vec
<cgraph_node
*> targets
;
1603 odr_type type
= get_odr_type (otr_type
, false);
1605 int nonconstruction
;
1609 targets
= possible_polymorphic_call_targets (otr_type
, otr_token
,
1611 &final
, NULL
, &nonconstruction
);
1612 fprintf (f
, " Targets of polymorphic call of type %i:", type
->id
);
1613 print_generic_expr (f
, type
->type
, TDF_SLIM
);
1614 fprintf (f
, " token %i\n", (int)otr_token
);
1615 if (ctx
.outer_type
|| ctx
.offset
)
1617 fprintf (f
, " Contained in type:");
1618 print_generic_expr (f
, ctx
.outer_type
, TDF_SLIM
);
1619 fprintf (f
, " at offset "HOST_WIDE_INT_PRINT_DEC
"\n",
1623 fprintf (f
, " %s%s%s\n ",
1624 final
? "This is a complete list." :
1625 "This is partial list; extra targets may be defined in other units.",
1626 ctx
.maybe_in_construction
? " (base types included)" : "",
1627 ctx
.maybe_derived_type
? " (derived types included)" : "");
1628 for (i
= 0; i
< targets
.length (); i
++)
1631 if (i
== (unsigned)nonconstruction
)
1632 fprintf (f
, "\n If the type is in construction,"
1633 " then additional tarets are:\n"
1636 name
= cplus_demangle_v3 (targets
[i
]->asm_name (), 0);
1637 fprintf (f
, " %s/%i", name
? name
: targets
[i
]->name (), targets
[i
]->order
);
1640 if (!targets
[i
]->definition
)
1641 fprintf (f
, " (no definition%s)",
1642 DECL_DECLARED_INLINE_P (targets
[i
]->decl
)
1645 fprintf (f
, "\n\n");
1649 /* Return true if N can be possibly target of a polymorphic call of
1650 OTR_TYPE/OTR_TOKEN. */
1653 possible_polymorphic_call_target_p (tree otr_type
,
1654 HOST_WIDE_INT otr_token
,
1655 const ipa_polymorphic_call_context
&ctx
,
1656 struct cgraph_node
*n
)
1658 vec
<cgraph_node
*> targets
;
1660 enum built_in_function fcode
;
1663 if (TREE_CODE (TREE_TYPE (n
->decl
)) == FUNCTION_TYPE
1664 && ((fcode
= DECL_FUNCTION_CODE (n
->decl
))
1665 == BUILT_IN_UNREACHABLE
1666 || fcode
== BUILT_IN_TRAP
))
1669 if (!odr_hash
.is_created ())
1671 targets
= possible_polymorphic_call_targets (otr_type
, otr_token
, ctx
, &final
);
1672 for (i
= 0; i
< targets
.length (); i
++)
1673 if (symtab_semantically_equivalent_p (n
, targets
[i
]))
1676 /* At a moment we allow middle end to dig out new external declarations
1677 as a targets of polymorphic calls. */
1678 if (!final
&& !n
->definition
)
1684 /* After callgraph construction new external nodes may appear.
1685 Add them into the graph. */
1688 update_type_inheritance_graph (void)
1690 struct cgraph_node
*n
;
1692 if (!odr_hash
.is_created ())
1694 free_polymorphic_call_targets_hash ();
1695 timevar_push (TV_IPA_INHERITANCE
);
1696 /* We reconstruct the graph starting from types of all methods seen in the
1698 FOR_EACH_FUNCTION (n
)
1699 if (DECL_VIRTUAL_P (n
->decl
)
1701 && symtab_real_symbol_p (n
))
1702 get_odr_type (method_class_type (TREE_TYPE (n
->decl
)), true);
1703 timevar_pop (TV_IPA_INHERITANCE
);
1707 /* Return true if N looks like likely target of a polymorphic call.
1708 Rule out cxa_pure_virtual, noreturns, function declared cold and
1709 other obvious cases. */
1712 likely_target_p (struct cgraph_node
*n
)
1715 /* cxa_pure_virtual and similar things are not likely. */
1716 if (TREE_CODE (TREE_TYPE (n
->decl
)) != METHOD_TYPE
)
1718 flags
= flags_from_decl_or_type (n
->decl
);
1719 if (flags
& ECF_NORETURN
)
1721 if (lookup_attribute ("cold",
1722 DECL_ATTRIBUTES (n
->decl
)))
1724 if (n
->frequency
< NODE_FREQUENCY_NORMAL
)
1729 /* The ipa-devirt pass.
1730 When polymorphic call has only one likely target in the unit,
1731 turn it into speculative call. */
1736 struct cgraph_node
*n
;
1737 struct pointer_set_t
*bad_call_targets
= pointer_set_create ();
1738 struct cgraph_edge
*e
;
1740 int npolymorphic
= 0, nspeculated
= 0, nconverted
= 0, ncold
= 0;
1741 int nmultiple
= 0, noverwritable
= 0, ndevirtualized
= 0, nnotdefined
= 0;
1742 int nwrong
= 0, nok
= 0, nexternal
= 0, nartificial
= 0;
1744 FOR_EACH_DEFINED_FUNCTION (n
)
1746 bool update
= false;
1747 if (dump_file
&& n
->indirect_calls
)
1748 fprintf (dump_file
, "\n\nProcesing function %s/%i\n",
1749 n
->name (), n
->order
);
1750 for (e
= n
->indirect_calls
; e
; e
= e
->next_callee
)
1751 if (e
->indirect_info
->polymorphic
)
1753 struct cgraph_node
*likely_target
= NULL
;
1756 int nonconstruction_targets
;
1757 vec
<cgraph_node
*>targets
1758 = possible_polymorphic_call_targets
1759 (e
, &final
, &cache_token
, &nonconstruction_targets
);
1763 dump_possible_polymorphic_call_targets
1768 if (!cgraph_maybe_hot_edge_p (e
))
1771 fprintf (dump_file
, "Call is cold\n\n");
1778 fprintf (dump_file
, "Call is aready speculated\n\n");
1781 /* When dumping see if we agree with speculation. */
1785 if (pointer_set_contains (bad_call_targets
,
1789 fprintf (dump_file
, "Target list is known to be useless\n\n");
1793 for (i
= 0; i
< targets
.length (); i
++)
1794 if (likely_target_p (targets
[i
]))
1798 if (i
< (unsigned) nonconstruction_targets
)
1800 likely_target
= NULL
;
1802 fprintf (dump_file
, "More than one likely target\n\n");
1807 likely_target
= targets
[i
];
1811 pointer_set_insert (bad_call_targets
, cache_token
);
1814 /* This is reached only when dumping; check if we agree or disagree
1815 with the speculation. */
1818 struct cgraph_edge
*e2
;
1819 struct ipa_ref
*ref
;
1820 cgraph_speculative_call_info (e
, e2
, e
, ref
);
1821 if (cgraph_function_or_thunk_node (e2
->callee
, NULL
)
1822 == cgraph_function_or_thunk_node (likely_target
, NULL
))
1824 fprintf (dump_file
, "We agree with speculation\n\n");
1829 fprintf (dump_file
, "We disagree with speculation\n\n");
1834 if (!likely_target
->definition
)
1837 fprintf (dump_file
, "Target is not an definition\n\n");
1841 /* Do not introduce new references to external symbols. While we
1842 can handle these just well, it is common for programs to
1843 incorrectly with headers defining methods they are linked
1845 if (DECL_EXTERNAL (likely_target
->decl
))
1848 fprintf (dump_file
, "Target is external\n\n");
1852 /* Don't use an implicitly-declared destructor (c++/58678). */
1853 struct cgraph_node
*non_thunk_target
1854 = cgraph_function_node (likely_target
);
1855 if (DECL_ARTIFICIAL (non_thunk_target
->decl
)
1856 && DECL_COMDAT (non_thunk_target
->decl
))
1859 fprintf (dump_file
, "Target is artificial\n\n");
1863 if (cgraph_function_body_availability (likely_target
)
1864 <= AVAIL_OVERWRITABLE
1865 && symtab_can_be_discarded (likely_target
))
1868 fprintf (dump_file
, "Target is overwritable\n\n");
1876 "Speculatively devirtualizing call in %s/%i to %s/%i\n\n",
1877 n
->name (), n
->order
,
1878 likely_target
->name (),
1879 likely_target
->order
);
1880 if (!symtab_can_be_discarded (likely_target
))
1883 alias
= cgraph (symtab_nonoverwritable_alias
1886 likely_target
= alias
;
1890 cgraph_turn_edge_to_speculative
1891 (e
, likely_target
, e
->count
* 8 / 10, e
->frequency
* 8 / 10);
1895 inline_update_overall_summary (n
);
1897 pointer_set_destroy (bad_call_targets
);
1901 "%i polymorphic calls, %i devirtualized,"
1902 " %i speculatively devirtualized, %i cold\n"
1903 "%i have multiple targets, %i overwritable,"
1904 " %i already speculated (%i agree, %i disagree),"
1905 " %i external, %i not defined, %i artificial\n",
1906 npolymorphic
, ndevirtualized
, nconverted
, ncold
,
1907 nmultiple
, noverwritable
, nspeculated
, nok
, nwrong
,
1908 nexternal
, nnotdefined
, nartificial
);
1909 return ndevirtualized
? TODO_remove_functions
: 0;
1912 /* Gate for speculative IPA devirtualization optimization. */
1915 gate_ipa_devirt (void)
1917 return (flag_devirtualize
1918 && flag_devirtualize_speculatively
1924 const pass_data pass_data_ipa_devirt
=
1926 IPA_PASS
, /* type */
1927 "devirt", /* name */
1928 OPTGROUP_NONE
, /* optinfo_flags */
1929 true, /* has_gate */
1930 true, /* has_execute */
1931 TV_IPA_DEVIRT
, /* tv_id */
1932 0, /* properties_required */
1933 0, /* properties_provided */
1934 0, /* properties_destroyed */
1935 0, /* todo_flags_start */
1936 ( TODO_dump_symtab
), /* todo_flags_finish */
1939 class pass_ipa_devirt
: public ipa_opt_pass_d
1942 pass_ipa_devirt (gcc::context
*ctxt
)
1943 : ipa_opt_pass_d (pass_data_ipa_devirt
, ctxt
,
1944 NULL
, /* generate_summary */
1945 NULL
, /* write_summary */
1946 NULL
, /* read_summary */
1947 NULL
, /* write_optimization_summary */
1948 NULL
, /* read_optimization_summary */
1949 NULL
, /* stmt_fixup */
1950 0, /* function_transform_todo_flags_start */
1951 NULL
, /* function_transform */
1952 NULL
) /* variable_transform */
1955 /* opt_pass methods: */
1956 bool gate () { return gate_ipa_devirt (); }
1957 unsigned int execute () { return ipa_devirt (); }
1959 }; // class pass_ipa_devirt
1964 make_pass_ipa_devirt (gcc::context
*ctxt
)
1966 return new pass_ipa_devirt (ctxt
);
1969 #include "gt-ipa-devirt.h"