This informs other passes that we can optimize e.g.:
int f(char *s) {
puts(s); if (s == NULL) puts("was null"); return 99;
}
to:
int f(char *s) {
puts(s); return 99;
}
Paths
| Differential D50039
[FunctionAttrs] Added nonnull atribute to libc function args AbandonedPublic Authored by xbolva00 on Jul 30 2018, 11:20 PM.
Details
Diff Detail Event TimelineComment Actions if @efriedma, @bkramer is OK with this approach, I will add some tests, etc. For libc functions the approach seems right for me, but not sure about mem* intrinsics, if the IR builder is a good place where we should add the nonnull arg info. Reviewers, please check the places where I added nonnull function arg attribute, I may missed something. Comment Actions Calls which are not reordered in the IR -> transformation already works int foo(void *s) { memset(s, 0, 10); if (!s) // eliminated abort(); return l; } int foo(char *s) { int l = strlen(s); if (!s) abort(); return l; } for strlen, we have IR: ; Function Attrs: nounwind %tobool = icmp eq i8* %s, null br i1 %tobool, label %if.then, label %if.end if.then: ; preds = %entry tail call void @abort() #3 unreachable if.end: ; preds = %entry %call = tail call i32 @strlen(i8* %s) #4 ret i32 %call } ; Function Attrs: argmemonly nounwind readonly Where should we work on above case? SCCP? Comment Actions I don't think we can reasonably do this for the functions which take a pointer+size pair; see http://lists.llvm.org/pipermail/cfe-dev/2017-January/052066.html etc. Maybe we can mark specific calls where we know the size is nonzero. Not sure how this should interact with -fno-delete-null-pointer-checks; maybe we can make that work "correctly" by just doing all our nonnull marking on individual calls, even for the functions which take null-terminated strings.
Comment Actions
so @rsmith 's list is what we want to follow for this type of transformation? ISO C: memcpy, memmove, memset, memcmp, memchr, memrchr strncpy [param 1 only], strncat [param 1 only], strncmp Extensions: strndup, memccpy, mempcpy, strnlen, bcopy, bzero, bcmp, memfrob, strncasecmp, strncasecmp_l [not parameter 4], stpncpy Side note: GCC has no problem to optimize/remove condition (there is already ubsan checker for 0/null for mem* functions, or maybe is under development, I saw it somewhere) memset(p, 0, n); if (!p) abort(); return 1; } Comment Actions int foo(void *p, int n) { memset(p, 0, 0); if (!p) abort(); return 1; } Shouldn't we just do it like GCC? Do not optimize when explicit NULL or zero, otherwise be optimistic. Comment Actions Yes, that's the right list of functions. Like the discussion noted, we don't really want to match gcc's behavior here because it breaks legacy code for little practical benefit. Comment Actions
Okay. I will update this patch tomorrow. Comment Actions I'm still concerned that this doesn't really interact appropriately with -fno-delete-null-pointer-checks... specifically, the nonnull markings could cause unexpected optimizations. I mean, it's sort of dubious to use -fno-delete-null-pointer-checks without -ffreestanding anyway, given that many C library APIs special-case null, but we should still try to make it work as well as we can. I think we can solve that problem by changing how the nonnull markings are implemented: instead of marking the functions themselves as non-null, we should mark calls to those functions (as long as the calls are not in "null-pointer-is-valid" functions). In terms of splitting the patch, yes, it probably makes sense to split into markings for char* pointers, and markings for other pointers.
Comment Actions Ok, makes sense. Just looking into FunctionAttrs, there is a FIXME comment for "EnableNonnullArgPropagation". If we carefully handle these nonnull arg attributes (e.g. avoid memcpy(d, s, 0) optimization), are there any reasons whyEnableNonnullArgPropagation should be still disabled? Comment Actions Off the top of my head, I think we fixed clang, so it should be okay... but please verify that the clang fix actually went in. And it should be a separate patch, of course. Comment Actions Adding @spatel since he is the author of "EnableNonnullArgPropagation" (https://reviews.llvm.org/D27855) Comment Actions
From what I can tell, the patch that was supposed to make the C functions safe and let us flip the setting of EnableNonnullArgPropagation is here: It was approved, but it was never committed? Comment Actions Since we are gonna mark args as nonull at the callsites, we can be more precisice since we know if "size" arg is constant and > 0. e.g. Comment Actions I am trying to do this in functionattrs but problem is that the call was sunk to the successor before the functionattrs ran and in the functionattrs we just go thru instructionsof EntryBlock :/ xbolva00 retitled this revision from [LibCalls] Added nonnull atribute to libc function args to [FunctionAttrs] Added nonnull atribute to libc function args. Comment Actions
Comment Actions @efriedma , please, can you look at it? Tests will be added later after major design issues are addressed.
Comment Actions This doesn't look like the patch I was expecting. Propogating nonnull like this probably makes sense, but this patch should be split into two parts. In the first part, you can extend SimplifyLibCalls to just call Call->addParamAttr(ArgNo, Attribute::NonNull) on calls to known library functions, or something like that. Then the second part does the inference from callee to caller; essentially this patch, but looking for nonnull attributes instead of specific libcalls. Comment Actions Alright, definitely a better solution! Thanks, I will split it.
But basically, this is what addArgumentAttrsFromCallsites does. So if I do this correctly in Simplifylibcalls, can I remove "EnableNonnullArgPropagation" flag which blocks the propagation to function args? Comment Actions I think we still need the clang patch to preemptively strip nonnull annotations from C library functions before we turn on EnableNonnullArgPropagation by default, to be safe. But yes, the right approach is to add the correct nonnull attributes, then enable nonnull propagation. Comment Actions Thanks :) What I would like to do as follow up is to turn FunctionAttrs to use dominators info. Comment Actions InstCombine does something weird for me. define dso_local i32 @fff6(i8* nocapture readonly %s) local_unnamed_addr #5 { %call = tail call i64 @strlen(i8* %s) #8 %conv = trunc i64 %call to i32 ret i32 %conv } I add nonnull for strlen so... -> call i64 @strlen(i8* nonnull %s) but after -instcombine we have undef here (@spatel ?) ret i32 undef } I will look more closely to visitCallSite...
Revision Contents
Diff 161212 lib/Transforms/Utils/BuildLibCalls.cpp
test/CodeGen/X86/no-plt-libcalls.ll
test/Transforms/InferFunctionAttrs/annotate.ll
test/Transforms/InstCombine/sprintf-1.ll
test/Transforms/InstCombine/strstr-1.ll
test/Transforms/InstCombine/strto-1.ll
test/Transforms/InstCombine/unlocked-stdio.ll
test/Transforms/LICM/strlen.ll
|
For sprintf, I think we can mark both 0 and 1.