[ValueTracking] Check uses of Argument if it is given to isGuaranteedNotToBeUndefOrPoison

This is a patch that allows isGuaranteedNotToBeUndefOrPoison to return more precise result
when an argument is given, by looking through its uses at the entry block (and following blocks as well, if it is checking poison only).

This is useful when there is a function call with noundef arguments at the entry block.

Reviewed By: nikic

Differential Revision: https://reviews.llvm.org/D88207
This commit is contained in:
Juneyoung Lee 2020-09-24 18:52:30 +09:00
parent 495a5e94ba
commit 1c45220028
2 changed files with 42 additions and 24 deletions

View File

@ -4871,7 +4871,7 @@ bool llvm::canCreatePoison(const Operator *Op) {
return ::canCreateUndefOrPoison(Op, /*PoisonOnly=*/true);
}
static bool programUndefinedIfUndefOrPoison(const Instruction *Inst,
static bool programUndefinedIfUndefOrPoison(const Value *V,
bool PoisonOnly);
static bool isGuaranteedNotToBeUndefOrPoison(const Value *V,
@ -4931,10 +4931,8 @@ static bool isGuaranteedNotToBeUndefOrPoison(const Value *V,
return true;
}
if (auto *I = dyn_cast<Instruction>(V)) {
if (programUndefinedIfUndefOrPoison(I, PoisonOnly))
return true;
}
if (programUndefinedIfUndefOrPoison(V, PoisonOnly))
return true;
// CxtI may be null or a cloned instruction.
if (!CtxI || !CtxI->getParent() || !DT)
@ -5161,7 +5159,7 @@ bool llvm::mustTriggerUB(const Instruction *I,
return false;
}
static bool programUndefinedIfUndefOrPoison(const Instruction *Inst,
static bool programUndefinedIfUndefOrPoison(const Value *V,
bool PoisonOnly) {
// We currently only look for uses of values within the same basic
// block, as that makes it easier to guarantee that the uses will be
@ -5170,9 +5168,20 @@ static bool programUndefinedIfUndefOrPoison(const Instruction *Inst,
// FIXME: Expand this to consider uses beyond the same basic block. To do
// this, look out for the distinction between post-dominance and strong
// post-dominance.
const BasicBlock *BB = Inst->getParent();
const BasicBlock *BB = nullptr;
BasicBlock::const_iterator Begin;
if (const auto *Inst = dyn_cast<Instruction>(V)) {
BB = Inst->getParent();
Begin = Inst->getIterator();
Begin++;
} else if (const auto *Arg = dyn_cast<Argument>(V)) {
BB = &Arg->getParent()->getEntryBlock();
Begin = BB->begin();
} else {
return false;
}
BasicBlock::const_iterator Begin = Inst->getIterator(), End = BB->end();
BasicBlock::const_iterator End = BB->end();
if (!PoisonOnly) {
// Be conservative & just check whether a value is passed to a noundef
@ -5185,7 +5194,7 @@ static bool programUndefinedIfUndefOrPoison(const Instruction *Inst,
if (const auto *CB = dyn_cast<CallBase>(&I)) {
for (unsigned i = 0; i < CB->arg_size(); ++i) {
if (CB->paramHasAttr(i, Attribute::NoUndef) &&
CB->getArgOperand(i) == Inst)
CB->getArgOperand(i) == V)
return true;
}
}
@ -5199,27 +5208,26 @@ static bool programUndefinedIfUndefOrPoison(const Instruction *Inst,
// does.
SmallSet<const Value *, 16> YieldsPoison;
SmallSet<const BasicBlock *, 4> Visited;
YieldsPoison.insert(Inst);
Visited.insert(Inst->getParent());
YieldsPoison.insert(V);
auto Propagate = [&](const User *User) {
if (propagatesPoison(cast<Operator>(User)))
YieldsPoison.insert(User);
};
for_each(V->users(), Propagate);
Visited.insert(BB);
unsigned Iter = 0;
while (Iter++ < MaxAnalysisRecursionDepth) {
for (auto &I : make_range(Begin, End)) {
if (&I != Inst) {
if (mustTriggerUB(&I, YieldsPoison))
return true;
if (!isGuaranteedToTransferExecutionToSuccessor(&I))
return false;
}
if (mustTriggerUB(&I, YieldsPoison))
return true;
if (!isGuaranteedToTransferExecutionToSuccessor(&I))
return false;
// Mark poison that propagates from I through uses of I.
if (YieldsPoison.count(&I)) {
for (const User *User : I.users()) {
const Instruction *UserI = cast<Instruction>(User);
if (propagatesPoison(cast<Operator>(UserI)))
YieldsPoison.insert(User);
}
}
if (YieldsPoison.count(&I))
for_each(I.users(), Propagate);
}
if (auto *NextBB = BB->getSingleSuccessor()) {

View File

@ -768,6 +768,16 @@ TEST_F(ValueTrackingTest, isGuaranteedNotToBePoison_exploitBranchCond) {
}
}
TEST_F(ValueTrackingTest, isGuaranteedNotToBeUndefOrPoison) {
parseAssembly("declare void @f(i32 noundef)"
"define void @test(i32 %x) {\n"
" %A = bitcast i32 %x to i32\n"
" call void @f(i32 noundef %x)\n"
" ret void\n"
"}\n");
EXPECT_EQ(isGuaranteedNotToBeUndefOrPoison(A), true);
}
TEST(ValueTracking, canCreatePoisonOrUndef) {
std::string AsmHead =
"declare i32 @g(i32)\n"