blob: a6b9fee1d8acbc5bbc6669cddb93b1f20421d744 [file] [log] [blame]
Chris Lattner2e9014c2003-09-20 05:03:31 +00001//===- TailRecursionElimination.cpp - Eliminate Tail Calls ----------------===//
Misha Brukmanb1c93172005-04-21 23:48:37 +00002//
John Criswell482202a2003-10-20 19:43:21 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattnerf3ebc3f2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Misha Brukmanb1c93172005-04-21 23:48:37 +00007//
John Criswell482202a2003-10-20 19:43:21 +00008//===----------------------------------------------------------------------===//
Chris Lattner2e9014c2003-09-20 05:03:31 +00009//
Chris Lattnera7b6f3a2003-12-08 05:34:54 +000010// This file transforms calls of the current function (self recursion) followed
11// by a return instruction with a branch to the entry of the function, creating
12// a loop. This pass also implements the following extensions to the basic
13// algorithm:
Chris Lattner2e9014c2003-09-20 05:03:31 +000014//
Chris Lattnera7b6f3a2003-12-08 05:34:54 +000015// 1. Trivial instructions between the call and return do not prevent the
16// transformation from taking place, though currently the analysis cannot
17// support moving any really useful instructions (only dead ones).
Chris Lattner198e6202003-12-08 23:19:26 +000018// 2. This pass transforms functions that are prevented from being tail
Duncan Sands82b21c02010-07-10 20:31:42 +000019// recursive by an associative and commutative expression to use an
20// accumulator variable, thus compiling the typical naive factorial or
21// 'fib' implementation into efficient code.
Chris Lattner884e8242003-12-14 23:57:39 +000022// 3. TRE is performed if the function returns void, if the return
23// returns the result returned by the call, or if the function returns a
24// run-time constant on all exits from the function. It is possible, though
25// unlikely, that the return returns something else (like constant 0), and
26// can still be TRE'd. It can be TRE'd if ALL OTHER return instructions in
27// the function return the exact same value.
Nick Lewycky50912722009-11-07 07:10:01 +000028// 4. If it can prove that callees do not access their caller stack frame,
Chris Lattnerbfc796f2005-05-09 23:51:13 +000029// they are marked as eligible for tail call elimination (by the code
30// generator).
Chris Lattner2e9014c2003-09-20 05:03:31 +000031//
Chris Lattnera7b6f3a2003-12-08 05:34:54 +000032// There are several improvements that could be made:
33//
34// 1. If the function has any alloca instructions, these instructions will be
35// moved out of the entry block of the function, causing them to be
36// evaluated each time through the tail recursion. Safely keeping allocas
37// in the entry block requires analysis to proves that the tail-called
38// function does not read or write the stack object.
Chris Lattner0ab5e2c2011-04-15 05:18:47 +000039// 2. Tail recursion is only performed if the call immediately precedes the
Chris Lattnera7b6f3a2003-12-08 05:34:54 +000040// return instruction. It's possible that there could be a jump between
41// the call and the return.
Chris Lattner884e8242003-12-14 23:57:39 +000042// 3. There can be intervening operations between the call and the return that
Chris Lattnera7b6f3a2003-12-08 05:34:54 +000043// prevent the TRE from occurring. For example, there could be GEP's and
44// stores to memory that will not be read or written by the call. This
45// requires some substantial analysis (such as with DSA) to prove safe to
46// move ahead of the call, but doing so could allow many more TREs to be
47// performed, for example in TreeAdd/TreeAlloc from the treeadd benchmark.
Chris Lattnerbfc796f2005-05-09 23:51:13 +000048// 4. The algorithm we use to detect if callees access their caller stack
49// frames is very primitive.
Chris Lattner2e9014c2003-09-20 05:03:31 +000050//
51//===----------------------------------------------------------------------===//
52
Sean Silva59fe82f2016-07-06 23:48:41 +000053#include "llvm/Transforms/Scalar/TailRecursionElimination.h"
Chris Lattner00160852003-09-20 05:14:13 +000054#include "llvm/Transforms/Scalar.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000055#include "llvm/ADT/STLExtras.h"
Michael Gottesmanb40db262013-07-11 04:40:01 +000056#include "llvm/ADT/SmallPtrSet.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000057#include "llvm/ADT/Statistic.h"
James Molloyefbba722015-09-10 10:22:12 +000058#include "llvm/Analysis/GlobalsModRef.h"
Nick Lewycky5ef6bc82014-05-05 23:59:03 +000059#include "llvm/Analysis/CFG.h"
Benjamin Kramer799003b2015-03-23 19:32:43 +000060#include "llvm/Analysis/CaptureTracking.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000061#include "llvm/Analysis/InlineCost.h"
62#include "llvm/Analysis/InstructionSimplify.h"
63#include "llvm/Analysis/Loads.h"
Chandler Carruth0ba8db42013-01-22 11:26:02 +000064#include "llvm/Analysis/TargetTransformInfo.h"
Chandler Carruth1305dc32014-03-04 11:45:46 +000065#include "llvm/IR/CFG.h"
Chandler Carruth219b89b2014-03-04 11:01:28 +000066#include "llvm/IR/CallSite.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000067#include "llvm/IR/Constants.h"
Chandler Carrutha801dd52014-10-19 08:17:50 +000068#include "llvm/IR/DataLayout.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000069#include "llvm/IR/DerivedTypes.h"
Diego Novillo7f8af8b2014-05-22 14:19:46 +000070#include "llvm/IR/DiagnosticInfo.h"
Chandler Carruth9fb823b2013-01-02 11:36:10 +000071#include "llvm/IR/Function.h"
72#include "llvm/IR/Instructions.h"
73#include "llvm/IR/IntrinsicInst.h"
74#include "llvm/IR/Module.h"
Chandler Carruth4220e9c2014-03-04 11:17:44 +000075#include "llvm/IR/ValueHandle.h"
Chris Lattner2e9014c2003-09-20 05:03:31 +000076#include "llvm/Pass.h"
Evan Chengd983eba2011-01-29 04:46:23 +000077#include "llvm/Support/Debug.h"
Francois Pichet326e4a22011-01-29 20:06:16 +000078#include "llvm/Support/raw_ostream.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000079#include "llvm/Transforms/Utils/BasicBlockUtils.h"
80#include "llvm/Transforms/Utils/Local.h"
Chris Lattner2af51722003-11-20 18:25:24 +000081using namespace llvm;
Brian Gaeke960707c2003-11-11 22:41:34 +000082
Chandler Carruth964daaa2014-04-22 02:55:47 +000083#define DEBUG_TYPE "tailcallelim"
84
Chris Lattner79a42ac2006-12-19 21:40:18 +000085STATISTIC(NumEliminated, "Number of tail calls removed");
Evan Cheng73c291782011-01-29 04:53:35 +000086STATISTIC(NumRetDuped, "Number of return duplicated");
Chris Lattner79a42ac2006-12-19 21:40:18 +000087STATISTIC(NumAccumAdded, "Number of accumulators introduced");
Chris Lattner2e9014c2003-09-20 05:03:31 +000088
Richard Smithc45f3f72014-05-08 01:08:43 +000089/// \brief Scan the specified function for alloca instructions.
90/// If it contains any dynamic allocas, returns false.
Davide Italiano87383632016-06-02 23:02:44 +000091static bool canTRE(Function &F) {
Richard Smithc45f3f72014-05-08 01:08:43 +000092 // Because of PR962, we don't TRE dynamic allocas.
93 for (auto &BB : F) {
94 for (auto &I : BB) {
95 if (AllocaInst *AI = dyn_cast<AllocaInst>(&I)) {
96 if (!AI->isStaticAlloca())
97 return false;
98 }
99 }
100 }
Michael Gottesmanb40db262013-07-11 04:40:01 +0000101
Richard Smithc45f3f72014-05-08 01:08:43 +0000102 return true;
Nick Lewycky9b669b32009-11-07 07:42:38 +0000103}
104
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000105namespace {
106struct AllocaDerivedValueTracker {
107 // Start at a root value and walk its use-def chain to mark calls that use the
108 // value or a derived value in AllocaUsers, and places where it may escape in
109 // EscapePoints.
110 void walk(Value *Root) {
111 SmallVector<Use *, 32> Worklist;
112 SmallPtrSet<Use *, 32> Visited;
113
114 auto AddUsesToWorklist = [&](Value *V) {
115 for (auto &U : V->uses()) {
David Blaikie70573dc2014-11-19 07:49:26 +0000116 if (!Visited.insert(&U).second)
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000117 continue;
118 Worklist.push_back(&U);
119 }
120 };
121
122 AddUsesToWorklist(Root);
123
124 while (!Worklist.empty()) {
125 Use *U = Worklist.pop_back_val();
126 Instruction *I = cast<Instruction>(U->getUser());
127
128 switch (I->getOpcode()) {
129 case Instruction::Call:
130 case Instruction::Invoke: {
131 CallSite CS(I);
David Majnemer63ad9e02015-12-23 09:58:43 +0000132 bool IsNocapture =
133 CS.isDataOperand(U) && CS.doesNotCapture(CS.getDataOperandNo(U));
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000134 callUsesLocalStack(CS, IsNocapture);
135 if (IsNocapture) {
136 // If the alloca-derived argument is passed in as nocapture, then it
137 // can't propagate to the call's return. That would be capturing.
138 continue;
139 }
140 break;
141 }
142 case Instruction::Load: {
143 // The result of a load is not alloca-derived (unless an alloca has
144 // otherwise escaped, but this is a local analysis).
145 continue;
146 }
147 case Instruction::Store: {
Nick Lewycky7185b5d2014-05-06 00:46:20 +0000148 if (U->getOperandNo() == 0)
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000149 EscapePoints.insert(I);
150 continue; // Stores have no users to analyze.
151 }
152 case Instruction::BitCast:
153 case Instruction::GetElementPtr:
154 case Instruction::PHI:
155 case Instruction::Select:
156 case Instruction::AddrSpaceCast:
157 break;
158 default:
159 EscapePoints.insert(I);
Nick Lewycky7185b5d2014-05-06 00:46:20 +0000160 break;
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000161 }
162
163 AddUsesToWorklist(I);
164 }
165 }
166
167 void callUsesLocalStack(CallSite CS, bool IsNocapture) {
Nick Lewyckyaba900c2014-07-23 06:24:49 +0000168 // Add it to the list of alloca users.
169 AllocaUsers.insert(CS.getInstruction());
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000170
Nick Lewyckyaba900c2014-07-23 06:24:49 +0000171 // If it's nocapture then it can't capture this alloca.
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000172 if (IsNocapture)
173 return;
174
175 // If it can write to memory, it can leak the alloca value.
176 if (!CS.onlyReadsMemory())
177 EscapePoints.insert(CS.getInstruction());
178 }
179
180 SmallPtrSet<Instruction *, 32> AllocaUsers;
181 SmallPtrSet<Instruction *, 32> EscapePoints;
182};
Alexander Kornienkof00654e2015-06-23 09:49:53 +0000183}
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000184
Davide Italiano87383632016-06-02 23:02:44 +0000185static bool markTails(Function &F, bool &AllCallsAreTailCalls) {
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000186 if (F.callsFunctionThatReturnsTwice())
187 return false;
188 AllCallsAreTailCalls = true;
189
Reid Klecknerdd3f3ed2014-11-04 02:02:14 +0000190 // The local stack holds all alloca instructions and all byval arguments.
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000191 AllocaDerivedValueTracker Tracker;
Reid Klecknerdd3f3ed2014-11-04 02:02:14 +0000192 for (Argument &Arg : F.args()) {
193 if (Arg.hasByValAttr())
194 Tracker.walk(&Arg);
195 }
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000196 for (auto &BB : F) {
197 for (auto &I : BB)
198 if (AllocaInst *AI = dyn_cast<AllocaInst>(&I))
199 Tracker.walk(AI);
200 }
201
202 bool Modified = false;
203
204 // Track whether a block is reachable after an alloca has escaped. Blocks that
205 // contain the escaping instruction will be marked as being visited without an
206 // escaped alloca, since that is how the block began.
207 enum VisitType {
208 UNVISITED,
209 UNESCAPED,
210 ESCAPED
211 };
212 DenseMap<BasicBlock *, VisitType> Visited;
213
214 // We propagate the fact that an alloca has escaped from block to successor.
215 // Visit the blocks that are propagating the escapedness first. To do this, we
216 // maintain two worklists.
217 SmallVector<BasicBlock *, 32> WorklistUnescaped, WorklistEscaped;
218
219 // We may enter a block and visit it thinking that no alloca has escaped yet,
220 // then see an escape point and go back around a loop edge and come back to
221 // the same block twice. Because of this, we defer setting tail on calls when
222 // we first encounter them in a block. Every entry in this list does not
223 // statically use an alloca via use-def chain analysis, but may find an alloca
224 // through other means if the block turns out to be reachable after an escape
225 // point.
226 SmallVector<CallInst *, 32> DeferredTails;
227
228 BasicBlock *BB = &F.getEntryBlock();
229 VisitType Escaped = UNESCAPED;
230 do {
231 for (auto &I : *BB) {
232 if (Tracker.EscapePoints.count(&I))
233 Escaped = ESCAPED;
234
235 CallInst *CI = dyn_cast<CallInst>(&I);
236 if (!CI || CI->isTailCall())
237 continue;
238
Sanjoy Dase06ef142016-11-07 21:01:49 +0000239 bool IsNoTail = CI->isNoTailCall() || CI->hasOperandBundles();
Akira Hatanaka5cfcce122015-11-06 23:55:38 +0000240
241 if (!IsNoTail && CI->doesNotAccessMemory()) {
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000242 // A call to a readnone function whose arguments are all things computed
243 // outside this function can be marked tail. Even if you stored the
244 // alloca address into a global, a readnone function can't load the
245 // global anyhow.
246 //
247 // Note that this runs whether we know an alloca has escaped or not. If
248 // it has, then we can't trust Tracker.AllocaUsers to be accurate.
249 bool SafeToTail = true;
250 for (auto &Arg : CI->arg_operands()) {
251 if (isa<Constant>(Arg.getUser()))
252 continue;
Reid Klecknerdd3f3ed2014-11-04 02:02:14 +0000253 if (Argument *A = dyn_cast<Argument>(Arg.getUser()))
254 if (!A->hasByValAttr())
255 continue;
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000256 SafeToTail = false;
257 break;
258 }
259 if (SafeToTail) {
Diego Novillo7f8af8b2014-05-22 14:19:46 +0000260 emitOptimizationRemark(
261 F.getContext(), "tailcallelim", F, CI->getDebugLoc(),
Nick Lewycky54a824b72014-05-08 23:04:46 +0000262 "marked this readnone call a tail call candidate");
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000263 CI->setTailCall();
264 Modified = true;
265 continue;
266 }
267 }
268
Akira Hatanaka5cfcce122015-11-06 23:55:38 +0000269 if (!IsNoTail && Escaped == UNESCAPED && !Tracker.AllocaUsers.count(CI)) {
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000270 DeferredTails.push_back(CI);
271 } else {
272 AllCallsAreTailCalls = false;
273 }
274 }
275
Duncan P. N. Exon Smith6c990152014-07-21 17:06:51 +0000276 for (auto *SuccBB : make_range(succ_begin(BB), succ_end(BB))) {
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000277 auto &State = Visited[SuccBB];
278 if (State < Escaped) {
279 State = Escaped;
280 if (State == ESCAPED)
281 WorklistEscaped.push_back(SuccBB);
282 else
283 WorklistUnescaped.push_back(SuccBB);
284 }
285 }
286
287 if (!WorklistEscaped.empty()) {
288 BB = WorklistEscaped.pop_back_val();
289 Escaped = ESCAPED;
290 } else {
291 BB = nullptr;
292 while (!WorklistUnescaped.empty()) {
293 auto *NextBB = WorklistUnescaped.pop_back_val();
294 if (Visited[NextBB] == UNESCAPED) {
295 BB = NextBB;
296 Escaped = UNESCAPED;
297 break;
298 }
299 }
300 }
301 } while (BB);
302
303 for (CallInst *CI : DeferredTails) {
304 if (Visited[CI->getParent()] != ESCAPED) {
305 // If the escape point was part way through the block, calls after the
306 // escape point wouldn't have been put into DeferredTails.
Diego Novillo7f8af8b2014-05-22 14:19:46 +0000307 emitOptimizationRemark(F.getContext(), "tailcallelim", F,
308 CI->getDebugLoc(),
309 "marked this call a tail call candidate");
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000310 CI->setTailCall();
311 Modified = true;
312 } else {
313 AllCallsAreTailCalls = false;
314 }
315 }
316
317 return Modified;
318}
319
Sanjay Patelb92e9162015-02-27 17:27:15 +0000320/// Return true if it is safe to move the specified
Chris Lattner198e6202003-12-08 23:19:26 +0000321/// instruction from after the call to before the call, assuming that all
322/// instructions between the call and this instruction are movable.
323///
Davide Italiano87383632016-06-02 23:02:44 +0000324static bool canMoveAboveCall(Instruction *I, CallInst *CI) {
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000325 // FIXME: We can move load/store/call/free instructions above the call if the
326 // call does not mod/ref the memory location being processed.
Chris Lattner5ca41972009-06-19 04:22:16 +0000327 if (I->mayHaveSideEffects()) // This also handles volatile loads.
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000328 return false;
Nadav Rotem465834c2012-07-24 10:51:42 +0000329
Nick Lewycky50912722009-11-07 07:10:01 +0000330 if (LoadInst *L = dyn_cast<LoadInst>(I)) {
Chris Lattner5ca41972009-06-19 04:22:16 +0000331 // Loads may always be moved above calls without side effects.
332 if (CI->mayHaveSideEffects()) {
333 // Non-volatile loads may be moved above a call with side effects if it
334 // does not write to memory and the load provably won't trap.
335 // FIXME: Writes to memory only matter if they may alias the pointer
336 // being loaded from.
Artur Pilipenko9bb6bea2016-04-27 11:00:48 +0000337 const DataLayout &DL = L->getModule()->getDataLayout();
Chris Lattner5ca41972009-06-19 04:22:16 +0000338 if (CI->mayWriteToMemory() ||
Artur Pilipenko6dd69692016-01-15 15:27:46 +0000339 !isSafeToLoadUnconditionally(L->getPointerOperand(),
Artur Pilipenko9bb6bea2016-04-27 11:00:48 +0000340 L->getAlignment(), DL, L))
Chris Lattner5ca41972009-06-19 04:22:16 +0000341 return false;
342 }
343 }
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000344
345 // Otherwise, if this is a side-effect free instruction, check to make sure
346 // that it does not use the return value of the call. If it doesn't use the
347 // return value of the call, it must only use things that are defined before
348 // the call, or movable instructions between the call and the instruction
349 // itself.
David Majnemer42531262016-08-12 03:55:06 +0000350 return !is_contained(I->operands(), CI);
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000351}
352
Sanjay Patelb92e9162015-02-27 17:27:15 +0000353/// Return true if the specified value is the same when the return would exit
354/// as it was when the initial iteration of the recursive function was executed.
355///
356/// We currently handle static constants and arguments that are not modified as
357/// part of the recursion.
Nick Lewyckyb9397262009-11-07 21:10:15 +0000358static bool isDynamicConstant(Value *V, CallInst *CI, ReturnInst *RI) {
Chris Lattner884e8242003-12-14 23:57:39 +0000359 if (isa<Constant>(V)) return true; // Static constants are always dyn consts
360
361 // Check to see if this is an immutable argument, if so, the value
362 // will be available to initialize the accumulator.
363 if (Argument *Arg = dyn_cast<Argument>(V)) {
364 // Figure out which argument number this is...
365 unsigned ArgNo = 0;
366 Function *F = CI->getParent()->getParent();
Chris Lattner531f9e92005-03-15 04:54:21 +0000367 for (Function::arg_iterator AI = F->arg_begin(); &*AI != Arg; ++AI)
Chris Lattner884e8242003-12-14 23:57:39 +0000368 ++ArgNo;
Misha Brukmanb1c93172005-04-21 23:48:37 +0000369
Chris Lattner884e8242003-12-14 23:57:39 +0000370 // If we are passing this argument into call as the corresponding
371 // argument operand, then the argument is dynamically constant.
372 // Otherwise, we cannot transform this function safely.
Gabor Greif4a39b842010-06-24 00:44:01 +0000373 if (CI->getArgOperand(ArgNo) == Arg)
Chris Lattner884e8242003-12-14 23:57:39 +0000374 return true;
375 }
Nick Lewyckyb9397262009-11-07 21:10:15 +0000376
377 // Switch cases are always constant integers. If the value is being switched
378 // on and the return is only reachable from one of its cases, it's
379 // effectively constant.
380 if (BasicBlock *UniquePred = RI->getParent()->getUniquePredecessor())
381 if (SwitchInst *SI = dyn_cast<SwitchInst>(UniquePred->getTerminator()))
382 if (SI->getCondition() == V)
383 return SI->getDefaultDest() != RI->getParent();
384
Chris Lattner884e8242003-12-14 23:57:39 +0000385 // Not a constant or immutable argument, we can't safely transform.
386 return false;
387}
388
Sanjay Patelb92e9162015-02-27 17:27:15 +0000389/// Check to see if the function containing the specified tail call consistently
390/// returns the same runtime-constant value at all exit points except for
391/// IgnoreRI. If so, return the returned value.
Duncan Sands3a5cb692010-06-26 12:53:31 +0000392static Value *getCommonReturnValue(ReturnInst *IgnoreRI, CallInst *CI) {
393 Function *F = CI->getParent()->getParent();
Craig Topperf40110f2014-04-25 05:29:35 +0000394 Value *ReturnedValue = nullptr;
Chris Lattner884e8242003-12-14 23:57:39 +0000395
Benjamin Kramer135f7352016-06-26 12:28:59 +0000396 for (BasicBlock &BBI : *F) {
397 ReturnInst *RI = dyn_cast<ReturnInst>(BBI.getTerminator());
Craig Topperf40110f2014-04-25 05:29:35 +0000398 if (RI == nullptr || RI == IgnoreRI) continue;
Chris Lattner884e8242003-12-14 23:57:39 +0000399
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000400 // We can only perform this transformation if the value returned is
401 // evaluatable at the start of the initial invocation of the function,
402 // instead of at the end of the evaluation.
403 //
404 Value *RetOp = RI->getOperand(0);
405 if (!isDynamicConstant(RetOp, CI, RI))
Craig Topperf40110f2014-04-25 05:29:35 +0000406 return nullptr;
Chris Lattner884e8242003-12-14 23:57:39 +0000407
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000408 if (ReturnedValue && RetOp != ReturnedValue)
Craig Topperf40110f2014-04-25 05:29:35 +0000409 return nullptr; // Cannot transform if differing values are returned.
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000410 ReturnedValue = RetOp;
411 }
Chris Lattner884e8242003-12-14 23:57:39 +0000412 return ReturnedValue;
413}
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000414
Sanjay Patelb92e9162015-02-27 17:27:15 +0000415/// If the specified instruction can be transformed using accumulator recursion
416/// elimination, return the constant which is the start of the accumulator
417/// value. Otherwise return null.
Davide Italiano87383632016-06-02 23:02:44 +0000418static Value *canTransformAccumulatorRecursion(Instruction *I, CallInst *CI) {
Craig Topperf40110f2014-04-25 05:29:35 +0000419 if (!I->isAssociative() || !I->isCommutative()) return nullptr;
Chris Lattner198e6202003-12-08 23:19:26 +0000420 assert(I->getNumOperands() == 2 &&
Duncan Sands82b21c02010-07-10 20:31:42 +0000421 "Associative/commutative operations should have 2 args!");
Chris Lattner198e6202003-12-08 23:19:26 +0000422
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000423 // Exactly one operand should be the result of the call instruction.
Anton Korobeynikov1bfd1212008-02-20 11:26:25 +0000424 if ((I->getOperand(0) == CI && I->getOperand(1) == CI) ||
425 (I->getOperand(0) != CI && I->getOperand(1) != CI))
Craig Topperf40110f2014-04-25 05:29:35 +0000426 return nullptr;
Chris Lattner198e6202003-12-08 23:19:26 +0000427
428 // The only user of this instruction we allow is a single return instruction.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000429 if (!I->hasOneUse() || !isa<ReturnInst>(I->user_back()))
Craig Topperf40110f2014-04-25 05:29:35 +0000430 return nullptr;
Chris Lattner198e6202003-12-08 23:19:26 +0000431
432 // Ok, now we have to check all of the other return instructions in this
433 // function. If they return non-constants or differing values, then we cannot
434 // transform the function safely.
Chandler Carruthcdf47882014-03-09 03:16:01 +0000435 return getCommonReturnValue(cast<ReturnInst>(I->user_back()), CI);
Chris Lattner198e6202003-12-08 23:19:26 +0000436}
437
Davide Italiano87383632016-06-02 23:02:44 +0000438static Instruction *firstNonDbg(BasicBlock::iterator I) {
Evan Chengd983eba2011-01-29 04:46:23 +0000439 while (isa<DbgInfoIntrinsic>(I))
440 ++I;
441 return &*I;
442}
443
Davide Italiano87383632016-06-02 23:02:44 +0000444static CallInst *findTRECandidate(Instruction *TI,
445 bool CannotTailCallElimCallsMarkedTail,
446 const TargetTransformInfo *TTI) {
Evan Chengd983eba2011-01-29 04:46:23 +0000447 BasicBlock *BB = TI->getParent();
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000448 Function *F = BB->getParent();
449
Evan Chengd983eba2011-01-29 04:46:23 +0000450 if (&BB->front() == TI) // Make sure there is something before the terminator.
Craig Topperf40110f2014-04-25 05:29:35 +0000451 return nullptr;
Nadav Rotem465834c2012-07-24 10:51:42 +0000452
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000453 // Scan backwards from the return, checking to see if there is a tail call in
454 // this block. If so, set CI to it.
Craig Topperf40110f2014-04-25 05:29:35 +0000455 CallInst *CI = nullptr;
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000456 BasicBlock::iterator BBI(TI);
Evan Chengd983eba2011-01-29 04:46:23 +0000457 while (true) {
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000458 CI = dyn_cast<CallInst>(BBI);
459 if (CI && CI->getCalledFunction() == F)
460 break;
461
462 if (BBI == BB->begin())
Craig Topperf40110f2014-04-25 05:29:35 +0000463 return nullptr; // Didn't find a potential tail call.
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000464 --BBI;
465 }
466
Chris Lattnerf4dd8c42005-08-07 04:27:41 +0000467 // If this call is marked as a tail call, and if there are dynamic allocas in
468 // the function, we cannot perform this optimization.
469 if (CI->isTailCall() && CannotTailCallElimCallsMarkedTail)
Craig Topperf40110f2014-04-25 05:29:35 +0000470 return nullptr;
Chris Lattnerf4dd8c42005-08-07 04:27:41 +0000471
Dan Gohman99e53272010-04-16 15:57:50 +0000472 // As a special case, detect code like this:
473 // double fabs(double f) { return __builtin_fabs(f); } // a 'fabs' call
474 // and disable this xform in this case, because the code generator will
475 // lower the call to fabs into inline code.
Nadav Rotem465834c2012-07-24 10:51:42 +0000476 if (BB == &F->getEntryBlock() &&
Davide Italiano87383632016-06-02 23:02:44 +0000477 firstNonDbg(BB->front().getIterator()) == CI &&
478 firstNonDbg(std::next(BB->begin())) == TI && CI->getCalledFunction() &&
Chandler Carruth0ba8db42013-01-22 11:26:02 +0000479 !TTI->isLoweredToCall(CI->getCalledFunction())) {
Dan Gohman99e53272010-04-16 15:57:50 +0000480 // A single-block function with just a call and a return. Check that
481 // the arguments match.
482 CallSite::arg_iterator I = CallSite(CI).arg_begin(),
483 E = CallSite(CI).arg_end();
484 Function::arg_iterator FI = F->arg_begin(),
485 FE = F->arg_end();
486 for (; I != E && FI != FE; ++I, ++FI)
487 if (*I != &*FI) break;
488 if (I == E && FI == FE)
Craig Topperf40110f2014-04-25 05:29:35 +0000489 return nullptr;
Dan Gohman99e53272010-04-16 15:57:50 +0000490 }
491
Evan Chengd983eba2011-01-29 04:46:23 +0000492 return CI;
493}
494
Davide Italiano87383632016-06-02 23:02:44 +0000495static bool eliminateRecursiveTailCall(CallInst *CI, ReturnInst *Ret,
Evan Chengd983eba2011-01-29 04:46:23 +0000496 BasicBlock *&OldEntry,
497 bool &TailCallsAreMarkedTail,
Craig Topperb94011f2013-07-14 04:42:23 +0000498 SmallVectorImpl<PHINode *> &ArgumentPHIs,
Evan Chengd983eba2011-01-29 04:46:23 +0000499 bool CannotTailCallElimCallsMarkedTail) {
Duncan Sands82b21c02010-07-10 20:31:42 +0000500 // If we are introducing accumulator recursion to eliminate operations after
501 // the call instruction that are both associative and commutative, the initial
502 // value for the accumulator is placed in this variable. If this value is set
503 // then we actually perform accumulator recursion elimination instead of
Duncan Sandsf88a2842010-07-13 15:41:41 +0000504 // simple tail recursion elimination. If the operation is an LLVM instruction
505 // (eg: "add") then it is recorded in AccumulatorRecursionInstr. If not, then
506 // we are handling the case when the return instruction returns a constant C
507 // which is different to the constant returned by other return instructions
508 // (which is recorded in AccumulatorRecursionEliminationInitVal). This is a
509 // special case of accumulator recursion, the operation being "return C".
Craig Topperf40110f2014-04-25 05:29:35 +0000510 Value *AccumulatorRecursionEliminationInitVal = nullptr;
511 Instruction *AccumulatorRecursionInstr = nullptr;
Chris Lattner198e6202003-12-08 23:19:26 +0000512
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000513 // Ok, we found a potential tail call. We can currently only transform the
514 // tail call if all of the instructions between the call and the return are
515 // movable to above the call itself, leaving the call next to the return.
516 // Check that this is the case now.
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000517 BasicBlock::iterator BBI(CI);
Evan Chengd983eba2011-01-29 04:46:23 +0000518 for (++BBI; &*BBI != Ret; ++BBI) {
Davide Italiano87383632016-06-02 23:02:44 +0000519 if (canMoveAboveCall(&*BBI, CI)) continue;
Nadav Rotem465834c2012-07-24 10:51:42 +0000520
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000521 // If we can't move the instruction above the call, it might be because it
Chris Lattner0ab5e2c2011-04-15 05:18:47 +0000522 // is an associative and commutative operation that could be transformed
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000523 // using accumulator recursion elimination. Check to see if this is the
524 // case, and if so, remember the initial accumulator value for later.
525 if ((AccumulatorRecursionEliminationInitVal =
Davide Italiano87383632016-06-02 23:02:44 +0000526 canTransformAccumulatorRecursion(&*BBI, CI))) {
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000527 // Yes, this is accumulator recursion. Remember which instruction
528 // accumulates.
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000529 AccumulatorRecursionInstr = &*BBI;
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000530 } else {
531 return false; // Otherwise, we cannot eliminate the tail recursion!
Chris Lattner198e6202003-12-08 23:19:26 +0000532 }
Chris Lattnerdaca6f32010-08-31 21:21:25 +0000533 }
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000534
535 // We can only transform call/return pairs that either ignore the return value
Chris Lattner884e8242003-12-14 23:57:39 +0000536 // of the call and return void, ignore the value of the call and return a
537 // constant, return the value returned by the tail call, or that are being
538 // accumulator recursion variable eliminated.
Devang Patel5663fe62008-03-11 17:33:32 +0000539 if (Ret->getNumOperands() == 1 && Ret->getReturnValue() != CI &&
Chris Lattner16b29e92005-11-05 08:21:11 +0000540 !isa<UndefValue>(Ret->getReturnValue()) &&
Craig Topperf40110f2014-04-25 05:29:35 +0000541 AccumulatorRecursionEliminationInitVal == nullptr &&
542 !getCommonReturnValue(nullptr, CI)) {
Duncan Sandsf88a2842010-07-13 15:41:41 +0000543 // One case remains that we are able to handle: the current return
544 // instruction returns a constant, and all other return instructions
545 // return a different constant.
546 if (!isDynamicConstant(Ret->getReturnValue(), CI, Ret))
547 return false; // Current return instruction does not return a constant.
548 // Check that all other return instructions return a common constant. If
549 // so, record it in AccumulatorRecursionEliminationInitVal.
550 AccumulatorRecursionEliminationInitVal = getCommonReturnValue(Ret, CI);
551 if (!AccumulatorRecursionEliminationInitVal)
552 return false;
553 }
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000554
Evan Chengd983eba2011-01-29 04:46:23 +0000555 BasicBlock *BB = Ret->getParent();
556 Function *F = BB->getParent();
557
Diego Novillo7f8af8b2014-05-22 14:19:46 +0000558 emitOptimizationRemark(F->getContext(), "tailcallelim", *F, CI->getDebugLoc(),
559 "transforming tail recursion to loop");
Nick Lewycky5ef6bc82014-05-05 23:59:03 +0000560
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000561 // OK! We can transform this tail call. If this is the first one found,
562 // create the new entry block, allowing us to branch back to the old entry.
Craig Topperf40110f2014-04-25 05:29:35 +0000563 if (!OldEntry) {
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000564 OldEntry = &F->getEntryBlock();
Owen Anderson55f1c092009-08-13 21:58:54 +0000565 BasicBlock *NewEntry = BasicBlock::Create(F->getContext(), "", F, OldEntry);
Chris Lattner6e0123b2007-02-11 01:23:03 +0000566 NewEntry->takeName(OldEntry);
567 OldEntry->setName("tailrecurse");
Gabor Greife9ecc682008-04-06 20:25:17 +0000568 BranchInst::Create(OldEntry, NewEntry);
Misha Brukmanb1c93172005-04-21 23:48:37 +0000569
Chris Lattnerf4dd8c42005-08-07 04:27:41 +0000570 // If this tail call is marked 'tail' and if there are any allocas in the
571 // entry block, move them up to the new entry block.
572 TailCallsAreMarkedTail = CI->isTailCall();
573 if (TailCallsAreMarkedTail)
574 // Move all fixed sized allocas from OldEntry to NewEntry.
575 for (BasicBlock::iterator OEBI = OldEntry->begin(), E = OldEntry->end(),
576 NEBI = NewEntry->begin(); OEBI != E; )
577 if (AllocaInst *AI = dyn_cast<AllocaInst>(OEBI++))
578 if (isa<ConstantInt>(AI->getArraySize()))
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000579 AI->moveBefore(&*NEBI);
Chris Lattnerf4dd8c42005-08-07 04:27:41 +0000580
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000581 // Now that we have created a new block, which jumps to the entry
582 // block, insert a PHI node for each argument of the function.
583 // For now, we initialize each PHI to only have the real arguments
584 // which are passed in.
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000585 Instruction *InsertPos = &OldEntry->front();
Chris Lattnerbfc796f2005-05-09 23:51:13 +0000586 for (Function::arg_iterator I = F->arg_begin(), E = F->arg_end();
587 I != E; ++I) {
Jay Foad52131342011-03-30 11:28:46 +0000588 PHINode *PN = PHINode::Create(I->getType(), 2,
Gabor Greif697e94c2008-05-15 10:04:30 +0000589 I->getName() + ".tr", InsertPos);
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000590 I->replaceAllUsesWith(PN); // Everyone use the PHI node now!
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000591 PN->addIncoming(&*I, NewEntry);
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000592 ArgumentPHIs.push_back(PN);
593 }
594 }
Misha Brukmanb1c93172005-04-21 23:48:37 +0000595
Chris Lattnerf4dd8c42005-08-07 04:27:41 +0000596 // If this function has self recursive calls in the tail position where some
597 // are marked tail and some are not, only transform one flavor or another. We
598 // have to choose whether we move allocas in the entry block to the new entry
599 // block or not, so we can't make a good choice for both. NOTE: We could do
600 // slightly better here in the case that the function has no entry block
601 // allocas.
602 if (TailCallsAreMarkedTail && !CI->isTailCall())
603 return false;
604
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000605 // Ok, now that we know we have a pseudo-entry block WITH all of the
606 // required PHI nodes, add entries into the PHI node for the actual
607 // parameters passed into the tail-recursive call.
Gabor Greif0f607092010-06-24 00:48:48 +0000608 for (unsigned i = 0, e = CI->getNumArgOperands(); i != e; ++i)
Gabor Greif4a39b842010-06-24 00:44:01 +0000609 ArgumentPHIs[i]->addIncoming(CI->getArgOperand(i), BB);
Misha Brukmanb1c93172005-04-21 23:48:37 +0000610
Chris Lattner198e6202003-12-08 23:19:26 +0000611 // If we are introducing an accumulator variable to eliminate the recursion,
612 // do so now. Note that we _know_ that no subsequent tail recursion
613 // eliminations will happen on this function because of the way the
614 // accumulator recursion predicate is set up.
615 //
616 if (AccumulatorRecursionEliminationInitVal) {
617 Instruction *AccRecInstr = AccumulatorRecursionInstr;
618 // Start by inserting a new PHI node for the accumulator.
Jay Foade0938d82011-03-30 11:19:20 +0000619 pred_iterator PB = pred_begin(OldEntry), PE = pred_end(OldEntry);
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000620 PHINode *AccPN = PHINode::Create(
621 AccumulatorRecursionEliminationInitVal->getType(),
622 std::distance(PB, PE) + 1, "accumulator.tr", &OldEntry->front());
Chris Lattner198e6202003-12-08 23:19:26 +0000623
624 // Loop over all of the predecessors of the tail recursion block. For the
625 // real entry into the function we seed the PHI with the initial value,
626 // computed earlier. For any other existing branches to this block (due to
627 // other tail recursions eliminated) the accumulator is not modified.
628 // Because we haven't added the branch in the current block to OldEntry yet,
629 // it will not show up as a predecessor.
Jay Foade0938d82011-03-30 11:19:20 +0000630 for (pred_iterator PI = PB; PI != PE; ++PI) {
Gabor Greif2a464d72010-07-12 10:36:48 +0000631 BasicBlock *P = *PI;
632 if (P == &F->getEntryBlock())
633 AccPN->addIncoming(AccumulatorRecursionEliminationInitVal, P);
Chris Lattner198e6202003-12-08 23:19:26 +0000634 else
Gabor Greif2a464d72010-07-12 10:36:48 +0000635 AccPN->addIncoming(AccPN, P);
Chris Lattner198e6202003-12-08 23:19:26 +0000636 }
637
Duncan Sandsf88a2842010-07-13 15:41:41 +0000638 if (AccRecInstr) {
639 // Add an incoming argument for the current block, which is computed by
640 // our associative and commutative accumulator instruction.
641 AccPN->addIncoming(AccRecInstr, BB);
Chris Lattner198e6202003-12-08 23:19:26 +0000642
Duncan Sandsf88a2842010-07-13 15:41:41 +0000643 // Next, rewrite the accumulator recursion instruction so that it does not
644 // use the result of the call anymore, instead, use the PHI node we just
645 // inserted.
646 AccRecInstr->setOperand(AccRecInstr->getOperand(0) != CI, AccPN);
647 } else {
648 // Add an incoming argument for the current block, which is just the
649 // constant returned by the current return instruction.
650 AccPN->addIncoming(Ret->getReturnValue(), BB);
651 }
Chris Lattner198e6202003-12-08 23:19:26 +0000652
653 // Finally, rewrite any return instructions in the program to return the PHI
654 // node instead of the "initval" that they do currently. This loop will
655 // actually rewrite the return value we are destroying, but that's ok.
Benjamin Kramer135f7352016-06-26 12:28:59 +0000656 for (BasicBlock &BBI : *F)
657 if (ReturnInst *RI = dyn_cast<ReturnInst>(BBI.getTerminator()))
Chris Lattner198e6202003-12-08 23:19:26 +0000658 RI->setOperand(0, AccPN);
659 ++NumAccumAdded;
660 }
661
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000662 // Now that all of the PHI nodes are in place, remove the call and
663 // ret instructions, replacing them with an unconditional branch.
Devang Patel33d87d92011-04-28 18:43:39 +0000664 BranchInst *NewBI = BranchInst::Create(OldEntry, Ret);
665 NewBI->setDebugLoc(CI->getDebugLoc());
666
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000667 BB->getInstList().erase(Ret); // Remove return.
668 BB->getInstList().erase(CI); // Remove call.
Chris Lattner198e6202003-12-08 23:19:26 +0000669 ++NumEliminated;
Chris Lattnera7b6f3a2003-12-08 05:34:54 +0000670 return true;
671}
Evan Chengd983eba2011-01-29 04:46:23 +0000672
Davide Italiano87383632016-06-02 23:02:44 +0000673static bool foldReturnAndProcessPred(BasicBlock *BB, ReturnInst *Ret,
674 BasicBlock *&OldEntry,
675 bool &TailCallsAreMarkedTail,
676 SmallVectorImpl<PHINode *> &ArgumentPHIs,
677 bool CannotTailCallElimCallsMarkedTail,
678 const TargetTransformInfo *TTI) {
Evan Chengd983eba2011-01-29 04:46:23 +0000679 bool Change = false;
680
681 // If the return block contains nothing but the return and PHI's,
682 // there might be an opportunity to duplicate the return in its
683 // predecessors and perform TRC there. Look for predecessors that end
684 // in unconditional branch and recursive call(s).
685 SmallVector<BranchInst*, 8> UncondBranchPreds;
Duncan P. N. Exon Smith6c990152014-07-21 17:06:51 +0000686 for (pred_iterator PI = pred_begin(BB), E = pred_end(BB); PI != E; ++PI) {
687 BasicBlock *Pred = *PI;
Evan Chengd983eba2011-01-29 04:46:23 +0000688 TerminatorInst *PTI = Pred->getTerminator();
689 if (BranchInst *BI = dyn_cast<BranchInst>(PTI))
690 if (BI->isUnconditional())
691 UncondBranchPreds.push_back(BI);
692 }
693
694 while (!UncondBranchPreds.empty()) {
695 BranchInst *BI = UncondBranchPreds.pop_back_val();
696 BasicBlock *Pred = BI->getParent();
Davide Italiano87383632016-06-02 23:02:44 +0000697 if (CallInst *CI = findTRECandidate(BI, CannotTailCallElimCallsMarkedTail, TTI)){
Evan Chengd983eba2011-01-29 04:46:23 +0000698 DEBUG(dbgs() << "FOLDING: " << *BB
699 << "INTO UNCOND BRANCH PRED: " << *Pred);
Arnaud A. de Grandmaison7b9dc282014-11-19 13:32:51 +0000700 ReturnInst *RI = FoldReturnIntoUncondBranch(Ret, BB, Pred);
701
702 // Cleanup: if all predecessors of BB have been eliminated by
Benjamin Kramercb570f12015-02-28 16:47:27 +0000703 // FoldReturnIntoUncondBranch, delete it. It is important to empty it,
704 // because the ret instruction in there is still using a value which
Davide Italiano87383632016-06-02 23:02:44 +0000705 // eliminateRecursiveTailCall will attempt to remove.
Arnaud A. de Grandmaison7b9dc282014-11-19 13:32:51 +0000706 if (!BB->hasAddressTaken() && pred_begin(BB) == pred_end(BB))
Benjamin Kramercb570f12015-02-28 16:47:27 +0000707 BB->eraseFromParent();
Arnaud A. de Grandmaison7b9dc282014-11-19 13:32:51 +0000708
Davide Italiano87383632016-06-02 23:02:44 +0000709 eliminateRecursiveTailCall(CI, RI, OldEntry, TailCallsAreMarkedTail,
Arnaud A. de Grandmaison7b9dc282014-11-19 13:32:51 +0000710 ArgumentPHIs,
Evan Chengd983eba2011-01-29 04:46:23 +0000711 CannotTailCallElimCallsMarkedTail);
Evan Cheng73c291782011-01-29 04:53:35 +0000712 ++NumRetDuped;
Evan Chengd983eba2011-01-29 04:46:23 +0000713 Change = true;
714 }
715 }
716
717 return Change;
718}
719
Davide Italiano87383632016-06-02 23:02:44 +0000720static bool processReturningBlock(ReturnInst *Ret, BasicBlock *&OldEntry,
721 bool &TailCallsAreMarkedTail,
722 SmallVectorImpl<PHINode *> &ArgumentPHIs,
723 bool CannotTailCallElimCallsMarkedTail,
724 const TargetTransformInfo *TTI) {
725 CallInst *CI = findTRECandidate(Ret, CannotTailCallElimCallsMarkedTail, TTI);
Evan Chengd983eba2011-01-29 04:46:23 +0000726 if (!CI)
727 return false;
728
Davide Italiano87383632016-06-02 23:02:44 +0000729 return eliminateRecursiveTailCall(CI, Ret, OldEntry, TailCallsAreMarkedTail,
Evan Chengd983eba2011-01-29 04:46:23 +0000730 ArgumentPHIs,
731 CannotTailCallElimCallsMarkedTail);
732}
Davide Italiano87383632016-06-02 23:02:44 +0000733
734static bool eliminateTailRecursion(Function &F, const TargetTransformInfo *TTI) {
Sean Silva59fe82f2016-07-06 23:48:41 +0000735 if (F.getFnAttribute("disable-tail-calls").getValueAsString() == "true")
736 return false;
737
Davide Italiano87383632016-06-02 23:02:44 +0000738 bool MadeChange = false;
739 bool AllCallsAreTailCalls = false;
740 MadeChange |= markTails(F, AllCallsAreTailCalls);
741 if (!AllCallsAreTailCalls)
742 return MadeChange;
743
744 // If this function is a varargs function, we won't be able to PHI the args
745 // right, so don't even try to convert it...
746 if (F.getFunctionType()->isVarArg())
747 return false;
748
749 BasicBlock *OldEntry = nullptr;
750 bool TailCallsAreMarkedTail = false;
751 SmallVector<PHINode*, 8> ArgumentPHIs;
752
753 // If false, we cannot perform TRE on tail calls marked with the 'tail'
754 // attribute, because doing so would cause the stack size to increase (real
755 // TRE would deallocate variable sized allocas, TRE doesn't).
756 bool CanTRETailMarkedCall = canTRE(F);
757
758 // Change any tail recursive calls to loops.
759 //
760 // FIXME: The code generator produces really bad code when an 'escaping
761 // alloca' is changed from being a static alloca to being a dynamic alloca.
762 // Until this is resolved, disable this transformation if that would ever
763 // happen. This bug is PR962.
764 for (Function::iterator BBI = F.begin(), E = F.end(); BBI != E; /*in loop*/) {
765 BasicBlock *BB = &*BBI++; // foldReturnAndProcessPred may delete BB.
766 if (ReturnInst *Ret = dyn_cast<ReturnInst>(BB->getTerminator())) {
767 bool Change =
768 processReturningBlock(Ret, OldEntry, TailCallsAreMarkedTail,
769 ArgumentPHIs, !CanTRETailMarkedCall, TTI);
770 if (!Change && BB->getFirstNonPHIOrDbg() == Ret)
771 Change =
772 foldReturnAndProcessPred(BB, Ret, OldEntry, TailCallsAreMarkedTail,
773 ArgumentPHIs, !CanTRETailMarkedCall, TTI);
774 MadeChange |= Change;
775 }
776 }
777
778 // If we eliminated any tail recursions, it's possible that we inserted some
779 // silly PHI nodes which just merge an initial value (the incoming operand)
780 // with themselves. Check to see if we did and clean up our mess if so. This
781 // occurs when a function passes an argument straight through to its tail
782 // call.
783 for (PHINode *PN : ArgumentPHIs) {
784 // If the PHI Node is a dynamic constant, replace it with the value it is.
785 if (Value *PNV = SimplifyInstruction(PN, F.getParent()->getDataLayout())) {
786 PN->replaceAllUsesWith(PNV);
787 PN->eraseFromParent();
788 }
789 }
790
791 return MadeChange;
792}
793
794namespace {
795struct TailCallElim : public FunctionPass {
796 static char ID; // Pass identification, replacement for typeid
797 TailCallElim() : FunctionPass(ID) {
798 initializeTailCallElimPass(*PassRegistry::getPassRegistry());
799 }
800
801 void getAnalysisUsage(AnalysisUsage &AU) const override {
802 AU.addRequired<TargetTransformInfoWrapperPass>();
803 AU.addPreserved<GlobalsAAWrapperPass>();
804 }
805
806 bool runOnFunction(Function &F) override {
Sean Silva59fe82f2016-07-06 23:48:41 +0000807 if (skipFunction(F))
Davide Italiano87383632016-06-02 23:02:44 +0000808 return false;
809
810 return eliminateTailRecursion(
811 F, &getAnalysis<TargetTransformInfoWrapperPass>().getTTI(F));
812 }
813};
814}
815
816char TailCallElim::ID = 0;
817INITIALIZE_PASS_BEGIN(TailCallElim, "tailcallelim", "Tail Call Elimination",
818 false, false)
819INITIALIZE_PASS_DEPENDENCY(TargetTransformInfoWrapperPass)
820INITIALIZE_PASS_END(TailCallElim, "tailcallelim", "Tail Call Elimination",
821 false, false)
822
823// Public interface to the TailCallElimination pass
824FunctionPass *llvm::createTailCallEliminationPass() {
825 return new TailCallElim();
826}
Sean Silva59fe82f2016-07-06 23:48:41 +0000827
828PreservedAnalyses TailCallElimPass::run(Function &F,
829 FunctionAnalysisManager &AM) {
830
831 TargetTransformInfo &TTI = AM.getResult<TargetIRAnalysis>(F);
832
833 bool Changed = eliminateTailRecursion(F, &TTI);
834
835 if (!Changed)
836 return PreservedAnalyses::all();
837 PreservedAnalyses PA;
838 PA.preserve<GlobalsAA>();
839 return PA;
840}