Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 1 | //===- GuardWidening.cpp - ---- Guard widening ----------------------------===// |
| 2 | // |
Chandler Carruth | 2946cd7 | 2019-01-19 08:50:56 +0000 | [diff] [blame] | 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This file implements the guard widening pass. The semantics of the |
| 10 | // @llvm.experimental.guard intrinsic lets LLVM transform it so that it fails |
| 11 | // more often that it did before the transform. This optimization is called |
| 12 | // "widening" and can be used hoist and common runtime checks in situations like |
| 13 | // these: |
| 14 | // |
| 15 | // %cmp0 = 7 u< Length |
| 16 | // call @llvm.experimental.guard(i1 %cmp0) [ "deopt"(...) ] |
| 17 | // call @unknown_side_effects() |
| 18 | // %cmp1 = 9 u< Length |
| 19 | // call @llvm.experimental.guard(i1 %cmp1) [ "deopt"(...) ] |
| 20 | // ... |
| 21 | // |
| 22 | // => |
| 23 | // |
| 24 | // %cmp0 = 9 u< Length |
| 25 | // call @llvm.experimental.guard(i1 %cmp0) [ "deopt"(...) ] |
| 26 | // call @unknown_side_effects() |
| 27 | // ... |
| 28 | // |
| 29 | // If %cmp0 is false, @llvm.experimental.guard will "deoptimize" back to a |
| 30 | // generic implementation of the same function, which will have the correct |
| 31 | // semantics from that point onward. It is always _legal_ to deoptimize (so |
| 32 | // replacing %cmp0 with false is "correct"), though it may not always be |
| 33 | // profitable to do so. |
| 34 | // |
| 35 | // NB! This pass is a work in progress. It hasn't been tuned to be "production |
| 36 | // ready" yet. It is known to have quadriatic running time and will not scale |
| 37 | // to large numbers of guards |
| 38 | // |
| 39 | //===----------------------------------------------------------------------===// |
| 40 | |
| 41 | #include "llvm/Transforms/Scalar/GuardWidening.h" |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 42 | #include <functional> |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 43 | #include "llvm/ADT/DenseMap.h" |
| 44 | #include "llvm/ADT/DepthFirstIterator.h" |
Max Kazantsev | eb8e9c0 | 2018-07-31 04:37:11 +0000 | [diff] [blame] | 45 | #include "llvm/ADT/Statistic.h" |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 46 | #include "llvm/Analysis/BranchProbabilityInfo.h" |
Max Kazantsev | 3c284bd | 2018-08-30 03:39:16 +0000 | [diff] [blame] | 47 | #include "llvm/Analysis/GuardUtils.h" |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 48 | #include "llvm/Analysis/LoopInfo.h" |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 49 | #include "llvm/Analysis/LoopPass.h" |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 50 | #include "llvm/Analysis/PostDominators.h" |
| 51 | #include "llvm/Analysis/ValueTracking.h" |
Peter Collingbourne | ecdd58f | 2016-10-21 19:59:26 +0000 | [diff] [blame] | 52 | #include "llvm/IR/ConstantRange.h" |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 53 | #include "llvm/IR/Dominators.h" |
| 54 | #include "llvm/IR/IntrinsicInst.h" |
| 55 | #include "llvm/IR/PatternMatch.h" |
Chandler Carruth | 6bda14b | 2017-06-06 11:49:48 +0000 | [diff] [blame] | 56 | #include "llvm/Pass.h" |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 57 | #include "llvm/Support/Debug.h" |
Craig Topper | b45eabc | 2017-04-26 16:39:58 +0000 | [diff] [blame] | 58 | #include "llvm/Support/KnownBits.h" |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 59 | #include "llvm/Transforms/Scalar.h" |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 60 | #include "llvm/Transforms/Utils/LoopUtils.h" |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 61 | |
| 62 | using namespace llvm; |
| 63 | |
| 64 | #define DEBUG_TYPE "guard-widening" |
| 65 | |
Max Kazantsev | eb8e9c0 | 2018-07-31 04:37:11 +0000 | [diff] [blame] | 66 | STATISTIC(GuardsEliminated, "Number of eliminated guards"); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 67 | STATISTIC(CondBranchEliminated, "Number of eliminated conditional branches"); |
| 68 | |
| 69 | static cl::opt<bool> WidenFrequentBranches( |
| 70 | "guard-widening-widen-frequent-branches", cl::Hidden, |
| 71 | cl::desc("Widen conditions of explicit branches into dominating guards in " |
| 72 | "case if their taken frequency exceeds threshold set by " |
| 73 | "guard-widening-frequent-branch-threshold option"), |
| 74 | cl::init(false)); |
| 75 | |
| 76 | static cl::opt<unsigned> FrequentBranchThreshold( |
| 77 | "guard-widening-frequent-branch-threshold", cl::Hidden, |
| 78 | cl::desc("When WidenFrequentBranches is set to true, this option is used " |
| 79 | "to determine which branches are frequently taken. The criteria " |
| 80 | "that a branch is taken more often than " |
| 81 | "((FrequentBranchThreshold - 1) / FrequentBranchThreshold), then " |
| 82 | "it is considered frequently taken"), |
| 83 | cl::init(1000)); |
| 84 | |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 85 | static cl::opt<bool> |
| 86 | WidenBranchGuards("guard-widening-widen-branch-guards", cl::Hidden, |
| 87 | cl::desc("Whether or not we should widen guards " |
| 88 | "expressed as branches by widenable conditions"), |
| 89 | cl::init(true)); |
Max Kazantsev | eb8e9c0 | 2018-07-31 04:37:11 +0000 | [diff] [blame] | 90 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 91 | namespace { |
| 92 | |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 93 | // Get the condition of \p I. It can either be a guard or a conditional branch. |
| 94 | static Value *getCondition(Instruction *I) { |
| 95 | if (IntrinsicInst *GI = dyn_cast<IntrinsicInst>(I)) { |
| 96 | assert(GI->getIntrinsicID() == Intrinsic::experimental_guard && |
| 97 | "Bad guard intrinsic?"); |
| 98 | return GI->getArgOperand(0); |
| 99 | } |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 100 | if (isGuardAsWidenableBranch(I)) { |
| 101 | auto *Cond = cast<BranchInst>(I)->getCondition(); |
| 102 | return cast<BinaryOperator>(Cond)->getOperand(0); |
| 103 | } |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 104 | return cast<BranchInst>(I)->getCondition(); |
Max Kazantsev | 65cd483 | 2018-08-03 10:16:40 +0000 | [diff] [blame] | 105 | } |
| 106 | |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 107 | // Set the condition for \p I to \p NewCond. \p I can either be a guard or a |
| 108 | // conditional branch. |
| 109 | static void setCondition(Instruction *I, Value *NewCond) { |
| 110 | if (IntrinsicInst *GI = dyn_cast<IntrinsicInst>(I)) { |
| 111 | assert(GI->getIntrinsicID() == Intrinsic::experimental_guard && |
| 112 | "Bad guard intrinsic?"); |
| 113 | GI->setArgOperand(0, NewCond); |
| 114 | return; |
| 115 | } |
| 116 | cast<BranchInst>(I)->setCondition(NewCond); |
Max Kazantsev | 65cd483 | 2018-08-03 10:16:40 +0000 | [diff] [blame] | 117 | } |
| 118 | |
Max Kazantsev | 65cd483 | 2018-08-03 10:16:40 +0000 | [diff] [blame] | 119 | // Eliminates the guard instruction properly. |
| 120 | static void eliminateGuard(Instruction *GuardInst) { |
| 121 | GuardInst->eraseFromParent(); |
| 122 | ++GuardsEliminated; |
| 123 | } |
| 124 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 125 | class GuardWideningImpl { |
| 126 | DominatorTree &DT; |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 127 | PostDominatorTree *PDT; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 128 | LoopInfo &LI; |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 129 | BranchProbabilityInfo *BPI; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 130 | |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 131 | /// Together, these describe the region of interest. This might be all of |
| 132 | /// the blocks within a function, or only a given loop's blocks and preheader. |
| 133 | DomTreeNode *Root; |
| 134 | std::function<bool(BasicBlock*)> BlockFilter; |
| 135 | |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 136 | /// The set of guards and conditional branches whose conditions have been |
| 137 | /// widened into dominating guards. |
| 138 | SmallVector<Instruction *, 16> EliminatedGuardsAndBranches; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 139 | |
| 140 | /// The set of guards which have been widened to include conditions to other |
| 141 | /// guards. |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 142 | DenseSet<Instruction *> WidenedGuards; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 143 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 144 | /// Try to eliminate instruction \p Instr by widening it into an earlier |
| 145 | /// dominating guard. \p DFSI is the DFS iterator on the dominator tree that |
| 146 | /// is currently visiting the block containing \p Guard, and \p GuardsPerBlock |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 147 | /// maps BasicBlocks to the set of guards seen in that block. |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 148 | bool eliminateInstrViaWidening( |
| 149 | Instruction *Instr, const df_iterator<DomTreeNode *> &DFSI, |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 150 | const DenseMap<BasicBlock *, SmallVector<Instruction *, 8>> & |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 151 | GuardsPerBlock, bool InvertCondition = false); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 152 | |
| 153 | /// Used to keep track of which widening potential is more effective. |
| 154 | enum WideningScore { |
| 155 | /// Don't widen. |
| 156 | WS_IllegalOrNegative, |
| 157 | |
| 158 | /// Widening is performance neutral as far as the cycles spent in check |
| 159 | /// conditions goes (but can still help, e.g., code layout, having less |
| 160 | /// deopt state). |
| 161 | WS_Neutral, |
| 162 | |
| 163 | /// Widening is profitable. |
| 164 | WS_Positive, |
| 165 | |
| 166 | /// Widening is very profitable. Not significantly different from \c |
| 167 | /// WS_Positive, except by the order. |
| 168 | WS_VeryPositive |
| 169 | }; |
| 170 | |
| 171 | static StringRef scoreTypeToString(WideningScore WS); |
| 172 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 173 | /// Compute the score for widening the condition in \p DominatedInstr |
Max Kazantsev | 13ab5cb | 2019-02-04 10:20:51 +0000 | [diff] [blame] | 174 | /// into \p DominatingGuard. If \p InvertCond is set, then we widen the |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 175 | /// inverted condition of the dominating guard. |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 176 | WideningScore computeWideningScore(Instruction *DominatedInstr, |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 177 | Instruction *DominatingGuard, |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 178 | bool InvertCond); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 179 | |
| 180 | /// Helper to check if \p V can be hoisted to \p InsertPos. |
| 181 | bool isAvailableAt(Value *V, Instruction *InsertPos) { |
| 182 | SmallPtrSet<Instruction *, 8> Visited; |
| 183 | return isAvailableAt(V, InsertPos, Visited); |
| 184 | } |
| 185 | |
| 186 | bool isAvailableAt(Value *V, Instruction *InsertPos, |
| 187 | SmallPtrSetImpl<Instruction *> &Visited); |
| 188 | |
| 189 | /// Helper to hoist \p V to \p InsertPos. Guaranteed to succeed if \c |
| 190 | /// isAvailableAt returned true. |
| 191 | void makeAvailableAt(Value *V, Instruction *InsertPos); |
| 192 | |
| 193 | /// Common helper used by \c widenGuard and \c isWideningCondProfitable. Try |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 194 | /// to generate an expression computing the logical AND of \p Cond0 and (\p |
| 195 | /// Cond1 XOR \p InvertCondition). |
| 196 | /// Return true if the expression computing the AND is only as |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 197 | /// expensive as computing one of the two. If \p InsertPt is true then |
| 198 | /// actually generate the resulting expression, make it available at \p |
| 199 | /// InsertPt and return it in \p Result (else no change to the IR is made). |
| 200 | bool widenCondCommon(Value *Cond0, Value *Cond1, Instruction *InsertPt, |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 201 | Value *&Result, bool InvertCondition); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 202 | |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 203 | /// Represents a range check of the form \c Base + \c Offset u< \c Length, |
| 204 | /// with the constraint that \c Length is not negative. \c CheckInst is the |
| 205 | /// pre-existing instruction in the IR that computes the result of this range |
| 206 | /// check. |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 207 | class RangeCheck { |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 208 | Value *Base; |
| 209 | ConstantInt *Offset; |
| 210 | Value *Length; |
| 211 | ICmpInst *CheckInst; |
| 212 | |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 213 | public: |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 214 | explicit RangeCheck(Value *Base, ConstantInt *Offset, Value *Length, |
| 215 | ICmpInst *CheckInst) |
| 216 | : Base(Base), Offset(Offset), Length(Length), CheckInst(CheckInst) {} |
| 217 | |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 218 | void setBase(Value *NewBase) { Base = NewBase; } |
| 219 | void setOffset(ConstantInt *NewOffset) { Offset = NewOffset; } |
| 220 | |
| 221 | Value *getBase() const { return Base; } |
| 222 | ConstantInt *getOffset() const { return Offset; } |
| 223 | const APInt &getOffsetValue() const { return getOffset()->getValue(); } |
| 224 | Value *getLength() const { return Length; }; |
| 225 | ICmpInst *getCheckInst() const { return CheckInst; } |
| 226 | |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 227 | void print(raw_ostream &OS, bool PrintTypes = false) { |
| 228 | OS << "Base: "; |
| 229 | Base->printAsOperand(OS, PrintTypes); |
| 230 | OS << " Offset: "; |
| 231 | Offset->printAsOperand(OS, PrintTypes); |
| 232 | OS << " Length: "; |
| 233 | Length->printAsOperand(OS, PrintTypes); |
| 234 | } |
| 235 | |
| 236 | LLVM_DUMP_METHOD void dump() { |
| 237 | print(dbgs()); |
| 238 | dbgs() << "\n"; |
| 239 | } |
| 240 | }; |
| 241 | |
| 242 | /// Parse \p CheckCond into a conjunction (logical-and) of range checks; and |
| 243 | /// append them to \p Checks. Returns true on success, may clobber \c Checks |
| 244 | /// on failure. |
| 245 | bool parseRangeChecks(Value *CheckCond, SmallVectorImpl<RangeCheck> &Checks) { |
| 246 | SmallPtrSet<Value *, 8> Visited; |
| 247 | return parseRangeChecks(CheckCond, Checks, Visited); |
| 248 | } |
| 249 | |
| 250 | bool parseRangeChecks(Value *CheckCond, SmallVectorImpl<RangeCheck> &Checks, |
| 251 | SmallPtrSetImpl<Value *> &Visited); |
| 252 | |
| 253 | /// Combine the checks in \p Checks into a smaller set of checks and append |
| 254 | /// them into \p CombinedChecks. Return true on success (i.e. all of checks |
| 255 | /// in \p Checks were combined into \p CombinedChecks). Clobbers \p Checks |
| 256 | /// and \p CombinedChecks on success and on failure. |
| 257 | bool combineRangeChecks(SmallVectorImpl<RangeCheck> &Checks, |
| 258 | SmallVectorImpl<RangeCheck> &CombinedChecks); |
| 259 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 260 | /// Can we compute the logical AND of \p Cond0 and \p Cond1 for the price of |
| 261 | /// computing only one of the two expressions? |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 262 | bool isWideningCondProfitable(Value *Cond0, Value *Cond1, bool InvertCond) { |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 263 | Value *ResultUnused; |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 264 | return widenCondCommon(Cond0, Cond1, /*InsertPt=*/nullptr, ResultUnused, |
| 265 | InvertCond); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 266 | } |
| 267 | |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 268 | /// If \p InvertCondition is false, Widen \p ToWiden to fail if |
| 269 | /// \p NewCondition is false, otherwise make it fail if \p NewCondition is |
| 270 | /// true (in addition to whatever it is already checking). |
| 271 | void widenGuard(Instruction *ToWiden, Value *NewCondition, |
| 272 | bool InvertCondition) { |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 273 | Value *Result; |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 274 | widenCondCommon(getCondition(ToWiden), NewCondition, ToWiden, Result, |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 275 | InvertCondition); |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 276 | Value *WidenableCondition = nullptr; |
| 277 | if (isGuardAsWidenableBranch(ToWiden)) { |
| 278 | auto *Cond = cast<BranchInst>(ToWiden)->getCondition(); |
| 279 | WidenableCondition = cast<BinaryOperator>(Cond)->getOperand(1); |
| 280 | } |
| 281 | if (WidenableCondition) |
| 282 | Result = BinaryOperator::CreateAnd(Result, WidenableCondition, |
| 283 | "guard.chk", ToWiden); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 284 | setCondition(ToWiden, Result); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 285 | } |
| 286 | |
| 287 | public: |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 288 | |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 289 | explicit GuardWideningImpl(DominatorTree &DT, PostDominatorTree *PDT, |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 290 | LoopInfo &LI, BranchProbabilityInfo *BPI, |
| 291 | DomTreeNode *Root, |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 292 | std::function<bool(BasicBlock*)> BlockFilter) |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 293 | : DT(DT), PDT(PDT), LI(LI), BPI(BPI), Root(Root), BlockFilter(BlockFilter) |
| 294 | {} |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 295 | |
| 296 | /// The entry point for this pass. |
| 297 | bool run(); |
| 298 | }; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 299 | } |
| 300 | |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 301 | static bool isSupportedGuardInstruction(const Instruction *Insn) { |
| 302 | if (isGuard(Insn)) |
| 303 | return true; |
| 304 | if (WidenBranchGuards && isGuardAsWidenableBranch(Insn)) |
| 305 | return true; |
| 306 | return false; |
| 307 | } |
| 308 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 309 | bool GuardWideningImpl::run() { |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 310 | DenseMap<BasicBlock *, SmallVector<Instruction *, 8>> GuardsInBlock; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 311 | bool Changed = false; |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 312 | Optional<BranchProbability> LikelyTaken = None; |
| 313 | if (WidenFrequentBranches && BPI) { |
| 314 | unsigned Threshold = FrequentBranchThreshold; |
| 315 | assert(Threshold > 0 && "Zero threshold makes no sense!"); |
Max Kazantsev | 778f62b | 2018-08-06 06:35:21 +0000 | [diff] [blame] | 316 | LikelyTaken = BranchProbability(Threshold - 1, Threshold); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 317 | } |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 318 | |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 319 | for (auto DFI = df_begin(Root), DFE = df_end(Root); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 320 | DFI != DFE; ++DFI) { |
| 321 | auto *BB = (*DFI)->getBlock(); |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 322 | if (!BlockFilter(BB)) |
| 323 | continue; |
| 324 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 325 | auto &CurrentList = GuardsInBlock[BB]; |
| 326 | |
| 327 | for (auto &I : *BB) |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 328 | if (isSupportedGuardInstruction(&I)) |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 329 | CurrentList.push_back(cast<Instruction>(&I)); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 330 | |
| 331 | for (auto *II : CurrentList) |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 332 | Changed |= eliminateInstrViaWidening(II, DFI, GuardsInBlock); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 333 | if (WidenFrequentBranches && BPI) |
| 334 | if (auto *BI = dyn_cast<BranchInst>(BB->getTerminator())) |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 335 | if (BI->isConditional()) { |
| 336 | // If one of branches of a conditional is likely taken, try to |
| 337 | // eliminate it. |
| 338 | if (BPI->getEdgeProbability(BB, 0U) >= *LikelyTaken) |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 339 | Changed |= eliminateInstrViaWidening(BI, DFI, GuardsInBlock); |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 340 | else if (BPI->getEdgeProbability(BB, 1U) >= *LikelyTaken) |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 341 | Changed |= eliminateInstrViaWidening(BI, DFI, GuardsInBlock, |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 342 | /*InvertCondition*/true); |
| 343 | } |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 344 | } |
| 345 | |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 346 | assert(EliminatedGuardsAndBranches.empty() || Changed); |
| 347 | for (auto *I : EliminatedGuardsAndBranches) |
| 348 | if (!WidenedGuards.count(I)) { |
| 349 | assert(isa<ConstantInt>(getCondition(I)) && "Should be!"); |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 350 | if (isSupportedGuardInstruction(I)) |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 351 | eliminateGuard(I); |
| 352 | else { |
| 353 | assert(isa<BranchInst>(I) && |
| 354 | "Eliminated something other than guard or branch?"); |
| 355 | ++CondBranchEliminated; |
| 356 | } |
| 357 | } |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 358 | |
| 359 | return Changed; |
| 360 | } |
| 361 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 362 | bool GuardWideningImpl::eliminateInstrViaWidening( |
| 363 | Instruction *Instr, const df_iterator<DomTreeNode *> &DFSI, |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 364 | const DenseMap<BasicBlock *, SmallVector<Instruction *, 8>> & |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 365 | GuardsInBlock, bool InvertCondition) { |
Max Kazantsev | 611d645 | 2018-08-22 02:40:49 +0000 | [diff] [blame] | 366 | // Ignore trivial true or false conditions. These instructions will be |
| 367 | // trivially eliminated by any cleanup pass. Do not erase them because other |
| 368 | // guards can possibly be widened into them. |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 369 | if (isa<ConstantInt>(getCondition(Instr))) |
Max Kazantsev | 611d645 | 2018-08-22 02:40:49 +0000 | [diff] [blame] | 370 | return false; |
| 371 | |
Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 372 | Instruction *BestSoFar = nullptr; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 373 | auto BestScoreSoFar = WS_IllegalOrNegative; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 374 | |
| 375 | // In the set of dominating guards, find the one we can merge GuardInst with |
| 376 | // for the most profit. |
| 377 | for (unsigned i = 0, e = DFSI.getPathLength(); i != e; ++i) { |
| 378 | auto *CurBB = DFSI.getPath(i)->getBlock(); |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 379 | if (!BlockFilter(CurBB)) |
| 380 | break; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 381 | assert(GuardsInBlock.count(CurBB) && "Must have been populated by now!"); |
| 382 | const auto &GuardsInCurBB = GuardsInBlock.find(CurBB)->second; |
| 383 | |
| 384 | auto I = GuardsInCurBB.begin(); |
Max Kazantsev | cd48ac3 | 2019-02-06 11:27:00 +0000 | [diff] [blame] | 385 | auto E = Instr->getParent() == CurBB |
| 386 | ? std::find(GuardsInCurBB.begin(), GuardsInCurBB.end(), Instr) |
| 387 | : GuardsInCurBB.end(); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 388 | |
| 389 | #ifndef NDEBUG |
| 390 | { |
| 391 | unsigned Index = 0; |
| 392 | for (auto &I : *CurBB) { |
| 393 | if (Index == GuardsInCurBB.size()) |
| 394 | break; |
| 395 | if (GuardsInCurBB[Index] == &I) |
| 396 | Index++; |
| 397 | } |
| 398 | assert(Index == GuardsInCurBB.size() && |
| 399 | "Guards expected to be in order!"); |
| 400 | } |
| 401 | #endif |
| 402 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 403 | assert((i == (e - 1)) == (Instr->getParent() == CurBB) && "Bad DFS?"); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 404 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 405 | for (auto *Candidate : make_range(I, E)) { |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 406 | auto Score = computeWideningScore(Instr, Candidate, InvertCondition); |
| 407 | LLVM_DEBUG(dbgs() << "Score between " << *getCondition(Instr) |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 408 | << " and " << *getCondition(Candidate) << " is " |
Nicola Zaghen | d34e60c | 2018-05-14 12:53:11 +0000 | [diff] [blame] | 409 | << scoreTypeToString(Score) << "\n"); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 410 | if (Score > BestScoreSoFar) { |
| 411 | BestScoreSoFar = Score; |
| 412 | BestSoFar = Candidate; |
| 413 | } |
| 414 | } |
| 415 | } |
| 416 | |
| 417 | if (BestScoreSoFar == WS_IllegalOrNegative) { |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 418 | LLVM_DEBUG(dbgs() << "Did not eliminate guard " << *Instr << "\n"); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 419 | return false; |
| 420 | } |
| 421 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 422 | assert(BestSoFar != Instr && "Should have never visited same guard!"); |
| 423 | assert(DT.dominates(BestSoFar, Instr) && "Should be!"); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 424 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 425 | LLVM_DEBUG(dbgs() << "Widening " << *Instr << " into " << *BestSoFar |
Nicola Zaghen | d34e60c | 2018-05-14 12:53:11 +0000 | [diff] [blame] | 426 | << " with score " << scoreTypeToString(BestScoreSoFar) |
| 427 | << "\n"); |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 428 | widenGuard(BestSoFar, getCondition(Instr), InvertCondition); |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 429 | auto NewGuardCondition = InvertCondition |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 430 | ? ConstantInt::getFalse(Instr->getContext()) |
| 431 | : ConstantInt::getTrue(Instr->getContext()); |
| 432 | setCondition(Instr, NewGuardCondition); |
| 433 | EliminatedGuardsAndBranches.push_back(Instr); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 434 | WidenedGuards.insert(BestSoFar); |
| 435 | return true; |
| 436 | } |
| 437 | |
Max Kazantsev | 13ab5cb | 2019-02-04 10:20:51 +0000 | [diff] [blame] | 438 | GuardWideningImpl::WideningScore |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 439 | GuardWideningImpl::computeWideningScore(Instruction *DominatedInstr, |
Max Kazantsev | 13ab5cb | 2019-02-04 10:20:51 +0000 | [diff] [blame] | 440 | Instruction *DominatingGuard, |
| 441 | bool InvertCond) { |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 442 | Loop *DominatedInstrLoop = LI.getLoopFor(DominatedInstr->getParent()); |
Max Kazantsev | 13ab5cb | 2019-02-04 10:20:51 +0000 | [diff] [blame] | 443 | Loop *DominatingGuardLoop = LI.getLoopFor(DominatingGuard->getParent()); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 444 | bool HoistingOutOfLoop = false; |
| 445 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 446 | if (DominatingGuardLoop != DominatedInstrLoop) { |
Philip Reames | de5a1da | 2018-04-27 17:41:37 +0000 | [diff] [blame] | 447 | // Be conservative and don't widen into a sibling loop. TODO: If the |
| 448 | // sibling is colder, we should consider allowing this. |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 449 | if (DominatingGuardLoop && |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 450 | !DominatingGuardLoop->contains(DominatedInstrLoop)) |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 451 | return WS_IllegalOrNegative; |
| 452 | |
| 453 | HoistingOutOfLoop = true; |
| 454 | } |
| 455 | |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 456 | if (!isAvailableAt(getCondition(DominatedInstr), DominatingGuard)) |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 457 | return WS_IllegalOrNegative; |
| 458 | |
Philip Reames | de5a1da | 2018-04-27 17:41:37 +0000 | [diff] [blame] | 459 | // If the guard was conditional executed, it may never be reached |
| 460 | // dynamically. There are two potential downsides to hoisting it out of the |
| 461 | // conditionally executed region: 1) we may spuriously deopt without need and |
| 462 | // 2) we have the extra cost of computing the guard condition in the common |
| 463 | // case. At the moment, we really only consider the second in our heuristic |
| 464 | // here. TODO: evaluate cost model for spurious deopt |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 465 | // NOTE: As written, this also lets us hoist right over another guard which |
Fangrui Song | f78650a | 2018-07-30 19:41:25 +0000 | [diff] [blame] | 466 | // is essentially just another spelling for control flow. |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 467 | if (isWideningCondProfitable(getCondition(DominatedInstr), |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 468 | getCondition(DominatingGuard), InvertCond)) |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 469 | return HoistingOutOfLoop ? WS_VeryPositive : WS_Positive; |
| 470 | |
| 471 | if (HoistingOutOfLoop) |
| 472 | return WS_Positive; |
| 473 | |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 474 | // Returns true if we might be hoisting above explicit control flow. Note |
| 475 | // that this completely ignores implicit control flow (guards, calls which |
| 476 | // throw, etc...). That choice appears arbitrary. |
| 477 | auto MaybeHoistingOutOfIf = [&]() { |
| 478 | auto *DominatingBlock = DominatingGuard->getParent(); |
Max Kazantsev | 09802f4 | 2019-02-04 10:31:18 +0000 | [diff] [blame] | 479 | auto *DominatedBlock = DominatedInstr->getParent(); |
Max Kazantsev | 2bb95e7 | 2019-02-13 09:56:30 +0000 | [diff] [blame] | 480 | if (isGuardAsWidenableBranch(DominatingGuard)) |
| 481 | DominatingBlock = cast<BranchInst>(DominatingGuard)->getSuccessor(0); |
Fangrui Song | f78650a | 2018-07-30 19:41:25 +0000 | [diff] [blame] | 482 | |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 483 | // Same Block? |
| 484 | if (DominatedBlock == DominatingBlock) |
| 485 | return false; |
| 486 | // Obvious successor (common loop header/preheader case) |
| 487 | if (DominatedBlock == DominatingBlock->getUniqueSuccessor()) |
| 488 | return false; |
| 489 | // TODO: diamond, triangle cases |
| 490 | if (!PDT) return true; |
Max Kazantsev | 9b25bf3 | 2018-12-25 07:20:06 +0000 | [diff] [blame] | 491 | return !PDT->dominates(DominatedBlock, DominatingBlock); |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 492 | }; |
| 493 | |
| 494 | return MaybeHoistingOutOfIf() ? WS_IllegalOrNegative : WS_Neutral; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 495 | } |
| 496 | |
| 497 | bool GuardWideningImpl::isAvailableAt(Value *V, Instruction *Loc, |
| 498 | SmallPtrSetImpl<Instruction *> &Visited) { |
| 499 | auto *Inst = dyn_cast<Instruction>(V); |
| 500 | if (!Inst || DT.dominates(Inst, Loc) || Visited.count(Inst)) |
| 501 | return true; |
| 502 | |
| 503 | if (!isSafeToSpeculativelyExecute(Inst, Loc, &DT) || |
| 504 | Inst->mayReadFromMemory()) |
| 505 | return false; |
| 506 | |
| 507 | Visited.insert(Inst); |
| 508 | |
| 509 | // We only want to go _up_ the dominance chain when recursing. |
| 510 | assert(!isa<PHINode>(Loc) && |
| 511 | "PHIs should return false for isSafeToSpeculativelyExecute"); |
| 512 | assert(DT.isReachableFromEntry(Inst->getParent()) && |
| 513 | "We did a DFS from the block entry!"); |
| 514 | return all_of(Inst->operands(), |
| 515 | [&](Value *Op) { return isAvailableAt(Op, Loc, Visited); }); |
| 516 | } |
| 517 | |
| 518 | void GuardWideningImpl::makeAvailableAt(Value *V, Instruction *Loc) { |
| 519 | auto *Inst = dyn_cast<Instruction>(V); |
| 520 | if (!Inst || DT.dominates(Inst, Loc)) |
| 521 | return; |
| 522 | |
| 523 | assert(isSafeToSpeculativelyExecute(Inst, Loc, &DT) && |
| 524 | !Inst->mayReadFromMemory() && "Should've checked with isAvailableAt!"); |
| 525 | |
| 526 | for (Value *Op : Inst->operands()) |
| 527 | makeAvailableAt(Op, Loc); |
| 528 | |
| 529 | Inst->moveBefore(Loc); |
| 530 | } |
| 531 | |
| 532 | bool GuardWideningImpl::widenCondCommon(Value *Cond0, Value *Cond1, |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 533 | Instruction *InsertPt, Value *&Result, |
| 534 | bool InvertCondition) { |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 535 | using namespace llvm::PatternMatch; |
| 536 | |
| 537 | { |
| 538 | // L >u C0 && L >u C1 -> L >u max(C0, C1) |
| 539 | ConstantInt *RHS0, *RHS1; |
| 540 | Value *LHS; |
| 541 | ICmpInst::Predicate Pred0, Pred1; |
| 542 | if (match(Cond0, m_ICmp(Pred0, m_Value(LHS), m_ConstantInt(RHS0))) && |
| 543 | match(Cond1, m_ICmp(Pred1, m_Specific(LHS), m_ConstantInt(RHS1)))) { |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 544 | if (InvertCondition) |
| 545 | Pred1 = ICmpInst::getInversePredicate(Pred1); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 546 | |
Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 547 | ConstantRange CR0 = |
| 548 | ConstantRange::makeExactICmpRegion(Pred0, RHS0->getValue()); |
| 549 | ConstantRange CR1 = |
| 550 | ConstantRange::makeExactICmpRegion(Pred1, RHS1->getValue()); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 551 | |
Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 552 | // SubsetIntersect is a subset of the actual mathematical intersection of |
Sanjay Patel | f8ee0e0 | 2016-06-19 17:20:27 +0000 | [diff] [blame] | 553 | // CR0 and CR1, while SupersetIntersect is a superset of the actual |
Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 554 | // mathematical intersection. If these two ConstantRanges are equal, then |
| 555 | // we know we were able to represent the actual mathematical intersection |
| 556 | // of CR0 and CR1, and can use the same to generate an icmp instruction. |
| 557 | // |
| 558 | // Given what we're doing here and the semantics of guards, it would |
| 559 | // actually be correct to just use SubsetIntersect, but that may be too |
| 560 | // aggressive in cases we care about. |
| 561 | auto SubsetIntersect = CR0.inverse().unionWith(CR1.inverse()).inverse(); |
| 562 | auto SupersetIntersect = CR0.intersectWith(CR1); |
| 563 | |
| 564 | APInt NewRHSAP; |
| 565 | CmpInst::Predicate Pred; |
| 566 | if (SubsetIntersect == SupersetIntersect && |
| 567 | SubsetIntersect.getEquivalentICmp(Pred, NewRHSAP)) { |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 568 | if (InsertPt) { |
Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 569 | ConstantInt *NewRHS = ConstantInt::get(Cond0->getContext(), NewRHSAP); |
| 570 | Result = new ICmpInst(InsertPt, Pred, LHS, NewRHS, "wide.chk"); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 571 | } |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 572 | return true; |
| 573 | } |
| 574 | } |
| 575 | } |
| 576 | |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 577 | { |
| 578 | SmallVector<GuardWideningImpl::RangeCheck, 4> Checks, CombinedChecks; |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 579 | // TODO: Support InvertCondition case? |
| 580 | if (!InvertCondition && |
| 581 | parseRangeChecks(Cond0, Checks) && parseRangeChecks(Cond1, Checks) && |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 582 | combineRangeChecks(Checks, CombinedChecks)) { |
| 583 | if (InsertPt) { |
| 584 | Result = nullptr; |
| 585 | for (auto &RC : CombinedChecks) { |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 586 | makeAvailableAt(RC.getCheckInst(), InsertPt); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 587 | if (Result) |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 588 | Result = BinaryOperator::CreateAnd(RC.getCheckInst(), Result, "", |
| 589 | InsertPt); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 590 | else |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 591 | Result = RC.getCheckInst(); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 592 | } |
| 593 | |
| 594 | Result->setName("wide.chk"); |
| 595 | } |
| 596 | return true; |
| 597 | } |
| 598 | } |
| 599 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 600 | // Base case -- just logical-and the two conditions together. |
| 601 | |
| 602 | if (InsertPt) { |
| 603 | makeAvailableAt(Cond0, InsertPt); |
| 604 | makeAvailableAt(Cond1, InsertPt); |
Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 605 | if (InvertCondition) |
| 606 | Cond1 = BinaryOperator::CreateNot(Cond1, "inverted", InsertPt); |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 607 | Result = BinaryOperator::CreateAnd(Cond0, Cond1, "wide.chk", InsertPt); |
| 608 | } |
| 609 | |
| 610 | // We were not able to compute Cond0 AND Cond1 for the price of one. |
| 611 | return false; |
| 612 | } |
| 613 | |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 614 | bool GuardWideningImpl::parseRangeChecks( |
| 615 | Value *CheckCond, SmallVectorImpl<GuardWideningImpl::RangeCheck> &Checks, |
| 616 | SmallPtrSetImpl<Value *> &Visited) { |
| 617 | if (!Visited.insert(CheckCond).second) |
| 618 | return true; |
| 619 | |
| 620 | using namespace llvm::PatternMatch; |
| 621 | |
| 622 | { |
| 623 | Value *AndLHS, *AndRHS; |
| 624 | if (match(CheckCond, m_And(m_Value(AndLHS), m_Value(AndRHS)))) |
| 625 | return parseRangeChecks(AndLHS, Checks) && |
| 626 | parseRangeChecks(AndRHS, Checks); |
| 627 | } |
| 628 | |
| 629 | auto *IC = dyn_cast<ICmpInst>(CheckCond); |
| 630 | if (!IC || !IC->getOperand(0)->getType()->isIntegerTy() || |
| 631 | (IC->getPredicate() != ICmpInst::ICMP_ULT && |
| 632 | IC->getPredicate() != ICmpInst::ICMP_UGT)) |
| 633 | return false; |
| 634 | |
| 635 | Value *CmpLHS = IC->getOperand(0), *CmpRHS = IC->getOperand(1); |
| 636 | if (IC->getPredicate() == ICmpInst::ICMP_UGT) |
| 637 | std::swap(CmpLHS, CmpRHS); |
| 638 | |
| 639 | auto &DL = IC->getModule()->getDataLayout(); |
| 640 | |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 641 | GuardWideningImpl::RangeCheck Check( |
| 642 | CmpLHS, cast<ConstantInt>(ConstantInt::getNullValue(CmpRHS->getType())), |
| 643 | CmpRHS, IC); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 644 | |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 645 | if (!isKnownNonNegative(Check.getLength(), DL)) |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 646 | return false; |
| 647 | |
| 648 | // What we have in \c Check now is a correct interpretation of \p CheckCond. |
| 649 | // Try to see if we can move some constant offsets into the \c Offset field. |
| 650 | |
| 651 | bool Changed; |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 652 | auto &Ctx = CheckCond->getContext(); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 653 | |
| 654 | do { |
| 655 | Value *OpLHS; |
| 656 | ConstantInt *OpRHS; |
| 657 | Changed = false; |
| 658 | |
| 659 | #ifndef NDEBUG |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 660 | auto *BaseInst = dyn_cast<Instruction>(Check.getBase()); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 661 | assert((!BaseInst || DT.isReachableFromEntry(BaseInst->getParent())) && |
| 662 | "Unreachable instruction?"); |
| 663 | #endif |
| 664 | |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 665 | if (match(Check.getBase(), m_Add(m_Value(OpLHS), m_ConstantInt(OpRHS)))) { |
| 666 | Check.setBase(OpLHS); |
| 667 | APInt NewOffset = Check.getOffsetValue() + OpRHS->getValue(); |
| 668 | Check.setOffset(ConstantInt::get(Ctx, NewOffset)); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 669 | Changed = true; |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 670 | } else if (match(Check.getBase(), |
| 671 | m_Or(m_Value(OpLHS), m_ConstantInt(OpRHS)))) { |
Craig Topper | 8205a1a | 2017-05-24 16:53:07 +0000 | [diff] [blame] | 672 | KnownBits Known = computeKnownBits(OpLHS, DL); |
Craig Topper | b45eabc | 2017-04-26 16:39:58 +0000 | [diff] [blame] | 673 | if ((OpRHS->getValue() & Known.Zero) == OpRHS->getValue()) { |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 674 | Check.setBase(OpLHS); |
| 675 | APInt NewOffset = Check.getOffsetValue() + OpRHS->getValue(); |
| 676 | Check.setOffset(ConstantInt::get(Ctx, NewOffset)); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 677 | Changed = true; |
| 678 | } |
| 679 | } |
| 680 | } while (Changed); |
| 681 | |
| 682 | Checks.push_back(Check); |
| 683 | return true; |
| 684 | } |
| 685 | |
| 686 | bool GuardWideningImpl::combineRangeChecks( |
| 687 | SmallVectorImpl<GuardWideningImpl::RangeCheck> &Checks, |
| 688 | SmallVectorImpl<GuardWideningImpl::RangeCheck> &RangeChecksOut) { |
| 689 | unsigned OldCount = Checks.size(); |
| 690 | while (!Checks.empty()) { |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 691 | // Pick all of the range checks with a specific base and length, and try to |
| 692 | // merge them. |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 693 | Value *CurrentBase = Checks.front().getBase(); |
| 694 | Value *CurrentLength = Checks.front().getLength(); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 695 | |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 696 | SmallVector<GuardWideningImpl::RangeCheck, 3> CurrentChecks; |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 697 | |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 698 | auto IsCurrentCheck = [&](GuardWideningImpl::RangeCheck &RC) { |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 699 | return RC.getBase() == CurrentBase && RC.getLength() == CurrentLength; |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 700 | }; |
| 701 | |
Sanjoy Das | 9020872 | 2017-02-21 00:38:44 +0000 | [diff] [blame] | 702 | copy_if(Checks, std::back_inserter(CurrentChecks), IsCurrentCheck); |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 703 | Checks.erase(remove_if(Checks, IsCurrentCheck), Checks.end()); |
| 704 | |
| 705 | assert(CurrentChecks.size() != 0 && "We know we have at least one!"); |
| 706 | |
| 707 | if (CurrentChecks.size() < 3) { |
| 708 | RangeChecksOut.insert(RangeChecksOut.end(), CurrentChecks.begin(), |
| 709 | CurrentChecks.end()); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 710 | continue; |
| 711 | } |
| 712 | |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 713 | // CurrentChecks.size() will typically be 3 here, but so far there has been |
| 714 | // no need to hard-code that fact. |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 715 | |
Fangrui Song | 0cac726 | 2018-09-27 02:13:45 +0000 | [diff] [blame] | 716 | llvm::sort(CurrentChecks, [&](const GuardWideningImpl::RangeCheck &LHS, |
| 717 | const GuardWideningImpl::RangeCheck &RHS) { |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 718 | return LHS.getOffsetValue().slt(RHS.getOffsetValue()); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 719 | }); |
| 720 | |
| 721 | // Note: std::sort should not invalidate the ChecksStart iterator. |
| 722 | |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 723 | ConstantInt *MinOffset = CurrentChecks.front().getOffset(), |
| 724 | *MaxOffset = CurrentChecks.back().getOffset(); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 725 | |
| 726 | unsigned BitWidth = MaxOffset->getValue().getBitWidth(); |
| 727 | if ((MaxOffset->getValue() - MinOffset->getValue()) |
| 728 | .ugt(APInt::getSignedMinValue(BitWidth))) |
| 729 | return false; |
| 730 | |
| 731 | APInt MaxDiff = MaxOffset->getValue() - MinOffset->getValue(); |
Benjamin Kramer | 46e38f3 | 2016-06-08 10:01:20 +0000 | [diff] [blame] | 732 | const APInt &HighOffset = MaxOffset->getValue(); |
Sanjoy Das | 2351975 | 2016-05-19 23:15:59 +0000 | [diff] [blame] | 733 | auto OffsetOK = [&](const GuardWideningImpl::RangeCheck &RC) { |
Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 734 | return (HighOffset - RC.getOffsetValue()).ult(MaxDiff); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 735 | }; |
| 736 | |
| 737 | if (MaxDiff.isMinValue() || |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 738 | !std::all_of(std::next(CurrentChecks.begin()), CurrentChecks.end(), |
| 739 | OffsetOK)) |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 740 | return false; |
| 741 | |
| 742 | // We have a series of f+1 checks as: |
| 743 | // |
| 744 | // I+k_0 u< L ... Chk_0 |
Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 745 | // I+k_1 u< L ... Chk_1 |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 746 | // ... |
Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 747 | // I+k_f u< L ... Chk_f |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 748 | // |
Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 749 | // with forall i in [0,f]: k_f-k_i u< k_f-k_0 ... Precond_0 |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 750 | // k_f-k_0 u< INT_MIN+k_f ... Precond_1 |
| 751 | // k_f != k_0 ... Precond_2 |
| 752 | // |
| 753 | // Claim: |
Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 754 | // Chk_0 AND Chk_f implies all the other checks |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 755 | // |
| 756 | // Informal proof sketch: |
| 757 | // |
| 758 | // We will show that the integer range [I+k_0,I+k_f] does not unsigned-wrap |
| 759 | // (i.e. going from I+k_0 to I+k_f does not cross the -1,0 boundary) and |
| 760 | // thus I+k_f is the greatest unsigned value in that range. |
| 761 | // |
| 762 | // This combined with Ckh_(f+1) shows that everything in that range is u< L. |
| 763 | // Via Precond_0 we know that all of the indices in Chk_0 through Chk_(f+1) |
| 764 | // lie in [I+k_0,I+k_f], this proving our claim. |
| 765 | // |
| 766 | // To see that [I+k_0,I+k_f] is not a wrapping range, note that there are |
| 767 | // two possibilities: I+k_0 u< I+k_f or I+k_0 >u I+k_f (they can't be equal |
| 768 | // since k_0 != k_f). In the former case, [I+k_0,I+k_f] is not a wrapping |
| 769 | // range by definition, and the latter case is impossible: |
| 770 | // |
| 771 | // 0-----I+k_f---I+k_0----L---INT_MAX,INT_MIN------------------(-1) |
| 772 | // xxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx |
| 773 | // |
| 774 | // For Chk_0 to succeed, we'd have to have k_f-k_0 (the range highlighted |
| 775 | // with 'x' above) to be at least >u INT_MIN. |
| 776 | |
Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 777 | RangeChecksOut.emplace_back(CurrentChecks.front()); |
| 778 | RangeChecksOut.emplace_back(CurrentChecks.back()); |
Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 779 | } |
| 780 | |
| 781 | assert(RangeChecksOut.size() <= OldCount && "We pessimized!"); |
| 782 | return RangeChecksOut.size() != OldCount; |
| 783 | } |
| 784 | |
Florian Hahn | 6b3216a | 2017-07-31 10:07:49 +0000 | [diff] [blame] | 785 | #ifndef NDEBUG |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 786 | StringRef GuardWideningImpl::scoreTypeToString(WideningScore WS) { |
| 787 | switch (WS) { |
| 788 | case WS_IllegalOrNegative: |
| 789 | return "IllegalOrNegative"; |
| 790 | case WS_Neutral: |
| 791 | return "Neutral"; |
| 792 | case WS_Positive: |
| 793 | return "Positive"; |
| 794 | case WS_VeryPositive: |
| 795 | return "VeryPositive"; |
| 796 | } |
| 797 | |
| 798 | llvm_unreachable("Fully covered switch above!"); |
| 799 | } |
Florian Hahn | 6b3216a | 2017-07-31 10:07:49 +0000 | [diff] [blame] | 800 | #endif |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 801 | |
Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 802 | PreservedAnalyses GuardWideningPass::run(Function &F, |
| 803 | FunctionAnalysisManager &AM) { |
| 804 | auto &DT = AM.getResult<DominatorTreeAnalysis>(F); |
| 805 | auto &LI = AM.getResult<LoopAnalysis>(F); |
| 806 | auto &PDT = AM.getResult<PostDominatorTreeAnalysis>(F); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 807 | BranchProbabilityInfo *BPI = nullptr; |
| 808 | if (WidenFrequentBranches) |
| 809 | BPI = AM.getCachedResult<BranchProbabilityAnalysis>(F); |
| 810 | if (!GuardWideningImpl(DT, &PDT, LI, BPI, DT.getRootNode(), |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 811 | [](BasicBlock*) { return true; } ).run()) |
Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 812 | return PreservedAnalyses::all(); |
| 813 | |
| 814 | PreservedAnalyses PA; |
| 815 | PA.preserveSet<CFGAnalyses>(); |
| 816 | return PA; |
| 817 | } |
| 818 | |
| 819 | namespace { |
| 820 | struct GuardWideningLegacyPass : public FunctionPass { |
| 821 | static char ID; |
Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 822 | |
| 823 | GuardWideningLegacyPass() : FunctionPass(ID) { |
| 824 | initializeGuardWideningLegacyPassPass(*PassRegistry::getPassRegistry()); |
| 825 | } |
| 826 | |
| 827 | bool runOnFunction(Function &F) override { |
| 828 | if (skipFunction(F)) |
| 829 | return false; |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 830 | auto &DT = getAnalysis<DominatorTreeWrapperPass>().getDomTree(); |
| 831 | auto &LI = getAnalysis<LoopInfoWrapperPass>().getLoopInfo(); |
| 832 | auto &PDT = getAnalysis<PostDominatorTreeWrapperPass>().getPostDomTree(); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 833 | BranchProbabilityInfo *BPI = nullptr; |
| 834 | if (WidenFrequentBranches) |
| 835 | BPI = &getAnalysis<BranchProbabilityInfoWrapperPass>().getBPI(); |
| 836 | return GuardWideningImpl(DT, &PDT, LI, BPI, DT.getRootNode(), |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 837 | [](BasicBlock*) { return true; } ).run(); |
Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 838 | } |
| 839 | |
| 840 | void getAnalysisUsage(AnalysisUsage &AU) const override { |
| 841 | AU.setPreservesCFG(); |
| 842 | AU.addRequired<DominatorTreeWrapperPass>(); |
| 843 | AU.addRequired<PostDominatorTreeWrapperPass>(); |
| 844 | AU.addRequired<LoopInfoWrapperPass>(); |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 845 | if (WidenFrequentBranches) |
| 846 | AU.addRequired<BranchProbabilityInfoWrapperPass>(); |
Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 847 | } |
| 848 | }; |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 849 | |
| 850 | /// Same as above, but restricted to a single loop at a time. Can be |
| 851 | /// scheduled with other loop passes w/o breaking out of LPM |
| 852 | struct LoopGuardWideningLegacyPass : public LoopPass { |
| 853 | static char ID; |
| 854 | |
| 855 | LoopGuardWideningLegacyPass() : LoopPass(ID) { |
| 856 | initializeLoopGuardWideningLegacyPassPass(*PassRegistry::getPassRegistry()); |
| 857 | } |
| 858 | |
| 859 | bool runOnLoop(Loop *L, LPPassManager &LPM) override { |
| 860 | if (skipLoop(L)) |
| 861 | return false; |
| 862 | auto &DT = getAnalysis<DominatorTreeWrapperPass>().getDomTree(); |
| 863 | auto &LI = getAnalysis<LoopInfoWrapperPass>().getLoopInfo(); |
Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 864 | auto *PDTWP = getAnalysisIfAvailable<PostDominatorTreeWrapperPass>(); |
| 865 | auto *PDT = PDTWP ? &PDTWP->getPostDomTree() : nullptr; |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 866 | BasicBlock *RootBB = L->getLoopPredecessor(); |
| 867 | if (!RootBB) |
| 868 | RootBB = L->getHeader(); |
| 869 | auto BlockFilter = [&](BasicBlock *BB) { |
| 870 | return BB == RootBB || L->contains(BB); |
| 871 | }; |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 872 | BranchProbabilityInfo *BPI = nullptr; |
| 873 | if (WidenFrequentBranches) |
| 874 | BPI = &getAnalysis<BranchProbabilityInfoWrapperPass>().getBPI(); |
| 875 | return GuardWideningImpl(DT, PDT, LI, BPI, |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 876 | DT.getNode(RootBB), BlockFilter).run(); |
| 877 | } |
| 878 | |
| 879 | void getAnalysisUsage(AnalysisUsage &AU) const override { |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 880 | if (WidenFrequentBranches) |
| 881 | AU.addRequired<BranchProbabilityInfoWrapperPass>(); |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 882 | AU.setPreservesCFG(); |
| 883 | getLoopAnalysisUsage(AU); |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 884 | AU.addPreserved<PostDominatorTreeWrapperPass>(); |
| 885 | } |
| 886 | }; |
Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 887 | } |
| 888 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 889 | char GuardWideningLegacyPass::ID = 0; |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 890 | char LoopGuardWideningLegacyPass::ID = 0; |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 891 | |
| 892 | INITIALIZE_PASS_BEGIN(GuardWideningLegacyPass, "guard-widening", "Widen guards", |
| 893 | false, false) |
| 894 | INITIALIZE_PASS_DEPENDENCY(DominatorTreeWrapperPass) |
| 895 | INITIALIZE_PASS_DEPENDENCY(PostDominatorTreeWrapperPass) |
| 896 | INITIALIZE_PASS_DEPENDENCY(LoopInfoWrapperPass) |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 897 | if (WidenFrequentBranches) |
| 898 | INITIALIZE_PASS_DEPENDENCY(BranchProbabilityInfoWrapperPass) |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 899 | INITIALIZE_PASS_END(GuardWideningLegacyPass, "guard-widening", "Widen guards", |
| 900 | false, false) |
| 901 | |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 902 | INITIALIZE_PASS_BEGIN(LoopGuardWideningLegacyPass, "loop-guard-widening", |
| 903 | "Widen guards (within a single loop, as a loop pass)", |
| 904 | false, false) |
| 905 | INITIALIZE_PASS_DEPENDENCY(DominatorTreeWrapperPass) |
| 906 | INITIALIZE_PASS_DEPENDENCY(PostDominatorTreeWrapperPass) |
| 907 | INITIALIZE_PASS_DEPENDENCY(LoopInfoWrapperPass) |
Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 908 | if (WidenFrequentBranches) |
| 909 | INITIALIZE_PASS_DEPENDENCY(BranchProbabilityInfoWrapperPass) |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 910 | INITIALIZE_PASS_END(LoopGuardWideningLegacyPass, "loop-guard-widening", |
| 911 | "Widen guards (within a single loop, as a loop pass)", |
| 912 | false, false) |
| 913 | |
Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 914 | FunctionPass *llvm::createGuardWideningPass() { |
| 915 | return new GuardWideningLegacyPass(); |
| 916 | } |
Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 917 | |
| 918 | Pass *llvm::createLoopGuardWideningPass() { |
| 919 | return new LoopGuardWideningLegacyPass(); |
| 920 | } |