| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 1 | //===- GuardWidening.cpp - ---- Guard widening ----------------------------===// |
| 2 | // |
| Chandler Carruth | 2946cd7 | 2019-01-19 08:50:56 +0000 | [diff] [blame] | 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This file implements the guard widening pass. The semantics of the |
| 10 | // @llvm.experimental.guard intrinsic lets LLVM transform it so that it fails |
| 11 | // more often that it did before the transform. This optimization is called |
| 12 | // "widening" and can be used hoist and common runtime checks in situations like |
| 13 | // these: |
| 14 | // |
| 15 | // %cmp0 = 7 u< Length |
| 16 | // call @llvm.experimental.guard(i1 %cmp0) [ "deopt"(...) ] |
| 17 | // call @unknown_side_effects() |
| 18 | // %cmp1 = 9 u< Length |
| 19 | // call @llvm.experimental.guard(i1 %cmp1) [ "deopt"(...) ] |
| 20 | // ... |
| 21 | // |
| 22 | // => |
| 23 | // |
| 24 | // %cmp0 = 9 u< Length |
| 25 | // call @llvm.experimental.guard(i1 %cmp0) [ "deopt"(...) ] |
| 26 | // call @unknown_side_effects() |
| 27 | // ... |
| 28 | // |
| 29 | // If %cmp0 is false, @llvm.experimental.guard will "deoptimize" back to a |
| 30 | // generic implementation of the same function, which will have the correct |
| 31 | // semantics from that point onward. It is always _legal_ to deoptimize (so |
| 32 | // replacing %cmp0 with false is "correct"), though it may not always be |
| 33 | // profitable to do so. |
| 34 | // |
| 35 | // NB! This pass is a work in progress. It hasn't been tuned to be "production |
| 36 | // ready" yet. It is known to have quadriatic running time and will not scale |
| 37 | // to large numbers of guards |
| 38 | // |
| 39 | //===----------------------------------------------------------------------===// |
| 40 | |
| 41 | #include "llvm/Transforms/Scalar/GuardWidening.h" |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 42 | #include <functional> |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 43 | #include "llvm/ADT/DenseMap.h" |
| 44 | #include "llvm/ADT/DepthFirstIterator.h" |
| Max Kazantsev | eb8e9c0 | 2018-07-31 04:37:11 +0000 | [diff] [blame] | 45 | #include "llvm/ADT/Statistic.h" |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 46 | #include "llvm/Analysis/BranchProbabilityInfo.h" |
| Max Kazantsev | 3c284bd | 2018-08-30 03:39:16 +0000 | [diff] [blame] | 47 | #include "llvm/Analysis/GuardUtils.h" |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 48 | #include "llvm/Analysis/LoopInfo.h" |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 49 | #include "llvm/Analysis/LoopPass.h" |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 50 | #include "llvm/Analysis/PostDominators.h" |
| 51 | #include "llvm/Analysis/ValueTracking.h" |
| Peter Collingbourne | ecdd58f | 2016-10-21 19:59:26 +0000 | [diff] [blame] | 52 | #include "llvm/IR/ConstantRange.h" |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 53 | #include "llvm/IR/Dominators.h" |
| 54 | #include "llvm/IR/IntrinsicInst.h" |
| 55 | #include "llvm/IR/PatternMatch.h" |
| Chandler Carruth | 6bda14b | 2017-06-06 11:49:48 +0000 | [diff] [blame] | 56 | #include "llvm/Pass.h" |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 57 | #include "llvm/Support/Debug.h" |
| Craig Topper | b45eabc | 2017-04-26 16:39:58 +0000 | [diff] [blame] | 58 | #include "llvm/Support/KnownBits.h" |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 59 | #include "llvm/Transforms/Scalar.h" |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 60 | #include "llvm/Transforms/Utils/LoopUtils.h" |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 61 | |
| 62 | using namespace llvm; |
| 63 | |
| 64 | #define DEBUG_TYPE "guard-widening" |
| 65 | |
| Max Kazantsev | eb8e9c0 | 2018-07-31 04:37:11 +0000 | [diff] [blame] | 66 | STATISTIC(GuardsEliminated, "Number of eliminated guards"); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 67 | STATISTIC(CondBranchEliminated, "Number of eliminated conditional branches"); |
| 68 | |
| 69 | static cl::opt<bool> WidenFrequentBranches( |
| 70 | "guard-widening-widen-frequent-branches", cl::Hidden, |
| 71 | cl::desc("Widen conditions of explicit branches into dominating guards in " |
| 72 | "case if their taken frequency exceeds threshold set by " |
| 73 | "guard-widening-frequent-branch-threshold option"), |
| 74 | cl::init(false)); |
| 75 | |
| 76 | static cl::opt<unsigned> FrequentBranchThreshold( |
| 77 | "guard-widening-frequent-branch-threshold", cl::Hidden, |
| 78 | cl::desc("When WidenFrequentBranches is set to true, this option is used " |
| 79 | "to determine which branches are frequently taken. The criteria " |
| 80 | "that a branch is taken more often than " |
| 81 | "((FrequentBranchThreshold - 1) / FrequentBranchThreshold), then " |
| 82 | "it is considered frequently taken"), |
| 83 | cl::init(1000)); |
| 84 | |
| Max Kazantsev | eb8e9c0 | 2018-07-31 04:37:11 +0000 | [diff] [blame] | 85 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 86 | namespace { |
| 87 | |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 88 | // Get the condition of \p I. It can either be a guard or a conditional branch. |
| 89 | static Value *getCondition(Instruction *I) { |
| 90 | if (IntrinsicInst *GI = dyn_cast<IntrinsicInst>(I)) { |
| 91 | assert(GI->getIntrinsicID() == Intrinsic::experimental_guard && |
| 92 | "Bad guard intrinsic?"); |
| 93 | return GI->getArgOperand(0); |
| 94 | } |
| 95 | return cast<BranchInst>(I)->getCondition(); |
| Max Kazantsev | 65cd483 | 2018-08-03 10:16:40 +0000 | [diff] [blame] | 96 | } |
| 97 | |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 98 | // Set the condition for \p I to \p NewCond. \p I can either be a guard or a |
| 99 | // conditional branch. |
| 100 | static void setCondition(Instruction *I, Value *NewCond) { |
| 101 | if (IntrinsicInst *GI = dyn_cast<IntrinsicInst>(I)) { |
| 102 | assert(GI->getIntrinsicID() == Intrinsic::experimental_guard && |
| 103 | "Bad guard intrinsic?"); |
| 104 | GI->setArgOperand(0, NewCond); |
| 105 | return; |
| 106 | } |
| 107 | cast<BranchInst>(I)->setCondition(NewCond); |
| Max Kazantsev | 65cd483 | 2018-08-03 10:16:40 +0000 | [diff] [blame] | 108 | } |
| 109 | |
| Max Kazantsev | 65cd483 | 2018-08-03 10:16:40 +0000 | [diff] [blame] | 110 | // Eliminates the guard instruction properly. |
| 111 | static void eliminateGuard(Instruction *GuardInst) { |
| 112 | GuardInst->eraseFromParent(); |
| 113 | ++GuardsEliminated; |
| 114 | } |
| 115 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 116 | class GuardWideningImpl { |
| 117 | DominatorTree &DT; |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 118 | PostDominatorTree *PDT; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 119 | LoopInfo &LI; |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 120 | BranchProbabilityInfo *BPI; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 121 | |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 122 | /// Together, these describe the region of interest. This might be all of |
| 123 | /// the blocks within a function, or only a given loop's blocks and preheader. |
| 124 | DomTreeNode *Root; |
| 125 | std::function<bool(BasicBlock*)> BlockFilter; |
| 126 | |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 127 | /// The set of guards and conditional branches whose conditions have been |
| 128 | /// widened into dominating guards. |
| 129 | SmallVector<Instruction *, 16> EliminatedGuardsAndBranches; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 130 | |
| 131 | /// The set of guards which have been widened to include conditions to other |
| 132 | /// guards. |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 133 | DenseSet<Instruction *> WidenedGuards; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 134 | |
| 135 | /// Try to eliminate guard \p Guard by widening it into an earlier dominating |
| 136 | /// guard. \p DFSI is the DFS iterator on the dominator tree that is |
| 137 | /// currently visiting the block containing \p Guard, and \p GuardsPerBlock |
| 138 | /// maps BasicBlocks to the set of guards seen in that block. |
| 139 | bool eliminateGuardViaWidening( |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 140 | Instruction *Guard, const df_iterator<DomTreeNode *> &DFSI, |
| 141 | const DenseMap<BasicBlock *, SmallVector<Instruction *, 8>> & |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 142 | GuardsPerBlock, bool InvertCondition = false); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 143 | |
| 144 | /// Used to keep track of which widening potential is more effective. |
| 145 | enum WideningScore { |
| 146 | /// Don't widen. |
| 147 | WS_IllegalOrNegative, |
| 148 | |
| 149 | /// Widening is performance neutral as far as the cycles spent in check |
| 150 | /// conditions goes (but can still help, e.g., code layout, having less |
| 151 | /// deopt state). |
| 152 | WS_Neutral, |
| 153 | |
| 154 | /// Widening is profitable. |
| 155 | WS_Positive, |
| 156 | |
| 157 | /// Widening is very profitable. Not significantly different from \c |
| 158 | /// WS_Positive, except by the order. |
| 159 | WS_VeryPositive |
| 160 | }; |
| 161 | |
| 162 | static StringRef scoreTypeToString(WideningScore WS); |
| 163 | |
| 164 | /// Compute the score for widening the condition in \p DominatedGuard |
| 165 | /// (contained in \p DominatedGuardLoop) into \p DominatingGuard (contained in |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 166 | /// \p DominatingGuardLoop). If \p InvertCond is set, then we widen the |
| 167 | /// inverted condition of the dominating guard. |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 168 | WideningScore computeWideningScore(Instruction *DominatedGuard, |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 169 | Loop *DominatedGuardLoop, |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 170 | Instruction *DominatingGuard, |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 171 | Loop *DominatingGuardLoop, |
| 172 | bool InvertCond); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 173 | |
| 174 | /// Helper to check if \p V can be hoisted to \p InsertPos. |
| 175 | bool isAvailableAt(Value *V, Instruction *InsertPos) { |
| 176 | SmallPtrSet<Instruction *, 8> Visited; |
| 177 | return isAvailableAt(V, InsertPos, Visited); |
| 178 | } |
| 179 | |
| 180 | bool isAvailableAt(Value *V, Instruction *InsertPos, |
| 181 | SmallPtrSetImpl<Instruction *> &Visited); |
| 182 | |
| 183 | /// Helper to hoist \p V to \p InsertPos. Guaranteed to succeed if \c |
| 184 | /// isAvailableAt returned true. |
| 185 | void makeAvailableAt(Value *V, Instruction *InsertPos); |
| 186 | |
| 187 | /// Common helper used by \c widenGuard and \c isWideningCondProfitable. Try |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 188 | /// to generate an expression computing the logical AND of \p Cond0 and (\p |
| 189 | /// Cond1 XOR \p InvertCondition). |
| 190 | /// Return true if the expression computing the AND is only as |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 191 | /// expensive as computing one of the two. If \p InsertPt is true then |
| 192 | /// actually generate the resulting expression, make it available at \p |
| 193 | /// InsertPt and return it in \p Result (else no change to the IR is made). |
| 194 | bool widenCondCommon(Value *Cond0, Value *Cond1, Instruction *InsertPt, |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 195 | Value *&Result, bool InvertCondition); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 196 | |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 197 | /// Represents a range check of the form \c Base + \c Offset u< \c Length, |
| 198 | /// with the constraint that \c Length is not negative. \c CheckInst is the |
| 199 | /// pre-existing instruction in the IR that computes the result of this range |
| 200 | /// check. |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 201 | class RangeCheck { |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 202 | Value *Base; |
| 203 | ConstantInt *Offset; |
| 204 | Value *Length; |
| 205 | ICmpInst *CheckInst; |
| 206 | |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 207 | public: |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 208 | explicit RangeCheck(Value *Base, ConstantInt *Offset, Value *Length, |
| 209 | ICmpInst *CheckInst) |
| 210 | : Base(Base), Offset(Offset), Length(Length), CheckInst(CheckInst) {} |
| 211 | |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 212 | void setBase(Value *NewBase) { Base = NewBase; } |
| 213 | void setOffset(ConstantInt *NewOffset) { Offset = NewOffset; } |
| 214 | |
| 215 | Value *getBase() const { return Base; } |
| 216 | ConstantInt *getOffset() const { return Offset; } |
| 217 | const APInt &getOffsetValue() const { return getOffset()->getValue(); } |
| 218 | Value *getLength() const { return Length; }; |
| 219 | ICmpInst *getCheckInst() const { return CheckInst; } |
| 220 | |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 221 | void print(raw_ostream &OS, bool PrintTypes = false) { |
| 222 | OS << "Base: "; |
| 223 | Base->printAsOperand(OS, PrintTypes); |
| 224 | OS << " Offset: "; |
| 225 | Offset->printAsOperand(OS, PrintTypes); |
| 226 | OS << " Length: "; |
| 227 | Length->printAsOperand(OS, PrintTypes); |
| 228 | } |
| 229 | |
| 230 | LLVM_DUMP_METHOD void dump() { |
| 231 | print(dbgs()); |
| 232 | dbgs() << "\n"; |
| 233 | } |
| 234 | }; |
| 235 | |
| 236 | /// Parse \p CheckCond into a conjunction (logical-and) of range checks; and |
| 237 | /// append them to \p Checks. Returns true on success, may clobber \c Checks |
| 238 | /// on failure. |
| 239 | bool parseRangeChecks(Value *CheckCond, SmallVectorImpl<RangeCheck> &Checks) { |
| 240 | SmallPtrSet<Value *, 8> Visited; |
| 241 | return parseRangeChecks(CheckCond, Checks, Visited); |
| 242 | } |
| 243 | |
| 244 | bool parseRangeChecks(Value *CheckCond, SmallVectorImpl<RangeCheck> &Checks, |
| 245 | SmallPtrSetImpl<Value *> &Visited); |
| 246 | |
| 247 | /// Combine the checks in \p Checks into a smaller set of checks and append |
| 248 | /// them into \p CombinedChecks. Return true on success (i.e. all of checks |
| 249 | /// in \p Checks were combined into \p CombinedChecks). Clobbers \p Checks |
| 250 | /// and \p CombinedChecks on success and on failure. |
| 251 | bool combineRangeChecks(SmallVectorImpl<RangeCheck> &Checks, |
| 252 | SmallVectorImpl<RangeCheck> &CombinedChecks); |
| 253 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 254 | /// Can we compute the logical AND of \p Cond0 and \p Cond1 for the price of |
| 255 | /// computing only one of the two expressions? |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 256 | bool isWideningCondProfitable(Value *Cond0, Value *Cond1, bool InvertCond) { |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 257 | Value *ResultUnused; |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 258 | return widenCondCommon(Cond0, Cond1, /*InsertPt=*/nullptr, ResultUnused, |
| 259 | InvertCond); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 260 | } |
| 261 | |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 262 | /// If \p InvertCondition is false, Widen \p ToWiden to fail if |
| 263 | /// \p NewCondition is false, otherwise make it fail if \p NewCondition is |
| 264 | /// true (in addition to whatever it is already checking). |
| 265 | void widenGuard(Instruction *ToWiden, Value *NewCondition, |
| 266 | bool InvertCondition) { |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 267 | Value *Result; |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 268 | widenCondCommon(ToWiden->getOperand(0), NewCondition, ToWiden, Result, |
| 269 | InvertCondition); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 270 | setCondition(ToWiden, Result); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 271 | } |
| 272 | |
| 273 | public: |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 274 | |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 275 | explicit GuardWideningImpl(DominatorTree &DT, PostDominatorTree *PDT, |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 276 | LoopInfo &LI, BranchProbabilityInfo *BPI, |
| 277 | DomTreeNode *Root, |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 278 | std::function<bool(BasicBlock*)> BlockFilter) |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 279 | : DT(DT), PDT(PDT), LI(LI), BPI(BPI), Root(Root), BlockFilter(BlockFilter) |
| 280 | {} |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 281 | |
| 282 | /// The entry point for this pass. |
| 283 | bool run(); |
| 284 | }; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 285 | } |
| 286 | |
| 287 | bool GuardWideningImpl::run() { |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 288 | DenseMap<BasicBlock *, SmallVector<Instruction *, 8>> GuardsInBlock; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 289 | bool Changed = false; |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 290 | Optional<BranchProbability> LikelyTaken = None; |
| 291 | if (WidenFrequentBranches && BPI) { |
| 292 | unsigned Threshold = FrequentBranchThreshold; |
| 293 | assert(Threshold > 0 && "Zero threshold makes no sense!"); |
| Max Kazantsev | 778f62b | 2018-08-06 06:35:21 +0000 | [diff] [blame] | 294 | LikelyTaken = BranchProbability(Threshold - 1, Threshold); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 295 | } |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 296 | |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 297 | for (auto DFI = df_begin(Root), DFE = df_end(Root); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 298 | DFI != DFE; ++DFI) { |
| 299 | auto *BB = (*DFI)->getBlock(); |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 300 | if (!BlockFilter(BB)) |
| 301 | continue; |
| 302 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 303 | auto &CurrentList = GuardsInBlock[BB]; |
| 304 | |
| 305 | for (auto &I : *BB) |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 306 | if (isGuard(&I)) |
| 307 | CurrentList.push_back(cast<Instruction>(&I)); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 308 | |
| 309 | for (auto *II : CurrentList) |
| 310 | Changed |= eliminateGuardViaWidening(II, DFI, GuardsInBlock); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 311 | if (WidenFrequentBranches && BPI) |
| 312 | if (auto *BI = dyn_cast<BranchInst>(BB->getTerminator())) |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 313 | if (BI->isConditional()) { |
| 314 | // If one of branches of a conditional is likely taken, try to |
| 315 | // eliminate it. |
| 316 | if (BPI->getEdgeProbability(BB, 0U) >= *LikelyTaken) |
| 317 | Changed |= eliminateGuardViaWidening(BI, DFI, GuardsInBlock); |
| 318 | else if (BPI->getEdgeProbability(BB, 1U) >= *LikelyTaken) |
| 319 | Changed |= eliminateGuardViaWidening(BI, DFI, GuardsInBlock, |
| 320 | /*InvertCondition*/true); |
| 321 | } |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 322 | } |
| 323 | |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 324 | assert(EliminatedGuardsAndBranches.empty() || Changed); |
| 325 | for (auto *I : EliminatedGuardsAndBranches) |
| 326 | if (!WidenedGuards.count(I)) { |
| 327 | assert(isa<ConstantInt>(getCondition(I)) && "Should be!"); |
| 328 | if (isGuard(I)) |
| 329 | eliminateGuard(I); |
| 330 | else { |
| 331 | assert(isa<BranchInst>(I) && |
| 332 | "Eliminated something other than guard or branch?"); |
| 333 | ++CondBranchEliminated; |
| 334 | } |
| 335 | } |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 336 | |
| 337 | return Changed; |
| 338 | } |
| 339 | |
| 340 | bool GuardWideningImpl::eliminateGuardViaWidening( |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 341 | Instruction *GuardInst, const df_iterator<DomTreeNode *> &DFSI, |
| 342 | const DenseMap<BasicBlock *, SmallVector<Instruction *, 8>> & |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 343 | GuardsInBlock, bool InvertCondition) { |
| Max Kazantsev | 611d645 | 2018-08-22 02:40:49 +0000 | [diff] [blame] | 344 | // Ignore trivial true or false conditions. These instructions will be |
| 345 | // trivially eliminated by any cleanup pass. Do not erase them because other |
| 346 | // guards can possibly be widened into them. |
| 347 | if (isa<ConstantInt>(getCondition(GuardInst))) |
| 348 | return false; |
| 349 | |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 350 | Instruction *BestSoFar = nullptr; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 351 | auto BestScoreSoFar = WS_IllegalOrNegative; |
| 352 | auto *GuardInstLoop = LI.getLoopFor(GuardInst->getParent()); |
| 353 | |
| 354 | // In the set of dominating guards, find the one we can merge GuardInst with |
| 355 | // for the most profit. |
| 356 | for (unsigned i = 0, e = DFSI.getPathLength(); i != e; ++i) { |
| 357 | auto *CurBB = DFSI.getPath(i)->getBlock(); |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 358 | if (!BlockFilter(CurBB)) |
| 359 | break; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 360 | auto *CurLoop = LI.getLoopFor(CurBB); |
| 361 | assert(GuardsInBlock.count(CurBB) && "Must have been populated by now!"); |
| 362 | const auto &GuardsInCurBB = GuardsInBlock.find(CurBB)->second; |
| 363 | |
| 364 | auto I = GuardsInCurBB.begin(); |
| 365 | auto E = GuardsInCurBB.end(); |
| 366 | |
| 367 | #ifndef NDEBUG |
| 368 | { |
| 369 | unsigned Index = 0; |
| 370 | for (auto &I : *CurBB) { |
| 371 | if (Index == GuardsInCurBB.size()) |
| 372 | break; |
| 373 | if (GuardsInCurBB[Index] == &I) |
| 374 | Index++; |
| 375 | } |
| 376 | assert(Index == GuardsInCurBB.size() && |
| 377 | "Guards expected to be in order!"); |
| 378 | } |
| 379 | #endif |
| 380 | |
| 381 | assert((i == (e - 1)) == (GuardInst->getParent() == CurBB) && "Bad DFS?"); |
| 382 | |
| Max Kazantsev | 65970aa | 2019-02-04 09:55:18 +0000 | [diff] [blame^] | 383 | if (GuardInst->getParent() == CurBB && |
| 384 | CurBB->getTerminator() != GuardInst) { |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 385 | // Corner case: make sure we're only looking at guards strictly dominating |
| 386 | // GuardInst when visiting GuardInst->getParent(). |
| 387 | auto NewEnd = std::find(I, E, GuardInst); |
| 388 | assert(NewEnd != E && "GuardInst not in its own block?"); |
| 389 | E = NewEnd; |
| 390 | } |
| 391 | |
| 392 | for (auto *Candidate : make_range(I, E)) { |
| 393 | auto Score = |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 394 | computeWideningScore(GuardInst, GuardInstLoop, Candidate, CurLoop, |
| 395 | InvertCondition); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 396 | LLVM_DEBUG(dbgs() << "Score between " << *getCondition(GuardInst) |
| 397 | << " and " << *getCondition(Candidate) << " is " |
| Nicola Zaghen | d34e60c | 2018-05-14 12:53:11 +0000 | [diff] [blame] | 398 | << scoreTypeToString(Score) << "\n"); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 399 | if (Score > BestScoreSoFar) { |
| 400 | BestScoreSoFar = Score; |
| 401 | BestSoFar = Candidate; |
| 402 | } |
| 403 | } |
| 404 | } |
| 405 | |
| 406 | if (BestScoreSoFar == WS_IllegalOrNegative) { |
| Nicola Zaghen | d34e60c | 2018-05-14 12:53:11 +0000 | [diff] [blame] | 407 | LLVM_DEBUG(dbgs() << "Did not eliminate guard " << *GuardInst << "\n"); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 408 | return false; |
| 409 | } |
| 410 | |
| 411 | assert(BestSoFar != GuardInst && "Should have never visited same guard!"); |
| 412 | assert(DT.dominates(BestSoFar, GuardInst) && "Should be!"); |
| 413 | |
| Nicola Zaghen | d34e60c | 2018-05-14 12:53:11 +0000 | [diff] [blame] | 414 | LLVM_DEBUG(dbgs() << "Widening " << *GuardInst << " into " << *BestSoFar |
| 415 | << " with score " << scoreTypeToString(BestScoreSoFar) |
| 416 | << "\n"); |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 417 | widenGuard(BestSoFar, getCondition(GuardInst), InvertCondition); |
| 418 | auto NewGuardCondition = InvertCondition |
| 419 | ? ConstantInt::getFalse(GuardInst->getContext()) |
| 420 | : ConstantInt::getTrue(GuardInst->getContext()); |
| 421 | setCondition(GuardInst, NewGuardCondition); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 422 | EliminatedGuardsAndBranches.push_back(GuardInst); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 423 | WidenedGuards.insert(BestSoFar); |
| 424 | return true; |
| 425 | } |
| 426 | |
| 427 | GuardWideningImpl::WideningScore GuardWideningImpl::computeWideningScore( |
| Max Kazantsev | 3327bca | 2018-07-30 07:07:32 +0000 | [diff] [blame] | 428 | Instruction *DominatedGuard, Loop *DominatedGuardLoop, |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 429 | Instruction *DominatingGuard, Loop *DominatingGuardLoop, bool InvertCond) { |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 430 | bool HoistingOutOfLoop = false; |
| 431 | |
| 432 | if (DominatingGuardLoop != DominatedGuardLoop) { |
| Philip Reames | de5a1da | 2018-04-27 17:41:37 +0000 | [diff] [blame] | 433 | // Be conservative and don't widen into a sibling loop. TODO: If the |
| 434 | // sibling is colder, we should consider allowing this. |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 435 | if (DominatingGuardLoop && |
| 436 | !DominatingGuardLoop->contains(DominatedGuardLoop)) |
| 437 | return WS_IllegalOrNegative; |
| 438 | |
| 439 | HoistingOutOfLoop = true; |
| 440 | } |
| 441 | |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 442 | if (!isAvailableAt(getCondition(DominatedGuard), DominatingGuard)) |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 443 | return WS_IllegalOrNegative; |
| 444 | |
| Philip Reames | de5a1da | 2018-04-27 17:41:37 +0000 | [diff] [blame] | 445 | // If the guard was conditional executed, it may never be reached |
| 446 | // dynamically. There are two potential downsides to hoisting it out of the |
| 447 | // conditionally executed region: 1) we may spuriously deopt without need and |
| 448 | // 2) we have the extra cost of computing the guard condition in the common |
| 449 | // case. At the moment, we really only consider the second in our heuristic |
| 450 | // here. TODO: evaluate cost model for spurious deopt |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 451 | // NOTE: As written, this also lets us hoist right over another guard which |
| Fangrui Song | f78650a | 2018-07-30 19:41:25 +0000 | [diff] [blame] | 452 | // is essentially just another spelling for control flow. |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 453 | if (isWideningCondProfitable(getCondition(DominatedGuard), |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 454 | getCondition(DominatingGuard), InvertCond)) |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 455 | return HoistingOutOfLoop ? WS_VeryPositive : WS_Positive; |
| 456 | |
| 457 | if (HoistingOutOfLoop) |
| 458 | return WS_Positive; |
| 459 | |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 460 | // Returns true if we might be hoisting above explicit control flow. Note |
| 461 | // that this completely ignores implicit control flow (guards, calls which |
| 462 | // throw, etc...). That choice appears arbitrary. |
| 463 | auto MaybeHoistingOutOfIf = [&]() { |
| 464 | auto *DominatingBlock = DominatingGuard->getParent(); |
| 465 | auto *DominatedBlock = DominatedGuard->getParent(); |
| Fangrui Song | f78650a | 2018-07-30 19:41:25 +0000 | [diff] [blame] | 466 | |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 467 | // Same Block? |
| 468 | if (DominatedBlock == DominatingBlock) |
| 469 | return false; |
| 470 | // Obvious successor (common loop header/preheader case) |
| 471 | if (DominatedBlock == DominatingBlock->getUniqueSuccessor()) |
| 472 | return false; |
| 473 | // TODO: diamond, triangle cases |
| 474 | if (!PDT) return true; |
| Max Kazantsev | 9b25bf3 | 2018-12-25 07:20:06 +0000 | [diff] [blame] | 475 | return !PDT->dominates(DominatedBlock, DominatingBlock); |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 476 | }; |
| 477 | |
| 478 | return MaybeHoistingOutOfIf() ? WS_IllegalOrNegative : WS_Neutral; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 479 | } |
| 480 | |
| 481 | bool GuardWideningImpl::isAvailableAt(Value *V, Instruction *Loc, |
| 482 | SmallPtrSetImpl<Instruction *> &Visited) { |
| 483 | auto *Inst = dyn_cast<Instruction>(V); |
| 484 | if (!Inst || DT.dominates(Inst, Loc) || Visited.count(Inst)) |
| 485 | return true; |
| 486 | |
| 487 | if (!isSafeToSpeculativelyExecute(Inst, Loc, &DT) || |
| 488 | Inst->mayReadFromMemory()) |
| 489 | return false; |
| 490 | |
| 491 | Visited.insert(Inst); |
| 492 | |
| 493 | // We only want to go _up_ the dominance chain when recursing. |
| 494 | assert(!isa<PHINode>(Loc) && |
| 495 | "PHIs should return false for isSafeToSpeculativelyExecute"); |
| 496 | assert(DT.isReachableFromEntry(Inst->getParent()) && |
| 497 | "We did a DFS from the block entry!"); |
| 498 | return all_of(Inst->operands(), |
| 499 | [&](Value *Op) { return isAvailableAt(Op, Loc, Visited); }); |
| 500 | } |
| 501 | |
| 502 | void GuardWideningImpl::makeAvailableAt(Value *V, Instruction *Loc) { |
| 503 | auto *Inst = dyn_cast<Instruction>(V); |
| 504 | if (!Inst || DT.dominates(Inst, Loc)) |
| 505 | return; |
| 506 | |
| 507 | assert(isSafeToSpeculativelyExecute(Inst, Loc, &DT) && |
| 508 | !Inst->mayReadFromMemory() && "Should've checked with isAvailableAt!"); |
| 509 | |
| 510 | for (Value *Op : Inst->operands()) |
| 511 | makeAvailableAt(Op, Loc); |
| 512 | |
| 513 | Inst->moveBefore(Loc); |
| 514 | } |
| 515 | |
| 516 | bool GuardWideningImpl::widenCondCommon(Value *Cond0, Value *Cond1, |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 517 | Instruction *InsertPt, Value *&Result, |
| 518 | bool InvertCondition) { |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 519 | using namespace llvm::PatternMatch; |
| 520 | |
| 521 | { |
| 522 | // L >u C0 && L >u C1 -> L >u max(C0, C1) |
| 523 | ConstantInt *RHS0, *RHS1; |
| 524 | Value *LHS; |
| 525 | ICmpInst::Predicate Pred0, Pred1; |
| 526 | if (match(Cond0, m_ICmp(Pred0, m_Value(LHS), m_ConstantInt(RHS0))) && |
| 527 | match(Cond1, m_ICmp(Pred1, m_Specific(LHS), m_ConstantInt(RHS1)))) { |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 528 | if (InvertCondition) |
| 529 | Pred1 = ICmpInst::getInversePredicate(Pred1); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 530 | |
| Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 531 | ConstantRange CR0 = |
| 532 | ConstantRange::makeExactICmpRegion(Pred0, RHS0->getValue()); |
| 533 | ConstantRange CR1 = |
| 534 | ConstantRange::makeExactICmpRegion(Pred1, RHS1->getValue()); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 535 | |
| Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 536 | // SubsetIntersect is a subset of the actual mathematical intersection of |
| Sanjay Patel | f8ee0e0 | 2016-06-19 17:20:27 +0000 | [diff] [blame] | 537 | // CR0 and CR1, while SupersetIntersect is a superset of the actual |
| Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 538 | // mathematical intersection. If these two ConstantRanges are equal, then |
| 539 | // we know we were able to represent the actual mathematical intersection |
| 540 | // of CR0 and CR1, and can use the same to generate an icmp instruction. |
| 541 | // |
| 542 | // Given what we're doing here and the semantics of guards, it would |
| 543 | // actually be correct to just use SubsetIntersect, but that may be too |
| 544 | // aggressive in cases we care about. |
| 545 | auto SubsetIntersect = CR0.inverse().unionWith(CR1.inverse()).inverse(); |
| 546 | auto SupersetIntersect = CR0.intersectWith(CR1); |
| 547 | |
| 548 | APInt NewRHSAP; |
| 549 | CmpInst::Predicate Pred; |
| 550 | if (SubsetIntersect == SupersetIntersect && |
| 551 | SubsetIntersect.getEquivalentICmp(Pred, NewRHSAP)) { |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 552 | if (InsertPt) { |
| Sanjoy Das | b784ed3 | 2016-05-19 03:53:17 +0000 | [diff] [blame] | 553 | ConstantInt *NewRHS = ConstantInt::get(Cond0->getContext(), NewRHSAP); |
| 554 | Result = new ICmpInst(InsertPt, Pred, LHS, NewRHS, "wide.chk"); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 555 | } |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 556 | return true; |
| 557 | } |
| 558 | } |
| 559 | } |
| 560 | |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 561 | { |
| 562 | SmallVector<GuardWideningImpl::RangeCheck, 4> Checks, CombinedChecks; |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 563 | // TODO: Support InvertCondition case? |
| 564 | if (!InvertCondition && |
| 565 | parseRangeChecks(Cond0, Checks) && parseRangeChecks(Cond1, Checks) && |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 566 | combineRangeChecks(Checks, CombinedChecks)) { |
| 567 | if (InsertPt) { |
| 568 | Result = nullptr; |
| 569 | for (auto &RC : CombinedChecks) { |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 570 | makeAvailableAt(RC.getCheckInst(), InsertPt); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 571 | if (Result) |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 572 | Result = BinaryOperator::CreateAnd(RC.getCheckInst(), Result, "", |
| 573 | InsertPt); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 574 | else |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 575 | Result = RC.getCheckInst(); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 576 | } |
| 577 | |
| 578 | Result->setName("wide.chk"); |
| 579 | } |
| 580 | return true; |
| 581 | } |
| 582 | } |
| 583 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 584 | // Base case -- just logical-and the two conditions together. |
| 585 | |
| 586 | if (InsertPt) { |
| 587 | makeAvailableAt(Cond0, InsertPt); |
| 588 | makeAvailableAt(Cond1, InsertPt); |
| Max Kazantsev | 5c490b4 | 2018-08-13 07:58:19 +0000 | [diff] [blame] | 589 | if (InvertCondition) |
| 590 | Cond1 = BinaryOperator::CreateNot(Cond1, "inverted", InsertPt); |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 591 | Result = BinaryOperator::CreateAnd(Cond0, Cond1, "wide.chk", InsertPt); |
| 592 | } |
| 593 | |
| 594 | // We were not able to compute Cond0 AND Cond1 for the price of one. |
| 595 | return false; |
| 596 | } |
| 597 | |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 598 | bool GuardWideningImpl::parseRangeChecks( |
| 599 | Value *CheckCond, SmallVectorImpl<GuardWideningImpl::RangeCheck> &Checks, |
| 600 | SmallPtrSetImpl<Value *> &Visited) { |
| 601 | if (!Visited.insert(CheckCond).second) |
| 602 | return true; |
| 603 | |
| 604 | using namespace llvm::PatternMatch; |
| 605 | |
| 606 | { |
| 607 | Value *AndLHS, *AndRHS; |
| 608 | if (match(CheckCond, m_And(m_Value(AndLHS), m_Value(AndRHS)))) |
| 609 | return parseRangeChecks(AndLHS, Checks) && |
| 610 | parseRangeChecks(AndRHS, Checks); |
| 611 | } |
| 612 | |
| 613 | auto *IC = dyn_cast<ICmpInst>(CheckCond); |
| 614 | if (!IC || !IC->getOperand(0)->getType()->isIntegerTy() || |
| 615 | (IC->getPredicate() != ICmpInst::ICMP_ULT && |
| 616 | IC->getPredicate() != ICmpInst::ICMP_UGT)) |
| 617 | return false; |
| 618 | |
| 619 | Value *CmpLHS = IC->getOperand(0), *CmpRHS = IC->getOperand(1); |
| 620 | if (IC->getPredicate() == ICmpInst::ICMP_UGT) |
| 621 | std::swap(CmpLHS, CmpRHS); |
| 622 | |
| 623 | auto &DL = IC->getModule()->getDataLayout(); |
| 624 | |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 625 | GuardWideningImpl::RangeCheck Check( |
| 626 | CmpLHS, cast<ConstantInt>(ConstantInt::getNullValue(CmpRHS->getType())), |
| 627 | CmpRHS, IC); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 628 | |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 629 | if (!isKnownNonNegative(Check.getLength(), DL)) |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 630 | return false; |
| 631 | |
| 632 | // What we have in \c Check now is a correct interpretation of \p CheckCond. |
| 633 | // Try to see if we can move some constant offsets into the \c Offset field. |
| 634 | |
| 635 | bool Changed; |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 636 | auto &Ctx = CheckCond->getContext(); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 637 | |
| 638 | do { |
| 639 | Value *OpLHS; |
| 640 | ConstantInt *OpRHS; |
| 641 | Changed = false; |
| 642 | |
| 643 | #ifndef NDEBUG |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 644 | auto *BaseInst = dyn_cast<Instruction>(Check.getBase()); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 645 | assert((!BaseInst || DT.isReachableFromEntry(BaseInst->getParent())) && |
| 646 | "Unreachable instruction?"); |
| 647 | #endif |
| 648 | |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 649 | if (match(Check.getBase(), m_Add(m_Value(OpLHS), m_ConstantInt(OpRHS)))) { |
| 650 | Check.setBase(OpLHS); |
| 651 | APInt NewOffset = Check.getOffsetValue() + OpRHS->getValue(); |
| 652 | Check.setOffset(ConstantInt::get(Ctx, NewOffset)); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 653 | Changed = true; |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 654 | } else if (match(Check.getBase(), |
| 655 | m_Or(m_Value(OpLHS), m_ConstantInt(OpRHS)))) { |
| Craig Topper | 8205a1a | 2017-05-24 16:53:07 +0000 | [diff] [blame] | 656 | KnownBits Known = computeKnownBits(OpLHS, DL); |
| Craig Topper | b45eabc | 2017-04-26 16:39:58 +0000 | [diff] [blame] | 657 | if ((OpRHS->getValue() & Known.Zero) == OpRHS->getValue()) { |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 658 | Check.setBase(OpLHS); |
| 659 | APInt NewOffset = Check.getOffsetValue() + OpRHS->getValue(); |
| 660 | Check.setOffset(ConstantInt::get(Ctx, NewOffset)); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 661 | Changed = true; |
| 662 | } |
| 663 | } |
| 664 | } while (Changed); |
| 665 | |
| 666 | Checks.push_back(Check); |
| 667 | return true; |
| 668 | } |
| 669 | |
| 670 | bool GuardWideningImpl::combineRangeChecks( |
| 671 | SmallVectorImpl<GuardWideningImpl::RangeCheck> &Checks, |
| 672 | SmallVectorImpl<GuardWideningImpl::RangeCheck> &RangeChecksOut) { |
| 673 | unsigned OldCount = Checks.size(); |
| 674 | while (!Checks.empty()) { |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 675 | // Pick all of the range checks with a specific base and length, and try to |
| 676 | // merge them. |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 677 | Value *CurrentBase = Checks.front().getBase(); |
| 678 | Value *CurrentLength = Checks.front().getLength(); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 679 | |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 680 | SmallVector<GuardWideningImpl::RangeCheck, 3> CurrentChecks; |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 681 | |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 682 | auto IsCurrentCheck = [&](GuardWideningImpl::RangeCheck &RC) { |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 683 | return RC.getBase() == CurrentBase && RC.getLength() == CurrentLength; |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 684 | }; |
| 685 | |
| Sanjoy Das | 9020872 | 2017-02-21 00:38:44 +0000 | [diff] [blame] | 686 | copy_if(Checks, std::back_inserter(CurrentChecks), IsCurrentCheck); |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 687 | Checks.erase(remove_if(Checks, IsCurrentCheck), Checks.end()); |
| 688 | |
| 689 | assert(CurrentChecks.size() != 0 && "We know we have at least one!"); |
| 690 | |
| 691 | if (CurrentChecks.size() < 3) { |
| 692 | RangeChecksOut.insert(RangeChecksOut.end(), CurrentChecks.begin(), |
| 693 | CurrentChecks.end()); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 694 | continue; |
| 695 | } |
| 696 | |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 697 | // CurrentChecks.size() will typically be 3 here, but so far there has been |
| 698 | // no need to hard-code that fact. |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 699 | |
| Fangrui Song | 0cac726 | 2018-09-27 02:13:45 +0000 | [diff] [blame] | 700 | llvm::sort(CurrentChecks, [&](const GuardWideningImpl::RangeCheck &LHS, |
| 701 | const GuardWideningImpl::RangeCheck &RHS) { |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 702 | return LHS.getOffsetValue().slt(RHS.getOffsetValue()); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 703 | }); |
| 704 | |
| 705 | // Note: std::sort should not invalidate the ChecksStart iterator. |
| 706 | |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 707 | ConstantInt *MinOffset = CurrentChecks.front().getOffset(), |
| 708 | *MaxOffset = CurrentChecks.back().getOffset(); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 709 | |
| 710 | unsigned BitWidth = MaxOffset->getValue().getBitWidth(); |
| 711 | if ((MaxOffset->getValue() - MinOffset->getValue()) |
| 712 | .ugt(APInt::getSignedMinValue(BitWidth))) |
| 713 | return false; |
| 714 | |
| 715 | APInt MaxDiff = MaxOffset->getValue() - MinOffset->getValue(); |
| Benjamin Kramer | 46e38f3 | 2016-06-08 10:01:20 +0000 | [diff] [blame] | 716 | const APInt &HighOffset = MaxOffset->getValue(); |
| Sanjoy Das | 2351975 | 2016-05-19 23:15:59 +0000 | [diff] [blame] | 717 | auto OffsetOK = [&](const GuardWideningImpl::RangeCheck &RC) { |
| Sanjoy Das | be99153 | 2016-05-24 20:54:45 +0000 | [diff] [blame] | 718 | return (HighOffset - RC.getOffsetValue()).ult(MaxDiff); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 719 | }; |
| 720 | |
| 721 | if (MaxDiff.isMinValue() || |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 722 | !std::all_of(std::next(CurrentChecks.begin()), CurrentChecks.end(), |
| 723 | OffsetOK)) |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 724 | return false; |
| 725 | |
| 726 | // We have a series of f+1 checks as: |
| 727 | // |
| 728 | // I+k_0 u< L ... Chk_0 |
| Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 729 | // I+k_1 u< L ... Chk_1 |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 730 | // ... |
| Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 731 | // I+k_f u< L ... Chk_f |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 732 | // |
| Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 733 | // with forall i in [0,f]: k_f-k_i u< k_f-k_0 ... Precond_0 |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 734 | // k_f-k_0 u< INT_MIN+k_f ... Precond_1 |
| 735 | // k_f != k_0 ... Precond_2 |
| 736 | // |
| 737 | // Claim: |
| Sanjoy Das | 23f314d | 2017-05-03 18:29:34 +0000 | [diff] [blame] | 738 | // Chk_0 AND Chk_f implies all the other checks |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 739 | // |
| 740 | // Informal proof sketch: |
| 741 | // |
| 742 | // We will show that the integer range [I+k_0,I+k_f] does not unsigned-wrap |
| 743 | // (i.e. going from I+k_0 to I+k_f does not cross the -1,0 boundary) and |
| 744 | // thus I+k_f is the greatest unsigned value in that range. |
| 745 | // |
| 746 | // This combined with Ckh_(f+1) shows that everything in that range is u< L. |
| 747 | // Via Precond_0 we know that all of the indices in Chk_0 through Chk_(f+1) |
| 748 | // lie in [I+k_0,I+k_f], this proving our claim. |
| 749 | // |
| 750 | // To see that [I+k_0,I+k_f] is not a wrapping range, note that there are |
| 751 | // two possibilities: I+k_0 u< I+k_f or I+k_0 >u I+k_f (they can't be equal |
| 752 | // since k_0 != k_f). In the former case, [I+k_0,I+k_f] is not a wrapping |
| 753 | // range by definition, and the latter case is impossible: |
| 754 | // |
| 755 | // 0-----I+k_f---I+k_0----L---INT_MAX,INT_MIN------------------(-1) |
| 756 | // xxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx |
| 757 | // |
| 758 | // For Chk_0 to succeed, we'd have to have k_f-k_0 (the range highlighted |
| 759 | // with 'x' above) to be at least >u INT_MIN. |
| 760 | |
| Sanjoy Das | be6c7a1 | 2016-05-21 02:24:44 +0000 | [diff] [blame] | 761 | RangeChecksOut.emplace_back(CurrentChecks.front()); |
| 762 | RangeChecksOut.emplace_back(CurrentChecks.back()); |
| Sanjoy Das | f5f0331 | 2016-05-19 22:55:46 +0000 | [diff] [blame] | 763 | } |
| 764 | |
| 765 | assert(RangeChecksOut.size() <= OldCount && "We pessimized!"); |
| 766 | return RangeChecksOut.size() != OldCount; |
| 767 | } |
| 768 | |
| Florian Hahn | 6b3216a | 2017-07-31 10:07:49 +0000 | [diff] [blame] | 769 | #ifndef NDEBUG |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 770 | StringRef GuardWideningImpl::scoreTypeToString(WideningScore WS) { |
| 771 | switch (WS) { |
| 772 | case WS_IllegalOrNegative: |
| 773 | return "IllegalOrNegative"; |
| 774 | case WS_Neutral: |
| 775 | return "Neutral"; |
| 776 | case WS_Positive: |
| 777 | return "Positive"; |
| 778 | case WS_VeryPositive: |
| 779 | return "VeryPositive"; |
| 780 | } |
| 781 | |
| 782 | llvm_unreachable("Fully covered switch above!"); |
| 783 | } |
| Florian Hahn | 6b3216a | 2017-07-31 10:07:49 +0000 | [diff] [blame] | 784 | #endif |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 785 | |
| Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 786 | PreservedAnalyses GuardWideningPass::run(Function &F, |
| 787 | FunctionAnalysisManager &AM) { |
| 788 | auto &DT = AM.getResult<DominatorTreeAnalysis>(F); |
| 789 | auto &LI = AM.getResult<LoopAnalysis>(F); |
| 790 | auto &PDT = AM.getResult<PostDominatorTreeAnalysis>(F); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 791 | BranchProbabilityInfo *BPI = nullptr; |
| 792 | if (WidenFrequentBranches) |
| 793 | BPI = AM.getCachedResult<BranchProbabilityAnalysis>(F); |
| 794 | if (!GuardWideningImpl(DT, &PDT, LI, BPI, DT.getRootNode(), |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 795 | [](BasicBlock*) { return true; } ).run()) |
| Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 796 | return PreservedAnalyses::all(); |
| 797 | |
| 798 | PreservedAnalyses PA; |
| 799 | PA.preserveSet<CFGAnalyses>(); |
| 800 | return PA; |
| 801 | } |
| 802 | |
| 803 | namespace { |
| 804 | struct GuardWideningLegacyPass : public FunctionPass { |
| 805 | static char ID; |
| Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 806 | |
| 807 | GuardWideningLegacyPass() : FunctionPass(ID) { |
| 808 | initializeGuardWideningLegacyPassPass(*PassRegistry::getPassRegistry()); |
| 809 | } |
| 810 | |
| 811 | bool runOnFunction(Function &F) override { |
| 812 | if (skipFunction(F)) |
| 813 | return false; |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 814 | auto &DT = getAnalysis<DominatorTreeWrapperPass>().getDomTree(); |
| 815 | auto &LI = getAnalysis<LoopInfoWrapperPass>().getLoopInfo(); |
| 816 | auto &PDT = getAnalysis<PostDominatorTreeWrapperPass>().getPostDomTree(); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 817 | BranchProbabilityInfo *BPI = nullptr; |
| 818 | if (WidenFrequentBranches) |
| 819 | BPI = &getAnalysis<BranchProbabilityInfoWrapperPass>().getBPI(); |
| 820 | return GuardWideningImpl(DT, &PDT, LI, BPI, DT.getRootNode(), |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 821 | [](BasicBlock*) { return true; } ).run(); |
| Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 822 | } |
| 823 | |
| 824 | void getAnalysisUsage(AnalysisUsage &AU) const override { |
| 825 | AU.setPreservesCFG(); |
| 826 | AU.addRequired<DominatorTreeWrapperPass>(); |
| 827 | AU.addRequired<PostDominatorTreeWrapperPass>(); |
| 828 | AU.addRequired<LoopInfoWrapperPass>(); |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 829 | if (WidenFrequentBranches) |
| 830 | AU.addRequired<BranchProbabilityInfoWrapperPass>(); |
| Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 831 | } |
| 832 | }; |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 833 | |
| 834 | /// Same as above, but restricted to a single loop at a time. Can be |
| 835 | /// scheduled with other loop passes w/o breaking out of LPM |
| 836 | struct LoopGuardWideningLegacyPass : public LoopPass { |
| 837 | static char ID; |
| 838 | |
| 839 | LoopGuardWideningLegacyPass() : LoopPass(ID) { |
| 840 | initializeLoopGuardWideningLegacyPassPass(*PassRegistry::getPassRegistry()); |
| 841 | } |
| 842 | |
| 843 | bool runOnLoop(Loop *L, LPPassManager &LPM) override { |
| 844 | if (skipLoop(L)) |
| 845 | return false; |
| 846 | auto &DT = getAnalysis<DominatorTreeWrapperPass>().getDomTree(); |
| 847 | auto &LI = getAnalysis<LoopInfoWrapperPass>().getLoopInfo(); |
| Philip Reames | 502d4481 | 2018-04-27 23:15:56 +0000 | [diff] [blame] | 848 | auto *PDTWP = getAnalysisIfAvailable<PostDominatorTreeWrapperPass>(); |
| 849 | auto *PDT = PDTWP ? &PDTWP->getPostDomTree() : nullptr; |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 850 | BasicBlock *RootBB = L->getLoopPredecessor(); |
| 851 | if (!RootBB) |
| 852 | RootBB = L->getHeader(); |
| 853 | auto BlockFilter = [&](BasicBlock *BB) { |
| 854 | return BB == RootBB || L->contains(BB); |
| 855 | }; |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 856 | BranchProbabilityInfo *BPI = nullptr; |
| 857 | if (WidenFrequentBranches) |
| 858 | BPI = &getAnalysis<BranchProbabilityInfoWrapperPass>().getBPI(); |
| 859 | return GuardWideningImpl(DT, PDT, LI, BPI, |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 860 | DT.getNode(RootBB), BlockFilter).run(); |
| 861 | } |
| 862 | |
| 863 | void getAnalysisUsage(AnalysisUsage &AU) const override { |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 864 | if (WidenFrequentBranches) |
| 865 | AU.addRequired<BranchProbabilityInfoWrapperPass>(); |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 866 | AU.setPreservesCFG(); |
| 867 | getLoopAnalysisUsage(AU); |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 868 | AU.addPreserved<PostDominatorTreeWrapperPass>(); |
| 869 | } |
| 870 | }; |
| Philip Reames | 6a1f344 | 2018-03-23 23:41:47 +0000 | [diff] [blame] | 871 | } |
| 872 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 873 | char GuardWideningLegacyPass::ID = 0; |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 874 | char LoopGuardWideningLegacyPass::ID = 0; |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 875 | |
| 876 | INITIALIZE_PASS_BEGIN(GuardWideningLegacyPass, "guard-widening", "Widen guards", |
| 877 | false, false) |
| 878 | INITIALIZE_PASS_DEPENDENCY(DominatorTreeWrapperPass) |
| 879 | INITIALIZE_PASS_DEPENDENCY(PostDominatorTreeWrapperPass) |
| 880 | INITIALIZE_PASS_DEPENDENCY(LoopInfoWrapperPass) |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 881 | if (WidenFrequentBranches) |
| 882 | INITIALIZE_PASS_DEPENDENCY(BranchProbabilityInfoWrapperPass) |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 883 | INITIALIZE_PASS_END(GuardWideningLegacyPass, "guard-widening", "Widen guards", |
| 884 | false, false) |
| 885 | |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 886 | INITIALIZE_PASS_BEGIN(LoopGuardWideningLegacyPass, "loop-guard-widening", |
| 887 | "Widen guards (within a single loop, as a loop pass)", |
| 888 | false, false) |
| 889 | INITIALIZE_PASS_DEPENDENCY(DominatorTreeWrapperPass) |
| 890 | INITIALIZE_PASS_DEPENDENCY(PostDominatorTreeWrapperPass) |
| 891 | INITIALIZE_PASS_DEPENDENCY(LoopInfoWrapperPass) |
| Max Kazantsev | eded4ab | 2018-08-06 05:49:19 +0000 | [diff] [blame] | 892 | if (WidenFrequentBranches) |
| 893 | INITIALIZE_PASS_DEPENDENCY(BranchProbabilityInfoWrapperPass) |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 894 | INITIALIZE_PASS_END(LoopGuardWideningLegacyPass, "loop-guard-widening", |
| 895 | "Widen guards (within a single loop, as a loop pass)", |
| 896 | false, false) |
| 897 | |
| Sanjoy Das | 083f389 | 2016-05-18 22:55:34 +0000 | [diff] [blame] | 898 | FunctionPass *llvm::createGuardWideningPass() { |
| 899 | return new GuardWideningLegacyPass(); |
| 900 | } |
| Philip Reames | 9258e9d | 2018-04-27 17:29:10 +0000 | [diff] [blame] | 901 | |
| 902 | Pass *llvm::createLoopGuardWideningPass() { |
| 903 | return new LoopGuardWideningLegacyPass(); |
| 904 | } |