blob: 0a3bf7b4c31b739288ea7a1076bf470e0e2597f0 [file] [log] [blame]
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +00001//===- NaryReassociate.cpp - Reassociate n-ary expressions ----------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This pass reassociates n-ary add expressions and eliminates the redundancy
11// exposed by the reassociation.
12//
13// A motivating example:
14//
15// void foo(int a, int b) {
16// bar(a + b);
17// bar((a + 2) + b);
18// }
19//
20// An ideal compiler should reassociate (a + 2) + b to (a + b) + 2 and simplify
21// the above code to
22//
23// int t = a + b;
24// bar(t);
25// bar(t + 2);
26//
27// However, the Reassociate pass is unable to do that because it processes each
28// instruction individually and believes (a + 2) + b is the best form according
29// to its rank system.
30//
31// To address this limitation, NaryReassociate reassociates an expression in a
32// form that reuses existing instructions. As a result, NaryReassociate can
33// reassociate (a + 2) + b in the example to (a + b) + 2 because it detects that
34// (a + b) is computed before.
35//
36// NaryReassociate works as follows. For every instruction in the form of (a +
37// b) + c, it checks whether a + c or b + c is already computed by a dominating
38// instruction. If so, it then reassociates (a + b) + c into (a + c) + b or (b +
Jingyue Wu8579b812015-04-17 00:25:10 +000039// c) + a and removes the redundancy accordingly. To efficiently look up whether
40// an expression is computed before, we store each instruction seen and its SCEV
41// into an SCEV-to-instruction map.
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000042//
43// Although the algorithm pattern-matches only ternary additions, it
44// automatically handles many >3-ary expressions by walking through the function
45// in the depth-first order. For example, given
46//
47// (a + c) + d
48// ((a + b) + c) + d
49//
50// NaryReassociate first rewrites (a + b) + c to (a + c) + b, and then rewrites
51// ((a + c) + b) + d into ((a + c) + d) + b.
52//
Jingyue Wu8579b812015-04-17 00:25:10 +000053// Finally, the above dominator-based algorithm may need to be run multiple
54// iterations before emitting optimal code. One source of this need is that we
55// only split an operand when it is used only once. The above algorithm can
56// eliminate an instruction and decrease the usage count of its operands. As a
57// result, an instruction that previously had multiple uses may become a
58// single-use instruction and thus eligible for split consideration. For
59// example,
60//
61// ac = a + c
62// ab = a + b
63// abc = ab + c
64// ab2 = ab + b
65// ab2c = ab2 + c
66//
67// In the first iteration, we cannot reassociate abc to ac+b because ab is used
68// twice. However, we can reassociate ab2c to abc+b in the first iteration. As a
69// result, ab2 becomes dead and ab will be used only once in the second
70// iteration.
71//
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000072// Limitations and TODO items:
73//
Marcello Maggioni454faa82015-09-15 17:22:52 +000074// 1) We only considers n-ary adds and muls for now. This should be extended
75// and generalized.
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000076//
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000077//===----------------------------------------------------------------------===//
78
Wei Mi1cf58f82016-07-21 22:28:52 +000079#include "llvm/Transforms/Scalar/NaryReassociate.h"
Jingyue Wucf02ef32015-07-01 03:38:49 +000080#include "llvm/Analysis/ValueTracking.h"
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000081#include "llvm/IR/Module.h"
82#include "llvm/IR/PatternMatch.h"
Jingyue Wucf02ef32015-07-01 03:38:49 +000083#include "llvm/Support/Debug.h"
84#include "llvm/Support/raw_ostream.h"
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000085#include "llvm/Transforms/Scalar.h"
Jingyue Wu8579b812015-04-17 00:25:10 +000086#include "llvm/Transforms/Utils/Local.h"
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000087using namespace llvm;
88using namespace PatternMatch;
89
90#define DEBUG_TYPE "nary-reassociate"
91
92namespace {
Wei Mi1cf58f82016-07-21 22:28:52 +000093class NaryReassociateLegacyPass : public FunctionPass {
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000094public:
95 static char ID;
96
Wei Mi1cf58f82016-07-21 22:28:52 +000097 NaryReassociateLegacyPass() : FunctionPass(ID) {
98 initializeNaryReassociateLegacyPassPass(*PassRegistry::getPassRegistry());
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +000099 }
100
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000101 bool doInitialization(Module &M) override {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000102 return false;
103 }
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000104 bool runOnFunction(Function &F) override;
105
106 void getAnalysisUsage(AnalysisUsage &AU) const override {
107 AU.addPreserved<DominatorTreeWrapperPass>();
Chandler Carruth2f1fd162015-08-17 02:08:17 +0000108 AU.addPreserved<ScalarEvolutionWrapperPass>();
Jingyue Wu8579b812015-04-17 00:25:10 +0000109 AU.addPreserved<TargetLibraryInfoWrapperPass>();
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000110 AU.addRequired<AssumptionCacheTracker>();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000111 AU.addRequired<DominatorTreeWrapperPass>();
Chandler Carruth2f1fd162015-08-17 02:08:17 +0000112 AU.addRequired<ScalarEvolutionWrapperPass>();
Jingyue Wu8579b812015-04-17 00:25:10 +0000113 AU.addRequired<TargetLibraryInfoWrapperPass>();
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000114 AU.addRequired<TargetTransformInfoWrapperPass>();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000115 AU.setPreservesCFG();
116 }
117
118private:
Wei Mi1cf58f82016-07-21 22:28:52 +0000119 NaryReassociatePass Impl;
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000120};
121} // anonymous namespace
122
Wei Mi1cf58f82016-07-21 22:28:52 +0000123char NaryReassociateLegacyPass::ID = 0;
124INITIALIZE_PASS_BEGIN(NaryReassociateLegacyPass, "nary-reassociate",
125 "Nary reassociation", false, false)
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000126INITIALIZE_PASS_DEPENDENCY(AssumptionCacheTracker)
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000127INITIALIZE_PASS_DEPENDENCY(DominatorTreeWrapperPass)
Chandler Carruth2f1fd162015-08-17 02:08:17 +0000128INITIALIZE_PASS_DEPENDENCY(ScalarEvolutionWrapperPass)
Jingyue Wu8579b812015-04-17 00:25:10 +0000129INITIALIZE_PASS_DEPENDENCY(TargetLibraryInfoWrapperPass)
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000130INITIALIZE_PASS_DEPENDENCY(TargetTransformInfoWrapperPass)
Wei Mi1cf58f82016-07-21 22:28:52 +0000131INITIALIZE_PASS_END(NaryReassociateLegacyPass, "nary-reassociate",
132 "Nary reassociation", false, false)
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000133
134FunctionPass *llvm::createNaryReassociatePass() {
Wei Mi1cf58f82016-07-21 22:28:52 +0000135 return new NaryReassociateLegacyPass();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000136}
137
Wei Mi1cf58f82016-07-21 22:28:52 +0000138bool NaryReassociateLegacyPass::runOnFunction(Function &F) {
Andrew Kayloraa641a52016-04-22 22:06:11 +0000139 if (skipFunction(F))
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000140 return false;
141
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000142 auto *AC = &getAnalysis<AssumptionCacheTracker>().getAssumptionCache(F);
Wei Mi1cf58f82016-07-21 22:28:52 +0000143 auto *DT = &getAnalysis<DominatorTreeWrapperPass>().getDomTree();
144 auto *SE = &getAnalysis<ScalarEvolutionWrapperPass>().getSE();
145 auto *TLI = &getAnalysis<TargetLibraryInfoWrapperPass>().getTLI();
146 auto *TTI = &getAnalysis<TargetTransformInfoWrapperPass>().getTTI(F);
147
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000148 return Impl.runImpl(F, AC, DT, SE, TLI, TTI);
Wei Mi1cf58f82016-07-21 22:28:52 +0000149}
150
151PreservedAnalyses NaryReassociatePass::run(Function &F,
152 FunctionAnalysisManager &AM) {
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000153 auto *AC = &AM.getResult<AssumptionAnalysis>(F);
Wei Mi1cf58f82016-07-21 22:28:52 +0000154 auto *DT = &AM.getResult<DominatorTreeAnalysis>(F);
155 auto *SE = &AM.getResult<ScalarEvolutionAnalysis>(F);
156 auto *TLI = &AM.getResult<TargetLibraryAnalysis>(F);
157 auto *TTI = &AM.getResult<TargetIRAnalysis>(F);
158
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000159 bool Changed = runImpl(F, AC, DT, SE, TLI, TTI);
Sean Silva0873e7d2016-08-08 07:03:49 +0000160
161 // FIXME: We need to invalidate this to avoid PR28400. Is there a better
162 // solution?
Sean Silva7f21f4b2016-08-08 05:38:06 +0000163 AM.invalidate<ScalarEvolutionAnalysis>(F);
Sean Silva0873e7d2016-08-08 07:03:49 +0000164
Wei Mi1cf58f82016-07-21 22:28:52 +0000165 if (!Changed)
166 return PreservedAnalyses::all();
167
168 // FIXME: This should also 'preserve the CFG'.
169 PreservedAnalyses PA;
170 PA.preserve<DominatorTreeAnalysis>();
171 PA.preserve<ScalarEvolutionAnalysis>();
172 PA.preserve<TargetLibraryAnalysis>();
173 return PA;
174}
175
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000176bool NaryReassociatePass::runImpl(Function &F, AssumptionCache *AC_,
177 DominatorTree *DT_, ScalarEvolution *SE_,
Wei Mi1cf58f82016-07-21 22:28:52 +0000178 TargetLibraryInfo *TLI_,
179 TargetTransformInfo *TTI_) {
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000180 AC = AC_;
Wei Mi1cf58f82016-07-21 22:28:52 +0000181 DT = DT_;
182 SE = SE_;
183 TLI = TLI_;
184 TTI = TTI_;
185 DL = &F.getParent()->getDataLayout();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000186
Jingyue Wu8579b812015-04-17 00:25:10 +0000187 bool Changed = false, ChangedInThisIteration;
188 do {
189 ChangedInThisIteration = doOneIteration(F);
190 Changed |= ChangedInThisIteration;
191 } while (ChangedInThisIteration);
192 return Changed;
193}
194
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000195// Whitelist the instruction types NaryReassociate handles for now.
196static bool isPotentiallyNaryReassociable(Instruction *I) {
197 switch (I->getOpcode()) {
198 case Instruction::Add:
199 case Instruction::GetElementPtr:
Marcello Maggioni454faa82015-09-15 17:22:52 +0000200 case Instruction::Mul:
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000201 return true;
202 default:
203 return false;
204 }
205}
206
Wei Mi1cf58f82016-07-21 22:28:52 +0000207bool NaryReassociatePass::doOneIteration(Function &F) {
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000208 bool Changed = false;
209 SeenExprs.clear();
Daniel Berlina36f4632016-08-19 22:06:23 +0000210 // Process the basic blocks in a depth first traversal of the dominator
211 // tree. This order ensures that all bases of a candidate are in Candidates
212 // when we process it.
213 for (const auto Node : depth_first(DT)) {
214 BasicBlock *BB = Node->getBlock();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000215 for (auto I = BB->begin(); I != BB->end(); ++I) {
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000216 if (SE->isSCEVable(I->getType()) && isPotentiallyNaryReassociable(&*I)) {
217 const SCEV *OldSCEV = SE->getSCEV(&*I);
218 if (Instruction *NewI = tryReassociate(&*I)) {
Jingyue Wu8579b812015-04-17 00:25:10 +0000219 Changed = true;
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000220 SE->forgetValue(&*I);
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000221 I->replaceAllUsesWith(NewI);
Jingyue Wudf1a1b12015-10-01 03:51:44 +0000222 // If SeenExprs constains I's WeakVH, that entry will be replaced with
223 // nullptr.
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000224 RecursivelyDeleteTriviallyDeadInstructions(&*I, TLI);
225 I = NewI->getIterator();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000226 }
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000227 // Add the rewritten instruction to SeenExprs; the original instruction
228 // is deleted.
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000229 const SCEV *NewSCEV = SE->getSCEV(&*I);
230 SeenExprs[NewSCEV].push_back(WeakVH(&*I));
Jingyue Wuc2a01462015-05-28 04:56:52 +0000231 // Ideally, NewSCEV should equal OldSCEV because tryReassociate(I)
232 // is equivalent to I. However, ScalarEvolution::getSCEV may
233 // weaken nsw causing NewSCEV not to equal OldSCEV. For example, suppose
234 // we reassociate
235 // I = &a[sext(i +nsw j)] // assuming sizeof(a[0]) = 4
236 // to
237 // NewI = &a[sext(i)] + sext(j).
238 //
239 // ScalarEvolution computes
240 // getSCEV(I) = a + 4 * sext(i + j)
241 // getSCEV(newI) = a + 4 * sext(i) + 4 * sext(j)
242 // which are different SCEVs.
243 //
244 // To alleviate this issue of ScalarEvolution not always capturing
245 // equivalence, we add I to SeenExprs[OldSCEV] as well so that we can
246 // map both SCEV before and after tryReassociate(I) to I.
247 //
248 // This improvement is exercised in @reassociate_gep_nsw in nary-gep.ll.
249 if (NewSCEV != OldSCEV)
Duncan P. N. Exon Smithbe4d8cb2015-10-13 19:26:58 +0000250 SeenExprs[OldSCEV].push_back(WeakVH(&*I));
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000251 }
252 }
253 }
254 return Changed;
255}
256
Wei Mi1cf58f82016-07-21 22:28:52 +0000257Instruction *NaryReassociatePass::tryReassociate(Instruction *I) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000258 switch (I->getOpcode()) {
259 case Instruction::Add:
Marcello Maggioni454faa82015-09-15 17:22:52 +0000260 case Instruction::Mul:
261 return tryReassociateBinaryOp(cast<BinaryOperator>(I));
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000262 case Instruction::GetElementPtr:
263 return tryReassociateGEP(cast<GetElementPtrInst>(I));
264 default:
265 llvm_unreachable("should be filtered out by isPotentiallyNaryReassociable");
266 }
267}
268
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000269static bool isGEPFoldable(GetElementPtrInst *GEP,
Jingyue Wu15f3e822016-07-08 21:48:05 +0000270 const TargetTransformInfo *TTI) {
271 SmallVector<const Value*, 4> Indices;
272 for (auto I = GEP->idx_begin(); I != GEP->idx_end(); ++I)
273 Indices.push_back(*I);
274 return TTI->getGEPCost(GEP->getSourceElementType(), GEP->getPointerOperand(),
275 Indices) == TargetTransformInfo::TCC_Free;
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000276}
277
Wei Mi1cf58f82016-07-21 22:28:52 +0000278Instruction *NaryReassociatePass::tryReassociateGEP(GetElementPtrInst *GEP) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000279 // Not worth reassociating GEP if it is foldable.
Jingyue Wu15f3e822016-07-08 21:48:05 +0000280 if (isGEPFoldable(GEP, TTI))
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000281 return nullptr;
282
283 gep_type_iterator GTI = gep_type_begin(*GEP);
Peter Collingbourneab85225b2016-12-02 02:24:42 +0000284 for (unsigned I = 1, E = GEP->getNumOperands(); I != E; ++I, ++GTI) {
285 if (GTI.isSequential()) {
286 if (auto *NewGEP = tryReassociateGEPAtIndex(GEP, I - 1,
287 GTI.getIndexedType())) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000288 return NewGEP;
289 }
290 }
291 }
292 return nullptr;
293}
294
Wei Mi1cf58f82016-07-21 22:28:52 +0000295bool NaryReassociatePass::requiresSignExtension(Value *Index,
296 GetElementPtrInst *GEP) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000297 unsigned PointerSizeInBits =
298 DL->getPointerSizeInBits(GEP->getType()->getPointerAddressSpace());
299 return cast<IntegerType>(Index->getType())->getBitWidth() < PointerSizeInBits;
300}
301
302GetElementPtrInst *
Wei Mi1cf58f82016-07-21 22:28:52 +0000303NaryReassociatePass::tryReassociateGEPAtIndex(GetElementPtrInst *GEP,
304 unsigned I, Type *IndexedType) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000305 Value *IndexToSplit = GEP->getOperand(I + 1);
Jingyue Wucf02ef32015-07-01 03:38:49 +0000306 if (SExtInst *SExt = dyn_cast<SExtInst>(IndexToSplit)) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000307 IndexToSplit = SExt->getOperand(0);
Jingyue Wucf02ef32015-07-01 03:38:49 +0000308 } else if (ZExtInst *ZExt = dyn_cast<ZExtInst>(IndexToSplit)) {
309 // zext can be treated as sext if the source is non-negative.
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000310 if (isKnownNonNegative(ZExt->getOperand(0), *DL, 0, AC, GEP, DT))
Jingyue Wucf02ef32015-07-01 03:38:49 +0000311 IndexToSplit = ZExt->getOperand(0);
312 }
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000313
314 if (AddOperator *AO = dyn_cast<AddOperator>(IndexToSplit)) {
315 // If the I-th index needs sext and the underlying add is not equipped with
316 // nsw, we cannot split the add because
317 // sext(LHS + RHS) != sext(LHS) + sext(RHS).
Jingyue Wu10fcea52015-08-20 18:27:04 +0000318 if (requiresSignExtension(IndexToSplit, GEP) &&
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000319 computeOverflowForSignedAdd(AO, *DL, AC, GEP, DT) !=
Jingyue Wu10fcea52015-08-20 18:27:04 +0000320 OverflowResult::NeverOverflows)
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000321 return nullptr;
Jingyue Wu10fcea52015-08-20 18:27:04 +0000322
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000323 Value *LHS = AO->getOperand(0), *RHS = AO->getOperand(1);
324 // IndexToSplit = LHS + RHS.
325 if (auto *NewGEP = tryReassociateGEPAtIndex(GEP, I, LHS, RHS, IndexedType))
326 return NewGEP;
327 // Symmetrically, try IndexToSplit = RHS + LHS.
328 if (LHS != RHS) {
329 if (auto *NewGEP =
330 tryReassociateGEPAtIndex(GEP, I, RHS, LHS, IndexedType))
331 return NewGEP;
332 }
333 }
334 return nullptr;
335}
336
Wei Mi1cf58f82016-07-21 22:28:52 +0000337GetElementPtrInst *
338NaryReassociatePass::tryReassociateGEPAtIndex(GetElementPtrInst *GEP,
339 unsigned I, Value *LHS,
340 Value *RHS, Type *IndexedType) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000341 // Look for GEP's closest dominator that has the same SCEV as GEP except that
342 // the I-th index is replaced with LHS.
343 SmallVector<const SCEV *, 4> IndexExprs;
344 for (auto Index = GEP->idx_begin(); Index != GEP->idx_end(); ++Index)
345 IndexExprs.push_back(SE->getSCEV(*Index));
346 // Replace the I-th index with LHS.
347 IndexExprs[I] = SE->getSCEV(LHS);
Daniel Jasperaec2fa32016-12-19 08:22:17 +0000348 if (isKnownNonNegative(LHS, *DL, 0, AC, GEP, DT) &&
Jingyue Wucf02ef32015-07-01 03:38:49 +0000349 DL->getTypeSizeInBits(LHS->getType()) <
350 DL->getTypeSizeInBits(GEP->getOperand(I)->getType())) {
351 // Zero-extend LHS if it is non-negative. InstCombine canonicalizes sext to
352 // zext if the source operand is proved non-negative. We should do that
353 // consistently so that CandidateExpr more likely appears before. See
354 // @reassociate_gep_assume for an example of this canonicalization.
355 IndexExprs[I] =
356 SE->getZeroExtendExpr(IndexExprs[I], GEP->getOperand(I)->getType());
357 }
Peter Collingbourne8dff0392016-11-13 06:59:50 +0000358 const SCEV *CandidateExpr = SE->getGEPExpr(cast<GEPOperator>(GEP),
359 IndexExprs);
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000360
Jingyue Wuba3ca762015-12-18 21:36:30 +0000361 Value *Candidate = findClosestMatchingDominator(CandidateExpr, GEP);
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000362 if (Candidate == nullptr)
363 return nullptr;
364
Jingyue Wuba3ca762015-12-18 21:36:30 +0000365 IRBuilder<> Builder(GEP);
366 // Candidate does not necessarily have the same pointer type as GEP. Use
367 // bitcast or pointer cast to make sure they have the same type, so that the
368 // later RAUW doesn't complain.
369 Candidate = Builder.CreateBitOrPointerCast(Candidate, GEP->getType());
370 assert(Candidate->getType() == GEP->getType());
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000371
372 // NewGEP = (char *)Candidate + RHS * sizeof(IndexedType)
373 uint64_t IndexedSize = DL->getTypeAllocSize(IndexedType);
Eduard Burtescu19eb0312016-01-19 17:28:00 +0000374 Type *ElementType = GEP->getResultElementType();
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000375 uint64_t ElementSize = DL->getTypeAllocSize(ElementType);
376 // Another less rare case: because I is not necessarily the last index of the
377 // GEP, the size of the type at the I-th index (IndexedSize) is not
378 // necessarily divisible by ElementSize. For example,
379 //
380 // #pragma pack(1)
381 // struct S {
382 // int a[3];
383 // int64 b[8];
384 // };
385 // #pragma pack()
386 //
387 // sizeof(S) = 100 is indivisible by sizeof(int64) = 8.
388 //
389 // TODO: bail out on this case for now. We could emit uglygep.
390 if (IndexedSize % ElementSize != 0)
391 return nullptr;
392
393 // NewGEP = &Candidate[RHS * (sizeof(IndexedType) / sizeof(Candidate[0])));
Jingyue Wuba3ca762015-12-18 21:36:30 +0000394 Type *IntPtrTy = DL->getIntPtrType(GEP->getType());
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000395 if (RHS->getType() != IntPtrTy)
396 RHS = Builder.CreateSExtOrTrunc(RHS, IntPtrTy);
397 if (IndexedSize != ElementSize) {
398 RHS = Builder.CreateMul(
399 RHS, ConstantInt::get(IntPtrTy, IndexedSize / ElementSize));
400 }
401 GetElementPtrInst *NewGEP =
402 cast<GetElementPtrInst>(Builder.CreateGEP(Candidate, RHS));
403 NewGEP->setIsInBounds(GEP->isInBounds());
404 NewGEP->takeName(GEP);
405 return NewGEP;
406}
407
Wei Mi1cf58f82016-07-21 22:28:52 +0000408Instruction *NaryReassociatePass::tryReassociateBinaryOp(BinaryOperator *I) {
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000409 Value *LHS = I->getOperand(0), *RHS = I->getOperand(1);
Marcello Maggioni454faa82015-09-15 17:22:52 +0000410 if (auto *NewI = tryReassociateBinaryOp(LHS, RHS, I))
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000411 return NewI;
Marcello Maggioni454faa82015-09-15 17:22:52 +0000412 if (auto *NewI = tryReassociateBinaryOp(RHS, LHS, I))
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000413 return NewI;
414 return nullptr;
415}
416
Wei Mi1cf58f82016-07-21 22:28:52 +0000417Instruction *NaryReassociatePass::tryReassociateBinaryOp(Value *LHS, Value *RHS,
418 BinaryOperator *I) {
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000419 Value *A = nullptr, *B = nullptr;
Marcello Maggioni454faa82015-09-15 17:22:52 +0000420 // To be conservative, we reassociate I only when it is the only user of (A op
421 // B).
422 if (LHS->hasOneUse() && matchTernaryOp(I, LHS, A, B)) {
423 // I = (A op B) op RHS
424 // = (A op RHS) op B or (B op RHS) op A
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000425 const SCEV *AExpr = SE->getSCEV(A), *BExpr = SE->getSCEV(B);
426 const SCEV *RHSExpr = SE->getSCEV(RHS);
Jingyue Wuc74e33b2015-05-13 18:12:24 +0000427 if (BExpr != RHSExpr) {
Marcello Maggioni454faa82015-09-15 17:22:52 +0000428 if (auto *NewI =
429 tryReassociatedBinaryOp(getBinarySCEV(I, AExpr, RHSExpr), B, I))
Jingyue Wuc74e33b2015-05-13 18:12:24 +0000430 return NewI;
431 }
432 if (AExpr != RHSExpr) {
Marcello Maggioni454faa82015-09-15 17:22:52 +0000433 if (auto *NewI =
434 tryReassociatedBinaryOp(getBinarySCEV(I, BExpr, RHSExpr), A, I))
Jingyue Wuc74e33b2015-05-13 18:12:24 +0000435 return NewI;
436 }
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000437 }
438 return nullptr;
439}
440
Wei Mi1cf58f82016-07-21 22:28:52 +0000441Instruction *NaryReassociatePass::tryReassociatedBinaryOp(const SCEV *LHSExpr,
442 Value *RHS,
443 BinaryOperator *I) {
Jingyue Wu771dfe92015-04-16 18:42:31 +0000444 // Look for the closest dominator LHS of I that computes LHSExpr, and replace
Marcello Maggioni454faa82015-09-15 17:22:52 +0000445 // I with LHS op RHS.
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000446 auto *LHS = findClosestMatchingDominator(LHSExpr, I);
447 if (LHS == nullptr)
448 return nullptr;
449
Marcello Maggioni454faa82015-09-15 17:22:52 +0000450 Instruction *NewI = nullptr;
451 switch (I->getOpcode()) {
452 case Instruction::Add:
453 NewI = BinaryOperator::CreateAdd(LHS, RHS, "", I);
454 break;
455 case Instruction::Mul:
456 NewI = BinaryOperator::CreateMul(LHS, RHS, "", I);
457 break;
458 default:
459 llvm_unreachable("Unexpected instruction.");
460 }
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000461 NewI->takeName(I);
462 return NewI;
463}
464
Wei Mi1cf58f82016-07-21 22:28:52 +0000465bool NaryReassociatePass::matchTernaryOp(BinaryOperator *I, Value *V,
466 Value *&Op1, Value *&Op2) {
Marcello Maggioni454faa82015-09-15 17:22:52 +0000467 switch (I->getOpcode()) {
468 case Instruction::Add:
469 return match(V, m_Add(m_Value(Op1), m_Value(Op2)));
470 case Instruction::Mul:
471 return match(V, m_Mul(m_Value(Op1), m_Value(Op2)));
472 default:
473 llvm_unreachable("Unexpected instruction.");
474 }
475 return false;
476}
477
Wei Mi1cf58f82016-07-21 22:28:52 +0000478const SCEV *NaryReassociatePass::getBinarySCEV(BinaryOperator *I,
479 const SCEV *LHS,
480 const SCEV *RHS) {
Marcello Maggioni454faa82015-09-15 17:22:52 +0000481 switch (I->getOpcode()) {
482 case Instruction::Add:
483 return SE->getAddExpr(LHS, RHS);
484 case Instruction::Mul:
485 return SE->getMulExpr(LHS, RHS);
486 default:
487 llvm_unreachable("Unexpected instruction.");
488 }
489 return nullptr;
490}
491
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000492Instruction *
Wei Mi1cf58f82016-07-21 22:28:52 +0000493NaryReassociatePass::findClosestMatchingDominator(const SCEV *CandidateExpr,
494 Instruction *Dominatee) {
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000495 auto Pos = SeenExprs.find(CandidateExpr);
496 if (Pos == SeenExprs.end())
497 return nullptr;
498
499 auto &Candidates = Pos->second;
500 // Because we process the basic blocks in pre-order of the dominator tree, a
Jingyue Wu771dfe92015-04-16 18:42:31 +0000501 // candidate that doesn't dominate the current instruction won't dominate any
502 // future instruction either. Therefore, we pop it out of the stack. This
503 // optimization makes the algorithm O(n).
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000504 while (!Candidates.empty()) {
Jingyue Wudf1a1b12015-10-01 03:51:44 +0000505 // Candidates stores WeakVHs, so a candidate can be nullptr if it's removed
506 // during rewriting.
507 if (Value *Candidate = Candidates.back()) {
508 Instruction *CandidateInstruction = cast<Instruction>(Candidate);
509 if (DT->dominates(CandidateInstruction, Dominatee))
510 return CandidateInstruction;
511 }
Jingyue Wu4fc97f6d2015-05-21 23:17:30 +0000512 Candidates.pop_back();
Jingyue Wu8cb6b2a2015-04-14 04:59:22 +0000513 }
514 return nullptr;
515}