1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
|
; RUN: opt < %s -simplifycfg -phi-node-folding-threshold=2 -S | FileCheck %s
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
target triple = "x86_64-unknown-linux-gnu"
define i32 @test1(i32 %a, i32 %b, i32 %c) nounwind {
; CHECK: @test1
entry:
%tmp1 = icmp eq i32 %b, 0
br i1 %tmp1, label %bb1, label %bb3
bb1: ; preds = %entry
%tmp2 = icmp sgt i32 %c, 1
br i1 %tmp2, label %bb2, label %bb3
; CHECK: bb1:
; CHECK-NEXT: icmp sgt i32 %c, 1
; CHECK-NEXT: add i32 %a, 1
; CHECK-NEXT: select i1 %tmp2, i32 %tmp3, i32 %a
; CHECK-NEXT: br label %bb3
bb2: ; preds = bb1
%tmp3 = add i32 %a, 1
br label %bb3
bb3: ; preds = %bb2, %entry
%tmp4 = phi i32 [ %b, %entry ], [ %a, %bb1 ], [ %tmp3, %bb2 ]
%tmp5 = sub i32 %tmp4, 1
ret i32 %tmp5
}
declare i8 @llvm.cttz.i8(i8, i1)
define i8 @test2(i8 %a) {
; CHECK: @test2
br i1 undef, label %bb_true, label %bb_false
bb_true:
%b = tail call i8 @llvm.cttz.i8(i8 %a, i1 false)
br label %join
bb_false:
br label %join
join:
%c = phi i8 [%b, %bb_true], [%a, %bb_false]
; CHECK: select
ret i8 %c
}
define i8* @test3(i1* %dummy, i8* %a, i8* %b) {
; Test that a weird, unfolded constant cast in the PHI don't block speculation.
; CHECK: @test3
entry:
%cond1 = load volatile i1* %dummy
br i1 %cond1, label %if, label %end
if:
%cond2 = load volatile i1* %dummy
br i1 %cond2, label %then, label %end
then:
br label %end
end:
%x = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 42 to i8*), %then ]
; CHECK-NOT: phi
; CHECK: select i1 %cond2, i8* inttoptr
ret i8* %x
}
define i8* @test4(i1* %dummy, i8* %a, i8* %b) {
; Test that we don't speculate an arbitrarily large number of unfolded constant
; expressions.
; CHECK: @test4
entry:
%cond1 = load volatile i1* %dummy
br i1 %cond1, label %if, label %end
if:
%cond2 = load volatile i1* %dummy
br i1 %cond2, label %then, label %end
then:
br label %end
end:
%x1 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 1 to i8*), %then ]
%x2 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 2 to i8*), %then ]
%x3 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 3 to i8*), %then ]
%x4 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 4 to i8*), %then ]
%x5 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 5 to i8*), %then ]
%x6 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 6 to i8*), %then ]
%x7 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 7 to i8*), %then ]
%x8 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 8 to i8*), %then ]
%x9 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 9 to i8*), %then ]
%x10 = phi i8* [ %a, %entry ], [ %b, %if ], [ inttoptr (i64 10 to i8*), %then ]
; CHECK-NOT: select
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
; CHECK: phi i8*
ret i8* %x10
}
define i16 @test5(i1* %dummy, i16 %a, i16 %b) {
; Test that we speculate no-op instructions.
; CHECK: @test5
entry:
%cond1 = load volatile i1* %dummy
br i1 %cond1, label %if, label %end
if:
%cond2 = load volatile i1* %dummy
%a.conv = sext i16 %a to i32
%b.conv = sext i16 %b to i32
%cmp = icmp ult i32 %a.conv, %b.conv
br i1 %cond2, label %then, label %end
then:
%sub = sub i32 %a.conv, %b.conv
%sub.conv = trunc i32 %sub to i16
br label %end
end:
%x = phi i16 [ %a, %entry ], [ %b, %if ], [ %sub.conv, %then ]
; CHECK-NOT: phi
; CHECK: select i1
ret i16 %x
}
define i16 @test6(i1* %dummy, i64 %a, i64 %b) {
; Test that we speculate no-op instructions when those instructions are in the
; predecessor but could potentially be sunk.
; CHECK: @test6
entry:
%cond1 = load volatile i1* %dummy
%a.conv = trunc i64 %a to i16
%b.conv = trunc i64 %b to i16
br i1 %cond1, label %if, label %end
if:
%cond2 = load volatile i1* %dummy
%cond3 = load volatile i1* %dummy
%cond4 = load volatile i1* %dummy
%cmp = icmp ult i16 %a.conv, %b.conv
%a.conv2 = trunc i64 %a to i32
%b.conv2 = trunc i64 %b to i32
br i1 %cond2, label %then, label %end
then:
%sub = sub i32 %a.conv2, %b.conv2
%sub.conv = trunc i32 %sub to i16
br label %end
end:
%x = phi i16 [ %a.conv, %entry ], [ %b.conv, %if ], [ %sub.conv, %then ]
; CHECK-NOT: phi
; CHECK: select i1
ret i16 %x
}
define i16 @test7(i1* %dummy, i16 %a, i16 %b, i32 %x) {
; Test that we don't speculate when there are instructions that could
; potentially sink into the conditional block.
; CHECK: @test7
entry:
%cond1 = load volatile i1* %dummy
br i1 %cond1, label %if, label %end
if:
%cond2 = load volatile i1* %dummy
%a.conv = sext i16 %a to i32
%b.conv = sext i16 %b to i32
%cmp = icmp ult i32 %a.conv, %b.conv
%a.conv2 = add i32 %a.conv, %x
br i1 %cond2, label %then, label %end
then:
%sub = sub i32 %a.conv2, %b.conv
%sub.conv = trunc i32 %sub to i16
br label %end
end:
%y = phi i16 [ %a, %entry ], [ %b, %if ], [ %sub.conv, %then ]
; CHECK-NOT: select
; CHECK: phi i16
ret i16 %y
}
|