| File: | var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp |
| Warning: | line 483, column 9 Value stored to 'first' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- |
| 2 | * vim: set ts=8 sts=2 et sw=2 tw=80: |
| 3 | * This Source Code Form is subject to the terms of the Mozilla Public |
| 4 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 5 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 6 | |
| 7 | #include "jit/RangeAnalysis.h" |
| 8 | |
| 9 | #include "mozilla/MathAlgorithms.h" |
| 10 | |
| 11 | #include <algorithm> |
| 12 | |
| 13 | #include "jsmath.h" |
| 14 | |
| 15 | #include "jit/CompileInfo.h" |
| 16 | #include "jit/IonAnalysis.h" |
| 17 | #include "jit/JitSpewer.h" |
| 18 | #include "jit/MIR.h" |
| 19 | #include "jit/MIRGenerator.h" |
| 20 | #include "jit/MIRGraph.h" |
| 21 | #include "js/Conversions.h" |
| 22 | #include "js/ScalarType.h" // js::Scalar::Type |
| 23 | #include "util/CheckedArithmetic.h" |
| 24 | #include "vm/ArgumentsObject.h" |
| 25 | #include "vm/TypedArrayObject.h" |
| 26 | #include "vm/Uint8Clamped.h" |
| 27 | |
| 28 | #include "vm/BytecodeUtil-inl.h" |
| 29 | |
| 30 | using namespace js; |
| 31 | using namespace js::jit; |
| 32 | |
| 33 | using JS::GenericNaN; |
| 34 | using JS::ToInt32; |
| 35 | using mozilla::Abs; |
| 36 | using mozilla::CountLeadingZeroes32; |
| 37 | using mozilla::ExponentComponent; |
| 38 | using mozilla::FloorLog2; |
| 39 | using mozilla::IsInfinite; |
| 40 | using mozilla::IsNaN; |
| 41 | using mozilla::IsNegativeZero; |
| 42 | using mozilla::NegativeInfinity; |
| 43 | using mozilla::NumberEqualsInt32; |
| 44 | using mozilla::PositiveInfinity; |
| 45 | |
| 46 | // [SMDOC] IonMonkey Range Analysis |
| 47 | // |
| 48 | // This algorithm is based on the paper "Eliminating Range Checks Using |
| 49 | // Static Single Assignment Form" by Gough and Klaren. |
| 50 | // |
| 51 | // We associate a range object with each SSA name, and the ranges are consulted |
| 52 | // in order to determine whether overflow is possible for arithmetic |
| 53 | // computations. |
| 54 | // |
| 55 | // An important source of range information that requires care to take |
| 56 | // advantage of is conditional control flow. Consider the code below: |
| 57 | // |
| 58 | // if (x < 0) { |
| 59 | // y = x + 2000000000; |
| 60 | // } else { |
| 61 | // if (x < 1000000000) { |
| 62 | // y = x * 2; |
| 63 | // } else { |
| 64 | // y = x - 3000000000; |
| 65 | // } |
| 66 | // } |
| 67 | // |
| 68 | // The arithmetic operations in this code cannot overflow, but it is not |
| 69 | // sufficient to simply associate each name with a range, since the information |
| 70 | // differs between basic blocks. The traditional dataflow approach would be |
| 71 | // associate ranges with (name, basic block) pairs. This solution is not |
| 72 | // satisfying, since we lose the benefit of SSA form: in SSA form, each |
| 73 | // definition has a unique name, so there is no need to track information about |
| 74 | // the control flow of the program. |
| 75 | // |
| 76 | // The approach used here is to add a new form of pseudo operation called a |
| 77 | // beta node, which associates range information with a value. These beta |
| 78 | // instructions take one argument and additionally have an auxiliary constant |
| 79 | // range associated with them. Operationally, beta nodes are just copies, but |
| 80 | // the invariant expressed by beta node copies is that the output will fall |
| 81 | // inside the range given by the beta node. Gough and Klaeren refer to SSA |
| 82 | // extended with these beta nodes as XSA form. The following shows the example |
| 83 | // code transformed into XSA form: |
| 84 | // |
| 85 | // if (x < 0) { |
| 86 | // x1 = Beta(x, [INT_MIN, -1]); |
| 87 | // y1 = x1 + 2000000000; |
| 88 | // } else { |
| 89 | // x2 = Beta(x, [0, INT_MAX]); |
| 90 | // if (x2 < 1000000000) { |
| 91 | // x3 = Beta(x2, [INT_MIN, 999999999]); |
| 92 | // y2 = x3*2; |
| 93 | // } else { |
| 94 | // x4 = Beta(x2, [1000000000, INT_MAX]); |
| 95 | // y3 = x4 - 3000000000; |
| 96 | // } |
| 97 | // y4 = Phi(y2, y3); |
| 98 | // } |
| 99 | // y = Phi(y1, y4); |
| 100 | // |
| 101 | // We insert beta nodes for the purposes of range analysis (they might also be |
| 102 | // usefully used for other forms of bounds check elimination) and remove them |
| 103 | // after range analysis is performed. The remaining compiler phases do not ever |
| 104 | // encounter beta nodes. |
| 105 | |
| 106 | static bool IsDominatedUse(MBasicBlock* block, MUse* use) { |
| 107 | MNode* n = use->consumer(); |
| 108 | bool isPhi = n->isDefinition() && n->toDefinition()->isPhi(); |
| 109 | |
| 110 | if (isPhi) { |
| 111 | MPhi* phi = n->toDefinition()->toPhi(); |
| 112 | return block->dominates(phi->block()->getPredecessor(phi->indexOf(use))); |
| 113 | } |
| 114 | |
| 115 | return block->dominates(n->block()); |
| 116 | } |
| 117 | |
| 118 | static inline void SpewRange(MDefinition* def) { |
| 119 | #ifdef JS_JITSPEW1 |
| 120 | if (JitSpewEnabled(JitSpew_Range) && def->type() != MIRType::None && |
| 121 | def->range()) { |
| 122 | JitSpewHeader(JitSpew_Range); |
| 123 | Fprinter& out = JitSpewPrinter(); |
| 124 | out.printf(" "); |
| 125 | def->printName(out); |
| 126 | out.printf(" has range "); |
| 127 | def->range()->dump(out); |
| 128 | out.printf("\n"); |
| 129 | } |
| 130 | #endif |
| 131 | } |
| 132 | |
| 133 | #ifdef JS_JITSPEW1 |
| 134 | static const char* TruncateKindString(TruncateKind kind) { |
| 135 | switch (kind) { |
| 136 | case TruncateKind::NoTruncate: |
| 137 | return "NoTruncate"; |
| 138 | case TruncateKind::TruncateAfterBailouts: |
| 139 | return "TruncateAfterBailouts"; |
| 140 | case TruncateKind::IndirectTruncate: |
| 141 | return "IndirectTruncate"; |
| 142 | case TruncateKind::Truncate: |
| 143 | return "Truncate"; |
| 144 | default: |
| 145 | MOZ_CRASH("Unknown truncate kind.")do { do { } while (false); MOZ_ReportCrash("" "Unknown truncate kind." , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 145); AnnotateMozCrashReason("MOZ_CRASH(" "Unknown truncate kind." ")"); do { *((volatile int*)__null) = 145; ::abort(); } while (false); } while (false); |
| 146 | } |
| 147 | } |
| 148 | |
| 149 | static inline void SpewTruncate(MDefinition* def, TruncateKind kind, |
| 150 | bool shouldClone) { |
| 151 | if (JitSpewEnabled(JitSpew_Range)) { |
| 152 | JitSpewHeader(JitSpew_Range); |
| 153 | Fprinter& out = JitSpewPrinter(); |
| 154 | out.printf(" "); |
| 155 | out.printf("truncating "); |
| 156 | def->printName(out); |
| 157 | out.printf(" (kind: %s, clone: %d)\n", TruncateKindString(kind), |
| 158 | shouldClone); |
| 159 | } |
| 160 | } |
| 161 | #else |
| 162 | static inline void SpewTruncate(MDefinition* def, TruncateKind kind, |
| 163 | bool shouldClone) {} |
| 164 | #endif |
| 165 | |
| 166 | TempAllocator& RangeAnalysis::alloc() const { return graph_.alloc(); } |
| 167 | |
| 168 | void RangeAnalysis::replaceDominatedUsesWith(MDefinition* orig, |
| 169 | MDefinition* dom, |
| 170 | MBasicBlock* block) { |
| 171 | for (MUseIterator i(orig->usesBegin()); i != orig->usesEnd();) { |
| 172 | MUse* use = *i++; |
| 173 | if (use->consumer() != dom && IsDominatedUse(block, use)) { |
| 174 | use->replaceProducer(dom); |
| 175 | } |
| 176 | } |
| 177 | } |
| 178 | |
| 179 | bool RangeAnalysis::addBetaNodes() { |
| 180 | JitSpew(JitSpew_Range, "Adding beta nodes"); |
| 181 | |
| 182 | for (PostorderIterator i(graph_.poBegin()); i != graph_.poEnd(); i++) { |
| 183 | MBasicBlock* block = *i; |
| 184 | JitSpew(JitSpew_Range, "Looking at block %u", block->id()); |
| 185 | |
| 186 | BranchDirection branch_dir; |
| 187 | MTest* test = block->immediateDominatorBranch(&branch_dir); |
| 188 | |
| 189 | if (!test || !test->getOperand(0)->isCompare()) { |
| 190 | continue; |
| 191 | } |
| 192 | |
| 193 | MCompare* compare = test->getOperand(0)->toCompare(); |
| 194 | |
| 195 | if (!compare->isNumericComparison()) { |
| 196 | continue; |
| 197 | } |
| 198 | |
| 199 | // TODO: support unsigned comparisons |
| 200 | if (compare->compareType() == MCompare::Compare_UInt32) { |
| 201 | continue; |
| 202 | } |
| 203 | |
| 204 | // isNumericComparison should return false for UIntPtr. |
| 205 | MOZ_ASSERT(compare->compareType() != MCompare::Compare_UIntPtr)do { static_assert( mozilla::detail::AssertionConditionType< decltype(compare->compareType() != MCompare::Compare_UIntPtr )>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(compare->compareType() != MCompare::Compare_UIntPtr ))), 0))) { do { } while (false); MOZ_ReportAssertionFailure( "compare->compareType() != MCompare::Compare_UIntPtr", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 205); AnnotateMozCrashReason("MOZ_ASSERT" "(" "compare->compareType() != MCompare::Compare_UIntPtr" ")"); do { *((volatile int*)__null) = 205; ::abort(); } while (false); } } while (false); |
| 206 | |
| 207 | MDefinition* left = compare->getOperand(0); |
| 208 | MDefinition* right = compare->getOperand(1); |
| 209 | double bound; |
| 210 | double conservativeLower = NegativeInfinity<double>(); |
| 211 | double conservativeUpper = PositiveInfinity<double>(); |
| 212 | MDefinition* val = nullptr; |
| 213 | |
| 214 | JSOp jsop = compare->jsop(); |
| 215 | |
| 216 | if (branch_dir == FALSE_BRANCH) { |
| 217 | jsop = NegateCompareOp(jsop); |
| 218 | conservativeLower = GenericNaN(); |
| 219 | conservativeUpper = GenericNaN(); |
| 220 | } |
| 221 | |
| 222 | MConstant* leftConst = left->maybeConstantValue(); |
| 223 | MConstant* rightConst = right->maybeConstantValue(); |
| 224 | if (leftConst && leftConst->isTypeRepresentableAsDouble()) { |
| 225 | bound = leftConst->numberToDouble(); |
| 226 | val = right; |
| 227 | jsop = ReverseCompareOp(jsop); |
| 228 | } else if (rightConst && rightConst->isTypeRepresentableAsDouble()) { |
| 229 | bound = rightConst->numberToDouble(); |
| 230 | val = left; |
| 231 | } else if (left->type() == MIRType::Int32 && |
| 232 | right->type() == MIRType::Int32) { |
| 233 | MDefinition* smaller = nullptr; |
| 234 | MDefinition* greater = nullptr; |
| 235 | if (jsop == JSOp::Lt) { |
| 236 | smaller = left; |
| 237 | greater = right; |
| 238 | } else if (jsop == JSOp::Gt) { |
| 239 | smaller = right; |
| 240 | greater = left; |
| 241 | } |
| 242 | if (smaller && greater) { |
| 243 | if (!alloc().ensureBallast()) { |
| 244 | return false; |
| 245 | } |
| 246 | |
| 247 | MBeta* beta; |
| 248 | beta = MBeta::New( |
| 249 | alloc(), smaller, |
| 250 | Range::NewInt32Range(alloc(), JSVAL_INT_MIN((int32_t)0x80000000), JSVAL_INT_MAX((int32_t)0x7fffffff) - 1)); |
| 251 | block->insertBefore(*block->begin(), beta); |
| 252 | replaceDominatedUsesWith(smaller, beta, block); |
| 253 | JitSpew(JitSpew_Range, " Adding beta node for smaller %u", |
| 254 | smaller->id()); |
| 255 | beta = MBeta::New( |
| 256 | alloc(), greater, |
| 257 | Range::NewInt32Range(alloc(), JSVAL_INT_MIN((int32_t)0x80000000) + 1, JSVAL_INT_MAX((int32_t)0x7fffffff))); |
| 258 | block->insertBefore(*block->begin(), beta); |
| 259 | replaceDominatedUsesWith(greater, beta, block); |
| 260 | JitSpew(JitSpew_Range, " Adding beta node for greater %u", |
| 261 | greater->id()); |
| 262 | } |
| 263 | continue; |
| 264 | } else { |
| 265 | continue; |
| 266 | } |
| 267 | |
| 268 | // At this point, one of the operands if the compare is a constant, and |
| 269 | // val is the other operand. |
| 270 | MOZ_ASSERT(val)do { static_assert( mozilla::detail::AssertionConditionType< decltype(val)>::isValid, "invalid assertion condition"); if ((__builtin_expect(!!(!(!!(val))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("val", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 270); AnnotateMozCrashReason("MOZ_ASSERT" "(" "val" ")"); do { *((volatile int*)__null) = 270; ::abort(); } while (false) ; } } while (false); |
| 271 | |
| 272 | Range comp; |
| 273 | switch (jsop) { |
| 274 | case JSOp::Le: |
| 275 | comp.setDouble(conservativeLower, bound); |
| 276 | break; |
| 277 | case JSOp::Lt: |
| 278 | // For integers, if x < c, the upper bound of x is c-1. |
| 279 | if (val->type() == MIRType::Int32) { |
| 280 | int32_t intbound; |
| 281 | if (NumberEqualsInt32(bound, &intbound) && |
| 282 | SafeSub(intbound, 1, &intbound)) { |
| 283 | bound = intbound; |
| 284 | } |
| 285 | } |
| 286 | comp.setDouble(conservativeLower, bound); |
| 287 | |
| 288 | // Negative zero is not less than zero. |
| 289 | if (bound == 0) { |
| 290 | comp.refineToExcludeNegativeZero(); |
| 291 | } |
| 292 | break; |
| 293 | case JSOp::Ge: |
| 294 | comp.setDouble(bound, conservativeUpper); |
| 295 | break; |
| 296 | case JSOp::Gt: |
| 297 | // For integers, if x > c, the lower bound of x is c+1. |
| 298 | if (val->type() == MIRType::Int32) { |
| 299 | int32_t intbound; |
| 300 | if (NumberEqualsInt32(bound, &intbound) && |
| 301 | SafeAdd(intbound, 1, &intbound)) { |
| 302 | bound = intbound; |
| 303 | } |
| 304 | } |
| 305 | comp.setDouble(bound, conservativeUpper); |
| 306 | |
| 307 | // Negative zero is not greater than zero. |
| 308 | if (bound == 0) { |
| 309 | comp.refineToExcludeNegativeZero(); |
| 310 | } |
| 311 | break; |
| 312 | case JSOp::StrictEq: |
| 313 | case JSOp::Eq: |
| 314 | comp.setDouble(bound, bound); |
| 315 | break; |
| 316 | case JSOp::StrictNe: |
| 317 | case JSOp::Ne: |
| 318 | // Negative zero is not not-equal to zero. |
| 319 | if (bound == 0) { |
| 320 | comp.refineToExcludeNegativeZero(); |
| 321 | break; |
| 322 | } |
| 323 | continue; // well, we could have |
| 324 | // [-\inf, bound-1] U [bound+1, \inf] but we only use |
| 325 | // contiguous ranges. |
| 326 | default: |
| 327 | continue; |
| 328 | } |
| 329 | |
| 330 | if (JitSpewEnabled(JitSpew_Range)) { |
| 331 | JitSpewHeader(JitSpew_Range); |
| 332 | Fprinter& out = JitSpewPrinter(); |
| 333 | out.printf(" Adding beta node for %u with range ", val->id()); |
| 334 | comp.dump(out); |
| 335 | out.printf("\n"); |
| 336 | } |
| 337 | |
| 338 | if (!alloc().ensureBallast()) { |
| 339 | return false; |
| 340 | } |
| 341 | |
| 342 | MBeta* beta = MBeta::New(alloc(), val, new (alloc()) Range(comp)); |
| 343 | block->insertBefore(*block->begin(), beta); |
| 344 | replaceDominatedUsesWith(val, beta, block); |
| 345 | } |
| 346 | |
| 347 | return true; |
| 348 | } |
| 349 | |
| 350 | bool RangeAnalysis::removeBetaNodes() { |
| 351 | JitSpew(JitSpew_Range, "Removing beta nodes"); |
| 352 | |
| 353 | for (PostorderIterator i(graph_.poBegin()); i != graph_.poEnd(); i++) { |
| 354 | MBasicBlock* block = *i; |
| 355 | for (MDefinitionIterator iter(*i); iter;) { |
| 356 | MDefinition* def = *iter++; |
| 357 | if (def->isBeta()) { |
| 358 | auto* beta = def->toBeta(); |
| 359 | MDefinition* op = beta->input(); |
| 360 | JitSpew(JitSpew_Range, " Removing beta node %u for %u", beta->id(), |
| 361 | op->id()); |
| 362 | beta->justReplaceAllUsesWith(op); |
| 363 | block->discard(beta); |
| 364 | } else { |
| 365 | // We only place Beta nodes at the beginning of basic |
| 366 | // blocks, so if we see something else, we can move on |
| 367 | // to the next block. |
| 368 | break; |
| 369 | } |
| 370 | } |
| 371 | } |
| 372 | return true; |
| 373 | } |
| 374 | |
| 375 | void SymbolicBound::dump(GenericPrinter& out) const { |
| 376 | if (loop) { |
| 377 | out.printf("[loop] "); |
| 378 | } |
| 379 | sum.dump(out); |
| 380 | } |
| 381 | |
| 382 | void SymbolicBound::dump() const { |
| 383 | Fprinter out(stderrstderr); |
| 384 | dump(out); |
| 385 | out.printf("\n"); |
| 386 | out.finish(); |
| 387 | } |
| 388 | |
| 389 | // Test whether the given range's exponent tells us anything that its lower |
| 390 | // and upper bound values don't. |
| 391 | static bool IsExponentInteresting(const Range* r) { |
| 392 | // If it lacks either a lower or upper bound, the exponent is interesting. |
| 393 | if (!r->hasInt32Bounds()) { |
| 394 | return true; |
| 395 | } |
| 396 | |
| 397 | // Otherwise if there's no fractional part, the lower and upper bounds, |
| 398 | // which are integers, are perfectly precise. |
| 399 | if (!r->canHaveFractionalPart()) { |
| 400 | return false; |
| 401 | } |
| 402 | |
| 403 | // Otherwise, if the bounds are conservatively rounded across a power-of-two |
| 404 | // boundary, the exponent may imply a tighter range. |
| 405 | return FloorLog2(std::max(Abs(r->lower()), Abs(r->upper()))) > r->exponent(); |
| 406 | } |
| 407 | |
| 408 | void Range::dump(GenericPrinter& out) const { |
| 409 | assertInvariants(); |
| 410 | |
| 411 | // Floating-point or Integer subset. |
| 412 | if (canHaveFractionalPart_) { |
| 413 | out.printf("F"); |
| 414 | } else { |
| 415 | out.printf("I"); |
| 416 | } |
| 417 | |
| 418 | out.printf("["); |
| 419 | |
| 420 | if (!hasInt32LowerBound_) { |
| 421 | out.printf("?"); |
| 422 | } else { |
| 423 | out.printf("%d", lower_); |
| 424 | } |
| 425 | if (symbolicLower_) { |
| 426 | out.printf(" {"); |
| 427 | symbolicLower_->dump(out); |
| 428 | out.printf("}"); |
| 429 | } |
| 430 | |
| 431 | out.printf(", "); |
| 432 | |
| 433 | if (!hasInt32UpperBound_) { |
| 434 | out.printf("?"); |
| 435 | } else { |
| 436 | out.printf("%d", upper_); |
| 437 | } |
| 438 | if (symbolicUpper_) { |
| 439 | out.printf(" {"); |
| 440 | symbolicUpper_->dump(out); |
| 441 | out.printf("}"); |
| 442 | } |
| 443 | |
| 444 | out.printf("]"); |
| 445 | |
| 446 | bool includesNaN = max_exponent_ == IncludesInfinityAndNaN; |
| 447 | bool includesNegativeInfinity = |
| 448 | max_exponent_ >= IncludesInfinity && !hasInt32LowerBound_; |
| 449 | bool includesPositiveInfinity = |
| 450 | max_exponent_ >= IncludesInfinity && !hasInt32UpperBound_; |
| 451 | bool includesNegativeZero = canBeNegativeZero_; |
| 452 | |
| 453 | if (includesNaN || includesNegativeInfinity || includesPositiveInfinity || |
| 454 | includesNegativeZero) { |
| 455 | out.printf(" ("); |
| 456 | bool first = true; |
| 457 | if (includesNaN) { |
| 458 | if (first) { |
| 459 | first = false; |
| 460 | } else { |
| 461 | out.printf(" "); |
| 462 | } |
| 463 | out.printf("U NaN"); |
| 464 | } |
| 465 | if (includesNegativeInfinity) { |
| 466 | if (first) { |
| 467 | first = false; |
| 468 | } else { |
| 469 | out.printf(" "); |
| 470 | } |
| 471 | out.printf("U -Infinity"); |
| 472 | } |
| 473 | if (includesPositiveInfinity) { |
| 474 | if (first) { |
| 475 | first = false; |
| 476 | } else { |
| 477 | out.printf(" "); |
| 478 | } |
| 479 | out.printf("U Infinity"); |
| 480 | } |
| 481 | if (includesNegativeZero) { |
| 482 | if (first) { |
| 483 | first = false; |
Value stored to 'first' is never read | |
| 484 | } else { |
| 485 | out.printf(" "); |
| 486 | } |
| 487 | out.printf("U -0"); |
| 488 | } |
| 489 | out.printf(")"); |
| 490 | } |
| 491 | if (max_exponent_ < IncludesInfinity && IsExponentInteresting(this)) { |
| 492 | out.printf(" (< pow(2, %d+1))", max_exponent_); |
| 493 | } |
| 494 | } |
| 495 | |
| 496 | void Range::dump() const { |
| 497 | Fprinter out(stderrstderr); |
| 498 | dump(out); |
| 499 | out.printf("\n"); |
| 500 | out.finish(); |
| 501 | } |
| 502 | |
| 503 | Range* Range::intersect(TempAllocator& alloc, const Range* lhs, |
| 504 | const Range* rhs, bool* emptyRange) { |
| 505 | *emptyRange = false; |
| 506 | |
| 507 | if (!lhs && !rhs) { |
| 508 | return nullptr; |
| 509 | } |
| 510 | |
| 511 | if (!lhs) { |
| 512 | return new (alloc) Range(*rhs); |
| 513 | } |
| 514 | if (!rhs) { |
| 515 | return new (alloc) Range(*lhs); |
| 516 | } |
| 517 | |
| 518 | int32_t newLower = std::max(lhs->lower_, rhs->lower_); |
| 519 | int32_t newUpper = std::min(lhs->upper_, rhs->upper_); |
| 520 | |
| 521 | // If upper < lower, then we have conflicting constraints. Consider: |
| 522 | // |
| 523 | // if (x < 0) { |
| 524 | // if (x > 0) { |
| 525 | // [Some code.] |
| 526 | // } |
| 527 | // } |
| 528 | // |
| 529 | // In this case, the block is unreachable. |
| 530 | if (newUpper < newLower) { |
| 531 | // If both ranges can be NaN, the result can still be NaN. |
| 532 | if (!lhs->canBeNaN() || !rhs->canBeNaN()) { |
| 533 | *emptyRange = true; |
| 534 | } |
| 535 | return nullptr; |
| 536 | } |
| 537 | |
| 538 | bool newHasInt32LowerBound = |
| 539 | lhs->hasInt32LowerBound_ || rhs->hasInt32LowerBound_; |
| 540 | bool newHasInt32UpperBound = |
| 541 | lhs->hasInt32UpperBound_ || rhs->hasInt32UpperBound_; |
| 542 | |
| 543 | FractionalPartFlag newCanHaveFractionalPart = FractionalPartFlag( |
| 544 | lhs->canHaveFractionalPart_ && rhs->canHaveFractionalPart_); |
| 545 | NegativeZeroFlag newMayIncludeNegativeZero = |
| 546 | NegativeZeroFlag(lhs->canBeNegativeZero_ && rhs->canBeNegativeZero_); |
| 547 | |
| 548 | uint16_t newExponent = std::min(lhs->max_exponent_, rhs->max_exponent_); |
| 549 | |
| 550 | // NaN is a special value which is neither greater than infinity or less than |
| 551 | // negative infinity. When we intersect two ranges like [?, 0] and [0, ?], we |
| 552 | // can end up thinking we have both a lower and upper bound, even though NaN |
| 553 | // is still possible. In this case, just be conservative, since any case where |
| 554 | // we can have NaN is not especially interesting. |
| 555 | if (newHasInt32LowerBound && newHasInt32UpperBound && |
| 556 | newExponent == IncludesInfinityAndNaN) { |
| 557 | return nullptr; |
| 558 | } |
| 559 | |
| 560 | // If one of the ranges has a fractional part and the other doesn't, it's |
| 561 | // possible that we will have computed a newExponent that's more precise |
| 562 | // than our newLower and newUpper. This is unusual, so we handle it here |
| 563 | // instead of in optimize(). |
| 564 | // |
| 565 | // For example, consider the range F[0,1.5]. Range analysis represents the |
| 566 | // lower and upper bound as integers, so we'd actually have |
| 567 | // F[0,2] (< pow(2, 0+1)). In this case, the exponent gives us a slightly |
| 568 | // more precise upper bound than the integer upper bound. |
| 569 | // |
| 570 | // When intersecting such a range with an integer range, the fractional part |
| 571 | // of the range is dropped. The max exponent of 0 remains valid, so the |
| 572 | // upper bound needs to be adjusted to 1. |
| 573 | // |
| 574 | // When intersecting F[0,2] (< pow(2, 0+1)) with a range like F[2,4], |
| 575 | // the naive intersection is I[2,2], but since the max exponent tells us |
| 576 | // that the value is always less than 2, the intersection is actually empty. |
| 577 | if (lhs->canHaveFractionalPart() != rhs->canHaveFractionalPart() || |
| 578 | (lhs->canHaveFractionalPart() && newHasInt32LowerBound && |
| 579 | newHasInt32UpperBound && newLower == newUpper)) { |
| 580 | refineInt32BoundsByExponent(newExponent, &newLower, &newHasInt32LowerBound, |
| 581 | &newUpper, &newHasInt32UpperBound); |
| 582 | |
| 583 | // If we're intersecting two ranges that don't overlap, this could also |
| 584 | // push the bounds past each other, since the actual intersection is |
| 585 | // the empty set. |
| 586 | if (newLower > newUpper) { |
| 587 | *emptyRange = true; |
| 588 | return nullptr; |
| 589 | } |
| 590 | } |
| 591 | |
| 592 | return new (alloc) |
| 593 | Range(newLower, newHasInt32LowerBound, newUpper, newHasInt32UpperBound, |
| 594 | newCanHaveFractionalPart, newMayIncludeNegativeZero, newExponent); |
| 595 | } |
| 596 | |
| 597 | void Range::unionWith(const Range* other) { |
| 598 | int32_t newLower = std::min(lower_, other->lower_); |
| 599 | int32_t newUpper = std::max(upper_, other->upper_); |
| 600 | |
| 601 | bool newHasInt32LowerBound = |
| 602 | hasInt32LowerBound_ && other->hasInt32LowerBound_; |
| 603 | bool newHasInt32UpperBound = |
| 604 | hasInt32UpperBound_ && other->hasInt32UpperBound_; |
| 605 | |
| 606 | FractionalPartFlag newCanHaveFractionalPart = FractionalPartFlag( |
| 607 | canHaveFractionalPart_ || other->canHaveFractionalPart_); |
| 608 | NegativeZeroFlag newMayIncludeNegativeZero = |
| 609 | NegativeZeroFlag(canBeNegativeZero_ || other->canBeNegativeZero_); |
| 610 | |
| 611 | uint16_t newExponent = std::max(max_exponent_, other->max_exponent_); |
| 612 | |
| 613 | rawInitialize(newLower, newHasInt32LowerBound, newUpper, |
| 614 | newHasInt32UpperBound, newCanHaveFractionalPart, |
| 615 | newMayIncludeNegativeZero, newExponent); |
| 616 | } |
| 617 | |
| 618 | Range::Range(const MDefinition* def) |
| 619 | : symbolicLower_(nullptr), symbolicUpper_(nullptr) { |
| 620 | if (const Range* other = def->range()) { |
| 621 | // The instruction has range information; use it. |
| 622 | *this = *other; |
| 623 | |
| 624 | // Simulate the effect of converting the value to its type. |
| 625 | // Note: we cannot clamp here, since ranges aren't allowed to shrink |
| 626 | // and truncation can increase range again. So doing wrapAround to |
| 627 | // mimick a possible truncation. |
| 628 | switch (def->type()) { |
| 629 | case MIRType::Int32: |
| 630 | // MToNumberInt32 cannot truncate. So we can safely clamp. |
| 631 | if (def->isToNumberInt32()) { |
| 632 | clampToInt32(); |
| 633 | } else { |
| 634 | wrapAroundToInt32(); |
| 635 | } |
| 636 | break; |
| 637 | case MIRType::Boolean: |
| 638 | wrapAroundToBoolean(); |
| 639 | break; |
| 640 | case MIRType::None: |
| 641 | MOZ_CRASH("Asking for the range of an instruction with no value")do { do { } while (false); MOZ_ReportCrash("" "Asking for the range of an instruction with no value" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 641); AnnotateMozCrashReason("MOZ_CRASH(" "Asking for the range of an instruction with no value" ")"); do { *((volatile int*)__null) = 641; ::abort(); } while (false); } while (false); |
| 642 | default: |
| 643 | break; |
| 644 | } |
| 645 | } else { |
| 646 | // Otherwise just use type information. We can trust the type here |
| 647 | // because we don't care what value the instruction actually produces, |
| 648 | // but what value we might get after we get past the bailouts. |
| 649 | switch (def->type()) { |
| 650 | case MIRType::Int32: |
| 651 | setInt32(JSVAL_INT_MIN((int32_t)0x80000000), JSVAL_INT_MAX((int32_t)0x7fffffff)); |
| 652 | break; |
| 653 | case MIRType::Boolean: |
| 654 | setInt32(0, 1); |
| 655 | break; |
| 656 | case MIRType::None: |
| 657 | MOZ_CRASH("Asking for the range of an instruction with no value")do { do { } while (false); MOZ_ReportCrash("" "Asking for the range of an instruction with no value" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 657); AnnotateMozCrashReason("MOZ_CRASH(" "Asking for the range of an instruction with no value" ")"); do { *((volatile int*)__null) = 657; ::abort(); } while (false); } while (false); |
| 658 | default: |
| 659 | setUnknown(); |
| 660 | break; |
| 661 | } |
| 662 | } |
| 663 | |
| 664 | // As a special case, MUrsh is permitted to claim a result type of |
| 665 | // MIRType::Int32 while actually returning values in [0,UINT32_MAX] without |
| 666 | // bailouts. If range analysis hasn't ruled out values in |
| 667 | // (INT32_MAX,UINT32_MAX], set the range to be conservatively correct for |
| 668 | // use as either a uint32 or an int32. |
| 669 | if (!hasInt32UpperBound() && def->isUrsh() && |
| 670 | def->toUrsh()->bailoutsDisabled() && def->type() != MIRType::Int64) { |
| 671 | lower_ = INT32_MIN(-2147483647-1); |
| 672 | } |
| 673 | |
| 674 | assertInvariants(); |
| 675 | } |
| 676 | |
| 677 | static uint16_t ExponentImpliedByDouble(double d) { |
| 678 | // Handle the special values. |
| 679 | if (IsNaN(d)) { |
| 680 | return Range::IncludesInfinityAndNaN; |
| 681 | } |
| 682 | if (IsInfinite(d)) { |
| 683 | return Range::IncludesInfinity; |
| 684 | } |
| 685 | |
| 686 | // Otherwise take the exponent part and clamp it at zero, since the Range |
| 687 | // class doesn't track fractional ranges. |
| 688 | return uint16_t(std::max(int_fast16_t(0), ExponentComponent(d))); |
| 689 | } |
| 690 | |
| 691 | void Range::setDouble(double l, double h) { |
| 692 | MOZ_ASSERT(!(l > h))do { static_assert( mozilla::detail::AssertionConditionType< decltype(!(l > h))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!(l > h)))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!(l > h)", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 692); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!(l > h)" ")"); do { *((volatile int*)__null) = 692; ::abort(); } while (false); } } while (false); |
| 693 | |
| 694 | // Infer lower_, upper_, hasInt32LowerBound_, and hasInt32UpperBound_. |
| 695 | if (l >= INT32_MIN(-2147483647-1) && l <= INT32_MAX(2147483647)) { |
| 696 | lower_ = int32_t(::floor(l)); |
| 697 | hasInt32LowerBound_ = true; |
| 698 | } else if (l >= INT32_MAX(2147483647)) { |
| 699 | lower_ = INT32_MAX(2147483647); |
| 700 | hasInt32LowerBound_ = true; |
| 701 | } else { |
| 702 | lower_ = INT32_MIN(-2147483647-1); |
| 703 | hasInt32LowerBound_ = false; |
| 704 | } |
| 705 | if (h >= INT32_MIN(-2147483647-1) && h <= INT32_MAX(2147483647)) { |
| 706 | upper_ = int32_t(::ceil(h)); |
| 707 | hasInt32UpperBound_ = true; |
| 708 | } else if (h <= INT32_MIN(-2147483647-1)) { |
| 709 | upper_ = INT32_MIN(-2147483647-1); |
| 710 | hasInt32UpperBound_ = true; |
| 711 | } else { |
| 712 | upper_ = INT32_MAX(2147483647); |
| 713 | hasInt32UpperBound_ = false; |
| 714 | } |
| 715 | |
| 716 | // Infer max_exponent_. |
| 717 | uint16_t lExp = ExponentImpliedByDouble(l); |
| 718 | uint16_t hExp = ExponentImpliedByDouble(h); |
| 719 | max_exponent_ = std::max(lExp, hExp); |
| 720 | |
| 721 | canHaveFractionalPart_ = ExcludesFractionalParts; |
| 722 | canBeNegativeZero_ = ExcludesNegativeZero; |
| 723 | |
| 724 | // Infer the canHaveFractionalPart_ setting. We can have a |
| 725 | // fractional part if the range crosses through the neighborhood of zero. We |
| 726 | // won't have a fractional value if the value is always beyond the point at |
| 727 | // which double precision can't represent fractional values. |
| 728 | uint16_t minExp = std::min(lExp, hExp); |
| 729 | bool includesNegative = IsNaN(l) || l < 0; |
| 730 | bool includesPositive = IsNaN(h) || h > 0; |
| 731 | bool crossesZero = includesNegative && includesPositive; |
| 732 | if (crossesZero || minExp < MaxTruncatableExponent) { |
| 733 | canHaveFractionalPart_ = IncludesFractionalParts; |
| 734 | } |
| 735 | |
| 736 | // Infer the canBeNegativeZero_ setting. We can have a negative zero if |
| 737 | // either bound is zero. |
| 738 | if (!(l > 0) && !(h < 0)) { |
| 739 | canBeNegativeZero_ = IncludesNegativeZero; |
| 740 | } |
| 741 | |
| 742 | optimize(); |
| 743 | } |
| 744 | |
| 745 | void Range::setDoubleSingleton(double d) { |
| 746 | setDouble(d, d); |
| 747 | |
| 748 | // The above setDouble call is for comparisons, and treats negative zero |
| 749 | // as equal to zero. We're aiming for a minimum range, so we can clear the |
| 750 | // negative zero flag if the value isn't actually negative zero. |
| 751 | if (!IsNegativeZero(d)) { |
| 752 | canBeNegativeZero_ = ExcludesNegativeZero; |
| 753 | } |
| 754 | |
| 755 | assertInvariants(); |
| 756 | } |
| 757 | |
| 758 | static inline bool MissingAnyInt32Bounds(const Range* lhs, const Range* rhs) { |
| 759 | return !lhs->hasInt32Bounds() || !rhs->hasInt32Bounds(); |
| 760 | } |
| 761 | |
| 762 | Range* Range::add(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 763 | int64_t l = (int64_t)lhs->lower_ + (int64_t)rhs->lower_; |
| 764 | if (!lhs->hasInt32LowerBound() || !rhs->hasInt32LowerBound()) { |
| 765 | l = NoInt32LowerBound; |
| 766 | } |
| 767 | |
| 768 | int64_t h = (int64_t)lhs->upper_ + (int64_t)rhs->upper_; |
| 769 | if (!lhs->hasInt32UpperBound() || !rhs->hasInt32UpperBound()) { |
| 770 | h = NoInt32UpperBound; |
| 771 | } |
| 772 | |
| 773 | // The exponent is at most one greater than the greater of the operands' |
| 774 | // exponents, except for NaN and infinity cases. |
| 775 | uint16_t e = std::max(lhs->max_exponent_, rhs->max_exponent_); |
| 776 | if (e <= Range::MaxFiniteExponent) { |
| 777 | ++e; |
| 778 | } |
| 779 | |
| 780 | // Infinity + -Infinity is NaN. |
| 781 | if (lhs->canBeInfiniteOrNaN() && rhs->canBeInfiniteOrNaN()) { |
| 782 | e = Range::IncludesInfinityAndNaN; |
| 783 | } |
| 784 | |
| 785 | return new (alloc) Range( |
| 786 | l, h, |
| 787 | FractionalPartFlag(lhs->canHaveFractionalPart() || |
| 788 | rhs->canHaveFractionalPart()), |
| 789 | NegativeZeroFlag(lhs->canBeNegativeZero() && rhs->canBeNegativeZero()), |
| 790 | e); |
| 791 | } |
| 792 | |
| 793 | Range* Range::sub(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 794 | int64_t l = (int64_t)lhs->lower_ - (int64_t)rhs->upper_; |
| 795 | if (!lhs->hasInt32LowerBound() || !rhs->hasInt32UpperBound()) { |
| 796 | l = NoInt32LowerBound; |
| 797 | } |
| 798 | |
| 799 | int64_t h = (int64_t)lhs->upper_ - (int64_t)rhs->lower_; |
| 800 | if (!lhs->hasInt32UpperBound() || !rhs->hasInt32LowerBound()) { |
| 801 | h = NoInt32UpperBound; |
| 802 | } |
| 803 | |
| 804 | // The exponent is at most one greater than the greater of the operands' |
| 805 | // exponents, except for NaN and infinity cases. |
| 806 | uint16_t e = std::max(lhs->max_exponent_, rhs->max_exponent_); |
| 807 | if (e <= Range::MaxFiniteExponent) { |
| 808 | ++e; |
| 809 | } |
| 810 | |
| 811 | // Infinity - Infinity is NaN. |
| 812 | if (lhs->canBeInfiniteOrNaN() && rhs->canBeInfiniteOrNaN()) { |
| 813 | e = Range::IncludesInfinityAndNaN; |
| 814 | } |
| 815 | |
| 816 | return new (alloc) |
| 817 | Range(l, h, |
| 818 | FractionalPartFlag(lhs->canHaveFractionalPart() || |
| 819 | rhs->canHaveFractionalPart()), |
| 820 | NegativeZeroFlag(lhs->canBeNegativeZero() && rhs->canBeZero()), e); |
| 821 | } |
| 822 | |
| 823 | Range* Range::and_(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 824 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 824); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 824; ::abort(); } while (false); } } while (false); |
| 825 | MOZ_ASSERT(rhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(rhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(rhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("rhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 825); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->isInt32()" ")"); do { *((volatile int*)__null) = 825; ::abort(); } while (false); } } while (false); |
| 826 | |
| 827 | // If both numbers can be negative, result can be negative in the whole range |
| 828 | if (lhs->lower() < 0 && rhs->lower() < 0) { |
| 829 | return Range::NewInt32Range(alloc, INT32_MIN(-2147483647-1), |
| 830 | std::max(lhs->upper(), rhs->upper())); |
| 831 | } |
| 832 | |
| 833 | // Only one of both numbers can be negative. |
| 834 | // - result can't be negative |
| 835 | // - Upper bound is minimum of both upper range, |
| 836 | int32_t lower = 0; |
| 837 | int32_t upper = std::min(lhs->upper(), rhs->upper()); |
| 838 | |
| 839 | // EXCEPT when upper bound of non negative number is max value, |
| 840 | // because negative value can return the whole max value. |
| 841 | // -1 & 5 = 5 |
| 842 | if (lhs->lower() < 0) { |
| 843 | upper = rhs->upper(); |
| 844 | } |
| 845 | if (rhs->lower() < 0) { |
| 846 | upper = lhs->upper(); |
| 847 | } |
| 848 | |
| 849 | return Range::NewInt32Range(alloc, lower, upper); |
| 850 | } |
| 851 | |
| 852 | Range* Range::or_(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 853 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 853); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 853; ::abort(); } while (false); } } while (false); |
| 854 | MOZ_ASSERT(rhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(rhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(rhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("rhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 854); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->isInt32()" ")"); do { *((volatile int*)__null) = 854; ::abort(); } while (false); } } while (false); |
| 855 | // When one operand is always 0 or always -1, it's a special case where we |
| 856 | // can compute a fully precise result. Handling these up front also |
| 857 | // protects the code below from calling CountLeadingZeroes32 with a zero |
| 858 | // operand or from shifting an int32_t by 32. |
| 859 | if (lhs->lower() == lhs->upper()) { |
| 860 | if (lhs->lower() == 0) { |
| 861 | return new (alloc) Range(*rhs); |
| 862 | } |
| 863 | if (lhs->lower() == -1) { |
| 864 | return new (alloc) Range(*lhs); |
| 865 | } |
| 866 | } |
| 867 | if (rhs->lower() == rhs->upper()) { |
| 868 | if (rhs->lower() == 0) { |
| 869 | return new (alloc) Range(*lhs); |
| 870 | } |
| 871 | if (rhs->lower() == -1) { |
| 872 | return new (alloc) Range(*rhs); |
| 873 | } |
| 874 | } |
| 875 | |
| 876 | // The code below uses CountLeadingZeroes32, which has undefined behavior |
| 877 | // if its operand is 0. We rely on the code above to protect it. |
| 878 | MOZ_ASSERT_IF(lhs->lower() >= 0, lhs->upper() != 0)do { if (lhs->lower() >= 0) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(lhs->upper() != 0)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(lhs->upper() != 0))), 0))) { do { } while (false) ; MOZ_ReportAssertionFailure("lhs->upper() != 0", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 878); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->upper() != 0" ")"); do { *((volatile int*)__null) = 878; ::abort(); } while (false); } } while (false); } } while (false); |
| 879 | MOZ_ASSERT_IF(rhs->lower() >= 0, rhs->upper() != 0)do { if (rhs->lower() >= 0) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(rhs->upper() != 0)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(rhs->upper() != 0))), 0))) { do { } while (false) ; MOZ_ReportAssertionFailure("rhs->upper() != 0", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 879); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->upper() != 0" ")"); do { *((volatile int*)__null) = 879; ::abort(); } while (false); } } while (false); } } while (false); |
| 880 | MOZ_ASSERT_IF(lhs->upper() < 0, lhs->lower() != -1)do { if (lhs->upper() < 0) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(lhs->lower() != -1)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(lhs->lower() != -1))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("lhs->lower() != -1", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 880); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->lower() != -1" ")"); do { *((volatile int*)__null) = 880; ::abort(); } while (false); } } while (false); } } while (false); |
| 881 | MOZ_ASSERT_IF(rhs->upper() < 0, rhs->lower() != -1)do { if (rhs->upper() < 0) { do { static_assert( mozilla ::detail::AssertionConditionType<decltype(rhs->lower() != -1)>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(rhs->lower() != -1))), 0))) { do { } while (false ); MOZ_ReportAssertionFailure("rhs->lower() != -1", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 881); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->lower() != -1" ")"); do { *((volatile int*)__null) = 881; ::abort(); } while (false); } } while (false); } } while (false); |
| 882 | |
| 883 | int32_t lower = INT32_MIN(-2147483647-1); |
| 884 | int32_t upper = INT32_MAX(2147483647); |
| 885 | |
| 886 | if (lhs->lower() >= 0 && rhs->lower() >= 0) { |
| 887 | // Both operands are non-negative, so the result won't be less than either. |
| 888 | lower = std::max(lhs->lower(), rhs->lower()); |
| 889 | // The result will have leading zeros where both operands have leading |
| 890 | // zeros. CountLeadingZeroes32 of a non-negative int32 will at least be 1 to |
| 891 | // account for the bit of sign. |
| 892 | upper = int32_t(UINT32_MAX(4294967295U) >> std::min(CountLeadingZeroes32(lhs->upper()), |
| 893 | CountLeadingZeroes32(rhs->upper()))); |
| 894 | } else { |
| 895 | // The result will have leading ones where either operand has leading ones. |
| 896 | if (lhs->upper() < 0) { |
| 897 | unsigned leadingOnes = CountLeadingZeroes32(~lhs->lower()); |
| 898 | lower = std::max(lower, ~int32_t(UINT32_MAX(4294967295U) >> leadingOnes)); |
| 899 | upper = -1; |
| 900 | } |
| 901 | if (rhs->upper() < 0) { |
| 902 | unsigned leadingOnes = CountLeadingZeroes32(~rhs->lower()); |
| 903 | lower = std::max(lower, ~int32_t(UINT32_MAX(4294967295U) >> leadingOnes)); |
| 904 | upper = -1; |
| 905 | } |
| 906 | } |
| 907 | |
| 908 | return Range::NewInt32Range(alloc, lower, upper); |
| 909 | } |
| 910 | |
| 911 | Range* Range::xor_(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 912 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 912); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 912; ::abort(); } while (false); } } while (false); |
| 913 | MOZ_ASSERT(rhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(rhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(rhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("rhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 913); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->isInt32()" ")"); do { *((volatile int*)__null) = 913; ::abort(); } while (false); } } while (false); |
| 914 | int32_t lhsLower = lhs->lower(); |
| 915 | int32_t lhsUpper = lhs->upper(); |
| 916 | int32_t rhsLower = rhs->lower(); |
| 917 | int32_t rhsUpper = rhs->upper(); |
| 918 | bool invertAfter = false; |
| 919 | |
| 920 | // If either operand is negative, bitwise-negate it, and arrange to negate |
| 921 | // the result; ~((~x)^y) == x^y. If both are negative the negations on the |
| 922 | // result cancel each other out; effectively this is (~x)^(~y) == x^y. |
| 923 | // These transformations reduce the number of cases we have to handle below. |
| 924 | if (lhsUpper < 0) { |
| 925 | lhsLower = ~lhsLower; |
| 926 | lhsUpper = ~lhsUpper; |
| 927 | std::swap(lhsLower, lhsUpper); |
| 928 | invertAfter = !invertAfter; |
| 929 | } |
| 930 | if (rhsUpper < 0) { |
| 931 | rhsLower = ~rhsLower; |
| 932 | rhsUpper = ~rhsUpper; |
| 933 | std::swap(rhsLower, rhsUpper); |
| 934 | invertAfter = !invertAfter; |
| 935 | } |
| 936 | |
| 937 | // Handle cases where lhs or rhs is always zero specially, because they're |
| 938 | // easy cases where we can be perfectly precise, and because it protects the |
| 939 | // CountLeadingZeroes32 calls below from seeing 0 operands, which would be |
| 940 | // undefined behavior. |
| 941 | int32_t lower = INT32_MIN(-2147483647-1); |
| 942 | int32_t upper = INT32_MAX(2147483647); |
| 943 | if (lhsLower == 0 && lhsUpper == 0) { |
| 944 | upper = rhsUpper; |
| 945 | lower = rhsLower; |
| 946 | } else if (rhsLower == 0 && rhsUpper == 0) { |
| 947 | upper = lhsUpper; |
| 948 | lower = lhsLower; |
| 949 | } else if (lhsLower >= 0 && rhsLower >= 0) { |
| 950 | // Both operands are non-negative. The result will be non-negative. |
| 951 | lower = 0; |
| 952 | // To compute the upper value, take each operand's upper value and |
| 953 | // set all bits that don't correspond to leading zero bits in the |
| 954 | // other to one. For each one, this gives an upper bound for the |
| 955 | // result, so we can take the minimum between the two. |
| 956 | unsigned lhsLeadingZeros = CountLeadingZeroes32(lhsUpper); |
| 957 | unsigned rhsLeadingZeros = CountLeadingZeroes32(rhsUpper); |
| 958 | upper = std::min(rhsUpper | int32_t(UINT32_MAX(4294967295U) >> lhsLeadingZeros), |
| 959 | lhsUpper | int32_t(UINT32_MAX(4294967295U) >> rhsLeadingZeros)); |
| 960 | } |
| 961 | |
| 962 | // If we bitwise-negated one (but not both) of the operands above, apply the |
| 963 | // bitwise-negate to the result, completing ~((~x)^y) == x^y. |
| 964 | if (invertAfter) { |
| 965 | lower = ~lower; |
| 966 | upper = ~upper; |
| 967 | std::swap(lower, upper); |
| 968 | } |
| 969 | |
| 970 | return Range::NewInt32Range(alloc, lower, upper); |
| 971 | } |
| 972 | |
| 973 | Range* Range::not_(TempAllocator& alloc, const Range* op) { |
| 974 | MOZ_ASSERT(op->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(op->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(op->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("op->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 974); AnnotateMozCrashReason("MOZ_ASSERT" "(" "op->isInt32()" ")"); do { *((volatile int*)__null) = 974; ::abort(); } while (false); } } while (false); |
| 975 | return Range::NewInt32Range(alloc, ~op->upper(), ~op->lower()); |
| 976 | } |
| 977 | |
| 978 | Range* Range::mul(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 979 | FractionalPartFlag newCanHaveFractionalPart = FractionalPartFlag( |
| 980 | lhs->canHaveFractionalPart_ || rhs->canHaveFractionalPart_); |
| 981 | |
| 982 | NegativeZeroFlag newMayIncludeNegativeZero = NegativeZeroFlag( |
| 983 | (lhs->canHaveSignBitSet() && rhs->canBeFiniteNonNegative()) || |
| 984 | (rhs->canHaveSignBitSet() && lhs->canBeFiniteNonNegative())); |
| 985 | |
| 986 | uint16_t exponent; |
| 987 | if (!lhs->canBeInfiniteOrNaN() && !rhs->canBeInfiniteOrNaN()) { |
| 988 | // Two finite values. |
| 989 | exponent = lhs->numBits() + rhs->numBits() - 1; |
| 990 | if (exponent > Range::MaxFiniteExponent) { |
| 991 | exponent = Range::IncludesInfinity; |
| 992 | } |
| 993 | } else if (!lhs->canBeNaN() && !rhs->canBeNaN() && |
| 994 | !(lhs->canBeZero() && rhs->canBeInfiniteOrNaN()) && |
| 995 | !(rhs->canBeZero() && lhs->canBeInfiniteOrNaN())) { |
| 996 | // Two values that multiplied together won't produce a NaN. |
| 997 | exponent = Range::IncludesInfinity; |
| 998 | } else { |
| 999 | // Could be anything. |
| 1000 | exponent = Range::IncludesInfinityAndNaN; |
| 1001 | } |
| 1002 | |
| 1003 | if (MissingAnyInt32Bounds(lhs, rhs)) { |
| 1004 | return new (alloc) |
| 1005 | Range(NoInt32LowerBound, NoInt32UpperBound, newCanHaveFractionalPart, |
| 1006 | newMayIncludeNegativeZero, exponent); |
| 1007 | } |
| 1008 | int64_t a = (int64_t)lhs->lower() * (int64_t)rhs->lower(); |
| 1009 | int64_t b = (int64_t)lhs->lower() * (int64_t)rhs->upper(); |
| 1010 | int64_t c = (int64_t)lhs->upper() * (int64_t)rhs->lower(); |
| 1011 | int64_t d = (int64_t)lhs->upper() * (int64_t)rhs->upper(); |
| 1012 | return new (alloc) |
| 1013 | Range(std::min(std::min(a, b), std::min(c, d)), |
| 1014 | std::max(std::max(a, b), std::max(c, d)), newCanHaveFractionalPart, |
| 1015 | newMayIncludeNegativeZero, exponent); |
| 1016 | } |
| 1017 | |
| 1018 | Range* Range::lsh(TempAllocator& alloc, const Range* lhs, int32_t c) { |
| 1019 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1019); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 1019; ::abort(); } while (false); } } while (false); |
| 1020 | int32_t shift = c & 0x1f; |
| 1021 | |
| 1022 | // If the shift doesn't loose bits or shift bits into the sign bit, we |
| 1023 | // can simply compute the correct range by shifting. |
| 1024 | if ((int32_t)((uint32_t)lhs->lower() << shift << 1 >> shift >> 1) == |
| 1025 | lhs->lower() && |
| 1026 | (int32_t)((uint32_t)lhs->upper() << shift << 1 >> shift >> 1) == |
| 1027 | lhs->upper()) { |
| 1028 | return Range::NewInt32Range(alloc, uint32_t(lhs->lower()) << shift, |
| 1029 | uint32_t(lhs->upper()) << shift); |
| 1030 | } |
| 1031 | |
| 1032 | return Range::NewInt32Range(alloc, INT32_MIN(-2147483647-1), INT32_MAX(2147483647)); |
| 1033 | } |
| 1034 | |
| 1035 | Range* Range::rsh(TempAllocator& alloc, const Range* lhs, int32_t c) { |
| 1036 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1036); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 1036; ::abort(); } while (false); } } while (false); |
| 1037 | int32_t shift = c & 0x1f; |
| 1038 | return Range::NewInt32Range(alloc, lhs->lower() >> shift, |
| 1039 | lhs->upper() >> shift); |
| 1040 | } |
| 1041 | |
| 1042 | Range* Range::ursh(TempAllocator& alloc, const Range* lhs, int32_t c) { |
| 1043 | // ursh's left operand is uint32, not int32, but for range analysis we |
| 1044 | // currently approximate it as int32. We assume here that the range has |
| 1045 | // already been adjusted accordingly by our callers. |
| 1046 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1046); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 1046; ::abort(); } while (false); } } while (false); |
| 1047 | |
| 1048 | int32_t shift = c & 0x1f; |
| 1049 | |
| 1050 | // If the value is always non-negative or always negative, we can simply |
| 1051 | // compute the correct range by shifting. |
| 1052 | if (lhs->isFiniteNonNegative() || lhs->isFiniteNegative()) { |
| 1053 | return Range::NewUInt32Range(alloc, uint32_t(lhs->lower()) >> shift, |
| 1054 | uint32_t(lhs->upper()) >> shift); |
| 1055 | } |
| 1056 | |
| 1057 | // Otherwise return the most general range after the shift. |
| 1058 | return Range::NewUInt32Range(alloc, 0, UINT32_MAX(4294967295U) >> shift); |
| 1059 | } |
| 1060 | |
| 1061 | Range* Range::lsh(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 1062 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1062); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 1062; ::abort(); } while (false); } } while (false); |
| 1063 | MOZ_ASSERT(rhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(rhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(rhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("rhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1063); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->isInt32()" ")"); do { *((volatile int*)__null) = 1063; ::abort(); } while (false); } } while (false); |
| 1064 | return Range::NewInt32Range(alloc, INT32_MIN(-2147483647-1), INT32_MAX(2147483647)); |
| 1065 | } |
| 1066 | |
| 1067 | Range* Range::rsh(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 1068 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1068); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 1068; ::abort(); } while (false); } } while (false); |
| 1069 | MOZ_ASSERT(rhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(rhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(rhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("rhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1069); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->isInt32()" ")"); do { *((volatile int*)__null) = 1069; ::abort(); } while (false); } } while (false); |
| 1070 | |
| 1071 | // Canonicalize the shift range to 0 to 31. |
| 1072 | int32_t shiftLower = rhs->lower(); |
| 1073 | int32_t shiftUpper = rhs->upper(); |
| 1074 | if ((int64_t(shiftUpper) - int64_t(shiftLower)) >= 31) { |
| 1075 | shiftLower = 0; |
| 1076 | shiftUpper = 31; |
| 1077 | } else { |
| 1078 | shiftLower &= 0x1f; |
| 1079 | shiftUpper &= 0x1f; |
| 1080 | if (shiftLower > shiftUpper) { |
| 1081 | shiftLower = 0; |
| 1082 | shiftUpper = 31; |
| 1083 | } |
| 1084 | } |
| 1085 | MOZ_ASSERT(shiftLower >= 0 && shiftUpper <= 31)do { static_assert( mozilla::detail::AssertionConditionType< decltype(shiftLower >= 0 && shiftUpper <= 31)> ::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(shiftLower >= 0 && shiftUpper <= 31))) , 0))) { do { } while (false); MOZ_ReportAssertionFailure("shiftLower >= 0 && shiftUpper <= 31" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1085); AnnotateMozCrashReason("MOZ_ASSERT" "(" "shiftLower >= 0 && shiftUpper <= 31" ")"); do { *((volatile int*)__null) = 1085; ::abort(); } while (false); } } while (false); |
| 1086 | |
| 1087 | // The lhs bounds are signed, thus the minimum is either the lower bound |
| 1088 | // shift by the smallest shift if negative or the lower bound shifted by the |
| 1089 | // biggest shift otherwise. And the opposite for the maximum. |
| 1090 | int32_t lhsLower = lhs->lower(); |
| 1091 | int32_t min = lhsLower < 0 ? lhsLower >> shiftLower : lhsLower >> shiftUpper; |
| 1092 | int32_t lhsUpper = lhs->upper(); |
| 1093 | int32_t max = lhsUpper >= 0 ? lhsUpper >> shiftLower : lhsUpper >> shiftUpper; |
| 1094 | |
| 1095 | return Range::NewInt32Range(alloc, min, max); |
| 1096 | } |
| 1097 | |
| 1098 | Range* Range::ursh(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 1099 | // ursh's left operand is uint32, not int32, but for range analysis we |
| 1100 | // currently approximate it as int32. We assume here that the range has |
| 1101 | // already been adjusted accordingly by our callers. |
| 1102 | MOZ_ASSERT(lhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(lhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(lhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("lhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1102); AnnotateMozCrashReason("MOZ_ASSERT" "(" "lhs->isInt32()" ")"); do { *((volatile int*)__null) = 1102; ::abort(); } while (false); } } while (false); |
| 1103 | MOZ_ASSERT(rhs->isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(rhs->isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(rhs->isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("rhs->isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1103); AnnotateMozCrashReason("MOZ_ASSERT" "(" "rhs->isInt32()" ")"); do { *((volatile int*)__null) = 1103; ::abort(); } while (false); } } while (false); |
| 1104 | return Range::NewUInt32Range( |
| 1105 | alloc, 0, lhs->isFiniteNonNegative() ? lhs->upper() : UINT32_MAX(4294967295U)); |
| 1106 | } |
| 1107 | |
| 1108 | Range* Range::abs(TempAllocator& alloc, const Range* op) { |
| 1109 | int32_t l = op->lower_; |
| 1110 | int32_t u = op->upper_; |
| 1111 | FractionalPartFlag canHaveFractionalPart = op->canHaveFractionalPart_; |
| 1112 | |
| 1113 | // Abs never produces a negative zero. |
| 1114 | NegativeZeroFlag canBeNegativeZero = ExcludesNegativeZero; |
| 1115 | |
| 1116 | return new (alloc) Range( |
| 1117 | std::max(std::max(int32_t(0), l), u == INT32_MIN(-2147483647-1) ? INT32_MAX(2147483647) : -u), true, |
| 1118 | std::max(std::max(int32_t(0), u), l == INT32_MIN(-2147483647-1) ? INT32_MAX(2147483647) : -l), |
| 1119 | op->hasInt32Bounds() && l != INT32_MIN(-2147483647-1), canHaveFractionalPart, |
| 1120 | canBeNegativeZero, op->max_exponent_); |
| 1121 | } |
| 1122 | |
| 1123 | Range* Range::min(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 1124 | // If either operand is NaN, the result is NaN. |
| 1125 | if (lhs->canBeNaN() || rhs->canBeNaN()) { |
| 1126 | return nullptr; |
| 1127 | } |
| 1128 | |
| 1129 | FractionalPartFlag newCanHaveFractionalPart = FractionalPartFlag( |
| 1130 | lhs->canHaveFractionalPart_ || rhs->canHaveFractionalPart_); |
| 1131 | NegativeZeroFlag newMayIncludeNegativeZero = |
| 1132 | NegativeZeroFlag(lhs->canBeNegativeZero_ || rhs->canBeNegativeZero_); |
| 1133 | |
| 1134 | return new (alloc) Range(std::min(lhs->lower_, rhs->lower_), |
| 1135 | lhs->hasInt32LowerBound_ && rhs->hasInt32LowerBound_, |
| 1136 | std::min(lhs->upper_, rhs->upper_), |
| 1137 | lhs->hasInt32UpperBound_ || rhs->hasInt32UpperBound_, |
| 1138 | newCanHaveFractionalPart, newMayIncludeNegativeZero, |
| 1139 | std::max(lhs->max_exponent_, rhs->max_exponent_)); |
| 1140 | } |
| 1141 | |
| 1142 | Range* Range::max(TempAllocator& alloc, const Range* lhs, const Range* rhs) { |
| 1143 | // If either operand is NaN, the result is NaN. |
| 1144 | if (lhs->canBeNaN() || rhs->canBeNaN()) { |
| 1145 | return nullptr; |
| 1146 | } |
| 1147 | |
| 1148 | FractionalPartFlag newCanHaveFractionalPart = FractionalPartFlag( |
| 1149 | lhs->canHaveFractionalPart_ || rhs->canHaveFractionalPart_); |
| 1150 | NegativeZeroFlag newMayIncludeNegativeZero = |
| 1151 | NegativeZeroFlag(lhs->canBeNegativeZero_ || rhs->canBeNegativeZero_); |
| 1152 | |
| 1153 | return new (alloc) Range(std::max(lhs->lower_, rhs->lower_), |
| 1154 | lhs->hasInt32LowerBound_ || rhs->hasInt32LowerBound_, |
| 1155 | std::max(lhs->upper_, rhs->upper_), |
| 1156 | lhs->hasInt32UpperBound_ && rhs->hasInt32UpperBound_, |
| 1157 | newCanHaveFractionalPart, newMayIncludeNegativeZero, |
| 1158 | std::max(lhs->max_exponent_, rhs->max_exponent_)); |
| 1159 | } |
| 1160 | |
| 1161 | Range* Range::floor(TempAllocator& alloc, const Range* op) { |
| 1162 | Range* copy = new (alloc) Range(*op); |
| 1163 | // Decrement lower bound of copy range if op have a factional part and lower |
| 1164 | // bound is Int32 defined. Also we avoid to decrement when op have a |
| 1165 | // fractional part but lower_ >= JSVAL_INT_MAX. |
| 1166 | if (op->canHaveFractionalPart() && op->hasInt32LowerBound()) { |
| 1167 | copy->setLowerInit(int64_t(copy->lower_) - 1); |
| 1168 | } |
| 1169 | |
| 1170 | // Also refine max_exponent_ because floor may have decremented int value |
| 1171 | // If we've got int32 defined bounds, just deduce it using defined bounds. |
| 1172 | // But, if we don't have those, value's max_exponent_ may have changed. |
| 1173 | // Because we're looking to maintain an over estimation, if we can, |
| 1174 | // we increment it. |
| 1175 | if (copy->hasInt32Bounds()) |
| 1176 | copy->max_exponent_ = copy->exponentImpliedByInt32Bounds(); |
| 1177 | else if (copy->max_exponent_ < MaxFiniteExponent) |
| 1178 | copy->max_exponent_++; |
| 1179 | |
| 1180 | copy->canHaveFractionalPart_ = ExcludesFractionalParts; |
| 1181 | copy->assertInvariants(); |
| 1182 | return copy; |
| 1183 | } |
| 1184 | |
| 1185 | Range* Range::ceil(TempAllocator& alloc, const Range* op) { |
| 1186 | Range* copy = new (alloc) Range(*op); |
| 1187 | |
| 1188 | // We need to refine max_exponent_ because ceil may have incremented the int |
| 1189 | // value. If we have got int32 bounds defined, just deduce it using the |
| 1190 | // defined bounds. Else we can just increment its value, as we are looking to |
| 1191 | // maintain an over estimation. |
| 1192 | if (copy->hasInt32Bounds()) { |
| 1193 | copy->max_exponent_ = copy->exponentImpliedByInt32Bounds(); |
| 1194 | } else if (copy->max_exponent_ < MaxFiniteExponent) { |
| 1195 | copy->max_exponent_++; |
| 1196 | } |
| 1197 | |
| 1198 | // If the range is definitely above 0 or below -1, we don't need to include |
| 1199 | // -0; otherwise we do. |
| 1200 | |
| 1201 | copy->canBeNegativeZero_ = ((copy->lower_ > 0) || (copy->upper_ <= -1)) |
| 1202 | ? copy->canBeNegativeZero_ |
| 1203 | : IncludesNegativeZero; |
| 1204 | |
| 1205 | copy->canHaveFractionalPart_ = ExcludesFractionalParts; |
| 1206 | copy->assertInvariants(); |
| 1207 | return copy; |
| 1208 | } |
| 1209 | |
| 1210 | Range* Range::sign(TempAllocator& alloc, const Range* op) { |
| 1211 | if (op->canBeNaN()) { |
| 1212 | return nullptr; |
| 1213 | } |
| 1214 | |
| 1215 | return new (alloc) Range(std::max(std::min(op->lower_, 1), -1), |
| 1216 | std::max(std::min(op->upper_, 1), -1), |
| 1217 | Range::ExcludesFractionalParts, |
| 1218 | NegativeZeroFlag(op->canBeNegativeZero()), 0); |
| 1219 | } |
| 1220 | |
| 1221 | Range* Range::NaNToZero(TempAllocator& alloc, const Range* op) { |
| 1222 | Range* copy = new (alloc) Range(*op); |
| 1223 | if (copy->canBeNaN()) { |
| 1224 | copy->max_exponent_ = Range::IncludesInfinity; |
| 1225 | if (!copy->canBeZero()) { |
| 1226 | Range zero; |
| 1227 | zero.setDoubleSingleton(0); |
| 1228 | copy->unionWith(&zero); |
| 1229 | } |
| 1230 | } |
| 1231 | copy->refineToExcludeNegativeZero(); |
| 1232 | return copy; |
| 1233 | } |
| 1234 | |
| 1235 | Range* Range::toIntegerInt32(TempAllocator& alloc, const Range* op) { |
| 1236 | return Range::NaNToZero(alloc, Range::ceil(alloc, op)); |
| 1237 | } |
| 1238 | |
| 1239 | bool Range::negativeZeroMul(const Range* lhs, const Range* rhs) { |
| 1240 | // The result can only be negative zero if both sides are finite and they |
| 1241 | // have differing signs. |
| 1242 | return (lhs->canHaveSignBitSet() && rhs->canBeFiniteNonNegative()) || |
| 1243 | (rhs->canHaveSignBitSet() && lhs->canBeFiniteNonNegative()); |
| 1244 | } |
| 1245 | |
| 1246 | bool Range::update(const Range* other) { |
| 1247 | bool changed = lower_ != other->lower_ || |
| 1248 | hasInt32LowerBound_ != other->hasInt32LowerBound_ || |
| 1249 | upper_ != other->upper_ || |
| 1250 | hasInt32UpperBound_ != other->hasInt32UpperBound_ || |
| 1251 | canHaveFractionalPart_ != other->canHaveFractionalPart_ || |
| 1252 | canBeNegativeZero_ != other->canBeNegativeZero_ || |
| 1253 | max_exponent_ != other->max_exponent_; |
| 1254 | if (changed) { |
| 1255 | lower_ = other->lower_; |
| 1256 | hasInt32LowerBound_ = other->hasInt32LowerBound_; |
| 1257 | upper_ = other->upper_; |
| 1258 | hasInt32UpperBound_ = other->hasInt32UpperBound_; |
| 1259 | canHaveFractionalPart_ = other->canHaveFractionalPart_; |
| 1260 | canBeNegativeZero_ = other->canBeNegativeZero_; |
| 1261 | max_exponent_ = other->max_exponent_; |
| 1262 | assertInvariants(); |
| 1263 | } |
| 1264 | |
| 1265 | return changed; |
| 1266 | } |
| 1267 | |
| 1268 | /////////////////////////////////////////////////////////////////////////////// |
| 1269 | // Range Computation for MIR Nodes |
| 1270 | /////////////////////////////////////////////////////////////////////////////// |
| 1271 | |
| 1272 | void MPhi::computeRange(TempAllocator& alloc) { |
| 1273 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1274 | return; |
| 1275 | } |
| 1276 | |
| 1277 | Range* range = nullptr; |
| 1278 | for (size_t i = 0, e = numOperands(); i < e; i++) { |
| 1279 | if (getOperand(i)->block()->unreachable()) { |
| 1280 | JitSpew(JitSpew_Range, "Ignoring unreachable input %u", |
| 1281 | getOperand(i)->id()); |
| 1282 | continue; |
| 1283 | } |
| 1284 | |
| 1285 | // Peek at the pre-bailout range so we can take a short-cut; if any of |
| 1286 | // the operands has an unknown range, this phi has an unknown range. |
| 1287 | if (!getOperand(i)->range()) { |
| 1288 | return; |
| 1289 | } |
| 1290 | |
| 1291 | Range input(getOperand(i)); |
| 1292 | |
| 1293 | if (range) { |
| 1294 | range->unionWith(&input); |
| 1295 | } else { |
| 1296 | range = new (alloc) Range(input); |
| 1297 | } |
| 1298 | } |
| 1299 | |
| 1300 | setRange(range); |
| 1301 | } |
| 1302 | |
| 1303 | void MBeta::computeRange(TempAllocator& alloc) { |
| 1304 | bool emptyRange = false; |
| 1305 | |
| 1306 | Range opRange(getOperand(0)); |
| 1307 | Range* range = Range::intersect(alloc, &opRange, comparison_, &emptyRange); |
| 1308 | if (emptyRange) { |
| 1309 | JitSpew(JitSpew_Range, "Marking block for inst %u unreachable", id()); |
| 1310 | block()->setUnreachableUnchecked(); |
| 1311 | } else { |
| 1312 | setRange(range); |
| 1313 | } |
| 1314 | } |
| 1315 | |
| 1316 | void MConstant::computeRange(TempAllocator& alloc) { |
| 1317 | if (isTypeRepresentableAsDouble()) { |
| 1318 | double d = numberToDouble(); |
| 1319 | setRange(Range::NewDoubleSingletonRange(alloc, d)); |
| 1320 | } else if (type() == MIRType::Boolean) { |
| 1321 | bool b = toBoolean(); |
| 1322 | setRange(Range::NewInt32Range(alloc, b, b)); |
| 1323 | } |
| 1324 | } |
| 1325 | |
| 1326 | void MCharCodeAt::computeRange(TempAllocator& alloc) { |
| 1327 | // ECMA 262 says that the integer will be non-negative and at most 65535. |
| 1328 | setRange(Range::NewInt32Range(alloc, 0, 65535)); |
| 1329 | } |
| 1330 | |
| 1331 | void MClampToUint8::computeRange(TempAllocator& alloc) { |
| 1332 | setRange(Range::NewUInt32Range(alloc, 0, 255)); |
| 1333 | } |
| 1334 | |
| 1335 | void MBitAnd::computeRange(TempAllocator& alloc) { |
| 1336 | if (type() != MIRType::Int32) { |
| 1337 | return; |
| 1338 | } |
| 1339 | |
| 1340 | Range left(getOperand(0)); |
| 1341 | Range right(getOperand(1)); |
| 1342 | left.wrapAroundToInt32(); |
| 1343 | right.wrapAroundToInt32(); |
| 1344 | |
| 1345 | setRange(Range::and_(alloc, &left, &right)); |
| 1346 | } |
| 1347 | |
| 1348 | void MBitOr::computeRange(TempAllocator& alloc) { |
| 1349 | if (type() != MIRType::Int32) { |
| 1350 | return; |
| 1351 | } |
| 1352 | |
| 1353 | Range left(getOperand(0)); |
| 1354 | Range right(getOperand(1)); |
| 1355 | left.wrapAroundToInt32(); |
| 1356 | right.wrapAroundToInt32(); |
| 1357 | |
| 1358 | setRange(Range::or_(alloc, &left, &right)); |
| 1359 | } |
| 1360 | |
| 1361 | void MBitXor::computeRange(TempAllocator& alloc) { |
| 1362 | if (type() != MIRType::Int32) { |
| 1363 | return; |
| 1364 | } |
| 1365 | |
| 1366 | Range left(getOperand(0)); |
| 1367 | Range right(getOperand(1)); |
| 1368 | left.wrapAroundToInt32(); |
| 1369 | right.wrapAroundToInt32(); |
| 1370 | |
| 1371 | setRange(Range::xor_(alloc, &left, &right)); |
| 1372 | } |
| 1373 | |
| 1374 | void MBitNot::computeRange(TempAllocator& alloc) { |
| 1375 | if (type() == MIRType::Int64) { |
| 1376 | return; |
| 1377 | } |
| 1378 | MOZ_ASSERT(type() == MIRType::Int32)do { static_assert( mozilla::detail::AssertionConditionType< decltype(type() == MIRType::Int32)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(type() == MIRType::Int32))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("type() == MIRType::Int32" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1378); AnnotateMozCrashReason("MOZ_ASSERT" "(" "type() == MIRType::Int32" ")"); do { *((volatile int*)__null) = 1378; ::abort(); } while (false); } } while (false); |
| 1379 | |
| 1380 | Range op(getOperand(0)); |
| 1381 | op.wrapAroundToInt32(); |
| 1382 | |
| 1383 | setRange(Range::not_(alloc, &op)); |
| 1384 | } |
| 1385 | |
| 1386 | void MLsh::computeRange(TempAllocator& alloc) { |
| 1387 | if (type() != MIRType::Int32) { |
| 1388 | return; |
| 1389 | } |
| 1390 | |
| 1391 | Range left(getOperand(0)); |
| 1392 | Range right(getOperand(1)); |
| 1393 | left.wrapAroundToInt32(); |
| 1394 | |
| 1395 | MConstant* rhsConst = getOperand(1)->maybeConstantValue(); |
| 1396 | if (rhsConst && rhsConst->type() == MIRType::Int32) { |
| 1397 | int32_t c = rhsConst->toInt32(); |
| 1398 | setRange(Range::lsh(alloc, &left, c)); |
| 1399 | return; |
| 1400 | } |
| 1401 | |
| 1402 | right.wrapAroundToShiftCount(); |
| 1403 | setRange(Range::lsh(alloc, &left, &right)); |
| 1404 | } |
| 1405 | |
| 1406 | void MRsh::computeRange(TempAllocator& alloc) { |
| 1407 | if (type() != MIRType::Int32) { |
| 1408 | return; |
| 1409 | } |
| 1410 | |
| 1411 | Range left(getOperand(0)); |
| 1412 | Range right(getOperand(1)); |
| 1413 | left.wrapAroundToInt32(); |
| 1414 | |
| 1415 | MConstant* rhsConst = getOperand(1)->maybeConstantValue(); |
| 1416 | if (rhsConst && rhsConst->type() == MIRType::Int32) { |
| 1417 | int32_t c = rhsConst->toInt32(); |
| 1418 | setRange(Range::rsh(alloc, &left, c)); |
| 1419 | return; |
| 1420 | } |
| 1421 | |
| 1422 | right.wrapAroundToShiftCount(); |
| 1423 | setRange(Range::rsh(alloc, &left, &right)); |
| 1424 | } |
| 1425 | |
| 1426 | void MUrsh::computeRange(TempAllocator& alloc) { |
| 1427 | if (type() != MIRType::Int32) { |
| 1428 | return; |
| 1429 | } |
| 1430 | |
| 1431 | Range left(getOperand(0)); |
| 1432 | Range right(getOperand(1)); |
| 1433 | |
| 1434 | // ursh can be thought of as converting its left operand to uint32, or it |
| 1435 | // can be thought of as converting its left operand to int32, and then |
| 1436 | // reinterpreting the int32 bits as a uint32 value. Both approaches yield |
| 1437 | // the same result. Since we lack support for full uint32 ranges, we use |
| 1438 | // the second interpretation, though it does cause us to be conservative. |
| 1439 | left.wrapAroundToInt32(); |
| 1440 | right.wrapAroundToShiftCount(); |
| 1441 | |
| 1442 | MConstant* rhsConst = getOperand(1)->maybeConstantValue(); |
| 1443 | if (rhsConst && rhsConst->type() == MIRType::Int32) { |
| 1444 | int32_t c = rhsConst->toInt32(); |
| 1445 | setRange(Range::ursh(alloc, &left, c)); |
| 1446 | } else { |
| 1447 | setRange(Range::ursh(alloc, &left, &right)); |
| 1448 | } |
| 1449 | |
| 1450 | MOZ_ASSERT(range()->lower() >= 0)do { static_assert( mozilla::detail::AssertionConditionType< decltype(range()->lower() >= 0)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(range()->lower() >= 0) )), 0))) { do { } while (false); MOZ_ReportAssertionFailure("range()->lower() >= 0" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1450); AnnotateMozCrashReason("MOZ_ASSERT" "(" "range()->lower() >= 0" ")"); do { *((volatile int*)__null) = 1450; ::abort(); } while (false); } } while (false); |
| 1451 | } |
| 1452 | |
| 1453 | void MAbs::computeRange(TempAllocator& alloc) { |
| 1454 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1455 | return; |
| 1456 | } |
| 1457 | |
| 1458 | Range other(getOperand(0)); |
| 1459 | Range* next = Range::abs(alloc, &other); |
| 1460 | if (implicitTruncate_) { |
| 1461 | next->wrapAroundToInt32(); |
| 1462 | } |
| 1463 | setRange(next); |
| 1464 | } |
| 1465 | |
| 1466 | void MFloor::computeRange(TempAllocator& alloc) { |
| 1467 | Range other(getOperand(0)); |
| 1468 | setRange(Range::floor(alloc, &other)); |
| 1469 | } |
| 1470 | |
| 1471 | void MCeil::computeRange(TempAllocator& alloc) { |
| 1472 | Range other(getOperand(0)); |
| 1473 | setRange(Range::ceil(alloc, &other)); |
| 1474 | } |
| 1475 | |
| 1476 | void MClz::computeRange(TempAllocator& alloc) { |
| 1477 | if (type() != MIRType::Int32) { |
| 1478 | return; |
| 1479 | } |
| 1480 | setRange(Range::NewUInt32Range(alloc, 0, 32)); |
| 1481 | } |
| 1482 | |
| 1483 | void MCtz::computeRange(TempAllocator& alloc) { |
| 1484 | if (type() != MIRType::Int32) { |
| 1485 | return; |
| 1486 | } |
| 1487 | setRange(Range::NewUInt32Range(alloc, 0, 32)); |
| 1488 | } |
| 1489 | |
| 1490 | void MPopcnt::computeRange(TempAllocator& alloc) { |
| 1491 | if (type() != MIRType::Int32) { |
| 1492 | return; |
| 1493 | } |
| 1494 | setRange(Range::NewUInt32Range(alloc, 0, 32)); |
| 1495 | } |
| 1496 | |
| 1497 | void MMinMax::computeRange(TempAllocator& alloc) { |
| 1498 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1499 | return; |
| 1500 | } |
| 1501 | |
| 1502 | Range left(getOperand(0)); |
| 1503 | Range right(getOperand(1)); |
| 1504 | setRange(isMax() ? Range::max(alloc, &left, &right) |
| 1505 | : Range::min(alloc, &left, &right)); |
| 1506 | } |
| 1507 | |
| 1508 | void MAdd::computeRange(TempAllocator& alloc) { |
| 1509 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1510 | return; |
| 1511 | } |
| 1512 | Range left(getOperand(0)); |
| 1513 | Range right(getOperand(1)); |
| 1514 | Range* next = Range::add(alloc, &left, &right); |
| 1515 | if (isTruncated()) { |
| 1516 | next->wrapAroundToInt32(); |
| 1517 | } |
| 1518 | setRange(next); |
| 1519 | } |
| 1520 | |
| 1521 | void MSub::computeRange(TempAllocator& alloc) { |
| 1522 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1523 | return; |
| 1524 | } |
| 1525 | Range left(getOperand(0)); |
| 1526 | Range right(getOperand(1)); |
| 1527 | Range* next = Range::sub(alloc, &left, &right); |
| 1528 | if (isTruncated()) { |
| 1529 | next->wrapAroundToInt32(); |
| 1530 | } |
| 1531 | setRange(next); |
| 1532 | } |
| 1533 | |
| 1534 | void MMul::computeRange(TempAllocator& alloc) { |
| 1535 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1536 | return; |
| 1537 | } |
| 1538 | Range left(getOperand(0)); |
| 1539 | Range right(getOperand(1)); |
| 1540 | if (canBeNegativeZero()) { |
| 1541 | canBeNegativeZero_ = Range::negativeZeroMul(&left, &right); |
| 1542 | } |
| 1543 | Range* next = Range::mul(alloc, &left, &right); |
| 1544 | if (!next->canBeNegativeZero()) { |
| 1545 | canBeNegativeZero_ = false; |
| 1546 | } |
| 1547 | // Truncated multiplications could overflow in both directions |
| 1548 | if (isTruncated()) { |
| 1549 | next->wrapAroundToInt32(); |
| 1550 | } |
| 1551 | setRange(next); |
| 1552 | } |
| 1553 | |
| 1554 | void MMod::computeRange(TempAllocator& alloc) { |
| 1555 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1556 | return; |
| 1557 | } |
| 1558 | Range lhs(getOperand(0)); |
| 1559 | Range rhs(getOperand(1)); |
| 1560 | |
| 1561 | // If either operand is a NaN, the result is NaN. This also conservatively |
| 1562 | // handles Infinity cases. |
| 1563 | if (!lhs.hasInt32Bounds() || !rhs.hasInt32Bounds()) { |
| 1564 | return; |
| 1565 | } |
| 1566 | |
| 1567 | // If RHS can be zero, the result can be NaN. |
| 1568 | if (rhs.lower() <= 0 && rhs.upper() >= 0) { |
| 1569 | return; |
| 1570 | } |
| 1571 | |
| 1572 | // If both operands are non-negative integers, we can optimize this to an |
| 1573 | // unsigned mod. |
| 1574 | if (type() == MIRType::Int32 && rhs.lower() > 0) { |
| 1575 | bool hasDoubles = lhs.lower() < 0 || lhs.canHaveFractionalPart() || |
| 1576 | rhs.canHaveFractionalPart(); |
| 1577 | // It is not possible to check that lhs.lower() >= 0, since the range |
| 1578 | // of a ursh with rhs a 0 constant is wrapped around the int32 range in |
| 1579 | // Range::Range(). However, IsUint32Type() will only return true for |
| 1580 | // nodes that lie in the range [0, UINT32_MAX]. |
| 1581 | bool hasUint32s = |
| 1582 | IsUint32Type(getOperand(0)) && |
| 1583 | getOperand(1)->type() == MIRType::Int32 && |
| 1584 | (IsUint32Type(getOperand(1)) || getOperand(1)->isConstant()); |
| 1585 | if (!hasDoubles || hasUint32s) { |
| 1586 | unsigned_ = true; |
| 1587 | } |
| 1588 | } |
| 1589 | |
| 1590 | // For unsigned mod, we have to convert both operands to unsigned. |
| 1591 | // Note that we handled the case of a zero rhs above. |
| 1592 | if (unsigned_) { |
| 1593 | // The result of an unsigned mod will never be unsigned-greater than |
| 1594 | // either operand. |
| 1595 | uint32_t lhsBound = std::max<uint32_t>(lhs.lower(), lhs.upper()); |
| 1596 | uint32_t rhsBound = std::max<uint32_t>(rhs.lower(), rhs.upper()); |
| 1597 | |
| 1598 | // If either range crosses through -1 as a signed value, it could be |
| 1599 | // the maximum unsigned value when interpreted as unsigned. If the range |
| 1600 | // doesn't include -1, then the simple max value we computed above is |
| 1601 | // correct. |
| 1602 | if (lhs.lower() <= -1 && lhs.upper() >= -1) { |
| 1603 | lhsBound = UINT32_MAX(4294967295U); |
| 1604 | } |
| 1605 | if (rhs.lower() <= -1 && rhs.upper() >= -1) { |
| 1606 | rhsBound = UINT32_MAX(4294967295U); |
| 1607 | } |
| 1608 | |
| 1609 | // The result will never be equal to the rhs, and we shouldn't have |
| 1610 | // any rounding to worry about. |
| 1611 | MOZ_ASSERT(!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart ())>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1611); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart()" ")"); do { *((volatile int*)__null) = 1611; ::abort(); } while (false); } } while (false); |
| 1612 | --rhsBound; |
| 1613 | |
| 1614 | // This gives us two upper bounds, so we can take the best one. |
| 1615 | setRange(Range::NewUInt32Range(alloc, 0, std::min(lhsBound, rhsBound))); |
| 1616 | return; |
| 1617 | } |
| 1618 | |
| 1619 | // Math.abs(lhs % rhs) == Math.abs(lhs) % Math.abs(rhs). |
| 1620 | // First, the absolute value of the result will always be less than the |
| 1621 | // absolute value of rhs. (And if rhs is zero, the result is NaN). |
| 1622 | int64_t a = Abs<int64_t>(rhs.lower()); |
| 1623 | int64_t b = Abs<int64_t>(rhs.upper()); |
| 1624 | if (a == 0 && b == 0) { |
| 1625 | return; |
| 1626 | } |
| 1627 | int64_t rhsAbsBound = std::max(a, b); |
| 1628 | |
| 1629 | // If the value is known to be integer, less-than abs(rhs) is equivalent |
| 1630 | // to less-than-or-equal abs(rhs)-1. This is important for being able to |
| 1631 | // say that the result of x%256 is an 8-bit unsigned number. |
| 1632 | if (!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart()) { |
| 1633 | --rhsAbsBound; |
| 1634 | } |
| 1635 | |
| 1636 | // Next, the absolute value of the result will never be greater than the |
| 1637 | // absolute value of lhs. |
| 1638 | int64_t lhsAbsBound = |
| 1639 | std::max(Abs<int64_t>(lhs.lower()), Abs<int64_t>(lhs.upper())); |
| 1640 | |
| 1641 | // This gives us two upper bounds, so we can take the best one. |
| 1642 | int64_t absBound = std::min(lhsAbsBound, rhsAbsBound); |
| 1643 | |
| 1644 | // Now consider the sign of the result. |
| 1645 | // If lhs is non-negative, the result will be non-negative. |
| 1646 | // If lhs is non-positive, the result will be non-positive. |
| 1647 | int64_t lower = lhs.lower() >= 0 ? 0 : -absBound; |
| 1648 | int64_t upper = lhs.upper() <= 0 ? 0 : absBound; |
| 1649 | |
| 1650 | Range::FractionalPartFlag newCanHaveFractionalPart = |
| 1651 | Range::FractionalPartFlag(lhs.canHaveFractionalPart() || |
| 1652 | rhs.canHaveFractionalPart()); |
| 1653 | |
| 1654 | // If the lhs can have the sign bit set and we can return a zero, it'll be a |
| 1655 | // negative zero. |
| 1656 | Range::NegativeZeroFlag newMayIncludeNegativeZero = |
| 1657 | Range::NegativeZeroFlag(lhs.canHaveSignBitSet()); |
| 1658 | |
| 1659 | setRange(new (alloc) Range(lower, upper, newCanHaveFractionalPart, |
| 1660 | newMayIncludeNegativeZero, |
| 1661 | std::min(lhs.exponent(), rhs.exponent()))); |
| 1662 | } |
| 1663 | |
| 1664 | void MDiv::computeRange(TempAllocator& alloc) { |
| 1665 | if (type() != MIRType::Int32 && type() != MIRType::Double) { |
| 1666 | return; |
| 1667 | } |
| 1668 | Range lhs(getOperand(0)); |
| 1669 | Range rhs(getOperand(1)); |
| 1670 | |
| 1671 | // If either operand is a NaN, the result is NaN. This also conservatively |
| 1672 | // handles Infinity cases. |
| 1673 | if (!lhs.hasInt32Bounds() || !rhs.hasInt32Bounds()) { |
| 1674 | return; |
| 1675 | } |
| 1676 | |
| 1677 | // Something simple for now: When dividing by a positive rhs, the result |
| 1678 | // won't be further from zero than lhs. |
| 1679 | if (lhs.lower() >= 0 && rhs.lower() >= 1) { |
| 1680 | setRange(new (alloc) Range(0, lhs.upper(), Range::IncludesFractionalParts, |
| 1681 | Range::IncludesNegativeZero, lhs.exponent())); |
| 1682 | } else if (unsigned_ && rhs.lower() >= 1) { |
| 1683 | // We shouldn't set the unsigned flag if the inputs can have |
| 1684 | // fractional parts. |
| 1685 | MOZ_ASSERT(!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart ())>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1685); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!lhs.canHaveFractionalPart() && !rhs.canHaveFractionalPart()" ")"); do { *((volatile int*)__null) = 1685; ::abort(); } while (false); } } while (false); |
| 1686 | // We shouldn't set the unsigned flag if the inputs can be |
| 1687 | // negative zero. |
| 1688 | MOZ_ASSERT(!lhs.canBeNegativeZero() && !rhs.canBeNegativeZero())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!lhs.canBeNegativeZero() && !rhs.canBeNegativeZero ())>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!lhs.canBeNegativeZero() && !rhs.canBeNegativeZero ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!lhs.canBeNegativeZero() && !rhs.canBeNegativeZero()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1688); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!lhs.canBeNegativeZero() && !rhs.canBeNegativeZero()" ")"); do { *((volatile int*)__null) = 1688; ::abort(); } while (false); } } while (false); |
| 1689 | // Unsigned division by a non-zero rhs will return a uint32 value. |
| 1690 | setRange(Range::NewUInt32Range(alloc, 0, UINT32_MAX(4294967295U))); |
| 1691 | } |
| 1692 | } |
| 1693 | |
| 1694 | void MSqrt::computeRange(TempAllocator& alloc) { |
| 1695 | Range input(getOperand(0)); |
| 1696 | |
| 1697 | // If either operand is a NaN, the result is NaN. This also conservatively |
| 1698 | // handles Infinity cases. |
| 1699 | if (!input.hasInt32Bounds()) { |
| 1700 | return; |
| 1701 | } |
| 1702 | |
| 1703 | // Sqrt of a negative non-zero value is NaN. |
| 1704 | if (input.lower() < 0) { |
| 1705 | return; |
| 1706 | } |
| 1707 | |
| 1708 | // Something simple for now: When taking the sqrt of a positive value, the |
| 1709 | // result won't be further from zero than the input. |
| 1710 | // And, sqrt of an integer may have a fractional part. |
| 1711 | setRange(new (alloc) Range(0, input.upper(), Range::IncludesFractionalParts, |
| 1712 | input.canBeNegativeZero(), input.exponent())); |
| 1713 | } |
| 1714 | |
| 1715 | void MToDouble::computeRange(TempAllocator& alloc) { |
| 1716 | setRange(new (alloc) Range(getOperand(0))); |
| 1717 | } |
| 1718 | |
| 1719 | void MToFloat32::computeRange(TempAllocator& alloc) {} |
| 1720 | |
| 1721 | void MTruncateToInt32::computeRange(TempAllocator& alloc) { |
| 1722 | Range* output = new (alloc) Range(getOperand(0)); |
| 1723 | output->wrapAroundToInt32(); |
| 1724 | setRange(output); |
| 1725 | } |
| 1726 | |
| 1727 | void MToNumberInt32::computeRange(TempAllocator& alloc) { |
| 1728 | // No clamping since this computes the range *before* bailouts. |
| 1729 | setRange(new (alloc) Range(getOperand(0))); |
| 1730 | } |
| 1731 | |
| 1732 | void MToIntegerInt32::computeRange(TempAllocator& alloc) { |
| 1733 | Range other(input()); |
| 1734 | setRange(Range::toIntegerInt32(alloc, &other)); |
| 1735 | } |
| 1736 | |
| 1737 | void MLimitedTruncate::computeRange(TempAllocator& alloc) { |
| 1738 | Range* output = new (alloc) Range(input()); |
| 1739 | setRange(output); |
| 1740 | } |
| 1741 | |
| 1742 | static Range* GetArrayBufferViewRange(TempAllocator& alloc, Scalar::Type type) { |
| 1743 | switch (type) { |
| 1744 | case Scalar::Uint8Clamped: |
| 1745 | case Scalar::Uint8: |
| 1746 | return Range::NewUInt32Range(alloc, 0, UINT8_MAX(255)); |
| 1747 | case Scalar::Uint16: |
| 1748 | return Range::NewUInt32Range(alloc, 0, UINT16_MAX(65535)); |
| 1749 | case Scalar::Uint32: |
| 1750 | return Range::NewUInt32Range(alloc, 0, UINT32_MAX(4294967295U)); |
| 1751 | |
| 1752 | case Scalar::Int8: |
| 1753 | return Range::NewInt32Range(alloc, INT8_MIN(-128), INT8_MAX(127)); |
| 1754 | case Scalar::Int16: |
| 1755 | return Range::NewInt32Range(alloc, INT16_MIN(-32767-1), INT16_MAX(32767)); |
| 1756 | case Scalar::Int32: |
| 1757 | return Range::NewInt32Range(alloc, INT32_MIN(-2147483647-1), INT32_MAX(2147483647)); |
| 1758 | |
| 1759 | case Scalar::BigInt64: |
| 1760 | case Scalar::BigUint64: |
| 1761 | case Scalar::Int64: |
| 1762 | case Scalar::Simd128: |
| 1763 | case Scalar::Float32: |
| 1764 | case Scalar::Float64: |
| 1765 | case Scalar::MaxTypedArrayViewType: |
| 1766 | break; |
| 1767 | } |
| 1768 | return nullptr; |
| 1769 | } |
| 1770 | |
| 1771 | void MLoadUnboxedScalar::computeRange(TempAllocator& alloc) { |
| 1772 | // We have an Int32 type and if this is a UInt32 load it may produce a value |
| 1773 | // outside of our range, but we have a bailout to handle those cases. |
| 1774 | setRange(GetArrayBufferViewRange(alloc, storageType())); |
| 1775 | } |
| 1776 | |
| 1777 | void MLoadDataViewElement::computeRange(TempAllocator& alloc) { |
| 1778 | // We have an Int32 type and if this is a UInt32 load it may produce a value |
| 1779 | // outside of our range, but we have a bailout to handle those cases. |
| 1780 | setRange(GetArrayBufferViewRange(alloc, storageType())); |
| 1781 | } |
| 1782 | |
| 1783 | void MArrayLength::computeRange(TempAllocator& alloc) { |
| 1784 | // Array lengths can go up to UINT32_MAX. We will bail out if the array |
| 1785 | // length > INT32_MAX. |
| 1786 | MOZ_ASSERT(type() == MIRType::Int32)do { static_assert( mozilla::detail::AssertionConditionType< decltype(type() == MIRType::Int32)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(type() == MIRType::Int32))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("type() == MIRType::Int32" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1786); AnnotateMozCrashReason("MOZ_ASSERT" "(" "type() == MIRType::Int32" ")"); do { *((volatile int*)__null) = 1786; ::abort(); } while (false); } } while (false); |
| 1787 | setRange(Range::NewUInt32Range(alloc, 0, INT32_MAX(2147483647))); |
| 1788 | } |
| 1789 | |
| 1790 | void MInitializedLength::computeRange(TempAllocator& alloc) { |
| 1791 | setRange( |
| 1792 | Range::NewUInt32Range(alloc, 0, NativeObject::MAX_DENSE_ELEMENTS_COUNT)); |
| 1793 | } |
| 1794 | |
| 1795 | void MArrayBufferViewLength::computeRange(TempAllocator& alloc) { |
| 1796 | if (ArrayBufferObject::maxBufferByteLength() <= INT32_MAX(2147483647)) { |
| 1797 | setRange(Range::NewUInt32Range(alloc, 0, INT32_MAX(2147483647))); |
| 1798 | } |
| 1799 | } |
| 1800 | |
| 1801 | void MArrayBufferViewByteOffset::computeRange(TempAllocator& alloc) { |
| 1802 | if (ArrayBufferObject::maxBufferByteLength() <= INT32_MAX(2147483647)) { |
| 1803 | setRange(Range::NewUInt32Range(alloc, 0, INT32_MAX(2147483647))); |
| 1804 | } |
| 1805 | } |
| 1806 | |
| 1807 | void MTypedArrayElementSize::computeRange(TempAllocator& alloc) { |
| 1808 | constexpr auto MaxTypedArraySize = sizeof(double); |
| 1809 | |
| 1810 | #define ASSERT_MAX_SIZE(_, T, N) \ |
| 1811 | static_assert(sizeof(T) <= MaxTypedArraySize, \ |
| 1812 | "unexpected typed array type exceeding 64-bits storage"); |
| 1813 | JS_FOR_EACH_TYPED_ARRAY(ASSERT_MAX_SIZE)ASSERT_MAX_SIZE(int8_t, int8_t, Int8) ASSERT_MAX_SIZE(uint8_t , uint8_t, Uint8) ASSERT_MAX_SIZE(int16_t, int16_t, Int16) ASSERT_MAX_SIZE (uint16_t, uint16_t, Uint16) ASSERT_MAX_SIZE(int32_t, int32_t , Int32) ASSERT_MAX_SIZE(uint32_t, uint32_t, Uint32) ASSERT_MAX_SIZE (float, float, Float32) ASSERT_MAX_SIZE(double, double, Float64 ) ASSERT_MAX_SIZE(uint8_t, js::uint8_clamped, Uint8Clamped) ASSERT_MAX_SIZE (int64_t, int64_t, BigInt64) ASSERT_MAX_SIZE(uint64_t, uint64_t , BigUint64) |
| 1814 | #undef ASSERT_MAX_SIZE |
| 1815 | |
| 1816 | setRange(Range::NewUInt32Range(alloc, 0, MaxTypedArraySize)); |
| 1817 | } |
| 1818 | |
| 1819 | void MStringLength::computeRange(TempAllocator& alloc) { |
| 1820 | static_assert(JSString::MAX_LENGTH <= UINT32_MAX(4294967295U), |
| 1821 | "NewUInt32Range requires a uint32 value"); |
| 1822 | setRange(Range::NewUInt32Range(alloc, 0, JSString::MAX_LENGTH)); |
| 1823 | } |
| 1824 | |
| 1825 | void MArgumentsLength::computeRange(TempAllocator& alloc) { |
| 1826 | // This is is a conservative upper bound on what |TooManyActualArguments| |
| 1827 | // checks. If exceeded, Ion will not be entered in the first place. |
| 1828 | static_assert(ARGS_LENGTH_MAX <= UINT32_MAX(4294967295U), |
| 1829 | "NewUInt32Range requires a uint32 value"); |
| 1830 | setRange(Range::NewUInt32Range(alloc, 0, ARGS_LENGTH_MAX)); |
| 1831 | } |
| 1832 | |
| 1833 | void MBoundsCheck::computeRange(TempAllocator& alloc) { |
| 1834 | // Just transfer the incoming index range to the output. The length() is |
| 1835 | // also interesting, but it is handled as a bailout check, and we're |
| 1836 | // computing a pre-bailout range here. |
| 1837 | setRange(new (alloc) Range(index())); |
| 1838 | } |
| 1839 | |
| 1840 | void MSpectreMaskIndex::computeRange(TempAllocator& alloc) { |
| 1841 | // Just transfer the incoming index range to the output for now. |
| 1842 | setRange(new (alloc) Range(index())); |
| 1843 | } |
| 1844 | |
| 1845 | void MInt32ToIntPtr::computeRange(TempAllocator& alloc) { |
| 1846 | setRange(new (alloc) Range(input())); |
| 1847 | } |
| 1848 | |
| 1849 | void MNonNegativeIntPtrToInt32::computeRange(TempAllocator& alloc) { |
| 1850 | // We will bail out if the IntPtr value > INT32_MAX. |
| 1851 | setRange(Range::NewUInt32Range(alloc, 0, INT32_MAX(2147483647))); |
| 1852 | } |
| 1853 | |
| 1854 | void MArrayPush::computeRange(TempAllocator& alloc) { |
| 1855 | // MArrayPush returns the new array length. It bails out if the new length |
| 1856 | // doesn't fit in an Int32. |
| 1857 | MOZ_ASSERT(type() == MIRType::Int32)do { static_assert( mozilla::detail::AssertionConditionType< decltype(type() == MIRType::Int32)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(type() == MIRType::Int32))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("type() == MIRType::Int32" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1857); AnnotateMozCrashReason("MOZ_ASSERT" "(" "type() == MIRType::Int32" ")"); do { *((volatile int*)__null) = 1857; ::abort(); } while (false); } } while (false); |
| 1858 | setRange(Range::NewUInt32Range(alloc, 0, INT32_MAX(2147483647))); |
| 1859 | } |
| 1860 | |
| 1861 | void MMathFunction::computeRange(TempAllocator& alloc) { |
| 1862 | Range opRange(getOperand(0)); |
| 1863 | switch (function()) { |
| 1864 | case UnaryMathFunction::Sin: |
| 1865 | case UnaryMathFunction::Cos: |
| 1866 | if (!opRange.canBeInfiniteOrNaN()) { |
| 1867 | setRange(Range::NewDoubleRange(alloc, -1.0, 1.0)); |
| 1868 | } |
| 1869 | break; |
| 1870 | default: |
| 1871 | break; |
| 1872 | } |
| 1873 | } |
| 1874 | |
| 1875 | void MSign::computeRange(TempAllocator& alloc) { |
| 1876 | Range opRange(getOperand(0)); |
| 1877 | setRange(Range::sign(alloc, &opRange)); |
| 1878 | } |
| 1879 | |
| 1880 | void MRandom::computeRange(TempAllocator& alloc) { |
| 1881 | Range* r = Range::NewDoubleRange(alloc, 0.0, 1.0); |
| 1882 | |
| 1883 | // Random never returns negative zero. |
| 1884 | r->refineToExcludeNegativeZero(); |
| 1885 | |
| 1886 | setRange(r); |
| 1887 | } |
| 1888 | |
| 1889 | void MNaNToZero::computeRange(TempAllocator& alloc) { |
| 1890 | Range other(input()); |
| 1891 | setRange(Range::NaNToZero(alloc, &other)); |
| 1892 | } |
| 1893 | |
| 1894 | /////////////////////////////////////////////////////////////////////////////// |
| 1895 | // Range Analysis |
| 1896 | /////////////////////////////////////////////////////////////////////////////// |
| 1897 | |
| 1898 | static BranchDirection NegateBranchDirection(BranchDirection dir) { |
| 1899 | return (dir == FALSE_BRANCH) ? TRUE_BRANCH : FALSE_BRANCH; |
| 1900 | } |
| 1901 | |
| 1902 | bool RangeAnalysis::analyzeLoop(MBasicBlock* header) { |
| 1903 | MOZ_ASSERT(header->hasUniqueBackedge())do { static_assert( mozilla::detail::AssertionConditionType< decltype(header->hasUniqueBackedge())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(header->hasUniqueBackedge ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("header->hasUniqueBackedge()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 1903); AnnotateMozCrashReason("MOZ_ASSERT" "(" "header->hasUniqueBackedge()" ")"); do { *((volatile int*)__null) = 1903; ::abort(); } while (false); } } while (false); |
| 1904 | |
| 1905 | // Try to compute an upper bound on the number of times the loop backedge |
| 1906 | // will be taken. Look for tests that dominate the backedge and which have |
| 1907 | // an edge leaving the loop body. |
| 1908 | MBasicBlock* backedge = header->backedge(); |
| 1909 | |
| 1910 | // Ignore trivial infinite loops. |
| 1911 | if (backedge == header) { |
| 1912 | return true; |
| 1913 | } |
| 1914 | |
| 1915 | bool canOsr; |
| 1916 | size_t numBlocks = MarkLoopBlocks(graph_, header, &canOsr); |
| 1917 | |
| 1918 | // Ignore broken loops. |
| 1919 | if (numBlocks == 0) { |
| 1920 | return true; |
| 1921 | } |
| 1922 | |
| 1923 | LoopIterationBound* iterationBound = nullptr; |
| 1924 | |
| 1925 | MBasicBlock* block = backedge; |
| 1926 | do { |
| 1927 | BranchDirection direction; |
| 1928 | MTest* branch = block->immediateDominatorBranch(&direction); |
| 1929 | |
| 1930 | if (block == block->immediateDominator()) { |
| 1931 | break; |
| 1932 | } |
| 1933 | |
| 1934 | block = block->immediateDominator(); |
| 1935 | |
| 1936 | if (branch) { |
| 1937 | direction = NegateBranchDirection(direction); |
| 1938 | MBasicBlock* otherBlock = branch->branchSuccessor(direction); |
| 1939 | if (!otherBlock->isMarked()) { |
| 1940 | if (!alloc().ensureBallast()) { |
| 1941 | return false; |
| 1942 | } |
| 1943 | iterationBound = analyzeLoopIterationCount(header, branch, direction); |
| 1944 | if (iterationBound) { |
| 1945 | break; |
| 1946 | } |
| 1947 | } |
| 1948 | } |
| 1949 | } while (block != header); |
| 1950 | |
| 1951 | if (!iterationBound) { |
| 1952 | UnmarkLoopBlocks(graph_, header); |
| 1953 | return true; |
| 1954 | } |
| 1955 | |
| 1956 | if (!loopIterationBounds.append(iterationBound)) { |
| 1957 | return false; |
| 1958 | } |
| 1959 | |
| 1960 | #ifdef DEBUG1 |
| 1961 | if (JitSpewEnabled(JitSpew_Range)) { |
| 1962 | Sprinter sp(GetJitContext()->cx); |
| 1963 | if (!sp.init()) { |
| 1964 | return false; |
| 1965 | } |
| 1966 | iterationBound->boundSum.dump(sp); |
| 1967 | JitSpew(JitSpew_Range, "computed symbolic bound on backedges: %s", |
| 1968 | sp.string()); |
| 1969 | } |
| 1970 | #endif |
| 1971 | |
| 1972 | // Try to compute symbolic bounds for the phi nodes at the head of this |
| 1973 | // loop, expressed in terms of the iteration bound just computed. |
| 1974 | |
| 1975 | for (MPhiIterator iter(header->phisBegin()); iter != header->phisEnd(); |
| 1976 | iter++) { |
| 1977 | analyzeLoopPhi(iterationBound, *iter); |
| 1978 | } |
| 1979 | |
| 1980 | if (!mir->compilingWasm() && !mir->outerInfo().hadBoundsCheckBailout()) { |
| 1981 | // Try to hoist any bounds checks from the loop using symbolic bounds. |
| 1982 | |
| 1983 | Vector<MBoundsCheck*, 0, JitAllocPolicy> hoistedChecks(alloc()); |
| 1984 | |
| 1985 | for (ReversePostorderIterator iter(graph_.rpoBegin(header)); |
| 1986 | iter != graph_.rpoEnd(); iter++) { |
| 1987 | MBasicBlock* block = *iter; |
| 1988 | if (!block->isMarked()) { |
| 1989 | continue; |
| 1990 | } |
| 1991 | |
| 1992 | for (MDefinitionIterator iter(block); iter; iter++) { |
| 1993 | MDefinition* def = *iter; |
| 1994 | if (def->isBoundsCheck() && def->isMovable()) { |
| 1995 | if (!alloc().ensureBallast()) { |
| 1996 | return false; |
| 1997 | } |
| 1998 | if (tryHoistBoundsCheck(header, def->toBoundsCheck())) { |
| 1999 | if (!hoistedChecks.append(def->toBoundsCheck())) { |
| 2000 | return false; |
| 2001 | } |
| 2002 | } |
| 2003 | } |
| 2004 | } |
| 2005 | } |
| 2006 | |
| 2007 | // Note: replace all uses of the original bounds check with the |
| 2008 | // actual index. This is usually done during bounds check elimination, |
| 2009 | // but in this case it's safe to do it here since the load/store is |
| 2010 | // definitely not loop-invariant, so we will never move it before |
| 2011 | // one of the bounds checks we just added. |
| 2012 | for (size_t i = 0; i < hoistedChecks.length(); i++) { |
| 2013 | MBoundsCheck* ins = hoistedChecks[i]; |
| 2014 | ins->replaceAllUsesWith(ins->index()); |
| 2015 | ins->block()->discard(ins); |
| 2016 | } |
| 2017 | } |
| 2018 | |
| 2019 | UnmarkLoopBlocks(graph_, header); |
| 2020 | return true; |
| 2021 | } |
| 2022 | |
| 2023 | // Unbox beta nodes in order to hoist instruction properly, and not be limited |
| 2024 | // by the beta nodes which are added after each branch. |
| 2025 | static inline MDefinition* DefinitionOrBetaInputDefinition(MDefinition* ins) { |
| 2026 | while (ins->isBeta()) { |
| 2027 | ins = ins->toBeta()->input(); |
| 2028 | } |
| 2029 | return ins; |
| 2030 | } |
| 2031 | |
| 2032 | LoopIterationBound* RangeAnalysis::analyzeLoopIterationCount( |
| 2033 | MBasicBlock* header, MTest* test, BranchDirection direction) { |
| 2034 | SimpleLinearSum lhs(nullptr, 0); |
| 2035 | MDefinition* rhs; |
| 2036 | bool lessEqual; |
| 2037 | if (!ExtractLinearInequality(test, direction, &lhs, &rhs, &lessEqual)) { |
| 2038 | return nullptr; |
| 2039 | } |
| 2040 | |
| 2041 | // Ensure the rhs is a loop invariant term. |
| 2042 | if (rhs && rhs->block()->isMarked()) { |
| 2043 | if (lhs.term && lhs.term->block()->isMarked()) { |
| 2044 | return nullptr; |
| 2045 | } |
| 2046 | MDefinition* temp = lhs.term; |
| 2047 | lhs.term = rhs; |
| 2048 | rhs = temp; |
| 2049 | if (!SafeSub(0, lhs.constant, &lhs.constant)) { |
| 2050 | return nullptr; |
| 2051 | } |
| 2052 | lessEqual = !lessEqual; |
| 2053 | } |
| 2054 | |
| 2055 | MOZ_ASSERT_IF(rhs, !rhs->block()->isMarked())do { if (rhs) { do { static_assert( mozilla::detail::AssertionConditionType <decltype(!rhs->block()->isMarked())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!rhs->block()->isMarked ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!rhs->block()->isMarked()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2055); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!rhs->block()->isMarked()" ")"); do { *((volatile int*)__null) = 2055; ::abort(); } while (false); } } while (false); } } while (false); |
| 2056 | |
| 2057 | // Ensure the lhs is a phi node from the start of the loop body. |
| 2058 | if (!lhs.term || !lhs.term->isPhi() || lhs.term->block() != header) { |
| 2059 | return nullptr; |
| 2060 | } |
| 2061 | |
| 2062 | // Check that the value of the lhs changes by a constant amount with each |
| 2063 | // loop iteration. This requires that the lhs be written in every loop |
| 2064 | // iteration with a value that is a constant difference from its value at |
| 2065 | // the start of the iteration. |
| 2066 | |
| 2067 | if (lhs.term->toPhi()->numOperands() != 2) { |
| 2068 | return nullptr; |
| 2069 | } |
| 2070 | |
| 2071 | // The first operand of the phi should be the lhs' value at the start of |
| 2072 | // the first executed iteration, and not a value written which could |
| 2073 | // replace the second operand below during the middle of execution. |
| 2074 | MDefinition* lhsInitial = lhs.term->toPhi()->getLoopPredecessorOperand(); |
| 2075 | if (lhsInitial->block()->isMarked()) { |
| 2076 | return nullptr; |
| 2077 | } |
| 2078 | |
| 2079 | // The second operand of the phi should be a value written by an add/sub |
| 2080 | // in every loop iteration, i.e. in a block which dominates the backedge. |
| 2081 | MDefinition* lhsWrite = DefinitionOrBetaInputDefinition( |
| 2082 | lhs.term->toPhi()->getLoopBackedgeOperand()); |
| 2083 | if (!lhsWrite->isAdd() && !lhsWrite->isSub()) { |
| 2084 | return nullptr; |
| 2085 | } |
| 2086 | if (!lhsWrite->block()->isMarked()) { |
| 2087 | return nullptr; |
| 2088 | } |
| 2089 | MBasicBlock* bb = header->backedge(); |
| 2090 | for (; bb != lhsWrite->block() && bb != header; |
| 2091 | bb = bb->immediateDominator()) { |
| 2092 | } |
| 2093 | if (bb != lhsWrite->block()) { |
| 2094 | return nullptr; |
| 2095 | } |
| 2096 | |
| 2097 | SimpleLinearSum lhsModified = ExtractLinearSum(lhsWrite); |
| 2098 | |
| 2099 | // Check that the value of the lhs at the backedge is of the form |
| 2100 | // 'old(lhs) + N'. We can be sure that old(lhs) is the value at the start |
| 2101 | // of the iteration, and not that written to lhs in a previous iteration, |
| 2102 | // as such a previous value could not appear directly in the addition: |
| 2103 | // it could not be stored in lhs as the lhs add/sub executes in every |
| 2104 | // iteration, and if it were stored in another variable its use here would |
| 2105 | // be as an operand to a phi node for that variable. |
| 2106 | if (lhsModified.term != lhs.term) { |
| 2107 | return nullptr; |
| 2108 | } |
| 2109 | |
| 2110 | LinearSum iterationBound(alloc()); |
| 2111 | LinearSum currentIteration(alloc()); |
| 2112 | |
| 2113 | if (lhsModified.constant == 1 && !lessEqual) { |
| 2114 | // The value of lhs is 'initial(lhs) + iterCount' and this will end |
| 2115 | // execution of the loop if 'lhs + lhsN >= rhs'. Thus, an upper bound |
| 2116 | // on the number of backedges executed is: |
| 2117 | // |
| 2118 | // initial(lhs) + iterCount + lhsN == rhs |
| 2119 | // iterCount == rhsN - initial(lhs) - lhsN |
| 2120 | |
| 2121 | if (rhs) { |
| 2122 | if (!iterationBound.add(rhs, 1)) { |
| 2123 | return nullptr; |
| 2124 | } |
| 2125 | } |
| 2126 | if (!iterationBound.add(lhsInitial, -1)) { |
| 2127 | return nullptr; |
| 2128 | } |
| 2129 | |
| 2130 | int32_t lhsConstant; |
| 2131 | if (!SafeSub(0, lhs.constant, &lhsConstant)) { |
| 2132 | return nullptr; |
| 2133 | } |
| 2134 | if (!iterationBound.add(lhsConstant)) { |
| 2135 | return nullptr; |
| 2136 | } |
| 2137 | |
| 2138 | if (!currentIteration.add(lhs.term, 1)) { |
| 2139 | return nullptr; |
| 2140 | } |
| 2141 | if (!currentIteration.add(lhsInitial, -1)) { |
| 2142 | return nullptr; |
| 2143 | } |
| 2144 | } else if (lhsModified.constant == -1 && lessEqual) { |
| 2145 | // The value of lhs is 'initial(lhs) - iterCount'. Similar to the above |
| 2146 | // case, an upper bound on the number of backedges executed is: |
| 2147 | // |
| 2148 | // initial(lhs) - iterCount + lhsN == rhs |
| 2149 | // iterCount == initial(lhs) - rhs + lhsN |
| 2150 | |
| 2151 | if (!iterationBound.add(lhsInitial, 1)) { |
| 2152 | return nullptr; |
| 2153 | } |
| 2154 | if (rhs) { |
| 2155 | if (!iterationBound.add(rhs, -1)) { |
| 2156 | return nullptr; |
| 2157 | } |
| 2158 | } |
| 2159 | if (!iterationBound.add(lhs.constant)) { |
| 2160 | return nullptr; |
| 2161 | } |
| 2162 | |
| 2163 | if (!currentIteration.add(lhsInitial, 1)) { |
| 2164 | return nullptr; |
| 2165 | } |
| 2166 | if (!currentIteration.add(lhs.term, -1)) { |
| 2167 | return nullptr; |
| 2168 | } |
| 2169 | } else { |
| 2170 | return nullptr; |
| 2171 | } |
| 2172 | |
| 2173 | return new (alloc()) |
| 2174 | LoopIterationBound(header, test, iterationBound, currentIteration); |
| 2175 | } |
| 2176 | |
| 2177 | void RangeAnalysis::analyzeLoopPhi(LoopIterationBound* loopBound, MPhi* phi) { |
| 2178 | // Given a bound on the number of backedges taken, compute an upper and |
| 2179 | // lower bound for a phi node that may change by a constant amount each |
| 2180 | // iteration. Unlike for the case when computing the iteration bound |
| 2181 | // itself, the phi does not need to change the same amount every iteration, |
| 2182 | // but is required to change at most N and be either nondecreasing or |
| 2183 | // nonincreasing. |
| 2184 | |
| 2185 | MOZ_ASSERT(phi->numOperands() == 2)do { static_assert( mozilla::detail::AssertionConditionType< decltype(phi->numOperands() == 2)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(phi->numOperands() == 2)) ), 0))) { do { } while (false); MOZ_ReportAssertionFailure("phi->numOperands() == 2" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2185); AnnotateMozCrashReason("MOZ_ASSERT" "(" "phi->numOperands() == 2" ")"); do { *((volatile int*)__null) = 2185; ::abort(); } while (false); } } while (false); |
| 2186 | |
| 2187 | MDefinition* initial = phi->getLoopPredecessorOperand(); |
| 2188 | if (initial->block()->isMarked()) { |
| 2189 | return; |
| 2190 | } |
| 2191 | |
| 2192 | SimpleLinearSum modified = |
| 2193 | ExtractLinearSum(phi->getLoopBackedgeOperand(), MathSpace::Infinite); |
| 2194 | |
| 2195 | if (modified.term != phi || modified.constant == 0) { |
| 2196 | return; |
| 2197 | } |
| 2198 | |
| 2199 | if (!phi->range()) { |
| 2200 | phi->setRange(new (alloc()) Range(phi)); |
| 2201 | } |
| 2202 | |
| 2203 | LinearSum initialSum(alloc()); |
| 2204 | if (!initialSum.add(initial, 1)) { |
| 2205 | return; |
| 2206 | } |
| 2207 | |
| 2208 | // The phi may change by N each iteration, and is either nondecreasing or |
| 2209 | // nonincreasing. initial(phi) is either a lower or upper bound for the |
| 2210 | // phi, and initial(phi) + loopBound * N is either an upper or lower bound, |
| 2211 | // at all points within the loop, provided that loopBound >= 0. |
| 2212 | // |
| 2213 | // We are more interested, however, in the bound for phi at points |
| 2214 | // dominated by the loop bound's test; if the test dominates e.g. a bounds |
| 2215 | // check we want to hoist from the loop, using the value of the phi at the |
| 2216 | // head of the loop for this will usually be too imprecise to hoist the |
| 2217 | // check. These points will execute only if the backedge executes at least |
| 2218 | // one more time (as the test passed and the test dominates the backedge), |
| 2219 | // so we know both that loopBound >= 1 and that the phi's value has changed |
| 2220 | // at most loopBound - 1 times. Thus, another upper or lower bound for the |
| 2221 | // phi is initial(phi) + (loopBound - 1) * N, without requiring us to |
| 2222 | // ensure that loopBound >= 0. |
| 2223 | |
| 2224 | LinearSum limitSum(loopBound->boundSum); |
| 2225 | if (!limitSum.multiply(modified.constant) || !limitSum.add(initialSum)) { |
| 2226 | return; |
| 2227 | } |
| 2228 | |
| 2229 | int32_t negativeConstant; |
| 2230 | if (!SafeSub(0, modified.constant, &negativeConstant) || |
| 2231 | !limitSum.add(negativeConstant)) { |
| 2232 | return; |
| 2233 | } |
| 2234 | |
| 2235 | Range* initRange = initial->range(); |
| 2236 | if (modified.constant > 0) { |
| 2237 | if (initRange && initRange->hasInt32LowerBound()) { |
| 2238 | phi->range()->refineLower(initRange->lower()); |
| 2239 | } |
| 2240 | phi->range()->setSymbolicLower( |
| 2241 | SymbolicBound::New(alloc(), nullptr, initialSum)); |
| 2242 | phi->range()->setSymbolicUpper( |
| 2243 | SymbolicBound::New(alloc(), loopBound, limitSum)); |
| 2244 | } else { |
| 2245 | if (initRange && initRange->hasInt32UpperBound()) { |
| 2246 | phi->range()->refineUpper(initRange->upper()); |
| 2247 | } |
| 2248 | phi->range()->setSymbolicUpper( |
| 2249 | SymbolicBound::New(alloc(), nullptr, initialSum)); |
| 2250 | phi->range()->setSymbolicLower( |
| 2251 | SymbolicBound::New(alloc(), loopBound, limitSum)); |
| 2252 | } |
| 2253 | |
| 2254 | JitSpew(JitSpew_Range, "added symbolic range on %u", phi->id()); |
| 2255 | SpewRange(phi); |
| 2256 | } |
| 2257 | |
| 2258 | // Whether bound is valid at the specified bounds check instruction in a loop, |
| 2259 | // and may be used to hoist ins. |
| 2260 | static inline bool SymbolicBoundIsValid(MBasicBlock* header, MBoundsCheck* ins, |
| 2261 | const SymbolicBound* bound) { |
| 2262 | if (!bound->loop) { |
| 2263 | return true; |
| 2264 | } |
| 2265 | if (ins->block() == header) { |
| 2266 | return false; |
| 2267 | } |
| 2268 | MBasicBlock* bb = ins->block()->immediateDominator(); |
| 2269 | while (bb != header && bb != bound->loop->test->block()) { |
| 2270 | bb = bb->immediateDominator(); |
| 2271 | } |
| 2272 | return bb == bound->loop->test->block(); |
| 2273 | } |
| 2274 | |
| 2275 | bool RangeAnalysis::tryHoistBoundsCheck(MBasicBlock* header, |
| 2276 | MBoundsCheck* ins) { |
| 2277 | // The bounds check's length must be loop invariant or a constant. |
| 2278 | MDefinition* length = DefinitionOrBetaInputDefinition(ins->length()); |
| 2279 | if (length->block()->isMarked() && !length->isConstant()) { |
| 2280 | return false; |
| 2281 | } |
| 2282 | |
| 2283 | // The bounds check's index should not be loop invariant (else we would |
| 2284 | // already have hoisted it during LICM). |
| 2285 | SimpleLinearSum index = ExtractLinearSum(ins->index()); |
| 2286 | if (!index.term || !index.term->block()->isMarked()) { |
| 2287 | return false; |
| 2288 | } |
| 2289 | |
| 2290 | // Check for a symbolic lower and upper bound on the index. If either |
| 2291 | // condition depends on an iteration bound for the loop, only hoist if |
| 2292 | // the bounds check is dominated by the iteration bound's test. |
| 2293 | if (!index.term->range()) { |
| 2294 | return false; |
| 2295 | } |
| 2296 | const SymbolicBound* lower = index.term->range()->symbolicLower(); |
| 2297 | if (!lower || !SymbolicBoundIsValid(header, ins, lower)) { |
| 2298 | return false; |
| 2299 | } |
| 2300 | const SymbolicBound* upper = index.term->range()->symbolicUpper(); |
| 2301 | if (!upper || !SymbolicBoundIsValid(header, ins, upper)) { |
| 2302 | return false; |
| 2303 | } |
| 2304 | |
| 2305 | MBasicBlock* preLoop = header->loopPredecessor(); |
| 2306 | MOZ_ASSERT(!preLoop->isMarked())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!preLoop->isMarked())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!preLoop->isMarked()))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("!preLoop->isMarked()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2306); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!preLoop->isMarked()" ")"); do { *((volatile int*)__null) = 2306; ::abort(); } while (false); } } while (false); |
| 2307 | |
| 2308 | MDefinition* lowerTerm = ConvertLinearSum(alloc(), preLoop, lower->sum, |
| 2309 | BailoutKind::HoistBoundsCheck); |
| 2310 | if (!lowerTerm) { |
| 2311 | return false; |
| 2312 | } |
| 2313 | |
| 2314 | MDefinition* upperTerm = ConvertLinearSum(alloc(), preLoop, upper->sum, |
| 2315 | BailoutKind::HoistBoundsCheck); |
| 2316 | if (!upperTerm) { |
| 2317 | return false; |
| 2318 | } |
| 2319 | |
| 2320 | // We are checking that index + indexConstant >= 0, and know that |
| 2321 | // index >= lowerTerm + lowerConstant. Thus, check that: |
| 2322 | // |
| 2323 | // lowerTerm + lowerConstant + indexConstant >= 0 |
| 2324 | // lowerTerm >= -lowerConstant - indexConstant |
| 2325 | |
| 2326 | int32_t lowerConstant = 0; |
| 2327 | if (!SafeSub(lowerConstant, index.constant, &lowerConstant)) { |
| 2328 | return false; |
| 2329 | } |
| 2330 | if (!SafeSub(lowerConstant, lower->sum.constant(), &lowerConstant)) { |
| 2331 | return false; |
| 2332 | } |
| 2333 | |
| 2334 | // We are checking that index < boundsLength, and know that |
| 2335 | // index <= upperTerm + upperConstant. Thus, check that: |
| 2336 | // |
| 2337 | // upperTerm + upperConstant < boundsLength |
| 2338 | |
| 2339 | int32_t upperConstant = index.constant; |
| 2340 | if (!SafeAdd(upper->sum.constant(), upperConstant, &upperConstant)) { |
| 2341 | return false; |
| 2342 | } |
| 2343 | |
| 2344 | // Hoist the loop invariant lower bounds checks. |
| 2345 | MBoundsCheckLower* lowerCheck = MBoundsCheckLower::New(alloc(), lowerTerm); |
| 2346 | lowerCheck->setMinimum(lowerConstant); |
| 2347 | lowerCheck->computeRange(alloc()); |
| 2348 | lowerCheck->collectRangeInfoPreTrunc(); |
| 2349 | lowerCheck->setBailoutKind(BailoutKind::HoistBoundsCheck); |
| 2350 | preLoop->insertBefore(preLoop->lastIns(), lowerCheck); |
| 2351 | |
| 2352 | // A common pattern for iterating over typed arrays is this: |
| 2353 | // |
| 2354 | // for (var i = 0; i < ta.length; i++) { |
| 2355 | // use ta[i]; |
| 2356 | // } |
| 2357 | // |
| 2358 | // Here |upperTerm| (= ta.length) is a NonNegativeIntPtrToInt32 instruction. |
| 2359 | // Unwrap this if |length| is also an IntPtr so that we don't add an |
| 2360 | // unnecessary bounds check and Int32ToIntPtr below. |
| 2361 | if (upperTerm->isNonNegativeIntPtrToInt32() && |
| 2362 | length->type() == MIRType::IntPtr) { |
| 2363 | upperTerm = upperTerm->toNonNegativeIntPtrToInt32()->input(); |
| 2364 | } |
| 2365 | |
| 2366 | // Hoist the loop invariant upper bounds checks. |
| 2367 | if (upperTerm != length || upperConstant >= 0) { |
| 2368 | // Hoist the bound check's length if it isn't already loop invariant. |
| 2369 | if (length->block()->isMarked()) { |
| 2370 | MOZ_ASSERT(length->isConstant())do { static_assert( mozilla::detail::AssertionConditionType< decltype(length->isConstant())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(length->isConstant()))), 0 ))) { do { } while (false); MOZ_ReportAssertionFailure("length->isConstant()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2370); AnnotateMozCrashReason("MOZ_ASSERT" "(" "length->isConstant()" ")"); do { *((volatile int*)__null) = 2370; ::abort(); } while (false); } } while (false); |
| 2371 | MInstruction* lengthIns = length->toInstruction(); |
| 2372 | lengthIns->block()->moveBefore(preLoop->lastIns(), lengthIns); |
| 2373 | } |
| 2374 | |
| 2375 | // If the length is IntPtr, convert the upperTerm to that as well for the |
| 2376 | // bounds check. |
| 2377 | if (length->type() == MIRType::IntPtr && |
| 2378 | upperTerm->type() == MIRType::Int32) { |
| 2379 | upperTerm = MInt32ToIntPtr::New(alloc(), upperTerm); |
| 2380 | upperTerm->computeRange(alloc()); |
| 2381 | upperTerm->collectRangeInfoPreTrunc(); |
| 2382 | preLoop->insertBefore(preLoop->lastIns(), upperTerm->toInstruction()); |
| 2383 | } |
| 2384 | |
| 2385 | MBoundsCheck* upperCheck = MBoundsCheck::New(alloc(), upperTerm, length); |
| 2386 | upperCheck->setMinimum(upperConstant); |
| 2387 | upperCheck->setMaximum(upperConstant); |
| 2388 | upperCheck->computeRange(alloc()); |
| 2389 | upperCheck->collectRangeInfoPreTrunc(); |
| 2390 | upperCheck->setBailoutKind(BailoutKind::HoistBoundsCheck); |
| 2391 | preLoop->insertBefore(preLoop->lastIns(), upperCheck); |
| 2392 | } |
| 2393 | |
| 2394 | return true; |
| 2395 | } |
| 2396 | |
| 2397 | bool RangeAnalysis::analyze() { |
| 2398 | JitSpew(JitSpew_Range, "Doing range propagation"); |
| 2399 | |
| 2400 | for (ReversePostorderIterator iter(graph_.rpoBegin()); |
| 2401 | iter != graph_.rpoEnd(); iter++) { |
| 2402 | MBasicBlock* block = *iter; |
| 2403 | // No blocks are supposed to be unreachable, except when we have an OSR |
| 2404 | // block, in which case the Value Numbering phase add fixup blocks which |
| 2405 | // are unreachable. |
| 2406 | MOZ_ASSERT(!block->unreachable() || graph_.osrBlock())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!block->unreachable() || graph_.osrBlock())>:: isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!block->unreachable() || graph_.osrBlock()))), 0) )) { do { } while (false); MOZ_ReportAssertionFailure("!block->unreachable() || graph_.osrBlock()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2406); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!block->unreachable() || graph_.osrBlock()" ")"); do { *((volatile int*)__null) = 2406; ::abort(); } while (false); } } while (false); |
| 2407 | |
| 2408 | // If the block's immediate dominator is unreachable, the block is |
| 2409 | // unreachable. Iterating in RPO, we'll always see the immediate |
| 2410 | // dominator before the block. |
| 2411 | if (block->immediateDominator()->unreachable()) { |
| 2412 | block->setUnreachableUnchecked(); |
| 2413 | continue; |
| 2414 | } |
| 2415 | |
| 2416 | for (MDefinitionIterator iter(block); iter; iter++) { |
| 2417 | MDefinition* def = *iter; |
| 2418 | if (!alloc().ensureBallast()) { |
| 2419 | return false; |
| 2420 | } |
| 2421 | |
| 2422 | def->computeRange(alloc()); |
| 2423 | JitSpew(JitSpew_Range, "computing range on %u", def->id()); |
| 2424 | SpewRange(def); |
| 2425 | } |
| 2426 | |
| 2427 | // Beta node range analysis may have marked this block unreachable. If |
| 2428 | // so, it's no longer interesting to continue processing it. |
| 2429 | if (block->unreachable()) { |
| 2430 | continue; |
| 2431 | } |
| 2432 | |
| 2433 | if (block->isLoopHeader()) { |
| 2434 | if (!analyzeLoop(block)) { |
| 2435 | return false; |
| 2436 | } |
| 2437 | } |
| 2438 | |
| 2439 | // First pass at collecting range info - while the beta nodes are still |
| 2440 | // around and before truncation. |
| 2441 | for (MInstructionIterator iter(block->begin()); iter != block->end(); |
| 2442 | iter++) { |
| 2443 | iter->collectRangeInfoPreTrunc(); |
| 2444 | } |
| 2445 | } |
| 2446 | |
| 2447 | return true; |
| 2448 | } |
| 2449 | |
| 2450 | bool RangeAnalysis::addRangeAssertions() { |
| 2451 | if (!JitOptions.checkRangeAnalysis) { |
| 2452 | return true; |
| 2453 | } |
| 2454 | |
| 2455 | // Check the computed range for this instruction, if the option is set. Note |
| 2456 | // that this code is quite invasive; it adds numerous additional |
| 2457 | // instructions for each MInstruction with a computed range, and it uses |
| 2458 | // registers, so it also affects register allocation. |
| 2459 | for (ReversePostorderIterator iter(graph_.rpoBegin()); |
| 2460 | iter != graph_.rpoEnd(); iter++) { |
| 2461 | MBasicBlock* block = *iter; |
| 2462 | |
| 2463 | // Do not add assertions in unreachable blocks. |
| 2464 | if (block->unreachable()) { |
| 2465 | continue; |
| 2466 | } |
| 2467 | |
| 2468 | for (MDefinitionIterator iter(block); iter; iter++) { |
| 2469 | MDefinition* ins = *iter; |
| 2470 | |
| 2471 | // Perform range checking for all numeric and numeric-like types. |
| 2472 | if (!IsNumberType(ins->type()) && ins->type() != MIRType::Boolean && |
| 2473 | ins->type() != MIRType::Value && ins->type() != MIRType::IntPtr) { |
| 2474 | continue; |
| 2475 | } |
| 2476 | |
| 2477 | // MIsNoIter is fused with the MTest that follows it and emitted as |
| 2478 | // LIsNoIterAndBranch. Skip it to avoid complicating MIsNoIter |
| 2479 | // lowering. |
| 2480 | if (ins->isIsNoIter()) { |
| 2481 | continue; |
| 2482 | } |
| 2483 | |
| 2484 | Range r(ins); |
| 2485 | |
| 2486 | MOZ_ASSERT_IF(ins->type() == MIRType::Int64, r.isUnknown())do { if (ins->type() == MIRType::Int64) { do { static_assert ( mozilla::detail::AssertionConditionType<decltype(r.isUnknown ())>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(r.isUnknown()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("r.isUnknown()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2486); AnnotateMozCrashReason("MOZ_ASSERT" "(" "r.isUnknown()" ")"); do { *((volatile int*)__null) = 2486; ::abort(); } while (false); } } while (false); } } while (false); |
| 2487 | |
| 2488 | // Don't insert assertions if there's nothing interesting to assert. |
| 2489 | if (r.isUnknown() || |
| 2490 | (ins->type() == MIRType::Int32 && r.isUnknownInt32())) { |
| 2491 | continue; |
| 2492 | } |
| 2493 | |
| 2494 | // Don't add a use to an instruction that is recovered on bailout. |
| 2495 | if (ins->isRecoveredOnBailout()) { |
| 2496 | continue; |
| 2497 | } |
| 2498 | |
| 2499 | if (!alloc().ensureBallast()) { |
| 2500 | return false; |
| 2501 | } |
| 2502 | MAssertRange* guard = |
| 2503 | MAssertRange::New(alloc(), ins, new (alloc()) Range(r)); |
| 2504 | |
| 2505 | // Beta nodes and interrupt checks are required to be located at the |
| 2506 | // beginnings of basic blocks, so we must insert range assertions |
| 2507 | // after any such instructions. |
| 2508 | MInstruction* insertAt = nullptr; |
| 2509 | if (block->graph().osrBlock() == block) { |
| 2510 | insertAt = ins->toInstruction(); |
| 2511 | } else { |
| 2512 | insertAt = block->safeInsertTop(ins); |
| 2513 | } |
| 2514 | |
| 2515 | if (insertAt == *iter) { |
| 2516 | block->insertAfter(insertAt, guard); |
| 2517 | } else { |
| 2518 | block->insertBefore(insertAt, guard); |
| 2519 | } |
| 2520 | } |
| 2521 | } |
| 2522 | |
| 2523 | return true; |
| 2524 | } |
| 2525 | |
| 2526 | /////////////////////////////////////////////////////////////////////////////// |
| 2527 | // Range based Truncation |
| 2528 | /////////////////////////////////////////////////////////////////////////////// |
| 2529 | |
| 2530 | void Range::clampToInt32() { |
| 2531 | if (isInt32()) { |
| 2532 | return; |
| 2533 | } |
| 2534 | int32_t l = hasInt32LowerBound() ? lower() : JSVAL_INT_MIN((int32_t)0x80000000); |
| 2535 | int32_t h = hasInt32UpperBound() ? upper() : JSVAL_INT_MAX((int32_t)0x7fffffff); |
| 2536 | setInt32(l, h); |
| 2537 | } |
| 2538 | |
| 2539 | void Range::wrapAroundToInt32() { |
| 2540 | if (!hasInt32Bounds()) { |
| 2541 | setInt32(JSVAL_INT_MIN((int32_t)0x80000000), JSVAL_INT_MAX((int32_t)0x7fffffff)); |
| 2542 | } else if (canHaveFractionalPart()) { |
| 2543 | // Clearing the fractional field may provide an opportunity to refine |
| 2544 | // lower_ or upper_. |
| 2545 | canHaveFractionalPart_ = ExcludesFractionalParts; |
| 2546 | canBeNegativeZero_ = ExcludesNegativeZero; |
| 2547 | refineInt32BoundsByExponent(max_exponent_, &lower_, &hasInt32LowerBound_, |
| 2548 | &upper_, &hasInt32UpperBound_); |
| 2549 | |
| 2550 | assertInvariants(); |
| 2551 | } else { |
| 2552 | // If nothing else, we can clear the negative zero flag. |
| 2553 | canBeNegativeZero_ = ExcludesNegativeZero; |
| 2554 | } |
| 2555 | MOZ_ASSERT(isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("isInt32()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2555); AnnotateMozCrashReason("MOZ_ASSERT" "(" "isInt32()" ")" ); do { *((volatile int*)__null) = 2555; ::abort(); } while ( false); } } while (false); |
| 2556 | } |
| 2557 | |
| 2558 | void Range::wrapAroundToShiftCount() { |
| 2559 | wrapAroundToInt32(); |
| 2560 | if (lower() < 0 || upper() >= 32) { |
| 2561 | setInt32(0, 31); |
| 2562 | } |
| 2563 | } |
| 2564 | |
| 2565 | void Range::wrapAroundToBoolean() { |
| 2566 | wrapAroundToInt32(); |
| 2567 | if (!isBoolean()) { |
| 2568 | setInt32(0, 1); |
| 2569 | } |
| 2570 | MOZ_ASSERT(isBoolean())do { static_assert( mozilla::detail::AssertionConditionType< decltype(isBoolean())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(isBoolean()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("isBoolean()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2570); AnnotateMozCrashReason("MOZ_ASSERT" "(" "isBoolean()" ")"); do { *((volatile int*)__null) = 2570; ::abort(); } while (false); } } while (false); |
| 2571 | } |
| 2572 | |
| 2573 | bool MDefinition::needTruncation(TruncateKind kind) const { |
| 2574 | // No procedure defined for truncating this instruction. |
| 2575 | return false; |
| 2576 | } |
| 2577 | |
| 2578 | void MDefinition::truncate(TruncateKind kind) { |
| 2579 | MOZ_CRASH("No procedure defined for truncating this instruction.")do { do { } while (false); MOZ_ReportCrash("" "No procedure defined for truncating this instruction." , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2579); AnnotateMozCrashReason("MOZ_CRASH(" "No procedure defined for truncating this instruction." ")"); do { *((volatile int*)__null) = 2579; ::abort(); } while (false); } while (false); |
| 2580 | } |
| 2581 | |
| 2582 | bool MConstant::needTruncation(TruncateKind kind) const { |
| 2583 | return IsFloatingPointType(type()); |
| 2584 | } |
| 2585 | |
| 2586 | void MConstant::truncate(TruncateKind kind) { |
| 2587 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2587); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2587; ::abort(); } while (false); } } while (false); |
| 2588 | |
| 2589 | // Truncate the double to int, since all uses truncates it. |
| 2590 | int32_t res = ToInt32(numberToDouble()); |
| 2591 | payload_.asBits = 0; |
| 2592 | payload_.i32 = res; |
| 2593 | setResultType(MIRType::Int32); |
| 2594 | if (range()) { |
| 2595 | range()->setInt32(res, res); |
| 2596 | } |
| 2597 | } |
| 2598 | |
| 2599 | bool MPhi::needTruncation(TruncateKind kind) const { |
| 2600 | if (type() == MIRType::Double || type() == MIRType::Int32) { |
| 2601 | return true; |
| 2602 | } |
| 2603 | |
| 2604 | return false; |
| 2605 | } |
| 2606 | |
| 2607 | void MPhi::truncate(TruncateKind kind) { |
| 2608 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2608); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2608; ::abort(); } while (false); } } while (false); |
| 2609 | truncateKind_ = kind; |
| 2610 | setResultType(MIRType::Int32); |
| 2611 | if (kind >= TruncateKind::IndirectTruncate && range()) { |
| 2612 | range()->wrapAroundToInt32(); |
| 2613 | } |
| 2614 | } |
| 2615 | |
| 2616 | bool MAdd::needTruncation(TruncateKind kind) const { |
| 2617 | return type() == MIRType::Double || type() == MIRType::Int32; |
| 2618 | } |
| 2619 | |
| 2620 | void MAdd::truncate(TruncateKind kind) { |
| 2621 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2621); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2621; ::abort(); } while (false); } } while (false); |
| 2622 | |
| 2623 | // Remember analysis, needed for fallible checks. |
| 2624 | setTruncateKind(kind); |
| 2625 | |
| 2626 | setSpecialization(MIRType::Int32); |
| 2627 | if (truncateKind() >= TruncateKind::IndirectTruncate && range()) { |
| 2628 | range()->wrapAroundToInt32(); |
| 2629 | } |
| 2630 | } |
| 2631 | |
| 2632 | bool MSub::needTruncation(TruncateKind kind) const { |
| 2633 | return type() == MIRType::Double || type() == MIRType::Int32; |
| 2634 | } |
| 2635 | |
| 2636 | void MSub::truncate(TruncateKind kind) { |
| 2637 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2637); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2637; ::abort(); } while (false); } } while (false); |
| 2638 | |
| 2639 | // Remember analysis, needed for fallible checks. |
| 2640 | setTruncateKind(kind); |
| 2641 | setSpecialization(MIRType::Int32); |
| 2642 | if (truncateKind() >= TruncateKind::IndirectTruncate && range()) { |
| 2643 | range()->wrapAroundToInt32(); |
| 2644 | } |
| 2645 | } |
| 2646 | |
| 2647 | bool MMul::needTruncation(TruncateKind kind) const { |
| 2648 | return type() == MIRType::Double || type() == MIRType::Int32; |
| 2649 | } |
| 2650 | |
| 2651 | void MMul::truncate(TruncateKind kind) { |
| 2652 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2652); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2652; ::abort(); } while (false); } } while (false); |
| 2653 | |
| 2654 | // Remember analysis, needed for fallible checks. |
| 2655 | setTruncateKind(kind); |
| 2656 | setSpecialization(MIRType::Int32); |
| 2657 | if (truncateKind() >= TruncateKind::IndirectTruncate) { |
| 2658 | setCanBeNegativeZero(false); |
| 2659 | if (range()) { |
| 2660 | range()->wrapAroundToInt32(); |
| 2661 | } |
| 2662 | } |
| 2663 | } |
| 2664 | |
| 2665 | bool MDiv::needTruncation(TruncateKind kind) const { |
| 2666 | return type() == MIRType::Double || type() == MIRType::Int32; |
| 2667 | } |
| 2668 | |
| 2669 | void MDiv::truncate(TruncateKind kind) { |
| 2670 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2670); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2670; ::abort(); } while (false); } } while (false); |
| 2671 | |
| 2672 | // Remember analysis, needed for fallible checks. |
| 2673 | setTruncateKind(kind); |
| 2674 | setSpecialization(MIRType::Int32); |
| 2675 | |
| 2676 | // Divisions where the lhs and rhs are unsigned and the result is |
| 2677 | // truncated can be lowered more efficiently. |
| 2678 | if (unsignedOperands()) { |
| 2679 | replaceWithUnsignedOperands(); |
| 2680 | unsigned_ = true; |
| 2681 | } |
| 2682 | } |
| 2683 | |
| 2684 | bool MMod::needTruncation(TruncateKind kind) const { |
| 2685 | return type() == MIRType::Double || type() == MIRType::Int32; |
| 2686 | } |
| 2687 | |
| 2688 | void MMod::truncate(TruncateKind kind) { |
| 2689 | // As for division, handle unsigned modulus with a truncated result. |
| 2690 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2690); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2690; ::abort(); } while (false); } } while (false); |
| 2691 | |
| 2692 | // Remember analysis, needed for fallible checks. |
| 2693 | setTruncateKind(kind); |
| 2694 | setSpecialization(MIRType::Int32); |
| 2695 | |
| 2696 | if (unsignedOperands()) { |
| 2697 | replaceWithUnsignedOperands(); |
| 2698 | unsigned_ = true; |
| 2699 | } |
| 2700 | } |
| 2701 | |
| 2702 | bool MToDouble::needTruncation(TruncateKind kind) const { |
| 2703 | MOZ_ASSERT(type() == MIRType::Double)do { static_assert( mozilla::detail::AssertionConditionType< decltype(type() == MIRType::Double)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(type() == MIRType::Double))) , 0))) { do { } while (false); MOZ_ReportAssertionFailure("type() == MIRType::Double" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2703); AnnotateMozCrashReason("MOZ_ASSERT" "(" "type() == MIRType::Double" ")"); do { *((volatile int*)__null) = 2703; ::abort(); } while (false); } } while (false); |
| 2704 | return true; |
| 2705 | } |
| 2706 | |
| 2707 | void MToDouble::truncate(TruncateKind kind) { |
| 2708 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2708); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2708; ::abort(); } while (false); } } while (false); |
| 2709 | setTruncateKind(kind); |
| 2710 | |
| 2711 | // We use the return type to flag that this MToDouble should be replaced by |
| 2712 | // a MTruncateToInt32 when modifying the graph. |
| 2713 | setResultType(MIRType::Int32); |
| 2714 | if (truncateKind() >= TruncateKind::IndirectTruncate) { |
| 2715 | if (range()) { |
| 2716 | range()->wrapAroundToInt32(); |
| 2717 | } |
| 2718 | } |
| 2719 | } |
| 2720 | |
| 2721 | bool MLimitedTruncate::needTruncation(TruncateKind kind) const { return true; } |
| 2722 | |
| 2723 | void MLimitedTruncate::truncate(TruncateKind kind) { |
| 2724 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2724); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2724; ::abort(); } while (false); } } while (false); |
| 2725 | setTruncateKind(kind); |
| 2726 | setResultType(MIRType::Int32); |
| 2727 | if (kind >= TruncateKind::IndirectTruncate && range()) { |
| 2728 | range()->wrapAroundToInt32(); |
| 2729 | } |
| 2730 | } |
| 2731 | |
| 2732 | bool MCompare::needTruncation(TruncateKind kind) const { |
| 2733 | // If we're compiling wasm, don't try to optimize the comparison type, as |
| 2734 | // the code presumably is already using the type it wants. Also, wasm |
| 2735 | // doesn't support bailouts, so we woudn't be able to rely on |
| 2736 | // TruncateAfterBailouts to convert our inputs. |
| 2737 | if (block()->info().compilingWasm()) { |
| 2738 | return false; |
| 2739 | } |
| 2740 | |
| 2741 | if (!isDoubleComparison()) { |
| 2742 | return false; |
| 2743 | } |
| 2744 | |
| 2745 | // If both operands are naturally in the int32 range, we can convert from |
| 2746 | // a double comparison to being an int32 comparison. |
| 2747 | if (!Range(lhs()).isInt32() || !Range(rhs()).isInt32()) { |
| 2748 | return false; |
| 2749 | } |
| 2750 | |
| 2751 | return true; |
| 2752 | } |
| 2753 | |
| 2754 | void MCompare::truncate(TruncateKind kind) { |
| 2755 | MOZ_ASSERT(needTruncation(kind))do { static_assert( mozilla::detail::AssertionConditionType< decltype(needTruncation(kind))>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(needTruncation(kind)))), 0)) ) { do { } while (false); MOZ_ReportAssertionFailure("needTruncation(kind)" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2755); AnnotateMozCrashReason("MOZ_ASSERT" "(" "needTruncation(kind)" ")"); do { *((volatile int*)__null) = 2755; ::abort(); } while (false); } } while (false); |
| 2756 | compareType_ = Compare_Int32; |
| 2757 | |
| 2758 | // Truncating the operands won't change their value because we don't force a |
| 2759 | // truncation, but it will change their type, which we need because we |
| 2760 | // now expect integer inputs. |
| 2761 | truncateOperands_ = true; |
| 2762 | } |
| 2763 | |
| 2764 | TruncateKind MDefinition::operandTruncateKind(size_t index) const { |
| 2765 | // Generic routine: We don't know anything. |
| 2766 | return TruncateKind::NoTruncate; |
| 2767 | } |
| 2768 | |
| 2769 | TruncateKind MPhi::operandTruncateKind(size_t index) const { |
| 2770 | // The truncation applied to a phi is effectively applied to the phi's |
| 2771 | // operands. |
| 2772 | return truncateKind_; |
| 2773 | } |
| 2774 | |
| 2775 | TruncateKind MTruncateToInt32::operandTruncateKind(size_t index) const { |
| 2776 | // This operator is an explicit truncate to int32. |
| 2777 | return TruncateKind::Truncate; |
| 2778 | } |
| 2779 | |
| 2780 | TruncateKind MBinaryBitwiseInstruction::operandTruncateKind( |
| 2781 | size_t index) const { |
| 2782 | // The bitwise operators truncate to int32. |
| 2783 | return TruncateKind::Truncate; |
| 2784 | } |
| 2785 | |
| 2786 | TruncateKind MLimitedTruncate::operandTruncateKind(size_t index) const { |
| 2787 | return std::min(truncateKind(), truncateLimit_); |
| 2788 | } |
| 2789 | |
| 2790 | TruncateKind MAdd::operandTruncateKind(size_t index) const { |
| 2791 | // This operator is doing some arithmetic. If its result is truncated, |
| 2792 | // it's an indirect truncate for its operands. |
| 2793 | return std::min(truncateKind(), TruncateKind::IndirectTruncate); |
| 2794 | } |
| 2795 | |
| 2796 | TruncateKind MSub::operandTruncateKind(size_t index) const { |
| 2797 | // See the comment in MAdd::operandTruncateKind. |
| 2798 | return std::min(truncateKind(), TruncateKind::IndirectTruncate); |
| 2799 | } |
| 2800 | |
| 2801 | TruncateKind MMul::operandTruncateKind(size_t index) const { |
| 2802 | // See the comment in MAdd::operandTruncateKind. |
| 2803 | return std::min(truncateKind(), TruncateKind::IndirectTruncate); |
| 2804 | } |
| 2805 | |
| 2806 | TruncateKind MToDouble::operandTruncateKind(size_t index) const { |
| 2807 | // MToDouble propagates its truncate kind to its operand. |
| 2808 | return truncateKind(); |
| 2809 | } |
| 2810 | |
| 2811 | TruncateKind MStoreUnboxedScalar::operandTruncateKind(size_t index) const { |
| 2812 | // An integer store truncates the stored value. |
| 2813 | return (index == 2 && isIntegerWrite()) ? TruncateKind::Truncate |
| 2814 | : TruncateKind::NoTruncate; |
| 2815 | } |
| 2816 | |
| 2817 | TruncateKind MStoreDataViewElement::operandTruncateKind(size_t index) const { |
| 2818 | // An integer store truncates the stored value. |
| 2819 | return (index == 2 && isIntegerWrite()) ? TruncateKind::Truncate |
| 2820 | : TruncateKind::NoTruncate; |
| 2821 | } |
| 2822 | |
| 2823 | TruncateKind MStoreTypedArrayElementHole::operandTruncateKind( |
| 2824 | size_t index) const { |
| 2825 | // An integer store truncates the stored value. |
| 2826 | return (index == 3 && isIntegerWrite()) ? TruncateKind::Truncate |
| 2827 | : TruncateKind::NoTruncate; |
| 2828 | } |
| 2829 | |
| 2830 | TruncateKind MDiv::operandTruncateKind(size_t index) const { |
| 2831 | return std::min(truncateKind(), TruncateKind::TruncateAfterBailouts); |
| 2832 | } |
| 2833 | |
| 2834 | TruncateKind MMod::operandTruncateKind(size_t index) const { |
| 2835 | return std::min(truncateKind(), TruncateKind::TruncateAfterBailouts); |
| 2836 | } |
| 2837 | |
| 2838 | TruncateKind MCompare::operandTruncateKind(size_t index) const { |
| 2839 | // If we're doing an int32 comparison on operands which were previously |
| 2840 | // floating-point, convert them! |
| 2841 | MOZ_ASSERT_IF(truncateOperands_, isInt32Comparison())do { if (truncateOperands_) { do { static_assert( mozilla::detail ::AssertionConditionType<decltype(isInt32Comparison())> ::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(isInt32Comparison()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("isInt32Comparison()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2841); AnnotateMozCrashReason("MOZ_ASSERT" "(" "isInt32Comparison()" ")"); do { *((volatile int*)__null) = 2841; ::abort(); } while (false); } } while (false); } } while (false); |
| 2842 | return truncateOperands_ ? TruncateKind::TruncateAfterBailouts |
| 2843 | : TruncateKind::NoTruncate; |
| 2844 | } |
| 2845 | |
| 2846 | static bool TruncateTest(TempAllocator& alloc, MTest* test) { |
| 2847 | // If all possible inputs to the test are either int32 or boolean, |
| 2848 | // convert those inputs to int32 so that an int32 test can be performed. |
| 2849 | |
| 2850 | if (test->input()->type() != MIRType::Value) { |
| 2851 | return true; |
| 2852 | } |
| 2853 | |
| 2854 | if (!test->input()->isPhi() || !test->input()->hasOneDefUse() || |
| 2855 | test->input()->isImplicitlyUsed()) { |
| 2856 | return true; |
| 2857 | } |
| 2858 | |
| 2859 | MPhi* phi = test->input()->toPhi(); |
| 2860 | for (size_t i = 0; i < phi->numOperands(); i++) { |
| 2861 | MDefinition* def = phi->getOperand(i); |
| 2862 | if (!def->isBox()) { |
| 2863 | return true; |
| 2864 | } |
| 2865 | MDefinition* inner = def->getOperand(0); |
| 2866 | if (inner->type() != MIRType::Boolean && inner->type() != MIRType::Int32) { |
| 2867 | return true; |
| 2868 | } |
| 2869 | } |
| 2870 | |
| 2871 | for (size_t i = 0; i < phi->numOperands(); i++) { |
| 2872 | MDefinition* inner = phi->getOperand(i)->getOperand(0); |
| 2873 | if (inner->type() != MIRType::Int32) { |
| 2874 | if (!alloc.ensureBallast()) { |
| 2875 | return false; |
| 2876 | } |
| 2877 | MBasicBlock* block = inner->block(); |
| 2878 | inner = MToNumberInt32::New(alloc, inner); |
| 2879 | block->insertBefore(block->lastIns(), inner->toInstruction()); |
| 2880 | } |
| 2881 | MOZ_ASSERT(inner->type() == MIRType::Int32)do { static_assert( mozilla::detail::AssertionConditionType< decltype(inner->type() == MIRType::Int32)>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(inner->type() == MIRType:: Int32))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("inner->type() == MIRType::Int32", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2881); AnnotateMozCrashReason("MOZ_ASSERT" "(" "inner->type() == MIRType::Int32" ")"); do { *((volatile int*)__null) = 2881; ::abort(); } while (false); } } while (false); |
| 2882 | phi->replaceOperand(i, inner); |
| 2883 | } |
| 2884 | |
| 2885 | phi->setResultType(MIRType::Int32); |
| 2886 | return true; |
| 2887 | } |
| 2888 | |
| 2889 | // Truncating instruction result is an optimization which implies |
| 2890 | // knowing all uses of an instruction. This implies that if one of |
| 2891 | // the uses got removed, then Range Analysis is not be allowed to do |
| 2892 | // any modification which can change the result, especially if the |
| 2893 | // result can be observed. |
| 2894 | // |
| 2895 | // This corner can easily be understood with UCE examples, but it |
| 2896 | // might also happen with type inference assumptions. Note: Type |
| 2897 | // inference is implicitly branches where other types might be |
| 2898 | // flowing into. |
| 2899 | static bool CloneForDeadBranches(TempAllocator& alloc, |
| 2900 | MInstruction* candidate) { |
| 2901 | // Compare returns a boolean so it doesn't have to be recovered on bailout |
| 2902 | // because the output would remain correct. |
| 2903 | if (candidate->isCompare()) { |
| 2904 | return true; |
| 2905 | } |
| 2906 | |
| 2907 | MOZ_ASSERT(candidate->canClone())do { static_assert( mozilla::detail::AssertionConditionType< decltype(candidate->canClone())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(candidate->canClone()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("candidate->canClone()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2907); AnnotateMozCrashReason("MOZ_ASSERT" "(" "candidate->canClone()" ")"); do { *((volatile int*)__null) = 2907; ::abort(); } while (false); } } while (false); |
| 2908 | if (!alloc.ensureBallast()) { |
| 2909 | return false; |
| 2910 | } |
| 2911 | |
| 2912 | MDefinitionVector operands(alloc); |
| 2913 | size_t end = candidate->numOperands(); |
| 2914 | if (!operands.reserve(end)) { |
| 2915 | return false; |
| 2916 | } |
| 2917 | for (size_t i = 0; i < end; ++i) { |
| 2918 | operands.infallibleAppend(candidate->getOperand(i)); |
| 2919 | } |
| 2920 | |
| 2921 | MInstruction* clone = candidate->clone(alloc, operands); |
| 2922 | if (!clone) { |
| 2923 | return false; |
| 2924 | } |
| 2925 | clone->setRange(nullptr); |
| 2926 | |
| 2927 | // Set ImplicitlyUsed flag on the cloned instruction in order to chain recover |
| 2928 | // instruction for the bailout path. |
| 2929 | clone->setImplicitlyUsedUnchecked(); |
| 2930 | |
| 2931 | candidate->block()->insertBefore(candidate, clone); |
| 2932 | |
| 2933 | if (!candidate->maybeConstantValue()) { |
| 2934 | MOZ_ASSERT(clone->canRecoverOnBailout())do { static_assert( mozilla::detail::AssertionConditionType< decltype(clone->canRecoverOnBailout())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(clone->canRecoverOnBailout ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("clone->canRecoverOnBailout()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 2934); AnnotateMozCrashReason("MOZ_ASSERT" "(" "clone->canRecoverOnBailout()" ")"); do { *((volatile int*)__null) = 2934; ::abort(); } while (false); } } while (false); |
| 2935 | clone->setRecoveredOnBailout(); |
| 2936 | } |
| 2937 | |
| 2938 | // Replace the candidate by its recovered on bailout clone within recovered |
| 2939 | // instructions and resume points operands. |
| 2940 | for (MUseIterator i(candidate->usesBegin()); i != candidate->usesEnd();) { |
| 2941 | MUse* use = *i++; |
| 2942 | MNode* ins = use->consumer(); |
| 2943 | if (ins->isDefinition() && !ins->toDefinition()->isRecoveredOnBailout()) { |
| 2944 | continue; |
| 2945 | } |
| 2946 | |
| 2947 | use->replaceProducer(clone); |
| 2948 | } |
| 2949 | |
| 2950 | return true; |
| 2951 | } |
| 2952 | |
| 2953 | // Examine all the users of |candidate| and determine the most aggressive |
| 2954 | // truncate kind that satisfies all of them. |
| 2955 | static TruncateKind ComputeRequestedTruncateKind(MDefinition* candidate, |
| 2956 | bool* shouldClone) { |
| 2957 | bool isCapturedResult = |
| 2958 | false; // Check if used by a recovered instruction or a resume point. |
| 2959 | bool isObservableResult = |
| 2960 | false; // Check if it can be read from another frame. |
| 2961 | bool isRecoverableResult = true; // Check if it can safely be reconstructed. |
| 2962 | bool isImplicitlyUsed = candidate->isImplicitlyUsed(); |
| 2963 | bool hasTryBlock = candidate->block()->graph().hasTryBlock(); |
| 2964 | |
| 2965 | TruncateKind kind = TruncateKind::Truncate; |
| 2966 | for (MUseIterator use(candidate->usesBegin()); use != candidate->usesEnd(); |
| 2967 | use++) { |
| 2968 | if (use->consumer()->isResumePoint()) { |
| 2969 | // Truncation is a destructive optimization, as such, we need to pay |
| 2970 | // attention to removed branches and prevent optimization |
| 2971 | // destructive optimizations if we have no alternative. (see |
| 2972 | // ImplicitlyUsed flag) |
| 2973 | isCapturedResult = true; |
| 2974 | isObservableResult = |
| 2975 | isObservableResult || |
| 2976 | use->consumer()->toResumePoint()->isObservableOperand(*use); |
| 2977 | isRecoverableResult = |
| 2978 | isRecoverableResult && |
| 2979 | use->consumer()->toResumePoint()->isRecoverableOperand(*use); |
| 2980 | continue; |
| 2981 | } |
| 2982 | |
| 2983 | MDefinition* consumer = use->consumer()->toDefinition(); |
| 2984 | if (consumer->isRecoveredOnBailout()) { |
| 2985 | isCapturedResult = true; |
| 2986 | isImplicitlyUsed = isImplicitlyUsed || consumer->isImplicitlyUsed(); |
| 2987 | continue; |
| 2988 | } |
| 2989 | |
| 2990 | TruncateKind consumerKind = |
| 2991 | consumer->operandTruncateKind(consumer->indexOf(*use)); |
| 2992 | kind = std::min(kind, consumerKind); |
| 2993 | if (kind == TruncateKind::NoTruncate) { |
| 2994 | break; |
| 2995 | } |
| 2996 | } |
| 2997 | |
| 2998 | // We cannot do full trunction on guarded instructions. |
| 2999 | if (candidate->isGuard() || candidate->isGuardRangeBailouts()) { |
| 3000 | kind = std::min(kind, TruncateKind::TruncateAfterBailouts); |
| 3001 | } |
| 3002 | |
| 3003 | // If the value naturally produces an int32 value (before bailout checks) |
| 3004 | // that needs no conversion, we don't have to worry about resume points |
| 3005 | // seeing truncated values. |
| 3006 | bool needsConversion = !candidate->range() || !candidate->range()->isInt32(); |
| 3007 | |
| 3008 | // If the instruction is explicitly truncated (not indirectly) by all its |
| 3009 | // uses and if it is not implicitly used, then we can safely encode its |
| 3010 | // truncated result as part of the resume point operands. This is safe, |
| 3011 | // because even if we resume with a truncated double, the next baseline |
| 3012 | // instruction operating on this instruction is going to be a no-op. |
| 3013 | // |
| 3014 | // Note, that if the result can be observed from another frame, then this |
| 3015 | // optimization is not safe. Similarly, if this function contains a try |
| 3016 | // block, the result could be observed from a catch block, which we do |
| 3017 | // not compile. |
| 3018 | bool safeToConvert = kind == TruncateKind::Truncate && !isImplicitlyUsed && |
| 3019 | !isObservableResult && !hasTryBlock; |
| 3020 | |
| 3021 | // If the candidate instruction appears as operand of a resume point or a |
| 3022 | // recover instruction, and we have to truncate its result, then we might |
| 3023 | // have to either recover the result during the bailout, or avoid the |
| 3024 | // truncation. |
| 3025 | if (isCapturedResult && needsConversion && !safeToConvert) { |
| 3026 | // If the result can be recovered from all the resume points (not needed |
| 3027 | // for iterating over the inlined frames), and this instruction can be |
| 3028 | // recovered on bailout, then we can clone it and use the cloned |
| 3029 | // instruction to encode the recover instruction. Otherwise, we should |
| 3030 | // keep the original result and bailout if the value is not in the int32 |
| 3031 | // range. |
| 3032 | if (!JitOptions.disableRecoverIns && isRecoverableResult && |
| 3033 | candidate->canRecoverOnBailout()) { |
| 3034 | *shouldClone = true; |
| 3035 | } else { |
| 3036 | kind = std::min(kind, TruncateKind::TruncateAfterBailouts); |
| 3037 | } |
| 3038 | } |
| 3039 | |
| 3040 | return kind; |
| 3041 | } |
| 3042 | |
| 3043 | static TruncateKind ComputeTruncateKind(MDefinition* candidate, |
| 3044 | bool* shouldClone) { |
| 3045 | // Compare operations might coerce its inputs to int32 if the ranges are |
| 3046 | // correct. So we do not need to check if all uses are coerced. |
| 3047 | if (candidate->isCompare()) { |
| 3048 | return TruncateKind::TruncateAfterBailouts; |
| 3049 | } |
| 3050 | |
| 3051 | // Set truncated flag if range analysis ensure that it has no |
| 3052 | // rounding errors and no fractional part. Note that we can't use |
| 3053 | // the MDefinition Range constructor, because we need to know if |
| 3054 | // the value will have rounding errors before any bailout checks. |
| 3055 | const Range* r = candidate->range(); |
| 3056 | bool canHaveRoundingErrors = !r || r->canHaveRoundingErrors(); |
| 3057 | |
| 3058 | // Special case integer division and modulo: a/b can be infinite, and a%b |
| 3059 | // can be NaN but cannot actually have rounding errors induced by truncation. |
| 3060 | if ((candidate->isDiv() || candidate->isMod()) && |
| 3061 | candidate->type() == MIRType::Int32) { |
| 3062 | canHaveRoundingErrors = false; |
| 3063 | } |
| 3064 | |
| 3065 | if (canHaveRoundingErrors) { |
| 3066 | return TruncateKind::NoTruncate; |
| 3067 | } |
| 3068 | |
| 3069 | // Ensure all observable uses are truncated. |
| 3070 | return ComputeRequestedTruncateKind(candidate, shouldClone); |
| 3071 | } |
| 3072 | |
| 3073 | static void RemoveTruncatesOnOutput(MDefinition* truncated) { |
| 3074 | // Compare returns a boolean so it doen't have any output truncates. |
| 3075 | if (truncated->isCompare()) { |
| 3076 | return; |
| 3077 | } |
| 3078 | |
| 3079 | MOZ_ASSERT(truncated->type() == MIRType::Int32)do { static_assert( mozilla::detail::AssertionConditionType< decltype(truncated->type() == MIRType::Int32)>::isValid , "invalid assertion condition"); if ((__builtin_expect(!!(!( !!(truncated->type() == MIRType::Int32))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("truncated->type() == MIRType::Int32" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3079); AnnotateMozCrashReason("MOZ_ASSERT" "(" "truncated->type() == MIRType::Int32" ")"); do { *((volatile int*)__null) = 3079; ::abort(); } while (false); } } while (false); |
| 3080 | MOZ_ASSERT(Range(truncated).isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(Range(truncated).isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(Range(truncated).isInt32())) ), 0))) { do { } while (false); MOZ_ReportAssertionFailure("Range(truncated).isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3080); AnnotateMozCrashReason("MOZ_ASSERT" "(" "Range(truncated).isInt32()" ")"); do { *((volatile int*)__null) = 3080; ::abort(); } while (false); } } while (false); |
| 3081 | |
| 3082 | for (MUseDefIterator use(truncated); use; use++) { |
| 3083 | MDefinition* def = use.def(); |
| 3084 | if (!def->isTruncateToInt32() || !def->isToNumberInt32()) { |
| 3085 | continue; |
| 3086 | } |
| 3087 | |
| 3088 | def->replaceAllUsesWith(truncated); |
| 3089 | } |
| 3090 | } |
| 3091 | |
| 3092 | void RangeAnalysis::adjustTruncatedInputs(MDefinition* truncated) { |
| 3093 | MBasicBlock* block = truncated->block(); |
| 3094 | for (size_t i = 0, e = truncated->numOperands(); i < e; i++) { |
| 3095 | TruncateKind kind = truncated->operandTruncateKind(i); |
| 3096 | if (kind == TruncateKind::NoTruncate) { |
| 3097 | continue; |
| 3098 | } |
| 3099 | |
| 3100 | MDefinition* input = truncated->getOperand(i); |
| 3101 | if (input->type() == MIRType::Int32) { |
| 3102 | continue; |
| 3103 | } |
| 3104 | |
| 3105 | if (input->isToDouble() && input->getOperand(0)->type() == MIRType::Int32) { |
| 3106 | truncated->replaceOperand(i, input->getOperand(0)); |
| 3107 | } else { |
| 3108 | MInstruction* op; |
| 3109 | if (kind == TruncateKind::TruncateAfterBailouts) { |
| 3110 | MOZ_ASSERT(!mir->outerInfo().hadEagerTruncationBailout())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mir->outerInfo().hadEagerTruncationBailout())> ::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(!mir->outerInfo().hadEagerTruncationBailout()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mir->outerInfo().hadEagerTruncationBailout()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3110); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mir->outerInfo().hadEagerTruncationBailout()" ")"); do { *((volatile int*)__null) = 3110; ::abort(); } while (false); } } while (false); |
| 3111 | op = MToNumberInt32::New(alloc(), truncated->getOperand(i)); |
| 3112 | op->setBailoutKind(BailoutKind::EagerTruncation); |
| 3113 | } else { |
| 3114 | op = MTruncateToInt32::New(alloc(), truncated->getOperand(i)); |
| 3115 | } |
| 3116 | |
| 3117 | if (truncated->isPhi()) { |
| 3118 | MBasicBlock* pred = block->getPredecessor(i); |
| 3119 | pred->insertBefore(pred->lastIns(), op); |
| 3120 | } else { |
| 3121 | block->insertBefore(truncated->toInstruction(), op); |
| 3122 | } |
| 3123 | truncated->replaceOperand(i, op); |
| 3124 | } |
| 3125 | } |
| 3126 | |
| 3127 | if (truncated->isToDouble()) { |
| 3128 | truncated->replaceAllUsesWith(truncated->toToDouble()->getOperand(0)); |
| 3129 | block->discard(truncated->toToDouble()); |
| 3130 | } |
| 3131 | } |
| 3132 | |
| 3133 | bool RangeAnalysis::canTruncate(MDefinition* def, TruncateKind kind) const { |
| 3134 | if (kind == TruncateKind::NoTruncate) { |
| 3135 | return false; |
| 3136 | } |
| 3137 | |
| 3138 | // Range Analysis is sometimes eager to do optimizations, even if we |
| 3139 | // are not able to truncate an instruction. In such case, we |
| 3140 | // speculatively compile the instruction to an int32 instruction |
| 3141 | // while adding a guard. This is what is implied by |
| 3142 | // TruncateAfterBailout. |
| 3143 | // |
| 3144 | // If a previous compilation was invalidated because a speculative |
| 3145 | // truncation bailed out, we no longer attempt to make this kind of |
| 3146 | // eager optimization. |
| 3147 | if (mir->outerInfo().hadEagerTruncationBailout()) { |
| 3148 | if (kind == TruncateKind::TruncateAfterBailouts) { |
| 3149 | return false; |
| 3150 | } |
| 3151 | // MDiv and MMod always require TruncateAfterBailout for their operands. |
| 3152 | // See MDiv::operandTruncateKind and MMod::operandTruncateKind. |
| 3153 | if (def->isDiv() || def->isMod()) { |
| 3154 | return false; |
| 3155 | } |
| 3156 | } |
| 3157 | |
| 3158 | return true; |
| 3159 | } |
| 3160 | |
| 3161 | // Iterate backward on all instruction and attempt to truncate operations for |
| 3162 | // each instruction which respect the following list of predicates: Has been |
| 3163 | // analyzed by range analysis, the range has no rounding errors, all uses cases |
| 3164 | // are truncating the result. |
| 3165 | // |
| 3166 | // If the truncation of the operation is successful, then the instruction is |
| 3167 | // queue for later updating the graph to restore the type correctness by |
| 3168 | // converting the operands that need to be truncated. |
| 3169 | // |
| 3170 | // We iterate backward because it is likely that a truncated operation truncates |
| 3171 | // some of its operands. |
| 3172 | bool RangeAnalysis::truncate() { |
| 3173 | JitSpew(JitSpew_Range, "Do range-base truncation (backward loop)"); |
| 3174 | |
| 3175 | // Automatic truncation is disabled for wasm because the truncation logic |
| 3176 | // is based on IonMonkey which assumes that we can bailout if the truncation |
| 3177 | // logic fails. As wasm code has no bailout mechanism, it is safer to avoid |
| 3178 | // any automatic truncations. |
| 3179 | MOZ_ASSERT(!mir->compilingWasm())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!mir->compilingWasm())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!mir->compilingWasm()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("!mir->compilingWasm()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3179); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!mir->compilingWasm()" ")"); do { *((volatile int*)__null) = 3179; ::abort(); } while (false); } } while (false); |
| 3180 | |
| 3181 | Vector<MDefinition*, 16, SystemAllocPolicy> worklist; |
| 3182 | |
| 3183 | for (PostorderIterator block(graph_.poBegin()); block != graph_.poEnd(); |
| 3184 | block++) { |
| 3185 | for (MInstructionReverseIterator iter(block->rbegin()); |
| 3186 | iter != block->rend(); iter++) { |
| 3187 | if (iter->isRecoveredOnBailout()) { |
| 3188 | continue; |
| 3189 | } |
| 3190 | |
| 3191 | if (iter->type() == MIRType::None) { |
| 3192 | if (iter->isTest()) { |
| 3193 | if (!TruncateTest(alloc(), iter->toTest())) { |
| 3194 | return false; |
| 3195 | } |
| 3196 | } |
| 3197 | continue; |
| 3198 | } |
| 3199 | |
| 3200 | // Remember all bitop instructions for folding after range analysis. |
| 3201 | switch (iter->op()) { |
| 3202 | case MDefinition::Opcode::BitAnd: |
| 3203 | case MDefinition::Opcode::BitOr: |
| 3204 | case MDefinition::Opcode::BitXor: |
| 3205 | case MDefinition::Opcode::Lsh: |
| 3206 | case MDefinition::Opcode::Rsh: |
| 3207 | case MDefinition::Opcode::Ursh: |
| 3208 | if (!bitops.append(static_cast<MBinaryBitwiseInstruction*>(*iter))) { |
| 3209 | return false; |
| 3210 | } |
| 3211 | break; |
| 3212 | default:; |
| 3213 | } |
| 3214 | |
| 3215 | bool shouldClone = false; |
| 3216 | TruncateKind kind = ComputeTruncateKind(*iter, &shouldClone); |
| 3217 | |
| 3218 | // Truncate this instruction if possible. |
| 3219 | if (!canTruncate(*iter, kind) || !iter->needTruncation(kind)) { |
| 3220 | continue; |
| 3221 | } |
| 3222 | |
| 3223 | SpewTruncate(*iter, kind, shouldClone); |
| 3224 | |
| 3225 | // If needed, clone the current instruction for keeping it for the |
| 3226 | // bailout path. This give us the ability to truncate instructions |
| 3227 | // even after the removal of branches. |
| 3228 | if (shouldClone && !CloneForDeadBranches(alloc(), *iter)) { |
| 3229 | return false; |
| 3230 | } |
| 3231 | |
| 3232 | // TruncateAfterBailouts keeps the bailout code as-is and |
| 3233 | // continues with truncated operations, with the expectation |
| 3234 | // that we are unlikely to bail out. If we do bail out, then we |
| 3235 | // will set a flag in FinishBailoutToBaseline to prevent eager |
| 3236 | // truncation when we recompile, to avoid bailout loops. |
| 3237 | if (kind == TruncateKind::TruncateAfterBailouts) { |
| 3238 | iter->setBailoutKind(BailoutKind::EagerTruncation); |
| 3239 | } |
| 3240 | |
| 3241 | iter->truncate(kind); |
| 3242 | |
| 3243 | // Delay updates of inputs/outputs to avoid creating node which |
| 3244 | // would be removed by the truncation of the next operations. |
| 3245 | iter->setInWorklist(); |
| 3246 | if (!worklist.append(*iter)) { |
| 3247 | return false; |
| 3248 | } |
| 3249 | } |
| 3250 | for (MPhiIterator iter(block->phisBegin()), end(block->phisEnd()); |
| 3251 | iter != end; ++iter) { |
| 3252 | bool shouldClone = false; |
| 3253 | TruncateKind kind = ComputeTruncateKind(*iter, &shouldClone); |
| 3254 | |
| 3255 | // Truncate this phi if possible. |
| 3256 | if (shouldClone || !canTruncate(*iter, kind) || |
| 3257 | !iter->needTruncation(kind)) { |
| 3258 | continue; |
| 3259 | } |
| 3260 | |
| 3261 | SpewTruncate(*iter, kind, shouldClone); |
| 3262 | |
| 3263 | iter->truncate(kind); |
| 3264 | |
| 3265 | // Delay updates of inputs/outputs to avoid creating node which |
| 3266 | // would be removed by the truncation of the next operations. |
| 3267 | iter->setInWorklist(); |
| 3268 | if (!worklist.append(*iter)) { |
| 3269 | return false; |
| 3270 | } |
| 3271 | } |
| 3272 | } |
| 3273 | |
| 3274 | // Update inputs/outputs of truncated instructions. |
| 3275 | JitSpew(JitSpew_Range, "Do graph type fixup (dequeue)"); |
| 3276 | while (!worklist.empty()) { |
| 3277 | if (!alloc().ensureBallast()) { |
| 3278 | return false; |
| 3279 | } |
| 3280 | MDefinition* def = worklist.popCopy(); |
| 3281 | def->setNotInWorklist(); |
| 3282 | RemoveTruncatesOnOutput(def); |
| 3283 | adjustTruncatedInputs(def); |
| 3284 | } |
| 3285 | |
| 3286 | return true; |
| 3287 | } |
| 3288 | |
| 3289 | bool RangeAnalysis::removeUnnecessaryBitops() { |
| 3290 | JitSpew(JitSpew_Range, "Begin (removeUnnecessaryBitops)"); |
| 3291 | // Note: This operation change the semantic of the program in a way which |
| 3292 | // uniquely works with Int32, Recover Instructions added by the Sink phase |
| 3293 | // expects the MIR Graph to still have a valid flow as-if they were double |
| 3294 | // operations instead of Int32 operations. Thus, this phase should be |
| 3295 | // executed after the Sink phase, and before DCE. |
| 3296 | |
| 3297 | // Fold any unnecessary bitops in the graph, such as (x | 0) on an integer |
| 3298 | // input. This is done after range analysis rather than during GVN as the |
| 3299 | // presence of the bitop can change which instructions are truncated. |
| 3300 | for (size_t i = 0; i < bitops.length(); i++) { |
| 3301 | MBinaryBitwiseInstruction* ins = bitops[i]; |
| 3302 | if (ins->isRecoveredOnBailout()) { |
| 3303 | continue; |
| 3304 | } |
| 3305 | |
| 3306 | MDefinition* folded = ins->foldUnnecessaryBitop(); |
| 3307 | if (folded != ins) { |
| 3308 | ins->replaceAllLiveUsesWith(folded); |
| 3309 | ins->setRecoveredOnBailout(); |
| 3310 | } |
| 3311 | } |
| 3312 | |
| 3313 | bitops.clear(); |
| 3314 | return true; |
| 3315 | } |
| 3316 | |
| 3317 | /////////////////////////////////////////////////////////////////////////////// |
| 3318 | // Collect Range information of operands |
| 3319 | /////////////////////////////////////////////////////////////////////////////// |
| 3320 | |
| 3321 | void MInArray::collectRangeInfoPreTrunc() { |
| 3322 | Range indexRange(index()); |
| 3323 | if (indexRange.isFiniteNonNegative()) { |
| 3324 | needsNegativeIntCheck_ = false; |
| 3325 | setNotGuard(); |
| 3326 | } |
| 3327 | } |
| 3328 | |
| 3329 | void MLoadElementHole::collectRangeInfoPreTrunc() { |
| 3330 | Range indexRange(index()); |
| 3331 | if (indexRange.isFiniteNonNegative()) { |
| 3332 | needsNegativeIntCheck_ = false; |
| 3333 | setNotGuard(); |
| 3334 | } |
| 3335 | } |
| 3336 | |
| 3337 | void MInt32ToIntPtr::collectRangeInfoPreTrunc() { |
| 3338 | Range inputRange(input()); |
| 3339 | if (inputRange.isFiniteNonNegative()) { |
| 3340 | canBeNegative_ = false; |
| 3341 | } |
| 3342 | } |
| 3343 | |
| 3344 | void MClz::collectRangeInfoPreTrunc() { |
| 3345 | Range inputRange(input()); |
| 3346 | if (!inputRange.canBeZero()) { |
| 3347 | operandIsNeverZero_ = true; |
| 3348 | } |
| 3349 | } |
| 3350 | |
| 3351 | void MCtz::collectRangeInfoPreTrunc() { |
| 3352 | Range inputRange(input()); |
| 3353 | if (!inputRange.canBeZero()) { |
| 3354 | operandIsNeverZero_ = true; |
| 3355 | } |
| 3356 | } |
| 3357 | |
| 3358 | void MDiv::collectRangeInfoPreTrunc() { |
| 3359 | Range lhsRange(lhs()); |
| 3360 | Range rhsRange(rhs()); |
| 3361 | |
| 3362 | // Test if Dividend is non-negative. |
| 3363 | if (lhsRange.isFiniteNonNegative()) { |
| 3364 | canBeNegativeDividend_ = false; |
| 3365 | } |
| 3366 | |
| 3367 | // Try removing divide by zero check. |
| 3368 | if (!rhsRange.canBeZero()) { |
| 3369 | canBeDivideByZero_ = false; |
| 3370 | } |
| 3371 | |
| 3372 | // If lhsRange does not contain INT32_MIN in its range, |
| 3373 | // negative overflow check can be skipped. |
| 3374 | if (!lhsRange.contains(INT32_MIN(-2147483647-1))) { |
| 3375 | canBeNegativeOverflow_ = false; |
| 3376 | } |
| 3377 | |
| 3378 | // If rhsRange does not contain -1 likewise. |
| 3379 | if (!rhsRange.contains(-1)) { |
| 3380 | canBeNegativeOverflow_ = false; |
| 3381 | } |
| 3382 | |
| 3383 | // If lhsRange does not contain a zero, |
| 3384 | // negative zero check can be skipped. |
| 3385 | if (!lhsRange.canBeZero()) { |
| 3386 | canBeNegativeZero_ = false; |
| 3387 | } |
| 3388 | |
| 3389 | // If rhsRange >= 0 negative zero check can be skipped. |
| 3390 | if (rhsRange.isFiniteNonNegative()) { |
| 3391 | canBeNegativeZero_ = false; |
| 3392 | } |
| 3393 | |
| 3394 | if (fallible()) { |
| 3395 | setGuardRangeBailoutsUnchecked(); |
| 3396 | } |
| 3397 | } |
| 3398 | |
| 3399 | void MMul::collectRangeInfoPreTrunc() { |
| 3400 | Range lhsRange(lhs()); |
| 3401 | Range rhsRange(rhs()); |
| 3402 | |
| 3403 | // If lhsRange contains only positive then we can skip negative zero check. |
| 3404 | if (lhsRange.isFiniteNonNegative() && !lhsRange.canBeZero()) { |
| 3405 | setCanBeNegativeZero(false); |
| 3406 | } |
| 3407 | |
| 3408 | // Likewise rhsRange. |
| 3409 | if (rhsRange.isFiniteNonNegative() && !rhsRange.canBeZero()) { |
| 3410 | setCanBeNegativeZero(false); |
| 3411 | } |
| 3412 | |
| 3413 | // If rhsRange and lhsRange contain Non-negative integers only, |
| 3414 | // We skip negative zero check. |
| 3415 | if (rhsRange.isFiniteNonNegative() && lhsRange.isFiniteNonNegative()) { |
| 3416 | setCanBeNegativeZero(false); |
| 3417 | } |
| 3418 | |
| 3419 | // If rhsRange and lhsRange < 0. Then we skip negative zero check. |
| 3420 | if (rhsRange.isFiniteNegative() && lhsRange.isFiniteNegative()) { |
| 3421 | setCanBeNegativeZero(false); |
| 3422 | } |
| 3423 | } |
| 3424 | |
| 3425 | void MMod::collectRangeInfoPreTrunc() { |
| 3426 | Range lhsRange(lhs()); |
| 3427 | Range rhsRange(rhs()); |
| 3428 | if (lhsRange.isFiniteNonNegative()) { |
| 3429 | canBeNegativeDividend_ = false; |
| 3430 | } |
| 3431 | if (!rhsRange.canBeZero()) { |
| 3432 | canBeDivideByZero_ = false; |
| 3433 | } |
| 3434 | if (type() == MIRType::Int32 && fallible()) { |
| 3435 | setGuardRangeBailoutsUnchecked(); |
| 3436 | } |
| 3437 | } |
| 3438 | |
| 3439 | void MToNumberInt32::collectRangeInfoPreTrunc() { |
| 3440 | Range inputRange(input()); |
| 3441 | if (!inputRange.canBeNegativeZero()) { |
| 3442 | needsNegativeZeroCheck_ = false; |
| 3443 | } |
| 3444 | } |
| 3445 | |
| 3446 | void MBoundsCheck::collectRangeInfoPreTrunc() { |
| 3447 | Range indexRange(index()); |
| 3448 | Range lengthRange(length()); |
| 3449 | if (!indexRange.hasInt32LowerBound() || !indexRange.hasInt32UpperBound()) { |
| 3450 | return; |
| 3451 | } |
| 3452 | if (!lengthRange.hasInt32LowerBound() || lengthRange.canBeNaN()) { |
| 3453 | return; |
| 3454 | } |
| 3455 | |
| 3456 | int64_t indexLower = indexRange.lower(); |
| 3457 | int64_t indexUpper = indexRange.upper(); |
| 3458 | int64_t lengthLower = lengthRange.lower(); |
| 3459 | int64_t min = minimum(); |
| 3460 | int64_t max = maximum(); |
| 3461 | |
| 3462 | if (indexLower + min >= 0 && indexUpper + max < lengthLower) { |
| 3463 | fallible_ = false; |
| 3464 | } |
| 3465 | } |
| 3466 | |
| 3467 | void MBoundsCheckLower::collectRangeInfoPreTrunc() { |
| 3468 | Range indexRange(index()); |
| 3469 | if (indexRange.hasInt32LowerBound() && indexRange.lower() >= minimum_) { |
| 3470 | fallible_ = false; |
| 3471 | } |
| 3472 | } |
| 3473 | |
| 3474 | void MCompare::collectRangeInfoPreTrunc() { |
| 3475 | if (!Range(lhs()).canBeNaN() && !Range(rhs()).canBeNaN()) { |
| 3476 | operandsAreNeverNaN_ = true; |
| 3477 | } |
| 3478 | } |
| 3479 | |
| 3480 | void MNot::collectRangeInfoPreTrunc() { |
| 3481 | if (!Range(input()).canBeNaN()) { |
| 3482 | operandIsNeverNaN_ = true; |
| 3483 | } |
| 3484 | } |
| 3485 | |
| 3486 | void MPowHalf::collectRangeInfoPreTrunc() { |
| 3487 | Range inputRange(input()); |
| 3488 | if (!inputRange.canBeInfiniteOrNaN() || inputRange.hasInt32LowerBound()) { |
| 3489 | operandIsNeverNegativeInfinity_ = true; |
| 3490 | } |
| 3491 | if (!inputRange.canBeNegativeZero()) { |
| 3492 | operandIsNeverNegativeZero_ = true; |
| 3493 | } |
| 3494 | if (!inputRange.canBeNaN()) { |
| 3495 | operandIsNeverNaN_ = true; |
| 3496 | } |
| 3497 | } |
| 3498 | |
| 3499 | void MUrsh::collectRangeInfoPreTrunc() { |
| 3500 | if (type() == MIRType::Int64) { |
| 3501 | return; |
| 3502 | } |
| 3503 | |
| 3504 | Range lhsRange(lhs()), rhsRange(rhs()); |
| 3505 | |
| 3506 | // As in MUrsh::computeRange(), convert the inputs. |
| 3507 | lhsRange.wrapAroundToInt32(); |
| 3508 | rhsRange.wrapAroundToShiftCount(); |
| 3509 | |
| 3510 | // If the most significant bit of our result is always going to be zero, |
| 3511 | // we can optimize by disabling bailout checks for enforcing an int32 range. |
| 3512 | if (lhsRange.lower() >= 0 || rhsRange.lower() >= 1) { |
| 3513 | bailoutsDisabled_ = true; |
| 3514 | } |
| 3515 | } |
| 3516 | |
| 3517 | static bool DoesMaskMatchRange(int32_t mask, Range& range) { |
| 3518 | // Check if range is positive, because the bitand operator in `(-3) & 0xff` |
| 3519 | // can't be eliminated. |
| 3520 | if (range.lower() >= 0) { |
| 3521 | MOZ_ASSERT(range.isInt32())do { static_assert( mozilla::detail::AssertionConditionType< decltype(range.isInt32())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(range.isInt32()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("range.isInt32()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3521); AnnotateMozCrashReason("MOZ_ASSERT" "(" "range.isInt32()" ")"); do { *((volatile int*)__null) = 3521; ::abort(); } while (false); } } while (false); |
| 3522 | // Check that the mask value has all bits set given the range upper bound. |
| 3523 | // Note that the upper bound does not have to be exactly the mask value. For |
| 3524 | // example, consider `x & 0xfff` where `x` is a uint8. That expression can |
| 3525 | // still be optimized to `x`. |
| 3526 | int bits = 1 + FloorLog2(range.upper()); |
| 3527 | uint32_t maskNeeded = (bits == 32) ? 0xffffffff : (uint32_t(1) << bits) - 1; |
| 3528 | if ((mask & maskNeeded) == maskNeeded) { |
| 3529 | return true; |
| 3530 | } |
| 3531 | } |
| 3532 | |
| 3533 | return false; |
| 3534 | } |
| 3535 | |
| 3536 | void MBinaryBitwiseInstruction::collectRangeInfoPreTrunc() { |
| 3537 | Range lhsRange(lhs()); |
| 3538 | Range rhsRange(rhs()); |
| 3539 | |
| 3540 | if (lhs()->isConstant() && lhs()->type() == MIRType::Int32 && |
| 3541 | DoesMaskMatchRange(lhs()->toConstant()->toInt32(), rhsRange)) { |
| 3542 | maskMatchesRightRange = true; |
| 3543 | } |
| 3544 | |
| 3545 | if (rhs()->isConstant() && rhs()->type() == MIRType::Int32 && |
| 3546 | DoesMaskMatchRange(rhs()->toConstant()->toInt32(), lhsRange)) { |
| 3547 | maskMatchesLeftRange = true; |
| 3548 | } |
| 3549 | } |
| 3550 | |
| 3551 | void MNaNToZero::collectRangeInfoPreTrunc() { |
| 3552 | Range inputRange(input()); |
| 3553 | |
| 3554 | if (!inputRange.canBeNaN()) { |
| 3555 | operandIsNeverNaN_ = true; |
| 3556 | } |
| 3557 | if (!inputRange.canBeNegativeZero()) { |
| 3558 | operandIsNeverNegativeZero_ = true; |
| 3559 | } |
| 3560 | } |
| 3561 | |
| 3562 | bool RangeAnalysis::prepareForUCE(bool* shouldRemoveDeadCode) { |
| 3563 | *shouldRemoveDeadCode = false; |
| 3564 | |
| 3565 | for (ReversePostorderIterator iter(graph_.rpoBegin()); |
| 3566 | iter != graph_.rpoEnd(); iter++) { |
| 3567 | MBasicBlock* block = *iter; |
| 3568 | |
| 3569 | if (!block->unreachable()) { |
| 3570 | continue; |
| 3571 | } |
| 3572 | |
| 3573 | // Filter out unreachable fake entries. |
| 3574 | if (block->numPredecessors() == 0) { |
| 3575 | // Ignore fixup blocks added by the Value Numbering phase, in order |
| 3576 | // to keep the dominator tree as-is when we have OSR Block which are |
| 3577 | // no longer reachable from the main entry point of the graph. |
| 3578 | MOZ_ASSERT(graph_.osrBlock())do { static_assert( mozilla::detail::AssertionConditionType< decltype(graph_.osrBlock())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(graph_.osrBlock()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure("graph_.osrBlock()" , "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3578); AnnotateMozCrashReason("MOZ_ASSERT" "(" "graph_.osrBlock()" ")"); do { *((volatile int*)__null) = 3578; ::abort(); } while (false); } } while (false); |
| 3579 | continue; |
| 3580 | } |
| 3581 | |
| 3582 | MControlInstruction* cond = block->getPredecessor(0)->lastIns(); |
| 3583 | if (!cond->isTest()) { |
| 3584 | continue; |
| 3585 | } |
| 3586 | |
| 3587 | // Replace the condition of the test control instruction by a constant |
| 3588 | // chosen based which of the successors has the unreachable flag which is |
| 3589 | // added by MBeta::computeRange on its own block. |
| 3590 | MTest* test = cond->toTest(); |
| 3591 | MDefinition* condition = test->input(); |
| 3592 | |
| 3593 | // If the false-branch is unreachable, then the test condition must be true. |
| 3594 | // If the true-branch is unreachable, then the test condition must be false. |
| 3595 | MOZ_ASSERT(block == test->ifTrue() || block == test->ifFalse())do { static_assert( mozilla::detail::AssertionConditionType< decltype(block == test->ifTrue() || block == test->ifFalse ())>::isValid, "invalid assertion condition"); if ((__builtin_expect (!!(!(!!(block == test->ifTrue() || block == test->ifFalse ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("block == test->ifTrue() || block == test->ifFalse()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3595); AnnotateMozCrashReason("MOZ_ASSERT" "(" "block == test->ifTrue() || block == test->ifFalse()" ")"); do { *((volatile int*)__null) = 3595; ::abort(); } while (false); } } while (false); |
| 3596 | bool value = block == test->ifFalse(); |
| 3597 | MConstant* constant = |
| 3598 | MConstant::New(alloc().fallible(), BooleanValue(value)); |
| 3599 | if (!constant) { |
| 3600 | return false; |
| 3601 | } |
| 3602 | |
| 3603 | condition->setGuardRangeBailoutsUnchecked(); |
| 3604 | |
| 3605 | test->block()->insertBefore(test, constant); |
| 3606 | |
| 3607 | test->replaceOperand(0, constant); |
| 3608 | JitSpew(JitSpew_Range, |
| 3609 | "Update condition of %u to reflect unreachable branches.", |
| 3610 | test->id()); |
| 3611 | |
| 3612 | *shouldRemoveDeadCode = true; |
| 3613 | } |
| 3614 | |
| 3615 | return tryRemovingGuards(); |
| 3616 | } |
| 3617 | |
| 3618 | bool RangeAnalysis::tryRemovingGuards() { |
| 3619 | MDefinitionVector guards(alloc()); |
| 3620 | |
| 3621 | for (ReversePostorderIterator block = graph_.rpoBegin(); |
| 3622 | block != graph_.rpoEnd(); block++) { |
| 3623 | for (MDefinitionIterator iter(*block); iter; iter++) { |
| 3624 | if (!iter->isGuardRangeBailouts()) { |
| 3625 | continue; |
| 3626 | } |
| 3627 | |
| 3628 | iter->setInWorklist(); |
| 3629 | if (!guards.append(*iter)) { |
| 3630 | return false; |
| 3631 | } |
| 3632 | } |
| 3633 | } |
| 3634 | |
| 3635 | // Flag all fallible instructions which were indirectly used in the |
| 3636 | // computation of the condition, such that we do not ignore |
| 3637 | // bailout-paths which are used to shrink the input range of the |
| 3638 | // operands of the condition. |
| 3639 | for (size_t i = 0; i < guards.length(); i++) { |
| 3640 | MDefinition* guard = guards[i]; |
| 3641 | |
| 3642 | // If this ins is a guard even without guardRangeBailouts, |
| 3643 | // there is no reason in trying to hoist the guardRangeBailouts check. |
| 3644 | guard->setNotGuardRangeBailouts(); |
| 3645 | if (!DeadIfUnused(guard)) { |
| 3646 | guard->setGuardRangeBailouts(); |
| 3647 | continue; |
| 3648 | } |
| 3649 | guard->setGuardRangeBailouts(); |
| 3650 | |
| 3651 | if (!guard->isPhi()) { |
| 3652 | if (!guard->range()) { |
| 3653 | continue; |
| 3654 | } |
| 3655 | |
| 3656 | // Filter the range of the instruction based on its MIRType. |
| 3657 | Range typeFilteredRange(guard); |
| 3658 | |
| 3659 | // If the output range is updated by adding the inner range, |
| 3660 | // then the MIRType act as an effectful filter. As we do not know if |
| 3661 | // this filtered Range might change or not the result of the |
| 3662 | // previous comparison, we have to keep this instruction as a guard |
| 3663 | // because it has to bailout in order to restrict the Range to its |
| 3664 | // MIRType. |
| 3665 | if (typeFilteredRange.update(guard->range())) { |
| 3666 | continue; |
| 3667 | } |
| 3668 | } |
| 3669 | |
| 3670 | guard->setNotGuardRangeBailouts(); |
| 3671 | |
| 3672 | // Propagate the guard to its operands. |
| 3673 | for (size_t op = 0, e = guard->numOperands(); op < e; op++) { |
| 3674 | MDefinition* operand = guard->getOperand(op); |
| 3675 | |
| 3676 | // Already marked. |
| 3677 | if (operand->isInWorklist()) { |
| 3678 | continue; |
| 3679 | } |
| 3680 | |
| 3681 | MOZ_ASSERT(!operand->isGuardRangeBailouts())do { static_assert( mozilla::detail::AssertionConditionType< decltype(!operand->isGuardRangeBailouts())>::isValid, "invalid assertion condition" ); if ((__builtin_expect(!!(!(!!(!operand->isGuardRangeBailouts ()))), 0))) { do { } while (false); MOZ_ReportAssertionFailure ("!operand->isGuardRangeBailouts()", "/var/lib/jenkins/workspace/firefox-scan-build/js/src/jit/RangeAnalysis.cpp" , 3681); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!operand->isGuardRangeBailouts()" ")"); do { *((volatile int*)__null) = 3681; ::abort(); } while (false); } } while (false); |
| 3682 | |
| 3683 | operand->setInWorklist(); |
| 3684 | operand->setGuardRangeBailouts(); |
| 3685 | if (!guards.append(operand)) { |
| 3686 | return false; |
| 3687 | } |
| 3688 | } |
| 3689 | } |
| 3690 | |
| 3691 | for (size_t i = 0; i < guards.length(); i++) { |
| 3692 | MDefinition* guard = guards[i]; |
| 3693 | guard->setNotInWorklist(); |
| 3694 | } |
| 3695 | |
| 3696 | return true; |
| 3697 | } |