• Home
  • Raw
  • Download

Lines Matching refs:LAA

1 ; RUN: opt -basicaa -loop-accesses -analyze < %s | FileCheck %s -check-prefix=LAA
2 …-access-info)' -aa-pipeline='basic-aa' -disable-output < %s 2>&1 | FileCheck %s --check-prefix=LAA
24 ; LAA-LABEL: f1
25 ; LAA: Memory dependences are safe{{$}}
26 ; LAA: SCEV assumptions:
27 ; LAA-NEXT: {0,+,2}<%for.body> Added Flags: <nusw>
28 ; LAA-NEXT: {%a,+,4}<%for.body> Added Flags: <nusw>
35 ; LAA: [PSE] %arrayidxA = getelementptr i16, i16* %a, i64 %mul_ext:
36 ; LAA-NEXT: ((2 * (zext i32 {0,+,2}<%for.body> to i64)) + %a)
37 ; LAA-NEXT: --> {%a,+,4}<%for.body>
121 ; LAA-LABEL: f2
122 ; LAA: Memory dependences are safe{{$}}
123 ; LAA: SCEV assumptions:
124 ; LAA-NEXT: {(2 * (trunc i64 %N to i32)),+,-2}<%for.body> Added Flags: <nusw>
125 ; LAA-NEXT: {((2 * (zext i32 (2 * (trunc i64 %N to i32)) to i64)) + %a),+,-4}<%for.body> Added Flag…
132 ; LAA: [PSE] %arrayidxA = getelementptr i16, i16* %a, i64 %mul_ext:
133 ; LAA-NEXT: ((2 * (zext i32 {(2 * (trunc i64 %N to i32)),+,-2}<%for.body> to i64)) + %a)
134 ; LAA-NEXT: --> {((2 * (zext i32 (2 * (trunc i64 %N to i32)) to i64)) + %a),+,-4}<%for.body>
201 ; LAA-LABEL: f3
202 ; LAA: Memory dependences are safe{{$}}
203 ; LAA: SCEV assumptions:
204 ; LAA-NEXT: {0,+,2}<%for.body> Added Flags: <nssw>
205 ; LAA-NEXT: {%a,+,4}<%for.body> Added Flags: <nusw>
212 ; LAA: [PSE] %arrayidxA = getelementptr i16, i16* %a, i64 %mul_ext:
213 ; LAA-NEXT: ((2 * (sext i32 {0,+,2}<%for.body> to i64)) + %a)
214 ; LAA-NEXT: --> {%a,+,4}<%for.body>
277 ; LAA-LABEL: f4
278 ; LAA: Memory dependences are safe{{$}}
279 ; LAA: SCEV assumptions:
280 ; LAA-NEXT: {(2 * (trunc i64 %N to i32)),+,-2}<%for.body> Added Flags: <nssw>
281 ; LAA-NEXT: {((2 * (sext i32 (2 * (trunc i64 %N to i32)) to i64)) + %a),+,-4}<%for.body> Added Flag…
288 ; LAA: [PSE] %arrayidxA = getelementptr i16, i16* %a, i64 %mul_ext:
289 ; LAA-NEXT: ((2 * (sext i32 {(2 * (trunc i64 %N to i32)),+,-2}<%for.body> to i64)) + %a)
290 ; LAA-NEXT: --> {((2 * (sext i32 (2 * (trunc i64 %N to i32)) to i64)) + %a),+,-4}<%for.body>
361 ; LAA-LABEL: f5
362 ; LAA: Memory dependences are safe{{$}}
363 ; LAA: SCEV assumptions:
364 ; LAA-NEXT: {(2 * (trunc i64 %N to i32)),+,-2}<%for.body> Added Flags: <nssw>
365 ; LAA-NEXT: {((2 * (sext i32 (2 * (trunc i64 %N to i32)) to i64)) + %a),+,-4}<%for.body> Added Flag…
367 ; LAA: [PSE] %arrayidxA = getelementptr inbounds i16, i16* %a, i32 %mul:
368 ; LAA-NEXT: ((2 * (sext i32 {(2 * (trunc i64 %N to i32)),+,-2}<%for.body> to i64))<nsw> + %a)<nsw>
369 ; LAA-NEXT: --> {((2 * (sext i32 (2 * (trunc i64 %N to i32)) to i64)) + %a),+,-4}<%for.body>