2021-06-16 09:19:36 +00:00
|
|
|
[numthreads(1, 1, 1)]
|
|
|
|
void unused_entry_point() {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-06-16 09:50:11 +00:00
|
|
|
struct tint_padded_array_element {
|
2021-06-18 21:15:25 +00:00
|
|
|
int el;
|
2021-06-16 09:50:11 +00:00
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
struct S {
|
2021-07-05 15:20:57 +00:00
|
|
|
tint_padded_array_element arr[4];
|
2021-06-16 09:19:36 +00:00
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
static tint_padded_array_element src_private[4] = (tint_padded_array_element[4])0;
|
|
|
|
groupshared tint_padded_array_element src_workgroup[4];
|
|
|
|
cbuffer cbuffer_src_uniform : register(b0, space0) {
|
|
|
|
uint4 src_uniform[4];
|
|
|
|
};
|
|
|
|
RWByteAddressBuffer src_storage : register(u1, space0);
|
|
|
|
RWByteAddressBuffer tint_symbol : register(u2, space0);
|
|
|
|
RWByteAddressBuffer dst_nested : register(u3, space0);
|
|
|
|
|
|
|
|
typedef tint_padded_array_element ret_arr_ret[4];
|
|
|
|
ret_arr_ret ret_arr() {
|
|
|
|
const tint_padded_array_element tint_symbol_11[4] = (tint_padded_array_element[4])0;
|
2021-06-18 21:15:25 +00:00
|
|
|
return tint_symbol_11;
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
S ret_struct_arr() {
|
|
|
|
const S tint_symbol_12 = (S)0;
|
2021-06-18 21:15:25 +00:00
|
|
|
return tint_symbol_12;
|
|
|
|
}
|
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
void tint_symbol_1(RWByteAddressBuffer buffer, uint offset, tint_padded_array_element value[4]) {
|
|
|
|
tint_padded_array_element array[4] = value;
|
|
|
|
{
|
2021-11-18 13:50:12 +00:00
|
|
|
[loop] for(uint i = 0u; (i < 4u); i = (i + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
buffer.Store((offset + (i * 16u)), asuint(array[i].el));
|
|
|
|
}
|
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
typedef tint_padded_array_element tint_symbol_3_ret[4];
|
|
|
|
tint_symbol_3_ret tint_symbol_3(uint4 buffer[4], uint offset) {
|
|
|
|
tint_padded_array_element arr_1[4] = (tint_padded_array_element[4])0;
|
|
|
|
{
|
2021-11-18 13:50:12 +00:00
|
|
|
[loop] for(uint i_1 = 0u; (i_1 < 4u); i_1 = (i_1 + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
const uint scalar_offset = ((offset + (i_1 * 16u))) / 4;
|
|
|
|
arr_1[i_1].el = asint(buffer[scalar_offset / 4][scalar_offset % 4]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return arr_1;
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
}
|
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
typedef tint_padded_array_element tint_symbol_5_ret[4];
|
|
|
|
tint_symbol_5_ret tint_symbol_5(RWByteAddressBuffer buffer, uint offset) {
|
|
|
|
tint_padded_array_element arr_2[4] = (tint_padded_array_element[4])0;
|
|
|
|
{
|
2021-11-18 13:50:12 +00:00
|
|
|
[loop] for(uint i_2 = 0u; (i_2 < 4u); i_2 = (i_2 + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
arr_2[i_2].el = asint(buffer.Load((offset + (i_2 * 16u))));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return arr_2;
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
}
|
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
void tint_symbol_9(RWByteAddressBuffer buffer, uint offset, int value[2]) {
|
|
|
|
int array_3[2] = value;
|
|
|
|
{
|
2021-11-18 13:50:12 +00:00
|
|
|
[loop] for(uint i_3 = 0u; (i_3 < 2u); i_3 = (i_3 + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
buffer.Store((offset + (i_3 * 4u)), asuint(array_3[i_3]));
|
|
|
|
}
|
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
void tint_symbol_8(RWByteAddressBuffer buffer, uint offset, int value[3][2]) {
|
|
|
|
int array_2[3][2] = value;
|
|
|
|
{
|
2021-11-18 13:50:12 +00:00
|
|
|
[loop] for(uint i_4 = 0u; (i_4 < 3u); i_4 = (i_4 + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol_9(buffer, (offset + (i_4 * 8u)), array_2[i_4]);
|
|
|
|
}
|
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
void tint_symbol_7(RWByteAddressBuffer buffer, uint offset, int value[4][3][2]) {
|
|
|
|
int array_1[4][3][2] = value;
|
|
|
|
{
|
2021-11-18 13:50:12 +00:00
|
|
|
[loop] for(uint i_5 = 0u; (i_5 < 4u); i_5 = (i_5 + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol_8(buffer, (offset + (i_5 * 24u)), array_1[i_5]);
|
|
|
|
}
|
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
|
|
|
|
2021-07-05 15:20:57 +00:00
|
|
|
void foo(tint_padded_array_element src_param[4]) {
|
|
|
|
tint_padded_array_element src_function[4] = (tint_padded_array_element[4])0;
|
2021-07-16 19:47:44 +00:00
|
|
|
const tint_padded_array_element tint_symbol_13[4] = {{1}, {2}, {3}, {3}};
|
|
|
|
tint_symbol_1(tint_symbol, 0u, tint_symbol_13);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, src_param);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, ret_arr());
|
2021-07-05 15:20:57 +00:00
|
|
|
const tint_padded_array_element src_let[4] = (tint_padded_array_element[4])0;
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol_1(tint_symbol, 0u, src_let);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, src_function);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, src_private);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, src_workgroup);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, ret_struct_arr().arr);
|
|
|
|
tint_symbol_1(tint_symbol, 0u, tint_symbol_3(src_uniform, 0u));
|
|
|
|
tint_symbol_1(tint_symbol, 0u, tint_symbol_5(src_storage, 0u));
|
2021-07-05 15:20:57 +00:00
|
|
|
int src_nested[4][3][2] = (int[4][3][2])0;
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol_7(dst_nested, 0u, src_nested);
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|