2021-06-16 09:19:36 +00:00
|
|
|
[numthreads(1, 1, 1)]
|
|
|
|
void unused_entry_point() {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-06-16 09:50:11 +00:00
|
|
|
struct tint_padded_array_element {
|
2021-06-18 21:15:25 +00:00
|
|
|
int el;
|
2021-06-16 09:50:11 +00:00
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
struct S {
|
2021-07-05 15:20:57 +00:00
|
|
|
tint_padded_array_element arr[4];
|
2021-06-16 09:19:36 +00:00
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2021-07-05 15:20:57 +00:00
|
|
|
static tint_padded_array_element src_private[4] = (tint_padded_array_element[4])0;
|
|
|
|
groupshared tint_padded_array_element src_workgroup[4];
|
2021-06-18 21:15:25 +00:00
|
|
|
cbuffer cbuffer_src_uniform : register(b0, space0) {
|
|
|
|
uint4 src_uniform[4];
|
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
RWByteAddressBuffer src_storage : register(u1, space0);
|
|
|
|
|
2021-07-05 15:20:57 +00:00
|
|
|
typedef tint_padded_array_element ret_arr_ret[4];
|
|
|
|
ret_arr_ret ret_arr() {
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
const tint_padded_array_element tint_symbol_5[4] = (tint_padded_array_element[4])0;
|
|
|
|
return tint_symbol_5;
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2021-06-16 09:19:36 +00:00
|
|
|
S ret_struct_arr() {
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
const S tint_symbol_6 = (S)0;
|
|
|
|
return tint_symbol_6;
|
|
|
|
}
|
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
typedef tint_padded_array_element tint_symbol_1_ret[4];
|
|
|
|
tint_symbol_1_ret tint_symbol_1(uint4 buffer[4], uint offset) {
|
|
|
|
tint_padded_array_element arr_1[4] = (tint_padded_array_element[4])0;
|
|
|
|
{
|
|
|
|
for(uint i = 0u; (i < 4u); i = (i + 1u)) {
|
|
|
|
const uint scalar_offset = ((offset + (i * 16u))) / 4;
|
|
|
|
arr_1[i].el = asint(buffer[scalar_offset / 4][scalar_offset % 4]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return arr_1;
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
}
|
|
|
|
|
2021-07-16 19:47:44 +00:00
|
|
|
typedef tint_padded_array_element tint_symbol_3_ret[4];
|
|
|
|
tint_symbol_3_ret tint_symbol_3(RWByteAddressBuffer buffer, uint offset) {
|
|
|
|
tint_padded_array_element arr_2[4] = (tint_padded_array_element[4])0;
|
|
|
|
{
|
|
|
|
for(uint i_1 = 0u; (i_1 < 4u); i_1 = (i_1 + 1u)) {
|
|
|
|
arr_2[i_1].el = asint(buffer.Load((offset + (i_1 * 16u))));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return arr_2;
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2021-07-05 15:20:57 +00:00
|
|
|
void foo(tint_padded_array_element src_param[4]) {
|
|
|
|
tint_padded_array_element src_function[4] = (tint_padded_array_element[4])0;
|
|
|
|
tint_padded_array_element tint_symbol[4] = (tint_padded_array_element[4])0;
|
2021-07-16 19:47:44 +00:00
|
|
|
const tint_padded_array_element tint_symbol_7[4] = {{1}, {2}, {3}, {3}};
|
|
|
|
tint_symbol = tint_symbol_7;
|
2021-06-16 09:19:36 +00:00
|
|
|
tint_symbol = src_param;
|
|
|
|
tint_symbol = ret_arr();
|
2021-07-05 15:20:57 +00:00
|
|
|
const tint_padded_array_element src_let[4] = (tint_padded_array_element[4])0;
|
2021-06-16 09:19:36 +00:00
|
|
|
tint_symbol = src_let;
|
|
|
|
tint_symbol = src_function;
|
|
|
|
tint_symbol = src_private;
|
|
|
|
tint_symbol = src_workgroup;
|
|
|
|
tint_symbol = ret_struct_arr().arr;
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol = tint_symbol_1(src_uniform, 0u);
|
|
|
|
tint_symbol = tint_symbol_3(src_storage, 0u);
|
2021-07-05 15:20:57 +00:00
|
|
|
int dst_nested[4][3][2] = (int[4][3][2])0;
|
|
|
|
int src_nested[4][3][2] = (int[4][3][2])0;
|
2021-06-16 09:19:36 +00:00
|
|
|
dst_nested = src_nested;
|
|
|
|
}
|