2021-06-16 09:19:36 +00:00
|
|
|
[numthreads(1, 1, 1)]
|
|
|
|
void unused_entry_point() {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-06-16 09:19:36 +00:00
|
|
|
struct S {
|
2022-01-20 22:11:07 +00:00
|
|
|
int4 arr[4];
|
2021-06-16 09:19:36 +00:00
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2022-01-20 22:11:07 +00:00
|
|
|
static int4 src_private[4] = (int4[4])0;
|
|
|
|
groupshared int4 src_workgroup[4];
|
2021-06-18 21:15:25 +00:00
|
|
|
cbuffer cbuffer_src_uniform : register(b0, space0) {
|
|
|
|
uint4 src_uniform[4];
|
|
|
|
};
|
2021-06-16 09:19:36 +00:00
|
|
|
RWByteAddressBuffer src_storage : register(u1, space0);
|
2022-01-20 22:11:07 +00:00
|
|
|
static int4 tint_symbol[4] = (int4[4])0;
|
2021-07-05 15:20:57 +00:00
|
|
|
static int dst_nested[4][3][2] = (int[4][3][2])0;
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2022-01-20 22:11:07 +00:00
|
|
|
typedef int4 ret_arr_ret[4];
|
2021-07-05 15:20:57 +00:00
|
|
|
ret_arr_ret ret_arr() {
|
2022-01-20 22:11:07 +00:00
|
|
|
const int4 tint_symbol_5[4] = (int4[4])0;
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
return tint_symbol_5;
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2021-06-16 09:19:36 +00:00
|
|
|
S ret_struct_arr() {
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
const S tint_symbol_6 = (S)0;
|
|
|
|
return tint_symbol_6;
|
|
|
|
}
|
|
|
|
|
2022-01-20 22:11:07 +00:00
|
|
|
typedef int4 tint_symbol_1_ret[4];
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol_1_ret tint_symbol_1(uint4 buffer[4], uint offset) {
|
2022-01-20 22:11:07 +00:00
|
|
|
int4 arr_1[4] = (int4[4])0;
|
2021-07-16 19:47:44 +00:00
|
|
|
{
|
2021-11-25 18:44:50 +00:00
|
|
|
[loop] for(uint i = 0u; (i < 4u); i = (i + 1u)) {
|
2021-07-16 19:47:44 +00:00
|
|
|
const uint scalar_offset = ((offset + (i * 16u))) / 4;
|
2022-01-20 22:11:07 +00:00
|
|
|
arr_1[i] = asint(buffer[scalar_offset / 4]);
|
2021-07-16 19:47:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return arr_1;
|
transform: Fixes for DecomposeMemoryAccess
CloneContext::Replace(T* what, T* with) is bug-prone, as complex transforms may want to clone `what` multiple times, or not at all. In both cases, this will likely result in an ICE as either the replacement will be reachable multiple times, or not at all.
The CTS test: webgpu:shader,execution,robust_access:linear_memory:storageClass="storage";storageMode="read_write";access="read";atomic=true;baseType="i32"
Was triggering this brokenness with DecomposeMemoryAccess's use of CloneContext::Replace(T*, T*).
Switch the usage of CloneContext::Replace(T*, T*) to the new function form.
As std::function is copyable, it cannot hold a captured std::unique_ptr.
This prevented the Replace() lambdas from capturing the necessary `BufferAccess` data, as this held a `std::unique_ptr<Offset>`.
To fix this, use a `BlockAllocator` for Offsets, and use raw pointers instead.
Because the function passed to Replace() is called just before the node is cloned, insertion of new functions will occur just before the currently evaluated module-scope entity.
This allows us to remove the "insert_after" arguments to LoadFunc(), StoreFunc(), and AtomicFunc().
We can also kill the icky InsertGlobal() and TypeDeclOf() helpers.
Bug: tint:993
Change-Id: I60972bc13a2fa819a163ee2671f61e82d0e68d2a
Reviewed-on: https://dawn-review.googlesource.com/c/tint/+/58222
Kokoro: Kokoro <noreply+kokoro@google.com>
Reviewed-by: James Price <jrprice@google.com>
Commit-Queue: Ben Clayton <bclayton@google.com>
2021-07-15 20:29:09 +00:00
|
|
|
}
|
|
|
|
|
2022-01-20 22:11:07 +00:00
|
|
|
typedef int4 tint_symbol_3_ret[4];
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol_3_ret tint_symbol_3(RWByteAddressBuffer buffer, uint offset) {
|
2022-01-20 22:11:07 +00:00
|
|
|
int4 arr_2[4] = (int4[4])0;
|
2021-07-16 19:47:44 +00:00
|
|
|
{
|
2021-11-25 18:44:50 +00:00
|
|
|
[loop] for(uint i_1 = 0u; (i_1 < 4u); i_1 = (i_1 + 1u)) {
|
2022-01-20 22:11:07 +00:00
|
|
|
arr_2[i_1] = asint(buffer.Load4((offset + (i_1 * 16u))));
|
2021-07-16 19:47:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return arr_2;
|
2021-06-16 09:19:36 +00:00
|
|
|
}
|
2021-06-16 09:19:36 +00:00
|
|
|
|
2022-01-20 22:11:07 +00:00
|
|
|
void foo(int4 src_param[4]) {
|
|
|
|
int4 src_function[4] = (int4[4])0;
|
|
|
|
const int4 tint_symbol_7[4] = {int4((1).xxxx), int4((2).xxxx), int4((3).xxxx), int4((3).xxxx)};
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol = tint_symbol_7;
|
2021-06-16 09:19:36 +00:00
|
|
|
tint_symbol = src_param;
|
|
|
|
tint_symbol = ret_arr();
|
2022-01-20 22:11:07 +00:00
|
|
|
const int4 src_let[4] = (int4[4])0;
|
2021-06-16 09:19:36 +00:00
|
|
|
tint_symbol = src_let;
|
|
|
|
tint_symbol = src_function;
|
|
|
|
tint_symbol = src_private;
|
|
|
|
tint_symbol = src_workgroup;
|
|
|
|
tint_symbol = ret_struct_arr().arr;
|
2021-07-16 19:47:44 +00:00
|
|
|
tint_symbol = tint_symbol_1(src_uniform, 0u);
|
|
|
|
tint_symbol = tint_symbol_3(src_storage, 0u);
|
2021-07-05 15:20:57 +00:00
|
|
|
int src_nested[4][3][2] = (int[4][3][2])0;
|
2021-06-16 09:19:36 +00:00
|
|
|
dst_nested = src_nested;
|
|
|
|
}
|