1 ; When EXPENSIVE_CHECKS are enabled, the machine verifier appears between each
2 ; pass. Ignore it with 'grep -v'.
3 ; RUN: llc -mtriple=x86_64-- -O1 -debug-pass=Structure < %s -o /dev/null 2>&1 \
4 ; RUN: | grep -v 'Verify generated machine code' | FileCheck %s
5 ; RUN: llc -mtriple=x86_64-- -O2 -debug-pass=Structure < %s -o /dev/null 2>&1 \
6 ; RUN: | grep -v 'Verify generated machine code' | FileCheck %s
7 ; RUN: llc -mtriple=x86_64-- -O3 -debug-pass=Structure < %s -o /dev/null 2>&1 \
8 ; RUN: | grep -v 'Verify generated machine code' | FileCheck %s
9 ; RUN: llc -mtriple=x86_64-- -O3 -debug-pass=Structure < %s -o /dev/null 2>&1 \
10 ; RUN: | FileCheck %s --check-prefix=FPM
14 ; CHECK-LABEL: Pass Arguments:
15 ; CHECK-NEXT: Target Library Information
16 ; CHECK-NEXT: Target Pass Configuration
17 ; CHECK-NEXT: Machine Module Information
18 ; CHECK-NEXT: Target Transform Information
19 ; CHECK-NEXT: Type-Based Alias Analysis
20 ; CHECK-NEXT: Scoped NoAlias Alias Analysis
21 ; CHECK-NEXT: Assumption Cache Tracker
22 ; CHECK-NEXT: Profile summary info
23 ; CHECK-NEXT: Create Garbage Collector Module Metadata
24 ; CHECK-NEXT: Machine Branch Probability Analysis
25 ; CHECK-NEXT: Default Regalloc Eviction Advisor
26 ; CHECK-NEXT: Default Regalloc Priority Advisor
27 ; CHECK-NEXT: ModulePass Manager
28 ; CHECK-NEXT: Pre-ISel Intrinsic Lowering
29 ; CHECK-NEXT: FunctionPass Manager
30 ; CHECK-NEXT: Expand large div/rem
31 ; CHECK-NEXT: Expand large fp convert
32 ; CHECK-NEXT: Expand Atomic instructions
33 ; CHECK-NEXT: Lower AMX intrinsics
34 ; CHECK-NEXT: Lower AMX type for load/store
35 ; CHECK-NEXT: Module Verifier
36 ; CHECK-NEXT: Dominator Tree Construction
37 ; CHECK-NEXT: Basic Alias Analysis (stateless AA impl)
38 ; CHECK-NEXT: Natural Loop Information
39 ; CHECK-NEXT: Canonicalize natural loops
40 ; CHECK-NEXT: Scalar Evolution Analysis
41 ; CHECK-NEXT: Loop Pass Manager
42 ; CHECK-NEXT: Canonicalize Freeze Instructions in Loops
43 ; CHECK-NEXT: Induction Variable Users
44 ; CHECK-NEXT: Loop Strength Reduction
45 ; CHECK-NEXT: Basic Alias Analysis (stateless AA impl)
46 ; CHECK-NEXT: Function Alias Analysis Results
47 ; CHECK-NEXT: Merge contiguous icmps into a memcmp
48 ; CHECK-NEXT: Natural Loop Information
49 ; CHECK-NEXT: Lazy Branch Probability Analysis
50 ; CHECK-NEXT: Lazy Block Frequency Analysis
51 ; CHECK-NEXT: Expand memcmp() to load/stores
52 ; CHECK-NEXT: Lower Garbage Collection Instructions
53 ; CHECK-NEXT: Shadow Stack GC Lowering
54 ; CHECK-NEXT: Remove unreachable blocks from the CFG
55 ; CHECK-NEXT: Natural Loop Information
56 ; CHECK-NEXT: Post-Dominator Tree Construction
57 ; CHECK-NEXT: Branch Probability Analysis
58 ; CHECK-NEXT: Block Frequency Analysis
59 ; CHECK-NEXT: Constant Hoisting
60 ; CHECK-NEXT: Replace intrinsics with calls to vector library
61 ; CHECK-NEXT: Partially inline calls to library functions
62 ; CHECK-NEXT: Instrument function entry/exit with calls to e.g. mcount() (post inlining)
63 ; CHECK-NEXT: Scalarize Masked Memory Intrinsics
64 ; CHECK-NEXT: Expand reduction intrinsics
65 ; CHECK-NEXT: Interleaved Access Pass
66 ; CHECK-NEXT: X86 Partial Reduction
67 ; CHECK-NEXT: Expand indirectbr instructions
68 ; CHECK-NEXT: Natural Loop Information
69 ; CHECK-NEXT: CodeGen Prepare
70 ; CHECK-NEXT: Dominator Tree Construction
71 ; CHECK-NEXT: Exception handling preparation
72 ; CHECK-NEXT: Basic Alias Analysis (stateless AA impl)
73 ; CHECK-NEXT: Function Alias Analysis Results
74 ; CHECK-NEXT: ObjC ARC contraction
75 ; CHECK-NEXT: Prepare callbr
76 ; CHECK-NEXT: Safe Stack instrumentation pass
77 ; CHECK-NEXT: Insert stack protectors
78 ; CHECK-NEXT: Module Verifier
79 ; CHECK-NEXT: Basic Alias Analysis (stateless AA impl)
80 ; CHECK-NEXT: Function Alias Analysis Results
81 ; CHECK-NEXT: Natural Loop Information
82 ; CHECK-NEXT: Post-Dominator Tree Construction
83 ; CHECK-NEXT: Branch Probability Analysis
84 ; CHECK-NEXT: Assignment Tracking Analysis
85 ; CHECK-NEXT: Lazy Branch Probability Analysis
86 ; CHECK-NEXT: Lazy Block Frequency Analysis
87 ; CHECK-NEXT: X86 DAG->DAG Instruction Selection
88 ; CHECK-NEXT: MachineDominator Tree Construction
89 ; CHECK-NEXT: Local Dynamic TLS Access Clean-up
90 ; CHECK-NEXT: X86 PIC Global Base Reg Initialization
91 ; CHECK-NEXT: Argument Stack Rebase
92 ; CHECK-NEXT: Finalize ISel and expand pseudo-instructions
93 ; CHECK-NEXT: X86 Domain Reassignment Pass
94 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
95 ; CHECK-NEXT: Early Tail Duplication
96 ; CHECK-NEXT: Optimize machine instruction PHIs
97 ; CHECK-NEXT: Slot index numbering
98 ; CHECK-NEXT: Merge disjoint stack slots
99 ; CHECK-NEXT: Local Stack Slot Allocation
100 ; CHECK-NEXT: Remove dead machine instructions
101 ; CHECK-NEXT: MachineDominator Tree Construction
102 ; CHECK-NEXT: Machine Natural Loop Construction
103 ; CHECK-NEXT: Machine Trace Metrics
104 ; CHECK-NEXT: Early If-Conversion
105 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
106 ; CHECK-NEXT: Machine InstCombiner
107 ; CHECK-NEXT: X86 cmov Conversion
108 ; CHECK-NEXT: MachineDominator Tree Construction
109 ; CHECK-NEXT: Machine Natural Loop Construction
110 ; CHECK-NEXT: Machine Block Frequency Analysis
111 ; CHECK-NEXT: Early Machine Loop Invariant Code Motion
112 ; CHECK-NEXT: MachineDominator Tree Construction
113 ; CHECK-NEXT: Machine Block Frequency Analysis
114 ; CHECK-NEXT: Machine Common Subexpression Elimination
115 ; CHECK-NEXT: MachinePostDominator Tree Construction
116 ; CHECK-NEXT: Machine Cycle Info Analysis
117 ; CHECK-NEXT: Machine code sinking
118 ; CHECK-NEXT: Peephole Optimizations
119 ; CHECK-NEXT: Remove dead machine instructions
120 ; CHECK-NEXT: Live Range Shrink
121 ; CHECK-NEXT: X86 Windows Fixup Buffer Security Check
122 ; CHECK-NEXT: X86 Fixup SetCC
123 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
124 ; CHECK-NEXT: X86 LEA Optimize
125 ; CHECK-NEXT: X86 Optimize Call Frame
126 ; CHECK-NEXT: X86 Avoid Store Forwarding Block
127 ; CHECK-NEXT: X86 speculative load hardening
128 ; CHECK-NEXT: X86 EFLAGS copy lowering
129 ; CHECK-NEXT: X86 DynAlloca Expander
130 ; CHECK-NEXT: MachineDominator Tree Construction
131 ; CHECK-NEXT: Machine Natural Loop Construction
132 ; CHECK-NEXT: Tile Register Pre-configure
133 ; CHECK-NEXT: Detect Dead Lanes
134 ; CHECK-NEXT: Init Undef Pass
135 ; CHECK-NEXT: Process Implicit Definitions
136 ; CHECK-NEXT: Remove unreachable machine basic blocks
137 ; CHECK-NEXT: Live Variable Analysis
138 ; CHECK-NEXT: Eliminate PHI nodes for register allocation
139 ; CHECK-NEXT: Two-Address instruction pass
140 ; CHECK-NEXT: Slot index numbering
141 ; CHECK-NEXT: Live Interval Analysis
142 ; CHECK-NEXT: Register Coalescer
143 ; CHECK-NEXT: Rename Disconnected Subregister Components
144 ; CHECK-NEXT: Machine Instruction Scheduler
145 ; CHECK-NEXT: Machine Block Frequency Analysis
146 ; CHECK-NEXT: Debug Variable Analysis
147 ; CHECK-NEXT: Live Stack Slot Analysis
148 ; CHECK-NEXT: Virtual Register Map
149 ; CHECK-NEXT: Live Register Matrix
150 ; CHECK-NEXT: Bundle Machine CFG Edges
151 ; CHECK-NEXT: Spill Code Placement Analysis
152 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
153 ; CHECK-NEXT: Machine Optimization Remark Emitter
154 ; CHECK-NEXT: Greedy Register Allocator
155 ; CHECK-NEXT: Tile Register Configure
156 ; CHECK-NEXT: Greedy Register Allocator
157 ; CHECK-NEXT: Virtual Register Rewriter
158 ; CHECK-NEXT: Register Allocation Pass Scoring
159 ; CHECK-NEXT: Stack Slot Coloring
160 ; CHECK-NEXT: Machine Copy Propagation Pass
161 ; CHECK-NEXT: Machine Loop Invariant Code Motion
162 ; CHECK-NEXT: X86 Lower Tile Copy
163 ; CHECK-NEXT: Bundle Machine CFG Edges
164 ; CHECK-NEXT: X86 FP Stackifier
165 ; CHECK-NEXT: MachineDominator Tree Construction
166 ; CHECK-NEXT: Machine Dominance Frontier Construction
167 ; CHECK-NEXT: X86 Load Value Injection (LVI) Load Hardening
168 ; CHECK-NEXT: Remove Redundant DEBUG_VALUE analysis
169 ; CHECK-NEXT: Fixup Statepoint Caller Saved
170 ; CHECK-NEXT: PostRA Machine Sink
171 ; CHECK-NEXT: Machine Block Frequency Analysis
172 ; CHECK-NEXT: MachinePostDominator Tree Construction
173 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
174 ; CHECK-NEXT: Machine Optimization Remark Emitter
175 ; CHECK-NEXT: Shrink Wrapping analysis
176 ; CHECK-NEXT: Prologue/Epilogue Insertion & Frame Finalization
177 ; CHECK-NEXT: Machine Late Instructions Cleanup Pass
178 ; CHECK-NEXT: Control Flow Optimizer
179 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
180 ; CHECK-NEXT: Tail Duplication
181 ; CHECK-NEXT: Machine Copy Propagation Pass
182 ; CHECK-NEXT: Post-RA pseudo instruction expansion pass
183 ; CHECK-NEXT: X86 pseudo instruction expansion pass
184 ; CHECK-NEXT: Insert KCFI indirect call checks
185 ; CHECK-NEXT: MachineDominator Tree Construction
186 ; CHECK-NEXT: Machine Natural Loop Construction
187 ; CHECK-NEXT: Post RA top-down list latency scheduler
188 ; CHECK-NEXT: Analyze Machine Code For Garbage Collection
189 ; CHECK-NEXT: Machine Block Frequency Analysis
190 ; CHECK-NEXT: MachinePostDominator Tree Construction
191 ; CHECK-NEXT: Branch Probability Basic Block Placement
192 ; CHECK-NEXT: Insert fentry calls
193 ; CHECK-NEXT: Insert XRay ops
194 ; CHECK-NEXT: Implement the 'patchable-function' attribute
195 ; CHECK-NEXT: ReachingDefAnalysis
196 ; CHECK-NEXT: X86 Execution Dependency Fix
197 ; CHECK-NEXT: BreakFalseDeps
198 ; CHECK-NEXT: X86 Indirect Branch Tracking
199 ; CHECK-NEXT: X86 vzeroupper inserter
200 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
201 ; CHECK-NEXT: X86 Byte/Word Instruction Fixup
202 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
203 ; CHECK-NEXT: X86 Atom pad short functions
204 ; CHECK-NEXT: X86 LEA Fixup
205 ; CHECK-NEXT: X86 Fixup Inst Tuning
206 ; CHECK-NEXT: X86 Fixup Vector Constants
207 ; CHECK-NEXT: Compressing EVEX instrs when possible
208 ; CHECK-NEXT: X86 Discriminate Memory Operands
209 ; CHECK-NEXT: X86 Insert Cache Prefetches
210 ; CHECK-NEXT: X86 insert wait instruction
211 ; CHECK-NEXT: Contiguously Lay Out Funclets
212 ; CHECK-NEXT: Remove Loads Into Fake Uses
213 ; CHECK-NEXT: StackMap Liveness Analysis
214 ; CHECK-NEXT: Live DEBUG_VALUE analysis
215 ; CHECK-NEXT: Machine Sanitizer Binary Metadata
216 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
217 ; CHECK-NEXT: Machine Optimization Remark Emitter
218 ; CHECK-NEXT: Stack Frame Layout Analysis
219 ; CHECK-NEXT: X86 Speculative Execution Side Effect Suppression
220 ; CHECK-NEXT: X86 Indirect Thunks
221 ; CHECK-NEXT: X86 Return Thunks
222 ; CHECK-NEXT: Check CFA info and insert CFI instructions if needed
223 ; CHECK-NEXT: X86 Load Value Injection (LVI) Ret-Hardening
224 ; CHECK-NEXT: Pseudo Probe Inserter
225 ; CHECK-NEXT: Unpack machine instruction bundles
226 ; CHECK-NEXT: Lazy Machine Block Frequency Analysis
227 ; CHECK-NEXT: Machine Optimization Remark Emitter
228 ; CHECK-NEXT: X86 Assembly Printer
229 ; CHECK-NEXT: Free MachineFunction
231 ; We should only have one function pass manager.
232 ; In the past, module passes have accidentally been added into the middle of
233 ; the codegen pipeline, implicitly creating new function pass managers.
234 ; FPM: FunctionPass Manager
235 ; FPM-NOT: FunctionPass Manager