use operands_are_normalized when permuting Not operations on Xor inputs to avoid...
[libfirm] / ir / be / bemain.c
index 5cf6d13..1159f1b 100644 (file)
 #include "iredges_t.h"
 #include "irloop_t.h"
 #include "irtools.h"
-#include "irvrfy.h"
+#include "irverify.h"
 #include "irprintf.h"
 #include "iroptimize.h"
 #include "firmstat.h"
 #include "execfreq.h"
 #include "irprofile.h"
+#include "irpass_t.h"
 
 #include "bearch.h"
 #include "be_t.h"
@@ -88,7 +89,7 @@ static be_options_t be_options = {
        0,                                 /* try to omit leaf frame pointer */
        0,                                 /* create PIC code */
        0,                                 /* create gprof compatible profiling code */
-       BE_VRFY_WARN,                      /* verification level: warn */
+       BE_VERIFY_WARN,                    /* verification level: warn */
        BE_SCHED_LIST,                     /* scheduler: list scheduler */
        "linux",                           /* target OS name */
        "i44pc52.info.uni-karlsruhe.de",   /* ilp server */
@@ -118,10 +119,10 @@ static const lc_opt_enum_mask_items_t dump_items[] = {
 };
 
 /* verify options. */
-static const lc_opt_enum_int_items_t vrfy_items[] = {
-       { "off",    BE_VRFY_OFF    },
-       { "warn",   BE_VRFY_WARN   },
-       { "assert", BE_VRFY_ASSERT },
+static const lc_opt_enum_int_items_t verify_items[] = {
+       { "off",    BE_VERIFY_OFF    },
+       { "warn",   BE_VERIFY_WARN   },
+       { "assert", BE_VERIFY_ASSERT },
        { NULL,     0 }
 };
 
@@ -138,8 +139,8 @@ static lc_opt_enum_mask_var_t dump_var = {
        &be_options.dump_flags, dump_items
 };
 
-static lc_opt_enum_int_var_t vrfy_var = {
-       &be_options.vrfy_option, vrfy_items
+static lc_opt_enum_int_var_t verify_var = {
+       &be_options.verify_option, verify_items
 };
 
 static lc_opt_enum_int_var_t sched_var = {
@@ -153,7 +154,7 @@ static const lc_opt_table_entry_t be_main_options[] = {
        LC_OPT_ENT_BOOL     ("omitleaffp", "omit frame pointer in leaf routines",                 &be_options.omit_leaf_fp),
        LC_OPT_ENT_BOOL     ("pic",        "create PIC code",                                     &be_options.pic),
        LC_OPT_ENT_BOOL     ("gprof",      "create gprof profiling code",                         &be_options.gprof),
-       LC_OPT_ENT_ENUM_PTR ("verify",     "verify the backend irg",                              &vrfy_var),
+       LC_OPT_ENT_ENUM_PTR ("verify",     "verify the backend irg",                              &verify_var),
        LC_OPT_ENT_BOOL     ("time",       "get backend timing statistics",                       &be_options.timing),
        LC_OPT_ENT_BOOL     ("profile",    "instrument the code for execution count profiling",   &be_options.opt_profile),
        LC_OPT_ENT_ENUM_PTR ("sched",      "select a scheduler",                                  &sched_var),
@@ -341,11 +342,9 @@ int be_parse_arg(const char *arg)
 
 /** The be parameters returned by default, all off. */
 static const backend_params be_params = {
-       0,    /* need dword lowering */
        0,    /* don't support inline assembler yet */
+       NULL, /* no lowering required */
        NULL, /* will be set later */
-       NULL, /* but yet no creator function */
-       NULL, /* context for create_intrinsic_fkt */
        NULL, /* no if conversion settings */
        NULL, /* no float arithmetic mode */
        0,    /* no trampoline support: size 0 */
@@ -355,11 +354,11 @@ static const backend_params be_params = {
 };
 
 /* Perform schedule verification if requested. */
-static void be_sched_vrfy(ir_graph *irg, int vrfy_opt)
+static void be_sched_verify(ir_graph *irg, int verify_opt)
 {
-       if (vrfy_opt == BE_VRFY_WARN) {
+       if (verify_opt == BE_VERIFY_WARN) {
                be_verify_schedule(irg);
-       } else if (vrfy_opt == BE_VRFY_ASSERT) {
+       } else if (verify_opt == BE_VERIFY_ASSERT) {
                assert(be_verify_schedule(irg) && "Schedule verification failed.");
        }
 }
@@ -445,6 +444,9 @@ static void dump(int mask, ir_graph *irg, const char *suffix)
  */
 static void initialize_birg(be_irg_t *birg, ir_graph *irg, be_main_env_t *env)
 {
+       /* don't duplicate locals in backend when dumping... */
+       ir_remove_dump_flags(ir_dump_flag_consts_local);
+
        dump(DUMP_INITIAL, irg, "begin");
 
        irg->be_data = birg;
@@ -613,11 +615,11 @@ static void be_main_loop(FILE *file_handle, const char *cup_name)
 
                /* Verify the initial graph */
                be_timer_push(T_VERIFY);
-               if (be_options.vrfy_option == BE_VRFY_WARN) {
-                       irg_verify(irg, VRFY_ENFORCE_SSA);
+               if (be_options.verify_option == BE_VERIFY_WARN) {
+                       irg_verify(irg, VERIFY_ENFORCE_SSA);
                        be_check_dominance(irg);
-               } else if (be_options.vrfy_option == BE_VRFY_ASSERT) {
-                       assert(irg_verify(irg, VRFY_ENFORCE_SSA) && "irg verification failed");
+               } else if (be_options.verify_option == BE_VERIFY_ASSERT) {
+                       assert(irg_verify(irg, VERIFY_ENFORCE_SSA) && "irg verification failed");
                        assert(be_check_dominance(irg) && "Dominance verification failed");
                }
                be_timer_pop(T_VERIFY);
@@ -629,6 +631,7 @@ static void be_main_loop(FILE *file_handle, const char *cup_name)
                birg->cg = cg_if->init(irg);
 
                /* some transformations need to be done before abi introduce */
+               assert(birg->cg->impl->before_abi == NULL || !arch_env->custom_abi);
                arch_code_generator_before_abi(birg->cg);
 
                /* implement the ABI conventions. */
@@ -636,40 +639,37 @@ static void be_main_loop(FILE *file_handle, const char *cup_name)
                be_abi_introduce(irg);
                be_timer_pop(T_ABI);
 
-               dump(DUMP_ABI, irg, "abi");
-
-               /* do local optimizations */
-               optimize_graph_df(irg);
+               if (!arch_env->custom_abi) {
+                       dump(DUMP_ABI, irg, "abi");
+               }
 
                /* we have to do cfopt+remove_critical_edges as we can't have Bad-blocks
                 * or critical edges in the backend */
                optimize_cf(irg);
                remove_critical_cf_edges(irg);
 
-               /* TODO: we often have dead code reachable through out-edges here. So for
-                * now we rebuild edges (as we need correct user count for code selection)
-                */
+               /* We often have dead code reachable through out-edges here. So for
+                * now we rebuild edges (as we need correct user count for code
+                * selection) */
                edges_deactivate(irg);
                edges_activate(irg);
 
-               dump(DUMP_PREPARED, irg, "pre_transform");
+               dump(DUMP_PREPARED, irg, "before-code-selection");
 
-               if (be_options.vrfy_option == BE_VRFY_WARN) {
+               if (be_options.verify_option == BE_VERIFY_WARN) {
                        be_check_dominance(irg);
-               } else if (be_options.vrfy_option == BE_VRFY_ASSERT) {
+               } else if (be_options.verify_option == BE_VERIFY_ASSERT) {
                        assert(be_check_dominance(irg) && "Dominance verification failed");
                }
 
-               /* generate code */
+               /* perform codeselection */
                be_timer_push(T_CODEGEN);
                arch_code_generator_prepare_graph(birg->cg);
                be_timer_pop(T_CODEGEN);
 
-               dump(DUMP_PREPARED, irg, "prepared");
-
-               if (be_options.vrfy_option == BE_VRFY_WARN) {
+               if (be_options.verify_option == BE_VERIFY_WARN) {
                        be_check_dominance(irg);
-               } else if (be_options.vrfy_option == BE_VRFY_ASSERT) {
+               } else if (be_options.verify_option == BE_VERIFY_ASSERT) {
                        assert(be_check_dominance(irg) && "Dominance verification failed");
                }
 
@@ -711,7 +711,7 @@ static void be_main_loop(FILE *file_handle, const char *cup_name)
 
                /* check schedule */
                be_timer_push(T_VERIFY);
-               be_sched_vrfy(irg, be_options.vrfy_option);
+               be_sched_verify(irg, be_options.verify_option);
                be_timer_pop(T_VERIFY);
 
                /* introduce patterns to assure constraints */
@@ -743,7 +743,7 @@ static void be_main_loop(FILE *file_handle, const char *cup_name)
 
                /* check schedule */
                be_timer_push(T_VERIFY);
-               be_sched_vrfy(irg, be_options.vrfy_option);
+               be_sched_verify(irg, be_options.verify_option);
                be_timer_pop(T_VERIFY);
 
                stat_ev_if {
@@ -789,13 +789,13 @@ static void be_main_loop(FILE *file_handle, const char *cup_name)
 
                /* check schedule and register allocation */
                be_timer_push(T_VERIFY);
-               if (be_options.vrfy_option == BE_VRFY_WARN) {
-                       irg_verify(irg, VRFY_ENFORCE_SSA);
+               if (be_options.verify_option == BE_VERIFY_WARN) {
+                       irg_verify(irg, VERIFY_ENFORCE_SSA);
                        be_check_dominance(irg);
                        be_verify_schedule(irg);
                        be_verify_register_allocation(irg);
-               } else if (be_options.vrfy_option == BE_VRFY_ASSERT) {
-                       assert(irg_verify(irg, VRFY_ENFORCE_SSA) && "irg verification failed");
+               } else if (be_options.verify_option == BE_VERIFY_ASSERT) {
+                       assert(irg_verify(irg, VERIFY_ENFORCE_SSA) && "irg verification failed");
                        assert(be_check_dominance(irg) && "Dominance verification failed");
                        assert(be_verify_schedule(irg) && "Schedule verification failed");
                        assert(be_verify_register_allocation(irg)
@@ -892,9 +892,6 @@ void be_main(FILE *file_handle, const char *cup_name)
        }
 #endif
 
-       /* never build code for pseudo irgs */
-       set_visit_pseudo_irgs(0);
-
        be_main_loop(file_handle, cup_name);
 
        if (be_options.timing == BE_TIME_ON) {
@@ -916,6 +913,23 @@ void be_main(FILE *file_handle, const char *cup_name)
 #endif
 }
 
+static int do_lower_for_target(ir_prog *irp, void *context)
+{
+       const backend_params *be_params = be_get_backend_param();
+       be_params->lower_for_target();
+       (void) context;
+       (void) irp;
+       return 0;
+}
+
+ir_prog_pass_t *lower_for_target_pass(const char *name)
+{
+       ir_prog_pass_t *pass = XMALLOCZ(ir_prog_pass_t);
+       return def_prog_pass_constructor(pass,
+                                        name ? name : "lower_for_target",
+                                        do_lower_for_target);
+}
+
 unsigned be_put_ignore_regs(const ir_graph *irg,
                             const arch_register_class_t *cls, bitset_t *bs)
 {