int-conv-01.ll
5.52 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
; Test sign extensions from a byte to an i32.
;
; RUN: llc < %s -mtriple=s390x-linux-gnu | FileCheck %s
; Test register extension, starting with an i32.
define i32 @f1(i32 %a) {
; CHECK-LABEL: f1:
; CHECK: lbr %r2, %r2
; CHECK: br %r14
%byte = trunc i32 %a to i8
%ext = sext i8 %byte to i32
ret i32 %ext
}
; ...and again with an i64.
define i32 @f2(i64 %a) {
; CHECK-LABEL: f2:
; CHECK: lbr %r2, %r2
; CHECK: br %r14
%byte = trunc i64 %a to i8
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check LB with no displacement.
define i32 @f3(i8 *%src) {
; CHECK-LABEL: f3:
; CHECK: lb %r2, 0(%r2)
; CHECK: br %r14
%byte = load i8, i8 *%src
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check the high end of the LB range.
define i32 @f4(i8 *%src) {
; CHECK-LABEL: f4:
; CHECK: lb %r2, 524287(%r2)
; CHECK: br %r14
%ptr = getelementptr i8, i8 *%src, i64 524287
%byte = load i8, i8 *%ptr
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check the next byte up, which needs separate address logic.
; Other sequences besides this one would be OK.
define i32 @f5(i8 *%src) {
; CHECK-LABEL: f5:
; CHECK: agfi %r2, 524288
; CHECK: lb %r2, 0(%r2)
; CHECK: br %r14
%ptr = getelementptr i8, i8 *%src, i64 524288
%byte = load i8, i8 *%ptr
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check the high end of the negative LB range.
define i32 @f6(i8 *%src) {
; CHECK-LABEL: f6:
; CHECK: lb %r2, -1(%r2)
; CHECK: br %r14
%ptr = getelementptr i8, i8 *%src, i64 -1
%byte = load i8, i8 *%ptr
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check the low end of the LB range.
define i32 @f7(i8 *%src) {
; CHECK-LABEL: f7:
; CHECK: lb %r2, -524288(%r2)
; CHECK: br %r14
%ptr = getelementptr i8, i8 *%src, i64 -524288
%byte = load i8, i8 *%ptr
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check the next byte down, which needs separate address logic.
; Other sequences besides this one would be OK.
define i32 @f8(i8 *%src) {
; CHECK-LABEL: f8:
; CHECK: agfi %r2, -524289
; CHECK: lb %r2, 0(%r2)
; CHECK: br %r14
%ptr = getelementptr i8, i8 *%src, i64 -524289
%byte = load i8, i8 *%ptr
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Check that LB allows an index
define i32 @f9(i64 %src, i64 %index) {
; CHECK-LABEL: f9:
; CHECK: lb %r2, 524287(%r3,%r2)
; CHECK: br %r14
%add1 = add i64 %src, %index
%add2 = add i64 %add1, 524287
%ptr = inttoptr i64 %add2 to i8 *
%byte = load i8, i8 *%ptr
%ext = sext i8 %byte to i32
ret i32 %ext
}
; Test a case where we spill the source of at least one LBR. We want
; to use LB if possible.
define void @f10(i32 *%ptr) {
; CHECK-LABEL: f10:
; CHECK: lb {{%r[0-9]+}}, 16{{[37]}}(%r15)
; CHECK: br %r14
%val0 = load volatile i32, i32 *%ptr
%val1 = load volatile i32, i32 *%ptr
%val2 = load volatile i32, i32 *%ptr
%val3 = load volatile i32, i32 *%ptr
%val4 = load volatile i32, i32 *%ptr
%val5 = load volatile i32, i32 *%ptr
%val6 = load volatile i32, i32 *%ptr
%val7 = load volatile i32, i32 *%ptr
%val8 = load volatile i32, i32 *%ptr
%val9 = load volatile i32, i32 *%ptr
%val10 = load volatile i32, i32 *%ptr
%val11 = load volatile i32, i32 *%ptr
%val12 = load volatile i32, i32 *%ptr
%val13 = load volatile i32, i32 *%ptr
%val14 = load volatile i32, i32 *%ptr
%val15 = load volatile i32, i32 *%ptr
%trunc0 = trunc i32 %val0 to i8
%trunc1 = trunc i32 %val1 to i8
%trunc2 = trunc i32 %val2 to i8
%trunc3 = trunc i32 %val3 to i8
%trunc4 = trunc i32 %val4 to i8
%trunc5 = trunc i32 %val5 to i8
%trunc6 = trunc i32 %val6 to i8
%trunc7 = trunc i32 %val7 to i8
%trunc8 = trunc i32 %val8 to i8
%trunc9 = trunc i32 %val9 to i8
%trunc10 = trunc i32 %val10 to i8
%trunc11 = trunc i32 %val11 to i8
%trunc12 = trunc i32 %val12 to i8
%trunc13 = trunc i32 %val13 to i8
%trunc14 = trunc i32 %val14 to i8
%trunc15 = trunc i32 %val15 to i8
%ext0 = sext i8 %trunc0 to i32
%ext1 = sext i8 %trunc1 to i32
%ext2 = sext i8 %trunc2 to i32
%ext3 = sext i8 %trunc3 to i32
%ext4 = sext i8 %trunc4 to i32
%ext5 = sext i8 %trunc5 to i32
%ext6 = sext i8 %trunc6 to i32
%ext7 = sext i8 %trunc7 to i32
%ext8 = sext i8 %trunc8 to i32
%ext9 = sext i8 %trunc9 to i32
%ext10 = sext i8 %trunc10 to i32
%ext11 = sext i8 %trunc11 to i32
%ext12 = sext i8 %trunc12 to i32
%ext13 = sext i8 %trunc13 to i32
%ext14 = sext i8 %trunc14 to i32
%ext15 = sext i8 %trunc15 to i32
store volatile i32 %val0, i32 *%ptr
store volatile i32 %val1, i32 *%ptr
store volatile i32 %val2, i32 *%ptr
store volatile i32 %val3, i32 *%ptr
store volatile i32 %val4, i32 *%ptr
store volatile i32 %val5, i32 *%ptr
store volatile i32 %val6, i32 *%ptr
store volatile i32 %val7, i32 *%ptr
store volatile i32 %val8, i32 *%ptr
store volatile i32 %val9, i32 *%ptr
store volatile i32 %val10, i32 *%ptr
store volatile i32 %val11, i32 *%ptr
store volatile i32 %val12, i32 *%ptr
store volatile i32 %val13, i32 *%ptr
store volatile i32 %val14, i32 *%ptr
store volatile i32 %val15, i32 *%ptr
store volatile i32 %ext0, i32 *%ptr
store volatile i32 %ext1, i32 *%ptr
store volatile i32 %ext2, i32 *%ptr
store volatile i32 %ext3, i32 *%ptr
store volatile i32 %ext4, i32 *%ptr
store volatile i32 %ext5, i32 *%ptr
store volatile i32 %ext6, i32 *%ptr
store volatile i32 %ext7, i32 *%ptr
store volatile i32 %ext8, i32 *%ptr
store volatile i32 %ext9, i32 *%ptr
store volatile i32 %ext10, i32 *%ptr
store volatile i32 %ext11, i32 *%ptr
store volatile i32 %ext12, i32 *%ptr
store volatile i32 %ext13, i32 *%ptr
store volatile i32 %ext14, i32 *%ptr
store volatile i32 %ext15, i32 *%ptr
ret void
}