blob: cb2f3aa5166d683f3fa793160cc5fbf7c0a455bd [file] [log] [blame]
Dan Gohmana9dba962009-04-27 20:16:15 +00001; RUN: llvm-as < %s | llc --x86-asm-syntax=att | grep {cmpq \$8}
Dan Gohman87bc2f12008-06-13 21:43:41 +00002target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128"
3target triple = "x86_64-apple-darwin9"
4
Dan Gohmancb387ac2008-06-16 22:34:15 +00005; This is like change-compare-stride-trickiness-0.ll except the comparison
6; happens after the relevant use, so the comparison stride can be
7; easily changed.
8
Dan Gohmana9dba962009-04-27 20:16:15 +00009define void @foo() nounwind {
Dan Gohman87bc2f12008-06-13 21:43:41 +000010entry:
11 br label %loop
12
13loop:
14 %indvar = phi i32 [ 0, %entry ], [ %i.2.0.us1534, %loop ] ; <i32> [#uses=1]
15 %i.2.0.us1534 = add i32 %indvar, 1 ; <i32> [#uses=3]
Dan Gohman87bc2f12008-06-13 21:43:41 +000016 %tmp628.us1540 = shl i32 %i.2.0.us1534, 1 ; <i32> [#uses=1]
Dan Gohmana9dba962009-04-27 20:16:15 +000017 %tmp645646647.us1547 = sext i32 %tmp628.us1540 to i64 ; <i64> [#uses=1]
18 store i64 %tmp645646647.us1547, i64* null
Dan Gohmancb387ac2008-06-16 22:34:15 +000019 %tmp611.us1535 = icmp eq i32 %i.2.0.us1534, 4 ; <i1> [#uses=2]
Dan Gohmana9dba962009-04-27 20:16:15 +000020 %tmp623.us1538 = select i1 %tmp611.us1535, i32 6, i32 0 ; <i32> [#uses=1]
21 store i32 %tmp623.us1538, i32* null
Dan Gohman87bc2f12008-06-13 21:43:41 +000022 br i1 %tmp611.us1535, label %exit, label %loop
23
24exit:
25 ret void
26}