blob: 06e231212ed7ee06bf3ad4849ef9470dbef7e860 [file] [log] [blame]
Dan Gohmancb387ac2008-06-16 22:34:15 +00001; RUN: llvm-as < %s | llc --x86-asm-syntax=att | grep {cmpl \$8}
Dan Gohman87bc2f12008-06-13 21:43:41 +00002target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128"
3target triple = "x86_64-apple-darwin9"
4
Dan Gohmancb387ac2008-06-16 22:34:15 +00005; This is like change-compare-stride-trickiness-0.ll except the comparison
6; happens after the relevant use, so the comparison stride can be
7; easily changed.
8
Dan Gohman87bc2f12008-06-13 21:43:41 +00009define void @foo() {
10entry:
11 br label %loop
12
13loop:
14 %indvar = phi i32 [ 0, %entry ], [ %i.2.0.us1534, %loop ] ; <i32> [#uses=1]
15 %i.2.0.us1534 = add i32 %indvar, 1 ; <i32> [#uses=3]
Dan Gohman87bc2f12008-06-13 21:43:41 +000016 %tmp628.us1540 = shl i32 %i.2.0.us1534, 1 ; <i32> [#uses=1]
17 %tmp645646647.us1547 = sext i32 %tmp628.us1540 to i64 ; <i64> [#uses=0]
Dan Gohmancb387ac2008-06-16 22:34:15 +000018 %tmp611.us1535 = icmp eq i32 %i.2.0.us1534, 4 ; <i1> [#uses=2]
19 %tmp623.us1538 = select i1 %tmp611.us1535, i32 6, i32 0 ; <i32> [#uses=0]
Dan Gohman87bc2f12008-06-13 21:43:41 +000020 br i1 %tmp611.us1535, label %exit, label %loop
21
22exit:
23 ret void
24}