blob: 643ac6ae2510f2f2a72159bcd8babb9a024a12a2 [file] [log] [blame]
Ulrich Weigand9e3577f2013-05-06 16:17:29 +00001; Test sign extensions from a byte to an i32.
2;
3; RUN: llc < %s -mtriple=s390x-linux-gnu | FileCheck %s
4
5; Test register extension, starting with an i32.
6define i32 @f1(i32 %a) {
7; CHECK: f1:
8; CHECK: lbr %r2, %r2
9; CHECk: br %r14
10 %byte = trunc i32 %a to i8
11 %ext = sext i8 %byte to i32
12 ret i32 %ext
13}
14
15; ...and again with an i64.
16define i32 @f2(i64 %a) {
17; CHECK: f2:
18; CHECK: lbr %r2, %r2
19; CHECk: br %r14
20 %byte = trunc i64 %a to i8
21 %ext = sext i8 %byte to i32
22 ret i32 %ext
23}
24
25; Check LB with no displacement.
26define i32 @f3(i8 *%src) {
27; CHECK: f3:
28; CHECK: lb %r2, 0(%r2)
29; CHECK: br %r14
30 %byte = load i8 *%src
31 %ext = sext i8 %byte to i32
32 ret i32 %ext
33}
34
35; Check the high end of the LB range.
36define i32 @f4(i8 *%src) {
37; CHECK: f4:
38; CHECK: lb %r2, 524287(%r2)
39; CHECK: br %r14
40 %ptr = getelementptr i8 *%src, i64 524287
41 %byte = load i8 *%ptr
42 %ext = sext i8 %byte to i32
43 ret i32 %ext
44}
45
46; Check the next byte up, which needs separate address logic.
47; Other sequences besides this one would be OK.
48define i32 @f5(i8 *%src) {
49; CHECK: f5:
50; CHECK: agfi %r2, 524288
51; CHECK: lb %r2, 0(%r2)
52; CHECK: br %r14
53 %ptr = getelementptr i8 *%src, i64 524288
54 %byte = load i8 *%ptr
55 %ext = sext i8 %byte to i32
56 ret i32 %ext
57}
58
59; Check the high end of the negative LB range.
60define i32 @f6(i8 *%src) {
61; CHECK: f6:
62; CHECK: lb %r2, -1(%r2)
63; CHECK: br %r14
64 %ptr = getelementptr i8 *%src, i64 -1
65 %byte = load i8 *%ptr
66 %ext = sext i8 %byte to i32
67 ret i32 %ext
68}
69
70; Check the low end of the LB range.
71define i32 @f7(i8 *%src) {
72; CHECK: f7:
73; CHECK: lb %r2, -524288(%r2)
74; CHECK: br %r14
75 %ptr = getelementptr i8 *%src, i64 -524288
76 %byte = load i8 *%ptr
77 %ext = sext i8 %byte to i32
78 ret i32 %ext
79}
80
81; Check the next byte down, which needs separate address logic.
82; Other sequences besides this one would be OK.
83define i32 @f8(i8 *%src) {
84; CHECK: f8:
85; CHECK: agfi %r2, -524289
86; CHECK: lb %r2, 0(%r2)
87; CHECK: br %r14
88 %ptr = getelementptr i8 *%src, i64 -524289
89 %byte = load i8 *%ptr
90 %ext = sext i8 %byte to i32
91 ret i32 %ext
92}
93
94; Check that LB allows an index
95define i32 @f9(i64 %src, i64 %index) {
96; CHECK: f9:
97; CHECK: lb %r2, 524287(%r3,%r2)
98; CHECK: br %r14
99 %add1 = add i64 %src, %index
100 %add2 = add i64 %add1, 524287
101 %ptr = inttoptr i64 %add2 to i8 *
102 %byte = load i8 *%ptr
103 %ext = sext i8 %byte to i32
104 ret i32 %ext
105}