blob: 5e989e4737e83aea0a455c9a435fdbdf15ba89df [file] [log] [blame]
Ulrich Weigand9e3577f2013-05-06 16:17:29 +00001; Test sign extensions from a halfword to an i64.
2;
3; RUN: llc < %s -mtriple=s390x-linux-gnu | FileCheck %s
4
5; Test register extension, starting with an i32.
6define i64 @f1(i64 %a) {
Stephen Lind24ab202013-07-14 06:24:09 +00007; CHECK-LABEL: f1:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +00008; CHECK: lghr %r2, %r2
Richard Sandifordec8693d2013-06-27 09:49:34 +00009; CHECK: br %r14
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000010 %half = trunc i64 %a to i16
11 %ext = sext i16 %half to i64
12 ret i64 %ext
13}
14
15; ...and again with an i64.
16define i64 @f2(i32 %a) {
Stephen Lind24ab202013-07-14 06:24:09 +000017; CHECK-LABEL: f2:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000018; CHECK: lghr %r2, %r2
Richard Sandifordec8693d2013-06-27 09:49:34 +000019; CHECK: br %r14
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000020 %half = trunc i32 %a to i16
21 %ext = sext i16 %half to i64
22 ret i64 %ext
23}
24
25; Check LGH with no displacement.
26define i64 @f3(i16 *%src) {
Stephen Lind24ab202013-07-14 06:24:09 +000027; CHECK-LABEL: f3:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000028; CHECK: lgh %r2, 0(%r2)
29; CHECK: br %r14
David Blaikiea79ac142015-02-27 21:17:42 +000030 %half = load i16 , i16 *%src
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000031 %ext = sext i16 %half to i64
32 ret i64 %ext
33}
34
35; Check the high end of the LGH range.
36define i64 @f4(i16 *%src) {
Stephen Lind24ab202013-07-14 06:24:09 +000037; CHECK-LABEL: f4:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000038; CHECK: lgh %r2, 524286(%r2)
39; CHECK: br %r14
David Blaikie79e6c742015-02-27 19:29:02 +000040 %ptr = getelementptr i16, i16 *%src, i64 262143
David Blaikiea79ac142015-02-27 21:17:42 +000041 %half = load i16 , i16 *%ptr
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000042 %ext = sext i16 %half to i64
43 ret i64 %ext
44}
45
46; Check the next halfword up, which needs separate address logic.
47; Other sequences besides this one would be OK.
48define i64 @f5(i16 *%src) {
Stephen Lind24ab202013-07-14 06:24:09 +000049; CHECK-LABEL: f5:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000050; CHECK: agfi %r2, 524288
51; CHECK: lgh %r2, 0(%r2)
52; CHECK: br %r14
David Blaikie79e6c742015-02-27 19:29:02 +000053 %ptr = getelementptr i16, i16 *%src, i64 262144
David Blaikiea79ac142015-02-27 21:17:42 +000054 %half = load i16 , i16 *%ptr
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000055 %ext = sext i16 %half to i64
56 ret i64 %ext
57}
58
59; Check the high end of the negative LGH range.
60define i64 @f6(i16 *%src) {
Stephen Lind24ab202013-07-14 06:24:09 +000061; CHECK-LABEL: f6:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000062; CHECK: lgh %r2, -2(%r2)
63; CHECK: br %r14
David Blaikie79e6c742015-02-27 19:29:02 +000064 %ptr = getelementptr i16, i16 *%src, i64 -1
David Blaikiea79ac142015-02-27 21:17:42 +000065 %half = load i16 , i16 *%ptr
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000066 %ext = sext i16 %half to i64
67 ret i64 %ext
68}
69
70; Check the low end of the LGH range.
71define i64 @f7(i16 *%src) {
Stephen Lind24ab202013-07-14 06:24:09 +000072; CHECK-LABEL: f7:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000073; CHECK: lgh %r2, -524288(%r2)
74; CHECK: br %r14
David Blaikie79e6c742015-02-27 19:29:02 +000075 %ptr = getelementptr i16, i16 *%src, i64 -262144
David Blaikiea79ac142015-02-27 21:17:42 +000076 %half = load i16 , i16 *%ptr
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000077 %ext = sext i16 %half to i64
78 ret i64 %ext
79}
80
81; Check the next halfword down, which needs separate address logic.
82; Other sequences besides this one would be OK.
83define i64 @f8(i16 *%src) {
Stephen Lind24ab202013-07-14 06:24:09 +000084; CHECK-LABEL: f8:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000085; CHECK: agfi %r2, -524290
86; CHECK: lgh %r2, 0(%r2)
87; CHECK: br %r14
David Blaikie79e6c742015-02-27 19:29:02 +000088 %ptr = getelementptr i16, i16 *%src, i64 -262145
David Blaikiea79ac142015-02-27 21:17:42 +000089 %half = load i16 , i16 *%ptr
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000090 %ext = sext i16 %half to i64
91 ret i64 %ext
92}
93
94; Check that LGH allows an index.
95define i64 @f9(i64 %src, i64 %index) {
Stephen Lind24ab202013-07-14 06:24:09 +000096; CHECK-LABEL: f9:
Ulrich Weigand9e3577f2013-05-06 16:17:29 +000097; CHECK: lgh %r2, 524287(%r3,%r2)
98; CHECK: br %r14
99 %add1 = add i64 %src, %index
100 %add2 = add i64 %add1, 524287
101 %ptr = inttoptr i64 %add2 to i16 *
David Blaikiea79ac142015-02-27 21:17:42 +0000102 %half = load i16 , i16 *%ptr
Ulrich Weigand9e3577f2013-05-06 16:17:29 +0000103 %ext = sext i16 %half to i64
104 ret i64 %ext
105}
Richard Sandiforded1fab62013-07-03 10:10:02 +0000106
107; Test a case where we spill the source of at least one LGHR. We want
108; to use LGH if possible.
109define void @f10(i64 *%ptr) {
Stephen Lind24ab202013-07-14 06:24:09 +0000110; CHECK-LABEL: f10:
Richard Sandiforded1fab62013-07-03 10:10:02 +0000111; CHECK: lgh {{%r[0-9]+}}, 166(%r15)
112; CHECK: br %r14
David Blaikiea79ac142015-02-27 21:17:42 +0000113 %val0 = load volatile i64 , i64 *%ptr
114 %val1 = load volatile i64 , i64 *%ptr
115 %val2 = load volatile i64 , i64 *%ptr
116 %val3 = load volatile i64 , i64 *%ptr
117 %val4 = load volatile i64 , i64 *%ptr
118 %val5 = load volatile i64 , i64 *%ptr
119 %val6 = load volatile i64 , i64 *%ptr
120 %val7 = load volatile i64 , i64 *%ptr
121 %val8 = load volatile i64 , i64 *%ptr
122 %val9 = load volatile i64 , i64 *%ptr
123 %val10 = load volatile i64 , i64 *%ptr
124 %val11 = load volatile i64 , i64 *%ptr
125 %val12 = load volatile i64 , i64 *%ptr
126 %val13 = load volatile i64 , i64 *%ptr
127 %val14 = load volatile i64 , i64 *%ptr
128 %val15 = load volatile i64 , i64 *%ptr
Richard Sandiforded1fab62013-07-03 10:10:02 +0000129
130 %trunc0 = trunc i64 %val0 to i16
131 %trunc1 = trunc i64 %val1 to i16
132 %trunc2 = trunc i64 %val2 to i16
133 %trunc3 = trunc i64 %val3 to i16
134 %trunc4 = trunc i64 %val4 to i16
135 %trunc5 = trunc i64 %val5 to i16
136 %trunc6 = trunc i64 %val6 to i16
137 %trunc7 = trunc i64 %val7 to i16
138 %trunc8 = trunc i64 %val8 to i16
139 %trunc9 = trunc i64 %val9 to i16
140 %trunc10 = trunc i64 %val10 to i16
141 %trunc11 = trunc i64 %val11 to i16
142 %trunc12 = trunc i64 %val12 to i16
143 %trunc13 = trunc i64 %val13 to i16
144 %trunc14 = trunc i64 %val14 to i16
145 %trunc15 = trunc i64 %val15 to i16
146
147 %ext0 = sext i16 %trunc0 to i64
148 %ext1 = sext i16 %trunc1 to i64
149 %ext2 = sext i16 %trunc2 to i64
150 %ext3 = sext i16 %trunc3 to i64
151 %ext4 = sext i16 %trunc4 to i64
152 %ext5 = sext i16 %trunc5 to i64
153 %ext6 = sext i16 %trunc6 to i64
154 %ext7 = sext i16 %trunc7 to i64
155 %ext8 = sext i16 %trunc8 to i64
156 %ext9 = sext i16 %trunc9 to i64
157 %ext10 = sext i16 %trunc10 to i64
158 %ext11 = sext i16 %trunc11 to i64
159 %ext12 = sext i16 %trunc12 to i64
160 %ext13 = sext i16 %trunc13 to i64
161 %ext14 = sext i16 %trunc14 to i64
162 %ext15 = sext i16 %trunc15 to i64
163
164 store volatile i64 %val0, i64 *%ptr
165 store volatile i64 %val1, i64 *%ptr
166 store volatile i64 %val2, i64 *%ptr
167 store volatile i64 %val3, i64 *%ptr
168 store volatile i64 %val4, i64 *%ptr
169 store volatile i64 %val5, i64 *%ptr
170 store volatile i64 %val6, i64 *%ptr
171 store volatile i64 %val7, i64 *%ptr
172 store volatile i64 %val8, i64 *%ptr
173 store volatile i64 %val9, i64 *%ptr
174 store volatile i64 %val10, i64 *%ptr
175 store volatile i64 %val11, i64 *%ptr
176 store volatile i64 %val12, i64 *%ptr
177 store volatile i64 %val13, i64 *%ptr
178 store volatile i64 %val14, i64 *%ptr
179 store volatile i64 %val15, i64 *%ptr
180
181 store volatile i64 %ext0, i64 *%ptr
182 store volatile i64 %ext1, i64 *%ptr
183 store volatile i64 %ext2, i64 *%ptr
184 store volatile i64 %ext3, i64 *%ptr
185 store volatile i64 %ext4, i64 *%ptr
186 store volatile i64 %ext5, i64 *%ptr
187 store volatile i64 %ext6, i64 *%ptr
188 store volatile i64 %ext7, i64 *%ptr
189 store volatile i64 %ext8, i64 *%ptr
190 store volatile i64 %ext9, i64 *%ptr
191 store volatile i64 %ext10, i64 *%ptr
192 store volatile i64 %ext11, i64 *%ptr
193 store volatile i64 %ext12, i64 *%ptr
194 store volatile i64 %ext13, i64 *%ptr
195 store volatile i64 %ext14, i64 *%ptr
196 store volatile i64 %ext15, i64 *%ptr
197
198 ret void
199}