xref: /aosp_15_r20/external/llvm/test/CodeGen/AArch64/func-argpassing.ll (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker; RUN: llc -verify-machineinstrs < %s -mtriple=aarch64-none-linux-gnu -disable-post-ra | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker; RUN: llc -verify-machineinstrs < %s -mtriple=aarch64-none-linux-gnu -mattr=-fp-armv8 -disable-post-ra | FileCheck --check-prefix=CHECK-NOFP %s
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard Worker%myStruct = type { i64 , i8, i32 }
5*9880d681SAndroid Build Coastguard Worker
6*9880d681SAndroid Build Coastguard Worker@var8 = global i8 0
7*9880d681SAndroid Build Coastguard Worker@var32 = global i32 0
8*9880d681SAndroid Build Coastguard Worker@var64 = global i64 0
9*9880d681SAndroid Build Coastguard Worker@var128 = global i128 0
10*9880d681SAndroid Build Coastguard Worker@varfloat = global float 0.0
11*9880d681SAndroid Build Coastguard Worker@vardouble = global double 0.0
12*9880d681SAndroid Build Coastguard Worker@varstruct = global %myStruct zeroinitializer
13*9880d681SAndroid Build Coastguard Worker
14*9880d681SAndroid Build Coastguard Workerdefine void @take_i8s(i8 %val1, i8 %val2) {
15*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: take_i8s:
16*9880d681SAndroid Build Coastguard Worker    store i8 %val2, i8* @var8
17*9880d681SAndroid Build Coastguard Worker    ; Not using w1 may be technically allowed, but it would indicate a
18*9880d681SAndroid Build Coastguard Worker    ; problem in itself.
19*9880d681SAndroid Build Coastguard Worker;  CHECK: strb w1, [{{x[0-9]+}}, {{#?}}:lo12:var8]
20*9880d681SAndroid Build Coastguard Worker    ret void
21*9880d681SAndroid Build Coastguard Worker}
22*9880d681SAndroid Build Coastguard Worker
23*9880d681SAndroid Build Coastguard Workerdefine void @add_floats(float %val1, float %val2) {
24*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: add_floats:
25*9880d681SAndroid Build Coastguard Worker    %newval = fadd float %val1, %val2
26*9880d681SAndroid Build Coastguard Worker; CHECK: fadd [[ADDRES:s[0-9]+]], s0, s1
27*9880d681SAndroid Build Coastguard Worker; CHECK-NOFP-NOT: fadd
28*9880d681SAndroid Build Coastguard Worker    store float %newval, float* @varfloat
29*9880d681SAndroid Build Coastguard Worker; CHECK: str [[ADDRES]], [{{x[0-9]+}}, {{#?}}:lo12:varfloat]
30*9880d681SAndroid Build Coastguard Worker    ret void
31*9880d681SAndroid Build Coastguard Worker}
32*9880d681SAndroid Build Coastguard Worker
33*9880d681SAndroid Build Coastguard Worker; byval pointers should be allocated to the stack and copied as if
34*9880d681SAndroid Build Coastguard Worker; with memcpy.
35*9880d681SAndroid Build Coastguard Workerdefine void @take_struct(%myStruct* byval %structval) {
36*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: take_struct:
37*9880d681SAndroid Build Coastguard Worker    %addr0 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 2
38*9880d681SAndroid Build Coastguard Worker    %addr1 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 0
39*9880d681SAndroid Build Coastguard Worker
40*9880d681SAndroid Build Coastguard Worker    %val0 = load volatile i32, i32* %addr0
41*9880d681SAndroid Build Coastguard Worker    ; Some weird move means x0 is used for one access
42*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG32:w[0-9]+]], [{{x[0-9]+|sp}}, #12]
43*9880d681SAndroid Build Coastguard Worker    store volatile i32 %val0, i32* @var32
44*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG32]], [{{x[0-9]+}}, {{#?}}:lo12:var32]
45*9880d681SAndroid Build Coastguard Worker
46*9880d681SAndroid Build Coastguard Worker    %val1 = load volatile i64, i64* %addr1
47*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG64:x[0-9]+]], [{{x[0-9]+|sp}}]
48*9880d681SAndroid Build Coastguard Worker    store volatile i64 %val1, i64* @var64
49*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG64]], [{{x[0-9]+}}, {{#?}}:lo12:var64]
50*9880d681SAndroid Build Coastguard Worker
51*9880d681SAndroid Build Coastguard Worker    ret void
52*9880d681SAndroid Build Coastguard Worker}
53*9880d681SAndroid Build Coastguard Worker
54*9880d681SAndroid Build Coastguard Worker; %structval should be at sp + 16
55*9880d681SAndroid Build Coastguard Workerdefine void @check_byval_align(i32* byval %ignore, %myStruct* byval align 16 %structval) {
56*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: check_byval_align:
57*9880d681SAndroid Build Coastguard Worker
58*9880d681SAndroid Build Coastguard Worker    %addr0 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 2
59*9880d681SAndroid Build Coastguard Worker    %addr1 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 0
60*9880d681SAndroid Build Coastguard Worker
61*9880d681SAndroid Build Coastguard Worker    %val0 = load volatile i32, i32* %addr0
62*9880d681SAndroid Build Coastguard Worker    ; Some weird move means x0 is used for one access
63*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG32:w[0-9]+]], [sp, #28]
64*9880d681SAndroid Build Coastguard Worker    store i32 %val0, i32* @var32
65*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG32]], [{{x[0-9]+}}, {{#?}}:lo12:var32]
66*9880d681SAndroid Build Coastguard Worker
67*9880d681SAndroid Build Coastguard Worker    %val1 = load volatile i64, i64* %addr1
68*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG64:x[0-9]+]], [sp, #16]
69*9880d681SAndroid Build Coastguard Worker    store i64 %val1, i64* @var64
70*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG64]], [{{x[0-9]+}}, {{#?}}:lo12:var64]
71*9880d681SAndroid Build Coastguard Worker
72*9880d681SAndroid Build Coastguard Worker    ret void
73*9880d681SAndroid Build Coastguard Worker}
74*9880d681SAndroid Build Coastguard Worker
75*9880d681SAndroid Build Coastguard Workerdefine i32 @return_int() {
76*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_int:
77*9880d681SAndroid Build Coastguard Worker    %val = load i32, i32* @var32
78*9880d681SAndroid Build Coastguard Worker    ret i32 %val
79*9880d681SAndroid Build Coastguard Worker; CHECK: ldr w0, [{{x[0-9]+}}, {{#?}}:lo12:var32]
80*9880d681SAndroid Build Coastguard Worker    ; Make sure epilogue follows
81*9880d681SAndroid Build Coastguard Worker; CHECK-NEXT: ret
82*9880d681SAndroid Build Coastguard Worker}
83*9880d681SAndroid Build Coastguard Worker
84*9880d681SAndroid Build Coastguard Workerdefine double @return_double() {
85*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_double:
86*9880d681SAndroid Build Coastguard Worker    ret double 3.14
87*9880d681SAndroid Build Coastguard Worker; CHECK: ldr d0, [{{x[0-9]+}}, {{#?}}:lo12:.LCPI
88*9880d681SAndroid Build Coastguard Worker; CHECK-NOFP-NOT: ldr d0,
89*9880d681SAndroid Build Coastguard Worker}
90*9880d681SAndroid Build Coastguard Worker
91*9880d681SAndroid Build Coastguard Worker; This is the kind of IR clang will produce for returning a struct
92*9880d681SAndroid Build Coastguard Worker; small enough to go into registers. Not all that pretty, but it
93*9880d681SAndroid Build Coastguard Worker; works.
94*9880d681SAndroid Build Coastguard Workerdefine [2 x i64] @return_struct() {
95*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_struct:
96*9880d681SAndroid Build Coastguard Worker    %addr = bitcast %myStruct* @varstruct to [2 x i64]*
97*9880d681SAndroid Build Coastguard Worker    %val = load [2 x i64], [2 x i64]* %addr
98*9880d681SAndroid Build Coastguard Worker    ret [2 x i64] %val
99*9880d681SAndroid Build Coastguard Worker; CHECK: add x[[VARSTRUCT:[0-9]+]], {{x[0-9]+}}, :lo12:varstruct
100*9880d681SAndroid Build Coastguard Worker; CHECK: ldp x0, x1, [x[[VARSTRUCT]]]
101*9880d681SAndroid Build Coastguard Worker    ; Make sure epilogue immediately follows
102*9880d681SAndroid Build Coastguard Worker; CHECK-NEXT: ret
103*9880d681SAndroid Build Coastguard Worker}
104*9880d681SAndroid Build Coastguard Worker
105*9880d681SAndroid Build Coastguard Worker; Large structs are passed by reference (storage allocated by caller
106*9880d681SAndroid Build Coastguard Worker; to preserve value semantics) in x8. Strictly this only applies to
107*9880d681SAndroid Build Coastguard Worker; structs larger than 16 bytes, but C semantics can still be provided
108*9880d681SAndroid Build Coastguard Worker; if LLVM does it to %myStruct too. So this is the simplest check
109*9880d681SAndroid Build Coastguard Workerdefine void @return_large_struct(%myStruct* sret %retval) {
110*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_large_struct:
111*9880d681SAndroid Build Coastguard Worker    %addr0 = getelementptr %myStruct, %myStruct* %retval, i64 0, i32 0
112*9880d681SAndroid Build Coastguard Worker    %addr1 = getelementptr %myStruct, %myStruct* %retval, i64 0, i32 1
113*9880d681SAndroid Build Coastguard Worker    %addr2 = getelementptr %myStruct, %myStruct* %retval, i64 0, i32 2
114*9880d681SAndroid Build Coastguard Worker
115*9880d681SAndroid Build Coastguard Worker    store i64 42, i64* %addr0
116*9880d681SAndroid Build Coastguard Worker    store i8 2, i8* %addr1
117*9880d681SAndroid Build Coastguard Worker    store i32 9, i32* %addr2
118*9880d681SAndroid Build Coastguard Worker; CHECK: str {{x[0-9]+}}, [x8]
119*9880d681SAndroid Build Coastguard Worker; CHECK: strb {{w[0-9]+}}, [x8, #8]
120*9880d681SAndroid Build Coastguard Worker; CHECK: str {{w[0-9]+}}, [x8, #12]
121*9880d681SAndroid Build Coastguard Worker
122*9880d681SAndroid Build Coastguard Worker    ret void
123*9880d681SAndroid Build Coastguard Worker}
124*9880d681SAndroid Build Coastguard Worker
125*9880d681SAndroid Build Coastguard Worker; This struct is just too far along to go into registers: (only x7 is
126*9880d681SAndroid Build Coastguard Worker; available, but it needs two). Also make sure that %stacked doesn't
127*9880d681SAndroid Build Coastguard Worker; sneak into x7 behind.
128*9880d681SAndroid Build Coastguard Workerdefine i32 @struct_on_stack(i8 %var0, i16 %var1, i32 %var2, i64 %var3, i128 %var45,
129*9880d681SAndroid Build Coastguard Worker                          i32* %var6, %myStruct* byval %struct, i32* byval %stacked,
130*9880d681SAndroid Build Coastguard Worker                          double %notstacked) {
131*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: struct_on_stack:
132*9880d681SAndroid Build Coastguard Worker    %addr = getelementptr %myStruct, %myStruct* %struct, i64 0, i32 0
133*9880d681SAndroid Build Coastguard Worker    %val64 = load volatile i64, i64* %addr
134*9880d681SAndroid Build Coastguard Worker    store volatile i64 %val64, i64* @var64
135*9880d681SAndroid Build Coastguard Worker    ; Currently nothing on local stack, so struct should be at sp
136*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[VAL64:x[0-9]+]], [sp]
137*9880d681SAndroid Build Coastguard Worker; CHECK: str [[VAL64]], [{{x[0-9]+}}, {{#?}}:lo12:var64]
138*9880d681SAndroid Build Coastguard Worker
139*9880d681SAndroid Build Coastguard Worker    store volatile double %notstacked, double* @vardouble
140*9880d681SAndroid Build Coastguard Worker; CHECK-NOT: ldr d0
141*9880d681SAndroid Build Coastguard Worker; CHECK: str d0, [{{x[0-9]+}}, {{#?}}:lo12:vardouble
142*9880d681SAndroid Build Coastguard Worker; CHECK-NOFP-NOT: str d0,
143*9880d681SAndroid Build Coastguard Worker
144*9880d681SAndroid Build Coastguard Worker    %retval = load volatile i32, i32* %stacked
145*9880d681SAndroid Build Coastguard Worker    ret i32 %retval
146*9880d681SAndroid Build Coastguard Worker; CHECK-LE: ldr w0, [sp, #16]
147*9880d681SAndroid Build Coastguard Worker}
148*9880d681SAndroid Build Coastguard Worker
149*9880d681SAndroid Build Coastguard Workerdefine void @stacked_fpu(float %var0, double %var1, float %var2, float %var3,
150*9880d681SAndroid Build Coastguard Worker                         float %var4, float %var5, float %var6, float %var7,
151*9880d681SAndroid Build Coastguard Worker                         float %var8) {
152*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: stacked_fpu:
153*9880d681SAndroid Build Coastguard Worker    store float %var8, float* @varfloat
154*9880d681SAndroid Build Coastguard Worker    ; Beware as above: the offset would be different on big-endian
155*9880d681SAndroid Build Coastguard Worker    ; machines if the first ldr were changed to use s-registers.
156*9880d681SAndroid Build Coastguard Worker; CHECK: ldr {{[ds]}}[[VALFLOAT:[0-9]+]], [sp]
157*9880d681SAndroid Build Coastguard Worker; CHECK: str s[[VALFLOAT]], [{{x[0-9]+}}, {{#?}}:lo12:varfloat]
158*9880d681SAndroid Build Coastguard Worker
159*9880d681SAndroid Build Coastguard Worker    ret void
160*9880d681SAndroid Build Coastguard Worker}
161*9880d681SAndroid Build Coastguard Worker
162*9880d681SAndroid Build Coastguard Worker; 128-bit integer types should be passed in xEVEN, xODD rather than
163*9880d681SAndroid Build Coastguard Worker; the reverse. In this case x2 and x3. Nothing should use x1.
164*9880d681SAndroid Build Coastguard Workerdefine i64 @check_i128_regalign(i32 %val0, i128 %val1, i64 %val2) {
165*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: check_i128_regalign
166*9880d681SAndroid Build Coastguard Worker    store i128 %val1, i128* @var128
167*9880d681SAndroid Build Coastguard Worker; CHECK: add x[[VAR128:[0-9]+]], {{x[0-9]+}}, :lo12:var128
168*9880d681SAndroid Build Coastguard Worker; CHECK-DAG: stp x2, x3, [x[[VAR128]]]
169*9880d681SAndroid Build Coastguard Worker
170*9880d681SAndroid Build Coastguard Worker    ret i64 %val2
171*9880d681SAndroid Build Coastguard Worker; CHECK: mov x0, x4
172*9880d681SAndroid Build Coastguard Worker}
173*9880d681SAndroid Build Coastguard Worker
174*9880d681SAndroid Build Coastguard Workerdefine void @check_i128_stackalign(i32 %val0, i32 %val1, i32 %val2, i32 %val3,
175*9880d681SAndroid Build Coastguard Worker                                   i32 %val4, i32 %val5, i32 %val6, i32 %val7,
176*9880d681SAndroid Build Coastguard Worker                                   i32 %stack1, i128 %stack2) {
177*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: check_i128_stackalign
178*9880d681SAndroid Build Coastguard Worker    store i128 %stack2, i128* @var128
179*9880d681SAndroid Build Coastguard Worker    ; Nothing local on stack in current codegen, so first stack is 16 away
180*9880d681SAndroid Build Coastguard Worker; CHECK-LE: add     x[[REG:[0-9]+]], sp, #16
181*9880d681SAndroid Build Coastguard Worker; CHECK-LE: ldr {{x[0-9]+}}, [x[[REG]], #8]
182*9880d681SAndroid Build Coastguard Worker
183*9880d681SAndroid Build Coastguard Worker    ; Important point is that we address sp+24 for second dword
184*9880d681SAndroid Build Coastguard Worker
185*9880d681SAndroid Build Coastguard Worker; CHECK: ldp {{x[0-9]+}}, {{x[0-9]+}}, [sp, #16]
186*9880d681SAndroid Build Coastguard Worker    ret void
187*9880d681SAndroid Build Coastguard Worker}
188*9880d681SAndroid Build Coastguard Worker
189*9880d681SAndroid Build Coastguard Workerdeclare void @llvm.memcpy.p0i8.p0i8.i32(i8*, i8*, i32, i32, i1)
190*9880d681SAndroid Build Coastguard Worker
191*9880d681SAndroid Build Coastguard Workerdefine i32 @test_extern() {
192*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: test_extern:
193*9880d681SAndroid Build Coastguard Worker  call void @llvm.memcpy.p0i8.p0i8.i32(i8* undef, i8* undef, i32 undef, i32 4, i1 0)
194*9880d681SAndroid Build Coastguard Worker; CHECK: bl memcpy
195*9880d681SAndroid Build Coastguard Worker  ret i32 0
196*9880d681SAndroid Build Coastguard Worker}
197*9880d681SAndroid Build Coastguard Worker
198*9880d681SAndroid Build Coastguard Worker
199*9880d681SAndroid Build Coastguard Worker; A sub-i32 stack argument must be loaded on big endian with ldr{h,b}, not just
200*9880d681SAndroid Build Coastguard Worker; implicitly extended to a 32-bit load.
201*9880d681SAndroid Build Coastguard Workerdefine i16 @stacked_i16(i32 %val0, i32 %val1, i32 %val2, i32 %val3,
202*9880d681SAndroid Build Coastguard Worker                        i32 %val4, i32 %val5, i32 %val6, i32 %val7,
203*9880d681SAndroid Build Coastguard Worker                        i16 %stack1) {
204*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: stacked_i16
205*9880d681SAndroid Build Coastguard Worker  ret i16 %stack1
206*9880d681SAndroid Build Coastguard Worker}
207