1*9880d681SAndroid Build Coastguard Worker; RUN: llc -verify-machineinstrs < %s -mtriple=aarch64-none-linux-gnu -disable-post-ra | FileCheck %s 2*9880d681SAndroid Build Coastguard Worker; RUN: llc -verify-machineinstrs < %s -mtriple=aarch64-none-linux-gnu -mattr=-fp-armv8 -disable-post-ra | FileCheck --check-prefix=CHECK-NOFP %s 3*9880d681SAndroid Build Coastguard Worker 4*9880d681SAndroid Build Coastguard Worker%myStruct = type { i64 , i8, i32 } 5*9880d681SAndroid Build Coastguard Worker 6*9880d681SAndroid Build Coastguard Worker@var8 = global i8 0 7*9880d681SAndroid Build Coastguard Worker@var32 = global i32 0 8*9880d681SAndroid Build Coastguard Worker@var64 = global i64 0 9*9880d681SAndroid Build Coastguard Worker@var128 = global i128 0 10*9880d681SAndroid Build Coastguard Worker@varfloat = global float 0.0 11*9880d681SAndroid Build Coastguard Worker@vardouble = global double 0.0 12*9880d681SAndroid Build Coastguard Worker@varstruct = global %myStruct zeroinitializer 13*9880d681SAndroid Build Coastguard Worker 14*9880d681SAndroid Build Coastguard Workerdefine void @take_i8s(i8 %val1, i8 %val2) { 15*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: take_i8s: 16*9880d681SAndroid Build Coastguard Worker store i8 %val2, i8* @var8 17*9880d681SAndroid Build Coastguard Worker ; Not using w1 may be technically allowed, but it would indicate a 18*9880d681SAndroid Build Coastguard Worker ; problem in itself. 19*9880d681SAndroid Build Coastguard Worker; CHECK: strb w1, [{{x[0-9]+}}, {{#?}}:lo12:var8] 20*9880d681SAndroid Build Coastguard Worker ret void 21*9880d681SAndroid Build Coastguard Worker} 22*9880d681SAndroid Build Coastguard Worker 23*9880d681SAndroid Build Coastguard Workerdefine void @add_floats(float %val1, float %val2) { 24*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: add_floats: 25*9880d681SAndroid Build Coastguard Worker %newval = fadd float %val1, %val2 26*9880d681SAndroid Build Coastguard Worker; CHECK: fadd [[ADDRES:s[0-9]+]], s0, s1 27*9880d681SAndroid Build Coastguard Worker; CHECK-NOFP-NOT: fadd 28*9880d681SAndroid Build Coastguard Worker store float %newval, float* @varfloat 29*9880d681SAndroid Build Coastguard Worker; CHECK: str [[ADDRES]], [{{x[0-9]+}}, {{#?}}:lo12:varfloat] 30*9880d681SAndroid Build Coastguard Worker ret void 31*9880d681SAndroid Build Coastguard Worker} 32*9880d681SAndroid Build Coastguard Worker 33*9880d681SAndroid Build Coastguard Worker; byval pointers should be allocated to the stack and copied as if 34*9880d681SAndroid Build Coastguard Worker; with memcpy. 35*9880d681SAndroid Build Coastguard Workerdefine void @take_struct(%myStruct* byval %structval) { 36*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: take_struct: 37*9880d681SAndroid Build Coastguard Worker %addr0 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 2 38*9880d681SAndroid Build Coastguard Worker %addr1 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 0 39*9880d681SAndroid Build Coastguard Worker 40*9880d681SAndroid Build Coastguard Worker %val0 = load volatile i32, i32* %addr0 41*9880d681SAndroid Build Coastguard Worker ; Some weird move means x0 is used for one access 42*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG32:w[0-9]+]], [{{x[0-9]+|sp}}, #12] 43*9880d681SAndroid Build Coastguard Worker store volatile i32 %val0, i32* @var32 44*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG32]], [{{x[0-9]+}}, {{#?}}:lo12:var32] 45*9880d681SAndroid Build Coastguard Worker 46*9880d681SAndroid Build Coastguard Worker %val1 = load volatile i64, i64* %addr1 47*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG64:x[0-9]+]], [{{x[0-9]+|sp}}] 48*9880d681SAndroid Build Coastguard Worker store volatile i64 %val1, i64* @var64 49*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG64]], [{{x[0-9]+}}, {{#?}}:lo12:var64] 50*9880d681SAndroid Build Coastguard Worker 51*9880d681SAndroid Build Coastguard Worker ret void 52*9880d681SAndroid Build Coastguard Worker} 53*9880d681SAndroid Build Coastguard Worker 54*9880d681SAndroid Build Coastguard Worker; %structval should be at sp + 16 55*9880d681SAndroid Build Coastguard Workerdefine void @check_byval_align(i32* byval %ignore, %myStruct* byval align 16 %structval) { 56*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: check_byval_align: 57*9880d681SAndroid Build Coastguard Worker 58*9880d681SAndroid Build Coastguard Worker %addr0 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 2 59*9880d681SAndroid Build Coastguard Worker %addr1 = getelementptr %myStruct, %myStruct* %structval, i64 0, i32 0 60*9880d681SAndroid Build Coastguard Worker 61*9880d681SAndroid Build Coastguard Worker %val0 = load volatile i32, i32* %addr0 62*9880d681SAndroid Build Coastguard Worker ; Some weird move means x0 is used for one access 63*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG32:w[0-9]+]], [sp, #28] 64*9880d681SAndroid Build Coastguard Worker store i32 %val0, i32* @var32 65*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG32]], [{{x[0-9]+}}, {{#?}}:lo12:var32] 66*9880d681SAndroid Build Coastguard Worker 67*9880d681SAndroid Build Coastguard Worker %val1 = load volatile i64, i64* %addr1 68*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[REG64:x[0-9]+]], [sp, #16] 69*9880d681SAndroid Build Coastguard Worker store i64 %val1, i64* @var64 70*9880d681SAndroid Build Coastguard Worker; CHECK: str [[REG64]], [{{x[0-9]+}}, {{#?}}:lo12:var64] 71*9880d681SAndroid Build Coastguard Worker 72*9880d681SAndroid Build Coastguard Worker ret void 73*9880d681SAndroid Build Coastguard Worker} 74*9880d681SAndroid Build Coastguard Worker 75*9880d681SAndroid Build Coastguard Workerdefine i32 @return_int() { 76*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_int: 77*9880d681SAndroid Build Coastguard Worker %val = load i32, i32* @var32 78*9880d681SAndroid Build Coastguard Worker ret i32 %val 79*9880d681SAndroid Build Coastguard Worker; CHECK: ldr w0, [{{x[0-9]+}}, {{#?}}:lo12:var32] 80*9880d681SAndroid Build Coastguard Worker ; Make sure epilogue follows 81*9880d681SAndroid Build Coastguard Worker; CHECK-NEXT: ret 82*9880d681SAndroid Build Coastguard Worker} 83*9880d681SAndroid Build Coastguard Worker 84*9880d681SAndroid Build Coastguard Workerdefine double @return_double() { 85*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_double: 86*9880d681SAndroid Build Coastguard Worker ret double 3.14 87*9880d681SAndroid Build Coastguard Worker; CHECK: ldr d0, [{{x[0-9]+}}, {{#?}}:lo12:.LCPI 88*9880d681SAndroid Build Coastguard Worker; CHECK-NOFP-NOT: ldr d0, 89*9880d681SAndroid Build Coastguard Worker} 90*9880d681SAndroid Build Coastguard Worker 91*9880d681SAndroid Build Coastguard Worker; This is the kind of IR clang will produce for returning a struct 92*9880d681SAndroid Build Coastguard Worker; small enough to go into registers. Not all that pretty, but it 93*9880d681SAndroid Build Coastguard Worker; works. 94*9880d681SAndroid Build Coastguard Workerdefine [2 x i64] @return_struct() { 95*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_struct: 96*9880d681SAndroid Build Coastguard Worker %addr = bitcast %myStruct* @varstruct to [2 x i64]* 97*9880d681SAndroid Build Coastguard Worker %val = load [2 x i64], [2 x i64]* %addr 98*9880d681SAndroid Build Coastguard Worker ret [2 x i64] %val 99*9880d681SAndroid Build Coastguard Worker; CHECK: add x[[VARSTRUCT:[0-9]+]], {{x[0-9]+}}, :lo12:varstruct 100*9880d681SAndroid Build Coastguard Worker; CHECK: ldp x0, x1, [x[[VARSTRUCT]]] 101*9880d681SAndroid Build Coastguard Worker ; Make sure epilogue immediately follows 102*9880d681SAndroid Build Coastguard Worker; CHECK-NEXT: ret 103*9880d681SAndroid Build Coastguard Worker} 104*9880d681SAndroid Build Coastguard Worker 105*9880d681SAndroid Build Coastguard Worker; Large structs are passed by reference (storage allocated by caller 106*9880d681SAndroid Build Coastguard Worker; to preserve value semantics) in x8. Strictly this only applies to 107*9880d681SAndroid Build Coastguard Worker; structs larger than 16 bytes, but C semantics can still be provided 108*9880d681SAndroid Build Coastguard Worker; if LLVM does it to %myStruct too. So this is the simplest check 109*9880d681SAndroid Build Coastguard Workerdefine void @return_large_struct(%myStruct* sret %retval) { 110*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: return_large_struct: 111*9880d681SAndroid Build Coastguard Worker %addr0 = getelementptr %myStruct, %myStruct* %retval, i64 0, i32 0 112*9880d681SAndroid Build Coastguard Worker %addr1 = getelementptr %myStruct, %myStruct* %retval, i64 0, i32 1 113*9880d681SAndroid Build Coastguard Worker %addr2 = getelementptr %myStruct, %myStruct* %retval, i64 0, i32 2 114*9880d681SAndroid Build Coastguard Worker 115*9880d681SAndroid Build Coastguard Worker store i64 42, i64* %addr0 116*9880d681SAndroid Build Coastguard Worker store i8 2, i8* %addr1 117*9880d681SAndroid Build Coastguard Worker store i32 9, i32* %addr2 118*9880d681SAndroid Build Coastguard Worker; CHECK: str {{x[0-9]+}}, [x8] 119*9880d681SAndroid Build Coastguard Worker; CHECK: strb {{w[0-9]+}}, [x8, #8] 120*9880d681SAndroid Build Coastguard Worker; CHECK: str {{w[0-9]+}}, [x8, #12] 121*9880d681SAndroid Build Coastguard Worker 122*9880d681SAndroid Build Coastguard Worker ret void 123*9880d681SAndroid Build Coastguard Worker} 124*9880d681SAndroid Build Coastguard Worker 125*9880d681SAndroid Build Coastguard Worker; This struct is just too far along to go into registers: (only x7 is 126*9880d681SAndroid Build Coastguard Worker; available, but it needs two). Also make sure that %stacked doesn't 127*9880d681SAndroid Build Coastguard Worker; sneak into x7 behind. 128*9880d681SAndroid Build Coastguard Workerdefine i32 @struct_on_stack(i8 %var0, i16 %var1, i32 %var2, i64 %var3, i128 %var45, 129*9880d681SAndroid Build Coastguard Worker i32* %var6, %myStruct* byval %struct, i32* byval %stacked, 130*9880d681SAndroid Build Coastguard Worker double %notstacked) { 131*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: struct_on_stack: 132*9880d681SAndroid Build Coastguard Worker %addr = getelementptr %myStruct, %myStruct* %struct, i64 0, i32 0 133*9880d681SAndroid Build Coastguard Worker %val64 = load volatile i64, i64* %addr 134*9880d681SAndroid Build Coastguard Worker store volatile i64 %val64, i64* @var64 135*9880d681SAndroid Build Coastguard Worker ; Currently nothing on local stack, so struct should be at sp 136*9880d681SAndroid Build Coastguard Worker; CHECK: ldr [[VAL64:x[0-9]+]], [sp] 137*9880d681SAndroid Build Coastguard Worker; CHECK: str [[VAL64]], [{{x[0-9]+}}, {{#?}}:lo12:var64] 138*9880d681SAndroid Build Coastguard Worker 139*9880d681SAndroid Build Coastguard Worker store volatile double %notstacked, double* @vardouble 140*9880d681SAndroid Build Coastguard Worker; CHECK-NOT: ldr d0 141*9880d681SAndroid Build Coastguard Worker; CHECK: str d0, [{{x[0-9]+}}, {{#?}}:lo12:vardouble 142*9880d681SAndroid Build Coastguard Worker; CHECK-NOFP-NOT: str d0, 143*9880d681SAndroid Build Coastguard Worker 144*9880d681SAndroid Build Coastguard Worker %retval = load volatile i32, i32* %stacked 145*9880d681SAndroid Build Coastguard Worker ret i32 %retval 146*9880d681SAndroid Build Coastguard Worker; CHECK-LE: ldr w0, [sp, #16] 147*9880d681SAndroid Build Coastguard Worker} 148*9880d681SAndroid Build Coastguard Worker 149*9880d681SAndroid Build Coastguard Workerdefine void @stacked_fpu(float %var0, double %var1, float %var2, float %var3, 150*9880d681SAndroid Build Coastguard Worker float %var4, float %var5, float %var6, float %var7, 151*9880d681SAndroid Build Coastguard Worker float %var8) { 152*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: stacked_fpu: 153*9880d681SAndroid Build Coastguard Worker store float %var8, float* @varfloat 154*9880d681SAndroid Build Coastguard Worker ; Beware as above: the offset would be different on big-endian 155*9880d681SAndroid Build Coastguard Worker ; machines if the first ldr were changed to use s-registers. 156*9880d681SAndroid Build Coastguard Worker; CHECK: ldr {{[ds]}}[[VALFLOAT:[0-9]+]], [sp] 157*9880d681SAndroid Build Coastguard Worker; CHECK: str s[[VALFLOAT]], [{{x[0-9]+}}, {{#?}}:lo12:varfloat] 158*9880d681SAndroid Build Coastguard Worker 159*9880d681SAndroid Build Coastguard Worker ret void 160*9880d681SAndroid Build Coastguard Worker} 161*9880d681SAndroid Build Coastguard Worker 162*9880d681SAndroid Build Coastguard Worker; 128-bit integer types should be passed in xEVEN, xODD rather than 163*9880d681SAndroid Build Coastguard Worker; the reverse. In this case x2 and x3. Nothing should use x1. 164*9880d681SAndroid Build Coastguard Workerdefine i64 @check_i128_regalign(i32 %val0, i128 %val1, i64 %val2) { 165*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: check_i128_regalign 166*9880d681SAndroid Build Coastguard Worker store i128 %val1, i128* @var128 167*9880d681SAndroid Build Coastguard Worker; CHECK: add x[[VAR128:[0-9]+]], {{x[0-9]+}}, :lo12:var128 168*9880d681SAndroid Build Coastguard Worker; CHECK-DAG: stp x2, x3, [x[[VAR128]]] 169*9880d681SAndroid Build Coastguard Worker 170*9880d681SAndroid Build Coastguard Worker ret i64 %val2 171*9880d681SAndroid Build Coastguard Worker; CHECK: mov x0, x4 172*9880d681SAndroid Build Coastguard Worker} 173*9880d681SAndroid Build Coastguard Worker 174*9880d681SAndroid Build Coastguard Workerdefine void @check_i128_stackalign(i32 %val0, i32 %val1, i32 %val2, i32 %val3, 175*9880d681SAndroid Build Coastguard Worker i32 %val4, i32 %val5, i32 %val6, i32 %val7, 176*9880d681SAndroid Build Coastguard Worker i32 %stack1, i128 %stack2) { 177*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: check_i128_stackalign 178*9880d681SAndroid Build Coastguard Worker store i128 %stack2, i128* @var128 179*9880d681SAndroid Build Coastguard Worker ; Nothing local on stack in current codegen, so first stack is 16 away 180*9880d681SAndroid Build Coastguard Worker; CHECK-LE: add x[[REG:[0-9]+]], sp, #16 181*9880d681SAndroid Build Coastguard Worker; CHECK-LE: ldr {{x[0-9]+}}, [x[[REG]], #8] 182*9880d681SAndroid Build Coastguard Worker 183*9880d681SAndroid Build Coastguard Worker ; Important point is that we address sp+24 for second dword 184*9880d681SAndroid Build Coastguard Worker 185*9880d681SAndroid Build Coastguard Worker; CHECK: ldp {{x[0-9]+}}, {{x[0-9]+}}, [sp, #16] 186*9880d681SAndroid Build Coastguard Worker ret void 187*9880d681SAndroid Build Coastguard Worker} 188*9880d681SAndroid Build Coastguard Worker 189*9880d681SAndroid Build Coastguard Workerdeclare void @llvm.memcpy.p0i8.p0i8.i32(i8*, i8*, i32, i32, i1) 190*9880d681SAndroid Build Coastguard Worker 191*9880d681SAndroid Build Coastguard Workerdefine i32 @test_extern() { 192*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: test_extern: 193*9880d681SAndroid Build Coastguard Worker call void @llvm.memcpy.p0i8.p0i8.i32(i8* undef, i8* undef, i32 undef, i32 4, i1 0) 194*9880d681SAndroid Build Coastguard Worker; CHECK: bl memcpy 195*9880d681SAndroid Build Coastguard Worker ret i32 0 196*9880d681SAndroid Build Coastguard Worker} 197*9880d681SAndroid Build Coastguard Worker 198*9880d681SAndroid Build Coastguard Worker 199*9880d681SAndroid Build Coastguard Worker; A sub-i32 stack argument must be loaded on big endian with ldr{h,b}, not just 200*9880d681SAndroid Build Coastguard Worker; implicitly extended to a 32-bit load. 201*9880d681SAndroid Build Coastguard Workerdefine i16 @stacked_i16(i32 %val0, i32 %val1, i32 %val2, i32 %val3, 202*9880d681SAndroid Build Coastguard Worker i32 %val4, i32 %val5, i32 %val6, i32 %val7, 203*9880d681SAndroid Build Coastguard Worker i16 %stack1) { 204*9880d681SAndroid Build Coastguard Worker; CHECK-LABEL: stacked_i16 205*9880d681SAndroid Build Coastguard Worker ret i16 %stack1 206*9880d681SAndroid Build Coastguard Worker} 207