1; Test sign extensions from a byte to an i64.
2;
3; RUN: llc < %s -mtriple=s390x-linux-gnu | FileCheck %s
4
5; Test register extension, starting with an i32.
6define i64 @f1(i32 %a) {
7; CHECK-LABEL: f1:
8; CHECK: lgbr %r2, %r2
9; CHECK: br %r14
10  %byte = trunc i32 %a to i8
11  %ext = sext i8 %byte to i64
12  ret i64 %ext
13}
14
15; ...and again with an i64.
16define i64 @f2(i64 %a) {
17; CHECK-LABEL: f2:
18; CHECK: lgbr %r2, %r2
19; CHECK: br %r14
20  %byte = trunc i64 %a to i8
21  %ext = sext i8 %byte to i64
22  ret i64 %ext
23}
24
25; Check LGB with no displacement.
26define i64 @f3(i8 *%src) {
27; CHECK-LABEL: f3:
28; CHECK: lgb %r2, 0(%r2)
29; CHECK: br %r14
30  %byte = load i8 *%src
31  %ext = sext i8 %byte to i64
32  ret i64 %ext
33}
34
35; Check the high end of the LGB range.
36define i64 @f4(i8 *%src) {
37; CHECK-LABEL: f4:
38; CHECK: lgb %r2, 524287(%r2)
39; CHECK: br %r14
40  %ptr = getelementptr i8 *%src, i64 524287
41  %byte = load i8 *%ptr
42  %ext = sext i8 %byte to i64
43  ret i64 %ext
44}
45
46; Check the next byte up, which needs separate address logic.
47; Other sequences besides this one would be OK.
48define i64 @f5(i8 *%src) {
49; CHECK-LABEL: f5:
50; CHECK: agfi %r2, 524288
51; CHECK: lgb %r2, 0(%r2)
52; CHECK: br %r14
53  %ptr = getelementptr i8 *%src, i64 524288
54  %byte = load i8 *%ptr
55  %ext = sext i8 %byte to i64
56  ret i64 %ext
57}
58
59; Check the high end of the negative LGB range.
60define i64 @f6(i8 *%src) {
61; CHECK-LABEL: f6:
62; CHECK: lgb %r2, -1(%r2)
63; CHECK: br %r14
64  %ptr = getelementptr i8 *%src, i64 -1
65  %byte = load i8 *%ptr
66  %ext = sext i8 %byte to i64
67  ret i64 %ext
68}
69
70; Check the low end of the LGB range.
71define i64 @f7(i8 *%src) {
72; CHECK-LABEL: f7:
73; CHECK: lgb %r2, -524288(%r2)
74; CHECK: br %r14
75  %ptr = getelementptr i8 *%src, i64 -524288
76  %byte = load i8 *%ptr
77  %ext = sext i8 %byte to i64
78  ret i64 %ext
79}
80
81; Check the next byte down, which needs separate address logic.
82; Other sequences besides this one would be OK.
83define i64 @f8(i8 *%src) {
84; CHECK-LABEL: f8:
85; CHECK: agfi %r2, -524289
86; CHECK: lgb %r2, 0(%r2)
87; CHECK: br %r14
88  %ptr = getelementptr i8 *%src, i64 -524289
89  %byte = load i8 *%ptr
90  %ext = sext i8 %byte to i64
91  ret i64 %ext
92}
93
94; Check that LGB allows an index
95define i64 @f9(i64 %src, i64 %index) {
96; CHECK-LABEL: f9:
97; CHECK: lgb %r2, 524287(%r3,%r2)
98; CHECK: br %r14
99  %add1 = add i64 %src, %index
100  %add2 = add i64 %add1, 524287
101  %ptr = inttoptr i64 %add2 to i8 *
102  %byte = load i8 *%ptr
103  %ext = sext i8 %byte to i64
104  ret i64 %ext
105}
106
107; Test a case where we spill the source of at least one LGBR.  We want
108; to use LGB if possible.
109define void @f10(i64 *%ptr) {
110; CHECK-LABEL: f10:
111; CHECK: lgb {{%r[0-9]+}}, 167(%r15)
112; CHECK: br %r14
113  %val0 = load volatile i64 *%ptr
114  %val1 = load volatile i64 *%ptr
115  %val2 = load volatile i64 *%ptr
116  %val3 = load volatile i64 *%ptr
117  %val4 = load volatile i64 *%ptr
118  %val5 = load volatile i64 *%ptr
119  %val6 = load volatile i64 *%ptr
120  %val7 = load volatile i64 *%ptr
121  %val8 = load volatile i64 *%ptr
122  %val9 = load volatile i64 *%ptr
123  %val10 = load volatile i64 *%ptr
124  %val11 = load volatile i64 *%ptr
125  %val12 = load volatile i64 *%ptr
126  %val13 = load volatile i64 *%ptr
127  %val14 = load volatile i64 *%ptr
128  %val15 = load volatile i64 *%ptr
129
130  %trunc0 = trunc i64 %val0 to i8
131  %trunc1 = trunc i64 %val1 to i8
132  %trunc2 = trunc i64 %val2 to i8
133  %trunc3 = trunc i64 %val3 to i8
134  %trunc4 = trunc i64 %val4 to i8
135  %trunc5 = trunc i64 %val5 to i8
136  %trunc6 = trunc i64 %val6 to i8
137  %trunc7 = trunc i64 %val7 to i8
138  %trunc8 = trunc i64 %val8 to i8
139  %trunc9 = trunc i64 %val9 to i8
140  %trunc10 = trunc i64 %val10 to i8
141  %trunc11 = trunc i64 %val11 to i8
142  %trunc12 = trunc i64 %val12 to i8
143  %trunc13 = trunc i64 %val13 to i8
144  %trunc14 = trunc i64 %val14 to i8
145  %trunc15 = trunc i64 %val15 to i8
146
147  %ext0 = sext i8 %trunc0 to i64
148  %ext1 = sext i8 %trunc1 to i64
149  %ext2 = sext i8 %trunc2 to i64
150  %ext3 = sext i8 %trunc3 to i64
151  %ext4 = sext i8 %trunc4 to i64
152  %ext5 = sext i8 %trunc5 to i64
153  %ext6 = sext i8 %trunc6 to i64
154  %ext7 = sext i8 %trunc7 to i64
155  %ext8 = sext i8 %trunc8 to i64
156  %ext9 = sext i8 %trunc9 to i64
157  %ext10 = sext i8 %trunc10 to i64
158  %ext11 = sext i8 %trunc11 to i64
159  %ext12 = sext i8 %trunc12 to i64
160  %ext13 = sext i8 %trunc13 to i64
161  %ext14 = sext i8 %trunc14 to i64
162  %ext15 = sext i8 %trunc15 to i64
163
164  store volatile i64 %val0, i64 *%ptr
165  store volatile i64 %val1, i64 *%ptr
166  store volatile i64 %val2, i64 *%ptr
167  store volatile i64 %val3, i64 *%ptr
168  store volatile i64 %val4, i64 *%ptr
169  store volatile i64 %val5, i64 *%ptr
170  store volatile i64 %val6, i64 *%ptr
171  store volatile i64 %val7, i64 *%ptr
172  store volatile i64 %val8, i64 *%ptr
173  store volatile i64 %val9, i64 *%ptr
174  store volatile i64 %val10, i64 *%ptr
175  store volatile i64 %val11, i64 *%ptr
176  store volatile i64 %val12, i64 *%ptr
177  store volatile i64 %val13, i64 *%ptr
178  store volatile i64 %val14, i64 *%ptr
179  store volatile i64 %val15, i64 *%ptr
180
181  store volatile i64 %ext0, i64 *%ptr
182  store volatile i64 %ext1, i64 *%ptr
183  store volatile i64 %ext2, i64 *%ptr
184  store volatile i64 %ext3, i64 *%ptr
185  store volatile i64 %ext4, i64 *%ptr
186  store volatile i64 %ext5, i64 *%ptr
187  store volatile i64 %ext6, i64 *%ptr
188  store volatile i64 %ext7, i64 *%ptr
189  store volatile i64 %ext8, i64 *%ptr
190  store volatile i64 %ext9, i64 *%ptr
191  store volatile i64 %ext10, i64 *%ptr
192  store volatile i64 %ext11, i64 *%ptr
193  store volatile i64 %ext12, i64 *%ptr
194  store volatile i64 %ext13, i64 *%ptr
195  store volatile i64 %ext14, i64 *%ptr
196  store volatile i64 %ext15, i64 *%ptr
197
198  ret void
199}
200