File: machine-basic-block-operands.mir

package info (click to toggle)
llvm-toolchain-19 1%3A19.1.7-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,998,520 kB
  • sloc: cpp: 6,951,680; ansic: 1,486,157; asm: 913,598; python: 232,024; f90: 80,126; objc: 75,281; lisp: 37,276; pascal: 16,990; sh: 10,009; ml: 5,058; perl: 4,724; awk: 3,523; makefile: 3,167; javascript: 2,504; xml: 892; fortran: 664; cs: 573
file content (73 lines) | stat: -rw-r--r-- 1,323 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
# RUN: llc -march=x86-64 -run-pass none -o - %s | FileCheck %s
# This test ensures that the MIR parser parses machine basic block operands.

--- |

  define i32 @foo(ptr %p) {
  entry:
    %a = load i32, ptr %p
    %0 = icmp sle i32 %a, 10
    br i1 %0, label %less, label %exit

  less:
    ret i32 0

  exit:
    ret i32 %a
  }

  define i32 @bar(ptr %p) {
  entry:
    %a = load i32, ptr %p
    %b = icmp sle i32 %a, 10
    br i1 %b, label %0, label %1

  ; <label>:0
    ret i32 0

  ; <label>:1
    ret i32 %a
  }

...
---
# CHECK: name: foo
name:            foo
body: |
  ; CHECK: bb.0.entry
  bb.0.entry:
    successors: %bb.1, %bb.2

    $eax = MOV32rm $rdi, 1, _, 0, _
    ; CHECK:      CMP32ri8 $eax, 10
    ; CHECK-NEXT: JCC_1 %bb.2, 15
    CMP32ri8 $eax, 10, implicit-def $eflags
    JCC_1 %bb.2, 15, implicit $eflags
  ; CHECK: bb.1.less:

  bb.1.less:
    $eax = MOV32r0 implicit-def $eflags

  bb.2.exit:
    RET64 $eax
...
---
# CHECK: name: bar
name:            bar
body: |
  ; CHECK: bb.0.entry:
  bb.0.entry:
    successors: %bb.1, %bb.3

    $eax = MOV32rm $rdi, 1, _, 0, _
    ; CHECK:      CMP32ri8 $eax, 10
    ; CHECK-NEXT: JCC_1 %bb.2, 15
    CMP32ri8 $eax, 10, implicit-def $eflags
    JCC_1 %bb.3, 15, implicit $eflags

  bb.1:
    $eax = MOV32r0 implicit-def $eflags

  bb.3:
    RET64 $eax
...