1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
| ; REQUIRES: asserts
; RUN: opt -mtriple=systemz-unknown -march=z13 -O3 -enable-mssa-loop-dependency -disable-output %s
; During transform to LCSSA, an access becomes obfuscated to:
; (2 = phi (phi(val), val)), which BasicAA fails to analyze.
; It's currently hard coded in BasicAA to return MayAlias for nested phis.
; This leads MemorySSA to finding a new (false) clobber for a previously
; optimized access. With verifyClobber included in verifyMemorySSA, such a
; transformation will cause MemorySSA verification to fail.
; If the verifyClobber is re-enabled, this test will crash.
target datalayout = "E-m:e-i1:8:16-i8:8:16-i64:64-f128:64-v128:64-a:8:16-n32:64"
target triple = "s390x-ibm-linux"
%0 = type <{ i64, i8, i64, i16 }>
@g_54 = external dso_local global i16, align 2
@g_101 = external dso_local global <{ i64, i8, i64, i8, i8 }>, align 2
declare dso_local void @safe_lshift_func_int16_t_s_s()
declare dso_local i8 @safe_div_func_int8_t_s_s()
define dso_local void @func_47(%0* %arg) {
bb:
%tmp = alloca i32, align 4
br label %bb1
bb1: ; preds = %bb12, %bb
%tmp2 = getelementptr inbounds %0, %0* %arg, i32 0, i32 3
store i16 undef, i16* %tmp2, align 1
%tmp3 = call signext i8 @safe_div_func_int8_t_s_s()
%tmp7 = icmp ne i8 %tmp3, 0
br i1 %tmp7, label %bb8, label %bb10
bb8: ; preds = %bb1
%tmp9 = icmp eq i32 0, 0
br i1 %tmp9, label %bb12, label %bb13
bb10: ; preds = %bb10, %bb1
call void @safe_lshift_func_int16_t_s_s()
%tmp11 = getelementptr inbounds %0, %0* %arg, i32 0, i32 3
store i16 0, i16* %tmp11, align 1
store i8 0, i8* getelementptr inbounds (%0, %0* bitcast (<{ i64, i8, i64, i8, i8 }>* @g_101 to %0*), i32 0, i32 1), align 2
br label %bb10
bb12: ; preds = %bb8
store i16 0, i16* @g_54, align 2
br label %bb1
bb13: ; preds = %bb8
ret void
}
|