1*9880d681SAndroid Build Coastguard Worker; RUN: llc < %s -relocation-model=pic -O2 -disable-fp-elim -o - | FileCheck %s 2*9880d681SAndroid Build Coastguard Worker; RUN: llc < %s -relocation-model=pic -O2 -o - | FileCheck %s 3*9880d681SAndroid Build Coastguard Worker 4*9880d681SAndroid Build Coastguard Worker; This test runs twice with different options regarding the frame pointer: 5*9880d681SAndroid Build Coastguard Worker; first the elimination is disabled, then it is enabled. The disabled case is 6*9880d681SAndroid Build Coastguard Worker; the "control group". 7*9880d681SAndroid Build Coastguard Worker; The function 'foo' below is marked with the "no-frame-pointer-elim-non-leaf" 8*9880d681SAndroid Build Coastguard Worker; attribute which dictates that the frame pointer should not be eliminated 9*9880d681SAndroid Build Coastguard Worker; unless the function is a leaf (i.e. it doesn't call any other function). 10*9880d681SAndroid Build Coastguard Worker; Now, 'foo' is not a leaf function, because it performs a TLS access which on 11*9880d681SAndroid Build Coastguard Worker; X86 ELF in PIC mode is expanded as a library call. 12*9880d681SAndroid Build Coastguard Worker; This call is represented with a pseudo-instruction which doesn't appear to be 13*9880d681SAndroid Build Coastguard Worker; a call when inspected by the analysis passes (it doesn't have the "isCall" 14*9880d681SAndroid Build Coastguard Worker; flag), and the ISel lowering code creating the pseudo was not informing the 15*9880d681SAndroid Build Coastguard Worker; MachineFrameInfo that the function contained calls. This affected the decision 16*9880d681SAndroid Build Coastguard Worker; whether to eliminate the frame pointer. 17*9880d681SAndroid Build Coastguard Worker; With the fix, the "hasCalls" flag is set in the MFI for the function whenever 18*9880d681SAndroid Build Coastguard Worker; a TLS access pseudo-instruction is created, so 'foo' appears to be a non-leaf 19*9880d681SAndroid Build Coastguard Worker; function, and the difference in the options does not affect codegen: both 20*9880d681SAndroid Build Coastguard Worker; versions will have a frame pointer. 21*9880d681SAndroid Build Coastguard Worker 22*9880d681SAndroid Build Coastguard Worker; Test that there's some frame pointer usage in 'foo'... 23*9880d681SAndroid Build Coastguard Worker; CHECK: foo: 24*9880d681SAndroid Build Coastguard Worker; CHECK: pushq %rbp 25*9880d681SAndroid Build Coastguard Worker; CHECK: movq %rsp, %rbp 26*9880d681SAndroid Build Coastguard Worker; ... and the TLS library call is also present. 27*9880d681SAndroid Build Coastguard Worker; CHECK: leaq x@TLSGD(%rip), %rdi 28*9880d681SAndroid Build Coastguard Worker; CHECK: callq __tls_get_addr@PLT 29*9880d681SAndroid Build Coastguard Worker 30*9880d681SAndroid Build Coastguard Workertarget datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128" 31*9880d681SAndroid Build Coastguard Workertarget triple = "x86_64-unknown-linux-gnu" 32*9880d681SAndroid Build Coastguard Worker 33*9880d681SAndroid Build Coastguard Worker@x = thread_local global i32 0 34*9880d681SAndroid Build Coastguard Workerdefine i32 @foo() "no-frame-pointer-elim-non-leaf" { 35*9880d681SAndroid Build Coastguard Worker %a = load i32, i32* @x, align 4 36*9880d681SAndroid Build Coastguard Worker ret i32 %a 37*9880d681SAndroid Build Coastguard Worker} 38