xref: /aosp_15_r20/external/llvm/test/CodeGen/X86/tls-addr-non-leaf-function.ll (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker; RUN: llc < %s -relocation-model=pic -O2 -disable-fp-elim -o - | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker; RUN: llc < %s -relocation-model=pic -O2 -o - | FileCheck %s
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard Worker; This test runs twice with different options regarding the frame pointer:
5*9880d681SAndroid Build Coastguard Worker; first the elimination is disabled, then it is enabled. The disabled case is
6*9880d681SAndroid Build Coastguard Worker; the "control group".
7*9880d681SAndroid Build Coastguard Worker; The function 'foo' below is marked with the "no-frame-pointer-elim-non-leaf"
8*9880d681SAndroid Build Coastguard Worker; attribute which dictates that the frame pointer should not be eliminated
9*9880d681SAndroid Build Coastguard Worker; unless the function is a leaf (i.e. it doesn't call any other function).
10*9880d681SAndroid Build Coastguard Worker; Now, 'foo' is not a leaf function, because it performs a TLS access which on
11*9880d681SAndroid Build Coastguard Worker; X86 ELF in PIC mode is expanded as a library call.
12*9880d681SAndroid Build Coastguard Worker; This call is represented with a pseudo-instruction which doesn't appear to be
13*9880d681SAndroid Build Coastguard Worker; a call when inspected by the analysis passes (it doesn't have the "isCall"
14*9880d681SAndroid Build Coastguard Worker; flag), and the ISel lowering code creating the pseudo was not informing the
15*9880d681SAndroid Build Coastguard Worker; MachineFrameInfo that the function contained calls. This affected the decision
16*9880d681SAndroid Build Coastguard Worker; whether to eliminate the frame pointer.
17*9880d681SAndroid Build Coastguard Worker; With the fix, the "hasCalls" flag is set in the MFI for the function whenever
18*9880d681SAndroid Build Coastguard Worker; a TLS access pseudo-instruction is created, so 'foo' appears to be a non-leaf
19*9880d681SAndroid Build Coastguard Worker; function, and the difference in the options does not affect codegen: both
20*9880d681SAndroid Build Coastguard Worker; versions will have a frame pointer.
21*9880d681SAndroid Build Coastguard Worker
22*9880d681SAndroid Build Coastguard Worker; Test that there's some frame pointer usage in 'foo'...
23*9880d681SAndroid Build Coastguard Worker; CHECK: foo:
24*9880d681SAndroid Build Coastguard Worker; CHECK: pushq %rbp
25*9880d681SAndroid Build Coastguard Worker; CHECK: movq %rsp, %rbp
26*9880d681SAndroid Build Coastguard Worker; ... and the TLS library call is also present.
27*9880d681SAndroid Build Coastguard Worker; CHECK: leaq x@TLSGD(%rip), %rdi
28*9880d681SAndroid Build Coastguard Worker; CHECK: callq __tls_get_addr@PLT
29*9880d681SAndroid Build Coastguard Worker
30*9880d681SAndroid Build Coastguard Workertarget datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
31*9880d681SAndroid Build Coastguard Workertarget triple = "x86_64-unknown-linux-gnu"
32*9880d681SAndroid Build Coastguard Worker
33*9880d681SAndroid Build Coastguard Worker@x = thread_local global i32 0
34*9880d681SAndroid Build Coastguard Workerdefine i32 @foo() "no-frame-pointer-elim-non-leaf" {
35*9880d681SAndroid Build Coastguard Worker  %a = load i32, i32* @x, align 4
36*9880d681SAndroid Build Coastguard Worker  ret i32 %a
37*9880d681SAndroid Build Coastguard Worker}
38