; RUN: split-file %s %t
; RUN: opt -thinlto-bc %t/a.ll -thin-link-bitcode-file=%t1.thinlink.bc -o %t1.bc
; RUN: opt -thinlto-bc %t/b.ll -thin-link-bitcode-file=%t1.thinlink.bc -o %t2.bc
; RUN: opt -thinlto-bc %t/c.ll -thin-link-bitcode-file=%t1.thinlink.bc -o %t3.bc
; If the prevailing weak symbol is defined in a native file, the IR copies should be dead and propagation should not occur
; RUN: llvm-lto2 run -disable-thinlto-funcattrs=0 %t1.bc %t2.bc %t3.bc -o %t.o \
; RUN: -r %t1.bc,caller,px -r %t1.bc,callee,lx \
; RUN: -r %t2.bc,callee,x \
; RUN: -r %t3.bc,callee,x \
; RUN: -save-temps
; RUN: llvm-dis -o - %t.o.1.3.import.bc | FileCheck %s
; If the prevailing weak symbol is in an IR file, it should be the one used in the final binary and thus propagation
; should be based off of that copy
; RUN: llvm-lto2 run -O3 -disable-thinlto-funcattrs=0 %t1.bc %t2.bc %t3.bc -o %t.2.o \
; RUN: -r %t1.bc,caller,px -r %t1.bc,callee,lx \
; RUN: -r %t2.bc,callee,px \
; RUN: -r %t3.bc,callee,x \
; RUN: -save-temps
; RUN: llvm-dis -o - %t.2.o.1.3.import.bc | FileCheck %s --check-prefix=PREVAILING
; RUN: llvm-dis -o - %t.2.o.2.3.import.bc | FileCheck %s --check-prefix=PREVAILING-B
; RUN: llvm-dis -o - %t.2.o.3.3.import.bc | FileCheck %s --check-prefix=PREVAILING-C
;--- a.ll
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
target triple = "x86_64-unknown-linux-gnu"
declare i32 @callee()
; CHECK-NOT: Function Attrs:
; CHECK: define i32 @caller()
; PREVAILING: Function Attrs: norecurse nounwind
; PREVAILING-NEXT: define i32 @caller()
define i32 @caller() {
%res = call i32 @callee()
ret i32 %res
}
;--- b.ll
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
target triple = "x86_64-unknown-linux-gnu"
; PREVAILING-B: define weak i32 @callee()
define weak i32 @callee() {
ret i32 5
}
;--- c.ll
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
target triple = "x86_64-unknown-linux-gnu"
; PREVAILING-C: declare i32 @callee()
define weak i32 @callee() {
ret i32 6
}