1; Test several VSX FMA mutation opportunities.  The first one isn't a
2; reasonable transformation because the killed product register is the
3; same as the FMA target register.  The second one is legal.  The third
4; one doesn't fit the feeding-copy pattern.
5
6; RUN: llc < %s -mtriple=powerpc64-unknown-linux-gnu -mcpu=pwr7 -enable-unsafe-fp-math -mattr=+vsx | FileCheck %s
7target datalayout = "E-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-f128:128:128-v128:128:128-n32:64"
8target triple = "powerpc64-unknown-linux-gnu"
9
10declare double @llvm.sqrt.f64(double)
11
12define double @foo3(double %a) nounwind {
13  %r = call double @llvm.sqrt.f64(double %a)
14  ret double %r
15
16; CHECK: @foo3
17; CHECK: xsnmsubadp [[REG:[0-9]+]], {{[0-9]+}}, [[REG]]
18; CHECK: xsmaddmdp
19; CHECK: xsmaddadp
20}
21
22