|  | ; RUN: split-file %s %t | 
|  | ; RUN: opt -thinlto-bc %t/a.ll -thin-link-bitcode-file=%t1.thinlink.bc -o %t1.bc | 
|  | ; RUN: opt -thinlto-bc %t/b.ll -thin-link-bitcode-file=%t1.thinlink.bc -o %t2.bc | 
|  | ; RUN: opt -thinlto-bc %t/c.ll -thin-link-bitcode-file=%t1.thinlink.bc -o %t3.bc | 
|  |  | 
|  | ; If the prevailing weak symbol is defined in a native file, the IR copies should be dead and propagation should not occur | 
|  | ; RUN: llvm-lto2 run -disable-thinlto-funcattrs=0 %t1.bc %t2.bc %t3.bc -o %t.o \ | 
|  | ; RUN:               -r %t1.bc,caller,px -r %t1.bc,callee,lx \ | 
|  | ; RUN:               -r %t2.bc,callee,x \ | 
|  | ; RUN:               -r %t3.bc,callee,x \ | 
|  | ; RUN:               -save-temps | 
|  |  | 
|  | ; RUN: llvm-dis -o - %t.o.1.3.import.bc | FileCheck %s | 
|  |  | 
|  | ; If the prevailing weak symbol is in an IR file, it should be the one used in the final binary and thus propagation | 
|  | ; should be based off of that copy | 
|  | ; RUN: llvm-lto2 run -O3 -disable-thinlto-funcattrs=0 %t1.bc %t2.bc %t3.bc -o %t.2.o \ | 
|  | ; RUN:               -r %t1.bc,caller,px -r %t1.bc,callee,lx \ | 
|  | ; RUN:               -r %t2.bc,callee,px \ | 
|  | ; RUN:               -r %t3.bc,callee,x \ | 
|  | ; RUN:               -save-temps | 
|  |  | 
|  | ; RUN: llvm-dis -o - %t.2.o.1.3.import.bc | FileCheck %s --check-prefix=PREVAILING | 
|  | ; RUN: llvm-dis -o - %t.2.o.2.3.import.bc | FileCheck %s --check-prefix=PREVAILING-B | 
|  | ; RUN: llvm-dis -o - %t.2.o.3.3.import.bc | FileCheck %s --check-prefix=PREVAILING-C | 
|  |  | 
|  | ;--- a.ll | 
|  | target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128" | 
|  | target triple = "x86_64-unknown-linux-gnu" | 
|  |  | 
|  | declare i32 @callee() | 
|  |  | 
|  | ; CHECK-NOT: Function Attrs: | 
|  | ; CHECK: define i32 @caller() | 
|  |  | 
|  | ; PREVAILING: Function Attrs: norecurse nounwind | 
|  | ; PREVAILING-NEXT: define i32 @caller() | 
|  | define i32 @caller() { | 
|  | %res = call i32 @callee() | 
|  | ret i32 %res | 
|  | } | 
|  |  | 
|  | ;--- b.ll | 
|  | target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128" | 
|  | target triple = "x86_64-unknown-linux-gnu" | 
|  |  | 
|  | ; PREVAILING-B: define weak i32 @callee() | 
|  | define weak i32 @callee() { | 
|  | ret i32 5 | 
|  | } | 
|  |  | 
|  | ;--- c.ll | 
|  | target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128" | 
|  | target triple = "x86_64-unknown-linux-gnu" | 
|  |  | 
|  | ; PREVAILING-C: declare i32 @callee() | 
|  | define weak i32 @callee() { | 
|  | ret i32 6 | 
|  | } | 
|  |  |