LLVM ERROR: Cannot yet select: 0x20d7a30: f32 = add 0x20b6ee0, 0x20d2e10 [ID=641] 0x20b6ee0: f32 = mul 0x20b6ce0, 0x20be850 [ID=462] 0x20b6ce0: f32 = extract_vector_elt 0x20ca1e0, 0x2099c70 [ID=379] 0x20ca1e0: v4f32 = vector_shuffle 0x20bd940, 0x20c4b80<0,0,0,0> [ORD=374] [ID=324] 0x20bd940: v4f32 = scalar_to_vector 0x20c9ed0 [ID=300] 0x20c9ed0: f32,ch = load 0x1e131b8, 0x20c9dd0, 0x208e170 [ORD=372] [ID=193] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c9dd0: i64 = add 0x20c4980, 0x20c9cd0 [ORD=371] [ID=167] 0x20c4980: i64,ch = load 0x1e131b8, 0x20c4880, 0x208e170 [ORD=302] [ID=147] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4880: i64,ch = CopyFromReg 0x1e131b8, 0x20c4780 [ORD=301] [ID=133] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4780: i64 = Register %reg1024 [ORD=301] [ID=19] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c9cd0: i64 = Constant<48> [ORD=371] [ID=30] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c4b80: v4f32 = undef [ORD=305] [ID=20] 0x2099c70: i32 = Constant<0> [ID=12] 0x20be850: f32,ch = load 0x1e131b8, 0x20ca9e0, 0x208e170 [ID=148] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20ca9e0: i64 = X86ISD::Wrapper 0x20be150 [ID=136] 0x20be150: i64 = TargetConstantPool 0 [ID=119] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20d2e10: f32 = add 0x20bdd40, 0x20d1300 [ID=625] 0x20bdd40: f32 = mul 0x209a170, 0x20bdc40 [ID=587] 0x209a170: f32,ch = load 0x1e131b8, 0x209a370, 0x208e170 [ORD=43] [ID=550] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x209a370: i64 = add 0x208e570, 0x209ad80 [ORD=41] [ID=509] 0x208e570: i64 = add 0x208eb80, 0x208e870 [ORD=32] [ID=434] 0x208eb80: i64,ch = CopyFromReg 0x1e131b8, 0x208ec80 [ORD=32] [ID=132] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208ec80: i64 = Register %reg1030 [ORD=32] [ID=13] 0x208e870: i64 = sign_extend 0x2099e70 [ORD=32] [ID=347] 0x2099e70: i32 = add 0x209a470, 0x209a070 [ORD=30] [ID=316] 0x209a470: i32 = mul 0x209a970, 0x209b480 [ORD=29] [ID=209] 0x209a970: i32,ch = CopyFromReg 0x1e131b8, 0x208ed80 [ORD=29] [ID=130] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208ed80: i32 = Register %reg1028 [ORD=29] [ID=10] 0x209b480: i32 = xor 0x20c66a0, 0x209a670 [ID=183] 0x20c66a0: i32,flag = X86ISD::CMOV 0x208ce60, 0x208e970, 0x208d860, 0x20c84c0 [ID=155] 0x208ce60: i32,ch = CopyFromReg 0x1e131b8, 0x208db70 [ORD=16] [ID=124] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208db70: i32 = Register %reg1032 [ORD=16] [ID=2] 0x208e970: i32,ch = CopyFromReg 0x1e131b8, 0x208e670 [ORD=25] [ID=127] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e670: i32 = Register %reg1036 [ORD=25] [ID=6] 0x208d860: i8 = Constant<0> [ID=120] 0x20c84c0: i32 = X86ISD::CMP 0x208e970, 0x208ce60 [ID=143] 0x208e970: i32,ch = CopyFromReg 0x1e131b8, 0x208e670 [ORD=25] [ID=127] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e670: i32 = Register %reg1036 [ORD=25] [ID=6] 0x208ce60: i32,ch = CopyFromReg 0x1e131b8, 0x208db70 [ORD=16] [ID=124] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208db70: i32 = Register %reg1032 [ORD=16] [ID=2] 0x209a670: i32 = Constant<-1> [ORD=18] [ID=3] 0x209a070: i32,ch = CopyFromReg 0x1e131b8, 0x209a270 [ORD=30] [ID=131] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x209a270: i32 = Register %reg1029 [ORD=30] [ID=11] 0x209ad80: i64 = Constant<8> [ORD=41] [ID=17] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20bdc40: f32 = extract_vector_elt 0x20c83c0, 0x2099c70 [ID=395] 0x20c83c0: v4f32 = vector_shuffle 0x20c85c0, 0x20c4b80<0,0,0,0> [ORD=350] [ID=328] 0x20c85c0: v4f32 = scalar_to_vector 0x20c81c0 [ID=304] 0x20c81c0: f32,ch = load 0x1e131b8, 0x20c80c0, 0x208e170 [ORD=348] [ID=197] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c80c0: i64 = add 0x20c4980, 0x20c7eb0 [ORD=347] [ID=171] 0x20c4980: i64,ch = load 0x1e131b8, 0x20c4880, 0x208e170 [ORD=302] [ID=147] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4880: i64,ch = CopyFromReg 0x1e131b8, 0x20c4780 [ORD=301] [ID=133] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4780: i64 = Register %reg1024 [ORD=301] [ID=19] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c7eb0: i64 = Constant<32> [ORD=347] [ID=26] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c4b80: v4f32 = undef [ORD=305] [ID=20] 0x2099c70: i32 = Constant<0> [ID=12] 0x20d1300: f32 = add 0x20c2470, 0x20ba110 [ID=608] 0x20c2470: f32 = mul 0x209b880, 0x20c2370 [ID=591] 0x209b880: f32,ch = load 0x1e131b8, 0x208d160, 0x208e170 [ORD=39] [ID=551] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208d160: i64 = add 0x208e570, 0x208d460 [ORD=37] [ID=510] 0x208e570: i64 = add 0x208eb80, 0x208e870 [ORD=32] [ID=434] 0x208eb80: i64,ch = CopyFromReg 0x1e131b8, 0x208ec80 [ORD=32] [ID=132] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208ec80: i64 = Register %reg1030 [ORD=32] [ID=13] 0x208e870: i64 = sign_extend 0x2099e70 [ORD=32] [ID=347] 0x2099e70: i32 = add 0x209a470, 0x209a070 [ORD=30] [ID=316] 0x209a470: i32 = mul 0x209a970, 0x209b480 [ORD=29] [ID=209] 0x209a970: i32,ch = CopyFromReg 0x1e131b8, 0x208ed80 [ORD=29] [ID=130] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208ed80: i32 = Register %reg1028 [ORD=29] [ID=10] 0x209b480: i32 = xor 0x20c66a0, 0x209a670 [ID=183] 0x20c66a0: i32,flag = X86ISD::CMOV 0x208ce60, 0x208e970, 0x208d860, 0x20c84c0 [ID=155] 0x208ce60: i32,ch = CopyFromReg 0x1e131b8, 0x208db70 [ORD=16] [ID=124] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208db70: i32 = Register %reg1032 [ORD=16] [ID=2] 0x208e970: i32,ch = CopyFromReg 0x1e131b8, 0x208e670 [ORD=25] [ID=127] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e670: i32 = Register %reg1036 [ORD=25] [ID=6] 0x208d860: i8 = Constant<0> [ID=120] 0x20c84c0: i32 = X86ISD::CMP 0x208e970, 0x208ce60 [ID=143] 0x208e970: i32,ch = CopyFromReg 0x1e131b8, 0x208e670 [ORD=25] [ID=127] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e670: i32 = Register %reg1036 [ORD=25] [ID=6] 0x208ce60: i32,ch = CopyFromReg 0x1e131b8, 0x208db70 [ORD=16] [ID=124] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208db70: i32 = Register %reg1032 [ORD=16] [ID=2] 0x209a670: i32 = Constant<-1> [ORD=18] [ID=3] 0x209a070: i32,ch = CopyFromReg 0x1e131b8, 0x209a270 [ORD=30] [ID=131] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x209a270: i32 = Register %reg1029 [ORD=30] [ID=11] 0x208d460: i64 = Constant<4> [ORD=37] [ID=16] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c2370: f32 = extract_vector_elt 0x20c65a0, 0x2099c70 [ID=411] 0x20c65a0: v4f32 = vector_shuffle 0x20c4680, 0x20c4b80<0,0,0,0> [ORD=326] [ID=332] 0x20c4680: v4f32 = scalar_to_vector 0x20c63a0 [ID=308] 0x20c63a0: f32,ch = load 0x1e131b8, 0x20c62a0, 0x208e170 [ORD=324] [ID=201] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c62a0: i64 = add 0x20c4980, 0x20c61a0 [ORD=323] [ID=175] 0x20c4980: i64,ch = load 0x1e131b8, 0x20c4880, 0x208e170 [ORD=302] [ID=147] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4880: i64,ch = CopyFromReg 0x1e131b8, 0x20c4780 [ORD=301] [ID=133] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4780: i64 = Register %reg1024 [ORD=301] [ID=19] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c61a0: i64 = Constant<16> [ORD=323] [ID=22] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c4b80: v4f32 = undef [ORD=305] [ID=20] 0x2099c70: i32 = Constant<0> [ID=12] 0x20ba110: f32 = mul 0x208df70, 0x20b9d00 [ID=555] 0x208df70: f32,ch = load 0x1e131b8, 0x208e570, 0x208e170 [ORD=35] [ID=511] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e570: i64 = add 0x208eb80, 0x208e870 [ORD=32] [ID=434] 0x208eb80: i64,ch = CopyFromReg 0x1e131b8, 0x208ec80 [ORD=32] [ID=132] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208ec80: i64 = Register %reg1030 [ORD=32] [ID=13] 0x208e870: i64 = sign_extend 0x2099e70 [ORD=32] [ID=347] 0x2099e70: i32 = add 0x209a470, 0x209a070 [ORD=30] [ID=316] 0x209a470: i32 = mul 0x209a970, 0x209b480 [ORD=29] [ID=209] 0x209a970: i32,ch = CopyFromReg 0x1e131b8, 0x208ed80 [ORD=29] [ID=130] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208ed80: i32 = Register %reg1028 [ORD=29] [ID=10] 0x209b480: i32 = xor 0x20c66a0, 0x209a670 [ID=183] 0x20c66a0: i32,flag = X86ISD::CMOV 0x208ce60, 0x208e970, 0x208d860, 0x20c84c0 [ID=155] 0x208ce60: i32,ch = CopyFromReg 0x1e131b8, 0x208db70 [ORD=16] [ID=124] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208db70: i32 = Register %reg1032 [ORD=16] [ID=2] 0x208e970: i32,ch = CopyFromReg 0x1e131b8, 0x208e670 [ORD=25] [ID=127] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e670: i32 = Register %reg1036 [ORD=25] [ID=6] 0x208d860: i8 = Constant<0> [ID=120] 0x20c84c0: i32 = X86ISD::CMP 0x208e970, 0x208ce60 [ID=143] 0x208e970: i32,ch = CopyFromReg 0x1e131b8, 0x208e670 [ORD=25] [ID=127] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208e670: i32 = Register %reg1036 [ORD=25] [ID=6] 0x208ce60: i32,ch = CopyFromReg 0x1e131b8, 0x208db70 [ORD=16] [ID=124] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x208db70: i32 = Register %reg1032 [ORD=16] [ID=2] 0x209a670: i32 = Constant<-1> [ORD=18] [ID=3] 0x209a070: i32,ch = CopyFromReg 0x1e131b8, 0x209a270 [ORD=30] [ID=131] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x209a270: i32 = Register %reg1029 [ORD=30] [ID=11] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20b9d00: f32 = extract_vector_elt 0x20c4d80, 0x2099c70 [ID=339] 0x20c4d80: v4f32 = vector_shuffle 0x20c67a0, 0x20c4b80<0,0,0,0> [ORD=306] [ID=312] 0x20c67a0: v4f32 = scalar_to_vector 0x20c4a80 [ID=205] 0x20c4a80: f32,ch = load 0x1e131b8, 0x20c4980, 0x208e170 [ORD=304] [ID=179] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4980: i64,ch = load 0x1e131b8, 0x20c4880, 0x208e170 [ORD=302] [ID=147] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4880: i64,ch = CopyFromReg 0x1e131b8, 0x20c4780 [ORD=301] [ID=133] 0x1e131b8: ch = EntryToken [ORD=16] [ID=0] 0x20c4780: i64 = Register %reg1024 [ORD=301] [ID=19] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x208e170: i64 = undef [ORD=35] [ID=15] 0x20c4b80: v4f32 = undef [ORD=305] [ID=20] 0x2099c70: i32 = Constant<0> [ID=12]