[PATCH] D136073: [LoongArch] Modify ParserMethod for the simm26_b operand type

wanglei via Phabricator via llvm-commits llvm-commits at lists.llvm.org
Mon Oct 17 19:33:19 PDT 2022


wangleiat updated this revision to Diff 468397.
wangleiat added a comment.

Address xen0n's comments.


Repository:
  rG LLVM Github Monorepo

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D136073/new/

https://reviews.llvm.org/D136073

Files:
  llvm/lib/Target/LoongArch/LoongArchInstrInfo.td
  llvm/test/CodeGen/LoongArch/blockaddress-symbol.ll


Index: llvm/test/CodeGen/LoongArch/blockaddress-symbol.ll
===================================================================
--- /dev/null
+++ llvm/test/CodeGen/LoongArch/blockaddress-symbol.ll
@@ -0,0 +1,25 @@
+; NOTE: Assertions have been autogenerated by utils/update_llc_test_checks.py
+; RUN: llc --mtriple=loongarch32 < %s | FileCheck %s
+; RUN: llc --mtriple=loongarch64 < %s | FileCheck %s
+; RUN: llc --mtriple=loongarch32 --no-integrated-as < %s | FileCheck %s
+; RUN: llc --mtriple=loongarch64 --no-integrated-as < %s | FileCheck %s
+
+;; This regression test is for ensuring the AsmParser does not use the
+;; getOrCreateSymbol interface to create blockaddress symbols.
+;; Otherwise incorrect symbols will be created:
+;; `.Ltmp0` -> `.Ltmp00`.
+
+define void @operand_block_address() nounwind {
+; CHECK-LABEL: operand_block_address:
+; CHECK:       # %bb.0:
+; CHECK-NEXT:    #APP
+; CHECK-NEXT:    b .Ltmp0
+; CHECK-NEXT:    #NO_APP
+; CHECK-NEXT:  .Ltmp0: # Block address taken
+; CHECK-NEXT:  # %bb.1: # %bb
+; CHECK-NEXT:    ret
+  call void asm sideeffect "b $0", "i"(i8* blockaddress(@operand_block_address, %bb))
+  br label %bb
+bb:
+  ret void
+}
Index: llvm/lib/Target/LoongArch/LoongArchInstrInfo.td
===================================================================
--- llvm/lib/Target/LoongArch/LoongArchInstrInfo.td
+++ llvm/lib/Target/LoongArch/LoongArchInstrInfo.td
@@ -202,24 +202,32 @@
   let DecoderMethod = "decodeSImmOperand<21, 2>";
 }
 
-// TODO: Need split the ParserMethod/PredicateMethod for call/jump/tailcall.
-def SImm26Operand: AsmOperandClass {
-  let Name = "SImm26Operand";
+def SImm26OperandB: AsmOperandClass {
+  let Name = "SImm26OperandB";
+  let PredicateMethod = "isSImm26Operand";
   let RenderMethod = "addImmOperands";
   let DiagnosticType = "InvalidSImm26Operand";
-  let ParserMethod = "parseSImm26Operand";
+  let ParserMethod = "parseImmediate";
 }
 
 // A symbol or an imm used in B/PseudoBR.
 def simm26_b : Operand<OtherVT> {
-  let ParserMatchClass = SImm26Operand;
+  let ParserMatchClass = SImm26OperandB;
   let EncoderMethod = "getImmOpValueAsr2";
   let DecoderMethod = "decodeSImmOperand<26, 2>";
 }
 
+def SImm26OperandBL: AsmOperandClass {
+  let Name = "SImm26OperandBL";
+  let PredicateMethod = "isSImm26Operand";
+  let RenderMethod = "addImmOperands";
+  let DiagnosticType = "InvalidSImm26Operand";
+  let ParserMethod = "parseSImm26Operand";
+}
+
 // A symbol or an imm used in BL/PseudoCALL.
 def simm26_bl : Operand<GRLenVT> {
-  let ParserMatchClass = SImm26Operand;
+  let ParserMatchClass = SImm26OperandBL;
   let EncoderMethod = "getImmOpValueAsr2";
   let DecoderMethod = "decodeSImmOperand<26, 2>";
 }


-------------- next part --------------
A non-text attachment was scrubbed...
Name: D136073.468397.patch
Type: text/x-patch
Size: 2695 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20221018/23db364c/attachment.bin>


More information about the llvm-commits mailing list