blob: c2835de442791dfcc557d98b7eb9b78398813622 [file] [log] [blame]
# RUN: llc %s -mtriple=m68k -start-after=prologepilog -O0 -filetype=obj -o - \
# RUN: | extract-section .text \
# RUN: | FileCheck %s -check-prefixes=XOR16DD,XOR32DD
#------------------------------------------------------------------------------
# MxBiArOp_RFRR_EAd class used for binary arithmetic operations and operates on
# both data and address registers only. It uses MxArithEncoding encoding class
# and MxOpModeEAd opmode class. This is a special case for XOR(EOR).
#------------------------------------------------------------------------------
# ---------------+-----------+-----------+-----------+-----------
# F E D C | B A 9 | 8 7 6 | 5 4 3 | 2 1 0
# ---------------+-----------+-----------+-----------+-----------
# x x x x | REG | OPMODE | MODE | REG
# XOR16DD: 1 0 1 1 0 0 1 1 . 0 1 0 0 0 0 0 0
# XOR16DD-SAME: 1 0 1 1 0 1 0 1 . 0 1 0 0 0 0 1 1
# XOR32DD-SAME: 1 0 1 1 0 0 1 1 . 1 0 0 0 0 0 0 0
# XOR32DD-SAME: 1 0 1 1 0 0 1 1 . 1 0 0 0 0 1 1 1
name: MxBiArOp_RFRR_EAd
body: |
bb.0:
$wd0 = XOR16dd $wd0, $wd1, implicit-def $ccr
$wd3 = XOR16dd $wd3, $wd2, implicit-def $ccr
$d0 = XOR32dd $d0, $d1, implicit-def $ccr
$d7 = XOR32dd $d7, $d1, implicit-def $ccr