diff options
| author | Sam Kolton <Sam.Kolton@amd.com> | 2016-08-17 10:17:57 +0000 |
|---|---|---|
| committer | Sam Kolton <Sam.Kolton@amd.com> | 2016-08-17 10:17:57 +0000 |
| commit | c05d7784a669cf5eeb16e374b34870bfc13a1626 (patch) | |
| tree | 7fb39e02b5d3e4fd7c399940a0be7e16be5477b8 /llvm/test | |
| parent | 1cdd6ca6ca1119615af34fd97900a1cf954b04ce (diff) | |
| download | bcm5719-llvm-c05d7784a669cf5eeb16e374b34870bfc13a1626.tar.gz bcm5719-llvm-c05d7784a669cf5eeb16e374b34870bfc13a1626.zip | |
[AMDGPU] llvm-objdump: Skip amd_kernel_code_t only at the begining of kernel symbol.
Summary: This change fix bug in AMDGPU disassembly. Previously, presence of symbols other than kernel symbols caused objdump to skip begining of those symbols.
Reviewers: tstellarAMD, vpykhtin, Bigcheese, ruiu
Subscribers: kzhuravl, arsenm
Differential Revision: http://reviews.llvm.org/D21966
llvm-svn: 278921
Diffstat (limited to 'llvm/test')
| -rw-r--r-- | llvm/test/Object/AMDGPU/objdump.s | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/llvm/test/Object/AMDGPU/objdump.s b/llvm/test/Object/AMDGPU/objdump.s index ca02a7ac205..83f0df2e2e6 100644 --- a/llvm/test/Object/AMDGPU/objdump.s +++ b/llvm/test/Object/AMDGPU/objdump.s @@ -11,11 +11,14 @@ hello_world: s_load_dwordx2 s[0:1], s[4:5], 0x8 s_waitcnt lgkmcnt(0) s_add_u32 s0, s7, s0 +BB0: v_add_i32_e32 v1, vcc, s0, v1 +BB1: s_movk_i32 s0, 0x483 v_cmp_ge_i32_e32 vcc, s0, v0 s_and_saveexec_b64 s[0:1], vcc v_lshlrev_b32_e32 v4, 2, v0 +BB3: s_cbranch_execz 21 s_mov_b64 s[2:3], exec s_mov_b64 s[10:11], exec @@ -30,6 +33,7 @@ hello_world2: s_and_saveexec_b64 s[0:1], vcc s_cbranch_execz 85 s_load_dwordx4 s[8:11], s[4:5], 0x40 +BB5: v_ashrrev_i32_e32 v77, 31, v76 v_lshlrev_b64 v[10:11], 2, v[76:77] s_waitcnt lgkmcnt(0) @@ -48,11 +52,14 @@ hello_world2: // CHECK: s_load_dwordx2 s[0:1], s[4:5], 0x8 // 000000000108: C0060002 00000008 // CHECK: s_waitcnt lgkmcnt(0) // 000000000110: BF8C007F // CHECK: s_add_u32 s0, s7, s0 // 000000000114: 80000007 +// CHECK: BB0: // CHECK: v_add_i32_e32 v1, vcc, s0, v1 // 000000000118: 32020200 +// CHECK: BB1: // CHECK: s_movk_i32 s0, 0x483 // 00000000011C: B0000483 // CHECK: v_cmp_ge_i32_e32 vcc, s0, v0 // 000000000120: 7D8C0000 // CHECK: s_and_saveexec_b64 s[0:1], vcc // 000000000124: BE80206A // CHECK: v_lshlrev_b32_e32 v4, 2, v0 // 000000000128: 24080082 +// CHECK: BB3: // CHECK: s_cbranch_execz 21 // 00000000012C: BF880015 // CHECK: s_mov_b64 s[2:3], exec // 000000000130: BE82017E // CHECK: s_mov_b64 s[10:11], exec // 000000000134: BE8A017E @@ -63,6 +70,7 @@ hello_world2: // CHECK: s_and_saveexec_b64 s[0:1], vcc // 000000000240: BE80206A // CHECK: s_cbranch_execz 85 // 000000000244: BF880055 // CHECK: s_load_dwordx4 s[8:11], s[4:5], 0x40 // 000000000248: C00A0202 00000040 +// CHECK: BB5: // CHECK: v_ashrrev_i32_e32 v77, 31, v76 // 000000000250: 229A989F // CHECK: v_lshlrev_b64 v[10:11], 2, v[76:77] // 000000000254: D28F000A 00029882 // CHECK: s_waitcnt lgkmcnt(0) // 00000000025C: BF8C007F |

