From: Jeff Law Date: Thu, 25 Nov 1999 03:28:22 +0000 (+0000) Subject: * hppa.h (pa_opcodes): Correctly handle immediate for PA2.0 "bb" X-Git-Tag: gprof-pre-ansify-2004-05-26~9026 X-Git-Url: http://git.osdn.net/view?a=commitdiff_plain;h=01b5e9a3e29d86cc5293203751433b80861b0dd0;p=pf3gnuchains%2Fpf3gnuchains4x.git * hppa.h (pa_opcodes): Correctly handle immediate for PA2.0 "bb" instruction. --- diff --git a/include/opcode/ChangeLog b/include/opcode/ChangeLog index 01e881d834..e33a5d6961 100644 --- a/include/opcode/ChangeLog +++ b/include/opcode/ChangeLog @@ -1,3 +1,8 @@ +Wed Nov 24 20:28:58 1999 Jeffrey A Law (law@cygnus.com) + + * hppa.h (pa_opcodes): Correctly handle immediate for PA2.0 "bb" + instruction. + 1999-11-18 Gavin Romig-Koch * mips.h (INSN_ISA5): New. diff --git a/include/opcode/hppa.h b/include/opcode/hppa.h index b90dbddb96..1c41ff07c2 100644 --- a/include/opcode/hppa.h +++ b/include/opcode/hppa.h @@ -71,7 +71,7 @@ struct pa_opcode In the args field, the following characters are unused: ' " & - / 34 6789:;< > @' - ' BC M [\] ' + ' C M [\] ' ' e g l y } ' Here are all the characters: @@ -144,6 +144,9 @@ Also these: Q 5 bit immediate value at 10 (a bit position specified in the bb instruction. It's the same as r above, except the value is in a different location) + B 5 bit immediate value at 10 (a bit position specified in + the bb instruction. Similar to Q, but 64bit handling is + different. Z %r1 -- implicit target of addil instruction. L ,%r2 completer for new syntax branch { Source format completer for fcnv @@ -459,7 +462,7 @@ static const struct pa_opcode pa_opcodes[] = { "addibt", 0xa4000000, 0xfc000000, "?dn5,b,w", pa10, 0}, { "addibf", 0xac000000, 0xfc000000, "?dn5,b,w", pa10, 0}, { "bb", 0xc0006000, 0xffe06000, "?Bnx,!,w", pa20, FLAG_STRICT}, -{ "bb", 0xc4006000, 0xfc006000, "?Bnx,Q,w", pa20, FLAG_STRICT}, +{ "bb", 0xc4004000, 0xfc004000, "?Bnx,B,w", pa20, FLAG_STRICT}, { "bb", 0xc0004000, 0xffe06000, "?bnx,!,w", pa10, FLAG_STRICT}, { "bb", 0xc4004000, 0xfc004000, "?bnx,Q,w", pa10, 0}, { "bvb", 0xc0004000, 0xffe04000, "?bnx,w", pa10, 0},