From patchwork Thu Apr 8 15:57:11 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Maciej W. Rozycki" X-Patchwork-Id: 1463897 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=sourceware.org; envelope-from=gcc-patches-bounces@gcc.gnu.org; receiver=) Received: from sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FGQrK1Ypdz9sVt for ; Fri, 9 Apr 2021 01:57:20 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id D3B243951C63; Thu, 8 Apr 2021 15:57:16 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from angie.orcam.me.uk (angie.orcam.me.uk [157.25.102.26]) by sourceware.org (Postfix) with ESMTP id 648AD394D809 for ; Thu, 8 Apr 2021 15:57:14 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 648AD394D809 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=orcam.me.uk Authentication-Results: sourceware.org; spf=none smtp.mailfrom=macro@orcam.me.uk Received: by angie.orcam.me.uk (Postfix, from userid 500) id 2210392009C; Thu, 8 Apr 2021 17:57:12 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by angie.orcam.me.uk (Postfix) with ESMTP id 13A6C92009B for ; Thu, 8 Apr 2021 17:57:12 +0200 (CEST) Date: Thu, 8 Apr 2021 17:57:11 +0200 (CEST) From: "Maciej W. Rozycki" To: gcc-patches@gcc.gnu.org Subject: [committed] VAX: Fix comment for `*bit' pattern's peephole Message-ID: User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 X-Spam-Status: No, score=-3488.4 required=5.0 tests=BAYES_00, KAM_DMARC_STATUS, KAM_INFOUSMEBIZ, KAM_LAZY_DOMAIN_SECURITY, SPF_HELO_NONE, SPF_NONE, TXREP autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces@gcc.gnu.org Sender: "Gcc-patches" The comment for a peephole provided for the `*bit' pattern to be produced in comparison elimination from a sequence involving a bitwise complement operation of one input operand followed by a bitwise AND operation between a bitwise complement of said intermediate result and the other input operand (which corresponds to a sequence of MCOM and BIC machine instructions) incorrectly refers to the first operation as MNEG (which is the machine instruction for arithmetic negation) rather than MCOM as it is supposed to. Fix it. gcc/ * config/vax/vax.md: Fix comment for `*bit' pattern's peephole. --- Hi, Committed as an obvious trivial inline documentation fix. Maciej --- gcc/config/vax/vax.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) gcc-vax-mcom-bic-bit.diff Index: gcc/gcc/config/vax/vax.md =================================================================== --- gcc.orig/gcc/config/vax/vax.md +++ gcc/gcc/config/vax/vax.md @@ -1228,7 +1228,7 @@ ;; the "*bit" pattern does for the purpose of the compare ;; elimination pass. Try to get rid of the extra operation by hand ;; and where the sequence is used to set the condition codes only -;; convert MNEG/BIC => BIT. +;; convert MCOM/BIC => BIT. (define_peephole2 [(parallel [(set (match_operand:VAXint 0 "register_operand")