Skip to content

avx: Extract opcode information

amyspark requested to merge amyspark/orc:amyspark/avx/preliminaries into main

Hey all!

This is the first stage of !111 (merged): in this MR, I extract the prefix and escape bytes information from the OrcSysOpcode instances. This will power the AVX backend's VEX codegen, and by submitting it separately, we can verify that SSE keeps working after this refactor.

Let me know what you think.

Merge request reports

Loading