filename | src/sh4/ia32mac.h |
changeset | 590:4db6a084ca3c |
prev | 586:2a3ba82cf243 |
next | 596:dfc0c93d882e |
author | nkeynes |
date | Sun Jan 20 07:24:38 2008 +0000 (16 years ago) |
permissions | -rw-r--r-- |
last change | Fix broken asic_check_cleared_events() Handle changes to the event mask which may raise/clear an IRQ |
view | annotate | diff | log | raw |
1 /**
2 * $Id$
3 *
4 * Provides the implementation for the ia32 ABI (eg prologue, epilogue, and
5 * calling conventions)
6 *
7 * Copyright (c) 2007 Nathan Keynes.
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 */
20 #ifndef __lxdream_ia32abi_H
21 #define __lxdream_ia32abi_H 1
23 #define load_ptr( reg, ptr ) load_imm32( reg, (uint32_t)ptr );
25 /**
26 * Note: clobbers EAX to make the indirect call - this isn't usually
27 * a problem since the callee will usually clobber it anyway.
28 */
29 #define CALL_FUNC0_SIZE 13
30 static inline void call_func0( void *ptr )
31 {
32 int adj = (-sh4_x86.stack_posn)&0x0F;
33 SUB_imm8s_r32( adj, R_ESP );
34 load_imm32(R_EAX, (uint32_t)ptr);
35 CALL_r32(R_EAX);
36 ADD_imm8s_r32( adj, R_ESP );
37 }
39 #define CALL_FUNC1_SIZE 14
40 static inline void call_func1( void *ptr, int arg1 )
41 {
42 int adj = (-4-sh4_x86.stack_posn)&0x0F;
43 SUB_imm8s_r32( adj, R_ESP );
44 PUSH_r32(arg1);
45 load_imm32(R_EAX, (uint32_t)ptr);
46 CALL_r32(R_EAX);
47 ADD_imm8s_r32( adj+4, R_ESP );
48 sh4_x86.stack_posn -= 4;
49 }
51 #define CALL_FUNC2_SIZE 15
52 static inline void call_func2( void *ptr, int arg1, int arg2 )
53 {
54 int adj = (-8-sh4_x86.stack_posn)&0x0F;
55 SUB_imm8s_r32( adj, R_ESP );
56 PUSH_r32(arg2);
57 PUSH_r32(arg1);
58 load_imm32(R_EAX, (uint32_t)ptr);
59 CALL_r32(R_EAX);
60 ADD_imm8s_r32( adj+8, R_ESP );
61 sh4_x86.stack_posn -= 8;
62 }
64 /**
65 * Write a double (64-bit) value into memory, with the first word in arg2a, and
66 * the second in arg2b
67 * NB: 30 bytes
68 */
69 #define MEM_WRITE_DOUBLE_SIZE 36
70 static inline void MEM_WRITE_DOUBLE( int addr, int arg2a, int arg2b )
71 {
72 int adj = (-8-sh4_x86.stack_posn)&0x0F;
73 SUB_imm8s_r32( adj, R_ESP );
74 ADD_imm8s_r32( 4, addr );
75 PUSH_r32(arg2b);
76 PUSH_r32(addr);
77 ADD_imm8s_r32( -4, addr );
78 SUB_imm8s_r32( 8, R_ESP );
79 PUSH_r32(arg2a);
80 PUSH_r32(addr);
81 load_imm32(R_EAX, (uint32_t)sh4_write_long);
82 CALL_r32(R_EAX);
83 ADD_imm8s_r32( 16, R_ESP );
84 load_imm32(R_EAX, (uint32_t)sh4_write_long);
85 CALL_r32(R_EAX);
86 ADD_imm8s_r32( adj+8, R_ESP );
87 sh4_x86.stack_posn -= 16;
88 }
90 /**
91 * Read a double (64-bit) value from memory, writing the first word into arg2a
92 * and the second into arg2b. The addr must not be in EAX
93 * NB: 27 bytes
94 */
95 #define MEM_READ_DOUBLE_SIZE 36
96 static inline void MEM_READ_DOUBLE( int addr, int arg2a, int arg2b )
97 {
98 int adj = (-4-sh4_x86.stack_posn)&0x0F;
99 int adj2 = (-8-sh4_x86.stack_posn)&0x0F;
100 SUB_imm8s_r32( adj, R_ESP );
101 PUSH_r32(addr);
102 load_imm32(R_EAX, (uint32_t)sh4_read_long);
103 CALL_r32(R_EAX);
104 POP_r32(R_ECX);
105 SUB_imm8s_r32( adj2-adj, R_ESP );
106 PUSH_r32(R_EAX);
107 ADD_imm8s_r32( 4, R_ECX );
108 PUSH_r32(R_ECX);
109 load_imm32(R_EAX, (uint32_t)sh4_read_long);
110 CALL_r32(R_EAX);
111 ADD_imm8s_r32( 4, R_ESP );
112 MOV_r32_r32( R_EAX, arg2b );
113 POP_r32(arg2a);
114 ADD_imm8s_r32( adj2, R_ESP );
115 sh4_x86.stack_posn -= 4;
116 }
118 /**
119 * Emit the 'start of block' assembly. Sets up the stack frame and save
120 * SI/DI as required
121 */
122 void sh4_translate_begin_block( sh4addr_t pc )
123 {
124 PUSH_r32(R_EBP);
125 /* mov &sh4r, ebp */
126 load_ptr( R_EBP, &sh4r );
128 sh4_x86.in_delay_slot = FALSE;
129 sh4_x86.priv_checked = FALSE;
130 sh4_x86.fpuen_checked = FALSE;
131 sh4_x86.branch_taken = FALSE;
132 sh4_x86.backpatch_posn = 0;
133 sh4_x86.recovery_posn = 0;
134 sh4_x86.block_start_pc = pc;
135 sh4_x86.tstate = TSTATE_NONE;
136 sh4_x86.tlb_on = IS_MMU_ENABLED();
137 sh4_x86.stack_posn = 8;
138 }
140 /**
141 * Exit the block with sh4r.new_pc written with the target pc
142 */
143 void exit_block_pcset( sh4addr_t pc )
144 {
145 load_imm32( R_ECX, ((pc - sh4_x86.block_start_pc)>>1)*sh4_cpu_period ); // 5
146 ADD_r32_sh4r( R_ECX, REG_OFFSET(slice_cycle) ); // 6
147 load_spreg( R_EAX, R_PC );
148 if( sh4_x86.tlb_on ) {
149 call_func1(xlat_get_code_by_vma,R_EAX);
150 } else {
151 call_func1(xlat_get_code,R_EAX);
152 }
153 POP_r32(R_EBP);
154 RET();
155 }
157 /**
158 * Exit the block with sh4r.new_pc written with the target pc
159 */
160 void exit_block_newpcset( sh4addr_t pc )
161 {
162 load_imm32( R_ECX, ((pc - sh4_x86.block_start_pc)>>1)*sh4_cpu_period ); // 5
163 ADD_r32_sh4r( R_ECX, REG_OFFSET(slice_cycle) ); // 6
164 load_spreg( R_EAX, R_NEW_PC );
165 store_spreg( R_EAX, R_PC );
166 if( sh4_x86.tlb_on ) {
167 call_func1(xlat_get_code_by_vma,R_EAX);
168 } else {
169 call_func1(xlat_get_code,R_EAX);
170 }
171 POP_r32(R_EBP);
172 RET();
173 }
176 #define EXIT_BLOCK_SIZE(pc) (24 + (IS_IN_ICACHE(pc)?5:CALL_FUNC1_SIZE))
179 /**
180 * Exit the block to an absolute PC
181 */
182 void exit_block( sh4addr_t pc, sh4addr_t endpc )
183 {
184 load_imm32( R_ECX, pc ); // 5
185 store_spreg( R_ECX, REG_OFFSET(pc) ); // 3
186 if( IS_IN_ICACHE(pc) ) {
187 MOV_moff32_EAX( xlat_get_lut_entry(GET_ICACHE_PHYS(pc)) ); // 5
188 } else if( sh4_x86.tlb_on ) {
189 call_func1(xlat_get_code_by_vma,R_ECX);
190 } else {
191 call_func1(xlat_get_code,R_ECX);
192 }
193 AND_imm8s_r32( 0xFC, R_EAX ); // 3
194 load_imm32( R_ECX, ((endpc - sh4_x86.block_start_pc)>>1)*sh4_cpu_period ); // 5
195 ADD_r32_sh4r( R_ECX, REG_OFFSET(slice_cycle) ); // 6
196 POP_r32(R_EBP);
197 RET();
198 }
200 #define EXIT_BLOCK_REL_SIZE(pc) (27 + (IS_IN_ICACHE(pc)?5:CALL_FUNC1_SIZE))
202 /**
203 * Exit the block to a relative PC
204 */
205 void exit_block_rel( sh4addr_t pc, sh4addr_t endpc )
206 {
207 load_imm32( R_ECX, pc - sh4_x86.block_start_pc ); // 5
208 ADD_sh4r_r32( R_PC, R_ECX );
209 store_spreg( R_ECX, REG_OFFSET(pc) ); // 3
210 if( IS_IN_ICACHE(pc) ) {
211 MOV_moff32_EAX( xlat_get_lut_entry(GET_ICACHE_PHYS(pc)) ); // 5
212 } else if( sh4_x86.tlb_on ) {
213 call_func1(xlat_get_code_by_vma,R_ECX);
214 } else {
215 call_func1(xlat_get_code,R_ECX);
216 }
217 AND_imm8s_r32( 0xFC, R_EAX ); // 3
218 load_imm32( R_ECX, ((endpc - sh4_x86.block_start_pc)>>1)*sh4_cpu_period ); // 5
219 ADD_r32_sh4r( R_ECX, REG_OFFSET(slice_cycle) ); // 6
220 POP_r32(R_EBP);
221 RET();
222 }
224 /**
225 * Write the block trailer (exception handling block)
226 */
227 void sh4_translate_end_block( sh4addr_t pc ) {
228 if( sh4_x86.branch_taken == FALSE ) {
229 // Didn't exit unconditionally already, so write the termination here
230 exit_block_rel( pc, pc );
231 }
232 if( sh4_x86.backpatch_posn != 0 ) {
233 unsigned int i;
234 // Raise exception
235 uint8_t *end_ptr = xlat_output;
236 MOV_r32_r32( R_EDX, R_ECX );
237 ADD_r32_r32( R_EDX, R_ECX );
238 ADD_r32_sh4r( R_ECX, R_PC );
239 MOV_moff32_EAX( &sh4_cpu_period );
240 MUL_r32( R_EDX );
241 ADD_r32_sh4r( R_EAX, REG_OFFSET(slice_cycle) );
243 POP_r32(R_EDX);
244 call_func1( sh4_raise_exception, R_EDX );
245 load_spreg( R_EAX, R_PC );
246 if( sh4_x86.tlb_on ) {
247 call_func1(xlat_get_code_by_vma,R_EAX);
248 } else {
249 call_func1(xlat_get_code,R_EAX);
250 }
251 POP_r32(R_EBP);
252 RET();
254 // Exception already raised - just cleanup
255 uint8_t *preexc_ptr = xlat_output;
256 MOV_r32_r32( R_EDX, R_ECX );
257 ADD_r32_r32( R_EDX, R_ECX );
258 ADD_r32_sh4r( R_ECX, R_SPC );
259 MOV_moff32_EAX( &sh4_cpu_period );
260 MUL_r32( R_EDX );
261 ADD_r32_sh4r( R_EAX, REG_OFFSET(slice_cycle) );
262 load_spreg( R_EAX, R_PC );
263 if( sh4_x86.tlb_on ) {
264 call_func1(xlat_get_code_by_vma,R_EAX);
265 } else {
266 call_func1(xlat_get_code,R_EAX);
267 }
268 POP_r32(R_EBP);
269 RET();
271 for( i=0; i< sh4_x86.backpatch_posn; i++ ) {
272 *sh4_x86.backpatch_list[i].fixup_addr =
273 xlat_output - ((uint8_t *)sh4_x86.backpatch_list[i].fixup_addr) - 4;
274 if( sh4_x86.backpatch_list[i].exc_code == -1 ) {
275 load_imm32( R_EDX, sh4_x86.backpatch_list[i].fixup_icount );
276 int rel = preexc_ptr - xlat_output;
277 JMP_rel(rel);
278 } else {
279 PUSH_imm32( sh4_x86.backpatch_list[i].exc_code );
280 load_imm32( R_EDX, sh4_x86.backpatch_list[i].fixup_icount );
281 int rel = end_ptr - xlat_output;
282 JMP_rel(rel);
283 }
284 }
285 }
286 }
288 void *xlat_get_native_pc()
289 {
290 void *result = NULL;
291 asm(
292 "mov %%ebp, %%eax\n\t"
293 "mov $0x8, %%ecx\n\t"
294 "mov %1, %%edx\n"
295 "frame_loop: test %%eax, %%eax\n\t"
296 "je frame_not_found\n\t"
297 "cmp (%%eax), %%edx\n\t"
298 "je frame_found\n\t"
299 "sub $0x1, %%ecx\n\t"
300 "je frame_not_found\n\t"
301 "movl (%%eax), %%eax\n\t"
302 "jmp frame_loop\n"
303 "frame_found: movl 0x4(%%eax), %0\n"
304 "frame_not_found:"
305 : "=r" (result)
306 : "r" (&sh4r)
307 : "eax", "ecx", "edx" );
308 return result;
309 }
312 #endif
.