filename | src/syscall.c |
changeset | 736:a02d1475ccfd |
prev | 669:ab344e42bca9 |
next | 1065:bc1cc0c54917 |
author | nkeynes |
date | Sat Dec 27 02:59:35 2008 +0000 (15 years ago) |
branch | lxdream-mem |
permissions | -rw-r--r-- |
last change | Replace fpscr_mask/fpscr flags in xlat_cache_block with a single xlat_sh4_mode, which tracks the field of the same name in sh4r - actually a little faster this way. Now depends on SR.MD, FPSCR.PR and FPSCR.SZ (although it doesn't benefit from the SR flag yet). Also fixed the failure to check the flags in the common case (code address returned by previous block) which took away the performance benefits, but oh well. |
view | annotate | diff | log | raw |
1 /**
2 * $Id$
3 *
4 * Routines to add hook functions that are callable from the SH4
5 *
6 * Copyright (c) 2005 Nathan Keynes.
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 */
19 #include "lxdream.h"
20 #include "mem.h"
21 #include "syscall.h"
22 #include "sh4/sh4.h"
25 struct syscall_hook {
26 syscall_hook_func_t hook;
27 sh4addr_t vector;
28 } syscall_hooks[256];
30 void syscall_add_hook( uint32_t hook_id, syscall_hook_func_t hook )
31 {
32 hook_id &= 0xFF;
33 if( syscall_hooks[hook_id].hook != NULL )
34 WARN( "Overwriting existing hook %02X", hook_id );
35 syscall_hooks[hook_id].hook = hook;
36 syscall_hooks[hook_id].vector = 0;
37 }
39 void syscall_add_hook_vector( uint32_t hook_id, uint32_t vector_addr,
40 syscall_hook_func_t hook )
41 {
42 hook_id &= 0xFF;
43 syscall_add_hook( hook_id, hook );
44 syscall_hooks[hook_id].vector = vector_addr;
45 mem_write_long( vector_addr, 0xFFFFFF00 + hook_id );
46 }
48 void syscall_invoke( uint32_t hook_id )
49 {
50 hook_id &= 0xFF;
51 syscall_hook_func_t hook = syscall_hooks[hook_id].hook;
52 if( hook == NULL ) {
53 WARN( "Invoked non-existent hook %02X", hook_id );
54 } else {
55 hook(hook_id);
56 }
57 }
59 void syscall_repatch_vectors( )
60 {
61 int i;
62 for( i=0; i<256; i++ ) {
63 if( syscall_hooks[i].hook != NULL &&
64 syscall_hooks[i].vector != 0 ) {
65 mem_write_long( syscall_hooks[i].vector, 0xFFFFFF00 + i );
66 }
67 }
68 }
.