2002-09-13 19:53:22 +04:00
|
|
|
/////////////////////////////////////////////////////////////////////////
|
2002-11-21 21:22:03 +03:00
|
|
|
// $Id: ctrl_xfer64.cc,v 1.19 2002-11-21 18:22:03 bdenney Exp $
|
2002-09-13 19:53:22 +04:00
|
|
|
/////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Copyright (C) 2001 MandrakeSoft S.A.
|
|
|
|
//
|
|
|
|
// MandrakeSoft S.A.
|
|
|
|
// 43, rue d'Aboukir
|
|
|
|
// 75002 Paris - France
|
|
|
|
// http://www.linux-mandrake.com/
|
|
|
|
// http://www.mandrakesoft.com/
|
|
|
|
//
|
|
|
|
// This library is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
|
|
// License as published by the Free Software Foundation; either
|
|
|
|
// version 2 of the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
// Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public
|
|
|
|
// License along with this library; if not, write to the Free Software
|
|
|
|
// Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#define NEED_CPU_REG_SHORTCUTS 1
|
|
|
|
#include "bochs.h"
|
|
|
|
#define LOG_THIS BX_CPU_THIS_PTR
|
|
|
|
|
|
|
|
|
2002-11-19 08:47:45 +03:00
|
|
|
#if BX_SUPPORT_X86_64
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::RETnear64_Iw(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit16u imm16;
|
|
|
|
Bit64u temp_RSP;
|
|
|
|
Bit64u return_RIP;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_ret;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
temp_RSP = RSP;
|
|
|
|
|
2002-09-18 02:50:53 +04:00
|
|
|
imm16 = i->Iw();
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
//if ( !can_pop(8) ) {
|
|
|
|
// BX_PANIC(("retnear_iw: can't pop RIP"));
|
|
|
|
// /* ??? #SS(0) -or #GP(0) */
|
|
|
|
// }
|
|
|
|
|
|
|
|
access_linear(BX_CPU_THIS_PTR sregs[BX_SEG_REG_SS].cache.u.segment.base + temp_RSP + 0,
|
|
|
|
8, CPL==3, BX_READ, &return_RIP);
|
|
|
|
|
|
|
|
/* Pentium book says imm16 is number of words ??? */
|
|
|
|
//if ( !can_pop(8 + imm16) ) {
|
|
|
|
// BX_PANIC(("retnear_iw: can't release bytes from stack"));
|
|
|
|
// /* #GP(0) -or #SS(0) ??? */
|
|
|
|
// }
|
|
|
|
|
|
|
|
RIP = return_RIP;
|
|
|
|
RSP += 8 + imm16; /* ??? should it be 2*imm16 ? */
|
|
|
|
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_UCNEAR_BRANCH(CPU_ID, BX_INSTR_IS_RET, BX_CPU_THIS_PTR rip);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::RETnear64(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u temp_RSP;
|
|
|
|
Bit64u return_RIP;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_ret;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
temp_RSP = RSP;
|
|
|
|
|
|
|
|
//if ( !can_pop(8) ) {
|
|
|
|
// BX_PANIC(("retnear: can't pop RIP"));
|
|
|
|
// /* ??? #SS(0) -or #GP(0) */
|
|
|
|
// }
|
|
|
|
|
|
|
|
access_linear(BX_CPU_THIS_PTR sregs[BX_SEG_REG_SS].cache.u.segment.base + temp_RSP + 0,
|
|
|
|
8, CPL==3, BX_READ, &return_RIP);
|
|
|
|
|
|
|
|
RIP = return_RIP;
|
|
|
|
RSP += 8;
|
|
|
|
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_UCNEAR_BRANCH(CPU_ID, BX_INSTR_IS_RET, BX_CPU_THIS_PTR rip);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::RETfar64_Iw(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u rip, rcs_raw;
|
|
|
|
Bit16s imm16;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_ret;
|
|
|
|
#endif
|
|
|
|
/* ??? is imm16, number of bytes/words depending on operandsize ? */
|
|
|
|
|
2002-09-18 02:50:53 +04:00
|
|
|
imm16 = i->Iw();
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
#if BX_CPU_LEVEL >= 2
|
|
|
|
if (protected_mode()) {
|
|
|
|
BX_CPU_THIS_PTR return_protected(i, imm16);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
pop_64(&rip);
|
|
|
|
pop_64(&rcs_raw);
|
|
|
|
RIP = rip;
|
|
|
|
load_seg_reg(&BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS], (Bit16u) rcs_raw);
|
|
|
|
RSP += imm16;
|
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_RET,
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, BX_CPU_THIS_PTR rip);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::RETfar64(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u rip, rcs_raw;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_ret;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BX_CPU_LEVEL >= 2
|
|
|
|
if ( protected_mode() ) {
|
|
|
|
BX_CPU_THIS_PTR return_protected(i, 0);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
pop_64(&rip);
|
|
|
|
pop_64(&rcs_raw); /* 64bit pop, upper 48 bits discarded */
|
|
|
|
RIP = rip;
|
|
|
|
load_seg_reg(&BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS], (Bit16u) rcs_raw);
|
|
|
|
|
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_RET,
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, BX_CPU_THIS_PTR rip);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::CALL_Aq(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u new_RIP;
|
|
|
|
Bit32s disp32;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_call;
|
|
|
|
#endif
|
|
|
|
|
2002-09-18 02:50:53 +04:00
|
|
|
disp32 = i->Id();
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
new_RIP = RIP + disp32;
|
|
|
|
|
|
|
|
/* push 64 bit EA of next instruction */
|
|
|
|
push_64(BX_CPU_THIS_PTR rip);
|
|
|
|
RIP = new_RIP;
|
|
|
|
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_UCNEAR_BRANCH(CPU_ID, BX_INSTR_IS_CALL, BX_CPU_THIS_PTR rip);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::CALL64_Ap(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit16u cs_raw;
|
|
|
|
Bit32u disp32;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_call;
|
|
|
|
#endif
|
|
|
|
|
2002-09-18 02:50:53 +04:00
|
|
|
disp32 = i->Id();
|
|
|
|
cs_raw = i->Iw2();
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
if (protected_mode()) {
|
|
|
|
BX_CPU_THIS_PTR call_protected(i, cs_raw, disp32);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
push_64(BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value);
|
|
|
|
push_64(BX_CPU_THIS_PTR rip);
|
|
|
|
RIP = disp32;
|
|
|
|
load_seg_reg(&BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS], cs_raw);
|
|
|
|
|
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_CALL,
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, BX_CPU_THIS_PTR rip);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::CALL_Eq(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u temp_RSP;
|
|
|
|
Bit64u op1_64;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_call;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
temp_RSP = RSP;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
if (i->modC0()) {
|
|
|
|
op1_64 = BX_READ_64BIT_REG(i->rm());
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
read_virtual_qword(i->seg(), RMAddr(i), &op1_64);
|
|
|
|
}
|
2002-09-13 19:53:22 +04:00
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
push_64(BX_CPU_THIS_PTR rip);
|
|
|
|
RIP = op1_64;
|
2002-09-13 19:53:22 +04:00
|
|
|
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_UCNEAR_BRANCH(CPU_ID, BX_INSTR_IS_CALL, BX_CPU_THIS_PTR rip);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::CALL64_Ep(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit16u cs_raw;
|
|
|
|
Bit64u op1_64;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_call;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* op1_64 is a register or memory reference */
|
2002-09-20 07:52:59 +04:00
|
|
|
if (i->modC0()) {
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_PANIC(("CALL_Ep: op1 is a register"));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* pointer, segment address pair */
|
2002-09-18 09:36:48 +04:00
|
|
|
read_virtual_qword(i->seg(), RMAddr(i), &op1_64);
|
|
|
|
read_virtual_word(i->seg(), RMAddr(i)+8, &cs_raw);
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
if ( protected_mode() ) {
|
|
|
|
BX_CPU_THIS_PTR call_protected(i, cs_raw, op1_64);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
push_64(BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value);
|
|
|
|
push_64(BX_CPU_THIS_PTR rip);
|
|
|
|
|
|
|
|
RIP = op1_64;
|
|
|
|
load_seg_reg(&BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS], cs_raw);
|
|
|
|
|
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_CALL,
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, BX_CPU_THIS_PTR rip);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::JMP_Jq(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-18 02:50:53 +04:00
|
|
|
RIP += (Bit32s) i->Id();
|
2002-09-27 11:01:02 +04:00
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_UCNEAR_BRANCH(CPU_ID, BX_INSTR_IS_JMP, RIP);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::JCC_Jq(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
2002-10-25 15:44:41 +04:00
|
|
|
bx_bool condition;
|
2002-09-13 19:53:22 +04:00
|
|
|
|
2002-09-18 12:00:43 +04:00
|
|
|
switch (i->b1() & 0x0f) {
|
2002-09-13 19:53:22 +04:00
|
|
|
case 0x00: /* JO */ condition = get_OF(); break;
|
|
|
|
case 0x01: /* JNO */ condition = !get_OF(); break;
|
|
|
|
case 0x02: /* JB */ condition = get_CF(); break;
|
|
|
|
case 0x03: /* JNB */ condition = !get_CF(); break;
|
|
|
|
case 0x04: /* JZ */ condition = get_ZF(); break;
|
|
|
|
case 0x05: /* JNZ */ condition = !get_ZF(); break;
|
|
|
|
case 0x06: /* JBE */ condition = get_CF() || get_ZF(); break;
|
|
|
|
case 0x07: /* JNBE */ condition = !get_CF() && !get_ZF(); break;
|
|
|
|
case 0x08: /* JS */ condition = get_SF(); break;
|
|
|
|
case 0x09: /* JNS */ condition = !get_SF(); break;
|
|
|
|
case 0x0A: /* JP */ condition = get_PF(); break;
|
|
|
|
case 0x0B: /* JNP */ condition = !get_PF(); break;
|
2002-09-22 22:22:24 +04:00
|
|
|
case 0x0C: /* JL */ condition = getB_SF() != getB_OF(); break;
|
|
|
|
case 0x0D: /* JNL */ condition = getB_SF() == getB_OF(); break;
|
|
|
|
case 0x0E: /* JLE */ condition = get_ZF() || (getB_SF() != getB_OF());
|
2002-09-13 19:53:22 +04:00
|
|
|
break;
|
2002-09-22 22:22:24 +04:00
|
|
|
case 0x0F: /* JNLE */ condition = (getB_SF() == getB_OF()) &&
|
2002-09-13 19:53:22 +04:00
|
|
|
!get_ZF();
|
|
|
|
break;
|
2002-09-22 05:52:21 +04:00
|
|
|
default:
|
|
|
|
condition = 0; // For compiler...all targets should set condition.
|
|
|
|
break;
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (condition) {
|
|
|
|
|
2002-09-18 02:50:53 +04:00
|
|
|
RIP += (Bit32s) i->Id();
|
2002-09-27 11:01:02 +04:00
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-13 19:53:22 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef ignore
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::JMP64_Ap(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u disp64;
|
|
|
|
Bit16u cs_raw;
|
|
|
|
|
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-18 09:36:48 +04:00
|
|
|
if (i->os32L()) {
|
2002-09-18 02:50:53 +04:00
|
|
|
disp64 = (Bit32s) i->Id();
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
else {
|
2002-09-18 02:50:53 +04:00
|
|
|
disp64 = (Bit16s) i->Iw();
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
2002-09-18 02:50:53 +04:00
|
|
|
cs_raw = i->Iw2();
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
#if BX_CPU_LEVEL >= 2
|
|
|
|
if (protected_mode()) {
|
|
|
|
BX_CPU_THIS_PTR jump_protected(i, cs_raw, disp32);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
load_seg_reg(&BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS], cs_raw);
|
|
|
|
RIP = disp64;
|
|
|
|
|
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_JMP,
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, BX_CPU_THIS_PTR rip);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::JMP_Eq(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit64u op1_64;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-20 07:52:59 +04:00
|
|
|
if (i->modC0()) {
|
2002-09-18 02:50:53 +04:00
|
|
|
op1_64 = BX_READ_64BIT_REG(i->rm());
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
else {
|
2002-09-18 09:36:48 +04:00
|
|
|
read_virtual_qword(i->seg(), RMAddr(i), &op1_64);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
RIP = op1_64;
|
|
|
|
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_UCNEAR_BRANCH(CPU_ID, BX_INSTR_IS_JMP, RIP);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Far indirect jump */
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::JMP64_Ep(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit16u cs_raw;
|
|
|
|
Bit64u op1_64;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-20 07:52:59 +04:00
|
|
|
if (i->modC0()) {
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_PANIC(("JMP_Ep(): op1 is a register"));
|
|
|
|
}
|
|
|
|
|
2002-09-18 09:36:48 +04:00
|
|
|
read_virtual_qword(i->seg(), RMAddr(i), &op1_64);
|
|
|
|
read_virtual_word(i->seg(), RMAddr(i)+8, &cs_raw);
|
2002-09-13 19:53:22 +04:00
|
|
|
|
|
|
|
if ( protected_mode() ) {
|
|
|
|
BX_CPU_THIS_PTR jump_protected(i, cs_raw, op1_64);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
RIP = op1_64;
|
|
|
|
load_seg_reg(&BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS], cs_raw);
|
|
|
|
|
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_JMP,
|
2002-09-15 19:10:21 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, RIP);
|
2002-09-13 19:53:22 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2002-09-18 02:50:53 +04:00
|
|
|
BX_CPU_C::IRET64(bxInstruction_c *i)
|
2002-09-13 19:53:22 +04:00
|
|
|
{
|
|
|
|
Bit32u rip, ecs_raw, eflags;
|
|
|
|
|
I integrated my hacks to get Linux/x86-64 booting. To keep
these from interfering from a normal compile here's what I did.
In config.h.in (which will generate config.h after a configure),
I added a #define called KPL64Hacks:
#define KPL64Hacks
*After* running configure, you must set this by hand. It will
default to off, so you won't get my hacks in a normal compile.
This will go away soon. There is also a macro just after that
called BailBigRSP(). You don't need to enabled that, but you
can. In many of the instructions which seemed like they could
be hit by the fetchdecode64() process, but which also touched
EIP/ESP, I inserted a macro. Usually this macro expands to nothing.
If you like, you can enabled it, and it will panic if it finds
the upper bits of RIP/RSP set. This helped me find bugs.
Also, I cleaned up the emulation in ctrl_xfer{8,16,32}.cc.
There were some really old legacy code snippets which directly
accessed operands on the stack with access_linear. Lots of
ugly code instead of just pop_32() etc. Cleaning those up,
minimized the number of instructions which directly manipulate
the stack pointer, which should help in refining 64-bit support.
2002-09-24 04:44:56 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
BX_CPU_THIS_PTR show_flag |= Flag_iret;
|
|
|
|
BX_CPU_THIS_PTR show_eip = BX_CPU_THIS_PTR rip;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BX_CPU_LEVEL >= 2
|
|
|
|
if (BX_CPU_THIS_PTR cr0.pe) {
|
|
|
|
iret_protected(i);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
#endif
|
2002-09-16 21:00:16 +04:00
|
|
|
|
|
|
|
|
2002-09-13 19:53:22 +04:00
|
|
|
done:
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_FAR_BRANCH(CPU_ID, BX_INSTR_IS_IRET,
|
2002-09-13 19:53:22 +04:00
|
|
|
BX_CPU_THIS_PTR sregs[BX_SEG_REG_CS].selector.value, BX_CPU_THIS_PTR rip);
|
|
|
|
}
|
2002-09-27 11:01:02 +04:00
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
BX_CPU_C::JCXZ64_Jb(bxInstruction_c *i)
|
|
|
|
{
|
|
|
|
if (i->as64L()) {
|
|
|
|
if ( RCX == 0 ) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-11-21 21:22:03 +03:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if ( ECX == 0 ) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-11-21 21:22:03 +03:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
BX_CPU_C::LOOPNE64_Jb(bxInstruction_c *i)
|
|
|
|
{
|
|
|
|
if (i->as64L()) {
|
|
|
|
|
|
|
|
if ( ((--RCX)!=0) && (get_ZF()==0) ) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if ( ((--ECX)!=0) && (get_ZF()==0) ) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-11-21 21:22:03 +03:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
BX_CPU_C::LOOPE64_Jb(bxInstruction_c *i)
|
|
|
|
{
|
|
|
|
if (i->as64L()) {
|
|
|
|
|
|
|
|
if ( ((--RCX)!=0) && (get_ZF()) ) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if ( ((--ECX)!=0) && get_ZF()) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-11-21 21:22:03 +03:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
BX_CPU_C::LOOP64_Jb(bxInstruction_c *i)
|
|
|
|
{
|
|
|
|
if (i->as64L()) {
|
|
|
|
|
|
|
|
if ((--RCX) != 0) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-09-28 04:54:05 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if ((--ECX) != 0) {
|
|
|
|
RIP += (Bit32s) i->Id();
|
|
|
|
if (i->os32L()==0)
|
|
|
|
RIP &= 0xffff; // For 16-bit opSize, upper 48 bits of RIP are cleared.
|
2002-11-21 21:22:03 +03:00
|
|
|
BX_INSTR_CNEAR_BRANCH_TAKEN(CPU_ID, RIP);
|
2002-09-27 11:01:02 +04:00
|
|
|
revalidate_prefetch_q();
|
|
|
|
}
|
|
|
|
#if BX_INSTRUMENTATION
|
|
|
|
else {
|
2002-09-29 19:06:58 +04:00
|
|
|
BX_INSTR_CNEAR_BRANCH_NOT_TAKEN(CPU_ID);
|
2002-09-27 11:01:02 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
2002-11-19 08:47:45 +03:00
|
|
|
#endif /* if BX_SUPPORT_X86_64 */
|