Training courses

Kernel and Embedded Linux

Bootlin training courses

Embedded Linux, kernel,
Yocto Project, Buildroot, real-time,
graphics, boot time, debugging...

Bootlin logo

Elixir Cross Referencer


	dnl  AMD64 MULX/ADX simulation support.

dnl  Contributed to the GNU project by Torbjörn Granlund.

dnl  Copyright 2013 Free Software Foundation, Inc.

dnl  This file is part of the GNU MP Library.
dnl
dnl  The GNU MP Library is free software; you can redistribute it and/or modify
dnl  it under the terms of either:
dnl
dnl    * the GNU Lesser General Public License as published by the Free
dnl      Software Foundation; either version 3 of the License, or (at your
dnl      option) any later version.
dnl
dnl  or
dnl
dnl    * the GNU General Public License as published by the Free Software
dnl      Foundation; either version 2 of the License, or (at your option) any
dnl      later version.
dnl
dnl  or both in parallel, as here.
dnl
dnl  The GNU MP Library is distributed in the hope that it will be useful, but
dnl  WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
dnl  or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
dnl  for more details.
dnl
dnl  You should have received copies of the GNU General Public License and the
dnl  GNU Lesser General Public License along with the GNU MP Library.  If not,
dnl  see https://www.gnu.org/licenses/.


include(`../config.m4')

ASM_START()

C Fake the MULX instruction
C
C Accept the single explicit parameter on the stack, return the two result
C words on the stack.  This calling convention means that we need to move the
C return address up.
C
PROLOGUE(__gmp_mulx)
	lea	-8(%rsp), %rsp
	push	%rax
	push	%rdx
	pushfq				C preserve all flags
	mov	32(%rsp), %rax		C move retaddr...
	mov	%rax, 24(%rsp)		C ...up the stack
	mov	40(%rsp), %rax		C input parameter
	mul	%rdx
	mov	%rax, 32(%rsp)
	mov	%rdx, 40(%rsp)
	popfq				C restore eflags
	pop	%rdx
	pop	%rax
	ret
EPILOGUE()
PROTECT(__gmp_mulx)


C Fake the ADOX instruction
C
C Accept the two parameters on the stack, return the result word on the stack.
C This calling convention means that we need to move the return address down.
C
PROLOGUE(__gmp_adox)
	push	%rcx
	push	%rbx
	push	%rax
	mov	32(%rsp), %rcx		C src2
	mov	24(%rsp), %rax		C move retaddr...
	mov	%rax, 32(%rsp)		C ...down the stack
	pushfq
C copy 0(%rsp):11 to 0(%rsp):0
	mov	(%rsp), %rbx
	shr	%rbx
	bt	$10, %rbx
	adc	%rbx, %rbx
	push	%rbx
C put manipulated flags into eflags, execute a plain adc
	popfq
	adc	%rcx, 48(%rsp)
C copy CF to 0(%rsp):11
	pop	%rbx
	sbb	R32(%rax), R32(%rax)
	and	$0x800, R32(%rax)
	and	$0xfffffffffffff7ff, %rbx
	or	%rax, %rbx
	push	%rbx
C put manipulated flags into eflags
	popfq
	pop	%rax
	pop	%rbx
	pop	%rcx
	lea	8(%rsp), %rsp
	ret
EPILOGUE()
PROTECT(__gmp_adox)


C Fake the ADCX instruction
C
C Accept the two parameters on the stack, return the result word on the stack.
C This calling convention means that we need to move the return address down.
C
PROLOGUE(__gmp_adcx)
	push	%rcx
	push	%rbx
	push	%rax
	mov	32(%rsp), %rcx		C src2
	mov	24(%rsp), %rax		C move retaddr...
	mov	%rax, 32(%rsp)		C ...down the stack
	pushfq
	adc	%rcx, 48(%rsp)
	pop	%rbx
	sbb	R32(%rax), R32(%rax)
	and	$`'0xfffffffffffffffe, %rbx
	sub	%rax, %rbx
	push	%rbx
	popfq
	pop	%rax
	pop	%rbx
	pop	%rcx
	lea	8(%rsp), %rsp
	ret
EPILOGUE()
PROTECT(__gmp_adcx)