1a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// Copyright 2008 the V8 project authors. All rights reserved. 2a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// Redistribution and use in source and binary forms, with or without 3a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// modification, are permitted provided that the following conditions are 4a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// met: 5a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// 6a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// * Redistributions of source code must retain the above copyright 7a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// notice, this list of conditions and the following disclaimer. 8a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// * Redistributions in binary form must reproduce the above 9a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// copyright notice, this list of conditions and the following 10a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// disclaimer in the documentation and/or other materials provided 11a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// with the distribution. 12a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// * Neither the name of Google Inc. nor the names of its 13a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// contributors may be used to endorse or promote products derived 14a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// from this software without specific prior written permission. 15a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// 16a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 17a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 18a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 19a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 20a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 21a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 22a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 26a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block 28a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#ifndef V8_IA32_SIMULATOR_IA32_H_ 29a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#define V8_IA32_SIMULATOR_IA32_H_ 30a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block 31a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#include "allocation.h" 32a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block 335913587db4c6bab03d97bfe44b06289fd6d7270dJohn Recknamespace v8 { 345913587db4c6bab03d97bfe44b06289fd6d7270dJohn Recknamespace internal { 355913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck 36a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// Since there is no simulator for the ia32 architecture the only thing we can 37a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// do is to call the entry directly. 38a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#define CALL_GENERATED_CODE(entry, p0, p1, p2, p3, p4) \ 395913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck (entry(p0, p1, p2, p3, p4)) 405913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck 41e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch 42e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdochtypedef int (*regexp_matcher)(String*, int, const byte*, 4344f0eee88ff00398ff7f715fab053374d808c90dSteve Block const byte*, int*, Address, int, Isolate*); 44e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch 45e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch// Call the generated regexp code directly. The code at the entry address should 4644f0eee88ff00398ff7f715fab053374d808c90dSteve Block// expect eight int/pointer sized arguments and return an int. 4744f0eee88ff00398ff7f715fab053374d808c90dSteve Block#define CALL_GENERATED_REGEXP_CODE(entry, p0, p1, p2, p3, p4, p5, p6, p7) \ 4844f0eee88ff00398ff7f715fab053374d808c90dSteve Block (FUNCTION_CAST<regexp_matcher>(entry)(p0, p1, p2, p3, p4, p5, p6, p7)) 49e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch 505913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck 515913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck#define TRY_CATCH_FROM_ADDRESS(try_catch_address) \ 525913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck (reinterpret_cast<TryCatch*>(try_catch_address)) 53a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block 54a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// The stack limit beyond which we will throw stack overflow errors in 55a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// generated code. Because generated code on ia32 uses the C stack, we 56a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// just use the C stack limit. 57a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Blockclass SimulatorStack : public v8::internal::AllStatic { 58a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block public: 59257744e915dfc84d6d07a6b2accf8402d9ffc708Ben Murdoch static inline uintptr_t JsLimitFromCLimit(Isolate* isolate, 60257744e915dfc84d6d07a6b2accf8402d9ffc708Ben Murdoch uintptr_t c_limit) { 61257744e915dfc84d6d07a6b2accf8402d9ffc708Ben Murdoch USE(isolate); 62a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block return c_limit; 63a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block } 64d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block 65d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block static inline uintptr_t RegisterCTryCatch(uintptr_t try_catch_address) { 66d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block return try_catch_address; 67d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block } 68d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block 69d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block static inline void UnregisterCTryCatch() { } 70a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block}; 71a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block 725913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck} } // namespace v8::internal 73d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block 74a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#endif // V8_IA32_SIMULATOR_IA32_H_ 75