1e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch// Copyright 2011 the V8 project authors. All rights reserved.
2a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// Redistribution and use in source and binary forms, with or without
3a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// modification, are permitted provided that the following conditions are
4a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// met:
5a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//
6a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//     * Redistributions of source code must retain the above copyright
7a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//       notice, this list of conditions and the following disclaimer.
8a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//     * Redistributions in binary form must reproduce the above
9a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//       copyright notice, this list of conditions and the following
10a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//       disclaimer in the documentation and/or other materials provided
11a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//       with the distribution.
12a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//     * Neither the name of Google Inc. nor the names of its
13a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//       contributors may be used to endorse or promote products derived
14a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//       from this software without specific prior written permission.
15a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block//
16a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
17a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
18a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
19a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
20a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
26a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block
28a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#ifndef V8_X64_SIMULATOR_X64_H_
29a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#define V8_X64_SIMULATOR_X64_H_
30a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block
31a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#include "allocation.h"
32a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block
335913587db4c6bab03d97bfe44b06289fd6d7270dJohn Recknamespace v8 {
345913587db4c6bab03d97bfe44b06289fd6d7270dJohn Recknamespace internal {
355913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck
365913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck// Since there is no simulator for the x64 architecture the only thing we can
37a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// do is to call the entry directly.
38a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// TODO(X64): Don't pass p0, since it isn't used?
39a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#define CALL_GENERATED_CODE(entry, p0, p1, p2, p3, p4) \
405913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck  (entry(p0, p1, p2, p3, p4))
415913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck
42e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdochtypedef int (*regexp_matcher)(String*, int, const byte*,
4344f0eee88ff00398ff7f715fab053374d808c90dSteve Block                              const byte*, int*, Address, int, Isolate*);
44e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch
45e0cee9b3ed82e2391fd85d118aeaa4ea361c687dBen Murdoch// Call the generated regexp code directly. The code at the entry address should
4644f0eee88ff00398ff7f715fab053374d808c90dSteve Block// expect eight int/pointer sized arguments and return an int.
4744f0eee88ff00398ff7f715fab053374d808c90dSteve Block#define CALL_GENERATED_REGEXP_CODE(entry, p0, p1, p2, p3, p4, p5, p6, p7) \
4844f0eee88ff00398ff7f715fab053374d808c90dSteve Block  (FUNCTION_CAST<regexp_matcher>(entry)(p0, p1, p2, p3, p4, p5, p6, p7))
495913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck
505913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck#define TRY_CATCH_FROM_ADDRESS(try_catch_address) \
515913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck  (reinterpret_cast<TryCatch*>(try_catch_address))
52a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block
53a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// The stack limit beyond which we will throw stack overflow errors in
54a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// generated code. Because generated code on x64 uses the C stack, we
55a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block// just use the C stack limit.
56a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Blockclass SimulatorStack : public v8::internal::AllStatic {
57a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block public:
58257744e915dfc84d6d07a6b2accf8402d9ffc708Ben Murdoch  static inline uintptr_t JsLimitFromCLimit(Isolate* isolate,
59257744e915dfc84d6d07a6b2accf8402d9ffc708Ben Murdoch                                            uintptr_t c_limit) {
60a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block    return c_limit;
61a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block  }
62d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block
63d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block  static inline uintptr_t RegisterCTryCatch(uintptr_t try_catch_address) {
64d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block    return try_catch_address;
65d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block  }
66d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block
67d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block  static inline void UnregisterCTryCatch() { }
68a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block};
69a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block
705913587db4c6bab03d97bfe44b06289fd6d7270dJohn Reck} }  // namespace v8::internal
71d0582a6c46733687d045e4188a1bcd0123c758a1Steve Block
72a7e24c173cf37484693b9abb38e494fa7bd7baebSteve Block#endif  // V8_X64_SIMULATOR_X64_H_
73