dnl AMD64 MULX/ADX simulation support.
dnl Contributed to the GNU project by Torbjörn Granlund.
dnl Copyright 2013 Free Software Foundation,
Inc.
dnl
This file is part of the GNU MP Library.
dnl
dnl The GNU MP Library is free software
; you can redistribute it and/or modify
dnl it under the terms of either:
dnl
dnl * the GNU Lesser General
Public License as published by the Free
dnl Software Foundation
; either version 3 of the License, or (at your
dnl
option) any later
version.
dnl
dnl
or
dnl
dnl * the GNU General
Public License as published by the Free Software
dnl Foundation
; either version 2 of the License, or (at your option) any
dnl later
version.
dnl
dnl
or both in parallel, as here.
dnl
dnl The GNU MP Library is distributed in the hope that it will be useful, but
dnl WITHOUT ANY WARRANTY
; without even the implied warranty of MERCHANTABILITY
dnl
or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU General
Public License
dnl
for more details.
dnl
dnl You should have received copies of the GNU General
Public License
and the
dnl GNU Lesser General
Public License along with the GNU MP Library.
If not,
dnl see
https://www.gnu.org/licenses/.
include(`../config.m4
')
ASM_START()
C Fake the MULX instruction
C
C Accept the single explicit parameter on the
stack, return the two result
C words on the
stack.
This calling convention means that we need to move the
C return address up.
C
PROLOGUE(__gmp_mulx)
lea -8(%rsp), %rsp
push %rax
push %rdx
pushfq C preserve all flags
mov 32(%rsp), %rax C move retaddr...
mov %rax, 24(%rsp) C ...up the
stack
mov 40(%rsp), %rax C input parameter
mul %rdx
mov %rax, 32(%rsp)
mov %rdx, 40(%rsp)
popfq C restore
eflags
pop %rdx
pop %rax
ret
EPILOGUE()
PROTECT(__gmp_mulx)
C Fake the ADOX instruction
C
C Accept the two parameters on the
stack, return the result
word on the
stack.
C
This calling convention means that we need to move the return address down.
C
PROLOGUE(__gmp_adox)
push %rcx
push %rbx
push %rax
mov 32(%rsp), %rcx C src2
mov 24(%rsp), %rax C move retaddr...
mov %rax, 32(%rsp) C ...down the
stack
pushfq
C copy 0(%rsp):11 to 0(%rsp):0
mov (%rsp), %rbx
shr %rbx
bt $10, %rbx
adc %rbx, %rbx
push %rbx
C put manipulated flags into
eflags, execute a plain
adc
popfq
adc %rcx, 48(%rsp)
C copy CF to 0(%rsp):11
pop %rbx
sbb R32(%rax), R32(%rax)
and $0x800, R32(%rax)
and $0xfffffffffffff7ff, %rbx
or %rax, %rbx
push %rbx
C put manipulated flags into
eflags
popfq
pop %rax
pop %rbx
pop %rcx
lea 8(%rsp), %rsp
ret
EPILOGUE()
PROTECT(__gmp_adox)
C Fake the ADCX instruction
C
C Accept the two parameters on the
stack, return the result
word on the
stack.
C
This calling convention means that we need to move the return address down.
C
PROLOGUE(__gmp_adcx)
push %rcx
push %rbx
push %rax
mov 32(%rsp), %rcx C src2
mov 24(%rsp), %rax C move retaddr...
mov %rax, 32(%rsp) C ...down the
stack
pushfq
adc %rcx, 48(%rsp)
pop %rbx
sbb R32(%rax), R32(%rax)
and $`
'0xfffffffffffffffe, %rbx
sub %rax, %rbx
push %rbx
popfq
pop %rax
pop %rbx
pop %rcx
lea 8(%rsp), %rsp
ret
EPILOGUE()
PROTECT(__gmp_adcx)