Exception, interrupt, and trap handling apparatus which fetches addressing and context data using a single instruction following an interrupt

Information

  • Patent Grant
  • 5182811
  • Patent Number
    5,182,811
  • Date Filed
    Tuesday, July 10, 1990
    34 years ago
  • Date Issued
    Tuesday, January 26, 1993
    31 years ago
Abstract
A data processor executes the exception process, interrupt process and the trap instruction of internal interrupt instructions in a unified manner. The data processor is adapted to read an internal state variable simultaneously with reading the head address of an EIT process handler from an external memory when an EIT process is started so that it enables the internal state to be set on the basis of the information of the variable when the EIT process handler starts. The data processor is provided with multiple EIT process means which, when a plurality of EIT process requests are generated, decides the process order on the basis of priority from the content of the request. The data processor is also provided with means which specially treats the EIT process acceptance condition after returning from one EIT process handler, and thereby is generously free in programming.
Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a data processor, and more particularly to a data processor which performs in a unified manner the exception processing of interrupt process and the trap instruction of internal interrupt instruction.
2. Description of the Prior Art
In the conventional data processor provided with an EIT process, a mechanism, such as an interrupt process mechanism, an exception process mechanism and an internal interrupt instruction process mechanism, when an EIT process request occurs is accepted to start the EIT process. After the information showing the internal state is saved to an external memory, an internal register value is automatically reloaded onto a value of an internal state variable previously determined as a function of the data processor, thereby performing the processing. A flow chart of the conventional EIT process starting method is shown in FIG. 1. Upon accepting an EIT process request at a step 1007 in FIG. 1, at a step 1008 an address of the external memory in the data processor in which the head address of an EIT process handler is stored is generated, and at a step 1009 a program status word (to be hereinafter referred to as PSW), which reads the head address of the EIT process handler and stores data showing the internal state of the data processor, is updated into a predetermined value for the EIT process in the data processor. For example, when the external interrupt is accepted, the variable showing the acceptance priority level of external interrupt in the PSW is automatically reloaded for the purpose of inhibiting the acceptance of external interrupt with higher priority level than that of the accepted external interrupt until the EIT process ends. Next, at a step 1010 in FIG. 1, the internal state of the data processor is saved to the stack, and thereafter at a step 1011 the EIT process handler previously programmed with respect to the content of the EIT is started.
Such method, however, uniquely decides the internal state of the data processor when the EIT process handler starts, so that a programmer is largely restricted. Especially it is complicated for him to set the state of the data processor where a multiple EIT process is carried out. In other words, as above-mentioned, the EIT process handler has hitherto started only under the internal state predetermined by the data processor, which has been one restriction on programming for the programmer. Also, the programmer had to fully recognize the internal state of the data processor when the EIT process handler starts, and sometimes needed to change by himself the internal state variable, whereby the processing has been troublesome.
SUMMARY OF THE INVENTION
In order to solve the above problem, the data processor of the present invention has been designed. The object of this invention is to provide a data processor which is adapted to read some of internal state variables, usually stored in PSW 2010, of the data processor with the head address of the EIT process handler from the external memory 2020 when an EIT process is started, and which has multiple EIT process 2022 means which determines the process order according to the content of the EIT process when there are a plurality of EIT process requests, and which has a device for specially treating the EIT process acceptance condition after restoring from one EIT process handler, thereby facilitating programming.
The data processor of the present invention which processes programs comprising a plurality of instructions, is characterized by; providing a device for accepting at the boundary of each instruction processing an interrupt request signal from the exterior by detecting the interrupt process, a device for detecting exceptional events of instructions, and a device for detecting a trap process, execution of an internal interrupt instruction 2024, so that a plurality of EIT processes sorted to either one of the above three kinds of processes can each have an inherent priority and processing method; having a device for selecting which EIT process, among the EITs detected corresponding to the above-mentioned priority, is started 2022, a device for storing 2024 in an external memory 2020 the first information group to be an internal state that is the initial state of the selected EIT process, and a device for generating 2026 the head address of each EIT process uniquely and storing in the generated address of the external memory a second information group to be a candidate for part or all of a new internal state with the head address of the EIT process handler when the EIT process handler starts in execution, with respect to each selected EIT process.
The data processor of the invention can read from the external memory 2020 the internal state variable of the data processor together with the head address of the EIT process handler, so that the programmer can beforehand write-in the internal sate variable of the data processor when each EIT process is carried out together with the head address of the EIT process handler, at a ratio of 1 to 1 with respect to each EIT process, thereby enabling the internal state of the data processor to be programmed separately in each EIT process. Since the internal state variable is positioned adjacently to the head address of the EIT process handler and automatically read during the EIT processing, the programmer need not separately specify reload of the internal state variable for every EIT process. Also, such function includes information specifying the priority of an EIT process in the stored internal state variable, whereby when multiple EIT processes occur, an EIT process of higher priority can inhibit start of an EIT process of lower priority. Thus, as above-mentioned, the programmer can specify a wide process without difficulty. Also, the function of especially treating the detection process of an EIT process after execution thereof is provided so that, when the exception process carries out single step execution, the repeated occurrence of an EIT process not to proceed with the instruction execution can be avoided.
The above and further objects and features of the invention will more fully be apparent from the following detailed description with accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a flow chart of an EIT process starting method of a conventional data processor,
FIG. 2 is a flow chart of an EIT process starting method of a data processor in the present invention,
FIG. 3 shows a format of EITVTE including the head address of an EIT process handler fetched from an external memory and part of an internal state variable of the data processor when the EIT process occurs in a data processor of the invention,
FIG. 4 shows a stack format made when the EIT process of the data processor of the invention starts,
FIG. 5 shows a stack format corresponding to the kind of the EIT process at the data processor of the invention, and
FIG. 6 shows a stack format and PC and PSW data formed when the data processor of the invention performs the multiple EIT process.
FIG. 7 is an illustration of a register set of the same,
FIG. 8 is an illustration of data type of bits of the same,
FIG. 9 is an illustration of data type as to a bit field of the same,
FIG. 10 is an illustration of data type as to the bit field of unsigned number of the same,
FIG. 11 is an illustration of data type as to the integer of the same,
FIG. 12 is an illustration of data type as to the decimal number of the same,
FIG. 13 is an illustration of data type as to a string of the same,
FIG. 14 is an illustration of data type as to a queue at the same,
FIG. 15 is an illustration exemplary of description of the instruction format of the same,
FIG. 16 shows a bit pattern thereof,
FIGS. 17 to 27 show instruction formats of the data processor of the invention respectively,
FIGS. 28 to 39 show the format of the addressing mode of the same,
FIG. 40 is an illustration exemplary of arrangement of local variations of the same,
FIGS. 41 to 44 show the format of the addressing mode of the same,
FIG. 45 is an illustration of cautioun at the instruction MOV,
FIG. 46 shows the format of PSW,
FIG. 47 shows the format of PSS,
FIG. 48 shows the format of PSH,
FIG. 49 shows the format of description example of the instruction set,
FIG. 50 (a) shows the format of instruction MOV,
FIG. 50 (b) is an illustration of status flags thereof,
FIG. 51 shows the format of instruction MOVU,
FIG. 52 is an illustration of the flag change thereof,
FIG. 53 shows the format of instruction PUSH,
FIG. 54 is an illustration of the flag change thereof,
FIG. 55 shows the format of instruction POP,
FIG. 56 is an illustration of the flag change,
FIG. 57 shows the format of the instruction LDM,
FIG. 58 is an illustration of the flag change thereof,
FIG. 59 is an illustration of bit map specifying,
FIG. 60 shows the format of an instruction STM,
FIG. 61 is an illustration of flag change thereof,
FIGS. 62 and 63 are illustrations of the bit map specifying,
FIG. 64 shows the format of the instruction MOVA,
FIG. 65 is an illustration of flag change thereof,
FIG. 66 shows the format of instruction PUSHA,
FIG. 67 is an illustration of flag change thereof,
FIG. 68 shows the format of instruction CMP,
FIG. 69 is an illustration of flag change thereof,
FIG. 70 shows the format of instruction CMPU,
FIG. 71 is an illustration of flag change thereof,
FIG. 72 shows the format of instruction CHK,
FIG. 73 is an illustration of flag change thereof,
FIG. 74 is an illustration of operation by the instruction CHK,
FIG. 75 shows the format of instruction ADD,
FIG. 76 is an illustration of flag change,
FIG. 77 shows the format of instruction ADDU,
FIG. 78 is an illustration of flag change thereof,
FIG. 79 shows the format of instruction ADDX,
FIG. 80 is an illustration of flag change thereof,
FIG. 81 shows the format of instruction SUB,
FIG. 82 is an illustration of flag change thereof,
FIG. 83 shows the format of instruction SUBU,
FIG. 84 is an illustration of flag change thereof,
FIG. 85 shows the format of instruction SUBX,
FIG. 86 is an illustration of flag change thereof,
FIG. 87 shows the format of instruction MUL,
FIG. 88 is an illustration of flag change thereof,
FIG. 89 shows the format of instruction MULU,
FIG. 90 is an illustration of flag change thereof,
FIG. 91 shows the format of instruction MULX,
FIG. 92 is an illustration of flag change thereof,
FIG. 93 shows the format of instruction DIV,
FIG. 94 is an illustration of flag change thereof,
FIG. 95 shows the format of instruction DIVU,
FIG. 96 is an illustration of flag change thereof,
FIG. 97 is a view showing the format of instruction DIVX,
FIG. 98 is an illustration of flag change thereof,
FIG. 99 is a view of format of instruction REM,
FIG. 100 is an illustration of flag change thereof,
FIG. 101 is a view of the format of instruction REMU,
FIG. 102 is an illustration of flag change thereof,
FIG. 103 shows the format of instruction NEG,
FIG. 104 is an illustration of flag change thereof,
FIG. 105 is a view of the format of instruction INDZX,
FIG. 106 is an illustration of flag change thereof,
FIG. 107 is a view of the format of instruction AND,
FIG. 108 is an illustration of flag change thereof,
FIG. 109 is a view of the format of instruction OR,
FIG. 110 is an illustration of flag change thereof,
FIG. 111 is a view of the format of instruction XOR,
FIG. 112 is an illustration of flag change thereof,
FIG. 113 is a view of the format of instruction NOT,
FIG. 114 is an illustration of flag change thereof,
FIG. 115 is a view of the format of instruction SHA,
FIG. 116 is an illustration of flag change thereof,
FIG. 117 is an illustration of the left-side shift,
FIG. 118 is an illustration of the right-side shift,
FIG. 119 is a view of the format of instruction SHL,
FIG. 120 is an illustration of flag change thereof,
FIG. 121 is an illustration of the left-side shift,
FIG. 122 is an illustration of the right-side shift,
FIG. 123 is a view of the format of instruction ROT,
FIG. 124 is an illustration of flag change thereof,
FIG. 125 is an illustration of counterclockwise rotation,
FIG. 126 is an illustration of clockwise rotation,
FIG. 127 is a view of the format of instruction SHXL,
FIG. 128 is an illustration of flag change thereof,
FIG. 129 is a view of the format of instruction XHXL,
FIG. 130 is an illustration of flag change thereof,
FIG. 131 is a view of the format of instruction SHXR,
FIG. 132 is a view of the format of instruction SHXR,
FIG. 133 is a view of the format of instruction RVBY,
FIG. 134 is an illustration of flag change thereof,
FIG. 135 is a view of the format of instruction RVBI,
FIG. 136 is an illustration of flag change thereof,
FIGS. 137 and 138 are illustrations of bit operation instruction,
FIG. 139 is a view of the format of instruction BTST,
FIG. 140 is an illustration of flag change thereof,
FIG. 141 is a view of the format of instruction BSET,
FIG. 142 is an illustration of flag change thereof,
FIG. 143 is a view of the format of instruction BCLR,
FIG. 144 is an illustration of flag change thereof,
FIG. 145 is a view of the format of instruction BNOT,
FIG. 146 is an illustration of flag change thereof,
FIG. 147 is a view of the format of instruction BSCH,
FIG. 148 is an illustration of flag change thereof,
FIG. 149 is an illustration of fixed length bit field operation instruction,
FIGS. 150(a-b) is a view of the format of instruction of bit field instruction,
FIG. 151 is a view of the format of instruction BFEXT,
FIG. 152 is an illustration of flag change thereof,
FIG. 153 is a view of the format of instruction BFEXTU,
FIG. 154 is an illustration of flag change thereof,
FIG. 155 is a view of the format of instruction BFINS,
FIG. 156 is an illustration of flag change thereof,
FIG. 157 is a view of the format of instruction BFINSU,
FIG. 158 is an illustration of flag change thereof,
FIG. 159 is a view of the format of instruction BFCMP,
FIG. 160 is an illustration of flag change thereof,
FIG. 161 is a view of the format of instruction BFCMPU,
FIG. 162 is an illustration of flag change thereof,
FIGS. 163(a-b) are views of the format of instruction BVSCH,
FIG. 164 is an illustration of flag change thereof,
FIG. 165 is a view of the format of instruction BVMAP,
FIG. 166 is an illustration of flag change thereof,
FIGS. 167 to 169 are views of format of instruction BVMAT,
FIG. 170 is a view of the format of instruction BVCPY,
FIG. 171 is an illustration of flag change thereof,
FIG. 172 is a view of the format of instruction BVPAT,
FIG. 173 is an illustration of flag change thereof,
FIG. 174 is a view of the format of instruction ADDDX,
FIG. 175 is an illustration of flag change thereof,
FIG. 176 is a view of the format of instruction SUBDX,
FIG. 177 is an illustration of flag change thereof,
FIG. 178 is a view of the format of instruction PACKss,
FIG. 179 is an illustration of flag change thereof,
FIG. 180 is a view of the format of instruction UNPKss,
FIG. 181 is an illustration of flag change thereof,
FIG. 182 is an illustration of instruction UNPKss,
FIG. 183 is an illustration of termination condition,
FIG. 184 is a view of the format of instruction SMOV,
FIG. 185 is an illustration of flag change thereof,
FIG. 186 is an illustration of instruction SCMP,
FIGS. 187 and 188 are illustrations of flag change thereof,
FIG. 189 is a view of the format of instruction SSCH,
FIG. 190 is an illustration of the flag change thereof,
FIG. 191 is a view of the format of the instruction SSTR,
FIG. 192 is an illustration of the flag change thereof,
FIG. 193 is a view of the format of instruction QINS,
FIG. 194 is an illustration of the flag change thereof,
FIGS. 195 to 197 are illustrations of the instruction QINS,
FIG. 198 is a view of the format of instruction QDEL,
FIG. 199 is an illustration of the flag change thereof,
FIGS. 200 to 202 are illustrations of the instruction QDEL,
FIGS. 203(a-b) is a view of the format of instruction QSCH,
FIG. 204 is an illustration of the flag change thereof,
FIGS. 205(a-b), 206, and 207 are illustrations of the instruction QSCH,
FIG. 208 is a view of the format of instruction BRA,
FIG. 209 is an illustration of the flag change thereof,
FIG. 210 is a view of the format of instruction Bcc,
FIG. 211 is an illustration of the flag change thereof,
FIG. 212 is an illustration of the detail and mnemonic of the portions,
FIG. 213 is a view of the format of instruction BSR,
FIG. 214 is an illustration of the flag change thereof,
FIG. 215 is a view of the format of instruction JMP,
FIG. 216 is an illustration of the flag change thereof,
FIG. 217 is a view of the format of instruction JSR,
FIG. 218 is an illustration of the flag change thereof,
FIG. 219 is a view of the format of instruction of ACB,
FIG. 220 is an illustration of the flag change thereof,
FIG. 221 is a view of the format of instruction SCB,
FIG. 222 is an illustration of the flag change thereof,
FIG. 223 is a view of the format of instruction ENTER,
FIG. 224 is an illustration of the flag change thereof,
FIG. 225 is an illustration of the instruction ENTER,
FIG. 226 shows the format of instruction EXITD,
FIG. 227 is an illustration of the flag change thereof,
FIG. 228 is an illustration of the instruction EXITD,
FIG. 229 is a view of the format of instruction RTS,
FIG. 230 is an illustration of the flag change thereof,
FIG. 231 is a view of the format of instruction NOP,
FIG. 232 is an illustration of the flag change thereof,
FIG. 233 is a view of the format of instruction PIB,
FIG. 234 is an illustration of the flag change thereof,
FIG. 235 is a view of the format of instruction BSETI,
FIG. 236 is an illustration of the flag change thereof,
FIG. 237 is a view of the format of instruction BCLRI,
FIG. 238 is an illustration of the flag change thereof,
FIG. 239 is a view of the format of instruction CSI,
FIG. 240 is an illustration of the flag change thereof,
FIG. 241 is a view of the format of instruction LDC,
FIG. 242 is an illustration of the flag change thereof,
FIG. 243 is a view of the format of instruction STC,
FIG. 244 is an illustration of the flag change thereof,
FIG. 245 is a view of the format of instruction LDPSB,
FIG. 246 is an illustration of the flag change thereof,
FIG. 247 is a view of the format of instruction LDPSM,
FIG. 248 is an illustration of the flag change thereof,
FIG. 249 is a view of the format of instruction STPSB,
FIG. 250 is an illustration of the flag change thereof,
FIG. 251 is a view of the format of instruction STPSM,
FIG. 252 is an illustration of the flag change thereof,
FIG. 253 is a view of the format of instruction LDP,
FIG. 254 is an illustration of the flag change thereof,
FIG. 255 is a view of the format of instruction STP,
FIG. 256 is an illustration of the flag change thereof,
FIG. 257 is a view of the format of instruction JRNG,
FIG. 258 is an illustration of the flag change thereof,
FIGS. 259 to 264 are illustration of the instruction JRNG,
FIG. 265 is a view of the format of instruction RRNG,
FIG. 266 is an illustration of the flag change thereof,
FIGS. 267 to 269 are illustrations of the instruction RRNG,
FIG. 270 is a view of the format of instruction TRAPA,
FIG. 271 is an illustration of the flag change thereof,
FIG. 272 is a view of the format of instruction TRAP,
FIG. 273 is an illustration of the flag change thereof,
FIG. 274 is a view of the format of instruction REIT,
FIG. 275 is an illustration of the flag change thereof,
FIG. 276 is an illustration of the instruction REIT,
FIG. 277 is a view of the format of instruction WAIT,
FIG. 278 is an illustration of the flag change thereof,
FIG. 279 is a view of the format of instruction LDCTX,
FIG. 280 is an illustration of the flag change thereof,
FIG. 281 is a view of the format of instruction STCTX,
FIG. 282 is an illustration of the flag change thereof,
FIG. 283 is a view of the format of instruction ACS,
FIG. 284 is an illustration of the flag change thereof,
FIG. 285 is a view of the format of instruction MOVPA,
FIG. 286 is an illustration of the flag change thereof,
FIGS. 287 and 288 are views of the format of instruction MOVPA,
FIG. 289 is an illustration of instruction LDATE,
FIGS. 290 and 291 are illustrations of the flag change thereof,
FIG. 292 is a view of the format of instruction STATE,
FIGS. 293 and 294 are illustrations of the flag change thereof,
FIG. 295 is a view of the format of instruction PTLB,
FIG. 296 is an illustration of the flag change thereof,
FIG. 297 is a view of the format of instruction PSTLB,
FIG. 298 is an illustration of the flag change thereof,
FIG. 299 is an illustration of an AT field,
FIG. 300 is an illustration of an AT field,
FIGS. 301 and 302 show the memory map relative to the logical address extension of the invention,
FIG. 303 is an illustration of the flag change in the data transfer instruction,
FIG. 304 is an illustration of the flag change in the comparison test instruction,
FIG. 305 is an illustration of the flag change of the arithmetic operation instruction,
FIG. 306 is an illustration of the flag change in the logical operation instruction,
FIG. 307 is an illustration of the flag change in the shift instruction,
FIG. 308 is an illustration of the flag change in the bit control instruction,
FIGS. 309 and 310 are illustrations of the flag change in the fixed table bit field instruction,
FIG. 311 is an illustration of the flag change in the free table bit field,
FIG. 312 is an illustration of the flag change in the decimal number operation instruction,
FIG. 323 is an illustration of the flag change in the string instruction,
FIG. 314 is an illustration of the flag change in the queue control instruction,
FIG. 315 is an illustration of the flag change in the jump instruction,
FIG. 316 is an illustration of the flag change in the multiprocessor instruction,
FIG. 317 is an illustration of the flag change in the control space and physical space control instruction,
FIG. 318 is an illustration of the flag change in the OS relevant instruction,
FIG. 319 is an illustration of the flag change in the MMU relevant introduction,
FIG. 320 is an illustration of subroutine call,
FIG. 321 is an illustration of stack frame,
FIGS. 322 and 323 are illustrations of instruction sequence,
FIG. 324 is an illustration showing a program example,
FIG. 325 is an illustration of subroutine call,
FIG. 326 is an illustration of control space,
FIG. 327 is a view of the format of PSW,
FIG. 328 is a view of the format of IMASK,
FIG. 329 is a view of the format of SMRNG,
FIG. 330 is a view of the format of CTXBB,
FIG. 331 is a view of the format of DI,
FIG. 332 is a view of the format of CSW,
FIG. 333 is a view of the format of DCE,
FIG. 334 is a view of the format of CTXBFM,
FIG. 335 is a view of the format of EITVB,
FIG. 336 is a view of the format of JRNGVB,
FIG. 337 is a view of the format of SP0 to SP3,
FIG. 338 is a view of the format of SP1,
FIG. 339 is a view of the format of 10ADDR and 10MASK,
FIG. 340 is a view of the format of UATB,
FIG. 341 is a view of the format of SATB,
FIG. 342 is a view of the format of LSID,
FIG. 343 is a view of the format of CTXB,
FIG. 344 is a view of the format of CTXBFM,
FIG. 345 is a view of the format of EITVTE,
FIG. 346 is an illustration of stack frame,
FIGS. 347 and 348 are views of the stack format of EIT,
FIG. 349 is a view of the format of 10 INF,
FIGS. 350(a-d) are vector tables of EIT,
FIG. 351 is an illustration of JRNG,
FIGS. 352 and 353 are illustrations of EIT,
FIG. 354 is an illustration of IMASK,
FIGS. 355 and 356 are illustrations of system call,
FIG. 357 is an illustration of DCE,
FIG. 358 shows comparison of DCE, DI and EI with each other,
FIG. 359 is an illustration of an example of the use of DCE,
FIGS. 360(a-o) are views of bit allocation,
FIGS. 361(a-e) show an index of operand field names,
FIG. 362 shows the cccc allocation,
FIG. 363 shows eeee allocation,
FIG. 364 is an illustration of M-flag,
FIG. 365 is a view of operation code of the BVMAP instruction,
FIGS. 366(a-e) are views correspondent to the addressing mode.
FIG. 367 shows an apparatus for handling exception, interrupt, and trap events.





DESCRIPTION OF THE PREFERRED EMBODIMENTS
A flow chart of an EIT process starting method in an embodiment of a data processor of the invention is shown in FIG. 2, in which where an EIT process request is accepted at Step 1001, an EIT vector number is formed corresponding to the content of the EIT process accepted at Step 1002, so that a base address value (EITVTB) of an EIT table 2028 storing therein the EIT process handler is added to a multiple of 8 of the EIT vector number, thereby generating the address of the external memory in which the head address of EIT process handler and part of PSW (to be hereinafter referred to as EITVTE) are stored. The EITVTE of data of the address is read at Step 1003, and compared 2030 in part with the PSW value during the generation of an EIT process which is then updated at Step 1004. Under the internal state of the data processor specified by the updated PSW value, the stack 2032 save of the processor information (at Step 1005) and start of the EIT process handler 2034 (at Step 1006) are executed respectively.
A format of EITVTE of an embodiment of the invention is shown in FIG. 3, in which EITVTE is of an 8-byte structure, 4 bytes thereof being adapted to specify a value of VPC (1025): the head address of the EIT process handler and two bytes of the same to specify part of PSTV and the remainder two bytes are empty in consideration of the degree of freedom and expandability. In FIG. 3, reference numeral VS (1020) designates 1-bit data for specifying a stack point using mode when the EIT process handler starts, VX (1021) designates 1-bit data showing whether the data size of the context, when the same starts, is of 32 or 64 bits, V AT (1022) designates 2-bit data showing a specification of the address conversion mode, when the same starts, VD (1023) designates 1-bit data showing the existence of a debug mode, when the same starts, and VIMASK (1024) designates 4-bit data specifying an interrupt acceptance level, when the same starts.
When the EIT process starts, these five fields are updatable. Also the fields are not simply updated but some thereof are decidable as to whether or not they are updated by comparison of a value under EITVTE with that when EIT is detected. For example, the interrupt acceptance level specifying field, when other than the external interrupt, has as a new value a value which is the higher level (smaller value) either of the value in EITVTE or that prior to the update. The external interrupt has as a new value a value which is the higher level (smaller value) of either the priority of the generated external interrupt or EITVTE.
FIG. 4 shows an embodiment of the information groups showing the internal state of the data processor saved to the external memory specified by a stack pointer (SP) when the EIT process starts. In the drawing, a reference numeral 1026 designates PSW at the data processor at the point of time when EIT process starts, 1027 designates 1-byte data showing the kind of a stack format corresponding to that of EIT process, 1028 designates 1-byte data showing the kind of EIT process, 1029 designates 10-bit data showing the EIT vector number, 1030 designates a 4-byte area storing therein a value of PC (program counter) of the data processor, and 1031 designates several byte areas storing therein various additional information corresponding to the kind of EIT process.
In FIG. 5, stack formats are shown corresponding to the kinds of EIT process as in the embodiment of the data processor of the invention, in which reference numeral 1032 designates a stack format at format 0, 1033 designates the same at format 1, 1034 designates the same at format 2, and 1035 designates the same at format 3 at the EIT process respectively, the embodiments being different, in the content of the additional information, from each other.
FIG. 6 shows a program counter 2036 updated to the final value, PSW, and stack frames formed when the multiple EIT process is carried out in the embodiment of the data processor of the invention. In FIG. 6, an example of generating a trap instruction (TRAP), an internal interrupt instruction and an external interrupt request (EI) in a multiple manner.
The data processor in FIG. 6 includes an EIT process in which the trap instruction is higher in priority than the external interrupt request, so that the EIT process at first starts with respect to the trap instruction and thereafter the same with respect to the external interrupt starts. Accordingly, after the multiple EIT process is accepted, the head address of the EIT process handler with respect to the external interrupt is fetched into PC designated by 1036, the value compared and updated with EITVTE fetched in the external interrupt process is written in PSW 1037. Next, explanation will be given on the content firstly stored in the stack frame, that is, the content stored in the higher address. At first, into the frame 1044 a value of PC (EXPC) at the point of time when the trap instruction is issued, into 1043 a value of PC of the next trap instruction, into 1042 the EIT process information corresponding to 1027, 1028 and 1029 of the trap instructions shown in FIG. 4, into 1041 a value of PSW before the trap instruction execution, into 1040 the head address of EIT process handler with respect to the trap instruction, into 1039 the EIT process information of external interrupt, and into 1038 a value of PSW compared with and set by EITVTE of trap instruction, are stored respectively. Thus, when the EIT process handler is started, the EIT process handler starts first with respect to the external interrupt and then that with respect to the trap instruction from the stack frame information starts, thereby enabling the multiple EIT to be processed.
Next, explanation will be given on the embodiment of the data processor of the present invention in greater detail. The explanation is voluminous and thus is attached with a table of contents, with parts requiring detailed description being made in the form of appendix. Regarding EIT, appendix 9 especially describes it in detail.
CONTENTS
1. Features of The Data Processor of the Present Invention
1-1. Basic Design Concept
1-2. OS Oriented Architecture
1-3. Instruction Set Being Tuned
1-4. Instruction Set for Compiler
2. The Data Processor 32 of the Present Invention and Data Processor 64 of the Present Invention
3. Classification of The Data Processor Specifications of the Present Invention.
4. Register Set
5. Data Type
5-1. Bit
5-2. Bit Field
5-3. Integer
5-4. Floating Point
5-5. Decimal
5-6. String
5-7. Queue
6. Instruction Format
6-1. Two-Operand Short Format
6-1-1. Register and Memory (S-Format and L-Format)
6-1-2. Between Registers (R-Format)
6-1-3. Between Literal and Memory (Q-Format)
6-1-4. Between Immediate and Memory (I-Format)
6-2. One-Operand General Type (Gl-Format)
6-3. Two-Operand General Type
6-3-1. First Operand for Memory Read (G-Format)
6-3-2. First Operand for 8-Bit Immediate (E-Format)
6-3-3. First Operand for Address Calculation (GA-Format)
6-3-4. Other Two-Operand Instructions
6-4. Short Branch
6-5. Others
7. Addressing Mode
7-1. P Bit
7-2. Symbols Used in Format
7-3. Register Direct
7-4. Register Indirect
7-5. Register Relative Indirect
7-6. Immediate
7-7. Absolute
7-8. PC Relative Indirect
7-9. Stack Pop
7-10. Stack Push
7-11. Register Relation Additional Mode
7-12. PC Relative Additional Mode
7-13. Absolute Additional Mode
7-14. FP Relative Indirect
7-15. SP Relative Indirect
7-16. Format of Additional Mode
7-17. Levels of Additional Mode Specification
8. Description Relating to Implementation
8-1. Supporting Virtual Storage
8-2. Rewrite of Instruction
9. EIT Processing
10. Structure of PSW
10-1. Structure of PSS
10-2. Structure of PSH
10-3. Flag Change
11. Instruction Set Description Format
11-1. Outline of Descriptive Format
11-2. Instruction Bit Pattern and Assembler Syntax
11-3. Field Name
11-4. Operand Field Name
11-5. Restrictions for Addressing Mode
11-6. Notes for Description
12. Instruction Set of The Data Processor of the Present Invention
12-1. Data Transfer Instructions
12-2. Comparison and Test Instructions
12-3. Arithmetic Instructions
12-4. Logical Instructions
12-5. Shift Instructions
12-6. Bit Manipulation Instructions
12-7. Fixed-Length Bit Field Operation Instructions
12-8. Variable-Length Bit Field Operation Instructions
12-9. BCD Arithmetic Instructions
12-10. String Manipulation Instructions
12-11. Queue Manipulation Instructions
12-12. Control Transfer Instructions
12-13. Multiprocessor Support Instructions
12-14. Control Space, Address Space Operation Instructions
12-15. OS-Support Instructions
12-16. MMU Support Instructions
Appendix 1: Instruction Set Reference of The Data Processor of the Present Invention
Appendix 2: Assembler Syntax of The Data Processor of the Present Invention
Appendix 3: Memory Management System of The Data Processor of the Present Invention
Appendix 4: Flag Change of The Data Processor of the Present Invention
Appendix 5: Operation between Different Size Data Sets
Appendix 6: Subroutine Calls for High Level Languages
Appendix 7: Control Registers and Control Space
Appendix 8: CTXB of The Data Processor of the Present Invention
Appendix 9: EIT Processing of The Data Processor of the Present Invention
Appendix 10: Instruction Bit Pattern of The Data Processor of the Invention
Appendix 11: Detail Specification of High Level Instructions and Register Values in End State.
1. Features of The Data Processor of the Present Invention (The Data Processor of the Present Invention)
1-1. Basic Design Concept
The data processor of the present invention is not RISC. The first target of the data processor of the present invention is to execute basic instructions at a high speed. In addition, high level instructions are added.
The data processor 32 of the present invention, which is a 32-bit microprocessor, and the data processor 64 of the present invention, which is a 64-bit microprocessor, have been developed at the same time as a series. From the beginning, the expandability to 64-bit addressing has been considered.
The data processor of the present invention series has been developed along with the OS, so that I-TRON (industrial-TRON), which is a real time OS, and B-TRON (business-TRON), which is a work-station type OS, can be executed at a high speed. The data processor of the present invention meets the data processor of the present invention <<L1R>> specification. In particular, it is focused on the high speed processing in a real storage environment, i.e., virtual memory is not supported.
The data processor of the present invention is a microprocessor which will become the core of an ASIC LSI.
1-2. OS Oriented Architecture
Bit Map Operation Supporting Instructions: Instructions which serve to move and operate the bit map necessary for B-TRON
Context Switch Instructions: Instructions which serve to switch tasks for I-TRON at a high speed
Queue Operation Instructions: Instructions which serve to operate the ready queue and wait queue for I-TRON
Memory Management Using 2-Level Ring Protection: Extra 2-level ring is provided for future expansion.
1-3. Instruction Set Being Tuned
The instruction set is tuned so that frequently used instructions and addressing modes can be described in a short format: Shortening the length of the instructions for operation between registers and of those for the literal operation.
1-4. Instruction Set for Compiler
Instruction set being orthogonalized
16 general-purpose registers used for various purposes such as storing data, addresses and index values.
Sophisticated addressing mode: Additional mode allows index addition and indirect reference in any level.
Arithmetic operations between different size data sets: Different sizes can be specified for the source operand and destination operand.
Sophisticated jump instructions suitable for high level languages
2. The Data Processor 32 of the Present Invention and The Data Processor 64 of the Present Invention
The data processor of the present invention has a 32-bit version, the data processor 32 of the present invention, and a 64-bit version, the data processor 64 of the present invention. From the beginning, expandability to the 64-bit version has been considered. The data processor of the present invention 64 can handle 64-bit integers in addition to the data types handled by the data processor 32 of the present invention.
The 32-bit mode/64-bit mode of the data processor 64 of the present invention is switched in the following manner:
Data Size of Operand
The 32-bit mode/64-bit mode is selected using the size specification bit which exists in each instruction and operand. It is also possible to use an 8-bit mode or a 16-bit mode. The data size is selected from the four types from a two bit field.
The data processor 32 of the present invention does not handle 64-bit data. Consequently, if the 64-bit data size is specified, the instruction in use is treated as an error.
Size of Pointer
Normally, the data processor 32 of the present invention uses a 32-bit pointer, while the data processor 64 of the present invention uses a 64-bit pointer. However, since the data processor 64 of the present invention executes an object code for the data processor 32 of the present invention, it provides a mode which changes the pointer size to 32 bits. Since this mode is specified in PSW, it is possible to use a 32-bit type program and 64-bit type program in a context (process or task).
As an extension bit for 64-bit addressing, a reserved bit named "P bit" is provided every operand which accesses the memory.
Due to the following reasons, the 32-bit size/64-bit size of the pointer is switched by the mode rather than every instruction.
It is difficult to use pointers which differ in size, because they serve to identify the location. If there is a 64-bit size pointer together with a 32-bit size pointer, the location cannot be identified unless the size of all the pointers is 64 bits. Therefore, even if a 32-bit pointer and 64-bit pointer are switched in each instruction, the same specification is repeated in each context. Therefore, its efficiency is low. In such a situation, it is suitable to switch the bit size of the pointer by using the mode, rather than in each instruction.
When the bit size of the pointer is switched between 32 bits and 64 bits using the mode bit, a question about the compatibility between the data processor 32 of the present invention and the data processor 64 of the present invention may arise. However, in the structure where the bit size of the pointer defaults to 32 bits and the mode is changed whenever the 64-bit address is used, a program for the data processor 32 of the present invention can be directly executed in the data processor 64 of the present invention. Even if the bit size of the pointer is switched in each instruction rather than by the mode, OS will know whether the bit size of each context is 32 bits or 64 bits to set the stack and to determine whether the bit size of the system call parameters is 32 bits or 64 bits. A bit size of 32 bits or 64 bits is determined by observing the mode in PSW (which is stored in the stack).
3. Classification of The Data Processor Specifications of the Present Invention
The data processor of the present invention provides optional implementations to meet various needs such as expandability to the 64-bit version, serialization, adaptability to many applications, and so forth. To clarify the optional functions of the data processor of the present invention, the specifications of the data processor of the present invention are classified as follows.
<<L0>> Specification (Level 0)
The minimum specification which will satisfy as the data processor of the present invention requirements: For example, the programming model viewed from the user program (most of ISP, general purpose registers and PSH), bit pattern in machine language, and so forth. Unless otherwise specified, the specification is <<L0>>.
<<L1>> Specification (Level 1)
This specification should usually be implemented, however, when a processor does not have special requirements the <<L1>> specification may not always need to be implemented. <<L1>> specification includes high level functional instructions such as string instructions, additional modes, queue operation instructions, and bit map instructions. The details of <<L1>> instructions will be described separately.
<<L1R>> Specification (Level 1 Real)
The <<L1R>> specification excludes the instruction rerun function and MMU related functions from the <<L1>> specification. This <<L1R>> specification is used to effectively operate I-TRON and micro-BTRON with real memory. The instruction set for <<L1R>> is nearly the same as that for <<L1>>, so the compiler and user program can be used in common with <<L1>>. However, part of the instructions relating to MMU (MOVPA and so forth) and OS (JRNG and so forth) may not be supported.
<<L2>> Specification (Level 2)
This specification will be introduced in accordance with an increase of hardware amount in future:
<<L2>> includes the specification which serves to enhance the symmetry of instructions and are newly added instructions to <<L0>>, <<L1>> or <<L1R>> for high speed operation.
The former includes the "/B" option of the BVSCH instruction, complicated termination conditions of the string instruction, additional mode in indefinite stages, while the latter includes the INDEX instruction.
The <<L2>> specification is represented as "<<L2>>".
<<LX>> Specification (Extension)
This specification will be introduced for the expansion to the data processor of the present invention 64. Although it has the same content as <<L2>>, it is treated as a different class because of the expandability to the data processor 64 of the present invention.
The <<LX>> specification is represented as "<<LX>>".
<<LU>> Specification (Undefined)
The specification which will be introduced for the future extension:
At present, the specification details have not been determined.
<<LV>> Specification (Variable)
The specification which can be freely determined by each manufacturer:
The <<LV>> specification includes the pin assignment of the chip, specification relating to the level and performance of the pipeline, bit pattern assigned to each manufacturer, usage of control registers and so forth. The bit patterns of the instructions assigned to each manufacturer are represented with LV reserved in the bit pattern reference.
<<LA>> Specification (Alternative)
Although the <<LA>> specification describes the standard specification for the data processor of the present invention (or will describe it), if necessary, it may be changed. However, if the specification is changed, the compatibility may be lost. In other words, the <<LA>> specification does not assure the compatibility of the data processor of the present invention.
The <<LA>> specification mainly includes the as memory management system, control registers, and part of the privileged instructions. The data processor of the present invention aims at high speed processing in a real storage environment without an MMU. Thus, the data processor of the present invention does not support most of the <<LA>> specification relating to the memory management.
4. Register Set: see FIG. 7.
The data processor 32 of the present invention provides 16 32-bit general purpose registers, while the data processor 64 of the present invention provides 16 64-bit general purpose registers.
The stack pointer (SP) and frame pointer (FP) are included in the general purpose registers. SP and FR are R15 and R14, respectively.
The program counter (PC) is not included in the general purpose registers.
The general purpose registers serve to store data and base addresses as well as serving as an index register which can be used for many purposes.
A processor status word (PSW) register is provided to store the status of the processor.
SP is switched according to the context (ring number or interrupt processing).
PSW consists of four bytes; the low-order first byte (processor status byte, or PSB) is used to indicate the status, the low-order second byte (processor status half word, or PSH, which is used along with PSB) is used to set the user mode, and the two high-order bytes are used to indicate the system status.
The data processor of the present invention is called a "big-endian" chip. It assigns 8-bit and 16-bit data in the register starting with the LSB side. Thus, an absolute bit number, irrespective of the data size, cannot be defined. A bit number can only defined along with the data size.
8-bit data in the register is assigned 0, 1, . . . , 7 starting with the MSB side. In addition, 16-bit data in the register is assigned 0, 1, . . . , 15 starting with the MSB side. 32-bit data in the register is assigned 0, 1, . . . , 31 starting with the MSB side. Consequently, bit position 7 of 8-bit data, bit position 15 of 16-bit data, and bit position 31 of 32-bit data all correspond to the same bit.
In instructions where the register is used as the destination operand, when the data size of the register is 8 bits or 16 bits, the high-order bytes are not influenced. They are not changed to comply with the specification of the operation in the memory. To influence the high-order bits, use a different data size operation.
EXAMPLE
______________________________________MOV #H'12345678, R0.WMOV #H'aa, R0.B______________________________________
When the above instructions are performed, R0 becomes H'123456aa.
When 8-bit data and 16-bit data are placed in a register, they are assigned from the LSB side. For example:
______________________________________MOV.W #H'12345678,R0MOV.B #H'aa,R0MOV.W #R0,R1______________________________________
The result of the above instructions is R1=H'123456aa.
When the same operation is performed for the memory with the following instructions,
______________________________________MOV.W #H'12345678, @R0MOV.B #H'aa, @R0MOV.W @R0, R1______________________________________
the 8-bit data and 16-bit data are assigned from the MSB side, resulting in R1=H'aa345678. Note that the result in the register differs from that in the memory.
5. Data Type
The data processor of the present invention uses "big-endian". In other words, when the byte address or bit number is assigned, the smaller number (address) is MSB (most significant bit/byte).
In the big-endian structure, the address of some data in the memory differs depending on whether it is treated as 8-bit data or 16(32)-bit data. For example, when
______________________________________address: N N+1 N+2 N+3data: 0 0 0 H'12______________________________________
although the content of the address N as 32-bit data is H'00000012, (where H' represents hexadecimal notation), when the data of the same content is treated as 8-bit data, it is necessary to refer to the address N+3.
However, since 8-bit data and 16-bit data in the register are assigned from the LSB side, they can be treated as different size data. For example,
______________________________________ MOV #0, R0.W MOV #H'12, R0.B MOV R0.W, R1.W______________________________________
The result becomes R1=H'00000012. (For the meaning of the instructions, see the related chapter.)
On the other hand, when the same operation is performed for the memory.
______________________________________MOV #0, @R0.WMOV #H'12, @R0.BMOV @R0.W, R1.W______________________________________
cause the 8-bit data H'12 and MSB of the 32-bit data to be matched, resulting in R1=H'12000000.
The data types that the data processor of the present invention supports are as follows.
5-1. Bit
The related bit is indicated in FIG. 8. In the case of the bit operation in the memory, offset can be freely used.
In the case of the bit operation in the register, offset can be limited in one register (the upper bits of the offset is ignored).
The bit is assigned using a set of base.sub.-- address, size of base.sub.-- address and offset.
When a bit in the memory is assigned, MSB of the memory address represented by base.sub.-- address is the bit of offset=0. At the time, the assignment of the size of base.sub.-- address does not influence the bit which is actually operated. For the bit operation instruction, to assign the access size for the read-modify-write operation for the memory, the size of base.sub.-- address is assigned. However, the access size does not depend on the bit actually operated.
On the other hand, when a bit in the register is assigned, MSB in the data size which is assigned as the size of base.sub.-- address is the bit of offset=0. The bit actually operated depends on the size of base.sub.-- address.
5-2. Bit Field
Signed bit field
The related bit field is indicated in FIG. 9.
______________________________________0 < width .ltoreq. 32 (<<LX>> 0 < width .ltoreq. 64)S: Signed bit______________________________________
The distance between MSB of base.sub.-- address and that of the related bit field (signed bit) is offset.
In the case of the bit field operation in the memory using the BF:G instruction, offset can be freely used.
In the case of the bit field operation in the memory using the BF:E instruction or the bit field operation in a register, the operation in the bit field which exceeds the one word (1-long word) of base.sub.-- address is not assured.
Unsigned bit field
The related bit field is indicated in FIG. 10.
______________________________________0 < width .ltoreq. 32 (<<LX>> 0 < width .ltoreq. 64)______________________________________
The distance between MSB of base.sub.-- address and that of the related bit field is offset.
In the case of the bit field operation in the memory using the BF:G instruction, offset can be freely used.
In the case of the bit field operation in the memory using the BF:E instruction or the bit field operation in a register, the operation in the bit field which exceeds the one word (1-long word) of base.sub.-- address is not assured.
Unfixed length bit field
Both offset and width can be freely assigned in the condition of width >0.
5-3. Integer
The data type of integer is indicated in FIG. 11.
5-4. Floating Point
The floating point operation is processed by a co-processor. The format of the floating point is specified by IEEE standard. The details of the floating point will be separately specified.
Single precision 32-bit floating point <<Co-processor>>
Double precision 64-bit floating point <<Co-processor>>
80-bit floating point <<Co-processor>>.
5-5. Decimal
The addition, subtraction, multiplication and division in multiple length decimal notation are processed by a co-processor. The main processor of the data processor of the present invention only processes unsigned fixed-length PACKED format decimal numbers and signed PACKED format decimal numbers. However, all the instructions which process the signed PACKED format decimal numbers are <<L2>>. The data type is shown in FIG. 12.
5-6. String
In the string case, the data type is showin in FIG. 13.
5-7. Queue
The data type of linear list connected by double links is shown in FIG. 14.
6. Instruction Format
Any instruction is written in variable length every 16 bits. However, instructions whose length is odd bytes are not permissible.
Instructions with two operands are classified into two types: one is the general type, which has 4 bytes +extension portion and can use all the addressing modes (Ea), and another is the abbreviation type, which can use only frequently used instructions and the addressing mode (Sh). Depending on the instruction function and code size being required, the suitable type can be selected.
Although the instruction format of the data processor of the present invention can be classified into many types, we will roughly classify and describe the types of the instruction format so that the user can easily understand it. For detail types of the instruction format, see Appendix 10.
These are the abbreviations used for the codes described with the format.
-: Portion where an operation code is placed
#: Portion where a literal or immediate value is placed.
Ea: General type addressing mode specified with 8 bits (General Format)
Sh: Abbreviation type addressing mode specified with 6 bits (Short Format)
Rn: Portion where the register is specified.
The format is described assuming that the right side is LSB and the high-order address (big-endian).
Example of Format Description is shown in FIG. 15.
The instruction format can be determined by the two bytes of the address N and address N+1, because any instruction is fetched and decoded every 16 bits (2 bytes).
In any format, the extension portion of Ea or Sh of each operand should be located just after the half word containing the basic portion of Ea or Sh. It has higher precedence than the immediate data which is implicitly specified by an instruction and than the extension portion of an instruction. Therefore, the operation code of an instruction consisting of 4 bytes or more may be separated by the extension portion of Ea.
If extra extension portion is added to the extension portion of Ea in the additional mode, the extra extension portion has higher precedence than the operation code of the next instruction.
For example, consider a 6-byte instruction which consists of the first half word containing Ea1, the second half word containing Ea2, and the third half word. Since the additional mode is used for Ea1, the extension portion for the addition mode is also added as well as the conventional extension portion. At the time, the real instruction bit pattern is assigned in the following order.
First half word of the instruction (including the basic portion of Ea1)
Extension portion of Ea1
Extension portion of Ea1 in the additional mode
Second half word of the instruction (including the basic portion of Ea2)
Extension portion of Ea2
Third half word of the instruction.
When only 8 bits of the 16-bit field are used depending on the alignment, they are placed in the low order (to the higher address). It is applied when the #imm.sub.-- data mode is specified to EaR and ShR while the operand size is 8 bits, when the operand size is 8 bits in the I- format, or when BRA:G, Bcc:G, BSR:G and SS=00. For example, in the following case,
MOV:I.B#H'12, @RO.
The first byte is an operation code of MOV:I.B.
The second byte is used to specify both part of the operation code and ShW(@RO).
The third byte is 0.
The fourth byte is H'12.
The bit pattern is represented in FIG. 16.
In this case, the upper (lower address) 8 bits of the 16-bit field should be filled with 0. When the upper 8 bits are not 0, the data is unstable depending on the implementation.
In other words, in the case of I-Format or #imm.sub.-- data mode, the operand depends on the implementation, while in the case of the instructions of BRA:G, Bcc:G and BSR:G, the destination to be jumped becomes unstable. In any case, they are not treated as EIT (exception).
6-1. Two Operand Short Format
6-1-1. Register and Memory (S-format, L-format): an example is shown in FIG. 17.
There are two types of instructions in the L-format and S-format: one type is where the size can be specified (MOV:L, MOV:S, CMP:L) and another type is where the size cannot be specified (ADD:L, SUB:L).
For instructions where the size can be specified, the specification of the size by RR and the like is only applied to the memory and the size of the memory is fixed to 32 bits. If the size of the register differs from that of the memory while the size of source is smaller than another, the sign extension is performed. If the size of the source is smaller than another, the high-order byte is truncated and overflow check is performed.
On the other hand, for the instructions of ADD:L and SUB:L where the size cannot be specified, both the operand sizes of the register and memory are fixed to 32 bits.
Since there is a rule for the data processor of the present invention where data in the register is usually treated as a 32-bit signed integer, the size of the register is fixed to 32 bits. This rule is also applied to the bit field instructions and instructions with advanced functions where an operand is placed in the register as well as the instructions in the L-format and S-format.
6-1-2. Between Registers (R-Format): an example is shown in FIG. 18.
6-1-3. Between Literal and Memory (Q-Format): an example is shown in FIG. 19.
6-1-4. Between Immediate and Memory (I-Format): an example is shown in FIG. 20.
The size of the immediate value in the I-format is 8, 16, 32 and 64 bits which are in common with the size of the destination operand. The zero extension and sign extension are not performed.
6-2. One Operand General Type (G1-Format): an example is shown in FIG. 21.
6-3. Two Operand General Type
Instructions which have two operands in the general type addressing mode and which are specified with 8 bits. Occasionally, the total number of operands becomes 3.
6-3-1. First Operand for Memory Read (G-Format): an example is shown in FIG. 22.
6-3-2. First Operand for 8-Bit Immediate (E-Format): an example is shown in FIG. 23.
Although the function of this format is similar to that between the immediate and memory (I-format), their concepts remarkably differ. Since the E-format is a derivation of the 2-operand general type (G-format), the size of the source operand is fixed to 8 bits and the size of the destination operand is selected from 8/16/32/64 bits. In other words, supposing the different size operation, for scr consisting of 8 bits, the zero extension or sign extension is performed in accordance with the size of dest.
On the other hand, in the I-format, the immediate pattern which is frequently used in MOV and CMP is changed to the short type and the size of the source is the same as that of the destination.
6-3-3. First Operand for Address Calculation (GA-Format): an example is shown in FIG. 24.
6-3-4. Other Two-Operand Instructions: an example is shown in FIG. 25.
6-4. Short Branch: an example is shown in FIG. 26.
6-5. Others: except above described, there are examples shown in FIG. 27.
7. Addressing Mode
The data processor of the present invention provides two addressing modes: the short format (Sh), which assigns the address for the memory and registers with a 6 bits field and the general format (Ea), which specifies with an 8 bits field.
If an addressing mode which has not been defined or an improper combination of addressing modes is specified, a reserved instruction exception (RIE) occurs like an execution of the undefined instruction and it causes the exception processing to start. It may occur when the destination is in the immediate mode or when the immediate mode is used for an instruction which calculates the address.
7-1. P Bit
The data processor of the present invention can assign a one-bit optional function assignment bit for accessing the memory. This bit is named the P bit. The P bit is used to add some additional capability whenever the memory is accessed.
The P bit is independently assigned whenever the memory is accessed. Therefore, in case of the register indirect addressing mode, absolute addressing mode, and the like, one P bit is assigned in accordance with the operand. In case of the multiple level indirect addressing mode where the additional mode is used, the P bit should be used for the number of times corresponding to the number of levels. The P bit is expected for tag checking, logical space switching, and switching between 32-bit addressing and 64-bit addressing for future expansion. Therefore, in the current specification, the P bit is reserved.
In the description of the P bit, the position of the P bit is represented with `P`. However, it should always be "0". If the P bit is not "0", a reserved instruction exception (RIE) will occur.
The function of the P bit should conform to the <<LU>> specification.
7-2. Symbols Used in Format
Rn: Assign the register.
P: P bit (always "0")
mem[EA]: Content of the memory at the address represented with EA.
The portion surrounded by dotted lines represents the extension portion.
7-3. Register Direct
Assembler syntax: Rn
Operand: Rn
Format: shown in FIG. 28.
7-4. Register Indirect
Assembler syntax: @Rn
Operand: mem[Rn]
Format: shown in FIG. 29.
7-5. Register Relative Indirect
Assembler syntax:
@(disp, Rn)
@(disp : 16, Rn)
@(disp : 32, Rn)
Operand: mem[disp +Rn]
Format: shown in FIG. 30.
Disp should be treated as a signed operand.
7-6. Immediate
Assembler syntax: #imm.sub.-- data
Operand: imm.sub.-- data
Format: shown in FIG. 31. The size of imm.sub.-- data is assigned in an instruction as the operand size.
7-7. Absolute
Assembler syntax:
@abs
@abs : 16
@abs : 32
@abs : 64 <<LX>>
Operand: mem[abs]
Format: shown in FIG. 32.
In the 32-bit addressing mode, the address specified is extended to the 32-bit signed address. On the other hand, in the 64-bit addressing mode, the address assigned by abs : 16, abs : 32 is extended to the 64-bit signed address.
7-8. PC Relative Indirect
Assembler syntax:
@(disp, PC)
@(disp : 16, PC)
@(disp : 32, PC)
Operand: mem[disp +PC]
Format: shown in FIG. 33.
The PC value being referenced in the PC relative indirect mode is the beginning address of the instruction which includes the operand. Thus, an endless loop can be produced by the following instruction.
JMP@(0,PC)
When the PC value in the additional mode is referenced, the beginning address of the instruction is used as the reference value of the PC relative indirect mode.
7-9. Stack Pop
Assembler syntax: @SP+
Operand:
mem[SP]
SP is incremented.
Format: shown in FIG. 34.
In the @SP+mode, SP is incremented in accordance with the operand size. For example, when the data processor 64 of the present invention processes 64-bit data, SP is updated by +8. It is also possible to specify @SP+ for an operand which is the size of B and H, so that SP is updated for +1 and +2, respectively. However, it causes the stack alignment to be disordered, resulting in a slower processing speed.
If the @SP+mode is not used for the operand, a reserved instruction exception (RIE) occurs. Actually, a reserved instruction exception occurs when @SP+is used for the write operand and read-modify-write operand.
7-10. Stack Push
Assembler syntax: @-SP
Operand: SP is decremented.
mem[SP]
Format: shown in FIG. 35.
In the @-SP mode, SP is decremented in accordance with the operand size. For example, when the data processor of the present invention 64 processes 64-bit data, SP is updated by -8. It is also possible to specify @-SP for an operand which is the size of B and H, so that SP is updated for -1 and -2, respectively. However, it causes the stack alignment to be disordered, resulting in a slower processing speed.
If the @-SP mode is not used for the operand, a reserved instruction exception (RIE) occurs. Actually, a reserved instruction exception occurs when @-SP is used for the read operand and read-modify-write operand.
7-11. Register Relation Additional Mode
Operand:
Rn.fwdarw.>tmp
Additional mode processing
Format: shown in FIG. 36.
For details of the additional mode, see section 7-16.
7-12. PC Relative Additional Mode
Operand:
PC.fwdarw.tmp
Additional mode processing
Format: shown in FIG. 37.
7-13. Absolute Additional Mode
Operand:
0.fwdarw.tmp
Additional mode processing
Format: shown in FIG. 38.
7-14. FP Relative Indirect
Assembler Syntax:
@(disp, FP)
@(disp : 4, FP)
Operand: mem[d4*4+ FP]
(disp=d4*4)
Format: shown in FIG. 39.
The prescaled displacement, d4, is treated as a signed operand. It should be used by multiplying by 4 irrespective of the size. Thus, the memory address of the multiples of 4 in the range from (FP-8*4) to (FP+7*4) can be referenced. When the address is described in the assembler representation, the value multiplied by 4 should be described for displacement. This addressing mode is <<L2>>. Since the data processor of the present invention does not provide the FP relative indirect mode, when this mode is specified, a reserved instruction exception (RIE> occurs.
Since this addressing mode cannot be used in the short format, for example,
MOV@(disp,FP),R1
becomes 4 bytes as follows.
MOV:G.W@(disp:4,FP),R1
MOV:L.W@(disp:16,FP),R1.
Thus, the code is ambiguously selected, so that the mode is <<L2>>. This mode is expected to effectively use the short format when the rate of usage of the abbreviations is decreased in the data processor 64 of the present invention. In the modes of @(d4:4,FP) and @(d4:4,SP), d4 is used by multiplying by 4 irrespective of the operand size. Therefore, if the modes of @(d4:4,FP) and @(d4:4,SP) are used with variables of 8 bits, 16 bits and 32 bits lengths in the stack frame at the same time, it is necessary to left justify each variable to the word boundary, since the data processor of the present invention is big-endian.
Example of allocation of local variables for using modes of @(d4:4,FP) and @(d4:4,SP) is shown in FIG. 40.
7-15. SP Relative Indirect
Assembler syntax:
@(disp,SP)
@(disp:4,SP)
Operand: mem[d4*4+SP]
(disp=d4*4)
Format: shown in FIG. 41.
The prescaled displacement, d4, is treated as a signed operand. It should be used by multiplying by 4 irrespective of the size. However, the operation where d4 is negative is not described. Thus, the memory address of the multiplies of 4 in the range from (SP) to (SP+7*4) can be referenced. When the address is described in the assembler syntax, the value multiplied by 4 should be described for displacement. This addressing mode is <<L2>>. Since the data processor of the present invention does not provide the FP relative indirect mode, when this mode is specified, a reserved instruction exception (RIE) occurs.
Like @(disp:4,FP), this mode is expected to effectively use the short format when the rate of usage of the abbreviations is decreased in the data processor 64 of the present invention.
7-16. Format of Additional Mode
Complicated addressing can basically be separated into a combination of operations of addition and indirect reference. Therefore, when assigning the operations of addition and indirect reference as primitives of addressing, and combining them freely, any complicated addressing mode can be obtained.
The additional mode will be used for such a purpose. A complicated addressing mode is especially useful for data reference between modules and processing systems for artificial intelligent languages.
However, when the addressing mode is widely used for the data processor of the present invention, the processing speed may decrease. Thus, care should be taken to use the memory indirect addressing mode.
The additional mode is specified every 16 bits and repeated for the number of times required.
With only one occurence of the additional mode, the following operations are performed.
Addition of constant (displacement)
Scalling (.times.1, .times.2, .times.4 and .times.8) and addition of index register
Memory indirect reference
With the additional mode in n levels, the indirect reference of up to (N+1) levels can be performed.
Processes of basic additional modes:
tmp+Rx*scale+d4*4.fwdarw.tmp when I=0 and D=0
tmp+Rx*scale+displx.fwdarw.tmp when I=0 and D=1
mem[tmp+Rx*scale+d4*4].fwdarw.tmp when I=1 and D=0
mem[tmp+Rx*scale+dispx].fwdarw.tmp when I=1 and D=1.
Basic format: shown in FIG. 42.
EI=00: Absence of indirect reference; continuation of additional mode
tmp+disp+Rx*Scale.fwdarw.tmp.
EI=01: Indirect reference; continuation of additional mode
mem[tmp+disp+Rx*Scale].fwdarw.tmp.
EI=10; Indirect reference; completion of additional mode
mem[tmp+disp+Rx*Scale].fwdarw.operand.
EI=11: Dual indirect reference; completion of additional mode
mem[mem[tmp+disp+Rx*Scale]].fwdarw.operand.
M=0: <Rx> is used as an index.
M=1: Special index
<Rx>=0: The indexes are not added. (Rx=0)
<Rx>=1: PC is used as the index Rx. (Rx=PC)
<Rx>=2 or more: reserved.
D=0:4-bit d4 in the additional mode is multiplied by 4, treated as disp, and then added. d4 should always be multiplied by 4 and used irrespective of the operand size.
D=1: dispx (16/32/64 bits) specified by the extension portion in the additional mode is treated as disp and then added. The size of the extension portion is specified by the d4 field.
d4=0001: dispx is 16 bits.
d4=0010: dispx is 32 bits.
d4=0011: dispx is 64 bits. <<LX>>
XX: Scale of index (scale=1/2/4/8).
S: Size of index register
S=0 <Rx> is extended to signed 32 bits.
S=1 <Rx> is 64 bits <<LX>>
P: P bit <<LU>>.
The P bit is placed in each level of the additional mode.
The P bit can be specified independent from all the memory references.
Whether the indirect reference is performed or not can be selected.
The level which does not perform the indirect reference is used for addition of the base register and index register with multiple levels (such as mem[R1+R2+R3]). It may be used for the relocation base register, etc. by the user.
Size of index register
Since 32-bit data will be frequently used even with a 64-bit address, 32/64-bit address size can be switched in each level of the additional mode.
@(disp:64,Rn) of the register relative indirect and the addressing mode of the memory indirect can be obtained by using the additional mode.
If the scaling of .times.2, .times.4 and .times.8 for PC is performed, the temporary value (tmp) after the processing of the level is completed, the value, depends on the hardware implementation. The effective address obtained by the additional mode cannot be predicted. However, an exception does no occur. Variation of format: shown in FIG. 43, 44.
7-17. Levels of Additional Mode Specification
The additional mode is used for normal indirect reference, as a table reference for external variables for modular object codes, and execution of AI oriented instructions. In particular, the applications of AI may use the indirect reference in many levels. However, the normal applications use it in 4 or less levels.
When the additional mode in any number of levels can be used, the classification by the number of levels in the compiler is not required, thus reducing the load of the compiler. Even if the frequency of the indirect reference in many levels is very small, the compiler should always generate correct codes.
However, from the point of view of implementation, if executing interrupts are accepted in any number of levels, the load on the compiler becomes heavy. Therefore, it is necessary to restrict the number of levels.
The versions of the data processor of the present invention which can use the additional mode with up to only 4 levels (4 basic formats of the additional mode) is defined as the <<L1>> specification. Versions that can use any number of levels are defined as the <<L2>> specification. Even in the <<L1>> specification, it is possible to perform the memory indirect reference up to 5 times. For the additional mode which exceeds 5 levels (5 half words), a reserved instruction exception (RIE) occurs. However, in the format where any number of levels can be used, the number of levels will be extended.
The data processor of the present invention can use the additional mode in any number of levels. However, when the memory indirect addressing is frequently used along with the additional mode, the processing speed may decrease. Especially, if the additional mode with many levels is used in the second operand, an interrupt cannot be accepted during the processing of the additional mode.
Since the data processor 32 of the present invention will use floating point, the scaling of `.times.8` is implemented. The scaling of `.times.8` is the <<L1>> specification rather than the <<LX>> specification.
8. Description Relating to Implementation
8-1. Supporting Virtual Storage
While the data processor of the present invention has provisions for virtual memory, they are not currentry implemented on the data processor of the present invention.
To provide the virtual storage, it is necessary to properly recover page faults which occur during execution of instructions. The data processor of the present invention generally uses the instruction re-execution system.
If a page fault occurs in the instruction re-execution system, the processor resets all the registers and activates the page-in process routine. Thus, even if the execution of instructions are resumed from the beginning, inconsistency does not occur.
In the instruction re-execution system, normally, it is not necessary to hold the status flags during execution. Therefore, the system is comparatively simple. When re-executing instructions, the data processor of the present invention does not use the instructions and addressing mode (such as auto-increment) which may cause side effects however, since the re-execution after the page fault may cause an unnecessary memory access. Therefore, care should be taken when OS operates the I/O device.
For example, if the first operand of a normal instruction serves to read the I/O device and the second operand causes a page fault by the re-executing the instruction, the I/O device is read again. Therefore, inconsistency may occur depending on the type of I/O device. Thus, when an I/O device causes a side effect is read and accessed, take care not to cause a page fault by another operand. Practically, it is possible that another operand is always a register or residual page.
If the source operand and destination operand are partially overlapped, inconsistency will occur when a simple execution is performed.
Example: Moving 2-byte data for 1 byte
The destination is located at the page boundary: shown in FIG. 45.
In FIG. 45, if the MOV.H instruction causes [N-2:N-1] to be moved to [N-1:N], the write cycle of the destination is separated with two sessions. First, the data of [N-2] is written to [N-1] and the former [N-1] is written to [N]. If page M-1 has a fault while the data is written to [N-1], after the page-in operation, [N-2:N-1].fwdarw.[N-1:N] is retried. Since the content of N-1 has been rewritten, inconsistency will occur.
For an instruction such as LDM which serves to transfer data in multiple sessions, if the source and destination are overlapped, care should be taken that inconsistency does not occur during re-execution of the instruction. For example, in the following case,
LDM@R6,(R6-R10)
when R8 is read after loading R6 and R7, if a page fault occurs, R6 has been rewritten upon re-execution. Thus, if the instruction is re-executed from the beginning, inconsistency will occur. To avoid that, it is necessary to take the following countermeasures.
Check that a page fault has not occurred at the beginning of the instruction.
Save the temporary value which represents the address which is transferred during page fault to the stack (a kind of instruction continuous execution system).
Store the initial value of R6 and restore it if a page fault occurs.
These countermeasures should be applied to STM and other instructions.
To re-execute instructions without inconsistency, LDM, STM and LDCTX prohibit the additional mode. On the other hand, ENTER, EXIT and JRNG prohibit all the addressing modes which access the memory.
8-2. Rewrite of Instruction
Generally, a computer which has the stored program system can rewrite the instruction program to be executed by itself through a program. However, when an instruction is rewritten in the current high performance processors which provide prefetch and instruction cache functions and the operation must be assured, the load on the hardware is remarkably increased. The necessity of this function is not high and it is not suitable for software training. Therefore, the data processor of the present invention normally prohibits the instruction codes to be rewritten by software. If the instruction code is rewritten, its operation will not be assured.
In some special applications, instruction codes are produced by a user program and they are executed. Therefore, when some conditions are met, it is necessary to assure the execution operation of instruction codes being rewritten.
To do that, the data processor of the present invention has PIB instruction which informs the processor that instruction codes have been rewritten. By executing this instruction, the execution operation of the instruction codes being rewritten are assured. This instruction serves to inform the processor that the instruction codes to be executed have been probably rewritten (after the processor has been reset or the former PIB instruction has been executed). This instruction will serve to purge the pipeline, instruction queue and instruction cache.
9. EIT Processing
EIT stands for the initial letters of Exception (exceptional interrupt), Interrupt (external interrupt) and Trap (internal interrupt).
In the data processor of the present invention, a process which is asynchronous with the flow of the execution of the program is termed an EIT process.
The EIT processes are generally called exception and interrupt processes. The EIT process contains the following types.
Internal interrupt (call between rings, trap)
It is intentionally generated by the programmer when issuing a system call. It relates to the context which is executed at the time.
Exceptional interrupt (exception)
It occurs if some error is generated during execution of a conventional instruction. It relates to the context being executed at the time.
External interrupt (interrupt)
It occurs when a signal is generated by external hardware. It does not relate to the context being executed at the time.
For details of the EIT processing, see Appendix 9.
10. Structure of PSW
PSW (Processor Status Word) of the data processor of the present invention consists of 32 bits. The lower 16 bits of PSW (PSH--Processor Status Halfword) is used for the user program. It can be freely operated by the user process. On the other hand, the upper 16 bits of PSW (PSS--Processor Status halfword for System) is used for the system. Therefore, it cannot be operated by the user program (ring 3). The upper 8 bits of PSH serves to set various modes and are named PSM (Processor Status byte for Mode). In addition, the lower 8 bits of the PSH serves to display the operation result, which is named PSB (Processor Status Byte): shown in FIG. 46.
10-1. Structure of PSS: shown in FIG. 47.
Reserved to `0`.
If `1` is written, a reserved functional exception (RFE) occurs.
______________________________________SM,RNG = 000 Uses the external interrupt stack pointer (SPI) at ring 0.SM,RNG = 001 reservedSM,RNG = 010 reservedSM,RNG = 011 reservedSM,RNG = 100 Uses the stack pointer for ring 0 (SP0) at ring 0.SM,RNG = 101 Reserved (for ring 1)SM,RNG = 110 Reserved (for ring 2)SM,RNG = 111 Uses the stack pointer for ring 3 (SP3) at ring 3. SM,RNG is <<LA>>. (SM: Stack Mode, RNG: Ring)XA = 0 32-bit contextXA = 1 64-bit context <<LX>>AT = 00 Absence of address conversionAT = 01 Presence of address conversion (the data processor of the present invention standard MMU specification)AT = 10 Absence of address conversion, memory protection by address (<<L1R>>)AT = 11 reserved (AT: Address Translation mode)DB = 0 Context which is not currently debuggedDB = 1 Context which is currently debuggedIMASK Interrupt priority which inhibits an external interrupt and DI (Delayed Interrupt).IMASK = 0000 Accepts only NMI (unmaskable interrupt of priority 0)IMASK = 0001 Masked up to priority 1 (consequently, accepts NMI only).IMASK = 0010 Masked up to priority 2. represented by IMASK.IMASK = 1110 Masked up to priority 14.IMASK = 1111 Not masked______________________________________
The data processor of the present invention controls the memory by 4 levels of ring protection as the <<LA>>specification. (See Appendix.) The data processor of the present invention controls the memory by 2 levels of ring protection. The RNG field represents which rings exist in the current processor. Even if the ring protection is not performed, this field is used to switch between the supervisor mode and the user mode.
The XA bit of the data processor of the present invention32 is reserved. If `1` is written to the bit, an exception occurs.
Since it is difficult to standardize the debug information such as trace in detail, it is stored in a different control register (DCR--Debug Control Register). However, only the information which represents the debugging condition is stored in PSW as DB.
the lower priority external interrupts of the data processor of the present invention are represented with higher numbers. The priority of the external interrupts consist of seven levels from 0 to 7. The priority 0 is the unmaskable interrupt (NMI).
Since it is difficult to completely standardize the control information of the cache and MMU, it is separated from PSW.
Since AT (address translation specified field) is placed in PSW, it is possible to convert the address any context, change the memory protection method, and temporarily stop the address translation only during execution of the EIT process handler.
When AT (address translation bit) in PSW is changed from `00` to `01` by starting LDC, REIT, LDCTX or EIT; TLB and cache purge are automatically conducted, so that TLB and matching with the logical cache is assured. In addition, when AT is changed from `01` to `00`, the matching of the cache (logical cache and physical cache) is assured.
10-2. Structure of PSH: shown in FIG. 48.
Reserved to `0`
If `1` is written, a reserved functional exception (RFE) occurs.
PRNG: Ring number just before entering this ring. PRNG is <<LA>>.
P: P-bit Error Flag <<LU>>
Set if an error relating to the P-bit function occurs. Otherwise, it is cleared. Reserved to `0` at present.
F: General Flag
Used to detect the cause of the termination of a high level instruction.
X: Extension Flag
The carry-out of a multiple length operation.
V: Overflow Flag
Indicates an overflow occurence.
L: Lower Flag
Indicates the contents of the first operand is smaller than those of the other operand in a comparison instruction for both signed with signed comparison and unsigned with unsigned comparison.
M: MSB Flag
Indicates the MSB of the operation result is `1`.
Z: Zero Flag
Indicates the operation result is `0`.
The "ring just before entering" in the PRNG field represents a "ring which is placed at one outer location" or a "ring which requests a service to the ring". Thus, when EIT occurs, PRNG changes as follows:
PSW<RNG>.fwdarw.>PSW<PRNG>.
When EIT occurs in the return mode with the REIT instruction, PRNG changes as follows:
stack.fwdarw.>PSW (including RNG and PRNG).
In the return mode, it is necessary to return from the stack rather than copying RNG. The relationship RNG.ltoreq.PRNG is always satisfied. PRNG is referenced by the ACS command. Actual ring transition uses the information of RNG.
In instruction flow from compared to the conditional jump, processors other than the data processor of the present invention usually distinguish signed data and unsigned data by using a conditional jump instruction rather than a comparison instruction.
For example, unsigned integers are compared using the following instructions:
______________________________________CMP src1,src2BLTS next Branch Lower Than (Signed)______________________________________
Signed integers are compared using the following instructions:
______________________________________CMP src1,src2BLTU next Branch Lower Than (Unsigned)______________________________________
Thus, in this type of flag implementation, information to distinguish the size of numbers and the presence or absence of signs is required.
In the data processor of the present invention, however, the distinction between the presence or absence of a sign is made by using different compare instructions such as the CMP and CMPU instructions. On the other hand, the conditional jump instruction can be used regardless of whether the contents are signed or unsigned. Thus, the flag structure is simplified.
The carry flag used in conventional processors has two functions: one serves to compare the size of unsigned integers and another serves to represent a carry-out in multiple length operations. However, for the latter function, since the data processor of the present invention uses X.sub.-- flag, the carry flag is used only for comparing the size of integers. Thus, the carry flag of the data processor of the present invention is defined as that which represents the relationship of size and is named L.sub.-- flag (Lower Flag). In the case of an unsigned operation, this flag works as conventional carry flag. In the case of a signed operation, it represents the true size since it includes the overflow, unlike conventional carry flags.
F.sub.-- flag (general flag), which represents the termination condition of a string instruction and queue instruction, and P.sub.-- flag (P-bit error flag) which represents an error of the P bit are provided. P.sub.-- flag is reserved to `0` in the specification at present.
Although conventional processors use a carry flag which can contain the dropped bit from a shift instruction, the data processor of the present invention has L.sub.-- flag rather than a carry flag, so that the dropped bit is placed in X.sub.-- flag.
10-3. Flag Change
All the addition, subtraction, comparison and logical operation instructions are 2-operand instructions which have the following format:
dest.op.src.fwdarw.>dest.
If the size of dest differs from that of src, the smaller size operand is sign-extended in accordance with the larger size operand (ADDU, SUBU and CMPU are zero-extended), calculated, the result of the operation is converted into the size of dest, and then stored in dest.
In the case of CMP, CMPU, SUB and SUBU, L.sub.-- flag indicates that the size of the first operand of the previous operation is smaller. For CMPU and SUBU, which are for unsigned operations, L.sub.-- flag functions like the carry (borrow) flag of the convention processors. In a signed operation, L.sub.-- flag represents the true size because it includes the overflow, rather than just copying the M.sub.-- flag. In the ADD instruction, L.sub.-- flag indicates whether the result is negative. It also represents true positive and negative as well as overflow rather than copying the M.sub.-- flag. In the ADDU, since the result always becomes positive, L.sub.-- flag is set to `0`.
V.sub.-- flag indicates the result of the operation cannot be shown by the size being specified. In other words, when the result of an operation cannot be represented by the signed integer of the size of dest (unsigned integer for ADDU and SUBU), V.sub.-- flag is set. In the CMP and CMPU instructions, the status of the V.sub.-- flag is unchanged.
X.sub.-- flag is used to maintain the status of a carry-out in multiple length operations. The flag status is changed regardless of whether the operation is signed or unsigned. Although it functions similar to the carry flag of conventional processors, only the addition, subtraction and shift instructions change X.sub.-- flag.
In the CMP, SUB, CMPU and SUBU instructions, the status of L.sub.-- flag is changed in a similar manner. While SUB, SUBU and SUBX instructions cause X.sub.-- flag to change, CMP and CMPU instructions do not cause it to changed.
In the case of MOV, MOVU, ADD, ADDU, ADDX, SUB, SUBU and SUBX instructions, the statuses of M.sub.-- flag and Z.sub.-- flag are changed depending on the value when the operation result is converted in the size of dest. Thus, if the size of dest is smaller than that of src, even if the operation result is not 0, Z.sub.-- flag may be set. On the other hand, in the CMP and CMPU instructions, the status of Z.sub.-- flag is changed depending on the value of the operation result regardless of the size of dest.
Example: If @dest.B=1
SUB #H'101.W,@dest.B.fwdarw.>Although the operation result 1-H'101 is not 0, since dest becomes 0, Z.sub.-- flag is set.
CMP #H'101.W,@dest.B.fwdarw.>Since the operation result 1-H'101 is not 0, Z.sub.-- flag is cleared.
In ADDX and SUBX instructions, the flag status is irregularly changed to some extent, so that it can be used for both the unsigned integer extended operation and signed integer extended operation. In this case, although it does not completely match the mnemonic of the conditional jump instruction, since the extended operation is not frequently used, this irregularity should be permissible.
L.sub.-- flag: Represents the relationship of size (SUBX) and positive and negative (ADDX) for signed operation.
V.sub.-- flag: Represents an overflow for signed operation.
X.sub.-- flag: In ADDX, represents a carry from the size of dest for the dest +src+X.sub.-- flag operation. In SUBX, it represents a borrow from the size of dest for the dest -src-X.sub.-- flag operation. However, if the size of src is smaller than that of dest, src is sign-extended. In SUBX, if the size of src is the same as that of dest, X.sub.-- flag consequently represents the result of the comparison as unsigned data.
When an operation between different size operands is performed with ADDX and SUBX, the smaller size operand is sign-extended. However, whether the value which is sign-extended is operated on as a signed value or an unsigned value depends on the status of the flag.
In the MOV instruction, MOVU instruction and logical operation instructions, the statuses of X.sub.-- flag and L.sub.-- flag are not changed.
In the logical operation instructions, the status of V.sub.-- flag is not changed.
The details of status flag changes are described in each instructions description. Special attention should be given descriptions marked with an astarisk.
11. Instruction Set Description Format
11-1. Outline of Descriptive Format
MNEMONIC: Represents the name (mnemonic) of the instruction.
OPERATION: Summarizes the function of the instruction.
OPTIONS: Represents the types of options available for the instruction. The options of the instruction serve to change the sub-functions of the instruction and are described as `/xxx` in the assembler syntax.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: Represents the bit pattern, assembler syntax, size, and type of the instruction. In the data processor of the present invention, one instruction mnemonic may have multiple instruction formats such as the general format and short format, each of which is used depending on the addressing mode and size. This paragraph describes the addressing mode and size used in each instruction format.
STATUS FLAGS AFFECTED: Shows how the status flags (PSB) are changed after the instruction is executed.
DESCRIPTION: Describes the functions of the instruction. For details of the assembler mnemonics used in the description, see the Appendix at the end of the manual.
11-2. Instruction Bit Pattern and Assembler Syntax
The "INSTRUCTION FORMAT AND ASSEMBLER SYNTAX" portion is comprised of the mnemonic by format, operand name, operand field name and instruction bit pattern. Example of Description is shown in FIG. 49.
AND:G . . . Mnemonic-every-Format
Represents the mnemonic-every-format of the instruction bit pattern to be described (see Appendix).
src, dest . . . Operand Name
Variable which is used to describe the function of the instruction. This variable is referenced by the "OPERATION" and "DESCRIPTION". The order of the operands described in this description is that of the assembler.
Ear, EaM . . . Operand Field Name
Represents the relationship of the bit pattern, available operand size, available addressing mode, memory access method, and other restricted information. The letters which represent operand field names relate to their meanings so that various meanings can be simply represented.
Portion surrounded by lines . . . INSTRUCTION BIT PATTERN
The "INSTRUCTION BIT PATTERN" represents the operand field, size specified field position, and operation code of the instruction.
The bit represented by `*` is the don't care bit. 0 and 1 of this bit do not effect the instruction decoding.
The bits represented by `-`, `+`, `=` and `#` are currently not used to distinguish the instruction function and operand. However, the portions of `-` and `=` and those of `+` and `#` of the user program should be filled with 0 and 1, respectively. If the bit of `-` is not 0 or if the bit of `+` is not 1, a reserved instruction exception (RIE) occurs.
If the bit of `=` is not 0 or if the bit of `#` is not 1, it is ignored. In other words, as hardware, all `*`, `=` and `#` have the same meaning. However, for future extension, it is necessary to instruct in the users manual that the bits `=` and `#` should be filled with 0 and 1, respectively.
11-3. Field Name
The INSTRUCTION BIT PATTERN contains the option field and size specification field as well as the instruction bit pattern. The data processor of the present invention uses the following option and size specification field names.
Size Specification Field Names
RR: Specifies the size of the operand which performs read accessing.
WW: Specifies the size of the operand which performs write accessing.
MM: Specifies the size of the operand which performs read-modify-write accessing.
BB: Specifies the memory accessing size for bit operation instructions.
XX: Specifies the general size except for the above items (mainly used for specifying the register size).
SS: Specifies the general size except for the above items (mainly used for specifying the displacement size, CMP second operand, string instruction which implicitly specifies an operand, and the MOVA:U instruction which implicitly specifies a stack).
Be sure to repeat the same upper case letter. However, if only 32 bits and 64 bits can be specified, use only one of the two letter.
Option Field Names
The option bit names should mainly be specified by using lower case letters (except the items concerning P bit). The optional field names are as shown bellow. In any case, the assembler defaults to the first description item (e.g. 0, or 00. . as option value).
cccc: Specifies the conditions for Bcc and TRAP/cc.
eeee: Specifies the termination conditions of a string instruction and QSCH instruction.
P,Q . . : Specifies the P bit (Q . . is used to specify the termination condition for the QSCH instruction).
b: /F=0,/B=1 (BSCH, BVSCH, BVMAP, BVCPY, SCMP, SMOV, QSCH)
r: /F=0,/R=1 (SSCH) c: /N=0,/S=1 (CHK) . . `c` for CHK and change index value
d: /0=0,/1=1 (BSCH, BVSCH) . . `d` for data
m: /NM=0,/MR=1 (QSCH) . . . `m` for mask
p: /AS=0,/SS=1 (PTLB, PSTLB, LDATE) . . `p` for PTLB and specific space
ttt: /PT=000,/ST=001,/AT=110, /reserved=010 to 101,111 (PSTLB, LDATE, STATE)
xx: /LS=00,/CS=01 reserved=10,11 (LDCTX, STCTX).
The field names which are not listed above represent the operand field names. If possible, the letters should not have multiple meanings.
11-4. Operand Field Name
The letters which represent the operand field names have the meanings indicated below. Only these field names can indicate various information such as available addressing mode, operand size, and access method.
Basic Addressing Modes
Ea: Uses the addressing mode in 8-bit general format.
Sh: Uses the addressing mode in 6-bit short format.
#: Literal
#i: Immediate
#d: Displacement
Rg: Register
Ll: Register list (for LDM)
Ls: Register list (for STM)
Ln: Register list (for ENTER)
Lx: Register list (for EXITD).
Access Method
Part of basic addressing modes defaults to the following access method. In this case, the letter which represents the access method is not assigned.
#, #i, #d: Reads from the instruction space.
Ls, Ln: Reads from a register.
Ll, Lx: Writes to a register.
For other basic addressing modes, the access method is represented by using the following letters.
R: Read
W: Write
M: Read-modify-write
To abbreviate the field name, RgR, RgW, and RgM are described as RR, RW, and RM, respectively. (BF and CSI instructions).
A: Only performs address calculation.
f: Determines the memory address which is actually operated in with combination with the bit offset. (Suffix of R and M). Example: Bit manipulation instruction.
fq: Although the bit offset is used, it does not exceed the byte boundary. The address to be accessed is determined without referencing the offset. (Suffix of R and M). Example: bit operation instruction in short format.
bf: Determines the memory address and range actually operated with a combination of the bit offset and bit field width. (Suffix of R and M). Example: Fixed length bit field operation instructions.
q: Performs complicated accessing by the queue instruction. (Suffix of other access methods). Example: QINS and QDEL instructions.
i: Performs accessing by bus interlock. (Suffix of M).
%: Performs accessing of special space such as control space and physical space. (Suffix of R, W, and M).
d: Operates two data segments (double). (Suffix of R). Example: CHK instruction.
m: Operates multiple data segments (multiples). (Suffix of R and W). Example: LDM and STM instructions.
Restrictions of Addressing Modes
Once the basic addressing mode and access method have been determined, the restrictions for the addressing mode are automatically determined (such as inhibiting the immediate mode for EaW). However, if other restrictions besides the above exist, the following letters should be placed after the instruction.
!I: Inhibits the immediate mode. Example: Second operand of CMP instruction
!M: Inhibits the addressing mode for the memory. Example: Local operand of ENTER:G instruction
!A: Inhibits the additional mode. Example: ctxaddr operand of LDCTX instruction
!S: Inhibits the stack pop and stack push modes. Example: dest operand of QDEL instruction
Size Specification
The size should be regularly specified by the following fields:
When the access method is R, the size is specified by the RR field.
When the access method is W, the size is specified by the WW field.
When the access method is M, the size is specified by the MM field.
When the access method is R!I, R!M, or R2, the size is specified by the SS field.
When the access method is *f, the size is specified by the BB field. However, it means the access size for the memory operation.
When the access method is A, the size is not specified.
If there is an exception for specifying the address, add the letters listed below to distinguish it. Normally, numbers and lower case letters represent the fixed size, while upper case letters represent the variable size. For example, `w` represents a 32-bit (word) fixed size, while `W` represents the size specified by the WW field.
w: The operand size is always 32 bits. Example: MUL:R instruction.
h: The operand size is always 16 bits. Example: WAIT instruction.
b: The operand size is always 8 bits. Example: src of MOV:E instruction.
S8: The size of the operand (displacement) is specified by the SS field. However, when SS=00 (i.e. when 8 bits are specified), this operand specification field is used. Otherwise, the operand is specified by the extension portion and this field is ignored (it should be set to 0). Example: src of BF:I instruction.
S: The size of the operand (displacement) is specified by the SS field. Example: BRA:G instruction.
R: The operand size is specified by the RR field together with the size of another operand. Example: CMP:I instruction.
W: The operand size is specified by the WW field together with the size of another operand. Example: MOV:I instruction.
M: The operand size is specified by the MM field together with the size of another operand. Example: Instruction of I format.
L: Since the bit pattern which specifies 8 or 16 bits has not been assigned as the operand size, only the operand for 32 or 64 bits can be specified. The size is specified by the R, M, W, and B fields rather than the RR, WW, MM, and BB fields.
P: Since the pointer is used, the size is not specified in the instruction. The size is actually specified by the P bit or the mode (XA bit in PSW). Example: QINS and QDEL instructions.
X: The operand size is specified by the XX field. Example: xreg of ACB and SCB instructions.
Xw: The operand size is specified by the X field together with another operand. This is used for specifying the width of the BF instruction.
Xs: The operand size is specified by the X field together with another operand. This is used for specifying src for the BF instruction.
Xd: The operand size is specified by the X field together with another operand. This is used for specifying dest for the BF instruction.
C: The operand size is specified by the RR field together with another operand. This is used for specifying the value to be compared in the CSI instruction.
3: 3-bit literal.
4: 4-bit literal, Example: TRAPA instruction.
6: 8-bit literal.
8: 8-bit displacement, Example: BRA:8 instruction.
16: 16-bit displacement, Example: MOVA:R instruction.
When the operand size (which is implicitly specified by a high level instruction such as a string manipulation instruction) is specified, SS is used as the field name. In the free-length bit field instruction, X is also used.
Others
Z: Indicates 0 of the bit pattern of the literal accords with 0 of the operand value. N is the bit number in the literal.
______________________________________0. . .000 00. . .001 10. . .010 2 . . .1. . .110 2 N-21. . .111 2 N-1Example: offset of BTST:Q______________________________________
n: Indicates 0 of the bit pattern of the literal accords with 2N of the operand value. N is the bit number in the literal.
______________________________________0. . .000 2 N0. . .001 10. . .010 2 . . .1. . .110 2 N-21. . .111 2 N-1Example: src of MOV:Q______________________________________
c: Indicates the bit pattern of the literal shows the 2's complement. N is the bit number in the literal.
______________________________________0. . .000 -2 N0. . .001 -(2 N-1)0. . .010 -(2 N-2) . . .1. . .110 -21. . .111 -1Example: Shift count of shift-right operation in SHA:C and SHL:C______________________________________
1,2 . . .: If there are two or more operands which are accessed in the same manner in one instruction, distinguish them.
The restrictions for size which specifically relate to the instruction functions are given in each instruction rather than the operand field and size specification field names. They contain the specification of a size which is not 8 bits for shift count and logical operation in different size operands.
11-5: Restriction for Addressing Mode
The following operand field names have restrictions in the available addressing modes.
EaR, ShR . . . @-SP cannot be used.
EaW, ShW . . . #imm.sub.-- data and @SP+ cannot used.
EaM, ShM . . . #imm.sub.-- data, @-SP, and @SP+ cannot be used.
EaA . . . @SP+, @-SP, Rn, and #imm.sub.-- data cannot be used.
The restrictions concerning the addressing mode are given in "DESCRIPTION" of each instruction.
11-6 Notes for Description
For the stack operation instructions, TOS represents the top position of the stack. (.uparw.) TOS represents the pop from the stack, while (.dwnarw.) TOS represents the push to the stack.
The basic 2-operand instructions (MOV, MOVU, ADD, ADDU, ADDX, SUB, SUBU, SUBX, AND, OR, XOR, CMP and CMPU) describe their operations in the following manner:
The sizes of dest (src2) and src(src1) (number of bits) and the value, where src(src1), dest(src2) is broken down into individual bits are represented as d and s and D0, D1, . . . ,Dd-1, S0,S1, . . . ,Ss-1, respectively. Thus,
dest(src2)=[D0.D1. . .Dd-2.Dd-1]
src(src1)=[S0.S1. . . Ss-2.Ss-1]
[. . . ] represent the binary notation and `.` represents a delimiter between each digit. The value which is set to dest as the result of the operation is represented as follows:
dest.op.src=result=[R0.R1. . .Rd-2.Rd-1]
Except for MOV, MOVU, CMP and CMPU, the result is set to dest. In addition, if s>d, only the lower bits of the operation result are set to dest. The value before the upper bits of the operation result are removed is represented as follows:
result=[F0.F1 . . . Fs-2.Fs-1].
The number of bits of R and F are d and s, respectively.
When the bit string [. . . ] is treated as a signed binary number, the value of the bit string is represented by S[. . . ]. If it is treated as an unsigned binary number, the value that the bit string shows is represented as U[. . . ]. On the other hand, if the bit string is treated as a signed packed type decimal number, the value that the bit string shows is represented as SD[. . . ]. If it is treated as an unsigned packed type decimal number, the value that the bit string shows is represented as UD[. . . ]. In addition, ` ` and ` ` represent the logical negation and power, respectively.
Likewise, "DESCRIPTION" of the fixed length bit field instruction gives the description of detail operation in the following notation.
bitfield=[Bo.Bo+1 . . . Bo+w-2.Bo+w-1].
[Sn.Sn+1 . . . Sm-2.Sm-1] is abbreviated as [Sn to m-1].
[S0.S1 . . . Sd-2.Sd-1]=[S0 to s-1] may be simply represented as [S].
This rule is applicable to [D], [R], [B], and [F].
12. Instruction Set of the Data Processor of the Present Invention
12-1. Data Transfer Instructions
MNEMONIC: MOV src,dest.
OPERATION:
src.fwdarw.dest.
Move and sign-extend data.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 50(a),
STATUS FLAS AFFECTED: shown in FIG. 50(b).
DESCRIPTION: Move data from the source operand (src) to the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the size of the source operand is sign-extended.
If the value of the source operand cannot be represented as a signed integer in the size of the destination operand because the size of the destination operand is smaller than that of the source operand, V.sub.-- flag is set.
Although MOV:Z is a clear instruction, since its operation and status flags change are the same as those of the MOV instruction, it is treated as one of the short formats of MOV.
Although the MOV, ADD, SUB and CMP instructions serve to perform operations with sign, the literal contains only the positive range. This is because the literal which can be used by MOV:Q, ADD:Q, SUB:Q and CMP:Q is in the range from 1 to 8 (operand field name: #3n). If src of the MOV and MOVU instruction is an immediate value, the relationship between the immediate value and the available format is as follows.
______________________________________[MOV] :Z src = 0 :Q 1 .ltoreq. src .ltoreq. 8 :E -128 .ltoreq. src .ltoreq. 127 :I src is any number. :G src is any number.[MOVU] :E 0 .ltoreq. src .ltoreq. 255 :G src is any number.______________________________________
It is also applicable to the ADD, SUB and CMP instructions. ##STR1##
PROGRAM EXCEPTION:
Reserved instruction exceptions
When RR=`11`
When WW=`11`
When EaR or ShR is @-SP
When EaW or ShW is #imm.sub.-- data or @SP+.
MNEMONIC: MOVU src,dest.
OPERATION:
zex(src).fwdarw.dest.
Move and zero-extend data.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 51.
STATUS FLAGS AFFECTED: shown in FIG. 52.
DESCRIPTION: Move the contents from the source operand src to the destination operand dest.
If the size of the source operand is smaller than that of the destination operand, the data of the source operand is zero-extended.
If the value of the source operand cannot be represented as an unsigned integer with the size of the destination operand because the size of the destination operand is smaller than that of the source operand, V.sub.-- flag is set. ##STR2##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When WW=`11`
When EaR is @-SP
When EaW is #imm.sub.-- data or @SP+.
MNEMONIC: PUSH src.
OPERATION: push to stack.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 53.
STATUS FLAGS AFFECTED: shown in FIG. 54.
DESCRIPTION: Push the contents of the source operand src to the stack.
Although this instruction can be considered as a short form of `MOV *, @-SP`, its status flag is not changed and functions symmetrically to POP, it is treated as a different instruction.
The @SP+ mode cannot be used in the addressing mode specified by src/EaRL because the @-SP mode cannot be used by dest/EaWL of the POP instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When R=`1`
When EaRL is @SP+ or @-SP,
MNEMONIC: POP dest.
OPERATION: pop from stack.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 55.
STATUS FLAGS AFFECTED: shown in FIG. 56.
DESCRIPTION: Move the contents which are popped from the stack to dest. This instruction can be considered a short form of MOV @SP+, *. Since the operation where SP is contained in src differs from that of MOV @SP+, and the flag status is not changed, it is treated as a different instruction.
The @-SP mode cannot be used in the addressing mode specified by dest/EaWL. If it is specified, a reserved instruction exception (RIE) occurs. This is because if the instruction POP @-SP is executed, it is not clear when SP is updated.
PROGRAM EXCEPTION: Reserved instruction exceptions
When W=`1`
When EaWL is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: LDM src,reglist.
OPERATION: load multiple registers.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 57.
STATUS FLAGS AFFECTED: shown in FIG. 58.
DESCRIPTION: Load the multiple registers from the memory. Specify the registers to be loaded using the bit map reglist/LlRL (register list). LlRL should follow the extension portion of EaRmL.
Specify the bit map of the register list to be loaded in the following manner shown in FIG. 59.
When the addressing mode @SP+ is specified by EaRmL, the contents are popped in order beginning with the smallest number register. The contents of SP increase 4 times (or 8 times) as fast as the number of register being loaded. When another addressing mode is specified, the effective address being obtained points to the beginning of the memory data to be loaded into the registers. In any case, the smaller number registers are located at the smaller number addresses.
The format of the registers' bit map to be loaded is determined so that the next register where data is moved can be identified by the same circuit as that used by the BSCH/F and BVSCH/F instructions. The circuit where the `0` or `1` bits which occurs next time can be searched in the MSB direction. For LDM @SP+, since data is moved from the smaller number registers, the smaller number registers are on the MSB side. In the case of other addressing modes, since the start address of the register save block is treated as an effective address, it is necessary to move data from the smaller number registers. Thus, the same format as LDM @SP+ is used.
These formats are determined by considering the data movement order of the registers. If the hardware resource is small, the data movement order described above is very suitable. However, since the real data movement order is not defined in the data processor of the present invention specifications, it can be freely determined when it is implemented.
In the EaRmL addressing mode, the specification of @-SP, register direct mode Rn, immediate mode #imm.sub.-- data and additional mode are illegal. The additional mode is inhibited because if an overlap exists between the registers and register save area which are saved and restored by LDM and STM and those which are used in the additional mode, it becomes difficult to reexecute the instruction.
If the register list is all zeroes, no operation is performed and the instruction is terminated (rather than flagging the occurrence of an error).
PROGRAM EXCEPTION: Reserved instruction exceptions
When R=`1`
When EaRmL is Rn, #imm.sub.-- data, @-SP or additional mode.
MNEMONIC: STM reglist, dest.
OPERATION: store multiple registers.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 60.
STATUS FLAGS AFFECTED: shown in FIG. 61.
DESCRIPTION: Store the contents of multiple registers to memory. Specify the registers to be stored by the bit map reglist/LsWL (register list). LsWL should follow the extended portion.
Specify the bit map of the register list (reglist) to be stored in the manner shown in FIG. 62, 63.
When the addressing mode of @-SP is specified to EaWmL, the contents are pushed in order beginning with the largest number register. The contents of SP decrease 4 times (or 8 times) as much as the number of registers being saved. When another addressing mode is specified, the effective address being obtained points to the beginning of the memory data to be saved to the registers. In any case, the smaller number registers are located at the smaller number addresses.
The format of the registers' bit map to be moved is determined so that the next register where data is moved can be identified by the same circuit as that used by the BSCH/F and BVSCH/F instructions which search for the first occurence of `0` or `1` starting with the LSB and moving toward the MSB.
Since data is moved from the larger number registers, the larger number registers are on the MSB side in STM @-SP. In other addressing modes, since the start address of the register save block is treated as the effective address, it is necessary to move data from the smaller number registers, so the smaller number registers are on the MSB side.
These formats are determined by the data movement order of the registers. If the hardware resource is small, the data movement order described above is very suitable. However, since the real data movement order is not defined in the data processor of the present invention specifications, it can be freely determined when implemented in hardware.
In the EaWmL addressing mode, the specification of @SP+, register direct mode Rn, immediate mode #imm.sub.-- data and additional mode are illegal. The additional mode is inhibited because if an overlap exists between the registers and register save area, which are saved and restored by LDM and STM, and those which are used in the additional mode, it becomes difficult to reexecute the instruction.
In the LDM and STM instructions, the memory area is not assigned to the registers where data is not moved.
For example,
STM.W(R1,R3,R9),@-SP
causes the following operation. (However, assume that the SP value before executing the instruction is initSP.)
R9.fwdarw.mem[initSP-4]
R3.fwdarw.mem[initSP-8]
R1.fwdarw.mem[initSP-12]
initSP-12.fwdarw.SP.
If the register list is all zeroes, no operation is performed and the instruction is terminated (rather than flagging the occurance of an error).
PROGRAM EXCEPTION: Reserved instruction exception
When W=`1`
When EaWmL is Rn, #imm.sub.-- data, @SP+ or additional mode.
MNEMONIC: MOVA srcaddr, dest.
OPERATION:
address of src .fwdarw. dest.
Move address of src to dest.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 64.
STATUS FLAGS AFFECTED: shown in FIG. 65.
DESCRIPTION: Move the effective address of the source operand to the destination operand.
Although the operation of the instruction is equivalent to the MOV instruction, this instruction is treated as a different instruction. The MOVA instruction features the address calculation on the left-side, pointer operation in high level language and application in an address calculation circuit, resulting in much faster calculation.
The following instruction in the short format
MOVA:R@(disp:16,Rs),Rd
actually becomes a three-operand addition instruction.
Rs+disp:16.fwdarw.Rd.
However, since the status flags are not changed, this instruction is classified as the MOVA instruction.
When the PC relative indirect mode is specified to srcaddr and the PC relative displacement is set to 0, the current PC value, that is, the start address of the MOVA instruction, is stored in dest. On the other hand, when the instruction length of the MOVA instruction is specified as the PC relative displacement, the address of the instruction following the MOVA instruction is stored in dest. These functions are useful when the coroutine process is performed.
In the assembler, the size is specified by the <OPERATION> or dest. srcaddr serves only for caliculating the address rather than for specifying the size.
In the addressing mode specified by EaA, the immediate, @SP+, and @-SP modes are not used.
PROGRAM EXCEPTION: Reserved instruction exceptions
When+=`0`
When=`1`
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP
When EaW is #imm.sub.-- data or @SP+
MNEMONIC: PUSHA srcaddr.
OPERATION: push address to stack.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 66.
STATUS FLAGS AFFECTED: shown in FIG. 67.
DESCRIPTION: Push the effective address of the source operand (srcaddr) to the stack.
Although this instruction can be considered as a short format of MOVA *, @-SP. It is treated as a different instruction. It features an increase in the execution speed over the MOV instruction.
PROGRAM EXCEPTION: Reserved instruction exception
When S=`1`
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP.
12-2. Comparison and Test Instructions
MNEMONIC: CMP src1, src2.
OPERATION:
src2-src1, flags affected.
Comparison and sign-extension and comparison.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 68.
STATUS FLAGS AFFECTED: shown in FIG. 69.
DESCRIPTION: Compare the contents of the src1 operand to those of the src2 operand and set PSB (L.sub.-- flag and Z.sub.-- flag).
If the size of the src1 operand differs from that of the src2 operand, the smaller size operand is sign-extended and both the contents are compared.
In the EaR!I and ShR!I modes, the immediate is inhibited, while in the @SP+ mode, it is available. In the `CMP @SP+, @SP+`, although the stack pointer changes twice as much as the size of the operand, this instruction may be used to simulate a stack machine.
Although CMP:Z is one of the test instructions, since its operation and status flags change are the same as those of the CMP instructions, it is treated as one of the short formats of CMP.
The operation of CMP is described using the following instructions: ##STR3##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When SS=`11`
When EaR or ShR is @-SP
When EaR!I or ShR!I is #imm.sub.-- data or @-SP.
MNEMONIC: CMPU src1, src2.
OPERATION:
src2-src1, flags affected.
Zero-Extension and comparison.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 70.
STATUS FLAGS AFFECTED: shown in FIG. 71.
DESCRIPTION: Compare the contents of the src1 operand to these of the src2 operand and set PSB (L.sub.-- flag and Z.sub.-- flag).
If the size of the src1 operand is smaller than that of the src2 operand, the smaller size operand is zero-extended and both the contents are compared.
In the EaR!I mode, the immediate is inhibited, while in the @SP+ mode, it is available.
The operation of CMPU is described using the following instructions: ##STR4##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When SS=`11`
When EaR is @-SP
When EaR!I is #imm.sub.-- data or @-SP.
MNEMONIC: CHK: bound, index, xreg.
OPERATION:
check upper and lower bounds
check the range of the array
OPTIONS:
/S: Subtract lower bound value.
/N: Do not subtract lower bound value. (Default).
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 72.
STATUS FLAGS AFFECTED: shown in FIG. 73.
DESCRIPTION: Check the range of the array index and load it into the register.
At the address specified by bound, a pair of upper and lower bound values are placed. The upper and lower bound values are compared to the contents of the comparison value operand which is fetched by the index. The upper bound value is placed at the effective address of bound, while the lower bound value is located at the address of: (effective address of bound + operand size). The comparison is made using signed integers. If the comparison value is not in the range between the upper bound value and lower bound value, V.sub.-- flag is set. Therefore, by executing the TRAP instruction, it is possible to start the exception process. When /S is specified, the value where the lower bound value is subtracted from the comparison value, is loaded to the register xreg. When /S is not specified, the comparison value is directly loaded to the register xreg. The comparison value being loaded to the register is often used to calculate the address of the array index.
______________________________________Operation:tmp = mem[address.sub.-- of.sub.-- bound + operand.sub.-- size]if (index .gtoreq. mem[address.sub.-- of.sub.-- bound] .or. index < tmp)then set V.sub.-- flag;if (c == 1)then index - tmp ==> xregelse index ==> xreg______________________________________
Since `address.sub.-- of.sub.-- ` is the inverse operator of `mem[. .]`, the meaning of bound is the same as that of mem[address.sub.-- of.sub.-- bound].
If the comparison value accords with the lower bound value, it is treated as being in the range. If the comparison value accords with the upper bound value, it is treated as being out of the range. For example, if the memory of bound is (0,100), CHK treats 0 to 99 of the index as being in the range.
L.sub.-- flag and Z.sub.-- flag are set in accordance with the result of the comparison to index like CMP. In the following case, L.sub.-- flag=1.
index<lower bound value.
This relation is tabulated as in FIG. 74.
note1: LBV stands for lower bound value, UBV stands for upper bound value.
note2: If the upper bound value<lower bound value, the comparison value may become `1` due to comparison to the lower bound value.
In this case, the flags are set depending on the operation result of (index-lower bound value). The following three instructions show that L.sub.-- flag is set if the contents of the second operand are smaller than those of the first operand (lower bound value of the first operand bound in CHK).
CMP: src1, src2
SUB: src, dest
CHK: bound, index, xreg.
The CHK instruction does not check (upper bound value.gtoreq. lower bound value). The instruction should function as described in the "Operation" above regardless of the upper bound value and lower bound value.
In the addressing mode specified by EaRdR, the register direct Rn, @-SP, @SP+ and #imm.sub.-- data modes cannot be used. If it is necessary to compare some value to that in a register, use CMP twice rather than CHK.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When EaR is @-SP
When EaRdR is Rn, #imm.sub.-- data, @SP+ or @-SP.
12-3. Arithmetic Instructions
MNEMONIC: ADD src,dest.
OPERATION:
dest+src.fwdarw.dest.
Addition or addition with sign-extension.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 75.
STATUS FLAGS AFFECTED: shown in FIG. 76.
DESCRIPTION: Add the contents of the source operand (src) to those of the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the source operand is sign-extended and the contents of the source operand are added to those of the destination operand.
If the result of the operation cannot be expressed as a signed integer in the size of the destination operand because its size is smaller than that of the source operand, V.sub.13 flag is set.
For doing ADD: L @SP+,SP in the L-format, like ADD: G @SP+,SP, it is recommended that the following operation be performed.
(initSP+4)+@initSP.fwdarw.SP.
However, it may be difficult to perform such an operation in the L-format, so the operation of ADD: L @SP+,SP should depend on the implementation. ##STR5##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR is `11`
When MM is `11`
When EaR or ShRw is @-SP
When EaM or ShM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: ADDU src,dest.
OPERATION:
dest+src.fwdarw.dest.
Zero-Extension and addition.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 77.
STATUS FLAGS AFFECTED: shown in FIG. 78.
DESCRIPTION: Add the contents of the source operand (src) to those of the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the source operand is zero-extended and the contents are added to those of the destination operand.
If the operation result cannot be represented as an unsigned integer in the size of the destination operand because the size of the destination operand is smaller than that of the source operand, V.sub.-- flag is set.
Because the operation result always becomes positive, L.sub.-- flag of ADDU is always reset to 0. ##STR6##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: ADDX src,dest.
OPERATION:
dest+src+X.sub.-- flag.fwdarw.dest
Addition with a carry.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 79.
STATUS FLAGS AFFECTED: shown in FIG. 80.
DESCRIPTION: Add the contents (X.sub.-- flag) of the source operand (src) with the carry to the contents of the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the source operand is sign-extended and the contents are added to those of the destination operand.
The flag value of Z.sub.-- flag can be accumulated. The status flags of ADDX, including sign- and zero-extension, are the same as those of ADD, except for Z.sub.-- flag.
For the different size operands in ADDX and SUBX, for example, if the contents of 4 bytes in src are added to the contents of 8 bytes in dest2 to dest1, this instruction may be used as ADDX: E #0 in the following: ##STR7##
Assume that the number is signed, perform the operation, and represent the result as negative. If d.noteq.s, sign-extend the operand and compare the contents of both the operands. (M.sub.-- flag correctly represents the result as positive or negative only when there is no overflow.) ##STR8##
If d>s, sign-extend the operand so that it is used in conjunction with other flag setting operations such as dest. However, the operand is treated as an unsigned number in the operation is done after the operand is sign-extended.
______________________________________(If d<s)U[ D0. D1. . . .Dd-2.Dd-1] + U[Ss-d.Ss-d+1. . . .Ss-2.Ss-1] + X.sub.-- flag .gtoreq. +2 dS0.S1. . . . .Ss-d-1s - d bits are truncated.______________________________________
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When Ear is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: SUB src,dest.
OPERATION:
dest-src.fwdarw.dest.
Subtraction or subtraction with sign-extension.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 81.
STATUS FLAGS AFFECTED: shown in FIG. 82.
DESCRIPTION: Subtract the contents of the source operand (src) from those of the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the source operand is sign-extended and the contents of the source operand are subtracted from those of the destination operand.
If the operation result cannot be represented as a signed integer in the size of the destination operand, V.sub.-- flag is set. ##STR9##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR or ShRw is @-SP
When EaM or ShM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: SUBU src,dest.
OPERATION:
dest - src.fwdarw.dest.
Zero-extension and substraction,
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 83.
STATUS FLAGS AFFECTED: shown in FIG. 84.
DESCRIPTION: Subtract the contents of the source operand (src) from those of the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the source operand is zero-extended and the contents of the source operand are subtracted from those of the destination operand.
If the operation result cannot be represented as an unsigned integer in the size of the destination operand, V.sub.-- flag is set. ##STR10##
PROGRAM EXCEPTION:
Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP,
MNEMONIC: SUBX src,dest.
OPERATION:
dest - src - X.sub.-- flag.fwdarw.dest.
Subtraction with a carry.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 85.
STATUS FLAGS AFFECTED: shown in FIG. 86.
DESCRIPTION: Subtract the contents of the source operand (src) with the carry from those of the destination operand (dest).
If the size of the source operand is smaller than that of the destination operand, the source operand is sign-extended and the contents of the source operand are subtracted from those of the destination operand.
The flag value of Z.sub.-- flag can be accumulated. The status flags of SUBX including sign- and zero-extension are the same as those of SUB except for Z.sub.-- flag. ##STR11##
If d>s, sign-extend the operand so that this operand is used in conjunction with other flag setting operations such as dest. However, the operand is treated as an unsigned number in the operation is done after the operand is sign-extended.
______________________________________(If d<s) U[ D0. D1. . . .Dd-2.Dd-1] -U[Ss-d.Ss-d+1. . . .Ss-2.Ss-1] - X.sub.-- flag < 0S0.S1. . . . .Ss-d-1s - d bits are truncated.______________________________________
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP,
MNEMONIC: MUL src,dest.
OPERATION:
dest * src.fwdarw.dest.
Multiplication.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 87.
STATUS FLAGS AFFECTED: shown in FIG. 88.
DESCRIPTION: Multiply the contents of the destination operand (dest) by those of the source operand (src). The multiplication is performed with signed numbers. The contents of the operands are treated as signed integers.
This instruction is useful for high level languages because the size of the multiplicand is the save as that of the result.
If the operation result cannot be represented as a signed integer because the size of the destination operand is small, V.sub.-- flag is set. Even if an overflow occurs, M.sub.-- flag and Z.sub.-- flag are set depending on the data which is set to dest (low order bit of correct result). For example, with
R0=H'10000
when executing the following instruction
MUL.W #H'10000,R0
since the product becomes H'100000000, the following results are obtained:
R0=0 (low order bit), V.sub.-- flag=1, and Z.sub.-- flag=1.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP,
MNEMONIC: MULU src,dest,
OPERATION:
dest * src.fwdarw.dest.
Unsigned multiplication.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 89.
MULU:G src/EaR,dest/EaM,
STATUS FLAGS AFFECTED: shown in FIG. 90.
DESCRIPTION: Multiply the contents of the destination operand (dest) by those of the source operand (src). The multiplication is performed with unsigned numbers. The contents of the operands are treated as unsigned integers.
If the operation result cannot be represented as an unsigned integer because the size of the destination operand is smaller than that of the source operand, V.sub.-- flag is set.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP,
MNEMONIC: MULX src,dest,tmp,
OPERATION:
dest * src.fwdarw.reg&dest (double size).
Extended multiplication, double size.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 91.
STATUS FLAGS AFFECTED: shown in FIG. 92.
DESCRIPTION: Multiply the contents of the destination operand (dest) by those of the source operand (src). Since the result of this instruction is double sized, the temporary register tmp is specified for placing the high order bits of the product. The register is fixed to 32 bits (selected from 32/64 bits). The multiplication is performed with unsigned numbers. The size of the product is twice as much as the size of the multiplicand.
Operation of MULX
dest[0:31]*src[0:31].fwdarw.tmp1[0:63]
tmp1[32:63].fwdarw.tmp[0:31]
tmp1[0:31].fwdarw.dest[0:31]
Since MULX has two results to be obtained: one is dest and another is tmp, if the values of two results are overlapped (i.e., the same register is used for dest and tmp), a problem occurs.
Since tmp (high order digit of MULX) is often used for a carry out to the next digit, it may not be used for calculating the last digit. Thus, if both the results are overlapped, the value which should be set to dest (low order digit) would be kept.
The status flags of M.sub.-- flag and Z.sub.-- flag in MULX are changed according to dest. The value being set to tmp does not affect these flags because of the following reasons:
The status flags are changed in the manner of those of ADDX and SUBX. (Even if X.sub.-- flag of ADDX and SUBX are set, when dest is 0, Z.sub.-- flag is set.)
In the case of multiple length operations, the status flags changed only by tmp and dest (tmp&dest) are not usefull. To change the flags in the proper manner, it is necessary to determine them in steps rather than one of them. Even if the status flags are changed by tmp and dest (tmp&dest), the correct result cannot be obtained.
Example ##STR12##
Since the value to be set to dest is 0, Z.sub.-- flag is set.
Unlike ADDX and SUBX, in MULX and DIVX, the status of Z.sub.-- flag is not accumulatively changed.
With F.sub.-- flag, tmp=0 can be tested.
If !=0, the operation cannot be assured.
In the data processor of the present invention, if !=0, the contents of the operand are fetched as !R (8 bits or 16 bits) in the src size. It is sign-extended to 32 bits and the instruction is executed.
However, dest and tmp are always treated as 32 bits regardless of !R.
PROGRAM EXCEPTION: Reserved instruction exceptions
When !R=`11`
Note: If !=0, the instruction is not detected as a reserved instruction exception.
When EaR is @-SP
When EaMR is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: DIV src, dest.
OPERATION:
dest/src.fwdarw.dest.
Division.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 93.
STATUS FLAGS AFFECTED: shown in FIG. 94.
DESCRIPTION: Divide the contents of the destination operand (dest) by those of the source operand (src). The division is performed with signed numbers. (The contents of the operands are treated as signed integers.)
Since the size of the dividend of this instruction is the same as that of the result, this instruction is usefull for high level languages.
The quotient is rounded off to 0 and the sign of the remainder becomes the same as that of the dividend.
EXAMPLE
______________________________________10/3 --> Quotient = 3, Remainder = 1(-10)/3 --> Quotient = (-3), Remainder = (-1)10/(-3) --> Quotient = (-3), Remainder = 1______________________________________
If src=0, a zero division exception (ZDE) occurs. In the case of division by zero, V.sub.-- flag is set, so that the exception process is started. The value of dest is not changed, however the data processor of the present invention does not care whether the write access for the dest is performed or not. In addition, the status flags, except for V.sub.-- flag, are not changed, so that it functions like dest. To analyze the cause where the exception occurs, it is necessary to keep the previous status (including status flags).
Besides division by zero of DIV, only (minimum negative value).div.(-1), causes an overflow. Unlike DIVX, since DIV is a conventional operation instruction which is generated by the compiler, it is recommended they handle overflow the same way. To do that, the status flags are changed as follows:
______________________________________V.sub.-- flag = 1, L.sub.-- flag = 0, M.sub.-- flag = 1, Z.sub.-- flag =(Where the minimum negative number + (-1))______________________________________
An overflow occurs only when the minimum negative number.div.(-1) occurs. Even if the low order bits of the correct result are set to dest, the status of dest is not changed. Even if it becomes the low order bits of the correct result, the value is not changed.
EXAMPLE
If DIV.H is executed while src=H'ffff=(-1) and dest=H'80000=(-32768), the following result is obtained.
.fwdarw.dest=H'80000, V.sub.-- flag=1.
It is possible to consider H'8000 of dest as the low order bits of the correct result (H'. . . 008000=32768) or more simply, dest is unchanged.
PROGRAM EXCEPTION Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
Zero division exception
When src=0.
MNEMONIC: DIVU src,dest
OPERATION:
dest/src.fwdarw.dest.
Unsigned division.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 95.
STATUS FLAGS AFFECTED: shown in FIG. 96.
DESCRIPTION: Divide the contents of the destination operand (dest) by those of the source operand (src). The division is performed by unsigned numbers. (The contents of the operands are treated as unsigned integers.)
If src=0, a zero division exception (ZDE) occurs. In the case of division by zero, V.sub.-- flag is set, so that the exception process is started. The value of dest is not changed, however the data processor of the present invention does not care whether the write access for the dest is performed or not. In addition, the status flags, except for V.sub.-- flag, are not changed, so that it functions like dest. To analyze the cause where the exception occurs, it is necessary to keep the previous status (including status flags).
Besides division by zero of DIVU instruction, V.sub.-- flag is not reset by an occurrence of an overflow. Except for division by zero, V.sub.-- flag is always cleared.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP
Zero division exception
When src=0.
MNEMONIC: DIVX src,dest,tmp.
OPERATION:
reg&dest/src.fwdarw.dest, reg (quotient, remainder).
Extended division, shortening size, and presence of remainder.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 97.
STATUS FLAGS AFFECTED: shown in FIG. 98.
DESCRIPTION: Divide the contents of the destination operand by those of the source operand. Since this instruction becomes a primitive of multiple length division, a register besides src and dest, is used to place the temporary value (remainder) for the extension operation. The size is fixed to 32 bits (which is selected from 32/64). The division is performed with unsigned numbers. The size of the dividend becomes twice as much as the size of divider.
Operation of DIVX
concatinate(tmp[0:31],dest[0:31]).fwdarw.tmp1[0:63]
quo(tmp1[0:63],src[0:31]).fwdarw.dest[0:31]
rem(tmp1[0:63],src[0:31]).fwdarw.tmp[0:31].
Since DIVX has two results to be obtained: one is dest and another is tmp, if the values of two results are overlapped (if the same register is used for dest and tmp), a problem occurs. Since tmp (remainder of DIVX) is often used for a borrow to the next digit, it may not be used for calculating the last digit. Thus, if both the results are overlapped, the value which would be sent to dest (quotient of DIVX) would be kept.
Although DIVX is used when the dividend is multiple length, if the divider becomes multiple length, DIVX cannot be used. The division should be performed by repeating the shift operations and subtraction operations using a subroutine. A multiple length shift operation is required. To perform the multiple length shift operation, rotate instructions (SHXR and SHXL) are provided using X.sub.-- flag.
The statuses of M.sub.-- flag and Z.sub.-- flag of DIVX are based on dest (quotient). The value (remainder) which is set to tmp does not affect such flags. However, with F.sub.-- flag, tmp=0 can be tested.
Unlike ADDX and SUBX, Z.sub.-- flag of MULX and DIVX is not accumulatively changed.
If an overflow occurs as the result of the DIVX operation, to match the specification of this instruction to the overflows of MOV, ADD, SUB and MUL, it is recommended that the low order bits of the correct result be set to dest. Unlike ADD and SUB, the low order bits of the correct result are not automatically obtained even if an overflow occurs. The division is calculated from the high order bits, so it is difficult to obtain the low order bits of the correct result due to the nature of the algorithm. Thus, if an overflow occurs in DIVX, dest is not changed.
If an overflow occurs because the quotient is not contained in dest in the DIVX operation, the status flags, except for the V.sub.-- flag, are not changed. If an overflow occurs in the DIVX operation, dest is not changed.
If src=0, a zero division exception (ZDE) occurs. If division by zero occurs, the contents of dest and tmp are not changed, however the data processor of the present invention does not care whether the write access of dest is performed or not. The status flags, except for the V.sub.-- flag, are not changed so that they accord with the contents of dest. It is recommended to keep the previous status (including status flags) to analyze the cause the exception by the exception process program.
If !=0, the operation of the instruction is not assured.
In the data processor of the present invention, if !=0, the contents of the operand are fetched as !R (8 bits or 16 bits) in the src size. It is sign-extended to 32 bits and the instruction is executed.
However, dest and tmp are always treated as 32 bits regardless of !R.
PROGRAM EXCEPTION: Reserved instruction exceptions
When !=`0`
When R=`1`
When EaR is @-SP
When EaMR is #imm.sub.-- data, @SP+ or @-SP
Zero division exception
When src=0.
MNEMONIC: REM src, dest.
OPERATION:
dest % src .fwdarw. dest.
Remainder.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 99.
STATUS FLAGS AFFECTED: shown in FIG. 100.
DESCRIPTION: Divide the contents of the destination operand (dest) by those of the source operand (src) and obtain the remainder. The division is performed with signed numbers. (The contents of the operands are treated as signed integers.)
Since the size of the dividend is the same as that of the remainder, this instruction is usefull to high level programming languages.
The quotient is rounded off toward 0 and the sign of the remainder becomes the same as that of the dividend.
EXAMPLE
______________________________________10/3 --> Quotient = 3, Remainder = 1(-10)/3 --> Quotient = (-3), Remainder = (-1)10/(-3) --> Quotient = (-3), Remainder = 1______________________________________
If src=0, a zero division exception (ZDE) occurs. However, if division by zero is performed in REM, the overflow is cleared and the exception process is started. Unlike the DIV instruction, the zero division of the REM instruction does not cause dest (remainder) to be overflowed, so it is necessary to clear V.sub.-- flag.
When V.sub.-- flag is cleared, it can be easily distinguished whether the error is caused by DIV or REM in the exception process.
When division by zero is performed, the contents of dest are not changed. Defining whether the memory access of dest is performed (read or read-modify-write by the same value) or not causes the implementation to be restricted, so that it is not defined.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP
Zero division exception
When src=0.
MNEMONIC: REMU src, dest.
OPERATION:
dest % src.fwdarw. dest
Remainder by unsigned division operation.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 101.
STATUS FLAGS AFFECTED: shown in FIG. 102.
DESCRIPTION: Divide the contents of the destination operand (dest) by those of the source operand (src) and obtain the remainder. The division operation is performed by unsigned numbers. (The contents of the operands are also treated as unsigned integers.) If the size of src differs from that of dest, the zero-extension is performed.
Since the size of the dividend is the same as that of the remainder, it is usefull to high level languages.
If src=0, a zero division exception (ZDE) occurs. When division by zero is performed, the same result as division by zero in REM occurs.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP
Zero division exception
When src=0.
MNEMONIC: NEG dest.
OPERATION:
0-dest.fwdarw. dest
Complimentary operation.
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 103.
STATUS FLAGS AFFECTED: shown in FIG. 104.
DESCRIPTION: Negate the sign of the operand.
L.sub.-- flag: If the value of dest is negative after the instruction is executed, namely, if the initial value of dest is positive, this flag is set.
M.sub.-- flag: If MSB of dest is 1 after the instruction is executed, namely, if the initial value of dest is positive or the minimum negative value, this flag is set.
Z.sub.-- flag: If the value of dest is 0 after the instruction is executed, namely, if the intitial value of dest is 0, this flag is set.
V.sub.-- flag: If the initial value of dest is the minimum negative value (only MSB is 1 and other bits are all 0), this flag is set.
PROGRAM EXCEPTION: Reserved instruction exceptions
When MM=`11`
When EaM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: INDEX indexsize, subscript, xreg.
OPERATION: calculate address of array.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 105.
STATUS FLAGS AFFECTED: shown in FIG. 106.
DESCRIPTION: Multiply by the scale and add the index for calculating the address in order to convert a multiple dimensional array into a single dimensional array.
If the size of the subscript is smaller than that of xreg, the subscript is sign-extended. xreg, indexsize, and subscript are treated as signed integers. The multiplication and addition are performed with signed numbers. If an overflow is detected in the multiplication or addition operations, V.sub.-- flag is set.
Although indexsize is always immediate, to create an array descriptor in the memory, general purpose addressing is used.
If the INDEX instruction is executed after the CHK instruction, it is possible only to specify the register for the subscript. However, depending on the high level language specification, the range may not be checked (namely, the CHK instruction is not executed). Therefore, in order to use the variable in the memory as a subscript, it can also be addressed by the general purpose addressing.
Operation of INDEX
xreg*indexsize+subscript.fwdarw.xreg
In the INDEX instruction, all the operands xreg, indexsize, and subscript are treated as signed numbers rather than pointers. Even if they are negative, they are used directly rather than performing special operations such as EIT. In addition, the status flags (V.sub.-- flag, L.sub.-- flag, M.sub.-- flag and Z.sub.-- flag) are based on the general arithmetic operation instructions. The operands which are used in INDEX, are array indexes rather than pointers. INDEX transforms the array index into a single dimension array.
The index becomes the pointer after the scaling, such as (.times.4), is performed in the additional mode. Therefore, it is possible to consider INDEX as signed data. Testing for negative indexs can be done if a language cannot deal with a negative index.
If !=0, the operation cannot be assured.
In the data processor of the present invention, if !=0, the contents of the operand are fetched as !R (8 bits or 16 bits) in the src size. It is sign-extended to 32 bits and the instruction is executed.
However, xreg is always treated as 32 bits regardless of !R.
PROGRAM EXCEPTION: Reserved instruction exceptions
When -!=`0`
When R=`1`
When SS=`11`
When EaR or EaR2 is @-SP.
12-4. Logical Instructions
MNMONIC: AND src, dest.
OPERATION:
dest.and.src.fwdarw.dest
AND operation.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 107.
STATUS FLAGS AFFECTED: shown in FIG. 108.
DESCRIPTION AND the contents of the source operand (src) and those of the destination operand (dest).
If the size of the source operand differs from that of the destination operand (AND:G RR.noteq.MM and AND:E MM.noteq.00), the instruction is executed directly and the reserved instruction exception does not occur. However, the result which is sent to dest cannot be assured (it depends on the hardware implementation). The data processor of the present invention specification does not define the logical operation between different size operands. Although the logical operation between different size operands does not have meaning, it is not treated as a reserved instruction exception.
Otherwise, the implementation's load is increased and the execution speed is lowered.
______________________________________M.sub.-- flag R0Z.sub.-- flag R0 to d-1] = 0______________________________________
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: OR src, dest.
OPERATION:
dest.or.src.fwdarw.dest
OR operation.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 109.
STATUS FLAGS AFFECTED: shown in FIG. 110.
DESCRIPTION: OR the contents of the source operand (src) with those of the destination operand (dest).
If the size of the source operand differs from that of the destination operand (OR:G RR.noteq.MM and OR:E MM.noteq.00), the instruction is executed directly and the reserved instruction exception does not occur. However, the result which is sent to dest cannot be assured (it depends on the hardware implementation).
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: XOR src,dest.
OPERATION:
dest.xor.src.fwdarw.dest.
Exclusive or operation.
OPTIONS: None.
INSTRUCTIONS FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 111.
STATUS FLAGS AFFECTED: shown in FIG. 112.
DESCRIPTION: Exclusive or the contents of the source operand (src) with those of the destination operand (dest).
If the size of the source operand differs from that of the destination operand (XOR:G RR.noteq.MM and XOR:E MM.noteq.00), the instruction is executed directly and the reserved instruction exception (RIE) does not occur. However, the result which is sent to dest cannot be assured (it depends on the hardware implementation).
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: NOT dest
OPERATION:
dest.fwdarw.dest
Logical not at all bits.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 113.
STATUS FLAGS AFFECTED: shown in FIG. 114.
DESCRIPTION: Complement 1 and 0 of each bit of the operand.
M.sub.-- flag: If MSB of dest is 1 after the instruction is executed, namely, if MSB of the initial value of dest is 0, this flag is set.
Z.sub.-- flag: If the value of dest is 0 after the instruction is executed, namely, if the initial value of dest is 0, this flag is set.
PROGRAM EXCEPTION: Reserved instruction exceptions
When MM=`11`
When EaM is #imm.sub.-- data, @SP+ or @-SP.
12-5. Shift Instructions
MNEMONIC: SHA count,dest
OPERATION: Shift arithmetic
OPTIONS None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 115.
STATUS FLAGS AFFECTED: shown in FIG. 116.
DESCRIPTION: Arithmetically shift the contents of the destination operand (dest) for the number of bits specified by the source operand (count). In the general format instruction, the shift direction is determined by the sign of count: if count is positive, a left shift takes place; if count is negative, a right shift takes place.
The right shift operation in the arithmetic shift operation causes MSB (sign bit) of the destination operand not to be changed and the same value to be copied to the bit to the right of the sign bit. The left shift operation causes the contents of LSB to shifted into the bit to the left of the LSB and 0 to be placed in LSB.
The specification of the shift direction by count may be effective for the emulation of floating point operation.
Although the left shift operations does not have a short format of SHA, if the status flags change which differs from SHA is permissible, SHL:Q which is a short format of SHL can alternatively be used.
______________________________________ [left shift operation (count > 0)]: diagrammed in FIG. 117. [right shift operation (count < 0)]: diagrammed in FIG. 118. If count = 0, X.sub.-- flag = 0.______________________________________
In the SHA instruction, only the lower 8 bits are used to determine the size of count. If RR.noteq.00, the operation cannot be assured. The reason the RR.noteq.00 function cannot be used is due to the restriction of the implementation.
If RR.noteq.00, the data processor of the present invention fetches the count operand in the size RR. Only the lower 8 bits of count are used to execute the instruction.
Since SHA is an arithmetic instruction, it sets L.sub.-- flag depending on the sign (MSB) of dest, so that the correct signs of the result can be obtained even if an overflow or underflow occurs. In a shift instruction, unless an overflow occurs, the sign of dest is not changed. In a right shift operation or if an overflow does not occur in a left shift operation, L.sub.-- flag=M.sub.-- flag. However, if an overflow occurs in a left shift operation, L.sub.-- flag may not be the same as M.sub.-- flag.
Because the data processor of the present invention is a big-endian chip, the shift direction differs depending on whether count is considered as an increase/decrease of the bit position or as a power of 2. In other words, in the first case, if count>0, a right shift operation would take place. In the latter case it is like little-endian; if count>0, the left shift operation takes place. However, the shift operations are similar to arithmetic instructions rather than bit operation instructions. Consequently, count should be considered as powers of 2 rather than as an increase/decrease of bit position. Thus, the specification of the data processor of the present invention defines that left shift operation takes place if count>0.
In SHL and SHA, even if the absolute value of count exceeds (dest size+1), the shift operation is continued for the number of times specified. Consequently, the absolute value of count functions like (dest size+1). For example, the following operations take place.
______________________________________SHA #33, dest,W dest = X.sub.-- flag = 0SHL #33, dest,W dest = X.sub.-- flag = 0SHA #-33, dest,W dest = X.sub.-- flag = MSB of a previos destSHL #-33, dest,W dest = X.sub.-- flag = 0______________________________________
Except for X.sub.-- flag, if the absolute value of count is the same as (dest size), the same result is obtained.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM or ShM is #imm.sub.-- data, @SP+or @-SP.
MNEMONIC: SHL count, dest.
OPERATION: shift logical.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 119.
STATUS FLAGS AFFECTED: shown in FIG. 120.
DESCRIPTION: Logically shift the contents of the destination operand (dest) for the number of bits specified by the contents of the source operand (count). In the general format, the shift direction is specified by the sign of count. If count is positive, a left shift takes place. If count is negative, a right shift takes place.
The right shift operation causes the contents of MSB to shifted into the bit to the right of the MSB and 0 to be placed. The left shift operation causes the contents of LSB to shifted into the bit to the left of the LSB and 0 to be placed in LSB.
______________________________________ [A left shift operation (count > 0)]: diagrammed in FIG. 121. [A right shift operation (count < 0)]: diagrammed in FIG. 122. If count = 0, X.sub.-- flag = 0.______________________________________
In the SHL instruction, only the lower 8 bits are used as the shift count. If RR.noteq.00, the operation cannot be assured. The reason the RR.noteq.00 function cannot be used is due to the restrictions of the implementation.
If RR.noteq.00, the data processor of the present invention fetches the count operand in the size RR. Only the lower 8 bits of count are used to execute the instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM or ShM is #imm.sub.-- data, @SP+or @-SP.
MNEMONIC: ROT count,dest.
OPERATION: rotate.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 123.
STATUS FLAGS AFFECTED: shown in FIG. 124.
DESCRIPTION: Rotate the contents of the destination operand for the number of bits being specified by the operand count.
The shift operation is performed by filling the bit from LSB (MSB) to MSB (LSB).
The direction of the rotation is specified by the sign of count. If the count is positive, a left rotation takes place. If the count is negative, a right rotation takes place.
When a rotation takes place, dest does not rotate through X.sub.-- flag (although it does set it).
______________________________________ [A left rotation (count > 0)]: diagrammed in FIG. 125. [A right rotation (count < 0)]: diagrammed in FIG. 126. If count = 0, X.sub.-- flag = 0.______________________________________
In the ROT instruction, only the lower 8 bits are used as the count. If RR.noteq.00, the operation cannot be assured. The reason the RR.noteq.00 function cannot be used is due to restrictions of the implementation.
If RR.noteq.00, the data processor of the present invention fetches the count operand in the size RR. Only the lower 8 bits of count are used to execute the instruction.
Even if the absolute value of count in ROT exceeds `dest size`, the rotation for the specified number is executed. Consequently, the result is the same as the remainder where count is divided by `dest size` is treated as count. However, if the contents of count is an integer times `dest size` (except for count=0), X.sub.-- flag is set depending on MSB (in a right rotation) or LSB (in a left rotation) unlike the case of count=0. For example, in a left rotation, if the number of bits which are rotated are the same as the data size, the data is not changed and dest becomes the same value as when count=0. However, since LSB of the former data is copied to the X.sub.-- flag, the status flags change in the different manner than when count=0.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+or @-SP.
MNEMONIC: SHXL dest.
OPERATION: logical shift left with extend.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 127.
STATUS FLAGS AFFECTED: shown in FIG. 128.
DESCRIPTION: Shift the contents of dest to the left for one bit and place the contents of the former X.sub.-- flag in LSB. The bit which is carried out from MSB is placed in X.sub.-- flag. This instruction is a primitive for a special instruction which shifts one bit of multiple words.
The specification of this instruction differs a lot from those of SHA, SHL and ROT in that the size to be shifted is fixed at 32 bits and only one bit shift operation is available.
Although DIVX is used when the dividend is a multiple length number, if the divider becomes a multiple length number, DIVX cannot be used. The division should be performed by continuing the shift operations and subtraction operations. At that time, a multiple length shift operation is required. This instruction serves such a purpose: of which diagram is shown in FIG. 129.
PROGRAM EXCEPTION: Reserved instruction exceptions
When +=`0`
When -=`1`
When X=`1`
When EaMX is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: SHXR dest.
OPERATION: logical shift right with extend.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 130.
STATUS FLAGS AFFECTED: shown in FIG. 131.
DESCRIPTION: Shift the contents of dest to the right for one bit and place the contents of the former X.sub.-- flag in MSB. The bit which is carried out from LSB is placed in the X.sub.-- flag. This instruction is a primitive for a special instruction which shifts one bit of multiple words.
The specification of this instruction differs a lot from those of SHA, SHL and ROT in that the size to be shifted is fixed at 32 bits and only one bit shift operation is available.
Although DIVX is used when the dividend is multiple length number, if the divider becomes a multiple length number, DIVX cannot be used. The division should be performed by continuing the shift operations and subtraction operations. At that time, a multiple length shift operation is required. This instruction serves such a purpose: of which diagram is shown in FIG. 132.
PROGRAM EXCEPTION: Reserved instruction exceptions
When +=`0`
When -=`1`
When X=`1`
When EaMX is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: RVBY src,dest.
OPERATION: reverse byte order.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 133.
STATUS FLAGS AFFECTED: shown in FIG. 134.
DESCRIPTION: Reserve the byte order of the contents of src and place them in dest.
If the size of dest is larger than that of src, the size of src is zero-extended to that of dest and the reverse byte order is placed in dest.
If the size of dest is smaller than that of src, the high order bytes of src are truncated, the size of src is matched to that of dest, and the reverse byte order is placed in dest. (Even if the address of src is moved and then the size of src is matched to that of dest, the same result is obtained).
EXAMPLE
src=H'1234
RVBY src.H,dest.H.fwdarw.dest=H'3412
RVBY src.H,dest.W.fwdarw.dest=H'34120000
RVBY src.H,dest.B.fwdarw.dest=H'34 (Not H'12)
This instruction serves to eliminate the overhead of conversion from one endian format to another endian format.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ of @-SP.
MNEMONIC: RVBI src, dest.
OPERATION: reverse bit order.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 135.
STATUS FLAGS AFFECTED: shown in FIG. 136.
DESCRIPTION: Reverse the bit order of the contents of src and place them in dest.
If the size of dest is larger than that of src, src is zero-extended to the size of dest and the reverse bit order is placed in dest.
If the size of dest is smaller than that of src, the high order bytes of src are truncated, the size of src is matched to that of dest, and the reverse bit order is placed in dest. (Even if the address of src is moved and then the size of src is matched to that of dest, the same result is obtained.)
This instruction serves to eliminate the overhead of conversion from one endian format to another endian format.
The bit reverse instruction RVBI, which reverses the bit order, is also necessary for the bit map process. However, since it is less frequently used than the byte reverse instruction and additional hardware may be required, the RVBI instruction is defined in <<L2>>.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaW is #imm.sub.-- data, @SP+ or @-SP.
12-6. Bit Manipulation Instructions
The bit manipulation instructions that the data processor of the present invention provides specify the bit to be operated on by using the two parameters shown in the following example.
base(base address)
offset(bit address)
In addition, when operating on a bit of a register, the base size affects the specification of the bit to be operated.
[When operating on a bit of a memory]: diagrammed in FIG. 137.
The general bit manipulation instructions that the data processor of the present invention provides do not restrict the value of offset, so it can exceed the byte boundary. Offset is treated as signed integer.
The bit manipulation instructions are designed so that they can specify the range for accessing the memory using the BB field. In other words, the memory address range can be specified for read operations by BTST and for read-modify-write operation by BSET, BCLR and BNOT. The memory address range which is accessed should take into account the I/O and the use of multiple processors.
Since accessing every byte (`.B`) covers all cases, accessing every halfword and word are defined in <<L2>>(except for the bit manipulation instruction for registers). Since accessing every half word and word is available only when the half word and word should be aligned, to use the accessing function, an address which is aligned should be specified as required so that the implementation of the access range is simplified. To access the memory that contains the related bit every half word being aligned, it is necessary to specify a multiple of 2 as base. To access the memory which contains the related bit every word which is being aligned, it is necessary to specify a multiple of 4 as the base. The value of the offset is not restricted. When the access range of an address which is not aligned is specified should depend on the implementation.
The data processor of the present invention implements accessing of the memory every half word and accessing of the memory every word in <<L2>>. If an address which is not aligned as base is specified, the access range is accessed every half word and every word being aligned.
Example
BSET.B #H'84,@H'100
Since offset % 8=4; base+offset / 8=H'110, bit 4 of H'110 is set.
BSET.B #H'7C,@H'101
Since the access size is every byte when offset % 8=4; base+offset / 8=H'110, the same operation as BSET.B #H'84,@H'100 is performed.
BSET.W #H'84, @H'100
Since offset % 8=4; base+offset / 8=H'110, bit 4 of H'110 is set.
Since base is a multiple of 4, the read-modify-write operation for 32 bits (H'110 to H'113) which are aligned is performed to set the related bit.
BSET.W #H'7c,@H'101
Since offset % 8=4; base+offset / 8=H'110, likewise bit 4 of H'110 is set. However, since base is not a multiple of 4, the access range for the read-modify-write operation depends on the implementation.
The size represented by BB is "in what range the read-modify-write operation is performed" rather than representing the offset range (for example, if `.B`, the offset is less than 8, and so forth).
In the bit manipulation instructions for registers, since the bit position of offset=0 (MSB) varies depending on the access size (base size), the base size is important. If base is register direct Rn, the base sizes `.H` and `.W` are defined in <<L1>>.
In the bit manipulation instructions where the register Rn is treated as the base, only the low order 3 bits with `.B`, only the low order 4 bits with `.H`, only the low order 5 bits with `.W`, and only the low order 6 bits with `.L` are enabled and the high order bits are ignored. Even if the high order bits are not 0, an error or EIT does not occur. Although it is recommended that the offset range be checked like the width of the BF instruction, since the instruction execution time increases due to the check time, modulo is obtained by the bit size for offset.
When 8-bit data, 16-bit data or 32-bit data is held in a register, even if a bit has the same bit position in some data, it actually represents a different value. To prevent the specification from getting complicated, the default of the assembler for the memory and registers should be `.B`. The short format should be the specification of `.B`. Thus, the range of the register which can be accessed in the short format should be the bits from 2 0 to 2 7 (See FIG. 138).
Example
In BSET: Q #1, R0, since the default of BSET is `.B`, bit 1 of R0.B is set.
This bit differs from the bit 1 of RO.W and corresponds to bit 25 of R0.W.
For example, when describing the following instruction to access the bit of 2 17,
BTST #17, R0
actually, it is interpreted as
BTST.B #17, R0
and offset ignores the high order bits, so bit 2 is accessed.
To prevent that, it is necessary to describe the following instruction.
BTST.W #17, R0
In such a case, it is recommended the assembler generate an alarm.
MNEMONIC: BTST offset, base.
OPERATION:
bit.fwdarw.Z.sub.-- flag
Test a bit.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 139.
STATUS FLAGS AFFECTED: shown in FIG. 140.
DESCRIPTION: Complement the bit value being specified and copy the result to Z.sub.-- flag.
In the addressing mode specified by EaRf or ShRfq, the immediate modes #imm.sub.-- data, @-SP and @SP+ cannot be used. When using the Rn mode, the values of high order offset bits are ignored.
In the assembler syntax, the memory access size is the same as base size. With BTST:Q, the memory access size is fixed at 8 bits. For specifying the size, it is only possible to describe `.B`.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When BB=`11`
When EaR is @-SP
When EaRf or ShRfq is #imm.sub.-- data, @SP+ or @-SP
MNEMONIC: BSET offset, base.
OPERATION:
bit.fwdarw.Z.sub.-- flag, 1.fwdarw. bit
Set a bit.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 141.
STATUS FLAGS AFFECTED: shown in FIG. 142.
DESCRIPTION: Complement the bit value being specified, copy the result to Z.sub.-- flag, and then set the bit to 1.
In the addressing mode specified by EaMf or ShMfq, the immediate modes #imm.sub.-- data, @-SP and @SP+ cannot be used. When using the Rn mode, the values of high order offset bits are ignored.
In the assembler syntax, the memory access size is the same as the base size. With BSET:Q, the memory access size is fixed at 8 bits. For specifying the size, it is possible only to describe `.B`.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When BB=`11`
When EaR is @-SP
When EaMf or ShMfq is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: BCLR offset, base.
OPERATION:
bit.fwdarw.Z.sub.-- flag, 0.fwdarw. bit
Clear a bit.
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 143.
STATUS FLAG AFFECTED: shown in FIG. 144.
DESCRIPTION: Complement the bit value being specified, copy the result to Z.sub.-- flag, and then clear the bit to 0.
In the addressing mode specified by EaMf or ShMfq, the immediate modes #imm.sub.-- data, @-SP and @SP+ cannot be used. When using the Rn mode, the values of high order offset bits are ignored.
In the assembler syntax, the memory access size is specified as the base size. With BCLR:Q, the memory access size is fixed at 8 bits. For specifying the size, it is possible only to describe `.B`.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When BB=`11`
When EaR is @-SP
When EaMf or ShMfq is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: BNOT offset, base
OPERATION:
bit.fwdarw.Z.sub.-- flag, bit.fwdarw.bit
Compliment a bit.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 145.
STATUS FLAGS AFFECTED: shown in FIG. 146.
DESCRIPTION: Complement the bit value being specified, copy the result to Z.sub.-- flag, and then complement the bit.
In the addressing mode specified by EaMf, the immediate modes #imm.sub.-- data, @-SP and @SP+ cannot be used. When using the Rn mode, the values of high order offset bits are ignored.
In the assembler syntax, the memory access size is specified to be the same as the base size.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When BB=`11`
When EaR is @-SP
When EaMf is #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: BSCH data, offset.
OPERATION:
find first `0` or `1` in the bitfield (within a word)
Search 0 or 1 (in one word).
OPTIONS:
/0 Search `0`. (default)
/1 Search `1`.
/F Search 0 or 1 to the direction where the bit number increases. (default)
/B Search 0 or 1 to the direction where the bit number decreases. <<L2>> (the data processor of the present invention supports this option.)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 147.
STATUS FLAGS AFFECTED: shown in FIG. 148.
DESCRIPTION: Search for the first bit which is `0` or `1` in a word.
When this instruction is executed, after the bit number (bit offset) to be searched is set to the offset operand, the bit number after the search operation is set to the offset operand. offset is used for the read-modify-write operation because it is assumed the bit search operation may be used repetitively.
The bit position to be searched is restricted to the range from 0 to (data size) of the data operand. It does not exceed the word boundary.
Although any size can be specified for offset, the high order bits of the initial value of offset are ignored in the search operation. The "high order bits" represent the bits higher than log 2 (the number of bits of data). When data is 32 bits, the high order bits are in the range from 2 5 to 2 31.
In the standard specification <<L0>> the search operation is performed in the direction of the high order bits, namely, in the big-endian the data processor of the present invention, the search operation is conducted by the /F option. The search operation in the reverse direction, namely /B option is defined in the <<L2>> specification because the search operation in the normal direction (LSB) differs from the reverse direction (MSB) in hardware. 8 bits and 16 bits (RR=00,01 of the data size to be searched are defined in <<L2>>.
The data processor of the present invention supports both the /B option and the data size (RR=00,01) of 8 bits and 16 bits in the <<L2>> specification.
Although BSCH is classified in the same group as bit manipulation instructions, it provides much different properties than them. If offset can be freely set in the BSCH instruction like other bit operation instructions, the BSCH instruction may be more easily used. To do that, the BVSCH instruction is provided. Thus, BSCH is defined as a much lower grade specification and the range of offset is restricted. The effective range of offset is the same as that where the register direct mode Rn is specified by another bit operation instruction. However, take care that the off-set and base of other bit manipulation instructions are read-only and read-modify-write, respectively, while offset and data (base address) of BSCH are read-modify-write and read-only, respectively.
If the specified bit is not found with BSCH/F, offset of the bit following the last bit (word boundary) is set and V.sub.-- flag=1 takes place. If the search operation is unsuccessfully terminated, an EIT does not occur. The number of bits being searched is added to offset.
EXAMPLES
______________________________________When BSCH/0/F @mem1.W,R0 is executed with@mem1 = H'00000000, R0 = 0, and big-endian,==> R0 = 0 remains unchanged and V.sub.-- flag is set to 0.When BSCH/0/F @mem1.W,R0 is executed with@mem1 = H'ffff7fff, R0 = 0, and big-endian,==> R0 = 16 takes place and V.sub.-- flag is set to 0.When BSCH/0/F @mem1.W,R0 is executed with@mem1 = H'ffffffff, R0 = 0, and big-endian,==> R0 = 32 takes place and V.sub.-- flag is set to 1.______________________________________
If the specified bit is not found with BSCH/B, the offset is set to (-1). In this case, V.sub.-- flag is also set; however, an EIT does not occur.
In the BSCH instruction, the high order bits of the initial value of offset are ignored, while the high order bits of the offset value (result of the search operation), which is set after the instruction is terminated, are meaningful. In other words, after the BSCH instruction is executed, the high order bits of offset are also rewritten regardless of what was orginally in it. If the search operation is successfully terminated, the contents of the offset range from 0 to 31 (when data is 32 bits), for any case of /F and /B, the high order bits are always 0. In addition, the search operation is unsuccessfully terminated with /F, the contents of offset become 32. Consequently, the high order bits and low order bits become 00 . . . 001 and 00000, respectively. If the search operation is unsuccessfully terminated with /B, the contents of offset become (-1), so that the high order bits and the low order bits become 11 . . . 111 and 11111, respectively.
EXAMPLES
______________________________________When BSCH/0/F @mem1.W,R0.W is executed with@mem1 = H'00000000 and R0 = H'00000020,==> R0 = H'00000000 takes place. ( R0 .noteq. H'00000020 )When BSCH/0/F @mem1.W,R0.W is executed with@mem1 = H'ffff7fff and R0 = H'00000020,==> R0 = H'00000010 takes place. ( R0 .noteq. H'00000030 )When BSCH/0/F @mem1.W,R0.W is executed with@mem1 = H'ffffffff and R0 = H'12345678,==> Since the search operation is unsuccessfully terminated, R0 = H'00000020 and V.sub.-- flag = 1 take place.When BSCH/0/F @mem1.W,R0.W is executed with@mem1 = H'ffffffff and R0 = H'00000020,==> Since the search operation is unsuccessfully terminated,V.sub.-- flag is set to 1 and R0 = H'00000020 remains unchanged.(R0 .noteq. H'00000040 (carry-out))______________________________________
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
12-7. Fixed Length Bit Field Manipulation Instructions
The bit field is specified by the MSB position and bit field width. The MSB position of the bit field is represented by a combination of base and offset. The memory's MSB (bit 0) represented by base is offset=0. The function of offset is the same as that of bit manipulation instructions. The relationship among the bit field, base, offset and width is as follows.
[When the bit field manipulation is performed in the memory]: diagrammed in FIG. 149.
The fixed length bit field manipulation instructions (BFEXT, BFEXTU, BFCMP, BFCMPU, BFINS, BFINSU) are especially effective for the AI oriented tag processing (comparison and separation of tags).
The fixed length bit field instructions have the following two formats.
offset is specified by the 8-bit general addressing mode, while width is specified by a register. This format is termed the `G:` format. In the `:G` format, the memory address to be actually accessed is determined by adding, the value where the content of offset is divided by 8, to the base. This method allows a bit field consisting of 26 bits and ranging over 5 bytes.
offset is specified by an 8-bit immediate value, while width is specified by a literal. This format is termed the `:E` format. In the `:E` format, only a bit field which does not exceed the word boundary is processed in order to increase the process speed. A result which is larger than one word of base is not assured. Even if width + offset .gtoreq. size, an EIT does not occur. However, the value being read and written becomes uncertain. Since the instruction specification can be obtained by accessing one word of base, it is possible to determine the memory address of the bit field to be operated by referencing only the base. Thus, depending on the implementation, the instruction can be executed at a high speed.
The addressing mode which is available from the base of BF:E is exactly the same as that of BF:G.
BFINS, BFINSU, BFCMP and BFCMPU have the following two formats for both :G and :E formats.
Specify the src operand by a register. :R format
Specify the src operand by an immediate. :I format.
The value of the width is restricted in the range from 1 to 32 (from 1 to 64 in <<LX>>), so that before executing the instruction, the value of the width is checked to determine whether it is in the range of 0<width .gtoreq.32 (64). If width=0, an error occurs. If the value is out of the range, an invalid operand exception (IOE) occurs. The contents of both offset and width for all instructions, are treated as signed numbers. However, since the value available for width is in the range from 1 to 32 (64), whether it is signed or unsigned does not affect the actual operation, but a problem in the specification occurs. Offset of the instruction in the :E format is treated as a signed number. Offset represents a value in the range from -128 to +127. (However, as described later, the bit field which is larger than one word base to base +3 of the base address is not assured in the :E format.)
The operand which is not the bit field of the BF instruction is treated as a normal integer. For BFEXT, the bit field being obtained is set to the LSB side of the register and the sign extension is performed to words the MSB rather than setting the bit field in accordance with the bit position=0 (MSB).
If a register is treated as a base, the bit field is restricted in one register range. The data processor of the present invention supports fixed length bit field instructions which use registers in the <<L2>> specification because at present the bit field operations which treat these registers can be executed at a much higher speed by a combination of the shift instruction and the AND instruction rather than by the BF:E instruction. In the bit field instructions which use registers (<<L2>>), :G like :E can not assure the result of an operation of the bit field which is larger than one word (register). In BFEXT and BFEXTU, a meaningless value is obtained, while in BFINS and BFINSU, it is ignored. If offset + width .gtoreq. size, an EIT does not occur.
In the :E format, the result of the operation that has a bit offset which exceeds the size is not assured. The result of the operation which has negative bit offset is also not assured. The operation which contains the base address in one word is correctly executed.
______________________________________[EXAMPLE]address N-1 N N+1data B'abcdefgh B'ijklmnop B'qrstuvwx (a to x: 0 or 1),BFEXT:E.W #3,#9,@N,R0 ==> R0 = B'lmnopqrstBFEXT:E.W #-5,#9,@N,R0 ==> R0 = B'?????ijkl(? is an unstable value.)______________________________________
The width, src and dest registers are commonly specified by the X field. The size specification field X serves to switch between 32-bit operation and 64-bit operation (<<LX>>). It functions as follows:
(1) Specify the src (dest) register size (in :R format).
(2) Specify the width register size (in :G format).
(3) Specify the width range.
When X=0, 0<width.ltoreq.32
When X=1, 0<width.ltoreq.64
In the :E:I format, (1) and (2) above do not function. To distinguish (3), the X field is used. In other words, the X field serves to enhance the compatibility of 32-bit operation and 64-bit operation.
If SS.noteq.00 in the :I format instruction, the #iS8 field is not used. Even if the #iS8 field is not 0, it is ignored. It is important that the user note that the field of #iS8 should be filled with zeroes.
The formats and the sizes used for the bit field instructions are shown in FIG. 150.
In the bit field instructions, like the bit operation instructions, the memory range to be accessed should be considered. However, it depends on the implementation, so that a strict definition is not required.
MEMONIC: BEFEXT offset, width, base, dest.
OPERATION: extract bit field (signed).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 151.
STATUS FLAGS AFFECTED: shown in FIG. 152.
DESCRIPTION: Extract the bit field and transfer the result to the destination.
If the size of the destination is larger than the width of the bit field, the data is sign-extended. The offset of BFEXT:G is also sign-extended.
In the EaRbf addressing mode, the @-SP, @SP+ and #imm.sub.-- data modes cannot be used. Although the register direct mode Rn of base is specified in <<L2>>, the data processor of the present invention supports it.
Operation
Assume that the initial value of dest is
[D0.D1. . . .Dd-2.Dd-1]d=32,64
the value which is set to dest is
[R0.R1. . . .Rd-2.Rd-1]d=32,64
offset=o,width=w
offset and width are treated as signed numbers. (If width.ltoreq.0 or width>d, an invalid operand exception (IOE) occurs.) The extracted bit field and the flag change occur as follows: ##STR13##
This portion is sign-extended and is set to dest. ##STR14##
It does not occur in the data processor32 of the present invention. ##STR15##
This portion is truncated. This portion is set to dest.
__________________________________________________________________________[Bo.Bo+1. . .Bo+w-d-1.Bo+w-d. . .Bo+w-2.Bo+w-1] ==>[Bo+w-d. . .Bo+w-2.Bo+w-1] ==>__________________________________________________________________________
This portion is truncated.
__________________________________________________________________________ [ R0. . .Rd-2. Rd-1] (Set to dest)M.sub.-- flag R0 (If d.gtoreq.w) Bo (If d<w) Bo+w-dZ.sub.-- flag [R0 to d-1] = 0 (If d.gtoreq.w) [Bo to o+w-1] = 0 (If d<w) [Bo+w-d to o+w-1] = 0V.sub.-- flag* S[Bo to o+w-1] < -2 (d-1) .or. S[Bo to o+w-1] .gtoreq. +2 (d-1) (If d.gtoreq.w) 0(If d<w) Cleared when Bo=Bo+1=. . .=Bo+w-d-1=Bo+w-d. Otherwise, it is set.__________________________________________________________________________
In the data processor32 of the present invention, it is always cleared.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When +=`11`
When X=`1`
When EaR is @-SP
When EaRbf is #imm.sub.-- data, @SP+ or @-SP
Invalid operand exception
When width.ltoreq.0 or width>32
MNEMONIC: BFEXTU offset,width,base,dest
OPERATION: extract bit field(unsigned)
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 153.
STATUS FLAGS AFFECTED: shown in FIG. 154.
DESCRIPTION: Extract the bit field and transfer the result to the destination.
If the size of the destination is larger than the width of the bit field, the data is zero-extended. However, offset of BFEXTU:G is also sign-extended.
In the EaRbf addressing mode, the modes of @-SP, @SP+ and #imm.sub.-- data cannot be used. Although the register direct mode Rn of base is specified in<<L2>>, the data processor of the present invention supports it.
Operation
Assuming that the initial value of dest is
[D0.D1. . . .Dd-2.Dd-1]d=32,64
the value which is set to dest is
[R0.R1. . . .Rd-2.Rd-1]d=32,64
offset=0, width=w
offset and width are treated as signed numbers. (If width.ltoreq.0 or width>d, an invalid operation exception (IOE) occurs.) The extracted bit field and flag change occur as follows: ##STR16##
This portion is sign-extended and set to dest. ##STR17##
It does not occur in the data processor32 of the present invention. ##STR18##
This portion is truncated. This portion is set to dest.
__________________________________________________________________________[Bo.Bo+1. . .Bo+w-d-1.Bo+w-d. . .Bo+w-2.Bo+w-1] ==>[Bo+w-d. . .Bo+w-2.Bo+w-1] ==>__________________________________________________________________________
This portion is truncated.
__________________________________________________________________________ [ R0. . .Rd-2. Rd-1] (Set to dest)M.sub.-- flag R0 (If d>w) 0 (If d=w) Bo (If d<w) Bo+w-dZ.sub.-- flag [R0 to d-1] = 0 (If d.gtoreq.w) [Bo to o+w-1] = 0 (If d<w) [Bo+w-d to o+w-1] = 0V.sub.-- flag* U[Bo to o+w-1] .gtoreq. +2 d (If d.gtoreq.w) 0(If d<w) Cleared when Bo=Bo+1=. . .=Bo+w-d-1=0. Otherwise, it is set.__________________________________________________________________________
It is always cleared in the data processor of the present invention32.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When +=`0`
When X=`1`
When EaR is @-SP
When EaRbf is #imm.sub.-- data, @SP+ or @-SP
Invalid operand exception
When width.ltoreq.0 or width>32.
MNEMONIC: BFINS src,offset,width,base.
OPERATION: insert bit field (signed).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 155.
STATUS FLAGS AFFECTED: shown in FIG. 156.
DESCRIPTION: Insert the contents of the source into the bit field.
If the size of the bit field width is larger than that of the source, the data is sign-extended. The offset of BFINS:G is also sign-extended.
In the EaRbf addressing mode, the modes of @-SP, @SP+ and #imm.sub.-- data cannot be used. Although the register direct mode Rn of base is specified in<<L2>>, the data processor of the present invention supports it.
Operation
Assume that the initial value of src is
______________________________________ [S0.S1. . .Ss-2.Ss-1] s=8,16,32,64(:I) s=32,64(:R)offset = o, and width = w______________________________________
offset and width are treated as signed numbers. (If width.ltoreq.0 or width>d, an invalid operation exception (IOE) occurs.) The bit field to be inserted and the flag change occur as follows: ##STR19## src is sign-extended for w-s bits. ##STR20##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When +=`1`
When X=`1`
When SS=`11`
When EaR is @-SP
When EaMbf is #imm.sub.-- data, @SP+ or @-SP
Invalid operand exception
When width.ltoreq.0 or width>32
MNEMONIC: BFINSU src,offset,width,base.
OPERATION: insert bit field (unsigned).
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 157.
STATUS FLAGS AFFECTED: shown in FIG. 158.
DESCRIPTION: Insert the contents of the source into the bit field.
If the width of the bit field is larger than that of the source, the data is zero-extended. The offset of BFINSU:G is also sign-extended.
In the EaRbf addressing mode, the @-SP, @SP+ and #imm.sub.-- data mades cannot be used. Although the register direct mode Rn of the base is specified in<<L2>>, the data processor of the present invention supports it.
Operation
Assuming that the initial value of src is
______________________________________ [S0.S1. . .Ss-2.Ss-1] s=8,16,32,64(:I) s=32,64(:R)offset = o, and width = w______________________________________
offset and width are treated as signed numbers. (If width.ltoreq.0 or width>d, an invalid operation exception (IOE) occurs.)
The bit field to be inserted and the flag change are as follows: ##STR21##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When+=`0`
When X=`1`
When SS=`11`
When EaR is @-SP
When EaMbf is #imm.sub.-- data, @SP+ or @-SP
Invalid operand exception
When width.ltoreq.0 or width>32.
MNEMONIC: BFCMP src,offset,width,base.
OPERATION: compare bit field(signed).
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 159.
STATUS FLAGS AFFECTED: shown in FIG. 160.
DESCRIPTION: Compare the contents of the source with that of the bit field.
If the width of the bit field differs from that of the source, the smaller size data is sign-extended and then both the values are compared. The offset of BFINS:G is also sign-extended.
In the EaRbf addressing mode, the @-SP, @SP+ and #imm.sub.-- data modes cannot be used. Although the register direct mode Rn of base is specified in<<L2>>, the data processor of the present invention supports it.
Operation
Assume that the initial value of src is
______________________________________ [S0.S1. . .Ss-2.Ss-1] s=8,16,32,64(:I) s=32,64(:R)offset = o, and width = w,______________________________________
offset and width are treated as signed numbers. (If width.ltoreq.0 or width>d, an invalid operation exception (IOE) occurs.)
The bit field to be compared and the flag change occur as follows: ##STR22##
This portion is sign-extended and compared with src. ##STR23##
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When +=`0`
When -=`1`
When SS=`11`
When EaR is @-SP
When EaRbf is #imm.sub.-- data, @SP+ or @-SP
Invalid operand exception
When width.ltoreq.0 or width>32.
MNEMONIC: BFCMPU src,offset,width,base.
OPERATION: compare bit field (unsigned).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 161.
STATUS FLAGS AFFECTED: shown in FIG. 162.
DESCRIPTION: Compare the contents of the source with that of the bit field.
If the width of the bit field differs from that of the source, the smaller size data is zero-extended and then both the values are compared. The offset of BFCMPU:G is also sign-extended.
In the EaRbf addressing mode, the @-SP, @SP+ and #imm.sub.-- data modes cannot be used. Although the register direct mode Rn of the base is specified in<<L2>>, the data processor of the present invention supports it.
Operation
Assume that the initial value of src is
______________________________________ [S0.S1. . .Ss-2.Ss-1] s=8,16,32,64(:I) s=32,64(:R)offset = o, and width = w,______________________________________
offset and width are treated as signed numbers. (If width.ltoreq.0 or width>d, an invalid operation exception (IOE) occurs.)
The bit field to be compared and the flag change occur as follows: ##STR24##
This portion is zero-extended and compared with src. ##STR25##
Set depending on the comparison result.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When+=`0`
When-=`1`
When SS=`11`
When EaR is @-SP
When EaRbf is #imm.sub.-- data, @SP+ or @-SP
Invalid operand exception
When width.ltoreq.0 or width>32.
12-8. Variable Length Bit Field Manipulation Instruction
The variable length bit field manipulation instructions consist of the following instructions.
______________________________________General operation and transfer BMVAPTransfer BVCPYOperation and transfer of repetitive patterns BVPATSearch for 0 or 1 BVSCH______________________________________
BVMAP, BVPAT and BVCPY are instructions which mainly serve for window operations (bitblt) on the bit map display.
The terms of the bit map display attributes are defined as follows: (color scale, color offset, and bit-dot polarity).
color scale:
Specifies how many continuous bits one dot represent.
Examples
<color scale=1>
1 dot is represented by 1 bit. Continuous 8 dots are represented by 1 byte. Monochrome bit map display or bit map display where each bit forming the colors is banked.
<color scale=4>
1 dot is represented by successive 4 bits. Successive 2 dots are represented by 1 byte.
It supports 16-color bit map display.
bit-dot polarity
The bit-dot polarity is a concept which should be considered in a combination of a bit map display and processor. In a general bit map display where the low order addresses are represented on the left side, if dots corresponding to smaller bit numbers are represented on the left side, it is named such that a bit map display has the positive bit-dot polarity. If dots corresponding to larger bit numbers are represented on the left side, it is named such that a bit map display has the negative bit-dot polarity. In other words, a big-endian processor has the positive bit-dot polarity only when the MSB is represented on the left side. color offset
Specify what bit of multiple bits forming 1 dot is operated. The following relationship is obtained.
0.ltoreq.color offset<color scale
This attribute is a parameter for the bit map display operation rather than an attribute of the bit map display hardware.
When dots which move horizontally for X (dot offset) from the dot corresponding to base address bit offset in the memory is calculated as follows.
(dot offset is a group of points on the screen, while bit offset is a group of bits in the memory.)
In positive bit-dot polarity:
bit offset=X*color scale+color offset.
In negative bit-dot polarity:
bit offset=(X*color scale+color offset).xor.7.
The BVMAP, BVCPY and BVPAT instructions actually used in the data processor of the present invention have restrictions that affect the implementation. These instructions can be used only when:
bit-dot polarity is positive.
color scale is 1.
Thus, it is necessary to define the hardware of the bit map display to some extent. The practical restrictions are as follows.
Since the bit-dot polarity is positive, when the data processor of the present invention is big-endian, the small address and the small bit number (MSB) should be displayed on the left side of the screen.
Since only color scale =1 is available, there are the following restrictions for the bit map display where color scale .noteq.1.
For the bit map display where color scale .noteq.1, the type of operation cannot be changed every color offset.
Since color scale cannot be changed with the BVMAP instruction, if color scale of the bit map display is not 1, unless the internal expression is not the same content as color scale, the BVMAP instruction cannot be used. Because the inner expression of the screen image depends on the hardware, to convert data between different hardware systems, data format should be changed.
The variable length bit field manipulation instructions use many operands and require long execution times. Thus, mechanisms for accepting interrupts during execution and for reexecuting the instruction after an interrupt process are required. The data processor of the present invention uses a fixed number of registers which specify an operand and represent the progress condition of the operation. Therefore, even if an interrupt occurs during execution of a variable length bit field instruction, if the register is correctly saved and restored in the interrupt process handler, after the interrupt process, the bit field instruction can be restored on the way. Even if the status is saved or the context is switched after execution is suspended or the same bit map instruction is executed with a different process after the context is switched, when the former bit map instruction is resumed at the same context, it should work correctly.
In the BTRON specification, with a conventional main memory, which is not VRAM, characters and figures may be described. Consequently, in the variable length bit field instructions, since a page fault may occur, like the string instructions, it is possible for a suspension of execution due to the page fault.
In the BVMAP and BVCPY instructions, to move a figure horizontally with an insert editor the source of the bit map can be overlapped with the destination of the bit map. Like the string instructions, the direction to be operated is specified with the options /F and /B. The direction to be operated is determined by software so that the source is not destroyed by the destination. However, the option /B which can specify the reverse operation is defined in <<L2>> to simplity the complexity of the implementation.
The data processor of the present invention also supports the reverse operation for increasing the operation speed of BTRON.
If src is overlapped with dest and if the length from base to offset for dest is smaller than that for src, a smaller offset is first processed so that the content of src is not destroyed by that of dest. To do that, the /F option is used. Therefore, the smaller offset side (address) is located on the left side. The length from base to offset for dest is smaller than that for src when the bit map data is moved on the left side by deleting characters.
In addition, if the length from base to offset for dest is longer than that for dest, the larger offset is first processed so that the content of src is not destroyed by that of dest. To do that, the /B option is used. The length from base to offset for dest is larger than that for src when the bit map data is moved on the right side by inserting characters.
If src may be overlapped with dest, the correct option should be used depending on the decision of software so that the contents of src is not destroyed by that of dest. However, since the /B option is defined in <<L2>>, if /B cannot be used, the contents of src should be temporarily copied to another position and then the operation with dest should be performed.
If there is no overlap between src and dest, the result is the same no matter which option is used.
If the /B option is used when the length from base to offset for dest is smaller than that for src or if the /F option is used when the length from base to offset for dest is larger than that for dest, it is necessary to consider which operation occurs. Because dest, of the portion which has been operated, destroys the portion where src has not been referenced, the correct result cannot be obtained. If an instruction which was suspended is reexecuted due to the algorithm, the result may change. Since the correct result is not assured, it does not matter if the result is changed by an execution suspension. When no execution suspension takes place, a correct result may be obtained, so that an non-repeatable bug can happen. However, if the error check is performed completely, overhead increases, resulting in decreased execution time. The error check is not performed, so the user should take care of it.
In the variable length bit field instructions, only 32 bits or 64 bits <<LX>> can be used for bit offset (offset), bit width (width), and pattern data (pattern) in registers. 8 bits and 16 bits can not be specified. The resister size of 32 bits and 64 bits is selected by the X field.
In the BVMAP, BVCPY and BVPAT instructions, the memory access method on the dest side is not specified except that it be performed by the write or read-modify-write operation.
If width.ltoreq.0 in the BV instructions, the instruction is terminated without any operation being performed. However, an EIT does not occur. In the BVSCH instruction, V.sub.-- flag which represents the completion due to width (same as search operation failure) is set. In complex instructions such as the BV instructions and string instructions, a high level subroutine may be created using such an instruction. For example, BVMAP is repeated for a number of lines to produce the BitBlt function. It is not necessary to check width every time, but codes which may be directly generated by the compiler should be carefully checked. Thus, detection of the width of the BF instructions is an exception.
If offset+width overflow in a variable length bit field instruction, when the execution is suspended by an interrupt or when the instruction is completed, the offset value on the register becomes incorrect, so that the instruction cannot be correctly executed. In this case, the operation is not assured. On the architecture, although it is recommended that it be detected and treated as an invalid operand exception (IOE) when the instruction is executed, to prevent prolonged execution time, it is executed without checking. (In string instructions, since a pointer address rather than an integer accords with offset, it is not treated as an overflow, but only as a wraparound of the address.)
MNEMONIC: BVSCH.
OPERATION: Find first `0` or `1` in the bitfield (variable length).
OPTIONS:
/0: Search `0` (default).
/1: Search `1`.
/F: Search for 0 or 1 in the direction of increasing bit number (default).
/B: Search for 0 or 1 in the direction of decreasing bit number <<L2>>. (the data processor of the present invention supports this option.)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: Shown in FIG. 163.
STATUS FLAGS AFFECTED: Shown in FIG. 164.
DESCRIPTION: Search for a `0` or `1` in the variable length bit field.
When this instruction is executed after the search start bit number (bit offset) is set to the offset operand (R1), the bit number of the search result is set to the offset operand (R1). In other words, offset is processed by the read-modify-write operation, so that the bit search operation can be continuously repeated. Offset is treated as a signed integer.
After BVSCH is executed, if the search operation is unsuccessfully terminated, V.sub.-- flag is set and offset indicates the bit to be searched next. An EIT does not occur. The offset and V.sub.-- flag of the BVSCH instruction are set the same way as the BSCH instruction.
Although the search operation in the reverse direction using /B is defined in the <<L2>> specification, the data processor of the present invention supports it.
This instruction can be used to search an empty block of a disk and memory.
For detailed specification of comlex instructions such as variable length bit field instructions and string instructions as well as the register values after the instruction is terminated, see Appendix 11.
PROGRAM EXCEPTION:
Reserved instruction exceptions
When+=`0`
When X=`1`
When P=`1`.
MNEMONIC: BVMAP.
OPERATION: bit operation (one line BitBlt).
OPTIONS:
/F: Perform the operation from the smaller offset (default).
/B: Perform the operation from the larger offset <<L2>>. (the data processor of the present invention supports it.)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: Shown in FIG. 165.
STATUS FLAGS AFFECTED: Shown in FIG. 166.
DESCRIPTION: The instruction provides for various logical operations for variable length bit fields src and dest to perform the bit map operation on a computer display. The type of operation is specified by the lower 4 bits of R5. The following 16 types are provided.
______________________________________Bitpattern Mnemonic Function Operation______________________________________0000 F False 0 ==> dest0001 NAN NotAndNot .sup..about. dest .and. .sup..about. src ==> dest0010 AN AndNot dest .and. .sup..about. src ==> dest0011 NS NotSrc .sup..about. src ==> dest0100 NA NotAnd .sup..about. dest .and. src ==> dest0101 ND NotDest .sup..about. dest ==> dest0110 X Xor dest .xor. src ==> dest0111 NON NotOrNot .sup..about. dest .or. .sup..about. src ==>dest1000 A And dest .and. src ==> dest1001 NX NotXor .sup..about. dest .xor. src ==> dest1010 D Dest dest ==> dest1011 ON OrNot dest .or. .sup..about. src ==> dest1100 S Src src ==> dest1101 NO NotOr .sup..about. dest .or. src ==> dest1110 O Or dest .or. src ==> dest1111 T True 1 ==> dest______________________________________
The D (Dest) operation mode is provided for the symmetry of operations.
If the high order bits of register R5, which specifies the operation, are not zeroes, it is not checked. An invalid operand exception (IOE) does not occur in order to minimize the implementation complexity and keep the execution speed from being degraded.
/F and /B options serve to specify whether the operation is performed from the smaller offset or from the larger offset. If src and dest of the bit map are overlapped, the contents of dest destroy that of src, so that the correct result cannot be obtained.
When src and dest are overlapped, if the length from base to offset for dest is smaller than that for src, the operation is started from the smaller offset so that the contents of src are not destroyed by dest. To do that, the /F option is used. Generally, the smaller offset (address) is placed on the left side as the relationship between the screen and bit map. Thus, when the bit map data is moved to the left by deleting characters, the length from base to offset for dest is smaller than that for src.
If the length from base to offset for dest is larger than that for src, the operation is started from the larger off-set so that the contents of src are not destroyed by dest. To do that, the /B option is used. The length from base to offset for dest is larger than that for src when the bit map data is moved to the right by inserting characters.
In addition, if the /B option is used when the length from base to offset for dest is smaller than that for src or if the /F option is used when the length from base to offset for dest is larger than that for src, the result (dest) is not assured. If the instruction reexecution occurs due to an interrupt and page fault during instruction execution, the result may change.
If src and dest are overlapped, it is necessary to use the correct option through software and proceed to the operation so that the content of src is not destroyed by that of dest. Since the /B option is defined in <<L2>>, if it cannot be used, it is necessary to copy the contents of src to another location and perform the operation with dest. The data processor of the present invention supports the /B option.
If no overlap occurs, the result is not changed regardless of which option is used.
______________________________________.rarw. The length from base to offset is small. The length from base to offset is large. .fwdarw.______________________________________
In the case of no overlap: diagrammed in FIG. 167.
The result of the operation is assured with /B and /F.
In the case of overlap: diagrammed in FIG. 168.
In the case of overlap: diagrammed in FIG. 169.
PROGRAM EXCEPTION: Reserved instruction exceptions
When Q=`1`
When X=`1`
When P=`1`.
MNEMONIC: BVCPY.
OPERATION: bit transfer.
OPTIONS:
/F: Perform the operation from the smaller offset (default).
/B: Perform the operation from the larger offset <<L2>>. (the data processor of the present invention supports this option.)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: Shown in FIG. 170.
STATUS FLAGS AFFECTED: Shown in FIG. 171.
DESCRIPTION: This instruction serves to transfer bits between variable length bit fields src and dest for bit map operation on a monitor screen. This instruction transfers bits without the arithmetic operation function of the BVMAP instruction so that the bit transfer operation can be performed at a high speed.
The functions of the /F and /B options are the same as those of the BVMAP instruction. If src and dest of the bit map are not overlapped, the results are the same regardless of which option is used. On the other hand, if they are overlapped, it is necessary to use the correct option so that the contents of src are not destroyed by dest.
When the /B option is used, the offset value, the maximum number of the bit field to be transferred, is added to 1. It is specified as the offset value to be placed in R1 and R4. This function is in accordance with the specifications of SMOV/B and SCMP/B. Although the /B option is defined in <<L2>>, the data processor of the present invention supports it.
PROGRAM EXCEPTION: Reserved instruction exceptions
When Q=`1`
When X=`1`
When P=`1`
MNEMONIC: BVPAT
OPERATION:
cyclic bit operation
Operation of pattern and bit map.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: Shown in FIG. 172.
STATUS FLAGS AFFECTED: Shown in FIG. 173.
DESCRIPTION: This instruction is used to fill the bit map on a computer screen with some pattern or to perform logical operations for the bit map on a screen with some pattern. When continuously generating a pattern, perform logical operations on the bit field.
If the high order bits for the operation specification (R5) are not 0, they are ignored.
However, even though they are not checked, for future expansion, the high order bits should be filled with `0`. This function does not use an invalid operand exception (IOE) so that the complexity of the implementation is not increased and the execution speed is not lowered.
This instruction does not perform a shift operation during a memory write unlike BVMAP and BVCPY. The specification of offset only masks pattern. On the other hand, the BVMAP instruction performs a shift operation if the offset of src differs from that of dest.
PROGRAM EXCEPTION: Reserved instruction exceptions
When+=`0`
When X=`1`
When P=`1`
12-9. Decimal Arithmetic Instructions
The data processor of the present invention supports unsigned PACKED format (BCD) decimal one word addition/subtraction operation and the PACK/UNPACK process according to the <<L1>> specification of the main processor and signed PACKED format decimal one word addition/subtraction operation according to the <<L2>> specification. In addition, the addition, subtraction, multiplication, and division of long digit decimal numbers are processed by a coprocessor.
This paragraph describes only the addition and subtraction of the PACKED format decimal numbers and PACK/UNPACK process. The addressing mode of the decimal arithmetic operations is the same as that of the conventional instructions.
The data processor of the present invention does not support the four types of decimal arithmetic operation instructions described in this paragraph.
MNEMONIC: ADDX src,dest (the data processor of the present invention does not support this instruction.)
OPERATION:
dest+src+X.sub.-- flag.fwdarw.dest BCD
Addition in BCD.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 174.
STATUS FLAGS AFFECTED: shown in FIG. 175.
DESCRIPTION: Add packed BCD numbers.
This instruction can handle BCD data consisting of 8 bits (2 digits), 16 bits (4 digits), 32 bits (8 digits), and 64 bits (16 digits). However, 64 bits are only handled in the <<LX>> specification.
If the size of the source operand is smaller than that of the destination operand, the source operand is zero-extended and the content of the source operand is added to that of the destination operand.
Since the sign-extension of a BCD number is not meaningful, it is treated as an unsigned number and the flag change of ADDDX is based on that of ADDU. Like ADDU, V.sub.-- flag is set if the result is not completely placed in dest and a carry-out from dest is sent to X.sub.-- flag if d<s. However, the status of Z.sub.-- flag cumulatively changes as in ADDX and SUBX rather than ADDU.
If each digit of src and dest contains a number other than 0 to 9, in other words, if the contents of each operand of ADDDX and SUBDX are not a number in BCD, an EIT does not occur. However, the contents of dest and the results sent to flags are not assured (depending on the implementation). This function does not use an invalid operand exception (IOE) so that the complexity of the implementation is not increased and the execution speed is not lowered.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
<<L1>> functional exception
When the bit pattern of ADDDX is decoded.
MNEMONIC: SUBDX src,dest (the data processor of the present invention does not support this instruction.)
OPERATION:
dest-src-X.sub.-- flag.fwdarw.dest BCD
Subtraction in decimal BCD.
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: Shown in FIG. 176.
STATUS FLAGS AFFECTED: Shown in FIG. 177.
DESCRIPTION: Subtract packed BCD numbers.
This instruction can handle BCD data consisting of 8 bits (2 digits), 16 bits (4 digits), 32 bits (8 digits), and 64 bits (16 digits). However, 64 bits are only handled in the <<LX>> specification.
If the size of the source operand is smaller than that of the destination operand, the source operand is zero-extended and the content of the source operand is subtracted from that of the destination operand.
Since the sign-extension of a BCD number is not meaningful, it is treated as an unsigned number and the flag change of SUBDX is based on that of SUBU. Like SUBU, V.sub.-- flag is set if the result becomes negative and a borrow from dest is set to X.sub.-- flag if d<s. However, the status of Z.sub.-- flag cumulatively changes like ADDX and SUBX rather than SUBU.
If the result becomes negative in SUBDX, dest is not represented as an absolute value, but a complement (complement of 10). Thus, the value becomes the same as from the high order digit in dest.
______________________________________Example: If SUBDX is executed with 16 bits, dest src 0123-0456 = (-0333) dest becomes (-333) = 9667______________________________________
If each digit of src and dest contains a number other than 0 to 9, in other words, if the contents of each operand of ADDDX and SUBDX is not a number in BCD, and EIT does not occur. However, the content of dest and the results sent to flags are not assured (depending on the implementation). This function does not use an invalid operand exception (IOE) so that the complexity of the implementation is not increased and the execution speed is not lowered.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When MM=`11`
When EaR is @-SP
When EaM is #imm.sub.-- data, @SP+ or @-SP.
<<L1>> functional exception
When the bit pattern of SUBDX is decoded.
MNEMONIC: PACKss src,dest (the data processor of the present invention does not support this instruction.).
OPERATION: pack data.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 178.
STATUS FLAGS AFFECTED: shown in FIG. 179.
DESCRIPTION: Pack the content of src in BCD (Binary Coded Decimal) and transfer it to dest. Actually, one of B, H, W and L is placed in s of PACKss and the following mnemonic and operation take place.
__________________________________________________________________________PACKHB src[.H],dest[.B] RR=01,WW=00 src[04:07] ==> dest[00:03], src[12:15] ==> dest[04:07]PACKWH src[.W],dest[.H] <<L2>> RR=10,WW=01 src[04:07] ==> dest[00:03], src[12:15] ==> dest[04:07] src[20:23] ==> dest[08:11], src[28:31] ==> dest[12:15]PACKWB src[.W],dest[.B] RR=10,WW=00 src[12:15] ==> dest[00:03], src[28:31] ==> dest[04:07]PACKLW src[.L],dest[.W] <<LX>>PACKLH src[.L],dest[.H] <<LX>>__________________________________________________________________________
Since the mnemonic in PACKss and UNPKss depends on the size, it is considered that the function of the instruction significantly changes depending on the size. In other words, only the zero-extension and sign-extension are performed in the conventional instructions depending on the size, while the operations in PACKss and UNPKss significantly change depending on the size.
If a combination of sizes which are not listed in the above table is specified, the result of the operation is not assured (the value depending on the implementation is set to dest). Although it is desirable to generate a reserved instruction exception (RIE) on the architecture, a reserved instruction exception does not occur. This concept also applies to the logical operation between different sizes.
The bits of src which do not affect dest (2 7 to 2 4 bits of PACKHB), they are not checked for 0 or 1. Even if they are not 0, they are ignored. Since letter codes are packed directly, for the most part they are not 0.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When W=`1`
When EaR is @-SP
When EaW is #imm.sub.-- data or @SP+,
<<L1>> function exception
When the bit pattern of PACKss is decoded.
MNEMONIC: UNPKss src,dest,adj (the data processor of the present invention does not support this instruction.).
OPERATION: unpack data
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 180.
STATUS FLAGS AFFECTED: shown in FIG. 181.
DESCRIPTION: Unpack the contents of src in packed form decimal, add the adjustment value adj to the value being unpacked, and transfer the result to dest. To directly generate character codes using the UNPK instruction, the adjustment value adj is added. Adj is added in binary rather than in decimal. The adj size is specified by the WW field together with the dest size.
Actually, one of B, H, W and L is placed in s of UNPKss and the mnemonic and operation take place; as described in FIG. 182.
If a combination of sizes which is not listed in the above table is specified, the result of the operation is not assured (the value depending on the implementation is set to dest). Although it is desirable to generate a reserved instruction exception (RIE) on the architecture, since it is difficult to detect an RIE by a combination of the two operand sizes, a reserved instruction exception does not occur.
An overflow by addition of adj is ignored.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When WW=`11`
When EaR is @-SP
When EaW is #imm.sub.-- data or @SP+
<<L1>> function exception
When the bit pattern of UNPKss is decoded.
12-10. String Manipulation Instructions
A `string` is a data type where data of 8 bits, 16 bits, 32 bits or 64 bits is continuously aligned for any length. (Only the SSCH instruction supports data collection which is not continuously aligned.) The meaning of string data is not specified. It may be real character code, integer or floating point, each of which is interpreted by the user.
The string range can be represented in the following two manners.
Specify the string length (amount of data).
Specify the character which represents the end of string (terminator).
It is necessary to select one of the above two methods depending on the purpose and language in use. In the string instructions of the data processor of the present invention, a parameter for the amount of data or the terminator in the format of the optional termination condition can be specified. The string instructions of the data processor of the present invention support both specification methods.
One of the features of the string instructions of the data processor of the present invention is the ability to freely select the amount of incrementation/decrementation by the pointer. Thus, with the string search instruction (SSCH instruction), the table can be searched and a multiple element array can be scanned.
As the termination conditions of the string instructions SMOV, SCMP, and SSCH, various conditions such as large-small comparison and two-value comparison can be specified. The SSCH instruction is used for searching a string. Since the search condition is specified as a termination condition, it only works as a termination condition. Termination conditions (eeee) specified by the string instructions are as seen in FIG. 183.
As applications of the string instructions imply, processing of character strings of 8 bits/16 bits, searching the specific bit pattern, transferring a memory block, inserting a structure, clearing a memory area, etc., are available.
Since the string instructions deal with non-fixed length data the same as variable length bit field instructions, the functions of interrupt acceptance during execution and execution resumption are required. On the other hand, the string instructions themselves do not become codes generated by the compiler. Instead, they are provided as subroutines written by the assembler. Therefore, the restrictions for symmetry and addressing mode are not strictly necessary. Thus, the string instructions of the data processor of the present invention use the fixed number registers (R0 to R4) to keep the operand and the status during execution. The major registers used are as follows.
R0: Start address of the source string
R1: Start address of the destination string
R2: Length of string and amount of data
R3: Comparison value of termination condition (1)
R4: Comparison value of termination condition (2).
R2 represents the length of string using the number of elements rather than the number of byte. R2 is treated as an unsigned number. R2=0 indicates the instruction is not terminated by the number of elements. In other words, to avoid terminating the instruction by the number of elements, the instruction should be performed with R2=0. The execution pattern of the string instruction is described as follows:
______________________________________ do { . . . R2 - 1 ==> R2; check.sub.-- interrupt; } while (R2 !=0);______________________________________
If R2=0, whether the number of elements is H'100000000 or more (the number of elements is not checked) depends on the implementation. In other words, if the instruction is not terminated even after the elements are operated on H'100000000 times, the operation that follows depends on the implementation. However, if the instruction is terminated due to a cause other than the number of elements (it generally occurs when R2=0), the value of R2 (see Appendix 11) after the instruction is terminated should be correctly set. Except for a special case where R5=0 is specified by SSCH/R, an address transfer exception (ATRE) and bus access exception (BAE) occur when the elements are operated for H'100000000 times, resulting in the suspension of the instruction.
Since the string instructions can be terminated by various causes, flags are used to distinguish them. The meaning of each flag is as follows:
V.sub.-- flag: Termination by the number of elements (string length)
F.sub.-- flag: Termination by the termination condition (eeee) To distinguish multiple termination conditions, M.sub.-- flag is used. For the status change of M.sub.-- flag, see the related appendix.
In SCMP and SSCH, which do not have other termination causes, the status changes of V.sub.-- flag and F.sub.-- flag are complementarily performed. The SCMP instruction may be terminated whether the comparison data is matched or not.
MNEMONIC: SMOV,
OPERATION: copy string.
OPTIONS:
/F: Copy the string in the direction the address increases.
/B: Copy the string in the direction the address decreases.
/Various termination conditions (eeee).
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 184.
STATUS FLAGS AFFECTED: shown in FIG. 185.
DESCRIPTION: Transfer the string.
In the string instruction, SMOV/B copies the string in the direction the address decreases. The addresses specified by R0 and R1 point the maximum address of the string +1 and the string copy operation is performed by decreasing R0 and R1.
If one of the /F and /B options is improperly used when src and dest are overlapped, the result of the SMOV operation is not assured. In other words, the result may depend on the implementation and whether the instruction execution is suspended or not.
When memory access is conducted using the feature of the complex instruction in a pipeline manner, the memory access order may change and the element that follows is never read after the element that precedes is written.
The backward string copy option/B is defined in <<L1>> instead of <<L2>> only in the instruction SMOV/B.
For a detailed specification of complex instructions such as variable length bit field instructions and field instructions as well as the register value after the instruction is completed, see Appendix 11.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`
When Q=`1`
When eeee=`0111`.about.`1111`
MNEMONIC: SCMP.
OPERATION: compare string.
OPTIONS:
/F: Compare the string in the direction the address increases.
/B: Compare the string in the direction the address decreases. <<L2>> (the data processor of the present invention supports this option.)
/various termination conditions (eeee).
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 186.
STATUS FLAGS AFFECTED: shown in FIG. 187.
DESCRIPTION: Compare the contents of string src1 with those of string src2.
The comparison operation is continued while the contents of the two strings are matched. If an unmatched string is found, the operation is terminated. The SCMP instruction sets the flags depending on the result of src2-src1 like the CMP instruction. For example, L.sub.-- flag indicates the contents of src2 are smaller than those of src1 rather than setting the flag based on the result of src1-src2. SCMP has the following three instruction termination causes which can be distinguished from the flag status.
1. Termination by the number of elements (amount of data) (R2) V.sub.-- flag=1
2. Termination by termination conditions F.sub.-- flag=1, M.sub.-- flag is changed by termination causes.
3. Termination by unmatched data being compared
Z.sub.-- flag=0, L.sub.-- flag and X.sub.-- flag are changed by the comparison result.
L.sub.-- flag is the comparison result when the comparison is made by treating the last data as signed data.
X.sub.-- flag is the comparison result when the comparison is made by treating the last data as unsigned data.
Although 2 and 3 can be checked at the same time, cause 1 is checked in a different phase than causes 2 and 3. Thus, although causes 2 and 3 may be satisfied at the same time, causes 1 and 2 and causes 1 and 3 are not satisfied at the same time. If one or more of the causes are satisfied, the SCMP instruction is terminated.
As long as the data to be compared is matched, the value (src1=src2) is tested as the termination condition. If data is not matched, src1 represented by R0 is tested as the termination condition.
For M.sub.-- flag, which does not have meaning unless the termination conditions are satisfied, if the instruction is terminated due to a different termination cause, the result becomes uncertain. The M.sub.-- flag status should always be set to 0.
Z.sub.-- flag, L.sub.-- flag and X.sub.-- flag are always affected by the comparison result of the last data regardless of whether the result is matched or unmatched. Thus, if the instruction is completed by a condition other than cause 3 (when the data is matched), the status flags are automatically changed as follows.
Z.sub.-- flag=1, L.sub.-- flag=0, and X.sub.-- flag=0.
Since SCMP deals with both signed data and unsigned data, the comparison result, where the element is considered as signed data, is placed in L.sub.-- flag. The comparison result, where the element is considered as unsigned data, is placed in X.sub.-- flag. The character codes of BTRON should be treated as unsigned data. When normal integers are encountered, it is also necessary to use signed data.
The flag change of SCMP is summarized as shown in FIG. 188.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`
When Q=`1`
When eeee=`0111`.about.`1111`.
MNEMONIC: SSCH.
OPERATION: find a character in a string.
OPTIONS:
/F Search a character in a string to the direction the address increases. (The pointer value increments by the element size.)
/R The increment value of the pointer is specified by R5.
/various termination conditions (eeee)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 189.
STATUS FLAGS AFFECTED: shown in FIG. 190.
DESCRIPTION: Search a string and find an element which satisfies the conditions.
When the /R option is used, the elements are compared and R0 is updated (by post increment or post decrement) regardless of whether R5 is positive or negative.
The size of R5 of SSCH/R is the same as that of the pointer R0. In other words, the size of R5 in the data processor32 of the present invention is fixed at 32 bits, while that in the data processor64 of the present invention is specified by the P bit or mode independent from SS (R3, R4 and element size).
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`
When eeee=`0111`.about.`1111`.
MNEMONIC: SSTR.
OPERATION: Continuously write the same data (fill data in string).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 191.
STATUS FLAGS AFFECTED: showin in FIG. 192.
DESCRIPTION: Continuously write the value of R3 to the memory area being specified by the start address (R1) and the length (R2).
Since the SSTR instruction does not require any termination conditions, they are not specified.
When R2=0 in string instructions, the instruction is not terminated by the number of elements. However, in the SSTR instruction, the termination by the number of elements is the only termination cause. When R2=0 is specified, an endless loop is formed. It should be prevented by software rather than hardware. However, it is possible to accept an interrupt during execution of the instruction and to reexecute the instruction. Thus, even if control enters an endless loop, the scheduling of the task and process is not affected. An endless loop which is formed by multiple instructions can be summarized with one instruction. R2=0 is not treated as an invalid operand exception (IOE) so that the specification is the same as other string instructions, the implementation's complexity is reduced, and the operation speed is not lowered.
Depending on the parameters and termination conditions being specified, an endless loop may be formed with the SSCH or QSCH instructions.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`.
12-11. Queue Manipulation Instructions
The data processor of the present invention provides QINS (insertion of queue being entered), QDEL (deletion of queue being entered), and QSCH (search of queue being entered) for queue operations. The queues that the data processor of the present invention supports are double linked queues where the beginning first and second data of a queue being entered are link pointers in the absolute address. The beginning data of the queue being entered is the pointer to the next queue entry, while the second data of the queue being entered is the pointer back to the previous queue entry.
The specification of the queue instructions have been defined so that the queue header can be employed directly as an operand of the queue instruction.
1. In QDEL, the queue just after the instruction is deleted, rather than the queue being specified. If the queue head is specified as an operand, the beginning operand being entered is deleted. If the queue being searched with QSCH/B is deleted or if the last queue is deleted, an indirect reference is required. However, it is assumed their operations are not performed as often as those where the queue being deleted with QSCH/F and the beginning queue being entered are deleted. 2. In QINS, a new queue is inserted just before the queue being specified. If the queue head is specified as an operand, the new queue to be inserted follows the present queue. This operation is performed in one of the following two ways. To obtain the symmetry with the QDEL instruction in QINS, it is preferred to insert the new queue just after the queue being specified (or queue head) because the same operand can be specified to delete the new queue being enter with QINS using QDEL. In addition, this way is preferred where the queue is used as a stack (LIFO). On the other hand, if the queue is used for FIFO, with QINS, a new queue is inserted after the present queue and QDEL is often used to delete the beginning queue being entered. The latter is the natural queue operation as exemplified by ITRON, consequently, the latter specification is employed. 3. In QSCH, the queue being specified is searched just after the instruction rather than from the present queue being entered. If the queue head is specified as an operand, the queue search operation starts from the beginning queue. To search the next queue after the first search operation is successful, one only has to execute QSCH again. This way differs from other high level instructions (string, variable length bit field operation). In other words, with a string instruction, the queue search operation starts from the data that the pointer points at. When the continuous queue search operation is required, it is necessary to update the pointer with instructions other than queue instructions. However, since a different header is used in queues, it is possible to employ a different specification.
4. Whether the queue is empty or not is determined by flags. If data is inserted in an empty queue with QINS and then the queue becomes empty after the queue being entered is deleted with QDEL, Z.sub.-- flag is set. Since an attempt is made to delete from an empty queue causes an error, the pointer is not changed, but V.sub.-- flag is set.
MNEMONIC: QINS entry, queue.
OPERATION: insert a new entry into a queue.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 193.
STATUS FLAGS AFFECTED: shown in FIG. 194.
DESCRIPTION: Insert a new entry specified by the entry field, just before the queue represented by the queue field.
If the queue being specified with queue is the queue header, this instruction causes a new entry to be inserted at the end of the present queue.
Z.sub.-- flag is set depending on whether the queue is empty or not before the instruction is executed.
[QINS instruction operation in 32-bit structure]: described in FIG. 195.
[Before execution]: diagrammed in FIG. 196.
[After execution]: diagrammed in FIG. 197.
In the addressing mode which is specified by EaMqP and EaMqP2, the register direct Rn, @-SP, @SP+ and #imm.sub.-- data cannot be used.
In addition, in QINS, the data structure for the portion which is not directly required for executing the instruction is not checked (such as linking condition for a new queue being entered just before and after a present queue). The QINS instruction works as described in "OPERATION".
PROGRAM EXCEPTION: Reserved instruction exceptions
When +=`0`
When -=`1`
When EaMqP is Rn, #imm.sub.-- data, @SP+ or @-SP
When EaMqP2 is Rn, #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: QDEL queue,dest
OPERATION: remove a entry from a queue
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 198.
STATUS FLAGS AFFECTED: shown in FIG. 199.
DESCRIPTION: Delete the entry following the queue being specified by the queue field and set the address of the queue being deleted to dest. The address of the queue being deleted is set to dest because it may be frequently used.
If the queue header is specified for queue, the beginning queue is deleted.
If the queue being specified by the queue field is empty, the instruction cannot be executed. EIT does not occur, but V.sub.-- flag and Z.sub.-- flag are set and the instruction is terminated. dest is not changed.
dest/EaW!S prohibits the @-SP mode. If @-SP is allocated to dest while the queue is empty, V.sub.-- flag is set, and the content of dest cannot be transferred. The instruction operation becomes ambiguous.
[QDEL instruction operation in 32-bit structure]: shown in FIG. 200.
[Before execution]: diagrammed in FIG. 201.
[After execution]: diagrammed in FIG. 202.
In the addressing mode specified by EaRqP, the register direct Rn, @-SP, @SP+ and #imm.sub.-- data modes cannot be used.
In QDEL, the data structure for the portion which is not directly required for executing the instruction, is not checked (such as the linking condition for a new queue being entered just before and after a present queue). The QDEL instruction works as described in "OPERATION".
PROGRAM EXCEPTION: Reserved instruction exceptions
When +=`0`
When W=`1`
When EaRqP is Rn, #imm.sub.-- data, @SP+ or @-SP
When EaW!S is #imm.sub.-- data, @SP+ or @-SP
MNEMONIC: QSCH.
OPERATION: search queue entries.
OPTIONS:
/NM Not mask R6.
/MR Mask R6. <<L2>> (the data processor of the present invention does not support this option.)
/F Search a queue in the forward direction.
/B Search a queue in the reverse (backward) direction. <<L2>> (the data processor of the present invention supports this option.)
/Various termination conditions (eeee).
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 203.
STATUS FLAGS AFFECTED: shown in FIG. 204.
DESCRIPTION: Search and find the specified queue being entered. The backward search operation /B and mask function /MR are specified in <<L2>>. the data processor of the present invention supports the reverse search operation /B. However, it does not support the mask function /MR.
Since this instruction requires the operation correspond to the length of the queue, it is necessary to consider cancelling the operation dynamically like the string instructions. Thus, the operand and the execution status during the execution are placed in the fixed number registers.
The search conditions provide the mask operation (fetches a specified bit) and comparison operation. The mask operation is used to search a flag, while the comparison operation is used to perform the priority operation and the like. The comparison conditions are specified like the termination conditions of the string instructions.
To determine the end of the queue, the queue entry address and the queue end address R2 are compared. If they are matched, the instruction is terminated. If the instruction is terminated by comparison with R2, in other words, if the search operation is unsuccessful because the search conditions are not met, V.sub.-- flag is set and the instruction is terminated, but an EIT does not occur.
Depending on the conditions of the QSCH instruction being specified, control may enter an endless loop in the instruction. It should be checked by the program rather than the hardware. An interrupt during execution and reexecution are available, so even if control mistakenly enters an endless loop in the user program, it does not affect the scheduling of the task and process. Usually, it is considered that an endless loop which is composed of multiple instructions is controlled by one instruction.
Upon completion of the search operation, R0 points at the queue.sub.-- entry which meets the conditions being specified, while R1 points at the queue.sub.-- entry just preceding the queue that R0 points at.
R1 is used to delete the single linked queue. QDEL deletes the queue.sub.-- entry following the queue.sub.-- entry being specified. After QSCH/F is executed, it is possible to execute QDEL with parameter @R1 rather than @R0.
Generally, by executing the QSCH instruction by setting the address of the queue head to R0 and R2, the entire queue (including a case where the queue is empty) can be searched.
QSCH aims to be used in conjunction with the single linked queue and double linked queue.
[QSCH operation]: described in FIG. 205. `check.sub.-- interrupt` checks whether an interrupt from the outside occurs or not. If the interrupt occurs, the execution of QSCH is canceled and the interrupt operation is started. After the interrupt operation is terminated, the remaining portion of the QSCH instruction is executed.
[Before execution]: diagrammed in FIG. 206.
[After execution]: diagrammed in FIG. 207.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When eeee=`0111`.about.`1111`
When m=`1`.
12-12. Jump Instructions
MNEMONIC: BRA newpc.
OPERATION: branch always (PC relative).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 208.
STATUS FLAGS AFFECTED: shown in FIG. 209.
DESCRIPTION: The BRA instruction serves to support the addressing only for PC relative. BRA:D can use 8 bits, while BRA:G can use 8 bits, 16 bits, 32 bits, and 64 bits as the sizes of the displacement. Since the instructions of the data processor of the present invention always start with an even address, with the short format BRA:D instruction, #d8 is doubled and used. In short,
PC+#d8*2.fwdarw.PC.
If SS=00 is specified with BRA:G, #dS is not doubled, but used directly.
If newpc is 16 bits long in BRA:G, although its instruction function and code size are the same as those of JMP @(#dS:16, PC). However, since it may be possible to shorten the number of the execution cycles, they are provided as different instructions.
If newpc is an odd number in BRA:G, since the destination to be jumped becomes an odd address, an odd address jump exception (OAJE) takes place like the Bcc:G, BSR:G, JMP, and JSR instructions. In BRA:D, Bcc:D, and BSR:D, since the operand is doubled and then used, an OAJE does not occur.
If SS=00 in BRA:G, Bcc:G, and BSR:G, although the operand size is 8 bits long, the #dS field becomes 16 bits long. It is necessary to use the low order eight bits of the #dS field and place 0 in the high order 8 bits. If the high order eight bits are not 0, the data to be represented becomes a meaningless value depending on the implementation. EIT does not occur.
The data processor of the present invention performs the dynamic branch predict process for this instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`
Odd address jump exception
When jumped to an odd address.
MNEMONIC: Bcc newpc.
OPERATION: branch conditionally (PC relative).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 210.
STATUS FLAGS AFFECTED: shown in FIG. 211.
DESCRIPTION: The Bcc instruction serves to support only the PC relative addressing mode. Bcc:D can use 8 bits, while Bcc:G can use 8 bits, 16 bits, 32 bits, and 64 bits as the sizes of the displacement. Since the instructions of the data processor of the present invention always start with an even address, in the short format Bcc:D instruction, #d8 is doubled and used. In short,
______________________________________ if (cccc) PC + #d8 * 2 ==> PC______________________________________
If SS=00 is specified with Bcc:G, #dS is not doubled, but used directly.
The detail and mnemonic of the portions where the conditions are specified in Bcc (portion `cc`) and the bit pattern of cccc, is shown in FIG. 212.
If the jump operation does not occur because the conditions are not matched in Bcc:G, and OAJE may or may not occur in the data processor of the present invention. The data processor of the present invention performs the dynamic branch prediction process for this instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`
When cccc=`1110`.about.`1111`
Odd address jump exception
When jumped to an odd address.
MNEMONIC: BSR newpc.
OPERATION: jump to subroutine (PC relative).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 213.
STATUS FLAGS AFFECTED: shown in FIG. 214.
DESCRIPTION: The BSR instruction is a subroutine jump instruction where only the PC relative addressing mode is supported. The value of PC is saved in the stack.
BSR:D can use 8 bits, while BSR:G can use 8 bits, 16 bits, 32 bits and 64 bits as the sizes of the displacement. Since the instructions of the data processor of the present invention always start with an even address, in the short format BSR:D instruction, #d8 is doubled and used. In short,
PC+#d8*2.fwdarw.PC.
If SS=00 is specified with BSR:G, #dS is not doubled, but used directly.
As a PC value saved on the stack with the BSR and JSR instructions, the start address of the instruction that follows is used. On the other hand, if PC is referenced for calculating the effective address (including a case where PC is implicitly referenced in BSR and the like), note that the start address of the instruction rather than the next instruction is used as a value of PC.
Although former PC is saved in the stack with BSR and JSR, the alignment of SP is not checked. Even if SP is not a multiple of 4, such instructions are directly executed.
The data processor of the present invention performs the dynamic branch prediction process for this instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When P=`1`
When Q=`1`
Odd address jump exception
When jumped to an odd address.
MNEMONIC: JMP newpc.
OPERATION:
address of src.fwdarw.PC
jump.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 215.
STATUS FLAGS AFFECTED: shown in FIG. 216.
DESCRIPTION: Jump to an effective address of newpc. The jump instruction is available in the general addressing mode.
In executing the case statement, the jump table is referenced to determined the address of the destination to be jumped. This operation is available by combining the JMP instruction and the index addressing the additional mode.
PROGRAM EXCEPTION: Reserved instruction exceptions
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP
Odd address jump exception
When jumped to an odd address
MNEMONIC: JSR newpc.
OPERATION: jump to subroutine.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 217.
STATUS FLAGS AFFECTED: shown in FIG. 218.
DESCRIPTION: Jump to a subroutine at an effective address. A value of PC is saved in the stack.
As a value of PC saved in the stack with the BSR and JSR instructions, the start address of the instruction that follows is used. If PC is referenced to calculate the effective address (including a case where PC is implicitly referenced in BSR and so on), note that the start address of the instruction rather than the instruction that follows is used as a PC value.
PROGRAM EXCEPTION: Reserved instruction exceptions
When P=`1`
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP
Odd address jump exception
When jumped to an odd address.
MNEMONIC: ACB step, xreg, limit, newpc.
OPERATION: add, compare and branch.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 219.
STATUS FLAGS AFFECTED: shown in FIG. 220.
DESCRIPTION: This instruction is a compound instruction composed of an addition instruction, comparison instruction and conditional jump instruction. This instruction is used as a primitive of a loop instruction.
The step, xreg and limit are operated and compared as signed integers. Although step should be a positive value for a conditional jump operation (xreg varies in the reverse direction of the end value). This instruction works as described in "OPERATION", without checking whether step is positive or negative.
In the ACB instruction, to execute a loop instruction at a high speed, overflow is not checked during the add step. If an overflow occurs after the step is added and the sign is changed, the incorrect value where the signal is changed is directly compared with limit. However, even if the result of the subtraction of limit - xreg overflows, the comparison of xreg < limit is accurate.
In ACB and SCB, the jump operation is conducted in the PC relative mode. Even if the displacement is 8 bits when SS=00, like SS.noteq.00, #dS8 is not doubled, but used directly. When SS.noteq.00, the field of #dS8 is not used (set to 0), but the data in the size specified by SS (16, 32 or 64 bits) just follows #dS8.
For example, in ACB:Q #1, R0`, #4, label
If the difference between label and ACB:Q instruction is H'1234, the following bit pattern is obtained. It is also the same as that in the :I format in the variable length bit field instruction. ##STR26##
If newpc is an odd number, an OAJE occurs. In the data processor of the present invention, even if the jump operation does not occur because the termination conditions are satisfied, an OAJE occurs.
If SS.noteq.00 occurs in the ACB and SCB instructions, the field of #dS8 is not used. At the time, even if the field of #dS8 is not 0, it is ignored. However, it is necessary to instruct the user that the field of #dS8 should be filled with zeros.
The data processor of the present invention performs the dynamic branch prediction process for this instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When XX=`11`
When SS=`11`
When P=`1`
When EaR is @-SP
When EaRX is @-SP
Odd address jump exception
When jumped to an odd address.
MNEMONIC: SCB step, xreg, limit, newpc.
OPERATION: subtract, compare and branch.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 221.
STATUS FLAGS AFFECTED: shown in FIG. 222.
DESCRIPTION: This instruction is a compound instruction composed of a subtraction instruction, comparison instruction and conditional jump instruction. This instruction is used for a primitive of a loop instruction.
The step, xreg and limit are operated and compared as signed integers. Although step should be a positive value for a conditional jump operation (xreg varies in the reverse direction of the end value). This instruction works as described in "OPERATION", without checking whether step is positive or negative.
In the SCB instruction, to execute a loop instruction at a high speed, an overflow is not checked during the subtraction step. If an overflow occurs after the step is subtracted and the sign is changed, the incorrect value is compared directly with limit. However, even if the result of the subtraction of limit - xreg overflows, the comparison of xreg< limit is accurate.
In ACB and SCB, the jump operation is performed in the PC relative mode. Even if the displacement is 8 bits when SS=00, like SS.noteq.00, #dS8 is not doubled, but used directly. When SS.noteq.00, the field of #dS8 is not used (set to 0), but the data in the size specified by SS (16, 32 or 64 bits) follows #dS8.
______________________________________[SCB operation]______________________________________xreg - step ==> xreg/* Only low order bits are enabled if an overflowoccurs. */if (xreg .gtoreq. limit) then PC + #dS8 ==> PC endif______________________________________
If newpc is an odd number, an OAJE occurs. In the data processor of the present invention, even if the jump operation does not occur because the termination conditions are satisfied, an OAJE occurs.
If SS.noteq.00 in the ACB and SCB instructions, the #dS8 field is not used. Even if the #dS8 field is not 0, it is ignored. However, it is necessary to instruct the user that the field of #dS8 should be filled with zeros.
The data processor of the present invention performs the dynamic branch prediction process for this instruction.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When XX=`11`
When SS=`11`
When P=`1`
When EaR is @-SP
When EaRX is @-SP
Odd address jump exception
When jumped to an odd address.
MNEMONIC: ENTER local, reglist
OPERATION: Create a new stack frame and jumps to a subroutine for a high level subroutine.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 223.
STATUS FLAGS AFFECTED: shown in FIG. 224.
DESCRIPTION: Creates a stack frame for a high level language.
The local of ENTER is treated as a signed number. If the size of local is small, the value of local is sign-extended. If the content is negative, a meaningless stack frame is created and the instruction works as described in "OPERATION" without checking the contents like the ACB and SCB instructions.
Operation:
FP.fwdarw..dwnarw.TOS
SP.fwdarw.FP
SP - local.fwdarw.SP
registers(mask).fwdarw..dwnarw.TOS.
For detail of a stack frame for a high level language, see the related appendix.
The bit map of the register to be saved, LnXL, is specified as in FIG. 225.
If bit 0 and bit 1 (SP and FP) are specified with reglist, their specifications are simply ignored. Even if bit 0 and bit 1 are "1", SP and FP are not transferred. An illegal operand exception (IOE) does not occur. However, the FP and SP bits should be filled with zeroes.
The alignment of FP and SP is not checked. Even if FP and SP are not multiples of 4, the instruction works as described in "OPERATION".
If the local operand of ENTER:G is in the memory and it is overlapped with the stack frame area which is formed by the execution of the ENTER instruction, it is very difficult to reexecute the instruction. In ENTER:G and JRNG:G, and the symmetrical instruction EXITD:G, the addressing modes requiring the memory access operation (except the register direct Rn mode and immediate mode) are inhibited. If it is necessary to set a dynamic value as an operand of the instruction, one temporary register should be prepared to use the register direct Rn mode.
The operation where FP and SP are specified as local depends on the implementation.
PROGRAM EXCEPTION: Reserved instruction exceptions
When X=`1`
When+=`0`
When-=`1`
When P=`1`
When SS=`11`
When EaR!M is a mode other than #imm.sub.-- data and Rn.
MNEMONIC: EXITD reglist, adjsp
OPERATION: exit and deallocate parameters
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 226.
STATUS FLAGS AFFECTED: shown in FIG. 227.
DESCRIPTION: Reallocate a stack frame for a high level language and reset the registers to exit from a subroutine. Add the content of adjsp to SP and discard the subroutine parameters on the stack.
The adjsp of EXITD is treated as a signed number. If the size of adjsp is small, the value of adjsp is sign-extended. If the value of adjsp is negative, the instruction performs a meaningless operation. It is not checked, but works as described in "OPERATION" like ACB and SCB.
Operation
adjsp.fwdarw.tmp
.uparw.TOS.fwdarw.registers(mask)
FP.fwdarw.SP
.uparw.TOS.fwdarw.FP
.uparw.TOS.fwdarw.PC
sp+tmp.fwdarw.SP.
For the details of stack frame for a high class language, see the related appendix.
The bit map of the register to be saved, LxXL, is specified as in FIG. 228.
If bit 14 and bit 15 (SP and FP) are specified with reglist of EXITD, their specifications are ignored. Even if bit 14 and bit 15 are "1", SP and FP are not transferred. An illegal operand exception (IOE) does not occur. However, the FP and SP bits should be filled with zeroes.
The alignment of FP and SP is not checked. Even if FP and SP are not multiples of 4, the instruction works as described in "OPERATION".
In EXITD, if the return address restored from the stack is an odd number, the destination becomes an odd address, so that an odd address jump exception (OAJE) occurs.
In the operand adjsp/EaR!M of EXITD, all the addressing modes which require the memory access operations except the register direct Rn mode and immediate mode are inhibited. If the operand of the instruction should be a dynamic value, one temperary register is available to use the register direct Rn mode.
If the register direct Rn mode is used and the same register Rn is used for reglist, a value before restoring the register is used as adjsp. In other words, the register value before executing the EXITD instruction rather than the value after that becomes the content of adjsp.
The operation to specify FP and SP as adjsp depends on the implementation.
PROGRAM EXCEPTION: Reserved instruction exceptions
When X=`1`
When +=`0`
When -=`1`
When P=`1`
When SS=`11`
When EaR!M is a mode other than #imm.sub.-- data and Rn.
MNEMONIC: RTS.
OPERATION: return from subroutine.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 229.
STATUS FLAGS AFFECTED: shown in FIG. 230.
DESCRIPTION: Return control from a subroutine.
Operation:
.uparw.TOS.fwdarw.PC.
If the return address returned from the stack is an odd number, an OAJE occurs.
PROGRAM EXCEPTION: Reserved instruction exception
When P=`1`
Odd address jump exception
When the return address is an odd number
MNEMONIC: NOP.
OPERATION: no operation.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 231.
STATUS FLAGS AFFECTED: shown in FIG. 232.
DESCRIPTION: No operation.
PROGRAM EXCEPTION: Reserved instruction exception
When `-`=`1`
MNEMONIC: PIB.
OPERATION: purge instruction buffer.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 233.
STATUS FLAGS AFFECTED: shown in FIG. 234.
DESCRIPTION: Purge all the buffers of the instruction pipeline, instruction queue and instruction cache so that it is assured that the instruction string in the memory matches the processor internal status. This instruction is used to acknowledge that the instruction codes may be changed (after the processor is reset or the former PIB instruction is executed).
In the data processor of the present invention, to simplify the controls of pipeline, instruction queue and instruction cache, the instruction codes cannot be changed through a program. Even if the instruction codes are changed by a program, their operation is not assured. However, from a macro view of the OS process, a program is first loaded and then executed. In other words, instruction codes are changed by the OS program. In special applications, instruction codes created by a program are executed.
The purpose of this instruction is to correctly execute instructions in such a case. When this instruction precedes the instruction codes being changed, it is assured that the new instruction codes are correctly executed. With this instruction, pipeline, instruction queue and instruction cache are purged.
However, if the pipeline and cache mechanisms provide the bus monitoring features for rewriting the memory and the coincidence with the memory is always assured by hardware, the purge operation by the PIB instruction is not required. In this case, the PIB instruction is executed as the NOP instruction. In any case, it is necessary to assure the coincidence between the pipeline and instruction cache with the memory after this instruction is executed.
If multilevel logical space is formed by using MMU, the execution of only the instruction codes for the logical space where the PIB instruction is executed is assured. For example, if the following instruction string is executed:
Rewrite the instruction codes of context .sub.-- A
STCTX
LDCTX context.sub.-- B
Rewrite the instruction codes of context.sub.-- B
PIB.
The operation of context.sub.-- B is assured even if the instruction codes being changed are executed. After LDCTX context.sub.-- A is executed, the execution of the instruction codes of context.sub.-- A being changed are not assured. To assure the execution of the context.sub.-- A, it is necessary to execute the PIB instruction again. If LSID is used in the instruction cache, it is necessary only to purge the coincident instruction cache entry where LSID is matched.
In the instructions other than the PIB instruction, even after the jump instructions and OS related instructions (LDCTX, REIT, RRNG, TRAP, EIT start, etc.), the operation of the portion of the program where instruction codes are changed is not guaranteed to decrease as much as the purge operation of the instruction cache. Thus, when executing the program that OS loads, it is necessary to execute the PIB instruction (for example, between LDCTX and REIT).
"Buffer" of the mnemonic PIB (Purge Instruction Buffer) of the instruction is used in a wide variety of applications including cache, pipeline and so forth. The B buffer of PTLB is used in the same manner. The mnemonic PIB is created from the same association as PTLB.
This instruction is not a privileged instruction. It can be used from the user program.
Coincidence of instruction codes
To precisely describe the operation of the PIB instruction, the "coincidence of instruction codes" is defined as follows.
The "coincidence of instruction codes" is defined for each logical address of each logical space. For example, the "coincidence of instruction codes" is used such that in the logical space A, the "coincidence of instruction codes" from H'00000000 to H'000ffffff is assured; in the logical space B, the "coincidence of instruction codes" from H'00010000 to H'0003ffff is assured. Only when the "coincidence of instruction codes" is assured do these instructions work correctly (including the access right check operation of execute). Generally, the area where the "coincidence of instruction codes" is assured is the instruction code area, but in the data area, the "coincidence of instruction codes" is not assured.
The "coincidence of instruction codes" is assured in the following cases.
When the processor is reset:
In all physical spaces (logical spaces), the "coincidence of instruction codes" is obtained.
When the PIB instruction is executed:
In all the areas of the logical space where the PIB instruction is executed, the "coincidence of instruction codes" is obtained. If AT=00, like the reset state, in all the physical spaces (= logical spaces), the "coincidence of instruction codes" is obtained.
The "coincidence of instruction codes" is lost in the following cases:
When the memory content is rewritten:
When the memory content is rewritten, the "coincidence of instruction codes" in the area where the content is rewritten is lost regardless of whether the memory is accessed by logical address or physical address (AT=00, LDP instruction, and so forth).
When ATE is updated:
When ATE is updated, the "coincidence of instruction codes" where the address is converted by ATE is lost. Thus, for example, if the protection bit during ATE in LDATE is changed, unless the PIB instruction is executed, the protection information is correctly checked. (It would be effective to reduce the burden of the implement for checking the protection information.)
In executing regular instructions which do not relate to the above items (BRA, JMP, JRNG, RRNG, TRAP, REIT, LDCTX and starting EIT), the "status of the coincidence of instruction codes" is not changed.
12-13. Multiprocessor Support Instructions
MNEMONIC: BSETI offset, base.
OPERATION:
bit.fwdarw.Z.sub.-- flag, 1.fwdarw.bit (interlocked)
Set a bit (lock the bus).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 235.
STATUS FLAGS AFFECTED: shown in FIG. 236.
DESCRIPTION: Invert the bit value being specified, copy the inverted bit to Z.sub.13 flag, and then set the bit value to 1. These two operations are both performed while the bus is locked. Consequently, this instruction is used to synchronize multiple processors.
In the addressing modes specified with ShMfqi and EaMfi, the register direct mode Rn, @-SP, @SP+ and #imm.sub.-- data modes cannot be used.
In the assembler syntax, the memory access size is specified as the base size. In BSETI:Q, the memory access size is fixed to 8 bits, so it is possible to describe only `B`. The assignment of .H and .W for the access size in BSETI:G and BSETI:E is specified in <<L2>> like BSET and BCLR.
If base is an address which is not aligned while the access size .H or .W is assigned in <<L2>> specification, the memory access range depends on the implementation like the bit operation instructions. If an unaligned word or half word is accessed, multiple bus cycles are executed while the bus is locked like the CSI instruction.
The data processor of the present invention implements access operations every half word or word, as specified in <<L2>>. In addition, if an address which is not aligned is assigned as base, the access operation is performed every half word or word which is aligned.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When BB=`11`
When EaR is @-SP
When EaMfi or ShMfqi is Rn, #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: BCLRI offset, base.
OPERATION:
bit.fwdarw.Z.sub.-- flag, 0.fwdarw.bit (interlocked)
Clear a bit (lock the bus).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 237.
STATUS FLAGS AFFECTED: shown in FIG. 238.
DESCRIPTION: Invert the bit value being specified, copy the inverted bit to Z.sub.13 flag, and then set the bit value to 0. These two operations are concurrently performed while the bus is locked. Consequently, this instruction is used to synchronize multiple processors.
In the addressing mode specified with EaMfi, the register direct mode Rn, @-SP, @SP+ and #imm.sub.-- data modes cannot be used. In the assembler syntax, the memory access size is assigned as the base size. The assignment of .H and .W for the access size in BCLRI:G and BCLRI:E is specified in <<L2>> like BSET and BCLR.
If base is an address which is not aligned while the access size .H or .W is assigned in the <<L2>> specification, the memory access range depends on the implementation like the bit operation instruction. If an unaligned word or half word is accessed, multiple bus cycles are executed while the bus is locked as in the CSI instruction.
The data processor of the present invention implements the access operation every half word or word as specified in <<L2>>. In addition, if an address which is not aligned is assigned as base, the access operation is performed every half word or word which is aligned.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When BB=`11`
When EaR is @-SP
When EaMfi is Rn, #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: CSI comp, update, dest.
OPERATION: compare and store (interlocked).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 239.
STATUS FLAGS AFFECTED: shown in FIG. 240.
DESCRIPTION: If the dest value is the same as the previous value (specified by comp), the content is updated.
This instruction can be used when simply structured data is updated by multiple processors. After the CSI instruction is executed, if the dest value differs from the previous value, it means that the content of the data has been rewritten by another processor. Therefore, the processor which detects the difference in the dest value with the CSI instruction should update the content of the data based on the new dest value. In this manner, data can be maintained in a multiprocessor environment.
______________________________________[CSI Operation]______________________________________update ==> tmp/* The following operations are conducted while the busis locked. */if (dest = comp)thentmp ==> dest1 ==> Z.sub.-- flagelsedest ==> comp0 ==> Z.sub.-- flag______________________________________
Due to the restriction of the bit pattern, in CSI, even if the comparison operation is unsuccessfully terminated, the content of the update operand is read. In addition, the access right (access permission) of dest in the CSI instruction is also necessary for the read and write operations. In other words, even if the comparison operation is unsuccessfully terminated and data is not written to dest, unless there is write access permission for dest, an address translation exception (ATRE) occurs.
The size of RMC and EaMiR is assigned by RR. In the addressing mode assigned by EaMiR, the @-SP, @SP+, Rn and #imm.sub.-- data modes cannot be used.
If the size .H or .W is assigned in the CSI instruction and an unaligned address is assigned for the operand, while the bus is locked, multiple bus cycles are executed. In this case, the memory is accessed with two read operations and two write operations. Consequently, while the bus is locked during the entire instruction, four memory access operations are performed in the order: read, read, write and write operations.
In general instructions except CSI, if the memory is accessed to an address which is not aligned, the bus is not locked.
Thus, for example, in the following instruction,
var1 EQU H'00000006; Address not aligned.
When the following instruction is executed by processor A:
MOV.W #H'12345678,@var1.
When the following instruction is executed by processor B:
MOV.W #H'87654321,@var1.
Depending on the memory write timing, the following results are obtained.
H'00000006-7=H'8765
H'00000008-9=H'5678.
Thus, the result may differ from that where the MOV instruction of processor A is first executed and that where the MOV instruction of processor B is first executed.
Since data of the variables common to multiple processors should be updated (read-modify-write) rather than only writing data, it is necessary to use the CSI instruction. However, if a variable which is not aligned is accessed from multiple processors with any instruction other than CSI, note that a problem may occur.
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When EaR is @-SP
When EaMiR is Rn, #imm.sub.-- data, @SP+ or @-SP.
12-14. Control Space, Physical Space Operation Instructions
In the data processor of the present invention, the control register group for the main processor can create one address space named control space as well as control register group for a co-processor and high speed memory on the chip bus. This concept is effective when a co-processor and context-saving high speed memory (both of which are currently in different chips) will be combined in a main processor in near future. The control register operation instructions serve to access the control space.
Since the general purpose control space operation instructions such as LDC and STC are privileged instructions, when the user wants to operate PSB and PSM which are part of the control space, the LDPSB, STPSB, LDPSM and STPSM instruction should be used instead.
Since the data processor of the present invention does not provide the address translation feature, the logical space address is always the same as the physical space address. Thus, the functions of the physical space operation instructions are included in other instructions which operate the logical space. The data processor of the present invention which distinguishes between the logical space and physical space; the data processor of the present invention supports the physical space operation instructions.
MNEMONIC: LDC src,dest.
OPERATION: load control space or register (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 241.
STATUS FLAGS AFFECTED: shown in FIG. 242.
DESCRIPTION: Transfer the src value to dest in the control space. If the size of src is smaller than that of dest, the former is sign-extended.
For dest/EaW%, the register direct mode Rn and @-SP cannot be specified.
This instruction is a privileged instruction. If this instruction is not executed from ring 0, a privileged instruction violation exception (PIVE) occurs.
The data processor of the present invention does not support the .B and .H access functions for the control space. In the control space, it only implements the control register in the CPU. Since Data Processor of the present invention does not provide UATB and SATB, UATB and SATB cannot be changed by LDC.
In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions which reference the special space, if an indirect reference occurs by the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring RNG rather than PRNG is referenced. The meaningful special space address is the only final effective address which is obtained.
If the control space operand size .B or .H is assigned in a processor which does not provide the .B and .H access functions for the control space, a reserved instruction exception (RIE) occurs.
If a control register or an address where a control register is not provided is assigned by LDC, a reserved function exception (RFE) occurs. It is also applied to the area specified in<<LV>>.
In a processor which has some restrictions for the address in the control space, if the restriction is violated, a reserved function exception (RFE) occurs. For example, there is a restriction as to when the address of the control register should be multiples of 4. In a processor which accommodates a high speed memory for saving a context, there is a case where only the address for the control register is restricted to multiples of 4 and the address for the high speed memory is not restricted. Even in this case, if the restriction is violated, a reserved function exception (RFE) occurs. In a processor which can assign .B and .H for part of the address, if the address where .B and .H cannot be accessed is assigned, a reserved function exception (RFE) rather than a reserved instruction exception (RIE) occurs. This concept is such that if an error is determined only by the instruction bit pattern (including the assignment of size), a reserved instruction exception (RIE) occurs; if occurrence of an error depends on the address and operand value, a reserved function exception (RFE) occurs.
If the address of the control space is off-chip (such as the address of a co-processor) and the area cannot be accessed due to a restriction in the implementation, a reserved function exception (RFE) occurs. In LDC and STC, even if the address of the control space becomes an address of the co-processor, a co-processor instruction exception (CIE) does not occur. A co-processor instruction exception (CIE) occurs only when an instruction for the co-processor is executed.
In LDC, if an illegal value is written to the reserved bits represented with `-` and `+` of the control register or if a reserved value is written to some field, a reserved function exception (RFE) occurs. If a reserved value such as `001` is written to the SMRNG field of PSW, a reserved function exception (RFE) also occurs. On the other hand, if an illegal value is written to the reserved bits represented with `=` and `#`, it is ignored. However, it is necessary to instruct the user that `=` should be filled with zeroes. In addition, if any value is written to the bit represented with `*`, it is ignored. It is assured that this bit is not used even if the specification is expanded, unlike `=` and `#`. Thus, it is not necessary to mask this bit to `0` before executing the LDC instruction.
If CTXBB is changed by LDC, the content of CTXBB in the memory does not match the context in the chip. However, it should be arranged by the programmer. From a hardware point of view, only CTXBB is changed. If CTXBB is changed and the context is loaded, it is possible to do using LDCTX. When UATB and SATB are changed with the LDC instruction, TLB and the logical cache (process equivalent to PSTLB/AT) are automatically purged. In a processor which provides LSID, the logical space assigned by the LSID control register is purged. In this case, the LDC instruction does not provide the /SS and /AS options used in the PSTLB instruction due to the following reasons.
The TLB purge operation using the PTLB and PSTLB instructions, is not like LDC * and UATB, so that cache and TLB in another logical space can be purged, the parameters equivalent to the LSID function are assigned by a different register (R1). In this case, the LSID control register is not used. Thus, it is necessary to switch the /SS and /AS options to distinguish whether the parameter is used or not. To prevent data inconsistency, in LDC * and UATB, the cache and TLB are purged from the space currently being used. Thus, the control register of LSID works as it is expected. In other words, like a normal memory access operation, the logical space which is assigned by the LSID control register is purged. In a processor which does not accommodate LSID, the purge operation is performed in all the logical spaces (actually, one logical space).
PROGRAM EXCEPTION: Reserved instruction exceptions
When RR=`11`
When WW is not `10`
When EaR is @-SP
When EaW% is Rn, #imm.sub.-- data, @SP+ or @-SP.
Privileged instruction violation exception
When the instruction is executed from a ring other than ring 0
Reserved function exceptions
When a control register which has not been accommodated is accessed
When a reserved value is written to a specific field of the control register (except=, #, and *)
When the word alignment of the address of EaW% is not obtained.
MNEMONIC: STC src,dest.
OPERATION: store control space or register (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 243.
STATUS FLAGS AFFECTED: shown in FIG. 244.
DESCRIPTION: Transfer the src value in the control space to dest. Since the size of src and dest is specified by a common field, data is not transferred between different size operands.
This instruction is a privileged instruction. If this instruction is executed from a ring other than ring 0, a privileged instruction violation exception (PIVE) occurs.
For src/EaR%, the register direct mode Rn, immediate #imm.sub.-- data and @SP+cannot be specified.
The data processor of the present invention does not support the .B and .H access functions for the control space. It only implements the control register in the CPU.
In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions, which reference the special space, if a memory indirect reference occurs due to the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring RNG stack rather than PRNG is referenced. The meaningful special space address is the only final effective address which is obtained.
If the control space operand size .B or .H is assigned in a processor which does not provide the .B and .H access functions for the control space, a reserved instruction exception (RIE) occurs.
If a control register which is not provided or an address where a control register is not provided is assigned by STC, a reserved function exception (RFE) occurs. It is also applied to the area specified in <<LV>>.
In a processor which has some restrictions for the address in the control space, if the restriction is violated, a reserved function exception (RFE) occurs. For example, there is a restriction as to when the address of the control register should be multiples of 4. In a processor which accommodates a high speed memory for saving a context, there is a case where only the address for the control register is restricted to multiples of 4 and the address for the high speed memory is not restricted. Even in this case, if the restriction is violated, a reserved function exception (RFE) occurs. In a processor which can assign .B and .H for part of the address, if the address where .B and .H cannot be accessed is assigned, a reserved function exception (RFE) rather than a reserved instruction exception (RIE) occurs. This concept is such that if an error is determined only by the instruction bit pattern (including the assignment of size), a reserved instruction exception (RIE) occurs; if occurrence of an error depends on the address and operand value, a reserved function exception (RFE) occurs.
If the address of the control space is off-chip (such as the address of a co-processor) and the area cannot be accessed due to a restriction in the implementation, a reserved function exception (RFE) occurs. In LDC and STC, even if the address of the control space becomes an address of the coprocessor, a co-processor instruction exception (CIE) does not occur. A co-processor instruction exception occurs only when an instruction intended for the co-processor is executed.
In STC, if the bit of the register represented with `-` is read, `0` is read; if the bit represented with `+` is read, `1` is read. If the bit represented with `=`, `#` or `*` is read, the value being read is unknown. It depends on the implementation. To allow for future expansion, it is necessary that the user not program using bit values represented with `=`, `#` and `*`.
PROGRAM EXCEPTION: Reserved instruction exceptions
When WW is not `10`
When EaR% is Rn, #imm.sub.-- data, @SP+ or @-SP
When EaW is #imm.sub.-- data or @SP+
Privileged instruction violation exception
When the instruction is executed from a ring other than the ring 0
Reserved function exceptions
When a control register which has not been accommodated is accessed
When the word alignment of the address of EaR% is not obtained.
MNEMONIC: LDPSB src.
OPERATION: load PSB,
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 245.
STATUS FLAGS AFFECTED: shown in FIG. 246.
DESCRIPTION: Transfer the content of src to PSB.
Except when the save operation and restore operation are performed (regardless of the meaning of each bit of PSB and PSM in a user's call routine), in PSM and PSB, it is often necessary to rewrite only part of the fields. Therefore, the src operand of the LDPSB and LDPSM instructions is composed of 16 bits (EaRh) where the high order byte represents the masking (the bits to be changed are set to 0) and the low order byte represents the data being changed.
______________________________________[LDPSB Operation]______________________________________Assumingsrc = [S0.S1 . . . S7.S8.S9 . . . S15]the following result is obtained.([S0.S1 . . . S7].and.PSB).or.(.sup..about. [S0.S1 . . . S7].and.[S8.S9 .. . S15])==> PSBwhere '.sup..about. represents a negated bit.For example, the instruction which sets X.sub.-- flag at the posi-tion 2.sup..about. 4 is as follows.LSPSB #H'ef10______________________________________
In the high order byte, any bit equal to 0 is changed and any bit equal to 1 is not changed. When all eight bits are changed, set all of the high order byte to 0 and simply write byte data. As described earlier, all the eight bits should be changed to save and restore PSB and PSM.
In LSPSB and LDPSM, if the value of a field not used in PSB and PSM is set to 1, a reserved function exception (RFE) occurs.
PROGRAM EXCEPTION: Reserved instruction exception
When EaRh is @-SP,
MNEMONIC: LDPSM src
OPERATION: load PSM
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 247.
STATUS FLAGS AFFECTED: shown in FIG. 248.
DESCRIPTION: Transfer the content of src to PSM.
Except when the save operation and restore operation are performed (regardless of the meaning of each bit of PSB and PSM in a user's call routine), in PSM and PSB, it is often necessary to rewrite only part of fields. Therefore, the src operand of the LDPSB and LDPSM instructions is composed of 16 bits (EaRh) where the high order byte represents the masking (the bits to be changed are set to 0) and the low order byte represents the data being changed.
LDPSM Operation
Assuming
src=[S0.S1 . . . S7. S8.S9 . . . S15]
the following result is obtained.
([S0.S1 . . . S7].and.PSM).or.( [S0.S1 . . . S7].and.[S8.S9 . . . S15]).fwdarw.PSM
where ` ` represents a negated bit.
In LDPSB and LDPSM, if the value of a field which is not used in PSB and PSM is set to 1, a reserved function exception (RFE) occurs.
PROGRAM EXCEPTION: Reserved instruction exception
When EaRh is @-SP.
MNEMONIC: STPSB dest.
OPERATION: store PSB.
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 249.
STATUS FLAGS AFFECTED: shown in FIG. 250.
DESCRIPTION: Transfer PSB to dest. The high order eight bits should always be 0.
The dest is structured with 16 bits rather than 8 bits and the high order eight bits always return 0 so that PSM and PSB are returned directly in LSPSM and LDPSB.
PROGRAM EXCEPTION: Reserved instruction exception
When EaWh is #imm.sub.-- data or @SP+
MNEMONIC: STPSM dest.
OPERATION: store PSM.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 251.
STATUS FLAGS AFFECTED: shown in FIG. 252.
DESCRIPTION: Transfer PSM to dest. The high order eight bits should always be 0.
The dest is structured with 16 bits rather than 8 bits and the high order eight bits always return 0 so that PSM and PSB are returned directly in LSPSM and LDPSB.
PROGRAM EXCEPTION: Reserved instruction exception
When EaWh is #imm.sub.-- data or @SP+.
MNEMONIC: LDP src,dest.
OPERATION: load physical space (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 253.
STATUS FLAGS AFFECTED: shown in FIG. 254.
DESCRIPTION: Transfer the src value to dest in the control space. If the size of src is smaller than that of dest, the former is sign-extended.
Since the data processor of the present invention does not provide the address translation feature, the logical space address is always the same as the physical space address. Thus, the function of the physical space operation instruction is included in the MOV instruction. The data processor of the present invention distinguishes between the logical space and physical space: Data Processor of the present invention supports the physical space operation instruction.
This instruction is a privileged instruction.
For dest/EaW %, the register direct mode Rn and @-SP cannot be specified.
In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions which reference the special space, if a memory indirect reference occurs by the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring (RNG) stack rather than PRNG is referenced. The meaningful special space address is the only effective address which is finally obtained.
PROGRAM EXCEPTION: Reserved instruction exceptions
When SS=`11`
When WW=`11`
When EaR is @-SP
When EaW % is Rn, #imm.sub.-- data, @SP+ or @-SP
Privileged instruction violation exception
When this instruction is executed from a ring other than ring 0.
MNEMONIC: STP src,dest.
OPERATION: store physical space (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 255.
STATUS FLAGS AFFECTED: shown in FIG. 256.
DESCRIPTION: Transfer the src value to dest in the control space. Since the size of src and dest is commonly assigned in STP, data is not transferred between different size operands.
Since the data processor of the present invention does not provide the address translation feature, the logical space address is always the same as the physical space address. Thus, the function of the physical space operation instruction is included in the MOV instruction. The data processor of the present invention distinguishes between the logical space and physical space; the data processor of the present invention supports the physical space operation instruction.
This instruction is a privileged instruction.
For src/EaR %, the register direct mode Rn, immediate #imm.sub.-- data, and @SP+ cannot be specified.
In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions which reference the special space, if a memory indirect reference occurs due to the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring (RNG) stack rather than PRNG is referenced. The meaningful special space address is the only effective address which is finally obtained.
PROGRAM EXCEPTION: Reserved instruction exceptions
When WW=`11`
When EaR % is Rn, #imm.sub.-- data, @+SP or @-SP
When EaW is #imm.sub.-- data or @SP+.
Privileged instruction violation exception
When this instruction is executed from a ring other than ring 0.
12-15. OS-Support Instructions
MNEMONIC: JRNG vector (the data processor of the present invention does not support it.)
OPERATION: jump to new ring.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 257.
STATUS FLAGS AFFECTED: shown in FIG. 258.
DESCRIPTION: This instruction performs the transition and jump operations between rings (an inter-ring call). This instruction is used to call a program in a more inner level than the current ring (including a system call).
To protect the inner ring from the outer ring, the destination to be jumped to using JRNG is limited to the specified address. The table containing this address is named the ring transition tale JRNGVT (JRNG vector table). In the JRNG instruction, the vector operand is an index for JRNGVT. One entry for JRNGVT is named JRNGVTE.
JRNGVT is a table which has 65535 entries for vector. The logical address of the base is represented by JRNGVB. The size of vector is composed of 16 bits. JRNGVB is one of the control registers and is configured as shown in FIG. 259.
JRNGVB represents the logical start address of the vector table (JRNGVT) of the JRNG instruction. The lower three bits of the base address of the table are fixed at 0 for alignment.
If E is 0, the execution of JRNG is inhibited. If JRNG is executed, a ring transition violation exception (RTVE) occurs. Since JRNGVB is meaningless, OS can freely employ such a field.
The bits represented with `=` should be filled with `0`. However, even if these bits are not filled with `0`, it is ignored. JRNGVTE is composed of 8 bytes in the configuration: diagrammed in FIG. 260. It works as a gate for entering the inner ring.
The AR function indicates from which ring a call can be issued between rings of the entry represented with the vector. If the current ring is located at a more outer position than the ring represented with AR, it is as sumed that an inter-ring call (system call) is not permitted, resulting in a ring transition violation exception (RTVE). AR uses the field relating to the position of PRNG of PSW from the stand point that each entry of JRNGVT and EITVT, is basically a subset of PSW+PC.
The VX function is enabled if the 32/64 bit mode differs between OS and the user program.
In the fields not used in JRNGVTE (represented with `=`) the `VX` bit should be filled with `0`. However, even if they are filled with `1`, they are ignored. It is not a reserved function exception (RFE).
The VPC field of JRNGVTE should be an even number. In other words, LSB of the VPC field should be `0`. When JRNG is executed, an odd address jump exception (OAJE) occurs if it is violated. When MSB=0 in JRNGVB, the address is changed using UATB; when MSB=1, the address is changed using SATB. JRNGVB uses a logical address for the following reasons.
(1) The table can be provided every context.
(2) A virtual table can be used. In other words, the table can be free from paging.
(3) The difference between JRNGVB and TRAPA, is that EIT can be clarified.
By considering JRNGVB as a logical address, a virtual table can be created. The data processor of the present invention uses mostly 16 bits of vector (65536 entries, 512 KB table). It does not provide a register which assigns the upper limit of the vector. However, since JRNGVB uses a logical address, it can be used together with the MMU function, so that it is not always necessary to use the physical memory for the table. If STE and PTE of JRNGVT are set to areas not used, it is not necessary to prepare all the table for 16 bits=65536 entries with the physical memory.
JRNGVTE is read in the same manner as the general memory access operation with a logical address. Therefore, JRNGVTE is read by the ring access permission of the program which executes JRNG. If there is permission whereby JRNGVTE of the assigned vector can be read from the ring which executes JRNG, a ring protection violation error, ATRE, occurs. On the other hand, if JRNGVTE of the vector being assigned is an area not used, a not-used area reference error of an address translation exception (ATRE) occurs. Although the user would prefer that it be treated in the same manner as a ring transition violation exception (RTVE), the specification above is used due to restrictions in the implementation. When JRNCVTE is read, a page out exception (POE) or bus access exception (BAE) may occur.
With the JRNG function, 512 KB of the logical space is always required for JRNGVT. To prevent an illegal call between rings, OS should set STE and PTE in the JRNGVT area before executing the user program. When the call function between rings is not used, the entire ring call function can be disabled so that such a process is not required. To assign this function, the E bit at the LSB of JRNGVB is used. If the E bit of JRNGVB is 0, the ring call function cannot be used. When JRNG is executed, a ring transition violation exception (RTVE) unconditionally occurs.
To satisfy JRNG, the following conditions should be met.
E of JRNGVB=1
If E=0, it means that JRNGVT is not provided, so that a ring transition violation exception (RTVE) occurs.
JRNGVTE for the vector being assigned can be read from a ring before JRNG is executed.
If a page out exception (POE) occurs, after a page-in operation, the instruction is reexecuted.
If a not-used area reference error of an address translation exception (ATRE) occurs, it means that the related table is not provided, so that an error is returned to the user program.
If there is no read access permission, it means that due to data protection, the execution of JRNG is inhibited, so that an error is returned to the user program. It has the same meaning as the VA field, but it is assigned every 512 vectors.
If the current ring.gtoreq.VR
Control does not enter an outer ring. If it is violated, a ring transition exception (RTVE) occurs.
If the current ring.ltoreq.AR
Whether the ring can be accepted or not is checked. If it is violated, a ring transition violation exception (RTVE) occurs. AR represents the AR field of JRNGVTE.
JRNG Operation
If JRNGVB E bit=0 then ring transition violation exception (RTVE) occurs.
VR, AR and VPC are fetched from the logical address mem[vector.times.8+JRNGVB].
If old RNG>AR .or. old RNG<VR then ring transition violation exception (RTVE) occurs.
______________________________________Old SP ==> TOS .dwnarw. (Use a new stack represented with VR)Old PC ==> TOS .dwnarw.______________________________________
As old PC, the start address following the JRNG instruction is pushed to the stack like the JSR instruction.
Old PSW .and. B'01110000.sub.-- 00000000.sub.-- 11111111.sub.-- 11111111.fwdarw.TOS.dwnarw.
In the old PSW, the fields which are meaningful in RRNG, namely, only the RNG, XA, and PSH fields are pushed directly to the stack and other fields such as SM, AT, and IMASK are masked to 0 and then pushed to the stack, so that the program in an outer ring cannot read information which should be known only to OS (such as IMASK).
Old RNG.fwdarw.New PRNG
VR.fwdarw.New RNG
VPC.fwdarw.New PC.
The stack frame formed by the JRNG instruction is as shown in FIG. 261.
SP of the old ring is placed at the stack of the new ring to access the stack pointer SP and stack of the old ring from the new ring. Although the stack can be accessed as the control register every ring, it is necessary to use a privileged instruction (STC). Thus, to observe a parameter placed at the ring 3 stack from ring 1, this function is required.
In JRNG, only part of PSS and PRNG of PSM rather than PSB are updated. In addition, unlike EIT, the inter-ring call function provides only one stack format, so FORMAT (EITINF) is not placed at the stack.
In JRNG:E, vector is zero-extended.
If AT=00 (no address translation), JRNGVB represents a physical address.
After JRNG is executed, if an instruction reexecution-type EIT, such as a ring transition violation exception (RTVE) occurs, the stack frame for an inter-ring call that JRNG originally provides is not formed. Only the stack frame for the EIT process is formed. For example, if JRNG is executed when SMRNG=000 to jump to RNG=00 and an EIT occurs, the stack frame as shown in FIG. 262, not FIG. 263 is formed.
The specification as shown in FIG. 262 is used so that the instruction can be reexecuted after an EIT occurs. In other words, before entering the EIT process handler, the status of the processor is restored to the status before the instruction is executed. If the stack used by EIT differs from that of JRNG, only the stack used by EIT is changed; the stack SP used by JRNG is not changed.
In JRNG, it is possible to jump to the same ring as the current ring. In this case, the stack is not switched by JRNG. The value to be pushed to the stack as SP is the value of SP before the instruction is executed. It works in the same manner as if PUSH SP is executed at the beginning of the JRNG instruction, as shown in FIG. 264.
When jumping to the same ring as the current ring using JRNG, if the vector operand of JRNG:G is in the memory and it overlaps with the stack frame area which is formed by the execution of the JRNG instruction, it is very difficult to reexecute the instruction. Therefore, in the JRNG:G instruction, all the address modes which require access to the memory, everything except the register direct Rn and immediate modes are inhibited. If a dynamic value is set as the operand of the instruction, it is necessary to prepare one temporary register and to use the register direct Rn mode.
The inter-ring call function is not included in EIT.
Both TRAPA and JRNG serve to evoke an OS system call. Generally, the OS which has many system calls and uses multiple rings, like BTRON, often employs JRNG, while that which does not have many system calls and uses not more than two rings, like ITRON, employs TRAPA.
In TRAPA, control does not enter ring 1 and ring 2. Therefore, if the outer core is placed at ring 1 in BTRON, it is necessary to use JRNG.
If the user extends OS for BTRON, it may be necessary to use an outgoing ring call. However, the outgoing ring call is not supported in the instruction set level.
PROGRAM EXCEPTION: Reserved instruction exceptions
When P=`1`
When EaRh!M is not Rn or #imm.sub.-- data
<<L1>> function exception
When a bit pattern of JRNG is decoded
MNEMONIC: RRNG (the data processor of the present invention does not support it.)
OPERATION: return from previous ring
OPTIONS: None
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 265.
STATUS FLAGS AFFECTED: shown in FIG. 266.
DESCRIPTION:
Return for an inter-ring call.
______________________________________[RRNG Operation]______________________________________.uparw. TOS ==> temp1.uparw. TOS ==> temp2.uparw. TOS ==> SP of temp1<RNG>if RNG > temp1<RNG> then ring transition violation excep-tion(RTVE) occurstemp1 <RNG> represents the portion equivalentto the RNG field when considering temp1 as PSW.If this check is not conducted, with the RRNGinstruction, control illegally enters an innerring.if SM = 0 .and. temp1 <RNG> .noteq. 00 then reserved functionexception (RFE) occurs.temp1<PSH> ==> PSH (Including PRNG)temp1<RNG> ==> RNGtemp1<XA> ==> XAtemp2 ==> PC______________________________________
When the RRNG instruction is executed, since an EIT may occur in DCE, it is necessary to check for it. For detail, see Appendix 9.
The old PRNG stack pointer is popped from the RNG stack and it is set as the PRNG stack pointer so that OS may update the user stack pointer because a parameter of the system call placed in the PRNG stack is popped.
With PRMG, if control tries to enter an inner ring, a ring transition violation exception (RTVE) occurs. If PC popped from the stack is an odd number, an odd address jump exception (OAJE) occurs.
If SM of the current PSW is 0 and RNG in the stack which is popped with the RRNG instruction (temp1 <RNG> in the operation above) is not 0, a combination of SM and RNG in PSW becomes a reserved pattern. A reserved function exception (RFE) occurs.
In the RRNG instruction, if a ring transition violation exception (RTVE) or a reserved function exception (RFE) occurs, each of which is an instruction reexecution type exception, the stack frame for inter-ring call remains. Therefore, if the same stack is used for EIT and inter-ring call, the EIT stack frame is added to the inter-ring call stack frame. If the stack for EIT differs from that for the inter-ring call, the contents of the stack and stack pointer for the inter-ring call are not changed, similar to a DCE caused by RRNG. In DCE, after the stack frame for the previous inter-ring is called, a new stack frame for DCE is formed.
<<Example of a stack when an RFE occurs, if EIT uses the same stack>>: diagrammed in FIG. 267.
On the other hand, OAJE will be an instruction completion type EIT. In this case, like a DCE, after the stack frame for an inter-ring call is cleared, the stack frame for an EIT is formed. If an OAJE occurs with the RRNG instruction, the stack works as follows.
<<Example of stack when an OAJE occurs, if the same stack is used for an EIT>>.
(Before executing RRNG): Shown in FIG. 268.
(After RRNG is executed and an OAJE occurs): shown in FIG. 269.
The fields other than PSH, RNG, and XA of PSW being popped from the stack with the RRNG instruction (temp1 above) are ignored. Between the JRNG instruction and the RRNG instruction in the program, except for the fields PSH, RNG and XA, the stack should not be rewritten.
When control comes back to the same ring with the RRNG instruction (32 bits), the final value of SP becomes as follows.
mem[initSP+8].fwdarw.SP (`+8` is for PC and PSW).
The above instruction works as POP SP after the PC and PSW processes are executed.
The E bit of JRNGVB is evaluated irrespective of the operation of the RRNG instruction. Even if the E bit is 0, the RRNG instruction is executed.
PROGRAM EXCEPTION: Reserved instruction exceptions
When P=`1`
<<L1>> function exception
When a bit pattern for RRNG is decoded.
MNEMONIC: RAPA vector.
OPERATION:
TRAP always.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 270.
STATUS FLAGS AFFECTED: shown in FIG. 271.
DESCRIPTION: Generate an internal interrupt (trap).
This instruction is used to evoke OS from a user process. Since an EIT occurs with the TRAPA instruction, control always enters ring 0.
In TRAP and TRAPA, like other EIT processes, part of PSS and PRNG of PSM are updated.
The fields, except PRNG of PSM (including PSB) are not updated.
PROGRAM EXCEPTION: Reserved instruction exceptions
When P=`1`
Unconditional trap instruction.
MNEMONIC: TRAP.
OPERATION: TRAP conditionally.
OPTIONS:
/various conditional specifications (cccc).
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 272.
STATUS FLAGS AFFECTED: shown in FIG. 273.
DESCRIPTION: If the conditions being specified are met, an internal interrupt (trap) occurs.
Since an EIT occurs with the TRAP instruction, control always enters ring 0. The conditional specifications are the same as those of the Bcc instruction.
In TRAP and TRAPA, like other EIT processes, only part of PSS and PRNG of PSM are updated.
The fields other than PRNG of PSM (including PSB) are not updated.
If a condition which has not been defined in TRAP is specified, a reserved instruction exception (RIE) occurs.
PROGRAM EXCEPTION: Reserved instruction exceptions
When P=`1`
When cccc=`1110,1111`
Conditional trap instruction.
MNEMONIC: REIT.
OPERATION: return from EIT (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 274.
STATUS FLAGS AFFECTED: shown in FIG. 275.
DESCRIPTION: In the data processor of the present invention, exception, external interrupt and internal interrupt are generally named EIT (Exception, Interrupt, Trap). The REIT instruction is used to return from EIT, namely, return from OS and from an interrupt process.
This instruction is a privileged instruction.
REIT Operation
.uparw.TOS.fwdarw.PSW;
.uparw.TOS.fwdarw.FORMAT/VECTOR;
.uparw.TOS.fwdarw.PC;
Depending on the EIT type, additional information may be placed on the stack. It is popped to restore the state before an EIT occurs. Whether there is additional information or not is determined by FORMAT/VECTOR (EITINF). When the REIT instruction is executed, an EIT of DI and DCE may occur and it should be checked. For details, see Appendix 9.
If a stack format which has not been supported as FORMAT/VECTOR, a reserved stack format exception (RSFE) occurs. A stack frame whose format is illegal remains because there is no way to determine whether there is additional information or not. It is added to the stack frame and the stack frame for RSFE is formed, unlike DI and DCE, since it is started in REIT. In DI an DCE, the stack frame of the previous EIT is cleared and the new stack frame for DI and DCE is formed. <<RSFE process--If the same stack is used for RSFE>>: diagrammed in FIG. 276.
In the REIT instruction, if PC which is popped from the stack is an odd number, an odd address jump exception (OAJE) occurs. On the other hand, if the reserved bit (`-`) in PSW (including the XA bit) is changed to `1` or if the reserve value is rewritten as SMRNG, a reserved function exception (RFE) occurs.
Whether the SM bit is changed or not is not checked. As long as the REIT instruction is used to exit from EIT, SM is not changed from 1 to 0. However, it is considered in operation and in the REIT instruction SM is not checked to see whether it changed from 1 to 0.
PROGRAM EXCEPTION: Reserved instruction exception
When P=`1`
Privileged instruction violation exception
When the instruction is executed from a ring other than ring 0
Reserved stack format exception
If a stack format which has not been supported is specified when control exits from an EIT
Odd address jump exception
When the PC being popped from the stack is an odd number
Reserved functional exception
The value of reserved is written to PSW by another PSW which is popped from the stack.
MNEMONIC: WAIT imask.
OPERATION: set IMASK and wait (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 277.
STATUS FLAGS AFFECTED: shown in FIG. 278.
DESCRIPTION: Set the IMASK field of PSW, stop executing the program and restore the execution by an external interrupt or reset.
This instruction is a privileged instruction.
Imask is interpreted as an unsigned number. If imask .gtoreq.16, a reserved function exception (RFE) occurs.
If an external interrupt occurs, there is information which cannot be settled until an interrupt occurs (stack selection of SPI/SPO and vector No.). Thus, the information is saved to the stack after an external interrupt occurs in the WAIT instruction. ##STR27##
PROGRAM EXCEPTION: Reserved instruction exceptions
When -=`1`
Privileged instruction violation exception
When the instruction is executed from ring 0.
MNEMONIC: LDCTX ctxaddr.
OPERATION: load context from CTXB (privileged).
OPTIONS:
/LS Load CTXB from the logical space.
/CS Load CTXB from the control space <<L2>>. (Data processor the of the present invention does not support this option.)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 279.
STATUS FLAGS AFFECTED: shown in FIG. 280.
DESCRIPTION: Load the effective address represented with ctxaddr to the CTXBB register and load the contents of the context block (CTXB) of a task and process to processor registers. Although the register where the effective address is loaded depends on whether MMU is used or not and on the content of CTXBFM, they include SP0 to SP3, UATB, and CSW. For details of the registers where the effective address is transferred, see Appendix 8.
When the /LS option is specified, ctxaddr represents an address in the logical space. In this case, CTXB is placed in the logical space. On the other hand, if the /CS option is specified, ctxaddr represents an address in the control space. These options will be used when a context saving high speed memory is accommodated in the chip. Currently, it is specified in <<L2>>. These options are provided to bring flexibility to a space where CTXB is placed to perform the highest context switching in accordance with the implementation of the chip and chip bus.
The data processor of the present invention does not support the /CS option.
In a processor which accommodates a standard the data processor of the present invention MMU, UATB is changed with the LDCTX instruction. As UATB is changed in a processor which does not accommodate LSID, TLB and cache (equivalent to PSTLB/AT) are automatically purged. In the LDCTX instruction, since the logical space is switched, ctxaddr should point at SR to allow LDCTX/LS to properly work. The result of the operation is not assured with LDCTX/LS if ctxaddr points at UR.
(SR: shared region, UR: unshared region).
In the LDCTX and STCTX instructions of the data processor of the present invention, data is not transferred to the general purpose registers R0 to R14 due for the following reasons.
For the general purpose registers, data can be transferred with the LDM and STM instructions. These instructions allow a register to be specified. In the real context switching process, working registers are required beside the registers where data is changed. Therefore, it may be necessary not to transfer data to some of the registers. Consequently, it is preferable to use more general purpose instructions such as LDM and STM.
Since it is currently technically difficult to accommodate a context saving memory in the chip, an external memory should be used to save a context. Even if data is transferred to the general purpose registers with LDCTX, its speed is nearly the same as that using a different instruction (LDM).
When all CTXB is accommodated in the chip to speed up the process, it is necessary to expand the specification by using the reserved option of LDCTX and the CTXBFM function.
In the LDCTX and STCTX instructions, data is not transferred to PC and PSW for the following reasons.
Generally, PC and PSW of a user program, rather than OS, should be switched by the context switch. However, PC and PSW of a user program are saved in the stack when evoking OS. Therefore, when using the stack of SP0 to save PC and PSW, PC and PSW are also indirectly switched by switching SP0 with the context switch. By using this feature and realizing PC and PSW are placed in the portion (stack) indirectly referenced from SP0, it is not necessary to perform the PC and PSW operations (copy between the stack and CTXB) with the context switch instruction.
If the context is switched in the last portion of the process handler of an external interrupt using SPI, it is necessary to transfer PC and PSW between the SPI stack and CTXB. However, when the context switching is deleted during an external interrupt and the context switching is performed with DCE and DI when exiting from the external interrupt, SP0 specified with DCE and DI allows the data structure above to naturally be formed.
This instruction is a privileged instruction. When `1` is loaded from CTXB for the reserved bit (represented with `-`) of PSW being set by LDCTX, a reserved function exception (RFE) occurs. When `1` is loaded from CTXB for the reserved bit (represented with `=`) , it is ignored acting as if like the control register is set with LDC.
In the chip specified in <<L1>>, even if AT=00 (no address translation), UATB is transferred, because it is assumed that the address translation is temporarily suspended in OS. However, if AT=00, even if /LS is specified, ctxaddr is treated as a physical address. To specify that UATB not be transferred with LDCTX, it is necessary to use CTXBFM.
In the current specification of LDCTX, data is not transferred to the general purpose registers. However, if the specification is expanded or if a context saving memory is accommodated on the chip in future, the contents of the multiple general purpose registers will be loaded with the LDCTX instruction. If the additional mode is allowed in ctxaddt/EaA!A, like LDM, it is difficult to reexecute the instruction which has been suspended. Therefore, in ctxaddr/EaA!A of LDCTX, the additional mode is inhibited. If the additional mode function is required, with the following instructions (including MOVA) the same effect can be obtained.
MOVA @(@(@(. . . ))):A,R0
LDCTX @RO
PROGRAM EXCEPTION: Reserved instruction exceptions
When xx=`01` to `11`
When EaA!A is Rn, #imm.sub.-- data, @SP+, @-SP, or additional mode
Privileged instruction violation exception
When the instruction is executed from a ring other than ring 0.
Reserved function exception
When the reserved value is written to PSW
MNEMONIC: STCTX.
OPERATION: store context to CTXB.
OPTIONS:
/LS Store CTXB in the logical space.
/CS Store CTXB in the control space <<L2>>. (the data processor of the present invention does not support this option.)
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 281.
STATUS FLAGS AFFECTED: shown in FIG. 282.
DESCRIPTION: Save the contents of the current context in the processor to the area (CTXB) represented by the CTXBB register. The registers where the contents are saved depend on whether MMU is used or not and on the contents of CTXBFM. They include SP0 to SP3, UATB and CSW. For details on the registers where data is transferred with STCTX, see Appendix 8.
Like LDCTX, the general purpose registers, PC and PSW are no transferred in STCTX.
The space that CTXBB points at is specified by the /LS and /CS options. However, the /CS option only works when the content saving memory is located on the chip. It is specified in <<L2>>.
The data processor of the present invention does not support the /CS option.
In a processor which accommodates a standard the data processor of the present invention MMU, UATB is saved with the STCTX instruction. CTXBB should point at SR to allow STCTX/LS to properly work. I is not checked to determine whether CTXBB points at SR or UR.
This instruction is a privileged instruction.
For the bits represented with `-` and `+` in the reserved bits of the control register saved to CTXB with STCTX, `0` and `1` are set to CTXB. For the bits represented with `=` `#` and `*`, a value being set to CTXB is meaningless and depends on the implementation like the STC instruction.
In a chip specified with <<L1>>, UATB is transferred because the address translation is temporarily suspended only in OS even if AT=00 (no address translation). However, if AT=00, CTXBB is treated as a physical address even if /LS is specified. To specify that UATB not be transferred with STCTX, it is necessary to use CTXBFM.
PROGRAM EXCEPTION: Reserved instruction exceptions
When xx=not `00`
When P=`1`
Privileged instruction violation exception
When the instruction is executed from a ring other than ring 0.
12-16. MMU Support Instructions
MNEMONIC: ACS chkaddr.
OPERATION: test access rights.
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 283.
STATUS FLAGS AFFECTED: shown in FIG. 284.
DESCRIPTION: Check for ATE of the page containing the address specified by chkaddr and check that chkaddr can be accessed by PRNG. The flags are set depending on the result being checked.
______________________________________(ATE: Address Translation Table Entry)______________________________________Read enable ==> M.sub.-- flagWrite enable ==> Z.sub.-- flagExecute enable ==> L.sub.-- flag______________________________________
This instruction is not a privileged instruction, so it is available to the user. For example, it is possible to check the access right (permission) for PRNG=ring3 from ring 3. Therefore, information managed by OS such as page-out is not displayed if possible. If a page-out occurs on the section table and page table which are necessary to execute ACS, like regular instructions, the instruction is reexecuted as a page out exception (POE). In addition, while referencing the ATE with the ACS instruction, an address translation exception (ATRE) or bus access exception (BAE) may occur.
The size of the operand to be tested with the ACS instruction is a byte. In other words, it is the one byte of the address represented with EaA which can be accessed from PRNG. When checking area which is over multiple bytes, it should be handled with software.
In ACS, when checking the access permission for a process request from the preceding ring, PRNG can be used. However, if a process is called from ring3 to ring2 and ring1 is evoked from ring2, it may be necessary to check the access permission from ring3 at ring1. When PRNG is at ring 2, the ACS instruction cannot be used. After PRNG is rewritten for ring3, ACS should be executed.
To fulfill such a requirement, PRNG is placed at a PSM the user can operate. PRNG is a field which is used as a parameter for the ACS instruction. However, the protection information of ring0 is viewed from ring 3. To prevent the protection information from being viewed, if PRNG<RNG, set the flags as follows.
L.sub.-- flag=M.sub.-- flag=Z.sub.-- flag=0.
In ACS, if chkaddr is in an area not used (out of the page range), the instruction is normally terminated as no access permission with M.sub.-- flag=0, Z.sub.-- flag=0 and L.sub.-- flag=0 as Read disabled, Write disabled and Execute disabled. An EIT does not occur.
Since the ring protection is not checked if AT=00 (no address translation), it is assumed that there are access permissions for all addresses. Actually, when a bus access exception (BAE) occurs, there are areas which cannot be accessed. However, they are not checked. Since the level of the access error caused by the system bus differs from that caused by the memory protection, only the latter access error is checked in ACS. Therefore, if AT=00, after chkaddr is obtained, no exception occurs and the instruction is terminated as L.sub.-- flag=M.sub.-- flag=Z.sub.-- flag=1 (presence of access permission).
The ACS instruction can be used when the ring protection level check should be completely emulated in an instruction emulation program. Since the emulation program is normally placed at ring 0, it is normally executed in a different ring from the instruction being emulated. In other words, for the ring protection level, the environment of the program to be emulated differs from that of the emulation program. Therefore, the ring protection check can be correctly emulated by checking whether the operand can be accessed from the same ring (PRNG) as the instruction being emulated before accessing the operand of an instruction to be emulated.
In calculating the effective address of chkaddr of ACS, if the stack pointer SP is referenced, the stack of the current ring RNG rather than PRNG is referenced.
PROGRAM EXCEPTION: Reserved instruction exception
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP.
MNEMONIC: MOVPA srcaddr, dest (the data processor of the present invention does not support this instruction.)
OPERATION: move physical address (privileged).
OPTIONS: None.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 285.
STATUS FLAGS AFFECTED: shown in FIG. 286.
DESCRIPTION: Calculate the effective address (logical address) of the operand being specified by srcaddr, convert it into the physical address, and then transfer it to dest. The address translation method of the effective address is such that the R1 register rather than the UATB register is used for the base address of the address translation table unlike the regular instructions. It allows a space, except the logical space, where the current program runs to be operated from OS.
This instruction uses fixed number registers to specify spaces like high level instructions. Because this instruction is not directly used in a high level language, more symmetry for the instruction is not required, and there is a restriction for bit assignment.
In the MOVPA instruction, if a page out exception or address translation exception occurs after srcaddr is obtained until it is translated into the physical address, such an error affects the flags, but an EIT does not occur. The error occurs if 1) a page-out occurs on the section table and page table which are used for address translation of srcaddr, 2) a page-out occurs on the last page (not the page table), or 3) there is an error in the entry (ATE) format of the translation table (reserved ATE error). Dest is not changed, V.sub.-- flag is set, and the instruction is terminated. An occurrence of a page fault is indicated by F.sub.-- flag. If the instruction is terminated without an error and page fault, V.sub.-- flag is cleared. Since this instruction is basically considered to be an address operation, other flags are not changed.
The flag changes of the MOVPA instruction are summarized as FIG. 287.
If V.sub.-- flag=0 and F.sub.-- flag=1 occur in STATE, a page out in the next level is included in the page out where V.sub.-- flag=1 and F.sub.-- flag=1 in MOVPA. Thus, the flag change pattern of STATE differs from that of MOVPA.
If a page fault occurs to obtain an effective address such as srcaddr and dest, like regular instructions, a page out execution (POE) occurs.
This instruction is a privileged instruction.
For dest/EaW!S, the @-SP mode is inhibited. If @-SP is specified to dest while V.sub.-- flag is set due to an error and page out and the content of dest cannot be transferred, the operation of the instruction cannot be distinguished.
In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions which reference the special space, if a memory indirect reference occurs in the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring RNG stack rather than PRNG is referenced. The meaningful special space address is the only effective address which is finally obtained.
In the MOVPA, LDATE and STATE instructions, if MSB of the related address is 1 (if SR is represented), the address translation is conducted using STAB rather than R1, as summarized as in FIG. 288.
In MOVPA, LDATE and STATE, the base register for the address translation operation is assigned by R1 rather than UATB. Even if the R1 bit corresponding to the reserved portion of UATB (the bits of 2 4 and 2 5 represented by `=`) is not `1`, it is not checked. Even if it is not checked, the bits of 2 4 and 2 5 should be filled with `0`.
After the effective address of srcaddr is obtained, the address translation is conducted using R1. The operation for obtaining the physical address does not affect the AT bit.
In short, even if AT=00, the address translation for srcaddr is conducted to obtain the physical address the same as when AT=01. As a pre-operation for the address translation operation, it is assumed that this instruction is used. The effective address calculation for srcaddr and dest (such as an indirect reference) and data write operation to dest are sent to the physical address when AT=00.
PROGRAM EXCEPTION: Reserved instruction exceptions
When+=`0`
When W=`1`
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP
When EaW!S is #imm.sub.-- data, @SP+ or @-SP
<<L1>> function exception
When a bit pattern of MOVPA is decoded.
MNEMONIC: LDATE src, destaddr (the data processor of the present invention does not support this instruction.)
OPERATION:
load address translation table entry (privileged)
load ATE (PTE, STE)
OPTIONS:
/AS Purge TLB in all the logical spaces.
/SS Purge TLB in the logical space containing LSID specified by R0. <<L2>>.
/PT PTE (Page Table Entry) operation
/ST STE (Section Table Entry) operation
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 289.
STATUS FLAGS AFFECTED: shown in FIG. 90.
DESCRIPTION: Calculate the effective address (logical address) of the operand specified by destaddr and transfer data obtained by src to the address translation table entry used for the physical address translation operation. The address translation method for destaddr is such that the R1 register rather than the UATB register is used as the base address (physical address) of the address translation table unlike regular instructions, so that a space other than a logical space where a program is currently executed can be operated through OS. If MSB of destaddr is 1 (SR: Shared region), the address translation is conducted using SATB rather than R1.
With the /PT and /ST options, R1 represents the base address of the section table.
Consequently, two levels of indirect reference occur with /PT, while one level of indirect reference occurs with /ST.
If the ATE set operation is conducted normally, TLB and logical cache, which are affected by changing the ATE value, are automatically purged.
If TLB's for multiple contexts (processes and tasks) exist, LSID is used to distinguish them. If TLB can distinguish multiple logical spaces, with the /SS option being specified, only TLB's where LSID is matched to R0 can be purged. Although LSID for the logical space which is currently in use is placed in the LSID control register, it is not affected by the execution of the LDATE instruction. Since the memory management and TLB configuration strongly depend on the implementation, when this instruction is accommodated, it is not always necessary to implement the /SS option. The LSID function is not always required. The /SS option provides a processor with LSID that is compatible with others without it. For detail, see the description of PSTLB.
In this instruction, the fixed number registers are used to assign spaces like high level functional instructions. Instructions are thus not required to be symmetrical because they are not directly used in a high level language and because a restriction exists due to the bit assignment. In this instruction, F.sub.-- flag and V.sub.-- flag are used to distinguish between various cases such as error of the ATE and page out. The instruction works as follows:
1. If a format error (reserved ATE error) occurs in ATE in a higher level than that to be operated on the section and page tables used for the address translation of destaddr, the ATE set operation is not conducted and the instruction is terminated with V.sub.-- flag=1 and F.sub.-- flag=0 since ATE to be operated cannot be obtained.
2. If a page-out occurs on the table containing ATE in the level to be operated or in a higher level than that on the section and page tables used for the address translation of destaddr, the ATE set operation is not also conducted and the instruction is terminated with V.sub.-- flag=1 and F.sub.-- flag=1 since ATE to be operated cannot be obtained. In addition, if both a reserved ATE error and next level page-out occur at ATE in the middle level, a reserved ATE error has a higher priority than the next level page out and the flag status becomes V.sub.-- flag=1 and F.sub.-- flag=0.
3. Otherwise
Otherwise, data in src is set to ATE and V.sub.-- flag is set to 0. When the PI bit of the data set to ATE becomes 0 because of LDATE, F.sub.-- flag becomes 1 to indicate a page-out in the lower level. If setting data causes reserved ATE error to occur, F.sub.-- flag is set to 1. In both cases, if the address translation is conducted with ATE having set, an exception occurs. If there is no error in ATE set and the PI bit is `1`, F.sub.-- flag is set to `0`.
The flag change of the LDATE instruction is summarized as shown in FIG. 291.
Since this instruction is basically considered an address operation, the statuses of M.sub.-- flag and Z.sub.-- flag are not changed. If a page fault occurs while the effective address for src and destaddr is obtained, a page out exception (POE) occurs as in regular instruction.
This instruction is a privileged instruction.
With LDATE/ST, the process equivalent to PSTLB/ST is automatically conducted, the process equivalent to PSTLB/PT is automatically conducted with LDATE/PT.
In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions which reference the special space, if a memory indirect reference occurs because of the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring RNG stack rather than PRNG is referenced. The meaningful special space address is the only effective address which is finally obtained.
In MOVPA, LDATE and STATE, the base register for the address translation operation is assigned by R1 rather than UATB. Even if the R1 bit corresponding to the reserved portion of UATB (the bits of 2 4 and 2 5 represented by `=`) is not `1`, it is not checked. Even if it is not checked by the hardware, the bits of 2 4 and 2 5 should be filled with `0`.
In executing LDATE when AT=00, the contents of src are fetched and the effective address of destaddr is calculated without the address translation operation like other instructions. However, the LDATE instruction itself does not depend on the value of AT. In short, even if AT=00, the effective address of destaddr being obtained is interpreted as a logical address and the contents of src are transferred to ATE which is used to translate the logical address into the physical address. It is assumed that this instruction is used as a pre-operation for the address translation.
The specifications of LDATE, STATE and MOVPA when AT=00 are determined so that they conform to the specifications when AT=01, so that OS can be used to initially set the operation environment of MMU, and so that they can be used consistently when a user program works with AT=01 and OS works with AT=00.
PROGRAM EXCEPTION: Reserved instruction exceptions
When !R=`11` (Not detected when !=`0`)
When P=`1`
When ttt=`010` to `111`
When EaR is @-SP
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP
<<L1>> function exception
When a bit pattern of LDATE is decoded.
MNEMONIC: STATE srcaddr, dest (the data processor of the present invention does not support this instruction)
OPERATION:
store address translation table entry (privileged)
store ATE (PTE, STE)
OPTIONS:
/PT PTE (Page Table Entry) operation
/ST STE (Section Table Entry) operation
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 292.
STATUS FLAGS AFFECTED: shown in FIG. 293.
DESCRIPTION: Calculate the effective address (logical address) of the operand specified by srcaddr, read the address translation table entry (ATE) which is used to convert the effective address into the physical address, and set it to dest. The address translation method for srcaddr is such that the R1 register rather than the UATB register is used as the base address (physical address) of the address conversion table unlike regular instructions, so that a space other than a logical space where a program is currently executed can be operated through OS. If MSB of srcaddr is 1 (SR: Shared Region), the address translation is conducted using SATB rather than R1.
With the /PT and /ST options, R1 represents the base address of the section table.
Consequently, two levels of indirect reference occur with /PT, while one level of indirect reference occurs with /ST. In this instruction, the fixed number registers are used to assign spaces like high level functional instructions. This is due to the fact that the symmetry of instructions is not required because it is not used directly in a high class language and because a restriction exists due to the bit assignment.
In this instruction, F.sub.-- flag and V.sub.-- flag are used to distinguish various cases, such as an error in ATE and page out. The instruction works as follows:
1. If a reserved ATE error occurs in ATE in a higher level than that to be operated on the section and page tables used for the address translation of srcaddr, The ATE read operation is not conducted and the instruction is terminated with V.sub.-- flag=1 and F.sub.-- flag=0 since the ATE to be operated on cannot be obtained.
2. If a page-out occurs on the table containing ATE in the level to be operated or in a level higher than that on the section and page tables used for the address translation of srcaddr, Since ATE to be operated cannot be obtained, the ATE read operation is also not conducted and the instruction is terminated with V.sub.-- flag=1 and F.sub.-- flag=1. In addition, if both a reserved ATE error and next level page-out occur at ATE in the middle level, a reserved ATE error has a higher priority than the next level page-out and the flag status becomes V.sub.-- flag=1 and F.sub.-- flag=0.
3. Otherwise
Otherwise, ATE is read, and it is set to dest and V.sub.-- flag is set to 0. To represent the page-out in the lower level, F.sub.-- flag is set to 1 when the PI bit of ATE read by STATE becomes 0. If data being read causes an reserved ATE error to occur, F.sub.-- flag is set to 1. In both cases, if the address translation is conducted with ATE being read, an exception occurs. If there is no error in when ATE is being read and the PI bit is `1`, F.sub.-- flag is set to `0`.
The flag change of the STATE instruction is summarized as shown in FIG. 294.
A reserved ATE error occurs when the ATE reserved bit is used. By considering the flag status change, F.sub.-- flag .or. V.sub.-- flag of STATE is equivalent to V.sub.-- flag of MOVPA. Therefore, the flag change pattern of STATE differs from that of MOVPA.
Since this instruction is considered basically an address operation, the statuses of M.sub.-- flag and Z.sub.-- flag are not changed.
If a page fault occurs while the effective address for srcaddr and dest is obtained, a page out exception (POE) occurs as in the regular instructions.
This instruction is a privileged instruction.
For dest/EaW!S, the @-SP mode is inhibited. The operation of the instruction cannot be distinguished. If @-SP is specified to dest while V.sub.-- flag is set due to an error or page-out and the content of dest cannot be transferred. In the operands of the LDATE, STATE, LDP, STP, LDC, STC and MOVPA instructions which reference the special space, if a memory indirect reference occurs by the additional mode, the logical space (LS) rather than the special space is referenced. On the other hand, if a stack pointer (SP) reference occurs, the current ring RNG stack rather than PRNG Is referenced. The meaningful special space address is the only effective address which is finally obtained.
In executing STATE when AT=00, the effective address of srcaddr and dest is calculated without the address translation operation like other instructions. However, the STATE instruction itself does not depend on the value of AT. In short, even if AT=00, the effective address of srcaddr being obtained is interpreted as a logical address and ATE is transferred to dest which is used to translate the logical address into the physical address. It is assumed that this instruction is used as a pre-operation for the address translation.
In MOVPA, LDATE and STATE, the base register for the address translation operation is assigned by R1 rather than UATB. Even if the R1 bit corresponding to the reserved portion of UATB (the bits of 2 4 and 2 5 represented with `=`) is not `1`, it is not checked by the hardware. Even if it is not checked, the bits of 2 4 and 2 5 should be filled with `0`.
PROGRAM EXCEPTION: Reserved instruction exceptions
When +=`0`
When W=`1`
When EaA is Rn, #imm.sub.-- data, @SP+ or @-SP
When EaW!S is #imm.sub.-- data, @SP+ or @-SP
<<L1>> function exception
When a bit pattern of STATE is decoded.
MNEMONIC: PTLB (the data processor of the present invention does not support this instruction.)
OPERATION: purge TLB (privileged),
OPTIONS:
/As Purge TLB in all the logical spaces.
/SS Purge TLB in the logical spaces containing LSID specified by RO.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 295.
STATUS FLAGS AFFECTED: shown in FIG. 296.
DESCRIPTION: Purge TLB.
The control register is used to perform miscellaneous operations for TLB such as TLB lock operation and TLB enable operation. However, only the TLB purge operation is required, the TLB purge instruction is used, rather than adding the control register which would otherwise cause the burden on the hardware implementation to increase.
If TLB's for multiple contexts (processes and tasks) exist, LSID is used to distinguish them. If TLB can distinguish multiple logical spaces, only TLB's where LSID is matched to RO can be purged with the /SS option specified. Although LSID for the logical space which is currently in use is placed in the LSID control register, it is not affected by the execution of the PTLB instruction.
The PTLB instruction does not have a function which purge only TLB at a specified logical address. All TLB's in the specified logical space are purged. When purging TLB at a specified logical address, the PSTLB instruction is used. However, when the /SS option is specified, only TLB of UR in the specified logical space is purged, rather than purging SR.
To purge SR, it is necessary to use the /AS option.
This instruction is a privileged instruction.
Since the memory management and the TLB configuration strongly depend on the implementation, this instruction is specified in <<L2>>. When accommodating this instruction, it is not always necessary to implement all the options. In addition, the LSID function is not always required. In PTLB, the purge operation is executed even when AT=00 as well as when AT=01. It is assumed that the PTLB instruction is used as a pre-operation for address translation.
PROGRAM EXCEPTION: Reserved instruction exception,
MNEMONIC: PSTLB (the data processor of the present invention does not support this instruction.)
OPERATION: purge specific TLB,
OPTIONS:
/AS Purge TLB in all the logical spaces.
/SS Purge TLB in the logical space containing LSID specified by RO.
/PT Purge the entry where all the logical addresses (2 31 to 2 12 bits) accord with prgaddr. In other words, the portion which is affected when PTE is changed is purged.
/ST Purge the entry where the 2 31 to 2 22 bits of the logical address accord with prgaddr. In other words, the portion which is affected when STE is changed is purged.
/AT Purge the entry where the 2 31 bit of the logical address accords with prgaddr. In other words, the portion which is affected when UATB or SATB is changed is purged.
INSTRUCTION FORMAT AND ASSEMBLER SYNTAX: shown in FIG. 297.
STATUS FLAGS AFFECTED: shown in FIG. 298.
DESCRIPTION: Purge TLB of the specified logical address.
TLB which is in the related logical space and where the logical address equivalent to the indexes from STE to PTE (namely, all the logical addresses) accords with prgaddr is purged with the /PT option. With the /ST option specified, TLB, which is in the related logical space and where the logical address equivalent to the index of STE accords with prgaddr, is purged. With the /AT option specified, all the entries are purged which are in the cache in the related logical space and where MSB of the logical address accords with prgaddr.
If TLB's for multiple contexts (processes and tasks) exist, LSID is used to distinguish them. If TLB can distinguish multiple logical spaces, with the /SS option specified, only TLB's where LSID is matched to RO can be purged. Although LSID or the logical space which is currently used is placed in the LSID control register, it is not affected by the execution of the PTLB instruction.
This instruction is a privileged instruction.
Since the memory management and the TLB configuration are strongly dependent on the implementation, this instruction is specified in <<L2>>. When accommodating this instruction, it is not always necessary to implement all the options. In addition, the LSID function is not always required.
The /AS and /SS options are provided to maintain the compatibility of whether LSID is used or not. Functionally, when PSTLB is used, it is possible to specify only /SS. However, if /SS is always specified, the compatibility may be lost depending on whether LSID is used or not. For example, if a processor which does not have the LSID function is produced, a program working on the processor will execute the PSTLB instruction rather than setting LSID to RO. If the same program is executed in a future processor which has the LSID function, due to remaining data in RO, PSTLB will be executed by a completely incorrect LSID. To prevent that, if RO has not been set with an option, /AS should be set. If RO will be included in the near future, it will be necessary to set /SS. The specification of /AS in PSTLB has such a meaning.
Thus, in PSTLB, all the combinations that follow are allowed.
/AS/PT
/AS/ST
/SS/PT
/SS/ST
/SS means to purge TLB of UR in the logical space specified by RO.
/AS means to purge TLB in all the logical spaces or TLB in a processor which does not have the LSID function (/PT and /ST options are also enable. RO is not used.)
With the /AS option, a program can be created for both a processor which has LSID and that which does not. On the other hand, although the LSID function can be used with the /SS option, in a processor which does not have LSID, an error (reserved instruction exception) occurs because the option has not been accommodated.
In the PTLB and PSTLB instructions, if the /SS option is specified, only TLB of UR in the specified logical space is purged, rather than TLB of SR. To purge TLB from SR, it is necessary to use /AS. The operation when the /SS option is specified in PTLB and PSTLB are summarized as follows.
PSTLB/SS
Purge UR in the logical space specified by RO.
PSTLB/SS/AT @uraddr; uraddr is UR.
Purge UR in the logical space specified by RO.
PSTLB/SS/AT @sraddr; sraddr is SR.
Since SR is specified with /SS, no operation takes place. To purge all SR, use PSTLB/AS/AT @sraddr.
PSTLB/SS/PT @uraddr; uraddr is UR.
Purge part of UR in the logical space specified by RO.
PSTLB/SS/PT @sraddr; sraddr is SR.
Since SR is specified with /SS, no operation takes place.
To purge part of SR, use PSTLB/AS/PT @sraddr.
If it is difficult to accommodate the /ST option in PSTLB, reduce the function to maintain the compatibility so that the instruction can be simply executed and an EIT does not occur. Practically, the operation equivalent of /AT rather than /ST is performed.
If PSTLB is executed at AT=00, the effective address of prgaddr is calculated without an address translation like other instructions. However, the instruction operation of PSTLB does not depend on the value of AT. In other words, even if AT=00, the effective address of prgaddr obtained is interpreted as a logical address and the purge operation is executed like AT=01 because it is assumed the PSTLB instruction is used as a pre-operation for address translation.
Program Exception: Reserved instruction exception.
__________________________________________________________________________Appendix 1 Instruction Set Reference of The Data Processor ofthe Present Invention__________________________________________________________________________(Data Transfer Instructions)MOV src,dest Move and sign extend dataMOVU src,dest Move and zero-extend dataPUSH src Push to stackPOP dest Pop from stackSTM reglist,dest Store multiple registersLDM src,reglist Load multiple registersMOVA srcaddr,dest Obtain effective addressPUSHA srcaddr Push address to stack(Comparison and Test Instructions)CMP src1,src2 Comparison and sign extension and comparisonCMPU src1,src2 Zero-extension and comparisonCHK bound,index,xreg Check upper and lower bounds(Arithmetic Instructions ADD src,dest Addition and addition with sign-extension ADDU src,dest Zero-extension and addition ADDX src,dest Addition including a carry in from X.sub.-- flag SUB src,dest Subtraction and subtraction with sign-extension SUBU src,dest Zero-extension and subtraction SUBX src,dest Subtraction including a carry in from X.sub.-- flag MUL src,dest Multiplication MULU src,dest Unsigned multiplication MULX src,dest,tmp Extended multiplication, double precision DIV src,dest Division DIVU src,dest Unsigned division DIVX src,dest,tmp Extended division, double precision, and presence of remainder REM src,dest Remainder REMU src,dest Remainder by unsigned division operation NEG dest Complementary operation<<L2>> INDEX indexsize, Calculate address of arraysubscript,xreg(Logical Instructions)AND src,dest AND operationOR src,dest OR operationXOR src,dest XOR operationNOT dest Not all bits(Shift Instructions) SHL count,dest Shift logical SHA count,dest Arithmetic shift operation ROT count,dest Rote SHXL dest Shift left and extend with X.sub.-- flag SHXR dest Shift right and extend with X.sub.-- flag RVBY src,dest Reverse byte order<<L2>> RVBI src,dest Reverse bit order(Bit Operation Instructions)BTST offset,base Test a bitBSET offset,base Set a bitBCLR offset,base Clear a bitBNOT offset,base Complement a bitBSCH data,offset Search 0 or 1 (in one word)(Fixed Length Bit Field Operation Instructions)BFEXT offset,width,base,dest Extract bit field (signed)BFEXTU offset,width,base,dest Extract bit field (unsigned)BFINS src,offset,width,base Insert bit field (signed)BFINSU src,offset,width,base Insert bit field (unsigned)BFCMP src,offset,width,base Compare bit field (signed)BFCMPU src,offset,width,base Compare bit field (unsigned)(Variable Length Bit Field Operation Instructions)BVSCH Find first `0` or `1` in the bitfield (variable length)BVMAP Bit map operationBVCPY Bit transferBVPAT Operation of pattern and bit map(Decimal Arithmetic Instructions)* ADDDX src,dest Addition in BCD* SUBDX src,dest Subtraction in BCD* PACKss src,dest Pack string into BCD* UNPKss src,dest,adj Unpack BCD(String Instructions)SMOV Copy stringSCMP Compare stringSSCH Find a character in a stringSSTR Continuously write same data (fill data in string)(Queue Operation Instructions)QINS entry,queue Insert a new entry into a queueQDEL queue,dest Remove an entry from a queueQSCH Search queue entries(Jump Instructions)BRA newpc Branch always (PC relative)Bcc newpc Branch conditionally (PC relative)BSR newpc Subroutine jump (PC relative)JMP newpc JumpJSR newpc Jump to subroutineACB step,xreg,limit,newpc Add, compare and branchSCB step,xreg,limit,newpc Subtract, compare, and branchENTER local,reglist Create new stack frame (High level language subroutine jump)EXITD reglist,adjsp Exit and deallocate parameter (High level language sub-routine return and parameter release)RTS Return from subroutineNOP No operationPIB Purge instruction buffer (instruction cache and pipeline arrangement)(Multiprocessor Instructions)BSETI offset,base Set a bit (lock the bus)BCLRI offset,base Clear a bit (lock the bus)CSI comp,update,dest Compare and store (lock the bus)(Control Space, Physical Space Operation Instructions)LDC src,dest Load control space or registerSTC src,dest Store control space or registerLDPSB src Load PSBLDPSM src Load PSMSTPSB dest Store PSBSTPSM dest Store PSM LDP src,dest Load physical spaceSTP src,dest Store physical space(OS-Support Instructions)* JRNG vector Jump to new ring* RRNG Return from previous ring TRAPA vector Trap always TRAP Trap conditionally REIT Return from EIT WAIT imask Set IMASK and wait LDCTX pcbaddr Load context from CTXB STCTX Store context to CTXB(MMU Support Instructions) ACS chkaddr Test access rights* MOVPA srcaddr,dest Move physical address* LDATE src,destaddr Load address translation table entry* STATE srcaddr,dest Store address translation table entry<<L2>>* PTLB Purge TLB <<L2>>* PSTLB prgaddr Purge specific TLB(Signed Decimal Arithmetic Operation Instructions)<<L2>>* DCADD src,dest Signed addition in BCD<<L2>>* DCADDU src,dest Unsigned addition in BCD<<L2>>* DCSUB src,dest Signed subtraction in BCD<<L2>>* DCSUBU src,dest Unsigned subtraction in BCD<<L2>>* DCX src,dest Addition and subtraction in BCD including a carry<<L2>>* DCADJ src,dest Signed complement in BCD<<L2>>* DCADJU src,dest Unsigned complement in BCD<<L2>>* DCADJX src,dest Complement in BCD with a carry<<L2>>* DCCMP src1,src2 Signed comparison in BCD<<L2>>* DCCMPU src1,src2 Unsigned comparison in BCD<<L2>>* DCCMPX src1,src2 Comparison in BCD with a carry__________________________________________________________________________ * means the instruction that the data processor of the present invention does not support.
APPENDIX 2
Assembler Syntax of the Data Processor of the Present Invention
A2-1; Outline
This appendix describes the definitions of instruction mnemonics and addressing mode mnemonics for the data processor of the present invention.
A2-1-1; Symbol Syntax in this Document
______________________________________< . . . > Indicates a meta character.[A] A is omissible.{A}* A is either not used or repeated one or more times.{A}+ A is repeated one or more timesA :: = B C A is B or CA :: = BC B and C are connected to A.______________________________________
A2-1-2. Determining Mnemonics
(1) "General mnemonic" and "Mnemonic-every-format" are provided.
The general mnemonic is a mnemonic which correspond with each instruction. Even if instructions have multiple formats the number of general mnemonics of the instruction is only one. On the other hand, the mnemonic-every-format, is used to distinguish the different formats. By determining a character which represents an instruction format, the mnemonic every format is systematically created from the general mnemonic. When creating an assembler source program, the programmer regularly uses the general mnemonic. The format most suitable for the general mnemonic is selected by the assembler.
(2) A Unified rule for data type parameters is provided. The data type parameters are required to specify the data type for the arithmetic operation, the same size operand for the entire instruction, and the size of every operand.
(3) The mnemonics attempt to follow the IEEE Microprocessor Assembly Language Standard (page 694) as closely as possible. However, since it is not completely compatible with the architecture of the data processor of the present invention, these mnemonics are used only for reference to determine individual names. The concept and rule for the mnemonics used for the data processor of the present invention do not completely conform to the IEEE standard.
(4) Special symbolic characters should not be used if possible.
In the assembler defined here, special symbolic characters should not be used if possible. Otherwise, special symbolic characters in the assembler may contend with them in numerical expressions in operands and in an extended assembler. In addition, to create software through a host computer which does not provide many character sets, it is recommended not to use many special symbolic characters. To avoid using many special symbolic characters, only one type bracket is used in the assembler. The special symbolic characters such as `;` and `&` are not used.
A2-1-3 ; Assembler Instructions
Each instruction of the data processor of the present invention assembly language is described by one operation mnemonic and zero or more operand mnemonics. An opcode mnemonic and operand mnemonic are delimited with one or more blank characters (space or tab). Two operand mnemonics are delimited with one command, seperated by `,`.
______________________________________<Assembler instruction> ::=<Operation>[<Operand>{,<Operand>}*]______________________________________
A2-1-4; Operand Order
Although the operand order is determined every instruction, it is generally described as follows.
Move Instruction (MOV)
The first operand and the second operand become the source and destination, respectively.
In short,
First operand.fwdarw.Second operand.
It is the same as the IEEE standard.
Two-operand instruction for dyadic (two-term) instructions (such as SUB)
The first operand becomes the second source and the second operand becomes the first source and destination.
In short,
Second operand .op. First operand.fwdarw.Second operand.
It differs from the IEEE standard but, it is widely used in many processors and it is popular.
A2-2. Operation Mnemonics
A2-2-1. Mnemonic Generation Rule
Although a verb which describes an operation in the IEEE standard is often placed at the beginning of the mnemonic, in the data processor of the present invention, a data type parameter precedes such a verb. The mnemonics for the operations are nearly the same as the IEEE standard.
The instruction mnemonics for the data processor of the present invention are generated in the following rule.
______________________________________<Operation> ::=[<Data type>]<Operation>{<Variation>}*{/<Option>}*{:<Format>}*[.<Size>}______________________________________
Example:
MOV
SMOV/NE.W
MOV.W
MOV:L
MOV:Q.W.
<Data type>
The data type which significantly affects the operation method (which is irrespective of the <Operation>) is specified at the beginning of an instruction. This data type includes a string, queue, bit field, etc.
The data size (8, 16, 32 and 64 bits for an integer and 32 and 64 bits for floating point) is specified in <Size>. Signed, unsigned and address operations are specified in <Variation>.
<Operation>
The operation itself is specified in accordance with the IEEE standard. Although the conditions of conditional jump instructions should be specified as options, they are customarily included in the basic portion of the <Operation>.
<Variation>
Detailed controls and attributes for an operation are specified.
<Option>
Instruction options represented with several bits in the instruction format are represented. The options include the termination conditions of the string instructions and the search conditions of queues.
<Format>
A format for the short type and general type is specified. Generally, it is omissible. If it is omitted, the general mnemonic is used. If the general mnemonic is used without <Format> in an assembler source program, the assembler automatically selects the suitable format. If <Format> is described, the mnemonic-every-format is described. If the user describes <Format> in an assembler source program, it means to use the described format compulsorily. The mnemonic-every-format specified by <Format> is used to distinguish instruction formats in descriptions of the specification, manual or disassembler.
<Size>
The operand size is specified. The instruction with <Size> mainly uses integers and floating point. <Size> is closely related to <Operation> unlike <Data Type>.
A2-2-2. Data Type
The following characters are used to represent <Data type>.
None: Integer operation, address operation, miscellaneous operation, etc.
F: Floating point
S: String
Q: Double-linked queue
B: One-bit operation
BF: Fixed length bit field operation
BV: Variable length bit field operation
A2-2-3. Operations
The following instructions of the data processor of the present invention assembler conform to the IEEE mnemonics.
______________________________________ADD, SUB, MUL, DIV, CMP, NEG, AND, OR, XOR, NOT,LD, ST, MOV, PUSH, POP, WAIT, NOP______________________________________
Note:
Usage of MOV, LD, and ST:
MOV: Transfer data between registers and between memories.
LD: Transfer data from a memory to a register.
ST: Transfer data from a register to a memory.
LD and ST are used for the instructions where the direction is a consideration.
The shift operations do not directly conform to the IEEE mnemonics because their left and right assignment method for the data processor of the present invention assembler differs from that for the IEEE standard. However, by using the IEEE rule, SHA, SHL, and ROT are used.
If the branch (conditional jump) instructions conform to the IEEE standard, `BV` has a different meaning. In addition, for easier distinctions between comparisons of signed integers and unsigned integers, the condition specification portion does not conform to the IEEE standard.
JMP, JSR, and RTS do not conform to the IEEE standard due to symmetry of the branch instructions.
Since the extension operations are uniformly represented with `X` of <Variation>, ADDX, SUBX, MULX, and DIVX do not conform to the IEEE standard.
A2-2-4. Variation
<Variation> serves to specify the attributes for operations and uses the following characters.
______________________________________A Address calculation Example: MOVA, PUSHA, MOVPAC Operation for control space (control register) Example: LDC, STCD Decimal operation (unsigned, no data check) Example: ADDDX, SUBDX Stack parameter discard process Example: EXITDI Operation Performed by locking the bus Example: BSETI, BCLRI, CSIM Multiple data process Example: LDM, STMP Operation for physical space Example: LDP, STPU Unsigned data opera Example: MOVU, ADDU, MULU, etc.X Extended operation Example: ADDX, MULX, etc.______________________________________
A2-2-5. Format
<Format> serves to distinguish the instruction format in detail and uses the following characters.
______________________________________E 8-bit immediate of two-operand instructions in general format Example: ADD:E.W #100.B,@abs2G General format of two-operand instructions Example: ADD:G.W @abs1,@abs2 ACB:G @abs1,R1,@abs2,loop3I Short format of immediate Example: ADD:I.W #100000,@abs2L Short format of operation between memory and register Example: ADD:L.W @abs,R2 MOV:L.W @(disp,R2),R3Q Literal short format Static format of bit field instruction Literal short format of loop instruction Example: MOV:Q.W #3,@abs BTST:Q.B #4,@abs ACB:Q #1,R1,#5,loop1R Short format of operation between registers Short format of register of loop instruction Example: AND:R.W R1,R2 MOVA:R.W @(disp:16,R2),R3 ACB:R #1,R1,R2,loop2S Short format of oPeration between register and memory (only MOV) Example: MOV:S.W R2,@abs 8 newpc is 8 bits. Example: ACB:G @absl,R1,@abs2.looP3:816 newpc is 16 bits. Example: BEQ:G error:1632 newpc is 32 bits Example: BNE:G next:3264 newpc is 64 bits. Example: BRA:G loop:64______________________________________
The format specifications such as `:Q`, `:G`, . . . are used to distinguish the formats with in one instruction (general mnemonic) and create mnemonics-every-format. In short, it is used to specify a format in the assembler syntax. On the other hand, G-format, E-format, . . . described in "Instruction Format" are used to describe the formats in all the instructions. Therefore, while the `:G` in `MOVA:G` is the general format, GA, of the MOVA instruction, the `:G` in `MOV:G` is the general format,G, of the MOV instruction.
A2-2-6. Size
Since the IEEE standard does not consider 64 bit integers, the data size handled also differs from that of the IEEE standard.
In the case of integers
4 types of sizes are symmetrically supported and the data type can be specified with the operand.
Since the same data is written on both the operation side and the operand side, it is delimited with `.`. The following characters are used for <Size>.
______________________________________B Byte 8-bit long integerH Half word 16-bit long integerW Word 32-bit long integerL Longword 64-bit long integer______________________________________ `L` cannot be used in the data processor32 of the present invention.
In the case of floating point.
It will be separately defined.
A2-3. Operand Mnemonics
Operands are classified into those where the general addressing mode or its subset can be used (the general operands are named) and those where special specification is made depending on the instruction (the special operands are named). For the special operands, the format is defined every instruction. The following instructions use the special operands.
______________________________________BRA, Bcc, BSR, ACB, SCB (newpc operand)LDM, STM (reglist operand)etc.<Operand> :: = <General operand> <Special operand>______________________________________
The general operands are such that the data size can be specified every operand. This feature is available for the general operand description in the assembler. In addition, operands have also the general mnemonic and the mnemonic-every-format.
The general operand mnemonic is composed of a real operand value (effective address), specification of additional mode format, and size.
______________________________________<General operand> ::=<Operand value>[:<Additional modespecification>][.<Size>}______________________________________
A2-3-1. Rule for Addressing Mode Notation
Since conventional processors do not have many addressing modes, their modes are individually considered and it is possible to assign unique symbols to them. In addition, the notation of the addressing modes does not accord with the real addressing operations. For example, although in some processor, the addressing mode of the register relative indirect may be represented with disp(Rn), its operation is only mem[disp+Rn] and the disp portion and Rn portion are not symmetrically handled. Although it can be used without a problem, if it is used to create a complicated mode, an inconsistency may occur.
Since the data processor of the present invention has a function named "additional mode", the addressing should be uniformly and regularly described to prevent confusion. To do that, Data Processor of the present invention has a naming convention for real operations and their notations. In Data Processor of the present invention, the addressing mode including the additional mode will be uniformly described.
The addressing is basically composed of addition operations and indirect references, each of which is repeated. Thus, it is necessary to represent these two types of operations. The rule of notation for the data processor of the present invention is summarized as follows:
Rule of Notation of the data processor of the present invention Addressing Modes
@A or @(A); Reference the content of the memory of address A. mem[A].
@(A,B,C, . . .): Add A, B, C, . . . , and reference the content of memory of the address which contains the result of the addition operations. mem[A+B+C+. . . ].
`()` in the data processor of the present invention does not have a special meaning such as indirect reference. Like general numerical expressions, it simply represents the order of connection. Thus, the meaning of @A is the same as that of @(A). Even if `(. .)` is used if there is only one term, it is possible to omit it.
In conventional processors, `(. .)` may mean an indirect reference and it is customarily used in the notation. However, with such a notation, the following misunderstandings can occur.
Example
______________________________________Customer notation Operand value______________________________________Rn Rn(Rn) mem[Rn]abs mem[abs] or abs(abs) mem[mem[[abs]] or mem[abs]______________________________________
To prevent such cases, in the data processor of the present invention, an indirect reference is always represented with `@`.
On the other hand, since there is not such a rule for the immediate reference, (the addressing mode for stack operation and index scaling process), their notations should be determined by referencing the rule.
A2-3-2. Specifying Additional Mode
<Additional mode specification>::=A N
`A` is specified when emphasizing that the format of the additional mode is used. On the other hand, `N` is specified when emphasizing that the format of the additional mode is not used. These specifications are equivalent to the mnemonic- every-format. If neither `:N` nor `:A` are written, the assembler determines whether the addressing can be realized in a short mode other than the additional mode and if it can be realized, it uses the mode. If it determines that it cannot be realized, it uses the mode. If it determines that it cannot be realized unless it is in the additional mode, it uses the additional mode.
Example
@(disp,PC):A: The PC relative addtional mode is always used. Even if disp is 32 bits or less, the additional mode is used.
@(disp,PC):N: The PC relative indirect mode is always used. If disp is 64 bits, an error occurs.
@(disp,PC): If disp is 32 bits, the PC relative indirect mode is used. If disp is 64 bits, the PC relative additional mode is used.
A2-3-3. Size
<Size> represents the operation size of an operand. It serves to specify the real operation size of an operand along with the size represented with the mnemonic of the operation. The characters used to specify the size are the same as those used for the operations.
The relationship between <Size> of an operand and <Size> of an operation is regular:
If <Size> is specified in an operation, <Size> becomes the default size for all operands except operands whose size cannot be specified: immediate operands, and operands having special meaning.
If <Size> is specified for an operand, it becomes the size of the operand. Even if a different size is specified in an operation, the <Size> specified in the operand has a higher priority than any other sizes.
If the <Size> which is specified for an operand cannot be used, an error occurs.
Example
MOV.W @src,@dest: Both src and dest are W(WORD) type.
MOV.W @src.B,@dest: src is B(BYTE) type, while dest is W(WORD) type.
MOV @src.B,@dest.W: src is B(BYTE) type, while dest is W(WORD) type.
A2-3-4. Operand Value
The assembler syntax for general operands each addressing mode is described in the following.
Numeric characters, variable names and numeric expressions can be described as the contents of <Immediate value> and <Absolute value>. Their syntax will be determined separately. <Format> is described to clarify the format selection of the addressing mode. It is mainly used to specify the size of the extension portion of the addressing mode. It is omissible. However, if it is omitted, the assembler automatically selects the suitable format (size). <Format> is used to distinguish the format in the addressing portion for the description of the specification, manual or disassembling.
______________________________________<Format> ::= 4 16 32 64______________________________________ 4 4-bit long addressing modification portion16 16-bit long addressing extension portion Example: @(disp:16,Rn),abs:1632 32-bit long addressing extension portion Example: @(disp:32,Rn),abs:3264 64-bit long addressing extension portion Example: abs:64______________________________________
<Format> only specifies the size of an instruction format. On the other hand, <Size> specifies the size of an operand. Except in the immediate mode, <Format> differs completely from <Size>.
Example
MOV RO.W,@addr: 16, W
This instruction transfers the content of RO to the memory represented with `addr`. The absolute addressing mode is used.
`:16` indicates that `addr` is represented with 16 bits. Thus, the range of `addr` is $ffff8000 to $00007fff. On the other hand, `.W` indicates that the operation is performed with words (32 bits). In short, this instruction transfers 4 bytes of data. <Register No.> is used to describe a mnemonic of the general purpose registers.
______________________________________<Register No.> ::=______________________________________R0 R1 R2 R3 R4 R5 R6 R7 R8R9 R10 R11 R12 R13 R14 R15 FP SP______________________________________
FP and R14; SP and R15 are exactly the same.
A2-3-4-1. Register Direct
______________________________________ Operand = Rn <Operand value> ::= <Register No.> Example: R1______________________________________
A2-3-4-2. Register Indirect
______________________________________ Operand = mem[Rn] <Operand value> ::= @<Register No.> Example: @R2______________________________________
A2-3-4-3. Register Relative Indirect
______________________________________Operand = mem[disp16 + Rn] mem[disp32 + Rn]<Operand value> ::=@(<Displacement>[:<Format>],<Register No.>)ADD:I.W #1,R0 Use the immediate type format (6 bytes). The source operand `1` is represented with 32 bits.ADD:L.W #1,R0 Use a short format (6 bytes). Specify an 8-bit immediate as the source operand.ADD:G.W #1.R,R0 Use a general format (6 bytes) Spec- ify an 8-bit immediate as the source operand. `1` is represented with the low order 8 bits in the 16 bit field. `1` is sign- extended to 32 bits.ADD:E.W #1,R0 Use a general type 8-bit immediate format (4 bytes). `1` is sign-extended to 32 bits.ADD:G.W #1,R0 Since the size is not specified for #1 and the :G format is used, there is a flex- ibility in size. Thus, the minimum size is automatically selected. The instruc- tion becomes equal to the following in- struction. ADD:G #1.B,R0.W (6-byte instruction) rather than the following instruction ADD:G #1.W,R0.W (8-byte instruction).<Format>::=16 32Example: @(disp:16,R5)______________________________________
A2-3-4-4. Literal and Immediate
______________________________________ Operand = imm.sub.-- data <Operand value> ::= #<Literal value> <Operand value> ::= #<Immediate value>______________________________________
When the use of the literal instruction format is clearly described, it should be described in the mnemonic of an operation.
In the case of an immediate, since the size of the extension portion is determined by the size of an operand, the meaning of <Format> becomes the same as that of <Size>. In the assembler, the size can be specified as either <Format> or <Size>.
If the size is not specified on the operand side of an immediate operand and the function of the instruction has a flexibility for size, the minimum size is automatically selected.
Example
______________________________________ADD:Q.W #1,R0 Use the literal format (2 bytes).ADD:G.W #1:16,R0 Select an instruction by using <Format> rather than <Size>. This instruction becomes equal to the following instruction. ADD:G.W #1.H,R0In the general mnemonic, if simply described as follows,ADD.W #1,R0the shortest code is selected as followsADD:Q.W #1,R0______________________________________
Although the number of sizes is not limited to one, part of them actually uses only one size. For these instructions, unless <Size> is placed on the operand side, the default size which is specified is applied depending on the instruction. It is an exception to the rule where the mnemonic of <Operation> is applied to all of the operands.
Example
In the access size of the bit operation instruction (BB is specified), the default size is 8 bits (.B). `.H` and `.W` are specified in <<L2>>, while `.L` is specified in <<LX>>.
In the register size of the fixed length bit field operation (X is specified), the default size is 32 bits (.W). `.H` and `.B` cannot be used. `.L` is specified in <<LX>>.
BTST.W RO, @addr=BTST RO.W, @addr.B.
A2-3-4-5. Absolute
______________________________________Operand = mem[abs16] mem[abs32] mem[abs64]<Operand value> ::=@<Absolute address>[:<Format>]<Format>::= 16 32 64Example: @abs:32______________________________________
A2-3-4-6. PC Relative Indirect
______________________________________Operand = mem[disp16 + PC] mem[disp32 + PC]<Operand value> ::=@([<Displacement>[:<Format>]],PC)<Format>::=16 32Example: @(disp,PC)______________________________________
A2-3-4-7. Stack Pop
______________________________________ Operand = mem[SP++] <Operand value> ::= @SP+ Example: @SP+______________________________________
A2-3-4-8. Stack Push
______________________________________ Operand = mem[--SP] <Operand value> ::= @-SP Example: @-SP______________________________________
A2-3-4-9. FP Relative Indirect
______________________________________Operand = mem[disp4 + FP]<Operand value> ::=@(<Displacement>[:<Format>]],<Register No.>)<Format>::= 4<Register No.>::= FP R14Example: @(disp4:4,FP)______________________________________
In this addressing mode, although the disp value being specified in the bit pattern is quadrupled to produce the real displacement, the value being quadrupled is used in the assembler syntax.
Since the assembler syntax is the same as that in the register relative indirect mode, if <Format> is not specified the assembler selects the suitable mode. In short, in an operand described as @(disp,Rn), when Rn is R14 or FP, and then disp is a multiple of 4 in the range from -32 to 31, the FP relative indirect mode is selected. Otherwise, the register relative indirect mode is selected.
A2-3-4-10. SP Relative Indirect
______________________________________Operand = mem[disp4 + SP]<Operand value> ::=@([<Displacement>[:<Format>]],<Register No.>)<Format>::= 4<Register No.>::= SP R15Example: @(disp4:4,SP)______________________________________
Although the disp value specified in the bit pattern is quadrupled to produce the real displacement in this addressing mode, the value being quadrupled is used in the assembler syntax.
A2-3-5. Additional Mode
In the additional mode, there are the general mnemonics which represent functional requirements and the mnemonic-every-format which symbolizes format and bit pattern.
General Mnemonic
______________________________________An indirect reference is represented with @ or @(. . .).An addition of address is also represented with(. . .,. . .,. . . .)The order of syntax is usually as follows.Base mode or current additional mode temp value==> Displacement==> Index______________________________________
In this manner, the flow of the effective address calculation from the left to the right becomes simple. The information necessary for the earlier level additional mode and that for the later level additional mode are grouped to the earlier side and the later side, respectively. In other words, the order of the general mnemonic syntax becomes the same as that of the machine language bit pattern in the additional mode. Therefore, the general mnemonic syntax corresponds properly with the mnemonics-every-format and real machine language additional mode, so that the assembler can be simplified and easily understood.
Mnemonic-every-Format
By using the following three characters for specifying a format, the syntax which corresponds to the machine language bit pattern can be obtained.
:B: Indicates the process of the specified portion is performed by the base mode.
:A: Indicates the process until the specified portion is performed by the general additional mode.
:N: Indicates the process of the specified portion is performed by the additional mode in the next level (the portion specified with `:A`). "Process of the specified portion" means the addition process of the value if the format specification character is assigned to the displacement and register. However, it means the indirect reference process if the format specification character is assigned to a closed parenthesis `)`. In addition, "Process until the specified portion" in `:A` indicates that the process of the `:A` portion and the `:N` portion on the left side are performed at the same time.
If all the formats are specified, the number of `:A` becomes the number of levels of the additional mode. Usually, one `:A` corresponds with one level indirect reference. However, when adding the contents of multiple index registers (`:A` is required even if there is no indirect reference), there is an exception where a dual indirect at the last level is performed (even in two level indirect references, it is possible to use only one `:A`).
If there is no format syntax, the additional mode which can perform the general mnemonic (represented as the general mnemonic) is automatically selected.
If the format which cannot be obtained in the real additional mode is specified to the mnemonic-every-format, an error occurs. If a format specification character is removed from the format specification mnemonic, it becomes the general mnemonic like the general rule of the mnemonic every format.
General Format
If multiple address additions are not performed, parentheses of @(. . . ) are omissible. Thus, @(@(@(R1) of triple indirect reference used in the additional mode can be described as @@@R1. This rule applies to all the addressing modes except the additional mode and is a so-called syntax sugar.
Although the IEEE standard uses the size specification characters such as `:B` and `:W` for the index scale values, since it is supposed that larger values may be placed in the scale value in future, the numeric characters are directly described to the scale value. The character used to specify the scaling should be `*` rather than `:` in the IEEE standard because `:` is used to specify a format.
Example
______________________________________@(offset,PC)mem[offset + PC]General mnemonic. If offset is represented in 32bits or less, the process is performed in the PCrelative indirect mode. If offset is over 32 bits,the process is performed in the additional mode.@(offset,PC):Nmem[offset + PC]The process should be performed in the PC relativeindirect mode rather than the additional mode. Inthe data processor64 of the present invention, ifoffset is over 32 bits, an error occurs.@(offset[:N],PC[:N]):Amem[offset + PC]The process should be performed in the additionalmode. Since there is no portion which specifies thebase mode, the process is performed in theabsolute additional mode+ additional mode EI = 10, disp = offset, index = PC,and scale = 1.@(PC[:B),offset[:N])[:A]mem[offset + PC]The process should be performed in the PC relativeadditional mode+ additional mode EI = 10, disp = offset, index = 0,and scale = *.@(@(@(R3[:B],base1[:N],R4*4[N])[:A],base2[:N],R5[*1:][N])[:N])[:A]mem[mem[mem[R3 + base1 + R4*4] + base2 + .R5]]R3 relative additional mode+ additional mode EI = 01, disp = base1, index = R4,and scale = 4+ additional mode EI = 11, disp = base2, index = R5,and scale = 1@(R3[:B],base1[:N],R4*4[:A],R5*2[:N])[:A]mem[R3 + base1 + R4*4 + R5*2]R3 relative additional mode+ additional mode EI = 00, disp = base1, index = R4,and scale = 4+ additional mode EI = 10, disp = base2, index = R5,and scale = 2@(R3[:B],base1:A,R4*4:A):Amem[R3 + base1 + R4*4]RS relative additional mode+ additional mode EI = 00, disp = base1, index = 0,and scale = *+ additional mode EI = 00, disp = 0, index = R4,and scale = 4+ additional mode EI = 10, disp = 0, index = 0, andscale = *This example uses three levels of additional modesby specifying the format although it can be speci-fied in one level of the additional mode.______________________________________
The syntax of the additional mode is summarized in the following, however, abbreviated syntax omitting parentheses and the syntax for commas `,` which delimit each portion are excluded.
______________________________________Operand = mem[mem[. . .] + disp + Rn * Scale1 + Rm * Scale2<General operand> ::=<Operand value> [:N][.<Size>] <Additional mode operand value>[.<Size>]<Additional mode operand value> ::=@(<Additional mode intermediate value>, [<disp value>[:N]],[Index value>[:N]])[:A]Accords with EI = 10 @(@(<Additional mode intermediate value>,[<disp value>[:N]],[<Index value> [:N]])[:N])[:A]Accords with EI = 11It represents the last level of the additional mode.<Additional mode intermediate value> ::=<Additional mode intermediate value>,<disp value>[:A] <Additional mode intermediate value>, [<disp value>[:N]],<Index value>[:A]Accords with EI = 00 @(<Additional mode intermediate value>, [< disp value>[:N]],[<Index value>[:N]])[:A]Accords with EI = 01It represents one middle level of the additional mode.<Additional mode intermediate value> ::=[0[:B] Accords with the absolute additional mode <Register No.>[:B] Accords with the register relativeadditional mode. PC[:B] Accords with the PC relative additional mode.It represents the base mode (distinction of registerrelative additional mode, PC relative additional mode,and absolute additional mode.<disp value> ::=<Displacement>[:<Format>]Accords with D,dddd field.<Format>::= 4 16 32 64<Index value> ::=(Register No.)[.<Size>][`*`<Scale value>] PC[.<Size>][`*`<Scale value>]Accords with S, M, Rx, and XX fields.<Size>::= W L<Scale value>::= 1 2 4 8______________________________________
`*` represents that an asterisk `*` is used for a character. It does not mean "repetition".
<Size> of <Index> is the effective data size of the index register. If `.W` is specified in the data processor 64 of the present invention, the low order 32 bits of the register are sign-extended to 64 bits.
If <Scale> of <Index> is omitted, `1` is assumed.
A2-3-6. Special Operands
For the operands which are specified in other modes except the general addressing modes (special operands), the following syntax is used, however, the syntax for the commands `,` which delimit each portion are not excluded.
reglist (LDM,STM,ENTER,EXITD instructions)
______________________________________<Register No.> is de-gister No.>limited with `,` and then parenthesized `(. . .)`.<Special operand> ::=({<Serial register No.>,}*)<Serial register No.> ::=<Register No.> Specify the numbered register. <Register No.>-<Register No.> Specify all the registers between the register numbers.Example:ENTER.W #10,( )LDM.W @block,(SP)STM.W (R1,R3,R9-R13,FP),@-SP______________________________________
newpc (BRA,Bcc,BSR,ACB,SCB instructions)
The available addressing mode is only the PC relative mode. As the operand, only the label to be jumped is described. In this case, the assembler sets the difference between the start address of the instruction and the address to be jumped as the bit pattern of nepc so that control can jump to the specified label when the instruction is executed.
______________________________________<Special operand> ::=(label of destination)Example:BE nextaddr Jump to nextaddr.ACB.B #1,R1,@limit,loopaddr Jump to loopaddr.______________________________________
In the BRA, Bcc, BSR, ACB and SCB instructions, because the special addressing mode (only PC relative) is often used and because it is preferred to directly writing a destination label, by describing only <Destination label>, the difference between <Destination label> and the address where the instruction is placed is automatically set to the displacement. Only on <Destination label>, does a symbol name (except registers) appear without `#` and `@`.
For example: The following instruction
BRA label
represents the same meaning as the following instruction.
JMP @(label-$, PC)
`$` represents the start address of the instruction containing `$` (in this case, JMP instruction).
adj (UNPKss instruction)
`#` is placed at the beginning of the instruction.
______________________________________<Special operand> ::= #<offset> Directly set the value.Example:UNPKBW @src,@dest,#H'23302330______________________________________
vector (TRAPA instruction)
`#` is placed at the beginning of the instruction.
______________________________________<Special operand> ::= #<Vector> Directly set the value.Example:TRAPA #1______________________________________
Others
The literal specification for the bit field instructions are represented like the short format literal specification.
#<Literal value>
The register specification for the bit field instructions such as CHK, INDEX, ACB and SCB is represented like the general address register direct mode.
<Register No.>.
A2-4 "Mnemonic-Every-Format" and "General Mnemonic"
The "General mnemonic" and "Mnemonic-every-format" are some features of the assembler of the data processor of the present invention. Although a similar feature is present in some instructions of conventional processors (for example, MOV and MOVQ in the 68020 processor), the data processor of the present invention completely systematizes both types of mnemonics, so that the same concept is applied to both the operations and descriptions of operands.
There are following relationship between the mnemonic-every-format and the general mnemonic.
With the general mnemonic, the user is released from various restrictions caused by the implementation and format. As long as the general mnemonic is used, the assembler selects the suitable codes. Instructions which have the same function and flags whose status are changed in the same way, should be unified under one general mnemonic.
The mnemonic-every-format corresponds with the bit pattern of the machine language. Even if the mnemonic-every-format is changed, it only affects the object size and the number of execution cycles, but to the user, the instruction function including the flag status is not changed. Therefore, the format parameters basically differ from the size parameters. In the case of the size parameters, when the operation size is changed, the instruction function appears to the user to also change, so that in the conditional jump instructions, a format parameter such as "BRA label:32" is used, while in the addition instruction, a size parameter such as "ADD src.B,dest.W" is used.
The user usually employs the "general mnemonic". The "mnemonic-every-format" is not used for describing the format in the specification and for disassembling. Thus, although occasionally it seems to be redundant, it makes sense when considering the purpose of their usage. The "general mnemonic" and "mnemonic-every-format" are only two extremes of syntax. There is an intermediate syntax which specifies part of the format. For example, if "@(offset, PC)" is described in the additional mode and the formats of each level of the additional mode are not specified, the following description is used.
@(offset,PC):A.
Although the "mnemonic-every-format" is used, it is possible to specify only the portion where the format is required, so that the instruction being described is not so long.
The "mnemonic-every-format" can be converted into the "general mnemonic" by simply deleting ":X". Conversely, the "general mnemonic" can also be converted into the "mnemonic-every-format" by adding ":X" in the range where the format is allowed. The order of operands is not changed. Although it can be used to change symbols and order of the mnemonic-every-format, the relationship between the mnemonic-every-format and the general mnemonic can become complicated. (Various types of classification are required and the expandability is also degraded.) If part of a format like "@(offset,PC)" is specified, it is desired to uniformly distinguish the "mnemonic-every-format" and the "general mnemonic".
The interface requested by the user is the general mnemonic, while the interface restricted by the machine language is the mnemonic-every-format. Both are arranged by the `:X` format specification character and assembler.
When both the mnemonic-every-format and the general mnemonic are used at a time, the assembler must unfortunately be more complicated. However, it is preferable to have the format processed by the assembler than the user, even if the assembler's process is complicated to some extent.
Even if the bit pattern is similar, if the machine language and flag status are changed, a different general mnemonic is used.
For the above reasons, it is preferable that the use of the mnemonic-every-format and the format to be used should be clarified. To do that, the portion which represents the format should consistently be fixed to `:X`.
The portion of `[. . .]` in the syntax is omissible. However, it is not necessary to uniformly determine whether it is omitted or not. For example, some `[. . .]` can be omitted, while another `[. . .]` can remain.
A2-5. Assembler as Language
The assembler syntax described above is the syntax for using the mnemonics as instructions for the machine language bit pattern and is the core of the assembly language. In the data processor of the present invention, this syntax is specified in <<L0>>.
The following items should be defined. They should conform to the IEEE standard if their application causes no inconsistency with the architecture of the data processor of the present invention.
Whether upper case characters and lower case characters are used.
How many symbolic characters can be used?
Whether an expression can be described in symbolic characters and what syntax is used.
What label format is used (whether `:` following a label is used)?
What syntax is used for binary, octal, decimal and hexadecimal?
What syntax is used for comments?
What syntax is used for strings?
What syntax is used for special characters (example, line feed character `Yn`)?
What detail syntax and characters are available?
What assembler pseudo instructions are used?
What about macros?
The syntax for binary, octal, decimal and hexadecimal in IEEE is specified as follows.
______________________________________B' Binary Example: B'00010010 = H'12Q' Octal Example: Q'22 = H'12D' Decimal Example: D'18 = H'12H' Hexadecimal______________________________________
This specification uses "H'xx" for hexadecimal notation and "B'xx" for binary notation.
A2-5-1. Upper Case Characters and Lower Case Characters
Although the IEEE standard does not differentiate between the upper and lower case characters, the data processor of the present invention treats the upper and lower case characters for mnemonics and reserved names equally. In short, programming examples written in upper case characters in this document can be described in lower case characters. However, for variables that the user defines, the upper case characters and lower case characters are generally distinguished.
A2-5-2. Symbol Value
In items such as <Displacement>, <Literal value>, <Immediate value>, and <Absolute address> (named <Symbol value>, expressions of arithmetic operations including constants and labels can be described. To change the priority order in the expressions, it is possible to use `(. . .)`. However, for an expression containing an unstable value (such as a label which is defined by an external name or defined later), the format of the arithmetic expressions can be restricted to obtain correct relocation.
In addition, it is possible in expressions to use `$` which represents the address of the instruction currently under consideration.
The PC relative indirect mode is represented as follows.
@(disp,PC)
The disp value is set directly in the displacement. However, if a program which is PC relative and relocatable is described, it is necessary to set the difference between the operand address and the instruction address as the disp value rather than setting the operand address as the disp value. To do that, `$` can be used. In other words, it is possible to set (operand-$) as the disp value.
______________________________________Example of a program with `$`______________________________________<<Address>>H'00FE . . .H'0100 MOV.B #1,@(loc-$:16,PC)H'0104 MOV.B #2,@(8:16,PC)H'0108 . . .H'010C . . . . . .H'0180 loc: . . .______________________________________
In the second operand @(loc-$:16,PC) of the MOV.B instruction at the address H'0100, the value being set for the bit pattern of the real disp becomes H'0180-H'0100=H'0080. With this instruction, 1 is set to loc at address H'0180. On the other hand, with the MOV.B instruction at H'0104, 2 is set at address H'0104+8=H'010C.
Syntax of an operand with both additional mode and `$`
@(@([0:B,] label1-$[:N],PC[:N])[:A],label2-$[:N],PC[:N])[:A] represents
mem[mem[disp1+PC]+disp2+PC].
However,
disp1 is the difference between the address that label1 represents and the current address.
disp2 is the difference between the address that label12 represents and the current address.
The extension portion of the additional mode is composed of the following:
Absolute additional mode
+additional mode EI=01, disp=disp1, index=PC, and scale=1
+additional mode EI=10, disp=disp2, index=PC, and scale=1.
This mode can be used when a relocatable table (such as a jump table for the case statement) is placed in the program area.
The following PC relative indirect in the first level is used to make the table reference for the case statement relocatable.
mem[disp1+PC].
The following PC relative indirect in the second level is used to make the decision of the address to be jumped relocatable.
mem[mem[. . . ]+disp2+PC].
APPENDIX 3
Outline of Memory Management Method of Data Processor of the Present Invention
It is assumed that there will be chips which contain the data processor instruction sets of the present invention without memory management hardware (MMU), depending on the applications.
Thus, the memory management mechanism of the data processor of the present invention is not always defined in the<<L0>> specification, but in the<<LA>> specification which only lists the standard specification. The paragraphs that follow describe the standard memory management method of the data processor of the present invention in the<<LA>> specification.
A3-1. Memory Management Method Selection and<<L1R>> Specification
The data processor of the present invention provides the standard specifications of address translation and memory management methods by hardware (named MMU) in the<<LA>> specification. However, where ITRON and micro-BTRON are accommodated in the data processor of the present invention, MMU is not required for the most part. Even if an application requires MMU, until the execution environment concerning MMU (such as page table) is terminated, it is necessary to execute the instructions without address translation.
To do that, the data processor of the present invention provides a field in PSW which indicates whether the MMU mechanism is used or not and whether the address translation is performed or not. By rewriting this field, the address translation and memory protection availability can be specified. This field is named the AT (address translation) field. AT is place at bits 6 and 7 of PSS. With AT provided in PSW, the context switch by LDCTX, EIT process operation, and switching of address translation are available, even if a return is made from the EIT process handler by REIT instruction are available.
The meaning of the AT field is as in FIG. 299.
For the data processor of the present invention which accommodates the standard memory management in the<<LA>> specification, AT=00 and 01 can be used. For the data processor of the present invention which accommodates the memory management specified in<<L1R>>, AT=00 and 10 can be used.
Although memory protection every page cannot be conducted because MMU is not implemented, when AT=10 in the<<L1R>> specification, only ring 0 and ring 3 of the four rings in <<LA>> are enabled for simple memory protection by address.
The MSB=1 address area (SR in<<LA>>) can be accessed from ring 0; however, it cannot be accessed from ring 3. Usually, OS is placed in the area of MSB=0, but the area of MSB=0 (UR in<<LA>>) can be accessed from ring 0 and ring 3. Usually, the user program is located in the area of MSB=0. Although the memory protection between user programs is not available because MMU is not accommodated, OS can be protected from the user program.
If AT=00 (no address translation), the ring protection for accessing the memory cannot be checked. Thus, page out exception (POE) and address translation exception (ATRE) do not occur.
However, even if AT=00, a privileged instruction is checked. It is preferred that the operation at AT=00 in <<L1>> be the same as that in<<L1R>>. However, in instructions such as LDATE, they are practical instructions for setting the MMU environment, while they are meaningless in <<L1R>>. In addition, instructions such as PTLB have meaning at AT=00 in<<L1>>, while they are meaningless in <<L1R>> because of the absence of TLB itself. Thus, in the <<L1R>> specification, such MMU related instructions are not provided. If execution of these instructions is attempted in<<L1R>>, regardless of the value of AT, a reserved instruction exception (RIE) occurs.
A3-2. Memory Management Method of the Data Processor of the Present Invention
The data processor of the present invention is the Data processor in the<<L1R>> specification. The AT field of the data processor of the present invention has meaning as in FIG. 300.
A3-3. Accessing I/O Space of The Data Processor of the Present Invention
If an instruction fetch operation for the I/O space represented with IOMASK and IOADDR and an operand fetch operation in the memory indirect addressing mode are conducted, an address translation exception occurs.
In the memory indirect addressing mode, the I/O space is not accessed. However, when an instruction is fetched, the access operation is performed. Thus, it is necessary to lock out any external I/O device when the bus access type (BAT) signal is the instruction fetch. Since the I/O space is usually located in the ring O area, it is handled such that if data is accessed from ring 3, a ring protection violation occurs. A ring protection violation can be rapidly detected, so that the memory is not accessed. Although an address translation exception occurs, if data is accessed over the I/O space and non-I/O space, the reexecution operation cannot be assured.
A3-4. Expandability of 64 Bits
If a switch bit of SR/UR is fixed to MSB of the logical address, there is the problem when expanded to 64 bits. The data processor of the present invention will solve the problem by treating the logical address as the signed number.
In order to expand both SR and UR from 32 bits to 64 bits, the address space needs only to expand in the two directions. Hence, the address is assumed to be the signed number and the UR region is assumed to expand in the positive direction and the SR region in the negative direction, thereby solving the problem. Concretely, the logical address is kept to sign-extend with respect to expansion of 32 to 64. A memory map is as shown in FIG. 301.
Or, depiction can be also shown as in FIG. 302.
The address is assumed to be the signed number, thereby keeping continutity with respect to expansion at both the SR and UR regions.
Instead, the address space is split into OS region and user region at the address of H'80000000 for the 32 bits processor and the both two regions are placed away for the 64 bits, which is considered non-problematical.
In addition, at the 16-bits absolute addressing mode (@ads:16e of the data processor of the present invention, the logical address is adapted to be sign-extended, to which an idea of address with signed number is applied.
APPENDIX 4
Status Flag Changes of the Data Processor of the Present Invention
The syntax of flag changes in each instruction are as follows.
______________________________________- No change+ The flag is changed depending on its meaning.* The flag is changed irrespective of its meaning.0 Cleared to 0.1 Set to 1.______________________________________
A4-1. Data Transfer Instructions: shown in FIG. 303.
A4-2. Comparison and Test Instructions: shown in FIG. 304.
A4-3. Arithmetic Operation Instructions: shown in FIG. 305.
X.sub.-- flag of ADDX and SUBX indicate a carry or borrow in the size of dest. If the size of src in SUB is the same as that of dest, X.sub.-- flag indicates the comparison of two sizes in an unsigned operation.
On the other hand, L.sub.-- flag indicates the comparison of two sizes in a signed operation.
M.sub.-- flag and Z.sub.-- flag in MUL, MULU, MULX, DIV, DIVU, DIVX, REM, REMU and NGE are set depending on the set value of dest irrespective of whether an overflow occurs or not.
M.sub.-- flag and Z.sub.-- flag in MULX and DIVX are irrespective of the set value of reg.
V.sub.-- flag in DIV is set in division by zero or "(minimum negative number).div.(-1)" occurs.
V.sub.-- flag in DIVU is set in the case of division by zero.
V.sub.-- flag in DIVX is set in the case of division by zero or the quotient is out of the dest size.
V.sub.-- flag in NEG is set if dest is the minimum negative number.
M.sub.-- flag and Z.sub.-- flag in INDEX are changed depending on the set value of xreg (part of the result). L.sub.-- flag indicates that the result is negative, while V.sub.-- flag indicates that an overflow occurs in multiplication or addition.
A4-4. Logical Operation Instructions: shown in FIG. 306.
M.sub.-- flag and Z.sub.-- flag in NOT are changed depending on the set value of dest (reversed result).
A4-5. Shift Instructions: shown in FIG. 307.
M.sub.-- flag and Z.sub.-- flag are changed depending on the set value of dest (shift result). The last shift out value is placed in X.sub.-- flag. If count of SHA, SHL and ROT is 0, X.sub.-- flag is set to 0. In SHA, only if the sign is changed while count>0 is V.sub.-- flag set to 1. Otherwise, V.sub.-- flag is set to 0.
A4-6. Bit Operation Instructions: shown in FIG. 308.
A4-7. Fixed Length Bit Field Instructions: shown in FIG. 309.
In the fixed length bit field instructions, the status flags of BFCMP and BFCMPU are changed similar to these of CMP and CMPU. The status flags of other instructions are changed similar to those of MOV and MOVU. In BFINS and BFINSU, the status flags are changed depending on BBBBBBBB in FIG. 310.
In BFEXT and BFEXTU, the status flags are changed depending on the set value of the destination rather than the bit field being fetched, so that it accords with the MOV instruction and so forth where the status flags are changed depending on the value being set on the destination.
A4-8. Variable Length Bit Field Instructions: shown in FIG. 311.
A4-9. Decimal Operation Instructions: shown in FIG. 312.
Sign-extension does not have meaning in BCD numbers. Basically, they treat unsigned numbers. Their status flags are changed similar to ADDU and SUBU. However, since ADDX and SUBX treat both unsigned and signed numbers, their status flags change irregularly, unlike those of ADDU, ADDDX, SUBU and SUBDX. The data processor of the present invention does not support decimal operations.
A4-10. String Instructions: shown in FIG. 313.
F.sub.-- flag in SMOV, SCMP and SSCH indicates that the operation is terminated by the termination condition (in the case of SSCH, it indicates that the search operation is successfully terminated).
V.sub.-- flag indicates that the instruction is terminated by the number of elements.
M.sub.-- flag is used to distinguish multiple termination conditions. If the operation terminates in a condition relating to R3, M.sub.-- flag is set to 0. If the operation is terminated by another 0 or in a condition relating to R4, (only available in <<L2>>), the flag is set to 1.
X.sub.-- flag, L.sub.-- flag and Z.sub.-- flag in SCMP are set depending on the result of comparison in the last element.
X.sub.-- flag indicate the comparison when the element is considered as unsigned data, while L.sub.-- flag indicate the comparison when the element is considered as signed data.
A4-11. Queue Operation Instructions: shown in FIG. 314.
Z.sub.-- flag in QINS indicates that data is placed in an empty queue.
Z.sub.-- flag in QDEL indicates that after an entry is deleted, the queue becomes empty, while V.sub.-- flag in QDEL indicates that an attempt was made to delete an entry from an empty queue.
F.sub.-- flag in QSCH indicates that the operation is terminated in the termination condition (the search operation is successfully terminated).
V.sub.-- flag indicates that the operation is terminated by the queue termination value R2 (the search operation is unsuccessfully terminated).
M.sub.-- flag is used to distinguish multiple termination conditions. If the operation is terminated in a condition relating to R3, the flag is set to 0. If the operation is terminated by another 0 or in a condition relating to R4 (available only in <<L2>>), the flag is set to 1.
A4-12. Jump Instructions: shown in FIG. 315.
The flags in the jump instructions are never changed.
A4-13. Multiprocessor Instructions: shown in FIG. 316.
A4-14. Control Space, Physical Space Operation Instructions: shown in FIG. 317.
If PSW is specified to dest with LDC, all the flags are changed.
A4-15. OS Related Instructions: shown in FIG. 318.
The data processor of the present invention does not support JRNG and RRNG.
A4-16. MMU Related Instructions: shown in FIG. 319.
M.sub.-- flag, L.sub.-- flag and Z.sub.-- flag in the ACS instruction indicates the read permission, execute permission and write permission, respectively.
V.sub.-- flag in MOVPA indicates the physical address has not been obtained due to a page fault or error.
F.sub.-- flag indicates that a page fault occurs.
V.sub.-- flag in LDATE and STATE indicates that ATE cannot be transferred due to a page fault or error.
The data processor of the present invention does not support the MMU related instructions except for the ACS instruction.
APPENDIX 5
Operation between Different Size Data Sets
The data processor of the present invention can perform various operations with different size (in byte increments) integers. It is called "operation between different size data sets". Currently only integers are treated in "different sizes". Data size are converted by simple processes such as zero-extension and sign-extension. For example, if an 8-bit signed integer is added to a 32-bit integer, the signed bit (MSB) of the 8-bit integer is extended to the high order bit and the addition operation is performed. Since the sign-extension process is available in 1 to 2 levels of gates, it is not much more complicated than regular addition instructions.
A5-1. Availability of Different Size Operation
The different size operations are used in the following cases.
(1) When one operand is an immediate:
When a variable and constant are the operands, since the size of the constant can be obtained during the compiling operation, if the constant is treated as the smaller size, it can be effective in reducing the length of the instruction. For example, when an 8-bit constant, 100, is added to a 32-bit register, if a 32-bit addition instruction is used, a 32-bit field is required. However, the instruction which adds 8 bits to 32 bits is used, since the field which specifies a constant of 100 only needs 8 bits, the length of the instruction can be shortened.
In a multiplication or division operation, the different size operands affect the performance of such an operation as well as its length. Since it is difficult to provide a 32 to 64 bit parallel multiplier in microprocessors, multiplication operations are conducted with addition and shift operations. However, the amount of multiplication operations is proportional to the product of two operand sizes. Thus, it is profitable to have one of two operands small. Without the different size operation function, for multiplying a 32-bit variable by 3, for example, it is necessary to perform a multiplication operation of 32 bits * 32 bits.
(2) Address Calculation
In an address calculation, it is necessary to match the size of the destination with the address length. Thus, in the case of a 32-bit processor, operations between a 32-bit operand and a different size operand are often conducted. For example, in a character conversion table, if the index range of the table is 8 bits or less, an addition operation of the index and base address is conducted as an addition of an 8-bit unsigned integer and a 32-bit integer.
(3) High Level Language
Generally, in a high level language, the size of subroutine parameters is often extended to the machine's basic size (for example, 32 bits) because the subroutine parameters are transferred using a stack, or because the divided compile operation can be simplified. In the C language, the evaluation of expressions is always done in the machine's basic size irrespective of the data size of variables in the expression. On the other hand, the size of variables in the memory, arrays in particular, is usually minimized to save the memory area. Thus, in a program which uses arrays and subroutines at the same time, their size should be converted when data is moved or while the operation is executing. To evaluate an expression and convert the size of operands at a time, different size operations like the data processor of the present invention is convenient.
A5-2. Real Operations in the Data Processor of the Present Invention
In the data processor of the present invention, to support different size operations, the independence for specifying the data size has been enhanced so that different size operations are available in most of the 2-operand, generalformat basic operation instructions. In short, with 2-operand general-format basic operation instructions, the source size and destination size can be independently specified. If necessary, sign-extension, zero-extension, round-off of the high order bits, and so forth are available.
Even if the destination size is smaller than the source size, the operation is executed and an overflow is detected depending on the destination size.
The different size operation of each instruction is exemplified in the following.
______________________________________B: Byte 8 bitsH: Halfword 16 bitsW: Word 32 bits______________________________________
MOV src.B,dest.W
Sign-extend 8-bit src and transfer it to dest.
MOV src.W, dest.B
Transfer low order 8 bits of src to dest.
If the value of src as a 32-bit signed integer differs from the value of dest as an 8-bit signed integer, an overflow occurs.
ADD src.B,dest.W
Sign-extend 8-bit src to 32 bits and add it to dest.
ADD src.W,dest.B
The value which is sent to dest is the same as that where the low order 8 bits of src are added to dest. However, the instruction means that the contents of src (32 bits) are added to the contents of dest (the 8-bit operand is sign-extended to 32-bits), the result is converted into an 8-bit signed integer, and then it is stored in dest. Thus, if the sum of the 32-bit operation cannot be expressed by 8 bits of dest, an overflow occurs.
In the data processor of the present invention, if the source data size differs from the destination data size, normal sign extension is performed. However, for instructions which may require a zero-extension operation (MOV, CMP, ADD, SUB), the zero and sign extension can be switched at the instruction level. MOVU, CMPU, ADDU and SUBU instructions are used. In MOVU, CMPU, ADDU, SUBU, MULD and DIVU, if the destination size is larger than the source size, the zero-extension operation is performed and an overflow is detected assuming that the result is treated as an unsigned integer.
A5-3. Different Size Logical Operations
Since each bit is completely independent in logical operations, different size operations are meaningless, i.e., they are the same as small size operations except that the flags are changed in a different manner. Zero-extension and sign-extension operations for operands of logical operations differ also.
If the following function is described using the C language, the sign-extension operation and logical operation should be performed (although they are meaningless).
______________________________________foo( ){short int16; /* 16-bit signed integer */int int32; /* 32-bit unsigned integer */int32 &= int16; /* int16 is sign-extended. */______________________________________
Such an example is included for regularity and symmetry for the language. It is hardly used except as part of programming tricks.
Problems of whether different size operations in logical operations are supported or not are summarized as follows.
(1) During execution
Logical operations with different size operands are not performed often and they do not have logical meaning. Practically, they can be substituted with other instructions and are only used for programming tricks.
(2) During compiling
Even in logical operations in the C language, zero extension and sign extension operations may be required. Even if they are not used often, the compiler should generate correct codes, so that the symmetry of instructions is maintained.
(3) Implementation for chip
While the distinction of sign extension and zero extension operations is the same in all instructions due to the regularity of implementation, even in the logical operations, the introduction of zero extension and sign extension operations is benefited. However, to do that, many bit patterns are required for assigning the instructions, resulting in complex encoding of the instructions. Practically, the sign extension and zero extension operations cannot be distinguished in logical operations, so that the regularity of implementation for sign extension and zero extension operations in logical operations is not benefited. In addition, since this matter may differ according to manufacturer, it is difficult to unify the specifications.
Although the problem is determining whether to focus on (2) or (3), for maximum performance enhancement, it is preferable to select (3).
In short,
In different size logical operations, it is not desirable to degrade the performance enhancement by operations which are hardly executed.
Since the different size logical operations for item (2) (including the sign extension operation) are not often used, it is possible to slightly lower their execution speed. For example: although the following instruction
______________________________________AND scr.B,dest.W Sign-extend src.______________________________________
is replaced with the following instructions,
______________________________________MOV src.B,@-SP.W Sign-extend src.AND @SP+.W,dest.W______________________________________
the execution speed is slightly lowered, but the symmetry for the sign-extension and logical operations can be performed. With this operation, the burden on the compiler does not increase.
The data processor of the present invention specification does not support different size logical operations. If the instruction bit patterns are different sizes, logical operations are not assured.
A5-4. Summary of Different Size Operation Function
The paragraph that follows summarizes the relationship between instructions supported by the data processor of the present invention and integer data types.
Supports 8-, 16-, 32-, and 64-bit long instructions.
Supports signed integers with higher priority.
For arithmetic operations of signed integers, different size operations in 2-operand instructions are supported.
The source size and destination size can be independently specified without restriction due to the size. If the source size is smaller than the destination size, the sign extension operation is performed. The result is treated as a signed integer and the flags are set accordingly.
Unsigned integer operations are supported only in part of instructions (MOV, CMP, ADD, SUB, MUL and DIV). The source size and destination size can be independently specified. If the source size is smaller than the destination size, the zero extension is performed. The result is treated as an unsigned integer and the flags are set accordingly.
The operations which include signed and unsigned integers cannot be performed. However, in the case of an addition instruction, the presence or absence of the sign of the destination only affects the flags. If the flags do not need to be observed, the operation can be replaced with ADD or ADDU.
The different size logical operations are not supported.
APPENDIX 6
Subroutine Calls For High Level Languages
In subroutine calls in high level languages, it is necessary to save the return address, set the frame pointer, keep the local variable area, and save the contents of the general purpose resisters. Although these operations can be broken down into instructions such as JSR and STM, they are usually lumped as one instruction (ENTER, EXITED).
A6-1. Subroutine Calls in the Data Processor of the Present Invention
In subroutine calls of high level languages (C and PASCAL in particular), the process is performed as in FIG. 320.
The paragraph that follows describes the subroutine instruction ENTER and return instruction EXITD that the data processor of the present invention provides for high level languages.
FP (frame pointer) and displacement
The language which provides a static scope like PASCAL employs a display register which accesses variables in the intermediate level (which is located between the level of the local variables and the level of the global variables). For processors which use many registers like the data processor of the present invention, it is effective to provide such a display register in the general purpose registers. It means that these processors have multiple FP's (for implementation, see the description in A6-2).
Parameters
When parameters are passed, they are grouped as a packet and the start address is passed with a register or parameters are placed in the stack. In high level languages, the latter method is often used. To access parameters in the stack by the called subroutine, the FP relative mode is used.
After a subroutine is executed, the parameters in the stack should be released by the called side. Depending on the language, the number of parameters (value to be added to SP) to be released can be specified in the return instruction, unless partitioned compiling is performed. To do that, the data processor of the present invention provides the EXITD instruction. Since the number of parameters may be automatically determined (when the specific register and stack are used to inform the subroutine of the number of parameters), it is possible to use a value in the register as well as the immediate value, as the value to be added to SP.
However, in languages where the number of parameters cannot be determined, as in the C language, the subroutine side does not know the number of parameters which is determined by the side which calls the subroutine. Thus, in the EXITD instruction which is executed on the called side, the number of parameters to be released cannot be specified. In this case, the side which calls the subroutine should execute the instruction "ADD #n, SP" to release the parameters.
The ENTER instruction and EXITD instruction of the data processor of the present invention perform the processes 2 to 4 in the schematic on the preceding page and the processes 5 to 7 or 5 to 8, respectively. (However, the number of parameters being released in process 8 is specified on the subroutine side.) Process 1 is the same as JSR, while process 8 serves to perform "ADD ***,SP" on the side which calls the subroutine.
The stack frame in high class languages for the data processor of the present invention is as in FIG. 321.
To place the local variables and parameters near FP, the register saving operation precedes the local variable keeping operation.
The EXITD instruction includes the restore (RTS) operation.
Practical Instruction Sequence
(If the subroutine side does not know the number of parameters): shown in FIG. 322.
(If the subroutine side knows the number of parameters): shown in FIG. 323.
A6-2. Example of Configuration of Display Register for Block Structural Language
To use the FP register, which is used in ENTER - EXITD as a dynamic link, it is necessary to assign the FP register to the frame pointer for the internal block (maximum lexical level).
For frame pointers in other lexical levels, R13, R12, R11. . . , are used in the order of smaller value change to match the content of the smallest number register with FP.
After the ENTER instruction is executed in each subroutine, FP is copied to the frame pointer register corresponding to their own lexical level. The registers larger than the number are used for the displacement registers and those smaller than the number are used for the saving registers. However, the contents of the registers newly rewritten should be saved.
Program Example (Static Scope): shown in FIG. 324.
Example of Execution Statuses (Dynamic Link and Display Registers): shown in FIG. 325.
proc0*, var0*
proc0 has a different frame from the former proc0 because of a recursive call.
For the registers whose contents are destroyed by the FP copy operation, the contents should be saved with the ENTER instruction before the copy operation. If the contents of the registers are saved, when the control returns to the function just before executing the subroutine, the contents of the display registers return to the former values irrespective of whether the lexical level is high or low.
In the preceding example, the following relationship can be obtained depending on how the registers are used.
For the execution of subroutines in the lexical level n, the following items are required.
(1) n registers from R13 to R13 - n+1 are only referenced: they are not written.
(2) Since the R13 - n registers are used for displaying the local variables in this level, it is copied from FP after ENTER is executed. This display is used to access the variables in this level from the called subroutine when the higher level subroutine is called during the subroutine execution. To access the variables in this level from the subroutine, it is preferable to use FP which has the same content.
(3) The (13- n) registers, from R13 - n - 1 to R0, are used for the register variables and for their evaluation.
(4) The contents registers R13 - n - 1 to R0, should be saved with the ENTER instruction. The contents of all the registers should be stored.
APPENDIX 7
Control Registers and Control Space
Since the specifications for the control registers closely relate to the chip bus (which is connected to the co-processor, cache, TBL, and so forth) and the implementation method, they are specified in <<LA>>.
A7-1. Concept of Control Space
In the data processor of the present Invention, a unique address is assigned to all the registers, MMU, cache, control registers (such as TLB of the main processor and co-processor on the chip bus) and context switch high speed memories on the chip bus. It is called the control space. The control space of the data processor of the present invention is such that the address space (co-processor -ID) for conventional processors and the control register address of the main processor are unified and generalized. It features the following:
The control space in the data processor of the present Invention contains the following:
(1) Main processor control registers . . . PSW, stack pointer of each ring, etc.
(2) MMU control registers (the data processor of the present invention does not provide either or MMU.) . . . UATB, SATB, etc.
Registers depending on the implementation
(3) [Co-processor control registers]
(4) [Context saving high speed memory] . . . For future chips
(5) [General purpose registers and temporary registers in processor] . . . Remote diagnosis and debugging.
The control space is the common space between contexts (processes and tasks). The control space is accessed at high speed by a simplified protocol because address conversion is not required. This function is also used for the high speed context swtiching.
The concept of the control space will only become a reality when a co-processor and context saving memory are built in the future. For the first version chips, since it may be difficult to unify the operation of the control space, only the address assignment is determined for future use and some of the control space operation instructions can be used with some restrictions.
Practically, there are the following restrictions:
Although the control space addresses are assigned from R0 to R15 with PC used for diagnosing the processor, they are specified in <<L2>> and the data processor of the present invention does not provide them.
LDC and STC are generally used to access the main processor control registers, FPU control registers and context saving memories. However, in the data processor of the present invention, only the control registers with the effective addresses H'0 to H'07ff (main processor control register) can be accessed with LDC and STC.
In the addresses of the control space in the data processor of the present invention, the byte and half-word accesses cannot be used. The word access is automatically specified.
The context saving memory cannot be located in the area where the control registers are located (from H'0). Since the addresses from H'ffff8000 to H'ffffffff are assigned (and also the extension area from H'80000000) as the context saving memory, if LDCTX/CS or STCTX/CS is executed while a value other than H'80000000 to H'ffffffff is set to CTXBB, an error occurs. The function of LDCTX/CS and STCTX/CS is specified in <<L2>>.
The data processor of the present invention does not support LDCTX/CS and STCTX/CS.
-: Required specification <<L1>>
. . : Only address assignment <<L2>>.
Although the byte access and half word access are not available in the control space diagrammed in FIG. 326, the byte addressing mode is used because the execution address can be specified using the general purpose addressing mode. Confusion will occur unless the byte address is the same type as used in the logical space. To save the context in the control space, the general purpose addressing mode can be used in the control space.
If only the control registers in the main processor can be accessed with LDC and STC, the byte addressing mode loses its meaning and the specification becomes unnatural. In order to accommodate future plans, such unnaturalness for part of the functions is now unavoidable.
A7-2. Main Processor Control Registers
The mnemonics and addresses of the control registers are as follows. The address of the control register is placed at 8n+4, because of the expandability of the registers to 64 bits.
______________________________________Address Register______________________________________H'0000 reservedH'0004 * PSWH'0008 reservedH'000c (*) SMRNGH'0010 reservedH'0014 (*) IMASKH'0018 reservedH'001c reservedH'0020 reserved -- EITVBHH'0024 EITVBH'0028 reserved -- JRNGVBHH'002c the data processor of reserved -- JRNGVB the present inventionH'0030 reserved -- CTXBBHH'0034 * CTXBBH'0038 reservedH'003c reservedH'0040 reserved -- SATBHH'0044 the data processor of reserved -- SATB the present inventionH'0048 reserved -- UATBHH'004c * the data processor of reserved -- UATB the present inventionH'0050 reservedH'0054 * the data processor of reserved -- LSID the present inventionH'0058 reservedH'005c reservedH'0060 reserved -- IOADDRHH'0064 / IOADDRH'0068 reserved -- IOMASKHH'006c / IOMASKH'0060 to H'007f reservedH'0080 reservedH'0084 (*) the data processor of reserved -- DCE the present inventionH'0088 reservedH'008c DIH'0090 reservedH'0094 * the data processor of reserved -- CSW the present inventionH'0098 reservedH'009c (*) the data processor of reserved -- CTXBFM the present inventionH'00a0 to H'00ff reservedH'0100 reserved -- SPIHH'0104 SPIH'0108 to H'011f reservedH'0120 reserved -- SP0HH'0124 * SP0H'0128 reserved -- SP1HH'012c * the data processor of reserved -- SP1 the present inventionH'0130 reserved -- SP2HH'0134 * the data processor of reserved -- SP2 the present inventionH'0138 reserved -- SP3HH'013c * SP3H'0140 to H'017f reservedH'0180 reserved -- ROHH'0184 * the data processor of reserved -- R0 the present inventionH'0188 reserved -- R1HH'018c * the data processor of reserved -- R1 the present invention. . . . . .H'01e0 reserved -- R12HH'01e4 * the data processor of reserved -- R12 the present inventionH'01e8 reserved -- R13HH'01ec * the data processor of reserved -- R13 the present inventionH'01f0 reserved -- R14HH'01f4 * the data processor of reserved -- R14 the present inventionH'01f8 reserved -- PCHH'01fc * the data processor of reserved -- PC the present inventionH'0200 to H'03ff reserved(H'0400 to H'07ff <<LV>>)H'0424 BBCH'042C BBPH'0534 DBCH'0484 XBP0H'048C XBP1H'0504 OBP0H'050C OBP1______________________________________H'0000 to H'03ff Main processor, MMU (TRON reserve)H'0400 to H'07ff Main processor, MMU <<LV>>H'0800 to H'0bff FPU (TRON reserve)H'0c00 to H'0fff FPU <<LV>>*means the register provided every context./ means the register which will not always be provided(address assigned).______________________________________
A7-3. Unused Bits in Control Registers
If "1" is written to the unused bits in the control registers, it is preferable to check them and to cause an EIT to occur. If they are improperly checked, it is difficult to maintain the compatibility (especially, with lower grade chips) and an overhead for checking the bits takes place. Thus, except for PSW, the data processor of the present invention does not check the unused bits.
Even for a chip with the registers whose functions are specified in <<L2>> (like CTXBFM), it does not check an error and does not always read data which is written.
Although the bits are not checked, it is important for the user to note that the bits which are not used should be filled with `0`.
A reserved function exception (RFE) occurs for PSW, if `2` is written to the unused bit `-`.
Bits `-`, `=`, and `*` in the description of the control registers mean the following:
`-`: Reserved to `0` (An exception occurs if violated.)
`+` Reserved to `1` (An exception occurs if violated.) Although `0` or `1` can be written to this bit, a reserved function error (RFE) in the instructions (such as LDC and LDCTX) occurs.
`=` Reserved to `0` (It is ignored if violated.)
`#` Reserved to `1` (It is ignored if violated.) Even if `1` or `0` is written to this bit, it is ignored. The operation when `0` or `1` is written is the same as that when `1` or `0` is written.
`*`: Any value can be written. The operation of hardware is the same as that when `=` or `#` is written. Regardless of the value written, it is ignored. Unlike `=` and `#`, this bit will not be used even if the function of the chip is extended in future. Thus, the user can write any value to this bit. It is important for the user to note that this bit should be ignored and the bit mask process should be omitted.
In IMASK, SMRNG, DI, DCE and CTXBFM, the unused bits are represented by `*`. In PSW, the unused bits are represented by `-`. In other control registers, the unused bits are represented by `=`.
In PSB and PSM, the unused fields are also represented by `-`. Thus, in LDPSB and LDPSM, a reserved function exception (RFE) occurs.
If the bit being read is `-`, `0` is read. If the bit is `=` or `*`, the value obtained is unknown. Thus the currently read value may be different from the previously read value.
A7-4. Contents of Control Registers
PSW: shown in FIG. 327.
Processor Status Word
For details, see the related chapter in this specification.
PSM,PSB
These registers are the only user accessible low order two bytes which are extracted from PSW. They are accessed with the LDPSB, LDPSM, STPSB and STPSM instructions. Only PSB and PSM of the control registers can be accessed from any ring other than ring 0.
IMASK: shown in FIG. 328.
This IMASK field, which can be independently accessed, is extracted from PSW for a different register. It is used to simplify the operation of IMASK and to enhance its performance. Even if data is written to fields other than IMASK, it is ignored.
SMRNG: shown in FIG. 329.
This SMRNG field, which can be independently accessed, is extracted from PSW for a different register. It is used to simplify the operation of SMRNG and to enhance its performance. Even if data is written to fields other than SMRNG, it is ignored.
CTXBB: shown in FIG. 330.
Context Block Base
This register points at the base address of CTXB. It is used in the LDCTX and STCTX instructions. For expansion to the data processor of the present Invention 64, as well as in the data processor of the present Invention 32, 8-byte alignment for CTXBB is required. Thus, the lower three bits of CTXBB are represented with `===`. In other words, although they are reserved as 0, violations are ignored.
DI: shown in FIG. 331.
This register shows DI (delayed interrupt) requests.
______________________________________DI = 0000 DI request after external interrupt (NMI) process with priority 0.DI = 0001 DI request after external interrupt process with priority 1.DI = 0010 DI request after external interrupt process with priority 2. . . .DI = 1110 DI request after external interrupt process with priority 15.DI = 1111 No DI request.______________________________________
DI (delayed interrupt) is a mechanism which generates external interrupt by software. It is effective for suspending various process requests which asynchronously occur and to serialize the process order. If there is a process to be started after an external interrupt with higher priority, the process can be automatically started by sending the request to DI.
DI performs the same process as DCE for an external interrupt. When IMASK of PSW is changed by an instruction like REIT, the EIT process of DI is started if DI<IMASK.
Even if data is written to a field other than DI of the register, it is ignored.
CSW: shown in FIG. 332.
Context Status Word
This register gathers the information which should be switched every context and which is not nested. This register is composed of the DCE field which represents the DCE (delayed context exception) request and the CTXBFM field which represents the CTXB format. For the CTXBFM function, see Appendix 8.
If the function of CTXBFM is not implemented, since the DCE register and CSW register deal with the same information, the CSW register may be not also implemented (an RFE occurs when accessed). At the time, although the CSW register is formally placed in CTXB, the DCE register is actually placed in CTXB.
The relationship between CSW and DCE and between CSW and CTXBFM is similar to that between PSW and IMASK and between PSW and SMRNG. CSW which compresses the information such as DCE and CTXBFM is placed to CTXB. In the data processor of the present invention, DCE=`111` is fixedly used.
DCE: shown in FIG. 333.
Delayed Context Exception
The DCE field can be independently accessed is extracted from CSW for a different register. It is used to simplify the operation of DCE and to enhance its performance. Even if data is written to fields other than DEC, it is ignored. When the context is switched, it is transferred between CTXB and the DCE register instead of the CSW register if the CSW register is not implemented. When the context is saved, the bits represented with `*` become all `0` and are written to CTXB. When the context is loaded, the bit values represented with `*` are not checked.
CTXBFM: shown in FIG. 334.
Context Block Format
The CTXBFM field, which can be independently accessed, is extracted from CSW for a different register. It is used to simplify the operation of CTXBFM and to enhance its performance. Even if data is written to fields other, it is ignored.
This register is specified in <<L2>>.
EITVB: shown in FIG. 335.
EIT Vector Base
The register represents the start of the physical address of EIT (exception and interrupt) vector table. The data processor32 of the present invention, as well as the data processor64 of the present invention, require 8-byte alignment for EITVB. Thus, the lower three bits of EITVB are represented with `===`. In other words, although they are reserved as 0, they are ignored if they are violated.
JRNGVB: shown in FIG. 336.
JRNG Vector Base
The register represents the start logical address of the vector table of the JRNG instruction. The table base address in JRNGVB, the data processor32 of the present invention, as well as the data processor64 of the present invention, require 8-byte alignment. Since the LSB of JRNGVB is an enable bit, when E is `0`, the execution of JRNG is inhibited. Thus, the low order 3 bits of JRNGVB are represented with `==E`. Although the bits represented with `=` are reserved as 0, it is ignored when violated.
SPO to SP3: shown in FIG. 337. SPI: shown in FIG. 338. IOADDR, IOMASK: shown in FIG. 339.
IO Mask
When the address translation is not performed (AT of PSW=00, 10), this register specifies the physical address of the I/O area.
If the address translation cannot be performed when the system is started, the I/O area is specified using the two registers IOADDR and IOMASK, although in the address translation with MMU, the I/O area is specified by the NC bit of PTE.
When the logical product by the physical address and IOMASK is equal to IOADDR, it is treated as the I/O area if the memory is accessed without address translation. The data of the area is not fetched and pre-fetched to the cache and the memory access that the instruction requires just accords with the practical physical memory access.
If the address translation is performed, the IOADDR and IOMASK registers are not used. If data cache and data prefetch are not conducted by the processor, it is not always necessary to use the IOADDR and IOMASK registers.
UATB: shown in FIG. 340.
Unshared region Address Translation Base
For detail, see Appendix 3.
SATB: shown in FIG. 341.
Shared region Address Translation Base
For detail, see Appendix 3.
LSID: shown in FIG. 342.
Logical Space ID
A unique number which identifies the multiple logical spaces is placed. If TLB and logical caches in multiple logical spaces are used at the same time, this number is used. The number of bits available for LSID depends on the implementation.
APPENDIX 8
CTXB of the Data Processor of the Present Invention
A8-1. What is CTXB?
The data processor of the present invention does not provide an MMU. The CTXB format that Data Processor of the present invention will support has not yet been completely decided.
If OS supports parallel processes such as tasks, processes and call routines, the information on the hardware resource is required every program for parallel processes. Since such hardware resources are used in a time sharing manner, the hardware resource information for programs which are currently executed should be saved in the memory.
In the data processor of the present invention, a program flow which is a unit of the parallel processes is named a context. The total hardware resource information saved in the memory is named a context block (CTXB).
The CTXB space can be selected from logical space (LS) and control space (CS) as options of LDCTX and STCTX instructions. For ease of describing the OS, it is acceptable to use LS. For high speed operation of the context switch and for accommodating the context switch in order to save memory in the chip, CS can be also used. However, CS will be specified when the context memory will be accommodated in future chips. Currently, the specification of CS is specified in <<L2>>. The data processor of the present invention has a CTXB base register (CTXBB) which stores the start address of CTXB for the currently executing context.
Part of the CTXB format is supported by hardware with the LDCTX and STCTX instructions.
The Data Processor 32 of the Present Invention Standard CTXB Format: shown in FIG. 343.
Generally, PC and PSW of the user program should be switched rather than those of the OS. However, PC and PSW of the user program are routinely saved in the stack when OS is evoked, because PC and PSW are placed in the stack in the above CTXB format.
If the context is switched directly at the end of the external interrupt process handler which uses SPI, to realize the preceding CTXB format, it is necessary to transfer PC and PSW with different instructions. However, in this case, with DCE and DI, when exiting from the external interrupt, the context can be switched. With this method, by specifying SPO using DCE and DI, the preceding data structure can be naturally realized.
A8-2. Variation of CTXB
The portions with `*1` to `*5` of information in CTXB vary depending on the system configuration. They are described as follows:
The content and format of CTXB may be dynamically varied by the following causes (or every context).
Configuration of OS and Presence/Absence of MMU (*1 to *3)
Since the switching of SP1 to SP3 with the context switch may be meaningless, it may be not necessary to save SP1 to SP3. In addition, it is not necessary to switch UATB and LSID in applications which do not use an MMU.
(*1) Since in JRNG to RRNG an outer ring is saved in the stack of the inner ring, a value of SP for a more outer ring than the current ring is meaningless. For a context switch which is executed only in ring 0, the value of SP1 to SP3 is meaningless. As SP0 is switched, SP1 to SP3 are also indirectly switched since SP1 to SP3 are directly or indirectly saved in the stack of SP0. On the other hand, if the context is switched in TRAPA to REIT, SP1 to SP3 should be also switched. Thus, there are two cases where SP1 to SP3 are included in CTXB.
(*2) MMU is not accommodated. In the <<L1R>> specification, UATB is not required.
(*3) LSID serves to identify multiple logical spaces. LSID is provided in the <<L2>> specification, so that there are two cases where LSID is included in CTXB.
Assignment of General Purpose Registers to be Saved (*4)
If registers, which are not used for context and the working registers used for OS, are not saved and restored for CTXB, wasteful data transfer can be prevented, so that the context switch time is shortened.
Presence/Absence of Co-Processor (*5)
Although registers of FPU differ from the general purpose registers, it should be provided for context information. Thus, CTXB may dynamically vary depending on whether the context uses FPU or not.
For a CTXB which varies, the data processor of the present invention performs the following way.
In the first version <<L1>> chips, only CSW, SP0 to SP3, and UATB are transferred with LDCTX and STCTX, while R0 to R14 are transferred with the instructions LDM and STM, so that (*4) is satisfied.
The register (CTXBFM) which identifies the current CTXB format is provided for other variations of CTXB. This register holds the information of what CTXB contains and what LDCTX and STCTX transfer. The information of CTXBFM and that of DCE are treated as the CSW register.
[CTXBFM]: shown in FIG. 344.
FR: Save the contents of the FPU registers.
Save the contexts of the FPU registers which are provided in the standard the data processor of the present invention. Especially, this function will be used when FPU will be accommodated in future chips.
RG: Save the contents of R0 to R14.
This function will especially be used when the context saving memory will be accommodated in the chip in future.
SP: Save the content of SP.
SP=00 Save the contents of SP0, SP1, SP2 and SP3.
SP=01 Reserved
SP=10 Save the contents of SP0 and SP3 (for the <<L1R>> specification).
SP=11 Save only the contents of SP0.
This function is used when OS is evoked by JRNG and to prevent wasteful data transfer of SP1 to SP3. In addition, it is used when SP1 and SP2 are not provided in <<L1R>>.
MM: Save the MMU related registers.
MM=00 Save the contents of UATB.
MM=01 Save the contents of UATB and LSID.
MM=10 Do not save the contents of the MMU related registers (for <<L1R>>).
MM=11 Reserved.
[The details of CTXBFM are still under consideration.]
In CTXB (in the standard format of <<L1>>), the contents of CSW (DCE, CTXBFM), SP0 to SP3, and UATB are transferred with LDCTX and STCTX. This operation is specified by setting CTXBFM to all zeros.
In the LDCTX instruction, the format following CTXB is determined by CTXBFM in CSW (in the new context being fetched from CTXB) and is loaded.
In the STCTX instruction, the specified value of the current CTXBFM is saved in CTXB. However, the function of CTXBFM is specified in <<L2>> for compatibility with future upgrades.
In short, the fixed CTXB is specified in <<L1>>, while the variable CTXB (upgrade compatible) is specified in <<L2>>.
Since it is not necessary to transfer the contents of SP1, SP2 and UATB, these values are not included in CTXB for the <<L1R>> chips. The values of these registers included in CTXB, can be selected by CTXBFM, however, the accommodation of CTXBFM becomes a burden to the chip. It is possible to directly specify the CTXB format by extra options for the LDCTX and STCTX instructions and to specify the availability of CTXBFM by extra options for the LDCTX and STCTX instructions.
A8-3. Software Context
Every process and every task includes the information where the OS is controlled by software. Since such information depends on the OS, it cannot be supported by hardware (LSTCTX and STCTX instructions). Such information is named the software context. In the case of ITRON, for example, the task status, address of process routine upon termination, address of exception process, wakeup count, ring area for queue configuration, and so forth are included in the software context.
If CTXB is placed in the logical space (LS), the hardware context such as general purpose registers can be treated as the software context. However, if a different space such as CS is used as the hardware context, it is necessary to place the software context at CS (in this case, the LDC and STC instructions are available) or to indirectly reference both the software context and hardware context by connecting the pointer.
APPENDIX 9
EIT Process of the Data Processor of the Present Invention
The outline of the EIT process is as follows, however, the detail is still under consideration.
The process which causes a regular program execution flow to be suspended by the hardware mechanism, and then which is asynchronously started, is called the EIT process in the data processor of the present Invention. The EIT process is breaks down into the following.
Internal interrupt (trap)
Exception Interrupt (exception)
External interrupt (interrupt)
The trap, exception and interrupt are classified depending on where an EIT occurs from the programmer's viewpoint, rather than the mechanical differences in the implementation (differences in information saved in the stack).
If the processor detects an EIT while executing instructions, it suspends the execution of sequential instructions and starts the EIT process. When the hardware of the processor detects an EIT, it causes the status of the processor to be saved in the stack and starts the EIT handler. On the other hand, the EIT process handler serves to recover the error depending on the EIT, display the error message and perform the emulation. The EIT process handler is implemented in software. Most of the EIT processes issue the REIT instruction at the end of the EIT process handler, exits to the former instruction queue being suspended and restores the process.
Instructions which have not been defined, error detection for incorrect instructions, and emulation mechanisms will all be enhanced by considering future upgrade compatibilities. Thus, if incorrect combinations of instruction formats or an attempt to execute unimplemented functions is made, they are treated as an error, so that an exception interrupt occurs.
A9-1. Types of EIT
The data processor of the present invention generates the following types of EIT.
For memory and address
Page out exception (POE) . . . The data processor of the present invention does not generate it. This EIT occurs if the PI bit of UATB, SATB, STE and PTE is 0. It includes page out, page table out, and section table out. It is a page fault exception.
Address Translation Exception (ATRE)
This EIT occurs if an error occurs during address translation. If the reserved bit pattern is used in STE and PTE, if the portion which is not used by UATB, SATB, STE and PTE or if the memory is referenced by violating the ring protection, EIT detailed information is distinguished by the information in the stack when an ATRE occurs.
Bus Access Exception (BAE)
This EIT occurs if no response takes place from the bus within a specified time while accessing an instruction or operand or if the memory cannot be accessed. It is a bus error.
Odd Address Jump Exception (OAJE)
This EIT occurs if the jump address is odd. This exception occurs in instructions where the jump address is directly assigned as an operand (such as JMP and ACB), in instructions where the return address is obtained from the stack (RTS, EXITD, RRNG, and REIT) and in the JRNG instruction. However, this exception does not occur when starting the EIT process. If the new PC is odd when the EIT process is started, a system error exception (SEE) occurs. [JRNG and EIT are still under development.]
For Instructions and Arithmetic Operations
Privileged Instruction Violation Exception (PIVE)
This exception occurs if a privileged instruction is executed from a ring other than ring 0.
<<L1>> Function Exception (L1E)
This exception occurs if the <<L1>> function is executed in a processor which does not implement the <<L1>> function. In a processor which implements the <<L1>> function, this exception does not occur and the vector number for this EIT is reserved.
Reserved Instruction Exception (RIE)
This exception occurs if an instruction and the bit pattern of an addressing mode which are currently not assigned is executed. It is an undefined instruction exception. This exception occurs. If: 1) the 64-bit size is assigned in data processor 32 of the present invention, 2) P bit is set to `1`, 3) an <<L2>> instruction which has not been implemented is executed, or 4) an option which has not been defined and implemented is assigned. This exception also occurs if an addressing mode which is inhibited by an instruction (such as an assignment of immediate by the JMP instruction) is used or if an additional mode in any level which has not been implemented.
Reserved Function Exception (RFE)
This exception occurs if the function being reserved for future extension is used in a bit pattern other than the instruction and addressing modes. A reserved function exception occurs. if: 1) `1` is written to XA and the reserved (`-`) bit for PSW, 2) the reserved value (such as SM, RNG=001) is written to the field of SMRNG, or 3) `1` is written to the PSM and PSB reserved (`-`) bits with the non-privileged instructions (LDPSB and LDPSM). In addition, if a control register which has not been implemented is accessed or if "imask.gtoreq.16" is assigned with the WAIT instruction, a reserved function exception (RFE) occurs. The exception where an error can be determined using only an instruction bit pattern (including the assignment of addressing mode and size), is treated as a reserved instruction exception (RIE). However, The exception where the status is changed depending on address and operand value is treated as a reserved function exception (RFE) when an error occurs.
Co-processor Instruction Exception (CIE)
This exception occurs if an instruction which is assigned to the co-processor is executed while the co-processor is not connected.
Co-processor Command Exception (CCE) . . . Data Processor of the present invention does not generate it.
This exception occurs if an error is detected in the interface with the co-processor.
Co-processor Execution Exception (CEE) . . . Data Processor of the present invention does not generate it.
This exception occurs if an error occurs in the execution of a co-processor instruction.
Illegal Operand Exception (IOE)
This exception occurs if an illegal operand is assigned. It also occurs if the width exceeds 32 (64) bits when a fixed length bit field instruction is assigned.
Although a jump to an odd address and zero division are considered part of the illegal operand exception, it is broken down into different exceptions, Illegal operand handling other than illegal operand exception and zero division exception, are not performed (comparison of upper bound and lower bound in the CHK instruction), An instruction is executed directly with a proper interpretation (if the count is larger in the shift instruction). However, if the result of the instruction being executed is illegal (such as an overflow), an EIT does not occur. In this case, V.sub.-- flag is set and the instruction is terminated (instructions such as ADD and MOV) or no operation is performed (such as an overflow in UNPKss).
Decimal Illegal Operand Exception (DDE)
In the signed decimal arithmetic operation instructions, this exception occurs if data other than 0 to 9 is assigned as an operand.
Although this exception is a quasi-illegal operand exception (IOE), it is classified as a different exception.
Reserved Stack Format Exception (RSFE)
This exception occurs if the number which represents the format of the EIT stack frame (FORMAT) cannot be processed by the REIT instruction when the control exits from EIT.
Ring Transition Violation Exception (RTVE) . . . the data processor of the present invention does not generate it.
This exception occurs if an illegal ring transition is attempted, such as a transition to an outer ring with the JRN instruction or a transition to an inner ring with the RRNG instruction.
If the page containing JRNGVTE is referenced with the JRNG instruction in an area which is not used, a not-used area reference error of the address translation exception (ATRE) rather than a ring transition violation exception (RTVE) occurs.
Zero Divide Exception (ZDE)
This exception occurs if the division by zero is performed.
For Debug
Debug Exception (DBE)
This exception occurs in debugging operations. It is an exception for executing the single step and setting a breakpoint of an instruction. The details of the specification are in <<LV>>.
For Trap
Trap Instruction (TRAPA)
This trap occurs with the TRAPA instruction.
There are 16 types of EIT vectors for TRAPA in accordance with the operand vectors of TRAPA.
Conditional TRAP Instruction (TRAP)
This trap occurs with the TRAP instruction.
DCE, DI
Delayed Context Exception (DCE)
This exception occurs if the value of the DCE field in the CSW register (or DCE register) is smaller than that of the SMRNG field in PSW. This exception is effective for processing various asynchronous events (completion of I/O) depending on the context.
Delayed Interrupt (DI)
This interrupt occurs if the value of the DI field in the DI register is smaller than that of the IMASK field in PSW.
This EIT is effective in processing an asynchronous event which is independent of the context.
There are 15 types of EIT vectors for the DI process every interrupt priority.
Although this EIT is an exception because it occurs by executing an instruction such as the REIT instruction, it is an interrupt because it is started irrespective of the context being executed.
Although PSW (which includes the IMASK field) depends on the context, only the IMASK field is usually used independent of the context.
Others
Reset Interrupt (RI)
This interrupt is set by an external reset signal.
System Error Exception (SEE)
This exception occurs if a fatal error occurs during the EIT process.
Interrupt
External Interrupt (EI)
This interrupt is set by a hardware signal from an off-chip sourse. Generally, the external interrupt is checked at the end of each instruction. However, in Data Processor of the present Invention, there are high level instructions where the upper limit of the execution time is not determined (variable length bit field instructions, string instructions and the QSCH instruction). In these instructions, an external interrupt can be accepted during execution of an instruction.
Fixed Vector External Interrupt (FVEI)
This interrupt is set by a hardware signal from off-chip. Each EIT vector is determined for every priority. It is an auto vector interrupt.
Reserved exceptions, illegal exceptions, and violation exceptions are distinguished as follows.
Reserved XXX Exceptions
These exceptions may be removed in future expansions. They may differ depending on the manufacturer's implementation.
Illegal XXX Exceptions
Unlike reserved exceptions, even with future function extension, these exceptions will remain. They are the same regandless of the manufacturer's implementation.
XXX Violation Exceptions
In order to protect rings, the execution is restricted.
Others
Exceptions include such as the OS and system configuration and those over multiple classifications.
A9-2. Operations of EIT
When a processor detects an EIT, EIT processing is performed under the following procedures, where reset interrupt (RI) and system error exception (SEE) are different in operation from the above. The following description is limited to the data processor 32 of the present invention, the data processor 64 of the present invention having possibility to differ in parameters or the like.
(E1) Formation of Vector Number
A processor forms therein the vector number corresponding to its EIT, where for external interrupt (EI), the EIT vector number is obtained from the off-chip, such as a peripheral LSI.
(E2) Read of EITVTE
In the data processor of the present invention, a table showing correspondence of the head address of the EIT process handler with the EIT vector number is called the EIT vector table (EITVT), one entry of which is called EITVTE. The EITVTE in the data processor of the present invention consists of 8 bytes in consideration of the degree of freedom and expansion/in the EIT processing. In the EITVTE not only the head address (PC) of the EIT process handler but also partial field of PSW can be set. Hence, EITVTE is of quasi-structure to PC+PSW. Format of EITVTE is as shown in FIG. 345.
VS (Vector SM): SM after the EIT processing, where VS is not directly SM after the EIT processing. Details will be discussed below.
VX (Vector XA): XA after the EIT processing, which is now reserved to 0 at present (negligible when contrary).
VAT (Vector AT): AT after the EIT processing.
VD (Vector DB): DB after EIT processing.
VIMASK (Vector IMASK): IMASK after the EIT processing, where VIMASK is not directly IMASK. Details will be discussed below.
VPC (Vector PC): PC after the EIT processing.
`=`: reserved to 0. (negligible when contrary)
`-`: reserved to 0. (system error exception occurs when contrary)
The processor reads EITVTE presented by the physical address of "(EIT Vector Number).times.8+EITVTB." The EI vector number formed at (E1).
(E3) Update of PSW
PSW, on the basis of EITVTE, is updated as follows:
Except for External Interrupt
min(VS, old SM).fwdarw.new SM
Selection of stack pointer.
When the stack pointer other than SPI is used prior to EIT generation, a stack pointer (SPO or SPI) which is used at the EIT process handler is selected by VS. When SPI is already used prior to EIT generation, SPI is used for EIT process handler regardless of VS. Such specification is because of consideration of a case where EIT nests.
Old RNG.fwdarw.new PRNG
00.fwdarw.new RNG.
EIT process handler is inevitably executed by the ring 0.
EITVTE has unused bits so that it is possible to specify in the future EIT entering into a ring other than the ring 0 in the future.
VX.fwdarw.New XA.
At present, fixed to 0.
VAT.fwdarw.New AT.
During the execution of EIT process handler, the existence of address conversion can be switched.
VD .fwdarw.New DB.
During the execution of EIT process handler, the environment of debug can be changedd-over.
min(VIMASK, Old IMASK) .fwdarw.New IMASK.
Even when the exception interrupt or the internal interrupt causes EIT, IMASK can be operated in the EIT processing. Using this function, the external interrupt can be inhibited simultaneously with start of EIT processing. Accordingly, this function is available for a process (for example, transfer of stack frame formed by EIT) which is carried out inseparately from EIT processing.
External Interrupt
min(VS, old SM).fwdarw.new SM
Old RNG.fwdarw.New PRNG
00.fwdarw.New RNG
VX.fwdarw.New XA
VAT.fwdarw.New AT
VD.fwdarw.New DB
min(VIMASK, Priority of the generated external interrupt).fwdarw.New IMASK.
Only this portion is different from the case other than the external interrupt.
This function can inhibit multiple interrupts of low priority. In addition, by the function of interrupt mask, the relation of the priority of generated external interrupt <old IMASK should hold.
(E4) Save of Processor Information to Stack
Old PC, old PSW prior to EIT generation and the various information (including EITNIF-EIT vector and stack format regarding the generated EIT) are saved to the stack. The stack used for the save is selected by new SM and new RNG (=00), the stack frame formed at this time is as shown in FIG. 346.
EITINF charges into 32 bits the information, such as stack frame format (FORMAT), EIT type (TYPE) and EIT vector number (VECTOR) formed by generated EIT. The existence and the contents of the added information are different in the kind of EIT from each other. The REIT instruction is performed using the FORMAT in the EITINF obtaining the information for returning to the instruction sequence prior to EIT.
In addition, one EIT stack frame formed in the data processor 64 of the present invention, is expected to consist of two long words; one long word for old PC, one long word for old PSW and EITINF.
EITINF is placed adjacent to PSW in consideration of maintaining alignment for the data processor 64 of the present invention. The reason for placing PSW at the stack top is that the XA bit saved in the stack is adapted to be readable, even when the data processor 64 of the invention has 32 bit context and 64 bit context mixed with each other in the future.
(E5) Start of EIT Process Handler
Transfer VPC to PC so as to start EIT process handler. If an EIT occurs at the instruction prefetch, the EIT processing is delayed until the instruction to be fetched is required.
On the contrary, REIT instruction at the last of EIT process handler is processed as follows and then retuned to the prior instruction sequence.
(R1) Read from Stack
Old PSW and EITINF are read from the stack. When XA bit in the PSW is 0, the context (task or process) generating EIT consists of 32 bits, whereby old PC is continuously read at 32 bit width from the stack. In addition, the data processor 32 of the present invention has all 32 bit contexts.
Furthermore, the existence of the added information is decided by FORMAT in EITINF, so that when the same exists, it is read from the stack. The added information includes EXPC, IOINF, ERADDR, ERDATA and SPI, the detailed meaning thereof depends on the implementation.
When FORMAT is of a value not supported by the processor (a value not to be generated by EIT), reserved stack format exception (RSFE) occurs.
(R2) PSW Restoration
Using the old PSW read from the stack, all the fields (SMRNG, XA, AT, DB, IMASK, PSW and PSB) of PSW is restored to the prior value of EIT generation, at which time if the old PSW includes the reserved value, the reserved function exception (RFE) occurs.
(R3) Reexecution of Storage Buffer (depending on the implementation)
Reexecution of write cycle caused by the storage buffer generating the former EIT in the REIT instruction may be carried out depending on the values of FORMAT and added information, ERADDR and ERDATA in the added information of the stack are used as the address and data information for execution of write cycle. Refer to item of EIT type description in detail.
In addition, it depends on the implementation of the processor to reexecute the storage buffer.
(R4) Return to Instruction Sequence executed when EIT is detected.
Restore old PC read from the stack to PC and restart the instruction included by PC.
At this time using the TYPE field in EITINF, the EIT type is changed to be next accepted. Such function is utilized for consistently performing the multiple EIT processing and for exactly carrying out single step operation of instruction inclusive of execution by emulation.
In addition, the VECTOR field in EITINF is not particularly used for the REIT instruction. In spite of this, VECTOR is included in EITINF because the information is provided with respect to the program of EIT processing handler.
A9-3. Types of EIT
EIT of the data processor of the present invention is classified paying attention to the position of PC when the execution is restarted after completion of EIT processing and to the priority of EIT processing, the following classification is obtained, which corresponds directly to a value of the TYPE field in EITINF.
Instruction Interrupt Type EIT (Type=0, PC undefined)
When the EIT occurs, the EIT is immediately detected to enter into the EIT processing. In the case of this EIT type, returning to the instruction sequence is not possible. RI, SEE correspond to the EIT.
Instruction Completion Type (Type=1 to 3, PC next Instruction)
The EIT, when generated, is detected after the instruction processing under execution at that time, and then enters the EIT processing. Generally, REIT instruction is executed at the last of EIT process handler for the EIT, thereby enabling the next instruction to that executed during generation of EIT to start reexecution. In addition, TYPE=1 to 3 is distinguished by the relation of priority, to which TRAP, TRAPA, DBE, DI and DCE correspond.
Instruction-Reexecution-Type EIT (TYPE=4, PC present instruction)
In this EIT case, the statuses of the processor and the memory are restored to the prior statuses of the instruction interrupted by the EIT. Generally, REIT instruction is executed at the last of EIT process handler for the EIT, whereby the instruction execution can be restarted from the instruction executed when EIT occurred, to which POE, ATRE, BAE, RIE, RFE, PIVE and IOE correspond.
The instruction-completion-type EIT relates to the instruction previously executed, and the instruction-reexecution-type EIT relates to the instruction under the present execution. Accordingly, when a plurality of EITs are generated simultaneously, the instruction-completion-type EIT must be processed in advance of others. The instruction interrupt type EIT has high priority. When such EIT is detected, it is not reasonable to process other EITs.
Hence, when the instruction-interrupt-type-EIT and other EIT are simultaneously generated, the instruction-interrupt-type-EIT must firstly be processed. After all, the priority, when plural EITs are simultaneously generated, is given in
______________________________________instruction interrupt type > instruction completiontype > instruction reexecution type,______________________________________
resulting in that TYPE=0 to 4 of EITINF directly indicate the priority of EIT.
The correspondence of the kind of EIT to TYPE is clearly decided as for RI, TRAP, but it depends on the implementation somewhat.
Accordingly, when the factor of EIT is analyzed by software, it is better not to be referred or rewritten the TYPE field.
For example, the page out exception (POE) is the instruction-reexecution-type-EIT, which usually becomes TYPE=4. However, in the processor which implements a store buffer for memory write, when POE occurs at the last write cycle in a instruction (using the store buffer), the instruction need not be reexecuted from the beginning, but the last write-in cycle only is corrected, whereby no conflict occurs in processing. Hence, POE at such case is of instruction-completion-type so that the processing of the last write cycle causing an error may be carried out in REIT instruction. In this case, POE is classified into the TYPE=1 troup. PC stacked by EIT processing is not the PC of the POE occurring instruction but the next instruction.
In the instruction-reexecution-type, when an error occurs during the execution of instruction, it is the principle to restore the state as before instruction execution and start the EIT process (TYPE=4). However, when an error occurs just before completion of instruction, the instruction is assumed to be once completed to start EIT of TYPE=1 and the remaining processing (write cycle of storage buffer) depends on REIT instruction, such implementation being possible. If such method is utilized, TYPE in POE includes two of 1 and 4. In this case, since the processing necessary for REIT instruction depends on the TYPE, the REIT instruction should correspond to the EIT type.
For this method, the data processor does not reexecute the instruction entirely with respect to the EIT caused by the error occurring at the last write cycle of the instruction, but reexecutes the last write cycle only. In this case, ERADDR or ERDATA saved in the stack as the EIT added information corresponds to the internal information saved for executing the instruction continuously.
A9-4. Stack Format of EIT
When an EIT is detected, the information for the EIT process is saved in the stack. The stack format is shown in FIG. 347.
"Other information" depends on the stack format of each EIT. It includes the information which is used to analyze the cause of EIT and which is restored from the EIT handler. The stack format correspondence is as shown in FIG. 348.
PC: Start address of the instruction to be executed after exiting from EIT by the REIT instruction.
EXPC: PC of the instruction which is executed when an EIT is detected. If a debug exception relating to the PC breakpoint occurs, the PC value of the instruction just preceding the instruction whose PC value is the same as the breakpoint to be executed.
IOINF: Information relating to I/O
Error Addr: Address of the bus cycle which causes an EIT to occur.
Error Data: Bus cycle data which causes an EIT to occur (only write).
SPI: SPI value if an EIT is detected
Format No. 0: Reserved instruction exception, reserved function exception, reserved stack format exception, ring transition violation exception, odd address jump exception, <<L1>> function exception, co-processor instruction exception, fixed vector external interrupt, delayed interrupt exception, external interrupt
Format No. 1: Bus access exception, address translation exception
Format No. 2: Debug exception, privileged instruction violation exception, zero divide exception, illegal operand exception, conditional trap instruction, trap instruction
Format No. 3: All DBG EIT's
EXPC is introduced for the following purposes: Provision of error analysis information
When EIT of TYPE=1 occurs during the write-in of storage buffer, EXPC specifies the instruction carrying out the write-in, PC having proceeded ahead.
In debug exception, PC specifies the next instruction, EXPC specifies the former instruction. Accordingly, for example, when the debug exception is adapted to start during the execution of jump instruction, a value of PC before the jump can be obtained by EXPC and that after the jump by PC.
Multiple EIT Processing
In the case of EIT, such as TRAPA of TYPE=1, the information of EXPC is not required in the process handler. However, when EIT (such as TRAPA) of TYPE=1 and EIT (such as debug exception) of TYPE=2 occur simultaneously, in EIT of TYPE=1, EXPC used at TYPE=2 must be saved. For this purpose, EXPC is saved even in TRAPA.
In this case, EXPC after execution of REIT instruction with respect to TRAPA processing does not specify the start address of REIT instruction, but must specify the restored value of old EXPC popped up from the stack. In other words, when the pending debug exception starts just after starting the REIT instruction, EXPC saved to the stack does not specify the PC of REIT instruction but must specify the PC of TRAPA instruction (this example assumes that the debug exception is masked by EITVTE of TRAPA). Also, structure of IOINF is as shown in FIG. 349.
______________________________________=: reserved to `0`.W1: indication of write retry at REIT instructionThis bit is available for EIT of memory access series(TYPE=1)W1=0 write retry necessaryW1=1 write retry unnecessaryMEL: the state where address translation exception occurs0000 no error0001 error regarding access right0010 to 1110 (reserved)1111 access error regarding 1/0 regionMEC: error code of error related to memory access0000 no error0001 unused region reference error0010 (reserved)0011 (reserved)0100 ring protection violation error regarding read0101 ring protection violation error regarding write0110 ring protection violation error regarding execution0111 (reserved)1000 unable bus access when read1001 unable bus access when writing1010 (reserved)1011 (reserved)1100 (reserved)1101 memory indirect addressing in I/O region1110 instruction execution in I/O region1111 read access across I/O region and other regions write across I/O region and other regionRW: bus cycle typeRW=0 writeRW=1 readBL: bus lock conditionBL=0 not under bus lockingBL=1 under bus lockingPA: space specificationPA=0 (reserved) . . . logical space (address conversion)PA=1 physical space (non address conversion)AT: access type of bus cycle in which EIT occursAT=000 DataAT=001 ProgramAT=010 Interrupt vector fetchAT=011 to 111 (reserved)SIZ: Data size when write retry is carried out0000 (reserved)0001 1 byte0010 2 bytes0011 3 bytes0100 4 bytes0101 to 1111 (reserved)______________________________________
A9-5. EIT Vector Table of the Data Processor of the Present Invention: refer to FIG. 350.
Entry of EIT table regarding the reset interrupt and EIT (No. 0 to 5) of DBG mode comprises an SPI value and a PC value. Entry of EIT table regarding other EITs comprises a PSW value and the PC value.
An initial value of EITVB is `FFFFF000` at the reset state, whereby the reset interrupt fetches entries (SPI, PC) from physical address `FFFFF000`.
A9-6. Error during EIT processing
When a serious error such that another EIT occurs during the EIT processing (from the occurrence of EIT to the setting of new PSW through save in condition), system error exception (SEE) is provided. Bus access exception accompanied by EITVTE, old PC, page absence exception of stack accompanied by save of old PSW, and address translation exception have possibility of being system error exception (SEE). Also, when LSB of a word including VPC of EITVTE is `1`, the system error exception is provided.
The system error exception (SEE) occurs regardless of the use of stack of either of SPI and SPO. When the page out exception occurs at the stacks SPO, the EIT processing does not continue by changing over to the stack SPI or the stack specified by EITVTE of the page absence exception.
Meanwhile, since ring transition by JRNG is not EIT, when the page out exception occurs during the JRNG processing, the stack specified by EITVTE of page out exception is used to carry out the EIT processing of page out exception. At this point, it is necessary to take care because TRAPA included in EIT processing and JRNG not included therein are different by one level in the step to be a system error (refer to FIG. 351).
Anyway, it is necessary for OS programming to assign the stack region specified by SPI to the permanent region in the memory and also the stack region specified by SPO except for the particular use too.
A9-7. Multiple EIT
Detection of EIT and processing with respect to thereto, except for EIT of TYP=0, are carried out at the end of each instruction. Accordingly, there is possibility of simultaneously detecting a plurality of EITs at the end of instruction in certain cases, which is called the multiple EIT. Herein, the multiple EIT processing order will be described.
For example, in the case where TRAPA of TYP=0 and external interrupt (EI) of TYP=3 simultaneously occur, at first, EIT processing is carried out with respect to TRAPA and the EIT processing continues with respect to EI. As a result, stack PC, PSW and stack are as shown in FIG. 352.
Hence, in this example, after the end of EIT processing, at first EI process handler is executed. After end of EI process handler, the REIT instruction placed at the last thereof, the step transfers to the TRAPA processing handler at a lower level. In other words, the TRAPA process handler of higher priority is deferred.
However, since EIT processing of TRAPA precedes in the above example, PSW is changeable to mask EI. In other words, when EITVTE of TRAPA specifies VIMASK < EI Priority, IMASK is changed in the EIT processing TRAPA, thereby not performing the EIT processing with respect to EI. In this case, the TRAPA process handler is executed. When IMASK is restored to the original value by the last REIT instruction of the handler, the EI masked is started.
Thus, EI masked by up-date of PSW during the EIT processing of high priority (of small number TYPE) comprises TYP=2 to 3 of EIT, such as, DBE, EI, DI, and DCE. On the contrary, EIT capable of being masked (EIT capable of holding processing demand) is of TYP=2 to 3 of low priority.
On the contrary, for TRAPA, the register and for holding request of EIT processing are not at all prepared. Since PC proceeds to the next instruction, TRAPA instruction cannot be reexecuted. Hence, unless the EIT processing is performed just after execution of TRAPA instruction, the request for EIT processing is lost. For the purpose of preventing this, TRAPA is TYP=1 of high priority.
The EIT of TYP=4 is for reexecuting the instruction so that when the same instruction is once more executed after completion of processing with respect to other EIT, the same EIT again occurs, whereby EIT of instruction-execution-type (TYP=4) is of the lowest priority. Accordingly, for the multiple EIT, EIT of TYP=4 need not be performed. The request of starting EIT of TYP=4 is canceled by detection of TYP=1 to 3 simultaneously occurring.
The above is different from EIT accepted just after REIT instruction execution. The REIT instruction adjusts EIT accepted just after completion of REIT instruction by TYPE of EITINF hopped from the stacks. The TYPE of EIT accepted after REIT instruction execution is as shown in FIG. 353.
Among the above, TYPE=2 is debug exception (DBE). It is meant that the debug exception is not accepted just after completion of REIT instruction execution during the EIT processing with respect to the debug exception. It is for single step execution every 1 instruction that treatment of debug exception of TYPE=2 is different as to whether or not the debug exception is just after REIT instruction execution. In this case, if the debug execution again occurs just after REIT instruction with respect to the debug exception, the debugged program is not at all promoted of execution resulting in that the debug exception only continuously occurs. Accordingly, the above-mentioned mechanism is adapted not to create the debugging exception just after REIT instruction, but to create the same after one instruction execution.
Generally, it is necessary for single step execution to have two internal conditions of executing the next instruction or starting the debugging exception. The data processor of the present invention is considered to represent the two conditions by combination of the internal condition as to whether or not it is just after REIT instruction execution with TYPE of EIT.
In addition, the single step execution on the basis of such consideration is applicable to the occurrence of other EIT simultaneously with the occurrence of debug exception.
When the EIT process handler of reserved instruction exception (RIE) carries out instruction emulation, differently from the process handler with respect to other EIT (such as page out), the debug exception should start before and behind the RIE process handler. For example, when usual instruction.fwdarw.debug exception.fwdarw.page out exception is after the single step execution, it is necessary to nextly execute the usual instruction, but when usual instruction.fwdarw.debug exception.fwdarw.reserved instruction exception (emulation), nextly the debug exception starts. The reason for this is that while the debugger or debug objective program does not at all view the page out exception, the emulation exception must be viewed as "execution of one instruction" for the debugger objective program.
For the data processor of the present invention, TYPE of EITINF is adjusted in the EIT process handler of reserved instruction exception so as to enable the aforesaid operation.
A9-8. DI of "Data Processor of the Invention"
A9-8-1. DI Operation
DI (delayed interrupt) of the data processor is an EIT occurring when the DI field in the DI register is of smaller value than that of IMASK field in PSW. Such function is effective when the asynchronous matter independent of the context is made pending so as to register the processing request only or when the process order is serialized.
The EIT vector for DI processing is prepared of 15 kinds every interrupt priority. The relation between the IMASK value and the external interrupt allowable when the flag variation occurs is as shown in FIG. 354.
It is necessary when IMASK is larger or DI is smaller to check whether or not DI is started. Accordingly, the following instructions correspond to the above:
______________________________________LDC src, @ psw; psw is address of PSW in the control space.LDC src, @ imask; imask is address of imask in the control space.LDC src, di; di is address of DI in the control spaceREITWAIT______________________________________
Among the above, for other than LDC src, @di, a value of DI field prior to execution of these instructions becomes the level of started DI (priority). The DI level affects the vector member of EIT started as DI. Also, when LDC src, @di starts DI, the DI level to be started is not the DI field value prior to LDC execution but the DI field value (src) newly set by LDC.
In addition, IMASK may change even when EIT is started (entirely including external interrupt, exception and TRAP), in which DI is not started because the IMASK value does not increase.
When DI is started, DI field is reset to 1111 (non request). Also, the IMASK field changes similarly to the occurrence of external interrupt to treat the accepted DI level as priority.
In brief,
______________________________________min (VIMASK, accepted DI level) == > new IMASK, isobtained.______________________________________
A9-8-2. Example of Using DI
Example; delayed dispatch of the Data Processor of the present invention
The data processor of the present invention, when the system call issued from the external interrupt process handler changes the state of ready queue, delays until the following dispatching (such as replacement of the register or the like) returns from the interrupt process handler, which is for avoiding conflict accompanied by the multiple interruption. Such delay is realized by D1 function.
Prerequisite
System call specified VIMASK=14 at EITVIE of TRAPA, which is for carrying out the last dispatching of system call processing by the D1 function.
The portion for processing dispatching is started by DI14.
`.vertline.` represents the state under execution and ` ` the state of intermitting execution.
General System Call Processing
This is shown in FIG. 355.
System Call from External Interrupt Handler
This is shown in FIG. 356.
If D1 function is used, the delayed dispatch processing can readily be realized, and can easily cope with the occurrence of the multiple interrupt or the nest of system call.
A9-9. DCE of Data Processor of the Present Invention
A9-9-1. Operation of DCE
DCE (Delayed Context Exception) is an EIT occurring when smaller in a value than the DCE field in the DCE register (or CSW register). This function is effective when the processing of asynchronous matter (completion of input output or the like) regarding the context is made pending so as to register the processing request only, or when the process order is serialized.
DCE field in DCE register (or CSW register) is the field for accepting the DCE request.
Since the DCE register (or CSW register) is an inherent register every context, it is possible to give separate DCE request to each context. Since DCE follows each context, DCE is not started during the processing of external interrupt independent from the context.
Also, even when DCE of higher priority is requested by other context A, unless dispatched by the context A, DCE of context A is not started. Even if the DCE request from another context B is lower in priority than the above, DCE of context B is firstly started.
The relation between the value of DCE field and DCE started at that time is as shown in FIG. 357.
In every case, DCE is started if SMRNG>DCE.
When (reserved) is specified, it actually acts as the same as DCE=000, where the programming utilizing this function should not be performed for the future extension.
When SMRNG is larger or the value of DCE field is smaller, there is possibility to start DCE. Accordingly, for the following instruction corresponding to the above condition, it is necessary to check whether or not DCE starts.
______________________________________LDC sr @ psw; psw is address of PSW in the control space.LDC src @ smrng; smrng is address of SMRNG in the control space.LDC src @ csw; csw is address of CSW in the control space, where CSW may not be provided.REITRRNG______________________________________
In addition, when EIT starts (including all the external interrupt, exception and TRAP) and JRNG is executed, SMRNG may change, but for EIT or JRNG, the value of SMRNG does not increase, whereby DCE is not started.
DCE is started as one EIT processing. When EIT of DCE is started, DCE field is reset to 111 (no request). The SMRNG field, as the same as general EIT processing, changes following EITVTE allotted to the vector number of DCE. Since DCE is processed every context, the started EIT process handler usually uses not SPI but SPO. It is possible to enter SM=0 (using SPI) at DCE processing due to setting of EITVTE, which is disposed as the problem on equipment operation and hardware is not particularly checked. When DCE is started by the REIT instruction or the RRNG instruction, the actual processing to start DCE may be performed simultaneously with REIT or RRNG, but in specification of operation, EIT is adapted to start after REIT or RRNG is once executed. For example, when DCE=110, RRNG returns from ring 1 to ring 3, then DCE is started to enter ring 0, at which time RRNG must be ring 3 but not ring 1. DCE is compared with DI or external interruption as shown in FIG. 358.
In the case where the input-output is informed of completion, the flow of starting the corresponding context DCE in the external interrupt processing routine may be caused.
It is not impossible to simulate DCE by software, but since generally PSW or PC saved on the stack must be changed, the simulation is fairly troublesome, because the interrupting program must be informed of all the stack format of the interrupted program.
A9-9-2. Nest of DCE
DCE, if the multiple nest is formed, is more effective. Hence, when a plurality of DCE requests occur, it is problematical how they are processed.
The data processor of the present invention is intended to process the nest by software.
______________________________________<<plural DCE request queuing processing example>>[when setting DCE request]if (DCE=111), thennew DCE request ==> DCE field/* when DCE request only /*else,newly created DCE request enters into DCE request queueconstituted in the order of rings.endif[when processing DCE]/* when DCE starts, 111==> DCE is obtained byhardware.if (DCE request queue is not empty), then the nextentry of DCE request queue is set to the DCE field.endif______________________________________
A9-9-3. DCE Using Example
Example: start of input-output management program
The input-output completion is informed by external interrupt so that the input-output management unit (ring 1) is to be started asychronously with respect to the process A (refer to FIG. 359). `.vertline.` represents condition during the execution, and ` ` represents condition of intermitting the execution.
Starting address of (1) is to be specified every process (context), but actually the EIT processing vector at DCE in common to the processes, whereby it is necessary that DCE request table every process is analyzed by OS and jumps thereto.
In this drawing, when the external interrupt occurs, the process A happens to be executed. When the external interrupt of input-output occurs during the execution of other processes, the start of input-output management unit at the ring 1 is delayed until dispatch to the process A is carried out.
APPENDIX 10
Instruction Bit Pattern of Data Processor of the Invention
Cautions Regarding Notation
The notation of the instruction bit pattern is as follows:
`-`: reserved to 0 (exception occurs when contrary) `+`: reserved to 1 (exception occurs when contrary) If the bit is 0(1), the processing is normal and if it is 1(0), the reserved instruction exception (RIE) occurs. `=`: reserved to 0 (negligible when contrary) `*` at Ver 0.87. `#`: reserved to 1 (negligible when contrary)
In the user's manual it is written clearly to keep the bit 0(1) for the future expansion, where actually the operation is the same even when the bit is 0(1) or 1(0).
The "negligible when contrary" is not so preferable for the architecture, which may be inevitable for the instruction bit pattern allocation, future expansibility and high speed execution of the instruction.
` `: reserved to 0 (operation is not guaranteed when contrary)
`1`: reserved to 1 (operation is not guaranteed when contrary).
In the user's manual, it is written clearly to keep the bit 0(1) for future expansion. The operation is normal when the bit is 0(1), but if the bit is 1(0), the operation is depend on the implementation.
The "operation is not guaranteed when contrary" is not so preferable for the architecture, which may be inevitable for the implementation, instruction bit pattern allocation and high speed execution of instruction. For example, a first halfword "!R" at LDATE and MULX corresponds thereto.
A10-1. Bit Allocation to Every Instruction Format
Caution regarding Bit Allocation
The data processor of the present invention is fairly different in addressing mode from each instruction, which should be checked. The bit pattern is allocated for easily distinguishing the allowable addressing mode in order to facilitate the check. An operand inhibitting the particular addressing mode is adapted to be clarified in principle only by a halfword including the operand.
P-bit is separately placed in one-by-one every operand (except for the register direct specification and immediate specification) and as to the implied stack reference, which is represented by `P` or `Q` in the instruction pattern.
However, when covered by the general instruction, the P-bit may not be placed in the instruction pattern at the abbreviation of the same instruction (only PUSH, POP and PUSHA do not have a P-bit for the stack reference).
The instruction bit pattern freely usable by each maker is shown by LVreserved, which can be utilized as the instruction not released to the user for making an interface with, for example, ICE.
The bit patterns are shown in FIG. 360.
A10-2. Regarding Detection of Reserved Instruction Exception
The patterns shown by RIE in FIG. 360 are the reserved bit pattern for future expansion. When the instruction bit pattern shown by RIE is executed, a reserved instruction exception occurs. Beside this, when the not-implemented option and size (inclusive of not-provided <<L2>>) are specified, an undefined option is specified, the `-` portion in the instruction bit pattern is made `1`, the `+` portion in the instruction bit pattern is made `0`, the `P` and `Q` bits in the instruction are made `1`, and the reserved condition (cccc) and termination condition (eeee) are specified, all the reserved instruction exceptions (RIE) occur. At present, except for exceptions LDATE and MULX or the like, all the instruction patterns are checked in principle as to the first to forth bytes, so that the pattern, when different, is treated as RIE. The fifth and sixth bytes are not checked so that the pattern, even if different, is not treated as an error.
If the first HW includes a general addressing mode and, RIE is to be detected at second HW, the second HW is placed after the extension of Ea of the first HW. This bit pattern is indicated by {RIE-X}. Regarding the patterns expected to be provided with the future function expansion and the patterns which may be different in operation from other makers' chips, an exception detection should be especially carried out.
The reason to prevent the error occurrence when such an instruction pattern is executed. Considering the above purpose, the priority of checking for the reserved instruction exception (RIE) is as follows:
.uparw. High priority
(The meaning is already decided).
Specifying the not-implemented <<L2>> function.
Specifying the 64 bit size (PR, MM, WW, SS=11) (The possibility to be utilized for instruction expansion is high).
Specifying the instruction pattern represented as RIE.
`+` of `+X` in BVPAT to BVSCH.
`-` of the second HW at the group of PSTLB to EXITD:G.
Specifying P-bit. (Almost not-utilized for instruction expansion).
`!` of the first HW'!R` at the group of LDATE to INDEX.
`+` of the second HW`+W` at the group of STATE to QINS.
`+` of the first HW`+X` at the group of PSTLB to EXITD:G.
`-` of the second HW in ACB;R, SCB:R.
.dwnarw. Low priority
The bit pattern to be checked is as described in the aforesaid specification. However, in the future the detailed specification related to detection of the reserved instruction exception is adjusted on the basis of the above purpose so that the specification may be subject to change.
In addition, it is not particularly ruled to start EIT when the instruction is read to a certain extent. Hence, even when only the first HW is apparent to start EIT, the instruction may be read up to the second HW. Also, when EIT is seen to start only by an ope-code portion (the reserved instruction exception), it is allowable to process up to the Ea extension portion.
A10-3, Index of Operand Field Name: shown in FIG. 361.
A10-4. Bit Allocation of Addressing Mode Common Bit Pattern
______________________________________Regarding the size01: 16 bits10: 32 bits11: 64 bitsAddressing Mode --00: @reg+ or the like --01: 16 bit relative indirect mode --10: 32 bit relative indirect mode --11: additional modeRegister Specification --00 (particular) --01 (SP) --10 abs or 0 --11 PCAdditional ModeEI<RX>MS PXXD<d4> `-` is a bit reserved to 0.**<RN>0* ******** Rn is index.**---01* *--***** absence of index.**---11* *--***** PC is index. Scaling by XX .noteq. 00 is not available.******** ***0<d4>: 4 bit displacement******** ***1-- --01: 1 bit displacement******** ***1-- --10: 32 bit displacement**** *** ***1--11: 64 bit displacement______________________________________
The size specifying portion of <d4> and specifying portion of disp:16, disp:32 of MISC mode are positioned at the same bit.
______________________________________Basic Mode______________________________________P000 xxxx MISC ##STR28## 0000 {RIE} 0001 {RIE} 0010 {RIE}@ads:64011 {RIE} --01 --00 @SP+(read:@SP+, write:illegal, rmw:illegal) --01 --01: @-SP(read:illegal, write:@-SP, rmw:illegal) 0110 :{RlE} 0111 :{RIE} 1000 :{RIE} --10 --01 :@ads:16 --10 --10 :@ads:32 --10 --11 :absolute additional mode --11 --00 :Imm(read @PC+, write:illegal, rmw:illegal) --11 --01 ##STR29## 1110 : @(disp: 32, PC) 1111 : PC relative additional mode0001 <Rn> :Rn --Sh1001 xxxx {RIE}P010 <Rn> @(disp:16, Rn) P=0: --ShP011 <Rn> @Rn P=0: --ShP100 <Rn> @(disp:32, Rn)P101 <d4> @(disp:4, FP) <<L2>>P110 <Rn> Register relative additiional modeP111 <d4> @(disp:4, SP) <<L2>>______________________________________
For ***1**** pattern, the extension portion is not attached.
When the undefined addressing mode is specified (including P-bit=1 in EA), the reserved instruction exception (RIE) occurs. Concretely, RIE is provided in the case of following patterns:
______________________________________[Ea] [Sh]______________________________________0000 00** 00 00**0000 011* 00 011*0000 1000 00 10000101 **** (only when <<L2>> is not provided)0111 **** (only when <<L2>> is not provided)1*** ****______________________________________
Even if the reserved pattern is specified in the additional mode, the reserved instruction exception (RIE) occurs. RIE also occurs in the following cases; <Rn>.noteq.0000,0001 at M=1; other than <d4>.noteq.0001,0010 at D=1; P=1; and XX=11.
At a level in the additional mode, if the scaling other than X2, X4 and X8 is specified, an indefinite value is placed as a temporary value depending on the implementation after the processing at that level. EIT is not provided. Also, when a <<2>> instruction is not implemented and the additional mode of five levels or more is specified, the reserved instruction exception (RIE) occurs. (under adjustment in detail, and the reserved function exception may be provided). If an unreasonable combination of addressing mode is specified (such as, JMP #imm--data, CMP#, #1), the reserved instruction exception (RIE) is provided. The case where combination of addressing mode not-executable due to the unprovided <<L2>> instruction is specified, is included in the above (a bit field instruction for specifying the register is applicable thereto).
A-10-5. Bit Allocation of Instruction Option
In any case, the initial value (an option value of 0, 00. . . ) provides the default at the assembler.
cccc: Condition specification at Bcc, TRAP/cc,
eeee: Termination condition specification at the string instruction and QSCH instruction,
p, q..: P-bit specification (Q.. when necessary operands indicates plural operands for P bit)
b: /F=0, /B=1 (BSCH, BVSCH, BVMAP, BVCPY, SCMP, SMOV, QSCH),
r: /F=0, /R=1 (SSCH),
c: /N=0, /S=1 (CHK)-CHK, `c` of change index value,
d: /0=0, /1=1 (BSCH, BVSCH)- `d` of data,
m: /NM=0, /MR=1 (QSCH)- `m` of mark,
p: /AS=0, /SS=1 (PTLB, PSTLB, LDATE) -PTLB, `p` of specific space,
Att: /PT=000, /ST=001, /AT=110, {RIE}=010 to 101, 111 (PSTLB, LDATE, STATE),
xx: /LS=00, /CS=01, {RIE}=10,11(LDCTX, STCTX).
A10-6. Condition Specification (cccc) for Bcc and TRAP/cc Instructions
The allocation of cccc value is shown in FIG. 362.
A10-7. Termination Condition Specification (eeee)
The allocation of the eeee value is shown in FIG. 363.
In the <<L2>> termination conditions which have two conditions coupled with .or., M.sub.-- flag is used to indicate either one termination condition. The M.sub.-- flag is set when the condition ends in comparison with R4, which is concretely shown in FIG. 364.
When the condition of M.sub.-- flag=1 is not satisfied and the termination condition other than the above ends, M.sub.-- flag=0 is obtained. If the termination condition of <<L2>> is not implemented, M.sub.-- flag=0 is always obtained.
A10-8. Operation code of BVMAP Instruction
This is an operation code to be placed in the low order 4-bits at R5, which is shown in FIG. 365.
A10-9. Addressing Mode Correspondence
Correspondence of the operand at each instruction with the inhibited addressing mode is shown in FIG. 366. For combination of mark O, the addressing mode thereof is usable.
For combination of mark X, if it is executed, the reserved instruction exception (RIE) occurs.
APPENDIX 11
Detail Specification of High Level Instructions and Register Values in End State
In the instruction descriptions, the detail of high level instructions, and their register values upon completion, have not been completely described. They are summarized in the following.
A11-1, Convention for Determining Specification of High Level Function Instructions
In SMOV/B, SCMP/B, BVMAP/B and BVCPY/V, there are two types of processes: one is the format of pre-decrement in accordance with @-SP, the other is the format of the post-decrement in accordance with SMOV/F and SSCH/R. While the area of H'100 to H'1ff is transferred with SMOV/B.B, if SMOV/B is specified in pre-decrement, the initial value of the register becomes H'200. If SMOV/B is specified in postdecrement, the initial value of the register becomes H'1ff.
Drawbacks of Post-Decrement
The symmetry between SMOV/F and SMOV/B and that between SCMP/F and SCMP/B breaks down. For example, if SMOV/B is executed on the string which uses the area up to H'000000ff, while with SMOV/B.B, H'000000ff is set as the initial value of the pointer. With SMOV/B.W, H'000000fc should be set as the initial value of the pointer.
Drawbacks of Pre-Decrement
The consistency of search instructions such as SSCH and BSCH breaks down. After the instruction is executed, if the last value of the pointer always points at an element which satisfies the termination condition (the element of the search result) because SSCH is used, the pre-update/post-update cannot be changed based on the process direction of /F, /B and /R. Thus, it is impossible to pre-decrement only /B. (Although SSCH/B does not exist, it is similar to the specification of BSCH/B.)
In the data processor of the present invention, the drawbacks of post-decrement should be thoroughly considered, so that SMOV/B and SCMP/B are specified in the pre-decrement.
There is another problem to be considered. There is some ambiquity as to whether SMOV, SCMP and SSCH termination conditions should end the instruction before or after the pointer is updated.
Drawbacks of terminating the instruction before the pointer is updated
If an instruction is terminated based on the element size, the pointer is updated and the instruction is terminated after the pointer points at the next element (in the case of /F, an element which is not processed), so that it does not conform to the specification. In other words, updating the pointer depends on whether the termination condition is satisfied or not. Therefore, the specification becomes complicated and it is difficult to obtain a high speed implementation.
If a search operation is successively performed after another search operation is satisfied, the pointer must be updated before the second search is perform. It also applies to SMOV and SCMP.
Drawbacks of terminating the instruction after the pointer is updated
Since the pointer value changes from that of the element which satisfies the termination condition (search condition) after an instruction is executed, this type of specification is not simple for the SSCH instruction. It is also difficult to specify the BVSCH and BSCH instructions.
In the data processor of the present invention, the drawbacks of terminating an instruction before the pointer is updated has been given much consideration. The specification is defined in such a manner that an instruction is terminated after the pointer is updated.
Thus, after the SMOV/F, SCMP/F SSCH/F and SSCH/R instructions are terminated, the pointer points at the element following the element which satisfied the termination condition. Since the pointer is updated in the pre-decrement manner for the SMOV/B and SCMP/B instructions, after an instruction is completed, the pointer points at the element where the termination condition is satisfied.
To match the specifications of BVMAP/B and BVCPY/B with those of SMOV/B and SSCMP/B, the maximum offset +1 in the bit field is specified by R1 and R4.
Since it is convenient for BVSCH and BSCH that the bit offset after the execution of the instruction directly points at the bit to be searched, /F and /B should be specified in the same manner. Since the pointer for QSCH is structured in the pre-update manner, it differs from SSCH and BSCH in the pointer update timing. The search patterns of BSCH/F (BVSCH/F), SSCH/F and QSCH/F are summarized as follows.
BSCH/F: Search data starting from where the pointer currently points. After the search operation is completed, the pointer points at the data that was searched.
SSCH/F: Search data starting from where the pointer currently points. After the search operation is completed, the pointer points to the data following the searched data.
QSCH/F: Search the data following that where the pointer is pointing. After the search operation is completed, the pointer points at the data that was searched.
In a string instruction, the element number R2 is treated as an unsigned number. By considering R2 as an unsigned number and assigning R2=0, the element number is interpreted as H'10000000 to prevent termination. This function can be used for the strcmp function in the C language. In the implementation, by considering R2 as an unsigned number, the determination of termination by the number of elements becomes easy.
On the other hand, the width of the bit field instruction is treated as signed data irrespective of the fixed length bit field instructions and variable length bit field instructions.
When executing a bit field instruction, its width is added to the offset; however, offset is signed data. If the width is unsigned data, a complicated situation such that a signed number is added to an unsigned number takes place. The element size of the string instruction is multiplied and then the result is added to the pointer, unsigned number is proper.
If the width of a variable length bit field instruction is in the range from H'80000000 to H'ffffffff, the execution of an instruction is affected by whether data is signed or unsigned. If the data is signed, the instruction is terminated by setting V.sub.-- flag. If the data is unsigned, even if the width of the data is within the range, the bit field operation is conducted. However, while the content of width is in the range from H'80000000 to H'ffffffff, if the result of offset + width is treated as singed data, an overflow already occurs. Even if the result of offset + width is treated as unsigned data (33-bit signed data), an overflow occurs depending on the value of offset. Since it is defined so that if the result of offset + width causes an overflow, the operation is not guranteed. Even if the data is treated as unsigned data, the cases where the operation is not assured may increase. If the data is unsigned data and the operation of width >H'80000000 is to be assured, the burden on hardware will increase.
Since string instructions may be terminated by termination conditions, it is possible to prevent them from getting terminated by the element size. To represent infinity (H'10000000) using `0`, it is necessary to treat the element size as unsigned data. Since there is no instruction termination element except the width for BVMAP and BVCPV, it is necessary to assign it a meaningful value. In this case, the rule where "the values in the registers are treated as signed numbers" should be applied.
Summary of Basic Rules for String Instructions and Variable Length Bit Field Instructions
In search type instructions, the timing for updating the pointer does not depend on the direction where data is searched.
In both /F and /B options of BSCH and BVSCH, after the search operation is completed, the pointer points at the bit which has been found. After the search operation is completed in both /F and /R options of SSCH, the pointer points at the element following that which is found.
For instructions with the /F option, post-increment is performed; with the /B option, the pre-decrement is performed. This method applies to SMOV, SCMP, BVMAP and BVCPY. Although SSTR and BVPAT have only the /F option, the same rule applies to them.
In the string instructions, the element size is treated as unsigned data. If it is `0`, it represents H'100000000. In the variable length bit field instructions, width is treated as signed data. Only if the content of width is in the range from H'00000001 to H'7fffffff, is an actual bit field operation performed.
A11-2. Detailed Specification of String Instructions
SMOV
The operation of SMOV is summarized as follows. If the final result is the same, it is possible to change the following memory access order (it applieds to other high level instructions). If an incorrect option is used, the operation when option /F is used (if src<dest) and that when option /B is used (if src>dest) can differ as follows.
Operation of SMOV/F
______________________________________0 ==> V.sub.-- flagrepeatR2 - 1 ==> R2mem[R0] ==> mem[R1] ==> tempR0 + size ==> R0R1 + size ==> R1compare temp with R3, R4 and set F.sub.-- flag, M.sub.-- flagaccording to eeee/* If the termination condition issatisfied,F.sub.-- flag is set to 1. */if (F.sub.-- flag = 1) then exitcheck.sub.-- interruptuntil (R2 = 0)1 ==> V.sub.-- flag______________________________________
Operation of SMOV/B
______________________________________0 ==> V.sub.-- flagrepeatR2 - 1 ==> R2R0 - size ==> R0R1 - size ==> R1mem[R0] ==> mem[R1] ==> tempcompare temp with R3, R4 and set F.sub.-- flag, M.sub.-- flagaccording to eeee/* If the termination condition issatisfied,F.sub.-- flag is set to 1. */if (F.sub.-- flag = 1) then exitcheck.sub.-- interruptuntil (R2 = 0)1 ==> V.sub.-- flag______________________________________
In SMOV, one or more elements are processed regardless of what the initial value of R2 is. The termination factors of SMOV are summarized as follows.
1. Termination by the number of elements (data) (R2) If an instruction is terminated by the number of elements, V.sub.-- flag is set to `1`. This case and the following case do not occur at the same time.
2. Termination by the termination condition When F.sub.-- flag is set to 1, the elements where the termination condition is satisfied are also transferred.
SCMP
SCMP may be terminated by mismatched data being compared, in addition to instruction terminations by the number of elements and by the termination condition. If the instruction is terminated by mismatch of two pieces of data in SCMP, as the instruction is terminated by the termination condition, after the pointer is updated, the instruction is terminated.
It is possible to satisfy both the termination condition and the termination factor due to the mismatch of two pieces of data at the same time in SCMP.
If SCMP is terminated by the number of elements, the next element is not compared. On the other hand, if the next element is mismatched or the termination condition is satisfied, the instruction is terminated as V.sub.-- flag=1, F.sub.-- flag=0 and Z.sub.-- flag=1.
If the final result is the same, the memory access order can be changed from the following order, i.e. only the equivalent operation is necessary.
Operation of SCMP/F
______________________________________0 ==> V.sub.-- flagrepeatR2 - 1 ==> R2mem[R0] ==> temp1mem[R1] ==> temp2R0 + size ==> R0R1 + size ==> R1compare temp1 with temp2 and set Z.sub.-- flag,L.sub.-- flag, X.sub.-- flag/* If data is mismatched, Z.sub.-- flag is set to 0. */compare temp1 with R3, R4 and set F.sub.-- flag,M.sub.-- flag according to eeee/* If the termination condition is satisfied,F.sub.-- flag is set to 1. */if (F.sub.-- flag = 1 .or. Z.sub.-- flag = 0) then exit/* The instruction is terminated if thetermination condition is satisfied ordata is mismatched. */check.sub.-- interruptuntil (R2 =0)1 ==> V.sub.-- flag______________________________________
Operation of SCMP/B
______________________________________0 ==> V.sub.-- flagrepeatR2 - 1 ==> R2R0 - size ==> R0R1 - size ==> R1mem[R0] ==> temp1mem[R1] ==> temp2compare temp1 with temp2 and set Z.sub.-- flag,L.sub.-- flag, X.sub.-- flag/* If data is mismatched, Z.sub.-- flag is set to 0. */compare temp1 with R3, R4 and set F.sub.-- flag, M.sub.-- flagaccording to eeee/* If the termination condition is satisfied,F.sub.-- flag is set to 1. */if (F.sub.-- flag = 1 .or. Z.sub.-- flag = 0) then exit/* The instruction is terminated if thetermination condition is satisfied ordata is mismatched. */check.sub.-- interruptuntil (R2 =0)1 ==> V.sub.-- flag______________________________________
The termination factors of SCMP are summarized as follows.
1. Termination by the number of elements (data) (R2)
The status flags are set as follows. Z.sub.-- flag=1, F.sub.-- flag=0 and V.sub.-- flag=1. Cases 2 and 3 can not occur at the same time as this one.
2. Termination by the termination condition
F.sub.-- flag is set to `1` and V.sub.-- flag is set to `0`. The elements which satisfy the termination condition are also compared. The result of comparison is sent to Z.sub.-- flag, L.sub.-- flag and X.sub.-- flag. If the result is mismatched, it means that the two termination factors 2 and 3 are satisfied at the same time.
3. Termination by mismatch of elements being compared The comparison result of mismatched elements is set to Z.sub.-- flag (=0), L.sub.-- flag and X.sub.-- flag. V.sub.-- flag is set to `0`.
SSCH
If SSCH is terminated by the termination condition (search condition), in both options /F and /R, the pointer points at the element following that where the termination condition is satisfied. If SSCH is terminated by the number of elements, the pointer points at the next element after the instruction is executed.
The operation of SSCH is summarized as follows.
Operation of SSCH/F
______________________________________0 ==> V.sub.-- flagrepeatR2 - 1 ==> R2mem[R0] ==> tempR0 + size ==> R0compare temp with R3, R4 and set F.sub.-- flag, M.sub.-- flagaccording to eeee/* If the termination condition is satisfied,F.sub.-- flag is set to 1. */if (F.sub.-- flag = 1) then exit/* The instruction is terminated by thetermination condition (search condition). */check.sub.-- interruptuntil (R2 =0)1 ==> V.sub.-- flag______________________________________
Operation of SSCH/R
______________________________________0 ==> V.sub.-- flagrepeatR2 - 1 ==> R2mem[R0] ==> tempR0 + R5 ==> R0compare temp with R3, R4 and set F.sub.-- flag, M.sub.-- flagaccording to eeee/* If the termination condition is satisfied,F.sub.-- flag is set to 1. */if (F.sub.-- flag = 1) then exit/* The instruction is terminated by thetermination condition (search condition). */check.sub.-- interruptuntil (R2 =0)1 ==> V.sub.-- flag______________________________________
The termination factors of SSCH are summarized as follows.
1. Termination by the number of elements (data) (R2) V.sub.-- flag is set to `1`. The cases 1 and 2 do not occur at the same time.
2. Termination by termination condition (search condition) F.sub.-- flag is set to `1`.
SSTR
In SSTR, the status flags are not changed. The operation of SSCH is summarized as follows.
Operation of SSTR
______________________________________ repeat R2 - 1 ==> R2 R3 ==> mem[R1] R1 + size ==> R1 Check.sub.-- interrupt until (R2 = 0)______________________________________
A11-3. Register Values upon Completion of High level Instructions
If a high level function instruction is executed in data processor of the present invention, when the instruction is terminated, the value of each register changes as follows. RXinit represents the value of register RX before the instruction is executed. In addition, RX end represents the value of register RX after the instruction is executed.
BVSCH
If /F is used, the offset range from R1init to R1init+ R2init-1 is searched.
If /B is used, the offset range from R1init to R1init-R2init+1 is searched.
If R2init (width).ltoreq.0, V.sub.-- flag is set and the instruction is terminated. However, R1 and R2 are not changed.
If the search operation is successfully terminated:
______________________________________R0 (base address): Not changedR1 (offset): Search result. Bit offset of the bit being found.R2 (width): Total bit field length. In short, in /F, R2init + R1init - R1init - R1end; in /B, R2init - R1init + R1end.______________________________________
If the search operation is not successfully terminated:
______________________________________R0 (base address): Not changedR1 (offset): Offset of the bit following that which is last searched. In short, in /F, R1init + R2init; in /B, R1init - R2init. This is the same as BSCH. -R2 (width): 0______________________________________
BVMAP, BVCPY
If /F is used, the area with a bit offset of R1init to R1init+R2init-1 becomes src; the area with a bit offset of R4init to R4init+R2init-1 becomes dest. If /B is used, the area with a bit offset of R1init-1 to R1init-R2init becomes src; the area with a bit offset of R4init-1 to R4init-R2init becomes dest. If R2init (width).ltoreq.0, the instruction is terminated. R1, R2 and R4 are not changed.
______________________________________R0 (src base): Not changedR1 (src offset): If /F is used, R1init + R2init; if /B is used, R1init - R2initR2 (width): 0R3 (dest base): Not changedR4 (dest offset): If /F is used, R4init + R2init; if /B is used, R4init - R2init.R5 (type of operation): Not changed (only for BVMAP)______________________________________
BVPAT
The area with the bit offset of R4init to R4init+R2init-1 becomes dest.
If R2init (width).ltoreq.0, the instruction is terminated. R2 and R4 are not changed.
______________________________________R0 (pattern): Not changedR2 (width): 0R3 (dest base): Not changedR4 (dest offset): R4init + R2initR5 (type of operation): Not changed______________________________________
SMOV
If /F is used, the area with the following addresses is src;
R0init to R0init+R2init * element.sub.-- size-1
the area with the following addresses is dest;
R1init to R1init+R2init * element.sub.-- size-1.
If /B is used, the area with the following addresses is src;
R0init-1 to R0init-R2init * element.sub.-- size
the area with the following addresses is dest;
R1init-1 to R1init-R2init * element.sub.-- size.
For example, when the string from H'0000 to H'00ff is transferred to H'0300 to H'03ff, if it is copied using SMOV/F.W, registers are as follows;
R0=H'0000, R1=H'0300 and R2=H'0040.
If it is copied using SMOV/B.W, registers are as follows;
R0=H'0100, R1=H'0400 and R2=H'0040.
However, if the termination condition is satisfied, the process is canceled immediately. The data which satisfies where the termination condition is transferred to dest.
If the instruction is terminated by the number of elements (V.sub.-- flag=1):
R0 (src address): If /F is used, R0init+R2init * element size. If /B is used, R0init-R2init * element.sub.-- size
R1 (dest address): If /F is used, R1init+R2init * element size. If /B is used, R1init-R2init * element.sub.-- size
R2 (number of elements): 0
R3 (termination condition 1): Not changed
R4 (termination condition 2): Not changed.
If the instruction is terminated because the termination condition has been satisfied (F.sub.-- flag=1): R0 (src address): If /F is used, the address of the element following that of src where the termination condition is satisfied.
If /B is used, the address of the element of src where the termination condition is satisfied.
R1 (dest address): If /F is used, the address of dest where the element following the src which satisfied the termination condition should be transferred.
If /B is used, the address of dest where the element of src which satisfied the termination condition should be transferred.
With both /F and /B, R1init+R0end-R0init. R2 (number of elements): The number of elements which has not transferred.
If /F is used, R2init-(R0end-R0init)/element.sub.-- size.
If /B is used, R2init-(R0init-R0end)/element.sub.-- size.
R3 (termination condition 1): Not changed.
R4 (termination condition 2): Not changed.
SCMP
If /F is used, the area with the following addresses is src1;
R0init to R0init+R2init * element.sub.-- size-1 the area
with the following address is src2;
R1init to R1init+R2init * element.sub.-- size-1.
If /B is used, the area with the following addresses is src1;
R0init-1 to R0init-R2init * element.sub.-- size.
the area with the following addresses is src2;
R1init-1 to R1init-R2init * element.sub.-- size.
For example, If SCMP/F.W is used to compare the string of H'0000 to H'00ff with that of H'0300 to H'03ff, registers are as follows;
R0=H'0000, R1=H'0300, and R2=H'0040.
When they are compared using SCMP/B.W, registers are as follows;
R0=H'0100, R1=H'0400, and R2=H'0040.
However, if the termination condition is satisfied, the process is canceled midway. When the termination condition is satisfied, the elements are compared and the result is set to L.sub.-- flag, X.sub.-- flag and Z.sub.-- flag. In addition, if a mismatched element is found during the comparison operation, the process is canceled midway.
If the instruction is terminated by the number of elements (V.sub.-- flag=1):
R0 (src1 address): If /F is used, R0init+R2init * element size; if /B is used, R0init-R2init * element.sub.-- size. However, if R2init<0, it is not changed.
R1 (src2 address): If /F is used, R1init+R2init * element size; if /B is used, R1init-R2init * element.sub.-- size.
R2 (number of elements): 0
R3 (termination condition 1): Not changed
R4 (termination condition 2): Not changed.
If the instruction is terminated because the termination condition has been satisfied or because there is a mismatch of the element value (F.sub.-- flag=1 .or. Z.sub.-- flag=0):
R0 (src1 address): If /F is used, the address of the element following the src1 where the termination condition is satisfied (or by mismatch). If /B is used, the address of the element of src1 where the termination condition is satisfied (or by mismatch).
R1 (src2 address): If /F is used, the address of the element of src2 which correspond to the element following the src1 where the termination condition is satisfied (or by mismatch). If /B is used, the address of the element of src2 which corresponds to the src1 where the termination condition is satisfied (or by mismatch). With both /F and /B, R1init+R0end-R0init.
R2 (number of elements): The number of elements which are not compared. If /F is used, R2init-(R0end-R0init)/element.sub.-- size; if /B is used, R2init-(R0init-R0end)/element.sub.-- size.
R3 (termination condition1): Not changed
R4 (termination condition2): Not changed.
SSCH
The area with the following addresses is searched if /F is used;
R0init to R0init+R2init * element.sub.-- size-1.
The area with the following addresses is searched every R5, if /R is used;
R0init to R0init+R5 * R2init-1.
However, if the termination (search) condition is satisfied, the process is canceled midway.
If the instruction is terminated by the number of elements (V.sub.-- flag=1):
R0 (src address): If /F is used, R0init+R2init * element.sub.-- size; if /R is used, R0init+R2init * R5 R2 (number of elements): 0
R3 (termination condition 1): Not changed
R4 (termination condition 2): Not changed
R5 (pointer update value): Not changed.
If the instruction is terminated by satisfying the termination (search) condition (F.sub.-- flag=1):
R0 (src address): The address of the element following the src which satisfies the termination condition
R2 (number of elements): Number of elements which have not been searched. If /F is used, R2init-(R0end-R0init)/element.sub.-- size. If /R is used, R2init-(R0end-R0init)/R5
R3 (termination condition 1): Not changed
R4 (termination condition 2): Not changed
R5 (pointer update value): Not changed.
SSTR
Data which is assigned by R3 is repeatedly written to the area with the following address;
R1init to R1init+R2init * element.sub.-- size-1.
Unlike other instructions, the termination condition is not assigned. In addition, the flags are not set. If R2init (width) .ltoreq.0, the instruction is immediately terminated. R1 and R2 are not changed.
R1 (dest address): R1init+R2init * element size
R2 (number of elements): 0
R3 (write data): Not changed.
QSCH
If the instruction is terminated by the queue termination value (R2) (V.sub.-- flag=1):
R0 (entry address): R2init
R1 (previous entry): The address of the entry just before (in the case of /F) or just after (in the case of /B) the entry represented with R0end.
R2 (queue termination value): Not changed
R3 (termination condition 1): Not changed
R4 (termination condition 2): Not changed
R5 (offset): Not changed
R6 (mask): Not changed
If the instruction is terminated because the termination condition (search condition) has been satisfied (F.sub.-- flag=1):
R0 (entry address): The address of the queue entry because the termination condition has been satisfied.
R1 (previous entry): The address of the entry just before the entry (in the case of /F) represented by R0end or just after the entry (in the case of /B) represented with R0end.
R2 (queue termination value): Not changed
R3 (termination condition 1): Not changed
R4 (termination condition 2): Not changed
R5 (offset): Not changed
R6 (mask): Not changed.
As seen from the above, the present invention accepts the EIT process request and fetches the information showing the internal state simultaneously with reading the head address of EIT process handler from the external memory, thereby enabling free setting of the processor's internal state when the EIT process handler starts. Also, it is easy to program that an EIT process of higher priority inhibits the same of low priority with respect to the multiple EIT process, thereby improving the degree of freedom and the facility of the programmer regarding the EIT process.
As this invention may be embodied in several forms without departing from the spirit of essential characteristics thereof, the present embodiment is therefore illustrative and not restrictive, since the scope of the invention is defined by the appended claims rather than by the description preceding them, and all changes that fall within the meets and bounds of the claims, or equivalence of such meets and bounds thereof are therefore intended to be embraced by the claims.
Claims
  • 1. In a data processor which can execute a plurality of instructions which contains at least one control register for storing information which indicates the internal state of the data processor, and which has a capability for detecting exception, interrupt, and trap events, including instruction exceptions, interrupt request signals, and execution traps of an internal interrupt instruction, said events having predefined priority levels, apparatus for handling said events comprising:
  • a read-write memory which receives address signals and control signals from said data processor for storing data and instructions of said data processor, said read-write memory storing a plurality of fetchable executable event handlers, each event handler being a sequence of instructions stored at memory locations starting at an entry address;
  • means, coupled to said memory, for storing, in said read-write memory, a first information group that includes information indicative of the data processor internal state, said first information group including at least a part of the information stored in said at least one control register;
  • means, coupled to said read-write memory, for holding an entry address of an executable event handler;
  • means, coupled to said read-write memory, for storing in said read-write memory, under program control, a second information group, different from said first information group, that includes information indicative of a data processor internal state to permit setting an internal state for each event handler under program control, said second information group stored in said read-write memory at a location obtainable when one of said fetchable event handlers is fetched; and
  • means, coupled to said read-write memory, being the same read-write memory in which said first information group is stored, for fetching from said read-write memory said second information group and for providing at least a part of said second information group to at least a part of said at least one control register in response to the fetching of an event handler and in the absence of a separate instruction for fetching said second information group.
  • 2. Apparatus, as claimed in claim 1, further comprising:
  • means, coupled to said means for fetching a second information group, for forming a new information group, using at least a part of said second information group, which is usable to define the data processor internal state at the time of starting execution of an executable event handler which has said fetched entry address.
  • 3. Apparatus, as claimed in claim 2, wherein said means for forming a new information group comprises means for comparing at least part of said first information group with at least part of said second information group.
  • 4. A data processor, as claimed in claim 1, wherein said interrupt request signal includes a first interrupt priority indication and wherein said second information group includes a second interrupt priority indication, and further comprising:
  • means for comparing said first interrupt priority indication with said second interrupt priority indication, and generating at least a portion of said new internal state based on the results of said comparison.
  • 5. A data processor, as claimed in claim 1, wherein said data processor has the capability for simultaneously detecting a first event and a second event, each of said first and second events being one of said exception, interrupt, and trap events, wherein said first event has a higher predefined priority level than said second event, said first and second events having corresponding first and second executable handlers stored in external memory, further comprising:
  • means for determining whether to execute said second handler corresponding to said second event before the execution of the first instruction of said first handler corresponding to said first event.
  • 6. A data processor, as claimed in claim 1, wherein said data processor includes an events detection device having the capability of being in one of a plurality of conditions, said data processor being capable of executing a return instruction which returns from one of said event handlers to an instruction stream, further comprising:
  • means for changing said events detection device wherein the events detection condition, after execution of said return instruction, is different from said events detection condition after execution of other instructions.
  • 7. Apparatus, as claimed in claim 1, wherein said data processor has the capability for detecting a debug exception and the capability of executing a return instruction for returning from an event handler to an instruction stream, further comprising:
  • means for preventing handling of a debug exception immediately after execution of a return instruction when said return instruction is a return from a debug exception event handler.
  • 8. Apparatus, as claimed in claim 1, wherein a plurality of said second information groups, each corresponding to one of said entry addresses, are stored in said memory.
  • 9. Apparatus, as claimed in claim 8, wherein each second information group stored in said memory is stored at a predetermined distance from each of said corresponding entry addresses.
  • 10. In a data processor which can execute a plurality of instructions and which contains at least one control register for storing information which has a capability for detecting exception, interrupt, and trap events, including instruction exceptions, interrupt request, and execution traps of an internal interrupt instruction, said events having predefined priority levels, said data processor having a read-write memory which receives address signals and control signals from said data processor for storing data and instructions of said data processor, including a plurality of executable event handlers comprising instructions, each handler being fetchable using an entry address corresponding to at least one of said events, a method for handling said events comprising:
  • selecting an event among a plurality of detected events according to said priority;
  • storing into said read-write memory a first information group that includes information indicative of the data processor internal state at the time said selected event is selected;
  • storing into said read-write memory, under progrm control, a second information group that includes information indicative of a data processor internal state;
  • fetching from said read-write memory, being the same read-write memory in which said first information group is stored, an entry address of an executable event handler corresponding to said selected event and said second information group in response to the fetching of an event handler and in the absence of a separate instruction for fetching said second information group; and
  • forming a new information group, using at least a part of said second information group, which is usable to define the data processor internal state at the time of starting executing of an executable event handler which has said fetched entry address to permit setting an internal state for each event handler.
  • 11. A method, as claimed in claim 10, wherein said step of forming a new information group comprises comparing at least part of said first information group with at least part of said second information group.
  • 12. A method, as claimed in claim 10, wherein said interrupt request signal includes a first interrupt priority indication, and wherein said second information group includes a second interrupt priority indication, further comprising:
  • comparing said first interrupt priority indication with said second interrupt priority indication, and generating at least a portion of said new internal state based on the results of said comparison.
  • 13. A method, as claimed in claim 10, wherein said data processor has the capability for simultaneously detecting first and second exception, interrupt, and trap events, wherein said first event has a higher predefined priority level than said second event, said first and second events having corresponding first and second executable handlers stored in external memory, and further comprising:
  • determining whether to start said second handler corresponding to said second event before the execution of the first instruction of said first handler corresponding to said first event.
  • 14. A method, as claimed in claim 10, wherein said data processor includes an EIT events detection device having the capability of being in one of a plurality of conditions, said data processor being capable of executing a return instruction which returns from one of said event handlers to an instruction stream, and further comprising:
  • changing said events detection device, wherein the events detection condition, after execution of said return instruction, is different from said events detection condition after execution of other instructions.
  • 15. A method, as claimed in claim 10, wherein said data processor has the capability for detecting a debug exception and the capability of executing a return instruction for returning from an event handler to an instruction stream, further comprising:
  • preventing handling of a debug exception immediately after execution of a return instruction when said return instruction is a return from a debug exception event handler.
  • 16. A method, as claimed in claim 10, wherein said step of fetching a second information group includes fetching a second information group from among a plurality of said second information groups, each corresponding to one of said entry addresses.
  • 17. A method, as claimed in claim 10, wherein said step of fetching said second information group comprises fetching a second information group from a memory location which is a predetermined distance from said corresponding entry address.
  • 18. In a data processor which can execute a plurality of instructions and which contains at least one control register for storing information which indicates the internal state of the data processor, and which has a capability for detecting exception, interrupt, and trap events, said data processor including a device for storing a current processor status word for at least partially indicating the internal state of the data processor and having a read-write memory which receives address signals and control signals from said data processor, a method for handling said events, using stored event handlers, comprising:
  • generating an address of a location in the read-write memory at which an indication of the start address of a process handler is stored;
  • storing at least a part of a candidate processor status word in a location in said read-write memory, under program control;
  • reading said part of a candidate processor status word from said location in said read-write memory, being the same read-write memory in which said indication of a start address is stored, said location being a predetermined distance from said generated address, wherein said reading is performed in response to the fetching of an EIT handler and in the absence of a separate instruction for fetching said candidate processor status word;
  • comparing said current processor status word with said candidate processor status word and forming a new processor status word based on the results of said comparing;
  • saving said current processor status word to a location in read-write memory;
  • using said new processor status word to define a new internal state for said data processor to permit setting an internal state for each event handler; and
  • starting an event handler while said data processor is in said new internal state.
  • 19. In a data processor which can execute a plurality of instructions, and which has a capability for detecting exception, interrupt and trap events, including instruction exceptions, interrupt request signals and execution traps of an internal interrupt instruction, said events having predefined priority levels, apparatus for handling said events comprising:
  • a read-write memory for storing data and instructions, including a plurality of executable event handlers comprising instructions, each handler being fetchable using an entry address corresponding to at least one of said events;
  • means, coupled to said read-write memory, for storing a first information group that includes information indicative of the data processor internal state;
  • means, coupled to said read-write memory, for storing, under program control second and third information groups in said read-write memory, said second and third information groups being different from said first information group and being different from each other, said second and third information groups each including information indicative of a data processor internal state;
  • means, coupled to said read-write memory, for holding an entry address of an executable event handler;
  • means, coupled to said read-write memory, for selecting one of said second and third information groups; and
  • means, coupled to said read-write memory, being the same read-write memory in which said first information group is stored, for fetching from said read-write memory said selected one of said second and third information groups to permit setting an internal state for each event handler in response to the fetching of said event handler and in the absence of a separate instruction for fetching said selected one of said second and third information groups.
  • 20. In a data processor which can execute a plurality of instructions which contains at least one control register for storing information which indicates the internal state of the data processor, and which has a capability for detecting an exception, interrupt, and trap events, including instruction exceptions, interrupt request signals, and execution traps of an internal interrupt instruction, said events having predefined priority levels, apparatus for handling said events comprising:
  • a memory which receives address signals and control signals from said data processor for storing data and instructions of said data processor, said memory storing a plurality of fetchable, executable event handlers, each event handler being a sequence of instructions stored at memory locations starting at an entry address;
  • means, coupled to said memory, for storing, in said memory, a first information group that includes information indicative of the data processor internal state, said information group including at least part of the information stored in said at least one control register;
  • means, coupled to said memory, for holding an entry address of an executable event handler;
  • means, coupled to said memory, for storing in said memory, under program control, a second information group, different from said first information group, that includes information indicative of a data processor internal state; and
  • means, coupled to said at least one control register, for fetching from a memory which is not a read-only memory, and storing into said at least one control register, said second information group, in response to the fetching of an event handler and in the absence of a separate instruction for fetching said second information group.
Priority Claims (1)
Number Date Country Kind
62-250216 Oct 1987 JPX
Parent Case Info

This is a continuation of application Ser. No. 07/172,035, filed Mar. 23, 1988, now abandoned.

US Referenced Citations (6)
Number Name Date Kind
4349873 Gunter et al. Sep 1982
4403284 Salarisen et al. Sep 1983
4418385 Bourrez Nov 1983
4758950 Cruess et al. Jul 1988
4768149 Konopik et al. Aug 1988
4975836 Hirosawa et al. Dec 1990
Non-Patent Literature Citations (1)
Entry
MC32-Bit Microprocessor User's Manual, Motorola Corp., Prentice-Hall, Inc.
Continuations (1)
Number Date Country
Parent 172035 Mar 1988