diff options
| author | 2014-04-17 21:05:34 -0400 | |
|---|---|---|
| committer | 2014-04-17 21:05:34 -0400 | |
| commit | 09ffe87360f39a76b084fe1c9bac2330d6f6f790 (patch) | |
| tree | e6e670628ad7f49eaa32008f10ea4abe89584be0 /src/core/mem_map_funcs.cpp | |
| parent | cleaned up memory interfaces a lot, removed some hackish stuff (diff) | |
| download | yuzu-09ffe87360f39a76b084fe1c9bac2330d6f6f790.tar.gz yuzu-09ffe87360f39a76b084fe1c9bac2330d6f6f790.tar.xz yuzu-09ffe87360f39a76b084fe1c9bac2330d6f6f790.zip | |
more various refactors to memory interface
Diffstat (limited to 'src/core/mem_map_funcs.cpp')
| -rw-r--r-- | src/core/mem_map_funcs.cpp | 40 |
1 files changed, 17 insertions, 23 deletions
diff --git a/src/core/mem_map_funcs.cpp b/src/core/mem_map_funcs.cpp index bb83855fe..40d9dab3a 100644 --- a/src/core/mem_map_funcs.cpp +++ b/src/core/mem_map_funcs.cpp | |||
| @@ -15,8 +15,8 @@ u32 _AddressPhysicalToVirtual(const u32 addr) { | |||
| 15 | // Our memory interface read/write functions assume virtual addresses. Put any physical address | 15 | // Our memory interface read/write functions assume virtual addresses. Put any physical address |
| 16 | // to virtual address translations here. This is obviously quite hacky... But we're not doing | 16 | // to virtual address translations here. This is obviously quite hacky... But we're not doing |
| 17 | // any MMU emulation yet or anything | 17 | // any MMU emulation yet or anything |
| 18 | if (((addr & 0xF0000000) == MEM_FCRAM_PADDR) && (addr < (MEM_FCRAM_PADDR_END))) { | 18 | if ((addr >= FCRAM_PADDR) && (addr < (FCRAM_PADDR_END))) { |
| 19 | return (addr & MEM_FCRAM_MASK) | MEM_FCRAM_VADDR; | 19 | return (addr & FCRAM_MASK) | FCRAM_VADDR; |
| 20 | } | 20 | } |
| 21 | return addr; | 21 | return addr; |
| 22 | } | 22 | } |
| @@ -40,15 +40,15 @@ inline void _Read(T &var, const u32 addr) { | |||
| 40 | } else if ((vaddr & 0xFF000000) == 0x10000000 || (vaddr & 0xFF000000) == 0x1E000000) { | 40 | } else if ((vaddr & 0xFF000000) == 0x10000000 || (vaddr & 0xFF000000) == 0x1E000000) { |
| 41 | HW::Read<T>(var, vaddr); | 41 | HW::Read<T>(var, vaddr); |
| 42 | 42 | ||
| 43 | // FCRAM | 43 | // FCRAM - application heap |
| 44 | } else if ((vaddr > MEM_FCRAM_VADDR) && (vaddr < MEM_FCRAM_VADDR_END)) { | 44 | } else if ((vaddr > HEAP_VADDR) && (vaddr < HEAP_VADDR_END)) { |
| 45 | var = *((const T*)&g_fcram[vaddr & MEM_FCRAM_MASK]); | 45 | var = *((const T*)&g_heap[vaddr & HEAP_MASK]); |
| 46 | 46 | ||
| 47 | /*else if ((vaddr & 0x3F800000) == 0x04000000) { | 47 | /*else if ((vaddr & 0x3F800000) == 0x04000000) { |
| 48 | var = *((const T*)&m_pVRAM[vaddr & VRAM_MASK]);*/ | 48 | var = *((const T*)&m_pVRAM[vaddr & VRAM_MASK]);*/ |
| 49 | 49 | ||
| 50 | } else { | 50 | } else { |
| 51 | _assert_msg_(MEMMAP, false, "unknown Read%d @ 0x%08X", sizeof(var) * 8, vaddr); | 51 | //_assert_msg_(MEMMAP, false, "unknown Read%d @ 0x%08X", sizeof(var) * 8, vaddr); |
| 52 | } | 52 | } |
| 53 | } | 53 | } |
| 54 | 54 | ||
| @@ -66,20 +66,14 @@ inline void _Write(u32 addr, const T data) { | |||
| 66 | // 0x10XXXXXX- is physical address space, 0x1EXXXXXX is virtual address space | 66 | // 0x10XXXXXX- is physical address space, 0x1EXXXXXX is virtual address space |
| 67 | } else if ((vaddr & 0xFF000000) == 0x10000000 || (vaddr & 0xFF000000) == 0x1E000000) { | 67 | } else if ((vaddr & 0xFF000000) == 0x10000000 || (vaddr & 0xFF000000) == 0x1E000000) { |
| 68 | HW::Write<T>(vaddr, data); | 68 | HW::Write<T>(vaddr, data); |
| 69 | 69 | ||
| 70 | // ExeFS:/.code is loaded here: | 70 | // FCRAM - GSP heap |
| 71 | } else if ((vaddr & 0xFFF00000) == 0x00100000) { | 71 | //} else if ((vaddr > HEAP_GSP_VADDR) && (vaddr < HEAP_VADDR_GSP_END)) { |
| 72 | // TODO(ShizZy): This is dumb... handle correctly. From 3DBrew: | 72 | // *(T*)&g_heap_gsp[vaddr & FCRAM_MASK] = data; |
| 73 | // http://3dbrew.org/wiki/Memory_layout#ARM11_User-land_memory_regions | 73 | |
| 74 | // The ExeFS:/.code is loaded here, executables must be loaded to the 0x00100000 region when | 74 | // FCRAM - application heap |
| 75 | // the exheader "special memory" flag is clear. The 0x03F00000-byte size restriction only | 75 | } else if ((vaddr > HEAP_VADDR) && (vaddr < HEAP_VADDR_END)) { |
| 76 | // applies when this flag is clear. Executables are usually loaded to 0x14000000 when the | 76 | *(T*)&g_heap[vaddr & HEAP_MASK] = data; |
| 77 | // exheader "special memory" flag is set, however this address can be arbitrary. | ||
| 78 | *(T*)&g_fcram[vaddr & MEM_FCRAM_MASK] = data; | ||
| 79 | |||
| 80 | // FCRAM | ||
| 81 | } else if ((vaddr > MEM_FCRAM_VADDR) && (vaddr < MEM_FCRAM_VADDR_END)) { | ||
| 82 | *(T*)&g_fcram[vaddr & MEM_FCRAM_MASK] = data; | ||
| 83 | 77 | ||
| 84 | } else if ((vaddr & 0xFF000000) == 0x14000000) { | 78 | } else if ((vaddr & 0xFF000000) == 0x14000000) { |
| 85 | _assert_msg_(MEMMAP, false, "umimplemented write to GSP heap"); | 79 | _assert_msg_(MEMMAP, false, "umimplemented write to GSP heap"); |
| @@ -104,9 +98,9 @@ inline void _Write(u32 addr, const T data) { | |||
| 104 | u8 *GetPointer(const u32 addr) { | 98 | u8 *GetPointer(const u32 addr) { |
| 105 | const u32 vaddr = _AddressPhysicalToVirtual(addr); | 99 | const u32 vaddr = _AddressPhysicalToVirtual(addr); |
| 106 | 100 | ||
| 107 | // FCRAM | 101 | // FCRAM - application heap |
| 108 | if ((vaddr > MEM_FCRAM_VADDR) && (vaddr < MEM_FCRAM_VADDR_END)) { | 102 | if ((vaddr > HEAP_VADDR) && (vaddr < HEAP_VADDR_END)) { |
| 109 | return g_fcram + (vaddr & MEM_FCRAM_MASK); | 103 | return g_heap + (vaddr & HEAP_MASK); |
| 110 | 104 | ||
| 111 | } else { | 105 | } else { |
| 112 | ERROR_LOG(MEMMAP, "Unknown GetPointer @ 0x%08x", vaddr); | 106 | ERROR_LOG(MEMMAP, "Unknown GetPointer @ 0x%08x", vaddr); |