2 * trampoline.c: JIT trampoline code
5 * Dietmar Maurer (dietmar@ximian.com)
7 * (C) 2001 Ximian, Inc.
13 #include <mono/metadata/appdomain.h>
14 #include <mono/metadata/tabledefs.h>
15 #include <mono/arch/x86/x86-codegen.h>
22 * Address of the x86 trampoline code. This is used by the debugger to check
23 * whether a method is a trampoline.
25 guint8 *mono_generic_trampoline_code = NULL;
28 * Address of a special breakpoint trampoline code for the debugger.
30 guint8 *mono_breakpoint_trampoline_code = NULL;
33 * get_unbox_trampoline:
35 * @addr: pointer to native code for @m
37 * when value type methods are called through the vtable we need to unbox the
38 * this argument. This method returns a pointer to a trampoline which does
39 * unboxing before calling the method
42 get_unbox_trampoline (MonoMethod *m, gpointer addr)
47 if (!m->signature->ret->byref && m->signature->ret->type == MONO_TYPE_VALUETYPE)
50 start = code = g_malloc (16);
52 x86_alu_membase_imm (code, X86_ADD, X86_ESP, this_pos, sizeof (MonoObject));
53 x86_jump_code (code, addr);
54 g_assert ((code - start) < 16);
60 * get_breakpoint_trampoline:
62 * @addr: pointer to native code for @m
64 * creates a special trampoline for the debugger which is used to get
65 * a breakpoint after compiling a method.
68 get_breakpoint_trampoline (MonoMethod *m, guint32 breakpoint_id, gpointer addr)
70 guint8 *code, *start, *buf;
72 if (!mono_breakpoint_trampoline_code) {
73 mono_breakpoint_trampoline_code = buf = g_malloc (13);
75 x86_call_code (buf, mono_debugger_trampoline_breakpoint_callback);
77 x86_alu_reg_imm (buf, X86_ADD, X86_ESP, 8);
80 g_assert ((buf - mono_breakpoint_trampoline_code) <= 13);
83 start = code = g_malloc (22);
84 x86_push_imm (code, addr);
85 x86_push_imm (code, breakpoint_id);
86 x86_push_imm (code, m);
87 x86_jump_code (code, mono_breakpoint_trampoline_code);
88 g_assert ((code - start) <= 22);
94 * x86_magic_trampoline:
95 * @eax: saved x86 register
96 * @ecx: saved x86 register
97 * @edx: saved x86 register
98 * @esi: saved x86 register
99 * @edi: saved x86 register
100 * @ebx: saved x86 register
101 * @code: pointer into caller code
102 * @method: the method to translate
104 * This method is called by the trampoline functions for virtual
105 * methods. It inspects the caller code to find the address of the
106 * vtable slot, then calls the JIT compiler and writes the address
107 * of the compiled method back to the vtable. All virtual methods
108 * are called with: x86_call_membase (inst, basereg, disp). We always
109 * use 32 bit displacement to ensure that the length of the call
110 * instruction is 6 bytes. We need to get the value of the basereg
111 * and the constant displacement.
114 x86_magic_trampoline (int eax, int ecx, int edx, int esi, int edi,
115 int ebx, guint8 *code, MonoMethod *m)
120 guint32 breakpoint_id;
121 gpointer addr, trampoline;
123 EnterCriticalSection (metadata_section);
124 addr = mono_compile_method (m);
125 LeaveCriticalSection (metadata_section);
128 /* go to the start of the call instruction
130 * address_byte = (m << 6) | (o << 3) | reg
131 * call opcode: 0xff address_byte displacement
136 if ((code [1] != 0xe8) && (code [3] == 0xff) && ((code [4] & 0x18) == 0x10) && ((code [4] >> 6) == 1)) {
137 reg = code [4] & 0x07;
138 disp = (signed char)code [5];
140 if ((code [0] == 0xff) && ((code [1] & 0x18) == 0x10) && ((code [1] >> 6) == 2)) {
141 reg = code [1] & 0x07;
142 disp = *((gint32*)(code + 2));
143 } else if ((code [1] == 0xe8)) {
144 breakpoint_id = mono_method_has_breakpoint (m, TRUE);
146 mono_remove_breakpoint (breakpoint_id);
147 trampoline = get_breakpoint_trampoline (m, breakpoint_id, addr);
150 *((guint32*)(code + 2)) = (guint)addr - ((guint)code + 1) - 5;
153 printf ("Invalid trampoline sequence: %x %x %x %x %x %x %x\n", code [0], code [1], code [2], code [3],
154 code [4], code [5], code [6]);
155 g_assert_not_reached ();
179 g_assert_not_reached ();
184 if (m->klass->valuetype) {
185 trampoline = *((gpointer *)o) = get_unbox_trampoline (m, addr);
187 trampoline = *((gpointer *)o) = addr;
190 breakpoint_id = mono_method_has_breakpoint (m, TRUE);
192 mono_remove_breakpoint (breakpoint_id);
193 return get_breakpoint_trampoline (m, breakpoint_id, trampoline);
200 * arch_create_jit_trampoline:
201 * @method: pointer to the method info
203 * Creates a trampoline function for virtual methods. If the created
204 * code is called it first starts JIT compilation of method,
205 * and then calls the newly created method. I also replaces the
206 * corresponding vtable entry (see x86_magic_trampoline).
208 * Returns: a pointer to the newly created code
211 arch_create_jit_trampoline (MonoMethod *method)
213 MonoDomain *domain = mono_domain_get ();
215 GHashTable *jit_code_hash;
217 /* previously created trampoline code */
221 /* we immediately compile runtime provided functions */
222 if (method->iflags & METHOD_IMPL_ATTRIBUTE_RUNTIME) {
223 method->info = mono_compile_method (method);
227 /* icalls use method->addr */
228 if ((method->iflags & METHOD_IMPL_ATTRIBUTE_INTERNAL_CALL) ||
229 (method->flags & METHOD_ATTRIBUTE_PINVOKE_IMPL)) {
232 if (!method->addr && (method->flags & METHOD_ATTRIBUTE_PINVOKE_IMPL))
233 mono_lookup_pinvoke_call (method);
235 #ifdef MONO_USE_EXC_TABLES
236 if (mono_method_blittable (method)) {
237 method->info = method->addr;
240 nm = mono_marshal_get_native_wrapper (method);
241 method->info = mono_compile_method (nm);
242 #ifdef MONO_USE_EXC_TABLES
248 /* check if we already have JITed code */
249 if (mono_jit_share_code)
250 jit_code_hash = mono_root_domain->jit_code_hash;
252 jit_code_hash = domain->jit_code_hash;
254 if ((code = g_hash_table_lookup (jit_code_hash, method))) {
255 mono_jit_stats.methods_lookups++;
259 if (!mono_generic_trampoline_code) {
260 mono_generic_trampoline_code = buf = g_malloc (256);
261 /* save caller save regs because we need to do a call */
262 x86_push_reg (buf, X86_EDX);
263 x86_push_reg (buf, X86_EAX);
264 x86_push_reg (buf, X86_ECX);
268 /* save the IP (caller ip) */
269 x86_push_membase (buf, X86_ESP, 16);
271 x86_push_reg (buf, X86_EBX);
272 x86_push_reg (buf, X86_EDI);
273 x86_push_reg (buf, X86_ESI);
274 x86_push_reg (buf, X86_EBP);
276 /* save method info */
277 x86_push_membase (buf, X86_ESP, 32);
278 /* get the address of lmf for the current thread */
279 x86_call_code (buf, mono_get_lmf_addr);
281 x86_push_reg (buf, X86_EAX);
282 /* push *lfm (previous_lmf) */
283 x86_push_membase (buf, X86_EAX, 0);
285 x86_mov_membase_reg (buf, X86_EAX, 0, X86_ESP, 4);
288 /* push the method info */
289 x86_push_membase (buf, X86_ESP, 44);
290 /* push the return address onto the stack */
291 x86_push_membase (buf, X86_ESP, 52);
293 /* save all register values */
294 x86_push_reg (buf, X86_EBX);
295 x86_push_reg (buf, X86_EDI);
296 x86_push_reg (buf, X86_ESI);
297 x86_push_membase (buf, X86_ESP, 64); /* EDX */
298 x86_push_membase (buf, X86_ESP, 64); /* ECX */
299 x86_push_membase (buf, X86_ESP, 64); /* EAX */
301 x86_call_code (buf, x86_magic_trampoline);
302 x86_alu_reg_imm (buf, X86_ADD, X86_ESP, 8*4);
304 /* restore LMF start */
305 /* ebx = previous_lmf */
306 x86_pop_reg (buf, X86_EBX);
308 x86_pop_reg (buf, X86_EDI);
309 /* *(lmf) = previous_lmf */
310 x86_mov_membase_reg (buf, X86_EDI, 0, X86_EBX, 4);
311 /* discard method info */
312 x86_pop_reg (buf, X86_ESI);
313 /* restore caller saved regs */
314 x86_pop_reg (buf, X86_EBP);
315 x86_pop_reg (buf, X86_ESI);
316 x86_pop_reg (buf, X86_EDI);
317 x86_pop_reg (buf, X86_EBX);
318 /* discard save IP */
319 x86_alu_reg_imm (buf, X86_ADD, X86_ESP, 4);
320 /* restore LMF end */
322 x86_alu_reg_imm (buf, X86_ADD, X86_ESP, 16);
324 /* call the compiled method */
325 x86_jump_reg (buf, X86_EAX);
327 g_assert ((buf - mono_generic_trampoline_code) <= 256);
330 code = buf = g_malloc (16);
331 x86_push_imm (buf, method);
332 x86_jump_code (buf, mono_generic_trampoline_code);
333 g_assert ((buf - code) <= 16);
335 /* store trampoline address */
338 mono_jit_stats.method_trampolines++;