1 /* src/vm/jit/m68k/md.c
3 Copyright (C) 1996-2005, 2006, 2007 R. Grafl, A. Krall, C. Kruegel,
4 C. Oates, R. Obermaisser, M. Platter, M. Probst, S. Ring,
5 E. Steiner, C. Thalinger, D. Thuernbeck, P. Tomsich, C. Ullrich,
6 J. Wenninger, Institut f. Computersprachen - TU Wien
8 This file is part of CACAO.
10 This program is free software; you can redistribute it and/or
11 modify it under the terms of the GNU General Public License as
12 published by the Free Software Foundation; either version 2, or (at
13 your option) any later version.
15 This program is distributed in the hope that it will be useful, but
16 WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
25 $Id: arch.h 5330 2006-09-05 18:43:12Z edwin $
35 #include "vm/jit/codegen-common.h"
36 #include "vm/jit/md.h"
40 #include "vmcore/class.h"
41 #include "vmcore/linker.h"
42 #include "vmcore/method.h"
43 #include "mm/memory.h"
44 #include "vm/jit/asmpart.h"
46 * As a sanity measuremnt we assert the offset.h values in here as m68k gets
47 * crosscompiled for sure and noone thinks of offset.h wen changing compile flags
48 * and subtile bugs will result...
50 * m68k uses the trap instruction for hardware exceptions, need to register
51 * according signal handler
55 assert(sizeof(vm_arg) == sizevmarg);
56 assert(OFFSET(vftbl_t, baseval) == offbaseval);
57 assert(OFFSET(vftbl_t, diffval) == offdiffval);
58 assert(OFFSET(vm_arg, type) == offvmargtype);
59 assert(OFFSET(vm_arg, data) == offvmargdata);
60 assert(OFFSET(castinfo, super_baseval) == offcast_super_baseval);
61 assert(OFFSET(castinfo, super_diffval) == offcast_super_diffval);
62 assert(OFFSET(castinfo, sub_baseval) == offcast_sub_baseval);
64 #if defined(ENABLE_REPLACEMENT)
65 assert(sizeof(executionstate_t) = sizeexecutionstate);
66 assert(OFFSET(executionstate_t, pc) == offes_pc);
67 assert(OFFSET(executionstate_t, sp) == offes_sp);
68 assert(OFFSET(executionstate_t, pv) == offes_pv);
69 assert(OFFSET(executionstate_t, intregs) == offes_intregs);
70 assert(OFFSET(executionstate_t, fltregs) == offes_fltregs);
78 /* md_codegen_get_pv_from_pc ***************************************************
80 On this architecture just a wrapper function to
81 codegen_get_pv_from_pc.
83 *******************************************************************************/
84 u1* md_codegen_get_pv_from_pc(u1 *ra)
87 pv = codegen_get_pv_from_pc(ra);
92 /* md_get_method_patch_address *************************************************
94 Gets the patch address of the currently compiled method. Has to be
95 extracted from the load instructions which lead to the jump.
97 from asmpart.S (asm_vm_call_method):
98 84: 2879 0000 0000 moveal 0 <asm_vm_call_method-0x34>,%a4
102 from invokestatic / invokespecial
103 0x40290882: 247c 4029 03b4 moveal #1076429748,%a2
104 0x40290888: 4e92 jsr %a2@
107 0x40297eca: 266a 0000 moveal %a2@(0),%a3
108 0x40297ece: 246b 002c moveal %a3@(44),%a2
109 0x40297ed2: 4e92 jsr %a2@
113 *******************************************************************************/
115 u1* md_get_method_patch_address(u1 *ra, stackframeinfo *sfi, u1 *mptr)
120 if (*((u2*)(ra - 2)) == 0x4e94) { /* jsr %a4@ */
121 if (*((u2*)(ra - 6)) == 0x286b) {
122 /* found an invokevirtual */
123 /* get offset of load instruction 246b XXXX */
124 offset = *((s2*)(ra - 4));
126 /* return NULL if no mptr was specified (used for replacement) */
131 pa = mptr + offset; /* mptr contains the magic we want */
133 /* we had a moveal XXX, %a3 which is a 3 word opcode */
135 assert(*(u2*)(ra - 8) == 0x2879); /* moveal */
136 pa = *((u4*)(ra - 6)); /* another indirection ! */
138 } else if (*((u2*)(ra - 2)) == 0x4e92) { /* jsr %a2@ */
139 if (*(u2*)(ra - 8) == 0x247c) {
140 /* found a invokestatic/invokespecial */
141 pa = ((u4*)(ra - 6)); /* no indirection ! */
152 /* XXX i can't find a definition of cacheflush in any installed header files but i can find the symbol in libc */
153 /* lets extract the signature from the assembler code*/
155 000e7158 <cacheflush>:
156 e7158: 707b moveq #123,%d0
157 e715a: 2f04 movel %d4,%sp@-
158 e715c: 282f 0014 movel %sp@(20),%d4 arg
159 e7160: 2243 moveal %d3,%a1
160 e7162: 262f 0010 movel %sp@(16),%d3 arg
161 e7166: 2042 moveal %d2,%a0
162 e7168: 242f 000c movel %sp@(12),%d2 arg
163 e716c: 222f 0008 movel %sp@(8),%d1 arg
164 e7170: 4e40 trap #0 traps into system i guess
165 e7172: 2408 movel %a0,%d2
166 e7174: 2609 movel %a1,%d3
167 e7176: 281f movel %sp@+,%d4
168 e7178: 223c ffff f001 movel #-4095,%d1
169 e717e: b081 cmpl %d1,%d0
170 e7180: 6402 bccs e7184 <cacheflush+0x2c>
173 e7186: 2f00 movel %d0,%sp@-
174 e7188: 61ff fff3 82e2 bsrl 1f46c <D_MAX_EXP+0x1ec6d>
175 e718e: 209f movel %sp@+,%a0@
176 e7190: 70ff moveq #-1,%d0
177 e7192: 2040 moveal %d0,%a0
182 /* seems to have 4 arguments */
183 /* best guess: it is this syscall */
184 /* asmlinkage int sys_cacheflush (unsigned long addr, int scope, int cache, unsigned long len) */
185 /* kernel 2.6.10 with freescale patches (the one I develop against) needs a patch of */
186 /* arch/m68k/kernel/sys_m68k.c(sys_cacheflush) */
189 void DcacheFlushInvalidateCacheBlock(void *start, unsigned long size);
190 void IcacheInvalidateCacheBlock(void *start, unsigned long size);
193 sys_cacheflush (unsigned long addr, int scope, int cache, unsigned long len)
196 DcacheFlushInvalidateCacheBlock(addr, len);
197 IcacheInvalidateCacheBlock(addr, len);
202 extern int cacheflush(unsigned long addr, int scope, int cache, unsigned long len);
204 #include "asm/cachectl.h" /* found more traces of the cacheflush function */
207 void md_cacheflush(u1 *addr, s4 nbytes) { cacheflush(addr, FLUSH_SCOPE_PAGE, FLUSH_CACHE_BOTH, nbytes); }
208 void md_dcacheflush(u1 *addr, s4 nbytes) { cacheflush(addr, FLUSH_SCOPE_PAGE, FLUSH_CACHE_DATA, nbytes); }
209 void md_icacheflush(u1* addr, s4 nbytes) { cacheflush(addr, FLUSH_SCOPE_LINE, FLUSH_CACHE_INSN, nbytes); }
211 /* md_stacktrace_get_returnaddress *********************************************
213 Returns the return address of the current stackframe, specified by
214 the passed stack pointer and the stack frame size.
216 *******************************************************************************/
217 u1* md_stacktrace_get_returnaddress(u1* sp, u4 framesize)
219 /* return address is above stackpointer */
220 u1 *ra = *((u1**)(sp + framesize));
222 /* XXX: This helps for now, but it's a ugly hack
223 * the problem _may_ be: the link instruction is used
224 * by some gcc generated code, and we get an additional word
225 * on the stack, the old framepointer. Its address is somewhere
226 * near sp, but that all depends the code generated by the compiler.
227 * I'm unsure about a clean solution.
230 if (!(ra > 0x40000000 && ra < 0x80000000)) {
231 ra = *((u1**)(sp + framesize + 4));
234 /* assert(ra > 0x40000000 && ra < 0x80000000);
235 printf("XXXXXX=%x\n", ra);
241 void md_codegen_patch_branch(void) { assert(0); }
245 * These are local overrides for various environment variables in Emacs.
246 * Please do not remove this and leave it at the end of the file, where
247 * Emacs will automagically detect them.
248 * ---------------------------------------------------------------------
251 * indent-tabs-mode: t
255 * vim:noexpandtab:sw=4:ts=4: