1 /* src/vm/jit/m68k/md.c
3 Copyright (C) 1996-2005, 2006, 2007 R. Grafl, A. Krall, C. Kruegel,
4 C. Oates, R. Obermaisser, M. Platter, M. Probst, S. Ring,
5 E. Steiner, C. Thalinger, D. Thuernbeck, P. Tomsich, C. Ullrich,
6 J. Wenninger, Institut f. Computersprachen - TU Wien
8 This file is part of CACAO.
10 This program is free software; you can redistribute it and/or
11 modify it under the terms of the GNU General Public License as
12 published by the Free Software Foundation; either version 2, or (at
13 your option) any later version.
15 This program is distributed in the hope that it will be useful, but
16 WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
25 $Id: arch.h 5330 2006-09-05 18:43:12Z edwin $
35 #include "vm/jit/codegen-common.h"
36 #include "vm/jit/md.h"
40 #include "vmcore/class.h"
41 #include "vmcore/linker.h"
42 #include "vmcore/method.h"
43 #include "mm/memory.h"
44 #include "vm/jit/asmpart.h"
46 * As a sanity measuremnt we assert the offset.h values in here as m68k gets
47 * crosscompiled for sure and noone thinks of offset.h wen changing compile flags
48 * and subtile bugs will result...
50 * m68k uses the trap instruction for hardware exceptions, need to register
51 * according signal handler
55 assert(sizeof(vm_arg) == sizevmarg);
56 assert(OFFSET(vftbl_t, baseval) == offbaseval);
57 assert(OFFSET(vftbl_t, diffval) == offdiffval);
58 assert(OFFSET(vm_arg, type) == offvmargtype);
59 assert(OFFSET(vm_arg, data) == offvmargdata);
60 assert(OFFSET(castinfo, super_baseval) == offcast_super_baseval);
61 assert(OFFSET(castinfo, super_diffval) == offcast_super_diffval);
62 assert(OFFSET(castinfo, sub_baseval) == offcast_sub_baseval);
64 #if defined(ENABLE_REPLACEMENT)
65 assert(sizeof(executionstate_t) = sizeexecutionstate);
66 assert(OFFSET(executionstate_t, pc) == offes_pc);
67 assert(OFFSET(executionstate_t, sp) == offes_sp);
68 assert(OFFSET(executionstate_t, pv) == offes_pv);
69 assert(OFFSET(executionstate_t, intregs) == offes_intregs);
70 assert(OFFSET(executionstate_t, fltregs) == offes_fltregs);
78 /* md_codegen_get_pv_from_pc ***************************************************
80 On this architecture just a wrapper function to
81 codegen_get_pv_from_pc.
83 *******************************************************************************/
84 u1* md_codegen_get_pv_from_pc(u1 *ra)
87 pv = codegen_get_pv_from_pc(ra);
92 /* md_get_method_patch_address *************************************************
94 Gets the patch address of the currently compiled method. Has to be
95 extracted from the load instructions which lead to the jump.
97 from asmpart.S (asm_vm_call_method):
98 84: 2879 0000 0000 moveal 0 <asm_vm_call_method-0x34>,%a4
102 from invokestatic / invokespecial
103 0x40290882: 247c 4029 03b4 moveal #1076429748,%a2
104 0x40290888: 4e92 jsr %a2@
107 0x40297eca: 266a 0000 moveal %a2@(0),%a3
108 0x40297ece: 246b 002c moveal %a3@(44),%a2
109 0x40297ed2: 4e92 jsr %a2@
113 *******************************************************************************/
115 u1* md_get_method_patch_address(u1 *ra, stackframeinfo *sfi, u1 *mptr)
120 if (*((u2*)(ra - 2)) == 0x4e94) { /* jsr %a4@ */
121 if (*((u2*)(ra - 6)) == 0x286b) {
122 /* found an invokevirtual */
123 /* get offset of load instruction 246b XXXX */
124 offset = *((s2*)(ra - 4));
125 pa = mptr + offset; /* mptr contains the magic we want */
127 /* we had a moveal XXX, %a3 which is a 3 word opcode */
129 assert(*(u2*)(ra - 8) == 0x2879); /* moveal */
130 pa = *((u4*)(ra - 6)); /* another indirection ! */
132 } else if (*((u2*)(ra - 2)) == 0x4e92) { /* jsr %a2@ */
133 if (*(u2*)(ra - 8) == 0x247c) {
134 /* found a invokestatic/invokespecial */
135 pa = ((u4*)(ra - 6)); /* no indirection ! */
146 /* XXX i can't find a definition of cacheflush in any installed header files but i can find the symbol in libc */
147 /* lets extract the signature from the assembler code*/
149 000e7158 <cacheflush>:
150 e7158: 707b moveq #123,%d0
151 e715a: 2f04 movel %d4,%sp@-
152 e715c: 282f 0014 movel %sp@(20),%d4 arg
153 e7160: 2243 moveal %d3,%a1
154 e7162: 262f 0010 movel %sp@(16),%d3 arg
155 e7166: 2042 moveal %d2,%a0
156 e7168: 242f 000c movel %sp@(12),%d2 arg
157 e716c: 222f 0008 movel %sp@(8),%d1 arg
158 e7170: 4e40 trap #0 traps into system i guess
159 e7172: 2408 movel %a0,%d2
160 e7174: 2609 movel %a1,%d3
161 e7176: 281f movel %sp@+,%d4
162 e7178: 223c ffff f001 movel #-4095,%d1
163 e717e: b081 cmpl %d1,%d0
164 e7180: 6402 bccs e7184 <cacheflush+0x2c>
167 e7186: 2f00 movel %d0,%sp@-
168 e7188: 61ff fff3 82e2 bsrl 1f46c <D_MAX_EXP+0x1ec6d>
169 e718e: 209f movel %sp@+,%a0@
170 e7190: 70ff moveq #-1,%d0
171 e7192: 2040 moveal %d0,%a0
176 /* seems to have 4 arguments */
177 /* best guess: it is this syscall */
178 /* asmlinkage int sys_cacheflush (unsigned long addr, int scope, int cache, unsigned long len) */
179 /* kernel 2.6.10 with freescale patches (the one I develop against) needs a patch of */
180 /* arch/m68k/kernel/sys_m68k.c(sys_cacheflush) */
183 void DcacheFlushInvalidateCacheBlock(void *start, unsigned long size);
184 void IcacheInvalidateCacheBlock(void *start, unsigned long size);
187 sys_cacheflush (unsigned long addr, int scope, int cache, unsigned long len)
190 DcacheFlushInvalidateCacheBlock(addr, len);
191 IcacheInvalidateCacheBlock(addr, len);
196 extern int cacheflush(unsigned long addr, int scope, int cache, unsigned long len);
198 #include "asm/cachectl.h" /* found more traces of the cacheflush function */
201 void md_cacheflush(u1 *addr, s4 nbytes) { cacheflush(addr, FLUSH_SCOPE_PAGE, FLUSH_CACHE_BOTH, nbytes); }
202 void md_dcacheflush(u1 *addr, s4 nbytes) { cacheflush(addr, FLUSH_SCOPE_PAGE, FLUSH_CACHE_DATA, nbytes); }
203 void md_icacheflush(u1* addr, s4 nbytes) { cacheflush(addr, FLUSH_SCOPE_LINE, FLUSH_CACHE_INSN, nbytes); }
205 /* md_stacktrace_get_returnaddress *********************************************
207 Returns the return address of the current stackframe, specified by
208 the passed stack pointer and the stack frame size.
210 *******************************************************************************/
211 u1* md_stacktrace_get_returnaddress(u1* sp, u4 framesize)
213 /* return address is above stackpointer */
214 u1 *ra = *((u1**)(sp + framesize));
216 /* XXX: This helps for now, but it's a ugly hack
217 * the problem _may_ be: the link instruction is used
218 * by some gcc generated code, and we get an additional word
219 * on the stack, the old framepointer. Its address is somewhere
220 * near sp, but that all depends the code generated by the compiler.
221 * I'm unsure about a clean solution.
224 if (!(ra > 0x40000000 && ra < 0x80000000)) {
225 ra = *((u1**)(sp + framesize + 4));
228 /* assert(ra > 0x40000000 && ra < 0x80000000);
229 printf("XXXXXX=%x\n", ra);
235 void md_codegen_patch_branch(void) { assert(0); }
239 * These are local overrides for various environment variables in Emacs.
240 * Please do not remove this and leave it at the end of the file, where
241 * Emacs will automagically detect them.
242 * ---------------------------------------------------------------------
245 * indent-tabs-mode: t
249 * vim:noexpandtab:sw=4:ts=4: