8 #include "vm/jit/sparc64/md-abi.h"
10 #include "vm/exceptions.h"
11 #include "vm/stringlocal.h"
12 #include "vm/jit/asmpart.h"
13 #include "vm/jit/stacktrace.h"
15 #if !defined(NDEBUG) && defined(ENABLE_DISASSEMBLER)
16 #include "vm/options.h" /* XXX debug */
17 #include "vm/jit/disass.h" /* XXX debug */
20 /* shift away 13-bit immediate, mask rd and rs1 */
21 #define SHIFT_AND_MASK(instr) \
22 ((instr >> 13) & 0x60fc1)
24 #define IS_SETHI(instr) \
25 ((instr & 0xc1c00000) == 0x00800000)
27 inline s2 decode_13bit_imm(u4 instr) {
30 /* mask everything else in the instruction */
31 imm = instr & 0x00001fff;
33 /* sign extend 13-bit to 16-bit */
40 /* md_init *********************************************************************
42 Do some machine dependent initialization.
44 *******************************************************************************/
52 /* md_codegen_patch_branch *****************************************************
54 Back-patches a branch instruction.
56 *******************************************************************************/
58 void md_codegen_patch_branch(codegendata *cd, s4 branchmpc, s4 targetmpc)
62 s4 disp; /* branch displacement */
64 /* calculate the patch position */
66 mcodeptr = (s4 *) (cd->mcodebase + branchmpc);
68 /* get the instruction before the exception point */
72 /* Calculate the branch displacement. SPARC displacements regard current
73 PC as base => (branchmpc - 4 */
75 disp = (targetmpc - (branchmpc - 4)) >> 2;
78 /* check for BPcc or FBPfcc instruction */
79 if (((mcode >> 16) & 0xc1c0) == 0x0040) {
81 /* check branch displacement (19-bit)*/
83 if ((disp < (s4) 0xfffc0000) || (disp > (s4) 0x003ffff))
84 vm_abort("branch displacement is out of range: %d > +/-%d", disp, 0x003ffff);
86 /* patch the branch instruction before the mcodeptr */
88 mcodeptr[-1] |= (disp & 0x007ffff);
90 /* check for BPr instruction */
91 else if (((mcode >> 16) & 0xd1c0) == 0x00c0) {
93 /* check branch displacement (16-bit)*/
95 if ((disp < (s4) 0xffff8000) || (disp > (s4) 0x0007fff))
96 vm_abort("branch displacement is out of range: %d > +/-%d", disp, 0x0007fff);
98 /* patch the upper 2-bit of the branch displacement */
99 mcodeptr[-1] |= ((disp & 0xc000) << 6);
101 /* patch the lower 14-bit of the branch displacement */
102 mcodeptr[-1] |= (disp & 0x003fff);
110 /* md_stacktrace_get_returnaddress *********************************************
112 Returns the return address of the current stackframe, specified by
113 the passed stack pointer and the stack frame size.
115 *******************************************************************************/
117 u1 *md_stacktrace_get_returnaddress(u1 *sp, u4 framesize)
120 /* flush register windows to the stack */
123 /* the return address resides in register i7, the last register in the
124 * 16-extended-word save area
126 ra = *((u1 **) (sp + 120 + BIAS));
128 /* NOTE: on SPARC ra is the address of the call instruction */
133 u1 *md_get_framepointer(u1 *sp)
136 /* flush register windows to the stack */
139 fp = *((u1 **) (sp + 112 + BIAS));
144 u1 *md_get_pv_from_stackframe(u1 *sp)
147 /* flush register windows to the stack */
150 pv = *((u1 **) (sp + 104 + BIAS));
155 /* md_codegen_get_pv_from_pc ***************************************************
157 This reconstructs and returns the PV of a method given a return address
158 pointer. (basically, same was as the generated code following the jump does)
164 277afffe ldah pv,-2(ra)
165 237ba61c lda pv,-23012(pv)
167 *******************************************************************************/
169 u1 *md_codegen_get_pv_from_pc(u1 *ra)
178 /* get the instruction word after jump and nop */
179 mcode = *((u4 *) (ra+8) );
181 /* check if we have 2 instructions (ldah, lda) */
183 mcode_masked = SHIFT_AND_MASK(mcode);
185 if (mcode_masked == 0x40001) {
187 /* get displacement of first instruction (ldah) */
189 offset = (s4) (mcode << 16);
192 /* get displacement of second instruction (lda) */
194 mcode = *((u4 *) (ra + 1 * 4));
196 assert((mcode >> 16) == 0x237b);
198 offset = (s2) (mcode & 0x0000ffff);
202 /* get displacement of first instruction (lda) */
204 assert((mcode >> 16) == 0x237a);
206 /* mask and extend the negative sign for the 13 bit immediate */
207 offset = decode_13bit_imm(mcode);
219 /* md_get_method_patch_address *************************************************
221 Gets the patch address of the currently compiled method. The offset
222 is extracted from the load instruction(s) before the jump and added
223 to the right base address (PV or REG_METHODPTR).
225 INVOKESTATIC/SPECIAL:
227 dfdeffb8 ldx [i5 - 72],o5
234 df3e0000 ld [g2 + 0],o5
241 df39ff90 ld [g2 - 112],g2
242 df3e0018 ld [g2 + 24],o5
246 *******************************************************************************/
248 u1 *md_get_method_patch_address(u1 *ra, stackframeinfo *sfi, u1 *mptr)
250 u4 mcode, mcode_masked;
254 /* go back to the actual load instruction (1 instruction before jump) */
255 /* ra is the address of the jump instruction on SPARC */
258 /* get first instruction word on current PC */
260 mcode = *((u4 *) ra);
263 /* check if we have 2 instructions (lui) */
265 if (IS_SETHI(mcode)) {
266 /* XXX write a regression for this */
269 /* get displacement of first instruction (lui) */
271 offset = (s4) (mcode << 16);
273 /* get displacement of second instruction (daddiu) */
275 mcode = *((u4 *) (ra + 1 * 4));
277 assert((mcode >> 16) != 0x6739);
279 offset += (s2) (mcode & 0x0000ffff);
283 /* shift and maks rd */
285 mcode_masked = (mcode >> 13) & 0x060fff;
287 /* get the offset from the instruction */
289 offset = decode_13bit_imm(mcode);
291 /* check for call with rs1 == REG_METHODPTR: ldx [g2+x],pv_caller */
293 if (mcode_masked == 0x0602c5) {
294 /* in this case we use the passed method pointer */
296 /* return NULL if no mptr was specified (used for replacement) */
304 /* in the normal case we check for a `ldx [i5+x],pv_caller' instruction */
306 assert(mcode_masked == 0x0602fb);
308 printf("data segment: pv=0x%08x, offset=%d\n", sfi->pv, offset);
310 /* and get the final data segment address */
312 pa = sfi->pv + offset;
320 /* md_cacheflush ***************************************************************
322 Calls the system's function to flush the instruction and data
325 *******************************************************************************/
327 void md_cacheflush(u1 *addr, s4 nbytes)
333 /* md_dcacheflush **************************************************************
335 Calls the system's function to flush the data cache.
337 *******************************************************************************/
339 void md_dcacheflush(u1 *addr, s4 nbytes)
341 /* XXX don't know yet */
345 /* md_patch_replacement_point **************************************************
347 Patch the given replacement point.
349 *******************************************************************************/
351 #if defined(ENABLE_REPLACEMENT)
352 void md_patch_replacement_point(codeinfo *code, s4 index, rplpoint *rp, u1 *savedmcode)
360 /* restore the patched-over instruction */
361 *(u4*)(rp->pc) = *(u4*)(savedmcode);
364 /* save the current machine code */
365 *(u4*)(savedmcode) = *(u4*)(rp->pc);
367 /* build the machine code for the patch */
368 disp = ((u4*)code->replacementstubs - (u4*)rp->pc)
369 + index * REPLACEMENT_STUB_SIZE
372 mcode = (((s4)(0x00))<<30) | ((0)<<29) | ((0x8)<<25) | (0x1<<22) | (0<<20)
373 | (1 << 19 ) | ((disp) & 0x007ffff);
375 /* write the new machine code */
376 *(u4*)(rp->pc) = (u4) mcode;
379 #if !defined(NDEBUG) && defined(ENABLE_DISASSEMBLER)
387 /* flush instruction cache */
388 /* md_icacheflush(rp->pc,4); */
390 #endif /* defined(ENABLE_REPLACEMENT) */
393 * These are local overrides for various environment variables in Emacs.
394 * Please do not remove this and leave it at the end of the file, where
395 * Emacs will automagically detect them.
396 * ---------------------------------------------------------------------
399 * indent-tabs-mode: t
403 * vim:noexpandtab:sw=4:ts=4: