comparison src/os_cpu/windows_x86/vm/windows_x86_64.ad @ 4950:9b8ce46870df

7145346: VerifyStackAtCalls is broken Summary: Replace call_epilog() encoding with macroassembler use. Moved duplicated code to x86.ad. Fixed return_addr() definition. Reviewed-by: never
author kvn
date Thu, 16 Feb 2012 17:12:49 -0800
parents 3e8fbc61cee8
children e961c11b85fe
comparison
equal deleted inserted replaced
4949:ad3b47344802 4950:9b8ce46870df
1 // 1 //
2 // Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 2 // Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
3 // DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 3 // DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 // 4 //
5 // This code is free software; you can redistribute it and/or modify it 5 // This code is free software; you can redistribute it and/or modify it
6 // under the terms of the GNU General Public License version 2 only, as 6 // under the terms of the GNU General Public License version 2 only, as
7 // published by the Free Software Foundation. 7 // published by the Free Software Foundation.
65 emit_opcode(cbuf, Assembler::REX_B); 65 emit_opcode(cbuf, Assembler::REX_B);
66 emit_opcode(cbuf, 0xFF); 66 emit_opcode(cbuf, 0xFF);
67 emit_opcode(cbuf, 0xD0 | (R10_enc - 8)); 67 emit_opcode(cbuf, 0xD0 | (R10_enc - 8));
68 %} 68 %}
69 69
70 enc_class call_epilog %{
71 if (VerifyStackAtCalls) {
72 // Check that stack depth is unchanged: find majik cookie on stack
73 int framesize =
74 ra_->reg2offset_unchecked(OptoReg::add(ra_->_matcher._old_SP, -3*VMRegImpl::slots_per_word));
75 if (framesize) {
76 if (framesize < 0x80) {
77 emit_opcode(cbuf, Assembler::REX_W);
78 emit_opcode(cbuf, 0x81); // cmpq [rsp+0],0xbadb1ood
79 emit_d8(cbuf, 0x7C);
80 emit_d8(cbuf, 0x24);
81 emit_d8(cbuf, framesize); // Find majik cookie from ESP
82 emit_d32(cbuf, 0xbadb100d);
83 } else {
84 emit_opcode(cbuf, Assembler::REX_W);
85 emit_opcode(cbuf, 0x81); // cmpq [rsp+0],0xbadb1ood
86 emit_d8(cbuf, 0xBC);
87 emit_d8(cbuf, 0x24);
88 emit_d32(cbuf, framesize); // Find majik cookie from ESP
89 emit_d32(cbuf, 0xbadb100d);
90 }
91 }
92 // jmp EQ around INT3
93 // QQQ TODO
94 const int jump_around = 5; // size of call to breakpoint, 1 for CC
95 emit_opcode(cbuf, 0x74);
96 emit_d8(cbuf, jump_around);
97 // QQQ temporary
98 emit_break(cbuf);
99 // Die if stack mismatch
100 // emit_opcode(cbuf,0xCC);
101 }
102 %}
103 %}
104
105 // INSTRUCTIONS -- Platform dependent
106
107
108 //----------OS and Locking Instructions----------------------------------------
109
110 // This name is KNOWN by the ADLC and cannot be changed.
111 // The ADLC forces a 'TypeRawPtr::BOTTOM' output type
112 // for this guy.
113 instruct tlsLoadP(r15_RegP dst)
114 %{
115 match(Set dst (ThreadLocal));
116 effect(DEF dst);
117
118 size(0);
119 format %{ "# TLS is in R15" %}
120 ins_encode( /*empty encoding*/ );
121 ins_pipe(ialu_reg_reg);
122 %}
123
124 // Die now
125 instruct ShouldNotReachHere( )
126 %{
127 match(Halt);
128 // Use the following format syntax
129 format %{ "INT3 ; ShouldNotReachHere" %}
130 opcode(0xCC);
131 ins_encode(OpcP);
132 ins_pipe( pipe_slow );
133 %} 70 %}
134 71
135 // 72 //
136 // Platform dependent source 73 // Platform dependent source
137 // 74 //
140 int MachCallRuntimeNode::ret_addr_offset() 77 int MachCallRuntimeNode::ret_addr_offset()
141 { 78 {
142 return 13; // movq r10,#addr; callq (r10) 79 return 13; // movq r10,#addr; callq (r10)
143 } 80 }
144 81
145 // emit an interrupt that is caught by the debugger
146 void emit_break(CodeBuffer &cbuf) {
147 cbuf.insts()->emit_int8((unsigned char) 0xcc);
148 }
149
150 void MachBreakpointNode::emit(CodeBuffer &cbuf, PhaseRegAlloc *ra_) const {
151 emit_break(cbuf);
152 }
153
154 uint MachBreakpointNode::size(PhaseRegAlloc *ra_) const {
155 return 1;
156 }
157
158 %} 82 %}