Mercurial > hg > truffle
comparison src/os_cpu/windows_x86/vm/windows_x86_64.ad @ 4950:9b8ce46870df
7145346: VerifyStackAtCalls is broken
Summary: Replace call_epilog() encoding with macroassembler use. Moved duplicated code to x86.ad. Fixed return_addr() definition.
Reviewed-by: never
author | kvn |
---|---|
date | Thu, 16 Feb 2012 17:12:49 -0800 |
parents | 3e8fbc61cee8 |
children | e961c11b85fe |
comparison
equal
deleted
inserted
replaced
4949:ad3b47344802 | 4950:9b8ce46870df |
---|---|
1 // | 1 // |
2 // Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. | 2 // Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved. |
3 // DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. | 3 // DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
4 // | 4 // |
5 // This code is free software; you can redistribute it and/or modify it | 5 // This code is free software; you can redistribute it and/or modify it |
6 // under the terms of the GNU General Public License version 2 only, as | 6 // under the terms of the GNU General Public License version 2 only, as |
7 // published by the Free Software Foundation. | 7 // published by the Free Software Foundation. |
65 emit_opcode(cbuf, Assembler::REX_B); | 65 emit_opcode(cbuf, Assembler::REX_B); |
66 emit_opcode(cbuf, 0xFF); | 66 emit_opcode(cbuf, 0xFF); |
67 emit_opcode(cbuf, 0xD0 | (R10_enc - 8)); | 67 emit_opcode(cbuf, 0xD0 | (R10_enc - 8)); |
68 %} | 68 %} |
69 | 69 |
70 enc_class call_epilog %{ | |
71 if (VerifyStackAtCalls) { | |
72 // Check that stack depth is unchanged: find majik cookie on stack | |
73 int framesize = | |
74 ra_->reg2offset_unchecked(OptoReg::add(ra_->_matcher._old_SP, -3*VMRegImpl::slots_per_word)); | |
75 if (framesize) { | |
76 if (framesize < 0x80) { | |
77 emit_opcode(cbuf, Assembler::REX_W); | |
78 emit_opcode(cbuf, 0x81); // cmpq [rsp+0],0xbadb1ood | |
79 emit_d8(cbuf, 0x7C); | |
80 emit_d8(cbuf, 0x24); | |
81 emit_d8(cbuf, framesize); // Find majik cookie from ESP | |
82 emit_d32(cbuf, 0xbadb100d); | |
83 } else { | |
84 emit_opcode(cbuf, Assembler::REX_W); | |
85 emit_opcode(cbuf, 0x81); // cmpq [rsp+0],0xbadb1ood | |
86 emit_d8(cbuf, 0xBC); | |
87 emit_d8(cbuf, 0x24); | |
88 emit_d32(cbuf, framesize); // Find majik cookie from ESP | |
89 emit_d32(cbuf, 0xbadb100d); | |
90 } | |
91 } | |
92 // jmp EQ around INT3 | |
93 // QQQ TODO | |
94 const int jump_around = 5; // size of call to breakpoint, 1 for CC | |
95 emit_opcode(cbuf, 0x74); | |
96 emit_d8(cbuf, jump_around); | |
97 // QQQ temporary | |
98 emit_break(cbuf); | |
99 // Die if stack mismatch | |
100 // emit_opcode(cbuf,0xCC); | |
101 } | |
102 %} | |
103 %} | |
104 | |
105 // INSTRUCTIONS -- Platform dependent | |
106 | |
107 | |
108 //----------OS and Locking Instructions---------------------------------------- | |
109 | |
110 // This name is KNOWN by the ADLC and cannot be changed. | |
111 // The ADLC forces a 'TypeRawPtr::BOTTOM' output type | |
112 // for this guy. | |
113 instruct tlsLoadP(r15_RegP dst) | |
114 %{ | |
115 match(Set dst (ThreadLocal)); | |
116 effect(DEF dst); | |
117 | |
118 size(0); | |
119 format %{ "# TLS is in R15" %} | |
120 ins_encode( /*empty encoding*/ ); | |
121 ins_pipe(ialu_reg_reg); | |
122 %} | |
123 | |
124 // Die now | |
125 instruct ShouldNotReachHere( ) | |
126 %{ | |
127 match(Halt); | |
128 // Use the following format syntax | |
129 format %{ "INT3 ; ShouldNotReachHere" %} | |
130 opcode(0xCC); | |
131 ins_encode(OpcP); | |
132 ins_pipe( pipe_slow ); | |
133 %} | 70 %} |
134 | 71 |
135 // | 72 // |
136 // Platform dependent source | 73 // Platform dependent source |
137 // | 74 // |
140 int MachCallRuntimeNode::ret_addr_offset() | 77 int MachCallRuntimeNode::ret_addr_offset() |
141 { | 78 { |
142 return 13; // movq r10,#addr; callq (r10) | 79 return 13; // movq r10,#addr; callq (r10) |
143 } | 80 } |
144 | 81 |
145 // emit an interrupt that is caught by the debugger | |
146 void emit_break(CodeBuffer &cbuf) { | |
147 cbuf.insts()->emit_int8((unsigned char) 0xcc); | |
148 } | |
149 | |
150 void MachBreakpointNode::emit(CodeBuffer &cbuf, PhaseRegAlloc *ra_) const { | |
151 emit_break(cbuf); | |
152 } | |
153 | |
154 uint MachBreakpointNode::size(PhaseRegAlloc *ra_) const { | |
155 return 1; | |
156 } | |
157 | |
158 %} | 82 %} |