mirror of
https://github.com/darlinghq/darling-JavaScriptCore.git
synced 2025-04-05 00:11:39 +00:00
820 lines
41 KiB
C++
820 lines
41 KiB
C++
/*
|
|
* Copyright (C) 2013-2019 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
|
|
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
|
|
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
|
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
|
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#if ENABLE(ASSEMBLER) && (CPU(X86) || CPU(X86_64))
|
|
#include "MacroAssembler.h"
|
|
|
|
#include "ProbeContext.h"
|
|
#include <wtf/InlineASM.h>
|
|
|
|
#if COMPILER(MSVC)
|
|
#include <intrin.h>
|
|
#endif
|
|
|
|
namespace JSC {
|
|
|
|
#if ENABLE(MASM_PROBE)
|
|
|
|
extern "C" JSC_DECLARE_JIT_OPERATION(ctiMasmProbeTrampoline, void, ());
|
|
JSC_ANNOTATE_JIT_OPERATION(ctiMasmProbeTrampolineId, ctiMasmProbeTrampoline);
|
|
|
|
// The following are offsets for Probe::State fields accessed by the ctiMasmProbeTrampoline stub.
|
|
|
|
#if CPU(X86)
|
|
#define PTR_SIZE 4
|
|
#else // CPU(X86_64)
|
|
#define PTR_SIZE 8
|
|
#endif
|
|
|
|
#define PROBE_PROBE_FUNCTION_OFFSET (0 * PTR_SIZE)
|
|
#define PROBE_ARG_OFFSET (1 * PTR_SIZE)
|
|
#define PROBE_INIT_STACK_FUNCTION_OFFSET (2 * PTR_SIZE)
|
|
#define PROBE_INIT_STACK_ARG_OFFSET (3 * PTR_SIZE)
|
|
|
|
#define PROBE_FIRST_GPR_OFFSET (4 * PTR_SIZE)
|
|
#define PROBE_CPU_EAX_OFFSET (PROBE_FIRST_GPR_OFFSET + (0 * PTR_SIZE))
|
|
#define PROBE_CPU_ECX_OFFSET (PROBE_FIRST_GPR_OFFSET + (1 * PTR_SIZE))
|
|
#define PROBE_CPU_EDX_OFFSET (PROBE_FIRST_GPR_OFFSET + (2 * PTR_SIZE))
|
|
#define PROBE_CPU_EBX_OFFSET (PROBE_FIRST_GPR_OFFSET + (3 * PTR_SIZE))
|
|
#define PROBE_CPU_ESP_OFFSET (PROBE_FIRST_GPR_OFFSET + (4 * PTR_SIZE))
|
|
#define PROBE_CPU_EBP_OFFSET (PROBE_FIRST_GPR_OFFSET + (5 * PTR_SIZE))
|
|
#define PROBE_CPU_ESI_OFFSET (PROBE_FIRST_GPR_OFFSET + (6 * PTR_SIZE))
|
|
#define PROBE_CPU_EDI_OFFSET (PROBE_FIRST_GPR_OFFSET + (7 * PTR_SIZE))
|
|
|
|
#if CPU(X86)
|
|
#define PROBE_FIRST_SPR_OFFSET (PROBE_FIRST_GPR_OFFSET + (8 * PTR_SIZE))
|
|
#else // CPU(X86_64)
|
|
#define PROBE_CPU_R8_OFFSET (PROBE_FIRST_GPR_OFFSET + (8 * PTR_SIZE))
|
|
#define PROBE_CPU_R9_OFFSET (PROBE_FIRST_GPR_OFFSET + (9 * PTR_SIZE))
|
|
#define PROBE_CPU_R10_OFFSET (PROBE_FIRST_GPR_OFFSET + (10 * PTR_SIZE))
|
|
#define PROBE_CPU_R11_OFFSET (PROBE_FIRST_GPR_OFFSET + (11 * PTR_SIZE))
|
|
#define PROBE_CPU_R12_OFFSET (PROBE_FIRST_GPR_OFFSET + (12 * PTR_SIZE))
|
|
#define PROBE_CPU_R13_OFFSET (PROBE_FIRST_GPR_OFFSET + (13 * PTR_SIZE))
|
|
#define PROBE_CPU_R14_OFFSET (PROBE_FIRST_GPR_OFFSET + (14 * PTR_SIZE))
|
|
#define PROBE_CPU_R15_OFFSET (PROBE_FIRST_GPR_OFFSET + (15 * PTR_SIZE))
|
|
#define PROBE_FIRST_SPR_OFFSET (PROBE_FIRST_GPR_OFFSET + (16 * PTR_SIZE))
|
|
#endif // CPU(X86_64)
|
|
|
|
#define PROBE_CPU_EIP_OFFSET (PROBE_FIRST_SPR_OFFSET + (0 * PTR_SIZE))
|
|
#define PROBE_CPU_EFLAGS_OFFSET (PROBE_FIRST_SPR_OFFSET + (1 * PTR_SIZE))
|
|
#define PROBE_FIRST_XMM_OFFSET (PROBE_FIRST_SPR_OFFSET + (2 * PTR_SIZE))
|
|
|
|
#define XMM_SIZE 8
|
|
#define PROBE_CPU_XMM0_OFFSET (PROBE_FIRST_XMM_OFFSET + (0 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM1_OFFSET (PROBE_FIRST_XMM_OFFSET + (1 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM2_OFFSET (PROBE_FIRST_XMM_OFFSET + (2 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM3_OFFSET (PROBE_FIRST_XMM_OFFSET + (3 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM4_OFFSET (PROBE_FIRST_XMM_OFFSET + (4 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM5_OFFSET (PROBE_FIRST_XMM_OFFSET + (5 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM6_OFFSET (PROBE_FIRST_XMM_OFFSET + (6 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM7_OFFSET (PROBE_FIRST_XMM_OFFSET + (7 * XMM_SIZE))
|
|
|
|
#if CPU(X86)
|
|
#define PROBE_SIZE (PROBE_CPU_XMM7_OFFSET + XMM_SIZE)
|
|
#else // CPU(X86_64)
|
|
#define PROBE_CPU_XMM8_OFFSET (PROBE_FIRST_XMM_OFFSET + (8 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM9_OFFSET (PROBE_FIRST_XMM_OFFSET + (9 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM10_OFFSET (PROBE_FIRST_XMM_OFFSET + (10 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM11_OFFSET (PROBE_FIRST_XMM_OFFSET + (11 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM12_OFFSET (PROBE_FIRST_XMM_OFFSET + (12 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM13_OFFSET (PROBE_FIRST_XMM_OFFSET + (13 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM14_OFFSET (PROBE_FIRST_XMM_OFFSET + (14 * XMM_SIZE))
|
|
#define PROBE_CPU_XMM15_OFFSET (PROBE_FIRST_XMM_OFFSET + (15 * XMM_SIZE))
|
|
#define PROBE_SIZE (PROBE_CPU_XMM15_OFFSET + XMM_SIZE)
|
|
#endif // CPU(X86_64)
|
|
|
|
#define PROBE_EXECUTOR_OFFSET PROBE_SIZE // Stash the executeProbe function pointer at the end of the ProbeContext.
|
|
|
|
// The outgoing record to be popped off the stack at the end consists of:
|
|
// eflags, eax, ecx, ebp, eip.
|
|
#define OUT_SIZE (5 * PTR_SIZE)
|
|
|
|
// These ASSERTs remind you that if you change the layout of Probe::State,
|
|
// you need to change ctiMasmProbeTrampoline offsets above to match.
|
|
#define PROBE_OFFSETOF(x) offsetof(struct Probe::State, x)
|
|
#define PROBE_OFFSETOF_REG(x, reg) offsetof(struct Probe::State, x) + reg * sizeof((reinterpret_cast<Probe::State*>(0))->x[reg])
|
|
static_assert(PROBE_OFFSETOF(probeFunction) == PROBE_PROBE_FUNCTION_OFFSET, "Probe::State::probeFunction's offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF(arg) == PROBE_ARG_OFFSET, "Probe::State::arg's offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF(initializeStackFunction) == PROBE_INIT_STACK_FUNCTION_OFFSET, "Probe::State::initializeStackFunction's offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF(initializeStackArg) == PROBE_INIT_STACK_ARG_OFFSET, "Probe::State::initializeStackArg's offset matches ctiMasmProbeTrampoline");
|
|
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::eax) == PROBE_CPU_EAX_OFFSET, "Probe::State::cpu.gprs[eax]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::ecx) == PROBE_CPU_ECX_OFFSET, "Probe::State::cpu.gprs[ecx]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::edx) == PROBE_CPU_EDX_OFFSET, "Probe::State::cpu.gprs[edx]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::ebx) == PROBE_CPU_EBX_OFFSET, "Probe::State::cpu.gprs[ebx]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::esp) == PROBE_CPU_ESP_OFFSET, "Probe::State::cpu.gprs[esp]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::ebp) == PROBE_CPU_EBP_OFFSET, "Probe::State::cpu.gprs[ebp]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::esi) == PROBE_CPU_ESI_OFFSET, "Probe::State::cpu.gprs[esi]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::edi) == PROBE_CPU_EDI_OFFSET, "Probe::State::cpu.gprs[edi]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.sprs, X86Registers::eip) == PROBE_CPU_EIP_OFFSET, "Probe::State::cpu.gprs[eip]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.sprs, X86Registers::eflags) == PROBE_CPU_EFLAGS_OFFSET, "Probe::State::cpu.sprs[eflags]'s offset matches ctiMasmProbeTrampoline");
|
|
|
|
#if CPU(X86_64)
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r8) == PROBE_CPU_R8_OFFSET, "Probe::State::cpu.gprs[r8]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r9) == PROBE_CPU_R9_OFFSET, "Probe::State::cpu.gprs[r9]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r10) == PROBE_CPU_R10_OFFSET, "Probe::State::cpu.gprs[r10]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r11) == PROBE_CPU_R11_OFFSET, "Probe::State::cpu.gprs[r11]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r12) == PROBE_CPU_R12_OFFSET, "Probe::State::cpu.gprs[r12]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r13) == PROBE_CPU_R13_OFFSET, "Probe::State::cpu.gprs[r13]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r14) == PROBE_CPU_R14_OFFSET, "Probe::State::cpu.gprs[r14]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.gprs, X86Registers::r15) == PROBE_CPU_R15_OFFSET, "Probe::State::cpu.gprs[r15]'s offset matches ctiMasmProbeTrampoline");
|
|
#endif // CPU(X86_64)
|
|
|
|
static_assert(!(PROBE_CPU_XMM0_OFFSET & 0x7), "Probe::State::cpu.fprs[xmm0]'s offset should be 8 byte aligned");
|
|
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm0) == PROBE_CPU_XMM0_OFFSET, "Probe::State::cpu.fprs[xmm0]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm1) == PROBE_CPU_XMM1_OFFSET, "Probe::State::cpu.fprs[xmm1]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm2) == PROBE_CPU_XMM2_OFFSET, "Probe::State::cpu.fprs[xmm2]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm3) == PROBE_CPU_XMM3_OFFSET, "Probe::State::cpu.fprs[xmm3]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm4) == PROBE_CPU_XMM4_OFFSET, "Probe::State::cpu.fprs[xmm4]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm5) == PROBE_CPU_XMM5_OFFSET, "Probe::State::cpu.fprs[xmm5]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm6) == PROBE_CPU_XMM6_OFFSET, "Probe::State::cpu.fprs[xmm6]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm7) == PROBE_CPU_XMM7_OFFSET, "Probe::State::cpu.fprs[xmm7]'s offset matches ctiMasmProbeTrampoline");
|
|
|
|
#if CPU(X86_64)
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm8) == PROBE_CPU_XMM8_OFFSET, "Probe::State::cpu.fprs[xmm8]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm9) == PROBE_CPU_XMM9_OFFSET, "Probe::State::cpu.fprs[xmm9]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm10) == PROBE_CPU_XMM10_OFFSET, "Probe::State::cpu.fprs[xmm10]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm11) == PROBE_CPU_XMM11_OFFSET, "Probe::State::cpu.fprs[xmm11]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm12) == PROBE_CPU_XMM12_OFFSET, "Probe::State::cpu.fprs[xmm12]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm13) == PROBE_CPU_XMM13_OFFSET, "Probe::State::cpu.fprs[xmm13]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm14) == PROBE_CPU_XMM14_OFFSET, "Probe::State::cpu.fprs[xmm14]'s offset matches ctiMasmProbeTrampoline");
|
|
static_assert(PROBE_OFFSETOF_REG(cpu.fprs, X86Registers::xmm15) == PROBE_CPU_XMM15_OFFSET, "Probe::State::cpu.fprs[xmm15]'s offset matches ctiMasmProbeTrampoline");
|
|
#endif // CPU(X86_64)
|
|
|
|
static_assert(sizeof(Probe::State) == PROBE_SIZE, "Probe::State::size's matches ctiMasmProbeTrampoline");
|
|
static_assert((PROBE_EXECUTOR_OFFSET + PTR_SIZE) <= (PROBE_SIZE + OUT_SIZE), "Must have room after ProbeContext to stash the probe handler");
|
|
|
|
#undef PROBE_OFFSETOF
|
|
|
|
#if CPU(X86)
|
|
#if COMPILER(GCC_COMPATIBLE)
|
|
asm (
|
|
".globl " SYMBOL_STRING(ctiMasmProbeTrampoline) "\n"
|
|
HIDE_SYMBOL(ctiMasmProbeTrampoline) "\n"
|
|
SYMBOL_STRING(ctiMasmProbeTrampoline) ":" "\n"
|
|
|
|
"pushfl" "\n"
|
|
|
|
// MacroAssemblerX86Common::probe() has already generated code to store some values.
|
|
// Together with the eflags pushed above, the top of stack now looks like
|
|
// this:
|
|
// esp[0 * ptrSize]: eflags
|
|
// esp[1 * ptrSize]: return address / saved eip
|
|
// esp[2 * ptrSize]: saved ebx
|
|
// esp[3 * ptrSize]: saved edx
|
|
// esp[4 * ptrSize]: saved ecx
|
|
// esp[5 * ptrSize]: saved eax
|
|
//
|
|
// Incoming registers contain:
|
|
// ecx: Probe::executeProbe
|
|
// edx: probe function
|
|
// ebx: probe arg
|
|
// eax: scratch (was ctiMasmProbeTrampoline)
|
|
|
|
"movl %esp, %eax" "\n"
|
|
"subl $" STRINGIZE_VALUE_OF(PROBE_SIZE + OUT_SIZE) ", %esp" "\n"
|
|
|
|
// The X86_64 ABI specifies that the worse case stack alignment requirement is 32 bytes.
|
|
"andl $~0x1f, %esp" "\n"
|
|
|
|
"movl %ebp, " STRINGIZE_VALUE_OF(PROBE_CPU_EBP_OFFSET) "(%esp)" "\n"
|
|
"movl %esp, %ebp" "\n" // Save the Probe::State*.
|
|
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_EXECUTOR_OFFSET) "(%ebp)" "\n"
|
|
"movl %edx, " STRINGIZE_VALUE_OF(PROBE_PROBE_FUNCTION_OFFSET) "(%ebp)" "\n"
|
|
"movl %ebx, " STRINGIZE_VALUE_OF(PROBE_ARG_OFFSET) "(%ebp)" "\n"
|
|
"movl %esi, " STRINGIZE_VALUE_OF(PROBE_CPU_ESI_OFFSET) "(%ebp)" "\n"
|
|
"movl %edi, " STRINGIZE_VALUE_OF(PROBE_CPU_EDI_OFFSET) "(%ebp)" "\n"
|
|
|
|
"movl 0 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%eax), %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_EFLAGS_OFFSET) "(%ebp)" "\n"
|
|
"movl 1 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%eax), %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_EIP_OFFSET) "(%ebp)" "\n"
|
|
"movl 2 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%eax), %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_EBX_OFFSET) "(%ebp)" "\n"
|
|
"movl 3 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%eax), %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_EDX_OFFSET) "(%ebp)" "\n"
|
|
"movl 4 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%eax), %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_ECX_OFFSET) "(%ebp)" "\n"
|
|
"movl 5 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%eax), %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_EAX_OFFSET) "(%ebp)" "\n"
|
|
|
|
"movl %eax, %ecx" "\n"
|
|
"addl $" STRINGIZE_VALUE_OF(6 * PTR_SIZE) ", %ecx" "\n"
|
|
"movl %ecx, " STRINGIZE_VALUE_OF(PROBE_CPU_ESP_OFFSET) "(%ebp)" "\n"
|
|
|
|
"movq %xmm0, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM0_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm1, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM1_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm2, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM2_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm3, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM3_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm4, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM4_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm5, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM5_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm6, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM6_OFFSET) "(%ebp)" "\n"
|
|
"movq %xmm7, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM7_OFFSET) "(%ebp)" "\n"
|
|
|
|
// Reserve stack space for the arg while maintaining the required stack
|
|
// pointer 32 byte alignment:
|
|
"subl $0x20, %esp" "\n"
|
|
"movl %ebp, 0(%esp)" "\n" // the Probe::State* arg.
|
|
|
|
"call *" STRINGIZE_VALUE_OF(PROBE_EXECUTOR_OFFSET) "(%ebp)" "\n"
|
|
|
|
// Make sure the Probe::State is entirely below the result stack pointer so
|
|
// that register values are still preserved when we call the initializeStack
|
|
// function.
|
|
"movl $" STRINGIZE_VALUE_OF(PROBE_SIZE + OUT_SIZE) ", %ecx" "\n"
|
|
"movl %ebp, %eax" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_ESP_OFFSET) "(%ebp), %edx" "\n"
|
|
"addl %ecx, %eax" "\n"
|
|
"cmpl %eax, %edx" "\n"
|
|
"jge " LOCAL_LABEL_STRING(ctiMasmProbeTrampolineProbeStateIsSafe) "\n"
|
|
|
|
// Allocate a safe place on the stack below the result stack pointer to stash the Probe::State.
|
|
"subl %ecx, %edx" "\n"
|
|
"andl $~0x1f, %edx" "\n" // Keep the stack pointer 32 bytes aligned.
|
|
"xorl %eax, %eax" "\n"
|
|
"movl %edx, %esp" "\n"
|
|
|
|
"movl $" STRINGIZE_VALUE_OF(PROBE_SIZE) ", %ecx" "\n"
|
|
|
|
// Copy the Probe::State to the safe place.
|
|
LOCAL_LABEL_STRING(ctiMasmProbeTrampolineCopyLoop) ":" "\n"
|
|
"movl (%ebp, %eax), %edx" "\n"
|
|
"movl %edx, (%esp, %eax)" "\n"
|
|
"addl $" STRINGIZE_VALUE_OF(PTR_SIZE) ", %eax" "\n"
|
|
"cmpl %eax, %ecx" "\n"
|
|
"jg " LOCAL_LABEL_STRING(ctiMasmProbeTrampolineCopyLoop) "\n"
|
|
|
|
"movl %esp, %ebp" "\n"
|
|
|
|
// Call initializeStackFunction if present.
|
|
LOCAL_LABEL_STRING(ctiMasmProbeTrampolineProbeStateIsSafe) ":" "\n"
|
|
"xorl %ecx, %ecx" "\n"
|
|
"addl " STRINGIZE_VALUE_OF(PROBE_INIT_STACK_FUNCTION_OFFSET) "(%ebp), %ecx" "\n"
|
|
"je " LOCAL_LABEL_STRING(ctiMasmProbeTrampolineRestoreRegisters) "\n"
|
|
|
|
// Reserve stack space for the arg while maintaining the required stack
|
|
// pointer 32 byte alignment:
|
|
"subl $0x20, %esp" "\n"
|
|
"movl %ebp, 0(%esp)" "\n" // the Probe::State* arg.
|
|
"call *%ecx" "\n"
|
|
|
|
LOCAL_LABEL_STRING(ctiMasmProbeTrampolineRestoreRegisters) ":" "\n"
|
|
|
|
// To enable probes to modify register state, we copy all registers
|
|
// out of the Probe::State before returning.
|
|
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EDX_OFFSET) "(%ebp), %edx" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EBX_OFFSET) "(%ebp), %ebx" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_ESI_OFFSET) "(%ebp), %esi" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EDI_OFFSET) "(%ebp), %edi" "\n"
|
|
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM0_OFFSET) "(%ebp), %xmm0" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM1_OFFSET) "(%ebp), %xmm1" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM2_OFFSET) "(%ebp), %xmm2" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM3_OFFSET) "(%ebp), %xmm3" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM4_OFFSET) "(%ebp), %xmm4" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM5_OFFSET) "(%ebp), %xmm5" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM6_OFFSET) "(%ebp), %xmm6" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM7_OFFSET) "(%ebp), %xmm7" "\n"
|
|
|
|
// There are 6 more registers left to restore:
|
|
// eax, ecx, ebp, esp, eip, and eflags.
|
|
|
|
// The restoration process at ctiMasmProbeTrampolineEnd below works by popping
|
|
// 5 words off the stack into eflags, eax, ecx, ebp, and eip. These 5 words need
|
|
// to be pushed on top of the final esp value so that just by popping the 5 words,
|
|
// we'll get the esp that the probe wants to set. Let's call this area (for storing
|
|
// these 5 words) the restore area.
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_ESP_OFFSET) "(%ebp), %ecx" "\n"
|
|
"subl $5 * " STRINGIZE_VALUE_OF(PTR_SIZE) ", %ecx" "\n"
|
|
|
|
// ecx now points to the restore area.
|
|
|
|
// Copy remaining restore values from the Probe::State to the restore area.
|
|
// Note: We already ensured above that the Probe::State is in a safe location before
|
|
// calling the initializeStackFunction. The initializeStackFunction is not allowed to
|
|
// change the stack pointer again.
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EFLAGS_OFFSET) "(%ebp), %eax" "\n"
|
|
"movl %eax, 0 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%ecx)" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EAX_OFFSET) "(%ebp), %eax" "\n"
|
|
"movl %eax, 1 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%ecx)" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_ECX_OFFSET) "(%ebp), %eax" "\n"
|
|
"movl %eax, 2 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%ecx)" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EBP_OFFSET) "(%ebp), %eax" "\n"
|
|
"movl %eax, 3 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%ecx)" "\n"
|
|
"movl " STRINGIZE_VALUE_OF(PROBE_CPU_EIP_OFFSET) "(%ebp), %eax" "\n"
|
|
"movl %eax, 4 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%ecx)" "\n"
|
|
"movl %ecx, %esp" "\n"
|
|
|
|
// Do the remaining restoration by popping off the restore area.
|
|
"popfl" "\n"
|
|
"popl %eax" "\n"
|
|
"popl %ecx" "\n"
|
|
"popl %ebp" "\n"
|
|
"ret" "\n"
|
|
);
|
|
#endif
|
|
|
|
#if COMPILER(MSVC)
|
|
extern "C" __declspec(naked) void ctiMasmProbeTrampoline()
|
|
{
|
|
__asm {
|
|
pushfd;
|
|
|
|
// MacroAssemblerX86Common::probe() has already generated code to store some values.
|
|
// Together with the eflags pushed above, the top of stack now looks like
|
|
// this:
|
|
// esp[0 * ptrSize]: eflags
|
|
// esp[1 * ptrSize]: return address / saved eip
|
|
// esp[2 * ptrSize]: saved ebx
|
|
// esp[3 * ptrSize]: saved edx
|
|
// esp[4 * ptrSize]: saved ecx
|
|
// esp[5 * ptrSize]: saved eax
|
|
//
|
|
// Incoming registers contain:
|
|
// ecx: Probe::executeProbe
|
|
// edx: probe function
|
|
// ebx: probe arg
|
|
// eax: scratch (was ctiMasmProbeTrampoline)
|
|
|
|
mov eax, esp
|
|
sub esp, PROBE_SIZE + OUT_SIZE
|
|
|
|
// The X86_64 ABI specifies that the worse case stack alignment requirement is 32 bytes.
|
|
and esp, ~0x1f
|
|
|
|
mov [PROBE_CPU_EBP_OFFSET + esp], ebp
|
|
mov ebp, esp // Save the ProbeContext*.
|
|
|
|
mov [PROBE_EXECUTOR_OFFSET + ebp], ecx
|
|
mov [PROBE_PROBE_FUNCTION_OFFSET + ebp], edx
|
|
mov [PROBE_ARG_OFFSET + ebp], ebx
|
|
mov [PROBE_CPU_ESI_OFFSET + ebp], esi
|
|
mov [PROBE_CPU_EDI_OFFSET + ebp], edi
|
|
|
|
mov ecx, [0 * PTR_SIZE + eax]
|
|
mov [PROBE_CPU_EFLAGS_OFFSET + ebp], ecx
|
|
mov ecx, [1 * PTR_SIZE + eax]
|
|
mov [PROBE_CPU_EIP_OFFSET + ebp], ecx
|
|
mov ecx, [2 * PTR_SIZE + eax]
|
|
mov [PROBE_CPU_EBX_OFFSET + ebp], ecx
|
|
mov ecx, [3 * PTR_SIZE + eax]
|
|
mov [PROBE_CPU_EDX_OFFSET + ebp], ecx
|
|
mov ecx, [4 * PTR_SIZE + eax]
|
|
mov [PROBE_CPU_ECX_OFFSET + ebp], ecx
|
|
mov ecx, [5 * PTR_SIZE + eax]
|
|
mov [PROBE_CPU_EAX_OFFSET + ebp], ecx
|
|
|
|
mov ecx, eax
|
|
add ecx, 6 * PTR_SIZE
|
|
mov [PROBE_CPU_ESP_OFFSET + ebp], ecx
|
|
|
|
movq qword ptr[PROBE_CPU_XMM0_OFFSET + ebp], xmm0
|
|
movq qword ptr[PROBE_CPU_XMM1_OFFSET + ebp], xmm1
|
|
movq qword ptr[PROBE_CPU_XMM2_OFFSET + ebp], xmm2
|
|
movq qword ptr[PROBE_CPU_XMM3_OFFSET + ebp], xmm3
|
|
movq qword ptr[PROBE_CPU_XMM4_OFFSET + ebp], xmm4
|
|
movq qword ptr[PROBE_CPU_XMM5_OFFSET + ebp], xmm5
|
|
movq qword ptr[PROBE_CPU_XMM6_OFFSET + ebp], xmm6
|
|
movq qword ptr[PROBE_CPU_XMM7_OFFSET + ebp], xmm7
|
|
|
|
// Reserve stack space for the arg while maintaining the required stack
|
|
// pointer 32 byte alignment:
|
|
sub esp, 0x20
|
|
mov [0 + esp], ebp // the ProbeContext* arg.
|
|
|
|
call [PROBE_EXECUTOR_OFFSET + ebp]
|
|
|
|
// Make sure the ProbeContext is entirely below the result stack pointer so
|
|
// that register values are still preserved when we call the initializeStack
|
|
// function.
|
|
mov ecx, PROBE_SIZE + OUT_SIZE
|
|
mov eax, ebp
|
|
mov edx, [PROBE_CPU_ESP_OFFSET + ebp]
|
|
add eax, ecx
|
|
cmp edx, eax
|
|
jge ctiMasmProbeTrampolineProbeContextIsSafe
|
|
|
|
// Allocate a safe place on the stack below the result stack pointer to stash the ProbeContext.
|
|
sub edx, ecx
|
|
and edx, ~0x1f // Keep the stack pointer 32 bytes aligned.
|
|
xor eax, eax
|
|
mov esp, edx
|
|
|
|
mov ecx, PROBE_SIZE
|
|
|
|
// Copy the ProbeContext to the safe place.
|
|
ctiMasmProbeTrampolineCopyLoop :
|
|
mov edx, [ebp + eax]
|
|
mov [esp + eax], edx
|
|
add eax, PTR_SIZE
|
|
cmp ecx, eax
|
|
jg ctiMasmProbeTrampolineCopyLoop
|
|
|
|
mov ebp, esp
|
|
|
|
// Call initializeStackFunction if present.
|
|
ctiMasmProbeTrampolineProbeContextIsSafe :
|
|
xor ecx, ecx
|
|
add ecx, [PROBE_INIT_STACK_FUNCTION_OFFSET + ebp]
|
|
je ctiMasmProbeTrampolineRestoreRegisters
|
|
|
|
// Reserve stack space for the arg while maintaining the required stack
|
|
// pointer 32 byte alignment:
|
|
sub esp, 0x20
|
|
mov [0 + esp], ebp // the ProbeContext* arg.
|
|
call ecx
|
|
|
|
ctiMasmProbeTrampolineRestoreRegisters :
|
|
|
|
// To enable probes to modify register state, we copy all registers
|
|
// out of the ProbeContext before returning.
|
|
|
|
mov edx, [PROBE_CPU_EDX_OFFSET + ebp]
|
|
mov ebx, [PROBE_CPU_EBX_OFFSET + ebp]
|
|
mov esi, [PROBE_CPU_ESI_OFFSET + ebp]
|
|
mov edi, [PROBE_CPU_EDI_OFFSET + ebp]
|
|
|
|
movq xmm0, qword ptr[PROBE_CPU_XMM0_OFFSET + ebp]
|
|
movq xmm1, qword ptr[PROBE_CPU_XMM1_OFFSET + ebp]
|
|
movq xmm2, qword ptr[PROBE_CPU_XMM2_OFFSET + ebp]
|
|
movq xmm3, qword ptr[PROBE_CPU_XMM3_OFFSET + ebp]
|
|
movq xmm4, qword ptr[PROBE_CPU_XMM4_OFFSET + ebp]
|
|
movq xmm5, qword ptr[PROBE_CPU_XMM5_OFFSET + ebp]
|
|
movq xmm6, qword ptr[PROBE_CPU_XMM6_OFFSET + ebp]
|
|
movq xmm7, qword ptr[PROBE_CPU_XMM7_OFFSET + ebp]
|
|
|
|
// There are 6 more registers left to restore:
|
|
// eax, ecx, ebp, esp, eip, and eflags.
|
|
|
|
// The restoration process at ctiMasmProbeTrampolineEnd below works by popping
|
|
// 5 words off the stack into eflags, eax, ecx, ebp, and eip. These 5 words need
|
|
// to be pushed on top of the final esp value so that just by popping the 5 words,
|
|
// we'll get the esp that the probe wants to set. Let's call this area (for storing
|
|
// these 5 words) the restore area.
|
|
mov ecx, [PROBE_CPU_ESP_OFFSET + ebp]
|
|
sub ecx, 5 * PTR_SIZE
|
|
|
|
// ecx now points to the restore area.
|
|
|
|
// Copy remaining restore values from the ProbeContext to the restore area.
|
|
// Note: We already ensured above that the ProbeContext is in a safe location before
|
|
// calling the initializeStackFunction. The initializeStackFunction is not allowed to
|
|
// change the stack pointer again.
|
|
mov eax, [PROBE_CPU_EFLAGS_OFFSET + ebp]
|
|
mov [0 * PTR_SIZE + ecx], eax
|
|
mov eax, [PROBE_CPU_EAX_OFFSET + ebp]
|
|
mov [1 * PTR_SIZE + ecx], eax
|
|
mov eax, [PROBE_CPU_ECX_OFFSET + ebp]
|
|
mov [2 * PTR_SIZE + ecx], eax
|
|
mov eax, [PROBE_CPU_EBP_OFFSET + ebp]
|
|
mov [3 * PTR_SIZE + ecx], eax
|
|
mov eax, [PROBE_CPU_EIP_OFFSET + ebp]
|
|
mov [4 * PTR_SIZE + ecx], eax
|
|
mov esp, ecx
|
|
|
|
// Do the remaining restoration by popping off the restore area.
|
|
popfd
|
|
pop eax
|
|
pop ecx
|
|
pop ebp
|
|
ret
|
|
}
|
|
}
|
|
#endif // COMPILER(MSVC)
|
|
|
|
#endif // CPU(X86)
|
|
|
|
#if CPU(X86_64)
|
|
#if COMPILER(GCC_COMPATIBLE)
|
|
asm (
|
|
".globl " SYMBOL_STRING(ctiMasmProbeTrampoline) "\n"
|
|
HIDE_SYMBOL(ctiMasmProbeTrampoline) "\n"
|
|
SYMBOL_STRING(ctiMasmProbeTrampoline) ":" "\n"
|
|
|
|
"pushq %rbp" "\n"
|
|
"movq %rsp, %rbp" "\n"
|
|
|
|
"pushfq" "\n"
|
|
|
|
// MacroAssemblerX86Common::probe() has already generated code to store some values.
|
|
// Together with the rbp and rflags pushed above, the top of stack now looks like this:
|
|
// rbp[-1 * ptrSize]: rflags
|
|
// rbp[0 * ptrSize]: rbp / previousCallFrame
|
|
// rbp[1 * ptrSize]: return address / saved rip
|
|
// rbp[2 * ptrSize]: saved rbx
|
|
// rbp[3 * ptrSize]: saved rdx
|
|
// rbp[4 * ptrSize]: saved rcx
|
|
// rbp[5 * ptrSize]: saved rax
|
|
//
|
|
// Incoming registers contain:
|
|
// rcx: Probe::executeProbe
|
|
// rdx: probe function
|
|
// rbx: probe arg
|
|
// rax: scratch (was ctiMasmProbeTrampoline)
|
|
|
|
"subq $" STRINGIZE_VALUE_OF(PROBE_SIZE + OUT_SIZE) ", %rsp" "\n"
|
|
|
|
// The X86_64 ABI specifies that the worse case stack alignment requirement is 32 bytes.
|
|
"andq $~0x1f, %rsp" "\n"
|
|
// Since sp points to the Probe::State, we've ensured that it's protected from interrupts before we initialize it.
|
|
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_EXECUTOR_OFFSET) "(%rsp)" "\n"
|
|
"movq %rdx, " STRINGIZE_VALUE_OF(PROBE_PROBE_FUNCTION_OFFSET) "(%rsp)" "\n"
|
|
"movq %rbx, " STRINGIZE_VALUE_OF(PROBE_ARG_OFFSET) "(%rsp)" "\n"
|
|
"movq %rsi, " STRINGIZE_VALUE_OF(PROBE_CPU_ESI_OFFSET) "(%rsp)" "\n"
|
|
"movq %rdi, " STRINGIZE_VALUE_OF(PROBE_CPU_EDI_OFFSET) "(%rsp)" "\n"
|
|
|
|
"movq -1 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_EFLAGS_OFFSET) "(%rsp)" "\n"
|
|
"movq 0 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_EBP_OFFSET) "(%rsp)" "\n"
|
|
"movq 1 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_EIP_OFFSET) "(%rsp)" "\n"
|
|
"movq 2 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_EBX_OFFSET) "(%rsp)" "\n"
|
|
"movq 3 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_EDX_OFFSET) "(%rsp)" "\n"
|
|
"movq 4 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_ECX_OFFSET) "(%rsp)" "\n"
|
|
"movq 5 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rbp), %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_EAX_OFFSET) "(%rsp)" "\n"
|
|
|
|
"movq %rbp, %rcx" "\n"
|
|
"addq $" STRINGIZE_VALUE_OF(6 * PTR_SIZE) ", %rcx" "\n"
|
|
"movq %rcx, " STRINGIZE_VALUE_OF(PROBE_CPU_ESP_OFFSET) "(%rsp)" "\n"
|
|
|
|
"movq %r8, " STRINGIZE_VALUE_OF(PROBE_CPU_R8_OFFSET) "(%rsp)" "\n"
|
|
"movq %r9, " STRINGIZE_VALUE_OF(PROBE_CPU_R9_OFFSET) "(%rsp)" "\n"
|
|
"movq %r10, " STRINGIZE_VALUE_OF(PROBE_CPU_R10_OFFSET) "(%rsp)" "\n"
|
|
"movq %r11, " STRINGIZE_VALUE_OF(PROBE_CPU_R11_OFFSET) "(%rsp)" "\n"
|
|
"movq %r12, " STRINGIZE_VALUE_OF(PROBE_CPU_R12_OFFSET) "(%rsp)" "\n"
|
|
"movq %r13, " STRINGIZE_VALUE_OF(PROBE_CPU_R13_OFFSET) "(%rsp)" "\n"
|
|
"movq %r14, " STRINGIZE_VALUE_OF(PROBE_CPU_R14_OFFSET) "(%rsp)" "\n"
|
|
"movq %r15, " STRINGIZE_VALUE_OF(PROBE_CPU_R15_OFFSET) "(%rsp)" "\n"
|
|
|
|
"movq %xmm0, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM0_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm1, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM1_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm2, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM2_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm3, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM3_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm4, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM4_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm5, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM5_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm6, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM6_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm7, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM7_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm8, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM8_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm9, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM9_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm10, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM10_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm11, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM11_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm12, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM12_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm13, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM13_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm14, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM14_OFFSET) "(%rsp)" "\n"
|
|
"movq %xmm15, " STRINGIZE_VALUE_OF(PROBE_CPU_XMM15_OFFSET) "(%rsp)" "\n"
|
|
|
|
"movq %rsp, %rdi" "\n" // the Probe::State* arg.
|
|
"call *" STRINGIZE_VALUE_OF(PROBE_EXECUTOR_OFFSET) "(%rsp)" "\n"
|
|
|
|
// Make sure the Probe::State is entirely below the result stack pointer so
|
|
// that register values are still preserved when we call the initializeStack
|
|
// function.
|
|
"movq %rsp, %rbp" "\n"
|
|
"movq $" STRINGIZE_VALUE_OF(PROBE_SIZE + OUT_SIZE) ", %rcx" "\n"
|
|
"movq %rsp, %rax" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_ESP_OFFSET) "(%rbp), %rdx" "\n"
|
|
"addq %rcx, %rax" "\n"
|
|
"cmpq %rax, %rdx" "\n"
|
|
"jge " LOCAL_LABEL_STRING(ctiMasmProbeTrampolineProbeStateIsSafe) "\n"
|
|
|
|
// Allocate a safe place on the stack below the result stack pointer to stash the Probe::State.
|
|
"subq %rcx, %rdx" "\n"
|
|
"andq $~0x1f, %rdx" "\n" // Keep the stack pointer 32 bytes aligned.
|
|
"xorq %rax, %rax" "\n"
|
|
"movq %rdx, %rsp" "\n"
|
|
|
|
"movq $" STRINGIZE_VALUE_OF(PROBE_SIZE) ", %rcx" "\n"
|
|
|
|
// Copy the Probe::State to the safe place.
|
|
LOCAL_LABEL_STRING(ctiMasmProbeTrampolineCopyLoop) ":" "\n"
|
|
"movq (%rbp, %rax), %rdx" "\n"
|
|
"movq %rdx, (%rsp, %rax)" "\n"
|
|
"addq $" STRINGIZE_VALUE_OF(PTR_SIZE) ", %rax" "\n"
|
|
"cmpq %rax, %rcx" "\n"
|
|
"jg " LOCAL_LABEL_STRING(ctiMasmProbeTrampolineCopyLoop) "\n"
|
|
|
|
"movq %rsp, %rbp" "\n"
|
|
|
|
// Call initializeStackFunction if present.
|
|
LOCAL_LABEL_STRING(ctiMasmProbeTrampolineProbeStateIsSafe) ":" "\n"
|
|
"xorq %rcx, %rcx" "\n"
|
|
"addq " STRINGIZE_VALUE_OF(PROBE_INIT_STACK_FUNCTION_OFFSET) "(%rbp), %rcx" "\n"
|
|
"je " LOCAL_LABEL_STRING(ctiMasmProbeTrampolineRestoreRegisters) "\n"
|
|
|
|
"movq %rbp, %rdi" "\n" // the Probe::State* arg.
|
|
"call *%rcx" "\n"
|
|
|
|
LOCAL_LABEL_STRING(ctiMasmProbeTrampolineRestoreRegisters) ":" "\n"
|
|
|
|
// To enable probes to modify register state, we copy all registers
|
|
// out of the Probe::State before returning.
|
|
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EDX_OFFSET) "(%rbp), %rdx" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EBX_OFFSET) "(%rbp), %rbx" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_ESI_OFFSET) "(%rbp), %rsi" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EDI_OFFSET) "(%rbp), %rdi" "\n"
|
|
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R8_OFFSET) "(%rbp), %r8" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R9_OFFSET) "(%rbp), %r9" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R10_OFFSET) "(%rbp), %r10" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R11_OFFSET) "(%rbp), %r11" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R12_OFFSET) "(%rbp), %r12" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R13_OFFSET) "(%rbp), %r13" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R14_OFFSET) "(%rbp), %r14" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_R15_OFFSET) "(%rbp), %r15" "\n"
|
|
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM0_OFFSET) "(%rbp), %xmm0" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM1_OFFSET) "(%rbp), %xmm1" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM2_OFFSET) "(%rbp), %xmm2" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM3_OFFSET) "(%rbp), %xmm3" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM4_OFFSET) "(%rbp), %xmm4" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM5_OFFSET) "(%rbp), %xmm5" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM6_OFFSET) "(%rbp), %xmm6" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM7_OFFSET) "(%rbp), %xmm7" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM8_OFFSET) "(%rbp), %xmm8" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM9_OFFSET) "(%rbp), %xmm9" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM10_OFFSET) "(%rbp), %xmm10" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM11_OFFSET) "(%rbp), %xmm11" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM12_OFFSET) "(%rbp), %xmm12" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM13_OFFSET) "(%rbp), %xmm13" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM14_OFFSET) "(%rbp), %xmm14" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_XMM15_OFFSET) "(%rbp), %xmm15" "\n"
|
|
|
|
// There are 6 more registers left to restore:
|
|
// rax, rcx, rbp, rsp, rip, and rflags.
|
|
|
|
// The restoration process at ctiMasmProbeTrampolineEnd below works by popping
|
|
// 5 words off the stack into rflags, rax, rcx, rbp, and rip. These 5 words need
|
|
// to be pushed on top of the final esp value so that just by popping the 5 words,
|
|
// we'll get the esp that the probe wants to set. Let's call this area (for storing
|
|
// these 5 words) the restore area.
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_ESP_OFFSET) "(%rbp), %rcx" "\n"
|
|
"subq $5 * " STRINGIZE_VALUE_OF(PTR_SIZE) ", %rcx" "\n"
|
|
|
|
// rcx now points to the restore area.
|
|
|
|
// Copy remaining restore values from the Probe::State to the restore area.
|
|
// Note: We already ensured above that the Probe::State is in a safe location before
|
|
// calling the initializeStackFunction. The initializeStackFunction is not allowed to
|
|
// change the stack pointer again.
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EFLAGS_OFFSET) "(%rbp), %rax" "\n"
|
|
"movq %rax, 0 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rcx)" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EAX_OFFSET) "(%rbp), %rax" "\n"
|
|
"movq %rax, 1 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rcx)" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_ECX_OFFSET) "(%rbp), %rax" "\n"
|
|
"movq %rax, 2 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rcx)" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EBP_OFFSET) "(%rbp), %rax" "\n"
|
|
"movq %rax, 3 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rcx)" "\n"
|
|
"movq " STRINGIZE_VALUE_OF(PROBE_CPU_EIP_OFFSET) "(%rbp), %rax" "\n"
|
|
"movq %rax, 4 * " STRINGIZE_VALUE_OF(PTR_SIZE) "(%rcx)" "\n"
|
|
"movq %rcx, %rsp" "\n"
|
|
|
|
// Do the remaining restoration by popping off the restore area.
|
|
"popfq" "\n"
|
|
"popq %rax" "\n"
|
|
"popq %rcx" "\n"
|
|
"popq %rbp" "\n"
|
|
"ret" "\n"
|
|
);
|
|
#endif // COMPILER(GCC_COMPATIBLE)
|
|
#endif // CPU(X86_64)
|
|
|
|
// What code is emitted for the probe?
|
|
// ==================================
|
|
// We want to keep the size of the emitted probe invocation code as compact as
|
|
// possible to minimize the perturbation to the JIT generated code. However,
|
|
// we also need to preserve the CPU registers and set up the Probe::State to be
|
|
// passed to the user probe function.
|
|
//
|
|
// Hence, we do only the minimum here to preserve a scratch register (i.e. rax
|
|
// in this case) and the stack pointer (i.e. rsp), and pass the probe arguments.
|
|
// We'll let the ctiMasmProbeTrampoline handle the rest of the probe invocation
|
|
// work i.e. saving the CPUState (and setting up the Probe::State), calling the
|
|
// user probe function, and restoring the CPUState before returning to JIT
|
|
// generated code.
|
|
//
|
|
// What registers need to be saved?
|
|
// ===============================
|
|
// The registers are saved for 2 reasons:
|
|
// 1. To preserve their state in the JITted code. This means that all registers
|
|
// that are not callee saved needs to be saved. We also need to save the
|
|
// condition code registers because the probe can be inserted between a test
|
|
// and a branch.
|
|
// 2. To allow the probe to inspect the values of the registers for debugging
|
|
// purposes. This means all registers need to be saved.
|
|
//
|
|
// In summary, save everything. But for reasons stated above, we should do the
|
|
// minimum here and let ctiMasmProbeTrampoline do the heavy lifting to save the
|
|
// full set.
|
|
//
|
|
// What values are in the saved registers?
|
|
// ======================================
|
|
// Conceptually, the saved registers should contain values as if the probe
|
|
// is not present in the JIT generated code. Hence, they should contain values
|
|
// that are expected at the start of the instruction immediately following the
|
|
// probe.
|
|
//
|
|
// Specifically, the saved stack pointer register will point to the stack
|
|
// position before we push the Probe::State frame. The saved rip will point to
|
|
// the address of the instruction immediately following the probe.
|
|
|
|
void MacroAssembler::probe(Probe::Function function, void* arg)
|
|
{
|
|
push(RegisterID::eax);
|
|
move(TrustedImmPtr(reinterpret_cast<void*>(ctiMasmProbeTrampoline)), RegisterID::eax);
|
|
push(RegisterID::ecx);
|
|
move(TrustedImmPtr(reinterpret_cast<void*>(Probe::executeProbe)), RegisterID::ecx);
|
|
push(RegisterID::edx);
|
|
move(TrustedImmPtr(reinterpret_cast<void*>(function)), RegisterID::edx);
|
|
push(RegisterID::ebx);
|
|
move(TrustedImmPtr(arg), RegisterID::ebx);
|
|
call(RegisterID::eax, CFunctionPtrTag);
|
|
}
|
|
#endif // ENABLE(MASM_PROBE)
|
|
|
|
MacroAssemblerX86Common::CPUID MacroAssemblerX86Common::getCPUID(unsigned level)
|
|
{
|
|
return getCPUIDEx(level, 0);
|
|
}
|
|
|
|
MacroAssemblerX86Common::CPUID MacroAssemblerX86Common::getCPUIDEx(unsigned level, unsigned count)
|
|
{
|
|
CPUID result { };
|
|
#if COMPILER(MSVC)
|
|
__cpuidex(bitwise_cast<int*>(result.data()), level, count);
|
|
#else
|
|
__asm__ (
|
|
"cpuid\n"
|
|
: "=a"(result[0]), "=b"(result[1]), "=c"(result[2]), "=d"(result[3])
|
|
: "0"(level), "2"(count)
|
|
);
|
|
#endif
|
|
return result;
|
|
}
|
|
|
|
void MacroAssemblerX86Common::collectCPUFeatures()
|
|
{
|
|
static std::once_flag onceKey;
|
|
std::call_once(onceKey, [] {
|
|
{
|
|
CPUID cpuid = getCPUID(0x1);
|
|
s_sse4_1CheckState = (cpuid[2] & (1 << 19)) ? CPUIDCheckState::Set : CPUIDCheckState::Clear;
|
|
s_sse4_2CheckState = (cpuid[2] & (1 << 20)) ? CPUIDCheckState::Set : CPUIDCheckState::Clear;
|
|
s_popcntCheckState = (cpuid[2] & (1 << 23)) ? CPUIDCheckState::Set : CPUIDCheckState::Clear;
|
|
s_avxCheckState = (cpuid[2] & (1 << 28)) ? CPUIDCheckState::Set : CPUIDCheckState::Clear;
|
|
}
|
|
{
|
|
CPUID cpuid = getCPUID(0x7);
|
|
s_bmi1CheckState = (cpuid[2] & (1 << 3)) ? CPUIDCheckState::Set : CPUIDCheckState::Clear;
|
|
}
|
|
{
|
|
CPUID cpuid = getCPUID(0x80000001);
|
|
s_lzcntCheckState = (cpuid[2] & (1 << 5)) ? CPUIDCheckState::Set : CPUIDCheckState::Clear;
|
|
}
|
|
});
|
|
}
|
|
|
|
MacroAssemblerX86Common::CPUIDCheckState MacroAssemblerX86Common::s_sse4_1CheckState = CPUIDCheckState::NotChecked;
|
|
MacroAssemblerX86Common::CPUIDCheckState MacroAssemblerX86Common::s_sse4_2CheckState = CPUIDCheckState::NotChecked;
|
|
MacroAssemblerX86Common::CPUIDCheckState MacroAssemblerX86Common::s_avxCheckState = CPUIDCheckState::NotChecked;
|
|
MacroAssemblerX86Common::CPUIDCheckState MacroAssemblerX86Common::s_lzcntCheckState = CPUIDCheckState::NotChecked;
|
|
MacroAssemblerX86Common::CPUIDCheckState MacroAssemblerX86Common::s_bmi1CheckState = CPUIDCheckState::NotChecked;
|
|
MacroAssemblerX86Common::CPUIDCheckState MacroAssemblerX86Common::s_popcntCheckState = CPUIDCheckState::NotChecked;
|
|
|
|
} // namespace JSC
|
|
|
|
#endif // ENABLE(ASSEMBLER) && (CPU(X86) || CPU(X86_64))
|