blob: 80a2a321eb6a0c7e6a783d1a3617bd7368ef2620 [file] [log] [blame]
/*
* Copyright (c) 2016, 2021, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2016, 2021 SAP SE. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*
*/
#include "precompiled.hpp"
#include "jvm.h"
#include "asm/assembler.inline.hpp"
#include "compiler/disassembler.hpp"
#include "code/compiledIC.hpp"
#include "memory/resourceArea.hpp"
#include "runtime/java.hpp"
#include "runtime/stubCodeGenerator.hpp"
#include "runtime/vm_version.hpp"
# include <sys/sysinfo.h>
bool VM_Version::_is_determine_features_test_running = false;
const char* VM_Version::_model_string;
unsigned long VM_Version::_features[_features_buffer_len] = {0, 0, 0, 0};
unsigned long VM_Version::_cipher_features_KM[_features_buffer_len] = {0, 0, 0, 0};
unsigned long VM_Version::_cipher_features_KMA[_features_buffer_len] = {0, 0, 0, 0};
unsigned long VM_Version::_cipher_features_KMF[_features_buffer_len] = {0, 0, 0, 0};
unsigned long VM_Version::_cipher_features_KMCTR[_features_buffer_len] = {0, 0, 0, 0};
unsigned long VM_Version::_cipher_features_KMO[_features_buffer_len] = {0, 0, 0, 0};
unsigned long VM_Version::_msgdigest_features[_features_buffer_len] = {0, 0, 0, 0};
unsigned int VM_Version::_nfeatures = 0;
unsigned int VM_Version::_ncipher_features_KM = 0;
unsigned int VM_Version::_ncipher_features_KMA = 0;
unsigned int VM_Version::_ncipher_features_KMF = 0;
unsigned int VM_Version::_ncipher_features_KMCTR = 0;
unsigned int VM_Version::_ncipher_features_KMO = 0;
unsigned int VM_Version::_nmsgdigest_features = 0;
unsigned int VM_Version::_Dcache_lineSize = DEFAULT_CACHE_LINE_SIZE;
unsigned int VM_Version::_Icache_lineSize = DEFAULT_CACHE_LINE_SIZE;
// The following list contains the (approximate) announcement/availability
// dates of the many System z generations in existence as of now.
// Information compiled from https://www.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/TD105503
// z900: 2000-10
// z990: 2003-06
// z9: 2005-09
// z10: 2007-04
// z10: 2008-02
// z196: 2010-08
// ec12: 2012-09
// z13: 2015-03
// z14: 2017-09
// z15: 2019-09
static const char* z_gen[] = {" ", "G1", "G2", "G3", "G4", "G5", "G6", "G7", "G8", "G9" };
static const char* z_machine[] = {" ", "2064", "2084", "2094", "2097", "2817", "2827", "2964", "3906", "8561" };
static const char* z_name[] = {" ", "z900", "z990", "z9 EC", "z10 EC", "z196 EC", "ec12", "z13", "z14", "z15" };
static const char* z_WDFM[] = {" ", "2006-06-30", "2008-06-30", "2010-06-30", "2012-06-30", "2014-06-30", "2016-12-31", "2019-06-30", "2021-06-30", "tbd" };
static const char* z_EOS[] = {" ", "2014-12-31", "2014-12-31", "2017-10-31", "2019-12-31", "2021-12-31", "tbd", "tbd", "tbd", "tbd" };
static const char* z_features[] = {" ",
"system-z, g1-z900, ldisp",
"system-z, g2-z990, ldisp_fast",
"system-z, g3-z9, ldisp_fast, extimm",
"system-z, g4-z10, ldisp_fast, extimm, pcrel_load/store, cmpb",
"system-z, g5-z196, ldisp_fast, extimm, pcrel_load/store, cmpb, cond_load/store, interlocked_update",
"system-z, g6-ec12, ldisp_fast, extimm, pcrel_load/store, cmpb, cond_load/store, interlocked_update, txm",
"system-z, g7-z13, ldisp_fast, extimm, pcrel_load/store, cmpb, cond_load/store, interlocked_update, txm, vectorinstr",
"system-z, g8-z14, ldisp_fast, extimm, pcrel_load/store, cmpb, cond_load/store, interlocked_update, txm, vectorinstr, instrext2, venh1)",
"system-z, g9-z15, ldisp_fast, extimm, pcrel_load/store, cmpb, cond_load/store, interlocked_update, txm, vectorinstr, instrext2, venh1, instrext3, VEnh2 )"
};
void VM_Version::initialize() {
determine_features(); // Get processor capabilities.
set_features_string(); // Set a descriptive feature indication.
if (Verbose || PrintAssembly || PrintStubCode) {
print_features_internal("CPU Version as detected internally:", PrintAssembly || PrintStubCode);
}
intx cache_line_size = Dcache_lineSize(0);
#ifdef COMPILER2
MaxVectorSize = 8;
#endif
if (has_PrefetchRaw()) {
if (FLAG_IS_DEFAULT(AllocatePrefetchStyle)) { // not preset
// 0 = no prefetch.
// 1 = Prefetch instructions for each allocation.
// 2 = Use TLAB watermark to gate allocation prefetch.
AllocatePrefetchStyle = 1;
}
if (AllocatePrefetchStyle > 0) { // Prefetching turned on at all?
// Distance to prefetch ahead of allocation pointer.
if (FLAG_IS_DEFAULT(AllocatePrefetchDistance) || (AllocatePrefetchDistance < 0)) { // not preset
AllocatePrefetchDistance = 0;
}
// Number of lines to prefetch ahead of allocation pointer.
if (FLAG_IS_DEFAULT(AllocatePrefetchLines) || (AllocatePrefetchLines <= 0)) { // not preset
AllocatePrefetchLines = 3;
}
// Step size in bytes of sequential prefetch instructions.
if (FLAG_IS_DEFAULT(AllocatePrefetchStepSize) || (AllocatePrefetchStepSize <= 0)) { // not preset
FLAG_SET_DEFAULT(AllocatePrefetchStepSize, cache_line_size);
} else if (AllocatePrefetchStepSize < cache_line_size) {
FLAG_SET_DEFAULT(AllocatePrefetchStepSize, cache_line_size);
} else {
FLAG_SET_DEFAULT(AllocatePrefetchStepSize, cache_line_size);
}
} else {
FLAG_SET_DEFAULT(AllocatePrefetchStyle, 0);
AllocatePrefetchDistance = 0;
AllocatePrefetchLines = 0;
// Can't be zero. Will SIGFPE during constraints checking.
FLAG_SET_DEFAULT(AllocatePrefetchStepSize, cache_line_size);
}
} else {
FLAG_SET_DEFAULT(AllocatePrefetchStyle, 0);
AllocatePrefetchDistance = 0;
AllocatePrefetchLines = 0;
// Can't be zero. Will SIGFPE during constraints checking.
FLAG_SET_DEFAULT(AllocatePrefetchStepSize, cache_line_size);
}
// TODO:
// On z/Architecture, cache line size is significantly large (256 bytes). Do we really need
// to keep contended members that far apart? Performance tests are required.
if (FLAG_IS_DEFAULT(ContendedPaddingWidth) && (cache_line_size > ContendedPaddingWidth)) {
ContendedPaddingWidth = cache_line_size;
}
// On z/Architecture, the CRC32/CRC32C intrinsics are implemented "by hand".
// TODO: Provide implementation based on the vector instructions available from z13.
// Note: The CHECKSUM instruction, which has been there since the very beginning
// (of z/Architecture), computes "some kind of" a checksum.
// It has nothing to do with the CRC32 algorithm.
if (FLAG_IS_DEFAULT(UseCRC32Intrinsics)) {
FLAG_SET_DEFAULT(UseCRC32Intrinsics, true);
}
if (FLAG_IS_DEFAULT(UseCRC32CIntrinsics)) {
FLAG_SET_DEFAULT(UseCRC32CIntrinsics, true);
}
// TODO: Provide implementation.
if (UseAdler32Intrinsics) {
warning("Adler32Intrinsics not available on this CPU.");
FLAG_SET_DEFAULT(UseAdler32Intrinsics, false);
}
// On z/Architecture, we take UseAES as the general switch to enable/disable the AES intrinsics.
// The specific, and yet to be defined, switches UseAESxxxIntrinsics will then be set
// depending on the actual machine capabilities.
// Explicitly setting them via CmdLine option takes precedence, of course.
// TODO: UseAESIntrinsics must be made keylength specific.
// As of March 2015 and Java8, only AES128 is supported by the Java Cryptographic Extensions.
// Therefore, UseAESIntrinsics is of minimal use at the moment.
if (FLAG_IS_DEFAULT(UseAES) && has_Crypto_AES()) {
FLAG_SET_DEFAULT(UseAES, true);
}
if (UseAES && !has_Crypto_AES()) {
warning("AES instructions are not available on this CPU");
FLAG_SET_DEFAULT(UseAES, false);
}
if (UseAES) {
if (FLAG_IS_DEFAULT(UseAESIntrinsics)) {
FLAG_SET_DEFAULT(UseAESIntrinsics, true);
}
}
if (UseAESIntrinsics && !has_Crypto_AES()) {
warning("AES intrinsics are not available on this CPU");
FLAG_SET_DEFAULT(UseAESIntrinsics, false);
}
if (UseAESIntrinsics && !UseAES) {
warning("AES intrinsics require UseAES flag to be enabled. Intrinsics will be disabled.");
FLAG_SET_DEFAULT(UseAESIntrinsics, false);
}
// TODO: implement AES/CTR intrinsics
if (UseAESCTRIntrinsics) {
warning("AES/CTR intrinsics are not available on this CPU");
FLAG_SET_DEFAULT(UseAESCTRIntrinsics, false);
}
if (FLAG_IS_DEFAULT(UseGHASHIntrinsics) && has_Crypto_GHASH()) {
FLAG_SET_DEFAULT(UseGHASHIntrinsics, true);
}
if (UseGHASHIntrinsics && !has_Crypto_GHASH()) {
warning("GHASH intrinsics are not available on this CPU");
FLAG_SET_DEFAULT(UseGHASHIntrinsics, false);
}
if (FLAG_IS_DEFAULT(UseFMA)) {
FLAG_SET_DEFAULT(UseFMA, true);
}
// On z/Architecture, we take UseSHA as the general switch to enable/disable the SHA intrinsics.
// The specific switches UseSHAxxxIntrinsics will then be set depending on the actual
// machine capabilities.
// Explicitly setting them via CmdLine option takes precedence, of course.
if (FLAG_IS_DEFAULT(UseSHA) && has_Crypto_SHA()) {
FLAG_SET_DEFAULT(UseSHA, true);
}
if (UseSHA && !has_Crypto_SHA()) {
warning("SHA instructions are not available on this CPU");
FLAG_SET_DEFAULT(UseSHA, false);
}
if (UseSHA && has_Crypto_SHA1()) {
if (FLAG_IS_DEFAULT(UseSHA1Intrinsics)) {
FLAG_SET_DEFAULT(UseSHA1Intrinsics, true);
}
} else if (UseSHA1Intrinsics) {
warning("Intrinsics for SHA-1 crypto hash functions not available on this CPU.");
FLAG_SET_DEFAULT(UseSHA1Intrinsics, false);
}
if (UseSHA && has_Crypto_SHA256()) {
if (FLAG_IS_DEFAULT(UseSHA256Intrinsics)) {
FLAG_SET_DEFAULT(UseSHA256Intrinsics, true);
}
} else if (UseSHA256Intrinsics) {
warning("Intrinsics for SHA-224 and SHA-256 crypto hash functions not available on this CPU.");
FLAG_SET_DEFAULT(UseSHA256Intrinsics, false);
}
if (UseSHA && has_Crypto_SHA512()) {
if (FLAG_IS_DEFAULT(UseSHA512Intrinsics)) {
FLAG_SET_DEFAULT(UseSHA512Intrinsics, true);
}
} else if (UseSHA512Intrinsics) {
warning("Intrinsics for SHA-384 and SHA-512 crypto hash functions not available on this CPU.");
FLAG_SET_DEFAULT(UseSHA512Intrinsics, false);
}
if (!(UseSHA1Intrinsics || UseSHA256Intrinsics || UseSHA512Intrinsics)) {
FLAG_SET_DEFAULT(UseSHA, false);
}
#ifdef COMPILER2
if (FLAG_IS_DEFAULT(UseMultiplyToLenIntrinsic)) {
FLAG_SET_DEFAULT(UseMultiplyToLenIntrinsic, true);
}
if (FLAG_IS_DEFAULT(UseMontgomeryMultiplyIntrinsic)) {
FLAG_SET_DEFAULT(UseMontgomeryMultiplyIntrinsic, true);
}
if (FLAG_IS_DEFAULT(UseMontgomerySquareIntrinsic)) {
FLAG_SET_DEFAULT(UseMontgomerySquareIntrinsic, true);
}
#endif
if (FLAG_IS_DEFAULT(UsePopCountInstruction)) {
FLAG_SET_DEFAULT(UsePopCountInstruction, true);
}
// z/Architecture supports 8-byte compare-exchange operations
// (see Atomic::cmpxchg)
// and 'atomic long memory ops' (see Unsafe_GetLongVolatile).
_supports_cx8 = true;
_supports_atomic_getadd4 = VM_Version::has_LoadAndALUAtomicV1();
_supports_atomic_getadd8 = VM_Version::has_LoadAndALUAtomicV1();
// z/Architecture supports unaligned memory accesses.
// Performance penalty is negligible. An additional tick or so
// is lost if the accessed data spans a cache line boundary.
// Unaligned accesses are not atomic, of course.
if (FLAG_IS_DEFAULT(UseUnalignedAccesses)) {
FLAG_SET_DEFAULT(UseUnalignedAccesses, true);
}
}
int VM_Version::get_model_index() {
// returns the index used to access the various model-dependent strings.
// > 0 valid (known) model detected.
// = 0 model not recognized, maybe not yet supported.
// < 0 model detection is ambiguous. The absolute value of the returned value
// is the index of the oldest detected model.
int ambiguity = 0;
int model_ix = 0;
if (is_z15()) {
model_ix = 9;
ambiguity++;
}
if (is_z14()) {
model_ix = 8;
ambiguity++;
}
if (is_z13()) {
model_ix = 7;
ambiguity++;
}
if (is_ec12()) {
model_ix = 6;
ambiguity++;
}
if (is_z196()) {
model_ix = 5;
ambiguity++;
}
if (is_z10()) {
model_ix = 4;
ambiguity++;
}
if (is_z9()) {
model_ix = 3;
ambiguity++;
}
if (is_z990()) {
model_ix = 2;
ambiguity++;
}
if (is_z900()) {
model_ix = 1;
ambiguity++;
}
if (ambiguity > 1) {
model_ix = -model_ix;
}
return model_ix;
}
void VM_Version::set_features_string() {
// A note on the _features_string format:
// There are jtreg tests checking the _features_string for various properties.
// For some strange reason, these tests require the string to contain
// only _lowercase_ characters. Keep that in mind when being surprised
// about the unusual notation of features - and when adding new ones.
// Features may have one comma at the end.
// Furthermore, use one, and only one, separator space between features.
// Multiple spaces are considered separate tokens, messing up everything.
int model_ix = get_model_index();
char buf[512];
if (model_ix == 0) {
_model_string = "unknown model";
strcpy(buf, "z/Architecture (unknown generation)");
} else if (model_ix > 0) {
_model_string = z_name[model_ix];
jio_snprintf(buf, sizeof(buf), "%s, out-of-support_as_of_", z_features[model_ix], z_EOS[model_ix]);
} else if (model_ix < 0) {
tty->print_cr("*** WARNING *** Ambiguous z/Architecture detection!");
tty->print_cr(" oldest detected generation is %s", z_features[-model_ix]);
_model_string = "unknown model";
strcpy(buf, "z/Architecture (ambiguous detection)");
}
_features_string = os::strdup(buf);
if (has_Crypto_AES()) {
assert(strlen(_features_string) + 3*8 < sizeof(buf), "increase buffer size");
jio_snprintf(buf, sizeof(buf), "%s%s%s%s",
_features_string,
has_Crypto_AES128() ? ", aes128" : "",
has_Crypto_AES192() ? ", aes192" : "",
has_Crypto_AES256() ? ", aes256" : "");
os::free((void *)_features_string);
_features_string = os::strdup(buf);
}
if (has_Crypto_SHA()) {
assert(strlen(_features_string) + 6 + 2*8 + 7 < sizeof(buf), "increase buffer size");
jio_snprintf(buf, sizeof(buf), "%s%s%s%s%s",
_features_string,
has_Crypto_SHA1() ? ", sha1" : "",
has_Crypto_SHA256() ? ", sha256" : "",
has_Crypto_SHA512() ? ", sha512" : "",
has_Crypto_GHASH() ? ", ghash" : "");
os::free((void *)_features_string);
_features_string = os::strdup(buf);
}
}
// featureBuffer - bit array indicating availability of various features
// featureNum - bit index of feature to be tested
// Featurenum < 0 requests test for any nonzero bit in featureBuffer.
// bufLen - length of featureBuffer in bits
bool VM_Version::test_feature_bit(unsigned long* featureBuffer, int featureNum, unsigned int bufLen) {
assert(bufLen > 0, "buffer len must be positive");
assert((bufLen & 0x0007) == 0, "unaligned buffer len");
assert(((intptr_t)featureBuffer&0x0007) == 0, "unaligned feature buffer");
if (featureNum < 0) {
// Any bit set at all?
bool anyBit = false;
for (size_t i = 0; i < bufLen/(8*sizeof(long)); i++) {
anyBit = anyBit || (featureBuffer[i] != 0);
}
return anyBit;
} else {
assert((unsigned int)featureNum < bufLen, "feature index out of range");
unsigned char* byteBuffer = (unsigned char*)featureBuffer;
int byteIndex = featureNum/(8*sizeof(char));
int bitIndex = featureNum%(8*sizeof(char));
// Indexed bit set?
return (byteBuffer[byteIndex] & (1U<<(7-bitIndex))) != 0;
}
}
void VM_Version::print_features_internal(const char* text, bool print_anyway) {
tty->print_cr("%s %s", text, features_string());
tty->cr();
if (Verbose || print_anyway) {
// z900
if (has_long_displacement() ) tty->print_cr("available: %s", "LongDispFacility");
// z990
if (has_long_displacement_fast() ) tty->print_cr("available: %s", "LongDispFacilityHighPerf");
if (has_ETF2() && has_ETF3() ) tty->print_cr("available: %s", "ETF2 and ETF3");
if (has_Crypto() ) tty->print_cr("available: %s", "CryptoFacility");
// z9
if (has_extended_immediate() ) tty->print_cr("available: %s", "ExtImmedFacility");
if (has_StoreFacilityListExtended()) tty->print_cr("available: %s", "StoreFacilityListExtended");
if (has_StoreClockFast() ) tty->print_cr("available: %s", "StoreClockFast");
if (has_ETF2Enhancements() ) tty->print_cr("available: %s", "ETF2 Enhancements");
if (has_ETF3Enhancements() ) tty->print_cr("available: %s", "ETF3 Enhancements");
if (has_HFPUnnormalized() ) tty->print_cr("available: %s", "HFPUnnormalizedFacility");
if (has_HFPMultiplyAndAdd() ) tty->print_cr("available: %s", "HFPMultiplyAndAddFacility");
// z10
if (has_ParsingEnhancements() ) tty->print_cr("available: %s", "Parsing Enhancements");
if (has_ExtractCPUtime() ) tty->print_cr("available: %s", "ExtractCPUTime");
if (has_CompareSwapStore() ) tty->print_cr("available: %s", "CompareSwapStore");
if (has_GnrlInstrExtensions() ) tty->print_cr("available: %s", "General Instruction Extensions");
if (has_CompareBranch() ) tty->print_cr(" available: %s", "Compare and Branch");
if (has_CompareTrap() ) tty->print_cr(" available: %s", "Compare and Trap");
if (has_RelativeLoadStore() ) tty->print_cr(" available: %s", "Relative Load/Store");
if (has_MultiplySingleImm32() ) tty->print_cr(" available: %s", "MultiplySingleImm32");
if (has_Prefetch() ) tty->print_cr(" available: %s", "Prefetch");
if (has_MoveImmToMem() ) tty->print_cr(" available: %s", "Direct Moves Immediate to Memory");
if (has_MemWithImmALUOps() ) tty->print_cr(" available: %s", "Direct ALU Ops Memory .op. Immediate");
if (has_ExtractCPUAttributes() ) tty->print_cr(" available: %s", "Extract CPU Attributes");
if (has_ExecuteExtensions() ) tty->print_cr("available: %s", "ExecuteExtensions");
if (has_FPSupportEnhancements() ) tty->print_cr("available: %s", "FPSupportEnhancements");
if (has_DecimalFloatingPoint() ) tty->print_cr("available: %s", "DecimalFloatingPoint");
// z196
if (has_DistinctOpnds() ) tty->print_cr("available: %s", "Distinct Operands");
if (has_InterlockedAccessV1() ) tty->print_cr(" available: %s", "InterlockedAccess V1 (fast)");
if (has_PopCount() ) tty->print_cr(" available: %s", "PopCount");
if (has_LoadStoreConditional() ) tty->print_cr(" available: %s", "LoadStoreConditional");
if (has_HighWordInstr() ) tty->print_cr(" available: %s", "HighWord Instructions");
if (has_FastSync() ) tty->print_cr(" available: %s", "FastSync (bcr 14,0)");
if (has_AtomicMemWithImmALUOps() ) tty->print_cr("available: %s", "Atomic Direct ALU Ops Memory .op. Immediate");
if (has_FPExtensions() ) tty->print_cr("available: %s", "Floatingpoint Extensions");
if (has_CryptoExt3() ) tty->print_cr("available: %s", "Crypto Extensions 3");
if (has_CryptoExt4() ) tty->print_cr("available: %s", "Crypto Extensions 4");
// EC12
if (has_MiscInstrExt() ) tty->print_cr("available: %s", "Miscellaneous Instruction Extensions");
if (has_ExecutionHint() ) tty->print_cr(" available: %s", "Execution Hints (branch prediction)");
if (has_ProcessorAssist() ) tty->print_cr(" available: %s", "Processor Assists");
if (has_LoadAndTrap() ) tty->print_cr(" available: %s", "Load and Trap");
if (has_TxMem() ) tty->print_cr("available: %s", "Transactional Memory");
if (has_InterlockedAccessV2() ) tty->print_cr(" available: %s", "InterlockedAccess V2 (fast)");
if (has_DFPZonedConversion() ) tty->print_cr(" available: %s", "DFP Zoned Conversions");
// z13
if (has_LoadStoreConditional2() ) tty->print_cr("available: %s", "Load/Store Conditional 2");
if (has_CryptoExt5() ) tty->print_cr("available: %s", "Crypto Extensions 5");
if (has_DFPPackedConversion() ) tty->print_cr("available: %s", "DFP Packed Conversions");
if (has_VectorFacility() ) tty->print_cr("available: %s", "Vector Facility");
// z14
if (has_MiscInstrExt2() ) tty->print_cr("available: %s", "Miscellaneous Instruction Extensions 2");
if (has_VectorEnhancements1() ) tty->print_cr("available: %s", "Vector Facility Enhancements 3");
if (has_CryptoExt8() ) tty->print_cr("available: %s", "Crypto Extensions 8");
// z15
if (has_MiscInstrExt3() ) tty->print_cr("available: %s", "Miscellaneous Instruction Extensions 3");
if (has_VectorEnhancements2() ) tty->print_cr("available: %s", "Vector Facility Enhancements 3");
if (has_CryptoExt9() ) tty->print_cr("available: %s", "Crypto Extensions 9");
if (has_Crypto()) {
tty->cr();
tty->print_cr("detailed availability of %s capabilities:", "CryptoFacility");
if (test_feature_bit(&_cipher_features_KM[0], -1, 2*Cipher::_featureBits)) {
tty->cr();
tty->print_cr(" available: %s", "Message Cipher Functions");
}
if (test_feature_bit(&_cipher_features_KM[0], -1, (int)Cipher::_featureBits)) {
tty->print_cr(" available Crypto Features of KM (Cipher Message):");
for (unsigned int i = 0; i < Cipher::_featureBits; i++) {
if (test_feature_bit(&_cipher_features_KM[0], i, (int)Cipher::_featureBits)) {
switch (i) {
case Cipher::_Query: tty->print_cr(" available: KM Query"); break;
case Cipher::_DEA: tty->print_cr(" available: KM DEA"); break;
case Cipher::_TDEA128: tty->print_cr(" available: KM TDEA-128"); break;
case Cipher::_TDEA192: tty->print_cr(" available: KM TDEA-192"); break;
case Cipher::_EncryptedDEA: tty->print_cr(" available: KM Encrypted DEA"); break;
case Cipher::_EncryptedDEA128: tty->print_cr(" available: KM Encrypted DEA-128"); break;
case Cipher::_EncryptedDEA192: tty->print_cr(" available: KM Encrypted DEA-192"); break;
case Cipher::_AES128: tty->print_cr(" available: KM AES-128"); break;
case Cipher::_AES192: tty->print_cr(" available: KM AES-192"); break;
case Cipher::_AES256: tty->print_cr(" available: KM AES-256"); break;
case Cipher::_EnccryptedAES128: tty->print_cr(" available: KM Encrypted-AES-128"); break;
case Cipher::_EnccryptedAES192: tty->print_cr(" available: KM Encrypted-AES-192"); break;
case Cipher::_EnccryptedAES256: tty->print_cr(" available: KM Encrypted-AES-256"); break;
case Cipher::_XTSAES128: tty->print_cr(" available: KM XTS-AES-128"); break;
case Cipher::_XTSAES256: tty->print_cr(" available: KM XTS-AES-256"); break;
case Cipher::_EncryptedXTSAES128: tty->print_cr(" available: KM XTS-Encrypted-AES-128"); break;
case Cipher::_EncryptedXTSAES256: tty->print_cr(" available: KM XTS-Encrypted-AES-256"); break;
default: tty->print_cr(" available: unknown KM code %d", i); break;
}
}
}
}
if (test_feature_bit(&_cipher_features_KM[2], -1, (int)Cipher::_featureBits)) {
tty->print_cr(" available Crypto Features of KMC (Cipher Message with Chaining):");
for (unsigned int i = 0; i < Cipher::_featureBits; i++) {
if (test_feature_bit(&_cipher_features_KM[2], i, (int)Cipher::_featureBits)) {
switch (i) {
case Cipher::_Query: tty->print_cr(" available: KMC Query"); break;
case Cipher::_DEA: tty->print_cr(" available: KMC DEA"); break;
case Cipher::_TDEA128: tty->print_cr(" available: KMC TDEA-128"); break;
case Cipher::_TDEA192: tty->print_cr(" available: KMC TDEA-192"); break;
case Cipher::_EncryptedDEA: tty->print_cr(" available: KMC Encrypted DEA"); break;
case Cipher::_EncryptedDEA128: tty->print_cr(" available: KMC Encrypted DEA-128"); break;
case Cipher::_EncryptedDEA192: tty->print_cr(" available: KMC Encrypted DEA-192"); break;
case Cipher::_AES128: tty->print_cr(" available: KMC AES-128"); break;
case Cipher::_AES192: tty->print_cr(" available: KMC AES-192"); break;
case Cipher::_AES256: tty->print_cr(" available: KMC AES-256"); break;
case Cipher::_EnccryptedAES128: tty->print_cr(" available: KMC Encrypted-AES-128"); break;
case Cipher::_EnccryptedAES192: tty->print_cr(" available: KMC Encrypted-AES-192"); break;
case Cipher::_EnccryptedAES256: tty->print_cr(" available: KMC Encrypted-AES-256"); break;
case Cipher::_PRNG: tty->print_cr(" available: KMC PRNG"); break;
default: tty->print_cr(" available: unknown KMC code %d", i); break;
}
}
}
}
}
if (has_CryptoExt4()) {
if (test_feature_bit(&_cipher_features_KMF[0], -1, (int)Cipher::_featureBits)) {
tty->print_cr(" available Crypto Features of KMF (Cipher Message with Cipher Feedback):");
for (unsigned int i = 0; i < Cipher::_featureBits; i++) {
if (test_feature_bit(&_cipher_features_KMF[0], i, (int)Cipher::_featureBits)) {
switch (i) {
case Cipher::_Query: tty->print_cr(" available: KMF Query"); break;
case Cipher::_DEA: tty->print_cr(" available: KMF DEA"); break;
case Cipher::_TDEA128: tty->print_cr(" available: KMF TDEA-128"); break;
case Cipher::_TDEA192: tty->print_cr(" available: KMF TDEA-192"); break;
case Cipher::_EncryptedDEA: tty->print_cr(" available: KMF Encrypted DEA"); break;
case Cipher::_EncryptedDEA128: tty->print_cr(" available: KMF Encrypted DEA-128"); break;
case Cipher::_EncryptedDEA192: tty->print_cr(" available: KMF Encrypted DEA-192"); break;
case Cipher::_AES128: tty->print_cr(" available: KMF AES-128"); break;
case Cipher::_AES192: tty->print_cr(" available: KMF AES-192"); break;
case Cipher::_AES256: tty->print_cr(" available: KMF AES-256"); break;
case Cipher::_EnccryptedAES128: tty->print_cr(" available: KMF Encrypted-AES-128"); break;
case Cipher::_EnccryptedAES192: tty->print_cr(" available: KMF Encrypted-AES-192"); break;
case Cipher::_EnccryptedAES256: tty->print_cr(" available: KMF Encrypted-AES-256"); break;
default: tty->print_cr(" available: unknown KMF code %d", i); break;
}
}
}
}
if (test_feature_bit(&_cipher_features_KMCTR[0], -1, (int)Cipher::_featureBits)) {
tty->print_cr(" available Crypto Features of KMCTR (Cipher Message with Counter):");
for (unsigned int i = 0; i < Cipher::_featureBits; i++) {
if (test_feature_bit(&_cipher_features_KMCTR[0], i, (int)Cipher::_featureBits)) {
switch (i) {
case Cipher::_Query: tty->print_cr(" available: KMCTR Query"); break;
case Cipher::_DEA: tty->print_cr(" available: KMCTR DEA"); break;
case Cipher::_TDEA128: tty->print_cr(" available: KMCTR TDEA-128"); break;
case Cipher::_TDEA192: tty->print_cr(" available: KMCTR TDEA-192"); break;
case Cipher::_EncryptedDEA: tty->print_cr(" available: KMCTR Encrypted DEA"); break;
case Cipher::_EncryptedDEA128: tty->print_cr(" available: KMCTR Encrypted DEA-128"); break;
case Cipher::_EncryptedDEA192: tty->print_cr(" available: KMCTR Encrypted DEA-192"); break;
case Cipher::_AES128: tty->print_cr(" available: KMCTR AES-128"); break;
case Cipher::_AES192: tty->print_cr(" available: KMCTR AES-192"); break;
case Cipher::_AES256: tty->print_cr(" available: KMCTR AES-256"); break;
case Cipher::_EnccryptedAES128: tty->print_cr(" available: KMCTR Encrypted-AES-128"); break;
case Cipher::_EnccryptedAES192: tty->print_cr(" available: KMCTR Encrypted-AES-192"); break;
case Cipher::_EnccryptedAES256: tty->print_cr(" available: KMCTR Encrypted-AES-256"); break;
default: tty->print_cr(" available: unknown KMCTR code %d", i); break;
}
}
}
}
if (test_feature_bit(&_cipher_features_KMO[0], -1, (int)Cipher::_featureBits)) {
tty->print_cr(" available Crypto Features of KMO (Cipher Message with Output Feedback):");
for (unsigned int i = 0; i < Cipher::_featureBits; i++) {
if (test_feature_bit(&_cipher_features_KMO[0], i, (int)Cipher::_featureBits)) {
switch (i) {
case Cipher::_Query: tty->print_cr(" available: KMO Query"); break;
case Cipher::_DEA: tty->print_cr(" available: KMO DEA"); break;
case Cipher::_TDEA128: tty->print_cr(" available: KMO TDEA-128"); break;
case Cipher::_TDEA192: tty->print_cr(" available: KMO TDEA-192"); break;
case Cipher::_EncryptedDEA: tty->print_cr(" available: KMO Encrypted DEA"); break;
case Cipher::_EncryptedDEA128: tty->print_cr(" available: KMO Encrypted DEA-128"); break;
case Cipher::_EncryptedDEA192: tty->print_cr(" available: KMO Encrypted DEA-192"); break;
case Cipher::_AES128: tty->print_cr(" available: KMO AES-128"); break;
case Cipher::_AES192: tty->print_cr(" available: KMO AES-192"); break;
case Cipher::_AES256: tty->print_cr(" available: KMO AES-256"); break;
case Cipher::_EnccryptedAES128: tty->print_cr(" available: KMO Encrypted-AES-128"); break;
case Cipher::_EnccryptedAES192: tty->print_cr(" available: KMO Encrypted-AES-192"); break;
case Cipher::_EnccryptedAES256: tty->print_cr(" available: KMO Encrypted-AES-256"); break;
default: tty->print_cr(" available: unknown KMO code %d", i); break;
}
}
}
}
}
if (has_CryptoExt8()) {
if (test_feature_bit(&_cipher_features_KMA[0], -1, (int)Cipher::_featureBits)) {
tty->print_cr(" available Crypto Features of KMA (Cipher Message with Authentication):");
for (unsigned int i = 0; i < Cipher::_featureBits; i++) {
if (test_feature_bit(&_cipher_features_KMA[0], i, (int)Cipher::_featureBits)) {
switch (i) {
case Cipher::_Query: tty->print_cr(" available: KMA Query"); break;
case Cipher::_AES128: tty->print_cr(" available: KMA-GCM AES-128"); break;
case Cipher::_AES192: tty->print_cr(" available: KMA-GCM AES-192"); break;
case Cipher::_AES256: tty->print_cr(" available: KMA-GCM AES-256"); break;
case Cipher::_EnccryptedAES128: tty->print_cr(" available: KMA-GCM Encrypted-AES-128"); break;
case Cipher::_EnccryptedAES192: tty->print_cr(" available: KMA-GCM Encrypted-AES-192"); break;
case Cipher::_EnccryptedAES256: tty->print_cr(" available: KMA-GCM Encrypted-AES-256"); break;
default: tty->print_cr(" available: unknown KMA code %d", i); break;
}
}
}
}
}
if (has_Crypto()) {
if (test_feature_bit(&_msgdigest_features[0], -1, 2*MsgDigest::_featureBits)) {
tty->cr();
tty->print_cr(" available: %s", "Message Digest Functions for SHA");
}
if (test_feature_bit(&_msgdigest_features[0], -1, (int)MsgDigest::_featureBits)) {
tty->print_cr(" available Features of KIMD (Msg Digest):");
for (unsigned int i = 0; i < MsgDigest::_featureBits; i++) {
if (test_feature_bit(&_msgdigest_features[0], i, (int)MsgDigest::_featureBits)) {
switch (i) {
case MsgDigest::_Query: tty->print_cr(" available: KIMD Query"); break;
case MsgDigest::_SHA1: tty->print_cr(" available: KIMD SHA-1"); break;
case MsgDigest::_SHA256: tty->print_cr(" available: KIMD SHA-256"); break;
case MsgDigest::_SHA512: tty->print_cr(" available: KIMD SHA-512"); break;
case MsgDigest::_SHA3_224: tty->print_cr(" available: KIMD SHA3-224"); break;
case MsgDigest::_SHA3_256: tty->print_cr(" available: KIMD SHA3-256"); break;
case MsgDigest::_SHA3_384: tty->print_cr(" available: KIMD SHA3-384"); break;
case MsgDigest::_SHA3_512: tty->print_cr(" available: KIMD SHA3-512"); break;
case MsgDigest::_SHAKE_128: tty->print_cr(" available: KIMD SHAKE-128"); break;
case MsgDigest::_SHAKE_256: tty->print_cr(" available: KIMD SHAKE-256"); break;
case MsgDigest::_GHASH: tty->print_cr(" available: KIMD GHASH"); break;
default: tty->print_cr(" available: unknown code %d", i); break;
}
}
}
}
if (test_feature_bit(&_msgdigest_features[2], -1, (int)MsgDigest::_featureBits)) {
tty->print_cr(" available Features of KLMD (Msg Digest):");
for (unsigned int i = 0; i < MsgDigest::_featureBits; i++) {
if (test_feature_bit(&_msgdigest_features[2], i, (int)MsgDigest::_featureBits)) {
switch (i) {
case MsgDigest::_Query: tty->print_cr(" available: KLMD Query"); break;
case MsgDigest::_SHA1: tty->print_cr(" available: KLMD SHA-1"); break;
case MsgDigest::_SHA256: tty->print_cr(" available: KLMD SHA-256"); break;
case MsgDigest::_SHA512: tty->print_cr(" available: KLMD SHA-512"); break;
case MsgDigest::_SHA3_224: tty->print_cr(" available: KLMD SHA3-224"); break;
case MsgDigest::_SHA3_256: tty->print_cr(" available: KLMD SHA3-256"); break;
case MsgDigest::_SHA3_384: tty->print_cr(" available: KLMD SHA3-384"); break;
case MsgDigest::_SHA3_512: tty->print_cr(" available: KLMD SHA3-512"); break;
case MsgDigest::_SHAKE_128: tty->print_cr(" available: KLMD SHAKE-128"); break;
case MsgDigest::_SHAKE_256: tty->print_cr(" available: KLMD SHAKE-256"); break;
default: tty->print_cr(" available: unknown code %d", i); break;
}
}
}
}
}
if (ContendedPaddingWidth > 0) {
tty->cr();
tty->print_cr("ContendedPaddingWidth " INTX_FORMAT, ContendedPaddingWidth);
}
}
}
void VM_Version::print_platform_virtualization_info(outputStream* st) {
// /proc/sysinfo contains interesting information about
// - LPAR
// - whole "Box" (CPUs )
// - z/VM / KVM (VM<nn>); this is not available in an LPAR-only setup
const char* kw[] = { "LPAR", "CPUs", "VM", NULL };
const char* info_file = "/proc/sysinfo";
if (!print_matching_lines_from_file(info_file, st, kw)) {
st->print_cr(" <%s Not Available>", info_file);
}
}
void VM_Version::print_features() {
print_features_internal("Version:");
}
void VM_Version::reset_features(bool reset) {
if (reset) {
for (unsigned int i = 0; i < _features_buffer_len; i++) {
VM_Version::_features[i] = 0;
}
}
}
void VM_Version::set_features_z900(bool reset) {
reset_features(reset);
set_has_long_displacement();
set_has_ETF2();
}
void VM_Version::set_features_z990(bool reset) {
reset_features(reset);
set_features_z900(false);
set_has_ETF3();
set_has_long_displacement_fast();
set_has_HFPMultiplyAndAdd();
}
void VM_Version::set_features_z9(bool reset) {
reset_features(reset);
set_features_z990(false);
set_has_StoreFacilityListExtended();
// set_has_Crypto(); // Do not set, crypto features must be retrieved separately.
set_has_ETF2Enhancements();
set_has_ETF3Enhancements();
set_has_extended_immediate();
set_has_StoreClockFast();
set_has_HFPUnnormalized();
}
void VM_Version::set_features_z10(bool reset) {
reset_features(reset);
set_features_z9(false);
set_has_CompareSwapStore();
set_has_RelativeLoadStore();
set_has_CompareBranch();
set_has_CompareTrap();
set_has_MultiplySingleImm32();
set_has_Prefetch();
set_has_MoveImmToMem();
set_has_MemWithImmALUOps();
set_has_ExecuteExtensions();
set_has_FPSupportEnhancements();
set_has_DecimalFloatingPoint();
set_has_ExtractCPUtime();
set_has_CryptoExt3();
}
void VM_Version::set_features_z196(bool reset) {
reset_features(reset);
set_features_z10(false);
set_has_InterlockedAccessV1();
set_has_PopCount();
set_has_LoadStoreConditional();
set_has_HighWordInstr();
set_has_FastSync();
set_has_FPExtensions();
set_has_DistinctOpnds();
set_has_CryptoExt4();
}
void VM_Version::set_features_ec12(bool reset) {
reset_features(reset);
set_features_z196(false);
set_has_MiscInstrExt();
set_has_InterlockedAccessV2();
set_has_LoadAndALUAtomicV2();
set_has_TxMem();
}
void VM_Version::set_features_z13(bool reset) {
reset_features(reset);
set_features_ec12(false);
set_has_LoadStoreConditional2();
set_has_CryptoExt5();
set_has_VectorFacility();
}
void VM_Version::set_features_z14(bool reset) {
reset_features(reset);
set_features_z13(false);
set_has_MiscInstrExt2();
set_has_VectorEnhancements1();
has_VectorPackedDecimal();
set_has_CryptoExt8();
}
void VM_Version::set_features_z15(bool reset) {
reset_features(reset);
set_features_z14(false);
set_has_MiscInstrExt3();
set_has_VectorEnhancements2();
has_VectorPackedDecimalEnh();
set_has_CryptoExt9();
}
void VM_Version::set_features_from(const char* march) {
bool err = false;
bool prt = false;
if ((march != NULL) && (march[0] != '\0')) {
const int buf_len = 16;
const int hdr_len = 5;
char buf[buf_len];
if (strlen(march) >= hdr_len) {
memcpy(buf, march, hdr_len);
buf[hdr_len] = '\00';
} else {
buf[0] = '\00';
}
if (!strcmp(march, "z900")) {
set_features_z900();
} else if (!strcmp(march, "z990")) {
set_features_z990();
} else if (!strcmp(march, "z9")) {
set_features_z9();
} else if (!strcmp(march, "z10")) {
set_features_z10();
} else if (!strcmp(march, "z196")) {
set_features_z196();
} else if (!strcmp(march, "ec12")) {
set_features_ec12();
} else if (!strcmp(march, "z13")) {
set_features_z13();
} else if (!strcmp(march, "z14")) {
set_features_z14();
} else if (!strcmp(march, "z15")) {
set_features_z15();
} else {
err = true;
}
if (!err) {
set_features_string();
if (prt || PrintAssembly) {
print_features_internal("CPU Version as set by cmdline option:", prt);
}
} else {
tty->print_cr("***Warning: Unsupported ProcessorArchitecture: %s, internal settings left undisturbed.", march);
}
}
}
// getFeatures call interface
// Z_ARG1 (R2) - feature bit buffer address.
// Must be DW aligned.
// Z_ARG2 (R3) - > 0 feature bit buffer length (#DWs).
// Implies request to store cpu feature list via STFLE.
// = 0 invalid
// < 0 function code (which feature information to retrieve)
// Implies that a buffer of at least two DWs is passed in.
// =-1 - retrieve cache topology
// =-2 - basic cipher instruction capabilities
// =-3 - msg digest (secure hash) instruction capabilities
// =-4 - vector instruction OS support availability
// =-17 - cipher (KMF) support
// =-18 - cipher (KMCTR) support
// =-19 - cipher (KMO) support
// =-20 - cipher (KMA) support
// Z_ARG3 (R4) - feature code for ECAG instruction
//
// Z_RET (R2) - return value
// > 0: success: number of retrieved feature bit string words.
// < 0: failure: required number of feature bit string words (buffer too small).
// == 0: failure: operation aborted.
//
static long (*getFeatures)(unsigned long*, int, int) = NULL;
void VM_Version::set_getFeatures(address entryPoint) {
if (getFeatures == NULL) {
getFeatures = (long(*)(unsigned long*, int, int))entryPoint;
}
}
long VM_Version::call_getFeatures(unsigned long* buffer, int buflen, int functionCode) {
VM_Version::_is_determine_features_test_running = true;
long functionResult = (*getFeatures)(buffer, buflen, functionCode);
VM_Version::_is_determine_features_test_running = false;
return functionResult;
}
// Helper function for "extract cache attribute" instruction.
int VM_Version::calculate_ECAG_functionCode(unsigned int attributeIndication,
unsigned int levelIndication,
unsigned int typeIndication) {
return (attributeIndication<<4) | (levelIndication<<1) | typeIndication;
}
void VM_Version::clear_buffer(unsigned long* buffer, unsigned int len) {
memset(buffer, 0, sizeof(buffer[0])*len);
}
void VM_Version::copy_buffer(unsigned long* to, unsigned long* from, unsigned int len) {
memcpy(to, from, sizeof(to[0])*len);
}
void VM_Version::determine_features() {
const int cbuf_size = _code_buffer_len;
const int buf_len = _features_buffer_len;
// Allocate code buffer space for the detection code.
ResourceMark rm;
CodeBuffer cbuf("determine CPU features", cbuf_size, 0);
MacroAssembler* a = new MacroAssembler(&cbuf);
// Emit code.
set_getFeatures(a->pc());
address code = a->pc();
// Try STFLE. Possible INVOP will cause defaults to be used.
Label getFEATURES;
Label getCPUFEATURES; // fcode = -1 (cache)
Label getCIPHERFEATURES_KM; // fcode = -2 (cipher)
Label getCIPHERFEATURES_KMA; // fcode = -20 (cipher)
Label getCIPHERFEATURES_KMF; // fcode = -17 (cipher)
Label getCIPHERFEATURES_KMCTR; // fcode = -18 (cipher)
Label getCIPHERFEATURES_KMO; // fcode = -19 (cipher)
Label getMSGDIGESTFEATURES; // fcode = -3 (SHA)
Label getVECTORFEATURES; // fcode = -4 (OS support for vector instructions)
Label errRTN;
a->z_ltgfr(Z_R0, Z_ARG2); // buf_len/fcode to r0 and test.
a->z_brl(getFEATURES); // negative -> Get machine features or instruction-specific features
a->z_lghi(Z_R1,0);
a->z_brz(errRTN); // zero -> Function code currently not used, indicate "aborted".
//---< store feature list >---
// We have three possible outcomes here:
// success: cc = 0 and first DW of feature bit array != 0
// Z_R0 contains index of last stored DW (used_len - 1)
// incomplete: cc = 3 and first DW of feature bit array != 0
// Z_R0 contains index of last DW that would have been stored (required_len - 1)
a->z_aghi(Z_R0, -1); // STFLE needs last index, not length, of feature bit array.
a->z_stfle(0, Z_ARG1);
a->z_lg(Z_R1, Address(Z_ARG1, (intptr_t)0)); // Get first DW of facility list.
a->z_lgr(Z_RET, Z_R0); // Calculate used/required len
a->z_la(Z_RET, 1, Z_RET); // don't destroy cc from stfle!
a->z_brnz(errRTN); // Instr failed if non-zero CC.
a->z_ltgr(Z_R1, Z_R1); // Check if first DW of facility list was filled.
a->z_bcr(Assembler::bcondNotZero, Z_R14); // Successful return.
//---< error exit >---
a->bind(errRTN);
a->z_lngr(Z_RET, Z_RET); // negative return value to indicate "buffer too small"
a->z_ltgr(Z_R1, Z_R1); // Check if first DW of facility list was filled.
a->z_bcr(Assembler::bcondNotZero, Z_R14); // Return "buffer too small".
a->z_xgr(Z_RET, Z_RET);
a->z_br(Z_R14); // Return "operation aborted".
a->bind(getFEATURES);
a->z_cghi(Z_R0, -1); // -1: Extract CPU attributes, currently: cache layout only.
a->z_bre(getCPUFEATURES);
a->z_cghi(Z_R0, -2); // -2: Extract detailed crypto capabilities (cipher instructions).
a->z_bre(getCIPHERFEATURES_KM);
a->z_cghi(Z_R0, -3); // -3: Extract detailed crypto capabilities (msg digest instructions).
a->z_bre(getMSGDIGESTFEATURES);
a->z_cghi(Z_R0, -4); // -4: Verify vector instruction availability (OS support).
a->z_bre(getVECTORFEATURES);
a->z_cghi(Z_R0, -17); // -17: Extract detailed crypto capabilities (cipher instructions).
a->z_bre(getCIPHERFEATURES_KMF);
a->z_cghi(Z_R0, -18); // -18: Extract detailed crypto capabilities (cipher instructions).
a->z_bre(getCIPHERFEATURES_KMCTR);
a->z_cghi(Z_R0, -19); // -19: Extract detailed crypto capabilities (cipher instructions).
a->z_bre(getCIPHERFEATURES_KMO);
a->z_cghi(Z_R0, -20); // -20: Extract detailed crypto capabilities (cipher instructions).
a->z_bre(getCIPHERFEATURES_KMA);
a->z_xgr(Z_RET, Z_RET); // Not a valid function code.
a->z_br(Z_R14); // Return "operation aborted".
// Try KIMD/KLMD query function to get details about msg digest (secure hash, SHA) instructions.
a->bind(getMSGDIGESTFEATURES);
a->z_lghi(Z_R0,(int)MsgDigest::_Query); // query function code
a->z_lgr(Z_R1,Z_R2); // param block addr, 2*16 bytes min size
a->z_kimd(Z_R2,Z_R2); // Get available KIMD functions (bit pattern in param blk). Must use even regs.
a->z_la(Z_R1,16,Z_R1); // next param block addr
a->z_klmd(Z_R2,Z_R4); // Get available KLMD functions (bit pattern in param blk). Must use distinct even regs.
a->z_lghi(Z_RET,4); // #used words in output buffer
a->z_br(Z_R14);
// Try KM/KMC query function to get details about crypto instructions.
a->bind(getCIPHERFEATURES_KM);
a->z_lghi(Z_R0,(int)Cipher::_Query); // query function code
a->z_lgr(Z_R1,Z_R2); // param block addr, 2*16 bytes min size (KIMD/KLMD output)
a->z_km(Z_R2,Z_R2); // get available KM functions. Must use even regs.
a->z_la(Z_R1,16,Z_R1); // next param block addr
a->z_kmc(Z_R2,Z_R2); // get available KMC functions
a->z_lghi(Z_RET,4); // #used words in output buffer
a->z_br(Z_R14);
// Try KMA query function to get details about crypto instructions.
a->bind(getCIPHERFEATURES_KMA);
a->z_lghi(Z_R0,(int)Cipher::_Query); // query function code
a->z_lgr(Z_R1,Z_R2); // param block addr, 2*16 bytes min size (KIMD/KLMD output)
a->z_kma(Z_R2,Z_R4,Z_R6); // get available KMA functions. Must use distinct even regs.
a->z_lghi(Z_RET,2); // #used words in output buffer
a->z_br(Z_R14);
// Try KMF query function to get details about crypto instructions.
a->bind(getCIPHERFEATURES_KMF);
a->z_lghi(Z_R0,(int)Cipher::_Query); // query function code
a->z_lgr(Z_R1,Z_R2); // param block addr, 2*16 bytes min size (KIMD/KLMD output)
a->z_kmf(Z_R2,Z_R2); // get available KMA functions. Must use even regs.
a->z_lghi(Z_RET,2); // #used words in output buffer
a->z_br(Z_R14);
// Try KMCTR query function to get details about crypto instructions.
a->bind(getCIPHERFEATURES_KMCTR);
a->z_lghi(Z_R0,(int)Cipher::_Query); // query function code
a->z_lgr(Z_R1,Z_R2); // param block addr, 2*16 bytes min size (KIMD/KLMD output)
a->z_kmctr(Z_R2,Z_R2,Z_R2); // get available KMCTR functions. Must use even regs.
a->z_lghi(Z_RET,2); // #used words in output buffer
a->z_br(Z_R14);
// Try KMO query function to get details about crypto instructions.
a->bind(getCIPHERFEATURES_KMO);
a->z_lghi(Z_R0,(int)Cipher::_Query); // query function code
a->z_lgr(Z_R1,Z_R2); // param block addr, 2*16 bytes min size (KIMD/KLMD output)
a->z_kmo(Z_R2,Z_R2); // get available KMO functions. Must use even regs.
a->z_lghi(Z_RET,2); // #used words in output buffer
a->z_br(Z_R14);
// Use EXTRACT CPU ATTRIBUTE instruction to get information about cache layout.
a->bind(getCPUFEATURES);
a->z_xgr(Z_R0,Z_R0); // as recommended in instruction documentation
a->z_ecag(Z_RET,Z_R0,0,Z_ARG3); // Extract information as requested by Z_ARG1 contents.
a->z_br(Z_R14);
// Use a vector instruction to verify OS support. Will fail with SIGFPE if OS support is missing.
a->bind(getVECTORFEATURES);
a->z_vtm(Z_V0,Z_V0); // non-destructive vector instruction. Will cause SIGFPE if not supported.
a->z_br(Z_R14);
address code_end = a->pc();
a->flush();
// Print the detection code.
bool printVerbose = Verbose || PrintAssembly || PrintStubCode;
if (printVerbose) {
ttyLocker ttyl;
tty->print_cr("Decoding CPU feature detection stub at " INTPTR_FORMAT " before execution:", p2i(code));
tty->print_cr("Stub length is %ld bytes, codebuffer reserves %d bytes, %ld bytes spare.",
code_end-code, cbuf_size, cbuf_size-(code_end-code));
// Use existing decode function. This enables the [Code] format which is needed to DecodeErrorFile.
Disassembler::decode((u_char*)code, (u_char*)code_end, tty);
}
// prepare work buffer
unsigned long buffer[buf_len];
clear_buffer(buffer, buf_len);
// execute code
// Illegal instructions will be replaced by 0 in signal handler.
// In case of problems, call_getFeatures will return a not-positive result.
long used_len = call_getFeatures(buffer, buf_len, 0);
bool ok;
if ((used_len > 0) && (used_len <= buf_len)) {
ok = true;
if (printVerbose) {
bool compact = Verbose;
tty->print_cr("Note: feature list uses %ld array elements.", used_len);
if (compact) {
tty->print("non-zero feature list elements:");
for (unsigned int k = 0; k < used_len; k++) {
if (buffer[k] != 0) {
tty->print(" [%d]: 0x%16.16lx", k, buffer[k]);
}
}
tty->cr();
} else {
for (unsigned int k = 0; k < used_len; k++) {
tty->print_cr("non-zero feature list[%d]: 0x%16.16lx", k, buffer[k]);
}
}
if (compact) {
tty->print_cr("Active features (compact view):");
for (unsigned int k = 0; k < used_len; k++) {
tty->print_cr(" buffer[%d]:", k);
for (unsigned int j = k*sizeof(long); j < (k+1)*sizeof(long); j++) {
bool line = false;
for (unsigned int i = j*8; i < (j+1)*8; i++) {
bool bit = test_feature_bit(buffer, i, used_len*sizeof(long)*8);
if (bit) {
if (!line) {
tty->print(" byte[%d]:", j);
tty->fill_to(13);
line = true;
}
tty->print(" [%3.3d]", i);
}
}
if (line) {
tty->cr();
}
}
}
} else {
tty->print_cr("Active features (full view):");
for (unsigned int k = 0; k < used_len; k++) {
tty->print_cr(" buffer[%d]:", k);
for (unsigned int j = k*sizeof(long); j < (k+1)*sizeof(long); j++) {
tty->print(" byte[%d]:", j);
tty->fill_to(13);
for (unsigned int i = j*8; i < (j+1)*8; i++) {
bool bit = test_feature_bit(buffer, i, used_len*sizeof(long)*8);
if (bit) {
tty->print(" [%3.3d]", i);
} else {
tty->print(" ");
}
}
tty->cr();
}
}
}
}
} else { // No features retrieved if we reach here. Buffer too short or instr not available.
ok = false;
if (used_len < 0) {
if (printVerbose) {
tty->print_cr("feature list buffer[%d] too short, required: buffer[%ld]", buf_len, -used_len);
}
} else {
if (printVerbose) {
tty->print_cr("feature list could not be retrieved. Bad function code? Running on z900 or z990?");
}
}
}
if (ok) {
// Copy detected features to features buffer.
copy_buffer(_features, buffer, buf_len);
_nfeatures = used_len;
} else {
// Something went wrong with feature detection. Disable everything.
clear_buffer(_features, buf_len);
_nfeatures = 0;
}
if (has_VectorFacility()) {
// Verify that feature can actually be used. OS support required.
// We will get a signal if not. Signal handler will disable vector facility
call_getFeatures(buffer, -4, 0);
if (printVerbose) {
ttyLocker ttyl;
if (has_VectorFacility()) {
tty->print_cr(" Vector Facility has been verified to be supported by OS");
} else {
tty->print_cr(" Vector Facility has been disabled - not supported by OS");
}
}
}
// Clear all Cipher feature buffers and the work buffer.
clear_buffer(_cipher_features_KM, buf_len);
clear_buffer(_cipher_features_KMA, buf_len);
clear_buffer(_cipher_features_KMF, buf_len);
clear_buffer(_cipher_features_KMCTR, buf_len);
clear_buffer(_cipher_features_KMO, buf_len);
clear_buffer(_msgdigest_features, buf_len);
_ncipher_features_KM = 0;
_ncipher_features_KMA = 0;
_ncipher_features_KMF = 0;
_ncipher_features_KMCTR = 0;
_ncipher_features_KMO = 0;
_nmsgdigest_features = 0;
//---------------------------------------
//-- Extract Crypto Facility details --
//---------------------------------------
if (has_Crypto()) {
// Get features of KM/KMC cipher instructions
clear_buffer(buffer, buf_len);
used_len = call_getFeatures(buffer, -2, 0);
copy_buffer(_cipher_features_KM, buffer, buf_len);
_ncipher_features_KM = used_len;
// Get msg digest features.
clear_buffer(buffer, buf_len);
used_len = call_getFeatures(buffer, -3, 0);
copy_buffer(_msgdigest_features, buffer, buf_len);
_nmsgdigest_features = used_len;
}
if (has_CryptoExt4()) {
// Get features of KMF cipher instruction
clear_buffer(buffer, buf_len);
used_len = call_getFeatures(buffer, -17, 0);
copy_buffer(_cipher_features_KMF, buffer, buf_len);
_ncipher_features_KMF = used_len;
// Get features of KMCTR cipher instruction
clear_buffer(buffer, buf_len);
used_len = call_getFeatures(buffer, -18, 0);
copy_buffer(_cipher_features_KMCTR, buffer, buf_len);
_ncipher_features_KMCTR = used_len;
// Get features of KMO cipher instruction
clear_buffer(buffer, buf_len);
used_len = call_getFeatures(buffer, -19, 0);
copy_buffer(_cipher_features_KMO, buffer, buf_len);
_ncipher_features_KMO = used_len;
}
if (has_CryptoExt8()) {
// Get features of KMA cipher instruction
clear_buffer(buffer, buf_len);
used_len = call_getFeatures(buffer, -20, 0);
copy_buffer(_cipher_features_KMA, buffer, buf_len);
_ncipher_features_KMA = used_len;
}
if (printVerbose) {
tty->print_cr(" Crypto capabilities retrieved.");
}
static int levelProperties[_max_cache_levels]; // All property indications per level.
static int levelScope[_max_cache_levels]; // private/shared
static const char* levelScopeText[4] = {"No cache ",
"CPU private",
"shared ",
"reserved "};
static int levelType[_max_cache_levels]; // D/I/mixed
static const char* levelTypeText[4] = {"separate D and I caches",
"I cache only ",
"D-cache only ",
"combined D/I cache "};
static unsigned int levelReserved[_max_cache_levels]; // reserved property bits
static unsigned int levelLineSize[_max_cache_levels];
static unsigned int levelTotalSize[_max_cache_levels];
static unsigned int levelAssociativity[_max_cache_levels];
// Extract Cache Layout details.
if (has_ExtractCPUAttributes() && printVerbose) { // For information only, as of now.
bool lineSize_mismatch;
bool print_something;
long functionResult;
unsigned int attributeIndication = 0; // 0..15
unsigned int levelIndication = 0; // 0..8
unsigned int typeIndication = 0; // 0..1 (D-Cache, I-Cache)
int functionCode = calculate_ECAG_functionCode(attributeIndication, levelIndication, typeIndication);
// Get cache topology.
functionResult = call_getFeatures(buffer, -1, functionCode);
for (unsigned int i = 0; i < _max_cache_levels; i++) {
if (functionResult > 0) {
int shiftVal = 8*(_max_cache_levels-(i+1));
levelProperties[i] = (functionResult & (0xffUL<<shiftVal)) >> shiftVal;
levelReserved[i] = (levelProperties[i] & 0xf0) >> 4;
levelScope[i] = (levelProperties[i] & 0x0c) >> 2;
levelType[i] = (levelProperties[i] & 0x03);
} else {
levelProperties[i] = 0;
levelReserved[i] = 0;
levelScope[i] = 0;
levelType[i] = 0;
}
levelLineSize[i] = 0;
levelTotalSize[i] = 0;
levelAssociativity[i] = 0;
}
tty->cr();
tty->print_cr("------------------------------------");
tty->print_cr("--- Cache Topology Information ---");
tty->print_cr("------------------------------------");
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
tty->print_cr(" Cache Level %d: <scope> %s | <type> %s",
i+1, levelScopeText[levelScope[i]], levelTypeText[levelType[i]]);
}
// Get D-cache details per level.
_Dcache_lineSize = 0;
lineSize_mismatch = false;
print_something = false;
typeIndication = 0; // 0..1 (D-Cache, I-Cache)
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
if ((levelType[i] == 0) || (levelType[i] == 2)) {
print_something = true;
// Get cache line size of level i.
attributeIndication = 1;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelLineSize[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
// Get cache total size of level i.
attributeIndication = 2;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelTotalSize[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
// Get cache associativity of level i.
attributeIndication = 3;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelAssociativity[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
_Dcache_lineSize = _Dcache_lineSize == 0 ? levelLineSize[i] : _Dcache_lineSize;
lineSize_mismatch = lineSize_mismatch || (_Dcache_lineSize != levelLineSize[i]);
} else {
levelLineSize[i] = 0;
}
}
if (print_something) {
tty->cr();
tty->print_cr("------------------------------------");
tty->print_cr("--- D-Cache Detail Information ---");
tty->print_cr("------------------------------------");
if (lineSize_mismatch) {
tty->print_cr("WARNING: D-Cache line size mismatch!");
}
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
if (levelLineSize[i] > 0) {
tty->print_cr(" D-Cache Level %d: line size = %4d, total size = %6dKB, associativity = %2d",
i+1, levelLineSize[i], levelTotalSize[i]/(int)K, levelAssociativity[i]);
}
}
}
// Get I-cache details per level.
_Icache_lineSize = 0;
lineSize_mismatch = false;
print_something = false;
typeIndication = 1; // 0..1 (D-Cache, I-Cache)
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
if ((levelType[i] == 0) || (levelType[i] == 1)) {
print_something = true;
// Get cache line size of level i.
attributeIndication = 1;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelLineSize[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
// Get cache total size of level i.
attributeIndication = 2;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelTotalSize[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
// Get cache associativity of level i.
attributeIndication = 3;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelAssociativity[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
_Icache_lineSize = _Icache_lineSize == 0 ? levelLineSize[i] : _Icache_lineSize;
lineSize_mismatch = lineSize_mismatch || (_Icache_lineSize != levelLineSize[i]);
} else {
levelLineSize[i] = 0;
}
}
if (print_something) {
tty->cr();
tty->print_cr("------------------------------------");
tty->print_cr("--- I-Cache Detail Information ---");
tty->print_cr("------------------------------------");
if (lineSize_mismatch) {
tty->print_cr("WARNING: I-Cache line size mismatch!");
}
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
if (levelLineSize[i] > 0) {
tty->print_cr(" I-Cache Level %d: line size = %4d, total size = %6dKB, associativity = %2d",
i+1, levelLineSize[i], levelTotalSize[i]/(int)K, levelAssociativity[i]);
}
}
}
// Get D/I-cache details per level.
lineSize_mismatch = false;
print_something = false;
typeIndication = 0; // 0..1 (D-Cache, I-Cache)
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
if (levelType[i] == 3) {
print_something = true;
// Get cache line size of level i.
attributeIndication = 1;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelLineSize[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
// Get cache total size of level i.
attributeIndication = 2;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelTotalSize[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
// Get cache associativity of level i.
attributeIndication = 3;
functionCode = calculate_ECAG_functionCode(attributeIndication, i, typeIndication);
levelAssociativity[i] = (unsigned int)call_getFeatures(buffer, -1, functionCode);
_Dcache_lineSize = _Dcache_lineSize == 0 ? levelLineSize[i] : _Dcache_lineSize;
_Icache_lineSize = _Icache_lineSize == 0 ? levelLineSize[i] : _Icache_lineSize;
lineSize_mismatch = lineSize_mismatch || (_Dcache_lineSize != levelLineSize[i])
|| (_Icache_lineSize != levelLineSize[i]);
} else {
levelLineSize[i] = 0;
}
}
if (print_something) {
tty->cr();
tty->print_cr("--------------------------------------");
tty->print_cr("--- D/I-Cache Detail Information ---");
tty->print_cr("--------------------------------------");
if (lineSize_mismatch) {
tty->print_cr("WARNING: D/I-Cache line size mismatch!");
}
for (unsigned int i = 0; (i < _max_cache_levels) && (levelProperties[i] != 0); i++) {
if (levelLineSize[i] > 0) {
tty->print_cr(" D/I-Cache Level %d: line size = %4d, total size = %6dKB, associativity = %2d",
i+1, levelLineSize[i], levelTotalSize[i]/(int)K, levelAssociativity[i]);
}
}
}
tty->cr();
}
return;
}
unsigned long VM_Version::z_SIGILL() {
unsigned long ZeroBuffer = 0;
unsigned long work;
asm(
" LA %[work],%[buffer] \n\t" // Load address of buffer.
" LARL 14,+6 \n\t" // Load address of faulting instruction.
" BCR 15,%[work] \n\t" // Branch into buffer, execute whatever is in there.
: [buffer] "+Q" (ZeroBuffer) /* outputs */
, [work] "=&a" (work) /* outputs */
: /* inputs */
: "cc" /* clobbered */
);
return ZeroBuffer;
}
unsigned long VM_Version::z_SIGSEGV() {
unsigned long ZeroBuffer = 0;
unsigned long work;
asm(
" LG %[work],%[buffer] \n\t" // Load zero address.
" STG %[work],0(,%[work])\n\t" // Store to address zero.
: [buffer] "+Q" (ZeroBuffer) /* outputs */
, [work] "=&a" (work) /* outputs */
: /* inputs */
: "cc" /* clobbered */
);
return ZeroBuffer;
}