DYNAMIC SOFTWARE CODE INSTRUMENTATION METHOD AND
SYSTEM
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to software analysis, and more particularly to a method and apparatus for dynamically instrumenting software executing on embedded systems for analysis thereof.
2. Background Information
A wide variety of hardware and/or software systems for generating an exception to debug, test and/or emulate a target processor are known in the art. Such systems provide their functionality using many disparate technologies.
For example, U.S. Patent Nos. 5,560,036 to Yoshida; 5,737,516 to Circello et al.; 5,530,804 to Edgington et al . , (the '804 patent); and 5,493,664 to Doi, all disclose processors having hardware or software integrated therein which facilitates
debugging. A drawback of these approaches, however, is that they are not readily usable in
connection with processors not originally manufactured with integrated debugging capabilities. For example, The '804 patent discloses a processor having two modes of operation, one being a normal mode and the other being a debug, test or emulator mode of operation which is entered via an exception/interrupt. In this approach, a "generate debug mode exception" (GDMI) may be included in the processor's instruction set. Disadvantageously, this approach is integrated into the processor rather than being suitable for use with processors not originally manufactured with such integrated systems.
U.S. Patent No. 5,748,878 to Rees et al., (the '878 patent) discloses a software analysis system for capturing tags generated by tag statements in instrumented source code. This software analysis system includes a probe that monitors the address and data bus of the target system.
When a tag statement is executed in the target system, a tag is written to a predetermined location in the address space of the target system. In this manner, instructions
executing from internal cache memory which are not reflected on externally accessible buses, may be monitored. A drawback of this approach, however, is that discrete tag statements, which tend to disadvantageously increase the number of executable lines of the code, must be included within the source code. These discrete tags disadvantageously increase the size of the code in proportion to the number of functions instrumented. Moreover, although the tags may be monitored, the code continues to be executed within cache, and thus is not directly observable.
Thus, a need exists for an improved debugging/emulation system capable of overcoming the drawbacks of the prior art.
SUMMARY OF THE INVENTION
According to an embodiment of this invention, a method for monitoring software code being executed in a target system having a bus and cache, includes the steps of: (a) searching a range of addresses within the software code to identify a desired instruction;
(b) replacing the desired instruction with an exception-generating instruction;
(c) inserting an exception routine into an exception vector table, the exception routine having a cache-disabling instruction and a branch instruction branching to an address of the software code subsequent to the exception-generating instruction; and
(d) executing the software code.
In a second aspect of the present invention, a method for monitoring software code being executed in a target
system having a bus and cache includes the steps of:
(a) searching a range of addresses within the
software code to identify preamble and
postamble instructions;
(b) replacing the preamble instruction with a misalignment instruction;
(c) replacing the postamble instruction with an other
misalignment instruction;
(d) inserting an exception routine into an exception
vector table executable upon a branch from a
faulted address, the exception routine having a
cache-disabling instruction, an instruction to
execute the instruction replaced from the faulted
address, a branch instruction branching to an address of the software code subsequent to the faulted address, and a decoding instruction to indicate entry of a function when the address of the misalignment instruction is faulted and to indicate exit of a function when the address of the other misalignment instruction is faulted; and
(e) executing the software code, wherein at least a portion of the software code will execute externally of the cache. In a third aspect of the present invention, a system is provided for monitoring software code being executed in a target having a bus and cache. The system includes an instruction locating module which searches a range of addresses within the software code to identify a desired instruction, and an instruction replacement module which replaces the desired instruction with an exception- generating instruction. The system also includes a vector table instrumentation module which inserts an exception routine into an exception vector table, the exception routine having a cache-disabling instruction and a branch instruction branching to an address of the software code located subsequent to the exception-generating instruction.
The above and other features and advantages of this invention will be more readily apparent from a reading of the following detailed description of various aspects of the invention taken in conjunction with the accompanying drawings .
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram/flow chart of an example of the code monitoring system of the present invention;
Fig. 2 is a block diagram/flow chart of an example of operations performed by the code monitoring system of Fig. 1;
Fig. 3 is an expanded block diagram/flowchart of an embodiment of the present invention including the code monitoring system of Fig. 1;
Fig. 4 is a screen display of a step in the operation of the present invention;
Fig. 5 is a screen display showing results of the operation of the present invention;
Fig. 6 is a screen display of an additional step in the operation of the present invention;
Fig. 7 is a screen display of a further step in the
operation of the present invention;
Fig. 8 is a screen display of results of the operation of the present invention shown in Fig. 7;
Fig. 9 is a screen display of a further step in the operation of the present invention;
Fig. 10 is a screen display of the results of the operation of the present invention shown in Fig. 9;
Fig. 11 is a screen display of a further command step in the operation of the present invention; and
Fig. 12 is a screen display of the results of the operation of the present invention shown in Fig. 11.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring to the figures set forth in the accompanying Drawings, the illustrative embodiments of the present invention will be described in detail hereinbelow.
For clarity of exposition, corresponding or analogous features shown in the accompanying drawings shall be indicated with like reference numerals and similar features such as shown in alternate embodiments in the drawings shall be indicated with similar reference numerals.
Briefly described, as best shown in Fig. 2, the present invention includes a system and method of monitoring software code as it is executed by a target CPU for debugging, etc. Standardized software code function (or module) preamble and postamble instructions such as shown at 30 and 32 are dynamically replaced (i.e., replaced after compiling and prior to execution) with instructions that will generate a predetermined exception or interrupt.
This exception is of a type included in the standard instruction set of the target processor, such as a misalignment exception. The exception thus generates a branch 90 to a conventional exception vector table 34. An exception routine 35 is inserted into the vector table, which may include any of several instructions, such as disabling the Data Cache (as at 92) and/or Instruction Cache. Subsequent instructions in the vector table execute the replaced preamble instruction and then, with or without re-enabling the cache as at 94, branch back to an address of the program code module immediately following the faulted preamble address as shown at 96. Instructions of the function 29 executed while cache is disabled are executed on the bus where they are visible, as opposed to within cache. The function 29 continues to execute until
the substitute postamble instruction 32 generates a second misalignment exception. This second exception will branch the program (as at 90) back to the exception table 34 which executes as discussed hereinabove and then re-enables the cache at 94. At this point, the vector table 34 branches back to an address of the program code immediately following the faulted postamble instruction as shown at 98 and then to the calling function 28 as shown at 102 to enable the remainder of the program to run in a normal, full speed (cache-enabled) fashion.
Advantageously, the present invention provides the flexibility to selectively instrument various portions of the code at run time, to avoid having to execute previously debugged code at the less than optimum levels of performance typically associated with disabled cache.
Moreover, the present invention enables such instrumentation nominally without "padding" the individual code functions with additional instructions. Rather, the functionality of the present invention is provided by adding instructions only to the exception vector table 34.
Thus, multiple software functions or modules may be instrumented nominally without any more overhead (i.e., added instructions) than that associated with instrumenting
a single function.
Referring to the Figures, the present invention will now be described in greater detail. As shown in Fig. 1, the invention includes an instrumentation block 9 which further includes an instruction locating module 22 coupled to an instruction replacement module 24 which is in turn coupled to a vector table instrumentation module 26.
Instruction locating module 22 scans a block of program code within a user designated address range or ranges to locate predetermined instructions. Examples of such predetermined instructions include those used to designate a preamble and/or a postamble of a code block or function.
Once the preamble and/or postamble of the code block has been located, instruction replacement module 24 replaces the instructions with substitute instructions designed to generate an exception of a type commonly included in the instruction set of the target microprocessor. An example of such an exception is a misalignment exception which occurs when the processor attempts to read from an odd numbered address. Although the present invention is described herein with respect to misalignment exceptions, it should be understood by those skilled in the art that other types of standard exceptions may be utilized without
departing from the spirit and scope of the present invention .
The vector table instrumentation module 26 serves to instrument (add instructions to) the standard exception vector table by inserting an exception routine 35 (Fig. 2) therein, as will be discussed in greater detail hereinbelow.
Turning now to Fig. 2, an example of the operation of an embodiment of the present invention is shown.
Initially, instruction locating module 22 utilizes conventional searching techniques to locate standard EABI
(Embedded Application Binary Interface) preamble and postamble instructions which occur at the beginning and ending, respectively, of a function. In particular, the invention may search for the MFSPR (move from special register) instruction which occurs in the preamble and the
MTSPR (move to special register) instruction which occurs in the postamble of each function. These instructions are preferably chosen because they are standard EABI commands present in any software intended to be compliant with a number of platforms, including Motorola® PowerPC™, other
Motorola® platforms, and Internet compatible platforms. The
MFSPR and MTSPR instructions are thus included in the ll
standard instruction set for nominally all EABI compatible processors .
For example, an 'MFSPR rO, lr' instruction (not shown) originally located at address 100 of instrumented function 29 instructs the processor to take the address in a link register of main program 28 (i.e., the calling function) and insert it into the rO register, while an 'MTSPR lr, rO' instruction (not shown) at address 200 of function 29 instructs the processor to take the value in the rO register and insert it back into the link register. In operation, the user may select an address range to be searched, to for example, search for functions disposed within, or called by instructions within, the range of addresses, i.e., between 0 and 300. Once the preamble and postamble instructions have been found by the instruction locating module 22, instruction replacement module 24 replaces them with substitute instructions to generate misalignment exceptions. Examples of misalignment instructions and their codes are shown in the following Table 1:
Table 1
In the example shown in Fig. 2, the preamble and postamble instructions are replaced with substitute instructions 30 and 32, respectively. Instruction 30 effectively instructs the processor to increment the value in the rl register by one and insert it into the rO register.
In this regard, the skilled artisan will recognize that to be fetched properly, the value of the address in the rl register should be an even number. Moreover, in
PowerPC™ architecture the processor may only fetch from
even numbered addresses in increments of eight. By inserting command' 30, the processor will attempt to read from an odd-numbered address and thus generate a misalignment exception. The processor will then branch to the exception vector table 34. Once at vector table 34, the processor will execute the exception routine 35 inserted by the instrumentation module 26 (Fig. 1) .
A preferred embodiment of the exception routine 35 is generally described in the following Table 2:
Table 2
The misalignment instruction causes a fault prior to actual execution thereof. The actual read from an odd address thus does not actually take place. The CPU automatically vectors to the misalignment exception routine
35 and automatically stores the faulted address in a
special register, i.e., the "SRRO" register. Referring now to Table 2, after saving the current state of the Data Cache, the first instruction in the exception routine 35 disables the Data Cache as shown at step 1. The subsequent instruction at step 2 directs the processor to read the starting location (i.e., address 602 in the exemplary code listings included hereinbelow) of the exception routine 35 so that this read is visible on the external bus and is thus used to indicate to an external bus/state analyzer that the misalignment exception routine 35 has been entered. In this regard, the instruction will have been pre-fetched by the processor and stored in the Instruction Cache. (One skilled in the art will recognize that in conventional "Harvard" architecture, instruction "fetches" normally occur in Instruction Cache, while "reads" and "writes" will normally occur in Data Cache.) This read of the prefetched instruction at the starting location of routine 35 thus serves as a TAG or MARK which informs an external bus/state analyzer to capture the subsequent cycle of instructions being executed. The next step 3 is to read the faulted address stored in the "SRRO" register as shown at 40. The exception routine then reads the data at the
location pointed to by the SRRO register (i.e., the Opcode at the faulted address) as shown at step 4. Since the Data Cache has been previously disabled, the processor executes steps 3 and 4 on the external bus where they are visible by the conventional bus/state analyzer, i.e., an emulator/debugging hardware or software system.
Steps 5a-5f decode the data according to the Opcode which generated the exception, to determine which instruction was originally replaced and to determine what action to take, as indicated in Table 1 hereinabove. For example, if the Opcode includes a hexadecimal value of 0001, as shown in step 5a, this indicates the presence of misalignment exception 30 (Table 1), and according to Table 1, function 29 was entered and only a marker (without a trace) should be generated. (An example of such functionality will be discussed hereinbelow with respect to Fig. 8.) Alternatively, if the Opcode includes a hexadecimal value of 4001, as shown at step 5d, this indicates presence of misalignment exception 32 (Table 1), and that according to Table 1, a function 29 was exited and a marker should be generated.
Various additional instructions may be included in the exception routine 35 to provide additional functionality
selectable by the user. For example, provision for decoding instructions 31 and 33 (Fig. 2) may be included as at steps 5b and 5f, to enable a user to instrument for entry and exit of functions and to trace the functions
(i.e., view the execution of the functions) . Instructions 37 and 39 also may be decoded as at steps 5c and 5e for use in called functions (i.e., children) for which a trace is not desired, as will be discussed in greater detail hereinbelow.
Having decoded the misalignment instruction, steps 5a-
5f will execute the original replaced instruction and take any additional appropriate action (i.e., turn Instruction
Cache on/off, etc.) as also shown. Once any one of the steps 5a-5f has been completed, the exception routine 35 restores the original state of the Data Cache and then reads the start of the exception routine +2, i.e., address
606 in the exemplary code listings included hereinbelow, as shown at step 6, to indicate to the bus/state analyzer that the exception routine has been exited. The Data Cache is then re-enabled in step 7. Step 8 returns to the instrumented function 29 at the next instruction after the misalignment instruction (i.e., the instruction subsequent
to the address in the SRRO register) .
The TAGS or MARKERS provided by steps 2 and 6 discussed hereinabove may be preferably utilized by the external bus/state analyzer to control output displayed by display module 14, in accordance with the triggering arrangement shown in the following Table 3:
Table 3
The above triggering arrangement signals the external bus/state analyzer when to display the output provided by the present invention. Such a triggering arrangement is particularly useful when the event program code 28 is executing with either or both Data and Instruction Caches disabled prior to entry of exception routine 35. In such an event, since the entire program code 28 may be executing
on the bus where it is visible, this triggering arrangement may be advantageously utilized to specifically identify execution of the selected function 29.
Having described an embodiment of the present invention, various functionality thereof will be described.
In the event the present invention is configured to indicate only entry and exit of a particular function 29, the exception routine 35 is executed once, utilizing step
5a to indicate entry to the function 29. The exception routine then branches back to the next instruction after the preamble to permit the function 29 to execute in a conventional manner until the misalignment instruction 32 is reached, at which time the exception routine 35 is executed a second time, utilizing step 5d to indicate exit from the function 29. In this event, after indication that the function 29 has been entered, the function 29 will continue to execute in cache until the processor attempts to read the substituted instruction 32 at the postamble.
When this occurs, a second misalignment exception is generated at which point the processor branches back to the vector table 34 (and exception routine 35) to provide the user with an indication that the function 29 is being exited by the microprocessor. The routine 35 will then be
exited, branching to the instruction subsequent to the postamble of the function 29, followed by restoring the value originally in rO to the link register to effectively branch the processor back to the main program code (calling function) 28. The calling function 28 will then operate in a conventional, fully cached mode to operate at full efficiency and speed.
Additional functionality, such as providing a trace with or without trace of other functions (i.e., calls or children) called by function 29 may be provided. This may be implemented by using modules 22 and 24 to individually locate any branches to such children, and replace the preambles and postambles of such children, (regardless of whether or not they fall within the address range selected by the user), substantially as described hereinabove. For example, a function 29 (and calls) may be traced by substituting instructions 31 and 33 into function 29 and its children as described hereinabove. Similarly, function
29 may be traced without calls by substituting instructions
31 and 33 into function 29, while substituting instructions
37 and 39 into the preambles and postambles, respectively, of any children of function 29. In this latter example, the Instruction Cache will be enabled upon entry to each of
the children to prevent them from being traced, and then disabled upon exit therefrom to continue tracing the parent function 29.
Exemplary program code listings of the exception routine 35 of the present invention for use with 6xx and 8xx Motorola® PowerPC™ microprocessors are included hereinbelow.
Turning now to Fig. 3, a preferred embodiment of the present invention is shown and described in block diagram format. As shown, a conventional cache control module 10 may be utilized in combination with the present invention to enable a user to selectively enable or disable
Instruction Cache and/or Data Cache as indicated at blocks
11 and 13, respectively. The cache control module 10 is preferably coupled to instrumentation module 12 of the present invention. The instrumentation module preferably includes an Entry/Exit instrumentation module 16, a Trace
Functions With Calls module 18 and a Trace Functions
Without Calls module 20. Modules (i.e, menu commands) 16,
18 and 20 are individually selectable by a user utilizing a conventional graphical user interface (GUI), as may be provided in Display Module 14 discussed hereinbelow. Each module 16, 18 and 20 is coupled to the instrumentation
block 9 which includes modules 22, 24 and 26 as described hereinabove and which operate in a predetermined manner dependent upon which instruction or module 16, 18 and 20 is selected by the user. In this regard, instruction locating module 22 includes a preamble/postamble locating block 40 for locating instructions disposed in the preamble and/or postamble of a function, such as the MFSPR and MTSPR instructions discussed hereinabove. A branch instruction module 42 is also included to locate branch instructions and thus provide the Trace With Calls functionality associated with module 18.
Instrumentation module 12 is coupled to a display module 14 which as mentioned hereinabove, may include a conventional graphical user interface (GUI) to generate screen displays of both the user selectable functions as well as the code executing on the bus of the target processor .
As shown in Fig. 4, the cache control module 10 may be operated using a GUI interface generated by display module
14 to either enable or disable Instruction Cache and/or
Data Cache using instruction and Data Cache toolbars 41 and
43, respectively. Once disabled, all instruction fetches and/or reads and writes will occur on the bus and thus be
displayed as shown, for example, in Fig. 5.
Turning to Fig. 5, both Instruction Cache and Data Cache have been disabled as shown at display line 45. As also shown, instruction fetch cycles occurring on the bus are indicated with a "miss" designation 47 to indicate that cache was missed. Moreover, all read cycles and write cycles are displayed with the words "read" (not shown) or "write" as at 53 when the Data Cache is disabled.
An exemplary embodiment of the present invention having been described, the following is a more detailed description of some of the operations thereof as displayed to a user.
In general, cache may be initially disabled and enabled by invoking cache control module 10 or a similar device as shown in Fig. 4. A user may then operate the present invention by selecting module (menu command) 16, 18, or 20 as will be shown and described with respect to Figs. 6-11 hereinbelow. The code 28 to be debugged then may be run on the target processor as desired and a trace thereof may be displayed by the display module 14.
Turning to Fig. 6, in a preferred embodiment, specific functions to instrument and trace may be selected as at 54 which in turn activates an Instrument Functions menu 55
generated by instrumentation module 12 (Fig. 3) . Turning to Fig. 7, selecting the Entry/Exit Only command 56 invokes
Entry/Exit module 16 (Fig. 3) to capture every instance within a desired address range in which a selected function is called. In a preferred embodiment, any function that called the selected function also may be indicated. This command 56 is useful for tracing function/performance information, such as time stamp and sequence information.
Fig. 8 is an example of an output generated by use of the
Entry/Exit Only function 56. In this example, the function
"daysBetween" has been instrumented for only Entry/Exit.
Each Entry/Exit is indicated by the display of
"c\daysBetween" as at 57 (which indicates that the function has been called) . Also visible is the function "calender"
(as at 61) because it called the function "daysBetween". A user may "drill down" by actuating (i.e., clicking) on the
'+' icon in a manner known to those familiar with Microsoft® software, such as "Microsoft® Explorer™", to show expanded detail such as the opened and closed brackets 58 and 59 which correspond to Entry and Exit of a function, respectively. In the example shown, only one instance of
Entry/Exit has been shown in expanded detail. Turning to
Fig. 9, the instruction Instrument and Trace Functions with
Calls 60 may be selected by the user to invoke module 18 (Fig. 3) to provide more detailed visibility into the executing code. This provides entire program flow for instrumented functions and also for nested functions (i.e., calls or children) of the instrumented function (s), as shown in Fig. 10. Turning to Fig. 10, the function "dayOfYear" 62 is instrumented and trace is also displayed for all other nested functions as shown at 64. The Instruction Cache toolbar 44 is displayed as "disabled" because cache is disabled for this particular routine thus permitting instruction fetches occurring on the bus to be captured.
Turning now to Fig. 11, the instruction Instrument and Trace Function (s) Without Calls 66 may be selected to invoke module 20 (Fig. 3) to view program flow of a function (e.g., dayOfyear) without full trace for associated calls. When selected, Entry/Exit visibility for calls associated with the selected function is provided as at 68 and 70 of Fig. 12, with the trace of the function shown in expanded form at 72.
The present invention is advantageously capable of being utilized with various target processors regardless of whether or not they include specific debugging/emulation
tools or systems integrated therein. Moreover, the invention does not necessitate increasing the size (lines) of executable code being debugged, and is capable of monitoring the execution of individual code instructions by selectively disabling and enabling portions of the code, while permitting remaining portions of the code to run at full (cache enabled) speed.
Moreover, although the present invention has been described hereinabove as utilized with an external bus/state analyzer to capture information on the bus, it should be recognized by those skilled in the art that the present invention may be utilized in combination with a software system which may store the desired information (i.e., entry/exit markers and/or traces, etc.) within a circular buffer which would automatically cycle to keep the latest executed instructions therein. In this manner, the present invention may be implemented in combination with a bus/state analyzer implemented in hardware, software, or a combination thereof.
The foregoing description is intended primarily for purposes of illustration. Although the invention has been shown and described with respect to an exemplary embodiment thereof, it should be understood by those skilled in the
art that the foregoing and various other changes, omissions, and additions in the form and detail thereof may be made therein without departing from the spirit and scope of the invention.
62 eqoeo α atj . 30 aq.e_}.s .uθ_i-rno θq .θb #
rdsjui
_>peq.s oq. θnχ_?Λ jo_).ετ6θ-i 01^ SΛES # (χ_r) xn Ol^
M.
s
:OΘΛ-)S3 : q. ;pq.s
^09/209 - τso^xo/τzxo ττxo #
909/209 - TlOt'XO/IOOt'XO/IxO #
########## ###########################################################
0090x0 ^ θuμnoi ΘOTΛIΘS uoxq.daoxa apoo paq.uauin-i-).sui #
########## ###########################################################
# Uπ->ιsc3Λ- • ) -0090*0 dτ>[S-
: uτeui-
:^J ^SC3Λ
#############
###########################################################
•sin nns θxqε . JO_).OΘΛ uoτ_).dθox3 #
#############
########################################################### uτeui χqoχb'
-ta is τqoχb-
}XΘ
##########
########################################################### suoτ.τuτjθp sxqeτjHΛ uouiuioo # ,.ιχ ■ SJPΛ/OUT apnχouτ •
########## ###########################################################
02=#
#
# d-103 sχooj. -ioddns peppoq ia 666T (0) ^ubx^doo #
#
######################################################################## uoτsiθΛ xx8
sbuτ .sχτ; apoo uie bo-i-j
99szι/oosniDd esfrot./oo OΛV
mfspr rll,dccst # get the current state of the D cache
EstVec4 :
# Shut off D Cache lis rll, 0x0400 # mask of
0x040000000 (shut off D cache)=09 mtspr dccst,rll # this allows the mark command to appear
# read 602 addis rll,0,EstVec@h # get the address of exception addi rll, rll, 0x0602 # get the rest of address lhz rll,0(rll) # read half word (2 bytes) from address
# read LMW mfspr rll, srrO # Get the address of the misalignment instruction lwz rll,0(rll) # Read the patched LMW instruction andi. rll, rll, Oxffff # Zero out upper bits
# Read In I Cache mfspr rl2,iccst # get the current state of the I cache c_inst_entry : cmpi 0,0, rll, 0x0001 # Check for inst entry point beq Func_entry # all done cmpi 0, 0, rll, 0x4001 # check for inst exit point beq Func exit # all done=09 cmpi 0, 0, rll, 0x4011 # check for trc on exit point beq enable I cache # enable I Cache
— flag for 0x60a # 0x21/0x11/0x4021 =09 ori rl0,rl0, 0x0004 # flag for read from 0x60a cmpi 0, 0, rll, 0x0011 # check for trc on entry point beq disable_I_cache # disable I Cache
cmpi 0, 0, rll, 0x4021 # check for trc off exit point beq disable_I_cache # disable I Cache cmpi 0, 0, rll, 0x0021 # check for trc off entry point beq enable_I_cache # enable I Cache b Func_exit # unknown- set to exit=09
=09 disable_I_cache : andis. rl2, rl2, 0x7f00 # DEN=3D0 oris rl2, rl2, 0x400 # Disable instruction cache cmpli 0, 0, rll, 0x4000 # check if < 0x4000L be 4, 0, Func_exit # if not, function Exit b Func_entry #=20 enable__I_cache : oris rl2 , rl2 , 0x200 # Enable Instruction caches cmpli 0,0, rll, 0x4000 # check if < 0x4000L be 4, 0, Func_exit # if not, function Exit b Func_entry #
Func_entry :
Mfspr r0,lr # execute replaced instruction and. rll,r0,r0 # move rO (LR) into rll lwz rll, 0 (rll) # Read the LR address b EstVec_exit
Func_exit :
Mtspr lr,r0 # execute replaced instruction
EstVec exit or rll,rl0,rl0 # save rlO to rll andi. rlO, rlO, OxOOOf # Only keep lower 4 bits cmpli 0, 0,rl0, 0x0004 # check if =3D=3D 0x0004L bne read_606 or rl0,rll,rll # restore rlO from rll addis rll, 0, EstVec4@h # get the address to indicate end of function addi rll, rll, 0x060a # get the rest of next address
b read_60a read_606: =09 or rlO,rll,rll # restore rlO from rll addis rll, 0, EstVec4@h # get the address to indicate end of function addi rll, rll, 0x0606 # get the rest of next address read_60a : lhz rll, 0 (rll) # read half word(2 bytes) from address mfspr rll,srr0 # Wanta return passed the LMW instruction, addi rll, rll, 0x0004 # Add 4 mtspr srr0,rll # restore srrO mtspr iccst,rl2 # set up I cache or rll,rl0,rl0 # copy rlO to rll rlwin rll, rll , 0, 0, 0 cmpi 0,0, rll, 0x0000 be 12, 2, load_dccst # done if it's not equal to 0x8000 dccst_en: oris rl0,rl0, 0x0200 # it's 0x8000, or with
0x2000000 (cache enable) =09 load dccst: =20
mtspr dccst, rlO # restore D cache lwz rl0,0x4(rl) # restore rlO register from stack rfi
########################################################### ##
end
=_NextPart_000_0019_01BE76E9.2E9F4540
Content-Type : application/octet-stream; name="inst6xx. s" Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename="inst6xx. s"
."£
χχ-ι o-). Adoo e Θ>(HUI # OPϊAlI-i jdsj i θtpeo θiχ_). jo a .p .s UΘIJΠO θτχ_). jab # opm'oτ^ αdsjui
-ιo_).sτ5θ_ι QTA 3ΛES # (XJ) {7 0 'OTJ
M:-
S
:DΘΛ-)S3
P09
x0 peθ-i τ3o^
χo τz
χo ττ
χo # ########## ###########################################################
0090x0 ^H θu noi θoτΛ θs uoτ .deoxθ opoo po_).uauin_i.sui #
########## ###########################################################
# UJEISOΘΛ-- A0090*0 dτ[s-
:uτpι
############# ###########################################################
• a-m.on_i-s ©T ^. ^OJOΘΛ uoτ .doox3 #
#############
########################################################### uτeui χqoχβ*
_LH¥i,s τqoχβ-
########## ########################################################### suoτ .τuτjop θχqpχ_iPΛ uouruioo § ,.ιχ • sαsΛ/ouτ,, θpnχouτ *
########## ###########################################################
02=#
#
# d-oo sχooj. .αoddns pappaquig 6661 (0) -lufil-iAdoo #
#
=##############
########################################################### uoτsiθΛ xxg
99SZI/00SnX3d εsfrθt./oo OΛV
# Shut off D Cache lis rl2,0xffff # setting up a mask of 0xffffbffff=09 li rl2,0xbfff and rll,rll,rl2 # shut off the data cache mtspr hid0,rll # this allows the mark command to appear or rl2,rl0,rl0 # get original hidO value from rlO
# read 602 addis rll, 0,EstVec@h # get the address of exception addi rll, rll, 0x0602 # get the rest of address lhz rll,0(rll) # read half word (2 byte) address
# read LMW mfspr rll, srrO # Get the address of the misalignment instruction lwz rll,0(rll) # Read the patched LMW instruction andi. rll, rll, Oxffff # Zero out upper bits c_inst_entry : cmpi 0,0, rll, 0x0001 # Check for inst entry point beq Func_entry # all done cmpi 0,0, rll, 0x4001 # check for inst exit point beq Func_exit # all done=09 cmpi 0, 0, rll, 0x4011 # check for trc on exit point beq enable_I_cache # enable I Cache
# flag for 0x60a # 0x21/0x11/0x4021 =09 ori rl0,rl0, 0x0004 # flag for read from 0x60a cmpi 0, 0, rll, 0x0021 # check for trc off entry point
beq enable_I_cache # enable I Cache cmpi 0,0, rll, 0x0011 # check for trc on entry point bne chk_trcoff_exit lis rll,0xffff # setting up a mask of 0xffff7fff=09 addi rll,rll,0x7fff and rl2 , rl2 , rll # Disable instruction cache b Func_entry chk_trcoff_exit : cmpi 0, 0, rll, 0x4021 # check for trc off exit point bne Func exit # unknown- set to exit=09 lis rll,0xffff # setting up a mask of 0xffff7fff=09 addi rll,rll,0x7fff and rl2,rl2,rll # Disable instruction cache b Func exit # must be 0x4011 (trc on exit; enable_I_cache : ori rl2,rl2, 0x8000 # Enable Instruction caches cmpi 0,0, rll, 0x0021 # check for trc off entry point bne Func exit # must be 0x4011 (trc on exit)
Func_entry : Mfspr rO, lr # execute replaced instruction and. rll,r0,r0 # move r0(LR) into rll lwz rll,0(rll) # Read the LR address b EstVec exit
Func_exit : Mtspr lr, rO # execute replaced instruction
EstVec exit : or rll,rl0,rl0 # set rll=3DrlO rlwinm rlO, rlO, 0, 17 , 17 # check bit 17 (dee) cmpi 0, 0,rl0, 0x0000 # check if dce=3D0 be 12, 2, dccst dis # yes, just exit dccst_en : ori rl2,rl2, 0x4000 # set dee to enable dccst dis or rlO , rll, rll # set rlO=3Drll andi. rlO, rlO, OxOOOf # Only keep lower 4 bits addis rll, 0, EstVecΘh # get the address to indicate end of function addi rll, rll, 0x0606 # get the rest of address add rll,rll,rl0 # rll=3Drll+rl0(0x0 or
0x2) lhz rll,0(rll) # read half word (2 byte) address mfspr rll, srrO # Wanta return passed the LMW instuction. addi rll, rll, 0x0004 # Add 4 mtspr srr0,rll # restore srrO mtspr hid0,rl2 # restore D cache lwz rl0,0x4(rl) # restore rlO register from stack rfi ########################################################### ##
end
Having thus described the invention, what is claimed