blob: 0407c579350c9c0ca410d2d6f30a9e764ca7ae25 [file] [log] [blame]
Elliott Hughes2faa5f12012-01-30 14:42:07 -08001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro12eb78e2011-06-24 14:51:06 -070016
17#ifndef ART_SRC_DEX_INSTRUCTION_H_
18#define ART_SRC_DEX_INSTRUCTION_H_
19
Elliott Hughes07ed66b2012-12-12 18:34:25 -080020#include "base/logging.h"
Elliott Hughes76160052012-12-12 16:31:20 -080021#include "base/macros.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070022#include "globals.h"
Carl Shapiro12eb78e2011-06-24 14:51:06 -070023
Sebastien Hertz807a2562013-04-15 09:33:39 +020024typedef uint8_t uint4_t;
25typedef int8_t int4_t;
26
Carl Shapiro12eb78e2011-06-24 14:51:06 -070027namespace art {
28
Ian Rogersd81871c2011-10-03 13:57:23 -070029class DexFile;
30
Elliott Hughesadb8c672012-03-06 16:49:32 -080031enum {
32 kNumPackedOpcodes = 0x100
33};
34
Carl Shapiro12eb78e2011-06-24 14:51:06 -070035class Instruction {
36 public:
Carl Shapiroe4c1ce42011-07-09 02:31:57 -070037 // NOP-encoded switch-statement signatures.
38 enum {
39 kPackedSwitchSignature = 0x0100,
40 kSparseSwitchSignature = 0x0200,
Elliott Hughesadb8c672012-03-06 16:49:32 -080041 kArrayDataSignature = 0x0300,
Carl Shapiroe4c1ce42011-07-09 02:31:57 -070042 };
43
Ian Rogersdf1ce912012-11-27 17:07:11 -080044 struct PACKED(4) PackedSwitchPayload {
Logan Chien19c350a2012-05-01 19:21:32 +080045 const uint16_t ident;
46 const uint16_t case_count;
47 const int32_t first_key;
48 const int32_t targets[];
Dragos Sbirlea39f99272013-06-25 13:17:36 -070049
Logan Chien19c350a2012-05-01 19:21:32 +080050 private:
51 DISALLOW_COPY_AND_ASSIGN(PackedSwitchPayload);
52 };
53
Ian Rogersdf1ce912012-11-27 17:07:11 -080054 struct PACKED(4) SparseSwitchPayload {
Logan Chien19c350a2012-05-01 19:21:32 +080055 const uint16_t ident;
56 const uint16_t case_count;
57 const int32_t keys_and_targets[];
58
59 public:
60 const int32_t* GetKeys() const {
61 return keys_and_targets;
62 }
63
64 const int32_t* GetTargets() const {
65 return keys_and_targets + case_count;
66 }
67
68 private:
69 DISALLOW_COPY_AND_ASSIGN(SparseSwitchPayload);
70 };
71
Ian Rogersdf1ce912012-11-27 17:07:11 -080072 struct PACKED(4) ArrayDataPayload {
Logan Chien19c350a2012-05-01 19:21:32 +080073 const uint16_t ident;
74 const uint16_t element_width;
75 const uint32_t element_count;
76 const uint8_t data[];
Dragos Sbirlea39f99272013-06-25 13:17:36 -070077
Logan Chien19c350a2012-05-01 19:21:32 +080078 private:
79 DISALLOW_COPY_AND_ASSIGN(ArrayDataPayload);
80 };
81
Ian Rogersa75a0132012-09-28 11:41:42 -070082 // TODO: the code layout below is deliberate to avoid this enum being picked up by
83 // generate-operator-out.py.
84 enum Code
85 {
jeffhaoba5ebb92011-08-25 17:24:37 -070086#define INSTRUCTION_ENUM(opcode, cname, p, f, r, i, a, v) cname = opcode,
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070087#include "dex_instruction_list.h"
Carl Shapiro12eb78e2011-06-24 14:51:06 -070088 DEX_INSTRUCTION_LIST(INSTRUCTION_ENUM)
Carl Shapirod84f49c2011-06-29 00:27:46 -070089#undef DEX_INSTRUCTION_LIST
Carl Shapiro12eb78e2011-06-24 14:51:06 -070090#undef INSTRUCTION_ENUM
Ian Rogersa75a0132012-09-28 11:41:42 -070091 } ;
Carl Shapiro12eb78e2011-06-24 14:51:06 -070092
Elliott Hughesadb8c672012-03-06 16:49:32 -080093 enum Format {
Carl Shapiroe4c1ce42011-07-09 02:31:57 -070094 k10x, // op
95 k12x, // op vA, vB
96 k11n, // op vA, #+B
97 k11x, // op vAA
98 k10t, // op +AA
99 k20t, // op +AAAA
100 k22x, // op vAA, vBBBB
101 k21t, // op vAA, +BBBB
102 k21s, // op vAA, #+BBBB
103 k21h, // op vAA, #+BBBB00000[00000000]
104 k21c, // op vAA, thing@BBBB
105 k23x, // op vAA, vBB, vCC
106 k22b, // op vAA, vBB, #+CC
107 k22t, // op vA, vB, +CCCC
108 k22s, // op vA, vB, #+CCCC
109 k22c, // op vA, vB, thing@CCCC
110 k32x, // op vAAAA, vBBBB
111 k30t, // op +AAAAAAAA
112 k31t, // op vAA, +BBBBBBBB
113 k31i, // op vAA, #+BBBBBBBB
114 k31c, // op vAA, thing@BBBBBBBB
115 k35c, // op {vC, vD, vE, vF, vG}, thing@BBBB (B: count, A: vG)
116 k3rc, // op {vCCCC .. v(CCCC+AA-1)}, meth@BBBB
117 k51l, // op vAA, #+BBBBBBBBBBBBBBBB
118 };
119
120 enum Flags {
121 kBranch = 0x01, // conditional or unconditional branch
122 kContinue = 0x02, // flow can continue to next statement
123 kSwitch = 0x04, // switch statement
124 kThrow = 0x08, // could cause an exception to be thrown
125 kReturn = 0x10, // returns, no additional statements
126 kInvoke = 0x20, // a flavor of invoke
TDYa127526643e2012-05-26 01:01:48 -0700127 kUnconditional = 0x40, // unconditional branch
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700128 };
129
jeffhaoba5ebb92011-08-25 17:24:37 -0700130 enum VerifyFlag {
131 kVerifyNone = 0x00000,
132 kVerifyRegA = 0x00001,
133 kVerifyRegAWide = 0x00002,
134 kVerifyRegB = 0x00004,
135 kVerifyRegBField = 0x00008,
136 kVerifyRegBMethod = 0x00010,
137 kVerifyRegBNewInstance = 0x00020,
138 kVerifyRegBString = 0x00040,
139 kVerifyRegBType = 0x00080,
140 kVerifyRegBWide = 0x00100,
141 kVerifyRegC = 0x00200,
142 kVerifyRegCField = 0x00400,
143 kVerifyRegCNewArray = 0x00800,
144 kVerifyRegCType = 0x01000,
145 kVerifyRegCWide = 0x02000,
146 kVerifyArrayData = 0x04000,
147 kVerifyBranchTarget = 0x08000,
148 kVerifySwitchTargets = 0x10000,
149 kVerifyVarArg = 0x20000,
150 kVerifyVarArgRange = 0x40000,
151 kVerifyError = 0x80000,
152 };
153
154 // Decodes this instruction, populating its arguments.
155 void Decode(uint32_t &vA, uint32_t &vB, uint64_t &vB_wide, uint32_t &vC, uint32_t arg[]) const;
156
Elliott Hughesadb8c672012-03-06 16:49:32 -0800157 // Returns the size (in 2 byte code units) of this instruction.
Ian Rogersa75a0132012-09-28 11:41:42 -0700158 size_t SizeInCodeUnits() const {
159 int result = kInstructionSizeInCodeUnits[Opcode()];
160 if (UNLIKELY(result < 0)) {
161 return SizeInCodeUnitsComplexOpcode();
162 } else {
163 return static_cast<size_t>(result);
164 }
165 }
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700166
Sebastien Hertz92c607f2013-06-04 16:18:52 +0200167 // Reads an instruction out of the stream at the specified address.
168 static const Instruction* At(const uint16_t* code) {
169 DCHECK(code != NULL);
170 return reinterpret_cast<const Instruction*>(code);
171 }
172
173 // Reads an instruction out of the stream from the current address plus an offset.
174 const Instruction* RelativeAt(int32_t offset) const {
175 return At(reinterpret_cast<const uint16_t*>(this) + offset);
176 }
177
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700178 // Returns a pointer to the next instruction in the stream.
Ian Rogersa75a0132012-09-28 11:41:42 -0700179 const Instruction* Next() const {
Sebastien Hertz92c607f2013-06-04 16:18:52 +0200180 return RelativeAt(SizeInCodeUnits());
Ian Rogersa75a0132012-09-28 11:41:42 -0700181 }
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700182
Jeff Hao9cec2472013-05-14 18:17:06 -0700183 // Returns a pointer to the instruction after this 1xx instruction in the stream.
184 const Instruction* Next_1xx() const {
185 DCHECK(FormatOf(Opcode()) >= k10x && FormatOf(Opcode()) <= k10t);
Sebastien Hertz92c607f2013-06-04 16:18:52 +0200186 return RelativeAt(1);
Jeff Hao9cec2472013-05-14 18:17:06 -0700187 }
188
189 // Returns a pointer to the instruction after this 2xx instruction in the stream.
190 const Instruction* Next_2xx() const {
191 DCHECK(FormatOf(Opcode()) >= k20t && FormatOf(Opcode()) <= k22c);
Sebastien Hertz92c607f2013-06-04 16:18:52 +0200192 return RelativeAt(2);
Jeff Hao9cec2472013-05-14 18:17:06 -0700193 }
194
195 // Returns a pointer to the instruction after this 3xx instruction in the stream.
196 const Instruction* Next_3xx() const {
197 DCHECK(FormatOf(Opcode()) >= k32x && FormatOf(Opcode()) <= k3rc);
Sebastien Hertz92c607f2013-06-04 16:18:52 +0200198 return RelativeAt(3);
Jeff Hao9cec2472013-05-14 18:17:06 -0700199 }
200
201 // Returns a pointer to the instruction after this 51l instruction in the stream.
Sebastien Hertz92c607f2013-06-04 16:18:52 +0200202 const Instruction* Next_51l() const {
203 DCHECK(FormatOf(Opcode()) == k51l);
204 return RelativeAt(5);
205 }
Jeff Hao9cec2472013-05-14 18:17:06 -0700206
Elliott Hughesadb8c672012-03-06 16:49:32 -0800207 // Returns the name of this instruction's opcode.
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700208 const char* Name() const {
Elliott Hughesadb8c672012-03-06 16:49:32 -0800209 return Instruction::Name(Opcode());
210 }
211
212 // Returns the name of the given opcode.
213 static const char* Name(Code opcode) {
214 return kInstructionNames[opcode];
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700215 }
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700216
Sebastien Hertz807a2562013-04-15 09:33:39 +0200217 // VRegA
Dragos Sbirlead25de7a2013-06-21 09:20:34 -0700218 int32_t VRegA() const;
Sebastien Hertz807a2562013-04-15 09:33:39 +0200219 int8_t VRegA_10t() const;
Sebastien Hertz5243e912013-05-21 10:55:07 +0200220 uint8_t VRegA_10x() const;
Sebastien Hertz807a2562013-04-15 09:33:39 +0200221 uint4_t VRegA_11n() const;
222 uint8_t VRegA_11x() const;
223 uint4_t VRegA_12x() const;
224 int16_t VRegA_20t() const;
225 uint8_t VRegA_21c() const;
226 uint8_t VRegA_21h() const;
227 uint8_t VRegA_21s() const;
228 uint8_t VRegA_21t() const;
229 uint8_t VRegA_22b() const;
230 uint4_t VRegA_22c() const;
231 uint4_t VRegA_22s() const;
232 uint4_t VRegA_22t() const;
233 uint8_t VRegA_22x() const;
234 uint8_t VRegA_23x() const;
235 int32_t VRegA_30t() const;
236 uint8_t VRegA_31c() const;
237 uint8_t VRegA_31i() const;
238 uint8_t VRegA_31t() const;
239 uint16_t VRegA_32x() const;
240 uint4_t VRegA_35c() const;
241 uint8_t VRegA_3rc() const;
242 uint8_t VRegA_51l() const;
243
244 // VRegB
Dragos Sbirlea39f99272013-06-25 13:17:36 -0700245 int32_t VRegB() const;
Sebastien Hertz807a2562013-04-15 09:33:39 +0200246 int4_t VRegB_11n() const;
247 uint4_t VRegB_12x() const;
248 uint16_t VRegB_21c() const;
249 uint16_t VRegB_21h() const;
250 int16_t VRegB_21s() const;
251 int16_t VRegB_21t() const;
252 uint8_t VRegB_22b() const;
253 uint4_t VRegB_22c() const;
254 uint4_t VRegB_22s() const;
255 uint4_t VRegB_22t() const;
256 uint16_t VRegB_22x() const;
257 uint8_t VRegB_23x() const;
258 uint32_t VRegB_31c() const;
259 int32_t VRegB_31i() const;
260 int32_t VRegB_31t() const;
261 uint16_t VRegB_32x() const;
262 uint16_t VRegB_35c() const;
263 uint16_t VRegB_3rc() const;
Dragos Sbirlea39f99272013-06-25 13:17:36 -0700264 uint64_t VRegB_51l() const; // vB_wide
Sebastien Hertz807a2562013-04-15 09:33:39 +0200265
266 // VRegC
Dragos Sbirlea39f99272013-06-25 13:17:36 -0700267 int32_t VRegC() const;
Sebastien Hertz807a2562013-04-15 09:33:39 +0200268 int8_t VRegC_22b() const;
269 uint16_t VRegC_22c() const;
270 int16_t VRegC_22s() const;
271 int16_t VRegC_22t() const;
272 uint8_t VRegC_23x() const;
273 uint4_t VRegC_35c() const;
274 uint16_t VRegC_3rc() const;
275
276 // Fills the given array with the 'arg' array of the instruction.
277 void GetArgs(uint32_t args[5]) const;
278
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700279 // Returns the opcode field of the instruction.
Ian Rogersa75a0132012-09-28 11:41:42 -0700280 Code Opcode() const {
281 const uint16_t* insns = reinterpret_cast<const uint16_t*>(this);
282 int opcode = *insns & 0xFF;
283 return static_cast<Code>(opcode);
284 }
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700285
Sebastien Hertz2d6ba512013-05-17 11:31:37 +0200286 void SetOpcode(Code opcode) {
287 DCHECK_LT(static_cast<uint16_t>(opcode), 256u);
288 uint16_t* insns = reinterpret_cast<uint16_t*>(this);
289 insns[0] = (insns[0] & 0xff00) | static_cast<uint16_t>(opcode);
290 }
291
292 void SetVRegB_3rc(uint16_t val) {
293 DCHECK(FormatOf(Opcode()) == k3rc);
294 uint16_t* insns = reinterpret_cast<uint16_t*>(this);
295 insns[1] = val;
296 }
297
298 void SetVRegB_35c(uint16_t val) {
299 DCHECK(FormatOf(Opcode()) == k35c);
300 uint16_t* insns = reinterpret_cast<uint16_t*>(this);
301 insns[1] = val;
302 }
303
304 void SetVRegC_22c(uint16_t val) {
305 DCHECK(FormatOf(Opcode()) == k22c);
306 uint16_t* insns = reinterpret_cast<uint16_t*>(this);
307 insns[1] = val;
308 }
309
Elliott Hughesadb8c672012-03-06 16:49:32 -0800310 // Returns the format of the given opcode.
311 static Format FormatOf(Code opcode) {
312 return kInstructionFormats[opcode];
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700313 }
314
Elliott Hughesadb8c672012-03-06 16:49:32 -0800315 // Returns the flags for the given opcode.
Ian Rogersa75a0132012-09-28 11:41:42 -0700316 static int FlagsOf(Code opcode) {
Elliott Hughesadb8c672012-03-06 16:49:32 -0800317 return kInstructionFlags[opcode];
jeffhaobdb76512011-09-07 11:43:16 -0700318 }
319
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700320 // Returns true if this instruction is a branch.
321 bool IsBranch() const {
322 return (kInstructionFlags[Opcode()] & kBranch) != 0;
323 }
324
TDYa127526643e2012-05-26 01:01:48 -0700325 // Returns true if this instruction is a unconditional branch.
326 bool IsUnconditional() const {
327 return (kInstructionFlags[Opcode()] & kUnconditional) != 0;
328 }
329
Dragos Sbirlea39f99272013-06-25 13:17:36 -0700330 // Returns the branch offset if this instruction is a branch.
331 int32_t GetTargetOffset() const;
332
333 // Returns true if the instruction allows control flow to go to the following instruction.
334 bool CanFlowThrough() const;
335
jeffhaoba5ebb92011-08-25 17:24:37 -0700336 // Returns true if this instruction is a switch.
337 bool IsSwitch() const {
338 return (kInstructionFlags[Opcode()] & kSwitch) != 0;
339 }
340
341 // Returns true if this instruction can throw.
342 bool IsThrow() const {
343 return (kInstructionFlags[Opcode()] & kThrow) != 0;
344 }
345
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700346 // Determine if the instruction is any of 'return' instructions.
347 bool IsReturn() const {
348 return (kInstructionFlags[Opcode()] & kReturn) != 0;
349 }
350
351 // Determine if this instruction ends execution of its basic block.
352 bool IsBasicBlockEnd() const {
353 return IsBranch() || IsReturn() || Opcode() == THROW;
354 }
355
356 // Determine if this instruction is an invoke.
357 bool IsInvoke() const {
358 return (kInstructionFlags[Opcode()] & kInvoke) != 0;
359 }
360
jeffhaoba5ebb92011-08-25 17:24:37 -0700361 int GetVerifyTypeArgumentA() const {
362 return (kInstructionVerifyFlags[Opcode()] & (kVerifyRegA | kVerifyRegAWide));
363 }
364
365 int GetVerifyTypeArgumentB() const {
366 return (kInstructionVerifyFlags[Opcode()] & (kVerifyRegB | kVerifyRegBField | kVerifyRegBMethod |
367 kVerifyRegBNewInstance | kVerifyRegBString | kVerifyRegBType | kVerifyRegBWide));
368 }
369
370 int GetVerifyTypeArgumentC() const {
371 return (kInstructionVerifyFlags[Opcode()] & (kVerifyRegC | kVerifyRegCField |
jeffhao3bb32462012-02-01 16:12:27 -0800372 kVerifyRegCNewArray | kVerifyRegCType | kVerifyRegCWide));
jeffhaoba5ebb92011-08-25 17:24:37 -0700373 }
374
375 int GetVerifyExtraFlags() const {
376 return (kInstructionVerifyFlags[Opcode()] & (kVerifyArrayData | kVerifyBranchTarget |
377 kVerifySwitchTargets | kVerifyVarArg | kVerifyVarArgRange | kVerifyError));
378 }
379
Ian Rogers2fa6b2e2012-10-17 00:10:17 -0700380 // Get the dex PC of this instruction as a offset in code units from the beginning of insns.
381 uint32_t GetDexPc(const uint16_t* insns) const {
382 return (reinterpret_cast<const uint16_t*>(this) - insns);
383 }
384
Ian Rogersd81871c2011-10-03 13:57:23 -0700385 // Dump decoded version of instruction
Ian Rogers2c8a8572011-10-24 17:11:36 -0700386 std::string DumpString(const DexFile*) const;
387
388 // Dump code_units worth of this instruction, padding to code_units for shorter instructions
389 std::string DumpHex(size_t code_units) const;
Ian Rogersd81871c2011-10-03 13:57:23 -0700390
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700391 private:
Ian Rogersa75a0132012-09-28 11:41:42 -0700392 size_t SizeInCodeUnitsComplexOpcode() const;
393
Sebastien Hertz807a2562013-04-15 09:33:39 +0200394 uint16_t Fetch16(size_t offset) const {
395 const uint16_t* insns = reinterpret_cast<const uint16_t*>(this);
396 return insns[offset];
397 }
398
399 uint32_t Fetch32(size_t offset) const {
400 return (Fetch16(offset) | ((uint32_t) Fetch16(offset + 1) << 16));
401 }
402
403 uint4_t InstA() const {
404 return static_cast<uint4_t>((Fetch16(0) >> 8) & 0x0f);
405 }
406
407 uint4_t InstB() const {
408 return static_cast<uint4_t>(Fetch16(0) >> 12);
409 }
410
411 uint8_t InstAA() const {
412 return static_cast<uint8_t>(Fetch16(0) >> 8);
413 }
414
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700415 static const char* const kInstructionNames[];
Elliott Hughesadb8c672012-03-06 16:49:32 -0800416 static Format const kInstructionFormats[];
Carl Shapiroe4c1ce42011-07-09 02:31:57 -0700417 static int const kInstructionFlags[];
jeffhaoba5ebb92011-08-25 17:24:37 -0700418 static int const kInstructionVerifyFlags[];
Ian Rogersa75a0132012-09-28 11:41:42 -0700419 static int const kInstructionSizeInCodeUnits[];
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700420 DISALLOW_IMPLICIT_CONSTRUCTORS(Instruction);
421};
Ian Rogersa75a0132012-09-28 11:41:42 -0700422std::ostream& operator<<(std::ostream& os, const Instruction::Code& code);
423std::ostream& operator<<(std::ostream& os, const Instruction::Format& format);
424std::ostream& operator<<(std::ostream& os, const Instruction::Flags& flags);
425std::ostream& operator<<(std::ostream& os, const Instruction::VerifyFlag& vflags);
Elliott Hughesadb8c672012-03-06 16:49:32 -0800426
427/*
428 * Holds the contents of a decoded instruction.
429 */
430struct DecodedInstruction {
431 uint32_t vA;
432 uint32_t vB;
433 uint64_t vB_wide; /* for k51l */
434 uint32_t vC;
435 uint32_t arg[5]; /* vC/D/E/F/G in invoke or filled-new-array */
436 Instruction::Code opcode;
437
Ian Rogersa75a0132012-09-28 11:41:42 -0700438 explicit DecodedInstruction(const Instruction* inst) {
439 inst->Decode(vA, vB, vB_wide, vC, arg);
440 opcode = inst->Opcode();
441 }
Elliott Hughesadb8c672012-03-06 16:49:32 -0800442};
Carl Shapiro12eb78e2011-06-24 14:51:06 -0700443
444} // namespace art
445
446#endif // ART_SRC_DEX_INSTRUCTION_H_