Date: Wed, 17 Apr 2019 14:41:06 +0000 From: bugzilla-noreply@freebsd.org To: java@FreeBSD.org Subject: [Bug 237208] java/openjdk11: port to powerpc64 Message-ID: <bug-237208-8522-JQU1EADw42@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-237208-8522@https.bugs.freebsd.org/bugzilla/> References: <bug-237208-8522@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D237208 --- Comment #9 from Gustavo Romero <gustavo.romero@protonmail.com> --- (In reply to Piotr Kubaj from comment #4) Hi Piotr and Mikael, Is the SIGILL JVM crash still happening? Piotr, the illegal instruction executed in the arraycopy stubs looks to be a 'mtdscr', i.e. an instruction used to adjust the depth of the data prefetch prior to the bulk copy. However I can't make sense of that yet because availability of m{t,f}dscr is proved at runtime before the emission by the compiler. Logs show that m{t,f}dscr is not available indeed:=20 CPU:total 16 (initial active 16) ppc64 fsqrt isel lxarxeh cmpb popcntb popc= ntw fcfids vand lqarx aes vpmsumb mfdscr vsx ldbrx stdbrx sha darn That JVM on POWER9 reports it has VSX and DARN support but not DSCR? The instruction that caused the crash in question is also using DSCR SPR number= 3, which is not privileged either. Does: int main() { asm("mtspr 3, 0;"); } crashes with a SIGILL? --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-237208-8522-JQU1EADw42>