2012-07-20 11:50:39 +04:00
|
|
|
/*
|
|
|
|
* OpenRISC interrupt.
|
|
|
|
*
|
|
|
|
* Copyright (c) 2011-2012 Jia Liu <proljc@gmail.com>
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
2019-02-13 16:46:50 +03:00
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2012-07-20 11:50:39 +04:00
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2016-01-26 21:17:22 +03:00
|
|
|
#include "qemu/osdep.h"
|
2022-02-07 11:27:56 +03:00
|
|
|
#include "qemu/log.h"
|
2012-07-20 11:50:39 +04:00
|
|
|
#include "cpu.h"
|
2016-03-15 15:18:37 +03:00
|
|
|
#include "exec/exec-all.h"
|
2012-12-17 21:19:49 +04:00
|
|
|
#include "exec/gdbstub.h"
|
2012-12-17 21:20:00 +04:00
|
|
|
#include "qemu/host-utils.h"
|
2012-07-20 11:50:39 +04:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
#include "hw/loader.h"
|
|
|
|
#endif
|
|
|
|
|
2013-02-02 13:57:51 +04:00
|
|
|
void openrisc_cpu_do_interrupt(CPUState *cs)
|
2012-07-20 11:50:39 +04:00
|
|
|
{
|
2013-02-02 13:57:51 +04:00
|
|
|
OpenRISCCPU *cpu = OPENRISC_CPU(cs);
|
|
|
|
CPUOpenRISCState *env = &cpu->env;
|
2018-05-23 07:34:38 +03:00
|
|
|
int exception = cs->exception_index;
|
2013-10-22 04:12:40 +04:00
|
|
|
|
|
|
|
env->epcr = env->pc;
|
2018-05-23 07:34:38 +03:00
|
|
|
if (exception == EXCP_SYSCALL) {
|
2013-10-22 04:12:40 +04:00
|
|
|
env->epcr += 4;
|
2012-07-20 11:50:41 +04:00
|
|
|
}
|
2017-01-14 01:00:28 +03:00
|
|
|
/* When we have an illegal instruction the error effective address
|
|
|
|
shall be set to the illegal instruction address. */
|
2018-05-23 07:34:38 +03:00
|
|
|
if (exception == EXCP_ILLEGAL) {
|
2017-01-14 01:00:28 +03:00
|
|
|
env->eear = env->pc;
|
|
|
|
}
|
2012-07-20 11:50:41 +04:00
|
|
|
|
2018-07-01 08:02:11 +03:00
|
|
|
/* During exceptions esr is populared with the pre-exception sr. */
|
2015-02-18 22:45:54 +03:00
|
|
|
env->esr = cpu_get_sr(env);
|
2018-07-01 08:02:11 +03:00
|
|
|
/* In parallel sr is updated to disable mmu, interrupts, timers and
|
|
|
|
set the delay slot exception flag. */
|
2012-07-20 11:50:41 +04:00
|
|
|
env->sr &= ~SR_DME;
|
|
|
|
env->sr &= ~SR_IME;
|
|
|
|
env->sr |= SR_SM;
|
|
|
|
env->sr &= ~SR_IEE;
|
|
|
|
env->sr &= ~SR_TEE;
|
2017-04-24 00:07:42 +03:00
|
|
|
env->pmr &= ~PMR_DME;
|
|
|
|
env->pmr &= ~PMR_SME;
|
2015-02-19 09:19:18 +03:00
|
|
|
env->lock_addr = -1;
|
2012-07-20 11:50:41 +04:00
|
|
|
|
2018-07-01 08:02:11 +03:00
|
|
|
/* Set/clear dsx to indicate if we are in a delay slot exception. */
|
|
|
|
if (env->dflag) {
|
|
|
|
env->dflag = 0;
|
|
|
|
env->sr |= SR_DSX;
|
|
|
|
env->epcr -= 4;
|
|
|
|
} else {
|
|
|
|
env->sr &= ~SR_DSX;
|
|
|
|
}
|
|
|
|
|
2018-05-23 07:34:38 +03:00
|
|
|
if (exception > 0 && exception < EXCP_NR) {
|
|
|
|
static const char * const int_name[EXCP_NR] = {
|
|
|
|
[EXCP_RESET] = "RESET",
|
|
|
|
[EXCP_BUSERR] = "BUSERR (bus error)",
|
|
|
|
[EXCP_DPF] = "DFP (data protection fault)",
|
|
|
|
[EXCP_IPF] = "IPF (code protection fault)",
|
|
|
|
[EXCP_TICK] = "TICK (timer interrupt)",
|
|
|
|
[EXCP_ALIGN] = "ALIGN",
|
|
|
|
[EXCP_ILLEGAL] = "ILLEGAL",
|
|
|
|
[EXCP_INT] = "INT (device interrupt)",
|
|
|
|
[EXCP_DTLBMISS] = "DTLBMISS (data tlb miss)",
|
|
|
|
[EXCP_ITLBMISS] = "ITLBMISS (code tlb miss)",
|
|
|
|
[EXCP_RANGE] = "RANGE",
|
|
|
|
[EXCP_SYSCALL] = "SYSCALL",
|
|
|
|
[EXCP_FPE] = "FPE",
|
|
|
|
[EXCP_TRAP] = "TRAP",
|
|
|
|
};
|
|
|
|
|
|
|
|
qemu_log_mask(CPU_LOG_INT, "INT: %s\n", int_name[exception]);
|
|
|
|
|
|
|
|
hwaddr vect_pc = exception << 8;
|
2017-04-18 09:15:50 +03:00
|
|
|
if (env->cpucfgr & CPUCFGR_EVBARP) {
|
|
|
|
vect_pc |= env->evbar;
|
|
|
|
}
|
2017-04-18 09:15:51 +03:00
|
|
|
if (env->sr & SR_EPH) {
|
|
|
|
vect_pc |= 0xf0000000;
|
|
|
|
}
|
2017-04-18 09:15:50 +03:00
|
|
|
env->pc = vect_pc;
|
2012-07-20 11:50:41 +04:00
|
|
|
} else {
|
2018-05-23 07:34:38 +03:00
|
|
|
cpu_abort(cs, "Unhandled exception 0x%x\n", exception);
|
2012-07-20 11:50:41 +04:00
|
|
|
}
|
|
|
|
|
2013-08-26 10:31:06 +04:00
|
|
|
cs->exception_index = -1;
|
2012-07-20 11:50:39 +04:00
|
|
|
}
|
2014-09-13 20:45:27 +04:00
|
|
|
|
|
|
|
bool openrisc_cpu_exec_interrupt(CPUState *cs, int interrupt_request)
|
|
|
|
{
|
|
|
|
OpenRISCCPU *cpu = OPENRISC_CPU(cs);
|
|
|
|
CPUOpenRISCState *env = &cpu->env;
|
|
|
|
int idx = -1;
|
|
|
|
|
|
|
|
if ((interrupt_request & CPU_INTERRUPT_HARD) && (env->sr & SR_IEE)) {
|
|
|
|
idx = EXCP_INT;
|
|
|
|
}
|
|
|
|
if ((interrupt_request & CPU_INTERRUPT_TIMER) && (env->sr & SR_TEE)) {
|
|
|
|
idx = EXCP_TICK;
|
|
|
|
}
|
|
|
|
if (idx >= 0) {
|
|
|
|
cs->exception_index = idx;
|
|
|
|
openrisc_cpu_do_interrupt(cs);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|