2005-07-02 18:58:51 +04:00
|
|
|
/*
|
2020-12-07 01:27:17 +03:00
|
|
|
* MIPS TLB (Translation lookaside buffer) helpers.
|
2007-09-17 01:08:06 +04:00
|
|
|
*
|
2005-07-02 18:58:51 +04:00
|
|
|
* Copyright (c) 2004-2005 Jocelyn Mayer
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
2020-10-16 17:35:09 +03:00
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2005-07-02 18:58:51 +04:00
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
2009-07-17 00:47:01 +04:00
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
2005-07-02 18:58:51 +04:00
|
|
|
*/
|
2016-01-18 20:35:00 +03:00
|
|
|
#include "qemu/osdep.h"
|
2005-07-05 02:17:33 +04:00
|
|
|
|
|
|
|
#include "cpu.h"
|
2017-09-20 22:49:30 +03:00
|
|
|
#include "internal.h"
|
2016-03-15 15:18:37 +03:00
|
|
|
#include "exec/exec-all.h"
|
2014-07-07 14:24:01 +04:00
|
|
|
#include "exec/cpu_ldst.h"
|
2016-01-07 16:55:28 +03:00
|
|
|
#include "exec/log.h"
|
2017-07-31 16:09:13 +03:00
|
|
|
#include "hw/mips/cpudevs.h"
|
2005-07-02 18:58:51 +04:00
|
|
|
|
2007-05-13 17:49:44 +04:00
|
|
|
/* no MMU emulation */
|
2019-10-23 13:23:34 +03:00
|
|
|
int no_mmu_map_address(CPUMIPSState *env, hwaddr *physical, int *prot,
|
2021-01-28 04:11:06 +03:00
|
|
|
target_ulong address, MMUAccessType access_type)
|
2007-05-13 17:49:44 +04:00
|
|
|
{
|
|
|
|
*physical = address;
|
2019-05-17 15:35:33 +03:00
|
|
|
*prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC;
|
2007-05-13 17:49:44 +04:00
|
|
|
return TLBRET_MATCH;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fixed mapping MMU emulation */
|
2019-10-23 13:23:34 +03:00
|
|
|
int fixed_mmu_map_address(CPUMIPSState *env, hwaddr *physical, int *prot,
|
2021-01-28 04:11:06 +03:00
|
|
|
target_ulong address, MMUAccessType access_type)
|
2007-05-13 17:49:44 +04:00
|
|
|
{
|
|
|
|
if (address <= (int32_t)0x7FFFFFFFUL) {
|
2019-10-23 13:23:34 +03:00
|
|
|
if (!(env->CP0_Status & (1 << CP0St_ERL))) {
|
2007-05-13 17:49:44 +04:00
|
|
|
*physical = address + 0x40000000UL;
|
2019-10-23 13:23:34 +03:00
|
|
|
} else {
|
2007-05-13 17:49:44 +04:00
|
|
|
*physical = address;
|
2019-10-23 13:23:34 +03:00
|
|
|
}
|
|
|
|
} else if (address <= (int32_t)0xBFFFFFFFUL) {
|
2007-05-13 17:49:44 +04:00
|
|
|
*physical = address & 0x1FFFFFFF;
|
2019-10-23 13:23:34 +03:00
|
|
|
} else {
|
2007-05-13 17:49:44 +04:00
|
|
|
*physical = address;
|
2019-10-23 13:23:34 +03:00
|
|
|
}
|
2007-05-13 17:49:44 +04:00
|
|
|
|
2019-05-17 15:35:33 +03:00
|
|
|
*prot = PAGE_READ | PAGE_WRITE | PAGE_EXEC;
|
2007-05-13 17:49:44 +04:00
|
|
|
return TLBRET_MATCH;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* MIPS32/MIPS64 R4000-style MMU emulation */
|
2019-10-23 13:23:34 +03:00
|
|
|
int r4k_map_address(CPUMIPSState *env, hwaddr *physical, int *prot,
|
2021-01-28 04:11:06 +03:00
|
|
|
target_ulong address, MMUAccessType access_type)
|
2005-07-02 18:58:51 +04:00
|
|
|
{
|
2016-06-27 18:19:10 +03:00
|
|
|
uint16_t ASID = env->CP0_EntryHi & env->CP0_EntryHi_ASID_mask;
|
2019-12-20 12:29:34 +03:00
|
|
|
uint32_t MMID = env->CP0_MemoryMapID;
|
|
|
|
bool mi = !!((env->CP0_Config5 >> CP0C5_MI) & 1);
|
|
|
|
uint32_t tlb_mmid;
|
2007-01-22 23:50:42 +03:00
|
|
|
int i;
|
2005-07-02 18:58:51 +04:00
|
|
|
|
2019-12-20 12:29:34 +03:00
|
|
|
MMID = mi ? MMID : (uint32_t) ASID;
|
|
|
|
|
2007-09-06 04:18:15 +04:00
|
|
|
for (i = 0; i < env->tlb->tlb_in_use; i++) {
|
2009-10-02 01:12:16 +04:00
|
|
|
r4k_tlb_t *tlb = &env->tlb->mmu.r4k.tlb[i];
|
2007-01-22 23:50:42 +03:00
|
|
|
/* 1k pages are not supported. */
|
2007-05-13 18:07:26 +04:00
|
|
|
target_ulong mask = tlb->PageMask | ~(TARGET_PAGE_MASK << 1);
|
2007-01-22 23:50:42 +03:00
|
|
|
target_ulong tag = address & ~mask;
|
2007-05-13 18:07:26 +04:00
|
|
|
target_ulong VPN = tlb->VPN & ~mask;
|
2007-11-08 21:05:37 +03:00
|
|
|
#if defined(TARGET_MIPS64)
|
2007-06-23 22:04:12 +04:00
|
|
|
tag &= env->SEGMask;
|
2007-05-13 23:22:13 +04:00
|
|
|
#endif
|
2007-01-22 23:50:42 +03:00
|
|
|
|
2019-12-20 12:29:34 +03:00
|
|
|
/* Check ASID/MMID, virtual page number & size */
|
|
|
|
tlb_mmid = mi ? tlb->MMID : (uint32_t) tlb->ASID;
|
|
|
|
if ((tlb->G == 1 || tlb_mmid == MMID) && VPN == tag && !tlb->EHINV) {
|
2005-07-02 18:58:51 +04:00
|
|
|
/* TLB match */
|
2007-05-13 18:07:26 +04:00
|
|
|
int n = !!(address & mask & ~(mask >> 1));
|
2005-07-02 18:58:51 +04:00
|
|
|
/* Check access rights */
|
2014-07-07 14:23:58 +04:00
|
|
|
if (!(n ? tlb->V1 : tlb->V0)) {
|
2006-06-14 21:15:19 +04:00
|
|
|
return TLBRET_INVALID;
|
2014-07-07 14:23:58 +04:00
|
|
|
}
|
2021-01-28 04:11:06 +03:00
|
|
|
if (access_type == MMU_INST_FETCH && (n ? tlb->XI1 : tlb->XI0)) {
|
2014-07-07 14:23:58 +04:00
|
|
|
return TLBRET_XI;
|
|
|
|
}
|
2021-01-28 04:11:06 +03:00
|
|
|
if (access_type == MMU_DATA_LOAD && (n ? tlb->RI1 : tlb->RI0)) {
|
2014-07-07 14:23:58 +04:00
|
|
|
return TLBRET_RI;
|
|
|
|
}
|
2021-01-28 04:11:06 +03:00
|
|
|
if (access_type != MMU_DATA_STORE || (n ? tlb->D1 : tlb->D0)) {
|
2007-01-22 23:50:42 +03:00
|
|
|
*physical = tlb->PFN[n] | (address & (mask >> 1));
|
2005-07-02 19:07:44 +04:00
|
|
|
*prot = PAGE_READ;
|
2019-10-23 13:23:34 +03:00
|
|
|
if (n ? tlb->D1 : tlb->D0) {
|
2005-07-02 19:07:44 +04:00
|
|
|
*prot |= PAGE_WRITE;
|
2019-10-23 13:23:34 +03:00
|
|
|
}
|
2019-05-17 15:35:33 +03:00
|
|
|
if (!(n ? tlb->XI1 : tlb->XI0)) {
|
|
|
|
*prot |= PAGE_EXEC;
|
|
|
|
}
|
2006-06-14 21:15:19 +04:00
|
|
|
return TLBRET_MATCH;
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
2006-06-14 21:15:19 +04:00
|
|
|
return TLBRET_DIRTY;
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
|
|
|
}
|
2006-06-14 21:15:19 +04:00
|
|
|
return TLBRET_NOMATCH;
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
|
|
|
|
2020-12-07 01:28:48 +03:00
|
|
|
static void no_mmu_init(CPUMIPSState *env, const mips_def_t *def)
|
|
|
|
{
|
|
|
|
env->tlb->nb_tlb = 1;
|
|
|
|
env->tlb->map_address = &no_mmu_map_address;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void fixed_mmu_init(CPUMIPSState *env, const mips_def_t *def)
|
|
|
|
{
|
|
|
|
env->tlb->nb_tlb = 1;
|
|
|
|
env->tlb->map_address = &fixed_mmu_map_address;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void r4k_mmu_init(CPUMIPSState *env, const mips_def_t *def)
|
|
|
|
{
|
|
|
|
env->tlb->nb_tlb = 1 + ((def->CP0_Config1 >> CP0C1_MMU) & 63);
|
|
|
|
env->tlb->map_address = &r4k_map_address;
|
|
|
|
env->tlb->helper_tlbwi = r4k_helper_tlbwi;
|
|
|
|
env->tlb->helper_tlbwr = r4k_helper_tlbwr;
|
|
|
|
env->tlb->helper_tlbp = r4k_helper_tlbp;
|
|
|
|
env->tlb->helper_tlbr = r4k_helper_tlbr;
|
|
|
|
env->tlb->helper_tlbinv = r4k_helper_tlbinv;
|
|
|
|
env->tlb->helper_tlbinvf = r4k_helper_tlbinvf;
|
|
|
|
}
|
|
|
|
|
|
|
|
void mmu_init(CPUMIPSState *env, const mips_def_t *def)
|
|
|
|
{
|
|
|
|
env->tlb = g_malloc0(sizeof(CPUMIPSTLBContext));
|
|
|
|
|
|
|
|
switch (def->mmu_type) {
|
|
|
|
case MMU_TYPE_NONE:
|
|
|
|
no_mmu_init(env, def);
|
|
|
|
break;
|
|
|
|
case MMU_TYPE_R4000:
|
|
|
|
r4k_mmu_init(env, def);
|
|
|
|
break;
|
|
|
|
case MMU_TYPE_FMT:
|
|
|
|
fixed_mmu_init(env, def);
|
|
|
|
break;
|
|
|
|
case MMU_TYPE_R3000:
|
|
|
|
case MMU_TYPE_R6000:
|
|
|
|
case MMU_TYPE_R8000:
|
|
|
|
default:
|
|
|
|
cpu_abort(env_cpu(env), "MMU type not supported\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-14 17:17:28 +03:00
|
|
|
void cpu_mips_tlb_flush(CPUMIPSState *env)
|
2015-12-15 15:49:17 +03:00
|
|
|
{
|
|
|
|
/* Flush qemu's TLB and discard all shadowed entries. */
|
2019-03-23 04:38:42 +03:00
|
|
|
tlb_flush(env_cpu(env));
|
2015-12-15 15:49:17 +03:00
|
|
|
env->tlb->tlb_in_use = env->tlb->nb_tlb;
|
|
|
|
}
|
|
|
|
|
2012-03-14 04:38:22 +04:00
|
|
|
static void raise_mmu_exception(CPUMIPSState *env, target_ulong address,
|
2021-01-28 04:09:18 +03:00
|
|
|
MMUAccessType access_type, int tlb_error)
|
2009-11-22 15:41:18 +03:00
|
|
|
{
|
2019-03-23 04:38:42 +03:00
|
|
|
CPUState *cs = env_cpu(env);
|
2009-11-22 15:41:18 +03:00
|
|
|
int exception = 0, error_code = 0;
|
|
|
|
|
2021-01-28 04:09:18 +03:00
|
|
|
if (access_type == MMU_INST_FETCH) {
|
2014-07-07 14:24:01 +04:00
|
|
|
error_code |= EXCP_INST_NOTAVAIL;
|
|
|
|
}
|
|
|
|
|
2009-11-22 15:41:18 +03:00
|
|
|
switch (tlb_error) {
|
|
|
|
default:
|
|
|
|
case TLBRET_BADADDR:
|
|
|
|
/* Reference to kernel address from user mode or supervisor mode */
|
|
|
|
/* Reference to supervisor address from user mode */
|
2021-01-28 04:09:18 +03:00
|
|
|
if (access_type == MMU_DATA_STORE) {
|
2009-11-22 15:41:18 +03:00
|
|
|
exception = EXCP_AdES;
|
2014-07-07 14:23:57 +04:00
|
|
|
} else {
|
2009-11-22 15:41:18 +03:00
|
|
|
exception = EXCP_AdEL;
|
2014-07-07 14:23:57 +04:00
|
|
|
}
|
2009-11-22 15:41:18 +03:00
|
|
|
break;
|
|
|
|
case TLBRET_NOMATCH:
|
|
|
|
/* No TLB match for a mapped address */
|
2021-01-28 04:09:18 +03:00
|
|
|
if (access_type == MMU_DATA_STORE) {
|
2009-11-22 15:41:18 +03:00
|
|
|
exception = EXCP_TLBS;
|
2014-07-07 14:23:57 +04:00
|
|
|
} else {
|
2009-11-22 15:41:18 +03:00
|
|
|
exception = EXCP_TLBL;
|
2014-07-07 14:23:57 +04:00
|
|
|
}
|
2014-07-07 14:24:01 +04:00
|
|
|
error_code |= EXCP_TLB_NOMATCH;
|
2009-11-22 15:41:18 +03:00
|
|
|
break;
|
|
|
|
case TLBRET_INVALID:
|
|
|
|
/* TLB match with no valid bit */
|
2021-01-28 04:09:18 +03:00
|
|
|
if (access_type == MMU_DATA_STORE) {
|
2009-11-22 15:41:18 +03:00
|
|
|
exception = EXCP_TLBS;
|
2014-07-07 14:23:57 +04:00
|
|
|
} else {
|
2009-11-22 15:41:18 +03:00
|
|
|
exception = EXCP_TLBL;
|
2014-07-07 14:23:57 +04:00
|
|
|
}
|
2009-11-22 15:41:18 +03:00
|
|
|
break;
|
|
|
|
case TLBRET_DIRTY:
|
|
|
|
/* TLB match but 'D' bit is cleared */
|
|
|
|
exception = EXCP_LTLBL;
|
|
|
|
break;
|
2014-07-07 14:23:59 +04:00
|
|
|
case TLBRET_XI:
|
|
|
|
/* Execute-Inhibit Exception */
|
|
|
|
if (env->CP0_PageGrain & (1 << CP0PG_IEC)) {
|
|
|
|
exception = EXCP_TLBXI;
|
|
|
|
} else {
|
|
|
|
exception = EXCP_TLBL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case TLBRET_RI:
|
|
|
|
/* Read-Inhibit Exception */
|
|
|
|
if (env->CP0_PageGrain & (1 << CP0PG_IEC)) {
|
|
|
|
exception = EXCP_TLBRI;
|
|
|
|
} else {
|
|
|
|
exception = EXCP_TLBL;
|
|
|
|
}
|
|
|
|
break;
|
2009-11-22 15:41:18 +03:00
|
|
|
}
|
|
|
|
/* Raise exception */
|
2018-08-02 17:15:55 +03:00
|
|
|
if (!(env->hflags & MIPS_HFLAG_DM)) {
|
|
|
|
env->CP0_BadVAddr = address;
|
|
|
|
}
|
2009-11-22 15:41:18 +03:00
|
|
|
env->CP0_Context = (env->CP0_Context & ~0x007fffff) |
|
|
|
|
((address >> 9) & 0x007ffff0);
|
2016-06-27 18:19:09 +03:00
|
|
|
env->CP0_EntryHi = (env->CP0_EntryHi & env->CP0_EntryHi_ASID_mask) |
|
2016-07-28 11:28:23 +03:00
|
|
|
(env->CP0_EntryHi & (1 << CP0EnHi_EHINV)) |
|
2016-06-27 18:19:09 +03:00
|
|
|
(address & (TARGET_PAGE_MASK << 1));
|
2009-11-22 15:41:18 +03:00
|
|
|
#if defined(TARGET_MIPS64)
|
|
|
|
env->CP0_EntryHi &= env->SEGMask;
|
2015-10-29 20:17:52 +03:00
|
|
|
env->CP0_XContext =
|
2019-10-23 13:23:34 +03:00
|
|
|
(env->CP0_XContext & ((~0ULL) << (env->SEGBITS - 7))) | /* PTEBase */
|
|
|
|
(extract64(address, 62, 2) << (env->SEGBITS - 9)) | /* R */
|
|
|
|
(extract64(address, 13, env->SEGBITS - 13) << 4); /* BadVPN2 */
|
2009-11-22 15:41:18 +03:00
|
|
|
#endif
|
2013-08-26 10:31:06 +04:00
|
|
|
cs->exception_index = exception;
|
2009-11-22 15:41:18 +03:00
|
|
|
env->error_code = error_code;
|
|
|
|
}
|
|
|
|
|
2018-10-09 19:54:46 +03:00
|
|
|
#if !defined(TARGET_MIPS64)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Perform hardware page table walk
|
|
|
|
*
|
|
|
|
* Memory accesses are performed using the KERNEL privilege level.
|
|
|
|
* Synchronous exceptions detected on memory accesses cause a silent exit
|
|
|
|
* from page table walking, resulting in a TLB or XTLB Refill exception.
|
|
|
|
*
|
|
|
|
* Implementations are not required to support page table walk memory
|
|
|
|
* accesses from mapped memory regions. When an unsupported access is
|
|
|
|
* attempted, a silent exit is taken, resulting in a TLB or XTLB Refill
|
|
|
|
* exception.
|
|
|
|
*
|
|
|
|
* Note that if an exception is caused by AddressTranslation or LoadMemory
|
|
|
|
* functions, the exception is not taken, a silent exit is taken,
|
|
|
|
* resulting in a TLB or XTLB Refill exception.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static bool get_pte(CPUMIPSState *env, uint64_t vaddr, int entry_size,
|
|
|
|
uint64_t *pte)
|
|
|
|
{
|
|
|
|
if ((vaddr & ((entry_size >> 3) - 1)) != 0) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (entry_size == 64) {
|
|
|
|
*pte = cpu_ldq_code(env, vaddr);
|
|
|
|
} else {
|
|
|
|
*pte = cpu_ldl_code(env, vaddr);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint64_t get_tlb_entry_layout(CPUMIPSState *env, uint64_t entry,
|
|
|
|
int entry_size, int ptei)
|
|
|
|
{
|
|
|
|
uint64_t result = entry;
|
|
|
|
uint64_t rixi;
|
|
|
|
if (ptei > entry_size) {
|
|
|
|
ptei -= 32;
|
|
|
|
}
|
|
|
|
result >>= (ptei - 2);
|
|
|
|
rixi = result & 3;
|
|
|
|
result >>= 2;
|
|
|
|
result |= rixi << CP0EnLo_XI;
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int walk_directory(CPUMIPSState *env, uint64_t *vaddr,
|
|
|
|
int directory_index, bool *huge_page, bool *hgpg_directory_hit,
|
|
|
|
uint64_t *pw_entrylo0, uint64_t *pw_entrylo1)
|
|
|
|
{
|
|
|
|
int dph = (env->CP0_PWCtl >> CP0PC_DPH) & 0x1;
|
|
|
|
int psn = (env->CP0_PWCtl >> CP0PC_PSN) & 0x3F;
|
|
|
|
int hugepg = (env->CP0_PWCtl >> CP0PC_HUGEPG) & 0x1;
|
|
|
|
int pf_ptew = (env->CP0_PWField >> CP0PF_PTEW) & 0x3F;
|
|
|
|
int ptew = (env->CP0_PWSize >> CP0PS_PTEW) & 0x3F;
|
|
|
|
int native_shift = (((env->CP0_PWSize >> CP0PS_PS) & 1) == 0) ? 2 : 3;
|
|
|
|
int directory_shift = (ptew > 1) ? -1 :
|
|
|
|
(hugepg && (ptew == 1)) ? native_shift + 1 : native_shift;
|
|
|
|
int leaf_shift = (ptew > 1) ? -1 :
|
|
|
|
(ptew == 1) ? native_shift + 1 : native_shift;
|
|
|
|
uint32_t direntry_size = 1 << (directory_shift + 3);
|
|
|
|
uint32_t leafentry_size = 1 << (leaf_shift + 3);
|
|
|
|
uint64_t entry;
|
|
|
|
uint64_t paddr;
|
|
|
|
int prot;
|
|
|
|
uint64_t lsb = 0;
|
|
|
|
uint64_t w = 0;
|
|
|
|
|
|
|
|
if (get_physical_address(env, &paddr, &prot, *vaddr, MMU_DATA_LOAD,
|
2021-01-28 03:52:56 +03:00
|
|
|
cpu_mmu_index(env, false)) !=
|
2018-10-09 19:54:46 +03:00
|
|
|
TLBRET_MATCH) {
|
|
|
|
/* wrong base address */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!get_pte(env, *vaddr, direntry_size, &entry)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((entry & (1 << psn)) && hugepg) {
|
|
|
|
*huge_page = true;
|
|
|
|
*hgpg_directory_hit = true;
|
|
|
|
entry = get_tlb_entry_layout(env, entry, leafentry_size, pf_ptew);
|
|
|
|
w = directory_index - 1;
|
|
|
|
if (directory_index & 0x1) {
|
|
|
|
/* Generate adjacent page from same PTE for odd TLB page */
|
|
|
|
lsb = (1 << w) >> 6;
|
|
|
|
*pw_entrylo0 = entry & ~lsb; /* even page */
|
|
|
|
*pw_entrylo1 = entry | lsb; /* odd page */
|
|
|
|
} else if (dph) {
|
|
|
|
int oddpagebit = 1 << leaf_shift;
|
|
|
|
uint64_t vaddr2 = *vaddr ^ oddpagebit;
|
|
|
|
if (*vaddr & oddpagebit) {
|
|
|
|
*pw_entrylo1 = entry;
|
|
|
|
} else {
|
|
|
|
*pw_entrylo0 = entry;
|
|
|
|
}
|
|
|
|
if (get_physical_address(env, &paddr, &prot, vaddr2, MMU_DATA_LOAD,
|
2021-01-28 03:52:56 +03:00
|
|
|
cpu_mmu_index(env, false)) !=
|
2018-10-09 19:54:46 +03:00
|
|
|
TLBRET_MATCH) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!get_pte(env, vaddr2, leafentry_size, &entry)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
entry = get_tlb_entry_layout(env, entry, leafentry_size, pf_ptew);
|
|
|
|
if (*vaddr & oddpagebit) {
|
|
|
|
*pw_entrylo0 = entry;
|
|
|
|
} else {
|
|
|
|
*pw_entrylo1 = entry;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
*vaddr = entry;
|
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-20 23:19:54 +03:00
|
|
|
static bool page_table_walk_refill(CPUMIPSState *env, vaddr address,
|
|
|
|
int mmu_idx)
|
2018-10-09 19:54:46 +03:00
|
|
|
{
|
|
|
|
int gdw = (env->CP0_PWSize >> CP0PS_GDW) & 0x3F;
|
|
|
|
int udw = (env->CP0_PWSize >> CP0PS_UDW) & 0x3F;
|
|
|
|
int mdw = (env->CP0_PWSize >> CP0PS_MDW) & 0x3F;
|
|
|
|
int ptw = (env->CP0_PWSize >> CP0PS_PTW) & 0x3F;
|
|
|
|
int ptew = (env->CP0_PWSize >> CP0PS_PTEW) & 0x3F;
|
|
|
|
|
|
|
|
/* Initial values */
|
|
|
|
bool huge_page = false;
|
|
|
|
bool hgpg_bdhit = false;
|
|
|
|
bool hgpg_gdhit = false;
|
|
|
|
bool hgpg_udhit = false;
|
|
|
|
bool hgpg_mdhit = false;
|
|
|
|
|
|
|
|
int32_t pw_pagemask = 0;
|
|
|
|
target_ulong pw_entryhi = 0;
|
|
|
|
uint64_t pw_entrylo0 = 0;
|
|
|
|
uint64_t pw_entrylo1 = 0;
|
|
|
|
|
|
|
|
/* Native pointer size */
|
|
|
|
/*For the 32-bit architectures, this bit is fixed to 0.*/
|
|
|
|
int native_shift = (((env->CP0_PWSize >> CP0PS_PS) & 1) == 0) ? 2 : 3;
|
|
|
|
|
|
|
|
/* Indices from PWField */
|
|
|
|
int pf_gdw = (env->CP0_PWField >> CP0PF_GDW) & 0x3F;
|
|
|
|
int pf_udw = (env->CP0_PWField >> CP0PF_UDW) & 0x3F;
|
|
|
|
int pf_mdw = (env->CP0_PWField >> CP0PF_MDW) & 0x3F;
|
|
|
|
int pf_ptw = (env->CP0_PWField >> CP0PF_PTW) & 0x3F;
|
|
|
|
int pf_ptew = (env->CP0_PWField >> CP0PF_PTEW) & 0x3F;
|
|
|
|
|
|
|
|
/* Indices computed from faulting address */
|
|
|
|
int gindex = (address >> pf_gdw) & ((1 << gdw) - 1);
|
|
|
|
int uindex = (address >> pf_udw) & ((1 << udw) - 1);
|
|
|
|
int mindex = (address >> pf_mdw) & ((1 << mdw) - 1);
|
|
|
|
int ptindex = (address >> pf_ptw) & ((1 << ptw) - 1);
|
|
|
|
|
|
|
|
/* Other HTW configs */
|
|
|
|
int hugepg = (env->CP0_PWCtl >> CP0PC_HUGEPG) & 0x1;
|
|
|
|
|
|
|
|
/* HTW Shift values (depend on entry size) */
|
|
|
|
int directory_shift = (ptew > 1) ? -1 :
|
|
|
|
(hugepg && (ptew == 1)) ? native_shift + 1 : native_shift;
|
|
|
|
int leaf_shift = (ptew > 1) ? -1 :
|
|
|
|
(ptew == 1) ? native_shift + 1 : native_shift;
|
|
|
|
|
|
|
|
/* Offsets into tables */
|
|
|
|
int goffset = gindex << directory_shift;
|
|
|
|
int uoffset = uindex << directory_shift;
|
|
|
|
int moffset = mindex << directory_shift;
|
|
|
|
int ptoffset0 = (ptindex >> 1) << (leaf_shift + 1);
|
|
|
|
int ptoffset1 = ptoffset0 | (1 << (leaf_shift));
|
|
|
|
|
|
|
|
uint32_t leafentry_size = 1 << (leaf_shift + 3);
|
|
|
|
|
|
|
|
/* Starting address - Page Table Base */
|
|
|
|
uint64_t vaddr = env->CP0_PWBase;
|
|
|
|
|
|
|
|
uint64_t dir_entry;
|
|
|
|
uint64_t paddr;
|
|
|
|
int prot;
|
|
|
|
int m;
|
|
|
|
|
|
|
|
if (!(env->CP0_Config3 & (1 << CP0C3_PW))) {
|
|
|
|
/* walker is unimplemented */
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!(env->CP0_PWCtl & (1 << CP0PC_PWEN))) {
|
|
|
|
/* walker is disabled */
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!(gdw > 0 || udw > 0 || mdw > 0)) {
|
|
|
|
/* no structure to walk */
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if ((directory_shift == -1) || (leaf_shift == -1)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Global Directory */
|
|
|
|
if (gdw > 0) {
|
|
|
|
vaddr |= goffset;
|
|
|
|
switch (walk_directory(env, &vaddr, pf_gdw, &huge_page, &hgpg_gdhit,
|
|
|
|
&pw_entrylo0, &pw_entrylo1))
|
|
|
|
{
|
|
|
|
case 0:
|
|
|
|
return false;
|
|
|
|
case 1:
|
|
|
|
goto refill;
|
|
|
|
case 2:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Upper directory */
|
|
|
|
if (udw > 0) {
|
|
|
|
vaddr |= uoffset;
|
|
|
|
switch (walk_directory(env, &vaddr, pf_udw, &huge_page, &hgpg_udhit,
|
|
|
|
&pw_entrylo0, &pw_entrylo1))
|
|
|
|
{
|
|
|
|
case 0:
|
|
|
|
return false;
|
|
|
|
case 1:
|
|
|
|
goto refill;
|
|
|
|
case 2:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Middle directory */
|
|
|
|
if (mdw > 0) {
|
|
|
|
vaddr |= moffset;
|
|
|
|
switch (walk_directory(env, &vaddr, pf_mdw, &huge_page, &hgpg_mdhit,
|
|
|
|
&pw_entrylo0, &pw_entrylo1))
|
|
|
|
{
|
|
|
|
case 0:
|
|
|
|
return false;
|
|
|
|
case 1:
|
|
|
|
goto refill;
|
|
|
|
case 2:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Leaf Level Page Table - First half of PTE pair */
|
|
|
|
vaddr |= ptoffset0;
|
|
|
|
if (get_physical_address(env, &paddr, &prot, vaddr, MMU_DATA_LOAD,
|
2021-01-28 03:52:56 +03:00
|
|
|
cpu_mmu_index(env, false)) !=
|
2018-10-09 19:54:46 +03:00
|
|
|
TLBRET_MATCH) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!get_pte(env, vaddr, leafentry_size, &dir_entry)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
dir_entry = get_tlb_entry_layout(env, dir_entry, leafentry_size, pf_ptew);
|
|
|
|
pw_entrylo0 = dir_entry;
|
|
|
|
|
|
|
|
/* Leaf Level Page Table - Second half of PTE pair */
|
|
|
|
vaddr |= ptoffset1;
|
|
|
|
if (get_physical_address(env, &paddr, &prot, vaddr, MMU_DATA_LOAD,
|
2021-01-28 03:52:56 +03:00
|
|
|
cpu_mmu_index(env, false)) !=
|
2018-10-09 19:54:46 +03:00
|
|
|
TLBRET_MATCH) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!get_pte(env, vaddr, leafentry_size, &dir_entry)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
dir_entry = get_tlb_entry_layout(env, dir_entry, leafentry_size, pf_ptew);
|
|
|
|
pw_entrylo1 = dir_entry;
|
|
|
|
|
|
|
|
refill:
|
|
|
|
|
|
|
|
m = (1 << pf_ptw) - 1;
|
|
|
|
|
|
|
|
if (huge_page) {
|
|
|
|
switch (hgpg_bdhit << 3 | hgpg_gdhit << 2 | hgpg_udhit << 1 |
|
|
|
|
hgpg_mdhit)
|
|
|
|
{
|
|
|
|
case 4:
|
|
|
|
m = (1 << pf_gdw) - 1;
|
|
|
|
if (pf_gdw & 1) {
|
|
|
|
m >>= 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
m = (1 << pf_udw) - 1;
|
|
|
|
if (pf_udw & 1) {
|
|
|
|
m >>= 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
m = (1 << pf_mdw) - 1;
|
|
|
|
if (pf_mdw & 1) {
|
|
|
|
m >>= 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-11-09 11:15:41 +03:00
|
|
|
pw_pagemask = m >> TARGET_PAGE_BITS_MIN;
|
|
|
|
update_pagemask(env, pw_pagemask << CP0PM_MASK, &pw_pagemask);
|
2018-10-09 19:54:46 +03:00
|
|
|
pw_entryhi = (address & ~0x1fff) | (env->CP0_EntryHi & 0xFF);
|
|
|
|
{
|
|
|
|
target_ulong tmp_entryhi = env->CP0_EntryHi;
|
|
|
|
int32_t tmp_pagemask = env->CP0_PageMask;
|
|
|
|
uint64_t tmp_entrylo0 = env->CP0_EntryLo0;
|
|
|
|
uint64_t tmp_entrylo1 = env->CP0_EntryLo1;
|
|
|
|
|
|
|
|
env->CP0_EntryHi = pw_entryhi;
|
|
|
|
env->CP0_PageMask = pw_pagemask;
|
|
|
|
env->CP0_EntryLo0 = pw_entrylo0;
|
|
|
|
env->CP0_EntryLo1 = pw_entrylo1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The hardware page walker inserts a page into the TLB in a manner
|
|
|
|
* identical to a TLBWR instruction as executed by the software refill
|
|
|
|
* handler.
|
|
|
|
*/
|
|
|
|
r4k_helper_tlbwr(env);
|
|
|
|
|
|
|
|
env->CP0_EntryHi = tmp_entryhi;
|
|
|
|
env->CP0_PageMask = tmp_pagemask;
|
|
|
|
env->CP0_EntryLo0 = tmp_entrylo0;
|
|
|
|
env->CP0_EntryLo1 = tmp_entrylo1;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-04-02 12:22:13 +03:00
|
|
|
bool mips_cpu_tlb_fill(CPUState *cs, vaddr address, int size,
|
|
|
|
MMUAccessType access_type, int mmu_idx,
|
|
|
|
bool probe, uintptr_t retaddr)
|
2005-07-02 18:58:51 +04:00
|
|
|
{
|
2013-08-26 05:01:33 +04:00
|
|
|
MIPSCPU *cpu = MIPS_CPU(cs);
|
|
|
|
CPUMIPSState *env = &cpu->env;
|
2012-10-23 14:30:10 +04:00
|
|
|
hwaddr physical;
|
2005-07-02 18:58:51 +04:00
|
|
|
int prot;
|
2019-05-02 08:32:31 +03:00
|
|
|
int ret = TLBRET_BADADDR;
|
2005-07-02 18:58:51 +04:00
|
|
|
|
|
|
|
/* data access */
|
2018-10-09 19:54:46 +03:00
|
|
|
/* XXX: put correct access by using cpu_restore_state() correctly */
|
2019-04-02 12:22:13 +03:00
|
|
|
ret = get_physical_address(env, &physical, &prot, address,
|
2021-01-28 03:52:56 +03:00
|
|
|
access_type, mmu_idx);
|
2017-03-04 21:56:48 +03:00
|
|
|
switch (ret) {
|
|
|
|
case TLBRET_MATCH:
|
|
|
|
qemu_log_mask(CPU_LOG_MMU,
|
|
|
|
"%s address=%" VADDR_PRIx " physical " TARGET_FMT_plx
|
|
|
|
" prot %d\n", __func__, address, physical, prot);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
qemu_log_mask(CPU_LOG_MMU,
|
|
|
|
"%s address=%" VADDR_PRIx " ret %d\n", __func__, address,
|
|
|
|
ret);
|
|
|
|
break;
|
|
|
|
}
|
2006-06-14 21:15:19 +04:00
|
|
|
if (ret == TLBRET_MATCH) {
|
2013-09-03 15:59:37 +04:00
|
|
|
tlb_set_page(cs, address & TARGET_PAGE_MASK,
|
2019-05-17 15:35:33 +03:00
|
|
|
physical & TARGET_PAGE_MASK, prot,
|
2011-05-15 03:00:20 +04:00
|
|
|
mmu_idx, TARGET_PAGE_SIZE);
|
2019-04-02 12:22:13 +03:00
|
|
|
return true;
|
2019-05-02 08:38:44 +03:00
|
|
|
}
|
2018-10-09 19:54:46 +03:00
|
|
|
#if !defined(TARGET_MIPS64)
|
2019-05-02 08:38:44 +03:00
|
|
|
if ((ret == TLBRET_NOMATCH) && (env->tlb->nb_tlb > 1)) {
|
|
|
|
/*
|
|
|
|
* Memory reads during hardware page table walking are performed
|
|
|
|
* as if they were kernel-mode load instructions.
|
|
|
|
*/
|
|
|
|
int mode = (env->hflags & MIPS_HFLAG_KSU);
|
|
|
|
bool ret_walker;
|
|
|
|
env->hflags &= ~MIPS_HFLAG_KSU;
|
2021-02-20 23:19:54 +03:00
|
|
|
ret_walker = page_table_walk_refill(env, address, mmu_idx);
|
2019-05-02 08:38:44 +03:00
|
|
|
env->hflags |= mode;
|
|
|
|
if (ret_walker) {
|
2019-04-02 12:22:13 +03:00
|
|
|
ret = get_physical_address(env, &physical, &prot, address,
|
2021-01-28 03:52:56 +03:00
|
|
|
access_type, mmu_idx);
|
2019-05-02 08:38:44 +03:00
|
|
|
if (ret == TLBRET_MATCH) {
|
|
|
|
tlb_set_page(cs, address & TARGET_PAGE_MASK,
|
2019-05-17 15:35:33 +03:00
|
|
|
physical & TARGET_PAGE_MASK, prot,
|
2019-05-02 08:38:44 +03:00
|
|
|
mmu_idx, TARGET_PAGE_SIZE);
|
2019-04-02 12:22:13 +03:00
|
|
|
return true;
|
2018-10-09 19:54:46 +03:00
|
|
|
}
|
|
|
|
}
|
2019-05-02 08:38:44 +03:00
|
|
|
}
|
2018-10-09 19:54:46 +03:00
|
|
|
#endif
|
2019-04-02 12:22:13 +03:00
|
|
|
if (probe) {
|
|
|
|
return false;
|
|
|
|
}
|
2005-07-02 18:58:51 +04:00
|
|
|
|
2019-04-02 12:22:13 +03:00
|
|
|
raise_mmu_exception(env, address, access_type, ret);
|
|
|
|
do_raise_exception_err(env, cs->exception_index, env->error_code, retaddr);
|
|
|
|
}
|
|
|
|
|
2019-10-23 13:23:34 +03:00
|
|
|
hwaddr cpu_mips_translate_address(CPUMIPSState *env, target_ulong address,
|
2021-04-19 19:00:55 +03:00
|
|
|
MMUAccessType access_type, uintptr_t retaddr)
|
2009-11-30 03:39:22 +03:00
|
|
|
{
|
2012-10-23 14:30:10 +04:00
|
|
|
hwaddr physical;
|
2009-11-30 03:39:22 +03:00
|
|
|
int prot;
|
|
|
|
int ret = 0;
|
2021-04-19 19:00:55 +03:00
|
|
|
CPUState *cs = env_cpu(env);
|
2009-11-30 03:39:22 +03:00
|
|
|
|
|
|
|
/* data access */
|
2021-01-28 04:08:39 +03:00
|
|
|
ret = get_physical_address(env, &physical, &prot, address, access_type,
|
2017-07-18 14:55:53 +03:00
|
|
|
cpu_mmu_index(env, false));
|
2021-04-19 19:00:55 +03:00
|
|
|
if (ret == TLBRET_MATCH) {
|
2010-02-06 19:02:45 +03:00
|
|
|
return physical;
|
2009-11-30 03:39:22 +03:00
|
|
|
}
|
2021-04-19 19:00:55 +03:00
|
|
|
|
|
|
|
raise_mmu_exception(env, address, access_type, ret);
|
|
|
|
cpu_loop_exit_restore(cs, retaddr);
|
2009-11-30 03:39:22 +03:00
|
|
|
}
|
2010-06-09 00:30:01 +04:00
|
|
|
|
2019-10-23 13:23:34 +03:00
|
|
|
static void set_hflags_for_handler(CPUMIPSState *env)
|
2010-06-09 00:30:01 +04:00
|
|
|
{
|
|
|
|
/* Exception handlers are entered in 32-bit mode. */
|
|
|
|
env->hflags &= ~(MIPS_HFLAG_M16);
|
|
|
|
/* ...except that microMIPS lets you choose. */
|
|
|
|
if (env->insn_flags & ASE_MICROMIPS) {
|
2019-10-23 13:23:34 +03:00
|
|
|
env->hflags |= (!!(env->CP0_Config3 &
|
|
|
|
(1 << CP0C3_ISA_ON_EXC))
|
2010-06-09 00:30:01 +04:00
|
|
|
<< MIPS_HFLAG_M16_SHIFT);
|
|
|
|
}
|
|
|
|
}
|
2014-07-07 14:24:01 +04:00
|
|
|
|
|
|
|
static inline void set_badinstr_registers(CPUMIPSState *env)
|
|
|
|
{
|
2018-08-02 17:16:33 +03:00
|
|
|
if (env->insn_flags & ISA_NANOMIPS32) {
|
|
|
|
if (env->CP0_Config3 & (1 << CP0C3_BI)) {
|
|
|
|
uint32_t instr = (cpu_lduw_code(env, env->active_tc.PC)) << 16;
|
|
|
|
if ((instr & 0x10000000) == 0) {
|
|
|
|
instr |= cpu_lduw_code(env, env->active_tc.PC + 2);
|
|
|
|
}
|
|
|
|
env->CP0_BadInstr = instr;
|
|
|
|
|
|
|
|
if ((instr & 0xFC000000) == 0x60000000) {
|
|
|
|
instr = cpu_lduw_code(env, env->active_tc.PC + 4) << 16;
|
|
|
|
env->CP0_BadInstrX = instr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-07-07 14:24:01 +04:00
|
|
|
if (env->hflags & MIPS_HFLAG_M16) {
|
|
|
|
/* TODO: add BadInstr support for microMIPS */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (env->CP0_Config3 & (1 << CP0C3_BI)) {
|
|
|
|
env->CP0_BadInstr = cpu_ldl_code(env, env->active_tc.PC);
|
|
|
|
}
|
|
|
|
if ((env->CP0_Config3 & (1 << CP0C3_BP)) &&
|
|
|
|
(env->hflags & MIPS_HFLAG_BMASK)) {
|
|
|
|
env->CP0_BadInstrP = cpu_ldl_code(env, env->active_tc.PC - 4);
|
|
|
|
}
|
|
|
|
}
|
2020-12-07 01:20:27 +03:00
|
|
|
|
2013-02-02 13:57:51 +04:00
|
|
|
void mips_cpu_do_interrupt(CPUState *cs)
|
2005-07-02 18:58:51 +04:00
|
|
|
{
|
2013-02-02 13:57:51 +04:00
|
|
|
MIPSCPU *cpu = MIPS_CPU(cs);
|
|
|
|
CPUMIPSState *env = &cpu->env;
|
2014-07-07 14:24:01 +04:00
|
|
|
bool update_badinstr = 0;
|
2009-01-13 00:33:13 +03:00
|
|
|
target_ulong offset;
|
|
|
|
int cause = -1;
|
2007-05-13 23:22:13 +04:00
|
|
|
|
2015-08-03 21:49:12 +03:00
|
|
|
if (qemu_loglevel_mask(CPU_LOG_INT)
|
|
|
|
&& cs->exception_index != EXCP_EXT_INTERRUPT) {
|
|
|
|
qemu_log("%s enter: PC " TARGET_FMT_lx " EPC " TARGET_FMT_lx
|
|
|
|
" %s exception\n",
|
2020-11-18 19:47:29 +03:00
|
|
|
__func__, env->active_tc.PC, env->CP0_EPC,
|
|
|
|
mips_exception_name(cs->exception_index));
|
2009-01-13 00:33:13 +03:00
|
|
|
}
|
2013-08-26 10:31:06 +04:00
|
|
|
if (cs->exception_index == EXCP_EXT_INTERRUPT &&
|
|
|
|
(env->hflags & MIPS_HFLAG_DM)) {
|
|
|
|
cs->exception_index = EXCP_DINT;
|
|
|
|
}
|
2009-01-13 00:33:13 +03:00
|
|
|
offset = 0x180;
|
2013-08-26 10:31:06 +04:00
|
|
|
switch (cs->exception_index) {
|
2009-01-13 00:33:13 +03:00
|
|
|
case EXCP_DSS:
|
|
|
|
env->CP0_Debug |= 1 << CP0DB_DSS;
|
2019-10-23 13:23:34 +03:00
|
|
|
/*
|
|
|
|
* Debug single step cannot be raised inside a delay slot and
|
|
|
|
* resume will always occur on the next instruction
|
|
|
|
* (but we assume the pc has always been updated during
|
|
|
|
* code translation).
|
|
|
|
*/
|
2009-12-08 19:06:23 +03:00
|
|
|
env->CP0_DEPC = env->active_tc.PC | !!(env->hflags & MIPS_HFLAG_M16);
|
2009-01-13 00:33:13 +03:00
|
|
|
goto enter_debug_mode;
|
|
|
|
case EXCP_DINT:
|
|
|
|
env->CP0_Debug |= 1 << CP0DB_DINT;
|
|
|
|
goto set_DEPC;
|
|
|
|
case EXCP_DIB:
|
|
|
|
env->CP0_Debug |= 1 << CP0DB_DIB;
|
|
|
|
goto set_DEPC;
|
|
|
|
case EXCP_DBp:
|
|
|
|
env->CP0_Debug |= 1 << CP0DB_DBp;
|
2017-06-23 13:41:16 +03:00
|
|
|
/* Setup DExcCode - SDBBP instruction */
|
2019-10-23 13:23:34 +03:00
|
|
|
env->CP0_Debug = (env->CP0_Debug & ~(0x1fULL << CP0DB_DEC)) |
|
|
|
|
(9 << CP0DB_DEC);
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_DEPC;
|
|
|
|
case EXCP_DDBS:
|
|
|
|
env->CP0_Debug |= 1 << CP0DB_DDBS;
|
|
|
|
goto set_DEPC;
|
|
|
|
case EXCP_DDBL:
|
|
|
|
env->CP0_Debug |= 1 << CP0DB_DDBL;
|
|
|
|
set_DEPC:
|
2009-12-08 19:06:23 +03:00
|
|
|
env->CP0_DEPC = exception_resume_pc(env);
|
|
|
|
env->hflags &= ~MIPS_HFLAG_BMASK;
|
2008-07-23 20:14:22 +04:00
|
|
|
enter_debug_mode:
|
2014-12-05 21:47:58 +03:00
|
|
|
if (env->insn_flags & ISA_MIPS3) {
|
|
|
|
env->hflags |= MIPS_HFLAG_64;
|
2020-12-16 14:34:42 +03:00
|
|
|
if (!(env->insn_flags & ISA_MIPS_R6) ||
|
2015-11-17 20:13:54 +03:00
|
|
|
env->CP0_Status & (1 << CP0St_KX)) {
|
|
|
|
env->hflags &= ~MIPS_HFLAG_AWRAP;
|
|
|
|
}
|
2014-12-05 21:47:58 +03:00
|
|
|
}
|
|
|
|
env->hflags |= MIPS_HFLAG_DM | MIPS_HFLAG_CP0;
|
2009-01-13 00:33:13 +03:00
|
|
|
env->hflags &= ~(MIPS_HFLAG_KSU);
|
|
|
|
/* EJTAG probe trap enable is not implemented... */
|
2019-10-23 13:23:34 +03:00
|
|
|
if (!(env->CP0_Status & (1 << CP0St_EXL))) {
|
2014-03-17 20:00:34 +04:00
|
|
|
env->CP0_Cause &= ~(1U << CP0Ca_BD);
|
2019-10-23 13:23:34 +03:00
|
|
|
}
|
2016-06-09 12:46:50 +03:00
|
|
|
env->active_tc.PC = env->exception_base + 0x480;
|
2010-06-09 00:30:01 +04:00
|
|
|
set_hflags_for_handler(env);
|
2009-01-13 00:33:13 +03:00
|
|
|
break;
|
|
|
|
case EXCP_RESET:
|
2012-05-05 14:53:17 +04:00
|
|
|
cpu_reset(CPU(cpu));
|
2009-01-13 00:33:13 +03:00
|
|
|
break;
|
|
|
|
case EXCP_SRESET:
|
|
|
|
env->CP0_Status |= (1 << CP0St_SR);
|
2016-05-09 19:44:00 +03:00
|
|
|
memset(env->CP0_WatchLo, 0, sizeof(env->CP0_WatchLo));
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_error_EPC;
|
|
|
|
case EXCP_NMI:
|
|
|
|
env->CP0_Status |= (1 << CP0St_NMI);
|
2008-07-23 20:14:22 +04:00
|
|
|
set_error_EPC:
|
2009-12-08 19:06:23 +03:00
|
|
|
env->CP0_ErrorEPC = exception_resume_pc(env);
|
|
|
|
env->hflags &= ~MIPS_HFLAG_BMASK;
|
2009-01-13 00:33:13 +03:00
|
|
|
env->CP0_Status |= (1 << CP0St_ERL) | (1 << CP0St_BEV);
|
2014-12-05 21:47:58 +03:00
|
|
|
if (env->insn_flags & ISA_MIPS3) {
|
|
|
|
env->hflags |= MIPS_HFLAG_64;
|
2020-12-16 14:34:42 +03:00
|
|
|
if (!(env->insn_flags & ISA_MIPS_R6) ||
|
2015-11-17 20:13:54 +03:00
|
|
|
env->CP0_Status & (1 << CP0St_KX)) {
|
|
|
|
env->hflags &= ~MIPS_HFLAG_AWRAP;
|
|
|
|
}
|
2014-12-05 21:47:58 +03:00
|
|
|
}
|
|
|
|
env->hflags |= MIPS_HFLAG_CP0;
|
2009-01-13 00:33:13 +03:00
|
|
|
env->hflags &= ~(MIPS_HFLAG_KSU);
|
2019-10-23 13:23:34 +03:00
|
|
|
if (!(env->CP0_Status & (1 << CP0St_EXL))) {
|
2014-03-17 20:00:34 +04:00
|
|
|
env->CP0_Cause &= ~(1U << CP0Ca_BD);
|
2019-10-23 13:23:34 +03:00
|
|
|
}
|
2016-06-09 12:46:50 +03:00
|
|
|
env->active_tc.PC = env->exception_base;
|
2010-06-09 00:30:01 +04:00
|
|
|
set_hflags_for_handler(env);
|
2009-01-13 00:33:13 +03:00
|
|
|
break;
|
|
|
|
case EXCP_EXT_INTERRUPT:
|
|
|
|
cause = 0;
|
2015-07-10 14:10:02 +03:00
|
|
|
if (env->CP0_Cause & (1 << CP0Ca_IV)) {
|
|
|
|
uint32_t spacing = (env->CP0_IntCtl >> CP0IntCtl_VS) & 0x1f;
|
|
|
|
|
|
|
|
if ((env->CP0_Status & (1 << CP0St_BEV)) || spacing == 0) {
|
|
|
|
offset = 0x200;
|
|
|
|
} else {
|
|
|
|
uint32_t vector = 0;
|
|
|
|
uint32_t pending = (env->CP0_Cause & CP0Ca_IP_mask) >> CP0Ca_IP;
|
|
|
|
|
|
|
|
if (env->CP0_Config3 & (1 << CP0C3_VEIC)) {
|
2019-10-23 13:23:34 +03:00
|
|
|
/*
|
|
|
|
* For VEIC mode, the external interrupt controller feeds
|
|
|
|
* the vector through the CP0Cause IP lines.
|
|
|
|
*/
|
2015-07-10 14:10:02 +03:00
|
|
|
vector = pending;
|
|
|
|
} else {
|
2019-10-23 13:23:34 +03:00
|
|
|
/*
|
|
|
|
* Vectored Interrupts
|
|
|
|
* Mask with Status.IM7-IM0 to get enabled interrupts.
|
|
|
|
*/
|
2015-07-10 14:10:02 +03:00
|
|
|
pending &= (env->CP0_Status >> CP0St_IM) & 0xff;
|
|
|
|
/* Find the highest-priority interrupt. */
|
|
|
|
while (pending >>= 1) {
|
|
|
|
vector++;
|
2010-08-06 14:21:16 +04:00
|
|
|
}
|
|
|
|
}
|
2015-07-10 14:10:02 +03:00
|
|
|
offset = 0x200 + (vector * (spacing << 5));
|
2010-08-06 14:21:16 +04:00
|
|
|
}
|
|
|
|
}
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_LTLBL:
|
|
|
|
cause = 1;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = !(env->error_code & EXCP_INST_NOTAVAIL);
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_TLBL:
|
|
|
|
cause = 2;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = !(env->error_code & EXCP_INST_NOTAVAIL);
|
|
|
|
if ((env->error_code & EXCP_TLB_NOMATCH) &&
|
|
|
|
!(env->CP0_Status & (1 << CP0St_EXL))) {
|
2008-07-23 20:14:22 +04:00
|
|
|
#if defined(TARGET_MIPS64)
|
2009-01-13 00:33:13 +03:00
|
|
|
int R = env->CP0_BadVAddr >> 62;
|
|
|
|
int UX = (env->CP0_Status & (1 << CP0St_UX)) != 0;
|
|
|
|
int KX = (env->CP0_Status & (1 << CP0St_KX)) != 0;
|
2008-07-23 20:14:22 +04:00
|
|
|
|
2017-07-18 14:55:57 +03:00
|
|
|
if ((R != 0 || UX) && (R != 3 || KX) &&
|
|
|
|
(!(env->insn_flags & (INSN_LOONGSON2E | INSN_LOONGSON2F)))) {
|
2009-01-13 00:33:13 +03:00
|
|
|
offset = 0x080;
|
2017-07-18 14:55:57 +03:00
|
|
|
} else {
|
2008-07-23 20:14:22 +04:00
|
|
|
#endif
|
2009-01-13 00:33:13 +03:00
|
|
|
offset = 0x000;
|
2017-07-18 14:55:57 +03:00
|
|
|
#if defined(TARGET_MIPS64)
|
|
|
|
}
|
|
|
|
#endif
|
2009-01-13 00:33:13 +03:00
|
|
|
}
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_TLBS:
|
|
|
|
cause = 3;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
|
|
|
if ((env->error_code & EXCP_TLB_NOMATCH) &&
|
|
|
|
!(env->CP0_Status & (1 << CP0St_EXL))) {
|
2008-07-23 20:14:22 +04:00
|
|
|
#if defined(TARGET_MIPS64)
|
2009-01-13 00:33:13 +03:00
|
|
|
int R = env->CP0_BadVAddr >> 62;
|
|
|
|
int UX = (env->CP0_Status & (1 << CP0St_UX)) != 0;
|
|
|
|
int KX = (env->CP0_Status & (1 << CP0St_KX)) != 0;
|
2008-07-23 20:14:22 +04:00
|
|
|
|
2017-07-18 14:55:57 +03:00
|
|
|
if ((R != 0 || UX) && (R != 3 || KX) &&
|
|
|
|
(!(env->insn_flags & (INSN_LOONGSON2E | INSN_LOONGSON2F)))) {
|
2009-01-13 00:33:13 +03:00
|
|
|
offset = 0x080;
|
2017-07-18 14:55:57 +03:00
|
|
|
} else {
|
2008-07-23 20:14:22 +04:00
|
|
|
#endif
|
2009-01-13 00:33:13 +03:00
|
|
|
offset = 0x000;
|
2017-07-18 14:55:57 +03:00
|
|
|
#if defined(TARGET_MIPS64)
|
|
|
|
}
|
|
|
|
#endif
|
2009-01-13 00:33:13 +03:00
|
|
|
}
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_AdEL:
|
|
|
|
cause = 4;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = !(env->error_code & EXCP_INST_NOTAVAIL);
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_AdES:
|
|
|
|
cause = 5;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_IBE:
|
|
|
|
cause = 6;
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_DBE:
|
|
|
|
cause = 7;
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_SYSCALL:
|
|
|
|
cause = 8;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_BREAK:
|
|
|
|
cause = 9;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_RI:
|
|
|
|
cause = 10;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_CpU:
|
|
|
|
cause = 11;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
env->CP0_Cause = (env->CP0_Cause & ~(0x3 << CP0Ca_CE)) |
|
|
|
|
(env->error_code << CP0Ca_CE);
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_OVERFLOW:
|
|
|
|
cause = 12;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_TRAP:
|
|
|
|
cause = 13;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
2014-11-01 08:28:36 +03:00
|
|
|
case EXCP_MSAFPE:
|
|
|
|
cause = 14;
|
|
|
|
update_badinstr = 1;
|
|
|
|
goto set_EPC;
|
2009-01-13 00:33:13 +03:00
|
|
|
case EXCP_FPE:
|
|
|
|
cause = 15;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_C2E:
|
|
|
|
cause = 18;
|
|
|
|
goto set_EPC;
|
2014-07-07 14:23:59 +04:00
|
|
|
case EXCP_TLBRI:
|
|
|
|
cause = 19;
|
2014-07-07 14:24:01 +04:00
|
|
|
update_badinstr = 1;
|
2014-07-07 14:23:59 +04:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_TLBXI:
|
|
|
|
cause = 20;
|
|
|
|
goto set_EPC;
|
2014-11-01 08:28:36 +03:00
|
|
|
case EXCP_MSADIS:
|
|
|
|
cause = 21;
|
|
|
|
update_badinstr = 1;
|
|
|
|
goto set_EPC;
|
2009-01-13 00:33:13 +03:00
|
|
|
case EXCP_MDMX:
|
|
|
|
cause = 22;
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_DWATCH:
|
|
|
|
cause = 23;
|
2015-09-09 00:45:14 +03:00
|
|
|
/* XXX: TODO: manage deferred watch exceptions */
|
2009-01-13 00:33:13 +03:00
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_MCHECK:
|
|
|
|
cause = 24;
|
|
|
|
goto set_EPC;
|
|
|
|
case EXCP_THREAD:
|
|
|
|
cause = 25;
|
|
|
|
goto set_EPC;
|
2012-10-24 18:17:02 +04:00
|
|
|
case EXCP_DSPDIS:
|
|
|
|
cause = 26;
|
|
|
|
goto set_EPC;
|
2009-01-13 00:33:13 +03:00
|
|
|
case EXCP_CACHE:
|
|
|
|
cause = 30;
|
2017-07-18 14:55:49 +03:00
|
|
|
offset = 0x100;
|
2008-07-23 20:14:22 +04:00
|
|
|
set_EPC:
|
2009-01-13 00:33:13 +03:00
|
|
|
if (!(env->CP0_Status & (1 << CP0St_EXL))) {
|
2009-12-08 19:06:23 +03:00
|
|
|
env->CP0_EPC = exception_resume_pc(env);
|
2014-07-07 14:24:01 +04:00
|
|
|
if (update_badinstr) {
|
|
|
|
set_badinstr_registers(env);
|
|
|
|
}
|
2009-01-13 00:33:13 +03:00
|
|
|
if (env->hflags & MIPS_HFLAG_BMASK) {
|
2014-03-17 20:00:34 +04:00
|
|
|
env->CP0_Cause |= (1U << CP0Ca_BD);
|
2008-07-23 20:14:22 +04:00
|
|
|
} else {
|
2014-03-17 20:00:34 +04:00
|
|
|
env->CP0_Cause &= ~(1U << CP0Ca_BD);
|
2008-07-23 20:14:22 +04:00
|
|
|
}
|
2009-01-13 00:33:13 +03:00
|
|
|
env->CP0_Status |= (1 << CP0St_EXL);
|
2014-12-05 21:47:58 +03:00
|
|
|
if (env->insn_flags & ISA_MIPS3) {
|
|
|
|
env->hflags |= MIPS_HFLAG_64;
|
2020-12-16 14:34:42 +03:00
|
|
|
if (!(env->insn_flags & ISA_MIPS_R6) ||
|
2015-11-17 20:13:54 +03:00
|
|
|
env->CP0_Status & (1 << CP0St_KX)) {
|
|
|
|
env->hflags &= ~MIPS_HFLAG_AWRAP;
|
|
|
|
}
|
2014-12-05 21:47:58 +03:00
|
|
|
}
|
|
|
|
env->hflags |= MIPS_HFLAG_CP0;
|
2009-01-13 00:33:13 +03:00
|
|
|
env->hflags &= ~(MIPS_HFLAG_KSU);
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
2009-01-13 00:33:13 +03:00
|
|
|
env->hflags &= ~MIPS_HFLAG_BMASK;
|
|
|
|
if (env->CP0_Status & (1 << CP0St_BEV)) {
|
2016-06-09 12:46:50 +03:00
|
|
|
env->active_tc.PC = env->exception_base + 0x200;
|
2017-07-18 14:55:49 +03:00
|
|
|
} else if (cause == 30 && !(env->CP0_Config3 & (1 << CP0C3_SC) &&
|
|
|
|
env->CP0_Config5 & (1 << CP0C5_CV))) {
|
|
|
|
/* Force KSeg1 for cache errors */
|
2017-07-31 16:09:12 +03:00
|
|
|
env->active_tc.PC = KSEG1_BASE | (env->CP0_EBase & 0x1FFFF000);
|
2009-01-13 00:33:13 +03:00
|
|
|
} else {
|
2017-07-18 14:55:49 +03:00
|
|
|
env->active_tc.PC = env->CP0_EBase & ~0xfff;
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
2017-07-18 14:55:49 +03:00
|
|
|
|
2009-01-13 00:33:13 +03:00
|
|
|
env->active_tc.PC += offset;
|
2010-06-09 00:30:01 +04:00
|
|
|
set_hflags_for_handler(env);
|
2019-10-23 13:23:34 +03:00
|
|
|
env->CP0_Cause = (env->CP0_Cause & ~(0x1f << CP0Ca_EC)) |
|
|
|
|
(cause << CP0Ca_EC);
|
2009-01-13 00:33:13 +03:00
|
|
|
break;
|
|
|
|
default:
|
2015-08-03 21:49:12 +03:00
|
|
|
abort();
|
2009-01-13 00:33:13 +03:00
|
|
|
}
|
2015-08-03 21:49:12 +03:00
|
|
|
if (qemu_loglevel_mask(CPU_LOG_INT)
|
|
|
|
&& cs->exception_index != EXCP_EXT_INTERRUPT) {
|
2009-01-16 01:34:14 +03:00
|
|
|
qemu_log("%s: PC " TARGET_FMT_lx " EPC " TARGET_FMT_lx " cause %d\n"
|
2015-08-03 21:49:12 +03:00
|
|
|
" S %08x C %08x A " TARGET_FMT_lx " D " TARGET_FMT_lx "\n",
|
|
|
|
__func__, env->active_tc.PC, env->CP0_EPC, cause,
|
|
|
|
env->CP0_Status, env->CP0_Cause, env->CP0_BadVAddr,
|
|
|
|
env->CP0_DEPC);
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
2013-08-26 10:31:06 +04:00
|
|
|
cs->exception_index = EXCP_NONE;
|
2005-07-02 18:58:51 +04:00
|
|
|
}
|
2007-01-03 18:18:08 +03:00
|
|
|
|
2019-10-23 13:23:34 +03:00
|
|
|
void r4k_invalidate_tlb(CPUMIPSState *env, int idx, int use_extra)
|
2007-01-03 18:18:08 +03:00
|
|
|
{
|
2019-03-23 04:38:42 +03:00
|
|
|
CPUState *cs = env_cpu(env);
|
2009-10-02 01:12:16 +04:00
|
|
|
r4k_tlb_t *tlb;
|
2007-01-22 23:50:42 +03:00
|
|
|
target_ulong addr;
|
|
|
|
target_ulong end;
|
2016-06-27 18:19:10 +03:00
|
|
|
uint16_t ASID = env->CP0_EntryHi & env->CP0_EntryHi_ASID_mask;
|
2019-12-20 12:29:34 +03:00
|
|
|
uint32_t MMID = env->CP0_MemoryMapID;
|
|
|
|
bool mi = !!((env->CP0_Config5 >> CP0C5_MI) & 1);
|
|
|
|
uint32_t tlb_mmid;
|
2007-01-22 23:50:42 +03:00
|
|
|
target_ulong mask;
|
2007-01-03 18:18:08 +03:00
|
|
|
|
2019-12-20 12:29:34 +03:00
|
|
|
MMID = mi ? MMID : (uint32_t) ASID;
|
|
|
|
|
2007-09-06 04:18:15 +04:00
|
|
|
tlb = &env->tlb->mmu.r4k.tlb[idx];
|
2019-10-23 13:23:34 +03:00
|
|
|
/*
|
2019-12-20 12:29:34 +03:00
|
|
|
* The qemu TLB is flushed when the ASID/MMID changes, so no need to
|
2019-10-23 13:23:34 +03:00
|
|
|
* flush these entries again.
|
|
|
|
*/
|
2019-12-20 12:29:34 +03:00
|
|
|
tlb_mmid = mi ? tlb->MMID : (uint32_t) tlb->ASID;
|
|
|
|
if (tlb->G == 0 && tlb_mmid != MMID) {
|
2007-01-03 18:18:08 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-09-06 04:18:15 +04:00
|
|
|
if (use_extra && env->tlb->tlb_in_use < MIPS_TLB_MAX) {
|
2019-10-23 13:23:34 +03:00
|
|
|
/*
|
|
|
|
* For tlbwr, we can shadow the discarded entry into
|
|
|
|
* a new (fake) TLB entry, as long as the guest can not
|
|
|
|
* tell that it's there.
|
|
|
|
*/
|
2007-09-06 04:18:15 +04:00
|
|
|
env->tlb->mmu.r4k.tlb[env->tlb->tlb_in_use] = *tlb;
|
|
|
|
env->tlb->tlb_in_use++;
|
2007-01-03 18:18:08 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-01-22 23:50:42 +03:00
|
|
|
/* 1k pages are not supported. */
|
2007-05-13 18:07:26 +04:00
|
|
|
mask = tlb->PageMask | ~(TARGET_PAGE_MASK << 1);
|
2007-01-22 23:50:42 +03:00
|
|
|
if (tlb->V0) {
|
2007-05-13 18:07:26 +04:00
|
|
|
addr = tlb->VPN & ~mask;
|
2007-11-08 21:05:37 +03:00
|
|
|
#if defined(TARGET_MIPS64)
|
2007-06-23 22:04:12 +04:00
|
|
|
if (addr >= (0xFFFFFFFF80000000ULL & env->SEGMask)) {
|
2007-05-13 23:22:13 +04:00
|
|
|
addr |= 0x3FFFFF0000000000ULL;
|
|
|
|
}
|
|
|
|
#endif
|
2007-01-22 23:50:42 +03:00
|
|
|
end = addr | (mask >> 1);
|
|
|
|
while (addr < end) {
|
2013-09-04 03:29:02 +04:00
|
|
|
tlb_flush_page(cs, addr);
|
2007-01-22 23:50:42 +03:00
|
|
|
addr += TARGET_PAGE_SIZE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (tlb->V1) {
|
2007-05-13 18:07:26 +04:00
|
|
|
addr = (tlb->VPN & ~mask) | ((mask >> 1) + 1);
|
2007-11-08 21:05:37 +03:00
|
|
|
#if defined(TARGET_MIPS64)
|
2007-06-23 22:04:12 +04:00
|
|
|
if (addr >= (0xFFFFFFFF80000000ULL & env->SEGMask)) {
|
2007-05-13 23:22:13 +04:00
|
|
|
addr |= 0x3FFFFF0000000000ULL;
|
|
|
|
}
|
|
|
|
#endif
|
2007-01-22 23:50:42 +03:00
|
|
|
end = addr | mask;
|
2008-03-30 00:43:23 +03:00
|
|
|
while (addr - 1 < end) {
|
2013-09-04 03:29:02 +04:00
|
|
|
tlb_flush_page(cs, addr);
|
2007-01-22 23:50:42 +03:00
|
|
|
addr += TARGET_PAGE_SIZE;
|
|
|
|
}
|
|
|
|
}
|
2007-01-03 18:18:08 +03:00
|
|
|
}
|