1 /* 2 * HPPA interrupt helper routines 3 * 4 * Copyright (c) 2017 Richard Henderson 5 * 6 * This library is free software; you can redistribute it and/or 7 * modify it under the terms of the GNU Lesser General Public 8 * License as published by the Free Software Foundation; either 9 * version 2.1 of the License, or (at your option) any later version. 10 * 11 * This library is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 14 * Lesser General Public License for more details. 15 * 16 * You should have received a copy of the GNU Lesser General Public 17 * License along with this library; if not, see <http://www.gnu.org/licenses/>. 18 */ 19 20 #include "qemu/osdep.h" 21 #include "qemu/main-loop.h" 22 #include "qemu/log.h" 23 #include "cpu.h" 24 #include "exec/helper-proto.h" 25 #include "hw/core/cpu.h" 26 #include "hw/hppa/hppa_hardware.h" 27 28 static void eval_interrupt(HPPACPU *cpu) 29 { 30 CPUState *cs = CPU(cpu); 31 if (cpu->env.cr[CR_EIRR]) { 32 cpu_interrupt(cs, CPU_INTERRUPT_HARD); 33 } else { 34 cpu_reset_interrupt(cs, CPU_INTERRUPT_HARD); 35 } 36 } 37 38 /* Each CPU has a word mapped into the GSC bus. Anything on the GSC bus 39 * can write to this word to raise an external interrupt on the target CPU. 40 * This includes the system controller (DINO) for regular devices, or 41 * another CPU for SMP interprocessor interrupts. 42 */ 43 static uint64_t io_eir_read(void *opaque, hwaddr addr, unsigned size) 44 { 45 HPPACPU *cpu = opaque; 46 47 /* ??? What does a read of this register over the GSC bus do? */ 48 return cpu->env.cr[CR_EIRR]; 49 } 50 51 static void io_eir_write(void *opaque, hwaddr addr, 52 uint64_t data, unsigned size) 53 { 54 HPPACPU *cpu = opaque; 55 CPUHPPAState *env = &cpu->env; 56 int widthm1 = 31; 57 int le_bit; 58 59 /* The default PSW.W controls the width of EIRR. */ 60 if (hppa_is_pa20(env) && env->cr[CR_PSW_DEFAULT] & PDC_PSW_WIDE_BIT) { 61 widthm1 = 63; 62 } 63 le_bit = ~data & widthm1; 64 65 env->cr[CR_EIRR] |= 1ull << le_bit; 66 eval_interrupt(cpu); 67 } 68 69 const MemoryRegionOps hppa_io_eir_ops = { 70 .read = io_eir_read, 71 .write = io_eir_write, 72 .valid.min_access_size = 4, 73 .valid.max_access_size = 4, 74 .impl.min_access_size = 4, 75 .impl.max_access_size = 4, 76 }; 77 78 void hppa_cpu_alarm_timer(void *opaque) 79 { 80 /* Raise interrupt 0. */ 81 io_eir_write(opaque, 0, 0, 4); 82 } 83 84 void HELPER(write_eirr)(CPUHPPAState *env, target_ulong val) 85 { 86 env->cr[CR_EIRR] &= ~val; 87 bql_lock(); 88 eval_interrupt(env_archcpu(env)); 89 bql_unlock(); 90 } 91 92 void hppa_cpu_do_interrupt(CPUState *cs) 93 { 94 HPPACPU *cpu = HPPA_CPU(cs); 95 CPUHPPAState *env = &cpu->env; 96 int i = cs->exception_index; 97 uint64_t old_psw; 98 99 /* As documented in pa2.0 -- interruption handling. */ 100 /* step 1 */ 101 env->cr[CR_IPSW] = old_psw = cpu_hppa_get_psw(env); 102 103 /* step 2 -- Note PSW_W is masked out again for pa1.x */ 104 cpu_hppa_put_psw(env, 105 (env->cr[CR_PSW_DEFAULT] & PDC_PSW_WIDE_BIT ? PSW_W : 0) | 106 (i == EXCP_HPMC ? PSW_M : 0)); 107 108 /* step 3 */ 109 /* 110 * For pa1.x, IIASQ is simply a copy of IASQ. 111 * For pa2.0, IIASQ is the top bits of the virtual address, 112 * or zero if translation is disabled. 113 */ 114 if (!hppa_is_pa20(env)) { 115 env->cr[CR_IIASQ] = env->iasq_f >> 32; 116 env->cr_back[0] = env->iasq_b >> 32; 117 } else if (old_psw & PSW_C) { 118 env->cr[CR_IIASQ] = 119 hppa_form_gva_psw(old_psw, env->iasq_f, env->iaoq_f) >> 32; 120 env->cr_back[0] = 121 hppa_form_gva_psw(old_psw, env->iasq_b, env->iaoq_b) >> 32; 122 } else { 123 env->cr[CR_IIASQ] = 0; 124 env->cr_back[0] = 0; 125 } 126 env->cr[CR_IIAOQ] = env->iaoq_f; 127 env->cr_back[1] = env->iaoq_b; 128 129 if (old_psw & PSW_Q) { 130 /* step 5 */ 131 /* ISR and IOR will be set elsewhere. */ 132 switch (i) { 133 case EXCP_ILL: 134 case EXCP_BREAK: 135 case EXCP_PRIV_REG: 136 case EXCP_PRIV_OPR: 137 /* IIR set via translate.c. */ 138 break; 139 140 case EXCP_OVERFLOW: 141 case EXCP_COND: 142 case EXCP_ASSIST: 143 case EXCP_DTLB_MISS: 144 case EXCP_NA_ITLB_MISS: 145 case EXCP_NA_DTLB_MISS: 146 case EXCP_DMAR: 147 case EXCP_DMPI: 148 case EXCP_UNALIGN: 149 case EXCP_DMP: 150 case EXCP_DMB: 151 case EXCP_TLB_DIRTY: 152 case EXCP_PAGE_REF: 153 case EXCP_ASSIST_EMU: 154 { 155 /* Avoid reading directly from the virtual address, lest we 156 raise another exception from some sort of TLB issue. */ 157 /* ??? An alternate fool-proof method would be to store the 158 instruction data into the unwind info. That's probably 159 a bit too much in the way of extra storage required. */ 160 vaddr vaddr = env->iaoq_f & -4; 161 hwaddr paddr = vaddr; 162 163 if (old_psw & PSW_C) { 164 int prot, t; 165 166 vaddr = hppa_form_gva_psw(old_psw, env->iasq_f, vaddr); 167 t = hppa_get_physical_address(env, vaddr, MMU_KERNEL_IDX, 168 0, &paddr, &prot, NULL); 169 if (t >= 0) { 170 /* We can't re-load the instruction. */ 171 env->cr[CR_IIR] = 0; 172 break; 173 } 174 } 175 env->cr[CR_IIR] = ldl_phys(cs->as, paddr); 176 } 177 break; 178 179 default: 180 /* Other exceptions do not set IIR. */ 181 break; 182 } 183 184 /* step 6 */ 185 env->shadow[0] = env->gr[1]; 186 env->shadow[1] = env->gr[8]; 187 env->shadow[2] = env->gr[9]; 188 env->shadow[3] = env->gr[16]; 189 env->shadow[4] = env->gr[17]; 190 env->shadow[5] = env->gr[24]; 191 env->shadow[6] = env->gr[25]; 192 } 193 194 /* step 7 */ 195 if (i == EXCP_TOC) { 196 env->iaoq_f = hppa_form_gva(env, 0, FIRMWARE_START); 197 /* help SeaBIOS and provide iaoq_b and iasq_back in shadow regs */ 198 env->gr[24] = env->cr_back[0]; 199 env->gr[25] = env->cr_back[1]; 200 } else { 201 env->iaoq_f = hppa_form_gva(env, 0, env->cr[CR_IVA] + 32 * i); 202 } 203 env->iaoq_b = hppa_form_gva(env, 0, env->iaoq_f + 4); 204 env->iasq_f = 0; 205 env->iasq_b = 0; 206 207 if (qemu_loglevel_mask(CPU_LOG_INT)) { 208 static const char * const names[] = { 209 [EXCP_HPMC] = "high priority machine check", 210 [EXCP_POWER_FAIL] = "power fail interrupt", 211 [EXCP_RC] = "recovery counter trap", 212 [EXCP_EXT_INTERRUPT] = "external interrupt", 213 [EXCP_LPMC] = "low priority machine check", 214 [EXCP_ITLB_MISS] = "instruction tlb miss fault", 215 [EXCP_IMP] = "instruction memory protection trap", 216 [EXCP_ILL] = "illegal instruction trap", 217 [EXCP_BREAK] = "break instruction trap", 218 [EXCP_PRIV_OPR] = "privileged operation trap", 219 [EXCP_PRIV_REG] = "privileged register trap", 220 [EXCP_OVERFLOW] = "overflow trap", 221 [EXCP_COND] = "conditional trap", 222 [EXCP_ASSIST] = "assist exception trap", 223 [EXCP_DTLB_MISS] = "data tlb miss fault", 224 [EXCP_NA_ITLB_MISS] = "non-access instruction tlb miss", 225 [EXCP_NA_DTLB_MISS] = "non-access data tlb miss", 226 [EXCP_DMP] = "data memory protection trap", 227 [EXCP_DMB] = "data memory break trap", 228 [EXCP_TLB_DIRTY] = "tlb dirty bit trap", 229 [EXCP_PAGE_REF] = "page reference trap", 230 [EXCP_ASSIST_EMU] = "assist emulation trap", 231 [EXCP_HPT] = "high-privilege transfer trap", 232 [EXCP_LPT] = "low-privilege transfer trap", 233 [EXCP_TB] = "taken branch trap", 234 [EXCP_DMAR] = "data memory access rights trap", 235 [EXCP_DMPI] = "data memory protection id trap", 236 [EXCP_UNALIGN] = "unaligned data reference trap", 237 [EXCP_PER_INTERRUPT] = "performance monitor interrupt", 238 [EXCP_SYSCALL] = "syscall", 239 [EXCP_SYSCALL_LWS] = "syscall-lws", 240 [EXCP_TOC] = "TOC (transfer of control)", 241 }; 242 static int count; 243 const char *name = NULL; 244 char unknown[16]; 245 246 if (i >= 0 && i < ARRAY_SIZE(names)) { 247 name = names[i]; 248 } 249 if (!name) { 250 snprintf(unknown, sizeof(unknown), "unknown %d", i); 251 name = unknown; 252 } 253 qemu_log("INT %6d: %s @ " TARGET_FMT_lx ":" TARGET_FMT_lx 254 " for " TARGET_FMT_lx ":" TARGET_FMT_lx "\n", 255 ++count, name, env->cr[CR_IIASQ], env->cr[CR_IIAOQ], 256 env->cr[CR_ISR], env->cr[CR_IOR]); 257 } 258 cs->exception_index = -1; 259 } 260 261 bool hppa_cpu_exec_interrupt(CPUState *cs, int interrupt_request) 262 { 263 HPPACPU *cpu = HPPA_CPU(cs); 264 CPUHPPAState *env = &cpu->env; 265 266 if (interrupt_request & CPU_INTERRUPT_NMI) { 267 /* Raise TOC (NMI) interrupt */ 268 cpu_reset_interrupt(cs, CPU_INTERRUPT_NMI); 269 cs->exception_index = EXCP_TOC; 270 hppa_cpu_do_interrupt(cs); 271 return true; 272 } 273 274 /* If interrupts are requested and enabled, raise them. */ 275 if ((interrupt_request & CPU_INTERRUPT_HARD) 276 && (env->psw & PSW_I) 277 && (env->cr[CR_EIRR] & env->cr[CR_EIEM])) { 278 cs->exception_index = EXCP_EXT_INTERRUPT; 279 hppa_cpu_do_interrupt(cs); 280 return true; 281 } 282 return false; 283 } 284