1/* 2 * RISC-V translation routines for the RISC-V privileged instructions. 3 * 4 * Copyright (c) 2016-2017 Sagar Karandikar, sagark@eecs.berkeley.edu 5 * Copyright (c) 2018 Peer Adelt, peer.adelt@hni.uni-paderborn.de 6 * Bastian Koppelmann, kbastian@mail.uni-paderborn.de 7 * 8 * This program is free software; you can redistribute it and/or modify it 9 * under the terms and conditions of the GNU General Public License, 10 * version 2 or later, as published by the Free Software Foundation. 11 * 12 * This program is distributed in the hope it will be useful, but WITHOUT 13 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 14 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 15 * more details. 16 * 17 * You should have received a copy of the GNU General Public License along with 18 * this program. If not, see <http://www.gnu.org/licenses/>. 19 */ 20 21static bool trans_ecall(DisasContext *ctx, arg_ecall *a) 22{ 23 /* always generates U-level ECALL, fixed in do_interrupt handler */ 24 generate_exception(ctx, RISCV_EXCP_U_ECALL); 25 return true; 26} 27 28static bool trans_ebreak(DisasContext *ctx, arg_ebreak *a) 29{ 30 target_ulong ebreak_addr = ctx->base.pc_next; 31 target_ulong pre_addr = ebreak_addr - 4; 32 target_ulong post_addr = ebreak_addr + 4; 33 uint32_t pre = 0; 34 uint32_t ebreak = 0; 35 uint32_t post = 0; 36 37 /* 38 * The RISC-V semihosting spec specifies the following 39 * three-instruction sequence to flag a semihosting call: 40 * 41 * slli zero, zero, 0x1f 0x01f01013 42 * ebreak 0x00100073 43 * srai zero, zero, 0x7 0x40705013 44 * 45 * The two shift operations on the zero register are no-ops, used 46 * here to signify a semihosting exception, rather than a breakpoint. 47 * 48 * Uncompressed instructions are required so that the sequence is easy 49 * to validate. 50 * 51 * The three instructions are required to lie in the same page so 52 * that no exception will be raised when fetching them. 53 */ 54 55 if ((pre_addr & TARGET_PAGE_MASK) == (post_addr & TARGET_PAGE_MASK)) { 56 pre = opcode_at(&ctx->base, pre_addr); 57 ebreak = opcode_at(&ctx->base, ebreak_addr); 58 post = opcode_at(&ctx->base, post_addr); 59 } 60 61 if (pre == 0x01f01013 && ebreak == 0x00100073 && post == 0x40705013) { 62 generate_exception(ctx, RISCV_EXCP_SEMIHOST); 63 } else { 64 generate_exception(ctx, RISCV_EXCP_BREAKPOINT); 65 } 66 return true; 67} 68 69static bool trans_uret(DisasContext *ctx, arg_uret *a) 70{ 71 return false; 72} 73 74static bool trans_sret(DisasContext *ctx, arg_sret *a) 75{ 76#ifndef CONFIG_USER_ONLY 77 if (has_ext(ctx, RVS)) { 78 gen_helper_sret(cpu_pc, cpu_env); 79 tcg_gen_exit_tb(NULL, 0); /* no chaining */ 80 ctx->base.is_jmp = DISAS_NORETURN; 81 } else { 82 return false; 83 } 84 return true; 85#else 86 return false; 87#endif 88} 89 90static bool trans_mret(DisasContext *ctx, arg_mret *a) 91{ 92#ifndef CONFIG_USER_ONLY 93 gen_helper_mret(cpu_pc, cpu_env); 94 tcg_gen_exit_tb(NULL, 0); /* no chaining */ 95 ctx->base.is_jmp = DISAS_NORETURN; 96 return true; 97#else 98 return false; 99#endif 100} 101 102static bool trans_wfi(DisasContext *ctx, arg_wfi *a) 103{ 104#ifndef CONFIG_USER_ONLY 105 gen_set_pc_imm(ctx, ctx->pc_succ_insn); 106 gen_helper_wfi(cpu_env); 107 return true; 108#else 109 return false; 110#endif 111} 112 113static bool trans_sfence_vma(DisasContext *ctx, arg_sfence_vma *a) 114{ 115#ifndef CONFIG_USER_ONLY 116 gen_helper_tlb_flush(cpu_env); 117 return true; 118#endif 119 return false; 120} 121 122static bool trans_sfence_vm(DisasContext *ctx, arg_sfence_vm *a) 123{ 124 return false; 125} 126