2 * RISC-V CPU helpers for qemu.
4 * Copyright (c) 2016-2017 Sagar Karandikar, sagark@eecs.berkeley.edu
5 * Copyright (c) 2017-2018 SiFive, Inc.
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2 or later, as published by the Free Software Foundation.
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
16 * You should have received a copy of the GNU General Public License along with
17 * this program. If not, see <http://www.gnu.org/licenses/>.
20 #include "qemu/osdep.h"
23 #include "exec/exec-all.h"
27 int riscv_cpu_mmu_index(CPURISCVState
*env
, bool ifetch
)
29 #ifdef CONFIG_USER_ONLY
36 #ifndef CONFIG_USER_ONLY
37 static int riscv_cpu_local_irq_pending(CPURISCVState
*env
)
39 target_ulong mstatus_mie
= get_field(env
->mstatus
, MSTATUS_MIE
);
40 target_ulong mstatus_sie
= get_field(env
->mstatus
, MSTATUS_SIE
);
41 target_ulong pending
= atomic_read(&env
->mip
) & env
->mie
;
42 target_ulong mie
= env
->priv
< PRV_M
|| (env
->priv
== PRV_M
&& mstatus_mie
);
43 target_ulong sie
= env
->priv
< PRV_S
|| (env
->priv
== PRV_S
&& mstatus_sie
);
44 target_ulong irqs
= (pending
& ~env
->mideleg
& -mie
) |
45 (pending
& env
->mideleg
& -sie
);
48 return ctz64(irqs
); /* since non-zero */
50 return EXCP_NONE
; /* indicates no pending interrupt */
55 bool riscv_cpu_exec_interrupt(CPUState
*cs
, int interrupt_request
)
57 #if !defined(CONFIG_USER_ONLY)
58 if (interrupt_request
& CPU_INTERRUPT_HARD
) {
59 RISCVCPU
*cpu
= RISCV_CPU(cs
);
60 CPURISCVState
*env
= &cpu
->env
;
61 int interruptno
= riscv_cpu_local_irq_pending(env
);
62 if (interruptno
>= 0) {
63 cs
->exception_index
= RISCV_EXCP_INT_FLAG
| interruptno
;
64 riscv_cpu_do_interrupt(cs
);
72 #if !defined(CONFIG_USER_ONLY)
74 int riscv_cpu_claim_interrupts(RISCVCPU
*cpu
, uint32_t interrupts
)
76 CPURISCVState
*env
= &cpu
->env
;
77 if (env
->miclaim
& interrupts
) {
80 env
->miclaim
|= interrupts
;
89 static void riscv_cpu_update_mip_irqs_async(CPUState
*target_cpu_state
,
92 struct CpuAsyncInfo
*info
= (struct CpuAsyncInfo
*) data
.host_ptr
;
95 cpu_interrupt(target_cpu_state
, CPU_INTERRUPT_HARD
);
97 cpu_reset_interrupt(target_cpu_state
, CPU_INTERRUPT_HARD
);
103 uint32_t riscv_cpu_update_mip(RISCVCPU
*cpu
, uint32_t mask
, uint32_t value
)
105 CPURISCVState
*env
= &cpu
->env
;
106 CPUState
*cs
= CPU(cpu
);
107 struct CpuAsyncInfo
*info
;
108 uint32_t old
, new, cmp
= atomic_read(&env
->mip
);
112 new = (old
& ~mask
) | (value
& mask
);
113 cmp
= atomic_cmpxchg(&env
->mip
, old
, new);
114 } while (old
!= cmp
);
116 info
= g_new(struct CpuAsyncInfo
, 1);
119 async_run_on_cpu(cs
, riscv_cpu_update_mip_irqs_async
,
120 RUN_ON_CPU_HOST_PTR(info
));
125 void riscv_cpu_set_mode(CPURISCVState
*env
, target_ulong newpriv
)
127 if (newpriv
> PRV_M
) {
128 g_assert_not_reached();
130 if (newpriv
== PRV_H
) {
133 /* tlb_flush is unnecessary as mode is contained in mmu_idx */
137 * Clear the load reservation - otherwise a reservation placed in one
138 * context/process can be used by another, resulting in an SC succeeding
139 * incorrectly. Version 2.2 of the ISA specification explicitly requires
140 * this behaviour, while later revisions say that the kernel "should" use
141 * an SC instruction to force the yielding of a load reservation on a
142 * preemptive context switch. As a result, do both.
147 /* get_physical_address - get the physical address for this virtual address
149 * Do a page table walk to obtain the physical address corresponding to a
150 * virtual address. Returns 0 if the translation was successful
152 * Adapted from Spike's mmu_t::translate and mmu_t::walk
155 static int get_physical_address(CPURISCVState
*env
, hwaddr
*physical
,
156 int *prot
, target_ulong addr
,
157 int access_type
, int mmu_idx
)
159 /* NOTE: the env->pc value visible here will not be
160 * correct, but the value visible to the exception handler
161 * (riscv_cpu_do_interrupt) is correct */
165 if (mode
== PRV_M
&& access_type
!= MMU_INST_FETCH
) {
166 if (get_field(env
->mstatus
, MSTATUS_MPRV
)) {
167 mode
= get_field(env
->mstatus
, MSTATUS_MPP
);
171 if (mode
== PRV_M
|| !riscv_feature(env
, RISCV_FEATURE_MMU
)) {
173 *prot
= PAGE_READ
| PAGE_WRITE
| PAGE_EXEC
;
174 return TRANSLATE_SUCCESS
;
180 int levels
, ptidxbits
, ptesize
, vm
, sum
;
181 int mxr
= get_field(env
->mstatus
, MSTATUS_MXR
);
183 if (env
->priv_ver
>= PRIV_VERSION_1_10_0
) {
184 base
= get_field(env
->satp
, SATP_PPN
) << PGSHIFT
;
185 sum
= get_field(env
->mstatus
, MSTATUS_SUM
);
186 vm
= get_field(env
->satp
, SATP_MODE
);
189 levels
= 2; ptidxbits
= 10; ptesize
= 4; break;
191 levels
= 3; ptidxbits
= 9; ptesize
= 8; break;
193 levels
= 4; ptidxbits
= 9; ptesize
= 8; break;
195 levels
= 5; ptidxbits
= 9; ptesize
= 8; break;
198 *prot
= PAGE_READ
| PAGE_WRITE
| PAGE_EXEC
;
199 return TRANSLATE_SUCCESS
;
201 g_assert_not_reached();
204 base
= env
->sptbr
<< PGSHIFT
;
205 sum
= !get_field(env
->mstatus
, MSTATUS_PUM
);
206 vm
= get_field(env
->mstatus
, MSTATUS_VM
);
209 levels
= 2; ptidxbits
= 10; ptesize
= 4; break;
211 levels
= 3; ptidxbits
= 9; ptesize
= 8; break;
213 levels
= 4; ptidxbits
= 9; ptesize
= 8; break;
216 *prot
= PAGE_READ
| PAGE_WRITE
| PAGE_EXEC
;
217 return TRANSLATE_SUCCESS
;
219 g_assert_not_reached();
223 CPUState
*cs
= env_cpu(env
);
224 int va_bits
= PGSHIFT
+ levels
* ptidxbits
;
225 target_ulong mask
= (1L << (TARGET_LONG_BITS
- (va_bits
- 1))) - 1;
226 target_ulong masked_msbs
= (addr
>> (va_bits
- 1)) & mask
;
227 if (masked_msbs
!= 0 && masked_msbs
!= mask
) {
228 return TRANSLATE_FAIL
;
231 int ptshift
= (levels
- 1) * ptidxbits
;
234 #if !TCG_OVERSIZED_GUEST
237 for (i
= 0; i
< levels
; i
++, ptshift
-= ptidxbits
) {
238 target_ulong idx
= (addr
>> (PGSHIFT
+ ptshift
)) &
239 ((1 << ptidxbits
) - 1);
241 /* check that physical address of PTE is legal */
242 target_ulong pte_addr
= base
+ idx
* ptesize
;
244 if (riscv_feature(env
, RISCV_FEATURE_PMP
) &&
245 !pmp_hart_has_privs(env
, pte_addr
, sizeof(target_ulong
),
246 1 << MMU_DATA_LOAD
, PRV_S
)) {
247 return TRANSLATE_PMP_FAIL
;
249 #if defined(TARGET_RISCV32)
250 target_ulong pte
= ldl_phys(cs
->as
, pte_addr
);
251 #elif defined(TARGET_RISCV64)
252 target_ulong pte
= ldq_phys(cs
->as
, pte_addr
);
254 target_ulong ppn
= pte
>> PTE_PPN_SHIFT
;
256 if (!(pte
& PTE_V
)) {
258 return TRANSLATE_FAIL
;
259 } else if (!(pte
& (PTE_R
| PTE_W
| PTE_X
))) {
260 /* Inner PTE, continue walking */
261 base
= ppn
<< PGSHIFT
;
262 } else if ((pte
& (PTE_R
| PTE_W
| PTE_X
)) == PTE_W
) {
263 /* Reserved leaf PTE flags: PTE_W */
264 return TRANSLATE_FAIL
;
265 } else if ((pte
& (PTE_R
| PTE_W
| PTE_X
)) == (PTE_W
| PTE_X
)) {
266 /* Reserved leaf PTE flags: PTE_W + PTE_X */
267 return TRANSLATE_FAIL
;
268 } else if ((pte
& PTE_U
) && ((mode
!= PRV_U
) &&
269 (!sum
|| access_type
== MMU_INST_FETCH
))) {
270 /* User PTE flags when not U mode and mstatus.SUM is not set,
271 or the access type is an instruction fetch */
272 return TRANSLATE_FAIL
;
273 } else if (!(pte
& PTE_U
) && (mode
!= PRV_S
)) {
274 /* Supervisor PTE flags when not S mode */
275 return TRANSLATE_FAIL
;
276 } else if (ppn
& ((1ULL << ptshift
) - 1)) {
278 return TRANSLATE_FAIL
;
279 } else if (access_type
== MMU_DATA_LOAD
&& !((pte
& PTE_R
) ||
280 ((pte
& PTE_X
) && mxr
))) {
281 /* Read access check failed */
282 return TRANSLATE_FAIL
;
283 } else if (access_type
== MMU_DATA_STORE
&& !(pte
& PTE_W
)) {
284 /* Write access check failed */
285 return TRANSLATE_FAIL
;
286 } else if (access_type
== MMU_INST_FETCH
&& !(pte
& PTE_X
)) {
287 /* Fetch access check failed */
288 return TRANSLATE_FAIL
;
290 /* if necessary, set accessed and dirty bits. */
291 target_ulong updated_pte
= pte
| PTE_A
|
292 (access_type
== MMU_DATA_STORE
? PTE_D
: 0);
294 /* Page table updates need to be atomic with MTTCG enabled */
295 if (updated_pte
!= pte
) {
297 * - if accessed or dirty bits need updating, and the PTE is
298 * in RAM, then we do so atomically with a compare and swap.
299 * - if the PTE is in IO space or ROM, then it can't be updated
300 * and we return TRANSLATE_FAIL.
301 * - if the PTE changed by the time we went to update it, then
302 * it is no longer valid and we must re-walk the page table.
305 hwaddr l
= sizeof(target_ulong
), addr1
;
306 mr
= address_space_translate(cs
->as
, pte_addr
,
307 &addr1
, &l
, false, MEMTXATTRS_UNSPECIFIED
);
308 if (memory_region_is_ram(mr
)) {
309 target_ulong
*pte_pa
=
310 qemu_map_ram_ptr(mr
->ram_block
, addr1
);
311 #if TCG_OVERSIZED_GUEST
312 /* MTTCG is not enabled on oversized TCG guests so
313 * page table updates do not need to be atomic */
314 *pte_pa
= pte
= updated_pte
;
316 target_ulong old_pte
=
317 atomic_cmpxchg(pte_pa
, pte
, updated_pte
);
318 if (old_pte
!= pte
) {
325 /* misconfigured PTE in ROM (AD bits are not preset) or
326 * PTE is in IO space and can't be updated atomically */
327 return TRANSLATE_FAIL
;
331 /* for superpage mappings, make a fake leaf PTE for the TLB's
333 target_ulong vpn
= addr
>> PGSHIFT
;
334 *physical
= (ppn
| (vpn
& ((1L << ptshift
) - 1))) << PGSHIFT
;
336 /* set permissions on the TLB entry */
337 if ((pte
& PTE_R
) || ((pte
& PTE_X
) && mxr
)) {
343 /* add write permission on stores or if the page is already dirty,
344 so that we TLB miss on later writes to update the dirty bit */
346 (access_type
== MMU_DATA_STORE
|| (pte
& PTE_D
))) {
349 return TRANSLATE_SUCCESS
;
352 return TRANSLATE_FAIL
;
355 static void raise_mmu_exception(CPURISCVState
*env
, target_ulong address
,
356 MMUAccessType access_type
, bool pmp_violation
)
358 CPUState
*cs
= env_cpu(env
);
359 int page_fault_exceptions
=
360 (env
->priv_ver
>= PRIV_VERSION_1_10_0
) &&
361 get_field(env
->satp
, SATP_MODE
) != VM_1_10_MBARE
&&
363 switch (access_type
) {
365 cs
->exception_index
= page_fault_exceptions
?
366 RISCV_EXCP_INST_PAGE_FAULT
: RISCV_EXCP_INST_ACCESS_FAULT
;
369 cs
->exception_index
= page_fault_exceptions
?
370 RISCV_EXCP_LOAD_PAGE_FAULT
: RISCV_EXCP_LOAD_ACCESS_FAULT
;
373 cs
->exception_index
= page_fault_exceptions
?
374 RISCV_EXCP_STORE_PAGE_FAULT
: RISCV_EXCP_STORE_AMO_ACCESS_FAULT
;
377 g_assert_not_reached();
379 env
->badaddr
= address
;
382 hwaddr
riscv_cpu_get_phys_page_debug(CPUState
*cs
, vaddr addr
)
384 RISCVCPU
*cpu
= RISCV_CPU(cs
);
387 int mmu_idx
= cpu_mmu_index(&cpu
->env
, false);
389 if (get_physical_address(&cpu
->env
, &phys_addr
, &prot
, addr
, 0, mmu_idx
)) {
395 void riscv_cpu_unassigned_access(CPUState
*cs
, hwaddr addr
, bool is_write
,
396 bool is_exec
, int unused
, unsigned size
)
398 RISCVCPU
*cpu
= RISCV_CPU(cs
);
399 CPURISCVState
*env
= &cpu
->env
;
402 cs
->exception_index
= RISCV_EXCP_STORE_AMO_ACCESS_FAULT
;
404 cs
->exception_index
= RISCV_EXCP_LOAD_ACCESS_FAULT
;
408 riscv_raise_exception(&cpu
->env
, cs
->exception_index
, GETPC());
411 void riscv_cpu_do_unaligned_access(CPUState
*cs
, vaddr addr
,
412 MMUAccessType access_type
, int mmu_idx
,
415 RISCVCPU
*cpu
= RISCV_CPU(cs
);
416 CPURISCVState
*env
= &cpu
->env
;
417 switch (access_type
) {
419 cs
->exception_index
= RISCV_EXCP_INST_ADDR_MIS
;
422 cs
->exception_index
= RISCV_EXCP_LOAD_ADDR_MIS
;
425 cs
->exception_index
= RISCV_EXCP_STORE_AMO_ADDR_MIS
;
428 g_assert_not_reached();
431 riscv_raise_exception(env
, cs
->exception_index
, retaddr
);
435 bool riscv_cpu_tlb_fill(CPUState
*cs
, vaddr address
, int size
,
436 MMUAccessType access_type
, int mmu_idx
,
437 bool probe
, uintptr_t retaddr
)
439 #ifndef CONFIG_USER_ONLY
440 RISCVCPU
*cpu
= RISCV_CPU(cs
);
441 CPURISCVState
*env
= &cpu
->env
;
444 bool pmp_violation
= false;
445 int ret
= TRANSLATE_FAIL
;
448 qemu_log_mask(CPU_LOG_MMU
, "%s ad %" VADDR_PRIx
" rw %d mmu_idx %d\n",
449 __func__
, address
, access_type
, mmu_idx
);
451 ret
= get_physical_address(env
, &pa
, &prot
, address
, access_type
, mmu_idx
);
453 if (mode
== PRV_M
&& access_type
!= MMU_INST_FETCH
) {
454 if (get_field(env
->mstatus
, MSTATUS_MPRV
)) {
455 mode
= get_field(env
->mstatus
, MSTATUS_MPP
);
459 qemu_log_mask(CPU_LOG_MMU
,
460 "%s address=%" VADDR_PRIx
" ret %d physical " TARGET_FMT_plx
461 " prot %d\n", __func__
, address
, ret
, pa
, prot
);
463 if (riscv_feature(env
, RISCV_FEATURE_PMP
) &&
464 (ret
== TRANSLATE_SUCCESS
) &&
465 !pmp_hart_has_privs(env
, pa
, size
, 1 << access_type
, mode
)) {
466 ret
= TRANSLATE_PMP_FAIL
;
468 if (ret
== TRANSLATE_PMP_FAIL
) {
469 pmp_violation
= true;
471 if (ret
== TRANSLATE_SUCCESS
) {
472 tlb_set_page(cs
, address
& TARGET_PAGE_MASK
, pa
& TARGET_PAGE_MASK
,
473 prot
, mmu_idx
, TARGET_PAGE_SIZE
);
478 raise_mmu_exception(env
, address
, access_type
, pmp_violation
);
479 riscv_raise_exception(env
, cs
->exception_index
, retaddr
);
482 switch (access_type
) {
484 cs
->exception_index
= RISCV_EXCP_INST_PAGE_FAULT
;
487 cs
->exception_index
= RISCV_EXCP_LOAD_PAGE_FAULT
;
490 cs
->exception_index
= RISCV_EXCP_STORE_PAGE_FAULT
;
493 cpu_loop_exit_restore(cs
, retaddr
);
500 * Adapted from Spike's processor_t::take_trap.
503 void riscv_cpu_do_interrupt(CPUState
*cs
)
505 #if !defined(CONFIG_USER_ONLY)
507 RISCVCPU
*cpu
= RISCV_CPU(cs
);
508 CPURISCVState
*env
= &cpu
->env
;
510 /* cs->exception is 32-bits wide unlike mcause which is XLEN-bits wide
511 * so we mask off the MSB and separate into trap type and cause.
513 bool async
= !!(cs
->exception_index
& RISCV_EXCP_INT_FLAG
);
514 target_ulong cause
= cs
->exception_index
& RISCV_EXCP_INT_MASK
;
515 target_ulong deleg
= async
? env
->mideleg
: env
->medeleg
;
516 target_ulong tval
= 0;
518 static const int ecall_cause_map
[] = {
519 [PRV_U
] = RISCV_EXCP_U_ECALL
,
520 [PRV_S
] = RISCV_EXCP_S_ECALL
,
521 [PRV_H
] = RISCV_EXCP_H_ECALL
,
522 [PRV_M
] = RISCV_EXCP_M_ECALL
526 /* set tval to badaddr for traps with address information */
528 case RISCV_EXCP_INST_ADDR_MIS
:
529 case RISCV_EXCP_INST_ACCESS_FAULT
:
530 case RISCV_EXCP_LOAD_ADDR_MIS
:
531 case RISCV_EXCP_STORE_AMO_ADDR_MIS
:
532 case RISCV_EXCP_LOAD_ACCESS_FAULT
:
533 case RISCV_EXCP_STORE_AMO_ACCESS_FAULT
:
534 case RISCV_EXCP_INST_PAGE_FAULT
:
535 case RISCV_EXCP_LOAD_PAGE_FAULT
:
536 case RISCV_EXCP_STORE_PAGE_FAULT
:
542 /* ecall is dispatched as one cause so translate based on mode */
543 if (cause
== RISCV_EXCP_U_ECALL
) {
544 assert(env
->priv
<= 3);
545 cause
= ecall_cause_map
[env
->priv
];
549 trace_riscv_trap(env
->mhartid
, async
, cause
, env
->pc
, tval
, cause
< 16 ?
550 (async
? riscv_intr_names
: riscv_excp_names
)[cause
] : "(unknown)");
552 if (env
->priv
<= PRV_S
&&
553 cause
< TARGET_LONG_BITS
&& ((deleg
>> cause
) & 1)) {
554 /* handle the trap in S-mode */
555 target_ulong s
= env
->mstatus
;
556 s
= set_field(s
, MSTATUS_SPIE
, env
->priv_ver
>= PRIV_VERSION_1_10_0
?
557 get_field(s
, MSTATUS_SIE
) : get_field(s
, MSTATUS_UIE
<< env
->priv
));
558 s
= set_field(s
, MSTATUS_SPP
, env
->priv
);
559 s
= set_field(s
, MSTATUS_SIE
, 0);
561 env
->scause
= cause
| ((target_ulong
)async
<< (TARGET_LONG_BITS
- 1));
563 env
->sbadaddr
= tval
;
564 env
->pc
= (env
->stvec
>> 2 << 2) +
565 ((async
&& (env
->stvec
& 3) == 1) ? cause
* 4 : 0);
566 riscv_cpu_set_mode(env
, PRV_S
);
568 /* handle the trap in M-mode */
569 target_ulong s
= env
->mstatus
;
570 s
= set_field(s
, MSTATUS_MPIE
, env
->priv_ver
>= PRIV_VERSION_1_10_0
?
571 get_field(s
, MSTATUS_MIE
) : get_field(s
, MSTATUS_UIE
<< env
->priv
));
572 s
= set_field(s
, MSTATUS_MPP
, env
->priv
);
573 s
= set_field(s
, MSTATUS_MIE
, 0);
575 env
->mcause
= cause
| ~(((target_ulong
)-1) >> async
);
577 env
->mbadaddr
= tval
;
578 env
->pc
= (env
->mtvec
>> 2 << 2) +
579 ((async
&& (env
->mtvec
& 3) == 1) ? cause
* 4 : 0);
580 riscv_cpu_set_mode(env
, PRV_M
);
583 /* NOTE: it is not necessary to yield load reservations here. It is only
584 * necessary for an SC from "another hart" to cause a load reservation
585 * to be yielded. Refer to the memory consistency model section of the
586 * RISC-V ISA Specification.
590 cs
->exception_index
= EXCP_NONE
; /* mark handled to qemu */