/[gxemul]/trunk/src/cpus/memory_ppc.c
This is repository of my old source code which isn't updated any more. Go to git.rot13.org for current projects!
ViewVC logotype

Contents of /trunk/src/cpus/memory_ppc.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 59 - (show annotations)
Fri Oct 12 16:26:40 2007 UTC (16 years, 6 months ago) by dpavlin
File MIME type: text/plain
File size: 8230 byte(s)
exit on memory_ppc exception
1 /*
2 * Copyright (C) 2005-2007 Anders Gavare. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 * 3. The name of the author may not be used to endorse or promote products
13 * derived from this software without specific prior written permission.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25 * SUCH DAMAGE.
26 *
27 *
28 * $Id: memory_ppc.c,v 1.27 2006/12/30 13:30:56 debug Exp $
29 *
30 * Included from cpu_ppc.c.
31 */
32
33
34 #include "ppc_bat.h"
35 #include "ppc_pte.h"
36
37
38 /*
39 * ppc_bat():
40 *
41 * BAT translation. Returns -1 if there was no BAT hit, >= 0 for a hit.
42 * (0 for access denied, 1 for read-only, and 2 for read-write access allowed.)
43 */
44 int ppc_bat(struct cpu *cpu, uint64_t vaddr, uint64_t *return_paddr, int flags,
45 int user)
46 {
47 int i, istart = 0, iend = 8, pp;
48
49 if (flags & FLAG_INSTR)
50 iend = 4;
51 else
52 istart = 4;
53
54 if (cpu->cd.ppc.bits != 32) {
55 fatal("TODO: ppc_bat() for non-32-bit\n");
56 exit(1);
57 }
58 if (cpu->cd.ppc.cpu_type.flags & PPC_601) {
59 fatal("TODO: ppc_bat() for PPC 601\n");
60 exit(1);
61 }
62
63 /* Scan either the 4 instruction BATs or the 4 data BATs: */
64 for (i=istart; i<iend; i++) {
65 int regnr = SPR_IBAT0U + i * 2;
66 uint32_t upper = cpu->cd.ppc.spr[regnr];
67 uint32_t lower = cpu->cd.ppc.spr[regnr + 1];
68 uint32_t phys = lower & BAT_RPN, ebs = upper & BAT_EPI;
69 uint32_t mask = ((upper & BAT_BL) << 15) | 0x1ffff;
70
71 /* Not valid in either supervisor or user mode? */
72 if (user && !(upper & BAT_Vu))
73 continue;
74 if (!user && !(upper & BAT_Vs))
75 continue;
76
77 /* Virtual address mismatch? Then skip. */
78 if ((vaddr & ~mask) != (ebs & ~mask))
79 continue;
80
81 *return_paddr = (vaddr & mask) | (phys & ~mask);
82
83 pp = lower & BAT_PP;
84 switch (pp) {
85 case BAT_PP_NONE:
86 return 0;
87 case BAT_PP_RO_S:
88 case BAT_PP_RO:
89 return (flags & FLAG_WRITEFLAG)? 0 : 1;
90 default:/* BAT_PP_RW: */
91 return 2;
92 }
93 }
94
95 return -1;
96 }
97
98
99 /*
100 * get_pte_low():
101 *
102 * Scan a PTE group for a cmp (compare) value.
103 *
104 * Returns 1 if the value was found, and *lowp is set to the low PTE word.
105 * Returns 0 if no match was found.
106 */
107 static int get_pte_low(struct cpu *cpu, uint64_t pteg_select,
108 uint32_t *lowp, uint32_t cmp)
109 {
110 unsigned char *d = memory_paddr_to_hostaddr(cpu->mem, pteg_select, 1);
111 int i;
112
113 for (i=0; i<8; i++) {
114 uint32_t *ep = (uint32_t *) (d + (i << 3)), upper;
115 upper = *ep;
116 upper = BE32_TO_HOST(upper);
117
118 /* Valid PTE, and correct api and vsid? */
119 if (upper == cmp) {
120 uint32_t lo = ep[1];
121 lo = BE32_TO_HOST(lo);
122 *lowp = lo;
123 return 1;
124 }
125 }
126
127 return 0;
128 }
129
130
131 /*
132 * ppc_vtp32():
133 *
134 * Virtual to physical address translation (32-bit mode).
135 *
136 * Returns 1 if a translation was found, 0 if none was found. However, finding
137 * a translation does not mean that it should be returned; there can be
138 * a permission violation. *resp is set to 0 for no access, 1 for read-only
139 * access, or 2 for read/write access.
140 */
141 static int ppc_vtp32(struct cpu *cpu, uint32_t vaddr, uint64_t *return_paddr,
142 int *resp, uint64_t msr, int writeflag, int instr)
143 {
144 int srn = (vaddr >> 28) & 15, api = (vaddr >> 22) & PTE_API;
145 int access, key, match;
146 uint32_t vsid = cpu->cd.ppc.sr[srn] & 0x00ffffff;
147 uint64_t sdr1 = cpu->cd.ppc.spr[SPR_SDR1], htaborg;
148 uint32_t hash1, hash2, pteg_select, tmp;
149 uint32_t lower_pte = 0, cmp;
150
151 htaborg = sdr1 & 0xffff0000UL;
152
153 /* Primary hash: */
154 hash1 = (vsid & 0x7ffff) ^ ((vaddr >> 12) & 0xffff);
155 tmp = (hash1 >> 10) & (sdr1 & 0x1ff);
156 pteg_select = htaborg & 0xfe000000;
157 pteg_select |= ((hash1 & 0x3ff) << 6);
158 pteg_select |= (htaborg & 0x01ff0000) | (tmp << 16);
159 cpu->cd.ppc.spr[SPR_HASH1] = pteg_select;
160 cmp = cpu->cd.ppc.spr[instr? SPR_ICMP : SPR_DCMP] =
161 PTE_VALID | api | (vsid << PTE_VSID_SHFT);
162 match = get_pte_low(cpu, pteg_select, &lower_pte, cmp);
163
164 /* Secondary hash: */
165 hash2 = hash1 ^ 0x7ffff;
166 tmp = (hash2 >> 10) & (sdr1 & 0x1ff);
167 pteg_select = htaborg & 0xfe000000;
168 pteg_select |= ((hash2 & 0x3ff) << 6);
169 pteg_select |= (htaborg & 0x01ff0000) | (tmp << 16);
170 cpu->cd.ppc.spr[SPR_HASH2] = pteg_select;
171 if (!match) {
172 cmp |= PTE_HID;
173 match = get_pte_low(cpu, pteg_select, &lower_pte, cmp);
174 }
175
176 *resp = 0;
177
178 if (!match)
179 return 0;
180
181 /* Non-executable, or Guarded page? */
182 if (instr && cpu->cd.ppc.sr[srn] & SR_NOEXEC)
183 return 1;
184 if (instr && lower_pte & PTE_G)
185 return 1;
186
187 access = lower_pte & PTE_PP;
188 *return_paddr = (lower_pte & PTE_RPGN) | (vaddr & ~PTE_RPGN);
189
190 key = (cpu->cd.ppc.sr[srn] & SR_PRKEY && msr & PPC_MSR_PR) ||
191 (cpu->cd.ppc.sr[srn] & SR_SUKEY && !(msr & PPC_MSR_PR));
192
193 if (key) {
194 switch (access) {
195 case 1:
196 case 3: *resp = writeflag? 0 : 1;
197 break;
198 case 2: *resp = 2;
199 break;
200 }
201 } else {
202 switch (access) {
203 case 3: *resp = writeflag? 0 : 1;
204 break;
205 default:*resp = 2;
206 }
207 }
208
209 return 1;
210 }
211
212
213 /*
214 * ppc_translate_v2p():
215 *
216 * Don't call this function if userland_emul is non-NULL, or cpu is NULL.
217 *
218 * Return values:
219 * 0 Failure
220 * 1 Success, the page is readable only
221 * 2 Success, the page is read/write
222 */
223 int ppc_translate_v2p(struct cpu *cpu, uint64_t vaddr,
224 uint64_t *return_paddr, int flags)
225 {
226 int instr = flags & FLAG_INSTR, res = 0, match, user;
227 int writeflag = flags & FLAG_WRITEFLAG? 1 : 0;
228 uint64_t msr;
229
230 reg_access_msr(cpu, &msr, 0, 0);
231 user = msr & PPC_MSR_PR? 1 : 0;
232
233 if (cpu->cd.ppc.bits == 32)
234 vaddr &= 0xffffffff;
235
236 if ((instr && !(msr & PPC_MSR_IR)) || (!instr && !(msr & PPC_MSR_DR))) {
237 *return_paddr = vaddr;
238 return 2;
239 }
240
241 if (cpu->cd.ppc.cpu_type.flags & PPC_601) {
242 fatal("ppc_translate_v2p(): TODO: 601\n");
243 exit(1);
244 }
245
246 /* Try the BATs first: */
247 if (cpu->cd.ppc.bits == 32) {
248 res = ppc_bat(cpu, vaddr, return_paddr, flags, user);
249 if (res > 0)
250 return res;
251 if (res == 0) {
252 fatal("[ TODO: BAT exception ]\n");
253 exit(1);
254 }
255 }
256
257 /* Virtual to physical translation: */
258 if (cpu->cd.ppc.bits == 32) {
259 match = ppc_vtp32(cpu, vaddr, return_paddr, &res, msr,
260 writeflag, instr);
261 if (match && res > 0)
262 return res;
263 } else {
264 /* htaborg = sdr1 & 0xfffffffffffc0000ULL; */
265 fatal("TODO: ppc 64-bit translation\n");
266 exit(1);
267 }
268
269
270 /*
271 * No match? Then cause an exception.
272 *
273 * PPC603: cause a software TLB reload exception.
274 * All others: cause a DSI or ISI.
275 */
276
277 if (flags & FLAG_NOEXCEPTIONS)
278 return 0;
279
280 if (!quiet_mode)
281 fatal("[ memory_ppc: exception! vaddr=0x%"PRIx64" pc=0x%"PRIx64
282 " instr=%i user=%i wf=%i ]\n", (uint64_t) vaddr,
283 (uint64_t) cpu->pc, instr, user, writeflag);
284 exit(1);
285
286 if (cpu->cd.ppc.cpu_type.flags & PPC_603) {
287 cpu->cd.ppc.spr[instr? SPR_IMISS : SPR_DMISS] = vaddr;
288
289 msr |= PPC_MSR_TGPR;
290 reg_access_msr(cpu, &msr, 1, 0);
291
292 ppc_exception(cpu, instr? 0x10 : (writeflag? 0x12 : 0x11));
293 } else {
294 if (!instr) {
295 cpu->cd.ppc.spr[SPR_DAR] = vaddr;
296 cpu->cd.ppc.spr[SPR_DSISR] = match?
297 DSISR_PROTECT : DSISR_NOTFOUND;
298 if (writeflag)
299 cpu->cd.ppc.spr[SPR_DSISR] |= DSISR_STORE;
300 }
301 ppc_exception(cpu, instr?
302 PPC_EXCEPTION_ISI : PPC_EXCEPTION_DSI);
303 }
304
305 return 0;
306 }
307

  ViewVC Help
Powered by ViewVC 1.1.26