Statistics
| Branch: | Revision:

root / target-ppc / helper.c @ 4b3686fa

History | View | Annotate | Download (26.6 kB)

1
/*
2
 *  PPC emulation helpers for qemu.
3
 * 
4
 *  Copyright (c) 2003 Jocelyn Mayer
5
 *
6
 * This library is free software; you can redistribute it and/or
7
 * modify it under the terms of the GNU Lesser General Public
8
 * License as published by the Free Software Foundation; either
9
 * version 2 of the License, or (at your option) any later version.
10
 *
11
 * This library is distributed in the hope that it will be useful,
12
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
 * Lesser General Public License for more details.
15
 *
16
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library; if not, write to the Free Software
18
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
19
 */
20
#include "exec.h"
21
#if defined (USE_OPEN_FIRMWARE)
22
#include <time.h>
23
#include "of.h"
24
#endif
25

    
26
//#define DEBUG_MMU
27
//#define DEBUG_BATS
28
//#define DEBUG_EXCEPTIONS
29

    
30
extern FILE *stdout, *stderr;
31

    
32
/*****************************************************************************/
33
/* PPC MMU emulation */
34
int cpu_ppc_handle_mmu_fault (CPUState *env, uint32_t address, int rw,
35
                              int is_user, int is_softmmu);
36

    
37
/* Perform BAT hit & translation */
38
static int get_bat (CPUState *env, uint32_t *real, int *prot,
39
                    uint32_t virtual, int rw, int type)
40
{
41
    uint32_t *BATlt, *BATut, *BATu, *BATl;
42
    uint32_t base, BEPIl, BEPIu, bl;
43
    int i;
44
    int ret = -1;
45

    
46
#if defined (DEBUG_BATS)
47
    if (loglevel > 0) {
48
        fprintf(logfile, "%s: %cBAT v 0x%08x\n", __func__,
49
               type == ACCESS_CODE ? 'I' : 'D', virtual);
50
    }
51
#endif
52
    switch (type) {
53
    case ACCESS_CODE:
54
        BATlt = env->IBAT[1];
55
        BATut = env->IBAT[0];
56
        break;
57
    default:
58
        BATlt = env->DBAT[1];
59
        BATut = env->DBAT[0];
60
        break;
61
    }
62
#if defined (DEBUG_BATS)
63
    if (loglevel > 0) {
64
        fprintf(logfile, "%s...: %cBAT v 0x%08x\n", __func__,
65
               type == ACCESS_CODE ? 'I' : 'D', virtual);
66
    }
67
#endif
68
    base = virtual & 0xFFFC0000;
69
    for (i = 0; i < 4; i++) {
70
        BATu = &BATut[i];
71
        BATl = &BATlt[i];
72
        BEPIu = *BATu & 0xF0000000;
73
        BEPIl = *BATu & 0x0FFE0000;
74
        bl = (*BATu & 0x00001FFC) << 15;
75
#if defined (DEBUG_BATS)
76
        if (loglevel > 0) {
77
            fprintf(logfile, "%s: %cBAT%d v 0x%08x BATu 0x%08x BATl 0x%08x\n",
78
                    __func__, type == ACCESS_CODE ? 'I' : 'D', i, virtual,
79
                    *BATu, *BATl);
80
        }
81
#endif
82
        if ((virtual & 0xF0000000) == BEPIu &&
83
            ((virtual & 0x0FFE0000) & ~bl) == BEPIl) {
84
            /* BAT matches */
85
            if ((msr_pr == 0 && (*BATu & 0x00000002)) ||
86
                (msr_pr == 1 && (*BATu & 0x00000001))) {
87
                /* Get physical address */
88
                *real = (*BATl & 0xF0000000) |
89
                    ((virtual & 0x0FFE0000 & bl) | (*BATl & 0x0FFE0000)) |
90
                    (virtual & 0x0001F000);
91
                if (*BATl & 0x00000001)
92
                    *prot = PAGE_READ;
93
                if (*BATl & 0x00000002)
94
                    *prot = PAGE_WRITE | PAGE_READ;
95
#if defined (DEBUG_BATS)
96
                if (loglevel > 0) {
97
                    fprintf(logfile, "BAT %d match: r 0x%08x prot=%c%c\n",
98
                            i, *real, *prot & PAGE_READ ? 'R' : '-',
99
                            *prot & PAGE_WRITE ? 'W' : '-');
100
                }
101
#endif
102
                ret = 0;
103
                break;
104
            }
105
        }
106
    }
107
    if (ret < 0) {
108
#if defined (DEBUG_BATS)
109
        printf("no BAT match for 0x%08x:\n", virtual);
110
        for (i = 0; i < 4; i++) {
111
            BATu = &BATut[i];
112
            BATl = &BATlt[i];
113
            BEPIu = *BATu & 0xF0000000;
114
            BEPIl = *BATu & 0x0FFE0000;
115
            bl = (*BATu & 0x00001FFC) << 15;
116
            printf("%s: %cBAT%d v 0x%08x BATu 0x%08x BATl 0x%08x \n\t"
117
                   "0x%08x 0x%08x 0x%08x\n",
118
                   __func__, type == ACCESS_CODE ? 'I' : 'D', i, virtual,
119
                   *BATu, *BATl, BEPIu, BEPIl, bl);
120
        }
121
#endif
122
    }
123
    /* No hit */
124
    return ret;
125
}
126

    
127
/* PTE table lookup */
128
static int find_pte (uint32_t *RPN, int *prot, uint32_t base, uint32_t va,
129
                     int h, int key, int rw)
130
{
131
    uint32_t pte0, pte1, keep = 0, access = 0;
132
    int i, good = -1, store = 0;
133
    int ret = -1; /* No entry found */
134

    
135
    for (i = 0; i < 8; i++) {
136
        pte0 = ldl_raw(phys_ram_base + base + (i * 8));
137
        pte1 =  ldl_raw(phys_ram_base + base + (i * 8) + 4);
138
#if defined (DEBUG_MMU)
139
        if (loglevel > 0) {
140
            fprintf(logfile, "Load pte from 0x%08x => 0x%08x 0x%08x "
141
                    "%d %d %d 0x%08x\n", base + (i * 8), pte0, pte1,
142
                    pte0 >> 31, h, (pte0 >> 6) & 1, va);
143
        }
144
#endif
145
        /* Check validity and table match */
146
        if (pte0 & 0x80000000 && (h == ((pte0 >> 6) & 1))) {
147
            /* Check vsid & api */
148
            if ((pte0 & 0x7FFFFFBF) == va) {
149
                if (good == -1) {
150
                    good = i;
151
                    keep = pte1;
152
                } else {
153
                    /* All matches should have equal RPN, WIMG & PP */
154
                    if ((keep & 0xFFFFF07B) != (pte1 & 0xFFFFF07B)) {
155
                        if (loglevel > 0)
156
                            fprintf(logfile, "Bad RPN/WIMG/PP\n");
157
                        return -1;
158
                    }
159
                }
160
                /* Check access rights */
161
                if (key == 0) {
162
                    access = PAGE_READ;
163
                    if ((pte1 & 0x00000003) != 0x3)
164
                        access |= PAGE_WRITE;
165
                } else {
166
                    switch (pte1 & 0x00000003) {
167
                    case 0x0:
168
                        access = 0;
169
                        break;
170
                    case 0x1:
171
                    case 0x3:
172
                        access = PAGE_READ;
173
                        break;
174
                    case 0x2:
175
                        access = PAGE_READ | PAGE_WRITE;
176
                        break;
177
                    }
178
                }
179
                if (ret < 0) {
180
                    if ((rw == 0 && (access & PAGE_READ)) ||
181
                        (rw == 1 && (access & PAGE_WRITE))) {
182
#if defined (DEBUG_MMU)
183
                        if (loglevel > 0)
184
                            fprintf(logfile, "PTE access granted !\n");
185
#endif
186
                    good = i;
187
                    keep = pte1;
188
                    ret = 0;
189
                    } else {
190
                        /* Access right violation */
191
                        ret = -2;
192
#if defined (DEBUG_MMU)
193
                        if (loglevel > 0)
194
                            fprintf(logfile, "PTE access rejected\n");
195
#endif
196
                }
197
                    *prot = access;
198
                }
199
            }
200
        }
201
    }
202
    if (good != -1) {
203
        *RPN = keep & 0xFFFFF000;
204
#if defined (DEBUG_MMU)
205
        if (loglevel > 0) {
206
            fprintf(logfile, "found PTE at addr 0x%08x prot=0x%01x ret=%d\n",
207
               *RPN, *prot, ret);
208
        }
209
#endif
210
        /* Update page flags */
211
        if (!(keep & 0x00000100)) {
212
            /* Access flag */
213
            keep |= 0x00000100;
214
            store = 1;
215
        }
216
            if (!(keep & 0x00000080)) {
217
            if (rw && ret == 0) {
218
                /* Change flag */
219
                keep |= 0x00000080;
220
                store = 1;
221
            } else {
222
                /* Force page fault for first write access */
223
                *prot &= ~PAGE_WRITE;
224
            }
225
        }
226
        if (store) {
227
            stl_raw(phys_ram_base + base + (good * 8) + 4, keep);
228
        }
229
    }
230

    
231
    return ret;
232
}
233

    
234
static inline uint32_t get_pgaddr (uint32_t sdr1, uint32_t hash, uint32_t mask)
235
{
236
    return (sdr1 & 0xFFFF0000) | (hash & mask);
237
}
238

    
239
/* Perform segment based translation */
240
static int get_segment (CPUState *env, uint32_t *real, int *prot,
241
                        uint32_t virtual, int rw, int type)
242
{
243
    uint32_t pg_addr, sdr, ptem, vsid, pgidx;
244
    uint32_t hash, mask;
245
    uint32_t sr;
246
    int key;
247
    int ret = -1, ret2;
248

    
249
    sr = env->sr[virtual >> 28];
250
#if defined (DEBUG_MMU)
251
    if (loglevel > 0) {
252
        fprintf(logfile, "Check segment v=0x%08x %d 0x%08x nip=0x%08x "
253
                "lr=0x%08x ir=%d dr=%d pr=%d %d t=%d\n",
254
                virtual, virtual >> 28, sr, env->nip,
255
                env->lr, msr_ir, msr_dr, msr_pr, rw, type);
256
    }
257
#endif
258
    key = (((sr & 0x20000000) && msr_pr == 1) ||
259
        ((sr & 0x40000000) && msr_pr == 0)) ? 1 : 0;
260
    if ((sr & 0x80000000) == 0) {
261
#if defined (DEBUG_MMU)
262
        if (loglevel > 0)
263
            fprintf(logfile, "pte segment: key=%d n=0x%08x\n",
264
                    key, sr & 0x10000000);
265
#endif
266
        /* Check if instruction fetch is allowed, if needed */
267
        if (type != ACCESS_CODE || (sr & 0x10000000) == 0) {
268
            /* Page address translation */
269
            vsid = sr & 0x00FFFFFF;
270
            pgidx = (virtual >> 12) & 0xFFFF;
271
            sdr = env->sdr1;
272
            hash = ((vsid ^ pgidx) & 0x0007FFFF) << 6;
273
            mask = ((sdr & 0x000001FF) << 16) | 0xFFC0;
274
            pg_addr = get_pgaddr(sdr, hash, mask);
275
            ptem = (vsid << 7) | (pgidx >> 10);
276
#if defined (DEBUG_MMU)
277
            if (loglevel > 0) {
278
                fprintf(logfile, "0 sdr1=0x%08x vsid=0x%06x api=0x%04x "
279
                        "hash=0x%07x pg_addr=0x%08x\n", sdr, vsid, pgidx, hash,
280
                        pg_addr);
281
            }
282
#endif
283
            /* Primary table lookup */
284
            ret = find_pte(real, prot, pg_addr, ptem, 0, key, rw);
285
            if (ret < 0) {
286
                /* Secondary table lookup */
287
                hash = (~hash) & 0x01FFFFC0;
288
                pg_addr = get_pgaddr(sdr, hash, mask);
289
#if defined (DEBUG_MMU)
290
                if (virtual != 0xEFFFFFFF && loglevel > 0) {
291
                    fprintf(logfile, "1 sdr1=0x%08x vsid=0x%06x api=0x%04x "
292
                            "hash=0x%05x pg_addr=0x%08x\n", sdr, vsid, pgidx,
293
                            hash, pg_addr);
294
                }
295
#endif
296
                ret2 = find_pte(real, prot, pg_addr, ptem, 1, key, rw);
297
                if (ret2 != -1)
298
                    ret = ret2;
299
            }
300
        } else {
301
#if defined (DEBUG_MMU)
302
            if (loglevel > 0)
303
                fprintf(logfile, "No access allowed\n");
304
#endif
305
            ret = -3;
306
        }
307
    } else {
308
#if defined (DEBUG_MMU)
309
        if (loglevel > 0)
310
            fprintf(logfile, "direct store...\n");
311
#endif
312
        /* Direct-store segment : absolutely *BUGGY* for now */
313
        switch (type) {
314
        case ACCESS_INT:
315
            /* Integer load/store : only access allowed */
316
            break;
317
        case ACCESS_CODE:
318
            /* No code fetch is allowed in direct-store areas */
319
            return -4;
320
        case ACCESS_FLOAT:
321
            /* Floating point load/store */
322
            return -4;
323
        case ACCESS_RES:
324
            /* lwarx, ldarx or srwcx. */
325
            return -4;
326
        case ACCESS_CACHE:
327
            /* dcba, dcbt, dcbtst, dcbf, dcbi, dcbst, dcbz, or icbi */
328
            /* Should make the instruction do no-op.
329
             * As it already do no-op, it's quite easy :-)
330
             */
331
            *real = virtual;
332
            return 0;
333
        case ACCESS_EXT:
334
            /* eciwx or ecowx */
335
            return -4;
336
        default:
337
            if (logfile) {
338
                fprintf(logfile, "ERROR: instruction should not need "
339
                        "address translation\n");
340
            }
341
            printf("ERROR: instruction should not need "
342
                   "address translation\n");
343
            return -4;
344
        }
345
        if ((rw == 1 || key != 1) && (rw == 0 || key != 0)) {
346
            *real = virtual;
347
            ret = 2;
348
        } else {
349
            ret = -2;
350
        }
351
    }
352

    
353
    return ret;
354
}
355

    
356
int get_physical_address (CPUState *env, uint32_t *physical, int *prot,
357
                          uint32_t address, int rw, int access_type)
358
{
359
    int ret;
360

    
361
    if (loglevel > 0) {
362
        fprintf(logfile, "%s\n", __func__);
363
    }
364
    
365
    if ((access_type == ACCESS_CODE && msr_ir == 0) ||
366
        (access_type != ACCESS_CODE && msr_dr == 0)) {
367
        /* No address translation */
368
        *physical = address & ~0xFFF;
369
        *prot = PAGE_READ | PAGE_WRITE;
370
        ret = 0;
371
    } else {
372
        /* Try to find a BAT */
373
        ret = get_bat(env, physical, prot, address, rw, access_type);
374
        if (ret < 0) {
375
            /* We didn't match any BAT entry */
376
            ret = get_segment(env, physical, prot, address, rw, access_type);
377
        }
378
    }
379
    if (loglevel > 0) {
380
        fprintf(logfile, "%s address %08x => %08x\n",
381
                __func__, address, *physical);
382
    }
383
    
384
    return ret;
385
}
386

    
387
#if defined(CONFIG_USER_ONLY) 
388
target_ulong cpu_get_phys_page_debug(CPUState *env, target_ulong addr)
389
{
390
    return addr;
391
}
392
#else
393
target_ulong cpu_get_phys_page_debug(CPUState *env, target_ulong addr)
394
{
395
    uint32_t phys_addr;
396
    int prot;
397

    
398
    if (get_physical_address(env, &phys_addr, &prot, addr, 0, ACCESS_INT) != 0)
399
        return -1;
400
    return phys_addr;
401
}
402
#endif
403

    
404
#if !defined(CONFIG_USER_ONLY) 
405

    
406
#define MMUSUFFIX _mmu
407
#define GETPC() (__builtin_return_address(0))
408

    
409
#define SHIFT 0
410
#include "softmmu_template.h"
411

    
412
#define SHIFT 1
413
#include "softmmu_template.h"
414

    
415
#define SHIFT 2
416
#include "softmmu_template.h"
417

    
418
#define SHIFT 3
419
#include "softmmu_template.h"
420

    
421
/* try to fill the TLB and return an exception if error. If retaddr is
422
   NULL, it means that the function was called in C code (i.e. not
423
   from generated code or from helper.c) */
424
/* XXX: fix it to restore all registers */
425
void tlb_fill(unsigned long addr, int is_write, int is_user, void *retaddr)
426
{
427
    TranslationBlock *tb;
428
    CPUState *saved_env;
429
    unsigned long pc;
430
    int ret;
431

    
432
    /* XXX: hack to restore env in all cases, even if not called from
433
       generated code */
434
    saved_env = env;
435
    env = cpu_single_env;
436
    {
437
        unsigned long tlb_addrr, tlb_addrw;
438
        int index;
439
        index = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
440
        tlb_addrr = env->tlb_read[is_user][index].address;
441
        tlb_addrw = env->tlb_write[is_user][index].address;
442
#if 1
443
        if (loglevel) {
444
            fprintf(logfile,
445
                    "%s 1 %p %p idx=%d addr=0x%08lx tbl_addr=0x%08lx 0x%08lx "
446
               "(0x%08lx 0x%08lx)\n", __func__, env,
447
               &env->tlb_read[is_user][index], index, addr,
448
               tlb_addrr, tlb_addrw, addr & TARGET_PAGE_MASK,
449
               tlb_addrr & (TARGET_PAGE_MASK | TLB_INVALID_MASK));
450
        }
451
#endif
452
    }
453
    ret = cpu_ppc_handle_mmu_fault(env, addr, is_write, is_user, 1);
454
    if (ret) {
455
        if (retaddr) {
456
            /* now we have a real cpu fault */
457
            pc = (unsigned long)retaddr;
458
            tb = tb_find_pc(pc);
459
            if (tb) {
460
                /* the PC is inside the translated code. It means that we have
461
                   a virtual CPU fault */
462
                cpu_restore_state(tb, env, pc, NULL);
463
            }
464
        }
465
        do_raise_exception_err(env->exception_index, env->error_code);
466
    }
467
    {
468
        unsigned long tlb_addrr, tlb_addrw;
469
        int index;
470
        index = (addr >> TARGET_PAGE_BITS) & (CPU_TLB_SIZE - 1);
471
        tlb_addrr = env->tlb_read[is_user][index].address;
472
        tlb_addrw = env->tlb_write[is_user][index].address;
473
#if 0
474
        printf("%s 2 %p %p idx=%d addr=0x%08lx tbl_addr=0x%08lx 0x%08lx "
475
               "(0x%08lx 0x%08lx)\n", __func__, env,
476
               &env->tlb_read[is_user][index], index, addr,
477
               tlb_addrr, tlb_addrw, addr & TARGET_PAGE_MASK,
478
               tlb_addrr & (TARGET_PAGE_MASK | TLB_INVALID_MASK));
479
#endif
480
    }
481
    env = saved_env;
482
}
483

    
484
void cpu_ppc_init_mmu(CPUState *env)
485
{
486
    /* Nothing to do: all translation are disabled */
487
}
488
#endif
489

    
490
/* Perform address translation */
491
int cpu_ppc_handle_mmu_fault (CPUState *env, uint32_t address, int rw,
492
                              int is_user, int is_softmmu)
493
{
494
    uint32_t physical;
495
    int prot;
496
    int exception = 0, error_code = 0;
497
    int access_type;
498
    int ret = 0;
499

    
500
//    printf("%s 0\n", __func__);
501
    access_type = env->access_type;
502
    if (env->user_mode_only) {
503
        /* user mode only emulation */
504
        ret = -2;
505
        goto do_fault;
506
    }
507
    /* NASTY BUG workaround */
508
    if (access_type == ACCESS_CODE && rw) {
509
        printf("%s: ERROR WRITE CODE ACCESS\n", __func__);
510
        access_type = ACCESS_INT;
511
    }
512
    ret = get_physical_address(env, &physical, &prot,
513
                               address, rw, access_type);
514
    if (ret == 0) {
515
        ret = tlb_set_page(env, address & ~0xFFF, physical, prot,
516
                           is_user, is_softmmu);
517
    } else if (ret < 0) {
518
    do_fault:
519
#if defined (DEBUG_MMU)
520
        if (loglevel > 0)
521
            cpu_ppc_dump_state(env, logfile, 0);
522
#endif
523
        if (access_type == ACCESS_CODE) {
524
            exception = EXCP_ISI;
525
            switch (ret) {
526
            case -1:
527
                /* No matches in page tables */
528
                error_code = EXCP_ISI_TRANSLATE;
529
                break;
530
            case -2:
531
                /* Access rights violation */
532
                error_code = EXCP_ISI_PROT;
533
                break;
534
            case -3:
535
                /* No execute protection violation */
536
                error_code = EXCP_ISI_NOEXEC;
537
                break;
538
            case -4:
539
                /* Direct store exception */
540
                /* No code fetch is allowed in direct-store areas */
541
                error_code = EXCP_ISI_DIRECT;
542
                break;
543
            }
544
        } else {
545
            exception = EXCP_DSI;
546
            switch (ret) {
547
            case -1:
548
                /* No matches in page tables */
549
                error_code = EXCP_DSI_TRANSLATE;
550
                break;
551
            case -2:
552
                /* Access rights violation */
553
                error_code = EXCP_DSI_PROT;
554
                break;
555
            case -4:
556
                /* Direct store exception */
557
                switch (access_type) {
558
                case ACCESS_FLOAT:
559
                    /* Floating point load/store */
560
                    exception = EXCP_ALIGN;
561
                    error_code = EXCP_ALIGN_FP;
562
                    break;
563
                case ACCESS_RES:
564
                    /* lwarx, ldarx or srwcx. */
565
                    exception = EXCP_DSI;
566
                    error_code = EXCP_DSI_NOTSUP | EXCP_DSI_DIRECT;
567
                    break;
568
                case ACCESS_EXT:
569
                    /* eciwx or ecowx */
570
                    exception = EXCP_DSI;
571
                    error_code = EXCP_DSI_NOTSUP | EXCP_DSI_DIRECT |
572
                        EXCP_DSI_ECXW;
573
                    break;
574
                default:
575
                    printf("DSI: invalid exception (%d)\n", ret);
576
                    exception = EXCP_PROGRAM;
577
                    error_code = EXCP_INVAL | EXCP_INVAL_INVAL;
578
                    break;
579
                }
580
            }
581
            if (rw)
582
                error_code |= EXCP_DSI_STORE;
583
            /* Store fault address */
584
            env->spr[DAR] = address;
585
        }
586
#if 0
587
        printf("%s: set exception to %d %02x\n",
588
               __func__, exception, error_code);
589
#endif
590
        env->exception_index = exception;
591
        env->error_code = error_code;
592
        ret = 1;
593
    }
594

    
595
    return ret;
596
}
597

    
598
uint32_t _load_xer (CPUState *env)
599
{
600
    return (xer_so << XER_SO) |
601
        (xer_ov << XER_OV) |
602
        (xer_ca << XER_CA) |
603
        (xer_bc << XER_BC);
604
}
605

    
606
void _store_xer (CPUState *env, uint32_t value)
607
{
608
    xer_so = (value >> XER_SO) & 0x01;
609
    xer_ov = (value >> XER_OV) & 0x01;
610
    xer_ca = (value >> XER_CA) & 0x01;
611
    xer_bc = (value >> XER_BC) & 0x1f;
612
}
613

    
614
uint32_t _load_msr (CPUState *env)
615
{
616
    return (msr_pow << MSR_POW) |
617
        (msr_ile << MSR_ILE) |
618
        (msr_ee << MSR_EE) |
619
        (msr_pr << MSR_PR) |
620
        (msr_fp << MSR_FP) |
621
        (msr_me << MSR_ME) |
622
        (msr_fe0 << MSR_FE0) |
623
        (msr_se << MSR_SE) |
624
        (msr_be << MSR_BE) |
625
        (msr_fe1 << MSR_FE1) |
626
        (msr_ip << MSR_IP) |
627
        (msr_ir << MSR_IR) |
628
        (msr_dr << MSR_DR) |
629
        (msr_ri << MSR_RI) |
630
        (msr_le << MSR_LE);
631
}
632

    
633
void _store_msr (CPUState *env, uint32_t value)
634
{
635
#if 0 // TRY
636
    if (((value >> MSR_IR) & 0x01) != msr_ir ||
637
        ((value >> MSR_DR) & 0x01) != msr_dr)
638
    {
639
        /* Flush all tlb when changing translation mode or privilege level */
640
        tlb_flush(env, 1);
641
    }
642
#endif
643
    msr_pow = (value >> MSR_POW) & 0x03;
644
    msr_ile = (value >> MSR_ILE) & 0x01;
645
    msr_ee = (value >> MSR_EE) & 0x01;
646
    msr_pr = (value >> MSR_PR) & 0x01;
647
    msr_fp = (value >> MSR_FP) & 0x01;
648
    msr_me = (value >> MSR_ME) & 0x01;
649
    msr_fe0 = (value >> MSR_FE0) & 0x01;
650
    msr_se = (value >> MSR_SE) & 0x01;
651
    msr_be = (value >> MSR_BE) & 0x01;
652
    msr_fe1 = (value >> MSR_FE1) & 0x01;
653
    msr_ip = (value >> MSR_IP) & 0x01;
654
    msr_ir = (value >> MSR_IR) & 0x01;
655
    msr_dr = (value >> MSR_DR) & 0x01;
656
    msr_ri = (value >> MSR_RI) & 0x01;
657
    msr_le = (value >> MSR_LE) & 0x01;
658
}
659

    
660
void do_interrupt (CPUState *env)
661
{
662
#if defined (CONFIG_USER_ONLY)
663
    env->exception_index |= 0x100;
664
#else
665
    uint32_t msr;
666
    int excp = env->exception_index;
667

    
668
    msr = _load_msr(env);
669
#if defined (DEBUG_EXCEPTIONS)
670
    if ((excp == EXCP_PROGRAM || excp == EXCP_DSI) && msr_pr == 1) 
671
    {
672
        if (loglevel > 0) {
673
            fprintf(logfile, "Raise exception at 0x%08x => 0x%08x (%02x)\n",
674
                    env->nip, excp << 8, env->error_code);
675
    }
676
        if (loglevel > 0)
677
            cpu_ppc_dump_state(env, logfile, 0);
678
    }
679
#endif
680
    /* Generate informations in save/restore registers */
681
    switch (excp) {
682
    case EXCP_OFCALL:
683
#if defined (USE_OPEN_FIRMWARE)
684
        env->gpr[3] = OF_client_entry((void *)env->gpr[3]);
685
#endif
686
        return;
687
    case EXCP_RTASCALL:
688
#if defined (USE_OPEN_FIRMWARE)
689
        printf("RTAS call !\n");
690
        env->gpr[3] = RTAS_entry((void *)env->gpr[3]);
691
        printf("RTAS call done\n");
692
#endif
693
        return;
694
    case EXCP_NONE:
695
        /* Do nothing */
696
#if defined (DEBUG_EXCEPTIONS)
697
        printf("%s: escape EXCP_NONE\n", __func__);
698
#endif
699
        return;
700
    case EXCP_RESET:
701
        if (msr_ip)
702
            excp += 0xFFC00;
703
        goto store_next;
704
    case EXCP_MACHINE_CHECK:
705
        if (msr_me == 0) {
706
            cpu_abort(env, "Machine check exception while not allowed\n");
707
        }
708
        msr_me = 0;
709
        break;
710
    case EXCP_DSI:
711
        /* Store exception cause */
712
        /* data location address has been stored
713
         * when the fault has been detected
714
     */
715
        msr &= ~0xFFFF0000;
716
        env->spr[DSISR] = 0;
717
        if (env->error_code &  EXCP_DSI_TRANSLATE)
718
            env->spr[DSISR] |= 0x40000000;
719
        else if (env->error_code & EXCP_DSI_PROT)
720
            env->spr[DSISR] |= 0x08000000;
721
        else if (env->error_code & EXCP_DSI_NOTSUP) {
722
            env->spr[DSISR] |= 0x80000000;
723
            if (env->error_code & EXCP_DSI_DIRECT)
724
                env->spr[DSISR] |= 0x04000000;
725
        }
726
        if (env->error_code & EXCP_DSI_STORE)
727
            env->spr[DSISR] |= 0x02000000;
728
        if ((env->error_code & 0xF) == EXCP_DSI_DABR)
729
            env->spr[DSISR] |= 0x00400000;
730
        if (env->error_code & EXCP_DSI_ECXW)
731
            env->spr[DSISR] |= 0x00100000;
732
#if defined (DEBUG_EXCEPTIONS)
733
        if (loglevel) {
734
            fprintf(logfile, "DSI exception: DSISR=0x%08x, DAR=0x%08x\n",
735
                    env->spr[DSISR], env->spr[DAR]);
736
        } else {
737
            printf("DSI exception: DSISR=0x%08x, DAR=0x%08x nip=0x%08x\n",
738
                   env->spr[DSISR], env->spr[DAR], env->nip);
739
        }
740
#endif
741
        goto store_next;
742
    case EXCP_ISI:
743
        /* Store exception cause */
744
        msr &= ~0xFFFF0000;
745
        if (env->error_code == EXCP_ISI_TRANSLATE)
746
            msr |= 0x40000000;
747
        else if (env->error_code == EXCP_ISI_NOEXEC ||
748
                 env->error_code == EXCP_ISI_GUARD ||
749
                 env->error_code == EXCP_ISI_DIRECT)
750
            msr |= 0x10000000;
751
        else
752
            msr |= 0x08000000;
753
#if defined (DEBUG_EXCEPTIONS)
754
        if (loglevel) {
755
            fprintf(logfile, "ISI exception: msr=0x%08x, nip=0x%08x\n",
756
                    msr, env->nip);
757
        } else {
758
            printf("ISI exception: msr=0x%08x, nip=0x%08x tbl:0x%08x\n",
759
                   msr, env->nip, env->spr[V_TBL]);
760
        }
761
#endif
762
        goto store_next;
763
    case EXCP_EXTERNAL:
764
        if (msr_ee == 0) {
765
#if defined (DEBUG_EXCEPTIONS)
766
            if (loglevel > 0) {
767
                fprintf(logfile, "Skipping hardware interrupt\n");
768
    }
769
#endif
770
            /* Requeue it */
771
            do_raise_exception(EXCP_EXTERNAL);
772
            return;
773
            }
774
        goto store_next;
775
    case EXCP_ALIGN:
776
        /* Store exception cause */
777
        /* Get rS/rD and rA from faulting opcode */
778
        env->spr[DSISR] |=
779
            (ldl_code((void *)(env->nip - 4)) & 0x03FF0000) >> 16;
780
        /* data location address has been stored
781
         * when the fault has been detected
782
         */
783
        goto store_current;
784
    case EXCP_PROGRAM:
785
        msr &= ~0xFFFF0000;
786
        switch (env->error_code & ~0xF) {
787
        case EXCP_FP:
788
            if (msr_fe0 == 0 && msr_fe1 == 0) {
789
#if defined (DEBUG_EXCEPTIONS)
790
                printf("Ignore floating point exception\n");
791
#endif
792
                return;
793
        }
794
            msr |= 0x00100000;
795
            /* Set FX */
796
            env->fpscr[7] |= 0x8;
797
            /* Finally, update FEX */
798
            if ((((env->fpscr[7] & 0x3) << 3) | (env->fpscr[6] >> 1)) &
799
                ((env->fpscr[1] << 1) | (env->fpscr[0] >> 3)))
800
                env->fpscr[7] |= 0x4;
801
        break;
802
        case EXCP_INVAL:
803
            //            printf("Invalid instruction at 0x%08x\n", env->nip);
804
            msr |= 0x00080000;
805
        break;
806
        case EXCP_PRIV:
807
            msr |= 0x00040000;
808
        break;
809
        case EXCP_TRAP:
810
            msr |= 0x00020000;
811
            break;
812
        default:
813
            /* Should never occur */
814
        break;
815
    }
816
        msr |= 0x00010000;
817
        goto store_current;
818
    case EXCP_NO_FP:
819
        goto store_current;
820
    case EXCP_DECR:
821
        if (msr_ee == 0) {
822
            /* Requeue it */
823
            do_raise_exception(EXCP_DECR);
824
            return;
825
        }
826
        goto store_next;
827
    case EXCP_SYSCALL:
828
#if defined (DEBUG_EXCEPTIONS)
829
        if (msr_pr) {
830
            if (loglevel) {
831
                fprintf(logfile, "syscall %d 0x%08x 0x%08x 0x%08x 0x%08x\n",
832
                        env->gpr[0], env->gpr[3], env->gpr[4],
833
                        env->gpr[5], env->gpr[6]);
834
            } else {
835
                printf("syscall %d from 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x\n",
836
                       env->gpr[0], env->nip, env->gpr[3], env->gpr[4],
837
                       env->gpr[5], env->gpr[6]);
838
            }
839
        }
840
#endif
841
        goto store_next;
842
    case EXCP_TRACE:
843
        goto store_next;
844
    case EXCP_FP_ASSIST:
845
        goto store_next;
846
    case EXCP_MTMSR:
847
        /* Nothing to do */
848
        return;
849
    case EXCP_BRANCH:
850
        /* Nothing to do */
851
        return;
852
    case EXCP_RFI:
853
        /* Restore user-mode state */
854
        tb_flush(env);
855
#if defined (DEBUG_EXCEPTIONS)
856
        if (msr_pr == 1)
857
            printf("Return from exception => 0x%08x\n", (uint32_t)env->nip);
858
#endif
859
        return;
860
    store_current:
861
        /* SRR0 is set to current instruction */
862
        env->spr[SRR0] = (uint32_t)env->nip - 4;
863
        break;
864
    store_next:
865
        /* SRR0 is set to next instruction */
866
        env->spr[SRR0] = (uint32_t)env->nip;
867
        break;
868
    }
869
    env->spr[SRR1] = msr;
870
    /* reload MSR with correct bits */
871
    msr_pow = 0;
872
    msr_ee = 0;
873
    msr_pr = 0;
874
    msr_fp = 0;
875
    msr_fe0 = 0;
876
    msr_se = 0;
877
    msr_be = 0;
878
    msr_fe1 = 0;
879
    msr_ir = 0;
880
    msr_dr = 0;
881
    msr_ri = 0;
882
    msr_le = msr_ile;
883
    /* Jump to handler */
884
    env->nip = excp << 8;
885
    env->exception_index = EXCP_NONE;
886
    /* Invalidate all TLB as we may have changed translation mode */
887
    tlb_flush(env, 1);
888
    /* ensure that no TB jump will be modified as
889
       the program flow was changed */
890
#ifdef __sparc__
891
    tmp_T0 = 0;
892
#else
893
    T0 = 0;
894
#endif
895
#endif
896
    env->exception_index = -1;
897
}