|
|
@ -16,10 +16,10 @@ __attribute__((noreturn)) void exception_trigger(rv32_cpu_t* cpu, uint32_t scaus |
|
|
|
// Exceptions cannot be disabled
|
|
|
|
// Exceptions cannot be disabled
|
|
|
|
|
|
|
|
|
|
|
|
// Unset SIE (interrupt enable) bit
|
|
|
|
// Unset SIE (interrupt enable) bit
|
|
|
|
cpu->csr[CSR_SSTATUS] &= ~0b10U; |
|
|
|
csr_write(cpu, CSR_SSTATUS, csr_read(cpu, CSR_SSTATUS) & (~STATUS_SIE)); |
|
|
|
|
|
|
|
|
|
|
|
// Set xCAUSE : exception cause, with interrupt bit set to null
|
|
|
|
// Set xCAUSE : exception cause, with interrupt bit set to null
|
|
|
|
cpu->csr[CSR_SCAUSE] = scause; |
|
|
|
csr_write(cpu, CSR_SCAUSE, scause); |
|
|
|
if(gdbstub && scause == SCAUSE_BREAKPOINT) |
|
|
|
if(gdbstub && scause == SCAUSE_BREAKPOINT) |
|
|
|
{ |
|
|
|
{ |
|
|
|
cpu->sim_ticks_left = 0; |
|
|
|
cpu->sim_ticks_left = 0; |
|
|
@ -31,26 +31,28 @@ __attribute__((noreturn)) void exception_trigger(rv32_cpu_t* cpu, uint32_t scaus |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// Save previous interrupt enable in xSTATUS.xPIE
|
|
|
|
// Save previous interrupt enable in xSTATUS.xPIE
|
|
|
|
if(cpu->csr[CSR_SSTATUS] & 0b10U) |
|
|
|
if(csr_read(cpu, CSR_SSTATUS) & STATUS_SIE) |
|
|
|
cpu->csr[CSR_SSTATUS] |= 0x80; |
|
|
|
csr_write(cpu, CSR_SSTATUS, csr_read(cpu, CSR_SSTATUS) | STATUS_SPIE); |
|
|
|
|
|
|
|
else |
|
|
|
|
|
|
|
csr_write(cpu, CSR_SSTATUS, csr_read(cpu, CSR_SSTATUS) & (~STATUS_SPIE)); |
|
|
|
|
|
|
|
|
|
|
|
// Set previous privilege mode in xSTATUS.xPP
|
|
|
|
// Set previous privilege mode in xSTATUS.xPP
|
|
|
|
// TODO : Allow user mode exceptions (by not setting this)
|
|
|
|
// TODO : Allow user mode exceptions (by not setting this)
|
|
|
|
cpu->csr[CSR_SSTATUS] |= 0x100; |
|
|
|
csr_write(cpu, CSR_SSTATUS, csr_read(cpu, CSR_SSTATUS) | STATUS_SPP); |
|
|
|
|
|
|
|
|
|
|
|
// Set privilege mode for exception handling, checking for delegation
|
|
|
|
// Set privilege mode for exception handling, checking for delegation
|
|
|
|
// TODO
|
|
|
|
// TODO
|
|
|
|
|
|
|
|
|
|
|
|
// Set xTVAL, exception-specific information related to xCAUSE
|
|
|
|
// Set xTVAL, exception-specific information related to xCAUSE
|
|
|
|
cpu->csr[CSR_STVAL] = tval; |
|
|
|
csr_write(cpu, CSR_STVAL, tval); |
|
|
|
|
|
|
|
|
|
|
|
// Set SEPC to instruction that caused exception
|
|
|
|
// Set SEPC to instruction that caused exception
|
|
|
|
cpu->csr[CSR_SEPC] = cpu->pc; |
|
|
|
csr_write(cpu, CSR_SEPC, cpu->pc); |
|
|
|
|
|
|
|
|
|
|
|
// Set PC to xTVEC : exception handling code
|
|
|
|
// Set PC to xTVEC : exception handling code
|
|
|
|
// xTVEC: [Base(30bits) Mode(2 bits)], address 4-byte aligned in base
|
|
|
|
// xTVEC: [Base(30bits) Mode(2 bits)], address 4-byte aligned in base
|
|
|
|
// Exceptions are not vectored (we can safely ignore mode)
|
|
|
|
// Exceptions are not vectored (we can safely ignore mode)
|
|
|
|
cpu->pc = cpu->csr[CSR_STVEC] & 0xFFFFFFFC; |
|
|
|
cpu->pc = csr_read(cpu, CSR_STVEC) & 0xFFFFFFFC; |
|
|
|
|
|
|
|
|
|
|
|
// Unlock cpu mutex, cpu_loop will lock it just after
|
|
|
|
// Unlock cpu mutex, cpu_loop will lock it just after
|
|
|
|
pthread_mutex_unlock(&cpu->mutex); |
|
|
|
pthread_mutex_unlock(&cpu->mutex); |
|
|
|