Home
last modified time | relevance | path

Searched refs:opcode (Results 1 – 14 of 14) sorted by relevance

/Renode-v1.15.3-c57714d/src/Plugins/CoSimulationPlugin/CoSimulated/Peripherals/
DCoSimulatedCFU.cs227 …stallCustomInstruction(pattern: opcodePattern, handler: opcode => HandleCustomInstruction(opcode)); in RegisterCFU()
231 private void HandleCustomInstruction(ulong opcode) in HandleCustomInstruction() argument
233 int rD = (int)BitHelper.GetValue(opcode, 7, 5); in HandleCustomInstruction()
234 int rs1 = (int)BitHelper.GetValue(opcode, 15, 5); in HandleCustomInstruction()
236 int rs2 = (int)BitHelper.GetValue(opcode, 20, 5); in HandleCustomInstruction()
238 UInt32 funct3 = Convert.ToUInt32(BitHelper.GetValue(opcode, 12, 3)); in HandleCustomInstruction()
239 UInt32 funct7 = Convert.ToUInt32(BitHelper.GetValue(opcode, 25, 7)); in HandleCustomInstruction()
253 …s.Log(LogLevel.Error, "CFU custom instruction error, opcode: 0x{0:x}, error: {1}", opcode, status); in HandleCustomInstruction()
256 … this.Log(LogLevel.Error, "CFU operation timeout, opcode: 0x{0:x}, error: {1}", opcode, status); in HandleCustomInstruction()
259 … this.Log(LogLevel.Error, "CFU unknown error, opcode: 0x{0:x}, error: {1}", opcode, status); in HandleCustomInstruction()
/Renode-v1.15.3-c57714d/tools/execution_tracer/execution_tracer/
Dexecution_tracer_reader.py167 opcode = self.file.read(opcode_length)
168 if len(opcode) != opcode_length:
171 opcode = b""
184 return (pc, opcode, additional_data, self.thumb_mode)
210 (pc, opcode, additional_data, thumb_mode) = entry
214 opcode_str = bytes_to_hex(opcode)
227 _, instruction = disas.get_instruction(opcode)
266 def get_instruction(self, opcode): argument
267 opcode_buf = cast(c_char_p(opcode), POINTER(c_ubyte))
270 …self.lib.llvm_disasm_instruction(self._context, opcode_buf, c_uint64(len(opcode)), disas_str, 1024)
/Renode-v1.15.3-c57714d/tools/tlib_helper/
Dgdbscript.py342 opcode = read_guest_bytes(ptr, 4)
344 result, op_len = disas.disassemble(opcode)
345 opcode = opcode[:op_len]
347 return int.from_bytes(opcode, 'little'), result
355 opcode, instr = disassemble_instruction(guest_pc)
356 if opcode is None:
359 return guest_pc, opcode, instr
505 guest_pc, opcode, instruction = get_current_instruction()
517 if opcode is None:
/Renode-v1.15.3-c57714d/tools/guest_cache/src/
Drenode_cache_interface.py65 pc, opcode = (int(value.strip(), 16) for value in line.split(":"))
66 if opcode in self.invalidation_opcodes:
67 cache_type = self.invalidation_opcodes[opcode]
/Renode-v1.15.3-c57714d/tests/unit-tests/
Dpmp.robot18 [Arguments] ${adress} ${opcode}
19 Execute Command sysbus WriteDoubleWord ${adress} ${opcode}
Dpage-access-via-io.robot37 [Arguments] ${dest} ${opcode}
38 Execute Command sysbus WriteWord ${dest} ${opcode}
Darm-atomic.robot8 [Arguments] ${address} ${opcode}
9 Execute Command sysbus WriteDoubleWord ${address} ${opcode}
Driscv-interrupt-mode.robot32 ${opcode}= Get From Dictionary ${mtvec_write_opcodes} ${value}
33 Execute Command sysbus WriteDoubleWord 0x0 ${opcode}
44 ${opcode}= Get From Dictionary ${stvec_write_opcodes} ${value}
45 Execute Command sysbus WriteDoubleWord 0x0 ${opcode}
Drobot-integration.robot74 # 0x0 opcode is NOP in A32 so everything's fine as long as PC doesn't leave `mem`.
Dexecution-tracing.robot154 … # [0:4]: pc; [4]: opcode_length; [5:9]: opcode; [10]: additional_data_type = None
157 … # [0:4]: pc; [4]: opcode_length; [5:9]: opcode; [10]: additional_data_type = MemoryAccess
535 … # [0:4]: pc; [4]: opcode_length; [5:9]: opcode; [10]: additional_data_type = None
537 … # [0:4]: pc; [4]: opcode_length; [5:7]: opcode; [8]: additional_data_type = None
539 … # [0:4]: pc; [4]: opcode_length; [5:9]: opcode; [10]: additional_data_type = VectorConfiguration
Driscv-unit-tests.robot37 [Arguments] ${adress} ${opcode}
38 Execute Command sysbus WriteDoubleWord ${adress} ${opcode}
Dllvm-asm-disasm.robot222 # HEX_CODE the opcode to disassemble; don't prefix with "0x"
225 …struction, verified with the disassembler output but not influencing the opcode itself; don't pref…
Driscv-amocas.robot89 # MTVAL should be the opcode that caused the fault.
/Renode-v1.15.3-c57714d/tests/platforms/
DARMv8R.robot355 [Arguments] ${address} ${opcode}
356 Execute Command sysbus WriteDoubleWord ${address} ${opcode}
485 ${opcode}= Set Variable 0xE1200070
487 ${opcode}= Set Variable 0xEF000000
489 ${opcode}= Set Variable 0xE1400070
497 Write Opcode To Address 0x8008 ${opcode} # instruction #0