|
Re: [RISC-V] [tech-cmo] Proposed CMO TG Charter
+1
By
Guy Lemieux <guy.lemieux@...>
·
#372
·
|
|
Proposed CMO TG Charter
Hi all,
Andy and I would like to propose the following charter for the CMO TG for approval:
The Cache Maintenance Operation, or CMO, task group intends to define data cache maintenance operations for
Hi all,
Andy and I would like to propose the following charter for the CMO TG for approval:
The Cache Maintenance Operation, or CMO, task group intends to define data cache maintenance operations for
|
By
David Kruckemyer
·
#371
·
|
|
Re: HLVX and PMP
I'll leave the wording decision up to John Hauser.
I'll leave the wording decision up to John Hauser.
|
By
Andrew Waterman
·
#370
·
|
|
Re: HLVX and PMP
OK, that makes sense. I think that this minor change would be clearer (and I can make a PR if you agree):
"HLVX cannot override machine-level physical memory protection (PMP), so attempting to read
OK, that makes sense. I think that this minor change would be clearer (and I can make a PR if you agree):
"HLVX cannot override machine-level physical memory protection (PMP), so attempting to read
|
By
Paul Donahue
·
#369
·
|
|
Re: HLVX and PMP
It means what it says. Execute-only PMP regions (or PMA regions, for that matter) cause HLVX to raise an exception. This is consistent with how mstatus.MXR is defined. (The implication is that code
It means what it says. Execute-only PMP regions (or PMA regions, for that matter) cause HLVX to raise an exception. This is consistent with how mstatus.MXR is defined. (The implication is that code
|
By
Andrew Waterman
·
#368
·
|
|
HLVX and PMP
HLVX requires execute permission "during address translation" and explicitly requires PMP read access. Since PMP is not address translation, does HLVX require PMP execute permission in addition to
HLVX requires execute permission "during address translation" and explicitly requires PMP read access. Since PMP is not address translation, does HLVX require PMP execute permission in addition to
|
By
Paul Donahue
·
#367
·
|
|
Re: Extending the number of PMP entries
The 16-PMP scheme is the only ratified one. It's highly unlikely, but the CSRs allocated to the 64-PMP scheme might not ultimately be so purposed. The most conservative option is to stick to the
The 16-PMP scheme is the only ratified one. It's highly unlikely, but the CSRs allocated to the 64-PMP scheme might not ultimately be so purposed. The most conservative option is to stick to the
|
By
Andrew Waterman
·
#366
·
|
|
Re: Extending the number of PMP entries
Hello,
Sorry about reviving an old post but I would like to verify as I do not find this clear in the privileged draft.
If a decision is taken to implement exactly 16 PMP registers, should accesses to
Hello,
Sorry about reviving an old post but I would like to verify as I do not find this clear in the privileged draft.
If a decision is taken to implement exactly 16 PMP registers, should accesses to
|
By
Mario Achkar
·
#365
·
|
|
Re: G-stage address translation
Paul Donahue wrote:
It seems the algorithm in section 4.3.2 was edited since section 5.5.1
was written. I'm looking at updating section 5.5.1 to adapt to the
changes.
- John H.
Paul Donahue wrote:
It seems the algorithm in section 4.3.2 was edited since section 5.5.1
was written. I'm looking at updating section 5.5.1 to adapt to the
changes.
- John H.
|
By
John Hauser
·
#364
·
|
|
G-stage address translation
I think that there are a few problems in section 5.5.1 of the hypervisor spec. It says that G-stage translation follows the same algorithm as section 4.3.2 with a few changes. However:
1. the first
I think that there are a few problems in section 5.5.1 of the hypervisor spec. It says that G-stage translation follows the same algorithm as section 4.3.2 with a few changes. However:
1. the first
|
By
Paul Donahue
·
#363
·
|
|
Re: Proposal: Delegating Exceptions from VS-mode or VU-mode to U-mode
Hi Yifei,
Both full emulated I/O devices (e.g. UART, RTC, PCIe devices, etc) and paravirtual I/O devices (e.g. VirtIO devices, XenPV devices etc) have MMIO registers which are trap-n-emulated by
Hi Yifei,
Both full emulated I/O devices (e.g. UART, RTC, PCIe devices, etc) and paravirtual I/O devices (e.g. VirtIO devices, XenPV devices etc) have MMIO registers which are trap-n-emulated by
|
By
Anup Patel
·
#362
·
|
|
Re: Proposal: Accelerating Handling User-level Interrupts
i remember using DEC VAX ancillary control processes and writing knob and trackball device drivers in user land in the early 80s. I tried to find something describing this but I think it is lost to
i remember using DEC VAX ancillary control processes and writing knob and trackball device drivers in user land in the early 80s. I tried to find something describing this but I think it is lost to
|
By
mark
·
#361
·
|
|
Re: Proposal: Delegating Exceptions from VS-mode or VU-mode to U-mode
Hi Anup,
Sorry for the confusing description of the background in this proposal. To be clear, we here divide the implementation of trap-and-emulated I/O devices into full emulated I/O devices and
Hi Anup,
Sorry for the confusing description of the background in this proposal. To be clear, we here divide the implementation of trap-and-emulated I/O devices into full emulated I/O devices and
|
By
Yifei Jiang
·
#360
·
|
|
Re: Proposal: Delegating Exceptions from VS-mode or VU-mode to U-mode
Hi John,
Yes, we believe that the new interrupt architecture and an IOMMU, which is regarded as a pass-through method as we knew, can indeed minimize the number of times of GuestOS exiting. However,
Hi John,
Yes, we believe that the new interrupt architecture and an IOMMU, which is regarded as a pass-through method as we knew, can indeed minimize the number of times of GuestOS exiting. However,
|
By
Yifei Jiang
·
#359
·
|
|
Re: Proposal: Delegating Exceptions from VS-mode or VU-mode to U-mode
Hi,
Thanks for your comment.
To solve the security problem about the URET instruction, we further add a field, called HUR, in hstatus to control the behavior of URET instruction. When the
Hi,
Thanks for your comment.
To solve the security problem about the URET instruction, we further add a field, called HUR, in hstatus to control the behavior of URET instruction. When the
|
By
Yifei Jiang
·
#358
·
|
|
Re: Disabling and re-enabling extensions
I was arguing something different.
If an extension can be disabled (and is)-
what happens when you execute a disabled instruction? Trap or unspecified?
Not all extensions are instruction related, of
I was arguing something different.
If an extension can be disabled (and is)-
what happens when you execute a disabled instruction? Trap or unspecified?
Not all extensions are instruction related, of
|
By
Allen Baum
·
#357
·
|
|
Re: Disabling and re-enabling extensions
Errr... disregard that second part, I misread the previous email
Errr... disregard that second part, I misread the previous email
|
By
Jonathan Behrens <behrensj@...>
·
#356
·
|
|
Re: Disabling and re-enabling extensions
Perhaps “all state no longer associated with any active extension is UNSPECIFIED”?
But it also might be slightly cleaner to talk about the state being unspecified right after an extension is
Perhaps “all state no longer associated with any active extension is UNSPECIFIED”?
But it also might be slightly cleaner to talk about the state being unspecified right after an extension is
|
By
Jonathan Behrens <behrensj@...>
·
#355
·
|
|
Re: Disabling and re-enabling extensions
OK by me. PR is here: https://github.com/riscv/riscv-isa-manual/pull/585
OK by me. PR is here: https://github.com/riscv/riscv-isa-manual/pull/585
|
By
Andrew Waterman
·
#354
·
|
|
Re: Disabling and re-enabling extensions
Given the comments excerpted down below that argue for specifying that extension state is UNSPECIFIED after being disabled and then re-enabled, and given that no particular arguments or use cases have
Given the comments excerpted down below that argue for specifying that extension state is UNSPECIFIED after being disabled and then re-enabled, and given that no particular arguments or use cases have
|
By
Greg Favor
·
#353
·
|