|
Re: Fast-track "stimecmp / vstimecmp" extension proposal
Hi,
Was any consideration given to the possibility of defining stimecmp as a memory-mapped register (like mtimecmp) rather than a CSR?
Assuming that the timer will actually be implemented in a block
Hi,
Was any consideration given to the possibility of defining stimecmp as a memory-mapped register (like mtimecmp) rather than a CSR?
Assuming that the timer will actually be implemented in a block
|
By
Phil McCoy
·
#858
·
|
|
Re: When Physical Address Size < XLEN, should address check be performed on unused upper address bits?
Greg,
Thanks. That’s great explanation.
RR
Greg,
Thanks. That’s great explanation.
RR
|
By
Ricardo Ramirez
·
#857
·
|
|
Re: When Physical Address Size < XLEN, should address check be performed on unused upper address bits?
Actually, I realize that I was imprecise and probably flat out misleading. Address calculations (e.g. by load/store instructions) are performed to full XLEN size, producing a full XLEN-wide value
Actually, I realize that I was imprecise and probably flat out misleading. Address calculations (e.g. by load/store instructions) are performed to full XLEN size, producing a full XLEN-wide value
|
By
Greg Favor
·
#856
·
|
|
Re: When Physical Address Size < XLEN, should address check be performed on unused upper address bits?
Thanks for the response, Greg.
To make sure I understand, are you saying that when in M-mode/Bare-mode, addresses generated by s/w should be zero-extended from their implemented PA size up to
Thanks for the response, Greg.
To make sure I understand, are you saying that when in M-mode/Bare-mode, addresses generated by s/w should be zero-extended from their implemented PA size up to
|
By
Ricardo Ramirez
·
#855
·
|
|
Re: When Physical Address Size < XLEN, should address check be performed on unused upper address bits?
Architecturally addresses are always XLEN in size. PA's are unsigned values and are zero-extended from their implemented size up to XLEN size. Those extra bits may not physically exist, but they do
Architecturally addresses are always XLEN in size. PA's are unsigned values and are zero-extended from their implemented size up to XLEN size. Those extra bits may not physically exist, but they do
|
By
Greg Favor
·
#854
·
|
|
When Physical Address Size < XLEN, should address check be performed on unused upper address bits?
In RISC-V, instruction fetch addresses and load and store effective addresses are XLEN bits wide; however, an implementation can have a smaller physical address size.
When a core is in M-mode or Bare
In RISC-V, instruction fetch addresses and load and store effective addresses are XLEN bits wide; however, an implementation can have a smaller physical address size.
When a core is in M-mode or Bare
|
By
Ricardo Ramirez
·
#853
·
|
|
Re: Why must misa.H be writable (RVA22)?
I think the fact that the current platform spec draft lacks any way for S-mode to toggle misa.H, for S-mode to request a specific value, or even a way for configuring M-mode to set/unset misa.H at
I think the fact that the current platform spec draft lacks any way for S-mode to toggle misa.H, for S-mode to request a specific value, or even a way for configuring M-mode to set/unset misa.H at
|
By
Jonathan Behrens <behrensj@...>
·
#852
·
|
|
Re: Why must misa.H be writable (RVA22)?
Without a doubt, there’s value in building machines that can faithfully emulate less-capable machines. With that in mind, writable misa.H is a well architected feature. Whether it rises to the level
Without a doubt, there’s value in building machines that can faithfully emulate less-capable machines. With that in mind, writable misa.H is a well architected feature. Whether it rises to the level
|
By
andrew@...
·
#851
·
|
|
Re: Why must misa.H be writable (RVA22)?
Disabling FP and Vector units (or any extension that adds a lot of user-privileged stage) can be useful for lazy context switching, but that should be done via mstatus.FS/XS rather than misa bits.
Disabling FP and Vector units (or any extension that adds a lot of user-privileged stage) can be useful for lazy context switching, but that should be done via mstatus.FS/XS rather than misa bits.
|
By
Phil McCoy
·
#850
·
|
|
Re: Why must misa.H be writable (RVA22)?
I don't disagree. Which begs the question of whether there should be any encouragement or expectation that any implementations (barring inevitable exception cases) of misa should have writable bits.
I don't disagree. Which begs the question of whether there should be any encouragement or expectation that any implementations (barring inevitable exception cases) of misa should have writable bits.
|
By
Greg Favor
·
#849
·
|
|
Re: Why must misa.H be writable (RVA22)?
Thanks Andrew and Gregg. I'll ask the question on unixplatformspec.
Cheers,
Phil
Thanks Andrew and Gregg. I'll ask the question on unixplatformspec.
Cheers,
Phil
|
By
Phil McCoy
·
#848
·
|
|
Re: Why must misa.H be writable (RVA22)?
My own (possibly unpopular) take is that implementing writable misa.H is a mess, and the benefits don’t come close to justifying the effort.
My own (possibly unpopular) take is that implementing writable misa.H is a mess, and the benefits don’t come close to justifying the effort.
|
By
andrew@...
·
#847
·
|
|
Re: Why must misa.H be writable (RVA22)?
Phil,
Yes, this would be a good question for the platforms (not profiles) group to discuss . I'll go ahead and raise it to the group. The H extension does explicitly "encourage" implementations to
Phil,
Yes, this would be a good question for the platforms (not profiles) group to discuss . I'll go ahead and raise it to the group. The H extension does explicitly "encourage" implementations to
|
By
Greg Favor
·
#846
·
|
|
Re: Why must misa.H be writable (RVA22)?
I recommend visiting the tech-unixplatformspec mailing list. The profile and platform specs are far from being frozen, and so your input may well be impactful.
I recommend visiting the tech-unixplatformspec mailing list. The profile and platform specs are far from being frozen, and so your input may well be impactful.
|
By
andrew@...
·
#845
·
|
|
Why must misa.H be writable (RVA22)?
Hi,
Does anyone know why the RV22A profile draft (https://github.com/riscv/riscv-platform-specs/blob/main/riscv-platform-spec.adoc) mandates the following:
misa
If the H extension is supported
Hi,
Does anyone know why the RV22A profile draft (https://github.com/riscv/riscv-platform-specs/blob/main/riscv-platform-spec.adoc) mandates the following:
misa
If the H extension is supported
|
By
Phil McCoy
·
#844
·
|
|
Re: Behavior of scounteren/hcounteren
Paul Donahue wrote:
You have the effect of "HS-qualified" backwards. An instruction raises
a virtual instruction exception _only if_ it is HS-qualified. If it
isn't HS-qualified, then it must raise
Paul Donahue wrote:
You have the effect of "HS-qualified" backwards. An instruction raises
a virtual instruction exception _only if_ it is HS-qualified. If it
isn't HS-qualified, then it must raise
|
By
John Hauser
·
#843
·
|
|
Re: Behavior of scounteren/hcounteren
I invite comment on this proposed update to the rules for raising
virtual instruction exceptions when in VU mode:
https://github.com/riscv/riscv-isa-manual/pull/730
- John Hauser
I invite comment on this proposed update to the rules for raising
virtual instruction exceptions when in VU mode:
https://github.com/riscv/riscv-isa-manual/pull/730
- John Hauser
|
By
John Hauser
·
#842
·
|
|
Re: Behavior of scounteren/hcounteren
Paul Donahue wrote:
From the hypervisor extension chapter, Section 5.2, "Hypervisor and
Virtual Supervisor CSRs":
Some standard supervisor CSRs (scounteren and scontext, possibly
others) have
Paul Donahue wrote:
From the hypervisor extension chapter, Section 5.2, "Hypervisor and
Virtual Supervisor CSRs":
Some standard supervisor CSRs (scounteren and scontext, possibly
others) have
|
By
John Hauser
·
#841
·
|
|
Re: Behavior of scounteren/hcounteren
Explicitly cc'ing John on this H extension oriented question.
Explicitly cc'ing John on this H extension oriented question.
|
By
Greg Favor
·
#840
·
|
|
Behavior of scounteren/hcounteren
scounteren's effect on VU-mode is unclear. VU-mode accesses to HPMn do not necessarily have "insufficient privilege" since hpmcountern is listed in table 2.2 as requiring user privilege. Is
scounteren's effect on VU-mode is unclear. VU-mode accesses to HPMn do not necessarily have "insufficient privilege" since hpmcountern is listed in table 2.2 as requiring user privilege. Is
|
By
Paul Donahue
·
#839
·
|