|
Re: [EXTERNAL]Re: [RISC-V] [tech-privileged] Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
There was one item regarding the specification – what are the implications for H-extension? Since the H-extension is part of the privileged spec, I think it should be specified.
I do have a
There was one item regarding the specification – what are the implications for H-extension? Since the H-extension is part of the privileged spec, I think it should be specified.
I do have a
|
By
Sanjay Patel <spatel@...>
·
#497
·
|
|
Re: Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
Hi Greg,
I am working on the SBI PMU extension implementation in OpenSBI & Linux
kernel. I will update the SBI PMU extension based on Sscofpmf extension
as well.
I can work on implementing the
Hi Greg,
I am working on the SBI PMU extension implementation in OpenSBI & Linux
kernel. I will update the SBI PMU extension based on Sscofpmf extension
as well.
I can work on implementing the
|
By
atishp@...
·
#496
·
|
|
Re: Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
How would one make compliance tests for this extension? For example, how can one test the overflow exception when there is no standard on how to configure any of the HPM event counters to count, in
How would one make compliance tests for this extension? For example, how can one test the overflow exception when there is no standard on how to configure any of the HPM event counters to count, in
|
By
Brian Grayson
·
#495
·
|
|
Re: Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
Just to emphasize: If a number of people can pitch on on various DoD pieces, that would help a lot. Spec-wise we're in good shape (even though there is work to be done), and I've already submitted
Just to emphasize: If a number of people can pitch on on various DoD pieces, that would help a lot. Spec-wise we're in good shape (even though there is work to be done), and I've already submitted
|
By
Greg Favor
·
#494
·
|
|
Re: Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
Cc'ing tech-priv since others may be wondering about the answer to Brian's question.
Brian,
As Mark touched on below, there is a whole "Definition of Done" checklist of items that needs to be done
Cc'ing tech-priv since others may be wondering about the answer to Brian's question.
Brian,
As Mark touched on below, there is a whole "Definition of Done" checklist of items that needs to be done
|
By
Greg Favor
·
#493
·
|
|
Re: Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
It's been three weeks since this proposal has been floated, and feedback was provided on the list. Everyone I've checked with off-list has been okay with the spec.
Does anyone object to moving it
It's been three weeks since this proposal has been floated, and feedback was provided on the list. Everyone I've checked with off-list has been okay with the spec.
Does anyone object to moving it
|
By
Brian Grayson
·
#492
·
|
|
Re: [RISC-V] [tech-virt-mem] [RISC-V] [tech-privileged] SV32 and 34 bit address
This was just a question about existing behavior. It is unrelated to the
ongoing security conversation on the virtual memory TG mailing list, if
that's what you're asking.
Dan
This was just a question about existing behavior. It is unrelated to the
ongoing security conversation on the virtual memory TG mailing list, if
that's what you're asking.
Dan
|
By
Daniel Lustig
·
#491
·
|
|
Re: SV32 and 34 bit address
it makes sense but in what way does this make us more secure?
it makes sense but in what way does this make us more secure?
|
By
Richard Trauben
·
#490
·
|
|
Re: SV32 and 34 bit address
Hi Gracy,
When satp.mode is not bare, virtual addresses must be sign-extended
to fill XLEN. When the physical address generated in any mode is
smaller than the implementation's physical address
Hi Gracy,
When satp.mode is not bare, virtual addresses must be sign-extended
to fill XLEN. When the physical address generated in any mode is
smaller than the implementation's physical address
|
By
Daniel Lustig
·
#489
·
|
|
SV32 and 34 bit address
I reused a topic title under https://github.com/riscv/riscv-isa-manual/issues/131
And also I attached some comments in section 4.4.1 of privileged spec those confused me so much,
A. Sv39
I reused a topic title under https://github.com/riscv/riscv-isa-manual/issues/131
And also I attached some comments in section 4.4.1 of privileged spec those confused me so much,
A. Sv39
|
By
Gracy Ge
·
#488
·
|
|
Re: epc increment in case of C.EBREAK
I mis-misremembered.
To clarify the mtval behavior for [C.]EBREAK instructions: mtval is permitted to either be zeroed or written with the faulting address (i.e. the PC) on a software breakpoint.
I mis-misremembered.
To clarify the mtval behavior for [C.]EBREAK instructions: mtval is permitted to either be zeroed or written with the faulting address (i.e. the PC) on a software breakpoint.
|
By
andrew@...
·
#487
·
|
|
Re: epc increment in case of C.EBREAK
Indeed, I misremembered.
By
andrew@...
·
#486
·
|
|
Re: Virtualization of "main memory" and "I/O" regions
The proposal appears to address the VSEE and in the "I/O to memory" direction, and just for the channel 0 implicit strong ordering / no fence case. It's not clear to me that that is the only problem.
The proposal appears to address the VSEE and in the "I/O to memory" direction, and just for the channel 0 implicit strong ordering / no fence case. It's not clear to me that that is the only problem.
|
By
Josh Scheid
·
#485
·
|
|
Re: epc increment in case of C.EBREAK
I agree that it is an unusual operation but if it is needed I don’t think you can use mtval as it is defined to be zero on an ebreak/c.ebreak.
Mark
I agree that it is an unusual operation but if it is needed I don’t think you can use mtval as it is defined to be zero on an ebreak/c.ebreak.
Mark
|
By
Mark Hill
·
#484
·
|
|
Re: epc increment in case of C.EBREAK
My experience has been that simply skipping over a [C.]EBREAK without first knowing how wide the instruction is not a commonly desired operation. If the instruction was inserted by a debugger, the
My experience has been that simply skipping over a [C.]EBREAK without first knowing how wide the instruction is not a commonly desired operation. If the instruction was inserted by a debugger, the
|
By
andrew@...
·
#483
·
|
|
Re: epc increment in case of C.EBREAK
Note that if the EBREAK comes from a lower privilege mode, the address put into mepc is the virtual (not physical) instruction address of the EBREAK instruction. Hence M-mode will need to use the
Note that if the EBREAK comes from a lower privilege mode, the address put into mepc is the virtual (not physical) instruction address of the EBREAK instruction. Hence M-mode will need to use the
|
By
Greg Favor
·
#482
·
|
|
Re: epc increment in case of C.EBREAK
Hi Anne,
Nice to hear from youJ
Yes you will need to increment the epc to continue. The handler needs to read the byte at the address mepc, if the bottom two bits are 0’b11 then it’s a 4
Hi Anne,
Nice to hear from youJ
Yes you will need to increment the epc to continue. The handler needs to read the byte at the address mepc, if the bottom two bits are 0’b11 then it’s a 4
|
By
Mark Hill
·
#481
·
|
|
epc increment in case of C.EBREAK
Hello
The Privileged spec says that "ECALL and EBREAK cause the receiving privilege mode’s epc register to be set to the address of
the ECALL or EBREAK instruction itself, not the address of the
Hello
The Privileged spec says that "ECALL and EBREAK cause the receiving privilege mode’s epc register to be set to the address of
the ECALL or EBREAK instruction itself, not the address of the
|
By
Anne MERLANDE
·
#480
·
|
|
Re: Preferred manner of supporting bus errors in RISC-V
The rasd group has started [https://lists.riscv.org/g/tech-rasd/topics] and it's charter, still being formulated, could help to address this. Contribute if interested.
-Josh
The rasd group has started [https://lists.riscv.org/g/tech-rasd/topics] and it's charter, still being formulated, could help to address this. Contribute if interested.
-Josh
|
By
Josh Scheid
·
#479
·
|
|
Re: Virtualization of "main memory" and "I/O" regions
The existing Linux platform expects strongly ordered point-to-point I/O, so while convenient for the HW, I don't think it's a workable solution.
The existing Linux platform expects strongly ordered point-to-point I/O, so while convenient for the HW, I don't think it's a workable solution.
|
By
andrew@...
·
#478
·
|