|
Re: Question about CSR hedeleg and hideleg
Dear Paul Donahue,
Thank you very much for your reply!
I have another question about hideleg。The privileged ISA said: “Among bits 15:0 of hideleg, bits 10, 6, and 2 (corresponding to the
Dear Paul Donahue,
Thank you very much for your reply!
I have another question about hideleg。The privileged ISA said: “Among bits 15:0 of hideleg, bits 10, 6, and 2 (corresponding to the
|
By
Oscar Jupp
·
#1158
·
|
|
Re: Question about guest external interrupt
Dear Anup Patel,
Thank you very much for your reply.
I would like to continue to ask: If GEILEN is 0, CSR hgeip and hgeie will always be all zero. Then, hip.SGEIP is always 0. You said:
Dear Anup Patel,
Thank you very much for your reply.
I would like to continue to ask: If GEILEN is 0, CSR hgeip and hgeie will always be all zero. Then, hip.SGEIP is always 0. You said:
|
By
Oscar Jupp
·
#1157
·
|
|
Re: Question about guest external interrupt
If GEILEN is zero then there are no guest external interrupts but
software (i.e. hypervisor) can still inject external interrupts using
hvip CSR. In other words, software-injected external interrupts
If GEILEN is zero then there are no guest external interrupts but
software (i.e. hypervisor) can still inject external interrupts using
hvip CSR. In other words, software-injected external interrupts
|
By
Anup Patel
·
#1156
·
|
|
Question about guest external interrupt
To whom it may concern,
I have a question about guest external interrupt.
The privileged ISA said: "GEILEN may be zero". If GEILEN is zero, is the implementation unable to receive guest external
To whom it may concern,
I have a question about guest external interrupt.
The privileged ISA said: "GEILEN may be zero". If GEILEN is zero, is the implementation unable to receive guest external
|
By
Oscar Jupp
·
#1155
·
|
|
Re: Question about CSR hedeleg and hideleg
For instance, page faults should normally be delegated to the operating system that manages the page tables rather than handling it in a higher mode which doesn't know anything about the OS's memory
For instance, page faults should normally be delegated to the operating system that manages the page tables rather than handling it in a higher mode which doesn't know anything about the OS's memory
|
By
Paul Donahue
·
#1154
·
|
|
Question about CSR hedeleg and hideleg
To whom it may concern,
I have a question about CSR hedeleg and hideleg.
The ISA Manual said: "The hedeleg and hideleg CSRs allow these traps to be further delegated to a VS-mode guest."
I would
To whom it may concern,
I have a question about CSR hedeleg and hideleg.
The ISA Manual said: "The hedeleg and hideleg CSRs allow these traps to be further delegated to a VS-mode guest."
I would
|
By
Oscar Jupp
·
#1153
·
|
|
AR (Architecture Review) Committee minutes for 11/8
We (the AR Committee) will be posting minutes of our (roughly) weekly meetings to discuss ISA issues that have been raised recently to the committee's attention, and to review RV arch extensions that
We (the AR Committee) will be posting minutes of our (roughly) weekly meetings to discuss ISA issues that have been raised recently to the committee's attention, and to review RV arch extensions that
|
By
Greg Favor
·
#1152
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
For visibility: I opened a few issues in the GitHub repository.
"a trap may occur between the PTE update and the memory access"? (#3)
allow speculative G-stage D bit updates for VS-stage A bit
For visibility: I opened a few issues in the GitHub repository.
"a trap may occur between the PTE update and the memory access"? (#3)
allow speculative G-stage D bit updates for VS-stage A bit
|
By
John Ingalls
·
#1151
·
|
|
Re: Concern Raised in Tech Chair Meeting
While, in general, CSR bits are either RW or RdOnly, there is one exception that I am aware of, and it is quite pertinent to your scenario
(as was intended to be from the beginning) and that is the
While, in general, CSR bits are either RW or RdOnly, there is one exception that I am aware of, and it is quite pertinent to your scenario
(as was intended to be from the beginning) and that is the
|
By
Allen Baum
·
#1150
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
This is more than just clarifying and naming. It also defines a specfic WARL control bit. in an existing, defined CSR.
Individual WARL CSR bits can be RW, RdOnlyZero, or RdOnly1 (WARL *fields* can
This is more than just clarifying and naming. It also defines a specfic WARL control bit. in an existing, defined CSR.
Individual WARL CSR bits can be RW, RdOnlyZero, or RdOnly1 (WARL *fields* can
|
By
Allen Baum
·
#1149
·
|
|
Concern Raised in Tech Chair Meeting
The purpose of this e-mail is to start a discussion/debate around the issue that I raised in the tech-chairs meeting this week related the m-mode and the stability of the configuration. It is
The purpose of this e-mail is to start a discussion/debate around the issue that I raised in the tech-chairs meeting this week related the m-mode and the stability of the configuration. It is
|
By
Guerney D H Hunt
·
#1148
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
There were two motivations. One to name the specified behavior
and second to provide a control to select between the two
specified behaviors.
The specification for hardware updating of A/D bits
There were two motivations. One to name the specified behavior
and second to provide a control to select between the two
specified behaviors.
The specification for hardware updating of A/D bits
|
By
Ved Shanbhogue
·
#1147
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
I would concur with Scott above. Clarifications to the spec belong in the spec itself, not inside an extension. If the Architecture Review Committee suggested otherwise, is it because the
I would concur with Scott above. Clarifications to the spec belong in the spec itself, not inside an extension. If the Architecture Review Committee suggested otherwise, is it because the
|
By
Roger Espasa
·
#1146
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
This path was suggested by the Architecture Review Committee. As noted up thread, hardware updateable PTE A/D bits were already in the spec. This extension is coining a name, and providing a bit more
This path was suggested by the Architecture Review Committee. As noted up thread, hardware updateable PTE A/D bits were already in the spec. This extension is coining a name, and providing a bit more
|
By
Aaron Durbin
·
#1145
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
If these two are intended only as clarifications of what the privileged spec already says, then these clarifications should be made to the privileged spec, not here in this optional extension.
If these two are intended only as clarifications of what the privileged spec already says, then these clarifications should be made to the privileged spec, not here in this optional extension.
|
By
Scott Johnson
·
#1144
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
My understanding of the situation (caveat: not my area of expertise) is that mixed software and hardware A/D updates is not likely to work in a system (perhaps because software is using locks and
My understanding of the situation (caveat: not my area of expertise) is that mixed software and hardware A/D updates is not likely to work in a system (perhaps because software is using locks and
|
By
Earl Killian
·
#1143
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
This is addressed by the step 2 and 7.a of the translation process:
2. If accessing pte violates a PMA or PMP check, raise
an access-fault exception corresponding to the
original access
This is addressed by the step 2 and 7.a of the translation process:
2. If accessing pte violates a PMA or PMP check, raise
an access-fault exception corresponding to the
original access
|
By
Ved Shanbhogue
·
#1142
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
John Ingalls wrote:
It is not a lot of text so request you to compare the two
to see if the edits may be considered significant.
I feel the following may be considered as significant:
1.
John Ingalls wrote:
It is not a lot of text so request you to compare the two
to see if the edits may be considered significant.
I feel the following may be considered as significant:
1.
|
By
Ved Shanbhogue
·
#1141
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
I concur; it is not apparent from this spec what is different vs. the long-existing implementation option to have hardware A/D updating. Is it only the new CSR bits?
This constraint appears new:
>
I concur; it is not apparent from this spec what is different vs. the long-existing implementation option to have hardware A/D updating. Is it only the new CSR bits?
This constraint appears new:
>
|
By
Scott Johnson
·
#1140
·
|
|
Re: Fast-track extension proposal for H/W PTE A/D updating
> "The A and D bits are managed by these extensions as follows: ..."
Does the scope of this extension include changing, constraining, or clarifying the behaviors already described in the Privileged
> "The A and D bits are managed by these extensions as follows: ..."
Does the scope of this extension include changing, constraining, or clarifying the behaviors already described in the Privileged
|
By
John Ingalls
·
#1139
·
|