|
Fast track arch extension proposal for "stateen" CSRs
Folks, I have below the latest version of the plan to add optional "stateen" (State Enable) CSRs to the RISC-V Privileged Architecture, now in the form of a fast-track extension proposal. Much of this
Folks, I have below the latest version of the plan to add optional "stateen" (State Enable) CSRs to the RISC-V Privileged Architecture, now in the form of a fast-track extension proposal. Much of this
|
By
John Hauser
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
4 messages
Hello Greg, Στις 2021-06-28 22:29, Greg Favor έγραψε: Have you considered using mscratch for this instead of defining a new CSR ? Regards, Nick
Hello Greg, Στις 2021-06-28 22:29, Greg Favor έγραψε: Have you considered using mscratch for this instead of defining a new CSR ? Regards, Nick
|
By
mick@...
·
|
|
[RISC-V] [tech-virt-mem] Access faults for paging structures linked to hgatp
10 messages
Forwarding to tech-privileged so the hypervisor folks can weigh in...
Forwarding to tech-privileged so the hypervisor folks can weigh in...
|
By
Daniel Lustig
·
|
|
[RISC-V] [security] Fast track arch extension proposal for "stateen" CSRs
This works for pure state enables, but may have issues for extensions that use the field for more than that (the allowed use for, say, the dual-purpose cases above). Particularly if the extension is o
This works for pure state enables, but may have issues for extensions that use the field for more than that (the allowed use for, say, the dual-purpose cases above). Particularly if the extension is o
|
By
Josh Scheid
·
|
|
Fast track arch extension proposal for "stateen" CSRs
Josh Scheid wrote: For that very reason, we don't intend to allow such extensions to be enabled by a stateen bit. The dual-use case can apply only for extensions that don't have this issue, like Zfinx
Josh Scheid wrote: For that very reason, we don't intend to allow such extensions to be enabled by a stateen bit. The dual-use case can apply only for extensions that don't have this issue, like Zfinx
|
By
John Hauser
·
|
|
[RISC-V] [security] Fast track arch extension proposal for "stateen" CSRs
John, See below for a couple of small but important typos. Greg The references to bits 57 and 58 in the following two paragraphs are incorrect and should be to bits 58 and 59.
John, See below for a couple of small but important typos. Greg The references to bits 57 and 58 in the following two paragraphs are incorrect and should be to bits 58 and 59.
|
By
Greg Favor
·
|
|
Fast track arch extension proposal for "stateen" CSRs
Greg wrote: You are correct. An editing error, of course. I'm aware of at least one other mistake. Under "Motivation" it currently says: Actually, only some of the AIA's supervisor-level CSRs need swa
Greg wrote: You are correct. An editing error, of course. I'm aware of at least one other mistake. Under "Motivation" it currently says: Actually, only some of the AIA's supervisor-level CSRs need swa
|
By
John Hauser
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
23 messages
I'm unclear whether you are objecting to 4 byte alignment, or reserving the low bits for something else in the future. In any case, I am not seeing why 4 byte alignment should cause any issue even wit
I'm unclear whether you are objecting to 4 byte alignment, or reserving the low bits for something else in the future. In any case, I am not seeing why 4 byte alignment should cause any issue even wit
|
By
Allen Baum
·
|
|
Naming of S* extensions
3 messages
Section 25.7 of the unprivileged spec says that standard supervisor-level ISA extensions are named using S as a prefix. Section 25.9 says that standard machine-level ISA extensions are named using Zxm
Section 25.7 of the unprivileged spec says that standard supervisor-level ISA extensions are named using S as a prefix. Section 25.9 says that standard machine-level ISA extensions are named using Zxm
|
By
Paul Donahue
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Smepmp discovery
2 messages
It’s a cheap, effective solution. But I think Andrew’s question is whether a solution is needed. If the early boot code knows what hardware it’s running on, it doesn’t need the information. But will t
It’s a cheap, effective solution. But I think Andrew’s question is whether a solution is needed. If the early boot code knows what hardware it’s running on, it doesn’t need the information. But will t
|
By
Bill Huffman
·
|
|
RISC-V H-extension freeze consideration
Resending from correct email address Begin forwarded message: From: krste@... Subject: Re: [RISC-V] [tech-privileged] RISC-V H-extension freeze consideration Date: August 1, 2021 at 1:41:10 PM PDT To:
Resending from correct email address Begin forwarded message: From: krste@... Subject: Re: [RISC-V] [tech-privileged] RISC-V H-extension freeze consideration Date: August 1, 2021 at 1:41:10 PM PDT To:
|
By
Krste Asanovic
·
|
|
Smepmp discovery
10 messages
Hello all, When we initially defined mseccfg as part of Smepmp we specified that the existence of that CSR would also mean that ePMP (at least MML and MMWP) is implemented. Obviously since other secur
Hello all, When we initially defined mseccfg as part of Smepmp we specified that the existence of that CSR would also mean that ePMP (at least MML and MMWP) is implemented. Obviously since other secur
|
By
mick@...
·
|
|
Discovery Machanism for Any Security Extensions
7 messages
Extrapolating from the discussion on Smepmp discovery, it is reaonable to expect that in the future any security feature will potentially run into the same issue, that is, any data structure is not tr
Extrapolating from the discussion on Smepmp discovery, it is reaonable to expect that in the future any security feature will potentially run into the same issue, that is, any data structure is not tr
|
By
Siqi Zhao
·
|
|
Representing invalid addresses
2 messages
mepc, as an example, has this: """ mepc is a WARL register that must be able to hold all valid virtual addresses. It need not be capable of holding all possible invalid addresses. Implementations may
mepc, as an example, has this: """ mepc is a WARL register that must be able to hold all valid virtual addresses. It need not be capable of holding all possible invalid addresses. Implementations may
|
By
Josh Scheid
·
|
|
Interrupt pending precision
6 messages
Following on to https://github.com/riscv/riscv-isa-manual/pull/701. There should be more said that there's no expectation of implementations "edge detecting" the "becomes pending" event. For example,
Following on to https://github.com/riscv/riscv-isa-manual/pull/701. There should be more said that there's no expectation of implementations "edge detecting" the "becomes pending" event. For example,
|
By
Josh Scheid
·
|
|
Hypervisor exception priorities
8 messages
Table 3.7 of the privileged spec lists the synchronous exception priorities. The hypervisor chapter adds guest page faults and virtual instruction exceptions but I don't see where it states how they a
Table 3.7 of the privileged spec lists the synchronous exception priorities. The hypervisor chapter adds guest page faults and virtual instruction exceptions but I don't see where it states how they a
|
By
Paul Donahue
·
|
|
Effective address width when S mode and U mode has different XLEN
10 messages
In a system using SV-39, RISC-V privileged spec defines the behavior of address calculation and page fault detection: Instruction fetch addresses and load and store effective addresses, which are 64 b
In a system using SV-39, RISC-V privileged spec defines the behavior of address calculation and page fault detection: Instruction fetch addresses and load and store effective addresses, which are 64 b
|
By
Chang Liu
·
|
|
RISC-V H-extension plus RISC-V AIA proof-of-concept completed
Hi All, The KVM RISC-V AIA support has been successfully validated with AIA IMSIC virtualization features emulated by QEMU RISC-V. This means KVM RISC-V Guest Linux works perfectly fine with Guest VCP
Hi All, The KVM RISC-V AIA support has been successfully validated with AIA IMSIC virtualization features emulated by QEMU RISC-V. This means KVM RISC-V Guest Linux works perfectly fine with Guest VCP
|
By
Anup Patel
·
|
|
[RISC-V] [tech-unixplatformspec] RISC-V H-extension plus RISC-V AIA proof-of-concept completed
let's create a top sheet and add this please. philipp is working on a review proposal. likely more like tech-announce for 2 weeks and notify TSC and the board. etc Get BlueMail for Android
let's create a top sheet and add this please. philipp is working on a review proposal. likely more like tech-announce for 2 weeks and notify TSC and the board. etc Get BlueMail for Android
|
By
mark
·
|
|
[RFC] Toolchain interface for privilege spec related stuff.
10 messages
Hi : I am Kito Cheng, one of the RISC-V open source toolchain developer. Recently RISC-V LLVM and RISC-V GNU toolchain community are discussing how to version control the privilege spec stuff - which
Hi : I am Kito Cheng, one of the RISC-V open source toolchain developer. Recently RISC-V LLVM and RISC-V GNU toolchain community are discussing how to version control the privilege spec stuff - which
|
By
Kito Cheng
·
|