|
[RISC-V] [tech-virt-mem] Access faults for paging structures linked to hgatp 10 messages
Forwarding to tech-privileged so the hypervisor folks can weigh in...
Forwarding to tech-privileged so the hypervisor folks can weigh in...
|
By
Daniel Lustig
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure 4 messages
Hello Greg, Στις 2021-06-28 22:29, Greg Favor έγραψε: Have you considered using mscratch for this instead of defining a new CSR ? Regards, Nick
Hello Greg, Στις 2021-06-28 22:29, Greg Favor έγραψε: Have you considered using mscratch for this instead of defining a new CSR ? Regards, Nick
|
By
Nick Kossifidis
·
|
|
Fast track arch extension proposal for "stateen" CSRs
Folks, I have below the latest version of the plan to add optional "stateen" (State Enable) CSRs to the RISC-V Privileged Architecture, now in the form of a fast-track extension proposal. Much of this
Folks, I have below the latest version of the plan to add optional "stateen" (State Enable) CSRs to the RISC-V Privileged Architecture, now in the form of a fast-track extension proposal. Much of this
|
By
John Hauser
·
|
|
[RISC-V] [tech-config] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure 14 messages
Why does it need to be a CSR? In other parts of the boot flow the device tree pointer is passed via a normal general purpose register. Why can't the same be done here? Jonathan
Why does it need to be a CSR? In other parts of the boot flow the device tree pointer is passed via a normal general purpose register. Why can't the same be done here? Jonathan
|
By
Jonathan Behrens
·
|
|
Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure 12 messages
The new "unified RISC-V low-level discovery method" being developed by tech-config (for use by all extensions that have information that needs to be easily discoverable by software), is almost complet
The new "unified RISC-V low-level discovery method" being developed by tech-config (for use by all extensions that have information that needs to be easily discoverable by software), is almost complet
|
By
Greg Favor
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure 2 messages
Note that in an earlier discussion with Greg, I had proposed all-ones as the escape, as a single-byte message can not be valid.
Note that in an earlier discussion with Greg, I had proposed all-ones as the escape, as a single-byte message can not be valid.
|
By
Philipp Tomsich
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
I think we can extend meaning of that CSR register (for future) by allowing write of some 'keyed/secret' value into it. Keeping it 'clean address' is IMO better for now. /Robert -- Regards, Robert Chy
I think we can extend meaning of that CSR register (for future) by allowing write of some 'keyed/secret' value into it. Keeping it 'clean address' is IMO better for now. /Robert -- Regards, Robert Chy
|
By
Robert Chyla
·
|
|
RISC-V H-extension freeze consideration 37 messages
Hi All, The RISC-V H-extension v0.6.1 draft was released almost a year back in May 2020. There has been no changes in the H-extension specification since then. Meanwhile, we have RISC-V H-extension v0
Hi All, The RISC-V H-extension v0.6.1 draft was released almost a year back in May 2020. There has been no changes in the H-extension specification since then. Meanwhile, we have RISC-V H-extension v0
|
By
Anup Patel
·
|
|
proposal for stateen CSRs 59 messages
Hello tech-privileged, The proposal below has been discussed by some of the principle RISC-V architects for incorporation into the official Privileged Architecture. The text below makes reference to Z
Hello tech-privileged, The proposal below has been discussed by some of the principle RISC-V architects for incorporation into the official Privileged Architecture. The text below makes reference to Z
|
By
John Hauser
·
|
|
Proposed deprecation of N extension 16 messages
Hi, We are proposing to remove the N extension from the architecture. The most important role the N extension fills is supporting untrusted interrupt handling in microcontrollers. These systems have M
Hi, We are proposing to remove the N extension from the architecture. The most important role the N extension fills is supporting untrusted interrupt handling in microcontrollers. These systems have M
|
By
Andrew Waterman
·
|
|
SYSTEM opcodes available for custom instructions 2 messages
I found this thread implying that certain SYSTEM opcodes are available for defining custom instructions: https://github.com/riscv/riscv-isa-manual/issues/385 I didn't find any statement about this in
I found this thread implying that certain SYSTEM opcodes are available for defining custom instructions: https://github.com/riscv/riscv-isa-manual/issues/385 I didn't find any statement about this in
|
By
James Robinson
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Proposed deprecation of N extension 7 messages
Wouldn't you also want to isolate different interrupt handlers from each other and from any non-interrupt handler user code running on the system? With the N-extension itself none of that would be pos
Wouldn't you also want to isolate different interrupt handlers from each other and from any non-interrupt handler user code running on the system? With the N-extension itself none of that would be pos
|
By
Jonathan Behrens
·
|
|
Seeking clarification on PMP behavior when R=0, W=1 8 messages
I would like to clarify the intended behavior of PMP regions when R=0, W=1. The privileged spec (https://github.com/riscv/riscv-isa-manual/blob/4f83798332ad8cf9a7a752f4e9f59ce16d325c73/src/machine.tex
I would like to clarify the intended behavior of PMP regions when R=0, W=1. The privileged spec (https://github.com/riscv/riscv-isa-manual/blob/4f83798332ad8cf9a7a752f4e9f59ce16d325c73/src/machine.tex
|
By
James Robinson
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Updates on the proposal of MPU (privious sPMP) 6 messages
sPMP(MPU) is designed for the separation between U-mode and S-mode and it only make sense only when paging is not available. With H extension, there're 3 atp registers to control the translation for d
sPMP(MPU) is designed for the separation between U-mode and S-mode and it only make sense only when paging is not available. With H extension, there're 3 atp registers to control the translation for d
|
By
Robin Zheng
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Updates on the proposal of MPU (privious sPMP)
What combinations has the TEE group come up with so far that have justifying use cases? Or are you searching for combinations that have justifying use cases? If the latter (and this admittedly reflect
What combinations has the TEE group come up with so far that have justifying use cases? Or are you searching for combinations that have justifying use cases? If the latter (and this admittedly reflect
|
By
Greg Favor
·
|
|
Updates on the proposal of MPU (privious sPMP) 2 messages
Hello all, After the discussion of the tee group, we decide to rename sPMP to MPU (the RISC-V Memory Protection Unit), and reuse page fault for MPU fault based on our discussion and feedback of the pr
Hello all, After the discussion of the tee group, we decide to rename sPMP to MPU (the RISC-V Memory Protection Unit), and reuse page fault for MPU fault based on our discussion and feedback of the pr
|
By
bichengyang@...
·
|
|
enabling lower-privilege access to custom state, take 3
Here's my next attempt to define the absolute minimum that will satisfy all requirements: There are two standard XLEN-wide CSRs for controlling lower-privilege access to custom state: 0x30B mcstateen
Here's my next attempt to define the absolute minimum that will satisfy all requirements: There are two standard XLEN-wide CSRs for controlling lower-privilege access to custom state: 0x30B mcstateen
|
By
John Hauser
·
|
|
Call for candidates for CMO TG vice-chair
I'm forwarding the following announcement while I'm having a mysterious problem with the tech-announce email alias. ---------- Forwarded message --------- From: Greg Favor <gfavor@...> Date: Wed, Apr
I'm forwarding the following announcement while I'm having a mysterious problem with the tech-announce email alias. ---------- Forwarded message --------- From: Greg Favor <gfavor@...> Date: Wed, Apr
|
By
Greg Favor
·
|
|
[RISC-V] [tech-tee] The proposal of sPMP 24 messages
I'm going to push back against the proposal to allocate new cause values for sPMP faults. Allocating new cause values has knock-on effects and incremental costs throughout the architecture (with respe
I'm going to push back against the proposal to allocate new cause values for sPMP faults. Allocating new cause values has knock-on effects and incremental costs throughout the architecture (with respe
|
By
Andrew Waterman
·
|
|
The proposal of sPMP
Hi privileged group, The TEE group are proposing the sPMP mechanism for S-mode physical memory protection. (As linked below) The TEE group discusses the proposal for quite a while, and we believe that
Hi privileged group, The TEE group are proposing the sPMP mechanism for S-mode physical memory protection. (As linked below) The TEE group discusses the proposal for quite a while, and we believe that
|
By
bichengyang@...
·
|