|
SYSTEM opcodes available for custom instructions
2 messages
I found this thread implying that certain SYSTEM opcodes are available for defining custom instructions: https://github.com/riscv/riscv-isa-manual/issues/385 I didn't find any statement about this in
I found this thread implying that certain SYSTEM opcodes are available for defining custom instructions: https://github.com/riscv/riscv-isa-manual/issues/385 I didn't find any statement about this in
|
By
James Robinson
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Proposed deprecation of N extension
7 messages
Wouldn't you also want to isolate different interrupt handlers from each other and from any non-interrupt handler user code running on the system? With the N-extension itself none of that would be pos
Wouldn't you also want to isolate different interrupt handlers from each other and from any non-interrupt handler user code running on the system? With the N-extension itself none of that would be pos
|
By
Jonathan Behrens
·
|
|
Seeking clarification on PMP behavior when R=0, W=1
8 messages
I would like to clarify the intended behavior of PMP regions when R=0, W=1. The privileged spec (https://github.com/riscv/riscv-isa-manual/blob/4f83798332ad8cf9a7a752f4e9f59ce16d325c73/src/machine.tex
I would like to clarify the intended behavior of PMP regions when R=0, W=1. The privileged spec (https://github.com/riscv/riscv-isa-manual/blob/4f83798332ad8cf9a7a752f4e9f59ce16d325c73/src/machine.tex
|
By
James Robinson
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Updates on the proposal of MPU (privious sPMP)
6 messages
sPMP(MPU) is designed for the separation between U-mode and S-mode and it only make sense only when paging is not available. With H extension, there're 3 atp registers to control the translation for d
sPMP(MPU) is designed for the separation between U-mode and S-mode and it only make sense only when paging is not available. With H extension, there're 3 atp registers to control the translation for d
|
By
Robin Zheng
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Updates on the proposal of MPU (privious sPMP)
What combinations has the TEE group come up with so far that have justifying use cases? Or are you searching for combinations that have justifying use cases? If the latter (and this admittedly reflect
What combinations has the TEE group come up with so far that have justifying use cases? Or are you searching for combinations that have justifying use cases? If the latter (and this admittedly reflect
|
By
Greg Favor
·
|
|
Updates on the proposal of MPU (privious sPMP)
2 messages
Hello all, After the discussion of the tee group, we decide to rename sPMP to MPU (the RISC-V Memory Protection Unit), and reuse page fault for MPU fault based on our discussion and feedback of the pr
Hello all, After the discussion of the tee group, we decide to rename sPMP to MPU (the RISC-V Memory Protection Unit), and reuse page fault for MPU fault based on our discussion and feedback of the pr
|
By
bichengyang@...
·
|
|
enabling lower-privilege access to custom state, take 3
Here's my next attempt to define the absolute minimum that will satisfy all requirements: There are two standard XLEN-wide CSRs for controlling lower-privilege access to custom state: 0x30B mcstateen
Here's my next attempt to define the absolute minimum that will satisfy all requirements: There are two standard XLEN-wide CSRs for controlling lower-privilege access to custom state: 0x30B mcstateen
|
By
John Hauser
·
|
|
Call for candidates for CMO TG vice-chair
I'm forwarding the following announcement while I'm having a mysterious problem with the tech-announce email alias. ---------- Forwarded message --------- From: Greg Favor <gfavor@...> Date: Wed, Apr
I'm forwarding the following announcement while I'm having a mysterious problem with the tech-announce email alias. ---------- Forwarded message --------- From: Greg Favor <gfavor@...> Date: Wed, Apr
|
By
Greg Favor
·
|
|
[RISC-V] [tech-tee] The proposal of sPMP
24 messages
I'm going to push back against the proposal to allocate new cause values for sPMP faults. Allocating new cause values has knock-on effects and incremental costs throughout the architecture (with respe
I'm going to push back against the proposal to allocate new cause values for sPMP faults. Allocating new cause values has knock-on effects and incremental costs throughout the architecture (with respe
|
By
andrew@...
·
|
|
The proposal of sPMP
Hi privileged group, The TEE group are proposing the sPMP mechanism for S-mode physical memory protection. (As linked below) The TEE group discusses the proposal for quite a while, and we believe that
Hi privileged group, The TEE group are proposing the sPMP mechanism for S-mode physical memory protection. (As linked below) The TEE group discusses the proposal for quite a while, and we believe that
|
By
bichengyang@...
·
|
|
Interrupts in RV32I / RV32E systems
2 messages
My apologies if this topic was discussed and archived. I did search but mostly came across Unix platform style discussions on interrupt support. But my interest here is mostly around RTOS-based low-en
My apologies if this topic was discussed and archived. I did search but mostly came across Unix platform style discussions on interrupt support. But my interest here is mostly around RTOS-based low-en
|
By
Nagendra Gulur
·
|
|
Can the ratified ISA be modified?
2 messages
I found that the manual in the ratified state that I downloaded did not match the code that I viewed.The main relevant command is HFENCE.GVMA. Its encodings has been changed. Will there be machines wi
I found that the manual in the ratified state that I downloaded did not match the code that I viewed.The main relevant command is HFENCE.GVMA. Its encodings has been changed. Will there be machines wi
|
By
merle w
·
|
|
rf sv64 - bit virtual address space - ALL 64 bits
just to comment. in the sigHPC working group we will begin to think about a true 64 bit address space (at a minimum). meaning ALL 64 bits have a meaning. at BSC we are working on such a system. in the
just to comment. in the sigHPC working group we will begin to think about a true 64 bit address space (at a minimum). meaning ALL 64 bits have a meaning. at BSC we are working on such a system. in the
|
By
swallach
·
|
|
Correspondence between hedeleg and medeleg writeable bits?
6 messages
Riscv-privileged_1.12-draft, Table 6.2 gives a list of hedeleg bits which must be writable, and it is stated: "Requiring that certain bits of hedeleg be writable reduces some of the burden on a hyperv
Riscv-privileged_1.12-draft, Table 6.2 gives a list of hedeleg bits which must be writable, and it is stated: "Requiring that certain bits of hedeleg be writable reduces some of the burden on a hyperv
|
By
James Robinson
·
|
|
Hypervisor interrupt enables
19 messages
I expect, and have observed in Spike, that `sstatus.SIE` will apply to interrupts delegated to HS-mode, and `vsstatus.SIE` will apply to interrupts delegated to VS-mode. But I cannot find this explain
I expect, and have observed in Spike, that `sstatus.SIE` will apply to interrupts delegated to HS-mode, and `vsstatus.SIE` will apply to interrupts delegated to VS-mode. But I cannot find this explain
|
By
Scott Johnson
·
|
|
Clarification on writing MXL field of the MISA CSR
2 messages
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
|
By
Joseph Rahmeh
·
|
|
Clarification on writing MXL field of the MISA CSR
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
|
By
Joseph Rahmeh
·
|
|
[RISC-V] [tech-unixplatformspec] [RISC-V] [tech-privileged] [Announcement] Successful KVM RISC-V bring up on FPGA (Rocket core with H extension)
3 messages
Sure. I will send that once I have the detailed instructions available in public domain. -- Regards, Atish
Sure. I will send that once I have the detailed instructions available in public domain. -- Regards, Atish
|
By
atishp@...
·
|
|
[EXTERNAL]Re: [RISC-V] [tech-privileged] Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
11 messages
There was one item regarding the specification – what are the implications for H-extension? Since the H-extension is part of the privileged spec, I think it should be specified. I do have a descriptio
There was one item regarding the specification – what are the implications for H-extension? Since the H-extension is part of the privileged spec, I think it should be specified. I do have a descriptio
|
By
Sanjay Patel
·
|
|
Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
20 messages
Hi all, Recently the TSC established a lightweight "fast track" architecture extension process that small, straightforward, relatively uncontentious arch extension proposals can utilize. This is the s
Hi all, Recently the TSC established a lightweight "fast track" architecture extension process that small, straightforward, relatively uncontentious arch extension proposals can utilize. This is the s
|
By
Greg Favor
·
|