|
SV32 and 34 bit address
3 messages
I reused a topic title under https://github.com/riscv/riscv-isa-manual/issues/131 And also I attached some comments in section 4.4.1 of privileged spec those confused me so much, A. Sv39 implementatio
I reused a topic title under https://github.com/riscv/riscv-isa-manual/issues/131 And also I attached some comments in section 4.4.1 of privileged spec those confused me so much, A. Sv39 implementatio
|
By
Gracy Ge
·
|
|
epc increment in case of C.EBREAK
7 messages
Hello The Privileged spec says that "ECALL and EBREAK cause the receiving privilege mode’s epc register to be set to the address of the ECALL or EBREAK instruction itself, not the address of the follo
Hello The Privileged spec says that "ECALL and EBREAK cause the receiving privilege mode’s epc register to be set to the address of the ECALL or EBREAK instruction itself, not the address of the follo
|
By
Anne MERLANDE
·
|
|
Virtualization of "main memory" and "I/O" regions
5 messages
Hi all, The FENCE instruction exposes the difference between accesses to main memory and accesses to I/O devices via the predecessor and successor sets; however, the distinction is really only defined
Hi all, The FENCE instruction exposes the difference between accesses to main memory and accesses to I/O devices via the predecessor and successor sets; however, the distinction is really only defined
|
By
David Kruckemyer
·
|
|
[Announcement] Successful KVM RISC-V bring up on FPGA (Rocket core with H extension)
3 messages
Hi, We are glad to announce that we are able to boot Linux in KVM guest on a FPGA (Rocket chip + H extension v0.6.1). We now have three hypervisors working on a Hardware with H extension. 1. KVM [1] 2
Hi, We are glad to announce that we are able to boot Linux in KVM guest on a FPGA (Rocket chip + H extension v0.6.1). We now have three hypervisors working on a Hardware with H extension. 1. KVM [1] 2
|
By
atishp@...
·
|
|
Proposal: Delegating Exceptions from VS-mode or VU-mode to U-mode
14 messages
Hi all, In this proposal, we extended N extension and applied it to H extension for improving the performance of virtual I/O devices in the virtualization scenario. We proposed a new mechanism to dele
Hi all, In this proposal, we extended N extension and applied it to H extension for improving the performance of virtual I/O devices in the virtualization scenario. We proposed a new mechanism to dele
|
By
Yifei Jiang
·
|
|
rv57k virtual address space
5 messages
attached is a proposal for the definition of RV57K. RV57K is an extension to RV57. the main extension is to incorporate two HARDWARE registers. These registers are used to partition user and kernel ad
attached is a proposal for the definition of RV57K. RV57K is an extension to RV57. the main extension is to incorporate two HARDWARE registers. These registers are used to partition user and kernel ad
|
By
swallach
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
3 messages
My concern is that if an RNMI occurs during an exception handler, and the RNMI handler encounters an exception, the exception return point. cause, and prev. priv state is lost - that's fatal. It's als
My concern is that if an RNMI occurs during an exception handler, and the RNMI handler encounters an exception, the exception return point. cause, and prev. priv state is lost - that's fatal. It's als
|
By
Allen Baum
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
3 messages
One case where NMIs are used on x86 for non-fatal conditions is for performance monitoring. If an operating system wants to accurately measure its own performance, then ideally it should be able to sa
One case where NMIs are used on x86 for non-fatal conditions is for performance monitoring. If an operating system wants to accurately measure its own performance, then ideally it should be able to sa
|
By
Jonathan Behrens
·
|
|
Resumable NMI proposal
3 messages
1. I think some of the questions and discussion concerning this proposal have arisen because the proposal is a little too terse. It would be helpful to have more about the specific use cases that the
1. I think some of the questions and discussion concerning this proposal have arisen because the proposal is a little too terse. It would be helpful to have more about the specific use cases that the
|
By
John Hauser
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
5 messages
I am assuming here that NMI is an interrupt, not an exception. Both trap, but an mmie-bit only affects interrupts, not exceptions. So, on entry, the handler knows if this was caused by an NMI or by an
I am assuming here that NMI is an interrupt, not an exception. Both trap, but an mmie-bit only affects interrupts, not exceptions. So, on entry, the handler knows if this was caused by an NMI or by an
|
By
Allen Baum
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
Could you go into more detail on how nesting NMIs could work? Shouldn't it only be safe to execute MNRET with rnmie clear, because any NMI that came in between setting mnepc and executing MNRET would
Could you go into more detail on how nesting NMIs could work? Shouldn't it only be safe to execute MNRET with rnmie clear, because any NMI that came in between setting mnepc and executing MNRET would
|
By
Jonathan Behrens
·
|
|
MPIE and MPP update when returning from interrupt with MRET
4 messages
Hello The privileged architecture says that when returning from interrupt with MRET, MPIE is set to 1 (and MPP is set to U). What is the rational behind ? Is it still in the context of supporting nest
Hello The privileged architecture says that when returning from interrupt with MRET, MPIE is set to 1 (and MPP is set to U). What is the rational behind ? Is it still in the context of supporting nest
|
By
Anne MERLANDE
·
|
|
ePMP update
Hi TEE group, I would like to give a quick update on ePMP spec. Public review We are still waiting for unpriv group to approve new CSR address assignment. It’s been pending for a while because there’r
Hi TEE group, I would like to give a quick update on ePMP spec. Public review We are still waiting for unpriv group to approve new CSR address assignment. It’s been pending for a while because there’r
|
By
Joe Xie
·
|
|
[EXTERNAL]Re: [RISC-V] [tech-privileged] Performance Monitor Interrupts
2 messages
(+platforms, which Mark had added in.) Thanks for the quick reply Greg. Good to know it is of concern to others. 😊 I assume the specification will be posted for public review in the privileged workgro
(+platforms, which Mark had added in.) Thanks for the quick reply Greg. Good to know it is of concern to others. 😊 I assume the specification will be posted for public review in the privileged workgro
|
By
Sanjay Patel
·
|
|
Performance Monitor Interrupts
3 messages
Hi, I have some questions about the hpm CSRs. There is a conspicuous lack of an interrupt associated with a counter overflow. Are custom interrupts expected to be provided in a RISC-V implementation?
Hi, I have some questions about the hpm CSRs. There is a conspicuous lack of an interrupt associated with a counter overflow. Are custom interrupts expected to be provided in a RISC-V implementation?
|
By
Sanjay Patel
·
|
|
rv(64) address space size
11 messages
the current size of the virtual address space is 48 bits. (per the june 2019 spec - volume II) as many of you know, INTEL has increased their address space to 57 bits. several designers of server and
the current size of the virtual address space is 48 bits. (per the june 2019 spec - volume II) as many of you know, INTEL has increased their address space to 57 bits. several designers of server and
|
By
swallach
·
|
|
rv(64) address space size -benchmarks KASLR benchmarks
i found this after some time. this is an extensive set of benchmarks. comparing KASLR enabled and not enabled draw your own conclusions perhaps the summary tells it all https://www.phoronix.com/scan.p
i found this after some time. this is an extensive set of benchmarks. comparing KASLR enabled and not enabled draw your own conclusions perhaps the summary tells it all https://www.phoronix.com/scan.p
|
By
swallach
·
|
|
PTE access type in Virtual Address Translation
2 messages
From the Privileged spec, the 2nd step of virtual Address Translation process said, [2. Let pte be the value of the PTE at address a+va.vpn[i]×PTESIZE. (For Sv32, PTESIZE=4.) If accessing pte violates
From the Privileged spec, the 2nd step of virtual Address Translation process said, [2. Let pte be the value of the PTE at address a+va.vpn[i]×PTESIZE. (For Sv32, PTESIZE=4.) If accessing pte violates
|
By
Gracy Ge
·
|
|
Access unprivileged regions from OS
14 messages
Hi all, quoting the arm manual, "sometimes the OS does need to access unprivileged regions, for example, to write to a buffer owned by an application. To support this, the instruction set provides the
Hi all, quoting the arm manual, "sometimes the OS does need to access unprivileged regions, for example, to write to a buffer owned by an application. To support this, the instruction set provides the
|
By
Andrea Mondelli
·
|
|
ARM's new capability-based security ISA (building on top of ARMv8)
This is just a quick FYI. (Sorry if this is a bit spam'y; there isn't a clear TG to target with this email. And I don't expect that this is something that plays into any near-term RISC-V standardizati
This is just a quick FYI. (Sorry if this is a bit spam'y; there isn't a clear TG to target with this email. And I don't expect that this is something that plays into any near-term RISC-V standardizati
|
By
Greg Favor
·
|