|
[RISC-V][tech-os-a-see] [RISC-V] [tech-unprivileged] Direction of Identifying Extensions
7 messages
To add on to Alan's point. These "extension" names were created simply to represent individual line items in the Profiles. In many cases these represent a one or two sentence statement in a Profile ab
To add on to Alan's point. These "extension" names were created simply to represent individual line items in the Profiles. In many cases these represent a one or two sentence statement in a Profile ab
|
By
Greg Favor
·
|
|
[RISC-V][privileged-software] [RISC-V][tech-os-a-see] [RISC-V] [tech-unprivileged] Direction of Identifying Extensions
2 messages
Duplicating the information (i.e. having the individual extensions marked and the profile itself indicated) seems like an error-prone proposal, unless we mandate/enforce consistency checking. Given th
Duplicating the information (i.e. having the individual extensions marked and the profile itself indicated) seems like an error-prone proposal, unless we mandate/enforce consistency checking. Given th
|
By
Philipp Tomsich
·
|
|
[RISC-V] [tech-unprivileged] Direction of Identifying Extensions
3 messages
If you're looking at the same thing I was looking at: the "extension names" are not extensions, in the usual sense. They are names for the values of architectural options of extensions that already ex
If you're looking at the same thing I was looking at: the "extension names" are not extensions, in the usual sense. They are names for the values of architectural options of extensions that already ex
|
By
Allen Baum
·
|
|
[RISC-V] [tech-unprivileged] Direction of Identifying Extensions
2 messages
I'm also unclear of the "identifier" you mention for other unmentioned option value (e.g. your 64b cache block size example). Who is the consumer of that identifier? Is this a value you would expect t
I'm also unclear of the "identifier" you mention for other unmentioned option value (e.g. your 64b cache block size example). Who is the consumer of that identifier? Is this a value you would expect t
|
By
Allen Baum
·
|
|
Direction of Identifying Extensions
Hi All, First off, please redirect me where the most appropriate forum is to discuss this topic. I am casting a fairly wide net, but that's just trying to cover those who are impacted. We can convene
Hi All, First off, please redirect me where the most appropriate forum is to discuss this topic. I am casting a fairly wide net, but that's just trying to cover those who are impacted. We can convene
|
By
Aaron Durbin
·
|
|
Proof of concept for rv32 svpbmt support
3 messages
Make rv32 support svpbmt & napot by reducing the PPN witdth (sv32p34 -> sv32p31). RISC-V 32bit also requires svpbmt in cost-down chip embedded scenarios, and their RAM is limited (No more than 1GB). I
Make rv32 support svpbmt & napot by reducing the PPN witdth (sv32p34 -> sv32p31). RISC-V 32bit also requires svpbmt in cost-down chip embedded scenarios, and their RAM is limited (No more than 1GB). I
|
By
Guo Ren
·
|
|
Call for Chair/Vice-Chair Candidates for Performance Analysis SIG
This is a call for chair and vice-chair candidates for the recently created Performance Analysis SIG (umbrella: Privileged Software HC) All candidates must submit a biography (bio) and statements of i
This is a call for chair and vice-chair candidates for the recently created Performance Analysis SIG (umbrella: Privileged Software HC) All candidates must submit a biography (bio) and statements of i
|
By
Beeman Strong
·
|
|
Resumable NMI proposal
12 messages
Current RISC-V specs only have a non-resumable NMI definition. The following proposal would add resumable NMI support. This was one of the features requested for priv 1.12 or RVA/RVM22. This is up for
Current RISC-V specs only have a non-resumable NMI definition. The following proposal would add resumable NMI support. This was one of the features requested for priv 1.12 or RVA/RVM22. This is up for
|
By
Krste Asanovic
·
|
|
Smstateen for Zcmt
23 messages
Hi, We have a question on github about the implementation of smstateen for Zcmt (table jump). There's the JVT CSR which needs a state enable. The question is whether there is also a state-enable for t
Hi, We have a question on github about the implementation of smstateen for Zcmt (table jump). There's the JVT CSR which needs a state enable. The question is whether there is also a state-enable for t
|
By
Tariq Kurd
·
|
|
[RISC-V] [tech-crypto-ext] Read the seed CSR
3 messages
The seed CSR must be accessed with a read-write instruction. A read-only instruction raises an illegal instruction exception. So one could consider the wiping as occurring due to the write and not as
The seed CSR must be accessed with a read-write instruction. A read-only instruction raises an illegal instruction exception. So one could consider the wiping as occurring due to the write and not as
|
By
Ved Shanbhogue
·
|
|
Read the seed CSR
Hi, Maybe the little issue has been solved. I am just curious. The follows come from "4.1. The seed CSR" in Cryptography Extensions Volume I. It talks about the side effect on read the seed CSR. === 4
Hi, Maybe the little issue has been solved. I am just curious. The follows come from "4.1. The seed CSR" in Cryptography Extensions Volume I. It talks about the side effect on read the seed CSR. === 4
|
By
Paul Ku
·
|
|
Is there any accessible Linux KVM Nested Virtualization implementation?
3 messages
Hello All, Is there any accessible Linux KVM Nested Virtualization implementation? It doesn't seem like now any open source nested virtualizaion for kvm. Is H-extension now ready for nested virtualiza
Hello All, Is there any accessible Linux KVM Nested Virtualization implementation? It doesn't seem like now any open source nested virtualizaion for kvm. Is H-extension now ready for nested virtualiza
|
By
Yuxuan Liu
·
|
|
[PATCH] Wait for Interrupt: pause cycle performance counter
As alluded to in the unprivileged spec, what you propose is de facto legal because the definition of "cycle" is inherently fuzzy and implementation-dependent. See this lengthy discussion: https://gith
As alluded to in the unprivileged spec, what you propose is de facto legal because the definition of "cycle" is inherently fuzzy and implementation-dependent. See this lengthy discussion: https://gith
|
By
andrew@...
·
|
|
When only M-mode is implemented, should M-mode be able to access mhpmcounter* via the hpmcounter* CSR number?
3 messages
When only M-mode is implemented, should M-mode be able to access mhpmcounter* via the hpmcounter* CSR number? The spec appears to be unclear. On one hand, it says that all counters should be implement
When only M-mode is implemented, should M-mode be able to access mhpmcounter* via the hpmcounter* CSR number? The spec appears to be unclear. On one hand, it says that all counters should be implement
|
By
Ricardo Ramirez
·
|
|
[EXT] Re: [RISC-V] [tech-privileged] Query about PMP spec for misaligned access
16 messages
I read this line in the spec : “The matching PMP entry must match all bytes of an access, or the access fails, irrespective of the L, R, W, and X bits.” as an architecture statement. Meaning : If you
I read this line in the spec : “The matching PMP entry must match all bytes of an access, or the access fails, irrespective of the L, R, W, and X bits.” as an architecture statement. Meaning : If you
|
By
Jeff Scott
·
|
|
Query about PMP spec for misaligned access
7 messages
Hello, I’ve few queries regarding PMP spec for misaligned access. As per the pmp section in privileged spec, there are two lines as follows: “The matching PMP entry must match all bytes of an access,
Hello, I’ve few queries regarding PMP spec for misaligned access. As per the pmp section in privileged spec, there are two lines as follows: “The matching PMP entry must match all bytes of an access,
|
By
Ravinder Dasila
·
|
|
Tutorial on the RISCV privileged architecture?
Happy new year everybody! Is there a gentle introduction to the RISCV privileged architecture? I'm asking because I have an undergraduate who wants to learn about it so he can contribute Sail code, bu
Happy new year everybody! Is there a gentle introduction to the RISCV privileged architecture? I'm asking because I have an undergraduate who wants to learn about it so he can contribute Sail code, bu
|
By
Martin Berger
·
|
|
Preferred manner of supporting bus errors in RISC-V
8 messages
Hi all, We want to add support for ‘bus errors’ in our RISC-V design (e.g. signaled via AXI bresp/rresp signals). I studied a couple of different RISC-V architectures and I do not see a common approac
Hi all, We want to add support for ‘bus errors’ in our RISC-V design (e.g. signaled via AXI bresp/rresp signals). I studied a couple of different RISC-V architectures and I do not see a common approac
|
By
Arjan Bink
·
|
|
Quality of Service (QoS)
11 messages
Greeting all, I would like to start a discussion on supporting QoS capabilities in RISC-V architecture. I hope I am posting on the right list/TG/HC. First, a short background: Quality of Service (QoS)
Greeting all, I would like to start a discussion on supporting QoS capabilities in RISC-V architecture. I hope I am posting on the right list/TG/HC. First, a short background: Quality of Service (QoS)
|
By
Ved Shanbhogue
·
|
|
U bit in G-stage Translation Clarification
2 messages
The Privileged Spec says: Section 5.5.1 "For G-stage address translation, all memory accesses (including those made to access data structures for VS-stage address translation) are considered to be use
The Privileged Spec says: Section 5.5.1 "For G-stage address translation, all memory accesses (including those made to access data structures for VS-stage address translation) are considered to be use
|
By
Siqi Zhao
·
|