On 17/10/2024 10:35, Clément Léger wrote:
> 
> 
> On 16/10/2024 11:40, LIU Zhiwei wrote:
>>
>> On 2024/10/14 19:22, Clément Léger wrote:
>>> Add ext_ssdbltrp in RISCVCPUConfig and implement MSTATUS.SDT,
>>> {H|M}ENVCFG.DTE and modify the availability of MTVAL2 based on the
>>> presence of the Ssdbltrp ISA extension.
>>>
>>> Signed-off-by: Clément Léger <cle...@rivosinc.com>
>>> Reviewed-by: Alistair Francis <alistair.fran...@wdc.com>
>>> ---
>>>   target/riscv/cpu.h        |  1 +
>>>   target/riscv/cpu_bits.h   |  6 ++++++
>>>   target/riscv/cpu_cfg.h    |  1 +
>>>   target/riscv/cpu_helper.c | 20 +++++++++++++++++
>>>   target/riscv/csr.c        | 45 ++++++++++++++++++++++++++++++---------
>>>   5 files changed, 63 insertions(+), 10 deletions(-)
>>>
>>> diff --git a/target/riscv/cpu.h b/target/riscv/cpu.h
>>> index a84e719d3f..ee984bf270 100644
>>> --- a/target/riscv/cpu.h
>>> +++ b/target/riscv/cpu.h
>>> @@ -553,6 +553,7 @@ void riscv_cpu_set_geilen(CPURISCVState *env,
>>> target_ulong geilen);
>>>   bool riscv_cpu_vector_enabled(CPURISCVState *env);
>>>   void riscv_cpu_set_virt_enabled(CPURISCVState *env, bool enable);
>>>   int riscv_env_mmu_index(CPURISCVState *env, bool ifetch);
>>> +bool riscv_env_smode_dbltrp_enabled(CPURISCVState *env, bool virt);
>>>   G_NORETURN void  riscv_cpu_do_unaligned_access(CPUState *cs, vaddr
>>> addr,
>>>                                                  MMUAccessType
>>> access_type,
>>>                                                  int mmu_idx,
>>> uintptr_t retaddr);
>>> diff --git a/target/riscv/cpu_bits.h b/target/riscv/cpu_bits.h
>>> index da1723496c..3a5588d4df 100644
>>> --- a/target/riscv/cpu_bits.h
>>> +++ b/target/riscv/cpu_bits.h
>>> @@ -558,6 +558,7 @@
>>>   #define MSTATUS_TVM         0x00100000 /* since: priv-1.10 */
>>>   #define MSTATUS_TW          0x00200000 /* since: priv-1.10 */
>>>   #define MSTATUS_TSR         0x00400000 /* since: priv-1.10 */
>>> +#define MSTATUS_SDT         0x01000000
>>>   #define MSTATUS_GVA         0x4000000000ULL
>>>   #define MSTATUS_MPV         0x8000000000ULL
>>>   @@ -588,6 +589,7 @@ typedef enum {
>>>   #define SSTATUS_XS          0x00018000
>>>   #define SSTATUS_SUM         0x00040000 /* since: priv-1.10 */
>>>   #define SSTATUS_MXR         0x00080000
>>> +#define SSTATUS_SDT         0x01000000
>>>     #define SSTATUS64_UXL       0x0000000300000000ULL
>>>   @@ -777,11 +779,13 @@ typedef enum RISCVException {
>>>   #define MENVCFG_CBIE                       (3UL << 4)
>>>   #define MENVCFG_CBCFE                      BIT(6)
>>>   #define MENVCFG_CBZE                       BIT(7)
>>> +#define MENVCFG_DTE                        (1ULL << 59)
>>>   #define MENVCFG_ADUE                       (1ULL << 61)
>>>   #define MENVCFG_PBMTE                      (1ULL << 62)
>>>   #define MENVCFG_STCE                       (1ULL << 63)
>>>     /* For RV32 */
>>> +#define MENVCFGH_DTE                       BIT(27)
>>>   #define MENVCFGH_ADUE                      BIT(29)
>>>   #define MENVCFGH_PBMTE                     BIT(30)
>>>   #define MENVCFGH_STCE                      BIT(31)
>>> @@ -795,11 +799,13 @@ typedef enum RISCVException {
>>>   #define HENVCFG_CBIE                       MENVCFG_CBIE
>>>   #define HENVCFG_CBCFE                      MENVCFG_CBCFE
>>>   #define HENVCFG_CBZE                       MENVCFG_CBZE
>>> +#define HENVCFG_DTE                        MENVCFG_DTE
>>>   #define HENVCFG_ADUE                       MENVCFG_ADUE
>>>   #define HENVCFG_PBMTE                      MENVCFG_PBMTE
>>>   #define HENVCFG_STCE                       MENVCFG_STCE
>>>     /* For RV32 */
>>> +#define HENVCFGH_DTE                        MENVCFGH_DTE
>>>   #define HENVCFGH_ADUE                       MENVCFGH_ADUE
>>>   #define HENVCFGH_PBMTE                      MENVCFGH_PBMTE
>>>   #define HENVCFGH_STCE                       MENVCFGH_STCE
>>> diff --git a/target/riscv/cpu_cfg.h b/target/riscv/cpu_cfg.h
>>> index ae2a945b5f..dd804f95d4 100644
>>> --- a/target/riscv/cpu_cfg.h
>>> +++ b/target/riscv/cpu_cfg.h
>>> @@ -77,6 +77,7 @@ struct RISCVCPUConfig {
>>>       bool ext_smstateen;
>>>       bool ext_sstc;
>>>       bool ext_smcntrpmf;
>>> +    bool ext_ssdbltrp;
>>>       bool ext_svadu;
>>>       bool ext_svinval;
>>>       bool ext_svnapot;
>>> diff --git a/target/riscv/cpu_helper.c b/target/riscv/cpu_helper.c
>>> index 9d0400035f..77e7736d8a 100644
>>> --- a/target/riscv/cpu_helper.c
>>> +++ b/target/riscv/cpu_helper.c
>>> @@ -63,6 +63,22 @@ int riscv_env_mmu_index(CPURISCVState *env, bool
>>> ifetch)
>>>   #endif
>>>   }
>>>   +bool riscv_env_smode_dbltrp_enabled(CPURISCVState *env, bool virt)
>>> +{
>>> +#ifdef CONFIG_USER_ONLY
>>> +    return false;
>>> +#else
>>> +    if (!riscv_cpu_cfg(env)->ext_ssdbltrp) {
>>> +        return false;
>>> +    }
>>
>> As we have guard the write to henvcfg and menvcfg by ext_ssdbltrp, I
>> think it is enough only check henvcfg or menvcfg.
>>
>> The only miss is we don't guard the writhe to henvcfgh. I think we can
>> add the guard there.
> 
> Hi Liu,
> 
> Actually, since write_henvcfgh() uses mencvfg & (... | HENVCFG_DTE) as a
> mask to write the value, if the MENVCFG_DTE bit is not set in menvcfg,
> then it won't be set in henvcfgh as well. So I guess you are right about
> removing the ext_ssdbltrp check.
> 
>>
>>> +    if (virt) {
>>> +        return (env->henvcfg & HENVCFG_DTE) != 0;
>>> +    } else {
>>> +        return (env->menvcfg & MENVCFG_DTE) != 0;
>>> +    }
>>> +#endif
>>> +}
>>> +
>>>   void cpu_get_tb_cpu_state(CPURISCVState *env, vaddr *pc,
>>>                             uint64_t *cs_base, uint32_t *pflags)
>>>   {
>>> @@ -562,6 +578,10 @@ void riscv_cpu_swap_hypervisor_regs(CPURISCVState
>>> *env)
>>>         g_assert(riscv_has_ext(env, RVH));
>>>   +    if (riscv_env_smode_dbltrp_enabled(env, current_virt)) {
>>> +        mstatus_mask |= MSTATUS_SDT;
>>> +    }
>>> +
>>>       if (current_virt) {
>>>           /* Current V=1 and we are about to change to V=0 */
>>>           env->vsstatus = env->mstatus & mstatus_mask;
>>> diff --git a/target/riscv/csr.c b/target/riscv/csr.c
>>> index e5de72453c..d8280ec956 100644
>>> --- a/target/riscv/csr.c
>>> +++ b/target/riscv/csr.c
>>> @@ -540,6 +540,15 @@ static RISCVException aia_hmode32(CPURISCVState
>>> *env, int csrno)
>>>       return hmode32(env, csrno);
>>>   }
>>>   +static RISCVException dbltrp_hmode(CPURISCVState *env, int csrno)
>>> +{
>>> +    if (riscv_cpu_cfg(env)->ext_ssdbltrp) {
>>> +        return RISCV_EXCP_NONE;
>>> +    }
>>> +
>>> +    return hmode(env, csrno);
>>> +}
>>> +
>>>   static RISCVException pmp(CPURISCVState *env, int csrno)
>>>   {
>>>       if (riscv_cpu_cfg(env)->pmp) {
>>> @@ -1402,7 +1411,7 @@ static const target_ulong vs_delegable_excps =
>>> DELEGABLE_EXCPS &
>>>         (1ULL << (RISCV_EXCP_STORE_GUEST_AMO_ACCESS_FAULT)));
>>>   static const target_ulong sstatus_v1_10_mask = SSTATUS_SIE |
>>> SSTATUS_SPIE |
>>>       SSTATUS_UIE | SSTATUS_UPIE | SSTATUS_SPP | SSTATUS_FS |
>>> SSTATUS_XS |
>>> -    SSTATUS_SUM | SSTATUS_MXR | SSTATUS_VS;
>>> +    SSTATUS_SUM | SSTATUS_MXR | SSTATUS_VS | SSTATUS_SDT;
>> This breaks  the v_1_10 constraint, as it is not part of 1.10
>> specification.
> 
> Yes, you are right, I'll add individual checks for this bit.
> 
>>>     /*
>>>    * Spec allows for bits 13:63 to be either read-only or writable.
>>> @@ -1600,6 +1609,14 @@ static RISCVException
>>> write_mstatus(CPURISCVState *env, int csrno,
>>>           mask |= MSTATUS_VS;
>>>       }
>>>   +    if (riscv_env_smode_dbltrp_enabled(env, env->virt_enabled)) {
>>> +        mask |= MSTATUS_SDT;
>>> +        if ((val & MSTATUS_SDT) != 0) {
>>> +            mstatus &= ~MSTATUS_SIE;
>> No need to clean it, if MSTATUS_SIE will be cleaned in val.
> 
> Indeed.
> 
>>> +            val &= ~MSTATUS_SIE;
>>> +        }
>>> +    }
>>> +
>> I think we should also consider vsstatus for SIE field, as
>> write_vsstatus doesn't fall through to write_mstatus.
> 
> It seems like write_vsstatus() allows any value to be written when
> accessed directly. But it is masked correctly when swapping for hs to
> virt in riscv_cpu_swap_hypervisor_regs(). So I guess the check for SIE
> should actually be done in riscv_cpu_swap_hypervisor_regs() itself
> before setting mstatus from vsstatus ?

Hum actually, clearing SIE when writing vsstatus with SDT seems easier
to handler but the specification does not seems to imply anything about
legal vsstatus values when written  with V=0. And currently, the qemu
implementation allow any value to be written so that seems that clearing
vsstatus when using it to enter V=1 is better. But if any expert could
step in there, that would be helpful :)

Thanks,

Clément

> 
> 
>>>       if (xl != MXL_RV32 || env->debugger) {
>>>           if (riscv_has_ext(env, RVH)) {
>>>               mask |= MSTATUS_MPV | MSTATUS_GVA;
>>> @@ -2354,7 +2371,8 @@ static RISCVException
>>> write_menvcfg(CPURISCVState *env, int csrno,
>>>       if (riscv_cpu_mxl(env) == MXL_RV64) {
>>>           mask |= (cfg->ext_svpbmt ? MENVCFG_PBMTE : 0) |
>>>                   (cfg->ext_sstc ? MENVCFG_STCE : 0) |
>>> -                (cfg->ext_svadu ? MENVCFG_ADUE : 0);
>>> +                (cfg->ext_svadu ? MENVCFG_ADUE : 0) |
>>> +                (cfg->ext_ssdbltrp ? MENVCFG_DTE : 0);
>>>       }
>>>       env->menvcfg = (env->menvcfg & ~mask) | (val & mask);
>>>   @@ -2374,7 +2392,8 @@ static RISCVException
>>> write_menvcfgh(CPURISCVState *env, int csrno,
>>>       const RISCVCPUConfig *cfg = riscv_cpu_cfg(env);
>>>       uint64_t mask = (cfg->ext_svpbmt ? MENVCFG_PBMTE : 0) |
>>>                       (cfg->ext_sstc ? MENVCFG_STCE : 0) |
>>> -                    (cfg->ext_svadu ? MENVCFG_ADUE : 0);
>>> +                    (cfg->ext_svadu ? MENVCFG_ADUE : 0) |
>>> +                    (cfg->ext_ssdbltrp ? MENVCFG_DTE : 0);
>>>       uint64_t valh = (uint64_t)val << 32;
>>>         env->menvcfg = (env->menvcfg & ~mask) | (valh & mask);
>>> @@ -2425,9 +2444,10 @@ static RISCVException
>>> read_henvcfg(CPURISCVState *env, int csrno,
>>>        * henvcfg.pbmte is read_only 0 when menvcfg.pbmte = 0
>>>        * henvcfg.stce is read_only 0 when menvcfg.stce = 0
>>>        * henvcfg.adue is read_only 0 when menvcfg.adue = 0
>>> +     * henvcfg.dte is read_only 0 when menvcfg.dte = 0
>>>        */
>>> -    *val = env->henvcfg & (~(HENVCFG_PBMTE | HENVCFG_STCE |
>>> HENVCFG_ADUE) |
>>> -                           env->menvcfg);
>>> +    *val = env->henvcfg & (~(HENVCFG_PBMTE | HENVCFG_STCE |
>>> HENVCFG_ADUE |
>>> +                             HENVCFG_DTE) | env->menvcfg);
>>>       return RISCV_EXCP_NONE;
>>>   }
>>>   @@ -2435,6 +2455,7 @@ static RISCVException
>>> write_henvcfg(CPURISCVState *env, int csrno,
>>>                                       target_ulong val)
>>>   {
>>>       uint64_t mask = HENVCFG_FIOM | HENVCFG_CBIE | HENVCFG_CBCFE |
>>> HENVCFG_CBZE;
>>> +    uint64_t menvcfg_mask;
>>>       RISCVException ret;
>>>         ret = smstateen_acc_ok(env, 0, SMSTATEEN0_HSENVCFG);
>>> @@ -2443,7 +2464,11 @@ static RISCVException
>>> write_henvcfg(CPURISCVState *env, int csrno,
>>>       }
>>>         if (riscv_cpu_mxl(env) == MXL_RV64) {
>>> -        mask |= env->menvcfg & (HENVCFG_PBMTE | HENVCFG_STCE |
>>> HENVCFG_ADUE);
>>> +        menvcfg_mask = HENVCFG_PBMTE | HENVCFG_STCE | HENVCFG_ADUE;
>>> +        if (riscv_cpu_cfg(env)->ext_ssdbltrp) {
>>> +            menvcfg_mask |= HENVCFG_DTE;
>>> +        }
>>> +        mask |= env->menvcfg & menvcfg_mask;
>>>       }
>>>         env->henvcfg = (env->henvcfg & ~mask) | (val & mask);
>>> @@ -2461,8 +2486,8 @@ static RISCVException
>>> read_henvcfgh(CPURISCVState *env, int csrno,
>>>           return ret;
>>>       }
>>>   -    *val = (env->henvcfg & (~(HENVCFG_PBMTE | HENVCFG_STCE |
>>> HENVCFG_ADUE) |
>>> -                            env->menvcfg)) >> 32;
>>> +    *val = (env->henvcfg & (~(HENVCFG_PBMTE | HENVCFG_STCE |
>>> HENVCFG_ADUE |
>>> +                              HENVCFG_DTE) | env->menvcfg)) >> 32;
>>>       return RISCV_EXCP_NONE;
>>>   }
>>>   @@ -2470,7 +2495,7 @@ static RISCVException
>>> write_henvcfgh(CPURISCVState *env, int csrno,
>>>                                        target_ulong val)
>>>   {
>>>       uint64_t mask = env->menvcfg & (HENVCFG_PBMTE | HENVCFG_STCE |
>>> -                                    HENVCFG_ADUE);
>>> +                                    HENVCFG_ADUE | HENVCFG_DTE);
>>
>> Add the ssdbltrp guard here.
> 
> As said at the beginning, since henvcfgh uses the menvcfg value as the
> mask, if DTE isn't enabled in menvcfg then henvcfg will not be written
> as well (and the DTE write in menvcfg is guarded by ext_ssdbltrp).
> 
> Thanks for the review,
> 
> Clément
> 
>>
>> Thanks,
>> Zhiwei
>>
>>>       uint64_t valh = (uint64_t)val << 32;
>>>       RISCVException ret;
>>>   @@ -5246,7 +5271,7 @@ riscv_csr_operations csr_ops[CSR_TABLE_SIZE] = {
>>>       [CSR_VSATP]       = { "vsatp",       hmode,   read_vsatp,   
>>> write_vsatp,
>>>                             .min_priv_ver =
>>> PRIV_VERSION_1_12_0                },
>>>   -    [CSR_MTVAL2]      = { "mtval2",      hmode,   read_mtval2,  
>>> write_mtval2,
>>> +    [CSR_MTVAL2]      = { "mtval2", dbltrp_hmode, read_mtval2,
>>> write_mtval2,
>>>                             .min_priv_ver =
>>> PRIV_VERSION_1_12_0                },
>>>       [CSR_MTINST]      = { "mtinst",      hmode,   read_mtinst,  
>>> write_mtinst,
>>>                             .min_priv_ver =
>>> PRIV_VERSION_1_12_0                },
> 


Reply via email to