Skip to content

Commit

Permalink
Merge pull request #1276 from riscv/indirect-csr
Browse files Browse the repository at this point in the history
Indirect-csr integration into privileged spec.
  • Loading branch information
wmat authored Mar 20, 2024
2 parents b52aa90 + d596da0 commit b11c1f6
Show file tree
Hide file tree
Showing 2 changed files with 335 additions and 0 deletions.
334 changes: 334 additions & 0 deletions src/indirect-csr.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,334 @@
[[indirect-csr]]
== "Smcsrind/Sscsrind" Indirect CSR Access, Version 1.0.0

[[intro]]
=== Introduction

Smcsrind/Sscsrind is an ISA extension that extends the indirect CSR
access mechanism originally defined as part of the
https://github.com/riscv/riscv-aia[[.underline]#Smaia/Ssaia
extensions#], in order to make it available for use by other extensions
without creating an unnecessary dependence on Smaia/Ssaia.

This extension confers two benefits:

. It provides a means to access an array of registers via CSRs without
requiring allocation of large chunks of the limited CSR address space.

. It enables software to access each of an array of registers by index,
without requiring a switch statement with a case for each register.

[%unbreakable]
[NOTE]
====
CSRs are accessed indirectly via this extension using select values, in
contrast to being accessed directly using standard CSR numbers. A CSR
accessible via one method may or may not be accessible via the other
method. Select values are a separate address space from CSR numbers, and
from tselect values in the Sdtrig extension. If a CSR is both directly
and indirectly accessible, the CSR's select value is unrelated to its
CSR number.
Further, Machine-level and Supervisor-level select values are separate
address spaces from each other; however, Machine-level and
Supervisor-level CSRs with the same select value may be defined by an
extension as partial or full aliases with respect to each other. This
typically would be done for CSRs that can be delegated from
Machine-level to Supervisor-level.
====

The machine-level extension *Smcsrind* encompasses all added CSRs and
all behavior modifications for a hart, over all privilege levels. For a
supervisor-level environment, extension *Sscsrind* is essentially the
same as Smcsrind except excluding the machine-level CSRs and behavior
not directly visible to supervisor level.

[[body]]
=== Machine-level CSRs

[width="100%",cols="15%,12%,12%,15%,46%",options="header",]
|===
|*Number* |*Privilege* |*Width* |*Name* |*Description*
|0x350 |MRW |XLEN |`miselect` |Machine indirect register select
|0x351 |MRW |XLEN |`mireg` |Machine indirect register alias
|0x352 |MRW |XLEN |`mireg2` |Machine indirect register alias 2
|0x353 |MRW |XLEN |`mireg3` |Machine indirect register alias 3
|0x355 |MRW |XLEN |`mireg4` |Machine indirect register alias 4
|0x356 |MRW |XLEN |`mireg5` |Machine indirect register alias 5
|0x357 |MRW |XLEN |`mireg6` |Machine indirect register alias 6
|===

[%unbreakable]
[NOTE]
====
The `mireg*` CSR numbers are not consecutive because miph is CSR number
0x354.
====

The CSRs listed in the table above provide a window for accessing
register state indirectly. The value of `miselect` determines which
register is accessed upon read or write of each of the machine indirect alias
CSRs (`mireg*`). `miselect` value ranges are allocated to dependent
extensions, which specify the register state accessible via each
`mireg__i__` register, for each `miselect` value. `miselect` is a WARL
register.

The `miselect` register implements at least enough bits to support all
implemented `miselect` values (corresponding to the implemented extensions
that utilize `miselect`/`mireg*` to indirectly access register state). The
`miselect` register may be read-only zero if there are no extensions
implemented that utilize it.

Values of `miselect` with the most-significant bit set (bit XLEN - 1 = 1)
are designated only for custom use, presumably for accessing custom
registers through the alias CSRs. Values of `miselect` with the
most-significant bit clear are designated only for standard use and are
reserved until allocated to a standard architecture extension. If XLEN
is changed, the most-significant bit of `miselect` moves to the new
position, retaining its value from before.

[%unbreakable]
[NOTE]
====
An implementation is not required to support any custom values for
`miselect`.
====

The behavior upon accessing `mireg*` from M-mode, while `miselect` holds a
value that is not implemented, is UNSPECIFIED.

[%unbreakable]
[NOTE]
====
It is expected that implementations will typically raise an illegal
instruction exception for such accesses, so that, for example, they can
be identified as software bugs. Platform specs, profile specs, and/or
the Privileged ISA spec may place more restrictions on behavior for such
accesses.
====

Attempts to access `mireg*` while `miselect` holds a number in an allocated
and implemented range results in a specific behavior that, for each
combination of `miselect` and `mireg__i__`, is defined by the extension to
which the `miselect` value is allocated.

[%unbreakable]
[NOTE]
====
Ordinarily, each_ `__mireg__i` _will access register state, access
read-only 0 state, or raise an illegal instruction exception.
For RV32, if an extension defines an indirectly accessed register as 64 bits wide, it is recommended that the lower 32 bits of the register are accessed through one of `mireg`, `mireg2`, or `mireg3`, while the upper 32 bits are accessed through `mireg4`, `mireg5`, or `mireg6`, respectively.
====

[%unbreakable]
[NOTE]
====
Six `\*ireg*` registers are defined in order to ensure that the needs of extensions in development are covered, with some room for growth. For example, for an `siselect` value associated with counter X, `sireg`/`sireg2` could be used to access `mhpmcounterX`/`mhpmeventX`, while `sireg4`/`sireg5` could access `mhpmcounterXh`/`mhpmeventXh`. Six `\*ireg*` registers allows for accessing up to 3 CSR arrays per index (`*iselect`) with RV32-only CSRs, or up to 6 CSR arrays per index value without RV32-only CSRs.
====

=== Supervisor-level CSRs

[width="100%",cols="15%,12%,12%,15%,46%",options="header",]
|===
|*Number* |*Privilege* |*Width* |*Name* |*Description*
|0x150 |SRW |XLEN |`siselect` |Supervisor indirect register select
|0x151 |SRW |XLEN |`sireg` |Supervisor indirect register alias
|0x152 |SRW |XLEN |`sireg2` |Supervisor indirect register alias 2
|0x153 |SRW |XLEN |`sireg3` |Supervisor indirect register alias 3
|0x155 |SRW |XLEN |`sireg4` |Supervisor indirect register alias 4
|0x156 |SRW |XLEN |`sireg5` |Supervisor indirect register alias 5
|0x157 |SRW |XLEN |`sireg6` |Supervisor indirect register alias 6
|===

The CSRs in the table above are required if S-mode is implemented.

The `siselect` register will support the value range 0..0xFFF at a
minimum. A future extension may define a value range outside of this
minimum range. Only if such an extension is implemented will `siselect` be
required to support larger values.

[%unbreakable]
[NOTE]
====
Requiring a range of 0–0xFFF for `siselect`, even though most or
all of the space may be reserved or inaccessible, permits M-mode to
emulate indirectly accessed registers in this implemented range,
including registers that may be standardized in the future.
====

Values of `siselect` with the most-significant bit set (bit XLEN - 1 = 1)
are designated only for custom use, presumably for accessing custom registers through the alias
CSRs. Values of `siselect` with the most-significant bit clear are
designated only for standard use and are reserved until allocated to a
standard architecture extension. If XLEN is changed, the
most-significant bit of `siselect` moves to the new position, retaining
its value from before.

The behavior upon accessing `sireg*` from M-mode or S-mode, while `siselect`
holds a value that is not implemented at supervisor level, is UNSPECIFIED.

[%unbreakable]
[NOTE]
====
It is recommended that implementations raise an illegal instruction
exception for such accesses, to facilitate possible emulation (by
M-mode) of these accesses.
====

[%unbreakable]
[NOTE]
====
An extension is considered not to be implemented at supervisor level if
machine level has disabled the extension for S-mode, such as by the
settings of certain fields in CSR `menvcfg`, for example.
====

Otherwise, attempts to access `sireg*` from M-mode or S-mode while
`siselect` holds a number in a standard-defined and implemented range
result in specific behavior that, for each combination of `siselect` and
`sireg__i__`, is defined by the extension to which the `siselect` value is
allocated.

[%unbreakable]
[NOTE]
====
Ordinarily, each_ `__sireg__i` _will access register state, access
read-only 0 state, or, unless executing in a virtual machine (covered in
the next section), raise an illegal instruction exception.
====

Note that the widths of `siselect` and `sireg*` are always the
current XLEN rather than SXLEN. Hence, for example, if MXLEN = 64 and
SXLEN = 32, then these registers are 64 bits when the current privilege
mode is M (running RV64 code) but 32 bits when the privilege mode is S
(RV32 code).

=== Virtual Supervisor-level CSRs

[width="100%",cols="15%,12%,12%,15%,46%",options="header",]
|===
|*Number* |*Privilege* |*Width* |*Name* |*Description*
|0x250 |HRW |XLEN |`vsiselect` |Virtual supervisor indirect register
select

|0x251 |HRW |XLEN |`vsireg` |Virtual supervisor indirect register alias

|0x252 |HRW |XLEN |`vsireg2` |Virtual supervisor indirect register alias 2

|0x253 |HRW |XLEN |`vsireg3` |Virtual supervisor indirect register alias 3

|0x255 |HRW |XLEN |`vsireg4` |Virtual supervisor indirect register alias 4

|0x256 |HRW |XLEN |`vsireg5` |Virtual supervisor indirect register alias 5

|0x257 |HRW |XLEN |`vsireg6` |Virtual supervisor indirect register alias 6
|===

The CSRs in the table above are required if the hypervisor extension is
implemented. These VS CSRs all match supervisor CSRs, and substitute for
those supervisor CSRs when executing in a virtual machine (in VS-mode or
VU-mode).

The `vsiselect` register will support the value range 0..0xFFF at a
minimum. A future extension may define a value range outside of this
minimum range. Only if such an extension is implemented will `vsiselect`
be required to support larger values.

[%unbreakable]
[NOTE]
====
Requiring a range of 0–0xFFF for `vsiselect`, even though most or all of
the space may be reserved or inaccessible, permits a hypervisor to
emulate indirectly accessed registers in this implemented range,
including registers that may be standardized in the future.
More generally it is recommended that `vsiselect` and `siselect` be
implemented with the same number of bits. This also avoids creation of a
virtualization hole due to observable differences between `vsiselect` and
`siselect` widths.
====

Values of `vsiselect` with the most-significant bit set (bit XLEN - 1 = 1)
are designated only for custom use, presumably for accessing custom registers through the alias
CSRs. Values of `vsiselect` with the most-significant bit clear are
designated only for standard use and are reserved until allocated to a
standard architecture extension. If XLEN is changed, the
most-significant bit of `vsiselect` moves to the new position, retaining
its value from before.

For alias CSRs `sireg*` and `vsireg*`, the hypervisor extension’s usual
rules for when to raise a virtual instruction exception (based on
whether an instruction is HS-qualified) are not applicable. The
rules given in this section for `sireg` and `vsireg` apply instead, unless
overridden by the requirements specified in the section below, which
take precedence over this section when extension Smstateen is also
implemented.

A virtual instruction exception is raised for attempts from VS-mode or VU-mode to directly access `vsiselect` or `vsireg*`, or attempts from VU-mode to access `siselect` or `sireg*`.

The behavior upon accessing `vsireg*` from M-mode or HS-mode, or accessing `sireg*` (really `vsireg*`) from VS-mode, while `vsiselect` holds a value that is not implemented at HS level, is UNSPECIFIED.

[%unbreakable]
[NOTE]
====
It is recommended that implementations raise an illegal instruction exception for such accesses, to facilitate possible emulation (by M-mode) of these accesses.
====

Otherwise, while `vsiselect` holds a number in a standard-defined and
implemented range, attempts to access `vsireg*` from a sufficiently
privileged mode, or to access `sireg*` (really `vsireg*`) from VS-mode,
result in specific behavior that, for each combination of `vsiselect` and
`vsireg__i__`, is defined by the extension to which the `vsiselect` value is
allocated.

[%unbreakable]
[NOTE]
====
Ordinarily, each_ `__vsireg__i` _will access register state, access read-only 0 state, or raise an exception (either an illegal instruction exception or, for select accesses from VS-mode, a virtual instruction exception). When `vsiselect` holds a value that is implemented at HS level but not at VS level, attempts to access `sireg*` (really `vsireg*`) from VS-mode will typically raise a virtual instruction exception. But there may be cases specific to an extension where different behavior is more appropriate.
====

Like `siselect` and `sireg*`, the widths of `vsiselect` and `vsireg*` are always
the current XLEN rather than VSXLEN. Hence, for example, if HSXLEN = 64
and VSXLEN = 32, then these registers are 64 bits when accessed by a
hypervisor in HS-mode (running RV64 code) but 32 bits for a guest OS in
VS-mode (RV32 code).

=== Access control by the state-enable CSRs

If extension Smstateen is implemented together with Smcsrind, bit 60 of
state-enable register `mstateen0` controls access to `siselect`, `sireg*`,
`vsiselect`, and `vsireg*`. When `mstateen0`[60]=0, an attempt to access one
of these CSRs from a privilege mode less privileged than M-mode results
in an illegal instruction exception. As always, the state-enable CSRs do
not affect the accessibility of any state when in M-mode, only in less
privileged modes. For more explanation, see the documentation for
extension
https://github.com/riscv/riscv-state-enable/releases/download/v1.0.0/Smstateen.pdf[[.underline]#Smstateen#].

Other extensions may specify that certain mstateen bits control access
to registers accessed indirectly through `siselect` + `sireg*`, and/or
`vsiselect` + `vsireg*`. However, regardless of any other mstateen bits, if
`mstateen0`[60] = 1, a virtual instruction exception is raised as
described in the previous section for all attempts from VS-mode or
VU-mode to directly access `vsiselect` or `vsireg*`, and for all attempts
from VU-mode to access `siselect` or `sireg*`.

If the hypervisor extension is implemented, the same bit is defined also
in hypervisor CSR `hstateen0`, but controls access to only `siselect` and `sireg*`
(really `vsiselect` and `vsireg*`), which is the state potentially
accessible to a virtual machine executing in VS or VU-mode. When
`hstateen0`[60]=0 and `mstateen0`[60]=1, all attempts from VS or VU-mode to
access `siselect` or `sireg*` raise a virtual instruction exception, not an
illegal instruction exception, regardless of the value of `vsiselect` or
any other mstateen bit.

Extension Ssstateen is defined as the supervisor-level view of
Smstateen. Therefore, the combination of Sscsrind and Ssstateen
incorporates the bit defined above for `hstateen0` but not that for
`mstateen0`, since machine-level CSRs are not visible to supervisor level.

[NOTE]
====
CSR address space is reserved for a possible future "Sucsrind" extension that extends indirect CSR access to user mode.
====
1 change: 1 addition & 0 deletions src/riscv-privileged.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -98,6 +98,7 @@ include::smcntrpmf.adoc[]
//hypervisor.tex
include::hypervisor.adoc[]
include::sstc.adoc[]
include::indirect-csr.adoc[]
//priv-insns.tex
include::priv-insns.adoc[]
//priv-history.tex
Expand Down

0 comments on commit b11c1f6

Please sign in to comment.