qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v9 12/14] target/riscv: rvk: add CSR support for Zkr


From: Alistair Francis
Subject: Re: [PATCH v9 12/14] target/riscv: rvk: add CSR support for Zkr
Date: Thu, 14 Apr 2022 09:57:37 +1000

On Mon, Apr 11, 2022 at 2:46 PM Weiwei Li <liweiwei@iscas.ac.cn> wrote:
>
> Hi, any comments on this patch or patchset?
>
> Currently, read-only instruction to access Seed CSR is checked as a
> special case in helper_csrr as suggested in
>
> https://lists.nongnu.org/archive/html/qemu-riscv/2022-03/msg00146.html.

Ah sorry, I didn't realise you had updated this.

>
> (The new version for that patch is in
> https://lists.nongnu.org/archive/html/qemu-riscv/2022-03/msg00156.html)
>
> Regards,
>
> Weiwei Li
>
> 在 2022/3/18 下午12:19, Weiwei Li 写道:
> >   - add SEED CSR which must be accessed with a read-write instruction:
> >     A read-only instruction such as CSRRS/CSRRC with rs1=x0 or CSRRSI/CSRRCI
> > with uimm=0 will raise an illegal instruction exception.
> >   - add USEED, SSEED fields for MSECCFG CSR
> >
> > Co-authored-by: Ruibo Lu <luruibo2000@163.com>
> > Co-authored-by: Zewen Ye <lustrew@foxmail.com>
> > Signed-off-by: Weiwei Li <liweiwei@iscas.ac.cn>
> > Signed-off-by: Junqiang Wang <wangjunqiang@iscas.ac.cn>
> > ---
> >   target/riscv/cpu_bits.h  |  9 ++++++
> >   target/riscv/csr.c       | 68 ++++++++++++++++++++++++++++++++++++++++
> >   target/riscv/op_helper.c |  9 ++++++
> >   target/riscv/pmp.h       |  8 +++--
> >   4 files changed, 91 insertions(+), 3 deletions(-)
> >
> > diff --git a/target/riscv/cpu_bits.h b/target/riscv/cpu_bits.h
> > index bb47cf7e77..d401100f47 100644
> > --- a/target/riscv/cpu_bits.h
> > +++ b/target/riscv/cpu_bits.h
> > @@ -458,6 +458,9 @@
> >   #define CSR_VSPMMASK        0x2c1
> >   #define CSR_VSPMBASE        0x2c2
> >
> > +/* Crypto Extension */
> > +#define CSR_SEED            0x015
> > +
> >   /* mstatus CSR bits */
> >   #define MSTATUS_UIE         0x00000001
> >   #define MSTATUS_SIE         0x00000002
> > @@ -800,4 +803,10 @@ typedef enum RISCVException {
> >   #define HVICTL_VALID_MASK                  \
> >       (HVICTL_VTI | HVICTL_IID | HVICTL_IPRIOM | HVICTL_IPRIO)
> >
> > +/* seed CSR bits */
> > +#define SEED_OPST                        (0b11 << 30)
> > +#define SEED_OPST_BIST                   (0b00 << 30)
> > +#define SEED_OPST_WAIT                   (0b01 << 30)
> > +#define SEED_OPST_ES16                   (0b10 << 30)
> > +#define SEED_OPST_DEAD                   (0b11 << 30)
> >   #endif
> > diff --git a/target/riscv/csr.c b/target/riscv/csr.c
> > index 3c61dd69af..5717a51f56 100644
> > --- a/target/riscv/csr.c
> > +++ b/target/riscv/csr.c
> > @@ -24,6 +24,8 @@
> >   #include "qemu/main-loop.h"
> >   #include "exec/exec-all.h"
> >   #include "sysemu/cpu-timers.h"
> > +#include "qemu/guest-random.h"
> > +#include "qapi/error.h"
> >
> >   /* CSR function table public API */
> >   void riscv_get_csr_ops(int csrno, riscv_csr_operations *ops)
> > @@ -292,6 +294,40 @@ static RISCVException epmp(CPURISCVState *env, int 
> > csrno)
> >   }
> >   #endif
> >
> > +static RISCVException seed(CPURISCVState *env, int csrno)
> > +{
> > +    RISCVCPU *cpu = env_archcpu(env);
> > +
> > +    if (!cpu->cfg.ext_zkr) {
> > +        return RISCV_EXCP_ILLEGAL_INST;
> > +    }
> > +
> > +#if !defined(CONFIG_USER_ONLY)
> > +    if (riscv_has_ext(env, RVS) && riscv_has_ext(env, RVH)) {
> > +        /* Hypervisor extension is supported */
> > +        if (riscv_cpu_virt_enabled(env) && (env->priv != PRV_M)) {

You can simplify this to just riscv_cpu_virt_enabled(). You don't need
to check if we have the extension as well.

> > +            if (env->mseccfg & MSECCFG_SSEED) {
> > +                return RISCV_EXCP_VIRT_INSTRUCTION_FAULT;
> > +            } else {
> > +                return RISCV_EXCP_ILLEGAL_INST;
> > +            }
> > +        }
> > +    }
> > +
> > +    if (env->priv == PRV_M) {
> > +        return RISCV_EXCP_NONE;
> > +    } else if (env->priv == PRV_S && (env->mseccfg & MSECCFG_SSEED)) {
> > +        return RISCV_EXCP_NONE;
> > +    } else if (env->priv == PRV_U && (env->mseccfg & MSECCFG_USEED)) {
> > +        return RISCV_EXCP_NONE;
> > +    } else {
> > +        return RISCV_EXCP_ILLEGAL_INST;
> > +    }
> > +#else
> > +    return RISCV_EXCP_NONE;
> > +#endif
> > +}
> > +
> >   /* User Floating-Point CSRs */
> >   static RISCVException read_fflags(CPURISCVState *env, int csrno,
> >                                     target_ulong *val)
> > @@ -2961,6 +2997,35 @@ static RISCVException write_upmbase(CPURISCVState 
> > *env, int csrno,
> >
> >   #endif
> >
> > +/* Crypto Extension */
> > +static RISCVException rmw_seed(CPURISCVState *env, int csrno,
> > +                              target_ulong *ret_value,
> > +                              target_ulong new_value, target_ulong 
> > write_mask)
> > +{
> > +    uint16_t random_v;
> > +    Error *random_e = NULL;
> > +    int random_r;
> > +
> > +    random_r = qemu_guest_getrandom(&random_v, 2, &random_e);
> > +    if (unlikely(random_r < 0)) {
> > +        /*
> > +         * Failed, for unknown reasons in the crypto subsystem.
> > +         * The best we can do is log the reason and return a
> > +         * failure indication to the guest.  There is no reason
> > +         * we know to expect the failure to be transitory, so
> > +         * indicate DEAD to avoid having the guest spin on WAIT.
> > +         */
> > +        qemu_log_mask(LOG_UNIMP, "%s: Crypto failure: %s",
> > +                      __func__, error_get_pretty(random_e));
> > +        error_free(random_e);
> > +        *ret_value = SEED_OPST_DEAD;
> > +    } else {
> > +        *ret_value = random_v | SEED_OPST_ES16;
> > +    }

Won't this seg fault if a guest does a CSR write?

> > +
> > +    return RISCV_EXCP_NONE;
> > +}
> > +
> >   /*
> >    * riscv_csrrw - read and/or update control and status register
> >    *
> > @@ -3205,6 +3270,9 @@ riscv_csr_operations csr_ops[CSR_TABLE_SIZE] = {
> >       [CSR_TIME]  = { "time",  ctr,   read_time  },
> >       [CSR_TIMEH] = { "timeh", ctr32, read_timeh },
> >
> > +    /* Crypto Extension */
> > +    [CSR_SEED] = { "seed", seed, NULL, NULL, rmw_seed },
> > +
> >   #if !defined(CONFIG_USER_ONLY)
> >       /* Machine Timers and Counters */
> >       [CSR_MCYCLE]    = { "mcycle",    any,   read_instret  },
> > diff --git a/target/riscv/op_helper.c b/target/riscv/op_helper.c
> > index e0d708091e..3d8443416d 100644
> > --- a/target/riscv/op_helper.c
> > +++ b/target/riscv/op_helper.c
> > @@ -39,6 +39,15 @@ void helper_raise_exception(CPURISCVState *env, uint32_t 
> > exception)
> >
> >   target_ulong helper_csrr(CPURISCVState *env, int csr)
> >   {
> > +    /*
> > +     * The seed CSR must be accessed with a read-write instruction. A
> > +     * read-only instruction such as CSRRS/CSRRC with rs1=x0 or CSRRSI/
> > +     * CSRRCI with uimm=0 will raise an illegal instruction exception.
> > +     */
> > +    if (csr == CSR_SEED) {
> > +        riscv_raise_exception(env, RISCV_EXCP_ILLEGAL_INST, GETPC());
> > +    }
> > +
> >       target_ulong val = 0;
> >       RISCVException ret = riscv_csrrw(env, csr, &val, 0, 0, false);
> >
> > diff --git a/target/riscv/pmp.h b/target/riscv/pmp.h
> > index fcb6b7c467..a8dd797476 100644
> > --- a/target/riscv/pmp.h
> > +++ b/target/riscv/pmp.h
> > @@ -39,9 +39,11 @@ typedef enum {
> >   } pmp_am_t;
> >
> >   typedef enum {
> > -    MSECCFG_MML  = 1 << 0,
> > -    MSECCFG_MMWP = 1 << 1,
> > -    MSECCFG_RLB  = 1 << 2
> > +    MSECCFG_MML   = 1 << 0,
> > +    MSECCFG_MMWP  = 1 << 1,
> > +    MSECCFG_RLB   = 1 << 2,

Why are these ones being changed?

Alistair

> > +    MSECCFG_USEED = 1 << 8,
> > +    MSECCFG_SSEED = 1 << 9
> >   } mseccfg_field_t;
> >
> >   typedef struct {
>
>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]