[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] target/riscv: PMP violation due to wrong size parameter
From: |
Richard Henderson |
Subject: |
Re: [PATCH] target/riscv: PMP violation due to wrong size parameter |
Date: |
Mon, 7 Oct 2019 09:00:36 -0400 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 |
On 10/6/19 10:28 PM, Dayeol Lee wrote:
> riscv_cpu_tlb_fill() uses the `size` parameter to check PMP violation
> using pmp_hart_has_privs().
> However, the size passed from tlb_fill(), which is called by
> get_page_addr_code(), is always a hard-coded value 0.
> This causes a false PMP violation if the instruction presents on a
> PMP boundary.
>
> In order to fix, simply correct the size to 4 if the access_type is
> MMU_INST_FETCH.
That's not correct.
In general, size 0 means "unknown size". In this case, the one tlb lookup is
going to be used by lots of instructions -- everything that fits on the page.
If you want to support PMP on things that are not page boundaries, then you
will also have to call tlb_set_page with size != TARGET_PAGE_SIZE.
Fixing that will cause instructions within that page to be executed one at a
time, which also means they will be tlb_fill'd one at a time, which means that
you'll get the correct size value.
Which will be 2 or 4, depending on whether the configuration supports the
Compressed extension, and not just 4.
r~