Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix invalid address handling definition to cover all bytes in the range #327

Merged
merged 1 commit into from
Jul 16, 2024

Conversation

tariqkurd-repo
Copy link
Collaborator

@tariqkurd-repo tariqkurd-repo commented Jul 16, 2024

fixes #326

@tariqkurd-repo tariqkurd-repo merged commit 9c58d5c into riscv:main Jul 16, 2024
3 checks passed
@Timmmm
Copy link
Contributor

Timmmm commented Jul 17, 2024

One slightly awkward thing is that you now have to check for invalid addresses of the whole range before alignment checks, because of the priorities:

image

And for something like lr.c, which must be aligned that means you're doing slightly extra work. At least for Codasip's Sv39-based invalid address scheme, if an access is naturally aligned then you only need to check the lowest address is valid, but because the alignment check comes after the invalid address range check you now have to check the lowest and highest.

I dunno if that makes much difference (I guess one extra add?). Just thought I'd point it out...

@tariqkurd-repo
Copy link
Collaborator Author

In all cases a core which supports misaligned load/store must detect whether an access crosses the edge of the valid region.
There's no getting away from checking this case. The hardware will detect all the cases in parallel and then prioritise according to the table. So lr.c which crosses the invalid space will take a CHERI invalid address exception before a misaligned exception. This check needs to be done in the hardware anyway as it must detect normal loads which cross the boundary.

The real point here is for all of the CHERI checks to come first, before the RISC-V checks are done.

@Timmmm
Copy link
Contributor

Timmmm commented Jul 17, 2024

In all cases a core which supports misaligned load/store must detect whether an access crosses the edge of the valid region.

Right but for accesses that must be aligned you can skip that check. I guess it doesn't make much difference for us since it's only AMOs so we need the hardware in place anyway. But doesn't this mean that cores that don't support unaligned access in general will now have to always check that the range crosses the edge of the valid region?

I mean instead of doing this:

if (not isValid(addr)) { raise invalid_address_exception; }
if (not isValid(addr + width - 1)) { raise invalid_address_exception; }
if (misaligned) { raise misaligned; }
// ok

they could do this, eliminating some hardware:

if (misaligned) { raise misaligned; }
if (not isValid(addr)) { raise invalid_address_exception; }
// impossible for it to be aligned, addr to be valid, and addr+width-1 not to be valid.
// ok

The real point here is for all of the CHERI checks to come first, before the RISC-V checks are done.

Ah I didn't know that was a requirement - why does it matter?

@tariqkurd-repo
Copy link
Collaborator Author

CHERI is a checking layer above normal RISC-V, pass the CHERI checks and then it's a normal RISC-V core underneath. It's all designed this way.

@jrtc27
Copy link
Collaborator

jrtc27 commented Jul 17, 2024

For a more concrete justification in this specific instance, it’s so that your unaligned access handler doesn’t have to perfectly replicate all the same checks in software, which is messy and error-prone

@Timmmm
Copy link
Contributor

Timmmm commented Jul 17, 2024

Ah that makes sense, thanks!

tariqkurd-repo added a commit to tariqkurd-repo/riscv-cheri that referenced this pull request Oct 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

invalid address handling definition needs fixing
5 participants