mirror of
https://github.com/Fishwaldo/opensbi.git
synced 2025-03-15 19:31:32 +00:00
sbi: sbi_domain_context: Check privilege spec version before accessing S-mode CSRs
SCOUNTEREN and SENVCFG may not be supported on certain RISC-V core, so check the existence of these CSRs via privilege spec version to prevent illegal instructions. Signed-off-by: Yu Chien Peter Lin <peterlin@andestech.com> Signed-off-by: Alvin Chang <alvinga@andestech.com> Reviewed-by: Anup Patel <anup@brainfault.org>
This commit is contained in:
parent
7862c244bc
commit
29ecda9c20
1 changed files with 4 additions and 2 deletions
|
@ -55,8 +55,10 @@ static void switch_to_next_domain_context(struct sbi_context *ctx,
|
|||
ctx->stval = csr_swap(CSR_STVAL, dom_ctx->stval);
|
||||
ctx->sip = csr_swap(CSR_SIP, dom_ctx->sip);
|
||||
ctx->satp = csr_swap(CSR_SATP, dom_ctx->satp);
|
||||
ctx->scounteren = csr_swap(CSR_SCOUNTEREN, dom_ctx->scounteren);
|
||||
ctx->senvcfg = csr_swap(CSR_SENVCFG, dom_ctx->senvcfg);
|
||||
if (sbi_hart_priv_version(scratch) >= SBI_HART_PRIV_VER_1_10)
|
||||
ctx->scounteren = csr_swap(CSR_SCOUNTEREN, dom_ctx->scounteren);
|
||||
if (sbi_hart_priv_version(scratch) >= SBI_HART_PRIV_VER_1_12)
|
||||
ctx->senvcfg = csr_swap(CSR_SENVCFG, dom_ctx->senvcfg);
|
||||
|
||||
/* Save current trap state and restore target domain's trap state */
|
||||
trap_regs = (struct sbi_trap_regs *)(csr_read(CSR_MSCRATCH) -
|
||||
|
|
Loading…
Add table
Reference in a new issue