Skip to content

Commit

Permalink
Deleted incorrect statement about ASR needed for all M and S mode CSRs (
Browse files Browse the repository at this point in the history
#462)

The `mtidc` and `stidc` registers do not require `ASR` permission when
read. This makes the deleted statements wrong.

---------

Signed-off-by: Franz Fuchs <francislaus@users.noreply.github.com>
Co-authored-by: Tariq Kurd <tariqandlaura@gmail.com>
  • Loading branch information
francislaus and tariqkurd-repo authored Dec 12, 2024
1 parent 4e594a6 commit ca513a7
Showing 1 changed file with 4 additions and 5 deletions.
9 changes: 4 additions & 5 deletions src/riscv-integration.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -425,8 +425,7 @@ include::generated/csr_renamed_purecap_mode_u_table_body.adoc[]
=== Machine-Level CSRs

{cheri_base_ext_name} extends some M-mode CSRs to hold capabilities or
otherwise add new functions. <<pcc>> must grant <<asr_perm>> to access M-mode
CSRs regardless of the RISC-V privilege mode.
otherwise add new functions. <<asr-perm>> in the <<pcc>> is typically required for access.

[#mstatus,reftext="mstatus"]
==== Machine Status Registers (mstatus and mstatush)
Expand Down Expand Up @@ -832,8 +831,7 @@ CHERI violations have the following order in priority:
=== Supervisor-Level CSRs

{cheri_base_ext_name} extends some of the existing RISC-V CSRs to be able to
hold capabilities or with other new functions. <<pcc>> must grant <<asr_perm>>
to access S-mode CSRs regardless of the RISC-V privilege mode.
hold capabilities or with other new functions. <<asr-perm>> in the <<pcc>> is typically required for access.

[#stvec,reftext="stvec"]
==== Supervisor Trap Vector Base Address Register (stvec)
Expand Down Expand Up @@ -1051,7 +1049,8 @@ include::img/stval2reg.edn[]

=== Unprivileged CSRs

Unlike machine and supervisor level CSRs, {cheri_base_ext_name} does not require
In {cheri_base_ext_name}, the only register that requires <<asr_perm>> is <<utidc>>
(for updates but not for reads), and all other unprivileged CSRs do not require
<<pcc>> to grant <<asr_perm>> to access unprivileged CSRs.

=== CHERI Exception handling
Expand Down

0 comments on commit ca513a7

Please sign in to comment.