From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B6216C43461 for ; Fri, 4 Sep 2020 16:04:01 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 5EA6920772 for ; Fri, 4 Sep 2020 16:04:01 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="2/bfCNGw"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="njw9vtf+" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 5EA6920772 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=infradead.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-riscv-bounces+linux-riscv=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:Message-ID: Subject:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=MTCxYt+DtXPhunStFWbVqY0j+3LSb0hvYjSLpeUdfjU=; b=2/bfCNGwg20xjm5YTCP2/RT7g ArMnqvCRnKoEp9uIQI4AoWzq8MtRFIWoNQTuPs8g3HnvCqM0JXZnM2eQMtxmj5TZxwYesYzQeB5xI s1ylkOLmvsfhQhj3SXuSmVeD5bA0ZW4W3re9adqZAe1faOy5OtaAxKyMD0wlOp2D2A34ev65/aOoX gJKEQOqZzl58kfLndcHGmnNEo2jX3Kn9+xwP/V2OpgQe3lD98g20JsgFw3KzUD6vtmdGkeXpeQ3cp Ggh+VfMfBYUeb3GwoJ8Mj2CUJeVYW69mSVg3RK2uivv0lkOo2B9Ym4dGcUKioiLSnUf2uwOMZjC+N D+9EN395w==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kEEBq-00051I-FR; Fri, 04 Sep 2020 16:03:50 +0000 Received: from casper.infradead.org ([2001:8b0:10b:1236::1]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kEEBp-00050U-BM for linux-riscv@merlin.infradead.org; Fri, 04 Sep 2020 16:03:49 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=dOIY+PK7v5oRo5v+cKMlhJajAlAgTvbKby18sXReyKo=; b=njw9vtf+x7s/XbD1M1mN9ssGF1 pcpg1z62txj7dfVjqiI1WH/FUB8/RetpZgNoNrWcm4U4Ss92fYyykPZ0T2cIY1eEaYLO719iYWKbl mxmrUmOfaMF0nm6fjWKVA//w2u6JTBPgUd+bROD8e7I5MM73z3maEJgvj2q/9s6J5aDaPV+tRlPaI Qw/72DSaudNTChK420y/d5r+R77lRJYw3VmpxtkkFTKYMymqlJZcMWPs5VCCV8+Ys28/8k+LYILxf vY0Gc4qHl8gT03OOuFz+ZubsUWqj8A2BY7lJGS/tNO7xmQzhSuaUmBw9l1qJztq1ZWBLATHLa6lxv tg9RxP9A==; Received: from hch by casper.infradead.org with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1kEEBb-0006F1-G7; Fri, 04 Sep 2020 16:03:35 +0000 Date: Fri, 4 Sep 2020 17:03:35 +0100 From: Christoph Hellwig To: Anup Patel Subject: Re: [GIT PULL] RISC-V Fixes for 5.9-rc2 Message-ID: <20200904160335.GA23669@infradead.org> References: <20200904083109.GA9182@infradead.org> <20200904094617.GA27846@infradead.org> <20200904130044.GA7842@infradead.org> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: X-SRS-Rewrite: SMTP reverse-path rewritten from by casper.infradead.org. See http://www.infradead.org/rpr.html X-BeenThere: linux-riscv@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Qiu Wenbo , Linux Kernel Mailing List , Christoph Hellwig , Palmer Dabbelt , linux-riscv , Linus Torvalds Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-riscv" Errors-To: linux-riscv-bounces+linux-riscv=archiver.kernel.org@lists.infradead.org On Fri, Sep 04, 2020 at 07:26:41PM +0530, Anup Patel wrote: > On Fri, Sep 4, 2020 at 6:30 PM Christoph Hellwig wrote: > > > > On Fri, Sep 04, 2020 at 08:58:25PM +0800, Qiu Wenbo wrote: > > > I can confirm this patch also breaks K210 support. It seems that > > > csr_read(CSR_TIME) will trigger an illegal instruction exception on K210. > > > > CSR_TIME is trapped by just about every implementation I know (which is > > explicitly allowed by the spec). That is why we should never use it > > from common M-mode code. > > Finally, I was able to replicate this issue by manually hacking QEMU to > not emulatie TIME CSR for virt machine. > > It seems this issue is only seen on older QEMU and Kendrtye K210. You'd also see it when running nommu on Sifivie or just about any hardware. Whoever implement the TIME CSR for qemu made a mistake IMHO as it doesn't match how most real hardware behaves. _______________________________________________ linux-riscv mailing list linux-riscv@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-riscv