{"id":2230814,"url":"http://patchwork.ozlabs.org/api/1.1/patches/2230814/?format=json","web_url":"http://patchwork.ozlabs.org/project/opensbi/patch/20260430045528.420437-6-npiggin@gmail.com/","project":{"id":67,"url":"http://patchwork.ozlabs.org/api/1.1/projects/67/?format=json","name":"OpenSBI development","link_name":"opensbi","list_id":"opensbi.lists.infradead.org","list_email":"opensbi@lists.infradead.org","web_url":"https://github.com/riscv/opensbi","scm_url":"","webscm_url":""},"msgid":"<20260430045528.420437-6-npiggin@gmail.com>","date":"2026-04-30T04:55:22","name":"[4/7] lib: sbi: Add PMP CSR read and write accessors","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"87907cfb99d447d853df87d76c89b3da123667e7","submitter":{"id":69518,"url":"http://patchwork.ozlabs.org/api/1.1/people/69518/?format=json","name":"Nicholas Piggin","email":"npiggin@gmail.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/opensbi/patch/20260430045528.420437-6-npiggin@gmail.com/mbox/","series":[{"id":502193,"url":"http://patchwork.ozlabs.org/api/1.1/series/502193/?format=json","web_url":"http://patchwork.ozlabs.org/project/opensbi/list/?series=502193","date":"2026-04-30T04:55:18","name":"Make PMP encoding usable for non-hart PMPs","version":1,"mbox":"http://patchwork.ozlabs.org/series/502193/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2230814/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2230814/checks/","tags":{},"headers":{"Return-Path":"\n <opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=opKvEXxR;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=JgMzFGcw;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g5hhT5WZwz1yGq\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 30 Apr 2026 14:56:09 +1000 (AEST)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wIJRU-00000004gBj-1upA;\n\tThu, 30 Apr 2026 04:56:04 +0000","from mail-pf1-x42d.google.com ([2607:f8b0:4864:20::42d])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wIJRS-00000004gAX-0kac\n\tfor opensbi@lists.infradead.org;\n\tThu, 30 Apr 2026 04:56:03 +0000","by mail-pf1-x42d.google.com with SMTP id\n d2e1a72fcca58-82f69adeecbso221715b3a.2\n        for <opensbi@lists.infradead.org>;\n Wed, 29 Apr 2026 21:56:01 -0700 (PDT)","from localhost ([124.158.97.178])\n        by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-834ed59fd4bsm3478563b3a.5.2026.04.29.21.55.58\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Wed, 29 Apr 2026 21:55:59 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=UKBmKtcCVyS3yuDEk0LD45Djnd8pe1ymdcO3XCti5gE=; b=opKvEXxREFWrLN\n\tlYBXjjO4NzT4t3l+92SJR+jpigMM6yJvvPo7725Lf84dU0W8piazNRxEIpjX1Vo+iWTU/2xK/6whZ\n\tfbtuxBLRKr3fAlqqYuvH9gmF9j4VQuPTBv6wPmyRpxCluia0CHBOWHweNAEBjpV4Px599CKkzlF60\n\tv3nrh8aCDBdLTqTXupmjUjO7Be+vwEGydtkvTmFKqL6QCkJVLn5eoaLencF2QZUgIfLKofb0xbTYe\n\tv0pD49tiHt+3Dvu79wVlBr7918uf5ibO51Bt6AgV4cGD95O59fQsBO4qv//V8S5d6EbN25PxkiiMe\n\tdLgXrRhQZlqSQumd/EpA==;","v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1777524960; x=1778129760;\n darn=lists.infradead.org;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=8xbywcSBY1jqoeTsCrU3tT2P/d+N7p3jW0hJaSzyyy0=;\n        b=JgMzFGcwDN3JrqVjhKjidVLuvmEqysWNQNGwMfSiZ/donm1fNaMj1FKmLI9McckV06\n         2OZaf2F6cTOV75g6ItZq7sNPtNV0Vx5yQoTdAP+yp1pI44K8A/c8NiVKkNQpFua8UuEZ\n         /iP01/J+enohtkDZiLD//IRd/T0SuN4Pjp6tubOMLZIpRPd8vvcXOWQw3YhhksrsSxar\n         8hJC9m3Rvd84uvv7NoZt3AFhMqOPE1+05eiCgPmLNlJUqP5i4/4Jkd9ZFbPQfi2aTzo8\n         7snFgoVK5MROmTkg2oKi50srOtsNTIHAZJHuYFVUNc3QuvIIKgdXp6LtjjK3P9e12Rcb\n         sVIQ=="],"X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1777524960; x=1778129760;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=8xbywcSBY1jqoeTsCrU3tT2P/d+N7p3jW0hJaSzyyy0=;\n        b=CLQeWuEpbFFkoW7vx824scnhhUSHjXKIX06o7CG5oiXoKda6o6Zh/7QZ+SwHQDxw5H\n         TxQ3GKDW2ZxE9TOwRpSIWcG5eOR1kzqzuA5qRlLwmkkOE25UQSJTrgxmiLkaqKYeyaNc\n         W/ULp/sg401xNCDqRu0GuSwM1WP9eTd4HdSS7UoEVP8veeDopS3AjH4I36YRqqo6HpLW\n         t106qwORubM16SBKyxXfmW7GW91PPEbYR86AJS71iJP5bZQhfqe7F81J1fZhEvqyGW+X\n         ET/e/I+hPHEofSqoJGWHYPnjQ5MaoP60WilFA/WmucqF10TEGocXO2rmTLvUjYHuq+W6\n         UPFg==","X-Gm-Message-State":"AOJu0YzstsVR0sfjZPXmhbev1ZgwAMyvwxBOYZYrWzSkPqUXtviGWV1l\n\tyX6TC7WzfgZ9SnSg2ilM0wHqsgnWYwbVCn3zEhaUsDD8S36sfgz7fE3KtN3aRA==","X-Gm-Gg":"AeBDievXUqDezEofTceG+50vDFzc4EKX6NGy6WoiR+bmFy+LoByo76v8KfjP+W6wFuV\n\tTQcZTlxMeKA5LsKyTY2Ects1P6kmaBD6A+Ke4zRsw63k4mPkiWKlj49+tpDzbsf0b01okOD/fmj\n\tAe+aLLWK2Ej+fd70YoqFWfzI0Ak8f25gUp8F8Q9FTdBkK+gzhrWqlN9GqqyXlMnrXRFidM/+e9C\n\tfawrO0S0eRgxU2gbvSXl2W3iNy1rJ9huhZnfkFJnkNHbNEDWGWuS8dXKlhmjU6B61Jl/ETHHorD\n\tgWuUr2mTFz/re8jFtFosWiTjGdkf29QlmXChsRDQZnNm5nsW18/XiUioZMTFWwypMn6vW7cN+/H\n\ty2UHX8hkHbyCzWhZzBdakHOYzNTEXSKd4KnG8GcWVKhftD/CZsceID7D1SX9V7tbuv1VuYiTEbx\n\t+aCIv/EZwmTujmvdKW0PMYZ5qRZ0qk/OU9rhz+gKRNiDA=","X-Received":"by 2002:a05:6a00:3cc5:b0:82c:9cd2:fee5 with SMTP id\n d2e1a72fcca58-834fe05d00cmr1665992b3a.7.1777524960240;\n        Wed, 29 Apr 2026 21:56:00 -0700 (PDT)","From":"Nicholas Piggin <npiggin@gmail.com>","To":"opensbi@lists.infradead.org","Cc":"Nicholas Piggin <npiggin@gmail.com>","Subject":"[PATCH 4/7] lib: sbi: Add PMP CSR read and write accessors","Date":"Thu, 30 Apr 2026 14:55:22 +1000","Message-ID":"<20260430045528.420437-6-npiggin@gmail.com>","X-Mailer":"git-send-email 2.53.0","In-Reply-To":"<20260430045528.420437-1-npiggin@gmail.com>","References":"<20260430045528.420437-1-npiggin@gmail.com>","MIME-Version":"1.0","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260429_215602_231166_7E8AA87E ","X-CRM114-Status":"GOOD (  14.16  )","X-Spam-Score":"-2.1 (--)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  PMPCFG CSR access is non-trivial as it requires shifting\n and\n    masking,\n it makes PMP manipulation code simpler if this basic CSR read/write\n    access is abstracted away. Signed-off-by: Nicholas Piggin ---\n lib/sbi/riscv_asm.c\n    | 114 ++++++++++++++++++++++ 1 file changed, 58 insertions(+),\n 56 deletions(-)    \n Content analysis details:   (-2.1 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/, no\n                             trust\n                             [2607:f8b0:4864:20:0:0:0:42d listed in]\n                             [list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail\n provider\n                             [npiggin(at)gmail.com]","X-BeenThere":"opensbi@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<opensbi.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/opensbi>,\n <mailto:opensbi-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/opensbi/>","List-Post":"<mailto:opensbi@lists.infradead.org>","List-Help":"<mailto:opensbi-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/opensbi>,\n <mailto:opensbi-request@lists.infradead.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"opensbi\" <opensbi-bounces@lists.infradead.org>","Errors-To":"opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"},"content":"PMPCFG CSR access is non-trivial as it requires shifting and masking, it\nmakes PMP manipulation code simpler if this basic CSR read/write access is\nabstracted away.\n\nSigned-off-by: Nicholas Piggin <npiggin@gmail.com>\n---\n lib/sbi/riscv_asm.c | 114 ++++++++++++++++++++++----------------------\n 1 file changed, 58 insertions(+), 56 deletions(-)","diff":"diff --git a/lib/sbi/riscv_asm.c b/lib/sbi/riscv_asm.c\nindex 9b45805c..2fb0f585 100644\n--- a/lib/sbi/riscv_asm.c\n+++ b/lib/sbi/riscv_asm.c\n@@ -273,14 +273,16 @@ void csr_write_num(int csr_num, unsigned long val)\n #undef switchcase_csr_write\n }\n \n-int pmp_disable(unsigned int n)\n+static int hart_pmp_read(pmp_t *pmp, unsigned int n)\n {\n-\tint pmpcfg_csr, pmpcfg_shift;\n-\tunsigned long cfgmask, pmpcfg;\n+\tint pmpcfg_csr, pmpcfg_shift, pmpaddr_csr;\n+\tunsigned long cfgmask;\n \n+\t/* check parameters */\n \tif (n >= PMP_COUNT)\n \t\treturn SBI_EINVAL;\n \n+\t/* calculate PMP register and offset */\n #if __riscv_xlen == 32\n \tpmpcfg_csr   = CSR_PMPCFG0 + (n >> 2);\n \tpmpcfg_shift = (n & 3) << 3;\n@@ -290,48 +292,24 @@ int pmp_disable(unsigned int n)\n #else\n # error \"Unexpected __riscv_xlen\"\n #endif\n+\tpmpaddr_csr = CSR_PMPADDR0 + n;\n \n-\t/* Clear the address matching bits to disable the pmp entry */\n-\tcfgmask = ~(0xffUL << pmpcfg_shift);\n-\tpmpcfg\t= (csr_read_num(pmpcfg_csr) & cfgmask);\n-\n-\tcsr_write_num(pmpcfg_csr, pmpcfg);\n+\tcfgmask = (0xffUL << pmpcfg_shift);\n+\tpmp->cfg = (csr_read_num(pmpcfg_csr) & cfgmask) >> pmpcfg_shift;\n+\tpmp->addr = csr_read_num(pmpaddr_csr);\n \n \treturn SBI_OK;\n }\n \n-int is_pmp_entry_mapped(unsigned long entry)\n-{\n-\tunsigned long prot;\n-\tunsigned long addr;\n-\tunsigned long log2len;\n-\n-\tif (pmp_get(entry, &prot, &addr, &log2len) != 0)\n-\t\treturn false;\n-\n-\t/* If address matching bits are non-zero, the entry is enable */\n-\tif (prot & PMP_A)\n-\t\treturn true;\n-\n-\treturn false;\n-}\n-\n-int pmp_set(unsigned int n, unsigned long prot, unsigned long addr,\n-\t    unsigned long log2len)\n+static int hart_pmp_write(pmp_t *pmp, unsigned int n)\n {\n \tint pmpcfg_csr, pmpcfg_shift, pmpaddr_csr;\n \tunsigned long cfgmask, pmpcfg;\n-\tpmp_t pmp;\n-\tint rc;\n \n \t/* check parameters */\n \tif (n >= PMP_COUNT)\n \t\treturn SBI_EINVAL;\n \n-\trc = pmp_encode(&pmp, prot, addr, log2len);\n-\tif (rc)\n-\t\treturn rc;\n-\n \t/* calculate PMP register and offset */\n #if __riscv_xlen == 32\n \tpmpcfg_csr   = CSR_PMPCFG0 + (n >> 2);\n@@ -345,41 +323,65 @@ int pmp_set(unsigned int n, unsigned long prot, unsigned long addr,\n \tpmpaddr_csr = CSR_PMPADDR0 + n;\n \n \t/* write csrs */\n-\tcsr_write_num(pmpaddr_csr, pmp.addr);\n+\tcsr_write_num(pmpaddr_csr, pmp->addr);\n \tcfgmask = ~(0xffUL << pmpcfg_shift);\n \tpmpcfg  = (csr_read_num(pmpcfg_csr) & cfgmask);\n-\tpmpcfg |= (((unsigned long)pmp.cfg << pmpcfg_shift) & ~cfgmask);\n+\tpmpcfg |= (((unsigned long)pmp->cfg << pmpcfg_shift) & ~cfgmask);\n \tcsr_write_num(pmpcfg_csr, pmpcfg);\n \n-\treturn 0;\n+\treturn SBI_OK;\n }\n \n-int pmp_get(unsigned int n, unsigned long *prot_out, unsigned long *addr_out,\n-\t    unsigned long *log2len)\n+int pmp_disable(unsigned int n)\n {\n-\tint pmpcfg_csr, pmpcfg_shift, pmpaddr_csr;\n-\tunsigned long cfgmask;\n \tpmp_t pmp;\n+\tint rc;\n \n-\t/* check parameters */\n-\tif (n >= PMP_COUNT)\n-\t\treturn SBI_EINVAL;\n+\trc = hart_pmp_read(&pmp, n);\n+\tif (rc)\n+\t\treturn rc;\n \n-\t/* calculate PMP register and offset */\n-#if __riscv_xlen == 32\n-\tpmpcfg_csr   = CSR_PMPCFG0 + (n >> 2);\n-\tpmpcfg_shift = (n & 3) << 3;\n-#elif __riscv_xlen == 64\n-\tpmpcfg_csr   = (CSR_PMPCFG0 + (n >> 2)) & ~1;\n-\tpmpcfg_shift = (n & 7) << 3;\n-#else\n-# error \"Unexpected __riscv_xlen\"\n-#endif\n-\tpmpaddr_csr = CSR_PMPADDR0 + n;\n+\tpmp.cfg = 0;\n \n-\tcfgmask = (0xffUL << pmpcfg_shift);\n-\tpmp.cfg = (csr_read_num(pmpcfg_csr) & cfgmask) >> pmpcfg_shift;\n-\tpmp.addr = csr_read_num(pmpaddr_csr);\n+\treturn hart_pmp_write(&pmp, n);\n+}\n+\n+int is_pmp_entry_mapped(unsigned long entry)\n+{\n+\tpmp_t pmp;\n+\n+\tif (hart_pmp_read(&pmp, entry) != SBI_OK)\n+\t\treturn false;\n+\n+\t/* If address matching bits are non-zero, the entry is enable */\n+\tif (pmp.cfg & PMP_A)\n+\t\treturn true;\n+\n+\treturn false;\n+}\n+\n+int pmp_set(unsigned int n, unsigned long prot, unsigned long addr,\n+\t    unsigned long log2len)\n+{\n+\tpmp_t pmp;\n+\tint rc;\n+\n+\trc = pmp_encode(&pmp, prot, addr, log2len);\n+\tif (rc)\n+\t\treturn rc;\n+\n+\treturn hart_pmp_write(&pmp, n);\n+}\n+\n+int pmp_get(unsigned int n, unsigned long *prot_out, unsigned long *addr_out,\n+\t    unsigned long *log2len)\n+{\n+\tpmp_t pmp;\n+\tint rc;\n+\n+\trc = hart_pmp_read(&pmp, n);\n+\tif (rc)\n+\t\treturn rc;\n \n \treturn pmp_decode(&pmp, prot_out, addr_out, log2len);\n }\n","prefixes":["4/7"]}