forked from Mirrors/opensbi
		
	sbi: sbi_domain_context: Check privilege spec version before accessing S-mode CSRs
SCOUNTEREN and SENVCFG may not be supported on certain RISC-V core, so check the existence of these CSRs via privilege spec version to prevent illegal instructions. Signed-off-by: Yu Chien Peter Lin <peterlin@andestech.com> Signed-off-by: Alvin Chang <alvinga@andestech.com> Reviewed-by: Anup Patel <anup@brainfault.org>
This commit is contained in:
		
				
					committed by
					
						
						Anup Patel
					
				
			
			
				
	
			
			
			
						parent
						
							7862c244bc
						
					
				
				
					commit
					29ecda9c20
				
			@@ -55,8 +55,10 @@ static void switch_to_next_domain_context(struct sbi_context *ctx,
 | 
			
		||||
	ctx->stval	= csr_swap(CSR_STVAL, dom_ctx->stval);
 | 
			
		||||
	ctx->sip	= csr_swap(CSR_SIP, dom_ctx->sip);
 | 
			
		||||
	ctx->satp	= csr_swap(CSR_SATP, dom_ctx->satp);
 | 
			
		||||
	ctx->scounteren = csr_swap(CSR_SCOUNTEREN, dom_ctx->scounteren);
 | 
			
		||||
	ctx->senvcfg	= csr_swap(CSR_SENVCFG, dom_ctx->senvcfg);
 | 
			
		||||
	if (sbi_hart_priv_version(scratch) >= SBI_HART_PRIV_VER_1_10)
 | 
			
		||||
		ctx->scounteren = csr_swap(CSR_SCOUNTEREN, dom_ctx->scounteren);
 | 
			
		||||
	if (sbi_hart_priv_version(scratch) >= SBI_HART_PRIV_VER_1_12)
 | 
			
		||||
		ctx->senvcfg	= csr_swap(CSR_SENVCFG, dom_ctx->senvcfg);
 | 
			
		||||
 | 
			
		||||
	/* Save current trap state and restore target domain's trap state */
 | 
			
		||||
	trap_regs = (struct sbi_trap_regs *)(csr_read(CSR_MSCRATCH) -
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user