aboutsummaryrefslogtreecommitdiff
path: root/target
diff options
context:
space:
mode:
authorNikita Shubin <n.shubin@yadro.com>2023-08-08 12:09:14 +0300
committerAlistair Francis <alistair.francis@wdc.com>2023-09-11 11:45:55 +1000
commite7a03409f29e2da59297d55afbaec98c96e43e3a (patch)
tree78cb871dd9b09ce2a3333deae689718dfd2fd808 /target
parent4df282335b3b13db30123fbcca050e4bf690a9d9 (diff)
downloadqemu-e7a03409f29e2da59297d55afbaec98c96e43e3a.zip
qemu-e7a03409f29e2da59297d55afbaec98c96e43e3a.tar.gz
qemu-e7a03409f29e2da59297d55afbaec98c96e43e3a.tar.bz2
target/riscv: don't read CSR in riscv_csrrw_do64
As per ISA: "For CSRRWI, if rd=x0, then the instruction shall not read the CSR and shall not cause any of the side effects that might occur on a CSR read." trans_csrrwi() and trans_csrrw() call do_csrw() if rd=x0, do_csrw() calls riscv_csrrw_do64(), via helper_csrw() passing NULL as *ret_value. Signed-off-by: Nikita Shubin <n.shubin@yadro.com> Reviewed-by: Alistair Francis <alistair.francis@wdc.com> Message-ID: <20230808090914.17634-1-nikita.shubin@maquefel.me> Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
Diffstat (limited to 'target')
-rw-r--r--target/riscv/csr.c24
1 files changed, 15 insertions, 9 deletions
diff --git a/target/riscv/csr.c b/target/riscv/csr.c
index 68eecc3..85a31dc 100644
--- a/target/riscv/csr.c
+++ b/target/riscv/csr.c
@@ -3917,21 +3917,27 @@ static RISCVException riscv_csrrw_do64(CPURISCVState *env, int csrno,
target_ulong write_mask)
{
RISCVException ret;
- target_ulong old_value;
+ target_ulong old_value = 0;
/* execute combined read/write operation if it exists */
if (csr_ops[csrno].op) {
return csr_ops[csrno].op(env, csrno, ret_value, new_value, write_mask);
}
- /* if no accessor exists then return failure */
- if (!csr_ops[csrno].read) {
- return RISCV_EXCP_ILLEGAL_INST;
- }
- /* read old value */
- ret = csr_ops[csrno].read(env, csrno, &old_value);
- if (ret != RISCV_EXCP_NONE) {
- return ret;
+ /*
+ * ret_value == NULL means that rd=x0 and we're coming from helper_csrw()
+ * and we can't throw side effects caused by CSR reads.
+ */
+ if (ret_value) {
+ /* if no accessor exists then return failure */
+ if (!csr_ops[csrno].read) {
+ return RISCV_EXCP_ILLEGAL_INST;
+ }
+ /* read old value */
+ ret = csr_ops[csrno].read(env, csrno, &old_value);
+ if (ret != RISCV_EXCP_NONE) {
+ return ret;
+ }
}
/* write value if writable and write mask set, otherwise drop writes */