From 877686f4e0016819077dc1c23571c5bde770eb32 Mon Sep 17 00:00:00 2001 From: Scott Johnson Date: Thu, 14 Oct 2021 15:27:25 -0700 Subject: [PATCH] Call parent verify_permissions() for float_csr_t (#832) We were not properly checking for Machine-level or Supervisor-level CSR accessibility. No functional change, but only because all float_csr_t have User-level permissions today. --- riscv/csrs.cc | 1 + 1 file changed, 1 insertion(+) diff --git a/riscv/csrs.cc b/riscv/csrs.cc index 0f73d58f..326ed1bb 100644 --- a/riscv/csrs.cc +++ b/riscv/csrs.cc @@ -1145,6 +1145,7 @@ float_csr_t::float_csr_t(processor_t* const proc, const reg_t addr, const reg_t } void float_csr_t::verify_permissions(insn_t insn, bool write) const { + masked_csr_t::verify_permissions(insn, write); require_fp; if (!proc->extension_enabled('F')) throw trap_illegal_instruction(insn.bits());