|
Re: Fast-track extension proposal for Resumable Non-Maskable Interrupts (Smrnmi)
Hi Andrew,
Just one thought, this change introduces a bank of context saving registers that could also be re-used/applied for additional purposes such as a lightweight TEE-OS (where we are looking
Hi Andrew,
Just one thought, this change introduces a bank of context saving registers that could also be re-used/applied for additional purposes such as a lightweight TEE-OS (where we are looking
|
By
Mark Hill
·
#1133
·
|
|
Fast-track extension proposal for Resumable Non-Maskable Interrupts (Smrnmi)
Hi,
We're submitting for your consideration an extension for resumable non-maskable interrupt (RNMI) support.
You might recall that the current non-maskable interrupt support defined in the M-mode
Hi,
We're submitting for your consideration an extension for resumable non-maskable interrupt (RNMI) support.
You might recall that the current non-maskable interrupt support defined in the M-mode
|
By
Andrew Waterman
·
#1132
·
|
|
Re: PMP shared permissions for S and U
Not all OSes require or desire VM address mapping, especially in the embedded space (or so I've been led to believe) - yet they still need some level of privilege protection layering.
That's where
Not all OSes require or desire VM address mapping, especially in the embedded space (or so I've been led to believe) - yet they still need some level of privilege protection layering.
That's where
|
By
Allen Baum
·
#1131
·
|
|
Re: PMP shared permissions for S and U
Out of curiosity, what's the point of supporting S-mode if not to use paged virtual memory? My understanding of things was that S-mode provides virtual memory, a secondary level of interrupt/exception
Out of curiosity, what's the point of supporting S-mode if not to use paged virtual memory? My understanding of things was that S-mode provides virtual memory, a secondary level of interrupt/exception
|
By
Anthony Coulter
·
#1130
·
|
|
Re: PMP shared permissions for S and U
Note: I'm not sure if the TG's email list is up yet. If not, check with the Security HC.
Note: I'm not sure if the TG's email list is up yet. If not, check with the Security HC.
|
By
Greg Favor
·
#1129
·
|
|
Re: PMP shared permissions for S and U
Jeff;
FYI. SPMP TG is awaiting final approval from Technical Steering Commitee.
Regards,
Manuel Offenberg
Seagate Research
From: tech-privileged@... <tech-privileged@...> on behalf of Jeff Scott
Jeff;
FYI. SPMP TG is awaiting final approval from Technical Steering Commitee.
Regards,
Manuel Offenberg
Seagate Research
From: tech-privileged@... <tech-privileged@...> on behalf of Jeff Scott
|
By
Manuel Offenberg <manuel.a.offenberg@...>
·
#1128
·
|
|
Re: PMP shared permissions for S and U
Hi Greg,
In our world we don’t have MMU, just PMP. The inability to supply separate permissions to S and U limits the usefulness of PMP in our environment.
I subscribed to SPMP now. I’ll
Hi Greg,
In our world we don’t have MMU, just PMP. The inability to supply separate permissions to S and U limits the usefulness of PMP in our environment.
I subscribed to SPMP now. I’ll
|
By
Jeff Scott
·
#1127
·
|
|
Re: PMP shared permissions for S and U
PMP was architected to be a mechanism to protect M-mode software and resources from non-M-mode software and devices. This complements the MMU which serves to protect and isolate between S-mode and
PMP was architected to be a mechanism to protect M-mode software and resources from non-M-mode software and devices. This complements the MMU which serves to protect and isolate between S-mode and
|
By
Greg Favor
·
#1126
·
|
|
PMP shared permissions for S and U
Hello,
I am curious why the PMP treats S and U mode accesses identically? Is anyone aware of a standard extension that allows for different permissions for S and U?
Thanks,
Jeff
Hello,
I am curious why the PMP treats S and U mode accesses identically? Is anyone aware of a standard extension that allows for different permissions for S and U?
Thanks,
Jeff
|
By
Jeff Scott
·
#1125
·
|
|
Re: Fast-track extension proposal V3 for "Sv32 Svpbmt"
It seems like you have dropped a bunch of text from the prior versions - which is probably part of what leads to some of my questions below.
Maybe better to say "The Svpbmt32 extension allows the
It seems like you have dropped a bunch of text from the prior versions - which is probably part of what leads to some of my questions below.
Maybe better to say "The Svpbmt32 extension allows the
|
By
Greg Favor
·
#1124
·
|
|
Fast-track extension proposal V3 for "Sv32 Svpbmt"
Hi all,
Here is the third version of the proposal.
V2: https://lists.riscv.org/g/tech-privileged/message/1079
V1: https://lists.riscv.org/g/tech-privileged/message/1051
This posting to this
Hi all,
Here is the third version of the proposal.
V2: https://lists.riscv.org/g/tech-privileged/message/1079
V1: https://lists.riscv.org/g/tech-privileged/message/1051
This posting to this
|
By
Guo Ren
·
#1123
·
|
|
Re: Are pages allowed to cross PMA regions?
Thank you all for the valuable input!
In summary, it is possible to have virtual memory pages that straddle multiple PMA and PMP regions. There are simplifications or implementation decisions that can
Thank you all for the valuable input!
In summary, it is possible to have virtual memory pages that straddle multiple PMA and PMP regions. There are simplifications or implementation decisions that can
|
By
Andres Amaya Garcia
·
#1122
·
|
|
Re: Are pages allowed to cross PMA regions?
>For TLBs, the important simplification is PMP/PMA aren't <4KiB in
>granularity, as then existing TLB entires can be used to cache
>permissions.
Yes - this makes a lot of sense. What about the case
>For TLBs, the important simplification is PMP/PMA aren't <4KiB in
>granularity, as then existing TLB entires can be used to cache
>permissions.
Yes - this makes a lot of sense. What about the case
|
By
Tariq Kurd
·
#1121
·
|
|
Re: Are pages allowed to cross PMA regions?
>For TLBs, the important simplification is PMP/PMA aren't <4KiB in
>granularity, as then existing TLB entires can be used to cache
>permissions.
Yes - this makes a lot of sense. What about the case
>For TLBs, the important simplification is PMP/PMA aren't <4KiB in
>granularity, as then existing TLB entires can be used to cache
>permissions.
Yes - this makes a lot of sense. What about the case
|
By
Tariq Kurd
·
#1120
·
|
|
Re: Are pages allowed to cross PMA regions?
|| In particular, a portion of a misaligned store that passes the PMP check may become visible, even if another portion fails the PMP check
| I had no idea this was in the spec - so I'm glad you added
|| In particular, a portion of a misaligned store that passes the PMP check may become visible, even if another portion fails the PMP check
| I had no idea this was in the spec - so I'm glad you added
|
By
Krste Asanovic
·
#1119
·
|
|
Re: Are pages allowed to cross PMA regions?
>In particular, a portion of a misaligned store that passes the PMP check may become visible, even if another portion fails the PMP check
I had no idea this was in the spec - so I'm glad you added
>In particular, a portion of a misaligned store that passes the PMP check may become visible, even if another portion fails the PMP check
I had no idea this was in the spec - so I'm glad you added
|
By
Tariq Kurd
·
#1118
·
|
|
Re: Are pages allowed to cross PMA regions?
There are at least 3 potential boundaries: MMU pages, PMP regions, and PMA regions.
All bytes of an access must be contained within a single PMP region. The operative word there is "access", because a
There are at least 3 potential boundaries: MMU pages, PMP regions, and PMA regions.
All bytes of an access must be contained within a single PMP region. The operative word there is "access", because a
|
By
Allen Baum
·
#1117
·
|
|
Re: [RISC-V] [tech-virt-mem] Help needed on physical address issues
The ACTs will test that bits above b38 match b38 if SV39 is enabled
Likewise for SV48 and SV 57.
There is no SV64 yet, so any VA bits above b56 that don't match b56 are expected to always trap.
If a
The ACTs will test that bits above b38 match b38 if SV39 is enabled
Likewise for SV48 and SV 57.
There is no SV64 yet, so any VA bits above b56 that don't match b56 are expected to always trap.
If a
|
By
Allen Baum
·
#1116
·
|
|
Re: Are pages allowed to cross PMA regions?
That could be ok for accesses to idempotent memory, but would likely be problematic for a non-idempotent location (e.g. a memory-mapped I/O register), and byte accesses to a word MMIO register might
That could be ok for accesses to idempotent memory, but would likely be problematic for a non-idempotent location (e.g. a memory-mapped I/O register), and byte accesses to a word MMIO register might
|
By
Greg Favor
·
#1115
·
|
|
Re: Are pages allowed to cross PMA regions?
It would be nice if it was architecturally defined/permitted for such straddling accesses to be performed a byte at a time. That makes the trap and emulate handler easier to code.
If not a byte at a
It would be nice if it was architecturally defined/permitted for such straddling accesses to be performed a byte at a time. That makes the trap and emulate handler easier to code.
If not a byte at a
|
By
Andy Glew (Gmail) <andyglew@...>
·
#1114
·
|