|
Re: Discovery Machanism for Any Security Extensions
Secure boot incur cost, either in hardware or boot-up time. Besides, it only guarantees the initial state of the next stage is known good state, nothing is said about the runtime behavior of the next
Secure boot incur cost, either in hardware or boot-up time. Besides, it only guarantees the initial state of the next stage is known good state, nothing is said about the runtime behavior of the next
|
By
Siqi Zhao
·
#796
·
|
|
Re: Discovery Machanism for Any Security Extensions
It's also worth noting that ePMP may not be representative of most security-related extensions with regards to needing early discovery. For example, Scalar Crypto will leverage the new RV discovery
It's also worth noting that ePMP may not be representative of most security-related extensions with regards to needing early discovery. For example, Scalar Crypto will leverage the new RV discovery
|
By
Greg Favor
·
#795
·
|
|
Re: Discovery Machanism for Any Security Extensions
IT is already expected that msseccfg will be used for other security related features - I think it is mentioned in the spec.
The overall question is whether discovery is needed at all, or can we
IT is already expected that msseccfg will be used for other security related features - I think it is mentioned in the spec.
The overall question is whether discovery is needed at all, or can we
|
By
Allen Baum
·
#794
·
|
|
Discovery Machanism for Any Security Extensions
Extrapolating from the discussion on Smepmp discovery, it is reaonable to expect that in the future any security feature will potentially run into the same issue, that is, any data structure is not
Extrapolating from the discussion on Smepmp discovery, it is reaonable to expect that in the future any security feature will potentially run into the same issue, that is, any data structure is not
|
By
Siqi Zhao
·
#793
·
|
|
Re: Smepmp discovery
Generic booting flow on ARM for rich-OS capable SoC looks
like this:
BootROM => Loader => Runtime => Bootloader => RichOS
(EL3) (EL1S) (EL3) (EL2 or EL1NS) (EL2 or
Generic booting flow on ARM for rich-OS capable SoC looks
like this:
BootROM => Loader => Runtime => Bootloader => RichOS
(EL3) (EL1S) (EL3) (EL2 or EL1NS) (EL2 or
|
By
Anup Patel
·
#792
·
|
|
Re: Smepmp discovery
(Adding other platform HSC folks)
On 03/08/21, 10:10 PM, "Nick Kossifidis" <mick@...> wrote:
Στις 2021-07-27 10:16, Andrew Waterman έγραψε:
(ccing Anup/Atish)
Good
(Adding other platform HSC folks)
On 03/08/21, 10:10 PM, "Nick Kossifidis" <mick@...> wrote:
Στις 2021-07-27 10:16, Andrew Waterman έγραψε:
(ccing Anup/Atish)
Good
|
By
Anup Patel
·
#791
·
|
|
Re: Smepmp discovery
From: tech-privileged@... <tech-privileged@...>On Behalf Of Andrew Waterman
Sent: Tuesday, August 3, 2021 5:41 PM
To: Nick Kossifidis <mick@...>
Cc: Anup Patel <anup.patel@...>; atishp@...; Tech Tee
From: tech-privileged@... <tech-privileged@...>On Behalf Of Andrew Waterman
Sent: Tuesday, August 3, 2021 5:41 PM
To: Nick Kossifidis <mick@...>
Cc: Anup Patel <anup.patel@...>; atishp@...; Tech Tee
|
By
Bill Huffman
·
#790
·
|
|
Re: Smepmp discovery
If later-boot software like OpenSBI wants to dynamically detect this feature to change its behavior at runtime, and we can't trust the configuration structure, but we can trust the mseccfg CSR, then
If later-boot software like OpenSBI wants to dynamically detect this feature to change its behavior at runtime, and we can't trust the configuration structure, but we can trust the mseccfg CSR, then
|
By
Andrew Waterman
·
#789
·
|
|
Re: Smepmp discovery
what do other architectures do?
--------
sent from a mobile device. please forgive any typos.
what do other architectures do?
--------
sent from a mobile device. please forgive any typos.
|
By
mark
·
#788
·
|
|
Re: Smepmp discovery
Στις 2021-07-27 10:16, Andrew Waterman έγραψε:
(ccing Anup/Atish)
Good point, BootROM is hw-specific and doesn't need to rely on any discovery mechanism, but the first stage boot loader
Στις 2021-07-27 10:16, Andrew Waterman έγραψε:
(ccing Anup/Atish)
Good point, BootROM is hw-specific and doesn't need to rely on any discovery mechanism, but the first stage boot loader
|
By
Nick Kossifidis
·
#787
·
|
|
RISC-V H-extension freeze consideration
Resending from correct email address
Begin forwarded message:
From: krste@...
Subject: Re: [RISC-V] [tech-privileged] RISC-V H-extension freeze consideration
Date: August 1, 2021 at 1:41:10 PM
Resending from correct email address
Begin forwarded message:
From: krste@...
Subject: Re: [RISC-V] [tech-privileged] RISC-V H-extension freeze consideration
Date: August 1, 2021 at 1:41:10 PM
|
By
Krste Asanovic
·
#786
·
|
|
Re: [RISC-V] [tech-tee] [RISC-V] [tech-privileged] Smepmp discovery
Generally it seems like the early boot code needs to have a built in understanding of the initial resources and initial address map that it has to work with (starting with a small amount of RAM
Generally it seems like the early boot code needs to have a built in understanding of the initial resources and initial address map that it has to work with (starting with a small amount of RAM
|
By
Greg Favor
·
#785
·
|
|
Re: [RISC-V] [tech-tee] [RISC-V] [tech-privileged] Smepmp discovery
It’s a cheap, effective solution. But I think Andrew’s question is whether a solution is needed. If the early boot code knows what hardware it’s running on, it doesn’t need the information.
It’s a cheap, effective solution. But I think Andrew’s question is whether a solution is needed. If the early boot code knows what hardware it’s running on, it doesn’t need the information.
|
By
Bill Huffman
·
#784
·
|
|
Re: Smepmp discovery
To be brief: you need a way to determine whether Smepmp exists without accessing anything in memory or by writing a CSR.
It is acceptable that reading a CSR traps, (which indicates that Smepmp is not
To be brief: you need a way to determine whether Smepmp exists without accessing anything in memory or by writing a CSR.
It is acceptable that reading a CSR traps, (which indicates that Smepmp is not
|
By
Allen Baum
·
#783
·
|
|
Re: Smepmp discovery
Although I'm not dead set against this proposal, I'm a little skeptical that this is something that needs to be dynamically discovered by early boot code. In practice, the early boot code is quite
Although I'm not dead set against this proposal, I'm a little skeptical that this is something that needs to be dynamically discovered by early boot code. In practice, the early boot code is quite
|
By
Andrew Waterman
·
#782
·
|
|
Smepmp discovery
Hello all,
When we initially defined mseccfg as part of Smepmp we specified that the existence of that CSR would also mean that ePMP (at least MML and MMWP) is implemented. Obviously since other
Hello all,
When we initially defined mseccfg as part of Smepmp we specified that the existence of that CSR would also mean that ePMP (at least MML and MMWP) is implemented. Obviously since other
|
By
Nick Kossifidis
·
#781
·
|
|
Re: Naming of S* extensions
Re-posting from a smaller audience sub-thread on this issue:
The current naming intent (in contrast to what was written a long time ago) is:
Extensions that only extend the machine-level architecture
Re-posting from a smaller audience sub-thread on this issue:
The current naming intent (in contrast to what was written a long time ago) is:
Extensions that only extend the machine-level architecture
|
By
Greg Favor
·
#780
·
|
|
Re: Naming of S* extensions
It's the latter option: the chapter needs to be updated to reflect the new naming convention.
It's the latter option: the chapter needs to be updated to reflect the new naming convention.
|
By
Andrew Waterman
·
#779
·
|
|
Naming of S* extensions
Section 25.7 of the unprivileged spec says that standard supervisor-level ISA extensions are named using S as a prefix. Section 25.9 says that standard machine-level ISA extensions are named using
Section 25.7 of the unprivileged spec says that standard supervisor-level ISA extensions are named using S as a prefix. Section 25.9 says that standard machine-level ISA extensions are named using
|
By
Paul Donahue
·
#778
·
|
|
Re: [RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
The current uses of the work "pointer" in the Priv architecture are wrt the *scratch CSRs and non-leaf PTEs. All other CSRs that can hold address values, possibly along with other fields, have names
The current uses of the work "pointer" in the Priv architecture are wrt the *scratch CSRs and non-leaf PTEs. All other CSRs that can hold address values, possibly along with other fields, have names
|
By
Greg Favor
·
#777
·
|