|
RISC-V Hypervisor Updates
Hi All,
We have updated QEMU RISC-V, KVM RISC-V and Xvisor RISC-V for RISC-V
H-Extension v0.6 spec.
The QEMU repo with RISC-V H-Extension v0.6 support can be found
Hi All,
We have updated QEMU RISC-V, KVM RISC-V and Xvisor RISC-V for RISC-V
H-Extension v0.6 spec.
The QEMU repo with RISC-V H-Extension v0.6 support can be found
|
By
Anup Patel
·
#101
·
|
|
proposal to add "virtual instruction exception" to the hypervisor extension
Hello tech-privileged guys,
I've created a pull request for the RISC-V privileged spec in response
to requests from our hypervisor software
Hello tech-privileged guys,
I've created a pull request for the RISC-V privileged spec in response
to requests from our hypervisor software
|
By
John Hauser
·
#102
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
I like this plan. The one comment I have is that it seems unnecessarily opinionated about which operations trigger virtual instruction traps vs illegal instruction traps when run in VU mode. I think
I like this plan. The one comment I have is that it seems unnecessarily opinionated about which operations trigger virtual instruction traps vs illegal instruction traps when run in VU mode. I think
|
By
Jonathan Behrens <behrensj@...>
·
#103
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
Jonathan Behrens wrote:
Point taken. Would you like to take a stab at listing every case you
think should be included, besides HFENCE?
- John Hauser
Jonathan Behrens wrote:
Point taken. Would you like to take a stab at listing every case you
think should be included, besides HFENCE?
- John Hauser
|
By
John Hauser
·
#104
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
It mostly just comes down to crossing out "In VS-mode" in your list of cases for trapping when V=1:
- attempts to execute an HFENCE instruction or to access
an implemented hypervisor CSR or VS
It mostly just comes down to crossing out "In VS-mode" in your list of cases for trapping when V=1:
- attempts to execute an HFENCE instruction or to access
an implemented hypervisor CSR or VS
|
By
Jonathan Behrens <behrensj@...>
·
#105
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
It would be great to have this controlled by a bit in the hstatus CSR.
For example a hypervisor that does not overcommit CPUs will probably
want to delegate WFI to the guest. Guest-delegated
It would be great to have this controlled by a bit in the hstatus CSR.
For example a hypervisor that does not overcommit CPUs will probably
want to delegate WFI to the guest. Guest-delegated
|
By
Paolo Bonzini
·
#106
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
By
Anup Patel
·
#107
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
Paolo Bonzini wrote:
I'm afraid this makes no sense to me. Ordinary user-mode applications
don't execute WFI. In U mode, WFI is useful only in connection
with support for user-level interrupts
Paolo Bonzini wrote:
I'm afraid this makes no sense to me. Ordinary user-mode applications
don't execute WFI. In U mode, WFI is useful only in connection
with support for user-level interrupts
|
By
John Hauser
·
#108
·
|
|
Re: proposal to add "virtual instruction exception" to the hypervisor extension
But this would be a VS-mode application, not an ordinary user-mode
application. I'm not sure why U-mode matters. Anyway...
... I guess this is the misunderstanding. I'm not proposing to
But this would be a VS-mode application, not an ordinary user-mode
application. I'm not sure why U-mode matters. Anyway...
... I guess this is the misunderstanding. I'm not proposing to
|
By
Paolo Bonzini
·
#109
·
|
|
Re: hstatus.VTW for WFI
Paolo Bonzini wrote:
Okay, I get it now. You're proposing we bring back hstatus.VTW,
the HS-mode analog to mstatus.TW. (We had the VTW bit originally in
hstatus, but dropped it long ago.)
Anyone
Paolo Bonzini wrote:
Okay, I get it now. You're proposing we bring back hstatus.VTW,
the HS-mode analog to mstatus.TW. (We had the VTW bit originally in
hstatus, but dropped it long ago.)
Anyone
|
By
John Hauser
·
#110
·
|
|
Microarchitectural state flush for timing-channel prevention
Dear Privspec members,
You may recall that I had argued for an operation to flush microarchitectural state in order to allow the OS to prevent timing channels. I believe the need for this was not
Dear Privspec members,
You may recall that I had argued for an operation to flush microarchitectural state in order to allow the OS to prevent timing channels. I believe the need for this was not
|
By
Gernot <gernot.heiser@...>
·
#111
·
|
|
Question on the new hvip register
Hi,
Reading through the hypervisor extension v0.6, I noticed the new register called hvip. The spec says that this register is intended for the hypervisor to write to indicate pending interrupts
Hi,
Reading through the hypervisor extension v0.6, I noticed the new register called hvip. The spec says that this register is intended for the hypervisor to write to indicate pending interrupts
|
By
Siqi Zhao
·
#112
·
|
|
Re: Question on the new hvip register
Siqi (zhaosiqi3@...) wrote:
The same question was raised not long ago on the RISC-V ISA Dev mailing
list. The following is clipped from that conversation.
--------------------
Jose Martins
Siqi (zhaosiqi3@...) wrote:
The same question was raised not long ago on the RISC-V ISA Dev mailing
list. The following is clipped from that conversation.
--------------------
Jose Martins
|
By
John Hauser
·
#113
·
|
|
Re: Question on the new hvip register
Siqi (zhaosiqi3@...) wrote:
Also, sorry, failed to notice you said vsip, not hip.
The previous draft of the hypervisor extension, 0.5, never allowed
writing directly to vsip from VS mode,
Siqi (zhaosiqi3@...) wrote:
Also, sorry, failed to notice you said vsip, not hip.
The previous draft of the hypervisor extension, 0.5, never allowed
writing directly to vsip from VS mode,
|
By
John Hauser
·
#114
·
|
|
Re: hstatus.VTW for WFI
I wrote:
I've created a pull request for the RISC-V privileged manual:
https://github.com/riscv/riscv-isa-manual/pull/523
Comments welcome.
- John Hauser
I wrote:
I've created a pull request for the RISC-V privileged manual:
https://github.com/riscv/riscv-isa-manual/pull/523
Comments welcome.
- John Hauser
|
By
John Hauser
·
#115
·
|
|
Non-idempotent PMA and table walk accesses
Hi all,
I have a simple question: does the architecture allow table walk accesses (reads or writes) to regions with the non-idempotent PMA?
The architecture doesn't explicitly disallow it, so the
Hi all,
I have a simple question: does the architecture allow table walk accesses (reads or writes) to regions with the non-idempotent PMA?
The architecture doesn't explicitly disallow it, so the
|
By
David Kruckemyer
·
#116
·
|
|
Re: Non-idempotent PMA and table walk accesses
The specification machinery exists to allow implementations to impose such a restriction: "For systems with page-based virtual memory, I/O and memory regions can specify which combinations of hardware
The specification machinery exists to allow implementations to impose such a restriction: "For systems with page-based virtual memory, I/O and memory regions can specify which combinations of hardware
|
By
Andrew Waterman
·
#117
·
|
|
Re: Non-idempotent PMA and table walk accesses
Although I haven't seen any such implementation, I would imagine that a non-idempotent region that was, say, counting accesses to each address as a side-effect of each access may be a "benign" kind of
Although I haven't seen any such implementation, I would imagine that a non-idempotent region that was, say, counting accesses to each address as a side-effect of each access may be a "benign" kind of
|
By
Nikhil Rishiyur
·
#118
·
|
|
Re: Non-idempotent PMA and table walk accesses
That sounds a bit like a performance counter to me, but it does raise an interesting question whether "idempotent" in the architectural sense is idempotent in a mathematical sense (i.e. operations are
That sounds a bit like a performance counter to me, but it does raise an interesting question whether "idempotent" in the architectural sense is idempotent in a mathematical sense (i.e. operations are
|
By
David Kruckemyer
·
#119
·
|
|
Re: Non-idempotent PMA and table walk accesses
On 5/18/20 5:10 PM, David Kruckemyer wrote:
I've always assumed that it included any side-effects that mattered to the program. It obviously does not include bringing the demise of a chip nearer with
On 5/18/20 5:10 PM, David Kruckemyer wrote:
I've always assumed that it included any side-effects that mattered to the program. It obviously does not include bringing the demise of a chip nearer with
|
By
Bill Huffman
·
#120
·
|