|
Discovery Machanism for Any Security Extensions
7 messages
Extrapolating from the discussion on Smepmp discovery, it is reaonable to expect that in the future any security feature will potentially run into the same issue, that is, any data structure is not tr
Extrapolating from the discussion on Smepmp discovery, it is reaonable to expect that in the future any security feature will potentially run into the same issue, that is, any data structure is not tr
|
By
Siqi Zhao
·
|
|
Smepmp discovery
10 messages
Hello all, When we initially defined mseccfg as part of Smepmp we specified that the existence of that CSR would also mean that ePMP (at least MML and MMWP) is implemented. Obviously since other secur
Hello all, When we initially defined mseccfg as part of Smepmp we specified that the existence of that CSR would also mean that ePMP (at least MML and MMWP) is implemented. Obviously since other secur
|
By
mick@...
·
|
|
RISC-V H-extension freeze consideration
Resending from correct email address Begin forwarded message: From: krste@... Subject: Re: [RISC-V] [tech-privileged] RISC-V H-extension freeze consideration Date: August 1, 2021 at 1:41:10 PM PDT To:
Resending from correct email address Begin forwarded message: From: krste@... Subject: Re: [RISC-V] [tech-privileged] RISC-V H-extension freeze consideration Date: August 1, 2021 at 1:41:10 PM PDT To:
|
By
Krste Asanovic
·
|
|
[RISC-V] [tech-tee] [RISC-V] [tech-privileged] Smepmp discovery
2 messages
It’s a cheap, effective solution. But I think Andrew’s question is whether a solution is needed. If the early boot code knows what hardware it’s running on, it doesn’t need the information. But will t
It’s a cheap, effective solution. But I think Andrew’s question is whether a solution is needed. If the early boot code knows what hardware it’s running on, it doesn’t need the information. But will t
|
By
Bill Huffman
·
|
|
Naming of S* extensions
3 messages
Section 25.7 of the unprivileged spec says that standard supervisor-level ISA extensions are named using S as a prefix. Section 25.9 says that standard machine-level ISA extensions are named using Zxm
Section 25.7 of the unprivileged spec says that standard supervisor-level ISA extensions are named using S as a prefix. Section 25.9 says that standard machine-level ISA extensions are named using Zxm
|
By
Paul Donahue
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
23 messages
I'm unclear whether you are objecting to 4 byte alignment, or reserving the low bits for something else in the future. In any case, I am not seeing why 4 byte alignment should cause any issue even wit
I'm unclear whether you are objecting to 4 byte alignment, or reserving the low bits for something else in the future. In any case, I am not seeing why 4 byte alignment should cause any issue even wit
|
By
Allen Baum
·
|
|
Fast track arch extension proposal for "stateen" CSRs
Greg wrote: You are correct. An editing error, of course. I'm aware of at least one other mistake. Under "Motivation" it currently says: Actually, only some of the AIA's supervisor-level CSRs need swa
Greg wrote: You are correct. An editing error, of course. I'm aware of at least one other mistake. Under "Motivation" it currently says: Actually, only some of the AIA's supervisor-level CSRs need swa
|
By
John Hauser
·
|
|
[RISC-V] [security] Fast track arch extension proposal for "stateen" CSRs
John, See below for a couple of small but important typos. Greg The references to bits 57 and 58 in the following two paragraphs are incorrect and should be to bits 58 and 59.
John, See below for a couple of small but important typos. Greg The references to bits 57 and 58 in the following two paragraphs are incorrect and should be to bits 58 and 59.
|
By
Greg Favor
·
|
|
Fast track arch extension proposal for "stateen" CSRs
Josh Scheid wrote: For that very reason, we don't intend to allow such extensions to be enabled by a stateen bit. The dual-use case can apply only for extensions that don't have this issue, like Zfinx
Josh Scheid wrote: For that very reason, we don't intend to allow such extensions to be enabled by a stateen bit. The dual-use case can apply only for extensions that don't have this issue, like Zfinx
|
By
John Hauser
·
|
|
[RISC-V] [security] Fast track arch extension proposal for "stateen" CSRs
This works for pure state enables, but may have issues for extensions that use the field for more than that (the allowed use for, say, the dual-purpose cases above). Particularly if the extension is o
This works for pure state enables, but may have issues for extensions that use the field for more than that (the allowed use for, say, the dual-purpose cases above). Particularly if the extension is o
|
By
Josh Scheid
·
|
|
[RISC-V] [tech-virt-mem] Access faults for paging structures linked to hgatp
10 messages
Forwarding to tech-privileged so the hypervisor folks can weigh in...
Forwarding to tech-privileged so the hypervisor folks can weigh in...
|
By
Daniel Lustig
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
4 messages
Hello Greg, Στις 2021-06-28 22:29, Greg Favor έγραψε: Have you considered using mscratch for this instead of defining a new CSR ? Regards, Nick
Hello Greg, Στις 2021-06-28 22:29, Greg Favor έγραψε: Have you considered using mscratch for this instead of defining a new CSR ? Regards, Nick
|
By
mick@...
·
|
|
Fast track arch extension proposal for "stateen" CSRs
Folks, I have below the latest version of the plan to add optional "stateen" (State Enable) CSRs to the RISC-V Privileged Architecture, now in the form of a fast-track extension proposal. Much of this
Folks, I have below the latest version of the plan to add optional "stateen" (State Enable) CSRs to the RISC-V Privileged Architecture, now in the form of a fast-track extension proposal. Much of this
|
By
John Hauser
·
|
|
[RISC-V] [tech-config] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
14 messages
Why does it need to be a CSR? In other parts of the boot flow the device tree pointer is passed via a normal general purpose register. Why can't the same be done here? Jonathan
Why does it need to be a CSR? In other parts of the boot flow the device tree pointer is passed via a normal general purpose register. Why can't the same be done here? Jonathan
|
By
Jonathan Behrens
·
|
|
Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
12 messages
The new "unified RISC-V low-level discovery method" being developed by tech-config (for use by all extensions that have information that needs to be easily discoverable by software), is almost complet
The new "unified RISC-V low-level discovery method" being developed by tech-config (for use by all extensions that have information that needs to be easily discoverable by software), is almost complet
|
By
Greg Favor
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
2 messages
Note that in an earlier discussion with Greg, I had proposed all-ones as the escape, as a single-byte message can not be valid.
Note that in an earlier discussion with Greg, I had proposed all-ones as the escape, as a single-byte message can not be valid.
|
By
Philipp Tomsich
·
|
|
[RISC-V] [tech-chairs] Architecture extension proposal for ConfigPtr CSR to "Unified RISC-V Discovery Method" config structure
I think we can extend meaning of that CSR register (for future) by allowing write of some 'keyed/secret' value into it. Keeping it 'clean address' is IMO better for now. /Robert -- Regards, Robert Chy
I think we can extend meaning of that CSR register (for future) by allowing write of some 'keyed/secret' value into it. Keeping it 'clean address' is IMO better for now. /Robert -- Regards, Robert Chy
|
By
Robert Chyla
·
|
|
RISC-V H-extension freeze consideration
37 messages
Hi All, The RISC-V H-extension v0.6.1 draft was released almost a year back in May 2020. There has been no changes in the H-extension specification since then. Meanwhile, we have RISC-V H-extension v0
Hi All, The RISC-V H-extension v0.6.1 draft was released almost a year back in May 2020. There has been no changes in the H-extension specification since then. Meanwhile, we have RISC-V H-extension v0
|
By
Anup Patel
·
|
|
proposal for stateen CSRs
59 messages
Hello tech-privileged, The proposal below has been discussed by some of the principle RISC-V architects for incorporation into the official Privileged Architecture. The text below makes reference to Z
Hello tech-privileged, The proposal below has been discussed by some of the principle RISC-V architects for incorporation into the official Privileged Architecture. The text below makes reference to Z
|
By
John Hauser
·
|
|
Proposed deprecation of N extension
16 messages
Hi, We are proposing to remove the N extension from the architecture. The most important role the N extension fills is supporting untrusted interrupt handling in microcontrollers. These systems have M
Hi, We are proposing to remove the N extension from the architecture. The most important role the N extension fills is supporting untrusted interrupt handling in microcontrollers. These systems have M
|
By
andrew@...
·
|