|
Re: [PATCH 2/2] Specify M-mode protection content for platforms with M-mode
We should use a language that is unambiguous. RFC 2119 is well established in the software industry. I am not aware of a better alternative. For sure it makes sense to reference this RFC in out
We should use a language that is unambiguous. RFC 2119 is well established in the software industry. I am not aware of a better alternative. For sure it makes sense to reference this RFC in out
|
By
Heinrich Schuchardt
·
#1489
·
|
|
Re: [PATCH 2/2] Specify M-mode protection content for platforms with M-mode
If that is indeed the case, that we should be using wording according to
RFC 2119, then this specification or the policy should be updated to
specifically say that.
If that is indeed the case, that we should be using wording according to
RFC 2119, then this specification or the policy should be updated to
specifically say that.
|
By
Darius Rad
·
#1488
·
|
|
Re: [PATCH 2/2] Specify M-mode protection content for platforms with M-mode
%s/are/shall be/
Having M-mode does not protect anything. It is something the platform must implement, e.g. via MMU configuration. We should use the wording according to RFC
%s/are/shall be/
Having M-mode does not protect anything. It is something the platform must implement, e.g. via MMU configuration. We should use the wording according to RFC
|
By
Heinrich Schuchardt
·
#1487
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
The platform spec has been changed so the mandate of PMP and how many are not there any longer for targeting binary portability for the purposes of the OS. That said, the original requirement noted in
The platform spec has been changed so the mandate of PMP and how many are not there any longer for targeting binary portability for the purposes of the OS. That said, the original requirement noted in
|
By
Aaron Durbin
·
#1486
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
Actually, you point out one more possible difference:
"PMP matching needs a priority decoder by definition of the spec to match the lowest entry.
The server extension in the platform spec is
Actually, you point out one more possible difference:
"PMP matching needs a priority decoder by definition of the spec to match the lowest entry.
The server extension in the platform spec is
|
By
Allen Baum
·
#1485
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
I had exactly the same question: hardwiring anything reduces validation effort, it doesn't increase it.
Also
"There is no way, in the positive, to declare a region as M-mode only. That would be the
I had exactly the same question: hardwiring anything reduces validation effort, it doesn't increase it.
Also
"There is no way, in the positive, to declare a region as M-mode only. That would be the
|
By
Allen Baum
·
#1484
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
I'm not yet understanding the validation concerns? An implementation is free to hardwire all the unneeded registers and functionality (thus removing most all of the useless area and power), and one
I'm not yet understanding the validation concerns? An implementation is free to hardwire all the unneeded registers and functionality (thus removing most all of the useless area and power), and one
|
By
Greg Favor
·
#1483
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
I tried to describe the situation here: https://lists.riscv.org/g/tech-unixplatformspec/message/1393
We have power and performance concerns. Also if one goes down the ePMP (same is true for PMP) path
I tried to describe the situation here: https://lists.riscv.org/g/tech-unixplatformspec/message/1393
We have power and performance concerns. Also if one goes down the ePMP (same is true for PMP) path
|
By
Aaron Durbin
·
#1482
·
|
|
Re: Next Platform HSC Meeting on Mon Nov 1st 2021 8AM PST - Meeting Minutes Nov 1 2021
Hi All,
The meeting minutes for this meeting are uploaded to our usual location on platform wiki here https://github.com/riscv/riscv-platform-specs/wiki/2021.11.01:-Working-Group-Meeting
Hi All,
The meeting minutes for this meeting are uploaded to our usual location on platform wiki here https://github.com/riscv/riscv-platform-specs/wiki/2021.11.01:-Working-Group-Meeting
|
By
Kumar Sankaran
·
#1481
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
If this new proposal can be entirely subsumed in ePMP, then—while comparing software (firmware) complexity—we must also consider the added cost (for the ecosystem and particularly the software
If this new proposal can be entirely subsumed in ePMP, then—while comparing software (firmware) complexity—we must also consider the added cost (for the ecosystem and particularly the software
|
By
Philipp Tomsich
·
#1480
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
I disagree that the specification provides standardization of U and VU
modes. At best it provides a small and incomplete set of requirements for
those modes.
I disagree that the specification provides standardization of U and VU
modes. At best it provides a small and incomplete set of requirements for
those modes.
|
By
Darius Rad
·
#1479
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
Looks good to me. I notice that a few other sections have interspersed
M-mode requirements that could be similarly addressed. A few additional
related comments inline.
1. Table 1 - columns with
Looks good to me. I notice that a few other sections have interspersed
M-mode requirements that could be similarly addressed. A few additional
related comments inline.
1. Table 1 - columns with
|
By
Ved Shanbhogue
·
#1478
·
|
|
[PATCH 2/2] Specify M-mode protection content for platforms with M-mode
This version of the platform specification doesn't mandate M-mode
requirements. However, it should specify M-mode access protection
from lower privilege modes for platforms that do implement
This version of the platform specification doesn't mandate M-mode
requirements. However, it should specify M-mode access protection
from lower privilege modes for platforms that do implement
|
By
atishp@...
·
#1477
·
|
|
[PATCH 1/2] Remove the machine mode requirements
As per the discussion in the mailing list, M-mode requirements
should not be included in this version of the platform specification
to allow platform vendors more flexibility in implementing
As per the discussion in the mailing list, M-mode requirements
should not be included in this version of the platform specification
to allow platform vendors more flexibility in implementing
|
By
atishp@...
·
#1476
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
My issue here is that I'm still not seeing what this does that the proposed ePMP definition doesn't already do.
What I heard is that it's too expensive or too complex, but that's a bit vague.
Could
My issue here is that I'm still not seeing what this does that the proposed ePMP definition doesn't already do.
What I heard is that it's too expensive or too complex, but that's a bit vague.
Could
|
By
Allen Baum
·
#1475
·
|
|
Next Platform HSC Meeting on Mon Nov 1st 2021 8AM PST
Hi All,
The next platform HSC meeting is scheduled on Mon Nov 1st 2021 at 8AM PST.
Here are the details:
Agenda and minutes kept on the github
Hi All,
The next platform HSC meeting is scheduled on Mon Nov 1st 2021 at 8AM PST.
Here are the details:
Agenda and minutes kept on the github
|
By
Kumar Sankaran
·
#1474
·
|
|
Re: Watchdog Spec Questions
On 15/10/21, 2:34 PM, "tech-unixplatformspec@... on behalf of Andrew Jones" <tech-unixplatformspec@... on behalf of drjones@...> wrote:
Will the watchdog timer
On 15/10/21, 2:34 PM, "tech-unixplatformspec@... on behalf of Andrew Jones" <tech-unixplatformspec@... on behalf of drjones@...> wrote:
Will the watchdog timer
|
By
Anup Patel
·
#1473
·
|
|
Re: Watchdog Spec Questions
Some system designers will feel that way and others won't. The spec doesn't try to get into the business of telling a system designer how to incorporate and use it in their system. These choices are
Some system designers will feel that way and others won't. The spec doesn't try to get into the business of telling a system designer how to incorporate and use it in their system. These choices are
|
By
Greg Favor
·
#1472
·
|
|
Re: Watchdog Spec Questions
The output signal from the watchdog can be (but doesn't have to be) treated as an interrupt request signal. That choice (and more generally where the signal goes to) are implementation and/or
The output signal from the watchdog can be (but doesn't have to be) treated as an interrupt request signal. That choice (and more generally where the signal goes to) are implementation and/or
|
By
Greg Favor
·
#1471
·
|
|
Re: Watchdog Spec Questions
Even the first-stage timeout would probably be more useful to the OS if it was a "non-maskable interrupt" or otherwise able to arrive even with sstatus.SIE bit unset. If the system has locked up to
Even the first-stage timeout would probably be more useful to the OS if it was a "non-maskable interrupt" or otherwise able to arrive even with sstatus.SIE bit unset. If the system has locked up to
|
By
Jonathan Behrens <behrensj@...>
·
#1470
·
|