|
Re: MTIME update frequency
100 MHz is way more than sufficient for carrying out a Spectre attack. Web browsers limit clock resolutions to 1 kHz or even 500 Hz to disrupt those sorts of attacks (and apply other mitigations as
100 MHz is way more than sufficient for carrying out a Spectre attack. Web browsers limit clock resolutions to 1 kHz or even 500 Hz to disrupt those sorts of attacks (and apply other mitigations as
|
By
Jonathan Behrens <behrensj@...>
·
#1497
·
|
|
Re: MTIME update frequency
The intent of the wording is that the resolution is 10ns (as implied by the max update frequency of 100 MHz). But I agree that the current wording should change to just directly state a 10ns
The intent of the wording is that the resolution is 10ns (as implied by the max update frequency of 100 MHz). But I agree that the current wording should change to just directly state a 10ns
|
By
Greg Favor
·
#1496
·
|
|
Re: MTIME update frequency
The resolution of the mtime register is defined as 10 ns. The 100 MHz
value is irrelevant and should be deleted from the spec.
(You could check if an mtime increment is needed at a 10 GHz rate.
The resolution of the mtime register is defined as 10 ns. The 100 MHz
value is irrelevant and should be deleted from the spec.
(You could check if an mtime increment is needed at a 10 GHz rate.
|
By
Heinrich Schuchardt
·
#1495
·
|
|
MTIME update frequency
I have a question about this requirement:
"The ACLINT MTIME update frequency (i.e. hardware clock) must be between 10 MHz and 100 MHz, and updates must be strictly monotonic."
I do understand
I have a question about this requirement:
"The ACLINT MTIME update frequency (i.e. hardware clock) must be between 10 MHz and 100 MHz, and updates must be strictly monotonic."
I do understand
|
By
Ved Shanbhogue
·
#1494
·
|
|
Next Platform HSC Meeting on Mon Nov 15th 2021 8AM PST
Hi All,
The next platform HSC meeting is scheduled on Mon Nov 15th 2021 at 8AM PST.
Here are the details:
Agenda and minutes kept on the github
Hi All,
The next platform HSC meeting is scheduled on Mon Nov 15th 2021 at 8AM PST.
Here are the details:
Agenda and minutes kept on the github
|
By
Kumar Sankaran
·
#1493
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
Sure. I will update the patch.
I was talking about the CMO (cache management operations) CSRs.
Here are the
Sure. I will update the patch.
I was talking about the CMO (cache management operations) CSRs.
Here are the
|
By
atishp@...
·
#1492
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
Agree that adding a clarification that these are "required" only if supporting SW interrupts or other interrupts to M-mode is supported. Else the specification reads as if these are always
Agree that adding a clarification that these are "required" only if supporting SW interrupts or other interrupts to M-mode is supported. Else the specification reads as if these are always
|
By
Ved Shanbhogue
·
#1491
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
Table 1 merely states the information rather than requirement.
For example:
If category 3 (MSIs and Wired IRQs) is used, MSIs at M-mode can
be provided using IMSIC while wired interrupts at M-mode
Table 1 merely states the information rather than requirement.
For example:
If category 3 (MSIs and Wired IRQs) is used, MSIs at M-mode can
be provided using IMSIC while wired interrupts at M-mode
|
By
atishp@...
·
#1490
·
|
|
Re: [PATCH 2/2] Specify M-mode protection content for platforms with M-mode
We should use a language that is unambiguous. RFC 2119 is well established in the software industry. I am not aware of a better alternative. For sure it makes sense to reference this RFC in out
We should use a language that is unambiguous. RFC 2119 is well established in the software industry. I am not aware of a better alternative. For sure it makes sense to reference this RFC in out
|
By
Heinrich Schuchardt
·
#1489
·
|
|
Re: [PATCH 2/2] Specify M-mode protection content for platforms with M-mode
If that is indeed the case, that we should be using wording according to
RFC 2119, then this specification or the policy should be updated to
specifically say that.
If that is indeed the case, that we should be using wording according to
RFC 2119, then this specification or the policy should be updated to
specifically say that.
|
By
Darius Rad
·
#1488
·
|
|
Re: [PATCH 2/2] Specify M-mode protection content for platforms with M-mode
%s/are/shall be/
Having M-mode does not protect anything. It is something the platform must implement, e.g. via MMU configuration. We should use the wording according to RFC
%s/are/shall be/
Having M-mode does not protect anything. It is something the platform must implement, e.g. via MMU configuration. We should use the wording according to RFC
|
By
Heinrich Schuchardt
·
#1487
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
The platform spec has been changed so the mandate of PMP and how many are not there any longer for targeting binary portability for the purposes of the OS. That said, the original requirement noted in
The platform spec has been changed so the mandate of PMP and how many are not there any longer for targeting binary portability for the purposes of the OS. That said, the original requirement noted in
|
By
Aaron Durbin
·
#1486
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
Actually, you point out one more possible difference:
"PMP matching needs a priority decoder by definition of the spec to match the lowest entry.
The server extension in the platform spec is
Actually, you point out one more possible difference:
"PMP matching needs a priority decoder by definition of the spec to match the lowest entry.
The server extension in the platform spec is
|
By
Allen Baum
·
#1485
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
I had exactly the same question: hardwiring anything reduces validation effort, it doesn't increase it.
Also
"There is no way, in the positive, to declare a region as M-mode only. That would be the
I had exactly the same question: hardwiring anything reduces validation effort, it doesn't increase it.
Also
"There is no way, in the positive, to declare a region as M-mode only. That would be the
|
By
Allen Baum
·
#1484
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
I'm not yet understanding the validation concerns? An implementation is free to hardwire all the unneeded registers and functionality (thus removing most all of the useless area and power), and one
I'm not yet understanding the validation concerns? An implementation is free to hardwire all the unneeded registers and functionality (thus removing most all of the useless area and power), and one
|
By
Greg Favor
·
#1483
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
I tried to describe the situation here: https://lists.riscv.org/g/tech-unixplatformspec/message/1393
We have power and performance concerns. Also if one goes down the ePMP (same is true for PMP) path
I tried to describe the situation here: https://lists.riscv.org/g/tech-unixplatformspec/message/1393
We have power and performance concerns. Also if one goes down the ePMP (same is true for PMP) path
|
By
Aaron Durbin
·
#1482
·
|
|
Re: Next Platform HSC Meeting on Mon Nov 1st 2021 8AM PST - Meeting Minutes Nov 1 2021
Hi All,
The meeting minutes for this meeting are uploaded to our usual location on platform wiki here https://github.com/riscv/riscv-platform-specs/wiki/2021.11.01:-Working-Group-Meeting
Hi All,
The meeting minutes for this meeting are uploaded to our usual location on platform wiki here https://github.com/riscv/riscv-platform-specs/wiki/2021.11.01:-Working-Group-Meeting
|
By
Kumar Sankaran
·
#1481
·
|
|
Re: Simple Machine Mode Protection - Was Re: [RISC-V] [tech-unixplatformspec] Platform Spec Technical Feedback
If this new proposal can be entirely subsumed in ePMP, then—while comparing software (firmware) complexity—we must also consider the added cost (for the ecosystem and particularly the software
If this new proposal can be entirely subsumed in ePMP, then—while comparing software (firmware) complexity—we must also consider the added cost (for the ecosystem and particularly the software
|
By
Philipp Tomsich
·
#1480
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
I disagree that the specification provides standardization of U and VU
modes. At best it provides a small and incomplete set of requirements for
those modes.
I disagree that the specification provides standardization of U and VU
modes. At best it provides a small and incomplete set of requirements for
those modes.
|
By
Darius Rad
·
#1479
·
|
|
Re: [PATCH 1/2] Remove the machine mode requirements
Looks good to me. I notice that a few other sections have interspersed
M-mode requirements that could be similarly addressed. A few additional
related comments inline.
1. Table 1 - columns with
Looks good to me. I notice that a few other sections have interspersed
M-mode requirements that could be similarly addressed. A few additional
related comments inline.
1. Table 1 - columns with
|
By
Ved Shanbhogue
·
#1478
·
|