Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

QC suggestions for RC1 (some minor clarifications) #71

Merged
merged 4 commits into from
Sep 30, 2024

Conversation

eckhard-delfs-qualcomm
Copy link
Contributor

  • Removal of "allow/disallow" only option from Smmtt34
  • adding explicit statement how many SDs are supported by SmMTT
  • clarification that permission attribute is "disallowed" not allowed
  • ambiguity: "MTT structure accesses" -> MTT checker accesses to MTT structures
  • clarification to informative statement on MTT lookups in section 4.4: Chapter 2 states that when Smmtt is implemented, MTT and e(PMP) are always active. Hence the phrases "while active / no longer active" can be misleading.

- allow/disallow mode has been abandoned.
- support for up to 64 domains should be mentioned more explicitly.

Signed-off-by: eckhard-delfs-qualcomm <[email protected]>
Suggestions to make wording more specific.
Regarding informative note: Chapter 2 states that when Smmtt is implemented, MTT and e(PMP) are always active. Hence the phrases "while active / no longer active" may be misleading.

Signed-off-by: eckhard-delfs-qualcomm <[email protected]>
typo

Signed-off-by: eckhard-delfs-qualcomm <[email protected]>
chapter3.adoc Outdated
@@ -113,7 +113,8 @@ every bit position in the `SDID` field, then reading back the value in `mttp`
to see which bit positions in the `SDID` field hold a one. The
least-significant bits of `SDID` are implemented first: that is, if `SDIDLEN` >
0, `SDID`[`SDIDLEN`-1:0] is writable. The maximal value of `SDIDLEN`, termed
`SDIDMAX`, is 6 for `Smmtt[34 | 46 | 56]`.
`SDIDMAX`, is 6 for `Smmtt[34 | 46 | 56]` and consequently allows for up to
64 supervisor domains.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My reading of the spec is that SDIDs are intended to work like ASIDs: they can be reused if you run out, at the cost of requiring a full-address-space fence when repurposing an SDID for a different supervisor domain (either at startup or during the context switch). So there is effectively no limit on the number of active supervisor domains. I have opened #76 to clarify this.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thats correct - see the comment on the use of SDIDs in that issue #76

chapter3.adoc Outdated Show resolved Hide resolved
chapter4.adoc Outdated Show resolved Hide resolved
chapter4.adoc Outdated Show resolved Hide resolved
chapter4.adoc Outdated Show resolved Hide resolved
Copy link
Collaborator

@rsahita rsahita left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

edits look fine to me with some changed merged in.

@rsahita rsahita merged commit 53e46a1 into riscv:main Sep 30, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants