M-mode virtualization as a replacement for HS, S, and U modes

222 views
Skip to first unread message

Kelly Dean

unread,
Mar 26, 2018, 1:56:41 AM3/26/18
to isa...@groups.riscv.org
Problems that M-mode virtualization solves:
The complexity of the M-mode ISA being different from the S-mode ISA.
The need for two different access control mechanisms (privilege level 0/1/3 and virtualization level 0/1).
The need for an HS-specific hstatus CSR with VTSR, VTW, VTVM, SPV, STL, and SPRV fields, and the various other HS-specific h* and bs* CSRs, and MPV and MTL in mstatus.
The need to modify the ISA to work with hardware that supports exotic virtualization configurations.
The inability to use virtualization as just a software composition mechanism, without having to waste resources for unnecessary security mechanisms.
The inability to transparently (without mucking up the customer's M-mode binaries by making him link with the manufacturer's emulation code) provide trap-and-emulate for features not implemented in hardware, e.g. Allen's DIV.
The possible need to complicate the compliance test suite, as Cesar and Allen described, to deal with partial implementation of extensions, due to the lack of transparent emulation.

This message is long, not because virtualizing M-mode is complicated, but because I'm describing it relative to the current privileged arch manual, and describing implications of the differences. At first glance, it will look like I'm removing essential CSRs and proliferating superfluous ones, but in the end the only major changes are the addition of a handful of meta-CSRs and the addition of a mechanism resembling CSR number translation, analogous to address translation.


§1: Combine M, HS, S, and U into a single mode
Move the f* CSRs to M-mode.
Move satp to M-mode, and the description of it and virtual memory to the Machine-Level ISA chapter.
Remove the rest of the Supervisor-Level ISA chapter, the hypervisor proposal, the tables for U-mode and S-mode CSR numbers, and the concepts of HS, S, and U modes from the manual.
Rename satp to “atp”.
Remove the “m” prefix from all the M-mode CSR names.
Remove the concept of privilege level/mode, and replace it by virtualization level, with level 0 meaning unvirtualized.
Recombine MRET, HRET, SRET, and URET all into ERET (which was removed from the current version of the manual), with virtualization level as an immediate argument.


§2: Virtualize that single mode to arbitrary nesting levels

Virtualization level is objective, but each level subjectively sees itself as level 0, and sees the next nested level as 1, etc. E.g. level 2 sees itself as 0, and sees 3 as 1. So, add the current virt level to the argument to ERET to get the target level.

Add a new 32-bit meta-CSR: vconf (virtualization configuration), explained below.

Separate the concepts of CSR, CSR type, and CSR view. For each CSR (including vconf), create an array of duplicates of it; they're all the same type, but each element of the array is a distinct CSR. The array length is implementation-defined, will generally be different for each type, and determines the hardware virtualization nesting depth that's supported for that type. The length of any particular array in a typical implementation will be no more than 4. Some of the arrays will have length 1 (i.e. only 1 CSR of that type), and some length 0 (for an unsupported type). E.g. typically debug CSR arrays will have length 1, and if address translation isn't supported, the atp CSR array will have length 0. But a Unix-capable processor will have trap setup/handing CSR arrays of at least length 2 and atp at least length 1, and a hypervisor-capable processor will have lengths at least 3 and 2, respectively (with atp[1] for SLAT).

Change the M-mode CSR table in the spec to say it's a table of CSRviews, not of CSRs. Each view, e.g. «status», always uses a fixed number, e.g. 0x300, but the CSR that it accesses depends on the current virtualization level. For CSRs that are always hardware virtualized from one virt level to the next, the current virt level is an index into the array. E.g. at level 0, status accesses status[0], corresponding to traditional mstatus. At level 1, status accesses status[1], corresponding to sstatus, and at level 2, status[2], corresponding to ustatus. An implementation can have arbitrarily long arrays, to efficiently support arbitrary nesting depths, with no need to change the ISA or assign new CSRview names or numbers for every new level. This is academically useful, but typical hardware won't go very deep.

For each CSRtype, add a second CSRview, with a different number than the first, with “g” (guest) prefixed to the name. When CSRview x accesses CSR x[i], gx accesses x[i+1]. This is a bit like the background CSRs in the current hypervisor spec proposal. But x and gx don't get swapped, and in general the array length can be greater than 2.

Optionally also add g2x and g3x for x[i+2] and x[i+3], etc, up to the length of the x CSRarray, though generally there's no need for this. Since g* CSRs never affect machine behavior and don't require atomic access (until a higher virt level that uses them is activated, either fully, or partially via use of ML (formerly MPRV; see below) or MXR), and proliferation of CSRviews would put pressure on the 12-bit number space, another option would be to map the g* CSRviews to some standard memory addresses. But the CSRs themselves must still be hart-local real CSRs, not just stored in main memory, because they (along with lower level CSRs) do affect machine behavior at higher virt levels.

CSRs aren't always hardware-virtualized going from one virt level to the next. They might not be virtualized at all, and instead access the host's (i.e. previous level's) own CSR directly, e.g. typically fflags accesses the host's CSR. Or they might be software-virtualized. Or they might be omitted; e.g. typically virt levels above 0 have no debug CSRs. So, support of m virt levels in typical usage doesn't require every CSRarray to have length m. And at virt level n, a particular CSRview might access a CSR at an array index less than n. But for simplicity of specification and implementation, CSRviews x and gx never access the same CSR; when x accesses x[i], gx always accesses x[i+1], g2x accesses x[i+2], etc.

Controlling which CSRviews access which CSRs is what the vconf CSRs are for. Each vconf CSR has a two-bit field for each of the following groups of CSRviews:
info registers (vendorid, etc are all one group)
trap setup (status, ie, and tvec, but not isa, trap delegation, or counteren)
isa
trap delegation (edeleg and ideleg, but not counteren)
trap handling
pmp* (pmpcfg0..15 and pmpaddr0..15 all together are one group)
counters/timers
counteren
hpmevent*
debug/trace
f*
atp
gvconf

Virt level n-1 configures its guest, n, by writing to vconf[n]. For n, for each field f in vconf[n], for each CSRview x in the group controlled by f, the value of f specifies which (and how) CSR x_ is accessed by x.
f value and x access:
0: None. And n is told x_ doesn't exist. Do horizontal trap on access to x, so n itself can optionally emulate x_. If n's host (i.e. virt level n-1) provides no trap setup/handling CSRs to n, then do vertical trap if x is accessed, and n-1 can kill n.
1: None. But n is told x_ does exist. Do vertical trap on access to x, and n-1 emulates x_.
2: x[i-1], the CSR that x accesses for the host.
3: x[i], i.e. the next one in the array.

IOW, bit 0 of the field is high if the CSR is virtualized, and bit 1 is high if the CSR is implemented in hardware (i.e. implemented by the host of virt level 0; of course the hardware itself might be emulated in software, but that's irrelevant here).

If the atp field value in vconf[n] is 0 or 1, then SFENCE.VMA in virt level n is also trapped, in addition to the atp CSR.

The privileged arch manual's trap setup and handling CSRs tangle up all privilege levels. To untangle them:
Rename the MIE bit to IE, and MPIE to PIE, in status (remember, mstatus was renamed above to status).
Rename MPP to PL (previous level; besides dropping “M” prefix, rename it because it records previous virt level, not previous privilege mode).
Remove the SIE, SPIE, SPP, UIE, and UPIE bits. They're replaced respectively by IE, PIE, and PL in gstatus, and IE and PIE in g2status.
Rename MPRV to ML (modify level).
Rename TSR to TER (Trap ERET).
Rename MXL to XL in isa (renamed from misa).
Remove the SXL and UXL fields from status. They're replaced by XL in gisa and g2isa, respectively.
Remove the TVM bit; it's replaced by the atp field in vconf.
Remove the “M” prefix from bit names in ip (renamed from mip) and ie (renamed from mie).
Remove S* and U* bits from ip and ie; they're replaced by the un-prefixed bits in gip, g2ip, gie, and g2ie.

PL field width could be implementation-defined (and thus specified in a read-only meta-CSR), since it must be at least log2 of the length of the vconf CSRarray, i.e. of the number of hardware virt levels supported, which in general can be greater than 4. But in typical implementations, it will be no greater than 4, so PL will need only 2 bits. Or, instead of the complexity of having the width be implementation-defined, it could be fixed at e.g. 3 or 4 bits, which creates an ISA-level limit on the hardware-supported virtualization nesting depth, on the assumption that no reasonable hardware will ever exceed that limit.

Behavioral changes for trap setup and handling:
Before writing value v to status.PL for virt level n, the processor first decrements v by n, to maintain n's subjective view of virt levels.
ML and MXR in status for virt level n affect only n and higher. TER, TW, and SUM affect n+1.

Hardware-implemented CSRs inherit the host's access type (read-only vs. read/write). I.e. if a CSR x[i] is read-only at level n, and the field for x in vconf[n+1] has value 2 or 3, then x[i+1] is read-only at level n+1. However, x[i+1] is read/write at level n (and is accessed using CSRview gx), which enables n to modify the read-only value seen by n+1. Changing read-only vs. read/write access (i.e. preventing inheritance) isn't a feature provided by hardware virtualization; to do it, use field value 1, i.e. trap and emulate in software.

An exception is the counters/timers. If the field value in vconf[n+1] for counters/timers is 0, 2, or 3, then it works as described above, and the counteren CSR at virt level n is ignored. But if the field value is 1, then counteren bit c specifies whether to always trap counter c of level n+1 or grant read-only access to n's own counter c (and trap only the writes). But regardless of configuration, the CSRview numbers for counters for all virt levels are the same as for virt level 0; they don't change as they do for different privilege levels in the privileged arch manual.

Another exception to inheritance is vconf itself. vconf[0] is always hardwired, but vconf[n] for n>0 will be hardwired or read/write depending on whether the processor supports reconfigurable virtualization. Since hypervisor support is indicated by the processor having CSRarrays of sufficient length (e.g. at least length 2 for atp), the H bit in the isa CSR is no longer needed for that, so the H bit is used instead to indicate virtualization reconfigurability.

Each vconf CSR that specifies value 3 in the field for CSRview x requires an additional element in the CSRarray of x's type. For values 0, 1, and 2, no additional element is required. IOW, virtualizing CSRs in hardware requires more of them; virtualizing them in software (or not at all) doesn't.

There's no field for vconf itself, because it's always implicitly 0, i.e. a program running at virt level n can never access the vconf[n] CSR. Write access obviously must be disallowed, because it would allow the program to change which CSRs it has access to. But read access also must be disallowed, because it would be a virtualization hole, by allowing the program to see whether its CSRs have vconf field values 1, 2, or 3.

Thus, although there's an array of vconf CSRs, the vconf CSRview can never be used, so it doesn't even have a number assigned for it in the CSRview table in the manual; it's only an explanatory mechanism. Instead, another CSRview, hconf (host configuration), is a read-only, masked view of vconf. hconf tells virt level n which CSRs are available, i.e. what configuration n's host has set up for n. vconf CSRs are always hardware virtualized from one virt level to the next, so hconf always accesses vconf[n] for virt level n (and gvconf always accesses vconf[n+1]). So, the gvconf field in every vconf[n] must have value 3, except 0 for the last vconf array element that's used.

For each field f in hconf[n], bit 1 is the logical «or» of the two bits of f in vconf[n]. IOW, where f controls CSRview x, bit 1 indicates whether the CSR accessed by x exists for virt level n. hconf[n] bit 0 is used to indicate whether the processor supports hardware virtualization (from the point of view of virt level n) of the CSR accessed by x. If x in virt level n accesses the last CSR in the array of that type, then (further) hardware virtualization isn't supported, because it would require an additional element beyond the last one.

The value of bit 0 is 1 if another element in the hardware CSRarray of x's type is available, and no vconf[p] for p<n has f value 0 or 1. IOW, if any virt level disables the CSR for the next level, or virtualizes it in software, then hardware virtualization at higher levels is illegal, even if more elements in the array are available. That's because lower-level CSRs generally affect machine behavior, but disabling or software-virtualizing them would require trapping even when the processor itself tries to read them to implement that behavior, and that's making my head hurt.

Thus, f values in hconf mean:
0: the CSR accessed by x doesn't exist
2: it does exist, but it isn't hardware virtualizable
3: it does exist, and is hardware virtualizable

Value 1 never appears in an hconf field.

For each field, given a value in hconf[n], the allowed values in gvconf[n] (i.e. vconf[n+1]) are:
0: 0, 1
2: 0, 1, 2
3: 0, 1, 2, 3

IOW, it's illegal for n to hardware-virtualize a CSR that isn't hardware virtualizable, or to grant to n+1 pass-through access to a CSR that's nonexistent for n.

Trying to write an illegal value to a field in gvconf (or g2vconf, etc) results in a trap. And when f in hconf isn't 3, trying to read or write to gx results in a trap.

Since CSRviews are logically grouped, rather than each CSRview getting its own field in vconf (which would make vconf excessively wide), and hconf indicates availability of additional CSRarray elements, all of the CSRarrays in a given group must therefore have the same length.

The processor hardwires the vconf[0] fields for all unsupported CSRs to 0. Fields for supported CSRs are hardwired to 2, and therefore will be read as 2 or 3 in hconf[0] depending on whether the processor has more than just 1 CSR in each of the arrays of the types controlled by the field.

The CSRR* instructions take a CSRview number, not a CSR number. To find the CSR for CSRview x for virt level n, count the quantity q of CSRs in the vconf array in the range 0..n for which the field for x has value 3 (meaning hardware virtualized). Then, the CSR accessed by x is x[q]. But if the field for x in any of those vconf CSRs has value 0 or 1, then trap.


§3: Some other implications

With M-mode virtualization, the standard M/S/U structure that's currently inflexibly specified in the privileged architecture manual is still a programmable option, if the relevant CSRarrays have at least length 2, corresponding to provision of the traditional s* CSRs, or length 3, for s* and u*. The program running at virt level 0 would assign zero to all the fields in gvconf, except the following:
gvconf: 3
trap setup: 3
trap delegation: 3
trap handling: 3
counters/timers: 1
counteren: 3
f*: 2
atp: 2

Virt level 1 (traditionally the supervisor) would assign zero to all, except:
trap setup: 3 (to support the Risc-v «N» extension)
trap handling: 3 (ditto)
counters/timers: 1
f*: 2

In this example, since virt level 1 assigns 0 to the gvconf field in its gvconf CSR, level 2 doesn't get a gvconf CSR, because level 2 is traditionally what's called “user-level” and doesn't present an environment to a nested VM.

The ABI difference is that virt levels 1 and 2 use the same CSRview numbers that virt level 0 does, instead of different (e.g. s* and u*) ones. Not only programs at virt level 0, but also programs at all other levels, perceive themselves to be running at level 0. If their hosts set fields in gvconf to 0 to disable access for some CSRs, this is indistinguishable from running on a processor with omitted CSRs.

Besides the standard structure, this enables other options. E.g.
A. Address translation can be managed at virt level 0.
B. Virt level 0 can virtualize itself efficiently, by copying hconf to gconf, then changing gvconf fields with value 2 to 1, and doing trap-and-emulate only for the non-hardware-virtualizable CSRs (i.e. the ones with hconf value 2).
C. Virtualization can be used just for software composition, without any hardware security mechanisms at all, such as PMP or address translation.
D. Virt level 0 might do nothing except trap and emulate for omitted hardware (e.g. Allen's divider) and isa (to report that the M extension is fully implemented), and fully delegate everything else to virt level 1. To do this, copy hconf to gvconf, then change all gvconf fields with value 3 to 2 (except isa and trap setup/handling/delegation), copy isa to gisa, set the M bit in gisa to 1, set all ideleg bits to 1, set all edeleg bits to 1 except illegal-instruction, and handle just DIV, and delegate all other illegals. Such a program could run from on-board ROM at reset, so that the first externally loaded program (such as the compliance test suite) has no idea that it's not running at virt level 0, besides the fact that DIV is slow and the platform reserves a small memory range for use by the real virt level 0. Thus, the DIV-emulation program wouldn't be a compliance headache. This is an example of using virtualization for software composition without needing any security mechanism
s. Though in this example, adding the ROM would kind of defeat the purpose of removing the hardware divider. And, um, Allen just said Krste just said it's ok if MULT doesn't trap, so that kind of moots the point of this exercise. Well, I already wrote this, so I might as well spam all your inboxes with it.
E. Add hardware support for second-level PMP, so programs running on a small RTOS subdivide their own memory, with no change needed to the ISA.
F. Add hardware support for third-level address translation, with no change needed to the ISA. Why just waste energy running Linux on Xen, when you can waste even more running Windows on KVM on Xen?


§4: Microarchitecture changes

An array of vconf CSRs must be provided, with length m+1. vconf[0] is hardwired. vconf[1..m] can be hardwired to encode a standard structure (M, M/U, M/S/U, or M/HS/S/U), or be read/write to enable virtualization reconfiguration, with typically less than 100 extra bits of state.

The CSRR* instructions require a bit counter to find CSRs based on the CSRview argument and the current virt level. But this counter only has to count as high as m, where m is the maximum virt level, which will be no more than 3 for typical processors. And like with the fg/bg swaps in the current hypervisor proposal, this overhead is only incurred when the current virt level changes; it doesn't have to be incurred every time a CSR is accessed.

Adders are required for ERET and status.PL.

Circuitry must be added for the traps described above.

I think that's about it. Current Risc-v core designs would require just a minimal amount of change to be compatible with this ISA.

Samuel Falvo II

unread,
Mar 26, 2018, 2:59:00 PM3/26/18
to Kelly Dean, RISC-V ISA Dev
This reminds me of the discussions about mimicking the S/390 SIE
instruction, which similarly allows for arbitrary nesting of virtual
environments, as I recall.

I'll need to study this in more detail.
> --
> You received this message because you are subscribed to the Google Groups "RISC-V ISA Dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to isa-dev+u...@groups.riscv.org.
> To post to this group, send email to isa...@groups.riscv.org.
> Visit this group at https://groups.google.com/a/groups.riscv.org/group/isa-dev/.
> To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/isa-dev/5xuuRBmHzQNRRsyEYvhpMTP87mMbtBZb39UVXjE6R3x%40local.



--
Samuel A. Falvo II

Ray Van De Walker

unread,
Oct 15, 2018, 2:35:24 PM10/15/18
to Samuel Falvo II, Kelly Dean, RISC-V ISA Dev
I truly think the priv. architecture has good intentions, but I/O instructions strike me as a throwback to the 1950s.
If the CSRs were memory-mapped, a custom page-table and its exception would do m-mode virtualization.
There are certainly issues: timing, caching, etc. They are less in smaller, slower systems.
In larger systems, many of the issues can be solved by writing core changes to caching registers (in my organization we call these "shadow" registers),
then clocking them in with a "take effect" write. This stalls the core once for a complete reconfiguration, instead of for each configuration write.

I also have mild opinions about how to map CSRs to MMIO: I'd make them negative addresses, so accesses based from R0 could reach them with one instruction.
This works with every XLEN, of course. I'd put the machine mode registers closest to zero.
This would also free the CSR ISA for brownfield exploitation, or possibly it could utilize MMIO, and therefore be trivially remappable.
To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/isa-dev/CAEz%3Dso%3DH7iOTqH_QKzg2gBpVbM4RPmg%3DCSVo%2BsbFH-MbL0sfiQ%40mail.gmail.com.

Samuel Falvo II

unread,
Oct 15, 2018, 3:02:08 PM10/15/18
to Ray Van De Walker, Kelly Dean, isa...@groups.riscv.org
On Mon, Oct 15, 2018 at 11:35 AM Ray Van De Walker
<ray.van...@silergy.com> wrote:
> I truly think the priv. architecture has good intentions, but I/O instructions strike me as a throwback to the 1950s.
> If the CSRs were memory-mapped, a custom page-table and its exception would do m-mode virtualization.

The strong desire for M-mode virtualization and the difficulties
encountered when considering CSR accesses suggests to me that the
problem is not with the existence of CSR instructions, but rather with
our intense desire to abuse the CSR space itself by packing it full of
features that should have been kept in CPU-local MMIO-space to begin
with (e.g., performance counters).

I suspect we wouldn't have any issues virtualizing M-mode if the
following conditions were held:

1) CSRs were used strictly for environment-specific meta-data and
relatively infrequently altered configuration settings. Things like
misa, mvendorid, etc. all make perfect sense for CSRs.
2) Operationally-important registers are perhaps best candidates for
moving out of CSR space and into MMIO. This would include things like
mtvec, mcause, mstatus, et. al.

I would recommend placing the base address for the CSR space in an
M-mode CSR itself. My project, for example, also uses negative
addresses for I/O, and making CSR space would allow me to swap out my
CPU for yours without much difficulty by just programming CSR space to
not overlap my own I/O space. It can also be used by code to rapidly
load a register with this address w/out having to spend a sequence of
instructions synthesizing the base address for the current processor.

Luke Kenneth Casson Leighton

unread,
Oct 15, 2018, 4:20:10 PM10/15/18
to Kelly Dean, RISC-V ISA Dev
---
crowd-funded eco-conscious hardware: https://www.crowdsupply.com/eoma68

On Mon, Mar 26, 2018 at 6:56 AM Kelly Dean <ke...@prtime.org> wrote:

> Recombine MRET, HRET, SRET, and URET all into ERET
> (which was removed from the current version of the manual),
> with virtualization level as an immediate argument.

likewise need to study this more, kelly. first reaction here: retain
compatibility by having an additional CSR that sets the virtualisation
level specifically for accessing ERET. that way,
backwards-compatibiliy with the existing ERET instruction is retained.

this trick is deployed across the entirety of Simple-V to change the
"meaning" of 95% of RV base opcodes *without* needing a single line of
code to be changed in any of binutils. which is an enormous amount of
developer time and effort to save.

l.

Luke Kenneth Casson Leighton

unread,
Oct 15, 2018, 4:26:37 PM10/15/18
to Ray Van De Walker, Samuel Falvo II, Kelly Dean, RISC-V ISA Dev
On Mon, Oct 15, 2018 at 7:35 PM Ray Van De Walker
<ray.van...@silergy.com> wrote:

> I truly think the priv. architecture has good intentions, but I/O instructions strike me as a throwback to the 1950s.
> If the CSRs were memory-mapped, a custom page-table and its exception would do m-mode virtualization.

yyeahh in SV it's going to be necessary to save up to 20 CSRs in a
context-switch. the fact that CSRs have their own non-uniform
instructions makes that nearly impossible to do efficiently /
compactly.

if on the other hand they were memory-mapped it would be really,
really easy to use vectorised-predicated LD/ST to context-switch a
contiguous bank of CSRs.

and i think, kelly, the proposal that you describe, where banks of
contiguous CSRs are to be swapped/saved in and out would suffer the
same issue.

l.

Michael Clark

unread,
Oct 15, 2018, 4:50:44 PM10/15/18
to Ray Van De Walker, Samuel Falvo II, Kelly Dean, RISC-V ISA Dev


> On 16/10/2018, at 7:35 AM, Ray Van De Walker <ray.van...@silergy.com> wrote:
>
> I truly think the priv. architecture has good intentions, but I/O instructions strike me as a throwback to the 1950s.
> If the CSRs were memory-mapped, a custom page-table and its exception would do m-mode virtualization.
> There are certainly issues: timing, caching, etc. They are less in smaller, slower systems.
> In larger systems, many of the issues can be solved by writing core changes to caching registers (in my organization we call these "shadow" registers),
> then clocking them in with a "take effect" write. This stalls the core once for a complete reconfiguration, instead of for each configuration write.
>
> I also have mild opinions about how to map CSRs to MMIO: I'd make them negative addresses, so accesses based from R0 could reach them with one instruction.
> This works with every XLEN, of course. I'd put the machine mode registers closest to zero.
> This would also free the CSR ISA for brownfield exploitation, or possibly it could utilize MMIO, and therefore be trivially remappable.

This would be a little slow to emulate.

I think some of the problems stem from the 4 levels with aliases and encoding of the protection into the register number. This reduces the 4096 addresses to just 256.

It’s unlike an IO address space if these control and status registers are Privileged control registers for the core itself; which is decidedly not IO.

Adding arrays like PMP takes spaces. I can understand why PMP wants to keep its configuration widget out of the address space as it controls IO. It needs access to the mode to enforce permissions, and the mode may not be present on the physical address address bus. Well it must be for PMP to work as it’s rules detect mode. This may require mode to be present in the TLB or L1 cache depending on how things are indexed and translated. The only special exception is locked rules, but by nature of locked rules, M-mode gets locked out from accessing the anyhow.

I guess my problem with address space is more to do with virtual address space than physical address space. i.e. virtual address space has no known addresses. Indeed MMIO can get mapped anywhere. The issue with M-mode is a problem of various physical addresses becoming well known which leads to the mess between 640KiB and 1MiB on the PC which is baked into the MTRR registers.

In the wake of meltdown and spectre, adding the mode to various micro-architectural structures may indeed be a good idea, including adding besides the address lines down the bus some distance. But then what is a mode? Rhetorical question?
> To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/isa-dev/BY2PR20MB04082AA287DF64A02E72BE66F0FD0%40BY2PR20MB0408.namprd20.prod.outlook.com.
Reply all
Reply to author
Forward
0 new messages