linux-riscv.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: mick@ics.forth.gr (Nick Kossifidis)
To: linux-riscv@lists.infradead.org
Subject: SBI extension proposal
Date: Sat, 03 Nov 2018 01:45:06 +0200	[thread overview]
Message-ID: <f1d906752a74790f0c3e8ae3530858ad@mailhost.ics.forth.gr> (raw)
In-Reply-To: <5725574a-60c3-26f4-565b-4498c757a8f8@wdc.com>

???? 2018-11-03 01:12, Atish Patra ??????:
> On 11/2/18 8:25 AM, Nick Kossifidis wrote:
>> Hello Atish and thanks for bringing this up,
>> 
>> ???? 2018-10-31 20:23, Atish Patra ??????:
>>> Here is a proposal to make SBI a flexible and extensible interface.
>>> It is based on the foundation policy of RISC-V i.e. modularity and
>>> openness. It is designed in such a way that it introduces very few 
>>> new
>>> mandatory SBI APIs that are absolutely required to maintain backward
>>> compatibility. Everything else is optional so that it remains an open
>>> standard yet robust.
>>> 
>>> 1. Introduction:
>>> ----------------
>>> The current RISC-V SBI only defines a few mandatory functions such as
>>> inter-processor interrupts (IPI) interface, reprogramming timer, 
>>> serial
>>> console and memory barrier instructions. The existing SBI 
>>> documentation
>>> can be found here [1]. Many important functionalities such as power
>>> management/cpu-hotplug are not yet defined due to difficulties in
>>> accommodating modifications without breaking the backward 
>>> compatibility
>>> with the current interface.
>>> 
>>> Its design is inspired by Power State Coordination Interface (PSCI)
>>> from
>>> ARM world. However, it adds only two new mandatory SBI calls 
>>> providing
>>> version information and supported APIs, unlike PSCI where a 
>>> significant
>>> number of functions are mandatory. The version of the existing SBI 
>>> will
>>> be defined as a minimum version(0.1) which will always be backward
>>> compatible. Similarly, any Linux kernel with newer feature will fall
>>> back if an older version of SBI does not support the updated
>>> capabilities. Both the operating system and SEE can be implemented to
>>> be two way backward compatible.
>>> 
>>> 2. New functions:
>>> -----------------
>>> 
>>> -- u32 sbi_get_version(void):
>>> 
>>> Returns the current SBI version implemented by the firmware.
>>> version: uint32: Bits[31:16] Major Version
>>>               Bits[15:0] Minor Version
>>> 
>>> The existing SBI version can be 0.1. The proposed version will be at
>>> 0.2
>>> A different major version may indicate possible incompatible 
>>> functions.
>>> A different minor version must be compatible with each other even if
>>> they have a higher number of features.
>>> 
>>> -- u32 sbi_check_api(unsigned long start_api_id, unsigned long 
>>> count):
>>> 
>>> Accepts a start_api_id as an argument and returns if start_api_id to
>>> (start_api_id + count - 1) are supported or not.
>>> The API numbering scheme is described in section 3.
>>> 
>>> A count is introduced so that a range of APIs can be checked at one 
>>> SBI
>>> call to minimize the M-mode traps.
>>> 
>> 
>> Is this really needed ? We can determine the SBI version from
>> sbi_get_version, why
>> include an SBI call to perform a check that can easily be performed by
>> the caller
>> instead ?
>> 
> 
> This API is still in discussion. Probably, an API returning bitmask of
> all the features make more sense ?
> 
> However, I feel a separate API is required from sbi_get_version as
> there vendors can choose not to implement some of the features that is
> specified by a version as most of the API set are optional.
> 

We can always rely on the SBI_NOT_SUPPORTED error code you've already
included ;-) If we use a bitmask for capabilities we'll be limited by
the encoding.

>>> -- int sbi_hart_up(unsigned long hartid, unsigned long start, 
>>> unsigned
>>> long priv)
>>> 
>>> Brings up "hartid" either during initial boot or after a 
>>> sbi_hart_down
>>> SBI call.
>>> 
>>> "start" points to a runtime-specified address where a hart can enter
>>> into supervisor mode. This must be a physical address.
>>> 
>>> "priv" is a private data that caller can use to pass information 
>>> about
>>> execution context.
>>> 
>>> Return the appropriate SBI error code.
>>> 
>>> -- int sbi_hart_suspend(u32 state, unsigned long resume_entry, 
>>> unsigned
>>> long priv)
>>> 
>>> Suspends the calling hart to a particular power state. Suspended hart
>>> will automatically wake-up based on some wakeup events at 
>>> resume_entry
>>> physical address.
>>> 
>>> "priv" is a private data that caller can use to pass information 
>>> about
>>> execution context. The SBI implementation must save a copy so that
>>> caller can reuse while restoring hart from suspend.
>>> 
>>> Return the appropriate SBI error code.
>>> 
>>> -- int sbi_hart_down()
>>> 
>>> It powers off the hart and will be used in cpu-hotplug.
>>> Only individual hart can remove itself from supervisor mode. It can 
>>> be
>>> moved to normal state only by sbi_hart_up function.
>>> 
>>> Return the appropriate SBI error code.
>>> 
>>> -- u32 sbi_hart_state(unsigned long hartid)
>>> 
>>> Returns the RISCV_POWER_STATE for a specific hartid. This will help
>>> make
>>> kexec like functionality more robust.
>>> 
>> 
>> Instead of the above I believe it would be cleaner and simpler to have
>> an sbi_get_hart_state and an sbi_set_hart_state call. This way we can
>> better handle state transitions and, handle ON/OFF/STANDBY/RETENTION
>> and any other state we come up with, without adding extra sbi calls.
>> 
> 
> When do you want to use sbi_set_hart_state ?
> The power states will be modified as a part of sbi_hart_down or
> sbi_shutdown/suspend calls anyways.
> 

The idea is to have sbi_set_hart_state instead of 
sbi_hart_down/shutdown/suspend/etc.
Instead of having different calls for different states we just have two 
calls, one
to get the state and one to set it. This way we have fewer calls and if 
we add a
new state we can add it without having to add a new call.

>>> -- void sbi_system_shutdown()
>>> 
>>> Powers off the entire system.
>>> 
>> 
>> Don't we already have that ? What's the difference between
>> sbi_system_shutdown
>> and sbi_shutdown ? Does it make sense to use sbi_shutdown and leave 
>> the
>> system
>> on with all the harts down ? Maybe we can just say that sbi_shutdown
>> also
>> powers down the system and rename it to sbi_system_shutdown with the
>> same
>> function ID.
>> 
> 
> Yeah. That's a better.
> 
> 
>>> 3. SBI API ID numbering scheme:
>>> ------------------------------
>>> An API Set is a set of SBI APIs which collectively implement some
>>> kind of feature/functionality.
>>> 
>>> Let's say SBI API ID is u32  then
>>> Bit[31:24] =  API Set Number
>>> Bit[23:0] = API Number within API Set
>>> 
>>> Here are few API Sets for SBI v0.2:
>>> 1. Base APIs
>>> API Set Number: 0x0
>>> Description: Base APIs mandatory for any SBI version
>>> 
>>> 2. HART PM APIs
>>> API Set Number: 0x1
>>> Description: Hart UP/Down/Suspend APIs for per-Hart
>>> power management
>>> 
>>> 3. System PM APIs
>>> API Set Number; 0x2
>>> Description: System Shutdown/Reboot/Suspend for system-level
>>> power management
>>> 
>>> 4. Vendor APIs
>>> API Set Number: 0xff
>>> Description: Vendor specific APIs.
>>> There is a possibility that different vendors can choose to assign
>>> same API numbers for different functionality. In that case, vendor
>>> specific strings in Device Tree can be used to verify if a specific
>>> API belongs to the intended vendor or not.
>>> 
>> 
>> I understand the rationale behind this but I believe it's better to
>> call them services or functions instead of APIs, they are not sets
>> of APIs the way I see it. Also since we are moving that path why call
>> it SBI and restrict it only to be used by the supervisor ? I'd love to
>> have another category for the secure monitor calls for example,
>> but on the software architecture that we are discussing on the TEE
>> group, such calls can also originate from U mode or HS/HU modes.
>> The same goes for vendor specific calls, there are lots of use case
>> scenarios where vendors would like to be able to call their stuff
>> from U mode for example (e.g. a user space library talking to a
>> smart card directly).
>> 
>> I suggest we rename it from SBI to something more generic that is not
>> defined by who is calling it but by what we are calling, which in this
>> case is the firmware (FBI?).
> 
> possible conflict with a very famous law enforcement agency :) :).
> 
> Jokes aside, renaming to something more generic is a good idea. But it
> will probably break a ton of documentation/spec in RISC-V which I
> don't want to deal with right now. May be in future versions ?
> 

I get that updating the documentation can be a pain, I can help with
that if you want (and I promise I'll stay away from law enforcement
agencies !). I suggest we do the renaming as early as possible
because we are going to carry it for a long time instead and it'll
only get harder to change later on.

>> Since you mentioned ARM, in their case
>> the ABI used for PSCI is the Secure Monitor Call (which is the
>> alternative
>> to what is defined on the first paragraph of the SBI document), but it
>> has the same limitation. According to the documentation if an SMC 
>> comes
>> from a user application, we get an undefined exception. We can do 
>> better
>> !
>> 
> 
> 
> 
>> 
>>> 4. Return error code Table:
>>> ---------------------------
>>> 
>>> Here are the SBI return error codes defined.
>>> 
>>>        SBI_SUCCESS           0
>>>        SBI_NOT_SUPPORTED    -1
>>>        SBI_INVALID_PARAM    -2
>>>        SBI_DENIED           -3
>>>        SBI_INVALID_ADDRESS  -4
>>> 
>>> A mapping function between SBI error code & Linux error code should 
>>> be
>>> provided.
>>> 
>> 
>> I believe it should be up to the OS to translate the SBI error codes 
>> to
>> its
>> native ones.
>> 
> 
> Correct. Olof also pointed this out. I will remove it in next version.
> 
>>> 5. Power State
>>> --------------
>>> 
>>> A RISC-V core can exist in any of the following power states.
>>> 
>>> enum RISCV_POWER_STATE {
>>>         //Powered up & operational.
>>>         RISCV_HART_ON              =  0,
>>>         //Powered up but at reduced energy consumption. WFI 
>>> instruction
>>> can be used to achieve this state.
>>>         RISCV_HART_STANDBY        =   1,
>>>         //Deeper low power state. No reset required but higher wakeup
>>> latency.
>>>         RISCV_HART_RETENTION       =  2,
>>>         //Powered off. Reset of the core required after power 
>>> restore.
>>>         RISCV_HART_OFF             =  3
>>> }
>>> 
>>> TODO:
>>> Any other power management related features or state?
>>> 
>> 
>> How about LOCKSTEP ? We could have a way of declaring a hart as a
>> "mirror" of another
>> hart (https://en.wikipedia.org/wiki/Lockstep_(computing)). We can have
>> an extra argument
>> on sbi_get/set_state when the LOCKSTEP state is used, that will 
>> get/set
>> the hart that
>> this hart is mirroring.
>> 
> 
> Not sure if we need it right now. I want to keep it simple and focus
> on the bare minimum ones. We can always add exotic ones once we have
> feature/versioning in place.
> 

I agree, I mentioned LOCKSTEP because it'll need an extra argument
when setting the state. Btw I know lockstep sounds exotic at this point
but it's needed by many industries that deal with safety (automotive 
stuff,
medical devices etc). However it needs more thinking.

>>> 6. Implementation
>>> -------------------
>>> Currently, SBI is implemented as a part of BBL. There is a different
>>> SBI implementation available in coreboot as well.
>>> 
>>> Alternatively, a separate open BSD/MIT licensed SBI project can be
>>> created which can be used by anybody to avoid these kind of SBI
>>> fragmentation in future. This project can generate both a firmware
>>> binary (to executed directly in M mode) or a static library that can
>>> be used by different boot loaders. It will also help individual boot
>>> loaders to either work from M or S mode without a separate SBI
>>> implementation.
>>> 
>> 
>> Why implement this at the boot loader level ? This is more like a
>> firmware interface
>> than something that belongs to the bootloader. The bootloader should 
>> use
>> this interface
>> not provide it.
> It depends on the bootloader. For example, there are patches in
> coreboot that implements SBI. The idea with OpenSBI implementation is
> to avoid such fragmentation.
> 
>> Also this is something that belongs to the M mode, a
>> bootloader
>> should belong to the S mode, running the bootloader in M mode is not
>> right from
>> a security point of view. We can provide something like "RISC-V 
>> Firmware
>> Services"
>> that's code running on M mode after the first stage boot 
>> loader/BootROM
>> and let
>> bootloaders use it without having to implement it.
> 
> That's the idea for S mode bootloaders. However, there are folks who
> are interested in M mode ones and I understand their usecase. Thus,
> idea is to implement OpenSBI in such a way that, everybody can make
> use of it.
> 

I guess then we can provide it as a library and also provide a reference
implementation around it. However I still believe that something like
"RISC-V Firmware Services" is more appropriate, we can structure this
in a client/server way and let bootloaders use the server part and
OS drivers/modules use the client part. This way we can also avoid
fragmentation across OSes.

Regards,
Nick

WARNING: multiple messages have this Message-ID (diff)
From: Nick Kossifidis <mick@ics.forth.gr>
To: Atish Patra <atish.patra@wdc.com>
Cc: mark.rutland@arm.com, Zong Li <zong@andestech.com>,
	Damien Le Moal <Damien.LeMoal@wdc.com>,
	Olof Johansson <olof.johansson@gmail.com>,
	Andrew Waterman <andrew@sifive.com>,
	Alan Kao <alankao@andestech.com>,
	Anup Patel <anup@brainfault.org>,
	Palmer Dabbelt <palmer@sifive.com>,
	"Rwmjones.fedora" <rjones@redhat.com>,
	Christoph Hellwig <hch@infradead.org>,
	vincentc@andestech.com, Michael Clark <mjc@sifive.com>,
	Arnd Bergmann <arnd@arndb.de>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Nick Kossifidis <mick@ics.forth.gr>,
	linux-riscv@lists.infradead.org, "Chang,
	Abner \(HPS SW/FW Technologist\)" <abner.chang@hpe.com>,
	David.Abdurachmanov@cern.ch
Subject: Re: SBI extension proposal
Date: Sat, 03 Nov 2018 01:45:06 +0200	[thread overview]
Message-ID: <f1d906752a74790f0c3e8ae3530858ad@mailhost.ics.forth.gr> (raw)
Message-ID: <20181102234506.QND9yYEoa7R2lbiOBcrPqXSgtitZ4Zo6Fl6DFBP6a34@z> (raw)
In-Reply-To: <5725574a-60c3-26f4-565b-4498c757a8f8@wdc.com>

Στις 2018-11-03 01:12, Atish Patra έγραψε:
> On 11/2/18 8:25 AM, Nick Kossifidis wrote:
>> Hello Atish and thanks for bringing this up,
>> 
>> Στις 2018-10-31 20:23, Atish Patra έγραψε:
>>> Here is a proposal to make SBI a flexible and extensible interface.
>>> It is based on the foundation policy of RISC-V i.e. modularity and
>>> openness. It is designed in such a way that it introduces very few 
>>> new
>>> mandatory SBI APIs that are absolutely required to maintain backward
>>> compatibility. Everything else is optional so that it remains an open
>>> standard yet robust.
>>> 
>>> 1. Introduction:
>>> ----------------
>>> The current RISC-V SBI only defines a few mandatory functions such as
>>> inter-processor interrupts (IPI) interface, reprogramming timer, 
>>> serial
>>> console and memory barrier instructions. The existing SBI 
>>> documentation
>>> can be found here [1]. Many important functionalities such as power
>>> management/cpu-hotplug are not yet defined due to difficulties in
>>> accommodating modifications without breaking the backward 
>>> compatibility
>>> with the current interface.
>>> 
>>> Its design is inspired by Power State Coordination Interface (PSCI)
>>> from
>>> ARM world. However, it adds only two new mandatory SBI calls 
>>> providing
>>> version information and supported APIs, unlike PSCI where a 
>>> significant
>>> number of functions are mandatory. The version of the existing SBI 
>>> will
>>> be defined as a minimum version(0.1) which will always be backward
>>> compatible. Similarly, any Linux kernel with newer feature will fall
>>> back if an older version of SBI does not support the updated
>>> capabilities. Both the operating system and SEE can be implemented to
>>> be two way backward compatible.
>>> 
>>> 2. New functions:
>>> -----------------
>>> 
>>> -- u32 sbi_get_version(void):
>>> 
>>> Returns the current SBI version implemented by the firmware.
>>> version: uint32: Bits[31:16] Major Version
>>>               Bits[15:0] Minor Version
>>> 
>>> The existing SBI version can be 0.1. The proposed version will be at
>>> 0.2
>>> A different major version may indicate possible incompatible 
>>> functions.
>>> A different minor version must be compatible with each other even if
>>> they have a higher number of features.
>>> 
>>> -- u32 sbi_check_api(unsigned long start_api_id, unsigned long 
>>> count):
>>> 
>>> Accepts a start_api_id as an argument and returns if start_api_id to
>>> (start_api_id + count - 1) are supported or not.
>>> The API numbering scheme is described in section 3.
>>> 
>>> A count is introduced so that a range of APIs can be checked at one 
>>> SBI
>>> call to minimize the M-mode traps.
>>> 
>> 
>> Is this really needed ? We can determine the SBI version from
>> sbi_get_version, why
>> include an SBI call to perform a check that can easily be performed by
>> the caller
>> instead ?
>> 
> 
> This API is still in discussion. Probably, an API returning bitmask of
> all the features make more sense ?
> 
> However, I feel a separate API is required from sbi_get_version as
> there vendors can choose not to implement some of the features that is
> specified by a version as most of the API set are optional.
> 

We can always rely on the SBI_NOT_SUPPORTED error code you've already
included ;-) If we use a bitmask for capabilities we'll be limited by
the encoding.

>>> -- int sbi_hart_up(unsigned long hartid, unsigned long start, 
>>> unsigned
>>> long priv)
>>> 
>>> Brings up "hartid" either during initial boot or after a 
>>> sbi_hart_down
>>> SBI call.
>>> 
>>> "start" points to a runtime-specified address where a hart can enter
>>> into supervisor mode. This must be a physical address.
>>> 
>>> "priv" is a private data that caller can use to pass information 
>>> about
>>> execution context.
>>> 
>>> Return the appropriate SBI error code.
>>> 
>>> -- int sbi_hart_suspend(u32 state, unsigned long resume_entry, 
>>> unsigned
>>> long priv)
>>> 
>>> Suspends the calling hart to a particular power state. Suspended hart
>>> will automatically wake-up based on some wakeup events at 
>>> resume_entry
>>> physical address.
>>> 
>>> "priv" is a private data that caller can use to pass information 
>>> about
>>> execution context. The SBI implementation must save a copy so that
>>> caller can reuse while restoring hart from suspend.
>>> 
>>> Return the appropriate SBI error code.
>>> 
>>> -- int sbi_hart_down()
>>> 
>>> It powers off the hart and will be used in cpu-hotplug.
>>> Only individual hart can remove itself from supervisor mode. It can 
>>> be
>>> moved to normal state only by sbi_hart_up function.
>>> 
>>> Return the appropriate SBI error code.
>>> 
>>> -- u32 sbi_hart_state(unsigned long hartid)
>>> 
>>> Returns the RISCV_POWER_STATE for a specific hartid. This will help
>>> make
>>> kexec like functionality more robust.
>>> 
>> 
>> Instead of the above I believe it would be cleaner and simpler to have
>> an sbi_get_hart_state and an sbi_set_hart_state call. This way we can
>> better handle state transitions and, handle ON/OFF/STANDBY/RETENTION
>> and any other state we come up with, without adding extra sbi calls.
>> 
> 
> When do you want to use sbi_set_hart_state ?
> The power states will be modified as a part of sbi_hart_down or
> sbi_shutdown/suspend calls anyways.
> 

The idea is to have sbi_set_hart_state instead of 
sbi_hart_down/shutdown/suspend/etc.
Instead of having different calls for different states we just have two 
calls, one
to get the state and one to set it. This way we have fewer calls and if 
we add a
new state we can add it without having to add a new call.

>>> -- void sbi_system_shutdown()
>>> 
>>> Powers off the entire system.
>>> 
>> 
>> Don't we already have that ? What's the difference between
>> sbi_system_shutdown
>> and sbi_shutdown ? Does it make sense to use sbi_shutdown and leave 
>> the
>> system
>> on with all the harts down ? Maybe we can just say that sbi_shutdown
>> also
>> powers down the system and rename it to sbi_system_shutdown with the
>> same
>> function ID.
>> 
> 
> Yeah. That's a better.
> 
> 
>>> 3. SBI API ID numbering scheme:
>>> ------------------------------
>>> An API Set is a set of SBI APIs which collectively implement some
>>> kind of feature/functionality.
>>> 
>>> Let's say SBI API ID is u32  then
>>> Bit[31:24] =  API Set Number
>>> Bit[23:0] = API Number within API Set
>>> 
>>> Here are few API Sets for SBI v0.2:
>>> 1. Base APIs
>>> API Set Number: 0x0
>>> Description: Base APIs mandatory for any SBI version
>>> 
>>> 2. HART PM APIs
>>> API Set Number: 0x1
>>> Description: Hart UP/Down/Suspend APIs for per-Hart
>>> power management
>>> 
>>> 3. System PM APIs
>>> API Set Number; 0x2
>>> Description: System Shutdown/Reboot/Suspend for system-level
>>> power management
>>> 
>>> 4. Vendor APIs
>>> API Set Number: 0xff
>>> Description: Vendor specific APIs.
>>> There is a possibility that different vendors can choose to assign
>>> same API numbers for different functionality. In that case, vendor
>>> specific strings in Device Tree can be used to verify if a specific
>>> API belongs to the intended vendor or not.
>>> 
>> 
>> I understand the rationale behind this but I believe it's better to
>> call them services or functions instead of APIs, they are not sets
>> of APIs the way I see it. Also since we are moving that path why call
>> it SBI and restrict it only to be used by the supervisor ? I'd love to
>> have another category for the secure monitor calls for example,
>> but on the software architecture that we are discussing on the TEE
>> group, such calls can also originate from U mode or HS/HU modes.
>> The same goes for vendor specific calls, there are lots of use case
>> scenarios where vendors would like to be able to call their stuff
>> from U mode for example (e.g. a user space library talking to a
>> smart card directly).
>> 
>> I suggest we rename it from SBI to something more generic that is not
>> defined by who is calling it but by what we are calling, which in this
>> case is the firmware (FBI?).
> 
> possible conflict with a very famous law enforcement agency :) :).
> 
> Jokes aside, renaming to something more generic is a good idea. But it
> will probably break a ton of documentation/spec in RISC-V which I
> don't want to deal with right now. May be in future versions ?
> 

I get that updating the documentation can be a pain, I can help with
that if you want (and I promise I'll stay away from law enforcement
agencies !). I suggest we do the renaming as early as possible
because we are going to carry it for a long time instead and it'll
only get harder to change later on.

>> Since you mentioned ARM, in their case
>> the ABI used for PSCI is the Secure Monitor Call (which is the
>> alternative
>> to what is defined on the first paragraph of the SBI document), but it
>> has the same limitation. According to the documentation if an SMC 
>> comes
>> from a user application, we get an undefined exception. We can do 
>> better
>> !
>> 
> 
> 
> 
>> 
>>> 4. Return error code Table:
>>> ---------------------------
>>> 
>>> Here are the SBI return error codes defined.
>>> 
>>>        SBI_SUCCESS           0
>>>        SBI_NOT_SUPPORTED    -1
>>>        SBI_INVALID_PARAM    -2
>>>        SBI_DENIED           -3
>>>        SBI_INVALID_ADDRESS  -4
>>> 
>>> A mapping function between SBI error code & Linux error code should 
>>> be
>>> provided.
>>> 
>> 
>> I believe it should be up to the OS to translate the SBI error codes 
>> to
>> its
>> native ones.
>> 
> 
> Correct. Olof also pointed this out. I will remove it in next version.
> 
>>> 5. Power State
>>> --------------
>>> 
>>> A RISC-V core can exist in any of the following power states.
>>> 
>>> enum RISCV_POWER_STATE {
>>>         //Powered up & operational.
>>>         RISCV_HART_ON              =  0,
>>>         //Powered up but at reduced energy consumption. WFI 
>>> instruction
>>> can be used to achieve this state.
>>>         RISCV_HART_STANDBY        =   1,
>>>         //Deeper low power state. No reset required but higher wakeup
>>> latency.
>>>         RISCV_HART_RETENTION       =  2,
>>>         //Powered off. Reset of the core required after power 
>>> restore.
>>>         RISCV_HART_OFF             =  3
>>> }
>>> 
>>> TODO:
>>> Any other power management related features or state?
>>> 
>> 
>> How about LOCKSTEP ? We could have a way of declaring a hart as a
>> "mirror" of another
>> hart (https://en.wikipedia.org/wiki/Lockstep_(computing)). We can have
>> an extra argument
>> on sbi_get/set_state when the LOCKSTEP state is used, that will 
>> get/set
>> the hart that
>> this hart is mirroring.
>> 
> 
> Not sure if we need it right now. I want to keep it simple and focus
> on the bare minimum ones. We can always add exotic ones once we have
> feature/versioning in place.
> 

I agree, I mentioned LOCKSTEP because it'll need an extra argument
when setting the state. Btw I know lockstep sounds exotic at this point
but it's needed by many industries that deal with safety (automotive 
stuff,
medical devices etc). However it needs more thinking.

>>> 6. Implementation
>>> -------------------
>>> Currently, SBI is implemented as a part of BBL. There is a different
>>> SBI implementation available in coreboot as well.
>>> 
>>> Alternatively, a separate open BSD/MIT licensed SBI project can be
>>> created which can be used by anybody to avoid these kind of SBI
>>> fragmentation in future. This project can generate both a firmware
>>> binary (to executed directly in M mode) or a static library that can
>>> be used by different boot loaders. It will also help individual boot
>>> loaders to either work from M or S mode without a separate SBI
>>> implementation.
>>> 
>> 
>> Why implement this at the boot loader level ? This is more like a
>> firmware interface
>> than something that belongs to the bootloader. The bootloader should 
>> use
>> this interface
>> not provide it.
> It depends on the bootloader. For example, there are patches in
> coreboot that implements SBI. The idea with OpenSBI implementation is
> to avoid such fragmentation.
> 
>> Also this is something that belongs to the M mode, a
>> bootloader
>> should belong to the S mode, running the bootloader in M mode is not
>> right from
>> a security point of view. We can provide something like "RISC-V 
>> Firmware
>> Services"
>> that's code running on M mode after the first stage boot 
>> loader/BootROM
>> and let
>> bootloaders use it without having to implement it.
> 
> That's the idea for S mode bootloaders. However, there are folks who
> are interested in M mode ones and I understand their usecase. Thus,
> idea is to implement OpenSBI in such a way that, everybody can make
> use of it.
> 

I guess then we can provide it as a library and also provide a reference
implementation around it. However I still believe that something like
"RISC-V Firmware Services" is more appropriate, we can structure this
in a client/server way and let bootloaders use the server part and
OS drivers/modules use the client part. This way we can also avoid
fragmentation across OSes.

Regards,
Nick

_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv

  parent reply	other threads:[~2018-11-02 23:45 UTC|newest]

Thread overview: 47+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-10-31 18:23 SBI extension proposal Atish Patra
2018-10-31 18:23 ` Atish Patra
     [not found] ` <CAK-hmcQeiGa3BwnzEVB_dyhFiC7rXHFN-wTsJomg-jAo7a+v3Q@mail.gmail.com>
2018-10-31 19:11   ` Olof Johansson
2018-10-31 19:11     ` Olof Johansson
2018-10-31 20:37     ` Atish Patra
2018-10-31 20:37       ` Atish Patra
2018-11-02  6:31       ` Chang, Abner (HPS SW/FW Technologist)
2018-11-02  6:31         ` Chang, Abner (HPS SW/FW Technologist)
2018-11-02 22:31         ` Atish Patra
2018-11-02 22:31           ` Atish Patra
2018-11-04 14:36           ` Chang, Abner (HPS SW/FW Technologist)
2018-11-04 14:36             ` Chang, Abner (HPS SW/FW Technologist)
     [not found] ` <CA+h06zgcyWz7WMbzQxjyc9V5S3CokqSoO1mGOaynJE3uJE5QSg@mail.gmail.com>
2018-11-01  9:35   ` Anup Patel
2018-11-01  9:35     ` Anup Patel
2018-11-01  9:46     ` Richard W.M. Jones
2018-11-01  9:46       ` Richard W.M. Jones
2018-11-01 11:03       ` Philipp Hug
2018-11-01 11:03         ` Philipp Hug
2018-11-01 11:25         ` Richard W.M. Jones
2018-11-01 11:25           ` Richard W.M. Jones
2018-11-01 15:09           ` Atish Patra
2018-11-01 15:09             ` Atish Patra
2018-11-02  3:17             ` Olof Johansson
2018-11-02  3:17               ` Olof Johansson
2018-11-01 16:42       ` Karsten Merker
2018-11-02  2:49         ` Palmer Dabbelt
2018-11-02  2:49           ` Palmer Dabbelt
2018-11-02  3:27           ` Anup Patel
2018-11-02  3:27             ` Anup Patel
2018-11-02  4:29             ` Chang, Abner (HPS SW/FW Technologist)
2018-11-02  4:29               ` Chang, Abner (HPS SW/FW Technologist)
2018-11-02 15:24 ` Nick Kossifidis
2018-11-02 15:24   ` Nick Kossifidis
2018-11-02 23:12   ` Atish Patra
2018-11-02 23:12     ` Atish Patra
2018-11-02 23:45     ` Nick Kossifidis [this message]
2018-11-02 23:45       ` Nick Kossifidis
2018-11-03  0:00       ` Atish Patra
2018-11-03  0:00         ` Atish Patra
2018-11-05 13:50         ` Nick Kossifidis
2018-11-05 13:50           ` Nick Kossifidis
2018-11-05 18:51           ` Atish Patra
2018-11-05 18:51             ` Atish Patra
2018-11-06  1:55             ` Zong Li
2018-11-06  1:55               ` Zong Li
2018-11-09 21:47               ` Atish Patra
2018-11-09 21:47                 ` Atish Patra

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f1d906752a74790f0c3e8ae3530858ad@mailhost.ics.forth.gr \
    --to=mick@ics.forth.gr \
    --cc=linux-riscv@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).