From patchwork Thu Oct 15 13:27:00 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 1382681 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=wdc.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=3Qk34GQH; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=wdc.com header.i=@wdc.com header.a=rsa-sha256 header.s=dkim.wdc.com header.b=SBj8Dgow; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-sharedspace-onmicrosoft-com header.b=KFzEB8qe; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CBqqH5Ncqz9sRk for ; Fri, 16 Oct 2020 00:28:27 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:Message-Id:Date: Subject:To:From:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=pg+pfuJkwLf0IulEVlhG2DZgQCkk521PLQE82QiaaEY=; b=3Qk34GQH0fs1p69Gp0uMhyJTi nie6/d7xIZEFjdEU5Q/Kk537P5siwrHcFDmZ+M2g6SdIRiMrog5OjZJPY3vizYGP1KVSZkwXOF+pU kBdScSSjNyxzBaKn7IOi+RIGQKPmCQGs5TneYrCsnD1ngZhdvOjH6STfzbw/q9/R+PNKucRyKG0+J W7mU7nyow5ZFzmZ2V/HjoqxAhK4M7xXLfS3wrRgVUGkcU3fB6DD0j/Xyb/EWQa+2x94bKOZyWAYcR FUjrs8xcM6gKP+6LEiDnkxJUDagbfoJMaw3wWahFIitkur/LANvY6Q4cG+LeEsN15UD7PustBEMJA DF+vv8v5w==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kT3Ir-0004dG-FB; Thu, 15 Oct 2020 13:28:21 +0000 Received: from esa3.hgst.iphmx.com ([216.71.153.141]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kT3In-0004bO-Jr for opensbi@lists.infradead.org; Thu, 15 Oct 2020 13:28:18 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1602768497; x=1634304497; h=from:to:cc:subject:date:message-id:in-reply-to: references:content-transfer-encoding:mime-version; bh=3XC4cAYUSGKm5rNI8Xq5wxb886i3wDvpqRs50SXERXo=; b=SBj8Dgow7d1br+M/eZXSZbdtG19nj17SI1J5w+6PrL+v3AzIwxjh7Rub Xm6F/scikHSY3AlsFLWQmgY29T4CJqleFc5IvhVNF4AZpcQ7EwfpH+7Nu sPClVkDIez75UK3BFSl7qgHlz5EhySqJbZKtnbBhNdSdVytWBtjeDLI6y u9T4U7vGeeS3v8SkP4EKwQt7637p1yYlHBLYCgfQHG1I6nYBDIuMCxziD 9Ddduse/lCjpUxbXTGiFobCnN6/1CPchnoHe96cSXXLxE5hs0+Z8Q7mgT WIkuDqnFUOCXcyfhij8tJvjTFIEPuSyRt8ZVi9hOu5QP5QivpfxwDu3jF A==; IronPort-SDR: bDz6Ed1XDKD/eWeRNWsR+Fn08NbUnj2r/x9bnyJOt53nePWpn9W2t8PHJVCaO+Fl+KlvVzoFFR 3eCg0KUGd0QuPw46DJOEHoAzRhLPY1qEaurS6Ff7ashSFthiJE00FB/FiH4ZASGSlfgtjqGV3e p73QOqyWB2xeHFYDgQaSKNnWZ6FKY/vBIhZiKfyhpZTzyoHZsCdtS319OhyYV6C75ZMo/a1azr eQ5i2MMRpf4qbx6iTaHKzBWHBqSYOHMBHOutsf8EON2m3uLVT4uUUr4tLi0dmHIJaJ8Fwd2Xkv CTE= X-IronPort-AV: E=Sophos;i="5.77,379,1596470400"; d="scan'208";a="154457542" Received: from mail-bn8nam08lp2048.outbound.protection.outlook.com (HELO NAM04-BN8-obe.outbound.protection.outlook.com) ([104.47.74.48]) by ob1.hgst.iphmx.com with ESMTP; 15 Oct 2020 21:28:16 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fzanzaf4cEQxu8V1nNvF9XzGUQgJ/+mQZw7kYQx20XUrt22EwcKAmIqPJTh4YhvCLRBAvxOImEYUK9DhmpRvuivYjrUAHSKpGZ1J4btBkjphxyHgQYI0/RZIcPRgSZFqJlNXsAG/JJCXRc+PGL13PimsycVBI0XTcjvyUKT09MswJC/fY2Ib4URgTJtIKxwCrPQ6NNvFFg+kxD+1tm1jANEHRvwPzuzf4n1Dm8jNquCN5HInmRlZxboWbMbo186t2vDi1HGkuSQDYCDFEuwTalkH90ehVo/mEc1b9/bICQOGG9YNUXVnnko/Hq9TrOuY6XsrOSK1AIOk+L+581DZag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EmItzTUeqVaiun5cQrQ+KWjND4FnLA2Rv1c2ESXBSgM=; b=LV0UXcrt9RmecKtgl3ZMYgkoIiP0iweDow6ogYeLAhZP3On/Z+vwoAIJswvIiQQj5himWhJ4AtIpBEdCtDqsBFXCVucRSO/gOy2gQMTSwl+a483l/E1kX/F/DyvnZzcfDt5n84ZDuUq1chusKVeON6IQmEMlAt/0PesOD4Re1At0Ic/7fQ3W1mn5U9GnFhs88/kKAc6pPP3Sh8omKBEl2Ir5JMderdFgX2tMRGxH5zfDoJaOqC5APlRVVwLk/bdkSvMRdnApmw187zqnaSmSJV9jCh6BJe0sxUyu8acuY0LRVOfmznyTS9bsvZPQctddveC3+BjMcGz/Q4vZ1VGNAA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EmItzTUeqVaiun5cQrQ+KWjND4FnLA2Rv1c2ESXBSgM=; b=KFzEB8qe3vUtyYkMbN2lS5U1Ndw9ICi9V7Fvk2ZtrD/VEKFDlctX6EWjDKUmPbymXdC/UM/WJOvIAkJzdie87Ledh0dqHllnlsIcb5i5SpG4pzfWXCTQuuc3hw/xX6h08MRsnavnDz221QK3HG59IG6VHLahgKhzkAaWGFo43HE= Authentication-Results: wdc.com; dkim=none (message not signed) header.d=none;wdc.com; dmarc=none action=none header.from=wdc.com; Received: from DM6PR04MB6201.namprd04.prod.outlook.com (2603:10b6:5:127::32) by DM6PR04MB6624.namprd04.prod.outlook.com (2603:10b6:5:1b6::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3455.21; Thu, 15 Oct 2020 13:28:14 +0000 Received: from DM6PR04MB6201.namprd04.prod.outlook.com ([fe80::d035:e2c6:c11:51dd]) by DM6PR04MB6201.namprd04.prod.outlook.com ([fe80::d035:e2c6:c11:51dd%6]) with mapi id 15.20.3477.021; Thu, 15 Oct 2020 13:28:14 +0000 From: Anup Patel To: Atish Patra , Alistair Francis Subject: [PATCH v2 16/16] docs: Add initial documentation for domain support Date: Thu, 15 Oct 2020 18:57:00 +0530 Message-Id: <20201015132700.2232820-17-anup.patel@wdc.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20201015132700.2232820-1-anup.patel@wdc.com> References: <20201015132700.2232820-1-anup.patel@wdc.com> X-Originating-IP: [122.167.44.151] X-ClientProxiedBy: MAXPR0101CA0065.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:e::27) To DM6PR04MB6201.namprd04.prod.outlook.com (2603:10b6:5:127::32) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from wdc.com (122.167.44.151) by MAXPR0101CA0065.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:e::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.22 via Frontend Transport; Thu, 15 Oct 2020 13:28:10 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 521a97e0-1fed-400b-dcea-08d8710e2a2a X-MS-TrafficTypeDiagnostic: DM6PR04MB6624: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: WDCIPOUTBOUND: EOP-TRUE X-MS-Oob-TLC-OOBClassifiers: OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR04MB6201.namprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(39860400002)(136003)(366004)(346002)(2906002)(66946007)(110136005)(66556008)(5660300002)(44832011)(66476007)(36756003)(6666004)(19273905006)(316002)(54906003)(8886007)(8676002)(8936002)(86362001)(34490700002)(1076003)(52116002)(26005)(16526019)(186003)(55016002)(83380400001)(966005)(478600001)(956004)(2616005)(6636002)(83080400001)(4326008)(7696005)(562404015)(563064011); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: 521a97e0-1fed-400b-dcea-08d8710e2a2a X-MS-Exchange-CrossTenant-AuthSource: DM6PR04MB6201.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Oct 2020 13:28:13.5700 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: j2NtgselQFAZAI1e5jhRFJJhAtNUkhVz7RHEhP5HpRD64UgJN2a/XuHnaG6qO+rr/2TUDgNxgOSgQcU2+SAX4g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR04MB6624 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201015_092817_886352_B5CB4388 X-CRM114-Status: GOOD ( 26.88 ) X-Spam-Score: -2.5 (--) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-2.5 points) pts rule name description ---- ---------------------- -------------------------------------------------- -2.3 RCVD_IN_DNSWL_MED RBL: Sender listed at https://www.dnswl.org/, medium trust [216.71.153.141 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.0 MSGID_FROM_MTA_HEADER Message-Id was added by a relay X-BeenThere: opensbi@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Anup Patel , Anup Patel , opensbi@lists.infradead.org Sender: "opensbi" Errors-To: opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org We add initial documentation for OpenSBI domain support to help RISC-V platform vendors achieve system-level partitioning. Signed-off-by: Anup Patel --- README.md | 3 ++ docs/domain_support.md | 106 +++++++++++++++++++++++++++++++++++++++++ docs/doxygen.cfg | 1 + 3 files changed, 110 insertions(+) create mode 100644 docs/domain_support.md diff --git a/README.md b/README.md index bd41ba3..03c02fb 100644 --- a/README.md +++ b/README.md @@ -225,6 +225,8 @@ Detailed documentation of various aspects of OpenSBI can be found under the * [Platform Documentation]: Documentation of the platforms currently supported. * [Firmware Documentation]: Documentation for the different types of firmware examples build supported by OpenSBI. +* [Domain Support]: Documentation for the OpenSBI domain support which helps + users achieve system-level partitioning using OpenSBI. OpenSBI source code is also well documented. For source level documentation, doxygen style is used. Please refer to the [Doxygen manual] for details on this @@ -278,6 +280,7 @@ make I= install_docs [Platform Support Guide]: docs/platform_guide.md [Platform Documentation]: docs/platform/platform.md [Firmware Documentation]: docs/firmware/fw.md +[Domain Support]: docs/domain_support.md [Doxygen manual]: http://www.doxygen.nl/manual/index.html [Kendryte standalone SDK]: https://github.com/kendryte/kendryte-standalone-sdk [third party notices]: ThirdPartyNotices.md diff --git a/docs/domain_support.md b/docs/domain_support.md new file mode 100644 index 0000000..53967dd --- /dev/null +++ b/docs/domain_support.md @@ -0,0 +1,106 @@ +OpenSBI Domain Support +====================== + +An OpenSBI domain is a system-level partition (subset) of underlying hardware +having it's own memory regions (RAM and MMIO devices) and HARTs. The OpenSBI +will try to achieve secure isolation between domains using RISC-V platform +features such as PMP, ePMP, IOPMP, SiFive Shield, etc. + +Important entities which help implement OpenSBI domain support are: + +* **struct sbi_domain_memregion** - Representation of a domain memory region +* **struct sbi_hartmask** - Representation of domain HART set +* **struct sbi_domain** - Representation of a domain instance + +Each HART of a RISC-V platform must have an OpenSBI domain assigned to it. +The OpenSBI platform support is responsible for populating domains and +providing HART id to domain mapping. The OpenSBI domain support will by +default assign **the ROOT domain** to all HARTs of a RISC-V platform so +it is not mandatory for the OpenSBI platform support to populate domains. + +Domain Memory Region +-------------------- + +A domain memory region is represented by **struct sbi_domain_memregion** in +OpenSBI and has following details: + +* **order** - The size of a memory region is **2 ^ order** where **order** + must be **3 <= order <= __riscv_xlen** +* **base** - The base address of a memory region is **2 ^ order** + aligned start address +* **flags** - The flags of a memory region represent memory type (i.e. + RAM or MMIO) and allowed accesses (i.e. READ, WRITE, EXECUTE, etc) + +Domain Instance +--------------- + +A domain instance is represented by **struct sbi_domain** in OpenSBI and +has following details: + +* **index** - Logical index of this domain +* **name** - Name of this domain +* **assigned_harts** - HARTs assigned to this domain +* **possible_harts** - HARTs possible in this domain +* **regions** - Array of memory regions terminated by a memory region + with order zero +* **boot_hartid** - HART id of the HART booting this domain. The domain + boot HART will be started at boot-time if boot HART is a possible and + assigned for this domain. +* **next_addr** - Address of the next booting stage for this domain +* **next_arg1** - Arg1 (or 'a1' register) of the next booting stage for + this domain +* **next_mode** - Priviledge mode of the next booting stage for this + domain. This can be either S-mode or U-mode. +* **system_reset_allowed** - Is domain allowed to reset the system? + +The memory regions represented by **regions** in **struct sbi_domain** have +following additional constraints to align with RISC-V PMP requirements: + +* A memory region to protect OpenSBI firmware from S-mode and U-mode + should always be present +* For two overlapping memory regions, one should be sub-region of another +* Two overlapping memory regions should not be of same size +* Two overlapping memory regions cannot have same flags +* Memory access checks on overlapping address should prefer smallest + overlapping memory region flags. + +ROOT Domain +----------- + +**The ROOT domain** is the default OpenSBI domain which is assigned by +default to all HARTs of a RISC-V platform. The OpenSBI domain support +will hand-craft **the ROOT domain** very early at boot-time in the +following manner: + +* **index** - Logical index of the ROOT domain is always zero +* **name** - Name of the ROOT domain is "root" +* **assigned_harts** - At boot-time all valid HARTs of a RISC-V platform + are assigned the ROOT domain which changes later based on OpenSBI + platform support +* **possible_harts** - All valid HARTs of a RISC-V platform are possible + HARTs of the ROOT domain +* **regions** - Two memory regions available to the ROOT domain: + **A)** A memory region to protect OpenSBI firmware from S-mode and U-mode + **B)** A memory region of **order=__riscv_xlen** allowing S-mode and + U-mode access to full memory address space +* **boot_hartid** - Coldboot HART is the HART booting the ROOT domain +* **next_addr** - Next booting stage address in coldboot HART scratch + space is the next address for the ROOT domain +* **next_arg1** - Next booting stage arg1 in coldboot HART scratch space + is the next arg1 for the ROOT domain +* **next_mode** - Next booting stage mode in coldboot HART scratch space + is the next mode for the ROOT domain +* **system_reset_allowed** - The ROOT domain is allowed to reset the system + +Domain Effects +-------------- + +Few noteworthy effects of a system partitioned into domains are as follows: + +* At any point in time, a HART is running in exactly one OpenSBI domain context +* The SBI IPI and RFENCE calls from HART A are restricted to the HARTs in + domain assigned to HART A +* The SBI HSM calls which try to change/read state of HART B from HART A will + only work if both HART A and HART B are assigned same domain +* A HART running in S-mode or U-mode can only access memory based on the + memory regions of the domain assigned to the HART diff --git a/docs/doxygen.cfg b/docs/doxygen.cfg index dbf8ef9..82f31a7 100644 --- a/docs/doxygen.cfg +++ b/docs/doxygen.cfg @@ -795,6 +795,7 @@ INPUT = @@SRC_DIR@@/README.md \ @@SRC_DIR@@/docs/platform_guide.md \ @@SRC_DIR@@/docs/platform_requirements.md \ @@SRC_DIR@@/docs/library_usage.md \ + @@SRC_DIR@@/docs/domain_support.md \ @@SRC_DIR@@/docs/firmware \ @@SRC_DIR@@/docs/platform \ @@SRC_DIR@@/include \