public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Li, Yong" <yong.li@intel.com>
To: <devel@edk2.groups.io>, <sunilvl@ventanamicro.com>
Cc: Andrei Warkentin <andrei.warkentin@intel.com>,
	Evan Chai <evan.chai@intel.com>,
	Tuan Phan <tphan@ventanamicro.com>
Subject: Re: [edk2-devel] [PATCH 1/1] MdePkg/BaseLib: Add SpeculationBarrier implementation for RiscV64
Date: Thu, 1 Jun 2023 18:40:08 +0800	[thread overview]
Message-ID: <0ce0439b-9e07-831e-2c0b-6db26673f893@intel.com> (raw)
In-Reply-To: <ZHhIQx3BX5x4HkRL@sunil-laptop>



On 2023/6/1 15:26, Sunil V L wrote:
> On Mon, May 29, 2023 at 01:51:46PM +0800, Li, Yong wrote:
>>
>> Hi Sunil,
>>
>> Could you help review this my first patch to edk2 community for RiscV,  this is the change to MdePkg/Library/BaseLib/RiscV64. 
>> Since it is for RiscV specific, I guess you are the only maintainer per the Maintainers.txt  ?
>> Please let me know if need additional reviewer.  
>>
>> Thanks in advance for your time and kind helping for this first patch.
>>
> Hi Yong,
> 
> Thank you for the patch!
> 
> Just one typo in the commit text and one question below. Otherwise, LGTM.
> 
>>
>> On 2023/5/29 13:24, Li, Yong wrote:
>>> Impelement the SpeculationBarrier with implementations consisting of
> 
> typo - "Implement"
> 

Hi Sunil,

Thanks for the careful review, Let me change in v2


>>> fence instruction which provides finer-grain memory orderings.
>>> Perform Data Barrier in RiscV: fence rw,rw
>>> Perform Instruction Barrier in RiscV: fence.i; fence r,r
>>> More detail is in Chapter 17, RVWMO Memory Consistency Model
>>> https://github.com/riscv/riscv-isa-manual
>>>
>>> This API is first introduced in the below commits for IA32 and x64
>>> https://github.com/tianocore/edk2/commit/d9f1cac51bd354507e880e614d11a1dc160d38a3
>>> https://github.com/tianocore/edk2/commit/e83d841fdc2878959185c4c6cc38a7a1e88377a4
>>> and below the commit for ARM and AArch64 implementation
>>> https://github.com/tianocore/edk2/commit/c0959b4426b2da45cdb8146a5116bb4fd9b86534
>>>
>>> This commit is to add the RiscV64 implementation which will be used by
>>> variable service under Variable/RuntimeDxe
>>>
>>> Cc: Andrei Warkentin <andrei.warkentin@intel.com>
>>> Cc: Evan Chai <evan.chai@intel.com>
>>> Cc: Sunil V L <sunilvl@ventanamicro.com>
>>> Cc: Tuan Phan <tphan@ventanamicro.com>
>>> Signed-off-by: Yong Li <yong.li@intel.com>
>>> ---
>>>  MdePkg/Library/BaseLib/BaseLib.inf            |  1 +
>>>  .../BaseLib/RiscV64/SpeculationBarrier.S      | 34 +++++++++++++++++++
>>>  2 files changed, 35 insertions(+)
>>>  create mode 100644 MdePkg/Library/BaseLib/RiscV64/SpeculationBarrier.S
>>>
>>> diff --git a/MdePkg/Library/BaseLib/BaseLib.inf b/MdePkg/Library/BaseLib/BaseLib.inf
>>> index 3a48492b1a01..03c7b02e828b 100644
>>> --- a/MdePkg/Library/BaseLib/BaseLib.inf
>>> +++ b/MdePkg/Library/BaseLib/BaseLib.inf
>>> @@ -404,6 +404,7 @@ [Sources.RISCV64]
>>>    RiscV64/CpuScratch.S              | GCC
>>>    RiscV64/ReadTimer.S               | GCC
>>>    RiscV64/RiscVMmu.S                | GCC
>>> +  RiscV64/SpeculationBarrier.S      | GCC
>>>  
>>>  [Sources.LOONGARCH64]
>>>    Math64.c
>>> diff --git a/MdePkg/Library/BaseLib/RiscV64/SpeculationBarrier.S b/MdePkg/Library/BaseLib/RiscV64/SpeculationBarrier.S
>>> new file mode 100644
>>> index 000000000000..581a7653996f
>>> --- /dev/null
>>> +++ b/MdePkg/Library/BaseLib/RiscV64/SpeculationBarrier.S
>>> @@ -0,0 +1,34 @@
>>> +##------------------------------------------------------------------------------
>>> +#
>>> +# SpeculationBarrier() for RISCV64
>>> +#
>>> +# Copyright (c) 2023, Intel Corporation. All rights reserved.
>>> +#
>>> +# SPDX-License-Identifier: BSD-2-Clause-Patent
>>> +#
>>> +##------------------------------------------------------------------------------
>>> +
>>> +.text
>>> +.p2align 2
>>> +
>>> +ASM_GLOBAL ASM_PFX(SpeculationBarrier)
>>> +
>>> +
>>> +#/**
>>> +#  Uses as a barrier to stop speculative execution.
>>> +#
>>> +#  Ensures that no later instruction will execute speculatively, until all prior
>>> +#  instructions have completed.
>>> +#
>>> +#**/
>>> +#VOID
>>> +#EFIAPI
>>> +#SpeculationBarrier (
>>> +#  VOID
>>> +#  );
>>> +#
>>> +ASM_PFX(SpeculationBarrier):
>>> +    fence rw,rw
> 
> Don't we need fence iorw, iorw?
> 

This SpeculationBarrier function is to avoid the speculative execution for the potential risk introduced in branch prediction mentioned in https://nvd.nist.gov/vuln/detail/cve-2017-5753.
Thus, I think no need to enforce ordering on devices, just memory, data barrier and instruction barrier.
Also in ARM's implementation MdePkg/Library/BaseLib/AArch64/SpeculationBarrier.S, similar dsb and isb instructions are used, 
one for data barrier and another for instruction barrier. 

And from the RISC-V spec https://github.com/riscv/riscv-isa-manual/blob/main/src/mm-eplan.adoc,
the data barrier and instruction barrier RVWMO mapping are
Power Operation 	RVWMO Mapping
sync			fence rw,rw
isync                   fence.i; fence r,r


> Thanks,
> Sunil
> 
>>> +    fence.i
>>> +    fence r,r
>>> +    ret
> 
> 
> 
> 
> 
> 

      reply	other threads:[~2023-06-01 10:40 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <cover.1685337846.git.yong.li@intel.com>
2023-05-29  5:24 ` [PATCH 1/1] MdePkg/BaseLib: Add SpeculationBarrier implementation for RiscV64 Li, Yong
     [not found] ` <176385E31A3644FB.14832@groups.io>
2023-05-29  5:51   ` [edk2-devel] " Li, Yong
2023-06-01  7:26     ` Sunil V L
2023-06-01 10:40       ` Li, Yong [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0ce0439b-9e07-831e-2c0b-6db26673f893@intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox