Skip to content

Commit

Permalink
Merge pull request #78 from gagachang/fix-0625
Browse files Browse the repository at this point in the history
Miscellaneous fixes
  • Loading branch information
rsahita authored Jul 16, 2024
2 parents a2b3894 + 156ffcd commit 895891a
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
4 changes: 2 additions & 2 deletions src/refarch.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -334,8 +334,7 @@ concurrency controls on internal data structures and per-TVM global data
structures (such as the G-stage page table structures).

[caption="Figure {counter:image}: ", reftext="Figure {image}"]
[title= "TSM operation: Interruptible and non-reentrant TSM model according to
the deployment model 1."]
[title= "TSM operation: Interruptible and non-reentrant TSM model according to the deployment model 1."]
image::img_3.png[]

A TSM entry triggered by an ECALL (with CoVE extension type) by the OS/VMM
Expand Down Expand Up @@ -605,3 +604,4 @@ OS/VMM, the TSM must restore the saved hardware performance monitoring event
triggers and counter enables. If the TSM uses the SBI PMU extension instead of
Supervisor counter delegation, the TSM-driver needs to perform the save/restore
on behalf of the TSM.

4 changes: 2 additions & 2 deletions src/swlifecycle.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,8 @@ When a TVM context is created and initialized by using the
`sbi_covh_create_tvm()` function - this global init function allocates a
set of pages for the TVM global control structure and resets the control
fields that are immutable for the lifetime of the TVM, e.g., configuration of
which RISC-V CPU extensions the TVM is allowed to use, debug and pmon
capabilities enabled etc.
which RISC-V CPU extensions the TVM is allowed to use, debug and performance
monitoring capabilities enabled etc.

The VMM may assign memory to the TVM via a sequence of
`sbi_covh_add_tvm_page_table_pages()` `sbi_covh_add_tvm_measured_pages()` and
Expand Down
2 changes: 1 addition & 1 deletion src/threatmodel.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ encrypted TEE memory | Supervisor Domains
Cryptography and/or MMU, xPMP, MTT extension | TEE memory confidentiality
against logical attacks via hart; additionally address physical attacks via
cryptography. If cryptography used, TEE should have a unique encryption key;
each TEE VM may may also have one or more unique keys. Also see related
each TEE VM may also have one or more unique keys. Also see related
requirements around ciphertext disclosure and memory integrity |
Supervisor Domains

Expand Down

0 comments on commit 895891a

Please sign in to comment.