[Cryptography] RISC-V isn't the answer

Bill Frantz frantz at pwpconsult.com
Mon Jan 22 17:34:51 EST 2018


On 1/22/18 at 7:45 AM, bascule at gmail.com (Tony Arcieri) wrote:

>lowRISC provides an every-word-tagged memory architecture. This information
>could be augmented to encode things like memory protection domains (or may
>already include the necessary information, I have not done an exhaustive
>survey of their tag bits), much in the same way KPTI is being leveraged as
>a page-level protection with the Linux's kernel's assistance. With
>information about the current protection domain encoded in every single
>word of memory, caches and memory controllers could physically deny access
>to words which are not tagged with the current protection domain. This
>would provide a central point of enforcement for *synchronous* checks which
>could prevent CPUs from speculating outside the current protection domain
>in the first place.

The immediate question that occurs to me is, "How do we handle 
shared memory? Both R/O and R/W?".

If we have a separate cache for each protection domain, then 
that domain is the only thing that can affect what is in that 
cache. Can we afford to fetch a shared word from a sister cache 
entry, or does that signal too much information? What about 
memory which is shared between mutually suspicious actors? 
(Probably R/O, but there may be uses for R/W.) There are a whole 
lot of questions.

One approach I like is a massive number of simple cores that 
don't speculate.

Cheers - Bill

--------------------------------------------------------------
Bill Frantz        | There are now so many exceptions to the
408-356-8506       | Fourth Amendment that it operates only by
www.pwpconsult.com | accident.  -  William Hugh Murray



More information about the cryptography mailing list