Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp2602661rwr; Fri, 28 Apr 2023 12:47:55 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5UUFXL75vyZXvIeQmRuzGiCbZG+jQtwrNxTxuC4CxpEtL1CSjbirBW+ZVa/3o+SujexCf2 X-Received: by 2002:a05:6a20:6a0b:b0:f5:9f72:1aa9 with SMTP id p11-20020a056a206a0b00b000f59f721aa9mr8864184pzk.14.1682711275105; Fri, 28 Apr 2023 12:47:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682711275; cv=none; d=google.com; s=arc-20160816; b=EZ1/sONm0pKdQaK+7HKszkBFAjFRgXYzAD0d7PB50Rk7A0L0g4MJKchGa2TbfqrABw nzIb8uXEuTIee5tS/nNkUIp+rDRPtvFMSMsYNbpO0sLmrCCACd3O2LTTNk3h2WOp79+l Iow6I+gQRu0TzVXu8Bh0ok2S1u5t+N4yu0hI1WGbcEGmalCXflwXmISGxe7cpfQcTDc7 45XOo1bW84gah+3lMeJSe9qIgYRhZoq3IHyRkjOIF97x9T4/k1e9dFE8YO8bPw7zZBsy qtS+wL4rgH1kQhgKVPbtg4+Sr4fLIcN0dtfjWkNjj9oWkqI5WGWhT9dYW1tfQAb85NJc Chew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:to:from:cc:in-reply-to:subject:date:dkim-signature; bh=GJpVuRcfHsCG2v4maffZs947FjocQJccsdJlIfc4SQo=; b=l0eZxljJ5bQ16M15LRh+HFOrG/kU6Pn+GwJ5LCrQPScJ43xejBP1e+mwpwGUTFSXMo 2yklEYcBF3NcgWhgPQ6L2RW5vCHVxtZTIgzzFN0q/rQtDJYZuIdQN62IRKLYkLlmsGtM XVQVuJpGrMkkvoe5V+sUekg8yKzHaSIZrH0OmmDVIkEG9JcZ36yzo8KG4/Ki+3sOA/Sd yc68EyiKsTFuqyj4yWxf76GjwoluKllend4qcRCy7F+CvoEuM3T8ui8rfV3Ey6L37oXv 5m2YPzsJJAWAa3RC9eQ/U98s/TIQK7DIaW6ZjswLiGHx4ytYGta1y8rds4P3xnuTG44W IxAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@dabbelt-com.20221208.gappssmtp.com header.s=20221208 header.b=kxBRY5Vj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 6-20020a621806000000b0063b6bc7df13si21809172pfy.209.2023.04.28.12.47.43; Fri, 28 Apr 2023 12:47:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@dabbelt-com.20221208.gappssmtp.com header.s=20221208 header.b=kxBRY5Vj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346521AbjD1T2P (ORCPT + 99 others); Fri, 28 Apr 2023 15:28:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52968 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346517AbjD1T2N (ORCPT ); Fri, 28 Apr 2023 15:28:13 -0400 Received: from mail-pf1-x433.google.com (mail-pf1-x433.google.com [IPv6:2607:f8b0:4864:20::433]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B01EF49E1 for ; Fri, 28 Apr 2023 12:28:10 -0700 (PDT) Received: by mail-pf1-x433.google.com with SMTP id d2e1a72fcca58-63b5ce4f069so471500b3a.1 for ; Fri, 28 Apr 2023 12:28:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dabbelt-com.20221208.gappssmtp.com; s=20221208; t=1682710090; x=1685302090; h=content-transfer-encoding:mime-version:message-id:to:from:cc :in-reply-to:subject:date:from:to:cc:subject:date:message-id :reply-to; bh=GJpVuRcfHsCG2v4maffZs947FjocQJccsdJlIfc4SQo=; b=kxBRY5VjYpEUqWEJdZGEhqUbeZgTPhMox1HPGb7MtRw2we/mZrM5NbSAurMqEJh9Ba T93E3GJ33v6KwI+GnuBU/GwO6esiae1RH76U1vWOIVBvRPb4cQtymxm98CzI+N8y/Bnt lxGXnlh/aZRWqRDsEkQn0G+PIUwbkbkHi6seU25MNKMS0DwEi+SFzkyoL2J3aLHfhH0N b9SizsBrbxFQRs6M+YP5PzVvQa0fafFj0RVRz5RU0v9djRRnm+p9DeO/7/xXoN7VoBuD r+/CpNsiEnYbk5KW6lM6gLWrMeqDoXnD/1Y0UWTwD+43iQjdlxiVkegpfCYBK3wE+4fx tStw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682710090; x=1685302090; h=content-transfer-encoding:mime-version:message-id:to:from:cc :in-reply-to:subject:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=GJpVuRcfHsCG2v4maffZs947FjocQJccsdJlIfc4SQo=; b=dhU5j8DuUpEHZshPVwOugCUQ/BRXwFZnSWkDtn2OPnVy2DITP7su6yI2IfwEmEQ8M4 XbIGNq3cbXsDa08n2KmhCCkrf2IUDPF83Uw6xpLD2AhQYZSi5yWtQHq+czELNFD8IlGU RPoKSeit6whSp1rfq9HEvqJdFqUwlnFr6qt70kzbQrXR8eyB7RYNtHZPT+vxJZEfJHvM pYLRpUIln1o193mh3TpRkbQK1PJZWBz/BAECyFjanwQ+W5sAp4lkeU+laLvFsJAlUVtB I0tqTnjWeQJvaovIJTaIvoXRhaeF/Tr+Xp10BNDEOxI2PisMc34dYGrSKq2mRh7RdBcz 7jig== X-Gm-Message-State: AC+VfDwDqVKnnzw7c6qRLds8p1xYr0PHFcJozSRln4UjqfH/rv67AcFE OoubOFx3nc+U57rtmL6AYpvKjw== X-Received: by 2002:a05:6a00:ccc:b0:63f:125f:9595 with SMTP id b12-20020a056a000ccc00b0063f125f9595mr9761351pfv.9.1682710089930; Fri, 28 Apr 2023 12:28:09 -0700 (PDT) Received: from localhost ([135.180.227.0]) by smtp.gmail.com with ESMTPSA id f7-20020a056a00228700b0062d7c0ccb3asm15542149pfe.103.2023.04.28.12.28.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 28 Apr 2023 12:28:09 -0700 (PDT) Date: Fri, 28 Apr 2023 12:28:09 -0700 (PDT) X-Google-Original-Date: Fri, 28 Apr 2023 12:28:06 PDT (-0700) Subject: Re: [PATCH 0/4] Expose the isa-string via the AT_BASE_PLATFORM aux vector In-Reply-To: CC: christoph.muellner@vrull.eu, heiko@sntech.de, linux-riscv@lists.infradead.org, Paul Walmsley , kito.cheng@sifive.com, jrtc27@jrtc27.com, Conor Dooley , matthias.bgg@gmail.com, heinrich.schuchardt@canonical.com, greentime.hu@sifive.com, nick.knight@sifive.com, Richard Henderson , Arnd Bergmann , linux-kernel@vger.kernel.org, heiko.stuebner@vrull.eu From: Palmer Dabbelt To: philipp.tomsich@vrull.eu Message-ID: Mime-Version: 1.0 (MHng) Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 28 Apr 2023 11:59:31 PDT (-0700), philipp.tomsich@vrull.eu wrote: > On Fri, 28 Apr 2023 at 20:48, Christoph Müllner > wrote: >> >> On Fri, Apr 28, 2023 at 4:57 PM Palmer Dabbelt wrote: >> > >> > On Mon, 24 Apr 2023 12:49:07 PDT (-0700), heiko@sntech.de wrote: >> > > From: Heiko Stuebner >> > > >> > > The hwprobing infrastructure was merged recently [0] and contains a >> > > mechanism to probe both extensions but also microarchitecural features >> > > on a per-core level of detail. >> > > >> > > While discussing the solution internally we identified some possible issues, >> > > tried to understand the underlying issue and come up with a solution for it. >> > > All these deliberations overlapped with hwprobing being merged, but that >> > > shouldn't really be an issue, as both have their usability - see below. >> > > >> > > Also please see the "Things to consider" at the bottom! >> > > >> > > >> > > Possible issues: >> > > - very much limited to Linux >> > > - schedulers run processes on all cores by default, so will need >> > > the common set of extensions in most cases >> > > - each new extensions requires an uapi change, requiring at least >> > > two pieces of software to be changed >> > > - adding another extension requires a review process (only known >> > > extensions can be exposed to user-space) >> > > - vendor extensions have special needs and therefore possibly >> > > don’t fit well >> > > >> > > >> > > Limited to Linux: >> > > ----------------- >> > > >> > > The syscall and its uapi is Linux-specific and other OSes probably >> > > will not defer to our review process and requirements just to get >> > > new bits in. Instead most likely they'll build their own systems, >> > > leading to fragmentation. >> > > >> > > >> > > Feature on all cores: >> > > --------------------- >> > > >> > > Arnd previously ([1]) commented in the discussion, that there >> > > should not be a need for optimization towards hardware with an >> > > asymmetric set of features. We believe so as well, especially >> > > when talking about an interface that helps processes to identify >> > > the optimized routines they can execute. >> > > >> > > Of course seeing it with this finality might not take into account >> > > the somewhat special nature of RISC-V, but nevertheless it describes >> > > the common case for programs very well. >> > > >> > > For starters the scheduler in its default behaviour, will try to use any >> > > available core, so the standard program behaviour will always need the >> > > intersection of available extensions over all cores. >> > > >> > > >> > > Limiting program execution to specific cores will likely always be a >> > > special use case and already requires Linux-specific syscalls to >> > > select the set of cores. >> > > >> > > So while it can come in handy to get per-core information down the road >> > > via the hwprobing interface, most programs will just want to know if >> > > they can use a extension on just any core. >> > > >> > > >> > > Review process: >> > > --------------- >> > > >> > > There are so many (multi-letter-)extensions already with even more in >> > > the pipeline. To expose all of them, each will require a review process >> > > and uapi change that will make defining all of them slow as the >> > > kernel needs patching after which userspace needs to sync in the new >> > > api header. >> > >> > The whole reason we're doing hwprobe with bitmaps is beacuse the ISA >> > strings are not a stable interface, and thus are not suitable for >> > building uABI around. >> >> The ISA string is the main description of the RISC-V ISA that a >> system/core/hart implements. It is suitable and stable enough for all toolchain >> components (-march string, ELF header, etc.). >> It is also used in the DTB that the kernel uses to identify available >> extensions. >> So it is reasonable to argue that it is good enough for all runtime components. >> Also, I don't see any evidence that users are affected by any stability issues >> of the ISA strings in the interfaces where it is used at the moment. >> Quite the opposite, users are expecting ISA string interfaces everywhere >> because of existing interfaces. >> >> Besides that, also the kernel stable ABI documentation allows changes: >> "Userspace programs are free to use these >> interfaces with no restrictions, and backward compatibility for >> them will be guaranteed for at least 2 years." [1] >> I did not come across any issues in the RISC-V ISA string that would violate >> these requirements. Did you? Further, the vDSO is covered by the stable ABI >> requirements, but not the auxiliary vector. This does not imply that an ISA >> string interface in the aux vector does not have to be stable at all, but there >> is certainly enough room for any ISA extension errata that may pop up in the >> future. Other architectures can live with that risk as well. > > To provide a slightly different perspective, arriving at a similar conclusion... > > The ISA string is part of the psABI (see > https://github.com/riscv-non-isa/riscv-elf-psabi-doc/releases/tag/v1.0) > to identify the target architecture through Tag_RISCV_arch. As such, > it already provides an interface that the kernel will have to consume > (during process startup) and has to be reasonably stable. The ELF > auxiliary vector is closely related to and should generally follow the > lead of the psABI definitions (which already use this string), which > makes the ISA string a natural encoding for exposing this information > to userspace programs. There were so many breakages due to that tag we just turned it off. > Cheers, > Philipp. > >> >> >> BR >> Christoph >> >> [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/ABI/README >> >> > >> > > >> > > >> > > Vendor-extensions: >> > > ------------------ >> > > >> > > Vendor extensions are special in their own right. >> > > Userspace probably will want to know about them, but we as the kernel >> > > don't want to care about them too much (except as errata), as they're >> > > not part of the official RISC-V ISA spec. >> > > >> > > Getting vendor extensions from the dt to userspace via hwprobe would >> > > require coordination efforts and as vendors have the tendency to invent >> > > things during their development process before trying to submit changes >> > > upstream this likely would result in conflicts with assigned ids down >> > > the road. Which in turn then may create compatibility-issues with >> > > userspace builds built on top of the mainline kernel or a pre- >> > > existing vendor kernel. >> > > >> > > The special case also is that vendor A could in theory implement an >> > > extension from vendor B. So this would require to actually assign >> > > separate hwprobe keys to vendors (key for xthead extensions, key for >> > > xventana extensions, etc). This in turn would require vendors to >> > > come to the mainline kernel to get assigned a key (which in reality >> > > probably won't happen), which would then make the kernel community >> > > sort of an id authority. >> > > >> > > >> > > >> > > >> > > To address these, the attached patch series adds a second interface >> > > for the common case and "just" exposes the isa-string via the >> > > AT_BASE_PLATFORM aux vector. >> > > >> > > In the total cost of program start, parsing the string does not create >> > > too much overhead. The extension list in the kernel already contains >> > > the extensions list limited to the ones available on all harts and >> > > the string form allows us to just pipe through additional stuff too, as >> > > can be seen in the example for T-Head extensions [2] . >> > > >> > > This of course does not handle the microarchitecture things that >> > > the hwprobe syscall provides but allows a more generalized view >> > > onto the available ISA extensions, so is not intended to replace >> > > hwprobe, but to supplement it. >> > > >> > > AT_BASE_PLATFORM itself is somewhat well established, with PPC already >> > > using it to also expose a platform-specific string that identifies >> > > the platform in finer grain so this aux-vector field could in theory >> > > be used by other OSes as well. >> > > >> > > >> > > A random riscv64-qemu could for example provide: >> > > rv64imafdcvh_zicbom_zihintpause_zbb_sscofpmf_sstc_svpbmt >> > > >> > > where a d1-nezha provides: >> > > rv64imafdc_xtheadba_xtheadbb_xtheadbs_xtheadcmo_xtheadcondmov_xtheadfmemidx_xtheadint_xtheadmac_xtheadmemidx_xtheadmempair_xtheadsync >> > > >> > > >> > > Things to still consider: >> > > ------------------------- >> > > >> > > Right now both hwprobe and this approach will only pass through >> > > extensions the kernel actually knows about itself. This should not >> > > necessarily be needed (but could be an optional feature for e.g. virtualization). >> > > >> > > Most extensions don’t introduce new user-mode state that the kernel needs to manage (e.g. new registers). Extension that do introduce new user-mode state are usually disabled by default and have to be enabled by S mode or M mode (e.g. FS[1:0] for the floating-point extension). So there should not be a reason to filter any extensions that are unknown. >> > > >> > > So it might make more sense to just pass through a curated list (common >> > > set) created from the core's isa strings and remove state-handling >> > > extensions when they are not enabled in the kernel-side (sort of >> > > blacklisting extensions that need actual kernel support). >> > > >> > > However, this is a very related, but still independent discussion. >> > > >> > > >> > > [0] https://lore.kernel.org/lkml/168191462224.22791.2281450562691381145.git-patchwork-notify@kernel.org/ >> > > [1] https://lore.kernel.org/all/605fb2fd-bda2-4922-92bf-e3e416d54398@app.fastmail.com/ >> > > [2] These are the T-Head extensions available in _upstream_ toolchains >> > > >> > > Heiko Stuebner (4): >> > > RISC-V: create ISA string separately - not as part of cpuinfo >> > > RISC-V: don't parse dt isa string to get rv32/rv64 >> > > RISC-V: export the ISA string of the running machine in the aux vector >> > > RISC-V: add support for vendor-extensions via AT_BASE_PLATFORM and >> > > xthead >> > > >> > > arch/riscv/errata/thead/errata.c | 43 ++++++++++++ >> > > arch/riscv/include/asm/alternative.h | 4 ++ >> > > arch/riscv/include/asm/elf.h | 10 +++ >> > > arch/riscv/kernel/alternative.c | 21 ++++++ >> > > arch/riscv/kernel/cpu.c | 98 +++++++++++++++++++++++++--- >> > > 5 files changed, 168 insertions(+), 8 deletions(-)