Received: by 2002:ab2:69cc:0:b0:1f4:be93:e15a with SMTP id n12csp210180lqp; Fri, 12 Apr 2024 15:21:46 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUyaYuPODWdNoZMz91UK5ITi/wboZ5DsDnOcBwL9PnLgdh7E9iqsF1l7+A+uW+pw1+PaibQx9hOo+uYiJhZverFkFfjdkQOhuFJwty/8w== X-Google-Smtp-Source: AGHT+IHFCHzYp1i6XR6efYImV/ajzRxRPvPO3oewdMWIwUV5TOG2WXnKSGaS5QLV/OKizZIs9IUy X-Received: by 2002:a17:906:4fce:b0:a47:20c3:7c51 with SMTP id i14-20020a1709064fce00b00a4720c37c51mr2870584ejw.71.1712960506658; Fri, 12 Apr 2024 15:21:46 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712960506; cv=pass; d=google.com; s=arc-20160816; b=FipIBkAqYQnnwmokeOY5bjuxSsmgzaVzompXKTlu8WkxTHTRi9auKnlzkaIvhO085j k2Wxw0fwtN2QhGri5wcwbtYEyOGlwzkExIGzTdQGuCOPu/ErQ2HNd1NfVhNvXhrj/DNd q5/24jFdqoQvhNFWa9kLB2zoV9Pty1+HzRs7X9X/0lHNivpekTL+tBqcPx42cgS+2sdA SdPQS8dfeSOUKdFVJLWPipXnmST/zklCZDAm8J+i0mKzFWk0owHQdxqIhpsARtPxRjX/ S0rj3vGOMZqPuHSENSbb8QCWWJyKNOJvzu+GRh6NUS6cn0KhSFgVZKljQMoOvE0DurUY Q++Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Qw7f13VaApE9P7VRpDrEHdpAzJF1wdaPoxbwIFLmIG4=; fh=Tth4zBaRJIWf8TzOZKb2LIdWUNHVDiI1jfOOeap3wy4=; b=LNEEWqELQGF9qafX8rJS+t0aqczIDtRycIEYc4C4PDH4PMWEM/pNfSw4s2jQhALjUQ LfYiUtrM2QYLpKe62yLJ4XTpgdgGRxqmTaOeirkSsC6YHx1x1mrm2KYXk+iwJmM1a06R xnM6fGARpOPLMVLxdXCxXIBCMbt34l4GMqvkn2MuSsTL8RMqsxc6rPz1d3naLzHMtB04 6x+rJ/nQVxiK9347PELEFbox2q+/pD6hnjqid1hXQwHQg2HJKWXyfbi77WaUKU+ukFy+ tJzj8GFqW4THAZ9hUhoFaa0aupA1vFe931KsPjtUU7BtM+H6gRLRlmpbUjKjVZ8l4dCP Rkqg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@rivosinc-com.20230601.gappssmtp.com header.s=20230601 header.b=S94Ro6Zh; arc=pass (i=1 spf=pass spfdomain=rivosinc.com dkim=pass dkdomain=rivosinc-com.20230601.gappssmtp.com); spf=pass (google.com: domain of linux-kernel+bounces-143404-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-143404-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id nb34-20020a1709071ca200b00a47bab621f1si2129025ejc.226.2024.04.12.15.21.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 12 Apr 2024 15:21:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-143404-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@rivosinc-com.20230601.gappssmtp.com header.s=20230601 header.b=S94Ro6Zh; arc=pass (i=1 spf=pass spfdomain=rivosinc.com dkim=pass dkdomain=rivosinc-com.20230601.gappssmtp.com); spf=pass (google.com: domain of linux-kernel+bounces-143404-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-143404-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 1CF961F23558 for ; Fri, 12 Apr 2024 22:21:19 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4D37C15250A; Fri, 12 Apr 2024 22:21:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=rivosinc-com.20230601.gappssmtp.com header.i=@rivosinc-com.20230601.gappssmtp.com header.b="S94Ro6Zh" Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5AEC32F875 for ; Fri, 12 Apr 2024 22:21:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.169 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712960468; cv=none; b=RfKp2+y/8f4+EUJAlYQQN4IxdAgI28cngrlbbph/5vsB6d1IbSr1gaf+rvrPmIRqMAUzqqoWquk/FoOUHqt8+IGgV9MAncmD6EvRgcRBQ1neZC93CGkdKNvQazMOyaNtb6A8C+oQX1lmF9UoNfUR7da7dSsQLHGOfl79HCnIV0M= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712960468; c=relaxed/simple; bh=jxUqPVI7QMdYiKJZ44makQXptF3fBvNQiGIoT8TIpWE=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=NhGUQO+Rqcrlv/rWgAjFrcx7yKxsPFWNVfRA4ttHPyFjP4DC+PvDL/RYPAUqLvMvH+BdK1x7Big4k0zL0zfiNjQ5fx1ZrpSv/P/kbtZLUTvij5e2/va05eYqOvd1thL9fbEsvrO3a0NDeBj1niIE8bU9Wyk3VHkyAstgRgsBaQY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=rivosinc.com; spf=pass smtp.mailfrom=rivosinc.com; dkim=pass (2048-bit key) header.d=rivosinc-com.20230601.gappssmtp.com header.i=@rivosinc-com.20230601.gappssmtp.com header.b=S94Ro6Zh; arc=none smtp.client-ip=209.85.214.169 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=rivosinc.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=rivosinc.com Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1e424bd30fbso11248435ad.0 for ; Fri, 12 Apr 2024 15:21:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rivosinc-com.20230601.gappssmtp.com; s=20230601; t=1712960466; x=1713565266; darn=vger.kernel.org; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date:from:to :cc:subject:date:message-id:reply-to; bh=Qw7f13VaApE9P7VRpDrEHdpAzJF1wdaPoxbwIFLmIG4=; b=S94Ro6ZhN7ITDylPwfn0rMRGoJN/Phk0BXblZhqkza5fOV5xlstpCdrlHQoBGIhRif /5fGqRmL986v/v+nVNKCDYgxV/tonrBwJF7PV0KXEskS3yIa+UHvQcoFR1d4yu7yomQp 6Pq3dfTWgQYfTBrRWekPt82sc/ktVTa1O95XznZFUqkspSnvzRh5y0GtHdl6fc7I1sCO NRRcSvF5oPkQs76R+JR2XF74Y61Y9dXdjR3RnS5cNZPMJw92sVdy/begk7w/dzULgtxm 8A2hrtNupxVoMNwCLm67fSraIgkvIbWSttKntWo4FP2ih2F9ice6h+1pMTO7IEkMN5lg 9eNQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712960466; x=1713565266; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Qw7f13VaApE9P7VRpDrEHdpAzJF1wdaPoxbwIFLmIG4=; b=deLAgcviDRV+G5S9+F4eVl9wK/RqazjFD8lkizgveMfnp+IAJVhqgtiffrnSKJHsZE ZIgu/SWKGrBHI6lEt7hO8acyr7/Lqt/DGUI9L1IwqbG28nG85RFo5JjKo9HR8MJHYFFG gBg+e18UB869Dz7eLK2xV75Ed4PAQ7Kd/z/fDNtyd68oxTB3tCpF0EwgcBvvnc+GRQFK I01TM8zVyHVJ1Icr92dyWFI4oHxNVklyMS3SQqgNbumwJBruoCHvszgNjE/PqU+Sb795 zeXi5RT+X4Kq3jYk4TgCIjr6TBf60yqL5uM2Pr+H7saGq9n5uua1OyRfiXcPWlteh7vB UTlw== X-Forwarded-Encrypted: i=1; AJvYcCWVJvDxGEh0WYLvX1NmHOcfuYI7eBsZachGB/sqdWRREHV7pauYtZd+whpe41+i61knVArdWQ6+dk26G4eKX7q8qMZbWg50IQ+3hswp X-Gm-Message-State: AOJu0YzNNQthpVi+pe0k/V8V+9NHjS+pYMwZy7wd20Bobf1IJVdkAy0a QANPByChqCPDmCVOmlMJFzCibQtRFOe6iWTwZHeAPHbdUvHWLxLZKd0sMhQhpk4= X-Received: by 2002:a17:903:2609:b0:1e2:ca65:68c2 with SMTP id jd9-20020a170903260900b001e2ca6568c2mr3674124plb.51.1712960465476; Fri, 12 Apr 2024 15:21:05 -0700 (PDT) Received: from ghost ([50.145.13.30]) by smtp.gmail.com with ESMTPSA id b7-20020a170902650700b001e245c5afbfsm3554986plk.155.2024.04.12.15.21.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 12 Apr 2024 15:21:05 -0700 (PDT) Date: Fri, 12 Apr 2024 15:21:02 -0700 From: Charlie Jenkins To: Evan Green Cc: Conor Dooley , Rob Herring , Krzysztof Kozlowski , Paul Walmsley , Palmer Dabbelt , Albert Ou , Guo Ren , Conor Dooley , Chen-Yu Tsai , Jernej Skrabec , Samuel Holland , Conor Dooley , =?iso-8859-1?Q?Cl=E9ment_L=E9ger?= , Jonathan Corbet , Shuah Khan , linux-riscv@lists.infradead.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, Palmer Dabbelt , linux-arm-kernel@lists.infradead.org, linux-sunxi@lists.linux.dev, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH 16/19] riscv: hwprobe: Add vendor extension probing Message-ID: References: <20240411-dev-charlie-support_thead_vector_6_9-v1-0-4af9815ec746@rivosinc.com> <20240411-dev-charlie-support_thead_vector_6_9-v1-16-4af9815ec746@rivosinc.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Fri, Apr 12, 2024 at 02:43:01PM -0700, Evan Green wrote: > On Fri, Apr 12, 2024 at 1:20 PM Charlie Jenkins wrote: > > > > On Fri, Apr 12, 2024 at 12:07:46PM -0700, Evan Green wrote: > > > On Fri, Apr 12, 2024 at 11:17 AM Charlie Jenkins wrote: > > > > > > > > On Fri, Apr 12, 2024 at 10:05:21AM -0700, Evan Green wrote: > > > > > On Thu, Apr 11, 2024 at 9:12 PM Charlie Jenkins wrote: > > > > > > > > > > > > Add a new hwprobe key "RISCV_HWPROBE_KEY_VENDOR_EXT_0" which allows > > > > > > userspace to probe for the new RISCV_ISA_VENDOR_EXT_XTHEADVECTOR vendor > > > > > > extension. > > > > > > > > > > > > Signed-off-by: Charlie Jenkins > > > > > > --- > > > > > > arch/riscv/include/asm/hwprobe.h | 4 +-- > > > > > > arch/riscv/include/uapi/asm/hwprobe.h | 10 +++++- > > > > > > arch/riscv/kernel/sys_hwprobe.c | 59 +++++++++++++++++++++++++++++++++-- > > > > > > 3 files changed, 68 insertions(+), 5 deletions(-) > > > > > > > > > > > > diff --git a/arch/riscv/include/asm/hwprobe.h b/arch/riscv/include/asm/hwprobe.h > > > > > > index 630507dff5ea..e68496b4f8de 100644 > > > > > > --- a/arch/riscv/include/asm/hwprobe.h > > > > > > +++ b/arch/riscv/include/asm/hwprobe.h > > > > > > @@ -1,6 +1,6 @@ > > > > > > /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ > > > > > > /* > > > > > > - * Copyright 2023 Rivos, Inc > > > > > > + * Copyright 2023-2024 Rivos, Inc > > > > > > */ > > > > > > > > > > > > #ifndef _ASM_HWPROBE_H > > > > > > @@ -8,7 +8,7 @@ > > > > > > > > > > > > #include > > > > > > > > > > > > -#define RISCV_HWPROBE_MAX_KEY 6 > > > > > > +#define RISCV_HWPROBE_MAX_KEY 7 > > > > > > > > > > > > static inline bool riscv_hwprobe_key_is_valid(__s64 key) > > > > > > { > > > > > > diff --git a/arch/riscv/include/uapi/asm/hwprobe.h b/arch/riscv/include/uapi/asm/hwprobe.h > > > > > > index 9f2a8e3ff204..6614d3adfc75 100644 > > > > > > --- a/arch/riscv/include/uapi/asm/hwprobe.h > > > > > > +++ b/arch/riscv/include/uapi/asm/hwprobe.h > > > > > > @@ -1,6 +1,6 @@ > > > > > > /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ > > > > > > /* > > > > > > - * Copyright 2023 Rivos, Inc > > > > > > + * Copyright 2023-2024 Rivos, Inc > > > > > > */ > > > > > > > > > > > > #ifndef _UAPI_ASM_HWPROBE_H > > > > > > @@ -67,6 +67,14 @@ struct riscv_hwprobe { > > > > > > #define RISCV_HWPROBE_MISALIGNED_UNSUPPORTED (4 << 0) > > > > > > #define RISCV_HWPROBE_MISALIGNED_MASK (7 << 0) > > > > > > #define RISCV_HWPROBE_KEY_ZICBOZ_BLOCK_SIZE 6 > > > > > > +/* > > > > > > + * It is not possible for one CPU to have multiple vendor ids, so each vendor > > > > > > + * has its own vendor extension "namespace". The keys for each vendor starts > > > > > > + * at zero. > > > > > > + */ > > > > > > +#define RISCV_HWPROBE_KEY_VENDOR_EXT_0 7 > > > > > > + /* T-Head */ > > > > > > +#define RISCV_HWPROBE_VENDOR_EXT_XTHEADVECTOR (1 << 0) > > > > > > /* Increase RISCV_HWPROBE_MAX_KEY when adding items. */ > > > > > > > > > > > > /* Flags */ > > > > > > diff --git a/arch/riscv/kernel/sys_hwprobe.c b/arch/riscv/kernel/sys_hwprobe.c > > > > > > index e0a42c851511..365ce7380443 100644 > > > > > > --- a/arch/riscv/kernel/sys_hwprobe.c > > > > > > +++ b/arch/riscv/kernel/sys_hwprobe.c > > > > > > @@ -69,7 +69,8 @@ static void hwprobe_isa_ext0(struct riscv_hwprobe *pair, > > > > > > if (riscv_isa_extension_available(NULL, c)) > > > > > > pair->value |= RISCV_HWPROBE_IMA_C; > > > > > > > > > > > > - if (has_vector() && !riscv_has_vendor_extension_unlikely(RISCV_ISA_VENDOR_EXT_XTHEADVECTOR)) > > > > > > + if (has_vector() && > > > > > > + !__riscv_isa_vendor_extension_available(NULL, RISCV_ISA_VENDOR_EXT_XTHEADVECTOR)) > > > > > > pair->value |= RISCV_HWPROBE_IMA_V; > > > > > > > > > > > > /* > > > > > > @@ -112,7 +113,8 @@ static void hwprobe_isa_ext0(struct riscv_hwprobe *pair, > > > > > > EXT_KEY(ZACAS); > > > > > > EXT_KEY(ZICOND); > > > > > > > > > > > > - if (has_vector() && !riscv_has_vendor_extension_unlikely(RISCV_ISA_VENDOR_EXT_XTHEADVECTOR)) { > > > > > > + if (has_vector() && > > > > > > + !riscv_has_vendor_extension_unlikely(RISCV_ISA_VENDOR_EXT_XTHEADVECTOR)) { > > > > > > EXT_KEY(ZVBB); > > > > > > EXT_KEY(ZVBC); > > > > > > EXT_KEY(ZVKB); > > > > > > @@ -139,6 +141,55 @@ static void hwprobe_isa_ext0(struct riscv_hwprobe *pair, > > > > > > pair->value &= ~missing; > > > > > > } > > > > > > > > > > > > +static void hwprobe_isa_vendor_ext0(struct riscv_hwprobe *pair, > > > > > > + const struct cpumask *cpus) > > > > > > +{ > > > > > > + int cpu; > > > > > > + u64 missing = 0; > > > > > > + > > > > > > + pair->value = 0; > > > > > > + > > > > > > + struct riscv_hwprobe mvendorid = { > > > > > > + .key = RISCV_HWPROBE_KEY_MVENDORID, > > > > > > + .value = 0 > > > > > > + }; > > > > > > + > > > > > > + hwprobe_arch_id(&mvendorid, cpus); > > > > > > + > > > > > > + /* Set value to zero if CPUs in the set do not have the same vendor. */ > > > > > > + if (mvendorid.value == -1ULL) > > > > > > + return; > > > > > > + > > > > > > + /* > > > > > > + * Loop through and record vendor extensions that 1) anyone has, and > > > > > > + * 2) anyone doesn't have. > > > > > > + */ > > > > > > + for_each_cpu(cpu, cpus) { > > > > > > + struct riscv_isainfo *isavendorinfo = &hart_isa_vendor[cpu]; > > > > > > + > > > > > > +#define VENDOR_EXT_KEY(ext) \ > > > > > > + do { \ > > > > > > + if (__riscv_isa_vendor_extension_available(isavendorinfo->isa, \ > > > > > > + RISCV_ISA_VENDOR_EXT_##ext)) \ > > > > > > + pair->value |= RISCV_HWPROBE_VENDOR_EXT_##ext; \ > > > > > > + else \ > > > > > > + missing |= RISCV_HWPROBE_VENDOR_EXT_##ext; \ > > > > > > + } while (false) > > > > > > + > > > > > > + /* > > > > > > + * Only use VENDOR_EXT_KEY() for extensions which can be exposed to userspace, > > > > > > + * regardless of the kernel's configuration, as no other checks, besides > > > > > > + * presence in the hart_vendor_isa bitmap, are made. > > > > > > + */ > > > > > > + VENDOR_EXT_KEY(XTHEADVECTOR); > > > > > > + > > > > > > +#undef VENDOR_EXT_KEY > > > > > > > > > > Hey Charlie, > > > > > Thanks for writing this up! At the very least I think the > > > > > THEAD-specific stuff should probably end up in its own file, otherwise > > > > > it'll get chaotic with vendors clamoring to add stuff right here. > > > > > > > > Great idea! > > > > > > > > > What do you think about this approach: > > > > > * We leave RISCV_HWPROBE_MAX_KEY as the max key for the "generic > > > > > world", eg 6-ish > > > > > * We define that any key above 0x8000000000000000 is in the vendor > > > > > space, so the meaning of the keys depends first on the mvendorid > > > > > value. > > > > > * In the kernel code, each new vendor adds on to a global struct, > > > > > which might look something like: > > > > > struct hwprobe_vendor_space vendor_space[] = { > > > > > { > > > > > .mvendorid = VENDOR_THEAD, > > > > > .max_hwprobe_key = THEAD_MAX_HWPROBE_KEY, // currently > > > > > 1 or 0x8000000000000001 with what you've got. > > > > > .hwprobe_fn = thead_hwprobe > > > > > }, > > > > > ... > > > > > }; > > > > > > > > > > * A hwprobe_thead.c implements thead_hwprobe(), and is called > > > > > whenever the generic hwprobe encounters a key >=0x8000000000000000. > > > > > * Generic code for setting up the VDSO can then still call the > > > > > vendor-specific hwprobe_fn() repeatedly with an "all CPUs" mask from > > > > > the base to max_hwprobe_key and set up the cached tables in userspace. > > > > > * Since the VDSO data has limited space we may have to cap the number > > > > > of vendor keys we cache to be lower than max_hwprobe_key. Since the > > > > > data itself is not exposed to usermode we can raise this cap later if > > > > > needed. > > > > > > > > I know vendor extensions are kind of the "wild west" of riscv, but in > > > > spite of that I want to design a consistent API. The issue I had with > > > > having this "vendor space" for exposing vendor extensions was that this > > > > is something that is inherently the same for all vendors. I see a vendor > > > > space like this more applicable for something like > > > > "RISCV_HWPROBE_KEY_ZICBOZ_BLOCK_SIZE" where a vendor has a specific > > > > value they would like to expose. I do agree that having a vendor space > > > > is a good design choice, but I am not convinced that vendor extensions > > > > are the proper use-case. > > > > > > > > By having RISCV_HWPROBE_KEY_VENDOR_EXT_0 we can expose the vendor > > > > extensions in the same way that standard extensions are exposed, with a > > > > bitmask representing each extension. If these are instead in the vendor > > > > space, each vendor would probably be inclined to introduce a key like > > > > RISCV_HWPROBE_KEY_THEAD_EXT_0 that returns a bitmask of all of the thead > > > > vendor extensions. This duplicated effort is what I am trying to avoid. > > > > The alternative would be that vendors have a separate key for each > > > > vendor extension they would like to expose, but that is strictly less > > > > efficient than the existing bitmask probing. > > > > > > > > Do you think that having the vendor space is appropriate for vendor > > > > extensions given my concerns? > > > > > > I do see what you're going for. It's tidy for a bitmask to just let > > > anyone allocate the next bit, but leaves you with the same problem > > > when a vendor decides they want to expose an enum, or decides they > > > want to expose a bazillion things. I think a generalized version of > > > > This patch is strictly to expose if a vendor extension is supported, > > how does exposing enums factor in here? > > > > > the approach you've written would be: simply let vendors allocate keys > > > from the same global space we're already using. My worry was that it > > > > I am missing how my proposal suggests allowing vendors to allocate keys > > in a global space. > > > > > would turn into an expansive suburban sprawl of mostly dead bits, or > > > in the case of vendor-specific keys, full of "if (mvendor_id() != > > > MINE) return 0;". My hope with the vendored keyspace is it would keep > > > > An application will always need to check vendorid before calling hwprobe > > with a vendor-specific feature? If that hwprobe support is a key above > > 1<<63, then the application will need to pass that vendor-specific key > > and interpret the vendor-specific value. If that hwprobe support is what > > I have proposed here, then the user calls the standardized vendor > > extension hwprobe endpoint and then needs to interpret the result based > > on the vendor of the cpumask. In both cases they need to check the > > vendorid of the cpumask. In the test case I added I failed to check the > > vendorid but I should have had that. > > > > > the sprawl from polluting the general array of (hopefully valuable) > > > info with stuff that's likely to become less relevant as time passes. > > > It also lowers the bar a bit to make it easier for vendors to expose > > > bits, as they don't consume global space for everyone for all of time, > > > just themselves. > > > > The vendor keys are tied directly to the vendor. So as it grows we would > > have something like: > > > > #define RISCV_HWPROBE_KEY_VENDOR_EXT_0 7 > > /* T-Head */ > > #define RISCV_HWPROBE_VENDOR_EXT_XTHEADVECTOR (1 << 0) > > #define RISCV_HWPROBE_VENDOR_EXT_XTHEAD2 (2 << 0) > > #define RISCV_HWPROBE_VENDOR_EXT_XTHEAD3 (3 << 0) > > /* Vendor 2 */ > > #define RISCV_HWPROBE_VENDOR_EXT_XVENDOR1 (1 << 0) > > #define RISCV_HWPROBE_VENDOR_EXT_XVENDOR2 (2 << 0) > > /* Vendor 3 */ > > ... > > > > The keys overlap between vendors. To determine which extension a vendor > > supports, hwprobe gets data from hart_isa_vendor[cpu]. If the vendor is > > vendor 2, it is not possible for a vendor extension from vendor 3 to end > > up in there. Only the extensions from that vendor can be supported by > > that vendor's hardware. > > Gotcha. You're right I had misinterpreted this, thinking XTHEADVECTOR > was a valid bit regardless of mvendorid, and that other vendors would > have to choose new bits for their features and always return 0 for > XTHEADVECTOR. With your explanation, it seems like you're allocating > keys (in no particular order) whose meaning will change based on > mvendorid. > > I guess I'm still not convinced that saving each vendor from having to > add a VENDOR_EXT key in their keyspace is worth the sacrifice of > spraying the vendor-specific keys across the generic keyspace. Are > there advantages to having a single key whose category is similar but > whose bits are entirely vendor-defined? Maybe if I were userspace and > my feature could be satisfied equivalently by XTHEADVECTOR or > XRIVOSOTHERTHING, then I could do one hwprobe call instead of two? But > I don't think the vendors are going to be consistent enough for that > equivalency to ever prove useful. The advantages in my head of the > separate vendor keyspace are: > * Keeps the kernel code simple: if key >= (1 >> 63) > vendor_config->do_hwprobe(), rather than having all these little calls > in each specific switch case for vendor_config->do_vendor_ext0(), > vendor_config->do_vendor_ext1(), etc. The consistency between vendors is guaranteed in this scheme. They just add the extension to hwprobe_isa_vendor_ext0. The following code is the critical code from the kernel: for_each_cpu(cpu, cpus) { struct riscv_isainfo *isavendorinfo = &hart_isa_vendor[cpu]; #define VENDOR_EXT_KEY(ext) \ do { \ if (__riscv_isa_vendor_extension_available(isavendorinfo->isa, \ RISCV_ISA_VENDOR_EXT_##ext)) \ pair->value |= RISCV_HWPROBE_VENDOR_EXT_##ext; \ else \ missing |= RISCV_HWPROBE_VENDOR_EXT_##ext; \ } while (false) /* * Only use VENDOR_EXT_KEY() for extensions which can be exposed to userspace, * regardless of the kernel's configuration, as no other checks, besides * presence in the hart_vendor_isa bitmap, are made. */ VENDOR_EXT_KEY(XTHEADVECTOR); #undef VENDOR_EXT_KEY } /* Now turn off reporting features if any CPU is missing it. */ pair->value &= ~missing; The only thing a vendor will have to do is add an entry below VENDOR_EXT_KEY(XTHEADVECTOR) with their extension name (of course populating a value for the key as well). This existing code will then check if the extension is compatible with the hardware and appropriate populate the bitmask. All vendors get this functionality for "free" without needing to write the boilerplate code to expose vendor extensions through hwprobe. Now that I write this out I do see that I overlooked that this code needs to check the vendorid to ensure that the given extension is actually associated with the vendorid. This would make this more complicated but still seems like a low barrier to entry for a new vendor, as well as a standard API for getting all vendor extensions that are available on the platform regardless of which platform is being used. > * It extends easily into passing other forms of vendor hwprobe info > later, rather than solving only the case of risc-v extensions now, and > then having to do this all again for each additional category of > vendor data. This is a great point. I do agree that a different solution will be necessary for arbitrary vendor data and I am all for making something future compatible. At the same time I don't want to get trapped into something that is suboptimal for the sake of doing less work later. There is no chance of any compatibility once we leave the realm of riscv extensions, so once a vendor needs something exported I would be happy to write the code to support that. > * Similarly, it discourages future vendors from trying to squint and > find a way to make a vaguely generic sounding category for their own > hwprobe key which will ultimately only ever be filled in by them > anyway. What do you mean by this? There are no "categories" here, the vendor just writes out their extension VENDOR_EXT_KEY(XVENDOREXTENSION) and it gets shuttled to userspace on the hwprobe vendor call. - Charlie > > -Evan