From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pj1-x102f.google.com (mail-pj1-x102f.google.com [IPv6:2607:f8b0:4864:20::102f]) by sourceware.org (Postfix) with ESMTPS id C19093858D32 for ; Sun, 15 May 2022 01:21:21 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org C19093858D32 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=dabbelt.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=dabbelt.com Received: by mail-pj1-x102f.google.com with SMTP id pt3-20020a17090b3d0300b001df448c8d79so14291pjb.5 for ; Sat, 14 May 2022 18:21:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dabbelt-com.20210112.gappssmtp.com; s=20210112; h=date:subject:in-reply-to:cc:from:to:message-id:mime-version :content-transfer-encoding; bh=xaKT/kvC2eobABtP7SnckHqZx37aqTu4ufyiO8/H+ZA=; b=PlY5NpEpPmg5AdR4S1ql+qEMtOuN5De8FnFYc/cIW47nwd3/o9KYFAq3axZk8SA3lH Z+WAfLQe1OSNa4jatBCrKeWBlKstlsXG5v7O4nvzVZLRYCDlTtE+PXChs59R2OR7X+sb JvgGUD4op01qJk0eL2rsuBSbS3fQd9g7a7GkwhtOKQ48Y7GnFOM6z/dDJ1P9wPZDp3l2 unFsQue7FUmVg6pf1IETlXseHjJdx9dxYSsZr4AWShJk9nTfwd5yPOhSjJb/1V64/R2K oAVvQEKTdX6EIqqzdHOzyDgaD+ye8eP2PZZioG8VrFotI/5U2xbdQ2W6CTKSj/YIyxMi LtbA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:subject:in-reply-to:cc:from:to:message-id :mime-version:content-transfer-encoding; bh=xaKT/kvC2eobABtP7SnckHqZx37aqTu4ufyiO8/H+ZA=; b=0OBQ3v/PMG5vy+eMD98u6/+W4DlNGkB/l+Iph6JahmLleK6qIVX3OGzkdM1VxwCX7K Tf2w65N+5jB7sI5jxnCztE0AxrMGeufPE+kJ0vnqjrfICpw6VRSDap0fYNzJ9HOtw2bT Z3Tfla2Td+P/eHhlXEr5UG1Qdl25YWHB3yY/0NteZN39XDVoktOToME8F7xe3egp3Sdq w4yUsgeitmj8cCipQb5TwZfOj1LIT7nUU63BUsqwrWjy858IKY7DpuDl8kYD3GJNlLz4 Wz40V455/NjKM4smWC/0giXYbFSNw5AcDeSBUXv41muL6avjU+06yVIN/KbQjvXH1U+2 d8Sg== X-Gm-Message-State: AOAM533Ea5kegdre0KSLe2et9u0LMArbn6NvRFKihfVE3foAGH0H7vG7 51TkIph2vRacrWBya+Q0gugF2g== X-Google-Smtp-Source: ABdhPJxJeNA6h3dOnEkj2VRwcmjOen++sJywi9w4WnylYLZNsgWEkqgtfVF9XPRD/em+fxecCAHcaw== X-Received: by 2002:a17:902:c94d:b0:15e:ba3e:c4d3 with SMTP id i13-20020a170902c94d00b0015eba3ec4d3mr11280724pla.121.1652577680429; Sat, 14 May 2022 18:21:20 -0700 (PDT) Received: from localhost (cpe-76-169-242-179.socal.res.rr.com. [76.169.242.179]) by smtp.gmail.com with ESMTPSA id n11-20020a170902e54b00b0015e8d4eb21asm4274310plf.100.2022.05.14.18.21.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 14 May 2022 18:21:19 -0700 (PDT) Date: Sat, 14 May 2022 18:21:19 -0700 (PDT) X-Google-Original-Date: Sat, 14 May 2022 18:19:05 PDT (-0700) Subject: Re: Supporting RISC-V Vendor Extensions in the GNU Toolchain In-Reply-To: CC: cmuellner@gcc.gnu.org, binutils@sourceware.org, gcc-patches@gcc.gnu.org, libc-alpha@sourceware.org, gdb-patches@sourceware.org, gfavor@ventanamicro.com From: Palmer Dabbelt To: philipp.tomsich@vrull.eu Message-ID: Mime-Version: 1.0 (MHng) Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 15 May 2022 01:21:27 -0000 On Fri, 13 May 2022 03:37:22 PDT (-0700), philipp.tomsich@vrull.eu wrote: > On Fri, 13 May 2022 at 12:00, Christoph Müllner wrote: >> >> On Wed, May 11, 2022 at 2:02 AM Palmer Dabbelt wrote: >> > >> > [Sorry for cross-posting to a bunch of lists, I figured it'd be best to >> > have all the discussions in one thread.] >> > >> > We currently only support what is defined by official RISC-V >> > specifications in the various GNU toolchain projects. There's certainly >> > some grey areas there, but in general that means not taking code that >> > relies on drafts or vendor defined extensions, even if that would result >> > in higher performance or more featured systems for users. >> > >> > The original goal of these policies were to steer RISC-V implementers >> > towards a common set of specifications, but over the last year or so >> > it's become abundantly clear that this is causing more harm that good. >> > All extant RISC-V systems rely on behaviors defined outside the official >> > specifications, and while that's technically always been the case we've >> > gotten to the point where trying to ignore that fact is impacting real >> > users on real systems. There's been consistent feedback from users that >> > we're not meeting their needs, which can clearly be seen in the many out >> > of tree patch sets in common use. >> > >> > There's been a handful of discussions about this, but we've yet to have >> > a proper discussion on the mailing lists. From the various discussions >> > I've had it seems that folks are broadly in favor of supporting vendor >> > extensions, but the devil's always in the details with this sort of >> > thing so I thought it'd be best to write something up so we can have a >> > concrete discussion. >> > >> > The idea is to start taking code that depends on vendor-defined behavior >> > into the core GNU toolchain ports, as long as it meets the following >> > criteria: >> > >> > * An ISA manual is available that can be redistributed/archived, defines >> > the behaviors in question as one or more vendor-specific extensions, >> > and is clearly versioned. The RISC-V foundation is setting various >> > guidelines around how vendor-defined extensions and instructions >> > should be named, we strongly suggest that vendors follow those >> > conventions whenever possible (this is all new, though, so exactly >> > what's necessary from vendor specifications will likely evolve as we >> > learn). >> > * There is a substantial user base that depends on the behavior in >> > question, which probably means there is hardware in the wild that >> > implements the extensions and users that require those extensions in >> > order for that hardware to be useful for common applications. This is >> > always going to be a grey area, but it's essentially the same spot >> > everyone else is in. > > I must take exception to the "There is a substantial user base" rule, > as this conflicts with the goal of avoiding fragmentation: the support > for vendor-defined extensions should ideally have landed in an > upstream release before the silicon is widely released. This would > see these extensions being sent upstream significantly before > widespread sampling (and sometimes around the time of the announcement > of a device on the roadmap). Simply put: I want everyone defining > vendor extensions to contribute to our mainline development efforts > instead of extending their own ancient forks. > > I suspect that this rule is intended to ensure that experimental, > purely academic, or "closed" (as in: even if you have the silicon, it > will be so deeply embedded that no one can run their own software — > e.g. radio baseband controllers) extensions don't make the maintenance > work harder. If that is the case: could we use wording such as (a > native speaker might wordsmith something more accurate) "accessible to > run user-developed software" and "intended for a wider audience"? I agree "substantial user base that depends on the behavior" is a bit heavy-handed, as it essentially requires that the upstream software shows up late enough that it's a headache for at least some users. We've tried a bunch of times to come up with some sort of wording around what it means to have hardware and everything's been full of holes, which is why the language never gets written down. I'm not personally all that worried about the experimental/academic hardware as there's good precedent for pushing back on that. I'm also not worried about embedded stuff: sure it's wacky, but a lot of vendors end up doing the same things in subtly different ways so there'll be a bunch of shared code. Plus, these vendors tend to err on the side of secrecy anyway so I doubt it'll be a problem. I am worried about bad actors leveraging any policy to make a bunch of noise, as that's a pretty persistent problem in RISC-V land and it looks like things are going to get worse before they get better. You can't really fake having users, though, and in the end the whole point of the toolchain is to make something useful for those users. So I think I arrived at describing this in terms of a user base because ultimately users is all I really care about. From talking to folks I think that's a pretty common opinion, but someone else might have a more nuanced way to state it so probably best to let others chime in here. >> > * There is a mechanism for testing the code in question without direct >> > access to hardware, which in practice means a QEMU port (or whatever >> > simulator is relevant in the space and that folks use for testing) or >> > some community commitment to long-term availability of the hardware >> > for testing (something like the GCC compile farm, for example). >> > * It is possible to produce binaries that are compatible with all >> > upstream vendors' implementations. That means we'll need mechanisms >> > to allow extensions from multiple vendors to be linked together and >> > then probed at runtime. That's not to say that all binaries will be >> > compatible, as users are always free to skip the compatibility code >> > and there will be conflicting definitions of instruction encodings, >> > but we can at least provide users with the option of compatibility. > > We today have: > - Tag_RISCV_arch (see > https://github.com/riscv-non-isa/riscv-elf-psabi-doc/blob/master/riscv-elf.adoc#tag_riscv_arch-5-ntbssubarch) > - ifunc support > > Admittedly, there's some loose ends in the end-to-end story (e.g. > Unified Discovery -> DTB -> glibc ifunc initialisation): we know just > too well how this plays out as there are optimised string/memory > functions (Zbb, Zicboz, cache-block-length, …) in our pipeline as well > as OpenSSL support for Zbb and Zbc. However, this is a known gap and > will be fully addressed in the future. > > Is there something specific beyond this that you'd be looking for? I might be forgetting something, but at least: * Tag_RISCV_arch attributes are really fundamentally based around compatible extension sets and just don't work when faced with the realities of what RISC-V is today -- that's true even for standard extensions, but it's going to be way worse with vendor extensions. * Some scheme that allows relocations from multiple vendors to be linked together. There's been some proposals here, but nothing that the psABI folks seem to like (and also might not play well with dynamic relocations). * There's a lot between device tree and ifunc (not to mention ACPI). Kito had a proposal for how to get this up to userspace, there's an earlier version from Plumbers last year but there's a lot of work that needs to be done to turn that into reality. * Some use cases won't be met by ifunc, there's a whole lot of techniques available and we at least want to allow those to function. In the long run binary compatibility is going to be a losing battle, but we can at least try to keep things sane so the folks in charge at the foundation have a chance to understand what a hole we're in with enough time left to fix it. I know it's a lot more work to give users the option of compatibility, but once that's gone it'll never come back so I'm willing to at least try -- though of course that'll put a burden on everyone, even those outside the RISC-V ports, so everyone needs to be on board. > Thanks, > Philipp. > >> > >> > These are pretty loosely written on purpose, both because this is all >> > new and because each project has its own set of contribution >> > requirements so it's going to be all but impossible to have a single >> > concrete set of rules that applies everywhere -- that's nothing specific >> > to the vendor extensions (or even RISC-V), it's just life. Specifically >> > a major goal here is to balance the needs of users, both in the short >> > term (ie, getting new hardware to work) and the long term (ie, the long >> > term stability of their software). We're not talking about taking code >> > that can't be tested, hasn't been reviewed, isn't going to be supported >> > long-term, or doesn't have a stable ABI; just dropping the specific >> > requirement that a specification must be furnished by the RISC-V >> > foundation in order to accept code. >> > >> > Nothing is decided yet, so happy to hear any thought folks have. This >> > is certainly a very different development methodology than what we've >> > done in the past and isn't something that should be entreated into >> > lightly, so any comments are welcome. >> >> I'd like to add two points to this topic and raise two questions. >> >> 1) Accepting vendor extensions = avoidance of fragmentation >> >> RISC-V implementors are actively encouraged to implement their >> own ISA extensions. To avoid fragmentation in the SW ecosystem >> (every vendor maintains a fork of tools, distros and binaries) there >> needs to be a principle acceptance to get vendor extension support >> upstream. I'd actually argue that accepting vendor extensions upstream will massively increase fragmentation. We've already got a huge problem with fragmentation as it stands, but only allowing standard extensions in upstream software provides an incentive to work with other vendors on the standards. Accepting vendor extensions essentially changes the incentive to just ship first. That's a well understood way to do things in HW land, but it's bad for everyone in the long run. I've personally been in favor of supporting vendor extensions for quite a while now so the folks who have stuck to that for longer might have other reasons, but pushing vendors towards common specs was the main reason I was in favor of this policy when we first set it. Maybe other folks can share what changed their minds, though. >> 2) Leading upstream maintainers already agreed on supporting vendor-extensions >> >> We have discussed the topic of vendor extensions in many forums last year. >> This topic was also part of the discussions at the Linux Plumbers conference. >> Further, there exists a place for documenting toolchain conventions of >> the RISC-V >> ecosystem ([1]), which everyone in the RISC-V ecosystem is aware about. >> >> As a result of the discussions last year, a PR ([2]) has been crafted to clarify >> the rules for upstreaming vendor extension support. These RISC-V >> toolchain conventions recently added a section for vendor extensions >> which covers important aspects like: >> >> * naming schemes >> * assembly mnemonic prefixes >> * links to the documentation and version information >> >> The PR even includes an explicit rule to clarify that maintainers decide on >> upstream inclusion: >> """ >> Open source toolchain maintainer has final say on accepting vendor extension, >> comply with this conventions isn't guarantee upstream will accept. >> """ I'm pretty sure that was added specifically as part of some discussions around this topic, with the hope of making it clear that these policies are decided upstream. That clearly didn't get the message across, though, but we'd need to have this discussion either way so it doesn't really matter that much. And IMO it's way better to have a discussion regarding what we're going to accept upstream ahead of time rather than just piecemeal as patches go by, that way contributors to at least have an idea of what to expect. >> A lot of people (maintainers and active developers) were notified >> (including you) >> and many also actively contributed to the PR. In the end there was an agreement >> of how to document vendor extensions (as a requirement for upstreaming). >> >> I believe that your set of rules is compatible with what is specified there. I didn't comment on the PR in question because it's talking about naming requirements for vendor extensions/instructions and I don't care about those at all. Luckily some of the other toolchain folks do and have put together those guidelines, that's specifically called out here as what should be used. That said, there's a lot more to accepting vendor extensions than a naming scheme for them. >> Note however, that you could have mentioned them during the PRs review >> process as you were notified when the PR was created. We've talked about this many times and my position has been consistent: decisions happen in the relevant forum, which for most open source projects means the project's mailing list -- we're even generally pretty careful to make sure things like conferences/IRC get reflected to the mailing lists, as not everyone can participate real-time. Certainly these decisions are not made at the RISC-V foundation. I get you guys don't listen to me, that's fine, but just pretending that these discussions never happened is pretty silly. >> My questions are now the following: >> >> * Where to document the requirements? >> >> Most RISC-V upstream maintainers are accepting the riscv-toolchains-convention >> repository. Where if not there should we document requirements for the tool's >> conventions? Why not accept what has already been agreed upon? Each project generally has its own documentation, that varies from project to project but is frequently somewhere like doc/. There are generally guidelines/requirements for contributions, that seems like a reasonable place to put this sort of thing to me. >> * Where to track the status? >> >> You mentioned testing requirements (e.g. QEMU support). >> I've created a wiki page to show the adoption status of all the >> RISC-V extensions ([3]) >> last year. As the chair of the Toolchains SIG, I'm willing to create >> and maintain one for >> vendor extensions as well. This allows users to see which projects >> support which >> extensions upstream. However, a wiki is a joint effort. So >> maintainers that merge >> changes upstream need to update the page. Will you support this? >> If not what is your proposal to track the status of the upstream >> extension support? Again that's really going to depend on the project, but there's generally documentation of features somewhere like doc/ and high-level new features are called out in the release notes: historically some sort of NEWS file, but these days a lot of projects have another way of doing things. We also have patch descriptions and such. To answer a question like "does QEMU support Xvendorextension" I'd just read the code as that's always both precise and accurate. There are certainly lots of downstream collections of information about various aspects of these projects and if you want to keep some on the RISC-V wiki then that's fine with me. Happy to try and do a better job on release notes and such, particularly if you've got specific issues with them, but everyone else seems to get along tracking things that way so I don't see any reason to do anything special for RISC-V. >> >> BR >> Christoph >> >> [1] https://github.com/riscv-non-isa/riscv-toolchain-conventions#conventions-for-vendor-extension >> [2] https://github.com/riscv-non-isa/riscv-toolchain-conventions/pull/17 >> [3] https://wiki.riscv.org/display/HOME/RISC-V+extension+and+feature+support+in+the+Open+Source+SW+Ecosystem