On Fri, 13 May 2022 03:37:22 PDT (-0700), philipp.toms...@vrull.eu wrote:
On Fri, 13 May 2022 at 12:00, Christoph Müllner <cmuell...@gcc.gnu.org> wrote:
On Wed, May 11, 2022 at 2:02 AM Palmer Dabbelt <pal...@dabbelt.com> wrote:
>
> [Sorry for cross-posting to a bunch of lists, I figured it'd be best to
> have all the discussions in one thread.]
>
> We currently only support what is defined by official RISC-V
> specifications in the various GNU toolchain projects. There's certainly
> some grey areas there, but in general that means not taking code that
> relies on drafts or vendor defined extensions, even if that would result
> in higher performance or more featured systems for users.
>
> The original goal of these policies were to steer RISC-V implementers
> towards a common set of specifications, but over the last year or so
> it's become abundantly clear that this is causing more harm that good.
> All extant RISC-V systems rely on behaviors defined outside the official
> specifications, and while that's technically always been the case we've
> gotten to the point where trying to ignore that fact is impacting real
> users on real systems. There's been consistent feedback from users that
> we're not meeting their needs, which can clearly be seen in the many out
> of tree patch sets in common use.
>
> There's been a handful of discussions about this, but we've yet to have
> a proper discussion on the mailing lists. From the various discussions
> I've had it seems that folks are broadly in favor of supporting vendor
> extensions, but the devil's always in the details with this sort of
> thing so I thought it'd be best to write something up so we can have a
> concrete discussion.
>
> The idea is to start taking code that depends on vendor-defined behavior
> into the core GNU toolchain ports, as long as it meets the following
> criteria:
>
> * An ISA manual is available that can be redistributed/archived, defines
> the behaviors in question as one or more vendor-specific extensions,
> and is clearly versioned. The RISC-V foundation is setting various
> guidelines around how vendor-defined extensions and instructions
> should be named, we strongly suggest that vendors follow those
> conventions whenever possible (this is all new, though, so exactly
> what's necessary from vendor specifications will likely evolve as we
> learn).
> * There is a substantial user base that depends on the behavior in
> question, which probably means there is hardware in the wild that
> implements the extensions and users that require those extensions in
> order for that hardware to be useful for common applications. This is
> always going to be a grey area, but it's essentially the same spot
> everyone else is in.
I must take exception to the "There is a substantial user base" rule,
as this conflicts with the goal of avoiding fragmentation: the support
for vendor-defined extensions should ideally have landed in an
upstream release before the silicon is widely released. This would
see these extensions being sent upstream significantly before
widespread sampling (and sometimes around the time of the announcement
of a device on the roadmap). Simply put: I want everyone defining
vendor extensions to contribute to our mainline development efforts
instead of extending their own ancient forks.
I suspect that this rule is intended to ensure that experimental,
purely academic, or "closed" (as in: even if you have the silicon, it
will be so deeply embedded that no one can run their own software —
e.g. radio baseband controllers) extensions don't make the maintenance
work harder. If that is the case: could we use wording such as (a
native speaker might wordsmith something more accurate) "accessible to
run user-developed software" and "intended for a wider audience"?
I agree "substantial user base that depends on the behavior" is a bit
heavy-handed, as it essentially requires that the upstream software
shows up late enough that it's a headache for at least some users.
We've tried a bunch of times to come up with some sort of wording around
what it means to have hardware and everything's been full of holes,
which is why the language never gets written down.
I'm not personally all that worried about the experimental/academic
hardware as there's good precedent for pushing back on that. I'm also
not worried about embedded stuff: sure it's wacky, but a lot of vendors
end up doing the same things in subtly different ways so there'll be a
bunch of shared code. Plus, these vendors tend to err on the side of
secrecy anyway so I doubt it'll be a problem. I am worried about bad
actors leveraging any policy to make a bunch of noise, as that's a
pretty persistent problem in RISC-V land and it looks like things are
going to get worse before they get better. You can't really fake having
users, though, and in the end the whole point of the toolchain is to
make something useful for those users.
So I think I arrived at describing this in terms of a user base because
ultimately users is all I really care about. From talking to folks I
think that's a pretty common opinion, but someone else might have a more
nuanced way to state it so probably best to let others chime in here.
> * There is a mechanism for testing the code in question without direct
> access to hardware, which in practice means a QEMU port (or whatever
> simulator is relevant in the space and that folks use for testing) or
> some community commitment to long-term availability of the hardware
> for testing (something like the GCC compile farm, for example).
> * It is possible to produce binaries that are compatible with all
> upstream vendors' implementations. That means we'll need mechanisms
> to allow extensions from multiple vendors to be linked together and
> then probed at runtime. That's not to say that all binaries will be
> compatible, as users are always free to skip the compatibility code
> and there will be conflicting definitions of instruction encodings,
> but we can at least provide users with the option of compatibility.
We today have:
- Tag_RISCV_arch (see
https://github.com/riscv-non-isa/riscv-elf-psabi-doc/blob/master/riscv-elf.adoc#tag_riscv_arch-5-ntbssubarch)
- ifunc support
Admittedly, there's some loose ends in the end-to-end story (e.g.
Unified Discovery -> DTB -> glibc ifunc initialisation): we know just
too well how this plays out as there are optimised string/memory
functions (Zbb, Zicboz, cache-block-length, …) in our pipeline as well
as OpenSSL support for Zbb and Zbc. However, this is a known gap and
will be fully addressed in the future.
Is there something specific beyond this that you'd be looking for?
I might be forgetting something, but at least:
* Tag_RISCV_arch attributes are really fundamentally based around
compatible extension sets and just don't work when faced with the
realities of what RISC-V is today -- that's true even for standard
extensions, but it's going to be way worse with vendor extensions.
* Some scheme that allows relocations from multiple vendors to be linked
together. There's been some proposals here, but nothing that the
psABI folks seem to like (and also might not play well with dynamic
relocations).
* There's a lot between device tree and ifunc (not to mention ACPI).
Kito had a proposal for how to get this up to userspace, there's an
earlier version from Plumbers last year but there's a lot of work that
needs to be done to turn that into reality.
* Some use cases won't be met by ifunc, there's a whole lot of
techniques available and we at least want to allow those to function.
In the long run binary compatibility is going to be a losing battle,
but we can at least try to keep things sane so the folks in charge at
the foundation have a chance to understand what a hole we're in with
enough time left to fix it.
I know it's a lot more work to give users the option of compatibility,
but once that's gone it'll never come back so I'm willing to at least
try -- though of course that'll put a burden on everyone, even those
outside the RISC-V ports, so everyone needs to be on board.
Thanks,
Philipp.
>
> These are pretty loosely written on purpose, both because this is all
> new and because each project has its own set of contribution
> requirements so it's going to be all but impossible to have a single
> concrete set of rules that applies everywhere -- that's nothing specific
> to the vendor extensions (or even RISC-V), it's just life. Specifically
> a major goal here is to balance the needs of users, both in the short
> term (ie, getting new hardware to work) and the long term (ie, the long
> term stability of their software). We're not talking about taking code
> that can't be tested, hasn't been reviewed, isn't going to be supported
> long-term, or doesn't have a stable ABI; just dropping the specific
> requirement that a specification must be furnished by the RISC-V
> foundation in order to accept code.
>
> Nothing is decided yet, so happy to hear any thought folks have. This
> is certainly a very different development methodology than what we've
> done in the past and isn't something that should be entreated into
> lightly, so any comments are welcome.
I'd like to add two points to this topic and raise two questions.
1) Accepting vendor extensions = avoidance of fragmentation
RISC-V implementors are actively encouraged to implement their
own ISA extensions. To avoid fragmentation in the SW ecosystem
(every vendor maintains a fork of tools, distros and binaries) there
needs to be a principle acceptance to get vendor extension support
upstream.
I'd actually argue that accepting vendor extensions upstream will
massively increase fragmentation. We've already got a huge problem with
fragmentation as it stands, but only allowing standard extensions in
upstream software provides an incentive to work with other vendors on
the standards. Accepting vendor extensions essentially changes the
incentive to just ship first. That's a well understood way to do things
in HW land, but it's bad for everyone in the long run.
I've personally been in favor of supporting vendor extensions for quite
a while now so the folks who have stuck to that for longer might have
other reasons, but pushing vendors towards common specs was the main
reason I was in favor of this policy when we first set it. Maybe other
folks can share what changed their minds, though.
2) Leading upstream maintainers already agreed on supporting vendor-extensions
We have discussed the topic of vendor extensions in many forums last year.
This topic was also part of the discussions at the Linux Plumbers conference.
Further, there exists a place for documenting toolchain conventions of
the RISC-V
ecosystem ([1]), which everyone in the RISC-V ecosystem is aware about.
As a result of the discussions last year, a PR ([2]) has been crafted to clarify
the rules for upstreaming vendor extension support. These RISC-V
toolchain conventions recently added a section for vendor extensions
which covers important aspects like:
* naming schemes
* assembly mnemonic prefixes
* links to the documentation and version information
The PR even includes an explicit rule to clarify that maintainers decide on
upstream inclusion:
"""
Open source toolchain maintainer has final say on accepting vendor extension,
comply with this conventions isn't guarantee upstream will accept.
"""
I'm pretty sure that was added specifically as part of some discussions
around this topic, with the hope of making it clear that these policies
are decided upstream. That clearly didn't get the message across,
though, but we'd need to have this discussion either way so it doesn't
really matter that much.
And IMO it's way better to have a discussion regarding what we're going
to accept upstream ahead of time rather than just piecemeal as patches
go by, that way contributors to at least have an idea of what to expect.
A lot of people (maintainers and active developers) were notified
(including you)
and many also actively contributed to the PR. In the end there was an agreement
of how to document vendor extensions (as a requirement for upstreaming).
I believe that your set of rules is compatible with what is specified there.
I didn't comment on the PR in question because it's talking about naming
requirements for vendor extensions/instructions and I don't care about
those at all. Luckily some of the other toolchain folks do and have put
together those guidelines, that's specifically called out here as what
should be used. That said, there's a lot more to accepting vendor
extensions than a naming scheme for them.
Note however, that you could have mentioned them during the PRs review
process as you were notified when the PR was created.
We've talked about this many times and my position has been consistent:
decisions happen in the relevant forum, which for most open source
projects means the project's mailing list -- we're even generally pretty
careful to make sure things like conferences/IRC get reflected to the
mailing lists, as not everyone can participate real-time. Certainly
these decisions are not made at the RISC-V foundation.
I get you guys don't listen to me, that's fine, but just pretending
that these discussions never happened is pretty silly.
My questions are now the following:
* Where to document the requirements?
Most RISC-V upstream maintainers are accepting the riscv-toolchains-convention
repository. Where if not there should we document requirements for the tool's
conventions? Why not accept what has already been agreed upon?
Each project generally has its own documentation, that varies from
project to project but is frequently somewhere like doc/. There are
generally guidelines/requirements for contributions, that seems like a
reasonable place to put this sort of thing to me.
* Where to track the status?
You mentioned testing requirements (e.g. QEMU support).
I've created a wiki page to show the adoption status of all the
RISC-V extensions ([3])
last year. As the chair of the Toolchains SIG, I'm willing to create
and maintain one for
vendor extensions as well. This allows users to see which projects
support which
extensions upstream. However, a wiki is a joint effort. So
maintainers that merge
changes upstream need to update the page. Will you support this?
If not what is your proposal to track the status of the upstream
extension support?
Again that's really going to depend on the project, but there's
generally documentation of features somewhere like doc/ and high-level
new features are called out in the release notes: historically some sort
of NEWS file, but these days a lot of projects have another way of doing
things. We also have patch descriptions and such. To answer a question
like "does QEMU support Xvendorextension" I'd just read the code as
that's always both precise and accurate.
There are certainly lots of downstream collections of information about
various aspects of these projects and if you want to keep some on the
RISC-V wiki then that's fine with me. Happy to try and do a better job
on release notes and such, particularly if you've got specific issues
with them, but everyone else seems to get along tracking things that way
so I don't see any reason to do anything special for RISC-V.
BR
Christoph
[1]
https://github.com/riscv-non-isa/riscv-toolchain-conventions#conventions-for-vendor-extension
[2] https://github.com/riscv-non-isa/riscv-toolchain-conventions/pull/17
[3]
https://wiki.riscv.org/display/HOME/RISC-V+extension+and+feature+support+in+the+Open+Source+SW+Ecosystem