[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <DM6PR04MB7081843419AFCECABA75AD74E7259@DM6PR04MB7081.namprd04.prod.outlook.com>
Date: Tue, 25 May 2021 08:01:01 +0000
From: Damien Le Moal <Damien.LeMoal@....com>
To: Greg KH <gregkh@...uxfoundation.org>
CC: Palmer Dabbelt <palmerdabbelt@...gle.com>,
"guoren@...nel.org" <guoren@...nel.org>,
Anup Patel <Anup.Patel@....com>,
Paul Walmsley <paul.walmsley@...ive.com>,
"aou@...s.berkeley.edu" <aou@...s.berkeley.edu>,
"pbonzini@...hat.com" <pbonzini@...hat.com>,
"corbet@....net" <corbet@....net>,
"graf@...zon.com" <graf@...zon.com>,
Atish Patra <Atish.Patra@....com>,
Alistair Francis <Alistair.Francis@....com>,
"anup@...infault.org" <anup@...infault.org>,
"kvm@...r.kernel.org" <kvm@...r.kernel.org>,
"kvm-riscv@...ts.infradead.org" <kvm-riscv@...ts.infradead.org>,
"linux-riscv@...ts.infradead.org" <linux-riscv@...ts.infradead.org>,
"linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-staging@...ts.linux.dev" <linux-staging@...ts.linux.dev>
Subject: Re: [PATCH v18 00/18] KVM RISC-V Support
On 2021/05/25 16:37, Greg KH wrote:
> On Mon, May 24, 2021 at 11:08:30PM +0000, Damien Le Moal wrote:
>> On 2021/05/25 7:57, Palmer Dabbelt wrote:
>>> On Mon, 24 May 2021 00:09:45 PDT (-0700), guoren@...nel.org wrote:
>>>> Thx Anup,
>>>>
>>>> Tested-by: Guo Ren <guoren@...nel.org> (Just on qemu-rv64)
>>>>
>>>> I'm following your KVM patchset and it's a great job for riscv
>>>> H-extension. I think hardware companies hope Linux KVM ready first
>>>> before the real chip. That means we can ensure the hardware could run
>>>> mainline linux.
>>>
>>> I understand that it would be wonderful for hardware vendors to have a
>>> guarantee that their hardware will be supported by the software
>>> ecosystem, but that's not what we're talking about here. Specifically,
>>> the proposal for this code is to track the latest draft extension which
>>> would specifically leave vendors who implement the current draft out in
>>> the cold was something to change. In practice that is the only way to
>>> move forward with any draft extension that doesn't have hardware
>>> available, as the software RISC-V implementations rapidly deprecate
>>> draft extensions and without a way to test our code it is destined to
>>> bit rot.
>>
>> To facilitate the process of implementing, and updating, against draft
>> specifications, I proposed to have arch/riscv/staging added. This would be the
>> place to put code based on drafts. Some simple rules can be put in place:
>> 1) The code and eventual ABI may change any time, no guarantees of backward
>> compatibility
>> 2) Once the specifications are frozen, the code is moved out of staging
>> somewhere else.
>> 3) The code may be removed any time if the specification proposal is dropped, or
>> any other valid reason (can't think of any other right now)
>> 4) ...
>>
>> This way, the implementation process would be greatly facilitated and
>> interactions between different extensions can be explored much more easily.
>>
>> Thoughts ?
>
> It will not work, unless you are mean and ruthless and people will get
> mad at you. I do not recommend it at all.
>
> Once code shows up in the kernel tree, and people rely on it, you now
> _have_ to support it. Users don't know the difference between "staging
> or not staging" at all. We have reported problems of staging media
> drivers breaking userspace apps and people having problems with that,
> despite the media developers trying to tell the world, "DO NOT RELY ON
> THESE!".
>
> And if this can't be done with tiny simple single drivers, you are going
> to have a world-of-hurt if you put arch/platform support into
> arch/riscv/. Once it's there, you will never be able to delete it,
> trust me.
All very good points. Thank you for sharing.
> If you REALLY wanted to do this, you could create drivers/staging/riscv/
> and try to make the following rules:
>
> - stand-alone code only, can not depend on ANYTHING outside of
> the directory that is not also used by other in-kernel code
> - does not expose any userspace apis
> - interacts only with existing in-kernel code.
> - can be deleted at any time, UNLESS someone is using it for
> functionality on a system
>
> But what use would that be? What could you put into there that anyone
> would be able to actually use?
Yes, you already mentioned this and we were not thinking about this solution.
drivers/staging really is for device drivers and does not apply to arch code.
> Remember the rule we made to our user community over 15 years ago:
>
> We will not break userspace functionality*
>
> With the caveat of "* - in a way that you notice".
>
> That means we can remove and change things that no one relies on
> anymore, as long as if someone pops up that does rely on it, we put it
> back.
>
> We do this because we never want anyone to be afraid to drop in a new
> kernel, because they know we did not break their existing hardware and
> userspace workloads. And if we did, we will work quickly to fix it.
Yes, I am well aware of this rule.
> So back to the original issue here, what is the problem that you are
> trying to solve? Why do you want to have in-kernel code for hardware
> that no one else can have access to, and that isn't part of a "finalized
> spec" that ends up touching other subsystems and is not self-contained?
For the case at hand, the only thing that would be outside of the staging area
would be the ABI definition, but that one depends only on the ratified riscv ISA
specs. So having it outside of staging would be OK. The idea of the arch staging
area is 2 fold:
1) facilitate the development work overall, both for Paolo and Anup on the KVM
part, but also others to check that their changes do not break KVM support.
2) Provide feedback to the specs groups that their concerns are moot. E.g. one
reason the hypervisor specs are being delayed is concerns with interrupt
handling. With a working implementation based on current ratified specs for
other components (e.g. interrupt controller), the hope is that the specs group
can speed up freezing of the specs.
But your points about how users will likely end up using this potentially
creates a lot more problems than we are solving...
> Why not take the energy here and go get that spec ratified so we aren't
> having this argument anymore? What needs to be done to make that happen
> and why hasn't anyone done that? There's nothing keeping kernel
> developers from working on spec groups, right?
We are participating and giving arguments for freezing the specs. This is
however not working as we would like. But that is a problem to be addressed with
RISCV International and the processes governing the operation of specification
groups. The linux mailing lists are not the right place to discuss this, so I
will not go into more details.
Thank you for the feedback.
Best regards.
--
Damien Le Moal
Western Digital Research
Powered by blists - more mailing lists