On Tue, Dec 12, 2023 at 3:36 PM David Vernet <void@xxxxxxxxxxxxx> wrote: > > > It only supports atomic_add and no other atomics. > > Ahh, I misunderstood when I discussed with Kuba. I guess they supported > only atomic_add because packets can be delivered out of order. Not sure why it has anything to do with packets. > So fair > enough on that point, but I still stand by the claim though that if you > need one type of atomic, it's reasonable to infer that you may need all > of them. I would be curious to hear how much work it would have been to > add support for the others. If there was an atomic conformance group, > maybe they would have. The netronome wasn't trying to offload this or that insn to be in compliance. Together, netronome and bpf folks decided to focus on a set of real XDP applications and try to offload as much as practical. At that time there were -mcpu=v1 and v2 insn sets only and offloading wasn't really working well. alu32 in llvm, verifier and nfp was added to make offload practical. Eventually it became -mcpu=v3. So compliance with any future group (basic, atomic, etc) in ISA cannot be evaluated in isolation, because nfp is not compliant with -mcpu=v4 and not compliant with -mcpu=v1, but works well with -mcpu=v3 while v3 is an extension of v1 and v2. Which is nonsensical from standard compliance pov. netronome offload is a success because it demonstrated how real production XDP applications can run in a NIC at speeds that traditional CPUs cannot dream of. It's a success despite the complexity and ugliness of BPF ISA. It's working because practical applications compiled with -mcpu=v3 produce "compliant enough" bpf code. > Well, maybe not for Netronome, or maybe not even for any vendor (though > we have no way of knowing that yet), but what about for other contexts > like Windows / Linux cross-platform compat? bpf on windows started similar to netronome. The goal was to demonstrate real cilium progs running on windows. And it was done. Since windows is a software there was no need to add or remove anything from ISA, but due to licensing the prevail verifier had to be used which doesn't support a whole bunch of things. This software deficiencies of non-linux verifier shouldn't be dictating grouping of the insns in the standard. If linux can do it, windows should be able to do it just as well. So I see no problem saying that bpf on windows will be non-compliant until they support all of -mcpu=v4 insns. It's a software project with a deterministic timeline. The standard should focus on compatibility between HW-ish offloads where no amount of software can add support for all of -mcpu=v4. And here I believe compliance with "basic" is not practical. When nvme HW architects will get to implement "basic" ISA they might realize that it has too much. Producing "conformance groups" without HW folks thinking through the implementation is not going to be a success. I worry that it will have the opposite effect. We'll have a standard with basic, atomic, etc. Then folks will deliver this standard on the desk of HW architects. They will give it a try and will reject the idea of implementing BPF in HW, because not implementing "basic" would mean that this vendor is not in compliance which means no business. Hence the standard shouldn't overfocus on compliance and groups. Just legacy and the rest will do for nvme. legacy means "don't bother looking at those". the rest means "pls implement these insns because they are useful, their semantics and encoding is standardized, but pick what makes sense for your use case and your HW". And to make such HW offload a success we'd need to work together. compiler, kernel, run-time, hw folks. "Here is a standard. Go implement it" won't work. -- Bpf mailing list Bpf@xxxxxxxx https://www.ietf.org/mailman/listinfo/bpf