On Sat, Mar 23, 2024 at 2:35 AM Andrew Jones <ajones@xxxxxxxxxxxxxxxx> wrote: > > On Fri, Mar 22, 2024 at 10:13:48AM -0700, Deepak Gupta wrote: > > > > Yeah I lean towards using alternatives directly. > > > > > > One thing to note here: we can't use alternatives directly if the behavior needs > > > to be different on different harts (i.e. a subset of harts implement the envcfg > > > CSR). I think we need some policy about which ISA extensions are allowed to be > > > asymmetric across harts, or else we add too much complexity. > > > > As I've responded on the same thread . We are adding too much > > complexity by assuming > > that heterogeneous ISA exists (which it doesn't today). And even if it > > exists, it wouldn't work. > > Nobody wants to spend a lot of time figuring out which harts have > > which ISA and which > > packages are compiled with which ISA. Most of the end users do `sudo > > apt get install blah blah` > > And then expect it to just work. > > That will still work if the applications and libraries installed are > heterogeneous-platform aware, i.e. they do the figuring out which harts > have which extensions themselves. Applications/libraries should already > be probing for ISA extensions before using them. It's not a huge leap to > also check which harts support those extensions and then ensure affinity > is set appropriately. How ? It's a single image of a library that will be loaded in multiple address spaces. You expect all code pages to do COW for multiple address spaces or expect to have per task variables to choose different code paths in the library based on address space its running in ? On top of that, the library/application developer doesn't know how the end user is going to use them. End users (sysadmin, etc) just might use taskset to put affinity on tasks without being aware. I just don't see the motivation in an application developer/library developer to do something like this. No application/library developer has time for this. Putting a lot of burden on application developers is mostly a nuisance considering they don't have to think about these nuisance when they expect the same code to be deployed on non-riscv architectures. One good example of putting unnecessary burden on app/library developer is Intel SGX This is exactly the reason Intel SGX failed. Application developers don't have time to develop confidential compute version of the application for a specific CPU while on other CPUs carry a different version of application. But at the same time virtual machine confidential compute is better approach where all complicated decision making is delegated to operating system developer and application/library developers are empowered to only think about their stuff. > > > It doesn't work for other > > architectures and even when someone > > tried, they had to disable certain ISA features to make sure that all > > cores have the same ISA feature > > (search AVX12 Intel Alder Lake Disable). > > The RISC-V software ecosystem is still being developed. We have an > opportunity to drop assumptions made by other architectures. It doesn't mean that it should try to make the same mistakes which others have done. If there is a motivation and use case from end user perspective, please provide. Otherwise no point doing something which is just a science thought exercise and no concrete use case. Please note that these arguments are against Heterogeneous ISA on cores. >From power and efficiency perspective cores can still be heterogeneous. > > > As I said in a different reply, it's reasonable for Linux to not add the > complexity until a use case comes along that Linux would like to support, > but I think it would be premature for Linux to put a stake in the sand. > > So, how about we add code that confirms Zicboz is on all harts. If any > hart does not have it, then we complain loudly and disable it on all > the other harts. If it was just a hardware description bug, then it'll > get fixed. If there's actually a platform which doesn't have Zicboz > on all harts, then, when the issue is reported, we can decide to not > support it, support it with defconfig, or support it under a Kconfig > guard which must be enabled by the user. > > Thanks, > drew