[PATCH -next v19 23/24] riscv: Enable Vector code to be built
Palmer Dabbelt
palmer at dabbelt.com
Tue May 9 13:59:33 PDT 2023
On Tue, 09 May 2023 09:53:17 PDT (-0700), Conor Dooley wrote:
> On Wed, May 10, 2023 at 12:04:12AM +0800, Andy Chiu wrote:
>> > > +config RISCV_V_DISABLE
>> > > + bool "Disable userspace Vector by default"
>> > > + depends on RISCV_ISA_V
>> > > + default n
>> > > + help
>> > > + Say Y here if you want to disable default enablement state of Vector
>> > > + in u-mode. This way userspace has to make explicit prctl() call to
>> > > + enable Vector, or enable it via sysctl interface.
>> >
>> > If we are worried about breaking userspace, why is the default for this
>> > option not y? Or further,
>> >
>> > config RISCV_ISA_V_DEFAULT_ENABLE
>> > bool "Enable userspace Vector by default"
>> > depends on RISCV_ISA_V
>> > help
>> > Say Y here to allow use of Vector in userspace by default.
>> > Otherwise, userspace has to make an explicit prctl() call to
>> > enable Vector, or enable it via the sysctl interface.
>> >
>> > If you don't know what to do here, say N.
>> >
>>
>> Yes, expressing the option, where Y means "on", is more direct. But I
>> have a little concern if we make the default as "off". Yes, we create
>> this option in the worries of breaking userspace. But given that the
>> break case might be rare, is it worth making userspace Vector harder
>> to use by doing this? I assume in an ideal world that nothing would
>> break and programs could just use V without bothering with prctl(), or
>> sysctl. But on the other hand, to make a program robust enough, we
>> must check the status with the prctl() anyway. So I have no answer
>> here.
>
> FWIW my logic was that those who know what they are doing can turn it on
> & keep the pieces. I would expect distros and all that lark to be able to
> make an educated decision here. But those that do not know what they are
> doing should be given the "safe" option by default.
> CONFIG_RISCV_ISA_V is default y, so will be enabled for those upgrading
> their kernel. With your patch they would also get vector enabled by
> default. The chance of a breakage might be small, but it seems easy to
> avoid. I dunno...
It's really more of a distro/user question than anything else, I'm not
really sure there's a right answer. I'd lean towards turning V on by
default, though: the defconfigs are meant for kernel hackers, so
defaulting to the option that's more likely to break something seems
like the way to go -- that way we see any possible breakages early and
can go figure them out.
Depending on the risk tolerance of their users, distributions might want
to turn this off by default. I posted on sw-dev, which is generally the
best way to find the distro folks.
More information about the kvm-riscv
mailing list