[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v5 00/12] SVE feature for arm guests


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Wed, 19 Apr 2023 08:20:35 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tnIlT5mr9sMgHW/Ip/R/sIvrNzIy+ngtAL3XaHMdcGA=; b=XN/EdtSY1Lj0o9MVurYYh3zxRux/G0xHGn259EhNWQySsOteYWFunhNA7A8UAcghyj1nE+Fq5IQfGdf5dLTFVIK+28PZ29oeRFUu4byFn14HiNkCpEmFBMRhPHmgVcmSZBSFOLcAB13EE+325B0waSwYtusV9kDuduCphl+Z2NGURKAPtyFMPjNjJOYKtrBix34bGFuEe6Vajdh+qX7YuHMILWPLEuAuz0srpQ3WeesYhVairkcdg4IDrCv/I6PzdaOCsBrFYwmdqwDH6PKXnj6u6ex3cT1MlFxCSowEoLqo1vZkO/GiK6jEtyBa4NThsTc4a0/jLItRR6pp9qB6eA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ek8v7+Sl0YOlOLRAy1aNwA1FoxJbyLzRFCFmOcwiHLjpbps0uzvUSFVIq5qaao29WJsxKNSwck1GkmfL9rM0fiqzv7xkM7+cle5H/94sDiKgOnAKcp/fyLrTbMn48XNR+Lq2JLTVZDQKvqD8vcZPP5IP5WKix5mTTENRL3oSDHZsne5Tbssu1q1q77uDkeYOtjLH2WJwgYtI8c7ZFEPQ44bcrF/iEyqjLq+qQ8iCD/0jen6G/5uGhlehO398/IW3vfdEMWZ/uXeNBukKxBuuD4/YsvK57mS9qYQcxlLFCMGVQl2WzvKHsqgpKB195UfrJ6BRh/Erc7gtoitI3vH6uw==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Julien Grall <julien@xxxxxxx>, Luca Fancellu <Luca.Fancellu@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Chen <Wei.Chen@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Nick Rosbrook <rosbrookn@xxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Christian Lindig <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>, Community Manager <community.manager@xxxxxxxxxxxxxx>
  • Delivery-date: Wed, 19 Apr 2023 08:20:58 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHZbSQqKlfgrZX3xkqta7+H+1gq3K8xFMoAgAAUHYCAAQ0QAIAAEaQAgAAGAICAAAewAA==
  • Thread-topic: [PATCH v5 00/12] SVE feature for arm guests

Hi Jan,

> On 19 Apr 2023, at 09:52, Jan Beulich <jbeulich@xxxxxxxx> wrote:
> 
> On 19.04.2023 09:31, Bertrand Marquis wrote:
>> Hi Jan,
>> 
>>> On 19 Apr 2023, at 08:28, Jan Beulich <jbeulich@xxxxxxxx> wrote:
>>> 
>>> On 18.04.2023 16:25, Julien Grall wrote:
>>>> On 18/04/2023 14:13, Bertrand Marquis wrote:
>>>>> On this serie I would like to open a discussion on how to handle the 
>>>>> vector size
>>>>> and the corresponding command line / configuration / device tree 
>>>>> parameters.
>>>>> 
>>>>> In general the user must either give a vector size it wants or has a 
>>>>> solution to
>>>>> just request the maximum supported size.
>>>>> 
>>>>> In the current implementation if a size bigger than the supported one is 
>>>>> provided:
>>>>> - we silently disable SVE for dom0
>>>>> - we silently disable SVE for dom0less
>>>>> - we do not create a guest when done through tools
>>>>> 
>>>>> This is not completely coherent and i think we should aim for a coherent 
>>>>> behaviour
>>>>> unless we have arguments for this status.
>>>> 
>>>> +1.
>>>> 
>>>>> Is there any good reason to silently disable for Dom0 and dom0less only ?
>>>>> 
>>>>> I see some possible solutions here:
>>>>> 
>>>>> - modify parameter behaviour to use the supported size if parameter is 
>>>>> bigger than
>>>>> it. This would at least keep SVE enabled if a VM depends on it and could 
>>>>> simplify
>>>>> some of the handling by using 2048 to use the maximum supported size.
>>>> 
>>>> My concern with this approach and the third one is the user may take 
>>>> some time to realize the problem in the xl.cfg. So...
>>>> 
>>>>> 
>>>>> - coherently stop if the parameter value is not supported (including if 
>>>>> sve is
>>>>> not supported)
>>>> 
>>>> ... this is my preferred approach because it would be clear that the 
>>>> value passed to Xen is bogus.
>>> 
>>> I did say earlier on that this comes with its own downside of preventing
>>> boot to complete for no real reason. It's all Arm code, so you're fine
>>> to ignore me, but in similar situations elsewhere (sorry, don't recall a
>>> concrete example off the top of my head) we've aimed to allow the system
>>> to boot, for the admin to then take corrective action if/as needed.
>> 
>> But a guest depending on the feature will just crash later when booting.
>> This is making the assumption that guests are all able to properly adapt
>> to different hardware possibilities. 
>> This might be the case when you have a full Linux but if you consider an
>> embedded use case, if something is activated due to command line parameters
>> or configuration ones, it should not be expected that those are ignored I 
>> think.
>> 
>> There are definitely 2 different needs here, maybe we need to have something
>> like a "strict" switch to allow both use cases ?
> 
> Possibly. Yet along what I've said before - would you then also mean that to
> fail boot upon encountering entirely unknown command line options?

I think this should depend:
- completely unknow: we can ignore
- not supported (sve while sve is not supported by the platform or Xen): we 
should not ignore

I agree that one could use custom command line arguments for lots of reasons
(in linux you can do that and get them back from /proc for example) but silently
ignoring a parameter that is known to Xen i do not think we should do.

I think in most cases, one could think its system is correctly running but 
could get
problems later (or in some cases even not have any) so having a clear error at 
the
beginning is a lot more clear.

Bertrand




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.