Re: [PATCH glibc 5/9] glibc: Perform rseq(2) registration at C startup and thread creation (v17)
From: Mathieu Desnoyers
Date: Mon Apr 27 2020 - 13:26:21 EST
----- On Apr 27, 2020, at 12:54 PM, Florian Weimer fw@xxxxxxxxxxxxx wrote:
> * Mathieu Desnoyers:
>
>>>> +#include <sys/syscall.h>
>>>> +#include <stdint.h>
>>>> +#include <kernel-features.h>
>>>> +#include <sys/rseq.h>
>>>> +
>>>> +__thread struct rseq __rseq_abi = {
>>>> + .cpu_id = RSEQ_CPU_ID_UNINITIALIZED,
>>>> +};
>>>
>>> { should go onto its own line.
>>
>> OK
>>
>>> I'd also add attribute_tls_model_ie,
>>> also it's implied by the declaration in the header.
>>
>> This contradicts feedback I received from Szabolcs Nagy in September 2019:
>>
>> https://public-inbox.org/libc-alpha/c58d4d6e-f22a-f5d9-e23a-5bd72cec1a86@xxxxxxx/
>>
>> "note that libpthread.so is built with -ftls-model=initial-exec
>>
>> (and if it wasn't then you'd want to put the attribute on the
>> declaration in the internal header file, not on the definition,
>> so the actual tls accesses generate the right code)"
>>
>> In the context of his feedback, __rseq_abi was defined within
>> nptl/pthread_create.c.
>> It is now defined in sysdeps/unix/sysv/linux/rseq-sym.c, which is built into the
>> csu which AFAIU ends up in libc.so. His comment still applies though, because
>> libc.so is also built with -ftls-model=initial-exec.
>>
>> So should I apply the "initial-exec" TLS model only to the __rseq_abi
>> declaration, or is it preferred to apply it to both the declaration
>> and the definition ?
>
> I do not have a strong preference here. Technically, the declaration
> in the header file should be enough.
OK, so I'll just keep the attribute on the declaration in the header.
>
>>>> diff --git a/sysdeps/unix/sysv/linux/sys/rseq.h
>>>> b/sysdeps/unix/sysv/linux/sys/rseq.h
>>>> new file mode 100644
>>>> index 0000000000..503dce4cac
>>>> --- /dev/null
>>>> +++ b/sysdeps/unix/sysv/linux/sys/rseq.h
>>>> @@ -0,0 +1,186 @@
>>>
>>> I think there is some value in making this header compatible with
>>> inclusion from the assembler (including constants for the relevant
>>> struct offsets), but that can be a later change.
>>
>> Agreed. By "later", do you mean before merging the patch, between
>> merge of the patch and next glibc release, or for a subsequent glibc
>> release ?
>
> It can happen some time after merging the patch, preferably for this
> release. But I don't think it's release-critical.
OK
>
>>>> +/* struct rseq is aligned on 4 * 8 bytes to ensure it is always
>>>> + contained within a single cache-line.
>>>> +
>>>> + A single struct rseq per thread is allowed. */
>>>> +struct rseq
>>>> + {
>>>> + /* Restartable sequences cpu_id_start field. Updated by the
>>>> + kernel. Read by user-space with single-copy atomicity
>>>> + semantics. This field should only be read by the thread which
>>>> + registered this data structure. Aligned on 32-bit. Always
>>>
>>> What does âAligned on 32-bitâ mean in this context? Do you mean to
>>> reference 32-*byte* alignment here?
>>
>> No. I really mean 32-bit (4-byte). Being aligned on 32-byte guarantees that
>> this field is aligned at least on 4-byte. This is required by single-copy
>> atomicity semantics.
>>
>> Should I update this comment to state "Aligned on 4-byte" instead ?
>
> I think this is implied by all Linux ABIs. And the explicit alignment
> specification for struct rseq makes the alignment 32 bytes.
Unless a structure ends up being packed, which is of course not the case
here.
I would prefer to keep the comment about 32-bit alignment requirement on
the specific fields, because the motivation for alignment requirement is
much more strict for fields (correctness) than the motivation for alignment
of the structure (performance).
>
>>>> + /* Restartable sequences rseq_cs field.
>>>> +
>>>> + Contains NULL when no critical section is active for the current
>>>> + thread, or holds a pointer to the currently active struct rseq_cs.
>>>> +
>>>> + Updated by user-space, which sets the address of the currently
>>>> + active rseq_cs at the beginning of assembly instruction sequence
>>>> + block, and set to NULL by the kernel when it restarts an assembly
>>>> + instruction sequence block, as well as when the kernel detects that
>>>> + it is preempting or delivering a signal outside of the range
>>>> + targeted by the rseq_cs. Also needs to be set to NULL by user-space
>>>> + before reclaiming memory that contains the targeted struct rseq_cs.
>>>> +
>>>> + Read and set by the kernel. Set by user-space with single-copy
>>>> + atomicity semantics. This field should only be updated by the
>>>> + thread which registered this data structure. Aligned on 64-bit. */
>>>> + union {
>>>> + uint64_t ptr64;
>>>> +#ifdef __LP64__
>>>> + uint64_t ptr;
>>>> +#else
>>>> + struct {
>>>> +#if (defined(__BYTE_ORDER) && (__BYTE_ORDER == __BIG_ENDIAN)) ||
>>>> defined(__BIG_ENDIAN)
>>>> + uint32_t padding; /* Initialized to zero. */
>>>> + uint32_t ptr32;
>>>> +#else /* LITTLE */
>>>> + uint32_t ptr32;
>>>> + uint32_t padding; /* Initialized to zero. */
>>>> +#endif /* ENDIAN */
>>>> + } ptr;
>>>> +#endif
>>>> + } rseq_cs;
>>>
>>> Are these conditionals correct for x32?
>>
>> Let's see. With x86 gcc:
>>
>> -m64: (__x86_64__ && __LP64__)
>> -m32: (__i386__)
>> -mx32: (__x86_64__ && __ILP32__)
>>
>> So with "#ifdef __LP64__" we specifically target 64-bit pointers. The rest
>> falls into the "else" case, which expects 32-bit pointers. Considering that
>> x32 has 32-bit pointers, I don't see any issue here.
>
> Does the kernel have a separate 32-bit entry point for rseq on x32?
> If not, it will expect the 64-bit struct layout.
No, there is a single entry point into rseq covering all of 32-bit, 64-bit and x32.
We achieve this by ensuring the layout of the linux/rseq.h structures
uses the union representation for pointers. Therefore, the kernel does not care
whether it reads a pointer from a 32-bit or 64-bit process. This is becoming the
preferred way to design Linux kernel ABIs nowadays.
>
>> We don't mind that user-space uses that pointer, but we never want the kernel
>> to touch that pointer rather than the 32/64-bit-aware fields. One possibility
>> would be to do:
>>
>> union
>> {
>> uint64_t ptr64;
>> #ifdef __LP64__
>> uint64_t ptr;
>> #else
>> struct
>> {
>> #if (defined (__BYTE_ORDER) && (__BYTE_ORDER == __BIG_ENDIAN)) || defined
>> (__BIG_ENDIAN)
>> uint32_t padding; /* Initialized to zero. */
>> uint32_t ptr32;
>> #else /* LITTLE */
>> uint32_t ptr32;
>> uint32_t padding; /* Initialized to zero. */
>> #endif /* ENDIAN */
>> } ptr;
>> #endif
>>
>> #ifndef __KERNEL__
>> const struct rseq_cs *uptr;
>> #endif
>> } rseq_cs;
>>
>> in the union, so only user-space can see that field. Thoughts ?
>
> I think this depends on where the x32 question lands.
x32 should not be an issue as explained above, so I'm very open to
add this "uptr" for user-space only.
Thanks,
Mathieu
--
Mathieu Desnoyers
EfficiOS Inc.
http://www.efficios.com