public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: "Björn Töpel" <bjorn@kernel.org>
To: Andy Chiu <andy.chiu@sifive.com>,
	linux-riscv@lists.infradead.org, palmer@dabbelt.com,
	anup@brainfault.org, atishp@atishpatra.org,
	kvm-riscv@lists.infradead.org, kvm@vger.kernel.org
Cc: vineetg@rivosinc.com, greentime.hu@sifive.com,
	guoren@linux.alibaba.com, Andy Chiu <andy.chiu@sifive.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Albert Ou <aou@eecs.berkeley.edu>,
	Nathan Chancellor <nathan@kernel.org>,
	Nick Desaulniers <ndesaulniers@google.com>,
	Tom Rix <trix@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	GNU C Library <libc-alpha@sourceware.org>,
	Andrew Waterman <andrew@sifive.com>
Subject: Re: [PATCH -next v18 00/20] riscv: Add vector ISA support
Date: Wed, 19 Apr 2023 16:54:23 +0200	[thread overview]
Message-ID: <87leinq5wg.fsf@all.your.base.are.belong.to.us> (raw)
In-Reply-To: <87cz4048rp.fsf@all.your.base.are.belong.to.us>

Björn Töpel <bjorn@kernel.org> writes:

> Andy Chiu <andy.chiu@sifive.com> writes:
>
>> This patchset is implemented based on vector 1.0 spec to add vector support
>> in riscv Linux kernel. There are some assumptions for this implementations.
>>
>> 1. We assume all harts has the same ISA in the system.
>> 2. We disable vector in both kernel and user space [1] by default. Only
>>    enable an user's vector after an illegal instruction trap where it
>>    actually starts executing vector (the first-use trap [2]).
>> 3. We detect "riscv,isa" to determine whether vector is support or not.
>>
>> We defined a new structure __riscv_v_ext_state in struct thread_struct to
>> save/restore the vector related registers. It is used for both kernel space
>> and user space.
>>  - In kernel space, the datap pointer in __riscv_v_ext_state will be
>>    allocated to save vector registers.
>>  - In user space,
>> 	- In signal handler of user space, the structure is placed
>> 	  right after __riscv_ctx_hdr, which is embedded in fp reserved
>> 	  aera. This is required to avoid ABI break [2]. And datap points
>> 	  to the end of __riscv_v_ext_state.
>> 	- In ptrace, the data will be put in ubuf in which we use
>> 	  riscv_vr_get()/riscv_vr_set() to get or set the
>> 	  __riscv_v_ext_state data structure from/to it, datap pointer
>> 	  would be zeroed and vector registers will be copied to the
>> 	  address right after the __riscv_v_ext_state structure in ubuf.
>>
>> This patchset is rebased to v6.3-rc1 and it is tested by running several
>> vector programs simultaneously. It delivers signals correctly in a test
>> where we can see a valid ucontext_t in a signal handler, and a correct V
>> context returing back from it. And the ptrace interface is tested by
>> PTRACE_{GET,SET}REGSET. Lastly, KVM is tested by running above tests in
>> a guest using the same kernel image. All tests are done on an rv64gcv
>> virt QEMU.
>>
>> Note: please apply the patch at [4] due to a regression introduced by
>> commit 596ff4a09b89 ("cpumask: re-introduce constant-sized cpumask
>> optimizations") before testing the series.
>>
>> Source tree:
>> https://github.com/sifive/riscv-linux/tree/riscv/for-next/vector-v18
>
> After some offlist discussions, we might have a identified a
> potential libc->application ABI break.
>
> Given an application that does custom task scheduling via a signal
> handler. The application binary is not vector aware, but libc is. Libc
> is using vector registers for memcpy. It's an "old application, new
> library, new kernel"-scenario.
>
>  | ...
>  | struct context *p1_ctx;
>  | struct context *p2_ctx;
>  | 
>  | void sighandler(int sig, siginfo_t *info, void *ucontext)
>  | {
>  |   if (p1_running)
>  |     switch_to(p1_ctx, p2_ctx);
>  |   if (p2_running)
>  |     switch_to(p2_ctx, p1_ctx);
>  | }
>  | 
>  | void p1(void)
>  | {
>  |   memcpy(foo, bar, 17);
>  | }
>  | 
>  | void p2(void)
>  | {
>  |   ...
>  | }
>  | ...
>
> The switch_to() function schedules p1() and p2(). E.g., the
> application (assumes that it) saves the complete task state from
> sigcontext (ucontext) to p1_ctx, and restores sigcontext to p2_ctx, so
> when sigreturn is called, p2() is running, and p1() has been
> interrupted.
>
> The "old application" which is not aware of vector, is now run on a
> vector enabled kernel/glibc.
>
> Assume that the sighandler is hit, and p1() is in the middle of the
> vector memcpy. The switch_to() function will not save the vector
> state, and next time p2() is scheduled to run it will have incorrect
> machine state.
>
> Now:
>
> Is this an actual or theoretical problem (i.e. are there any
> applications in the wild)? I'd be surprised if it would not be the
> latter...
>
> Regardless, a kernel knob for disabling vector (sysctl/prctl) to avoid
> these kind of breaks is needed (right?). Could this knob be a
> follow-up patch to the existing v18 series?
>
> Note that arm64 does not suffer from this with SVE, because the default
> vector length (vl==0/128b*32) fits in the "legacy" sigcontext.

Andy, to clarify from the patchwork call; In
Documentation/arm64/sve.rst:

There's a per-process prctl (section 6), and a system runtime conf
(section 9).


Björn

  reply	other threads:[~2023-04-19 14:54 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20230414155843.12963-1-andy.chiu@sifive.com>
2023-04-19  7:43 ` Björn Töpel
2023-04-19 14:54   ` Björn Töpel [this message]
2023-04-19 15:18     ` Palmer Dabbelt
2023-04-20 16:36       ` Andy Chiu
2023-04-26 14:27         ` Palmer Dabbelt
2023-04-30 21:23           ` Jeff Law

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87leinq5wg.fsf@all.your.base.are.belong.to.us \
    --to=bjorn@kernel.org \
    --cc=andrew@sifive.com \
    --cc=andy.chiu@sifive.com \
    --cc=anup@brainfault.org \
    --cc=aou@eecs.berkeley.edu \
    --cc=atishp@atishpatra.org \
    --cc=greentime.hu@sifive.com \
    --cc=guoren@linux.alibaba.com \
    --cc=kvm-riscv@lists.infradead.org \
    --cc=kvm@vger.kernel.org \
    --cc=libc-alpha@sourceware.org \
    --cc=linux-riscv@lists.infradead.org \
    --cc=nathan@kernel.org \
    --cc=ndesaulniers@google.com \
    --cc=palmer@dabbelt.com \
    --cc=paul.walmsley@sifive.com \
    --cc=richard.henderson@linaro.org \
    --cc=trix@redhat.com \
    --cc=vineetg@rivosinc.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).