public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: Adhemerval Zanella Netto <adhemerval.zanella@linaro.org>
To: Siddhesh Poyarekar <siddhesh@gotplt.org>,
	libc-alpha@sourceware.org, Florian Weimer <fweimer@redhat.com>
Subject: Re: [PATCH 0/2] Make tunable a default feature
Date: Wed, 22 Mar 2023 14:58:02 -0300	[thread overview]
Message-ID: <90941d49-5e39-1195-6820-7c79998ac085@linaro.org> (raw)
In-Reply-To: <fe8704c7-a45f-d2bb-1bb5-b05232272903@gotplt.org>



On 22/03/23 12:21, Siddhesh Poyarekar wrote:
> On 2023-03-22 10:40, Adhemerval Zanella Netto wrote:
>>
>>
>> On 20/03/23 20:15, Siddhesh Poyarekar wrote:
>>> On 2023-03-20 12:59, Adhemerval Zanella Netto wrote:
>>>> I think it might make sense for tunables that change the program semantic, such
>>>> as security hardening; although I don't think it really fits for performance
>>>> oriented ones (such malloc or pthread tuning).  So maybe we can define a global
>>>
>>> Administrative level performance tuning defaults for setuid binaries?
>>
>> I was thinking more of opt-in security features (such as mte_state on aarch64),
>> although it might fit better on some ABI extension (such as done by cet).
> 
> Yeah, that too.
> 
>>>> file format where the administrator can set where setuid binaries can use it,
>>>> and if uses can overwrite it.  My initial idea would be something quite simple,
>>>> similar to sysctl.conf:
>>>
>>> Yes, I think Florian suggested reusing ld.so.conf instead.  I don't have a strong preference either way so y'all can fight that one out - potato potato ;)
>>
>> Did he mean add the tunable information on ld.so.conf or using a similar scheme
>> where the file is preprocessed by a tool so loader can just mmap a file without
>> the need any parsing?
>>
>> For later, I don't have a strong opinion.  I assume that a global tunable won't
>> be a default configuration, like loader cache; and parsing should really easy
>> (it a ini like file).
> 
> Just the former IIRC, i.e. extending ld.so.conf to add a section for systemwide tunables.

I am not very found of mixing too different libc facilities in the same config
file and the syntax won't be the same and there are two different

> 
>>>
>>>> And I was thinking about an DF_1_NODEFLIB analogous so the program can opt-out
>>>> any performance or behavior difference any tunable might incur.  Although with
>>>> your idea of enforceable tunable, I think it does not make much sense.
>>>
>>> Yeah an ELF flag to override all tunables seems counter to the whole idea, but ELF flags to override specific tunables may make sense.  E.g. memory tagging enabled by default in the system and a program built with DF_NO_MEMTAG overrides that systemwide setting.
>>
>> The issue of a per-tunable flag is it will require to settle a minimum ABI for
>> tunable, or adding a ELF extension with a string blob that is only understable
>> by an specific glibc version.  I am not sure, maybe we can it only if required.
> 
> We shouldn't need a flag for *every* tunable, only those that would have practical benefit from having ELF overrides, e.g. those that control architecture-specific features.
> 
> That is, the ELF flag should not be tied to a tunable, but a tunable could change behaviour based on an ELF flag.

I think it might be an option if the flag is opaque to ELF itself, like a string
that glibc would parse.  But I don't have a strong preference.

I still think the simplest solution would to have a textual glibc-tunables.conf
similar to sysctl.conf.  

      reply	other threads:[~2023-03-22 17:58 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-13 19:06 Adhemerval Zanella
2023-03-13 19:06 ` [PATCH 1/2] elf: Remove glibc.rtld.dynamic_sort tunable Adhemerval Zanella
2023-03-22 17:08   ` Siddhesh Poyarekar
2023-03-22 17:51     ` Adhemerval Zanella Netto
2023-03-22 18:40       ` Siddhesh Poyarekar
2023-03-22 18:46         ` Adhemerval Zanella Netto
2023-03-22 18:52           ` Siddhesh Poyarekar
2023-03-22 19:11             ` Adhemerval Zanella Netto
2023-03-13 19:06 ` [PATCH 2/2] Remove --enable-tunables configure option Adhemerval Zanella
2023-03-22 16:25   ` Siddhesh Poyarekar
2023-03-14 18:02 ` [PATCH 0/2] Make tunable a default feature Siddhesh Poyarekar
2023-03-15 20:05   ` Adhemerval Zanella Netto
2023-03-17 11:15     ` Siddhesh Poyarekar
2023-03-20 16:59       ` Adhemerval Zanella Netto
2023-03-20 23:15         ` Siddhesh Poyarekar
2023-03-22 14:40           ` Adhemerval Zanella Netto
2023-03-22 15:21             ` Siddhesh Poyarekar
2023-03-22 17:58               ` Adhemerval Zanella Netto [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=90941d49-5e39-1195-6820-7c79998ac085@linaro.org \
    --to=adhemerval.zanella@linaro.org \
    --cc=fweimer@redhat.com \
    --cc=libc-alpha@sourceware.org \
    --cc=siddhesh@gotplt.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).