summaryrefslogtreecommitdiffstats
path: root/chromium/docs/website/site/nativeclient/pnacl/stability-of-the-pnacl-bitcode-abi/index.md
blob: 57e51e19835137fe3743e990e8208e8f8d5ecdb5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
---
breadcrumbs:
- - /nativeclient
  - Native Client
- - /nativeclient/pnacl
  - PNaCl
page_name: stability-of-the-pnacl-bitcode-abi
title: Stability of the PNaCl bitcode ABI
---

More up to date documentation is available at:
<http://developer.chrome.com/native-client/overview>

Stability of the PNaCl bitcode ABI

Document version: 0.1 (June 17th, 2013)

Introduction

What is meant by ABI stability

The scope of this document

PNaCl changes not related to bitcode stability

Goals

Challenges for bitcode ABI stability

Approaches to maintaining backwards compatibility of bitcode

Approach #1: a single supported bitcode version

Approach #2: evolving the stable bitcode over time, while maintaining backwards
compatibility

Approach #3: hybrid between #1 and #2

Steps towards a stable bitcode ABI

Stripping LLVM metadata

Rewriting vararg calls

Expanding constant expressions

Strip fastcc-related attributes

Strip system-specific function attributes

Disallow inline assembly

Only allow certain intrinsics and external symbols

Restrict integer arguments and return values to at least i32

Fixed TLS layout for PNaCl

Restrict usage of structs, arrays and pointers in the stable bitcode

Concrete proposal details

Handling getelementptr

Handling global initializers

Define __{init|fini}_array_{start|end} at bitcode creation time

C++ exception handling ABI

Untrusted Fault Handling

Memory Model, Atomics, Fences

Syscalls

C11/C++11

Memory Ordering

Volatile

Undefined Behavior

Specification

Introduction

The goal of this document is to define the PNaCl stable bitcode ABI for the
first release of Chrome in which PNaCl is enabled for the open web. This will be
the first release in which PNaCl starts guaranteeing ABI stability.

What is meant by ABI stability

ABI stability for PNaCl bitcode means the guarantee of backwards compatibility -
described by the following scenario:

1. A developer creates a PNaCl application and places it online. The application
is a .pexe generated with the toolchain of Chrome release M.

2. At some point in the future, a user wants to run the .pexe with Chrome
release N (with N &gt;= M).

3. Even though the PNaCl translator distributed with Chrome has likely changed
between releases M and N, we guarantee that the .pexe continues working in the
new release.

Conversely, the related issue of forward compatibility is avoided by explicitly
refusing to load newer bitcode versions in older Chrome translators, as follows:

1. As before, a user generates a .pexe with Chrome release M and places it
online.

2. A user tries to run the .pexe with Chrome release K with K &lt; M. Note that
this only happens if the user didn’t update Chrome, which is unlikely.

3. The PNaCl translator reads the bitcode version from the .pexe and sees it’s a
newer version than it supports. The translator refuses to load the .pexe and
emits an error message.

The scope of this document

This document aims to define the requirement for PNaCl bitcode ABI
compatibility, and lay out the steps we plan to undertake to reach a stable ABI.
The goal here is not to provide a reference documentation of the ABI, but rather
to facilitate discussion within the team and write down our collective thoughts
on the subject.

________________

PNaCl changes not related to bitcode stability

PNaCl also has differences from standard LLVM targets which are unrelated to
bitcode stability. These are generally beyond the scope of this document, but to
summarize, they fall into 2 categories: 1) those related to portability across
architectures, and 2) those related to Native Client and its security sandboxing
model.

For example, the architecture is defined as “le32” indicating that the
architecture is a generic little-endian machine with 32-bit pointers. The target
triple is le32-unknown-nacl, and the compiler #defines __pnacl__ when the
architecture is le32 and __native_client__ when the OS is NaCl. The data model
is ILP32, which means that ints, pointers, and longs are all 32 bits wide.

Additionally, clang’s ABI lowering for calling conventions is different from
that used by hardware architectures (because they are different from each other,
even for the same C types). There are a few additional restrictions on PNaCl
programs such as that they may only use IEEE floating-point types.

The use of Native Client to securely sandbox PNaCl code also imposes some
restrictions on programs: however the details of the sandbox implementation are
subject to change and should not generally be exposed to developers.

________________

Goals

The main and obvious goal of PNaCl bitcode ABI stability is to support backwards
compatibility of PNaCl bitcode. As the section above describes, it’s essential
to allow existing bitcode placed online to run on newer versions of Chrome. This
is similar to any standard-abiding web platform application (HTML+CSS+JS) that
is expected to keep working in newer browsers.

An additional goal is to define a smaller and simpler subset of the LLVM IR for
PNaCl bitcode. A smaller and simpler subset is easier to test and validate.
Furthermore, if an alternative fast code generator for PNaCl is ever considered,
such a subset will be easier to implement.

Initially, the goal of this document is to help deciding which subset of the
LLVM IR will be part of the PNaCl bitcode ABI in the first public release.

Challenges for bitcode ABI stability

As the introduction above explains, we aim to define a stable ABI that will
enable a “new” translator to read “old” bitcode successfully and compile it to
native code that is validated and executed on the user’s machine. Further, we
want to benefit from advances in LLVM technology and use progressively newer
LLVM releases for future versions of the PNaCl translator.

On the other hand, our usage of LLVM IR as the portable representation for PNaCl
implies that we’re dealing with a changing compiler IR that doesn’t have
stability as one of its declared goals.

As a more concrete example: assuming we “freeze” the bitcode ABI on LLVM release
3.3 (which is due sometime in June 2013), in a future PNaCl translator release
we’ll want to use the up-to-date LLVM, say 4.0. There’s a very high probability
that LLVM IR will change between 3.3 and 4.0 to the extent that a bitcode reader
from LLVM 4.0 won’t be able to read IR generated by the front-end of LLVM 3.3.

This incompatibility in IR between LLVM releases manifests in three ways:

1. Semantic changes in IR. For example: type system rewrite in 3.0, attribute
changes in 3.3, possible future removal of IR instructions.

2. Changes in binary LLVM bitcode encoding.

3. “Silent” change in bitcode usage between passes that occur before and after
pexe creation. As PNaCl uses a newer LLVM, the pexe will have been created with
an older version which might emit bitcode that now looks odd to newer LLVM,
hindering optimizations or exposing bugs that do not exist in upstream LLVM
(where the bitcode never goes out of sync).

Approaches to maintaining backwards compatibility of bitcode

This discussion knowingly ignores the option where we fork LLVM from some given
version and maintain our own “stable” version of it for PNaCl. In other words,
it’s assumed that the LLVM backend (code generation and emission) keeps evolving
in the PNaCl translator.

Approach #1: a single supported bitcode version

We define a stable bitcode in the first public release of PNaCl. This is the
bitcode that all subsequent releases will generate.

Pros:

1. Only a single version of the bitcode reader is required. Each version of the
translator will have to convert this stable bitcode to its up-to-date in-memory
representation for consumption in the backend.

2. Provides forward-compatibility to some extent. Since future PNaCl front-ends
will continue generating the stable bitcode, older translators will be able to
read them as well.

Cons:

1. If future versions of LLVM add new features to the IR that we want to provide
as part of PNaCl, we will have to backport upstream’s
BitcodeReader/BitcodeWriter changes to PNaCl’s copy of the bitcode
reader/writer. This might get harder if upstream’s bitcode reader/writer
diverges.

2. Requires more maintenance of the PNaCl frontend, assuming that we want to
keep following the advances in bug fixes in Clang. Newer versions of Clang will
generate newer IR, which we’ll have to “cut down” to the stable subset. Note
that some changes (such as rewrites or removal of instructions) may be
non-trivial.

________________

Approach #2: evolving the stable bitcode over time, while maintaining backwards
compatibility

As with approach #1, we define a stable bitcode in the first public release of
PNaCl. However, in future releases we may change the bitcode ABI, as long as we
ensure that newer translators can still read older bitcode formats.

Pros:

1. We can enjoy advances in LLVM in the future. For example, new features that
get added to the IR and aid optimizations.

2. Easier to follow upstream Clang in the PNaCl front-end. If Clang changes the
bitcode it generates in significant ways, we can incorporate these changes into
the new stable bitcode ABI.

Cons:

1. This approach requires maintaining N bitcode readers: one per supported
bitcode version. The translator will have to recognize the bitcode version and
apply the appropriate reader that knows how to translate that version of the
bitcode into the new translator in-memory structures.

1. We will have to maintain N readers. If LLVM’s C++ API for building in-memory
IR changes, we will have to backport upstream changes to N bitcode readers.

2. This will increase the size of the PNaCl translator.

1. Forward compatibility is impossible in this approach since older translators
won’t be able to read new .pexes. This isn’t a big issue if we assume PNaCl
auto-updates like Chrome does. This can be mitigated with an SDK option to
target older PNaCl versions.

Approach #3: hybrid between #1 and #2

Since there is currently a large unknown with regards to the changes LLVM and
Clang may undergo in the near and far future, it may make sense to start with
approach #1, keeping the option to switch to #2 at some point.

It’s crucial that we guarantee backwards compatibility by always being able to
read and translate the bitcode generated by the first public release of PNaCl.
Whether we’ll allow newer versions of this bitcode to also be generated and read
by future toolchains is an implementation detail that should be transparent to
developers and users.

________________

Steps towards a stable bitcode ABI

The PNaCl portable bitcode is based on LLVM IR. For the sake of defining a
stable bitcode ABI, a number of simplifications and restrictions have to be
applied to LLVM IR in order to synthesize a subset that can remain stable over
time.

The optimizers will generally work best if they are allowed to operate on the
current version of the IR in its full generality; therefore the general plan is
to run Clang and the target-independent optimizations first, and then transform
their output into the stable subset in a final phase called ABI legalization.

On the translator side, a step called “ABI verification” is performed. This
verifies that the downloaded .pexe conforms to the PNaCl bitcode ABI. The
verifier is the “ultimate source of truth” for what is and what isn’t part of
the bitcode ABI. A snapshot of its current implementation is available
online:<http://git.chromium.org/gitweb/?p=native_client/pnacl-llvm.git;a=tree;f=lib/Analysis/NaCl>

The following sections describe the concrete ABI legalization steps we are
considering. It also attempts to provide reasons in favor and against these
transformations. An implicit argument against all transformations is the
engineering effort required to implement and maintain them (which includes
reviewing and testing with each LLVM merge). On the other hand, an implicit
argument in favor of any simplification is reduced exposure to changes in the
bitcode semantics upstream; only changes in parts of the IR that are accepted as
stable would require using one of the backward compatibility approaches above.
The other benefit of simpler IR is that it may allow simplification of the
translator. This could allow the translator to be smaller and/or faster, and
also have a reduced testing and attack surface. Even though we validate and run
the translator itself in a NaCl sandbox, fewer supported IR features means fewer
potentially exploitable bugs that may break one of the security layers.

Note: regarding Challenges for bitcode ABI stability, this section will focus on
the semantic aspects of LLVM IR, ignoring the issue of binary encoding.

________________

Stripping LLVM metadata

Description: LLVM metadata describes constructs like debug information and
optimization hints (for example TBAA and branch weights). By design, metadata is
inherently unstable and has undergone considerable semantic and structural
changes in the past. Metadata should be stripped from .pexes and not be part of
the stable ABI.

Note: we may consider adding back specific kinds of metadata in the future in
order to support some forms of debug information (especially to reconstruct
stack traces to give developers better user crash dumps) and/or aid certain
optimizations.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3348>

Pros:

1. The inherent instability of metadata makes it a very improbable candidate for
inclusion into the stable ABI.

2. Reduction of .pexe size.

3. Reduction of the test surface of the translator - we can avoid testing its
handling of metadata.

Cons:

1. For debug metadata, this forces a slightly more complex flow of development.
We want debug metadata to be stripped from .pexes by default, even if the
developer initially compiled his C/C++ code with -g.

2. For optimization hints, this may cause the translator to miss some
optimizations. This is, however, questionable: IR-level optimizations are done
before the .pexe is generated, and in practice we didn’t observe difference in
the translation result with and without TBAA metadata.

3. No stack traces on crash.

4. Developer-side incompatibilities are still a problem (may need to do clean
rebuilds after toolchain switch, and there is no clear error message when there
are incompatibilities).

________________

Rewriting vararg calls

Description: Functions that accept variable arguments and calls to them should
be replaced with a scheme where the arguments are explicitly packed in a buffer
(allocated by the caller). A pointer to this buffer will be passed into the
function instead of the variable argument list. va_\* instructions and
intrinsics within the function will be rewritten to read the arguments from the
explicit buffer.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3338>

Pros:

1. vararg calls are tricky to implement and aren’t fully supported by the LLVM
backend for all architectures.

2. This transformation simplifies the ABI while being safe because there are no
vararg calls from PNaCl bitcode to native code.

3. This could provide some performance improvements:

1. “opt” can sometimes better optimise explicit buffer-passing than varargs
calls.

2. On x86-64, a varargs function no longer has to spill all arguments to the
stack.

Cons:

1. Produced bitcode will be larger due to the explicit argument packing and
unpacking. However, the effect isn’t likely to be large due to the low number of
vararg functions and calls in typical code.

2. Calling a varargs function without it being declared with a C function
prototype will produce code that doesn’t work.

________________

Expanding constant expressions

Description: LLVM supports the concept of constant expressions (expressions
involving other constants) that can be used as arguments to instructions.
Constant expressions should be expanded to an explicit sequence of equivalent
LLVM instructions.

For handling of constexprs in the context of global initializers, see Restrict
usage of structs, arrays and pointers in the stable bitcode.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3337>

Pros:

1. Simplifies the bitcode.

1. Each LLVM instruction will represent a small unit of computation, rather than
the arbitrarily many computations that are introduced by nested constant
expressions.

Cons:

1. Increased bitcode size. Initial measurements show that this change has
slightly increased the size of gzipped bitcode. See the issue for more details.

2. Impact on performance: we haven’t noticed a measurable impact on performance.

________________

Strip fastcc-related attributes

Description: the fastcc calling convention in LLVM is target-dependent, devised
to speed up internal function calls by passing arguments in registers even on
architectures where the standard calling convention does not do so (e.g. 32-bit
x86). Calling convention specifications (and a related inreg parameter
attribute) should be stripped from the bitcode.

Instead, we can mark all compatible internal functions fastcc explicitly in the
translator for x86-32.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=2346>

Pros:

1. We don’t gain from having this hint applied in the front-end. We can simplify
the ABI by not supporting it, and instead mark the calling convention internally
for architectures where it makes sense (x86-32 in this case).

Strip system-specific function attributes

Description: strip some system-specific function attributes, like naked and
alignstack.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3415>

Pros:

1. Such attributes don’t make sense in a stable platform-independent ABI.

Disallow inline assembly

Description: Since inline assembly is inherently non-portable, we should reject
bitcode with inline assembly in it. It will not be part of the stable ABI.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3126>,
<https://code.google.com/p/nativeclient/issues/detail?id=2345>

Pros:

1. Inline assembly is non-portable.

Cons:

1. No inline assembly, even if the original code has preprocessor macros for
many target platforms.

Only allow certain intrinsics and external symbols

Description: Only intrinsic functions that are known to exist (and correctly
implemented by the backend) across all platforms should be callable from
bitcode. Also, only external symbols that we know are provided by the NaCl
runtime should be allowed.

Initial allowed list of intrinsics:

1. [llvm.nacl.read.tp](http://llvm.nacl.read.tp/) for thread pointer.

2. llvm.memcpy.\*.\*, llvm.memset.\*.\*, llvm.memmove.\*.\* (but need an
implementation for it and need to stop exporting them).

3. llvm.trap

4. llvm.bswap.{i16,i32,i64}

5. llvm.sqrt.{f32,f64} (errno checking done by library, domain assumed good).

Initial allowed list of external symbols:

1. _start

2. setjmp, longjmp. Will use specially named intrinsics that get translated to
native implementations by the translator.

3. __sync_\* for atomics. This is still being experimented with, see Memory
Model, Atomics, Fences. The main issue is that not all platforms necessarily
provide atomic versions of all of these, but in practice they may all be lowered
into single instructions by specific backends.

Intrinsics disallowed:

1. llvm.eh.\*

2. llvm.vacopy, llvm.vaend, llvm.vastart

3. llvm.returnaddress, llvm.frameaddress

1. Transcendentals: llvm.sin.\*, llvm.cos.\*, llvm.log\*, llvm.exp\*, llvm.pow\*

1. Disallow for now, and rely on consistent library implementation. Explore
later with fast-math flags.

1. llvm.flt.rounds: Disallow for now and expand to “1”. Enable in the future
after adding an llvm.flt.set.rounds intrinsic.

2. llvm.expect: Disallow for now. Have frontend normalize these to branch weight
metadata. Optimize the IR using branch weight metadata, then strip the metadata.

3. Many others.

Intrinsics, which seem harmless TBD:

1. Other gcc __builtin_\* intrinsics:

1. llvm.prefetch

2. llvm.ctlz.i32, llvm.cttz.i32, llvm.ctpop.i32

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3378>

Pros:

1. For a stable ABI it’s important to define exactly what external symbols are
allowed to appear in the bitcode. These symbols will have to be provided by
future releases of the runtime, or lowered in the translator; therefore, they
must be carefully restricted.

2. This allows us to strictly provide only those intrinsics that are supported
in a cross-platform way by the translator.

Restrict bitcode integer and floating-point types

Description: Restrict the bitcode integer types supported by the stable ABI to
i1, i8, i16, i32 and i64. Also, restrict the floating-point types to f32, f64.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3360>

Pros:

1. Simplifies the scope of bitcode ABI. Since our current aim is for C and C++
on mainstream 32 or 64-bit CPUs, these sizes seem to be sufficient.

2. Can have a positive effect on translation time. For the CPUs we target, type
legalization that runs during instruction selection would have to reduce types
to the ones mentioned above anyway.

Cons:

1. Produced code may be potentially slower due to missing an optimization.
However, this is questionable since we haven’t yet seen an example of it
happening.

Restrict integer arguments and return values to at least i32

Description: LLVM currently allows function return types such as zeroext i8 and
signext i8. This complicates the language the PNaCl translator has to handle. We
should expand such arguments and return values to always be i32, and handle the
sign/zero extensions explicitly in IR code.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3342>

Pros:

1. Simplifies the scope of bitcode ABI.

2. Removes potential non-portable behaviour, to prevent a pexe from accidentally
behaving differently on x86-32 and x86-64 (for example).

________________

Fixed TLS layout for PNaCl

Description: Currently, TLS variables are part of the bitcode ABI. The backend
computes the actual layout of TLS variables, which is target dependent. We can
compute the TLS layout in advance and encode it in the bitcode. This will leave
only the intrinsic that obtains the thread pointer in the ABI.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=2837>

Pros:

1. Simplifies the ABI.

2. Avoids a target dependency and thus simplifies the user threading library
(removing the need to support multiple TLS variable layouts).

3. Removes the need for an ELF linker to allocate TLS variable layout.

4. Allows the code generator to use shorter instruction sequences for accessing
thread-local variables, because thread pointer offsets are known at code gen
time.

Cons:

1. Limits interoperability with TLS-using native code that’s not built with
PNaCl, but this is currently out of scope.

________________

Restrict usage of structs, arrays and pointers in the stable bitcode

Description: Struct types add expressiveness to LLVM IR and aid in compiling
from C/C++, but play no important role in code generation (after all the
mid-level IR passes have run). Since structs can be arbitrarily nested and
complex, removing them from the stable bitcode ABI can help simplify it. Similar
simplification can be applied to other derived types like arrays and pointers.
This also allows to remove the getelementptr instruction from the stable
bitcode.

Issues:

1. <https://code.google.com/p/nativeclient/issues/detail?id=3343>

2. <https://code.google.com/p/nativeclient/issues/detail?id=3113> (handling of
global initializers)

Concrete proposal details

Struct types and arrays are removed from the stable bitcode ABI. They will
instead be represented by pointers. Structs in registers and usages of
extractvalue/insertvalue will be expanded to be alloca’d instead, and can then
be replaced by pointers. Efficient copies of structs can be replaced by
llvm.memcpy calls.

Pointers are replaced by i32 (valid for PNaCl which explicitly sets pointer size
to 32 bits in the ABI). Some restricted uses of pointers will be allowed in
order to preserve existing semantics of LLVM instructions. For example:

1. alloca instructions return pointers

2. load and store instructions require pointers

3. llvm.memcpy intrinsics require pointers

The ptrtoint and inttoptr instructions will be employed at conversion points to
bridge between addresses contained in i32 values and pointers for the
instructions/intrinsics listed above.

Handling getelementptr

getelementptr will be expanded to a sequence of equivalent arithmetic
instructions acting on i32 instead of pointers. getelementptr is a complex
instruction and it’s worthwhile excluding it from the stable bitcode ABI.

Note: some measurements indicate that programs compiled with fast isel on x86-64
have performance regressions after GEP removal. This is in accordance to
expectations, since fast isel has a special optimization for folding GEPs into
addressing modes.

Handling global initializers

A problem with removing the derived types like structs and arrays is handling
global initializers, which can’t be easily expanded into code.

For example, this C code:

struct S {

struct Pair {

char c1;

char c2;

} p;

int \*ptr;

};

extern int global;

struct S x\[\] = { { { 1, 2, }, &global },

{ { 3, 4, }, &global + 1 } };

In LLVM this currently gets represented as:

@x = global \[2 x %struct.S\]

\[%struct.S { %struct.Pair { i8 1, i8 2 }, i32\* @global },

%struct.S { %struct.Pair { i8 3, i8 4 },

i32\* getelementptr (i32\* @global, i64 1) }\], align 16

There are two problems here:

1. We want to get rid of arbitrarily nested derived types like struct.S

2. The reference to global within the initializer of x requires a non-trivial
constant expression, which we’re also interested in expanding out

The currently leading proposal is to get rid of such initializers in the stable
bitcode (wire format) while still using a restricted form of structures and
pointers in the bitcode reader and writer in order to keep inter-operating with
the existing LLVM backend facilities.

In the bitcode the above initializer will be encoded as two arrays:

1. An array of bytes

2. An array of 32-bit “relocations” to globals; a relocation is a pair
(offest_into_bytearray, global_var).

For the example above, this is:

Byte array:

\[1, 2, 0, 0, // c1, c2, padding

0, 0, 0, 0, // addend 0: @global's address will be added

3, 4, 0, 0, // c1, c2, padding

4, 0, 0, 0\] // addend 4: @global's address with be added

Relocations:

\[(4, @global),

(12, @global)\]

The LLVM IR that will be produced by bitcode reader for this encoded data is:

%flattened_data = type &lt;{ \[4 x i8\], i32, \[4 x i8\], i32 }&gt;

@x_flattened_as_struct = global %flattened_data &lt;{

\[4 x i8\] c"\\01\\02\\00\\00",

i32 ptrtoint (i32\* @global to i32),

\[4 x i8\] c"\\03\\04\\00\\00",

i32 add (i32 ptrtoint (i32\* @global to i32), i32 4)

}&gt;

This re-introduces structs and a restricted usage of constant expressions into
LLVM IR, but we are not concerned about IR inside the backend. The goal is to
not have these constructs “on the wire”.

For producing such initializers, the PNaCl front-end will include a pass that
rewrites global initializers into the “flattened” form shown above, and the
bitcode writer will translate it to the byte array + relocations form.

________________

Define __{init|fini}_array_{start|end} at bitcode creation time

Description: LLVM defines the special global variables llvm.global_ctors and
llvm.global_dtors to list global constructors and destructors. On the binary
executable level, the special symbols __init_array_start/end and
__fini_array_start/end are expected instead by the runtime. We should convert
the former to the latter during linking instead of in the translator, so that
the special globals variables don’t make it part of the ABI.

Issue: <https://code.google.com/p/nativeclient/issues/detail?id=3018>

Pros:

1. Smaller scope of stable bitcode ABI.

2. It is an obstacle to removing the translator's use of the binutils linker
(ld).

________________

C++ exception handling ABI

Not supported in first release. We’ll require code compiled with
-fno-exceptions. ABI checker makes sure that landingpad and invoke instructions
are not being used in the bitcode.

This issue tracks disallowing invoke/landingpad:

<https://code.google.com/p/nativeclient/issues/detail?id=3377>

Issues for adding exception handling in a later release:

<https://code.google.com/p/nativeclient/issues/detail?id=3118>

<https://code.google.com/p/nativeclient/issues/detail?id=2798>

Untrusted Fault Handling

Not supported in first release.

________________

Memory Model, Atomics, Fences

Syscalls

One option for atomic and fences is to expose all primitives through NaCl
syscalls. The below solution can still generate code that goes through syscalls
if needed, but is cleaner in that it doesn’t expose this implementation detail
in the pexe. Simply using syscalls also doesn’t specify a memory model for
pexes.

C11/C++11

We can reuse a subset of the C11/C++11 memory model, atomics and fences, as
represented in LLVM’s IR. Our goal is for PNaCl to provide a portable memory
model and atomic operations for a single program and its threads. This implies
that we don’t need to support device memory or cross-program communications
through these primitives. In the future, supporting other languages or
architectures where either C++’s or LLVM’s representation are insufficient may
involve adding more intrinsics or external functions to what we expose.

One point to note is that C++11 also defines limited threads, if we use its
memory model and atomics then we should also allow users to use its thread
library. There will be some work in supporting the latest runtime libraries to
make this happen. For now we expose pthreads, but a future release will support
full C11/C++11 runtime.

<http://clang.llvm.org/docs/LanguageExtensions.html#c11-atomic-builtins>

<http://gcc.gnu.org/wiki/Atomic/GCCMM/LIbrary>

LLVM and GCC also support instructions that aren’t strictly in the standard
(nand, min, max, ...) as well as sizes which PNaCl doesn’t support (128-bit
integral values). We’ll avoid supporting these for the first release: the
representation we choose for C11/C++11 primitives is likely to evolve portably
with LLVM releases, but non-standard features may not be as forward-compatible.

Memory Ordering

C11/C++11 offer 6 different memory orderings, and it’s unclear if LLVM’s
implementation is correct for all backends of interest, and if user code will
exhibit portable behavior (e.g. it may work on x86 but be incorrect on ARM). One
option for a first release would be to change all orderings to sequential
consistency in the .pexe, and consider relaxing this requirement in future
releases. This would allow code to compile properly, leave older .pexes in a
stable state, and allow us to broaden what’s accepted in a later release.

Memory accesses which aren’t explicitly marked as atomic may be reordered,
split, fused, or elided. They are emitted by the target machine as-if they were
executing on a single thread, unobservable by other threads. This is a source of
undefined behavior.

Volatile

The standard mandates that volatile accesses execute in program order (but are
not fences, so other memory operations can reorder around them), are not
necessarily atomic, and can’t be elided/fused. Everything else is very
target-specific.

The C++ standards committee had a paper about volatile, and decided to leave it
unspecified for reasons that PNaCl doesn’t encounter:

<http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2006/n2016.html>

For PNaCl, we can therefore let the optimizer have its way with volatiles on the
developer’s machine, but change all volatile accesses to intrinsics/external
functions with a specified memory ordering at .pexe creation time. This would
isolate a .pexe from future changes in the translator. We could use relaxed
ordering (which has stronger semantics than the standard mandates), though the
more conservative approach may be to transform all of them to sequentially
consistent (even stronger). This eases our support of legacy code, and combined
with builtin fences these programs can do meaningful cross-thread communication
without changing code.

Pros:

1. “Porting” to PNaCl means using C11/C++11 or the __sync_\* primitives, which
is not wasted work. It’s therefore easier to adopt PNaCl, and a lot of existing
code will “just work”.

2. The generated code will be faster than going through NaCl mutex syscalls.

3. Regular NaCl has access to these atomic instructions, PNaCl doesn’t.

4. volatile in code “just works” on all target platforms.

Cons:

1. 64-bit atomics support may have degraded performance on some MIPS targets
(pre-MIPS3?), compared to x86-32, x86-64 and ARMv7. This means that on some
platforms where there is no instruction then the implementation must use a lock
instead.

2. The above restriction means that atomics may perform much slower on different
platforms. This is really a limitation of platforms, not PNaCl, but it means
that timing can be very different from one platform to another, leaking some of
the platform-independent abstraction.

3. Accessing the same memory location without atomics can still have potentially
racy behavior, which is also part of the C11/C++11 standard (all such accesses
must be through an atomic variable, anything else is undefined).

4. Atomic accesses are only guaranteed to work on aligned addresses. This is as
specified by the C11/C++11 standard, and is often a limitation of the platform
too. We could mitigate this with tools like LLVM’s sanitizers.

5. Ignores multi-program communication as well as devices. So do NaCl and
C11/C++11.

6. The “fast” variants of C++11’s atomics don’t really make sense in the context
of PNaCl because their size must be chosen before the target platform is known.

________________

Undefined Behavior

C and C++ undefined behavior allows efficient mapping of the source language
onto hardware, but leads to different behavior on different platforms.

PNaCl exposes undefined behavior in the following ways:

1. The Clang front-end and optimizations that occur on the developer’s machine
determine what behavior will occur, and it will be specified deterministically
in the pexe. All targets will observe the same behavior. In some cases,
recompiling with a newer PNaCl SDK version will either:

1. Reliably emit the same behavior in the resulting pexe.

2. Change the behavior that gets specified in the pexe.

1. The behavior specified in the pexe relies on IR, runtime or CPU architecture
vagaries.

1. In some cases, the behavior using the same PNaCl translator version on
different architectures will produce different behavior.

2. Sometimes runtime parameters determine the behavior, e.g. memory allocation
determines which out-of-bounds accesses crash versus returning garbage.

3. In some cases, different versions of the PNaCl translator (i.e. after a
Chrome update) will compile the code differently and cause different behavior.

Specification

Our goal is that a single pexe should work reliably in the same manner on all
architectures, irrespective of runtime parameters and through Chrome updates. We
don’t believe that this goal is fully attainable for a first release, we’ve
therefore specified as much as we could and will continue improving the
situation in subsequent releases.

One interesting solution could be to offer good support for LLVM’s sanitizer
tools (including UBSan) at development time, so that developers can test their
code against undefined behavior. Shipping code would then still get good
performance, and diverging behavior would be rare.

Note that none of these issues are vulnerabilities in PNaCl and Chrome: the NaCl
sandboxing still constrains the code through Software Fault Isolation.

Well defined for PNaCl bitcode:

1. Dynamic initialization order dependencies → the order is deterministic in the
pexe.

1. Bool which isn’t 0/1 → the IR instruction sequence is deterministic in the
pexe.

2. Out-of-range enum → the backing integer type and IR instruction sequence is
deterministic in the pexe.

3. Reaching end-of-value-returning-function without returning a value → reduces
to “ret i32 undef” in IR.

4. Aggressive optimizations based on type-based alias analysis → TBAA
optimizations are done before stable bitcode is generated and their metadata is
stripped from the pexe, behavior is therefore deterministic in the pexe.

5. Operator and subexpression evaluation order in the same expression (e.g.
function parameter passing, or pre-increment) → the order is defined in the
pexe.

6. Signed integer overflow → two’s complement integer arithmetic is assumed.

7. Atomic access to a non-atomic memory location (not declared as std::atomic) →
atomics all lower to the same compatible intrinsics or external functions, the
behavior is therefore deterministic in the pexe.

8. Integer divide by zero → always raises a fault (through hardware on x86, and
through integer divide emulation routine or explicit checks on ARM).

Will not fix:

1. Null pointer/reference has behavior determined by the NaCl sandbox:

1. Raises a segmentation fault in the bottom 64KiB bytes on all platforms, and
on some sandboxes there are further non-writable pages after the initial 64KiB.

2. Negative offsets aren’t handled consistently on all platforms: x86-64 and ARM
will wrap around to the stack (because they mask the address), whereas x86-32
will fault (because of segmentation).

1. Accessing uninitialized/free’d memory (including out-of-bounds array access):

1. Might cause a segmentation fault or not, depending on where memory is
allocated and how it gets reclaimed.

2. Added complexity because of the NaCl sandboxing: some of the load/stores
might be forced back into sandbox range, or eliminated entirely if they fall out
of the sandbox.

1. Executing non-program data (jumping to an address obtained from a
non-function pointer is undefined, can only do void(\*)() → intptr_t →
void(\*)().

1. Just-In-Time code generation is supported by NaCl, but will not be supported
by PNaCl’s first release. It will not be possible to mark code as executable in
the first release.

2. Offering full JIT capabilities would reduce PNaCl’s ability to change the
sandboxing model. It would also require a “jump to JIT code” syscall (to
guarantee a calling convention), and means that JITs aren’t portable.

3. PNaCl could offer “portable” JIT capabilities where the code hands PNaCl some
form of LLVM IR, which PNaCl then JITs.

1. Out-of-scope variable usage → will produce unknown data, mostly dependent on
stack and memory allocation.

2. Data races: any two operations that conflict (target overlapping memory), at
least one of which is a store or atomic read-modify-write, and at least one of
which is not atomic → this will be very dependent on processor and execution
sequence.

Potentially can fix:

1. Shift by greater-than-or-equal to left-hand-side’s bit-width or negative.

1. Some of the behavior will be specified in the pexe depending on constant
propagation and integer type of variables.

2. There is still some architecture specific behavior.

3. PNaCl could force-mask the right-hand-side to bitwidth-1, which could become
a no-op on some architectures while ensuring all architectures behave similarly.
Regular optimizations could also be applied, removing redundant masks.

1. Using a virtual pointer of the wrong type, or of an unallocated object.

1. Will produce wrong results which will depend on what data is treated as a
vftable.

2. We could add runtime checks for this, and elide them when types are provably
correct.

1. Some unaligned load/store (also, see atomics above) → could force everything
to align 1, performance cost should be measured. The frontend could also be more
pessimistic when it sees dubious casts.

2. Reaching “unreachable” code.

1. LLVM provides an IR instruction called “unreachable” whose effect will be
undefined. We could change this to always trap, as the llvm.trap intrinsic does.

1. Zero or negative-sized variable-length array (and alloca) → can insert checks
with -fsanitize=vla-bound.

Floating point \[Unsorted, will not all be resolved for first launch\]:

1. Partial IEEE754 implementation:

1. Float cast overflow.

2. Float divide by zero.

3. Different rounding modes.

1. Could support switching modes (the 4 modes exposed by C99 FLT_ROUNDS macros).

1. Default denormal behavior → we could mandate flush-to-zero, and give an API
to enable denormals in a future release.

2. Fast-math optimizations:

1. We’ll strip fast-math from the pexe for now, but could enable it at a later
date, potentially at a perf-function granularity.

2. Flush-to-zero → on or off by default? Provide an API?

3. Canonical NaN, if any → probably hard to guarantee.

4. Ignore NaN to commute operands → only valid with fast-math.

5. NaN signaling → fault.

6. Passing NaNs to STL functions (the math is defined, but the function
implementation isn’t, e.g. std::min/std::max) → will be well-defined in the
pexe.

7. Fused-multiply-add have higher precision and often execute faster → we could
disallow them in the pexe, and only generate them in the backend if fast-math
was specified.

8. Transcendentals → we could ship with emulation routines whose behavior is
well-known, and use the hardware if fast-math is provided.