Hi Gerd,
>* On my system the gcc intrinsics are only available as shared library,
> so the "just unpack the lib and use the object files" idea is not
> going to work.
This little C program makes an unsigned 64Bit division on PC compilers.
Running a 32Bit code generator, it usually invokes an intrinsic
function.
On my 32Bit Ubuntu standard installation I ran
The first .OBJ file mentioned in the .MAP file is in both cases:
/usr/lib/gcc/i686-linux-gnu/6/libgcc.a(_udivdi3.o)
Then for each a.out I did:
In both cases the intrinsic function is fully linked into the .ELF executable.
>so the "just unpack the lib and use the object files" idea is not
>going to work.
It seems to me that GNU holds the intrinsic functions in a separate library
that can be used without any change, and is always correct by definition.
For Microsoft that is only true when a SDK is installed (INT64.LIB).
Without SDK the intrinsic functions were included in LIBCMT.LIB and
must be isolated manually.
Gerd, can you please doublecheck in your GCC build, if that works:
DEBUG_GCCxx_IA32_DLINK_FLAGS = …predefined parameter …
/usr/lib/gcc/i686-linux-gnu/6/libgcc.a
to match your build system
>* I have my doubts that compiler's builtin libraries are optimized for
> size, so I'd suspect we would see a noticeable size grow from that.
Please check the size of __udivdi3()
and whether the tianocore reimplementation is smaller or not
If this works for all build platforms, independently of using the tianocore reimplementation or
using the original compiler intrinsics, this is correct location to place the address of the intrinsic library.
For all optimization modes, operation modes (64Bit/32Bit) the intrinsic library is available for the compiler.
GNU lists the intrinsics:
https://gcc.gnu.org/onlinedocs/gccint/Libgcc.html#Libgcc
The intrinsic library belongs to the compiler not to the build system.
If the build system changes from EDK2 to VS2022/MSBUILD, the compiler
expects the same intrinsic library.
Leave the intrinsic restrictions behind and just provide
all required intrinsics the compiler needs
to fulfil the C-Standard!
Thanks a lot,
Kilian
https://github.com/tianocore/edk2-staging/tree/CdePkg#cdepkgblog
From: kraxel@redhat.com
Sent: Wednesday, January 26, 2022 12:02 PM
To: Pedro Falcato
Cc: edk2-devel-groups-io;
Kinney, Michael D; Kilian Kegel;
Yao, Jiewen;
Sean Brogan; Bret Barkelew;
Wang, Jian J; Jiang, Guomin;
Pawel Polawski; Lu, XiaoyuX
Subject: Re: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0
Hi,
> I think adding intrinsic libraries is a mixed bag, for the following
> reasons:
>
> 1) The intrinsic libraries are completely internal to the compilers.
> Breaking down that toolchain/code barrier is not a good idea if we want the
> project to compile using a good variety of compilers. The API is unstable
> (as it's internal to the compiler + version) and sometimes undocumented;
> while in reality the ABI doesn't really change (at least in the LLVM/GCC
> world, not sure about the other compilers), it's something to consider.
Yes. But apparently there is no way around them. We have them for arm.
We have them for openssl. IntelUndiPkg in edk2-staging has some too
(see IntelUndiPkg/LibC). And I wouldn't be surprised if there are more
cases ...
Having a policy to outlaw Intrinsics, but then hand out exceptions left
and right doesn't look like a good idea to me. I think we should revisit
that and accept that there simply is no way around Intrinsics in some
cases.
I think it makes sense to consolidate all the Intrinsics we have, i.e.
move them over to MdePkg, make everybody use that, so we have only a
single version to maintain.
I think it also makes sense to restrict Intrinsics to the cases where we
have no other option, to keep them as small as possible and also make it
as easy as possible to maintain them.
> 2) Linking the compiler's builtin libraries would fix our issues, except
> that it doesn't work in cases where object files are tagged with ABI (such
> as hard FP vs soft FP).
Also:
* On my system the gcc intrinsics are only available as shared library,
so the "just unpack the lib and use the object files" idea is not
going to work.
* I have my doubts that compiler's builtin libraries are optimized for
size, so I'd suspect we would see a noticeable size grow from that.
* I'd very much prefer to continue with the current approach to have
source code for the Intrinsics we need. In case we run into trouble
things tend to be much easier to fix when you have the source code at
hand. That's actually part of the open source success story.
take care,
Gerd
Sent from Mail for Windows
From: Kilian Kegel
Sent: Tuesday, January 25, 2022 09:06 PM
To: Kinney, Michael D;
devel@edk2.groups.io; kraxel@redhat.com;
Yao, Jiewen;
Sean Brogan; Bret Barkelew
Cc: devel@edk2.groups.io;
Wang, Jian J; Jiang, Guomin;
Pawel Polawski; Lu, XiaoyuX
Subject: Re: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0
Hi Mike,
thank you for your explanation. I understand all the technical aspects.
But let me go into the details of my approach, that skips step 2) to 5)
and adds step 1.5)
>I think in practice, the intrinsic APIs we are seeing from use
>of C code from submodules is a very limited set that do not
>change across compiler releases,
I totally agree. E.g INT64.LIB is the same since 2004 (WinXP DDK).
But my perspective is different anyway:
outside from any EDK2 specific build description (.INF, .DSC)
Let’s assume there is a C build environment fully installed, e.g. Microsoft VS2022, on an EDK2 build machine
and all legal aspects were fulfilled.
In that case the advanced developer is able to locate the library, that holds the intrinsic functions
(intrinsic .OBJ modules) we needed to extract. (simply by checking the .MAP of a 32bit executable
that pulls in the particular intrinsics)
This is step 1)
>One of the challenges is that compilers are allowed to add/remove/modify intrinsic APIs
>across compiler releases. We would need to define a solution that will work if there are
>these types of changes, which would potentially mean a different instance of the intrinsic
>library for each tool chain tag.
Here comes step 1.5):
In case of Microsoft build it is LIBCMT.LIB that can be found when walking through the
LIB environment string.
It is easy to extend EDKSETUP.BAT to generate MSFTINTRINx86-32.LIB
each time:
Now MSFTINTRINx86-32.LIB is located in the
conf directory.
Adjust the DLINK_FLAGS in tools_def.txt to hold
MSFTINTRINx86-32.LIB as a search library:
DEBUG_VS2015_IA32_DLINK_FLAGS = /NOLOGO /NODEFAULTLIB /IGNORE:4001 /OPT:REF /OPT:ICF=10 /MAP /ALIGN:32 /SECTION:.xdata,D /SECTION:.pdata,D /MACHINE:X86 /LTCG /DLL /ENTRY:$(IMAGE_ENTRY_POINT)
/SUBSYSTEM:EFI_BOOT_SERVICE_DRIVER /SAFESEH:NO /BASE:0 /DRIVER /DEBUG %CONF_PATH%\MSFTINTRINx86-32.LIB
RELEASE_VS2015_IA32_DLINK_FLAGS = /NOLOGO /NODEFAULTLIB /IGNORE:4001 /IGNORE:4254 /OPT:REF /OPT:ICF=10 /MAP /ALIGN:32 /SECTION:.xdata,D /SECTION:.pdata,D /MACHINE:X86 /LTCG /DLL /ENTRY:$(IMAGE_ENTRY_POINT)
/SUBSYSTEM:EFI_BOOT_SERVICE_DRIVER /SAFESEH:NO /BASE:0 /DRIVER /MERGE:.rdata=.data
%CONF_PATH%\MSFTINTRINx86-32.LIB
From now on the intrinsics are available for all 32Bit components.
With that procedure it is guaranteed by design, that the intrinsics are
always available and match a particular compiler/linker release.
The script below is a demonstration of the above arguments. It additionally adds memcpy() and memcmp() to MSFTINTRINx86-32.LIB,
that the compiler sometimes needs, depending on optimization style, array size, instruction set, whatsoever …
I have checked some more .OBJ from LIBCMT.LIB and some of them (ftol3.obj to get __ltod3()
long to double needed for difftime())
seem not to be space optimized for BIOS usage, because the ftol3.obj holds multiple functions
(and so violates the ODR one definition rule).
But also such cases could be handled automatically by a script (I wrote a C program < 200 lines)
that disassembles (using Microsoft DUMPBIN.EXE) the .OBJ, splits by simple text processing into
single-function-.ASM-files that could be assembled back to multiple .OBJ of smaller code size.
For this approach compiler, library manager, disassembler (DUMPBIN, OBJDUMP) were needed,
that are available on all build machines by definition.
Best regards
Kilian
From: Kinney, Michael D
Sent: Monday, January 24, 2022 06:28 PM
To: Kilian Kegel;
devel@edk2.groups.io; kraxel@redhat.com;
Yao, Jiewen;
Sean Brogan; Bret Barkelew;
Kinney, Michael D
Cc: devel@edk2.groups.io;
Wang, Jian J; Jiang, Guomin;
Pawel Polawski; Lu, XiaoyuX
Subject: RE: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0
Hi Kilian,
I am in favor of an intrinsic lib to improve the EDK II development environment.
This has already been done for ARM compilers. The solution should mirror that approach.
It would be best if we had source code (either in the edk2 repo or through a submodule) for
the required intrinsic APIs. If source code is not possible and we have to use a binary, then
that must be accessed through a submodule. The edk2 repo does not host binaries. We use
repos such as edk2-non-osi for binaries.
We also have to provide a solution that works with supported compilers (VS, GCC, CLANG, XCODE).
One of the challenges is that compilers are allowed to add/remove/modify intrinsic APIs
across compiler releases. We would need to define a solution that will work if there are
these types of changes, which would potentially mean a different instance of the intrinsic
library for each tool chain tag. I think in practice, the intrinsic APIs we are seeing from use
of C code from submodules is a very limited set that do not change across compiler releases,
so the maintenance of these intrinsic libs would be manageable.
If we go down the source code path, we can break it up into the following tasks:
Best regards,
Mike
From: Kilian Kegel <kilian_kegel@outlook.com>
Sent: Monday, January 24, 2022 8:25 AM
To: devel@edk2.groups.io; Kinney, Michael D <michael.d.kinney@intel.com>; kraxel@redhat.com; Yao, Jiewen <jiewen.yao@intel.com>; Sean Brogan <sean.brogan@microsoft.com>; Bret Barkelew <Bret.Barkelew@microsoft.com>
Cc: devel@edk2.groups.io; Wang, Jian J <jian.j.wang@intel.com>; Jiang, Guomin <guomin.jiang@intel.com>; Pawel Polawski <ppolawsk@redhat.com>; Lu, XiaoyuX <xiaoyux.lu@intel.com>
Subject: RE: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0
The 64-bit integer math intrinsics and other intrinsic
problems could be solved easily for ever:
ltod3.obj
ftol2.obj
lldiv.obj
lldvrm.obj
llmul.obj
llrem.obj
llshl.obj
llshr.obj
ulldiv.obj
ulldvrm.obj
ullrem.obj
ullshr.obj
memcmp.obj
memcpycpy.obj
and adjust for usability in EDK2 (remove / solve further internal dependencies or rewrite “*cpy” and “*cmp” functions)
This is already done in IntrinsicLib.lib for some of the above functions, just complete this task!
DEBUG_*_IA32_DLINK_FLAGS = %CONF_PATH%\ MSFTINTRINx86-32<compilerversion>.lib
RELEASE_*_IA32_DLINK_FLAGS = %CONF_PATH%\ MSFTINTRINx86-32<compilerversion>.lib
From now on all existing 32Bit components have access to their own compiler intrinsics without
touching any .INF file and the problem is instantly gone.
Please do the same for
Leave the intrinsic restrictions behind and just provide
all required intrinsics the compiler needs
to fulfil the C-Standard!
UEFI shall conform the execution environment described in the C Specification
http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1256.pdf#page=23
and shall not try to create a new restricted “UEFI execution environment”
that currently prohibits some “expressions” (shift << >> , divide / % ) on some “data types” (64bit “long long”)
but maybe in the future will prohibit some more “expressions” (logical AND &&, relational-expression < >) on
still speculative “data types” (e.g. a 128bit “extended long”) or just because a new compiler
(version) with some new optimization(ultra slow)/security(specdown/meltre) capabilities introduces
some new intrinsic functions.
Who knows…
In contrast to:
“I think we shouldn't add any intrinsics unless we are absolutely forced
to. I do agree however that, for those intrinsics that we cannot at all
avoid reimplementing, we should at least collect them in a common
library.
(In theory, I can also imagine reimplementing all possible intrinsics
*if* the edk2 coding style spec / requirements are updated in parallel,
permitting all new code to universally rely on the intrinsics, rather
than the BaseLib / BaseMemoryLib functions.)”
https://bugzilla.tianocore.org/show_bug.cgi?id=1516#c2
This mindset violates edk2 coding style spec too:
https://edk2-docs.gitbook.io/edk-ii-c-coding-standards-specification/2_guiding_principles
Have fun,
Kilian
From: Michael D Kinney
Sent: Friday, January 21, 2022 05:39 PM
To: kraxel@redhat.com;
Yao, Jiewen; Sean Brogan;
Bret Barkelew; Kinney, Michael D
Cc: devel@edk2.groups.io;
Wang, Jian J; Jiang, Guomin;
Pawel Polawski; Lu, XiaoyuX
Subject: Re: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0
Comments below.
Mike
> -----Original Message-----
> From: kraxel@redhat.com <kraxel@redhat.com>
> Sent: Friday, January 21, 2022 12:31 AM
> To: Yao, Jiewen <jiewen.yao@intel.com>
> Cc: devel@edk2.groups.io; Kinney, Michael D <michael.d.kinney@intel.com>; Wang, Jian J <jian.j.wang@intel.com>; Jiang, Guomin
> <guomin.jiang@intel.com>; Pawel Polawski <ppolawsk@redhat.com>; Lu, XiaoyuX <xiaoyux.lu@intel.com>
> Subject: Re: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0
>
> > > No changes in SEC and PEI.
> > [Jiewen] Do you mean the Crypto consumer in PEI has no size difference? Such as
> >
https://github.com/tianocore/edk2/tree/master/SecurityPkg/Tcg/Tcg2Pei ,
> >
https://github.com/tianocore/edk2/tree/master/SecurityPkg/FvReportPei ,
> >
https://github.com/tianocore/edk2/tree/master/SignedCapsulePkg/Universal/RecoveryModuleLoadPei linking
>
https://github.com/tianocore/edk2/tree/master/SecurityPkg/Library/FmpAuthenticationLibRsa2048Sha256.
>
> PEI has this (OvmfIa32X64Pkg build):
>
> 7062 TpmMmioSevDecryptPei
> 7830 StatusCodeHandlerPei
> 7902 ReportStatusCodeRouterPei
> 8470 FaultTolerantWritePei
> 9734 SmmAccessPei
> 11206 Tcg2ConfigPei
> 11842 PeiVariable
> 14730 Tcg2PlatformPei
> 17274 TcgPei
> 18438 S3Resume2Pei
> 18682 DxeIpl
> 18938 PcdPeim
> 38014 CpuMpPei
> 39554 PlatformPei
> 45050 PeiCore
> 49274 Tcg2Pei
>
> No size change for Tcg2Pei.
>
> The other modules are not there. Seems they are related to firmware
> updates. We don't have that on ovmf as we can simply update the
> firmware image files on the host machine ...
>
> Is there some target I could use to test-build those modules?
>
> > > INFO - OpensslLibCrypto.lib(rsa_lib.obj) : error LNK2001: unresolved external
> > > symbol __allmul
> > > INFO - OpensslLibCrypto.lib(rsa_lib.obj) : error LNK2001: unresolved external
> > > symbol __aulldiv
> > > INFO - OpensslLibCrypto.lib(bio_print.obj) : error LNK2001: unresolved external
> > > symbol __aulldvrm
> > > INFO - OpensslLibCrypto.lib(bio_print.obj) : error LNK2001: unresolved external
> > > symbol __ftol2_sse
> > >
> > > Those symbols look like they reference helper functions to do 64bit math
> > > on 32bit architecture. Any hints how to fix that?
> > [Jiewen] Please add them to
https://github.com/tianocore/edk2/tree/master/CryptoPkg/Library/IntrinsicLib
>
> Any hints where I could get them? Given this happens on windows builds
> it's probably somewhere in the microsoft standard C library? Is that
> available as open source somewhere?
Sean and Bret may be able to help with these.
There is also a BZ on this topic.
https://bugzilla.tianocore.org/show_bug.cgi?id=1516
>
> > > (3) Some NOOPT builds are failing due to the size growing ...
> > [Jiewen] Size becomes big challenge...
> > Have you tried to use
https://github.com/tianocore/edk2/tree/master/CryptoPkg/Driver solution?
>
> Seems the idea is to have only one openssl copy in the dxe image by
> calling a protocol instead of linking a lib. Makes sense.
>
> Is this documented somewhere? Is there some easy way to use that as
> drop-in replacement? Or do we have to change all crypto users to call
> the driver instead of linking the lib?
>
> take care,
> Gerd