DragonFly BSD
DragonFly kernel List (threaded) for 2005-05
[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]

The time has come for a kernel interfacing library layer


From: Matthew Dillon <dillon@xxxxxxxxxxxxxxxxxxxx>
Date: Sat, 7 May 2005 09:57:35 -0700 (PDT)

    Ok.  The time has come to implement the idea some of us have been 
    talking about on and off for the last year, and that is to implement a
    kernel-interfacing layer between libc and the system (rather then
    building the system call stubs into libc).

    This layer is going to take over the job of providing the system call
    API to the program.   It will also allow us to safely use more complex
    kernel interfaces, such as a shared-memory userland critical section
    for signal interlocks, shared memory access to things like the 'pid',
    and so forth, without breaking long-term forwards and backwards
    compatibility due to structural changes made in the system.

    This will give us the following features:

    * The ability to change system structures and system call effects without
      having to renumber system calls.

    * The ability to use shared memory between userland the kernel without
      breaking forwards and backwards compatibility.  i.e. only the layer
      itself would access the shared memory, program binaries would not.
      Again, an all-userland path.

    * The ability to implement 'system calls' that actually run entirely in
      userspace (the layer would JMP to code in the layer rather then JMP
      to code that calls int 0x80). 

    * The ability to implement (future) asynchronous-messaged system calls
      without userland being aware that the physical ABI into the kernel
      has changed.

    * And many other things.

    --

    How will this work?  The concept is simple:  Instead of implementing
    system calls directly, all userland programs instead implement a 
    special named-section containing system call stubs.  This will be a
    BSS section (not contain actual code).  The kernel loader (and ld-elf
    when it loads things) will automatically detect the existance of the
    section and automatically mmap() the actual syscall layer into the 
    BSS space, as well as mmap() anything else that it needs for system
    interfacing (any additional mmap()'d sections will be not be directly
    visible to userland.  Userland only sees the stub table).

    The kernel will select the layer file that it maps in based on the ABI
    version of the userland program verses the ABI version of the kernel.

    This theoretically means that we can make any old program work with any
    new kernel by building the correct layer, independant of both the
    original program's and the original kernel's compilation.  This also
    means that we can make any new program work with any old kernel through
    the same means.

    Joerg, to make this work I need two other things:

    * We need to have the kernel automatically setup the initial TLS
      space.

    * We need to reserve some fixed positive-offset space in the TLS
      to hold a pointer to errno and other things that the layer might
      need to manage.  Since the layer is simply going to be mmap()'d and
      not dynamically linked, it cannot use the standard TLS variable space
      itself.  The layer may need some meta-data (basically one generic
      pointer's worth) to e.g. store a pointer to the shared memory area
      or to other interfacing aspects, private to the layer.

      The biggest piece of the puzzle here is storing a pointer to errno
      at a fixed %gs:POSITIVE_OFFSET so the syscall layer can actually
      set errno.

    The benefits of this are huge.

					-Matt
					Matthew Dillon 
					<dillon@xxxxxxxxxxxxx>



[Date Prev][Date Next]  [Thread Prev][Thread Next]  [Date Index][Thread Index]