[llvm-dev] [RFC] lld: Dropping TLS relaxations in favor of TLSDESC
James Henderson via llvm-dev
llvm-dev at lists.llvm.org
Wed Nov 8 09:08:55 PST 2017
I don’t think our team can support dropping TLS relaxations. As Peter
suspected, we have noticed significant run-time performance gains in games
when using these relaxations over not using them, with our proprietary
linker. Also, for our platform dynamic libraries are usually used via our
equivalent of dlopen(), not pre-loaded as is the idea behind TLSDESC, from
my understanding, so even if TLSDESC were supported on our platform, there
would be no significant benefit gained for us. Finally, we cannot ask our
customers to change their compilation settings to use better TLS models,
because programs may use static libraries which are intended for use in
both dynamic libraries and main executables, and so will lose out if they
do not have access to TLS relaxations.
On 8 November 2017 at 14:10, Peter Smith via llvm-dev <
llvm-dev at lists.llvm.org> wrote:
> I'm assuming it means the instruction sequences wouldn't be optimized,
> I don't think it would be practical to remove support for the
> For Arm and, I think Mips is similar, there isn't any TLS relaxation
> of instructions as the TLS relocations act on data and not
> instructions. There are some cases where dynamic relocations can be
> omitted, for example the module-id of an executable is defined to be 1
> so there is no need for the dynamic linker to fill this in. For static
> linking the linker knows module and the offsets of all the TLS Symbols
> so it can resolve all the dynamic relocations. I don't know off the
> top of my head whether this would apply to other architectures,
> although I think the general principles should hold the same. The last
> time I looked relaxation was the technique used to support static
> linking on non-Arm and Mips Targets.
> I have a vague memory of the OpenGL folk being sensitive to TLS
> performance, particularly as the library is often shared. I think that
> TLS relaxation isn't going to show up in many traditional benchmarking
> suites as much of the performance critical code is going to be in the
> application, and are unlikely to have much TLS in them. I'm thinking
> that it would need something like a real-world application that makes
> heavy use of shared-libraries with TLS (games, web-browsers or perhaps
> Given that getting convincing data either way about the impact of TLS
> relaxation could be difficult we should err towards keeping it.
> On 8 November 2017 at 09:05, Mark Kettenis via llvm-dev
> <llvm-dev at lists.llvm.org> wrote:
> >> Date: Tue, 7 Nov 2017 18:27:37 -0800
> >> From: Rui Ueyama via llvm-dev <llvm-dev at lists.llvm.org>
> >> tl;dr: TLSDESC have solved most problems in formerly inefficient TLS
> >> models, so I think we can drop TLS relaxation support from lld.
> >> lld's code to handle relocations is a mess; the code consists of a lot
> >> cascading "if"s and needs a lot of prior knowledge to understand what
> it is
> >> doing. Honestly it is head-scratching and needs serious refactoring. I'm
> >> trying to simplify it to make it manageable again, and I'm now focusing
> >> the TLS relaxations.
> >> Thread-local variables in ELF is complicated. The ELF TLS specification
> >> defines 4 different access models: General Dynamic, Local Dynamic,
> >> Exec and Local Exec.
> >> I'm not going into the details of the spec here, but the reason why we
> >> so many different models for the same feature is because they were
> >> different in speed, and we have to use (formerly) slow models when we
> >> less about their run-time memory layout at compile-time or link-time.
> >> there was a trade-off between generality and performance. For example,
> >> you want to use thread-local variables in a dlopen(2)'able DSO, you
> need to
> >> choose the slowest model. If a linker knows at link-time that a more
> >> restricted access model is applicable (e.g. if it is linking a main
> >> executable, it knows for sure that it is not creating a DSO that will be
> >> used via dlopen), the linker is allowed to rewrite instructions to load
> >> thread-local variables to use a faster access model.
> >> What makes the situation more complicated is the presence of a new
> >> of accessing thread-local variables. After the ELF TLS spec was defined,
> >> TLSDESC  was proposed and implemented. With that method, General
> >> and Local Dynamic models (that were pretty slow in the original spec)
> >> as fast as much faster Initial Exec model. TLSDESC doesn't have a
> >> of dlopen'ability and access speed. According to , it also reduces
> >> size of generated DSOs. So it seems like TLSDESC is strictly a better
> >> of accessing thread-local variables than the old way, and the
> >> variable's performance problem (that the TLS ELF spec was trying to
> >> by defining four different access models and relaxations in between)
> >> doesn't seem a real issue anymore.
> >> lld supports all TLS relaxations as defined by the ELF TLS spec. I
> >> the patches to implement all these features without thinking hard enough
> >> about it, but on second thought, that was likely a wrong decision.
> Being a
> >> new linker, we don't need to trace the history of the evolution of the
> >> spec. Instead, we should have implemented whatever it makes sense now.
> >> So, I'd like to propose we drop TLS relaxations from lld, including
> >> Exec → Local Exec. Dropping IE→LE is strictly speaking a degradation,
> but I
> >> don't think that is important. We don't have optimizations for much more
> >> frequent variable access patterns such as locally-accessed variables
> >> have GOT slots (which in theory we can skip GOT access because GOT slot
> >> values are known at link-time), so it is odd that we are only serious
> >> TLS variables, which are usually much less important. Even if it would
> >> out that we want it after implementing more important relaxations, I'd
> >> to drop it for now and reimplement it in a different way later.
> >> This should greatly simplifies the code because it does not only reduce
> >> complexity and amount of the existing code, but also reduces the amount
> >> knowledge you need to have to read the code, without sacrificing
> >> performance of lld-generated files in practice.
> >> Thoughts?
> > Not sure what the impact of this would be. Does this mean that some
> > TLS relocations will no longer be supported? Or is it that they just
> > won't be optimized. How about static binaries? Don't they rely on
> > the local exec model?
> > Doe this affect linking code generated by older compilers (say GCC
> > 4.2.1) in any way?
> > _______________________________________________
> > LLVM Developers mailing list
> > llvm-dev at lists.llvm.org
> > http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev
> LLVM Developers mailing list
> llvm-dev at lists.llvm.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the llvm-dev