diff mbox series

linux-user: Add safe_syscall for riscv64 host

Message ID 20181220201502.12285-1-richard.henderson@linaro.org
State Superseded
Headers show
Series linux-user: Add safe_syscall for riscv64 host | expand

Commit Message

Richard Henderson Dec. 20, 2018, 8:15 p.m. UTC
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>

---

At some point we should make this routine be non-optional for
porting to a new host.


r~

---
 linux-user/host/riscv64/hostdep.h          | 23 +++++++
 linux-user/host/riscv64/safe-syscall.inc.S | 77 ++++++++++++++++++++++
 2 files changed, 100 insertions(+)
 create mode 100644 linux-user/host/riscv64/safe-syscall.inc.S

-- 
2.17.2

Comments

Peter Maydell Dec. 20, 2018, 8:40 p.m. UTC | #1
On Thu, 20 Dec 2018 at 20:16, Richard Henderson
<richard.henderson@linaro.org> wrote:
>

> Signed-off-by: Richard Henderson <richard.henderson@linaro.org>

> ---

>

> At some point we should make this routine be non-optional for

> porting to a new host.


Yes, I agree -- how many hosts do we still have which are
missing support for it?

thanks
-- PMM
Richard Henderson Dec. 20, 2018, 9:14 p.m. UTC | #2
On 12/20/18 12:40 PM, Peter Maydell wrote:
> On Thu, 20 Dec 2018 at 20:16, Richard Henderson

> <richard.henderson@linaro.org> wrote:

>>

>> Signed-off-by: Richard Henderson <richard.henderson@linaro.org>

>> ---

>>

>> At some point we should make this routine be non-optional for

>> porting to a new host.

> 

> Yes, I agree -- how many hosts do we still have which are

> missing support for it?


Ignoring tci, mips (3 abis), ppc32, sparc (2 abis).


r~
Alistair Francis Dec. 20, 2018, 10:52 p.m. UTC | #3
On Thu, Dec 20, 2018 at 12:15 PM Richard Henderson
<richard.henderson@linaro.org> wrote:
>

> Signed-off-by: Richard Henderson <richard.henderson@linaro.org>


Reviewed-by: Alistair Francis <alistair.francis@wdc.com>


Alistair

> ---

>

> At some point we should make this routine be non-optional for

> porting to a new host.

>

>

> r~

>

> ---

>  linux-user/host/riscv64/hostdep.h          | 23 +++++++

>  linux-user/host/riscv64/safe-syscall.inc.S | 77 ++++++++++++++++++++++

>  2 files changed, 100 insertions(+)

>  create mode 100644 linux-user/host/riscv64/safe-syscall.inc.S

>

> diff --git a/linux-user/host/riscv64/hostdep.h b/linux-user/host/riscv64/hostdep.h

> index 28467ba00b..865f0fb9ff 100644

> --- a/linux-user/host/riscv64/hostdep.h

> +++ b/linux-user/host/riscv64/hostdep.h

> @@ -8,4 +8,27 @@

>  #ifndef RISCV64_HOSTDEP_H

>  #define RISCV64_HOSTDEP_H

>

> +/* We have a safe-syscall.inc.S */

> +#define HAVE_SAFE_SYSCALL

> +

> +#ifndef __ASSEMBLER__

> +

> +/* These are defined by the safe-syscall.inc.S file */

> +extern char safe_syscall_start[];

> +extern char safe_syscall_end[];

> +

> +/* Adjust the signal context to rewind out of safe-syscall if we're in it */

> +static inline void rewind_if_in_safe_syscall(void *puc)

> +{

> +    ucontext_t *uc = puc;

> +    unsigned long *pcreg = &uc->uc_mcontext.__gregs[REG_PC];

> +

> +    if (*pcreg > (uintptr_t)safe_syscall_start

> +        && *pcreg < (uintptr_t)safe_syscall_end) {

> +        *pcreg = (uintptr_t)safe_syscall_start;

> +    }

> +}

> +

> +#endif /* __ASSEMBLER__ */

> +

>  #endif

> diff --git a/linux-user/host/riscv64/safe-syscall.inc.S b/linux-user/host/riscv64/safe-syscall.inc.S

> new file mode 100644

> index 0000000000..9ca3fbfd1e

> --- /dev/null

> +++ b/linux-user/host/riscv64/safe-syscall.inc.S

> @@ -0,0 +1,77 @@

> +/*

> + * safe-syscall.inc.S : host-specific assembly fragment

> + * to handle signals occurring at the same time as system calls.

> + * This is intended to be included by linux-user/safe-syscall.S

> + *

> + * Written by Richard Henderson <rth@twiddle.net>

> + * Copyright (C) 2018 Linaro, Inc.

> + *

> + * This work is licensed under the terms of the GNU GPL, version 2 or later.

> + * See the COPYING file in the top-level directory.

> + */

> +

> +       .global safe_syscall_base

> +       .global safe_syscall_start

> +       .global safe_syscall_end

> +       .type   safe_syscall_base, @function

> +       .type   safe_syscall_start, @function

> +       .type   safe_syscall_end, @function

> +

> +       /*

> +        * This is the entry point for making a system call. The calling

> +        * convention here is that of a C varargs function with the

> +        * first argument an 'int *' to the signal_pending flag, the

> +        * second one the system call number (as a 'long'), and all further

> +        * arguments being syscall arguments (also 'long').

> +        * We return a long which is the syscall's return value, which

> +        * may be negative-errno on failure. Conversion to the

> +        * -1-and-errno-set convention is done by the calling wrapper.

> +        */

> +safe_syscall_base:

> +       .cfi_startproc

> +       /*

> +        * The syscall calling convention is nearly the same as C:

> +        * we enter with a0 == *signal_pending

> +        *               a1 == syscall number

> +        *               a2 ... a7 == syscall arguments

> +        *               and return the result in a0

> +        * and the syscall instruction needs

> +        *               a7 == syscall number

> +        *               a0 ... a5 == syscall arguments

> +        *               and returns the result in a0

> +        * Shuffle everything around appropriately.

> +        */

> +       mv      t0, a0          /* signal_pending pointer */

> +       mv      t1, a1          /* syscall number */

> +       mv      a0, a2          /* syscall arguments */

> +       mv      a1, a3

> +       mv      a2, a4

> +       mv      a3, a5

> +       mv      a4, a6

> +       mv      a5, a7

> +       mv      a7, t1

> +

> +       /*

> +        * This next sequence of code works in conjunction with the

> +        * rewind_if_safe_syscall_function(). If a signal is taken

> +        * and the interrupted PC is anywhere between 'safe_syscall_start'

> +        * and 'safe_syscall_end' then we rewind it to 'safe_syscall_start'.

> +        * The code sequence must therefore be able to cope with this, and

> +        * the syscall instruction must be the final one in the sequence.

> +        */

> +safe_syscall_start:

> +       /* If signal_pending is non-zero, don't do the call */

> +       lw      t1, 0(t0)

> +       bnez    t1, 0f

> +       scall

> +safe_syscall_end:

> +       /* code path for having successfully executed the syscall */

> +       ret

> +

> +0:

> +       /* code path when we didn't execute the syscall */

> +       li      a0, -TARGET_ERESTARTSYS

> +       ret

> +       .cfi_endproc

> +

> +       .size   safe_syscall_base, .-safe_syscall_base

> --

> 2.17.2

>

>
diff mbox series

Patch

diff --git a/linux-user/host/riscv64/hostdep.h b/linux-user/host/riscv64/hostdep.h
index 28467ba00b..865f0fb9ff 100644
--- a/linux-user/host/riscv64/hostdep.h
+++ b/linux-user/host/riscv64/hostdep.h
@@ -8,4 +8,27 @@ 
 #ifndef RISCV64_HOSTDEP_H
 #define RISCV64_HOSTDEP_H
 
+/* We have a safe-syscall.inc.S */
+#define HAVE_SAFE_SYSCALL
+
+#ifndef __ASSEMBLER__
+
+/* These are defined by the safe-syscall.inc.S file */
+extern char safe_syscall_start[];
+extern char safe_syscall_end[];
+
+/* Adjust the signal context to rewind out of safe-syscall if we're in it */
+static inline void rewind_if_in_safe_syscall(void *puc)
+{
+    ucontext_t *uc = puc;
+    unsigned long *pcreg = &uc->uc_mcontext.__gregs[REG_PC];
+
+    if (*pcreg > (uintptr_t)safe_syscall_start
+        && *pcreg < (uintptr_t)safe_syscall_end) {
+        *pcreg = (uintptr_t)safe_syscall_start;
+    }
+}
+
+#endif /* __ASSEMBLER__ */
+
 #endif
diff --git a/linux-user/host/riscv64/safe-syscall.inc.S b/linux-user/host/riscv64/safe-syscall.inc.S
new file mode 100644
index 0000000000..9ca3fbfd1e
--- /dev/null
+++ b/linux-user/host/riscv64/safe-syscall.inc.S
@@ -0,0 +1,77 @@ 
+/*
+ * safe-syscall.inc.S : host-specific assembly fragment
+ * to handle signals occurring at the same time as system calls.
+ * This is intended to be included by linux-user/safe-syscall.S
+ *
+ * Written by Richard Henderson <rth@twiddle.net>
+ * Copyright (C) 2018 Linaro, Inc.
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
+ * See the COPYING file in the top-level directory.
+ */
+
+	.global safe_syscall_base
+	.global safe_syscall_start
+	.global safe_syscall_end
+	.type	safe_syscall_base, @function
+	.type	safe_syscall_start, @function
+	.type	safe_syscall_end, @function
+
+	/*
+	 * This is the entry point for making a system call. The calling
+	 * convention here is that of a C varargs function with the
+	 * first argument an 'int *' to the signal_pending flag, the
+	 * second one the system call number (as a 'long'), and all further
+	 * arguments being syscall arguments (also 'long').
+	 * We return a long which is the syscall's return value, which
+	 * may be negative-errno on failure. Conversion to the
+	 * -1-and-errno-set convention is done by the calling wrapper.
+	 */
+safe_syscall_base:
+	.cfi_startproc
+	/*
+	 * The syscall calling convention is nearly the same as C:
+	 * we enter with a0 == *signal_pending
+	 *               a1 == syscall number
+	 *               a2 ... a7 == syscall arguments
+	 *               and return the result in a0
+	 * and the syscall instruction needs
+	 *               a7 == syscall number
+	 *               a0 ... a5 == syscall arguments
+	 *               and returns the result in a0
+	 * Shuffle everything around appropriately.
+	 */
+	mv	t0, a0		/* signal_pending pointer */
+	mv	t1, a1		/* syscall number */
+	mv	a0, a2		/* syscall arguments */
+	mv	a1, a3
+	mv	a2, a4
+	mv	a3, a5
+	mv	a4, a6
+	mv	a5, a7
+	mv	a7, t1
+
+	/*
+	 * This next sequence of code works in conjunction with the
+	 * rewind_if_safe_syscall_function(). If a signal is taken
+	 * and the interrupted PC is anywhere between 'safe_syscall_start'
+	 * and 'safe_syscall_end' then we rewind it to 'safe_syscall_start'.
+	 * The code sequence must therefore be able to cope with this, and
+	 * the syscall instruction must be the final one in the sequence.
+	 */
+safe_syscall_start:
+	/* If signal_pending is non-zero, don't do the call */
+	lw	t1, 0(t0)
+	bnez	t1, 0f
+	scall
+safe_syscall_end:
+	/* code path for having successfully executed the syscall */
+	ret
+
+0:
+	/* code path when we didn't execute the syscall */
+	li	a0, -TARGET_ERESTARTSYS
+	ret
+	.cfi_endproc
+
+	.size	safe_syscall_base, .-safe_syscall_base