2014-08-12 17:48:49 -06:00
|
|
|
// Copyright 2014 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2021-05-12 09:55:42 -06:00
|
|
|
//go:build linux && (ppc64 || ppc64le)
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
//
|
2014-12-05 17:13:20 -07:00
|
|
|
// System calls and other sys.stuff for ppc64, Linux
|
2014-08-12 17:48:49 -06:00
|
|
|
//
|
|
|
|
|
2014-11-18 13:19:26 -07:00
|
|
|
#include "go_asm.h"
|
|
|
|
#include "go_tls.h"
|
2014-10-27 15:27:03 -06:00
|
|
|
#include "textflag.h"
|
2015-10-08 03:34:29 -06:00
|
|
|
#include "asm_ppc64x.h"
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
#define SYS_exit 1
|
|
|
|
#define SYS_read 3
|
|
|
|
#define SYS_write 4
|
|
|
|
#define SYS_open 5
|
|
|
|
#define SYS_close 6
|
2015-01-14 09:18:24 -07:00
|
|
|
#define SYS_getpid 20
|
|
|
|
#define SYS_kill 37
|
2017-04-06 12:32:37 -06:00
|
|
|
#define SYS_brk 45
|
2014-08-12 17:48:49 -06:00
|
|
|
#define SYS_fcntl 55
|
|
|
|
#define SYS_mmap 90
|
|
|
|
#define SYS_munmap 91
|
|
|
|
#define SYS_setitimer 104
|
|
|
|
#define SYS_clone 120
|
|
|
|
#define SYS_sched_yield 158
|
2018-04-20 16:30:52 -06:00
|
|
|
#define SYS_nanosleep 162
|
2014-08-12 17:48:49 -06:00
|
|
|
#define SYS_rt_sigreturn 172
|
|
|
|
#define SYS_rt_sigaction 173
|
|
|
|
#define SYS_rt_sigprocmask 174
|
|
|
|
#define SYS_sigaltstack 185
|
|
|
|
#define SYS_madvise 205
|
|
|
|
#define SYS_mincore 206
|
|
|
|
#define SYS_gettid 207
|
|
|
|
#define SYS_futex 221
|
|
|
|
#define SYS_sched_getaffinity 223
|
|
|
|
#define SYS_exit_group 234
|
|
|
|
#define SYS_epoll_create 236
|
|
|
|
#define SYS_epoll_ctl 237
|
|
|
|
#define SYS_epoll_wait 238
|
2021-08-13 09:34:25 -06:00
|
|
|
#define SYS_timer_create 240
|
|
|
|
#define SYS_timer_settime 241
|
|
|
|
#define SYS_timer_delete 244
|
2014-08-12 17:48:49 -06:00
|
|
|
#define SYS_clock_gettime 246
|
2018-09-06 18:21:59 -06:00
|
|
|
#define SYS_tgkill 250
|
2014-08-12 17:48:49 -06:00
|
|
|
#define SYS_epoll_create1 315
|
2019-04-03 17:31:13 -06:00
|
|
|
#define SYS_pipe2 317
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·exit(SB),NOSPLIT|NOFRAME,$0-4
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW code+0(FP), R3
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_exit_group
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
runtime: make it possible to exit Go-created threads
Currently, threads created by the runtime exist until the whole
program exits. For #14592 and #20395, we want to be able to exit and
clean up threads created by the runtime. This commit implements that
mechanism.
The main difficulty is how to clean up the g0 stack. In cgo mode and
on Solaris and Windows where the OS manages thread stacks, we simply
arrange to return from mstart and let the system clean up the thread.
If the runtime allocated the g0 stack, then we use a new exitThread
syscall wrapper that arranges to clear a flag in the M once the stack
can safely be reaped and call the thread termination syscall.
exitThread is based on the existing exit1 wrapper, which was always
meant to terminate the calling thread. However, exit1 has never been
used since it was introduced 9 years ago, so it was broken on several
platforms. exitThread also has the additional complication of having
to flag that the stack is unused, which requires some tricks on
platforms that use the stack for syscalls.
This still leaves the problem of how to reap the unused g0 stacks. For
this, we move the M from allm to a new freem list as part of the M
exiting. Later, allocm scans the freem list, finds Ms that are marked
as done with their stack, removes these from the list and frees their
g0 stacks. This also allows these Ms to be garbage collected.
This CL does not yet use any of this functionality. Follow-up CLs
will. Likewise, there are no new tests in this CL because we'll need
follow-up functionality to test it.
Change-Id: Ic851ee74227b6d39c6fc1219fc71b45d3004bc63
Reviewed-on: https://go-review.googlesource.com/46037
Run-TryBot: Austin Clements <austin@google.com>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Keith Randall <khr@golang.org>
2017-06-16 13:54:21 -06:00
|
|
|
// func exitThread(wait *uint32)
|
|
|
|
TEXT runtime·exitThread(SB),NOSPLIT|NOFRAME,$0-8
|
|
|
|
MOVD wait+0(FP), R1
|
|
|
|
// We're done using the stack.
|
|
|
|
MOVW $0, R2
|
|
|
|
SYNC
|
|
|
|
MOVW R2, (R1)
|
|
|
|
MOVW $0, R3 // exit code
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_exit
|
runtime: make it possible to exit Go-created threads
Currently, threads created by the runtime exist until the whole
program exits. For #14592 and #20395, we want to be able to exit and
clean up threads created by the runtime. This commit implements that
mechanism.
The main difficulty is how to clean up the g0 stack. In cgo mode and
on Solaris and Windows where the OS manages thread stacks, we simply
arrange to return from mstart and let the system clean up the thread.
If the runtime allocated the g0 stack, then we use a new exitThread
syscall wrapper that arranges to clear a flag in the M once the stack
can safely be reaped and call the thread termination syscall.
exitThread is based on the existing exit1 wrapper, which was always
meant to terminate the calling thread. However, exit1 has never been
used since it was introduced 9 years ago, so it was broken on several
platforms. exitThread also has the additional complication of having
to flag that the stack is unused, which requires some tricks on
platforms that use the stack for syscalls.
This still leaves the problem of how to reap the unused g0 stacks. For
this, we move the M from allm to a new freem list as part of the M
exiting. Later, allocm scans the freem list, finds Ms that are marked
as done with their stack, removes these from the list and frees their
g0 stacks. This also allows these Ms to be garbage collected.
This CL does not yet use any of this functionality. Follow-up CLs
will. Likewise, there are no new tests in this CL because we'll need
follow-up functionality to test it.
Change-Id: Ic851ee74227b6d39c6fc1219fc71b45d3004bc63
Reviewed-on: https://go-review.googlesource.com/46037
Run-TryBot: Austin Clements <austin@google.com>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Keith Randall <khr@golang.org>
2017-06-16 13:54:21 -06:00
|
|
|
JMP 0(PC)
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·open(SB),NOSPLIT|NOFRAME,$0-20
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD name+0(FP), R3
|
|
|
|
MOVW mode+8(FP), R4
|
|
|
|
MOVW perm+12(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_open
|
2015-03-02 21:16:48 -07:00
|
|
|
BVC 2(PC)
|
|
|
|
MOVW $-1, R3
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+16(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·closefd(SB),NOSPLIT|NOFRAME,$0-12
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW fd+0(FP), R3
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_close
|
2015-03-02 21:16:48 -07:00
|
|
|
BVC 2(PC)
|
|
|
|
MOVW $-1, R3
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+8(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2019-09-01 08:37:44 -06:00
|
|
|
TEXT runtime·write1(SB),NOSPLIT|NOFRAME,$0-28
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD fd+0(FP), R3
|
|
|
|
MOVD p+8(FP), R4
|
|
|
|
MOVW n+16(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_write
|
2015-03-02 21:16:48 -07:00
|
|
|
BVC 2(PC)
|
2019-04-05 12:42:37 -06:00
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·read(SB),NOSPLIT|NOFRAME,$0-28
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW fd+0(FP), R3
|
|
|
|
MOVD p+8(FP), R4
|
|
|
|
MOVW n+16(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_read
|
2015-03-02 21:16:48 -07:00
|
|
|
BVC 2(PC)
|
2019-04-05 12:42:37 -06:00
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2019-04-03 17:31:13 -06:00
|
|
|
// func pipe2(flags int32) (r, w int32, errno int32)
|
|
|
|
TEXT runtime·pipe2(SB),NOSPLIT|NOFRAME,$0-20
|
|
|
|
ADD $FIXED_FRAME+8, R1, R3
|
|
|
|
MOVW flags+0(FP), R4
|
|
|
|
SYSCALL $SYS_pipe2
|
|
|
|
MOVW R3, errno+16(FP)
|
|
|
|
RET
|
|
|
|
|
2014-10-27 15:27:03 -06:00
|
|
|
TEXT runtime·usleep(SB),NOSPLIT,$16-4
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVW usec+0(FP), R3
|
|
|
|
MOVD R3, R5
|
|
|
|
MOVW $1000000, R4
|
|
|
|
DIVD R4, R3
|
2014-08-15 13:28:08 -06:00
|
|
|
MOVD R3, 8(R1)
|
2018-04-20 16:30:52 -06:00
|
|
|
MOVW $1000, R4
|
2014-08-12 17:48:49 -06:00
|
|
|
MULLD R3, R4
|
|
|
|
SUB R4, R5
|
2014-08-15 13:28:08 -06:00
|
|
|
MOVD R5, 16(R1)
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2018-04-20 16:30:52 -06:00
|
|
|
// nanosleep(&ts, 0)
|
|
|
|
ADD $8, R1, R3
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVW $0, R4
|
2018-04-20 16:30:52 -06:00
|
|
|
SYSCALL $SYS_nanosleep
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-06-22 10:32:05 -06:00
|
|
|
TEXT runtime·gettid(SB),NOSPLIT,$0-4
|
|
|
|
SYSCALL $SYS_gettid
|
|
|
|
MOVW R3, ret+0(FP)
|
|
|
|
RET
|
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·raise(SB),NOSPLIT|NOFRAME,$0
|
2018-09-06 18:21:59 -06:00
|
|
|
SYSCALL $SYS_getpid
|
|
|
|
MOVW R3, R14
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_gettid
|
2018-09-06 18:21:59 -06:00
|
|
|
MOVW R3, R4 // arg 2 tid
|
|
|
|
MOVW R14, R3 // arg 1 pid
|
|
|
|
MOVW sig+0(FP), R5 // arg 3
|
|
|
|
SYSCALL $SYS_tgkill
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·raiseproc(SB),NOSPLIT|NOFRAME,$0
|
2015-01-14 09:18:24 -07:00
|
|
|
SYSCALL $SYS_getpid
|
|
|
|
MOVW R3, R3 // arg 1 pid
|
|
|
|
MOVW sig+0(FP), R4 // arg 2
|
|
|
|
SYSCALL $SYS_kill
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2015-01-14 09:18:24 -07:00
|
|
|
|
2019-10-03 08:19:38 -06:00
|
|
|
TEXT ·getpid(SB),NOSPLIT|NOFRAME,$0-8
|
|
|
|
SYSCALL $SYS_getpid
|
|
|
|
MOVD R3, ret+0(FP)
|
|
|
|
RET
|
|
|
|
|
|
|
|
TEXT ·tgkill(SB),NOSPLIT|NOFRAME,$0-24
|
|
|
|
MOVD tgid+0(FP), R3
|
|
|
|
MOVD tid+8(FP), R4
|
|
|
|
MOVD sig+16(FP), R5
|
|
|
|
SYSCALL $SYS_tgkill
|
|
|
|
RET
|
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·setitimer(SB),NOSPLIT|NOFRAME,$0-24
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW mode+0(FP), R3
|
|
|
|
MOVD new+8(FP), R4
|
|
|
|
MOVD old+16(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_setitimer
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2021-08-13 09:34:25 -06:00
|
|
|
TEXT runtime·timer_create(SB),NOSPLIT,$0-28
|
|
|
|
MOVW clockid+0(FP), R3
|
|
|
|
MOVD sevp+8(FP), R4
|
|
|
|
MOVD timerid+16(FP), R5
|
|
|
|
SYSCALL $SYS_timer_create
|
|
|
|
MOVW R3, ret+24(FP)
|
|
|
|
RET
|
|
|
|
|
|
|
|
TEXT runtime·timer_settime(SB),NOSPLIT,$0-28
|
|
|
|
MOVW timerid+0(FP), R3
|
|
|
|
MOVW flags+4(FP), R4
|
|
|
|
MOVD new+8(FP), R5
|
|
|
|
MOVD old+16(FP), R6
|
|
|
|
SYSCALL $SYS_timer_settime
|
|
|
|
MOVW R3, ret+24(FP)
|
|
|
|
RET
|
|
|
|
|
|
|
|
TEXT runtime·timer_delete(SB),NOSPLIT,$0-12
|
|
|
|
MOVW timerid+0(FP), R3
|
|
|
|
SYSCALL $SYS_timer_delete
|
|
|
|
MOVW R3, ret+8(FP)
|
|
|
|
RET
|
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·mincore(SB),NOSPLIT|NOFRAME,$0-28
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD addr+0(FP), R3
|
|
|
|
MOVD n+8(FP), R4
|
|
|
|
MOVD dst+16(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_mincore
|
2016-02-10 22:46:51 -07:00
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2021-04-28 12:42:34 -06:00
|
|
|
// func walltime() (sec int64, nsec int32)
|
|
|
|
TEXT runtime·walltime(SB),NOSPLIT,$16-12
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD R1, R15 // R15 is unchanged by C code
|
|
|
|
MOVD g_m(g), R21 // R21 = m
|
|
|
|
|
|
|
|
MOVD $0, R3 // CLOCK_REALTIME
|
|
|
|
|
|
|
|
MOVD runtime·vdsoClockgettimeSym(SB), R12 // Check for VDSO availability
|
|
|
|
CMP R12, R0
|
|
|
|
BEQ fallback
|
|
|
|
|
|
|
|
// Set vdsoPC and vdsoSP for SIGPROF traceback.
|
2020-08-04 18:25:10 -06:00
|
|
|
// Save the old values on stack and restore them on exit,
|
|
|
|
// so this function is reentrant.
|
|
|
|
MOVD m_vdsoPC(R21), R4
|
|
|
|
MOVD m_vdsoSP(R21), R5
|
|
|
|
MOVD R4, 32(R1)
|
|
|
|
MOVD R5, 40(R1)
|
|
|
|
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD LR, R14
|
2021-09-22 16:32:45 -06:00
|
|
|
MOVD $ret-FIXED_FRAME(FP), R5 // caller's SP
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD R14, m_vdsoPC(R21)
|
2021-09-22 16:32:45 -06:00
|
|
|
MOVD R5, m_vdsoSP(R21)
|
2018-08-23 17:16:19 -06:00
|
|
|
|
|
|
|
MOVD m_curg(R21), R6
|
|
|
|
CMP g, R6
|
|
|
|
BNE noswitch
|
|
|
|
|
|
|
|
MOVD m_g0(R21), R7
|
|
|
|
MOVD (g_sched+gobuf_sp)(R7), R1 // Set SP to g0 stack
|
|
|
|
|
|
|
|
noswitch:
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
SUB $16, R1 // Space for results
|
|
|
|
RLDICR $0, R1, $59, R1 // Align for C code
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD R12, CTR
|
|
|
|
MOVD R1, R4
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
|
|
|
|
// Store g on gsignal's stack, so if we receive a signal
|
|
|
|
// during VDSO code we can find the g.
|
|
|
|
// If we don't have a signal stack, we won't receive signal,
|
|
|
|
// so don't bother saving g.
|
|
|
|
// When using cgo, we already saved g on TLS, also don't save
|
|
|
|
// g here.
|
|
|
|
// Also don't save g if we are already on the signal stack.
|
|
|
|
// We won't get a nested signal.
|
|
|
|
MOVBZ runtime·iscgo(SB), R22
|
|
|
|
CMP R22, $0
|
|
|
|
BNE nosaveg
|
|
|
|
MOVD m_gsignal(R21), R22 // g.m.gsignal
|
|
|
|
CMP R22, $0
|
|
|
|
BEQ nosaveg
|
|
|
|
|
|
|
|
CMP g, R22
|
|
|
|
BEQ nosaveg
|
|
|
|
MOVD (g_stack+stack_lo)(R22), R22 // g.m.gsignal.stack.lo
|
|
|
|
MOVD g, (R22)
|
|
|
|
|
|
|
|
BL (CTR) // Call from VDSO
|
|
|
|
|
|
|
|
MOVD $0, (R22) // clear g slot, R22 is unchanged by C code
|
|
|
|
|
|
|
|
JMP finish
|
|
|
|
|
|
|
|
nosaveg:
|
|
|
|
BL (CTR) // Call from VDSO
|
|
|
|
|
|
|
|
finish:
|
|
|
|
MOVD $0, R0 // Restore R0
|
|
|
|
MOVD 0(R1), R3 // sec
|
|
|
|
MOVD 8(R1), R5 // nsec
|
|
|
|
MOVD R15, R1 // Restore SP
|
2018-08-23 17:16:19 -06:00
|
|
|
|
2020-08-04 18:25:10 -06:00
|
|
|
// Restore vdsoPC, vdsoSP
|
|
|
|
// We don't worry about being signaled between the two stores.
|
|
|
|
// If we are not in a signal handler, we'll restore vdsoSP to 0,
|
|
|
|
// and no one will care about vdsoPC. If we are in a signal handler,
|
|
|
|
// we cannot receive another signal.
|
|
|
|
MOVD 40(R1), R6
|
|
|
|
MOVD R6, m_vdsoSP(R21)
|
|
|
|
MOVD 32(R1), R6
|
|
|
|
MOVD R6, m_vdsoPC(R21)
|
|
|
|
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
return:
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVD R3, sec+0(FP)
|
|
|
|
MOVW R5, nsec+8(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2018-08-23 17:16:19 -06:00
|
|
|
// Syscall fallback
|
|
|
|
fallback:
|
|
|
|
ADD $32, R1, R4
|
|
|
|
SYSCALL $SYS_clock_gettime
|
|
|
|
MOVD 32(R1), R3
|
|
|
|
MOVD 40(R1), R5
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
JMP return
|
2018-08-23 17:16:19 -06:00
|
|
|
|
2020-08-04 18:25:10 -06:00
|
|
|
TEXT runtime·nanotime1(SB),NOSPLIT,$16-8
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD $1, R3 // CLOCK_MONOTONIC
|
|
|
|
|
|
|
|
MOVD R1, R15 // R15 is unchanged by C code
|
|
|
|
MOVD g_m(g), R21 // R21 = m
|
|
|
|
|
|
|
|
MOVD runtime·vdsoClockgettimeSym(SB), R12 // Check for VDSO availability
|
|
|
|
CMP R12, R0
|
|
|
|
BEQ fallback
|
|
|
|
|
|
|
|
// Set vdsoPC and vdsoSP for SIGPROF traceback.
|
2020-08-04 18:25:10 -06:00
|
|
|
// Save the old values on stack and restore them on exit,
|
|
|
|
// so this function is reentrant.
|
|
|
|
MOVD m_vdsoPC(R21), R4
|
|
|
|
MOVD m_vdsoSP(R21), R5
|
|
|
|
MOVD R4, 32(R1)
|
|
|
|
MOVD R5, 40(R1)
|
|
|
|
|
2021-09-22 16:32:45 -06:00
|
|
|
MOVD LR, R14 // R14 is unchanged by C code
|
|
|
|
MOVD $ret-FIXED_FRAME(FP), R5 // caller's SP
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD R14, m_vdsoPC(R21)
|
2021-09-22 16:32:45 -06:00
|
|
|
MOVD R5, m_vdsoSP(R21)
|
2018-08-23 17:16:19 -06:00
|
|
|
|
|
|
|
MOVD m_curg(R21), R6
|
|
|
|
CMP g, R6
|
|
|
|
BNE noswitch
|
|
|
|
|
|
|
|
MOVD m_g0(R21), R7
|
|
|
|
MOVD (g_sched+gobuf_sp)(R7), R1 // Set SP to g0 stack
|
|
|
|
|
|
|
|
noswitch:
|
|
|
|
SUB $16, R1 // Space for results
|
|
|
|
RLDICR $0, R1, $59, R1 // Align for C code
|
|
|
|
MOVD R12, CTR
|
|
|
|
MOVD R1, R4
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
|
|
|
|
// Store g on gsignal's stack, so if we receive a signal
|
|
|
|
// during VDSO code we can find the g.
|
|
|
|
// If we don't have a signal stack, we won't receive signal,
|
|
|
|
// so don't bother saving g.
|
|
|
|
// When using cgo, we already saved g on TLS, also don't save
|
|
|
|
// g here.
|
|
|
|
// Also don't save g if we are already on the signal stack.
|
|
|
|
// We won't get a nested signal.
|
|
|
|
MOVBZ runtime·iscgo(SB), R22
|
|
|
|
CMP R22, $0
|
|
|
|
BNE nosaveg
|
|
|
|
MOVD m_gsignal(R21), R22 // g.m.gsignal
|
|
|
|
CMP R22, $0
|
|
|
|
BEQ nosaveg
|
|
|
|
|
|
|
|
CMP g, R22
|
|
|
|
BEQ nosaveg
|
|
|
|
MOVD (g_stack+stack_lo)(R22), R22 // g.m.gsignal.stack.lo
|
|
|
|
MOVD g, (R22)
|
|
|
|
|
|
|
|
BL (CTR) // Call from VDSO
|
|
|
|
|
|
|
|
MOVD $0, (R22) // clear g slot, R22 is unchanged by C code
|
|
|
|
|
|
|
|
JMP finish
|
|
|
|
|
|
|
|
nosaveg:
|
|
|
|
BL (CTR) // Call from VDSO
|
|
|
|
|
|
|
|
finish:
|
2018-08-23 17:16:19 -06:00
|
|
|
MOVD $0, R0 // Restore R0
|
|
|
|
MOVD 0(R1), R3 // sec
|
|
|
|
MOVD 8(R1), R5 // nsec
|
|
|
|
MOVD R15, R1 // Restore SP
|
|
|
|
|
2020-08-04 18:25:10 -06:00
|
|
|
// Restore vdsoPC, vdsoSP
|
|
|
|
// We don't worry about being signaled between the two stores.
|
|
|
|
// If we are not in a signal handler, we'll restore vdsoSP to 0,
|
|
|
|
// and no one will care about vdsoPC. If we are in a signal handler,
|
|
|
|
// we cannot receive another signal.
|
|
|
|
MOVD 40(R1), R6
|
|
|
|
MOVD R6, m_vdsoSP(R21)
|
|
|
|
MOVD 32(R1), R6
|
|
|
|
MOVD R6, m_vdsoPC(R21)
|
|
|
|
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
return:
|
2014-08-12 17:48:49 -06:00
|
|
|
// sec is in R3, nsec in R5
|
|
|
|
// return nsec in R3
|
|
|
|
MOVD $1000000000, R4
|
|
|
|
MULLD R4, R3
|
|
|
|
ADD R5, R3
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD R3, ret+0(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2018-08-23 17:16:19 -06:00
|
|
|
// Syscall fallback
|
|
|
|
fallback:
|
|
|
|
ADD $32, R1, R4
|
|
|
|
SYSCALL $SYS_clock_gettime
|
|
|
|
MOVD 32(R1), R3
|
2020-01-17 13:59:59 -07:00
|
|
|
MOVD 40(R1), R5
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
JMP return
|
2018-08-23 17:16:19 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·rtsigprocmask(SB),NOSPLIT|NOFRAME,$0-28
|
2016-09-23 18:54:51 -06:00
|
|
|
MOVW how+0(FP), R3
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD new+8(FP), R4
|
|
|
|
MOVD old+16(FP), R5
|
|
|
|
MOVW size+24(FP), R6
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_rt_sigprocmask
|
|
|
|
BVC 2(PC)
|
2017-04-12 12:22:16 -06:00
|
|
|
MOVD R0, 0xf0(R0) // crash
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·rt_sigaction(SB),NOSPLIT|NOFRAME,$0-36
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD sig+0(FP), R3
|
|
|
|
MOVD new+8(FP), R4
|
|
|
|
MOVD old+16(FP), R5
|
|
|
|
MOVD size+24(FP), R6
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_rt_sigaction
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+32(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2021-03-31 11:28:47 -06:00
|
|
|
#ifdef GOARCH_ppc64le
|
|
|
|
// Call the function stored in _cgo_sigaction using the GCC calling convention.
|
|
|
|
TEXT runtime·callCgoSigaction(SB),NOSPLIT,$0
|
|
|
|
MOVD sig+0(FP), R3
|
|
|
|
MOVD new+8(FP), R4
|
|
|
|
MOVD old+16(FP), R5
|
|
|
|
MOVD _cgo_sigaction(SB), R12
|
|
|
|
MOVD R12, CTR // R12 should contain the function address
|
|
|
|
MOVD R1, R15 // Save R1
|
|
|
|
MOVD R2, 24(R1) // Save R2
|
|
|
|
SUB $48, R1 // reserve 32 (frame) + 16 bytes for sp-8 where fp may be saved.
|
|
|
|
RLDICR $0, R1, $59, R1 // Align to 16 bytes for C code
|
|
|
|
BL (CTR)
|
|
|
|
XOR R0, R0, R0 // Clear R0 as Go expects
|
|
|
|
MOVD R15, R1 // Restore R1
|
|
|
|
MOVD 24(R1), R2 // Restore R2
|
|
|
|
MOVW R3, ret+24(FP) // Return result
|
|
|
|
RET
|
|
|
|
#endif
|
|
|
|
|
runtime: signal forwarding
Forward signals to signal handlers installed before Go installs its own,
under certain circumstances. In particular, as iant@ suggests, signals are
forwarded iff:
(1) a non-SIG_DFL signal handler existed before Go, and
(2) signal is synchronous (i.e., one of SIGSEGV, SIGBUS, SIGFPE), and
(3a) signal occured on a non-Go thread, or
(3b) signal occurred on a Go thread but in CGo code.
Supported only on Linux, for now.
Change-Id: I403219ee47b26cf65da819fb86cf1ec04d3e25f5
Reviewed-on: https://go-review.googlesource.com/8712
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2015-04-09 12:12:12 -06:00
|
|
|
TEXT runtime·sigfwd(SB),NOSPLIT,$0-32
|
|
|
|
MOVW sig+8(FP), R3
|
|
|
|
MOVD info+16(FP), R4
|
|
|
|
MOVD ctx+24(FP), R5
|
2015-10-08 03:49:39 -06:00
|
|
|
MOVD fn+0(FP), R12
|
|
|
|
MOVD R12, CTR
|
runtime: signal forwarding
Forward signals to signal handlers installed before Go installs its own,
under certain circumstances. In particular, as iant@ suggests, signals are
forwarded iff:
(1) a non-SIG_DFL signal handler existed before Go, and
(2) signal is synchronous (i.e., one of SIGSEGV, SIGBUS, SIGFPE), and
(3a) signal occured on a non-Go thread, or
(3b) signal occurred on a Go thread but in CGo code.
Supported only on Linux, for now.
Change-Id: I403219ee47b26cf65da819fb86cf1ec04d3e25f5
Reviewed-on: https://go-review.googlesource.com/8712
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2015-04-09 12:12:12 -06:00
|
|
|
BL (CTR)
|
cmd/compile, cmd/link, runtime: on ppc64x, maintain the TOC pointer in R2 when compiling PIC
The PowerPC ISA does not have a PC-relative load instruction, which poses
obvious challenges when generating position-independent code. The way the ELFv2
ABI addresses this is to specify that r2 points to a per "module" (shared
library or executable) TOC pointer. Maintaining this pointer requires
cooperation between codegen and the system linker:
* Non-leaf functions leave space on the stack at r1+24 to save the TOC pointer.
* A call to a function that *might* have to go via a PLT stub must be followed
by a nop instruction that the system linker can replace with "ld r1, 24(r1)"
to restore the TOC pointer (only when dynamically linking Go code).
* When calling a function via a function pointer, the address of the function
must be in r12, and the first couple of instructions (the "global entry
point") of the called function use this to derive the address of the TOC
for the module it is in.
* When calling a function that is implemented in the same module, the system
linker adjusts the call to skip over the instructions mentioned above (the
"local entry point"), assuming that r2 is already correctly set.
So this changeset adds the global entry point instructions, sets the metadata so
the system linker knows where the local entry point is, inserts code to save the
TOC pointer at 24(r1), adds a nop after any call not known to be local and copes
with the odd non-local code transfer in the runtime (e.g. the stuff around
jmpdefer). It does not actually compile PIC yet.
Change-Id: I7522e22bdfd2f891745a900c60254fe9e372c854
Reviewed-on: https://go-review.googlesource.com/15967
Reviewed-by: Russ Cox <rsc@golang.org>
2015-10-15 20:42:09 -06:00
|
|
|
MOVD 24(R1), R2
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
runtime: signal forwarding
Forward signals to signal handlers installed before Go installs its own,
under certain circumstances. In particular, as iant@ suggests, signals are
forwarded iff:
(1) a non-SIG_DFL signal handler existed before Go, and
(2) signal is synchronous (i.e., one of SIGSEGV, SIGBUS, SIGFPE), and
(3a) signal occured on a non-Go thread, or
(3b) signal occurred on a Go thread but in CGo code.
Supported only on Linux, for now.
Change-Id: I403219ee47b26cf65da819fb86cf1ec04d3e25f5
Reviewed-on: https://go-review.googlesource.com/8712
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2015-04-09 12:12:12 -06:00
|
|
|
|
2019-05-08 11:59:48 -06:00
|
|
|
TEXT runtime·sigreturn(SB),NOSPLIT,$0-0
|
|
|
|
RET
|
|
|
|
|
2014-12-05 17:13:20 -07:00
|
|
|
#ifdef GOARCH_ppc64le
|
|
|
|
// ppc64le doesn't need function descriptors
|
2021-03-31 11:28:47 -06:00
|
|
|
// Save callee-save registers in the case of signal forwarding.
|
|
|
|
// Same as on ARM64 https://golang.org/issue/31827 .
|
|
|
|
TEXT runtime·sigtramp(SB),NOSPLIT|NOFRAME,$0
|
2014-08-12 17:48:49 -06:00
|
|
|
#else
|
|
|
|
// function descriptor for the real sigtramp
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·sigtramp(SB),NOSPLIT|NOFRAME,$0
|
2019-05-08 11:59:48 -06:00
|
|
|
DWORD $sigtramp<>(SB)
|
2014-08-12 17:48:49 -06:00
|
|
|
DWORD $0
|
|
|
|
DWORD $0
|
2022-04-26 12:42:34 -06:00
|
|
|
TEXT sigtramp<>(SB),NOSPLIT|NOFRAME|TOPFRAME,$0
|
2014-08-12 17:48:49 -06:00
|
|
|
#endif
|
2021-03-31 11:28:47 -06:00
|
|
|
// Start with standard C stack frame layout and linkage.
|
|
|
|
MOVD LR, R0
|
|
|
|
MOVD R0, 16(R1) // Save LR in caller's frame.
|
|
|
|
MOVW CR, R0 // Save CR in caller's frame
|
|
|
|
MOVD R0, 8(R1)
|
|
|
|
// The stack must be acquired here and not
|
|
|
|
// in the automatic way based on stack size
|
|
|
|
// since that sequence clobbers R31 before it
|
|
|
|
// gets saved.
|
|
|
|
// We are being ultra safe here in saving the
|
|
|
|
// Vregs. The case where they might need to
|
|
|
|
// be saved is very unlikely.
|
|
|
|
MOVDU R1, -544(R1)
|
|
|
|
MOVD R14, 64(R1)
|
|
|
|
MOVD R15, 72(R1)
|
|
|
|
MOVD R16, 80(R1)
|
|
|
|
MOVD R17, 88(R1)
|
|
|
|
MOVD R18, 96(R1)
|
|
|
|
MOVD R19, 104(R1)
|
|
|
|
MOVD R20, 112(R1)
|
|
|
|
MOVD R21, 120(R1)
|
|
|
|
MOVD R22, 128(R1)
|
|
|
|
MOVD R23, 136(R1)
|
|
|
|
MOVD R24, 144(R1)
|
|
|
|
MOVD R25, 152(R1)
|
|
|
|
MOVD R26, 160(R1)
|
|
|
|
MOVD R27, 168(R1)
|
|
|
|
MOVD R28, 176(R1)
|
|
|
|
MOVD R29, 184(R1)
|
|
|
|
MOVD g, 192(R1) // R30
|
|
|
|
MOVD R31, 200(R1)
|
|
|
|
FMOVD F14, 208(R1)
|
|
|
|
FMOVD F15, 216(R1)
|
|
|
|
FMOVD F16, 224(R1)
|
|
|
|
FMOVD F17, 232(R1)
|
|
|
|
FMOVD F18, 240(R1)
|
|
|
|
FMOVD F19, 248(R1)
|
|
|
|
FMOVD F20, 256(R1)
|
|
|
|
FMOVD F21, 264(R1)
|
|
|
|
FMOVD F22, 272(R1)
|
|
|
|
FMOVD F23, 280(R1)
|
|
|
|
FMOVD F24, 288(R1)
|
|
|
|
FMOVD F25, 296(R1)
|
|
|
|
FMOVD F26, 304(R1)
|
|
|
|
FMOVD F27, 312(R1)
|
|
|
|
FMOVD F28, 320(R1)
|
|
|
|
FMOVD F29, 328(R1)
|
|
|
|
FMOVD F30, 336(R1)
|
|
|
|
FMOVD F31, 344(R1)
|
|
|
|
// Save V regs
|
|
|
|
// STXVD2X and LXVD2X used since
|
|
|
|
// we aren't sure of alignment.
|
|
|
|
// Endianness doesn't matter
|
|
|
|
// if we are just loading and
|
|
|
|
// storing values.
|
|
|
|
MOVD $352, R7 // V20
|
|
|
|
STXVD2X VS52, (R7)(R1)
|
|
|
|
ADD $16, R7 // V21 368
|
|
|
|
STXVD2X VS53, (R7)(R1)
|
|
|
|
ADD $16, R7 // V22 384
|
|
|
|
STXVD2X VS54, (R7)(R1)
|
|
|
|
ADD $16, R7 // V23 400
|
|
|
|
STXVD2X VS55, (R7)(R1)
|
|
|
|
ADD $16, R7 // V24 416
|
|
|
|
STXVD2X VS56, (R7)(R1)
|
|
|
|
ADD $16, R7 // V25 432
|
|
|
|
STXVD2X VS57, (R7)(R1)
|
|
|
|
ADD $16, R7 // V26 448
|
|
|
|
STXVD2X VS58, (R7)(R1)
|
|
|
|
ADD $16, R7 // V27 464
|
|
|
|
STXVD2X VS59, (R7)(R1)
|
|
|
|
ADD $16, R7 // V28 480
|
|
|
|
STXVD2X VS60, (R7)(R1)
|
|
|
|
ADD $16, R7 // V29 496
|
|
|
|
STXVD2X VS61, (R7)(R1)
|
|
|
|
ADD $16, R7 // V30 512
|
|
|
|
STXVD2X VS62, (R7)(R1)
|
|
|
|
ADD $16, R7 // V31 528
|
|
|
|
STXVD2X VS63, (R7)(R1)
|
|
|
|
|
2014-08-12 17:48:49 -06:00
|
|
|
// initialize essential registers (just in case)
|
|
|
|
BL runtime·reginit(SB)
|
|
|
|
|
2014-12-16 16:34:55 -07:00
|
|
|
// this might be called in external code context,
|
|
|
|
// where g is not set.
|
2018-10-22 14:02:43 -06:00
|
|
|
MOVBZ runtime·iscgo(SB), R6
|
runtime: fix crash during VDSO calls on PowerPC
This patch reinstates a fix for PowerPC with regard to making VDSO calls
while receiving a signal, and subsequently crashing. The crash happens
because certain VDSO calls can modify the r30 register, which is where g
is stored. This change was reverted for PowerPC because r30 is supposed
to be a non-volatile register. This is true, but that only makes a
guarantee across function calls, but not "within" a function call. This
patch was seemingly fine before because the Linux kernel still had hand
rolled assembly VDSO function calls, however with a recent change to C
function calls it seems the compiler used can generate instructions
which temporarily clobber r30. This means that when we receive a signal
during one of these calls the value of r30 will not be the g as the
runtime expects, causing a segfault.
You can see from this assembly dump how the register is clobbered during
the call:
(the following is from a 5.13rc2 kernel)
```
Dump of assembler code for function __cvdso_clock_gettime_data:
0x00007ffff7ff0700 <+0>: cmplwi r4,15
0x00007ffff7ff0704 <+4>: bgt 0x7ffff7ff07f0 <__cvdso_clock_gettime_data+240>
0x00007ffff7ff0708 <+8>: li r9,1
0x00007ffff7ff070c <+12>: slw r9,r9,r4
0x00007ffff7ff0710 <+16>: andi. r10,r9,2179
0x00007ffff7ff0714 <+20>: beq 0x7ffff7ff0810 <__cvdso_clock_gettime_data+272>
0x00007ffff7ff0718 <+24>: rldicr r10,r4,4,59
0x00007ffff7ff071c <+28>: lis r9,32767
0x00007ffff7ff0720 <+32>: std r30,-16(r1)
0x00007ffff7ff0724 <+36>: std r31,-8(r1)
0x00007ffff7ff0728 <+40>: add r6,r3,r10
0x00007ffff7ff072c <+44>: ori r4,r9,65535
0x00007ffff7ff0730 <+48>: lwz r8,0(r3)
0x00007ffff7ff0734 <+52>: andi. r9,r8,1
0x00007ffff7ff0738 <+56>: bne 0x7ffff7ff07d0 <__cvdso_clock_gettime_data+208>
0x00007ffff7ff073c <+60>: lwsync
0x00007ffff7ff0740 <+64>: mftb r30 <---- RIGHT HERE
=> 0x00007ffff7ff0744 <+68>: ld r12,40(r6)
```
What I believe is happening is that the kernel changed the PowerPC VDSO
calls to use standard C calls instead of using hand rolled assembly. The
hand rolled assembly calls never touched r30, so this change was safe to
roll back. That does not seem to be the case anymore as on the 5.13rc2
kernel the compiler *is* generating assembly which modifies r30, making
this change again unsafe and causing a crash when the program receives a
signal during these calls (which will happen often due to async
preempt). This change happened here:
https://lwn.net/ml/linux-kernel/235e5571959cfa89ced081d7e838ed5ff38447d2.1601365870.git.christophe.leroy@csgroup.eu/.
I realize this was reverted due to unexplained hangs in PowerPC
builders, but I think we should reinstate this change and investigate
those issues separately:
https://github.com/golang/go/commit/f4ca3c1e0a2066ca4f7bd6203866d282ed34acf2
Fixes #46803
Change-Id: Ib18d7bbfc80a1a9cb558f0098878d41081324b52
GitHub-Last-Rev: c3002bcfca3ef58b27485e31328e6297b7a9dfe7
GitHub-Pull-Request: golang/go#46767
Reviewed-on: https://go-review.googlesource.com/c/go/+/328110
Run-TryBot: Lynn Boger <laboger@linux.vnet.ibm.com>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Cherry Mui <cherryyz@google.com>
Trust: Lynn Boger <laboger@linux.vnet.ibm.com>
2021-06-17 14:22:40 -06:00
|
|
|
CMP R6, $0
|
2014-12-16 16:34:55 -07:00
|
|
|
BEQ 2(PC)
|
|
|
|
BL runtime·load_g(SB)
|
|
|
|
|
2015-10-08 03:34:29 -06:00
|
|
|
MOVW R3, FIXED_FRAME+0(R1)
|
|
|
|
MOVD R4, FIXED_FRAME+8(R1)
|
|
|
|
MOVD R5, FIXED_FRAME+16(R1)
|
2015-10-08 03:49:39 -06:00
|
|
|
MOVD $runtime·sigtrampgo(SB), R12
|
|
|
|
MOVD R12, CTR
|
runtime: signal forwarding
Forward signals to signal handlers installed before Go installs its own,
under certain circumstances. In particular, as iant@ suggests, signals are
forwarded iff:
(1) a non-SIG_DFL signal handler existed before Go, and
(2) signal is synchronous (i.e., one of SIGSEGV, SIGBUS, SIGFPE), and
(3a) signal occured on a non-Go thread, or
(3b) signal occurred on a Go thread but in CGo code.
Supported only on Linux, for now.
Change-Id: I403219ee47b26cf65da819fb86cf1ec04d3e25f5
Reviewed-on: https://go-review.googlesource.com/8712
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2015-04-09 12:12:12 -06:00
|
|
|
BL (CTR)
|
2021-03-31 11:28:47 -06:00
|
|
|
MOVD 24(R1), R2 // Should this be here? Where is it saved?
|
|
|
|
// Starts at 64; FIXED_FRAME is 32
|
|
|
|
MOVD 64(R1), R14
|
|
|
|
MOVD 72(R1), R15
|
|
|
|
MOVD 80(R1), R16
|
|
|
|
MOVD 88(R1), R17
|
|
|
|
MOVD 96(R1), R18
|
|
|
|
MOVD 104(R1), R19
|
|
|
|
MOVD 112(R1), R20
|
|
|
|
MOVD 120(R1), R21
|
|
|
|
MOVD 128(R1), R22
|
|
|
|
MOVD 136(R1), R23
|
|
|
|
MOVD 144(R1), R24
|
|
|
|
MOVD 152(R1), R25
|
|
|
|
MOVD 160(R1), R26
|
|
|
|
MOVD 168(R1), R27
|
|
|
|
MOVD 176(R1), R28
|
|
|
|
MOVD 184(R1), R29
|
|
|
|
MOVD 192(R1), g // R30
|
|
|
|
MOVD 200(R1), R31
|
|
|
|
FMOVD 208(R1), F14
|
|
|
|
FMOVD 216(R1), F15
|
|
|
|
FMOVD 224(R1), F16
|
|
|
|
FMOVD 232(R1), F17
|
|
|
|
FMOVD 240(R1), F18
|
|
|
|
FMOVD 248(R1), F19
|
|
|
|
FMOVD 256(R1), F20
|
|
|
|
FMOVD 264(R1), F21
|
|
|
|
FMOVD 272(R1), F22
|
|
|
|
FMOVD 280(R1), F23
|
|
|
|
FMOVD 288(R1), F24
|
|
|
|
FMOVD 292(R1), F25
|
|
|
|
FMOVD 300(R1), F26
|
|
|
|
FMOVD 308(R1), F27
|
|
|
|
FMOVD 316(R1), F28
|
|
|
|
FMOVD 328(R1), F29
|
|
|
|
FMOVD 336(R1), F30
|
|
|
|
FMOVD 344(R1), F31
|
|
|
|
MOVD $352, R7
|
|
|
|
LXVD2X (R7)(R1), VS52
|
|
|
|
ADD $16, R7 // 368 V21
|
|
|
|
LXVD2X (R7)(R1), VS53
|
|
|
|
ADD $16, R7 // 384 V22
|
|
|
|
LXVD2X (R7)(R1), VS54
|
|
|
|
ADD $16, R7 // 400 V23
|
|
|
|
LXVD2X (R7)(R1), VS55
|
|
|
|
ADD $16, R7 // 416 V24
|
|
|
|
LXVD2X (R7)(R1), VS56
|
|
|
|
ADD $16, R7 // 432 V25
|
|
|
|
LXVD2X (R7)(R1), VS57
|
|
|
|
ADD $16, R7 // 448 V26
|
|
|
|
LXVD2X (R7)(R1), VS58
|
|
|
|
ADD $16, R8 // 464 V27
|
|
|
|
LXVD2X (R7)(R1), VS59
|
|
|
|
ADD $16, R7 // 480 V28
|
|
|
|
LXVD2X (R7)(R1), VS60
|
|
|
|
ADD $16, R7 // 496 V29
|
|
|
|
LXVD2X (R7)(R1), VS61
|
|
|
|
ADD $16, R7 // 512 V30
|
|
|
|
LXVD2X (R7)(R1), VS62
|
|
|
|
ADD $16, R7 // 528 V31
|
|
|
|
LXVD2X (R7)(R1), VS63
|
|
|
|
ADD $544, R1
|
|
|
|
MOVD 8(R1), R0
|
|
|
|
MOVFL R0, $0xff
|
|
|
|
MOVD 16(R1), R0
|
|
|
|
MOVD R0, LR
|
|
|
|
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-12-11 18:16:48 -07:00
|
|
|
#ifdef GOARCH_ppc64le
|
|
|
|
// ppc64le doesn't need function descriptors
|
2017-10-20 12:26:28 -06:00
|
|
|
TEXT runtime·cgoSigtramp(SB),NOSPLIT|NOFRAME,$0
|
|
|
|
// The stack unwinder, presumably written in C, may not be able to
|
|
|
|
// handle Go frame correctly. So, this function is NOFRAME, and we
|
2018-10-07 19:19:51 -06:00
|
|
|
// save/restore LR manually.
|
2017-10-20 12:26:28 -06:00
|
|
|
MOVD LR, R10
|
|
|
|
|
|
|
|
// We're coming from C code, initialize essential registers.
|
|
|
|
CALL runtime·reginit(SB)
|
|
|
|
|
|
|
|
// If no traceback function, do usual sigtramp.
|
|
|
|
MOVD runtime·cgoTraceback(SB), R6
|
|
|
|
CMP $0, R6
|
|
|
|
BEQ sigtramp
|
|
|
|
|
|
|
|
// If no traceback support function, which means that
|
|
|
|
// runtime/cgo was not linked in, do usual sigtramp.
|
|
|
|
MOVD _cgo_callers(SB), R6
|
|
|
|
CMP $0, R6
|
|
|
|
BEQ sigtramp
|
|
|
|
|
|
|
|
// Set up g register.
|
|
|
|
CALL runtime·load_g(SB)
|
|
|
|
|
|
|
|
// Figure out if we are currently in a cgo call.
|
|
|
|
// If not, just do usual sigtramp.
|
2021-03-31 11:28:47 -06:00
|
|
|
// compared to ARM64 and others.
|
2017-10-20 12:26:28 -06:00
|
|
|
CMP $0, g
|
|
|
|
BEQ sigtrampnog // g == nil
|
|
|
|
MOVD g_m(g), R6
|
|
|
|
CMP $0, R6
|
|
|
|
BEQ sigtramp // g.m == nil
|
|
|
|
MOVW m_ncgo(R6), R7
|
|
|
|
CMPW $0, R7
|
|
|
|
BEQ sigtramp // g.m.ncgo = 0
|
|
|
|
MOVD m_curg(R6), R7
|
|
|
|
CMP $0, R7
|
|
|
|
BEQ sigtramp // g.m.curg == nil
|
|
|
|
MOVD g_syscallsp(R7), R7
|
|
|
|
CMP $0, R7
|
|
|
|
BEQ sigtramp // g.m.curg.syscallsp == 0
|
|
|
|
MOVD m_cgoCallers(R6), R7 // R7 is the fifth arg in C calling convention.
|
|
|
|
CMP $0, R7
|
|
|
|
BEQ sigtramp // g.m.cgoCallers == nil
|
|
|
|
MOVW m_cgoCallersUse(R6), R8
|
|
|
|
CMPW $0, R8
|
|
|
|
BNE sigtramp // g.m.cgoCallersUse != 0
|
|
|
|
|
|
|
|
// Jump to a function in runtime/cgo.
|
|
|
|
// That function, written in C, will call the user's traceback
|
|
|
|
// function with proper unwind info, and will then call back here.
|
|
|
|
// The first three arguments, and the fifth, are already in registers.
|
|
|
|
// Set the two remaining arguments now.
|
|
|
|
MOVD runtime·cgoTraceback(SB), R6
|
|
|
|
MOVD $runtime·sigtramp(SB), R8
|
|
|
|
MOVD _cgo_callers(SB), R12
|
|
|
|
MOVD R12, CTR
|
|
|
|
MOVD R10, LR // restore LR
|
|
|
|
JMP (CTR)
|
|
|
|
|
|
|
|
sigtramp:
|
|
|
|
MOVD R10, LR // restore LR
|
|
|
|
JMP runtime·sigtramp(SB)
|
|
|
|
|
|
|
|
sigtrampnog:
|
|
|
|
// Signal arrived on a non-Go thread. If this is SIGPROF, get a
|
|
|
|
// stack trace.
|
|
|
|
CMPW R3, $27 // 27 == SIGPROF
|
|
|
|
BNE sigtramp
|
|
|
|
|
|
|
|
// Lock sigprofCallersUse (cas from 0 to 1).
|
|
|
|
MOVW $1, R7
|
|
|
|
MOVD $runtime·sigprofCallersUse(SB), R8
|
|
|
|
SYNC
|
|
|
|
LWAR (R8), R6
|
|
|
|
CMPW $0, R6
|
|
|
|
BNE sigtramp
|
|
|
|
STWCCC R7, (R8)
|
|
|
|
BNE -4(PC)
|
|
|
|
ISYNC
|
|
|
|
|
|
|
|
// Jump to the traceback function in runtime/cgo.
|
|
|
|
// It will call back to sigprofNonGo, which will ignore the
|
|
|
|
// arguments passed in registers.
|
|
|
|
// First three arguments to traceback function are in registers already.
|
|
|
|
MOVD runtime·cgoTraceback(SB), R6
|
|
|
|
MOVD $runtime·sigprofCallers(SB), R7
|
|
|
|
MOVD $runtime·sigprofNonGoWrapper<>(SB), R8
|
|
|
|
MOVD _cgo_callers(SB), R12
|
|
|
|
MOVD R12, CTR
|
|
|
|
MOVD R10, LR // restore LR
|
|
|
|
JMP (CTR)
|
2015-12-11 18:16:48 -07:00
|
|
|
#else
|
|
|
|
// function descriptor for the real sigtramp
|
|
|
|
TEXT runtime·cgoSigtramp(SB),NOSPLIT|NOFRAME,$0
|
2019-05-08 11:59:48 -06:00
|
|
|
DWORD $cgoSigtramp<>(SB)
|
2015-12-11 18:16:48 -07:00
|
|
|
DWORD $0
|
|
|
|
DWORD $0
|
2019-05-08 11:59:48 -06:00
|
|
|
TEXT cgoSigtramp<>(SB),NOSPLIT,$0
|
|
|
|
JMP sigtramp<>(SB)
|
2015-12-11 18:16:48 -07:00
|
|
|
#endif
|
2017-10-20 12:26:28 -06:00
|
|
|
|
|
|
|
TEXT runtime·sigprofNonGoWrapper<>(SB),NOSPLIT,$0
|
|
|
|
// We're coming from C code, set up essential register, then call sigprofNonGo.
|
|
|
|
CALL runtime·reginit(SB)
|
2021-08-13 10:01:13 -06:00
|
|
|
MOVW R3, FIXED_FRAME+0(R1) // sig
|
|
|
|
MOVD R4, FIXED_FRAME+8(R1) // info
|
|
|
|
MOVD R5, FIXED_FRAME+16(R1) // ctx
|
2017-10-20 12:26:28 -06:00
|
|
|
CALL runtime·sigprofNonGo(SB)
|
|
|
|
RET
|
2015-12-11 18:16:48 -07:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·mmap(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD addr+0(FP), R3
|
|
|
|
MOVD n+8(FP), R4
|
|
|
|
MOVW prot+16(FP), R5
|
|
|
|
MOVW flags+20(FP), R6
|
|
|
|
MOVW fd+24(FP), R7
|
|
|
|
MOVW off+28(FP), R8
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
SYSCALL $SYS_mmap
|
2017-10-16 18:28:29 -06:00
|
|
|
BVC ok
|
|
|
|
MOVD $0, p+32(FP)
|
|
|
|
MOVD R3, err+40(FP)
|
|
|
|
RET
|
|
|
|
ok:
|
|
|
|
MOVD R3, p+32(FP)
|
|
|
|
MOVD $0, err+40(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·munmap(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD addr+0(FP), R3
|
|
|
|
MOVD n+8(FP), R4
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_munmap
|
|
|
|
BVC 2(PC)
|
2017-04-12 12:22:16 -06:00
|
|
|
MOVD R0, 0xf0(R0)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·madvise(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD addr+0(FP), R3
|
|
|
|
MOVD n+8(FP), R4
|
|
|
|
MOVW flags+16(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_madvise
|
2018-09-14 01:57:06 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// int64 futex(int32 *uaddr, int32 op, int32 val,
|
|
|
|
// struct timespec *timeout, int32 *uaddr2, int32 val2);
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·futex(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD addr+0(FP), R3
|
|
|
|
MOVW op+8(FP), R4
|
|
|
|
MOVW val+12(FP), R5
|
|
|
|
MOVD ts+16(FP), R6
|
|
|
|
MOVD addr2+24(FP), R7
|
|
|
|
MOVW val3+32(FP), R8
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_futex
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+40(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2014-10-27 15:27:03 -06:00
|
|
|
// int64 clone(int32 flags, void *stk, M *mp, G *gp, void (*fn)(void));
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·clone(SB),NOSPLIT|NOFRAME,$0
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVW flags+0(FP), R3
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD stk+8(FP), R4
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// Copy mp, gp, fn off parent stack for use by child.
|
|
|
|
// Careful: Linux system call clobbers ???.
|
2016-07-11 17:05:57 -06:00
|
|
|
MOVD mp+16(FP), R7
|
|
|
|
MOVD gp+24(FP), R8
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVD fn+32(FP), R12
|
|
|
|
|
|
|
|
MOVD R7, -8(R4)
|
|
|
|
MOVD R8, -16(R4)
|
|
|
|
MOVD R12, -24(R4)
|
|
|
|
MOVD $1234, R7
|
|
|
|
MOVD R7, -32(R4)
|
|
|
|
|
|
|
|
SYSCALL $SYS_clone
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// In parent, return.
|
|
|
|
CMP R3, $0
|
2014-10-27 15:27:03 -06:00
|
|
|
BEQ 3(PC)
|
|
|
|
MOVW R3, ret+40(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// In child, on new stack.
|
|
|
|
// initialize essential registers
|
|
|
|
BL runtime·reginit(SB)
|
|
|
|
MOVD -32(R1), R7
|
|
|
|
CMP R7, $1234
|
|
|
|
BEQ 2(PC)
|
|
|
|
MOVD R0, 0(R0)
|
|
|
|
|
|
|
|
// Initialize m->procid to Linux tid
|
|
|
|
SYSCALL $SYS_gettid
|
|
|
|
|
2015-04-17 18:27:07 -06:00
|
|
|
MOVD -24(R1), R12 // fn
|
|
|
|
MOVD -16(R1), R8 // g
|
|
|
|
MOVD -8(R1), R7 // m
|
|
|
|
|
|
|
|
CMP R7, $0
|
|
|
|
BEQ nog
|
|
|
|
CMP R8, $0
|
|
|
|
BEQ nog
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
MOVD R3, m_procid(R7)
|
|
|
|
|
|
|
|
// TODO: setup TLS.
|
|
|
|
|
|
|
|
// In child, set up new stack
|
|
|
|
MOVD R7, g_m(R8)
|
|
|
|
MOVD R8, g
|
|
|
|
//CALL runtime·stackcheck(SB)
|
|
|
|
|
2015-04-17 18:27:07 -06:00
|
|
|
nog:
|
2014-08-12 17:48:49 -06:00
|
|
|
// Call fn
|
|
|
|
MOVD R12, CTR
|
|
|
|
BL (CTR)
|
|
|
|
|
2015-04-22 16:03:18 -06:00
|
|
|
// It shouldn't return. If it does, exit that thread.
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVW $111, R3
|
2015-04-22 16:03:18 -06:00
|
|
|
SYSCALL $SYS_exit
|
2014-08-12 17:48:49 -06:00
|
|
|
BR -2(PC) // keep exiting
|
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·sigaltstack(SB),NOSPLIT|NOFRAME,$0
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVD new+0(FP), R3
|
|
|
|
MOVD old+8(FP), R4
|
|
|
|
SYSCALL $SYS_sigaltstack
|
|
|
|
BVC 2(PC)
|
2017-04-12 12:22:16 -06:00
|
|
|
MOVD R0, 0xf0(R0) // crash
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·osyield(SB),NOSPLIT|NOFRAME,$0
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_sched_yield
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·sched_getaffinity(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVD pid+0(FP), R3
|
|
|
|
MOVD len+8(FP), R4
|
|
|
|
MOVD buf+16(FP), R5
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_sched_getaffinity
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// int32 runtime·epollcreate(int32 size);
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·epollcreate(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW size+0(FP), R3
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_epoll_create
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+8(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// int32 runtime·epollcreate1(int32 flags);
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·epollcreate1(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW flags+0(FP), R3
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_epoll_create1
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+8(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
2014-10-27 15:27:03 -06:00
|
|
|
// func epollctl(epfd, op, fd int32, ev *epollEvent) int
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·epollctl(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW epfd+0(FP), R3
|
|
|
|
MOVW op+4(FP), R4
|
|
|
|
MOVW fd+8(FP), R5
|
|
|
|
MOVD ev+16(FP), R6
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_epoll_ctl
|
2018-01-23 00:56:24 -07:00
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// int32 runtime·epollwait(int32 epfd, EpollEvent *ev, int32 nev, int32 timeout);
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·epollwait(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW epfd+0(FP), R3
|
|
|
|
MOVD ev+8(FP), R4
|
|
|
|
MOVW nev+16(FP), R5
|
|
|
|
MOVW timeout+20(FP), R6
|
2014-08-12 17:48:49 -06:00
|
|
|
SYSCALL $SYS_epoll_wait
|
2018-07-25 12:44:07 -06:00
|
|
|
BVC 2(PC)
|
|
|
|
NEG R3 // caller expects negative errno
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW R3, ret+24(FP)
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2014-08-12 17:48:49 -06:00
|
|
|
|
|
|
|
// void runtime·closeonexec(int32 fd);
|
2015-10-08 17:44:27 -06:00
|
|
|
TEXT runtime·closeonexec(SB),NOSPLIT|NOFRAME,$0
|
2014-10-27 15:27:03 -06:00
|
|
|
MOVW fd+0(FP), R3 // fd
|
2014-08-12 17:48:49 -06:00
|
|
|
MOVD $2, R4 // F_SETFD
|
|
|
|
MOVD $1, R5 // FD_CLOEXEC
|
|
|
|
SYSCALL $SYS_fcntl
|
2015-06-03 12:59:27 -06:00
|
|
|
RET
|
2017-04-06 12:32:37 -06:00
|
|
|
|
|
|
|
// func sbrk0() uintptr
|
|
|
|
TEXT runtime·sbrk0(SB),NOSPLIT|NOFRAME,$0
|
|
|
|
// Implemented as brk(NULL).
|
|
|
|
MOVD $0, R3
|
|
|
|
SYSCALL $SYS_brk
|
|
|
|
MOVD R3, ret+0(FP)
|
|
|
|
RET
|
2019-05-08 09:44:15 -06:00
|
|
|
|
|
|
|
TEXT runtime·access(SB),$0-20
|
|
|
|
MOVD R0, 0(R0) // unimplemented, only needed for android; declared in stubs_linux.go
|
|
|
|
MOVW R0, ret+16(FP) // for vet
|
|
|
|
RET
|
|
|
|
|
|
|
|
TEXT runtime·connect(SB),$0-28
|
|
|
|
MOVD R0, 0(R0) // unimplemented, only needed for android; declared in stubs_linux.go
|
|
|
|
MOVW R0, ret+24(FP) // for vet
|
|
|
|
RET
|
|
|
|
|
|
|
|
TEXT runtime·socket(SB),$0-20
|
|
|
|
MOVD R0, 0(R0) // unimplemented, only needed for android; declared in stubs_linux.go
|
|
|
|
MOVW R0, ret+16(FP) // for vet
|
|
|
|
RET
|