[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230527012635.19595-1-falcon@tinylab.org>
Date: Sat, 27 May 2023 09:26:35 +0800
From: Zhangjin Wu <falcon@...ylab.org>
To: thomas@...ch.de, w@....eu
Cc: falcon@...ylab.org, linux-kernel@...r.kernel.org,
linux-kselftest@...r.kernel.org, linux-riscv@...ts.infradead.org,
palmer@...belt.com, paul.walmsley@...ive.com
Subject: Re: [PATCH 13/13] tools/nolibc: sys_gettimeofday: riscv: use __NR_clock_gettime64 for rv32
Hi, Thomas, Willy
> On 2023-05-25 02:03:32+0800, Zhangjin Wu wrote:
> > rv32 uses the generic include/uapi/asm-generic/unistd.h and it has no
> > __NR_gettimeofday and __NR_clock_gettime after kernel commit d4c08b9776b3
> > ("riscv: Use latest system call ABI"), use __NR_clock_gettime64 instead.
> >
> > This code is based on src/time/gettimeofday.c of musl and
> > sysdeps/unix/sysv/linux/clock_gettime.c of glibc.
> >
> > Both __NR_clock_gettime and __NR_clock_gettime64 are added for
> > sys_gettimeofday() for they share most of the code.
> >
> > Notes:
> >
> > * Both tv and tz are not directly passed to kernel clock_gettime*
> > syscalls, so, it isn't able to check the pointer automatically with the
> > get_user/put_user helpers just like kernel gettimeofday syscall does.
> > instead, we emulate (but not completely) such checks in our new
> > __NR_clock_gettime* branch of nolibc.
> >
> > * kernel clock_gettime* syscalls can not get tz info, just like musl and
> > glibc do, we set tz to zero to avoid a random number.
> >
> > Signed-off-by: Zhangjin Wu <falcon@...ylab.org>
> > ---
> > tools/include/nolibc/sys.h | 46 ++++++++++++++++++++++++++++++++++++++
> > 1 file changed, 46 insertions(+)
> >
> > diff --git a/tools/include/nolibc/sys.h b/tools/include/nolibc/sys.h
> > index 2642b380c6aa..ad38cc3856be 100644
> > --- a/tools/include/nolibc/sys.h
> > +++ b/tools/include/nolibc/sys.h
> > @@ -26,6 +26,7 @@
> >
> > #include "arch.h"
> > #include "errno.h"
> > +#include "string.h"
> > #include "types.h"
> >
> >
> > @@ -51,6 +52,11 @@
> > * should not be placed here.
> > */
> >
> > +/*
> > + * This is the first address past the end of the text segment (the program code).
> > + */
> > +
> > +extern char etext;
> >
> > /*
> > * int brk(void *addr);
> > @@ -554,7 +560,47 @@ long getpagesize(void)
> > static __attribute__((unused))
> > int sys_gettimeofday(struct timeval *tv, struct timezone *tz)
> > {
> > +#ifdef __NR_gettimeofday
> > return my_syscall2(__NR_gettimeofday, tv, tz);
> > +#elif defined(__NR_clock_gettime) || defined(__NR_clock_gettime64)
> > +#ifdef __NR_clock_gettime
> > + struct timespec ts;
> > +#else
> > + struct timespec64 ts;
> > +#define __NR_clock_gettime __NR_clock_gettime64
> > +#endif
> > + int ret;
> > +
> > + /* make sure tv pointer is at least after code segment */
> > + if (tv != NULL && (char *)tv <= &etext)
> > + return -EFAULT;
>
> To me the weird etext comparisions don't seem to be worth it, to be
> honest.
>
This is the issue we explained in commit message:
* Both tv and tz are not directly passed to kernel clock_gettime*
syscalls, so, it isn't able to check the pointer automatically with the
get_user/put_user helpers just like kernel gettimeofday syscall does.
instead, we emulate (but not completely) such checks in our new
__NR_clock_gettime* branch of nolibc.
but not that deeply described the direct cause, the direct cause is that the
test case passes a '(void *)1' and the kernel space of gettimeofday can simply
'fixup' this issue by the get_user/put_user helpers, but our user-space tv and
tz code has no such function, just emulate such 'fixup' by a stupid etext
compare to at least make sure the data pointer is in data range. Welcome better
solution.
CASE_TEST(gettimeofday_bad1); EXPECT_SYSER(1, gettimeofday((void *)1, NULL), -1, EFAULT); break;
CASE_TEST(gettimeofday_bad2); EXPECT_SYSER(1, gettimeofday(NULL, (void *)1), -1, EFAULT); break;
Without this ugly check, the above cases would get such error:
35 gettimeofday_bad1init[1]: unhandled signal 11 code 0x1 at 0x00000002 in init[10000+5000]
CPU: 0 PID: 1 Comm: init Not tainted 6.4.0-rc1-00134-gf929c7b7184f-dirty #20
Hardware name: riscv-virtio,qemu (DT)
epc : 00012ccc ra : 00012ca8 sp : 9d254d90
gp : 00016800 tp : 00000000 t0 : 00000000
t1 : 0000000a t2 : 00000000 s0 : 00000001
s1 : 00016008 a0 : 00000000 a1 : 9d254da8
a2 : 00000014 a3 : 00000000 a4 : 00000000
a5 : 00000000 a6 : 00000001 a7 : 00000193
s2 : 00000023 s3 : 9d254da4 s4 : 00000000
s5 : 00000000 s6 : 0000541b s7 : 00000007
s8 : 9d254dcc s9 : 000144e8 s10: 00016000
s11: 00000006 t3 : 00000000 t4 : ffffffff
t5 : 00000000 t6 : 00000000
status: 00000020 badaddr: 00000002 cause: 0000000f
Will at least append this test error in the commit message of the coming new
revision of this patch.
Hi, Willy, this also require your discussion, simply remove the above
two test cases may be not a good idea too, the check for gettimeofday is
perfectly ok.
The same 'emulate' method is used in the waitid patch, but that only
requires to compare 'pid == INT_MIN', which is not that weird.
> > +
> > + /* set tz to zero to avoid random number */
> > + if (tz != NULL) {
> > + if ((char *)tz > &etext)
> > + memset(tz, 0, sizeof(struct timezone));
> > + else
> > + return -EFAULT;
> > + }
> > +
The same issue here.
> > + if (tv == NULL)
> > + return 0;
> > +
> > + ret = my_syscall2(__NR_clock_gettime, CLOCK_REALTIME, &ts);
> > + if (ret)
> > + return ret;
> > +
> > + tv->tv_sec = (time_t) ts.tv_sec;
> > +#ifdef __NR_clock_gettime64
>
> Nitpick:
>
> While this ifdef works and is correct its logic is a bit indirect.
> If it is copied to some other function in the future it may be incorrect
> there.
>
> Without the #ifdef the compiler should still be able to optimize the
> code away.
Ok, will remove the #ifdef wrapper, let the compiler optimize itself.
Thanks,
Zhangjin
>
> > + if (tv->tv_sec != ts.tv_sec)
> > + return -EOVERFLOW;
> > +#endif
> > +
> > + tv->tv_usec = ts.tv_nsec / 1000;
> > + return 0;
> > +#else
> > +#error None of __NR_gettimeofday, __NR_clock_gettime and __NR_clock_gettime64 defined, cannot implement sys_gettimeofday()
> > +#endif
> > }
> >
> > static __attribute__((unused))
> > --
> > 2.25.1
> >
Powered by blists - more mailing lists