From: Ammar Faizi <[email protected]>
To: Willy Tarreau <[email protected]>
Cc: "Paul E. McKenney" <[email protected]>,
Alviro Iskandar Setiawan <[email protected]>,
Nugraha <[email protected]>,
Linux Kernel Mailing List <[email protected]>,
GNU/Weeb Mailing List <[email protected]>,
Ammar Faizi <[email protected]>
Subject: [RFC PATCH v1 0/6] Add dynamic memory allocator support for nolibc
Date: Sun, 20 Mar 2022 16:37:44 +0700 [thread overview]
Message-ID: <[email protected]> (raw)
Hi,
This is the v1 of RFC to add dynamic memory allocator support for
nolibc.
## Background
The need to allocate memory dynamically has become a requirement for
the C programming language. Mainly it happens when the allocation size
is determined at runtime. Many other use cases also do it when the
object's lifetime is long-lived and needs to be recycled at runtime.
Currently, the nolibc header doesn't support such a type of allocation.
This series adds it.
## Implementation
Add basic functions to manage dynamic memory allocation:
- malloc()
- calloc()
- realloc()
- free()
The allocator uses mmap() syscall to allocate the memory and uses
munmap() syscall to free the allocated memory.
The metadata to keep track the length for munmap-ing is simply
defined as a struct below:
```
struct nolibc_heap {
size_t len;
char user_p[] __attribute__((__aligned__));
};
```
malloc(), realloc() and calloc() return a pointer to `user_p`.
## Add my_syscall6() support for x86 32-bit.
mmap() needs 6 arguments to work with. Not all architectures that
nolibc supports have the my_syscall6() wrapper. This series also
adds my_syscall6() wrapper support for i386.
Notes:
Both Clang and GCC cannot use %ebp in the clobber list and in the "r"
constraint without using -fomit-frame-pointer. To make it always
available for any kind of compilation, the below workaround is
implemented.
For clang (the Assembly statement can't clobber %ebp):
1) Save the %ebp value to the redzone area -4(%esp).
2) Load the 6-th argument from memory to %ebp.
3) Subtract the %esp by 4.
4) Do the syscall (int $0x80).
5) Pop %ebp.
For GCC, fortunately it has a #pragma that can force a specific function
to be compiled with -fomit-frame-pointer, so it can use "r"(var) where
var is a variable bound to %ebp.
## Limitation
Currently, for mips and arm arch cannot use these dynamic memory allocator
functions because they're missing the my_syscall6() macro.
[ammarfaizi2: I would love to add the support for them too, but I don't
have the hardware to play with MIPS and ARM. ]
## Test
The following simple program can be used to test this series:
https://gist.github.com/ammarfaizi2/db0af6aa0b95a0c7478bce64e349f021
## Patchset Summary
1) Patch 1 is a fix for the System V ABI document link.
2) Patch 2 is a fix to support compile with clang.
3) Patch 3 adds my_syscall6() implementation for i386.
4) Patch 4 adds mmap() and munmap() functions.
5) Patch 5 adds malloc(), calloc(), realloc() and free().
6) Patch 6 adds strdup() and strndup().
Signed-off-by: Ammar Faizi <[email protected]>
---
Ammar Faizi (6):
tools/nolibc: x86-64: Update System V ABI document link
tools/nolibc: Make the entry point not weak for clang
tools/nolibc: i386: Implement syscall with 6 arguments
tools/nolibc/sys: Implement `mmap()` and `munmap()`
tools/nolibc/stdlib: Implement `malloc()`, `calloc()`, `realloc()` and `free()`
tools/include/string: Implement `strdup()` and `strndup()`
tools/include/nolibc/arch-aarch64.h | 2 +
tools/include/nolibc/arch-arm.h | 2 +
tools/include/nolibc/arch-i386.h | 66 ++++++++++++++++++++++++
tools/include/nolibc/arch-mips.h | 2 +
tools/include/nolibc/arch-riscv.h | 2 +
tools/include/nolibc/arch-x86_64.h | 4 +-
tools/include/nolibc/stdlib.h | 79 +++++++++++++++++++++++++++++
tools/include/nolibc/string.h | 68 +++++++++++++++++++++++++
tools/include/nolibc/sys.h | 62 ++++++++++++++++++++++
9 files changed, 286 insertions(+), 1 deletion(-)
base-commit: fda0d5d1b79d8b7032be3d7720a481a9fde91baf
--
Ammar Faizi
next reply other threads:[~2022-03-20 9:38 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-03-20 9:37 Ammar Faizi [this message]
2022-03-20 9:37 ` [RFC PATCH v1 1/6] tools/nolibc: x86-64: Update System V ABI document link Ammar Faizi
2022-03-20 9:37 ` [RFC PATCH v1 2/6] tools/nolibc: Make the entry point not weak for clang Ammar Faizi
2022-03-20 19:16 ` Willy Tarreau
2022-03-21 11:38 ` Ammar Faizi
2022-03-21 17:27 ` Nick Desaulniers
2022-03-20 9:37 ` [RFC PATCH v1 3/6] tools/nolibc: i386: Implement syscall with 6 arguments Ammar Faizi
2022-03-20 10:33 ` Alviro Iskandar Setiawan
2022-03-20 10:42 ` Alviro Iskandar Setiawan
2022-03-20 15:09 ` Ammar Faizi
2022-03-20 13:10 ` David Laight
2022-03-20 14:01 ` Willy Tarreau
2022-03-20 15:04 ` Ammar Faizi
2022-03-20 18:22 ` David Laight
2022-03-20 9:37 ` [RFC PATCH v1 4/6] tools/nolibc/sys: Implement `mmap()` and `munmap()` Ammar Faizi
2022-03-20 9:37 ` [RFC PATCH v1 5/6] tools/nolibc/stdlib: Implement `malloc()`, `calloc()`, `realloc()` and `free()` Ammar Faizi
2022-03-20 15:50 ` Alviro Iskandar Setiawan
2022-03-20 16:10 ` Ammar Faizi
2022-03-20 16:16 ` Willy Tarreau
2022-03-20 16:36 ` Ammar Faizi
2022-03-20 16:46 ` Willy Tarreau
2022-03-20 9:37 ` [RFC PATCH v1 6/6] tools/include/string: Implement `strdup()` and `strndup()` Ammar Faizi
2022-03-20 15:55 ` Alviro Iskandar Setiawan
2022-03-20 16:10 ` Ammar Faizi
2022-03-21 7:53 ` Willy Tarreau
2022-03-21 8:16 ` Alviro Iskandar Setiawan
2022-03-21 8:51 ` Willy Tarreau
2022-03-21 11:36 ` Ammar Faizi
2022-03-21 11:43 ` Willy Tarreau
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox