gen_syscalls.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454
  1. #!/usr/bin/env python3
  2. #
  3. # Copyright (c) 2017 Intel Corporation
  4. #
  5. # SPDX-License-Identifier: Apache-2.0
  6. """
  7. Script to generate system call invocation macros
  8. This script parses the system call metadata JSON file emitted by
  9. parse_syscalls.py to create several files:
  10. - A file containing weak aliases of any potentially unimplemented system calls,
  11. as well as the system call dispatch table, which maps system call type IDs
  12. to their handler functions.
  13. - A header file defining the system call type IDs, as well as function
  14. prototypes for all system call handler functions.
  15. - A directory containing header files. Each header corresponds to a header
  16. that was identified as containing system call declarations. These
  17. generated headers contain the inline invocation functions for each system
  18. call in that header.
  19. """
  20. import sys
  21. import re
  22. import argparse
  23. import os
  24. import json
  25. types64 = ["int64_t", "uint64_t"]
  26. # The kernel linkage is complicated. These functions from
  27. # userspace_handlers.c are present in the kernel .a library after
  28. # userspace.c, which contains the weak fallbacks defined here. So the
  29. # linker finds the weak one first and stops searching, and thus won't
  30. # see the real implementation which should override. Yet changing the
  31. # order runs afoul of a comment in CMakeLists.txt that the order is
  32. # critical. These are core syscalls that won't ever be unconfigured,
  33. # just disable the fallback mechanism as a simple workaround.
  34. noweak = ["z_mrsh_k_object_release",
  35. "z_mrsh_k_object_access_grant",
  36. "z_mrsh_k_object_alloc"]
  37. table_template = """/* auto-generated by gen_syscalls.py, don't edit */
  38. /* Weak handler functions that get replaced by the real ones unless a system
  39. * call is not implemented due to kernel configuration.
  40. */
  41. %s
  42. const _k_syscall_handler_t _k_syscall_table[K_SYSCALL_LIMIT] = {
  43. \t%s
  44. };
  45. """
  46. list_template = """
  47. /* auto-generated by gen_syscalls.py, don't edit */
  48. #ifndef ZEPHYR_SYSCALL_LIST_H
  49. #define ZEPHYR_SYSCALL_LIST_H
  50. %s
  51. #ifndef _ASMLANGUAGE
  52. #include <stdint.h>
  53. #endif /* _ASMLANGUAGE */
  54. #endif /* ZEPHYR_SYSCALL_LIST_H */
  55. """
  56. syscall_template = """
  57. /* auto-generated by gen_syscalls.py, don't edit */
  58. %s
  59. #ifndef _ASMLANGUAGE
  60. #include <syscall_list.h>
  61. #include <syscall.h>
  62. #include <linker/sections.h>
  63. #if __GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 6)
  64. #pragma GCC diagnostic push
  65. #endif
  66. #ifdef __GNUC__
  67. #pragma GCC diagnostic ignored "-Wstrict-aliasing"
  68. #if !defined(__XCC__)
  69. #pragma GCC diagnostic ignored "-Warray-bounds"
  70. #endif
  71. #endif
  72. #ifdef __cplusplus
  73. extern "C" {
  74. #endif
  75. %s
  76. #ifdef __cplusplus
  77. }
  78. #endif
  79. #if __GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 6)
  80. #pragma GCC diagnostic pop
  81. #endif
  82. #endif
  83. #endif /* include guard */
  84. """
  85. handler_template = """
  86. extern uintptr_t z_hdlr_%s(uintptr_t arg1, uintptr_t arg2, uintptr_t arg3,
  87. uintptr_t arg4, uintptr_t arg5, uintptr_t arg6, void *ssf);
  88. """
  89. weak_template = """
  90. __weak ALIAS_OF(handler_no_syscall)
  91. uintptr_t %s(uintptr_t arg1, uintptr_t arg2, uintptr_t arg3,
  92. uintptr_t arg4, uintptr_t arg5, uintptr_t arg6, void *ssf);
  93. """
  94. typename_regex = re.compile(r'(.*?)([A-Za-z0-9_]+)$')
  95. class SyscallParseException(Exception):
  96. pass
  97. def typename_split(item):
  98. if "[" in item:
  99. raise SyscallParseException(
  100. "Please pass arrays to syscalls as pointers, unable to process '%s'" %
  101. item)
  102. if "(" in item:
  103. raise SyscallParseException(
  104. "Please use typedefs for function pointers")
  105. mo = typename_regex.match(item)
  106. if not mo:
  107. raise SyscallParseException("Malformed system call invocation")
  108. m = mo.groups()
  109. return (m[0].strip(), m[1])
  110. def need_split(argtype):
  111. return (not args.long_registers) and (argtype in types64)
  112. # Note: "lo" and "hi" are named in little endian conventions,
  113. # but it doesn't matter as long as they are consistently
  114. # generated.
  115. def union_decl(type):
  116. return "union { struct { uintptr_t lo, hi; } split; %s val; }" % type
  117. def wrapper_defs(func_name, func_type, args):
  118. ret64 = need_split(func_type)
  119. mrsh_args = [] # List of rvalue expressions for the marshalled invocation
  120. split_args = []
  121. nsplit = 0
  122. for argtype, argname in args:
  123. if need_split(argtype):
  124. split_args.append((argtype, argname))
  125. mrsh_args.append("parm%d.split.lo" % nsplit)
  126. mrsh_args.append("parm%d.split.hi" % nsplit)
  127. nsplit += 1
  128. else:
  129. mrsh_args.append("*(uintptr_t *)&" + argname)
  130. if ret64:
  131. mrsh_args.append("(uintptr_t)&ret64")
  132. decl_arglist = ", ".join([" ".join(argrec) for argrec in args]) or "void"
  133. wrap = "extern %s z_impl_%s(%s);\n" % (func_type, func_name, decl_arglist)
  134. wrap += "\n"
  135. wrap += "__pinned_func\n"
  136. wrap += "static inline %s %s(%s)\n" % (func_type, func_name, decl_arglist)
  137. wrap += "{\n"
  138. wrap += "#ifdef CONFIG_USERSPACE\n"
  139. wrap += ("\t" + "uint64_t ret64;\n") if ret64 else ""
  140. wrap += "\t" + "if (z_syscall_trap()) {\n"
  141. for parmnum, rec in enumerate(split_args):
  142. (argtype, argname) = rec
  143. wrap += "\t\t%s parm%d;\n" % (union_decl(argtype), parmnum)
  144. wrap += "\t\t" + "parm%d.val = %s;\n" % (parmnum, argname)
  145. if len(mrsh_args) > 6:
  146. wrap += "\t\t" + "uintptr_t more[] = {\n"
  147. wrap += "\t\t\t" + (",\n\t\t\t".join(mrsh_args[5:])) + "\n"
  148. wrap += "\t\t" + "};\n"
  149. mrsh_args[5:] = ["(uintptr_t) &more"]
  150. syscall_id = "K_SYSCALL_" + func_name.upper()
  151. invoke = ("arch_syscall_invoke%d(%s)"
  152. % (len(mrsh_args),
  153. ", ".join(mrsh_args + [syscall_id])))
  154. # Coverity does not understand syscall mechanism
  155. # and will already complain when any function argument
  156. # is not of exact size as uintptr_t. So tell Coverity
  157. # to ignore this particular rule here.
  158. wrap += "\t\t/* coverity[OVERRUN] */\n"
  159. if ret64:
  160. wrap += "\t\t" + "(void)%s;\n" % invoke
  161. wrap += "\t\t" + "return (%s)ret64;\n" % func_type
  162. elif func_type == "void":
  163. wrap += "\t\t" + "%s;\n" % invoke
  164. wrap += "\t\t" + "return;\n"
  165. else:
  166. wrap += "\t\t" + "return (%s) %s;\n" % (func_type, invoke)
  167. wrap += "\t" + "}\n"
  168. wrap += "#endif\n"
  169. # Otherwise fall through to direct invocation of the impl func.
  170. # Note the compiler barrier: that is required to prevent code from
  171. # the impl call from being hoisted above the check for user
  172. # context.
  173. impl_arglist = ", ".join([argrec[1] for argrec in args])
  174. impl_call = "z_impl_%s(%s)" % (func_name, impl_arglist)
  175. wrap += "\t" + "compiler_barrier();\n"
  176. wrap += "\t" + "%s%s;\n" % ("return " if func_type != "void" else "",
  177. impl_call)
  178. wrap += "}\n"
  179. return wrap
  180. # Returns an expression for the specified (zero-indexed!) marshalled
  181. # parameter to a syscall, with handling for a final "more" parameter.
  182. def mrsh_rval(mrsh_num, total):
  183. if mrsh_num < 5 or total <= 6:
  184. return "arg%d" % mrsh_num
  185. else:
  186. return "(((uintptr_t *)more)[%d])" % (mrsh_num - 5)
  187. def marshall_defs(func_name, func_type, args):
  188. mrsh_name = "z_mrsh_" + func_name
  189. nmrsh = 0 # number of marshalled uintptr_t parameter
  190. vrfy_parms = [] # list of (arg_num, mrsh_or_parm_num, bool_is_split)
  191. split_parms = [] # list of a (arg_num, mrsh_num) for each split
  192. for i, (argtype, _) in enumerate(args):
  193. if need_split(argtype):
  194. vrfy_parms.append((i, len(split_parms), True))
  195. split_parms.append((i, nmrsh))
  196. nmrsh += 2
  197. else:
  198. vrfy_parms.append((i, nmrsh, False))
  199. nmrsh += 1
  200. # Final argument for a 64 bit return value?
  201. if need_split(func_type):
  202. nmrsh += 1
  203. decl_arglist = ", ".join([" ".join(argrec) for argrec in args])
  204. mrsh = "extern %s z_vrfy_%s(%s);\n" % (func_type, func_name, decl_arglist)
  205. mrsh += "uintptr_t %s(uintptr_t arg0, uintptr_t arg1, uintptr_t arg2,\n" % mrsh_name
  206. if nmrsh <= 6:
  207. mrsh += "\t\t" + "uintptr_t arg3, uintptr_t arg4, uintptr_t arg5, void *ssf)\n"
  208. else:
  209. mrsh += "\t\t" + "uintptr_t arg3, uintptr_t arg4, void *more, void *ssf)\n"
  210. mrsh += "{\n"
  211. mrsh += "\t" + "_current->syscall_frame = ssf;\n"
  212. for unused_arg in range(nmrsh, 6):
  213. mrsh += "\t(void) arg%d;\t/* unused */\n" % unused_arg
  214. if nmrsh > 6:
  215. mrsh += ("\tZ_OOPS(Z_SYSCALL_MEMORY_READ(more, "
  216. + str(nmrsh - 6) + " * sizeof(uintptr_t)));\n")
  217. for i, split_rec in enumerate(split_parms):
  218. arg_num, mrsh_num = split_rec
  219. arg_type = args[arg_num][0]
  220. mrsh += "\t%s parm%d;\n" % (union_decl(arg_type), i)
  221. mrsh += "\t" + "parm%d.split.lo = %s;\n" % (i, mrsh_rval(mrsh_num,
  222. nmrsh))
  223. mrsh += "\t" + "parm%d.split.hi = %s;\n" % (i, mrsh_rval(mrsh_num + 1,
  224. nmrsh))
  225. # Finally, invoke the verify function
  226. out_args = []
  227. for i, argn, is_split in vrfy_parms:
  228. if is_split:
  229. out_args.append("parm%d.val" % argn)
  230. else:
  231. out_args.append("*(%s*)&%s" % (args[i][0], mrsh_rval(argn, nmrsh)))
  232. vrfy_call = "z_vrfy_%s(%s)\n" % (func_name, ", ".join(out_args))
  233. if func_type == "void":
  234. mrsh += "\t" + "%s;\n" % vrfy_call
  235. mrsh += "\t" + "_current->syscall_frame = NULL;\n"
  236. mrsh += "\t" + "return 0;\n"
  237. else:
  238. mrsh += "\t" + "%s ret = %s;\n" % (func_type, vrfy_call)
  239. if need_split(func_type):
  240. ptr = "((uint64_t *)%s)" % mrsh_rval(nmrsh - 1, nmrsh)
  241. mrsh += "\t" + "Z_OOPS(Z_SYSCALL_MEMORY_WRITE(%s, 8));\n" % ptr
  242. mrsh += "\t" + "*%s = ret;\n" % ptr
  243. mrsh += "\t" + "_current->syscall_frame = NULL;\n"
  244. mrsh += "\t" + "return 0;\n"
  245. else:
  246. mrsh += "\t" + "_current->syscall_frame = NULL;\n"
  247. mrsh += "\t" + "return (uintptr_t) ret;\n"
  248. mrsh += "}\n"
  249. return mrsh, mrsh_name
  250. def analyze_fn(match_group):
  251. func, args = match_group
  252. try:
  253. if args == "void":
  254. args = []
  255. else:
  256. args = [typename_split(a.strip()) for a in args.split(",")]
  257. func_type, func_name = typename_split(func)
  258. except SyscallParseException:
  259. sys.stderr.write("In declaration of %s\n" % func)
  260. raise
  261. sys_id = "K_SYSCALL_" + func_name.upper()
  262. marshaller = None
  263. marshaller, handler = marshall_defs(func_name, func_type, args)
  264. invocation = wrapper_defs(func_name, func_type, args)
  265. # Entry in _k_syscall_table
  266. table_entry = "[%s] = %s" % (sys_id, handler)
  267. return (handler, invocation, marshaller, sys_id, table_entry)
  268. def parse_args():
  269. global args
  270. parser = argparse.ArgumentParser(
  271. description=__doc__,
  272. formatter_class=argparse.RawDescriptionHelpFormatter)
  273. parser.add_argument("-i", "--json-file", required=True,
  274. help="Read syscall information from json file")
  275. parser.add_argument("-d", "--syscall-dispatch", required=True,
  276. help="output C system call dispatch table file")
  277. parser.add_argument("-l", "--syscall-list", required=True,
  278. help="output C system call list header")
  279. parser.add_argument("-o", "--base-output", required=True,
  280. help="Base output directory for syscall macro headers")
  281. parser.add_argument("-s", "--split-type", action="append",
  282. help="A long type that must be split/marshalled on 32-bit systems")
  283. parser.add_argument("-x", "--long-registers", action="store_true",
  284. help="Indicates we are on system with 64-bit registers")
  285. args = parser.parse_args()
  286. def main():
  287. parse_args()
  288. if args.split_type is not None:
  289. for t in args.split_type:
  290. types64.append(t)
  291. with open(args.json_file, 'r') as fd:
  292. syscalls = json.load(fd)
  293. invocations = {}
  294. mrsh_defs = {}
  295. mrsh_includes = {}
  296. ids = []
  297. table_entries = []
  298. handlers = []
  299. for match_group, fn in syscalls:
  300. handler, inv, mrsh, sys_id, entry = analyze_fn(match_group)
  301. if fn not in invocations:
  302. invocations[fn] = []
  303. invocations[fn].append(inv)
  304. ids.append(sys_id)
  305. table_entries.append(entry)
  306. handlers.append(handler)
  307. if mrsh:
  308. syscall = typename_split(match_group[0])[1]
  309. mrsh_defs[syscall] = mrsh
  310. mrsh_includes[syscall] = "#include <syscalls/%s>" % fn
  311. with open(args.syscall_dispatch, "w") as fp:
  312. table_entries.append("[K_SYSCALL_BAD] = handler_bad_syscall")
  313. weak_defines = "".join([weak_template % name
  314. for name in handlers
  315. if not name in noweak])
  316. # The "noweak" ones just get a regular declaration
  317. weak_defines += "\n".join(["extern uintptr_t %s(uintptr_t arg1, uintptr_t arg2, uintptr_t arg3, uintptr_t arg4, uintptr_t arg5, uintptr_t arg6, void *ssf);"
  318. % s for s in noweak])
  319. fp.write(table_template % (weak_defines,
  320. ",\n\t".join(table_entries)))
  321. # Listing header emitted to stdout
  322. ids.sort()
  323. ids.extend(["K_SYSCALL_BAD", "K_SYSCALL_LIMIT"])
  324. ids_as_defines = ""
  325. for i, item in enumerate(ids):
  326. ids_as_defines += "#define {} {}\n".format(item, i)
  327. with open(args.syscall_list, "w") as fp:
  328. fp.write(list_template % ids_as_defines)
  329. os.makedirs(args.base_output, exist_ok=True)
  330. for fn, invo_list in invocations.items():
  331. out_fn = os.path.join(args.base_output, fn)
  332. ig = re.sub("[^a-zA-Z0-9]", "_", "Z_INCLUDE_SYSCALLS_" + fn).upper()
  333. include_guard = "#ifndef %s\n#define %s\n" % (ig, ig)
  334. header = syscall_template % (include_guard, "\n\n".join(invo_list))
  335. with open(out_fn, "w") as fp:
  336. fp.write(header)
  337. # Likewise emit _mrsh.c files for syscall inclusion
  338. for fn in mrsh_defs:
  339. mrsh_fn = os.path.join(args.base_output, fn + "_mrsh.c")
  340. with open(mrsh_fn, "w") as fp:
  341. fp.write("/* auto-generated by gen_syscalls.py, don't edit */\n")
  342. fp.write("#if __GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 6)\n")
  343. fp.write("#pragma GCC diagnostic push\n")
  344. fp.write("#endif\n")
  345. fp.write("#ifdef __GNUC__\n")
  346. fp.write("#pragma GCC diagnostic ignored \"-Wstrict-aliasing\"\n")
  347. fp.write("#endif\n")
  348. fp.write(mrsh_includes[fn] + "\n")
  349. fp.write("\n")
  350. fp.write(mrsh_defs[fn] + "\n")
  351. fp.write("#if __GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 6)\n")
  352. fp.write("#pragma GCC diagnostic pop\n")
  353. fp.write("#endif\n")
  354. if __name__ == "__main__":
  355. main()