Descriptionruntime: make entersyscall/exitsyscall safe for stack splits
It is fundamentally unsafe to grow the stack once someone
has made a call to syscall.Syscall. That function takes 6 uintptr
arguments, but depending on the call some are pointers.
In fact, some might be pointers to stack values, and we don't know which.
That makes it impossible to copy the stack somewhere else.
Since we want to delete all the stack splitting code, relying only
on stack copying, make sure that Syscall never needs to split the stack.
The only thing Syscall does is:
call entersyscall
make the system call
call exitsyscall
As long as we make sure that entersyscall and exitsyscall
can live in the nosplit region, they won't ask for more stack.
Do this by making entersyscall and exitsyscall set up the
stack guard so that any call to a function with a split check
will cause a crash. Then move non-essential slow-path
work onto the m stack using onM and mark the rest of the
work nosplit. The linker will verify that the chain of nosplits
fits in the total nosplit budget.
Patch Set 1 #Patch Set 2 : diff -r bd3a9091e8dabd996cc36d5fc63c7aa0fcc581d6 https://code.google.com/p/go/ #Patch Set 3 : diff -r bd3a9091e8dabd996cc36d5fc63c7aa0fcc581d6 https://code.google.com/p/go/ #
Total comments: 6
Patch Set 4 : diff -r bd3a9091e8dabd996cc36d5fc63c7aa0fcc581d6 https://code.google.com/p/go/ #
MessagesTotal messages: 9
|