Skip to content

Commit e353eb9

Browse files
袁浩Sword-Destiny
袁浩
authored andcommitted
add teeos std impl
Signed-off-by: 袁浩 <[email protected]>
1 parent 2896841 commit e353eb9

File tree

18 files changed

+1190
-10
lines changed

18 files changed

+1190
-10
lines changed

compiler/rustc_target/src/spec/targets/aarch64_unknown_teeos.rs

-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ pub fn target() -> Target {
44
let mut base = base::teeos::opts();
55
base.features = "+strict-align,+neon,+fp-armv8".into();
66
base.max_atomic_width = Some(128);
7-
base.linker = Some("aarch64-linux-gnu-ld".into());
87

98
Target {
109
llvm_target: "aarch64-unknown-none".into(),

library/panic_abort/src/lib.rs

+10
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,16 @@ pub unsafe fn __rust_start_panic(_payload: &mut dyn PanicPayload) -> u32 {
8181
}
8282
core::intrinsics::unreachable();
8383
}
84+
} else if #[cfg(target_os = "teeos")] {
85+
mod teeos {
86+
extern "C" {
87+
pub fn TEE_Panic(code: u32) -> !;
88+
}
89+
}
90+
91+
unsafe fn abort() -> ! {
92+
teeos::TEE_Panic(1);
93+
}
8494
} else {
8595
unsafe fn abort() -> ! {
8696
core::intrinsics::abort();

library/std/build.rs

+1
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ fn main() {
3434
|| target.contains("xous")
3535
|| target.contains("hurd")
3636
|| target.contains("uefi")
37+
|| target.contains("teeos")
3738
// See src/bootstrap/synthetic_targets.rs
3839
|| env::var("RUSTC_BOOTSTRAP_SYNTHETIC_TARGET").is_ok()
3940
{

library/std/src/sys/mod.rs

+3
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,9 @@ cfg_if::cfg_if! {
5353
} else if #[cfg(all(target_vendor = "fortanix", target_env = "sgx"))] {
5454
mod sgx;
5555
pub use self::sgx::*;
56+
} else if #[cfg(target_os = "teeos")] {
57+
mod teeos;
58+
pub use self::teeos::*;
5659
} else {
5760
mod unsupported;
5861
pub use self::unsupported::*;

library/std/src/sys/teeos/alloc.rs

+57
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
use crate::alloc::{GlobalAlloc, Layout, System};
2+
use crate::ptr;
3+
use crate::sys::common::alloc::{realloc_fallback, MIN_ALIGN};
4+
5+
#[stable(feature = "alloc_system_type", since = "1.28.0")]
6+
unsafe impl GlobalAlloc for System {
7+
#[inline]
8+
unsafe fn alloc(&self, layout: Layout) -> *mut u8 {
9+
// jemalloc provides alignment less than MIN_ALIGN for small allocations.
10+
// So only rely on MIN_ALIGN if size >= align.
11+
// Also see <https://github.com/rust-lang/rust/issues/45955> and
12+
// <https://github.com/rust-lang/rust/issues/62251#issuecomment-507580914>.
13+
if layout.align() <= MIN_ALIGN && layout.align() <= layout.size() {
14+
libc::malloc(layout.size()) as *mut u8
15+
} else {
16+
aligned_malloc(&layout)
17+
}
18+
}
19+
20+
#[inline]
21+
unsafe fn alloc_zeroed(&self, layout: Layout) -> *mut u8 {
22+
// See the comment above in `alloc` for why this check looks the way it does.
23+
if layout.align() <= MIN_ALIGN && layout.align() <= layout.size() {
24+
libc::calloc(layout.size(), 1) as *mut u8
25+
} else {
26+
let ptr = self.alloc(layout);
27+
if !ptr.is_null() {
28+
ptr::write_bytes(ptr, 0, layout.size());
29+
}
30+
ptr
31+
}
32+
}
33+
34+
#[inline]
35+
unsafe fn dealloc(&self, ptr: *mut u8, _layout: Layout) {
36+
libc::free(ptr as *mut libc::c_void)
37+
}
38+
39+
#[inline]
40+
unsafe fn realloc(&self, ptr: *mut u8, layout: Layout, new_size: usize) -> *mut u8 {
41+
if layout.align() <= MIN_ALIGN && layout.align() <= new_size {
42+
libc::realloc(ptr as *mut libc::c_void, new_size) as *mut u8
43+
} else {
44+
realloc_fallback(self, ptr, layout, new_size)
45+
}
46+
}
47+
}
48+
49+
#[inline]
50+
unsafe fn aligned_malloc(layout: &Layout) -> *mut u8 {
51+
let mut out = ptr::null_mut();
52+
// posix_memalign requires that the alignment be a multiple of `sizeof(void*)`.
53+
// Since these are all powers of 2, we can just use max.
54+
let align = layout.align().max(crate::mem::size_of::<usize>());
55+
let ret = libc::posix_memalign(&mut out, align, layout.size());
56+
if ret != 0 { ptr::null_mut() } else { out as *mut u8 }
57+
}
+100
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
use crate::cell::UnsafeCell;
2+
use crate::ptr;
3+
use crate::sync::atomic::{AtomicPtr, Ordering::Relaxed};
4+
use crate::sys::locks::mutex::{self, Mutex};
5+
use crate::sys::time::TIMESPEC_MAX;
6+
use crate::sys_common::lazy_box::{LazyBox, LazyInit};
7+
use crate::time::Duration;
8+
9+
extern "C" {
10+
pub fn pthread_cond_timedwait(
11+
cond: *mut libc::pthread_cond_t,
12+
lock: *mut libc::pthread_mutex_t,
13+
adstime: *const libc::timespec,
14+
) -> libc::c_int;
15+
}
16+
17+
struct AllocatedCondvar(UnsafeCell<libc::pthread_cond_t>);
18+
19+
pub struct Condvar {
20+
inner: LazyBox<AllocatedCondvar>,
21+
mutex: AtomicPtr<libc::pthread_mutex_t>,
22+
}
23+
24+
#[inline]
25+
fn raw(c: &Condvar) -> *mut libc::pthread_cond_t {
26+
c.inner.0.get()
27+
}
28+
29+
unsafe impl Send for AllocatedCondvar {}
30+
unsafe impl Sync for AllocatedCondvar {}
31+
32+
impl LazyInit for AllocatedCondvar {
33+
fn init() -> Box<Self> {
34+
let condvar = Box::new(AllocatedCondvar(UnsafeCell::new(libc::PTHREAD_COND_INITIALIZER)));
35+
36+
let r = unsafe { libc::pthread_cond_init(condvar.0.get(), crate::ptr::null()) };
37+
assert_eq!(r, 0);
38+
39+
condvar
40+
}
41+
}
42+
43+
impl Drop for AllocatedCondvar {
44+
#[inline]
45+
fn drop(&mut self) {
46+
let r = unsafe { libc::pthread_cond_destroy(self.0.get()) };
47+
debug_assert_eq!(r, 0);
48+
}
49+
}
50+
51+
impl Condvar {
52+
pub const fn new() -> Condvar {
53+
Condvar { inner: LazyBox::new(), mutex: AtomicPtr::new(ptr::null_mut()) }
54+
}
55+
56+
#[inline]
57+
fn verify(&self, mutex: *mut libc::pthread_mutex_t) {
58+
match self.mutex.compare_exchange(ptr::null_mut(), mutex, Relaxed, Relaxed) {
59+
Ok(_) => {} // Stored the address
60+
Err(n) if n == mutex => {} // Lost a race to store the same address
61+
_ => panic!("attempted to use a condition variable with two mutexes"),
62+
}
63+
}
64+
65+
#[inline]
66+
pub fn notify_one(&self) {
67+
let r = unsafe { libc::pthread_cond_signal(raw(self)) };
68+
debug_assert_eq!(r, 0);
69+
}
70+
71+
#[inline]
72+
pub fn notify_all(&self) {
73+
let r = unsafe { libc::pthread_cond_broadcast(raw(self)) };
74+
debug_assert_eq!(r, 0);
75+
}
76+
77+
#[inline]
78+
pub unsafe fn wait(&self, mutex: &Mutex) {
79+
let mutex = mutex::raw(mutex);
80+
self.verify(mutex);
81+
let r = libc::pthread_cond_wait(raw(self), mutex);
82+
debug_assert_eq!(r, 0);
83+
}
84+
85+
pub unsafe fn wait_timeout(&self, mutex: &Mutex, dur: Duration) -> bool {
86+
use crate::sys::time::Timespec;
87+
88+
let mutex = mutex::raw(mutex);
89+
self.verify(mutex);
90+
91+
let timeout = Timespec::now(libc::CLOCK_MONOTONIC)
92+
.checked_add_duration(&dur)
93+
.and_then(|t| t.to_timespec())
94+
.unwrap_or(TIMESPEC_MAX);
95+
96+
let r = pthread_cond_timedwait(raw(self), mutex, &timeout);
97+
assert!(r == libc::ETIMEDOUT || r == 0);
98+
r == 0
99+
}
100+
}
+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
pub mod condvar;
2+
#[path = "../../unix/locks/pthread_mutex.rs"]
3+
pub mod mutex;
4+
pub mod rwlock;
5+
6+
pub(crate) use condvar::Condvar;
7+
pub(crate) use mutex::Mutex;
8+
pub(crate) use rwlock::RwLock;
+44
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
use crate::sys::locks::mutex::Mutex;
2+
3+
/// we do not supported rwlock, so use mutex to simulate rwlock.
4+
/// it's useful because so many code in std will use rwlock.
5+
pub struct RwLock {
6+
inner: Mutex,
7+
}
8+
9+
impl RwLock {
10+
#[inline]
11+
pub const fn new() -> RwLock {
12+
RwLock { inner: Mutex::new() }
13+
}
14+
15+
#[inline]
16+
pub fn read(&self) {
17+
unsafe { self.inner.lock() };
18+
}
19+
20+
#[inline]
21+
pub fn try_read(&self) -> bool {
22+
unsafe { self.inner.try_lock() }
23+
}
24+
25+
#[inline]
26+
pub fn write(&self) {
27+
unsafe { self.inner.lock() };
28+
}
29+
30+
#[inline]
31+
pub unsafe fn try_write(&self) -> bool {
32+
unsafe { self.inner.try_lock() }
33+
}
34+
35+
#[inline]
36+
pub unsafe fn read_unlock(&self) {
37+
unsafe { self.inner.unlock() };
38+
}
39+
40+
#[inline]
41+
pub unsafe fn write_unlock(&self) {
42+
unsafe { self.inner.unlock() };
43+
}
44+
}

0 commit comments

Comments
 (0)