android_kernel_xiaomi_sm8350/arch/um/include/sysdep-i386/stub.h
Bodo Stroesser 9786a8f3cb [PATCH] uml: Proper clone support for skas0
This patch implements the clone-stub mechanism, which allows skas0 to run
with proc_mm==0, even if the clib in UML uses modify_ldt.

Note: There is a bug in skas3.v7 host patch, that avoids UML-skas from
running properly on a SMP-box.  In full skas3, I never really saw problems,
but in skas0 they showed up.

More commentary by jdike - What this patch does is makes sure that the host
parent of each new host process matches the UML parent of the corresponding
UML process.  This ensures that any changed LDTs are inherited.  This is
done by having clone actually called by the UML process from its stub,
rather than by the kernel.  We have special syscall stubs that are loaded
onto the stub code page because that code must be completely
self-contained.  These stubs are given C interfaces, and used like normal C
functions, but there are subtleties.  Principally, we have to be careful
about stack variables in stub_clone_handler after the clone.  The code is
written so that there aren't any - everything boils down to a fixed
address.  If there were any locals, references to them after the clone
would be wrong because the stack just changed.

Signed-off-by: Bodo Stroesser <bstroesser@fujitsu-siemens.com>
Signed-off-by: Jeff Dike <jdike@addtoit.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-07-07 18:23:44 -07:00

66 lines
1.8 KiB
C

/*
* Copyright (C) 2004 Jeff Dike (jdike@addtoit.com)
* Licensed under the GPL
*/
#ifndef __SYSDEP_STUB_H
#define __SYSDEP_STUB_H
#include <asm/ptrace.h>
#include <asm/unistd.h>
extern void stub_segv_handler(int sig);
extern void stub_clone_handler(void);
#define STUB_SYSCALL_RET EAX
#define STUB_MMAP_NR __NR_mmap2
#define MMAP_OFFSET(o) ((o) >> PAGE_SHIFT)
static inline long stub_syscall2(long syscall, long arg1, long arg2)
{
long ret;
__asm__("movl %0, %%ecx; " : : "g" (arg2) : "%ecx");
__asm__("movl %0, %%ebx; " : : "g" (arg1) : "%ebx");
__asm__("movl %0, %%eax; " : : "g" (syscall) : "%eax");
__asm__("int $0x80;" : : : "%eax");
__asm__ __volatile__("movl %%eax, %0; " : "=g" (ret) :);
return(ret);
}
static inline long stub_syscall3(long syscall, long arg1, long arg2, long arg3)
{
__asm__("movl %0, %%edx; " : : "g" (arg3) : "%edx");
return(stub_syscall2(syscall, arg1, arg2));
}
static inline long stub_syscall4(long syscall, long arg1, long arg2, long arg3,
long arg4)
{
__asm__("movl %0, %%esi; " : : "g" (arg4) : "%esi");
return(stub_syscall3(syscall, arg1, arg2, arg3));
}
static inline long stub_syscall6(long syscall, long arg1, long arg2, long arg3,
long arg4, long arg5, long arg6)
{
long ret;
__asm__("movl %0, %%eax; " : : "g" (syscall) : "%eax");
__asm__("movl %0, %%ebx; " : : "g" (arg1) : "%ebx");
__asm__("movl %0, %%ecx; " : : "g" (arg2) : "%ecx");
__asm__("movl %0, %%edx; " : : "g" (arg3) : "%edx");
__asm__("movl %0, %%esi; " : : "g" (arg4) : "%esi");
__asm__("movl %0, %%edi; " : : "g" (arg5) : "%edi");
__asm__ __volatile__("pushl %%ebp ; movl %1, %%ebp; "
"int $0x80; popl %%ebp ; "
"movl %%eax, %0; " : "=g" (ret) : "g" (arg6) : "%eax");
return(ret);
}
static inline void trap_myself(void)
{
__asm("int3");
}
#endif