All of lore.kernel.org
 help / color / mirror / Atom feed
From: Song Gao <gaosong@loongson.cn>
To: qemu-devel@nongnu.org
Cc: WANG Xuerui <git@xen0n.name>, Xiaojuan Yang <yangxiaojuan@loongson.cn>
Subject: [RESEND PATCH v9 27/28] linux-user: Add safe syscall handling for loongarch64 hosts
Date: Mon,  8 Nov 2021 11:08:14 +0800	[thread overview]
Message-ID: <1636340895-5255-28-git-send-email-gaosong@loongson.cn> (raw)
In-Reply-To: <1636340895-5255-1-git-send-email-gaosong@loongson.cn>

From: WANG Xuerui <git@xen0n.name>

Signed-off-by: WANG Xuerui <git@xen0n.name>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Message-Id: <20210925173032.2434906-29-git@xen0n.name>
Signed-off-by: Song Gao <gaosong@loongson.cn>
Signed-off-by: Xiaojuan Yang <yangxiaojuan@loongson.cn>
---
 linux-user/host/loongarch64/hostdep.h          | 32 +++++++++++
 linux-user/host/loongarch64/safe-syscall.inc.S | 78 ++++++++++++++++++++++++++
 2 files changed, 110 insertions(+)
 create mode 100644 linux-user/host/loongarch64/hostdep.h
 create mode 100644 linux-user/host/loongarch64/safe-syscall.inc.S

diff --git a/linux-user/host/loongarch64/hostdep.h b/linux-user/host/loongarch64/hostdep.h
new file mode 100644
index 0000000..e67ecad
--- /dev/null
+++ b/linux-user/host/loongarch64/hostdep.h
@@ -0,0 +1,32 @@
+/* SPDX-License-Identifier: GPL-2.0-or-later */
+/*
+ * Things which are dependent on the host architecture
+ */
+
+#ifndef LOONGARCH64_HOSTDEP_H
+#define LOONGARCH64_HOSTDEP_H
+
+/* We have a safe-syscall.inc.S */
+#define HAVE_SAFE_SYSCALL
+
+#ifndef __ASSEMBLER__
+
+/* These are defined by the safe-syscall.inc.S file */
+extern char safe_syscall_start[];
+extern char safe_syscall_end[];
+
+/* Adjust the signal context to rewind out of safe-syscall if we're in it */
+static inline void rewind_if_in_safe_syscall(void *puc)
+{
+    ucontext_t *uc = puc;
+    unsigned long long *pcreg = &uc->uc_mcontext.__pc;
+
+    if (*pcreg > (uintptr_t)safe_syscall_start
+        && *pcreg < (uintptr_t)safe_syscall_end) {
+        *pcreg = (uintptr_t)safe_syscall_start;
+    }
+}
+
+#endif /* __ASSEMBLER__ */
+
+#endif
diff --git a/linux-user/host/loongarch64/safe-syscall.inc.S b/linux-user/host/loongarch64/safe-syscall.inc.S
new file mode 100644
index 0000000..6220dde
--- /dev/null
+++ b/linux-user/host/loongarch64/safe-syscall.inc.S
@@ -0,0 +1,78 @@
+/* SPDX-License-Identifier: GPL-2.0-or-later */
+/*
+ * safe-syscall.inc.S : host-specific assembly fragment
+ * to handle signals occurring at the same time as system calls.
+ * This is intended to be included by linux-user/safe-syscall.S
+ *
+ * Ported to LoongArch by WANG Xuerui <git@xen0n.name>
+ *
+ * Based on safe-syscall.inc.S code for every other architecture,
+ * originally written by Richard Henderson <rth@twiddle.net>
+ * Copyright (C) 2018 Linaro, Inc.
+ */
+
+	.global safe_syscall_base
+	.global safe_syscall_start
+	.global safe_syscall_end
+	.type	safe_syscall_base, @function
+	.type	safe_syscall_start, @function
+	.type	safe_syscall_end, @function
+
+	/*
+	 * This is the entry point for making a system call. The calling
+	 * convention here is that of a C varargs function with the
+	 * first argument an 'int *' to the signal_pending flag, the
+	 * second one the system call number (as a 'long'), and all further
+	 * arguments being syscall arguments (also 'long').
+	 * We return a long which is the syscall's return value, which
+	 * may be negative-errno on failure. Conversion to the
+	 * -1-and-errno-set convention is done by the calling wrapper.
+	 */
+safe_syscall_base:
+	.cfi_startproc
+	/*
+	 * The syscall calling convention is nearly the same as C:
+	 * we enter with a0 == *signal_pending
+	 *               a1 == syscall number
+	 *               a2 ... a7 == syscall arguments
+	 *               and return the result in a0
+	 * and the syscall instruction needs
+	 *               a7 == syscall number
+	 *               a0 ... a5 == syscall arguments
+	 *               and returns the result in a0
+	 * Shuffle everything around appropriately.
+	 */
+	move	$t0, $a0	/* signal_pending pointer */
+	move	$t1, $a1	/* syscall number */
+	move	$a0, $a2	/* syscall arguments */
+	move	$a1, $a3
+	move	$a2, $a4
+	move	$a3, $a5
+	move	$a4, $a6
+	move	$a5, $a7
+	move	$a7, $t1
+
+	/*
+	 * This next sequence of code works in conjunction with the
+	 * rewind_if_safe_syscall_function(). If a signal is taken
+	 * and the interrupted PC is anywhere between 'safe_syscall_start'
+	 * and 'safe_syscall_end' then we rewind it to 'safe_syscall_start'.
+	 * The code sequence must therefore be able to cope with this, and
+	 * the syscall instruction must be the final one in the sequence.
+	 */
+safe_syscall_start:
+	/* If signal_pending is non-zero, don't do the call */
+	ld.w	$t1, $t0, 0
+	bnez	$t1, 0f
+	syscall	0
+safe_syscall_end:
+	/* code path for having successfully executed the syscall */
+	jr	$ra
+
+0:
+	/* code path when we didn't execute the syscall */
+	li.w	$a0, -TARGET_ERESTARTSYS
+	jr	$ra
+	.cfi_endproc
+
+	.size	safe_syscall_base, .-safe_syscall_base
-- 
1.8.3.1



  parent reply	other threads:[~2021-11-08  3:33 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-08  3:07 [RESEND PATCH v9 00/28] Add LoongArch linux-user emulation support Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 01/28] target/loongarch: Add README Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 02/28] target/loongarch: Add core definition Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 03/28] target/loongarch: Add main translation routines Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 04/28] target/loongarch: Add fixed point arithmetic instruction translation Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 05/28] target/loongarch: Add fixed point shift " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 06/28] target/loongarch: Add fixed point bit " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 07/28] target/loongarch: Add fixed point load/store " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 08/28] target/loongarch: Add fixed point atomic " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 09/28] target/loongarch: Add fixed point extra " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 10/28] target/loongarch: Add floating point arithmetic " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 11/28] target/loongarch: Add floating point comparison " Song Gao
2021-11-08  3:07 ` [RESEND PATCH v9 12/28] target/loongarch: Add floating point conversion " Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 13/28] target/loongarch: Add floating point move " Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 14/28] target/loongarch: Add floating point load/store " Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 15/28] target/loongarch: Add branch " Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 16/28] target/loongarch: Add disassembler Song Gao
2021-11-09 12:01   ` Richard Henderson
2021-11-09 12:02   ` Richard Henderson
2021-11-08  3:08 ` [RESEND PATCH v9 17/28] linux-user: Add LoongArch generic header files Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 18/28] linux-user: Add LoongArch specific structures Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 19/28] linux-user: Add LoongArch signal support Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 20/28] linux-user: Add LoongArch elf support Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 21/28] linux-user: Add LoongArch syscall support Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 22/28] linux-user: Add LoongArch cpu_loop support Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 23/28] default-configs: Add loongarch linux-user support Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 24/28] target/loongarch: Add target build suport Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 25/28] target/loongarch: 'make check-tcg' support Song Gao
2021-11-08  3:08 ` [RESEND PATCH v9 26/28] scripts: add loongarch64 binfmt config Song Gao
2021-11-08  3:08 ` Song Gao [this message]
2021-11-08  3:08 ` [RESEND PATCH v9 28/28] linux-user/host/loongarch64: Populate host_signal.h Song Gao
2021-11-09 12:12 ` [RESEND PATCH v9 00/28] Add LoongArch linux-user emulation support Richard Henderson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1636340895-5255-28-git-send-email-gaosong@loongson.cn \
    --to=gaosong@loongson.cn \
    --cc=git@xen0n.name \
    --cc=qemu-devel@nongnu.org \
    --cc=yangxiaojuan@loongson.cn \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.