Port-arm archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: More linux emulation
Matt Thomas wrote:
>On Apr 3, 2014, at 12:42 PM, Christos Zoulas <christos%astron.com@localhost>
>wrote:
>
>> In article <20140403192802.9D98112967%ren.fdy2.co.uk@localhost>,
>> Robert Swindells <rjs%fdy2.co.uk@localhost> wrote:
>>>
>>> I have added a change to the arm copy of linux_syscall.c that lets
>>> it start running Debian armel binaries, I would expect armhf ones
>>> to run too.
>>>
>>> Current ARM Linux expects there to be some helper functions at the top
>>> of the high vectors page that can be called from userspace.
>>>
>>> These functions do things like compare-and-swap, memory barrier and
>>> give fast access to the TLS pointer. The idea is that they can have
>>> processor specific versions of these with a generic userland.
>>>
>>> Do people think it would be a bad idea to add this feature ?
>>>
>>> I haven't worked out what security issues there might be with it.
>>>
>>> Robert Swindells
>>
>> I don't see that this is a problem. There is a lot of prior art doing similar
>> things (getpid() fast memcpy(), timer access etc).
>
>well, most platforms don't use high vectors anymore. And that page is
>usually not user-readable.
I was more worried about exposing whatever else was in our vectors
page to userspace. Just creating a page containing these functions
would be simpler.
One idea was to create an arm specific linux_exec_setup_stack() and
add the mapping of this page to it.
Home |
Main Index |
Thread Index |
Old Index