linux_machdep.c revision 1.19
1/*	$NetBSD: linux_machdep.c,v 1.19 2007/02/09 21:55:18 ad Exp $	*/
2
3/*-
4 * Copyright (c) 1995, 2000 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 *    must display the following acknowledgement:
20 *	This product includes software developed by the NetBSD
21 *	Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 *    contributors may be used to endorse or promote products derived
24 *    from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39#include <sys/param.h>
40
41__KERNEL_RCSID(0, "$NetBSD: linux_machdep.c,v 1.19 2007/02/09 21:55:18 ad Exp $");
42
43#include <sys/param.h>
44#include <sys/systm.h>
45#include <sys/signalvar.h>
46#include <sys/kernel.h>
47#include <sys/proc.h>
48#include <sys/user.h>
49#include <sys/buf.h>
50#include <sys/reboot.h>
51#include <sys/conf.h>
52#include <sys/exec.h>
53#include <sys/file.h>
54#include <sys/callout.h>
55#include <sys/malloc.h>
56#include <sys/mbuf.h>
57#include <sys/msgbuf.h>
58#include <sys/mount.h>
59#include <sys/vnode.h>
60#include <sys/device.h>
61#include <sys/syscallargs.h>
62#include <sys/filedesc.h>
63#include <sys/exec_elf.h>
64#include <sys/disklabel.h>
65#include <sys/ioctl.h>
66#include <miscfs/specfs/specdev.h>
67
68#include <compat/linux/common/linux_types.h>
69#include <compat/linux/common/linux_signal.h>
70#include <compat/linux/common/linux_util.h>
71#include <compat/linux/common/linux_ioctl.h>
72#include <compat/linux/common/linux_hdio.h>
73#include <compat/linux/common/linux_exec.h>
74#include <compat/linux/common/linux_machdep.h>
75#include <compat/linux/linux_syscallargs.h>
76
77void
78linux_setregs(l, epp, stack)
79	struct lwp *l;
80	struct exec_package *epp;
81	u_long stack;
82{
83
84	setregs(l, epp, stack);
85}
86
87void
88linux_sendsig(const ksiginfo_t *ksi, const sigset_t *mask)
89{
90	struct lwp *l = curlwp;
91	struct proc *p = l->l_proc;
92	struct trapframe *tf;
93	struct linux_sigframe *fp, frame;
94	int onstack, error;
95	const int sig = ksi->ksi_signo;
96	sig_t catcher = SIGACTION(p, sig).sa_handler;
97
98	tf = process_frame(l);
99
100	/*
101	 * The Linux version of this code is in
102	 * linux/arch/arm/kernel/signal.c.
103	 */
104
105	/* Do we need to jump onto the signal stack? */
106	onstack =
107	    (l->l_sigstk.ss_flags & (SS_DISABLE | SS_ONSTACK)) == 0 &&
108	    (SIGACTION(p, sig).sa_flags & SA_ONSTACK) != 0;
109
110	/* Allocate space for the signal handler context. */
111	if (onstack)
112		fp = (struct linux_sigframe *)((caddr_t)l->l_sigstk.ss_sp +
113					  l->l_sigstk.ss_size);
114	else
115		fp = (struct linux_sigframe *)tf->tf_usr_sp;
116	fp--;
117
118	/* Build stack frame for signal trampoline. */
119
120	/* Save register context. */
121	frame.sf_sc.sc_r0     = tf->tf_r0;
122	frame.sf_sc.sc_r1     = tf->tf_r1;
123	frame.sf_sc.sc_r2     = tf->tf_r2;
124	frame.sf_sc.sc_r3     = tf->tf_r3;
125	frame.sf_sc.sc_r4     = tf->tf_r4;
126	frame.sf_sc.sc_r5     = tf->tf_r5;
127	frame.sf_sc.sc_r6     = tf->tf_r6;
128	frame.sf_sc.sc_r7     = tf->tf_r7;
129	frame.sf_sc.sc_r8     = tf->tf_r8;
130	frame.sf_sc.sc_r9     = tf->tf_r9;
131	frame.sf_sc.sc_r10    = tf->tf_r10;
132	frame.sf_sc.sc_r11    = tf->tf_r11;
133	frame.sf_sc.sc_r12    = tf->tf_r12;
134	frame.sf_sc.sc_sp     = tf->tf_usr_sp;
135	frame.sf_sc.sc_lr     = tf->tf_usr_lr;
136	frame.sf_sc.sc_pc     = tf->tf_pc;
137	frame.sf_sc.sc_cpsr   = tf->tf_spsr;
138
139	/* Save signal stack. */
140	/* Linux doesn't save the onstack flag in sigframe */
141
142	/* Save signal mask. */
143	native_to_linux_old_extra_sigset(&frame.sf_sc.sc_mask,
144	    frame.sf_extramask, mask);
145
146	/* Other state (mostly faked) */
147	/*
148	 * trapno should indicate the trap that caused the signal:
149	 * 6  -> undefined instruction
150	 * 11 -> address exception
151	 * 14 -> data/prefetch abort
152	 */
153	frame.sf_sc.sc_trapno = 0;
154	frame.sf_sc.sc_error_code = 0;
155	frame.sf_sc.sc_fault_address = (u_int32_t) ksi->ksi_addr;
156	sendsig_reset(l, sig);
157
158	mutex_exit(&p->p_smutex);
159	error = copyout(&frame, fp, sizeof(frame));
160	mutex_enter(&p->p_smutex);
161
162	if (error != 0) {
163		/*
164		 * Process has trashed its stack; give it an illegal
165		 * instruction to halt it in its tracks.
166		 */
167		sigexit(l, SIGILL);
168		/* NOTREACHED */
169	}
170	/*
171	 * Build context to run handler in.
172	 */
173	tf->tf_r0 = native_to_linux_signo[sig];
174	tf->tf_r1 = 0; /* XXX Should be a siginfo_t */
175	tf->tf_r2 = 0;
176	tf->tf_r3 = (register_t)catcher;
177	tf->tf_usr_sp = (register_t)fp;
178	tf->tf_pc = (register_t)p->p_sigctx.ps_sigcode;
179
180	/* Remember that we're now on the signal stack. */
181	if (onstack)
182		l->l_sigstk.ss_flags |= SS_ONSTACK;
183
184}
185
186#if 0
187/*
188 * System call to cleanup state after a signal
189 * has been taken.  Reset signal mask and
190 * stack state from context left by sendsig (above).
191 * Return to previous pc and psl as specified by
192 * context left by sendsig. Check carefully to
193 * make sure that the user has not modified the
194 * psl to gain improper privileges or to cause
195 * a machine fault.
196 */
197int
198linux_sys_rt_sigreturn(p, v, retval)
199	struct proc *p;
200	void *v;
201	register_t *retval;
202{
203	/* XXX XAX write me */
204	return(ENOSYS);
205}
206#endif
207
208int
209linux_sys_sigreturn(l, v, retval)
210	struct lwp *l;
211	void *v;
212	register_t *retval;
213{
214	struct linux_sigframe *sfp, frame;
215	struct proc *p = l->l_proc;
216	struct trapframe *tf;
217	sigset_t mask;
218
219	tf = process_frame(l);
220
221	/*
222	 * The trampoline code hands us the context.
223	 * It is unsafe to keep track of it ourselves, in the event that a
224	 * program jumps out of a signal handler.
225	 */
226	sfp = (struct linux_sigframe *)tf->tf_usr_sp;
227	if (copyin((caddr_t)sfp, &frame, sizeof(*sfp)) != 0)
228		return (EFAULT);
229
230	/*
231	 * Make sure the processor mode has not been tampered with and
232	 * interrupts have not been disabled.
233	 */
234	if (!VALID_R15_PSR(frame.sf_sc.sc_pc, frame.sf_sc.sc_cpsr))
235		return EINVAL;
236
237	/* Restore register context. */
238	tf = process_frame(l);
239	tf->tf_r0    = frame.sf_sc.sc_r0;
240	tf->tf_r1    = frame.sf_sc.sc_r1;
241	tf->tf_r2    = frame.sf_sc.sc_r2;
242	tf->tf_r3    = frame.sf_sc.sc_r3;
243	tf->tf_r4    = frame.sf_sc.sc_r4;
244	tf->tf_r5    = frame.sf_sc.sc_r5;
245	tf->tf_r6    = frame.sf_sc.sc_r6;
246	tf->tf_r7    = frame.sf_sc.sc_r7;
247	tf->tf_r8    = frame.sf_sc.sc_r8;
248	tf->tf_r9    = frame.sf_sc.sc_r9;
249	tf->tf_r10   = frame.sf_sc.sc_r10;
250	tf->tf_r11   = frame.sf_sc.sc_r11;
251	tf->tf_r12   = frame.sf_sc.sc_r12;
252	tf->tf_usr_sp = frame.sf_sc.sc_sp;
253	tf->tf_usr_lr = frame.sf_sc.sc_lr;
254	tf->tf_pc    = frame.sf_sc.sc_pc;
255	tf->tf_spsr  = frame.sf_sc.sc_cpsr;
256
257	mutex_enter(&p->p_smutex);
258
259	/* Restore signal stack. */
260	l->l_sigstk.ss_flags &= ~SS_ONSTACK;
261
262	/* Restore signal mask. */
263	linux_old_extra_to_native_sigset(&mask, &frame.sf_sc.sc_mask,
264	    frame.sf_extramask);
265	(void) sigprocmask1(l, SIG_SETMASK, &mask, 0);
266
267	mutex_exit(&p->p_smutex);
268
269	return (EJUSTRETURN);
270}
271
272/*
273 * major device numbers remapping
274 */
275dev_t
276linux_fakedev(dev, raw)
277	dev_t dev;
278	int raw;
279{
280	/* XXX write me */
281	return dev;
282}
283
284/*
285 * We come here in a last attempt to satisfy a Linux ioctl() call
286 */
287int
288linux_machdepioctl(l, v, retval)
289	struct lwp *l;
290	void *v;
291	register_t *retval;
292{
293	struct linux_sys_ioctl_args /* {
294		syscallarg(int) fd;
295		syscallarg(u_long) com;
296		syscallarg(caddr_t) data;
297	} */ *uap = v;
298	struct sys_ioctl_args bia;
299	u_long com;
300
301	SCARG(&bia, fd) = SCARG(uap, fd);
302	SCARG(&bia, data) = SCARG(uap, data);
303	com = SCARG(uap, com);
304
305	switch (com) {
306	default:
307		printf("linux_machdepioctl: invalid ioctl %08lx\n", com);
308		return EINVAL;
309	}
310	SCARG(&bia, com) = com;
311
312	return sys_ioctl(l, &bia, retval);
313}
314
315int
316linux_usertrap(struct lwp *l, vaddr_t trapaddr, void *arg)
317{
318	return 0;
319}
320