linux_machdep.c revision 1.20 1 /* $NetBSD: linux_machdep.c,v 1.20 2003/01/18 08:02:50 thorpej Exp $ */
2
3 /*-
4 * Copyright (c) 1995, 2000, 2001 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden and Emmanuel Dreyfus.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the NetBSD
21 * Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 * contributors may be used to endorse or promote products derived
24 * from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39 #include <sys/cdefs.h>
40 __KERNEL_RCSID(0, "$NetBSD: linux_machdep.c,v 1.20 2003/01/18 08:02:50 thorpej Exp $");
41
42 #include <sys/param.h>
43 #include <sys/systm.h>
44 #include <sys/signalvar.h>
45 #include <sys/kernel.h>
46 #include <sys/proc.h>
47 #include <sys/user.h>
48 #include <sys/buf.h>
49 #include <sys/reboot.h>
50 #include <sys/conf.h>
51 #include <sys/exec.h>
52 #include <sys/file.h>
53 #include <sys/callout.h>
54 #include <sys/malloc.h>
55 #include <sys/mbuf.h>
56 #include <sys/msgbuf.h>
57 #include <sys/mount.h>
58 #include <sys/vnode.h>
59 #include <sys/device.h>
60 #include <sys/sa.h>
61 #include <sys/syscallargs.h>
62 #include <sys/filedesc.h>
63 #include <sys/exec_elf.h>
64 #include <sys/disklabel.h>
65 #include <sys/ioctl.h>
66 #include <miscfs/specfs/specdev.h>
67
68 #include <compat/linux/common/linux_types.h>
69 #include <compat/linux/common/linux_signal.h>
70 #include <compat/linux/common/linux_util.h>
71 #include <compat/linux/common/linux_ioctl.h>
72 #include <compat/linux/common/linux_hdio.h>
73 #include <compat/linux/common/linux_exec.h>
74 #include <compat/linux/common/linux_machdep.h>
75
76 #include <compat/linux/linux_syscallargs.h>
77
78 #include <machine/cpu.h>
79 #include <machine/fpu.h>
80 #include <machine/psl.h>
81 #include <machine/reg.h>
82 #include <machine/vmparam.h>
83
84 /*
85 * To see whether wscons is configured (for virtual console ioctl calls).
86 */
87 #if defined(_KERNEL_OPT)
88 #include "wsdisplay.h"
89 #endif
90 #if (NWSDISPLAY > 0)
91 #include <dev/wscons/wsconsio.h>
92 #include <dev/wscons/wsdisplay_usl_io.h>
93 #endif
94
95 /*
96 * Set set up registers on exec.
97 * XXX not used at the moment since in sys/kern/exec_conf, LINUX_COMPAT
98 * entry uses NetBSD's native setregs instead of linux_setregs
99 */
100 void
101 linux_setregs(l, pack, stack)
102 struct lwp *l;
103 struct exec_package *pack;
104 u_long stack;
105 {
106 setregs(l, pack, stack);
107 }
108
109 /*
110 * Send an interrupt to process.
111 *
112 * Adapted from arch/powerpc/powerpc/sig_machdep.c:sendsig and
113 * compat/linux/arch/i386/linux_machdep.c:linux_sendsig
114 *
115 * XXX Does not work well yet with RT signals
116 *
117 */
118
119 void
120 linux_sendsig(sig, mask, code) /* XXX Check me */
121 int sig;
122 sigset_t *mask;
123 u_long code;
124 {
125 struct lwp *l = curlwp;
126 struct proc *p = l->l_proc;
127 struct trapframe *tf;
128 sig_t catcher = SIGACTION(p, sig).sa_handler;
129 struct linux_sigregs frame;
130 struct linux_pt_regs linux_regs;
131 struct linux_sigcontext sc;
132 register_t fp;
133 int onstack;
134 int i;
135
136 tf = trapframe(l);
137
138 /*
139 * Do we need to jump onto the signal stack?
140 */
141 onstack =
142 (p->p_sigctx.ps_sigstk.ss_flags & (SS_DISABLE | SS_ONSTACK)) == 0 &&
143 (SIGACTION(p, sig).sa_flags & SA_ONSTACK) != 0;
144
145 /*
146 * Signal stack is broken (see at the end of linux_sigreturn), so we do
147 * not use it yet. XXX fix this.
148 */
149 onstack=0;
150
151 /*
152 * Allocate space for the signal handler context.
153 */
154 if (onstack) {
155 fp = (register_t)
156 ((caddr_t)p->p_sigctx.ps_sigstk.ss_sp +
157 p->p_sigctx.ps_sigstk.ss_size);
158 } else {
159 fp = tf->fixreg[1];
160 }
161 #ifdef DEBUG_LINUX
162 printf("fp at start of linux_sendsig = %x\n", fp);
163 #endif
164 fp -= sizeof(struct linux_sigregs);
165 fp &= ~0xf;
166
167 /*
168 * Prepare a sigcontext for later.
169 */
170 memset(&sc, 0, sizeof sc);
171 sc.lsignal = (int)native_to_linux_signo[sig];
172 sc.lhandler = (unsigned long)catcher;
173 native_to_linux_old_extra_sigset(&sc.lmask, &sc._unused[3], mask);
174 sc.lregs = (struct linux_pt_regs*)fp;
175
176 /*
177 * Setup the signal stack frame as Linux does it in
178 * arch/ppc/kernel/signal.c:setup_frame()
179 *
180 * Save register context.
181 */
182 for (i = 0; i < 32; i++)
183 linux_regs.lgpr[i] = tf->fixreg[i];
184 linux_regs.lnip = tf->srr0;
185 linux_regs.lmsr = tf->srr1;
186 linux_regs.lorig_gpr3 = tf->fixreg[3]; /* XXX Is that right? */
187 linux_regs.lctr = tf->ctr;
188 linux_regs.llink = tf->lr;
189 linux_regs.lxer = tf->xer;
190 linux_regs.lccr = tf->cr;
191 linux_regs.lmq = 0; /* Unused, 601 only */
192 linux_regs.ltrap = tf->exc;
193 linux_regs.ldar = tf->dar;
194 linux_regs.ldsisr = tf->dsisr;
195 linux_regs.lresult = 0;
196
197 memset(&frame, 0, sizeof(frame));
198 memcpy(&frame.lgp_regs, &linux_regs, sizeof(linux_regs));
199
200 save_fpu_lwp(curlwp);
201 memcpy(&frame.lfp_regs, curpcb->pcb_fpu.fpr, sizeof(frame.lfp_regs));
202
203 /*
204 * Copy Linux's signal trampoline on the user stack It should not
205 * be used, but Linux binaries might expect it to be there.
206 */
207 frame.ltramp[0] = 0x38997777; /* li r0, 0x7777 */
208 frame.ltramp[1] = 0x44000002; /* sc */
209
210 /*
211 * Move it to the user stack
212 * There is a little trick here, about the LINUX_ABIGAP: the
213 * linux_sigreg structure has a 56 int gap to support rs6000/xcoff
214 * binaries. But the Linux kernel seems to do without it, and it
215 * just skip it when building the stack frame. Hence the LINUX_ABIGAP.
216 */
217 if (copyout(&frame, (caddr_t)fp, sizeof (frame) - LINUX_ABIGAP) != 0) {
218 /*
219 * Process has trashed its stack; give it an illegal
220 * instruction to halt it in its tracks.
221 */
222 sigexit(l, SIGILL);
223 /* NOTREACHED */
224 }
225
226 /*
227 * Add a sigcontext on the stack
228 */
229 fp -= sizeof(struct linux_sigcontext);
230 if (copyout(&sc, (caddr_t)fp, sizeof (struct linux_sigcontext)) != 0) {
231 /*
232 * Process has trashed its stack; give it an illegal
233 * instruction to halt it in its tracks.
234 */
235 sigexit(l, SIGILL);
236 /* NOTREACHED */
237 }
238
239 /*
240 * Set the registers according to how the Linux process expects them.
241 * "Mind the gap" Linux expects a gap here.
242 */
243 tf->fixreg[1] = fp - LINUX__SIGNAL_FRAMESIZE;
244 tf->lr = (int)catcher;
245 tf->fixreg[3] = (int)native_to_linux_signo[sig];
246 tf->fixreg[4] = fp;
247 tf->srr0 = (int)p->p_sigctx.ps_sigcode;
248
249 #ifdef DEBUG_LINUX
250 printf("fp at end of linux_sendsig = %x\n", fp);
251 #endif
252 /*
253 * Remember that we're now on the signal stack.
254 */
255 if (onstack)
256 p->p_sigctx.ps_sigstk.ss_flags |= SS_ONSTACK;
257 #ifdef DEBUG_LINUX
258 printf("linux_sendsig: exitting. fp=0x%lx\n",(long)fp);
259 #endif
260 }
261
262 /*
263 * System call to cleanup state after a signal
264 * has been taken. Reset signal mask and
265 * stack state from context left by sendsig (above).
266 * Return to previous pc and psl as specified by
267 * context left by sendsig. Check carefully to
268 * make sure that the user has not modified the
269 * psl to gain improper privileges or to cause
270 * a machine fault.
271 *
272 * XXX not tested
273 */
274 int
275 linux_sys_rt_sigreturn(l, v, retval)
276 struct lwp *l;
277 void *v;
278 register_t *retval;
279 {
280 struct linux_sys_rt_sigreturn_args /* {
281 syscallarg(struct linux_rt_sigframe *) sfp;
282 } */ *uap = v;
283 struct proc *p = l->l_proc;
284 struct linux_rt_sigframe *scp, sigframe;
285 struct linux_sigregs sregs;
286 struct linux_pt_regs *lregs;
287 struct trapframe *tf;
288 sigset_t mask;
289 int i;
290
291 /*
292 * The trampoline code hands us the context.
293 * It is unsafe to keep track of it ourselves, in the event that a
294 * program jumps out of a signal handler.
295 */
296 scp = SCARG(uap, sfp);
297
298 /*
299 * Get the context from user stack
300 */
301 if (copyin((caddr_t)scp, &sigframe, sizeof(*scp)))
302 return (EFAULT);
303
304 /*
305 * Make sure, fpu is sync'ed
306 */
307 save_fpu_lwp(curlwp);
308
309 /*
310 * Restore register context.
311 */
312 if (copyin((caddr_t)sigframe.luc.luc_context.lregs,
313 &sregs, sizeof(sregs)))
314 return (EFAULT);
315 lregs = (struct linux_pt_regs *)&sregs.lgp_regs;
316
317 tf = trapframe(l);
318 #ifdef DEBUG_LINUX
319 printf("linux_sys_sigreturn: trapframe=0x%lx scp=0x%lx\n",
320 (unsigned long)tf, (unsigned long)scp);
321 #endif
322
323 if ((lregs->lmsr & PSL_USERSTATIC) != (tf->srr1 & PSL_USERSTATIC))
324 return (EINVAL);
325
326 for (i = 0; i < 32; i++)
327 tf->fixreg[i] = lregs->lgpr[i];
328 tf->lr = lregs->llink;
329 tf->cr = lregs->lccr;
330 tf->xer = lregs->lxer;
331 tf->ctr = lregs->lctr;
332 tf->srr0 = lregs->lnip;
333 tf->srr1 = lregs->lmsr;
334
335 memcpy(curpcb->pcb_fpu.fpr, (caddr_t)&sregs.lfp_regs,
336 sizeof(curpcb->pcb_fpu.fpr));
337
338 /*
339 * Restore signal stack.
340 *
341 * XXX cannot find the onstack information in Linux sig context.
342 * Is signal stack really supported on Linux?
343 *
344 * It seems to be supported in libc6...
345 */
346 /* if (sc.sc_onstack & SS_ONSTACK)
347 p->p_sigctx.ps_sigstk.ss_flags |= SS_ONSTACK;
348 else */
349 p->p_sigctx.ps_sigstk.ss_flags &= ~SS_ONSTACK;
350
351 /*
352 * Grab the signal mask
353 */
354 linux_to_native_sigset(&mask, &sigframe.luc.luc_sigmask);
355 (void) sigprocmask1(p, SIG_SETMASK, &mask, 0);
356
357 return (EJUSTRETURN);
358 }
359
360
361 /*
362 * The following needs code review for potential security issues
363 */
364 int
365 linux_sys_sigreturn(l, v, retval)
366 struct lwp *l;
367 void *v;
368 register_t *retval;
369 {
370 struct linux_sys_sigreturn_args /* {
371 syscallarg(struct linux_sigcontext *) scp;
372 } */ *uap = v;
373 struct proc *p = l->l_proc;
374 struct linux_sigcontext *scp, context;
375 struct linux_sigregs sregs;
376 struct linux_pt_regs *lregs;
377 struct trapframe *tf;
378 sigset_t mask;
379 int i;
380
381 /*
382 * The trampoline code hands us the context.
383 * It is unsafe to keep track of it ourselves, in the event that a
384 * program jumps out of a signal handler.
385 */
386 scp = SCARG(uap, scp);
387
388 /*
389 * Get the context from user stack
390 */
391 if (copyin(scp, &context, sizeof(*scp)))
392 return (EFAULT);
393
394 /*
395 * Make sure, fpu is in sync
396 */
397 save_fpu_lwp(curlwp);
398
399 /*
400 * Restore register context.
401 */
402 if (copyin((caddr_t)context.lregs, &sregs, sizeof(sregs)))
403 return (EFAULT);
404 lregs = (struct linux_pt_regs *)&sregs.lgp_regs;
405
406 tf = trapframe(l);
407 #ifdef DEBUG_LINUX
408 printf("linux_sys_sigreturn: trapframe=0x%lx scp=0x%lx\n",
409 (unsigned long)tf, (unsigned long)scp);
410 #endif
411
412 if ((lregs->lmsr & PSL_USERSTATIC) != (tf->srr1 & PSL_USERSTATIC))
413 return (EINVAL);
414
415 for (i = 0; i < 32; i++)
416 tf->fixreg[i] = lregs->lgpr[i];
417 tf->lr = lregs->llink;
418 tf->cr = lregs->lccr;
419 tf->xer = lregs->lxer;
420 tf->ctr = lregs->lctr;
421 tf->srr0 = lregs->lnip;
422 tf->srr1 = lregs->lmsr;
423
424 memcpy(curpcb->pcb_fpu.fpr, (caddr_t)&sregs.lfp_regs,
425 sizeof(curpcb->pcb_fpu.fpr));
426
427 /*
428 * Restore signal stack.
429 *
430 * XXX cannot find the onstack information in Linux sig context.
431 * Is signal stack really supported on Linux?
432 */
433 #if 0
434 if (sc.sc_onstack & SS_ONSTACK)
435 p->p_sigctx.ps_sigstk.ss_flags |= SS_ONSTACK;
436 else
437 #endif
438 p->p_sigctx.ps_sigstk.ss_flags &= ~SS_ONSTACK;
439
440 /* Restore signal mask. */
441 linux_old_extra_to_native_sigset(&mask, &context.lmask,
442 &context._unused[3]);
443 (void) sigprocmask1(p, SIG_SETMASK, &mask, 0);
444
445 return (EJUSTRETURN);
446 }
447
448
449 #if 0
450 int
451 linux_sys_modify_ldt(p, v, retval)
452 struct proc *p;
453 void *v;
454 register_t *retval;
455 {
456 /*
457 * This syscall is not implemented in Linux/PowerPC: we should not
458 * be here
459 */
460 #ifdef DEBUG_LINUX
461 printf("linux_sys_modify_ldt: should not be here.\n");
462 #endif
463 return 0;
464 }
465 #endif
466
467 /*
468 * major device numbers remapping
469 */
470 dev_t
471 linux_fakedev(dev, raw)
472 dev_t dev;
473 int raw;
474 {
475 /* XXX write me */
476 return dev;
477 }
478
479 /*
480 * We come here in a last attempt to satisfy a Linux ioctl() call
481 */
482 int
483 linux_machdepioctl(p, v, retval)
484 struct proc *p;
485 void *v;
486 register_t *retval;
487 {
488 struct linux_sys_ioctl_args /* {
489 syscallarg(int) fd;
490 syscallarg(u_long) com;
491 syscallarg(caddr_t) data;
492 } */ *uap = v;
493 struct sys_ioctl_args bia;
494 u_long com;
495
496 SCARG(&bia, fd) = SCARG(uap, fd);
497 SCARG(&bia, data) = SCARG(uap, data);
498 com = SCARG(uap, com);
499
500 switch (com) {
501 default:
502 printf("linux_machdepioctl: invalid ioctl %08lx\n", com);
503 return EINVAL;
504 }
505 SCARG(&bia, com) = com;
506 /* XXX NJWLWP */
507 return sys_ioctl(curlwp, &bia, retval);
508 }
509 #if 0
510 /*
511 * Set I/O permissions for a process. Just set the maximum level
512 * right away (ignoring the argument), otherwise we would have
513 * to rely on I/O permission maps, which are not implemented.
514 */
515 int
516 linux_sys_iopl(l, v, retval)
517 struct lwp *l;
518 void *v;
519 register_t *retval;
520 {
521 /*
522 * This syscall is not implemented in Linux/PowerPC: we should not be here
523 */
524 #ifdef DEBUG_LINUX
525 printf("linux_sys_iopl: should not be here.\n");
526 #endif
527 return 0;
528 }
529 #endif
530
531 /*
532 * See above. If a root process tries to set access to an I/O port,
533 * just let it have the whole range.
534 */
535 int
536 linux_sys_ioperm(l, v, retval)
537 struct lwp *l;
538 void *v;
539 register_t *retval;
540 {
541 /*
542 * This syscall is not implemented in Linux/PowerPC: we should not be here
543 */
544 #ifdef DEBUG_LINUX
545 printf("linux_sys_ioperm: should not be here.\n");
546 #endif
547 return 0;
548 }
549
550 /*
551 * wrapper linux_sys_new_uname() -> linux_sys_uname()
552 */
553 int
554 linux_sys_new_uname(l, v, retval)
555 struct lwp *l;
556 void *v;
557 register_t *retval;
558 {
559 return linux_sys_uname(l, v, retval);
560 }
561
562 /*
563 * wrapper linux_sys_new_select() -> linux_sys_select()
564 */
565 int
566 linux_sys_new_select(l, v, retval)
567 struct lwp *l;
568 void *v;
569 register_t *retval;
570 {
571 return linux_sys_select(l, v, retval);
572 }
573