File: [cvs.NetBSD.org] / src / sys / arch / i386 / i386 / linux_syscall.c (download)
Revision 1.31, Fri Jul 1 20:16:24 2005 UTC (18 years, 9 months ago) by martin
Branch: MAIN
CVS Tags: yamt-vop-base3, yamt-vop-base2, yamt-vop-base, yamt-vop, yamt-readahead-pervnode, yamt-readahead-perfile, yamt-readahead-base3, yamt-readahead-base2, yamt-readahead-base, yamt-readahead, thorpej-vnode-attr-base, thorpej-vnode-attr, ktrace-lwp-base Branch point for: yamt-lazymbuf
Changes since 1.30: +2 -3
lines
Delete now unused "bad" label
|
/* $NetBSD: linux_syscall.c,v 1.31 2005/07/01 20:16:24 martin Exp $ */
/*-
* Copyright (c) 1998, 2000 The NetBSD Foundation, Inc.
* All rights reserved.
*
* This code is derived from software contributed to The NetBSD Foundation
* by Charles M. Hannum.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the NetBSD
* Foundation, Inc. and its contributors.
* 4. Neither the name of The NetBSD Foundation nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: linux_syscall.c,v 1.31 2005/07/01 20:16:24 martin Exp $");
#if defined(_KERNEL_OPT)
#include "opt_syscall_debug.h"
#include "opt_vm86.h"
#include "opt_ktrace.h"
#include "opt_systrace.h"
#endif
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/proc.h>
#include <sys/savar.h>
#include <sys/user.h>
#include <sys/signal.h>
#ifdef KTRACE
#include <sys/ktrace.h>
#endif
#ifdef SYSTRACE
#include <sys/systrace.h>
#endif
#include <sys/syscall.h>
#include <uvm/uvm_extern.h>
#include <machine/cpu.h>
#include <machine/psl.h>
#include <machine/userret.h>
#include <compat/linux/common/linux_types.h>
#include <compat/linux/common/linux_errno.h>
#include <compat/linux/linux_syscall.h>
#include <compat/linux/common/linux_signal.h>
#include <compat/linux/arch/i386/linux_machdep.h>
void linux_syscall_plain(struct trapframe *);
void linux_syscall_fancy(struct trapframe *);
extern struct sysent linux_sysent[];
void
linux_syscall_intern(p)
struct proc *p;
{
#ifdef KTRACE
if (p->p_traceflag & (KTRFAC_SYSCALL | KTRFAC_SYSRET)) {
p->p_md.md_syscall = linux_syscall_fancy;
return;
}
#endif
#ifdef SYSTRACE
if (ISSET(p->p_flag, P_SYSTRACE)) {
p->p_md.md_syscall = linux_syscall_fancy;
return;
}
#endif
p->p_md.md_syscall = linux_syscall_plain;
}
/*
* syscall(frame):
* System call request from POSIX system call gate interface to kernel.
* Like trap(), argument is call by reference.
*/
void
linux_syscall_plain(frame)
struct trapframe *frame;
{
register const struct sysent *callp;
struct lwp *l;
int error;
size_t argsize;
register_t code, args[8], rval[2];
uvmexp.syscalls++;
l = curlwp;
code = frame->tf_eax;
callp = linux_sysent;
code &= (LINUX_SYS_NSYSENT - 1);
callp += code;
argsize = callp->sy_argsize;
if (argsize) {
/*
* Linux passes the args in ebx, ecx, edx, esi, edi, ebp, in
* increasing order.
*/
switch (argsize >> 2) {
case 6:
args[5] = frame->tf_ebp;
case 5:
args[4] = frame->tf_edi;
case 4:
args[3] = frame->tf_esi;
case 3:
args[2] = frame->tf_edx;
case 2:
args[1] = frame->tf_ecx;
case 1:
args[0] = frame->tf_ebx;
break;
default:
panic("linux syscall %d bogus argument size %d",
code, argsize);
break;
}
}
#ifdef SYSCALL_DEBUG
scdebug_call(l, code, args);
#endif /* SYSCALL_DEBUG */
rval[0] = 0;
rval[1] = 0;
KERNEL_PROC_LOCK(l);
error = (*callp->sy_call)(l, args, rval);
KERNEL_PROC_UNLOCK(l);
switch (error) {
case 0:
frame->tf_eax = rval[0];
frame->tf_eflags &= ~PSL_C; /* carry bit */
break;
case ERESTART:
/*
* The offset to adjust the PC by depends on whether we entered
* the kernel through the trap or call gate. We pushed the
* size of the instruction into tf_err on entry.
*/
frame->tf_eip -= frame->tf_err;
break;
case EJUSTRETURN:
/* nothing to do */
break;
default:
error = native_to_linux_errno[error];
frame->tf_eax = error;
frame->tf_eflags |= PSL_C; /* carry bit */
break;
}
#ifdef SYSCALL_DEBUG
scdebug_ret(l, code, error, rval);
#endif /* SYSCALL_DEBUG */
userret(l);
}
/*
* syscall(frame):
* System call request from POSIX system call gate interface to kernel.
* Like trap(), argument is call by reference.
*/
void
linux_syscall_fancy(frame)
struct trapframe *frame;
{
register const struct sysent *callp;
struct lwp *l;
int error;
size_t argsize;
register_t code, args[8], rval[2];
uvmexp.syscalls++;
l = curlwp;
code = frame->tf_eax;
callp = linux_sysent;
code &= (LINUX_SYS_NSYSENT - 1);
callp += code;
argsize = callp->sy_argsize;
if (argsize) {
/*
* Linux passes the args in ebx, ecx, edx, esi, edi, ebp, in
* increasing order.
*/
switch (argsize >> 2) {
case 6:
args[5] = frame->tf_ebp;
case 5:
args[4] = frame->tf_edi;
case 4:
args[3] = frame->tf_esi;
case 3:
args[2] = frame->tf_edx;
case 2:
args[1] = frame->tf_ecx;
case 1:
args[0] = frame->tf_ebx;
break;
default:
panic("linux syscall %d bogus argument size %d",
code, argsize);
break;
}
}
KERNEL_PROC_LOCK(l);
if ((error = trace_enter(l, code, code, NULL, args)) != 0)
goto out;
rval[0] = 0;
rval[1] = 0;
error = (*callp->sy_call)(l, args, rval);
out:
KERNEL_PROC_UNLOCK(l);
switch (error) {
case 0:
frame->tf_eax = rval[0];
frame->tf_eflags &= ~PSL_C; /* carry bit */
break;
case ERESTART:
/*
* The offset to adjust the PC by depends on whether we entered
* the kernel through the trap or call gate. We pushed the
* size of the instruction into tf_err on entry.
*/
frame->tf_eip -= frame->tf_err;
break;
case EJUSTRETURN:
/* nothing to do */
break;
default:
error = native_to_linux_errno[error];
frame->tf_eax = error;
frame->tf_eflags |= PSL_C; /* carry bit */
break;
}
trace_exit(l, code, args, rval, error);
userret(l);
}