2007-10-16 10:27:00 +02:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2002 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
|
2005-04-17 00:20:36 +02:00
|
|
|
* Licensed under the GPL
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
2007-10-16 10:27:00 +02:00
|
|
|
#include <unistd.h>
|
2005-04-17 00:20:36 +02:00
|
|
|
#include <errno.h>
|
|
|
|
#include <signal.h>
|
2007-10-16 10:27:11 +02:00
|
|
|
#include <fcntl.h>
|
2005-04-17 00:20:36 +02:00
|
|
|
#include <sys/mman.h>
|
2007-10-16 10:27:00 +02:00
|
|
|
#include <sys/ptrace.h>
|
2005-04-17 00:20:36 +02:00
|
|
|
#include <sys/wait.h>
|
2007-10-16 10:27:00 +02:00
|
|
|
#include <asm/unistd.h>
|
|
|
|
#include "init.h"
|
|
|
|
#include "longjmp.h"
|
2005-04-17 00:20:36 +02:00
|
|
|
#include "os.h"
|
2006-02-24 22:03:55 +01:00
|
|
|
#include "skas_ptrace.h"
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
#define ARBITRARY_ADDR -1
|
|
|
|
#define FAILURE_PID -1
|
|
|
|
|
|
|
|
#define STAT_PATH_LEN sizeof("/proc/#######/stat\0")
|
|
|
|
#define COMM_SCANF "%*[^)])"
|
|
|
|
|
|
|
|
unsigned long os_process_pc(int pid)
|
|
|
|
{
|
|
|
|
char proc_stat[STAT_PATH_LEN], buf[256];
|
2007-10-16 10:27:11 +02:00
|
|
|
unsigned long pc = ARBITRARY_ADDR;
|
2005-04-17 00:20:36 +02:00
|
|
|
int fd, err;
|
|
|
|
|
|
|
|
sprintf(proc_stat, "/proc/%d/stat", pid);
|
2007-10-16 10:27:11 +02:00
|
|
|
fd = open(proc_stat, O_RDONLY, 0);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (fd < 0) {
|
|
|
|
printk(UM_KERN_ERR "os_process_pc - couldn't open '%s', "
|
2007-10-16 10:27:11 +02:00
|
|
|
"errno = %d\n", proc_stat, errno);
|
|
|
|
goto out;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
2007-05-06 23:51:35 +02:00
|
|
|
CATCH_EINTR(err = read(fd, buf, sizeof(buf)));
|
2007-10-16 10:27:00 +02:00
|
|
|
if (err < 0) {
|
|
|
|
printk(UM_KERN_ERR "os_process_pc - couldn't read '%s', "
|
|
|
|
"err = %d\n", proc_stat, errno);
|
2007-10-16 10:27:11 +02:00
|
|
|
goto out_close;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
os_close_file(fd);
|
|
|
|
pc = ARBITRARY_ADDR;
|
2007-10-16 10:27:00 +02:00
|
|
|
if (sscanf(buf, "%*d " COMM_SCANF " %*c %*d %*d %*d %*d %*d %*d %*d "
|
2007-10-16 10:27:11 +02:00
|
|
|
"%*d %*d %*d %*d %*d %*d %*d %*d %*d %*d %*d %*d %*d %*d "
|
|
|
|
"%*d %*d %*d %*d %*d %lu", &pc) != 1)
|
2007-10-16 10:27:00 +02:00
|
|
|
printk(UM_KERN_ERR "os_process_pc - couldn't find pc in '%s'\n",
|
|
|
|
buf);
|
2007-10-16 10:27:11 +02:00
|
|
|
out_close:
|
|
|
|
close(fd);
|
|
|
|
out:
|
2007-05-06 23:51:33 +02:00
|
|
|
return pc;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int os_process_parent(int pid)
|
|
|
|
{
|
|
|
|
char stat[STAT_PATH_LEN];
|
|
|
|
char data[256];
|
2007-10-16 10:27:11 +02:00
|
|
|
int parent = FAILURE_PID, n, fd;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
if (pid == -1)
|
2007-10-16 10:27:11 +02:00
|
|
|
return parent;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
snprintf(stat, sizeof(stat), "/proc/%d/stat", pid);
|
2007-10-16 10:27:11 +02:00
|
|
|
fd = open(stat, O_RDONLY, 0);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (fd < 0) {
|
2007-10-16 10:27:11 +02:00
|
|
|
printk(UM_KERN_ERR "Couldn't open '%s', errno = %d\n", stat,
|
|
|
|
errno);
|
|
|
|
return parent;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2007-05-06 23:51:35 +02:00
|
|
|
CATCH_EINTR(n = read(fd, data, sizeof(data)));
|
2007-10-16 10:27:11 +02:00
|
|
|
close(fd);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
if (n < 0) {
|
2007-10-16 10:27:11 +02:00
|
|
|
printk(UM_KERN_ERR "Couldn't read '%s', errno = %d\n", stat,
|
2007-10-16 10:27:00 +02:00
|
|
|
errno);
|
2007-10-16 10:27:11 +02:00
|
|
|
return parent;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
parent = FAILURE_PID;
|
|
|
|
n = sscanf(data, "%*d " COMM_SCANF " %*c %d", &parent);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (n != 1)
|
|
|
|
printk(UM_KERN_ERR "Failed to scan '%s'\n", data);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-05-06 23:51:33 +02:00
|
|
|
return parent;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void os_stop_process(int pid)
|
|
|
|
{
|
|
|
|
kill(pid, SIGSTOP);
|
|
|
|
}
|
|
|
|
|
|
|
|
void os_kill_process(int pid, int reap_child)
|
|
|
|
{
|
|
|
|
kill(pid, SIGKILL);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (reap_child)
|
2007-12-18 01:19:46 +01:00
|
|
|
CATCH_EINTR(waitpid(pid, NULL, __WALL));
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2006-02-24 22:03:55 +01:00
|
|
|
/* This is here uniquely to have access to the userspace errno, i.e. the one
|
|
|
|
* used by ptrace in case of error.
|
|
|
|
*/
|
|
|
|
|
|
|
|
long os_ptrace_ldt(long pid, long addr, long data)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = ptrace(PTRACE_LDT, pid, addr, data);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
return -errno;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
/* Kill off a ptraced child by all means available. kill it normally first,
|
|
|
|
* then PTRACE_KILL it, then PTRACE_CONT it in case it's in a run state from
|
|
|
|
* which it can't exit directly.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void os_kill_ptraced_process(int pid, int reap_child)
|
|
|
|
{
|
|
|
|
kill(pid, SIGKILL);
|
|
|
|
ptrace(PTRACE_KILL, pid);
|
|
|
|
ptrace(PTRACE_CONT, pid);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (reap_child)
|
2007-12-18 01:19:46 +01:00
|
|
|
CATCH_EINTR(waitpid(pid, NULL, __WALL));
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2005-09-04 00:57:47 +02:00
|
|
|
/* Don't use the glibc version, which caches the result in TLS. It misses some
|
|
|
|
* syscalls, and also breaks with clone(), which does not unshare the TLS.
|
|
|
|
*/
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
int os_getpid(void)
|
|
|
|
{
|
2007-05-06 23:51:33 +02:00
|
|
|
return syscall(__NR_getpid);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2005-05-06 01:15:32 +02:00
|
|
|
int os_getpgrp(void)
|
|
|
|
{
|
|
|
|
return getpgrp();
|
|
|
|
}
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
int os_map_memory(void *virt, int fd, unsigned long long off, unsigned long len,
|
|
|
|
int r, int w, int x)
|
|
|
|
{
|
|
|
|
void *loc;
|
|
|
|
int prot;
|
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
prot = (r ? PROT_READ : 0) | (w ? PROT_WRITE : 0) |
|
2005-04-17 00:20:36 +02:00
|
|
|
(x ? PROT_EXEC : 0);
|
|
|
|
|
|
|
|
loc = mmap64((void *) virt, len, prot, MAP_SHARED | MAP_FIXED,
|
|
|
|
fd, off);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (loc == MAP_FAILED)
|
2007-05-06 23:51:33 +02:00
|
|
|
return -errno;
|
|
|
|
return 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int os_protect_memory(void *addr, unsigned long len, int r, int w, int x)
|
|
|
|
{
|
2007-10-16 10:27:00 +02:00
|
|
|
int prot = ((r ? PROT_READ : 0) | (w ? PROT_WRITE : 0) |
|
2005-04-17 00:20:36 +02:00
|
|
|
(x ? PROT_EXEC : 0));
|
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
if (mprotect(addr, len, prot) < 0)
|
2007-05-06 23:51:33 +02:00
|
|
|
return -errno;
|
2007-10-16 10:27:00 +02:00
|
|
|
|
|
|
|
return 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int os_unmap_memory(void *addr, int len)
|
|
|
|
{
|
2007-10-16 10:27:00 +02:00
|
|
|
int err;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
err = munmap(addr, len);
|
|
|
|
if (err < 0)
|
2007-05-06 23:51:33 +02:00
|
|
|
return -errno;
|
2007-10-16 10:27:00 +02:00
|
|
|
return 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2006-03-31 12:30:08 +02:00
|
|
|
#ifndef MADV_REMOVE
|
2006-04-19 07:20:24 +02:00
|
|
|
#define MADV_REMOVE KERNEL_MADV_REMOVE
|
2006-03-31 12:30:08 +02:00
|
|
|
#endif
|
|
|
|
|
2007-07-24 03:43:48 +02:00
|
|
|
int os_drop_memory(void *addr, int length)
|
2006-03-31 12:30:08 +02:00
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = madvise(addr, length, MADV_REMOVE);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (err < 0)
|
2006-03-31 12:30:08 +02:00
|
|
|
err = -errno;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-05-06 23:51:11 +02:00
|
|
|
int __init can_drop_memory(void)
|
2006-03-31 12:30:08 +02:00
|
|
|
{
|
|
|
|
void *addr;
|
2006-05-01 21:15:58 +02:00
|
|
|
int fd, ok = 0;
|
2006-03-31 12:30:08 +02:00
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
printk(UM_KERN_INFO "Checking host MADV_REMOVE support...");
|
2006-03-31 12:30:08 +02:00
|
|
|
fd = create_mem_file(UM_KERN_PAGE_SIZE);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (fd < 0) {
|
|
|
|
printk(UM_KERN_ERR "Creating test memory file failed, "
|
|
|
|
"err = %d\n", -fd);
|
2006-05-01 21:15:58 +02:00
|
|
|
goto out;
|
2006-03-31 12:30:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
addr = mmap64(NULL, UM_KERN_PAGE_SIZE, PROT_READ | PROT_WRITE,
|
2006-04-19 07:20:24 +02:00
|
|
|
MAP_SHARED, fd, 0);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (addr == MAP_FAILED) {
|
|
|
|
printk(UM_KERN_ERR "Mapping test memory file failed, "
|
|
|
|
"err = %d\n", -errno);
|
2006-05-01 21:15:58 +02:00
|
|
|
goto out_close;
|
2006-03-31 12:30:08 +02:00
|
|
|
}
|
|
|
|
|
2007-10-16 10:27:00 +02:00
|
|
|
if (madvise(addr, UM_KERN_PAGE_SIZE, MADV_REMOVE) != 0) {
|
|
|
|
printk(UM_KERN_ERR "MADV_REMOVE failed, err = %d\n", -errno);
|
2006-05-01 21:15:58 +02:00
|
|
|
goto out_unmap;
|
2006-03-31 12:30:08 +02:00
|
|
|
}
|
|
|
|
|
2008-02-08 13:22:08 +01:00
|
|
|
printk(UM_KERN_CONT "OK\n");
|
2006-05-01 21:15:58 +02:00
|
|
|
ok = 1;
|
|
|
|
|
|
|
|
out_unmap:
|
|
|
|
munmap(addr, UM_KERN_PAGE_SIZE);
|
|
|
|
out_close:
|
|
|
|
close(fd);
|
|
|
|
out:
|
|
|
|
return ok;
|
2006-03-31 12:30:08 +02:00
|
|
|
}
|
|
|
|
|
2006-07-10 13:45:07 +02:00
|
|
|
void init_new_thread_signals(void)
|
2005-09-04 00:57:47 +02:00
|
|
|
{
|
2011-08-18 21:04:39 +02:00
|
|
|
set_handler(SIGSEGV);
|
|
|
|
set_handler(SIGTRAP);
|
|
|
|
set_handler(SIGFPE);
|
|
|
|
set_handler(SIGILL);
|
|
|
|
set_handler(SIGBUS);
|
2005-09-04 00:57:47 +02:00
|
|
|
signal(SIGHUP, SIG_IGN);
|
2011-08-18 21:04:39 +02:00
|
|
|
set_handler(SIGIO);
|
2008-02-05 07:31:16 +01:00
|
|
|
signal(SIGWINCH, SIG_IGN);
|
2011-05-25 02:13:04 +02:00
|
|
|
signal(SIGTERM, SIG_DFL);
|
2005-09-04 00:57:47 +02:00
|
|
|
}
|
|
|
|
|
2007-10-16 10:27:05 +02:00
|
|
|
int run_kernel_thread(int (*fn)(void *), void *arg, jmp_buf **jmp_ptr)
|
2005-09-04 00:57:47 +02:00
|
|
|
{
|
2006-04-19 07:21:41 +02:00
|
|
|
jmp_buf buf;
|
2006-07-14 09:24:02 +02:00
|
|
|
int n;
|
[PATCH] uml: implement soft interrupts
This patch implements soft interrupts. Interrupt enabling and disabling no
longer map to sigprocmask. Rather, a flag is set indicating whether
interrupts may be handled. If a signal comes in and interrupts are marked as
OK, then it is handled normally. If interrupts are marked as off, then the
signal handler simply returns after noting that a signal needs handling. When
interrupts are enabled later on, this pending signals flag is checked, and the
IRQ handlers are called at that point.
The point of this is to reduce the cost of local_irq_save et al, since they
are very much more common than the signals that they are enabling and
disabling. Soft interrupts produce a speed-up of ~25% on a kernel build.
Subtleties -
UML uses sigsetjmp/siglongjmp to switch contexts. sigsetjmp has been
wrapped in a save_flags-like macro which remembers the interrupt state at
setjmp time, and restores it when it is longjmp-ed back to.
The enable_signals function has to loop because the IRQ handler
disables interrupts before returning. enable_signals has to return with
signals enabled, and signals may come in between the disabling and the
return to enable_signals. So, it loops for as long as there are pending
signals, ensuring that signals are enabled when it finally returns, and
that there are no pending signals that need to be dealt with.
Signed-off-by: Jeff Dike <jdike@addtoit.com>
Cc: Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-01-19 02:42:49 +01:00
|
|
|
|
|
|
|
*jmp_ptr = &buf;
|
2006-07-14 09:24:02 +02:00
|
|
|
n = UML_SETJMP(&buf);
|
2007-10-16 10:27:00 +02:00
|
|
|
if (n != 0)
|
2006-07-14 09:24:02 +02:00
|
|
|
return n;
|
[PATCH] uml: implement soft interrupts
This patch implements soft interrupts. Interrupt enabling and disabling no
longer map to sigprocmask. Rather, a flag is set indicating whether
interrupts may be handled. If a signal comes in and interrupts are marked as
OK, then it is handled normally. If interrupts are marked as off, then the
signal handler simply returns after noting that a signal needs handling. When
interrupts are enabled later on, this pending signals flag is checked, and the
IRQ handlers are called at that point.
The point of this is to reduce the cost of local_irq_save et al, since they
are very much more common than the signals that they are enabling and
disabling. Soft interrupts produce a speed-up of ~25% on a kernel build.
Subtleties -
UML uses sigsetjmp/siglongjmp to switch contexts. sigsetjmp has been
wrapped in a save_flags-like macro which remembers the interrupt state at
setjmp time, and restores it when it is longjmp-ed back to.
The enable_signals function has to loop because the IRQ handler
disables interrupts before returning. enable_signals has to return with
signals enabled, and signals may come in between the disabling and the
return to enable_signals. So, it loops for as long as there are pending
signals, ensuring that signals are enabled when it finally returns, and
that there are no pending signals that need to be dealt with.
Signed-off-by: Jeff Dike <jdike@addtoit.com>
Cc: Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-01-19 02:42:49 +01:00
|
|
|
(*fn)(arg);
|
2006-07-14 09:24:02 +02:00
|
|
|
return 0;
|
2005-09-04 00:57:47 +02:00
|
|
|
}
|