Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/sommerfeld_i386mp_1]: src/sys/arch/i386/i386 MD systrace gluons.



details:   https://anonhg.NetBSD.org/src/rev/d6a6be1415c8
branches:  sommerfeld_i386mp_1
changeset: 482544:d6a6be1415c8
user:      christos <christos%NetBSD.org@localhost>
date:      Mon Jun 17 16:33:08 2002 +0000

description:
MD systrace gluons.

diffstat:

 sys/arch/i386/i386/mach_syscall.c |  281 ++++++++++++++++++++++++++++++++++++++
 1 files changed, 281 insertions(+), 0 deletions(-)

diffs (285 lines):

diff -r d758846aa9e7 -r d6a6be1415c8 sys/arch/i386/i386/mach_syscall.c
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/sys/arch/i386/i386/mach_syscall.c Mon Jun 17 16:33:08 2002 +0000
@@ -0,0 +1,281 @@
+/*     $NetBSD: mach_syscall.c,v 1.3.2.2 2002/06/17 16:33:08 christos Exp $    */
+
+/*-
+ * Copyright (c) 1998, 2000 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * This code is derived from software contributed to The NetBSD Foundation
+ * by Charles M. Hannum.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *        This product includes software developed by the NetBSD
+ *        Foundation, Inc. and its contributors.
+ * 4. Neither the name of The NetBSD Foundation nor the names of its
+ *    contributors may be used to endorse or promote products derived
+ *    from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <sys/cdefs.h>
+__KERNEL_RCSID(0, "$NetBSD: mach_syscall.c,v 1.3.2.2 2002/06/17 16:33:08 christos Exp $");
+
+#include "opt_syscall_debug.h"
+#include "opt_vm86.h"
+#include "opt_ktrace.h"
+#include "opt_systrace.h"
+
+#include <sys/param.h>
+#include <sys/systm.h>
+#include <sys/proc.h>
+#include <sys/user.h>
+#include <sys/signal.h>
+#ifdef KTRACE
+#include <sys/ktrace.h>
+#endif
+#ifdef SYSTRACE
+#include <sys/systrace.h>
+#endif
+#include <sys/syscall.h>
+
+#include <uvm/uvm_extern.h>
+
+#include <machine/cpu.h>
+#include <machine/psl.h>
+#include <machine/userret.h>
+#include <compat/mach/mach_syscall.h>
+
+void mach_syscall_intern __P((struct proc *));
+void mach_syscall_plain __P((struct trapframe));
+void mach_syscall_fancy __P((struct trapframe));
+
+extern struct sysent mach_sysent[];
+
+void
+mach_syscall_intern(p)
+       struct proc *p;
+{
+#ifdef KTRACE
+       if (p->p_traceflag & (KTRFAC_SYSCALL | KTRFAC_SYSRET)) {
+               p->p_md.md_syscall = syscall_fancy;
+               return;
+       }
+#endif
+#ifdef SYSTRACE
+       if (ISSET(p->p_flag, P_SYSTRACE)) {
+               p->p_md.md_syscall = syscall_fancy;
+               return;
+       } 
+#endif
+       p->p_md.md_syscall = syscall_plain;
+}
+
+
+/*
+ * syscall(frame):
+ *     System call request from POSIX system call gate interface to kernel.
+ * Like trap(), argument is call by reference.
+ */
+void
+mach_syscall_plain(frame)
+       struct trapframe frame;
+{
+       register caddr_t params;
+       register const struct sysent *callp;
+       register struct proc *p;
+       int error;
+       size_t argsize;
+       register_t code, args[8], rval[2];
+
+       uvmexp.syscalls++;
+       p = curproc;
+
+       code = frame.tf_eax;
+       params = (caddr_t)frame.tf_esp + sizeof(int);
+
+       switch (code) {
+       case SYS_syscall:
+               /*
+                * Code is first argument, followed by actual args.
+                */
+               code = fuword(params);
+               params += sizeof(int);
+               uprintf("->syscall(%d)\n", code);
+               break;
+       case SYS___syscall:
+               /*
+                * Like syscall, but code is a quad, so as to maintain
+                * quad alignment for the rest of the arguments.
+                */
+               code = fuword(params + _QUAD_LOWWORD * sizeof(int));
+               uprintf("->__syscall(%d)\n", code);
+               params += sizeof(quad_t);
+               break;
+       default:
+               break;
+       }
+
+       if (code < 0) {
+               uprintf("->mach(%d)\n", code);
+               code = -code;
+               callp = mach_sysent;
+               code &= (MACH_SYS_NSYSENT - 1);
+       } else {
+               callp = p->p_emul->e_sysent;
+               code &= (SYS_NSYSENT - 1);
+       }
+
+       callp += code;
+       argsize = callp->sy_argsize;
+       if (argsize) {
+               error = copyin(params, (caddr_t)args, argsize);
+               if (error)
+                       goto bad;
+       }
+
+#ifdef SYSCALL_DEBUG
+       scdebug_call(p, code, args);
+#endif /* SYSCALL_DEBUG */
+
+       rval[0] = 0;
+       rval[1] = 0;
+       error = (*callp->sy_call)(p, args, rval);
+       switch (error) {
+       case 0:
+               frame.tf_eax = rval[0];
+               frame.tf_edx = rval[1];
+               frame.tf_eflags &= ~PSL_C;      /* carry bit */
+               break;
+       case ERESTART:
+               /*
+                * The offset to adjust the PC by depends on whether we entered
+                * the kernel through the trap or call gate.  We pushed the
+                * size of the instruction into tf_err on entry.
+                */
+               frame.tf_eip -= frame.tf_err;
+               break;
+       case EJUSTRETURN:
+               /* nothing to do */
+               break;
+       default:
+       bad:
+               frame.tf_eax = error;
+               frame.tf_eflags |= PSL_C;       /* carry bit */
+               break;
+       }
+
+#ifdef SYSCALL_DEBUG
+       scdebug_ret(p, code, error, rval);
+#endif /* SYSCALL_DEBUG */
+       userret(p);
+}
+
+void
+mach_syscall_fancy(frame)
+       struct trapframe frame;
+{
+       register caddr_t params;
+       register const struct sysent *callp;
+       register struct proc *p;
+       int error;
+       size_t argsize;
+       register_t code, args[8], rval[2];
+
+       uvmexp.syscalls++;
+       p = curproc;
+
+       code = frame.tf_eax;
+       params = (caddr_t)frame.tf_esp + sizeof(int);
+
+       switch (code) {
+       case SYS_syscall:
+               /*
+                * Code is first argument, followed by actual args.
+                */
+               code = fuword(params);
+               params += sizeof(int);
+               uprintf("->syscall(%d)\n", code);
+               break;
+       case SYS___syscall:
+               /*
+                * Like syscall, but code is a quad, so as to maintain
+                * quad alignment for the rest of the arguments.
+                */
+               code = fuword(params + _QUAD_LOWWORD * sizeof(int));
+               params += sizeof(quad_t);
+               uprintf("->__syscall(%d)\n", code);
+               break;
+       default:
+               break;
+       }
+
+       if (code < 0) {
+               uprintf("->mach(%d)\n", code);
+               code = -code;
+               callp = mach_sysent;
+               code &= (MACH_SYS_NSYSENT - 1);
+       } else {
+               callp = p->p_emul->e_sysent;
+               code &= (SYS_NSYSENT - 1);
+       }
+       callp += code;
+       argsize = callp->sy_argsize;
+       if (argsize) {
+               error = copyin(params, (caddr_t)args, argsize);
+               if (error)
+                       goto bad;
+       }
+
+       if ((error = trace_enter(p, code, args, rval)) != 0)
+               goto bad;
+
+       rval[0] = 0;
+       rval[1] = 0;
+       error = (*callp->sy_call)(p, args, rval);
+       switch (error) {
+       case 0:
+               frame.tf_eax = rval[0];
+               frame.tf_edx = rval[1];
+               frame.tf_eflags &= ~PSL_C;      /* carry bit */
+               break;
+       case ERESTART:
+               /*
+                * The offset to adjust the PC by depends on whether we entered
+                * the kernel through the trap or call gate.  We pushed the
+                * size of the instruction into tf_err on entry.
+                */
+               frame.tf_eip -= frame.tf_err;
+               break;
+       case EJUSTRETURN:
+               /* nothing to do */
+               break;
+       default:
+       bad:
+               frame.tf_eax = error;
+               frame.tf_eflags |= PSL_C;       /* carry bit */
+               break;
+       }
+
+       trace_exit(p, code, args, rval, error);
+
+       userret(p);
+}



Home | Main Index | Thread Index | Old Index