Linux Audio

Check our new training course

Loading...
v4.17
 
  1/*
  2 * Copyright (C) 2015 Anton Ivanov (aivanov@{brocade.com,kot-begemot.co.uk})
  3 * Copyright (C) 2015 Thomas Meyer (thomas@m3y3r.de)
  4 * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
  5 * Copyright 2003 PathScale, Inc.
  6 * Licensed under the GPL
  7 */
  8
  9#include <linux/stddef.h>
 10#include <linux/err.h>
 11#include <linux/hardirq.h>
 12#include <linux/mm.h>
 13#include <linux/module.h>
 14#include <linux/personality.h>
 15#include <linux/proc_fs.h>
 16#include <linux/ptrace.h>
 17#include <linux/random.h>
 18#include <linux/slab.h>
 19#include <linux/sched.h>
 20#include <linux/sched/debug.h>
 21#include <linux/sched/task.h>
 22#include <linux/sched/task_stack.h>
 23#include <linux/seq_file.h>
 24#include <linux/tick.h>
 25#include <linux/threads.h>
 26#include <linux/tracehook.h>
 27#include <asm/current.h>
 28#include <asm/pgtable.h>
 29#include <asm/mmu_context.h>
 30#include <linux/uaccess.h>
 31#include <as-layout.h>
 32#include <kern_util.h>
 33#include <os.h>
 34#include <skas.h>
 35#include <timer-internal.h>
 36
 37/*
 38 * This is a per-cpu array.  A processor only modifies its entry and it only
 39 * cares about its entry, so it's OK if another processor is modifying its
 40 * entry.
 41 */
 42struct cpu_task cpu_tasks[NR_CPUS] = { [0 ... NR_CPUS - 1] = { -1, NULL } };
 43
 44static inline int external_pid(void)
 45{
 46	/* FIXME: Need to look up userspace_pid by cpu */
 47	return userspace_pid[0];
 48}
 49
 50int pid_to_processor_id(int pid)
 51{
 52	int i;
 53
 54	for (i = 0; i < ncpus; i++) {
 55		if (cpu_tasks[i].pid == pid)
 56			return i;
 57	}
 58	return -1;
 59}
 60
 61void free_stack(unsigned long stack, int order)
 62{
 63	free_pages(stack, order);
 64}
 65
 66unsigned long alloc_stack(int order, int atomic)
 67{
 68	unsigned long page;
 69	gfp_t flags = GFP_KERNEL;
 70
 71	if (atomic)
 72		flags = GFP_ATOMIC;
 73	page = __get_free_pages(flags, order);
 74
 75	return page;
 76}
 77
 78static inline void set_current(struct task_struct *task)
 79{
 80	cpu_tasks[task_thread_info(task)->cpu] = ((struct cpu_task)
 81		{ external_pid(), task });
 82}
 83
 84extern void arch_switch_to(struct task_struct *to);
 85
 86void *__switch_to(struct task_struct *from, struct task_struct *to)
 87{
 88	to->thread.prev_sched = from;
 89	set_current(to);
 90
 91	switch_threads(&from->thread.switch_buf, &to->thread.switch_buf);
 92	arch_switch_to(current);
 93
 94	return current->thread.prev_sched;
 95}
 96
 97void interrupt_end(void)
 98{
 99	struct pt_regs *regs = &current->thread.regs;
100
101	if (need_resched())
102		schedule();
103	if (test_thread_flag(TIF_SIGPENDING))
104		do_signal(regs);
105	if (test_and_clear_thread_flag(TIF_NOTIFY_RESUME))
106		tracehook_notify_resume(regs);
107}
108
109int get_current_pid(void)
110{
111	return task_pid_nr(current);
112}
113
114/*
115 * This is called magically, by its address being stuffed in a jmp_buf
116 * and being longjmp-d to.
117 */
118void new_thread_handler(void)
119{
120	int (*fn)(void *), n;
121	void *arg;
122
123	if (current->thread.prev_sched != NULL)
124		schedule_tail(current->thread.prev_sched);
125	current->thread.prev_sched = NULL;
126
127	fn = current->thread.request.u.thread.proc;
128	arg = current->thread.request.u.thread.arg;
129
130	/*
131	 * callback returns only if the kernel thread execs a process
132	 */
133	n = fn(arg);
134	userspace(&current->thread.regs.regs, current_thread_info()->aux_fp_regs);
135}
136
137/* Called magically, see new_thread_handler above */
138void fork_handler(void)
139{
140	force_flush_all();
141
142	schedule_tail(current->thread.prev_sched);
143
144	/*
145	 * XXX: if interrupt_end() calls schedule, this call to
146	 * arch_switch_to isn't needed. We could want to apply this to
147	 * improve performance. -bb
148	 */
149	arch_switch_to(current);
150
151	current->thread.prev_sched = NULL;
152
153	userspace(&current->thread.regs.regs, current_thread_info()->aux_fp_regs);
154}
155
156int copy_thread(unsigned long clone_flags, unsigned long sp,
157		unsigned long arg, struct task_struct * p)
158{
159	void (*handler)(void);
160	int kthread = current->flags & PF_KTHREAD;
161	int ret = 0;
162
163	p->thread = (struct thread_struct) INIT_THREAD;
164
165	if (!kthread) {
166	  	memcpy(&p->thread.regs.regs, current_pt_regs(),
167		       sizeof(p->thread.regs.regs));
168		PT_REGS_SET_SYSCALL_RETURN(&p->thread.regs, 0);
169		if (sp != 0)
170			REGS_SP(p->thread.regs.regs.gp) = sp;
171
172		handler = fork_handler;
173
174		arch_copy_thread(&current->thread.arch, &p->thread.arch);
175	} else {
176		get_safe_registers(p->thread.regs.regs.gp, p->thread.regs.regs.fp);
177		p->thread.request.u.thread.proc = (int (*)(void *))sp;
178		p->thread.request.u.thread.arg = (void *)arg;
179		handler = new_thread_handler;
180	}
181
182	new_thread(task_stack_page(p), &p->thread.switch_buf, handler);
183
184	if (!kthread) {
185		clear_flushed_tls(p);
186
187		/*
188		 * Set a new TLS for the child thread?
189		 */
190		if (clone_flags & CLONE_SETTLS)
191			ret = arch_copy_tls(p);
192	}
193
194	return ret;
195}
196
197void initial_thread_cb(void (*proc)(void *), void *arg)
198{
199	int save_kmalloc_ok = kmalloc_ok;
200
201	kmalloc_ok = 0;
202	initial_thread_cb_skas(proc, arg);
203	kmalloc_ok = save_kmalloc_ok;
204}
205
 
 
 
 
 
 
 
 
 
 
 
206void arch_cpu_idle(void)
207{
208	cpu_tasks[current_thread_info()->cpu].pid = os_getpid();
209	os_idle_sleep(UM_NSEC_PER_SEC);
210	local_irq_enable();
211}
212
213int __cant_sleep(void) {
214	return in_atomic() || irqs_disabled() || in_interrupt();
215	/* Is in_interrupt() really needed? */
216}
217
218int user_context(unsigned long sp)
219{
220	unsigned long stack;
221
222	stack = sp & (PAGE_MASK << CONFIG_KERNEL_STACK_ORDER);
223	return stack != (unsigned long) current_thread_info();
224}
225
226extern exitcall_t __uml_exitcall_begin, __uml_exitcall_end;
227
228void do_uml_exitcalls(void)
229{
230	exitcall_t *call;
231
232	call = &__uml_exitcall_end;
233	while (--call >= &__uml_exitcall_begin)
234		(*call)();
235}
236
237char *uml_strdup(const char *string)
238{
239	return kstrdup(string, GFP_KERNEL);
240}
241EXPORT_SYMBOL(uml_strdup);
242
243int copy_to_user_proc(void __user *to, void *from, int size)
244{
245	return copy_to_user(to, from, size);
246}
247
248int copy_from_user_proc(void *to, void __user *from, int size)
249{
250	return copy_from_user(to, from, size);
251}
252
253int clear_user_proc(void __user *buf, int size)
254{
255	return clear_user(buf, size);
256}
257
258int cpu(void)
259{
260	return current_thread_info()->cpu;
261}
262
263static atomic_t using_sysemu = ATOMIC_INIT(0);
264int sysemu_supported;
265
266void set_using_sysemu(int value)
267{
268	if (value > sysemu_supported)
269		return;
270	atomic_set(&using_sysemu, value);
271}
272
273int get_using_sysemu(void)
274{
275	return atomic_read(&using_sysemu);
276}
277
278static int sysemu_proc_show(struct seq_file *m, void *v)
279{
280	seq_printf(m, "%d\n", get_using_sysemu());
281	return 0;
282}
283
284static int sysemu_proc_open(struct inode *inode, struct file *file)
285{
286	return single_open(file, sysemu_proc_show, NULL);
287}
288
289static ssize_t sysemu_proc_write(struct file *file, const char __user *buf,
290				 size_t count, loff_t *pos)
291{
292	char tmp[2];
293
294	if (copy_from_user(tmp, buf, 1))
295		return -EFAULT;
296
297	if (tmp[0] >= '0' && tmp[0] <= '2')
298		set_using_sysemu(tmp[0] - '0');
299	/* We use the first char, but pretend to write everything */
300	return count;
301}
302
303static const struct file_operations sysemu_proc_fops = {
304	.owner		= THIS_MODULE,
305	.open		= sysemu_proc_open,
306	.read		= seq_read,
307	.llseek		= seq_lseek,
308	.release	= single_release,
309	.write		= sysemu_proc_write,
310};
311
312int __init make_proc_sysemu(void)
313{
314	struct proc_dir_entry *ent;
315	if (!sysemu_supported)
316		return 0;
317
318	ent = proc_create("sysemu", 0600, NULL, &sysemu_proc_fops);
319
320	if (ent == NULL)
321	{
322		printk(KERN_WARNING "Failed to register /proc/sysemu\n");
323		return 0;
324	}
325
326	return 0;
327}
328
329late_initcall(make_proc_sysemu);
330
331int singlestepping(void * t)
332{
333	struct task_struct *task = t ? t : current;
334
335	if (!(task->ptrace & PT_DTRACE))
336		return 0;
337
338	if (task->thread.singlestep_syscall)
339		return 1;
340
341	return 2;
342}
343
344/*
345 * Only x86 and x86_64 have an arch_align_stack().
346 * All other arches have "#define arch_align_stack(x) (x)"
347 * in their asm/exec.h
348 * As this is included in UML from asm-um/system-generic.h,
349 * we can use it to behave as the subarch does.
350 */
351#ifndef arch_align_stack
352unsigned long arch_align_stack(unsigned long sp)
353{
354	if (!(current->personality & ADDR_NO_RANDOMIZE) && randomize_va_space)
355		sp -= get_random_int() % 8192;
356	return sp & ~0xf;
357}
358#endif
359
360unsigned long get_wchan(struct task_struct *p)
361{
362	unsigned long stack_page, sp, ip;
363	bool seen_sched = 0;
364
365	if ((p == NULL) || (p == current) || (p->state == TASK_RUNNING))
366		return 0;
367
368	stack_page = (unsigned long) task_stack_page(p);
369	/* Bail if the process has no kernel stack for some reason */
370	if (stack_page == 0)
371		return 0;
372
373	sp = p->thread.switch_buf->JB_SP;
374	/*
375	 * Bail if the stack pointer is below the bottom of the kernel
376	 * stack for some reason
377	 */
378	if (sp < stack_page)
379		return 0;
380
381	while (sp < stack_page + THREAD_SIZE) {
382		ip = *((unsigned long *) sp);
383		if (in_sched_functions(ip))
384			/* Ignore everything until we're above the scheduler */
385			seen_sched = 1;
386		else if (kernel_text_address(ip) && seen_sched)
387			return ip;
388
389		sp += sizeof(unsigned long);
390	}
391
392	return 0;
393}
394
395int elf_core_copy_fpregs(struct task_struct *t, elf_fpregset_t *fpu)
396{
397	int cpu = current_thread_info()->cpu;
398
399	return save_i387_registers(userspace_pid[cpu], (unsigned long *) fpu);
400}
401
v5.9
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 * Copyright (C) 2015 Anton Ivanov (aivanov@{brocade.com,kot-begemot.co.uk})
  4 * Copyright (C) 2015 Thomas Meyer (thomas@m3y3r.de)
  5 * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
  6 * Copyright 2003 PathScale, Inc.
 
  7 */
  8
  9#include <linux/stddef.h>
 10#include <linux/err.h>
 11#include <linux/hardirq.h>
 12#include <linux/mm.h>
 13#include <linux/module.h>
 14#include <linux/personality.h>
 15#include <linux/proc_fs.h>
 16#include <linux/ptrace.h>
 17#include <linux/random.h>
 18#include <linux/slab.h>
 19#include <linux/sched.h>
 20#include <linux/sched/debug.h>
 21#include <linux/sched/task.h>
 22#include <linux/sched/task_stack.h>
 23#include <linux/seq_file.h>
 24#include <linux/tick.h>
 25#include <linux/threads.h>
 26#include <linux/tracehook.h>
 27#include <asm/current.h>
 
 28#include <asm/mmu_context.h>
 29#include <linux/uaccess.h>
 30#include <as-layout.h>
 31#include <kern_util.h>
 32#include <os.h>
 33#include <skas.h>
 34#include <linux/time-internal.h>
 35
 36/*
 37 * This is a per-cpu array.  A processor only modifies its entry and it only
 38 * cares about its entry, so it's OK if another processor is modifying its
 39 * entry.
 40 */
 41struct cpu_task cpu_tasks[NR_CPUS] = { [0 ... NR_CPUS - 1] = { -1, NULL } };
 42
 43static inline int external_pid(void)
 44{
 45	/* FIXME: Need to look up userspace_pid by cpu */
 46	return userspace_pid[0];
 47}
 48
 49int pid_to_processor_id(int pid)
 50{
 51	int i;
 52
 53	for (i = 0; i < ncpus; i++) {
 54		if (cpu_tasks[i].pid == pid)
 55			return i;
 56	}
 57	return -1;
 58}
 59
 60void free_stack(unsigned long stack, int order)
 61{
 62	free_pages(stack, order);
 63}
 64
 65unsigned long alloc_stack(int order, int atomic)
 66{
 67	unsigned long page;
 68	gfp_t flags = GFP_KERNEL;
 69
 70	if (atomic)
 71		flags = GFP_ATOMIC;
 72	page = __get_free_pages(flags, order);
 73
 74	return page;
 75}
 76
 77static inline void set_current(struct task_struct *task)
 78{
 79	cpu_tasks[task_thread_info(task)->cpu] = ((struct cpu_task)
 80		{ external_pid(), task });
 81}
 82
 83extern void arch_switch_to(struct task_struct *to);
 84
 85void *__switch_to(struct task_struct *from, struct task_struct *to)
 86{
 87	to->thread.prev_sched = from;
 88	set_current(to);
 89
 90	switch_threads(&from->thread.switch_buf, &to->thread.switch_buf);
 91	arch_switch_to(current);
 92
 93	return current->thread.prev_sched;
 94}
 95
 96void interrupt_end(void)
 97{
 98	struct pt_regs *regs = &current->thread.regs;
 99
100	if (need_resched())
101		schedule();
102	if (test_thread_flag(TIF_SIGPENDING))
103		do_signal(regs);
104	if (test_and_clear_thread_flag(TIF_NOTIFY_RESUME))
105		tracehook_notify_resume(regs);
106}
107
108int get_current_pid(void)
109{
110	return task_pid_nr(current);
111}
112
113/*
114 * This is called magically, by its address being stuffed in a jmp_buf
115 * and being longjmp-d to.
116 */
117void new_thread_handler(void)
118{
119	int (*fn)(void *), n;
120	void *arg;
121
122	if (current->thread.prev_sched != NULL)
123		schedule_tail(current->thread.prev_sched);
124	current->thread.prev_sched = NULL;
125
126	fn = current->thread.request.u.thread.proc;
127	arg = current->thread.request.u.thread.arg;
128
129	/*
130	 * callback returns only if the kernel thread execs a process
131	 */
132	n = fn(arg);
133	userspace(&current->thread.regs.regs, current_thread_info()->aux_fp_regs);
134}
135
136/* Called magically, see new_thread_handler above */
137void fork_handler(void)
138{
139	force_flush_all();
140
141	schedule_tail(current->thread.prev_sched);
142
143	/*
144	 * XXX: if interrupt_end() calls schedule, this call to
145	 * arch_switch_to isn't needed. We could want to apply this to
146	 * improve performance. -bb
147	 */
148	arch_switch_to(current);
149
150	current->thread.prev_sched = NULL;
151
152	userspace(&current->thread.regs.regs, current_thread_info()->aux_fp_regs);
153}
154
155int copy_thread(unsigned long clone_flags, unsigned long sp,
156		unsigned long arg, struct task_struct * p, unsigned long tls)
157{
158	void (*handler)(void);
159	int kthread = current->flags & PF_KTHREAD;
160	int ret = 0;
161
162	p->thread = (struct thread_struct) INIT_THREAD;
163
164	if (!kthread) {
165	  	memcpy(&p->thread.regs.regs, current_pt_regs(),
166		       sizeof(p->thread.regs.regs));
167		PT_REGS_SET_SYSCALL_RETURN(&p->thread.regs, 0);
168		if (sp != 0)
169			REGS_SP(p->thread.regs.regs.gp) = sp;
170
171		handler = fork_handler;
172
173		arch_copy_thread(&current->thread.arch, &p->thread.arch);
174	} else {
175		get_safe_registers(p->thread.regs.regs.gp, p->thread.regs.regs.fp);
176		p->thread.request.u.thread.proc = (int (*)(void *))sp;
177		p->thread.request.u.thread.arg = (void *)arg;
178		handler = new_thread_handler;
179	}
180
181	new_thread(task_stack_page(p), &p->thread.switch_buf, handler);
182
183	if (!kthread) {
184		clear_flushed_tls(p);
185
186		/*
187		 * Set a new TLS for the child thread?
188		 */
189		if (clone_flags & CLONE_SETTLS)
190			ret = arch_set_tls(p, tls);
191	}
192
193	return ret;
194}
195
196void initial_thread_cb(void (*proc)(void *), void *arg)
197{
198	int save_kmalloc_ok = kmalloc_ok;
199
200	kmalloc_ok = 0;
201	initial_thread_cb_skas(proc, arg);
202	kmalloc_ok = save_kmalloc_ok;
203}
204
205static void um_idle_sleep(void)
206{
207	unsigned long long duration = UM_NSEC_PER_SEC;
208
209	if (time_travel_mode != TT_MODE_OFF) {
210		time_travel_sleep(duration);
211	} else {
212		os_idle_sleep(duration);
213	}
214}
215
216void arch_cpu_idle(void)
217{
218	cpu_tasks[current_thread_info()->cpu].pid = os_getpid();
219	um_idle_sleep();
220	local_irq_enable();
221}
222
223int __cant_sleep(void) {
224	return in_atomic() || irqs_disabled() || in_interrupt();
225	/* Is in_interrupt() really needed? */
226}
227
228int user_context(unsigned long sp)
229{
230	unsigned long stack;
231
232	stack = sp & (PAGE_MASK << CONFIG_KERNEL_STACK_ORDER);
233	return stack != (unsigned long) current_thread_info();
234}
235
236extern exitcall_t __uml_exitcall_begin, __uml_exitcall_end;
237
238void do_uml_exitcalls(void)
239{
240	exitcall_t *call;
241
242	call = &__uml_exitcall_end;
243	while (--call >= &__uml_exitcall_begin)
244		(*call)();
245}
246
247char *uml_strdup(const char *string)
248{
249	return kstrdup(string, GFP_KERNEL);
250}
251EXPORT_SYMBOL(uml_strdup);
252
253int copy_to_user_proc(void __user *to, void *from, int size)
254{
255	return copy_to_user(to, from, size);
256}
257
258int copy_from_user_proc(void *to, void __user *from, int size)
259{
260	return copy_from_user(to, from, size);
261}
262
263int clear_user_proc(void __user *buf, int size)
264{
265	return clear_user(buf, size);
266}
267
268int cpu(void)
269{
270	return current_thread_info()->cpu;
271}
272
273static atomic_t using_sysemu = ATOMIC_INIT(0);
274int sysemu_supported;
275
276void set_using_sysemu(int value)
277{
278	if (value > sysemu_supported)
279		return;
280	atomic_set(&using_sysemu, value);
281}
282
283int get_using_sysemu(void)
284{
285	return atomic_read(&using_sysemu);
286}
287
288static int sysemu_proc_show(struct seq_file *m, void *v)
289{
290	seq_printf(m, "%d\n", get_using_sysemu());
291	return 0;
292}
293
294static int sysemu_proc_open(struct inode *inode, struct file *file)
295{
296	return single_open(file, sysemu_proc_show, NULL);
297}
298
299static ssize_t sysemu_proc_write(struct file *file, const char __user *buf,
300				 size_t count, loff_t *pos)
301{
302	char tmp[2];
303
304	if (copy_from_user(tmp, buf, 1))
305		return -EFAULT;
306
307	if (tmp[0] >= '0' && tmp[0] <= '2')
308		set_using_sysemu(tmp[0] - '0');
309	/* We use the first char, but pretend to write everything */
310	return count;
311}
312
313static const struct proc_ops sysemu_proc_ops = {
314	.proc_open	= sysemu_proc_open,
315	.proc_read	= seq_read,
316	.proc_lseek	= seq_lseek,
317	.proc_release	= single_release,
318	.proc_write	= sysemu_proc_write,
 
319};
320
321int __init make_proc_sysemu(void)
322{
323	struct proc_dir_entry *ent;
324	if (!sysemu_supported)
325		return 0;
326
327	ent = proc_create("sysemu", 0600, NULL, &sysemu_proc_ops);
328
329	if (ent == NULL)
330	{
331		printk(KERN_WARNING "Failed to register /proc/sysemu\n");
332		return 0;
333	}
334
335	return 0;
336}
337
338late_initcall(make_proc_sysemu);
339
340int singlestepping(void * t)
341{
342	struct task_struct *task = t ? t : current;
343
344	if (!(task->ptrace & PT_DTRACE))
345		return 0;
346
347	if (task->thread.singlestep_syscall)
348		return 1;
349
350	return 2;
351}
352
353/*
354 * Only x86 and x86_64 have an arch_align_stack().
355 * All other arches have "#define arch_align_stack(x) (x)"
356 * in their asm/exec.h
357 * As this is included in UML from asm-um/system-generic.h,
358 * we can use it to behave as the subarch does.
359 */
360#ifndef arch_align_stack
361unsigned long arch_align_stack(unsigned long sp)
362{
363	if (!(current->personality & ADDR_NO_RANDOMIZE) && randomize_va_space)
364		sp -= get_random_int() % 8192;
365	return sp & ~0xf;
366}
367#endif
368
369unsigned long get_wchan(struct task_struct *p)
370{
371	unsigned long stack_page, sp, ip;
372	bool seen_sched = 0;
373
374	if ((p == NULL) || (p == current) || (p->state == TASK_RUNNING))
375		return 0;
376
377	stack_page = (unsigned long) task_stack_page(p);
378	/* Bail if the process has no kernel stack for some reason */
379	if (stack_page == 0)
380		return 0;
381
382	sp = p->thread.switch_buf->JB_SP;
383	/*
384	 * Bail if the stack pointer is below the bottom of the kernel
385	 * stack for some reason
386	 */
387	if (sp < stack_page)
388		return 0;
389
390	while (sp < stack_page + THREAD_SIZE) {
391		ip = *((unsigned long *) sp);
392		if (in_sched_functions(ip))
393			/* Ignore everything until we're above the scheduler */
394			seen_sched = 1;
395		else if (kernel_text_address(ip) && seen_sched)
396			return ip;
397
398		sp += sizeof(unsigned long);
399	}
400
401	return 0;
402}
403
404int elf_core_copy_fpregs(struct task_struct *t, elf_fpregset_t *fpu)
405{
406	int cpu = current_thread_info()->cpu;
407
408	return save_i387_registers(userspace_pid[cpu], (unsigned long *) fpu);
409}
410