Remove obsolete file.

This commit is contained in:
tron 2003-09-09 06:21:30 +00:00
parent f733d9708b
commit ee3ff63574
1 changed files with 0 additions and 327 deletions

View File

@ -1,327 +0,0 @@
/* $NetBSD: syscall.c,v 1.12 2003/06/28 14:21:14 darrenr Exp $ */
/*-
* Copyright (c) 1998, 2000 The NetBSD Foundation, Inc.
* All rights reserved.
*
* This code is derived from software contributed to The NetBSD Foundation
* by Charles M. Hannum.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the NetBSD
* Foundation, Inc. and its contributors.
* 4. Neither the name of The NetBSD Foundation nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
#include "opt_syscall_debug.h"
#include "opt_ktrace.h"
#include "opt_systrace.h"
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/proc.h>
#include <sys/user.h>
#include <sys/signal.h>
#include <sys/sa.h>
#include <sys/savar.h>
#ifdef KTRACE
#include <sys/ktrace.h>
#endif
#ifdef SYSTRACE
#include <sys/systrace.h>
#endif
#include <sys/syscall.h>
#include <uvm/uvm_extern.h>
#include <machine/cpu.h>
#include <machine/psl.h>
#include <machine/userret.h>
void syscall_intern __P((struct proc *));
void syscall_plain __P((struct trapframe));
void syscall_fancy __P((struct trapframe));
void
syscall_intern(p)
struct proc *p;
{
#ifdef KTRACE
if (p->p_traceflag & (KTRFAC_SYSCALL | KTRFAC_SYSRET)) {
p->p_md.md_syscall = syscall_fancy;
return;
}
#endif
#ifdef SYSTRACE
if (ISSET(p->p_flag, P_SYSTRACE)) {
p->p_md.md_syscall = syscall_fancy;
return;
}
#endif
p->p_md.md_syscall = syscall_plain;
}
/*
* syscall(frame):
* System call request from POSIX system call gate interface to kernel.
* Like trap(), argument is call by reference.
*/
void
syscall_plain(frame)
struct trapframe frame;
{
caddr_t params;
const struct sysent *callp;
struct proc *p;
struct lwp *l;
int error;
size_t argsize, argoff;
register_t code, args[9], rval[2], *argp;
uvmexp.syscalls++;
l = curlwp;
p = l->l_proc;
code = frame.tf_rax;
callp = p->p_emul->e_sysent;
argoff = 0;
argp = &args[0];
switch (code) {
case SYS_syscall:
case SYS___syscall:
/*
* Code is first argument, followed by actual args.
*/
code = frame.tf_rdi;
argp = &args[1];
argoff = 1;
break;
default:
break;
}
code &= (SYS_NSYSENT - 1);
callp += code;
argsize = (callp->sy_argsize >> 3) + argoff;
if (argsize) {
switch (MIN(argsize, 6)) {
case 6:
args[5] = frame.tf_r9;
case 5:
args[4] = frame.tf_r8;
case 4:
args[3] = frame.tf_r10;
case 3:
args[2] = frame.tf_rdx;
case 2:
args[1] = frame.tf_rsi;
case 1:
args[0] = frame.tf_rdi;
break;
default:
panic("impossible syscall argsize");
}
if (argsize > 6) {
argsize -= 6;
params = (caddr_t)frame.tf_rsp + sizeof(register_t);
error = copyin(params, (caddr_t)&args[6],
argsize << 3);
if (error != 0)
goto bad;
}
}
#ifdef SYSCALL_DEBUG
scdebug_call(l, code, argp);
#endif /* SYSCALL_DEBUG */
rval[0] = 0;
rval[1] = 0;
KERNEL_PROC_LOCK(l);
error = (*callp->sy_call)(l, argp, rval);
KERNEL_PROC_UNLOCK(l);
switch (error) {
case 0:
frame.tf_rax = rval[0];
frame.tf_rdx = rval[1];
frame.tf_rflags &= ~PSL_C; /* carry bit */
break;
case ERESTART:
/*
* The offset to adjust the PC by depends on whether we entered
* the kernel through the trap or call gate. We pushed the
* size of the instruction into tf_err on entry.
*/
frame.tf_rip -= frame.tf_err;
break;
case EJUSTRETURN:
/* nothing to do */
break;
default:
bad:
frame.tf_rax = error;
frame.tf_rflags |= PSL_C; /* carry bit */
break;
}
#ifdef SYSCALL_DEBUG
scdebug_ret(l, code, error, rval);
#endif /* SYSCALL_DEBUG */
userret(l);
}
void
syscall_fancy(frame)
struct trapframe frame;
{
caddr_t params;
const struct sysent *callp;
struct proc *p;
struct lwp *l;
int error;
size_t argsize, argoff;
register_t code, args[9], rval[2], *argp;
uvmexp.syscalls++;
l = curlwp;
p = l->l_proc;
code = frame.tf_rax;
callp = p->p_emul->e_sysent;
argp = &args[0];
argoff = 0;
switch (code) {
case SYS_syscall:
case SYS___syscall:
/*
* Code is first argument, followed by actual args.
*/
code = frame.tf_rdi;
argp = &args[1];
argoff = 1;
break;
default:
break;
}
code &= (SYS_NSYSENT - 1);
callp += code;
argsize = (callp->sy_argsize >> 3) + argoff;
if (argsize) {
switch (MIN(argsize, 6)) {
case 6:
args[5] = frame.tf_r9;
case 5:
args[4] = frame.tf_r8;
case 4:
args[3] = frame.tf_r10;
case 3:
args[2] = frame.tf_rdx;
case 2:
args[1] = frame.tf_rsi;
case 1:
args[0] = frame.tf_rdi;
break;
default:
panic("impossible syscall argsize");
}
if (argsize > 6) {
argsize -= 6;
params = (caddr_t)frame.tf_rsp + sizeof(register_t);
error = copyin(params, (caddr_t)&args[6],
argsize << 3);
if (error != 0)
goto bad;
}
}
KERNEL_PROC_LOCK(l);
if ((error = trace_enter(l, code, code, NULL, args, rval)) != 0) {
KERNEL_PROC_UNLOCK(l);
goto bad;
}
rval[0] = 0;
rval[1] = 0;
error = (*callp->sy_call)(l, argp, rval);
KERNEL_PROC_UNLOCK(l);
switch (error) {
case 0:
frame.tf_rax = rval[0];
frame.tf_rdx = rval[1];
frame.tf_rflags &= ~PSL_C; /* carry bit */
break;
case ERESTART:
/*
* The offset to adjust the PC by depends on whether we entered
* the kernel through the trap or call gate. We pushed the
* size of the instruction into tf_err on entry.
*/
frame.tf_rip -= frame.tf_err;
break;
case EJUSTRETURN:
/* nothing to do */
break;
default:
bad:
frame.tf_rax = error;
frame.tf_rflags |= PSL_C; /* carry bit */
break;
}
trace_exit(l, code, args, rval, error);
userret(l);
}
void
child_return(arg)
void *arg;
{
struct lwp *l = arg;
struct trapframe *tf = l->l_md.md_regs;
#ifdef KTRACE
struct proc *p = l->l_proc;
#endif
tf->tf_rax = 0;
tf->tf_rflags &= ~PSL_C;
KERNEL_PROC_UNLOCK(l);
userret(l);
#ifdef KTRACE
if (KTRPOINT(p, KTR_SYSRET)) {
KERNEL_PROC_LOCK(l);
ktrsysret(l, SYS_fork, 0, 0);
KERNEL_PROC_UNLOCK(l);
}
#endif
}