]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/um/kernel/process.c
Merge tag 'topic/drm-misc-2016-03-22' of git://anongit.freedesktop.org/drm-intel...
[mirror_ubuntu-artful-kernel.git] / arch / um / kernel / process.c
CommitLineData
995473ae 1/*
2eb5f31b
AI
2 * Copyright (C) 2015 Anton Ivanov (aivanov@{brocade.com,kot-begemot.co.uk})
3 * Copyright (C) 2015 Thomas Meyer (thomas@m3y3r.de)
ba180fd4 4 * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
1da177e4
LT
5 * Copyright 2003 PathScale, Inc.
6 * Licensed under the GPL
7 */
8
c5d4bb17
JD
9#include <linux/stddef.h>
10#include <linux/err.h>
11#include <linux/hardirq.h>
c5d4bb17 12#include <linux/mm.h>
6613c5e8 13#include <linux/module.h>
c5d4bb17
JD
14#include <linux/personality.h>
15#include <linux/proc_fs.h>
16#include <linux/ptrace.h>
17#include <linux/random.h>
5a0e3ad6 18#include <linux/slab.h>
c5d4bb17 19#include <linux/sched.h>
6613c5e8 20#include <linux/seq_file.h>
c5d4bb17
JD
21#include <linux/tick.h>
22#include <linux/threads.h>
d50349b0 23#include <linux/tracehook.h>
c5d4bb17
JD
24#include <asm/current.h>
25#include <asm/pgtable.h>
445c5786 26#include <asm/mmu_context.h>
c5d4bb17 27#include <asm/uaccess.h>
37185b33
AV
28#include <as-layout.h>
29#include <kern_util.h>
30#include <os.h>
31#include <skas.h>
2eb5f31b 32#include <timer-internal.h>
1da177e4 33
ba180fd4
JD
34/*
35 * This is a per-cpu array. A processor only modifies its entry and it only
1da177e4
LT
36 * cares about its entry, so it's OK if another processor is modifying its
37 * entry.
38 */
39struct cpu_task cpu_tasks[NR_CPUS] = { [0 ... NR_CPUS - 1] = { -1, NULL } };
40
2dc5802a 41static inline int external_pid(void)
1da177e4 42{
77bf4400 43 /* FIXME: Need to look up userspace_pid by cpu */
ba180fd4 44 return userspace_pid[0];
1da177e4
LT
45}
46
47int pid_to_processor_id(int pid)
48{
49 int i;
50
c5d4bb17 51 for (i = 0; i < ncpus; i++) {
ba180fd4 52 if (cpu_tasks[i].pid == pid)
6e21aec3 53 return i;
1da177e4 54 }
6e21aec3 55 return -1;
1da177e4
LT
56}
57
58void free_stack(unsigned long stack, int order)
59{
60 free_pages(stack, order);
61}
62
63unsigned long alloc_stack(int order, int atomic)
64{
65 unsigned long page;
53f9fc93 66 gfp_t flags = GFP_KERNEL;
1da177e4 67
46db4a42
PBG
68 if (atomic)
69 flags = GFP_ATOMIC;
1da177e4 70 page = __get_free_pages(flags, order);
5c8aacea 71
6e21aec3 72 return page;
1da177e4
LT
73}
74
6e21aec3 75static inline void set_current(struct task_struct *task)
1da177e4 76{
ca9bc0bb 77 cpu_tasks[task_thread_info(task)->cpu] = ((struct cpu_task)
2dc5802a 78 { external_pid(), task });
1da177e4
LT
79}
80
291248fd 81extern void arch_switch_to(struct task_struct *to);
77bf4400 82
76b278ed 83void *__switch_to(struct task_struct *from, struct task_struct *to)
1da177e4 84{
995473ae
JD
85 to->thread.prev_sched = from;
86 set_current(to);
f6e34c6a 87
a1850e9c
RW
88 switch_threads(&from->thread.switch_buf, &to->thread.switch_buf);
89 arch_switch_to(current);
f6e34c6a 90
6e21aec3 91 return current->thread.prev_sched;
1da177e4
LT
92}
93
94void interrupt_end(void)
95{
ccaee5f8
IM
96 struct pt_regs *regs = &current->thread.regs;
97
ba180fd4 98 if (need_resched())
6e21aec3 99 schedule();
d50349b0 100 if (test_thread_flag(TIF_SIGPENDING))
ccaee5f8 101 do_signal(regs);
a42c6ded 102 if (test_and_clear_thread_flag(TIF_NOTIFY_RESUME))
ccaee5f8 103 tracehook_notify_resume(regs);
1da177e4
LT
104}
105
1da177e4
LT
106void exit_thread(void)
107{
1da177e4 108}
995473ae 109
c2220b2a 110int get_current_pid(void)
1da177e4 111{
c2220b2a 112 return task_pid_nr(current);
1da177e4
LT
113}
114
ba180fd4
JD
115/*
116 * This is called magically, by its address being stuffed in a jmp_buf
77bf4400
JD
117 * and being longjmp-d to.
118 */
119void new_thread_handler(void)
120{
121 int (*fn)(void *), n;
122 void *arg;
123
ba180fd4 124 if (current->thread.prev_sched != NULL)
77bf4400
JD
125 schedule_tail(current->thread.prev_sched);
126 current->thread.prev_sched = NULL;
127
128 fn = current->thread.request.u.thread.proc;
129 arg = current->thread.request.u.thread.arg;
130
ba180fd4 131 /*
22e2430d 132 * callback returns only if the kernel thread execs a process
77bf4400 133 */
22e2430d
AV
134 n = fn(arg);
135 userspace(&current->thread.regs.regs);
77bf4400
JD
136}
137
138/* Called magically, see new_thread_handler above */
139void fork_handler(void)
140{
141 force_flush_all();
77bf4400
JD
142
143 schedule_tail(current->thread.prev_sched);
144
ba180fd4
JD
145 /*
146 * XXX: if interrupt_end() calls schedule, this call to
77bf4400 147 * arch_switch_to isn't needed. We could want to apply this to
ba180fd4
JD
148 * improve performance. -bb
149 */
291248fd 150 arch_switch_to(current);
77bf4400
JD
151
152 current->thread.prev_sched = NULL;
153
77bf4400
JD
154 userspace(&current->thread.regs.regs);
155}
156
6f2c55b8 157int copy_thread(unsigned long clone_flags, unsigned long sp,
afa86fc4 158 unsigned long arg, struct task_struct * p)
1da177e4 159{
77bf4400 160 void (*handler)(void);
d2ce4e92 161 int kthread = current->flags & PF_KTHREAD;
77bf4400 162 int ret = 0;
aa6758d4 163
1da177e4 164 p->thread = (struct thread_struct) INIT_THREAD;
aa6758d4 165
d2ce4e92 166 if (!kthread) {
2b067fc9 167 memcpy(&p->thread.regs.regs, current_pt_regs(),
77bf4400 168 sizeof(p->thread.regs.regs));
a3170d2e 169 PT_REGS_SET_SYSCALL_RETURN(&p->thread.regs, 0);
ba180fd4 170 if (sp != 0)
18baddda 171 REGS_SP(p->thread.regs.regs.gp) = sp;
aa6758d4 172
77bf4400 173 handler = fork_handler;
aa6758d4 174
77bf4400 175 arch_copy_thread(&current->thread.arch, &p->thread.arch);
d2ce4e92 176 } else {
fbfe9c84 177 get_safe_registers(p->thread.regs.regs.gp, p->thread.regs.regs.fp);
1f02ab4a
AV
178 p->thread.request.u.thread.proc = (int (*)(void *))sp;
179 p->thread.request.u.thread.arg = (void *)arg;
77bf4400
JD
180 handler = new_thread_handler;
181 }
182
183 new_thread(task_stack_page(p), &p->thread.switch_buf, handler);
184
d2ce4e92 185 if (!kthread) {
77bf4400
JD
186 clear_flushed_tls(p);
187
188 /*
189 * Set a new TLS for the child thread?
190 */
191 if (clone_flags & CLONE_SETTLS)
192 ret = arch_copy_tls(p);
193 }
aa6758d4 194
aa6758d4 195 return ret;
1da177e4
LT
196}
197
198void initial_thread_cb(void (*proc)(void *), void *arg)
199{
200 int save_kmalloc_ok = kmalloc_ok;
201
202 kmalloc_ok = 0;
6aa802ce 203 initial_thread_cb_skas(proc, arg);
1da177e4
LT
204 kmalloc_ok = save_kmalloc_ok;
205}
995473ae 206
8198c169 207void arch_cpu_idle(void)
1da177e4 208{
a5a678c8 209 cpu_tasks[current_thread_info()->cpu].pid = os_getpid();
2eb5f31b 210 os_idle_sleep(UM_NSEC_PER_SEC);
8198c169 211 local_irq_enable();
1da177e4
LT
212}
213
b6316293
PBG
214int __cant_sleep(void) {
215 return in_atomic() || irqs_disabled() || in_interrupt();
216 /* Is in_interrupt() really needed? */
1da177e4
LT
217}
218
1da177e4
LT
219int user_context(unsigned long sp)
220{
221 unsigned long stack;
222
223 stack = sp & (PAGE_MASK << CONFIG_KERNEL_STACK_ORDER);
a5a678c8 224 return stack != (unsigned long) current_thread_info();
1da177e4
LT
225}
226
1da177e4
LT
227extern exitcall_t __uml_exitcall_begin, __uml_exitcall_end;
228
229void do_uml_exitcalls(void)
230{
231 exitcall_t *call;
232
233 call = &__uml_exitcall_end;
234 while (--call >= &__uml_exitcall_begin)
235 (*call)();
236}
237
c0a9290e 238char *uml_strdup(const char *string)
1da177e4 239{
dfe52244 240 return kstrdup(string, GFP_KERNEL);
1da177e4 241}
73395a00 242EXPORT_SYMBOL(uml_strdup);
1da177e4 243
1da177e4
LT
244int copy_to_user_proc(void __user *to, void *from, int size)
245{
6e21aec3 246 return copy_to_user(to, from, size);
1da177e4
LT
247}
248
249int copy_from_user_proc(void *to, void __user *from, int size)
250{
6e21aec3 251 return copy_from_user(to, from, size);
1da177e4
LT
252}
253
254int clear_user_proc(void __user *buf, int size)
255{
6e21aec3 256 return clear_user(buf, size);
1da177e4
LT
257}
258
259int strlen_user_proc(char __user *str)
260{
6e21aec3 261 return strlen_user(str);
1da177e4
LT
262}
263
1da177e4
LT
264int cpu(void)
265{
a5a678c8 266 return current_thread_info()->cpu;
1da177e4
LT
267}
268
269static atomic_t using_sysemu = ATOMIC_INIT(0);
270int sysemu_supported;
271
272void set_using_sysemu(int value)
273{
274 if (value > sysemu_supported)
275 return;
276 atomic_set(&using_sysemu, value);
277}
278
279int get_using_sysemu(void)
280{
281 return atomic_read(&using_sysemu);
282}
283
6613c5e8 284static int sysemu_proc_show(struct seq_file *m, void *v)
1da177e4 285{
6613c5e8
AD
286 seq_printf(m, "%d\n", get_using_sysemu());
287 return 0;
288}
1da177e4 289
6613c5e8
AD
290static int sysemu_proc_open(struct inode *inode, struct file *file)
291{
292 return single_open(file, sysemu_proc_show, NULL);
1da177e4
LT
293}
294
6613c5e8
AD
295static ssize_t sysemu_proc_write(struct file *file, const char __user *buf,
296 size_t count, loff_t *pos)
1da177e4
LT
297{
298 char tmp[2];
299
300 if (copy_from_user(tmp, buf, 1))
301 return -EFAULT;
302
303 if (tmp[0] >= '0' && tmp[0] <= '2')
304 set_using_sysemu(tmp[0] - '0');
ba180fd4
JD
305 /* We use the first char, but pretend to write everything */
306 return count;
1da177e4
LT
307}
308
6613c5e8
AD
309static const struct file_operations sysemu_proc_fops = {
310 .owner = THIS_MODULE,
311 .open = sysemu_proc_open,
312 .read = seq_read,
313 .llseek = seq_lseek,
314 .release = single_release,
315 .write = sysemu_proc_write,
316};
317
1da177e4
LT
318int __init make_proc_sysemu(void)
319{
320 struct proc_dir_entry *ent;
321 if (!sysemu_supported)
322 return 0;
323
6613c5e8 324 ent = proc_create("sysemu", 0600, NULL, &sysemu_proc_fops);
1da177e4
LT
325
326 if (ent == NULL)
327 {
30f417c6 328 printk(KERN_WARNING "Failed to register /proc/sysemu\n");
6e21aec3 329 return 0;
1da177e4
LT
330 }
331
1da177e4
LT
332 return 0;
333}
334
335late_initcall(make_proc_sysemu);
336
337int singlestepping(void * t)
338{
339 struct task_struct *task = t ? t : current;
340
c5d4bb17 341 if (!(task->ptrace & PT_DTRACE))
ba180fd4 342 return 0;
1da177e4
LT
343
344 if (task->thread.singlestep_syscall)
ba180fd4 345 return 1;
1da177e4
LT
346
347 return 2;
348}
349
b8bd0220
BS
350/*
351 * Only x86 and x86_64 have an arch_align_stack().
352 * All other arches have "#define arch_align_stack(x) (x)"
cf7bc58f 353 * in their asm/exec.h
b8bd0220
BS
354 * As this is included in UML from asm-um/system-generic.h,
355 * we can use it to behave as the subarch does.
356 */
357#ifndef arch_align_stack
1da177e4
LT
358unsigned long arch_align_stack(unsigned long sp)
359{
8f80e946 360 if (!(current->personality & ADDR_NO_RANDOMIZE) && randomize_va_space)
1da177e4
LT
361 sp -= get_random_int() % 8192;
362 return sp & ~0xf;
363}
b8bd0220 364#endif
c1127465
JD
365
366unsigned long get_wchan(struct task_struct *p)
367{
368 unsigned long stack_page, sp, ip;
369 bool seen_sched = 0;
370
371 if ((p == NULL) || (p == current) || (p->state == TASK_RUNNING))
372 return 0;
373
374 stack_page = (unsigned long) task_stack_page(p);
375 /* Bail if the process has no kernel stack for some reason */
376 if (stack_page == 0)
377 return 0;
378
379 sp = p->thread.switch_buf->JB_SP;
380 /*
381 * Bail if the stack pointer is below the bottom of the kernel
382 * stack for some reason
383 */
384 if (sp < stack_page)
385 return 0;
386
387 while (sp < stack_page + THREAD_SIZE) {
388 ip = *((unsigned long *) sp);
389 if (in_sched_functions(ip))
390 /* Ignore everything until we're above the scheduler */
391 seen_sched = 1;
392 else if (kernel_text_address(ip) && seen_sched)
393 return ip;
394
395 sp += sizeof(unsigned long);
396 }
397
398 return 0;
399}
8192ab42
JD
400
401int elf_core_copy_fpregs(struct task_struct *t, elf_fpregset_t *fpu)
402{
403 int cpu = current_thread_info()->cpu;
404
405 return save_fp_registers(userspace_pid[cpu], (unsigned long *) fpu);
406}
407