This source file includes following definitions.
- exec_m68k4k_makecmds
- exec_m68k4k_prep_zmagic
- exec_m68k4k_prep_nmagic
- exec_m68k4k_prep_omagic
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45 #if !defined(__m68k__)
46 #error YOU GOTTA BE KIDDING!
47 #endif
48
49 #include <sys/param.h>
50 #include <sys/systm.h>
51 #include <sys/proc.h>
52 #include <sys/malloc.h>
53 #include <sys/vnode.h>
54 #include <sys/exec.h>
55 #include <sys/resourcevar.h>
56
57 #include <uvm/uvm_extern.h>
58
59 #include <compat/m68k4k/m68k4k_exec.h>
60
61 int exec_m68k4k_prep_zmagic(struct proc *, struct exec_package *);
62 int exec_m68k4k_prep_nmagic(struct proc *, struct exec_package *);
63 int exec_m68k4k_prep_omagic(struct proc *, struct exec_package *);
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78 int
79 exec_m68k4k_makecmds(p, epp)
80 struct proc *p;
81 struct exec_package *epp;
82 {
83 u_long midmag, magic;
84 u_short mid;
85 int error;
86 struct exec *execp = epp->ep_hdr;
87
88
89 if (M68K4K_LDPGSZ != PAGE_SIZE)
90 return ENOEXEC;
91
92 if (epp->ep_hdrvalid < sizeof(struct exec))
93 return ENOEXEC;
94
95 midmag = ntohl(execp->a_midmag);
96 mid = (midmag >> 16) & 0x3ff;
97 magic = midmag & 0xffff;
98
99 midmag = mid << 16 | magic;
100
101 switch (midmag) {
102 case (MID_M68K4K << 16) | ZMAGIC:
103 error = exec_m68k4k_prep_zmagic(p, epp);
104 break;
105 case (MID_M68K4K << 16) | NMAGIC:
106 error = exec_m68k4k_prep_nmagic(p, epp);
107 break;
108 case (MID_M68K4K << 16) | OMAGIC:
109 error = exec_m68k4k_prep_omagic(p, epp);
110 break;
111 default:
112 error = ENOEXEC;
113 }
114
115 if (error)
116 kill_vmcmds(&epp->ep_vmcmds);
117
118 return error;
119 }
120
121
122
123
124
125
126
127
128
129
130
131 int
132 exec_m68k4k_prep_zmagic(p, epp)
133 struct proc *p;
134 struct exec_package *epp;
135 {
136 struct exec *execp = epp->ep_hdr;
137
138 epp->ep_taddr = M68K4K_USRTEXT;
139 epp->ep_tsize = execp->a_text;
140 epp->ep_daddr = epp->ep_taddr + execp->a_text;
141 epp->ep_dsize = execp->a_data + execp->a_bss;
142 epp->ep_entry = execp->a_entry;
143
144
145
146
147
148
149 if ((execp->a_text != 0 || execp->a_data != 0) &&
150 epp->ep_vp->v_writecount != 0) {
151 #ifdef DIAGNOSTIC
152 if (epp->ep_vp->v_flag & VTEXT)
153 panic("exec: a VTEXT vnode has writecount != 0");
154 #endif
155 return ETXTBSY;
156 }
157 vn_marktext(epp->ep_vp);
158
159
160 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_pagedvn, execp->a_text,
161 epp->ep_taddr, epp->ep_vp, 0, VM_PROT_READ|VM_PROT_EXECUTE);
162
163
164 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_pagedvn, execp->a_data,
165 epp->ep_daddr, epp->ep_vp, execp->a_text,
166 VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE);
167
168
169 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_zero, execp->a_bss,
170 epp->ep_daddr + execp->a_data, NULLVP, 0,
171 VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE);
172
173 return exec_setup_stack(p, epp);
174 }
175
176
177
178
179
180 int
181 exec_m68k4k_prep_nmagic(p, epp)
182 struct proc *p;
183 struct exec_package *epp;
184 {
185 struct exec *execp = epp->ep_hdr;
186 long bsize, baddr;
187
188 epp->ep_taddr = M68K4K_USRTEXT;
189 epp->ep_tsize = execp->a_text;
190 epp->ep_daddr = roundup(epp->ep_taddr + execp->a_text,
191 M68K4K_LDPGSZ);
192 epp->ep_dsize = execp->a_data + execp->a_bss;
193 epp->ep_entry = execp->a_entry;
194
195
196 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_readvn, execp->a_text,
197 epp->ep_taddr, epp->ep_vp, sizeof(struct exec),
198 VM_PROT_READ|VM_PROT_EXECUTE);
199
200
201 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_readvn, execp->a_data,
202 epp->ep_daddr, epp->ep_vp, execp->a_text + sizeof(struct exec),
203 VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE);
204
205
206 baddr = round_page(epp->ep_daddr + execp->a_data);
207 bsize = epp->ep_daddr + epp->ep_dsize - baddr;
208 if (bsize > 0)
209 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_zero, bsize, baddr,
210 NULLVP, 0, VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE);
211
212 return exec_setup_stack(p, epp);
213 }
214
215
216
217
218
219 int
220 exec_m68k4k_prep_omagic(p, epp)
221 struct proc *p;
222 struct exec_package *epp;
223 {
224 struct exec *execp = epp->ep_hdr;
225 long dsize, bsize, baddr;
226
227 epp->ep_taddr = M68K4K_USRTEXT;
228 epp->ep_tsize = execp->a_text;
229 epp->ep_daddr = epp->ep_taddr + execp->a_text;
230 epp->ep_dsize = execp->a_data + execp->a_bss;
231 epp->ep_entry = execp->a_entry;
232
233
234 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_readvn,
235 execp->a_text + execp->a_data, epp->ep_taddr, epp->ep_vp,
236 sizeof(struct exec), VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE);
237
238
239 baddr = round_page(epp->ep_daddr + execp->a_data);
240 bsize = epp->ep_daddr + epp->ep_dsize - baddr;
241 if (bsize > 0)
242 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_zero, bsize, baddr,
243 NULLVP, 0, VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE);
244
245
246
247
248
249
250
251
252
253 dsize = epp->ep_dsize + execp->a_text - round_page(execp->a_text);
254 epp->ep_dsize = (dsize > 0) ? dsize : 0;
255 return exec_setup_stack(p, epp);
256 }