1 /* $NetBSD: vax1k_exec.c,v 1.14 2007/12/08 18:36:29 dsl Exp $ */ 2 3 /* 4 * Copyright (c) 1993, 1994 Christopher G. Demetriou 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. All advertising materials mentioning features or use of this software 16 * must display the following acknowledgement: 17 * This product includes software developed by Christopher G. Demetriou. 18 * 4. The name of the author may not be used to endorse or promote products 19 * derived from this software without specific prior written permission 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 22 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 23 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 24 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 26 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 30 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33 /* 34 * Exec glue to provide compatibility with older NetBSD vax1k exectuables. 35 * 36 * Because NetBSD/vax now uses 4k page size, older binaries (that started 37 * on an 1k boundary) cannot be mmap'ed. Therefore they are read in 38 * (via vn_rdwr) as OMAGIC binaries and executed. This will use a little 39 * bit more memory, but otherwise won't affect the execution speed. 40 */ 41 42 #include <sys/cdefs.h> 43 __KERNEL_RCSID(0, "$NetBSD: vax1k_exec.c,v 1.14 2007/12/08 18:36:29 dsl Exp $"); 44 45 #include <sys/param.h> 46 #include <sys/systm.h> 47 #include <sys/proc.h> 48 #include <sys/malloc.h> 49 #include <sys/vnode.h> 50 #include <sys/exec.h> 51 #include <sys/resourcevar.h> 52 53 #include <compat/vax1k/vax1k_exec.h> 54 55 #if defined(_KERNEL_OPT) 56 #include "opt_compat_43.h" 57 #else 58 #define COMPAT_43 /* enable 4.3BSD binaries for lkm */ 59 #endif 60 61 int exec_vax1k_prep_anymagic(struct lwp *l, struct exec_package *epp, 62 int, int); 63 64 /* 65 * exec_vax1k_makecmds(): Check if it's an a.out-format executable 66 * with an vax1k magic number. 67 * 68 * Given a proc pointer and an exec package pointer, see if the referent 69 * of the epp is in a.out format. Just check 'standard' magic numbers for 70 * this architecture. 71 * 72 * This function, in the former case, or the hook, in the latter, is 73 * responsible for creating a set of vmcmds which can be used to build 74 * the process's vm space and inserting them into the exec package. 75 */ 76 77 int 78 exec_vax1k_makecmds(struct lwp *l, struct exec_package *epp) 79 { 80 u_long midmag, magic; 81 u_short mid; 82 int error; 83 struct exec *execp = epp->ep_hdr; 84 85 if (epp->ep_hdrvalid < sizeof(struct exec)) 86 return ENOEXEC; 87 88 midmag = ntohl(execp->a_midmag); 89 mid = (midmag >> 16) & 0x3ff; 90 magic = midmag & 0xffff; 91 92 midmag = mid << 16 | magic; 93 94 switch (midmag) { 95 case (MID_VAX1K << 16) | ZMAGIC: 96 error = exec_vax1k_prep_anymagic(l, epp, 0, 0); 97 goto done; 98 99 case (MID_VAX1K << 16) | NMAGIC: 100 error = exec_vax1k_prep_anymagic(l, epp, 101 sizeof(struct exec), 1); 102 goto done; 103 104 case (MID_VAX1K << 16) | OMAGIC: 105 error = exec_vax1k_prep_anymagic(l, epp, 106 sizeof(struct exec), 0); 107 goto done; 108 } 109 110 #ifdef COMPAT_43 111 /* 112 * 4.3BSD pre-dates CPU midmag (e.g. MID_VAX1K). instead, we 113 * expect a magic number in native byte order. 114 */ 115 switch (execp->a_midmag) { 116 case ZMAGIC: 117 error = exec_vax1k_prep_anymagic(l, epp, VAX1K_LDPGSZ, 0); 118 goto done; 119 120 case NMAGIC: 121 error = exec_vax1k_prep_anymagic(l, epp, 122 sizeof(struct exec), 1); 123 goto done; 124 125 case OMAGIC: 126 error = exec_vax1k_prep_anymagic(l, epp, 127 sizeof(struct exec), 0); 128 goto done; 129 } 130 #endif 131 132 /* failed... */ 133 error = ENOEXEC; 134 135 done: 136 if (error) 137 kill_vmcmds(&epp->ep_vmcmds); 138 139 return error; 140 } 141 142 /* 143 * exec_vax1k_prep_anymagic(): Prepare an vax1k ?MAGIC binary's exec package 144 * 145 * First, set of the various offsets/lengths in the exec package. 146 * Note that all code is mapped RW; no protection, but because it is 147 * only used for compatibility it won't hurt. 148 * 149 */ 150 int 151 exec_vax1k_prep_anymagic(l, epp, text_foffset, textpad) 152 struct lwp *l; 153 struct exec_package *epp; 154 int text_foffset, textpad; 155 { 156 struct exec *execp = epp->ep_hdr; 157 158 epp->ep_taddr = execp->a_entry & ~(VAX1K_USRTEXT - 1); 159 epp->ep_tsize = execp->a_text; 160 epp->ep_daddr = epp->ep_taddr + epp->ep_tsize; 161 if (textpad) /* pad for NMAGIC? */ 162 epp->ep_daddr = (epp->ep_daddr + (VAX1K_LDPGSZ - 1)) & 163 ~(VAX1K_LDPGSZ - 1); 164 epp->ep_dsize = execp->a_data; 165 epp->ep_entry = execp->a_entry; 166 167 /* first allocate memory for text+data+bss */ 168 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_zero, 169 round_page(epp->ep_daddr + epp->ep_dsize + execp->a_bss) - 170 trunc_page(epp->ep_taddr), /* size */ 171 trunc_page(epp->ep_taddr), NULLVP, /* addr, vnode */ 172 0, VM_PROT_READ|VM_PROT_WRITE|VM_PROT_EXECUTE); 173 174 /* then read the text in the area we just allocated */ 175 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_readvn, 176 epp->ep_tsize, epp->ep_taddr, epp->ep_vp, text_foffset, 177 VM_PROT_WRITE|VM_PROT_READ|VM_PROT_EXECUTE); 178 179 /* next read the data */ 180 if (epp->ep_dsize) { 181 NEW_VMCMD(&epp->ep_vmcmds, vmcmd_readvn, 182 epp->ep_dsize, epp->ep_daddr, epp->ep_vp, 183 text_foffset + epp->ep_tsize, 184 VM_PROT_WRITE|VM_PROT_READ|VM_PROT_EXECUTE); 185 } 186 187 /* now bump up the dsize to include the bss so that sbrk works */ 188 epp->ep_dsize += execp->a_bss; 189 190 /* finally, setup the stack ... */ 191 return (*epp->ep_esch->es_setup_stack)(l, epp); 192 } 193