2015-12-14 15:40:38 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* arch/arm/src/armv7-r/arm_syscall.c
|
|
|
|
*
|
2019-11-28 19:47:36 +01:00
|
|
|
* Copyright (C) 2015, 20-19 Gregory Nutt. All rights reserved.
|
2015-12-14 15:40:38 +01:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <syscall.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <arch/irq.h>
|
|
|
|
#include <nuttx/sched.h>
|
|
|
|
|
2019-11-28 19:47:36 +01:00
|
|
|
#include "signal/signal.h"
|
2015-12-14 15:40:38 +01:00
|
|
|
#include "arm.h"
|
|
|
|
#include "svcall.h"
|
|
|
|
#include "up_internal.h"
|
|
|
|
|
|
|
|
/****************************************************************************
|
2016-06-13 22:01:32 +02:00
|
|
|
* Private Functions
|
2015-12-14 15:40:38 +01:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: dispatch_syscall
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Call the stub function corresponding to the system call. NOTE the non-
|
|
|
|
* standard parameter passing:
|
|
|
|
*
|
|
|
|
* R0 = SYS_ call number
|
|
|
|
* R1 = parm0
|
|
|
|
* R2 = parm1
|
|
|
|
* R3 = parm2
|
|
|
|
* R4 = parm3
|
|
|
|
* R5 = parm4
|
|
|
|
* R6 = parm5
|
|
|
|
*
|
|
|
|
* The values of R4-R5 may be preserved in the proxy called by the user
|
|
|
|
* code if they are used (but otherwise will not be).
|
|
|
|
*
|
|
|
|
* WARNING: There are hard-coded values in this logic!
|
|
|
|
*
|
|
|
|
* Register usage:
|
|
|
|
*
|
|
|
|
* R0 - Need not be preserved.
|
|
|
|
* R1-R3 - Need to be preserved until the stub is called. The values of
|
|
|
|
* R0 and R1 returned by the stub must be preserved.
|
|
|
|
* R4-R11 must be preserved to support the expectations of the user-space
|
|
|
|
* callee. R4-R6 may have been preserved by the proxy, but don't know
|
|
|
|
* for sure.
|
|
|
|
* R12 - Need not be preserved
|
|
|
|
* R13 - (stack pointer)
|
|
|
|
* R14 - Need not be preserved
|
|
|
|
* R15 - (PC)
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_LIB_SYSCALL
|
|
|
|
static void dispatch_syscall(void) naked_function;
|
|
|
|
static void dispatch_syscall(void)
|
|
|
|
{
|
|
|
|
__asm__ __volatile__
|
|
|
|
(
|
|
|
|
" sub sp, sp, #16\n" /* Create a stack frame to hold 3 parms + lr */
|
|
|
|
" str r4, [sp, #0]\n" /* Move parameter 4 (if any) into position */
|
|
|
|
" str r5, [sp, #4]\n" /* Move parameter 5 (if any) into position */
|
|
|
|
" str r6, [sp, #8]\n" /* Move parameter 6 (if any) into position */
|
|
|
|
" str lr, [sp, #12]\n" /* Save lr in the stack frame */
|
|
|
|
" ldr ip, =g_stublookup\n" /* R12=The base of the stub lookup table */
|
|
|
|
" ldr ip, [ip, r0, lsl #2]\n" /* R12=The address of the stub for this SYSCALL */
|
|
|
|
" blx ip\n" /* Call the stub (modifies lr) */
|
|
|
|
" ldr lr, [sp, #12]\n" /* Restore lr */
|
|
|
|
" add sp, sp, #16\n" /* Destroy the stack frame */
|
|
|
|
" mov r2, r0\n" /* R2=Save return value in R2 */
|
|
|
|
" mov r0, #0\n" /* R0=SYS_syscall_return */
|
|
|
|
" svc #0x900001\n" /* Return from the SYSCALL */
|
|
|
|
);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: arm_syscall
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* SVC interrupts will vector here with insn=the SVC instruction and
|
|
|
|
* xcp=the interrupt context
|
|
|
|
*
|
|
|
|
* The handler may get the SVC number be de-referencing the return
|
|
|
|
* address saved in the xcp and decoding the SVC instruction
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_LIB_SYSCALL
|
|
|
|
uint32_t *arm_syscall(uint32_t *regs)
|
|
|
|
{
|
|
|
|
uint32_t cmd;
|
2015-12-21 17:57:01 +01:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
uint32_t cpsr;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Nested interrupts are not supported */
|
|
|
|
|
|
|
|
DEBUGASSERT(regs);
|
|
|
|
|
|
|
|
/* The SYSCALL command is in R0 on entry. Parameters follow in R1..R7 */
|
|
|
|
|
|
|
|
cmd = regs[REG_R0];
|
|
|
|
|
|
|
|
/* The SVCall software interrupt is called with R0 = system call command
|
|
|
|
* and R1..R7 = variable number of arguments depending on the system call.
|
|
|
|
*/
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
svcinfo("SYSCALL Entry: regs: %p cmd: %d\n", regs, cmd);
|
|
|
|
svcinfo(" R0: %08x %08x %08x %08x %08x %08x %08x %08x\n",
|
|
|
|
regs[REG_R0], regs[REG_R1], regs[REG_R2], regs[REG_R3],
|
|
|
|
regs[REG_R4], regs[REG_R5], regs[REG_R6], regs[REG_R7]);
|
|
|
|
svcinfo(" R8: %08x %08x %08x %08x %08x %08x %08x %08x\n",
|
|
|
|
regs[REG_R8], regs[REG_R9], regs[REG_R10], regs[REG_R11],
|
|
|
|
regs[REG_R12], regs[REG_R13], regs[REG_R14], regs[REG_R15]);
|
|
|
|
svcinfo("CPSR: %08x\n", regs[REG_CPSR]);
|
2015-12-14 15:40:38 +01:00
|
|
|
|
|
|
|
/* Handle the SVCall according to the command in R0 */
|
|
|
|
|
|
|
|
switch (cmd)
|
|
|
|
{
|
|
|
|
/* R0=SYS_syscall_return: This a SYSCALL return command:
|
|
|
|
*
|
|
|
|
* void up_syscall_return(void);
|
|
|
|
*
|
|
|
|
* At this point, the following values are saved in context:
|
|
|
|
*
|
|
|
|
* R0 = SYS_syscall_return
|
|
|
|
*
|
|
|
|
* We need to restore the saved return address and return in
|
|
|
|
* unprivileged thread mode.
|
|
|
|
*/
|
|
|
|
|
|
|
|
case SYS_syscall_return:
|
|
|
|
{
|
|
|
|
FAR struct tcb_s *rtcb = sched_self();
|
|
|
|
int index = (int)rtcb->xcp.nsyscalls - 1;
|
|
|
|
|
|
|
|
/* Make sure that there is a saved SYSCALL return address. */
|
|
|
|
|
|
|
|
DEBUGASSERT(index >= 0);
|
|
|
|
|
|
|
|
/* Setup to return to the saved SYSCALL return address in
|
|
|
|
* the original mode.
|
|
|
|
*/
|
|
|
|
|
|
|
|
regs[REG_PC] = rtcb->xcp.syscall[index].sysreturn;
|
2015-12-21 17:57:01 +01:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
regs[REG_CPSR] = rtcb->xcp.syscall[index].cpsr;
|
|
|
|
#endif
|
|
|
|
/* The return value must be in R0-R1. dispatch_syscall() temporarily
|
|
|
|
* moved the value for R0 into R2.
|
|
|
|
*/
|
|
|
|
|
|
|
|
regs[REG_R0] = regs[REG_R2];
|
|
|
|
|
|
|
|
#ifdef CONFIG_ARCH_KERNEL_STACK
|
|
|
|
/* If this is the outermost SYSCALL and if there is a saved user stack
|
|
|
|
* pointer, then restore the user stack pointer on this final return to
|
|
|
|
* user code.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (index == 0 && rtcb->xcp.ustkptr != NULL)
|
|
|
|
{
|
|
|
|
regs[REG_SP] = (uint32_t)rtcb->xcp.ustkptr;
|
|
|
|
rtcb->xcp.ustkptr = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/* Save the new SYSCALL nesting level */
|
|
|
|
|
2019-11-28 19:47:36 +01:00
|
|
|
rtcb->xcp.nsyscalls = index;
|
|
|
|
|
|
|
|
/* Handle any signal actions that were deferred while processing
|
|
|
|
* the system call.
|
|
|
|
*/
|
|
|
|
|
|
|
|
rtcb->flags &= ~TCB_FLAG_SYSCALL;
|
|
|
|
(void)nxsig_unmask_pendingsignal();
|
2015-12-14 15:40:38 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* R0=SYS_context_restore: Restore task context
|
|
|
|
*
|
2020-04-30 18:40:03 +02:00
|
|
|
* void arm_fullcontextrestore(uint32_t *restoreregs) noreturn_function;
|
2015-12-14 15:40:38 +01:00
|
|
|
*
|
|
|
|
* At this point, the following values are saved in context:
|
|
|
|
*
|
|
|
|
* R0 = SYS_context_restore
|
|
|
|
* R1 = restoreregs
|
|
|
|
*/
|
|
|
|
|
2015-12-21 17:57:01 +01:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
case SYS_context_restore:
|
|
|
|
{
|
|
|
|
/* Replace 'regs' with the pointer to the register set in
|
|
|
|
* regs[REG_R1]. On return from the system call, that register
|
|
|
|
* set will determine the restored context.
|
|
|
|
*/
|
|
|
|
|
|
|
|
regs = (uint32_t *)regs[REG_R1];
|
|
|
|
DEBUGASSERT(regs);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* R0=SYS_task_start: This a user task start
|
|
|
|
*
|
|
|
|
* void up_task_start(main_t taskentry, int argc, FAR char *argv[]) noreturn_function;
|
|
|
|
*
|
|
|
|
* At this point, the following values are saved in context:
|
|
|
|
*
|
|
|
|
* R0 = SYS_task_start
|
|
|
|
* R1 = taskentry
|
|
|
|
* R2 = argc
|
|
|
|
* R3 = argv
|
|
|
|
*/
|
|
|
|
|
2015-12-21 17:57:01 +01:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
case SYS_task_start:
|
|
|
|
{
|
|
|
|
/* Set up to return to the user-space _start function in
|
|
|
|
* unprivileged mode. We need:
|
|
|
|
*
|
|
|
|
* R0 = argc
|
|
|
|
* R1 = argv
|
|
|
|
* PC = taskentry
|
|
|
|
* CSPR = user mode
|
|
|
|
*/
|
|
|
|
|
|
|
|
regs[REG_PC] = regs[REG_R1];
|
|
|
|
regs[REG_R0] = regs[REG_R2];
|
|
|
|
regs[REG_R1] = regs[REG_R3];
|
|
|
|
|
|
|
|
cpsr = regs[REG_CPSR] & ~PSR_MODE_MASK;
|
|
|
|
regs[REG_CPSR] = cpsr | PSR_MODE_USR;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* R0=SYS_pthread_start: This a user pthread start
|
|
|
|
*
|
|
|
|
* void up_pthread_start(pthread_startroutine_t entrypt, pthread_addr_t arg) noreturn_function;
|
|
|
|
*
|
|
|
|
* At this point, the following values are saved in context:
|
|
|
|
*
|
|
|
|
* R0 = SYS_pthread_start
|
|
|
|
* R1 = entrypt
|
|
|
|
* R2 = arg
|
|
|
|
*/
|
|
|
|
|
2015-12-21 17:57:01 +01:00
|
|
|
#if defined(CONFIG_BUILD_PROTECTED) && !defined(CONFIG_DISABLE_PTHREAD)
|
2015-12-14 15:40:38 +01:00
|
|
|
case SYS_pthread_start:
|
|
|
|
{
|
|
|
|
/* Set up to return to the user-space pthread start-up function in
|
|
|
|
* unprivileged mode. We need:
|
|
|
|
*
|
|
|
|
* R0 = arg
|
|
|
|
* PC = entrypt
|
|
|
|
* CSPR = user mode
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
regs[REG_PC] = regs[REG_R1];
|
|
|
|
regs[REG_R0] = regs[REG_R2];
|
|
|
|
|
|
|
|
cpsr = regs[REG_CPSR] & ~PSR_MODE_MASK;
|
|
|
|
regs[REG_CPSR] = cpsr | PSR_MODE_USR;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2019-04-29 22:52:05 +02:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
/* R0=SYS_signal_handler: This a user signal handler callback
|
|
|
|
*
|
|
|
|
* void signal_handler(_sa_sigaction_t sighand, int signo,
|
|
|
|
* FAR siginfo_t *info, FAR void *ucontext);
|
|
|
|
*
|
|
|
|
* At this point, the following values are saved in context:
|
|
|
|
*
|
|
|
|
* R0 = SYS_signal_handler
|
|
|
|
* R1 = sighand
|
|
|
|
* R2 = signo
|
|
|
|
* R3 = info
|
2018-08-24 15:11:18 +02:00
|
|
|
* R4 = ucontext
|
2015-12-14 15:40:38 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
case SYS_signal_handler:
|
|
|
|
{
|
|
|
|
FAR struct tcb_s *rtcb = sched_self();
|
|
|
|
/* Remember the caller's return address */
|
|
|
|
|
|
|
|
DEBUGASSERT(rtcb->xcp.sigreturn == 0);
|
|
|
|
rtcb->xcp.sigreturn = regs[REG_PC];
|
|
|
|
|
2020-02-20 03:53:33 +01:00
|
|
|
/* Set up to return to the user-space trampoline function in
|
2015-12-14 15:40:38 +01:00
|
|
|
* unprivileged mode.
|
|
|
|
*/
|
|
|
|
|
|
|
|
regs[REG_PC] = (uint32_t)ARCH_DATA_RESERVE->ar_sigtramp;
|
|
|
|
cpsr = regs[REG_CPSR] & ~PSR_MODE_MASK;
|
|
|
|
regs[REG_CPSR] = cpsr | PSR_MODE_USR;
|
|
|
|
|
|
|
|
/* Change the parameter ordering to match the expectation of struct
|
|
|
|
* userpace_s signal_handler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
regs[REG_R0] = regs[REG_R1]; /* sighand */
|
|
|
|
regs[REG_R1] = regs[REG_R2]; /* signal */
|
|
|
|
regs[REG_R2] = regs[REG_R3]; /* info */
|
2018-08-24 15:11:18 +02:00
|
|
|
regs[REG_R3] = regs[REG_R4]; /* ucontext */
|
2015-12-14 15:40:38 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_ARCH_KERNEL_STACK
|
2019-11-28 18:57:54 +01:00
|
|
|
/* If we are signalling a user process, then we must be operating
|
2015-12-14 15:40:38 +01:00
|
|
|
* on the kernel stack now. We need to switch back to the user
|
|
|
|
* stack before dispatching the signal handler to the user code.
|
|
|
|
* The existence of an allocated kernel stack is sufficient
|
|
|
|
* information to make this decision.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (rtcb->xcp.kstack != NULL)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(rtcb->xcp.kstkptr == NULL && rtcb->xcp.ustkptr != NULL);
|
|
|
|
|
|
|
|
rtcb->xcp.kstkptr = (FAR uint32_t *)regs[REG_SP];
|
|
|
|
regs[REG_SP] = (uint32_t)rtcb->xcp.ustkptr;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2019-04-29 22:52:05 +02:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
/* R0=SYS_signal_handler_return: This a user signal handler callback
|
|
|
|
*
|
|
|
|
* void signal_handler_return(void);
|
|
|
|
*
|
|
|
|
* At this point, the following values are saved in context:
|
|
|
|
*
|
|
|
|
* R0 = SYS_signal_handler_return
|
|
|
|
*/
|
|
|
|
|
|
|
|
case SYS_signal_handler_return:
|
|
|
|
{
|
|
|
|
FAR struct tcb_s *rtcb = sched_self();
|
|
|
|
|
|
|
|
/* Set up to return to the kernel-mode signal dispatching logic. */
|
|
|
|
|
|
|
|
DEBUGASSERT(rtcb->xcp.sigreturn != 0);
|
|
|
|
|
|
|
|
regs[REG_PC] = rtcb->xcp.sigreturn;
|
|
|
|
cpsr = regs[REG_CPSR] & ~PSR_MODE_MASK;
|
|
|
|
regs[REG_CPSR] = cpsr | PSR_MODE_SVC;
|
|
|
|
rtcb->xcp.sigreturn = 0;
|
|
|
|
|
|
|
|
#ifdef CONFIG_ARCH_KERNEL_STACK
|
|
|
|
/* We must enter here be using the user stack. We need to switch
|
|
|
|
* to back to the kernel user stack before returning to the kernel
|
|
|
|
* mode signal trampoline.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (rtcb->xcp.kstack != NULL)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(rtcb->xcp.kstkptr != NULL &&
|
|
|
|
(uint32_t)rtcb->xcp.ustkptr == regs[REG_SP]);
|
|
|
|
|
|
|
|
regs[REG_SP] = (uint32_t)rtcb->xcp.kstkptr;
|
|
|
|
rtcb->xcp.kstkptr = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* This is not an architecture-specific system call. If NuttX is built
|
|
|
|
* as a standalone kernel with a system call interface, then all of the
|
|
|
|
* additional system calls must be handled as in the default case.
|
|
|
|
*/
|
|
|
|
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_LIB_SYSCALL
|
|
|
|
FAR struct tcb_s *rtcb = sched_self();
|
|
|
|
int index = rtcb->xcp.nsyscalls;
|
|
|
|
|
|
|
|
/* Verify that the SYS call number is within range */
|
|
|
|
|
|
|
|
DEBUGASSERT(cmd >= CONFIG_SYS_RESERVED && cmd < SYS_maxsyscall);
|
|
|
|
|
|
|
|
/* Make sure that there is a no saved SYSCALL return address. We
|
|
|
|
* cannot yet handle nested system calls.
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(index < CONFIG_SYS_NNEST);
|
|
|
|
|
|
|
|
/* Setup to return to dispatch_syscall in privileged mode. */
|
|
|
|
|
|
|
|
rtcb->xcp.syscall[index].sysreturn = regs[REG_PC];
|
2015-12-21 17:57:01 +01:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
rtcb->xcp.syscall[index].cpsr = regs[REG_CPSR];
|
|
|
|
#endif
|
|
|
|
|
|
|
|
regs[REG_PC] = (uint32_t)dispatch_syscall;
|
2015-12-21 17:57:01 +01:00
|
|
|
#ifdef CONFIG_BUILD_PROTECTED
|
2015-12-14 15:40:38 +01:00
|
|
|
cpsr = regs[REG_CPSR] & ~PSR_MODE_MASK;
|
|
|
|
regs[REG_CPSR] = cpsr | PSR_MODE_SVC;
|
|
|
|
#endif
|
|
|
|
/* Offset R0 to account for the reserved values */
|
|
|
|
|
2019-11-28 19:47:36 +01:00
|
|
|
regs[REG_R0] -= CONFIG_SYS_RESERVED;
|
|
|
|
|
|
|
|
/* Indicate that we are in a syscall handler. */
|
|
|
|
|
|
|
|
rtcb->flags |= TCB_FLAG_SYSCALL;
|
2015-12-14 15:40:38 +01:00
|
|
|
#else
|
2016-06-20 19:59:15 +02:00
|
|
|
svcerr("ERROR: Bad SYS call: %d\n", regs[REG_R0]);
|
2015-12-14 15:40:38 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_ARCH_KERNEL_STACK
|
|
|
|
/* If this is the first SYSCALL and if there is an allocated
|
|
|
|
* kernel stack, then switch to the kernel stack.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (index == 0 && rtcb->xcp.kstack != NULL)
|
|
|
|
{
|
|
|
|
rtcb->xcp.ustkptr = (FAR uint32_t *)regs[REG_SP];
|
|
|
|
regs[REG_SP] = (uint32_t)rtcb->xcp.kstack + ARCH_KERNEL_STACKSIZE;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/* Save the new SYSCALL nesting level */
|
|
|
|
|
|
|
|
rtcb->xcp.nsyscalls = index + 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Report what happened */
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
svcinfo("SYSCALL Exit: regs: %p\n", regs);
|
|
|
|
svcinfo(" R0: %08x %08x %08x %08x %08x %08x %08x %08x\n",
|
|
|
|
regs[REG_R0], regs[REG_R1], regs[REG_R2], regs[REG_R3],
|
|
|
|
regs[REG_R4], regs[REG_R5], regs[REG_R6], regs[REG_R7]);
|
|
|
|
svcinfo(" R8: %08x %08x %08x %08x %08x %08x %08x %08x\n",
|
|
|
|
regs[REG_R8], regs[REG_R9], regs[REG_R10], regs[REG_R11],
|
|
|
|
regs[REG_R12], regs[REG_R13], regs[REG_R14], regs[REG_R15]);
|
|
|
|
svcinfo("CPSR: %08x\n", regs[REG_CPSR]);
|
2015-12-14 15:40:38 +01:00
|
|
|
|
|
|
|
/* Return the last value of curent_regs. This supports context switches
|
|
|
|
* on return from the exception. That capability is only used with the
|
|
|
|
* SYS_context_switch system call.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return regs;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
uint32_t *arm_syscall(uint32_t *regs)
|
|
|
|
{
|
2016-06-16 20:38:05 +02:00
|
|
|
_alert("SYSCALL from 0x%x\n", regs[REG_PC]);
|
2016-03-09 20:41:48 +01:00
|
|
|
CURRENT_REGS = regs;
|
2015-12-14 15:40:38 +01:00
|
|
|
PANIC();
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|