* Userspace change to use the new kernel calls - _taskcall(SYSTASK...) changed to _kernel_call(...) - int 32 reused for the kernel calls - _do_kernel_call() to make the trap to kernel - kernel_call() to make the actuall kernel call from C using _do_kernel_call() - unlike ipc call the kernel call always succeeds as kernel is always available, however, kernel may return an error * Kernel side implementation of kernel calls - the SYSTEm task does not run, only the proc table entry is preserved - every data_copy(SYSTEM is no data_copy(KERNEL - "locking" is an empty operation now as everything runs in kernel - sys_task() is replaced by kernel_call() which copies the message into kernel, dispatches the call to its handler and finishes by either copying the results back to userspace (if need be) or by suspending the process because of VM - suspended processes are later made runnable once the memory issue is resolved, picked up by the scheduler and only at this time the call is resumed (in fact restarted) which does not need to copy the message from userspace as the message is already saved in the process structure. - no ned for the vmrestart queue, the scheduler will restart the system calls - no special case in do_vmctl(), all requests remove the RTS_VMREQUEST flag
53 lines
1.6 KiB
C
53 lines
1.6 KiB
C
/* The kernel call implemented in this file:
|
|
* m_type: SYS_EXEC
|
|
*
|
|
* The parameters for this kernel call are:
|
|
* m1_i1: PR_ENDPT (process that did exec call)
|
|
* m1_p1: PR_STACK_PTR (new stack pointer)
|
|
* m1_p2: PR_NAME_PTR (pointer to program name)
|
|
* m1_p3: PR_IP_PTR (new instruction pointer)
|
|
*/
|
|
#include "../system.h"
|
|
#include <string.h>
|
|
#include <minix/endpoint.h>
|
|
|
|
#if USE_EXEC
|
|
|
|
/*===========================================================================*
|
|
* do_exec *
|
|
*===========================================================================*/
|
|
PUBLIC int do_exec(struct proc * caller, message * m_ptr)
|
|
{
|
|
/* Handle sys_exec(). A process has done a successful EXEC. Patch it up. */
|
|
register struct proc *rp;
|
|
int proc_nr;
|
|
|
|
if(!isokendpt(m_ptr->PR_ENDPT, &proc_nr))
|
|
return EINVAL;
|
|
|
|
rp = proc_addr(proc_nr);
|
|
|
|
if(rp->p_misc_flags & MF_DELIVERMSG) {
|
|
rp->p_misc_flags &= ~MF_DELIVERMSG;
|
|
rp->p_delivermsg_lin = 0;
|
|
}
|
|
|
|
/* Save command name for debugging, ps(1) output, etc. */
|
|
if(data_copy(caller->p_endpoint, (vir_bytes) m_ptr->PR_NAME_PTR,
|
|
KERNEL, (vir_bytes) rp->p_name, (phys_bytes) P_NAME_LEN - 1) != OK)
|
|
strncpy(rp->p_name, "<unset>", P_NAME_LEN);
|
|
|
|
/* Do architecture-specific exec() stuff. */
|
|
arch_pre_exec(rp, (u32_t) m_ptr->PR_IP_PTR, (u32_t) m_ptr->PR_STACK_PTR);
|
|
|
|
/* No reply to EXEC call */
|
|
RTS_LOCK_UNSET(rp, RTS_RECEIVING);
|
|
|
|
/* Mark fpu_regs contents as not significant, so fpu
|
|
* will be initialized, when it's used next time. */
|
|
rp->p_misc_flags &= ~MF_FPU_INITIALIZED;
|
|
return(OK);
|
|
}
|
|
#endif /* USE_EXEC */
|
|
|