2 * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
3 * Licensed under the GPL
15 #include <sys/utsname.h>
19 void stack_protections(unsigned long address
)
21 if (mprotect((void *) address
, UM_THREAD_SIZE
,
22 PROT_READ
| PROT_WRITE
| PROT_EXEC
) < 0)
23 panic("protecting stack failed, errno = %d", errno
);
31 CATCH_EINTR(err
= tcgetattr(fd
, &tt
));
37 CATCH_EINTR(err
= tcsetattr(fd
, TCSADRAIN
, &tt
));
42 * XXX tcsetattr could have applied only some changes
43 * (and cfmakeraw() is a set of changes)
48 void setup_machinename(char *machine_out
)
53 #ifdef UML_CONFIG_UML_X86
54 # ifndef UML_CONFIG_64BIT
55 if (!strcmp(host
.machine
, "x86_64")) {
56 strcpy(machine_out
, "i686");
60 if (!strcmp(host
.machine
, "i686")) {
61 strcpy(machine_out
, "x86_64");
66 strcpy(machine_out
, host
.machine
);
69 void setup_hostinfo(char *buf
, int len
)
74 snprintf(buf
, len
, "%s %s %s %s %s", host
.sysname
, host
.nodename
,
75 host
.release
, host
.version
, host
.machine
);
79 * We cannot use glibc's abort(). It makes use of tgkill() which
80 * has no effect within UML's kernel threads.
81 * After that glibc would execute an invalid instruction to kill
82 * the calling process and UML crashes with SIGSEGV.
84 static inline void __attribute__ ((noreturn
)) uml_abort(void)
90 if (!sigemptyset(&sig
) && !sigaddset(&sig
, SIGABRT
))
91 sigprocmask(SIG_UNBLOCK
, &sig
, 0);
94 if (kill(getpid(), SIGABRT
) < 0)
99 * UML helper threads must not handle SIGWINCH/INT/TERM
101 void os_fix_helper_signals(void)
103 signal(SIGWINCH
, SIG_IGN
);
104 signal(SIGINT
, SIG_DFL
);
105 signal(SIGTERM
, SIG_DFL
);
108 void os_dump_core(void)
112 signal(SIGSEGV
, SIG_DFL
);
115 * We are about to SIGTERM this entire process group to ensure that
116 * nothing is around to run after the kernel exits. The
117 * kernel wants to abort, not die through SIGTERM, so we
121 signal(SIGTERM
, SIG_IGN
);
124 * Most of the other processes associated with this UML are
125 * likely sTopped, so give them a SIGCONT so they see the
131 * Now, having sent signals to everyone but us, make sure they
132 * die by ptrace. Processes can survive what's been done to
133 * them so far - the mechanism I understand is receiving a
134 * SIGSEGV and segfaulting immediately upon return. There is
135 * always a SIGSEGV pending, and (I'm guessing) signals are
136 * processed in numeric order so the SIGTERM (signal 15 vs
137 * SIGSEGV being signal 11) is never handled.
139 * Run a waitpid loop until we get some kind of error.
140 * Hopefully, it's ECHILD, but there's not a lot we can do if
141 * it's something else. Tell os_kill_ptraced_process not to
142 * wait for the child to report its death because there's
143 * nothing reasonable to do if that fails.
146 while ((pid
= waitpid(-1, NULL
, WNOHANG
| __WALL
)) > 0)
147 os_kill_ptraced_process(pid
, 0);
152 void um_early_printk(const char *s
, unsigned int n
)
154 printf("%.*s", n
, s
);
157 static int quiet_info
;
159 static int __init
quiet_cmd_param(char *str
, int *add
)
165 __uml_setup("quiet", quiet_cmd_param
,
167 " Turns off information messages during boot.\n\n");
169 void os_info(const char *fmt
, ...)
177 vfprintf(stderr
, fmt
, list
);
181 void os_warn(const char *fmt
, ...)
186 vfprintf(stderr
, fmt
, list
);