2004-08-16 07:55:06 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 2004 Tim J. Robbins
|
|
|
|
* Copyright (c) 2002 Doug Rabson
|
|
|
|
* Copyright (c) 2000 Marcel Moolenaar
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer
|
|
|
|
* in this position and unchanged.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/systm.h>
|
2014-03-16 10:55:57 +00:00
|
|
|
#include <sys/capsicum.h>
|
2007-01-06 15:58:34 +00:00
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/fcntl.h>
|
2006-10-02 12:59:59 +00:00
|
|
|
#include <sys/clock.h>
|
2005-02-18 18:51:59 +00:00
|
|
|
#include <sys/imgact.h>
|
Add the linux 2.6.x stuff (not used by default!):
- TLS - complete
- pid/tid mangling - complete
- thread area - complete
- futexes - complete with issues
- clone() extension - complete with some possible minor issues
- mq*/timer*/clock* stuff - complete but untested and the mq* stuff is
disabled when not build as part of the kernel with native FreeBSD mq*
support (module support for this will come later)
Tested with:
- linux-firefox - works, tested
- linux-opera - works, tested
- linux-realplay - doesnt work, issue with futexes
- linux-skype - doesnt work, issue with futexes
- linux-rt2-demo - works, tested
- linux-acroread - doesnt work, unknown reason (coredump) and sometimes
issue with futexes
- various unix utilities in linux-base-gentoo3 and linux-base-fc4:
everything tried worked
On amd64 not everything is supported like on i386, the catchup is planned for
later when the remaining bugs in the new functions are fixed.
To test this new stuff, you have to run
sysctl compat.linux.osrelease=2.6.16
to switch back use
sysctl compat.linux.osrelease=2.4.2
Don't switch while running a linux program, strange things may or may not
happen.
Sponsored by: Google SoC 2006
Submitted by: rdivacky
Some suggestions/help by: jhb, kib, manu@NetBSD.org, netchild
2006-08-15 12:54:30 +00:00
|
|
|
#include <sys/limits.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
#include <sys/mutex.h>
|
2007-02-15 01:13:36 +00:00
|
|
|
#include <sys/priv.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#include <sys/resourcevar.h>
|
|
|
|
#include <sys/syscallsubr.h>
|
|
|
|
#include <sys/sysproto.h>
|
|
|
|
#include <sys/unistd.h>
|
2011-01-28 18:47:07 +00:00
|
|
|
#include <sys/wait.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
#include <machine/frame.h>
|
2007-03-30 00:06:21 +00:00
|
|
|
#include <machine/pcb.h>
|
2007-02-15 01:13:36 +00:00
|
|
|
#include <machine/psl.h>
|
2007-03-30 00:06:21 +00:00
|
|
|
#include <machine/segments.h>
|
|
|
|
#include <machine/specialreg.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
#include <vm/vm.h>
|
|
|
|
#include <vm/pmap.h>
|
|
|
|
#include <vm/vm_map.h>
|
|
|
|
|
2010-07-23 21:30:33 +00:00
|
|
|
#include <compat/freebsd32/freebsd32_util.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <amd64/linux32/linux.h>
|
|
|
|
#include <amd64/linux32/linux32_proto.h>
|
|
|
|
#include <compat/linux/linux_ipc.h>
|
2011-01-28 18:47:07 +00:00
|
|
|
#include <compat/linux/linux_misc.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <compat/linux/linux_signal.h>
|
|
|
|
#include <compat/linux/linux_util.h>
|
2006-08-20 13:50:27 +00:00
|
|
|
#include <compat/linux/linux_emul.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2015-05-24 15:03:09 +00:00
|
|
|
static void bsd_to_linux_rusage(struct rusage *ru, struct l_rusage *lru);
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
struct l_old_select_argv {
|
|
|
|
l_int nfds;
|
|
|
|
l_uintptr_t readfds;
|
|
|
|
l_uintptr_t writefds;
|
|
|
|
l_uintptr_t exceptfds;
|
|
|
|
l_uintptr_t timeout;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_to_bsd_sigaltstack(int lsa)
|
|
|
|
{
|
|
|
|
int bsa = 0;
|
|
|
|
|
|
|
|
if (lsa & LINUX_SS_DISABLE)
|
|
|
|
bsa |= SS_DISABLE;
|
|
|
|
if (lsa & LINUX_SS_ONSTACK)
|
|
|
|
bsa |= SS_ONSTACK;
|
|
|
|
return (bsa);
|
|
|
|
}
|
|
|
|
|
2009-10-28 20:17:54 +00:00
|
|
|
static int linux_mmap_common(struct thread *td, l_uintptr_t addr,
|
|
|
|
l_size_t len, l_int prot, l_int flags, l_int fd,
|
|
|
|
l_loff_t pos);
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
int
|
|
|
|
bsd_to_linux_sigaltstack(int bsa)
|
|
|
|
{
|
|
|
|
int lsa = 0;
|
|
|
|
|
|
|
|
if (bsa & SS_DISABLE)
|
|
|
|
lsa |= LINUX_SS_DISABLE;
|
|
|
|
if (bsa & SS_ONSTACK)
|
|
|
|
lsa |= LINUX_SS_ONSTACK;
|
|
|
|
return (lsa);
|
|
|
|
}
|
|
|
|
|
2011-01-29 07:22:33 +00:00
|
|
|
static void
|
|
|
|
bsd_to_linux_rusage(struct rusage *ru, struct l_rusage *lru)
|
2011-01-28 18:28:06 +00:00
|
|
|
{
|
2011-01-29 07:22:33 +00:00
|
|
|
|
2011-01-28 18:28:06 +00:00
|
|
|
lru->ru_utime.tv_sec = ru->ru_utime.tv_sec;
|
|
|
|
lru->ru_utime.tv_usec = ru->ru_utime.tv_usec;
|
|
|
|
lru->ru_stime.tv_sec = ru->ru_stime.tv_sec;
|
|
|
|
lru->ru_stime.tv_usec = ru->ru_stime.tv_usec;
|
|
|
|
lru->ru_maxrss = ru->ru_maxrss;
|
|
|
|
lru->ru_ixrss = ru->ru_ixrss;
|
|
|
|
lru->ru_idrss = ru->ru_idrss;
|
|
|
|
lru->ru_isrss = ru->ru_isrss;
|
|
|
|
lru->ru_minflt = ru->ru_minflt;
|
|
|
|
lru->ru_majflt = ru->ru_majflt;
|
|
|
|
lru->ru_nswap = ru->ru_nswap;
|
|
|
|
lru->ru_inblock = ru->ru_inblock;
|
|
|
|
lru->ru_oublock = ru->ru_oublock;
|
|
|
|
lru->ru_msgsnd = ru->ru_msgsnd;
|
|
|
|
lru->ru_msgrcv = ru->ru_msgrcv;
|
|
|
|
lru->ru_nsignals = ru->ru_nsignals;
|
|
|
|
lru->ru_nvcsw = ru->ru_nvcsw;
|
|
|
|
lru->ru_nivcsw = ru->ru_nivcsw;
|
|
|
|
}
|
|
|
|
|
2015-05-24 15:03:09 +00:00
|
|
|
int
|
|
|
|
linux_copyout_rusage(struct rusage *ru, void *uaddr)
|
|
|
|
{
|
|
|
|
struct l_rusage lru;
|
|
|
|
|
|
|
|
bsd_to_linux_rusage(ru, &lru);
|
|
|
|
|
|
|
|
return (copyout(&lru, uaddr, sizeof(struct l_rusage)));
|
|
|
|
}
|
|
|
|
|
2005-02-18 18:51:59 +00:00
|
|
|
int
|
|
|
|
linux_execve(struct thread *td, struct linux_execve_args *args)
|
|
|
|
{
|
|
|
|
struct image_args eargs;
|
2015-05-10 09:00:40 +00:00
|
|
|
struct vmspace *oldvmspace;
|
2005-02-18 18:51:59 +00:00
|
|
|
char *path;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
LCONVPATHEXIST(td, args->path, &path);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(execve))
|
|
|
|
printf(ARGS(execve, "%s"), path);
|
|
|
|
#endif
|
|
|
|
|
2015-05-10 09:00:40 +00:00
|
|
|
error = pre_execve(td, &oldvmspace);
|
|
|
|
if (error != 0) {
|
|
|
|
free(path, M_TEMP);
|
|
|
|
return (error);
|
|
|
|
}
|
2010-07-23 21:30:33 +00:00
|
|
|
error = freebsd32_exec_copyin_args(&eargs, path, UIO_SYSSPACE,
|
|
|
|
args->argp, args->envp);
|
2005-02-18 18:51:59 +00:00
|
|
|
free(path, M_TEMP);
|
|
|
|
if (error == 0)
|
|
|
|
error = kern_execve(td, &eargs, NULL);
|
2015-05-24 14:53:16 +00:00
|
|
|
if (error == 0)
|
|
|
|
error = linux_common_execve(td, &eargs);
|
2015-05-10 09:00:40 +00:00
|
|
|
post_execve(td, error, oldvmspace);
|
2005-02-18 18:51:59 +00:00
|
|
|
return (error);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
2008-11-29 14:55:24 +00:00
|
|
|
CTASSERT(sizeof(struct l_iovec32) == 8);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2005-03-31 22:57:21 +00:00
|
|
|
static int
|
2008-11-29 14:55:24 +00:00
|
|
|
linux32_copyinuio(struct l_iovec32 *iovp, l_ulong iovcnt, struct uio **uiop)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
2008-11-29 14:55:24 +00:00
|
|
|
struct l_iovec32 iov32;
|
2005-03-31 22:57:21 +00:00
|
|
|
struct iovec *iov;
|
|
|
|
struct uio *uio;
|
2008-11-29 14:55:24 +00:00
|
|
|
uint32_t iovlen;
|
2005-03-31 22:57:21 +00:00
|
|
|
int error, i;
|
|
|
|
|
|
|
|
*uiop = NULL;
|
|
|
|
if (iovcnt > UIO_MAXIOV)
|
2004-08-16 07:55:06 +00:00
|
|
|
return (EINVAL);
|
2005-03-31 22:57:21 +00:00
|
|
|
iovlen = iovcnt * sizeof(struct iovec);
|
2007-04-18 18:11:32 +00:00
|
|
|
uio = malloc(iovlen + sizeof(*uio), M_IOV, M_WAITOK);
|
2005-03-31 22:57:21 +00:00
|
|
|
iov = (struct iovec *)(uio + 1);
|
|
|
|
for (i = 0; i < iovcnt; i++) {
|
2008-11-29 14:55:24 +00:00
|
|
|
error = copyin(&iovp[i], &iov32, sizeof(struct l_iovec32));
|
2005-03-31 22:57:21 +00:00
|
|
|
if (error) {
|
|
|
|
free(uio, M_IOV);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
iov[i].iov_base = PTRIN(iov32.iov_base);
|
|
|
|
iov[i].iov_len = iov32.iov_len;
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
2005-03-31 22:57:21 +00:00
|
|
|
uio->uio_iov = iov;
|
|
|
|
uio->uio_iovcnt = iovcnt;
|
|
|
|
uio->uio_segflg = UIO_USERSPACE;
|
|
|
|
uio->uio_offset = -1;
|
|
|
|
uio->uio_resid = 0;
|
|
|
|
for (i = 0; i < iovcnt; i++) {
|
|
|
|
if (iov->iov_len > INT_MAX - uio->uio_resid) {
|
|
|
|
free(uio, M_IOV);
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
uio->uio_resid += iov->iov_len;
|
|
|
|
iov++;
|
|
|
|
}
|
|
|
|
*uiop = uio;
|
|
|
|
return (0);
|
|
|
|
}
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2008-11-29 14:55:24 +00:00
|
|
|
int
|
|
|
|
linux32_copyiniov(struct l_iovec32 *iovp32, l_ulong iovcnt, struct iovec **iovp,
|
|
|
|
int error)
|
|
|
|
{
|
|
|
|
struct l_iovec32 iov32;
|
|
|
|
struct iovec *iov;
|
|
|
|
uint32_t iovlen;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
*iovp = NULL;
|
|
|
|
if (iovcnt > UIO_MAXIOV)
|
|
|
|
return (error);
|
|
|
|
iovlen = iovcnt * sizeof(struct iovec);
|
|
|
|
iov = malloc(iovlen, M_IOV, M_WAITOK);
|
|
|
|
for (i = 0; i < iovcnt; i++) {
|
|
|
|
error = copyin(&iovp32[i], &iov32, sizeof(struct l_iovec32));
|
|
|
|
if (error) {
|
|
|
|
free(iov, M_IOV);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
iov[i].iov_base = PTRIN(iov32.iov_base);
|
|
|
|
iov[i].iov_len = iov32.iov_len;
|
|
|
|
}
|
|
|
|
*iovp = iov;
|
|
|
|
return(0);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2005-03-31 22:57:21 +00:00
|
|
|
int
|
|
|
|
linux_readv(struct thread *td, struct linux_readv_args *uap)
|
|
|
|
{
|
|
|
|
struct uio *auio;
|
|
|
|
int error;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2005-03-31 22:57:21 +00:00
|
|
|
error = linux32_copyinuio(uap->iovp, uap->iovcnt, &auio);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
error = kern_readv(td, uap->fd, auio);
|
|
|
|
free(auio, M_IOV);
|
2004-08-16 07:55:06 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_writev(struct thread *td, struct linux_writev_args *uap)
|
|
|
|
{
|
2005-03-31 22:57:21 +00:00
|
|
|
struct uio *auio;
|
|
|
|
int error;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2005-03-31 22:57:21 +00:00
|
|
|
error = linux32_copyinuio(uap->iovp, uap->iovcnt, &auio);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
error = kern_writev(td, uap->fd, auio);
|
|
|
|
free(auio, M_IOV);
|
2004-08-16 07:55:06 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct l_ipc_kludge {
|
|
|
|
l_uintptr_t msgp;
|
|
|
|
l_long msgtyp;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_ipc(struct thread *td, struct linux_ipc_args *args)
|
|
|
|
{
|
|
|
|
|
|
|
|
switch (args->what & 0xFFFF) {
|
|
|
|
case LINUX_SEMOP: {
|
|
|
|
struct linux_semop_args a;
|
|
|
|
|
|
|
|
a.semid = args->arg1;
|
|
|
|
a.tsops = args->ptr;
|
|
|
|
a.nsops = args->arg2;
|
|
|
|
return (linux_semop(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_SEMGET: {
|
|
|
|
struct linux_semget_args a;
|
|
|
|
|
|
|
|
a.key = args->arg1;
|
|
|
|
a.nsems = args->arg2;
|
|
|
|
a.semflg = args->arg3;
|
|
|
|
return (linux_semget(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_SEMCTL: {
|
|
|
|
struct linux_semctl_args a;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
a.semid = args->arg1;
|
|
|
|
a.semnum = args->arg2;
|
|
|
|
a.cmd = args->arg3;
|
|
|
|
error = copyin(args->ptr, &a.arg, sizeof(a.arg));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
return (linux_semctl(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_MSGSND: {
|
|
|
|
struct linux_msgsnd_args a;
|
|
|
|
|
|
|
|
a.msqid = args->arg1;
|
|
|
|
a.msgp = args->ptr;
|
|
|
|
a.msgsz = args->arg2;
|
|
|
|
a.msgflg = args->arg3;
|
|
|
|
return (linux_msgsnd(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_MSGRCV: {
|
|
|
|
struct linux_msgrcv_args a;
|
|
|
|
|
|
|
|
a.msqid = args->arg1;
|
|
|
|
a.msgsz = args->arg2;
|
|
|
|
a.msgflg = args->arg3;
|
|
|
|
if ((args->what >> 16) == 0) {
|
|
|
|
struct l_ipc_kludge tmp;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (args->ptr == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
error = copyin(args->ptr, &tmp, sizeof(tmp));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
a.msgp = PTRIN(tmp.msgp);
|
|
|
|
a.msgtyp = tmp.msgtyp;
|
|
|
|
} else {
|
|
|
|
a.msgp = args->ptr;
|
|
|
|
a.msgtyp = args->arg5;
|
|
|
|
}
|
|
|
|
return (linux_msgrcv(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_MSGGET: {
|
|
|
|
struct linux_msgget_args a;
|
|
|
|
|
|
|
|
a.key = args->arg1;
|
|
|
|
a.msgflg = args->arg2;
|
|
|
|
return (linux_msgget(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_MSGCTL: {
|
|
|
|
struct linux_msgctl_args a;
|
|
|
|
|
|
|
|
a.msqid = args->arg1;
|
|
|
|
a.cmd = args->arg2;
|
|
|
|
a.buf = args->ptr;
|
|
|
|
return (linux_msgctl(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_SHMAT: {
|
|
|
|
struct linux_shmat_args a;
|
|
|
|
|
|
|
|
a.shmid = args->arg1;
|
|
|
|
a.shmaddr = args->ptr;
|
|
|
|
a.shmflg = args->arg2;
|
2005-03-31 22:47:18 +00:00
|
|
|
a.raddr = PTRIN((l_uint)args->arg3);
|
2004-08-16 07:55:06 +00:00
|
|
|
return (linux_shmat(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_SHMDT: {
|
|
|
|
struct linux_shmdt_args a;
|
|
|
|
|
|
|
|
a.shmaddr = args->ptr;
|
|
|
|
return (linux_shmdt(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_SHMGET: {
|
|
|
|
struct linux_shmget_args a;
|
|
|
|
|
|
|
|
a.key = args->arg1;
|
|
|
|
a.size = args->arg2;
|
|
|
|
a.shmflg = args->arg3;
|
|
|
|
return (linux_shmget(td, &a));
|
|
|
|
}
|
|
|
|
case LINUX_SHMCTL: {
|
|
|
|
struct linux_shmctl_args a;
|
|
|
|
|
|
|
|
a.shmid = args->arg1;
|
|
|
|
a.cmd = args->arg2;
|
|
|
|
a.buf = args->ptr;
|
|
|
|
return (linux_shmctl(td, &a));
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_old_select(struct thread *td, struct linux_old_select_args *args)
|
|
|
|
{
|
|
|
|
struct l_old_select_argv linux_args;
|
|
|
|
struct linux_select_args newsel;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(old_select))
|
|
|
|
printf(ARGS(old_select, "%p"), args->ptr);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
error = copyin(args->ptr, &linux_args, sizeof(linux_args));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
newsel.nfds = linux_args.nfds;
|
|
|
|
newsel.readfds = PTRIN(linux_args.readfds);
|
|
|
|
newsel.writefds = PTRIN(linux_args.writefds);
|
|
|
|
newsel.exceptfds = PTRIN(linux_args.exceptfds);
|
|
|
|
newsel.timeout = PTRIN(linux_args.timeout);
|
|
|
|
return (linux_select(td, &newsel));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2011-02-12 15:50:21 +00:00
|
|
|
linux_set_cloned_tls(struct thread *td, void *desc)
|
|
|
|
{
|
|
|
|
struct user_segment_descriptor sd;
|
|
|
|
struct l_user_desc info;
|
|
|
|
struct pcb *pcb;
|
|
|
|
int error;
|
|
|
|
int a[2];
|
|
|
|
|
|
|
|
error = copyin(desc, &info, sizeof(struct l_user_desc));
|
|
|
|
if (error) {
|
|
|
|
printf(LMSG("copyin failed!"));
|
|
|
|
} else {
|
|
|
|
/* We might copy out the entry_number as GUGS32_SEL. */
|
|
|
|
info.entry_number = GUGS32_SEL;
|
|
|
|
error = copyout(&info, desc, sizeof(struct l_user_desc));
|
|
|
|
if (error)
|
|
|
|
printf(LMSG("copyout failed!"));
|
|
|
|
|
|
|
|
a[0] = LINUX_LDT_entry_a(&info);
|
|
|
|
a[1] = LINUX_LDT_entry_b(&info);
|
|
|
|
|
|
|
|
memcpy(&sd, &a, sizeof(a));
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(clone))
|
|
|
|
printf("Segment created in clone with "
|
|
|
|
"CLONE_SETTLS: lobase: %x, hibase: %x, "
|
|
|
|
"lolimit: %x, hilimit: %x, type: %i, "
|
|
|
|
"dpl: %i, p: %i, xx: %i, long: %i, "
|
|
|
|
"def32: %i, gran: %i\n", sd.sd_lobase,
|
|
|
|
sd.sd_hibase, sd.sd_lolimit, sd.sd_hilimit,
|
|
|
|
sd.sd_type, sd.sd_dpl, sd.sd_p, sd.sd_xx,
|
|
|
|
sd.sd_long, sd.sd_def32, sd.sd_gran);
|
|
|
|
#endif
|
|
|
|
pcb = td->td_pcb;
|
|
|
|
pcb->pcb_gsbase = (register_t)info.base_addr;
|
|
|
|
/* XXXKIB pcb->pcb_gs32sd = sd; */
|
|
|
|
td->td_frame->tf_gs = GSEL(GUGS32_SEL, SEL_UPL);
|
2013-05-09 21:42:43 +00:00
|
|
|
set_pcb_flags(pcb, PCB_32BIT);
|
2011-02-12 15:50:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-02-12 16:33:00 +00:00
|
|
|
int
|
|
|
|
linux_set_upcall_kse(struct thread *td, register_t stack)
|
|
|
|
{
|
|
|
|
|
2015-05-24 14:53:16 +00:00
|
|
|
if (stack)
|
|
|
|
td->td_frame->tf_rsp = stack;
|
2011-02-12 16:33:00 +00:00
|
|
|
|
2015-05-24 14:53:16 +00:00
|
|
|
/*
|
|
|
|
* The newly created Linux thread returns
|
|
|
|
* to the user space by the same path that a parent do.
|
|
|
|
*/
|
|
|
|
td->td_frame->tf_rax = 0;
|
2011-02-12 16:33:00 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
#define STACK_SIZE (2 * 1024 * 1024)
|
|
|
|
#define GUARD_SIZE (4 * PAGE_SIZE)
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_mmap2(struct thread *td, struct linux_mmap2_args *args)
|
|
|
|
{
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(mmap2))
|
2007-03-30 17:27:13 +00:00
|
|
|
printf(ARGS(mmap2, "0x%08x, %d, %d, 0x%08x, %d, %d"),
|
|
|
|
args->addr, args->len, args->prot,
|
2004-08-16 07:55:06 +00:00
|
|
|
args->flags, args->fd, args->pgoff);
|
|
|
|
#endif
|
|
|
|
|
2009-10-28 20:17:54 +00:00
|
|
|
return (linux_mmap_common(td, PTROUT(args->addr), args->len, args->prot,
|
|
|
|
args->flags, args->fd, (uint64_t)(uint32_t)args->pgoff *
|
|
|
|
PAGE_SIZE));
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_mmap(struct thread *td, struct linux_mmap_args *args)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct l_mmap_argv linux_args;
|
|
|
|
|
|
|
|
error = copyin(args->ptr, &linux_args, sizeof(linux_args));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(mmap))
|
2007-03-30 17:27:13 +00:00
|
|
|
printf(ARGS(mmap, "0x%08x, %d, %d, 0x%08x, %d, %d"),
|
|
|
|
linux_args.addr, linux_args.len, linux_args.prot,
|
|
|
|
linux_args.flags, linux_args.fd, linux_args.pgoff);
|
2004-08-16 07:55:06 +00:00
|
|
|
#endif
|
|
|
|
|
2009-10-28 20:17:54 +00:00
|
|
|
return (linux_mmap_common(td, linux_args.addr, linux_args.len,
|
|
|
|
linux_args.prot, linux_args.flags, linux_args.fd,
|
|
|
|
(uint32_t)linux_args.pgoff));
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2009-10-28 20:17:54 +00:00
|
|
|
linux_mmap_common(struct thread *td, l_uintptr_t addr, l_size_t len, l_int prot,
|
|
|
|
l_int flags, l_int fd, l_loff_t pos)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
struct proc *p = td->td_proc;
|
|
|
|
struct mmap_args /* {
|
|
|
|
caddr_t addr;
|
|
|
|
size_t len;
|
|
|
|
int prot;
|
|
|
|
int flags;
|
|
|
|
int fd;
|
|
|
|
long pad;
|
|
|
|
off_t pos;
|
|
|
|
} */ bsd_args;
|
|
|
|
int error;
|
2007-01-06 15:58:34 +00:00
|
|
|
struct file *fp;
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_t rights;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
error = 0;
|
|
|
|
bsd_args.flags = 0;
|
2007-01-06 15:58:34 +00:00
|
|
|
fp = NULL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Linux mmap(2):
|
|
|
|
* You must specify exactly one of MAP_SHARED and MAP_PRIVATE
|
|
|
|
*/
|
2009-10-28 20:17:54 +00:00
|
|
|
if (!((flags & LINUX_MAP_SHARED) ^ (flags & LINUX_MAP_PRIVATE)))
|
2007-01-06 15:58:34 +00:00
|
|
|
return (EINVAL);
|
|
|
|
|
2009-10-28 20:17:54 +00:00
|
|
|
if (flags & LINUX_MAP_SHARED)
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags |= MAP_SHARED;
|
2009-10-28 20:17:54 +00:00
|
|
|
if (flags & LINUX_MAP_PRIVATE)
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags |= MAP_PRIVATE;
|
2009-10-28 20:17:54 +00:00
|
|
|
if (flags & LINUX_MAP_FIXED)
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags |= MAP_FIXED;
|
2010-06-10 17:59:47 +00:00
|
|
|
if (flags & LINUX_MAP_ANON) {
|
|
|
|
/* Enforce pos to be on page boundary, then ignore. */
|
|
|
|
if ((pos & PAGE_MASK) != 0)
|
|
|
|
return (EINVAL);
|
|
|
|
pos = 0;
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags |= MAP_ANON;
|
2010-06-10 17:59:47 +00:00
|
|
|
} else
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags |= MAP_NOSYNC;
|
2009-10-28 20:17:54 +00:00
|
|
|
if (flags & LINUX_MAP_GROWSDOWN)
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags |= MAP_STACK;
|
|
|
|
|
2007-02-15 00:54:40 +00:00
|
|
|
/*
|
|
|
|
* PROT_READ, PROT_WRITE, or PROT_EXEC implies PROT_READ and PROT_EXEC
|
|
|
|
* on Linux/i386. We do this to ensure maximum compatibility.
|
|
|
|
* Linux/ia64 does the same in i386 emulation mode.
|
|
|
|
*/
|
2009-10-28 20:17:54 +00:00
|
|
|
bsd_args.prot = prot;
|
2007-02-15 00:54:40 +00:00
|
|
|
if (bsd_args.prot & (PROT_READ | PROT_WRITE | PROT_EXEC))
|
|
|
|
bsd_args.prot |= PROT_READ | PROT_EXEC;
|
|
|
|
|
2007-02-27 02:08:01 +00:00
|
|
|
/* Linux does not check file descriptor when MAP_ANONYMOUS is set. */
|
2009-10-28 20:17:54 +00:00
|
|
|
bsd_args.fd = (bsd_args.flags & MAP_ANON) ? -1 : fd;
|
2007-02-27 02:08:01 +00:00
|
|
|
if (bsd_args.fd != -1) {
|
2007-02-15 00:54:40 +00:00
|
|
|
/*
|
|
|
|
* Linux follows Solaris mmap(2) description:
|
|
|
|
* The file descriptor fildes is opened with
|
|
|
|
* read permission, regardless of the
|
|
|
|
* protection options specified.
|
|
|
|
*/
|
|
|
|
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
error = fget(td, bsd_args.fd,
|
|
|
|
cap_rights_init(&rights, CAP_MMAP), &fp);
|
|
|
|
if (error != 0)
|
2007-02-15 00:54:40 +00:00
|
|
|
return (error);
|
|
|
|
if (fp->f_type != DTYPE_VNODE) {
|
|
|
|
fdrop(fp, td);
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Linux mmap() just fails for O_WRONLY files */
|
|
|
|
if (!(fp->f_flag & FREAD)) {
|
|
|
|
fdrop(fp, td);
|
|
|
|
return (EACCES);
|
|
|
|
}
|
|
|
|
|
|
|
|
fdrop(fp, td);
|
|
|
|
}
|
|
|
|
|
2009-10-28 20:17:54 +00:00
|
|
|
if (flags & LINUX_MAP_GROWSDOWN) {
|
2007-03-30 17:27:13 +00:00
|
|
|
/*
|
|
|
|
* The Linux MAP_GROWSDOWN option does not limit auto
|
2004-08-16 07:55:06 +00:00
|
|
|
* growth of the region. Linux mmap with this option
|
|
|
|
* takes as addr the inital BOS, and as len, the initial
|
|
|
|
* region size. It can then grow down from addr without
|
2007-03-30 17:27:13 +00:00
|
|
|
* limit. However, Linux threads has an implicit internal
|
2004-08-16 07:55:06 +00:00
|
|
|
* limit to stack size of STACK_SIZE. Its just not
|
2007-03-30 17:27:13 +00:00
|
|
|
* enforced explicitly in Linux. But, here we impose
|
2004-08-16 07:55:06 +00:00
|
|
|
* a limit of (STACK_SIZE - GUARD_SIZE) on the stack
|
|
|
|
* region, since we can do this with our mmap.
|
|
|
|
*
|
|
|
|
* Our mmap with MAP_STACK takes addr as the maximum
|
|
|
|
* downsize limit on BOS, and as len the max size of
|
2007-04-18 20:12:05 +00:00
|
|
|
* the region. It then maps the top SGROWSIZ bytes,
|
2007-02-24 16:49:25 +00:00
|
|
|
* and auto grows the region down, up to the limit
|
2004-08-16 07:55:06 +00:00
|
|
|
* in addr.
|
|
|
|
*
|
|
|
|
* If we don't use the MAP_STACK option, the effect
|
|
|
|
* of this code is to allocate a stack region of a
|
|
|
|
* fixed size of (STACK_SIZE - GUARD_SIZE).
|
|
|
|
*/
|
|
|
|
|
2009-10-28 20:17:54 +00:00
|
|
|
if ((caddr_t)PTRIN(addr) + len > p->p_vmspace->vm_maxsaddr) {
|
2007-03-30 17:27:13 +00:00
|
|
|
/*
|
|
|
|
* Some Linux apps will attempt to mmap
|
2004-08-16 07:55:06 +00:00
|
|
|
* thread stacks near the top of their
|
|
|
|
* address space. If their TOS is greater
|
|
|
|
* than vm_maxsaddr, vm_map_growstack()
|
|
|
|
* will confuse the thread stack with the
|
|
|
|
* process stack and deliver a SEGV if they
|
|
|
|
* attempt to grow the thread stack past their
|
|
|
|
* current stacksize rlimit. To avoid this,
|
|
|
|
* adjust vm_maxsaddr upwards to reflect
|
|
|
|
* the current stacksize rlimit rather
|
|
|
|
* than the maximum possible stacksize.
|
|
|
|
* It would be better to adjust the
|
|
|
|
* mmap'ed region, but some apps do not check
|
|
|
|
* mmap's return value.
|
|
|
|
*/
|
|
|
|
PROC_LOCK(p);
|
2007-02-15 00:54:40 +00:00
|
|
|
p->p_vmspace->vm_maxsaddr = (char *)LINUX32_USRSTACK -
|
2004-08-16 07:55:06 +00:00
|
|
|
lim_cur(p, RLIMIT_STACK);
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
}
|
|
|
|
|
2007-03-30 17:27:13 +00:00
|
|
|
/*
|
2008-02-11 19:35:03 +00:00
|
|
|
* This gives us our maximum stack size and a new BOS.
|
|
|
|
* If we're using VM_STACK, then mmap will just map
|
|
|
|
* the top SGROWSIZ bytes, and let the stack grow down
|
|
|
|
* to the limit at BOS. If we're not using VM_STACK
|
|
|
|
* we map the full stack, since we don't have a way
|
|
|
|
* to autogrow it.
|
2004-08-16 07:55:06 +00:00
|
|
|
*/
|
2009-10-28 20:17:54 +00:00
|
|
|
if (len > STACK_SIZE - GUARD_SIZE) {
|
|
|
|
bsd_args.addr = (caddr_t)PTRIN(addr);
|
|
|
|
bsd_args.len = len;
|
2008-02-11 19:35:03 +00:00
|
|
|
} else {
|
2009-10-28 20:17:54 +00:00
|
|
|
bsd_args.addr = (caddr_t)PTRIN(addr) -
|
|
|
|
(STACK_SIZE - GUARD_SIZE - len);
|
2008-02-11 19:35:03 +00:00
|
|
|
bsd_args.len = STACK_SIZE - GUARD_SIZE;
|
|
|
|
}
|
2004-08-16 07:55:06 +00:00
|
|
|
} else {
|
2009-10-28 20:17:54 +00:00
|
|
|
bsd_args.addr = (caddr_t)PTRIN(addr);
|
|
|
|
bsd_args.len = len;
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
2009-10-28 20:17:54 +00:00
|
|
|
bsd_args.pos = pos;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(mmap))
|
|
|
|
printf("-> %s(%p, %d, %d, 0x%08x, %d, 0x%x)\n",
|
|
|
|
__func__,
|
2004-08-16 10:54:25 +00:00
|
|
|
(void *)bsd_args.addr, (int)bsd_args.len, bsd_args.prot,
|
2004-08-16 07:55:06 +00:00
|
|
|
bsd_args.flags, bsd_args.fd, (int)bsd_args.pos);
|
|
|
|
#endif
|
2011-09-16 13:58:51 +00:00
|
|
|
error = sys_mmap(td, &bsd_args);
|
2004-08-16 07:55:06 +00:00
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(mmap))
|
|
|
|
printf("-> %s() return: 0x%x (0x%08x)\n",
|
|
|
|
__func__, error, (u_int)td->td_retval[0]);
|
|
|
|
#endif
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2007-03-30 00:06:21 +00:00
|
|
|
int
|
|
|
|
linux_mprotect(struct thread *td, struct linux_mprotect_args *uap)
|
|
|
|
{
|
|
|
|
struct mprotect_args bsd_args;
|
|
|
|
|
|
|
|
bsd_args.addr = uap->addr;
|
|
|
|
bsd_args.len = uap->len;
|
|
|
|
bsd_args.prot = uap->prot;
|
|
|
|
if (bsd_args.prot & (PROT_READ | PROT_WRITE | PROT_EXEC))
|
|
|
|
bsd_args.prot |= PROT_READ | PROT_EXEC;
|
2011-09-16 13:58:51 +00:00
|
|
|
return (sys_mprotect(td, &bsd_args));
|
2007-03-30 00:06:21 +00:00
|
|
|
}
|
|
|
|
|
2007-02-15 01:13:36 +00:00
|
|
|
int
|
|
|
|
linux_iopl(struct thread *td, struct linux_iopl_args *args)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (args->level < 0 || args->level > 3)
|
|
|
|
return (EINVAL);
|
|
|
|
if ((error = priv_check(td, PRIV_IO)) != 0)
|
|
|
|
return (error);
|
|
|
|
if ((error = securelevel_gt(td->td_ucred, 0)) != 0)
|
|
|
|
return (error);
|
|
|
|
td->td_frame->tf_rflags = (td->td_frame->tf_rflags & ~PSL_IOPL) |
|
|
|
|
(args->level * (PSL_IOPL / 3));
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
int
|
|
|
|
linux_sigaction(struct thread *td, struct linux_sigaction_args *args)
|
|
|
|
{
|
|
|
|
l_osigaction_t osa;
|
|
|
|
l_sigaction_t act, oact;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(sigaction))
|
|
|
|
printf(ARGS(sigaction, "%d, %p, %p"),
|
|
|
|
args->sig, (void *)args->nsa, (void *)args->osa);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (args->nsa != NULL) {
|
|
|
|
error = copyin(args->nsa, &osa, sizeof(l_osigaction_t));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
act.lsa_handler = osa.lsa_handler;
|
|
|
|
act.lsa_flags = osa.lsa_flags;
|
|
|
|
act.lsa_restorer = osa.lsa_restorer;
|
|
|
|
LINUX_SIGEMPTYSET(act.lsa_mask);
|
|
|
|
act.lsa_mask.__bits[0] = osa.lsa_mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = linux_do_sigaction(td, args->sig, args->nsa ? &act : NULL,
|
|
|
|
args->osa ? &oact : NULL);
|
|
|
|
|
|
|
|
if (args->osa != NULL && !error) {
|
|
|
|
osa.lsa_handler = oact.lsa_handler;
|
|
|
|
osa.lsa_flags = oact.lsa_flags;
|
|
|
|
osa.lsa_restorer = oact.lsa_restorer;
|
|
|
|
osa.lsa_mask = oact.lsa_mask.__bits[0];
|
|
|
|
error = copyout(&osa, args->osa, sizeof(l_osigaction_t));
|
|
|
|
}
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2007-03-30 17:27:13 +00:00
|
|
|
* Linux has two extra args, restart and oldmask. We don't use these,
|
2004-08-16 07:55:06 +00:00
|
|
|
* but it seems that "restart" is actually a context pointer that
|
|
|
|
* enables the signal to happen with a different register set.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
linux_sigsuspend(struct thread *td, struct linux_sigsuspend_args *args)
|
|
|
|
{
|
|
|
|
sigset_t sigmask;
|
|
|
|
l_sigset_t mask;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(sigsuspend))
|
|
|
|
printf(ARGS(sigsuspend, "%08lx"), (unsigned long)args->mask);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
LINUX_SIGEMPTYSET(mask);
|
|
|
|
mask.__bits[0] = args->mask;
|
|
|
|
linux_to_bsd_sigset(&mask, &sigmask);
|
|
|
|
return (kern_sigsuspend(td, sigmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_rt_sigsuspend(struct thread *td, struct linux_rt_sigsuspend_args *uap)
|
|
|
|
{
|
|
|
|
l_sigset_t lmask;
|
|
|
|
sigset_t sigmask;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(rt_sigsuspend))
|
|
|
|
printf(ARGS(rt_sigsuspend, "%p, %d"),
|
|
|
|
(void *)uap->newset, uap->sigsetsize);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (uap->sigsetsize != sizeof(l_sigset_t))
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
error = copyin(uap->newset, &lmask, sizeof(l_sigset_t));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
linux_to_bsd_sigset(&lmask, &sigmask);
|
|
|
|
return (kern_sigsuspend(td, sigmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_pause(struct thread *td, struct linux_pause_args *args)
|
|
|
|
{
|
|
|
|
struct proc *p = td->td_proc;
|
|
|
|
sigset_t sigmask;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(pause))
|
|
|
|
printf(ARGS(pause, ""));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
PROC_LOCK(p);
|
|
|
|
sigmask = td->td_sigmask;
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
return (kern_sigsuspend(td, sigmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_sigaltstack(struct thread *td, struct linux_sigaltstack_args *uap)
|
|
|
|
{
|
|
|
|
stack_t ss, oss;
|
|
|
|
l_stack_t lss;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(sigaltstack))
|
|
|
|
printf(ARGS(sigaltstack, "%p, %p"), uap->uss, uap->uoss);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (uap->uss != NULL) {
|
|
|
|
error = copyin(uap->uss, &lss, sizeof(l_stack_t));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
ss.ss_sp = PTRIN(lss.ss_sp);
|
|
|
|
ss.ss_size = lss.ss_size;
|
|
|
|
ss.ss_flags = linux_to_bsd_sigaltstack(lss.ss_flags);
|
|
|
|
}
|
2004-08-24 20:52:52 +00:00
|
|
|
error = kern_sigaltstack(td, (uap->uss != NULL) ? &ss : NULL,
|
|
|
|
(uap->uoss != NULL) ? &oss : NULL);
|
2004-08-16 07:55:06 +00:00
|
|
|
if (!error && uap->uoss != NULL) {
|
|
|
|
lss.ss_sp = PTROUT(oss.ss_sp);
|
|
|
|
lss.ss_size = oss.ss_size;
|
|
|
|
lss.ss_flags = bsd_to_linux_sigaltstack(oss.ss_flags);
|
|
|
|
error = copyout(&lss, uap->uoss, sizeof(l_stack_t));
|
|
|
|
}
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_ftruncate64(struct thread *td, struct linux_ftruncate64_args *args)
|
|
|
|
{
|
|
|
|
struct ftruncate_args sa;
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(ftruncate64))
|
|
|
|
printf(ARGS(ftruncate64, "%u, %jd"), args->fd,
|
|
|
|
(intmax_t)args->length);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
sa.fd = args->fd;
|
|
|
|
sa.length = args->length;
|
2011-09-16 13:58:51 +00:00
|
|
|
return sys_ftruncate(td, &sa);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
linux_gettimeofday(struct thread *td, struct linux_gettimeofday_args *uap)
|
|
|
|
{
|
|
|
|
struct timeval atv;
|
|
|
|
l_timeval atv32;
|
|
|
|
struct timezone rtz;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
if (uap->tp) {
|
|
|
|
microtime(&atv);
|
|
|
|
atv32.tv_sec = atv.tv_sec;
|
|
|
|
atv32.tv_usec = atv.tv_usec;
|
2007-04-18 18:11:32 +00:00
|
|
|
error = copyout(&atv32, uap->tp, sizeof(atv32));
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
if (error == 0 && uap->tzp != NULL) {
|
|
|
|
rtz.tz_minuteswest = tz_minuteswest;
|
|
|
|
rtz.tz_dsttime = tz_dsttime;
|
2007-04-18 18:11:32 +00:00
|
|
|
error = copyout(&rtz, uap->tzp, sizeof(rtz));
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2007-04-18 18:08:12 +00:00
|
|
|
int
|
|
|
|
linux_settimeofday(struct thread *td, struct linux_settimeofday_args *uap)
|
|
|
|
{
|
|
|
|
l_timeval atv32;
|
|
|
|
struct timeval atv, *tvp;
|
|
|
|
struct timezone atz, *tzp;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (uap->tp) {
|
|
|
|
error = copyin(uap->tp, &atv32, sizeof(atv32));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
atv.tv_sec = atv32.tv_sec;
|
|
|
|
atv.tv_usec = atv32.tv_usec;
|
|
|
|
tvp = &atv;
|
|
|
|
} else
|
|
|
|
tvp = NULL;
|
|
|
|
if (uap->tzp) {
|
|
|
|
error = copyin(uap->tzp, &atz, sizeof(atz));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
tzp = &atz;
|
|
|
|
} else
|
|
|
|
tzp = NULL;
|
|
|
|
return (kern_settimeofday(td, tvp, tzp));
|
|
|
|
}
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
int
|
|
|
|
linux_getrusage(struct thread *td, struct linux_getrusage_args *uap)
|
|
|
|
{
|
2004-10-05 18:51:11 +00:00
|
|
|
struct rusage s;
|
2004-08-16 07:55:06 +00:00
|
|
|
int error;
|
2004-10-05 18:51:11 +00:00
|
|
|
|
|
|
|
error = kern_getrusage(td, uap->who, &s);
|
2004-08-16 07:55:06 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2015-05-24 15:03:09 +00:00
|
|
|
if (uap->rusage != NULL)
|
|
|
|
error = linux_copyout_rusage(&s, uap->rusage);
|
2004-08-16 07:55:06 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2007-03-30 00:06:21 +00:00
|
|
|
linux_set_thread_area(struct thread *td,
|
|
|
|
struct linux_set_thread_area_args *args)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
2007-03-30 00:06:21 +00:00
|
|
|
struct l_user_desc info;
|
|
|
|
struct user_segment_descriptor sd;
|
2010-12-22 00:18:42 +00:00
|
|
|
struct pcb *pcb;
|
2007-03-30 00:06:21 +00:00
|
|
|
int a[2];
|
|
|
|
int error;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2007-03-30 00:06:21 +00:00
|
|
|
error = copyin(args->desc, &info, sizeof(struct l_user_desc));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(set_thread_area))
|
2007-04-18 20:12:05 +00:00
|
|
|
printf(ARGS(set_thread_area, "%i, %x, %x, %i, %i, %i, "
|
2007-03-30 00:06:21 +00:00
|
|
|
"%i, %i, %i"), info.entry_number, info.base_addr,
|
|
|
|
info.limit, info.seg_32bit, info.contents,
|
|
|
|
info.read_exec_only, info.limit_in_pages,
|
|
|
|
info.seg_not_present, info.useable);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Semantics of Linux version: every thread in the system has array
|
|
|
|
* of three TLS descriptors. 1st is GLIBC TLS, 2nd is WINE, 3rd unknown.
|
|
|
|
* This syscall loads one of the selected TLS decriptors with a value
|
|
|
|
* and also loads GDT descriptors 6, 7 and 8 with the content of
|
|
|
|
* the per-thread descriptors.
|
|
|
|
*
|
|
|
|
* Semantics of FreeBSD version: I think we can ignore that Linux has
|
|
|
|
* three per-thread descriptors and use just the first one.
|
|
|
|
* The tls_array[] is used only in [gs]et_thread_area() syscalls and
|
|
|
|
* for loading the GDT descriptors. We use just one GDT descriptor
|
|
|
|
* for TLS, so we will load just one.
|
2007-04-18 20:12:05 +00:00
|
|
|
*
|
|
|
|
* XXX: This doesn't work when a user space process tries to use more
|
2007-03-30 00:06:21 +00:00
|
|
|
* than one TLS segment. Comment in the Linux source says wine might
|
2007-04-18 20:12:05 +00:00
|
|
|
* do this.
|
2007-03-30 00:06:21 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* GLIBC reads current %gs and call set_thread_area() with it.
|
|
|
|
* We should let GUDATA_SEL and GUGS32_SEL proceed as well because
|
|
|
|
* we use these segments.
|
|
|
|
*/
|
|
|
|
switch (info.entry_number) {
|
|
|
|
case GUGS32_SEL:
|
|
|
|
case GUDATA_SEL:
|
|
|
|
case 6:
|
|
|
|
case -1:
|
|
|
|
info.entry_number = GUGS32_SEL;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We have to copy out the GDT entry we use.
|
2007-04-18 20:12:05 +00:00
|
|
|
*
|
|
|
|
* XXX: What if a user space program does not check the return value
|
|
|
|
* and tries to use 6, 7 or 8?
|
2007-03-30 00:06:21 +00:00
|
|
|
*/
|
|
|
|
error = copyout(&info, args->desc, sizeof(struct l_user_desc));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (LINUX_LDT_empty(&info)) {
|
|
|
|
a[0] = 0;
|
|
|
|
a[1] = 0;
|
|
|
|
} else {
|
|
|
|
a[0] = LINUX_LDT_entry_a(&info);
|
|
|
|
a[1] = LINUX_LDT_entry_b(&info);
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&sd, &a, sizeof(a));
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (ldebug(set_thread_area))
|
|
|
|
printf("Segment created in set_thread_area: "
|
|
|
|
"lobase: %x, hibase: %x, lolimit: %x, hilimit: %x, "
|
|
|
|
"type: %i, dpl: %i, p: %i, xx: %i, long: %i, "
|
|
|
|
"def32: %i, gran: %i\n",
|
|
|
|
sd.sd_lobase,
|
|
|
|
sd.sd_hibase,
|
|
|
|
sd.sd_lolimit,
|
|
|
|
sd.sd_hilimit,
|
|
|
|
sd.sd_type,
|
|
|
|
sd.sd_dpl,
|
|
|
|
sd.sd_p,
|
|
|
|
sd.sd_xx,
|
|
|
|
sd.sd_long,
|
|
|
|
sd.sd_def32,
|
|
|
|
sd.sd_gran);
|
|
|
|
#endif
|
|
|
|
|
2010-12-22 00:18:42 +00:00
|
|
|
pcb = td->td_pcb;
|
|
|
|
pcb->pcb_gsbase = (register_t)info.base_addr;
|
2013-05-09 21:42:43 +00:00
|
|
|
set_pcb_flags(pcb, PCB_32BIT);
|
2009-04-01 13:09:26 +00:00
|
|
|
update_gdt_gsbase(td, info.base_addr);
|
2007-03-30 00:06:21 +00:00
|
|
|
|
|
|
|
return (0);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|