d66a506616
netscape-2.0 for Linux running all the Java stuff. The scrollbars are now working, at least on my machine. (whew! :-) I'm uncomfortable with the size of this commit, but it's too inter-dependant to easily seperate out. The main changes: COMPAT_LINUX is *GONE*. Most of the code has been moved out of the i386 machine dependent section into the linux emulator itself. The int 0x80 syscall code was almost identical to the lcall 7,0 code and a minor tweak allows them to both be used with the same C code. All kernels can now just modload the lkm and it'll DTRT without having to rebuild the kernel first. Like IBCS2, you can statically compile it in with "options LINUX". A pile of new syscalls implemented, including getdents(), llseek(), readv(), writev(), msync(), personality(). The Linux-ELF libraries want to use some of these. linux_select() now obeys Linux semantics, ie: returns the time remaining of the timeout value rather than leaving it the original value. Quite a few bugs removed, including incorrect arguments being used in syscalls.. eg: mixups between passing the sigset as an int, vs passing it as a pointer and doing a copyin(), missing return values, unhandled cases, SIOC* ioctls, etc. The build for the code has changed. i386/conf/files now knows how to build linux_genassym and generate linux_assym.h on the fly. Supporting changes elsewhere in the kernel: The user-mode signal trampoline has moved from the U area to immediately below the top of the stack (below PS_STRINGS). This allows the different binary emulations to have their own signal trampoline code (which gets rid of the hardwired syscall 103 (sigreturn on BSD, syslog on Linux)) and so that the emulator can provide the exact "struct sigcontext *" argument to the program's signal handlers. The sigstack's "ss_flags" now uses SS_DISABLE and SS_ONSTACK flags, which have the same values as the re-used SA_DISABLE and SA_ONSTACK which are intended for sigaction only. This enables the support of a SA_RESETHAND flag to sigaction to implement the gross SYSV and Linux SA_ONESHOT signal semantics where the signal handler is reset when it's triggered. makesyscalls.sh no longer appends the struct sysentvec on the end of the generated init_sysent.c code. It's a lot saner to have it in a seperate file rather than trying to update the structure inside the awk script. :-) At exec time, the dozen bytes or so of signal trampoline code are copied to the top of the user's stack, rather than obtaining the trampoline code the old way by getting a clone of the parent's user area. This allows Linux and native binaries to freely exec each other without getting trampolines mixed up.
354 lines
10 KiB
C
354 lines
10 KiB
C
/*-
|
|
* Copyright (c) 1994-1995 Søren Schmidt
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer
|
|
* in this position and unchanged.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software withough specific prior written permission
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
* $Id: linux_ipc.c,v 1.6 1996/01/08 04:34:54 peter Exp $
|
|
*/
|
|
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/sysproto.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/shm.h>
|
|
|
|
#include <i386/linux/linux.h>
|
|
#include <i386/linux/linux_proto.h>
|
|
#include <i386/linux/linux_util.h>
|
|
|
|
static int linux_semop __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_semget __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_semctl __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_msgsnd __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_msgrcv __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_msgop __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_msgctl __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_shmat __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_shmdt __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_shmget __P((struct proc *, struct linux_ipc_args *, int *));
|
|
static int linux_shmctl __P((struct proc *, struct linux_ipc_args *, int *));
|
|
|
|
struct linux_ipc_perm {
|
|
linux_key_t key;
|
|
unsigned short uid;
|
|
unsigned short gid;
|
|
unsigned short cuid;
|
|
unsigned short cgid;
|
|
unsigned short mode;
|
|
unsigned short seq;
|
|
};
|
|
|
|
static void
|
|
linux_to_bsd_ipc_perm(struct linux_ipc_perm *lpp, struct ipc_perm *bpp)
|
|
{
|
|
bpp->key = lpp->key;
|
|
bpp->uid = lpp->uid;
|
|
bpp->gid = lpp->gid;
|
|
bpp->cuid = lpp->cuid;
|
|
bpp->cgid = lpp->cgid;
|
|
bpp->mode = lpp->mode;
|
|
bpp->seq = lpp->seq;
|
|
}
|
|
|
|
|
|
static void
|
|
bsd_to_linux_ipc_perm(struct ipc_perm *bpp, struct linux_ipc_perm *lpp)
|
|
{
|
|
lpp->key = bpp->key;
|
|
lpp->uid = bpp->uid;
|
|
lpp->gid = bpp->gid;
|
|
lpp->cuid = bpp->cuid;
|
|
lpp->cgid = bpp->cgid;
|
|
lpp->mode = bpp->mode;
|
|
lpp->seq = bpp->seq;
|
|
}
|
|
|
|
struct linux_shmid_ds {
|
|
struct linux_ipc_perm shm_perm;
|
|
int shm_segsz;
|
|
linux_time_t shm_atime;
|
|
linux_time_t shm_dtime;
|
|
linux_time_t shm_ctime;
|
|
ushort shm_cpid;
|
|
ushort shm_lpid;
|
|
short shm_nattch;
|
|
ushort private1;
|
|
void *private2;
|
|
void *private3;
|
|
};
|
|
|
|
static void
|
|
linux_to_bsd_shmid_ds(struct linux_shmid_ds *lsp, struct shmid_ds *bsp)
|
|
{
|
|
linux_to_bsd_ipc_perm(&lsp->shm_perm, &bsp->shm_perm);
|
|
bsp->shm_segsz = lsp->shm_segsz;
|
|
bsp->shm_lpid = lsp->shm_lpid;
|
|
bsp->shm_cpid = lsp->shm_cpid;
|
|
bsp->shm_nattch = lsp->shm_nattch;
|
|
bsp->shm_atime = lsp->shm_atime;
|
|
bsp->shm_dtime = lsp->shm_dtime;
|
|
bsp->shm_ctime = lsp->shm_ctime;
|
|
bsp->shm_internal = lsp->private3; /* this goes (yet) SOS */
|
|
}
|
|
|
|
static void
|
|
bsd_to_linux_shmid_ds(struct shmid_ds *bsp, struct linux_shmid_ds *lsp)
|
|
{
|
|
bsd_to_linux_ipc_perm(&bsp->shm_perm, &lsp->shm_perm);
|
|
lsp->shm_segsz = bsp->shm_segsz;
|
|
lsp->shm_lpid = bsp->shm_lpid;
|
|
lsp->shm_cpid = bsp->shm_cpid;
|
|
lsp->shm_nattch = bsp->shm_nattch;
|
|
lsp->shm_atime = bsp->shm_atime;
|
|
lsp->shm_dtime = bsp->shm_dtime;
|
|
lsp->shm_ctime = bsp->shm_ctime;
|
|
lsp->private3 = bsp->shm_internal; /* this goes (yet) SOS */
|
|
}
|
|
|
|
static int
|
|
linux_semop(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
return ENOSYS;
|
|
}
|
|
|
|
static int
|
|
linux_semget(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
return ENOSYS;
|
|
}
|
|
|
|
static int
|
|
linux_semctl(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
return ENOSYS;
|
|
}
|
|
|
|
static int
|
|
linux_msgsnd(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct msgsnd_args /* {
|
|
int msqid;
|
|
void *msgp;
|
|
size_t msgsz;
|
|
int msgflg;
|
|
} */ bsd_args;
|
|
|
|
bsd_args.msqid = args->arg1;
|
|
bsd_args.msgp = args->ptr;
|
|
bsd_args.msgsz = args->arg2;
|
|
bsd_args.msgflg = args->arg3;
|
|
return msgsnd(p, &bsd_args, retval);
|
|
}
|
|
|
|
static int
|
|
linux_msgrcv(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct msgrcv_args /* {
|
|
int msqid;
|
|
void *msgp;
|
|
size_t msgsz;
|
|
long msgtyp;
|
|
int msgflg;
|
|
} */ bsd_args;
|
|
|
|
bsd_args.msqid = args->arg1;
|
|
bsd_args.msgp = args->ptr;
|
|
bsd_args.msgsz = args->arg2;
|
|
bsd_args.msgtyp = 0;
|
|
bsd_args.msgflg = args->arg3;
|
|
return msgrcv(p, &bsd_args, retval);
|
|
}
|
|
|
|
static int
|
|
linux_msgget(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct msgget_args /* {
|
|
key_t key;
|
|
int msgflg;
|
|
} */ bsd_args;
|
|
|
|
bsd_args.key = args->arg1;
|
|
bsd_args.msgflg = args->arg2;
|
|
return msgget(p, &bsd_args, retval);
|
|
}
|
|
|
|
static int
|
|
linux_msgctl(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct msgctl_args /* {
|
|
int msqid;
|
|
int cmd;
|
|
struct msqid_ds *buf;
|
|
} */ bsd_args;
|
|
|
|
bsd_args.msqid = args->arg1;
|
|
bsd_args.cmd = args->arg2;
|
|
bsd_args.buf = (struct msqid_ds *)args->ptr;
|
|
return msgctl(p, &bsd_args, retval);
|
|
}
|
|
|
|
static int
|
|
linux_shmat(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct shmat_args /* {
|
|
int shmid;
|
|
void *shmaddr;
|
|
int shmflg;
|
|
} */ bsd_args;
|
|
int error;
|
|
|
|
bsd_args.shmid = args->arg1;
|
|
bsd_args.shmaddr = args->ptr;
|
|
bsd_args.shmflg = args->arg2;
|
|
if ((error = shmat(p, &bsd_args, retval)))
|
|
return error;
|
|
if ((error = copyout(retval, (caddr_t)args->arg3, sizeof(int))))
|
|
return error;
|
|
retval[0] = 0;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
linux_shmdt(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct shmdt_args /* {
|
|
void *shmaddr;
|
|
} */ bsd_args;
|
|
|
|
bsd_args.shmaddr = args->ptr;
|
|
return shmdt(p, &bsd_args, retval);
|
|
}
|
|
|
|
static int
|
|
linux_shmget(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct shmget_args /* {
|
|
key_t key;
|
|
int size;
|
|
int shmflg;
|
|
} */ bsd_args;
|
|
|
|
bsd_args.key = args->arg1;
|
|
bsd_args.size = args->arg2;
|
|
bsd_args.shmflg = args->arg3;
|
|
return shmget(p, &bsd_args, retval);
|
|
}
|
|
|
|
static int
|
|
linux_shmctl(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
struct shmid_ds bsd_shmid;
|
|
struct linux_shmid_ds linux_shmid;
|
|
struct shmctl_args /* {
|
|
int shmid;
|
|
int cmd;
|
|
struct shmid_ds *buf;
|
|
} */ bsd_args;
|
|
int error;
|
|
caddr_t sg = stackgap_init();
|
|
|
|
switch (args->arg2) {
|
|
case LINUX_IPC_STAT:
|
|
bsd_args.shmid = args->arg1;
|
|
bsd_args.cmd = IPC_STAT;
|
|
bsd_args.buf = (struct shmid_ds*)stackgap_alloc(&sg, sizeof(struct shmid_ds));
|
|
if ((error = shmctl(p, &bsd_args, retval)))
|
|
return error;
|
|
if ((error = copyin((caddr_t)&bsd_shmid, (caddr_t)bsd_args.buf,
|
|
sizeof(struct shmid_ds))))
|
|
return error;
|
|
bsd_to_linux_shmid_ds(&bsd_shmid, &linux_shmid);
|
|
return copyout((caddr_t)&linux_shmid, args->ptr, sizeof(linux_shmid));
|
|
|
|
case LINUX_IPC_SET:
|
|
if ((error = copyin(args->ptr, (caddr_t)&linux_shmid,
|
|
sizeof(linux_shmid))))
|
|
return error;
|
|
linux_to_bsd_shmid_ds(&linux_shmid, &bsd_shmid);
|
|
bsd_args.buf = (struct shmid_ds*)stackgap_alloc(&sg, sizeof(struct shmid_ds));
|
|
if ((error = copyout((caddr_t)&bsd_shmid, (caddr_t)bsd_args.buf,
|
|
sizeof(struct shmid_ds))))
|
|
return error;
|
|
bsd_args.shmid = args->arg1;
|
|
bsd_args.cmd = IPC_SET;
|
|
return shmctl(p, &bsd_args, retval);
|
|
|
|
case LINUX_IPC_RMID:
|
|
bsd_args.shmid = args->arg1;
|
|
bsd_args.cmd = IPC_RMID;
|
|
if ((error = copyin(args->ptr, (caddr_t)&linux_shmid,
|
|
sizeof(linux_shmid))))
|
|
return error;
|
|
linux_to_bsd_shmid_ds(&linux_shmid, &bsd_shmid);
|
|
bsd_args.buf = (struct shmid_ds*)stackgap_alloc(&sg, sizeof(struct shmid_ds));
|
|
if ((error = copyout((caddr_t)&bsd_shmid, (caddr_t)bsd_args.buf,
|
|
sizeof(struct shmid_ds))))
|
|
return error;
|
|
return shmctl(p, &bsd_args, retval);
|
|
|
|
case LINUX_IPC_INFO:
|
|
case LINUX_SHM_STAT:
|
|
case LINUX_SHM_INFO:
|
|
case LINUX_SHM_LOCK:
|
|
case LINUX_SHM_UNLOCK:
|
|
default:
|
|
uprintf("LINUX: 'ipc' typ=%d not implemented\n", args->what);
|
|
return EINVAL;
|
|
}
|
|
}
|
|
|
|
int
|
|
linux_ipc(struct proc *p, struct linux_ipc_args *args, int *retval)
|
|
{
|
|
switch (args->what) {
|
|
case LINUX_SEMOP:
|
|
return linux_semop(p, args, retval);
|
|
case LINUX_SEMGET:
|
|
return linux_semget(p, args, retval);
|
|
case LINUX_SEMCTL:
|
|
return linux_semctl(p, args, retval);
|
|
case LINUX_MSGSND:
|
|
return linux_msgsnd(p, args, retval);
|
|
case LINUX_MSGRCV:
|
|
return linux_msgrcv(p, args, retval);
|
|
case LINUX_MSGGET:
|
|
return linux_msgget(p, args, retval);
|
|
case LINUX_MSGCTL:
|
|
return linux_msgctl(p, args, retval);
|
|
case LINUX_SHMAT:
|
|
return linux_shmat(p, args, retval);
|
|
case LINUX_SHMDT:
|
|
return linux_shmdt(p, args, retval);
|
|
case LINUX_SHMGET:
|
|
return linux_shmget(p, args, retval);
|
|
case LINUX_SHMCTL:
|
|
return linux_shmctl(p, args, retval);
|
|
default:
|
|
uprintf("LINUX: 'ipc' typ=%d not implemented\n", args->what);
|
|
return ENOSYS;
|
|
}
|
|
}
|