freebsd-skq/sys/compat/linux/linux_mib.c

355 lines
8.4 KiB
C
Raw Normal View History

1999-08-27 19:47:41 +00:00
/*-
* Copyright (c) 1999 Marcel Moolenaar
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer
* in this position and unchanged.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
2000-08-25 07:32:24 +00:00
* derived from this software without specific prior written permission.
1999-08-27 19:47:41 +00:00
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
1999-08-28 02:16:32 +00:00
* $FreeBSD$
1999-08-27 19:47:41 +00:00
*/
#include <sys/param.h>
#include <sys/kernel.h>
#include <sys/systm.h>
#include <sys/sysctl.h>
#include <sys/proc.h>
#include <sys/malloc.h>
#include <sys/jail.h>
#include <sys/lock.h>
#include <sys/mutex.h>
1999-08-27 19:47:41 +00:00
2000-08-22 01:32:14 +00:00
#include <machine/../linux/linux.h>
#include <compat/linux/linux_mib.h>
1999-08-27 19:47:41 +00:00
struct linux_prison {
char pr_osname[LINUX_MAX_UTSNAME];
char pr_osrelease[LINUX_MAX_UTSNAME];
int pr_oss_version;
};
SYSCTL_NODE(_compat, OID_AUTO, linux, CTLFLAG_RW, 0,
"Linux mode");
static char linux_osname[LINUX_MAX_UTSNAME] = "Linux";
static int
linux_sysctl_osname(SYSCTL_HANDLER_ARGS)
1999-08-27 19:47:41 +00:00
{
char osname[LINUX_MAX_UTSNAME];
int error;
linux_get_osname(req->td->td_proc, osname);
1999-08-27 19:47:41 +00:00
error = sysctl_handle_string(oidp, osname, LINUX_MAX_UTSNAME, req);
if (error || req->newptr == NULL)
return (error);
error = linux_set_osname(req->td->td_proc, osname);
1999-08-27 19:47:41 +00:00
return (error);
}
SYSCTL_PROC(_compat_linux, OID_AUTO, osname,
CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_PRISON,
0, 0, linux_sysctl_osname, "A",
"Linux kernel OS name");
Round of cleanups and enhancements. These include (in random order): o Introduce private types for use in linux syscalls for two reasons: 1. establish type independence for ease in porting and, 2. provide a visual queue as to which syscalls have proper prototypes to further cleanup the i386/alpha split. Linuxulator types are prefixed by 'l_'. void and char have not been "virtualized". o Provide dummy functions for all syscalls and remove dummy functions or implementations of truely obsolete syscalls. o Sanitize the shm*, sem* and msg* syscalls. o Make a first attempt to implement the linux_sysctl syscall. At this time it only returns one MIB (KERN_VERSION), but most importantly, it tells us when we need to add additional sysctls :-) o Bump the kenel version up to 2.4.2 (this is not the same as the KERN_VERSION MIB, BTW). o Implement new syscalls, of which most are specific to i386. Our syscall table is now up to date with Linux 2.4.2. Some highlights: - Implement the 32-bit uid_t and gid_t bases syscalls. - Implement a couple of 64-bit file size/offset bases syscalls. o Fix or improve numerous syscalls and prototypes. o Reduce style(9) violations while I'm here. Especially indentation inconsistencies within the same file are addressed. Re-indenting did not obfuscate actual changes to the extend that it could not be combined. NOTE: I spend some time testing these changes and found that if there were regressions, they were not caused by these changes AFAICT. It was observed that installing a RH 7.1 runtime environment did make matters worse. Hangs and/or reboots have been observed with and without these changes, so when it failed to make life better in cases it doesn't look like it made it worse.
2001-09-08 19:07:04 +00:00
static char linux_osrelease[LINUX_MAX_UTSNAME] = "2.4.2";
1999-08-27 19:47:41 +00:00
static int
linux_sysctl_osrelease(SYSCTL_HANDLER_ARGS)
1999-08-27 19:47:41 +00:00
{
char osrelease[LINUX_MAX_UTSNAME];
int error;
linux_get_osrelease(req->td->td_proc, osrelease);
1999-08-27 19:47:41 +00:00
error = sysctl_handle_string(oidp, osrelease, LINUX_MAX_UTSNAME, req);
if (error || req->newptr == NULL)
return (error);
error = linux_set_osrelease(req->td->td_proc, osrelease);
1999-08-27 19:47:41 +00:00
return (error);
}
SYSCTL_PROC(_compat_linux, OID_AUTO, osrelease,
CTLTYPE_STRING | CTLFLAG_RW | CTLFLAG_PRISON,
0, 0, linux_sysctl_osrelease, "A",
"Linux kernel OS release");
static int linux_oss_version = 0x030600;
static int
linux_sysctl_oss_version(SYSCTL_HANDLER_ARGS)
1999-08-27 19:47:41 +00:00
{
int oss_version;
int error;
oss_version = linux_get_oss_version(req->td->td_proc);
1999-08-27 19:47:41 +00:00
error = sysctl_handle_int(oidp, &oss_version, 0, req);
if (error || req->newptr == NULL)
return (error);
error = linux_set_oss_version(req->td->td_proc, oss_version);
1999-08-27 19:47:41 +00:00
return (error);
}
SYSCTL_PROC(_compat_linux, OID_AUTO, oss_version,
CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_PRISON,
0, 0, linux_sysctl_oss_version, "I",
"Linux OSS version");
/*
* Returns holding the prison mutex if return non-NULL.
*/
1999-08-27 19:47:41 +00:00
static struct linux_prison *
linux_get_prison(struct proc *p)
1999-08-27 19:47:41 +00:00
{
register struct prison *pr;
register struct linux_prison *lpr;
if (!jailed(p->p_ucred))
1999-08-27 19:47:41 +00:00
return (NULL);
pr = p->p_ucred->cr_prison;
/*
* Rather than hold the prison mutex during allocation, check to
* see if we need to allocate while holding the mutex, release it,
* allocate, then once we've allocated the memory, check again to
* see if it's still needed, and set if appropriate. If it's not,
* we release the mutex again to FREE(), and grab it again so as
* to release holding the lock.
*/
mtx_lock(&pr->pr_mtx);
1999-08-27 19:47:41 +00:00
if (pr->pr_linux == NULL) {
mtx_unlock(&pr->pr_mtx);
1999-08-27 19:47:41 +00:00
MALLOC(lpr, struct linux_prison *, sizeof *lpr,
M_PRISON, M_WAITOK|M_ZERO);
mtx_lock(&pr->pr_mtx);
if (pr->pr_linux == NULL) {
pr->pr_linux = lpr;
} else {
mtx_unlock(&pr->pr_mtx);
FREE(lpr, M_PRISON);
mtx_lock(&pr->pr_mtx);
}
1999-08-27 19:47:41 +00:00
}
return (pr->pr_linux);
}
void
linux_get_osname(p, dst)
1999-08-27 19:47:41 +00:00
struct proc *p;
char *dst;
1999-08-27 19:47:41 +00:00
{
register struct prison *pr;
register struct linux_prison *lpr;
if (p->p_ucred->cr_prison == NULL) {
bcopy(linux_osname, dst, LINUX_MAX_UTSNAME);
return;
1999-08-27 19:47:41 +00:00
}
pr = p->p_ucred->cr_prison;
mtx_lock(&pr->pr_mtx);
if (pr->pr_linux != NULL) {
lpr = (struct linux_prison *)pr->pr_linux;
if (lpr->pr_osname[0]) {
bcopy(lpr->pr_osname, dst, LINUX_MAX_UTSNAME);
mtx_unlock(&pr->pr_mtx);
return;
}
}
mtx_unlock(&pr->pr_mtx);
bcopy(linux_osname, dst, LINUX_MAX_UTSNAME);
1999-08-27 19:47:41 +00:00
}
int
linux_set_osname(p, osname)
struct proc *p;
char *osname;
{
register struct linux_prison *lpr;
lpr = linux_get_prison(p);
if (lpr != NULL) {
1999-08-27 19:47:41 +00:00
strcpy(lpr->pr_osname, osname);
mtx_unlock(&p->p_ucred->cr_prison->pr_mtx);
} else {
1999-08-27 19:47:41 +00:00
strcpy(linux_osname, osname);
}
1999-08-27 19:47:41 +00:00
return (0);
}
void
linux_get_osrelease(p, dst)
1999-08-27 19:47:41 +00:00
struct proc *p;
char *dst;
1999-08-27 19:47:41 +00:00
{
register struct prison *pr;
struct linux_prison *lpr;
1999-08-27 19:47:41 +00:00
if (p->p_ucred->cr_prison == NULL) {
bcopy(linux_osrelease, dst, LINUX_MAX_UTSNAME);
return;
1999-08-27 19:47:41 +00:00
}
pr = p->p_ucred->cr_prison;
mtx_lock(&pr->pr_mtx);
if (pr->pr_linux != NULL) {
lpr = (struct linux_prison *) pr->pr_linux;
if (lpr->pr_osrelease[0]) {
bcopy(lpr->pr_osrelease, dst, LINUX_MAX_UTSNAME);
mtx_unlock(&pr->pr_mtx);
return;
}
}
mtx_unlock(&pr->pr_mtx);
bcopy(linux_osrelease, dst, LINUX_MAX_UTSNAME);
1999-08-27 19:47:41 +00:00
}
int
linux_set_osrelease(p, osrelease)
struct proc *p;
char *osrelease;
{
register struct linux_prison *lpr;
lpr = linux_get_prison(p);
if (lpr != NULL) {
1999-08-27 19:47:41 +00:00
strcpy(lpr->pr_osrelease, osrelease);
mtx_unlock(&p->p_ucred->cr_prison->pr_mtx);
} else {
1999-08-27 19:47:41 +00:00
strcpy(linux_osrelease, osrelease);
}
1999-08-27 19:47:41 +00:00
return (0);
}
int
linux_get_oss_version(p)
struct proc *p;
{
register struct prison *pr;
register struct linux_prison *lpr;
int version;
if (p->p_ucred->cr_prison == NULL)
return (linux_oss_version);
1999-08-27 19:47:41 +00:00
pr = p->p_ucred->cr_prison;
mtx_lock(&pr->pr_mtx);
if (pr->pr_linux != NULL) {
lpr = (struct linux_prison *) pr->pr_linux;
if (lpr->pr_oss_version) {
version = lpr->pr_oss_version;
} else {
version = linux_oss_version;
}
} else {
version = linux_oss_version;
1999-08-27 19:47:41 +00:00
}
mtx_unlock(&pr->pr_mtx);
1999-08-27 19:47:41 +00:00
return (version);
1999-08-27 19:47:41 +00:00
}
int
linux_set_oss_version(p, oss_version)
struct proc *p;
int oss_version;
{
register struct linux_prison *lpr;
lpr = linux_get_prison(p);
if (lpr != NULL) {
1999-08-27 19:47:41 +00:00
lpr->pr_oss_version = oss_version;
mtx_unlock(&p->p_ucred->cr_prison->pr_mtx);
} else {
1999-08-27 19:47:41 +00:00
linux_oss_version = oss_version;
}
1999-08-27 19:47:41 +00:00
return (0);
}
#ifdef DEBUG
u_char linux_debug_map[howmany(LINUX_SYS_MAXSYSCALL, sizeof(u_char))];
static int
linux_debug(int syscall, int toggle, int global)
{
if (global) {
char c = toggle ? 0 : 0xff;
memset(linux_debug_map, c, sizeof(linux_debug_map));
return (0);
}
if (syscall < 0 || syscall >= LINUX_SYS_MAXSYSCALL)
return (EINVAL);
if (toggle)
clrbit(linux_debug_map, syscall);
else
setbit(linux_debug_map, syscall);
return (0);
}
/*
2002-05-11 06:06:11 +00:00
* Usage: sysctl linux.debug=<syscall_nr>.<0/1>
*
2002-05-11 06:06:11 +00:00
* E.g.: sysctl linux.debug=21.0
*
* As a special case, syscall "all" will apply to all syscalls globally.
*/
#define LINUX_MAX_DEBUGSTR 16
static int
linux_sysctl_debug(SYSCTL_HANDLER_ARGS)
{
char value[LINUX_MAX_DEBUGSTR], *p;
int error, sysc, toggle;
int global = 0;
value[0] = '\0';
error = sysctl_handle_string(oidp, value, LINUX_MAX_DEBUGSTR, req);
if (error || req->newptr == NULL)
return (error);
for (p = value; *p != '\0' && *p != '.'; p++);
if (*p == '\0')
return (EINVAL);
*p++ = '\0';
sysc = strtol(value, NULL, 0);
toggle = strtol(p, NULL, 0);
if (strcmp(value, "all") == 0)
global = 1;
error = linux_debug(sysc, toggle, global);
return (error);
}
SYSCTL_PROC(_compat_linux, OID_AUTO, debug,
CTLTYPE_STRING | CTLFLAG_RW,
0, 0, linux_sysctl_debug, "A",
"Linux debugging control");
#endif /* DEBUG */