Commit | Line | Data |
---|---|---|
f45d9fc9 | 1 | /* |
1da177e4 LT |
2 | * Copyright (C) 2002 Jeff Dike (jdike@karaya.com) |
3 | * Licensed under the GPL | |
4 | */ | |
5 | ||
d67b569f | 6 | #include <signal.h> |
1da177e4 | 7 | #include <errno.h> |
07bf731e | 8 | #include <string.h> |
a61f334f | 9 | #include <unistd.h> |
1da177e4 | 10 | #include <sys/mman.h> |
d67b569f | 11 | #include <sys/wait.h> |
d67b569f | 12 | #include <asm/unistd.h> |
1da177e4 LT |
13 | #include "mem_user.h" |
14 | #include "mem.h" | |
07bf731e | 15 | #include "skas.h" |
1da177e4 LT |
16 | #include "user.h" |
17 | #include "os.h" | |
18 | #include "proc_mm.h" | |
d67b569f | 19 | #include "ptrace_user.h" |
d67b569f JD |
20 | #include "kern_util.h" |
21 | #include "task.h" | |
22 | #include "registers.h" | |
23 | #include "uml-config.h" | |
24 | #include "sysdep/ptrace.h" | |
25 | #include "sysdep/stub.h" | |
16dd07bc | 26 | #include "init.h" |
c539ab73 | 27 | #include "kern_constants.h" |
d67b569f | 28 | |
07bf731e | 29 | extern unsigned long batch_syscall_stub, __syscall_stub_start; |
d67b569f | 30 | |
16dd07bc | 31 | extern void wait_stub_done(int pid); |
d67b569f | 32 | |
07bf731e BS |
33 | static inline unsigned long *check_init_stack(struct mm_id * mm_idp, |
34 | unsigned long *stack) | |
35 | { | |
f45d9fc9 | 36 | if(stack == NULL) { |
07bf731e BS |
37 | stack = (unsigned long *) mm_idp->stack + 2; |
38 | *stack = 0; | |
39 | } | |
40 | return stack; | |
41 | } | |
42 | ||
16dd07bc JD |
43 | static unsigned long syscall_regs[MAX_REG_NR]; |
44 | ||
45 | static int __init init_syscall_regs(void) | |
46 | { | |
42daba31 | 47 | get_safe_registers(syscall_regs); |
16dd07bc JD |
48 | syscall_regs[REGS_IP_INDEX] = UML_CONFIG_STUB_CODE + |
49 | ((unsigned long) &batch_syscall_stub - | |
50 | (unsigned long) &__syscall_stub_start); | |
51 | return 0; | |
52 | } | |
53 | ||
54 | __initcall(init_syscall_regs); | |
55 | ||
07bf731e BS |
56 | extern int proc_mm; |
57 | ||
c5600490 | 58 | int single_count = 0; |
07bf731e BS |
59 | int multi_count = 0; |
60 | int multi_op_count = 0; | |
c5600490 | 61 | |
f45d9fc9 | 62 | static inline long do_syscall_stub(struct mm_id * mm_idp, void **addr) |
1da177e4 | 63 | { |
b92c4f92 | 64 | int n, i; |
07bf731e | 65 | long ret, offset; |
f45d9fc9 GS |
66 | unsigned long * data; |
67 | unsigned long * syscall; | |
16dd07bc | 68 | int err, pid = mm_idp->u.pid; |
07bf731e BS |
69 | |
70 | if(proc_mm) | |
0e7d18b5 | 71 | /* FIXME: Need to look up userspace_pid by cpu */ |
07bf731e BS |
72 | pid = userspace_pid[0]; |
73 | ||
74 | multi_count++; | |
d67b569f | 75 | |
16dd07bc | 76 | n = ptrace_setregs(pid, syscall_regs); |
b92c4f92 JD |
77 | if(n < 0){ |
78 | printk("Registers - \n"); | |
79 | for(i = 0; i < MAX_REG_NR; i++) | |
16dd07bc | 80 | printk("\t%d\t0x%lx\n", i, syscall_regs[i]); |
07bf731e | 81 | panic("do_syscall_stub : PTRACE_SETREGS failed, errno = %d\n", |
b92c4f92 JD |
82 | -n); |
83 | } | |
07bf731e | 84 | |
16dd07bc JD |
85 | err = ptrace(PTRACE_CONT, pid, 0, 0); |
86 | if(err) | |
87 | panic("Failed to continue stub, pid = %d, errno = %d\n", pid, | |
88 | errno); | |
89 | ||
90 | wait_stub_done(pid); | |
07bf731e BS |
91 | |
92 | /* When the stub stops, we find the following values on the | |
93 | * beginning of the stack: | |
94 | * (long )return_value | |
95 | * (long )offset to failed sycall-data (0, if no error) | |
96 | */ | |
97 | ret = *((unsigned long *) mm_idp->stack); | |
98 | offset = *((unsigned long *) mm_idp->stack + 1); | |
99 | if (offset) { | |
100 | data = (unsigned long *)(mm_idp->stack + | |
101 | offset - UML_CONFIG_STUB_DATA); | |
802e3077 PBG |
102 | printk("do_syscall_stub : ret = %ld, offset = %ld, " |
103 | "data = %p\n", ret, offset, data); | |
07bf731e BS |
104 | syscall = (unsigned long *)((unsigned long)data + data[0]); |
105 | printk("do_syscall_stub: syscall %ld failed, return value = " | |
106 | "0x%lx, expected return value = 0x%lx\n", | |
107 | syscall[0], ret, syscall[7]); | |
108 | printk(" syscall parameters: " | |
109 | "0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx\n", | |
110 | syscall[1], syscall[2], syscall[3], | |
111 | syscall[4], syscall[5], syscall[6]); | |
112 | for(n = 1; n < data[0]/sizeof(long); n++) { | |
113 | if(n == 1) | |
114 | printk(" additional syscall data:"); | |
115 | if(n % 4 == 1) | |
116 | printk("\n "); | |
117 | printk(" 0x%lx", data[n]); | |
118 | } | |
119 | if(n > 1) | |
120 | printk("\n"); | |
c5600490 | 121 | } |
07bf731e | 122 | else ret = 0; |
c5600490 | 123 | |
07bf731e | 124 | *addr = check_init_stack(mm_idp, NULL); |
c5600490 | 125 | |
07bf731e | 126 | return ret; |
c5600490 JD |
127 | } |
128 | ||
07bf731e BS |
129 | long run_syscall_stub(struct mm_id * mm_idp, int syscall, |
130 | unsigned long *args, long expected, void **addr, | |
f45d9fc9 | 131 | int done) |
c5600490 | 132 | { |
f45d9fc9 | 133 | unsigned long *stack = check_init_stack(mm_idp, *addr); |
07bf731e BS |
134 | |
135 | if(done && *addr == NULL) | |
136 | single_count++; | |
137 | ||
f45d9fc9 | 138 | *stack += sizeof(long); |
07bf731e | 139 | stack += *stack / sizeof(long); |
c5600490 | 140 | |
f45d9fc9 GS |
141 | *stack++ = syscall; |
142 | *stack++ = args[0]; | |
143 | *stack++ = args[1]; | |
144 | *stack++ = args[2]; | |
145 | *stack++ = args[3]; | |
146 | *stack++ = args[4]; | |
147 | *stack++ = args[5]; | |
07bf731e | 148 | *stack++ = expected; |
f45d9fc9 GS |
149 | *stack = 0; |
150 | multi_op_count++; | |
c5600490 | 151 | |
c539ab73 JD |
152 | if(!done && ((((unsigned long) stack) & ~UM_KERN_PAGE_MASK) < |
153 | UM_KERN_PAGE_SIZE - 10 * sizeof(long))){ | |
07bf731e | 154 | *addr = stack; |
f45d9fc9 GS |
155 | return 0; |
156 | } | |
c5600490 | 157 | |
07bf731e BS |
158 | return do_syscall_stub(mm_idp, addr); |
159 | } | |
c5600490 | 160 | |
07bf731e BS |
161 | long syscall_stub_data(struct mm_id * mm_idp, |
162 | unsigned long *data, int data_count, | |
163 | void **addr, void **stub_addr) | |
164 | { | |
165 | unsigned long *stack; | |
166 | int ret = 0; | |
167 | ||
168 | /* If *addr still is uninitialized, it *must* contain NULL. | |
169 | * Thus in this case do_syscall_stub correctly won't be called. | |
170 | */ | |
c539ab73 JD |
171 | if((((unsigned long) *addr) & ~UM_KERN_PAGE_MASK) >= |
172 | UM_KERN_PAGE_SIZE - (10 + data_count) * sizeof(long)) { | |
07bf731e | 173 | ret = do_syscall_stub(mm_idp, addr); |
f45d9fc9 | 174 | /* in case of error, don't overwrite data on stack */ |
07bf731e BS |
175 | if(ret) |
176 | return ret; | |
177 | } | |
d67b569f | 178 | |
07bf731e BS |
179 | stack = check_init_stack(mm_idp, *addr); |
180 | *addr = stack; | |
d67b569f | 181 | |
07bf731e | 182 | *stack = data_count * sizeof(long); |
1da177e4 | 183 | |
07bf731e | 184 | memcpy(stack + 1, data, data_count * sizeof(long)); |
c5600490 | 185 | |
c539ab73 JD |
186 | *stub_addr = (void *)(((unsigned long)(stack + 1) & |
187 | ~UM_KERN_PAGE_MASK) + UML_CONFIG_STUB_DATA); | |
c5600490 | 188 | |
07bf731e | 189 | return 0; |
c5600490 JD |
190 | } |
191 | ||
16dd07bc JD |
192 | int map(struct mm_id * mm_idp, unsigned long virt, unsigned long len, int prot, |
193 | int phys_fd, unsigned long long offset, int done, void **data) | |
1da177e4 | 194 | { |
16dd07bc | 195 | int ret; |
f45d9fc9 GS |
196 | |
197 | if(proc_mm){ | |
198 | struct proc_mm_op map; | |
199 | int fd = mm_idp->u.mm_fd; | |
200 | ||
201 | map = ((struct proc_mm_op) { .op = MM_MMAP, | |
202 | .u = | |
203 | { .mmap = | |
204 | { .addr = virt, | |
205 | .len = len, | |
206 | .prot = prot, | |
207 | .flags = MAP_SHARED | | |
208 | MAP_FIXED, | |
209 | .fd = phys_fd, | |
210 | .offset= offset | |
211 | } } } ); | |
a61f334f JD |
212 | CATCH_EINTR(ret = write(fd, &map, sizeof(map))); |
213 | if(ret != sizeof(map)){ | |
214 | ret = -errno; | |
07bf731e | 215 | printk("map : /proc/mm map failed, err = %d\n", -ret); |
a61f334f | 216 | } |
07bf731e | 217 | else ret = 0; |
f45d9fc9 GS |
218 | } |
219 | else { | |
220 | unsigned long args[] = { virt, len, prot, | |
221 | MAP_SHARED | MAP_FIXED, phys_fd, | |
222 | MMAP_OFFSET(offset) }; | |
d67b569f | 223 | |
07bf731e BS |
224 | ret = run_syscall_stub(mm_idp, STUB_MMAP_NR, args, virt, |
225 | data, done); | |
f45d9fc9 | 226 | } |
d67b569f | 227 | |
07bf731e | 228 | return ret; |
1da177e4 LT |
229 | } |
230 | ||
64f60841 JD |
231 | int unmap(struct mm_id * mm_idp, unsigned long addr, unsigned long len, |
232 | int done, void **data) | |
1da177e4 | 233 | { |
f45d9fc9 GS |
234 | int ret; |
235 | ||
236 | if(proc_mm){ | |
237 | struct proc_mm_op unmap; | |
238 | int fd = mm_idp->u.mm_fd; | |
239 | ||
240 | unmap = ((struct proc_mm_op) { .op = MM_MUNMAP, | |
241 | .u = | |
242 | { .munmap = | |
243 | { .addr = | |
244 | (unsigned long) addr, | |
245 | .len = len } } } ); | |
a61f334f JD |
246 | CATCH_EINTR(ret = write(fd, &unmap, sizeof(unmap))); |
247 | if(ret != sizeof(unmap)){ | |
248 | ret = -errno; | |
07bf731e | 249 | printk("unmap - proc_mm write returned %d\n", ret); |
a61f334f | 250 | } |
07bf731e | 251 | else ret = 0; |
f45d9fc9 GS |
252 | } |
253 | else { | |
254 | unsigned long args[] = { (unsigned long) addr, len, 0, 0, 0, | |
255 | 0 }; | |
d67b569f | 256 | |
07bf731e BS |
257 | ret = run_syscall_stub(mm_idp, __NR_munmap, args, 0, |
258 | data, done); | |
f45d9fc9 | 259 | } |
d67b569f | 260 | |
f45d9fc9 | 261 | return ret; |
d67b569f | 262 | } |
1da177e4 | 263 | |
07bf731e | 264 | int protect(struct mm_id * mm_idp, unsigned long addr, unsigned long len, |
16dd07bc | 265 | unsigned int prot, int done, void **data) |
d67b569f | 266 | { |
f45d9fc9 | 267 | struct proc_mm_op protect; |
16dd07bc | 268 | int ret; |
f45d9fc9 | 269 | |
f45d9fc9 GS |
270 | if(proc_mm){ |
271 | int fd = mm_idp->u.mm_fd; | |
272 | ||
273 | protect = ((struct proc_mm_op) { .op = MM_MPROTECT, | |
274 | .u = | |
275 | { .mprotect = | |
276 | { .addr = | |
277 | (unsigned long) addr, | |
278 | .len = len, | |
279 | .prot = prot } } } ); | |
280 | ||
a61f334f JD |
281 | CATCH_EINTR(ret = write(fd, &protect, sizeof(protect))); |
282 | if(ret != sizeof(protect)){ | |
283 | ret = -errno; | |
f45d9fc9 | 284 | printk("protect failed, err = %d", -ret); |
a61f334f | 285 | } |
f45d9fc9 GS |
286 | else ret = 0; |
287 | } | |
288 | else { | |
289 | unsigned long args[] = { addr, len, prot, 0, 0, 0 }; | |
290 | ||
291 | ret = run_syscall_stub(mm_idp, __NR_mprotect, args, 0, | |
292 | data, done); | |
293 | } | |
294 | ||
295 | return ret; | |
1da177e4 | 296 | } |