mem_user.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239
  1. /*
  2. * Copyright (C) 2002 Jeff Dike (jdike@karaya.com)
  3. * Licensed under the GPL
  4. */
  5. #include <signal.h>
  6. #include <errno.h>
  7. #include <sys/mman.h>
  8. #include <sys/wait.h>
  9. #include <asm/page.h>
  10. #include <asm/unistd.h>
  11. #include "mem_user.h"
  12. #include "mem.h"
  13. #include "mm_id.h"
  14. #include "user.h"
  15. #include "os.h"
  16. #include "proc_mm.h"
  17. #include "ptrace_user.h"
  18. #include "user_util.h"
  19. #include "kern_util.h"
  20. #include "task.h"
  21. #include "registers.h"
  22. #include "uml-config.h"
  23. #include "sysdep/ptrace.h"
  24. #include "sysdep/stub.h"
  25. #include "skas.h"
  26. extern unsigned long syscall_stub, batch_syscall_stub, __syscall_stub_start;
  27. extern void wait_stub_done(int pid, int sig, char * fname);
  28. int single_count = 0;
  29. static long one_syscall_stub(struct mm_id * mm_idp, int syscall,
  30. unsigned long *args)
  31. {
  32. int n, pid = mm_idp->u.pid;
  33. unsigned long regs[MAX_REG_NR];
  34. get_safe_registers(regs);
  35. regs[REGS_IP_INDEX] = UML_CONFIG_STUB_CODE +
  36. ((unsigned long) &syscall_stub -
  37. (unsigned long) &__syscall_stub_start);
  38. /* XXX Don't have a define for starting a syscall */
  39. regs[REGS_SYSCALL_NR] = syscall;
  40. regs[REGS_SYSCALL_ARG1] = args[0];
  41. regs[REGS_SYSCALL_ARG2] = args[1];
  42. regs[REGS_SYSCALL_ARG3] = args[2];
  43. regs[REGS_SYSCALL_ARG4] = args[3];
  44. regs[REGS_SYSCALL_ARG5] = args[4];
  45. regs[REGS_SYSCALL_ARG6] = args[5];
  46. n = ptrace_setregs(pid, regs);
  47. if(n < 0){
  48. printk("one_syscall_stub : PTRACE_SETREGS failed, "
  49. "errno = %d\n", n);
  50. return(n);
  51. }
  52. wait_stub_done(pid, 0, "one_syscall_stub");
  53. return(*((unsigned long *) mm_idp->stack));
  54. }
  55. int multi_count = 0;
  56. int multi_op_count = 0;
  57. static long many_syscall_stub(struct mm_id * mm_idp, int syscall,
  58. unsigned long *args, int done, void **addr_out)
  59. {
  60. unsigned long regs[MAX_REG_NR], *stack;
  61. int n, pid = mm_idp->u.pid;
  62. stack = *addr_out;
  63. if(stack == NULL)
  64. stack = (unsigned long *) current_stub_stack();
  65. *stack++ = syscall;
  66. *stack++ = args[0];
  67. *stack++ = args[1];
  68. *stack++ = args[2];
  69. *stack++ = args[3];
  70. *stack++ = args[4];
  71. *stack++ = args[5];
  72. *stack = 0;
  73. multi_op_count++;
  74. if(!done && ((((unsigned long) stack) & ~PAGE_MASK) <
  75. PAGE_SIZE - 8 * sizeof(long))){
  76. *addr_out = stack;
  77. return 0;
  78. }
  79. multi_count++;
  80. get_safe_registers(regs);
  81. regs[REGS_IP_INDEX] = UML_CONFIG_STUB_CODE +
  82. ((unsigned long) &batch_syscall_stub -
  83. (unsigned long) &__syscall_stub_start);
  84. regs[REGS_SP_INDEX] = UML_CONFIG_STUB_DATA;
  85. n = ptrace_setregs(pid, regs);
  86. if(n < 0){
  87. printk("many_syscall_stub : PTRACE_SETREGS failed, "
  88. "errno = %d\n", n);
  89. return(n);
  90. }
  91. wait_stub_done(pid, 0, "many_syscall_stub");
  92. stack = (unsigned long *) mm_idp->stack;
  93. *addr_out = stack;
  94. return(*stack);
  95. }
  96. static long run_syscall_stub(struct mm_id * mm_idp, int syscall,
  97. unsigned long *args, void **addr, int done)
  98. {
  99. long res;
  100. if((*addr == NULL) && done)
  101. res = one_syscall_stub(mm_idp, syscall, args);
  102. else res = many_syscall_stub(mm_idp, syscall, args, done, addr);
  103. return res;
  104. }
  105. void *map(struct mm_id * mm_idp, unsigned long virt, unsigned long len,
  106. int r, int w, int x, int phys_fd, unsigned long long offset,
  107. int done, void *data)
  108. {
  109. int prot, n;
  110. prot = (r ? PROT_READ : 0) | (w ? PROT_WRITE : 0) |
  111. (x ? PROT_EXEC : 0);
  112. if(proc_mm){
  113. struct proc_mm_op map;
  114. int fd = mm_idp->u.mm_fd;
  115. map = ((struct proc_mm_op) { .op = MM_MMAP,
  116. .u =
  117. { .mmap =
  118. { .addr = virt,
  119. .len = len,
  120. .prot = prot,
  121. .flags = MAP_SHARED |
  122. MAP_FIXED,
  123. .fd = phys_fd,
  124. .offset= offset
  125. } } } );
  126. n = os_write_file(fd, &map, sizeof(map));
  127. if(n != sizeof(map))
  128. printk("map : /proc/mm map failed, err = %d\n", -n);
  129. }
  130. else {
  131. long res;
  132. unsigned long args[] = { virt, len, prot,
  133. MAP_SHARED | MAP_FIXED, phys_fd,
  134. MMAP_OFFSET(offset) };
  135. res = run_syscall_stub(mm_idp, STUB_MMAP_NR, args,
  136. &data, done);
  137. if((void *) res == MAP_FAILED)
  138. printk("mmap stub failed, errno = %d\n", res);
  139. }
  140. return data;
  141. }
  142. void *unmap(struct mm_id * mm_idp, void *addr, unsigned long len, int done,
  143. void *data)
  144. {
  145. int n;
  146. if(proc_mm){
  147. struct proc_mm_op unmap;
  148. int fd = mm_idp->u.mm_fd;
  149. unmap = ((struct proc_mm_op) { .op = MM_MUNMAP,
  150. .u =
  151. { .munmap =
  152. { .addr =
  153. (unsigned long) addr,
  154. .len = len } } } );
  155. n = os_write_file(fd, &unmap, sizeof(unmap));
  156. if(n != sizeof(unmap))
  157. printk("unmap - proc_mm write returned %d\n", n);
  158. }
  159. else {
  160. int res;
  161. unsigned long args[] = { (unsigned long) addr, len, 0, 0, 0,
  162. 0 };
  163. res = run_syscall_stub(mm_idp, __NR_munmap, args,
  164. &data, done);
  165. if(res < 0)
  166. printk("munmap stub failed, errno = %d\n", res);
  167. }
  168. return data;
  169. }
  170. void *protect(struct mm_id * mm_idp, unsigned long addr, unsigned long len,
  171. int r, int w, int x, int done, void *data)
  172. {
  173. struct proc_mm_op protect;
  174. int prot, n;
  175. prot = (r ? PROT_READ : 0) | (w ? PROT_WRITE : 0) |
  176. (x ? PROT_EXEC : 0);
  177. if(proc_mm){
  178. int fd = mm_idp->u.mm_fd;
  179. protect = ((struct proc_mm_op) { .op = MM_MPROTECT,
  180. .u =
  181. { .mprotect =
  182. { .addr =
  183. (unsigned long) addr,
  184. .len = len,
  185. .prot = prot } } } );
  186. n = os_write_file(fd, &protect, sizeof(protect));
  187. if(n != sizeof(protect))
  188. panic("protect failed, err = %d", -n);
  189. }
  190. else {
  191. int res;
  192. unsigned long args[] = { addr, len, prot, 0, 0, 0 };
  193. res = run_syscall_stub(mm_idp, __NR_mprotect, args,
  194. &data, done);
  195. if(res < 0)
  196. panic("mprotect stub failed, errno = %d\n", res);
  197. }
  198. return data;
  199. }
  200. void before_mem_skas(unsigned long unused)
  201. {
  202. }