1 /*- 2 * Copyright (c) 2000 Marcel Moolenaar 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer 10 * in this position and unchanged. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 3. The name of the author may not be used to endorse or promote products 15 * derived from this software without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27 */ 28 29 #include <sys/cdefs.h> 30 __FBSDID("$FreeBSD$"); 31 32 #include <sys/param.h> 33 #include <sys/systm.h> 34 #include <sys/capsicum.h> 35 #include <sys/file.h> 36 #include <sys/fcntl.h> 37 #include <sys/imgact.h> 38 #include <sys/lock.h> 39 #include <sys/malloc.h> 40 #include <sys/mman.h> 41 #include <sys/mutex.h> 42 #include <sys/sx.h> 43 #include <sys/priv.h> 44 #include <sys/proc.h> 45 #include <sys/queue.h> 46 #include <sys/resource.h> 47 #include <sys/resourcevar.h> 48 #include <sys/signalvar.h> 49 #include <sys/syscallsubr.h> 50 #include <sys/sysproto.h> 51 #include <sys/unistd.h> 52 #include <sys/wait.h> 53 #include <sys/sched.h> 54 55 #include <machine/frame.h> 56 #include <machine/psl.h> 57 #include <machine/segments.h> 58 #include <machine/sysarch.h> 59 60 #include <vm/vm.h> 61 #include <vm/pmap.h> 62 #include <vm/vm_map.h> 63 64 #include <i386/linux/linux.h> 65 #include <i386/linux/linux_proto.h> 66 #include <compat/linux/linux_ipc.h> 67 #include <compat/linux/linux_misc.h> 68 #include <compat/linux/linux_mmap.h> 69 #include <compat/linux/linux_signal.h> 70 #include <compat/linux/linux_util.h> 71 #include <compat/linux/linux_emul.h> 72 73 #include <i386/include/pcb.h> /* needed for pcb definition in linux_set_thread_area */ 74 75 #include "opt_posix.h" 76 77 extern struct sysentvec elf32_freebsd_sysvec; /* defined in i386/i386/elf_machdep.c */ 78 79 struct l_descriptor { 80 l_uint entry_number; 81 l_ulong base_addr; 82 l_uint limit; 83 l_uint seg_32bit:1; 84 l_uint contents:2; 85 l_uint read_exec_only:1; 86 l_uint limit_in_pages:1; 87 l_uint seg_not_present:1; 88 l_uint useable:1; 89 }; 90 91 struct l_old_select_argv { 92 l_int nfds; 93 l_fd_set *readfds; 94 l_fd_set *writefds; 95 l_fd_set *exceptfds; 96 struct l_timeval *timeout; 97 }; 98 99 100 int 101 linux_execve(struct thread *td, struct linux_execve_args *args) 102 { 103 struct image_args eargs; 104 char *newpath; 105 int error; 106 107 LCONVPATHEXIST(td, args->path, &newpath); 108 109 #ifdef DEBUG 110 if (ldebug(execve)) 111 printf(ARGS(execve, "%s"), newpath); 112 #endif 113 114 error = exec_copyin_args(&eargs, newpath, UIO_SYSSPACE, 115 args->argp, args->envp); 116 free(newpath, M_TEMP); 117 if (error == 0) 118 error = linux_common_execve(td, &eargs); 119 return (error); 120 } 121 122 struct l_ipc_kludge { 123 struct l_msgbuf *msgp; 124 l_long msgtyp; 125 }; 126 127 int 128 linux_ipc(struct thread *td, struct linux_ipc_args *args) 129 { 130 131 switch (args->what & 0xFFFF) { 132 case LINUX_SEMOP: { 133 struct linux_semop_args a; 134 135 a.semid = args->arg1; 136 a.tsops = args->ptr; 137 a.nsops = args->arg2; 138 return (linux_semop(td, &a)); 139 } 140 case LINUX_SEMGET: { 141 struct linux_semget_args a; 142 143 a.key = args->arg1; 144 a.nsems = args->arg2; 145 a.semflg = args->arg3; 146 return (linux_semget(td, &a)); 147 } 148 case LINUX_SEMCTL: { 149 struct linux_semctl_args a; 150 int error; 151 152 a.semid = args->arg1; 153 a.semnum = args->arg2; 154 a.cmd = args->arg3; 155 error = copyin(args->ptr, &a.arg, sizeof(a.arg)); 156 if (error) 157 return (error); 158 return (linux_semctl(td, &a)); 159 } 160 case LINUX_MSGSND: { 161 struct linux_msgsnd_args a; 162 163 a.msqid = args->arg1; 164 a.msgp = args->ptr; 165 a.msgsz = args->arg2; 166 a.msgflg = args->arg3; 167 return (linux_msgsnd(td, &a)); 168 } 169 case LINUX_MSGRCV: { 170 struct linux_msgrcv_args a; 171 172 a.msqid = args->arg1; 173 a.msgsz = args->arg2; 174 a.msgflg = args->arg3; 175 if ((args->what >> 16) == 0) { 176 struct l_ipc_kludge tmp; 177 int error; 178 179 if (args->ptr == NULL) 180 return (EINVAL); 181 error = copyin(args->ptr, &tmp, sizeof(tmp)); 182 if (error) 183 return (error); 184 a.msgp = tmp.msgp; 185 a.msgtyp = tmp.msgtyp; 186 } else { 187 a.msgp = args->ptr; 188 a.msgtyp = args->arg5; 189 } 190 return (linux_msgrcv(td, &a)); 191 } 192 case LINUX_MSGGET: { 193 struct linux_msgget_args a; 194 195 a.key = args->arg1; 196 a.msgflg = args->arg2; 197 return (linux_msgget(td, &a)); 198 } 199 case LINUX_MSGCTL: { 200 struct linux_msgctl_args a; 201 202 a.msqid = args->arg1; 203 a.cmd = args->arg2; 204 a.buf = args->ptr; 205 return (linux_msgctl(td, &a)); 206 } 207 case LINUX_SHMAT: { 208 struct linux_shmat_args a; 209 210 a.shmid = args->arg1; 211 a.shmaddr = args->ptr; 212 a.shmflg = args->arg2; 213 a.raddr = (l_ulong *)args->arg3; 214 return (linux_shmat(td, &a)); 215 } 216 case LINUX_SHMDT: { 217 struct linux_shmdt_args a; 218 219 a.shmaddr = args->ptr; 220 return (linux_shmdt(td, &a)); 221 } 222 case LINUX_SHMGET: { 223 struct linux_shmget_args a; 224 225 a.key = args->arg1; 226 a.size = args->arg2; 227 a.shmflg = args->arg3; 228 return (linux_shmget(td, &a)); 229 } 230 case LINUX_SHMCTL: { 231 struct linux_shmctl_args a; 232 233 a.shmid = args->arg1; 234 a.cmd = args->arg2; 235 a.buf = args->ptr; 236 return (linux_shmctl(td, &a)); 237 } 238 default: 239 break; 240 } 241 242 return (EINVAL); 243 } 244 245 int 246 linux_old_select(struct thread *td, struct linux_old_select_args *args) 247 { 248 struct l_old_select_argv linux_args; 249 struct linux_select_args newsel; 250 int error; 251 252 #ifdef DEBUG 253 if (ldebug(old_select)) 254 printf(ARGS(old_select, "%p"), args->ptr); 255 #endif 256 257 error = copyin(args->ptr, &linux_args, sizeof(linux_args)); 258 if (error) 259 return (error); 260 261 newsel.nfds = linux_args.nfds; 262 newsel.readfds = linux_args.readfds; 263 newsel.writefds = linux_args.writefds; 264 newsel.exceptfds = linux_args.exceptfds; 265 newsel.timeout = linux_args.timeout; 266 return (linux_select(td, &newsel)); 267 } 268 269 int 270 linux_set_cloned_tls(struct thread *td, void *desc) 271 { 272 struct segment_descriptor sd; 273 struct l_user_desc info; 274 int idx, error; 275 int a[2]; 276 277 error = copyin(desc, &info, sizeof(struct l_user_desc)); 278 if (error) { 279 printf(LMSG("copyin failed!")); 280 } else { 281 idx = info.entry_number; 282 283 /* 284 * looks like we're getting the idx we returned 285 * in the set_thread_area() syscall 286 */ 287 if (idx != 6 && idx != 3) { 288 printf(LMSG("resetting idx!")); 289 idx = 3; 290 } 291 292 /* this doesnt happen in practice */ 293 if (idx == 6) { 294 /* we might copy out the entry_number as 3 */ 295 info.entry_number = 3; 296 error = copyout(&info, desc, sizeof(struct l_user_desc)); 297 if (error) 298 printf(LMSG("copyout failed!")); 299 } 300 301 a[0] = LINUX_LDT_entry_a(&info); 302 a[1] = LINUX_LDT_entry_b(&info); 303 304 memcpy(&sd, &a, sizeof(a)); 305 #ifdef DEBUG 306 if (ldebug(clone)) 307 printf("Segment created in clone with " 308 "CLONE_SETTLS: lobase: %x, hibase: %x, " 309 "lolimit: %x, hilimit: %x, type: %i, " 310 "dpl: %i, p: %i, xx: %i, def32: %i, " 311 "gran: %i\n", sd.sd_lobase, sd.sd_hibase, 312 sd.sd_lolimit, sd.sd_hilimit, sd.sd_type, 313 sd.sd_dpl, sd.sd_p, sd.sd_xx, 314 sd.sd_def32, sd.sd_gran); 315 #endif 316 317 /* set %gs */ 318 td->td_pcb->pcb_gsd = sd; 319 td->td_pcb->pcb_gs = GSEL(GUGS_SEL, SEL_UPL); 320 } 321 322 return (error); 323 } 324 325 int 326 linux_set_upcall_kse(struct thread *td, register_t stack) 327 { 328 329 if (stack) 330 td->td_frame->tf_esp = stack; 331 332 /* 333 * The newly created Linux thread returns 334 * to the user space by the same path that a parent do. 335 */ 336 td->td_frame->tf_eax = 0; 337 return (0); 338 } 339 340 int 341 linux_mmap2(struct thread *td, struct linux_mmap2_args *args) 342 { 343 344 #ifdef DEBUG 345 if (ldebug(mmap2)) 346 printf(ARGS(mmap2, "%p, %d, %d, 0x%08x, %d, %d"), 347 (void *)args->addr, args->len, args->prot, 348 args->flags, args->fd, args->pgoff); 349 #endif 350 351 return (linux_mmap_common(td, args->addr, args->len, args->prot, 352 args->flags, args->fd, (uint64_t)(uint32_t)args->pgoff * 353 PAGE_SIZE)); 354 } 355 356 int 357 linux_mmap(struct thread *td, struct linux_mmap_args *args) 358 { 359 int error; 360 struct l_mmap_argv linux_args; 361 362 error = copyin(args->ptr, &linux_args, sizeof(linux_args)); 363 if (error) 364 return (error); 365 366 #ifdef DEBUG 367 if (ldebug(mmap)) 368 printf(ARGS(mmap, "%p, %d, %d, 0x%08x, %d, %d"), 369 (void *)linux_args.addr, linux_args.len, linux_args.prot, 370 linux_args.flags, linux_args.fd, linux_args.pgoff); 371 #endif 372 373 return (linux_mmap_common(td, linux_args.addr, linux_args.len, 374 linux_args.prot, linux_args.flags, linux_args.fd, 375 (uint32_t)linux_args.pgoff)); 376 } 377 378 int 379 linux_mprotect(struct thread *td, struct linux_mprotect_args *uap) 380 { 381 382 return (linux_mprotect_common(td, PTROUT(uap->addr), uap->len, uap->prot)); 383 } 384 385 int 386 linux_ioperm(struct thread *td, struct linux_ioperm_args *args) 387 { 388 int error; 389 struct i386_ioperm_args iia; 390 391 iia.start = args->start; 392 iia.length = args->length; 393 iia.enable = args->enable; 394 error = i386_set_ioperm(td, &iia); 395 return (error); 396 } 397 398 int 399 linux_iopl(struct thread *td, struct linux_iopl_args *args) 400 { 401 int error; 402 403 if (args->level < 0 || args->level > 3) 404 return (EINVAL); 405 if ((error = priv_check(td, PRIV_IO)) != 0) 406 return (error); 407 if ((error = securelevel_gt(td->td_ucred, 0)) != 0) 408 return (error); 409 td->td_frame->tf_eflags = (td->td_frame->tf_eflags & ~PSL_IOPL) | 410 (args->level * (PSL_IOPL / 3)); 411 return (0); 412 } 413 414 int 415 linux_modify_ldt(struct thread *td, struct linux_modify_ldt_args *uap) 416 { 417 int error; 418 struct i386_ldt_args ldt; 419 struct l_descriptor ld; 420 union descriptor desc; 421 int size, written; 422 423 switch (uap->func) { 424 case 0x00: /* read_ldt */ 425 ldt.start = 0; 426 ldt.descs = uap->ptr; 427 ldt.num = uap->bytecount / sizeof(union descriptor); 428 error = i386_get_ldt(td, &ldt); 429 td->td_retval[0] *= sizeof(union descriptor); 430 break; 431 case 0x02: /* read_default_ldt = 0 */ 432 size = 5*sizeof(struct l_desc_struct); 433 if (size > uap->bytecount) 434 size = uap->bytecount; 435 for (written = error = 0; written < size && error == 0; written++) 436 error = subyte((char *)uap->ptr + written, 0); 437 td->td_retval[0] = written; 438 break; 439 case 0x01: /* write_ldt */ 440 case 0x11: /* write_ldt */ 441 if (uap->bytecount != sizeof(ld)) 442 return (EINVAL); 443 444 error = copyin(uap->ptr, &ld, sizeof(ld)); 445 if (error) 446 return (error); 447 448 ldt.start = ld.entry_number; 449 ldt.descs = &desc; 450 ldt.num = 1; 451 desc.sd.sd_lolimit = (ld.limit & 0x0000ffff); 452 desc.sd.sd_hilimit = (ld.limit & 0x000f0000) >> 16; 453 desc.sd.sd_lobase = (ld.base_addr & 0x00ffffff); 454 desc.sd.sd_hibase = (ld.base_addr & 0xff000000) >> 24; 455 desc.sd.sd_type = SDT_MEMRO | ((ld.read_exec_only ^ 1) << 1) | 456 (ld.contents << 2); 457 desc.sd.sd_dpl = 3; 458 desc.sd.sd_p = (ld.seg_not_present ^ 1); 459 desc.sd.sd_xx = 0; 460 desc.sd.sd_def32 = ld.seg_32bit; 461 desc.sd.sd_gran = ld.limit_in_pages; 462 error = i386_set_ldt(td, &ldt, &desc); 463 break; 464 default: 465 error = ENOSYS; 466 break; 467 } 468 469 if (error == EOPNOTSUPP) { 470 printf("linux: modify_ldt needs kernel option USER_LDT\n"); 471 error = ENOSYS; 472 } 473 474 return (error); 475 } 476 477 int 478 linux_sigaction(struct thread *td, struct linux_sigaction_args *args) 479 { 480 l_osigaction_t osa; 481 l_sigaction_t act, oact; 482 int error; 483 484 #ifdef DEBUG 485 if (ldebug(sigaction)) 486 printf(ARGS(sigaction, "%d, %p, %p"), 487 args->sig, (void *)args->nsa, (void *)args->osa); 488 #endif 489 490 if (args->nsa != NULL) { 491 error = copyin(args->nsa, &osa, sizeof(l_osigaction_t)); 492 if (error) 493 return (error); 494 act.lsa_handler = osa.lsa_handler; 495 act.lsa_flags = osa.lsa_flags; 496 act.lsa_restorer = osa.lsa_restorer; 497 LINUX_SIGEMPTYSET(act.lsa_mask); 498 act.lsa_mask.__mask = osa.lsa_mask; 499 } 500 501 error = linux_do_sigaction(td, args->sig, args->nsa ? &act : NULL, 502 args->osa ? &oact : NULL); 503 504 if (args->osa != NULL && !error) { 505 osa.lsa_handler = oact.lsa_handler; 506 osa.lsa_flags = oact.lsa_flags; 507 osa.lsa_restorer = oact.lsa_restorer; 508 osa.lsa_mask = oact.lsa_mask.__mask; 509 error = copyout(&osa, args->osa, sizeof(l_osigaction_t)); 510 } 511 512 return (error); 513 } 514 515 /* 516 * Linux has two extra args, restart and oldmask. We dont use these, 517 * but it seems that "restart" is actually a context pointer that 518 * enables the signal to happen with a different register set. 519 */ 520 int 521 linux_sigsuspend(struct thread *td, struct linux_sigsuspend_args *args) 522 { 523 sigset_t sigmask; 524 l_sigset_t mask; 525 526 #ifdef DEBUG 527 if (ldebug(sigsuspend)) 528 printf(ARGS(sigsuspend, "%08lx"), (unsigned long)args->mask); 529 #endif 530 531 LINUX_SIGEMPTYSET(mask); 532 mask.__mask = args->mask; 533 linux_to_bsd_sigset(&mask, &sigmask); 534 return (kern_sigsuspend(td, sigmask)); 535 } 536 537 int 538 linux_rt_sigsuspend(struct thread *td, struct linux_rt_sigsuspend_args *uap) 539 { 540 l_sigset_t lmask; 541 sigset_t sigmask; 542 int error; 543 544 #ifdef DEBUG 545 if (ldebug(rt_sigsuspend)) 546 printf(ARGS(rt_sigsuspend, "%p, %d"), 547 (void *)uap->newset, uap->sigsetsize); 548 #endif 549 550 if (uap->sigsetsize != sizeof(l_sigset_t)) 551 return (EINVAL); 552 553 error = copyin(uap->newset, &lmask, sizeof(l_sigset_t)); 554 if (error) 555 return (error); 556 557 linux_to_bsd_sigset(&lmask, &sigmask); 558 return (kern_sigsuspend(td, sigmask)); 559 } 560 561 int 562 linux_pause(struct thread *td, struct linux_pause_args *args) 563 { 564 struct proc *p = td->td_proc; 565 sigset_t sigmask; 566 567 #ifdef DEBUG 568 if (ldebug(pause)) 569 printf(ARGS(pause, "")); 570 #endif 571 572 PROC_LOCK(p); 573 sigmask = td->td_sigmask; 574 PROC_UNLOCK(p); 575 return (kern_sigsuspend(td, sigmask)); 576 } 577 578 int 579 linux_sigaltstack(struct thread *td, struct linux_sigaltstack_args *uap) 580 { 581 stack_t ss, oss; 582 l_stack_t lss; 583 int error; 584 585 #ifdef DEBUG 586 if (ldebug(sigaltstack)) 587 printf(ARGS(sigaltstack, "%p, %p"), uap->uss, uap->uoss); 588 #endif 589 590 if (uap->uss != NULL) { 591 error = copyin(uap->uss, &lss, sizeof(l_stack_t)); 592 if (error) 593 return (error); 594 595 ss.ss_sp = lss.ss_sp; 596 ss.ss_size = lss.ss_size; 597 ss.ss_flags = linux_to_bsd_sigaltstack(lss.ss_flags); 598 } 599 error = kern_sigaltstack(td, (uap->uss != NULL) ? &ss : NULL, 600 (uap->uoss != NULL) ? &oss : NULL); 601 if (!error && uap->uoss != NULL) { 602 lss.ss_sp = oss.ss_sp; 603 lss.ss_size = oss.ss_size; 604 lss.ss_flags = bsd_to_linux_sigaltstack(oss.ss_flags); 605 error = copyout(&lss, uap->uoss, sizeof(l_stack_t)); 606 } 607 608 return (error); 609 } 610 611 int 612 linux_ftruncate64(struct thread *td, struct linux_ftruncate64_args *args) 613 { 614 615 #ifdef DEBUG 616 if (ldebug(ftruncate64)) 617 printf(ARGS(ftruncate64, "%u, %jd"), args->fd, 618 (intmax_t)args->length); 619 #endif 620 621 return (kern_ftruncate(td, args->fd, args->length)); 622 } 623 624 int 625 linux_set_thread_area(struct thread *td, struct linux_set_thread_area_args *args) 626 { 627 struct l_user_desc info; 628 int error; 629 int idx; 630 int a[2]; 631 struct segment_descriptor sd; 632 633 error = copyin(args->desc, &info, sizeof(struct l_user_desc)); 634 if (error) 635 return (error); 636 637 #ifdef DEBUG 638 if (ldebug(set_thread_area)) 639 printf(ARGS(set_thread_area, "%i, %x, %x, %i, %i, %i, %i, %i, %i\n"), 640 info.entry_number, 641 info.base_addr, 642 info.limit, 643 info.seg_32bit, 644 info.contents, 645 info.read_exec_only, 646 info.limit_in_pages, 647 info.seg_not_present, 648 info.useable); 649 #endif 650 651 idx = info.entry_number; 652 /* 653 * Semantics of linux version: every thread in the system has array of 654 * 3 tls descriptors. 1st is GLIBC TLS, 2nd is WINE, 3rd unknown. This 655 * syscall loads one of the selected tls decriptors with a value and 656 * also loads GDT descriptors 6, 7 and 8 with the content of the 657 * per-thread descriptors. 658 * 659 * Semantics of fbsd version: I think we can ignore that linux has 3 660 * per-thread descriptors and use just the 1st one. The tls_array[] 661 * is used only in set/get-thread_area() syscalls and for loading the 662 * GDT descriptors. In fbsd we use just one GDT descriptor for TLS so 663 * we will load just one. 664 * 665 * XXX: this doesn't work when a user space process tries to use more 666 * than 1 TLS segment. Comment in the linux sources says wine might do 667 * this. 668 */ 669 670 /* 671 * we support just GLIBC TLS now 672 * we should let 3 proceed as well because we use this segment so 673 * if code does two subsequent calls it should succeed 674 */ 675 if (idx != 6 && idx != -1 && idx != 3) 676 return (EINVAL); 677 678 /* 679 * we have to copy out the GDT entry we use 680 * FreeBSD uses GDT entry #3 for storing %gs so load that 681 * 682 * XXX: what if a user space program doesn't check this value and tries 683 * to use 6, 7 or 8? 684 */ 685 idx = info.entry_number = 3; 686 error = copyout(&info, args->desc, sizeof(struct l_user_desc)); 687 if (error) 688 return (error); 689 690 if (LINUX_LDT_empty(&info)) { 691 a[0] = 0; 692 a[1] = 0; 693 } else { 694 a[0] = LINUX_LDT_entry_a(&info); 695 a[1] = LINUX_LDT_entry_b(&info); 696 } 697 698 memcpy(&sd, &a, sizeof(a)); 699 #ifdef DEBUG 700 if (ldebug(set_thread_area)) 701 printf("Segment created in set_thread_area: lobase: %x, hibase: %x, lolimit: %x, hilimit: %x, type: %i, dpl: %i, p: %i, xx: %i, def32: %i, gran: %i\n", sd.sd_lobase, 702 sd.sd_hibase, 703 sd.sd_lolimit, 704 sd.sd_hilimit, 705 sd.sd_type, 706 sd.sd_dpl, 707 sd.sd_p, 708 sd.sd_xx, 709 sd.sd_def32, 710 sd.sd_gran); 711 #endif 712 713 /* this is taken from i386 version of cpu_set_user_tls() */ 714 critical_enter(); 715 /* set %gs */ 716 td->td_pcb->pcb_gsd = sd; 717 PCPU_GET(fsgs_gdt)[1] = sd; 718 load_gs(GSEL(GUGS_SEL, SEL_UPL)); 719 critical_exit(); 720 721 return (0); 722 } 723 724 int 725 linux_get_thread_area(struct thread *td, struct linux_get_thread_area_args *args) 726 { 727 728 struct l_user_desc info; 729 int error; 730 int idx; 731 struct l_desc_struct desc; 732 struct segment_descriptor sd; 733 734 #ifdef DEBUG 735 if (ldebug(get_thread_area)) 736 printf(ARGS(get_thread_area, "%p"), args->desc); 737 #endif 738 739 error = copyin(args->desc, &info, sizeof(struct l_user_desc)); 740 if (error) 741 return (error); 742 743 idx = info.entry_number; 744 /* XXX: I am not sure if we want 3 to be allowed too. */ 745 if (idx != 6 && idx != 3) 746 return (EINVAL); 747 748 idx = 3; 749 750 memset(&info, 0, sizeof(info)); 751 752 sd = PCPU_GET(fsgs_gdt)[1]; 753 754 memcpy(&desc, &sd, sizeof(desc)); 755 756 info.entry_number = idx; 757 info.base_addr = LINUX_GET_BASE(&desc); 758 info.limit = LINUX_GET_LIMIT(&desc); 759 info.seg_32bit = LINUX_GET_32BIT(&desc); 760 info.contents = LINUX_GET_CONTENTS(&desc); 761 info.read_exec_only = !LINUX_GET_WRITABLE(&desc); 762 info.limit_in_pages = LINUX_GET_LIMIT_PAGES(&desc); 763 info.seg_not_present = !LINUX_GET_PRESENT(&desc); 764 info.useable = LINUX_GET_USEABLE(&desc); 765 766 error = copyout(&info, args->desc, sizeof(struct l_user_desc)); 767 if (error) 768 return (EFAULT); 769 770 return (0); 771 } 772 773 /* XXX: this wont work with module - convert it */ 774 int 775 linux_mq_open(struct thread *td, struct linux_mq_open_args *args) 776 { 777 #ifdef P1003_1B_MQUEUE 778 return sys_kmq_open(td, (struct kmq_open_args *) args); 779 #else 780 return (ENOSYS); 781 #endif 782 } 783 784 int 785 linux_mq_unlink(struct thread *td, struct linux_mq_unlink_args *args) 786 { 787 #ifdef P1003_1B_MQUEUE 788 return sys_kmq_unlink(td, (struct kmq_unlink_args *) args); 789 #else 790 return (ENOSYS); 791 #endif 792 } 793 794 int 795 linux_mq_timedsend(struct thread *td, struct linux_mq_timedsend_args *args) 796 { 797 #ifdef P1003_1B_MQUEUE 798 return sys_kmq_timedsend(td, (struct kmq_timedsend_args *) args); 799 #else 800 return (ENOSYS); 801 #endif 802 } 803 804 int 805 linux_mq_timedreceive(struct thread *td, struct linux_mq_timedreceive_args *args) 806 { 807 #ifdef P1003_1B_MQUEUE 808 return sys_kmq_timedreceive(td, (struct kmq_timedreceive_args *) args); 809 #else 810 return (ENOSYS); 811 #endif 812 } 813 814 int 815 linux_mq_notify(struct thread *td, struct linux_mq_notify_args *args) 816 { 817 #ifdef P1003_1B_MQUEUE 818 return sys_kmq_notify(td, (struct kmq_notify_args *) args); 819 #else 820 return (ENOSYS); 821 #endif 822 } 823 824 int 825 linux_mq_getsetattr(struct thread *td, struct linux_mq_getsetattr_args *args) 826 { 827 #ifdef P1003_1B_MQUEUE 828 return sys_kmq_setattr(td, (struct kmq_setattr_args *) args); 829 #else 830 return (ENOSYS); 831 #endif 832 } 833