1 /* $NetBSD: linux_ipc.c,v 1.42 2007/12/20 23:02:54 dsl Exp $ */ 2 3 /*- 4 * Copyright (c) 1995, 1998 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Frank van der Linden and Eric Haszlakiewicz. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the NetBSD 21 * Foundation, Inc. and its contributors. 22 * 4. Neither the name of The NetBSD Foundation nor the names of its 23 * contributors may be used to endorse or promote products derived 24 * from this software without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 36 * POSSIBILITY OF SUCH DAMAGE. 37 */ 38 39 #include <sys/cdefs.h> 40 __KERNEL_RCSID(0, "$NetBSD: linux_ipc.c,v 1.42 2007/12/20 23:02:54 dsl Exp $"); 41 42 #if defined(_KERNEL_OPT) 43 #include "opt_sysv.h" 44 #endif 45 46 #include <sys/param.h> 47 #include <sys/shm.h> 48 #include <sys/sem.h> 49 #include <sys/msg.h> 50 #include <sys/proc.h> 51 #include <sys/systm.h> 52 53 #include <sys/mount.h> 54 #include <sys/syscallargs.h> 55 56 #include <compat/linux/common/linux_types.h> 57 #include <compat/linux/common/linux_signal.h> 58 #include <compat/linux/common/linux_util.h> 59 #include <compat/linux/common/linux_ipc.h> 60 #include <compat/linux/common/linux_msg.h> 61 #include <compat/linux/common/linux_shm.h> 62 #include <compat/linux/common/linux_sem.h> 63 64 #include <compat/linux/linux_syscallargs.h> 65 #include <compat/linux/linux_syscall.h> 66 67 #include <compat/linux/common/linux_ipccall.h> 68 69 /* 70 * Note: Not all linux architechtures have explicit versions 71 * of the SYSV* syscalls. On the ones that don't 72 * we pretend that they are defined anyway. *_args and 73 * prototypes are defined in individual headers; 74 * syscalls.master lists those syscalls as NOARGS. 75 * 76 * The functions in multiarch are the ones that just need 77 * the arguments shuffled around and then use the 78 * normal NetBSD syscall. 79 * 80 * Function in multiarch: 81 * linux_sys_ipc : linux_ipccall.c 82 * liunx_semop : linux_ipccall.c 83 * linux_semget : linux_ipccall.c 84 * linux_msgsnd : linux_ipccall.c 85 * linux_msgrcv : linux_ipccall.c 86 * linux_msgget : linux_ipccall.c 87 * linux_shmdt : linux_ipccall.c 88 * linux_shmget : linux_ipccall.c 89 */ 90 91 #if defined (SYSVSEM) || defined(SYSVSHM) || defined(SYSVMSG) 92 /* 93 * Convert between Linux and NetBSD ipc_perm structures. Only the 94 * order of the fields is different. 95 */ 96 void 97 linux_to_bsd_ipc_perm(struct linux_ipc_perm *lpp, struct ipc_perm *bpp) 98 { 99 100 bpp->_key = lpp->l_key; 101 bpp->uid = lpp->l_uid; 102 bpp->gid = lpp->l_gid; 103 bpp->cuid = lpp->l_cuid; 104 bpp->cgid = lpp->l_cgid; 105 bpp->mode = lpp->l_mode; 106 bpp->_seq = lpp->l_seq; 107 } 108 109 void 110 linux_to_bsd_ipc64_perm(struct linux_ipc64_perm *lpp, struct ipc_perm *bpp) 111 { 112 bpp->_key = lpp->l_key; 113 bpp->uid = lpp->l_uid; 114 bpp->gid = lpp->l_gid; 115 bpp->cuid = lpp->l_cuid; 116 bpp->cgid = lpp->l_cgid; 117 bpp->mode = lpp->l_mode; 118 bpp->_seq = lpp->l_seq; 119 } 120 121 void 122 bsd_to_linux_ipc_perm(struct ipc_perm *bpp, struct linux_ipc_perm *lpp) 123 { 124 125 lpp->l_key = bpp->_key; 126 lpp->l_uid = bpp->uid; 127 lpp->l_gid = bpp->gid; 128 lpp->l_cuid = bpp->cuid; 129 lpp->l_cgid = bpp->cgid; 130 lpp->l_mode = bpp->mode; 131 lpp->l_seq = bpp->_seq; 132 } 133 134 void 135 bsd_to_linux_ipc64_perm(struct ipc_perm *bpp, struct linux_ipc64_perm *lpp) 136 { 137 lpp->l_key = bpp->_key; 138 lpp->l_uid = bpp->uid; 139 lpp->l_gid = bpp->gid; 140 lpp->l_cuid = bpp->cuid; 141 lpp->l_cgid = bpp->cgid; 142 lpp->l_mode = bpp->mode; 143 lpp->l_seq = bpp->_seq; 144 } 145 146 #endif 147 148 #ifdef SYSVSEM 149 /* 150 * Semaphore operations. Most constants and structures are the same on 151 * both systems. Only semctl() needs some extra work. 152 */ 153 154 /* 155 * Convert between Linux and NetBSD semid_ds structures. 156 */ 157 void 158 bsd_to_linux_semid_ds(struct semid_ds *bs, struct linux_semid_ds *ls) 159 { 160 161 bsd_to_linux_ipc_perm(&bs->sem_perm, &ls->l_sem_perm); 162 ls->l_sem_otime = bs->sem_otime; 163 ls->l_sem_ctime = bs->sem_ctime; 164 ls->l_sem_nsems = bs->sem_nsems; 165 ls->l_sem_base = bs->_sem_base; 166 } 167 168 void 169 linux_to_bsd_semid_ds(struct linux_semid_ds *ls, struct semid_ds *bs) 170 { 171 172 linux_to_bsd_ipc_perm(&ls->l_sem_perm, &bs->sem_perm); 173 bs->sem_otime = ls->l_sem_otime; 174 bs->sem_ctime = ls->l_sem_ctime; 175 bs->sem_nsems = ls->l_sem_nsems; 176 bs->_sem_base = ls->l_sem_base; 177 } 178 179 /* 180 * Most of this can be handled by directly passing the arguments on; we 181 * just need to frob the `cmd' and convert the semid_ds and semun. 182 */ 183 int 184 linux_sys_semctl(struct lwp *l, const struct linux_sys_semctl_args *uap, register_t *retval) 185 { 186 /* { 187 syscallarg(int) semid; 188 syscallarg(int) semnum; 189 syscallarg(int) cmd; 190 syscallarg(union linux_semun) arg; 191 } */ 192 struct semid_ds sembuf; 193 struct linux_semid_ds lsembuf; 194 union __semun semun; 195 int cmd, error; 196 void *pass_arg = NULL; 197 198 cmd = SCARG(uap, cmd); 199 200 switch (cmd) { 201 case LINUX_IPC_SET: 202 pass_arg = &sembuf; 203 cmd = IPC_SET; 204 break; 205 206 case LINUX_IPC_STAT: 207 pass_arg = &sembuf; 208 cmd = IPC_STAT; 209 break; 210 211 case LINUX_IPC_RMID: 212 cmd = IPC_RMID; 213 break; 214 215 case LINUX_GETVAL: 216 cmd = GETVAL; 217 break; 218 219 case LINUX_GETPID: 220 cmd = GETPID; 221 break; 222 223 case LINUX_GETNCNT: 224 cmd = GETNCNT; 225 break; 226 227 case LINUX_GETZCNT: 228 cmd = GETZCNT; 229 break; 230 231 case LINUX_GETALL: 232 pass_arg = &semun; 233 semun.array = SCARG(uap, arg).l_array; 234 cmd = GETALL; 235 break; 236 237 case LINUX_SETVAL: 238 pass_arg = &semun; 239 semun.val = SCARG(uap, arg).l_val; 240 cmd = SETVAL; 241 break; 242 243 case LINUX_SETALL: 244 pass_arg = &semun; 245 semun.array = SCARG(uap, arg).l_array; 246 cmd = SETALL; 247 break; 248 249 default: 250 return (EINVAL); 251 } 252 253 if (cmd == IPC_SET) { 254 error = copyin(SCARG(uap, arg).l_buf, &lsembuf, 255 sizeof(lsembuf)); 256 if (error) 257 return (error); 258 linux_to_bsd_semid_ds(&lsembuf, &sembuf); 259 } 260 261 error = semctl1(l, SCARG(uap, semid), SCARG(uap, semnum), cmd, 262 pass_arg, retval); 263 264 if (error == 0 && cmd == IPC_STAT) { 265 bsd_to_linux_semid_ds(&sembuf, &lsembuf); 266 error = copyout(&lsembuf, SCARG(uap, arg).l_buf, 267 sizeof(lsembuf)); 268 } 269 270 return (error); 271 } 272 #endif /* SYSVSEM */ 273 274 #ifdef SYSVMSG 275 276 void 277 linux_to_bsd_msqid_ds(struct linux_msqid_ds *lmp, struct msqid_ds *bmp) 278 { 279 280 linux_to_bsd_ipc_perm(&lmp->l_msg_perm, &bmp->msg_perm); 281 bmp->_msg_first = lmp->l_msg_first; 282 bmp->_msg_last = lmp->l_msg_last; 283 bmp->_msg_cbytes = lmp->l_msg_cbytes; 284 bmp->msg_qnum = lmp->l_msg_qnum; 285 bmp->msg_qbytes = lmp->l_msg_qbytes; 286 bmp->msg_lspid = lmp->l_msg_lspid; 287 bmp->msg_lrpid = lmp->l_msg_lrpid; 288 bmp->msg_stime = lmp->l_msg_stime; 289 bmp->msg_rtime = lmp->l_msg_rtime; 290 bmp->msg_ctime = lmp->l_msg_ctime; 291 } 292 293 void 294 bsd_to_linux_msqid_ds(struct msqid_ds *bmp, struct linux_msqid_ds *lmp) 295 { 296 297 bsd_to_linux_ipc_perm(&bmp->msg_perm, &lmp->l_msg_perm); 298 lmp->l_msg_first = bmp->_msg_first; 299 lmp->l_msg_last = bmp->_msg_last; 300 lmp->l_msg_cbytes = bmp->_msg_cbytes; 301 lmp->l_msg_qnum = bmp->msg_qnum; 302 lmp->l_msg_qbytes = bmp->msg_qbytes; 303 lmp->l_msg_lspid = bmp->msg_lspid; 304 lmp->l_msg_lrpid = bmp->msg_lrpid; 305 lmp->l_msg_stime = bmp->msg_stime; 306 lmp->l_msg_rtime = bmp->msg_rtime; 307 lmp->l_msg_ctime = bmp->msg_ctime; 308 } 309 310 int 311 linux_sys_msgctl(struct lwp *l, const struct linux_sys_msgctl_args *uap, register_t *retval) 312 { 313 /* { 314 syscallarg(int) msqid; 315 syscallarg(int) cmd; 316 syscallarg(struct linux_msqid_ds *) buf; 317 } */ 318 struct msqid_ds bm; 319 struct linux_msqid_ds lm; 320 int error; 321 322 switch (SCARG(uap, cmd)) { 323 case LINUX_IPC_STAT: 324 error = msgctl1(l, SCARG(uap, msqid), IPC_STAT, &bm); 325 if (error == 0) { 326 bsd_to_linux_msqid_ds(&bm, &lm); 327 error = copyout(&lm, SCARG(uap, buf), sizeof lm); 328 } 329 return error; 330 case LINUX_IPC_SET: 331 if ((error = copyin(SCARG(uap, buf), &lm, sizeof lm))) 332 return error; 333 linux_to_bsd_msqid_ds(&lm, &bm); 334 return msgctl1(l, SCARG(uap, msqid), IPC_SET, &bm); 335 case LINUX_IPC_RMID: 336 return msgctl1(l, SCARG(uap, msqid), IPC_RMID, NULL); 337 break; 338 default: 339 return EINVAL; 340 } 341 } 342 #endif /* SYSVMSG */ 343 344 #ifdef SYSVSHM 345 /* 346 * shmget(2). Just make sure the Linux-compatible shmat() semantics 347 * is enabled for the segment, so that shmat() succeeds even when 348 * the segment would be removed. 349 */ 350 int 351 linux_sys_shmget(struct lwp *l, const struct linux_sys_shmget_args *uap, register_t *retval) 352 { 353 /* { 354 syscallarg(key_t) key; 355 syscallarg(size_t) size; 356 syscallarg(int) shmflg; 357 } */ 358 struct sys_shmget_args bsd_ua; 359 360 SCARG(&bsd_ua, key) = SCARG(uap, key); 361 SCARG(&bsd_ua, size) = SCARG(uap, size); 362 SCARG(&bsd_ua, shmflg) = SCARG(uap, shmflg) | _SHM_RMLINGER; 363 364 return sys_shmget(l, &bsd_ua, retval); 365 } 366 367 /* 368 * shmat(2). Very straightforward, except that Linux passes a pointer 369 * in which the return value is to be passed. This is subsequently 370 * handled by libc, apparently. 371 */ 372 #ifndef __amd64__ 373 int 374 linux_sys_shmat(struct lwp *l, const struct linux_sys_shmat_args *uap, register_t *retval) 375 { 376 /* { 377 syscallarg(int) shmid; 378 syscallarg(void *) shmaddr; 379 syscallarg(int) shmflg; 380 syscallarg(u_long *) raddr; 381 } */ 382 int error; 383 384 if ((error = sys_shmat(l, (const void *)uap, retval))) 385 return error; 386 387 #ifndef __amd64__ 388 if ((error = copyout(&retval[0], SCARG(uap, raddr), sizeof retval[0]))) 389 return error; 390 391 retval[0] = 0; 392 #endif 393 return 0; 394 } 395 #endif /* __amd64__ */ 396 397 /* 398 * Convert between Linux and NetBSD shmid_ds structures. 399 * The order of the fields is once again the difference, and 400 * we also need a place to store the internal data pointer 401 * in, which is unfortunately stored in this structure. 402 * 403 * We abuse a Linux internal field for that. 404 */ 405 void 406 linux_to_bsd_shmid_ds(struct linux_shmid_ds *lsp, struct shmid_ds *bsp) 407 { 408 409 linux_to_bsd_ipc_perm(&lsp->l_shm_perm, &bsp->shm_perm); 410 bsp->shm_segsz = lsp->l_shm_segsz; 411 bsp->shm_lpid = lsp->l_shm_lpid; 412 bsp->shm_cpid = lsp->l_shm_cpid; 413 bsp->shm_nattch = lsp->l_shm_nattch; 414 bsp->shm_atime = lsp->l_shm_atime; 415 bsp->shm_dtime = lsp->l_shm_dtime; 416 bsp->shm_ctime = lsp->l_shm_ctime; 417 bsp->_shm_internal = lsp->l_private2; /* XXX Oh well. */ 418 } 419 420 void 421 linux_to_bsd_shmid64_ds(struct linux_shmid64_ds *lsp, struct shmid_ds *bsp) 422 { 423 424 linux_to_bsd_ipc64_perm(&lsp->l_shm_perm, &bsp->shm_perm); 425 bsp->shm_segsz = lsp->l_shm_segsz; 426 bsp->shm_lpid = lsp->l_shm_lpid; 427 bsp->shm_cpid = lsp->l_shm_cpid; 428 bsp->shm_nattch = lsp->l_shm_nattch; 429 bsp->shm_atime = lsp->l_shm_atime; 430 bsp->shm_dtime = lsp->l_shm_dtime; 431 bsp->shm_ctime = lsp->l_shm_ctime; 432 bsp->_shm_internal = (void*)lsp->l___unused5; /* XXX Oh well. */ 433 } 434 435 void 436 bsd_to_linux_shmid_ds(struct shmid_ds *bsp, struct linux_shmid_ds *lsp) 437 { 438 439 bsd_to_linux_ipc_perm(&bsp->shm_perm, &lsp->l_shm_perm); 440 lsp->l_shm_segsz = bsp->shm_segsz; 441 lsp->l_shm_lpid = bsp->shm_lpid; 442 lsp->l_shm_cpid = bsp->shm_cpid; 443 lsp->l_shm_nattch = bsp->shm_nattch; 444 lsp->l_shm_atime = bsp->shm_atime; 445 lsp->l_shm_dtime = bsp->shm_dtime; 446 lsp->l_shm_ctime = bsp->shm_ctime; 447 lsp->l_private2 = bsp->_shm_internal; /* XXX */ 448 } 449 450 void 451 bsd_to_linux_shmid64_ds(struct shmid_ds *bsp, struct linux_shmid64_ds *lsp) 452 { 453 bsd_to_linux_ipc64_perm(&bsp->shm_perm, &lsp->l_shm_perm); 454 lsp->l_shm_segsz = bsp->shm_segsz; 455 lsp->l_shm_lpid = bsp->shm_lpid; 456 lsp->l_shm_cpid = bsp->shm_cpid; 457 lsp->l_shm_nattch = bsp->shm_nattch; 458 lsp->l_shm_atime = bsp->shm_atime; 459 lsp->l_shm_dtime = bsp->shm_dtime; 460 lsp->l_shm_ctime = bsp->shm_ctime; 461 lsp->l___unused5 = (u_long)bsp->_shm_internal; /* XXX */ 462 } 463 464 /* 465 * shmctl.SHM_LOCK and SHM_UNLOCK are passed on, but currently not implemented 466 * by NetBSD itself. 467 * 468 * The usual structure conversion and massaging is done. 469 */ 470 int 471 linux_sys_shmctl(struct lwp *l, const struct linux_sys_shmctl_args *uap, register_t *retval) 472 { 473 /* { 474 syscallarg(int) shmid; 475 syscallarg(int) cmd; 476 syscallarg(struct linux_shmid_ds *) buf; 477 } */ 478 struct shmid_ds bs; 479 struct linux_shmid_ds ls; 480 struct linux_shmid64_ds ls64; 481 struct linux_shminfo64 lsi64; 482 struct linux_shm_info lsi; 483 int error, i, cmd; 484 485 cmd = SCARG(uap, cmd); 486 switch (cmd) { 487 case LINUX_IPC_STAT: 488 case LINUX_SHM_STAT: 489 error = shmctl1(l, SCARG(uap, shmid), IPC_STAT, &bs); 490 if (error != 0) 491 return error; 492 bsd_to_linux_shmid_ds(&bs, &ls); 493 if (cmd == LINUX_SHM_STAT) 494 retval[0] = IXSEQ_TO_IPCID(bs.shm_perm._key, 495 bs.shm_perm); 496 return copyout(&ls, SCARG(uap, buf), sizeof ls); 497 498 case LINUX_IPC_STAT | LINUX_IPC_64: 499 case LINUX_SHM_STAT | LINUX_IPC_64: 500 error = shmctl1(l, SCARG(uap, shmid), IPC_STAT, &bs); 501 if (error != 0) 502 return error; 503 bsd_to_linux_shmid64_ds(&bs, &ls64); 504 if (cmd == (LINUX_SHM_STAT | LINUX_IPC_64)) { 505 retval[0] = IXSEQ_TO_IPCID(bs.shm_perm._key, 506 bs.shm_perm); 507 } 508 return copyout(&ls64, SCARG(uap, buf), sizeof ls64); 509 510 case LINUX_IPC_SET: 511 if ((error = copyin(SCARG(uap, buf), &ls, sizeof ls))) 512 return error; 513 linux_to_bsd_shmid_ds(&ls, &bs); 514 return shmctl1(l, SCARG(uap, shmid), IPC_SET, &bs); 515 516 case LINUX_IPC_RMID: 517 return shmctl1(l, SCARG(uap, shmid), IPC_RMID, NULL); 518 519 case LINUX_SHM_LOCK: 520 return shmctl1(l, SCARG(uap, shmid), SHM_LOCK, NULL); 521 522 case LINUX_SHM_UNLOCK: 523 return shmctl1(l, SCARG(uap, shmid), SHM_UNLOCK, NULL); 524 525 case LINUX_IPC_INFO: 526 memset(&lsi64, 0, sizeof lsi64); 527 lsi64.l_shmmax = shminfo.shmmax; 528 lsi64.l_shmmin = shminfo.shmmin; 529 lsi64.l_shmmni = shminfo.shmmni; 530 lsi64.l_shmseg = shminfo.shmseg; 531 lsi64.l_shmall = shminfo.shmall; 532 return copyout(&lsi64, SCARG(uap, buf), sizeof lsi64); 533 534 case LINUX_SHM_INFO: 535 (void)memset(&lsi, 0, sizeof lsi); 536 lsi.l_used_ids = shm_nused; 537 for (i = 0; i < shminfo.shmmni; i++) 538 if (shmsegs[i].shm_perm.mode & SHMSEG_ALLOCATED) 539 lsi.l_shm_tot += shmsegs[i].shm_segsz; 540 lsi.l_shm_rss = 0; 541 lsi.l_shm_swp = 0; 542 lsi.l_swap_attempts = 0; 543 lsi.l_swap_successes = 0; 544 return copyout(&lsi, SCARG(uap, buf), sizeof lsi); 545 546 default: 547 #ifdef DEBUG 548 printf("linux_sys_shmctl cmd %d\n", SCARG(uap, cmd)); 549 #endif 550 return EINVAL; 551 } 552 } 553 #endif /* SYSVSHM */ 554