5ba396cfb3
This does not buy us new functionnality for now, because we still have to discover how mach_init (which acts as a name server, enabling processes to discover each other's ports) is able to receive messages from other processes (this is a bootstrap problem, and the bootstrap port might be the place to search). While we are there: - removed a lot of debug which is now available using ktrace. - reworked message handling to avoid mutliple copyin/copyout of the same data. ktrace of Mach message now uses the in-kernel copy of the message instead of copying it from userland. - packed mach trap handlers arguments into a structure to avoid modifying everything next time we have to add an argument.
461 lines
13 KiB
C
461 lines
13 KiB
C
/* $NetBSD: mach_vm.c,v 1.21 2002/12/17 18:42:57 manu Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 2002 The NetBSD Foundation, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
* by Emmanuel Dreyfus
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the NetBSD
|
|
* Foundation, Inc. and its contributors.
|
|
* 4. Neither the name of The NetBSD Foundation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__KERNEL_RCSID(0, "$NetBSD: mach_vm.c,v 1.21 2002/12/17 18:42:57 manu Exp $");
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/vnode.h>
|
|
#include <sys/file.h>
|
|
#include <sys/filedesc.h>
|
|
#include <sys/exec.h>
|
|
#include <sys/syscallargs.h>
|
|
|
|
#include <uvm/uvm_prot.h>
|
|
#include <uvm/uvm_map.h>
|
|
|
|
/* Too much debug output from here, but we might need it later... */
|
|
#undef DEBUG_MACH
|
|
|
|
#include <compat/mach/mach_types.h>
|
|
#include <compat/mach/mach_message.h>
|
|
#include <compat/mach/mach_clock.h>
|
|
#include <compat/mach/mach_vm.h>
|
|
#include <compat/mach/mach_errno.h>
|
|
#include <compat/mach/mach_syscallargs.h>
|
|
|
|
int
|
|
mach_vm_map(args)
|
|
struct mach_trap_args *args;
|
|
{
|
|
mach_vm_map_request_t *req = args->smsg;
|
|
mach_vm_map_reply_t *rep = args->rmsg;
|
|
size_t *msglen = args->rsize;
|
|
struct proc *p = args->p;
|
|
struct sys_mmap_args cup;
|
|
vaddr_t addr;
|
|
int error, flags;
|
|
void *ret;
|
|
|
|
DPRINTF(("mach_vm_map(addr = %p, size = 0x%08x, obj = 0x%x, "
|
|
"mask = 0x%08x, flags = 0x%x, offset = 0x%08llx, "
|
|
"copy = %d, cur_prot = 0x%x, max_prot = 0x%x, inh = 0x%x);\n",
|
|
(void *)req->req_address, req->req_size, req->req_object.name,
|
|
req->req_mask, req->req_flags, (off_t)req->req_offset, req->req_copy,
|
|
req->req_cur_protection, req->req_max_protection,
|
|
req->req_inherance));
|
|
|
|
#if 1
|
|
/* XXX Darwin fails on mapping a page at address 0 */
|
|
if (req->req_address == 0)
|
|
return mach_msg_error(args, error);
|
|
#endif
|
|
|
|
req->req_size = round_page(req->req_size);
|
|
|
|
/* Where Mach uses 0x00ff, we use 0x0100 */
|
|
if ((req->req_mask & (req->req_mask + 1)) || (req->req_mask == 0))
|
|
req->req_mask = 0;
|
|
else
|
|
req->req_mask += 1;
|
|
|
|
if (req->req_flags & MACH_VM_FLAGS_ANYWHERE) {
|
|
SCARG(&cup, flags) = MAP_ANON;
|
|
flags = 0;
|
|
} else {
|
|
SCARG(&cup, flags) = MAP_ANON | MAP_FIXED;
|
|
flags = MAP_FIXED;
|
|
}
|
|
|
|
/*
|
|
* Use uvm_map_findspace to find a place which conforms to the
|
|
* requested alignement.
|
|
*/
|
|
vm_map_lock(&p->p_vmspace->vm_map);
|
|
ret = uvm_map_findspace(&p->p_vmspace->vm_map,
|
|
trunc_page(req->req_address), req->req_size, &addr,
|
|
NULL, 0, req->req_mask, flags);
|
|
vm_map_unlock(&p->p_vmspace->vm_map);
|
|
|
|
if (ret == NULL)
|
|
return mach_msg_error(args, ENOMEM);
|
|
|
|
switch(req->req_inherance) {
|
|
case MACH_VM_INHERIT_SHARE:
|
|
SCARG(&cup, flags) |= MAP_INHERIT;
|
|
break;
|
|
case MACH_VM_INHERIT_COPY:
|
|
SCARG(&cup, flags) |= MAP_COPY;
|
|
break;
|
|
case MACH_VM_INHERIT_NONE:
|
|
break;
|
|
case MACH_VM_INHERIT_DONATE_COPY:
|
|
default:
|
|
uprintf("mach_vm_map: unsupported inherance flag %d\n",
|
|
req->req_inherance);
|
|
break;
|
|
}
|
|
|
|
SCARG(&cup, addr) = (void *)addr;
|
|
SCARG(&cup, len) = req->req_size;
|
|
SCARG(&cup, prot) = req->req_cur_protection;
|
|
SCARG(&cup, fd) = -1; /* XXX For now, no object mapping */
|
|
SCARG(&cup, pos) = req->req_offset;
|
|
|
|
if ((error = sys_mmap(p, &cup, &rep->rep_retval)) != 0)
|
|
return mach_msg_error(args, error);
|
|
|
|
rep->rep_msgh.msgh_bits =
|
|
MACH_MSGH_REPLY_LOCAL_BITS(MACH_MSG_TYPE_MOVE_SEND_ONCE);
|
|
rep->rep_msgh.msgh_size = sizeof(*rep) - sizeof(rep->rep_trailer);
|
|
rep->rep_msgh.msgh_local_port = req->req_msgh.msgh_local_port;
|
|
rep->rep_msgh.msgh_id = req->req_msgh.msgh_id + 100;
|
|
rep->rep_trailer.msgh_trailer_size = 8;
|
|
|
|
*msglen = sizeof(*rep);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
mach_vm_allocate(args)
|
|
struct mach_trap_args *args;
|
|
{
|
|
mach_vm_allocate_request_t *req = args->smsg;
|
|
mach_vm_allocate_reply_t *rep = args->rmsg;
|
|
size_t *msglen = args->rsize;
|
|
struct proc *p = args->p;
|
|
struct sys_mmap_args cup;
|
|
vaddr_t addr;
|
|
size_t size;
|
|
int error;
|
|
|
|
addr = req->req_address;
|
|
size = req->req_size;
|
|
|
|
DPRINTF(("mach_vm_allocate(addr = %p, size = 0x%08x);\n",
|
|
(void *)addr, size));
|
|
|
|
size = round_page(size);
|
|
if (req->req_flags & MACH_VM_FLAGS_ANYWHERE)
|
|
addr = vm_map_min(&p->p_vmspace->vm_map);
|
|
else
|
|
addr = trunc_page(addr);
|
|
|
|
if (((addr + size) > vm_map_max(&p->p_vmspace->vm_map)) ||
|
|
((addr + size) <= addr))
|
|
addr = vm_map_min(&p->p_vmspace->vm_map);
|
|
|
|
if (size == 0)
|
|
goto out;
|
|
|
|
SCARG(&cup, addr) = (caddr_t)addr;
|
|
SCARG(&cup, len) = size;
|
|
SCARG(&cup, prot) = PROT_READ | PROT_WRITE;
|
|
SCARG(&cup, flags) = MAP_ANON;
|
|
if ((req->req_flags & MACH_VM_FLAGS_ANYWHERE) == 0)
|
|
SCARG(&cup, flags) |= MAP_FIXED;
|
|
SCARG(&cup, fd) = -1;
|
|
SCARG(&cup, pos) = 0;
|
|
|
|
if ((error = sys_mmap(p, &cup, &rep->rep_address)) != 0)
|
|
return mach_msg_error(args, error);
|
|
DPRINTF(("vm_allocate: success at %p\n", (void *)rep->rep_address));
|
|
|
|
out:
|
|
rep->rep_msgh.msgh_bits =
|
|
MACH_MSGH_REPLY_LOCAL_BITS(MACH_MSG_TYPE_MOVE_SEND_ONCE);
|
|
rep->rep_msgh.msgh_size = sizeof(*rep) - sizeof(rep->rep_trailer);
|
|
rep->rep_msgh.msgh_local_port = req->req_msgh.msgh_local_port;
|
|
rep->rep_msgh.msgh_id = req->req_msgh.msgh_id + 100;
|
|
rep->rep_trailer.msgh_trailer_size = 8;
|
|
|
|
*msglen = sizeof(*rep);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
mach_vm_deallocate(args)
|
|
struct mach_trap_args *args;
|
|
{
|
|
mach_vm_deallocate_request_t *req = args->smsg;
|
|
mach_vm_deallocate_reply_t *rep = args->rmsg;
|
|
size_t *msglen = args->rsize;
|
|
struct proc *p = args->p;
|
|
struct sys_munmap_args cup;
|
|
int error;
|
|
|
|
DPRINTF(("mach_vm_deallocate(addr = %p, size = 0x%08x);\n",
|
|
(void *)req->req_address, req->req_size));
|
|
|
|
SCARG(&cup, addr) = (caddr_t)req->req_address;
|
|
SCARG(&cup, len) = req->req_size;
|
|
|
|
if ((error = sys_munmap(p, &cup, &rep->rep_retval)) != 0)
|
|
return mach_msg_error(args, error);
|
|
|
|
rep->rep_msgh.msgh_bits =
|
|
MACH_MSGH_REPLY_LOCAL_BITS(MACH_MSG_TYPE_MOVE_SEND_ONCE);
|
|
rep->rep_msgh.msgh_size = sizeof(*rep) - sizeof(rep->rep_trailer);
|
|
rep->rep_msgh.msgh_local_port = req->req_msgh.msgh_local_port;
|
|
rep->rep_msgh.msgh_id = req->req_msgh.msgh_id + 100;
|
|
rep->rep_trailer.msgh_trailer_size = 8;
|
|
|
|
*msglen = sizeof(*rep);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
mach_vm_wire(args)
|
|
struct mach_trap_args *args;
|
|
{
|
|
mach_vm_wire_request_t *req = args->smsg;
|
|
mach_vm_wire_reply_t *rep = args->rmsg;
|
|
size_t *msglen = args->rsize;
|
|
struct proc *p = args->p;
|
|
register_t retval;
|
|
int error;
|
|
|
|
DPRINTF(("mach_vm_wire(addr = %p, size = 0x%08x, prot = 0x%x);\n",
|
|
(void *)req->req_address, req->req_size, req->req_access));
|
|
|
|
bzero(&rep, sizeof(*rep));
|
|
|
|
if ((req->req_access & ~VM_PROT_ALL) != 0)
|
|
return mach_msg_error(args, EINVAL);
|
|
|
|
/*
|
|
* Mach maitains a count of how many times a page is wired
|
|
* and unwire it once the count is zero. We cannot do that yet.
|
|
*/
|
|
if (req->req_access == 0) {
|
|
struct sys_munlock_args cup;
|
|
|
|
SCARG(&cup, addr) = (void *)req->req_address;
|
|
SCARG(&cup, len) = req->req_size;
|
|
error = sys_munlock(p, &cup, &retval);
|
|
} else {
|
|
struct sys_mlock_args cup;
|
|
|
|
SCARG(&cup, addr) = (void *)req->req_address;
|
|
SCARG(&cup, len) = req->req_size;
|
|
error = sys_mlock(p, &cup, &retval);
|
|
}
|
|
if (error != 0)
|
|
return mach_msg_error(args, error);
|
|
|
|
if ((error = uvm_map_protect(&p->p_vmspace->vm_map, req->req_address,
|
|
req->req_address + req->req_size, req->req_access, 0)) != 0)
|
|
return mach_msg_error(args, error);
|
|
|
|
rep->rep_msgh.msgh_bits =
|
|
MACH_MSGH_REPLY_LOCAL_BITS(MACH_MSG_TYPE_MOVE_SEND_ONCE);
|
|
rep->rep_msgh.msgh_size = sizeof(*rep) - sizeof(rep->rep_trailer);
|
|
rep->rep_msgh.msgh_local_port = req->req_msgh.msgh_local_port;
|
|
rep->rep_msgh.msgh_id = req->req_msgh.msgh_id + 100;
|
|
rep->rep_trailer.msgh_trailer_size = 8;
|
|
|
|
*msglen = sizeof(*rep);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
mach_vm_protect(args)
|
|
struct mach_trap_args *args;
|
|
{
|
|
mach_vm_protect_request_t *req = args->smsg;
|
|
mach_vm_protect_reply_t *rep = args->rmsg;
|
|
size_t *msglen = args->rsize;
|
|
struct proc *p = args->p;
|
|
struct sys_mprotect_args cup;
|
|
register_t retval;
|
|
int error;
|
|
|
|
SCARG(&cup, addr) = (void *)req->req_addr;
|
|
SCARG(&cup, len) = req->req_size;
|
|
SCARG(&cup, prot) = req->req_prot;
|
|
|
|
if ((error = sys_mprotect(p, &cup, &retval)) != 0)
|
|
return mach_msg_error(args, error);
|
|
|
|
rep->rep_msgh.msgh_bits =
|
|
MACH_MSGH_REPLY_LOCAL_BITS(MACH_MSG_TYPE_MOVE_SEND_ONCE);
|
|
rep->rep_msgh.msgh_size = sizeof(*rep) - sizeof(rep->rep_trailer);
|
|
rep->rep_msgh.msgh_local_port = req->req_msgh.msgh_local_port;
|
|
rep->rep_msgh.msgh_id = req->req_msgh.msgh_id + 100;
|
|
rep->rep_trailer.msgh_trailer_size = 8;
|
|
|
|
*msglen = sizeof(*rep);
|
|
return 0;
|
|
}
|
|
|
|
/* XXX The findspace argument is not handled correctly */
|
|
int
|
|
mach_sys_map_fd(p, v, retval)
|
|
struct proc *p;
|
|
void *v;
|
|
register_t *retval;
|
|
{
|
|
struct mach_sys_map_fd_args /* {
|
|
syscallarg(int) fd;
|
|
syscallarg(mach_vm_offset_t) offset;
|
|
syscallarg(mach_vm_offset_t *) va;
|
|
syscallarg(mach_boolean_t) findspace;
|
|
syscallarg(mach_vm_size_t) size;
|
|
} */ *uap = v;
|
|
struct file *fp;
|
|
struct filedesc *fdp;
|
|
struct vnode *vp;
|
|
struct exec_vmcmd evc;
|
|
struct vm_map_entry *ret;
|
|
void *va;
|
|
int error;
|
|
|
|
if ((error = copyin(SCARG(uap, va), (void *)&va, sizeof(va))) != 0)
|
|
return error;
|
|
|
|
fdp = p->p_fd;
|
|
fp = fd_getfile(fdp, SCARG(uap, fd));
|
|
if (fp == NULL)
|
|
return EBADF;
|
|
|
|
FILE_USE(fp);
|
|
vp = (struct vnode *)fp->f_data;
|
|
vref(vp);
|
|
|
|
DPRINTF(("vm_map_fd: addr = %p len = 0x%08x\n", va, SCARG(uap, size)));
|
|
bzero(&evc, sizeof(evc));
|
|
evc.ev_addr = (u_long)va;
|
|
evc.ev_len = SCARG(uap, size);
|
|
evc.ev_prot = VM_PROT_ALL;
|
|
evc.ev_flags = 0;
|
|
evc.ev_proc = vmcmd_map_readvn;
|
|
evc.ev_offset = SCARG(uap, offset);
|
|
evc.ev_vp = vp;
|
|
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
if ((error = (*evc.ev_proc)(p, &evc)) != 0) {
|
|
VOP_UNLOCK(vp, 0);
|
|
|
|
DPRINTF(("mach_sys_map_fd: mapping at %p failed\n", va));
|
|
|
|
if (SCARG(uap, findspace) == 0)
|
|
goto bad2;
|
|
|
|
vm_map_lock(&p->p_vmspace->vm_map);
|
|
if ((ret = uvm_map_findspace(&p->p_vmspace->vm_map,
|
|
vm_map_min(&p->p_vmspace->vm_map), evc.ev_len,
|
|
(vaddr_t *)&evc.ev_addr, NULL, 0, PAGE_SIZE, 0)) == NULL) {
|
|
vm_map_unlock(&p->p_vmspace->vm_map);
|
|
goto bad2;
|
|
}
|
|
vm_map_unlock(&p->p_vmspace->vm_map);
|
|
|
|
va = (void *)evc.ev_addr;
|
|
|
|
bzero(&evc, sizeof(evc));
|
|
evc.ev_addr = (u_long)va;
|
|
evc.ev_len = SCARG(uap, size);
|
|
evc.ev_prot = VM_PROT_ALL;
|
|
evc.ev_flags = 0;
|
|
evc.ev_proc = vmcmd_map_readvn;
|
|
evc.ev_offset = SCARG(uap, offset);
|
|
evc.ev_vp = vp;
|
|
|
|
DPRINTF(("mach_sys_map_fd: trying at %p\n", va));
|
|
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
|
|
if ((error = (*evc.ev_proc)(p, &evc)) != 0)
|
|
goto bad1;
|
|
}
|
|
|
|
vput(vp);
|
|
FILE_UNUSE(fp, p);
|
|
DPRINTF(("mach_sya_map_fd: mapping at %p\n", (void *)evc.ev_addr));
|
|
|
|
va = (mach_vm_offset_t *)evc.ev_addr;
|
|
|
|
if ((error = copyout((void *)&va, SCARG(uap, va), sizeof(va))) != 0)
|
|
return error;
|
|
|
|
return 0;
|
|
|
|
bad1:
|
|
VOP_UNLOCK(vp, 0);
|
|
bad2:
|
|
vrele(vp);
|
|
FILE_UNUSE(fp, p);
|
|
DPRINTF(("mach_sys_map_fd: mapping at %p failed, error = %d\n",
|
|
(void *)evc.ev_addr, error));
|
|
return error;
|
|
}
|
|
|
|
int
|
|
mach_vm_inherit(args)
|
|
struct mach_trap_args *args;
|
|
{
|
|
mach_vm_inherit_request_t *req = args->smsg;
|
|
mach_vm_inherit_reply_t *rep = args->rmsg;
|
|
size_t *msglen = args->rsize;
|
|
struct proc *p = args->p;
|
|
struct sys_minherit_args cup;
|
|
register_t retval;
|
|
int error;
|
|
|
|
SCARG(&cup, addr) = (void *)req->req_addr;
|
|
SCARG(&cup, len) = req->req_size;
|
|
/* Flags map well between Mach and NetBSD, just a 8 bit shift */
|
|
SCARG(&cup, inherit) = req->req_inh << 8;
|
|
|
|
if ((error = sys_minherit(p, &cup, &retval)) != 0)
|
|
return mach_msg_error(args, error);
|
|
|
|
rep->rep_msgh.msgh_bits =
|
|
MACH_MSGH_REPLY_LOCAL_BITS(MACH_MSG_TYPE_MOVE_SEND_ONCE);
|
|
rep->rep_msgh.msgh_size = sizeof(*rep) - sizeof(rep->rep_trailer);
|
|
rep->rep_msgh.msgh_local_port = req->req_msgh.msgh_local_port;
|
|
rep->rep_msgh.msgh_id = req->req_msgh.msgh_id + 100;
|
|
rep->rep_trailer.msgh_trailer_size = 8;
|
|
|
|
*msglen = sizeof(*rep);
|
|
return 0;
|
|
}
|