From owner-freebsd-current@freebsd.org Sun Jun 9 13:17:33 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1161915C736C for ; Sun, 9 Jun 2019 13:17:33 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DC1716FD0B for ; Sun, 9 Jun 2019 13:17:31 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x59DHM1b083163 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 9 Jun 2019 16:17:26 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x59DHM1b083163 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x59DHM93083157; Sun, 9 Jun 2019 16:17:22 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 9 Jun 2019 16:17:22 +0300 From: Konstantin Belousov To: Rick Macklem Cc: "freebsd-current@FreeBSD.org" Subject: Re: adding a syscall to libc? Message-ID: <20190609131722.GV75280@kib.kiev.ua> References: <20190608102816.GR75280@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 09 Jun 2019 13:17:33 -0000 On Sun, Jun 09, 2019 at 06:12:59AM +0000, Rick Macklem wrote: > Konstantin Belousov wrote: > >On Sat, Jun 08, 2019 at 02:57:27AM +0000, Rick Macklem wrote: > >> Hi, > >> > First off, thanks Kostik for the fine explanation. I agree with Oliver that it should > be captured somewhere like the wiki. I'm no wiki guy, so hopefully someone else > will do this? There is apparently https://wiki.freebsd.org/AddingSyscalls which is already quite comprehensive. I am adding missed information right now. > > >> I've started working of a copy_file_range() syscall for FreeBSD. I think I have the > >> kernel patched and ready for some testing. > >> However, I'm confused about what I need to do in src/lib/libc/sys? > >> - Some syscalls have little .c files, but other ones do not. > >> When is one of these little .c files needed and, when not needed, what else > >> needs to be done? (I notice that syscall.mk in src/sys/sys automagically, but > >> I can't see what else, if anything, needs to be done?) > >Most important is to add the new syscall public symbol to sys/Symbol.map > >into the correct version, FBSD_1.6 for CURRENT-13. Do no bother with > >__sys_XXX and __XXX aliases. > I could only find a Symbol.map in src/lib/libc/sys. I added it there and it seems to > work. (I am using a stable/12 source tree for testing the build/userland. I'll check > head in case it has moved.) Yes, Symbol.map, it was thinko. > > >'Tiny .c files' are typically used for one of two purposes: > >- Convert raw kernel interface into something expected by userspace, > > often this coversion uses more generic and non-standard interface to > > implement more usual function. Examples are open(2) or waitid(2) > > which are really tiny wrappers around openat(2) and wait6(2) in > > today libc. > >- Allow libthr to hook into libc to provide additional services. Libthr > > often has to modify semantic of raw syscall, and libc contains the > > tables redirecting to implementation, the tables are patched on libthr > > load. Since tables must fill entries with some address in case libthr > > is not loaded, tiny functions which wrap syscalls are created for > > use in that tables. > > > >I think you do not need anything that complications for start, in which > >case adding new syscall consists of the following steps: > Yes, I don't think I need the above. > > >- Add the syscall to sys/kern/syscalls.master, and if reasonable, > > to sys/compat/freebsd32/syscalls.master. > I don't think a 32bit binary on a 64bit system needs this for now. > (At least that's my understanding of what this is used for?) Right. > > >- Consider if the syscall makes sense in capsicumized environment, > > and if yes, list the syscall in sys/kern/capabilities.conf. Typically, > > if syscall provides access to the global files namespace, it must be not > > allowed. On the other hand, if syscall only operates on already opened > > file descriptors, then it is suitable (but of course there are lot of > > nuances). > It uses open fds, but I think I'll leave it out of capabilities.conf for now. If > there is a need, someone more familiar with capsicum can check it. > > >- Add syscall prototype to the user-visible portion of header, > > hiding it under the proper visibility check. > Hmm, not quite sure what you mean here. It ends up in sys/sysproto.h > automagically. Does it need to go somewhere else too? sys/sysproto.h is not used by userspace. If your syscall is going to be useful for normal userspace (it should be, othewise why adding it at all ?) you have to declare it in some header typically used by apps. Take for example include/unistd.h, where you should only add the syscall to appropriate namespace, allowing strict standard-compliance compiler option to hide symbols not specified by choosen standard. I suspect that you need #if __BSD_VISIBLE int your_syscall(args); #endif if the header is defined e.g. by POSIX. > > >- Add syscall symbol to lib/libc/sys/Symbol.ver. > All I found was lib/libc/sys/Symbol.map and I've added it there. > > >- Implement the syscall. There are some additional details that might > > require attention: > > - If compat32 syscall going to be implemented, or you know > > that Linuxolator needs to implement same syscall and would > > like to take advantage of the code, provide > > int kern_YOURSYSCALL(); > > wrapper and declare it in sys/syscallsubr.h. Real implementations > > of host-native and compat32 sys_YOURSYSCALL() should be just > > decoding of uap members and call into kern_YOURSYSCALL. > I think it might be useful for the Linuxolator, since it is meant to be Linux > compatible, so I've done this. > > > - Consider the need to add auditing for new syscall. > This one I need to look at more closely. I may end up posting to the list > w.r.t. what to do about this. I think I'll leave it out of the first draft for phabricator. > > >- Add man page for the syscall, at lib/libc/sys/YOURSYSCALL.2, and connect > > it to the build in lib/libc/sys/Makefile.inc. > Yea, I know I have to write a man page. Maybe get to that tomorrow. > > >- When creating review for the change, do not include diff for generated > > files after make sysent. Similarly, when doing the commit, first commit > > everything non-generated, then do make -C sys/kern sysent (and > > make sysent -C sys/compat/freebsd32 sysent if appropriate) and commit > > the generated files in follow-up. > Righto, I'll do this when it gets to that stage. > > Thanks again for the useful answer, rick