xref: /OK3568_Linux_fs/kernel/arch/um/os-Linux/start_up.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
4*4882a593Smuzhiyun  */
5*4882a593Smuzhiyun 
6*4882a593Smuzhiyun #include <stdio.h>
7*4882a593Smuzhiyun #include <stdlib.h>
8*4882a593Smuzhiyun #include <stdarg.h>
9*4882a593Smuzhiyun #include <unistd.h>
10*4882a593Smuzhiyun #include <errno.h>
11*4882a593Smuzhiyun #include <fcntl.h>
12*4882a593Smuzhiyun #include <sched.h>
13*4882a593Smuzhiyun #include <signal.h>
14*4882a593Smuzhiyun #include <string.h>
15*4882a593Smuzhiyun #include <sys/mman.h>
16*4882a593Smuzhiyun #include <sys/stat.h>
17*4882a593Smuzhiyun #include <sys/wait.h>
18*4882a593Smuzhiyun #include <sys/time.h>
19*4882a593Smuzhiyun #include <sys/resource.h>
20*4882a593Smuzhiyun #include <asm/unistd.h>
21*4882a593Smuzhiyun #include <init.h>
22*4882a593Smuzhiyun #include <os.h>
23*4882a593Smuzhiyun #include <mem_user.h>
24*4882a593Smuzhiyun #include <ptrace_user.h>
25*4882a593Smuzhiyun #include <registers.h>
26*4882a593Smuzhiyun #include <skas.h>
27*4882a593Smuzhiyun 
ptrace_child(void)28*4882a593Smuzhiyun static void ptrace_child(void)
29*4882a593Smuzhiyun {
30*4882a593Smuzhiyun 	int ret;
31*4882a593Smuzhiyun 	/* Calling os_getpid because some libcs cached getpid incorrectly */
32*4882a593Smuzhiyun 	int pid = os_getpid(), ppid = getppid();
33*4882a593Smuzhiyun 	int sc_result;
34*4882a593Smuzhiyun 
35*4882a593Smuzhiyun 	if (change_sig(SIGWINCH, 0) < 0 ||
36*4882a593Smuzhiyun 	    ptrace(PTRACE_TRACEME, 0, 0, 0) < 0) {
37*4882a593Smuzhiyun 		perror("ptrace");
38*4882a593Smuzhiyun 		kill(pid, SIGKILL);
39*4882a593Smuzhiyun 	}
40*4882a593Smuzhiyun 	kill(pid, SIGSTOP);
41*4882a593Smuzhiyun 
42*4882a593Smuzhiyun 	/*
43*4882a593Smuzhiyun 	 * This syscall will be intercepted by the parent. Don't call more than
44*4882a593Smuzhiyun 	 * once, please.
45*4882a593Smuzhiyun 	 */
46*4882a593Smuzhiyun 	sc_result = os_getpid();
47*4882a593Smuzhiyun 
48*4882a593Smuzhiyun 	if (sc_result == pid)
49*4882a593Smuzhiyun 		/* Nothing modified by the parent, we are running normally. */
50*4882a593Smuzhiyun 		ret = 1;
51*4882a593Smuzhiyun 	else if (sc_result == ppid)
52*4882a593Smuzhiyun 		/*
53*4882a593Smuzhiyun 		 * Expected in check_ptrace and check_sysemu when they succeed
54*4882a593Smuzhiyun 		 * in modifying the stack frame
55*4882a593Smuzhiyun 		 */
56*4882a593Smuzhiyun 		ret = 0;
57*4882a593Smuzhiyun 	else
58*4882a593Smuzhiyun 		/* Serious trouble! This could be caused by a bug in host 2.6
59*4882a593Smuzhiyun 		 * SKAS3/2.6 patch before release -V6, together with a bug in
60*4882a593Smuzhiyun 		 * the UML code itself.
61*4882a593Smuzhiyun 		 */
62*4882a593Smuzhiyun 		ret = 2;
63*4882a593Smuzhiyun 
64*4882a593Smuzhiyun 	exit(ret);
65*4882a593Smuzhiyun }
66*4882a593Smuzhiyun 
fatal_perror(const char * str)67*4882a593Smuzhiyun static void fatal_perror(const char *str)
68*4882a593Smuzhiyun {
69*4882a593Smuzhiyun 	perror(str);
70*4882a593Smuzhiyun 	exit(1);
71*4882a593Smuzhiyun }
72*4882a593Smuzhiyun 
fatal(char * fmt,...)73*4882a593Smuzhiyun static void fatal(char *fmt, ...)
74*4882a593Smuzhiyun {
75*4882a593Smuzhiyun 	va_list list;
76*4882a593Smuzhiyun 
77*4882a593Smuzhiyun 	va_start(list, fmt);
78*4882a593Smuzhiyun 	vfprintf(stderr, fmt, list);
79*4882a593Smuzhiyun 	va_end(list);
80*4882a593Smuzhiyun 
81*4882a593Smuzhiyun 	exit(1);
82*4882a593Smuzhiyun }
83*4882a593Smuzhiyun 
non_fatal(char * fmt,...)84*4882a593Smuzhiyun static void non_fatal(char *fmt, ...)
85*4882a593Smuzhiyun {
86*4882a593Smuzhiyun 	va_list list;
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun 	va_start(list, fmt);
89*4882a593Smuzhiyun 	vfprintf(stderr, fmt, list);
90*4882a593Smuzhiyun 	va_end(list);
91*4882a593Smuzhiyun }
92*4882a593Smuzhiyun 
start_ptraced_child(void)93*4882a593Smuzhiyun static int start_ptraced_child(void)
94*4882a593Smuzhiyun {
95*4882a593Smuzhiyun 	int pid, n, status;
96*4882a593Smuzhiyun 
97*4882a593Smuzhiyun 	fflush(stdout);
98*4882a593Smuzhiyun 
99*4882a593Smuzhiyun 	pid = fork();
100*4882a593Smuzhiyun 	if (pid == 0)
101*4882a593Smuzhiyun 		ptrace_child();
102*4882a593Smuzhiyun 	else if (pid < 0)
103*4882a593Smuzhiyun 		fatal_perror("start_ptraced_child : fork failed");
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun 	CATCH_EINTR(n = waitpid(pid, &status, WUNTRACED));
106*4882a593Smuzhiyun 	if (n < 0)
107*4882a593Smuzhiyun 		fatal_perror("check_ptrace : waitpid failed");
108*4882a593Smuzhiyun 	if (!WIFSTOPPED(status) || (WSTOPSIG(status) != SIGSTOP))
109*4882a593Smuzhiyun 		fatal("check_ptrace : expected SIGSTOP, got status = %d",
110*4882a593Smuzhiyun 		      status);
111*4882a593Smuzhiyun 
112*4882a593Smuzhiyun 	return pid;
113*4882a593Smuzhiyun }
114*4882a593Smuzhiyun 
115*4882a593Smuzhiyun /* When testing for SYSEMU support, if it is one of the broken versions, we
116*4882a593Smuzhiyun  * must just avoid using sysemu, not panic, but only if SYSEMU features are
117*4882a593Smuzhiyun  * broken.
118*4882a593Smuzhiyun  * So only for SYSEMU features we test mustpanic, while normal host features
119*4882a593Smuzhiyun  * must work anyway!
120*4882a593Smuzhiyun  */
stop_ptraced_child(int pid,int exitcode,int mustexit)121*4882a593Smuzhiyun static int stop_ptraced_child(int pid, int exitcode, int mustexit)
122*4882a593Smuzhiyun {
123*4882a593Smuzhiyun 	int status, n, ret = 0;
124*4882a593Smuzhiyun 
125*4882a593Smuzhiyun 	if (ptrace(PTRACE_CONT, pid, 0, 0) < 0) {
126*4882a593Smuzhiyun 		perror("stop_ptraced_child : ptrace failed");
127*4882a593Smuzhiyun 		return -1;
128*4882a593Smuzhiyun 	}
129*4882a593Smuzhiyun 	CATCH_EINTR(n = waitpid(pid, &status, 0));
130*4882a593Smuzhiyun 	if (!WIFEXITED(status) || (WEXITSTATUS(status) != exitcode)) {
131*4882a593Smuzhiyun 		int exit_with = WEXITSTATUS(status);
132*4882a593Smuzhiyun 		if (exit_with == 2)
133*4882a593Smuzhiyun 			non_fatal("check_ptrace : child exited with status 2. "
134*4882a593Smuzhiyun 				  "\nDisabling SYSEMU support.\n");
135*4882a593Smuzhiyun 		non_fatal("check_ptrace : child exited with exitcode %d, while "
136*4882a593Smuzhiyun 			  "expecting %d; status 0x%x\n", exit_with,
137*4882a593Smuzhiyun 			  exitcode, status);
138*4882a593Smuzhiyun 		if (mustexit)
139*4882a593Smuzhiyun 			exit(1);
140*4882a593Smuzhiyun 		ret = -1;
141*4882a593Smuzhiyun 	}
142*4882a593Smuzhiyun 
143*4882a593Smuzhiyun 	return ret;
144*4882a593Smuzhiyun }
145*4882a593Smuzhiyun 
146*4882a593Smuzhiyun /* Changed only during early boot */
147*4882a593Smuzhiyun static int force_sysemu_disabled = 0;
148*4882a593Smuzhiyun 
nosysemu_cmd_param(char * str,int * add)149*4882a593Smuzhiyun static int __init nosysemu_cmd_param(char *str, int* add)
150*4882a593Smuzhiyun {
151*4882a593Smuzhiyun 	force_sysemu_disabled = 1;
152*4882a593Smuzhiyun 	return 0;
153*4882a593Smuzhiyun }
154*4882a593Smuzhiyun 
155*4882a593Smuzhiyun __uml_setup("nosysemu", nosysemu_cmd_param,
156*4882a593Smuzhiyun "nosysemu\n"
157*4882a593Smuzhiyun "    Turns off syscall emulation patch for ptrace (SYSEMU).\n"
158*4882a593Smuzhiyun "    SYSEMU is a performance-patch introduced by Laurent Vivier. It changes\n"
159*4882a593Smuzhiyun "    behaviour of ptrace() and helps reduce host context switch rates.\n"
160*4882a593Smuzhiyun "    To make it work, you need a kernel patch for your host, too.\n"
161*4882a593Smuzhiyun "    See http://perso.wanadoo.fr/laurent.vivier/UML/ for further \n"
162*4882a593Smuzhiyun "    information.\n\n");
163*4882a593Smuzhiyun 
check_sysemu(void)164*4882a593Smuzhiyun static void __init check_sysemu(void)
165*4882a593Smuzhiyun {
166*4882a593Smuzhiyun 	unsigned long regs[MAX_REG_NR];
167*4882a593Smuzhiyun 	int pid, n, status, count=0;
168*4882a593Smuzhiyun 
169*4882a593Smuzhiyun 	os_info("Checking syscall emulation patch for ptrace...");
170*4882a593Smuzhiyun 	sysemu_supported = 0;
171*4882a593Smuzhiyun 	pid = start_ptraced_child();
172*4882a593Smuzhiyun 
173*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSEMU, pid, 0, 0) < 0)
174*4882a593Smuzhiyun 		goto fail;
175*4882a593Smuzhiyun 
176*4882a593Smuzhiyun 	CATCH_EINTR(n = waitpid(pid, &status, WUNTRACED));
177*4882a593Smuzhiyun 	if (n < 0)
178*4882a593Smuzhiyun 		fatal_perror("check_sysemu : wait failed");
179*4882a593Smuzhiyun 	if (!WIFSTOPPED(status) || (WSTOPSIG(status) != SIGTRAP))
180*4882a593Smuzhiyun 		fatal("check_sysemu : expected SIGTRAP, got status = %d\n",
181*4882a593Smuzhiyun 		      status);
182*4882a593Smuzhiyun 
183*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, pid, 0, regs) < 0)
184*4882a593Smuzhiyun 		fatal_perror("check_sysemu : PTRACE_GETREGS failed");
185*4882a593Smuzhiyun 	if (PT_SYSCALL_NR(regs) != __NR_getpid) {
186*4882a593Smuzhiyun 		non_fatal("check_sysemu got system call number %d, "
187*4882a593Smuzhiyun 			  "expected %d...", PT_SYSCALL_NR(regs), __NR_getpid);
188*4882a593Smuzhiyun 		goto fail;
189*4882a593Smuzhiyun 	}
190*4882a593Smuzhiyun 
191*4882a593Smuzhiyun 	n = ptrace(PTRACE_POKEUSER, pid, PT_SYSCALL_RET_OFFSET, os_getpid());
192*4882a593Smuzhiyun 	if (n < 0) {
193*4882a593Smuzhiyun 		non_fatal("check_sysemu : failed to modify system call "
194*4882a593Smuzhiyun 			  "return");
195*4882a593Smuzhiyun 		goto fail;
196*4882a593Smuzhiyun 	}
197*4882a593Smuzhiyun 
198*4882a593Smuzhiyun 	if (stop_ptraced_child(pid, 0, 0) < 0)
199*4882a593Smuzhiyun 		goto fail_stopped;
200*4882a593Smuzhiyun 
201*4882a593Smuzhiyun 	sysemu_supported = 1;
202*4882a593Smuzhiyun 	os_info("OK\n");
203*4882a593Smuzhiyun 	set_using_sysemu(!force_sysemu_disabled);
204*4882a593Smuzhiyun 
205*4882a593Smuzhiyun 	os_info("Checking advanced syscall emulation patch for ptrace...");
206*4882a593Smuzhiyun 	pid = start_ptraced_child();
207*4882a593Smuzhiyun 
208*4882a593Smuzhiyun 	if ((ptrace(PTRACE_OLDSETOPTIONS, pid, 0,
209*4882a593Smuzhiyun 		   (void *) PTRACE_O_TRACESYSGOOD) < 0))
210*4882a593Smuzhiyun 		fatal_perror("check_sysemu: PTRACE_OLDSETOPTIONS failed");
211*4882a593Smuzhiyun 
212*4882a593Smuzhiyun 	while (1) {
213*4882a593Smuzhiyun 		count++;
214*4882a593Smuzhiyun 		if (ptrace(PTRACE_SYSEMU_SINGLESTEP, pid, 0, 0) < 0)
215*4882a593Smuzhiyun 			goto fail;
216*4882a593Smuzhiyun 		CATCH_EINTR(n = waitpid(pid, &status, WUNTRACED));
217*4882a593Smuzhiyun 		if (n < 0)
218*4882a593Smuzhiyun 			fatal_perror("check_sysemu: wait failed");
219*4882a593Smuzhiyun 
220*4882a593Smuzhiyun 		if (WIFSTOPPED(status) &&
221*4882a593Smuzhiyun 		    (WSTOPSIG(status) == (SIGTRAP|0x80))) {
222*4882a593Smuzhiyun 			if (!count) {
223*4882a593Smuzhiyun 				non_fatal("check_sysemu: SYSEMU_SINGLESTEP "
224*4882a593Smuzhiyun 					  "doesn't singlestep");
225*4882a593Smuzhiyun 				goto fail;
226*4882a593Smuzhiyun 			}
227*4882a593Smuzhiyun 			n = ptrace(PTRACE_POKEUSER, pid, PT_SYSCALL_RET_OFFSET,
228*4882a593Smuzhiyun 				   os_getpid());
229*4882a593Smuzhiyun 			if (n < 0)
230*4882a593Smuzhiyun 				fatal_perror("check_sysemu : failed to modify "
231*4882a593Smuzhiyun 					     "system call return");
232*4882a593Smuzhiyun 			break;
233*4882a593Smuzhiyun 		}
234*4882a593Smuzhiyun 		else if (WIFSTOPPED(status) && (WSTOPSIG(status) == SIGTRAP))
235*4882a593Smuzhiyun 			count++;
236*4882a593Smuzhiyun 		else {
237*4882a593Smuzhiyun 			non_fatal("check_sysemu: expected SIGTRAP or "
238*4882a593Smuzhiyun 				  "(SIGTRAP | 0x80), got status = %d\n",
239*4882a593Smuzhiyun 				  status);
240*4882a593Smuzhiyun 			goto fail;
241*4882a593Smuzhiyun 		}
242*4882a593Smuzhiyun 	}
243*4882a593Smuzhiyun 	if (stop_ptraced_child(pid, 0, 0) < 0)
244*4882a593Smuzhiyun 		goto fail_stopped;
245*4882a593Smuzhiyun 
246*4882a593Smuzhiyun 	sysemu_supported = 2;
247*4882a593Smuzhiyun 	os_info("OK\n");
248*4882a593Smuzhiyun 
249*4882a593Smuzhiyun 	if (!force_sysemu_disabled)
250*4882a593Smuzhiyun 		set_using_sysemu(sysemu_supported);
251*4882a593Smuzhiyun 	return;
252*4882a593Smuzhiyun 
253*4882a593Smuzhiyun fail:
254*4882a593Smuzhiyun 	stop_ptraced_child(pid, 1, 0);
255*4882a593Smuzhiyun fail_stopped:
256*4882a593Smuzhiyun 	non_fatal("missing\n");
257*4882a593Smuzhiyun }
258*4882a593Smuzhiyun 
check_ptrace(void)259*4882a593Smuzhiyun static void __init check_ptrace(void)
260*4882a593Smuzhiyun {
261*4882a593Smuzhiyun 	int pid, syscall, n, status;
262*4882a593Smuzhiyun 
263*4882a593Smuzhiyun 	os_info("Checking that ptrace can change system call numbers...");
264*4882a593Smuzhiyun 	pid = start_ptraced_child();
265*4882a593Smuzhiyun 
266*4882a593Smuzhiyun 	if ((ptrace(PTRACE_OLDSETOPTIONS, pid, 0,
267*4882a593Smuzhiyun 		   (void *) PTRACE_O_TRACESYSGOOD) < 0))
268*4882a593Smuzhiyun 		fatal_perror("check_ptrace: PTRACE_OLDSETOPTIONS failed");
269*4882a593Smuzhiyun 
270*4882a593Smuzhiyun 	while (1) {
271*4882a593Smuzhiyun 		if (ptrace(PTRACE_SYSCALL, pid, 0, 0) < 0)
272*4882a593Smuzhiyun 			fatal_perror("check_ptrace : ptrace failed");
273*4882a593Smuzhiyun 
274*4882a593Smuzhiyun 		CATCH_EINTR(n = waitpid(pid, &status, WUNTRACED));
275*4882a593Smuzhiyun 		if (n < 0)
276*4882a593Smuzhiyun 			fatal_perror("check_ptrace : wait failed");
277*4882a593Smuzhiyun 
278*4882a593Smuzhiyun 		if (!WIFSTOPPED(status) ||
279*4882a593Smuzhiyun 		   (WSTOPSIG(status) != (SIGTRAP | 0x80)))
280*4882a593Smuzhiyun 			fatal("check_ptrace : expected (SIGTRAP|0x80), "
281*4882a593Smuzhiyun 			       "got status = %d", status);
282*4882a593Smuzhiyun 
283*4882a593Smuzhiyun 		syscall = ptrace(PTRACE_PEEKUSER, pid, PT_SYSCALL_NR_OFFSET,
284*4882a593Smuzhiyun 				 0);
285*4882a593Smuzhiyun 		if (syscall == __NR_getpid) {
286*4882a593Smuzhiyun 			n = ptrace(PTRACE_POKEUSER, pid, PT_SYSCALL_NR_OFFSET,
287*4882a593Smuzhiyun 				   __NR_getppid);
288*4882a593Smuzhiyun 			if (n < 0)
289*4882a593Smuzhiyun 				fatal_perror("check_ptrace : failed to modify "
290*4882a593Smuzhiyun 					     "system call");
291*4882a593Smuzhiyun 			break;
292*4882a593Smuzhiyun 		}
293*4882a593Smuzhiyun 	}
294*4882a593Smuzhiyun 	stop_ptraced_child(pid, 0, 1);
295*4882a593Smuzhiyun 	os_info("OK\n");
296*4882a593Smuzhiyun 	check_sysemu();
297*4882a593Smuzhiyun }
298*4882a593Smuzhiyun 
299*4882a593Smuzhiyun extern void check_tmpexec(void);
300*4882a593Smuzhiyun 
check_coredump_limit(void)301*4882a593Smuzhiyun static void __init check_coredump_limit(void)
302*4882a593Smuzhiyun {
303*4882a593Smuzhiyun 	struct rlimit lim;
304*4882a593Smuzhiyun 	int err = getrlimit(RLIMIT_CORE, &lim);
305*4882a593Smuzhiyun 
306*4882a593Smuzhiyun 	if (err) {
307*4882a593Smuzhiyun 		perror("Getting core dump limit");
308*4882a593Smuzhiyun 		return;
309*4882a593Smuzhiyun 	}
310*4882a593Smuzhiyun 
311*4882a593Smuzhiyun 	os_info("Core dump limits :\n\tsoft - ");
312*4882a593Smuzhiyun 	if (lim.rlim_cur == RLIM_INFINITY)
313*4882a593Smuzhiyun 		os_info("NONE\n");
314*4882a593Smuzhiyun 	else
315*4882a593Smuzhiyun 		os_info("%llu\n", (unsigned long long)lim.rlim_cur);
316*4882a593Smuzhiyun 
317*4882a593Smuzhiyun 	os_info("\thard - ");
318*4882a593Smuzhiyun 	if (lim.rlim_max == RLIM_INFINITY)
319*4882a593Smuzhiyun 		os_info("NONE\n");
320*4882a593Smuzhiyun 	else
321*4882a593Smuzhiyun 		os_info("%llu\n", (unsigned long long)lim.rlim_max);
322*4882a593Smuzhiyun }
323*4882a593Smuzhiyun 
os_early_checks(void)324*4882a593Smuzhiyun void __init os_early_checks(void)
325*4882a593Smuzhiyun {
326*4882a593Smuzhiyun 	int pid;
327*4882a593Smuzhiyun 
328*4882a593Smuzhiyun 	/* Print out the core dump limits early */
329*4882a593Smuzhiyun 	check_coredump_limit();
330*4882a593Smuzhiyun 
331*4882a593Smuzhiyun 	check_ptrace();
332*4882a593Smuzhiyun 
333*4882a593Smuzhiyun 	/* Need to check this early because mmapping happens before the
334*4882a593Smuzhiyun 	 * kernel is running.
335*4882a593Smuzhiyun 	 */
336*4882a593Smuzhiyun 	check_tmpexec();
337*4882a593Smuzhiyun 
338*4882a593Smuzhiyun 	pid = start_ptraced_child();
339*4882a593Smuzhiyun 	if (init_pid_registers(pid))
340*4882a593Smuzhiyun 		fatal("Failed to initialize default registers");
341*4882a593Smuzhiyun 	stop_ptraced_child(pid, 1, 1);
342*4882a593Smuzhiyun }
343*4882a593Smuzhiyun 
parse_iomem(char * str,int * add)344*4882a593Smuzhiyun int __init parse_iomem(char *str, int *add)
345*4882a593Smuzhiyun {
346*4882a593Smuzhiyun 	struct iomem_region *new;
347*4882a593Smuzhiyun 	struct stat64 buf;
348*4882a593Smuzhiyun 	char *file, *driver;
349*4882a593Smuzhiyun 	int fd, size;
350*4882a593Smuzhiyun 
351*4882a593Smuzhiyun 	driver = str;
352*4882a593Smuzhiyun 	file = strchr(str,',');
353*4882a593Smuzhiyun 	if (file == NULL) {
354*4882a593Smuzhiyun 		os_warn("parse_iomem : failed to parse iomem\n");
355*4882a593Smuzhiyun 		goto out;
356*4882a593Smuzhiyun 	}
357*4882a593Smuzhiyun 	*file = '\0';
358*4882a593Smuzhiyun 	file++;
359*4882a593Smuzhiyun 	fd = open(file, O_RDWR, 0);
360*4882a593Smuzhiyun 	if (fd < 0) {
361*4882a593Smuzhiyun 		perror("parse_iomem - Couldn't open io file");
362*4882a593Smuzhiyun 		goto out;
363*4882a593Smuzhiyun 	}
364*4882a593Smuzhiyun 
365*4882a593Smuzhiyun 	if (fstat64(fd, &buf) < 0) {
366*4882a593Smuzhiyun 		perror("parse_iomem - cannot stat_fd file");
367*4882a593Smuzhiyun 		goto out_close;
368*4882a593Smuzhiyun 	}
369*4882a593Smuzhiyun 
370*4882a593Smuzhiyun 	new = malloc(sizeof(*new));
371*4882a593Smuzhiyun 	if (new == NULL) {
372*4882a593Smuzhiyun 		perror("Couldn't allocate iomem_region struct");
373*4882a593Smuzhiyun 		goto out_close;
374*4882a593Smuzhiyun 	}
375*4882a593Smuzhiyun 
376*4882a593Smuzhiyun 	size = (buf.st_size + UM_KERN_PAGE_SIZE) & ~(UM_KERN_PAGE_SIZE - 1);
377*4882a593Smuzhiyun 
378*4882a593Smuzhiyun 	*new = ((struct iomem_region) { .next		= iomem_regions,
379*4882a593Smuzhiyun 					.driver		= driver,
380*4882a593Smuzhiyun 					.fd		= fd,
381*4882a593Smuzhiyun 					.size		= size,
382*4882a593Smuzhiyun 					.phys		= 0,
383*4882a593Smuzhiyun 					.virt		= 0 });
384*4882a593Smuzhiyun 	iomem_regions = new;
385*4882a593Smuzhiyun 	iomem_size += new->size + UM_KERN_PAGE_SIZE;
386*4882a593Smuzhiyun 
387*4882a593Smuzhiyun 	return 0;
388*4882a593Smuzhiyun  out_close:
389*4882a593Smuzhiyun 	close(fd);
390*4882a593Smuzhiyun  out:
391*4882a593Smuzhiyun 	return 1;
392*4882a593Smuzhiyun }
393