xref: /netbsd/lib/librumphijack/hijack.c (revision f44ae016)
1 /*      $NetBSD: hijack.c,v 1.127 2019/02/17 23:35:50 bad Exp $	*/
2 
3 /*-
4  * Copyright (c) 2011 Antti Kantee.  All Rights Reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
16  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
17  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
18  * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
21  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25  * SUCH DAMAGE.
26  */
27 
28 /*
29  * XXX: rumphijack sort of works on glibc Linux.  But it's not
30  * the same quality working as on NetBSD.
31  * autoconf HAVE_FOO vs. __NetBSD__ / __linux__ could be further
32  * improved.
33  */
34 #include <rump/rumpuser_port.h>
35 
36 #if !defined(lint)
37 __RCSID("$NetBSD: hijack.c,v 1.127 2019/02/17 23:35:50 bad Exp $");
38 #endif
39 
40 #include <sys/param.h>
41 #include <sys/types.h>
42 #include <sys/ioctl.h>
43 #include <sys/mman.h>
44 #include <sys/mount.h>
45 #include <sys/socket.h>
46 #include <sys/stat.h>
47 #include <sys/time.h>
48 #include <sys/uio.h>
49 
50 #ifdef __NetBSD__
51 #include <sys/statvfs.h>
52 #endif
53 
54 #ifdef HAVE_KQUEUE
55 #include <sys/event.h>
56 #endif
57 
58 #ifdef __NetBSD__
59 #include <sys/quotactl.h>
60 #endif
61 
62 #include <assert.h>
63 #include <dlfcn.h>
64 #include <err.h>
65 #include <errno.h>
66 #include <fcntl.h>
67 #include <poll.h>
68 #include <pthread.h>
69 #include <signal.h>
70 #include <stdarg.h>
71 #include <stdbool.h>
72 #include <stdint.h>
73 #include <stdio.h>
74 #include <stdlib.h>
75 #include <string.h>
76 #include <time.h>
77 #include <unistd.h>
78 
79 #include <rump/rumpclient.h>
80 #include <rump/rump_syscalls.h>
81 
82 #include "hijack.h"
83 
84 /*
85  * XXX: Consider autogenerating this, syscnames[] and syscalls[] with
86  * a DSL where the tool also checks the symbols exported by this library
87  * to make sure all relevant calls are accounted for.
88  */
89 enum dualcall {
90 	DUALCALL_WRITE, DUALCALL_WRITEV, DUALCALL_PWRITE, DUALCALL_PWRITEV,
91 	DUALCALL_IOCTL, DUALCALL_FCNTL,
92 	DUALCALL_SOCKET, DUALCALL_ACCEPT,
93 #ifndef __linux__
94 	DUALCALL_PACCEPT,
95 #endif
96 	DUALCALL_BIND, DUALCALL_CONNECT,
97 	DUALCALL_GETPEERNAME, DUALCALL_GETSOCKNAME, DUALCALL_LISTEN,
98 	DUALCALL_RECVFROM, DUALCALL_RECVMSG,
99 	DUALCALL_SENDTO, DUALCALL_SENDMSG,
100 	DUALCALL_GETSOCKOPT, DUALCALL_SETSOCKOPT,
101 	DUALCALL_SHUTDOWN,
102 	DUALCALL_READ, DUALCALL_READV, DUALCALL_PREAD, DUALCALL_PREADV,
103 	DUALCALL_DUP2,
104 	DUALCALL_CLOSE,
105 	DUALCALL_POLLTS,
106 
107 #ifndef __linux__
108 	DUALCALL_STAT, DUALCALL_LSTAT, DUALCALL_FSTAT,
109 #endif
110 
111 	DUALCALL_CHMOD, DUALCALL_LCHMOD, DUALCALL_FCHMOD,
112 	DUALCALL_CHOWN, DUALCALL_LCHOWN, DUALCALL_FCHOWN,
113 	DUALCALL_OPEN,
114 	DUALCALL_CHDIR, DUALCALL_FCHDIR,
115 	DUALCALL_LSEEK,
116 	DUALCALL_UNLINK, DUALCALL_SYMLINK, DUALCALL_READLINK,
117 	DUALCALL_LINK, DUALCALL_RENAME,
118 	DUALCALL_MKDIR, DUALCALL_RMDIR,
119 	DUALCALL_UTIMES, DUALCALL_LUTIMES, DUALCALL_FUTIMES,
120 	DUALCALL_UTIMENSAT, DUALCALL_FUTIMENS,
121 	DUALCALL_TRUNCATE, DUALCALL_FTRUNCATE,
122 	DUALCALL_FSYNC,
123 	DUALCALL_ACCESS,
124 
125 #ifndef __linux__
126 	DUALCALL___GETCWD,
127 	DUALCALL_GETDENTS,
128 #endif
129 
130 #ifndef __linux__
131 	DUALCALL_MKNOD,
132 #endif
133 
134 #ifdef __NetBSD__
135 	DUALCALL_GETFH, DUALCALL_FHOPEN, DUALCALL_FHSTAT, DUALCALL_FHSTATVFS1,
136 #endif
137 
138 #ifdef HAVE_KQUEUE
139 	DUALCALL_KEVENT,
140 #endif
141 
142 #ifdef __NetBSD__
143 	DUALCALL___SYSCTL,
144 	DUALCALL_MODCTL,
145 #endif
146 
147 #ifdef __NetBSD__
148 	DUALCALL_NFSSVC,
149 #endif
150 
151 #ifdef __NetBSD__
152 	DUALCALL_STATVFS1, DUALCALL_FSTATVFS1, DUALCALL_GETVFSSTAT,
153 #endif
154 
155 #ifdef __NetBSD__
156 	DUALCALL_MOUNT, DUALCALL_UNMOUNT,
157 #endif
158 
159 #ifdef HAVE_FSYNC_RANGE
160 	DUALCALL_FSYNC_RANGE,
161 #endif
162 
163 #ifdef HAVE_CHFLAGS
164 	DUALCALL_CHFLAGS, DUALCALL_LCHFLAGS, DUALCALL_FCHFLAGS,
165 #endif
166 
167 #ifdef HAVE___QUOTACTL
168 	DUALCALL_QUOTACTL,
169 #endif
170 #ifdef __NetBSD__
171 	DUALCALL_LINKAT,
172 #endif
173 	DUALCALL__NUM
174 };
175 
176 #define RSYS_STRING(a) __STRING(a)
177 #define RSYS_NAME(a) RSYS_STRING(__CONCAT(RUMP_SYS_RENAME_,a))
178 
179 /*
180  * Would be nice to get this automatically in sync with libc.
181  * Also, this does not work for compat-using binaries (we should
182  * provide all previous interfaces, not just the current ones)
183  */
184 #if defined(__NetBSD__)
185 
186 #if !__NetBSD_Prereq__(5,99,7)
187 #define REALSELECT select
188 #define REALPOLLTS pollts
189 #define REALKEVENT kevent
190 #define REALSTAT __stat30
191 #define REALLSTAT __lstat30
192 #define REALFSTAT __fstat30
193 #define REALUTIMES utimes
194 #define REALLUTIMES lutimes
195 #define REALFUTIMES futimes
196 #define REALMKNOD mknod
197 #define REALFHSTAT __fhstat40
198 #else /* >= 5.99.7 */
199 #define REALSELECT _sys___select50
200 #define REALPOLLTS _sys___pollts50
201 #define REALKEVENT _sys___kevent50
202 #define REALSTAT __stat50
203 #define REALLSTAT __lstat50
204 #define REALFSTAT __fstat50
205 #define REALUTIMES __utimes50
206 #define REALLUTIMES __lutimes50
207 #define REALFUTIMES __futimes50
208 #define REALMKNOD __mknod50
209 #define REALFHSTAT __fhstat50
210 #endif /* < 5.99.7 */
211 
212 #define REALREAD _sys_read
213 #define REALPREAD _sys_pread
214 #define REALPWRITE _sys_pwrite
215 #define REALGETDENTS __getdents30
216 #define REALMOUNT __mount50
217 #define REALGETFH __getfh30
218 #define REALFHOPEN __fhopen40
219 #define REALFHSTATVFS1 __fhstatvfs140
220 #define REALSOCKET __socket30
221 
222 #define LSEEK_ALIAS _lseek
223 #define VFORK __vfork14
224 
225 int REALSTAT(const char *, struct stat *);
226 int REALLSTAT(const char *, struct stat *);
227 int REALFSTAT(int, struct stat *);
228 int REALMKNOD(const char *, mode_t, dev_t);
229 int REALGETDENTS(int, char *, size_t);
230 
231 int __getcwd(char *, size_t);
232 
233 #elif defined(__linux__) /* glibc, really */
234 
235 #define REALREAD read
236 #define REALPREAD pread
237 #define REALPWRITE pwrite
238 #define REALSELECT select
239 #define REALPOLLTS ppoll
240 #define REALUTIMES utimes
241 #define REALLUTIMES lutimes
242 #define REALFUTIMES futimes
243 #define REALFHSTAT fhstat
244 #define REALSOCKET socket
245 
246 #else /* !NetBSD && !linux */
247 
248 #error platform not supported
249 
250 #endif /* platform */
251 
252 int REALSELECT(int, fd_set *, fd_set *, fd_set *, struct timeval *);
253 int REALPOLLTS(struct pollfd *, nfds_t,
254 	       const struct timespec *, const sigset_t *);
255 int REALKEVENT(int, const struct kevent *, size_t, struct kevent *, size_t,
256 	       const struct timespec *);
257 ssize_t REALREAD(int, void *, size_t);
258 ssize_t REALPREAD(int, void *, size_t, off_t);
259 ssize_t REALPWRITE(int, const void *, size_t, off_t);
260 int REALUTIMES(const char *, const struct timeval [2]);
261 int REALLUTIMES(const char *, const struct timeval [2]);
262 int REALFUTIMES(int, const struct timeval [2]);
263 int REALMOUNT(const char *, const char *, int, void *, size_t);
264 int REALGETFH(const char *, void *, size_t *);
265 int REALFHOPEN(const void *, size_t, int);
266 int REALFHSTAT(const void *, size_t, struct stat *);
267 int REALFHSTATVFS1(const void *, size_t, struct statvfs *, int);
268 int REALSOCKET(int, int, int);
269 
270 #define S(a) __STRING(a)
271 struct sysnames {
272 	enum dualcall scm_callnum;
273 	const char *scm_hostname;
274 	const char *scm_rumpname;
275 } syscnames[] = {
276 	{ DUALCALL_SOCKET,	S(REALSOCKET),	RSYS_NAME(SOCKET)	},
277 	{ DUALCALL_ACCEPT,	"accept",	RSYS_NAME(ACCEPT)	},
278 #ifndef __linux__
279 	{ DUALCALL_PACCEPT,	"paccept",	RSYS_NAME(PACCEPT)	},
280 #endif
281 	{ DUALCALL_BIND,	"bind",		RSYS_NAME(BIND)		},
282 	{ DUALCALL_CONNECT,	"connect",	RSYS_NAME(CONNECT)	},
283 	{ DUALCALL_GETPEERNAME,	"getpeername",	RSYS_NAME(GETPEERNAME)	},
284 	{ DUALCALL_GETSOCKNAME,	"getsockname",	RSYS_NAME(GETSOCKNAME)	},
285 	{ DUALCALL_LISTEN,	"listen",	RSYS_NAME(LISTEN)	},
286 	{ DUALCALL_RECVFROM,	"recvfrom",	RSYS_NAME(RECVFROM)	},
287 	{ DUALCALL_RECVMSG,	"recvmsg",	RSYS_NAME(RECVMSG)	},
288 	{ DUALCALL_SENDTO,	"sendto",	RSYS_NAME(SENDTO)	},
289 	{ DUALCALL_SENDMSG,	"sendmsg",	RSYS_NAME(SENDMSG)	},
290 	{ DUALCALL_GETSOCKOPT,	"getsockopt",	RSYS_NAME(GETSOCKOPT)	},
291 	{ DUALCALL_SETSOCKOPT,	"setsockopt",	RSYS_NAME(SETSOCKOPT)	},
292 	{ DUALCALL_SHUTDOWN,	"shutdown",	RSYS_NAME(SHUTDOWN)	},
293 	{ DUALCALL_READ,	S(REALREAD),	RSYS_NAME(READ)		},
294 	{ DUALCALL_READV,	"readv",	RSYS_NAME(READV)	},
295 	{ DUALCALL_PREAD,	S(REALPREAD),	RSYS_NAME(PREAD)	},
296 	{ DUALCALL_PREADV,	"preadv",	RSYS_NAME(PREADV)	},
297 	{ DUALCALL_WRITE,	"write",	RSYS_NAME(WRITE)	},
298 	{ DUALCALL_WRITEV,	"writev",	RSYS_NAME(WRITEV)	},
299 	{ DUALCALL_PWRITE,	S(REALPWRITE),	RSYS_NAME(PWRITE)	},
300 	{ DUALCALL_PWRITEV,	"pwritev",	RSYS_NAME(PWRITEV)	},
301 	{ DUALCALL_IOCTL,	"ioctl",	RSYS_NAME(IOCTL)	},
302 	{ DUALCALL_FCNTL,	"fcntl",	RSYS_NAME(FCNTL)	},
303 	{ DUALCALL_DUP2,	"dup2",		RSYS_NAME(DUP2)		},
304 	{ DUALCALL_CLOSE,	"close",	RSYS_NAME(CLOSE)	},
305 	{ DUALCALL_POLLTS,	S(REALPOLLTS),	RSYS_NAME(POLLTS)	},
306 #ifndef __linux__
307 	{ DUALCALL_STAT,	S(REALSTAT),	RSYS_NAME(STAT)		},
308 	{ DUALCALL_LSTAT,	S(REALLSTAT),	RSYS_NAME(LSTAT)	},
309 	{ DUALCALL_FSTAT,	S(REALFSTAT),	RSYS_NAME(FSTAT)	},
310 #endif
311 	{ DUALCALL_CHOWN,	"chown",	RSYS_NAME(CHOWN)	},
312 	{ DUALCALL_LCHOWN,	"lchown",	RSYS_NAME(LCHOWN)	},
313 	{ DUALCALL_FCHOWN,	"fchown",	RSYS_NAME(FCHOWN)	},
314 	{ DUALCALL_CHMOD,	"chmod",	RSYS_NAME(CHMOD)	},
315 	{ DUALCALL_LCHMOD,	"lchmod",	RSYS_NAME(LCHMOD)	},
316 	{ DUALCALL_FCHMOD,	"fchmod",	RSYS_NAME(FCHMOD)	},
317 	{ DUALCALL_UTIMES,	S(REALUTIMES),	RSYS_NAME(UTIMES)	},
318 	{ DUALCALL_LUTIMES,	S(REALLUTIMES),	RSYS_NAME(LUTIMES)	},
319 	{ DUALCALL_FUTIMES,	S(REALFUTIMES),	RSYS_NAME(FUTIMES)	},
320 	{ DUALCALL_UTIMENSAT,	"utimensat",	RSYS_NAME(UTIMENSAT)	},
321 	{ DUALCALL_FUTIMENS,	"futimens",	RSYS_NAME(FUTIMENS)	},
322 	{ DUALCALL_OPEN,	"open",		RSYS_NAME(OPEN)		},
323 	{ DUALCALL_CHDIR,	"chdir",	RSYS_NAME(CHDIR)	},
324 	{ DUALCALL_FCHDIR,	"fchdir",	RSYS_NAME(FCHDIR)	},
325 	{ DUALCALL_LSEEK,	"lseek",	RSYS_NAME(LSEEK)	},
326 	{ DUALCALL_UNLINK,	"unlink",	RSYS_NAME(UNLINK)	},
327 	{ DUALCALL_SYMLINK,	"symlink",	RSYS_NAME(SYMLINK)	},
328 	{ DUALCALL_READLINK,	"readlink",	RSYS_NAME(READLINK)	},
329 	{ DUALCALL_LINK,	"link",		RSYS_NAME(LINK)		},
330 	{ DUALCALL_RENAME,	"rename",	RSYS_NAME(RENAME)	},
331 	{ DUALCALL_MKDIR,	"mkdir",	RSYS_NAME(MKDIR)	},
332 	{ DUALCALL_RMDIR,	"rmdir",	RSYS_NAME(RMDIR)	},
333 	{ DUALCALL_TRUNCATE,	"truncate",	RSYS_NAME(TRUNCATE)	},
334 	{ DUALCALL_FTRUNCATE,	"ftruncate",	RSYS_NAME(FTRUNCATE)	},
335 	{ DUALCALL_FSYNC,	"fsync",	RSYS_NAME(FSYNC)	},
336 	{ DUALCALL_ACCESS,	"access",	RSYS_NAME(ACCESS)	},
337 
338 #ifndef __linux__
339 	{ DUALCALL___GETCWD,	"__getcwd",	RSYS_NAME(__GETCWD)	},
340 	{ DUALCALL_GETDENTS,	S(REALGETDENTS),RSYS_NAME(GETDENTS)	},
341 #endif
342 
343 #ifndef __linux__
344 	{ DUALCALL_MKNOD,	S(REALMKNOD),	RSYS_NAME(MKNOD)	},
345 #endif
346 
347 #ifdef __NetBSD__
348 	{ DUALCALL_GETFH,	S(REALGETFH),	RSYS_NAME(GETFH)	},
349 	{ DUALCALL_FHOPEN,	S(REALFHOPEN),	RSYS_NAME(FHOPEN)	},
350 	{ DUALCALL_FHSTAT,	S(REALFHSTAT),	RSYS_NAME(FHSTAT)	},
351 	{ DUALCALL_FHSTATVFS1,	S(REALFHSTATVFS1),RSYS_NAME(FHSTATVFS1)	},
352 #endif
353 
354 #ifdef HAVE_KQUEUE
355 	{ DUALCALL_KEVENT,	S(REALKEVENT),	RSYS_NAME(KEVENT)	},
356 #endif
357 
358 #ifdef __NetBSD__
359 	{ DUALCALL___SYSCTL,	"__sysctl",	RSYS_NAME(__SYSCTL)	},
360 	{ DUALCALL_MODCTL,	"modctl",	RSYS_NAME(MODCTL)	},
361 #endif
362 
363 #ifdef __NetBSD__
364 	{ DUALCALL_NFSSVC,	"nfssvc",	RSYS_NAME(NFSSVC)	},
365 #endif
366 
367 #ifdef __NetBSD__
368 	{ DUALCALL_STATVFS1,	"statvfs1",	RSYS_NAME(STATVFS1)	},
369 	{ DUALCALL_FSTATVFS1,	"fstatvfs1",	RSYS_NAME(FSTATVFS1)	},
370 	{ DUALCALL_GETVFSSTAT,	"getvfsstat",	RSYS_NAME(GETVFSSTAT)	},
371 #endif
372 
373 #ifdef __NetBSD__
374 	{ DUALCALL_MOUNT,	S(REALMOUNT),	RSYS_NAME(MOUNT)	},
375 	{ DUALCALL_UNMOUNT,	"unmount",	RSYS_NAME(UNMOUNT)	},
376 #endif
377 
378 #ifdef HAVE_FSYNC_RANGE
379 	{ DUALCALL_FSYNC_RANGE,	"fsync_range",	RSYS_NAME(FSYNC_RANGE)	},
380 #endif
381 
382 #ifdef HAVE_CHFLAGS
383 	{ DUALCALL_CHFLAGS,	"chflags",	RSYS_NAME(CHFLAGS)	},
384 	{ DUALCALL_LCHFLAGS,	"lchflags",	RSYS_NAME(LCHFLAGS)	},
385 	{ DUALCALL_FCHFLAGS,	"fchflags",	RSYS_NAME(FCHFLAGS)	},
386 #endif /* HAVE_CHFLAGS */
387 
388 #ifdef HAVE___QUOTACTL
389 	{ DUALCALL_QUOTACTL,	"__quotactl",	RSYS_NAME(__QUOTACTL)	},
390 #endif /* HAVE___QUOTACTL */
391 
392 #ifdef __NetBSD__
393 	{ DUALCALL_LINKAT,	"linkat",	RSYS_NAME(LINKAT)	},
394 #endif
395 };
396 #undef S
397 
398 struct bothsys {
399 	void *bs_host;
400 	void *bs_rump;
401 } syscalls[DUALCALL__NUM];
402 #define GETSYSCALL(which, name) syscalls[DUALCALL_##name].bs_##which
403 
404 static pid_t	(*host_fork)(void);
405 static int	(*host_daemon)(int, int);
406 static void *	(*host_mmap)(void *, size_t, int, int, int, off_t);
407 
408 /*
409  * This tracks if our process is in a subdirectory of /rump.
410  * It's preserved over exec.
411  */
412 static bool pwdinrump;
413 
414 enum pathtype { PATH_HOST, PATH_RUMP, PATH_RUMPBLANKET };
415 
416 static bool		fd_isrump(int);
417 static enum pathtype	path_isrump(const char *);
418 
419 /* default FD_SETSIZE is 256 ==> default fdoff is 128 */
420 static int hijack_fdoff = FD_SETSIZE/2;
421 
422 /*
423  * Maintain a mapping table for the usual dup2 suspects.
424  * Could use atomic ops to operate on dup2vec, but an application
425  * racing there is not well-defined, so don't bother.
426  */
427 /* note: you cannot change this without editing the env-passing code */
428 #define DUP2HIGH 2
429 static uint32_t dup2vec[DUP2HIGH+1];
430 #define DUP2BIT (1<<31)
431 #define DUP2ALIAS (1<<30)
432 #define DUP2FDMASK ((1<<30)-1)
433 
434 static bool
435 isdup2d(int fd)
436 {
437 
438 	return fd <= DUP2HIGH && fd >= 0 && dup2vec[fd] & DUP2BIT;
439 }
440 
441 static int
442 mapdup2(int hostfd)
443 {
444 
445 	_DIAGASSERT(isdup2d(hostfd));
446 	return dup2vec[hostfd] & DUP2FDMASK;
447 }
448 
449 static int
450 unmapdup2(int rumpfd)
451 {
452 	int i;
453 
454 	for (i = 0; i <= DUP2HIGH; i++) {
455 		if (dup2vec[i] & DUP2BIT &&
456 		    (dup2vec[i] & DUP2FDMASK) == (unsigned)rumpfd)
457 			return i;
458 	}
459 	return -1;
460 }
461 
462 static void
463 setdup2(int hostfd, int rumpfd)
464 {
465 
466 	if (hostfd > DUP2HIGH) {
467 		_DIAGASSERT(0);
468 		return;
469 	}
470 
471 	dup2vec[hostfd] = DUP2BIT | DUP2ALIAS | rumpfd;
472 }
473 
474 static void
475 clrdup2(int hostfd)
476 {
477 
478 	if (hostfd > DUP2HIGH) {
479 		_DIAGASSERT(0);
480 		return;
481 	}
482 
483 	dup2vec[hostfd] = 0;
484 }
485 
486 static bool
487 killdup2alias(int rumpfd)
488 {
489 	int hostfd;
490 
491 	if ((hostfd = unmapdup2(rumpfd)) == -1)
492 		return false;
493 
494 	if (dup2vec[hostfd] & DUP2ALIAS) {
495 		dup2vec[hostfd] &= ~DUP2ALIAS;
496 		return true;
497 	}
498 	return false;
499 }
500 
501 //#define DEBUGJACK
502 #ifdef DEBUGJACK
503 #define DPRINTF(x) mydprintf x
504 static void
505 mydprintf(const char *fmt, ...)
506 {
507 	va_list ap;
508 
509 	if (isdup2d(STDERR_FILENO))
510 		return;
511 
512 	va_start(ap, fmt);
513 	vfprintf(stderr, fmt, ap);
514 	va_end(ap);
515 }
516 
517 static const char *
518 whichfd(int fd)
519 {
520 
521 	if (fd == -1)
522 		return "-1";
523 	else if (fd_isrump(fd))
524 		return "rump";
525 	else
526 		return "host";
527 }
528 
529 static const char *
530 whichpath(const char *path)
531 {
532 
533 	if (path_isrump(path))
534 		return "rump";
535 	else
536 		return "host";
537 }
538 
539 #else
540 #define DPRINTF(x)
541 #endif
542 
543 #define ATCALL(type, name, rcname, args, proto, vars)			\
544 type name args								\
545 {									\
546 	type (*fun) proto;						\
547 	int isrump = -1;						\
548 									\
549 	if (fd == AT_FDCWD || *path == '/') {				\
550 		isrump = path_isrump(path);				\
551 	} else {							\
552 		isrump = fd_isrump(fd);					\
553 	}								\
554 									\
555 	DPRINTF(("%s -> %d:%s (%s)\n", __STRING(name),			\
556 	    fd, path, isrump ? "rump" : "host"));			\
557 									\
558 	assert(isrump != -1);						\
559 	if (isrump) {							\
560 		fun = syscalls[rcname].bs_rump;				\
561 		if (fd != AT_FDCWD)					\
562 			fd = fd_host2rump(fd);				\
563 		path = path_host2rump(path);				\
564 	} else {							\
565 		fun = syscalls[rcname].bs_host;				\
566 	}								\
567 	return fun vars;						\
568 }
569 
570 #define FDCALL(type, name, rcname, args, proto, vars)			\
571 type name args								\
572 {									\
573 	type (*fun) proto;						\
574 									\
575 	DPRINTF(("%s -> %d (%s)\n", __STRING(name), fd,	whichfd(fd)));	\
576 	if (fd_isrump(fd)) {						\
577 		fun = syscalls[rcname].bs_rump;				\
578 		fd = fd_host2rump(fd);					\
579 	} else {							\
580 		fun = syscalls[rcname].bs_host;				\
581 	}								\
582 									\
583 	return fun vars;						\
584 }
585 
586 #define PATHCALL(type, name, rcname, args, proto, vars)			\
587 type name args								\
588 {									\
589 	type (*fun) proto;						\
590 	enum pathtype pt;						\
591 									\
592 	DPRINTF(("%s -> %s (%s)\n", __STRING(name), path,		\
593 	    whichpath(path)));						\
594 	if ((pt = path_isrump(path)) != PATH_HOST) {			\
595 		fun = syscalls[rcname].bs_rump;				\
596 		if (pt == PATH_RUMP)					\
597 			path = path_host2rump(path);			\
598 	} else {							\
599 		fun = syscalls[rcname].bs_host;				\
600 	}								\
601 									\
602 	return fun vars;						\
603 }
604 
605 #define VFSCALL(bit, type, name, rcname, args, proto, vars)		\
606 type name args								\
607 {									\
608 	type (*fun) proto;						\
609 									\
610 	DPRINTF(("%s (0x%x, 0x%x)\n", __STRING(name), bit, vfsbits));	\
611 	if (vfsbits & bit) {						\
612 		fun = syscalls[rcname].bs_rump;				\
613 	} else {							\
614 		fun = syscalls[rcname].bs_host;				\
615 	}								\
616 									\
617 	return fun vars;						\
618 }
619 
620 /*
621  * These variables are set from the RUMPHIJACK string and control
622  * which operations can product rump kernel file descriptors.
623  * This should be easily extendable for future needs.
624  */
625 #define RUMPHIJACK_DEFAULT "path=/rump,socket=all:nolocal"
626 static bool rumpsockets[PF_MAX];
627 static const char *rumpprefix;
628 static size_t rumpprefixlen;
629 
630 static struct {
631 	int pf;
632 	const char *name;
633 } socketmap[] = {
634 	{ PF_LOCAL, "local" },
635 	{ PF_INET, "inet" },
636 #ifdef PF_LINK
637 	{ PF_LINK, "link" },
638 #endif
639 #ifdef PF_OROUTE
640 	{ PF_OROUTE, "oroute" },
641 #endif
642 	{ PF_ROUTE, "route" },
643 	{ PF_INET6, "inet6" },
644 #ifdef PF_MPLS
645 	{ PF_MPLS, "mpls" },
646 #endif
647 	{ -1, NULL }
648 };
649 
650 static void
651 sockparser(char *buf)
652 {
653 	char *p, *l = NULL;
654 	bool value;
655 	int i;
656 
657 	/* if "all" is present, it must be specified first */
658 	if (strncmp(buf, "all", strlen("all")) == 0) {
659 		for (i = 0; i < (int)__arraycount(rumpsockets); i++) {
660 			rumpsockets[i] = true;
661 		}
662 		buf += strlen("all");
663 		if (*buf == ':')
664 			buf++;
665 	}
666 
667 	for (p = strtok_r(buf, ":", &l); p; p = strtok_r(NULL, ":", &l)) {
668 		value = true;
669 		if (strncmp(p, "no", strlen("no")) == 0) {
670 			value = false;
671 			p += strlen("no");
672 		}
673 
674 		for (i = 0; socketmap[i].name; i++) {
675 			if (strcmp(p, socketmap[i].name) == 0) {
676 				rumpsockets[socketmap[i].pf] = value;
677 				break;
678 			}
679 		}
680 		if (socketmap[i].name == NULL) {
681 			errx(1, "invalid socket specifier %s", p);
682 		}
683 	}
684 }
685 
686 static void
687 pathparser(char *buf)
688 {
689 
690 	/* sanity-check */
691 	if (*buf != '/')
692 		errx(1, "hijack path specifier must begin with ``/''");
693 	rumpprefixlen = strlen(buf);
694 	if (rumpprefixlen < 2)
695 		errx(1, "invalid hijack prefix: %s", buf);
696 	if (buf[rumpprefixlen-1] == '/' && strspn(buf, "/") != rumpprefixlen)
697 		errx(1, "hijack prefix may end in slash only if pure "
698 		    "slash, gave %s", buf);
699 
700 	if ((rumpprefix = strdup(buf)) == NULL)
701 		err(1, "strdup");
702 	rumpprefixlen = strlen(rumpprefix);
703 }
704 
705 static struct blanket {
706 	const char *pfx;
707 	size_t len;
708 } *blanket;
709 static int nblanket;
710 
711 static void
712 blanketparser(char *buf)
713 {
714 	char *p, *l = NULL;
715 	int i;
716 
717 	for (nblanket = 0, p = buf; p; p = strchr(p+1, ':'), nblanket++)
718 		continue;
719 
720 	blanket = malloc(nblanket * sizeof(*blanket));
721 	if (blanket == NULL)
722 		err(1, "alloc blanket %d", nblanket);
723 
724 	for (p = strtok_r(buf, ":", &l), i = 0; p;
725 	    p = strtok_r(NULL, ":", &l), i++) {
726 		blanket[i].pfx = strdup(p);
727 		if (blanket[i].pfx == NULL)
728 			err(1, "strdup blanket");
729 		blanket[i].len = strlen(p);
730 
731 		if (blanket[i].len == 0 || *blanket[i].pfx != '/')
732 			errx(1, "invalid blanket specifier %s", p);
733 		if (*(blanket[i].pfx + blanket[i].len-1) == '/')
734 			errx(1, "invalid blanket specifier %s", p);
735 	}
736 }
737 
738 #define VFSBIT_NFSSVC		0x01
739 #define VFSBIT_GETVFSSTAT	0x02
740 #define VFSBIT_FHCALLS		0x04
741 static unsigned vfsbits;
742 
743 static struct {
744 	int bit;
745 	const char *name;
746 } vfscalls[] = {
747 	{ VFSBIT_NFSSVC, "nfssvc" },
748 	{ VFSBIT_GETVFSSTAT, "getvfsstat" },
749 	{ VFSBIT_FHCALLS, "fhcalls" },
750 	{ -1, NULL }
751 };
752 
753 static void
754 vfsparser(char *buf)
755 {
756 	char *p, *l = NULL;
757 	bool turnon;
758 	unsigned int fullmask;
759 	int i;
760 
761 	/* build the full mask and sanity-check while we're at it */
762 	fullmask = 0;
763 	for (i = 0; vfscalls[i].name != NULL; i++) {
764 		if (fullmask & vfscalls[i].bit)
765 			errx(1, "problem exists between vi and chair");
766 		fullmask |= vfscalls[i].bit;
767 	}
768 
769 
770 	/* if "all" is present, it must be specified first */
771 	if (strncmp(buf, "all", strlen("all")) == 0) {
772 		vfsbits = fullmask;
773 		buf += strlen("all");
774 		if (*buf == ':')
775 			buf++;
776 	}
777 
778 	for (p = strtok_r(buf, ":", &l); p; p = strtok_r(NULL, ":", &l)) {
779 		turnon = true;
780 		if (strncmp(p, "no", strlen("no")) == 0) {
781 			turnon = false;
782 			p += strlen("no");
783 		}
784 
785 		for (i = 0; vfscalls[i].name; i++) {
786 			if (strcmp(p, vfscalls[i].name) == 0) {
787 				if (turnon)
788 					vfsbits |= vfscalls[i].bit;
789 				else
790 					vfsbits &= ~vfscalls[i].bit;
791 				break;
792 			}
793 		}
794 		if (vfscalls[i].name == NULL) {
795 			errx(1, "invalid vfscall specifier %s", p);
796 		}
797 	}
798 }
799 
800 static bool rumpsysctl = false;
801 
802 static void
803 sysctlparser(char *buf)
804 {
805 
806 	if (buf == NULL) {
807 		rumpsysctl = true;
808 		return;
809 	}
810 
811 	if (strcasecmp(buf, "y") == 0 || strcasecmp(buf, "yes") == 0 ||
812 	    strcasecmp(buf, "yep") == 0 || strcasecmp(buf, "tottakai") == 0) {
813 		rumpsysctl = true;
814 		return;
815 	}
816 	if (strcasecmp(buf, "n") == 0 || strcasecmp(buf, "no") == 0) {
817 		rumpsysctl = false;
818 		return;
819 	}
820 
821 	errx(1, "sysctl value should be y(es)/n(o), gave: %s", buf);
822 }
823 
824 static bool rumpmodctl = false;
825 
826 static void
827 modctlparser(char *buf)
828 {
829 
830 	if (buf == NULL) {
831 		rumpmodctl = true;
832 		return;
833 	}
834 
835 	if (strcasecmp(buf, "y") == 0 || strcasecmp(buf, "yes") == 0 ||
836 	    strcasecmp(buf, "yep") == 0 || strcasecmp(buf, "tottakai") == 0) {
837 		rumpmodctl = true;
838 		return;
839 	}
840 	if (strcasecmp(buf, "n") == 0 || strcasecmp(buf, "no") == 0) {
841 		rumpmodctl = false;
842 		return;
843 	}
844 
845 	errx(1, "modctl value should be y(es)/n(o), gave: %s", buf);
846 }
847 
848 static void
849 fdoffparser(char *buf)
850 {
851 	unsigned long fdoff;
852 	char *ep;
853 
854 	if (*buf == '-') {
855 		errx(1, "fdoff must not be negative");
856 	}
857 	fdoff = strtoul(buf, &ep, 10);
858 	if (*ep != '\0')
859 		errx(1, "invalid fdoff specifier \"%s\"", buf);
860 	if (fdoff >= INT_MAX/2 || fdoff < 3)
861 		errx(1, "fdoff out of range");
862 	hijack_fdoff = fdoff;
863 }
864 
865 static struct {
866 	void (*parsefn)(char *);
867 	const char *name;
868 	bool needvalues;
869 } hijackparse[] = {
870 	{ sockparser, "socket", true },
871 	{ pathparser, "path", true },
872 	{ blanketparser, "blanket", true },
873 	{ vfsparser, "vfs", true },
874 	{ sysctlparser, "sysctl", false },
875 	{ modctlparser, "modctl", false },
876 	{ fdoffparser, "fdoff", true },
877 	{ NULL, NULL, false },
878 };
879 
880 static void
881 parsehijack(char *hijack)
882 {
883 	char *p, *p2, *l;
884 	const char *hijackcopy;
885 	bool nop2;
886 	int i;
887 
888 	if ((hijackcopy = strdup(hijack)) == NULL)
889 		err(1, "strdup");
890 
891 	/* disable everything explicitly */
892 	for (i = 0; i < PF_MAX; i++)
893 		rumpsockets[i] = false;
894 
895 	for (p = strtok_r(hijack, ",", &l); p; p = strtok_r(NULL, ",", &l)) {
896 		nop2 = false;
897 		p2 = strchr(p, '=');
898 		if (!p2) {
899 			nop2 = true;
900 			p2 = p + strlen(p);
901 		}
902 
903 		for (i = 0; hijackparse[i].parsefn; i++) {
904 			if (strncmp(hijackparse[i].name, p,
905 			    (size_t)(p2-p)) == 0) {
906 				if (nop2 && hijackparse[i].needvalues)
907 					errx(1, "invalid hijack specifier: %s",
908 					    hijackcopy);
909 				hijackparse[i].parsefn(nop2 ? NULL : p2+1);
910 				break;
911 			}
912 		}
913 
914 		if (hijackparse[i].parsefn == NULL)
915 			errx(1, "invalid hijack specifier name in %s", p);
916 	}
917 
918 }
919 
920 static void __attribute__((constructor))
921 rcinit(void)
922 {
923 	char buf[1024];
924 	unsigned i, j;
925 
926 	host_fork = dlsym(RTLD_NEXT, "fork");
927 	host_daemon = dlsym(RTLD_NEXT, "daemon");
928 	if (host_mmap == NULL)
929 		host_mmap = dlsym(RTLD_NEXT, "mmap");
930 
931 	/*
932 	 * In theory cannot print anything during lookups because
933 	 * we might not have the call vector set up.  so, the errx()
934 	 * is a bit of a strech, but it might work.
935 	 */
936 
937 	for (i = 0; i < DUALCALL__NUM; i++) {
938 		/* build runtime O(1) access */
939 		for (j = 0; j < __arraycount(syscnames); j++) {
940 			if (syscnames[j].scm_callnum == i)
941 				break;
942 		}
943 
944 		if (j == __arraycount(syscnames))
945 			errx(1, "rumphijack error: syscall pos %d missing", i);
946 
947 		syscalls[i].bs_host = dlsym(RTLD_NEXT,
948 		    syscnames[j].scm_hostname);
949 		if (syscalls[i].bs_host == NULL)
950 			errx(1, "hostcall %s not found!",
951 			    syscnames[j].scm_hostname);
952 
953 		syscalls[i].bs_rump = dlsym(RTLD_NEXT,
954 		    syscnames[j].scm_rumpname);
955 		if (syscalls[i].bs_rump == NULL)
956 			errx(1, "rumpcall %s not found!",
957 			    syscnames[j].scm_rumpname);
958 	}
959 
960 	if (rumpclient_init() == -1)
961 		err(1, "rumpclient init");
962 
963 	/* check which syscalls we're supposed to hijack */
964 	if (getenv_r("RUMPHIJACK", buf, sizeof(buf)) == -1) {
965 		strcpy(buf, RUMPHIJACK_DEFAULT);
966 	}
967 	parsehijack(buf);
968 
969 	/* set client persistence level */
970 	if (getenv_r("RUMPHIJACK_RETRYCONNECT", buf, sizeof(buf)) != -1) {
971 		if (strcmp(buf, "die") == 0)
972 			rumpclient_setconnretry(RUMPCLIENT_RETRYCONN_DIE);
973 		else if (strcmp(buf, "inftime") == 0)
974 			rumpclient_setconnretry(RUMPCLIENT_RETRYCONN_INFTIME);
975 		else if (strcmp(buf, "once") == 0)
976 			rumpclient_setconnretry(RUMPCLIENT_RETRYCONN_ONCE);
977 		else {
978 			time_t timeout;
979 			char *ep;
980 
981 			timeout = (time_t)strtoll(buf, &ep, 10);
982 			if (timeout <= 0 || ep != buf + strlen(buf))
983 				errx(1, "RUMPHIJACK_RETRYCONNECT must be "
984 				    "keyword or integer, got: %s", buf);
985 
986 			rumpclient_setconnretry(timeout);
987 		}
988 	}
989 
990 	if (getenv_r("RUMPHIJACK__DUP2INFO", buf, sizeof(buf)) == 0) {
991 		if (sscanf(buf, "%u,%u,%u",
992 		    &dup2vec[0], &dup2vec[1], &dup2vec[2]) != 3) {
993 			warnx("invalid dup2mask: %s", buf);
994 			memset(dup2vec, 0, sizeof(dup2vec));
995 		}
996 		unsetenv("RUMPHIJACK__DUP2INFO");
997 	}
998 	if (getenv_r("RUMPHIJACK__PWDINRUMP", buf, sizeof(buf)) == 0) {
999 		pwdinrump = true;
1000 		unsetenv("RUMPHIJACK__PWDINRUMP");
1001 	}
1002 }
1003 
1004 static int
1005 fd_rump2host(int fd)
1006 {
1007 
1008 	if (fd == -1)
1009 		return fd;
1010 	return fd + hijack_fdoff;
1011 }
1012 
1013 static int
1014 fd_rump2host_withdup(int fd)
1015 {
1016 	int hfd;
1017 
1018 	_DIAGASSERT(fd != -1);
1019 	hfd = unmapdup2(fd);
1020 	if (hfd != -1) {
1021 		_DIAGASSERT(hfd <= DUP2HIGH);
1022 		return hfd;
1023 	}
1024 	return fd_rump2host(fd);
1025 }
1026 
1027 static int
1028 fd_host2rump(int fd)
1029 {
1030 	if (!isdup2d(fd))
1031 		return fd - hijack_fdoff;
1032 	else
1033 		return mapdup2(fd);
1034 }
1035 
1036 static bool
1037 fd_isrump(int fd)
1038 {
1039 
1040 	return isdup2d(fd) || fd >= hijack_fdoff;
1041 }
1042 
1043 #define assertfd(_fd_) assert(ISDUP2D(_fd_) || (_fd_) >= hijack_fdoff)
1044 
1045 static enum pathtype
1046 path_isrump(const char *path)
1047 {
1048 	size_t plen;
1049 	int i;
1050 
1051 	if (rumpprefix == NULL && nblanket == 0)
1052 		return PATH_HOST;
1053 
1054 	if (*path == '/') {
1055 		plen = strlen(path);
1056 		if (rumpprefix && plen >= rumpprefixlen) {
1057 			if (strncmp(path, rumpprefix, rumpprefixlen) == 0
1058 			    && (plen == rumpprefixlen
1059 			      || *(path + rumpprefixlen) == '/')) {
1060 				return PATH_RUMP;
1061 			}
1062 		}
1063 		for (i = 0; i < nblanket; i++) {
1064 			if (strncmp(path, blanket[i].pfx, blanket[i].len) == 0)
1065 				return PATH_RUMPBLANKET;
1066 		}
1067 
1068 		return PATH_HOST;
1069 	} else {
1070 		return pwdinrump ? PATH_RUMP : PATH_HOST;
1071 	}
1072 }
1073 
1074 static const char *rootpath = "/";
1075 static const char *
1076 path_host2rump(const char *path)
1077 {
1078 	const char *rv;
1079 
1080 	if (*path == '/') {
1081 		rv = path + rumpprefixlen;
1082 		if (*rv == '\0')
1083 			rv = rootpath;
1084 	} else {
1085 		rv = path;
1086 	}
1087 
1088 	return rv;
1089 }
1090 
1091 static int
1092 dodup(int oldd, int minfd)
1093 {
1094 	int (*op_fcntl)(int, int, ...);
1095 	int newd;
1096 	int isrump;
1097 
1098 	DPRINTF(("dup -> %d (minfd %d)\n", oldd, minfd));
1099 	if (fd_isrump(oldd)) {
1100 		op_fcntl = GETSYSCALL(rump, FCNTL);
1101 		oldd = fd_host2rump(oldd);
1102 		if (minfd >= hijack_fdoff)
1103 			minfd -= hijack_fdoff;
1104 		isrump = 1;
1105 	} else {
1106 		if (minfd >= hijack_fdoff) {
1107 			errno = EINVAL;
1108 			return -1;
1109 		}
1110 		op_fcntl = GETSYSCALL(host, FCNTL);
1111 		isrump = 0;
1112 	}
1113 
1114 	newd = op_fcntl(oldd, F_DUPFD, minfd);
1115 
1116 	if (isrump)
1117 		newd = fd_rump2host(newd);
1118 	DPRINTF(("dup <- %d\n", newd));
1119 
1120 	return newd;
1121 }
1122 
1123 /*
1124  * Check that host fd value does not exceed fdoffset and if necessary
1125  * dup the file descriptor so that it doesn't collide with the dup2mask.
1126  */
1127 static int
1128 fd_host2host(int fd)
1129 {
1130 	int (*op_fcntl)(int, int, ...) = GETSYSCALL(host, FCNTL);
1131 	int (*op_close)(int) = GETSYSCALL(host, CLOSE);
1132 	int ofd, i;
1133 
1134 	if (fd >= hijack_fdoff) {
1135 		op_close(fd);
1136 		errno = ENFILE;
1137 		return -1;
1138 	}
1139 
1140 	for (i = 1; isdup2d(fd); i++) {
1141 		ofd = fd;
1142 		fd = op_fcntl(ofd, F_DUPFD, i);
1143 		op_close(ofd);
1144 	}
1145 
1146 	return fd;
1147 }
1148 
1149 int
1150 open(const char *path, int flags, ...)
1151 {
1152 	int (*op_open)(const char *, int, ...);
1153 	bool isrump;
1154 	va_list ap;
1155 	enum pathtype pt;
1156 	int fd;
1157 
1158 	DPRINTF(("open -> %s (%s)\n", path, whichpath(path)));
1159 
1160 	if ((pt = path_isrump(path)) != PATH_HOST) {
1161 		if (pt == PATH_RUMP)
1162 			path = path_host2rump(path);
1163 		op_open = GETSYSCALL(rump, OPEN);
1164 		isrump = true;
1165 	} else {
1166 		op_open = GETSYSCALL(host, OPEN);
1167 		isrump = false;
1168 	}
1169 
1170 	va_start(ap, flags);
1171 	fd = op_open(path, flags, va_arg(ap, mode_t));
1172 	va_end(ap);
1173 
1174 	if (isrump)
1175 		fd = fd_rump2host(fd);
1176 	else
1177 		fd = fd_host2host(fd);
1178 
1179 	DPRINTF(("open <- %d (%s)\n", fd, whichfd(fd)));
1180 	return fd;
1181 }
1182 
1183 int
1184 chdir(const char *path)
1185 {
1186 	int (*op_chdir)(const char *);
1187 	enum pathtype pt;
1188 	int rv;
1189 
1190 	if ((pt = path_isrump(path)) != PATH_HOST) {
1191 		op_chdir = GETSYSCALL(rump, CHDIR);
1192 		if (pt == PATH_RUMP)
1193 			path = path_host2rump(path);
1194 	} else {
1195 		op_chdir = GETSYSCALL(host, CHDIR);
1196 	}
1197 
1198 	rv = op_chdir(path);
1199 	if (rv == 0)
1200 		pwdinrump = pt != PATH_HOST;
1201 
1202 	return rv;
1203 }
1204 
1205 int
1206 fchdir(int fd)
1207 {
1208 	int (*op_fchdir)(int);
1209 	bool isrump;
1210 	int rv;
1211 
1212 	if (fd_isrump(fd)) {
1213 		op_fchdir = GETSYSCALL(rump, FCHDIR);
1214 		isrump = true;
1215 		fd = fd_host2rump(fd);
1216 	} else {
1217 		op_fchdir = GETSYSCALL(host, FCHDIR);
1218 		isrump = false;
1219 	}
1220 
1221 	rv = op_fchdir(fd);
1222 	if (rv == 0) {
1223 		pwdinrump = isrump;
1224 	}
1225 
1226 	return rv;
1227 }
1228 
1229 #ifndef __linux__
1230 int
1231 __getcwd(char *bufp, size_t len)
1232 {
1233 	int (*op___getcwd)(char *, size_t);
1234 	size_t prefixgap;
1235 	bool iamslash;
1236 	int rv;
1237 
1238 	if (pwdinrump && rumpprefix) {
1239 		if (rumpprefix[rumpprefixlen-1] == '/')
1240 			iamslash = true;
1241 		else
1242 			iamslash = false;
1243 
1244 		if (iamslash)
1245 			prefixgap = rumpprefixlen - 1; /* ``//+path'' */
1246 		else
1247 			prefixgap = rumpprefixlen; /* ``/pfx+/path'' */
1248 		if (len <= prefixgap) {
1249 			errno = ERANGE;
1250 			return -1;
1251 		}
1252 
1253 		op___getcwd = GETSYSCALL(rump, __GETCWD);
1254 		rv = op___getcwd(bufp + prefixgap, len - prefixgap);
1255 		if (rv == -1)
1256 			return rv;
1257 
1258 		/* augment the "/" part only for a non-root path */
1259 		memcpy(bufp, rumpprefix, rumpprefixlen);
1260 
1261 		/* append / only to non-root cwd */
1262 		if (rv != 2)
1263 			bufp[prefixgap] = '/';
1264 
1265 		/* don't append extra slash in the purely-slash case */
1266 		if (rv == 2 && !iamslash)
1267 			bufp[rumpprefixlen] = '\0';
1268 	} else if (pwdinrump) {
1269 		/* assume blanket.  we can't provide a prefix here */
1270 		op___getcwd = GETSYSCALL(rump, __GETCWD);
1271 		rv = op___getcwd(bufp, len);
1272 	} else {
1273 		op___getcwd = GETSYSCALL(host, __GETCWD);
1274 		rv = op___getcwd(bufp, len);
1275 	}
1276 
1277 	return rv;
1278 }
1279 #endif
1280 
1281 static int
1282 moveish(const char *from, const char *to,
1283     int (*rump_op)(const char *, const char *),
1284     int (*host_op)(const char *, const char *))
1285 {
1286 	int (*op)(const char *, const char *);
1287 	enum pathtype ptf, ptt;
1288 
1289 	if ((ptf = path_isrump(from)) != PATH_HOST) {
1290 		if ((ptt = path_isrump(to)) == PATH_HOST) {
1291 			errno = EXDEV;
1292 			return -1;
1293 		}
1294 
1295 		if (ptf == PATH_RUMP)
1296 			from = path_host2rump(from);
1297 		if (ptt == PATH_RUMP)
1298 			to = path_host2rump(to);
1299 		op = rump_op;
1300 	} else {
1301 		if (path_isrump(to) != PATH_HOST) {
1302 			errno = EXDEV;
1303 			return -1;
1304 		}
1305 
1306 		op = host_op;
1307 	}
1308 
1309 	return op(from, to);
1310 }
1311 
1312 #ifdef __NetBSD__
1313 int
1314 linkat(int fromfd, const char *from, int tofd, const char *to, int flags)
1315 {
1316 	if (fromfd != AT_FDCWD || tofd != AT_FDCWD
1317 	    || flags != AT_SYMLINK_FOLLOW)
1318 		return ENOSYS;
1319 
1320 	return moveish(from, to,
1321 	    GETSYSCALL(rump, LINK), GETSYSCALL(host, LINK));
1322 }
1323 #endif
1324 
1325 int
1326 link(const char *from, const char *to)
1327 {
1328 	return moveish(from, to,
1329 	    GETSYSCALL(rump, LINK), GETSYSCALL(host, LINK));
1330 }
1331 
1332 int
1333 rename(const char *from, const char *to)
1334 {
1335 	return moveish(from, to,
1336 	    GETSYSCALL(rump, RENAME), GETSYSCALL(host, RENAME));
1337 }
1338 
1339 int
1340 REALSOCKET(int domain, int type, int protocol)
1341 {
1342 	int (*op_socket)(int, int, int);
1343 	int fd;
1344 	bool isrump;
1345 
1346 	isrump = domain < PF_MAX && rumpsockets[domain];
1347 
1348 	if (isrump)
1349 		op_socket = GETSYSCALL(rump, SOCKET);
1350 	else
1351 		op_socket = GETSYSCALL(host, SOCKET);
1352 	fd = op_socket(domain, type, protocol);
1353 
1354 	if (isrump)
1355 		fd = fd_rump2host(fd);
1356 	else
1357 		fd = fd_host2host(fd);
1358 	DPRINTF(("socket <- %d\n", fd));
1359 
1360 	return fd;
1361 }
1362 
1363 int
1364 accept(int s, struct sockaddr *addr, socklen_t *addrlen)
1365 {
1366 	int (*op_accept)(int, struct sockaddr *, socklen_t *);
1367 	int fd;
1368 	bool isrump;
1369 
1370 	isrump = fd_isrump(s);
1371 
1372 	DPRINTF(("accept -> %d", s));
1373 	if (isrump) {
1374 		op_accept = GETSYSCALL(rump, ACCEPT);
1375 		s = fd_host2rump(s);
1376 	} else {
1377 		op_accept = GETSYSCALL(host, ACCEPT);
1378 	}
1379 	fd = op_accept(s, addr, addrlen);
1380 	if (fd != -1 && isrump)
1381 		fd = fd_rump2host(fd);
1382 	else
1383 		fd = fd_host2host(fd);
1384 
1385 	DPRINTF((" <- %d\n", fd));
1386 
1387 	return fd;
1388 }
1389 
1390 #ifndef __linux__
1391 int
1392 paccept(int s, struct sockaddr *addr, socklen_t *addrlen,
1393     const sigset_t * restrict sigmask, int flags)
1394 {
1395 	int (*op_paccept)(int, struct sockaddr *, socklen_t *,
1396 	    const sigset_t * restrict, int);
1397 	int fd;
1398 	bool isrump;
1399 
1400 	isrump = fd_isrump(s);
1401 
1402 	DPRINTF(("paccept -> %d", s));
1403 	if (isrump) {
1404 		op_paccept = GETSYSCALL(rump, PACCEPT);
1405 		s = fd_host2rump(s);
1406 	} else {
1407 		op_paccept = GETSYSCALL(host, PACCEPT);
1408 	}
1409 	fd = op_paccept(s, addr, addrlen, sigmask, flags);
1410 	if (fd != -1 && isrump)
1411 		fd = fd_rump2host(fd);
1412 	else
1413 		fd = fd_host2host(fd);
1414 
1415 	DPRINTF((" <- %d\n", fd));
1416 
1417 	return fd;
1418 }
1419 #endif
1420 
1421 /*
1422  * ioctl() and fcntl() are varargs calls and need special treatment.
1423  */
1424 
1425 /*
1426  * Various [Linux] libc's have various signatures for ioctl so we
1427  * need to handle the discrepancies.  On NetBSD, we use the
1428  * one with unsigned long cmd.
1429  */
1430 int
1431 #ifdef HAVE_IOCTL_CMD_INT
1432 ioctl(int fd, int cmd, ...)
1433 {
1434 	int (*op_ioctl)(int, int cmd, ...);
1435 #else
1436 ioctl(int fd, unsigned long cmd, ...)
1437 {
1438 	int (*op_ioctl)(int, unsigned long cmd, ...);
1439 #endif
1440 	va_list ap;
1441 	int rv;
1442 
1443 	DPRINTF(("ioctl -> %d (%s)\n", fd, whichfd(fd)));
1444 	if (fd_isrump(fd)) {
1445 		fd = fd_host2rump(fd);
1446 		op_ioctl = GETSYSCALL(rump, IOCTL);
1447 	} else {
1448 		op_ioctl = GETSYSCALL(host, IOCTL);
1449 	}
1450 
1451 	va_start(ap, cmd);
1452 	rv = op_ioctl(fd, cmd, va_arg(ap, void *));
1453 	va_end(ap);
1454 	DPRINTF(("ioctl <- %d\n", rv));
1455 	return rv;
1456 }
1457 
1458 int
1459 fcntl(int fd, int cmd, ...)
1460 {
1461 	int (*op_fcntl)(int, int, ...);
1462 	va_list ap;
1463 	int rv, minfd;
1464 
1465 	DPRINTF(("fcntl -> %d (cmd %d)\n", fd, cmd));
1466 
1467 	switch (cmd) {
1468 	case F_DUPFD_CLOEXEC:	/* Ignore CLOEXEC bit for now */
1469 	case F_DUPFD:
1470 		va_start(ap, cmd);
1471 		minfd = va_arg(ap, int);
1472 		va_end(ap);
1473 		return dodup(fd, minfd);
1474 
1475 #ifdef F_CLOSEM
1476 	case F_CLOSEM: {
1477 		int maxdup2, i;
1478 
1479 		/*
1480 		 * So, if fd < HIJACKOFF, we want to do a host closem.
1481 		 */
1482 
1483 		if (fd < hijack_fdoff) {
1484 			int closemfd = fd;
1485 
1486 			if (rumpclient__closenotify(&closemfd,
1487 			    RUMPCLIENT_CLOSE_FCLOSEM) == -1)
1488 				return -1;
1489 			op_fcntl = GETSYSCALL(host, FCNTL);
1490 			rv = op_fcntl(closemfd, cmd);
1491 			if (rv)
1492 				return rv;
1493 		}
1494 
1495 		/*
1496 		 * Additionally, we want to do a rump closem, but only
1497 		 * for the file descriptors not dup2'd.
1498 		 */
1499 
1500 		for (i = 0, maxdup2 = -1; i <= DUP2HIGH; i++) {
1501 			if (dup2vec[i] & DUP2BIT) {
1502 				int val;
1503 
1504 				val = dup2vec[i] & DUP2FDMASK;
1505 				maxdup2 = MAX(val, maxdup2);
1506 			}
1507 		}
1508 
1509 		if (fd >= hijack_fdoff)
1510 			fd -= hijack_fdoff;
1511 		else
1512 			fd = 0;
1513 		fd = MAX(maxdup2+1, fd);
1514 
1515 		/* hmm, maybe we should close rump fd's not within dup2mask? */
1516 		return rump_sys_fcntl(fd, F_CLOSEM);
1517 	}
1518 #endif /* F_CLOSEM */
1519 
1520 #ifdef F_MAXFD
1521 	case F_MAXFD:
1522 		/*
1523 		 * For maxfd, if there's a rump kernel fd, return
1524 		 * it hostified.  Otherwise, return host's MAXFD
1525 		 * return value.
1526 		 */
1527 		if ((rv = rump_sys_fcntl(fd, F_MAXFD)) != -1) {
1528 			/*
1529 			 * This might go a little wrong in case
1530 			 * of dup2 to [012], but I'm not sure if
1531 			 * there's a justification for tracking
1532 			 * that info.  Consider e.g.
1533 			 * dup2(rumpfd, 2) followed by rump_sys_open()
1534 			 * returning 1.  We should return 1+HIJACKOFF,
1535 			 * not 2+HIJACKOFF.  However, if [01] is not
1536 			 * open, the correct return value is 2.
1537 			 */
1538 			return fd_rump2host(fd);
1539 		} else {
1540 			op_fcntl = GETSYSCALL(host, FCNTL);
1541 			return op_fcntl(fd, F_MAXFD);
1542 		}
1543 		/*NOTREACHED*/
1544 #endif /* F_MAXFD */
1545 
1546 	default:
1547 		if (fd_isrump(fd)) {
1548 			fd = fd_host2rump(fd);
1549 			op_fcntl = GETSYSCALL(rump, FCNTL);
1550 		} else {
1551 			op_fcntl = GETSYSCALL(host, FCNTL);
1552 		}
1553 
1554 		va_start(ap, cmd);
1555 		rv = op_fcntl(fd, cmd, va_arg(ap, void *));
1556 		va_end(ap);
1557 		return rv;
1558 	}
1559 	/*NOTREACHED*/
1560 }
1561 
1562 int
1563 close(int fd)
1564 {
1565 	int (*op_close)(int);
1566 	int rv;
1567 
1568 	DPRINTF(("close -> %d\n", fd));
1569 	if (fd_isrump(fd)) {
1570 		bool undup2 = false;
1571 		int ofd;
1572 
1573 		if (isdup2d(ofd = fd)) {
1574 			undup2 = true;
1575 		}
1576 
1577 		fd = fd_host2rump(fd);
1578 		if (!undup2 && killdup2alias(fd)) {
1579 			return 0;
1580 		}
1581 
1582 		op_close = GETSYSCALL(rump, CLOSE);
1583 		rv = op_close(fd);
1584 		if (rv == 0 && undup2) {
1585 			clrdup2(ofd);
1586 		}
1587 	} else {
1588 		if (rumpclient__closenotify(&fd, RUMPCLIENT_CLOSE_CLOSE) == -1)
1589 			return -1;
1590 		op_close = GETSYSCALL(host, CLOSE);
1591 		rv = op_close(fd);
1592 	}
1593 
1594 	return rv;
1595 }
1596 
1597 /*
1598  * write cannot issue a standard debug printf due to recursion
1599  */
1600 ssize_t
1601 write(int fd, const void *buf, size_t blen)
1602 {
1603 	ssize_t (*op_write)(int, const void *, size_t);
1604 
1605 	if (fd_isrump(fd)) {
1606 		fd = fd_host2rump(fd);
1607 		op_write = GETSYSCALL(rump, WRITE);
1608 	} else {
1609 		op_write = GETSYSCALL(host, WRITE);
1610 	}
1611 
1612 	return op_write(fd, buf, blen);
1613 }
1614 
1615 /*
1616  * file descriptor passing
1617  *
1618  * we intercept sendmsg and recvmsg to convert file descriptors in
1619  * control messages.  an attempt to send a descriptor from a different kernel
1620  * is rejected.  (ENOTSUP)
1621  */
1622 
1623 static int
1624 _msg_convert_fds(struct msghdr *msg, int (*func)(int), bool dryrun)
1625 {
1626 	struct cmsghdr *cmsg;
1627 
1628 	for (cmsg = CMSG_FIRSTHDR(msg); cmsg != NULL;
1629 	    cmsg = CMSG_NXTHDR(msg, cmsg)) {
1630 		if (cmsg->cmsg_level == SOL_SOCKET &&
1631 		    cmsg->cmsg_type == SCM_RIGHTS) {
1632 			int *fdp = (void *)CMSG_DATA(cmsg);
1633 			const size_t size =
1634 			    cmsg->cmsg_len - __CMSG_ALIGN(sizeof(*cmsg));
1635 			const int nfds = (int)(size / sizeof(int));
1636 			const int * const efdp = fdp + nfds;
1637 
1638 			while (fdp < efdp) {
1639 				const int newval = func(*fdp);
1640 
1641 				if (newval < 0) {
1642 					return ENOTSUP;
1643 				}
1644 				if (!dryrun)
1645 					*fdp = newval;
1646 				fdp++;
1647 			}
1648 		}
1649 	}
1650 	return 0;
1651 }
1652 
1653 static int
1654 msg_convert_fds(struct msghdr *msg, int (*func)(int))
1655 {
1656 
1657 	return _msg_convert_fds(msg, func, false);
1658 }
1659 
1660 static int
1661 msg_check_fds(struct msghdr *msg, int (*func)(int))
1662 {
1663 
1664 	return _msg_convert_fds(msg, func, true);
1665 }
1666 
1667 ssize_t
1668 recvmsg(int fd, struct msghdr *msg, int flags)
1669 {
1670 	ssize_t (*op_recvmsg)(int, struct msghdr *, int);
1671 	ssize_t ret;
1672 	const bool isrump = fd_isrump(fd);
1673 
1674 	if (isrump) {
1675 		fd = fd_host2rump(fd);
1676 		op_recvmsg = GETSYSCALL(rump, RECVMSG);
1677 	} else {
1678 		op_recvmsg = GETSYSCALL(host, RECVMSG);
1679 	}
1680 	ret = op_recvmsg(fd, msg, flags);
1681 	if (ret == -1) {
1682 		return ret;
1683 	}
1684 	/*
1685 	 * convert descriptors in the message.
1686 	 */
1687 	if (isrump) {
1688 		msg_convert_fds(msg, fd_rump2host);
1689 	} else {
1690 		msg_convert_fds(msg, fd_host2host);
1691 	}
1692 	return ret;
1693 }
1694 
1695 ssize_t
1696 recv(int fd, void *buf, size_t len, int flags)
1697 {
1698 
1699 	return recvfrom(fd, buf, len, flags, NULL, NULL);
1700 }
1701 
1702 ssize_t
1703 send(int fd, const void *buf, size_t len, int flags)
1704 {
1705 
1706 	return sendto(fd, buf, len, flags, NULL, 0);
1707 }
1708 
1709 static int
1710 fd_check_rump(int fd)
1711 {
1712 
1713 	return fd_isrump(fd) ? 0 : -1;
1714 }
1715 
1716 static int
1717 fd_check_host(int fd)
1718 {
1719 
1720 	return !fd_isrump(fd) ? 0 : -1;
1721 }
1722 
1723 ssize_t
1724 sendmsg(int fd, const struct msghdr *msg, int flags)
1725 {
1726 	ssize_t (*op_sendmsg)(int, const struct msghdr *, int);
1727 	const bool isrump = fd_isrump(fd);
1728 	int error;
1729 
1730 	/*
1731 	 * reject descriptors from a different kernel.
1732 	 */
1733 	error = msg_check_fds(__UNCONST(msg),
1734 	    isrump ? fd_check_rump: fd_check_host);
1735 	if (error != 0) {
1736 		errno = error;
1737 		return -1;
1738 	}
1739 	/*
1740 	 * convert descriptors in the message to raw values.
1741 	 */
1742 	if (isrump) {
1743 		fd = fd_host2rump(fd);
1744 		/*
1745 		 * XXX we directly modify the given message assuming:
1746 		 * - cmsg is writable (typically on caller's stack)
1747 		 * - caller don't care cmsg's contents after calling sendmsg.
1748 		 *   (thus no need to restore values)
1749 		 *
1750 		 * it's safer to copy and modify instead.
1751 		 */
1752 		msg_convert_fds(__UNCONST(msg), fd_host2rump);
1753 		op_sendmsg = GETSYSCALL(rump, SENDMSG);
1754 	} else {
1755 		op_sendmsg = GETSYSCALL(host, SENDMSG);
1756 	}
1757 	return op_sendmsg(fd, msg, flags);
1758 }
1759 
1760 /*
1761  * dup2 is special.  we allow dup2 of a rump kernel fd to 0-2 since
1762  * many programs do that.  dup2 of a rump kernel fd to another value
1763  * not >= fdoff is an error.
1764  *
1765  * Note: cannot rump2host newd, because it is often hardcoded.
1766  */
1767 int
1768 dup2(int oldd, int newd)
1769 {
1770 	int (*host_dup2)(int, int);
1771 	int rv;
1772 
1773 	DPRINTF(("dup2 -> %d (o) -> %d (n)\n", oldd, newd));
1774 
1775 	if (fd_isrump(oldd)) {
1776 		int (*op_close)(int) = GETSYSCALL(host, CLOSE);
1777 
1778 		/* only allow fd 0-2 for cross-kernel dup */
1779 		if (!(newd >= 0 && newd <= 2 && !fd_isrump(newd))) {
1780 			errno = EBADF;
1781 			return -1;
1782 		}
1783 
1784 		/* regular dup2? */
1785 		if (fd_isrump(newd)) {
1786 			newd = fd_host2rump(newd);
1787 			rv = rump_sys_dup2(oldd, newd);
1788 			return fd_rump2host(rv);
1789 		}
1790 
1791 		/*
1792 		 * dup2 rump => host?  just establish an
1793 		 * entry in the mapping table.
1794 		 */
1795 		op_close(newd);
1796 		setdup2(newd, fd_host2rump(oldd));
1797 		rv = 0;
1798 	} else {
1799 		host_dup2 = syscalls[DUALCALL_DUP2].bs_host;
1800 		if (rumpclient__closenotify(&newd, RUMPCLIENT_CLOSE_DUP2) == -1)
1801 			return -1;
1802 		rv = host_dup2(oldd, newd);
1803 	}
1804 
1805 	return rv;
1806 }
1807 
1808 int
1809 dup(int oldd)
1810 {
1811 
1812 	return dodup(oldd, 0);
1813 }
1814 
1815 pid_t
1816 fork(void)
1817 {
1818 	pid_t rv;
1819 
1820 	DPRINTF(("fork\n"));
1821 
1822 	rv = rumpclient__dofork(host_fork);
1823 
1824 	DPRINTF(("fork returns %d\n", rv));
1825 	return rv;
1826 }
1827 #ifdef VFORK
1828 /* we do not have the luxury of not requiring a stackframe */
1829 #define	__strong_alias_macro(m, f)	__strong_alias(m, f)
1830 __strong_alias_macro(VFORK,fork);
1831 #endif
1832 
1833 int
1834 daemon(int nochdir, int noclose)
1835 {
1836 	struct rumpclient_fork *rf;
1837 
1838 	if ((rf = rumpclient_prefork()) == NULL)
1839 		return -1;
1840 
1841 	if (host_daemon(nochdir, noclose) == -1)
1842 		return -1;
1843 
1844 	if (rumpclient_fork_init(rf) == -1)
1845 		return -1;
1846 
1847 	return 0;
1848 }
1849 
1850 int
1851 execve(const char *path, char *const argv[], char *const envp[])
1852 {
1853 	char buf[128];
1854 	char *dup2str;
1855 	const char *pwdinrumpstr;
1856 	char **newenv;
1857 	size_t nelem;
1858 	int rv, sverrno;
1859 	int bonus = 2, i = 0;
1860 
1861 	snprintf(buf, sizeof(buf), "RUMPHIJACK__DUP2INFO=%u,%u,%u",
1862 	    dup2vec[0], dup2vec[1], dup2vec[2]);
1863 	dup2str = strdup(buf);
1864 	if (dup2str == NULL) {
1865 		errno = ENOMEM;
1866 		return -1;
1867 	}
1868 
1869 	if (pwdinrump) {
1870 		pwdinrumpstr = "RUMPHIJACK__PWDINRUMP=true";
1871 		bonus++;
1872 	} else {
1873 		pwdinrumpstr = NULL;
1874 	}
1875 
1876 	for (nelem = 0; envp && envp[nelem]; nelem++)
1877 		continue;
1878 	newenv = malloc(sizeof(*newenv) * (nelem+bonus));
1879 	if (newenv == NULL) {
1880 		free(dup2str);
1881 		errno = ENOMEM;
1882 		return -1;
1883 	}
1884 	memcpy(newenv, envp, nelem*sizeof(*newenv));
1885 	newenv[nelem+i] = dup2str;
1886 	i++;
1887 
1888 	if (pwdinrumpstr) {
1889 		newenv[nelem+i] = __UNCONST(pwdinrumpstr);
1890 		i++;
1891 	}
1892 	newenv[nelem+i] = NULL;
1893 	_DIAGASSERT(i < bonus);
1894 
1895 	rv = rumpclient_exec(path, argv, newenv);
1896 
1897 	_DIAGASSERT(rv != 0);
1898 	sverrno = errno;
1899 	free(newenv);
1900 	free(dup2str);
1901 	errno = sverrno;
1902 	return rv;
1903 }
1904 
1905 /*
1906  * select is done by calling poll.
1907  */
1908 int
1909 REALSELECT(int nfds, fd_set *readfds, fd_set *writefds, fd_set *exceptfds,
1910 	struct timeval *timeout)
1911 {
1912 	struct pollfd *pfds;
1913 	struct timespec ts, *tsp = NULL;
1914 	nfds_t realnfds;
1915 	int i, j;
1916 	int rv, incr;
1917 
1918 	DPRINTF(("select %d %p %p %p %p\n", nfds,
1919 	    readfds, writefds, exceptfds, timeout));
1920 
1921 	/*
1922 	 * Well, first we must scan the fds to figure out how many
1923 	 * fds there really are.  This is because up to and including
1924 	 * nb5 poll() silently refuses nfds > process_maxopen_fds.
1925 	 * Seems to be fixed in current, thank the maker.
1926 	 * god damn cluster...bomb.
1927 	 */
1928 
1929 	for (i = 0, realnfds = 0; i < nfds; i++) {
1930 		if (readfds && FD_ISSET(i, readfds)) {
1931 			realnfds++;
1932 			continue;
1933 		}
1934 		if (writefds && FD_ISSET(i, writefds)) {
1935 			realnfds++;
1936 			continue;
1937 		}
1938 		if (exceptfds && FD_ISSET(i, exceptfds)) {
1939 			realnfds++;
1940 			continue;
1941 		}
1942 	}
1943 
1944 	if (realnfds) {
1945 		pfds = calloc(realnfds, sizeof(*pfds));
1946 		if (!pfds)
1947 			return -1;
1948 	} else {
1949 		pfds = NULL;
1950 	}
1951 
1952 	for (i = 0, j = 0; i < nfds; i++) {
1953 		incr = 0;
1954 		if (readfds && FD_ISSET(i, readfds)) {
1955 			pfds[j].fd = i;
1956 			pfds[j].events |= POLLIN;
1957 			incr=1;
1958 		}
1959 		if (writefds && FD_ISSET(i, writefds)) {
1960 			pfds[j].fd = i;
1961 			pfds[j].events |= POLLOUT;
1962 			incr=1;
1963 		}
1964 		if (exceptfds && FD_ISSET(i, exceptfds)) {
1965 			pfds[j].fd = i;
1966 			pfds[j].events |= POLLHUP|POLLERR;
1967 			incr=1;
1968 		}
1969 		if (incr)
1970 			j++;
1971 	}
1972 	assert(j == (int)realnfds);
1973 
1974 	if (timeout) {
1975 		TIMEVAL_TO_TIMESPEC(timeout, &ts);
1976 		tsp = &ts;
1977 	}
1978 	rv = REALPOLLTS(pfds, realnfds, tsp, NULL);
1979 	/*
1980 	 * "If select() returns with an error the descriptor sets
1981 	 * will be unmodified"
1982 	 */
1983 	if (rv < 0)
1984 		goto out;
1985 
1986 	/*
1987 	 * zero out results (can't use FD_ZERO for the
1988 	 * obvious select-me-not reason).  whee.
1989 	 *
1990 	 * We do this here since some software ignores the return
1991 	 * value of select, and hence if the timeout expires, it may
1992 	 * assume all input descriptors have activity.
1993 	 */
1994 	for (i = 0; i < nfds; i++) {
1995 		if (readfds)
1996 			FD_CLR(i, readfds);
1997 		if (writefds)
1998 			FD_CLR(i, writefds);
1999 		if (exceptfds)
2000 			FD_CLR(i, exceptfds);
2001 	}
2002 	if (rv == 0)
2003 		goto out;
2004 
2005 	/*
2006 	 * We have >0 fds with activity.  Harvest the results.
2007 	 */
2008 	for (i = 0; i < (int)realnfds; i++) {
2009 		if (readfds) {
2010 			if (pfds[i].revents & POLLIN) {
2011 				FD_SET(pfds[i].fd, readfds);
2012 			}
2013 		}
2014 		if (writefds) {
2015 			if (pfds[i].revents & POLLOUT) {
2016 				FD_SET(pfds[i].fd, writefds);
2017 			}
2018 		}
2019 		if (exceptfds) {
2020 			if (pfds[i].revents & (POLLHUP|POLLERR)) {
2021 				FD_SET(pfds[i].fd, exceptfds);
2022 			}
2023 		}
2024 	}
2025 
2026  out:
2027 	free(pfds);
2028 	return rv;
2029 }
2030 
2031 static void
2032 checkpoll(struct pollfd *fds, nfds_t nfds, int *hostcall, int *rumpcall)
2033 {
2034 	nfds_t i;
2035 
2036 	for (i = 0; i < nfds; i++) {
2037 		if (fds[i].fd == -1)
2038 			continue;
2039 
2040 		if (fd_isrump(fds[i].fd))
2041 			(*rumpcall)++;
2042 		else
2043 			(*hostcall)++;
2044 	}
2045 }
2046 
2047 static void
2048 adjustpoll(struct pollfd *fds, nfds_t nfds, int (*fdadj)(int))
2049 {
2050 	nfds_t i;
2051 
2052 	for (i = 0; i < nfds; i++) {
2053 		fds[i].fd = fdadj(fds[i].fd);
2054 	}
2055 }
2056 
2057 /*
2058  * poll is easy as long as the call comes in the fds only in one
2059  * kernel.  otherwise its quite tricky...
2060  */
2061 struct pollarg {
2062 	struct pollfd *pfds;
2063 	nfds_t nfds;
2064 	const struct timespec *ts;
2065 	const sigset_t *sigmask;
2066 	int pipefd;
2067 	int errnum;
2068 };
2069 
2070 static void *
2071 hostpoll(void *arg)
2072 {
2073 	int (*op_pollts)(struct pollfd *, nfds_t, const struct timespec *,
2074 			 const sigset_t *);
2075 	struct pollarg *parg = arg;
2076 	intptr_t rv;
2077 
2078 	op_pollts = GETSYSCALL(host, POLLTS);
2079 	rv = op_pollts(parg->pfds, parg->nfds, parg->ts, parg->sigmask);
2080 	if (rv == -1)
2081 		parg->errnum = errno;
2082 	rump_sys_write(parg->pipefd, &rv, sizeof(rv));
2083 
2084 	return (void *)rv;
2085 }
2086 
2087 int
2088 REALPOLLTS(struct pollfd *fds, nfds_t nfds, const struct timespec *ts,
2089 	const sigset_t *sigmask)
2090 {
2091 	int (*op_pollts)(struct pollfd *, nfds_t, const struct timespec *,
2092 			 const sigset_t *);
2093 	int (*host_close)(int);
2094 	int hostcall = 0, rumpcall = 0;
2095 	pthread_t pt;
2096 	nfds_t i;
2097 	int rv;
2098 
2099 	DPRINTF(("poll %p %d %p %p\n", fds, (int)nfds, ts, sigmask));
2100 	checkpoll(fds, nfds, &hostcall, &rumpcall);
2101 
2102 	if (hostcall && rumpcall) {
2103 		struct pollfd *pfd_host = NULL, *pfd_rump = NULL;
2104 		int rpipe[2] = {-1,-1}, hpipe[2] = {-1,-1};
2105 		struct pollarg parg;
2106 		void *trv_val;
2107 		int sverrno = 0, rv_rump, rv_host, errno_rump, errno_host;
2108 
2109 		/*
2110 		 * ok, this is where it gets tricky.  We must support
2111 		 * this since it's a very common operation in certain
2112 		 * types of software (telnet, netcat, etc).  We allocate
2113 		 * two vectors and run two poll commands in separate
2114 		 * threads.  Whichever returns first "wins" and the
2115 		 * other kernel's fds won't show activity.
2116 		 */
2117 		rv = -1;
2118 
2119 		/* allocate full vector for O(n) joining after call */
2120 		pfd_host = malloc(sizeof(*pfd_host)*(nfds+1));
2121 		if (!pfd_host)
2122 			goto out;
2123 		pfd_rump = malloc(sizeof(*pfd_rump)*(nfds+1));
2124 		if (!pfd_rump) {
2125 			goto out;
2126 		}
2127 
2128 		/*
2129 		 * then, open two pipes, one for notifications
2130 		 * to each kernel.
2131 		 *
2132 		 * At least the rump pipe should probably be
2133 		 * cached, along with the helper threads.  This
2134 		 * should give a microbenchmark improvement (haven't
2135 		 * experienced a macro-level problem yet, though).
2136 		 */
2137 		if ((rv = rump_sys_pipe(rpipe)) == -1) {
2138 			sverrno = errno;
2139 		}
2140 		if (rv == 0 && (rv = pipe(hpipe)) == -1) {
2141 			sverrno = errno;
2142 		}
2143 
2144 		/* split vectors (or signal errors) */
2145 		for (i = 0; i < nfds; i++) {
2146 			int fd;
2147 
2148 			fds[i].revents = 0;
2149 			if (fds[i].fd == -1) {
2150 				pfd_host[i].fd = -1;
2151 				pfd_rump[i].fd = -1;
2152 			} else if (fd_isrump(fds[i].fd)) {
2153 				pfd_host[i].fd = -1;
2154 				fd = fd_host2rump(fds[i].fd);
2155 				if (fd == rpipe[0] || fd == rpipe[1]) {
2156 					fds[i].revents = POLLNVAL;
2157 					if (rv != -1)
2158 						rv++;
2159 				}
2160 				pfd_rump[i].fd = fd;
2161 				pfd_rump[i].events = fds[i].events;
2162 			} else {
2163 				pfd_rump[i].fd = -1;
2164 				fd = fds[i].fd;
2165 				if (fd == hpipe[0] || fd == hpipe[1]) {
2166 					fds[i].revents = POLLNVAL;
2167 					if (rv != -1)
2168 						rv++;
2169 				}
2170 				pfd_host[i].fd = fd;
2171 				pfd_host[i].events = fds[i].events;
2172 			}
2173 			pfd_rump[i].revents = pfd_host[i].revents = 0;
2174 		}
2175 		if (rv) {
2176 			goto out;
2177 		}
2178 
2179 		pfd_host[nfds].fd = hpipe[0];
2180 		pfd_host[nfds].events = POLLIN;
2181 		pfd_rump[nfds].fd = rpipe[0];
2182 		pfd_rump[nfds].events = POLLIN;
2183 
2184 		/*
2185 		 * then, create a thread to do host part and meanwhile
2186 		 * do rump kernel part right here
2187 		 */
2188 
2189 		parg.pfds = pfd_host;
2190 		parg.nfds = nfds+1;
2191 		parg.ts = ts;
2192 		parg.sigmask = sigmask;
2193 		parg.pipefd = rpipe[1];
2194 		pthread_create(&pt, NULL, hostpoll, &parg);
2195 
2196 		op_pollts = GETSYSCALL(rump, POLLTS);
2197 		rv_rump = op_pollts(pfd_rump, nfds+1, ts, NULL);
2198 		errno_rump = errno;
2199 		write(hpipe[1], &rv, sizeof(rv));
2200 		pthread_join(pt, &trv_val);
2201 		rv_host = (int)(intptr_t)trv_val;
2202 		errno_host = parg.errnum;
2203 
2204 		/* strip cross-thread notification from real results */
2205 		if (rv_host > 0 && pfd_host[nfds].revents & POLLIN) {
2206 			rv_host--;
2207 		}
2208 		if (rv_rump > 0 && pfd_rump[nfds].revents & POLLIN) {
2209 			rv_rump--;
2210 		}
2211 
2212 		/* then merge the results into what's reported to the caller */
2213 		if (rv_rump > 0 || rv_host > 0) {
2214 			/* SUCCESS */
2215 
2216 			rv = 0;
2217 			if (rv_rump > 0) {
2218 				for (i = 0; i < nfds; i++) {
2219 					if (pfd_rump[i].fd != -1)
2220 						fds[i].revents
2221 						    = pfd_rump[i].revents;
2222 				}
2223 				rv += rv_rump;
2224 			}
2225 			if (rv_host > 0) {
2226 				for (i = 0; i < nfds; i++) {
2227 					if (pfd_host[i].fd != -1)
2228 						fds[i].revents
2229 						    = pfd_host[i].revents;
2230 				}
2231 				rv += rv_host;
2232 			}
2233 			assert(rv > 0);
2234 			sverrno = 0;
2235 		} else if (rv_rump == -1 || rv_host == -1) {
2236 			/* ERROR */
2237 
2238 			/* just pick one kernel at "random" */
2239 			rv = -1;
2240 			if (rv_host == -1) {
2241 				sverrno = errno_host;
2242 			} else if (rv_rump == -1) {
2243 				sverrno = errno_rump;
2244 			}
2245 		} else {
2246 			/* TIMEOUT */
2247 
2248 			rv = 0;
2249 			assert(rv_rump == 0 && rv_host == 0);
2250 		}
2251 
2252  out:
2253 		host_close = GETSYSCALL(host, CLOSE);
2254 		if (rpipe[0] != -1)
2255 			rump_sys_close(rpipe[0]);
2256 		if (rpipe[1] != -1)
2257 			rump_sys_close(rpipe[1]);
2258 		if (hpipe[0] != -1)
2259 			host_close(hpipe[0]);
2260 		if (hpipe[1] != -1)
2261 			host_close(hpipe[1]);
2262 		free(pfd_host);
2263 		free(pfd_rump);
2264 		errno = sverrno;
2265 	} else {
2266 		if (hostcall) {
2267 			op_pollts = GETSYSCALL(host, POLLTS);
2268 		} else {
2269 			op_pollts = GETSYSCALL(rump, POLLTS);
2270 			adjustpoll(fds, nfds, fd_host2rump);
2271 		}
2272 
2273 		rv = op_pollts(fds, nfds, ts, sigmask);
2274 		if (rumpcall)
2275 			adjustpoll(fds, nfds, fd_rump2host_withdup);
2276 	}
2277 
2278 	return rv;
2279 }
2280 
2281 int
2282 poll(struct pollfd *fds, nfds_t nfds, int timeout)
2283 {
2284 	struct timespec ts;
2285 	struct timespec *tsp = NULL;
2286 
2287 	if (timeout != INFTIM) {
2288 		ts.tv_sec = timeout / 1000;
2289 		ts.tv_nsec = (timeout % 1000) * 1000*1000;
2290 
2291 		tsp = &ts;
2292 	}
2293 
2294 	return REALPOLLTS(fds, nfds, tsp, NULL);
2295 }
2296 
2297 #ifdef HAVE_KQUEUE
2298 int
2299 REALKEVENT(int kq, const struct kevent *changelist, size_t nchanges,
2300 	struct kevent *eventlist, size_t nevents,
2301 	const struct timespec *timeout)
2302 {
2303 	int (*op_kevent)(int, const struct kevent *, size_t,
2304 		struct kevent *, size_t, const struct timespec *);
2305 	const struct kevent *ev;
2306 	size_t i;
2307 
2308 	/*
2309 	 * Check that we don't attempt to kevent rump kernel fd's.
2310 	 * That needs similar treatment to select/poll, but is slightly
2311 	 * trickier since we need to manage to different kq descriptors.
2312 	 * (TODO, in case you're wondering).
2313 	 */
2314 	for (i = 0; i < nchanges; i++) {
2315 		ev = &changelist[i];
2316 		if (ev->filter == EVFILT_READ || ev->filter == EVFILT_WRITE ||
2317 		    ev->filter == EVFILT_VNODE) {
2318 			if (fd_isrump((int)ev->ident)) {
2319 				errno = ENOTSUP;
2320 				return -1;
2321 			}
2322 		}
2323 	}
2324 
2325 	op_kevent = GETSYSCALL(host, KEVENT);
2326 	return op_kevent(kq, changelist, nchanges, eventlist, nevents, timeout);
2327 }
2328 #endif /* HAVE_KQUEUE */
2329 
2330 /*
2331  * mmapping from a rump kernel is not supported, so disallow it.
2332  */
2333 void *
2334 mmap(void *addr, size_t len, int prot, int flags, int fd, off_t offset)
2335 {
2336 
2337 	if (flags & MAP_FILE && fd_isrump(fd)) {
2338 		errno = ENOSYS;
2339 		return MAP_FAILED;
2340 	}
2341 	if (__predict_false(host_mmap == NULL)) {
2342 		host_mmap = rumphijack_dlsym(RTLD_NEXT, "mmap");
2343 	}
2344 	return host_mmap(addr, len, prot, flags, fd, offset);
2345 }
2346 
2347 #ifdef __NetBSD__
2348 /*
2349  * these go to one or the other on a per-process configuration
2350  */
2351 int __sysctl(const int *, unsigned int, void *, size_t *, const void *, size_t);
2352 int
2353 __sysctl(const int *name, unsigned int namelen, void *old, size_t *oldlenp,
2354 	const void *new, size_t newlen)
2355 {
2356 	int (*op___sysctl)(const int *, unsigned int, void *, size_t *,
2357 	    const void *, size_t);
2358 
2359 	if (rumpsysctl) {
2360 		op___sysctl = GETSYSCALL(rump, __SYSCTL);
2361 	} else {
2362 		op___sysctl = GETSYSCALL(host, __SYSCTL);
2363 		/* we haven't inited yet */
2364 		if (__predict_false(op___sysctl == NULL)) {
2365 			op___sysctl = rumphijack_dlsym(RTLD_NEXT, "__sysctl");
2366 		}
2367 	}
2368 
2369 	return op___sysctl(name, namelen, old, oldlenp, new, newlen);
2370 }
2371 int modctl(int, void *);
2372 int
2373 modctl(int operation, void *argp)
2374 {
2375 	int (*op_modctl)(int operation, void *argp);
2376 
2377 	if (rumpmodctl) {
2378 		op_modctl = GETSYSCALL(rump, MODCTL);
2379 	} else {
2380 		op_modctl = GETSYSCALL(host, MODCTL);
2381 	}
2382 
2383 	return op_modctl(operation, argp);
2384 }
2385 #endif
2386 
2387 /*
2388  * Rest are std type calls.
2389  */
2390 
2391 #ifdef HAVE_UTIMENSAT
2392 ATCALL(int, utimensat, DUALCALL_UTIMENSAT,				\
2393 	(int fd, const char *path, const struct timespec t[2], int f),	\
2394 	(int, const char *, const struct timespec [2], int),
2395 	(fd, path, t, f))
2396 #endif
2397 
2398 FDCALL(int, bind, DUALCALL_BIND,					\
2399 	(int fd, const struct sockaddr *name, socklen_t namelen),	\
2400 	(int, const struct sockaddr *, socklen_t),			\
2401 	(fd, name, namelen))
2402 
2403 FDCALL(int, connect, DUALCALL_CONNECT,					\
2404 	(int fd, const struct sockaddr *name, socklen_t namelen),	\
2405 	(int, const struct sockaddr *, socklen_t),			\
2406 	(fd, name, namelen))
2407 
2408 FDCALL(int, getpeername, DUALCALL_GETPEERNAME,				\
2409 	(int fd, struct sockaddr *name, socklen_t *namelen),		\
2410 	(int, struct sockaddr *, socklen_t *),				\
2411 	(fd, name, namelen))
2412 
2413 FDCALL(int, getsockname, DUALCALL_GETSOCKNAME, 				\
2414 	(int fd, struct sockaddr *name, socklen_t *namelen),		\
2415 	(int, struct sockaddr *, socklen_t *),				\
2416 	(fd, name, namelen))
2417 
2418 FDCALL(int, listen, DUALCALL_LISTEN,	 				\
2419 	(int fd, int backlog),						\
2420 	(int, int),							\
2421 	(fd, backlog))
2422 
2423 FDCALL(ssize_t, recvfrom, DUALCALL_RECVFROM, 				\
2424 	(int fd, void *buf, size_t len, int flags,			\
2425 	    struct sockaddr *from, socklen_t *fromlen),			\
2426 	(int, void *, size_t, int, struct sockaddr *, socklen_t *),	\
2427 	(fd, buf, len, flags, from, fromlen))
2428 
2429 FDCALL(ssize_t, sendto, DUALCALL_SENDTO, 				\
2430 	(int fd, const void *buf, size_t len, int flags,		\
2431 	    const struct sockaddr *to, socklen_t tolen),		\
2432 	(int, const void *, size_t, int,				\
2433 	    const struct sockaddr *, socklen_t),			\
2434 	(fd, buf, len, flags, to, tolen))
2435 
2436 FDCALL(int, getsockopt, DUALCALL_GETSOCKOPT, 				\
2437 	(int fd, int level, int optn, void *optval, socklen_t *optlen),	\
2438 	(int, int, int, void *, socklen_t *),				\
2439 	(fd, level, optn, optval, optlen))
2440 
2441 FDCALL(int, setsockopt, DUALCALL_SETSOCKOPT, 				\
2442 	(int fd, int level, int optn,					\
2443 	    const void *optval, socklen_t optlen),			\
2444 	(int, int, int, const void *, socklen_t),			\
2445 	(fd, level, optn, optval, optlen))
2446 
2447 FDCALL(int, shutdown, DUALCALL_SHUTDOWN, 				\
2448 	(int fd, int how),						\
2449 	(int, int),							\
2450 	(fd, how))
2451 
2452 FDCALL(ssize_t, REALREAD, DUALCALL_READ,				\
2453 	(int fd, void *buf, size_t buflen),				\
2454 	(int, void *, size_t),						\
2455 	(fd, buf, buflen))
2456 
2457 #ifdef __linux__
2458 ssize_t __read_chk(int, void *, size_t)
2459     __attribute__((alias("read")));
2460 #endif
2461 
2462 FDCALL(ssize_t, readv, DUALCALL_READV, 					\
2463 	(int fd, const struct iovec *iov, int iovcnt),			\
2464 	(int, const struct iovec *, int),				\
2465 	(fd, iov, iovcnt))
2466 
2467 FDCALL(ssize_t, REALPREAD, DUALCALL_PREAD,				\
2468 	(int fd, void *buf, size_t nbytes, off_t offset),		\
2469 	(int, void *, size_t, off_t),					\
2470 	(fd, buf, nbytes, offset))
2471 
2472 FDCALL(ssize_t, preadv, DUALCALL_PREADV, 				\
2473 	(int fd, const struct iovec *iov, int iovcnt, off_t offset),	\
2474 	(int, const struct iovec *, int, off_t),			\
2475 	(fd, iov, iovcnt, offset))
2476 
2477 FDCALL(ssize_t, writev, DUALCALL_WRITEV, 				\
2478 	(int fd, const struct iovec *iov, int iovcnt),			\
2479 	(int, const struct iovec *, int),				\
2480 	(fd, iov, iovcnt))
2481 
2482 FDCALL(ssize_t, REALPWRITE, DUALCALL_PWRITE,				\
2483 	(int fd, const void *buf, size_t nbytes, off_t offset),		\
2484 	(int, const void *, size_t, off_t),				\
2485 	(fd, buf, nbytes, offset))
2486 
2487 FDCALL(ssize_t, pwritev, DUALCALL_PWRITEV, 				\
2488 	(int fd, const struct iovec *iov, int iovcnt, off_t offset),	\
2489 	(int, const struct iovec *, int, off_t),			\
2490 	(fd, iov, iovcnt, offset))
2491 
2492 #ifndef __linux__
2493 FDCALL(int, REALFSTAT, DUALCALL_FSTAT,					\
2494 	(int fd, struct stat *sb),					\
2495 	(int, struct stat *),						\
2496 	(fd, sb))
2497 #endif
2498 
2499 #ifdef __NetBSD__
2500 FDCALL(int, fstatvfs1, DUALCALL_FSTATVFS1,				\
2501 	(int fd, struct statvfs *buf, int flags),			\
2502 	(int, struct statvfs *, int),					\
2503 	(fd, buf, flags))
2504 #endif
2505 
2506 FDCALL(off_t, lseek, DUALCALL_LSEEK,					\
2507 	(int fd, off_t offset, int whence),				\
2508 	(int, off_t, int),						\
2509 	(fd, offset, whence))
2510 #ifdef LSEEK_ALIAS
2511 __strong_alias(LSEEK_ALIAS,lseek);
2512 #endif
2513 
2514 #ifndef __linux__
2515 FDCALL(int, REALGETDENTS, DUALCALL_GETDENTS,				\
2516 	(int fd, char *buf, size_t nbytes),				\
2517 	(int, char *, size_t),						\
2518 	(fd, buf, nbytes))
2519 #endif
2520 
2521 FDCALL(int, fchown, DUALCALL_FCHOWN,					\
2522 	(int fd, uid_t owner, gid_t group),				\
2523 	(int, uid_t, gid_t),						\
2524 	(fd, owner, group))
2525 
2526 FDCALL(int, fchmod, DUALCALL_FCHMOD,					\
2527 	(int fd, mode_t mode),						\
2528 	(int, mode_t),							\
2529 	(fd, mode))
2530 
2531 FDCALL(int, ftruncate, DUALCALL_FTRUNCATE,				\
2532 	(int fd, off_t length),						\
2533 	(int, off_t),							\
2534 	(fd, length))
2535 
2536 FDCALL(int, fsync, DUALCALL_FSYNC,					\
2537 	(int fd),							\
2538 	(int),								\
2539 	(fd))
2540 
2541 #ifdef HAVE_FSYNC_RANGE
2542 FDCALL(int, fsync_range, DUALCALL_FSYNC_RANGE,				\
2543 	(int fd, int how, off_t start, off_t length),			\
2544 	(int, int, off_t, off_t),					\
2545 	(fd, how, start, length))
2546 #endif
2547 
2548 FDCALL(int, futimes, DUALCALL_FUTIMES,					\
2549 	(int fd, const struct timeval *tv),				\
2550 	(int, const struct timeval *),					\
2551 	(fd, tv))
2552 
2553 FDCALL(int, futimens, DUALCALL_FUTIMENS,				\
2554 	(int fd, const struct timespec *ts),				\
2555 	(int, const struct timespec *),					\
2556 	(fd, ts))
2557 
2558 #ifdef HAVE_CHFLAGS
2559 FDCALL(int, fchflags, DUALCALL_FCHFLAGS,				\
2560 	(int fd, u_long flags),						\
2561 	(int, u_long),							\
2562 	(fd, flags))
2563 #endif
2564 
2565 /*
2566  * path-based selectors
2567  */
2568 
2569 #ifndef __linux__
2570 PATHCALL(int, REALSTAT, DUALCALL_STAT,					\
2571 	(const char *path, struct stat *sb),				\
2572 	(const char *, struct stat *),					\
2573 	(path, sb))
2574 
2575 PATHCALL(int, REALLSTAT, DUALCALL_LSTAT,				\
2576 	(const char *path, struct stat *sb),				\
2577 	(const char *, struct stat *),					\
2578 	(path, sb))
2579 #endif
2580 
2581 PATHCALL(int, chown, DUALCALL_CHOWN,					\
2582 	(const char *path, uid_t owner, gid_t group),			\
2583 	(const char *, uid_t, gid_t),					\
2584 	(path, owner, group))
2585 
2586 PATHCALL(int, lchown, DUALCALL_LCHOWN,					\
2587 	(const char *path, uid_t owner, gid_t group),			\
2588 	(const char *, uid_t, gid_t),					\
2589 	(path, owner, group))
2590 
2591 PATHCALL(int, chmod, DUALCALL_CHMOD,					\
2592 	(const char *path, mode_t mode),				\
2593 	(const char *, mode_t),						\
2594 	(path, mode))
2595 
2596 PATHCALL(int, lchmod, DUALCALL_LCHMOD,					\
2597 	(const char *path, mode_t mode),				\
2598 	(const char *, mode_t),						\
2599 	(path, mode))
2600 
2601 #ifdef __NetBSD__
2602 PATHCALL(int, statvfs1, DUALCALL_STATVFS1,				\
2603 	(const char *path, struct statvfs *buf, int flags),		\
2604 	(const char *, struct statvfs *, int),				\
2605 	(path, buf, flags))
2606 #endif
2607 
2608 PATHCALL(int, unlink, DUALCALL_UNLINK,					\
2609 	(const char *path),						\
2610 	(const char *),							\
2611 	(path))
2612 
2613 PATHCALL(int, symlink, DUALCALL_SYMLINK,				\
2614 	(const char *target, const char *path),				\
2615 	(const char *, const char *),					\
2616 	(target, path))
2617 
2618 /*
2619  * readlink() can be called from malloc which can be called
2620  * from dlsym() during init
2621  */
2622 ssize_t
2623 readlink(const char *path, char *buf, size_t bufsiz)
2624 {
2625 	int (*op_readlink)(const char *, char *, size_t);
2626 	enum pathtype pt;
2627 
2628 	if ((pt = path_isrump(path)) != PATH_HOST) {
2629 		op_readlink = GETSYSCALL(rump, READLINK);
2630 		if (pt == PATH_RUMP)
2631 			path = path_host2rump(path);
2632 	} else {
2633 		op_readlink = GETSYSCALL(host, READLINK);
2634 	}
2635 
2636 	if (__predict_false(op_readlink == NULL)) {
2637 		errno = ENOENT;
2638 		return -1;
2639 	}
2640 
2641 	return op_readlink(path, buf, bufsiz);
2642 }
2643 
2644 PATHCALL(int, mkdir, DUALCALL_MKDIR,					\
2645 	(const char *path, mode_t mode),				\
2646 	(const char *, mode_t),						\
2647 	(path, mode))
2648 
2649 PATHCALL(int, rmdir, DUALCALL_RMDIR,					\
2650 	(const char *path),						\
2651 	(const char *),							\
2652 	(path))
2653 
2654 PATHCALL(int, utimes, DUALCALL_UTIMES,					\
2655 	(const char *path, const struct timeval *tv),			\
2656 	(const char *, const struct timeval *),				\
2657 	(path, tv))
2658 
2659 PATHCALL(int, lutimes, DUALCALL_LUTIMES,				\
2660 	(const char *path, const struct timeval *tv),			\
2661 	(const char *, const struct timeval *),				\
2662 	(path, tv))
2663 
2664 #ifdef HAVE_CHFLAGS
2665 PATHCALL(int, chflags, DUALCALL_CHFLAGS,				\
2666 	(const char *path, u_long flags),				\
2667 	(const char *, u_long),						\
2668 	(path, flags))
2669 
2670 PATHCALL(int, lchflags, DUALCALL_LCHFLAGS,				\
2671 	(const char *path, u_long flags),				\
2672 	(const char *, u_long),						\
2673 	(path, flags))
2674 #endif /* HAVE_CHFLAGS */
2675 
2676 PATHCALL(int, truncate, DUALCALL_TRUNCATE,				\
2677 	(const char *path, off_t length),				\
2678 	(const char *, off_t),						\
2679 	(path, length))
2680 
2681 PATHCALL(int, access, DUALCALL_ACCESS,					\
2682 	(const char *path, int mode),					\
2683 	(const char *, int),						\
2684 	(path, mode))
2685 
2686 #ifndef __linux__
2687 PATHCALL(int, REALMKNOD, DUALCALL_MKNOD,				\
2688 	(const char *path, mode_t mode, dev_t dev),			\
2689 	(const char *, mode_t, dev_t),					\
2690 	(path, mode, dev))
2691 #endif
2692 
2693 /*
2694  * Note: with mount the decisive parameter is the mount
2695  * destination directory.  This is because we don't really know
2696  * about the "source" directory in a generic call (and besides,
2697  * it might not even exist, cf. nfs).
2698  */
2699 #ifdef __NetBSD__
2700 PATHCALL(int, REALMOUNT, DUALCALL_MOUNT,				\
2701 	(const char *type, const char *path, int flags,			\
2702 	    void *data, size_t dlen),					\
2703 	(const char *, const char *, int, void *, size_t),		\
2704 	(type, path, flags, data, dlen))
2705 
2706 PATHCALL(int, unmount, DUALCALL_UNMOUNT,				\
2707 	(const char *path, int flags),					\
2708 	(const char *, int),						\
2709 	(path, flags))
2710 #endif /* __NetBSD__ */
2711 
2712 #ifdef HAVE___QUOTACTL
2713 PATHCALL(int, __quotactl, DUALCALL_QUOTACTL,				\
2714 	(const char *path, struct quotactl_args *args),			\
2715 	(const char *, struct quotactl_args *),				\
2716 	(path, args))
2717 #endif /* HAVE___QUOTACTL */
2718 
2719 #ifdef __NetBSD__
2720 PATHCALL(int, REALGETFH, DUALCALL_GETFH,				\
2721 	(const char *path, void *fhp, size_t *fh_size),			\
2722 	(const char *, void *, size_t *),				\
2723 	(path, fhp, fh_size))
2724 #endif
2725 
2726 /*
2727  * These act different on a per-process vfs configuration
2728  */
2729 
2730 #ifdef __NetBSD__
2731 VFSCALL(VFSBIT_GETVFSSTAT, int, getvfsstat, DUALCALL_GETVFSSTAT,	\
2732 	(struct statvfs *buf, size_t buflen, int flags),		\
2733 	(struct statvfs *, size_t, int),				\
2734 	(buf, buflen, flags))
2735 #endif
2736 
2737 #ifdef __NetBSD__
2738 VFSCALL(VFSBIT_FHCALLS, int, REALFHOPEN, DUALCALL_FHOPEN,		\
2739 	(const void *fhp, size_t fh_size, int flags),			\
2740 	(const char *, size_t, int),					\
2741 	(fhp, fh_size, flags))
2742 
2743 VFSCALL(VFSBIT_FHCALLS, int, REALFHSTAT, DUALCALL_FHSTAT,		\
2744 	(const void *fhp, size_t fh_size, struct stat *sb),		\
2745 	(const char *, size_t, struct stat *),				\
2746 	(fhp, fh_size, sb))
2747 
2748 VFSCALL(VFSBIT_FHCALLS, int, REALFHSTATVFS1, DUALCALL_FHSTATVFS1,	\
2749 	(const void *fhp, size_t fh_size, struct statvfs *sb, int flgs),\
2750 	(const char *, size_t, struct statvfs *, int),			\
2751 	(fhp, fh_size, sb, flgs))
2752 #endif
2753 
2754 
2755 #ifdef __NetBSD__
2756 
2757 /* finally, put nfssvc here.  "keep the namespace clean" */
2758 #include <nfs/rpcv2.h>
2759 #include <nfs/nfs.h>
2760 
2761 int
2762 nfssvc(int flags, void *argstructp)
2763 {
2764 	int (*op_nfssvc)(int, void *);
2765 
2766 	if (vfsbits & VFSBIT_NFSSVC){
2767 		struct nfsd_args *nfsdargs;
2768 
2769 		/* massage the socket descriptor if necessary */
2770 		if (flags == NFSSVC_ADDSOCK) {
2771 			nfsdargs = argstructp;
2772 			nfsdargs->sock = fd_host2rump(nfsdargs->sock);
2773 		}
2774 		op_nfssvc = GETSYSCALL(rump, NFSSVC);
2775 	} else
2776 		op_nfssvc = GETSYSCALL(host, NFSSVC);
2777 
2778 	return op_nfssvc(flags, argstructp);
2779 }
2780 #endif /* __NetBSD__ */
2781