| /* |
| * FreeBSD process related emulation code |
| * |
| * Copyright (c) 2013-15 Stacey D. Son |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, see <http://www.gnu.org/licenses/>. |
| */ |
| #include "qemu/osdep.h" |
| |
| #include <sys/param.h> |
| #include <sys/queue.h> |
| #include <sys/sysctl.h> |
| struct kinfo_proc; |
| #include <libprocstat.h> |
| |
| #include "qemu.h" |
| |
| /* |
| * execve/fexecve |
| */ |
| abi_long freebsd_exec_common(abi_ulong path_or_fd, abi_ulong guest_argp, |
| abi_ulong guest_envp, int do_fexec) |
| { |
| char **argp, **envp, **qarg0; |
| int argc, envc; |
| abi_ulong gp; |
| abi_ulong addr; |
| char **q; |
| int total_size = 0; |
| void *p; |
| abi_long ret; |
| |
| argc = 0; |
| for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) { |
| if (get_user_ual(addr, gp)) { |
| return -TARGET_EFAULT; |
| } |
| if (!addr) { |
| break; |
| } |
| argc++; |
| } |
| envc = 0; |
| for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) { |
| if (get_user_ual(addr, gp)) { |
| return -TARGET_EFAULT; |
| } |
| if (!addr) { |
| break; |
| } |
| envc++; |
| } |
| |
| qarg0 = argp = g_new0(char *, argc + 9); |
| /* save the first argument for the emulator */ |
| *argp++ = (char *)getprogname(); |
| *argp++ = (char *)getprogname(); |
| envp = g_new0(char *, envc + 1); |
| for (gp = guest_argp, q = argp; gp; gp += sizeof(abi_ulong), q++) { |
| if (get_user_ual(addr, gp)) { |
| ret = -TARGET_EFAULT; |
| goto execve_end; |
| } |
| if (!addr) { |
| break; |
| } |
| *q = lock_user_string(addr); |
| if (*q == NULL) { |
| ret = -TARGET_EFAULT; |
| goto execve_end; |
| } |
| total_size += strlen(*q) + 1; |
| } |
| *q++ = NULL; |
| |
| for (gp = guest_envp, q = envp; gp; gp += sizeof(abi_ulong), q++) { |
| if (get_user_ual(addr, gp)) { |
| ret = -TARGET_EFAULT; |
| goto execve_end; |
| } |
| if (!addr) { |
| break; |
| } |
| *q = lock_user_string(addr); |
| if (*q == NULL) { |
| ret = -TARGET_EFAULT; |
| goto execve_end; |
| } |
| total_size += strlen(*q) + 1; |
| } |
| *q = NULL; |
| |
| /* |
| * This case will not be caught by the host's execve() if its |
| * page size is bigger than the target's. |
| */ |
| if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) { |
| ret = -TARGET_E2BIG; |
| goto execve_end; |
| } |
| |
| if (do_fexec) { |
| ret = get_errno(fexecve((int)path_or_fd, argp, envp)); |
| } else { |
| p = lock_user_string(path_or_fd); |
| if (p == NULL) { |
| ret = -TARGET_EFAULT; |
| goto execve_end; |
| } |
| ret = get_errno(execve(p, argp, envp)); |
| unlock_user(p, path_or_fd, 0); |
| } |
| |
| execve_end: |
| for (gp = guest_argp, q = argp; *q; gp += sizeof(abi_ulong), q++) { |
| if (get_user_ual(addr, gp) || !addr) { |
| break; |
| } |
| unlock_user(*q, addr, 0); |
| } |
| |
| for (gp = guest_envp, q = envp; *q; gp += sizeof(abi_ulong), q++) { |
| if (get_user_ual(addr, gp) || !addr) { |
| break; |
| } |
| unlock_user(*q, addr, 0); |
| } |
| |
| g_free(qarg0); |
| g_free(envp); |
| |
| return ret; |
| } |
| |
| #include <sys/procctl.h> |
| |
| static abi_long |
| t2h_procctl_cmd(int target_cmd, int *host_cmd) |
| { |
| switch (target_cmd) { |
| case TARGET_PROC_SPROTECT: |
| *host_cmd = PROC_SPROTECT; |
| break; |
| |
| case TARGET_PROC_REAP_ACQUIRE: |
| *host_cmd = PROC_REAP_ACQUIRE; |
| break; |
| |
| case TARGET_PROC_REAP_RELEASE: |
| *host_cmd = PROC_REAP_RELEASE; |
| break; |
| |
| case TARGET_PROC_REAP_STATUS: |
| *host_cmd = PROC_REAP_STATUS; |
| break; |
| |
| case TARGET_PROC_REAP_KILL: |
| *host_cmd = PROC_REAP_KILL; |
| break; |
| |
| default: |
| return -TARGET_EINVAL; |
| } |
| |
| return 0; |
| } |
| |
| static abi_long |
| h2t_reaper_status(struct procctl_reaper_status *host_rs, |
| abi_ulong target_rs_addr) |
| { |
| struct target_procctl_reaper_status *target_rs; |
| |
| if (!lock_user_struct(VERIFY_WRITE, target_rs, target_rs_addr, 0)) { |
| return -TARGET_EFAULT; |
| } |
| __put_user(host_rs->rs_flags, &target_rs->rs_flags); |
| __put_user(host_rs->rs_children, &target_rs->rs_children); |
| __put_user(host_rs->rs_descendants, &target_rs->rs_descendants); |
| __put_user(host_rs->rs_reaper, &target_rs->rs_reaper); |
| __put_user(host_rs->rs_pid, &target_rs->rs_pid); |
| unlock_user_struct(target_rs, target_rs_addr, 1); |
| |
| return 0; |
| } |
| |
| static abi_long |
| t2h_reaper_kill(abi_ulong target_rk_addr, struct procctl_reaper_kill *host_rk) |
| { |
| struct target_procctl_reaper_kill *target_rk; |
| |
| if (!lock_user_struct(VERIFY_READ, target_rk, target_rk_addr, 1)) { |
| return -TARGET_EFAULT; |
| } |
| __get_user(host_rk->rk_sig, &target_rk->rk_sig); |
| __get_user(host_rk->rk_flags, &target_rk->rk_flags); |
| __get_user(host_rk->rk_subtree, &target_rk->rk_subtree); |
| __get_user(host_rk->rk_killed, &target_rk->rk_killed); |
| __get_user(host_rk->rk_fpid, &target_rk->rk_fpid); |
| unlock_user_struct(target_rk, target_rk_addr, 0); |
| |
| return 0; |
| } |
| |
| static abi_long |
| h2t_reaper_kill(struct procctl_reaper_kill *host_rk, abi_ulong target_rk_addr) |
| { |
| struct target_procctl_reaper_kill *target_rk; |
| |
| if (!lock_user_struct(VERIFY_WRITE, target_rk, target_rk_addr, 0)) { |
| return -TARGET_EFAULT; |
| } |
| __put_user(host_rk->rk_sig, &target_rk->rk_sig); |
| __put_user(host_rk->rk_flags, &target_rk->rk_flags); |
| __put_user(host_rk->rk_subtree, &target_rk->rk_subtree); |
| __put_user(host_rk->rk_killed, &target_rk->rk_killed); |
| __put_user(host_rk->rk_fpid, &target_rk->rk_fpid); |
| unlock_user_struct(target_rk, target_rk_addr, 1); |
| |
| return 0; |
| } |
| |
| static abi_long |
| h2t_procctl_reaper_pidinfo(struct procctl_reaper_pidinfo *host_pi, |
| abi_ulong target_pi_addr) |
| { |
| struct target_procctl_reaper_pidinfo *target_pi; |
| |
| if (!lock_user_struct(VERIFY_WRITE, target_pi, target_pi_addr, 0)) { |
| return -TARGET_EFAULT; |
| } |
| __put_user(host_pi->pi_pid, &target_pi->pi_pid); |
| __put_user(host_pi->pi_subtree, &target_pi->pi_subtree); |
| __put_user(host_pi->pi_flags, &target_pi->pi_flags); |
| unlock_user_struct(target_pi, target_pi_addr, 1); |
| |
| return 0; |
| } |
| |
| abi_long |
| do_freebsd_procctl(void *cpu_env, int idtype, abi_ulong arg2, abi_ulong arg3, |
| abi_ulong arg4, abi_ulong arg5, abi_ulong arg6) |
| { |
| abi_long error = 0, target_rp_pids; |
| void *data; |
| int host_cmd, flags; |
| uint32_t u, target_rp_count; |
| g_autofree union { |
| struct procctl_reaper_status rs; |
| struct procctl_reaper_pids rp; |
| struct procctl_reaper_kill rk; |
| } host; |
| struct target_procctl_reaper_pids *target_rp; |
| id_t id; /* 64-bit */ |
| int target_cmd; |
| abi_ulong target_arg; |
| |
| #if TARGET_ABI_BITS == 32 |
| /* See if we need to align the register pairs. */ |
| if (regpairs_aligned(cpu_env)) { |
| id = (id_t)target_arg64(arg3, arg4); |
| target_cmd = (int)arg5; |
| target_arg = arg6; |
| } else { |
| id = (id_t)target_arg64(arg2, arg3); |
| target_cmd = (int)arg4; |
| target_arg = arg5; |
| } |
| #else |
| id = (id_t)arg2; |
| target_cmd = (int)arg3; |
| target_arg = arg4; |
| #endif |
| |
| error = t2h_procctl_cmd(target_cmd, &host_cmd); |
| if (error) { |
| return error; |
| } |
| switch (host_cmd) { |
| case PROC_SPROTECT: |
| data = &flags; |
| break; |
| |
| case PROC_REAP_ACQUIRE: |
| case PROC_REAP_RELEASE: |
| if (target_arg == 0) { |
| data = NULL; |
| } else { |
| error = -TARGET_EINVAL; |
| } |
| break; |
| |
| case PROC_REAP_STATUS: |
| data = &host.rs; |
| break; |
| |
| case PROC_REAP_GETPIDS: |
| if (!lock_user_struct(VERIFY_READ, target_rp, target_arg, 1)) { |
| return -TARGET_EFAULT; |
| } |
| __get_user(target_rp_count, &target_rp->rp_count); |
| __get_user(target_rp_pids, &target_rp->rp_pids); |
| unlock_user_struct(target_rp, target_arg, 0); |
| host.rp.rp_count = target_rp_count; |
| host.rp.rp_pids = g_try_new(struct procctl_reaper_pidinfo, |
| target_rp_count); |
| |
| if (host.rp.rp_pids == NULL) { |
| error = -TARGET_ENOMEM; |
| } else { |
| data = &host.rp; |
| } |
| break; |
| |
| case PROC_REAP_KILL: |
| error = t2h_reaper_kill(target_arg, &host.rk); |
| break; |
| } |
| |
| if (error) { |
| return error; |
| } |
| error = get_errno(procctl(idtype, id, host_cmd, data)); |
| |
| if (error) { |
| return error; |
| } |
| switch (host_cmd) { |
| case PROC_SPROTECT: |
| if (put_user_s32(flags, target_arg)) { |
| return -TARGET_EFAULT; |
| } |
| break; |
| |
| case PROC_REAP_STATUS: |
| error = h2t_reaper_status(&host.rs, target_arg); |
| break; |
| |
| case PROC_REAP_GETPIDS: |
| /* copyout reaper pidinfo */ |
| for (u = 0; u < target_rp_count; u++) { |
| error = h2t_procctl_reaper_pidinfo(&host.rp.rp_pids[u], |
| target_rp_pids + |
| (u * sizeof(struct target_procctl_reaper_pidinfo))); |
| if (error) { |
| break; |
| } |
| } |
| break; |
| |
| case PROC_REAP_KILL: |
| error = h2t_reaper_kill(&host.rk, target_arg); |
| break; |
| } |
| |
| return error; |
| } |