blob: 4e67ae4d56c1e091a43fb2253c21302cd04e008f [file] [log] [blame]
/*
* FreeBSD process related emulation code
*
* Copyright (c) 2013-15 Stacey D. Son
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
#include "qemu/osdep.h"
#include <sys/param.h>
#include <sys/queue.h>
#include <sys/sysctl.h>
struct kinfo_proc;
#include <libprocstat.h>
#include "qemu.h"
/*
* Get the filename for the given file descriptor.
* Note that this may return NULL (fail) if no longer cached in the kernel.
*/
static char *
get_filename_from_fd(pid_t pid, int fd, char *filename, size_t len)
{
char *ret = NULL;
unsigned int cnt;
struct procstat *procstat = NULL;
struct kinfo_proc *kp = NULL;
struct filestat_list *head = NULL;
struct filestat *fst;
procstat = procstat_open_sysctl();
if (procstat == NULL) {
goto out;
}
kp = procstat_getprocs(procstat, KERN_PROC_PID, pid, &cnt);
if (kp == NULL) {
goto out;
}
head = procstat_getfiles(procstat, kp, 0);
if (head == NULL) {
goto out;
}
STAILQ_FOREACH(fst, head, next) {
if (fd == fst->fs_fd) {
if (fst->fs_path != NULL) {
(void)strlcpy(filename, fst->fs_path, len);
ret = filename;
}
break;
}
}
out:
if (head != NULL) {
procstat_freefiles(procstat, head);
}
if (kp != NULL) {
procstat_freeprocs(procstat, kp);
}
if (procstat != NULL) {
procstat_close(procstat);
}
return ret;
}
/*
* execve/fexecve
*/
abi_long freebsd_exec_common(abi_ulong path_or_fd, abi_ulong guest_argp,
abi_ulong guest_envp, int do_fexec)
{
char **argp, **envp, **qargp, **qarg1, **qarg0, **qargend;
int argc, envc;
abi_ulong gp;
abi_ulong addr;
char **q;
int total_size = 0;
void *p;
abi_long ret;
argc = 0;
for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) {
if (get_user_ual(addr, gp)) {
return -TARGET_EFAULT;
}
if (!addr) {
break;
}
argc++;
}
envc = 0;
for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) {
if (get_user_ual(addr, gp)) {
return -TARGET_EFAULT;
}
if (!addr) {
break;
}
envc++;
}
qarg0 = argp = g_new0(char *, argc + 9);
/* save the first agrument for the emulator */
*argp++ = (char *)getprogname();
qargp = argp;
*argp++ = (char *)getprogname();
qarg1 = argp;
envp = g_new0(char *, envc + 1);
for (gp = guest_argp, q = argp; gp; gp += sizeof(abi_ulong), q++) {
if (get_user_ual(addr, gp)) {
ret = -TARGET_EFAULT;
goto execve_end;
}
if (!addr) {
break;
}
*q = lock_user_string(addr);
if (*q == NULL) {
ret = -TARGET_EFAULT;
goto execve_end;
}
total_size += strlen(*q) + 1;
}
*q++ = NULL;
qargend = q;
for (gp = guest_envp, q = envp; gp; gp += sizeof(abi_ulong), q++) {
if (get_user_ual(addr, gp)) {
ret = -TARGET_EFAULT;
goto execve_end;
}
if (!addr) {
break;
}
*q = lock_user_string(addr);
if (*q == NULL) {
ret = -TARGET_EFAULT;
goto execve_end;
}
total_size += strlen(*q) + 1;
}
*q = NULL;
/*
* This case will not be caught by the host's execve() if its
* page size is bigger than the target's.
*/
if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) {
ret = -TARGET_E2BIG;
goto execve_end;
}
if (do_fexec) {
if (((int)path_or_fd > 0 &&
is_target_elf_binary((int)path_or_fd)) == 1) {
char execpath[PATH_MAX];
/*
* The executable is an elf binary for the target
* arch. execve() it using the emulator if we can
* determine the filename path from the fd.
*/
if (get_filename_from_fd(getpid(), (int)path_or_fd, execpath,
sizeof(execpath)) != NULL) {
memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1));
qarg1[1] = qarg1[0];
qarg1[0] = (char *)"-0";
qarg1 += 2;
qargend += 2;
*qarg1 = execpath;
#ifndef DONT_INHERIT_INTERP_PREFIX
memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1));
*qarg1++ = (char *)"-L";
*qarg1++ = (char *)interp_prefix;
#endif
ret = get_errno(execve(qemu_proc_pathname, qargp, envp));
} else {
/* Getting the filename path failed. */
ret = -TARGET_EBADF;
goto execve_end;
}
} else {
ret = get_errno(fexecve((int)path_or_fd, argp, envp));
}
} else {
int fd;
p = lock_user_string(path_or_fd);
if (p == NULL) {
ret = -TARGET_EFAULT;
goto execve_end;
}
/*
* Check the header and see if it a target elf binary. If so
* then execute using qemu user mode emulator.
*/
fd = open(p, O_RDONLY | O_CLOEXEC);
if (fd > 0 && is_target_elf_binary(fd) == 1) {
close(fd);
/* execve() as a target binary using emulator. */
memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1));
qarg1[1] = qarg1[0];
qarg1[0] = (char *)"-0";
qarg1 += 2;
qargend += 2;
*qarg1 = (char *)p;
#ifndef DONT_INHERIT_INTERP_PREFIX
memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1));
*qarg1++ = (char *)"-L";
*qarg1++ = (char *)interp_prefix;
#endif
ret = get_errno(execve(qemu_proc_pathname, qargp, envp));
} else {
close(fd);
/* Execve() as a host native binary. */
ret = get_errno(execve(p, argp, envp));
}
unlock_user(p, path_or_fd, 0);
}
execve_end:
for (gp = guest_argp, q = argp; *q; gp += sizeof(abi_ulong), q++) {
if (get_user_ual(addr, gp) || !addr) {
break;
}
unlock_user(*q, addr, 0);
}
for (gp = guest_envp, q = envp; *q; gp += sizeof(abi_ulong), q++) {
if (get_user_ual(addr, gp) || !addr) {
break;
}
unlock_user(*q, addr, 0);
}
g_free(qarg0);
g_free(envp);
return ret;
}
#include <sys/procctl.h>
static abi_long
t2h_procctl_cmd(int target_cmd, int *host_cmd)
{
switch (target_cmd) {
case TARGET_PROC_SPROTECT:
*host_cmd = PROC_SPROTECT;
break;
case TARGET_PROC_REAP_ACQUIRE:
*host_cmd = PROC_REAP_ACQUIRE;
break;
case TARGET_PROC_REAP_RELEASE:
*host_cmd = PROC_REAP_RELEASE;
break;
case TARGET_PROC_REAP_STATUS:
*host_cmd = PROC_REAP_STATUS;
break;
case TARGET_PROC_REAP_KILL:
*host_cmd = PROC_REAP_KILL;
break;
default:
return -TARGET_EINVAL;
}
return 0;
}
static abi_long
h2t_reaper_status(struct procctl_reaper_status *host_rs,
abi_ulong target_rs_addr)
{
struct target_procctl_reaper_status *target_rs;
if (!lock_user_struct(VERIFY_WRITE, target_rs, target_rs_addr, 0)) {
return -TARGET_EFAULT;
}
__put_user(host_rs->rs_flags, &target_rs->rs_flags);
__put_user(host_rs->rs_children, &target_rs->rs_children);
__put_user(host_rs->rs_descendants, &target_rs->rs_descendants);
__put_user(host_rs->rs_reaper, &target_rs->rs_reaper);
__put_user(host_rs->rs_pid, &target_rs->rs_pid);
unlock_user_struct(target_rs, target_rs_addr, 1);
return 0;
}
static abi_long
t2h_reaper_kill(abi_ulong target_rk_addr, struct procctl_reaper_kill *host_rk)
{
struct target_procctl_reaper_kill *target_rk;
if (!lock_user_struct(VERIFY_READ, target_rk, target_rk_addr, 1)) {
return -TARGET_EFAULT;
}
__get_user(host_rk->rk_sig, &target_rk->rk_sig);
__get_user(host_rk->rk_flags, &target_rk->rk_flags);
__get_user(host_rk->rk_subtree, &target_rk->rk_subtree);
__get_user(host_rk->rk_killed, &target_rk->rk_killed);
__get_user(host_rk->rk_fpid, &target_rk->rk_fpid);
unlock_user_struct(target_rk, target_rk_addr, 0);
return 0;
}
static abi_long
h2t_reaper_kill(struct procctl_reaper_kill *host_rk, abi_ulong target_rk_addr)
{
struct target_procctl_reaper_kill *target_rk;
if (!lock_user_struct(VERIFY_WRITE, target_rk, target_rk_addr, 0)) {
return -TARGET_EFAULT;
}
__put_user(host_rk->rk_sig, &target_rk->rk_sig);
__put_user(host_rk->rk_flags, &target_rk->rk_flags);
__put_user(host_rk->rk_subtree, &target_rk->rk_subtree);
__put_user(host_rk->rk_killed, &target_rk->rk_killed);
__put_user(host_rk->rk_fpid, &target_rk->rk_fpid);
unlock_user_struct(target_rk, target_rk_addr, 1);
return 0;
}
static abi_long
h2t_procctl_reaper_pidinfo(struct procctl_reaper_pidinfo *host_pi,
abi_ulong target_pi_addr)
{
struct target_procctl_reaper_pidinfo *target_pi;
if (!lock_user_struct(VERIFY_WRITE, target_pi, target_pi_addr, 0)) {
return -TARGET_EFAULT;
}
__put_user(host_pi->pi_pid, &target_pi->pi_pid);
__put_user(host_pi->pi_subtree, &target_pi->pi_subtree);
__put_user(host_pi->pi_flags, &target_pi->pi_flags);
unlock_user_struct(target_pi, target_pi_addr, 1);
return 0;
}
abi_long
do_freebsd_procctl(void *cpu_env, int idtype, abi_ulong arg2, abi_ulong arg3,
abi_ulong arg4, abi_ulong arg5, abi_ulong arg6)
{
abi_long error = 0, target_rp_pids;
void *data;
int host_cmd, flags;
uint32_t u, target_rp_count;
g_autofree union {
struct procctl_reaper_status rs;
struct procctl_reaper_pids rp;
struct procctl_reaper_kill rk;
} host;
struct target_procctl_reaper_pids *target_rp;
id_t id; /* 64-bit */
int target_cmd;
abi_ulong target_arg;
#if TARGET_ABI_BITS == 32
/* See if we need to align the register pairs. */
if (regpairs_aligned(cpu_env)) {
id = (id_t)target_arg64(arg3, arg4);
target_cmd = (int)arg5;
target_arg = arg6;
} else {
id = (id_t)target_arg64(arg2, arg3);
target_cmd = (int)arg4;
target_arg = arg5;
}
#else
id = (id_t)arg2;
target_cmd = (int)arg3;
target_arg = arg4;
#endif
error = t2h_procctl_cmd(target_cmd, &host_cmd);
if (error) {
return error;
}
switch (host_cmd) {
case PROC_SPROTECT:
data = &flags;
break;
case PROC_REAP_ACQUIRE:
case PROC_REAP_RELEASE:
if (target_arg == 0) {
data = NULL;
} else {
error = -TARGET_EINVAL;
}
break;
case PROC_REAP_STATUS:
data = &host.rs;
break;
case PROC_REAP_GETPIDS:
if (!lock_user_struct(VERIFY_READ, target_rp, target_arg, 1)) {
return -TARGET_EFAULT;
}
__get_user(target_rp_count, &target_rp->rp_count);
__get_user(target_rp_pids, &target_rp->rp_pids);
unlock_user_struct(target_rp, target_arg, 0);
host.rp.rp_count = target_rp_count;
host.rp.rp_pids = g_try_new(struct procctl_reaper_pidinfo,
target_rp_count);
if (host.rp.rp_pids == NULL) {
error = -TARGET_ENOMEM;
} else {
data = &host.rp;
}
break;
case PROC_REAP_KILL:
error = t2h_reaper_kill(target_arg, &host.rk);
break;
}
if (error) {
return error;
}
error = get_errno(procctl(idtype, id, host_cmd, data));
if (error) {
return error;
}
switch (host_cmd) {
case PROC_SPROTECT:
if (put_user_s32(flags, target_arg)) {
return -TARGET_EFAULT;
}
break;
case PROC_REAP_STATUS:
error = h2t_reaper_status(&host.rs, target_arg);
break;
case PROC_REAP_GETPIDS:
/* copyout reaper pidinfo */
for (u = 0; u < target_rp_count; u++) {
error = h2t_procctl_reaper_pidinfo(&host.rp.rp_pids[u],
target_rp_pids +
(u * sizeof(struct target_procctl_reaper_pidinfo)));
if (error) {
break;
}
}
break;
case PROC_REAP_KILL:
error = h2t_reaper_kill(&host.rk, target_arg);
break;
}
return error;
}