|  | /* | 
|  | *  process related system call shims and definitions | 
|  | * | 
|  | *  Copyright (c) 2013-2014 Stacey D. Son | 
|  | * | 
|  | *  This program is free software; you can redistribute it and/or modify | 
|  | *  it under the terms of the GNU General Public License as published by | 
|  | *  the Free Software Foundation; either version 2 of the License, or | 
|  | *  (at your option) any later version. | 
|  | * | 
|  | *  This program is distributed in the hope that it will be useful, | 
|  | *  but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|  | *  GNU General Public License for more details. | 
|  | * | 
|  | *  You should have received a copy of the GNU General Public License | 
|  | *  along with this program; if not, see <http://www.gnu.org/licenses/>. | 
|  | */ | 
|  |  | 
|  | #ifndef BSD_PROC_H_ | 
|  | #define BSD_PROC_H_ | 
|  |  | 
|  | #include <sys/resource.h> | 
|  |  | 
|  | #include "qemu-bsd.h" | 
|  | #include "gdbstub/syscalls.h" | 
|  | #include "qemu/plugin.h" | 
|  |  | 
|  | extern int _getlogin(char*, int); | 
|  | int bsd_get_ncpu(void); | 
|  |  | 
|  | /* exit(2) */ | 
|  | static inline abi_long do_bsd_exit(void *cpu_env, abi_long arg1) | 
|  | { | 
|  | gdb_exit(arg1); | 
|  | qemu_plugin_user_exit(); | 
|  | _exit(arg1); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* getgroups(2) */ | 
|  | static inline abi_long do_bsd_getgroups(abi_long gidsetsize, abi_long arg2) | 
|  | { | 
|  | abi_long ret; | 
|  | uint32_t *target_grouplist; | 
|  | g_autofree gid_t *grouplist; | 
|  | int i; | 
|  |  | 
|  | grouplist = g_try_new(gid_t, gidsetsize); | 
|  | ret = get_errno(getgroups(gidsetsize, grouplist)); | 
|  | if (gidsetsize != 0) { | 
|  | if (!is_error(ret)) { | 
|  | target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 2, 0); | 
|  | if (!target_grouplist) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | for (i = 0; i < ret; i++) { | 
|  | target_grouplist[i] = tswap32(grouplist[i]); | 
|  | } | 
|  | unlock_user(target_grouplist, arg2, gidsetsize * 2); | 
|  | } | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* setgroups(2) */ | 
|  | static inline abi_long do_bsd_setgroups(abi_long gidsetsize, abi_long arg2) | 
|  | { | 
|  | uint32_t *target_grouplist; | 
|  | g_autofree gid_t *grouplist; | 
|  | int i; | 
|  |  | 
|  | grouplist = g_try_new(gid_t, gidsetsize); | 
|  | target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 2, 1); | 
|  | if (!target_grouplist) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | for (i = 0; i < gidsetsize; i++) { | 
|  | grouplist[i] = tswap32(target_grouplist[i]); | 
|  | } | 
|  | unlock_user(target_grouplist, arg2, 0); | 
|  | return get_errno(setgroups(gidsetsize, grouplist)); | 
|  | } | 
|  |  | 
|  | /* umask(2) */ | 
|  | static inline abi_long do_bsd_umask(abi_long arg1) | 
|  | { | 
|  | return get_errno(umask(arg1)); | 
|  | } | 
|  |  | 
|  | /* setlogin(2) */ | 
|  | static inline abi_long do_bsd_setlogin(abi_long arg1) | 
|  | { | 
|  | abi_long ret; | 
|  | void *p; | 
|  |  | 
|  | p = lock_user_string(arg1); | 
|  | if (p == NULL) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | ret = get_errno(setlogin(p)); | 
|  | unlock_user(p, arg1, 0); | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* getlogin(2) */ | 
|  | static inline abi_long do_bsd_getlogin(abi_long arg1, abi_long arg2) | 
|  | { | 
|  | abi_long ret; | 
|  | void *p; | 
|  |  | 
|  | p = lock_user(VERIFY_WRITE, arg1, arg2, 0); | 
|  | if (p == NULL) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | ret = get_errno(_getlogin(p, arg2)); | 
|  | unlock_user(p, arg1, arg2); | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* getrusage(2) */ | 
|  | static inline abi_long do_bsd_getrusage(abi_long who, abi_ulong target_addr) | 
|  | { | 
|  | abi_long ret; | 
|  | struct rusage rusage; | 
|  |  | 
|  | ret = get_errno(getrusage(who, &rusage)); | 
|  | if (!is_error(ret)) { | 
|  | host_to_target_rusage(target_addr, &rusage); | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* getrlimit(2) */ | 
|  | static inline abi_long do_bsd_getrlimit(abi_long arg1, abi_ulong arg2) | 
|  | { | 
|  | abi_long ret; | 
|  | int resource = target_to_host_resource(arg1); | 
|  | struct target_rlimit *target_rlim; | 
|  | struct rlimit rlim; | 
|  |  | 
|  | switch (resource) { | 
|  | case RLIMIT_STACK: | 
|  | rlim.rlim_cur = target_dflssiz; | 
|  | rlim.rlim_max = target_maxssiz; | 
|  | ret = 0; | 
|  | break; | 
|  |  | 
|  | case RLIMIT_DATA: | 
|  | rlim.rlim_cur = target_dfldsiz; | 
|  | rlim.rlim_max = target_maxdsiz; | 
|  | ret = 0; | 
|  | break; | 
|  |  | 
|  | default: | 
|  | ret = get_errno(getrlimit(resource, &rlim)); | 
|  | break; | 
|  | } | 
|  | if (!is_error(ret)) { | 
|  | if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur); | 
|  | target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max); | 
|  | unlock_user_struct(target_rlim, arg2, 1); | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* setrlimit(2) */ | 
|  | static inline abi_long do_bsd_setrlimit(abi_long arg1, abi_ulong arg2) | 
|  | { | 
|  | abi_long ret; | 
|  | int resource = target_to_host_resource(arg1); | 
|  | struct target_rlimit *target_rlim; | 
|  | struct rlimit rlim; | 
|  |  | 
|  | if (RLIMIT_STACK == resource) { | 
|  | /* XXX We should, maybe, allow the stack size to shrink */ | 
|  | ret = -TARGET_EPERM; | 
|  | } else { | 
|  | if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | rlim.rlim_cur = target_to_host_rlim(target_rlim->rlim_cur); | 
|  | rlim.rlim_max = target_to_host_rlim(target_rlim->rlim_max); | 
|  | unlock_user_struct(target_rlim, arg2, 0); | 
|  | ret = get_errno(setrlimit(resource, &rlim)); | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* getpid(2) */ | 
|  | static inline abi_long do_bsd_getpid(void) | 
|  | { | 
|  | return get_errno(getpid()); | 
|  | } | 
|  |  | 
|  | /* getppid(2) */ | 
|  | static inline abi_long do_bsd_getppid(void) | 
|  | { | 
|  | return get_errno(getppid()); | 
|  | } | 
|  |  | 
|  | /* getuid(2) */ | 
|  | static inline abi_long do_bsd_getuid(void) | 
|  | { | 
|  | return get_errno(getuid()); | 
|  | } | 
|  |  | 
|  | /* geteuid(2) */ | 
|  | static inline abi_long do_bsd_geteuid(void) | 
|  | { | 
|  | return get_errno(geteuid()); | 
|  | } | 
|  |  | 
|  | /* getgid(2) */ | 
|  | static inline abi_long do_bsd_getgid(void) | 
|  | { | 
|  | return get_errno(getgid()); | 
|  | } | 
|  |  | 
|  | /* getegid(2) */ | 
|  | static inline abi_long do_bsd_getegid(void) | 
|  | { | 
|  | return get_errno(getegid()); | 
|  | } | 
|  |  | 
|  | /* setuid(2) */ | 
|  | static inline abi_long do_bsd_setuid(abi_long arg1) | 
|  | { | 
|  | return get_errno(setuid(arg1)); | 
|  | } | 
|  |  | 
|  | /* seteuid(2) */ | 
|  | static inline abi_long do_bsd_seteuid(abi_long arg1) | 
|  | { | 
|  | return get_errno(seteuid(arg1)); | 
|  | } | 
|  |  | 
|  | /* setgid(2) */ | 
|  | static inline abi_long do_bsd_setgid(abi_long arg1) | 
|  | { | 
|  | return get_errno(setgid(arg1)); | 
|  | } | 
|  |  | 
|  | /* setegid(2) */ | 
|  | static inline abi_long do_bsd_setegid(abi_long arg1) | 
|  | { | 
|  | return get_errno(setegid(arg1)); | 
|  | } | 
|  |  | 
|  | /* getpgid(2) */ | 
|  | static inline abi_long do_bsd_getpgid(pid_t pid) | 
|  | { | 
|  | return get_errno(getpgid(pid)); | 
|  | } | 
|  |  | 
|  | /* setpgid(2) */ | 
|  | static inline abi_long do_bsd_setpgid(int pid, int pgrp) | 
|  | { | 
|  | return get_errno(setpgid(pid, pgrp)); | 
|  | } | 
|  |  | 
|  | /* getpgrp(2) */ | 
|  | static inline abi_long do_bsd_getpgrp(void) | 
|  | { | 
|  | return get_errno(getpgrp()); | 
|  | } | 
|  |  | 
|  | /* setreuid(2) */ | 
|  | static inline abi_long do_bsd_setreuid(abi_long arg1, abi_long arg2) | 
|  | { | 
|  | return get_errno(setreuid(arg1, arg2)); | 
|  | } | 
|  |  | 
|  | /* setregid(2) */ | 
|  | static inline abi_long do_bsd_setregid(abi_long arg1, abi_long arg2) | 
|  | { | 
|  | return get_errno(setregid(arg1, arg2)); | 
|  | } | 
|  |  | 
|  | /* setresgid(2) */ | 
|  | static inline abi_long do_bsd_setresgid(gid_t rgid, gid_t egid, gid_t sgid) | 
|  | { | 
|  | return get_errno(setresgid(rgid, egid, sgid)); | 
|  | } | 
|  |  | 
|  | /* setresuid(2) */ | 
|  | static inline abi_long do_bsd_setresuid(uid_t ruid, uid_t euid, uid_t suid) | 
|  | { | 
|  | return get_errno(setresuid(ruid, euid, suid)); | 
|  | } | 
|  |  | 
|  | /* getresuid(2) */ | 
|  | static inline abi_long do_bsd_getresuid(abi_ulong arg1, abi_ulong arg2, | 
|  | abi_ulong arg3) | 
|  | { | 
|  | abi_long ret; | 
|  | uid_t ruid, euid, suid; | 
|  |  | 
|  | ret = get_errno(getresuid(&ruid, &euid, &suid)); | 
|  | if (is_error(ret)) { | 
|  | return ret; | 
|  | } | 
|  | if (put_user_s32(ruid, arg1)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | if (put_user_s32(euid, arg2)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | if (put_user_s32(suid, arg3)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* getresgid(2) */ | 
|  | static inline abi_long do_bsd_getresgid(abi_ulong arg1, abi_ulong arg2, | 
|  | abi_ulong arg3) | 
|  | { | 
|  | abi_long ret; | 
|  | uid_t ruid, euid, suid; | 
|  |  | 
|  | ret = get_errno(getresgid(&ruid, &euid, &suid)); | 
|  | if (is_error(ret)) { | 
|  | return ret; | 
|  | } | 
|  | if (put_user_s32(ruid, arg1)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | if (put_user_s32(euid, arg2)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | if (put_user_s32(suid, arg3)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* getsid(2) */ | 
|  | static inline abi_long do_bsd_getsid(abi_long arg1) | 
|  | { | 
|  | return get_errno(getsid(arg1)); | 
|  | } | 
|  |  | 
|  | /* setsid(2) */ | 
|  | static inline abi_long do_bsd_setsid(void) | 
|  | { | 
|  | return get_errno(setsid()); | 
|  | } | 
|  |  | 
|  | /* issetugid(2) */ | 
|  | static inline abi_long do_bsd_issetugid(void) | 
|  | { | 
|  | return get_errno(issetugid()); | 
|  | } | 
|  |  | 
|  | /* profil(2) */ | 
|  | static inline abi_long do_bsd_profil(abi_long arg1, abi_long arg2, | 
|  | abi_long arg3, abi_long arg4) | 
|  | { | 
|  | return -TARGET_ENOSYS; | 
|  | } | 
|  |  | 
|  | /* ktrace(2) */ | 
|  | static inline abi_long do_bsd_ktrace(abi_long arg1, abi_long arg2, | 
|  | abi_long arg3, abi_long arg4) | 
|  | { | 
|  | return -TARGET_ENOSYS; | 
|  | } | 
|  |  | 
|  | /* utrace(2) */ | 
|  | static inline abi_long do_bsd_utrace(abi_long arg1, abi_long arg2) | 
|  | { | 
|  | return -TARGET_ENOSYS; | 
|  | } | 
|  |  | 
|  |  | 
|  | /* ptrace(2) */ | 
|  | static inline abi_long do_bsd_ptrace(abi_long arg1, abi_long arg2, | 
|  | abi_long arg3, abi_long arg4) | 
|  | { | 
|  | return -TARGET_ENOSYS; | 
|  | } | 
|  |  | 
|  | /* getpriority(2) */ | 
|  | static inline abi_long do_bsd_getpriority(abi_long which, abi_long who) | 
|  | { | 
|  | abi_long ret; | 
|  | /* | 
|  | * Note that negative values are valid for getpriority, so we must | 
|  | * differentiate based on errno settings. | 
|  | */ | 
|  | errno = 0; | 
|  | ret = getpriority(which, who); | 
|  | if (ret == -1 && errno != 0) { | 
|  | return -host_to_target_errno(errno); | 
|  | } | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* setpriority(2) */ | 
|  | static inline abi_long do_bsd_setpriority(abi_long which, abi_long who, | 
|  | abi_long prio) | 
|  | { | 
|  | return get_errno(setpriority(which, who, prio)); | 
|  | } | 
|  |  | 
|  | #endif /* !BSD_PROC_H_ */ |