|  | /* | 
|  | *  FreeBSD process related emulation code | 
|  | * | 
|  | *  Copyright (c) 2013-15 Stacey D. Son | 
|  | * | 
|  | *  This program is free software; you can redistribute it and/or modify | 
|  | *  it under the terms of the GNU General Public License as published by | 
|  | *  the Free Software Foundation; either version 2 of the License, or | 
|  | *  (at your option) any later version. | 
|  | * | 
|  | *  This program is distributed in the hope that it will be useful, | 
|  | *  but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|  | *  GNU General Public License for more details. | 
|  | * | 
|  | *  You should have received a copy of the GNU General Public License | 
|  | *  along with this program; if not, see <http://www.gnu.org/licenses/>. | 
|  | */ | 
|  | #include "qemu/osdep.h" | 
|  |  | 
|  | #include <sys/param.h> | 
|  | #include <sys/queue.h> | 
|  | #include <sys/sysctl.h> | 
|  | struct kinfo_proc; | 
|  | #include <libprocstat.h> | 
|  |  | 
|  | #include "qemu.h" | 
|  |  | 
|  | /* | 
|  | * Get the filename for the given file descriptor. | 
|  | * Note that this may return NULL (fail) if no longer cached in the kernel. | 
|  | */ | 
|  | static char * | 
|  | get_filename_from_fd(pid_t pid, int fd, char *filename, size_t len) | 
|  | { | 
|  | char *ret = NULL; | 
|  | unsigned int cnt; | 
|  | struct procstat *procstat = NULL; | 
|  | struct kinfo_proc *kp = NULL; | 
|  | struct filestat_list *head = NULL; | 
|  | struct filestat *fst; | 
|  |  | 
|  | procstat = procstat_open_sysctl(); | 
|  | if (procstat == NULL) { | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | kp = procstat_getprocs(procstat, KERN_PROC_PID, pid, &cnt); | 
|  | if (kp == NULL) { | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | head = procstat_getfiles(procstat, kp, 0); | 
|  | if (head == NULL) { | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | STAILQ_FOREACH(fst, head, next) { | 
|  | if (fd == fst->fs_fd) { | 
|  | if (fst->fs_path != NULL) { | 
|  | (void)strlcpy(filename, fst->fs_path, len); | 
|  | ret = filename; | 
|  | } | 
|  | break; | 
|  | } | 
|  | } | 
|  |  | 
|  | out: | 
|  | if (head != NULL) { | 
|  | procstat_freefiles(procstat, head); | 
|  | } | 
|  | if (kp != NULL) { | 
|  | procstat_freeprocs(procstat, kp); | 
|  | } | 
|  | if (procstat != NULL) { | 
|  | procstat_close(procstat); | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * execve/fexecve | 
|  | */ | 
|  | abi_long freebsd_exec_common(abi_ulong path_or_fd, abi_ulong guest_argp, | 
|  | abi_ulong guest_envp, int do_fexec) | 
|  | { | 
|  | char **argp, **envp, **qargp, **qarg1, **qarg0, **qargend; | 
|  | int argc, envc; | 
|  | abi_ulong gp; | 
|  | abi_ulong addr; | 
|  | char **q; | 
|  | int total_size = 0; | 
|  | void *p; | 
|  | abi_long ret; | 
|  |  | 
|  | argc = 0; | 
|  | for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) { | 
|  | if (get_user_ual(addr, gp)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | if (!addr) { | 
|  | break; | 
|  | } | 
|  | argc++; | 
|  | } | 
|  | envc = 0; | 
|  | for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) { | 
|  | if (get_user_ual(addr, gp)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | if (!addr) { | 
|  | break; | 
|  | } | 
|  | envc++; | 
|  | } | 
|  |  | 
|  | qarg0 = argp = g_new0(char *, argc + 9); | 
|  | /* save the first argument for the emulator */ | 
|  | *argp++ = (char *)getprogname(); | 
|  | qargp = argp; | 
|  | *argp++ = (char *)getprogname(); | 
|  | qarg1 = argp; | 
|  | envp = g_new0(char *, envc + 1); | 
|  | for (gp = guest_argp, q = argp; gp; gp += sizeof(abi_ulong), q++) { | 
|  | if (get_user_ual(addr, gp)) { | 
|  | ret = -TARGET_EFAULT; | 
|  | goto execve_end; | 
|  | } | 
|  | if (!addr) { | 
|  | break; | 
|  | } | 
|  | *q = lock_user_string(addr); | 
|  | if (*q == NULL) { | 
|  | ret = -TARGET_EFAULT; | 
|  | goto execve_end; | 
|  | } | 
|  | total_size += strlen(*q) + 1; | 
|  | } | 
|  | *q++ = NULL; | 
|  | qargend = q; | 
|  |  | 
|  | for (gp = guest_envp, q = envp; gp; gp += sizeof(abi_ulong), q++) { | 
|  | if (get_user_ual(addr, gp)) { | 
|  | ret = -TARGET_EFAULT; | 
|  | goto execve_end; | 
|  | } | 
|  | if (!addr) { | 
|  | break; | 
|  | } | 
|  | *q = lock_user_string(addr); | 
|  | if (*q == NULL) { | 
|  | ret = -TARGET_EFAULT; | 
|  | goto execve_end; | 
|  | } | 
|  | total_size += strlen(*q) + 1; | 
|  | } | 
|  | *q = NULL; | 
|  |  | 
|  | /* | 
|  | * This case will not be caught by the host's execve() if its | 
|  | * page size is bigger than the target's. | 
|  | */ | 
|  | if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) { | 
|  | ret = -TARGET_E2BIG; | 
|  | goto execve_end; | 
|  | } | 
|  |  | 
|  | if (do_fexec) { | 
|  | if (((int)path_or_fd > 0 && | 
|  | is_target_elf_binary((int)path_or_fd)) == 1) { | 
|  | char execpath[PATH_MAX]; | 
|  |  | 
|  | /* | 
|  | * The executable is an elf binary for the target | 
|  | * arch.  execve() it using the emulator if we can | 
|  | * determine the filename path from the fd. | 
|  | */ | 
|  | if (get_filename_from_fd(getpid(), (int)path_or_fd, execpath, | 
|  | sizeof(execpath)) != NULL) { | 
|  | memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1)); | 
|  | qarg1[1] = qarg1[0]; | 
|  | qarg1[0] = (char *)"-0"; | 
|  | qarg1 += 2; | 
|  | qargend += 2; | 
|  | *qarg1 = execpath; | 
|  | #ifndef DONT_INHERIT_INTERP_PREFIX | 
|  | memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1)); | 
|  | *qarg1++ = (char *)"-L"; | 
|  | *qarg1++ = (char *)interp_prefix; | 
|  | #endif | 
|  | ret = get_errno(execve(qemu_proc_pathname, qargp, envp)); | 
|  | } else { | 
|  | /* Getting the filename path failed. */ | 
|  | ret = -TARGET_EBADF; | 
|  | goto execve_end; | 
|  | } | 
|  | } else { | 
|  | ret = get_errno(fexecve((int)path_or_fd, argp, envp)); | 
|  | } | 
|  | } else { | 
|  | int fd; | 
|  |  | 
|  | p = lock_user_string(path_or_fd); | 
|  | if (p == NULL) { | 
|  | ret = -TARGET_EFAULT; | 
|  | goto execve_end; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * Check the header and see if it a target elf binary.  If so | 
|  | * then execute using qemu user mode emulator. | 
|  | */ | 
|  | fd = open(p, O_RDONLY | O_CLOEXEC); | 
|  | if (fd > 0 && is_target_elf_binary(fd) == 1) { | 
|  | close(fd); | 
|  | /* execve() as a target binary using emulator. */ | 
|  | memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1)); | 
|  | qarg1[1] = qarg1[0]; | 
|  | qarg1[0] = (char *)"-0"; | 
|  | qarg1 += 2; | 
|  | qargend += 2; | 
|  | *qarg1 = (char *)p; | 
|  | #ifndef DONT_INHERIT_INTERP_PREFIX | 
|  | memmove(qarg1 + 2, qarg1, (qargend - qarg1) * sizeof(*qarg1)); | 
|  | *qarg1++ = (char *)"-L"; | 
|  | *qarg1++ = (char *)interp_prefix; | 
|  | #endif | 
|  | ret = get_errno(execve(qemu_proc_pathname, qargp, envp)); | 
|  | } else { | 
|  | close(fd); | 
|  | /* Execve() as a host native binary. */ | 
|  | ret = get_errno(execve(p, argp, envp)); | 
|  | } | 
|  | unlock_user(p, path_or_fd, 0); | 
|  | } | 
|  |  | 
|  | execve_end: | 
|  | for (gp = guest_argp, q = argp; *q; gp += sizeof(abi_ulong), q++) { | 
|  | if (get_user_ual(addr, gp) || !addr) { | 
|  | break; | 
|  | } | 
|  | unlock_user(*q, addr, 0); | 
|  | } | 
|  |  | 
|  | for (gp = guest_envp, q = envp; *q; gp += sizeof(abi_ulong), q++) { | 
|  | if (get_user_ual(addr, gp) || !addr) { | 
|  | break; | 
|  | } | 
|  | unlock_user(*q, addr, 0); | 
|  | } | 
|  |  | 
|  | g_free(qarg0); | 
|  | g_free(envp); | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | #include <sys/procctl.h> | 
|  |  | 
|  | static abi_long | 
|  | t2h_procctl_cmd(int target_cmd, int *host_cmd) | 
|  | { | 
|  | switch (target_cmd) { | 
|  | case TARGET_PROC_SPROTECT: | 
|  | *host_cmd = PROC_SPROTECT; | 
|  | break; | 
|  |  | 
|  | case TARGET_PROC_REAP_ACQUIRE: | 
|  | *host_cmd = PROC_REAP_ACQUIRE; | 
|  | break; | 
|  |  | 
|  | case TARGET_PROC_REAP_RELEASE: | 
|  | *host_cmd = PROC_REAP_RELEASE; | 
|  | break; | 
|  |  | 
|  | case TARGET_PROC_REAP_STATUS: | 
|  | *host_cmd = PROC_REAP_STATUS; | 
|  | break; | 
|  |  | 
|  | case TARGET_PROC_REAP_KILL: | 
|  | *host_cmd = PROC_REAP_KILL; | 
|  | break; | 
|  |  | 
|  | default: | 
|  | return -TARGET_EINVAL; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static abi_long | 
|  | h2t_reaper_status(struct procctl_reaper_status *host_rs, | 
|  | abi_ulong target_rs_addr) | 
|  | { | 
|  | struct target_procctl_reaper_status *target_rs; | 
|  |  | 
|  | if (!lock_user_struct(VERIFY_WRITE, target_rs, target_rs_addr, 0)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | __put_user(host_rs->rs_flags, &target_rs->rs_flags); | 
|  | __put_user(host_rs->rs_children, &target_rs->rs_children); | 
|  | __put_user(host_rs->rs_descendants, &target_rs->rs_descendants); | 
|  | __put_user(host_rs->rs_reaper, &target_rs->rs_reaper); | 
|  | __put_user(host_rs->rs_pid, &target_rs->rs_pid); | 
|  | unlock_user_struct(target_rs, target_rs_addr, 1); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static abi_long | 
|  | t2h_reaper_kill(abi_ulong target_rk_addr, struct procctl_reaper_kill *host_rk) | 
|  | { | 
|  | struct target_procctl_reaper_kill *target_rk; | 
|  |  | 
|  | if (!lock_user_struct(VERIFY_READ, target_rk, target_rk_addr, 1)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | __get_user(host_rk->rk_sig, &target_rk->rk_sig); | 
|  | __get_user(host_rk->rk_flags, &target_rk->rk_flags); | 
|  | __get_user(host_rk->rk_subtree, &target_rk->rk_subtree); | 
|  | __get_user(host_rk->rk_killed, &target_rk->rk_killed); | 
|  | __get_user(host_rk->rk_fpid, &target_rk->rk_fpid); | 
|  | unlock_user_struct(target_rk, target_rk_addr, 0); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static abi_long | 
|  | h2t_reaper_kill(struct procctl_reaper_kill *host_rk, abi_ulong target_rk_addr) | 
|  | { | 
|  | struct target_procctl_reaper_kill *target_rk; | 
|  |  | 
|  | if (!lock_user_struct(VERIFY_WRITE, target_rk, target_rk_addr, 0)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | __put_user(host_rk->rk_sig, &target_rk->rk_sig); | 
|  | __put_user(host_rk->rk_flags, &target_rk->rk_flags); | 
|  | __put_user(host_rk->rk_subtree, &target_rk->rk_subtree); | 
|  | __put_user(host_rk->rk_killed, &target_rk->rk_killed); | 
|  | __put_user(host_rk->rk_fpid, &target_rk->rk_fpid); | 
|  | unlock_user_struct(target_rk, target_rk_addr, 1); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static abi_long | 
|  | h2t_procctl_reaper_pidinfo(struct procctl_reaper_pidinfo *host_pi, | 
|  | abi_ulong target_pi_addr) | 
|  | { | 
|  | struct target_procctl_reaper_pidinfo *target_pi; | 
|  |  | 
|  | if (!lock_user_struct(VERIFY_WRITE, target_pi, target_pi_addr, 0)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | __put_user(host_pi->pi_pid, &target_pi->pi_pid); | 
|  | __put_user(host_pi->pi_subtree, &target_pi->pi_subtree); | 
|  | __put_user(host_pi->pi_flags, &target_pi->pi_flags); | 
|  | unlock_user_struct(target_pi, target_pi_addr, 1); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | abi_long | 
|  | do_freebsd_procctl(void *cpu_env, int idtype, abi_ulong arg2, abi_ulong arg3, | 
|  | abi_ulong arg4, abi_ulong arg5, abi_ulong arg6) | 
|  | { | 
|  | abi_long error = 0, target_rp_pids; | 
|  | void *data; | 
|  | int host_cmd, flags; | 
|  | uint32_t u, target_rp_count; | 
|  | g_autofree union { | 
|  | struct procctl_reaper_status rs; | 
|  | struct procctl_reaper_pids rp; | 
|  | struct procctl_reaper_kill rk; | 
|  | } host; | 
|  | struct target_procctl_reaper_pids *target_rp; | 
|  | id_t id; /* 64-bit */ | 
|  | int target_cmd; | 
|  | abi_ulong target_arg; | 
|  |  | 
|  | #if TARGET_ABI_BITS == 32 | 
|  | /* See if we need to align the register pairs. */ | 
|  | if (regpairs_aligned(cpu_env)) { | 
|  | id = (id_t)target_arg64(arg3, arg4); | 
|  | target_cmd = (int)arg5; | 
|  | target_arg = arg6; | 
|  | } else { | 
|  | id = (id_t)target_arg64(arg2, arg3); | 
|  | target_cmd = (int)arg4; | 
|  | target_arg = arg5; | 
|  | } | 
|  | #else | 
|  | id = (id_t)arg2; | 
|  | target_cmd = (int)arg3; | 
|  | target_arg = arg4; | 
|  | #endif | 
|  |  | 
|  | error = t2h_procctl_cmd(target_cmd, &host_cmd); | 
|  | if (error) { | 
|  | return error; | 
|  | } | 
|  | switch (host_cmd) { | 
|  | case PROC_SPROTECT: | 
|  | data = &flags; | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_ACQUIRE: | 
|  | case PROC_REAP_RELEASE: | 
|  | if (target_arg == 0) { | 
|  | data = NULL; | 
|  | } else { | 
|  | error = -TARGET_EINVAL; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_STATUS: | 
|  | data = &host.rs; | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_GETPIDS: | 
|  | if (!lock_user_struct(VERIFY_READ, target_rp, target_arg, 1)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | __get_user(target_rp_count, &target_rp->rp_count); | 
|  | __get_user(target_rp_pids, &target_rp->rp_pids); | 
|  | unlock_user_struct(target_rp, target_arg, 0); | 
|  | host.rp.rp_count = target_rp_count; | 
|  | host.rp.rp_pids = g_try_new(struct procctl_reaper_pidinfo, | 
|  | target_rp_count); | 
|  |  | 
|  | if (host.rp.rp_pids == NULL) { | 
|  | error = -TARGET_ENOMEM; | 
|  | } else { | 
|  | data = &host.rp; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_KILL: | 
|  | error = t2h_reaper_kill(target_arg, &host.rk); | 
|  | break; | 
|  | } | 
|  |  | 
|  | if (error) { | 
|  | return error; | 
|  | } | 
|  | error = get_errno(procctl(idtype, id, host_cmd, data)); | 
|  |  | 
|  | if (error) { | 
|  | return error; | 
|  | } | 
|  | switch (host_cmd) { | 
|  | case PROC_SPROTECT: | 
|  | if (put_user_s32(flags, target_arg)) { | 
|  | return -TARGET_EFAULT; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_STATUS: | 
|  | error = h2t_reaper_status(&host.rs, target_arg); | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_GETPIDS: | 
|  | /* copyout reaper pidinfo */ | 
|  | for (u = 0; u < target_rp_count; u++) { | 
|  | error = h2t_procctl_reaper_pidinfo(&host.rp.rp_pids[u], | 
|  | target_rp_pids + | 
|  | (u * sizeof(struct target_procctl_reaper_pidinfo))); | 
|  | if (error) { | 
|  | break; | 
|  | } | 
|  | } | 
|  | break; | 
|  |  | 
|  | case PROC_REAP_KILL: | 
|  | error = h2t_reaper_kill(&host.rk, target_arg); | 
|  | break; | 
|  | } | 
|  |  | 
|  | return error; | 
|  | } |