xref: /openbmc/qemu/bsd-user/freebsd/os-proc.c (revision 029e13a8a56a2931e7c24c0db52ae7256b932cb0)
184d41c5eSKarim Taha /*
284d41c5eSKarim Taha  *  FreeBSD process related emulation code
384d41c5eSKarim Taha  *
484d41c5eSKarim Taha  *  Copyright (c) 2013-15 Stacey D. Son
584d41c5eSKarim Taha  *
684d41c5eSKarim Taha  *  This program is free software; you can redistribute it and/or modify
784d41c5eSKarim Taha  *  it under the terms of the GNU General Public License as published by
884d41c5eSKarim Taha  *  the Free Software Foundation; either version 2 of the License, or
984d41c5eSKarim Taha  *  (at your option) any later version.
1084d41c5eSKarim Taha  *
1184d41c5eSKarim Taha  *  This program is distributed in the hope that it will be useful,
1284d41c5eSKarim Taha  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
1384d41c5eSKarim Taha  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
1484d41c5eSKarim Taha  *  GNU General Public License for more details.
1584d41c5eSKarim Taha  *
1684d41c5eSKarim Taha  *  You should have received a copy of the GNU General Public License
1784d41c5eSKarim Taha  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
1884d41c5eSKarim Taha  */
1984d41c5eSKarim Taha #include "qemu/osdep.h"
2084d41c5eSKarim Taha 
2184d41c5eSKarim Taha #include <sys/param.h>
2284d41c5eSKarim Taha #include <sys/queue.h>
2384d41c5eSKarim Taha #include <sys/sysctl.h>
2484d41c5eSKarim Taha struct kinfo_proc;
2584d41c5eSKarim Taha #include <libprocstat.h>
2684d41c5eSKarim Taha 
2784d41c5eSKarim Taha #include "qemu.h"
2884d41c5eSKarim Taha 
2984d41c5eSKarim Taha /*
3086327290SStacey Son  * execve/fexecve
3186327290SStacey Son  */
freebsd_exec_common(abi_ulong path_or_fd,abi_ulong guest_argp,abi_ulong guest_envp,int do_fexec)3286327290SStacey Son abi_long freebsd_exec_common(abi_ulong path_or_fd, abi_ulong guest_argp,
3386327290SStacey Son         abi_ulong guest_envp, int do_fexec)
3486327290SStacey Son {
35*e6e102b9SDoug Rabson     char **argp, **envp, **qarg0;
3686327290SStacey Son     int argc, envc;
3786327290SStacey Son     abi_ulong gp;
3886327290SStacey Son     abi_ulong addr;
3986327290SStacey Son     char **q;
4086327290SStacey Son     int total_size = 0;
4186327290SStacey Son     void *p;
4286327290SStacey Son     abi_long ret;
4386327290SStacey Son 
4486327290SStacey Son     argc = 0;
4586327290SStacey Son     for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) {
4686327290SStacey Son         if (get_user_ual(addr, gp)) {
4786327290SStacey Son             return -TARGET_EFAULT;
4886327290SStacey Son         }
4986327290SStacey Son         if (!addr) {
5086327290SStacey Son             break;
5186327290SStacey Son         }
5286327290SStacey Son         argc++;
5386327290SStacey Son     }
5486327290SStacey Son     envc = 0;
5586327290SStacey Son     for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) {
5686327290SStacey Son         if (get_user_ual(addr, gp)) {
5786327290SStacey Son             return -TARGET_EFAULT;
5886327290SStacey Son         }
5986327290SStacey Son         if (!addr) {
6086327290SStacey Son             break;
6186327290SStacey Son         }
6286327290SStacey Son         envc++;
6386327290SStacey Son     }
6486327290SStacey Son 
6586327290SStacey Son     qarg0 = argp = g_new0(char *, argc + 9);
669bfba08aSMichael Tokarev     /* save the first argument for the emulator */
6786327290SStacey Son     *argp++ = (char *)getprogname();
6886327290SStacey Son     *argp++ = (char *)getprogname();
6986327290SStacey Son     envp = g_new0(char *, envc + 1);
7086327290SStacey Son     for (gp = guest_argp, q = argp; gp; gp += sizeof(abi_ulong), q++) {
7186327290SStacey Son         if (get_user_ual(addr, gp)) {
7286327290SStacey Son             ret = -TARGET_EFAULT;
7386327290SStacey Son             goto execve_end;
7486327290SStacey Son         }
7586327290SStacey Son         if (!addr) {
7686327290SStacey Son             break;
7786327290SStacey Son         }
7886327290SStacey Son         *q = lock_user_string(addr);
7986327290SStacey Son         if (*q == NULL) {
8086327290SStacey Son             ret = -TARGET_EFAULT;
8186327290SStacey Son             goto execve_end;
8286327290SStacey Son         }
8386327290SStacey Son         total_size += strlen(*q) + 1;
8486327290SStacey Son     }
8586327290SStacey Son     *q++ = NULL;
8686327290SStacey Son 
8786327290SStacey Son     for (gp = guest_envp, q = envp; gp; gp += sizeof(abi_ulong), q++) {
8886327290SStacey Son         if (get_user_ual(addr, gp)) {
8986327290SStacey Son             ret = -TARGET_EFAULT;
9086327290SStacey Son             goto execve_end;
9186327290SStacey Son         }
9286327290SStacey Son         if (!addr) {
9386327290SStacey Son             break;
9486327290SStacey Son         }
9586327290SStacey Son         *q = lock_user_string(addr);
9686327290SStacey Son         if (*q == NULL) {
9786327290SStacey Son             ret = -TARGET_EFAULT;
9886327290SStacey Son             goto execve_end;
9986327290SStacey Son         }
10086327290SStacey Son         total_size += strlen(*q) + 1;
10186327290SStacey Son     }
10286327290SStacey Son     *q = NULL;
10386327290SStacey Son 
10486327290SStacey Son     /*
10586327290SStacey Son      * This case will not be caught by the host's execve() if its
10686327290SStacey Son      * page size is bigger than the target's.
10786327290SStacey Son      */
10886327290SStacey Son     if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) {
10986327290SStacey Son         ret = -TARGET_E2BIG;
11086327290SStacey Son         goto execve_end;
11186327290SStacey Son     }
11286327290SStacey Son 
11386327290SStacey Son     if (do_fexec) {
11486327290SStacey Son         ret = get_errno(fexecve((int)path_or_fd, argp, envp));
11586327290SStacey Son     } else {
11686327290SStacey Son         p = lock_user_string(path_or_fd);
11786327290SStacey Son         if (p == NULL) {
11886327290SStacey Son             ret = -TARGET_EFAULT;
11986327290SStacey Son             goto execve_end;
12086327290SStacey Son         }
12186327290SStacey Son         ret = get_errno(execve(p, argp, envp));
12286327290SStacey Son         unlock_user(p, path_or_fd, 0);
12386327290SStacey Son     }
12486327290SStacey Son 
12586327290SStacey Son execve_end:
12686327290SStacey Son     for (gp = guest_argp, q = argp; *q; gp += sizeof(abi_ulong), q++) {
12786327290SStacey Son         if (get_user_ual(addr, gp) || !addr) {
12886327290SStacey Son             break;
12986327290SStacey Son         }
13086327290SStacey Son         unlock_user(*q, addr, 0);
13186327290SStacey Son     }
13286327290SStacey Son 
13386327290SStacey Son     for (gp = guest_envp, q = envp; *q; gp += sizeof(abi_ulong), q++) {
13486327290SStacey Son         if (get_user_ual(addr, gp) || !addr) {
13586327290SStacey Son             break;
13686327290SStacey Son         }
13786327290SStacey Son         unlock_user(*q, addr, 0);
13886327290SStacey Son     }
13986327290SStacey Son 
14086327290SStacey Son     g_free(qarg0);
14186327290SStacey Son     g_free(envp);
14286327290SStacey Son 
14386327290SStacey Son     return ret;
14486327290SStacey Son }
14586327290SStacey Son 
146dcaa3dfdSStacey Son #include <sys/procctl.h>
147dcaa3dfdSStacey Son 
148dcaa3dfdSStacey Son static abi_long
t2h_procctl_cmd(int target_cmd,int * host_cmd)149dcaa3dfdSStacey Son t2h_procctl_cmd(int target_cmd, int *host_cmd)
150dcaa3dfdSStacey Son {
151dcaa3dfdSStacey Son     switch (target_cmd) {
152dcaa3dfdSStacey Son     case TARGET_PROC_SPROTECT:
153dcaa3dfdSStacey Son         *host_cmd = PROC_SPROTECT;
154dcaa3dfdSStacey Son         break;
155dcaa3dfdSStacey Son 
156dcaa3dfdSStacey Son     case TARGET_PROC_REAP_ACQUIRE:
157dcaa3dfdSStacey Son         *host_cmd = PROC_REAP_ACQUIRE;
158dcaa3dfdSStacey Son         break;
159dcaa3dfdSStacey Son 
160dcaa3dfdSStacey Son     case TARGET_PROC_REAP_RELEASE:
161dcaa3dfdSStacey Son         *host_cmd = PROC_REAP_RELEASE;
162dcaa3dfdSStacey Son         break;
163dcaa3dfdSStacey Son 
164dcaa3dfdSStacey Son     case TARGET_PROC_REAP_STATUS:
165dcaa3dfdSStacey Son         *host_cmd = PROC_REAP_STATUS;
166dcaa3dfdSStacey Son         break;
167dcaa3dfdSStacey Son 
168dcaa3dfdSStacey Son     case TARGET_PROC_REAP_KILL:
169dcaa3dfdSStacey Son         *host_cmd = PROC_REAP_KILL;
170dcaa3dfdSStacey Son         break;
171dcaa3dfdSStacey Son 
172dcaa3dfdSStacey Son     default:
173dcaa3dfdSStacey Son         return -TARGET_EINVAL;
174dcaa3dfdSStacey Son     }
175dcaa3dfdSStacey Son 
176dcaa3dfdSStacey Son     return 0;
177dcaa3dfdSStacey Son }
178dcaa3dfdSStacey Son 
179dcaa3dfdSStacey Son static abi_long
h2t_reaper_status(struct procctl_reaper_status * host_rs,abi_ulong target_rs_addr)180dcaa3dfdSStacey Son h2t_reaper_status(struct procctl_reaper_status *host_rs,
181dcaa3dfdSStacey Son         abi_ulong target_rs_addr)
182dcaa3dfdSStacey Son {
183dcaa3dfdSStacey Son     struct target_procctl_reaper_status *target_rs;
184dcaa3dfdSStacey Son 
185dcaa3dfdSStacey Son     if (!lock_user_struct(VERIFY_WRITE, target_rs, target_rs_addr, 0)) {
186dcaa3dfdSStacey Son         return -TARGET_EFAULT;
187dcaa3dfdSStacey Son     }
188dcaa3dfdSStacey Son     __put_user(host_rs->rs_flags, &target_rs->rs_flags);
189dcaa3dfdSStacey Son     __put_user(host_rs->rs_children, &target_rs->rs_children);
190dcaa3dfdSStacey Son     __put_user(host_rs->rs_descendants, &target_rs->rs_descendants);
191dcaa3dfdSStacey Son     __put_user(host_rs->rs_reaper, &target_rs->rs_reaper);
192dcaa3dfdSStacey Son     __put_user(host_rs->rs_pid, &target_rs->rs_pid);
193dcaa3dfdSStacey Son     unlock_user_struct(target_rs, target_rs_addr, 1);
194dcaa3dfdSStacey Son 
195dcaa3dfdSStacey Son     return 0;
196dcaa3dfdSStacey Son }
197dcaa3dfdSStacey Son 
198dcaa3dfdSStacey Son static abi_long
t2h_reaper_kill(abi_ulong target_rk_addr,struct procctl_reaper_kill * host_rk)199dcaa3dfdSStacey Son t2h_reaper_kill(abi_ulong target_rk_addr, struct procctl_reaper_kill *host_rk)
200dcaa3dfdSStacey Son {
201dcaa3dfdSStacey Son     struct target_procctl_reaper_kill *target_rk;
202dcaa3dfdSStacey Son 
203dcaa3dfdSStacey Son     if (!lock_user_struct(VERIFY_READ, target_rk, target_rk_addr, 1)) {
204dcaa3dfdSStacey Son         return -TARGET_EFAULT;
205dcaa3dfdSStacey Son     }
206dcaa3dfdSStacey Son     __get_user(host_rk->rk_sig, &target_rk->rk_sig);
207dcaa3dfdSStacey Son     __get_user(host_rk->rk_flags, &target_rk->rk_flags);
208dcaa3dfdSStacey Son     __get_user(host_rk->rk_subtree, &target_rk->rk_subtree);
209dcaa3dfdSStacey Son     __get_user(host_rk->rk_killed, &target_rk->rk_killed);
210dcaa3dfdSStacey Son     __get_user(host_rk->rk_fpid, &target_rk->rk_fpid);
211dcaa3dfdSStacey Son     unlock_user_struct(target_rk, target_rk_addr, 0);
212dcaa3dfdSStacey Son 
213dcaa3dfdSStacey Son     return 0;
214dcaa3dfdSStacey Son }
215dcaa3dfdSStacey Son 
216dcaa3dfdSStacey Son static abi_long
h2t_reaper_kill(struct procctl_reaper_kill * host_rk,abi_ulong target_rk_addr)217dcaa3dfdSStacey Son h2t_reaper_kill(struct procctl_reaper_kill *host_rk, abi_ulong target_rk_addr)
218dcaa3dfdSStacey Son {
219dcaa3dfdSStacey Son     struct target_procctl_reaper_kill *target_rk;
220dcaa3dfdSStacey Son 
221dcaa3dfdSStacey Son     if (!lock_user_struct(VERIFY_WRITE, target_rk, target_rk_addr, 0)) {
222dcaa3dfdSStacey Son         return -TARGET_EFAULT;
223dcaa3dfdSStacey Son     }
224dcaa3dfdSStacey Son     __put_user(host_rk->rk_sig, &target_rk->rk_sig);
225dcaa3dfdSStacey Son     __put_user(host_rk->rk_flags, &target_rk->rk_flags);
226dcaa3dfdSStacey Son     __put_user(host_rk->rk_subtree, &target_rk->rk_subtree);
227dcaa3dfdSStacey Son     __put_user(host_rk->rk_killed, &target_rk->rk_killed);
228dcaa3dfdSStacey Son     __put_user(host_rk->rk_fpid, &target_rk->rk_fpid);
229dcaa3dfdSStacey Son     unlock_user_struct(target_rk, target_rk_addr, 1);
230dcaa3dfdSStacey Son 
231dcaa3dfdSStacey Son     return 0;
232dcaa3dfdSStacey Son }
233dcaa3dfdSStacey Son 
234dcaa3dfdSStacey Son static abi_long
h2t_procctl_reaper_pidinfo(struct procctl_reaper_pidinfo * host_pi,abi_ulong target_pi_addr)235dcaa3dfdSStacey Son h2t_procctl_reaper_pidinfo(struct procctl_reaper_pidinfo *host_pi,
236dcaa3dfdSStacey Son         abi_ulong target_pi_addr)
237dcaa3dfdSStacey Son {
238dcaa3dfdSStacey Son     struct target_procctl_reaper_pidinfo *target_pi;
239dcaa3dfdSStacey Son 
240dcaa3dfdSStacey Son     if (!lock_user_struct(VERIFY_WRITE, target_pi, target_pi_addr, 0)) {
241dcaa3dfdSStacey Son         return -TARGET_EFAULT;
242dcaa3dfdSStacey Son     }
243dcaa3dfdSStacey Son     __put_user(host_pi->pi_pid, &target_pi->pi_pid);
244dcaa3dfdSStacey Son     __put_user(host_pi->pi_subtree, &target_pi->pi_subtree);
245dcaa3dfdSStacey Son     __put_user(host_pi->pi_flags, &target_pi->pi_flags);
246dcaa3dfdSStacey Son     unlock_user_struct(target_pi, target_pi_addr, 1);
247dcaa3dfdSStacey Son 
248dcaa3dfdSStacey Son     return 0;
249dcaa3dfdSStacey Son }
250dcaa3dfdSStacey Son 
251dcaa3dfdSStacey Son abi_long
do_freebsd_procctl(void * cpu_env,int idtype,abi_ulong arg2,abi_ulong arg3,abi_ulong arg4,abi_ulong arg5,abi_ulong arg6)252dcaa3dfdSStacey Son do_freebsd_procctl(void *cpu_env, int idtype, abi_ulong arg2, abi_ulong arg3,
253dcaa3dfdSStacey Son        abi_ulong arg4, abi_ulong arg5, abi_ulong arg6)
254dcaa3dfdSStacey Son {
255dcaa3dfdSStacey Son     abi_long error = 0, target_rp_pids;
256dcaa3dfdSStacey Son     void *data;
257dcaa3dfdSStacey Son     int host_cmd, flags;
258dcaa3dfdSStacey Son     uint32_t u, target_rp_count;
259dcaa3dfdSStacey Son     g_autofree union {
260dcaa3dfdSStacey Son         struct procctl_reaper_status rs;
261dcaa3dfdSStacey Son         struct procctl_reaper_pids rp;
262dcaa3dfdSStacey Son         struct procctl_reaper_kill rk;
263dcaa3dfdSStacey Son     } host;
264dcaa3dfdSStacey Son     struct target_procctl_reaper_pids *target_rp;
265dcaa3dfdSStacey Son     id_t id; /* 64-bit */
266dcaa3dfdSStacey Son     int target_cmd;
267dcaa3dfdSStacey Son     abi_ulong target_arg;
268dcaa3dfdSStacey Son 
269dcaa3dfdSStacey Son #if TARGET_ABI_BITS == 32
270dcaa3dfdSStacey Son     /* See if we need to align the register pairs. */
271dcaa3dfdSStacey Son     if (regpairs_aligned(cpu_env)) {
272dcaa3dfdSStacey Son         id = (id_t)target_arg64(arg3, arg4);
273dcaa3dfdSStacey Son         target_cmd = (int)arg5;
274dcaa3dfdSStacey Son         target_arg = arg6;
275dcaa3dfdSStacey Son     } else {
276dcaa3dfdSStacey Son         id = (id_t)target_arg64(arg2, arg3);
277dcaa3dfdSStacey Son         target_cmd = (int)arg4;
278dcaa3dfdSStacey Son         target_arg = arg5;
279dcaa3dfdSStacey Son     }
280dcaa3dfdSStacey Son #else
281dcaa3dfdSStacey Son     id = (id_t)arg2;
282dcaa3dfdSStacey Son     target_cmd = (int)arg3;
283dcaa3dfdSStacey Son     target_arg = arg4;
284dcaa3dfdSStacey Son #endif
285dcaa3dfdSStacey Son 
286dcaa3dfdSStacey Son     error = t2h_procctl_cmd(target_cmd, &host_cmd);
287dcaa3dfdSStacey Son     if (error) {
288dcaa3dfdSStacey Son         return error;
289dcaa3dfdSStacey Son     }
290dcaa3dfdSStacey Son     switch (host_cmd) {
291dcaa3dfdSStacey Son     case PROC_SPROTECT:
292dcaa3dfdSStacey Son         data = &flags;
293dcaa3dfdSStacey Son         break;
294dcaa3dfdSStacey Son 
295dcaa3dfdSStacey Son     case PROC_REAP_ACQUIRE:
296dcaa3dfdSStacey Son     case PROC_REAP_RELEASE:
297dcaa3dfdSStacey Son         if (target_arg == 0) {
298dcaa3dfdSStacey Son             data = NULL;
299dcaa3dfdSStacey Son         } else {
300dcaa3dfdSStacey Son             error = -TARGET_EINVAL;
301dcaa3dfdSStacey Son         }
302dcaa3dfdSStacey Son         break;
303dcaa3dfdSStacey Son 
304dcaa3dfdSStacey Son     case PROC_REAP_STATUS:
305dcaa3dfdSStacey Son         data = &host.rs;
306dcaa3dfdSStacey Son         break;
307dcaa3dfdSStacey Son 
308dcaa3dfdSStacey Son     case PROC_REAP_GETPIDS:
309dcaa3dfdSStacey Son         if (!lock_user_struct(VERIFY_READ, target_rp, target_arg, 1)) {
310dcaa3dfdSStacey Son             return -TARGET_EFAULT;
311dcaa3dfdSStacey Son         }
312dcaa3dfdSStacey Son         __get_user(target_rp_count, &target_rp->rp_count);
313dcaa3dfdSStacey Son         __get_user(target_rp_pids, &target_rp->rp_pids);
314dcaa3dfdSStacey Son         unlock_user_struct(target_rp, target_arg, 0);
315dcaa3dfdSStacey Son         host.rp.rp_count = target_rp_count;
316dcaa3dfdSStacey Son         host.rp.rp_pids = g_try_new(struct procctl_reaper_pidinfo,
317dcaa3dfdSStacey Son             target_rp_count);
318dcaa3dfdSStacey Son 
319dcaa3dfdSStacey Son         if (host.rp.rp_pids == NULL) {
320dcaa3dfdSStacey Son             error = -TARGET_ENOMEM;
321dcaa3dfdSStacey Son         } else {
322dcaa3dfdSStacey Son             data = &host.rp;
323dcaa3dfdSStacey Son         }
324dcaa3dfdSStacey Son         break;
325dcaa3dfdSStacey Son 
326dcaa3dfdSStacey Son     case PROC_REAP_KILL:
327dcaa3dfdSStacey Son         error = t2h_reaper_kill(target_arg, &host.rk);
328dcaa3dfdSStacey Son         break;
329dcaa3dfdSStacey Son     }
330dcaa3dfdSStacey Son 
331dcaa3dfdSStacey Son     if (error) {
332dcaa3dfdSStacey Son         return error;
333dcaa3dfdSStacey Son     }
334dcaa3dfdSStacey Son     error = get_errno(procctl(idtype, id, host_cmd, data));
335dcaa3dfdSStacey Son 
336dcaa3dfdSStacey Son     if (error) {
337dcaa3dfdSStacey Son         return error;
338dcaa3dfdSStacey Son     }
339dcaa3dfdSStacey Son     switch (host_cmd) {
340dcaa3dfdSStacey Son     case PROC_SPROTECT:
341dcaa3dfdSStacey Son         if (put_user_s32(flags, target_arg)) {
342dcaa3dfdSStacey Son             return -TARGET_EFAULT;
343dcaa3dfdSStacey Son         }
344dcaa3dfdSStacey Son         break;
345dcaa3dfdSStacey Son 
346dcaa3dfdSStacey Son     case PROC_REAP_STATUS:
347dcaa3dfdSStacey Son         error = h2t_reaper_status(&host.rs, target_arg);
348dcaa3dfdSStacey Son         break;
349dcaa3dfdSStacey Son 
350dcaa3dfdSStacey Son     case PROC_REAP_GETPIDS:
351dcaa3dfdSStacey Son         /* copyout reaper pidinfo */
352dcaa3dfdSStacey Son         for (u = 0; u < target_rp_count; u++) {
353dcaa3dfdSStacey Son             error = h2t_procctl_reaper_pidinfo(&host.rp.rp_pids[u],
354dcaa3dfdSStacey Son                     target_rp_pids +
355dcaa3dfdSStacey Son                     (u * sizeof(struct target_procctl_reaper_pidinfo)));
356dcaa3dfdSStacey Son             if (error) {
357dcaa3dfdSStacey Son                 break;
358dcaa3dfdSStacey Son             }
359dcaa3dfdSStacey Son         }
360dcaa3dfdSStacey Son         break;
361dcaa3dfdSStacey Son 
362dcaa3dfdSStacey Son     case PROC_REAP_KILL:
363dcaa3dfdSStacey Son         error = h2t_reaper_kill(&host.rk, target_arg);
364dcaa3dfdSStacey Son         break;
365dcaa3dfdSStacey Son     }
366dcaa3dfdSStacey Son 
367dcaa3dfdSStacey Son     return error;
368dcaa3dfdSStacey Son }
369