mirror of https://gitlab.com/qemu-project/qemu
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
294 lines
7.3 KiB
C
294 lines
7.3 KiB
C
/*
|
|
* process related system call shims and definitions
|
|
*
|
|
* Copyright (c) 2013-14 Stacey D. Son
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#ifndef BSD_USER_FREEBSD_OS_PROC_H
|
|
#define BSD_USER_FREEBSD_OS_PROC_H
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/procctl.h>
|
|
#include <sys/signal.h>
|
|
#include <sys/types.h>
|
|
#include <sys/procdesc.h>
|
|
#include <sys/wait.h>
|
|
#include <unistd.h>
|
|
|
|
#include "target_arch_cpu.h"
|
|
|
|
pid_t safe_wait4(pid_t wpid, int *status, int options, struct rusage *rusage);
|
|
pid_t safe_wait6(idtype_t idtype, id_t id, int *status, int options,
|
|
struct __wrusage *wrusage, siginfo_t *infop);
|
|
|
|
extern int __setugid(int flag);
|
|
|
|
/* execve(2) */
|
|
static inline abi_long do_freebsd_execve(abi_ulong path_or_fd, abi_ulong argp,
|
|
abi_ulong envp)
|
|
{
|
|
|
|
return freebsd_exec_common(path_or_fd, argp, envp, 0);
|
|
}
|
|
|
|
/* fexecve(2) */
|
|
static inline abi_long do_freebsd_fexecve(abi_ulong path_or_fd, abi_ulong argp,
|
|
abi_ulong envp)
|
|
{
|
|
|
|
return freebsd_exec_common(path_or_fd, argp, envp, 1);
|
|
}
|
|
|
|
/* wait4(2) */
|
|
static inline abi_long do_freebsd_wait4(abi_long arg1, abi_ulong target_status,
|
|
abi_long arg3, abi_ulong target_rusage)
|
|
{
|
|
abi_long ret;
|
|
int status;
|
|
struct rusage rusage, *rusage_ptr = NULL;
|
|
|
|
if (target_rusage) {
|
|
rusage_ptr = &rusage;
|
|
}
|
|
ret = get_errno(safe_wait4(arg1, &status, arg3, rusage_ptr));
|
|
|
|
if (ret < 0) {
|
|
return ret;
|
|
}
|
|
if (target_status != 0) {
|
|
status = host_to_target_waitstatus(status);
|
|
if (put_user_s32(status, target_status) != 0) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
}
|
|
if (target_rusage != 0) {
|
|
host_to_target_rusage(target_rusage, &rusage);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* wait6(2) */
|
|
static inline abi_long do_freebsd_wait6(void *cpu_env, abi_long idtype,
|
|
abi_long id1, abi_long id2,
|
|
abi_ulong target_status, abi_long options, abi_ulong target_wrusage,
|
|
abi_ulong target_infop, abi_ulong pad1)
|
|
{
|
|
abi_long ret;
|
|
int status;
|
|
struct __wrusage wrusage, *wrusage_ptr = NULL;
|
|
siginfo_t info;
|
|
void *p;
|
|
|
|
if (regpairs_aligned(cpu_env) != 0) {
|
|
/* printf("shifting args\n"); */
|
|
/* 64-bit id is aligned, so shift all the arguments over by one */
|
|
id1 = id2;
|
|
id2 = target_status;
|
|
target_status = options;
|
|
options = target_wrusage;
|
|
target_wrusage = target_infop;
|
|
target_infop = pad1;
|
|
}
|
|
|
|
if (target_wrusage) {
|
|
wrusage_ptr = &wrusage;
|
|
}
|
|
ret = get_errno(safe_wait6(idtype, target_arg64(id1, id2),
|
|
&status, options, wrusage_ptr, &info));
|
|
|
|
if (ret < 0) {
|
|
return ret;
|
|
}
|
|
if (target_status != 0) {
|
|
status = host_to_target_waitstatus(status);
|
|
if (put_user_s32(status, target_status) != 0) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
}
|
|
if (target_wrusage != 0) {
|
|
host_to_target_wrusage(target_wrusage, &wrusage);
|
|
}
|
|
if (target_infop != 0) {
|
|
p = lock_user(VERIFY_WRITE, target_infop, sizeof(target_siginfo_t), 0);
|
|
if (p == NULL) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
host_to_target_siginfo(p, &info);
|
|
unlock_user(p, target_infop, sizeof(target_siginfo_t));
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* setloginclass(2) */
|
|
static inline abi_long do_freebsd_setloginclass(abi_ulong arg1)
|
|
{
|
|
abi_long ret;
|
|
void *p;
|
|
|
|
p = lock_user_string(arg1);
|
|
if (p == NULL) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
ret = get_errno(setloginclass(p));
|
|
unlock_user(p, arg1, 0);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* getloginclass(2) */
|
|
static inline abi_long do_freebsd_getloginclass(abi_ulong arg1, abi_ulong arg2)
|
|
{
|
|
abi_long ret;
|
|
void *p;
|
|
|
|
p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
|
|
if (p == NULL) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
ret = get_errno(getloginclass(p, arg2));
|
|
unlock_user(p, arg1, arg2);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* pdgetpid(2) */
|
|
static inline abi_long do_freebsd_pdgetpid(abi_long fd, abi_ulong target_pidp)
|
|
{
|
|
abi_long ret;
|
|
pid_t pid;
|
|
|
|
ret = get_errno(pdgetpid(fd, &pid));
|
|
if (!is_error(ret)) {
|
|
if (put_user_u32(pid, target_pidp)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* undocumented __setugid */
|
|
static inline abi_long do_freebsd___setugid(abi_long arg1)
|
|
{
|
|
return -TARGET_ENOSYS;
|
|
}
|
|
|
|
/* fork(2) */
|
|
static inline abi_long do_freebsd_fork(void *cpu_env)
|
|
{
|
|
abi_long ret;
|
|
abi_ulong child_flag;
|
|
|
|
fork_start();
|
|
ret = fork();
|
|
if (ret == 0) {
|
|
/* child */
|
|
child_flag = 1;
|
|
target_cpu_clone_regs(cpu_env, 0);
|
|
} else {
|
|
/* parent */
|
|
child_flag = 0;
|
|
}
|
|
|
|
/*
|
|
* The fork system call sets a child flag in the second return
|
|
* value: 0 for parent process, 1 for child process.
|
|
*/
|
|
set_second_rval(cpu_env, child_flag);
|
|
|
|
fork_end(ret);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* vfork(2) */
|
|
static inline abi_long do_freebsd_vfork(void *cpu_env)
|
|
{
|
|
return do_freebsd_fork(cpu_env);
|
|
}
|
|
|
|
/* rfork(2) */
|
|
static inline abi_long do_freebsd_rfork(void *cpu_env, abi_long flags)
|
|
{
|
|
abi_long ret;
|
|
abi_ulong child_flag;
|
|
|
|
/*
|
|
* XXX We need to handle RFMEM here, as well. Neither are safe to execute
|
|
* as-is on x86 hosts because they'll split memory but not the stack,
|
|
* wreaking havoc on host architectures that use the stack to store the
|
|
* return address as both threads try to pop it off. Rejecting RFSPAWN
|
|
* entirely for now is ok, the only consumer at the moment is posix_spawn
|
|
* and it will fall back to classic vfork(2) if we return EINVAL.
|
|
*/
|
|
if ((flags & TARGET_RFSPAWN) != 0) {
|
|
return -TARGET_EINVAL;
|
|
}
|
|
fork_start();
|
|
ret = rfork(flags);
|
|
if (ret == 0) {
|
|
/* child */
|
|
child_flag = 1;
|
|
target_cpu_clone_regs(cpu_env, 0);
|
|
} else {
|
|
/* parent */
|
|
child_flag = 0;
|
|
}
|
|
|
|
/*
|
|
* The fork system call sets a child flag in the second return
|
|
* value: 0 for parent process, 1 for child process.
|
|
*/
|
|
set_second_rval(cpu_env, child_flag);
|
|
fork_end(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
/* pdfork(2) */
|
|
static inline abi_long do_freebsd_pdfork(void *cpu_env, abi_ulong target_fdp,
|
|
abi_long flags)
|
|
{
|
|
abi_long ret;
|
|
abi_ulong child_flag;
|
|
int fd;
|
|
|
|
fork_start();
|
|
ret = pdfork(&fd, flags);
|
|
if (ret == 0) {
|
|
/* child */
|
|
child_flag = 1;
|
|
target_cpu_clone_regs(cpu_env, 0);
|
|
} else {
|
|
/* parent */
|
|
child_flag = 0;
|
|
if (put_user_s32(fd, target_fdp)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* The fork system call sets a child flag in the second return
|
|
* value: 0 for parent process, 1 for child process.
|
|
*/
|
|
set_second_rval(cpu_env, child_flag);
|
|
fork_end(ret);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* BSD_USER_FREEBSD_OS_PROC_H */
|