 e6e102b972
			
		
	
	
		e6e102b972
		
	
	
	
	
		
			
			This removes the logic which prepends the emulator to each call to execve and fexecve. This is not necessary with the existing imgact_binmisc support and it avoids the need to install the emulator binary into jail environments when using 'binmiscctl --pre-open'. Signed-off-by: Doug Rabson <dfr@rabson.org> Reviewed-by: Warner Losh <imp@bsdimp.com> Signed-off-by: Warner Losh <imp@bsdimp.com> Acked-by: Richard Henderson <richard.henderson@linaro.org>
		
			
				
	
	
		
			369 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			369 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  *  FreeBSD process related emulation code
 | |
|  *
 | |
|  *  Copyright (c) 2013-15 Stacey D. Son
 | |
|  *
 | |
|  *  This program is free software; you can redistribute it and/or modify
 | |
|  *  it under the terms of the GNU General Public License as published by
 | |
|  *  the Free Software Foundation; either version 2 of the License, or
 | |
|  *  (at your option) any later version.
 | |
|  *
 | |
|  *  This program is distributed in the hope that it will be useful,
 | |
|  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|  *  GNU General Public License for more details.
 | |
|  *
 | |
|  *  You should have received a copy of the GNU General Public License
 | |
|  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
 | |
|  */
 | |
| #include "qemu/osdep.h"
 | |
| 
 | |
| #include <sys/param.h>
 | |
| #include <sys/queue.h>
 | |
| #include <sys/sysctl.h>
 | |
| struct kinfo_proc;
 | |
| #include <libprocstat.h>
 | |
| 
 | |
| #include "qemu.h"
 | |
| 
 | |
| /*
 | |
|  * execve/fexecve
 | |
|  */
 | |
| abi_long freebsd_exec_common(abi_ulong path_or_fd, abi_ulong guest_argp,
 | |
|         abi_ulong guest_envp, int do_fexec)
 | |
| {
 | |
|     char **argp, **envp, **qarg0;
 | |
|     int argc, envc;
 | |
|     abi_ulong gp;
 | |
|     abi_ulong addr;
 | |
|     char **q;
 | |
|     int total_size = 0;
 | |
|     void *p;
 | |
|     abi_long ret;
 | |
| 
 | |
|     argc = 0;
 | |
|     for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) {
 | |
|         if (get_user_ual(addr, gp)) {
 | |
|             return -TARGET_EFAULT;
 | |
|         }
 | |
|         if (!addr) {
 | |
|             break;
 | |
|         }
 | |
|         argc++;
 | |
|     }
 | |
|     envc = 0;
 | |
|     for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) {
 | |
|         if (get_user_ual(addr, gp)) {
 | |
|             return -TARGET_EFAULT;
 | |
|         }
 | |
|         if (!addr) {
 | |
|             break;
 | |
|         }
 | |
|         envc++;
 | |
|     }
 | |
| 
 | |
|     qarg0 = argp = g_new0(char *, argc + 9);
 | |
|     /* save the first argument for the emulator */
 | |
|     *argp++ = (char *)getprogname();
 | |
|     *argp++ = (char *)getprogname();
 | |
|     envp = g_new0(char *, envc + 1);
 | |
|     for (gp = guest_argp, q = argp; gp; gp += sizeof(abi_ulong), q++) {
 | |
|         if (get_user_ual(addr, gp)) {
 | |
|             ret = -TARGET_EFAULT;
 | |
|             goto execve_end;
 | |
|         }
 | |
|         if (!addr) {
 | |
|             break;
 | |
|         }
 | |
|         *q = lock_user_string(addr);
 | |
|         if (*q == NULL) {
 | |
|             ret = -TARGET_EFAULT;
 | |
|             goto execve_end;
 | |
|         }
 | |
|         total_size += strlen(*q) + 1;
 | |
|     }
 | |
|     *q++ = NULL;
 | |
| 
 | |
|     for (gp = guest_envp, q = envp; gp; gp += sizeof(abi_ulong), q++) {
 | |
|         if (get_user_ual(addr, gp)) {
 | |
|             ret = -TARGET_EFAULT;
 | |
|             goto execve_end;
 | |
|         }
 | |
|         if (!addr) {
 | |
|             break;
 | |
|         }
 | |
|         *q = lock_user_string(addr);
 | |
|         if (*q == NULL) {
 | |
|             ret = -TARGET_EFAULT;
 | |
|             goto execve_end;
 | |
|         }
 | |
|         total_size += strlen(*q) + 1;
 | |
|     }
 | |
|     *q = NULL;
 | |
| 
 | |
|     /*
 | |
|      * This case will not be caught by the host's execve() if its
 | |
|      * page size is bigger than the target's.
 | |
|      */
 | |
|     if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) {
 | |
|         ret = -TARGET_E2BIG;
 | |
|         goto execve_end;
 | |
|     }
 | |
| 
 | |
|     if (do_fexec) {
 | |
|         ret = get_errno(fexecve((int)path_or_fd, argp, envp));
 | |
|     } else {
 | |
|         p = lock_user_string(path_or_fd);
 | |
|         if (p == NULL) {
 | |
|             ret = -TARGET_EFAULT;
 | |
|             goto execve_end;
 | |
|         }
 | |
|         ret = get_errno(execve(p, argp, envp));
 | |
|         unlock_user(p, path_or_fd, 0);
 | |
|     }
 | |
| 
 | |
| execve_end:
 | |
|     for (gp = guest_argp, q = argp; *q; gp += sizeof(abi_ulong), q++) {
 | |
|         if (get_user_ual(addr, gp) || !addr) {
 | |
|             break;
 | |
|         }
 | |
|         unlock_user(*q, addr, 0);
 | |
|     }
 | |
| 
 | |
|     for (gp = guest_envp, q = envp; *q; gp += sizeof(abi_ulong), q++) {
 | |
|         if (get_user_ual(addr, gp) || !addr) {
 | |
|             break;
 | |
|         }
 | |
|         unlock_user(*q, addr, 0);
 | |
|     }
 | |
| 
 | |
|     g_free(qarg0);
 | |
|     g_free(envp);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| #include <sys/procctl.h>
 | |
| 
 | |
| static abi_long
 | |
| t2h_procctl_cmd(int target_cmd, int *host_cmd)
 | |
| {
 | |
|     switch (target_cmd) {
 | |
|     case TARGET_PROC_SPROTECT:
 | |
|         *host_cmd = PROC_SPROTECT;
 | |
|         break;
 | |
| 
 | |
|     case TARGET_PROC_REAP_ACQUIRE:
 | |
|         *host_cmd = PROC_REAP_ACQUIRE;
 | |
|         break;
 | |
| 
 | |
|     case TARGET_PROC_REAP_RELEASE:
 | |
|         *host_cmd = PROC_REAP_RELEASE;
 | |
|         break;
 | |
| 
 | |
|     case TARGET_PROC_REAP_STATUS:
 | |
|         *host_cmd = PROC_REAP_STATUS;
 | |
|         break;
 | |
| 
 | |
|     case TARGET_PROC_REAP_KILL:
 | |
|         *host_cmd = PROC_REAP_KILL;
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         return -TARGET_EINVAL;
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static abi_long
 | |
| h2t_reaper_status(struct procctl_reaper_status *host_rs,
 | |
|         abi_ulong target_rs_addr)
 | |
| {
 | |
|     struct target_procctl_reaper_status *target_rs;
 | |
| 
 | |
|     if (!lock_user_struct(VERIFY_WRITE, target_rs, target_rs_addr, 0)) {
 | |
|         return -TARGET_EFAULT;
 | |
|     }
 | |
|     __put_user(host_rs->rs_flags, &target_rs->rs_flags);
 | |
|     __put_user(host_rs->rs_children, &target_rs->rs_children);
 | |
|     __put_user(host_rs->rs_descendants, &target_rs->rs_descendants);
 | |
|     __put_user(host_rs->rs_reaper, &target_rs->rs_reaper);
 | |
|     __put_user(host_rs->rs_pid, &target_rs->rs_pid);
 | |
|     unlock_user_struct(target_rs, target_rs_addr, 1);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static abi_long
 | |
| t2h_reaper_kill(abi_ulong target_rk_addr, struct procctl_reaper_kill *host_rk)
 | |
| {
 | |
|     struct target_procctl_reaper_kill *target_rk;
 | |
| 
 | |
|     if (!lock_user_struct(VERIFY_READ, target_rk, target_rk_addr, 1)) {
 | |
|         return -TARGET_EFAULT;
 | |
|     }
 | |
|     __get_user(host_rk->rk_sig, &target_rk->rk_sig);
 | |
|     __get_user(host_rk->rk_flags, &target_rk->rk_flags);
 | |
|     __get_user(host_rk->rk_subtree, &target_rk->rk_subtree);
 | |
|     __get_user(host_rk->rk_killed, &target_rk->rk_killed);
 | |
|     __get_user(host_rk->rk_fpid, &target_rk->rk_fpid);
 | |
|     unlock_user_struct(target_rk, target_rk_addr, 0);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static abi_long
 | |
| h2t_reaper_kill(struct procctl_reaper_kill *host_rk, abi_ulong target_rk_addr)
 | |
| {
 | |
|     struct target_procctl_reaper_kill *target_rk;
 | |
| 
 | |
|     if (!lock_user_struct(VERIFY_WRITE, target_rk, target_rk_addr, 0)) {
 | |
|         return -TARGET_EFAULT;
 | |
|     }
 | |
|     __put_user(host_rk->rk_sig, &target_rk->rk_sig);
 | |
|     __put_user(host_rk->rk_flags, &target_rk->rk_flags);
 | |
|     __put_user(host_rk->rk_subtree, &target_rk->rk_subtree);
 | |
|     __put_user(host_rk->rk_killed, &target_rk->rk_killed);
 | |
|     __put_user(host_rk->rk_fpid, &target_rk->rk_fpid);
 | |
|     unlock_user_struct(target_rk, target_rk_addr, 1);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static abi_long
 | |
| h2t_procctl_reaper_pidinfo(struct procctl_reaper_pidinfo *host_pi,
 | |
|         abi_ulong target_pi_addr)
 | |
| {
 | |
|     struct target_procctl_reaper_pidinfo *target_pi;
 | |
| 
 | |
|     if (!lock_user_struct(VERIFY_WRITE, target_pi, target_pi_addr, 0)) {
 | |
|         return -TARGET_EFAULT;
 | |
|     }
 | |
|     __put_user(host_pi->pi_pid, &target_pi->pi_pid);
 | |
|     __put_user(host_pi->pi_subtree, &target_pi->pi_subtree);
 | |
|     __put_user(host_pi->pi_flags, &target_pi->pi_flags);
 | |
|     unlock_user_struct(target_pi, target_pi_addr, 1);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| abi_long
 | |
| do_freebsd_procctl(void *cpu_env, int idtype, abi_ulong arg2, abi_ulong arg3,
 | |
|        abi_ulong arg4, abi_ulong arg5, abi_ulong arg6)
 | |
| {
 | |
|     abi_long error = 0, target_rp_pids;
 | |
|     void *data;
 | |
|     int host_cmd, flags;
 | |
|     uint32_t u, target_rp_count;
 | |
|     g_autofree union {
 | |
|         struct procctl_reaper_status rs;
 | |
|         struct procctl_reaper_pids rp;
 | |
|         struct procctl_reaper_kill rk;
 | |
|     } host;
 | |
|     struct target_procctl_reaper_pids *target_rp;
 | |
|     id_t id; /* 64-bit */
 | |
|     int target_cmd;
 | |
|     abi_ulong target_arg;
 | |
| 
 | |
| #if TARGET_ABI_BITS == 32
 | |
|     /* See if we need to align the register pairs. */
 | |
|     if (regpairs_aligned(cpu_env)) {
 | |
|         id = (id_t)target_arg64(arg3, arg4);
 | |
|         target_cmd = (int)arg5;
 | |
|         target_arg = arg6;
 | |
|     } else {
 | |
|         id = (id_t)target_arg64(arg2, arg3);
 | |
|         target_cmd = (int)arg4;
 | |
|         target_arg = arg5;
 | |
|     }
 | |
| #else
 | |
|     id = (id_t)arg2;
 | |
|     target_cmd = (int)arg3;
 | |
|     target_arg = arg4;
 | |
| #endif
 | |
| 
 | |
|     error = t2h_procctl_cmd(target_cmd, &host_cmd);
 | |
|     if (error) {
 | |
|         return error;
 | |
|     }
 | |
|     switch (host_cmd) {
 | |
|     case PROC_SPROTECT:
 | |
|         data = &flags;
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_ACQUIRE:
 | |
|     case PROC_REAP_RELEASE:
 | |
|         if (target_arg == 0) {
 | |
|             data = NULL;
 | |
|         } else {
 | |
|             error = -TARGET_EINVAL;
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_STATUS:
 | |
|         data = &host.rs;
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_GETPIDS:
 | |
|         if (!lock_user_struct(VERIFY_READ, target_rp, target_arg, 1)) {
 | |
|             return -TARGET_EFAULT;
 | |
|         }
 | |
|         __get_user(target_rp_count, &target_rp->rp_count);
 | |
|         __get_user(target_rp_pids, &target_rp->rp_pids);
 | |
|         unlock_user_struct(target_rp, target_arg, 0);
 | |
|         host.rp.rp_count = target_rp_count;
 | |
|         host.rp.rp_pids = g_try_new(struct procctl_reaper_pidinfo,
 | |
|             target_rp_count);
 | |
| 
 | |
|         if (host.rp.rp_pids == NULL) {
 | |
|             error = -TARGET_ENOMEM;
 | |
|         } else {
 | |
|             data = &host.rp;
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_KILL:
 | |
|         error = t2h_reaper_kill(target_arg, &host.rk);
 | |
|         break;
 | |
|     }
 | |
| 
 | |
|     if (error) {
 | |
|         return error;
 | |
|     }
 | |
|     error = get_errno(procctl(idtype, id, host_cmd, data));
 | |
| 
 | |
|     if (error) {
 | |
|         return error;
 | |
|     }
 | |
|     switch (host_cmd) {
 | |
|     case PROC_SPROTECT:
 | |
|         if (put_user_s32(flags, target_arg)) {
 | |
|             return -TARGET_EFAULT;
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_STATUS:
 | |
|         error = h2t_reaper_status(&host.rs, target_arg);
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_GETPIDS:
 | |
|         /* copyout reaper pidinfo */
 | |
|         for (u = 0; u < target_rp_count; u++) {
 | |
|             error = h2t_procctl_reaper_pidinfo(&host.rp.rp_pids[u],
 | |
|                     target_rp_pids +
 | |
|                     (u * sizeof(struct target_procctl_reaper_pidinfo)));
 | |
|             if (error) {
 | |
|                 break;
 | |
|             }
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     case PROC_REAP_KILL:
 | |
|         error = h2t_reaper_kill(&host.rk, target_arg);
 | |
|         break;
 | |
|     }
 | |
| 
 | |
|     return error;
 | |
| }
 |