mirror of
https://github.com/qemu/qemu.git
synced 2024-12-14 23:13:29 +08:00
ff26637260
Signed-off-by: Stacey Son <sson@FreeBSD.org> Signed-off-by: Karim Taha <kariem.taha2.7@gmail.com> Reviewed-by: Warner Losh <imp@bsdimp.com> Message-Id: <20230925182425.3163-19-kariem.taha2.7@gmail.com>
418 lines
9.5 KiB
C
418 lines
9.5 KiB
C
/*
|
|
* process related system call shims and definitions
|
|
*
|
|
* Copyright (c) 2013-2014 Stacey D. Son
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#ifndef BSD_PROC_H_
|
|
#define BSD_PROC_H_
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#include "qemu-bsd.h"
|
|
#include "gdbstub/syscalls.h"
|
|
#include "qemu/plugin.h"
|
|
|
|
extern int _getlogin(char*, int);
|
|
int bsd_get_ncpu(void);
|
|
|
|
/* exit(2) */
|
|
static inline abi_long do_bsd_exit(void *cpu_env, abi_long arg1)
|
|
{
|
|
#ifdef TARGET_GPROF
|
|
_mcleanup();
|
|
#endif
|
|
gdb_exit(arg1);
|
|
qemu_plugin_user_exit();
|
|
_exit(arg1);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* getgroups(2) */
|
|
static inline abi_long do_bsd_getgroups(abi_long gidsetsize, abi_long arg2)
|
|
{
|
|
abi_long ret;
|
|
uint32_t *target_grouplist;
|
|
g_autofree gid_t *grouplist;
|
|
int i;
|
|
|
|
grouplist = g_try_new(gid_t, gidsetsize);
|
|
ret = get_errno(getgroups(gidsetsize, grouplist));
|
|
if (gidsetsize != 0) {
|
|
if (!is_error(ret)) {
|
|
target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 2, 0);
|
|
if (!target_grouplist) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
for (i = 0; i < ret; i++) {
|
|
target_grouplist[i] = tswap32(grouplist[i]);
|
|
}
|
|
unlock_user(target_grouplist, arg2, gidsetsize * 2);
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* setgroups(2) */
|
|
static inline abi_long do_bsd_setgroups(abi_long gidsetsize, abi_long arg2)
|
|
{
|
|
uint32_t *target_grouplist;
|
|
g_autofree gid_t *grouplist;
|
|
int i;
|
|
|
|
grouplist = g_try_new(gid_t, gidsetsize);
|
|
target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 2, 1);
|
|
if (!target_grouplist) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
for (i = 0; i < gidsetsize; i++) {
|
|
grouplist[i] = tswap32(target_grouplist[i]);
|
|
}
|
|
unlock_user(target_grouplist, arg2, 0);
|
|
return get_errno(setgroups(gidsetsize, grouplist));
|
|
}
|
|
|
|
/* umask(2) */
|
|
static inline abi_long do_bsd_umask(abi_long arg1)
|
|
{
|
|
return get_errno(umask(arg1));
|
|
}
|
|
|
|
/* setlogin(2) */
|
|
static inline abi_long do_bsd_setlogin(abi_long arg1)
|
|
{
|
|
abi_long ret;
|
|
void *p;
|
|
|
|
p = lock_user_string(arg1);
|
|
if (p == NULL) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
ret = get_errno(setlogin(p));
|
|
unlock_user(p, arg1, 0);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* getlogin(2) */
|
|
static inline abi_long do_bsd_getlogin(abi_long arg1, abi_long arg2)
|
|
{
|
|
abi_long ret;
|
|
void *p;
|
|
|
|
p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
|
|
if (p == NULL) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
ret = get_errno(_getlogin(p, arg2));
|
|
unlock_user(p, arg1, arg2);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* getrusage(2) */
|
|
static inline abi_long do_bsd_getrusage(abi_long who, abi_ulong target_addr)
|
|
{
|
|
abi_long ret;
|
|
struct rusage rusage;
|
|
|
|
ret = get_errno(getrusage(who, &rusage));
|
|
if (!is_error(ret)) {
|
|
host_to_target_rusage(target_addr, &rusage);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* getrlimit(2) */
|
|
static inline abi_long do_bsd_getrlimit(abi_long arg1, abi_ulong arg2)
|
|
{
|
|
abi_long ret;
|
|
int resource = target_to_host_resource(arg1);
|
|
struct target_rlimit *target_rlim;
|
|
struct rlimit rlim;
|
|
|
|
switch (resource) {
|
|
case RLIMIT_STACK:
|
|
rlim.rlim_cur = target_dflssiz;
|
|
rlim.rlim_max = target_maxssiz;
|
|
ret = 0;
|
|
break;
|
|
|
|
case RLIMIT_DATA:
|
|
rlim.rlim_cur = target_dfldsiz;
|
|
rlim.rlim_max = target_maxdsiz;
|
|
ret = 0;
|
|
break;
|
|
|
|
default:
|
|
ret = get_errno(getrlimit(resource, &rlim));
|
|
break;
|
|
}
|
|
if (!is_error(ret)) {
|
|
if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur);
|
|
target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max);
|
|
unlock_user_struct(target_rlim, arg2, 1);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* setrlimit(2) */
|
|
static inline abi_long do_bsd_setrlimit(abi_long arg1, abi_ulong arg2)
|
|
{
|
|
abi_long ret;
|
|
int resource = target_to_host_resource(arg1);
|
|
struct target_rlimit *target_rlim;
|
|
struct rlimit rlim;
|
|
|
|
if (RLIMIT_STACK == resource) {
|
|
/* XXX We should, maybe, allow the stack size to shrink */
|
|
ret = -TARGET_EPERM;
|
|
} else {
|
|
if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
rlim.rlim_cur = target_to_host_rlim(target_rlim->rlim_cur);
|
|
rlim.rlim_max = target_to_host_rlim(target_rlim->rlim_max);
|
|
unlock_user_struct(target_rlim, arg2, 0);
|
|
ret = get_errno(setrlimit(resource, &rlim));
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* getpid(2) */
|
|
static inline abi_long do_bsd_getpid(void)
|
|
{
|
|
return get_errno(getpid());
|
|
}
|
|
|
|
/* getppid(2) */
|
|
static inline abi_long do_bsd_getppid(void)
|
|
{
|
|
return get_errno(getppid());
|
|
}
|
|
|
|
/* getuid(2) */
|
|
static inline abi_long do_bsd_getuid(void)
|
|
{
|
|
return get_errno(getuid());
|
|
}
|
|
|
|
/* geteuid(2) */
|
|
static inline abi_long do_bsd_geteuid(void)
|
|
{
|
|
return get_errno(geteuid());
|
|
}
|
|
|
|
/* getgid(2) */
|
|
static inline abi_long do_bsd_getgid(void)
|
|
{
|
|
return get_errno(getgid());
|
|
}
|
|
|
|
/* getegid(2) */
|
|
static inline abi_long do_bsd_getegid(void)
|
|
{
|
|
return get_errno(getegid());
|
|
}
|
|
|
|
/* setuid(2) */
|
|
static inline abi_long do_bsd_setuid(abi_long arg1)
|
|
{
|
|
return get_errno(setuid(arg1));
|
|
}
|
|
|
|
/* seteuid(2) */
|
|
static inline abi_long do_bsd_seteuid(abi_long arg1)
|
|
{
|
|
return get_errno(seteuid(arg1));
|
|
}
|
|
|
|
/* setgid(2) */
|
|
static inline abi_long do_bsd_setgid(abi_long arg1)
|
|
{
|
|
return get_errno(setgid(arg1));
|
|
}
|
|
|
|
/* setegid(2) */
|
|
static inline abi_long do_bsd_setegid(abi_long arg1)
|
|
{
|
|
return get_errno(setegid(arg1));
|
|
}
|
|
|
|
/* getpgid(2) */
|
|
static inline abi_long do_bsd_getpgid(pid_t pid)
|
|
{
|
|
return get_errno(getpgid(pid));
|
|
}
|
|
|
|
/* setpgid(2) */
|
|
static inline abi_long do_bsd_setpgid(int pid, int pgrp)
|
|
{
|
|
return get_errno(setpgid(pid, pgrp));
|
|
}
|
|
|
|
/* getpgrp(2) */
|
|
static inline abi_long do_bsd_getpgrp(void)
|
|
{
|
|
return get_errno(getpgrp());
|
|
}
|
|
|
|
/* setreuid(2) */
|
|
static inline abi_long do_bsd_setreuid(abi_long arg1, abi_long arg2)
|
|
{
|
|
return get_errno(setreuid(arg1, arg2));
|
|
}
|
|
|
|
/* setregid(2) */
|
|
static inline abi_long do_bsd_setregid(abi_long arg1, abi_long arg2)
|
|
{
|
|
return get_errno(setregid(arg1, arg2));
|
|
}
|
|
|
|
/* setresgid(2) */
|
|
static inline abi_long do_bsd_setresgid(gid_t rgid, gid_t egid, gid_t sgid)
|
|
{
|
|
return get_errno(setresgid(rgid, egid, sgid));
|
|
}
|
|
|
|
/* setresuid(2) */
|
|
static inline abi_long do_bsd_setresuid(uid_t ruid, uid_t euid, uid_t suid)
|
|
{
|
|
return get_errno(setresuid(ruid, euid, suid));
|
|
}
|
|
|
|
/* getresuid(2) */
|
|
static inline abi_long do_bsd_getresuid(abi_ulong arg1, abi_ulong arg2,
|
|
abi_ulong arg3)
|
|
{
|
|
abi_long ret;
|
|
uid_t ruid, euid, suid;
|
|
|
|
ret = get_errno(getresuid(&ruid, &euid, &suid));
|
|
if (is_error(ret)) {
|
|
return ret;
|
|
}
|
|
if (put_user_s32(ruid, arg1)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
if (put_user_s32(euid, arg2)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
if (put_user_s32(suid, arg3)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* getresgid(2) */
|
|
static inline abi_long do_bsd_getresgid(abi_ulong arg1, abi_ulong arg2,
|
|
abi_ulong arg3)
|
|
{
|
|
abi_long ret;
|
|
uid_t ruid, euid, suid;
|
|
|
|
ret = get_errno(getresgid(&ruid, &euid, &suid));
|
|
if (is_error(ret)) {
|
|
return ret;
|
|
}
|
|
if (put_user_s32(ruid, arg1)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
if (put_user_s32(euid, arg2)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
if (put_user_s32(suid, arg3)) {
|
|
return -TARGET_EFAULT;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* getsid(2) */
|
|
static inline abi_long do_bsd_getsid(abi_long arg1)
|
|
{
|
|
return get_errno(getsid(arg1));
|
|
}
|
|
|
|
/* setsid(2) */
|
|
static inline abi_long do_bsd_setsid(void)
|
|
{
|
|
return get_errno(setsid());
|
|
}
|
|
|
|
/* issetugid(2) */
|
|
static inline abi_long do_bsd_issetugid(void)
|
|
{
|
|
return get_errno(issetugid());
|
|
}
|
|
|
|
/* profil(2) */
|
|
static inline abi_long do_bsd_profil(abi_long arg1, abi_long arg2,
|
|
abi_long arg3, abi_long arg4)
|
|
{
|
|
return -TARGET_ENOSYS;
|
|
}
|
|
|
|
/* ktrace(2) */
|
|
static inline abi_long do_bsd_ktrace(abi_long arg1, abi_long arg2,
|
|
abi_long arg3, abi_long arg4)
|
|
{
|
|
return -TARGET_ENOSYS;
|
|
}
|
|
|
|
/* utrace(2) */
|
|
static inline abi_long do_bsd_utrace(abi_long arg1, abi_long arg2)
|
|
{
|
|
return -TARGET_ENOSYS;
|
|
}
|
|
|
|
|
|
/* ptrace(2) */
|
|
static inline abi_long do_bsd_ptrace(abi_long arg1, abi_long arg2,
|
|
abi_long arg3, abi_long arg4)
|
|
{
|
|
return -TARGET_ENOSYS;
|
|
}
|
|
|
|
/* getpriority(2) */
|
|
static inline abi_long do_bsd_getpriority(abi_long which, abi_long who)
|
|
{
|
|
abi_long ret;
|
|
/*
|
|
* Note that negative values are valid for getpriority, so we must
|
|
* differentiate based on errno settings.
|
|
*/
|
|
errno = 0;
|
|
ret = getpriority(which, who);
|
|
if (ret == -1 && errno != 0) {
|
|
return -host_to_target_errno(errno);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* setpriority(2) */
|
|
static inline abi_long do_bsd_setpriority(abi_long which, abi_long who,
|
|
abi_long prio)
|
|
{
|
|
return get_errno(setpriority(which, who, prio));
|
|
}
|
|
|
|
#endif /* !BSD_PROC_H_ */
|