1 /*-
2 * Copyright (c) 1994-1995 Søren Schmidt
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer
10 * in this position and unchanged.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
31
32 #include <sys/param.h>
33 #include <sys/systm.h>
34 #include <sys/lock.h>
35 #include <sys/mutex.h>
36 #include <sys/sx.h>
37 #include <sys/proc.h>
38 #include <sys/signalvar.h>
39 #include <sys/syscallsubr.h>
40 #include <sys/sysproto.h>
41
42 #include <security/audit/audit.h>
43
44 #include "opt_compat.h"
45
46 #ifdef COMPAT_LINUX32
47 #include <machine/../linux32/linux.h>
48 #include <machine/../linux32/linux32_proto.h>
49 #else
50 #include <machine/../linux/linux.h>
51 #include <machine/../linux/linux_proto.h>
52 #endif
53 #include <compat/linux/linux_signal.h>
54 #include <compat/linux/linux_util.h>
55 #include <compat/linux/linux_emul.h>
56
57 void
58 linux_to_bsd_sigset(l_sigset_t *lss, sigset_t *bss)
59 {
60 int b, l;
61
62 SIGEMPTYSET(*bss);
63 bss->__bits[0] = lss->__bits[0] & ~((1U << LINUX_SIGTBLSZ) - 1);
64 bss->__bits[1] = lss->__bits[1];
65 for (l = 1; l <= LINUX_SIGTBLSZ; l++) {
66 if (LINUX_SIGISMEMBER(*lss, l)) {
67 b = linux_to_bsd_signal[_SIG_IDX(l)];
68 if (b)
69 SIGADDSET(*bss, b);
70 }
71 }
72 }
73
74 void
75 bsd_to_linux_sigset(sigset_t *bss, l_sigset_t *lss)
76 {
77 int b, l;
78
79 LINUX_SIGEMPTYSET(*lss);
80 lss->__bits[0] = bss->__bits[0] & ~((1U << LINUX_SIGTBLSZ) - 1);
81 lss->__bits[1] = bss->__bits[1];
82 for (b = 1; b <= LINUX_SIGTBLSZ; b++) {
83 if (SIGISMEMBER(*bss, b)) {
84 l = bsd_to_linux_signal[_SIG_IDX(b)];
85 if (l)
86 LINUX_SIGADDSET(*lss, l);
87 }
88 }
89 }
90
91 static void
92 linux_to_bsd_sigaction(l_sigaction_t *lsa, struct sigaction *bsa)
93 {
94
95 linux_to_bsd_sigset(&lsa->lsa_mask, &bsa->sa_mask);
96 bsa->sa_handler = PTRIN(lsa->lsa_handler);
97 bsa->sa_flags = 0;
98 if (lsa->lsa_flags & LINUX_SA_NOCLDSTOP)
99 bsa->sa_flags |= SA_NOCLDSTOP;
100 if (lsa->lsa_flags & LINUX_SA_NOCLDWAIT)
101 bsa->sa_flags |= SA_NOCLDWAIT;
102 if (lsa->lsa_flags & LINUX_SA_SIGINFO)
103 bsa->sa_flags |= SA_SIGINFO;
104 if (lsa->lsa_flags & LINUX_SA_ONSTACK)
105 bsa->sa_flags |= SA_ONSTACK;
106 if (lsa->lsa_flags & LINUX_SA_RESTART)
107 bsa->sa_flags |= SA_RESTART;
108 if (lsa->lsa_flags & LINUX_SA_ONESHOT)
109 bsa->sa_flags |= SA_RESETHAND;
110 if (lsa->lsa_flags & LINUX_SA_NOMASK)
111 bsa->sa_flags |= SA_NODEFER;
112 }
113
114 static void
115 bsd_to_linux_sigaction(struct sigaction *bsa, l_sigaction_t *lsa)
116 {
117
118 bsd_to_linux_sigset(&bsa->sa_mask, &lsa->lsa_mask);
119 #ifdef COMPAT_LINUX32
120 lsa->lsa_handler = (uintptr_t)bsa->sa_handler;
121 #else
122 lsa->lsa_handler = bsa->sa_handler;
123 #endif
124 lsa->lsa_restorer = 0; /* unsupported */
125 lsa->lsa_flags = 0;
126 if (bsa->sa_flags & SA_NOCLDSTOP)
127 lsa->lsa_flags |= LINUX_SA_NOCLDSTOP;
128 if (bsa->sa_flags & SA_NOCLDWAIT)
129 lsa->lsa_flags |= LINUX_SA_NOCLDWAIT;
130 if (bsa->sa_flags & SA_SIGINFO)
131 lsa->lsa_flags |= LINUX_SA_SIGINFO;
132 if (bsa->sa_flags & SA_ONSTACK)
133 lsa->lsa_flags |= LINUX_SA_ONSTACK;
134 if (bsa->sa_flags & SA_RESTART)
135 lsa->lsa_flags |= LINUX_SA_RESTART;
136 if (bsa->sa_flags & SA_RESETHAND)
137 lsa->lsa_flags |= LINUX_SA_ONESHOT;
138 if (bsa->sa_flags & SA_NODEFER)
139 lsa->lsa_flags |= LINUX_SA_NOMASK;
140 }
141
142 int
143 linux_do_sigaction(struct thread *td, int linux_sig, l_sigaction_t *linux_nsa,
144 l_sigaction_t *linux_osa)
145 {
146 struct sigaction act, oact, *nsa, *osa;
147 int error, sig;
148
149 if (!LINUX_SIG_VALID(linux_sig))
150 return (EINVAL);
151
152 osa = (linux_osa != NULL) ? &oact : NULL;
153 if (linux_nsa != NULL) {
154 nsa = &act;
155 linux_to_bsd_sigaction(linux_nsa, nsa);
156 } else
157 nsa = NULL;
158
159 if (linux_sig <= LINUX_SIGTBLSZ)
160 sig = linux_to_bsd_signal[_SIG_IDX(linux_sig)];
161 else
162 sig = linux_sig;
163
164 error = kern_sigaction(td, sig, nsa, osa, 0);
165 if (error)
166 return (error);
167
168 if (linux_osa != NULL)
169 bsd_to_linux_sigaction(osa, linux_osa);
170
171 return (0);
172 }
173
174
175 int
176 linux_signal(struct thread *td, struct linux_signal_args *args)
177 {
178 l_sigaction_t nsa, osa;
179 int error;
180
181 #ifdef DEBUG
182 if (ldebug(signal))
183 printf(ARGS(signal, "%d, %p"),
184 args->sig, (void *)(uintptr_t)args->handler);
185 #endif
186
187 nsa.lsa_handler = args->handler;
188 nsa.lsa_flags = LINUX_SA_ONESHOT | LINUX_SA_NOMASK;
189 LINUX_SIGEMPTYSET(nsa.lsa_mask);
190
191 error = linux_do_sigaction(td, args->sig, &nsa, &osa);
192 td->td_retval[0] = (int)(intptr_t)osa.lsa_handler;
193
194 return (error);
195 }
196
197 int
198 linux_rt_sigaction(struct thread *td, struct linux_rt_sigaction_args *args)
199 {
200 l_sigaction_t nsa, osa;
201 int error;
202
203 #ifdef DEBUG
204 if (ldebug(rt_sigaction))
205 printf(ARGS(rt_sigaction, "%ld, %p, %p, %ld"),
206 (long)args->sig, (void *)args->act,
207 (void *)args->oact, (long)args->sigsetsize);
208 #endif
209
210 if (args->sigsetsize != sizeof(l_sigset_t))
211 return (EINVAL);
212
213 if (args->act != NULL) {
214 error = copyin(args->act, &nsa, sizeof(l_sigaction_t));
215 if (error)
216 return (error);
217 }
218
219 error = linux_do_sigaction(td, args->sig,
220 args->act ? &nsa : NULL,
221 args->oact ? &osa : NULL);
222
223 if (args->oact != NULL && !error) {
224 error = copyout(&osa, args->oact, sizeof(l_sigaction_t));
225 }
226
227 return (error);
228 }
229
230 static int
231 linux_do_sigprocmask(struct thread *td, int how, l_sigset_t *new,
232 l_sigset_t *old)
233 {
234 sigset_t omask, nmask;
235 sigset_t *nmaskp;
236 int error;
237
238 td->td_retval[0] = 0;
239
240 switch (how) {
241 case LINUX_SIG_BLOCK:
242 how = SIG_BLOCK;
243 break;
244 case LINUX_SIG_UNBLOCK:
245 how = SIG_UNBLOCK;
246 break;
247 case LINUX_SIG_SETMASK:
248 how = SIG_SETMASK;
249 break;
250 default:
251 return (EINVAL);
252 }
253 if (new != NULL) {
254 linux_to_bsd_sigset(new, &nmask);
255 nmaskp = &nmask;
256 } else
257 nmaskp = NULL;
258 error = kern_sigprocmask(td, how, nmaskp, &omask, 0);
259 if (error == 0 && old != NULL)
260 bsd_to_linux_sigset(&omask, old);
261
262 return (error);
263 }
264
265 int
266 linux_sigprocmask(struct thread *td, struct linux_sigprocmask_args *args)
267 {
268 l_osigset_t mask;
269 l_sigset_t set, oset;
270 int error;
271
272 #ifdef DEBUG
273 if (ldebug(sigprocmask))
274 printf(ARGS(sigprocmask, "%d, *, *"), args->how);
275 #endif
276
277 if (args->mask != NULL) {
278 error = copyin(args->mask, &mask, sizeof(l_osigset_t));
279 if (error)
280 return (error);
281 LINUX_SIGEMPTYSET(set);
282 set.__bits[0] = mask;
283 }
284
285 error = linux_do_sigprocmask(td, args->how,
286 args->mask ? &set : NULL,
287 args->omask ? &oset : NULL);
288
289 if (args->omask != NULL && !error) {
290 mask = oset.__bits[0];
291 error = copyout(&mask, args->omask, sizeof(l_osigset_t));
292 }
293
294 return (error);
295 }
296
297 int
298 linux_rt_sigprocmask(struct thread *td, struct linux_rt_sigprocmask_args *args)
299 {
300 l_sigset_t set, oset;
301 int error;
302
303 #ifdef DEBUG
304 if (ldebug(rt_sigprocmask))
305 printf(ARGS(rt_sigprocmask, "%d, %p, %p, %ld"),
306 args->how, (void *)args->mask,
307 (void *)args->omask, (long)args->sigsetsize);
308 #endif
309
310 if (args->sigsetsize != sizeof(l_sigset_t))
311 return EINVAL;
312
313 if (args->mask != NULL) {
314 error = copyin(args->mask, &set, sizeof(l_sigset_t));
315 if (error)
316 return (error);
317 }
318
319 error = linux_do_sigprocmask(td, args->how,
320 args->mask ? &set : NULL,
321 args->omask ? &oset : NULL);
322
323 if (args->omask != NULL && !error) {
324 error = copyout(&oset, args->omask, sizeof(l_sigset_t));
325 }
326
327 return (error);
328 }
329
330 int
331 linux_sgetmask(struct thread *td, struct linux_sgetmask_args *args)
332 {
333 struct proc *p = td->td_proc;
334 l_sigset_t mask;
335
336 #ifdef DEBUG
337 if (ldebug(sgetmask))
338 printf(ARGS(sgetmask, ""));
339 #endif
340
341 PROC_LOCK(p);
342 bsd_to_linux_sigset(&td->td_sigmask, &mask);
343 PROC_UNLOCK(p);
344 td->td_retval[0] = mask.__bits[0];
345 return (0);
346 }
347
348 int
349 linux_ssetmask(struct thread *td, struct linux_ssetmask_args *args)
350 {
351 struct proc *p = td->td_proc;
352 l_sigset_t lset;
353 sigset_t bset;
354
355 #ifdef DEBUG
356 if (ldebug(ssetmask))
357 printf(ARGS(ssetmask, "%08lx"), (unsigned long)args->mask);
358 #endif
359
360 PROC_LOCK(p);
361 bsd_to_linux_sigset(&td->td_sigmask, &lset);
362 td->td_retval[0] = lset.__bits[0];
363 LINUX_SIGEMPTYSET(lset);
364 lset.__bits[0] = args->mask;
365 linux_to_bsd_sigset(&lset, &bset);
366 td->td_sigmask = bset;
367 SIG_CANTMASK(td->td_sigmask);
368 signotify(td);
369 PROC_UNLOCK(p);
370 return (0);
371 }
372
373 /*
374 * MPSAFE
375 */
376 int
377 linux_sigpending(struct thread *td, struct linux_sigpending_args *args)
378 {
379 struct proc *p = td->td_proc;
380 sigset_t bset;
381 l_sigset_t lset;
382 l_osigset_t mask;
383
384 #ifdef DEBUG
385 if (ldebug(sigpending))
386 printf(ARGS(sigpending, "*"));
387 #endif
388
389 PROC_LOCK(p);
390 bset = p->p_siglist;
391 SIGSETOR(bset, td->td_siglist);
392 SIGSETAND(bset, td->td_sigmask);
393 PROC_UNLOCK(p);
394 bsd_to_linux_sigset(&bset, &lset);
395 mask = lset.__bits[0];
396 return (copyout(&mask, args->mask, sizeof(mask)));
397 }
398
399 /*
400 * MPSAFE
401 */
402 int
403 linux_rt_sigpending(struct thread *td, struct linux_rt_sigpending_args *args)
404 {
405 struct proc *p = td->td_proc;
406 sigset_t bset;
407 l_sigset_t lset;
408
409 if (args->sigsetsize > sizeof(lset))
410 return EINVAL;
411 /* NOT REACHED */
412
413 #ifdef DEBUG
414 if (ldebug(rt_sigpending))
415 printf(ARGS(rt_sigpending, "*"));
416 #endif
417
418 PROC_LOCK(p);
419 bset = p->p_siglist;
420 SIGSETOR(bset, td->td_siglist);
421 SIGSETAND(bset, td->td_sigmask);
422 PROC_UNLOCK(p);
423 bsd_to_linux_sigset(&bset, &lset);
424 return (copyout(&lset, args->set, args->sigsetsize));
425 }
426
427 /*
428 * MPSAFE
429 */
430 int
431 linux_rt_sigtimedwait(struct thread *td,
432 struct linux_rt_sigtimedwait_args *args)
433 {
434 int error, sig;
435 l_timeval ltv;
436 struct timeval tv;
437 struct timespec ts, *tsa;
438 l_sigset_t lset;
439 sigset_t bset;
440 l_siginfo_t linfo;
441 ksiginfo_t info;
442
443 #ifdef DEBUG
444 if (ldebug(rt_sigtimedwait))
445 printf(ARGS(rt_sigtimedwait, "*"));
446 #endif
447 if (args->sigsetsize != sizeof(l_sigset_t))
448 return (EINVAL);
449
450 if ((error = copyin(args->mask, &lset, sizeof(lset))))
451 return (error);
452 linux_to_bsd_sigset(&lset, &bset);
453
454 tsa = NULL;
455 if (args->timeout) {
456 if ((error = copyin(args->timeout, <v, sizeof(ltv))))
457 return (error);
458 #ifdef DEBUG
459 if (ldebug(rt_sigtimedwait))
460 printf(LMSG("linux_rt_sigtimedwait: "
461 "incoming timeout (%d/%d)\n"),
462 ltv.tv_sec, ltv.tv_usec);
463 #endif
464 tv.tv_sec = (long)ltv.tv_sec;
465 tv.tv_usec = (suseconds_t)ltv.tv_usec;
466 if (itimerfix(&tv)) {
467 /*
468 * The timeout was invalid. Convert it to something
469 * valid that will act as it does under Linux.
470 */
471 tv.tv_sec += tv.tv_usec / 1000000;
472 tv.tv_usec %= 1000000;
473 if (tv.tv_usec < 0) {
474 tv.tv_sec -= 1;
475 tv.tv_usec += 1000000;
476 }
477 if (tv.tv_sec < 0)
478 timevalclear(&tv);
479 #ifdef DEBUG
480 if (ldebug(rt_sigtimedwait))
481 printf(LMSG("linux_rt_sigtimedwait: "
482 "converted timeout (%jd/%ld)\n"),
483 (intmax_t)tv.tv_sec, tv.tv_usec);
484 #endif
485 }
486 TIMEVAL_TO_TIMESPEC(&tv, &ts);
487 tsa = &ts;
488 }
489 error = kern_sigtimedwait(td, bset, &info, tsa);
490 #ifdef DEBUG
491 if (ldebug(rt_sigtimedwait))
492 printf(LMSG("linux_rt_sigtimedwait: "
493 "sigtimedwait returning (%d)\n"), error);
494 #endif
495 if (error)
496 return (error);
497
498 sig = BSD_TO_LINUX_SIGNAL(info.ksi_signo);
499
500 if (args->ptr) {
501 memset(&linfo, 0, sizeof(linfo));
502 ksiginfo_to_lsiginfo(&info, &linfo, sig);
503 error = copyout(&linfo, args->ptr, sizeof(linfo));
504 }
505 if (error == 0)
506 td->td_retval[0] = sig;
507
508 return (error);
509 }
510
511 int
512 linux_kill(struct thread *td, struct linux_kill_args *args)
513 {
514 struct kill_args /* {
515 int pid;
516 int signum;
517 } */ tmp;
518
519 #ifdef DEBUG
520 if (ldebug(kill))
521 printf(ARGS(kill, "%d, %d"), args->pid, args->signum);
522 #endif
523
524 /*
525 * Allow signal 0 as a means to check for privileges
526 */
527 if (!LINUX_SIG_VALID(args->signum) && args->signum != 0)
528 return (EINVAL);
529
530 if (args->signum > 0 && args->signum <= LINUX_SIGTBLSZ)
531 tmp.signum = linux_to_bsd_signal[_SIG_IDX(args->signum)];
532 else
533 tmp.signum = args->signum;
534
535 tmp.pid = args->pid;
536 return (kill(td, &tmp));
537 }
538
539 static int
540 linux_do_tkill(struct thread *td, l_int tgid, l_int pid, l_int signum)
541 {
542 struct proc *proc = td->td_proc;
543 struct linux_emuldata *em;
544 struct proc *p;
545 ksiginfo_t ksi;
546 int error;
547
548 AUDIT_ARG_SIGNUM(signum);
549 AUDIT_ARG_PID(pid);
550
551 /*
552 * Allow signal 0 as a means to check for privileges
553 */
554 if (!LINUX_SIG_VALID(signum) && signum != 0)
555 return (EINVAL);
556
557 if (signum > 0 && signum <= LINUX_SIGTBLSZ)
558 signum = linux_to_bsd_signal[_SIG_IDX(signum)];
559
560 if ((p = pfind(pid)) == NULL) {
561 if ((p = zpfind(pid)) == NULL)
562 return (ESRCH);
563 }
564
565 AUDIT_ARG_PROCESS(p);
566 error = p_cansignal(td, p, signum);
567 if (error != 0 || signum == 0)
568 goto out;
569
570 error = ESRCH;
571 em = em_find(p, EMUL_DONTLOCK);
572
573 if (em == NULL) {
574 #ifdef DEBUG
575 printf("emuldata not found in do_tkill.\n");
576 #endif
577 goto out;
578 }
579 if (tgid > 0 && em->shared->group_pid != tgid)
580 goto out;
581
582 ksiginfo_init(&ksi);
583 ksi.ksi_signo = signum;
584 ksi.ksi_code = LINUX_SI_TKILL;
585 ksi.ksi_errno = 0;
586 ksi.ksi_pid = proc->p_pid;
587 ksi.ksi_uid = proc->p_ucred->cr_ruid;
588
589 error = tdsignal(p, NULL, ksi.ksi_signo, &ksi);
590
591 out:
592 PROC_UNLOCK(p);
593 return (error);
594 }
595
596 int
597 linux_tgkill(struct thread *td, struct linux_tgkill_args *args)
598 {
599
600 #ifdef DEBUG
601 if (ldebug(tgkill))
602 printf(ARGS(tgkill, "%d, %d, %d"), args->tgid, args->pid, args->sig);
603 #endif
604 if (args->pid <= 0 || args->tgid <=0)
605 return (EINVAL);
606
607 return (linux_do_tkill(td, args->tgid, args->pid, args->sig));
608 }
609
610 int
611 linux_tkill(struct thread *td, struct linux_tkill_args *args)
612 {
613 #ifdef DEBUG
614 if (ldebug(tkill))
615 printf(ARGS(tkill, "%i, %i"), args->tid, args->sig);
616 #endif
617 if (args->tid <= 0)
618 return (EINVAL);
619
620 return (linux_do_tkill(td, 0, args->tid, args->sig));
621 }
622
623 void
624 ksiginfo_to_lsiginfo(ksiginfo_t *ksi, l_siginfo_t *lsi, l_int sig)
625 {
626
627 lsi->lsi_signo = sig;
628 lsi->lsi_code = ksi->ksi_code;
629
630 switch (sig) {
631 case LINUX_SIGPOLL:
632 /* XXX si_fd? */
633 lsi->lsi_band = ksi->ksi_band;
634 break;
635 case LINUX_SIGCHLD:
636 lsi->lsi_pid = ksi->ksi_pid;
637 lsi->lsi_uid = ksi->ksi_uid;
638 lsi->lsi_status = ksi->ksi_status;
639 break;
640 case LINUX_SIGBUS:
641 case LINUX_SIGILL:
642 case LINUX_SIGFPE:
643 case LINUX_SIGSEGV:
644 lsi->lsi_addr = PTROUT(ksi->ksi_addr);
645 break;
646 default:
647 /* XXX SI_TIMER etc... */
648 lsi->lsi_pid = ksi->ksi_pid;
649 lsi->lsi_uid = ksi->ksi_uid;
650 break;
651 }
652 if (sig >= LINUX_SIGRTMIN) {
653 lsi->lsi_int = ksi->ksi_info.si_value.sival_int;
654 lsi->lsi_ptr = PTROUT(ksi->ksi_info.si_value.sival_ptr);
655 }
656 }
Cache object: 4f3ab7c9a6c414c378c33bde1a11c319
|