1 /*- 2 * Copyright (c) 1994-1995 S�ren Schmidt 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer 10 * in this position and unchanged. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 3. The name of the author may not be used to endorse or promote products 15 * derived from this software without specific prior written permission 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27 */ 28 29 #include <sys/cdefs.h> 30 __FBSDID("$FreeBSD$"); 31 32 #include <sys/param.h> 33 #include <sys/systm.h> 34 #include <sys/lock.h> 35 #include <sys/mutex.h> 36 #include <sys/sx.h> 37 #include <sys/proc.h> 38 #include <sys/signalvar.h> 39 #include <sys/syscallsubr.h> 40 #include <sys/sysproto.h> 41 42 #include <security/audit/audit.h> 43 44 #include "opt_compat.h" 45 46 #ifdef COMPAT_LINUX32 47 #include <machine/../linux32/linux.h> 48 #include <machine/../linux32/linux32_proto.h> 49 #else 50 #include <machine/../linux/linux.h> 51 #include <machine/../linux/linux_proto.h> 52 #endif 53 #include <compat/linux/linux_signal.h> 54 #include <compat/linux/linux_util.h> 55 #include <compat/linux/linux_emul.h> 56 57 void 58 linux_to_bsd_sigset(l_sigset_t *lss, sigset_t *bss) 59 { 60 int b, l; 61 62 SIGEMPTYSET(*bss); 63 bss->__bits[0] = lss->__bits[0] & ~((1U << LINUX_SIGTBLSZ) - 1); 64 bss->__bits[1] = lss->__bits[1]; 65 for (l = 1; l <= LINUX_SIGTBLSZ; l++) { 66 if (LINUX_SIGISMEMBER(*lss, l)) { 67 b = linux_to_bsd_signal[_SIG_IDX(l)]; 68 if (b) 69 SIGADDSET(*bss, b); 70 } 71 } 72 } 73 74 void 75 bsd_to_linux_sigset(sigset_t *bss, l_sigset_t *lss) 76 { 77 int b, l; 78 79 LINUX_SIGEMPTYSET(*lss); 80 lss->__bits[0] = bss->__bits[0] & ~((1U << LINUX_SIGTBLSZ) - 1); 81 lss->__bits[1] = bss->__bits[1]; 82 for (b = 1; b <= LINUX_SIGTBLSZ; b++) { 83 if (SIGISMEMBER(*bss, b)) { 84 l = bsd_to_linux_signal[_SIG_IDX(b)]; 85 if (l) 86 LINUX_SIGADDSET(*lss, l); 87 } 88 } 89 } 90 91 static void 92 linux_to_bsd_sigaction(l_sigaction_t *lsa, struct sigaction *bsa) 93 { 94 95 linux_to_bsd_sigset(&lsa->lsa_mask, &bsa->sa_mask); 96 bsa->sa_handler = PTRIN(lsa->lsa_handler); 97 bsa->sa_flags = 0; 98 if (lsa->lsa_flags & LINUX_SA_NOCLDSTOP) 99 bsa->sa_flags |= SA_NOCLDSTOP; 100 if (lsa->lsa_flags & LINUX_SA_NOCLDWAIT) 101 bsa->sa_flags |= SA_NOCLDWAIT; 102 if (lsa->lsa_flags & LINUX_SA_SIGINFO) 103 bsa->sa_flags |= SA_SIGINFO; 104 if (lsa->lsa_flags & LINUX_SA_ONSTACK) 105 bsa->sa_flags |= SA_ONSTACK; 106 if (lsa->lsa_flags & LINUX_SA_RESTART) 107 bsa->sa_flags |= SA_RESTART; 108 if (lsa->lsa_flags & LINUX_SA_ONESHOT) 109 bsa->sa_flags |= SA_RESETHAND; 110 if (lsa->lsa_flags & LINUX_SA_NOMASK) 111 bsa->sa_flags |= SA_NODEFER; 112 } 113 114 static void 115 bsd_to_linux_sigaction(struct sigaction *bsa, l_sigaction_t *lsa) 116 { 117 118 bsd_to_linux_sigset(&bsa->sa_mask, &lsa->lsa_mask); 119 #ifdef COMPAT_LINUX32 120 lsa->lsa_handler = (uintptr_t)bsa->sa_handler; 121 #else 122 lsa->lsa_handler = bsa->sa_handler; 123 #endif 124 lsa->lsa_restorer = 0; /* unsupported */ 125 lsa->lsa_flags = 0; 126 if (bsa->sa_flags & SA_NOCLDSTOP) 127 lsa->lsa_flags |= LINUX_SA_NOCLDSTOP; 128 if (bsa->sa_flags & SA_NOCLDWAIT) 129 lsa->lsa_flags |= LINUX_SA_NOCLDWAIT; 130 if (bsa->sa_flags & SA_SIGINFO) 131 lsa->lsa_flags |= LINUX_SA_SIGINFO; 132 if (bsa->sa_flags & SA_ONSTACK) 133 lsa->lsa_flags |= LINUX_SA_ONSTACK; 134 if (bsa->sa_flags & SA_RESTART) 135 lsa->lsa_flags |= LINUX_SA_RESTART; 136 if (bsa->sa_flags & SA_RESETHAND) 137 lsa->lsa_flags |= LINUX_SA_ONESHOT; 138 if (bsa->sa_flags & SA_NODEFER) 139 lsa->lsa_flags |= LINUX_SA_NOMASK; 140 } 141 142 int 143 linux_do_sigaction(struct thread *td, int linux_sig, l_sigaction_t *linux_nsa, 144 l_sigaction_t *linux_osa) 145 { 146 struct sigaction act, oact, *nsa, *osa; 147 int error, sig; 148 149 if (!LINUX_SIG_VALID(linux_sig)) 150 return (EINVAL); 151 152 osa = (linux_osa != NULL) ? &oact : NULL; 153 if (linux_nsa != NULL) { 154 nsa = &act; 155 linux_to_bsd_sigaction(linux_nsa, nsa); 156 } else 157 nsa = NULL; 158 159 if (linux_sig <= LINUX_SIGTBLSZ) 160 sig = linux_to_bsd_signal[_SIG_IDX(linux_sig)]; 161 else 162 sig = linux_sig; 163 164 error = kern_sigaction(td, sig, nsa, osa, 0); 165 if (error) 166 return (error); 167 168 if (linux_osa != NULL) 169 bsd_to_linux_sigaction(osa, linux_osa); 170 171 return (0); 172 } 173 174 175 int 176 linux_signal(struct thread *td, struct linux_signal_args *args) 177 { 178 l_sigaction_t nsa, osa; 179 int error; 180 181 #ifdef DEBUG 182 if (ldebug(signal)) 183 printf(ARGS(signal, "%d, %p"), 184 args->sig, (void *)(uintptr_t)args->handler); 185 #endif 186 187 nsa.lsa_handler = args->handler; 188 nsa.lsa_flags = LINUX_SA_ONESHOT | LINUX_SA_NOMASK; 189 LINUX_SIGEMPTYSET(nsa.lsa_mask); 190 191 error = linux_do_sigaction(td, args->sig, &nsa, &osa); 192 td->td_retval[0] = (int)(intptr_t)osa.lsa_handler; 193 194 return (error); 195 } 196 197 int 198 linux_rt_sigaction(struct thread *td, struct linux_rt_sigaction_args *args) 199 { 200 l_sigaction_t nsa, osa; 201 int error; 202 203 #ifdef DEBUG 204 if (ldebug(rt_sigaction)) 205 printf(ARGS(rt_sigaction, "%ld, %p, %p, %ld"), 206 (long)args->sig, (void *)args->act, 207 (void *)args->oact, (long)args->sigsetsize); 208 #endif 209 210 if (args->sigsetsize != sizeof(l_sigset_t)) 211 return (EINVAL); 212 213 if (args->act != NULL) { 214 error = copyin(args->act, &nsa, sizeof(l_sigaction_t)); 215 if (error) 216 return (error); 217 } 218 219 error = linux_do_sigaction(td, args->sig, 220 args->act ? &nsa : NULL, 221 args->oact ? &osa : NULL); 222 223 if (args->oact != NULL && !error) { 224 error = copyout(&osa, args->oact, sizeof(l_sigaction_t)); 225 } 226 227 return (error); 228 } 229 230 static int 231 linux_do_sigprocmask(struct thread *td, int how, l_sigset_t *new, 232 l_sigset_t *old) 233 { 234 sigset_t omask, nmask; 235 sigset_t *nmaskp; 236 int error; 237 238 td->td_retval[0] = 0; 239 240 switch (how) { 241 case LINUX_SIG_BLOCK: 242 how = SIG_BLOCK; 243 break; 244 case LINUX_SIG_UNBLOCK: 245 how = SIG_UNBLOCK; 246 break; 247 case LINUX_SIG_SETMASK: 248 how = SIG_SETMASK; 249 break; 250 default: 251 return (EINVAL); 252 } 253 if (new != NULL) { 254 linux_to_bsd_sigset(new, &nmask); 255 nmaskp = &nmask; 256 } else 257 nmaskp = NULL; 258 error = kern_sigprocmask(td, how, nmaskp, &omask, 0); 259 if (error == 0 && old != NULL) 260 bsd_to_linux_sigset(&omask, old); 261 262 return (error); 263 } 264 265 int 266 linux_sigprocmask(struct thread *td, struct linux_sigprocmask_args *args) 267 { 268 l_osigset_t mask; 269 l_sigset_t set, oset; 270 int error; 271 272 #ifdef DEBUG 273 if (ldebug(sigprocmask)) 274 printf(ARGS(sigprocmask, "%d, *, *"), args->how); 275 #endif 276 277 if (args->mask != NULL) { 278 error = copyin(args->mask, &mask, sizeof(l_osigset_t)); 279 if (error) 280 return (error); 281 LINUX_SIGEMPTYSET(set); 282 set.__bits[0] = mask; 283 } 284 285 error = linux_do_sigprocmask(td, args->how, 286 args->mask ? &set : NULL, 287 args->omask ? &oset : NULL); 288 289 if (args->omask != NULL && !error) { 290 mask = oset.__bits[0]; 291 error = copyout(&mask, args->omask, sizeof(l_osigset_t)); 292 } 293 294 return (error); 295 } 296 297 int 298 linux_rt_sigprocmask(struct thread *td, struct linux_rt_sigprocmask_args *args) 299 { 300 l_sigset_t set, oset; 301 int error; 302 303 #ifdef DEBUG 304 if (ldebug(rt_sigprocmask)) 305 printf(ARGS(rt_sigprocmask, "%d, %p, %p, %ld"), 306 args->how, (void *)args->mask, 307 (void *)args->omask, (long)args->sigsetsize); 308 #endif 309 310 if (args->sigsetsize != sizeof(l_sigset_t)) 311 return EINVAL; 312 313 if (args->mask != NULL) { 314 error = copyin(args->mask, &set, sizeof(l_sigset_t)); 315 if (error) 316 return (error); 317 } 318 319 error = linux_do_sigprocmask(td, args->how, 320 args->mask ? &set : NULL, 321 args->omask ? &oset : NULL); 322 323 if (args->omask != NULL && !error) { 324 error = copyout(&oset, args->omask, sizeof(l_sigset_t)); 325 } 326 327 return (error); 328 } 329 330 int 331 linux_sgetmask(struct thread *td, struct linux_sgetmask_args *args) 332 { 333 struct proc *p = td->td_proc; 334 l_sigset_t mask; 335 336 #ifdef DEBUG 337 if (ldebug(sgetmask)) 338 printf(ARGS(sgetmask, "")); 339 #endif 340 341 PROC_LOCK(p); 342 bsd_to_linux_sigset(&td->td_sigmask, &mask); 343 PROC_UNLOCK(p); 344 td->td_retval[0] = mask.__bits[0]; 345 return (0); 346 } 347 348 int 349 linux_ssetmask(struct thread *td, struct linux_ssetmask_args *args) 350 { 351 struct proc *p = td->td_proc; 352 l_sigset_t lset; 353 sigset_t bset; 354 355 #ifdef DEBUG 356 if (ldebug(ssetmask)) 357 printf(ARGS(ssetmask, "%08lx"), (unsigned long)args->mask); 358 #endif 359 360 PROC_LOCK(p); 361 bsd_to_linux_sigset(&td->td_sigmask, &lset); 362 td->td_retval[0] = lset.__bits[0]; 363 LINUX_SIGEMPTYSET(lset); 364 lset.__bits[0] = args->mask; 365 linux_to_bsd_sigset(&lset, &bset); 366 td->td_sigmask = bset; 367 SIG_CANTMASK(td->td_sigmask); 368 signotify(td); 369 PROC_UNLOCK(p); 370 return (0); 371 } 372 373 /* 374 * MPSAFE 375 */ 376 int 377 linux_sigpending(struct thread *td, struct linux_sigpending_args *args) 378 { 379 struct proc *p = td->td_proc; 380 sigset_t bset; 381 l_sigset_t lset; 382 l_osigset_t mask; 383 384 #ifdef DEBUG 385 if (ldebug(sigpending)) 386 printf(ARGS(sigpending, "*")); 387 #endif 388 389 PROC_LOCK(p); 390 bset = p->p_siglist; 391 SIGSETOR(bset, td->td_siglist); 392 SIGSETAND(bset, td->td_sigmask); 393 PROC_UNLOCK(p); 394 bsd_to_linux_sigset(&bset, &lset); 395 mask = lset.__bits[0]; 396 return (copyout(&mask, args->mask, sizeof(mask))); 397 } 398 399 /* 400 * MPSAFE 401 */ 402 int 403 linux_rt_sigpending(struct thread *td, struct linux_rt_sigpending_args *args) 404 { 405 struct proc *p = td->td_proc; 406 sigset_t bset; 407 l_sigset_t lset; 408 409 if (args->sigsetsize > sizeof(lset)) 410 return EINVAL; 411 /* NOT REACHED */ 412 413 #ifdef DEBUG 414 if (ldebug(rt_sigpending)) 415 printf(ARGS(rt_sigpending, "*")); 416 #endif 417 418 PROC_LOCK(p); 419 bset = p->p_siglist; 420 SIGSETOR(bset, td->td_siglist); 421 SIGSETAND(bset, td->td_sigmask); 422 PROC_UNLOCK(p); 423 bsd_to_linux_sigset(&bset, &lset); 424 return (copyout(&lset, args->set, args->sigsetsize)); 425 } 426 427 /* 428 * MPSAFE 429 */ 430 int 431 linux_rt_sigtimedwait(struct thread *td, 432 struct linux_rt_sigtimedwait_args *args) 433 { 434 int error; 435 l_timeval ltv; 436 struct timeval tv; 437 struct timespec ts, *tsa; 438 l_sigset_t lset; 439 sigset_t bset; 440 l_siginfo_t linfo; 441 ksiginfo_t info; 442 443 #ifdef DEBUG 444 if (ldebug(rt_sigtimedwait)) 445 printf(ARGS(rt_sigtimedwait, "*")); 446 #endif 447 if (args->sigsetsize != sizeof(l_sigset_t)) 448 return (EINVAL); 449 450 if ((error = copyin(args->mask, &lset, sizeof(lset)))) 451 return (error); 452 linux_to_bsd_sigset(&lset, &bset); 453 454 tsa = NULL; 455 if (args->timeout) { 456 if ((error = copyin(args->timeout, <v, sizeof(ltv)))) 457 return (error); 458 #ifdef DEBUG 459 if (ldebug(rt_sigtimedwait)) 460 printf(LMSG("linux_rt_sigtimedwait: incoming timeout (%d/%d)\n"), 461 ltv.tv_sec, ltv.tv_usec); 462 #endif 463 tv.tv_sec = (long)ltv.tv_sec; 464 tv.tv_usec = (suseconds_t)ltv.tv_usec; 465 if (itimerfix(&tv)) { 466 /* 467 * The timeout was invalid. Convert it to something 468 * valid that will act as it does under Linux. 469 */ 470 tv.tv_sec += tv.tv_usec / 1000000; 471 tv.tv_usec %= 1000000; 472 if (tv.tv_usec < 0) { 473 tv.tv_sec -= 1; 474 tv.tv_usec += 1000000; 475 } 476 if (tv.tv_sec < 0) 477 timevalclear(&tv); 478 #ifdef DEBUG 479 if (ldebug(rt_sigtimedwait)) 480 printf(LMSG("linux_rt_sigtimedwait: converted timeout (%jd/%ld)\n"), 481 (intmax_t)tv.tv_sec, tv.tv_usec); 482 #endif 483 } 484 TIMEVAL_TO_TIMESPEC(&tv, &ts); 485 tsa = &ts; 486 } 487 error = kern_sigtimedwait(td, bset, &info, tsa); 488 #ifdef DEBUG 489 if (ldebug(rt_sigtimedwait)) 490 printf(LMSG("linux_rt_sigtimedwait: sigtimedwait returning (%d)\n"), error); 491 #endif 492 if (error) 493 return (error); 494 495 if (args->ptr) { 496 memset(&linfo, 0, sizeof(linfo)); 497 linfo.lsi_signo = info.ksi_signo; 498 error = copyout(&linfo, args->ptr, sizeof(linfo)); 499 } 500 501 /* Repost if we got an error. */ 502 if (error && info.ksi_signo) { 503 PROC_LOCK(td->td_proc); 504 tdsignal(td->td_proc, td, info.ksi_signo, &info); 505 PROC_UNLOCK(td->td_proc); 506 } else 507 td->td_retval[0] = info.ksi_signo; 508 509 return (error); 510 } 511 512 int 513 linux_kill(struct thread *td, struct linux_kill_args *args) 514 { 515 struct kill_args /* { 516 int pid; 517 int signum; 518 } */ tmp; 519 520 #ifdef DEBUG 521 if (ldebug(kill)) 522 printf(ARGS(kill, "%d, %d"), args->pid, args->signum); 523 #endif 524 525 /* 526 * Allow signal 0 as a means to check for privileges 527 */ 528 if (!LINUX_SIG_VALID(args->signum) && args->signum != 0) 529 return EINVAL; 530 531 if (args->signum > 0 && args->signum <= LINUX_SIGTBLSZ) 532 tmp.signum = linux_to_bsd_signal[_SIG_IDX(args->signum)]; 533 else 534 tmp.signum = args->signum; 535 536 tmp.pid = args->pid; 537 return (kill(td, &tmp)); 538 } 539 540 static int 541 linux_do_tkill(struct thread *td, l_int tgid, l_int pid, l_int signum) 542 { 543 struct proc *proc = td->td_proc; 544 struct linux_emuldata *em; 545 struct proc *p; 546 ksiginfo_t ksi; 547 int error; 548 549 AUDIT_ARG(signum, signum); 550 AUDIT_ARG(pid, pid); 551 552 /* 553 * Allow signal 0 as a means to check for privileges 554 */ 555 if (!LINUX_SIG_VALID(signum) && signum != 0) 556 return (EINVAL); 557 558 if (signum > 0 && signum <= LINUX_SIGTBLSZ) 559 signum = linux_to_bsd_signal[_SIG_IDX(signum)]; 560 561 if ((p = pfind(pid)) == NULL) { 562 if ((p = zpfind(pid)) == NULL) 563 return (ESRCH); 564 } 565 566 AUDIT_ARG(process, p); 567 error = p_cansignal(td, p, signum); 568 if (error) 569 goto out; 570 571 error = ESRCH; 572 em = em_find(p, EMUL_DONTLOCK); 573 574 if (em == NULL) { 575 #ifdef DEBUG 576 printf("emuldata not found in do_tkill.\n"); 577 #endif 578 goto out; 579 } 580 if (tgid > 0 && em->shared->group_pid != tgid) 581 goto out; 582 583 ksiginfo_init(&ksi); 584 ksi.ksi_signo = signum; 585 ksi.ksi_code = LINUX_SI_TKILL; 586 ksi.ksi_errno = 0; 587 ksi.ksi_pid = proc->p_pid; 588 ksi.ksi_uid = proc->p_ucred->cr_ruid; 589 590 error = tdsignal(p, NULL, ksi.ksi_signo, &ksi); 591 592 out: 593 PROC_UNLOCK(p); 594 return (error); 595 } 596 597 int 598 linux_tgkill(struct thread *td, struct linux_tgkill_args *args) 599 { 600 601 #ifdef DEBUG 602 if (ldebug(tgkill)) 603 printf(ARGS(tgkill, "%d, %d, %d"), args->tgid, args->pid, args->sig); 604 #endif 605 if (args->pid <= 0 || args->tgid <=0) 606 return (EINVAL); 607 608 return (linux_do_tkill(td, args->tgid, args->pid, args->sig)); 609 } 610 611 int 612 linux_tkill(struct thread *td, struct linux_tkill_args *args) 613 { 614 #ifdef DEBUG 615 if (ldebug(tkill)) 616 printf(ARGS(tkill, "%i, %i"), args->tid, args->sig); 617 #endif 618 if (args->tid <= 0) 619 return (EINVAL); 620 621 return (linux_do_tkill(td, 0, args->tid, args->sig)); 622 } 623 624 void 625 ksiginfo_to_lsiginfo(ksiginfo_t *ksi, l_siginfo_t *lsi, l_int sig) 626 { 627 628 lsi->lsi_signo = sig; 629 lsi->lsi_code = ksi->ksi_code; 630 631 switch (sig) { 632 case LINUX_SIGPOLL: 633 /* XXX si_fd? */ 634 lsi->lsi_band = ksi->ksi_band; 635 break; 636 case LINUX_SIGCHLD: 637 lsi->lsi_pid = ksi->ksi_pid; 638 lsi->lsi_uid = ksi->ksi_uid; 639 lsi->lsi_status = ksi->ksi_status; 640 break; 641 case LINUX_SIGBUS: 642 case LINUX_SIGILL: 643 case LINUX_SIGFPE: 644 case LINUX_SIGSEGV: 645 lsi->lsi_addr = PTROUT(ksi->ksi_addr); 646 break; 647 default: 648 /* XXX SI_TIMER etc... */ 649 lsi->lsi_pid = ksi->ksi_pid; 650 lsi->lsi_uid = ksi->ksi_uid; 651 break; 652 } 653 } 654