xref: /freebsd/sys/compat/linux/linux_signal.c (revision 91c878a6935c5c2e99866eb267e5bc3028bf6d2f)
1 /*-
2  * Copyright (c) 1994-1995 S�ren Schmidt
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer
10  *    in this position and unchanged.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. The name of the author may not be used to endorse or promote products
15  *    derived from this software without specific prior written permission
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
31 
32 #include <sys/param.h>
33 #include <sys/systm.h>
34 #include <sys/lock.h>
35 #include <sys/mutex.h>
36 #include <sys/sx.h>
37 #include <sys/proc.h>
38 #include <sys/signalvar.h>
39 #include <sys/syscallsubr.h>
40 #include <sys/sysproto.h>
41 
42 #include "opt_compat.h"
43 
44 #ifdef COMPAT_LINUX32
45 #include <machine/../linux32/linux.h>
46 #include <machine/../linux32/linux32_proto.h>
47 #else
48 #include <machine/../linux/linux.h>
49 #include <machine/../linux/linux_proto.h>
50 #endif
51 #include <compat/linux/linux_signal.h>
52 #include <compat/linux/linux_util.h>
53 #include <compat/linux/linux_emul.h>
54 
55 void
56 linux_to_bsd_sigset(l_sigset_t *lss, sigset_t *bss)
57 {
58 	int b, l;
59 
60 	SIGEMPTYSET(*bss);
61 	bss->__bits[0] = lss->__bits[0] & ~((1U << LINUX_SIGTBLSZ) - 1);
62 	bss->__bits[1] = lss->__bits[1];
63 	for (l = 1; l <= LINUX_SIGTBLSZ; l++) {
64 		if (LINUX_SIGISMEMBER(*lss, l)) {
65 			b = linux_to_bsd_signal[_SIG_IDX(l)];
66 			if (b)
67 				SIGADDSET(*bss, b);
68 		}
69 	}
70 }
71 
72 void
73 bsd_to_linux_sigset(sigset_t *bss, l_sigset_t *lss)
74 {
75 	int b, l;
76 
77 	LINUX_SIGEMPTYSET(*lss);
78 	lss->__bits[0] = bss->__bits[0] & ~((1U << LINUX_SIGTBLSZ) - 1);
79 	lss->__bits[1] = bss->__bits[1];
80 	for (b = 1; b <= LINUX_SIGTBLSZ; b++) {
81 		if (SIGISMEMBER(*bss, b)) {
82 			l = bsd_to_linux_signal[_SIG_IDX(b)];
83 			if (l)
84 				LINUX_SIGADDSET(*lss, l);
85 		}
86 	}
87 }
88 
89 static void
90 linux_to_bsd_sigaction(l_sigaction_t *lsa, struct sigaction *bsa)
91 {
92 
93 	linux_to_bsd_sigset(&lsa->lsa_mask, &bsa->sa_mask);
94 	bsa->sa_handler = PTRIN(lsa->lsa_handler);
95 	bsa->sa_flags = 0;
96 	if (lsa->lsa_flags & LINUX_SA_NOCLDSTOP)
97 		bsa->sa_flags |= SA_NOCLDSTOP;
98 	if (lsa->lsa_flags & LINUX_SA_NOCLDWAIT)
99 		bsa->sa_flags |= SA_NOCLDWAIT;
100 	if (lsa->lsa_flags & LINUX_SA_SIGINFO)
101 		bsa->sa_flags |= SA_SIGINFO;
102 	if (lsa->lsa_flags & LINUX_SA_ONSTACK)
103 		bsa->sa_flags |= SA_ONSTACK;
104 	if (lsa->lsa_flags & LINUX_SA_RESTART)
105 		bsa->sa_flags |= SA_RESTART;
106 	if (lsa->lsa_flags & LINUX_SA_ONESHOT)
107 		bsa->sa_flags |= SA_RESETHAND;
108 	if (lsa->lsa_flags & LINUX_SA_NOMASK)
109 		bsa->sa_flags |= SA_NODEFER;
110 }
111 
112 static void
113 bsd_to_linux_sigaction(struct sigaction *bsa, l_sigaction_t *lsa)
114 {
115 
116 	bsd_to_linux_sigset(&bsa->sa_mask, &lsa->lsa_mask);
117 #ifdef COMPAT_LINUX32
118 	lsa->lsa_handler = (uintptr_t)bsa->sa_handler;
119 #else
120 	lsa->lsa_handler = bsa->sa_handler;
121 #endif
122 	lsa->lsa_restorer = 0;		/* unsupported */
123 	lsa->lsa_flags = 0;
124 	if (bsa->sa_flags & SA_NOCLDSTOP)
125 		lsa->lsa_flags |= LINUX_SA_NOCLDSTOP;
126 	if (bsa->sa_flags & SA_NOCLDWAIT)
127 		lsa->lsa_flags |= LINUX_SA_NOCLDWAIT;
128 	if (bsa->sa_flags & SA_SIGINFO)
129 		lsa->lsa_flags |= LINUX_SA_SIGINFO;
130 	if (bsa->sa_flags & SA_ONSTACK)
131 		lsa->lsa_flags |= LINUX_SA_ONSTACK;
132 	if (bsa->sa_flags & SA_RESTART)
133 		lsa->lsa_flags |= LINUX_SA_RESTART;
134 	if (bsa->sa_flags & SA_RESETHAND)
135 		lsa->lsa_flags |= LINUX_SA_ONESHOT;
136 	if (bsa->sa_flags & SA_NODEFER)
137 		lsa->lsa_flags |= LINUX_SA_NOMASK;
138 }
139 
140 int
141 linux_do_sigaction(struct thread *td, int linux_sig, l_sigaction_t *linux_nsa,
142 		   l_sigaction_t *linux_osa)
143 {
144 	struct sigaction act, oact, *nsa, *osa;
145 	int error, sig;
146 
147 	if (!LINUX_SIG_VALID(linux_sig))
148 		return (EINVAL);
149 
150 	osa = (linux_osa != NULL) ? &oact : NULL;
151 	if (linux_nsa != NULL) {
152 		nsa = &act;
153 		linux_to_bsd_sigaction(linux_nsa, nsa);
154 	} else
155 		nsa = NULL;
156 
157 	if (linux_sig <= LINUX_SIGTBLSZ)
158 		sig = linux_to_bsd_signal[_SIG_IDX(linux_sig)];
159 	else
160 		sig = linux_sig;
161 
162 	error = kern_sigaction(td, sig, nsa, osa, 0);
163 	if (error)
164 		return (error);
165 
166 	if (linux_osa != NULL)
167 		bsd_to_linux_sigaction(osa, linux_osa);
168 
169 	return (0);
170 }
171 
172 
173 int
174 linux_signal(struct thread *td, struct linux_signal_args *args)
175 {
176 	l_sigaction_t nsa, osa;
177 	int error;
178 
179 #ifdef DEBUG
180 	if (ldebug(signal))
181 		printf(ARGS(signal, "%d, %p"),
182 		    args->sig, (void *)(uintptr_t)args->handler);
183 #endif
184 
185 	nsa.lsa_handler = args->handler;
186 	nsa.lsa_flags = LINUX_SA_ONESHOT | LINUX_SA_NOMASK;
187 	LINUX_SIGEMPTYSET(nsa.lsa_mask);
188 
189 	error = linux_do_sigaction(td, args->sig, &nsa, &osa);
190 	td->td_retval[0] = (int)(intptr_t)osa.lsa_handler;
191 
192 	return (error);
193 }
194 
195 int
196 linux_rt_sigaction(struct thread *td, struct linux_rt_sigaction_args *args)
197 {
198 	l_sigaction_t nsa, osa;
199 	int error;
200 
201 #ifdef DEBUG
202 	if (ldebug(rt_sigaction))
203 		printf(ARGS(rt_sigaction, "%ld, %p, %p, %ld"),
204 		    (long)args->sig, (void *)args->act,
205 		    (void *)args->oact, (long)args->sigsetsize);
206 #endif
207 
208 	if (args->sigsetsize != sizeof(l_sigset_t))
209 		return (EINVAL);
210 
211 	if (args->act != NULL) {
212 		error = copyin(args->act, &nsa, sizeof(l_sigaction_t));
213 		if (error)
214 			return (error);
215 	}
216 
217 	error = linux_do_sigaction(td, args->sig,
218 				   args->act ? &nsa : NULL,
219 				   args->oact ? &osa : NULL);
220 
221 	if (args->oact != NULL && !error) {
222 		error = copyout(&osa, args->oact, sizeof(l_sigaction_t));
223 	}
224 
225 	return (error);
226 }
227 
228 static int
229 linux_do_sigprocmask(struct thread *td, int how, l_sigset_t *new,
230 		     l_sigset_t *old)
231 {
232 	sigset_t omask, nmask;
233 	sigset_t *nmaskp;
234 	int error;
235 
236 	td->td_retval[0] = 0;
237 
238 	switch (how) {
239 	case LINUX_SIG_BLOCK:
240 		how = SIG_BLOCK;
241 		break;
242 	case LINUX_SIG_UNBLOCK:
243 		how = SIG_UNBLOCK;
244 		break;
245 	case LINUX_SIG_SETMASK:
246 		how = SIG_SETMASK;
247 		break;
248 	default:
249 		return (EINVAL);
250 	}
251 	if (new != NULL) {
252 		linux_to_bsd_sigset(new, &nmask);
253 		nmaskp = &nmask;
254 	} else
255 		nmaskp = NULL;
256 	error = kern_sigprocmask(td, how, nmaskp, &omask, 0);
257 	if (error == 0 && old != NULL)
258 		bsd_to_linux_sigset(&omask, old);
259 
260 	return (error);
261 }
262 
263 int
264 linux_sigprocmask(struct thread *td, struct linux_sigprocmask_args *args)
265 {
266 	l_osigset_t mask;
267 	l_sigset_t set, oset;
268 	int error;
269 
270 #ifdef DEBUG
271 	if (ldebug(sigprocmask))
272 		printf(ARGS(sigprocmask, "%d, *, *"), args->how);
273 #endif
274 
275 	if (args->mask != NULL) {
276 		error = copyin(args->mask, &mask, sizeof(l_osigset_t));
277 		if (error)
278 			return (error);
279 		LINUX_SIGEMPTYSET(set);
280 		set.__bits[0] = mask;
281 	}
282 
283 	error = linux_do_sigprocmask(td, args->how,
284 				     args->mask ? &set : NULL,
285 				     args->omask ? &oset : NULL);
286 
287 	if (args->omask != NULL && !error) {
288 		mask = oset.__bits[0];
289 		error = copyout(&mask, args->omask, sizeof(l_osigset_t));
290 	}
291 
292 	return (error);
293 }
294 
295 int
296 linux_rt_sigprocmask(struct thread *td, struct linux_rt_sigprocmask_args *args)
297 {
298 	l_sigset_t set, oset;
299 	int error;
300 
301 #ifdef DEBUG
302 	if (ldebug(rt_sigprocmask))
303 		printf(ARGS(rt_sigprocmask, "%d, %p, %p, %ld"),
304 		    args->how, (void *)args->mask,
305 		    (void *)args->omask, (long)args->sigsetsize);
306 #endif
307 
308 	if (args->sigsetsize != sizeof(l_sigset_t))
309 		return EINVAL;
310 
311 	if (args->mask != NULL) {
312 		error = copyin(args->mask, &set, sizeof(l_sigset_t));
313 		if (error)
314 			return (error);
315 	}
316 
317 	error = linux_do_sigprocmask(td, args->how,
318 				     args->mask ? &set : NULL,
319 				     args->omask ? &oset : NULL);
320 
321 	if (args->omask != NULL && !error) {
322 		error = copyout(&oset, args->omask, sizeof(l_sigset_t));
323 	}
324 
325 	return (error);
326 }
327 
328 int
329 linux_sgetmask(struct thread *td, struct linux_sgetmask_args *args)
330 {
331 	struct proc *p = td->td_proc;
332 	l_sigset_t mask;
333 
334 #ifdef DEBUG
335 	if (ldebug(sgetmask))
336 		printf(ARGS(sgetmask, ""));
337 #endif
338 
339 	PROC_LOCK(p);
340 	bsd_to_linux_sigset(&td->td_sigmask, &mask);
341 	PROC_UNLOCK(p);
342 	td->td_retval[0] = mask.__bits[0];
343 	return (0);
344 }
345 
346 int
347 linux_ssetmask(struct thread *td, struct linux_ssetmask_args *args)
348 {
349 	struct proc *p = td->td_proc;
350 	l_sigset_t lset;
351 	sigset_t bset;
352 
353 #ifdef DEBUG
354 	if (ldebug(ssetmask))
355 		printf(ARGS(ssetmask, "%08lx"), (unsigned long)args->mask);
356 #endif
357 
358 	PROC_LOCK(p);
359 	bsd_to_linux_sigset(&td->td_sigmask, &lset);
360 	td->td_retval[0] = lset.__bits[0];
361 	LINUX_SIGEMPTYSET(lset);
362 	lset.__bits[0] = args->mask;
363 	linux_to_bsd_sigset(&lset, &bset);
364 	td->td_sigmask = bset;
365 	SIG_CANTMASK(td->td_sigmask);
366 	signotify(td);
367 	PROC_UNLOCK(p);
368 	return (0);
369 }
370 
371 /*
372  * MPSAFE
373  */
374 int
375 linux_sigpending(struct thread *td, struct linux_sigpending_args *args)
376 {
377 	struct proc *p = td->td_proc;
378 	sigset_t bset;
379 	l_sigset_t lset;
380 	l_osigset_t mask;
381 
382 #ifdef DEBUG
383 	if (ldebug(sigpending))
384 		printf(ARGS(sigpending, "*"));
385 #endif
386 
387 	PROC_LOCK(p);
388 	bset = p->p_siglist;
389 	SIGSETOR(bset, td->td_siglist);
390 	SIGSETAND(bset, td->td_sigmask);
391 	PROC_UNLOCK(p);
392 	bsd_to_linux_sigset(&bset, &lset);
393 	mask = lset.__bits[0];
394 	return (copyout(&mask, args->mask, sizeof(mask)));
395 }
396 
397 /*
398  * MPSAFE
399  */
400 int
401 linux_rt_sigpending(struct thread *td, struct linux_rt_sigpending_args *args)
402 {
403 	struct proc *p = td->td_proc;
404 	sigset_t bset;
405 	l_sigset_t lset;
406 
407 	if (args->sigsetsize > sizeof(lset))
408 		return EINVAL;
409 		/* NOT REACHED */
410 
411 #ifdef DEBUG
412 	if (ldebug(rt_sigpending))
413 		printf(ARGS(rt_sigpending, "*"));
414 #endif
415 
416 	PROC_LOCK(p);
417 	bset = p->p_siglist;
418 	SIGSETOR(bset, td->td_siglist);
419 	SIGSETAND(bset, td->td_sigmask);
420 	PROC_UNLOCK(p);
421 	bsd_to_linux_sigset(&bset, &lset);
422 	return (copyout(&lset, args->set, args->sigsetsize));
423 }
424 
425 int
426 linux_kill(struct thread *td, struct linux_kill_args *args)
427 {
428 	struct kill_args /* {
429 	    int pid;
430 	    int signum;
431 	} */ tmp;
432 
433 #ifdef DEBUG
434 	if (ldebug(kill))
435 		printf(ARGS(kill, "%d, %d"), args->pid, args->signum);
436 #endif
437 
438 	/*
439 	 * Allow signal 0 as a means to check for privileges
440 	 */
441 	if (!LINUX_SIG_VALID(args->signum) && args->signum != 0)
442 		return EINVAL;
443 
444 	if (args->signum > 0 && args->signum <= LINUX_SIGTBLSZ)
445 		tmp.signum = linux_to_bsd_signal[_SIG_IDX(args->signum)];
446 	else
447 		tmp.signum = args->signum;
448 
449 	tmp.pid = args->pid;
450 	return (kill(td, &tmp));
451 }
452 
453 int
454 linux_tgkill(struct thread *td, struct linux_tgkill_args *args)
455 {
456    	struct linux_emuldata *em;
457 	struct linux_kill_args ka;
458 	struct proc *p;
459 
460 #ifdef DEBUG
461 	if (ldebug(tgkill))
462 		printf(ARGS(tgkill, "%d, %d, %d"), args->tgid, args->pid, args->sig);
463 #endif
464 
465 	ka.pid = args->pid;
466 	ka.signum = args->sig;
467 
468 	if (args->tgid == -1)
469 	   	return linux_kill(td, &ka);
470 
471 	if ((p = pfind(args->pid)) == NULL)
472 	      	return ESRCH;
473 
474 	if (p->p_sysent != &elf_linux_sysvec)
475 		return ESRCH;
476 
477 	PROC_UNLOCK(p);
478 
479 	em = em_find(p, EMUL_UNLOCKED);
480 
481 	if (em == NULL) {
482 #ifdef DEBUG
483 		printf("emuldata not found in tgkill.\n");
484 #endif
485 		return ESRCH;
486 	}
487 
488 	if (em->shared->group_pid != args->tgid)
489 	   	return ESRCH;
490 
491 	EMUL_UNLOCK(&emul_lock);
492 
493 	return linux_kill(td, &ka);
494 }
495 
496 int
497 linux_tkill(struct thread *td, struct linux_tkill_args *args)
498 {
499 #ifdef DEBUG
500 	if (ldebug(tkill))
501 		printf(ARGS(tkill, "%i, %i"), args->tid, args->sig);
502 #endif
503 
504 	return (linux_kill(td, (struct linux_kill_args *) args));
505 }
506