sigaction.cpp 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/Arch/x86/InterruptDisabler.h>
  7. #include <Kernel/Arch/x86/SmapDisabler.h>
  8. #include <Kernel/Process.h>
  9. namespace Kernel {
  10. KResultOr<FlatPtr> Process::sys$sigprocmask(int how, Userspace<const sigset_t*> set, Userspace<sigset_t*> old_set)
  11. {
  12. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  13. REQUIRE_PROMISE(sigaction);
  14. auto current_thread = Thread::current();
  15. u32 previous_signal_mask;
  16. if (set) {
  17. sigset_t set_value;
  18. if (!copy_from_user(&set_value, set))
  19. return EFAULT;
  20. switch (how) {
  21. case SIG_BLOCK:
  22. previous_signal_mask = current_thread->signal_mask_block(set_value, true);
  23. break;
  24. case SIG_UNBLOCK:
  25. previous_signal_mask = current_thread->signal_mask_block(set_value, false);
  26. break;
  27. case SIG_SETMASK:
  28. previous_signal_mask = current_thread->update_signal_mask(set_value);
  29. break;
  30. default:
  31. return EINVAL;
  32. }
  33. } else {
  34. previous_signal_mask = current_thread->signal_mask();
  35. }
  36. if (old_set && !copy_to_user(old_set, &previous_signal_mask))
  37. return EFAULT;
  38. return 0;
  39. }
  40. KResultOr<FlatPtr> Process::sys$sigpending(Userspace<sigset_t*> set)
  41. {
  42. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  43. REQUIRE_PROMISE(stdio);
  44. auto pending_signals = Thread::current()->pending_signals();
  45. if (!copy_to_user(set, &pending_signals))
  46. return EFAULT;
  47. return 0;
  48. }
  49. KResultOr<FlatPtr> Process::sys$sigaction(int signum, Userspace<const sigaction*> user_act, Userspace<sigaction*> user_old_act)
  50. {
  51. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  52. REQUIRE_PROMISE(sigaction);
  53. if (signum < 1 || signum >= 32 || signum == SIGKILL || signum == SIGSTOP)
  54. return EINVAL;
  55. InterruptDisabler disabler; // FIXME: This should use a narrower lock. Maybe a way to ignore signals temporarily?
  56. auto& action = Thread::current()->m_signal_action_data[signum];
  57. if (user_old_act) {
  58. sigaction old_act {};
  59. old_act.sa_flags = action.flags;
  60. old_act.sa_sigaction = reinterpret_cast<decltype(old_act.sa_sigaction)>(action.handler_or_sigaction.as_ptr());
  61. if (!copy_to_user(user_old_act, &old_act))
  62. return EFAULT;
  63. }
  64. if (user_act) {
  65. sigaction act {};
  66. if (!copy_from_user(&act, user_act))
  67. return EFAULT;
  68. action.flags = act.sa_flags;
  69. action.handler_or_sigaction = VirtualAddress { reinterpret_cast<void*>(act.sa_sigaction) };
  70. }
  71. return 0;
  72. }
  73. KResultOr<FlatPtr> Process::sys$sigreturn([[maybe_unused]] RegisterState& registers)
  74. {
  75. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  76. REQUIRE_PROMISE(stdio);
  77. SmapDisabler disabler;
  78. #if ARCH(I386)
  79. //Here, we restore the state pushed by dispatch signal and asm_signal_trampoline.
  80. u32* stack_ptr = (u32*)registers.userspace_esp;
  81. u32 smuggled_eax = *stack_ptr;
  82. //pop the stored eax, ebp, return address, handler and signal code
  83. stack_ptr += 5;
  84. Thread::current()->m_signal_mask = *stack_ptr;
  85. stack_ptr++;
  86. //pop edi, esi, ebp, esp, ebx, edx, ecx and eax
  87. memcpy(&registers.edi, stack_ptr, 8 * sizeof(FlatPtr));
  88. stack_ptr += 8;
  89. registers.eip = *stack_ptr;
  90. stack_ptr++;
  91. registers.eflags = (registers.eflags & ~safe_eflags_mask) | (*stack_ptr & safe_eflags_mask);
  92. stack_ptr++;
  93. registers.userspace_esp = registers.esp;
  94. return smuggled_eax;
  95. #else
  96. //Here, we restore the state pushed by dispatch signal and asm_signal_trampoline.
  97. FlatPtr* stack_ptr = (FlatPtr*)registers.userspace_rsp;
  98. FlatPtr smuggled_rax = *stack_ptr;
  99. //pop the stored rax, rbp, return address, handler and signal code
  100. stack_ptr += 5;
  101. Thread::current()->m_signal_mask = *stack_ptr;
  102. stack_ptr++;
  103. //pop rdi, rsi, rbp, rsp, rbx, rdx, rcx, rax, r8, r9, r10, r11, r12, r13, r14 and r15
  104. memcpy(&registers.rdi, stack_ptr, 16 * sizeof(FlatPtr));
  105. stack_ptr += 16;
  106. registers.rip = *stack_ptr;
  107. stack_ptr++;
  108. registers.rflags = (registers.rflags & ~safe_eflags_mask) | (*stack_ptr & safe_eflags_mask);
  109. stack_ptr++;
  110. registers.userspace_rsp = registers.rsp;
  111. return smuggled_rax;
  112. #endif
  113. }
  114. }