1 /*- 2 * Copyright (c) 1994-1995 Søren Schmidt 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer 10 * in this position and unchanged. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 3. The name of the author may not be used to endorse or promote products 15 * derived from this software without specific prior written permission 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27 */ 28 29 #include <sys/cdefs.h> 30 __FBSDID("$FreeBSD$"); 31 32 #include <sys/param.h> 33 #include <sys/systm.h> 34 #include <sys/lock.h> 35 #include <sys/mutex.h> 36 #include <sys/sx.h> 37 #include <sys/proc.h> 38 #include <sys/signalvar.h> 39 #include <sys/syscallsubr.h> 40 #include <sys/sysproto.h> 41 42 #include <security/audit/audit.h> 43 44 #include "opt_compat.h" 45 46 #ifdef COMPAT_LINUX32 47 #include <machine/../linux32/linux.h> 48 #include <machine/../linux32/linux32_proto.h> 49 #else 50 #include <machine/../linux/linux.h> 51 #include <machine/../linux/linux_proto.h> 52 #endif 53 #include <compat/linux/linux_signal.h> 54 #include <compat/linux/linux_util.h> 55 #include <compat/linux/linux_emul.h> 56 #include <compat/linux/linux_misc.h> 57 58 static int linux_do_tkill(struct thread *td, struct thread *tdt, 59 ksiginfo_t *ksi); 60 static void sicode_to_lsicode(int si_code, int *lsi_code); 61 62 63 static void 64 linux_to_bsd_sigaction(l_sigaction_t *lsa, struct sigaction *bsa) 65 { 66 67 linux_to_bsd_sigset(&lsa->lsa_mask, &bsa->sa_mask); 68 bsa->sa_handler = PTRIN(lsa->lsa_handler); 69 bsa->sa_flags = 0; 70 if (lsa->lsa_flags & LINUX_SA_NOCLDSTOP) 71 bsa->sa_flags |= SA_NOCLDSTOP; 72 if (lsa->lsa_flags & LINUX_SA_NOCLDWAIT) 73 bsa->sa_flags |= SA_NOCLDWAIT; 74 if (lsa->lsa_flags & LINUX_SA_SIGINFO) 75 bsa->sa_flags |= SA_SIGINFO; 76 if (lsa->lsa_flags & LINUX_SA_ONSTACK) 77 bsa->sa_flags |= SA_ONSTACK; 78 if (lsa->lsa_flags & LINUX_SA_RESTART) 79 bsa->sa_flags |= SA_RESTART; 80 if (lsa->lsa_flags & LINUX_SA_ONESHOT) 81 bsa->sa_flags |= SA_RESETHAND; 82 if (lsa->lsa_flags & LINUX_SA_NOMASK) 83 bsa->sa_flags |= SA_NODEFER; 84 } 85 86 static void 87 bsd_to_linux_sigaction(struct sigaction *bsa, l_sigaction_t *lsa) 88 { 89 90 bsd_to_linux_sigset(&bsa->sa_mask, &lsa->lsa_mask); 91 #ifdef COMPAT_LINUX32 92 lsa->lsa_handler = (uintptr_t)bsa->sa_handler; 93 #else 94 lsa->lsa_handler = bsa->sa_handler; 95 #endif 96 lsa->lsa_restorer = 0; /* unsupported */ 97 lsa->lsa_flags = 0; 98 if (bsa->sa_flags & SA_NOCLDSTOP) 99 lsa->lsa_flags |= LINUX_SA_NOCLDSTOP; 100 if (bsa->sa_flags & SA_NOCLDWAIT) 101 lsa->lsa_flags |= LINUX_SA_NOCLDWAIT; 102 if (bsa->sa_flags & SA_SIGINFO) 103 lsa->lsa_flags |= LINUX_SA_SIGINFO; 104 if (bsa->sa_flags & SA_ONSTACK) 105 lsa->lsa_flags |= LINUX_SA_ONSTACK; 106 if (bsa->sa_flags & SA_RESTART) 107 lsa->lsa_flags |= LINUX_SA_RESTART; 108 if (bsa->sa_flags & SA_RESETHAND) 109 lsa->lsa_flags |= LINUX_SA_ONESHOT; 110 if (bsa->sa_flags & SA_NODEFER) 111 lsa->lsa_flags |= LINUX_SA_NOMASK; 112 } 113 114 int 115 linux_do_sigaction(struct thread *td, int linux_sig, l_sigaction_t *linux_nsa, 116 l_sigaction_t *linux_osa) 117 { 118 struct sigaction act, oact, *nsa, *osa; 119 int error, sig; 120 121 if (!LINUX_SIG_VALID(linux_sig)) 122 return (EINVAL); 123 124 osa = (linux_osa != NULL) ? &oact : NULL; 125 if (linux_nsa != NULL) { 126 nsa = &act; 127 linux_to_bsd_sigaction(linux_nsa, nsa); 128 } else 129 nsa = NULL; 130 sig = linux_to_bsd_signal(linux_sig); 131 132 error = kern_sigaction(td, sig, nsa, osa, 0); 133 if (error) 134 return (error); 135 136 if (linux_osa != NULL) 137 bsd_to_linux_sigaction(osa, linux_osa); 138 139 return (0); 140 } 141 142 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32)) 143 int 144 linux_signal(struct thread *td, struct linux_signal_args *args) 145 { 146 l_sigaction_t nsa, osa; 147 int error; 148 149 #ifdef DEBUG 150 if (ldebug(signal)) 151 printf(ARGS(signal, "%d, %p"), 152 args->sig, (void *)(uintptr_t)args->handler); 153 #endif 154 155 nsa.lsa_handler = args->handler; 156 nsa.lsa_flags = LINUX_SA_ONESHOT | LINUX_SA_NOMASK; 157 LINUX_SIGEMPTYSET(nsa.lsa_mask); 158 159 error = linux_do_sigaction(td, args->sig, &nsa, &osa); 160 td->td_retval[0] = (int)(intptr_t)osa.lsa_handler; 161 162 return (error); 163 } 164 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */ 165 166 int 167 linux_rt_sigaction(struct thread *td, struct linux_rt_sigaction_args *args) 168 { 169 l_sigaction_t nsa, osa; 170 int error; 171 172 #ifdef DEBUG 173 if (ldebug(rt_sigaction)) 174 printf(ARGS(rt_sigaction, "%ld, %p, %p, %ld"), 175 (long)args->sig, (void *)args->act, 176 (void *)args->oact, (long)args->sigsetsize); 177 #endif 178 179 if (args->sigsetsize != sizeof(l_sigset_t)) 180 return (EINVAL); 181 182 if (args->act != NULL) { 183 error = copyin(args->act, &nsa, sizeof(l_sigaction_t)); 184 if (error) 185 return (error); 186 } 187 188 error = linux_do_sigaction(td, args->sig, 189 args->act ? &nsa : NULL, 190 args->oact ? &osa : NULL); 191 192 if (args->oact != NULL && !error) { 193 error = copyout(&osa, args->oact, sizeof(l_sigaction_t)); 194 } 195 196 return (error); 197 } 198 199 static int 200 linux_do_sigprocmask(struct thread *td, int how, l_sigset_t *new, 201 l_sigset_t *old) 202 { 203 sigset_t omask, nmask; 204 sigset_t *nmaskp; 205 int error; 206 207 td->td_retval[0] = 0; 208 209 switch (how) { 210 case LINUX_SIG_BLOCK: 211 how = SIG_BLOCK; 212 break; 213 case LINUX_SIG_UNBLOCK: 214 how = SIG_UNBLOCK; 215 break; 216 case LINUX_SIG_SETMASK: 217 how = SIG_SETMASK; 218 break; 219 default: 220 return (EINVAL); 221 } 222 if (new != NULL) { 223 linux_to_bsd_sigset(new, &nmask); 224 nmaskp = &nmask; 225 } else 226 nmaskp = NULL; 227 error = kern_sigprocmask(td, how, nmaskp, &omask, 0); 228 if (error == 0 && old != NULL) 229 bsd_to_linux_sigset(&omask, old); 230 231 return (error); 232 } 233 234 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32)) 235 int 236 linux_sigprocmask(struct thread *td, struct linux_sigprocmask_args *args) 237 { 238 l_osigset_t mask; 239 l_sigset_t set, oset; 240 int error; 241 242 #ifdef DEBUG 243 if (ldebug(sigprocmask)) 244 printf(ARGS(sigprocmask, "%d, *, *"), args->how); 245 #endif 246 247 if (args->mask != NULL) { 248 error = copyin(args->mask, &mask, sizeof(l_osigset_t)); 249 if (error) 250 return (error); 251 LINUX_SIGEMPTYSET(set); 252 set.__mask = mask; 253 } 254 255 error = linux_do_sigprocmask(td, args->how, 256 args->mask ? &set : NULL, 257 args->omask ? &oset : NULL); 258 259 if (args->omask != NULL && !error) { 260 mask = oset.__mask; 261 error = copyout(&mask, args->omask, sizeof(l_osigset_t)); 262 } 263 264 return (error); 265 } 266 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */ 267 268 int 269 linux_rt_sigprocmask(struct thread *td, struct linux_rt_sigprocmask_args *args) 270 { 271 l_sigset_t set, oset; 272 int error; 273 274 #ifdef DEBUG 275 if (ldebug(rt_sigprocmask)) 276 printf(ARGS(rt_sigprocmask, "%d, %p, %p, %ld"), 277 args->how, (void *)args->mask, 278 (void *)args->omask, (long)args->sigsetsize); 279 #endif 280 281 if (args->sigsetsize != sizeof(l_sigset_t)) 282 return EINVAL; 283 284 if (args->mask != NULL) { 285 error = copyin(args->mask, &set, sizeof(l_sigset_t)); 286 if (error) 287 return (error); 288 } 289 290 error = linux_do_sigprocmask(td, args->how, 291 args->mask ? &set : NULL, 292 args->omask ? &oset : NULL); 293 294 if (args->omask != NULL && !error) { 295 error = copyout(&oset, args->omask, sizeof(l_sigset_t)); 296 } 297 298 return (error); 299 } 300 301 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32)) 302 int 303 linux_sgetmask(struct thread *td, struct linux_sgetmask_args *args) 304 { 305 struct proc *p = td->td_proc; 306 l_sigset_t mask; 307 308 #ifdef DEBUG 309 if (ldebug(sgetmask)) 310 printf(ARGS(sgetmask, "")); 311 #endif 312 313 PROC_LOCK(p); 314 bsd_to_linux_sigset(&td->td_sigmask, &mask); 315 PROC_UNLOCK(p); 316 td->td_retval[0] = mask.__mask; 317 return (0); 318 } 319 320 int 321 linux_ssetmask(struct thread *td, struct linux_ssetmask_args *args) 322 { 323 struct proc *p = td->td_proc; 324 l_sigset_t lset; 325 sigset_t bset; 326 327 #ifdef DEBUG 328 if (ldebug(ssetmask)) 329 printf(ARGS(ssetmask, "%08lx"), (unsigned long)args->mask); 330 #endif 331 332 PROC_LOCK(p); 333 bsd_to_linux_sigset(&td->td_sigmask, &lset); 334 td->td_retval[0] = lset.__mask; 335 LINUX_SIGEMPTYSET(lset); 336 lset.__mask = args->mask; 337 linux_to_bsd_sigset(&lset, &bset); 338 td->td_sigmask = bset; 339 SIG_CANTMASK(td->td_sigmask); 340 signotify(td); 341 PROC_UNLOCK(p); 342 return (0); 343 } 344 345 int 346 linux_sigpending(struct thread *td, struct linux_sigpending_args *args) 347 { 348 struct proc *p = td->td_proc; 349 sigset_t bset; 350 l_sigset_t lset; 351 l_osigset_t mask; 352 353 #ifdef DEBUG 354 if (ldebug(sigpending)) 355 printf(ARGS(sigpending, "*")); 356 #endif 357 358 PROC_LOCK(p); 359 bset = p->p_siglist; 360 SIGSETOR(bset, td->td_siglist); 361 SIGSETAND(bset, td->td_sigmask); 362 PROC_UNLOCK(p); 363 bsd_to_linux_sigset(&bset, &lset); 364 mask = lset.__mask; 365 return (copyout(&mask, args->mask, sizeof(mask))); 366 } 367 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */ 368 369 /* 370 * MPSAFE 371 */ 372 int 373 linux_rt_sigpending(struct thread *td, struct linux_rt_sigpending_args *args) 374 { 375 struct proc *p = td->td_proc; 376 sigset_t bset; 377 l_sigset_t lset; 378 379 if (args->sigsetsize > sizeof(lset)) 380 return EINVAL; 381 /* NOT REACHED */ 382 383 #ifdef DEBUG 384 if (ldebug(rt_sigpending)) 385 printf(ARGS(rt_sigpending, "*")); 386 #endif 387 388 PROC_LOCK(p); 389 bset = p->p_siglist; 390 SIGSETOR(bset, td->td_siglist); 391 SIGSETAND(bset, td->td_sigmask); 392 PROC_UNLOCK(p); 393 bsd_to_linux_sigset(&bset, &lset); 394 return (copyout(&lset, args->set, args->sigsetsize)); 395 } 396 397 /* 398 * MPSAFE 399 */ 400 int 401 linux_rt_sigtimedwait(struct thread *td, 402 struct linux_rt_sigtimedwait_args *args) 403 { 404 int error, sig; 405 l_timeval ltv; 406 struct timeval tv; 407 struct timespec ts, *tsa; 408 l_sigset_t lset; 409 sigset_t bset; 410 l_siginfo_t linfo; 411 ksiginfo_t info; 412 413 #ifdef DEBUG 414 if (ldebug(rt_sigtimedwait)) 415 printf(ARGS(rt_sigtimedwait, "*")); 416 #endif 417 if (args->sigsetsize != sizeof(l_sigset_t)) 418 return (EINVAL); 419 420 if ((error = copyin(args->mask, &lset, sizeof(lset)))) 421 return (error); 422 linux_to_bsd_sigset(&lset, &bset); 423 424 tsa = NULL; 425 if (args->timeout) { 426 if ((error = copyin(args->timeout, <v, sizeof(ltv)))) 427 return (error); 428 #ifdef DEBUG 429 if (ldebug(rt_sigtimedwait)) 430 printf(LMSG("linux_rt_sigtimedwait: " 431 "incoming timeout (%jd/%jd)\n"), 432 (intmax_t)ltv.tv_sec, (intmax_t)ltv.tv_usec); 433 #endif 434 tv.tv_sec = (long)ltv.tv_sec; 435 tv.tv_usec = (suseconds_t)ltv.tv_usec; 436 if (itimerfix(&tv)) { 437 /* 438 * The timeout was invalid. Convert it to something 439 * valid that will act as it does under Linux. 440 */ 441 tv.tv_sec += tv.tv_usec / 1000000; 442 tv.tv_usec %= 1000000; 443 if (tv.tv_usec < 0) { 444 tv.tv_sec -= 1; 445 tv.tv_usec += 1000000; 446 } 447 if (tv.tv_sec < 0) 448 timevalclear(&tv); 449 #ifdef DEBUG 450 if (ldebug(rt_sigtimedwait)) 451 printf(LMSG("linux_rt_sigtimedwait: " 452 "converted timeout (%jd/%ld)\n"), 453 (intmax_t)tv.tv_sec, tv.tv_usec); 454 #endif 455 } 456 TIMEVAL_TO_TIMESPEC(&tv, &ts); 457 tsa = &ts; 458 } 459 error = kern_sigtimedwait(td, bset, &info, tsa); 460 #ifdef DEBUG 461 if (ldebug(rt_sigtimedwait)) 462 printf(LMSG("linux_rt_sigtimedwait: " 463 "sigtimedwait returning (%d)\n"), error); 464 #endif 465 if (error) 466 return (error); 467 468 sig = bsd_to_linux_signal(info.ksi_signo); 469 470 if (args->ptr) { 471 memset(&linfo, 0, sizeof(linfo)); 472 ksiginfo_to_lsiginfo(&info, &linfo, sig); 473 error = copyout(&linfo, args->ptr, sizeof(linfo)); 474 } 475 if (error == 0) 476 td->td_retval[0] = sig; 477 478 return (error); 479 } 480 481 int 482 linux_kill(struct thread *td, struct linux_kill_args *args) 483 { 484 struct kill_args /* { 485 int pid; 486 int signum; 487 } */ tmp; 488 489 #ifdef DEBUG 490 if (ldebug(kill)) 491 printf(ARGS(kill, "%d, %d"), args->pid, args->signum); 492 #endif 493 494 /* 495 * Allow signal 0 as a means to check for privileges 496 */ 497 if (!LINUX_SIG_VALID(args->signum) && args->signum != 0) 498 return (EINVAL); 499 500 if (args->signum > 0) 501 tmp.signum = linux_to_bsd_signal(args->signum); 502 else 503 tmp.signum = 0; 504 505 tmp.pid = args->pid; 506 return (sys_kill(td, &tmp)); 507 } 508 509 static int 510 linux_do_tkill(struct thread *td, struct thread *tdt, ksiginfo_t *ksi) 511 { 512 struct proc *p; 513 int error; 514 515 p = tdt->td_proc; 516 AUDIT_ARG_SIGNUM(ksi->ksi_signo); 517 AUDIT_ARG_PID(p->p_pid); 518 AUDIT_ARG_PROCESS(p); 519 520 error = p_cansignal(td, p, ksi->ksi_signo); 521 if (error != 0 || ksi->ksi_signo == 0) 522 goto out; 523 524 tdksignal(tdt, ksi->ksi_signo, ksi); 525 526 out: 527 PROC_UNLOCK(p); 528 return (error); 529 } 530 531 int 532 linux_tgkill(struct thread *td, struct linux_tgkill_args *args) 533 { 534 struct thread *tdt; 535 ksiginfo_t ksi; 536 int sig; 537 538 #ifdef DEBUG 539 if (ldebug(tgkill)) 540 printf(ARGS(tgkill, "%d, %d, %d"), 541 args->tgid, args->pid, args->sig); 542 #endif 543 544 if (args->pid <= 0 || args->tgid <=0) 545 return (EINVAL); 546 547 /* 548 * Allow signal 0 as a means to check for privileges 549 */ 550 if (!LINUX_SIG_VALID(args->sig) && args->sig != 0) 551 return (EINVAL); 552 553 if (args->sig > 0) 554 sig = linux_to_bsd_signal(args->sig); 555 else 556 sig = 0; 557 558 tdt = linux_tdfind(td, args->pid, args->tgid); 559 if (tdt == NULL) 560 return (ESRCH); 561 562 ksiginfo_init(&ksi); 563 ksi.ksi_signo = sig; 564 ksi.ksi_code = SI_LWP; 565 ksi.ksi_errno = 0; 566 ksi.ksi_pid = td->td_proc->p_pid; 567 ksi.ksi_uid = td->td_proc->p_ucred->cr_ruid; 568 return (linux_do_tkill(td, tdt, &ksi)); 569 } 570 571 /* 572 * Deprecated since 2.5.75. Replaced by tgkill(). 573 */ 574 int 575 linux_tkill(struct thread *td, struct linux_tkill_args *args) 576 { 577 struct thread *tdt; 578 ksiginfo_t ksi; 579 int sig; 580 581 #ifdef DEBUG 582 if (ldebug(tkill)) 583 printf(ARGS(tkill, "%i, %i"), args->tid, args->sig); 584 #endif 585 if (args->tid <= 0) 586 return (EINVAL); 587 588 if (!LINUX_SIG_VALID(args->sig)) 589 return (EINVAL); 590 591 sig = linux_to_bsd_signal(args->sig); 592 593 tdt = linux_tdfind(td, args->tid, -1); 594 if (tdt == NULL) 595 return (ESRCH); 596 597 ksiginfo_init(&ksi); 598 ksi.ksi_signo = sig; 599 ksi.ksi_code = SI_LWP; 600 ksi.ksi_errno = 0; 601 ksi.ksi_pid = td->td_proc->p_pid; 602 ksi.ksi_uid = td->td_proc->p_ucred->cr_ruid; 603 return (linux_do_tkill(td, tdt, &ksi)); 604 } 605 606 void 607 ksiginfo_to_lsiginfo(const ksiginfo_t *ksi, l_siginfo_t *lsi, l_int sig) 608 { 609 610 siginfo_to_lsiginfo(&ksi->ksi_info, lsi, sig); 611 } 612 613 static void 614 sicode_to_lsicode(int si_code, int *lsi_code) 615 { 616 617 switch (si_code) { 618 case SI_USER: 619 *lsi_code = LINUX_SI_USER; 620 break; 621 case SI_KERNEL: 622 *lsi_code = LINUX_SI_KERNEL; 623 break; 624 case SI_QUEUE: 625 *lsi_code = LINUX_SI_QUEUE; 626 break; 627 case SI_TIMER: 628 *lsi_code = LINUX_SI_TIMER; 629 break; 630 case SI_MESGQ: 631 *lsi_code = LINUX_SI_MESGQ; 632 break; 633 case SI_ASYNCIO: 634 *lsi_code = LINUX_SI_ASYNCIO; 635 break; 636 case SI_LWP: 637 *lsi_code = LINUX_SI_TKILL; 638 break; 639 default: 640 *lsi_code = si_code; 641 break; 642 } 643 } 644 645 void 646 siginfo_to_lsiginfo(const siginfo_t *si, l_siginfo_t *lsi, l_int sig) 647 { 648 649 /* sig alredy converted */ 650 lsi->lsi_signo = sig; 651 sicode_to_lsicode(si->si_code, &lsi->lsi_code); 652 653 switch (si->si_code) { 654 case SI_LWP: 655 lsi->lsi_pid = si->si_pid; 656 lsi->lsi_uid = si->si_uid; 657 break; 658 659 case SI_TIMER: 660 lsi->lsi_int = si->si_value.sival_int; 661 lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr); 662 lsi->lsi_tid = si->si_timerid; 663 break; 664 665 case SI_QUEUE: 666 lsi->lsi_pid = si->si_pid; 667 lsi->lsi_uid = si->si_uid; 668 lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr); 669 break; 670 671 case SI_ASYNCIO: 672 lsi->lsi_int = si->si_value.sival_int; 673 lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr); 674 break; 675 676 default: 677 switch (sig) { 678 case LINUX_SIGPOLL: 679 /* XXX si_fd? */ 680 lsi->lsi_band = si->si_band; 681 break; 682 683 case LINUX_SIGCHLD: 684 lsi->lsi_errno = 0; 685 lsi->lsi_pid = si->si_pid; 686 lsi->lsi_uid = si->si_uid; 687 688 if (si->si_code == CLD_STOPPED) 689 lsi->lsi_status = bsd_to_linux_signal(si->si_status); 690 else if (si->si_code == CLD_CONTINUED) 691 lsi->lsi_status = bsd_to_linux_signal(SIGCONT); 692 else 693 lsi->lsi_status = si->si_status; 694 break; 695 696 case LINUX_SIGBUS: 697 case LINUX_SIGILL: 698 case LINUX_SIGFPE: 699 case LINUX_SIGSEGV: 700 lsi->lsi_addr = PTROUT(si->si_addr); 701 break; 702 703 default: 704 lsi->lsi_pid = si->si_pid; 705 lsi->lsi_uid = si->si_uid; 706 if (sig >= LINUX_SIGRTMIN) { 707 lsi->lsi_int = si->si_value.sival_int; 708 lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr); 709 } 710 break; 711 } 712 break; 713 } 714 } 715 716 void 717 lsiginfo_to_ksiginfo(const l_siginfo_t *lsi, ksiginfo_t *ksi, int sig) 718 { 719 720 ksi->ksi_signo = sig; 721 ksi->ksi_code = lsi->lsi_code; /* XXX. Convert. */ 722 ksi->ksi_pid = lsi->lsi_pid; 723 ksi->ksi_uid = lsi->lsi_uid; 724 ksi->ksi_status = lsi->lsi_status; 725 ksi->ksi_addr = PTRIN(lsi->lsi_addr); 726 ksi->ksi_info.si_value.sival_int = lsi->lsi_int; 727 } 728 729 int 730 linux_rt_sigqueueinfo(struct thread *td, struct linux_rt_sigqueueinfo_args *args) 731 { 732 l_siginfo_t linfo; 733 struct proc *p; 734 ksiginfo_t ksi; 735 int error; 736 int sig; 737 738 if (!LINUX_SIG_VALID(args->sig)) 739 return (EINVAL); 740 741 error = copyin(args->info, &linfo, sizeof(linfo)); 742 if (error != 0) 743 return (error); 744 745 if (linfo.lsi_code >= 0) 746 return (EPERM); 747 748 sig = linux_to_bsd_signal(args->sig); 749 750 error = ESRCH; 751 if ((p = pfind(args->pid)) != NULL || 752 (p = zpfind(args->pid)) != NULL) { 753 error = p_cansignal(td, p, sig); 754 if (error != 0) { 755 PROC_UNLOCK(p); 756 return (error); 757 } 758 759 ksiginfo_init(&ksi); 760 lsiginfo_to_ksiginfo(&linfo, &ksi, sig); 761 error = tdsendsignal(p, NULL, sig, &ksi); 762 PROC_UNLOCK(p); 763 } 764 765 return (error); 766 } 767 768 int 769 linux_rt_tgsigqueueinfo(struct thread *td, struct linux_rt_tgsigqueueinfo_args *args) 770 { 771 l_siginfo_t linfo; 772 struct thread *tds; 773 ksiginfo_t ksi; 774 int error; 775 int sig; 776 777 if (!LINUX_SIG_VALID(args->sig)) 778 return (EINVAL); 779 780 error = copyin(args->uinfo, &linfo, sizeof(linfo)); 781 if (error != 0) 782 return (error); 783 784 if (linfo.lsi_code >= 0) 785 return (EPERM); 786 787 tds = linux_tdfind(td, args->tid, args->tgid); 788 if (tds == NULL) 789 return (ESRCH); 790 791 sig = linux_to_bsd_signal(args->sig); 792 ksiginfo_init(&ksi); 793 lsiginfo_to_ksiginfo(&linfo, &ksi, sig); 794 return (linux_do_tkill(td, tds, &ksi)); 795 } 796