1 /*	$NetBSD: netbsd32_signal.c,v 1.53 2021/11/06 20:42:56 thorpej Exp $	*/
2 
3 /*
4  * Copyright (c) 1998, 2001 Matthew R. Green
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
22  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <sys/cdefs.h>
30 __KERNEL_RCSID(0, "$NetBSD: netbsd32_signal.c,v 1.53 2021/11/06 20:42:56 thorpej Exp $");
31 
32 #if defined(_KERNEL_OPT)
33 #include "opt_ktrace.h"
34 #endif
35 
36 #include <sys/param.h>
37 #include <sys/systm.h>
38 #include <sys/mount.h>
39 #include <sys/stat.h>
40 #include <sys/time.h>
41 #include <sys/signalvar.h>
42 #include <sys/ktrace.h>
43 #include <sys/proc.h>
44 #include <sys/wait.h>
45 #include <sys/dirent.h>
46 #include <sys/module.h>
47 #include <sys/exec.h>
48 
49 #include <uvm/uvm_extern.h>
50 
51 #include <compat/netbsd32/netbsd32.h>
52 #include <compat/netbsd32/netbsd32_conv.h>
53 #include <compat/netbsd32/netbsd32_exec.h>
54 #include <compat/netbsd32/netbsd32_syscallargs.h>
55 
56 #include <compat/sys/signal.h>
57 #include <compat/sys/signalvar.h>
58 #include <compat/sys/siginfo.h>
59 #include <compat/sys/ucontext.h>
60 #include <compat/common/compat_sigaltstack.h>
61 
62 int
netbsd32_sigaction(struct lwp * l,const struct netbsd32_sigaction_args * uap,register_t * retval)63 netbsd32_sigaction(struct lwp *l, const struct netbsd32_sigaction_args *uap, register_t *retval)
64 {
65 	/* {
66 		syscallarg(int) signum;
67 		syscallarg(const netbsd32_sigactionp_t) nsa;
68 		syscallarg(netbsd32_sigactionp_t) osa;
69 	} */
70 	struct sigaction nsa, osa;
71 	struct netbsd32_sigaction13 *sa32p, sa32;
72 	int error;
73 
74 	if (SCARG_P32(uap, nsa)) {
75 		sa32p = SCARG_P32(uap, nsa);
76 		if (copyin(sa32p, &sa32, sizeof(sa32)))
77 			return EFAULT;
78 		nsa.sa_handler = (void *)NETBSD32PTR64(sa32.netbsd32_sa_handler);
79 		memset(&nsa.sa_mask, 0, sizeof(nsa.sa_mask));
80 		nsa.sa_mask.__bits[0] = sa32.netbsd32_sa_mask;
81 		nsa.sa_flags = sa32.netbsd32_sa_flags;
82 	}
83 	error = sigaction1(l, SCARG(uap, signum),
84 			   SCARG_P32(uap, nsa) ? &nsa : 0,
85 			   SCARG_P32(uap, osa) ? &osa : 0,
86 			   NULL, 0);
87 
88 	if (error)
89 		return error;
90 
91 	if (SCARG_P32(uap, osa)) {
92 		memset(&sa32, 0, sizeof(sa32));
93 		NETBSD32PTR32(sa32.netbsd32_sa_handler, osa.sa_handler);
94 		sa32.netbsd32_sa_mask = osa.sa_mask.__bits[0];
95 		sa32.netbsd32_sa_flags = osa.sa_flags;
96 		sa32p = SCARG_P32(uap, osa);
97 		if (copyout(&sa32, sa32p, sizeof(sa32)))
98 			return EFAULT;
99 	}
100 
101 	return 0;
102 }
103 
104 int
netbsd32___sigaltstack14(struct lwp * l,const struct netbsd32___sigaltstack14_args * uap,register_t * retval)105 netbsd32___sigaltstack14(struct lwp *l, const struct netbsd32___sigaltstack14_args *uap, register_t *retval)
106 {
107 	/* {
108 		syscallarg(const netbsd32_sigaltstackp_t) nss;
109 		syscallarg(netbsd32_sigaltstackp_t) oss;
110 	} */
111 	compat_sigaltstack(uap, netbsd32_sigaltstack, SS_ONSTACK, SS_DISABLE);
112 }
113 
114 /* ARGSUSED */
115 int
netbsd32___sigaction14(struct lwp * l,const struct netbsd32___sigaction14_args * uap,register_t * retval)116 netbsd32___sigaction14(struct lwp *l, const struct netbsd32___sigaction14_args *uap, register_t *retval)
117 {
118 	/* {
119 		syscallarg(int) signum;
120 		syscallarg(const struct sigaction *) nsa;
121 		syscallarg(struct sigaction *) osa;
122 	} */
123 	struct netbsd32_sigaction sa32;
124 	struct sigaction nsa, osa;
125 	int error;
126 
127 	if (SCARG_P32(uap, nsa)) {
128 		error = copyin(SCARG_P32(uap, nsa), &sa32, sizeof(sa32));
129 		if (error)
130 			return error;
131 		nsa.sa_handler = NETBSD32PTR64(sa32.netbsd32_sa_handler);
132 		nsa.sa_mask = sa32.netbsd32_sa_mask;
133 		nsa.sa_flags = sa32.netbsd32_sa_flags;
134 	}
135 	error = sigaction1(l, SCARG(uap, signum),
136 		    SCARG_P32(uap, nsa) ? &nsa : 0,
137 		    SCARG_P32(uap, osa) ? &osa : 0,
138 		    NULL, 0);
139 	if (error)
140 		return error;
141 	if (SCARG_P32(uap, osa)) {
142 		memset(&sa32, 0, sizeof(sa32));
143 		NETBSD32PTR32(sa32.netbsd32_sa_handler, osa.sa_handler);
144 		sa32.netbsd32_sa_mask = osa.sa_mask;
145 		sa32.netbsd32_sa_flags = osa.sa_flags;
146 		error = copyout(&sa32, SCARG_P32(uap, osa), sizeof(sa32));
147 		if (error)
148 			return error;
149 	}
150 	return 0;
151 }
152 
153 /* ARGSUSED */
154 int
netbsd32___sigaction_sigtramp(struct lwp * l,const struct netbsd32___sigaction_sigtramp_args * uap,register_t * retval)155 netbsd32___sigaction_sigtramp(struct lwp *l, const struct netbsd32___sigaction_sigtramp_args *uap, register_t *retval)
156 {
157 	/* {
158 		syscallarg(int) signum;
159 		syscallarg(const netbsd32_sigactionp_t) nsa;
160 		syscallarg(netbsd32_sigactionp_t) osa;
161 		syscallarg(netbsd32_voidp) tramp;
162 		syscallarg(int) vers;
163 	} */
164 	struct netbsd32_sigaction sa32;
165 	struct sigaction nsa, osa;
166 	int error, vers;
167 
168 	if (SCARG_P32(uap, nsa)) {
169 		error = copyin(SCARG_P32(uap, nsa), &sa32, sizeof(sa32));
170 		if (error)
171 			return error;
172 		nsa.sa_handler = NETBSD32PTR64(sa32.netbsd32_sa_handler);
173 		nsa.sa_mask = sa32.netbsd32_sa_mask;
174 		nsa.sa_flags = sa32.netbsd32_sa_flags;
175 	}
176 	vers = SCARG(uap, vers);
177 #ifndef __HAVE_MD_NETBSD32_SENDSIG	/* XXX paying for yesterday's sins */
178 	if (vers < __SIGTRAMP_SIGINFO_VERSION_MIN) {
179 		/*
180 		 * sigaction1() doesn't enforce sigcontext-ness for
181 		 * __SIGTRAMP_SIGCODE_VERSION because it might be
182 		 * a foreign emulation.  However, we know these are
183 		 * native NetBSD 32-bit binaries, so we do.
184 		 */
185 #ifdef __HAVE_STRUCT_SIGCONTEXT
186 		struct proc *p = l->l_proc;
187 		bool sigcontext_valid = false;
188 
189 		/*
190 		 * We need to ensure the compat_netbsd32_16 module
191 		 * is loaded, because sigaction1() gives a free pass
192 		 * to processes marked PK_32 (it can't be sure which
193 		 * 32-bit compat module is needed).
194 		 */
195 		if ((p->p_lflag & PL_SIGCOMPAT) == 0) {
196 			kernconfig_lock();
197 			(void)module_autoload("compat_netbsd32_16",
198 			    MODULE_CLASS_ANY);
199 			if (netbsd32_sendsig_sigcontext_16_hook.hooked) {
200 				sigcontext_valid = true;
201 			}
202 			mutex_enter(&proc_lock);
203 			/*
204 			 * Prevent unload of compat module while
205 			 * this process remains.
206 			 */
207 			p->p_lflag |= PL_SIGCOMPAT;
208 			mutex_exit(&proc_lock);
209 			kernconfig_unlock();
210 		}
211 		if (!sigcontext_valid) {
212 			return EINVAL;
213 		}
214 #else /* ! __HAVE_STRUCT_SIGCONTEXT */
215 		return EINVAL;
216 #endif /* __HAVE_STRUCT_SIGCONTEXT */
217 	}
218 #endif /* __HAVE_MD_NETBSD32_SENDSIG */
219 	error = sigaction1(l, SCARG(uap, signum),
220 	    SCARG_P32(uap, nsa) ? &nsa : 0,
221 	    SCARG_P32(uap, osa) ? &osa : 0,
222 	    SCARG_P32(uap, tramp), vers);
223 	if (error)
224 		return error;
225 	if (SCARG_P32(uap, osa)) {
226 		memset(&sa32, 0, sizeof(sa32));
227 		NETBSD32PTR32(sa32.netbsd32_sa_handler, osa.sa_handler);
228 		sa32.netbsd32_sa_mask = osa.sa_mask;
229 		sa32.netbsd32_sa_flags = osa.sa_flags;
230 		error = copyout(&sa32, SCARG_P32(uap, osa), sizeof(sa32));
231 		if (error)
232 			return error;
233 	}
234 	return 0;
235 }
236 
237 #ifndef __HAVE_MD_NETBSD32_SENDSIG	/* XXX paying for yesterday's sins */
238 #ifdef __HAVE_STRUCT_SIGCONTEXT
239 struct netbsd32_sendsig_sigcontext_16_hook_t netbsd32_sendsig_sigcontext_16_hook;
240 #endif
241 
242 void
netbsd32_sendsig(const struct ksiginfo * ksi,const sigset_t * mask)243 netbsd32_sendsig(const struct ksiginfo *ksi, const sigset_t *mask)
244 {
245 	struct sigacts *sa;
246 	int sig;
247 
248 	sig = ksi->ksi_signo;
249 	sa = curproc->p_sigacts;
250 
251 	switch (sa->sa_sigdesc[sig].sd_vers) {
252 #ifdef __HAVE_STRUCT_SIGCONTEXT
253 	case __SIGTRAMP_SIGCODE_VERSION:
254 	case __SIGTRAMP_SIGCONTEXT_VERSION_MIN ...
255 	     __SIGTRAMP_SIGCONTEXT_VERSION_MAX:
256 		/* Compat for 1.6 and earlier. */
257 		MODULE_HOOK_CALL_VOID(netbsd32_sendsig_sigcontext_16_hook,
258 		    (ksi, mask), break);
259 		return;
260 #endif /* __HAVE_STRUCT_SIGCONTEXT */
261 	case __SIGTRAMP_SIGINFO_VERSION_MIN ...
262 	     __SIGTRAMP_SIGINFO_VERSION_MAX:
263 		netbsd32_sendsig_siginfo(ksi, mask);
264 		return;
265 	default:
266 		break;
267 	}
268 
269 	printf("%s: bad version %d\n", __func__, sa->sa_sigdesc[sig].sd_vers);
270 	sigexit(curlwp, SIGILL);
271 }
272 #endif /* __HAVE_MD_NETBSD32_SENDSIG */
273 
274 void
netbsd32_ksi32_to_ksi(struct _ksiginfo * si,const struct __ksiginfo32 * si32)275 netbsd32_ksi32_to_ksi(struct _ksiginfo *si, const struct __ksiginfo32 *si32)
276 {
277 	size_t i;
278 
279 	memset(si, 0, sizeof (*si));
280 	si->_signo = si32->_signo;
281 	si->_code = si32->_code;
282 	si->_errno = si32->_errno;
283 
284 	if (si32->_code == SI_NOINFO)
285 		return;
286 	else if (si32->_code <= 0)	/* codes described in siginfo(2) */
287 		goto fill_rt;
288 
289 	switch (si32->_signo) {
290 	case SIGILL:
291 	case SIGFPE:
292 	case SIGBUS:
293 	case SIGSEGV:
294 fill_fault:
295 		si->_reason._fault._addr =
296 		    NETBSD32IPTR64(si32->_reason._fault._addr);
297 		si->_reason._fault._trap = si32->_reason._fault._trap;
298 		break;
299 	case SIGTRAP:
300 		switch (si32->_code) {
301 		case TRAP_EXEC:
302 			break;
303 		case TRAP_CHLD:
304 		case TRAP_LWP:
305 			si->_reason._ptrace_state._pe_report_event =
306 			    si32->_reason._ptrace_state._pe_report_event;
307 CTASSERT(sizeof(si->_reason._ptrace_state._option._pe_other_pid) ==
308     sizeof(si->_reason._ptrace_state._option._pe_lwp));
309 			si->_reason._ptrace_state._option._pe_other_pid =
310 			    si32->_reason._ptrace_state._option._pe_other_pid;
311 			break;
312 		case TRAP_SCE:
313 		case TRAP_SCX:
314 			si->_reason._syscall._sysnum =
315 			    si32->_reason._syscall._sysnum;
316 			si->_reason._syscall._retval[0] =
317 			    si32->_reason._syscall._retval[0];
318 			si->_reason._syscall._retval[1] =
319 			    si32->_reason._syscall._retval[1];
320 			si->_reason._syscall._error =
321 			    si32->_reason._syscall._error;
322 			for (i = 0;
323 			    i < __arraycount(si->_reason._syscall._args); i++)
324 				si->_reason._syscall._args[i] =
325 				    si32->_reason._syscall._args[i];
326 			break;
327 		default:
328 			goto fill_fault;
329 		}
330 		break;
331 	case SIGALRM:
332 	case SIGVTALRM:
333 	case SIGPROF:
334 	default:	/* see sigqueue() and kill1() */
335 fill_rt:
336 		si->_reason._rt._pid = si32->_reason._rt._pid;
337 		si->_reason._rt._uid = si32->_reason._rt._uid;
338 		si->_reason._rt._value.sival_int =
339 		    si32->_reason._rt._value.sival_int;
340 		break;
341 	case SIGURG:
342 	case SIGIO:
343 		si->_reason._poll._band = si32->_reason._poll._band;
344 		si->_reason._poll._fd = si32->_reason._poll._fd;
345 		break;
346 	case SIGCHLD:
347 		si->_reason._child._pid = si32->_reason._child._pid;
348 		si->_reason._child._uid = si32->_reason._child._uid;
349 		si->_reason._child._status = si32->_reason._child._status;
350 		si->_reason._child._utime = si32->_reason._child._utime;
351 		si->_reason._child._stime = si32->_reason._child._stime;
352 		break;
353 	}
354 }
355 
356 void
netbsd32_si32_to_si(siginfo_t * si,const siginfo32_t * si32)357 netbsd32_si32_to_si(siginfo_t *si, const siginfo32_t *si32)
358 {
359 
360 	memset(si, 0, sizeof (*si));
361 	netbsd32_ksi32_to_ksi(&si->_info, &si32->_info);
362 }
363 
364 static void
netbsd32_ksi_to_ksi32(struct __ksiginfo32 * si32,const struct _ksiginfo * si)365 netbsd32_ksi_to_ksi32(struct __ksiginfo32 *si32, const struct _ksiginfo *si)
366 {
367 	size_t i;
368 
369 	memset(si32, 0, sizeof (*si32));
370 	si32->_signo = si->_signo;
371 	si32->_code = si->_code;
372 	si32->_errno = si->_errno;
373 
374 	if (si->_code == SI_NOINFO)
375 		return;
376 	else if (si->_code <= 0)	/* codes described in siginfo(2) */
377 		goto fill_rt;
378 
379 	switch (si->_signo) {
380 	case SIGILL:
381 	case SIGFPE:
382 	case SIGBUS:
383 	case SIGSEGV:
384 fill_fault:
385 		si32->_reason._fault._addr =
386 		    NETBSD32PTR32I(si->_reason._fault._addr);
387 		si32->_reason._fault._trap = si->_reason._fault._trap;
388 		break;
389 	case SIGTRAP:
390 		switch (si->_code) {
391 		case TRAP_EXEC:
392 			break;
393 		case TRAP_CHLD:
394 		case TRAP_LWP:
395 			si32->_reason._ptrace_state._pe_report_event =
396 			    si->_reason._ptrace_state._pe_report_event;
397 CTASSERT(sizeof(si32->_reason._ptrace_state._option._pe_other_pid) ==
398     sizeof(si32->_reason._ptrace_state._option._pe_lwp));
399 			si32->_reason._ptrace_state._option._pe_other_pid =
400 			    si->_reason._ptrace_state._option._pe_other_pid;
401 			break;
402 		case TRAP_SCE:
403 		case TRAP_SCX:
404 			si32->_reason._syscall._sysnum =
405 			    si->_reason._syscall._sysnum;
406 			si32->_reason._syscall._retval[0] =
407 			    si->_reason._syscall._retval[0];
408 			si32->_reason._syscall._retval[1] =
409 			    si->_reason._syscall._retval[1];
410 			si32->_reason._syscall._error =
411 			    si->_reason._syscall._error;
412 			for (i = 0;
413 			    i < __arraycount(si->_reason._syscall._args); i++)
414 				si32->_reason._syscall._args[i] =
415 				    si->_reason._syscall._args[i];
416 			break;
417 		default:
418 			goto fill_fault;
419 		}
420 		break;
421 	case SIGALRM:
422 	case SIGVTALRM:
423 	case SIGPROF:
424 	default:	/* see sigqueue() and kill1() */
425 fill_rt:
426 		si32->_reason._rt._pid = si->_reason._rt._pid;
427 		si32->_reason._rt._uid = si->_reason._rt._uid;
428 		si32->_reason._rt._value.sival_int =
429 		    si->_reason._rt._value.sival_int;
430 		break;
431 	case SIGURG:
432 	case SIGIO:
433 		si32->_reason._poll._band = si->_reason._poll._band;
434 		si32->_reason._poll._fd = si->_reason._poll._fd;
435 		break;
436 	case SIGCHLD:
437 		si32->_reason._child._pid = si->_reason._child._pid;
438 		si32->_reason._child._uid = si->_reason._child._uid;
439 		si32->_reason._child._status = si->_reason._child._status;
440 		si32->_reason._child._utime = si->_reason._child._utime;
441 		si32->_reason._child._stime = si->_reason._child._stime;
442 		break;
443 	}
444 }
445 
446 void
netbsd32_si_to_si32(siginfo32_t * si32,const siginfo_t * si)447 netbsd32_si_to_si32(siginfo32_t *si32, const siginfo_t *si)
448 {
449 
450 	memset(si32, 0, sizeof (*si32));
451 	netbsd32_ksi_to_ksi32(&si32->_info, &si->_info);
452 }
453 
454 void
getucontext32(struct lwp * l,ucontext32_t * ucp)455 getucontext32(struct lwp *l, ucontext32_t *ucp)
456 {
457 	struct proc *p = l->l_proc;
458 
459 	KASSERT(mutex_owned(p->p_lock));
460 
461 	ucp->uc_flags = 0;
462 	ucp->uc_link = (uint32_t)(intptr_t)l->l_ctxlink;
463 	ucp->uc_sigmask = l->l_sigmask;
464 	ucp->uc_flags |= _UC_SIGMASK;
465 
466 	/*
467 	 * The (unsupplied) definition of the `current execution stack'
468 	 * in the System V Interface Definition appears to allow returning
469 	 * the main context stack.
470 	 */
471 	if ((l->l_sigstk.ss_flags & SS_ONSTACK) == 0) {
472 		ucp->uc_stack.ss_sp = USRSTACK32;
473 		ucp->uc_stack.ss_size = ctob(p->p_vmspace->vm_ssize);
474 		ucp->uc_stack.ss_flags = 0;	/* XXX, def. is Very Fishy */
475 	} else {
476 		/* Simply copy alternate signal execution stack. */
477 		ucp->uc_stack.ss_sp =
478 		    (uint32_t)(intptr_t)l->l_sigstk.ss_sp;
479 		ucp->uc_stack.ss_size = l->l_sigstk.ss_size;
480 		ucp->uc_stack.ss_flags = l->l_sigstk.ss_flags;
481 	}
482 	ucp->uc_flags |= _UC_STACK;
483 	mutex_exit(p->p_lock);
484 	cpu_getmcontext32(l, &ucp->uc_mcontext, &ucp->uc_flags);
485 	mutex_enter(p->p_lock);
486 }
487 
488 int
netbsd32_getcontext(struct lwp * l,const struct netbsd32_getcontext_args * uap,register_t * retval)489 netbsd32_getcontext(struct lwp *l, const struct netbsd32_getcontext_args *uap, register_t *retval)
490 {
491 	/* {
492 		syscallarg(netbsd32_ucontextp) ucp;
493 	} */
494 	struct proc *p = l->l_proc;
495 	ucontext32_t uc;
496 
497 	memset(&uc, 0, sizeof(uc));
498 
499 	mutex_enter(p->p_lock);
500 	getucontext32(l, &uc);
501 	mutex_exit(p->p_lock);
502 
503 	return copyout(&uc, SCARG_P32(uap, ucp), sizeof (ucontext32_t));
504 }
505 
506 int
setucontext32(struct lwp * l,const ucontext32_t * ucp)507 setucontext32(struct lwp *l, const ucontext32_t *ucp)
508 {
509 	struct proc *p = l->l_proc;
510 	int error;
511 
512 	KASSERT(mutex_owned(p->p_lock));
513 
514 	if ((ucp->uc_flags & _UC_SIGMASK) != 0) {
515 		error = sigprocmask1(l, SIG_SETMASK, &ucp->uc_sigmask, NULL);
516 		if (error != 0)
517 			return error;
518 	}
519 
520 	mutex_exit(p->p_lock);
521 	error = cpu_setmcontext32(l, &ucp->uc_mcontext, ucp->uc_flags);
522 	mutex_enter(p->p_lock);
523 	if (error != 0)
524 		return error;
525 
526 	l->l_ctxlink = (void *)(intptr_t)ucp->uc_link;
527 
528 	/*
529 	 * If there was stack information, update whether or not we are
530 	 * still running on an alternate signal stack.
531 	 */
532 	if ((ucp->uc_flags & _UC_STACK) != 0) {
533 		if (ucp->uc_stack.ss_flags & SS_ONSTACK)
534 			l->l_sigstk.ss_flags |= SS_ONSTACK;
535 		else
536 			l->l_sigstk.ss_flags &= ~SS_ONSTACK;
537 	}
538 
539 	return 0;
540 }
541 
542 /* ARGSUSED */
543 int
netbsd32_setcontext(struct lwp * l,const struct netbsd32_setcontext_args * uap,register_t * retval)544 netbsd32_setcontext(struct lwp *l, const struct netbsd32_setcontext_args *uap, register_t *retval)
545 {
546 	/* {
547 		syscallarg(netbsd32_ucontextp) ucp;
548 	} */
549 	ucontext32_t uc;
550 	int error;
551 	struct proc *p = l->l_proc;
552 
553 	error = copyin(SCARG_P32(uap, ucp), &uc, sizeof (uc));
554 	if (error)
555 		return error;
556 	if (!(uc.uc_flags & _UC_CPU))
557 		return EINVAL;
558 	mutex_enter(p->p_lock);
559 	error = setucontext32(l, &uc);
560 	mutex_exit(p->p_lock);
561 	if (error)
562 		return error;
563 
564 	return EJUSTRETURN;
565 }
566 
567 static int
netbsd32_sigtimedwait_put_info(const void * src,void * dst,size_t size)568 netbsd32_sigtimedwait_put_info(const void *src, void *dst, size_t size)
569 {
570 	const siginfo_t *info = src;
571 	siginfo32_t info32;
572 
573 	netbsd32_si_to_si32(&info32, info);
574 
575 	return copyout(&info32, dst, sizeof(info32));
576 }
577 
578 static int
netbsd32_sigtimedwait_fetch_timeout(const void * src,void * dst,size_t size)579 netbsd32_sigtimedwait_fetch_timeout(const void *src, void *dst, size_t size)
580 {
581 	struct timespec *ts = dst;
582 	struct netbsd32_timespec ts32;
583 	int error;
584 
585 	error = copyin(src, &ts32, sizeof(ts32));
586 	if (error)
587 		return error;
588 
589 	netbsd32_to_timespec(&ts32, ts);
590 	return 0;
591 }
592 
593 static int
netbsd32_sigtimedwait_put_timeout(const void * src,void * dst,size_t size)594 netbsd32_sigtimedwait_put_timeout(const void *src, void *dst, size_t size)
595 {
596 	const struct timespec *ts = src;
597 	struct netbsd32_timespec ts32;
598 
599 	netbsd32_from_timespec(ts, &ts32);
600 
601 	return copyout(&ts32, dst, sizeof(ts32));
602 }
603 
604 int
netbsd32_____sigtimedwait50(struct lwp * l,const struct netbsd32_____sigtimedwait50_args * uap,register_t * retval)605 netbsd32_____sigtimedwait50(struct lwp *l, const struct netbsd32_____sigtimedwait50_args *uap, register_t *retval)
606 {
607 	/* {
608 		syscallarg(netbsd32_sigsetp_t) set;
609 		syscallarg(netbsd32_siginfop_t) info;
610 		syscallarg(netbsd32_timespec50p_t) timeout;
611 	} */
612 	struct sys_____sigtimedwait50_args ua;
613 
614 	NETBSD32TOP_UAP(set, const sigset_t);
615 	NETBSD32TOP_UAP(info, siginfo_t);
616 	NETBSD32TOP_UAP(timeout, struct timespec);
617 
618 	return sigtimedwait1(l, &ua, retval,
619 	    copyin,
620 	    netbsd32_sigtimedwait_put_info,
621 	    netbsd32_sigtimedwait_fetch_timeout,
622 	    netbsd32_sigtimedwait_put_timeout);
623 }
624 
625 int
netbsd32_sigqueueinfo(struct lwp * l,const struct netbsd32_sigqueueinfo_args * uap,register_t * retval)626 netbsd32_sigqueueinfo(struct lwp *l,
627     const struct netbsd32_sigqueueinfo_args *uap, register_t *retval)
628 {
629 	/* {
630 		syscallarg(pid_t) pid;
631 		syscallarg(const netbsd32_siginfop_t) info;
632 	} */
633 	struct __ksiginfo32 ksi32;
634 	ksiginfo_t ksi;
635 	int error;
636 
637 	if ((error = copyin(SCARG_P32(uap, info), &ksi32,
638 	    sizeof(ksi32))) != 0)
639 		return error;
640 
641 	KSI_INIT(&ksi);
642 	netbsd32_ksi32_to_ksi(&ksi.ksi_info, &ksi32);
643 
644 	return kill1(l, SCARG(uap, pid), &ksi, retval);
645 }
646 
647 struct netbsd32_ktr_psig {
648 	int			signo;
649 	netbsd32_pointer_t	action;
650 	sigset_t		mask;
651 	int			code;
652 	/* and optional siginfo_t */
653 };
654 
655 #ifdef notyet
656 #ifdef KTRACE
657 void
netbsd32_ktrpsig(int sig,sig_t action,const sigset_t * mask,const ksiginfo_t * ksi)658 netbsd32_ktrpsig(int sig, sig_t action, const sigset_t *mask,
659 	 const ksiginfo_t *ksi)
660 {
661 	struct ktrace_entry *kte;
662 	lwp_t *l = curlwp;
663 	struct {
664 		struct netbsd32_ktr_psig	kp;
665 		siginfo32_t			si;
666 	} *kbuf;
667 
668 	if (!KTRPOINT(l->l_proc, KTR_PSIG))
669 		return;
670 
671 	if (ktealloc(&kte, (void *)&kbuf, l, KTR_PSIG, sizeof(*kbuf)))
672 		return;
673 
674 	kbuf->kp.signo = (char)sig;
675 	NETBSD32PTR32(kbuf->kp.action, action);
676 	kbuf->kp.mask = *mask;
677 
678 	if (ksi) {
679 		kbuf->kp.code = KSI_TRAPCODE(ksi);
680 		(void)memset(&kbuf->si, 0, sizeof(kbuf->si));
681 		netbsd32_ksi_to_ksi32(&kbuf->si._info, &ksi->ksi_info);
682 		ktesethdrlen(kte, sizeof(*kbuf));
683 	} else {
684 		kbuf->kp.code = 0;
685 		ktesethdrlen(kte, sizeof(struct netbsd32_ktr_psig));
686 	}
687 
688 	ktraddentry(l, kte, KTA_WAITOK);
689 }
690 #endif
691 #endif
692