xref: /freebsd/sys/compat/linux/linux_signal.c (revision a3557ef0)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 1994-1995 Søren Schmidt
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
31 
32 #include <sys/param.h>
33 #include <sys/systm.h>
34 #include <sys/lock.h>
35 #include <sys/mutex.h>
36 #include <sys/sx.h>
37 #include <sys/proc.h>
38 #include <sys/signalvar.h>
39 #include <sys/syscallsubr.h>
40 #include <sys/sysproto.h>
41 
42 #include <security/audit/audit.h>
43 
44 #include "opt_compat.h"
45 
46 #ifdef COMPAT_LINUX32
47 #include <machine/../linux32/linux.h>
48 #include <machine/../linux32/linux32_proto.h>
49 #else
50 #include <machine/../linux/linux.h>
51 #include <machine/../linux/linux_proto.h>
52 #endif
53 #include <compat/linux/linux_signal.h>
54 #include <compat/linux/linux_util.h>
55 #include <compat/linux/linux_emul.h>
56 #include <compat/linux/linux_misc.h>
57 
58 static int	linux_do_tkill(struct thread *td, struct thread *tdt,
59 		    ksiginfo_t *ksi);
60 static void	sicode_to_lsicode(int si_code, int *lsi_code);
61 
62 
63 static void
64 linux_to_bsd_sigaction(l_sigaction_t *lsa, struct sigaction *bsa)
65 {
66 
67 	linux_to_bsd_sigset(&lsa->lsa_mask, &bsa->sa_mask);
68 	bsa->sa_handler = PTRIN(lsa->lsa_handler);
69 	bsa->sa_flags = 0;
70 	if (lsa->lsa_flags & LINUX_SA_NOCLDSTOP)
71 		bsa->sa_flags |= SA_NOCLDSTOP;
72 	if (lsa->lsa_flags & LINUX_SA_NOCLDWAIT)
73 		bsa->sa_flags |= SA_NOCLDWAIT;
74 	if (lsa->lsa_flags & LINUX_SA_SIGINFO)
75 		bsa->sa_flags |= SA_SIGINFO;
76 	if (lsa->lsa_flags & LINUX_SA_ONSTACK)
77 		bsa->sa_flags |= SA_ONSTACK;
78 	if (lsa->lsa_flags & LINUX_SA_RESTART)
79 		bsa->sa_flags |= SA_RESTART;
80 	if (lsa->lsa_flags & LINUX_SA_ONESHOT)
81 		bsa->sa_flags |= SA_RESETHAND;
82 	if (lsa->lsa_flags & LINUX_SA_NOMASK)
83 		bsa->sa_flags |= SA_NODEFER;
84 }
85 
86 static void
87 bsd_to_linux_sigaction(struct sigaction *bsa, l_sigaction_t *lsa)
88 {
89 
90 	bsd_to_linux_sigset(&bsa->sa_mask, &lsa->lsa_mask);
91 #ifdef COMPAT_LINUX32
92 	lsa->lsa_handler = (uintptr_t)bsa->sa_handler;
93 #else
94 	lsa->lsa_handler = bsa->sa_handler;
95 #endif
96 	lsa->lsa_restorer = 0;		/* unsupported */
97 	lsa->lsa_flags = 0;
98 	if (bsa->sa_flags & SA_NOCLDSTOP)
99 		lsa->lsa_flags |= LINUX_SA_NOCLDSTOP;
100 	if (bsa->sa_flags & SA_NOCLDWAIT)
101 		lsa->lsa_flags |= LINUX_SA_NOCLDWAIT;
102 	if (bsa->sa_flags & SA_SIGINFO)
103 		lsa->lsa_flags |= LINUX_SA_SIGINFO;
104 	if (bsa->sa_flags & SA_ONSTACK)
105 		lsa->lsa_flags |= LINUX_SA_ONSTACK;
106 	if (bsa->sa_flags & SA_RESTART)
107 		lsa->lsa_flags |= LINUX_SA_RESTART;
108 	if (bsa->sa_flags & SA_RESETHAND)
109 		lsa->lsa_flags |= LINUX_SA_ONESHOT;
110 	if (bsa->sa_flags & SA_NODEFER)
111 		lsa->lsa_flags |= LINUX_SA_NOMASK;
112 }
113 
114 int
115 linux_do_sigaction(struct thread *td, int linux_sig, l_sigaction_t *linux_nsa,
116 		   l_sigaction_t *linux_osa)
117 {
118 	struct sigaction act, oact, *nsa, *osa;
119 	int error, sig;
120 
121 	if (!LINUX_SIG_VALID(linux_sig))
122 		return (EINVAL);
123 
124 	osa = (linux_osa != NULL) ? &oact : NULL;
125 	if (linux_nsa != NULL) {
126 		nsa = &act;
127 		linux_to_bsd_sigaction(linux_nsa, nsa);
128 	} else
129 		nsa = NULL;
130 	sig = linux_to_bsd_signal(linux_sig);
131 
132 	error = kern_sigaction(td, sig, nsa, osa, 0);
133 	if (error)
134 		return (error);
135 
136 	if (linux_osa != NULL)
137 		bsd_to_linux_sigaction(osa, linux_osa);
138 
139 	return (0);
140 }
141 
142 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32))
143 int
144 linux_signal(struct thread *td, struct linux_signal_args *args)
145 {
146 	l_sigaction_t nsa, osa;
147 	int error;
148 
149 	nsa.lsa_handler = args->handler;
150 	nsa.lsa_flags = LINUX_SA_ONESHOT | LINUX_SA_NOMASK;
151 	LINUX_SIGEMPTYSET(nsa.lsa_mask);
152 
153 	error = linux_do_sigaction(td, args->sig, &nsa, &osa);
154 	td->td_retval[0] = (int)(intptr_t)osa.lsa_handler;
155 
156 	return (error);
157 }
158 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */
159 
160 int
161 linux_rt_sigaction(struct thread *td, struct linux_rt_sigaction_args *args)
162 {
163 	l_sigaction_t nsa, osa;
164 	int error;
165 
166 	if (args->sigsetsize != sizeof(l_sigset_t))
167 		return (EINVAL);
168 
169 	if (args->act != NULL) {
170 		error = copyin(args->act, &nsa, sizeof(l_sigaction_t));
171 		if (error)
172 			return (error);
173 	}
174 
175 	error = linux_do_sigaction(td, args->sig,
176 				   args->act ? &nsa : NULL,
177 				   args->oact ? &osa : NULL);
178 
179 	if (args->oact != NULL && !error) {
180 		error = copyout(&osa, args->oact, sizeof(l_sigaction_t));
181 	}
182 
183 	return (error);
184 }
185 
186 static int
187 linux_do_sigprocmask(struct thread *td, int how, l_sigset_t *new,
188 		     l_sigset_t *old)
189 {
190 	sigset_t omask, nmask;
191 	sigset_t *nmaskp;
192 	int error;
193 
194 	td->td_retval[0] = 0;
195 
196 	switch (how) {
197 	case LINUX_SIG_BLOCK:
198 		how = SIG_BLOCK;
199 		break;
200 	case LINUX_SIG_UNBLOCK:
201 		how = SIG_UNBLOCK;
202 		break;
203 	case LINUX_SIG_SETMASK:
204 		how = SIG_SETMASK;
205 		break;
206 	default:
207 		return (EINVAL);
208 	}
209 	if (new != NULL) {
210 		linux_to_bsd_sigset(new, &nmask);
211 		nmaskp = &nmask;
212 	} else
213 		nmaskp = NULL;
214 	error = kern_sigprocmask(td, how, nmaskp, &omask, 0);
215 	if (error == 0 && old != NULL)
216 		bsd_to_linux_sigset(&omask, old);
217 
218 	return (error);
219 }
220 
221 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32))
222 int
223 linux_sigprocmask(struct thread *td, struct linux_sigprocmask_args *args)
224 {
225 	l_osigset_t mask;
226 	l_sigset_t set, oset;
227 	int error;
228 
229 	if (args->mask != NULL) {
230 		error = copyin(args->mask, &mask, sizeof(l_osigset_t));
231 		if (error)
232 			return (error);
233 		LINUX_SIGEMPTYSET(set);
234 		set.__mask = mask;
235 	}
236 
237 	error = linux_do_sigprocmask(td, args->how,
238 				     args->mask ? &set : NULL,
239 				     args->omask ? &oset : NULL);
240 
241 	if (args->omask != NULL && !error) {
242 		mask = oset.__mask;
243 		error = copyout(&mask, args->omask, sizeof(l_osigset_t));
244 	}
245 
246 	return (error);
247 }
248 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */
249 
250 int
251 linux_rt_sigprocmask(struct thread *td, struct linux_rt_sigprocmask_args *args)
252 {
253 	l_sigset_t set, oset;
254 	int error;
255 
256 	if (args->sigsetsize != sizeof(l_sigset_t))
257 		return (EINVAL);
258 
259 	if (args->mask != NULL) {
260 		error = copyin(args->mask, &set, sizeof(l_sigset_t));
261 		if (error)
262 			return (error);
263 	}
264 
265 	error = linux_do_sigprocmask(td, args->how,
266 				     args->mask ? &set : NULL,
267 				     args->omask ? &oset : NULL);
268 
269 	if (args->omask != NULL && !error) {
270 		error = copyout(&oset, args->omask, sizeof(l_sigset_t));
271 	}
272 
273 	return (error);
274 }
275 
276 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32))
277 int
278 linux_sgetmask(struct thread *td, struct linux_sgetmask_args *args)
279 {
280 	struct proc *p = td->td_proc;
281 	l_sigset_t mask;
282 
283 	PROC_LOCK(p);
284 	bsd_to_linux_sigset(&td->td_sigmask, &mask);
285 	PROC_UNLOCK(p);
286 	td->td_retval[0] = mask.__mask;
287 	return (0);
288 }
289 
290 int
291 linux_ssetmask(struct thread *td, struct linux_ssetmask_args *args)
292 {
293 	struct proc *p = td->td_proc;
294 	l_sigset_t lset;
295 	sigset_t bset;
296 
297 	PROC_LOCK(p);
298 	bsd_to_linux_sigset(&td->td_sigmask, &lset);
299 	td->td_retval[0] = lset.__mask;
300 	LINUX_SIGEMPTYSET(lset);
301 	lset.__mask = args->mask;
302 	linux_to_bsd_sigset(&lset, &bset);
303 	td->td_sigmask = bset;
304 	SIG_CANTMASK(td->td_sigmask);
305 	signotify(td);
306 	PROC_UNLOCK(p);
307 	return (0);
308 }
309 
310 int
311 linux_sigpending(struct thread *td, struct linux_sigpending_args *args)
312 {
313 	struct proc *p = td->td_proc;
314 	sigset_t bset;
315 	l_sigset_t lset;
316 	l_osigset_t mask;
317 
318 	PROC_LOCK(p);
319 	bset = p->p_siglist;
320 	SIGSETOR(bset, td->td_siglist);
321 	SIGSETAND(bset, td->td_sigmask);
322 	PROC_UNLOCK(p);
323 	bsd_to_linux_sigset(&bset, &lset);
324 	mask = lset.__mask;
325 	return (copyout(&mask, args->mask, sizeof(mask)));
326 }
327 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */
328 
329 /*
330  * MPSAFE
331  */
332 int
333 linux_rt_sigpending(struct thread *td, struct linux_rt_sigpending_args *args)
334 {
335 	struct proc *p = td->td_proc;
336 	sigset_t bset;
337 	l_sigset_t lset;
338 
339 	if (args->sigsetsize > sizeof(lset))
340 		return (EINVAL);
341 		/* NOT REACHED */
342 
343 	PROC_LOCK(p);
344 	bset = p->p_siglist;
345 	SIGSETOR(bset, td->td_siglist);
346 	SIGSETAND(bset, td->td_sigmask);
347 	PROC_UNLOCK(p);
348 	bsd_to_linux_sigset(&bset, &lset);
349 	return (copyout(&lset, args->set, args->sigsetsize));
350 }
351 
352 /*
353  * MPSAFE
354  */
355 int
356 linux_rt_sigtimedwait(struct thread *td,
357 	struct linux_rt_sigtimedwait_args *args)
358 {
359 	int error, sig;
360 	l_timeval ltv;
361 	struct timeval tv;
362 	struct timespec ts, *tsa;
363 	l_sigset_t lset;
364 	sigset_t bset;
365 	l_siginfo_t linfo;
366 	ksiginfo_t info;
367 
368 	if (args->sigsetsize != sizeof(l_sigset_t))
369 		return (EINVAL);
370 
371 	if ((error = copyin(args->mask, &lset, sizeof(lset))))
372 		return (error);
373 	linux_to_bsd_sigset(&lset, &bset);
374 
375 	tsa = NULL;
376 	if (args->timeout) {
377 		if ((error = copyin(args->timeout, &ltv, sizeof(ltv))))
378 			return (error);
379 		tv.tv_sec = (long)ltv.tv_sec;
380 		tv.tv_usec = (suseconds_t)ltv.tv_usec;
381 		if (itimerfix(&tv)) {
382 			/*
383 			 * The timeout was invalid. Convert it to something
384 			 * valid that will act as it does under Linux.
385 			 */
386 			tv.tv_sec += tv.tv_usec / 1000000;
387 			tv.tv_usec %= 1000000;
388 			if (tv.tv_usec < 0) {
389 				tv.tv_sec -= 1;
390 				tv.tv_usec += 1000000;
391 			}
392 			if (tv.tv_sec < 0)
393 				timevalclear(&tv);
394 		}
395 		TIMEVAL_TO_TIMESPEC(&tv, &ts);
396 		tsa = &ts;
397 	}
398 	error = kern_sigtimedwait(td, bset, &info, tsa);
399 	if (error)
400 		return (error);
401 
402 	sig = bsd_to_linux_signal(info.ksi_signo);
403 
404 	if (args->ptr) {
405 		memset(&linfo, 0, sizeof(linfo));
406 		ksiginfo_to_lsiginfo(&info, &linfo, sig);
407 		error = copyout(&linfo, args->ptr, sizeof(linfo));
408 	}
409 	if (error == 0)
410 		td->td_retval[0] = sig;
411 
412 	return (error);
413 }
414 
415 int
416 linux_kill(struct thread *td, struct linux_kill_args *args)
417 {
418 	int l_signum;
419 
420 	/*
421 	 * Allow signal 0 as a means to check for privileges
422 	 */
423 	if (!LINUX_SIG_VALID(args->signum) && args->signum != 0)
424 		return (EINVAL);
425 
426 	if (args->signum > 0)
427 		l_signum = linux_to_bsd_signal(args->signum);
428 	else
429 		l_signum = 0;
430 
431 	return (kern_kill(td, args->pid, l_signum));
432 }
433 
434 static int
435 linux_do_tkill(struct thread *td, struct thread *tdt, ksiginfo_t *ksi)
436 {
437 	struct proc *p;
438 	int error;
439 
440 	p = tdt->td_proc;
441 	AUDIT_ARG_SIGNUM(ksi->ksi_signo);
442 	AUDIT_ARG_PID(p->p_pid);
443 	AUDIT_ARG_PROCESS(p);
444 
445 	error = p_cansignal(td, p, ksi->ksi_signo);
446 	if (error != 0 || ksi->ksi_signo == 0)
447 		goto out;
448 
449 	tdksignal(tdt, ksi->ksi_signo, ksi);
450 
451 out:
452 	PROC_UNLOCK(p);
453 	return (error);
454 }
455 
456 int
457 linux_tgkill(struct thread *td, struct linux_tgkill_args *args)
458 {
459 	struct thread *tdt;
460 	ksiginfo_t ksi;
461 	int sig;
462 
463 	if (args->pid <= 0 || args->tgid <=0)
464 		return (EINVAL);
465 
466 	/*
467 	 * Allow signal 0 as a means to check for privileges
468 	 */
469 	if (!LINUX_SIG_VALID(args->sig) && args->sig != 0)
470 		return (EINVAL);
471 
472 	if (args->sig > 0)
473 		sig = linux_to_bsd_signal(args->sig);
474 	else
475 		sig = 0;
476 
477 	tdt = linux_tdfind(td, args->pid, args->tgid);
478 	if (tdt == NULL)
479 		return (ESRCH);
480 
481 	ksiginfo_init(&ksi);
482 	ksi.ksi_signo = sig;
483 	ksi.ksi_code = SI_LWP;
484 	ksi.ksi_errno = 0;
485 	ksi.ksi_pid = td->td_proc->p_pid;
486 	ksi.ksi_uid = td->td_proc->p_ucred->cr_ruid;
487 	return (linux_do_tkill(td, tdt, &ksi));
488 }
489 
490 /*
491  * Deprecated since 2.5.75. Replaced by tgkill().
492  */
493 int
494 linux_tkill(struct thread *td, struct linux_tkill_args *args)
495 {
496 	struct thread *tdt;
497 	ksiginfo_t ksi;
498 	int sig;
499 
500 	if (args->tid <= 0)
501 		return (EINVAL);
502 
503 	if (!LINUX_SIG_VALID(args->sig))
504 		return (EINVAL);
505 
506 	sig = linux_to_bsd_signal(args->sig);
507 
508 	tdt = linux_tdfind(td, args->tid, -1);
509 	if (tdt == NULL)
510 		return (ESRCH);
511 
512 	ksiginfo_init(&ksi);
513 	ksi.ksi_signo = sig;
514 	ksi.ksi_code = SI_LWP;
515 	ksi.ksi_errno = 0;
516 	ksi.ksi_pid = td->td_proc->p_pid;
517 	ksi.ksi_uid = td->td_proc->p_ucred->cr_ruid;
518 	return (linux_do_tkill(td, tdt, &ksi));
519 }
520 
521 void
522 ksiginfo_to_lsiginfo(const ksiginfo_t *ksi, l_siginfo_t *lsi, l_int sig)
523 {
524 
525 	siginfo_to_lsiginfo(&ksi->ksi_info, lsi, sig);
526 }
527 
528 static void
529 sicode_to_lsicode(int si_code, int *lsi_code)
530 {
531 
532 	switch (si_code) {
533 	case SI_USER:
534 		*lsi_code = LINUX_SI_USER;
535 		break;
536 	case SI_KERNEL:
537 		*lsi_code = LINUX_SI_KERNEL;
538 		break;
539 	case SI_QUEUE:
540 		*lsi_code = LINUX_SI_QUEUE;
541 		break;
542 	case SI_TIMER:
543 		*lsi_code = LINUX_SI_TIMER;
544 		break;
545 	case SI_MESGQ:
546 		*lsi_code = LINUX_SI_MESGQ;
547 		break;
548 	case SI_ASYNCIO:
549 		*lsi_code = LINUX_SI_ASYNCIO;
550 		break;
551 	case SI_LWP:
552 		*lsi_code = LINUX_SI_TKILL;
553 		break;
554 	default:
555 		*lsi_code = si_code;
556 		break;
557 	}
558 }
559 
560 void
561 siginfo_to_lsiginfo(const siginfo_t *si, l_siginfo_t *lsi, l_int sig)
562 {
563 
564 	/* sig alredy converted */
565 	lsi->lsi_signo = sig;
566 	sicode_to_lsicode(si->si_code, &lsi->lsi_code);
567 
568 	switch (si->si_code) {
569 	case SI_LWP:
570 		lsi->lsi_pid = si->si_pid;
571 		lsi->lsi_uid = si->si_uid;
572 		break;
573 
574 	case SI_TIMER:
575 		lsi->lsi_int = si->si_value.sival_int;
576 		lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
577 		lsi->lsi_tid = si->si_timerid;
578 		break;
579 
580 	case SI_QUEUE:
581 		lsi->lsi_pid = si->si_pid;
582 		lsi->lsi_uid = si->si_uid;
583 		lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
584 		break;
585 
586 	case SI_ASYNCIO:
587 		lsi->lsi_int = si->si_value.sival_int;
588 		lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
589 		break;
590 
591 	default:
592 		switch (sig) {
593 		case LINUX_SIGPOLL:
594 			/* XXX si_fd? */
595 			lsi->lsi_band = si->si_band;
596 			break;
597 
598 		case LINUX_SIGCHLD:
599 			lsi->lsi_errno = 0;
600 			lsi->lsi_pid = si->si_pid;
601 			lsi->lsi_uid = si->si_uid;
602 
603 			if (si->si_code == CLD_STOPPED)
604 				lsi->lsi_status = bsd_to_linux_signal(si->si_status);
605 			else if (si->si_code == CLD_CONTINUED)
606 				lsi->lsi_status = bsd_to_linux_signal(SIGCONT);
607 			else
608 				lsi->lsi_status = si->si_status;
609 			break;
610 
611 		case LINUX_SIGBUS:
612 		case LINUX_SIGILL:
613 		case LINUX_SIGFPE:
614 		case LINUX_SIGSEGV:
615 			lsi->lsi_addr = PTROUT(si->si_addr);
616 			break;
617 
618 		default:
619 			lsi->lsi_pid = si->si_pid;
620 			lsi->lsi_uid = si->si_uid;
621 			if (sig >= LINUX_SIGRTMIN) {
622 				lsi->lsi_int = si->si_value.sival_int;
623 				lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
624 			}
625 			break;
626 		}
627 		break;
628 	}
629 }
630 
631 void
632 lsiginfo_to_ksiginfo(const l_siginfo_t *lsi, ksiginfo_t *ksi, int sig)
633 {
634 
635 	ksi->ksi_signo = sig;
636 	ksi->ksi_code = lsi->lsi_code;	/* XXX. Convert. */
637 	ksi->ksi_pid = lsi->lsi_pid;
638 	ksi->ksi_uid = lsi->lsi_uid;
639 	ksi->ksi_status = lsi->lsi_status;
640 	ksi->ksi_addr = PTRIN(lsi->lsi_addr);
641 	ksi->ksi_info.si_value.sival_int = lsi->lsi_int;
642 }
643 
644 int
645 linux_rt_sigqueueinfo(struct thread *td, struct linux_rt_sigqueueinfo_args *args)
646 {
647 	l_siginfo_t linfo;
648 	struct proc *p;
649 	ksiginfo_t ksi;
650 	int error;
651 	int sig;
652 
653 	if (!LINUX_SIG_VALID(args->sig))
654 		return (EINVAL);
655 
656 	error = copyin(args->info, &linfo, sizeof(linfo));
657 	if (error != 0)
658 		return (error);
659 
660 	if (linfo.lsi_code >= 0)
661 		return (EPERM);
662 
663 	sig = linux_to_bsd_signal(args->sig);
664 
665 	error = ESRCH;
666 	if ((p = pfind_any(args->pid)) != NULL) {
667 		error = p_cansignal(td, p, sig);
668 		if (error != 0) {
669 			PROC_UNLOCK(p);
670 			return (error);
671 		}
672 
673 		ksiginfo_init(&ksi);
674 		lsiginfo_to_ksiginfo(&linfo, &ksi, sig);
675 		error = tdsendsignal(p, NULL, sig, &ksi);
676 		PROC_UNLOCK(p);
677 	}
678 
679 	return (error);
680 }
681 
682 int
683 linux_rt_tgsigqueueinfo(struct thread *td, struct linux_rt_tgsigqueueinfo_args *args)
684 {
685 	l_siginfo_t linfo;
686 	struct thread *tds;
687 	ksiginfo_t ksi;
688 	int error;
689 	int sig;
690 
691 	if (!LINUX_SIG_VALID(args->sig))
692 		return (EINVAL);
693 
694 	error = copyin(args->uinfo, &linfo, sizeof(linfo));
695 	if (error != 0)
696 		return (error);
697 
698 	if (linfo.lsi_code >= 0)
699 		return (EPERM);
700 
701 	tds = linux_tdfind(td, args->tid, args->tgid);
702 	if (tds == NULL)
703 		return (ESRCH);
704 
705 	sig = linux_to_bsd_signal(args->sig);
706 	ksiginfo_init(&ksi);
707 	lsiginfo_to_ksiginfo(&linfo, &ksi, sig);
708 	return (linux_do_tkill(td, tds, &ksi));
709 }
710