X-Git-Url: http://nsz.repo.hu/git/?a=blobdiff_plain;f=src%2Fsignal%2Fsigaction.c;h=d5f47741370e1b352b300a9ec690dd0153fe60cc;hb=78a8ef47c4d92b7680c52a85f80a81e29da86bb9;hp=e0c58b734e9d22c3fa37682aaa85bee84ccabe89;hpb=cd8d72451662f0157d06fcf666669db543dcea3b;p=musl diff --git a/src/signal/sigaction.c b/src/signal/sigaction.c index e0c58b73..d5f47741 100644 --- a/src/signal/sigaction.c +++ b/src/signal/sigaction.c @@ -1,6 +1,6 @@ -#include #include #include +#include #include "syscall.h" #include "pthread_impl.h" #include "libc.h" @@ -8,30 +8,56 @@ void __restore(), __restore_rt(); -static pthread_t dummy(void) { return 0; } -weak_alias(dummy, __pthread_self_def); +static int unmask_done; +static unsigned long handler_set[_NSIG/(8*sizeof(long))]; -int __libc_sigaction(int sig, const struct sigaction *sa, struct sigaction *old) +void __get_handler_set(sigset_t *set) { - struct k_sigaction ksa; + memcpy(set, handler_set, sizeof handler_set); +} + +int __libc_sigaction(int sig, const struct sigaction *restrict sa, struct sigaction *restrict old) +{ + struct k_sigaction ksa, ksa_old; + if (sig >= (unsigned)_NSIG) { + errno = EINVAL; + return -1; + } if (sa) { + if ((uintptr_t)sa->sa_handler > 1UL) { + a_or_l(handler_set+(sig-1)/(8*sizeof(long)), + 1UL<<(sig-1)%(8*sizeof(long))); + + /* If pthread_create has not yet been called, + * implementation-internal signals might not + * yet have been unblocked. They must be + * unblocked before any signal handler is + * installed, so that an application cannot + * receive an illegal sigset_t (with them + * blocked) as part of the ucontext_t passed + * to the signal handler. */ + if (!libc.threaded && !unmask_done) { + __syscall(SYS_rt_sigprocmask, SIG_UNBLOCK, + SIGPT_SET, 0, _NSIG/8); + unmask_done = 1; + } + } ksa.handler = sa->sa_handler; ksa.flags = sa->sa_flags | SA_RESTORER; ksa.restorer = (sa->sa_flags & SA_SIGINFO) ? __restore_rt : __restore; memcpy(&ksa.mask, &sa->sa_mask, sizeof ksa.mask); } - __pthread_self_def(); - if (syscall(SYS_rt_sigaction, sig, sa?&ksa:0, old?&ksa:0, sizeof ksa.mask)) + if (syscall(SYS_rt_sigaction, sig, sa?&ksa:0, old?&ksa_old:0, sizeof ksa.mask)) return -1; if (old) { - old->sa_handler = ksa.handler; - old->sa_flags = ksa.flags; - memcpy(&old->sa_mask, &ksa.mask, sizeof ksa.mask); + old->sa_handler = ksa_old.handler; + old->sa_flags = ksa_old.flags; + memcpy(&old->sa_mask, &ksa_old.mask, sizeof ksa_old.mask); } return 0; } -int __sigaction(int sig, const struct sigaction *sa, struct sigaction *old) +int __sigaction(int sig, const struct sigaction *restrict sa, struct sigaction *restrict old) { if (sig-32U < 3) { errno = EINVAL;