xref: /freebsd/sys/kern/kern_sig.c (revision 10c2b8e128c2e131c2378f7e60acf73988a11444)
19454b2d8SWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1989, 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  * (c) UNIX System Laboratories, Inc.
5df8bae1dSRodney W. Grimes  * All or some portions of this file are derived from material licensed
6df8bae1dSRodney W. Grimes  * to the University of California by American Telephone and Telegraph
7df8bae1dSRodney W. Grimes  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8df8bae1dSRodney W. Grimes  * the permission of UNIX System Laboratories, Inc.
9df8bae1dSRodney W. Grimes  *
10df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
11df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
12df8bae1dSRodney W. Grimes  * are met:
13df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
15df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
16df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
17df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
18df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
19df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
20df8bae1dSRodney W. Grimes  *    without specific prior written permission.
21df8bae1dSRodney W. Grimes  *
22df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
33df8bae1dSRodney W. Grimes  *
34df8bae1dSRodney W. Grimes  *	@(#)kern_sig.c	8.7 (Berkeley) 4/18/94
35df8bae1dSRodney W. Grimes  */
36df8bae1dSRodney W. Grimes 
37677b542eSDavid E. O'Brien #include <sys/cdefs.h>
38677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$");
39677b542eSDavid E. O'Brien 
405591b823SEivind Eklund #include "opt_compat.h"
41db6a20e2SGarrett Wollman #include "opt_ktrace.h"
42db6a20e2SGarrett Wollman 
43df8bae1dSRodney W. Grimes #include <sys/param.h>
4436240ea5SDoug Rabson #include <sys/systm.h>
45df8bae1dSRodney W. Grimes #include <sys/signalvar.h>
46df8bae1dSRodney W. Grimes #include <sys/vnode.h>
47df8bae1dSRodney W. Grimes #include <sys/acct.h>
48238510fcSJason Evans #include <sys/condvar.h>
49854dc8c2SJohn Baldwin #include <sys/event.h>
50854dc8c2SJohn Baldwin #include <sys/fcntl.h>
51854dc8c2SJohn Baldwin #include <sys/kernel.h>
529dde3bc9SDavid Xu #include <sys/kse.h>
530384fff8SJason Evans #include <sys/ktr.h>
54df8bae1dSRodney W. Grimes #include <sys/ktrace.h>
55854dc8c2SJohn Baldwin #include <sys/lock.h>
56854dc8c2SJohn Baldwin #include <sys/malloc.h>
57854dc8c2SJohn Baldwin #include <sys/mutex.h>
58854dc8c2SJohn Baldwin #include <sys/namei.h>
59854dc8c2SJohn Baldwin #include <sys/proc.h>
606aeb05d7STom Rhodes #include <sys/posix4.h>
61854dc8c2SJohn Baldwin #include <sys/pioctl.h>
62c31146a1SJohn Baldwin #include <sys/resourcevar.h>
6344f3b092SJohn Baldwin #include <sys/sleepqueue.h>
646caa8a15SJohn Baldwin #include <sys/smp.h>
65df8bae1dSRodney W. Grimes #include <sys/stat.h>
661005a129SJohn Baldwin #include <sys/sx.h>
678f19eb88SIan Dowse #include <sys/syscallsubr.h>
68c87e2930SDavid Greenman #include <sys/sysctl.h>
69854dc8c2SJohn Baldwin #include <sys/sysent.h>
70854dc8c2SJohn Baldwin #include <sys/syslog.h>
71854dc8c2SJohn Baldwin #include <sys/sysproto.h>
7256c06c4bSDavid Xu #include <sys/timers.h>
7306ae1e91SMatthew Dillon #include <sys/unistd.h>
74854dc8c2SJohn Baldwin #include <sys/wait.h>
759104847fSDavid Xu #include <vm/vm.h>
769104847fSDavid Xu #include <vm/vm_extern.h>
779104847fSDavid Xu #include <vm/uma.h>
78df8bae1dSRodney W. Grimes 
79df8bae1dSRodney W. Grimes #include <machine/cpu.h>
80df8bae1dSRodney W. Grimes 
81bfd7575aSWayne Salamon #include <security/audit/audit.h>
82bfd7575aSWayne Salamon 
836f841fb7SMarcel Moolenaar #define	ONSIG	32		/* NSIG for osig* syscalls.  XXX. */
846f841fb7SMarcel Moolenaar 
854d77a549SAlfred Perlstein static int	coredump(struct thread *);
864d77a549SAlfred Perlstein static char	*expand_name(const char *, uid_t, pid_t);
871a88a252SMaxim Sobolev static int	killpg1(struct thread *td, int sig, int pgid, int all);
886711f10fSJohn Baldwin static int	issignal(struct thread *p);
894d77a549SAlfred Perlstein static int	sigprop(int sig);
9094f0972bSDavid Xu static void	tdsigwakeup(struct thread *, int, sig_t, int);
91d8267df7SDavid Xu static void	sig_suspend_threads(struct thread *, struct proc *, int);
92cb679c38SJonathan Lemon static int	filt_sigattach(struct knote *kn);
93cb679c38SJonathan Lemon static void	filt_sigdetach(struct knote *kn);
94cb679c38SJonathan Lemon static int	filt_signal(struct knote *kn, long hint);
954093529dSJeff Roberson static struct thread *sigtd(struct proc *p, int sig, int prop);
968460a577SJohn Birrell #ifdef KSE
976d7b314bSDavid Xu static int	do_tdsignal(struct proc *, struct thread *, int, ksiginfo_t *);
988460a577SJohn Birrell #endif
999104847fSDavid Xu static void	sigqueue_start(void);
100cb679c38SJonathan Lemon 
1019104847fSDavid Xu static uma_zone_t	ksiginfo_zone = NULL;
102cb679c38SJonathan Lemon struct filterops sig_filtops =
103cb679c38SJonathan Lemon 	{ 0, filt_sigattach, filt_sigdetach, filt_signal };
104cb679c38SJonathan Lemon 
10589b57fcfSKonstantin Belousov int	kern_logsigexit = 1;
1063d177f46SBill Fumerola SYSCTL_INT(_kern, KERN_LOGSIGEXIT, logsigexit, CTLFLAG_RW,
1073d177f46SBill Fumerola     &kern_logsigexit, 0,
1083d177f46SBill Fumerola     "Log processes quitting on abnormal signals to syslog(3)");
10957308494SJoerg Wunsch 
110f71a882fSDavid Xu static int	kern_forcesigexit = 1;
111f71a882fSDavid Xu SYSCTL_INT(_kern, OID_AUTO, forcesigexit, CTLFLAG_RW,
112f71a882fSDavid Xu     &kern_forcesigexit, 0, "Force trap signal to be handled");
113f71a882fSDavid Xu 
1149104847fSDavid Xu SYSCTL_NODE(_kern, OID_AUTO, sigqueue, CTLFLAG_RW, 0, "POSIX real time signal");
1159104847fSDavid Xu 
1169104847fSDavid Xu static int	max_pending_per_proc = 128;
1179104847fSDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, max_pending_per_proc, CTLFLAG_RW,
1189104847fSDavid Xu     &max_pending_per_proc, 0, "Max pending signals per proc");
1199104847fSDavid Xu 
1209104847fSDavid Xu static int	preallocate_siginfo = 1024;
1219104847fSDavid Xu TUNABLE_INT("kern.sigqueue.preallocate", &preallocate_siginfo);
1229104847fSDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, preallocate, CTLFLAG_RD,
1239104847fSDavid Xu     &preallocate_siginfo, 0, "Preallocated signal memory size");
1249104847fSDavid Xu 
1259104847fSDavid Xu static int	signal_overflow = 0;
126761a4d94SDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, overflow, CTLFLAG_RD,
1279104847fSDavid Xu     &signal_overflow, 0, "Number of signals overflew");
1289104847fSDavid Xu 
1299104847fSDavid Xu static int	signal_alloc_fail = 0;
130761a4d94SDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, alloc_fail, CTLFLAG_RD,
1319104847fSDavid Xu     &signal_alloc_fail, 0, "signals failed to be allocated");
1329104847fSDavid Xu 
1339104847fSDavid Xu SYSINIT(signal, SI_SUB_P1003_1B, SI_ORDER_FIRST+3, sigqueue_start, NULL);
1349104847fSDavid Xu 
1352b87b6d4SRobert Watson /*
1362b87b6d4SRobert Watson  * Policy -- Can ucred cr1 send SIGIO to process cr2?
1372b87b6d4SRobert Watson  * Should use cr_cansignal() once cr_cansignal() allows SIGIO and SIGURG
1382b87b6d4SRobert Watson  * in the right situations.
1392b87b6d4SRobert Watson  */
1402b87b6d4SRobert Watson #define CANSIGIO(cr1, cr2) \
1412b87b6d4SRobert Watson 	((cr1)->cr_uid == 0 || \
1422b87b6d4SRobert Watson 	    (cr1)->cr_ruid == (cr2)->cr_ruid || \
1432b87b6d4SRobert Watson 	    (cr1)->cr_uid == (cr2)->cr_ruid || \
1442b87b6d4SRobert Watson 	    (cr1)->cr_ruid == (cr2)->cr_uid || \
1452b87b6d4SRobert Watson 	    (cr1)->cr_uid == (cr2)->cr_uid)
1462b87b6d4SRobert Watson 
14722d4b0fbSJohn Polstra int sugid_coredump;
1483d177f46SBill Fumerola SYSCTL_INT(_kern, OID_AUTO, sugid_coredump, CTLFLAG_RW,
1493d177f46SBill Fumerola     &sugid_coredump, 0, "Enable coredumping set user/group ID processes");
150c87e2930SDavid Greenman 
151e5a28db9SPaul Saab static int	do_coredump = 1;
152e5a28db9SPaul Saab SYSCTL_INT(_kern, OID_AUTO, coredump, CTLFLAG_RW,
153e5a28db9SPaul Saab 	&do_coredump, 0, "Enable/Disable coredumps");
154e5a28db9SPaul Saab 
1556141e04aSJohn-Mark Gurney static int	set_core_nodump_flag = 0;
1566141e04aSJohn-Mark Gurney SYSCTL_INT(_kern, OID_AUTO, nodump_coredump, CTLFLAG_RW, &set_core_nodump_flag,
1576141e04aSJohn-Mark Gurney 	0, "Enable setting the NODUMP flag on coredump files");
1586141e04aSJohn-Mark Gurney 
1592c42a146SMarcel Moolenaar /*
1602c42a146SMarcel Moolenaar  * Signal properties and actions.
1612c42a146SMarcel Moolenaar  * The array below categorizes the signals and their default actions
1622c42a146SMarcel Moolenaar  * according to the following properties:
1632c42a146SMarcel Moolenaar  */
1642c42a146SMarcel Moolenaar #define	SA_KILL		0x01		/* terminates process by default */
1652c42a146SMarcel Moolenaar #define	SA_CORE		0x02		/* ditto and coredumps */
1662c42a146SMarcel Moolenaar #define	SA_STOP		0x04		/* suspend process */
1672c42a146SMarcel Moolenaar #define	SA_TTYSTOP	0x08		/* ditto, from tty */
1682c42a146SMarcel Moolenaar #define	SA_IGNORE	0x10		/* ignore by default */
1692c42a146SMarcel Moolenaar #define	SA_CONT		0x20		/* continue if suspended */
1702c42a146SMarcel Moolenaar #define	SA_CANTMASK	0x40		/* non-maskable, catchable */
171da33176fSJeff Roberson #define	SA_PROC		0x80		/* deliverable to any thread */
172df8bae1dSRodney W. Grimes 
1732c42a146SMarcel Moolenaar static int sigproptbl[NSIG] = {
174da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGHUP */
175da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGINT */
176da33176fSJeff Roberson         SA_KILL|SA_CORE|SA_PROC,	/* SIGQUIT */
1772c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGILL */
1782c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGTRAP */
1792c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGABRT */
180da33176fSJeff Roberson         SA_KILL|SA_CORE|SA_PROC,	/* SIGEMT */
1812c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGFPE */
182da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGKILL */
1832c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGBUS */
1842c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGSEGV */
1852c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGSYS */
186da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGPIPE */
187da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGALRM */
188da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGTERM */
189da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGURG */
190da33176fSJeff Roberson         SA_STOP|SA_PROC,		/* SIGSTOP */
191da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTSTP */
192da33176fSJeff Roberson         SA_IGNORE|SA_CONT|SA_PROC,	/* SIGCONT */
193da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGCHLD */
194da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTTIN */
195da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTTOU */
196da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGIO */
1972c42a146SMarcel Moolenaar         SA_KILL,			/* SIGXCPU */
1982c42a146SMarcel Moolenaar         SA_KILL,			/* SIGXFSZ */
199da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGVTALRM */
200da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGPROF */
201da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGWINCH  */
202da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGINFO */
203da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGUSR1 */
204da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGUSR2 */
2052c42a146SMarcel Moolenaar };
2062c42a146SMarcel Moolenaar 
2079104847fSDavid Xu static void
2089104847fSDavid Xu sigqueue_start(void)
2099104847fSDavid Xu {
2109104847fSDavid Xu 	ksiginfo_zone = uma_zcreate("ksiginfo", sizeof(ksiginfo_t),
2119104847fSDavid Xu 		NULL, NULL, NULL, NULL, UMA_ALIGN_PTR, 0);
2129104847fSDavid Xu 	uma_prealloc(ksiginfo_zone, preallocate_siginfo);
213b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_REALTIME_SIGNALS, _POSIX_REALTIME_SIGNALS);
214b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_RTSIG_MAX, SIGRTMAX - SIGRTMIN + 1);
215b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_SIGQUEUE_MAX, max_pending_per_proc);
2169104847fSDavid Xu }
2179104847fSDavid Xu 
2185da49fcbSDavid Xu ksiginfo_t *
219ebceaf6dSDavid Xu ksiginfo_alloc(int wait)
2209104847fSDavid Xu {
221ebceaf6dSDavid Xu 	int flags;
222ebceaf6dSDavid Xu 
223ebceaf6dSDavid Xu 	flags = M_ZERO;
224ebceaf6dSDavid Xu 	if (! wait)
225ebceaf6dSDavid Xu 		flags |= M_NOWAIT;
2269104847fSDavid Xu 	if (ksiginfo_zone != NULL)
227ebceaf6dSDavid Xu 		return ((ksiginfo_t *)uma_zalloc(ksiginfo_zone, flags));
2289104847fSDavid Xu 	return (NULL);
2299104847fSDavid Xu }
2309104847fSDavid Xu 
2315da49fcbSDavid Xu void
2329104847fSDavid Xu ksiginfo_free(ksiginfo_t *ksi)
2339104847fSDavid Xu {
2349104847fSDavid Xu 	uma_zfree(ksiginfo_zone, ksi);
2359104847fSDavid Xu }
2369104847fSDavid Xu 
2375da49fcbSDavid Xu static __inline int
2385da49fcbSDavid Xu ksiginfo_tryfree(ksiginfo_t *ksi)
2395da49fcbSDavid Xu {
2405da49fcbSDavid Xu 	if (!(ksi->ksi_flags & KSI_EXT)) {
2415da49fcbSDavid Xu 		uma_zfree(ksiginfo_zone, ksi);
2425da49fcbSDavid Xu 		return (1);
2435da49fcbSDavid Xu 	}
2445da49fcbSDavid Xu 	return (0);
2455da49fcbSDavid Xu }
2465da49fcbSDavid Xu 
2479104847fSDavid Xu void
2489104847fSDavid Xu sigqueue_init(sigqueue_t *list, struct proc *p)
2499104847fSDavid Xu {
2509104847fSDavid Xu 	SIGEMPTYSET(list->sq_signals);
2513dfcaad6SDavid Xu 	SIGEMPTYSET(list->sq_kill);
2529104847fSDavid Xu 	TAILQ_INIT(&list->sq_list);
2539104847fSDavid Xu 	list->sq_proc = p;
2549104847fSDavid Xu 	list->sq_flags = SQ_INIT;
2559104847fSDavid Xu }
2569104847fSDavid Xu 
2579104847fSDavid Xu /*
2589104847fSDavid Xu  * Get a signal's ksiginfo.
2599104847fSDavid Xu  * Return:
2609104847fSDavid Xu  * 	0	-	signal not found
2619104847fSDavid Xu  *	others	-	signal number
2629104847fSDavid Xu  */
2639104847fSDavid Xu int
2649104847fSDavid Xu sigqueue_get(sigqueue_t *sq, int signo, ksiginfo_t *si)
2659104847fSDavid Xu {
2669104847fSDavid Xu 	struct proc *p = sq->sq_proc;
2679104847fSDavid Xu 	struct ksiginfo *ksi, *next;
2689104847fSDavid Xu 	int count = 0;
2699104847fSDavid Xu 
2709104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
2719104847fSDavid Xu 
2729104847fSDavid Xu 	if (!SIGISMEMBER(sq->sq_signals, signo))
2739104847fSDavid Xu 		return (0);
2749104847fSDavid Xu 
2753dfcaad6SDavid Xu 	if (SIGISMEMBER(sq->sq_kill, signo)) {
2763dfcaad6SDavid Xu 		count++;
2773dfcaad6SDavid Xu 		SIGDELSET(sq->sq_kill, signo);
2783dfcaad6SDavid Xu 	}
2793dfcaad6SDavid Xu 
2805c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &sq->sq_list, ksi_link, next) {
2819104847fSDavid Xu 		if (ksi->ksi_signo == signo) {
2829104847fSDavid Xu 			if (count == 0) {
2839104847fSDavid Xu 				TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
2845da49fcbSDavid Xu 				ksi->ksi_sigq = NULL;
2859104847fSDavid Xu 				ksiginfo_copy(ksi, si);
2865da49fcbSDavid Xu 				if (ksiginfo_tryfree(ksi) && p != NULL)
2879104847fSDavid Xu 					p->p_pendingcnt--;
2889104847fSDavid Xu 			}
289016fa302SDavid Xu 			if (++count > 1)
290016fa302SDavid Xu 				break;
2919104847fSDavid Xu 		}
2929104847fSDavid Xu 	}
2939104847fSDavid Xu 
2949104847fSDavid Xu 	if (count <= 1)
2959104847fSDavid Xu 		SIGDELSET(sq->sq_signals, signo);
2969104847fSDavid Xu 	si->ksi_signo = signo;
2979104847fSDavid Xu 	return (signo);
2989104847fSDavid Xu }
2999104847fSDavid Xu 
3005da49fcbSDavid Xu void
3015da49fcbSDavid Xu sigqueue_take(ksiginfo_t *ksi)
3025da49fcbSDavid Xu {
3035da49fcbSDavid Xu 	struct ksiginfo *kp;
3045da49fcbSDavid Xu 	struct proc	*p;
3055da49fcbSDavid Xu 	sigqueue_t	*sq;
3065da49fcbSDavid Xu 
307ebceaf6dSDavid Xu 	if (ksi == NULL || (sq = ksi->ksi_sigq) == NULL)
3085da49fcbSDavid Xu 		return;
3095da49fcbSDavid Xu 
3105da49fcbSDavid Xu 	p = sq->sq_proc;
3115da49fcbSDavid Xu 	TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
3125da49fcbSDavid Xu 	ksi->ksi_sigq = NULL;
3135da49fcbSDavid Xu 	if (!(ksi->ksi_flags & KSI_EXT) && p != NULL)
3145da49fcbSDavid Xu 		p->p_pendingcnt--;
3155da49fcbSDavid Xu 
3165da49fcbSDavid Xu 	for (kp = TAILQ_FIRST(&sq->sq_list); kp != NULL;
3175da49fcbSDavid Xu 	     kp = TAILQ_NEXT(kp, ksi_link)) {
3185da49fcbSDavid Xu 		if (kp->ksi_signo == ksi->ksi_signo)
3195da49fcbSDavid Xu 			break;
3205da49fcbSDavid Xu 	}
3213dfcaad6SDavid Xu 	if (kp == NULL && !SIGISMEMBER(sq->sq_kill, ksi->ksi_signo))
3225da49fcbSDavid Xu 		SIGDELSET(sq->sq_signals, ksi->ksi_signo);
3235da49fcbSDavid Xu }
3245da49fcbSDavid Xu 
3259104847fSDavid Xu int
3269104847fSDavid Xu sigqueue_add(sigqueue_t *sq, int signo, ksiginfo_t *si)
3279104847fSDavid Xu {
3289104847fSDavid Xu 	struct proc *p = sq->sq_proc;
3299104847fSDavid Xu 	struct ksiginfo *ksi;
3309104847fSDavid Xu 	int ret = 0;
3319104847fSDavid Xu 
3329104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
3339104847fSDavid Xu 
3343dfcaad6SDavid Xu 	if (signo == SIGKILL || signo == SIGSTOP || si == NULL) {
3353dfcaad6SDavid Xu 		SIGADDSET(sq->sq_kill, signo);
3369104847fSDavid Xu 		goto out_set_bit;
3373dfcaad6SDavid Xu 	}
3389104847fSDavid Xu 
3395da49fcbSDavid Xu 	/* directly insert the ksi, don't copy it */
3405da49fcbSDavid Xu 	if (si->ksi_flags & KSI_INS) {
3415da49fcbSDavid Xu 		TAILQ_INSERT_TAIL(&sq->sq_list, si, ksi_link);
3425da49fcbSDavid Xu 		si->ksi_sigq = sq;
3435da49fcbSDavid Xu 		goto out_set_bit;
3445da49fcbSDavid Xu 	}
3455da49fcbSDavid Xu 
3463dfcaad6SDavid Xu 	if (__predict_false(ksiginfo_zone == NULL)) {
3473dfcaad6SDavid Xu 		SIGADDSET(sq->sq_kill, signo);
3489104847fSDavid Xu 		goto out_set_bit;
3493dfcaad6SDavid Xu 	}
3509104847fSDavid Xu 
351ebceaf6dSDavid Xu 	if (p != NULL && p->p_pendingcnt >= max_pending_per_proc) {
3529104847fSDavid Xu 		signal_overflow++;
3539104847fSDavid Xu 		ret = EAGAIN;
354ebceaf6dSDavid Xu 	} else if ((ksi = ksiginfo_alloc(0)) == NULL) {
3559104847fSDavid Xu 		signal_alloc_fail++;
3569104847fSDavid Xu 		ret = EAGAIN;
3579104847fSDavid Xu 	} else {
3589104847fSDavid Xu 		if (p != NULL)
3599104847fSDavid Xu 			p->p_pendingcnt++;
3609104847fSDavid Xu 		ksiginfo_copy(si, ksi);
3619104847fSDavid Xu 		ksi->ksi_signo = signo;
3629104847fSDavid Xu 		TAILQ_INSERT_TAIL(&sq->sq_list, ksi, ksi_link);
3635da49fcbSDavid Xu 		ksi->ksi_sigq = sq;
3649104847fSDavid Xu 	}
3659104847fSDavid Xu 
3669104847fSDavid Xu 	if ((si->ksi_flags & KSI_TRAP) != 0) {
3673dfcaad6SDavid Xu 		if (ret != 0)
3683dfcaad6SDavid Xu 			SIGADDSET(sq->sq_kill, signo);
3699104847fSDavid Xu 		ret = 0;
3709104847fSDavid Xu 		goto out_set_bit;
3719104847fSDavid Xu 	}
3729104847fSDavid Xu 
3739104847fSDavid Xu 	if (ret != 0)
3749104847fSDavid Xu 		return (ret);
3759104847fSDavid Xu 
3769104847fSDavid Xu out_set_bit:
3779104847fSDavid Xu 	SIGADDSET(sq->sq_signals, signo);
3789104847fSDavid Xu 	return (ret);
3799104847fSDavid Xu }
3809104847fSDavid Xu 
3819104847fSDavid Xu void
3829104847fSDavid Xu sigqueue_flush(sigqueue_t *sq)
3839104847fSDavid Xu {
3849104847fSDavid Xu 	struct proc *p = sq->sq_proc;
3859104847fSDavid Xu 	ksiginfo_t *ksi;
3869104847fSDavid Xu 
3879104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
3889104847fSDavid Xu 
3895da49fcbSDavid Xu 	if (p != NULL)
3905da49fcbSDavid Xu 		PROC_LOCK_ASSERT(p, MA_OWNED);
3915da49fcbSDavid Xu 
3929104847fSDavid Xu 	while ((ksi = TAILQ_FIRST(&sq->sq_list)) != NULL) {
3939104847fSDavid Xu 		TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
3945da49fcbSDavid Xu 		ksi->ksi_sigq = NULL;
3955da49fcbSDavid Xu 		if (ksiginfo_tryfree(ksi) && p != NULL)
3969104847fSDavid Xu 			p->p_pendingcnt--;
3979104847fSDavid Xu 	}
3989104847fSDavid Xu 
3999104847fSDavid Xu 	SIGEMPTYSET(sq->sq_signals);
4003dfcaad6SDavid Xu 	SIGEMPTYSET(sq->sq_kill);
4019104847fSDavid Xu }
4029104847fSDavid Xu 
4039104847fSDavid Xu void
4049104847fSDavid Xu sigqueue_collect_set(sigqueue_t *sq, sigset_t *set)
4059104847fSDavid Xu {
4069104847fSDavid Xu 	ksiginfo_t *ksi;
4079104847fSDavid Xu 
4089104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
4099104847fSDavid Xu 
4109104847fSDavid Xu 	TAILQ_FOREACH(ksi, &sq->sq_list, ksi_link)
4119104847fSDavid Xu 		SIGADDSET(*set, ksi->ksi_signo);
4123dfcaad6SDavid Xu 	SIGSETOR(*set, sq->sq_kill);
4139104847fSDavid Xu }
4149104847fSDavid Xu 
4159104847fSDavid Xu void
4169104847fSDavid Xu sigqueue_move_set(sigqueue_t *src, sigqueue_t *dst, sigset_t *setp)
4179104847fSDavid Xu {
4189104847fSDavid Xu 	sigset_t tmp, set;
4199104847fSDavid Xu 	struct proc *p1, *p2;
4209104847fSDavid Xu 	ksiginfo_t *ksi, *next;
4219104847fSDavid Xu 
4229104847fSDavid Xu 	KASSERT(src->sq_flags & SQ_INIT, ("src sigqueue not inited"));
4239104847fSDavid Xu 	KASSERT(dst->sq_flags & SQ_INIT, ("dst sigqueue not inited"));
4249104847fSDavid Xu 	/*
4259104847fSDavid Xu 	 * make a copy, this allows setp to point to src or dst
4269104847fSDavid Xu 	 * sq_signals without trouble.
4279104847fSDavid Xu 	 */
4289104847fSDavid Xu 	set = *setp;
4299104847fSDavid Xu 	p1 = src->sq_proc;
4309104847fSDavid Xu 	p2 = dst->sq_proc;
4319104847fSDavid Xu 	/* Move siginfo to target list */
4325c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &src->sq_list, ksi_link, next) {
4339104847fSDavid Xu 		if (SIGISMEMBER(set, ksi->ksi_signo)) {
4349104847fSDavid Xu 			TAILQ_REMOVE(&src->sq_list, ksi, ksi_link);
4359104847fSDavid Xu 			if (p1 != NULL)
4369104847fSDavid Xu 				p1->p_pendingcnt--;
4379104847fSDavid Xu 			TAILQ_INSERT_TAIL(&dst->sq_list, ksi, ksi_link);
4385da49fcbSDavid Xu 			ksi->ksi_sigq = dst;
4399104847fSDavid Xu 			if (p2 != NULL)
4409104847fSDavid Xu 				p2->p_pendingcnt++;
4419104847fSDavid Xu 		}
4429104847fSDavid Xu 	}
4439104847fSDavid Xu 
4449104847fSDavid Xu 	/* Move pending bits to target list */
4453dfcaad6SDavid Xu 	tmp = src->sq_kill;
4463dfcaad6SDavid Xu 	SIGSETAND(tmp, set);
4473dfcaad6SDavid Xu 	SIGSETOR(dst->sq_kill, tmp);
4483dfcaad6SDavid Xu 	SIGSETNAND(src->sq_kill, tmp);
4493dfcaad6SDavid Xu 
4509104847fSDavid Xu 	tmp = src->sq_signals;
4519104847fSDavid Xu 	SIGSETAND(tmp, set);
4529104847fSDavid Xu 	SIGSETOR(dst->sq_signals, tmp);
4539104847fSDavid Xu 	SIGSETNAND(src->sq_signals, tmp);
4549104847fSDavid Xu 
4559104847fSDavid Xu 	/* Finally, rescan src queue and set pending bits for it */
4569104847fSDavid Xu 	sigqueue_collect_set(src, &src->sq_signals);
4579104847fSDavid Xu }
4589104847fSDavid Xu 
4599104847fSDavid Xu void
4609104847fSDavid Xu sigqueue_move(sigqueue_t *src, sigqueue_t *dst, int signo)
4619104847fSDavid Xu {
4629104847fSDavid Xu 	sigset_t set;
4639104847fSDavid Xu 
4649104847fSDavid Xu 	SIGEMPTYSET(set);
4659104847fSDavid Xu 	SIGADDSET(set, signo);
4669104847fSDavid Xu 	sigqueue_move_set(src, dst, &set);
4679104847fSDavid Xu }
4689104847fSDavid Xu 
4699104847fSDavid Xu void
4709104847fSDavid Xu sigqueue_delete_set(sigqueue_t *sq, sigset_t *set)
4719104847fSDavid Xu {
4729104847fSDavid Xu 	struct proc *p = sq->sq_proc;
4739104847fSDavid Xu 	ksiginfo_t *ksi, *next;
4749104847fSDavid Xu 
4759104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("src sigqueue not inited"));
4769104847fSDavid Xu 
4779104847fSDavid Xu 	/* Remove siginfo queue */
4785c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &sq->sq_list, ksi_link, next) {
4799104847fSDavid Xu 		if (SIGISMEMBER(*set, ksi->ksi_signo)) {
4809104847fSDavid Xu 			TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
4815da49fcbSDavid Xu 			ksi->ksi_sigq = NULL;
4825da49fcbSDavid Xu 			if (ksiginfo_tryfree(ksi) && p != NULL)
4839104847fSDavid Xu 				p->p_pendingcnt--;
4849104847fSDavid Xu 		}
4859104847fSDavid Xu 	}
4863dfcaad6SDavid Xu 	SIGSETNAND(sq->sq_kill, *set);
4879104847fSDavid Xu 	SIGSETNAND(sq->sq_signals, *set);
4889104847fSDavid Xu 	/* Finally, rescan queue and set pending bits for it */
4899104847fSDavid Xu 	sigqueue_collect_set(sq, &sq->sq_signals);
4909104847fSDavid Xu }
4919104847fSDavid Xu 
4929104847fSDavid Xu void
4939104847fSDavid Xu sigqueue_delete(sigqueue_t *sq, int signo)
4949104847fSDavid Xu {
4959104847fSDavid Xu 	sigset_t set;
4969104847fSDavid Xu 
4979104847fSDavid Xu 	SIGEMPTYSET(set);
4989104847fSDavid Xu 	SIGADDSET(set, signo);
4999104847fSDavid Xu 	sigqueue_delete_set(sq, &set);
5009104847fSDavid Xu }
5019104847fSDavid Xu 
5029104847fSDavid Xu /* Remove a set of signals for a process */
5039104847fSDavid Xu void
5049104847fSDavid Xu sigqueue_delete_set_proc(struct proc *p, sigset_t *set)
5059104847fSDavid Xu {
5069104847fSDavid Xu 	sigqueue_t worklist;
5079104847fSDavid Xu 	struct thread *td0;
5089104847fSDavid Xu 
5099104847fSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
5109104847fSDavid Xu 
5119104847fSDavid Xu 	sigqueue_init(&worklist, NULL);
5129104847fSDavid Xu 	sigqueue_move_set(&p->p_sigqueue, &worklist, set);
5139104847fSDavid Xu 
514a54e85fdSJeff Roberson 	PROC_SLOCK(p);
5159104847fSDavid Xu 	FOREACH_THREAD_IN_PROC(p, td0)
5169104847fSDavid Xu 		sigqueue_move_set(&td0->td_sigqueue, &worklist, set);
517a54e85fdSJeff Roberson 	PROC_SUNLOCK(p);
5189104847fSDavid Xu 
5199104847fSDavid Xu 	sigqueue_flush(&worklist);
5209104847fSDavid Xu }
5219104847fSDavid Xu 
5229104847fSDavid Xu void
5239104847fSDavid Xu sigqueue_delete_proc(struct proc *p, int signo)
5249104847fSDavid Xu {
5259104847fSDavid Xu 	sigset_t set;
5269104847fSDavid Xu 
5279104847fSDavid Xu 	SIGEMPTYSET(set);
5289104847fSDavid Xu 	SIGADDSET(set, signo);
5299104847fSDavid Xu 	sigqueue_delete_set_proc(p, &set);
5309104847fSDavid Xu }
5319104847fSDavid Xu 
5329104847fSDavid Xu void
5339104847fSDavid Xu sigqueue_delete_stopmask_proc(struct proc *p)
5349104847fSDavid Xu {
5359104847fSDavid Xu 	sigset_t set;
5369104847fSDavid Xu 
5379104847fSDavid Xu 	SIGEMPTYSET(set);
5389104847fSDavid Xu 	SIGADDSET(set, SIGSTOP);
5399104847fSDavid Xu 	SIGADDSET(set, SIGTSTP);
5409104847fSDavid Xu 	SIGADDSET(set, SIGTTIN);
5419104847fSDavid Xu 	SIGADDSET(set, SIGTTOU);
5429104847fSDavid Xu 	sigqueue_delete_set_proc(p, &set);
5439104847fSDavid Xu }
5449104847fSDavid Xu 
545fbbeeb6cSBruce Evans /*
546fbbeeb6cSBruce Evans  * Determine signal that should be delivered to process p, the current
547fbbeeb6cSBruce Evans  * process, 0 if none.  If there is a pending stop signal with default
548fbbeeb6cSBruce Evans  * action, the process stops in issignal().
549fbbeeb6cSBruce Evans  */
550fbbeeb6cSBruce Evans int
551e602ba25SJulian Elischer cursig(struct thread *td)
552fbbeeb6cSBruce Evans {
553c9dfa2e0SJeff Roberson 	PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
55490af4afaSJohn Baldwin 	mtx_assert(&td->td_proc->p_sigacts->ps_mtx, MA_OWNED);
555a54e85fdSJeff Roberson 	THREAD_LOCK_ASSERT(td, MA_NOTOWNED);
5564093529dSJeff Roberson 	return (SIGPENDING(td) ? issignal(td) : 0);
557fbbeeb6cSBruce Evans }
558fbbeeb6cSBruce Evans 
55979065dbaSBruce Evans /*
56079065dbaSBruce Evans  * Arrange for ast() to handle unmasked pending signals on return to user
5619104847fSDavid Xu  * mode.  This must be called whenever a signal is added to td_sigqueue or
5624093529dSJeff Roberson  * unmasked in td_sigmask.
56379065dbaSBruce Evans  */
56479065dbaSBruce Evans void
5654093529dSJeff Roberson signotify(struct thread *td)
56679065dbaSBruce Evans {
5674093529dSJeff Roberson 	struct proc *p;
5688460a577SJohn Birrell #ifdef KSE
5699dde3bc9SDavid Xu 	sigset_t set, saved;
5708460a577SJohn Birrell #else
5718460a577SJohn Birrell 	sigset_t set;
5728460a577SJohn Birrell #endif
5734093529dSJeff Roberson 
5744093529dSJeff Roberson 	p = td->td_proc;
57579065dbaSBruce Evans 
57679065dbaSBruce Evans 	PROC_LOCK_ASSERT(p, MA_OWNED);
5774093529dSJeff Roberson 
5784093529dSJeff Roberson 	/*
5794093529dSJeff Roberson 	 * If our mask changed we may have to move signal that were
5809104847fSDavid Xu 	 * previously masked by all threads to our sigqueue.
5814093529dSJeff Roberson 	 */
5829104847fSDavid Xu 	set = p->p_sigqueue.sq_signals;
5838460a577SJohn Birrell #ifdef KSE
5849dde3bc9SDavid Xu 	if (p->p_flag & P_SA)
5859104847fSDavid Xu 		saved = p->p_sigqueue.sq_signals;
5868460a577SJohn Birrell #endif
5874093529dSJeff Roberson 	SIGSETNAND(set, td->td_sigmask);
5889104847fSDavid Xu 	if (! SIGISEMPTY(set))
5899104847fSDavid Xu 		sigqueue_move_set(&p->p_sigqueue, &td->td_sigqueue, &set);
5908b94a061SJohn Baldwin 	if (SIGPENDING(td)) {
591a54e85fdSJeff Roberson 		thread_lock(td);
5924093529dSJeff Roberson 		td->td_flags |= TDF_NEEDSIGCHK | TDF_ASTPENDING;
593a54e85fdSJeff Roberson 		thread_unlock(td);
59479065dbaSBruce Evans 	}
5958460a577SJohn Birrell #ifdef KSE
5969dde3bc9SDavid Xu 	if ((p->p_flag & P_SA) && !(p->p_flag & P_SIGEVENT)) {
5979104847fSDavid Xu 		if (!SIGSETEQ(saved, p->p_sigqueue.sq_signals)) {
5989dde3bc9SDavid Xu 			/* pending set changed */
5999dde3bc9SDavid Xu 			p->p_flag |= P_SIGEVENT;
6009dde3bc9SDavid Xu 			wakeup(&p->p_siglist);
6019dde3bc9SDavid Xu 		}
6029dde3bc9SDavid Xu 	}
6038460a577SJohn Birrell #endif
6048b94a061SJohn Baldwin }
6058b94a061SJohn Baldwin 
6068b94a061SJohn Baldwin int
6078b94a061SJohn Baldwin sigonstack(size_t sp)
6088b94a061SJohn Baldwin {
609a30ec4b9SDavid Xu 	struct thread *td = curthread;
6108b94a061SJohn Baldwin 
611a30ec4b9SDavid Xu 	return ((td->td_pflags & TDP_ALTSTACK) ?
6121930e303SPoul-Henning Kamp #if defined(COMPAT_43)
613a30ec4b9SDavid Xu 	    ((td->td_sigstk.ss_size == 0) ?
614a30ec4b9SDavid Xu 		(td->td_sigstk.ss_flags & SS_ONSTACK) :
615a30ec4b9SDavid Xu 		((sp - (size_t)td->td_sigstk.ss_sp) < td->td_sigstk.ss_size))
6168b94a061SJohn Baldwin #else
617a30ec4b9SDavid Xu 	    ((sp - (size_t)td->td_sigstk.ss_sp) < td->td_sigstk.ss_size)
6188b94a061SJohn Baldwin #endif
6198b94a061SJohn Baldwin 	    : 0);
6208b94a061SJohn Baldwin }
62179065dbaSBruce Evans 
6226f841fb7SMarcel Moolenaar static __inline int
6236f841fb7SMarcel Moolenaar sigprop(int sig)
6242c42a146SMarcel Moolenaar {
6256f841fb7SMarcel Moolenaar 
6262c42a146SMarcel Moolenaar 	if (sig > 0 && sig < NSIG)
6272c42a146SMarcel Moolenaar 		return (sigproptbl[_SIG_IDX(sig)]);
6282c42a146SMarcel Moolenaar 	return (0);
629df8bae1dSRodney W. Grimes }
6302c42a146SMarcel Moolenaar 
6314093529dSJeff Roberson int
6326f841fb7SMarcel Moolenaar sig_ffs(sigset_t *set)
6332c42a146SMarcel Moolenaar {
6342c42a146SMarcel Moolenaar 	int i;
6352c42a146SMarcel Moolenaar 
6366f841fb7SMarcel Moolenaar 	for (i = 0; i < _SIG_WORDS; i++)
6372c42a146SMarcel Moolenaar 		if (set->__bits[i])
6382c42a146SMarcel Moolenaar 			return (ffs(set->__bits[i]) + (i * 32));
639df8bae1dSRodney W. Grimes 	return (0);
640df8bae1dSRodney W. Grimes }
641df8bae1dSRodney W. Grimes 
6422c42a146SMarcel Moolenaar /*
6438f19eb88SIan Dowse  * kern_sigaction
6442c42a146SMarcel Moolenaar  * sigaction
64523eeeff7SPeter Wemm  * freebsd4_sigaction
6462c42a146SMarcel Moolenaar  * osigaction
6472c42a146SMarcel Moolenaar  */
6488f19eb88SIan Dowse int
64923eeeff7SPeter Wemm kern_sigaction(td, sig, act, oact, flags)
6508f19eb88SIan Dowse 	struct thread *td;
6512c42a146SMarcel Moolenaar 	register int sig;
6522c42a146SMarcel Moolenaar 	struct sigaction *act, *oact;
65323eeeff7SPeter Wemm 	int flags;
654df8bae1dSRodney W. Grimes {
65590af4afaSJohn Baldwin 	struct sigacts *ps;
6568f19eb88SIan Dowse 	struct proc *p = td->td_proc;
657df8bae1dSRodney W. Grimes 
6582899d606SDag-Erling Smørgrav 	if (!_SIG_VALID(sig))
6592c42a146SMarcel Moolenaar 		return (EINVAL);
6602c42a146SMarcel Moolenaar 
661628d2653SJohn Baldwin 	PROC_LOCK(p);
662628d2653SJohn Baldwin 	ps = p->p_sigacts;
66390af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
6642c42a146SMarcel Moolenaar 	if (oact) {
6652c42a146SMarcel Moolenaar 		oact->sa_mask = ps->ps_catchmask[_SIG_IDX(sig)];
6662c42a146SMarcel Moolenaar 		oact->sa_flags = 0;
6672c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigonstack, sig))
6682c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_ONSTACK;
6692c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_sigintr, sig))
6702c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_RESTART;
6712c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig))
6722c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_RESETHAND;
6732c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_signodefer, sig))
6742c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NODEFER;
67510c2b8e1SDavid E. O'Brien 		if (SIGISMEMBER(ps->ps_siginfo, sig)) {
6762c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_SIGINFO;
67710c2b8e1SDavid E. O'Brien 			oact->sa_sigaction =
67810c2b8e1SDavid E. O'Brien 			    (__siginfohandler_t *)ps->ps_sigact[_SIG_IDX(sig)];
67910c2b8e1SDavid E. O'Brien 		} else
68010c2b8e1SDavid E. O'Brien 			oact->sa_handler = ps->ps_sigact[_SIG_IDX(sig)];
68190af4afaSJohn Baldwin 		if (sig == SIGCHLD && ps->ps_flag & PS_NOCLDSTOP)
6822c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NOCLDSTOP;
68390af4afaSJohn Baldwin 		if (sig == SIGCHLD && ps->ps_flag & PS_NOCLDWAIT)
6842c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NOCLDWAIT;
6852c42a146SMarcel Moolenaar 	}
6862c42a146SMarcel Moolenaar 	if (act) {
6872c42a146SMarcel Moolenaar 		if ((sig == SIGKILL || sig == SIGSTOP) &&
688628d2653SJohn Baldwin 		    act->sa_handler != SIG_DFL) {
68990af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
690628d2653SJohn Baldwin 			PROC_UNLOCK(p);
6912c42a146SMarcel Moolenaar 			return (EINVAL);
692628d2653SJohn Baldwin 		}
6932c42a146SMarcel Moolenaar 
694df8bae1dSRodney W. Grimes 		/*
695df8bae1dSRodney W. Grimes 		 * Change setting atomically.
696df8bae1dSRodney W. Grimes 		 */
6972c42a146SMarcel Moolenaar 
6982c42a146SMarcel Moolenaar 		ps->ps_catchmask[_SIG_IDX(sig)] = act->sa_mask;
6992c42a146SMarcel Moolenaar 		SIG_CANTMASK(ps->ps_catchmask[_SIG_IDX(sig)]);
7002c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_SIGINFO) {
701aa7a4daeSPeter Wemm 			ps->ps_sigact[_SIG_IDX(sig)] =
702aa7a4daeSPeter Wemm 			    (__sighandler_t *)act->sa_sigaction;
70380f42b55SIan Dowse 			SIGADDSET(ps->ps_siginfo, sig);
70480f42b55SIan Dowse 		} else {
70580f42b55SIan Dowse 			ps->ps_sigact[_SIG_IDX(sig)] = act->sa_handler;
7062c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_siginfo, sig);
7072c42a146SMarcel Moolenaar 		}
7082c42a146SMarcel Moolenaar 		if (!(act->sa_flags & SA_RESTART))
7092c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigintr, sig);
710df8bae1dSRodney W. Grimes 		else
7112c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigintr, sig);
7122c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_ONSTACK)
7132c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigonstack, sig);
714df8bae1dSRodney W. Grimes 		else
7152c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigonstack, sig);
7162c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_RESETHAND)
7172c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigreset, sig);
7181e41c1b5SSteven Wallace 		else
7192c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigreset, sig);
7202c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_NODEFER)
7212c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_signodefer, sig);
722289ccde0SPeter Wemm 		else
7232c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_signodefer, sig);
7242c42a146SMarcel Moolenaar 		if (sig == SIGCHLD) {
7252c42a146SMarcel Moolenaar 			if (act->sa_flags & SA_NOCLDSTOP)
72690af4afaSJohn Baldwin 				ps->ps_flag |= PS_NOCLDSTOP;
7276626c604SJulian Elischer 			else
72890af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_NOCLDSTOP;
729ba1551caSIan Dowse 			if (act->sa_flags & SA_NOCLDWAIT) {
730245f17d4SJoerg Wunsch 				/*
7312c42a146SMarcel Moolenaar 				 * Paranoia: since SA_NOCLDWAIT is implemented
7322c42a146SMarcel Moolenaar 				 * by reparenting the dying child to PID 1 (and
7332c42a146SMarcel Moolenaar 				 * trust it to reap the zombie), PID 1 itself
7342c42a146SMarcel Moolenaar 				 * is forbidden to set SA_NOCLDWAIT.
735245f17d4SJoerg Wunsch 				 */
736245f17d4SJoerg Wunsch 				if (p->p_pid == 1)
73790af4afaSJohn Baldwin 					ps->ps_flag &= ~PS_NOCLDWAIT;
7386626c604SJulian Elischer 				else
73990af4afaSJohn Baldwin 					ps->ps_flag |= PS_NOCLDWAIT;
740245f17d4SJoerg Wunsch 			} else
74190af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_NOCLDWAIT;
742ba1551caSIan Dowse 			if (ps->ps_sigact[_SIG_IDX(SIGCHLD)] == SIG_IGN)
74390af4afaSJohn Baldwin 				ps->ps_flag |= PS_CLDSIGIGN;
744ba1551caSIan Dowse 			else
74590af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_CLDSIGIGN;
746df8bae1dSRodney W. Grimes 		}
747df8bae1dSRodney W. Grimes 		/*
74890af4afaSJohn Baldwin 		 * Set bit in ps_sigignore for signals that are set to SIG_IGN,
7492c42a146SMarcel Moolenaar 		 * and for signals set to SIG_DFL where the default is to
75090af4afaSJohn Baldwin 		 * ignore. However, don't put SIGCONT in ps_sigignore, as we
7512c42a146SMarcel Moolenaar 		 * have to restart the process.
752df8bae1dSRodney W. Grimes 		 */
7532c42a146SMarcel Moolenaar 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
7542c42a146SMarcel Moolenaar 		    (sigprop(sig) & SA_IGNORE &&
7552c42a146SMarcel Moolenaar 		     ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL)) {
7568460a577SJohn Birrell #ifdef KSE
7579dde3bc9SDavid Xu 			if ((p->p_flag & P_SA) &&
7589104847fSDavid Xu 			     SIGISMEMBER(p->p_sigqueue.sq_signals, sig)) {
7599dde3bc9SDavid Xu 				p->p_flag |= P_SIGEVENT;
7609dde3bc9SDavid Xu 				wakeup(&p->p_siglist);
7619dde3bc9SDavid Xu 			}
7628460a577SJohn Birrell #endif
7632c42a146SMarcel Moolenaar 			/* never to be seen again */
764a54e85fdSJeff Roberson 			PROC_SLOCK(p);
7659104847fSDavid Xu 			sigqueue_delete_proc(p, sig);
766a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
7672c42a146SMarcel Moolenaar 			if (sig != SIGCONT)
7682c42a146SMarcel Moolenaar 				/* easier in psignal */
76990af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
77090af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
771645682fdSLuoqi Chen 		} else {
77290af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigignore, sig);
7732c42a146SMarcel Moolenaar 			if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL)
77490af4afaSJohn Baldwin 				SIGDELSET(ps->ps_sigcatch, sig);
7752c42a146SMarcel Moolenaar 			else
77690af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigcatch, sig);
7772c42a146SMarcel Moolenaar 		}
77823eeeff7SPeter Wemm #ifdef COMPAT_FREEBSD4
77923eeeff7SPeter Wemm 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
78023eeeff7SPeter Wemm 		    ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL ||
78123eeeff7SPeter Wemm 		    (flags & KSA_FREEBSD4) == 0)
78223eeeff7SPeter Wemm 			SIGDELSET(ps->ps_freebsd4, sig);
78323eeeff7SPeter Wemm 		else
78423eeeff7SPeter Wemm 			SIGADDSET(ps->ps_freebsd4, sig);
78523eeeff7SPeter Wemm #endif
786e8ebc08fSPeter Wemm #ifdef COMPAT_43
787645682fdSLuoqi Chen 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
78823eeeff7SPeter Wemm 		    ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL ||
78923eeeff7SPeter Wemm 		    (flags & KSA_OSIGSET) == 0)
790645682fdSLuoqi Chen 			SIGDELSET(ps->ps_osigset, sig);
791645682fdSLuoqi Chen 		else
792645682fdSLuoqi Chen 			SIGADDSET(ps->ps_osigset, sig);
793e8ebc08fSPeter Wemm #endif
794df8bae1dSRodney W. Grimes 	}
79590af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
796628d2653SJohn Baldwin 	PROC_UNLOCK(p);
7972c42a146SMarcel Moolenaar 	return (0);
7982c42a146SMarcel Moolenaar }
7992c42a146SMarcel Moolenaar 
8002c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
8012c42a146SMarcel Moolenaar struct sigaction_args {
8022c42a146SMarcel Moolenaar 	int	sig;
8032c42a146SMarcel Moolenaar 	struct	sigaction *act;
8042c42a146SMarcel Moolenaar 	struct	sigaction *oact;
8052c42a146SMarcel Moolenaar };
8062c42a146SMarcel Moolenaar #endif
8072c42a146SMarcel Moolenaar int
808b40ce416SJulian Elischer sigaction(td, uap)
809b40ce416SJulian Elischer 	struct thread *td;
8102c42a146SMarcel Moolenaar 	register struct sigaction_args *uap;
8112c42a146SMarcel Moolenaar {
8122c42a146SMarcel Moolenaar 	struct sigaction act, oact;
8132c42a146SMarcel Moolenaar 	register struct sigaction *actp, *oactp;
8142c42a146SMarcel Moolenaar 	int error;
8152c42a146SMarcel Moolenaar 
8166f841fb7SMarcel Moolenaar 	actp = (uap->act != NULL) ? &act : NULL;
8176f841fb7SMarcel Moolenaar 	oactp = (uap->oact != NULL) ? &oact : NULL;
8182c42a146SMarcel Moolenaar 	if (actp) {
8196f841fb7SMarcel Moolenaar 		error = copyin(uap->act, actp, sizeof(act));
8202c42a146SMarcel Moolenaar 		if (error)
82144443757STim J. Robbins 			return (error);
8222c42a146SMarcel Moolenaar 	}
8238f19eb88SIan Dowse 	error = kern_sigaction(td, uap->sig, actp, oactp, 0);
82425d6dc06SJohn Baldwin 	if (oactp && !error)
8256f841fb7SMarcel Moolenaar 		error = copyout(oactp, uap->oact, sizeof(oact));
8262c42a146SMarcel Moolenaar 	return (error);
8272c42a146SMarcel Moolenaar }
8282c42a146SMarcel Moolenaar 
82923eeeff7SPeter Wemm #ifdef COMPAT_FREEBSD4
83023eeeff7SPeter Wemm #ifndef _SYS_SYSPROTO_H_
83123eeeff7SPeter Wemm struct freebsd4_sigaction_args {
83223eeeff7SPeter Wemm 	int	sig;
83323eeeff7SPeter Wemm 	struct	sigaction *act;
83423eeeff7SPeter Wemm 	struct	sigaction *oact;
83523eeeff7SPeter Wemm };
83623eeeff7SPeter Wemm #endif
83723eeeff7SPeter Wemm int
83823eeeff7SPeter Wemm freebsd4_sigaction(td, uap)
83923eeeff7SPeter Wemm 	struct thread *td;
84023eeeff7SPeter Wemm 	register struct freebsd4_sigaction_args *uap;
84123eeeff7SPeter Wemm {
84223eeeff7SPeter Wemm 	struct sigaction act, oact;
84323eeeff7SPeter Wemm 	register struct sigaction *actp, *oactp;
84423eeeff7SPeter Wemm 	int error;
84523eeeff7SPeter Wemm 
84623eeeff7SPeter Wemm 
84723eeeff7SPeter Wemm 	actp = (uap->act != NULL) ? &act : NULL;
84823eeeff7SPeter Wemm 	oactp = (uap->oact != NULL) ? &oact : NULL;
84923eeeff7SPeter Wemm 	if (actp) {
85023eeeff7SPeter Wemm 		error = copyin(uap->act, actp, sizeof(act));
85123eeeff7SPeter Wemm 		if (error)
85244443757STim J. Robbins 			return (error);
85323eeeff7SPeter Wemm 	}
85423eeeff7SPeter Wemm 	error = kern_sigaction(td, uap->sig, actp, oactp, KSA_FREEBSD4);
855a14e1189SJohn Baldwin 	if (oactp && !error)
85623eeeff7SPeter Wemm 		error = copyout(oactp, uap->oact, sizeof(oact));
85723eeeff7SPeter Wemm 	return (error);
85823eeeff7SPeter Wemm }
85923eeeff7SPeter Wemm #endif	/* COMAPT_FREEBSD4 */
86023eeeff7SPeter Wemm 
86131c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
8622c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
8632c42a146SMarcel Moolenaar struct osigaction_args {
8642c42a146SMarcel Moolenaar 	int	signum;
8652c42a146SMarcel Moolenaar 	struct	osigaction *nsa;
8662c42a146SMarcel Moolenaar 	struct	osigaction *osa;
8672c42a146SMarcel Moolenaar };
8682c42a146SMarcel Moolenaar #endif
8692c42a146SMarcel Moolenaar int
870b40ce416SJulian Elischer osigaction(td, uap)
871b40ce416SJulian Elischer 	struct thread *td;
8722c42a146SMarcel Moolenaar 	register struct osigaction_args *uap;
8732c42a146SMarcel Moolenaar {
8742c42a146SMarcel Moolenaar 	struct osigaction sa;
8752c42a146SMarcel Moolenaar 	struct sigaction nsa, osa;
8762c42a146SMarcel Moolenaar 	register struct sigaction *nsap, *osap;
8772c42a146SMarcel Moolenaar 	int error;
8782c42a146SMarcel Moolenaar 
8796f841fb7SMarcel Moolenaar 	if (uap->signum <= 0 || uap->signum >= ONSIG)
8806f841fb7SMarcel Moolenaar 		return (EINVAL);
881fb99ab88SMatthew Dillon 
8826f841fb7SMarcel Moolenaar 	nsap = (uap->nsa != NULL) ? &nsa : NULL;
8836f841fb7SMarcel Moolenaar 	osap = (uap->osa != NULL) ? &osa : NULL;
884fb99ab88SMatthew Dillon 
8852c42a146SMarcel Moolenaar 	if (nsap) {
8866f841fb7SMarcel Moolenaar 		error = copyin(uap->nsa, &sa, sizeof(sa));
8872c42a146SMarcel Moolenaar 		if (error)
88844443757STim J. Robbins 			return (error);
8892c42a146SMarcel Moolenaar 		nsap->sa_handler = sa.sa_handler;
8902c42a146SMarcel Moolenaar 		nsap->sa_flags = sa.sa_flags;
8912c42a146SMarcel Moolenaar 		OSIG2SIG(sa.sa_mask, nsap->sa_mask);
8922c42a146SMarcel Moolenaar 	}
89323eeeff7SPeter Wemm 	error = kern_sigaction(td, uap->signum, nsap, osap, KSA_OSIGSET);
8942c42a146SMarcel Moolenaar 	if (osap && !error) {
8952c42a146SMarcel Moolenaar 		sa.sa_handler = osap->sa_handler;
8962c42a146SMarcel Moolenaar 		sa.sa_flags = osap->sa_flags;
8972c42a146SMarcel Moolenaar 		SIG2OSIG(osap->sa_mask, sa.sa_mask);
8986f841fb7SMarcel Moolenaar 		error = copyout(&sa, uap->osa, sizeof(sa));
8992c42a146SMarcel Moolenaar 	}
9002c42a146SMarcel Moolenaar 	return (error);
9012c42a146SMarcel Moolenaar }
90223eeeff7SPeter Wemm 
90373dbd3daSJohn Baldwin #if !defined(__i386__)
90423eeeff7SPeter Wemm /* Avoid replicating the same stub everywhere */
90523eeeff7SPeter Wemm int
90623eeeff7SPeter Wemm osigreturn(td, uap)
90723eeeff7SPeter Wemm 	struct thread *td;
90823eeeff7SPeter Wemm 	struct osigreturn_args *uap;
90923eeeff7SPeter Wemm {
91023eeeff7SPeter Wemm 
91123eeeff7SPeter Wemm 	return (nosys(td, (struct nosys_args *)uap));
91223eeeff7SPeter Wemm }
91323eeeff7SPeter Wemm #endif
91431c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
915df8bae1dSRodney W. Grimes 
916df8bae1dSRodney W. Grimes /*
917df8bae1dSRodney W. Grimes  * Initialize signal state for process 0;
918df8bae1dSRodney W. Grimes  * set to ignore signals that are ignored by default.
919df8bae1dSRodney W. Grimes  */
920df8bae1dSRodney W. Grimes void
921df8bae1dSRodney W. Grimes siginit(p)
922df8bae1dSRodney W. Grimes 	struct proc *p;
923df8bae1dSRodney W. Grimes {
924df8bae1dSRodney W. Grimes 	register int i;
92590af4afaSJohn Baldwin 	struct sigacts *ps;
926df8bae1dSRodney W. Grimes 
927628d2653SJohn Baldwin 	PROC_LOCK(p);
92890af4afaSJohn Baldwin 	ps = p->p_sigacts;
92990af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
9302c42a146SMarcel Moolenaar 	for (i = 1; i <= NSIG; i++)
9312c42a146SMarcel Moolenaar 		if (sigprop(i) & SA_IGNORE && i != SIGCONT)
93290af4afaSJohn Baldwin 			SIGADDSET(ps->ps_sigignore, i);
93390af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
934628d2653SJohn Baldwin 	PROC_UNLOCK(p);
935df8bae1dSRodney W. Grimes }
936df8bae1dSRodney W. Grimes 
937df8bae1dSRodney W. Grimes /*
938df8bae1dSRodney W. Grimes  * Reset signals for an exec of the specified process.
939df8bae1dSRodney W. Grimes  */
940df8bae1dSRodney W. Grimes void
941a30ec4b9SDavid Xu execsigs(struct proc *p)
942df8bae1dSRodney W. Grimes {
943a30ec4b9SDavid Xu 	struct sigacts *ps;
944a30ec4b9SDavid Xu 	int sig;
945a30ec4b9SDavid Xu 	struct thread *td;
946df8bae1dSRodney W. Grimes 
947df8bae1dSRodney W. Grimes 	/*
948df8bae1dSRodney W. Grimes 	 * Reset caught signals.  Held signals remain held
9494093529dSJeff Roberson 	 * through td_sigmask (unless they were caught,
950df8bae1dSRodney W. Grimes 	 * and are now ignored by default).
951df8bae1dSRodney W. Grimes 	 */
9529b3b1c5fSJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
953a30ec4b9SDavid Xu 	td = FIRST_THREAD_IN_PROC(p);
954628d2653SJohn Baldwin 	ps = p->p_sigacts;
95590af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
95690af4afaSJohn Baldwin 	while (SIGNOTEMPTY(ps->ps_sigcatch)) {
95790af4afaSJohn Baldwin 		sig = sig_ffs(&ps->ps_sigcatch);
95890af4afaSJohn Baldwin 		SIGDELSET(ps->ps_sigcatch, sig);
9592c42a146SMarcel Moolenaar 		if (sigprop(sig) & SA_IGNORE) {
9602c42a146SMarcel Moolenaar 			if (sig != SIGCONT)
96190af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
962a54e85fdSJeff Roberson 			PROC_SLOCK(p);
9639104847fSDavid Xu 			sigqueue_delete_proc(p, sig);
964a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
965df8bae1dSRodney W. Grimes 		}
9662c42a146SMarcel Moolenaar 		ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
967df8bae1dSRodney W. Grimes 	}
968df8bae1dSRodney W. Grimes 	/*
969df8bae1dSRodney W. Grimes 	 * Reset stack state to the user stack.
970df8bae1dSRodney W. Grimes 	 * Clear set of signals caught on the signal stack.
971df8bae1dSRodney W. Grimes 	 */
972a30ec4b9SDavid Xu 	td->td_sigstk.ss_flags = SS_DISABLE;
973a30ec4b9SDavid Xu 	td->td_sigstk.ss_size = 0;
974a30ec4b9SDavid Xu 	td->td_sigstk.ss_sp = 0;
975a30ec4b9SDavid Xu 	td->td_pflags &= ~TDP_ALTSTACK;
97680e907a1SPeter Wemm 	/*
97780e907a1SPeter Wemm 	 * Reset no zombies if child dies flag as Solaris does.
97880e907a1SPeter Wemm 	 */
97990af4afaSJohn Baldwin 	ps->ps_flag &= ~(PS_NOCLDWAIT | PS_CLDSIGIGN);
980c7fd62daSDavid Malone 	if (ps->ps_sigact[_SIG_IDX(SIGCHLD)] == SIG_IGN)
981c7fd62daSDavid Malone 		ps->ps_sigact[_SIG_IDX(SIGCHLD)] = SIG_DFL;
98290af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
983df8bae1dSRodney W. Grimes }
984df8bae1dSRodney W. Grimes 
985df8bae1dSRodney W. Grimes /*
986e77daab1SJohn Baldwin  * kern_sigprocmask()
9877c8fdcbdSMatthew Dillon  *
988628d2653SJohn Baldwin  *	Manipulate signal mask.
989df8bae1dSRodney W. Grimes  */
990e77daab1SJohn Baldwin int
991e77daab1SJohn Baldwin kern_sigprocmask(td, how, set, oset, old)
9924093529dSJeff Roberson 	struct thread *td;
9932c42a146SMarcel Moolenaar 	int how;
9942c42a146SMarcel Moolenaar 	sigset_t *set, *oset;
995645682fdSLuoqi Chen 	int old;
9962c42a146SMarcel Moolenaar {
9972c42a146SMarcel Moolenaar 	int error;
9982c42a146SMarcel Moolenaar 
9994093529dSJeff Roberson 	PROC_LOCK(td->td_proc);
10002c42a146SMarcel Moolenaar 	if (oset != NULL)
10014093529dSJeff Roberson 		*oset = td->td_sigmask;
10022c42a146SMarcel Moolenaar 
10032c42a146SMarcel Moolenaar 	error = 0;
10042c42a146SMarcel Moolenaar 	if (set != NULL) {
10052c42a146SMarcel Moolenaar 		switch (how) {
10062c42a146SMarcel Moolenaar 		case SIG_BLOCK:
1007645682fdSLuoqi Chen 			SIG_CANTMASK(*set);
10084093529dSJeff Roberson 			SIGSETOR(td->td_sigmask, *set);
10092c42a146SMarcel Moolenaar 			break;
10102c42a146SMarcel Moolenaar 		case SIG_UNBLOCK:
10114093529dSJeff Roberson 			SIGSETNAND(td->td_sigmask, *set);
10124093529dSJeff Roberson 			signotify(td);
10132c42a146SMarcel Moolenaar 			break;
10142c42a146SMarcel Moolenaar 		case SIG_SETMASK:
1015645682fdSLuoqi Chen 			SIG_CANTMASK(*set);
1016645682fdSLuoqi Chen 			if (old)
10174093529dSJeff Roberson 				SIGSETLO(td->td_sigmask, *set);
1018645682fdSLuoqi Chen 			else
10194093529dSJeff Roberson 				td->td_sigmask = *set;
10204093529dSJeff Roberson 			signotify(td);
10212c42a146SMarcel Moolenaar 			break;
10222c42a146SMarcel Moolenaar 		default:
10232c42a146SMarcel Moolenaar 			error = EINVAL;
10242c42a146SMarcel Moolenaar 			break;
10252c42a146SMarcel Moolenaar 		}
10262c42a146SMarcel Moolenaar 	}
10274093529dSJeff Roberson 	PROC_UNLOCK(td->td_proc);
10282c42a146SMarcel Moolenaar 	return (error);
10292c42a146SMarcel Moolenaar }
10302c42a146SMarcel Moolenaar 
1031d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1032df8bae1dSRodney W. Grimes struct sigprocmask_args {
1033df8bae1dSRodney W. Grimes 	int	how;
10342c42a146SMarcel Moolenaar 	const sigset_t *set;
10352c42a146SMarcel Moolenaar 	sigset_t *oset;
1036df8bae1dSRodney W. Grimes };
1037d2d3e875SBruce Evans #endif
103826f9a767SRodney W. Grimes int
1039b40ce416SJulian Elischer sigprocmask(td, uap)
1040b40ce416SJulian Elischer 	register struct thread *td;
1041df8bae1dSRodney W. Grimes 	struct sigprocmask_args *uap;
1042df8bae1dSRodney W. Grimes {
10432c42a146SMarcel Moolenaar 	sigset_t set, oset;
10442c42a146SMarcel Moolenaar 	sigset_t *setp, *osetp;
10452c42a146SMarcel Moolenaar 	int error;
1046df8bae1dSRodney W. Grimes 
10476f841fb7SMarcel Moolenaar 	setp = (uap->set != NULL) ? &set : NULL;
10486f841fb7SMarcel Moolenaar 	osetp = (uap->oset != NULL) ? &oset : NULL;
10492c42a146SMarcel Moolenaar 	if (setp) {
10506f841fb7SMarcel Moolenaar 		error = copyin(uap->set, setp, sizeof(set));
10512c42a146SMarcel Moolenaar 		if (error)
10522c42a146SMarcel Moolenaar 			return (error);
1053df8bae1dSRodney W. Grimes 	}
1054e77daab1SJohn Baldwin 	error = kern_sigprocmask(td, uap->how, setp, osetp, 0);
10552c42a146SMarcel Moolenaar 	if (osetp && !error) {
10566f841fb7SMarcel Moolenaar 		error = copyout(osetp, uap->oset, sizeof(oset));
10572c42a146SMarcel Moolenaar 	}
10582c42a146SMarcel Moolenaar 	return (error);
10592c42a146SMarcel Moolenaar }
10602c42a146SMarcel Moolenaar 
106131c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
10622c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
10632c42a146SMarcel Moolenaar struct osigprocmask_args {
10642c42a146SMarcel Moolenaar 	int	how;
10652c42a146SMarcel Moolenaar 	osigset_t mask;
10662c42a146SMarcel Moolenaar };
10672c42a146SMarcel Moolenaar #endif
10682c42a146SMarcel Moolenaar int
1069b40ce416SJulian Elischer osigprocmask(td, uap)
1070b40ce416SJulian Elischer 	register struct thread *td;
10712c42a146SMarcel Moolenaar 	struct osigprocmask_args *uap;
10722c42a146SMarcel Moolenaar {
10732c42a146SMarcel Moolenaar 	sigset_t set, oset;
10742c42a146SMarcel Moolenaar 	int error;
10752c42a146SMarcel Moolenaar 
10762c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
1077e77daab1SJohn Baldwin 	error = kern_sigprocmask(td, uap->how, &set, &oset, 1);
1078b40ce416SJulian Elischer 	SIG2OSIG(oset, td->td_retval[0]);
1079df8bae1dSRodney W. Grimes 	return (error);
1080df8bae1dSRodney W. Grimes }
108131c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1082df8bae1dSRodney W. Grimes 
108326f9a767SRodney W. Grimes int
1084a447cd8bSJeff Roberson sigwait(struct thread *td, struct sigwait_args *uap)
1085a447cd8bSJeff Roberson {
10869104847fSDavid Xu 	ksiginfo_t ksi;
1087a447cd8bSJeff Roberson 	sigset_t set;
1088a447cd8bSJeff Roberson 	int error;
1089a447cd8bSJeff Roberson 
1090a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
109136939a0aSDavid Xu 	if (error) {
109236939a0aSDavid Xu 		td->td_retval[0] = error;
109336939a0aSDavid Xu 		return (0);
109436939a0aSDavid Xu 	}
1095a447cd8bSJeff Roberson 
10969104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, NULL);
109736939a0aSDavid Xu 	if (error) {
109836939a0aSDavid Xu 		if (error == ERESTART)
1099a447cd8bSJeff Roberson 			return (error);
110036939a0aSDavid Xu 		td->td_retval[0] = error;
110136939a0aSDavid Xu 		return (0);
110236939a0aSDavid Xu 	}
1103a447cd8bSJeff Roberson 
11049104847fSDavid Xu 	error = copyout(&ksi.ksi_signo, uap->sig, sizeof(ksi.ksi_signo));
110536939a0aSDavid Xu 	td->td_retval[0] = error;
110636939a0aSDavid Xu 	return (0);
1107a447cd8bSJeff Roberson }
11080c14ff0eSRobert Watson 
1109a447cd8bSJeff Roberson int
1110a447cd8bSJeff Roberson sigtimedwait(struct thread *td, struct sigtimedwait_args *uap)
1111a447cd8bSJeff Roberson {
1112a447cd8bSJeff Roberson 	struct timespec ts;
1113a447cd8bSJeff Roberson 	struct timespec *timeout;
1114a447cd8bSJeff Roberson 	sigset_t set;
11159104847fSDavid Xu 	ksiginfo_t ksi;
1116a447cd8bSJeff Roberson 	int error;
1117a447cd8bSJeff Roberson 
1118a447cd8bSJeff Roberson 	if (uap->timeout) {
1119a447cd8bSJeff Roberson 		error = copyin(uap->timeout, &ts, sizeof(ts));
1120a447cd8bSJeff Roberson 		if (error)
1121a447cd8bSJeff Roberson 			return (error);
1122a447cd8bSJeff Roberson 
1123a447cd8bSJeff Roberson 		timeout = &ts;
1124a447cd8bSJeff Roberson 	} else
1125a447cd8bSJeff Roberson 		timeout = NULL;
1126a447cd8bSJeff Roberson 
1127a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
1128a447cd8bSJeff Roberson 	if (error)
1129a447cd8bSJeff Roberson 		return (error);
1130a447cd8bSJeff Roberson 
11319104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, timeout);
1132a447cd8bSJeff Roberson 	if (error)
1133a447cd8bSJeff Roberson 		return (error);
11349dde3bc9SDavid Xu 
1135418228dfSDavid Xu 	if (uap->info)
11369104847fSDavid Xu 		error = copyout(&ksi.ksi_info, uap->info, sizeof(siginfo_t));
11379104847fSDavid Xu 
11389104847fSDavid Xu 	if (error == 0)
11399104847fSDavid Xu 		td->td_retval[0] = ksi.ksi_signo;
1140a447cd8bSJeff Roberson 	return (error);
1141a447cd8bSJeff Roberson }
1142a447cd8bSJeff Roberson 
1143a447cd8bSJeff Roberson int
1144a447cd8bSJeff Roberson sigwaitinfo(struct thread *td, struct sigwaitinfo_args *uap)
1145a447cd8bSJeff Roberson {
11469104847fSDavid Xu 	ksiginfo_t ksi;
1147a447cd8bSJeff Roberson 	sigset_t set;
1148a447cd8bSJeff Roberson 	int error;
1149a447cd8bSJeff Roberson 
1150a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
1151a447cd8bSJeff Roberson 	if (error)
1152a447cd8bSJeff Roberson 		return (error);
1153a447cd8bSJeff Roberson 
11549104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, NULL);
1155a447cd8bSJeff Roberson 	if (error)
1156a447cd8bSJeff Roberson 		return (error);
1157a447cd8bSJeff Roberson 
1158418228dfSDavid Xu 	if (uap->info)
11599104847fSDavid Xu 		error = copyout(&ksi.ksi_info, uap->info, sizeof(siginfo_t));
11609104847fSDavid Xu 
11619104847fSDavid Xu 	if (error == 0)
11629104847fSDavid Xu 		td->td_retval[0] = ksi.ksi_signo;
1163a447cd8bSJeff Roberson 	return (error);
1164a447cd8bSJeff Roberson }
1165a447cd8bSJeff Roberson 
1166c6511aeaSDavid Xu int
11679104847fSDavid Xu kern_sigtimedwait(struct thread *td, sigset_t waitset, ksiginfo_t *ksi,
1168a447cd8bSJeff Roberson 	struct timespec *timeout)
1169a447cd8bSJeff Roberson {
11703074d1b4SDavid Xu 	struct sigacts *ps;
11716675b36eSDavid Xu 	sigset_t savedmask;
1172a447cd8bSJeff Roberson 	struct proc *p;
11731089f031SDavid Xu 	int error, sig, hz, i, timevalid = 0;
11741089f031SDavid Xu 	struct timespec rts, ets, ts;
11751089f031SDavid Xu 	struct timeval tv;
1176a447cd8bSJeff Roberson 
1177a447cd8bSJeff Roberson 	p = td->td_proc;
1178a447cd8bSJeff Roberson 	error = 0;
1179a447cd8bSJeff Roberson 	sig = 0;
11809b73d239SMatt Jacob 	ets.tv_sec = 0;
11819b73d239SMatt Jacob 	ets.tv_nsec = 0;
11823074d1b4SDavid Xu 	SIG_CANTMASK(waitset);
1183a447cd8bSJeff Roberson 
1184a447cd8bSJeff Roberson 	PROC_LOCK(p);
1185a447cd8bSJeff Roberson 	ps = p->p_sigacts;
11863074d1b4SDavid Xu 	savedmask = td->td_sigmask;
11871089f031SDavid Xu 	if (timeout) {
11881089f031SDavid Xu 		if (timeout->tv_nsec >= 0 && timeout->tv_nsec < 1000000000) {
11891089f031SDavid Xu 			timevalid = 1;
11901089f031SDavid Xu 			getnanouptime(&rts);
11911089f031SDavid Xu 		 	ets = rts;
11921089f031SDavid Xu 			timespecadd(&ets, timeout);
11931089f031SDavid Xu 		}
11941089f031SDavid Xu 	}
11953074d1b4SDavid Xu 
11967e0221a2SDavid Xu restart:
11973074d1b4SDavid Xu 	for (i = 1; i <= _SIG_MAXSIG; ++i) {
11983074d1b4SDavid Xu 		if (!SIGISMEMBER(waitset, i))
11993074d1b4SDavid Xu 			continue;
12007e0221a2SDavid Xu 		if (!SIGISMEMBER(td->td_sigqueue.sq_signals, i)) {
12017e0221a2SDavid Xu 			if (SIGISMEMBER(p->p_sigqueue.sq_signals, i)) {
12028460a577SJohn Birrell #ifdef KSE
12033074d1b4SDavid Xu 				if (p->p_flag & P_SA) {
12043074d1b4SDavid Xu 					p->p_flag |= P_SIGEVENT;
12053074d1b4SDavid Xu 					wakeup(&p->p_siglist);
12063074d1b4SDavid Xu 				}
12078460a577SJohn Birrell #endif
12087e0221a2SDavid Xu 				sigqueue_move(&p->p_sigqueue,
12097e0221a2SDavid Xu 					&td->td_sigqueue, i);
12107e0221a2SDavid Xu 			} else
12117e0221a2SDavid Xu 				continue;
12127e0221a2SDavid Xu 		}
12137e0221a2SDavid Xu 
12143074d1b4SDavid Xu 		SIGFILLSET(td->td_sigmask);
12153074d1b4SDavid Xu 		SIG_CANTMASK(td->td_sigmask);
12163074d1b4SDavid Xu 		SIGDELSET(td->td_sigmask, i);
12173074d1b4SDavid Xu 		mtx_lock(&ps->ps_mtx);
12183074d1b4SDavid Xu 		sig = cursig(td);
12193074d1b4SDavid Xu 		mtx_unlock(&ps->ps_mtx);
12206675b36eSDavid Xu 		if (sig)
1221a447cd8bSJeff Roberson 			goto out;
12227e0221a2SDavid Xu 		else {
12237e0221a2SDavid Xu 			/*
12247e0221a2SDavid Xu 			 * Because cursig() may have stopped current thread,
12257e0221a2SDavid Xu 			 * after it is resumed, things may have already been
12267e0221a2SDavid Xu 			 * changed, it should rescan any pending signals.
12277e0221a2SDavid Xu 			 */
12287e0221a2SDavid Xu 			goto restart;
12293074d1b4SDavid Xu 		}
12307e0221a2SDavid Xu 	}
12317e0221a2SDavid Xu 
12323074d1b4SDavid Xu 	if (error)
12333074d1b4SDavid Xu 		goto out;
12343074d1b4SDavid Xu 
1235a447cd8bSJeff Roberson 	/*
1236a447cd8bSJeff Roberson 	 * POSIX says this must be checked after looking for pending
1237a447cd8bSJeff Roberson 	 * signals.
1238a447cd8bSJeff Roberson 	 */
1239a447cd8bSJeff Roberson 	if (timeout) {
12401089f031SDavid Xu 		if (!timevalid) {
1241a447cd8bSJeff Roberson 			error = EINVAL;
1242a447cd8bSJeff Roberson 			goto out;
1243a447cd8bSJeff Roberson 		}
12441089f031SDavid Xu 		getnanouptime(&rts);
12451089f031SDavid Xu 		if (timespeccmp(&rts, &ets, >=)) {
12463074d1b4SDavid Xu 			error = EAGAIN;
12473074d1b4SDavid Xu 			goto out;
12483074d1b4SDavid Xu 		}
12491089f031SDavid Xu 		ts = ets;
12501089f031SDavid Xu 		timespecsub(&ts, &rts);
12511089f031SDavid Xu 		TIMESPEC_TO_TIMEVAL(&tv, &ts);
1252a447cd8bSJeff Roberson 		hz = tvtohz(&tv);
1253a447cd8bSJeff Roberson 	} else
1254a447cd8bSJeff Roberson 		hz = 0;
1255a447cd8bSJeff Roberson 
12566675b36eSDavid Xu 	td->td_sigmask = savedmask;
12576675b36eSDavid Xu 	SIGSETNAND(td->td_sigmask, waitset);
12586675b36eSDavid Xu 	signotify(td);
125986b5e563SDag-Erling Smørgrav 	error = msleep(&ps, &p->p_mtx, PPAUSE|PCATCH, "sigwait", hz);
12601089f031SDavid Xu 	if (timeout) {
12611089f031SDavid Xu 		if (error == ERESTART) {
12621089f031SDavid Xu 			/* timeout can not be restarted. */
12633074d1b4SDavid Xu 			error = EINTR;
12641089f031SDavid Xu 		} else if (error == EAGAIN) {
12651089f031SDavid Xu 			/* will calculate timeout by ourself. */
12661089f031SDavid Xu 			error = 0;
12671089f031SDavid Xu 		}
12681089f031SDavid Xu 	}
12697e0221a2SDavid Xu 	goto restart;
12709dde3bc9SDavid Xu 
1271a447cd8bSJeff Roberson out:
12727e0221a2SDavid Xu 	td->td_sigmask = savedmask;
12737e0221a2SDavid Xu 	signotify(td);
1274a447cd8bSJeff Roberson 	if (sig) {
12755da49fcbSDavid Xu 		ksiginfo_init(ksi);
12769104847fSDavid Xu 		sigqueue_get(&td->td_sigqueue, sig, ksi);
12779104847fSDavid Xu 		ksi->ksi_signo = sig;
127856c06c4bSDavid Xu 		if (ksi->ksi_code == SI_TIMER)
127956c06c4bSDavid Xu 			itimer_accept(p, ksi->ksi_timerid, ksi);
12803074d1b4SDavid Xu 		error = 0;
12817e0221a2SDavid Xu 
12827e0221a2SDavid Xu #ifdef KTRACE
12837e0221a2SDavid Xu 		if (KTRPOINT(td, KTR_PSIG)) {
12847e0221a2SDavid Xu 			sig_t action;
12857e0221a2SDavid Xu 
12863074d1b4SDavid Xu 			mtx_lock(&ps->ps_mtx);
1287a447cd8bSJeff Roberson 			action = ps->ps_sigact[_SIG_IDX(sig)];
128890af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
12893074d1b4SDavid Xu 			ktrpsig(sig, action, &td->td_sigmask, 0);
12907e0221a2SDavid Xu 		}
1291a447cd8bSJeff Roberson #endif
12927b8d5e48SDavid Xu 		if (sig == SIGKILL)
12937e0221a2SDavid Xu 			sigexit(td, sig);
12943074d1b4SDavid Xu 	}
1295a447cd8bSJeff Roberson 	PROC_UNLOCK(p);
1296a447cd8bSJeff Roberson 	return (error);
1297a447cd8bSJeff Roberson }
1298a447cd8bSJeff Roberson 
12999104847fSDavid Xu #ifndef _SYS_SYSPROTO_H_
13009104847fSDavid Xu struct sigpending_args {
13019104847fSDavid Xu 	sigset_t	*set;
13029104847fSDavid Xu };
13039104847fSDavid Xu #endif
1304a447cd8bSJeff Roberson int
1305b40ce416SJulian Elischer sigpending(td, uap)
1306b40ce416SJulian Elischer 	struct thread *td;
1307df8bae1dSRodney W. Grimes 	struct sigpending_args *uap;
1308df8bae1dSRodney W. Grimes {
1309b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
13109104847fSDavid Xu 	sigset_t pending;
1311df8bae1dSRodney W. Grimes 
1312628d2653SJohn Baldwin 	PROC_LOCK(p);
13139104847fSDavid Xu 	pending = p->p_sigqueue.sq_signals;
13149104847fSDavid Xu 	SIGSETOR(pending, td->td_sigqueue.sq_signals);
1315628d2653SJohn Baldwin 	PROC_UNLOCK(p);
13169104847fSDavid Xu 	return (copyout(&pending, uap->set, sizeof(sigset_t)));
13172c42a146SMarcel Moolenaar }
13182c42a146SMarcel Moolenaar 
131931c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
13202c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
13212c42a146SMarcel Moolenaar struct osigpending_args {
13222c42a146SMarcel Moolenaar 	int	dummy;
13232c42a146SMarcel Moolenaar };
13242c42a146SMarcel Moolenaar #endif
13252c42a146SMarcel Moolenaar int
1326b40ce416SJulian Elischer osigpending(td, uap)
1327b40ce416SJulian Elischer 	struct thread *td;
13282c42a146SMarcel Moolenaar 	struct osigpending_args *uap;
13292c42a146SMarcel Moolenaar {
1330b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
13319104847fSDavid Xu 	sigset_t pending;
1332b40ce416SJulian Elischer 
1333628d2653SJohn Baldwin 	PROC_LOCK(p);
13349104847fSDavid Xu 	pending = p->p_sigqueue.sq_signals;
13359104847fSDavid Xu 	SIGSETOR(pending, td->td_sigqueue.sq_signals);
1336628d2653SJohn Baldwin 	PROC_UNLOCK(p);
13379104847fSDavid Xu 	SIG2OSIG(pending, td->td_retval[0]);
1338df8bae1dSRodney W. Grimes 	return (0);
1339df8bae1dSRodney W. Grimes }
134031c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1341df8bae1dSRodney W. Grimes 
13421930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1343df8bae1dSRodney W. Grimes /*
1344df8bae1dSRodney W. Grimes  * Generalized interface signal handler, 4.3-compatible.
1345df8bae1dSRodney W. Grimes  */
1346d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1347df8bae1dSRodney W. Grimes struct osigvec_args {
1348df8bae1dSRodney W. Grimes 	int	signum;
1349df8bae1dSRodney W. Grimes 	struct	sigvec *nsv;
1350df8bae1dSRodney W. Grimes 	struct	sigvec *osv;
1351df8bae1dSRodney W. Grimes };
1352d2d3e875SBruce Evans #endif
1353df8bae1dSRodney W. Grimes /* ARGSUSED */
135426f9a767SRodney W. Grimes int
1355b40ce416SJulian Elischer osigvec(td, uap)
1356b40ce416SJulian Elischer 	struct thread *td;
1357df8bae1dSRodney W. Grimes 	register struct osigvec_args *uap;
1358df8bae1dSRodney W. Grimes {
1359df8bae1dSRodney W. Grimes 	struct sigvec vec;
13602c42a146SMarcel Moolenaar 	struct sigaction nsa, osa;
13612c42a146SMarcel Moolenaar 	register struct sigaction *nsap, *osap;
13622c42a146SMarcel Moolenaar 	int error;
1363df8bae1dSRodney W. Grimes 
13646f841fb7SMarcel Moolenaar 	if (uap->signum <= 0 || uap->signum >= ONSIG)
13656f841fb7SMarcel Moolenaar 		return (EINVAL);
13666f841fb7SMarcel Moolenaar 	nsap = (uap->nsv != NULL) ? &nsa : NULL;
13676f841fb7SMarcel Moolenaar 	osap = (uap->osv != NULL) ? &osa : NULL;
13682c42a146SMarcel Moolenaar 	if (nsap) {
13696f841fb7SMarcel Moolenaar 		error = copyin(uap->nsv, &vec, sizeof(vec));
13702c42a146SMarcel Moolenaar 		if (error)
1371df8bae1dSRodney W. Grimes 			return (error);
13722c42a146SMarcel Moolenaar 		nsap->sa_handler = vec.sv_handler;
13732c42a146SMarcel Moolenaar 		OSIG2SIG(vec.sv_mask, nsap->sa_mask);
13742c42a146SMarcel Moolenaar 		nsap->sa_flags = vec.sv_flags;
13752c42a146SMarcel Moolenaar 		nsap->sa_flags ^= SA_RESTART;	/* opposite of SV_INTERRUPT */
1376df8bae1dSRodney W. Grimes 	}
13775edadff9SJohn Baldwin 	error = kern_sigaction(td, uap->signum, nsap, osap, KSA_OSIGSET);
13782c42a146SMarcel Moolenaar 	if (osap && !error) {
13792c42a146SMarcel Moolenaar 		vec.sv_handler = osap->sa_handler;
13802c42a146SMarcel Moolenaar 		SIG2OSIG(osap->sa_mask, vec.sv_mask);
13812c42a146SMarcel Moolenaar 		vec.sv_flags = osap->sa_flags;
13822c42a146SMarcel Moolenaar 		vec.sv_flags &= ~SA_NOCLDWAIT;
13832c42a146SMarcel Moolenaar 		vec.sv_flags ^= SA_RESTART;
13846f841fb7SMarcel Moolenaar 		error = copyout(&vec, uap->osv, sizeof(vec));
13852c42a146SMarcel Moolenaar 	}
13862c42a146SMarcel Moolenaar 	return (error);
1387df8bae1dSRodney W. Grimes }
1388df8bae1dSRodney W. Grimes 
1389d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1390df8bae1dSRodney W. Grimes struct osigblock_args {
1391df8bae1dSRodney W. Grimes 	int	mask;
1392df8bae1dSRodney W. Grimes };
1393d2d3e875SBruce Evans #endif
139426f9a767SRodney W. Grimes int
1395b40ce416SJulian Elischer osigblock(td, uap)
1396b40ce416SJulian Elischer 	register struct thread *td;
1397df8bae1dSRodney W. Grimes 	struct osigblock_args *uap;
1398df8bae1dSRodney W. Grimes {
1399b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
14002c42a146SMarcel Moolenaar 	sigset_t set;
1401df8bae1dSRodney W. Grimes 
14022c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
14032c42a146SMarcel Moolenaar 	SIG_CANTMASK(set);
1404628d2653SJohn Baldwin 	PROC_LOCK(p);
14054093529dSJeff Roberson 	SIG2OSIG(td->td_sigmask, td->td_retval[0]);
14064093529dSJeff Roberson 	SIGSETOR(td->td_sigmask, set);
1407628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1408df8bae1dSRodney W. Grimes 	return (0);
1409df8bae1dSRodney W. Grimes }
1410df8bae1dSRodney W. Grimes 
1411d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1412df8bae1dSRodney W. Grimes struct osigsetmask_args {
1413df8bae1dSRodney W. Grimes 	int	mask;
1414df8bae1dSRodney W. Grimes };
1415d2d3e875SBruce Evans #endif
141626f9a767SRodney W. Grimes int
1417b40ce416SJulian Elischer osigsetmask(td, uap)
1418b40ce416SJulian Elischer 	struct thread *td;
1419df8bae1dSRodney W. Grimes 	struct osigsetmask_args *uap;
1420df8bae1dSRodney W. Grimes {
1421b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
14222c42a146SMarcel Moolenaar 	sigset_t set;
1423df8bae1dSRodney W. Grimes 
14242c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
14252c42a146SMarcel Moolenaar 	SIG_CANTMASK(set);
1426628d2653SJohn Baldwin 	PROC_LOCK(p);
14274093529dSJeff Roberson 	SIG2OSIG(td->td_sigmask, td->td_retval[0]);
14284093529dSJeff Roberson 	SIGSETLO(td->td_sigmask, set);
14294093529dSJeff Roberson 	signotify(td);
1430628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1431df8bae1dSRodney W. Grimes 	return (0);
1432df8bae1dSRodney W. Grimes }
14331930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1434df8bae1dSRodney W. Grimes 
1435df8bae1dSRodney W. Grimes /*
1436873fbcd7SRobert Watson  * Suspend calling thread until signal, providing mask to be set in the
1437873fbcd7SRobert Watson  * meantime.
1438df8bae1dSRodney W. Grimes  */
1439d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1440df8bae1dSRodney W. Grimes struct sigsuspend_args {
14412c42a146SMarcel Moolenaar 	const sigset_t *sigmask;
1442df8bae1dSRodney W. Grimes };
1443d2d3e875SBruce Evans #endif
1444df8bae1dSRodney W. Grimes /* ARGSUSED */
144526f9a767SRodney W. Grimes int
1446b40ce416SJulian Elischer sigsuspend(td, uap)
1447b40ce416SJulian Elischer 	struct thread *td;
1448df8bae1dSRodney W. Grimes 	struct sigsuspend_args *uap;
1449df8bae1dSRodney W. Grimes {
14502c42a146SMarcel Moolenaar 	sigset_t mask;
14512c42a146SMarcel Moolenaar 	int error;
14522c42a146SMarcel Moolenaar 
14536f841fb7SMarcel Moolenaar 	error = copyin(uap->sigmask, &mask, sizeof(mask));
14542c42a146SMarcel Moolenaar 	if (error)
14552c42a146SMarcel Moolenaar 		return (error);
14568f19eb88SIan Dowse 	return (kern_sigsuspend(td, mask));
14578f19eb88SIan Dowse }
14588f19eb88SIan Dowse 
14598f19eb88SIan Dowse int
14608f19eb88SIan Dowse kern_sigsuspend(struct thread *td, sigset_t mask)
14618f19eb88SIan Dowse {
14628f19eb88SIan Dowse 	struct proc *p = td->td_proc;
1463df8bae1dSRodney W. Grimes 
1464df8bae1dSRodney W. Grimes 	/*
1465645682fdSLuoqi Chen 	 * When returning from sigsuspend, we want
1466df8bae1dSRodney W. Grimes 	 * the old mask to be restored after the
1467df8bae1dSRodney W. Grimes 	 * signal handler has finished.  Thus, we
1468df8bae1dSRodney W. Grimes 	 * save it here and mark the sigacts structure
1469df8bae1dSRodney W. Grimes 	 * to indicate this.
1470df8bae1dSRodney W. Grimes 	 */
1471628d2653SJohn Baldwin 	PROC_LOCK(p);
14724093529dSJeff Roberson 	td->td_oldsigmask = td->td_sigmask;
14735e26dcb5SJohn Baldwin 	td->td_pflags |= TDP_OLDMASK;
1474645682fdSLuoqi Chen 	SIG_CANTMASK(mask);
14754093529dSJeff Roberson 	td->td_sigmask = mask;
14764093529dSJeff Roberson 	signotify(td);
147786b5e563SDag-Erling Smørgrav 	while (msleep(&p->p_sigacts, &p->p_mtx, PPAUSE|PCATCH, "pause", 0) == 0)
14782c42a146SMarcel Moolenaar 		/* void */;
1479628d2653SJohn Baldwin 	PROC_UNLOCK(p);
14802c42a146SMarcel Moolenaar 	/* always return EINTR rather than ERESTART... */
14812c42a146SMarcel Moolenaar 	return (EINTR);
14822c42a146SMarcel Moolenaar }
14832c42a146SMarcel Moolenaar 
148431c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
148597563428SAlexander Kabaev /*
148697563428SAlexander Kabaev  * Compatibility sigsuspend call for old binaries.  Note nonstandard calling
148797563428SAlexander Kabaev  * convention: libc stub passes mask, not pointer, to save a copyin.
148897563428SAlexander Kabaev  */
14892c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
14902c42a146SMarcel Moolenaar struct osigsuspend_args {
14912c42a146SMarcel Moolenaar 	osigset_t mask;
14922c42a146SMarcel Moolenaar };
14932c42a146SMarcel Moolenaar #endif
14942c42a146SMarcel Moolenaar /* ARGSUSED */
14952c42a146SMarcel Moolenaar int
1496b40ce416SJulian Elischer osigsuspend(td, uap)
1497b40ce416SJulian Elischer 	struct thread *td;
14982c42a146SMarcel Moolenaar 	struct osigsuspend_args *uap;
14992c42a146SMarcel Moolenaar {
1500b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
1501645682fdSLuoqi Chen 	sigset_t mask;
15022c42a146SMarcel Moolenaar 
1503628d2653SJohn Baldwin 	PROC_LOCK(p);
15044093529dSJeff Roberson 	td->td_oldsigmask = td->td_sigmask;
15055e26dcb5SJohn Baldwin 	td->td_pflags |= TDP_OLDMASK;
1506645682fdSLuoqi Chen 	OSIG2SIG(uap->mask, mask);
1507645682fdSLuoqi Chen 	SIG_CANTMASK(mask);
15084093529dSJeff Roberson 	SIGSETLO(td->td_sigmask, mask);
15094093529dSJeff Roberson 	signotify(td);
151086b5e563SDag-Erling Smørgrav 	while (msleep(&p->p_sigacts, &p->p_mtx, PPAUSE|PCATCH, "opause", 0) == 0)
1511df8bae1dSRodney W. Grimes 		/* void */;
1512628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1513df8bae1dSRodney W. Grimes 	/* always return EINTR rather than ERESTART... */
1514df8bae1dSRodney W. Grimes 	return (EINTR);
1515df8bae1dSRodney W. Grimes }
151631c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1517df8bae1dSRodney W. Grimes 
15181930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1519d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1520df8bae1dSRodney W. Grimes struct osigstack_args {
1521df8bae1dSRodney W. Grimes 	struct	sigstack *nss;
1522df8bae1dSRodney W. Grimes 	struct	sigstack *oss;
1523df8bae1dSRodney W. Grimes };
1524d2d3e875SBruce Evans #endif
1525df8bae1dSRodney W. Grimes /* ARGSUSED */
152626f9a767SRodney W. Grimes int
1527b40ce416SJulian Elischer osigstack(td, uap)
1528b40ce416SJulian Elischer 	struct thread *td;
1529df8bae1dSRodney W. Grimes 	register struct osigstack_args *uap;
1530df8bae1dSRodney W. Grimes {
15315afe0c99SJohn Baldwin 	struct sigstack nss, oss;
1532fb99ab88SMatthew Dillon 	int error = 0;
1533fb99ab88SMatthew Dillon 
1534d034d459SMarcel Moolenaar 	if (uap->nss != NULL) {
15355afe0c99SJohn Baldwin 		error = copyin(uap->nss, &nss, sizeof(nss));
15365afe0c99SJohn Baldwin 		if (error)
15375afe0c99SJohn Baldwin 			return (error);
1538df8bae1dSRodney W. Grimes 	}
1539a30ec4b9SDavid Xu 	oss.ss_sp = td->td_sigstk.ss_sp;
15405afe0c99SJohn Baldwin 	oss.ss_onstack = sigonstack(cpu_getstack(td));
15415afe0c99SJohn Baldwin 	if (uap->nss != NULL) {
1542a30ec4b9SDavid Xu 		td->td_sigstk.ss_sp = nss.ss_sp;
1543a30ec4b9SDavid Xu 		td->td_sigstk.ss_size = 0;
1544a30ec4b9SDavid Xu 		td->td_sigstk.ss_flags |= nss.ss_onstack & SS_ONSTACK;
1545a30ec4b9SDavid Xu 		td->td_pflags |= TDP_ALTSTACK;
15465afe0c99SJohn Baldwin 	}
15475afe0c99SJohn Baldwin 	if (uap->oss != NULL)
15485afe0c99SJohn Baldwin 		error = copyout(&oss, uap->oss, sizeof(oss));
15495afe0c99SJohn Baldwin 
1550fb99ab88SMatthew Dillon 	return (error);
1551df8bae1dSRodney W. Grimes }
15521930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1553df8bae1dSRodney W. Grimes 
1554d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1555df8bae1dSRodney W. Grimes struct sigaltstack_args {
15562c42a146SMarcel Moolenaar 	stack_t	*ss;
15572c42a146SMarcel Moolenaar 	stack_t	*oss;
1558df8bae1dSRodney W. Grimes };
1559d2d3e875SBruce Evans #endif
1560df8bae1dSRodney W. Grimes /* ARGSUSED */
156126f9a767SRodney W. Grimes int
1562b40ce416SJulian Elischer sigaltstack(td, uap)
1563b40ce416SJulian Elischer 	struct thread *td;
1564df8bae1dSRodney W. Grimes 	register struct sigaltstack_args *uap;
1565df8bae1dSRodney W. Grimes {
15668f19eb88SIan Dowse 	stack_t ss, oss;
15678f19eb88SIan Dowse 	int error;
15688f19eb88SIan Dowse 
15698f19eb88SIan Dowse 	if (uap->ss != NULL) {
15708f19eb88SIan Dowse 		error = copyin(uap->ss, &ss, sizeof(ss));
15718f19eb88SIan Dowse 		if (error)
15728f19eb88SIan Dowse 			return (error);
15738f19eb88SIan Dowse 	}
15748f19eb88SIan Dowse 	error = kern_sigaltstack(td, (uap->ss != NULL) ? &ss : NULL,
15758f19eb88SIan Dowse 	    (uap->oss != NULL) ? &oss : NULL);
15768f19eb88SIan Dowse 	if (error)
15778f19eb88SIan Dowse 		return (error);
15788f19eb88SIan Dowse 	if (uap->oss != NULL)
15798f19eb88SIan Dowse 		error = copyout(&oss, uap->oss, sizeof(stack_t));
15808f19eb88SIan Dowse 	return (error);
15818f19eb88SIan Dowse }
15828f19eb88SIan Dowse 
15838f19eb88SIan Dowse int
15848f19eb88SIan Dowse kern_sigaltstack(struct thread *td, stack_t *ss, stack_t *oss)
15858f19eb88SIan Dowse {
1586b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
1587fb99ab88SMatthew Dillon 	int oonstack;
1588fb99ab88SMatthew Dillon 
1589b40ce416SJulian Elischer 	oonstack = sigonstack(cpu_getstack(td));
1590d034d459SMarcel Moolenaar 
15918f19eb88SIan Dowse 	if (oss != NULL) {
1592a30ec4b9SDavid Xu 		*oss = td->td_sigstk;
1593a30ec4b9SDavid Xu 		oss->ss_flags = (td->td_pflags & TDP_ALTSTACK)
1594d034d459SMarcel Moolenaar 		    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
1595df8bae1dSRodney W. Grimes 	}
1596d034d459SMarcel Moolenaar 
15978f19eb88SIan Dowse 	if (ss != NULL) {
1598a30ec4b9SDavid Xu 		if (oonstack)
1599cf60731bSJohn Baldwin 			return (EPERM);
1600a30ec4b9SDavid Xu 		if ((ss->ss_flags & ~SS_DISABLE) != 0)
1601cf60731bSJohn Baldwin 			return (EINVAL);
16028f19eb88SIan Dowse 		if (!(ss->ss_flags & SS_DISABLE)) {
16039104847fSDavid Xu 			if (ss->ss_size < p->p_sysent->sv_minsigstksz)
1604cf60731bSJohn Baldwin 				return (ENOMEM);
16059104847fSDavid Xu 
1606a30ec4b9SDavid Xu 			td->td_sigstk = *ss;
1607a30ec4b9SDavid Xu 			td->td_pflags |= TDP_ALTSTACK;
1608628d2653SJohn Baldwin 		} else {
1609a30ec4b9SDavid Xu 			td->td_pflags &= ~TDP_ALTSTACK;
1610628d2653SJohn Baldwin 		}
1611d034d459SMarcel Moolenaar 	}
1612cf60731bSJohn Baldwin 	return (0);
1613df8bae1dSRodney W. Grimes }
1614df8bae1dSRodney W. Grimes 
1615d93f860cSPoul-Henning Kamp /*
1616d93f860cSPoul-Henning Kamp  * Common code for kill process group/broadcast kill.
1617d93f860cSPoul-Henning Kamp  * cp is calling process.
1618d93f860cSPoul-Henning Kamp  */
161937c84183SPoul-Henning Kamp static int
16201a88a252SMaxim Sobolev killpg1(td, sig, pgid, all)
16219c1ab3e0SJohn Baldwin 	register struct thread *td;
16221a88a252SMaxim Sobolev 	int sig, pgid, all;
1623d93f860cSPoul-Henning Kamp {
1624d93f860cSPoul-Henning Kamp 	register struct proc *p;
1625d93f860cSPoul-Henning Kamp 	struct pgrp *pgrp;
1626d93f860cSPoul-Henning Kamp 	int nfound = 0;
1627d93f860cSPoul-Henning Kamp 
1628553629ebSJake Burkholder 	if (all) {
1629d93f860cSPoul-Henning Kamp 		/*
1630d93f860cSPoul-Henning Kamp 		 * broadcast
1631d93f860cSPoul-Henning Kamp 		 */
16321005a129SJohn Baldwin 		sx_slock(&allproc_lock);
16334f506694SXin LI 		FOREACH_PROC_IN_SYSTEM(p) {
1634628d2653SJohn Baldwin 			PROC_LOCK(p);
16359c1ab3e0SJohn Baldwin 			if (p->p_pid <= 1 || p->p_flag & P_SYSTEM ||
163695f16c1eSPaul Saab 			    p == td->td_proc || p->p_state == PRS_NEW) {
1637628d2653SJohn Baldwin 				PROC_UNLOCK(p);
1638628d2653SJohn Baldwin 				continue;
1639628d2653SJohn Baldwin 			}
16401a88a252SMaxim Sobolev 			if (p_cansignal(td, p, sig) == 0) {
1641d93f860cSPoul-Henning Kamp 				nfound++;
164233a9ed9dSJohn Baldwin 				if (sig)
16432c42a146SMarcel Moolenaar 					psignal(p, sig);
1644628d2653SJohn Baldwin 			}
164533a9ed9dSJohn Baldwin 			PROC_UNLOCK(p);
1646d93f860cSPoul-Henning Kamp 		}
16471005a129SJohn Baldwin 		sx_sunlock(&allproc_lock);
1648553629ebSJake Burkholder 	} else {
1649ba626c1dSJohn Baldwin 		sx_slock(&proctree_lock);
1650f591779bSSeigo Tanimura 		if (pgid == 0) {
1651d93f860cSPoul-Henning Kamp 			/*
1652d93f860cSPoul-Henning Kamp 			 * zero pgid means send to my process group.
1653d93f860cSPoul-Henning Kamp 			 */
16549c1ab3e0SJohn Baldwin 			pgrp = td->td_proc->p_pgrp;
1655f591779bSSeigo Tanimura 			PGRP_LOCK(pgrp);
1656f591779bSSeigo Tanimura 		} else {
1657d93f860cSPoul-Henning Kamp 			pgrp = pgfind(pgid);
1658f591779bSSeigo Tanimura 			if (pgrp == NULL) {
1659ba626c1dSJohn Baldwin 				sx_sunlock(&proctree_lock);
1660d93f860cSPoul-Henning Kamp 				return (ESRCH);
1661d93f860cSPoul-Henning Kamp 			}
1662f591779bSSeigo Tanimura 		}
1663ba626c1dSJohn Baldwin 		sx_sunlock(&proctree_lock);
16642e3c8fcbSPoul-Henning Kamp 		LIST_FOREACH(p, &pgrp->pg_members, p_pglist) {
1665628d2653SJohn Baldwin 			PROC_LOCK(p);
166695f16c1eSPaul Saab 			if (p->p_pid <= 1 || p->p_flag & P_SYSTEM ||
166795f16c1eSPaul Saab 				p->p_state == PRS_NEW ) {
1668628d2653SJohn Baldwin 				PROC_UNLOCK(p);
1669628d2653SJohn Baldwin 				continue;
1670628d2653SJohn Baldwin 			}
16711a88a252SMaxim Sobolev 			if (p_cansignal(td, p, sig) == 0) {
1672d93f860cSPoul-Henning Kamp 				nfound++;
167333a9ed9dSJohn Baldwin 				if (sig)
16742c42a146SMarcel Moolenaar 					psignal(p, sig);
1675628d2653SJohn Baldwin 			}
167633a9ed9dSJohn Baldwin 			PROC_UNLOCK(p);
1677d93f860cSPoul-Henning Kamp 		}
1678f591779bSSeigo Tanimura 		PGRP_UNLOCK(pgrp);
1679d93f860cSPoul-Henning Kamp 	}
1680d93f860cSPoul-Henning Kamp 	return (nfound ? 0 : ESRCH);
1681d93f860cSPoul-Henning Kamp }
1682d93f860cSPoul-Henning Kamp 
1683d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1684df8bae1dSRodney W. Grimes struct kill_args {
1685df8bae1dSRodney W. Grimes 	int	pid;
1686df8bae1dSRodney W. Grimes 	int	signum;
1687df8bae1dSRodney W. Grimes };
1688d2d3e875SBruce Evans #endif
1689df8bae1dSRodney W. Grimes /* ARGSUSED */
169026f9a767SRodney W. Grimes int
1691b40ce416SJulian Elischer kill(td, uap)
1692b40ce416SJulian Elischer 	register struct thread *td;
1693df8bae1dSRodney W. Grimes 	register struct kill_args *uap;
1694df8bae1dSRodney W. Grimes {
1695df8bae1dSRodney W. Grimes 	register struct proc *p;
169690af4afaSJohn Baldwin 	int error;
1697df8bae1dSRodney W. Grimes 
1698bfd7575aSWayne Salamon 	AUDIT_ARG(signum, uap->signum);
16995ff3816dSChristian S.J. Peron 	AUDIT_ARG(pid, uap->pid);
17006c1534a7SPeter Wemm 	if ((u_int)uap->signum > _SIG_MAXSIG)
1701df8bae1dSRodney W. Grimes 		return (EINVAL);
1702fb99ab88SMatthew Dillon 
1703df8bae1dSRodney W. Grimes 	if (uap->pid > 0) {
1704df8bae1dSRodney W. Grimes 		/* kill single process */
17050b011ea3SPawel Jakub Dawidek 		if ((p = pfind(uap->pid)) == NULL) {
170624b2151fSPawel Jakub Dawidek 			if ((p = zpfind(uap->pid)) == NULL)
170790af4afaSJohn Baldwin 				return (ESRCH);
17080b011ea3SPawel Jakub Dawidek 		}
1709bfd7575aSWayne Salamon 		AUDIT_ARG(process, p);
17101a88a252SMaxim Sobolev 		error = p_cansignal(td, p, uap->signum);
171190af4afaSJohn Baldwin 		if (error == 0 && uap->signum)
1712df8bae1dSRodney W. Grimes 			psignal(p, uap->signum);
1713628d2653SJohn Baldwin 		PROC_UNLOCK(p);
171490af4afaSJohn Baldwin 		return (error);
1715df8bae1dSRodney W. Grimes 	}
1716df8bae1dSRodney W. Grimes 	switch (uap->pid) {
1717df8bae1dSRodney W. Grimes 	case -1:		/* broadcast signal */
17181a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, 0, 1));
1719df8bae1dSRodney W. Grimes 	case 0:			/* signal own process group */
17201a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, 0, 0));
1721df8bae1dSRodney W. Grimes 	default:		/* negative explicit process group */
17221a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, -uap->pid, 0));
1723df8bae1dSRodney W. Grimes 	}
172490af4afaSJohn Baldwin 	/* NOTREACHED */
1725df8bae1dSRodney W. Grimes }
1726df8bae1dSRodney W. Grimes 
17271930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1728d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1729df8bae1dSRodney W. Grimes struct okillpg_args {
1730df8bae1dSRodney W. Grimes 	int	pgid;
1731df8bae1dSRodney W. Grimes 	int	signum;
1732df8bae1dSRodney W. Grimes };
1733d2d3e875SBruce Evans #endif
1734df8bae1dSRodney W. Grimes /* ARGSUSED */
173526f9a767SRodney W. Grimes int
1736b40ce416SJulian Elischer okillpg(td, uap)
1737b40ce416SJulian Elischer 	struct thread *td;
1738df8bae1dSRodney W. Grimes 	register struct okillpg_args *uap;
1739df8bae1dSRodney W. Grimes {
1740df8bae1dSRodney W. Grimes 
1741bfd7575aSWayne Salamon 	AUDIT_ARG(signum, uap->signum);
1742bfd7575aSWayne Salamon 	AUDIT_ARG(pid, uap->pgid);
17436c1534a7SPeter Wemm 	if ((u_int)uap->signum > _SIG_MAXSIG)
1744df8bae1dSRodney W. Grimes 		return (EINVAL);
17459104847fSDavid Xu 
17461a88a252SMaxim Sobolev 	return (killpg1(td, uap->signum, uap->pgid, 0));
1747df8bae1dSRodney W. Grimes }
17481930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1749df8bae1dSRodney W. Grimes 
17509104847fSDavid Xu #ifndef _SYS_SYSPROTO_H_
17519104847fSDavid Xu struct sigqueue_args {
17529104847fSDavid Xu 	pid_t pid;
17539104847fSDavid Xu 	int signum;
17549104847fSDavid Xu 	/* union sigval */ void *value;
17559104847fSDavid Xu };
17569104847fSDavid Xu #endif
17579104847fSDavid Xu int
17589104847fSDavid Xu sigqueue(struct thread *td, struct sigqueue_args *uap)
17599104847fSDavid Xu {
17609104847fSDavid Xu 	ksiginfo_t ksi;
17619104847fSDavid Xu 	struct proc *p;
17629104847fSDavid Xu 	int error;
17639104847fSDavid Xu 
17649104847fSDavid Xu 	if ((u_int)uap->signum > _SIG_MAXSIG)
17659104847fSDavid Xu 		return (EINVAL);
17669104847fSDavid Xu 
17679104847fSDavid Xu 	/*
17689104847fSDavid Xu 	 * Specification says sigqueue can only send signal to
17699104847fSDavid Xu 	 * single process.
17709104847fSDavid Xu 	 */
17719104847fSDavid Xu 	if (uap->pid <= 0)
17729104847fSDavid Xu 		return (EINVAL);
17739104847fSDavid Xu 
17749104847fSDavid Xu 	if ((p = pfind(uap->pid)) == NULL) {
17759104847fSDavid Xu 		if ((p = zpfind(uap->pid)) == NULL)
17769104847fSDavid Xu 			return (ESRCH);
17779104847fSDavid Xu 	}
17789104847fSDavid Xu 	error = p_cansignal(td, p, uap->signum);
17799104847fSDavid Xu 	if (error == 0 && uap->signum != 0) {
17809104847fSDavid Xu 		ksiginfo_init(&ksi);
17819104847fSDavid Xu 		ksi.ksi_signo = uap->signum;
17829104847fSDavid Xu 		ksi.ksi_code = SI_QUEUE;
17839104847fSDavid Xu 		ksi.ksi_pid = td->td_proc->p_pid;
17849104847fSDavid Xu 		ksi.ksi_uid = td->td_ucred->cr_ruid;
17858f0371f1SDavid Xu 		ksi.ksi_value.sival_ptr = uap->value;
17866d7b314bSDavid Xu 		error = tdsignal(p, NULL, ksi.ksi_signo, &ksi);
17879104847fSDavid Xu 	}
17889104847fSDavid Xu 	PROC_UNLOCK(p);
17899104847fSDavid Xu 	return (error);
17909104847fSDavid Xu }
17919104847fSDavid Xu 
1792df8bae1dSRodney W. Grimes /*
1793df8bae1dSRodney W. Grimes  * Send a signal to a process group.
1794df8bae1dSRodney W. Grimes  */
1795df8bae1dSRodney W. Grimes void
17962c42a146SMarcel Moolenaar gsignal(pgid, sig)
17972c42a146SMarcel Moolenaar 	int pgid, sig;
1798df8bae1dSRodney W. Grimes {
1799df8bae1dSRodney W. Grimes 	struct pgrp *pgrp;
1800df8bae1dSRodney W. Grimes 
1801f591779bSSeigo Tanimura 	if (pgid != 0) {
1802ba626c1dSJohn Baldwin 		sx_slock(&proctree_lock);
1803f591779bSSeigo Tanimura 		pgrp = pgfind(pgid);
1804ba626c1dSJohn Baldwin 		sx_sunlock(&proctree_lock);
1805f591779bSSeigo Tanimura 		if (pgrp != NULL) {
18062c42a146SMarcel Moolenaar 			pgsignal(pgrp, sig, 0);
1807f591779bSSeigo Tanimura 			PGRP_UNLOCK(pgrp);
1808f591779bSSeigo Tanimura 		}
1809f591779bSSeigo Tanimura 	}
1810df8bae1dSRodney W. Grimes }
1811df8bae1dSRodney W. Grimes 
1812df8bae1dSRodney W. Grimes /*
1813df8bae1dSRodney W. Grimes  * Send a signal to a process group.  If checktty is 1,
1814df8bae1dSRodney W. Grimes  * limit to members which have a controlling terminal.
1815df8bae1dSRodney W. Grimes  */
1816df8bae1dSRodney W. Grimes void
18172c42a146SMarcel Moolenaar pgsignal(pgrp, sig, checkctty)
1818df8bae1dSRodney W. Grimes 	struct pgrp *pgrp;
18192c42a146SMarcel Moolenaar 	int sig, checkctty;
1820df8bae1dSRodney W. Grimes {
1821df8bae1dSRodney W. Grimes 	register struct proc *p;
1822df8bae1dSRodney W. Grimes 
1823628d2653SJohn Baldwin 	if (pgrp) {
1824f591779bSSeigo Tanimura 		PGRP_LOCK_ASSERT(pgrp, MA_OWNED);
1825628d2653SJohn Baldwin 		LIST_FOREACH(p, &pgrp->pg_members, p_pglist) {
1826628d2653SJohn Baldwin 			PROC_LOCK(p);
1827df8bae1dSRodney W. Grimes 			if (checkctty == 0 || p->p_flag & P_CONTROLT)
18282c42a146SMarcel Moolenaar 				psignal(p, sig);
1829628d2653SJohn Baldwin 			PROC_UNLOCK(p);
1830628d2653SJohn Baldwin 		}
1831628d2653SJohn Baldwin 	}
1832df8bae1dSRodney W. Grimes }
1833df8bae1dSRodney W. Grimes 
1834df8bae1dSRodney W. Grimes /*
18350c14ff0eSRobert Watson  * Send a signal caused by a trap to the current thread.  If it will be
18360c14ff0eSRobert Watson  * caught immediately, deliver it with correct code.  Otherwise, post it
18370c14ff0eSRobert Watson  * normally.
1838df8bae1dSRodney W. Grimes  */
1839df8bae1dSRodney W. Grimes void
18409104847fSDavid Xu trapsignal(struct thread *td, ksiginfo_t *ksi)
1841df8bae1dSRodney W. Grimes {
18421bf4700bSJeff Roberson 	struct sigacts *ps;
18431bf4700bSJeff Roberson 	struct proc *p;
18448460a577SJohn Birrell #ifdef KSE
18459dde3bc9SDavid Xu 	int error;
18468460a577SJohn Birrell #endif
18479104847fSDavid Xu 	int sig;
18489104847fSDavid Xu 	int code;
18491bf4700bSJeff Roberson 
18501bf4700bSJeff Roberson 	p = td->td_proc;
18519104847fSDavid Xu 	sig = ksi->ksi_signo;
18529104847fSDavid Xu 	code = ksi->ksi_code;
18539104847fSDavid Xu 	KASSERT(_SIG_VALID(sig), ("invalid signal"));
18549104847fSDavid Xu 
18558460a577SJohn Birrell #ifdef KSE
1856aa0aa7a1STim J. Robbins 	if (td->td_pflags & TDP_SA) {
18577eeaaf9bSDavid Xu 		if (td->td_mailbox == NULL)
18585995adc2SJulian Elischer 			thread_user_enter(td);
1859628d2653SJohn Baldwin 		PROC_LOCK(p);
18609dde3bc9SDavid Xu 		SIGDELSET(td->td_sigmask, sig);
1861a54e85fdSJeff Roberson 		thread_lock(td);
18629dde3bc9SDavid Xu 		/*
18639dde3bc9SDavid Xu 		 * Force scheduling an upcall, so UTS has chance to
18649dde3bc9SDavid Xu 		 * process the signal before thread runs again in
18659dde3bc9SDavid Xu 		 * userland.
18669dde3bc9SDavid Xu 		 */
18679dde3bc9SDavid Xu 		if (td->td_upcall)
18689dde3bc9SDavid Xu 			td->td_upcall->ku_flags |= KUF_DOUPCALL;
1869a54e85fdSJeff Roberson 		thread_unlock(td);
1870432b45deSDavid Xu 	} else {
18719dde3bc9SDavid Xu 		PROC_LOCK(p);
18729dde3bc9SDavid Xu 	}
18738460a577SJohn Birrell #else
18748460a577SJohn Birrell 	PROC_LOCK(p);
18758460a577SJohn Birrell #endif
1876ef3dab76STim J. Robbins 	ps = p->p_sigacts;
187790af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
187890af4afaSJohn Baldwin 	if ((p->p_flag & P_TRACED) == 0 && SIGISMEMBER(ps->ps_sigcatch, sig) &&
18794093529dSJeff Roberson 	    !SIGISMEMBER(td->td_sigmask, sig)) {
18801c4bcd05SJeff Roberson 		td->td_ru.ru_nsignals++;
1881df8bae1dSRodney W. Grimes #ifdef KTRACE
1882374a15aaSJohn Baldwin 		if (KTRPOINT(curthread, KTR_PSIG))
1883374a15aaSJohn Baldwin 			ktrpsig(sig, ps->ps_sigact[_SIG_IDX(sig)],
18844093529dSJeff Roberson 			    &td->td_sigmask, code);
1885df8bae1dSRodney W. Grimes #endif
18868460a577SJohn Birrell #ifdef KSE
1887aa0aa7a1STim J. Robbins 		if (!(td->td_pflags & TDP_SA))
18889104847fSDavid Xu 			(*p->p_sysent->sv_sendsig)(ps->ps_sigact[_SIG_IDX(sig)],
18899104847fSDavid Xu 				ksi, &td->td_sigmask);
18908460a577SJohn Birrell #else
18918460a577SJohn Birrell 		(*p->p_sysent->sv_sendsig)(ps->ps_sigact[_SIG_IDX(sig)],
18928460a577SJohn Birrell 				ksi, &td->td_sigmask);
18938460a577SJohn Birrell #endif
18948460a577SJohn Birrell #ifdef KSE
1895cbf4e354SDavid Xu 		else if (td->td_mailbox == NULL) {
1896cbf4e354SDavid Xu 			mtx_unlock(&ps->ps_mtx);
1897cbf4e354SDavid Xu 			/* UTS caused a sync signal */
1898cbf4e354SDavid Xu 			p->p_code = code;	/* XXX for core dump/debugger */
1899cbf4e354SDavid Xu 			p->p_sig = sig;		/* XXX to verify code */
1900cbf4e354SDavid Xu 			sigexit(td, sig);
1901cbf4e354SDavid Xu 		} else {
19029dde3bc9SDavid Xu 			mtx_unlock(&ps->ps_mtx);
1903cbf4e354SDavid Xu 			SIGADDSET(td->td_sigmask, sig);
19049dde3bc9SDavid Xu 			PROC_UNLOCK(p);
19059104847fSDavid Xu 			error = copyout(&ksi->ksi_info, &td->td_mailbox->tm_syncsig,
19069104847fSDavid Xu 			    sizeof(siginfo_t));
19079dde3bc9SDavid Xu 			PROC_LOCK(p);
1908432b45deSDavid Xu 			/* UTS memory corrupted */
19099dde3bc9SDavid Xu 			if (error)
1910cbf4e354SDavid Xu 				sigexit(td, SIGSEGV);
19119dde3bc9SDavid Xu 			mtx_lock(&ps->ps_mtx);
19129dde3bc9SDavid Xu 		}
19138460a577SJohn Birrell #endif
19144093529dSJeff Roberson 		SIGSETOR(td->td_sigmask, ps->ps_catchmask[_SIG_IDX(sig)]);
19152c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_signodefer, sig))
19164093529dSJeff Roberson 			SIGADDSET(td->td_sigmask, sig);
19172c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig)) {
1918289ccde0SPeter Wemm 			/*
19198f19eb88SIan Dowse 			 * See kern_sigaction() for origin of this code.
1920289ccde0SPeter Wemm 			 */
192190af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
19222c42a146SMarcel Moolenaar 			if (sig != SIGCONT &&
19232c42a146SMarcel Moolenaar 			    sigprop(sig) & SA_IGNORE)
192490af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
19252c42a146SMarcel Moolenaar 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
1926dedc04feSPeter Wemm 		}
192790af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
19286f841fb7SMarcel Moolenaar 	} else {
1929f71a882fSDavid Xu 		/*
1930f71a882fSDavid Xu 		 * Avoid a possible infinite loop if the thread
1931f71a882fSDavid Xu 		 * masking the signal or process is ignoring the
1932f71a882fSDavid Xu 		 * signal.
1933f71a882fSDavid Xu 		 */
1934f71a882fSDavid Xu 		if (kern_forcesigexit &&
1935f71a882fSDavid Xu 		    (SIGISMEMBER(td->td_sigmask, sig) ||
1936f71a882fSDavid Xu 		     ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN)) {
1937f71a882fSDavid Xu 			SIGDELSET(td->td_sigmask, sig);
1938f71a882fSDavid Xu 			SIGDELSET(ps->ps_sigcatch, sig);
1939f71a882fSDavid Xu 			SIGDELSET(ps->ps_sigignore, sig);
1940f71a882fSDavid Xu 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
1941f71a882fSDavid Xu 		}
194290af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
19436626c604SJulian Elischer 		p->p_code = code;	/* XXX for core dump/debugger */
19442c42a146SMarcel Moolenaar 		p->p_sig = sig;		/* XXX to verify code */
19456d7b314bSDavid Xu 		tdsignal(p, td, sig, ksi);
1946df8bae1dSRodney W. Grimes 	}
1947628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1948df8bae1dSRodney W. Grimes }
1949df8bae1dSRodney W. Grimes 
19504093529dSJeff Roberson static struct thread *
19514093529dSJeff Roberson sigtd(struct proc *p, int sig, int prop)
19524093529dSJeff Roberson {
19533074d1b4SDavid Xu 	struct thread *td, *signal_td;
19544093529dSJeff Roberson 
19554093529dSJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
19564093529dSJeff Roberson 
19574093529dSJeff Roberson 	/*
1958627451c1SDavid Xu 	 * Check if current thread can handle the signal without
1959627451c1SDavid Xu 	 * switching conetxt to another thread.
19604093529dSJeff Roberson 	 */
1961627451c1SDavid Xu 	if (curproc == p && !SIGISMEMBER(curthread->td_sigmask, sig))
1962627451c1SDavid Xu 		return (curthread);
19633074d1b4SDavid Xu 	signal_td = NULL;
1964a54e85fdSJeff Roberson 	PROC_SLOCK(p);
19653074d1b4SDavid Xu 	FOREACH_THREAD_IN_PROC(p, td) {
19663074d1b4SDavid Xu 		if (!SIGISMEMBER(td->td_sigmask, sig)) {
19673074d1b4SDavid Xu 			signal_td = td;
1968627451c1SDavid Xu 			break;
19693074d1b4SDavid Xu 		}
19703074d1b4SDavid Xu 	}
19713074d1b4SDavid Xu 	if (signal_td == NULL)
19723074d1b4SDavid Xu 		signal_td = FIRST_THREAD_IN_PROC(p);
1973a54e85fdSJeff Roberson 	PROC_SUNLOCK(p);
19743074d1b4SDavid Xu 	return (signal_td);
19754093529dSJeff Roberson }
19764093529dSJeff Roberson 
1977df8bae1dSRodney W. Grimes /*
1978df8bae1dSRodney W. Grimes  * Send the signal to the process.  If the signal has an action, the action
1979df8bae1dSRodney W. Grimes  * is usually performed by the target process rather than the caller; we add
1980df8bae1dSRodney W. Grimes  * the signal to the set of pending signals for the process.
1981df8bae1dSRodney W. Grimes  *
1982df8bae1dSRodney W. Grimes  * Exceptions:
1983df8bae1dSRodney W. Grimes  *   o When a stop signal is sent to a sleeping process that takes the
1984df8bae1dSRodney W. Grimes  *     default action, the process is stopped without awakening it.
1985df8bae1dSRodney W. Grimes  *   o SIGCONT restarts stopped processes (or puts them back to sleep)
1986df8bae1dSRodney W. Grimes  *     regardless of the signal action (eg, blocked or ignored).
1987df8bae1dSRodney W. Grimes  *
1988df8bae1dSRodney W. Grimes  * Other ignored signals are discarded immediately.
19894dec0e67SRobert Watson  *
19904dec0e67SRobert Watson  * NB: This function may be entered from the debugger via the "kill" DDB
19914dec0e67SRobert Watson  * command.  There is little that can be done to mitigate the possibly messy
19924dec0e67SRobert Watson  * side effects of this unwise possibility.
1993df8bae1dSRodney W. Grimes  */
1994df8bae1dSRodney W. Grimes void
19954093529dSJeff Roberson psignal(struct proc *p, int sig)
1996df8bae1dSRodney W. Grimes {
19976d7b314bSDavid Xu 	(void) tdsignal(p, NULL, sig, NULL);
19989104847fSDavid Xu }
19999104847fSDavid Xu 
20009104847fSDavid Xu int
20016d7b314bSDavid Xu psignal_event(struct proc *p, struct sigevent *sigev, ksiginfo_t *ksi)
20029104847fSDavid Xu {
20036d7b314bSDavid Xu 	struct thread *td = NULL;
200441b3077aSJacques Vidrine 
20054093529dSJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
20066d7b314bSDavid Xu 
20076d7b314bSDavid Xu 	KASSERT(!KSI_ONQ(ksi), ("psignal_event: ksi on queue"));
20084093529dSJeff Roberson 
20094093529dSJeff Roberson 	/*
20106d7b314bSDavid Xu 	 * ksi_code and other fields should be set before
20116d7b314bSDavid Xu 	 * calling this function.
20124093529dSJeff Roberson 	 */
20136d7b314bSDavid Xu 	ksi->ksi_signo = sigev->sigev_signo;
20146d7b314bSDavid Xu 	ksi->ksi_value = sigev->sigev_value;
20156d7b314bSDavid Xu 	if (sigev->sigev_notify == SIGEV_THREAD_ID) {
20166d7b314bSDavid Xu 		td = thread_find(p, sigev->sigev_notify_thread_id);
20176d7b314bSDavid Xu 		if (td == NULL)
20186d7b314bSDavid Xu 			return (ESRCH);
20196d7b314bSDavid Xu 	}
20206d7b314bSDavid Xu 	return (tdsignal(p, td, ksi->ksi_signo, ksi));
20214093529dSJeff Roberson }
20224093529dSJeff Roberson 
20239104847fSDavid Xu int
20246d7b314bSDavid Xu tdsignal(struct proc *p, struct thread *td, int sig, ksiginfo_t *ksi)
20254093529dSJeff Roberson {
20268460a577SJohn Birrell #ifdef KSE
20279dde3bc9SDavid Xu 	sigset_t saved;
20289104847fSDavid Xu 	int ret;
20299dde3bc9SDavid Xu 
20309dde3bc9SDavid Xu 	if (p->p_flag & P_SA)
20319104847fSDavid Xu 		saved = p->p_sigqueue.sq_signals;
20326d7b314bSDavid Xu 	ret = do_tdsignal(p, td, sig, ksi);
20339dde3bc9SDavid Xu 	if ((p->p_flag & P_SA) && !(p->p_flag & P_SIGEVENT)) {
20349104847fSDavid Xu 		if (!SIGSETEQ(saved, p->p_sigqueue.sq_signals)) {
20359dde3bc9SDavid Xu 			/* pending set changed */
20369dde3bc9SDavid Xu 			p->p_flag |= P_SIGEVENT;
20379dde3bc9SDavid Xu 			wakeup(&p->p_siglist);
20389dde3bc9SDavid Xu 		}
20399dde3bc9SDavid Xu 	}
20409104847fSDavid Xu 	return (ret);
20419dde3bc9SDavid Xu }
20429dde3bc9SDavid Xu 
20439104847fSDavid Xu static int
20446d7b314bSDavid Xu do_tdsignal(struct proc *p, struct thread *td, int sig, ksiginfo_t *ksi)
20459dde3bc9SDavid Xu {
20468460a577SJohn Birrell #endif
20479104847fSDavid Xu 	sig_t action;
20489104847fSDavid Xu 	sigqueue_t *sigqueue;
20499104847fSDavid Xu 	int prop;
205090af4afaSJohn Baldwin 	struct sigacts *ps;
205194f0972bSDavid Xu 	int intrval;
20529104847fSDavid Xu 	int ret = 0;
2053df8bae1dSRodney W. Grimes 
20546d7b314bSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
20556d7b314bSDavid Xu 
205641b3077aSJacques Vidrine 	if (!_SIG_VALID(sig))
20578460a577SJohn Birrell #ifdef KSE
2058d60226bdSXin LI 		panic("do_tdsignal(): invalid signal %d", sig);
20598460a577SJohn Birrell #else
2060d60226bdSXin LI 		panic("tdsignal(): invalid signal %d", sig);
20618460a577SJohn Birrell #endif
20624093529dSJeff Roberson 
20638460a577SJohn Birrell #ifdef KSE
20646d7b314bSDavid Xu 	KASSERT(ksi == NULL || !KSI_ONQ(ksi), ("do_tdsignal: ksi on queue"));
20658460a577SJohn Birrell #else
20668460a577SJohn Birrell 	KASSERT(ksi == NULL || !KSI_ONQ(ksi), ("tdsignal: ksi on queue"));
20678460a577SJohn Birrell #endif
20686d7b314bSDavid Xu 
20696d7b314bSDavid Xu 	/*
20706d7b314bSDavid Xu 	 * IEEE Std 1003.1-2001: return success when killing a zombie.
20716d7b314bSDavid Xu 	 */
20726d7b314bSDavid Xu 	if (p->p_state == PRS_ZOMBIE) {
20736d7b314bSDavid Xu 		if (ksi && (ksi->ksi_flags & KSI_INS))
20746d7b314bSDavid Xu 			ksiginfo_tryfree(ksi);
20756d7b314bSDavid Xu 		return (ret);
20766d7b314bSDavid Xu 	}
20776d7b314bSDavid Xu 
207890af4afaSJohn Baldwin 	ps = p->p_sigacts;
2079ad3b9257SJohn-Mark Gurney 	KNOTE_LOCKED(&p->p_klist, NOTE_SIGNAL | sig);
20802c42a146SMarcel Moolenaar 	prop = sigprop(sig);
20814093529dSJeff Roberson 
20824093529dSJeff Roberson 	/*
208314b5ae1aSMike Makonnen 	 * If the signal is blocked and not destined for this thread, then
208414b5ae1aSMike Makonnen 	 * assign it to the process so that we can find it later in the first
208514b5ae1aSMike Makonnen 	 * thread that unblocks it.  Otherwise, assign it to this thread now.
20864093529dSJeff Roberson 	 */
20876d7b314bSDavid Xu 	if (td == NULL) {
20886d7b314bSDavid Xu 		td = sigtd(p, sig, prop);
20896d7b314bSDavid Xu 		if (SIGISMEMBER(td->td_sigmask, sig))
20906d7b314bSDavid Xu 			sigqueue = &p->p_sigqueue;
20916d7b314bSDavid Xu 		else
20929104847fSDavid Xu 			sigqueue = &td->td_sigqueue;
20933074d1b4SDavid Xu 	} else {
20946d7b314bSDavid Xu 		KASSERT(td->td_proc == p, ("invalid thread"));
20959104847fSDavid Xu 		sigqueue = &td->td_sigqueue;
20963074d1b4SDavid Xu 	}
20974093529dSJeff Roberson 
2098df8bae1dSRodney W. Grimes 	/*
2099df8bae1dSRodney W. Grimes 	 * If the signal is being ignored,
2100df8bae1dSRodney W. Grimes 	 * then we forget about it immediately.
210190af4afaSJohn Baldwin 	 * (Note: we don't set SIGCONT in ps_sigignore,
2102df8bae1dSRodney W. Grimes 	 * and if it is set to SIG_IGN,
2103df8bae1dSRodney W. Grimes 	 * action will be SIG_DFL here.)
2104df8bae1dSRodney W. Grimes 	 */
210590af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
21060fc32899SJohn Baldwin 	if (SIGISMEMBER(ps->ps_sigignore, sig)) {
210790af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
21086d7b314bSDavid Xu 		if (ksi && (ksi->ksi_flags & KSI_INS))
21096d7b314bSDavid Xu 			ksiginfo_tryfree(ksi);
21109104847fSDavid Xu 		return (ret);
211190af4afaSJohn Baldwin 	}
21126675b36eSDavid Xu 	if (SIGISMEMBER(td->td_sigmask, sig))
2113df8bae1dSRodney W. Grimes 		action = SIG_HOLD;
211490af4afaSJohn Baldwin 	else if (SIGISMEMBER(ps->ps_sigcatch, sig))
2115df8bae1dSRodney W. Grimes 		action = SIG_CATCH;
2116df8bae1dSRodney W. Grimes 	else
2117df8bae1dSRodney W. Grimes 		action = SIG_DFL;
211894f0972bSDavid Xu 	if (SIGISMEMBER(ps->ps_sigintr, sig))
211994f0972bSDavid Xu 		intrval = EINTR;
212094f0972bSDavid Xu 	else
212194f0972bSDavid Xu 		intrval = ERESTART;
212290af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
2123df8bae1dSRodney W. Grimes 
21249104847fSDavid Xu 	if (prop & SA_CONT)
21259104847fSDavid Xu 		sigqueue_delete_stopmask_proc(p);
21269104847fSDavid Xu 	else if (prop & SA_STOP) {
2127df8bae1dSRodney W. Grimes 		/*
2128df8bae1dSRodney W. Grimes 		 * If sending a tty stop signal to a member of an orphaned
2129df8bae1dSRodney W. Grimes 		 * process group, discard the signal here if the action
2130df8bae1dSRodney W. Grimes 		 * is default; don't stop the process below if sleeping,
2131df8bae1dSRodney W. Grimes 		 * and don't clear any pending SIGCONT.
2132df8bae1dSRodney W. Grimes 		 */
2133e602ba25SJulian Elischer 		if ((prop & SA_TTYSTOP) &&
2134e602ba25SJulian Elischer 		    (p->p_pgrp->pg_jobc == 0) &&
21356d7b314bSDavid Xu 		    (action == SIG_DFL)) {
21366d7b314bSDavid Xu 			if (ksi && (ksi->ksi_flags & KSI_INS))
21376d7b314bSDavid Xu 				ksiginfo_tryfree(ksi);
21389104847fSDavid Xu 			return (ret);
21396d7b314bSDavid Xu 		}
2140a54e85fdSJeff Roberson 		PROC_SLOCK(p);
21419104847fSDavid Xu 		sigqueue_delete_proc(p, SIGCONT);
2142a54e85fdSJeff Roberson 		PROC_SUNLOCK(p);
2143ebceaf6dSDavid Xu 		if (p->p_flag & P_CONTINUED) {
21446933e3c1SJulian Elischer 			p->p_flag &= ~P_CONTINUED;
2145ebceaf6dSDavid Xu 			PROC_LOCK(p->p_pptr);
2146ebceaf6dSDavid Xu 			sigqueue_take(p->p_ksi);
2147ebceaf6dSDavid Xu 			PROC_UNLOCK(p->p_pptr);
2148ebceaf6dSDavid Xu 		}
2149df8bae1dSRodney W. Grimes 	}
21503074d1b4SDavid Xu 
21519104847fSDavid Xu 	ret = sigqueue_add(sigqueue, sig, ksi);
21529104847fSDavid Xu 	if (ret != 0)
21539104847fSDavid Xu 		return (ret);
21546d7b314bSDavid Xu 	signotify(td);
21555312b1c7SDavid Xu 	/*
21565312b1c7SDavid Xu 	 * Defer further processing for signals which are held,
21575312b1c7SDavid Xu 	 * except that stopped processes must be continued by SIGCONT.
21585312b1c7SDavid Xu 	 */
21595312b1c7SDavid Xu 	if (action == SIG_HOLD &&
21605312b1c7SDavid Xu 	    !((prop & SA_CONT) && (p->p_flag & P_STOPPED_SIG)))
21619104847fSDavid Xu 		return (ret);
2162df8bae1dSRodney W. Grimes 	/*
216390d75f78SAlfred Perlstein 	 * SIGKILL: Remove procfs STOPEVENTs.
216490d75f78SAlfred Perlstein 	 */
216590d75f78SAlfred Perlstein 	if (sig == SIGKILL) {
216690d75f78SAlfred Perlstein 		/* from procfs_ioctl.c: PIOCBIC */
216790d75f78SAlfred Perlstein 		p->p_stops = 0;
216890d75f78SAlfred Perlstein 		/* from procfs_ioctl.c: PIOCCONT */
216990d75f78SAlfred Perlstein 		p->p_step = 0;
217090d75f78SAlfred Perlstein 		wakeup(&p->p_step);
217190d75f78SAlfred Perlstein 	}
217290d75f78SAlfred Perlstein 	/*
2173e602ba25SJulian Elischer 	 * Some signals have a process-wide effect and a per-thread
2174e602ba25SJulian Elischer 	 * component.  Most processing occurs when the process next
2175e602ba25SJulian Elischer 	 * tries to cross the user boundary, however there are some
2176e602ba25SJulian Elischer 	 * times when processing needs to be done immediatly, such as
2177e602ba25SJulian Elischer 	 * waking up threads so that they can cross the user boundary.
2178e602ba25SJulian Elischer 	 * We try do the per-process part here.
2179df8bae1dSRodney W. Grimes 	 */
2180a54e85fdSJeff Roberson 	PROC_SLOCK(p);
2181e602ba25SJulian Elischer 	if (P_SHOULDSTOP(p)) {
2182e602ba25SJulian Elischer 		/*
2183e602ba25SJulian Elischer 		 * The process is in stopped mode. All the threads should be
2184e602ba25SJulian Elischer 		 * either winding down or already on the suspended queue.
2185e602ba25SJulian Elischer 		 */
2186e602ba25SJulian Elischer 		if (p->p_flag & P_TRACED) {
2187e602ba25SJulian Elischer 			/*
2188e602ba25SJulian Elischer 			 * The traced process is already stopped,
2189e602ba25SJulian Elischer 			 * so no further action is necessary.
2190e602ba25SJulian Elischer 			 * No signal can restart us.
2191e602ba25SJulian Elischer 			 */
2192a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
2193e602ba25SJulian Elischer 			goto out;
21941c32c37cSJohn Baldwin 		}
2195b40ce416SJulian Elischer 
2196e602ba25SJulian Elischer 		if (sig == SIGKILL) {
2197df8bae1dSRodney W. Grimes 			/*
2198e602ba25SJulian Elischer 			 * SIGKILL sets process running.
2199e602ba25SJulian Elischer 			 * It will die elsewhere.
2200e602ba25SJulian Elischer 			 * All threads must be restarted.
2201df8bae1dSRodney W. Grimes 			 */
2202482d099cSDavid Xu 			p->p_flag &= ~P_STOPPED_SIG;
2203e602ba25SJulian Elischer 			goto runfast;
2204e602ba25SJulian Elischer 		}
2205e602ba25SJulian Elischer 
2206e602ba25SJulian Elischer 		if (prop & SA_CONT) {
2207e602ba25SJulian Elischer 			/*
2208e602ba25SJulian Elischer 			 * If SIGCONT is default (or ignored), we continue the
22099104847fSDavid Xu 			 * process but don't leave the signal in sigqueue as
22101d9c5696SJuli Mallett 			 * it has no further action.  If SIGCONT is held, we
2211e602ba25SJulian Elischer 			 * continue the process and leave the signal in
22129104847fSDavid Xu 			 * sigqueue.  If the process catches SIGCONT, let it
2213e602ba25SJulian Elischer 			 * handle the signal itself.  If it isn't waiting on
2214e602ba25SJulian Elischer 			 * an event, it goes back to run state.
2215e602ba25SJulian Elischer 			 * Otherwise, process goes back to sleep state.
2216e602ba25SJulian Elischer 			 */
22171279572aSDavid Xu 			p->p_flag &= ~P_STOPPED_SIG;
2218ebceaf6dSDavid Xu 			if (p->p_numthreads == p->p_suspcount) {
2219a54e85fdSJeff Roberson 				PROC_SUNLOCK(p);
22206933e3c1SJulian Elischer 				p->p_flag |= P_CONTINUED;
22217f96995eSDavid Xu 				p->p_xstat = SIGCONT;
22227f96995eSDavid Xu 				PROC_LOCK(p->p_pptr);
2223ebceaf6dSDavid Xu 				childproc_continued(p);
22247f96995eSDavid Xu 				PROC_UNLOCK(p->p_pptr);
2225a54e85fdSJeff Roberson 				PROC_SLOCK(p);
2226ebceaf6dSDavid Xu 			}
2227e602ba25SJulian Elischer 			if (action == SIG_DFL) {
2228a54e85fdSJeff Roberson 				thread_unsuspend(p);
2229a54e85fdSJeff Roberson 				PROC_SUNLOCK(p);
22309104847fSDavid Xu 				sigqueue_delete(sigqueue, sig);
2231a54e85fdSJeff Roberson 				goto out;
2232a54e85fdSJeff Roberson 			}
2233a54e85fdSJeff Roberson 			if (action == SIG_CATCH) {
22348460a577SJohn Birrell #ifdef KSE
2235e602ba25SJulian Elischer 				/*
2236e602ba25SJulian Elischer 				 * The process wants to catch it so it needs
2237e602ba25SJulian Elischer 				 * to run at least one thread, but which one?
2238e602ba25SJulian Elischer 				 * It would seem that the answer would be to
2239e602ba25SJulian Elischer 				 * run an upcall in the next KSE to run, and
2240e602ba25SJulian Elischer 				 * deliver the signal that way. In a NON KSE
2241e602ba25SJulian Elischer 				 * process, we need to make sure that the
2242e602ba25SJulian Elischer 				 * single thread is runnable asap.
2243e602ba25SJulian Elischer 				 * XXXKSE for now however, make them all run.
2244e602ba25SJulian Elischer 				 */
2245a54e85fdSJeff Roberson #endif
22468460a577SJohn Birrell 				/*
22478460a577SJohn Birrell 				 * The process wants to catch it so it needs
22488460a577SJohn Birrell 				 * to run at least one thread, but which one?
22498460a577SJohn Birrell 				 */
2250e602ba25SJulian Elischer 				goto runfast;
2251e602ba25SJulian Elischer 			}
2252e602ba25SJulian Elischer 			/*
2253e602ba25SJulian Elischer 			 * The signal is not ignored or caught.
2254e602ba25SJulian Elischer 			 */
225504774f23SJulian Elischer 			thread_unsuspend(p);
2256a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
2257e602ba25SJulian Elischer 			goto out;
2258e602ba25SJulian Elischer 		}
2259e602ba25SJulian Elischer 
2260e602ba25SJulian Elischer 		if (prop & SA_STOP) {
2261e602ba25SJulian Elischer 			/*
2262e602ba25SJulian Elischer 			 * Already stopped, don't need to stop again
2263e602ba25SJulian Elischer 			 * (If we did the shell could get confused).
226404774f23SJulian Elischer 			 * Just make sure the signal STOP bit set.
2265e602ba25SJulian Elischer 			 */
2266a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
22671279572aSDavid Xu 			p->p_flag |= P_STOPPED_SIG;
22689104847fSDavid Xu 			sigqueue_delete(sigqueue, sig);
2269e602ba25SJulian Elischer 			goto out;
2270e602ba25SJulian Elischer 		}
2271e602ba25SJulian Elischer 
2272e602ba25SJulian Elischer 		/*
2273e602ba25SJulian Elischer 		 * All other kinds of signals:
2274e602ba25SJulian Elischer 		 * If a thread is sleeping interruptibly, simulate a
2275e602ba25SJulian Elischer 		 * wakeup so that when it is continued it will be made
2276e602ba25SJulian Elischer 		 * runnable and can look at the signal.  However, don't make
227704774f23SJulian Elischer 		 * the PROCESS runnable, leave it stopped.
2278e602ba25SJulian Elischer 		 * It may run a bit until it hits a thread_suspend_check().
2279e602ba25SJulian Elischer 		 */
2280a54e85fdSJeff Roberson 		thread_lock(td);
228144f3b092SJohn Baldwin 		if (TD_ON_SLEEPQ(td) && (td->td_flags & TDF_SINTR))
228294f0972bSDavid Xu 			sleepq_abort(td, intrval);
2283a54e85fdSJeff Roberson 		thread_unlock(td);
2284a54e85fdSJeff Roberson 		PROC_SUNLOCK(p);
2285df8bae1dSRodney W. Grimes 		goto out;
2286df8bae1dSRodney W. Grimes 		/*
22879a6a4cb5SPeter Wemm 		 * Mutexes are short lived. Threads waiting on them will
22889a6a4cb5SPeter Wemm 		 * hit thread_suspend_check() soon.
2289df8bae1dSRodney W. Grimes 		 */
2290e602ba25SJulian Elischer 	} else if (p->p_state == PRS_NORMAL) {
2291ec8297bdSDavid Xu 		if (p->p_flag & P_TRACED || action == SIG_CATCH) {
2292a54e85fdSJeff Roberson 			thread_lock(td);
229394f0972bSDavid Xu 			tdsigwakeup(td, sig, action, intrval);
2294a54e85fdSJeff Roberson 			thread_unlock(td);
2295a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
2296df8bae1dSRodney W. Grimes 			goto out;
229704774f23SJulian Elischer 		}
2298ec8297bdSDavid Xu 
2299ec8297bdSDavid Xu 		MPASS(action == SIG_DFL);
2300ec8297bdSDavid Xu 
230135c32a76SDavid Xu 		if (prop & SA_STOP) {
2302efe641b9SJeff Roberson 			if (p->p_flag & P_PPWAIT) {
2303efe641b9SJeff Roberson 				PROC_SUNLOCK(p);
230435c32a76SDavid Xu 				goto out;
2305efe641b9SJeff Roberson 			}
2306e574e444SDavid Xu 			p->p_flag |= P_STOPPED_SIG;
2307e574e444SDavid Xu 			p->p_xstat = sig;
2308d8267df7SDavid Xu 			sig_suspend_threads(td, p, 1);
23094093529dSJeff Roberson 			if (p->p_numthreads == p->p_suspcount) {
2310ebceaf6dSDavid Xu 				/*
2311ebceaf6dSDavid Xu 				 * only thread sending signal to another
2312ebceaf6dSDavid Xu 				 * process can reach here, if thread is sending
2313ebceaf6dSDavid Xu 				 * signal to its process, because thread does
2314ebceaf6dSDavid Xu 				 * not suspend itself here, p_numthreads
2315ebceaf6dSDavid Xu 				 * should never be equal to p_suspcount.
2316ebceaf6dSDavid Xu 				 */
2317ebceaf6dSDavid Xu 				thread_stopped(p);
2318a54e85fdSJeff Roberson 				PROC_SUNLOCK(p);
23199104847fSDavid Xu 				sigqueue_delete_proc(p, p->p_xstat);
23209104847fSDavid Xu 			} else
2321a54e85fdSJeff Roberson 				PROC_SUNLOCK(p);
232235c32a76SDavid Xu 			goto out;
232335c32a76SDavid Xu 		}
2324721e5910SJulian Elischer 		else
2325df8bae1dSRodney W. Grimes 			goto runfast;
2326df8bae1dSRodney W. Grimes 		/* NOTREACHED */
2327e602ba25SJulian Elischer 	} else {
2328e602ba25SJulian Elischer 		/* Not in "NORMAL" state. discard the signal. */
2329a54e85fdSJeff Roberson 		PROC_SUNLOCK(p);
23309104847fSDavid Xu 		sigqueue_delete(sigqueue, sig);
2331e602ba25SJulian Elischer 		goto out;
2332e602ba25SJulian Elischer 	}
2333e602ba25SJulian Elischer 
2334b40ce416SJulian Elischer 	/*
2335e602ba25SJulian Elischer 	 * The process is not stopped so we need to apply the signal to all the
2336e602ba25SJulian Elischer 	 * running threads.
2337b40ce416SJulian Elischer 	 */
2338e602ba25SJulian Elischer 
2339e602ba25SJulian Elischer runfast:
2340a54e85fdSJeff Roberson 	thread_lock(td);
234194f0972bSDavid Xu 	tdsigwakeup(td, sig, action, intrval);
2342a54e85fdSJeff Roberson 	thread_unlock(td);
2343e602ba25SJulian Elischer 	thread_unsuspend(p);
2344a54e85fdSJeff Roberson 	PROC_SUNLOCK(p);
2345e602ba25SJulian Elischer out:
2346a54e85fdSJeff Roberson 	/* If we jump here, proc slock should not be owned. */
2347a54e85fdSJeff Roberson 	PROC_SLOCK_ASSERT(p, MA_NOTOWNED);
23489104847fSDavid Xu 	return (ret);
2349e602ba25SJulian Elischer }
2350e602ba25SJulian Elischer 
2351e602ba25SJulian Elischer /*
2352e602ba25SJulian Elischer  * The force of a signal has been directed against a single
2353e602ba25SJulian Elischer  * thread.  We need to see what we can do about knocking it
2354e602ba25SJulian Elischer  * out of any sleep it may be in etc.
2355e602ba25SJulian Elischer  */
2356e602ba25SJulian Elischer static void
235794f0972bSDavid Xu tdsigwakeup(struct thread *td, int sig, sig_t action, int intrval)
2358e602ba25SJulian Elischer {
2359e602ba25SJulian Elischer 	struct proc *p = td->td_proc;
2360e602ba25SJulian Elischer 	register int prop;
2361e602ba25SJulian Elischer 
23628b94a061SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2363a54e85fdSJeff Roberson 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2364a54e85fdSJeff Roberson 	THREAD_LOCK_ASSERT(td, MA_OWNED);
2365e602ba25SJulian Elischer 	prop = sigprop(sig);
2366a4c2da15SBruce Evans 
2367e602ba25SJulian Elischer 	/*
2368aa0fa334SJulian Elischer 	 * Bring the priority of a thread up if we want it to get
2369e602ba25SJulian Elischer 	 * killed in this lifetime.
2370e602ba25SJulian Elischer 	 */
23716eeb364bSJeff Roberson 	if (action == SIG_DFL && (prop & SA_KILL) && td->td_priority > PUSER)
2372b3a4fb14SDavid Xu 		sched_prio(td, PUSER);
2373a4c2da15SBruce Evans 
237480c4433cSJohn Baldwin 	if (TD_ON_SLEEPQ(td)) {
2375e602ba25SJulian Elischer 		/*
2376e602ba25SJulian Elischer 		 * If thread is sleeping uninterruptibly
2377e602ba25SJulian Elischer 		 * we can't interrupt the sleep... the signal will
2378e602ba25SJulian Elischer 		 * be noticed when the process returns through
2379e602ba25SJulian Elischer 		 * trap() or syscall().
2380e602ba25SJulian Elischer 		 */
238144f3b092SJohn Baldwin 		if ((td->td_flags & TDF_SINTR) == 0)
2382aa0fa334SJulian Elischer 			return;
2383e602ba25SJulian Elischer 		/*
2384e602ba25SJulian Elischer 		 * If SIGCONT is default (or ignored) and process is
2385e602ba25SJulian Elischer 		 * asleep, we are finished; the process should not
2386e602ba25SJulian Elischer 		 * be awakened.
2387df8bae1dSRodney W. Grimes 		 */
2388e602ba25SJulian Elischer 		if ((prop & SA_CONT) && action == SIG_DFL) {
2389a54e85fdSJeff Roberson 			thread_unlock(td);
2390a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
23919104847fSDavid Xu 			sigqueue_delete(&p->p_sigqueue, sig);
23924093529dSJeff Roberson 			/*
23934093529dSJeff Roberson 			 * It may be on either list in this state.
23944093529dSJeff Roberson 			 * Remove from both for now.
23954093529dSJeff Roberson 			 */
23969104847fSDavid Xu 			sigqueue_delete(&td->td_sigqueue, sig);
2397a54e85fdSJeff Roberson 			PROC_SLOCK(p);
2398a54e85fdSJeff Roberson 			thread_lock(td);
2399aa0fa334SJulian Elischer 			return;
2400df8bae1dSRodney W. Grimes 		}
2401df8bae1dSRodney W. Grimes 
2402aa0fa334SJulian Elischer 		/*
2403a4c2da15SBruce Evans 		 * Give low priority threads a better chance to run.
2404aa0fa334SJulian Elischer 		 */
240544f3b092SJohn Baldwin 		if (td->td_priority > PUSER)
2406b3a4fb14SDavid Xu 			sched_prio(td, PUSER);
2407ec8297bdSDavid Xu 
240894f0972bSDavid Xu 		sleepq_abort(td, intrval);
2409a4c2da15SBruce Evans 	} else {
2410df8bae1dSRodney W. Grimes 		/*
2411a4c2da15SBruce Evans 		 * Other states do nothing with the signal immediately,
2412df8bae1dSRodney W. Grimes 		 * other than kicking ourselves if we are running.
2413df8bae1dSRodney W. Grimes 		 * It will either never be noticed, or noticed very soon.
2414df8bae1dSRodney W. Grimes 		 */
2415a4c2da15SBruce Evans #ifdef SMP
241644f3b092SJohn Baldwin 		if (TD_IS_RUNNING(td) && td != curthread)
2417e602ba25SJulian Elischer 			forward_signal(td);
24183163861cSTor Egge #endif
24196caa8a15SJohn Baldwin 	}
2420a4c2da15SBruce Evans }
2421df8bae1dSRodney W. Grimes 
2422d8267df7SDavid Xu static void
2423d8267df7SDavid Xu sig_suspend_threads(struct thread *td, struct proc *p, int sending)
2424d8267df7SDavid Xu {
2425d8267df7SDavid Xu 	struct thread *td2;
2426d8267df7SDavid Xu 
2427d8267df7SDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
2428a54e85fdSJeff Roberson 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2429d8267df7SDavid Xu 
2430d8267df7SDavid Xu 	FOREACH_THREAD_IN_PROC(p, td2) {
2431a54e85fdSJeff Roberson 		thread_lock(td2);
2432d8267df7SDavid Xu 		if ((TD_IS_SLEEPING(td2) || TD_IS_SWAPPED(td2)) &&
2433d8267df7SDavid Xu 		    (td2->td_flags & TDF_SINTR) &&
2434d8267df7SDavid Xu 		    !TD_IS_SUSPENDED(td2)) {
2435d8267df7SDavid Xu 			thread_suspend_one(td2);
2436d8267df7SDavid Xu 		} else {
2437d8267df7SDavid Xu 			if (sending || td != td2)
2438d8267df7SDavid Xu 				td2->td_flags |= TDF_ASTPENDING;
2439d8267df7SDavid Xu #ifdef SMP
2440d8267df7SDavid Xu 			if (TD_IS_RUNNING(td2) && td2 != td)
2441d8267df7SDavid Xu 				forward_signal(td2);
2442d8267df7SDavid Xu #endif
2443d8267df7SDavid Xu 		}
2444a54e85fdSJeff Roberson 		thread_unlock(td2);
2445d8267df7SDavid Xu 	}
2446d8267df7SDavid Xu }
2447d8267df7SDavid Xu 
2448cbf4e354SDavid Xu int
24494cc9f52fSRobert Drehmel ptracestop(struct thread *td, int sig)
24504cc9f52fSRobert Drehmel {
24514cc9f52fSRobert Drehmel 	struct proc *p = td->td_proc;
24524cc9f52fSRobert Drehmel 
245330a9f26dSRobert Watson 	PROC_LOCK_ASSERT(p, MA_OWNED);
24544cc9f52fSRobert Drehmel 	WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK,
2455aa89d8cdSJohn Baldwin 	    &p->p_mtx.lock_object, "Stopping for traced signal");
24564cc9f52fSRobert Drehmel 
2457a54e85fdSJeff Roberson 	thread_lock(td);
2458cbf4e354SDavid Xu 	td->td_flags |= TDF_XSIG;
2459a54e85fdSJeff Roberson 	thread_unlock(td);
2460cbf4e354SDavid Xu 	td->td_xsig = sig;
2461a54e85fdSJeff Roberson 	PROC_SLOCK(p);
2462cbf4e354SDavid Xu 	while ((p->p_flag & P_TRACED) && (td->td_flags & TDF_XSIG)) {
2463cbf4e354SDavid Xu 		if (p->p_flag & P_SINGLE_EXIT) {
2464a54e85fdSJeff Roberson 			thread_lock(td);
2465cbf4e354SDavid Xu 			td->td_flags &= ~TDF_XSIG;
2466a54e85fdSJeff Roberson 			thread_unlock(td);
2467a54e85fdSJeff Roberson 			PROC_SUNLOCK(p);
2468cbf4e354SDavid Xu 			return (sig);
2469cbf4e354SDavid Xu 		}
2470cbf4e354SDavid Xu 		/*
2471cbf4e354SDavid Xu 		 * Just make wait() to work, the last stopped thread
2472cbf4e354SDavid Xu 		 * will win.
2473cbf4e354SDavid Xu 		 */
2474cbf4e354SDavid Xu 		p->p_xstat = sig;
2475cbf4e354SDavid Xu 		p->p_xthread = td;
2476cbf4e354SDavid Xu 		p->p_flag |= (P_STOPPED_SIG|P_STOPPED_TRACE);
2477d8267df7SDavid Xu 		sig_suspend_threads(td, p, 0);
2478cbf4e354SDavid Xu stopme:
2479a54e85fdSJeff Roberson 		thread_suspend_switch(td);
2480a54e85fdSJeff Roberson 		if (!(p->p_flag & P_TRACED)) {
2481cbf4e354SDavid Xu 			break;
2482a54e85fdSJeff Roberson 		}
2483cbf4e354SDavid Xu 		if (td->td_flags & TDF_DBSUSPEND) {
2484cbf4e354SDavid Xu 			if (p->p_flag & P_SINGLE_EXIT)
2485cbf4e354SDavid Xu 				break;
2486cbf4e354SDavid Xu 			goto stopme;
2487cbf4e354SDavid Xu 		}
2488cbf4e354SDavid Xu 	}
2489a54e85fdSJeff Roberson 	PROC_SUNLOCK(p);
2490cbf4e354SDavid Xu 	return (td->td_xsig);
24914cc9f52fSRobert Drehmel }
24924cc9f52fSRobert Drehmel 
2493df8bae1dSRodney W. Grimes /*
2494df8bae1dSRodney W. Grimes  * If the current process has received a signal (should be caught or cause
2495df8bae1dSRodney W. Grimes  * termination, should interrupt current syscall), return the signal number.
2496df8bae1dSRodney W. Grimes  * Stop signals with default action are processed immediately, then cleared;
2497df8bae1dSRodney W. Grimes  * they aren't returned.  This is checked after each entry to the system for
2498df8bae1dSRodney W. Grimes  * a syscall or trap (though this can usually be done without calling issignal
2499628855e7SJulian Elischer  * by checking the pending signal masks in cursig.) The normal call
2500df8bae1dSRodney W. Grimes  * sequence is
2501df8bae1dSRodney W. Grimes  *
2502e602ba25SJulian Elischer  *	while (sig = cursig(curthread))
25032c42a146SMarcel Moolenaar  *		postsig(sig);
2504df8bae1dSRodney W. Grimes  */
25056711f10fSJohn Baldwin static int
2506e602ba25SJulian Elischer issignal(td)
2507e602ba25SJulian Elischer 	struct thread *td;
2508df8bae1dSRodney W. Grimes {
2509e602ba25SJulian Elischer 	struct proc *p;
251090af4afaSJohn Baldwin 	struct sigacts *ps;
25114093529dSJeff Roberson 	sigset_t sigpending;
2512cbf4e354SDavid Xu 	int sig, prop, newsig;
2513df8bae1dSRodney W. Grimes 
2514e602ba25SJulian Elischer 	p = td->td_proc;
251590af4afaSJohn Baldwin 	ps = p->p_sigacts;
251690af4afaSJohn Baldwin 	mtx_assert(&ps->ps_mtx, MA_OWNED);
2517628d2653SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2518df8bae1dSRodney W. Grimes 	for (;;) {
25192a024a2bSSean Eric Fagan 		int traced = (p->p_flag & P_TRACED) || (p->p_stops & S_SIG);
25202a024a2bSSean Eric Fagan 
25219104847fSDavid Xu 		sigpending = td->td_sigqueue.sq_signals;
25224093529dSJeff Roberson 		SIGSETNAND(sigpending, td->td_sigmask);
25234093529dSJeff Roberson 
2524df8bae1dSRodney W. Grimes 		if (p->p_flag & P_PPWAIT)
25254093529dSJeff Roberson 			SIG_STOPSIGMASK(sigpending);
25264093529dSJeff Roberson 		if (SIGISEMPTY(sigpending))	/* no signal to send */
2527df8bae1dSRodney W. Grimes 			return (0);
25284093529dSJeff Roberson 		sig = sig_ffs(&sigpending);
25292a024a2bSSean Eric Fagan 
2530047aa39bSRobert Watson 		if (p->p_stops & S_SIG) {
2531047aa39bSRobert Watson 			mtx_unlock(&ps->ps_mtx);
2532047aa39bSRobert Watson 			stopevent(p, S_SIG, sig);
2533047aa39bSRobert Watson 			mtx_lock(&ps->ps_mtx);
2534047aa39bSRobert Watson 		}
25352a024a2bSSean Eric Fagan 
2536df8bae1dSRodney W. Grimes 		/*
2537df8bae1dSRodney W. Grimes 		 * We should see pending but ignored signals
2538df8bae1dSRodney W. Grimes 		 * only if P_TRACED was on when they were posted.
2539df8bae1dSRodney W. Grimes 		 */
254090af4afaSJohn Baldwin 		if (SIGISMEMBER(ps->ps_sigignore, sig) && (traced == 0)) {
25419104847fSDavid Xu 			sigqueue_delete(&td->td_sigqueue, sig);
25428460a577SJohn Birrell #ifdef KSE
2543cbf4e354SDavid Xu 			if (td->td_pflags & TDP_SA)
2544cbf4e354SDavid Xu 				SIGADDSET(td->td_sigmask, sig);
25458460a577SJohn Birrell #endif
2546df8bae1dSRodney W. Grimes 			continue;
2547df8bae1dSRodney W. Grimes 		}
2548df8bae1dSRodney W. Grimes 		if (p->p_flag & P_TRACED && (p->p_flag & P_PPWAIT) == 0) {
2549df8bae1dSRodney W. Grimes 			/*
2550d8f4f6a4SJonathan Mini 			 * If traced, always stop.
2551df8bae1dSRodney W. Grimes 			 */
255290af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
2553cbf4e354SDavid Xu 			newsig = ptracestop(td, sig);
255490af4afaSJohn Baldwin 			mtx_lock(&ps->ps_mtx);
2555df8bae1dSRodney W. Grimes 
25568460a577SJohn Birrell #ifdef KSE
25579104847fSDavid Xu 			if (td->td_pflags & TDP_SA)
25589104847fSDavid Xu 				SIGADDSET(td->td_sigmask, sig);
25599104847fSDavid Xu 
25608460a577SJohn Birrell #endif
25619104847fSDavid Xu 			if (sig != newsig) {
2562413cf3bbSDavid Xu 				ksiginfo_t ksi;
25639104847fSDavid Xu 				/*
25649104847fSDavid Xu 				 * clear old signal.
25659104847fSDavid Xu 				 * XXX shrug off debugger, it causes siginfo to
25669104847fSDavid Xu 				 * be thrown away.
25679104847fSDavid Xu 				 */
2568413cf3bbSDavid Xu 				sigqueue_get(&td->td_sigqueue, sig, &ksi);
25699104847fSDavid Xu 
2570df8bae1dSRodney W. Grimes 				/*
2571df8bae1dSRodney W. Grimes 				 * If parent wants us to take the signal,
2572df8bae1dSRodney W. Grimes 				 * then it will leave it in p->p_xstat;
2573df8bae1dSRodney W. Grimes 				 * otherwise we just look for signals again.
2574df8bae1dSRodney W. Grimes 			 	*/
2575cbf4e354SDavid Xu 				if (newsig == 0)
2576df8bae1dSRodney W. Grimes 					continue;
2577cbf4e354SDavid Xu 				sig = newsig;
25789104847fSDavid Xu 
25799104847fSDavid Xu 				/*
25809104847fSDavid Xu 				 * Put the new signal into td_sigqueue. If the
25819104847fSDavid Xu 				 * signal is being masked, look for other signals.
25829104847fSDavid Xu 				 */
25839104847fSDavid Xu 				SIGADDSET(td->td_sigqueue.sq_signals, sig);
25848460a577SJohn Birrell #ifdef KSE
25859104847fSDavid Xu 				if (td->td_pflags & TDP_SA)
25869104847fSDavid Xu 					SIGDELSET(td->td_sigmask, sig);
25878460a577SJohn Birrell #endif
25889104847fSDavid Xu 				if (SIGISMEMBER(td->td_sigmask, sig))
25899104847fSDavid Xu 					continue;
25909104847fSDavid Xu 				signotify(td);
25919104847fSDavid Xu 			}
25929104847fSDavid Xu 
2593df8bae1dSRodney W. Grimes 			/*
25948d542cb5SDavid E. O'Brien 			 * If the traced bit got turned off, go back up
25958d542cb5SDavid E. O'Brien 			 * to the top to rescan signals.  This ensures
25968d542cb5SDavid E. O'Brien 			 * that p_sig* and p_sigact are consistent.
25978d542cb5SDavid E. O'Brien 			 */
25988d542cb5SDavid E. O'Brien 			if ((p->p_flag & P_TRACED) == 0)
25998d542cb5SDavid E. O'Brien 				continue;
2600df8bae1dSRodney W. Grimes 		}
2601df8bae1dSRodney W. Grimes 
26028d542cb5SDavid E. O'Brien 		prop = sigprop(sig);
26038d542cb5SDavid E. O'Brien 
2604df8bae1dSRodney W. Grimes 		/*
2605df8bae1dSRodney W. Grimes 		 * Decide whether the signal should be returned.
2606df8bae1dSRodney W. Grimes 		 * Return the signal's number, or fall through
2607df8bae1dSRodney W. Grimes 		 * to clear it from the pending mask.
2608df8bae1dSRodney W. Grimes 		 */
2609d321df47SPoul-Henning Kamp 		switch ((intptr_t)p->p_sigacts->ps_sigact[_SIG_IDX(sig)]) {
2610df8bae1dSRodney W. Grimes 
2611d321df47SPoul-Henning Kamp 		case (intptr_t)SIG_DFL:
2612df8bae1dSRodney W. Grimes 			/*
2613df8bae1dSRodney W. Grimes 			 * Don't take default actions on system processes.
2614df8bae1dSRodney W. Grimes 			 */
2615df8bae1dSRodney W. Grimes 			if (p->p_pid <= 1) {
2616df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
2617df8bae1dSRodney W. Grimes 				/*
2618df8bae1dSRodney W. Grimes 				 * Are you sure you want to ignore SIGSEGV
2619df8bae1dSRodney W. Grimes 				 * in init? XXX
2620df8bae1dSRodney W. Grimes 				 */
2621d93f860cSPoul-Henning Kamp 				printf("Process (pid %lu) got signal %d\n",
26222c42a146SMarcel Moolenaar 					(u_long)p->p_pid, sig);
2623df8bae1dSRodney W. Grimes #endif
2624df8bae1dSRodney W. Grimes 				break;		/* == ignore */
2625df8bae1dSRodney W. Grimes 			}
2626df8bae1dSRodney W. Grimes 			/*
2627df8bae1dSRodney W. Grimes 			 * If there is a pending stop signal to process
2628df8bae1dSRodney W. Grimes 			 * with default action, stop here,
2629df8bae1dSRodney W. Grimes 			 * then clear the signal.  However,
2630df8bae1dSRodney W. Grimes 			 * if process is member of an orphaned
2631df8bae1dSRodney W. Grimes 			 * process group, ignore tty stop signals.
2632df8bae1dSRodney W. Grimes 			 */
2633df8bae1dSRodney W. Grimes 			if (prop & SA_STOP) {
2634df8bae1dSRodney W. Grimes 				if (p->p_flag & P_TRACED ||
2635df8bae1dSRodney W. Grimes 		    		    (p->p_pgrp->pg_jobc == 0 &&
2636df8bae1dSRodney W. Grimes 				     prop & SA_TTYSTOP))
2637df8bae1dSRodney W. Grimes 					break;	/* == ignore */
263890af4afaSJohn Baldwin 				mtx_unlock(&ps->ps_mtx);
263990af4afaSJohn Baldwin 				WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK,
2640aa89d8cdSJohn Baldwin 				    &p->p_mtx.lock_object, "Catching SIGSTOP");
2641e574e444SDavid Xu 				p->p_flag |= P_STOPPED_SIG;
26422c42a146SMarcel Moolenaar 				p->p_xstat = sig;
2643a54e85fdSJeff Roberson 				PROC_SLOCK(p);
2644d8267df7SDavid Xu 				sig_suspend_threads(td, p, 0);
2645a54e85fdSJeff Roberson 				thread_suspend_switch(td);
2646a54e85fdSJeff Roberson 				PROC_SUNLOCK(p);
264790af4afaSJohn Baldwin 				mtx_lock(&ps->ps_mtx);
2648df8bae1dSRodney W. Grimes 				break;
264921b68415SDavid E. O'Brien 			} else if (prop & SA_IGNORE) {
2650df8bae1dSRodney W. Grimes 				/*
2651df8bae1dSRodney W. Grimes 				 * Except for SIGCONT, shouldn't get here.
2652df8bae1dSRodney W. Grimes 				 * Default action is to ignore; drop it.
2653df8bae1dSRodney W. Grimes 				 */
2654df8bae1dSRodney W. Grimes 				break;		/* == ignore */
2655df8bae1dSRodney W. Grimes 			} else
26562c42a146SMarcel Moolenaar 				return (sig);
2657df8bae1dSRodney W. Grimes 			/*NOTREACHED*/
2658df8bae1dSRodney W. Grimes 
2659d321df47SPoul-Henning Kamp 		case (intptr_t)SIG_IGN:
2660df8bae1dSRodney W. Grimes 			/*
2661df8bae1dSRodney W. Grimes 			 * Masking above should prevent us ever trying
2662df8bae1dSRodney W. Grimes 			 * to take action on an ignored signal other
2663df8bae1dSRodney W. Grimes 			 * than SIGCONT, unless process is traced.
2664df8bae1dSRodney W. Grimes 			 */
2665df8bae1dSRodney W. Grimes 			if ((prop & SA_CONT) == 0 &&
2666df8bae1dSRodney W. Grimes 			    (p->p_flag & P_TRACED) == 0)
2667df8bae1dSRodney W. Grimes 				printf("issignal\n");
2668df8bae1dSRodney W. Grimes 			break;		/* == ignore */
2669df8bae1dSRodney W. Grimes 
2670df8bae1dSRodney W. Grimes 		default:
2671df8bae1dSRodney W. Grimes 			/*
2672df8bae1dSRodney W. Grimes 			 * This signal has an action, let
2673df8bae1dSRodney W. Grimes 			 * postsig() process it.
2674df8bae1dSRodney W. Grimes 			 */
26752c42a146SMarcel Moolenaar 			return (sig);
2676df8bae1dSRodney W. Grimes 		}
26779104847fSDavid Xu 		sigqueue_delete(&td->td_sigqueue, sig);		/* take the signal! */
2678df8bae1dSRodney W. Grimes 	}
2679df8bae1dSRodney W. Grimes 	/* NOTREACHED */
2680df8bae1dSRodney W. Grimes }
2681df8bae1dSRodney W. Grimes 
2682e574e444SDavid Xu void
2683e574e444SDavid Xu thread_stopped(struct proc *p)
2684e574e444SDavid Xu {
2685e574e444SDavid Xu 	int n;
2686e574e444SDavid Xu 
2687e574e444SDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
2688a54e85fdSJeff Roberson 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2689e574e444SDavid Xu 	n = p->p_suspcount;
26907c9a98f1SDavid Xu 	if (p == curproc)
2691e574e444SDavid Xu 		n++;
2692e574e444SDavid Xu 	if ((p->p_flag & P_STOPPED_SIG) && (n == p->p_numthreads)) {
2693a54e85fdSJeff Roberson 		PROC_SUNLOCK(p);
2694407948a5SDavid Xu 		p->p_flag &= ~P_WAITED;
2695e574e444SDavid Xu 		PROC_LOCK(p->p_pptr);
26967f96995eSDavid Xu 		childproc_stopped(p, (p->p_flag & P_TRACED) ?
2697ebceaf6dSDavid Xu 			CLD_TRAPPED : CLD_STOPPED);
2698e574e444SDavid Xu 		PROC_UNLOCK(p->p_pptr);
2699a54e85fdSJeff Roberson 		PROC_SLOCK(p);
2700e574e444SDavid Xu 	}
2701e574e444SDavid Xu }
2702e574e444SDavid Xu 
2703df8bae1dSRodney W. Grimes /*
2704df8bae1dSRodney W. Grimes  * Take the action for the specified signal
2705df8bae1dSRodney W. Grimes  * from the current set of pending signals.
2706df8bae1dSRodney W. Grimes  */
2707df8bae1dSRodney W. Grimes void
27082c42a146SMarcel Moolenaar postsig(sig)
27092c42a146SMarcel Moolenaar 	register int sig;
2710df8bae1dSRodney W. Grimes {
2711b40ce416SJulian Elischer 	struct thread *td = curthread;
2712b40ce416SJulian Elischer 	register struct proc *p = td->td_proc;
2713628d2653SJohn Baldwin 	struct sigacts *ps;
27142c42a146SMarcel Moolenaar 	sig_t action;
27159104847fSDavid Xu 	ksiginfo_t ksi;
27162c42a146SMarcel Moolenaar 	sigset_t returnmask;
27172c42a146SMarcel Moolenaar 	int code;
2718df8bae1dSRodney W. Grimes 
27192c42a146SMarcel Moolenaar 	KASSERT(sig != 0, ("postsig"));
27205526d2d9SEivind Eklund 
27212ad7d304SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2722628d2653SJohn Baldwin 	ps = p->p_sigacts;
272390af4afaSJohn Baldwin 	mtx_assert(&ps->ps_mtx, MA_OWNED);
27245da49fcbSDavid Xu 	ksiginfo_init(&ksi);
27259104847fSDavid Xu 	sigqueue_get(&td->td_sigqueue, sig, &ksi);
27269104847fSDavid Xu 	ksi.ksi_signo = sig;
272756c06c4bSDavid Xu 	if (ksi.ksi_code == SI_TIMER)
272856c06c4bSDavid Xu 		itimer_accept(p, ksi.ksi_timerid, &ksi);
27292c42a146SMarcel Moolenaar 	action = ps->ps_sigact[_SIG_IDX(sig)];
2730df8bae1dSRodney W. Grimes #ifdef KTRACE
2731374a15aaSJohn Baldwin 	if (KTRPOINT(td, KTR_PSIG))
27325e26dcb5SJohn Baldwin 		ktrpsig(sig, action, td->td_pflags & TDP_OLDMASK ?
27334093529dSJeff Roberson 		    &td->td_oldsigmask : &td->td_sigmask, 0);
2734df8bae1dSRodney W. Grimes #endif
2735047aa39bSRobert Watson 	if (p->p_stops & S_SIG) {
2736047aa39bSRobert Watson 		mtx_unlock(&ps->ps_mtx);
2737047aa39bSRobert Watson 		stopevent(p, S_SIG, sig);
2738047aa39bSRobert Watson 		mtx_lock(&ps->ps_mtx);
2739047aa39bSRobert Watson 	}
27402a024a2bSSean Eric Fagan 
27418460a577SJohn Birrell #ifdef KSE
2742cbf4e354SDavid Xu 	if (!(td->td_pflags & TDP_SA) && action == SIG_DFL) {
27438460a577SJohn Birrell #else
27448460a577SJohn Birrell 	if (action == SIG_DFL) {
27458460a577SJohn Birrell #endif
2746df8bae1dSRodney W. Grimes 		/*
2747df8bae1dSRodney W. Grimes 		 * Default action, where the default is to kill
2748df8bae1dSRodney W. Grimes 		 * the process.  (Other cases were ignored above.)
2749df8bae1dSRodney W. Grimes 		 */
275090af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
2751b40ce416SJulian Elischer 		sigexit(td, sig);
2752df8bae1dSRodney W. Grimes 		/* NOTREACHED */
2753df8bae1dSRodney W. Grimes 	} else {
27548460a577SJohn Birrell #ifdef KSE
2755cbf4e354SDavid Xu 		if (td->td_pflags & TDP_SA) {
2756432b45deSDavid Xu 			if (sig == SIGKILL) {
2757432b45deSDavid Xu 				mtx_unlock(&ps->ps_mtx);
2758432b45deSDavid Xu 				sigexit(td, sig);
2759432b45deSDavid Xu 			}
2760432b45deSDavid Xu 		}
2761432b45deSDavid Xu 
27628460a577SJohn Birrell #endif
2763df8bae1dSRodney W. Grimes 		/*
2764df8bae1dSRodney W. Grimes 		 * If we get here, the signal must be caught.
2765df8bae1dSRodney W. Grimes 		 */
27664093529dSJeff Roberson 		KASSERT(action != SIG_IGN && !SIGISMEMBER(td->td_sigmask, sig),
27675526d2d9SEivind Eklund 		    ("postsig action"));
2768df8bae1dSRodney W. Grimes 		/*
2769df8bae1dSRodney W. Grimes 		 * Set the new mask value and also defer further
2770645682fdSLuoqi Chen 		 * occurrences of this signal.
2771df8bae1dSRodney W. Grimes 		 *
2772645682fdSLuoqi Chen 		 * Special case: user has done a sigsuspend.  Here the
2773df8bae1dSRodney W. Grimes 		 * current mask is not of interest, but rather the
2774645682fdSLuoqi Chen 		 * mask from before the sigsuspend is what we want
2775df8bae1dSRodney W. Grimes 		 * restored after the signal processing is completed.
2776df8bae1dSRodney W. Grimes 		 */
27775e26dcb5SJohn Baldwin 		if (td->td_pflags & TDP_OLDMASK) {
27784093529dSJeff Roberson 			returnmask = td->td_oldsigmask;
27795e26dcb5SJohn Baldwin 			td->td_pflags &= ~TDP_OLDMASK;
2780df8bae1dSRodney W. Grimes 		} else
27814093529dSJeff Roberson 			returnmask = td->td_sigmask;
27822c42a146SMarcel Moolenaar 
27834093529dSJeff Roberson 		SIGSETOR(td->td_sigmask, ps->ps_catchmask[_SIG_IDX(sig)]);
27842c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_signodefer, sig))
27854093529dSJeff Roberson 			SIGADDSET(td->td_sigmask, sig);
27862c42a146SMarcel Moolenaar 
27872c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig)) {
2788289ccde0SPeter Wemm 			/*
27898f19eb88SIan Dowse 			 * See kern_sigaction() for origin of this code.
2790289ccde0SPeter Wemm 			 */
279190af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
27922c42a146SMarcel Moolenaar 			if (sig != SIGCONT &&
27932c42a146SMarcel Moolenaar 			    sigprop(sig) & SA_IGNORE)
279490af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
27952c42a146SMarcel Moolenaar 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
2796dedc04feSPeter Wemm 		}
27971c4bcd05SJeff Roberson 		td->td_ru.ru_nsignals++;
27982c42a146SMarcel Moolenaar 		if (p->p_sig != sig) {
2799df8bae1dSRodney W. Grimes 			code = 0;
2800df8bae1dSRodney W. Grimes 		} else {
28016626c604SJulian Elischer 			code = p->p_code;
28026626c604SJulian Elischer 			p->p_code = 0;
28036626c604SJulian Elischer 			p->p_sig = 0;
2804df8bae1dSRodney W. Grimes 		}
28058460a577SJohn Birrell #ifdef KSE
2806cbf4e354SDavid Xu 		if (td->td_pflags & TDP_SA)
28079104847fSDavid Xu 			thread_signal_add(curthread, &ksi);
280858a3c273SJeff Roberson 		else
28099104847fSDavid Xu 			(*p->p_sysent->sv_sendsig)(action, &ksi, &returnmask);
28108460a577SJohn Birrell #else
28118460a577SJohn Birrell 		(*p->p_sysent->sv_sendsig)(action, &ksi, &returnmask);
28128460a577SJohn Birrell #endif
2813df8bae1dSRodney W. Grimes 	}
2814df8bae1dSRodney W. Grimes }
2815df8bae1dSRodney W. Grimes 
2816df8bae1dSRodney W. Grimes /*
2817df8bae1dSRodney W. Grimes  * Kill the current process for stated reason.
2818df8bae1dSRodney W. Grimes  */
281926f9a767SRodney W. Grimes void
2820df8bae1dSRodney W. Grimes killproc(p, why)
2821df8bae1dSRodney W. Grimes 	struct proc *p;
2822df8bae1dSRodney W. Grimes 	char *why;
2823df8bae1dSRodney W. Grimes {
28249081e5e8SJohn Baldwin 
28259081e5e8SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
28260384fff8SJason Evans 	CTR3(KTR_PROC, "killproc: proc %p (pid %d, %s)",
28270384fff8SJason Evans 		p, p->p_pid, p->p_comm);
2828729b1e51SDavid Greenman 	log(LOG_ERR, "pid %d (%s), uid %d, was killed: %s\n", p->p_pid, p->p_comm,
2829b1fc0ec1SRobert Watson 		p->p_ucred ? p->p_ucred->cr_uid : -1, why);
2830df8bae1dSRodney W. Grimes 	psignal(p, SIGKILL);
2831df8bae1dSRodney W. Grimes }
2832df8bae1dSRodney W. Grimes 
2833df8bae1dSRodney W. Grimes /*
2834df8bae1dSRodney W. Grimes  * Force the current process to exit with the specified signal, dumping core
2835df8bae1dSRodney W. Grimes  * if appropriate.  We bypass the normal tests for masked and caught signals,
2836df8bae1dSRodney W. Grimes  * allowing unrecoverable failures to terminate the process without changing
2837df8bae1dSRodney W. Grimes  * signal state.  Mark the accounting record with the signal termination.
2838df8bae1dSRodney W. Grimes  * If dumping core, save the signal number for the debugger.  Calls exit and
2839df8bae1dSRodney W. Grimes  * does not return.
2840df8bae1dSRodney W. Grimes  */
284126f9a767SRodney W. Grimes void
2842b40ce416SJulian Elischer sigexit(td, sig)
2843b40ce416SJulian Elischer 	struct thread *td;
28442c42a146SMarcel Moolenaar 	int sig;
2845df8bae1dSRodney W. Grimes {
2846b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
2847df8bae1dSRodney W. Grimes 
2848628d2653SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2849df8bae1dSRodney W. Grimes 	p->p_acflag |= AXSIG;
2850f97c3df1SDavid Schultz 	/*
2851f97c3df1SDavid Schultz 	 * We must be single-threading to generate a core dump.  This
2852f97c3df1SDavid Schultz 	 * ensures that the registers in the core file are up-to-date.
2853f97c3df1SDavid Schultz 	 * Also, the ELF dump handler assumes that the thread list doesn't
2854f97c3df1SDavid Schultz 	 * change out from under it.
2855f97c3df1SDavid Schultz 	 *
2856f97c3df1SDavid Schultz 	 * XXX If another thread attempts to single-thread before us
2857f97c3df1SDavid Schultz 	 *     (e.g. via fork()), we won't get a dump at all.
2858f97c3df1SDavid Schultz 	 */
2859f97c3df1SDavid Schultz 	if ((sigprop(sig) & SA_CORE) && (thread_single(SINGLE_NO_EXIT) == 0)) {
28602c42a146SMarcel Moolenaar 		p->p_sig = sig;
2861c364e17eSAndrey A. Chernov 		/*
2862c364e17eSAndrey A. Chernov 		 * Log signals which would cause core dumps
2863c364e17eSAndrey A. Chernov 		 * (Log as LOG_INFO to appease those who don't want
2864c364e17eSAndrey A. Chernov 		 * these messages.)
2865c364e17eSAndrey A. Chernov 		 * XXX : Todo, as well as euid, write out ruid too
28664ae89b95SJohn Baldwin 		 * Note that coredump() drops proc lock.
2867c364e17eSAndrey A. Chernov 		 */
2868b40ce416SJulian Elischer 		if (coredump(td) == 0)
28692c42a146SMarcel Moolenaar 			sig |= WCOREFLAG;
287057308494SJoerg Wunsch 		if (kern_logsigexit)
287157308494SJoerg Wunsch 			log(LOG_INFO,
287257308494SJoerg Wunsch 			    "pid %d (%s), uid %d: exited on signal %d%s\n",
28733d1b21c6SAndrey A. Chernov 			    p->p_pid, p->p_comm,
28749c1ab3e0SJohn Baldwin 			    td->td_ucred ? td->td_ucred->cr_uid : -1,
28752c42a146SMarcel Moolenaar 			    sig &~ WCOREFLAG,
28762c42a146SMarcel Moolenaar 			    sig & WCOREFLAG ? " (core dumped)" : "");
28774ae89b95SJohn Baldwin 	} else
2878628d2653SJohn Baldwin 		PROC_UNLOCK(p);
2879b40ce416SJulian Elischer 	exit1(td, W_EXITCODE(0, sig));
2880df8bae1dSRodney W. Grimes 	/* NOTREACHED */
2881df8bae1dSRodney W. Grimes }
2882df8bae1dSRodney W. Grimes 
2883ebceaf6dSDavid Xu /*
28847f96995eSDavid Xu  * Send queued SIGCHLD to parent when child process's state
28857f96995eSDavid Xu  * is changed.
2886ebceaf6dSDavid Xu  */
28877f96995eSDavid Xu static void
28887f96995eSDavid Xu sigparent(struct proc *p, int reason, int status)
2889ebceaf6dSDavid Xu {
2890ebceaf6dSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
2891ebceaf6dSDavid Xu 	PROC_LOCK_ASSERT(p->p_pptr, MA_OWNED);
2892ebceaf6dSDavid Xu 
2893ebceaf6dSDavid Xu 	if (p->p_ksi != NULL) {
2894ebceaf6dSDavid Xu 		p->p_ksi->ksi_signo  = SIGCHLD;
2895ebceaf6dSDavid Xu 		p->p_ksi->ksi_code   = reason;
28967f96995eSDavid Xu 		p->p_ksi->ksi_status = status;
2897ebceaf6dSDavid Xu 		p->p_ksi->ksi_pid    = p->p_pid;
2898ebceaf6dSDavid Xu 		p->p_ksi->ksi_uid    = p->p_ucred->cr_ruid;
2899ebceaf6dSDavid Xu 		if (KSI_ONQ(p->p_ksi))
2900ebceaf6dSDavid Xu 			return;
2901ebceaf6dSDavid Xu 	}
2902ebceaf6dSDavid Xu 	tdsignal(p->p_pptr, NULL, SIGCHLD, p->p_ksi);
2903ebceaf6dSDavid Xu }
2904ebceaf6dSDavid Xu 
29057f96995eSDavid Xu static void
29067f96995eSDavid Xu childproc_jobstate(struct proc *p, int reason, int status)
29077f96995eSDavid Xu {
29087f96995eSDavid Xu 	struct sigacts *ps;
29097f96995eSDavid Xu 
29107f96995eSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
29117f96995eSDavid Xu 	PROC_LOCK_ASSERT(p->p_pptr, MA_OWNED);
29127f96995eSDavid Xu 
29137f96995eSDavid Xu 	/*
29147f96995eSDavid Xu 	 * Wake up parent sleeping in kern_wait(), also send
29157f96995eSDavid Xu 	 * SIGCHLD to parent, but SIGCHLD does not guarantee
29167f96995eSDavid Xu 	 * that parent will awake, because parent may masked
29177f96995eSDavid Xu 	 * the signal.
29187f96995eSDavid Xu 	 */
29197f96995eSDavid Xu 	p->p_pptr->p_flag |= P_STATCHILD;
29207f96995eSDavid Xu 	wakeup(p->p_pptr);
29217f96995eSDavid Xu 
29227f96995eSDavid Xu 	ps = p->p_pptr->p_sigacts;
29237f96995eSDavid Xu 	mtx_lock(&ps->ps_mtx);
29247f96995eSDavid Xu 	if ((ps->ps_flag & PS_NOCLDSTOP) == 0) {
29257f96995eSDavid Xu 		mtx_unlock(&ps->ps_mtx);
29267f96995eSDavid Xu 		sigparent(p, reason, status);
29277f96995eSDavid Xu 	} else
29287f96995eSDavid Xu 		mtx_unlock(&ps->ps_mtx);
29297f96995eSDavid Xu }
29307f96995eSDavid Xu 
29317f96995eSDavid Xu void
29327f96995eSDavid Xu childproc_stopped(struct proc *p, int reason)
29337f96995eSDavid Xu {
29347f96995eSDavid Xu 	childproc_jobstate(p, reason, p->p_xstat);
29357f96995eSDavid Xu }
29367f96995eSDavid Xu 
2937ebceaf6dSDavid Xu void
2938ebceaf6dSDavid Xu childproc_continued(struct proc *p)
2939ebceaf6dSDavid Xu {
29407f96995eSDavid Xu 	childproc_jobstate(p, CLD_CONTINUED, SIGCONT);
2941ebceaf6dSDavid Xu }
2942ebceaf6dSDavid Xu 
2943ebceaf6dSDavid Xu void
2944ebceaf6dSDavid Xu childproc_exited(struct proc *p)
2945ebceaf6dSDavid Xu {
2946ebceaf6dSDavid Xu 	int reason;
2947f4d85223SDavid Xu 	int status = p->p_xstat; /* convert to int */
2948ebceaf6dSDavid Xu 
2949ebceaf6dSDavid Xu 	reason = CLD_EXITED;
2950f4d85223SDavid Xu 	if (WCOREDUMP(status))
2951ebceaf6dSDavid Xu 		reason = CLD_DUMPED;
2952f4d85223SDavid Xu 	else if (WIFSIGNALED(status))
2953ebceaf6dSDavid Xu 		reason = CLD_KILLED;
29547f96995eSDavid Xu 	/*
29557f96995eSDavid Xu 	 * XXX avoid calling wakeup(p->p_pptr), the work is
29567f96995eSDavid Xu 	 * done in exit1().
29577f96995eSDavid Xu 	 */
29587f96995eSDavid Xu 	sigparent(p, reason, status);
2959ebceaf6dSDavid Xu }
2960ebceaf6dSDavid Xu 
29616d1ab6edSWarner Losh static char corefilename[MAXPATHLEN] = {"%N.core"};
2962c5edb423SSean Eric Fagan SYSCTL_STRING(_kern, OID_AUTO, corefile, CTLFLAG_RW, corefilename,
2963c5edb423SSean Eric Fagan 	      sizeof(corefilename), "process corefile name format string");
2964c5edb423SSean Eric Fagan 
2965c5edb423SSean Eric Fagan /*
2966c5edb423SSean Eric Fagan  * expand_name(name, uid, pid)
2967c5edb423SSean Eric Fagan  * Expand the name described in corefilename, using name, uid, and pid.
2968c5edb423SSean Eric Fagan  * corefilename is a printf-like string, with three format specifiers:
2969c5edb423SSean Eric Fagan  *	%N	name of process ("name")
2970c5edb423SSean Eric Fagan  *	%P	process id (pid)
2971c5edb423SSean Eric Fagan  *	%U	user id (uid)
2972c5edb423SSean Eric Fagan  * For example, "%N.core" is the default; they can be disabled completely
2973c5edb423SSean Eric Fagan  * by using "/dev/null", or all core files can be stored in "/cores/%U/%N-%P".
2974c5edb423SSean Eric Fagan  * This is controlled by the sysctl variable kern.corefile (see above).
2975c5edb423SSean Eric Fagan  */
2976c5edb423SSean Eric Fagan 
2977fca666a1SJulian Elischer static char *
2978c5edb423SSean Eric Fagan expand_name(name, uid, pid)
29798b43b535SAlfred Perlstein 	const char *name;
29808b43b535SAlfred Perlstein 	uid_t uid;
29818b43b535SAlfred Perlstein 	pid_t pid;
29828b43b535SAlfred Perlstein {
29838b43b535SAlfred Perlstein 	const char *format, *appendstr;
2984c5edb423SSean Eric Fagan 	char *temp;
2985c5edb423SSean Eric Fagan 	char buf[11];		/* Buffer for pid/uid -- max 4B */
29868b43b535SAlfred Perlstein 	size_t i, l, n;
2987c5edb423SSean Eric Fagan 
29888b43b535SAlfred Perlstein 	format = corefilename;
29898b43b535SAlfred Perlstein 	temp = malloc(MAXPATHLEN, M_TEMP, M_NOWAIT | M_ZERO);
29900bfe2990SEivind Eklund 	if (temp == NULL)
29918b43b535SAlfred Perlstein 		return (NULL);
2992ce38ca0fSAlfred Perlstein 	for (i = 0, n = 0; n < MAXPATHLEN && format[i]; i++) {
2993c5edb423SSean Eric Fagan 		switch (format[i]) {
2994c5edb423SSean Eric Fagan 		case '%':	/* Format character */
2995c5edb423SSean Eric Fagan 			i++;
2996c5edb423SSean Eric Fagan 			switch (format[i]) {
2997c5edb423SSean Eric Fagan 			case '%':
29988b43b535SAlfred Perlstein 				appendstr = "%";
2999c5edb423SSean Eric Fagan 				break;
3000c5edb423SSean Eric Fagan 			case 'N':	/* process name */
30018b43b535SAlfred Perlstein 				appendstr = name;
3002c5edb423SSean Eric Fagan 				break;
3003c5edb423SSean Eric Fagan 			case 'P':	/* process id */
30048b43b535SAlfred Perlstein 				sprintf(buf, "%u", pid);
30058b43b535SAlfred Perlstein 				appendstr = buf;
3006c5edb423SSean Eric Fagan 				break;
3007c5edb423SSean Eric Fagan 			case 'U':	/* user id */
30088b43b535SAlfred Perlstein 				sprintf(buf, "%u", uid);
30098b43b535SAlfred Perlstein 				appendstr = buf;
3010c5edb423SSean Eric Fagan 				break;
3011c5edb423SSean Eric Fagan 			default:
30128b43b535SAlfred Perlstein 				appendstr = "";
30138b43b535SAlfred Perlstein 			  	log(LOG_ERR,
30148b43b535SAlfred Perlstein 				    "Unknown format character %c in `%s'\n",
30158b43b535SAlfred Perlstein 				    format[i], format);
3016c5edb423SSean Eric Fagan 			}
30178b43b535SAlfred Perlstein 			l = strlen(appendstr);
30188b43b535SAlfred Perlstein 			if ((n + l) >= MAXPATHLEN)
30198b43b535SAlfred Perlstein 				goto toolong;
30208b43b535SAlfred Perlstein 			memcpy(temp + n, appendstr, l);
30218b43b535SAlfred Perlstein 			n += l;
3022c5edb423SSean Eric Fagan 			break;
3023c5edb423SSean Eric Fagan 		default:
3024c5edb423SSean Eric Fagan 			temp[n++] = format[i];
3025c5edb423SSean Eric Fagan 		}
3026c5edb423SSean Eric Fagan 	}
30278b43b535SAlfred Perlstein 	if (format[i] != '\0')
30288b43b535SAlfred Perlstein 		goto toolong;
30298b43b535SAlfred Perlstein 	return (temp);
30308b43b535SAlfred Perlstein toolong:
30318b43b535SAlfred Perlstein 	log(LOG_ERR, "pid %ld (%s), uid (%lu): corename is too long\n",
30328b43b535SAlfred Perlstein 	    (long)pid, name, (u_long)uid);
30338b43b535SAlfred Perlstein 	free(temp, M_TEMP);
30348b43b535SAlfred Perlstein 	return (NULL);
3035c5edb423SSean Eric Fagan }
3036c5edb423SSean Eric Fagan 
3037df8bae1dSRodney W. Grimes /*
3038fca666a1SJulian Elischer  * Dump a process' core.  The main routine does some
3039fca666a1SJulian Elischer  * policy checking, and creates the name of the coredump;
3040fca666a1SJulian Elischer  * then it passes on a vnode and a size limit to the process-specific
3041fca666a1SJulian Elischer  * coredump routine if there is one; if there _is not_ one, it returns
3042fca666a1SJulian Elischer  * ENOSYS; otherwise it returns the error from the process-specific routine.
3043fca666a1SJulian Elischer  */
3044fca666a1SJulian Elischer 
3045fca666a1SJulian Elischer static int
3046b40ce416SJulian Elischer coredump(struct thread *td)
3047fca666a1SJulian Elischer {
3048b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
3049fca666a1SJulian Elischer 	register struct vnode *vp;
30509c1ab3e0SJohn Baldwin 	register struct ucred *cred = td->td_ucred;
305106ae1e91SMatthew Dillon 	struct flock lf;
3052fca666a1SJulian Elischer 	struct nameidata nd;
3053fca666a1SJulian Elischer 	struct vattr vattr;
3054c447f5b2SRobert Watson 	int error, error1, flags, locked;
3055f2a2857bSKirk McKusick 	struct mount *mp;
3056fca666a1SJulian Elischer 	char *name;			/* name of corefile */
3057fca666a1SJulian Elischer 	off_t limit;
305833f19beeSJohn Baldwin 	int vfslocked;
3059fca666a1SJulian Elischer 
30604ae89b95SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
3061f97c3df1SDavid Schultz 	MPASS((p->p_flag & P_HADTHREADS) == 0 || p->p_singlethread == td);
3062628d2653SJohn Baldwin 	_STOPEVENT(p, S_CORE, 0);
3063fca666a1SJulian Elischer 
306457274c51SChristian S.J. Peron 	name = expand_name(p->p_comm, td->td_ucred->cr_uid, p->p_pid);
306557274c51SChristian S.J. Peron 	if (name == NULL) {
306657274c51SChristian S.J. Peron #ifdef AUDIT
306757274c51SChristian S.J. Peron 		audit_proc_coredump(td, NULL, EINVAL);
306857274c51SChristian S.J. Peron #endif
306957274c51SChristian S.J. Peron 		return (EINVAL);
307057274c51SChristian S.J. Peron 	}
3071628d2653SJohn Baldwin 	if (((sugid_coredump == 0) && p->p_flag & P_SUGID) || do_coredump == 0) {
3072628d2653SJohn Baldwin 		PROC_UNLOCK(p);
307357274c51SChristian S.J. Peron #ifdef AUDIT
307457274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, EFAULT);
307557274c51SChristian S.J. Peron #endif
307657274c51SChristian S.J. Peron 		free(name, M_TEMP);
3077fca666a1SJulian Elischer 		return (EFAULT);
3078628d2653SJohn Baldwin 	}
3079fca666a1SJulian Elischer 
3080fca666a1SJulian Elischer 	/*
308135a2598fSSean Eric Fagan 	 * Note that the bulk of limit checking is done after
308235a2598fSSean Eric Fagan 	 * the corefile is created.  The exception is if the limit
308335a2598fSSean Eric Fagan 	 * for corefiles is 0, in which case we don't bother
308435a2598fSSean Eric Fagan 	 * creating the corefile at all.  This layout means that
308535a2598fSSean Eric Fagan 	 * a corefile is truncated instead of not being created,
308635a2598fSSean Eric Fagan 	 * if it is larger than the limit.
3087fca666a1SJulian Elischer 	 */
308891d5354aSJohn Baldwin 	limit = (off_t)lim_cur(p, RLIMIT_CORE);
3089628d2653SJohn Baldwin 	PROC_UNLOCK(p);
309057274c51SChristian S.J. Peron 	if (limit == 0) {
309157274c51SChristian S.J. Peron #ifdef AUDIT
309257274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, EFBIG);
309357274c51SChristian S.J. Peron #endif
309457274c51SChristian S.J. Peron 		free(name, M_TEMP);
309591d5354aSJohn Baldwin 		return (EFBIG);
309657274c51SChristian S.J. Peron 	}
309735a2598fSSean Eric Fagan 
3098f2a2857bSKirk McKusick restart:
309933f19beeSJohn Baldwin 	NDINIT(&nd, LOOKUP, NOFOLLOW | MPSAFE, UIO_SYSSPACE, name, td);
3100e6796b67SKirk McKusick 	flags = O_CREAT | FWRITE | O_NOFOLLOW;
31019e223287SKonstantin Belousov 	error = vn_open(&nd, &flags, S_IRUSR | S_IWUSR, NULL);
310257274c51SChristian S.J. Peron 	if (error) {
310357274c51SChristian S.J. Peron #ifdef AUDIT
310457274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, error);
310557274c51SChristian S.J. Peron #endif
3106fca666a1SJulian Elischer 		free(name, M_TEMP);
3107fca666a1SJulian Elischer 		return (error);
310857274c51SChristian S.J. Peron 	}
310933f19beeSJohn Baldwin 	vfslocked = NDHASGIANT(&nd);
3110762e6b85SEivind Eklund 	NDFREE(&nd, NDF_ONLY_PNBUF);
3111fca666a1SJulian Elischer 	vp = nd.ni_vp;
311206ae1e91SMatthew Dillon 
3113832dafadSDon Lewis 	/* Don't dump to non-regular files or files with links. */
3114832dafadSDon Lewis 	if (vp->v_type != VREG ||
3115832dafadSDon Lewis 	    VOP_GETATTR(vp, &vattr, cred, td) || vattr.va_nlink != 1) {
3116832dafadSDon Lewis 		VOP_UNLOCK(vp, 0, td);
3117832dafadSDon Lewis 		error = EFAULT;
311833f19beeSJohn Baldwin 		goto close;
3119832dafadSDon Lewis 	}
3120832dafadSDon Lewis 
3121b40ce416SJulian Elischer 	VOP_UNLOCK(vp, 0, td);
312206ae1e91SMatthew Dillon 	lf.l_whence = SEEK_SET;
312306ae1e91SMatthew Dillon 	lf.l_start = 0;
312406ae1e91SMatthew Dillon 	lf.l_len = 0;
312506ae1e91SMatthew Dillon 	lf.l_type = F_WRLCK;
3126c447f5b2SRobert Watson 	locked = (VOP_ADVLOCK(vp, (caddr_t)p, F_SETLK, &lf, F_FLOCK) == 0);
312706ae1e91SMatthew Dillon 
312806ae1e91SMatthew Dillon 	if (vn_start_write(vp, &mp, V_NOWAIT) != 0) {
312906ae1e91SMatthew Dillon 		lf.l_type = F_UNLCK;
313036bbf86bSRobert Watson 		if (locked)
313106ae1e91SMatthew Dillon 			VOP_ADVLOCK(vp, (caddr_t)p, F_UNLCK, &lf, F_FLOCK);
3132b40ce416SJulian Elischer 		if ((error = vn_close(vp, FWRITE, cred, td)) != 0)
313333f19beeSJohn Baldwin 			goto out;
3134f2a2857bSKirk McKusick 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
313533f19beeSJohn Baldwin 			goto out;
313633f19beeSJohn Baldwin 		VFS_UNLOCK_GIANT(vfslocked);
3137f2a2857bSKirk McKusick 		goto restart;
3138f2a2857bSKirk McKusick 	}
3139fca666a1SJulian Elischer 
3140fca666a1SJulian Elischer 	VATTR_NULL(&vattr);
3141fca666a1SJulian Elischer 	vattr.va_size = 0;
31426141e04aSJohn-Mark Gurney 	if (set_core_nodump_flag)
31436141e04aSJohn-Mark Gurney 		vattr.va_flags = UF_NODUMP;
314488b1d98fSPaul Saab 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3145b40ce416SJulian Elischer 	VOP_LEASE(vp, td, cred, LEASE_WRITE);
3146b40ce416SJulian Elischer 	VOP_SETATTR(vp, &vattr, cred, td);
314788b1d98fSPaul Saab 	VOP_UNLOCK(vp, 0, td);
314811991ab4STor Egge 	vn_finished_write(mp);
3149628d2653SJohn Baldwin 	PROC_LOCK(p);
3150fca666a1SJulian Elischer 	p->p_acflag |= ACORE;
3151628d2653SJohn Baldwin 	PROC_UNLOCK(p);
3152fca666a1SJulian Elischer 
3153fca666a1SJulian Elischer 	error = p->p_sysent->sv_coredump ?
3154b40ce416SJulian Elischer 	  p->p_sysent->sv_coredump(td, vp, limit) :
3155fca666a1SJulian Elischer 	  ENOSYS;
3156fca666a1SJulian Elischer 
3157c447f5b2SRobert Watson 	if (locked) {
315806ae1e91SMatthew Dillon 		lf.l_type = F_UNLCK;
315906ae1e91SMatthew Dillon 		VOP_ADVLOCK(vp, (caddr_t)p, F_UNLCK, &lf, F_FLOCK);
3160c447f5b2SRobert Watson 	}
316133f19beeSJohn Baldwin close:
3162b40ce416SJulian Elischer 	error1 = vn_close(vp, FWRITE, cred, td);
3163fca666a1SJulian Elischer 	if (error == 0)
3164fca666a1SJulian Elischer 		error = error1;
316533f19beeSJohn Baldwin out:
316657274c51SChristian S.J. Peron #ifdef AUDIT
316757274c51SChristian S.J. Peron 	audit_proc_coredump(td, name, error);
316857274c51SChristian S.J. Peron #endif
316957274c51SChristian S.J. Peron 	free(name, M_TEMP);
317033f19beeSJohn Baldwin 	VFS_UNLOCK_GIANT(vfslocked);
3171fca666a1SJulian Elischer 	return (error);
3172fca666a1SJulian Elischer }
3173fca666a1SJulian Elischer 
3174fca666a1SJulian Elischer /*
31750c14ff0eSRobert Watson  * Nonexistent system call-- signal process (may want to handle it).  Flag
31760c14ff0eSRobert Watson  * error in case process won't see signal immediately (blocked or ignored).
3177df8bae1dSRodney W. Grimes  */
3178d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
3179df8bae1dSRodney W. Grimes struct nosys_args {
3180df8bae1dSRodney W. Grimes 	int	dummy;
3181df8bae1dSRodney W. Grimes };
3182d2d3e875SBruce Evans #endif
3183df8bae1dSRodney W. Grimes /* ARGSUSED */
318426f9a767SRodney W. Grimes int
3185b40ce416SJulian Elischer nosys(td, args)
3186b40ce416SJulian Elischer 	struct thread *td;
3187df8bae1dSRodney W. Grimes 	struct nosys_args *args;
3188df8bae1dSRodney W. Grimes {
3189b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
3190b40ce416SJulian Elischer 
3191628d2653SJohn Baldwin 	PROC_LOCK(p);
3192df8bae1dSRodney W. Grimes 	psignal(p, SIGSYS);
3193628d2653SJohn Baldwin 	PROC_UNLOCK(p);
3194f5216b9aSBruce Evans 	return (ENOSYS);
3195df8bae1dSRodney W. Grimes }
3196831d27a9SDon Lewis 
3197831d27a9SDon Lewis /*
31980c14ff0eSRobert Watson  * Send a SIGIO or SIGURG signal to a process or process group using stored
31990c14ff0eSRobert Watson  * credentials rather than those of the current process.
3200831d27a9SDon Lewis  */
3201831d27a9SDon Lewis void
3202f1320723SAlfred Perlstein pgsigio(sigiop, sig, checkctty)
3203f1320723SAlfred Perlstein 	struct sigio **sigiop;
32042c42a146SMarcel Moolenaar 	int sig, checkctty;
3205831d27a9SDon Lewis {
3206f1320723SAlfred Perlstein 	struct sigio *sigio;
3207831d27a9SDon Lewis 
3208f1320723SAlfred Perlstein 	SIGIO_LOCK();
3209f1320723SAlfred Perlstein 	sigio = *sigiop;
3210f1320723SAlfred Perlstein 	if (sigio == NULL) {
3211f1320723SAlfred Perlstein 		SIGIO_UNLOCK();
3212f1320723SAlfred Perlstein 		return;
3213f1320723SAlfred Perlstein 	}
3214831d27a9SDon Lewis 	if (sigio->sio_pgid > 0) {
3215628d2653SJohn Baldwin 		PROC_LOCK(sigio->sio_proc);
32162b87b6d4SRobert Watson 		if (CANSIGIO(sigio->sio_ucred, sigio->sio_proc->p_ucred))
32172c42a146SMarcel Moolenaar 			psignal(sigio->sio_proc, sig);
3218628d2653SJohn Baldwin 		PROC_UNLOCK(sigio->sio_proc);
3219831d27a9SDon Lewis 	} else if (sigio->sio_pgid < 0) {
3220831d27a9SDon Lewis 		struct proc *p;
3221831d27a9SDon Lewis 
3222f591779bSSeigo Tanimura 		PGRP_LOCK(sigio->sio_pgrp);
3223628d2653SJohn Baldwin 		LIST_FOREACH(p, &sigio->sio_pgrp->pg_members, p_pglist) {
3224628d2653SJohn Baldwin 			PROC_LOCK(p);
32252b87b6d4SRobert Watson 			if (CANSIGIO(sigio->sio_ucred, p->p_ucred) &&
3226831d27a9SDon Lewis 			    (checkctty == 0 || (p->p_flag & P_CONTROLT)))
32272c42a146SMarcel Moolenaar 				psignal(p, sig);
3228628d2653SJohn Baldwin 			PROC_UNLOCK(p);
3229628d2653SJohn Baldwin 		}
3230f591779bSSeigo Tanimura 		PGRP_UNLOCK(sigio->sio_pgrp);
3231831d27a9SDon Lewis 	}
3232f1320723SAlfred Perlstein 	SIGIO_UNLOCK();
3233831d27a9SDon Lewis }
3234cb679c38SJonathan Lemon 
3235cb679c38SJonathan Lemon static int
3236cb679c38SJonathan Lemon filt_sigattach(struct knote *kn)
3237cb679c38SJonathan Lemon {
3238cb679c38SJonathan Lemon 	struct proc *p = curproc;
3239cb679c38SJonathan Lemon 
3240cb679c38SJonathan Lemon 	kn->kn_ptr.p_proc = p;
3241cb679c38SJonathan Lemon 	kn->kn_flags |= EV_CLEAR;		/* automatically set */
3242cb679c38SJonathan Lemon 
3243ad3b9257SJohn-Mark Gurney 	knlist_add(&p->p_klist, kn, 0);
3244cb679c38SJonathan Lemon 
3245cb679c38SJonathan Lemon 	return (0);
3246cb679c38SJonathan Lemon }
3247cb679c38SJonathan Lemon 
3248cb679c38SJonathan Lemon static void
3249cb679c38SJonathan Lemon filt_sigdetach(struct knote *kn)
3250cb679c38SJonathan Lemon {
3251cb679c38SJonathan Lemon 	struct proc *p = kn->kn_ptr.p_proc;
3252cb679c38SJonathan Lemon 
3253ad3b9257SJohn-Mark Gurney 	knlist_remove(&p->p_klist, kn, 0);
3254cb679c38SJonathan Lemon }
3255cb679c38SJonathan Lemon 
3256cb679c38SJonathan Lemon /*
3257cb679c38SJonathan Lemon  * signal knotes are shared with proc knotes, so we apply a mask to
3258cb679c38SJonathan Lemon  * the hint in order to differentiate them from process hints.  This
3259cb679c38SJonathan Lemon  * could be avoided by using a signal-specific knote list, but probably
3260cb679c38SJonathan Lemon  * isn't worth the trouble.
3261cb679c38SJonathan Lemon  */
3262cb679c38SJonathan Lemon static int
3263cb679c38SJonathan Lemon filt_signal(struct knote *kn, long hint)
3264cb679c38SJonathan Lemon {
3265cb679c38SJonathan Lemon 
3266cb679c38SJonathan Lemon 	if (hint & NOTE_SIGNAL) {
3267cb679c38SJonathan Lemon 		hint &= ~NOTE_SIGNAL;
3268cb679c38SJonathan Lemon 
3269cb679c38SJonathan Lemon 		if (kn->kn_id == hint)
3270cb679c38SJonathan Lemon 			kn->kn_data++;
3271cb679c38SJonathan Lemon 	}
3272cb679c38SJonathan Lemon 	return (kn->kn_data != 0);
3273cb679c38SJonathan Lemon }
327490af4afaSJohn Baldwin 
327590af4afaSJohn Baldwin struct sigacts *
327690af4afaSJohn Baldwin sigacts_alloc(void)
327790af4afaSJohn Baldwin {
327890af4afaSJohn Baldwin 	struct sigacts *ps;
327990af4afaSJohn Baldwin 
328090af4afaSJohn Baldwin 	ps = malloc(sizeof(struct sigacts), M_SUBPROC, M_WAITOK | M_ZERO);
328190af4afaSJohn Baldwin 	ps->ps_refcnt = 1;
328290af4afaSJohn Baldwin 	mtx_init(&ps->ps_mtx, "sigacts", NULL, MTX_DEF);
328390af4afaSJohn Baldwin 	return (ps);
328490af4afaSJohn Baldwin }
328590af4afaSJohn Baldwin 
328690af4afaSJohn Baldwin void
328790af4afaSJohn Baldwin sigacts_free(struct sigacts *ps)
328890af4afaSJohn Baldwin {
328990af4afaSJohn Baldwin 
329090af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
329190af4afaSJohn Baldwin 	ps->ps_refcnt--;
329290af4afaSJohn Baldwin 	if (ps->ps_refcnt == 0) {
329390af4afaSJohn Baldwin 		mtx_destroy(&ps->ps_mtx);
329490af4afaSJohn Baldwin 		free(ps, M_SUBPROC);
329590af4afaSJohn Baldwin 	} else
329690af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
329790af4afaSJohn Baldwin }
329890af4afaSJohn Baldwin 
329990af4afaSJohn Baldwin struct sigacts *
330090af4afaSJohn Baldwin sigacts_hold(struct sigacts *ps)
330190af4afaSJohn Baldwin {
330290af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
330390af4afaSJohn Baldwin 	ps->ps_refcnt++;
330490af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
330590af4afaSJohn Baldwin 	return (ps);
330690af4afaSJohn Baldwin }
330790af4afaSJohn Baldwin 
330890af4afaSJohn Baldwin void
330990af4afaSJohn Baldwin sigacts_copy(struct sigacts *dest, struct sigacts *src)
331090af4afaSJohn Baldwin {
331190af4afaSJohn Baldwin 
331290af4afaSJohn Baldwin 	KASSERT(dest->ps_refcnt == 1, ("sigacts_copy to shared dest"));
331390af4afaSJohn Baldwin 	mtx_lock(&src->ps_mtx);
331490af4afaSJohn Baldwin 	bcopy(src, dest, offsetof(struct sigacts, ps_refcnt));
331590af4afaSJohn Baldwin 	mtx_unlock(&src->ps_mtx);
331690af4afaSJohn Baldwin }
331790af4afaSJohn Baldwin 
331890af4afaSJohn Baldwin int
331990af4afaSJohn Baldwin sigacts_shared(struct sigacts *ps)
332090af4afaSJohn Baldwin {
332190af4afaSJohn Baldwin 	int shared;
332290af4afaSJohn Baldwin 
332390af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
332490af4afaSJohn Baldwin 	shared = ps->ps_refcnt > 1;
332590af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
332690af4afaSJohn Baldwin 	return (shared);
332790af4afaSJohn Baldwin }
3328