xref: /freebsd/sys/kern/kern_sig.c (revision c90c9021e94dd95b34bb48c3f8bb29761379a8d8)
19454b2d8SWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1989, 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  * (c) UNIX System Laboratories, Inc.
5df8bae1dSRodney W. Grimes  * All or some portions of this file are derived from material licensed
6df8bae1dSRodney W. Grimes  * to the University of California by American Telephone and Telegraph
7df8bae1dSRodney W. Grimes  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8df8bae1dSRodney W. Grimes  * the permission of UNIX System Laboratories, Inc.
9df8bae1dSRodney W. Grimes  *
10df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
11df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
12df8bae1dSRodney W. Grimes  * are met:
13df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
15df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
16df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
17df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
18df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
19df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
20df8bae1dSRodney W. Grimes  *    without specific prior written permission.
21df8bae1dSRodney W. Grimes  *
22df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
33df8bae1dSRodney W. Grimes  *
34df8bae1dSRodney W. Grimes  *	@(#)kern_sig.c	8.7 (Berkeley) 4/18/94
35df8bae1dSRodney W. Grimes  */
36df8bae1dSRodney W. Grimes 
37677b542eSDavid E. O'Brien #include <sys/cdefs.h>
38677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$");
39677b542eSDavid E. O'Brien 
405591b823SEivind Eklund #include "opt_compat.h"
415d217f17SJohn Birrell #include "opt_kdtrace.h"
42db6a20e2SGarrett Wollman #include "opt_ktrace.h"
43db6a20e2SGarrett Wollman 
44df8bae1dSRodney W. Grimes #include <sys/param.h>
4536240ea5SDoug Rabson #include <sys/systm.h>
46df8bae1dSRodney W. Grimes #include <sys/signalvar.h>
47df8bae1dSRodney W. Grimes #include <sys/vnode.h>
48df8bae1dSRodney W. Grimes #include <sys/acct.h>
49238510fcSJason Evans #include <sys/condvar.h>
50854dc8c2SJohn Baldwin #include <sys/event.h>
51854dc8c2SJohn Baldwin #include <sys/fcntl.h>
52854dc8c2SJohn Baldwin #include <sys/kernel.h>
530384fff8SJason Evans #include <sys/ktr.h>
54df8bae1dSRodney W. Grimes #include <sys/ktrace.h>
55854dc8c2SJohn Baldwin #include <sys/lock.h>
56854dc8c2SJohn Baldwin #include <sys/malloc.h>
57854dc8c2SJohn Baldwin #include <sys/mutex.h>
58854dc8c2SJohn Baldwin #include <sys/namei.h>
59854dc8c2SJohn Baldwin #include <sys/proc.h>
606aeb05d7STom Rhodes #include <sys/posix4.h>
61854dc8c2SJohn Baldwin #include <sys/pioctl.h>
62c31146a1SJohn Baldwin #include <sys/resourcevar.h>
635d217f17SJohn Birrell #include <sys/sdt.h>
6436b208e0SRobert Watson #include <sys/sbuf.h>
6544f3b092SJohn Baldwin #include <sys/sleepqueue.h>
666caa8a15SJohn Baldwin #include <sys/smp.h>
67df8bae1dSRodney W. Grimes #include <sys/stat.h>
681005a129SJohn Baldwin #include <sys/sx.h>
698f19eb88SIan Dowse #include <sys/syscallsubr.h>
70c87e2930SDavid Greenman #include <sys/sysctl.h>
71854dc8c2SJohn Baldwin #include <sys/sysent.h>
72854dc8c2SJohn Baldwin #include <sys/syslog.h>
73854dc8c2SJohn Baldwin #include <sys/sysproto.h>
7456c06c4bSDavid Xu #include <sys/timers.h>
7506ae1e91SMatthew Dillon #include <sys/unistd.h>
76854dc8c2SJohn Baldwin #include <sys/wait.h>
779104847fSDavid Xu #include <vm/vm.h>
789104847fSDavid Xu #include <vm/vm_extern.h>
799104847fSDavid Xu #include <vm/uma.h>
80df8bae1dSRodney W. Grimes 
81df8bae1dSRodney W. Grimes #include <machine/cpu.h>
82df8bae1dSRodney W. Grimes 
83bfd7575aSWayne Salamon #include <security/audit/audit.h>
84bfd7575aSWayne Salamon 
856f841fb7SMarcel Moolenaar #define	ONSIG	32		/* NSIG for osig* syscalls.  XXX. */
866f841fb7SMarcel Moolenaar 
875d217f17SJohn Birrell SDT_PROVIDER_DECLARE(proc);
885d217f17SJohn Birrell SDT_PROBE_DEFINE(proc, kernel, , signal_send);
895d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_send, 0, "struct thread *");
905d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_send, 1, "struct proc *");
915d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_send, 2, "int");
925d217f17SJohn Birrell SDT_PROBE_DEFINE(proc, kernel, , signal_clear);
935d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_clear, 0, "int");
945d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_clear, 1, "ksiginfo_t *");
955d217f17SJohn Birrell SDT_PROBE_DEFINE(proc, kernel, , signal_discard);
965d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_discard, 0, "struct thread *");
975d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_discard, 1, "struct proc *");
985d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_discard, 2, "int");
995d217f17SJohn Birrell 
1004d77a549SAlfred Perlstein static int	coredump(struct thread *);
1014d77a549SAlfred Perlstein static char	*expand_name(const char *, uid_t, pid_t);
1021a88a252SMaxim Sobolev static int	killpg1(struct thread *td, int sig, int pgid, int all);
1036711f10fSJohn Baldwin static int	issignal(struct thread *p);
1044d77a549SAlfred Perlstein static int	sigprop(int sig);
10594f0972bSDavid Xu static void	tdsigwakeup(struct thread *, int, sig_t, int);
106d8267df7SDavid Xu static void	sig_suspend_threads(struct thread *, struct proc *, int);
107cb679c38SJonathan Lemon static int	filt_sigattach(struct knote *kn);
108cb679c38SJonathan Lemon static void	filt_sigdetach(struct knote *kn);
109cb679c38SJonathan Lemon static int	filt_signal(struct knote *kn, long hint);
1104093529dSJeff Roberson static struct thread *sigtd(struct proc *p, int sig, int prop);
1119104847fSDavid Xu static void	sigqueue_start(void);
112cb679c38SJonathan Lemon 
1139104847fSDavid Xu static uma_zone_t	ksiginfo_zone = NULL;
114cb679c38SJonathan Lemon struct filterops sig_filtops =
115cb679c38SJonathan Lemon 	{ 0, filt_sigattach, filt_sigdetach, filt_signal };
116cb679c38SJonathan Lemon 
11789b57fcfSKonstantin Belousov int	kern_logsigexit = 1;
1183d177f46SBill Fumerola SYSCTL_INT(_kern, KERN_LOGSIGEXIT, logsigexit, CTLFLAG_RW,
1193d177f46SBill Fumerola     &kern_logsigexit, 0,
1203d177f46SBill Fumerola     "Log processes quitting on abnormal signals to syslog(3)");
12157308494SJoerg Wunsch 
122f71a882fSDavid Xu static int	kern_forcesigexit = 1;
123f71a882fSDavid Xu SYSCTL_INT(_kern, OID_AUTO, forcesigexit, CTLFLAG_RW,
124f71a882fSDavid Xu     &kern_forcesigexit, 0, "Force trap signal to be handled");
125f71a882fSDavid Xu 
1269104847fSDavid Xu SYSCTL_NODE(_kern, OID_AUTO, sigqueue, CTLFLAG_RW, 0, "POSIX real time signal");
1279104847fSDavid Xu 
1289104847fSDavid Xu static int	max_pending_per_proc = 128;
1299104847fSDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, max_pending_per_proc, CTLFLAG_RW,
1309104847fSDavid Xu     &max_pending_per_proc, 0, "Max pending signals per proc");
1319104847fSDavid Xu 
1329104847fSDavid Xu static int	preallocate_siginfo = 1024;
1339104847fSDavid Xu TUNABLE_INT("kern.sigqueue.preallocate", &preallocate_siginfo);
1349104847fSDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, preallocate, CTLFLAG_RD,
1359104847fSDavid Xu     &preallocate_siginfo, 0, "Preallocated signal memory size");
1369104847fSDavid Xu 
1379104847fSDavid Xu static int	signal_overflow = 0;
138761a4d94SDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, overflow, CTLFLAG_RD,
1399104847fSDavid Xu     &signal_overflow, 0, "Number of signals overflew");
1409104847fSDavid Xu 
1419104847fSDavid Xu static int	signal_alloc_fail = 0;
142761a4d94SDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, alloc_fail, CTLFLAG_RD,
1439104847fSDavid Xu     &signal_alloc_fail, 0, "signals failed to be allocated");
1449104847fSDavid Xu 
1459104847fSDavid Xu SYSINIT(signal, SI_SUB_P1003_1B, SI_ORDER_FIRST+3, sigqueue_start, NULL);
1469104847fSDavid Xu 
1472b87b6d4SRobert Watson /*
1482b87b6d4SRobert Watson  * Policy -- Can ucred cr1 send SIGIO to process cr2?
1492b87b6d4SRobert Watson  * Should use cr_cansignal() once cr_cansignal() allows SIGIO and SIGURG
1502b87b6d4SRobert Watson  * in the right situations.
1512b87b6d4SRobert Watson  */
1522b87b6d4SRobert Watson #define CANSIGIO(cr1, cr2) \
1532b87b6d4SRobert Watson 	((cr1)->cr_uid == 0 || \
1542b87b6d4SRobert Watson 	    (cr1)->cr_ruid == (cr2)->cr_ruid || \
1552b87b6d4SRobert Watson 	    (cr1)->cr_uid == (cr2)->cr_ruid || \
1562b87b6d4SRobert Watson 	    (cr1)->cr_ruid == (cr2)->cr_uid || \
1572b87b6d4SRobert Watson 	    (cr1)->cr_uid == (cr2)->cr_uid)
1582b87b6d4SRobert Watson 
15922d4b0fbSJohn Polstra int sugid_coredump;
1603d177f46SBill Fumerola SYSCTL_INT(_kern, OID_AUTO, sugid_coredump, CTLFLAG_RW,
1613d177f46SBill Fumerola     &sugid_coredump, 0, "Enable coredumping set user/group ID processes");
162c87e2930SDavid Greenman 
163e5a28db9SPaul Saab static int	do_coredump = 1;
164e5a28db9SPaul Saab SYSCTL_INT(_kern, OID_AUTO, coredump, CTLFLAG_RW,
165e5a28db9SPaul Saab 	&do_coredump, 0, "Enable/Disable coredumps");
166e5a28db9SPaul Saab 
1676141e04aSJohn-Mark Gurney static int	set_core_nodump_flag = 0;
1686141e04aSJohn-Mark Gurney SYSCTL_INT(_kern, OID_AUTO, nodump_coredump, CTLFLAG_RW, &set_core_nodump_flag,
1696141e04aSJohn-Mark Gurney 	0, "Enable setting the NODUMP flag on coredump files");
1706141e04aSJohn-Mark Gurney 
1712c42a146SMarcel Moolenaar /*
1722c42a146SMarcel Moolenaar  * Signal properties and actions.
1732c42a146SMarcel Moolenaar  * The array below categorizes the signals and their default actions
1742c42a146SMarcel Moolenaar  * according to the following properties:
1752c42a146SMarcel Moolenaar  */
1762c42a146SMarcel Moolenaar #define	SA_KILL		0x01		/* terminates process by default */
1772c42a146SMarcel Moolenaar #define	SA_CORE		0x02		/* ditto and coredumps */
1782c42a146SMarcel Moolenaar #define	SA_STOP		0x04		/* suspend process */
1792c42a146SMarcel Moolenaar #define	SA_TTYSTOP	0x08		/* ditto, from tty */
1802c42a146SMarcel Moolenaar #define	SA_IGNORE	0x10		/* ignore by default */
1812c42a146SMarcel Moolenaar #define	SA_CONT		0x20		/* continue if suspended */
1822c42a146SMarcel Moolenaar #define	SA_CANTMASK	0x40		/* non-maskable, catchable */
183da33176fSJeff Roberson #define	SA_PROC		0x80		/* deliverable to any thread */
184df8bae1dSRodney W. Grimes 
1852c42a146SMarcel Moolenaar static int sigproptbl[NSIG] = {
186da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGHUP */
187da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGINT */
188da33176fSJeff Roberson         SA_KILL|SA_CORE|SA_PROC,	/* SIGQUIT */
1892c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGILL */
1902c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGTRAP */
1912c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGABRT */
192da33176fSJeff Roberson         SA_KILL|SA_CORE|SA_PROC,	/* SIGEMT */
1932c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGFPE */
194da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGKILL */
1952c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGBUS */
1962c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGSEGV */
1972c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGSYS */
198da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGPIPE */
199da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGALRM */
200da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGTERM */
201da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGURG */
202da33176fSJeff Roberson         SA_STOP|SA_PROC,		/* SIGSTOP */
203da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTSTP */
204da33176fSJeff Roberson         SA_IGNORE|SA_CONT|SA_PROC,	/* SIGCONT */
205da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGCHLD */
206da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTTIN */
207da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTTOU */
208da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGIO */
2092c42a146SMarcel Moolenaar         SA_KILL,			/* SIGXCPU */
2102c42a146SMarcel Moolenaar         SA_KILL,			/* SIGXFSZ */
211da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGVTALRM */
212da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGPROF */
213da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGWINCH  */
214da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGINFO */
215da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGUSR1 */
216da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGUSR2 */
2172c42a146SMarcel Moolenaar };
2182c42a146SMarcel Moolenaar 
2199104847fSDavid Xu static void
2209104847fSDavid Xu sigqueue_start(void)
2219104847fSDavid Xu {
2229104847fSDavid Xu 	ksiginfo_zone = uma_zcreate("ksiginfo", sizeof(ksiginfo_t),
2239104847fSDavid Xu 		NULL, NULL, NULL, NULL, UMA_ALIGN_PTR, 0);
2249104847fSDavid Xu 	uma_prealloc(ksiginfo_zone, preallocate_siginfo);
225b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_REALTIME_SIGNALS, _POSIX_REALTIME_SIGNALS);
226b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_RTSIG_MAX, SIGRTMAX - SIGRTMIN + 1);
227b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_SIGQUEUE_MAX, max_pending_per_proc);
2289104847fSDavid Xu }
2299104847fSDavid Xu 
2305da49fcbSDavid Xu ksiginfo_t *
231ebceaf6dSDavid Xu ksiginfo_alloc(int wait)
2329104847fSDavid Xu {
233ebceaf6dSDavid Xu 	int flags;
234ebceaf6dSDavid Xu 
235ebceaf6dSDavid Xu 	flags = M_ZERO;
236ebceaf6dSDavid Xu 	if (! wait)
237ebceaf6dSDavid Xu 		flags |= M_NOWAIT;
2389104847fSDavid Xu 	if (ksiginfo_zone != NULL)
239ebceaf6dSDavid Xu 		return ((ksiginfo_t *)uma_zalloc(ksiginfo_zone, flags));
2409104847fSDavid Xu 	return (NULL);
2419104847fSDavid Xu }
2429104847fSDavid Xu 
2435da49fcbSDavid Xu void
2449104847fSDavid Xu ksiginfo_free(ksiginfo_t *ksi)
2459104847fSDavid Xu {
2469104847fSDavid Xu 	uma_zfree(ksiginfo_zone, ksi);
2479104847fSDavid Xu }
2489104847fSDavid Xu 
2495da49fcbSDavid Xu static __inline int
2505da49fcbSDavid Xu ksiginfo_tryfree(ksiginfo_t *ksi)
2515da49fcbSDavid Xu {
2525da49fcbSDavid Xu 	if (!(ksi->ksi_flags & KSI_EXT)) {
2535da49fcbSDavid Xu 		uma_zfree(ksiginfo_zone, ksi);
2545da49fcbSDavid Xu 		return (1);
2555da49fcbSDavid Xu 	}
2565da49fcbSDavid Xu 	return (0);
2575da49fcbSDavid Xu }
2585da49fcbSDavid Xu 
2599104847fSDavid Xu void
2609104847fSDavid Xu sigqueue_init(sigqueue_t *list, struct proc *p)
2619104847fSDavid Xu {
2629104847fSDavid Xu 	SIGEMPTYSET(list->sq_signals);
2633dfcaad6SDavid Xu 	SIGEMPTYSET(list->sq_kill);
2649104847fSDavid Xu 	TAILQ_INIT(&list->sq_list);
2659104847fSDavid Xu 	list->sq_proc = p;
2669104847fSDavid Xu 	list->sq_flags = SQ_INIT;
2679104847fSDavid Xu }
2689104847fSDavid Xu 
2699104847fSDavid Xu /*
2709104847fSDavid Xu  * Get a signal's ksiginfo.
2719104847fSDavid Xu  * Return:
2729104847fSDavid Xu  * 	0	-	signal not found
2739104847fSDavid Xu  *	others	-	signal number
2749104847fSDavid Xu  */
2759104847fSDavid Xu int
2769104847fSDavid Xu sigqueue_get(sigqueue_t *sq, int signo, ksiginfo_t *si)
2779104847fSDavid Xu {
2789104847fSDavid Xu 	struct proc *p = sq->sq_proc;
2799104847fSDavid Xu 	struct ksiginfo *ksi, *next;
2809104847fSDavid Xu 	int count = 0;
2819104847fSDavid Xu 
2829104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
2839104847fSDavid Xu 
2849104847fSDavid Xu 	if (!SIGISMEMBER(sq->sq_signals, signo))
2859104847fSDavid Xu 		return (0);
2869104847fSDavid Xu 
2873dfcaad6SDavid Xu 	if (SIGISMEMBER(sq->sq_kill, signo)) {
2883dfcaad6SDavid Xu 		count++;
2893dfcaad6SDavid Xu 		SIGDELSET(sq->sq_kill, signo);
2903dfcaad6SDavid Xu 	}
2913dfcaad6SDavid Xu 
2925c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &sq->sq_list, ksi_link, next) {
2939104847fSDavid Xu 		if (ksi->ksi_signo == signo) {
2949104847fSDavid Xu 			if (count == 0) {
2959104847fSDavid Xu 				TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
2965da49fcbSDavid Xu 				ksi->ksi_sigq = NULL;
2979104847fSDavid Xu 				ksiginfo_copy(ksi, si);
2985da49fcbSDavid Xu 				if (ksiginfo_tryfree(ksi) && p != NULL)
2999104847fSDavid Xu 					p->p_pendingcnt--;
3009104847fSDavid Xu 			}
301016fa302SDavid Xu 			if (++count > 1)
302016fa302SDavid Xu 				break;
3039104847fSDavid Xu 		}
3049104847fSDavid Xu 	}
3059104847fSDavid Xu 
3069104847fSDavid Xu 	if (count <= 1)
3079104847fSDavid Xu 		SIGDELSET(sq->sq_signals, signo);
3089104847fSDavid Xu 	si->ksi_signo = signo;
3099104847fSDavid Xu 	return (signo);
3109104847fSDavid Xu }
3119104847fSDavid Xu 
3125da49fcbSDavid Xu void
3135da49fcbSDavid Xu sigqueue_take(ksiginfo_t *ksi)
3145da49fcbSDavid Xu {
3155da49fcbSDavid Xu 	struct ksiginfo *kp;
3165da49fcbSDavid Xu 	struct proc	*p;
3175da49fcbSDavid Xu 	sigqueue_t	*sq;
3185da49fcbSDavid Xu 
319ebceaf6dSDavid Xu 	if (ksi == NULL || (sq = ksi->ksi_sigq) == NULL)
3205da49fcbSDavid Xu 		return;
3215da49fcbSDavid Xu 
3225da49fcbSDavid Xu 	p = sq->sq_proc;
3235da49fcbSDavid Xu 	TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
3245da49fcbSDavid Xu 	ksi->ksi_sigq = NULL;
3255da49fcbSDavid Xu 	if (!(ksi->ksi_flags & KSI_EXT) && p != NULL)
3265da49fcbSDavid Xu 		p->p_pendingcnt--;
3275da49fcbSDavid Xu 
3285da49fcbSDavid Xu 	for (kp = TAILQ_FIRST(&sq->sq_list); kp != NULL;
3295da49fcbSDavid Xu 	     kp = TAILQ_NEXT(kp, ksi_link)) {
3305da49fcbSDavid Xu 		if (kp->ksi_signo == ksi->ksi_signo)
3315da49fcbSDavid Xu 			break;
3325da49fcbSDavid Xu 	}
3333dfcaad6SDavid Xu 	if (kp == NULL && !SIGISMEMBER(sq->sq_kill, ksi->ksi_signo))
3345da49fcbSDavid Xu 		SIGDELSET(sq->sq_signals, ksi->ksi_signo);
3355da49fcbSDavid Xu }
3365da49fcbSDavid Xu 
3379104847fSDavid Xu int
3389104847fSDavid Xu sigqueue_add(sigqueue_t *sq, int signo, ksiginfo_t *si)
3399104847fSDavid Xu {
3409104847fSDavid Xu 	struct proc *p = sq->sq_proc;
3419104847fSDavid Xu 	struct ksiginfo *ksi;
3429104847fSDavid Xu 	int ret = 0;
3439104847fSDavid Xu 
3449104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
3459104847fSDavid Xu 
3463dfcaad6SDavid Xu 	if (signo == SIGKILL || signo == SIGSTOP || si == NULL) {
3473dfcaad6SDavid Xu 		SIGADDSET(sq->sq_kill, signo);
3489104847fSDavid Xu 		goto out_set_bit;
3493dfcaad6SDavid Xu 	}
3509104847fSDavid Xu 
3515da49fcbSDavid Xu 	/* directly insert the ksi, don't copy it */
3525da49fcbSDavid Xu 	if (si->ksi_flags & KSI_INS) {
3535da49fcbSDavid Xu 		TAILQ_INSERT_TAIL(&sq->sq_list, si, ksi_link);
3545da49fcbSDavid Xu 		si->ksi_sigq = sq;
3555da49fcbSDavid Xu 		goto out_set_bit;
3565da49fcbSDavid Xu 	}
3575da49fcbSDavid Xu 
3583dfcaad6SDavid Xu 	if (__predict_false(ksiginfo_zone == NULL)) {
3593dfcaad6SDavid Xu 		SIGADDSET(sq->sq_kill, signo);
3609104847fSDavid Xu 		goto out_set_bit;
3613dfcaad6SDavid Xu 	}
3629104847fSDavid Xu 
363ebceaf6dSDavid Xu 	if (p != NULL && p->p_pendingcnt >= max_pending_per_proc) {
3649104847fSDavid Xu 		signal_overflow++;
3659104847fSDavid Xu 		ret = EAGAIN;
366ebceaf6dSDavid Xu 	} else if ((ksi = ksiginfo_alloc(0)) == NULL) {
3679104847fSDavid Xu 		signal_alloc_fail++;
3689104847fSDavid Xu 		ret = EAGAIN;
3699104847fSDavid Xu 	} else {
3709104847fSDavid Xu 		if (p != NULL)
3719104847fSDavid Xu 			p->p_pendingcnt++;
3729104847fSDavid Xu 		ksiginfo_copy(si, ksi);
3739104847fSDavid Xu 		ksi->ksi_signo = signo;
3749104847fSDavid Xu 		TAILQ_INSERT_TAIL(&sq->sq_list, ksi, ksi_link);
3755da49fcbSDavid Xu 		ksi->ksi_sigq = sq;
3769104847fSDavid Xu 	}
3779104847fSDavid Xu 
3789104847fSDavid Xu 	if ((si->ksi_flags & KSI_TRAP) != 0) {
3793dfcaad6SDavid Xu 		if (ret != 0)
3803dfcaad6SDavid Xu 			SIGADDSET(sq->sq_kill, signo);
3819104847fSDavid Xu 		ret = 0;
3829104847fSDavid Xu 		goto out_set_bit;
3839104847fSDavid Xu 	}
3849104847fSDavid Xu 
3859104847fSDavid Xu 	if (ret != 0)
3869104847fSDavid Xu 		return (ret);
3879104847fSDavid Xu 
3889104847fSDavid Xu out_set_bit:
3899104847fSDavid Xu 	SIGADDSET(sq->sq_signals, signo);
3909104847fSDavid Xu 	return (ret);
3919104847fSDavid Xu }
3929104847fSDavid Xu 
3939104847fSDavid Xu void
3949104847fSDavid Xu sigqueue_flush(sigqueue_t *sq)
3959104847fSDavid Xu {
3969104847fSDavid Xu 	struct proc *p = sq->sq_proc;
3979104847fSDavid Xu 	ksiginfo_t *ksi;
3989104847fSDavid Xu 
3999104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
4009104847fSDavid Xu 
4015da49fcbSDavid Xu 	if (p != NULL)
4025da49fcbSDavid Xu 		PROC_LOCK_ASSERT(p, MA_OWNED);
4035da49fcbSDavid Xu 
4049104847fSDavid Xu 	while ((ksi = TAILQ_FIRST(&sq->sq_list)) != NULL) {
4059104847fSDavid Xu 		TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
4065da49fcbSDavid Xu 		ksi->ksi_sigq = NULL;
4075da49fcbSDavid Xu 		if (ksiginfo_tryfree(ksi) && p != NULL)
4089104847fSDavid Xu 			p->p_pendingcnt--;
4099104847fSDavid Xu 	}
4109104847fSDavid Xu 
4119104847fSDavid Xu 	SIGEMPTYSET(sq->sq_signals);
4123dfcaad6SDavid Xu 	SIGEMPTYSET(sq->sq_kill);
4139104847fSDavid Xu }
4149104847fSDavid Xu 
4159104847fSDavid Xu void
4169104847fSDavid Xu sigqueue_collect_set(sigqueue_t *sq, sigset_t *set)
4179104847fSDavid Xu {
4189104847fSDavid Xu 	ksiginfo_t *ksi;
4199104847fSDavid Xu 
4209104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
4219104847fSDavid Xu 
4229104847fSDavid Xu 	TAILQ_FOREACH(ksi, &sq->sq_list, ksi_link)
4239104847fSDavid Xu 		SIGADDSET(*set, ksi->ksi_signo);
4243dfcaad6SDavid Xu 	SIGSETOR(*set, sq->sq_kill);
4259104847fSDavid Xu }
4269104847fSDavid Xu 
4279104847fSDavid Xu void
4289104847fSDavid Xu sigqueue_move_set(sigqueue_t *src, sigqueue_t *dst, sigset_t *setp)
4299104847fSDavid Xu {
4309104847fSDavid Xu 	sigset_t tmp, set;
4319104847fSDavid Xu 	struct proc *p1, *p2;
4329104847fSDavid Xu 	ksiginfo_t *ksi, *next;
4339104847fSDavid Xu 
4349104847fSDavid Xu 	KASSERT(src->sq_flags & SQ_INIT, ("src sigqueue not inited"));
4359104847fSDavid Xu 	KASSERT(dst->sq_flags & SQ_INIT, ("dst sigqueue not inited"));
4369104847fSDavid Xu 	/*
4379104847fSDavid Xu 	 * make a copy, this allows setp to point to src or dst
4389104847fSDavid Xu 	 * sq_signals without trouble.
4399104847fSDavid Xu 	 */
4409104847fSDavid Xu 	set = *setp;
4419104847fSDavid Xu 	p1 = src->sq_proc;
4429104847fSDavid Xu 	p2 = dst->sq_proc;
4439104847fSDavid Xu 	/* Move siginfo to target list */
4445c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &src->sq_list, ksi_link, next) {
4459104847fSDavid Xu 		if (SIGISMEMBER(set, ksi->ksi_signo)) {
4469104847fSDavid Xu 			TAILQ_REMOVE(&src->sq_list, ksi, ksi_link);
4479104847fSDavid Xu 			if (p1 != NULL)
4489104847fSDavid Xu 				p1->p_pendingcnt--;
4499104847fSDavid Xu 			TAILQ_INSERT_TAIL(&dst->sq_list, ksi, ksi_link);
4505da49fcbSDavid Xu 			ksi->ksi_sigq = dst;
4519104847fSDavid Xu 			if (p2 != NULL)
4529104847fSDavid Xu 				p2->p_pendingcnt++;
4539104847fSDavid Xu 		}
4549104847fSDavid Xu 	}
4559104847fSDavid Xu 
4569104847fSDavid Xu 	/* Move pending bits to target list */
4573dfcaad6SDavid Xu 	tmp = src->sq_kill;
4583dfcaad6SDavid Xu 	SIGSETAND(tmp, set);
4593dfcaad6SDavid Xu 	SIGSETOR(dst->sq_kill, tmp);
4603dfcaad6SDavid Xu 	SIGSETNAND(src->sq_kill, tmp);
4613dfcaad6SDavid Xu 
4629104847fSDavid Xu 	tmp = src->sq_signals;
4639104847fSDavid Xu 	SIGSETAND(tmp, set);
4649104847fSDavid Xu 	SIGSETOR(dst->sq_signals, tmp);
4659104847fSDavid Xu 	SIGSETNAND(src->sq_signals, tmp);
4669104847fSDavid Xu 
4679104847fSDavid Xu 	/* Finally, rescan src queue and set pending bits for it */
4689104847fSDavid Xu 	sigqueue_collect_set(src, &src->sq_signals);
4699104847fSDavid Xu }
4709104847fSDavid Xu 
4719104847fSDavid Xu void
4729104847fSDavid Xu sigqueue_move(sigqueue_t *src, sigqueue_t *dst, int signo)
4739104847fSDavid Xu {
4749104847fSDavid Xu 	sigset_t set;
4759104847fSDavid Xu 
4769104847fSDavid Xu 	SIGEMPTYSET(set);
4779104847fSDavid Xu 	SIGADDSET(set, signo);
4789104847fSDavid Xu 	sigqueue_move_set(src, dst, &set);
4799104847fSDavid Xu }
4809104847fSDavid Xu 
4819104847fSDavid Xu void
4829104847fSDavid Xu sigqueue_delete_set(sigqueue_t *sq, sigset_t *set)
4839104847fSDavid Xu {
4849104847fSDavid Xu 	struct proc *p = sq->sq_proc;
4859104847fSDavid Xu 	ksiginfo_t *ksi, *next;
4869104847fSDavid Xu 
4879104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("src sigqueue not inited"));
4889104847fSDavid Xu 
4899104847fSDavid Xu 	/* Remove siginfo queue */
4905c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &sq->sq_list, ksi_link, next) {
4919104847fSDavid Xu 		if (SIGISMEMBER(*set, ksi->ksi_signo)) {
4929104847fSDavid Xu 			TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
4935da49fcbSDavid Xu 			ksi->ksi_sigq = NULL;
4945da49fcbSDavid Xu 			if (ksiginfo_tryfree(ksi) && p != NULL)
4959104847fSDavid Xu 				p->p_pendingcnt--;
4969104847fSDavid Xu 		}
4979104847fSDavid Xu 	}
4983dfcaad6SDavid Xu 	SIGSETNAND(sq->sq_kill, *set);
4999104847fSDavid Xu 	SIGSETNAND(sq->sq_signals, *set);
5009104847fSDavid Xu 	/* Finally, rescan queue and set pending bits for it */
5019104847fSDavid Xu 	sigqueue_collect_set(sq, &sq->sq_signals);
5029104847fSDavid Xu }
5039104847fSDavid Xu 
5049104847fSDavid Xu void
5059104847fSDavid Xu sigqueue_delete(sigqueue_t *sq, int signo)
5069104847fSDavid Xu {
5079104847fSDavid Xu 	sigset_t set;
5089104847fSDavid Xu 
5099104847fSDavid Xu 	SIGEMPTYSET(set);
5109104847fSDavid Xu 	SIGADDSET(set, signo);
5119104847fSDavid Xu 	sigqueue_delete_set(sq, &set);
5129104847fSDavid Xu }
5139104847fSDavid Xu 
5149104847fSDavid Xu /* Remove a set of signals for a process */
5159104847fSDavid Xu void
5169104847fSDavid Xu sigqueue_delete_set_proc(struct proc *p, sigset_t *set)
5179104847fSDavid Xu {
5189104847fSDavid Xu 	sigqueue_t worklist;
5199104847fSDavid Xu 	struct thread *td0;
5209104847fSDavid Xu 
5219104847fSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
5229104847fSDavid Xu 
5239104847fSDavid Xu 	sigqueue_init(&worklist, NULL);
5249104847fSDavid Xu 	sigqueue_move_set(&p->p_sigqueue, &worklist, set);
5259104847fSDavid Xu 
5269104847fSDavid Xu 	FOREACH_THREAD_IN_PROC(p, td0)
5279104847fSDavid Xu 		sigqueue_move_set(&td0->td_sigqueue, &worklist, set);
5289104847fSDavid Xu 
5299104847fSDavid Xu 	sigqueue_flush(&worklist);
5309104847fSDavid Xu }
5319104847fSDavid Xu 
5329104847fSDavid Xu void
5339104847fSDavid Xu sigqueue_delete_proc(struct proc *p, int signo)
5349104847fSDavid Xu {
5359104847fSDavid Xu 	sigset_t set;
5369104847fSDavid Xu 
5379104847fSDavid Xu 	SIGEMPTYSET(set);
5389104847fSDavid Xu 	SIGADDSET(set, signo);
5399104847fSDavid Xu 	sigqueue_delete_set_proc(p, &set);
5409104847fSDavid Xu }
5419104847fSDavid Xu 
5429104847fSDavid Xu void
5439104847fSDavid Xu sigqueue_delete_stopmask_proc(struct proc *p)
5449104847fSDavid Xu {
5459104847fSDavid Xu 	sigset_t set;
5469104847fSDavid Xu 
5479104847fSDavid Xu 	SIGEMPTYSET(set);
5489104847fSDavid Xu 	SIGADDSET(set, SIGSTOP);
5499104847fSDavid Xu 	SIGADDSET(set, SIGTSTP);
5509104847fSDavid Xu 	SIGADDSET(set, SIGTTIN);
5519104847fSDavid Xu 	SIGADDSET(set, SIGTTOU);
5529104847fSDavid Xu 	sigqueue_delete_set_proc(p, &set);
5539104847fSDavid Xu }
5549104847fSDavid Xu 
555fbbeeb6cSBruce Evans /*
556fbbeeb6cSBruce Evans  * Determine signal that should be delivered to process p, the current
557fbbeeb6cSBruce Evans  * process, 0 if none.  If there is a pending stop signal with default
558fbbeeb6cSBruce Evans  * action, the process stops in issignal().
559fbbeeb6cSBruce Evans  */
560fbbeeb6cSBruce Evans int
561e602ba25SJulian Elischer cursig(struct thread *td)
562fbbeeb6cSBruce Evans {
563c9dfa2e0SJeff Roberson 	PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
56490af4afaSJohn Baldwin 	mtx_assert(&td->td_proc->p_sigacts->ps_mtx, MA_OWNED);
565a54e85fdSJeff Roberson 	THREAD_LOCK_ASSERT(td, MA_NOTOWNED);
5664093529dSJeff Roberson 	return (SIGPENDING(td) ? issignal(td) : 0);
567fbbeeb6cSBruce Evans }
568fbbeeb6cSBruce Evans 
56979065dbaSBruce Evans /*
57079065dbaSBruce Evans  * Arrange for ast() to handle unmasked pending signals on return to user
5719104847fSDavid Xu  * mode.  This must be called whenever a signal is added to td_sigqueue or
5724093529dSJeff Roberson  * unmasked in td_sigmask.
57379065dbaSBruce Evans  */
57479065dbaSBruce Evans void
5754093529dSJeff Roberson signotify(struct thread *td)
57679065dbaSBruce Evans {
5774093529dSJeff Roberson 	struct proc *p;
5788460a577SJohn Birrell 	sigset_t set;
5794093529dSJeff Roberson 
5804093529dSJeff Roberson 	p = td->td_proc;
58179065dbaSBruce Evans 
58279065dbaSBruce Evans 	PROC_LOCK_ASSERT(p, MA_OWNED);
5834093529dSJeff Roberson 
5844093529dSJeff Roberson 	/*
5854093529dSJeff Roberson 	 * If our mask changed we may have to move signal that were
5869104847fSDavid Xu 	 * previously masked by all threads to our sigqueue.
5874093529dSJeff Roberson 	 */
5889104847fSDavid Xu 	set = p->p_sigqueue.sq_signals;
5894093529dSJeff Roberson 	SIGSETNAND(set, td->td_sigmask);
5909104847fSDavid Xu 	if (! SIGISEMPTY(set))
5919104847fSDavid Xu 		sigqueue_move_set(&p->p_sigqueue, &td->td_sigqueue, &set);
5928b94a061SJohn Baldwin 	if (SIGPENDING(td)) {
593a54e85fdSJeff Roberson 		thread_lock(td);
5944093529dSJeff Roberson 		td->td_flags |= TDF_NEEDSIGCHK | TDF_ASTPENDING;
595a54e85fdSJeff Roberson 		thread_unlock(td);
59679065dbaSBruce Evans 	}
5978b94a061SJohn Baldwin }
5988b94a061SJohn Baldwin 
5998b94a061SJohn Baldwin int
6008b94a061SJohn Baldwin sigonstack(size_t sp)
6018b94a061SJohn Baldwin {
602a30ec4b9SDavid Xu 	struct thread *td = curthread;
6038b94a061SJohn Baldwin 
604a30ec4b9SDavid Xu 	return ((td->td_pflags & TDP_ALTSTACK) ?
6051930e303SPoul-Henning Kamp #if defined(COMPAT_43)
606a30ec4b9SDavid Xu 	    ((td->td_sigstk.ss_size == 0) ?
607a30ec4b9SDavid Xu 		(td->td_sigstk.ss_flags & SS_ONSTACK) :
608a30ec4b9SDavid Xu 		((sp - (size_t)td->td_sigstk.ss_sp) < td->td_sigstk.ss_size))
6098b94a061SJohn Baldwin #else
610a30ec4b9SDavid Xu 	    ((sp - (size_t)td->td_sigstk.ss_sp) < td->td_sigstk.ss_size)
6118b94a061SJohn Baldwin #endif
6128b94a061SJohn Baldwin 	    : 0);
6138b94a061SJohn Baldwin }
61479065dbaSBruce Evans 
6156f841fb7SMarcel Moolenaar static __inline int
6166f841fb7SMarcel Moolenaar sigprop(int sig)
6172c42a146SMarcel Moolenaar {
6186f841fb7SMarcel Moolenaar 
6192c42a146SMarcel Moolenaar 	if (sig > 0 && sig < NSIG)
6202c42a146SMarcel Moolenaar 		return (sigproptbl[_SIG_IDX(sig)]);
6212c42a146SMarcel Moolenaar 	return (0);
622df8bae1dSRodney W. Grimes }
6232c42a146SMarcel Moolenaar 
6244093529dSJeff Roberson int
6256f841fb7SMarcel Moolenaar sig_ffs(sigset_t *set)
6262c42a146SMarcel Moolenaar {
6272c42a146SMarcel Moolenaar 	int i;
6282c42a146SMarcel Moolenaar 
6296f841fb7SMarcel Moolenaar 	for (i = 0; i < _SIG_WORDS; i++)
6302c42a146SMarcel Moolenaar 		if (set->__bits[i])
6312c42a146SMarcel Moolenaar 			return (ffs(set->__bits[i]) + (i * 32));
632df8bae1dSRodney W. Grimes 	return (0);
633df8bae1dSRodney W. Grimes }
634df8bae1dSRodney W. Grimes 
6352c42a146SMarcel Moolenaar /*
6368f19eb88SIan Dowse  * kern_sigaction
6372c42a146SMarcel Moolenaar  * sigaction
63823eeeff7SPeter Wemm  * freebsd4_sigaction
6392c42a146SMarcel Moolenaar  * osigaction
6402c42a146SMarcel Moolenaar  */
6418f19eb88SIan Dowse int
64223eeeff7SPeter Wemm kern_sigaction(td, sig, act, oact, flags)
6438f19eb88SIan Dowse 	struct thread *td;
6442c42a146SMarcel Moolenaar 	register int sig;
6452c42a146SMarcel Moolenaar 	struct sigaction *act, *oact;
64623eeeff7SPeter Wemm 	int flags;
647df8bae1dSRodney W. Grimes {
64890af4afaSJohn Baldwin 	struct sigacts *ps;
6498f19eb88SIan Dowse 	struct proc *p = td->td_proc;
650df8bae1dSRodney W. Grimes 
6512899d606SDag-Erling Smørgrav 	if (!_SIG_VALID(sig))
6522c42a146SMarcel Moolenaar 		return (EINVAL);
6532c42a146SMarcel Moolenaar 
654628d2653SJohn Baldwin 	PROC_LOCK(p);
655628d2653SJohn Baldwin 	ps = p->p_sigacts;
65690af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
6572c42a146SMarcel Moolenaar 	if (oact) {
6582c42a146SMarcel Moolenaar 		oact->sa_mask = ps->ps_catchmask[_SIG_IDX(sig)];
6592c42a146SMarcel Moolenaar 		oact->sa_flags = 0;
6602c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigonstack, sig))
6612c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_ONSTACK;
6622c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_sigintr, sig))
6632c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_RESTART;
6642c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig))
6652c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_RESETHAND;
6662c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_signodefer, sig))
6672c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NODEFER;
66810c2b8e1SDavid E. O'Brien 		if (SIGISMEMBER(ps->ps_siginfo, sig)) {
6692c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_SIGINFO;
67010c2b8e1SDavid E. O'Brien 			oact->sa_sigaction =
67110c2b8e1SDavid E. O'Brien 			    (__siginfohandler_t *)ps->ps_sigact[_SIG_IDX(sig)];
67210c2b8e1SDavid E. O'Brien 		} else
67310c2b8e1SDavid E. O'Brien 			oact->sa_handler = ps->ps_sigact[_SIG_IDX(sig)];
67490af4afaSJohn Baldwin 		if (sig == SIGCHLD && ps->ps_flag & PS_NOCLDSTOP)
6752c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NOCLDSTOP;
67690af4afaSJohn Baldwin 		if (sig == SIGCHLD && ps->ps_flag & PS_NOCLDWAIT)
6772c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NOCLDWAIT;
6782c42a146SMarcel Moolenaar 	}
6792c42a146SMarcel Moolenaar 	if (act) {
6802c42a146SMarcel Moolenaar 		if ((sig == SIGKILL || sig == SIGSTOP) &&
681628d2653SJohn Baldwin 		    act->sa_handler != SIG_DFL) {
68290af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
683628d2653SJohn Baldwin 			PROC_UNLOCK(p);
6842c42a146SMarcel Moolenaar 			return (EINVAL);
685628d2653SJohn Baldwin 		}
6862c42a146SMarcel Moolenaar 
687df8bae1dSRodney W. Grimes 		/*
688df8bae1dSRodney W. Grimes 		 * Change setting atomically.
689df8bae1dSRodney W. Grimes 		 */
6902c42a146SMarcel Moolenaar 
6912c42a146SMarcel Moolenaar 		ps->ps_catchmask[_SIG_IDX(sig)] = act->sa_mask;
6922c42a146SMarcel Moolenaar 		SIG_CANTMASK(ps->ps_catchmask[_SIG_IDX(sig)]);
6932c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_SIGINFO) {
694aa7a4daeSPeter Wemm 			ps->ps_sigact[_SIG_IDX(sig)] =
695aa7a4daeSPeter Wemm 			    (__sighandler_t *)act->sa_sigaction;
69680f42b55SIan Dowse 			SIGADDSET(ps->ps_siginfo, sig);
69780f42b55SIan Dowse 		} else {
69880f42b55SIan Dowse 			ps->ps_sigact[_SIG_IDX(sig)] = act->sa_handler;
6992c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_siginfo, sig);
7002c42a146SMarcel Moolenaar 		}
7012c42a146SMarcel Moolenaar 		if (!(act->sa_flags & SA_RESTART))
7022c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigintr, sig);
703df8bae1dSRodney W. Grimes 		else
7042c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigintr, sig);
7052c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_ONSTACK)
7062c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigonstack, sig);
707df8bae1dSRodney W. Grimes 		else
7082c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigonstack, sig);
7092c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_RESETHAND)
7102c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigreset, sig);
7111e41c1b5SSteven Wallace 		else
7122c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigreset, sig);
7132c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_NODEFER)
7142c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_signodefer, sig);
715289ccde0SPeter Wemm 		else
7162c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_signodefer, sig);
7172c42a146SMarcel Moolenaar 		if (sig == SIGCHLD) {
7182c42a146SMarcel Moolenaar 			if (act->sa_flags & SA_NOCLDSTOP)
71990af4afaSJohn Baldwin 				ps->ps_flag |= PS_NOCLDSTOP;
7206626c604SJulian Elischer 			else
72190af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_NOCLDSTOP;
722ba1551caSIan Dowse 			if (act->sa_flags & SA_NOCLDWAIT) {
723245f17d4SJoerg Wunsch 				/*
7242c42a146SMarcel Moolenaar 				 * Paranoia: since SA_NOCLDWAIT is implemented
7252c42a146SMarcel Moolenaar 				 * by reparenting the dying child to PID 1 (and
7262c42a146SMarcel Moolenaar 				 * trust it to reap the zombie), PID 1 itself
7272c42a146SMarcel Moolenaar 				 * is forbidden to set SA_NOCLDWAIT.
728245f17d4SJoerg Wunsch 				 */
729245f17d4SJoerg Wunsch 				if (p->p_pid == 1)
73090af4afaSJohn Baldwin 					ps->ps_flag &= ~PS_NOCLDWAIT;
7316626c604SJulian Elischer 				else
73290af4afaSJohn Baldwin 					ps->ps_flag |= PS_NOCLDWAIT;
733245f17d4SJoerg Wunsch 			} else
73490af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_NOCLDWAIT;
735ba1551caSIan Dowse 			if (ps->ps_sigact[_SIG_IDX(SIGCHLD)] == SIG_IGN)
73690af4afaSJohn Baldwin 				ps->ps_flag |= PS_CLDSIGIGN;
737ba1551caSIan Dowse 			else
73890af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_CLDSIGIGN;
739df8bae1dSRodney W. Grimes 		}
740df8bae1dSRodney W. Grimes 		/*
74190af4afaSJohn Baldwin 		 * Set bit in ps_sigignore for signals that are set to SIG_IGN,
7422c42a146SMarcel Moolenaar 		 * and for signals set to SIG_DFL where the default is to
74390af4afaSJohn Baldwin 		 * ignore. However, don't put SIGCONT in ps_sigignore, as we
7442c42a146SMarcel Moolenaar 		 * have to restart the process.
745df8bae1dSRodney W. Grimes 		 */
7462c42a146SMarcel Moolenaar 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
7472c42a146SMarcel Moolenaar 		    (sigprop(sig) & SA_IGNORE &&
7482c42a146SMarcel Moolenaar 		     ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL)) {
7492c42a146SMarcel Moolenaar 			/* never to be seen again */
7509104847fSDavid Xu 			sigqueue_delete_proc(p, sig);
7512c42a146SMarcel Moolenaar 			if (sig != SIGCONT)
7522c42a146SMarcel Moolenaar 				/* easier in psignal */
75390af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
75490af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
755645682fdSLuoqi Chen 		} else {
75690af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigignore, sig);
7572c42a146SMarcel Moolenaar 			if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL)
75890af4afaSJohn Baldwin 				SIGDELSET(ps->ps_sigcatch, sig);
7592c42a146SMarcel Moolenaar 			else
76090af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigcatch, sig);
7612c42a146SMarcel Moolenaar 		}
76223eeeff7SPeter Wemm #ifdef COMPAT_FREEBSD4
76323eeeff7SPeter Wemm 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
76423eeeff7SPeter Wemm 		    ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL ||
76523eeeff7SPeter Wemm 		    (flags & KSA_FREEBSD4) == 0)
76623eeeff7SPeter Wemm 			SIGDELSET(ps->ps_freebsd4, sig);
76723eeeff7SPeter Wemm 		else
76823eeeff7SPeter Wemm 			SIGADDSET(ps->ps_freebsd4, sig);
76923eeeff7SPeter Wemm #endif
770e8ebc08fSPeter Wemm #ifdef COMPAT_43
771645682fdSLuoqi Chen 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
77223eeeff7SPeter Wemm 		    ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL ||
77323eeeff7SPeter Wemm 		    (flags & KSA_OSIGSET) == 0)
774645682fdSLuoqi Chen 			SIGDELSET(ps->ps_osigset, sig);
775645682fdSLuoqi Chen 		else
776645682fdSLuoqi Chen 			SIGADDSET(ps->ps_osigset, sig);
777e8ebc08fSPeter Wemm #endif
778df8bae1dSRodney W. Grimes 	}
77990af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
780628d2653SJohn Baldwin 	PROC_UNLOCK(p);
7812c42a146SMarcel Moolenaar 	return (0);
7822c42a146SMarcel Moolenaar }
7832c42a146SMarcel Moolenaar 
7842c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
7852c42a146SMarcel Moolenaar struct sigaction_args {
7862c42a146SMarcel Moolenaar 	int	sig;
7872c42a146SMarcel Moolenaar 	struct	sigaction *act;
7882c42a146SMarcel Moolenaar 	struct	sigaction *oact;
7892c42a146SMarcel Moolenaar };
7902c42a146SMarcel Moolenaar #endif
7912c42a146SMarcel Moolenaar int
792b40ce416SJulian Elischer sigaction(td, uap)
793b40ce416SJulian Elischer 	struct thread *td;
7942c42a146SMarcel Moolenaar 	register struct sigaction_args *uap;
7952c42a146SMarcel Moolenaar {
7962c42a146SMarcel Moolenaar 	struct sigaction act, oact;
7972c42a146SMarcel Moolenaar 	register struct sigaction *actp, *oactp;
7982c42a146SMarcel Moolenaar 	int error;
7992c42a146SMarcel Moolenaar 
8006f841fb7SMarcel Moolenaar 	actp = (uap->act != NULL) ? &act : NULL;
8016f841fb7SMarcel Moolenaar 	oactp = (uap->oact != NULL) ? &oact : NULL;
8022c42a146SMarcel Moolenaar 	if (actp) {
8036f841fb7SMarcel Moolenaar 		error = copyin(uap->act, actp, sizeof(act));
8042c42a146SMarcel Moolenaar 		if (error)
80544443757STim J. Robbins 			return (error);
8062c42a146SMarcel Moolenaar 	}
8078f19eb88SIan Dowse 	error = kern_sigaction(td, uap->sig, actp, oactp, 0);
80825d6dc06SJohn Baldwin 	if (oactp && !error)
8096f841fb7SMarcel Moolenaar 		error = copyout(oactp, uap->oact, sizeof(oact));
8102c42a146SMarcel Moolenaar 	return (error);
8112c42a146SMarcel Moolenaar }
8122c42a146SMarcel Moolenaar 
81323eeeff7SPeter Wemm #ifdef COMPAT_FREEBSD4
81423eeeff7SPeter Wemm #ifndef _SYS_SYSPROTO_H_
81523eeeff7SPeter Wemm struct freebsd4_sigaction_args {
81623eeeff7SPeter Wemm 	int	sig;
81723eeeff7SPeter Wemm 	struct	sigaction *act;
81823eeeff7SPeter Wemm 	struct	sigaction *oact;
81923eeeff7SPeter Wemm };
82023eeeff7SPeter Wemm #endif
82123eeeff7SPeter Wemm int
82223eeeff7SPeter Wemm freebsd4_sigaction(td, uap)
82323eeeff7SPeter Wemm 	struct thread *td;
82423eeeff7SPeter Wemm 	register struct freebsd4_sigaction_args *uap;
82523eeeff7SPeter Wemm {
82623eeeff7SPeter Wemm 	struct sigaction act, oact;
82723eeeff7SPeter Wemm 	register struct sigaction *actp, *oactp;
82823eeeff7SPeter Wemm 	int error;
82923eeeff7SPeter Wemm 
83023eeeff7SPeter Wemm 
83123eeeff7SPeter Wemm 	actp = (uap->act != NULL) ? &act : NULL;
83223eeeff7SPeter Wemm 	oactp = (uap->oact != NULL) ? &oact : NULL;
83323eeeff7SPeter Wemm 	if (actp) {
83423eeeff7SPeter Wemm 		error = copyin(uap->act, actp, sizeof(act));
83523eeeff7SPeter Wemm 		if (error)
83644443757STim J. Robbins 			return (error);
83723eeeff7SPeter Wemm 	}
83823eeeff7SPeter Wemm 	error = kern_sigaction(td, uap->sig, actp, oactp, KSA_FREEBSD4);
839a14e1189SJohn Baldwin 	if (oactp && !error)
84023eeeff7SPeter Wemm 		error = copyout(oactp, uap->oact, sizeof(oact));
84123eeeff7SPeter Wemm 	return (error);
84223eeeff7SPeter Wemm }
84323eeeff7SPeter Wemm #endif	/* COMAPT_FREEBSD4 */
84423eeeff7SPeter Wemm 
84531c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
8462c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
8472c42a146SMarcel Moolenaar struct osigaction_args {
8482c42a146SMarcel Moolenaar 	int	signum;
8492c42a146SMarcel Moolenaar 	struct	osigaction *nsa;
8502c42a146SMarcel Moolenaar 	struct	osigaction *osa;
8512c42a146SMarcel Moolenaar };
8522c42a146SMarcel Moolenaar #endif
8532c42a146SMarcel Moolenaar int
854b40ce416SJulian Elischer osigaction(td, uap)
855b40ce416SJulian Elischer 	struct thread *td;
8562c42a146SMarcel Moolenaar 	register struct osigaction_args *uap;
8572c42a146SMarcel Moolenaar {
8582c42a146SMarcel Moolenaar 	struct osigaction sa;
8592c42a146SMarcel Moolenaar 	struct sigaction nsa, osa;
8602c42a146SMarcel Moolenaar 	register struct sigaction *nsap, *osap;
8612c42a146SMarcel Moolenaar 	int error;
8622c42a146SMarcel Moolenaar 
8636f841fb7SMarcel Moolenaar 	if (uap->signum <= 0 || uap->signum >= ONSIG)
8646f841fb7SMarcel Moolenaar 		return (EINVAL);
865fb99ab88SMatthew Dillon 
8666f841fb7SMarcel Moolenaar 	nsap = (uap->nsa != NULL) ? &nsa : NULL;
8676f841fb7SMarcel Moolenaar 	osap = (uap->osa != NULL) ? &osa : NULL;
868fb99ab88SMatthew Dillon 
8692c42a146SMarcel Moolenaar 	if (nsap) {
8706f841fb7SMarcel Moolenaar 		error = copyin(uap->nsa, &sa, sizeof(sa));
8712c42a146SMarcel Moolenaar 		if (error)
87244443757STim J. Robbins 			return (error);
8732c42a146SMarcel Moolenaar 		nsap->sa_handler = sa.sa_handler;
8742c42a146SMarcel Moolenaar 		nsap->sa_flags = sa.sa_flags;
8752c42a146SMarcel Moolenaar 		OSIG2SIG(sa.sa_mask, nsap->sa_mask);
8762c42a146SMarcel Moolenaar 	}
87723eeeff7SPeter Wemm 	error = kern_sigaction(td, uap->signum, nsap, osap, KSA_OSIGSET);
8782c42a146SMarcel Moolenaar 	if (osap && !error) {
8792c42a146SMarcel Moolenaar 		sa.sa_handler = osap->sa_handler;
8802c42a146SMarcel Moolenaar 		sa.sa_flags = osap->sa_flags;
8812c42a146SMarcel Moolenaar 		SIG2OSIG(osap->sa_mask, sa.sa_mask);
8826f841fb7SMarcel Moolenaar 		error = copyout(&sa, uap->osa, sizeof(sa));
8832c42a146SMarcel Moolenaar 	}
8842c42a146SMarcel Moolenaar 	return (error);
8852c42a146SMarcel Moolenaar }
88623eeeff7SPeter Wemm 
88773dbd3daSJohn Baldwin #if !defined(__i386__)
88823eeeff7SPeter Wemm /* Avoid replicating the same stub everywhere */
88923eeeff7SPeter Wemm int
89023eeeff7SPeter Wemm osigreturn(td, uap)
89123eeeff7SPeter Wemm 	struct thread *td;
89223eeeff7SPeter Wemm 	struct osigreturn_args *uap;
89323eeeff7SPeter Wemm {
89423eeeff7SPeter Wemm 
89523eeeff7SPeter Wemm 	return (nosys(td, (struct nosys_args *)uap));
89623eeeff7SPeter Wemm }
89723eeeff7SPeter Wemm #endif
89831c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
899df8bae1dSRodney W. Grimes 
900df8bae1dSRodney W. Grimes /*
901df8bae1dSRodney W. Grimes  * Initialize signal state for process 0;
902df8bae1dSRodney W. Grimes  * set to ignore signals that are ignored by default.
903df8bae1dSRodney W. Grimes  */
904df8bae1dSRodney W. Grimes void
905df8bae1dSRodney W. Grimes siginit(p)
906df8bae1dSRodney W. Grimes 	struct proc *p;
907df8bae1dSRodney W. Grimes {
908df8bae1dSRodney W. Grimes 	register int i;
90990af4afaSJohn Baldwin 	struct sigacts *ps;
910df8bae1dSRodney W. Grimes 
911628d2653SJohn Baldwin 	PROC_LOCK(p);
91290af4afaSJohn Baldwin 	ps = p->p_sigacts;
91390af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
9142c42a146SMarcel Moolenaar 	for (i = 1; i <= NSIG; i++)
9152c42a146SMarcel Moolenaar 		if (sigprop(i) & SA_IGNORE && i != SIGCONT)
91690af4afaSJohn Baldwin 			SIGADDSET(ps->ps_sigignore, i);
91790af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
918628d2653SJohn Baldwin 	PROC_UNLOCK(p);
919df8bae1dSRodney W. Grimes }
920df8bae1dSRodney W. Grimes 
921df8bae1dSRodney W. Grimes /*
922df8bae1dSRodney W. Grimes  * Reset signals for an exec of the specified process.
923df8bae1dSRodney W. Grimes  */
924df8bae1dSRodney W. Grimes void
925a30ec4b9SDavid Xu execsigs(struct proc *p)
926df8bae1dSRodney W. Grimes {
927a30ec4b9SDavid Xu 	struct sigacts *ps;
928a30ec4b9SDavid Xu 	int sig;
929a30ec4b9SDavid Xu 	struct thread *td;
930df8bae1dSRodney W. Grimes 
931df8bae1dSRodney W. Grimes 	/*
932df8bae1dSRodney W. Grimes 	 * Reset caught signals.  Held signals remain held
9334093529dSJeff Roberson 	 * through td_sigmask (unless they were caught,
934df8bae1dSRodney W. Grimes 	 * and are now ignored by default).
935df8bae1dSRodney W. Grimes 	 */
9369b3b1c5fSJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
937a30ec4b9SDavid Xu 	td = FIRST_THREAD_IN_PROC(p);
938628d2653SJohn Baldwin 	ps = p->p_sigacts;
93990af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
94090af4afaSJohn Baldwin 	while (SIGNOTEMPTY(ps->ps_sigcatch)) {
94190af4afaSJohn Baldwin 		sig = sig_ffs(&ps->ps_sigcatch);
94290af4afaSJohn Baldwin 		SIGDELSET(ps->ps_sigcatch, sig);
9432c42a146SMarcel Moolenaar 		if (sigprop(sig) & SA_IGNORE) {
9442c42a146SMarcel Moolenaar 			if (sig != SIGCONT)
94590af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
9469104847fSDavid Xu 			sigqueue_delete_proc(p, sig);
947df8bae1dSRodney W. Grimes 		}
9482c42a146SMarcel Moolenaar 		ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
949df8bae1dSRodney W. Grimes 	}
950df8bae1dSRodney W. Grimes 	/*
951df8bae1dSRodney W. Grimes 	 * Reset stack state to the user stack.
952df8bae1dSRodney W. Grimes 	 * Clear set of signals caught on the signal stack.
953df8bae1dSRodney W. Grimes 	 */
954a30ec4b9SDavid Xu 	td->td_sigstk.ss_flags = SS_DISABLE;
955a30ec4b9SDavid Xu 	td->td_sigstk.ss_size = 0;
956a30ec4b9SDavid Xu 	td->td_sigstk.ss_sp = 0;
957a30ec4b9SDavid Xu 	td->td_pflags &= ~TDP_ALTSTACK;
95880e907a1SPeter Wemm 	/*
95980e907a1SPeter Wemm 	 * Reset no zombies if child dies flag as Solaris does.
96080e907a1SPeter Wemm 	 */
96190af4afaSJohn Baldwin 	ps->ps_flag &= ~(PS_NOCLDWAIT | PS_CLDSIGIGN);
962c7fd62daSDavid Malone 	if (ps->ps_sigact[_SIG_IDX(SIGCHLD)] == SIG_IGN)
963c7fd62daSDavid Malone 		ps->ps_sigact[_SIG_IDX(SIGCHLD)] = SIG_DFL;
96490af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
965df8bae1dSRodney W. Grimes }
966df8bae1dSRodney W. Grimes 
967df8bae1dSRodney W. Grimes /*
968e77daab1SJohn Baldwin  * kern_sigprocmask()
9697c8fdcbdSMatthew Dillon  *
970628d2653SJohn Baldwin  *	Manipulate signal mask.
971df8bae1dSRodney W. Grimes  */
972e77daab1SJohn Baldwin int
973e77daab1SJohn Baldwin kern_sigprocmask(td, how, set, oset, old)
9744093529dSJeff Roberson 	struct thread *td;
9752c42a146SMarcel Moolenaar 	int how;
9762c42a146SMarcel Moolenaar 	sigset_t *set, *oset;
977645682fdSLuoqi Chen 	int old;
9782c42a146SMarcel Moolenaar {
9792c42a146SMarcel Moolenaar 	int error;
9802c42a146SMarcel Moolenaar 
9814093529dSJeff Roberson 	PROC_LOCK(td->td_proc);
9822c42a146SMarcel Moolenaar 	if (oset != NULL)
9834093529dSJeff Roberson 		*oset = td->td_sigmask;
9842c42a146SMarcel Moolenaar 
9852c42a146SMarcel Moolenaar 	error = 0;
9862c42a146SMarcel Moolenaar 	if (set != NULL) {
9872c42a146SMarcel Moolenaar 		switch (how) {
9882c42a146SMarcel Moolenaar 		case SIG_BLOCK:
989645682fdSLuoqi Chen 			SIG_CANTMASK(*set);
9904093529dSJeff Roberson 			SIGSETOR(td->td_sigmask, *set);
9912c42a146SMarcel Moolenaar 			break;
9922c42a146SMarcel Moolenaar 		case SIG_UNBLOCK:
9934093529dSJeff Roberson 			SIGSETNAND(td->td_sigmask, *set);
9944093529dSJeff Roberson 			signotify(td);
9952c42a146SMarcel Moolenaar 			break;
9962c42a146SMarcel Moolenaar 		case SIG_SETMASK:
997645682fdSLuoqi Chen 			SIG_CANTMASK(*set);
998645682fdSLuoqi Chen 			if (old)
9994093529dSJeff Roberson 				SIGSETLO(td->td_sigmask, *set);
1000645682fdSLuoqi Chen 			else
10014093529dSJeff Roberson 				td->td_sigmask = *set;
10024093529dSJeff Roberson 			signotify(td);
10032c42a146SMarcel Moolenaar 			break;
10042c42a146SMarcel Moolenaar 		default:
10052c42a146SMarcel Moolenaar 			error = EINVAL;
10062c42a146SMarcel Moolenaar 			break;
10072c42a146SMarcel Moolenaar 		}
10082c42a146SMarcel Moolenaar 	}
10094093529dSJeff Roberson 	PROC_UNLOCK(td->td_proc);
10102c42a146SMarcel Moolenaar 	return (error);
10112c42a146SMarcel Moolenaar }
10122c42a146SMarcel Moolenaar 
1013d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1014df8bae1dSRodney W. Grimes struct sigprocmask_args {
1015df8bae1dSRodney W. Grimes 	int	how;
10162c42a146SMarcel Moolenaar 	const sigset_t *set;
10172c42a146SMarcel Moolenaar 	sigset_t *oset;
1018df8bae1dSRodney W. Grimes };
1019d2d3e875SBruce Evans #endif
102026f9a767SRodney W. Grimes int
1021b40ce416SJulian Elischer sigprocmask(td, uap)
1022b40ce416SJulian Elischer 	register struct thread *td;
1023df8bae1dSRodney W. Grimes 	struct sigprocmask_args *uap;
1024df8bae1dSRodney W. Grimes {
10252c42a146SMarcel Moolenaar 	sigset_t set, oset;
10262c42a146SMarcel Moolenaar 	sigset_t *setp, *osetp;
10272c42a146SMarcel Moolenaar 	int error;
1028df8bae1dSRodney W. Grimes 
10296f841fb7SMarcel Moolenaar 	setp = (uap->set != NULL) ? &set : NULL;
10306f841fb7SMarcel Moolenaar 	osetp = (uap->oset != NULL) ? &oset : NULL;
10312c42a146SMarcel Moolenaar 	if (setp) {
10326f841fb7SMarcel Moolenaar 		error = copyin(uap->set, setp, sizeof(set));
10332c42a146SMarcel Moolenaar 		if (error)
10342c42a146SMarcel Moolenaar 			return (error);
1035df8bae1dSRodney W. Grimes 	}
1036e77daab1SJohn Baldwin 	error = kern_sigprocmask(td, uap->how, setp, osetp, 0);
10372c42a146SMarcel Moolenaar 	if (osetp && !error) {
10386f841fb7SMarcel Moolenaar 		error = copyout(osetp, uap->oset, sizeof(oset));
10392c42a146SMarcel Moolenaar 	}
10402c42a146SMarcel Moolenaar 	return (error);
10412c42a146SMarcel Moolenaar }
10422c42a146SMarcel Moolenaar 
104331c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
10442c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
10452c42a146SMarcel Moolenaar struct osigprocmask_args {
10462c42a146SMarcel Moolenaar 	int	how;
10472c42a146SMarcel Moolenaar 	osigset_t mask;
10482c42a146SMarcel Moolenaar };
10492c42a146SMarcel Moolenaar #endif
10502c42a146SMarcel Moolenaar int
1051b40ce416SJulian Elischer osigprocmask(td, uap)
1052b40ce416SJulian Elischer 	register struct thread *td;
10532c42a146SMarcel Moolenaar 	struct osigprocmask_args *uap;
10542c42a146SMarcel Moolenaar {
10552c42a146SMarcel Moolenaar 	sigset_t set, oset;
10562c42a146SMarcel Moolenaar 	int error;
10572c42a146SMarcel Moolenaar 
10582c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
1059e77daab1SJohn Baldwin 	error = kern_sigprocmask(td, uap->how, &set, &oset, 1);
1060b40ce416SJulian Elischer 	SIG2OSIG(oset, td->td_retval[0]);
1061df8bae1dSRodney W. Grimes 	return (error);
1062df8bae1dSRodney W. Grimes }
106331c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1064df8bae1dSRodney W. Grimes 
106526f9a767SRodney W. Grimes int
1066a447cd8bSJeff Roberson sigwait(struct thread *td, struct sigwait_args *uap)
1067a447cd8bSJeff Roberson {
10689104847fSDavid Xu 	ksiginfo_t ksi;
1069a447cd8bSJeff Roberson 	sigset_t set;
1070a447cd8bSJeff Roberson 	int error;
1071a447cd8bSJeff Roberson 
1072a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
107336939a0aSDavid Xu 	if (error) {
107436939a0aSDavid Xu 		td->td_retval[0] = error;
107536939a0aSDavid Xu 		return (0);
107636939a0aSDavid Xu 	}
1077a447cd8bSJeff Roberson 
10789104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, NULL);
107936939a0aSDavid Xu 	if (error) {
108036939a0aSDavid Xu 		if (error == ERESTART)
1081a447cd8bSJeff Roberson 			return (error);
108236939a0aSDavid Xu 		td->td_retval[0] = error;
108336939a0aSDavid Xu 		return (0);
108436939a0aSDavid Xu 	}
1085a447cd8bSJeff Roberson 
10869104847fSDavid Xu 	error = copyout(&ksi.ksi_signo, uap->sig, sizeof(ksi.ksi_signo));
108736939a0aSDavid Xu 	td->td_retval[0] = error;
108836939a0aSDavid Xu 	return (0);
1089a447cd8bSJeff Roberson }
10900c14ff0eSRobert Watson 
1091a447cd8bSJeff Roberson int
1092a447cd8bSJeff Roberson sigtimedwait(struct thread *td, struct sigtimedwait_args *uap)
1093a447cd8bSJeff Roberson {
1094a447cd8bSJeff Roberson 	struct timespec ts;
1095a447cd8bSJeff Roberson 	struct timespec *timeout;
1096a447cd8bSJeff Roberson 	sigset_t set;
10979104847fSDavid Xu 	ksiginfo_t ksi;
1098a447cd8bSJeff Roberson 	int error;
1099a447cd8bSJeff Roberson 
1100a447cd8bSJeff Roberson 	if (uap->timeout) {
1101a447cd8bSJeff Roberson 		error = copyin(uap->timeout, &ts, sizeof(ts));
1102a447cd8bSJeff Roberson 		if (error)
1103a447cd8bSJeff Roberson 			return (error);
1104a447cd8bSJeff Roberson 
1105a447cd8bSJeff Roberson 		timeout = &ts;
1106a447cd8bSJeff Roberson 	} else
1107a447cd8bSJeff Roberson 		timeout = NULL;
1108a447cd8bSJeff Roberson 
1109a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
1110a447cd8bSJeff Roberson 	if (error)
1111a447cd8bSJeff Roberson 		return (error);
1112a447cd8bSJeff Roberson 
11139104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, timeout);
1114a447cd8bSJeff Roberson 	if (error)
1115a447cd8bSJeff Roberson 		return (error);
11169dde3bc9SDavid Xu 
1117418228dfSDavid Xu 	if (uap->info)
11189104847fSDavid Xu 		error = copyout(&ksi.ksi_info, uap->info, sizeof(siginfo_t));
11199104847fSDavid Xu 
11209104847fSDavid Xu 	if (error == 0)
11219104847fSDavid Xu 		td->td_retval[0] = ksi.ksi_signo;
1122a447cd8bSJeff Roberson 	return (error);
1123a447cd8bSJeff Roberson }
1124a447cd8bSJeff Roberson 
1125a447cd8bSJeff Roberson int
1126a447cd8bSJeff Roberson sigwaitinfo(struct thread *td, struct sigwaitinfo_args *uap)
1127a447cd8bSJeff Roberson {
11289104847fSDavid Xu 	ksiginfo_t ksi;
1129a447cd8bSJeff Roberson 	sigset_t set;
1130a447cd8bSJeff Roberson 	int error;
1131a447cd8bSJeff Roberson 
1132a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
1133a447cd8bSJeff Roberson 	if (error)
1134a447cd8bSJeff Roberson 		return (error);
1135a447cd8bSJeff Roberson 
11369104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, NULL);
1137a447cd8bSJeff Roberson 	if (error)
1138a447cd8bSJeff Roberson 		return (error);
1139a447cd8bSJeff Roberson 
1140418228dfSDavid Xu 	if (uap->info)
11419104847fSDavid Xu 		error = copyout(&ksi.ksi_info, uap->info, sizeof(siginfo_t));
11429104847fSDavid Xu 
11439104847fSDavid Xu 	if (error == 0)
11449104847fSDavid Xu 		td->td_retval[0] = ksi.ksi_signo;
1145a447cd8bSJeff Roberson 	return (error);
1146a447cd8bSJeff Roberson }
1147a447cd8bSJeff Roberson 
1148c6511aeaSDavid Xu int
11499104847fSDavid Xu kern_sigtimedwait(struct thread *td, sigset_t waitset, ksiginfo_t *ksi,
1150a447cd8bSJeff Roberson 	struct timespec *timeout)
1151a447cd8bSJeff Roberson {
11523074d1b4SDavid Xu 	struct sigacts *ps;
11536675b36eSDavid Xu 	sigset_t savedmask;
1154a447cd8bSJeff Roberson 	struct proc *p;
11551089f031SDavid Xu 	int error, sig, hz, i, timevalid = 0;
11561089f031SDavid Xu 	struct timespec rts, ets, ts;
11571089f031SDavid Xu 	struct timeval tv;
1158a447cd8bSJeff Roberson 
1159a447cd8bSJeff Roberson 	p = td->td_proc;
1160a447cd8bSJeff Roberson 	error = 0;
1161a447cd8bSJeff Roberson 	sig = 0;
11629b73d239SMatt Jacob 	ets.tv_sec = 0;
11639b73d239SMatt Jacob 	ets.tv_nsec = 0;
11643074d1b4SDavid Xu 	SIG_CANTMASK(waitset);
1165a447cd8bSJeff Roberson 
1166a447cd8bSJeff Roberson 	PROC_LOCK(p);
1167a447cd8bSJeff Roberson 	ps = p->p_sigacts;
11683074d1b4SDavid Xu 	savedmask = td->td_sigmask;
11691089f031SDavid Xu 	if (timeout) {
11701089f031SDavid Xu 		if (timeout->tv_nsec >= 0 && timeout->tv_nsec < 1000000000) {
11711089f031SDavid Xu 			timevalid = 1;
11721089f031SDavid Xu 			getnanouptime(&rts);
11731089f031SDavid Xu 		 	ets = rts;
11741089f031SDavid Xu 			timespecadd(&ets, timeout);
11751089f031SDavid Xu 		}
11761089f031SDavid Xu 	}
11773074d1b4SDavid Xu 
11787e0221a2SDavid Xu restart:
11793074d1b4SDavid Xu 	for (i = 1; i <= _SIG_MAXSIG; ++i) {
11803074d1b4SDavid Xu 		if (!SIGISMEMBER(waitset, i))
11813074d1b4SDavid Xu 			continue;
11827e0221a2SDavid Xu 		if (!SIGISMEMBER(td->td_sigqueue.sq_signals, i)) {
11837e0221a2SDavid Xu 			if (SIGISMEMBER(p->p_sigqueue.sq_signals, i)) {
11847e0221a2SDavid Xu 				sigqueue_move(&p->p_sigqueue,
11857e0221a2SDavid Xu 					&td->td_sigqueue, i);
11867e0221a2SDavid Xu 			} else
11877e0221a2SDavid Xu 				continue;
11887e0221a2SDavid Xu 		}
11897e0221a2SDavid Xu 
11903074d1b4SDavid Xu 		SIGFILLSET(td->td_sigmask);
11913074d1b4SDavid Xu 		SIG_CANTMASK(td->td_sigmask);
11923074d1b4SDavid Xu 		SIGDELSET(td->td_sigmask, i);
11933074d1b4SDavid Xu 		mtx_lock(&ps->ps_mtx);
11943074d1b4SDavid Xu 		sig = cursig(td);
11953074d1b4SDavid Xu 		mtx_unlock(&ps->ps_mtx);
11966675b36eSDavid Xu 		if (sig)
1197a447cd8bSJeff Roberson 			goto out;
11987e0221a2SDavid Xu 		else {
11997e0221a2SDavid Xu 			/*
12007e0221a2SDavid Xu 			 * Because cursig() may have stopped current thread,
12017e0221a2SDavid Xu 			 * after it is resumed, things may have already been
12027e0221a2SDavid Xu 			 * changed, it should rescan any pending signals.
12037e0221a2SDavid Xu 			 */
12047e0221a2SDavid Xu 			goto restart;
12053074d1b4SDavid Xu 		}
12067e0221a2SDavid Xu 	}
12077e0221a2SDavid Xu 
12083074d1b4SDavid Xu 	if (error)
12093074d1b4SDavid Xu 		goto out;
12103074d1b4SDavid Xu 
1211a447cd8bSJeff Roberson 	/*
1212a447cd8bSJeff Roberson 	 * POSIX says this must be checked after looking for pending
1213a447cd8bSJeff Roberson 	 * signals.
1214a447cd8bSJeff Roberson 	 */
1215a447cd8bSJeff Roberson 	if (timeout) {
12161089f031SDavid Xu 		if (!timevalid) {
1217a447cd8bSJeff Roberson 			error = EINVAL;
1218a447cd8bSJeff Roberson 			goto out;
1219a447cd8bSJeff Roberson 		}
12201089f031SDavid Xu 		getnanouptime(&rts);
12211089f031SDavid Xu 		if (timespeccmp(&rts, &ets, >=)) {
12223074d1b4SDavid Xu 			error = EAGAIN;
12233074d1b4SDavid Xu 			goto out;
12243074d1b4SDavid Xu 		}
12251089f031SDavid Xu 		ts = ets;
12261089f031SDavid Xu 		timespecsub(&ts, &rts);
12271089f031SDavid Xu 		TIMESPEC_TO_TIMEVAL(&tv, &ts);
1228a447cd8bSJeff Roberson 		hz = tvtohz(&tv);
1229a447cd8bSJeff Roberson 	} else
1230a447cd8bSJeff Roberson 		hz = 0;
1231a447cd8bSJeff Roberson 
12326675b36eSDavid Xu 	td->td_sigmask = savedmask;
12336675b36eSDavid Xu 	SIGSETNAND(td->td_sigmask, waitset);
12346675b36eSDavid Xu 	signotify(td);
123586b5e563SDag-Erling Smørgrav 	error = msleep(&ps, &p->p_mtx, PPAUSE|PCATCH, "sigwait", hz);
12361089f031SDavid Xu 	if (timeout) {
12371089f031SDavid Xu 		if (error == ERESTART) {
12381089f031SDavid Xu 			/* timeout can not be restarted. */
12393074d1b4SDavid Xu 			error = EINTR;
12401089f031SDavid Xu 		} else if (error == EAGAIN) {
12411089f031SDavid Xu 			/* will calculate timeout by ourself. */
12421089f031SDavid Xu 			error = 0;
12431089f031SDavid Xu 		}
12441089f031SDavid Xu 	}
12457e0221a2SDavid Xu 	goto restart;
12469dde3bc9SDavid Xu 
1247a447cd8bSJeff Roberson out:
12487e0221a2SDavid Xu 	td->td_sigmask = savedmask;
12497e0221a2SDavid Xu 	signotify(td);
1250a447cd8bSJeff Roberson 	if (sig) {
12515da49fcbSDavid Xu 		ksiginfo_init(ksi);
12529104847fSDavid Xu 		sigqueue_get(&td->td_sigqueue, sig, ksi);
12539104847fSDavid Xu 		ksi->ksi_signo = sig;
12545d217f17SJohn Birrell 
12555d217f17SJohn Birrell 		SDT_PROBE(proc, kernel, , signal_clear, sig, ksi, 0, 0, 0);
12565d217f17SJohn Birrell 
125756c06c4bSDavid Xu 		if (ksi->ksi_code == SI_TIMER)
125856c06c4bSDavid Xu 			itimer_accept(p, ksi->ksi_timerid, ksi);
12593074d1b4SDavid Xu 		error = 0;
12607e0221a2SDavid Xu 
12617e0221a2SDavid Xu #ifdef KTRACE
12627e0221a2SDavid Xu 		if (KTRPOINT(td, KTR_PSIG)) {
12637e0221a2SDavid Xu 			sig_t action;
12647e0221a2SDavid Xu 
12653074d1b4SDavid Xu 			mtx_lock(&ps->ps_mtx);
1266a447cd8bSJeff Roberson 			action = ps->ps_sigact[_SIG_IDX(sig)];
126790af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
12683074d1b4SDavid Xu 			ktrpsig(sig, action, &td->td_sigmask, 0);
12697e0221a2SDavid Xu 		}
1270a447cd8bSJeff Roberson #endif
12717b8d5e48SDavid Xu 		if (sig == SIGKILL)
12727e0221a2SDavid Xu 			sigexit(td, sig);
12733074d1b4SDavid Xu 	}
1274a447cd8bSJeff Roberson 	PROC_UNLOCK(p);
1275a447cd8bSJeff Roberson 	return (error);
1276a447cd8bSJeff Roberson }
1277a447cd8bSJeff Roberson 
12789104847fSDavid Xu #ifndef _SYS_SYSPROTO_H_
12799104847fSDavid Xu struct sigpending_args {
12809104847fSDavid Xu 	sigset_t	*set;
12819104847fSDavid Xu };
12829104847fSDavid Xu #endif
1283a447cd8bSJeff Roberson int
1284b40ce416SJulian Elischer sigpending(td, uap)
1285b40ce416SJulian Elischer 	struct thread *td;
1286df8bae1dSRodney W. Grimes 	struct sigpending_args *uap;
1287df8bae1dSRodney W. Grimes {
1288b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
12899104847fSDavid Xu 	sigset_t pending;
1290df8bae1dSRodney W. Grimes 
1291628d2653SJohn Baldwin 	PROC_LOCK(p);
12929104847fSDavid Xu 	pending = p->p_sigqueue.sq_signals;
12939104847fSDavid Xu 	SIGSETOR(pending, td->td_sigqueue.sq_signals);
1294628d2653SJohn Baldwin 	PROC_UNLOCK(p);
12959104847fSDavid Xu 	return (copyout(&pending, uap->set, sizeof(sigset_t)));
12962c42a146SMarcel Moolenaar }
12972c42a146SMarcel Moolenaar 
129831c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
12992c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
13002c42a146SMarcel Moolenaar struct osigpending_args {
13012c42a146SMarcel Moolenaar 	int	dummy;
13022c42a146SMarcel Moolenaar };
13032c42a146SMarcel Moolenaar #endif
13042c42a146SMarcel Moolenaar int
1305b40ce416SJulian Elischer osigpending(td, uap)
1306b40ce416SJulian Elischer 	struct thread *td;
13072c42a146SMarcel Moolenaar 	struct osigpending_args *uap;
13082c42a146SMarcel Moolenaar {
1309b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
13109104847fSDavid Xu 	sigset_t pending;
1311b40ce416SJulian Elischer 
1312628d2653SJohn Baldwin 	PROC_LOCK(p);
13139104847fSDavid Xu 	pending = p->p_sigqueue.sq_signals;
13149104847fSDavid Xu 	SIGSETOR(pending, td->td_sigqueue.sq_signals);
1315628d2653SJohn Baldwin 	PROC_UNLOCK(p);
13169104847fSDavid Xu 	SIG2OSIG(pending, td->td_retval[0]);
1317df8bae1dSRodney W. Grimes 	return (0);
1318df8bae1dSRodney W. Grimes }
131931c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1320df8bae1dSRodney W. Grimes 
13211930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1322df8bae1dSRodney W. Grimes /*
1323df8bae1dSRodney W. Grimes  * Generalized interface signal handler, 4.3-compatible.
1324df8bae1dSRodney W. Grimes  */
1325d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1326df8bae1dSRodney W. Grimes struct osigvec_args {
1327df8bae1dSRodney W. Grimes 	int	signum;
1328df8bae1dSRodney W. Grimes 	struct	sigvec *nsv;
1329df8bae1dSRodney W. Grimes 	struct	sigvec *osv;
1330df8bae1dSRodney W. Grimes };
1331d2d3e875SBruce Evans #endif
1332df8bae1dSRodney W. Grimes /* ARGSUSED */
133326f9a767SRodney W. Grimes int
1334b40ce416SJulian Elischer osigvec(td, uap)
1335b40ce416SJulian Elischer 	struct thread *td;
1336df8bae1dSRodney W. Grimes 	register struct osigvec_args *uap;
1337df8bae1dSRodney W. Grimes {
1338df8bae1dSRodney W. Grimes 	struct sigvec vec;
13392c42a146SMarcel Moolenaar 	struct sigaction nsa, osa;
13402c42a146SMarcel Moolenaar 	register struct sigaction *nsap, *osap;
13412c42a146SMarcel Moolenaar 	int error;
1342df8bae1dSRodney W. Grimes 
13436f841fb7SMarcel Moolenaar 	if (uap->signum <= 0 || uap->signum >= ONSIG)
13446f841fb7SMarcel Moolenaar 		return (EINVAL);
13456f841fb7SMarcel Moolenaar 	nsap = (uap->nsv != NULL) ? &nsa : NULL;
13466f841fb7SMarcel Moolenaar 	osap = (uap->osv != NULL) ? &osa : NULL;
13472c42a146SMarcel Moolenaar 	if (nsap) {
13486f841fb7SMarcel Moolenaar 		error = copyin(uap->nsv, &vec, sizeof(vec));
13492c42a146SMarcel Moolenaar 		if (error)
1350df8bae1dSRodney W. Grimes 			return (error);
13512c42a146SMarcel Moolenaar 		nsap->sa_handler = vec.sv_handler;
13522c42a146SMarcel Moolenaar 		OSIG2SIG(vec.sv_mask, nsap->sa_mask);
13532c42a146SMarcel Moolenaar 		nsap->sa_flags = vec.sv_flags;
13542c42a146SMarcel Moolenaar 		nsap->sa_flags ^= SA_RESTART;	/* opposite of SV_INTERRUPT */
1355df8bae1dSRodney W. Grimes 	}
13565edadff9SJohn Baldwin 	error = kern_sigaction(td, uap->signum, nsap, osap, KSA_OSIGSET);
13572c42a146SMarcel Moolenaar 	if (osap && !error) {
13582c42a146SMarcel Moolenaar 		vec.sv_handler = osap->sa_handler;
13592c42a146SMarcel Moolenaar 		SIG2OSIG(osap->sa_mask, vec.sv_mask);
13602c42a146SMarcel Moolenaar 		vec.sv_flags = osap->sa_flags;
13612c42a146SMarcel Moolenaar 		vec.sv_flags &= ~SA_NOCLDWAIT;
13622c42a146SMarcel Moolenaar 		vec.sv_flags ^= SA_RESTART;
13636f841fb7SMarcel Moolenaar 		error = copyout(&vec, uap->osv, sizeof(vec));
13642c42a146SMarcel Moolenaar 	}
13652c42a146SMarcel Moolenaar 	return (error);
1366df8bae1dSRodney W. Grimes }
1367df8bae1dSRodney W. Grimes 
1368d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1369df8bae1dSRodney W. Grimes struct osigblock_args {
1370df8bae1dSRodney W. Grimes 	int	mask;
1371df8bae1dSRodney W. Grimes };
1372d2d3e875SBruce Evans #endif
137326f9a767SRodney W. Grimes int
1374b40ce416SJulian Elischer osigblock(td, uap)
1375b40ce416SJulian Elischer 	register struct thread *td;
1376df8bae1dSRodney W. Grimes 	struct osigblock_args *uap;
1377df8bae1dSRodney W. Grimes {
1378b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
13792c42a146SMarcel Moolenaar 	sigset_t set;
1380df8bae1dSRodney W. Grimes 
13812c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
13822c42a146SMarcel Moolenaar 	SIG_CANTMASK(set);
1383628d2653SJohn Baldwin 	PROC_LOCK(p);
13844093529dSJeff Roberson 	SIG2OSIG(td->td_sigmask, td->td_retval[0]);
13854093529dSJeff Roberson 	SIGSETOR(td->td_sigmask, set);
1386628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1387df8bae1dSRodney W. Grimes 	return (0);
1388df8bae1dSRodney W. Grimes }
1389df8bae1dSRodney W. Grimes 
1390d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1391df8bae1dSRodney W. Grimes struct osigsetmask_args {
1392df8bae1dSRodney W. Grimes 	int	mask;
1393df8bae1dSRodney W. Grimes };
1394d2d3e875SBruce Evans #endif
139526f9a767SRodney W. Grimes int
1396b40ce416SJulian Elischer osigsetmask(td, uap)
1397b40ce416SJulian Elischer 	struct thread *td;
1398df8bae1dSRodney W. Grimes 	struct osigsetmask_args *uap;
1399df8bae1dSRodney W. Grimes {
1400b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
14012c42a146SMarcel Moolenaar 	sigset_t set;
1402df8bae1dSRodney W. Grimes 
14032c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
14042c42a146SMarcel Moolenaar 	SIG_CANTMASK(set);
1405628d2653SJohn Baldwin 	PROC_LOCK(p);
14064093529dSJeff Roberson 	SIG2OSIG(td->td_sigmask, td->td_retval[0]);
14074093529dSJeff Roberson 	SIGSETLO(td->td_sigmask, set);
14084093529dSJeff Roberson 	signotify(td);
1409628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1410df8bae1dSRodney W. Grimes 	return (0);
1411df8bae1dSRodney W. Grimes }
14121930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1413df8bae1dSRodney W. Grimes 
1414df8bae1dSRodney W. Grimes /*
1415873fbcd7SRobert Watson  * Suspend calling thread until signal, providing mask to be set in the
1416873fbcd7SRobert Watson  * meantime.
1417df8bae1dSRodney W. Grimes  */
1418d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1419df8bae1dSRodney W. Grimes struct sigsuspend_args {
14202c42a146SMarcel Moolenaar 	const sigset_t *sigmask;
1421df8bae1dSRodney W. Grimes };
1422d2d3e875SBruce Evans #endif
1423df8bae1dSRodney W. Grimes /* ARGSUSED */
142426f9a767SRodney W. Grimes int
1425b40ce416SJulian Elischer sigsuspend(td, uap)
1426b40ce416SJulian Elischer 	struct thread *td;
1427df8bae1dSRodney W. Grimes 	struct sigsuspend_args *uap;
1428df8bae1dSRodney W. Grimes {
14292c42a146SMarcel Moolenaar 	sigset_t mask;
14302c42a146SMarcel Moolenaar 	int error;
14312c42a146SMarcel Moolenaar 
14326f841fb7SMarcel Moolenaar 	error = copyin(uap->sigmask, &mask, sizeof(mask));
14332c42a146SMarcel Moolenaar 	if (error)
14342c42a146SMarcel Moolenaar 		return (error);
14358f19eb88SIan Dowse 	return (kern_sigsuspend(td, mask));
14368f19eb88SIan Dowse }
14378f19eb88SIan Dowse 
14388f19eb88SIan Dowse int
14398f19eb88SIan Dowse kern_sigsuspend(struct thread *td, sigset_t mask)
14408f19eb88SIan Dowse {
14418f19eb88SIan Dowse 	struct proc *p = td->td_proc;
1442df8bae1dSRodney W. Grimes 
1443df8bae1dSRodney W. Grimes 	/*
1444645682fdSLuoqi Chen 	 * When returning from sigsuspend, we want
1445df8bae1dSRodney W. Grimes 	 * the old mask to be restored after the
1446df8bae1dSRodney W. Grimes 	 * signal handler has finished.  Thus, we
1447df8bae1dSRodney W. Grimes 	 * save it here and mark the sigacts structure
1448df8bae1dSRodney W. Grimes 	 * to indicate this.
1449df8bae1dSRodney W. Grimes 	 */
1450628d2653SJohn Baldwin 	PROC_LOCK(p);
14514093529dSJeff Roberson 	td->td_oldsigmask = td->td_sigmask;
14525e26dcb5SJohn Baldwin 	td->td_pflags |= TDP_OLDMASK;
1453645682fdSLuoqi Chen 	SIG_CANTMASK(mask);
14544093529dSJeff Roberson 	td->td_sigmask = mask;
14554093529dSJeff Roberson 	signotify(td);
145686b5e563SDag-Erling Smørgrav 	while (msleep(&p->p_sigacts, &p->p_mtx, PPAUSE|PCATCH, "pause", 0) == 0)
14572c42a146SMarcel Moolenaar 		/* void */;
1458628d2653SJohn Baldwin 	PROC_UNLOCK(p);
14592c42a146SMarcel Moolenaar 	/* always return EINTR rather than ERESTART... */
14602c42a146SMarcel Moolenaar 	return (EINTR);
14612c42a146SMarcel Moolenaar }
14622c42a146SMarcel Moolenaar 
146331c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
146497563428SAlexander Kabaev /*
146597563428SAlexander Kabaev  * Compatibility sigsuspend call for old binaries.  Note nonstandard calling
146697563428SAlexander Kabaev  * convention: libc stub passes mask, not pointer, to save a copyin.
146797563428SAlexander Kabaev  */
14682c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
14692c42a146SMarcel Moolenaar struct osigsuspend_args {
14702c42a146SMarcel Moolenaar 	osigset_t mask;
14712c42a146SMarcel Moolenaar };
14722c42a146SMarcel Moolenaar #endif
14732c42a146SMarcel Moolenaar /* ARGSUSED */
14742c42a146SMarcel Moolenaar int
1475b40ce416SJulian Elischer osigsuspend(td, uap)
1476b40ce416SJulian Elischer 	struct thread *td;
14772c42a146SMarcel Moolenaar 	struct osigsuspend_args *uap;
14782c42a146SMarcel Moolenaar {
1479b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
1480645682fdSLuoqi Chen 	sigset_t mask;
14812c42a146SMarcel Moolenaar 
1482628d2653SJohn Baldwin 	PROC_LOCK(p);
14834093529dSJeff Roberson 	td->td_oldsigmask = td->td_sigmask;
14845e26dcb5SJohn Baldwin 	td->td_pflags |= TDP_OLDMASK;
1485645682fdSLuoqi Chen 	OSIG2SIG(uap->mask, mask);
1486645682fdSLuoqi Chen 	SIG_CANTMASK(mask);
14874093529dSJeff Roberson 	SIGSETLO(td->td_sigmask, mask);
14884093529dSJeff Roberson 	signotify(td);
148986b5e563SDag-Erling Smørgrav 	while (msleep(&p->p_sigacts, &p->p_mtx, PPAUSE|PCATCH, "opause", 0) == 0)
1490df8bae1dSRodney W. Grimes 		/* void */;
1491628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1492df8bae1dSRodney W. Grimes 	/* always return EINTR rather than ERESTART... */
1493df8bae1dSRodney W. Grimes 	return (EINTR);
1494df8bae1dSRodney W. Grimes }
149531c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1496df8bae1dSRodney W. Grimes 
14971930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1498d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1499df8bae1dSRodney W. Grimes struct osigstack_args {
1500df8bae1dSRodney W. Grimes 	struct	sigstack *nss;
1501df8bae1dSRodney W. Grimes 	struct	sigstack *oss;
1502df8bae1dSRodney W. Grimes };
1503d2d3e875SBruce Evans #endif
1504df8bae1dSRodney W. Grimes /* ARGSUSED */
150526f9a767SRodney W. Grimes int
1506b40ce416SJulian Elischer osigstack(td, uap)
1507b40ce416SJulian Elischer 	struct thread *td;
1508df8bae1dSRodney W. Grimes 	register struct osigstack_args *uap;
1509df8bae1dSRodney W. Grimes {
15105afe0c99SJohn Baldwin 	struct sigstack nss, oss;
1511fb99ab88SMatthew Dillon 	int error = 0;
1512fb99ab88SMatthew Dillon 
1513d034d459SMarcel Moolenaar 	if (uap->nss != NULL) {
15145afe0c99SJohn Baldwin 		error = copyin(uap->nss, &nss, sizeof(nss));
15155afe0c99SJohn Baldwin 		if (error)
15165afe0c99SJohn Baldwin 			return (error);
1517df8bae1dSRodney W. Grimes 	}
1518a30ec4b9SDavid Xu 	oss.ss_sp = td->td_sigstk.ss_sp;
15195afe0c99SJohn Baldwin 	oss.ss_onstack = sigonstack(cpu_getstack(td));
15205afe0c99SJohn Baldwin 	if (uap->nss != NULL) {
1521a30ec4b9SDavid Xu 		td->td_sigstk.ss_sp = nss.ss_sp;
1522a30ec4b9SDavid Xu 		td->td_sigstk.ss_size = 0;
1523a30ec4b9SDavid Xu 		td->td_sigstk.ss_flags |= nss.ss_onstack & SS_ONSTACK;
1524a30ec4b9SDavid Xu 		td->td_pflags |= TDP_ALTSTACK;
15255afe0c99SJohn Baldwin 	}
15265afe0c99SJohn Baldwin 	if (uap->oss != NULL)
15275afe0c99SJohn Baldwin 		error = copyout(&oss, uap->oss, sizeof(oss));
15285afe0c99SJohn Baldwin 
1529fb99ab88SMatthew Dillon 	return (error);
1530df8bae1dSRodney W. Grimes }
15311930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1532df8bae1dSRodney W. Grimes 
1533d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1534df8bae1dSRodney W. Grimes struct sigaltstack_args {
15352c42a146SMarcel Moolenaar 	stack_t	*ss;
15362c42a146SMarcel Moolenaar 	stack_t	*oss;
1537df8bae1dSRodney W. Grimes };
1538d2d3e875SBruce Evans #endif
1539df8bae1dSRodney W. Grimes /* ARGSUSED */
154026f9a767SRodney W. Grimes int
1541b40ce416SJulian Elischer sigaltstack(td, uap)
1542b40ce416SJulian Elischer 	struct thread *td;
1543df8bae1dSRodney W. Grimes 	register struct sigaltstack_args *uap;
1544df8bae1dSRodney W. Grimes {
15458f19eb88SIan Dowse 	stack_t ss, oss;
15468f19eb88SIan Dowse 	int error;
15478f19eb88SIan Dowse 
15488f19eb88SIan Dowse 	if (uap->ss != NULL) {
15498f19eb88SIan Dowse 		error = copyin(uap->ss, &ss, sizeof(ss));
15508f19eb88SIan Dowse 		if (error)
15518f19eb88SIan Dowse 			return (error);
15528f19eb88SIan Dowse 	}
15538f19eb88SIan Dowse 	error = kern_sigaltstack(td, (uap->ss != NULL) ? &ss : NULL,
15548f19eb88SIan Dowse 	    (uap->oss != NULL) ? &oss : NULL);
15558f19eb88SIan Dowse 	if (error)
15568f19eb88SIan Dowse 		return (error);
15578f19eb88SIan Dowse 	if (uap->oss != NULL)
15588f19eb88SIan Dowse 		error = copyout(&oss, uap->oss, sizeof(stack_t));
15598f19eb88SIan Dowse 	return (error);
15608f19eb88SIan Dowse }
15618f19eb88SIan Dowse 
15628f19eb88SIan Dowse int
15638f19eb88SIan Dowse kern_sigaltstack(struct thread *td, stack_t *ss, stack_t *oss)
15648f19eb88SIan Dowse {
1565b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
1566fb99ab88SMatthew Dillon 	int oonstack;
1567fb99ab88SMatthew Dillon 
1568b40ce416SJulian Elischer 	oonstack = sigonstack(cpu_getstack(td));
1569d034d459SMarcel Moolenaar 
15708f19eb88SIan Dowse 	if (oss != NULL) {
1571a30ec4b9SDavid Xu 		*oss = td->td_sigstk;
1572a30ec4b9SDavid Xu 		oss->ss_flags = (td->td_pflags & TDP_ALTSTACK)
1573d034d459SMarcel Moolenaar 		    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
1574df8bae1dSRodney W. Grimes 	}
1575d034d459SMarcel Moolenaar 
15768f19eb88SIan Dowse 	if (ss != NULL) {
1577a30ec4b9SDavid Xu 		if (oonstack)
1578cf60731bSJohn Baldwin 			return (EPERM);
1579a30ec4b9SDavid Xu 		if ((ss->ss_flags & ~SS_DISABLE) != 0)
1580cf60731bSJohn Baldwin 			return (EINVAL);
15818f19eb88SIan Dowse 		if (!(ss->ss_flags & SS_DISABLE)) {
15829104847fSDavid Xu 			if (ss->ss_size < p->p_sysent->sv_minsigstksz)
1583cf60731bSJohn Baldwin 				return (ENOMEM);
15849104847fSDavid Xu 
1585a30ec4b9SDavid Xu 			td->td_sigstk = *ss;
1586a30ec4b9SDavid Xu 			td->td_pflags |= TDP_ALTSTACK;
1587628d2653SJohn Baldwin 		} else {
1588a30ec4b9SDavid Xu 			td->td_pflags &= ~TDP_ALTSTACK;
1589628d2653SJohn Baldwin 		}
1590d034d459SMarcel Moolenaar 	}
1591cf60731bSJohn Baldwin 	return (0);
1592df8bae1dSRodney W. Grimes }
1593df8bae1dSRodney W. Grimes 
1594d93f860cSPoul-Henning Kamp /*
1595d93f860cSPoul-Henning Kamp  * Common code for kill process group/broadcast kill.
1596d93f860cSPoul-Henning Kamp  * cp is calling process.
1597d93f860cSPoul-Henning Kamp  */
159837c84183SPoul-Henning Kamp static int
15991a88a252SMaxim Sobolev killpg1(td, sig, pgid, all)
16009c1ab3e0SJohn Baldwin 	register struct thread *td;
16011a88a252SMaxim Sobolev 	int sig, pgid, all;
1602d93f860cSPoul-Henning Kamp {
1603d93f860cSPoul-Henning Kamp 	register struct proc *p;
1604d93f860cSPoul-Henning Kamp 	struct pgrp *pgrp;
1605d93f860cSPoul-Henning Kamp 	int nfound = 0;
1606d93f860cSPoul-Henning Kamp 
1607553629ebSJake Burkholder 	if (all) {
1608d93f860cSPoul-Henning Kamp 		/*
1609d93f860cSPoul-Henning Kamp 		 * broadcast
1610d93f860cSPoul-Henning Kamp 		 */
16111005a129SJohn Baldwin 		sx_slock(&allproc_lock);
16124f506694SXin LI 		FOREACH_PROC_IN_SYSTEM(p) {
1613628d2653SJohn Baldwin 			PROC_LOCK(p);
16149c1ab3e0SJohn Baldwin 			if (p->p_pid <= 1 || p->p_flag & P_SYSTEM ||
161595f16c1eSPaul Saab 			    p == td->td_proc || p->p_state == PRS_NEW) {
1616628d2653SJohn Baldwin 				PROC_UNLOCK(p);
1617628d2653SJohn Baldwin 				continue;
1618628d2653SJohn Baldwin 			}
16191a88a252SMaxim Sobolev 			if (p_cansignal(td, p, sig) == 0) {
1620d93f860cSPoul-Henning Kamp 				nfound++;
162133a9ed9dSJohn Baldwin 				if (sig)
16222c42a146SMarcel Moolenaar 					psignal(p, sig);
1623628d2653SJohn Baldwin 			}
162433a9ed9dSJohn Baldwin 			PROC_UNLOCK(p);
1625d93f860cSPoul-Henning Kamp 		}
16261005a129SJohn Baldwin 		sx_sunlock(&allproc_lock);
1627553629ebSJake Burkholder 	} else {
1628ba626c1dSJohn Baldwin 		sx_slock(&proctree_lock);
1629f591779bSSeigo Tanimura 		if (pgid == 0) {
1630d93f860cSPoul-Henning Kamp 			/*
1631d93f860cSPoul-Henning Kamp 			 * zero pgid means send to my process group.
1632d93f860cSPoul-Henning Kamp 			 */
16339c1ab3e0SJohn Baldwin 			pgrp = td->td_proc->p_pgrp;
1634f591779bSSeigo Tanimura 			PGRP_LOCK(pgrp);
1635f591779bSSeigo Tanimura 		} else {
1636d93f860cSPoul-Henning Kamp 			pgrp = pgfind(pgid);
1637f591779bSSeigo Tanimura 			if (pgrp == NULL) {
1638ba626c1dSJohn Baldwin 				sx_sunlock(&proctree_lock);
1639d93f860cSPoul-Henning Kamp 				return (ESRCH);
1640d93f860cSPoul-Henning Kamp 			}
1641f591779bSSeigo Tanimura 		}
1642ba626c1dSJohn Baldwin 		sx_sunlock(&proctree_lock);
16432e3c8fcbSPoul-Henning Kamp 		LIST_FOREACH(p, &pgrp->pg_members, p_pglist) {
1644628d2653SJohn Baldwin 			PROC_LOCK(p);
164595f16c1eSPaul Saab 			if (p->p_pid <= 1 || p->p_flag & P_SYSTEM ||
164695f16c1eSPaul Saab 				p->p_state == PRS_NEW ) {
1647628d2653SJohn Baldwin 				PROC_UNLOCK(p);
1648628d2653SJohn Baldwin 				continue;
1649628d2653SJohn Baldwin 			}
16501a88a252SMaxim Sobolev 			if (p_cansignal(td, p, sig) == 0) {
1651d93f860cSPoul-Henning Kamp 				nfound++;
165233a9ed9dSJohn Baldwin 				if (sig)
16532c42a146SMarcel Moolenaar 					psignal(p, sig);
1654628d2653SJohn Baldwin 			}
165533a9ed9dSJohn Baldwin 			PROC_UNLOCK(p);
1656d93f860cSPoul-Henning Kamp 		}
1657f591779bSSeigo Tanimura 		PGRP_UNLOCK(pgrp);
1658d93f860cSPoul-Henning Kamp 	}
1659d93f860cSPoul-Henning Kamp 	return (nfound ? 0 : ESRCH);
1660d93f860cSPoul-Henning Kamp }
1661d93f860cSPoul-Henning Kamp 
1662d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1663df8bae1dSRodney W. Grimes struct kill_args {
1664df8bae1dSRodney W. Grimes 	int	pid;
1665df8bae1dSRodney W. Grimes 	int	signum;
1666df8bae1dSRodney W. Grimes };
1667d2d3e875SBruce Evans #endif
1668df8bae1dSRodney W. Grimes /* ARGSUSED */
166926f9a767SRodney W. Grimes int
1670b40ce416SJulian Elischer kill(td, uap)
1671b40ce416SJulian Elischer 	register struct thread *td;
1672df8bae1dSRodney W. Grimes 	register struct kill_args *uap;
1673df8bae1dSRodney W. Grimes {
1674df8bae1dSRodney W. Grimes 	register struct proc *p;
167590af4afaSJohn Baldwin 	int error;
1676df8bae1dSRodney W. Grimes 
1677bfd7575aSWayne Salamon 	AUDIT_ARG(signum, uap->signum);
16785ff3816dSChristian S.J. Peron 	AUDIT_ARG(pid, uap->pid);
16796c1534a7SPeter Wemm 	if ((u_int)uap->signum > _SIG_MAXSIG)
1680df8bae1dSRodney W. Grimes 		return (EINVAL);
1681fb99ab88SMatthew Dillon 
1682df8bae1dSRodney W. Grimes 	if (uap->pid > 0) {
1683df8bae1dSRodney W. Grimes 		/* kill single process */
16840b011ea3SPawel Jakub Dawidek 		if ((p = pfind(uap->pid)) == NULL) {
168524b2151fSPawel Jakub Dawidek 			if ((p = zpfind(uap->pid)) == NULL)
168690af4afaSJohn Baldwin 				return (ESRCH);
16870b011ea3SPawel Jakub Dawidek 		}
1688bfd7575aSWayne Salamon 		AUDIT_ARG(process, p);
16891a88a252SMaxim Sobolev 		error = p_cansignal(td, p, uap->signum);
169090af4afaSJohn Baldwin 		if (error == 0 && uap->signum)
1691df8bae1dSRodney W. Grimes 			psignal(p, uap->signum);
1692628d2653SJohn Baldwin 		PROC_UNLOCK(p);
169390af4afaSJohn Baldwin 		return (error);
1694df8bae1dSRodney W. Grimes 	}
1695df8bae1dSRodney W. Grimes 	switch (uap->pid) {
1696df8bae1dSRodney W. Grimes 	case -1:		/* broadcast signal */
16971a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, 0, 1));
1698df8bae1dSRodney W. Grimes 	case 0:			/* signal own process group */
16991a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, 0, 0));
1700df8bae1dSRodney W. Grimes 	default:		/* negative explicit process group */
17011a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, -uap->pid, 0));
1702df8bae1dSRodney W. Grimes 	}
170390af4afaSJohn Baldwin 	/* NOTREACHED */
1704df8bae1dSRodney W. Grimes }
1705df8bae1dSRodney W. Grimes 
17061930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1707d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1708df8bae1dSRodney W. Grimes struct okillpg_args {
1709df8bae1dSRodney W. Grimes 	int	pgid;
1710df8bae1dSRodney W. Grimes 	int	signum;
1711df8bae1dSRodney W. Grimes };
1712d2d3e875SBruce Evans #endif
1713df8bae1dSRodney W. Grimes /* ARGSUSED */
171426f9a767SRodney W. Grimes int
1715b40ce416SJulian Elischer okillpg(td, uap)
1716b40ce416SJulian Elischer 	struct thread *td;
1717df8bae1dSRodney W. Grimes 	register struct okillpg_args *uap;
1718df8bae1dSRodney W. Grimes {
1719df8bae1dSRodney W. Grimes 
1720bfd7575aSWayne Salamon 	AUDIT_ARG(signum, uap->signum);
1721bfd7575aSWayne Salamon 	AUDIT_ARG(pid, uap->pgid);
17226c1534a7SPeter Wemm 	if ((u_int)uap->signum > _SIG_MAXSIG)
1723df8bae1dSRodney W. Grimes 		return (EINVAL);
17249104847fSDavid Xu 
17251a88a252SMaxim Sobolev 	return (killpg1(td, uap->signum, uap->pgid, 0));
1726df8bae1dSRodney W. Grimes }
17271930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1728df8bae1dSRodney W. Grimes 
17299104847fSDavid Xu #ifndef _SYS_SYSPROTO_H_
17309104847fSDavid Xu struct sigqueue_args {
17319104847fSDavid Xu 	pid_t pid;
17329104847fSDavid Xu 	int signum;
17339104847fSDavid Xu 	/* union sigval */ void *value;
17349104847fSDavid Xu };
17359104847fSDavid Xu #endif
17369104847fSDavid Xu int
17379104847fSDavid Xu sigqueue(struct thread *td, struct sigqueue_args *uap)
17389104847fSDavid Xu {
17399104847fSDavid Xu 	ksiginfo_t ksi;
17409104847fSDavid Xu 	struct proc *p;
17419104847fSDavid Xu 	int error;
17429104847fSDavid Xu 
17439104847fSDavid Xu 	if ((u_int)uap->signum > _SIG_MAXSIG)
17449104847fSDavid Xu 		return (EINVAL);
17459104847fSDavid Xu 
17469104847fSDavid Xu 	/*
17479104847fSDavid Xu 	 * Specification says sigqueue can only send signal to
17489104847fSDavid Xu 	 * single process.
17499104847fSDavid Xu 	 */
17509104847fSDavid Xu 	if (uap->pid <= 0)
17519104847fSDavid Xu 		return (EINVAL);
17529104847fSDavid Xu 
17539104847fSDavid Xu 	if ((p = pfind(uap->pid)) == NULL) {
17549104847fSDavid Xu 		if ((p = zpfind(uap->pid)) == NULL)
17559104847fSDavid Xu 			return (ESRCH);
17569104847fSDavid Xu 	}
17579104847fSDavid Xu 	error = p_cansignal(td, p, uap->signum);
17589104847fSDavid Xu 	if (error == 0 && uap->signum != 0) {
17599104847fSDavid Xu 		ksiginfo_init(&ksi);
17609104847fSDavid Xu 		ksi.ksi_signo = uap->signum;
17619104847fSDavid Xu 		ksi.ksi_code = SI_QUEUE;
17629104847fSDavid Xu 		ksi.ksi_pid = td->td_proc->p_pid;
17639104847fSDavid Xu 		ksi.ksi_uid = td->td_ucred->cr_ruid;
17648f0371f1SDavid Xu 		ksi.ksi_value.sival_ptr = uap->value;
17656d7b314bSDavid Xu 		error = tdsignal(p, NULL, ksi.ksi_signo, &ksi);
17669104847fSDavid Xu 	}
17679104847fSDavid Xu 	PROC_UNLOCK(p);
17689104847fSDavid Xu 	return (error);
17699104847fSDavid Xu }
17709104847fSDavid Xu 
1771df8bae1dSRodney W. Grimes /*
1772df8bae1dSRodney W. Grimes  * Send a signal to a process group.
1773df8bae1dSRodney W. Grimes  */
1774df8bae1dSRodney W. Grimes void
17752c42a146SMarcel Moolenaar gsignal(pgid, sig)
17762c42a146SMarcel Moolenaar 	int pgid, sig;
1777df8bae1dSRodney W. Grimes {
1778df8bae1dSRodney W. Grimes 	struct pgrp *pgrp;
1779df8bae1dSRodney W. Grimes 
1780f591779bSSeigo Tanimura 	if (pgid != 0) {
1781ba626c1dSJohn Baldwin 		sx_slock(&proctree_lock);
1782f591779bSSeigo Tanimura 		pgrp = pgfind(pgid);
1783ba626c1dSJohn Baldwin 		sx_sunlock(&proctree_lock);
1784f591779bSSeigo Tanimura 		if (pgrp != NULL) {
17852c42a146SMarcel Moolenaar 			pgsignal(pgrp, sig, 0);
1786f591779bSSeigo Tanimura 			PGRP_UNLOCK(pgrp);
1787f591779bSSeigo Tanimura 		}
1788f591779bSSeigo Tanimura 	}
1789df8bae1dSRodney W. Grimes }
1790df8bae1dSRodney W. Grimes 
1791df8bae1dSRodney W. Grimes /*
1792df8bae1dSRodney W. Grimes  * Send a signal to a process group.  If checktty is 1,
1793df8bae1dSRodney W. Grimes  * limit to members which have a controlling terminal.
1794df8bae1dSRodney W. Grimes  */
1795df8bae1dSRodney W. Grimes void
17962c42a146SMarcel Moolenaar pgsignal(pgrp, sig, checkctty)
1797df8bae1dSRodney W. Grimes 	struct pgrp *pgrp;
17982c42a146SMarcel Moolenaar 	int sig, checkctty;
1799df8bae1dSRodney W. Grimes {
1800df8bae1dSRodney W. Grimes 	register struct proc *p;
1801df8bae1dSRodney W. Grimes 
1802628d2653SJohn Baldwin 	if (pgrp) {
1803f591779bSSeigo Tanimura 		PGRP_LOCK_ASSERT(pgrp, MA_OWNED);
1804628d2653SJohn Baldwin 		LIST_FOREACH(p, &pgrp->pg_members, p_pglist) {
1805628d2653SJohn Baldwin 			PROC_LOCK(p);
1806df8bae1dSRodney W. Grimes 			if (checkctty == 0 || p->p_flag & P_CONTROLT)
18072c42a146SMarcel Moolenaar 				psignal(p, sig);
1808628d2653SJohn Baldwin 			PROC_UNLOCK(p);
1809628d2653SJohn Baldwin 		}
1810628d2653SJohn Baldwin 	}
1811df8bae1dSRodney W. Grimes }
1812df8bae1dSRodney W. Grimes 
1813df8bae1dSRodney W. Grimes /*
18140c14ff0eSRobert Watson  * Send a signal caused by a trap to the current thread.  If it will be
18150c14ff0eSRobert Watson  * caught immediately, deliver it with correct code.  Otherwise, post it
18160c14ff0eSRobert Watson  * normally.
1817df8bae1dSRodney W. Grimes  */
1818df8bae1dSRodney W. Grimes void
18199104847fSDavid Xu trapsignal(struct thread *td, ksiginfo_t *ksi)
1820df8bae1dSRodney W. Grimes {
18211bf4700bSJeff Roberson 	struct sigacts *ps;
18221bf4700bSJeff Roberson 	struct proc *p;
18239104847fSDavid Xu 	int sig;
18249104847fSDavid Xu 	int code;
18251bf4700bSJeff Roberson 
18261bf4700bSJeff Roberson 	p = td->td_proc;
18279104847fSDavid Xu 	sig = ksi->ksi_signo;
18289104847fSDavid Xu 	code = ksi->ksi_code;
18299104847fSDavid Xu 	KASSERT(_SIG_VALID(sig), ("invalid signal"));
18309104847fSDavid Xu 
1831628d2653SJohn Baldwin 	PROC_LOCK(p);
1832ef3dab76STim J. Robbins 	ps = p->p_sigacts;
183390af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
183490af4afaSJohn Baldwin 	if ((p->p_flag & P_TRACED) == 0 && SIGISMEMBER(ps->ps_sigcatch, sig) &&
18354093529dSJeff Roberson 	    !SIGISMEMBER(td->td_sigmask, sig)) {
18361c4bcd05SJeff Roberson 		td->td_ru.ru_nsignals++;
1837df8bae1dSRodney W. Grimes #ifdef KTRACE
1838374a15aaSJohn Baldwin 		if (KTRPOINT(curthread, KTR_PSIG))
1839374a15aaSJohn Baldwin 			ktrpsig(sig, ps->ps_sigact[_SIG_IDX(sig)],
18404093529dSJeff Roberson 			    &td->td_sigmask, code);
1841df8bae1dSRodney W. Grimes #endif
18429104847fSDavid Xu 		(*p->p_sysent->sv_sendsig)(ps->ps_sigact[_SIG_IDX(sig)],
18439104847fSDavid Xu 				ksi, &td->td_sigmask);
18444093529dSJeff Roberson 		SIGSETOR(td->td_sigmask, ps->ps_catchmask[_SIG_IDX(sig)]);
18452c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_signodefer, sig))
18464093529dSJeff Roberson 			SIGADDSET(td->td_sigmask, sig);
18472c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig)) {
1848289ccde0SPeter Wemm 			/*
18498f19eb88SIan Dowse 			 * See kern_sigaction() for origin of this code.
1850289ccde0SPeter Wemm 			 */
185190af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
18522c42a146SMarcel Moolenaar 			if (sig != SIGCONT &&
18532c42a146SMarcel Moolenaar 			    sigprop(sig) & SA_IGNORE)
185490af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
18552c42a146SMarcel Moolenaar 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
1856dedc04feSPeter Wemm 		}
185790af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
18586f841fb7SMarcel Moolenaar 	} else {
1859f71a882fSDavid Xu 		/*
1860f71a882fSDavid Xu 		 * Avoid a possible infinite loop if the thread
1861f71a882fSDavid Xu 		 * masking the signal or process is ignoring the
1862f71a882fSDavid Xu 		 * signal.
1863f71a882fSDavid Xu 		 */
1864f71a882fSDavid Xu 		if (kern_forcesigexit &&
1865f71a882fSDavid Xu 		    (SIGISMEMBER(td->td_sigmask, sig) ||
1866f71a882fSDavid Xu 		     ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN)) {
1867f71a882fSDavid Xu 			SIGDELSET(td->td_sigmask, sig);
1868f71a882fSDavid Xu 			SIGDELSET(ps->ps_sigcatch, sig);
1869f71a882fSDavid Xu 			SIGDELSET(ps->ps_sigignore, sig);
1870f71a882fSDavid Xu 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
1871f71a882fSDavid Xu 		}
187290af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
18736626c604SJulian Elischer 		p->p_code = code;	/* XXX for core dump/debugger */
18742c42a146SMarcel Moolenaar 		p->p_sig = sig;		/* XXX to verify code */
18756d7b314bSDavid Xu 		tdsignal(p, td, sig, ksi);
1876df8bae1dSRodney W. Grimes 	}
1877628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1878df8bae1dSRodney W. Grimes }
1879df8bae1dSRodney W. Grimes 
18804093529dSJeff Roberson static struct thread *
18814093529dSJeff Roberson sigtd(struct proc *p, int sig, int prop)
18824093529dSJeff Roberson {
18833074d1b4SDavid Xu 	struct thread *td, *signal_td;
18844093529dSJeff Roberson 
18854093529dSJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
18864093529dSJeff Roberson 
18874093529dSJeff Roberson 	/*
1888627451c1SDavid Xu 	 * Check if current thread can handle the signal without
1889627451c1SDavid Xu 	 * switching conetxt to another thread.
18904093529dSJeff Roberson 	 */
1891627451c1SDavid Xu 	if (curproc == p && !SIGISMEMBER(curthread->td_sigmask, sig))
1892627451c1SDavid Xu 		return (curthread);
18933074d1b4SDavid Xu 	signal_td = NULL;
18943074d1b4SDavid Xu 	FOREACH_THREAD_IN_PROC(p, td) {
18953074d1b4SDavid Xu 		if (!SIGISMEMBER(td->td_sigmask, sig)) {
18963074d1b4SDavid Xu 			signal_td = td;
1897627451c1SDavid Xu 			break;
18983074d1b4SDavid Xu 		}
18993074d1b4SDavid Xu 	}
19003074d1b4SDavid Xu 	if (signal_td == NULL)
19013074d1b4SDavid Xu 		signal_td = FIRST_THREAD_IN_PROC(p);
19023074d1b4SDavid Xu 	return (signal_td);
19034093529dSJeff Roberson }
19044093529dSJeff Roberson 
1905df8bae1dSRodney W. Grimes /*
1906df8bae1dSRodney W. Grimes  * Send the signal to the process.  If the signal has an action, the action
1907df8bae1dSRodney W. Grimes  * is usually performed by the target process rather than the caller; we add
1908df8bae1dSRodney W. Grimes  * the signal to the set of pending signals for the process.
1909df8bae1dSRodney W. Grimes  *
1910df8bae1dSRodney W. Grimes  * Exceptions:
1911df8bae1dSRodney W. Grimes  *   o When a stop signal is sent to a sleeping process that takes the
1912df8bae1dSRodney W. Grimes  *     default action, the process is stopped without awakening it.
1913df8bae1dSRodney W. Grimes  *   o SIGCONT restarts stopped processes (or puts them back to sleep)
1914df8bae1dSRodney W. Grimes  *     regardless of the signal action (eg, blocked or ignored).
1915df8bae1dSRodney W. Grimes  *
1916df8bae1dSRodney W. Grimes  * Other ignored signals are discarded immediately.
19174dec0e67SRobert Watson  *
19184dec0e67SRobert Watson  * NB: This function may be entered from the debugger via the "kill" DDB
19194dec0e67SRobert Watson  * command.  There is little that can be done to mitigate the possibly messy
19204dec0e67SRobert Watson  * side effects of this unwise possibility.
1921df8bae1dSRodney W. Grimes  */
1922df8bae1dSRodney W. Grimes void
19234093529dSJeff Roberson psignal(struct proc *p, int sig)
1924df8bae1dSRodney W. Grimes {
19256d7b314bSDavid Xu 	(void) tdsignal(p, NULL, sig, NULL);
19269104847fSDavid Xu }
19279104847fSDavid Xu 
19289104847fSDavid Xu int
19296d7b314bSDavid Xu psignal_event(struct proc *p, struct sigevent *sigev, ksiginfo_t *ksi)
19309104847fSDavid Xu {
19316d7b314bSDavid Xu 	struct thread *td = NULL;
193241b3077aSJacques Vidrine 
19334093529dSJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
19346d7b314bSDavid Xu 
19356d7b314bSDavid Xu 	KASSERT(!KSI_ONQ(ksi), ("psignal_event: ksi on queue"));
19364093529dSJeff Roberson 
19374093529dSJeff Roberson 	/*
19386d7b314bSDavid Xu 	 * ksi_code and other fields should be set before
19396d7b314bSDavid Xu 	 * calling this function.
19404093529dSJeff Roberson 	 */
19416d7b314bSDavid Xu 	ksi->ksi_signo = sigev->sigev_signo;
19426d7b314bSDavid Xu 	ksi->ksi_value = sigev->sigev_value;
19436d7b314bSDavid Xu 	if (sigev->sigev_notify == SIGEV_THREAD_ID) {
19446d7b314bSDavid Xu 		td = thread_find(p, sigev->sigev_notify_thread_id);
19456d7b314bSDavid Xu 		if (td == NULL)
19466d7b314bSDavid Xu 			return (ESRCH);
19476d7b314bSDavid Xu 	}
19486d7b314bSDavid Xu 	return (tdsignal(p, td, ksi->ksi_signo, ksi));
19494093529dSJeff Roberson }
19504093529dSJeff Roberson 
19519104847fSDavid Xu int
19526d7b314bSDavid Xu tdsignal(struct proc *p, struct thread *td, int sig, ksiginfo_t *ksi)
19534093529dSJeff Roberson {
19549104847fSDavid Xu 	sig_t action;
19559104847fSDavid Xu 	sigqueue_t *sigqueue;
19569104847fSDavid Xu 	int prop;
195790af4afaSJohn Baldwin 	struct sigacts *ps;
195894f0972bSDavid Xu 	int intrval;
19599104847fSDavid Xu 	int ret = 0;
1960da7bbd2cSJohn Baldwin 	int wakeup_swapper;
1961df8bae1dSRodney W. Grimes 
19626d7b314bSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
19636d7b314bSDavid Xu 
196441b3077aSJacques Vidrine 	if (!_SIG_VALID(sig))
1965d60226bdSXin LI 		panic("tdsignal(): invalid signal %d", sig);
19664093529dSJeff Roberson 
19678460a577SJohn Birrell 	KASSERT(ksi == NULL || !KSI_ONQ(ksi), ("tdsignal: ksi on queue"));
19686d7b314bSDavid Xu 
19696d7b314bSDavid Xu 	/*
19706d7b314bSDavid Xu 	 * IEEE Std 1003.1-2001: return success when killing a zombie.
19716d7b314bSDavid Xu 	 */
19726d7b314bSDavid Xu 	if (p->p_state == PRS_ZOMBIE) {
19736d7b314bSDavid Xu 		if (ksi && (ksi->ksi_flags & KSI_INS))
19746d7b314bSDavid Xu 			ksiginfo_tryfree(ksi);
19756d7b314bSDavid Xu 		return (ret);
19766d7b314bSDavid Xu 	}
19776d7b314bSDavid Xu 
197890af4afaSJohn Baldwin 	ps = p->p_sigacts;
1979ad3b9257SJohn-Mark Gurney 	KNOTE_LOCKED(&p->p_klist, NOTE_SIGNAL | sig);
19802c42a146SMarcel Moolenaar 	prop = sigprop(sig);
19814093529dSJeff Roberson 
19824093529dSJeff Roberson 	/*
198314b5ae1aSMike Makonnen 	 * If the signal is blocked and not destined for this thread, then
198414b5ae1aSMike Makonnen 	 * assign it to the process so that we can find it later in the first
198514b5ae1aSMike Makonnen 	 * thread that unblocks it.  Otherwise, assign it to this thread now.
19864093529dSJeff Roberson 	 */
19876d7b314bSDavid Xu 	if (td == NULL) {
19886d7b314bSDavid Xu 		td = sigtd(p, sig, prop);
19896d7b314bSDavid Xu 		if (SIGISMEMBER(td->td_sigmask, sig))
19906d7b314bSDavid Xu 			sigqueue = &p->p_sigqueue;
19916d7b314bSDavid Xu 		else
19929104847fSDavid Xu 			sigqueue = &td->td_sigqueue;
19933074d1b4SDavid Xu 	} else {
19946d7b314bSDavid Xu 		KASSERT(td->td_proc == p, ("invalid thread"));
19959104847fSDavid Xu 		sigqueue = &td->td_sigqueue;
19963074d1b4SDavid Xu 	}
19974093529dSJeff Roberson 
19985d217f17SJohn Birrell 	SDT_PROBE(proc, kernel, , signal_send, td, p, sig, 0, 0 );
19995d217f17SJohn Birrell 
2000df8bae1dSRodney W. Grimes 	/*
2001df8bae1dSRodney W. Grimes 	 * If the signal is being ignored,
2002df8bae1dSRodney W. Grimes 	 * then we forget about it immediately.
200390af4afaSJohn Baldwin 	 * (Note: we don't set SIGCONT in ps_sigignore,
2004df8bae1dSRodney W. Grimes 	 * and if it is set to SIG_IGN,
2005df8bae1dSRodney W. Grimes 	 * action will be SIG_DFL here.)
2006df8bae1dSRodney W. Grimes 	 */
200790af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
20080fc32899SJohn Baldwin 	if (SIGISMEMBER(ps->ps_sigignore, sig)) {
20095d217f17SJohn Birrell 		SDT_PROBE(proc, kernel, , signal_discard, ps, td, sig, 0, 0 );
20105d217f17SJohn Birrell 
201190af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
20126d7b314bSDavid Xu 		if (ksi && (ksi->ksi_flags & KSI_INS))
20136d7b314bSDavid Xu 			ksiginfo_tryfree(ksi);
20149104847fSDavid Xu 		return (ret);
201590af4afaSJohn Baldwin 	}
20166675b36eSDavid Xu 	if (SIGISMEMBER(td->td_sigmask, sig))
2017df8bae1dSRodney W. Grimes 		action = SIG_HOLD;
201890af4afaSJohn Baldwin 	else if (SIGISMEMBER(ps->ps_sigcatch, sig))
2019df8bae1dSRodney W. Grimes 		action = SIG_CATCH;
2020df8bae1dSRodney W. Grimes 	else
2021df8bae1dSRodney W. Grimes 		action = SIG_DFL;
202294f0972bSDavid Xu 	if (SIGISMEMBER(ps->ps_sigintr, sig))
202394f0972bSDavid Xu 		intrval = EINTR;
202494f0972bSDavid Xu 	else
202594f0972bSDavid Xu 		intrval = ERESTART;
202690af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
2027df8bae1dSRodney W. Grimes 
20289104847fSDavid Xu 	if (prop & SA_CONT)
20299104847fSDavid Xu 		sigqueue_delete_stopmask_proc(p);
20309104847fSDavid Xu 	else if (prop & SA_STOP) {
2031df8bae1dSRodney W. Grimes 		/*
2032df8bae1dSRodney W. Grimes 		 * If sending a tty stop signal to a member of an orphaned
2033df8bae1dSRodney W. Grimes 		 * process group, discard the signal here if the action
2034df8bae1dSRodney W. Grimes 		 * is default; don't stop the process below if sleeping,
2035df8bae1dSRodney W. Grimes 		 * and don't clear any pending SIGCONT.
2036df8bae1dSRodney W. Grimes 		 */
2037e602ba25SJulian Elischer 		if ((prop & SA_TTYSTOP) &&
2038e602ba25SJulian Elischer 		    (p->p_pgrp->pg_jobc == 0) &&
20396d7b314bSDavid Xu 		    (action == SIG_DFL)) {
20406d7b314bSDavid Xu 			if (ksi && (ksi->ksi_flags & KSI_INS))
20416d7b314bSDavid Xu 				ksiginfo_tryfree(ksi);
20429104847fSDavid Xu 			return (ret);
20436d7b314bSDavid Xu 		}
20449104847fSDavid Xu 		sigqueue_delete_proc(p, SIGCONT);
2045ebceaf6dSDavid Xu 		if (p->p_flag & P_CONTINUED) {
20466933e3c1SJulian Elischer 			p->p_flag &= ~P_CONTINUED;
2047ebceaf6dSDavid Xu 			PROC_LOCK(p->p_pptr);
2048ebceaf6dSDavid Xu 			sigqueue_take(p->p_ksi);
2049ebceaf6dSDavid Xu 			PROC_UNLOCK(p->p_pptr);
2050ebceaf6dSDavid Xu 		}
2051df8bae1dSRodney W. Grimes 	}
20523074d1b4SDavid Xu 
20539104847fSDavid Xu 	ret = sigqueue_add(sigqueue, sig, ksi);
20549104847fSDavid Xu 	if (ret != 0)
20559104847fSDavid Xu 		return (ret);
20566d7b314bSDavid Xu 	signotify(td);
20575312b1c7SDavid Xu 	/*
20585312b1c7SDavid Xu 	 * Defer further processing for signals which are held,
20595312b1c7SDavid Xu 	 * except that stopped processes must be continued by SIGCONT.
20605312b1c7SDavid Xu 	 */
20615312b1c7SDavid Xu 	if (action == SIG_HOLD &&
20625312b1c7SDavid Xu 	    !((prop & SA_CONT) && (p->p_flag & P_STOPPED_SIG)))
20639104847fSDavid Xu 		return (ret);
2064df8bae1dSRodney W. Grimes 	/*
206590d75f78SAlfred Perlstein 	 * SIGKILL: Remove procfs STOPEVENTs.
206690d75f78SAlfred Perlstein 	 */
206790d75f78SAlfred Perlstein 	if (sig == SIGKILL) {
206890d75f78SAlfred Perlstein 		/* from procfs_ioctl.c: PIOCBIC */
206990d75f78SAlfred Perlstein 		p->p_stops = 0;
207090d75f78SAlfred Perlstein 		/* from procfs_ioctl.c: PIOCCONT */
207190d75f78SAlfred Perlstein 		p->p_step = 0;
207290d75f78SAlfred Perlstein 		wakeup(&p->p_step);
207390d75f78SAlfred Perlstein 	}
207490d75f78SAlfred Perlstein 	/*
2075e602ba25SJulian Elischer 	 * Some signals have a process-wide effect and a per-thread
2076e602ba25SJulian Elischer 	 * component.  Most processing occurs when the process next
2077e602ba25SJulian Elischer 	 * tries to cross the user boundary, however there are some
2078e602ba25SJulian Elischer 	 * times when processing needs to be done immediatly, such as
2079e602ba25SJulian Elischer 	 * waking up threads so that they can cross the user boundary.
2080e602ba25SJulian Elischer 	 * We try do the per-process part here.
2081df8bae1dSRodney W. Grimes 	 */
2082e602ba25SJulian Elischer 	if (P_SHOULDSTOP(p)) {
2083e602ba25SJulian Elischer 		/*
2084e602ba25SJulian Elischer 		 * The process is in stopped mode. All the threads should be
2085e602ba25SJulian Elischer 		 * either winding down or already on the suspended queue.
2086e602ba25SJulian Elischer 		 */
2087e602ba25SJulian Elischer 		if (p->p_flag & P_TRACED) {
2088e602ba25SJulian Elischer 			/*
2089e602ba25SJulian Elischer 			 * The traced process is already stopped,
2090e602ba25SJulian Elischer 			 * so no further action is necessary.
2091e602ba25SJulian Elischer 			 * No signal can restart us.
2092e602ba25SJulian Elischer 			 */
2093e602ba25SJulian Elischer 			goto out;
20941c32c37cSJohn Baldwin 		}
2095b40ce416SJulian Elischer 
2096e602ba25SJulian Elischer 		if (sig == SIGKILL) {
2097df8bae1dSRodney W. Grimes 			/*
2098e602ba25SJulian Elischer 			 * SIGKILL sets process running.
2099e602ba25SJulian Elischer 			 * It will die elsewhere.
2100e602ba25SJulian Elischer 			 * All threads must be restarted.
2101df8bae1dSRodney W. Grimes 			 */
2102482d099cSDavid Xu 			p->p_flag &= ~P_STOPPED_SIG;
2103e602ba25SJulian Elischer 			goto runfast;
2104e602ba25SJulian Elischer 		}
2105e602ba25SJulian Elischer 
2106e602ba25SJulian Elischer 		if (prop & SA_CONT) {
2107e602ba25SJulian Elischer 			/*
2108e602ba25SJulian Elischer 			 * If SIGCONT is default (or ignored), we continue the
21099104847fSDavid Xu 			 * process but don't leave the signal in sigqueue as
21101d9c5696SJuli Mallett 			 * it has no further action.  If SIGCONT is held, we
2111e602ba25SJulian Elischer 			 * continue the process and leave the signal in
21129104847fSDavid Xu 			 * sigqueue.  If the process catches SIGCONT, let it
2113e602ba25SJulian Elischer 			 * handle the signal itself.  If it isn't waiting on
2114e602ba25SJulian Elischer 			 * an event, it goes back to run state.
2115e602ba25SJulian Elischer 			 * Otherwise, process goes back to sleep state.
2116e602ba25SJulian Elischer 			 */
21171279572aSDavid Xu 			p->p_flag &= ~P_STOPPED_SIG;
21187b4a950aSDavid Xu 			PROC_SLOCK(p);
2119ebceaf6dSDavid Xu 			if (p->p_numthreads == p->p_suspcount) {
21207b4a950aSDavid Xu 				PROC_SUNLOCK(p);
21216933e3c1SJulian Elischer 				p->p_flag |= P_CONTINUED;
21227f96995eSDavid Xu 				p->p_xstat = SIGCONT;
21237f96995eSDavid Xu 				PROC_LOCK(p->p_pptr);
2124ebceaf6dSDavid Xu 				childproc_continued(p);
21257f96995eSDavid Xu 				PROC_UNLOCK(p->p_pptr);
21267b4a950aSDavid Xu 				PROC_SLOCK(p);
2127ebceaf6dSDavid Xu 			}
2128e602ba25SJulian Elischer 			if (action == SIG_DFL) {
2129a54e85fdSJeff Roberson 				thread_unsuspend(p);
21307b4a950aSDavid Xu 				PROC_SUNLOCK(p);
21319104847fSDavid Xu 				sigqueue_delete(sigqueue, sig);
2132a54e85fdSJeff Roberson 				goto out;
2133a54e85fdSJeff Roberson 			}
2134a54e85fdSJeff Roberson 			if (action == SIG_CATCH) {
21358460a577SJohn Birrell 				/*
21368460a577SJohn Birrell 				 * The process wants to catch it so it needs
21378460a577SJohn Birrell 				 * to run at least one thread, but which one?
21388460a577SJohn Birrell 				 */
21397b4a950aSDavid Xu 				PROC_SUNLOCK(p);
2140e602ba25SJulian Elischer 				goto runfast;
2141e602ba25SJulian Elischer 			}
2142e602ba25SJulian Elischer 			/*
2143e602ba25SJulian Elischer 			 * The signal is not ignored or caught.
2144e602ba25SJulian Elischer 			 */
214504774f23SJulian Elischer 			thread_unsuspend(p);
21467b4a950aSDavid Xu 			PROC_SUNLOCK(p);
2147e602ba25SJulian Elischer 			goto out;
2148e602ba25SJulian Elischer 		}
2149e602ba25SJulian Elischer 
2150e602ba25SJulian Elischer 		if (prop & SA_STOP) {
2151e602ba25SJulian Elischer 			/*
2152e602ba25SJulian Elischer 			 * Already stopped, don't need to stop again
2153e602ba25SJulian Elischer 			 * (If we did the shell could get confused).
215404774f23SJulian Elischer 			 * Just make sure the signal STOP bit set.
2155e602ba25SJulian Elischer 			 */
21561279572aSDavid Xu 			p->p_flag |= P_STOPPED_SIG;
21579104847fSDavid Xu 			sigqueue_delete(sigqueue, sig);
2158e602ba25SJulian Elischer 			goto out;
2159e602ba25SJulian Elischer 		}
2160e602ba25SJulian Elischer 
2161e602ba25SJulian Elischer 		/*
2162e602ba25SJulian Elischer 		 * All other kinds of signals:
2163e602ba25SJulian Elischer 		 * If a thread is sleeping interruptibly, simulate a
2164e602ba25SJulian Elischer 		 * wakeup so that when it is continued it will be made
2165e602ba25SJulian Elischer 		 * runnable and can look at the signal.  However, don't make
216604774f23SJulian Elischer 		 * the PROCESS runnable, leave it stopped.
2167e602ba25SJulian Elischer 		 * It may run a bit until it hits a thread_suspend_check().
2168e602ba25SJulian Elischer 		 */
2169da7bbd2cSJohn Baldwin 		wakeup_swapper = 0;
21707b4a950aSDavid Xu 		PROC_SLOCK(p);
2171a54e85fdSJeff Roberson 		thread_lock(td);
217244f3b092SJohn Baldwin 		if (TD_ON_SLEEPQ(td) && (td->td_flags & TDF_SINTR))
2173da7bbd2cSJohn Baldwin 			wakeup_swapper = sleepq_abort(td, intrval);
2174a54e85fdSJeff Roberson 		thread_unlock(td);
21757b4a950aSDavid Xu 		PROC_SUNLOCK(p);
2176da7bbd2cSJohn Baldwin 		if (wakeup_swapper)
2177da7bbd2cSJohn Baldwin 			kick_proc0();
2178df8bae1dSRodney W. Grimes 		goto out;
2179df8bae1dSRodney W. Grimes 		/*
21809a6a4cb5SPeter Wemm 		 * Mutexes are short lived. Threads waiting on them will
21819a6a4cb5SPeter Wemm 		 * hit thread_suspend_check() soon.
2182df8bae1dSRodney W. Grimes 		 */
2183e602ba25SJulian Elischer 	} else if (p->p_state == PRS_NORMAL) {
2184ec8297bdSDavid Xu 		if (p->p_flag & P_TRACED || action == SIG_CATCH) {
218594f0972bSDavid Xu 			tdsigwakeup(td, sig, action, intrval);
2186df8bae1dSRodney W. Grimes 			goto out;
218704774f23SJulian Elischer 		}
2188ec8297bdSDavid Xu 
2189ec8297bdSDavid Xu 		MPASS(action == SIG_DFL);
2190ec8297bdSDavid Xu 
219135c32a76SDavid Xu 		if (prop & SA_STOP) {
2192374ae2a3SJeff Roberson 			if (p->p_flag & P_PPWAIT)
219335c32a76SDavid Xu 				goto out;
2194e574e444SDavid Xu 			p->p_flag |= P_STOPPED_SIG;
2195e574e444SDavid Xu 			p->p_xstat = sig;
21967b4a950aSDavid Xu 			PROC_SLOCK(p);
2197d8267df7SDavid Xu 			sig_suspend_threads(td, p, 1);
21984093529dSJeff Roberson 			if (p->p_numthreads == p->p_suspcount) {
2199ebceaf6dSDavid Xu 				/*
2200ebceaf6dSDavid Xu 				 * only thread sending signal to another
2201ebceaf6dSDavid Xu 				 * process can reach here, if thread is sending
2202ebceaf6dSDavid Xu 				 * signal to its process, because thread does
2203ebceaf6dSDavid Xu 				 * not suspend itself here, p_numthreads
2204ebceaf6dSDavid Xu 				 * should never be equal to p_suspcount.
2205ebceaf6dSDavid Xu 				 */
2206ebceaf6dSDavid Xu 				thread_stopped(p);
22077b4a950aSDavid Xu 				PROC_SUNLOCK(p);
22089104847fSDavid Xu 				sigqueue_delete_proc(p, p->p_xstat);
22097b4a950aSDavid Xu 			} else
22107b4a950aSDavid Xu 				PROC_SUNLOCK(p);
221135c32a76SDavid Xu 			goto out;
221235c32a76SDavid Xu 		}
2213e602ba25SJulian Elischer 	} else {
2214e602ba25SJulian Elischer 		/* Not in "NORMAL" state. discard the signal. */
22159104847fSDavid Xu 		sigqueue_delete(sigqueue, sig);
2216e602ba25SJulian Elischer 		goto out;
2217e602ba25SJulian Elischer 	}
2218e602ba25SJulian Elischer 
2219b40ce416SJulian Elischer 	/*
2220e602ba25SJulian Elischer 	 * The process is not stopped so we need to apply the signal to all the
2221e602ba25SJulian Elischer 	 * running threads.
2222b40ce416SJulian Elischer 	 */
2223e602ba25SJulian Elischer runfast:
222494f0972bSDavid Xu 	tdsigwakeup(td, sig, action, intrval);
22257b4a950aSDavid Xu 	PROC_SLOCK(p);
2226e602ba25SJulian Elischer 	thread_unsuspend(p);
22277b4a950aSDavid Xu 	PROC_SUNLOCK(p);
2228e602ba25SJulian Elischer out:
22297b4a950aSDavid Xu 	/* If we jump here, proc slock should not be owned. */
22307b4a950aSDavid Xu 	PROC_SLOCK_ASSERT(p, MA_NOTOWNED);
22319104847fSDavid Xu 	return (ret);
2232e602ba25SJulian Elischer }
2233e602ba25SJulian Elischer 
2234e602ba25SJulian Elischer /*
2235e602ba25SJulian Elischer  * The force of a signal has been directed against a single
2236e602ba25SJulian Elischer  * thread.  We need to see what we can do about knocking it
2237e602ba25SJulian Elischer  * out of any sleep it may be in etc.
2238e602ba25SJulian Elischer  */
2239e602ba25SJulian Elischer static void
224094f0972bSDavid Xu tdsigwakeup(struct thread *td, int sig, sig_t action, int intrval)
2241e602ba25SJulian Elischer {
2242e602ba25SJulian Elischer 	struct proc *p = td->td_proc;
2243e602ba25SJulian Elischer 	register int prop;
2244da7bbd2cSJohn Baldwin 	int wakeup_swapper;
2245e602ba25SJulian Elischer 
2246da7bbd2cSJohn Baldwin 	wakeup_swapper = 0;
22478b94a061SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2248e602ba25SJulian Elischer 	prop = sigprop(sig);
2249a4c2da15SBruce Evans 
22507b4a950aSDavid Xu 	PROC_SLOCK(p);
2251374ae2a3SJeff Roberson 	thread_lock(td);
2252e602ba25SJulian Elischer 	/*
2253aa0fa334SJulian Elischer 	 * Bring the priority of a thread up if we want it to get
2254e602ba25SJulian Elischer 	 * killed in this lifetime.
2255e602ba25SJulian Elischer 	 */
22566eeb364bSJeff Roberson 	if (action == SIG_DFL && (prop & SA_KILL) && td->td_priority > PUSER)
2257b3a4fb14SDavid Xu 		sched_prio(td, PUSER);
225880c4433cSJohn Baldwin 	if (TD_ON_SLEEPQ(td)) {
2259e602ba25SJulian Elischer 		/*
2260e602ba25SJulian Elischer 		 * If thread is sleeping uninterruptibly
2261e602ba25SJulian Elischer 		 * we can't interrupt the sleep... the signal will
2262e602ba25SJulian Elischer 		 * be noticed when the process returns through
2263e602ba25SJulian Elischer 		 * trap() or syscall().
2264e602ba25SJulian Elischer 		 */
226544f3b092SJohn Baldwin 		if ((td->td_flags & TDF_SINTR) == 0)
2266374ae2a3SJeff Roberson 			goto out;
2267e602ba25SJulian Elischer 		/*
2268e602ba25SJulian Elischer 		 * If SIGCONT is default (or ignored) and process is
2269e602ba25SJulian Elischer 		 * asleep, we are finished; the process should not
2270e602ba25SJulian Elischer 		 * be awakened.
2271df8bae1dSRodney W. Grimes 		 */
2272e602ba25SJulian Elischer 		if ((prop & SA_CONT) && action == SIG_DFL) {
2273a54e85fdSJeff Roberson 			thread_unlock(td);
22747b4a950aSDavid Xu 			PROC_SUNLOCK(p);
22759104847fSDavid Xu 			sigqueue_delete(&p->p_sigqueue, sig);
22764093529dSJeff Roberson 			/*
22774093529dSJeff Roberson 			 * It may be on either list in this state.
22784093529dSJeff Roberson 			 * Remove from both for now.
22794093529dSJeff Roberson 			 */
22809104847fSDavid Xu 			sigqueue_delete(&td->td_sigqueue, sig);
2281aa0fa334SJulian Elischer 			return;
2282df8bae1dSRodney W. Grimes 		}
2283df8bae1dSRodney W. Grimes 
2284aa0fa334SJulian Elischer 		/*
2285a4c2da15SBruce Evans 		 * Give low priority threads a better chance to run.
2286aa0fa334SJulian Elischer 		 */
228744f3b092SJohn Baldwin 		if (td->td_priority > PUSER)
2288b3a4fb14SDavid Xu 			sched_prio(td, PUSER);
2289ec8297bdSDavid Xu 
2290da7bbd2cSJohn Baldwin 		wakeup_swapper = sleepq_abort(td, intrval);
2291a4c2da15SBruce Evans 	} else {
2292df8bae1dSRodney W. Grimes 		/*
2293a4c2da15SBruce Evans 		 * Other states do nothing with the signal immediately,
2294df8bae1dSRodney W. Grimes 		 * other than kicking ourselves if we are running.
2295df8bae1dSRodney W. Grimes 		 * It will either never be noticed, or noticed very soon.
2296df8bae1dSRodney W. Grimes 		 */
2297a4c2da15SBruce Evans #ifdef SMP
229844f3b092SJohn Baldwin 		if (TD_IS_RUNNING(td) && td != curthread)
2299e602ba25SJulian Elischer 			forward_signal(td);
23003163861cSTor Egge #endif
23016caa8a15SJohn Baldwin 	}
2302374ae2a3SJeff Roberson out:
23037b4a950aSDavid Xu 	PROC_SUNLOCK(p);
2304374ae2a3SJeff Roberson 	thread_unlock(td);
2305da7bbd2cSJohn Baldwin 	if (wakeup_swapper)
2306da7bbd2cSJohn Baldwin 		kick_proc0();
2307a4c2da15SBruce Evans }
2308df8bae1dSRodney W. Grimes 
2309d8267df7SDavid Xu static void
2310d8267df7SDavid Xu sig_suspend_threads(struct thread *td, struct proc *p, int sending)
2311d8267df7SDavid Xu {
2312d8267df7SDavid Xu 	struct thread *td2;
2313d8267df7SDavid Xu 
2314d8267df7SDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
23157b4a950aSDavid Xu 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2316d8267df7SDavid Xu 
2317d8267df7SDavid Xu 	FOREACH_THREAD_IN_PROC(p, td2) {
2318a54e85fdSJeff Roberson 		thread_lock(td2);
2319b7edba77SJeff Roberson 		td2->td_flags |= TDF_ASTPENDING | TDF_NEEDSUSPCHK;
2320d8267df7SDavid Xu 		if ((TD_IS_SLEEPING(td2) || TD_IS_SWAPPED(td2)) &&
2321d8267df7SDavid Xu 		    (td2->td_flags & TDF_SINTR) &&
2322d8267df7SDavid Xu 		    !TD_IS_SUSPENDED(td2)) {
2323d8267df7SDavid Xu 			thread_suspend_one(td2);
2324d8267df7SDavid Xu 		} else {
2325d8267df7SDavid Xu 			if (sending || td != td2)
2326d8267df7SDavid Xu 				td2->td_flags |= TDF_ASTPENDING;
2327d8267df7SDavid Xu #ifdef SMP
2328d8267df7SDavid Xu 			if (TD_IS_RUNNING(td2) && td2 != td)
2329d8267df7SDavid Xu 				forward_signal(td2);
2330d8267df7SDavid Xu #endif
2331d8267df7SDavid Xu 		}
2332a54e85fdSJeff Roberson 		thread_unlock(td2);
2333d8267df7SDavid Xu 	}
2334d8267df7SDavid Xu }
2335d8267df7SDavid Xu 
2336cbf4e354SDavid Xu int
23374cc9f52fSRobert Drehmel ptracestop(struct thread *td, int sig)
23384cc9f52fSRobert Drehmel {
23394cc9f52fSRobert Drehmel 	struct proc *p = td->td_proc;
23404cc9f52fSRobert Drehmel 
234130a9f26dSRobert Watson 	PROC_LOCK_ASSERT(p, MA_OWNED);
23424cc9f52fSRobert Drehmel 	WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK,
2343aa89d8cdSJohn Baldwin 	    &p->p_mtx.lock_object, "Stopping for traced signal");
23444cc9f52fSRobert Drehmel 
2345904c5ec4SDavid Xu 	td->td_dbgflags |= TDB_XSIG;
2346cbf4e354SDavid Xu 	td->td_xsig = sig;
23477b4a950aSDavid Xu 	PROC_SLOCK(p);
2348904c5ec4SDavid Xu 	while ((p->p_flag & P_TRACED) && (td->td_dbgflags & TDB_XSIG)) {
2349cbf4e354SDavid Xu 		if (p->p_flag & P_SINGLE_EXIT) {
2350904c5ec4SDavid Xu 			td->td_dbgflags &= ~TDB_XSIG;
23517b4a950aSDavid Xu 			PROC_SUNLOCK(p);
2352cbf4e354SDavid Xu 			return (sig);
2353cbf4e354SDavid Xu 		}
2354cbf4e354SDavid Xu 		/*
2355cbf4e354SDavid Xu 		 * Just make wait() to work, the last stopped thread
2356cbf4e354SDavid Xu 		 * will win.
2357cbf4e354SDavid Xu 		 */
2358cbf4e354SDavid Xu 		p->p_xstat = sig;
2359cbf4e354SDavid Xu 		p->p_xthread = td;
2360cbf4e354SDavid Xu 		p->p_flag |= (P_STOPPED_SIG|P_STOPPED_TRACE);
2361d8267df7SDavid Xu 		sig_suspend_threads(td, p, 0);
2362cbf4e354SDavid Xu stopme:
2363a54e85fdSJeff Roberson 		thread_suspend_switch(td);
2364a54e85fdSJeff Roberson 		if (!(p->p_flag & P_TRACED)) {
2365cbf4e354SDavid Xu 			break;
2366a54e85fdSJeff Roberson 		}
2367904c5ec4SDavid Xu 		if (td->td_dbgflags & TDB_SUSPEND) {
2368cbf4e354SDavid Xu 			if (p->p_flag & P_SINGLE_EXIT)
2369cbf4e354SDavid Xu 				break;
2370cbf4e354SDavid Xu 			goto stopme;
2371cbf4e354SDavid Xu 		}
2372cbf4e354SDavid Xu 	}
23737b4a950aSDavid Xu 	PROC_SUNLOCK(p);
2374cbf4e354SDavid Xu 	return (td->td_xsig);
23754cc9f52fSRobert Drehmel }
23764cc9f52fSRobert Drehmel 
2377df8bae1dSRodney W. Grimes /*
2378df8bae1dSRodney W. Grimes  * If the current process has received a signal (should be caught or cause
2379df8bae1dSRodney W. Grimes  * termination, should interrupt current syscall), return the signal number.
2380df8bae1dSRodney W. Grimes  * Stop signals with default action are processed immediately, then cleared;
2381df8bae1dSRodney W. Grimes  * they aren't returned.  This is checked after each entry to the system for
2382df8bae1dSRodney W. Grimes  * a syscall or trap (though this can usually be done without calling issignal
2383628855e7SJulian Elischer  * by checking the pending signal masks in cursig.) The normal call
2384df8bae1dSRodney W. Grimes  * sequence is
2385df8bae1dSRodney W. Grimes  *
2386e602ba25SJulian Elischer  *	while (sig = cursig(curthread))
23872c42a146SMarcel Moolenaar  *		postsig(sig);
2388df8bae1dSRodney W. Grimes  */
23896711f10fSJohn Baldwin static int
2390e602ba25SJulian Elischer issignal(td)
2391e602ba25SJulian Elischer 	struct thread *td;
2392df8bae1dSRodney W. Grimes {
2393e602ba25SJulian Elischer 	struct proc *p;
239490af4afaSJohn Baldwin 	struct sigacts *ps;
23954093529dSJeff Roberson 	sigset_t sigpending;
2396cbf4e354SDavid Xu 	int sig, prop, newsig;
2397df8bae1dSRodney W. Grimes 
2398e602ba25SJulian Elischer 	p = td->td_proc;
239990af4afaSJohn Baldwin 	ps = p->p_sigacts;
240090af4afaSJohn Baldwin 	mtx_assert(&ps->ps_mtx, MA_OWNED);
2401628d2653SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2402df8bae1dSRodney W. Grimes 	for (;;) {
24032a024a2bSSean Eric Fagan 		int traced = (p->p_flag & P_TRACED) || (p->p_stops & S_SIG);
24042a024a2bSSean Eric Fagan 
24059104847fSDavid Xu 		sigpending = td->td_sigqueue.sq_signals;
24064093529dSJeff Roberson 		SIGSETNAND(sigpending, td->td_sigmask);
24074093529dSJeff Roberson 
2408df8bae1dSRodney W. Grimes 		if (p->p_flag & P_PPWAIT)
24094093529dSJeff Roberson 			SIG_STOPSIGMASK(sigpending);
24104093529dSJeff Roberson 		if (SIGISEMPTY(sigpending))	/* no signal to send */
2411df8bae1dSRodney W. Grimes 			return (0);
24124093529dSJeff Roberson 		sig = sig_ffs(&sigpending);
24132a024a2bSSean Eric Fagan 
2414047aa39bSRobert Watson 		if (p->p_stops & S_SIG) {
2415047aa39bSRobert Watson 			mtx_unlock(&ps->ps_mtx);
2416047aa39bSRobert Watson 			stopevent(p, S_SIG, sig);
2417047aa39bSRobert Watson 			mtx_lock(&ps->ps_mtx);
2418047aa39bSRobert Watson 		}
24192a024a2bSSean Eric Fagan 
2420df8bae1dSRodney W. Grimes 		/*
2421df8bae1dSRodney W. Grimes 		 * We should see pending but ignored signals
2422df8bae1dSRodney W. Grimes 		 * only if P_TRACED was on when they were posted.
2423df8bae1dSRodney W. Grimes 		 */
242490af4afaSJohn Baldwin 		if (SIGISMEMBER(ps->ps_sigignore, sig) && (traced == 0)) {
24259104847fSDavid Xu 			sigqueue_delete(&td->td_sigqueue, sig);
2426df8bae1dSRodney W. Grimes 			continue;
2427df8bae1dSRodney W. Grimes 		}
2428df8bae1dSRodney W. Grimes 		if (p->p_flag & P_TRACED && (p->p_flag & P_PPWAIT) == 0) {
2429df8bae1dSRodney W. Grimes 			/*
2430d8f4f6a4SJonathan Mini 			 * If traced, always stop.
2431df8bae1dSRodney W. Grimes 			 */
243290af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
2433cbf4e354SDavid Xu 			newsig = ptracestop(td, sig);
243490af4afaSJohn Baldwin 			mtx_lock(&ps->ps_mtx);
2435df8bae1dSRodney W. Grimes 
24369104847fSDavid Xu 			if (sig != newsig) {
2437413cf3bbSDavid Xu 				ksiginfo_t ksi;
24389104847fSDavid Xu 				/*
24399104847fSDavid Xu 				 * clear old signal.
24409104847fSDavid Xu 				 * XXX shrug off debugger, it causes siginfo to
24419104847fSDavid Xu 				 * be thrown away.
24429104847fSDavid Xu 				 */
2443413cf3bbSDavid Xu 				sigqueue_get(&td->td_sigqueue, sig, &ksi);
24449104847fSDavid Xu 
2445df8bae1dSRodney W. Grimes 				/*
2446df8bae1dSRodney W. Grimes 				 * If parent wants us to take the signal,
2447df8bae1dSRodney W. Grimes 				 * then it will leave it in p->p_xstat;
2448df8bae1dSRodney W. Grimes 				 * otherwise we just look for signals again.
2449df8bae1dSRodney W. Grimes 			 	*/
2450cbf4e354SDavid Xu 				if (newsig == 0)
2451df8bae1dSRodney W. Grimes 					continue;
2452cbf4e354SDavid Xu 				sig = newsig;
24539104847fSDavid Xu 
24549104847fSDavid Xu 				/*
24559104847fSDavid Xu 				 * Put the new signal into td_sigqueue. If the
24569104847fSDavid Xu 				 * signal is being masked, look for other signals.
24579104847fSDavid Xu 				 */
24589104847fSDavid Xu 				SIGADDSET(td->td_sigqueue.sq_signals, sig);
24599104847fSDavid Xu 				if (SIGISMEMBER(td->td_sigmask, sig))
24609104847fSDavid Xu 					continue;
24619104847fSDavid Xu 				signotify(td);
24629104847fSDavid Xu 			}
24639104847fSDavid Xu 
2464df8bae1dSRodney W. Grimes 			/*
24658d542cb5SDavid E. O'Brien 			 * If the traced bit got turned off, go back up
24668d542cb5SDavid E. O'Brien 			 * to the top to rescan signals.  This ensures
24678d542cb5SDavid E. O'Brien 			 * that p_sig* and p_sigact are consistent.
24688d542cb5SDavid E. O'Brien 			 */
24698d542cb5SDavid E. O'Brien 			if ((p->p_flag & P_TRACED) == 0)
24708d542cb5SDavid E. O'Brien 				continue;
2471df8bae1dSRodney W. Grimes 		}
2472df8bae1dSRodney W. Grimes 
24738d542cb5SDavid E. O'Brien 		prop = sigprop(sig);
24748d542cb5SDavid E. O'Brien 
2475df8bae1dSRodney W. Grimes 		/*
2476df8bae1dSRodney W. Grimes 		 * Decide whether the signal should be returned.
2477df8bae1dSRodney W. Grimes 		 * Return the signal's number, or fall through
2478df8bae1dSRodney W. Grimes 		 * to clear it from the pending mask.
2479df8bae1dSRodney W. Grimes 		 */
2480d321df47SPoul-Henning Kamp 		switch ((intptr_t)p->p_sigacts->ps_sigact[_SIG_IDX(sig)]) {
2481df8bae1dSRodney W. Grimes 
2482d321df47SPoul-Henning Kamp 		case (intptr_t)SIG_DFL:
2483df8bae1dSRodney W. Grimes 			/*
2484df8bae1dSRodney W. Grimes 			 * Don't take default actions on system processes.
2485df8bae1dSRodney W. Grimes 			 */
2486df8bae1dSRodney W. Grimes 			if (p->p_pid <= 1) {
2487df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
2488df8bae1dSRodney W. Grimes 				/*
2489df8bae1dSRodney W. Grimes 				 * Are you sure you want to ignore SIGSEGV
2490df8bae1dSRodney W. Grimes 				 * in init? XXX
2491df8bae1dSRodney W. Grimes 				 */
2492d93f860cSPoul-Henning Kamp 				printf("Process (pid %lu) got signal %d\n",
24932c42a146SMarcel Moolenaar 					(u_long)p->p_pid, sig);
2494df8bae1dSRodney W. Grimes #endif
2495df8bae1dSRodney W. Grimes 				break;		/* == ignore */
2496df8bae1dSRodney W. Grimes 			}
2497df8bae1dSRodney W. Grimes 			/*
2498df8bae1dSRodney W. Grimes 			 * If there is a pending stop signal to process
2499df8bae1dSRodney W. Grimes 			 * with default action, stop here,
2500df8bae1dSRodney W. Grimes 			 * then clear the signal.  However,
2501df8bae1dSRodney W. Grimes 			 * if process is member of an orphaned
2502df8bae1dSRodney W. Grimes 			 * process group, ignore tty stop signals.
2503df8bae1dSRodney W. Grimes 			 */
2504df8bae1dSRodney W. Grimes 			if (prop & SA_STOP) {
2505df8bae1dSRodney W. Grimes 				if (p->p_flag & P_TRACED ||
2506df8bae1dSRodney W. Grimes 		    		    (p->p_pgrp->pg_jobc == 0 &&
2507df8bae1dSRodney W. Grimes 				     prop & SA_TTYSTOP))
2508df8bae1dSRodney W. Grimes 					break;	/* == ignore */
250990af4afaSJohn Baldwin 				mtx_unlock(&ps->ps_mtx);
251090af4afaSJohn Baldwin 				WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK,
2511aa89d8cdSJohn Baldwin 				    &p->p_mtx.lock_object, "Catching SIGSTOP");
2512e574e444SDavid Xu 				p->p_flag |= P_STOPPED_SIG;
25132c42a146SMarcel Moolenaar 				p->p_xstat = sig;
25147b4a950aSDavid Xu 				PROC_SLOCK(p);
2515d8267df7SDavid Xu 				sig_suspend_threads(td, p, 0);
2516a54e85fdSJeff Roberson 				thread_suspend_switch(td);
25177b4a950aSDavid Xu 				PROC_SUNLOCK(p);
251890af4afaSJohn Baldwin 				mtx_lock(&ps->ps_mtx);
2519df8bae1dSRodney W. Grimes 				break;
252021b68415SDavid E. O'Brien 			} else if (prop & SA_IGNORE) {
2521df8bae1dSRodney W. Grimes 				/*
2522df8bae1dSRodney W. Grimes 				 * Except for SIGCONT, shouldn't get here.
2523df8bae1dSRodney W. Grimes 				 * Default action is to ignore; drop it.
2524df8bae1dSRodney W. Grimes 				 */
2525df8bae1dSRodney W. Grimes 				break;		/* == ignore */
2526df8bae1dSRodney W. Grimes 			} else
25272c42a146SMarcel Moolenaar 				return (sig);
2528df8bae1dSRodney W. Grimes 			/*NOTREACHED*/
2529df8bae1dSRodney W. Grimes 
2530d321df47SPoul-Henning Kamp 		case (intptr_t)SIG_IGN:
2531df8bae1dSRodney W. Grimes 			/*
2532df8bae1dSRodney W. Grimes 			 * Masking above should prevent us ever trying
2533df8bae1dSRodney W. Grimes 			 * to take action on an ignored signal other
2534df8bae1dSRodney W. Grimes 			 * than SIGCONT, unless process is traced.
2535df8bae1dSRodney W. Grimes 			 */
2536df8bae1dSRodney W. Grimes 			if ((prop & SA_CONT) == 0 &&
2537df8bae1dSRodney W. Grimes 			    (p->p_flag & P_TRACED) == 0)
2538df8bae1dSRodney W. Grimes 				printf("issignal\n");
2539df8bae1dSRodney W. Grimes 			break;		/* == ignore */
2540df8bae1dSRodney W. Grimes 
2541df8bae1dSRodney W. Grimes 		default:
2542df8bae1dSRodney W. Grimes 			/*
2543df8bae1dSRodney W. Grimes 			 * This signal has an action, let
2544df8bae1dSRodney W. Grimes 			 * postsig() process it.
2545df8bae1dSRodney W. Grimes 			 */
25462c42a146SMarcel Moolenaar 			return (sig);
2547df8bae1dSRodney W. Grimes 		}
25489104847fSDavid Xu 		sigqueue_delete(&td->td_sigqueue, sig);		/* take the signal! */
2549df8bae1dSRodney W. Grimes 	}
2550df8bae1dSRodney W. Grimes 	/* NOTREACHED */
2551df8bae1dSRodney W. Grimes }
2552df8bae1dSRodney W. Grimes 
2553e574e444SDavid Xu void
2554e574e444SDavid Xu thread_stopped(struct proc *p)
2555e574e444SDavid Xu {
2556e574e444SDavid Xu 	int n;
2557e574e444SDavid Xu 
2558e574e444SDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
25597b4a950aSDavid Xu 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2560e574e444SDavid Xu 	n = p->p_suspcount;
25617c9a98f1SDavid Xu 	if (p == curproc)
2562e574e444SDavid Xu 		n++;
2563e574e444SDavid Xu 	if ((p->p_flag & P_STOPPED_SIG) && (n == p->p_numthreads)) {
25647b4a950aSDavid Xu 		PROC_SUNLOCK(p);
2565407948a5SDavid Xu 		p->p_flag &= ~P_WAITED;
2566e574e444SDavid Xu 		PROC_LOCK(p->p_pptr);
25677f96995eSDavid Xu 		childproc_stopped(p, (p->p_flag & P_TRACED) ?
2568ebceaf6dSDavid Xu 			CLD_TRAPPED : CLD_STOPPED);
2569e574e444SDavid Xu 		PROC_UNLOCK(p->p_pptr);
25707b4a950aSDavid Xu 		PROC_SLOCK(p);
2571e574e444SDavid Xu 	}
2572e574e444SDavid Xu }
2573e574e444SDavid Xu 
2574df8bae1dSRodney W. Grimes /*
2575df8bae1dSRodney W. Grimes  * Take the action for the specified signal
2576df8bae1dSRodney W. Grimes  * from the current set of pending signals.
2577df8bae1dSRodney W. Grimes  */
2578df8bae1dSRodney W. Grimes void
25792c42a146SMarcel Moolenaar postsig(sig)
25802c42a146SMarcel Moolenaar 	register int sig;
2581df8bae1dSRodney W. Grimes {
2582b40ce416SJulian Elischer 	struct thread *td = curthread;
2583b40ce416SJulian Elischer 	register struct proc *p = td->td_proc;
2584628d2653SJohn Baldwin 	struct sigacts *ps;
25852c42a146SMarcel Moolenaar 	sig_t action;
25869104847fSDavid Xu 	ksiginfo_t ksi;
25872c42a146SMarcel Moolenaar 	sigset_t returnmask;
2588df8bae1dSRodney W. Grimes 
25892c42a146SMarcel Moolenaar 	KASSERT(sig != 0, ("postsig"));
25905526d2d9SEivind Eklund 
25912ad7d304SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2592628d2653SJohn Baldwin 	ps = p->p_sigacts;
259390af4afaSJohn Baldwin 	mtx_assert(&ps->ps_mtx, MA_OWNED);
25945da49fcbSDavid Xu 	ksiginfo_init(&ksi);
25959104847fSDavid Xu 	sigqueue_get(&td->td_sigqueue, sig, &ksi);
25969104847fSDavid Xu 	ksi.ksi_signo = sig;
259756c06c4bSDavid Xu 	if (ksi.ksi_code == SI_TIMER)
259856c06c4bSDavid Xu 		itimer_accept(p, ksi.ksi_timerid, &ksi);
25992c42a146SMarcel Moolenaar 	action = ps->ps_sigact[_SIG_IDX(sig)];
2600df8bae1dSRodney W. Grimes #ifdef KTRACE
2601374a15aaSJohn Baldwin 	if (KTRPOINT(td, KTR_PSIG))
26025e26dcb5SJohn Baldwin 		ktrpsig(sig, action, td->td_pflags & TDP_OLDMASK ?
26034093529dSJeff Roberson 		    &td->td_oldsigmask : &td->td_sigmask, 0);
2604df8bae1dSRodney W. Grimes #endif
2605047aa39bSRobert Watson 	if (p->p_stops & S_SIG) {
2606047aa39bSRobert Watson 		mtx_unlock(&ps->ps_mtx);
2607047aa39bSRobert Watson 		stopevent(p, S_SIG, sig);
2608047aa39bSRobert Watson 		mtx_lock(&ps->ps_mtx);
2609047aa39bSRobert Watson 	}
26102a024a2bSSean Eric Fagan 
26118460a577SJohn Birrell 	if (action == SIG_DFL) {
2612df8bae1dSRodney W. Grimes 		/*
2613df8bae1dSRodney W. Grimes 		 * Default action, where the default is to kill
2614df8bae1dSRodney W. Grimes 		 * the process.  (Other cases were ignored above.)
2615df8bae1dSRodney W. Grimes 		 */
261690af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
2617b40ce416SJulian Elischer 		sigexit(td, sig);
2618df8bae1dSRodney W. Grimes 		/* NOTREACHED */
2619df8bae1dSRodney W. Grimes 	} else {
2620df8bae1dSRodney W. Grimes 		/*
2621df8bae1dSRodney W. Grimes 		 * If we get here, the signal must be caught.
2622df8bae1dSRodney W. Grimes 		 */
26234093529dSJeff Roberson 		KASSERT(action != SIG_IGN && !SIGISMEMBER(td->td_sigmask, sig),
26245526d2d9SEivind Eklund 		    ("postsig action"));
2625df8bae1dSRodney W. Grimes 		/*
2626df8bae1dSRodney W. Grimes 		 * Set the new mask value and also defer further
2627645682fdSLuoqi Chen 		 * occurrences of this signal.
2628df8bae1dSRodney W. Grimes 		 *
2629645682fdSLuoqi Chen 		 * Special case: user has done a sigsuspend.  Here the
2630df8bae1dSRodney W. Grimes 		 * current mask is not of interest, but rather the
2631645682fdSLuoqi Chen 		 * mask from before the sigsuspend is what we want
2632df8bae1dSRodney W. Grimes 		 * restored after the signal processing is completed.
2633df8bae1dSRodney W. Grimes 		 */
26345e26dcb5SJohn Baldwin 		if (td->td_pflags & TDP_OLDMASK) {
26354093529dSJeff Roberson 			returnmask = td->td_oldsigmask;
26365e26dcb5SJohn Baldwin 			td->td_pflags &= ~TDP_OLDMASK;
2637df8bae1dSRodney W. Grimes 		} else
26384093529dSJeff Roberson 			returnmask = td->td_sigmask;
26392c42a146SMarcel Moolenaar 
26404093529dSJeff Roberson 		SIGSETOR(td->td_sigmask, ps->ps_catchmask[_SIG_IDX(sig)]);
26412c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_signodefer, sig))
26424093529dSJeff Roberson 			SIGADDSET(td->td_sigmask, sig);
26432c42a146SMarcel Moolenaar 
26442c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig)) {
2645289ccde0SPeter Wemm 			/*
26468f19eb88SIan Dowse 			 * See kern_sigaction() for origin of this code.
2647289ccde0SPeter Wemm 			 */
264890af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
26492c42a146SMarcel Moolenaar 			if (sig != SIGCONT &&
26502c42a146SMarcel Moolenaar 			    sigprop(sig) & SA_IGNORE)
265190af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
26522c42a146SMarcel Moolenaar 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
2653dedc04feSPeter Wemm 		}
26541c4bcd05SJeff Roberson 		td->td_ru.ru_nsignals++;
2655c90c9021SEd Schouten 		if (p->p_sig == sig) {
26566626c604SJulian Elischer 			p->p_code = 0;
26576626c604SJulian Elischer 			p->p_sig = 0;
2658df8bae1dSRodney W. Grimes 		}
26599104847fSDavid Xu 		(*p->p_sysent->sv_sendsig)(action, &ksi, &returnmask);
2660df8bae1dSRodney W. Grimes 	}
2661df8bae1dSRodney W. Grimes }
2662df8bae1dSRodney W. Grimes 
2663df8bae1dSRodney W. Grimes /*
2664df8bae1dSRodney W. Grimes  * Kill the current process for stated reason.
2665df8bae1dSRodney W. Grimes  */
266626f9a767SRodney W. Grimes void
2667df8bae1dSRodney W. Grimes killproc(p, why)
2668df8bae1dSRodney W. Grimes 	struct proc *p;
2669df8bae1dSRodney W. Grimes 	char *why;
2670df8bae1dSRodney W. Grimes {
26719081e5e8SJohn Baldwin 
26729081e5e8SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
26730384fff8SJason Evans 	CTR3(KTR_PROC, "killproc: proc %p (pid %d, %s)",
26740384fff8SJason Evans 		p, p->p_pid, p->p_comm);
2675729b1e51SDavid Greenman 	log(LOG_ERR, "pid %d (%s), uid %d, was killed: %s\n", p->p_pid, p->p_comm,
2676b1fc0ec1SRobert Watson 		p->p_ucred ? p->p_ucred->cr_uid : -1, why);
2677df8bae1dSRodney W. Grimes 	psignal(p, SIGKILL);
2678df8bae1dSRodney W. Grimes }
2679df8bae1dSRodney W. Grimes 
2680df8bae1dSRodney W. Grimes /*
2681df8bae1dSRodney W. Grimes  * Force the current process to exit with the specified signal, dumping core
2682df8bae1dSRodney W. Grimes  * if appropriate.  We bypass the normal tests for masked and caught signals,
2683df8bae1dSRodney W. Grimes  * allowing unrecoverable failures to terminate the process without changing
2684df8bae1dSRodney W. Grimes  * signal state.  Mark the accounting record with the signal termination.
2685df8bae1dSRodney W. Grimes  * If dumping core, save the signal number for the debugger.  Calls exit and
2686df8bae1dSRodney W. Grimes  * does not return.
2687df8bae1dSRodney W. Grimes  */
268826f9a767SRodney W. Grimes void
2689b40ce416SJulian Elischer sigexit(td, sig)
2690b40ce416SJulian Elischer 	struct thread *td;
26912c42a146SMarcel Moolenaar 	int sig;
2692df8bae1dSRodney W. Grimes {
2693b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
2694df8bae1dSRodney W. Grimes 
2695628d2653SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2696df8bae1dSRodney W. Grimes 	p->p_acflag |= AXSIG;
2697f97c3df1SDavid Schultz 	/*
2698f97c3df1SDavid Schultz 	 * We must be single-threading to generate a core dump.  This
2699f97c3df1SDavid Schultz 	 * ensures that the registers in the core file are up-to-date.
2700f97c3df1SDavid Schultz 	 * Also, the ELF dump handler assumes that the thread list doesn't
2701f97c3df1SDavid Schultz 	 * change out from under it.
2702f97c3df1SDavid Schultz 	 *
2703f97c3df1SDavid Schultz 	 * XXX If another thread attempts to single-thread before us
2704f97c3df1SDavid Schultz 	 *     (e.g. via fork()), we won't get a dump at all.
2705f97c3df1SDavid Schultz 	 */
2706f97c3df1SDavid Schultz 	if ((sigprop(sig) & SA_CORE) && (thread_single(SINGLE_NO_EXIT) == 0)) {
27072c42a146SMarcel Moolenaar 		p->p_sig = sig;
2708c364e17eSAndrey A. Chernov 		/*
2709c364e17eSAndrey A. Chernov 		 * Log signals which would cause core dumps
2710c364e17eSAndrey A. Chernov 		 * (Log as LOG_INFO to appease those who don't want
2711c364e17eSAndrey A. Chernov 		 * these messages.)
2712c364e17eSAndrey A. Chernov 		 * XXX : Todo, as well as euid, write out ruid too
27134ae89b95SJohn Baldwin 		 * Note that coredump() drops proc lock.
2714c364e17eSAndrey A. Chernov 		 */
2715b40ce416SJulian Elischer 		if (coredump(td) == 0)
27162c42a146SMarcel Moolenaar 			sig |= WCOREFLAG;
271757308494SJoerg Wunsch 		if (kern_logsigexit)
271857308494SJoerg Wunsch 			log(LOG_INFO,
271957308494SJoerg Wunsch 			    "pid %d (%s), uid %d: exited on signal %d%s\n",
27203d1b21c6SAndrey A. Chernov 			    p->p_pid, p->p_comm,
27219c1ab3e0SJohn Baldwin 			    td->td_ucred ? td->td_ucred->cr_uid : -1,
27222c42a146SMarcel Moolenaar 			    sig &~ WCOREFLAG,
27232c42a146SMarcel Moolenaar 			    sig & WCOREFLAG ? " (core dumped)" : "");
27244ae89b95SJohn Baldwin 	} else
2725628d2653SJohn Baldwin 		PROC_UNLOCK(p);
2726b40ce416SJulian Elischer 	exit1(td, W_EXITCODE(0, sig));
2727df8bae1dSRodney W. Grimes 	/* NOTREACHED */
2728df8bae1dSRodney W. Grimes }
2729df8bae1dSRodney W. Grimes 
2730ebceaf6dSDavid Xu /*
27317f96995eSDavid Xu  * Send queued SIGCHLD to parent when child process's state
27327f96995eSDavid Xu  * is changed.
2733ebceaf6dSDavid Xu  */
27347f96995eSDavid Xu static void
27357f96995eSDavid Xu sigparent(struct proc *p, int reason, int status)
2736ebceaf6dSDavid Xu {
2737ebceaf6dSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
2738ebceaf6dSDavid Xu 	PROC_LOCK_ASSERT(p->p_pptr, MA_OWNED);
2739ebceaf6dSDavid Xu 
2740ebceaf6dSDavid Xu 	if (p->p_ksi != NULL) {
2741ebceaf6dSDavid Xu 		p->p_ksi->ksi_signo  = SIGCHLD;
2742ebceaf6dSDavid Xu 		p->p_ksi->ksi_code   = reason;
27437f96995eSDavid Xu 		p->p_ksi->ksi_status = status;
2744ebceaf6dSDavid Xu 		p->p_ksi->ksi_pid    = p->p_pid;
2745ebceaf6dSDavid Xu 		p->p_ksi->ksi_uid    = p->p_ucred->cr_ruid;
2746ebceaf6dSDavid Xu 		if (KSI_ONQ(p->p_ksi))
2747ebceaf6dSDavid Xu 			return;
2748ebceaf6dSDavid Xu 	}
2749ebceaf6dSDavid Xu 	tdsignal(p->p_pptr, NULL, SIGCHLD, p->p_ksi);
2750ebceaf6dSDavid Xu }
2751ebceaf6dSDavid Xu 
27527f96995eSDavid Xu static void
27537f96995eSDavid Xu childproc_jobstate(struct proc *p, int reason, int status)
27547f96995eSDavid Xu {
27557f96995eSDavid Xu 	struct sigacts *ps;
27567f96995eSDavid Xu 
27577f96995eSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
27587f96995eSDavid Xu 	PROC_LOCK_ASSERT(p->p_pptr, MA_OWNED);
27597f96995eSDavid Xu 
27607f96995eSDavid Xu 	/*
27617f96995eSDavid Xu 	 * Wake up parent sleeping in kern_wait(), also send
27627f96995eSDavid Xu 	 * SIGCHLD to parent, but SIGCHLD does not guarantee
27637f96995eSDavid Xu 	 * that parent will awake, because parent may masked
27647f96995eSDavid Xu 	 * the signal.
27657f96995eSDavid Xu 	 */
27667f96995eSDavid Xu 	p->p_pptr->p_flag |= P_STATCHILD;
27677f96995eSDavid Xu 	wakeup(p->p_pptr);
27687f96995eSDavid Xu 
27697f96995eSDavid Xu 	ps = p->p_pptr->p_sigacts;
27707f96995eSDavid Xu 	mtx_lock(&ps->ps_mtx);
27717f96995eSDavid Xu 	if ((ps->ps_flag & PS_NOCLDSTOP) == 0) {
27727f96995eSDavid Xu 		mtx_unlock(&ps->ps_mtx);
27737f96995eSDavid Xu 		sigparent(p, reason, status);
27747f96995eSDavid Xu 	} else
27757f96995eSDavid Xu 		mtx_unlock(&ps->ps_mtx);
27767f96995eSDavid Xu }
27777f96995eSDavid Xu 
27787f96995eSDavid Xu void
27797f96995eSDavid Xu childproc_stopped(struct proc *p, int reason)
27807f96995eSDavid Xu {
27817f96995eSDavid Xu 	childproc_jobstate(p, reason, p->p_xstat);
27827f96995eSDavid Xu }
27837f96995eSDavid Xu 
2784ebceaf6dSDavid Xu void
2785ebceaf6dSDavid Xu childproc_continued(struct proc *p)
2786ebceaf6dSDavid Xu {
27877f96995eSDavid Xu 	childproc_jobstate(p, CLD_CONTINUED, SIGCONT);
2788ebceaf6dSDavid Xu }
2789ebceaf6dSDavid Xu 
2790ebceaf6dSDavid Xu void
2791ebceaf6dSDavid Xu childproc_exited(struct proc *p)
2792ebceaf6dSDavid Xu {
2793ebceaf6dSDavid Xu 	int reason;
2794f4d85223SDavid Xu 	int status = p->p_xstat; /* convert to int */
2795ebceaf6dSDavid Xu 
2796ebceaf6dSDavid Xu 	reason = CLD_EXITED;
2797f4d85223SDavid Xu 	if (WCOREDUMP(status))
2798ebceaf6dSDavid Xu 		reason = CLD_DUMPED;
2799f4d85223SDavid Xu 	else if (WIFSIGNALED(status))
2800ebceaf6dSDavid Xu 		reason = CLD_KILLED;
28017f96995eSDavid Xu 	/*
28027f96995eSDavid Xu 	 * XXX avoid calling wakeup(p->p_pptr), the work is
28037f96995eSDavid Xu 	 * done in exit1().
28047f96995eSDavid Xu 	 */
28057f96995eSDavid Xu 	sigparent(p, reason, status);
2806ebceaf6dSDavid Xu }
2807ebceaf6dSDavid Xu 
28086d1ab6edSWarner Losh static char corefilename[MAXPATHLEN] = {"%N.core"};
2809c5edb423SSean Eric Fagan SYSCTL_STRING(_kern, OID_AUTO, corefile, CTLFLAG_RW, corefilename,
2810c5edb423SSean Eric Fagan 	      sizeof(corefilename), "process corefile name format string");
2811c5edb423SSean Eric Fagan 
2812c5edb423SSean Eric Fagan /*
2813c5edb423SSean Eric Fagan  * expand_name(name, uid, pid)
2814c5edb423SSean Eric Fagan  * Expand the name described in corefilename, using name, uid, and pid.
2815c5edb423SSean Eric Fagan  * corefilename is a printf-like string, with three format specifiers:
2816c5edb423SSean Eric Fagan  *	%N	name of process ("name")
2817c5edb423SSean Eric Fagan  *	%P	process id (pid)
2818c5edb423SSean Eric Fagan  *	%U	user id (uid)
2819c5edb423SSean Eric Fagan  * For example, "%N.core" is the default; they can be disabled completely
2820c5edb423SSean Eric Fagan  * by using "/dev/null", or all core files can be stored in "/cores/%U/%N-%P".
2821c5edb423SSean Eric Fagan  * This is controlled by the sysctl variable kern.corefile (see above).
2822c5edb423SSean Eric Fagan  */
2823fca666a1SJulian Elischer static char *
2824c5edb423SSean Eric Fagan expand_name(name, uid, pid)
28258b43b535SAlfred Perlstein 	const char *name;
28268b43b535SAlfred Perlstein 	uid_t uid;
28278b43b535SAlfred Perlstein 	pid_t pid;
28288b43b535SAlfred Perlstein {
282936b208e0SRobert Watson 	struct sbuf sb;
283036b208e0SRobert Watson 	const char *format;
2831c5edb423SSean Eric Fagan 	char *temp;
283236b208e0SRobert Watson 	size_t i;
2833c5edb423SSean Eric Fagan 
28348b43b535SAlfred Perlstein 	format = corefilename;
28358b43b535SAlfred Perlstein 	temp = malloc(MAXPATHLEN, M_TEMP, M_NOWAIT | M_ZERO);
28360bfe2990SEivind Eklund 	if (temp == NULL)
28378b43b535SAlfred Perlstein 		return (NULL);
283836b208e0SRobert Watson 	(void)sbuf_new(&sb, temp, MAXPATHLEN, SBUF_FIXEDLEN);
283936b208e0SRobert Watson 	for (i = 0; format[i]; i++) {
2840c5edb423SSean Eric Fagan 		switch (format[i]) {
2841c5edb423SSean Eric Fagan 		case '%':	/* Format character */
2842c5edb423SSean Eric Fagan 			i++;
2843c5edb423SSean Eric Fagan 			switch (format[i]) {
2844c5edb423SSean Eric Fagan 			case '%':
284536b208e0SRobert Watson 				sbuf_putc(&sb, '%');
2846c5edb423SSean Eric Fagan 				break;
2847c5edb423SSean Eric Fagan 			case 'N':	/* process name */
284836b208e0SRobert Watson 				sbuf_printf(&sb, "%s", name);
2849c5edb423SSean Eric Fagan 				break;
2850c5edb423SSean Eric Fagan 			case 'P':	/* process id */
285136b208e0SRobert Watson 				sbuf_printf(&sb, "%u", pid);
2852c5edb423SSean Eric Fagan 				break;
2853c5edb423SSean Eric Fagan 			case 'U':	/* user id */
285436b208e0SRobert Watson 				sbuf_printf(&sb, "%u", uid);
2855c5edb423SSean Eric Fagan 				break;
2856c5edb423SSean Eric Fagan 			default:
28578b43b535SAlfred Perlstein 			  	log(LOG_ERR,
285836b208e0SRobert Watson 				    "Unknown format character %c in "
285936b208e0SRobert Watson 				    "corename `%s'\n", format[i], format);
2860c5edb423SSean Eric Fagan 			}
2861c5edb423SSean Eric Fagan 			break;
2862c5edb423SSean Eric Fagan 		default:
286336b208e0SRobert Watson 			sbuf_putc(&sb, format[i]);
2864c5edb423SSean Eric Fagan 		}
2865c5edb423SSean Eric Fagan 	}
286636b208e0SRobert Watson 	if (sbuf_overflowed(&sb)) {
286736b208e0SRobert Watson 		sbuf_delete(&sb);
286836b208e0SRobert Watson 		log(LOG_ERR, "pid %ld (%s), uid (%lu): corename is too "
286936b208e0SRobert Watson 		    "long\n", (long)pid, name, (u_long)uid);
28708b43b535SAlfred Perlstein 		free(temp, M_TEMP);
28718b43b535SAlfred Perlstein 		return (NULL);
2872c5edb423SSean Eric Fagan 	}
287336b208e0SRobert Watson 	sbuf_finish(&sb);
287436b208e0SRobert Watson 	sbuf_delete(&sb);
287536b208e0SRobert Watson 	return (temp);
287636b208e0SRobert Watson }
2877c5edb423SSean Eric Fagan 
2878df8bae1dSRodney W. Grimes /*
2879fca666a1SJulian Elischer  * Dump a process' core.  The main routine does some
2880fca666a1SJulian Elischer  * policy checking, and creates the name of the coredump;
2881fca666a1SJulian Elischer  * then it passes on a vnode and a size limit to the process-specific
2882fca666a1SJulian Elischer  * coredump routine if there is one; if there _is not_ one, it returns
2883fca666a1SJulian Elischer  * ENOSYS; otherwise it returns the error from the process-specific routine.
2884fca666a1SJulian Elischer  */
2885fca666a1SJulian Elischer 
2886fca666a1SJulian Elischer static int
2887b40ce416SJulian Elischer coredump(struct thread *td)
2888fca666a1SJulian Elischer {
2889b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
2890fca666a1SJulian Elischer 	register struct vnode *vp;
28919c1ab3e0SJohn Baldwin 	register struct ucred *cred = td->td_ucred;
289206ae1e91SMatthew Dillon 	struct flock lf;
2893fca666a1SJulian Elischer 	struct nameidata nd;
2894fca666a1SJulian Elischer 	struct vattr vattr;
2895c447f5b2SRobert Watson 	int error, error1, flags, locked;
2896f2a2857bSKirk McKusick 	struct mount *mp;
2897fca666a1SJulian Elischer 	char *name;			/* name of corefile */
2898fca666a1SJulian Elischer 	off_t limit;
289933f19beeSJohn Baldwin 	int vfslocked;
2900fca666a1SJulian Elischer 
29014ae89b95SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2902f97c3df1SDavid Schultz 	MPASS((p->p_flag & P_HADTHREADS) == 0 || p->p_singlethread == td);
2903628d2653SJohn Baldwin 	_STOPEVENT(p, S_CORE, 0);
2904fca666a1SJulian Elischer 
290557274c51SChristian S.J. Peron 	name = expand_name(p->p_comm, td->td_ucred->cr_uid, p->p_pid);
290657274c51SChristian S.J. Peron 	if (name == NULL) {
2907eeccc367SRobert Watson 		PROC_UNLOCK(p);
290857274c51SChristian S.J. Peron #ifdef AUDIT
290957274c51SChristian S.J. Peron 		audit_proc_coredump(td, NULL, EINVAL);
291057274c51SChristian S.J. Peron #endif
291157274c51SChristian S.J. Peron 		return (EINVAL);
291257274c51SChristian S.J. Peron 	}
2913628d2653SJohn Baldwin 	if (((sugid_coredump == 0) && p->p_flag & P_SUGID) || do_coredump == 0) {
2914628d2653SJohn Baldwin 		PROC_UNLOCK(p);
291557274c51SChristian S.J. Peron #ifdef AUDIT
291657274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, EFAULT);
291757274c51SChristian S.J. Peron #endif
291857274c51SChristian S.J. Peron 		free(name, M_TEMP);
2919fca666a1SJulian Elischer 		return (EFAULT);
2920628d2653SJohn Baldwin 	}
2921fca666a1SJulian Elischer 
2922fca666a1SJulian Elischer 	/*
292335a2598fSSean Eric Fagan 	 * Note that the bulk of limit checking is done after
292435a2598fSSean Eric Fagan 	 * the corefile is created.  The exception is if the limit
292535a2598fSSean Eric Fagan 	 * for corefiles is 0, in which case we don't bother
292635a2598fSSean Eric Fagan 	 * creating the corefile at all.  This layout means that
292735a2598fSSean Eric Fagan 	 * a corefile is truncated instead of not being created,
292835a2598fSSean Eric Fagan 	 * if it is larger than the limit.
2929fca666a1SJulian Elischer 	 */
293091d5354aSJohn Baldwin 	limit = (off_t)lim_cur(p, RLIMIT_CORE);
2931628d2653SJohn Baldwin 	PROC_UNLOCK(p);
293257274c51SChristian S.J. Peron 	if (limit == 0) {
293357274c51SChristian S.J. Peron #ifdef AUDIT
293457274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, EFBIG);
293557274c51SChristian S.J. Peron #endif
293657274c51SChristian S.J. Peron 		free(name, M_TEMP);
293791d5354aSJohn Baldwin 		return (EFBIG);
293857274c51SChristian S.J. Peron 	}
293935a2598fSSean Eric Fagan 
2940f2a2857bSKirk McKusick restart:
294133f19beeSJohn Baldwin 	NDINIT(&nd, LOOKUP, NOFOLLOW | MPSAFE, UIO_SYSSPACE, name, td);
2942e6796b67SKirk McKusick 	flags = O_CREAT | FWRITE | O_NOFOLLOW;
29439e223287SKonstantin Belousov 	error = vn_open(&nd, &flags, S_IRUSR | S_IWUSR, NULL);
294457274c51SChristian S.J. Peron 	if (error) {
294557274c51SChristian S.J. Peron #ifdef AUDIT
294657274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, error);
294757274c51SChristian S.J. Peron #endif
2948fca666a1SJulian Elischer 		free(name, M_TEMP);
2949fca666a1SJulian Elischer 		return (error);
295057274c51SChristian S.J. Peron 	}
295133f19beeSJohn Baldwin 	vfslocked = NDHASGIANT(&nd);
2952762e6b85SEivind Eklund 	NDFREE(&nd, NDF_ONLY_PNBUF);
2953fca666a1SJulian Elischer 	vp = nd.ni_vp;
295406ae1e91SMatthew Dillon 
2955832dafadSDon Lewis 	/* Don't dump to non-regular files or files with links. */
2956832dafadSDon Lewis 	if (vp->v_type != VREG ||
29570359a12eSAttilio Rao 	    VOP_GETATTR(vp, &vattr, cred) || vattr.va_nlink != 1) {
295822db15c0SAttilio Rao 		VOP_UNLOCK(vp, 0);
2959832dafadSDon Lewis 		error = EFAULT;
296033f19beeSJohn Baldwin 		goto close;
2961832dafadSDon Lewis 	}
2962832dafadSDon Lewis 
296322db15c0SAttilio Rao 	VOP_UNLOCK(vp, 0);
296406ae1e91SMatthew Dillon 	lf.l_whence = SEEK_SET;
296506ae1e91SMatthew Dillon 	lf.l_start = 0;
296606ae1e91SMatthew Dillon 	lf.l_len = 0;
296706ae1e91SMatthew Dillon 	lf.l_type = F_WRLCK;
2968c447f5b2SRobert Watson 	locked = (VOP_ADVLOCK(vp, (caddr_t)p, F_SETLK, &lf, F_FLOCK) == 0);
296906ae1e91SMatthew Dillon 
297006ae1e91SMatthew Dillon 	if (vn_start_write(vp, &mp, V_NOWAIT) != 0) {
297106ae1e91SMatthew Dillon 		lf.l_type = F_UNLCK;
297236bbf86bSRobert Watson 		if (locked)
297306ae1e91SMatthew Dillon 			VOP_ADVLOCK(vp, (caddr_t)p, F_UNLCK, &lf, F_FLOCK);
2974b40ce416SJulian Elischer 		if ((error = vn_close(vp, FWRITE, cred, td)) != 0)
297533f19beeSJohn Baldwin 			goto out;
2976f2a2857bSKirk McKusick 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
297733f19beeSJohn Baldwin 			goto out;
297833f19beeSJohn Baldwin 		VFS_UNLOCK_GIANT(vfslocked);
2979f2a2857bSKirk McKusick 		goto restart;
2980f2a2857bSKirk McKusick 	}
2981fca666a1SJulian Elischer 
2982fca666a1SJulian Elischer 	VATTR_NULL(&vattr);
2983fca666a1SJulian Elischer 	vattr.va_size = 0;
29846141e04aSJohn-Mark Gurney 	if (set_core_nodump_flag)
29856141e04aSJohn-Mark Gurney 		vattr.va_flags = UF_NODUMP;
2986cb05b60aSAttilio Rao 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
2987b40ce416SJulian Elischer 	VOP_LEASE(vp, td, cred, LEASE_WRITE);
29880359a12eSAttilio Rao 	VOP_SETATTR(vp, &vattr, cred);
298922db15c0SAttilio Rao 	VOP_UNLOCK(vp, 0);
299011991ab4STor Egge 	vn_finished_write(mp);
2991628d2653SJohn Baldwin 	PROC_LOCK(p);
2992fca666a1SJulian Elischer 	p->p_acflag |= ACORE;
2993628d2653SJohn Baldwin 	PROC_UNLOCK(p);
2994fca666a1SJulian Elischer 
2995fca666a1SJulian Elischer 	error = p->p_sysent->sv_coredump ?
2996b40ce416SJulian Elischer 	  p->p_sysent->sv_coredump(td, vp, limit) :
2997fca666a1SJulian Elischer 	  ENOSYS;
2998fca666a1SJulian Elischer 
2999c447f5b2SRobert Watson 	if (locked) {
300006ae1e91SMatthew Dillon 		lf.l_type = F_UNLCK;
300106ae1e91SMatthew Dillon 		VOP_ADVLOCK(vp, (caddr_t)p, F_UNLCK, &lf, F_FLOCK);
3002c447f5b2SRobert Watson 	}
300333f19beeSJohn Baldwin close:
3004b40ce416SJulian Elischer 	error1 = vn_close(vp, FWRITE, cred, td);
3005fca666a1SJulian Elischer 	if (error == 0)
3006fca666a1SJulian Elischer 		error = error1;
300733f19beeSJohn Baldwin out:
300857274c51SChristian S.J. Peron #ifdef AUDIT
300957274c51SChristian S.J. Peron 	audit_proc_coredump(td, name, error);
301057274c51SChristian S.J. Peron #endif
301157274c51SChristian S.J. Peron 	free(name, M_TEMP);
301233f19beeSJohn Baldwin 	VFS_UNLOCK_GIANT(vfslocked);
3013fca666a1SJulian Elischer 	return (error);
3014fca666a1SJulian Elischer }
3015fca666a1SJulian Elischer 
3016fca666a1SJulian Elischer /*
30170c14ff0eSRobert Watson  * Nonexistent system call-- signal process (may want to handle it).  Flag
30180c14ff0eSRobert Watson  * error in case process won't see signal immediately (blocked or ignored).
3019df8bae1dSRodney W. Grimes  */
3020d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
3021df8bae1dSRodney W. Grimes struct nosys_args {
3022df8bae1dSRodney W. Grimes 	int	dummy;
3023df8bae1dSRodney W. Grimes };
3024d2d3e875SBruce Evans #endif
3025df8bae1dSRodney W. Grimes /* ARGSUSED */
302626f9a767SRodney W. Grimes int
3027b40ce416SJulian Elischer nosys(td, args)
3028b40ce416SJulian Elischer 	struct thread *td;
3029df8bae1dSRodney W. Grimes 	struct nosys_args *args;
3030df8bae1dSRodney W. Grimes {
3031b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
3032b40ce416SJulian Elischer 
3033628d2653SJohn Baldwin 	PROC_LOCK(p);
3034df8bae1dSRodney W. Grimes 	psignal(p, SIGSYS);
3035628d2653SJohn Baldwin 	PROC_UNLOCK(p);
3036f5216b9aSBruce Evans 	return (ENOSYS);
3037df8bae1dSRodney W. Grimes }
3038831d27a9SDon Lewis 
3039831d27a9SDon Lewis /*
30400c14ff0eSRobert Watson  * Send a SIGIO or SIGURG signal to a process or process group using stored
30410c14ff0eSRobert Watson  * credentials rather than those of the current process.
3042831d27a9SDon Lewis  */
3043831d27a9SDon Lewis void
3044f1320723SAlfred Perlstein pgsigio(sigiop, sig, checkctty)
3045f1320723SAlfred Perlstein 	struct sigio **sigiop;
30462c42a146SMarcel Moolenaar 	int sig, checkctty;
3047831d27a9SDon Lewis {
3048f1320723SAlfred Perlstein 	struct sigio *sigio;
3049831d27a9SDon Lewis 
3050f1320723SAlfred Perlstein 	SIGIO_LOCK();
3051f1320723SAlfred Perlstein 	sigio = *sigiop;
3052f1320723SAlfred Perlstein 	if (sigio == NULL) {
3053f1320723SAlfred Perlstein 		SIGIO_UNLOCK();
3054f1320723SAlfred Perlstein 		return;
3055f1320723SAlfred Perlstein 	}
3056831d27a9SDon Lewis 	if (sigio->sio_pgid > 0) {
3057628d2653SJohn Baldwin 		PROC_LOCK(sigio->sio_proc);
30582b87b6d4SRobert Watson 		if (CANSIGIO(sigio->sio_ucred, sigio->sio_proc->p_ucred))
30592c42a146SMarcel Moolenaar 			psignal(sigio->sio_proc, sig);
3060628d2653SJohn Baldwin 		PROC_UNLOCK(sigio->sio_proc);
3061831d27a9SDon Lewis 	} else if (sigio->sio_pgid < 0) {
3062831d27a9SDon Lewis 		struct proc *p;
3063831d27a9SDon Lewis 
3064f591779bSSeigo Tanimura 		PGRP_LOCK(sigio->sio_pgrp);
3065628d2653SJohn Baldwin 		LIST_FOREACH(p, &sigio->sio_pgrp->pg_members, p_pglist) {
3066628d2653SJohn Baldwin 			PROC_LOCK(p);
30672b87b6d4SRobert Watson 			if (CANSIGIO(sigio->sio_ucred, p->p_ucred) &&
3068831d27a9SDon Lewis 			    (checkctty == 0 || (p->p_flag & P_CONTROLT)))
30692c42a146SMarcel Moolenaar 				psignal(p, sig);
3070628d2653SJohn Baldwin 			PROC_UNLOCK(p);
3071628d2653SJohn Baldwin 		}
3072f591779bSSeigo Tanimura 		PGRP_UNLOCK(sigio->sio_pgrp);
3073831d27a9SDon Lewis 	}
3074f1320723SAlfred Perlstein 	SIGIO_UNLOCK();
3075831d27a9SDon Lewis }
3076cb679c38SJonathan Lemon 
3077cb679c38SJonathan Lemon static int
3078cb679c38SJonathan Lemon filt_sigattach(struct knote *kn)
3079cb679c38SJonathan Lemon {
3080cb679c38SJonathan Lemon 	struct proc *p = curproc;
3081cb679c38SJonathan Lemon 
3082cb679c38SJonathan Lemon 	kn->kn_ptr.p_proc = p;
3083cb679c38SJonathan Lemon 	kn->kn_flags |= EV_CLEAR;		/* automatically set */
3084cb679c38SJonathan Lemon 
3085ad3b9257SJohn-Mark Gurney 	knlist_add(&p->p_klist, kn, 0);
3086cb679c38SJonathan Lemon 
3087cb679c38SJonathan Lemon 	return (0);
3088cb679c38SJonathan Lemon }
3089cb679c38SJonathan Lemon 
3090cb679c38SJonathan Lemon static void
3091cb679c38SJonathan Lemon filt_sigdetach(struct knote *kn)
3092cb679c38SJonathan Lemon {
3093cb679c38SJonathan Lemon 	struct proc *p = kn->kn_ptr.p_proc;
3094cb679c38SJonathan Lemon 
3095ad3b9257SJohn-Mark Gurney 	knlist_remove(&p->p_klist, kn, 0);
3096cb679c38SJonathan Lemon }
3097cb679c38SJonathan Lemon 
3098cb679c38SJonathan Lemon /*
3099cb679c38SJonathan Lemon  * signal knotes are shared with proc knotes, so we apply a mask to
3100cb679c38SJonathan Lemon  * the hint in order to differentiate them from process hints.  This
3101cb679c38SJonathan Lemon  * could be avoided by using a signal-specific knote list, but probably
3102cb679c38SJonathan Lemon  * isn't worth the trouble.
3103cb679c38SJonathan Lemon  */
3104cb679c38SJonathan Lemon static int
3105cb679c38SJonathan Lemon filt_signal(struct knote *kn, long hint)
3106cb679c38SJonathan Lemon {
3107cb679c38SJonathan Lemon 
3108cb679c38SJonathan Lemon 	if (hint & NOTE_SIGNAL) {
3109cb679c38SJonathan Lemon 		hint &= ~NOTE_SIGNAL;
3110cb679c38SJonathan Lemon 
3111cb679c38SJonathan Lemon 		if (kn->kn_id == hint)
3112cb679c38SJonathan Lemon 			kn->kn_data++;
3113cb679c38SJonathan Lemon 	}
3114cb679c38SJonathan Lemon 	return (kn->kn_data != 0);
3115cb679c38SJonathan Lemon }
311690af4afaSJohn Baldwin 
311790af4afaSJohn Baldwin struct sigacts *
311890af4afaSJohn Baldwin sigacts_alloc(void)
311990af4afaSJohn Baldwin {
312090af4afaSJohn Baldwin 	struct sigacts *ps;
312190af4afaSJohn Baldwin 
312290af4afaSJohn Baldwin 	ps = malloc(sizeof(struct sigacts), M_SUBPROC, M_WAITOK | M_ZERO);
312390af4afaSJohn Baldwin 	ps->ps_refcnt = 1;
312490af4afaSJohn Baldwin 	mtx_init(&ps->ps_mtx, "sigacts", NULL, MTX_DEF);
312590af4afaSJohn Baldwin 	return (ps);
312690af4afaSJohn Baldwin }
312790af4afaSJohn Baldwin 
312890af4afaSJohn Baldwin void
312990af4afaSJohn Baldwin sigacts_free(struct sigacts *ps)
313090af4afaSJohn Baldwin {
313190af4afaSJohn Baldwin 
313290af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
313390af4afaSJohn Baldwin 	ps->ps_refcnt--;
313490af4afaSJohn Baldwin 	if (ps->ps_refcnt == 0) {
313590af4afaSJohn Baldwin 		mtx_destroy(&ps->ps_mtx);
313690af4afaSJohn Baldwin 		free(ps, M_SUBPROC);
313790af4afaSJohn Baldwin 	} else
313890af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
313990af4afaSJohn Baldwin }
314090af4afaSJohn Baldwin 
314190af4afaSJohn Baldwin struct sigacts *
314290af4afaSJohn Baldwin sigacts_hold(struct sigacts *ps)
314390af4afaSJohn Baldwin {
314490af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
314590af4afaSJohn Baldwin 	ps->ps_refcnt++;
314690af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
314790af4afaSJohn Baldwin 	return (ps);
314890af4afaSJohn Baldwin }
314990af4afaSJohn Baldwin 
315090af4afaSJohn Baldwin void
315190af4afaSJohn Baldwin sigacts_copy(struct sigacts *dest, struct sigacts *src)
315290af4afaSJohn Baldwin {
315390af4afaSJohn Baldwin 
315490af4afaSJohn Baldwin 	KASSERT(dest->ps_refcnt == 1, ("sigacts_copy to shared dest"));
315590af4afaSJohn Baldwin 	mtx_lock(&src->ps_mtx);
315690af4afaSJohn Baldwin 	bcopy(src, dest, offsetof(struct sigacts, ps_refcnt));
315790af4afaSJohn Baldwin 	mtx_unlock(&src->ps_mtx);
315890af4afaSJohn Baldwin }
315990af4afaSJohn Baldwin 
316090af4afaSJohn Baldwin int
316190af4afaSJohn Baldwin sigacts_shared(struct sigacts *ps)
316290af4afaSJohn Baldwin {
316390af4afaSJohn Baldwin 	int shared;
316490af4afaSJohn Baldwin 
316590af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
316690af4afaSJohn Baldwin 	shared = ps->ps_refcnt > 1;
316790af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
316890af4afaSJohn Baldwin 	return (shared);
316990af4afaSJohn Baldwin }
3170