xref: /freebsd/sys/kern/kern_sig.c (revision e76d823b81edf1f8bcbdbe1143d2c0030c8bc299)
19454b2d8SWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1989, 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  * (c) UNIX System Laboratories, Inc.
5df8bae1dSRodney W. Grimes  * All or some portions of this file are derived from material licensed
6df8bae1dSRodney W. Grimes  * to the University of California by American Telephone and Telegraph
7df8bae1dSRodney W. Grimes  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8df8bae1dSRodney W. Grimes  * the permission of UNIX System Laboratories, Inc.
9df8bae1dSRodney W. Grimes  *
10df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
11df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
12df8bae1dSRodney W. Grimes  * are met:
13df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
15df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
16df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
17df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
18df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
19df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
20df8bae1dSRodney W. Grimes  *    without specific prior written permission.
21df8bae1dSRodney W. Grimes  *
22df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
33df8bae1dSRodney W. Grimes  *
34df8bae1dSRodney W. Grimes  *	@(#)kern_sig.c	8.7 (Berkeley) 4/18/94
35df8bae1dSRodney W. Grimes  */
36df8bae1dSRodney W. Grimes 
37677b542eSDavid E. O'Brien #include <sys/cdefs.h>
38677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$");
39677b542eSDavid E. O'Brien 
405591b823SEivind Eklund #include "opt_compat.h"
415d217f17SJohn Birrell #include "opt_kdtrace.h"
42db6a20e2SGarrett Wollman #include "opt_ktrace.h"
43db6a20e2SGarrett Wollman 
44df8bae1dSRodney W. Grimes #include <sys/param.h>
4536240ea5SDoug Rabson #include <sys/systm.h>
46df8bae1dSRodney W. Grimes #include <sys/signalvar.h>
47df8bae1dSRodney W. Grimes #include <sys/vnode.h>
48df8bae1dSRodney W. Grimes #include <sys/acct.h>
49238510fcSJason Evans #include <sys/condvar.h>
50854dc8c2SJohn Baldwin #include <sys/event.h>
51854dc8c2SJohn Baldwin #include <sys/fcntl.h>
52854dc8c2SJohn Baldwin #include <sys/kernel.h>
530384fff8SJason Evans #include <sys/ktr.h>
54df8bae1dSRodney W. Grimes #include <sys/ktrace.h>
55854dc8c2SJohn Baldwin #include <sys/lock.h>
56854dc8c2SJohn Baldwin #include <sys/malloc.h>
57854dc8c2SJohn Baldwin #include <sys/mutex.h>
58854dc8c2SJohn Baldwin #include <sys/namei.h>
59854dc8c2SJohn Baldwin #include <sys/proc.h>
606aeb05d7STom Rhodes #include <sys/posix4.h>
61854dc8c2SJohn Baldwin #include <sys/pioctl.h>
62c31146a1SJohn Baldwin #include <sys/resourcevar.h>
635d217f17SJohn Birrell #include <sys/sdt.h>
6436b208e0SRobert Watson #include <sys/sbuf.h>
6544f3b092SJohn Baldwin #include <sys/sleepqueue.h>
666caa8a15SJohn Baldwin #include <sys/smp.h>
67df8bae1dSRodney W. Grimes #include <sys/stat.h>
681005a129SJohn Baldwin #include <sys/sx.h>
698f19eb88SIan Dowse #include <sys/syscallsubr.h>
70c87e2930SDavid Greenman #include <sys/sysctl.h>
71854dc8c2SJohn Baldwin #include <sys/sysent.h>
72854dc8c2SJohn Baldwin #include <sys/syslog.h>
73854dc8c2SJohn Baldwin #include <sys/sysproto.h>
7456c06c4bSDavid Xu #include <sys/timers.h>
7506ae1e91SMatthew Dillon #include <sys/unistd.h>
76854dc8c2SJohn Baldwin #include <sys/wait.h>
779104847fSDavid Xu #include <vm/vm.h>
789104847fSDavid Xu #include <vm/vm_extern.h>
799104847fSDavid Xu #include <vm/uma.h>
80df8bae1dSRodney W. Grimes 
81df8bae1dSRodney W. Grimes #include <machine/cpu.h>
82df8bae1dSRodney W. Grimes 
83bfd7575aSWayne Salamon #include <security/audit/audit.h>
84bfd7575aSWayne Salamon 
856f841fb7SMarcel Moolenaar #define	ONSIG	32		/* NSIG for osig* syscalls.  XXX. */
866f841fb7SMarcel Moolenaar 
875d217f17SJohn Birrell SDT_PROVIDER_DECLARE(proc);
885d217f17SJohn Birrell SDT_PROBE_DEFINE(proc, kernel, , signal_send);
895d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_send, 0, "struct thread *");
905d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_send, 1, "struct proc *");
915d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_send, 2, "int");
925d217f17SJohn Birrell SDT_PROBE_DEFINE(proc, kernel, , signal_clear);
935d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_clear, 0, "int");
945d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_clear, 1, "ksiginfo_t *");
955d217f17SJohn Birrell SDT_PROBE_DEFINE(proc, kernel, , signal_discard);
965d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_discard, 0, "struct thread *");
975d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_discard, 1, "struct proc *");
985d217f17SJohn Birrell SDT_PROBE_ARGTYPE(proc, kernel, , signal_discard, 2, "int");
995d217f17SJohn Birrell 
1004d77a549SAlfred Perlstein static int	coredump(struct thread *);
1014d77a549SAlfred Perlstein static char	*expand_name(const char *, uid_t, pid_t);
1021a88a252SMaxim Sobolev static int	killpg1(struct thread *td, int sig, int pgid, int all);
103f33a947bSKonstantin Belousov static int	issignal(struct thread *td, int stop_allowed);
1044d77a549SAlfred Perlstein static int	sigprop(int sig);
10594f0972bSDavid Xu static void	tdsigwakeup(struct thread *, int, sig_t, int);
106d8267df7SDavid Xu static void	sig_suspend_threads(struct thread *, struct proc *, int);
107cb679c38SJonathan Lemon static int	filt_sigattach(struct knote *kn);
108cb679c38SJonathan Lemon static void	filt_sigdetach(struct knote *kn);
109cb679c38SJonathan Lemon static int	filt_signal(struct knote *kn, long hint);
1104093529dSJeff Roberson static struct thread *sigtd(struct proc *p, int sig, int prop);
1119104847fSDavid Xu static void	sigqueue_start(void);
112cb679c38SJonathan Lemon 
1139104847fSDavid Xu static uma_zone_t	ksiginfo_zone = NULL;
114e76d823bSRobert Watson struct filterops sig_filtops = {
115e76d823bSRobert Watson 	.f_isfd = 0,
116e76d823bSRobert Watson 	.f_attach = filt_sigattach,
117e76d823bSRobert Watson 	.f_detach = filt_sigdetach,
118e76d823bSRobert Watson 	.f_event = filt_signal,
119e76d823bSRobert Watson };
120cb679c38SJonathan Lemon 
12189b57fcfSKonstantin Belousov int	kern_logsigexit = 1;
1223d177f46SBill Fumerola SYSCTL_INT(_kern, KERN_LOGSIGEXIT, logsigexit, CTLFLAG_RW,
1233d177f46SBill Fumerola     &kern_logsigexit, 0,
1243d177f46SBill Fumerola     "Log processes quitting on abnormal signals to syslog(3)");
12557308494SJoerg Wunsch 
126f71a882fSDavid Xu static int	kern_forcesigexit = 1;
127f71a882fSDavid Xu SYSCTL_INT(_kern, OID_AUTO, forcesigexit, CTLFLAG_RW,
128f71a882fSDavid Xu     &kern_forcesigexit, 0, "Force trap signal to be handled");
129f71a882fSDavid Xu 
1309104847fSDavid Xu SYSCTL_NODE(_kern, OID_AUTO, sigqueue, CTLFLAG_RW, 0, "POSIX real time signal");
1319104847fSDavid Xu 
1329104847fSDavid Xu static int	max_pending_per_proc = 128;
1339104847fSDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, max_pending_per_proc, CTLFLAG_RW,
1349104847fSDavid Xu     &max_pending_per_proc, 0, "Max pending signals per proc");
1359104847fSDavid Xu 
1369104847fSDavid Xu static int	preallocate_siginfo = 1024;
1379104847fSDavid Xu TUNABLE_INT("kern.sigqueue.preallocate", &preallocate_siginfo);
1389104847fSDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, preallocate, CTLFLAG_RD,
1399104847fSDavid Xu     &preallocate_siginfo, 0, "Preallocated signal memory size");
1409104847fSDavid Xu 
1419104847fSDavid Xu static int	signal_overflow = 0;
142761a4d94SDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, overflow, CTLFLAG_RD,
1439104847fSDavid Xu     &signal_overflow, 0, "Number of signals overflew");
1449104847fSDavid Xu 
1459104847fSDavid Xu static int	signal_alloc_fail = 0;
146761a4d94SDavid Xu SYSCTL_INT(_kern_sigqueue, OID_AUTO, alloc_fail, CTLFLAG_RD,
1479104847fSDavid Xu     &signal_alloc_fail, 0, "signals failed to be allocated");
1489104847fSDavid Xu 
1499104847fSDavid Xu SYSINIT(signal, SI_SUB_P1003_1B, SI_ORDER_FIRST+3, sigqueue_start, NULL);
1509104847fSDavid Xu 
1512b87b6d4SRobert Watson /*
1522b87b6d4SRobert Watson  * Policy -- Can ucred cr1 send SIGIO to process cr2?
1532b87b6d4SRobert Watson  * Should use cr_cansignal() once cr_cansignal() allows SIGIO and SIGURG
1542b87b6d4SRobert Watson  * in the right situations.
1552b87b6d4SRobert Watson  */
1562b87b6d4SRobert Watson #define CANSIGIO(cr1, cr2) \
1572b87b6d4SRobert Watson 	((cr1)->cr_uid == 0 || \
1582b87b6d4SRobert Watson 	    (cr1)->cr_ruid == (cr2)->cr_ruid || \
1592b87b6d4SRobert Watson 	    (cr1)->cr_uid == (cr2)->cr_ruid || \
1602b87b6d4SRobert Watson 	    (cr1)->cr_ruid == (cr2)->cr_uid || \
1612b87b6d4SRobert Watson 	    (cr1)->cr_uid == (cr2)->cr_uid)
1622b87b6d4SRobert Watson 
16322d4b0fbSJohn Polstra int sugid_coredump;
1643d177f46SBill Fumerola SYSCTL_INT(_kern, OID_AUTO, sugid_coredump, CTLFLAG_RW,
1653d177f46SBill Fumerola     &sugid_coredump, 0, "Enable coredumping set user/group ID processes");
166c87e2930SDavid Greenman 
167e5a28db9SPaul Saab static int	do_coredump = 1;
168e5a28db9SPaul Saab SYSCTL_INT(_kern, OID_AUTO, coredump, CTLFLAG_RW,
169e5a28db9SPaul Saab 	&do_coredump, 0, "Enable/Disable coredumps");
170e5a28db9SPaul Saab 
1716141e04aSJohn-Mark Gurney static int	set_core_nodump_flag = 0;
1726141e04aSJohn-Mark Gurney SYSCTL_INT(_kern, OID_AUTO, nodump_coredump, CTLFLAG_RW, &set_core_nodump_flag,
1736141e04aSJohn-Mark Gurney 	0, "Enable setting the NODUMP flag on coredump files");
1746141e04aSJohn-Mark Gurney 
1752c42a146SMarcel Moolenaar /*
1762c42a146SMarcel Moolenaar  * Signal properties and actions.
1772c42a146SMarcel Moolenaar  * The array below categorizes the signals and their default actions
1782c42a146SMarcel Moolenaar  * according to the following properties:
1792c42a146SMarcel Moolenaar  */
1802c42a146SMarcel Moolenaar #define	SA_KILL		0x01		/* terminates process by default */
1812c42a146SMarcel Moolenaar #define	SA_CORE		0x02		/* ditto and coredumps */
1822c42a146SMarcel Moolenaar #define	SA_STOP		0x04		/* suspend process */
1832c42a146SMarcel Moolenaar #define	SA_TTYSTOP	0x08		/* ditto, from tty */
1842c42a146SMarcel Moolenaar #define	SA_IGNORE	0x10		/* ignore by default */
1852c42a146SMarcel Moolenaar #define	SA_CONT		0x20		/* continue if suspended */
1862c42a146SMarcel Moolenaar #define	SA_CANTMASK	0x40		/* non-maskable, catchable */
187da33176fSJeff Roberson #define	SA_PROC		0x80		/* deliverable to any thread */
188df8bae1dSRodney W. Grimes 
1892c42a146SMarcel Moolenaar static int sigproptbl[NSIG] = {
190da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGHUP */
191da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGINT */
192da33176fSJeff Roberson         SA_KILL|SA_CORE|SA_PROC,	/* SIGQUIT */
1932c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGILL */
1942c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGTRAP */
1952c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGABRT */
196da33176fSJeff Roberson         SA_KILL|SA_CORE|SA_PROC,	/* SIGEMT */
1972c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGFPE */
198da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGKILL */
1992c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGBUS */
2002c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGSEGV */
2012c42a146SMarcel Moolenaar         SA_KILL|SA_CORE,		/* SIGSYS */
202da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGPIPE */
203da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGALRM */
204da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGTERM */
205da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGURG */
206da33176fSJeff Roberson         SA_STOP|SA_PROC,		/* SIGSTOP */
207da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTSTP */
208da33176fSJeff Roberson         SA_IGNORE|SA_CONT|SA_PROC,	/* SIGCONT */
209da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGCHLD */
210da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTTIN */
211da33176fSJeff Roberson         SA_STOP|SA_TTYSTOP|SA_PROC,	/* SIGTTOU */
212da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGIO */
2132c42a146SMarcel Moolenaar         SA_KILL,			/* SIGXCPU */
2142c42a146SMarcel Moolenaar         SA_KILL,			/* SIGXFSZ */
215da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGVTALRM */
216da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGPROF */
217da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGWINCH  */
218da33176fSJeff Roberson         SA_IGNORE|SA_PROC,		/* SIGINFO */
219da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGUSR1 */
220da33176fSJeff Roberson         SA_KILL|SA_PROC,		/* SIGUSR2 */
2212c42a146SMarcel Moolenaar };
2222c42a146SMarcel Moolenaar 
2239104847fSDavid Xu static void
2249104847fSDavid Xu sigqueue_start(void)
2259104847fSDavid Xu {
2269104847fSDavid Xu 	ksiginfo_zone = uma_zcreate("ksiginfo", sizeof(ksiginfo_t),
2279104847fSDavid Xu 		NULL, NULL, NULL, NULL, UMA_ALIGN_PTR, 0);
2289104847fSDavid Xu 	uma_prealloc(ksiginfo_zone, preallocate_siginfo);
229b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_REALTIME_SIGNALS, _POSIX_REALTIME_SIGNALS);
230b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_RTSIG_MAX, SIGRTMAX - SIGRTMIN + 1);
231b51d237aSDavid Xu 	p31b_setcfg(CTL_P1003_1B_SIGQUEUE_MAX, max_pending_per_proc);
2329104847fSDavid Xu }
2339104847fSDavid Xu 
2345da49fcbSDavid Xu ksiginfo_t *
235ebceaf6dSDavid Xu ksiginfo_alloc(int wait)
2369104847fSDavid Xu {
237ebceaf6dSDavid Xu 	int flags;
238ebceaf6dSDavid Xu 
239ebceaf6dSDavid Xu 	flags = M_ZERO;
240ebceaf6dSDavid Xu 	if (! wait)
241ebceaf6dSDavid Xu 		flags |= M_NOWAIT;
2429104847fSDavid Xu 	if (ksiginfo_zone != NULL)
243ebceaf6dSDavid Xu 		return ((ksiginfo_t *)uma_zalloc(ksiginfo_zone, flags));
2449104847fSDavid Xu 	return (NULL);
2459104847fSDavid Xu }
2469104847fSDavid Xu 
2475da49fcbSDavid Xu void
2489104847fSDavid Xu ksiginfo_free(ksiginfo_t *ksi)
2499104847fSDavid Xu {
2509104847fSDavid Xu 	uma_zfree(ksiginfo_zone, ksi);
2519104847fSDavid Xu }
2529104847fSDavid Xu 
2535da49fcbSDavid Xu static __inline int
2545da49fcbSDavid Xu ksiginfo_tryfree(ksiginfo_t *ksi)
2555da49fcbSDavid Xu {
2565da49fcbSDavid Xu 	if (!(ksi->ksi_flags & KSI_EXT)) {
2575da49fcbSDavid Xu 		uma_zfree(ksiginfo_zone, ksi);
2585da49fcbSDavid Xu 		return (1);
2595da49fcbSDavid Xu 	}
2605da49fcbSDavid Xu 	return (0);
2615da49fcbSDavid Xu }
2625da49fcbSDavid Xu 
2639104847fSDavid Xu void
2649104847fSDavid Xu sigqueue_init(sigqueue_t *list, struct proc *p)
2659104847fSDavid Xu {
2669104847fSDavid Xu 	SIGEMPTYSET(list->sq_signals);
2673dfcaad6SDavid Xu 	SIGEMPTYSET(list->sq_kill);
2689104847fSDavid Xu 	TAILQ_INIT(&list->sq_list);
2699104847fSDavid Xu 	list->sq_proc = p;
2709104847fSDavid Xu 	list->sq_flags = SQ_INIT;
2719104847fSDavid Xu }
2729104847fSDavid Xu 
2739104847fSDavid Xu /*
2749104847fSDavid Xu  * Get a signal's ksiginfo.
2759104847fSDavid Xu  * Return:
2769104847fSDavid Xu  * 	0	-	signal not found
2779104847fSDavid Xu  *	others	-	signal number
2789104847fSDavid Xu  */
2799104847fSDavid Xu int
2809104847fSDavid Xu sigqueue_get(sigqueue_t *sq, int signo, ksiginfo_t *si)
2819104847fSDavid Xu {
2829104847fSDavid Xu 	struct proc *p = sq->sq_proc;
2839104847fSDavid Xu 	struct ksiginfo *ksi, *next;
2849104847fSDavid Xu 	int count = 0;
2859104847fSDavid Xu 
2869104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
2879104847fSDavid Xu 
2889104847fSDavid Xu 	if (!SIGISMEMBER(sq->sq_signals, signo))
2899104847fSDavid Xu 		return (0);
2909104847fSDavid Xu 
2913dfcaad6SDavid Xu 	if (SIGISMEMBER(sq->sq_kill, signo)) {
2923dfcaad6SDavid Xu 		count++;
2933dfcaad6SDavid Xu 		SIGDELSET(sq->sq_kill, signo);
2943dfcaad6SDavid Xu 	}
2953dfcaad6SDavid Xu 
2965c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &sq->sq_list, ksi_link, next) {
2979104847fSDavid Xu 		if (ksi->ksi_signo == signo) {
2989104847fSDavid Xu 			if (count == 0) {
2999104847fSDavid Xu 				TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
3005da49fcbSDavid Xu 				ksi->ksi_sigq = NULL;
3019104847fSDavid Xu 				ksiginfo_copy(ksi, si);
3025da49fcbSDavid Xu 				if (ksiginfo_tryfree(ksi) && p != NULL)
3039104847fSDavid Xu 					p->p_pendingcnt--;
3049104847fSDavid Xu 			}
305016fa302SDavid Xu 			if (++count > 1)
306016fa302SDavid Xu 				break;
3079104847fSDavid Xu 		}
3089104847fSDavid Xu 	}
3099104847fSDavid Xu 
3109104847fSDavid Xu 	if (count <= 1)
3119104847fSDavid Xu 		SIGDELSET(sq->sq_signals, signo);
3129104847fSDavid Xu 	si->ksi_signo = signo;
3139104847fSDavid Xu 	return (signo);
3149104847fSDavid Xu }
3159104847fSDavid Xu 
3165da49fcbSDavid Xu void
3175da49fcbSDavid Xu sigqueue_take(ksiginfo_t *ksi)
3185da49fcbSDavid Xu {
3195da49fcbSDavid Xu 	struct ksiginfo *kp;
3205da49fcbSDavid Xu 	struct proc	*p;
3215da49fcbSDavid Xu 	sigqueue_t	*sq;
3225da49fcbSDavid Xu 
323ebceaf6dSDavid Xu 	if (ksi == NULL || (sq = ksi->ksi_sigq) == NULL)
3245da49fcbSDavid Xu 		return;
3255da49fcbSDavid Xu 
3265da49fcbSDavid Xu 	p = sq->sq_proc;
3275da49fcbSDavid Xu 	TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
3285da49fcbSDavid Xu 	ksi->ksi_sigq = NULL;
3295da49fcbSDavid Xu 	if (!(ksi->ksi_flags & KSI_EXT) && p != NULL)
3305da49fcbSDavid Xu 		p->p_pendingcnt--;
3315da49fcbSDavid Xu 
3325da49fcbSDavid Xu 	for (kp = TAILQ_FIRST(&sq->sq_list); kp != NULL;
3335da49fcbSDavid Xu 	     kp = TAILQ_NEXT(kp, ksi_link)) {
3345da49fcbSDavid Xu 		if (kp->ksi_signo == ksi->ksi_signo)
3355da49fcbSDavid Xu 			break;
3365da49fcbSDavid Xu 	}
3373dfcaad6SDavid Xu 	if (kp == NULL && !SIGISMEMBER(sq->sq_kill, ksi->ksi_signo))
3385da49fcbSDavid Xu 		SIGDELSET(sq->sq_signals, ksi->ksi_signo);
3395da49fcbSDavid Xu }
3405da49fcbSDavid Xu 
3419104847fSDavid Xu int
3429104847fSDavid Xu sigqueue_add(sigqueue_t *sq, int signo, ksiginfo_t *si)
3439104847fSDavid Xu {
3449104847fSDavid Xu 	struct proc *p = sq->sq_proc;
3459104847fSDavid Xu 	struct ksiginfo *ksi;
3469104847fSDavid Xu 	int ret = 0;
3479104847fSDavid Xu 
3489104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
3499104847fSDavid Xu 
3503dfcaad6SDavid Xu 	if (signo == SIGKILL || signo == SIGSTOP || si == NULL) {
3513dfcaad6SDavid Xu 		SIGADDSET(sq->sq_kill, signo);
3529104847fSDavid Xu 		goto out_set_bit;
3533dfcaad6SDavid Xu 	}
3549104847fSDavid Xu 
3555da49fcbSDavid Xu 	/* directly insert the ksi, don't copy it */
3565da49fcbSDavid Xu 	if (si->ksi_flags & KSI_INS) {
3575da49fcbSDavid Xu 		TAILQ_INSERT_TAIL(&sq->sq_list, si, ksi_link);
3585da49fcbSDavid Xu 		si->ksi_sigq = sq;
3595da49fcbSDavid Xu 		goto out_set_bit;
3605da49fcbSDavid Xu 	}
3615da49fcbSDavid Xu 
3623dfcaad6SDavid Xu 	if (__predict_false(ksiginfo_zone == NULL)) {
3633dfcaad6SDavid Xu 		SIGADDSET(sq->sq_kill, signo);
3649104847fSDavid Xu 		goto out_set_bit;
3653dfcaad6SDavid Xu 	}
3669104847fSDavid Xu 
367ebceaf6dSDavid Xu 	if (p != NULL && p->p_pendingcnt >= max_pending_per_proc) {
3689104847fSDavid Xu 		signal_overflow++;
3699104847fSDavid Xu 		ret = EAGAIN;
370ebceaf6dSDavid Xu 	} else if ((ksi = ksiginfo_alloc(0)) == NULL) {
3719104847fSDavid Xu 		signal_alloc_fail++;
3729104847fSDavid Xu 		ret = EAGAIN;
3739104847fSDavid Xu 	} else {
3749104847fSDavid Xu 		if (p != NULL)
3759104847fSDavid Xu 			p->p_pendingcnt++;
3769104847fSDavid Xu 		ksiginfo_copy(si, ksi);
3779104847fSDavid Xu 		ksi->ksi_signo = signo;
3789104847fSDavid Xu 		TAILQ_INSERT_TAIL(&sq->sq_list, ksi, ksi_link);
3795da49fcbSDavid Xu 		ksi->ksi_sigq = sq;
3809104847fSDavid Xu 	}
3819104847fSDavid Xu 
3829104847fSDavid Xu 	if ((si->ksi_flags & KSI_TRAP) != 0) {
3833dfcaad6SDavid Xu 		if (ret != 0)
3843dfcaad6SDavid Xu 			SIGADDSET(sq->sq_kill, signo);
3859104847fSDavid Xu 		ret = 0;
3869104847fSDavid Xu 		goto out_set_bit;
3879104847fSDavid Xu 	}
3889104847fSDavid Xu 
3899104847fSDavid Xu 	if (ret != 0)
3909104847fSDavid Xu 		return (ret);
3919104847fSDavid Xu 
3929104847fSDavid Xu out_set_bit:
3939104847fSDavid Xu 	SIGADDSET(sq->sq_signals, signo);
3949104847fSDavid Xu 	return (ret);
3959104847fSDavid Xu }
3969104847fSDavid Xu 
3979104847fSDavid Xu void
3989104847fSDavid Xu sigqueue_flush(sigqueue_t *sq)
3999104847fSDavid Xu {
4009104847fSDavid Xu 	struct proc *p = sq->sq_proc;
4019104847fSDavid Xu 	ksiginfo_t *ksi;
4029104847fSDavid Xu 
4039104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
4049104847fSDavid Xu 
4055da49fcbSDavid Xu 	if (p != NULL)
4065da49fcbSDavid Xu 		PROC_LOCK_ASSERT(p, MA_OWNED);
4075da49fcbSDavid Xu 
4089104847fSDavid Xu 	while ((ksi = TAILQ_FIRST(&sq->sq_list)) != NULL) {
4099104847fSDavid Xu 		TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
4105da49fcbSDavid Xu 		ksi->ksi_sigq = NULL;
4115da49fcbSDavid Xu 		if (ksiginfo_tryfree(ksi) && p != NULL)
4129104847fSDavid Xu 			p->p_pendingcnt--;
4139104847fSDavid Xu 	}
4149104847fSDavid Xu 
4159104847fSDavid Xu 	SIGEMPTYSET(sq->sq_signals);
4163dfcaad6SDavid Xu 	SIGEMPTYSET(sq->sq_kill);
4179104847fSDavid Xu }
4189104847fSDavid Xu 
4199104847fSDavid Xu void
4209104847fSDavid Xu sigqueue_collect_set(sigqueue_t *sq, sigset_t *set)
4219104847fSDavid Xu {
4229104847fSDavid Xu 	ksiginfo_t *ksi;
4239104847fSDavid Xu 
4249104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("sigqueue not inited"));
4259104847fSDavid Xu 
4269104847fSDavid Xu 	TAILQ_FOREACH(ksi, &sq->sq_list, ksi_link)
4279104847fSDavid Xu 		SIGADDSET(*set, ksi->ksi_signo);
4283dfcaad6SDavid Xu 	SIGSETOR(*set, sq->sq_kill);
4299104847fSDavid Xu }
4309104847fSDavid Xu 
4319104847fSDavid Xu void
4329104847fSDavid Xu sigqueue_move_set(sigqueue_t *src, sigqueue_t *dst, sigset_t *setp)
4339104847fSDavid Xu {
4349104847fSDavid Xu 	sigset_t tmp, set;
4359104847fSDavid Xu 	struct proc *p1, *p2;
4369104847fSDavid Xu 	ksiginfo_t *ksi, *next;
4379104847fSDavid Xu 
4389104847fSDavid Xu 	KASSERT(src->sq_flags & SQ_INIT, ("src sigqueue not inited"));
4399104847fSDavid Xu 	KASSERT(dst->sq_flags & SQ_INIT, ("dst sigqueue not inited"));
4409104847fSDavid Xu 	/*
4419104847fSDavid Xu 	 * make a copy, this allows setp to point to src or dst
4429104847fSDavid Xu 	 * sq_signals without trouble.
4439104847fSDavid Xu 	 */
4449104847fSDavid Xu 	set = *setp;
4459104847fSDavid Xu 	p1 = src->sq_proc;
4469104847fSDavid Xu 	p2 = dst->sq_proc;
4479104847fSDavid Xu 	/* Move siginfo to target list */
4485c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &src->sq_list, ksi_link, next) {
4499104847fSDavid Xu 		if (SIGISMEMBER(set, ksi->ksi_signo)) {
4509104847fSDavid Xu 			TAILQ_REMOVE(&src->sq_list, ksi, ksi_link);
4519104847fSDavid Xu 			if (p1 != NULL)
4529104847fSDavid Xu 				p1->p_pendingcnt--;
4539104847fSDavid Xu 			TAILQ_INSERT_TAIL(&dst->sq_list, ksi, ksi_link);
4545da49fcbSDavid Xu 			ksi->ksi_sigq = dst;
4559104847fSDavid Xu 			if (p2 != NULL)
4569104847fSDavid Xu 				p2->p_pendingcnt++;
4579104847fSDavid Xu 		}
4589104847fSDavid Xu 	}
4599104847fSDavid Xu 
4609104847fSDavid Xu 	/* Move pending bits to target list */
4613dfcaad6SDavid Xu 	tmp = src->sq_kill;
4623dfcaad6SDavid Xu 	SIGSETAND(tmp, set);
4633dfcaad6SDavid Xu 	SIGSETOR(dst->sq_kill, tmp);
4643dfcaad6SDavid Xu 	SIGSETNAND(src->sq_kill, tmp);
4653dfcaad6SDavid Xu 
4669104847fSDavid Xu 	tmp = src->sq_signals;
4679104847fSDavid Xu 	SIGSETAND(tmp, set);
4689104847fSDavid Xu 	SIGSETOR(dst->sq_signals, tmp);
4699104847fSDavid Xu 	SIGSETNAND(src->sq_signals, tmp);
4709104847fSDavid Xu 
4719104847fSDavid Xu 	/* Finally, rescan src queue and set pending bits for it */
4729104847fSDavid Xu 	sigqueue_collect_set(src, &src->sq_signals);
4739104847fSDavid Xu }
4749104847fSDavid Xu 
4759104847fSDavid Xu void
4769104847fSDavid Xu sigqueue_move(sigqueue_t *src, sigqueue_t *dst, int signo)
4779104847fSDavid Xu {
4789104847fSDavid Xu 	sigset_t set;
4799104847fSDavid Xu 
4809104847fSDavid Xu 	SIGEMPTYSET(set);
4819104847fSDavid Xu 	SIGADDSET(set, signo);
4829104847fSDavid Xu 	sigqueue_move_set(src, dst, &set);
4839104847fSDavid Xu }
4849104847fSDavid Xu 
4859104847fSDavid Xu void
4869104847fSDavid Xu sigqueue_delete_set(sigqueue_t *sq, sigset_t *set)
4879104847fSDavid Xu {
4889104847fSDavid Xu 	struct proc *p = sq->sq_proc;
4899104847fSDavid Xu 	ksiginfo_t *ksi, *next;
4909104847fSDavid Xu 
4919104847fSDavid Xu 	KASSERT(sq->sq_flags & SQ_INIT, ("src sigqueue not inited"));
4929104847fSDavid Xu 
4939104847fSDavid Xu 	/* Remove siginfo queue */
4945c28a8d4SDavid Xu 	TAILQ_FOREACH_SAFE(ksi, &sq->sq_list, ksi_link, next) {
4959104847fSDavid Xu 		if (SIGISMEMBER(*set, ksi->ksi_signo)) {
4969104847fSDavid Xu 			TAILQ_REMOVE(&sq->sq_list, ksi, ksi_link);
4975da49fcbSDavid Xu 			ksi->ksi_sigq = NULL;
4985da49fcbSDavid Xu 			if (ksiginfo_tryfree(ksi) && p != NULL)
4999104847fSDavid Xu 				p->p_pendingcnt--;
5009104847fSDavid Xu 		}
5019104847fSDavid Xu 	}
5023dfcaad6SDavid Xu 	SIGSETNAND(sq->sq_kill, *set);
5039104847fSDavid Xu 	SIGSETNAND(sq->sq_signals, *set);
5049104847fSDavid Xu 	/* Finally, rescan queue and set pending bits for it */
5059104847fSDavid Xu 	sigqueue_collect_set(sq, &sq->sq_signals);
5069104847fSDavid Xu }
5079104847fSDavid Xu 
5089104847fSDavid Xu void
5099104847fSDavid Xu sigqueue_delete(sigqueue_t *sq, int signo)
5109104847fSDavid Xu {
5119104847fSDavid Xu 	sigset_t set;
5129104847fSDavid Xu 
5139104847fSDavid Xu 	SIGEMPTYSET(set);
5149104847fSDavid Xu 	SIGADDSET(set, signo);
5159104847fSDavid Xu 	sigqueue_delete_set(sq, &set);
5169104847fSDavid Xu }
5179104847fSDavid Xu 
5189104847fSDavid Xu /* Remove a set of signals for a process */
5199104847fSDavid Xu void
5209104847fSDavid Xu sigqueue_delete_set_proc(struct proc *p, sigset_t *set)
5219104847fSDavid Xu {
5229104847fSDavid Xu 	sigqueue_t worklist;
5239104847fSDavid Xu 	struct thread *td0;
5249104847fSDavid Xu 
5259104847fSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
5269104847fSDavid Xu 
5279104847fSDavid Xu 	sigqueue_init(&worklist, NULL);
5289104847fSDavid Xu 	sigqueue_move_set(&p->p_sigqueue, &worklist, set);
5299104847fSDavid Xu 
5309104847fSDavid Xu 	FOREACH_THREAD_IN_PROC(p, td0)
5319104847fSDavid Xu 		sigqueue_move_set(&td0->td_sigqueue, &worklist, set);
5329104847fSDavid Xu 
5339104847fSDavid Xu 	sigqueue_flush(&worklist);
5349104847fSDavid Xu }
5359104847fSDavid Xu 
5369104847fSDavid Xu void
5379104847fSDavid Xu sigqueue_delete_proc(struct proc *p, int signo)
5389104847fSDavid Xu {
5399104847fSDavid Xu 	sigset_t set;
5409104847fSDavid Xu 
5419104847fSDavid Xu 	SIGEMPTYSET(set);
5429104847fSDavid Xu 	SIGADDSET(set, signo);
5439104847fSDavid Xu 	sigqueue_delete_set_proc(p, &set);
5449104847fSDavid Xu }
5459104847fSDavid Xu 
5469104847fSDavid Xu void
5479104847fSDavid Xu sigqueue_delete_stopmask_proc(struct proc *p)
5489104847fSDavid Xu {
5499104847fSDavid Xu 	sigset_t set;
5509104847fSDavid Xu 
5519104847fSDavid Xu 	SIGEMPTYSET(set);
5529104847fSDavid Xu 	SIGADDSET(set, SIGSTOP);
5539104847fSDavid Xu 	SIGADDSET(set, SIGTSTP);
5549104847fSDavid Xu 	SIGADDSET(set, SIGTTIN);
5559104847fSDavid Xu 	SIGADDSET(set, SIGTTOU);
5569104847fSDavid Xu 	sigqueue_delete_set_proc(p, &set);
5579104847fSDavid Xu }
5589104847fSDavid Xu 
559fbbeeb6cSBruce Evans /*
560fbbeeb6cSBruce Evans  * Determine signal that should be delivered to process p, the current
561fbbeeb6cSBruce Evans  * process, 0 if none.  If there is a pending stop signal with default
562fbbeeb6cSBruce Evans  * action, the process stops in issignal().
563fbbeeb6cSBruce Evans  */
564fbbeeb6cSBruce Evans int
565f33a947bSKonstantin Belousov cursig(struct thread *td, int stop_allowed)
566fbbeeb6cSBruce Evans {
567c9dfa2e0SJeff Roberson 	PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
568f33a947bSKonstantin Belousov 	KASSERT(stop_allowed == SIG_STOP_ALLOWED ||
569f33a947bSKonstantin Belousov 	    stop_allowed == SIG_STOP_NOT_ALLOWED, ("cursig: stop_allowed"));
57090af4afaSJohn Baldwin 	mtx_assert(&td->td_proc->p_sigacts->ps_mtx, MA_OWNED);
571a54e85fdSJeff Roberson 	THREAD_LOCK_ASSERT(td, MA_NOTOWNED);
572f33a947bSKonstantin Belousov 	return (SIGPENDING(td) ? issignal(td, stop_allowed) : 0);
573fbbeeb6cSBruce Evans }
574fbbeeb6cSBruce Evans 
57579065dbaSBruce Evans /*
57679065dbaSBruce Evans  * Arrange for ast() to handle unmasked pending signals on return to user
5779104847fSDavid Xu  * mode.  This must be called whenever a signal is added to td_sigqueue or
5784093529dSJeff Roberson  * unmasked in td_sigmask.
57979065dbaSBruce Evans  */
58079065dbaSBruce Evans void
5814093529dSJeff Roberson signotify(struct thread *td)
58279065dbaSBruce Evans {
5834093529dSJeff Roberson 	struct proc *p;
5848460a577SJohn Birrell 	sigset_t set;
5854093529dSJeff Roberson 
5864093529dSJeff Roberson 	p = td->td_proc;
58779065dbaSBruce Evans 
58879065dbaSBruce Evans 	PROC_LOCK_ASSERT(p, MA_OWNED);
5894093529dSJeff Roberson 
5904093529dSJeff Roberson 	/*
5914093529dSJeff Roberson 	 * If our mask changed we may have to move signal that were
5929104847fSDavid Xu 	 * previously masked by all threads to our sigqueue.
5934093529dSJeff Roberson 	 */
5949104847fSDavid Xu 	set = p->p_sigqueue.sq_signals;
5954093529dSJeff Roberson 	SIGSETNAND(set, td->td_sigmask);
5969104847fSDavid Xu 	if (! SIGISEMPTY(set))
5979104847fSDavid Xu 		sigqueue_move_set(&p->p_sigqueue, &td->td_sigqueue, &set);
5988b94a061SJohn Baldwin 	if (SIGPENDING(td)) {
599a54e85fdSJeff Roberson 		thread_lock(td);
6004093529dSJeff Roberson 		td->td_flags |= TDF_NEEDSIGCHK | TDF_ASTPENDING;
601a54e85fdSJeff Roberson 		thread_unlock(td);
60279065dbaSBruce Evans 	}
6038b94a061SJohn Baldwin }
6048b94a061SJohn Baldwin 
6058b94a061SJohn Baldwin int
6068b94a061SJohn Baldwin sigonstack(size_t sp)
6078b94a061SJohn Baldwin {
608a30ec4b9SDavid Xu 	struct thread *td = curthread;
6098b94a061SJohn Baldwin 
610a30ec4b9SDavid Xu 	return ((td->td_pflags & TDP_ALTSTACK) ?
6111930e303SPoul-Henning Kamp #if defined(COMPAT_43)
612a30ec4b9SDavid Xu 	    ((td->td_sigstk.ss_size == 0) ?
613a30ec4b9SDavid Xu 		(td->td_sigstk.ss_flags & SS_ONSTACK) :
614a30ec4b9SDavid Xu 		((sp - (size_t)td->td_sigstk.ss_sp) < td->td_sigstk.ss_size))
6158b94a061SJohn Baldwin #else
616a30ec4b9SDavid Xu 	    ((sp - (size_t)td->td_sigstk.ss_sp) < td->td_sigstk.ss_size)
6178b94a061SJohn Baldwin #endif
6188b94a061SJohn Baldwin 	    : 0);
6198b94a061SJohn Baldwin }
62079065dbaSBruce Evans 
6216f841fb7SMarcel Moolenaar static __inline int
6226f841fb7SMarcel Moolenaar sigprop(int sig)
6232c42a146SMarcel Moolenaar {
6246f841fb7SMarcel Moolenaar 
6252c42a146SMarcel Moolenaar 	if (sig > 0 && sig < NSIG)
6262c42a146SMarcel Moolenaar 		return (sigproptbl[_SIG_IDX(sig)]);
6272c42a146SMarcel Moolenaar 	return (0);
628df8bae1dSRodney W. Grimes }
6292c42a146SMarcel Moolenaar 
6304093529dSJeff Roberson int
6316f841fb7SMarcel Moolenaar sig_ffs(sigset_t *set)
6322c42a146SMarcel Moolenaar {
6332c42a146SMarcel Moolenaar 	int i;
6342c42a146SMarcel Moolenaar 
6356f841fb7SMarcel Moolenaar 	for (i = 0; i < _SIG_WORDS; i++)
6362c42a146SMarcel Moolenaar 		if (set->__bits[i])
6372c42a146SMarcel Moolenaar 			return (ffs(set->__bits[i]) + (i * 32));
638df8bae1dSRodney W. Grimes 	return (0);
639df8bae1dSRodney W. Grimes }
640df8bae1dSRodney W. Grimes 
6412c42a146SMarcel Moolenaar /*
6428f19eb88SIan Dowse  * kern_sigaction
6432c42a146SMarcel Moolenaar  * sigaction
64423eeeff7SPeter Wemm  * freebsd4_sigaction
6452c42a146SMarcel Moolenaar  * osigaction
6462c42a146SMarcel Moolenaar  */
6478f19eb88SIan Dowse int
64823eeeff7SPeter Wemm kern_sigaction(td, sig, act, oact, flags)
6498f19eb88SIan Dowse 	struct thread *td;
6502c42a146SMarcel Moolenaar 	register int sig;
6512c42a146SMarcel Moolenaar 	struct sigaction *act, *oact;
65223eeeff7SPeter Wemm 	int flags;
653df8bae1dSRodney W. Grimes {
65490af4afaSJohn Baldwin 	struct sigacts *ps;
6558f19eb88SIan Dowse 	struct proc *p = td->td_proc;
656df8bae1dSRodney W. Grimes 
6572899d606SDag-Erling Smørgrav 	if (!_SIG_VALID(sig))
6582c42a146SMarcel Moolenaar 		return (EINVAL);
6592c42a146SMarcel Moolenaar 
660628d2653SJohn Baldwin 	PROC_LOCK(p);
661628d2653SJohn Baldwin 	ps = p->p_sigacts;
66290af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
6632c42a146SMarcel Moolenaar 	if (oact) {
6642c42a146SMarcel Moolenaar 		oact->sa_mask = ps->ps_catchmask[_SIG_IDX(sig)];
6652c42a146SMarcel Moolenaar 		oact->sa_flags = 0;
6662c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigonstack, sig))
6672c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_ONSTACK;
6682c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_sigintr, sig))
6692c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_RESTART;
6702c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig))
6712c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_RESETHAND;
6722c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_signodefer, sig))
6732c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NODEFER;
67410c2b8e1SDavid E. O'Brien 		if (SIGISMEMBER(ps->ps_siginfo, sig)) {
6752c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_SIGINFO;
67610c2b8e1SDavid E. O'Brien 			oact->sa_sigaction =
67710c2b8e1SDavid E. O'Brien 			    (__siginfohandler_t *)ps->ps_sigact[_SIG_IDX(sig)];
67810c2b8e1SDavid E. O'Brien 		} else
67910c2b8e1SDavid E. O'Brien 			oact->sa_handler = ps->ps_sigact[_SIG_IDX(sig)];
68090af4afaSJohn Baldwin 		if (sig == SIGCHLD && ps->ps_flag & PS_NOCLDSTOP)
6812c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NOCLDSTOP;
68290af4afaSJohn Baldwin 		if (sig == SIGCHLD && ps->ps_flag & PS_NOCLDWAIT)
6832c42a146SMarcel Moolenaar 			oact->sa_flags |= SA_NOCLDWAIT;
6842c42a146SMarcel Moolenaar 	}
6852c42a146SMarcel Moolenaar 	if (act) {
6862c42a146SMarcel Moolenaar 		if ((sig == SIGKILL || sig == SIGSTOP) &&
687628d2653SJohn Baldwin 		    act->sa_handler != SIG_DFL) {
68890af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
689628d2653SJohn Baldwin 			PROC_UNLOCK(p);
6902c42a146SMarcel Moolenaar 			return (EINVAL);
691628d2653SJohn Baldwin 		}
6922c42a146SMarcel Moolenaar 
693df8bae1dSRodney W. Grimes 		/*
694df8bae1dSRodney W. Grimes 		 * Change setting atomically.
695df8bae1dSRodney W. Grimes 		 */
6962c42a146SMarcel Moolenaar 
6972c42a146SMarcel Moolenaar 		ps->ps_catchmask[_SIG_IDX(sig)] = act->sa_mask;
6982c42a146SMarcel Moolenaar 		SIG_CANTMASK(ps->ps_catchmask[_SIG_IDX(sig)]);
6992c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_SIGINFO) {
700aa7a4daeSPeter Wemm 			ps->ps_sigact[_SIG_IDX(sig)] =
701aa7a4daeSPeter Wemm 			    (__sighandler_t *)act->sa_sigaction;
70280f42b55SIan Dowse 			SIGADDSET(ps->ps_siginfo, sig);
70380f42b55SIan Dowse 		} else {
70480f42b55SIan Dowse 			ps->ps_sigact[_SIG_IDX(sig)] = act->sa_handler;
7052c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_siginfo, sig);
7062c42a146SMarcel Moolenaar 		}
7072c42a146SMarcel Moolenaar 		if (!(act->sa_flags & SA_RESTART))
7082c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigintr, sig);
709df8bae1dSRodney W. Grimes 		else
7102c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigintr, sig);
7112c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_ONSTACK)
7122c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigonstack, sig);
713df8bae1dSRodney W. Grimes 		else
7142c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigonstack, sig);
7152c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_RESETHAND)
7162c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_sigreset, sig);
7171e41c1b5SSteven Wallace 		else
7182c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_sigreset, sig);
7192c42a146SMarcel Moolenaar 		if (act->sa_flags & SA_NODEFER)
7202c42a146SMarcel Moolenaar 			SIGADDSET(ps->ps_signodefer, sig);
721289ccde0SPeter Wemm 		else
7222c42a146SMarcel Moolenaar 			SIGDELSET(ps->ps_signodefer, sig);
7232c42a146SMarcel Moolenaar 		if (sig == SIGCHLD) {
7242c42a146SMarcel Moolenaar 			if (act->sa_flags & SA_NOCLDSTOP)
72590af4afaSJohn Baldwin 				ps->ps_flag |= PS_NOCLDSTOP;
7266626c604SJulian Elischer 			else
72790af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_NOCLDSTOP;
728ba1551caSIan Dowse 			if (act->sa_flags & SA_NOCLDWAIT) {
729245f17d4SJoerg Wunsch 				/*
7302c42a146SMarcel Moolenaar 				 * Paranoia: since SA_NOCLDWAIT is implemented
7312c42a146SMarcel Moolenaar 				 * by reparenting the dying child to PID 1 (and
7322c42a146SMarcel Moolenaar 				 * trust it to reap the zombie), PID 1 itself
7332c42a146SMarcel Moolenaar 				 * is forbidden to set SA_NOCLDWAIT.
734245f17d4SJoerg Wunsch 				 */
735245f17d4SJoerg Wunsch 				if (p->p_pid == 1)
73690af4afaSJohn Baldwin 					ps->ps_flag &= ~PS_NOCLDWAIT;
7376626c604SJulian Elischer 				else
73890af4afaSJohn Baldwin 					ps->ps_flag |= PS_NOCLDWAIT;
739245f17d4SJoerg Wunsch 			} else
74090af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_NOCLDWAIT;
741ba1551caSIan Dowse 			if (ps->ps_sigact[_SIG_IDX(SIGCHLD)] == SIG_IGN)
74290af4afaSJohn Baldwin 				ps->ps_flag |= PS_CLDSIGIGN;
743ba1551caSIan Dowse 			else
74490af4afaSJohn Baldwin 				ps->ps_flag &= ~PS_CLDSIGIGN;
745df8bae1dSRodney W. Grimes 		}
746df8bae1dSRodney W. Grimes 		/*
74790af4afaSJohn Baldwin 		 * Set bit in ps_sigignore for signals that are set to SIG_IGN,
7482c42a146SMarcel Moolenaar 		 * and for signals set to SIG_DFL where the default is to
74990af4afaSJohn Baldwin 		 * ignore. However, don't put SIGCONT in ps_sigignore, as we
7502c42a146SMarcel Moolenaar 		 * have to restart the process.
751df8bae1dSRodney W. Grimes 		 */
7522c42a146SMarcel Moolenaar 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
7532c42a146SMarcel Moolenaar 		    (sigprop(sig) & SA_IGNORE &&
7542c42a146SMarcel Moolenaar 		     ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL)) {
7552c42a146SMarcel Moolenaar 			/* never to be seen again */
7569104847fSDavid Xu 			sigqueue_delete_proc(p, sig);
7572c42a146SMarcel Moolenaar 			if (sig != SIGCONT)
7582c42a146SMarcel Moolenaar 				/* easier in psignal */
75990af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
76090af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
761645682fdSLuoqi Chen 		} else {
76290af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigignore, sig);
7632c42a146SMarcel Moolenaar 			if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL)
76490af4afaSJohn Baldwin 				SIGDELSET(ps->ps_sigcatch, sig);
7652c42a146SMarcel Moolenaar 			else
76690af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigcatch, sig);
7672c42a146SMarcel Moolenaar 		}
76823eeeff7SPeter Wemm #ifdef COMPAT_FREEBSD4
76923eeeff7SPeter Wemm 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
77023eeeff7SPeter Wemm 		    ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL ||
77123eeeff7SPeter Wemm 		    (flags & KSA_FREEBSD4) == 0)
77223eeeff7SPeter Wemm 			SIGDELSET(ps->ps_freebsd4, sig);
77323eeeff7SPeter Wemm 		else
77423eeeff7SPeter Wemm 			SIGADDSET(ps->ps_freebsd4, sig);
77523eeeff7SPeter Wemm #endif
776e8ebc08fSPeter Wemm #ifdef COMPAT_43
777645682fdSLuoqi Chen 		if (ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN ||
77823eeeff7SPeter Wemm 		    ps->ps_sigact[_SIG_IDX(sig)] == SIG_DFL ||
77923eeeff7SPeter Wemm 		    (flags & KSA_OSIGSET) == 0)
780645682fdSLuoqi Chen 			SIGDELSET(ps->ps_osigset, sig);
781645682fdSLuoqi Chen 		else
782645682fdSLuoqi Chen 			SIGADDSET(ps->ps_osigset, sig);
783e8ebc08fSPeter Wemm #endif
784df8bae1dSRodney W. Grimes 	}
78590af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
786628d2653SJohn Baldwin 	PROC_UNLOCK(p);
7872c42a146SMarcel Moolenaar 	return (0);
7882c42a146SMarcel Moolenaar }
7892c42a146SMarcel Moolenaar 
7902c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
7912c42a146SMarcel Moolenaar struct sigaction_args {
7922c42a146SMarcel Moolenaar 	int	sig;
7932c42a146SMarcel Moolenaar 	struct	sigaction *act;
7942c42a146SMarcel Moolenaar 	struct	sigaction *oact;
7952c42a146SMarcel Moolenaar };
7962c42a146SMarcel Moolenaar #endif
7972c42a146SMarcel Moolenaar int
798b40ce416SJulian Elischer sigaction(td, uap)
799b40ce416SJulian Elischer 	struct thread *td;
8002c42a146SMarcel Moolenaar 	register struct sigaction_args *uap;
8012c42a146SMarcel Moolenaar {
8022c42a146SMarcel Moolenaar 	struct sigaction act, oact;
8032c42a146SMarcel Moolenaar 	register struct sigaction *actp, *oactp;
8042c42a146SMarcel Moolenaar 	int error;
8052c42a146SMarcel Moolenaar 
8066f841fb7SMarcel Moolenaar 	actp = (uap->act != NULL) ? &act : NULL;
8076f841fb7SMarcel Moolenaar 	oactp = (uap->oact != NULL) ? &oact : NULL;
8082c42a146SMarcel Moolenaar 	if (actp) {
8096f841fb7SMarcel Moolenaar 		error = copyin(uap->act, actp, sizeof(act));
8102c42a146SMarcel Moolenaar 		if (error)
81144443757STim J. Robbins 			return (error);
8122c42a146SMarcel Moolenaar 	}
8138f19eb88SIan Dowse 	error = kern_sigaction(td, uap->sig, actp, oactp, 0);
81425d6dc06SJohn Baldwin 	if (oactp && !error)
8156f841fb7SMarcel Moolenaar 		error = copyout(oactp, uap->oact, sizeof(oact));
8162c42a146SMarcel Moolenaar 	return (error);
8172c42a146SMarcel Moolenaar }
8182c42a146SMarcel Moolenaar 
81923eeeff7SPeter Wemm #ifdef COMPAT_FREEBSD4
82023eeeff7SPeter Wemm #ifndef _SYS_SYSPROTO_H_
82123eeeff7SPeter Wemm struct freebsd4_sigaction_args {
82223eeeff7SPeter Wemm 	int	sig;
82323eeeff7SPeter Wemm 	struct	sigaction *act;
82423eeeff7SPeter Wemm 	struct	sigaction *oact;
82523eeeff7SPeter Wemm };
82623eeeff7SPeter Wemm #endif
82723eeeff7SPeter Wemm int
82823eeeff7SPeter Wemm freebsd4_sigaction(td, uap)
82923eeeff7SPeter Wemm 	struct thread *td;
83023eeeff7SPeter Wemm 	register struct freebsd4_sigaction_args *uap;
83123eeeff7SPeter Wemm {
83223eeeff7SPeter Wemm 	struct sigaction act, oact;
83323eeeff7SPeter Wemm 	register struct sigaction *actp, *oactp;
83423eeeff7SPeter Wemm 	int error;
83523eeeff7SPeter Wemm 
83623eeeff7SPeter Wemm 
83723eeeff7SPeter Wemm 	actp = (uap->act != NULL) ? &act : NULL;
83823eeeff7SPeter Wemm 	oactp = (uap->oact != NULL) ? &oact : NULL;
83923eeeff7SPeter Wemm 	if (actp) {
84023eeeff7SPeter Wemm 		error = copyin(uap->act, actp, sizeof(act));
84123eeeff7SPeter Wemm 		if (error)
84244443757STim J. Robbins 			return (error);
84323eeeff7SPeter Wemm 	}
84423eeeff7SPeter Wemm 	error = kern_sigaction(td, uap->sig, actp, oactp, KSA_FREEBSD4);
845a14e1189SJohn Baldwin 	if (oactp && !error)
84623eeeff7SPeter Wemm 		error = copyout(oactp, uap->oact, sizeof(oact));
84723eeeff7SPeter Wemm 	return (error);
84823eeeff7SPeter Wemm }
84923eeeff7SPeter Wemm #endif	/* COMAPT_FREEBSD4 */
85023eeeff7SPeter Wemm 
85131c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
8522c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
8532c42a146SMarcel Moolenaar struct osigaction_args {
8542c42a146SMarcel Moolenaar 	int	signum;
8552c42a146SMarcel Moolenaar 	struct	osigaction *nsa;
8562c42a146SMarcel Moolenaar 	struct	osigaction *osa;
8572c42a146SMarcel Moolenaar };
8582c42a146SMarcel Moolenaar #endif
8592c42a146SMarcel Moolenaar int
860b40ce416SJulian Elischer osigaction(td, uap)
861b40ce416SJulian Elischer 	struct thread *td;
8622c42a146SMarcel Moolenaar 	register struct osigaction_args *uap;
8632c42a146SMarcel Moolenaar {
8642c42a146SMarcel Moolenaar 	struct osigaction sa;
8652c42a146SMarcel Moolenaar 	struct sigaction nsa, osa;
8662c42a146SMarcel Moolenaar 	register struct sigaction *nsap, *osap;
8672c42a146SMarcel Moolenaar 	int error;
8682c42a146SMarcel Moolenaar 
8696f841fb7SMarcel Moolenaar 	if (uap->signum <= 0 || uap->signum >= ONSIG)
8706f841fb7SMarcel Moolenaar 		return (EINVAL);
871fb99ab88SMatthew Dillon 
8726f841fb7SMarcel Moolenaar 	nsap = (uap->nsa != NULL) ? &nsa : NULL;
8736f841fb7SMarcel Moolenaar 	osap = (uap->osa != NULL) ? &osa : NULL;
874fb99ab88SMatthew Dillon 
8752c42a146SMarcel Moolenaar 	if (nsap) {
8766f841fb7SMarcel Moolenaar 		error = copyin(uap->nsa, &sa, sizeof(sa));
8772c42a146SMarcel Moolenaar 		if (error)
87844443757STim J. Robbins 			return (error);
8792c42a146SMarcel Moolenaar 		nsap->sa_handler = sa.sa_handler;
8802c42a146SMarcel Moolenaar 		nsap->sa_flags = sa.sa_flags;
8812c42a146SMarcel Moolenaar 		OSIG2SIG(sa.sa_mask, nsap->sa_mask);
8822c42a146SMarcel Moolenaar 	}
88323eeeff7SPeter Wemm 	error = kern_sigaction(td, uap->signum, nsap, osap, KSA_OSIGSET);
8842c42a146SMarcel Moolenaar 	if (osap && !error) {
8852c42a146SMarcel Moolenaar 		sa.sa_handler = osap->sa_handler;
8862c42a146SMarcel Moolenaar 		sa.sa_flags = osap->sa_flags;
8872c42a146SMarcel Moolenaar 		SIG2OSIG(osap->sa_mask, sa.sa_mask);
8886f841fb7SMarcel Moolenaar 		error = copyout(&sa, uap->osa, sizeof(sa));
8892c42a146SMarcel Moolenaar 	}
8902c42a146SMarcel Moolenaar 	return (error);
8912c42a146SMarcel Moolenaar }
89223eeeff7SPeter Wemm 
89373dbd3daSJohn Baldwin #if !defined(__i386__)
89423eeeff7SPeter Wemm /* Avoid replicating the same stub everywhere */
89523eeeff7SPeter Wemm int
89623eeeff7SPeter Wemm osigreturn(td, uap)
89723eeeff7SPeter Wemm 	struct thread *td;
89823eeeff7SPeter Wemm 	struct osigreturn_args *uap;
89923eeeff7SPeter Wemm {
90023eeeff7SPeter Wemm 
90123eeeff7SPeter Wemm 	return (nosys(td, (struct nosys_args *)uap));
90223eeeff7SPeter Wemm }
90323eeeff7SPeter Wemm #endif
90431c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
905df8bae1dSRodney W. Grimes 
906df8bae1dSRodney W. Grimes /*
907df8bae1dSRodney W. Grimes  * Initialize signal state for process 0;
908df8bae1dSRodney W. Grimes  * set to ignore signals that are ignored by default.
909df8bae1dSRodney W. Grimes  */
910df8bae1dSRodney W. Grimes void
911df8bae1dSRodney W. Grimes siginit(p)
912df8bae1dSRodney W. Grimes 	struct proc *p;
913df8bae1dSRodney W. Grimes {
914df8bae1dSRodney W. Grimes 	register int i;
91590af4afaSJohn Baldwin 	struct sigacts *ps;
916df8bae1dSRodney W. Grimes 
917628d2653SJohn Baldwin 	PROC_LOCK(p);
91890af4afaSJohn Baldwin 	ps = p->p_sigacts;
91990af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
9202c42a146SMarcel Moolenaar 	for (i = 1; i <= NSIG; i++)
9212c42a146SMarcel Moolenaar 		if (sigprop(i) & SA_IGNORE && i != SIGCONT)
92290af4afaSJohn Baldwin 			SIGADDSET(ps->ps_sigignore, i);
92390af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
924628d2653SJohn Baldwin 	PROC_UNLOCK(p);
925df8bae1dSRodney W. Grimes }
926df8bae1dSRodney W. Grimes 
927df8bae1dSRodney W. Grimes /*
928df8bae1dSRodney W. Grimes  * Reset signals for an exec of the specified process.
929df8bae1dSRodney W. Grimes  */
930df8bae1dSRodney W. Grimes void
931a30ec4b9SDavid Xu execsigs(struct proc *p)
932df8bae1dSRodney W. Grimes {
933a30ec4b9SDavid Xu 	struct sigacts *ps;
934a30ec4b9SDavid Xu 	int sig;
935a30ec4b9SDavid Xu 	struct thread *td;
936df8bae1dSRodney W. Grimes 
937df8bae1dSRodney W. Grimes 	/*
938df8bae1dSRodney W. Grimes 	 * Reset caught signals.  Held signals remain held
9394093529dSJeff Roberson 	 * through td_sigmask (unless they were caught,
940df8bae1dSRodney W. Grimes 	 * and are now ignored by default).
941df8bae1dSRodney W. Grimes 	 */
9429b3b1c5fSJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
943a30ec4b9SDavid Xu 	td = FIRST_THREAD_IN_PROC(p);
944628d2653SJohn Baldwin 	ps = p->p_sigacts;
94590af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
94690af4afaSJohn Baldwin 	while (SIGNOTEMPTY(ps->ps_sigcatch)) {
94790af4afaSJohn Baldwin 		sig = sig_ffs(&ps->ps_sigcatch);
94890af4afaSJohn Baldwin 		SIGDELSET(ps->ps_sigcatch, sig);
9492c42a146SMarcel Moolenaar 		if (sigprop(sig) & SA_IGNORE) {
9502c42a146SMarcel Moolenaar 			if (sig != SIGCONT)
95190af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
9529104847fSDavid Xu 			sigqueue_delete_proc(p, sig);
953df8bae1dSRodney W. Grimes 		}
9542c42a146SMarcel Moolenaar 		ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
955df8bae1dSRodney W. Grimes 	}
956df8bae1dSRodney W. Grimes 	/*
957df8bae1dSRodney W. Grimes 	 * Reset stack state to the user stack.
958df8bae1dSRodney W. Grimes 	 * Clear set of signals caught on the signal stack.
959df8bae1dSRodney W. Grimes 	 */
960a30ec4b9SDavid Xu 	td->td_sigstk.ss_flags = SS_DISABLE;
961a30ec4b9SDavid Xu 	td->td_sigstk.ss_size = 0;
962a30ec4b9SDavid Xu 	td->td_sigstk.ss_sp = 0;
963a30ec4b9SDavid Xu 	td->td_pflags &= ~TDP_ALTSTACK;
96480e907a1SPeter Wemm 	/*
96580e907a1SPeter Wemm 	 * Reset no zombies if child dies flag as Solaris does.
96680e907a1SPeter Wemm 	 */
96790af4afaSJohn Baldwin 	ps->ps_flag &= ~(PS_NOCLDWAIT | PS_CLDSIGIGN);
968c7fd62daSDavid Malone 	if (ps->ps_sigact[_SIG_IDX(SIGCHLD)] == SIG_IGN)
969c7fd62daSDavid Malone 		ps->ps_sigact[_SIG_IDX(SIGCHLD)] = SIG_DFL;
97090af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
971df8bae1dSRodney W. Grimes }
972df8bae1dSRodney W. Grimes 
973df8bae1dSRodney W. Grimes /*
974e77daab1SJohn Baldwin  * kern_sigprocmask()
9757c8fdcbdSMatthew Dillon  *
976628d2653SJohn Baldwin  *	Manipulate signal mask.
977df8bae1dSRodney W. Grimes  */
978e77daab1SJohn Baldwin int
979e77daab1SJohn Baldwin kern_sigprocmask(td, how, set, oset, old)
9804093529dSJeff Roberson 	struct thread *td;
9812c42a146SMarcel Moolenaar 	int how;
9822c42a146SMarcel Moolenaar 	sigset_t *set, *oset;
983645682fdSLuoqi Chen 	int old;
9842c42a146SMarcel Moolenaar {
9852c42a146SMarcel Moolenaar 	int error;
9862c42a146SMarcel Moolenaar 
9874093529dSJeff Roberson 	PROC_LOCK(td->td_proc);
9882c42a146SMarcel Moolenaar 	if (oset != NULL)
9894093529dSJeff Roberson 		*oset = td->td_sigmask;
9902c42a146SMarcel Moolenaar 
9912c42a146SMarcel Moolenaar 	error = 0;
9922c42a146SMarcel Moolenaar 	if (set != NULL) {
9932c42a146SMarcel Moolenaar 		switch (how) {
9942c42a146SMarcel Moolenaar 		case SIG_BLOCK:
995645682fdSLuoqi Chen 			SIG_CANTMASK(*set);
9964093529dSJeff Roberson 			SIGSETOR(td->td_sigmask, *set);
9972c42a146SMarcel Moolenaar 			break;
9982c42a146SMarcel Moolenaar 		case SIG_UNBLOCK:
9994093529dSJeff Roberson 			SIGSETNAND(td->td_sigmask, *set);
10004093529dSJeff Roberson 			signotify(td);
10012c42a146SMarcel Moolenaar 			break;
10022c42a146SMarcel Moolenaar 		case SIG_SETMASK:
1003645682fdSLuoqi Chen 			SIG_CANTMASK(*set);
1004645682fdSLuoqi Chen 			if (old)
10054093529dSJeff Roberson 				SIGSETLO(td->td_sigmask, *set);
1006645682fdSLuoqi Chen 			else
10074093529dSJeff Roberson 				td->td_sigmask = *set;
10084093529dSJeff Roberson 			signotify(td);
10092c42a146SMarcel Moolenaar 			break;
10102c42a146SMarcel Moolenaar 		default:
10112c42a146SMarcel Moolenaar 			error = EINVAL;
10122c42a146SMarcel Moolenaar 			break;
10132c42a146SMarcel Moolenaar 		}
10142c42a146SMarcel Moolenaar 	}
10154093529dSJeff Roberson 	PROC_UNLOCK(td->td_proc);
10162c42a146SMarcel Moolenaar 	return (error);
10172c42a146SMarcel Moolenaar }
10182c42a146SMarcel Moolenaar 
1019d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1020df8bae1dSRodney W. Grimes struct sigprocmask_args {
1021df8bae1dSRodney W. Grimes 	int	how;
10222c42a146SMarcel Moolenaar 	const sigset_t *set;
10232c42a146SMarcel Moolenaar 	sigset_t *oset;
1024df8bae1dSRodney W. Grimes };
1025d2d3e875SBruce Evans #endif
102626f9a767SRodney W. Grimes int
1027b40ce416SJulian Elischer sigprocmask(td, uap)
1028b40ce416SJulian Elischer 	register struct thread *td;
1029df8bae1dSRodney W. Grimes 	struct sigprocmask_args *uap;
1030df8bae1dSRodney W. Grimes {
10312c42a146SMarcel Moolenaar 	sigset_t set, oset;
10322c42a146SMarcel Moolenaar 	sigset_t *setp, *osetp;
10332c42a146SMarcel Moolenaar 	int error;
1034df8bae1dSRodney W. Grimes 
10356f841fb7SMarcel Moolenaar 	setp = (uap->set != NULL) ? &set : NULL;
10366f841fb7SMarcel Moolenaar 	osetp = (uap->oset != NULL) ? &oset : NULL;
10372c42a146SMarcel Moolenaar 	if (setp) {
10386f841fb7SMarcel Moolenaar 		error = copyin(uap->set, setp, sizeof(set));
10392c42a146SMarcel Moolenaar 		if (error)
10402c42a146SMarcel Moolenaar 			return (error);
1041df8bae1dSRodney W. Grimes 	}
1042e77daab1SJohn Baldwin 	error = kern_sigprocmask(td, uap->how, setp, osetp, 0);
10432c42a146SMarcel Moolenaar 	if (osetp && !error) {
10446f841fb7SMarcel Moolenaar 		error = copyout(osetp, uap->oset, sizeof(oset));
10452c42a146SMarcel Moolenaar 	}
10462c42a146SMarcel Moolenaar 	return (error);
10472c42a146SMarcel Moolenaar }
10482c42a146SMarcel Moolenaar 
104931c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
10502c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
10512c42a146SMarcel Moolenaar struct osigprocmask_args {
10522c42a146SMarcel Moolenaar 	int	how;
10532c42a146SMarcel Moolenaar 	osigset_t mask;
10542c42a146SMarcel Moolenaar };
10552c42a146SMarcel Moolenaar #endif
10562c42a146SMarcel Moolenaar int
1057b40ce416SJulian Elischer osigprocmask(td, uap)
1058b40ce416SJulian Elischer 	register struct thread *td;
10592c42a146SMarcel Moolenaar 	struct osigprocmask_args *uap;
10602c42a146SMarcel Moolenaar {
10612c42a146SMarcel Moolenaar 	sigset_t set, oset;
10622c42a146SMarcel Moolenaar 	int error;
10632c42a146SMarcel Moolenaar 
10642c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
1065e77daab1SJohn Baldwin 	error = kern_sigprocmask(td, uap->how, &set, &oset, 1);
1066b40ce416SJulian Elischer 	SIG2OSIG(oset, td->td_retval[0]);
1067df8bae1dSRodney W. Grimes 	return (error);
1068df8bae1dSRodney W. Grimes }
106931c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1070df8bae1dSRodney W. Grimes 
107126f9a767SRodney W. Grimes int
1072a447cd8bSJeff Roberson sigwait(struct thread *td, struct sigwait_args *uap)
1073a447cd8bSJeff Roberson {
10749104847fSDavid Xu 	ksiginfo_t ksi;
1075a447cd8bSJeff Roberson 	sigset_t set;
1076a447cd8bSJeff Roberson 	int error;
1077a447cd8bSJeff Roberson 
1078a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
107936939a0aSDavid Xu 	if (error) {
108036939a0aSDavid Xu 		td->td_retval[0] = error;
108136939a0aSDavid Xu 		return (0);
108236939a0aSDavid Xu 	}
1083a447cd8bSJeff Roberson 
10849104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, NULL);
108536939a0aSDavid Xu 	if (error) {
108636939a0aSDavid Xu 		if (error == ERESTART)
1087a447cd8bSJeff Roberson 			return (error);
108836939a0aSDavid Xu 		td->td_retval[0] = error;
108936939a0aSDavid Xu 		return (0);
109036939a0aSDavid Xu 	}
1091a447cd8bSJeff Roberson 
10929104847fSDavid Xu 	error = copyout(&ksi.ksi_signo, uap->sig, sizeof(ksi.ksi_signo));
109336939a0aSDavid Xu 	td->td_retval[0] = error;
109436939a0aSDavid Xu 	return (0);
1095a447cd8bSJeff Roberson }
10960c14ff0eSRobert Watson 
1097a447cd8bSJeff Roberson int
1098a447cd8bSJeff Roberson sigtimedwait(struct thread *td, struct sigtimedwait_args *uap)
1099a447cd8bSJeff Roberson {
1100a447cd8bSJeff Roberson 	struct timespec ts;
1101a447cd8bSJeff Roberson 	struct timespec *timeout;
1102a447cd8bSJeff Roberson 	sigset_t set;
11039104847fSDavid Xu 	ksiginfo_t ksi;
1104a447cd8bSJeff Roberson 	int error;
1105a447cd8bSJeff Roberson 
1106a447cd8bSJeff Roberson 	if (uap->timeout) {
1107a447cd8bSJeff Roberson 		error = copyin(uap->timeout, &ts, sizeof(ts));
1108a447cd8bSJeff Roberson 		if (error)
1109a447cd8bSJeff Roberson 			return (error);
1110a447cd8bSJeff Roberson 
1111a447cd8bSJeff Roberson 		timeout = &ts;
1112a447cd8bSJeff Roberson 	} else
1113a447cd8bSJeff Roberson 		timeout = NULL;
1114a447cd8bSJeff Roberson 
1115a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
1116a447cd8bSJeff Roberson 	if (error)
1117a447cd8bSJeff Roberson 		return (error);
1118a447cd8bSJeff Roberson 
11199104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, timeout);
1120a447cd8bSJeff Roberson 	if (error)
1121a447cd8bSJeff Roberson 		return (error);
11229dde3bc9SDavid Xu 
1123418228dfSDavid Xu 	if (uap->info)
11249104847fSDavid Xu 		error = copyout(&ksi.ksi_info, uap->info, sizeof(siginfo_t));
11259104847fSDavid Xu 
11269104847fSDavid Xu 	if (error == 0)
11279104847fSDavid Xu 		td->td_retval[0] = ksi.ksi_signo;
1128a447cd8bSJeff Roberson 	return (error);
1129a447cd8bSJeff Roberson }
1130a447cd8bSJeff Roberson 
1131a447cd8bSJeff Roberson int
1132a447cd8bSJeff Roberson sigwaitinfo(struct thread *td, struct sigwaitinfo_args *uap)
1133a447cd8bSJeff Roberson {
11349104847fSDavid Xu 	ksiginfo_t ksi;
1135a447cd8bSJeff Roberson 	sigset_t set;
1136a447cd8bSJeff Roberson 	int error;
1137a447cd8bSJeff Roberson 
1138a447cd8bSJeff Roberson 	error = copyin(uap->set, &set, sizeof(set));
1139a447cd8bSJeff Roberson 	if (error)
1140a447cd8bSJeff Roberson 		return (error);
1141a447cd8bSJeff Roberson 
11429104847fSDavid Xu 	error = kern_sigtimedwait(td, set, &ksi, NULL);
1143a447cd8bSJeff Roberson 	if (error)
1144a447cd8bSJeff Roberson 		return (error);
1145a447cd8bSJeff Roberson 
1146418228dfSDavid Xu 	if (uap->info)
11479104847fSDavid Xu 		error = copyout(&ksi.ksi_info, uap->info, sizeof(siginfo_t));
11489104847fSDavid Xu 
11499104847fSDavid Xu 	if (error == 0)
11509104847fSDavid Xu 		td->td_retval[0] = ksi.ksi_signo;
1151a447cd8bSJeff Roberson 	return (error);
1152a447cd8bSJeff Roberson }
1153a447cd8bSJeff Roberson 
1154c6511aeaSDavid Xu int
11559104847fSDavid Xu kern_sigtimedwait(struct thread *td, sigset_t waitset, ksiginfo_t *ksi,
1156a447cd8bSJeff Roberson 	struct timespec *timeout)
1157a447cd8bSJeff Roberson {
11583074d1b4SDavid Xu 	struct sigacts *ps;
11596675b36eSDavid Xu 	sigset_t savedmask;
1160a447cd8bSJeff Roberson 	struct proc *p;
11611089f031SDavid Xu 	int error, sig, hz, i, timevalid = 0;
11621089f031SDavid Xu 	struct timespec rts, ets, ts;
11631089f031SDavid Xu 	struct timeval tv;
1164a447cd8bSJeff Roberson 
1165a447cd8bSJeff Roberson 	p = td->td_proc;
1166a447cd8bSJeff Roberson 	error = 0;
1167a447cd8bSJeff Roberson 	sig = 0;
11689b73d239SMatt Jacob 	ets.tv_sec = 0;
11699b73d239SMatt Jacob 	ets.tv_nsec = 0;
11703074d1b4SDavid Xu 	SIG_CANTMASK(waitset);
1171a447cd8bSJeff Roberson 
1172a447cd8bSJeff Roberson 	PROC_LOCK(p);
1173a447cd8bSJeff Roberson 	ps = p->p_sigacts;
11743074d1b4SDavid Xu 	savedmask = td->td_sigmask;
11751089f031SDavid Xu 	if (timeout) {
11761089f031SDavid Xu 		if (timeout->tv_nsec >= 0 && timeout->tv_nsec < 1000000000) {
11771089f031SDavid Xu 			timevalid = 1;
11781089f031SDavid Xu 			getnanouptime(&rts);
11791089f031SDavid Xu 		 	ets = rts;
11801089f031SDavid Xu 			timespecadd(&ets, timeout);
11811089f031SDavid Xu 		}
11821089f031SDavid Xu 	}
11833074d1b4SDavid Xu 
11847e0221a2SDavid Xu restart:
11853074d1b4SDavid Xu 	for (i = 1; i <= _SIG_MAXSIG; ++i) {
11863074d1b4SDavid Xu 		if (!SIGISMEMBER(waitset, i))
11873074d1b4SDavid Xu 			continue;
11887e0221a2SDavid Xu 		if (!SIGISMEMBER(td->td_sigqueue.sq_signals, i)) {
11897e0221a2SDavid Xu 			if (SIGISMEMBER(p->p_sigqueue.sq_signals, i)) {
11907e0221a2SDavid Xu 				sigqueue_move(&p->p_sigqueue,
11917e0221a2SDavid Xu 					&td->td_sigqueue, i);
11927e0221a2SDavid Xu 			} else
11937e0221a2SDavid Xu 				continue;
11947e0221a2SDavid Xu 		}
11957e0221a2SDavid Xu 
11963074d1b4SDavid Xu 		SIGFILLSET(td->td_sigmask);
11973074d1b4SDavid Xu 		SIG_CANTMASK(td->td_sigmask);
11983074d1b4SDavid Xu 		SIGDELSET(td->td_sigmask, i);
11993074d1b4SDavid Xu 		mtx_lock(&ps->ps_mtx);
1200f33a947bSKonstantin Belousov 		sig = cursig(td, SIG_STOP_ALLOWED);
12013074d1b4SDavid Xu 		mtx_unlock(&ps->ps_mtx);
12026675b36eSDavid Xu 		if (sig)
1203a447cd8bSJeff Roberson 			goto out;
12047e0221a2SDavid Xu 		else {
12057e0221a2SDavid Xu 			/*
12067e0221a2SDavid Xu 			 * Because cursig() may have stopped current thread,
12077e0221a2SDavid Xu 			 * after it is resumed, things may have already been
12087e0221a2SDavid Xu 			 * changed, it should rescan any pending signals.
12097e0221a2SDavid Xu 			 */
12107e0221a2SDavid Xu 			goto restart;
12113074d1b4SDavid Xu 		}
12127e0221a2SDavid Xu 	}
12137e0221a2SDavid Xu 
12143074d1b4SDavid Xu 	if (error)
12153074d1b4SDavid Xu 		goto out;
12163074d1b4SDavid Xu 
1217a447cd8bSJeff Roberson 	/*
1218a447cd8bSJeff Roberson 	 * POSIX says this must be checked after looking for pending
1219a447cd8bSJeff Roberson 	 * signals.
1220a447cd8bSJeff Roberson 	 */
1221a447cd8bSJeff Roberson 	if (timeout) {
12221089f031SDavid Xu 		if (!timevalid) {
1223a447cd8bSJeff Roberson 			error = EINVAL;
1224a447cd8bSJeff Roberson 			goto out;
1225a447cd8bSJeff Roberson 		}
12261089f031SDavid Xu 		getnanouptime(&rts);
12271089f031SDavid Xu 		if (timespeccmp(&rts, &ets, >=)) {
12283074d1b4SDavid Xu 			error = EAGAIN;
12293074d1b4SDavid Xu 			goto out;
12303074d1b4SDavid Xu 		}
12311089f031SDavid Xu 		ts = ets;
12321089f031SDavid Xu 		timespecsub(&ts, &rts);
12331089f031SDavid Xu 		TIMESPEC_TO_TIMEVAL(&tv, &ts);
1234a447cd8bSJeff Roberson 		hz = tvtohz(&tv);
1235a447cd8bSJeff Roberson 	} else
1236a447cd8bSJeff Roberson 		hz = 0;
1237a447cd8bSJeff Roberson 
12386675b36eSDavid Xu 	td->td_sigmask = savedmask;
12396675b36eSDavid Xu 	SIGSETNAND(td->td_sigmask, waitset);
12406675b36eSDavid Xu 	signotify(td);
124186b5e563SDag-Erling Smørgrav 	error = msleep(&ps, &p->p_mtx, PPAUSE|PCATCH, "sigwait", hz);
12421089f031SDavid Xu 	if (timeout) {
12431089f031SDavid Xu 		if (error == ERESTART) {
12441089f031SDavid Xu 			/* timeout can not be restarted. */
12453074d1b4SDavid Xu 			error = EINTR;
12461089f031SDavid Xu 		} else if (error == EAGAIN) {
12471089f031SDavid Xu 			/* will calculate timeout by ourself. */
12481089f031SDavid Xu 			error = 0;
12491089f031SDavid Xu 		}
12501089f031SDavid Xu 	}
12517e0221a2SDavid Xu 	goto restart;
12529dde3bc9SDavid Xu 
1253a447cd8bSJeff Roberson out:
12547e0221a2SDavid Xu 	td->td_sigmask = savedmask;
12557e0221a2SDavid Xu 	signotify(td);
1256a447cd8bSJeff Roberson 	if (sig) {
12575da49fcbSDavid Xu 		ksiginfo_init(ksi);
12589104847fSDavid Xu 		sigqueue_get(&td->td_sigqueue, sig, ksi);
12599104847fSDavid Xu 		ksi->ksi_signo = sig;
12605d217f17SJohn Birrell 
12615d217f17SJohn Birrell 		SDT_PROBE(proc, kernel, , signal_clear, sig, ksi, 0, 0, 0);
12625d217f17SJohn Birrell 
126356c06c4bSDavid Xu 		if (ksi->ksi_code == SI_TIMER)
126456c06c4bSDavid Xu 			itimer_accept(p, ksi->ksi_timerid, ksi);
12653074d1b4SDavid Xu 		error = 0;
12667e0221a2SDavid Xu 
12677e0221a2SDavid Xu #ifdef KTRACE
12687e0221a2SDavid Xu 		if (KTRPOINT(td, KTR_PSIG)) {
12697e0221a2SDavid Xu 			sig_t action;
12707e0221a2SDavid Xu 
12713074d1b4SDavid Xu 			mtx_lock(&ps->ps_mtx);
1272a447cd8bSJeff Roberson 			action = ps->ps_sigact[_SIG_IDX(sig)];
127390af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
12743074d1b4SDavid Xu 			ktrpsig(sig, action, &td->td_sigmask, 0);
12757e0221a2SDavid Xu 		}
1276a447cd8bSJeff Roberson #endif
12777b8d5e48SDavid Xu 		if (sig == SIGKILL)
12787e0221a2SDavid Xu 			sigexit(td, sig);
12793074d1b4SDavid Xu 	}
1280a447cd8bSJeff Roberson 	PROC_UNLOCK(p);
1281a447cd8bSJeff Roberson 	return (error);
1282a447cd8bSJeff Roberson }
1283a447cd8bSJeff Roberson 
12849104847fSDavid Xu #ifndef _SYS_SYSPROTO_H_
12859104847fSDavid Xu struct sigpending_args {
12869104847fSDavid Xu 	sigset_t	*set;
12879104847fSDavid Xu };
12889104847fSDavid Xu #endif
1289a447cd8bSJeff Roberson int
1290b40ce416SJulian Elischer sigpending(td, uap)
1291b40ce416SJulian Elischer 	struct thread *td;
1292df8bae1dSRodney W. Grimes 	struct sigpending_args *uap;
1293df8bae1dSRodney W. Grimes {
1294b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
12959104847fSDavid Xu 	sigset_t pending;
1296df8bae1dSRodney W. Grimes 
1297628d2653SJohn Baldwin 	PROC_LOCK(p);
12989104847fSDavid Xu 	pending = p->p_sigqueue.sq_signals;
12999104847fSDavid Xu 	SIGSETOR(pending, td->td_sigqueue.sq_signals);
1300628d2653SJohn Baldwin 	PROC_UNLOCK(p);
13019104847fSDavid Xu 	return (copyout(&pending, uap->set, sizeof(sigset_t)));
13022c42a146SMarcel Moolenaar }
13032c42a146SMarcel Moolenaar 
130431c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
13052c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
13062c42a146SMarcel Moolenaar struct osigpending_args {
13072c42a146SMarcel Moolenaar 	int	dummy;
13082c42a146SMarcel Moolenaar };
13092c42a146SMarcel Moolenaar #endif
13102c42a146SMarcel Moolenaar int
1311b40ce416SJulian Elischer osigpending(td, uap)
1312b40ce416SJulian Elischer 	struct thread *td;
13132c42a146SMarcel Moolenaar 	struct osigpending_args *uap;
13142c42a146SMarcel Moolenaar {
1315b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
13169104847fSDavid Xu 	sigset_t pending;
1317b40ce416SJulian Elischer 
1318628d2653SJohn Baldwin 	PROC_LOCK(p);
13199104847fSDavid Xu 	pending = p->p_sigqueue.sq_signals;
13209104847fSDavid Xu 	SIGSETOR(pending, td->td_sigqueue.sq_signals);
1321628d2653SJohn Baldwin 	PROC_UNLOCK(p);
13229104847fSDavid Xu 	SIG2OSIG(pending, td->td_retval[0]);
1323df8bae1dSRodney W. Grimes 	return (0);
1324df8bae1dSRodney W. Grimes }
132531c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1326df8bae1dSRodney W. Grimes 
13271930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1328df8bae1dSRodney W. Grimes /*
1329df8bae1dSRodney W. Grimes  * Generalized interface signal handler, 4.3-compatible.
1330df8bae1dSRodney W. Grimes  */
1331d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1332df8bae1dSRodney W. Grimes struct osigvec_args {
1333df8bae1dSRodney W. Grimes 	int	signum;
1334df8bae1dSRodney W. Grimes 	struct	sigvec *nsv;
1335df8bae1dSRodney W. Grimes 	struct	sigvec *osv;
1336df8bae1dSRodney W. Grimes };
1337d2d3e875SBruce Evans #endif
1338df8bae1dSRodney W. Grimes /* ARGSUSED */
133926f9a767SRodney W. Grimes int
1340b40ce416SJulian Elischer osigvec(td, uap)
1341b40ce416SJulian Elischer 	struct thread *td;
1342df8bae1dSRodney W. Grimes 	register struct osigvec_args *uap;
1343df8bae1dSRodney W. Grimes {
1344df8bae1dSRodney W. Grimes 	struct sigvec vec;
13452c42a146SMarcel Moolenaar 	struct sigaction nsa, osa;
13462c42a146SMarcel Moolenaar 	register struct sigaction *nsap, *osap;
13472c42a146SMarcel Moolenaar 	int error;
1348df8bae1dSRodney W. Grimes 
13496f841fb7SMarcel Moolenaar 	if (uap->signum <= 0 || uap->signum >= ONSIG)
13506f841fb7SMarcel Moolenaar 		return (EINVAL);
13516f841fb7SMarcel Moolenaar 	nsap = (uap->nsv != NULL) ? &nsa : NULL;
13526f841fb7SMarcel Moolenaar 	osap = (uap->osv != NULL) ? &osa : NULL;
13532c42a146SMarcel Moolenaar 	if (nsap) {
13546f841fb7SMarcel Moolenaar 		error = copyin(uap->nsv, &vec, sizeof(vec));
13552c42a146SMarcel Moolenaar 		if (error)
1356df8bae1dSRodney W. Grimes 			return (error);
13572c42a146SMarcel Moolenaar 		nsap->sa_handler = vec.sv_handler;
13582c42a146SMarcel Moolenaar 		OSIG2SIG(vec.sv_mask, nsap->sa_mask);
13592c42a146SMarcel Moolenaar 		nsap->sa_flags = vec.sv_flags;
13602c42a146SMarcel Moolenaar 		nsap->sa_flags ^= SA_RESTART;	/* opposite of SV_INTERRUPT */
1361df8bae1dSRodney W. Grimes 	}
13625edadff9SJohn Baldwin 	error = kern_sigaction(td, uap->signum, nsap, osap, KSA_OSIGSET);
13632c42a146SMarcel Moolenaar 	if (osap && !error) {
13642c42a146SMarcel Moolenaar 		vec.sv_handler = osap->sa_handler;
13652c42a146SMarcel Moolenaar 		SIG2OSIG(osap->sa_mask, vec.sv_mask);
13662c42a146SMarcel Moolenaar 		vec.sv_flags = osap->sa_flags;
13672c42a146SMarcel Moolenaar 		vec.sv_flags &= ~SA_NOCLDWAIT;
13682c42a146SMarcel Moolenaar 		vec.sv_flags ^= SA_RESTART;
13696f841fb7SMarcel Moolenaar 		error = copyout(&vec, uap->osv, sizeof(vec));
13702c42a146SMarcel Moolenaar 	}
13712c42a146SMarcel Moolenaar 	return (error);
1372df8bae1dSRodney W. Grimes }
1373df8bae1dSRodney W. Grimes 
1374d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1375df8bae1dSRodney W. Grimes struct osigblock_args {
1376df8bae1dSRodney W. Grimes 	int	mask;
1377df8bae1dSRodney W. Grimes };
1378d2d3e875SBruce Evans #endif
137926f9a767SRodney W. Grimes int
1380b40ce416SJulian Elischer osigblock(td, uap)
1381b40ce416SJulian Elischer 	register struct thread *td;
1382df8bae1dSRodney W. Grimes 	struct osigblock_args *uap;
1383df8bae1dSRodney W. Grimes {
1384b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
13852c42a146SMarcel Moolenaar 	sigset_t set;
1386df8bae1dSRodney W. Grimes 
13872c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
13882c42a146SMarcel Moolenaar 	SIG_CANTMASK(set);
1389628d2653SJohn Baldwin 	PROC_LOCK(p);
13904093529dSJeff Roberson 	SIG2OSIG(td->td_sigmask, td->td_retval[0]);
13914093529dSJeff Roberson 	SIGSETOR(td->td_sigmask, set);
1392628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1393df8bae1dSRodney W. Grimes 	return (0);
1394df8bae1dSRodney W. Grimes }
1395df8bae1dSRodney W. Grimes 
1396d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1397df8bae1dSRodney W. Grimes struct osigsetmask_args {
1398df8bae1dSRodney W. Grimes 	int	mask;
1399df8bae1dSRodney W. Grimes };
1400d2d3e875SBruce Evans #endif
140126f9a767SRodney W. Grimes int
1402b40ce416SJulian Elischer osigsetmask(td, uap)
1403b40ce416SJulian Elischer 	struct thread *td;
1404df8bae1dSRodney W. Grimes 	struct osigsetmask_args *uap;
1405df8bae1dSRodney W. Grimes {
1406b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
14072c42a146SMarcel Moolenaar 	sigset_t set;
1408df8bae1dSRodney W. Grimes 
14092c42a146SMarcel Moolenaar 	OSIG2SIG(uap->mask, set);
14102c42a146SMarcel Moolenaar 	SIG_CANTMASK(set);
1411628d2653SJohn Baldwin 	PROC_LOCK(p);
14124093529dSJeff Roberson 	SIG2OSIG(td->td_sigmask, td->td_retval[0]);
14134093529dSJeff Roberson 	SIGSETLO(td->td_sigmask, set);
14144093529dSJeff Roberson 	signotify(td);
1415628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1416df8bae1dSRodney W. Grimes 	return (0);
1417df8bae1dSRodney W. Grimes }
14181930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1419df8bae1dSRodney W. Grimes 
1420df8bae1dSRodney W. Grimes /*
1421873fbcd7SRobert Watson  * Suspend calling thread until signal, providing mask to be set in the
1422873fbcd7SRobert Watson  * meantime.
1423df8bae1dSRodney W. Grimes  */
1424d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1425df8bae1dSRodney W. Grimes struct sigsuspend_args {
14262c42a146SMarcel Moolenaar 	const sigset_t *sigmask;
1427df8bae1dSRodney W. Grimes };
1428d2d3e875SBruce Evans #endif
1429df8bae1dSRodney W. Grimes /* ARGSUSED */
143026f9a767SRodney W. Grimes int
1431b40ce416SJulian Elischer sigsuspend(td, uap)
1432b40ce416SJulian Elischer 	struct thread *td;
1433df8bae1dSRodney W. Grimes 	struct sigsuspend_args *uap;
1434df8bae1dSRodney W. Grimes {
14352c42a146SMarcel Moolenaar 	sigset_t mask;
14362c42a146SMarcel Moolenaar 	int error;
14372c42a146SMarcel Moolenaar 
14386f841fb7SMarcel Moolenaar 	error = copyin(uap->sigmask, &mask, sizeof(mask));
14392c42a146SMarcel Moolenaar 	if (error)
14402c42a146SMarcel Moolenaar 		return (error);
14418f19eb88SIan Dowse 	return (kern_sigsuspend(td, mask));
14428f19eb88SIan Dowse }
14438f19eb88SIan Dowse 
14448f19eb88SIan Dowse int
14458f19eb88SIan Dowse kern_sigsuspend(struct thread *td, sigset_t mask)
14468f19eb88SIan Dowse {
14478f19eb88SIan Dowse 	struct proc *p = td->td_proc;
1448df8bae1dSRodney W. Grimes 
1449df8bae1dSRodney W. Grimes 	/*
1450645682fdSLuoqi Chen 	 * When returning from sigsuspend, we want
1451df8bae1dSRodney W. Grimes 	 * the old mask to be restored after the
1452df8bae1dSRodney W. Grimes 	 * signal handler has finished.  Thus, we
1453df8bae1dSRodney W. Grimes 	 * save it here and mark the sigacts structure
1454df8bae1dSRodney W. Grimes 	 * to indicate this.
1455df8bae1dSRodney W. Grimes 	 */
1456628d2653SJohn Baldwin 	PROC_LOCK(p);
14574093529dSJeff Roberson 	td->td_oldsigmask = td->td_sigmask;
14585e26dcb5SJohn Baldwin 	td->td_pflags |= TDP_OLDMASK;
1459645682fdSLuoqi Chen 	SIG_CANTMASK(mask);
14604093529dSJeff Roberson 	td->td_sigmask = mask;
14614093529dSJeff Roberson 	signotify(td);
146286b5e563SDag-Erling Smørgrav 	while (msleep(&p->p_sigacts, &p->p_mtx, PPAUSE|PCATCH, "pause", 0) == 0)
14632c42a146SMarcel Moolenaar 		/* void */;
1464628d2653SJohn Baldwin 	PROC_UNLOCK(p);
14652c42a146SMarcel Moolenaar 	/* always return EINTR rather than ERESTART... */
14662c42a146SMarcel Moolenaar 	return (EINTR);
14672c42a146SMarcel Moolenaar }
14682c42a146SMarcel Moolenaar 
146931c8f3f0SMarcel Moolenaar #ifdef COMPAT_43	/* XXX - COMPAT_FBSD3 */
147097563428SAlexander Kabaev /*
147197563428SAlexander Kabaev  * Compatibility sigsuspend call for old binaries.  Note nonstandard calling
147297563428SAlexander Kabaev  * convention: libc stub passes mask, not pointer, to save a copyin.
147397563428SAlexander Kabaev  */
14742c42a146SMarcel Moolenaar #ifndef _SYS_SYSPROTO_H_
14752c42a146SMarcel Moolenaar struct osigsuspend_args {
14762c42a146SMarcel Moolenaar 	osigset_t mask;
14772c42a146SMarcel Moolenaar };
14782c42a146SMarcel Moolenaar #endif
14792c42a146SMarcel Moolenaar /* ARGSUSED */
14802c42a146SMarcel Moolenaar int
1481b40ce416SJulian Elischer osigsuspend(td, uap)
1482b40ce416SJulian Elischer 	struct thread *td;
14832c42a146SMarcel Moolenaar 	struct osigsuspend_args *uap;
14842c42a146SMarcel Moolenaar {
1485b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
1486645682fdSLuoqi Chen 	sigset_t mask;
14872c42a146SMarcel Moolenaar 
1488628d2653SJohn Baldwin 	PROC_LOCK(p);
14894093529dSJeff Roberson 	td->td_oldsigmask = td->td_sigmask;
14905e26dcb5SJohn Baldwin 	td->td_pflags |= TDP_OLDMASK;
1491645682fdSLuoqi Chen 	OSIG2SIG(uap->mask, mask);
1492645682fdSLuoqi Chen 	SIG_CANTMASK(mask);
14934093529dSJeff Roberson 	SIGSETLO(td->td_sigmask, mask);
14944093529dSJeff Roberson 	signotify(td);
149586b5e563SDag-Erling Smørgrav 	while (msleep(&p->p_sigacts, &p->p_mtx, PPAUSE|PCATCH, "opause", 0) == 0)
1496df8bae1dSRodney W. Grimes 		/* void */;
1497628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1498df8bae1dSRodney W. Grimes 	/* always return EINTR rather than ERESTART... */
1499df8bae1dSRodney W. Grimes 	return (EINTR);
1500df8bae1dSRodney W. Grimes }
150131c8f3f0SMarcel Moolenaar #endif /* COMPAT_43 */
1502df8bae1dSRodney W. Grimes 
15031930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1504d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1505df8bae1dSRodney W. Grimes struct osigstack_args {
1506df8bae1dSRodney W. Grimes 	struct	sigstack *nss;
1507df8bae1dSRodney W. Grimes 	struct	sigstack *oss;
1508df8bae1dSRodney W. Grimes };
1509d2d3e875SBruce Evans #endif
1510df8bae1dSRodney W. Grimes /* ARGSUSED */
151126f9a767SRodney W. Grimes int
1512b40ce416SJulian Elischer osigstack(td, uap)
1513b40ce416SJulian Elischer 	struct thread *td;
1514df8bae1dSRodney W. Grimes 	register struct osigstack_args *uap;
1515df8bae1dSRodney W. Grimes {
15165afe0c99SJohn Baldwin 	struct sigstack nss, oss;
1517fb99ab88SMatthew Dillon 	int error = 0;
1518fb99ab88SMatthew Dillon 
1519d034d459SMarcel Moolenaar 	if (uap->nss != NULL) {
15205afe0c99SJohn Baldwin 		error = copyin(uap->nss, &nss, sizeof(nss));
15215afe0c99SJohn Baldwin 		if (error)
15225afe0c99SJohn Baldwin 			return (error);
1523df8bae1dSRodney W. Grimes 	}
1524a30ec4b9SDavid Xu 	oss.ss_sp = td->td_sigstk.ss_sp;
15255afe0c99SJohn Baldwin 	oss.ss_onstack = sigonstack(cpu_getstack(td));
15265afe0c99SJohn Baldwin 	if (uap->nss != NULL) {
1527a30ec4b9SDavid Xu 		td->td_sigstk.ss_sp = nss.ss_sp;
1528a30ec4b9SDavid Xu 		td->td_sigstk.ss_size = 0;
1529a30ec4b9SDavid Xu 		td->td_sigstk.ss_flags |= nss.ss_onstack & SS_ONSTACK;
1530a30ec4b9SDavid Xu 		td->td_pflags |= TDP_ALTSTACK;
15315afe0c99SJohn Baldwin 	}
15325afe0c99SJohn Baldwin 	if (uap->oss != NULL)
15335afe0c99SJohn Baldwin 		error = copyout(&oss, uap->oss, sizeof(oss));
15345afe0c99SJohn Baldwin 
1535fb99ab88SMatthew Dillon 	return (error);
1536df8bae1dSRodney W. Grimes }
15371930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1538df8bae1dSRodney W. Grimes 
1539d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1540df8bae1dSRodney W. Grimes struct sigaltstack_args {
15412c42a146SMarcel Moolenaar 	stack_t	*ss;
15422c42a146SMarcel Moolenaar 	stack_t	*oss;
1543df8bae1dSRodney W. Grimes };
1544d2d3e875SBruce Evans #endif
1545df8bae1dSRodney W. Grimes /* ARGSUSED */
154626f9a767SRodney W. Grimes int
1547b40ce416SJulian Elischer sigaltstack(td, uap)
1548b40ce416SJulian Elischer 	struct thread *td;
1549df8bae1dSRodney W. Grimes 	register struct sigaltstack_args *uap;
1550df8bae1dSRodney W. Grimes {
15518f19eb88SIan Dowse 	stack_t ss, oss;
15528f19eb88SIan Dowse 	int error;
15538f19eb88SIan Dowse 
15548f19eb88SIan Dowse 	if (uap->ss != NULL) {
15558f19eb88SIan Dowse 		error = copyin(uap->ss, &ss, sizeof(ss));
15568f19eb88SIan Dowse 		if (error)
15578f19eb88SIan Dowse 			return (error);
15588f19eb88SIan Dowse 	}
15598f19eb88SIan Dowse 	error = kern_sigaltstack(td, (uap->ss != NULL) ? &ss : NULL,
15608f19eb88SIan Dowse 	    (uap->oss != NULL) ? &oss : NULL);
15618f19eb88SIan Dowse 	if (error)
15628f19eb88SIan Dowse 		return (error);
15638f19eb88SIan Dowse 	if (uap->oss != NULL)
15648f19eb88SIan Dowse 		error = copyout(&oss, uap->oss, sizeof(stack_t));
15658f19eb88SIan Dowse 	return (error);
15668f19eb88SIan Dowse }
15678f19eb88SIan Dowse 
15688f19eb88SIan Dowse int
15698f19eb88SIan Dowse kern_sigaltstack(struct thread *td, stack_t *ss, stack_t *oss)
15708f19eb88SIan Dowse {
1571b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
1572fb99ab88SMatthew Dillon 	int oonstack;
1573fb99ab88SMatthew Dillon 
1574b40ce416SJulian Elischer 	oonstack = sigonstack(cpu_getstack(td));
1575d034d459SMarcel Moolenaar 
15768f19eb88SIan Dowse 	if (oss != NULL) {
1577a30ec4b9SDavid Xu 		*oss = td->td_sigstk;
1578a30ec4b9SDavid Xu 		oss->ss_flags = (td->td_pflags & TDP_ALTSTACK)
1579d034d459SMarcel Moolenaar 		    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
1580df8bae1dSRodney W. Grimes 	}
1581d034d459SMarcel Moolenaar 
15828f19eb88SIan Dowse 	if (ss != NULL) {
1583a30ec4b9SDavid Xu 		if (oonstack)
1584cf60731bSJohn Baldwin 			return (EPERM);
1585a30ec4b9SDavid Xu 		if ((ss->ss_flags & ~SS_DISABLE) != 0)
1586cf60731bSJohn Baldwin 			return (EINVAL);
15878f19eb88SIan Dowse 		if (!(ss->ss_flags & SS_DISABLE)) {
15889104847fSDavid Xu 			if (ss->ss_size < p->p_sysent->sv_minsigstksz)
1589cf60731bSJohn Baldwin 				return (ENOMEM);
15909104847fSDavid Xu 
1591a30ec4b9SDavid Xu 			td->td_sigstk = *ss;
1592a30ec4b9SDavid Xu 			td->td_pflags |= TDP_ALTSTACK;
1593628d2653SJohn Baldwin 		} else {
1594a30ec4b9SDavid Xu 			td->td_pflags &= ~TDP_ALTSTACK;
1595628d2653SJohn Baldwin 		}
1596d034d459SMarcel Moolenaar 	}
1597cf60731bSJohn Baldwin 	return (0);
1598df8bae1dSRodney W. Grimes }
1599df8bae1dSRodney W. Grimes 
1600d93f860cSPoul-Henning Kamp /*
1601d93f860cSPoul-Henning Kamp  * Common code for kill process group/broadcast kill.
1602d93f860cSPoul-Henning Kamp  * cp is calling process.
1603d93f860cSPoul-Henning Kamp  */
160437c84183SPoul-Henning Kamp static int
16051a88a252SMaxim Sobolev killpg1(td, sig, pgid, all)
16069c1ab3e0SJohn Baldwin 	register struct thread *td;
16071a88a252SMaxim Sobolev 	int sig, pgid, all;
1608d93f860cSPoul-Henning Kamp {
1609d93f860cSPoul-Henning Kamp 	register struct proc *p;
1610d93f860cSPoul-Henning Kamp 	struct pgrp *pgrp;
1611d93f860cSPoul-Henning Kamp 	int nfound = 0;
1612d93f860cSPoul-Henning Kamp 
1613553629ebSJake Burkholder 	if (all) {
1614d93f860cSPoul-Henning Kamp 		/*
1615d93f860cSPoul-Henning Kamp 		 * broadcast
1616d93f860cSPoul-Henning Kamp 		 */
16171005a129SJohn Baldwin 		sx_slock(&allproc_lock);
16184f506694SXin LI 		FOREACH_PROC_IN_SYSTEM(p) {
1619628d2653SJohn Baldwin 			PROC_LOCK(p);
16209c1ab3e0SJohn Baldwin 			if (p->p_pid <= 1 || p->p_flag & P_SYSTEM ||
162195f16c1eSPaul Saab 			    p == td->td_proc || p->p_state == PRS_NEW) {
1622628d2653SJohn Baldwin 				PROC_UNLOCK(p);
1623628d2653SJohn Baldwin 				continue;
1624628d2653SJohn Baldwin 			}
16251a88a252SMaxim Sobolev 			if (p_cansignal(td, p, sig) == 0) {
1626d93f860cSPoul-Henning Kamp 				nfound++;
162733a9ed9dSJohn Baldwin 				if (sig)
16282c42a146SMarcel Moolenaar 					psignal(p, sig);
1629628d2653SJohn Baldwin 			}
163033a9ed9dSJohn Baldwin 			PROC_UNLOCK(p);
1631d93f860cSPoul-Henning Kamp 		}
16321005a129SJohn Baldwin 		sx_sunlock(&allproc_lock);
1633553629ebSJake Burkholder 	} else {
1634ba626c1dSJohn Baldwin 		sx_slock(&proctree_lock);
1635f591779bSSeigo Tanimura 		if (pgid == 0) {
1636d93f860cSPoul-Henning Kamp 			/*
1637d93f860cSPoul-Henning Kamp 			 * zero pgid means send to my process group.
1638d93f860cSPoul-Henning Kamp 			 */
16399c1ab3e0SJohn Baldwin 			pgrp = td->td_proc->p_pgrp;
1640f591779bSSeigo Tanimura 			PGRP_LOCK(pgrp);
1641f591779bSSeigo Tanimura 		} else {
1642d93f860cSPoul-Henning Kamp 			pgrp = pgfind(pgid);
1643f591779bSSeigo Tanimura 			if (pgrp == NULL) {
1644ba626c1dSJohn Baldwin 				sx_sunlock(&proctree_lock);
1645d93f860cSPoul-Henning Kamp 				return (ESRCH);
1646d93f860cSPoul-Henning Kamp 			}
1647f591779bSSeigo Tanimura 		}
1648ba626c1dSJohn Baldwin 		sx_sunlock(&proctree_lock);
16492e3c8fcbSPoul-Henning Kamp 		LIST_FOREACH(p, &pgrp->pg_members, p_pglist) {
1650628d2653SJohn Baldwin 			PROC_LOCK(p);
165195f16c1eSPaul Saab 			if (p->p_pid <= 1 || p->p_flag & P_SYSTEM ||
165295f16c1eSPaul Saab 				p->p_state == PRS_NEW ) {
1653628d2653SJohn Baldwin 				PROC_UNLOCK(p);
1654628d2653SJohn Baldwin 				continue;
1655628d2653SJohn Baldwin 			}
16561a88a252SMaxim Sobolev 			if (p_cansignal(td, p, sig) == 0) {
1657d93f860cSPoul-Henning Kamp 				nfound++;
165833a9ed9dSJohn Baldwin 				if (sig)
16592c42a146SMarcel Moolenaar 					psignal(p, sig);
1660628d2653SJohn Baldwin 			}
166133a9ed9dSJohn Baldwin 			PROC_UNLOCK(p);
1662d93f860cSPoul-Henning Kamp 		}
1663f591779bSSeigo Tanimura 		PGRP_UNLOCK(pgrp);
1664d93f860cSPoul-Henning Kamp 	}
1665d93f860cSPoul-Henning Kamp 	return (nfound ? 0 : ESRCH);
1666d93f860cSPoul-Henning Kamp }
1667d93f860cSPoul-Henning Kamp 
1668d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1669df8bae1dSRodney W. Grimes struct kill_args {
1670df8bae1dSRodney W. Grimes 	int	pid;
1671df8bae1dSRodney W. Grimes 	int	signum;
1672df8bae1dSRodney W. Grimes };
1673d2d3e875SBruce Evans #endif
1674df8bae1dSRodney W. Grimes /* ARGSUSED */
167526f9a767SRodney W. Grimes int
1676b40ce416SJulian Elischer kill(td, uap)
1677b40ce416SJulian Elischer 	register struct thread *td;
1678df8bae1dSRodney W. Grimes 	register struct kill_args *uap;
1679df8bae1dSRodney W. Grimes {
1680df8bae1dSRodney W. Grimes 	register struct proc *p;
168190af4afaSJohn Baldwin 	int error;
1682df8bae1dSRodney W. Grimes 
168314961ba7SRobert Watson 	AUDIT_ARG_SIGNUM(uap->signum);
168414961ba7SRobert Watson 	AUDIT_ARG_PID(uap->pid);
16856c1534a7SPeter Wemm 	if ((u_int)uap->signum > _SIG_MAXSIG)
1686df8bae1dSRodney W. Grimes 		return (EINVAL);
1687fb99ab88SMatthew Dillon 
1688df8bae1dSRodney W. Grimes 	if (uap->pid > 0) {
1689df8bae1dSRodney W. Grimes 		/* kill single process */
16900b011ea3SPawel Jakub Dawidek 		if ((p = pfind(uap->pid)) == NULL) {
169124b2151fSPawel Jakub Dawidek 			if ((p = zpfind(uap->pid)) == NULL)
169290af4afaSJohn Baldwin 				return (ESRCH);
16930b011ea3SPawel Jakub Dawidek 		}
169414961ba7SRobert Watson 		AUDIT_ARG_PROCESS(p);
16951a88a252SMaxim Sobolev 		error = p_cansignal(td, p, uap->signum);
169690af4afaSJohn Baldwin 		if (error == 0 && uap->signum)
1697df8bae1dSRodney W. Grimes 			psignal(p, uap->signum);
1698628d2653SJohn Baldwin 		PROC_UNLOCK(p);
169990af4afaSJohn Baldwin 		return (error);
1700df8bae1dSRodney W. Grimes 	}
1701df8bae1dSRodney W. Grimes 	switch (uap->pid) {
1702df8bae1dSRodney W. Grimes 	case -1:		/* broadcast signal */
17031a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, 0, 1));
1704df8bae1dSRodney W. Grimes 	case 0:			/* signal own process group */
17051a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, 0, 0));
1706df8bae1dSRodney W. Grimes 	default:		/* negative explicit process group */
17071a88a252SMaxim Sobolev 		return (killpg1(td, uap->signum, -uap->pid, 0));
1708df8bae1dSRodney W. Grimes 	}
170990af4afaSJohn Baldwin 	/* NOTREACHED */
1710df8bae1dSRodney W. Grimes }
1711df8bae1dSRodney W. Grimes 
17121930e303SPoul-Henning Kamp #if defined(COMPAT_43)
1713d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
1714df8bae1dSRodney W. Grimes struct okillpg_args {
1715df8bae1dSRodney W. Grimes 	int	pgid;
1716df8bae1dSRodney W. Grimes 	int	signum;
1717df8bae1dSRodney W. Grimes };
1718d2d3e875SBruce Evans #endif
1719df8bae1dSRodney W. Grimes /* ARGSUSED */
172026f9a767SRodney W. Grimes int
1721b40ce416SJulian Elischer okillpg(td, uap)
1722b40ce416SJulian Elischer 	struct thread *td;
1723df8bae1dSRodney W. Grimes 	register struct okillpg_args *uap;
1724df8bae1dSRodney W. Grimes {
1725df8bae1dSRodney W. Grimes 
172614961ba7SRobert Watson 	AUDIT_ARG_SIGNUM(uap->signum);
172714961ba7SRobert Watson 	AUDIT_ARG_PID(uap->pgid);
17286c1534a7SPeter Wemm 	if ((u_int)uap->signum > _SIG_MAXSIG)
1729df8bae1dSRodney W. Grimes 		return (EINVAL);
17309104847fSDavid Xu 
17311a88a252SMaxim Sobolev 	return (killpg1(td, uap->signum, uap->pgid, 0));
1732df8bae1dSRodney W. Grimes }
17331930e303SPoul-Henning Kamp #endif /* COMPAT_43 */
1734df8bae1dSRodney W. Grimes 
17359104847fSDavid Xu #ifndef _SYS_SYSPROTO_H_
17369104847fSDavid Xu struct sigqueue_args {
17379104847fSDavid Xu 	pid_t pid;
17389104847fSDavid Xu 	int signum;
17399104847fSDavid Xu 	/* union sigval */ void *value;
17409104847fSDavid Xu };
17419104847fSDavid Xu #endif
17429104847fSDavid Xu int
17439104847fSDavid Xu sigqueue(struct thread *td, struct sigqueue_args *uap)
17449104847fSDavid Xu {
17459104847fSDavid Xu 	ksiginfo_t ksi;
17469104847fSDavid Xu 	struct proc *p;
17479104847fSDavid Xu 	int error;
17489104847fSDavid Xu 
17499104847fSDavid Xu 	if ((u_int)uap->signum > _SIG_MAXSIG)
17509104847fSDavid Xu 		return (EINVAL);
17519104847fSDavid Xu 
17529104847fSDavid Xu 	/*
17539104847fSDavid Xu 	 * Specification says sigqueue can only send signal to
17549104847fSDavid Xu 	 * single process.
17559104847fSDavid Xu 	 */
17569104847fSDavid Xu 	if (uap->pid <= 0)
17579104847fSDavid Xu 		return (EINVAL);
17589104847fSDavid Xu 
17599104847fSDavid Xu 	if ((p = pfind(uap->pid)) == NULL) {
17609104847fSDavid Xu 		if ((p = zpfind(uap->pid)) == NULL)
17619104847fSDavid Xu 			return (ESRCH);
17629104847fSDavid Xu 	}
17639104847fSDavid Xu 	error = p_cansignal(td, p, uap->signum);
17649104847fSDavid Xu 	if (error == 0 && uap->signum != 0) {
17659104847fSDavid Xu 		ksiginfo_init(&ksi);
17669104847fSDavid Xu 		ksi.ksi_signo = uap->signum;
17679104847fSDavid Xu 		ksi.ksi_code = SI_QUEUE;
17689104847fSDavid Xu 		ksi.ksi_pid = td->td_proc->p_pid;
17699104847fSDavid Xu 		ksi.ksi_uid = td->td_ucred->cr_ruid;
17708f0371f1SDavid Xu 		ksi.ksi_value.sival_ptr = uap->value;
17716d7b314bSDavid Xu 		error = tdsignal(p, NULL, ksi.ksi_signo, &ksi);
17729104847fSDavid Xu 	}
17739104847fSDavid Xu 	PROC_UNLOCK(p);
17749104847fSDavid Xu 	return (error);
17759104847fSDavid Xu }
17769104847fSDavid Xu 
1777df8bae1dSRodney W. Grimes /*
1778df8bae1dSRodney W. Grimes  * Send a signal to a process group.
1779df8bae1dSRodney W. Grimes  */
1780df8bae1dSRodney W. Grimes void
17812c42a146SMarcel Moolenaar gsignal(pgid, sig)
17822c42a146SMarcel Moolenaar 	int pgid, sig;
1783df8bae1dSRodney W. Grimes {
1784df8bae1dSRodney W. Grimes 	struct pgrp *pgrp;
1785df8bae1dSRodney W. Grimes 
1786f591779bSSeigo Tanimura 	if (pgid != 0) {
1787ba626c1dSJohn Baldwin 		sx_slock(&proctree_lock);
1788f591779bSSeigo Tanimura 		pgrp = pgfind(pgid);
1789ba626c1dSJohn Baldwin 		sx_sunlock(&proctree_lock);
1790f591779bSSeigo Tanimura 		if (pgrp != NULL) {
17912c42a146SMarcel Moolenaar 			pgsignal(pgrp, sig, 0);
1792f591779bSSeigo Tanimura 			PGRP_UNLOCK(pgrp);
1793f591779bSSeigo Tanimura 		}
1794f591779bSSeigo Tanimura 	}
1795df8bae1dSRodney W. Grimes }
1796df8bae1dSRodney W. Grimes 
1797df8bae1dSRodney W. Grimes /*
1798df8bae1dSRodney W. Grimes  * Send a signal to a process group.  If checktty is 1,
1799df8bae1dSRodney W. Grimes  * limit to members which have a controlling terminal.
1800df8bae1dSRodney W. Grimes  */
1801df8bae1dSRodney W. Grimes void
18022c42a146SMarcel Moolenaar pgsignal(pgrp, sig, checkctty)
1803df8bae1dSRodney W. Grimes 	struct pgrp *pgrp;
18042c42a146SMarcel Moolenaar 	int sig, checkctty;
1805df8bae1dSRodney W. Grimes {
1806df8bae1dSRodney W. Grimes 	register struct proc *p;
1807df8bae1dSRodney W. Grimes 
1808628d2653SJohn Baldwin 	if (pgrp) {
1809f591779bSSeigo Tanimura 		PGRP_LOCK_ASSERT(pgrp, MA_OWNED);
1810628d2653SJohn Baldwin 		LIST_FOREACH(p, &pgrp->pg_members, p_pglist) {
1811628d2653SJohn Baldwin 			PROC_LOCK(p);
1812df8bae1dSRodney W. Grimes 			if (checkctty == 0 || p->p_flag & P_CONTROLT)
18132c42a146SMarcel Moolenaar 				psignal(p, sig);
1814628d2653SJohn Baldwin 			PROC_UNLOCK(p);
1815628d2653SJohn Baldwin 		}
1816628d2653SJohn Baldwin 	}
1817df8bae1dSRodney W. Grimes }
1818df8bae1dSRodney W. Grimes 
1819df8bae1dSRodney W. Grimes /*
18200c14ff0eSRobert Watson  * Send a signal caused by a trap to the current thread.  If it will be
18210c14ff0eSRobert Watson  * caught immediately, deliver it with correct code.  Otherwise, post it
18220c14ff0eSRobert Watson  * normally.
1823df8bae1dSRodney W. Grimes  */
1824df8bae1dSRodney W. Grimes void
18259104847fSDavid Xu trapsignal(struct thread *td, ksiginfo_t *ksi)
1826df8bae1dSRodney W. Grimes {
18271bf4700bSJeff Roberson 	struct sigacts *ps;
18281bf4700bSJeff Roberson 	struct proc *p;
18299104847fSDavid Xu 	int sig;
18309104847fSDavid Xu 	int code;
18311bf4700bSJeff Roberson 
18321bf4700bSJeff Roberson 	p = td->td_proc;
18339104847fSDavid Xu 	sig = ksi->ksi_signo;
18349104847fSDavid Xu 	code = ksi->ksi_code;
18359104847fSDavid Xu 	KASSERT(_SIG_VALID(sig), ("invalid signal"));
18369104847fSDavid Xu 
1837628d2653SJohn Baldwin 	PROC_LOCK(p);
1838ef3dab76STim J. Robbins 	ps = p->p_sigacts;
183990af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
184090af4afaSJohn Baldwin 	if ((p->p_flag & P_TRACED) == 0 && SIGISMEMBER(ps->ps_sigcatch, sig) &&
18414093529dSJeff Roberson 	    !SIGISMEMBER(td->td_sigmask, sig)) {
18421c4bcd05SJeff Roberson 		td->td_ru.ru_nsignals++;
1843df8bae1dSRodney W. Grimes #ifdef KTRACE
1844374a15aaSJohn Baldwin 		if (KTRPOINT(curthread, KTR_PSIG))
1845374a15aaSJohn Baldwin 			ktrpsig(sig, ps->ps_sigact[_SIG_IDX(sig)],
18464093529dSJeff Roberson 			    &td->td_sigmask, code);
1847df8bae1dSRodney W. Grimes #endif
18489104847fSDavid Xu 		(*p->p_sysent->sv_sendsig)(ps->ps_sigact[_SIG_IDX(sig)],
18499104847fSDavid Xu 				ksi, &td->td_sigmask);
18504093529dSJeff Roberson 		SIGSETOR(td->td_sigmask, ps->ps_catchmask[_SIG_IDX(sig)]);
18512c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_signodefer, sig))
18524093529dSJeff Roberson 			SIGADDSET(td->td_sigmask, sig);
18532c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig)) {
1854289ccde0SPeter Wemm 			/*
18558f19eb88SIan Dowse 			 * See kern_sigaction() for origin of this code.
1856289ccde0SPeter Wemm 			 */
185790af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
18582c42a146SMarcel Moolenaar 			if (sig != SIGCONT &&
18592c42a146SMarcel Moolenaar 			    sigprop(sig) & SA_IGNORE)
186090af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
18612c42a146SMarcel Moolenaar 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
1862dedc04feSPeter Wemm 		}
186390af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
18646f841fb7SMarcel Moolenaar 	} else {
1865f71a882fSDavid Xu 		/*
1866f71a882fSDavid Xu 		 * Avoid a possible infinite loop if the thread
1867f71a882fSDavid Xu 		 * masking the signal or process is ignoring the
1868f71a882fSDavid Xu 		 * signal.
1869f71a882fSDavid Xu 		 */
1870f71a882fSDavid Xu 		if (kern_forcesigexit &&
1871f71a882fSDavid Xu 		    (SIGISMEMBER(td->td_sigmask, sig) ||
1872f71a882fSDavid Xu 		     ps->ps_sigact[_SIG_IDX(sig)] == SIG_IGN)) {
1873f71a882fSDavid Xu 			SIGDELSET(td->td_sigmask, sig);
1874f71a882fSDavid Xu 			SIGDELSET(ps->ps_sigcatch, sig);
1875f71a882fSDavid Xu 			SIGDELSET(ps->ps_sigignore, sig);
1876f71a882fSDavid Xu 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
1877f71a882fSDavid Xu 		}
187890af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
18796626c604SJulian Elischer 		p->p_code = code;	/* XXX for core dump/debugger */
18802c42a146SMarcel Moolenaar 		p->p_sig = sig;		/* XXX to verify code */
18816d7b314bSDavid Xu 		tdsignal(p, td, sig, ksi);
1882df8bae1dSRodney W. Grimes 	}
1883628d2653SJohn Baldwin 	PROC_UNLOCK(p);
1884df8bae1dSRodney W. Grimes }
1885df8bae1dSRodney W. Grimes 
18864093529dSJeff Roberson static struct thread *
18874093529dSJeff Roberson sigtd(struct proc *p, int sig, int prop)
18884093529dSJeff Roberson {
18893074d1b4SDavid Xu 	struct thread *td, *signal_td;
18904093529dSJeff Roberson 
18914093529dSJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
18924093529dSJeff Roberson 
18934093529dSJeff Roberson 	/*
1894627451c1SDavid Xu 	 * Check if current thread can handle the signal without
1895627451c1SDavid Xu 	 * switching conetxt to another thread.
18964093529dSJeff Roberson 	 */
1897627451c1SDavid Xu 	if (curproc == p && !SIGISMEMBER(curthread->td_sigmask, sig))
1898627451c1SDavid Xu 		return (curthread);
18993074d1b4SDavid Xu 	signal_td = NULL;
19003074d1b4SDavid Xu 	FOREACH_THREAD_IN_PROC(p, td) {
19013074d1b4SDavid Xu 		if (!SIGISMEMBER(td->td_sigmask, sig)) {
19023074d1b4SDavid Xu 			signal_td = td;
1903627451c1SDavid Xu 			break;
19043074d1b4SDavid Xu 		}
19053074d1b4SDavid Xu 	}
19063074d1b4SDavid Xu 	if (signal_td == NULL)
19073074d1b4SDavid Xu 		signal_td = FIRST_THREAD_IN_PROC(p);
19083074d1b4SDavid Xu 	return (signal_td);
19094093529dSJeff Roberson }
19104093529dSJeff Roberson 
1911df8bae1dSRodney W. Grimes /*
1912df8bae1dSRodney W. Grimes  * Send the signal to the process.  If the signal has an action, the action
1913df8bae1dSRodney W. Grimes  * is usually performed by the target process rather than the caller; we add
1914df8bae1dSRodney W. Grimes  * the signal to the set of pending signals for the process.
1915df8bae1dSRodney W. Grimes  *
1916df8bae1dSRodney W. Grimes  * Exceptions:
1917df8bae1dSRodney W. Grimes  *   o When a stop signal is sent to a sleeping process that takes the
1918df8bae1dSRodney W. Grimes  *     default action, the process is stopped without awakening it.
1919df8bae1dSRodney W. Grimes  *   o SIGCONT restarts stopped processes (or puts them back to sleep)
1920df8bae1dSRodney W. Grimes  *     regardless of the signal action (eg, blocked or ignored).
1921df8bae1dSRodney W. Grimes  *
1922df8bae1dSRodney W. Grimes  * Other ignored signals are discarded immediately.
19234dec0e67SRobert Watson  *
19244dec0e67SRobert Watson  * NB: This function may be entered from the debugger via the "kill" DDB
19254dec0e67SRobert Watson  * command.  There is little that can be done to mitigate the possibly messy
19264dec0e67SRobert Watson  * side effects of this unwise possibility.
1927df8bae1dSRodney W. Grimes  */
1928df8bae1dSRodney W. Grimes void
19294093529dSJeff Roberson psignal(struct proc *p, int sig)
1930df8bae1dSRodney W. Grimes {
19316d7b314bSDavid Xu 	(void) tdsignal(p, NULL, sig, NULL);
19329104847fSDavid Xu }
19339104847fSDavid Xu 
19349104847fSDavid Xu int
19356d7b314bSDavid Xu psignal_event(struct proc *p, struct sigevent *sigev, ksiginfo_t *ksi)
19369104847fSDavid Xu {
19376d7b314bSDavid Xu 	struct thread *td = NULL;
193841b3077aSJacques Vidrine 
19394093529dSJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
19406d7b314bSDavid Xu 
19416d7b314bSDavid Xu 	KASSERT(!KSI_ONQ(ksi), ("psignal_event: ksi on queue"));
19424093529dSJeff Roberson 
19434093529dSJeff Roberson 	/*
19446d7b314bSDavid Xu 	 * ksi_code and other fields should be set before
19456d7b314bSDavid Xu 	 * calling this function.
19464093529dSJeff Roberson 	 */
19476d7b314bSDavid Xu 	ksi->ksi_signo = sigev->sigev_signo;
19486d7b314bSDavid Xu 	ksi->ksi_value = sigev->sigev_value;
19496d7b314bSDavid Xu 	if (sigev->sigev_notify == SIGEV_THREAD_ID) {
19506d7b314bSDavid Xu 		td = thread_find(p, sigev->sigev_notify_thread_id);
19516d7b314bSDavid Xu 		if (td == NULL)
19526d7b314bSDavid Xu 			return (ESRCH);
19536d7b314bSDavid Xu 	}
19546d7b314bSDavid Xu 	return (tdsignal(p, td, ksi->ksi_signo, ksi));
19554093529dSJeff Roberson }
19564093529dSJeff Roberson 
19579104847fSDavid Xu int
19586d7b314bSDavid Xu tdsignal(struct proc *p, struct thread *td, int sig, ksiginfo_t *ksi)
19594093529dSJeff Roberson {
19609104847fSDavid Xu 	sig_t action;
19619104847fSDavid Xu 	sigqueue_t *sigqueue;
19629104847fSDavid Xu 	int prop;
196390af4afaSJohn Baldwin 	struct sigacts *ps;
196494f0972bSDavid Xu 	int intrval;
19659104847fSDavid Xu 	int ret = 0;
1966da7bbd2cSJohn Baldwin 	int wakeup_swapper;
1967df8bae1dSRodney W. Grimes 
19686d7b314bSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
19696d7b314bSDavid Xu 
197041b3077aSJacques Vidrine 	if (!_SIG_VALID(sig))
1971d60226bdSXin LI 		panic("tdsignal(): invalid signal %d", sig);
19724093529dSJeff Roberson 
19738460a577SJohn Birrell 	KASSERT(ksi == NULL || !KSI_ONQ(ksi), ("tdsignal: ksi on queue"));
19746d7b314bSDavid Xu 
19756d7b314bSDavid Xu 	/*
19766d7b314bSDavid Xu 	 * IEEE Std 1003.1-2001: return success when killing a zombie.
19776d7b314bSDavid Xu 	 */
19786d7b314bSDavid Xu 	if (p->p_state == PRS_ZOMBIE) {
19796d7b314bSDavid Xu 		if (ksi && (ksi->ksi_flags & KSI_INS))
19806d7b314bSDavid Xu 			ksiginfo_tryfree(ksi);
19816d7b314bSDavid Xu 		return (ret);
19826d7b314bSDavid Xu 	}
19836d7b314bSDavid Xu 
198490af4afaSJohn Baldwin 	ps = p->p_sigacts;
1985ad3b9257SJohn-Mark Gurney 	KNOTE_LOCKED(&p->p_klist, NOTE_SIGNAL | sig);
19862c42a146SMarcel Moolenaar 	prop = sigprop(sig);
19874093529dSJeff Roberson 
19884093529dSJeff Roberson 	/*
198914b5ae1aSMike Makonnen 	 * If the signal is blocked and not destined for this thread, then
199014b5ae1aSMike Makonnen 	 * assign it to the process so that we can find it later in the first
199114b5ae1aSMike Makonnen 	 * thread that unblocks it.  Otherwise, assign it to this thread now.
19924093529dSJeff Roberson 	 */
19936d7b314bSDavid Xu 	if (td == NULL) {
19946d7b314bSDavid Xu 		td = sigtd(p, sig, prop);
19956d7b314bSDavid Xu 		if (SIGISMEMBER(td->td_sigmask, sig))
19966d7b314bSDavid Xu 			sigqueue = &p->p_sigqueue;
19976d7b314bSDavid Xu 		else
19989104847fSDavid Xu 			sigqueue = &td->td_sigqueue;
19993074d1b4SDavid Xu 	} else {
20006d7b314bSDavid Xu 		KASSERT(td->td_proc == p, ("invalid thread"));
20019104847fSDavid Xu 		sigqueue = &td->td_sigqueue;
20023074d1b4SDavid Xu 	}
20034093529dSJeff Roberson 
20045d217f17SJohn Birrell 	SDT_PROBE(proc, kernel, , signal_send, td, p, sig, 0, 0 );
20055d217f17SJohn Birrell 
2006df8bae1dSRodney W. Grimes 	/*
2007df8bae1dSRodney W. Grimes 	 * If the signal is being ignored,
2008df8bae1dSRodney W. Grimes 	 * then we forget about it immediately.
200990af4afaSJohn Baldwin 	 * (Note: we don't set SIGCONT in ps_sigignore,
2010df8bae1dSRodney W. Grimes 	 * and if it is set to SIG_IGN,
2011df8bae1dSRodney W. Grimes 	 * action will be SIG_DFL here.)
2012df8bae1dSRodney W. Grimes 	 */
201390af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
20140fc32899SJohn Baldwin 	if (SIGISMEMBER(ps->ps_sigignore, sig)) {
20155d217f17SJohn Birrell 		SDT_PROBE(proc, kernel, , signal_discard, ps, td, sig, 0, 0 );
20165d217f17SJohn Birrell 
201790af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
20186d7b314bSDavid Xu 		if (ksi && (ksi->ksi_flags & KSI_INS))
20196d7b314bSDavid Xu 			ksiginfo_tryfree(ksi);
20209104847fSDavid Xu 		return (ret);
202190af4afaSJohn Baldwin 	}
20226675b36eSDavid Xu 	if (SIGISMEMBER(td->td_sigmask, sig))
2023df8bae1dSRodney W. Grimes 		action = SIG_HOLD;
202490af4afaSJohn Baldwin 	else if (SIGISMEMBER(ps->ps_sigcatch, sig))
2025df8bae1dSRodney W. Grimes 		action = SIG_CATCH;
2026df8bae1dSRodney W. Grimes 	else
2027df8bae1dSRodney W. Grimes 		action = SIG_DFL;
202894f0972bSDavid Xu 	if (SIGISMEMBER(ps->ps_sigintr, sig))
202994f0972bSDavid Xu 		intrval = EINTR;
203094f0972bSDavid Xu 	else
203194f0972bSDavid Xu 		intrval = ERESTART;
203290af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
2033df8bae1dSRodney W. Grimes 
20349104847fSDavid Xu 	if (prop & SA_CONT)
20359104847fSDavid Xu 		sigqueue_delete_stopmask_proc(p);
20369104847fSDavid Xu 	else if (prop & SA_STOP) {
2037df8bae1dSRodney W. Grimes 		/*
2038df8bae1dSRodney W. Grimes 		 * If sending a tty stop signal to a member of an orphaned
2039df8bae1dSRodney W. Grimes 		 * process group, discard the signal here if the action
2040df8bae1dSRodney W. Grimes 		 * is default; don't stop the process below if sleeping,
2041df8bae1dSRodney W. Grimes 		 * and don't clear any pending SIGCONT.
2042df8bae1dSRodney W. Grimes 		 */
2043e602ba25SJulian Elischer 		if ((prop & SA_TTYSTOP) &&
2044e602ba25SJulian Elischer 		    (p->p_pgrp->pg_jobc == 0) &&
20456d7b314bSDavid Xu 		    (action == SIG_DFL)) {
20466d7b314bSDavid Xu 			if (ksi && (ksi->ksi_flags & KSI_INS))
20476d7b314bSDavid Xu 				ksiginfo_tryfree(ksi);
20489104847fSDavid Xu 			return (ret);
20496d7b314bSDavid Xu 		}
20509104847fSDavid Xu 		sigqueue_delete_proc(p, SIGCONT);
2051ebceaf6dSDavid Xu 		if (p->p_flag & P_CONTINUED) {
20526933e3c1SJulian Elischer 			p->p_flag &= ~P_CONTINUED;
2053ebceaf6dSDavid Xu 			PROC_LOCK(p->p_pptr);
2054ebceaf6dSDavid Xu 			sigqueue_take(p->p_ksi);
2055ebceaf6dSDavid Xu 			PROC_UNLOCK(p->p_pptr);
2056ebceaf6dSDavid Xu 		}
2057df8bae1dSRodney W. Grimes 	}
20583074d1b4SDavid Xu 
20599104847fSDavid Xu 	ret = sigqueue_add(sigqueue, sig, ksi);
20609104847fSDavid Xu 	if (ret != 0)
20619104847fSDavid Xu 		return (ret);
20626d7b314bSDavid Xu 	signotify(td);
20635312b1c7SDavid Xu 	/*
20645312b1c7SDavid Xu 	 * Defer further processing for signals which are held,
20655312b1c7SDavid Xu 	 * except that stopped processes must be continued by SIGCONT.
20665312b1c7SDavid Xu 	 */
20675312b1c7SDavid Xu 	if (action == SIG_HOLD &&
20685312b1c7SDavid Xu 	    !((prop & SA_CONT) && (p->p_flag & P_STOPPED_SIG)))
20699104847fSDavid Xu 		return (ret);
2070df8bae1dSRodney W. Grimes 	/*
207190d75f78SAlfred Perlstein 	 * SIGKILL: Remove procfs STOPEVENTs.
207290d75f78SAlfred Perlstein 	 */
207390d75f78SAlfred Perlstein 	if (sig == SIGKILL) {
207490d75f78SAlfred Perlstein 		/* from procfs_ioctl.c: PIOCBIC */
207590d75f78SAlfred Perlstein 		p->p_stops = 0;
207690d75f78SAlfred Perlstein 		/* from procfs_ioctl.c: PIOCCONT */
207790d75f78SAlfred Perlstein 		p->p_step = 0;
207890d75f78SAlfred Perlstein 		wakeup(&p->p_step);
207990d75f78SAlfred Perlstein 	}
208090d75f78SAlfred Perlstein 	/*
2081e602ba25SJulian Elischer 	 * Some signals have a process-wide effect and a per-thread
2082e602ba25SJulian Elischer 	 * component.  Most processing occurs when the process next
2083e602ba25SJulian Elischer 	 * tries to cross the user boundary, however there are some
2084e602ba25SJulian Elischer 	 * times when processing needs to be done immediatly, such as
2085e602ba25SJulian Elischer 	 * waking up threads so that they can cross the user boundary.
2086e602ba25SJulian Elischer 	 * We try do the per-process part here.
2087df8bae1dSRodney W. Grimes 	 */
2088e602ba25SJulian Elischer 	if (P_SHOULDSTOP(p)) {
2089e602ba25SJulian Elischer 		/*
2090e602ba25SJulian Elischer 		 * The process is in stopped mode. All the threads should be
2091e602ba25SJulian Elischer 		 * either winding down or already on the suspended queue.
2092e602ba25SJulian Elischer 		 */
2093e602ba25SJulian Elischer 		if (p->p_flag & P_TRACED) {
2094e602ba25SJulian Elischer 			/*
2095e602ba25SJulian Elischer 			 * The traced process is already stopped,
2096e602ba25SJulian Elischer 			 * so no further action is necessary.
2097e602ba25SJulian Elischer 			 * No signal can restart us.
2098e602ba25SJulian Elischer 			 */
2099e602ba25SJulian Elischer 			goto out;
21001c32c37cSJohn Baldwin 		}
2101b40ce416SJulian Elischer 
2102e602ba25SJulian Elischer 		if (sig == SIGKILL) {
2103df8bae1dSRodney W. Grimes 			/*
2104e602ba25SJulian Elischer 			 * SIGKILL sets process running.
2105e602ba25SJulian Elischer 			 * It will die elsewhere.
2106e602ba25SJulian Elischer 			 * All threads must be restarted.
2107df8bae1dSRodney W. Grimes 			 */
2108482d099cSDavid Xu 			p->p_flag &= ~P_STOPPED_SIG;
2109e602ba25SJulian Elischer 			goto runfast;
2110e602ba25SJulian Elischer 		}
2111e602ba25SJulian Elischer 
2112e602ba25SJulian Elischer 		if (prop & SA_CONT) {
2113e602ba25SJulian Elischer 			/*
2114e602ba25SJulian Elischer 			 * If SIGCONT is default (or ignored), we continue the
21159104847fSDavid Xu 			 * process but don't leave the signal in sigqueue as
21161d9c5696SJuli Mallett 			 * it has no further action.  If SIGCONT is held, we
2117e602ba25SJulian Elischer 			 * continue the process and leave the signal in
21189104847fSDavid Xu 			 * sigqueue.  If the process catches SIGCONT, let it
2119e602ba25SJulian Elischer 			 * handle the signal itself.  If it isn't waiting on
2120e602ba25SJulian Elischer 			 * an event, it goes back to run state.
2121e602ba25SJulian Elischer 			 * Otherwise, process goes back to sleep state.
2122e602ba25SJulian Elischer 			 */
21231279572aSDavid Xu 			p->p_flag &= ~P_STOPPED_SIG;
21247b4a950aSDavid Xu 			PROC_SLOCK(p);
2125ebceaf6dSDavid Xu 			if (p->p_numthreads == p->p_suspcount) {
21267b4a950aSDavid Xu 				PROC_SUNLOCK(p);
21276933e3c1SJulian Elischer 				p->p_flag |= P_CONTINUED;
21287f96995eSDavid Xu 				p->p_xstat = SIGCONT;
21297f96995eSDavid Xu 				PROC_LOCK(p->p_pptr);
2130ebceaf6dSDavid Xu 				childproc_continued(p);
21317f96995eSDavid Xu 				PROC_UNLOCK(p->p_pptr);
21327b4a950aSDavid Xu 				PROC_SLOCK(p);
2133ebceaf6dSDavid Xu 			}
2134e602ba25SJulian Elischer 			if (action == SIG_DFL) {
2135a54e85fdSJeff Roberson 				thread_unsuspend(p);
21367b4a950aSDavid Xu 				PROC_SUNLOCK(p);
21379104847fSDavid Xu 				sigqueue_delete(sigqueue, sig);
2138a54e85fdSJeff Roberson 				goto out;
2139a54e85fdSJeff Roberson 			}
2140a54e85fdSJeff Roberson 			if (action == SIG_CATCH) {
21418460a577SJohn Birrell 				/*
21428460a577SJohn Birrell 				 * The process wants to catch it so it needs
21438460a577SJohn Birrell 				 * to run at least one thread, but which one?
21448460a577SJohn Birrell 				 */
21457b4a950aSDavid Xu 				PROC_SUNLOCK(p);
2146e602ba25SJulian Elischer 				goto runfast;
2147e602ba25SJulian Elischer 			}
2148e602ba25SJulian Elischer 			/*
2149e602ba25SJulian Elischer 			 * The signal is not ignored or caught.
2150e602ba25SJulian Elischer 			 */
215104774f23SJulian Elischer 			thread_unsuspend(p);
21527b4a950aSDavid Xu 			PROC_SUNLOCK(p);
2153e602ba25SJulian Elischer 			goto out;
2154e602ba25SJulian Elischer 		}
2155e602ba25SJulian Elischer 
2156e602ba25SJulian Elischer 		if (prop & SA_STOP) {
2157e602ba25SJulian Elischer 			/*
2158e602ba25SJulian Elischer 			 * Already stopped, don't need to stop again
2159e602ba25SJulian Elischer 			 * (If we did the shell could get confused).
216004774f23SJulian Elischer 			 * Just make sure the signal STOP bit set.
2161e602ba25SJulian Elischer 			 */
21621279572aSDavid Xu 			p->p_flag |= P_STOPPED_SIG;
21639104847fSDavid Xu 			sigqueue_delete(sigqueue, sig);
2164e602ba25SJulian Elischer 			goto out;
2165e602ba25SJulian Elischer 		}
2166e602ba25SJulian Elischer 
2167e602ba25SJulian Elischer 		/*
2168e602ba25SJulian Elischer 		 * All other kinds of signals:
2169e602ba25SJulian Elischer 		 * If a thread is sleeping interruptibly, simulate a
2170e602ba25SJulian Elischer 		 * wakeup so that when it is continued it will be made
2171e602ba25SJulian Elischer 		 * runnable and can look at the signal.  However, don't make
217204774f23SJulian Elischer 		 * the PROCESS runnable, leave it stopped.
2173e602ba25SJulian Elischer 		 * It may run a bit until it hits a thread_suspend_check().
2174e602ba25SJulian Elischer 		 */
2175da7bbd2cSJohn Baldwin 		wakeup_swapper = 0;
21767b4a950aSDavid Xu 		PROC_SLOCK(p);
2177a54e85fdSJeff Roberson 		thread_lock(td);
217844f3b092SJohn Baldwin 		if (TD_ON_SLEEPQ(td) && (td->td_flags & TDF_SINTR))
2179da7bbd2cSJohn Baldwin 			wakeup_swapper = sleepq_abort(td, intrval);
2180a54e85fdSJeff Roberson 		thread_unlock(td);
21817b4a950aSDavid Xu 		PROC_SUNLOCK(p);
2182da7bbd2cSJohn Baldwin 		if (wakeup_swapper)
2183da7bbd2cSJohn Baldwin 			kick_proc0();
2184df8bae1dSRodney W. Grimes 		goto out;
2185df8bae1dSRodney W. Grimes 		/*
21869a6a4cb5SPeter Wemm 		 * Mutexes are short lived. Threads waiting on them will
21879a6a4cb5SPeter Wemm 		 * hit thread_suspend_check() soon.
2188df8bae1dSRodney W. Grimes 		 */
2189e602ba25SJulian Elischer 	} else if (p->p_state == PRS_NORMAL) {
2190ec8297bdSDavid Xu 		if (p->p_flag & P_TRACED || action == SIG_CATCH) {
219194f0972bSDavid Xu 			tdsigwakeup(td, sig, action, intrval);
2192df8bae1dSRodney W. Grimes 			goto out;
219304774f23SJulian Elischer 		}
2194ec8297bdSDavid Xu 
2195ec8297bdSDavid Xu 		MPASS(action == SIG_DFL);
2196ec8297bdSDavid Xu 
219735c32a76SDavid Xu 		if (prop & SA_STOP) {
2198374ae2a3SJeff Roberson 			if (p->p_flag & P_PPWAIT)
219935c32a76SDavid Xu 				goto out;
2200e574e444SDavid Xu 			p->p_flag |= P_STOPPED_SIG;
2201e574e444SDavid Xu 			p->p_xstat = sig;
22027b4a950aSDavid Xu 			PROC_SLOCK(p);
2203d8267df7SDavid Xu 			sig_suspend_threads(td, p, 1);
22044093529dSJeff Roberson 			if (p->p_numthreads == p->p_suspcount) {
2205ebceaf6dSDavid Xu 				/*
2206ebceaf6dSDavid Xu 				 * only thread sending signal to another
2207ebceaf6dSDavid Xu 				 * process can reach here, if thread is sending
2208ebceaf6dSDavid Xu 				 * signal to its process, because thread does
2209ebceaf6dSDavid Xu 				 * not suspend itself here, p_numthreads
2210ebceaf6dSDavid Xu 				 * should never be equal to p_suspcount.
2211ebceaf6dSDavid Xu 				 */
2212ebceaf6dSDavid Xu 				thread_stopped(p);
22137b4a950aSDavid Xu 				PROC_SUNLOCK(p);
22149104847fSDavid Xu 				sigqueue_delete_proc(p, p->p_xstat);
22157b4a950aSDavid Xu 			} else
22167b4a950aSDavid Xu 				PROC_SUNLOCK(p);
221735c32a76SDavid Xu 			goto out;
221835c32a76SDavid Xu 		}
2219e602ba25SJulian Elischer 	} else {
2220e602ba25SJulian Elischer 		/* Not in "NORMAL" state. discard the signal. */
22219104847fSDavid Xu 		sigqueue_delete(sigqueue, sig);
2222e602ba25SJulian Elischer 		goto out;
2223e602ba25SJulian Elischer 	}
2224e602ba25SJulian Elischer 
2225b40ce416SJulian Elischer 	/*
2226e602ba25SJulian Elischer 	 * The process is not stopped so we need to apply the signal to all the
2227e602ba25SJulian Elischer 	 * running threads.
2228b40ce416SJulian Elischer 	 */
2229e602ba25SJulian Elischer runfast:
223094f0972bSDavid Xu 	tdsigwakeup(td, sig, action, intrval);
22317b4a950aSDavid Xu 	PROC_SLOCK(p);
2232e602ba25SJulian Elischer 	thread_unsuspend(p);
22337b4a950aSDavid Xu 	PROC_SUNLOCK(p);
2234e602ba25SJulian Elischer out:
22357b4a950aSDavid Xu 	/* If we jump here, proc slock should not be owned. */
22367b4a950aSDavid Xu 	PROC_SLOCK_ASSERT(p, MA_NOTOWNED);
22379104847fSDavid Xu 	return (ret);
2238e602ba25SJulian Elischer }
2239e602ba25SJulian Elischer 
2240e602ba25SJulian Elischer /*
2241e602ba25SJulian Elischer  * The force of a signal has been directed against a single
2242e602ba25SJulian Elischer  * thread.  We need to see what we can do about knocking it
2243e602ba25SJulian Elischer  * out of any sleep it may be in etc.
2244e602ba25SJulian Elischer  */
2245e602ba25SJulian Elischer static void
224694f0972bSDavid Xu tdsigwakeup(struct thread *td, int sig, sig_t action, int intrval)
2247e602ba25SJulian Elischer {
2248e602ba25SJulian Elischer 	struct proc *p = td->td_proc;
2249e602ba25SJulian Elischer 	register int prop;
2250da7bbd2cSJohn Baldwin 	int wakeup_swapper;
2251e602ba25SJulian Elischer 
2252da7bbd2cSJohn Baldwin 	wakeup_swapper = 0;
22538b94a061SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2254e602ba25SJulian Elischer 	prop = sigprop(sig);
2255a4c2da15SBruce Evans 
22567b4a950aSDavid Xu 	PROC_SLOCK(p);
2257374ae2a3SJeff Roberson 	thread_lock(td);
2258e602ba25SJulian Elischer 	/*
2259aa0fa334SJulian Elischer 	 * Bring the priority of a thread up if we want it to get
2260e602ba25SJulian Elischer 	 * killed in this lifetime.
2261e602ba25SJulian Elischer 	 */
22626eeb364bSJeff Roberson 	if (action == SIG_DFL && (prop & SA_KILL) && td->td_priority > PUSER)
2263b3a4fb14SDavid Xu 		sched_prio(td, PUSER);
226480c4433cSJohn Baldwin 	if (TD_ON_SLEEPQ(td)) {
2265e602ba25SJulian Elischer 		/*
2266e602ba25SJulian Elischer 		 * If thread is sleeping uninterruptibly
2267e602ba25SJulian Elischer 		 * we can't interrupt the sleep... the signal will
2268e602ba25SJulian Elischer 		 * be noticed when the process returns through
2269e602ba25SJulian Elischer 		 * trap() or syscall().
2270e602ba25SJulian Elischer 		 */
227144f3b092SJohn Baldwin 		if ((td->td_flags & TDF_SINTR) == 0)
2272374ae2a3SJeff Roberson 			goto out;
2273e602ba25SJulian Elischer 		/*
2274e602ba25SJulian Elischer 		 * If SIGCONT is default (or ignored) and process is
2275e602ba25SJulian Elischer 		 * asleep, we are finished; the process should not
2276e602ba25SJulian Elischer 		 * be awakened.
2277df8bae1dSRodney W. Grimes 		 */
2278e602ba25SJulian Elischer 		if ((prop & SA_CONT) && action == SIG_DFL) {
2279a54e85fdSJeff Roberson 			thread_unlock(td);
22807b4a950aSDavid Xu 			PROC_SUNLOCK(p);
22819104847fSDavid Xu 			sigqueue_delete(&p->p_sigqueue, sig);
22824093529dSJeff Roberson 			/*
22834093529dSJeff Roberson 			 * It may be on either list in this state.
22844093529dSJeff Roberson 			 * Remove from both for now.
22854093529dSJeff Roberson 			 */
22869104847fSDavid Xu 			sigqueue_delete(&td->td_sigqueue, sig);
2287aa0fa334SJulian Elischer 			return;
2288df8bae1dSRodney W. Grimes 		}
2289df8bae1dSRodney W. Grimes 
2290aa0fa334SJulian Elischer 		/*
2291a4c2da15SBruce Evans 		 * Give low priority threads a better chance to run.
2292aa0fa334SJulian Elischer 		 */
229344f3b092SJohn Baldwin 		if (td->td_priority > PUSER)
2294b3a4fb14SDavid Xu 			sched_prio(td, PUSER);
2295ec8297bdSDavid Xu 
2296da7bbd2cSJohn Baldwin 		wakeup_swapper = sleepq_abort(td, intrval);
2297a4c2da15SBruce Evans 	} else {
2298df8bae1dSRodney W. Grimes 		/*
2299a4c2da15SBruce Evans 		 * Other states do nothing with the signal immediately,
2300df8bae1dSRodney W. Grimes 		 * other than kicking ourselves if we are running.
2301df8bae1dSRodney W. Grimes 		 * It will either never be noticed, or noticed very soon.
2302df8bae1dSRodney W. Grimes 		 */
2303a4c2da15SBruce Evans #ifdef SMP
230444f3b092SJohn Baldwin 		if (TD_IS_RUNNING(td) && td != curthread)
2305e602ba25SJulian Elischer 			forward_signal(td);
23063163861cSTor Egge #endif
23076caa8a15SJohn Baldwin 	}
2308374ae2a3SJeff Roberson out:
23097b4a950aSDavid Xu 	PROC_SUNLOCK(p);
2310374ae2a3SJeff Roberson 	thread_unlock(td);
2311da7bbd2cSJohn Baldwin 	if (wakeup_swapper)
2312da7bbd2cSJohn Baldwin 		kick_proc0();
2313a4c2da15SBruce Evans }
2314df8bae1dSRodney W. Grimes 
2315d8267df7SDavid Xu static void
2316d8267df7SDavid Xu sig_suspend_threads(struct thread *td, struct proc *p, int sending)
2317d8267df7SDavid Xu {
2318d8267df7SDavid Xu 	struct thread *td2;
2319f33a947bSKonstantin Belousov 	int wakeup_swapper;
2320d8267df7SDavid Xu 
2321d8267df7SDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
23227b4a950aSDavid Xu 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2323d8267df7SDavid Xu 
2324f33a947bSKonstantin Belousov 	wakeup_swapper = 0;
2325d8267df7SDavid Xu 	FOREACH_THREAD_IN_PROC(p, td2) {
2326a54e85fdSJeff Roberson 		thread_lock(td2);
2327b7edba77SJeff Roberson 		td2->td_flags |= TDF_ASTPENDING | TDF_NEEDSUSPCHK;
2328d8267df7SDavid Xu 		if ((TD_IS_SLEEPING(td2) || TD_IS_SWAPPED(td2)) &&
2329f33a947bSKonstantin Belousov 		    (td2->td_flags & TDF_SINTR)) {
2330f33a947bSKonstantin Belousov 			if (td2->td_flags & TDF_SBDRY) {
2331f33a947bSKonstantin Belousov 				if (TD_IS_SUSPENDED(td2))
2332f33a947bSKonstantin Belousov 					wakeup_swapper |=
2333f33a947bSKonstantin Belousov 					    thread_unsuspend_one(td2);
2334f33a947bSKonstantin Belousov 				if (TD_ON_SLEEPQ(td2))
2335f33a947bSKonstantin Belousov 					wakeup_swapper |=
2336f33a947bSKonstantin Belousov 					    sleepq_abort(td2, ERESTART);
2337f33a947bSKonstantin Belousov 			} else if (!TD_IS_SUSPENDED(td2)) {
2338d8267df7SDavid Xu 				thread_suspend_one(td2);
2339f33a947bSKonstantin Belousov 			}
2340f33a947bSKonstantin Belousov 		} else if (!TD_IS_SUSPENDED(td2)) {
2341d8267df7SDavid Xu 			if (sending || td != td2)
2342d8267df7SDavid Xu 				td2->td_flags |= TDF_ASTPENDING;
2343d8267df7SDavid Xu #ifdef SMP
2344d8267df7SDavid Xu 			if (TD_IS_RUNNING(td2) && td2 != td)
2345d8267df7SDavid Xu 				forward_signal(td2);
2346d8267df7SDavid Xu #endif
2347d8267df7SDavid Xu 		}
2348a54e85fdSJeff Roberson 		thread_unlock(td2);
2349d8267df7SDavid Xu 	}
2350f33a947bSKonstantin Belousov 	if (wakeup_swapper)
2351f33a947bSKonstantin Belousov 		kick_proc0();
2352d8267df7SDavid Xu }
2353d8267df7SDavid Xu 
2354cbf4e354SDavid Xu int
23554cc9f52fSRobert Drehmel ptracestop(struct thread *td, int sig)
23564cc9f52fSRobert Drehmel {
23574cc9f52fSRobert Drehmel 	struct proc *p = td->td_proc;
23584cc9f52fSRobert Drehmel 
235930a9f26dSRobert Watson 	PROC_LOCK_ASSERT(p, MA_OWNED);
23604cc9f52fSRobert Drehmel 	WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK,
2361aa89d8cdSJohn Baldwin 	    &p->p_mtx.lock_object, "Stopping for traced signal");
23624cc9f52fSRobert Drehmel 
2363904c5ec4SDavid Xu 	td->td_dbgflags |= TDB_XSIG;
2364cbf4e354SDavid Xu 	td->td_xsig = sig;
23657b4a950aSDavid Xu 	PROC_SLOCK(p);
2366904c5ec4SDavid Xu 	while ((p->p_flag & P_TRACED) && (td->td_dbgflags & TDB_XSIG)) {
2367cbf4e354SDavid Xu 		if (p->p_flag & P_SINGLE_EXIT) {
2368904c5ec4SDavid Xu 			td->td_dbgflags &= ~TDB_XSIG;
23697b4a950aSDavid Xu 			PROC_SUNLOCK(p);
2370cbf4e354SDavid Xu 			return (sig);
2371cbf4e354SDavid Xu 		}
2372cbf4e354SDavid Xu 		/*
2373cbf4e354SDavid Xu 		 * Just make wait() to work, the last stopped thread
2374cbf4e354SDavid Xu 		 * will win.
2375cbf4e354SDavid Xu 		 */
2376cbf4e354SDavid Xu 		p->p_xstat = sig;
2377cbf4e354SDavid Xu 		p->p_xthread = td;
2378cbf4e354SDavid Xu 		p->p_flag |= (P_STOPPED_SIG|P_STOPPED_TRACE);
2379d8267df7SDavid Xu 		sig_suspend_threads(td, p, 0);
2380cbf4e354SDavid Xu stopme:
2381a54e85fdSJeff Roberson 		thread_suspend_switch(td);
2382a54e85fdSJeff Roberson 		if (!(p->p_flag & P_TRACED)) {
2383cbf4e354SDavid Xu 			break;
2384a54e85fdSJeff Roberson 		}
2385904c5ec4SDavid Xu 		if (td->td_dbgflags & TDB_SUSPEND) {
2386cbf4e354SDavid Xu 			if (p->p_flag & P_SINGLE_EXIT)
2387cbf4e354SDavid Xu 				break;
2388cbf4e354SDavid Xu 			goto stopme;
2389cbf4e354SDavid Xu 		}
2390cbf4e354SDavid Xu 	}
23917b4a950aSDavid Xu 	PROC_SUNLOCK(p);
2392cbf4e354SDavid Xu 	return (td->td_xsig);
23934cc9f52fSRobert Drehmel }
23944cc9f52fSRobert Drehmel 
2395df8bae1dSRodney W. Grimes /*
2396df8bae1dSRodney W. Grimes  * If the current process has received a signal (should be caught or cause
2397df8bae1dSRodney W. Grimes  * termination, should interrupt current syscall), return the signal number.
2398df8bae1dSRodney W. Grimes  * Stop signals with default action are processed immediately, then cleared;
2399df8bae1dSRodney W. Grimes  * they aren't returned.  This is checked after each entry to the system for
2400df8bae1dSRodney W. Grimes  * a syscall or trap (though this can usually be done without calling issignal
2401628855e7SJulian Elischer  * by checking the pending signal masks in cursig.) The normal call
2402df8bae1dSRodney W. Grimes  * sequence is
2403df8bae1dSRodney W. Grimes  *
2404e602ba25SJulian Elischer  *	while (sig = cursig(curthread))
24052c42a146SMarcel Moolenaar  *		postsig(sig);
2406df8bae1dSRodney W. Grimes  */
24076711f10fSJohn Baldwin static int
2408f33a947bSKonstantin Belousov issignal(struct thread *td, int stop_allowed)
2409df8bae1dSRodney W. Grimes {
2410e602ba25SJulian Elischer 	struct proc *p;
241190af4afaSJohn Baldwin 	struct sigacts *ps;
24124093529dSJeff Roberson 	sigset_t sigpending;
2413cbf4e354SDavid Xu 	int sig, prop, newsig;
2414df8bae1dSRodney W. Grimes 
2415e602ba25SJulian Elischer 	p = td->td_proc;
241690af4afaSJohn Baldwin 	ps = p->p_sigacts;
241790af4afaSJohn Baldwin 	mtx_assert(&ps->ps_mtx, MA_OWNED);
2418628d2653SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2419df8bae1dSRodney W. Grimes 	for (;;) {
24202a024a2bSSean Eric Fagan 		int traced = (p->p_flag & P_TRACED) || (p->p_stops & S_SIG);
24212a024a2bSSean Eric Fagan 
24229104847fSDavid Xu 		sigpending = td->td_sigqueue.sq_signals;
24234093529dSJeff Roberson 		SIGSETNAND(sigpending, td->td_sigmask);
24244093529dSJeff Roberson 
2425df8bae1dSRodney W. Grimes 		if (p->p_flag & P_PPWAIT)
24264093529dSJeff Roberson 			SIG_STOPSIGMASK(sigpending);
24274093529dSJeff Roberson 		if (SIGISEMPTY(sigpending))	/* no signal to send */
2428df8bae1dSRodney W. Grimes 			return (0);
24294093529dSJeff Roberson 		sig = sig_ffs(&sigpending);
24302a024a2bSSean Eric Fagan 
2431047aa39bSRobert Watson 		if (p->p_stops & S_SIG) {
2432047aa39bSRobert Watson 			mtx_unlock(&ps->ps_mtx);
2433047aa39bSRobert Watson 			stopevent(p, S_SIG, sig);
2434047aa39bSRobert Watson 			mtx_lock(&ps->ps_mtx);
2435047aa39bSRobert Watson 		}
24362a024a2bSSean Eric Fagan 
2437df8bae1dSRodney W. Grimes 		/*
2438df8bae1dSRodney W. Grimes 		 * We should see pending but ignored signals
2439df8bae1dSRodney W. Grimes 		 * only if P_TRACED was on when they were posted.
2440df8bae1dSRodney W. Grimes 		 */
244190af4afaSJohn Baldwin 		if (SIGISMEMBER(ps->ps_sigignore, sig) && (traced == 0)) {
24429104847fSDavid Xu 			sigqueue_delete(&td->td_sigqueue, sig);
2443df8bae1dSRodney W. Grimes 			continue;
2444df8bae1dSRodney W. Grimes 		}
2445df8bae1dSRodney W. Grimes 		if (p->p_flag & P_TRACED && (p->p_flag & P_PPWAIT) == 0) {
2446df8bae1dSRodney W. Grimes 			/*
2447d8f4f6a4SJonathan Mini 			 * If traced, always stop.
2448df8bae1dSRodney W. Grimes 			 */
244990af4afaSJohn Baldwin 			mtx_unlock(&ps->ps_mtx);
2450cbf4e354SDavid Xu 			newsig = ptracestop(td, sig);
245190af4afaSJohn Baldwin 			mtx_lock(&ps->ps_mtx);
2452df8bae1dSRodney W. Grimes 
24539104847fSDavid Xu 			if (sig != newsig) {
2454413cf3bbSDavid Xu 				ksiginfo_t ksi;
24559104847fSDavid Xu 				/*
24569104847fSDavid Xu 				 * clear old signal.
24579104847fSDavid Xu 				 * XXX shrug off debugger, it causes siginfo to
24589104847fSDavid Xu 				 * be thrown away.
24599104847fSDavid Xu 				 */
2460413cf3bbSDavid Xu 				sigqueue_get(&td->td_sigqueue, sig, &ksi);
24619104847fSDavid Xu 
2462df8bae1dSRodney W. Grimes 				/*
2463df8bae1dSRodney W. Grimes 				 * If parent wants us to take the signal,
2464df8bae1dSRodney W. Grimes 				 * then it will leave it in p->p_xstat;
2465df8bae1dSRodney W. Grimes 				 * otherwise we just look for signals again.
2466df8bae1dSRodney W. Grimes 			 	*/
2467cbf4e354SDavid Xu 				if (newsig == 0)
2468df8bae1dSRodney W. Grimes 					continue;
2469cbf4e354SDavid Xu 				sig = newsig;
24709104847fSDavid Xu 
24719104847fSDavid Xu 				/*
24729104847fSDavid Xu 				 * Put the new signal into td_sigqueue. If the
24739104847fSDavid Xu 				 * signal is being masked, look for other signals.
24749104847fSDavid Xu 				 */
24759104847fSDavid Xu 				SIGADDSET(td->td_sigqueue.sq_signals, sig);
24769104847fSDavid Xu 				if (SIGISMEMBER(td->td_sigmask, sig))
24779104847fSDavid Xu 					continue;
24789104847fSDavid Xu 				signotify(td);
24799104847fSDavid Xu 			}
24809104847fSDavid Xu 
2481df8bae1dSRodney W. Grimes 			/*
24828d542cb5SDavid E. O'Brien 			 * If the traced bit got turned off, go back up
24838d542cb5SDavid E. O'Brien 			 * to the top to rescan signals.  This ensures
24848d542cb5SDavid E. O'Brien 			 * that p_sig* and p_sigact are consistent.
24858d542cb5SDavid E. O'Brien 			 */
24868d542cb5SDavid E. O'Brien 			if ((p->p_flag & P_TRACED) == 0)
24878d542cb5SDavid E. O'Brien 				continue;
2488df8bae1dSRodney W. Grimes 		}
2489df8bae1dSRodney W. Grimes 
24908d542cb5SDavid E. O'Brien 		prop = sigprop(sig);
24918d542cb5SDavid E. O'Brien 
2492df8bae1dSRodney W. Grimes 		/*
2493df8bae1dSRodney W. Grimes 		 * Decide whether the signal should be returned.
2494df8bae1dSRodney W. Grimes 		 * Return the signal's number, or fall through
2495df8bae1dSRodney W. Grimes 		 * to clear it from the pending mask.
2496df8bae1dSRodney W. Grimes 		 */
2497d321df47SPoul-Henning Kamp 		switch ((intptr_t)p->p_sigacts->ps_sigact[_SIG_IDX(sig)]) {
2498df8bae1dSRodney W. Grimes 
2499d321df47SPoul-Henning Kamp 		case (intptr_t)SIG_DFL:
2500df8bae1dSRodney W. Grimes 			/*
2501df8bae1dSRodney W. Grimes 			 * Don't take default actions on system processes.
2502df8bae1dSRodney W. Grimes 			 */
2503df8bae1dSRodney W. Grimes 			if (p->p_pid <= 1) {
2504df8bae1dSRodney W. Grimes #ifdef DIAGNOSTIC
2505df8bae1dSRodney W. Grimes 				/*
2506df8bae1dSRodney W. Grimes 				 * Are you sure you want to ignore SIGSEGV
2507df8bae1dSRodney W. Grimes 				 * in init? XXX
2508df8bae1dSRodney W. Grimes 				 */
2509d93f860cSPoul-Henning Kamp 				printf("Process (pid %lu) got signal %d\n",
25102c42a146SMarcel Moolenaar 					(u_long)p->p_pid, sig);
2511df8bae1dSRodney W. Grimes #endif
2512df8bae1dSRodney W. Grimes 				break;		/* == ignore */
2513df8bae1dSRodney W. Grimes 			}
2514df8bae1dSRodney W. Grimes 			/*
2515df8bae1dSRodney W. Grimes 			 * If there is a pending stop signal to process
2516df8bae1dSRodney W. Grimes 			 * with default action, stop here,
2517df8bae1dSRodney W. Grimes 			 * then clear the signal.  However,
2518df8bae1dSRodney W. Grimes 			 * if process is member of an orphaned
2519df8bae1dSRodney W. Grimes 			 * process group, ignore tty stop signals.
2520df8bae1dSRodney W. Grimes 			 */
2521df8bae1dSRodney W. Grimes 			if (prop & SA_STOP) {
2522df8bae1dSRodney W. Grimes 				if (p->p_flag & P_TRACED ||
2523df8bae1dSRodney W. Grimes 		    		    (p->p_pgrp->pg_jobc == 0 &&
2524df8bae1dSRodney W. Grimes 				     prop & SA_TTYSTOP))
2525df8bae1dSRodney W. Grimes 					break;	/* == ignore */
2526f33a947bSKonstantin Belousov 
2527f33a947bSKonstantin Belousov 				/* Ignore, but do not drop the stop signal. */
2528f33a947bSKonstantin Belousov 				if (stop_allowed != SIG_STOP_ALLOWED)
2529f33a947bSKonstantin Belousov 					return (sig);
253090af4afaSJohn Baldwin 				mtx_unlock(&ps->ps_mtx);
253190af4afaSJohn Baldwin 				WITNESS_WARN(WARN_GIANTOK | WARN_SLEEPOK,
2532aa89d8cdSJohn Baldwin 				    &p->p_mtx.lock_object, "Catching SIGSTOP");
2533e574e444SDavid Xu 				p->p_flag |= P_STOPPED_SIG;
25342c42a146SMarcel Moolenaar 				p->p_xstat = sig;
25357b4a950aSDavid Xu 				PROC_SLOCK(p);
2536d8267df7SDavid Xu 				sig_suspend_threads(td, p, 0);
2537a54e85fdSJeff Roberson 				thread_suspend_switch(td);
25387b4a950aSDavid Xu 				PROC_SUNLOCK(p);
253990af4afaSJohn Baldwin 				mtx_lock(&ps->ps_mtx);
2540df8bae1dSRodney W. Grimes 				break;
254121b68415SDavid E. O'Brien 			} else if (prop & SA_IGNORE) {
2542df8bae1dSRodney W. Grimes 				/*
2543df8bae1dSRodney W. Grimes 				 * Except for SIGCONT, shouldn't get here.
2544df8bae1dSRodney W. Grimes 				 * Default action is to ignore; drop it.
2545df8bae1dSRodney W. Grimes 				 */
2546df8bae1dSRodney W. Grimes 				break;		/* == ignore */
2547df8bae1dSRodney W. Grimes 			} else
25482c42a146SMarcel Moolenaar 				return (sig);
2549df8bae1dSRodney W. Grimes 			/*NOTREACHED*/
2550df8bae1dSRodney W. Grimes 
2551d321df47SPoul-Henning Kamp 		case (intptr_t)SIG_IGN:
2552df8bae1dSRodney W. Grimes 			/*
2553df8bae1dSRodney W. Grimes 			 * Masking above should prevent us ever trying
2554df8bae1dSRodney W. Grimes 			 * to take action on an ignored signal other
2555df8bae1dSRodney W. Grimes 			 * than SIGCONT, unless process is traced.
2556df8bae1dSRodney W. Grimes 			 */
2557df8bae1dSRodney W. Grimes 			if ((prop & SA_CONT) == 0 &&
2558df8bae1dSRodney W. Grimes 			    (p->p_flag & P_TRACED) == 0)
2559df8bae1dSRodney W. Grimes 				printf("issignal\n");
2560df8bae1dSRodney W. Grimes 			break;		/* == ignore */
2561df8bae1dSRodney W. Grimes 
2562df8bae1dSRodney W. Grimes 		default:
2563df8bae1dSRodney W. Grimes 			/*
2564df8bae1dSRodney W. Grimes 			 * This signal has an action, let
2565df8bae1dSRodney W. Grimes 			 * postsig() process it.
2566df8bae1dSRodney W. Grimes 			 */
25672c42a146SMarcel Moolenaar 			return (sig);
2568df8bae1dSRodney W. Grimes 		}
25699104847fSDavid Xu 		sigqueue_delete(&td->td_sigqueue, sig);		/* take the signal! */
2570df8bae1dSRodney W. Grimes 	}
2571df8bae1dSRodney W. Grimes 	/* NOTREACHED */
2572df8bae1dSRodney W. Grimes }
2573df8bae1dSRodney W. Grimes 
2574e574e444SDavid Xu void
2575e574e444SDavid Xu thread_stopped(struct proc *p)
2576e574e444SDavid Xu {
2577e574e444SDavid Xu 	int n;
2578e574e444SDavid Xu 
2579e574e444SDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
25807b4a950aSDavid Xu 	PROC_SLOCK_ASSERT(p, MA_OWNED);
2581e574e444SDavid Xu 	n = p->p_suspcount;
25827c9a98f1SDavid Xu 	if (p == curproc)
2583e574e444SDavid Xu 		n++;
2584e574e444SDavid Xu 	if ((p->p_flag & P_STOPPED_SIG) && (n == p->p_numthreads)) {
25857b4a950aSDavid Xu 		PROC_SUNLOCK(p);
2586407948a5SDavid Xu 		p->p_flag &= ~P_WAITED;
2587e574e444SDavid Xu 		PROC_LOCK(p->p_pptr);
25887f96995eSDavid Xu 		childproc_stopped(p, (p->p_flag & P_TRACED) ?
2589ebceaf6dSDavid Xu 			CLD_TRAPPED : CLD_STOPPED);
2590e574e444SDavid Xu 		PROC_UNLOCK(p->p_pptr);
25917b4a950aSDavid Xu 		PROC_SLOCK(p);
2592e574e444SDavid Xu 	}
2593e574e444SDavid Xu }
2594e574e444SDavid Xu 
2595df8bae1dSRodney W. Grimes /*
2596df8bae1dSRodney W. Grimes  * Take the action for the specified signal
2597df8bae1dSRodney W. Grimes  * from the current set of pending signals.
2598df8bae1dSRodney W. Grimes  */
2599df8bae1dSRodney W. Grimes void
26002c42a146SMarcel Moolenaar postsig(sig)
26012c42a146SMarcel Moolenaar 	register int sig;
2602df8bae1dSRodney W. Grimes {
2603b40ce416SJulian Elischer 	struct thread *td = curthread;
2604b40ce416SJulian Elischer 	register struct proc *p = td->td_proc;
2605628d2653SJohn Baldwin 	struct sigacts *ps;
26062c42a146SMarcel Moolenaar 	sig_t action;
26079104847fSDavid Xu 	ksiginfo_t ksi;
26082c42a146SMarcel Moolenaar 	sigset_t returnmask;
2609df8bae1dSRodney W. Grimes 
26102c42a146SMarcel Moolenaar 	KASSERT(sig != 0, ("postsig"));
26115526d2d9SEivind Eklund 
26122ad7d304SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2613628d2653SJohn Baldwin 	ps = p->p_sigacts;
261490af4afaSJohn Baldwin 	mtx_assert(&ps->ps_mtx, MA_OWNED);
26155da49fcbSDavid Xu 	ksiginfo_init(&ksi);
26169104847fSDavid Xu 	sigqueue_get(&td->td_sigqueue, sig, &ksi);
26179104847fSDavid Xu 	ksi.ksi_signo = sig;
261856c06c4bSDavid Xu 	if (ksi.ksi_code == SI_TIMER)
261956c06c4bSDavid Xu 		itimer_accept(p, ksi.ksi_timerid, &ksi);
26202c42a146SMarcel Moolenaar 	action = ps->ps_sigact[_SIG_IDX(sig)];
2621df8bae1dSRodney W. Grimes #ifdef KTRACE
2622374a15aaSJohn Baldwin 	if (KTRPOINT(td, KTR_PSIG))
26235e26dcb5SJohn Baldwin 		ktrpsig(sig, action, td->td_pflags & TDP_OLDMASK ?
26244093529dSJeff Roberson 		    &td->td_oldsigmask : &td->td_sigmask, 0);
2625df8bae1dSRodney W. Grimes #endif
2626047aa39bSRobert Watson 	if (p->p_stops & S_SIG) {
2627047aa39bSRobert Watson 		mtx_unlock(&ps->ps_mtx);
2628047aa39bSRobert Watson 		stopevent(p, S_SIG, sig);
2629047aa39bSRobert Watson 		mtx_lock(&ps->ps_mtx);
2630047aa39bSRobert Watson 	}
26312a024a2bSSean Eric Fagan 
26328460a577SJohn Birrell 	if (action == SIG_DFL) {
2633df8bae1dSRodney W. Grimes 		/*
2634df8bae1dSRodney W. Grimes 		 * Default action, where the default is to kill
2635df8bae1dSRodney W. Grimes 		 * the process.  (Other cases were ignored above.)
2636df8bae1dSRodney W. Grimes 		 */
263790af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
2638b40ce416SJulian Elischer 		sigexit(td, sig);
2639df8bae1dSRodney W. Grimes 		/* NOTREACHED */
2640df8bae1dSRodney W. Grimes 	} else {
2641df8bae1dSRodney W. Grimes 		/*
2642df8bae1dSRodney W. Grimes 		 * If we get here, the signal must be caught.
2643df8bae1dSRodney W. Grimes 		 */
26444093529dSJeff Roberson 		KASSERT(action != SIG_IGN && !SIGISMEMBER(td->td_sigmask, sig),
26455526d2d9SEivind Eklund 		    ("postsig action"));
2646df8bae1dSRodney W. Grimes 		/*
2647df8bae1dSRodney W. Grimes 		 * Set the new mask value and also defer further
2648645682fdSLuoqi Chen 		 * occurrences of this signal.
2649df8bae1dSRodney W. Grimes 		 *
2650645682fdSLuoqi Chen 		 * Special case: user has done a sigsuspend.  Here the
2651df8bae1dSRodney W. Grimes 		 * current mask is not of interest, but rather the
2652645682fdSLuoqi Chen 		 * mask from before the sigsuspend is what we want
2653df8bae1dSRodney W. Grimes 		 * restored after the signal processing is completed.
2654df8bae1dSRodney W. Grimes 		 */
26555e26dcb5SJohn Baldwin 		if (td->td_pflags & TDP_OLDMASK) {
26564093529dSJeff Roberson 			returnmask = td->td_oldsigmask;
26575e26dcb5SJohn Baldwin 			td->td_pflags &= ~TDP_OLDMASK;
2658df8bae1dSRodney W. Grimes 		} else
26594093529dSJeff Roberson 			returnmask = td->td_sigmask;
26602c42a146SMarcel Moolenaar 
26614093529dSJeff Roberson 		SIGSETOR(td->td_sigmask, ps->ps_catchmask[_SIG_IDX(sig)]);
26622c42a146SMarcel Moolenaar 		if (!SIGISMEMBER(ps->ps_signodefer, sig))
26634093529dSJeff Roberson 			SIGADDSET(td->td_sigmask, sig);
26642c42a146SMarcel Moolenaar 
26652c42a146SMarcel Moolenaar 		if (SIGISMEMBER(ps->ps_sigreset, sig)) {
2666289ccde0SPeter Wemm 			/*
26678f19eb88SIan Dowse 			 * See kern_sigaction() for origin of this code.
2668289ccde0SPeter Wemm 			 */
266990af4afaSJohn Baldwin 			SIGDELSET(ps->ps_sigcatch, sig);
26702c42a146SMarcel Moolenaar 			if (sig != SIGCONT &&
26712c42a146SMarcel Moolenaar 			    sigprop(sig) & SA_IGNORE)
267290af4afaSJohn Baldwin 				SIGADDSET(ps->ps_sigignore, sig);
26732c42a146SMarcel Moolenaar 			ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
2674dedc04feSPeter Wemm 		}
26751c4bcd05SJeff Roberson 		td->td_ru.ru_nsignals++;
2676c90c9021SEd Schouten 		if (p->p_sig == sig) {
26776626c604SJulian Elischer 			p->p_code = 0;
26786626c604SJulian Elischer 			p->p_sig = 0;
2679df8bae1dSRodney W. Grimes 		}
26809104847fSDavid Xu 		(*p->p_sysent->sv_sendsig)(action, &ksi, &returnmask);
2681df8bae1dSRodney W. Grimes 	}
2682df8bae1dSRodney W. Grimes }
2683df8bae1dSRodney W. Grimes 
2684df8bae1dSRodney W. Grimes /*
2685df8bae1dSRodney W. Grimes  * Kill the current process for stated reason.
2686df8bae1dSRodney W. Grimes  */
268726f9a767SRodney W. Grimes void
2688df8bae1dSRodney W. Grimes killproc(p, why)
2689df8bae1dSRodney W. Grimes 	struct proc *p;
2690df8bae1dSRodney W. Grimes 	char *why;
2691df8bae1dSRodney W. Grimes {
26929081e5e8SJohn Baldwin 
26939081e5e8SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
26940384fff8SJason Evans 	CTR3(KTR_PROC, "killproc: proc %p (pid %d, %s)",
26950384fff8SJason Evans 		p, p->p_pid, p->p_comm);
2696729b1e51SDavid Greenman 	log(LOG_ERR, "pid %d (%s), uid %d, was killed: %s\n", p->p_pid, p->p_comm,
2697b1fc0ec1SRobert Watson 		p->p_ucred ? p->p_ucred->cr_uid : -1, why);
2698df8bae1dSRodney W. Grimes 	psignal(p, SIGKILL);
2699df8bae1dSRodney W. Grimes }
2700df8bae1dSRodney W. Grimes 
2701df8bae1dSRodney W. Grimes /*
2702df8bae1dSRodney W. Grimes  * Force the current process to exit with the specified signal, dumping core
2703df8bae1dSRodney W. Grimes  * if appropriate.  We bypass the normal tests for masked and caught signals,
2704df8bae1dSRodney W. Grimes  * allowing unrecoverable failures to terminate the process without changing
2705df8bae1dSRodney W. Grimes  * signal state.  Mark the accounting record with the signal termination.
2706df8bae1dSRodney W. Grimes  * If dumping core, save the signal number for the debugger.  Calls exit and
2707df8bae1dSRodney W. Grimes  * does not return.
2708df8bae1dSRodney W. Grimes  */
270926f9a767SRodney W. Grimes void
2710b40ce416SJulian Elischer sigexit(td, sig)
2711b40ce416SJulian Elischer 	struct thread *td;
27122c42a146SMarcel Moolenaar 	int sig;
2713df8bae1dSRodney W. Grimes {
2714b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
2715df8bae1dSRodney W. Grimes 
2716628d2653SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2717df8bae1dSRodney W. Grimes 	p->p_acflag |= AXSIG;
2718f97c3df1SDavid Schultz 	/*
2719f97c3df1SDavid Schultz 	 * We must be single-threading to generate a core dump.  This
2720f97c3df1SDavid Schultz 	 * ensures that the registers in the core file are up-to-date.
2721f97c3df1SDavid Schultz 	 * Also, the ELF dump handler assumes that the thread list doesn't
2722f97c3df1SDavid Schultz 	 * change out from under it.
2723f97c3df1SDavid Schultz 	 *
2724f97c3df1SDavid Schultz 	 * XXX If another thread attempts to single-thread before us
2725f97c3df1SDavid Schultz 	 *     (e.g. via fork()), we won't get a dump at all.
2726f97c3df1SDavid Schultz 	 */
2727f97c3df1SDavid Schultz 	if ((sigprop(sig) & SA_CORE) && (thread_single(SINGLE_NO_EXIT) == 0)) {
27282c42a146SMarcel Moolenaar 		p->p_sig = sig;
2729c364e17eSAndrey A. Chernov 		/*
2730c364e17eSAndrey A. Chernov 		 * Log signals which would cause core dumps
2731c364e17eSAndrey A. Chernov 		 * (Log as LOG_INFO to appease those who don't want
2732c364e17eSAndrey A. Chernov 		 * these messages.)
2733c364e17eSAndrey A. Chernov 		 * XXX : Todo, as well as euid, write out ruid too
27344ae89b95SJohn Baldwin 		 * Note that coredump() drops proc lock.
2735c364e17eSAndrey A. Chernov 		 */
2736b40ce416SJulian Elischer 		if (coredump(td) == 0)
27372c42a146SMarcel Moolenaar 			sig |= WCOREFLAG;
273857308494SJoerg Wunsch 		if (kern_logsigexit)
273957308494SJoerg Wunsch 			log(LOG_INFO,
274057308494SJoerg Wunsch 			    "pid %d (%s), uid %d: exited on signal %d%s\n",
27413d1b21c6SAndrey A. Chernov 			    p->p_pid, p->p_comm,
27429c1ab3e0SJohn Baldwin 			    td->td_ucred ? td->td_ucred->cr_uid : -1,
27432c42a146SMarcel Moolenaar 			    sig &~ WCOREFLAG,
27442c42a146SMarcel Moolenaar 			    sig & WCOREFLAG ? " (core dumped)" : "");
27454ae89b95SJohn Baldwin 	} else
2746628d2653SJohn Baldwin 		PROC_UNLOCK(p);
2747b40ce416SJulian Elischer 	exit1(td, W_EXITCODE(0, sig));
2748df8bae1dSRodney W. Grimes 	/* NOTREACHED */
2749df8bae1dSRodney W. Grimes }
2750df8bae1dSRodney W. Grimes 
2751ebceaf6dSDavid Xu /*
27527f96995eSDavid Xu  * Send queued SIGCHLD to parent when child process's state
27537f96995eSDavid Xu  * is changed.
2754ebceaf6dSDavid Xu  */
27557f96995eSDavid Xu static void
27567f96995eSDavid Xu sigparent(struct proc *p, int reason, int status)
2757ebceaf6dSDavid Xu {
2758ebceaf6dSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
2759ebceaf6dSDavid Xu 	PROC_LOCK_ASSERT(p->p_pptr, MA_OWNED);
2760ebceaf6dSDavid Xu 
2761ebceaf6dSDavid Xu 	if (p->p_ksi != NULL) {
2762ebceaf6dSDavid Xu 		p->p_ksi->ksi_signo  = SIGCHLD;
2763ebceaf6dSDavid Xu 		p->p_ksi->ksi_code   = reason;
27647f96995eSDavid Xu 		p->p_ksi->ksi_status = status;
2765ebceaf6dSDavid Xu 		p->p_ksi->ksi_pid    = p->p_pid;
2766ebceaf6dSDavid Xu 		p->p_ksi->ksi_uid    = p->p_ucred->cr_ruid;
2767ebceaf6dSDavid Xu 		if (KSI_ONQ(p->p_ksi))
2768ebceaf6dSDavid Xu 			return;
2769ebceaf6dSDavid Xu 	}
2770ebceaf6dSDavid Xu 	tdsignal(p->p_pptr, NULL, SIGCHLD, p->p_ksi);
2771ebceaf6dSDavid Xu }
2772ebceaf6dSDavid Xu 
27737f96995eSDavid Xu static void
27747f96995eSDavid Xu childproc_jobstate(struct proc *p, int reason, int status)
27757f96995eSDavid Xu {
27767f96995eSDavid Xu 	struct sigacts *ps;
27777f96995eSDavid Xu 
27787f96995eSDavid Xu 	PROC_LOCK_ASSERT(p, MA_OWNED);
27797f96995eSDavid Xu 	PROC_LOCK_ASSERT(p->p_pptr, MA_OWNED);
27807f96995eSDavid Xu 
27817f96995eSDavid Xu 	/*
27827f96995eSDavid Xu 	 * Wake up parent sleeping in kern_wait(), also send
27837f96995eSDavid Xu 	 * SIGCHLD to parent, but SIGCHLD does not guarantee
27847f96995eSDavid Xu 	 * that parent will awake, because parent may masked
27857f96995eSDavid Xu 	 * the signal.
27867f96995eSDavid Xu 	 */
27877f96995eSDavid Xu 	p->p_pptr->p_flag |= P_STATCHILD;
27887f96995eSDavid Xu 	wakeup(p->p_pptr);
27897f96995eSDavid Xu 
27907f96995eSDavid Xu 	ps = p->p_pptr->p_sigacts;
27917f96995eSDavid Xu 	mtx_lock(&ps->ps_mtx);
27927f96995eSDavid Xu 	if ((ps->ps_flag & PS_NOCLDSTOP) == 0) {
27937f96995eSDavid Xu 		mtx_unlock(&ps->ps_mtx);
27947f96995eSDavid Xu 		sigparent(p, reason, status);
27957f96995eSDavid Xu 	} else
27967f96995eSDavid Xu 		mtx_unlock(&ps->ps_mtx);
27977f96995eSDavid Xu }
27987f96995eSDavid Xu 
27997f96995eSDavid Xu void
28007f96995eSDavid Xu childproc_stopped(struct proc *p, int reason)
28017f96995eSDavid Xu {
28027f96995eSDavid Xu 	childproc_jobstate(p, reason, p->p_xstat);
28037f96995eSDavid Xu }
28047f96995eSDavid Xu 
2805ebceaf6dSDavid Xu void
2806ebceaf6dSDavid Xu childproc_continued(struct proc *p)
2807ebceaf6dSDavid Xu {
28087f96995eSDavid Xu 	childproc_jobstate(p, CLD_CONTINUED, SIGCONT);
2809ebceaf6dSDavid Xu }
2810ebceaf6dSDavid Xu 
2811ebceaf6dSDavid Xu void
2812ebceaf6dSDavid Xu childproc_exited(struct proc *p)
2813ebceaf6dSDavid Xu {
2814ebceaf6dSDavid Xu 	int reason;
2815f4d85223SDavid Xu 	int status = p->p_xstat; /* convert to int */
2816ebceaf6dSDavid Xu 
2817ebceaf6dSDavid Xu 	reason = CLD_EXITED;
2818f4d85223SDavid Xu 	if (WCOREDUMP(status))
2819ebceaf6dSDavid Xu 		reason = CLD_DUMPED;
2820f4d85223SDavid Xu 	else if (WIFSIGNALED(status))
2821ebceaf6dSDavid Xu 		reason = CLD_KILLED;
28227f96995eSDavid Xu 	/*
28237f96995eSDavid Xu 	 * XXX avoid calling wakeup(p->p_pptr), the work is
28247f96995eSDavid Xu 	 * done in exit1().
28257f96995eSDavid Xu 	 */
28267f96995eSDavid Xu 	sigparent(p, reason, status);
2827ebceaf6dSDavid Xu }
2828ebceaf6dSDavid Xu 
28296d1ab6edSWarner Losh static char corefilename[MAXPATHLEN] = {"%N.core"};
2830c5edb423SSean Eric Fagan SYSCTL_STRING(_kern, OID_AUTO, corefile, CTLFLAG_RW, corefilename,
2831c5edb423SSean Eric Fagan 	      sizeof(corefilename), "process corefile name format string");
2832c5edb423SSean Eric Fagan 
2833c5edb423SSean Eric Fagan /*
2834c5edb423SSean Eric Fagan  * expand_name(name, uid, pid)
2835c5edb423SSean Eric Fagan  * Expand the name described in corefilename, using name, uid, and pid.
2836c5edb423SSean Eric Fagan  * corefilename is a printf-like string, with three format specifiers:
2837c5edb423SSean Eric Fagan  *	%N	name of process ("name")
2838c5edb423SSean Eric Fagan  *	%P	process id (pid)
2839c5edb423SSean Eric Fagan  *	%U	user id (uid)
2840c5edb423SSean Eric Fagan  * For example, "%N.core" is the default; they can be disabled completely
2841c5edb423SSean Eric Fagan  * by using "/dev/null", or all core files can be stored in "/cores/%U/%N-%P".
2842c5edb423SSean Eric Fagan  * This is controlled by the sysctl variable kern.corefile (see above).
2843c5edb423SSean Eric Fagan  */
2844fca666a1SJulian Elischer static char *
2845c5edb423SSean Eric Fagan expand_name(name, uid, pid)
28468b43b535SAlfred Perlstein 	const char *name;
28478b43b535SAlfred Perlstein 	uid_t uid;
28488b43b535SAlfred Perlstein 	pid_t pid;
28498b43b535SAlfred Perlstein {
285036b208e0SRobert Watson 	struct sbuf sb;
285136b208e0SRobert Watson 	const char *format;
2852c5edb423SSean Eric Fagan 	char *temp;
285336b208e0SRobert Watson 	size_t i;
2854c5edb423SSean Eric Fagan 
28558b43b535SAlfred Perlstein 	format = corefilename;
28568b43b535SAlfred Perlstein 	temp = malloc(MAXPATHLEN, M_TEMP, M_NOWAIT | M_ZERO);
28570bfe2990SEivind Eklund 	if (temp == NULL)
28588b43b535SAlfred Perlstein 		return (NULL);
285936b208e0SRobert Watson 	(void)sbuf_new(&sb, temp, MAXPATHLEN, SBUF_FIXEDLEN);
286036b208e0SRobert Watson 	for (i = 0; format[i]; i++) {
2861c5edb423SSean Eric Fagan 		switch (format[i]) {
2862c5edb423SSean Eric Fagan 		case '%':	/* Format character */
2863c5edb423SSean Eric Fagan 			i++;
2864c5edb423SSean Eric Fagan 			switch (format[i]) {
2865c5edb423SSean Eric Fagan 			case '%':
286636b208e0SRobert Watson 				sbuf_putc(&sb, '%');
2867c5edb423SSean Eric Fagan 				break;
2868c5edb423SSean Eric Fagan 			case 'N':	/* process name */
286936b208e0SRobert Watson 				sbuf_printf(&sb, "%s", name);
2870c5edb423SSean Eric Fagan 				break;
2871c5edb423SSean Eric Fagan 			case 'P':	/* process id */
287236b208e0SRobert Watson 				sbuf_printf(&sb, "%u", pid);
2873c5edb423SSean Eric Fagan 				break;
2874c5edb423SSean Eric Fagan 			case 'U':	/* user id */
287536b208e0SRobert Watson 				sbuf_printf(&sb, "%u", uid);
2876c5edb423SSean Eric Fagan 				break;
2877c5edb423SSean Eric Fagan 			default:
28788b43b535SAlfred Perlstein 			  	log(LOG_ERR,
287936b208e0SRobert Watson 				    "Unknown format character %c in "
288036b208e0SRobert Watson 				    "corename `%s'\n", format[i], format);
2881c5edb423SSean Eric Fagan 			}
2882c5edb423SSean Eric Fagan 			break;
2883c5edb423SSean Eric Fagan 		default:
288436b208e0SRobert Watson 			sbuf_putc(&sb, format[i]);
2885c5edb423SSean Eric Fagan 		}
2886c5edb423SSean Eric Fagan 	}
288736b208e0SRobert Watson 	if (sbuf_overflowed(&sb)) {
288836b208e0SRobert Watson 		sbuf_delete(&sb);
288936b208e0SRobert Watson 		log(LOG_ERR, "pid %ld (%s), uid (%lu): corename is too "
289036b208e0SRobert Watson 		    "long\n", (long)pid, name, (u_long)uid);
28918b43b535SAlfred Perlstein 		free(temp, M_TEMP);
28928b43b535SAlfred Perlstein 		return (NULL);
2893c5edb423SSean Eric Fagan 	}
289436b208e0SRobert Watson 	sbuf_finish(&sb);
289536b208e0SRobert Watson 	sbuf_delete(&sb);
289636b208e0SRobert Watson 	return (temp);
289736b208e0SRobert Watson }
2898c5edb423SSean Eric Fagan 
2899df8bae1dSRodney W. Grimes /*
2900fca666a1SJulian Elischer  * Dump a process' core.  The main routine does some
2901fca666a1SJulian Elischer  * policy checking, and creates the name of the coredump;
2902fca666a1SJulian Elischer  * then it passes on a vnode and a size limit to the process-specific
2903fca666a1SJulian Elischer  * coredump routine if there is one; if there _is not_ one, it returns
2904fca666a1SJulian Elischer  * ENOSYS; otherwise it returns the error from the process-specific routine.
2905fca666a1SJulian Elischer  */
2906fca666a1SJulian Elischer 
2907fca666a1SJulian Elischer static int
2908b40ce416SJulian Elischer coredump(struct thread *td)
2909fca666a1SJulian Elischer {
2910b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
2911fca666a1SJulian Elischer 	register struct vnode *vp;
29129c1ab3e0SJohn Baldwin 	register struct ucred *cred = td->td_ucred;
291306ae1e91SMatthew Dillon 	struct flock lf;
2914fca666a1SJulian Elischer 	struct nameidata nd;
2915fca666a1SJulian Elischer 	struct vattr vattr;
2916c447f5b2SRobert Watson 	int error, error1, flags, locked;
2917f2a2857bSKirk McKusick 	struct mount *mp;
2918fca666a1SJulian Elischer 	char *name;			/* name of corefile */
2919fca666a1SJulian Elischer 	off_t limit;
292033f19beeSJohn Baldwin 	int vfslocked;
2921fca666a1SJulian Elischer 
29224ae89b95SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
2923f97c3df1SDavid Schultz 	MPASS((p->p_flag & P_HADTHREADS) == 0 || p->p_singlethread == td);
2924628d2653SJohn Baldwin 	_STOPEVENT(p, S_CORE, 0);
2925fca666a1SJulian Elischer 
292657274c51SChristian S.J. Peron 	name = expand_name(p->p_comm, td->td_ucred->cr_uid, p->p_pid);
292757274c51SChristian S.J. Peron 	if (name == NULL) {
2928eeccc367SRobert Watson 		PROC_UNLOCK(p);
292957274c51SChristian S.J. Peron #ifdef AUDIT
293057274c51SChristian S.J. Peron 		audit_proc_coredump(td, NULL, EINVAL);
293157274c51SChristian S.J. Peron #endif
293257274c51SChristian S.J. Peron 		return (EINVAL);
293357274c51SChristian S.J. Peron 	}
2934628d2653SJohn Baldwin 	if (((sugid_coredump == 0) && p->p_flag & P_SUGID) || do_coredump == 0) {
2935628d2653SJohn Baldwin 		PROC_UNLOCK(p);
293657274c51SChristian S.J. Peron #ifdef AUDIT
293757274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, EFAULT);
293857274c51SChristian S.J. Peron #endif
293957274c51SChristian S.J. Peron 		free(name, M_TEMP);
2940fca666a1SJulian Elischer 		return (EFAULT);
2941628d2653SJohn Baldwin 	}
2942fca666a1SJulian Elischer 
2943fca666a1SJulian Elischer 	/*
294435a2598fSSean Eric Fagan 	 * Note that the bulk of limit checking is done after
294535a2598fSSean Eric Fagan 	 * the corefile is created.  The exception is if the limit
294635a2598fSSean Eric Fagan 	 * for corefiles is 0, in which case we don't bother
294735a2598fSSean Eric Fagan 	 * creating the corefile at all.  This layout means that
294835a2598fSSean Eric Fagan 	 * a corefile is truncated instead of not being created,
294935a2598fSSean Eric Fagan 	 * if it is larger than the limit.
2950fca666a1SJulian Elischer 	 */
295191d5354aSJohn Baldwin 	limit = (off_t)lim_cur(p, RLIMIT_CORE);
2952628d2653SJohn Baldwin 	PROC_UNLOCK(p);
295357274c51SChristian S.J. Peron 	if (limit == 0) {
295457274c51SChristian S.J. Peron #ifdef AUDIT
295557274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, EFBIG);
295657274c51SChristian S.J. Peron #endif
295757274c51SChristian S.J. Peron 		free(name, M_TEMP);
295891d5354aSJohn Baldwin 		return (EFBIG);
295957274c51SChristian S.J. Peron 	}
296035a2598fSSean Eric Fagan 
2961f2a2857bSKirk McKusick restart:
296233f19beeSJohn Baldwin 	NDINIT(&nd, LOOKUP, NOFOLLOW | MPSAFE, UIO_SYSSPACE, name, td);
2963e6796b67SKirk McKusick 	flags = O_CREAT | FWRITE | O_NOFOLLOW;
2964e0c161b8SKonstantin Belousov 	error = vn_open_cred(&nd, &flags, S_IRUSR | S_IWUSR, VN_OPEN_NOAUDIT,
2965401679deSPeter Holm 	    cred, NULL);
296657274c51SChristian S.J. Peron 	if (error) {
296757274c51SChristian S.J. Peron #ifdef AUDIT
296857274c51SChristian S.J. Peron 		audit_proc_coredump(td, name, error);
296957274c51SChristian S.J. Peron #endif
2970fca666a1SJulian Elischer 		free(name, M_TEMP);
2971fca666a1SJulian Elischer 		return (error);
297257274c51SChristian S.J. Peron 	}
297333f19beeSJohn Baldwin 	vfslocked = NDHASGIANT(&nd);
2974762e6b85SEivind Eklund 	NDFREE(&nd, NDF_ONLY_PNBUF);
2975fca666a1SJulian Elischer 	vp = nd.ni_vp;
297606ae1e91SMatthew Dillon 
2977832dafadSDon Lewis 	/* Don't dump to non-regular files or files with links. */
2978832dafadSDon Lewis 	if (vp->v_type != VREG ||
29790359a12eSAttilio Rao 	    VOP_GETATTR(vp, &vattr, cred) || vattr.va_nlink != 1) {
298022db15c0SAttilio Rao 		VOP_UNLOCK(vp, 0);
2981832dafadSDon Lewis 		error = EFAULT;
298233f19beeSJohn Baldwin 		goto close;
2983832dafadSDon Lewis 	}
2984832dafadSDon Lewis 
298522db15c0SAttilio Rao 	VOP_UNLOCK(vp, 0);
298606ae1e91SMatthew Dillon 	lf.l_whence = SEEK_SET;
298706ae1e91SMatthew Dillon 	lf.l_start = 0;
298806ae1e91SMatthew Dillon 	lf.l_len = 0;
298906ae1e91SMatthew Dillon 	lf.l_type = F_WRLCK;
2990c447f5b2SRobert Watson 	locked = (VOP_ADVLOCK(vp, (caddr_t)p, F_SETLK, &lf, F_FLOCK) == 0);
299106ae1e91SMatthew Dillon 
299206ae1e91SMatthew Dillon 	if (vn_start_write(vp, &mp, V_NOWAIT) != 0) {
299306ae1e91SMatthew Dillon 		lf.l_type = F_UNLCK;
299436bbf86bSRobert Watson 		if (locked)
299506ae1e91SMatthew Dillon 			VOP_ADVLOCK(vp, (caddr_t)p, F_UNLCK, &lf, F_FLOCK);
2996b40ce416SJulian Elischer 		if ((error = vn_close(vp, FWRITE, cred, td)) != 0)
299733f19beeSJohn Baldwin 			goto out;
2998f2a2857bSKirk McKusick 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
299933f19beeSJohn Baldwin 			goto out;
300033f19beeSJohn Baldwin 		VFS_UNLOCK_GIANT(vfslocked);
3001f2a2857bSKirk McKusick 		goto restart;
3002f2a2857bSKirk McKusick 	}
3003fca666a1SJulian Elischer 
3004fca666a1SJulian Elischer 	VATTR_NULL(&vattr);
3005fca666a1SJulian Elischer 	vattr.va_size = 0;
30066141e04aSJohn-Mark Gurney 	if (set_core_nodump_flag)
30076141e04aSJohn-Mark Gurney 		vattr.va_flags = UF_NODUMP;
3008cb05b60aSAttilio Rao 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
30090359a12eSAttilio Rao 	VOP_SETATTR(vp, &vattr, cred);
301022db15c0SAttilio Rao 	VOP_UNLOCK(vp, 0);
301111991ab4STor Egge 	vn_finished_write(mp);
3012628d2653SJohn Baldwin 	PROC_LOCK(p);
3013fca666a1SJulian Elischer 	p->p_acflag |= ACORE;
3014628d2653SJohn Baldwin 	PROC_UNLOCK(p);
3015fca666a1SJulian Elischer 
3016fca666a1SJulian Elischer 	error = p->p_sysent->sv_coredump ?
3017b40ce416SJulian Elischer 	  p->p_sysent->sv_coredump(td, vp, limit) :
3018fca666a1SJulian Elischer 	  ENOSYS;
3019fca666a1SJulian Elischer 
3020c447f5b2SRobert Watson 	if (locked) {
302106ae1e91SMatthew Dillon 		lf.l_type = F_UNLCK;
302206ae1e91SMatthew Dillon 		VOP_ADVLOCK(vp, (caddr_t)p, F_UNLCK, &lf, F_FLOCK);
3023c447f5b2SRobert Watson 	}
302433f19beeSJohn Baldwin close:
3025b40ce416SJulian Elischer 	error1 = vn_close(vp, FWRITE, cred, td);
3026fca666a1SJulian Elischer 	if (error == 0)
3027fca666a1SJulian Elischer 		error = error1;
302833f19beeSJohn Baldwin out:
302957274c51SChristian S.J. Peron #ifdef AUDIT
303057274c51SChristian S.J. Peron 	audit_proc_coredump(td, name, error);
303157274c51SChristian S.J. Peron #endif
303257274c51SChristian S.J. Peron 	free(name, M_TEMP);
303333f19beeSJohn Baldwin 	VFS_UNLOCK_GIANT(vfslocked);
3034fca666a1SJulian Elischer 	return (error);
3035fca666a1SJulian Elischer }
3036fca666a1SJulian Elischer 
3037fca666a1SJulian Elischer /*
30380c14ff0eSRobert Watson  * Nonexistent system call-- signal process (may want to handle it).  Flag
30390c14ff0eSRobert Watson  * error in case process won't see signal immediately (blocked or ignored).
3040df8bae1dSRodney W. Grimes  */
3041d2d3e875SBruce Evans #ifndef _SYS_SYSPROTO_H_
3042df8bae1dSRodney W. Grimes struct nosys_args {
3043df8bae1dSRodney W. Grimes 	int	dummy;
3044df8bae1dSRodney W. Grimes };
3045d2d3e875SBruce Evans #endif
3046df8bae1dSRodney W. Grimes /* ARGSUSED */
304726f9a767SRodney W. Grimes int
3048b40ce416SJulian Elischer nosys(td, args)
3049b40ce416SJulian Elischer 	struct thread *td;
3050df8bae1dSRodney W. Grimes 	struct nosys_args *args;
3051df8bae1dSRodney W. Grimes {
3052b40ce416SJulian Elischer 	struct proc *p = td->td_proc;
3053b40ce416SJulian Elischer 
3054628d2653SJohn Baldwin 	PROC_LOCK(p);
3055df8bae1dSRodney W. Grimes 	psignal(p, SIGSYS);
3056628d2653SJohn Baldwin 	PROC_UNLOCK(p);
3057f5216b9aSBruce Evans 	return (ENOSYS);
3058df8bae1dSRodney W. Grimes }
3059831d27a9SDon Lewis 
3060831d27a9SDon Lewis /*
30610c14ff0eSRobert Watson  * Send a SIGIO or SIGURG signal to a process or process group using stored
30620c14ff0eSRobert Watson  * credentials rather than those of the current process.
3063831d27a9SDon Lewis  */
3064831d27a9SDon Lewis void
3065f1320723SAlfred Perlstein pgsigio(sigiop, sig, checkctty)
3066f1320723SAlfred Perlstein 	struct sigio **sigiop;
30672c42a146SMarcel Moolenaar 	int sig, checkctty;
3068831d27a9SDon Lewis {
3069f1320723SAlfred Perlstein 	struct sigio *sigio;
3070831d27a9SDon Lewis 
3071f1320723SAlfred Perlstein 	SIGIO_LOCK();
3072f1320723SAlfred Perlstein 	sigio = *sigiop;
3073f1320723SAlfred Perlstein 	if (sigio == NULL) {
3074f1320723SAlfred Perlstein 		SIGIO_UNLOCK();
3075f1320723SAlfred Perlstein 		return;
3076f1320723SAlfred Perlstein 	}
3077831d27a9SDon Lewis 	if (sigio->sio_pgid > 0) {
3078628d2653SJohn Baldwin 		PROC_LOCK(sigio->sio_proc);
30792b87b6d4SRobert Watson 		if (CANSIGIO(sigio->sio_ucred, sigio->sio_proc->p_ucred))
30802c42a146SMarcel Moolenaar 			psignal(sigio->sio_proc, sig);
3081628d2653SJohn Baldwin 		PROC_UNLOCK(sigio->sio_proc);
3082831d27a9SDon Lewis 	} else if (sigio->sio_pgid < 0) {
3083831d27a9SDon Lewis 		struct proc *p;
3084831d27a9SDon Lewis 
3085f591779bSSeigo Tanimura 		PGRP_LOCK(sigio->sio_pgrp);
3086628d2653SJohn Baldwin 		LIST_FOREACH(p, &sigio->sio_pgrp->pg_members, p_pglist) {
3087628d2653SJohn Baldwin 			PROC_LOCK(p);
30882b87b6d4SRobert Watson 			if (CANSIGIO(sigio->sio_ucred, p->p_ucred) &&
3089831d27a9SDon Lewis 			    (checkctty == 0 || (p->p_flag & P_CONTROLT)))
30902c42a146SMarcel Moolenaar 				psignal(p, sig);
3091628d2653SJohn Baldwin 			PROC_UNLOCK(p);
3092628d2653SJohn Baldwin 		}
3093f591779bSSeigo Tanimura 		PGRP_UNLOCK(sigio->sio_pgrp);
3094831d27a9SDon Lewis 	}
3095f1320723SAlfred Perlstein 	SIGIO_UNLOCK();
3096831d27a9SDon Lewis }
3097cb679c38SJonathan Lemon 
3098cb679c38SJonathan Lemon static int
3099cb679c38SJonathan Lemon filt_sigattach(struct knote *kn)
3100cb679c38SJonathan Lemon {
3101cb679c38SJonathan Lemon 	struct proc *p = curproc;
3102cb679c38SJonathan Lemon 
3103cb679c38SJonathan Lemon 	kn->kn_ptr.p_proc = p;
3104cb679c38SJonathan Lemon 	kn->kn_flags |= EV_CLEAR;		/* automatically set */
3105cb679c38SJonathan Lemon 
3106ad3b9257SJohn-Mark Gurney 	knlist_add(&p->p_klist, kn, 0);
3107cb679c38SJonathan Lemon 
3108cb679c38SJonathan Lemon 	return (0);
3109cb679c38SJonathan Lemon }
3110cb679c38SJonathan Lemon 
3111cb679c38SJonathan Lemon static void
3112cb679c38SJonathan Lemon filt_sigdetach(struct knote *kn)
3113cb679c38SJonathan Lemon {
3114cb679c38SJonathan Lemon 	struct proc *p = kn->kn_ptr.p_proc;
3115cb679c38SJonathan Lemon 
3116ad3b9257SJohn-Mark Gurney 	knlist_remove(&p->p_klist, kn, 0);
3117cb679c38SJonathan Lemon }
3118cb679c38SJonathan Lemon 
3119cb679c38SJonathan Lemon /*
3120cb679c38SJonathan Lemon  * signal knotes are shared with proc knotes, so we apply a mask to
3121cb679c38SJonathan Lemon  * the hint in order to differentiate them from process hints.  This
3122cb679c38SJonathan Lemon  * could be avoided by using a signal-specific knote list, but probably
3123cb679c38SJonathan Lemon  * isn't worth the trouble.
3124cb679c38SJonathan Lemon  */
3125cb679c38SJonathan Lemon static int
3126cb679c38SJonathan Lemon filt_signal(struct knote *kn, long hint)
3127cb679c38SJonathan Lemon {
3128cb679c38SJonathan Lemon 
3129cb679c38SJonathan Lemon 	if (hint & NOTE_SIGNAL) {
3130cb679c38SJonathan Lemon 		hint &= ~NOTE_SIGNAL;
3131cb679c38SJonathan Lemon 
3132cb679c38SJonathan Lemon 		if (kn->kn_id == hint)
3133cb679c38SJonathan Lemon 			kn->kn_data++;
3134cb679c38SJonathan Lemon 	}
3135cb679c38SJonathan Lemon 	return (kn->kn_data != 0);
3136cb679c38SJonathan Lemon }
313790af4afaSJohn Baldwin 
313890af4afaSJohn Baldwin struct sigacts *
313990af4afaSJohn Baldwin sigacts_alloc(void)
314090af4afaSJohn Baldwin {
314190af4afaSJohn Baldwin 	struct sigacts *ps;
314290af4afaSJohn Baldwin 
314390af4afaSJohn Baldwin 	ps = malloc(sizeof(struct sigacts), M_SUBPROC, M_WAITOK | M_ZERO);
314490af4afaSJohn Baldwin 	ps->ps_refcnt = 1;
314590af4afaSJohn Baldwin 	mtx_init(&ps->ps_mtx, "sigacts", NULL, MTX_DEF);
314690af4afaSJohn Baldwin 	return (ps);
314790af4afaSJohn Baldwin }
314890af4afaSJohn Baldwin 
314990af4afaSJohn Baldwin void
315090af4afaSJohn Baldwin sigacts_free(struct sigacts *ps)
315190af4afaSJohn Baldwin {
315290af4afaSJohn Baldwin 
315390af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
315490af4afaSJohn Baldwin 	ps->ps_refcnt--;
315590af4afaSJohn Baldwin 	if (ps->ps_refcnt == 0) {
315690af4afaSJohn Baldwin 		mtx_destroy(&ps->ps_mtx);
315790af4afaSJohn Baldwin 		free(ps, M_SUBPROC);
315890af4afaSJohn Baldwin 	} else
315990af4afaSJohn Baldwin 		mtx_unlock(&ps->ps_mtx);
316090af4afaSJohn Baldwin }
316190af4afaSJohn Baldwin 
316290af4afaSJohn Baldwin struct sigacts *
316390af4afaSJohn Baldwin sigacts_hold(struct sigacts *ps)
316490af4afaSJohn Baldwin {
316590af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
316690af4afaSJohn Baldwin 	ps->ps_refcnt++;
316790af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
316890af4afaSJohn Baldwin 	return (ps);
316990af4afaSJohn Baldwin }
317090af4afaSJohn Baldwin 
317190af4afaSJohn Baldwin void
317290af4afaSJohn Baldwin sigacts_copy(struct sigacts *dest, struct sigacts *src)
317390af4afaSJohn Baldwin {
317490af4afaSJohn Baldwin 
317590af4afaSJohn Baldwin 	KASSERT(dest->ps_refcnt == 1, ("sigacts_copy to shared dest"));
317690af4afaSJohn Baldwin 	mtx_lock(&src->ps_mtx);
317790af4afaSJohn Baldwin 	bcopy(src, dest, offsetof(struct sigacts, ps_refcnt));
317890af4afaSJohn Baldwin 	mtx_unlock(&src->ps_mtx);
317990af4afaSJohn Baldwin }
318090af4afaSJohn Baldwin 
318190af4afaSJohn Baldwin int
318290af4afaSJohn Baldwin sigacts_shared(struct sigacts *ps)
318390af4afaSJohn Baldwin {
318490af4afaSJohn Baldwin 	int shared;
318590af4afaSJohn Baldwin 
318690af4afaSJohn Baldwin 	mtx_lock(&ps->ps_mtx);
318790af4afaSJohn Baldwin 	shared = ps->ps_refcnt > 1;
318890af4afaSJohn Baldwin 	mtx_unlock(&ps->ps_mtx);
318990af4afaSJohn Baldwin 	return (shared);
319090af4afaSJohn Baldwin }
3191