sys_sig.c revision 1.32 1 /* $NetBSD: sys_sig.c,v 1.32 2011/03/03 20:46:16 martin Exp $ */
2
3 /*-
4 * Copyright (c) 2006, 2007, 2008 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Andrew Doran.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * Copyright (c) 1982, 1986, 1989, 1991, 1993
34 * The Regents of the University of California. All rights reserved.
35 * (c) UNIX System Laboratories, Inc.
36 * All or some portions of this file are derived from material licensed
37 * to the University of California by American Telephone and Telegraph
38 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
39 * the permission of UNIX System Laboratories, Inc.
40 *
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
43 * are met:
44 * 1. Redistributions of source code must retain the above copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. Neither the name of the University nor the names of its contributors
50 * may be used to endorse or promote products derived from this software
51 * without specific prior written permission.
52 *
53 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
54 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
55 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
56 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
57 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
58 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
59 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
60 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
61 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
62 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
63 * SUCH DAMAGE.
64 *
65 * @(#)kern_sig.c 8.14 (Berkeley) 5/14/95
66 */
67
68 #include <sys/cdefs.h>
69 __KERNEL_RCSID(0, "$NetBSD: sys_sig.c,v 1.32 2011/03/03 20:46:16 martin Exp $");
70
71 #include <sys/param.h>
72 #include <sys/kernel.h>
73 #include <sys/signalvar.h>
74 #include <sys/proc.h>
75 #include <sys/pool.h>
76 #include <sys/sa.h>
77 #include <sys/savar.h>
78 #include <sys/syscallargs.h>
79 #include <sys/kauth.h>
80 #include <sys/wait.h>
81 #include <sys/kmem.h>
82 #include <sys/module.h>
83
84 int
85 sys___sigaction_sigtramp(struct lwp *l,
86 const struct sys___sigaction_sigtramp_args *uap, register_t *retval)
87 {
88 /* {
89 syscallarg(int) signum;
90 syscallarg(const struct sigaction *) nsa;
91 syscallarg(struct sigaction *) osa;
92 syscallarg(void *) tramp;
93 syscallarg(int) vers;
94 } */
95 struct sigaction nsa, osa;
96 int error;
97
98 if (SCARG(uap, nsa)) {
99 error = copyin(SCARG(uap, nsa), &nsa, sizeof(nsa));
100 if (error)
101 return (error);
102 }
103 error = sigaction1(l, SCARG(uap, signum),
104 SCARG(uap, nsa) ? &nsa : 0, SCARG(uap, osa) ? &osa : 0,
105 SCARG(uap, tramp), SCARG(uap, vers));
106 if (error)
107 return (error);
108 if (SCARG(uap, osa)) {
109 error = copyout(&osa, SCARG(uap, osa), sizeof(osa));
110 if (error)
111 return (error);
112 }
113 return 0;
114 }
115
116 /*
117 * Manipulate signal mask. Note that we receive new mask, not pointer, and
118 * return old mask as return value; the library stub does the rest.
119 */
120 int
121 sys___sigprocmask14(struct lwp *l, const struct sys___sigprocmask14_args *uap,
122 register_t *retval)
123 {
124 /* {
125 syscallarg(int) how;
126 syscallarg(const sigset_t *) set;
127 syscallarg(sigset_t *) oset;
128 } */
129 struct proc *p = l->l_proc;
130 sigset_t nss, oss;
131 int error;
132
133 if (SCARG(uap, set)) {
134 error = copyin(SCARG(uap, set), &nss, sizeof(nss));
135 if (error)
136 return error;
137 }
138 mutex_enter(p->p_lock);
139 error = sigprocmask1(l, SCARG(uap, how),
140 SCARG(uap, set) ? &nss : 0, SCARG(uap, oset) ? &oss : 0);
141 mutex_exit(p->p_lock);
142 if (error)
143 return error;
144 if (SCARG(uap, oset)) {
145 error = copyout(&oss, SCARG(uap, oset), sizeof(oss));
146 if (error)
147 return error;
148 }
149 return 0;
150 }
151
152 int
153 sys___sigpending14(struct lwp *l, const struct sys___sigpending14_args *uap,
154 register_t *retval)
155 {
156 /* {
157 syscallarg(sigset_t *) set;
158 } */
159 sigset_t ss;
160
161 sigpending1(l, &ss);
162 return copyout(&ss, SCARG(uap, set), sizeof(ss));
163 }
164
165 /*
166 * Suspend process until signal, providing mask to be set in the meantime.
167 * Note nonstandard calling convention: libc stub passes mask, not pointer,
168 * to save a copyin.
169 */
170 int
171 sys___sigsuspend14(struct lwp *l, const struct sys___sigsuspend14_args *uap,
172 register_t *retval)
173 {
174 /* {
175 syscallarg(const sigset_t *) set;
176 } */
177 sigset_t ss;
178 int error;
179
180 if (SCARG(uap, set)) {
181 error = copyin(SCARG(uap, set), &ss, sizeof(ss));
182 if (error)
183 return error;
184 }
185 return sigsuspend1(l, SCARG(uap, set) ? &ss : 0);
186 }
187
188 int
189 sys___sigaltstack14(struct lwp *l, const struct sys___sigaltstack14_args *uap,
190 register_t *retval)
191 {
192 /* {
193 syscallarg(const struct sigaltstack *) nss;
194 syscallarg(struct sigaltstack *) oss;
195 } */
196 struct sigaltstack nss, oss;
197 int error;
198
199 if (SCARG(uap, nss)) {
200 error = copyin(SCARG(uap, nss), &nss, sizeof(nss));
201 if (error)
202 return error;
203 }
204 error = sigaltstack1(l,
205 SCARG(uap, nss) ? &nss : 0, SCARG(uap, oss) ? &oss : 0);
206 if (error)
207 return error;
208 if (SCARG(uap, oss)) {
209 error = copyout(&oss, SCARG(uap, oss), sizeof(oss));
210 if (error)
211 return error;
212 }
213 return 0;
214 }
215
216
217 static int
218 kill1(struct lwp *l, pid_t pid, ksiginfo_t *ksi, register_t *retval)
219 {
220 int error;
221 struct proc *p;
222
223 if ((u_int)ksi->ksi_signo >= NSIG)
224 return EINVAL;
225
226 if (pid != l->l_proc->p_pid) {
227 if (ksi->ksi_pid != l->l_proc->p_pid)
228 return EPERM;
229
230 if (ksi->ksi_uid != kauth_cred_geteuid(l->l_cred))
231 return EPERM;
232
233 switch (ksi->ksi_code) {
234 case SI_USER:
235 case SI_QUEUE:
236 break;
237 default:
238 return EPERM;
239 }
240 }
241
242 if (pid > 0) {
243 /* kill single process */
244 mutex_enter(proc_lock);
245 p = proc_find(pid);
246 if (p == NULL) {
247 mutex_exit(proc_lock);
248 return ESRCH;
249 }
250 mutex_enter(p->p_lock);
251 error = kauth_authorize_process(l->l_cred,
252 KAUTH_PROCESS_SIGNAL, p, KAUTH_ARG(ksi->ksi_signo),
253 NULL, NULL);
254 if (!error && ksi->ksi_signo) {
255 kpsignal2(p, ksi);
256 }
257 mutex_exit(p->p_lock);
258 mutex_exit(proc_lock);
259 return error;
260 }
261
262 switch (pid) {
263 case -1: /* broadcast signal */
264 return killpg1(l, ksi, 0, 1);
265 case 0: /* signal own process group */
266 return killpg1(l, ksi, 0, 0);
267 default: /* negative explicit process group */
268 return killpg1(l, ksi, -pid, 0);
269 }
270 /* NOTREACHED */
271 }
272
273 int
274 sys_sigqueueinfo(struct lwp *l, const struct sys_sigqueueinfo_args *uap,
275 register_t *retval)
276 {
277 /* {
278 syscallarg(pid_t int) pid;
279 syscallarg(const siginfo_t *) info;
280 } */
281 ksiginfo_t ksi;
282 int error;
283
284 KSI_INIT(&ksi);
285
286 if ((error = copyin(&SCARG(uap, info)->_info, &ksi.ksi_info,
287 sizeof(ksi.ksi_info))) != 0)
288 return error;
289
290 return kill1(l, SCARG(uap, pid), &ksi, retval);
291 }
292
293 int
294 sys_kill(struct lwp *l, const struct sys_kill_args *uap, register_t *retval)
295 {
296 /* {
297 syscallarg(pid_t) pid;
298 syscallarg(int) signum;
299 } */
300 ksiginfo_t ksi;
301
302 KSI_INIT(&ksi);
303
304 ksi.ksi_signo = SCARG(uap, signum);
305 ksi.ksi_code = SI_USER;
306 ksi.ksi_pid = l->l_proc->p_pid;
307 ksi.ksi_uid = kauth_cred_geteuid(l->l_cred);
308
309 return kill1(l, SCARG(uap, pid), &ksi, retval);
310 }
311
312 int
313 sys_getcontext(struct lwp *l, const struct sys_getcontext_args *uap,
314 register_t *retval)
315 {
316 /* {
317 syscallarg(struct __ucontext *) ucp;
318 } */
319 struct proc *p = l->l_proc;
320 ucontext_t uc;
321
322 memset(&uc, 0, sizeof(uc));
323
324 mutex_enter(p->p_lock);
325 getucontext(l, &uc);
326 mutex_exit(p->p_lock);
327
328 return copyout(&uc, SCARG(uap, ucp), sizeof (*SCARG(uap, ucp)));
329 }
330
331 int
332 sys_setcontext(struct lwp *l, const struct sys_setcontext_args *uap,
333 register_t *retval)
334 {
335 /* {
336 syscallarg(const ucontext_t *) ucp;
337 } */
338 struct proc *p = l->l_proc;
339 ucontext_t uc;
340 int error;
341
342 error = copyin(SCARG(uap, ucp), &uc, sizeof (uc));
343 if (error)
344 return error;
345 if ((uc.uc_flags & _UC_CPU) == 0)
346 return EINVAL;
347 mutex_enter(p->p_lock);
348 error = setucontext(l, &uc);
349 mutex_exit(p->p_lock);
350 if (error)
351 return error;
352
353 return EJUSTRETURN;
354 }
355
356 /*
357 * sigtimedwait(2) system call, used also for implementation
358 * of sigwaitinfo() and sigwait().
359 *
360 * This only handles single LWP in signal wait. libpthread provides
361 * it's own sigtimedwait() wrapper to DTRT WRT individual threads.
362 */
363 int
364 sys_____sigtimedwait50(struct lwp *l,
365 const struct sys_____sigtimedwait50_args *uap, register_t *retval)
366 {
367
368 return sigtimedwait1(l, uap, retval, copyout, copyin, copyout);
369 }
370
371 int
372 sigaction1(struct lwp *l, int signum, const struct sigaction *nsa,
373 struct sigaction *osa, const void *tramp, int vers)
374 {
375 struct proc *p;
376 struct sigacts *ps;
377 sigset_t tset;
378 int prop, error;
379 ksiginfoq_t kq;
380 static bool v0v1valid;
381
382 if (signum <= 0 || signum >= NSIG)
383 return EINVAL;
384
385 p = l->l_proc;
386 error = 0;
387 ksiginfo_queue_init(&kq);
388
389 /*
390 * Trampoline ABI version 0 is reserved for the legacy kernel
391 * provided on-stack trampoline. Conversely, if we are using a
392 * non-0 ABI version, we must have a trampoline. Only validate the
393 * vers if a new sigaction was supplied. Emulations use legacy
394 * kernel trampolines with version 0, alternatively check for that
395 * too.
396 *
397 * If version < 2, we try to autoload the compat module. Note
398 * that we interlock with the unload check in compat_modcmd()
399 * using kernconfig_lock. If the autoload fails, we don't try it
400 * again for this process.
401 */
402 if (nsa != NULL) {
403 if (__predict_false(vers < 2) &&
404 (p->p_lflag & PL_SIGCOMPAT) == 0) {
405 kernconfig_lock();
406 if (sendsig_sigcontext_vec == NULL) {
407 (void)module_autoload("compat",
408 MODULE_CLASS_ANY);
409 }
410 if (sendsig_sigcontext_vec != NULL) {
411 /*
412 * We need to remember if the
413 * sigcontext method may be useable,
414 * because libc may use it even
415 * if siginfo is available.
416 */
417 v0v1valid = true;
418 }
419 mutex_enter(proc_lock);
420 /*
421 * Prevent unload of compat module while
422 * this process remains.
423 */
424 p->p_lflag |= PL_SIGCOMPAT;
425 mutex_exit(proc_lock);
426 kernconfig_unlock();
427 }
428
429 switch (vers) {
430 case 0:
431 /* sigcontext, kernel supplied trampoline. */
432 if (tramp != NULL || !v0v1valid) {
433 return EINVAL;
434 }
435 break;
436 case 1:
437 /* sigcontext, user supplied trampoline. */
438 if (tramp == NULL || !v0v1valid) {
439 return EINVAL;
440 }
441 break;
442 case 2:
443 case 3:
444 /* siginfo, user supplied trampoline. */
445 if (tramp == NULL) {
446 return EINVAL;
447 }
448 break;
449 default:
450 return EINVAL;
451 }
452 }
453
454 mutex_enter(p->p_lock);
455
456 ps = p->p_sigacts;
457 if (osa)
458 *osa = SIGACTION_PS(ps, signum);
459 if (!nsa)
460 goto out;
461
462 prop = sigprop[signum];
463 if ((nsa->sa_flags & ~SA_ALLBITS) || (prop & SA_CANTMASK)) {
464 error = EINVAL;
465 goto out;
466 }
467
468 SIGACTION_PS(ps, signum) = *nsa;
469 ps->sa_sigdesc[signum].sd_tramp = tramp;
470 ps->sa_sigdesc[signum].sd_vers = vers;
471 sigminusset(&sigcantmask, &SIGACTION_PS(ps, signum).sa_mask);
472
473 if ((prop & SA_NORESET) != 0)
474 SIGACTION_PS(ps, signum).sa_flags &= ~SA_RESETHAND;
475
476 if (signum == SIGCHLD) {
477 if (nsa->sa_flags & SA_NOCLDSTOP)
478 p->p_sflag |= PS_NOCLDSTOP;
479 else
480 p->p_sflag &= ~PS_NOCLDSTOP;
481 if (nsa->sa_flags & SA_NOCLDWAIT) {
482 /*
483 * Paranoia: since SA_NOCLDWAIT is implemented by
484 * reparenting the dying child to PID 1 (and trust
485 * it to reap the zombie), PID 1 itself is forbidden
486 * to set SA_NOCLDWAIT.
487 */
488 if (p->p_pid == 1)
489 p->p_flag &= ~PK_NOCLDWAIT;
490 else
491 p->p_flag |= PK_NOCLDWAIT;
492 } else
493 p->p_flag &= ~PK_NOCLDWAIT;
494
495 if (nsa->sa_handler == SIG_IGN) {
496 /*
497 * Paranoia: same as above.
498 */
499 if (p->p_pid == 1)
500 p->p_flag &= ~PK_CLDSIGIGN;
501 else
502 p->p_flag |= PK_CLDSIGIGN;
503 } else
504 p->p_flag &= ~PK_CLDSIGIGN;
505 }
506
507 if ((nsa->sa_flags & SA_NODEFER) == 0)
508 sigaddset(&SIGACTION_PS(ps, signum).sa_mask, signum);
509 else
510 sigdelset(&SIGACTION_PS(ps, signum).sa_mask, signum);
511
512 /*
513 * Set bit in p_sigctx.ps_sigignore for signals that are set to
514 * SIG_IGN, and for signals set to SIG_DFL where the default is to
515 * ignore. However, don't put SIGCONT in p_sigctx.ps_sigignore, as
516 * we have to restart the process.
517 */
518 if (nsa->sa_handler == SIG_IGN ||
519 (nsa->sa_handler == SIG_DFL && (prop & SA_IGNORE) != 0)) {
520 /* Never to be seen again. */
521 sigemptyset(&tset);
522 sigaddset(&tset, signum);
523 sigclearall(p, &tset, &kq);
524 if (signum != SIGCONT) {
525 /* Easier in psignal */
526 sigaddset(&p->p_sigctx.ps_sigignore, signum);
527 }
528 sigdelset(&p->p_sigctx.ps_sigcatch, signum);
529 } else {
530 sigdelset(&p->p_sigctx.ps_sigignore, signum);
531 if (nsa->sa_handler == SIG_DFL)
532 sigdelset(&p->p_sigctx.ps_sigcatch, signum);
533 else
534 sigaddset(&p->p_sigctx.ps_sigcatch, signum);
535 }
536
537 /*
538 * Previously held signals may now have become visible. Ensure that
539 * we check for them before returning to userspace.
540 */
541 if (sigispending(l, 0)) {
542 lwp_lock(l);
543 l->l_flag |= LW_PENDSIG;
544 lwp_unlock(l);
545 }
546 out:
547 mutex_exit(p->p_lock);
548 ksiginfo_queue_drain(&kq);
549
550 return error;
551 }
552
553 int
554 sigprocmask1(struct lwp *l, int how, const sigset_t *nss, sigset_t *oss)
555 {
556 int more;
557 struct proc *p = l->l_proc;
558 sigset_t *mask;
559 mask = (p->p_sa != NULL) ? &p->p_sa->sa_sigmask : &l->l_sigmask;
560
561 KASSERT(mutex_owned(p->p_lock));
562
563 if (oss)
564 *oss = *mask;
565 if (nss) {
566 switch (how) {
567 case SIG_BLOCK:
568 sigplusset(nss, mask);
569 more = 0;
570 break;
571 case SIG_UNBLOCK:
572 sigminusset(nss, mask);
573 more = 1;
574 break;
575 case SIG_SETMASK:
576 *mask = *nss;
577 more = 1;
578 break;
579 default:
580 return (EINVAL);
581 }
582 sigminusset(&sigcantmask, mask);
583 if (more && sigispending(l, 0)) {
584 /*
585 * Check for pending signals on return to user.
586 */
587 lwp_lock(l);
588 l->l_flag |= LW_PENDSIG;
589 lwp_unlock(l);
590 }
591 }
592
593 return 0;
594 }
595
596 void
597 sigpending1(struct lwp *l, sigset_t *ss)
598 {
599 struct proc *p = l->l_proc;
600
601 mutex_enter(p->p_lock);
602 *ss = l->l_sigpend.sp_set;
603 sigplusset(&p->p_sigpend.sp_set, ss);
604 mutex_exit(p->p_lock);
605 }
606
607 int
608 sigsuspend1(struct lwp *l, const sigset_t *ss)
609 {
610 struct proc *p = l->l_proc;
611
612 if (ss) {
613 /*
614 * When returning from sigsuspend, we want
615 * the old mask to be restored after the
616 * signal handler has finished. Thus, we
617 * save it here and mark the sigctx structure
618 * to indicate this.
619 */
620 mutex_enter(p->p_lock);
621 l->l_sigrestore = 1;
622 l->l_sigoldmask = l->l_sigmask;
623 l->l_sigmask = *ss;
624 sigminusset(&sigcantmask, &l->l_sigmask);
625
626 /* Check for pending signals when sleeping. */
627 if (sigispending(l, 0)) {
628 lwp_lock(l);
629 l->l_flag |= LW_PENDSIG;
630 lwp_unlock(l);
631 }
632 mutex_exit(p->p_lock);
633 }
634
635 while (kpause("pause", true, 0, NULL) == 0)
636 ;
637
638 /* always return EINTR rather than ERESTART... */
639 return EINTR;
640 }
641
642 int
643 sigaltstack1(struct lwp *l, const struct sigaltstack *nss,
644 struct sigaltstack *oss)
645 {
646 struct proc *p = l->l_proc;
647 int error = 0;
648
649 mutex_enter(p->p_lock);
650
651 if (oss)
652 *oss = l->l_sigstk;
653
654 if (nss) {
655 if (nss->ss_flags & ~SS_ALLBITS)
656 error = EINVAL;
657 else if (nss->ss_flags & SS_DISABLE) {
658 if (l->l_sigstk.ss_flags & SS_ONSTACK)
659 error = EINVAL;
660 } else if (nss->ss_size < MINSIGSTKSZ)
661 error = ENOMEM;
662
663 if (!error)
664 l->l_sigstk = *nss;
665 }
666
667 mutex_exit(p->p_lock);
668
669 return error;
670 }
671
672 int
673 sigtimedwait1(struct lwp *l, const struct sys_____sigtimedwait50_args *uap,
674 register_t *retval, copyout_t storeinf, copyin_t fetchts, copyout_t storets)
675 {
676 /* {
677 syscallarg(const sigset_t *) set;
678 syscallarg(siginfo_t *) info;
679 syscallarg(struct timespec *) timeout;
680 } */
681 struct proc *p = l->l_proc;
682 int error, signum, timo;
683 struct timespec ts, tsstart, tsnow;
684 ksiginfo_t ksi;
685
686 /*
687 * Calculate timeout, if it was specified.
688 */
689 if (SCARG(uap, timeout)) {
690 error = (*fetchts)(SCARG(uap, timeout), &ts, sizeof(ts));
691 if (error)
692 return error;
693
694 if ((error = itimespecfix(&ts)) != 0)
695 return error;
696
697 timo = tstohz(&ts);
698 if (timo == 0 && ts.tv_sec == 0 && ts.tv_nsec != 0)
699 timo++;
700
701 /*
702 * Remember current uptime, it would be used in
703 * ECANCELED/ERESTART case.
704 */
705 getnanouptime(&tsstart);
706 } else {
707 memset(&tsstart, 0, sizeof(tsstart)); /* XXXgcc */
708 timo = 0;
709 }
710
711 error = copyin(SCARG(uap, set), &l->l_sigwaitset,
712 sizeof(l->l_sigwaitset));
713 if (error)
714 return error;
715
716 /*
717 * Silently ignore SA_CANTMASK signals. psignal1() would ignore
718 * SA_CANTMASK signals in waitset, we do this only for the below
719 * siglist check.
720 */
721 sigminusset(&sigcantmask, &l->l_sigwaitset);
722
723 mutex_enter(p->p_lock);
724
725 /* SA processes can have no more than 1 sigwaiter. */
726 if ((p->p_sflag & PS_SA) != 0 && !LIST_EMPTY(&p->p_sigwaiters)) {
727 mutex_exit(p->p_lock);
728 error = EINVAL;
729 goto out;
730 }
731
732 /* Check for pending signals in the process, if no - then in LWP. */
733 if ((signum = sigget(&p->p_sigpend, &ksi, 0, &l->l_sigwaitset)) == 0)
734 signum = sigget(&l->l_sigpend, &ksi, 0, &l->l_sigwaitset);
735
736 if (signum != 0) {
737 /* If found a pending signal, just copy it out to the user. */
738 mutex_exit(p->p_lock);
739 goto out;
740 }
741
742 /*
743 * Set up the sigwait list and wait for signal to arrive.
744 * We can either be woken up or time out.
745 */
746 l->l_sigwaited = &ksi;
747 LIST_INSERT_HEAD(&p->p_sigwaiters, l, l_sigwaiter);
748 error = cv_timedwait_sig(&l->l_sigcv, p->p_lock, timo);
749
750 /*
751 * Need to find out if we woke as a result of _lwp_wakeup() or a
752 * signal outside our wait set.
753 */
754 if (l->l_sigwaited != NULL) {
755 if (error == EINTR) {
756 /* Wakeup via _lwp_wakeup(). */
757 error = ECANCELED;
758 } else if (!error) {
759 /* Spurious wakeup - arrange for syscall restart. */
760 error = ERESTART;
761 }
762 l->l_sigwaited = NULL;
763 LIST_REMOVE(l, l_sigwaiter);
764 }
765 mutex_exit(p->p_lock);
766
767 /*
768 * If the sleep was interrupted (either by signal or wakeup), update
769 * the timeout and copyout new value back. It would be used when
770 * the syscall would be restarted or called again.
771 */
772 if (timo && (error == ERESTART || error == ECANCELED)) {
773 getnanouptime(&tsnow);
774
775 /* Compute how much time has passed since start. */
776 timespecsub(&tsnow, &tsstart, &tsnow);
777
778 /* Substract passed time from timeout. */
779 timespecsub(&ts, &tsnow, &ts);
780
781 if (ts.tv_sec < 0)
782 error = EAGAIN;
783 else {
784 /* Copy updated timeout to userland. */
785 error = (*storets)(&ts, SCARG(uap, timeout),
786 sizeof(ts));
787 }
788 }
789 out:
790 /*
791 * If a signal from the wait set arrived, copy it to userland.
792 * Copy only the used part of siginfo, the padding part is
793 * left unchanged (userland is not supposed to touch it anyway).
794 */
795 if (error == 0 && SCARG(uap, info)) {
796 error = (*storeinf)(&ksi.ksi_info, SCARG(uap, info),
797 sizeof(ksi.ksi_info));
798 }
799 if (error == 0)
800 *retval = ksi.ksi_info._signo;
801 return error;
802 }
803