2000-02-18 03:38:33 +08:00
|
|
|
/* signal.cc
|
|
|
|
|
|
|
|
Written by Steve Chamberlain of Cygnus Support, sac@cygnus.com
|
|
|
|
Significant changes by Sergey Okhapkin <sos@prospect.com.ru>
|
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
|
|
|
#include "winsup.h"
|
2002-01-11 10:24:06 +08:00
|
|
|
#include <stdlib.h>
|
2000-09-08 10:56:55 +08:00
|
|
|
#include <sys/cygwin.h>
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "pinfo.h"
|
2003-11-29 04:55:59 +08:00
|
|
|
#include "sigproc.h"
|
|
|
|
#include "cygtls.h"
|
2005-11-05 04:45:56 +08:00
|
|
|
#include "path.h"
|
|
|
|
#include "fhandler.h"
|
|
|
|
#include "dtable.h"
|
|
|
|
#include "cygheap.h"
|
2012-06-18 04:50:24 +08:00
|
|
|
#include "cygwait.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2006-03-23 23:55:59 +08:00
|
|
|
#define _SA_NORESTART 0x8000
|
|
|
|
|
2013-01-21 12:34:52 +08:00
|
|
|
static int __reg3 sigaction_worker (int, const struct sigaction *, struct sigaction *, bool);
|
2006-03-23 23:55:59 +08:00
|
|
|
|
2000-10-15 09:37:07 +08:00
|
|
|
#define sigtrapped(func) ((func) != SIG_IGN && (func) != SIG_DFL)
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" _sig_func_ptr
|
2000-02-18 03:38:33 +08:00
|
|
|
signal (int sig, _sig_func_ptr func)
|
|
|
|
{
|
2003-08-19 12:10:42 +08:00
|
|
|
sig_dispatch_pending ();
|
2000-02-18 03:38:33 +08:00
|
|
|
_sig_func_ptr prev;
|
|
|
|
|
|
|
|
/* check that sig is in right range */
|
2016-11-24 21:10:41 +08:00
|
|
|
if (sig <= 0 || sig >= NSIG || sig == SIGKILL || sig == SIGSTOP)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
syscall_printf ("SIG_ERR = signal (%d, %p)", sig, func);
|
|
|
|
return (_sig_func_ptr) SIG_ERR;
|
|
|
|
}
|
|
|
|
|
2003-11-29 06:13:57 +08:00
|
|
|
prev = global_sigs[sig].sa_handler;
|
2006-03-23 23:55:59 +08:00
|
|
|
struct sigaction& gs = global_sigs[sig];
|
|
|
|
if (gs.sa_flags & _SA_NORESTART)
|
|
|
|
gs.sa_flags &= ~SA_RESTART;
|
|
|
|
else
|
|
|
|
gs.sa_flags |= SA_RESTART;
|
|
|
|
|
2006-07-05 07:57:43 +08:00
|
|
|
gs.sa_mask = SIGTOMASK (sig);
|
2006-03-23 23:55:59 +08:00
|
|
|
gs.sa_handler = func;
|
|
|
|
gs.sa_flags &= ~SA_SIGINFO;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
syscall_printf ("%p = signal (%d, %p)", prev, sig, func);
|
|
|
|
return prev;
|
|
|
|
}
|
|
|
|
|
2003-01-22 18:43:39 +08:00
|
|
|
extern "C" int
|
2011-08-04 03:17:02 +08:00
|
|
|
clock_nanosleep (clockid_t clk_id, int flags, const struct timespec *rqtp,
|
|
|
|
struct timespec *rmtp)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-08-04 03:17:02 +08:00
|
|
|
const bool abstime = (flags & TIMER_ABSTIME) ? true : false;
|
2003-01-22 18:43:39 +08:00
|
|
|
int res = 0;
|
2003-08-19 12:10:42 +08:00
|
|
|
sig_dispatch_pending ();
|
2003-01-15 04:05:49 +08:00
|
|
|
pthread_testcancel ();
|
|
|
|
|
2011-08-04 03:17:02 +08:00
|
|
|
if (rqtp->tv_sec < 0 || rqtp->tv_nsec < 0 || rqtp->tv_nsec > 999999999L)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
/* Explicitly disallowed by POSIX. Needs to be checked first to avoid
|
|
|
|
being caught by the following test. */
|
|
|
|
if (clk_id == CLOCK_THREAD_CPUTIME_ID)
|
|
|
|
return EINVAL;
|
|
|
|
|
|
|
|
/* support for CPU-time clocks is optional */
|
|
|
|
if (CLOCKID_IS_PROCESS (clk_id) || CLOCKID_IS_THREAD (clk_id))
|
|
|
|
return ENOTSUP;
|
|
|
|
|
|
|
|
switch (clk_id)
|
2003-01-22 18:43:39 +08:00
|
|
|
{
|
2011-08-04 03:17:02 +08:00
|
|
|
case CLOCK_REALTIME:
|
|
|
|
case CLOCK_MONOTONIC:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* unknown or illegal clock ID */
|
|
|
|
return EINVAL;
|
2003-01-22 18:43:39 +08:00
|
|
|
}
|
2011-08-04 03:17:02 +08:00
|
|
|
|
2011-08-04 00:40:48 +08:00
|
|
|
LARGE_INTEGER timeout;
|
2009-12-17 22:04:04 +08:00
|
|
|
|
2011-08-04 00:40:48 +08:00
|
|
|
timeout.QuadPart = (LONGLONG) rqtp->tv_sec * NSPERSEC
|
|
|
|
+ ((LONGLONG) rqtp->tv_nsec + 99LL) / 100LL;
|
|
|
|
|
2011-08-04 03:17:02 +08:00
|
|
|
if (abstime)
|
|
|
|
{
|
|
|
|
struct timespec tp;
|
|
|
|
|
|
|
|
clock_gettime (clk_id, &tp);
|
|
|
|
/* Check for immediate timeout */
|
|
|
|
if (tp.tv_sec > rqtp->tv_sec
|
2011-12-18 07:39:47 +08:00
|
|
|
|| (tp.tv_sec == rqtp->tv_sec && tp.tv_nsec > rqtp->tv_nsec))
|
2011-08-04 03:17:02 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (clk_id == CLOCK_REALTIME)
|
|
|
|
timeout.QuadPart += FACTOR;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* other clocks need to be handled with a relative timeout */
|
|
|
|
timeout.QuadPart -= tp.tv_sec * NSPERSEC + tp.tv_nsec / 100LL;
|
|
|
|
timeout.QuadPart *= -1LL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else /* !abstime */
|
|
|
|
timeout.QuadPart *= -1LL;
|
|
|
|
|
|
|
|
syscall_printf ("clock_nanosleep (%ld.%09ld)", rqtp->tv_sec, rqtp->tv_nsec);
|
2011-08-04 00:40:48 +08:00
|
|
|
|
2012-08-16 03:07:42 +08:00
|
|
|
int rc = cygwait (NULL, &timeout, cw_sig_eintr | cw_cancel | cw_cancel_self);
|
2012-07-22 06:58:20 +08:00
|
|
|
if (rc == WAIT_SIGNALED)
|
|
|
|
res = EINTR;
|
2000-09-16 21:19:52 +08:00
|
|
|
|
2011-08-04 03:17:02 +08:00
|
|
|
/* according to POSIX, rmtp is used only if !abstime */
|
|
|
|
if (rmtp && !abstime)
|
2003-01-22 18:43:39 +08:00
|
|
|
{
|
2011-08-04 00:40:48 +08:00
|
|
|
rmtp->tv_sec = (time_t) (timeout.QuadPart / NSPERSEC);
|
|
|
|
rmtp->tv_nsec = (long) ((timeout.QuadPart % NSPERSEC) * 100LL);
|
2003-01-22 18:43:39 +08:00
|
|
|
}
|
2000-09-16 21:19:52 +08:00
|
|
|
|
2011-12-04 05:43:27 +08:00
|
|
|
syscall_printf ("%d = clock_nanosleep(%lu, %d, %ld.%09ld, %ld.%09.ld)",
|
2011-08-04 03:17:02 +08:00
|
|
|
res, clk_id, flags, rqtp->tv_sec, rqtp->tv_nsec,
|
|
|
|
rmtp ? rmtp->tv_sec : 0, rmtp ? rmtp->tv_nsec : 0);
|
2000-09-16 21:19:52 +08:00
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2011-08-04 03:17:02 +08:00
|
|
|
extern "C" int
|
|
|
|
nanosleep (const struct timespec *rqtp, struct timespec *rmtp)
|
|
|
|
{
|
|
|
|
int res = clock_nanosleep (CLOCK_REALTIME, 0, rqtp, rmtp);
|
|
|
|
if (res != 0)
|
|
|
|
{
|
|
|
|
set_errno (res);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" unsigned int
|
2003-01-22 18:43:39 +08:00
|
|
|
sleep (unsigned int seconds)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-01-22 18:43:39 +08:00
|
|
|
struct timespec req, rem;
|
|
|
|
req.tv_sec = seconds;
|
|
|
|
req.tv_nsec = 0;
|
2011-08-04 03:17:02 +08:00
|
|
|
if (clock_nanosleep (CLOCK_REALTIME, 0, &req, &rem))
|
2009-12-17 22:04:04 +08:00
|
|
|
return rem.tv_sec + (rem.tv_nsec > 0);
|
|
|
|
return 0;
|
2003-01-22 18:43:39 +08:00
|
|
|
}
|
2003-01-15 04:05:49 +08:00
|
|
|
|
2003-01-22 18:43:39 +08:00
|
|
|
extern "C" unsigned int
|
2007-06-13 04:49:48 +08:00
|
|
|
usleep (useconds_t useconds)
|
2003-01-22 18:43:39 +08:00
|
|
|
{
|
|
|
|
struct timespec req;
|
|
|
|
req.tv_sec = useconds / 1000000;
|
|
|
|
req.tv_nsec = (useconds % 1000000) * 1000;
|
2011-08-04 03:17:02 +08:00
|
|
|
int res = clock_nanosleep (CLOCK_REALTIME, 0, &req, NULL);
|
|
|
|
if (res != 0)
|
|
|
|
{
|
|
|
|
set_errno (res);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2005-03-10 05:07:56 +08:00
|
|
|
sigprocmask (int how, const sigset_t *set, sigset_t *oldset)
|
2003-11-29 04:55:59 +08:00
|
|
|
{
|
2011-07-10 08:01:33 +08:00
|
|
|
int res = handle_sigprocmask (how, set, oldset, _my_tls.sigmask);
|
|
|
|
if (res)
|
2011-12-14 04:06:31 +08:00
|
|
|
{
|
|
|
|
set_errno (res);
|
|
|
|
res = -1;
|
|
|
|
}
|
2014-05-09 22:28:48 +08:00
|
|
|
syscall_printf ("%R = sigprocmask (%d, %p, %p)", res, how, set, oldset);
|
2011-12-14 04:06:31 +08:00
|
|
|
return res;
|
2003-11-29 04:55:59 +08:00
|
|
|
}
|
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
int __reg3
|
2005-03-10 05:07:56 +08:00
|
|
|
handle_sigprocmask (int how, const sigset_t *set, sigset_t *oldset, sigset_t& opmask)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2005-03-10 05:07:56 +08:00
|
|
|
/* check that how is in right range */
|
|
|
|
if (how != SIG_BLOCK && how != SIG_UNBLOCK && how != SIG_SETMASK)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2005-03-10 05:07:56 +08:00
|
|
|
syscall_printf ("Invalid how value %d", how);
|
2011-07-10 08:01:33 +08:00
|
|
|
return EINVAL;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2014-08-22 17:21:33 +08:00
|
|
|
__try
|
|
|
|
{
|
|
|
|
if (oldset)
|
|
|
|
*oldset = opmask;
|
2003-11-29 04:55:59 +08:00
|
|
|
|
2014-08-22 17:21:33 +08:00
|
|
|
if (set)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2014-08-22 17:21:33 +08:00
|
|
|
sigset_t newmask = opmask;
|
|
|
|
switch (how)
|
|
|
|
{
|
|
|
|
case SIG_BLOCK:
|
|
|
|
/* add set to current mask */
|
|
|
|
newmask |= *set;
|
|
|
|
break;
|
|
|
|
case SIG_UNBLOCK:
|
|
|
|
/* remove set from current mask */
|
|
|
|
newmask &= ~*set;
|
|
|
|
break;
|
|
|
|
case SIG_SETMASK:
|
|
|
|
/* just set it */
|
|
|
|
newmask = *set;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
set_signal_mask (opmask, newmask);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
2014-08-22 17:21:33 +08:00
|
|
|
__except (EFAULT)
|
|
|
|
{
|
|
|
|
return EFAULT;
|
|
|
|
}
|
|
|
|
__endtry
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
int __reg2
|
2005-02-27 04:50:25 +08:00
|
|
|
_pinfo::kill (siginfo_t& si)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-04-18 05:45:28 +08:00
|
|
|
int res;
|
|
|
|
DWORD this_process_state;
|
2011-05-03 10:03:04 +08:00
|
|
|
pid_t this_pid;
|
2002-11-23 04:51:13 +08:00
|
|
|
|
2011-04-18 05:45:28 +08:00
|
|
|
sig_dispatch_pending ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-04-18 05:45:28 +08:00
|
|
|
if (exists ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-04-18 05:45:28 +08:00
|
|
|
bool sendSIGCONT;
|
2011-04-18 09:46:57 +08:00
|
|
|
this_process_state = process_state;
|
2011-04-18 05:45:28 +08:00
|
|
|
if ((sendSIGCONT = (si.si_signo < 0)))
|
|
|
|
si.si_signo = -si.si_signo;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-04-18 05:45:28 +08:00
|
|
|
if (si.si_signo == 0)
|
|
|
|
res = 0;
|
|
|
|
else if ((res = sig_send (this, si)))
|
|
|
|
{
|
|
|
|
sigproc_printf ("%d = sig_send, %E ", res);
|
|
|
|
res = -1;
|
|
|
|
}
|
|
|
|
else if (sendSIGCONT)
|
|
|
|
{
|
|
|
|
siginfo_t si2 = {0};
|
|
|
|
si2.si_signo = SIGCONT;
|
|
|
|
si2.si_code = SI_KERNEL;
|
|
|
|
sig_send (this, si2);
|
|
|
|
}
|
2011-05-03 10:03:04 +08:00
|
|
|
this_pid = pid;
|
2011-04-18 05:45:28 +08:00
|
|
|
}
|
kill(pid, sig) before waitpid() returns -1 for sig != 0
This is a followup to a report back in 2011 about essentially the same issue:
https://cygwin.com/ml/cygwin/2011-04/msg00031.html
The same test program in that report demonstrates the issue, but with
kill sending any non-zero signal. To reiterate, the problem here is
POSIX compliance with respect to sending signals to zombie processes.
http://pubs.opengroup.org/onlinepubs/9699919799/functions/kill.html
claims:
Existing implementations vary on the result of a kill() with pid
indicating an inactive process (a terminated process that has not been
waited for by its parent). Some indicate success on such a call
(subject to permission checking), while others give an error of
[ESRCH]. Since the definition of process lifetime in this volume of
POSIX.1-2008 covers inactive processes, the [ESRCH] error as described
is inappropriate in this case. In particular, this means that an
application cannot have a parent process check for termination of a
particular child with kill(). (Usually this is done with the null
signal; this can be done reliably with waitpid().)
In response to the originally issue, this was fixed *specifically* for
the case of kill(pid, 0). But my reading of the above is that kill()
should return 0 in this case regardless of the signal (modulo
permissions, etc.). On Linux, for example, when calling kill with pid
of a zombie process the kernel will happily deliver the signal to the
relevant task_struct; it will just never be acted on since the task
will never run again.
Signed-off-by: Corinna Vinschen <corinna@vinschen.de>
2016-08-11 21:57:53 +08:00
|
|
|
else if (this && process_state == PID_EXITED)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-04-18 05:45:28 +08:00
|
|
|
this_process_state = process_state;
|
2011-05-03 10:03:04 +08:00
|
|
|
this_pid = pid;
|
2011-04-18 05:45:28 +08:00
|
|
|
res = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2011-04-18 05:45:28 +08:00
|
|
|
else
|
2004-01-19 13:46:54 +08:00
|
|
|
{
|
2011-04-18 05:45:28 +08:00
|
|
|
set_errno (ESRCH);
|
|
|
|
this_process_state = 0;
|
2011-05-05 08:31:22 +08:00
|
|
|
this_pid = 0;
|
2011-04-18 05:45:28 +08:00
|
|
|
res = -1;
|
2004-01-19 13:46:54 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("%d = _pinfo::kill (%d), pid %d, process_state %y", res,
|
2011-05-05 08:31:22 +08:00
|
|
|
si.si_signo, this_pid, this_process_state);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2016-11-24 21:02:11 +08:00
|
|
|
extern "C" int
|
2002-10-20 12:15:50 +08:00
|
|
|
raise (int sig)
|
2000-08-29 10:06:49 +08:00
|
|
|
{
|
2002-10-20 12:15:50 +08:00
|
|
|
return kill (myself->pid, sig);
|
2000-08-29 10:06:49 +08:00
|
|
|
}
|
|
|
|
|
2004-01-19 13:46:54 +08:00
|
|
|
static int
|
|
|
|
kill0 (pid_t pid, siginfo_t& si)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2004-01-19 13:46:54 +08:00
|
|
|
syscall_printf ("kill (%d, %d)", pid, si.si_signo);
|
2000-02-18 03:38:33 +08:00
|
|
|
/* check that sig is in right range */
|
2004-01-19 13:46:54 +08:00
|
|
|
if (si.si_signo < 0 || si.si_signo >= NSIG)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
2004-01-19 13:46:54 +08:00
|
|
|
syscall_printf ("signal %d out of range", si.si_signo);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
2016-04-05 16:26:06 +08:00
|
|
|
|
|
|
|
return (pid > 0) ? pinfo (pid)->kill (si) : kill_pgrp (-pid, si);
|
2004-01-19 13:46:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
kill (pid_t pid, int sig)
|
|
|
|
{
|
2006-02-07 02:24:11 +08:00
|
|
|
siginfo_t si = {0};
|
2004-01-19 13:46:54 +08:00
|
|
|
si.si_signo = sig;
|
|
|
|
si.si_code = SI_USER;
|
|
|
|
return kill0 (pid, si);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2004-01-19 13:46:54 +08:00
|
|
|
kill_pgrp (pid_t pid, siginfo_t& si)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res = 0;
|
|
|
|
int found = 0;
|
|
|
|
int killself = 0;
|
|
|
|
|
2004-01-19 13:46:54 +08:00
|
|
|
sigproc_printf ("pid %d, signal %d", pid, si.si_signo);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2003-09-17 09:15:56 +08:00
|
|
|
winpids pids ((DWORD) PID_MAP_RW);
|
2000-07-30 00:24:59 +08:00
|
|
|
for (unsigned i = 0; i < pids.npids; i++)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-11-05 14:42:23 +08:00
|
|
|
_pinfo *p = pids[i];
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2016-04-05 16:26:06 +08:00
|
|
|
if (!p->exists ())
|
2000-02-18 03:38:33 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Is it a process we want to kill? */
|
2001-01-17 22:57:09 +08:00
|
|
|
if ((pid == 0 && (p->pgid != myself->pgid || p->ctty != myself->ctty)) ||
|
2001-09-08 05:32:07 +08:00
|
|
|
(pid > 1 && p->pgid != pid) ||
|
2004-01-19 13:46:54 +08:00
|
|
|
(si.si_signo < 0 && NOTSTATE (p, PID_STOPPED)))
|
2000-10-31 07:19:45 +08:00
|
|
|
continue;
|
2005-11-14 12:28:45 +08:00
|
|
|
sigproc_printf ("killing pid %d, pgrp %d, p->%s, %s", p->pid, p->pgid,
|
|
|
|
p->__ctty (), myctty ());
|
2000-02-18 03:38:33 +08:00
|
|
|
if (p == myself)
|
|
|
|
killself++;
|
2005-02-27 04:50:25 +08:00
|
|
|
else if (p->kill (si))
|
2000-02-18 03:38:33 +08:00
|
|
|
res = -1;
|
|
|
|
found++;
|
|
|
|
}
|
|
|
|
|
2005-02-27 04:50:25 +08:00
|
|
|
if (killself && !exit_state && myself->kill (si))
|
2000-02-18 03:38:33 +08:00
|
|
|
res = -1;
|
|
|
|
|
|
|
|
if (!found)
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
res = -1;
|
|
|
|
}
|
2011-12-04 05:43:27 +08:00
|
|
|
syscall_printf ("%R = kill(%d, %d)", res, pid, si.si_signo);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2001-02-08 07:48:09 +08:00
|
|
|
killpg (pid_t pgrp, int sig)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2002-10-20 12:15:50 +08:00
|
|
|
return kill (-pgrp, sig);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2002-01-11 10:24:06 +08:00
|
|
|
extern "C" void
|
|
|
|
abort (void)
|
|
|
|
{
|
2006-04-23 07:13:18 +08:00
|
|
|
_my_tls.incyg++;
|
2003-08-19 12:10:42 +08:00
|
|
|
sig_dispatch_pending ();
|
2002-01-11 10:24:06 +08:00
|
|
|
/* Ensure that SIGABRT can be caught regardless of blockage. */
|
|
|
|
sigset_t sig_mask;
|
|
|
|
sigfillset (&sig_mask);
|
|
|
|
sigdelset (&sig_mask, SIGABRT);
|
2012-07-22 06:58:20 +08:00
|
|
|
set_signal_mask (_my_tls.sigmask, sig_mask);
|
2002-01-11 10:24:06 +08:00
|
|
|
|
2002-10-20 12:15:50 +08:00
|
|
|
raise (SIGABRT);
|
2005-07-07 04:05:03 +08:00
|
|
|
_my_tls.call_signal_handler (); /* Call any signal handler */
|
2008-06-09 21:45:59 +08:00
|
|
|
|
|
|
|
/* Flush all streams as per SUSv2. */
|
|
|
|
if (_GLOBAL_REENT->__cleanup)
|
|
|
|
_GLOBAL_REENT->__cleanup (_GLOBAL_REENT);
|
2004-11-26 12:15:10 +08:00
|
|
|
do_exit (SIGABRT); /* signal handler didn't exit. Goodbye. */
|
2002-01-11 10:24:06 +08:00
|
|
|
}
|
|
|
|
|
2013-01-21 12:34:52 +08:00
|
|
|
static int __reg3
|
2011-12-04 07:55:21 +08:00
|
|
|
sigaction_worker (int sig, const struct sigaction *newact,
|
2012-07-02 10:24:25 +08:00
|
|
|
struct sigaction *oldact, bool isinternal)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-12-04 07:55:21 +08:00
|
|
|
int res = -1;
|
2014-08-22 17:21:33 +08:00
|
|
|
__try
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-12-04 07:55:21 +08:00
|
|
|
sig_dispatch_pending ();
|
|
|
|
/* check that sig is in right range */
|
2016-11-24 21:10:41 +08:00
|
|
|
if (sig <= 0 || sig >= NSIG)
|
2011-12-04 07:55:21 +08:00
|
|
|
set_errno (EINVAL);
|
|
|
|
else
|
2003-09-01 10:05:32 +08:00
|
|
|
{
|
2011-12-04 07:55:21 +08:00
|
|
|
struct sigaction oa = global_sigs[sig];
|
|
|
|
|
|
|
|
if (!newact)
|
2014-08-22 17:21:33 +08:00
|
|
|
sigproc_printf ("signal %d, newact %p, oa %p",
|
|
|
|
sig, newact, oa, oa.sa_handler);
|
2011-12-04 07:55:21 +08:00
|
|
|
else
|
|
|
|
{
|
2014-08-22 17:21:33 +08:00
|
|
|
sigproc_printf ("signal %d, newact %p (handler %p), oa %p",
|
|
|
|
sig, newact, newact->sa_handler, oa,
|
|
|
|
oa.sa_handler);
|
2011-12-04 07:55:21 +08:00
|
|
|
if (sig == SIGKILL || sig == SIGSTOP)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
2014-08-22 17:21:33 +08:00
|
|
|
__leave;
|
2011-12-04 07:55:21 +08:00
|
|
|
}
|
|
|
|
struct sigaction na = *newact;
|
|
|
|
struct sigaction& gs = global_sigs[sig];
|
|
|
|
if (!isinternal)
|
|
|
|
na.sa_flags &= ~_SA_INTERNAL_MASK;
|
|
|
|
gs = na;
|
|
|
|
if (!(gs.sa_flags & SA_NODEFER))
|
|
|
|
gs.sa_mask |= SIGTOMASK(sig);
|
|
|
|
if (gs.sa_handler == SIG_IGN)
|
|
|
|
sig_clear (sig);
|
|
|
|
if (gs.sa_handler == SIG_DFL && sig == SIGCHLD)
|
|
|
|
sig_clear (sig);
|
|
|
|
if (sig == SIGCHLD)
|
|
|
|
{
|
|
|
|
myself->process_state &= ~PID_NOCLDSTOP;
|
|
|
|
if (gs.sa_flags & SA_NOCLDSTOP)
|
|
|
|
myself->process_state |= PID_NOCLDSTOP;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (oldact)
|
|
|
|
{
|
|
|
|
*oldact = oa;
|
|
|
|
oa.sa_flags &= ~_SA_INTERNAL_MASK;
|
|
|
|
}
|
|
|
|
res = 0;
|
2003-09-01 10:05:32 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2014-08-22 17:21:33 +08:00
|
|
|
__except (EFAULT) {}
|
|
|
|
__endtry
|
2011-12-04 07:55:21 +08:00
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2006-03-23 23:55:59 +08:00
|
|
|
extern "C" int
|
|
|
|
sigaction (int sig, const struct sigaction *newact, struct sigaction *oldact)
|
|
|
|
{
|
2012-07-02 10:24:25 +08:00
|
|
|
int res = sigaction_worker (sig, newact, oldact, false);
|
|
|
|
syscall_printf ("%R = sigaction(%d, %p, %p)", res, sig, newact, oldact);
|
|
|
|
return res;
|
2006-03-23 23:55:59 +08:00
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigaddset (sigset_t *set, const int sig)
|
|
|
|
{
|
|
|
|
/* check that sig is in right range */
|
|
|
|
if (sig <= 0 || sig >= NSIG)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
2001-04-01 08:06:17 +08:00
|
|
|
syscall_printf ("SIG_ERR = sigaddset signal %d out of range", sig);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
*set |= SIGTOMASK (sig);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigdelset (sigset_t *set, const int sig)
|
|
|
|
{
|
|
|
|
/* check that sig is in right range */
|
|
|
|
if (sig <= 0 || sig >= NSIG)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
2001-04-01 08:06:17 +08:00
|
|
|
syscall_printf ("SIG_ERR = sigdelset signal %d out of range", sig);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
*set &= ~SIGTOMASK (sig);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigismember (const sigset_t *set, int sig)
|
|
|
|
{
|
|
|
|
/* check that sig is in right range */
|
|
|
|
if (sig <= 0 || sig >= NSIG)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
2001-04-01 08:06:17 +08:00
|
|
|
syscall_printf ("SIG_ERR = sigdelset signal %d out of range", sig);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*set & SIGTOMASK (sig))
|
|
|
|
return 1;
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigemptyset (sigset_t *set)
|
|
|
|
{
|
|
|
|
*set = (sigset_t) 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigfillset (sigset_t *set)
|
|
|
|
{
|
|
|
|
*set = ~((sigset_t) 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigsuspend (const sigset_t *set)
|
|
|
|
{
|
2012-07-30 11:44:40 +08:00
|
|
|
int res = handle_sigsuspend (*set);
|
|
|
|
syscall_printf ("%R = sigsuspend(%p)", res, set);
|
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sigpause (int signal_mask)
|
|
|
|
{
|
2012-07-30 11:44:40 +08:00
|
|
|
int res = handle_sigsuspend ((sigset_t) signal_mask);
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("%R = sigpause(%y)", res, signal_mask);
|
2012-07-30 11:44:40 +08:00
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2017-06-14 23:20:05 +08:00
|
|
|
extern "C" int
|
|
|
|
__xpg_sigpause (int sig)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
sigset_t signal_mask;
|
|
|
|
sigprocmask (0, NULL, &signal_mask);
|
|
|
|
sigdelset (&signal_mask, sig);
|
|
|
|
res = handle_sigsuspend (signal_mask);
|
|
|
|
syscall_printf ("%R = __xpg_sigpause(%y)", res, sig);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-10-03 03:19:21 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
pause (void)
|
|
|
|
{
|
2012-07-30 11:44:40 +08:00
|
|
|
int res = handle_sigsuspend (_my_tls.sigmask);
|
|
|
|
syscall_printf ("%R = pause()", res);
|
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2002-11-16 03:04:36 +08:00
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
siginterrupt (int sig, int flag)
|
|
|
|
{
|
|
|
|
struct sigaction act;
|
2016-11-24 21:10:41 +08:00
|
|
|
int res = sigaction_worker (sig, NULL, &act, false);
|
|
|
|
if (res == 0)
|
2006-03-23 23:55:59 +08:00
|
|
|
{
|
2016-11-24 21:10:41 +08:00
|
|
|
if (flag)
|
|
|
|
{
|
|
|
|
act.sa_flags &= ~SA_RESTART;
|
|
|
|
act.sa_flags |= _SA_NORESTART;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
act.sa_flags &= ~_SA_NORESTART;
|
|
|
|
act.sa_flags |= SA_RESTART;
|
|
|
|
}
|
|
|
|
res = sigaction_worker (sig, &act, NULL, true);
|
2006-03-23 23:55:59 +08:00
|
|
|
}
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("%R = siginterrupt(%d, %y)", sig, flag);
|
2012-07-02 10:24:25 +08:00
|
|
|
return res;
|
2002-11-16 03:04:36 +08:00
|
|
|
}
|
|
|
|
|
2004-01-19 13:46:54 +08:00
|
|
|
extern "C" int
|
|
|
|
sigwait (const sigset_t *set, int *sig_ptr)
|
|
|
|
{
|
2015-10-30 23:05:43 +08:00
|
|
|
int sig;
|
|
|
|
|
|
|
|
do
|
|
|
|
{
|
|
|
|
sig = sigwaitinfo (set, NULL);
|
|
|
|
}
|
|
|
|
while (sig == -1 && get_errno () == EINTR);
|
2004-01-19 13:46:54 +08:00
|
|
|
if (sig > 0)
|
|
|
|
*sig_ptr = sig;
|
2015-10-30 23:05:43 +08:00
|
|
|
return sig > 0 ? 0 : get_errno ();
|
2004-01-19 13:46:54 +08:00
|
|
|
}
|
2003-11-29 04:55:59 +08:00
|
|
|
|
|
|
|
extern "C" int
|
2004-01-19 13:46:54 +08:00
|
|
|
sigwaitinfo (const sigset_t *set, siginfo_t *info)
|
2003-11-29 04:55:59 +08:00
|
|
|
{
|
2014-08-22 17:21:33 +08:00
|
|
|
int res = -1;
|
2012-07-22 06:58:20 +08:00
|
|
|
|
2014-08-22 17:21:33 +08:00
|
|
|
pthread_testcancel ();
|
2003-11-29 04:55:59 +08:00
|
|
|
|
2014-08-22 17:21:33 +08:00
|
|
|
__try
|
2003-11-29 04:55:59 +08:00
|
|
|
{
|
2014-08-22 17:21:33 +08:00
|
|
|
set_signal_mask (_my_tls.sigwait_mask, *set);
|
|
|
|
sig_dispatch_pending (true);
|
|
|
|
|
|
|
|
switch (cygwait (NULL, cw_infinite, cw_sig_eintr | cw_cancel | cw_cancel_self))
|
2004-02-26 13:10:49 +08:00
|
|
|
{
|
2014-08-22 17:21:33 +08:00
|
|
|
case WAIT_SIGNALED:
|
|
|
|
if (!sigismember (set, _my_tls.infodata.si_signo))
|
|
|
|
set_errno (EINTR);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
_my_tls.lock ();
|
|
|
|
if (info)
|
|
|
|
*info = _my_tls.infodata;
|
|
|
|
res = _my_tls.infodata.si_signo;
|
|
|
|
_my_tls.sig = 0;
|
2015-06-19 21:58:23 +08:00
|
|
|
if (_my_tls.retaddr () == (__tlsstack_t) sigdelayed)
|
2014-08-22 17:21:33 +08:00
|
|
|
_my_tls.pop ();
|
|
|
|
_my_tls.unlock ();
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
__seterrno ();
|
|
|
|
break;
|
2004-02-26 13:10:49 +08:00
|
|
|
}
|
2003-11-29 04:55:59 +08:00
|
|
|
}
|
2014-08-22 17:21:33 +08:00
|
|
|
__except (EFAULT) {
|
|
|
|
res = -1;
|
|
|
|
}
|
|
|
|
__endtry
|
2011-11-14 09:29:49 +08:00
|
|
|
sigproc_printf ("returning signal %d", res);
|
2004-01-19 13:46:54 +08:00
|
|
|
return res;
|
2003-11-29 04:55:59 +08:00
|
|
|
}
|
2004-02-26 13:10:49 +08:00
|
|
|
|
2017-08-03 20:55:21 +08:00
|
|
|
/* FIXME: SUSv3 says that this function should block until the signal has
|
|
|
|
actually been delivered. Currently, this will only happen when sending
|
|
|
|
signals to the current process. It will not happen when sending signals
|
|
|
|
to other processes. */
|
|
|
|
extern "C" int
|
|
|
|
sigqueue (pid_t pid, int sig, const union sigval value)
|
2004-02-26 13:10:49 +08:00
|
|
|
{
|
2017-08-03 20:55:21 +08:00
|
|
|
siginfo_t si = {0};
|
2004-02-26 13:10:49 +08:00
|
|
|
pinfo dest (pid);
|
|
|
|
if (!dest)
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
return -1;
|
|
|
|
}
|
2016-11-24 21:10:41 +08:00
|
|
|
if (sig == 0)
|
|
|
|
return 0;
|
2017-08-03 20:55:21 +08:00
|
|
|
if (sig < 0 || sig >= NSIG)
|
2016-11-24 21:10:41 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
2004-02-26 13:10:49 +08:00
|
|
|
si.si_signo = sig;
|
2005-09-26 22:51:48 +08:00
|
|
|
si.si_code = SI_QUEUE;
|
2004-02-26 13:10:49 +08:00
|
|
|
si.si_value = value;
|
2017-08-03 20:55:21 +08:00
|
|
|
return sig_send (dest, si);
|
2004-02-26 13:10:49 +08:00
|
|
|
}
|
2015-06-19 21:58:23 +08:00
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
sigaltstack (const stack_t *ss, stack_t *oss)
|
|
|
|
{
|
|
|
|
_cygtls& me = _my_tls;
|
|
|
|
|
2015-06-21 00:48:09 +08:00
|
|
|
__try
|
2015-06-19 21:58:23 +08:00
|
|
|
{
|
2015-06-21 00:48:09 +08:00
|
|
|
if (ss)
|
2015-06-19 21:58:23 +08:00
|
|
|
{
|
2015-06-21 00:48:09 +08:00
|
|
|
if (me.altstack.ss_flags == SS_ONSTACK)
|
2015-06-19 21:58:23 +08:00
|
|
|
{
|
2015-06-21 00:48:09 +08:00
|
|
|
/* An attempt was made to modify an active stack. */
|
|
|
|
set_errno (EPERM);
|
2015-06-19 21:58:23 +08:00
|
|
|
return -1;
|
|
|
|
}
|
2015-06-21 00:48:09 +08:00
|
|
|
if (ss->ss_flags == SS_DISABLE)
|
2015-06-19 21:58:23 +08:00
|
|
|
{
|
2015-06-21 00:48:09 +08:00
|
|
|
me.altstack.ss_sp = NULL;
|
|
|
|
me.altstack.ss_flags = 0;
|
|
|
|
me.altstack.ss_size = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (ss->ss_flags)
|
|
|
|
{
|
|
|
|
/* The ss argument is not a null pointer, and the ss_flags
|
|
|
|
member pointed to by ss contains flags other than
|
|
|
|
SS_DISABLE. */
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (ss->ss_size < MINSIGSTKSZ)
|
|
|
|
{
|
|
|
|
/* The size of the alternate stack area is less than
|
|
|
|
MINSIGSTKSZ. */
|
|
|
|
set_errno (ENOMEM);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
memcpy (&me.altstack, ss, sizeof *ss);
|
2015-06-19 21:58:23 +08:00
|
|
|
}
|
|
|
|
}
|
2015-06-21 00:48:09 +08:00
|
|
|
if (oss)
|
2015-06-27 18:08:07 +08:00
|
|
|
{
|
|
|
|
char stack_marker;
|
|
|
|
memcpy (oss, &me.altstack, sizeof *oss);
|
2015-07-01 02:43:50 +08:00
|
|
|
/* Check if the current stack is the alternate signal stack. If so,
|
|
|
|
set ss_flags accordingly. We do this here rather than setting
|
|
|
|
ss_flags in _cygtls::call_signal_handler since the signal handler
|
|
|
|
calls longjmp, so we never return to reset the flag. */
|
2015-06-27 18:08:07 +08:00
|
|
|
if (!me.altstack.ss_flags && me.altstack.ss_sp)
|
|
|
|
{
|
|
|
|
if (&stack_marker >= (char *) me.altstack.ss_sp
|
|
|
|
&& &stack_marker < (char *) me.altstack.ss_sp
|
|
|
|
+ me.altstack.ss_size)
|
|
|
|
oss->ss_flags = SS_ONSTACK;
|
|
|
|
}
|
|
|
|
}
|
2015-06-19 21:58:23 +08:00
|
|
|
}
|
2015-06-21 00:48:09 +08:00
|
|
|
__except (EFAULT)
|
|
|
|
{
|
|
|
|
return EFAULT;
|
|
|
|
}
|
|
|
|
__endtry
|
2015-06-19 21:58:23 +08:00
|
|
|
return 0;
|
|
|
|
}
|