1.\" Copyright (c) 1980, 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. Neither the name of the University nor the names of its contributors 13.\" may be used to endorse or promote products derived from this software 14.\" without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" From: @(#)sigaction.2 8.2 (Berkeley) 4/3/94 29.\" $FreeBSD$ 30.\" 31.Dd June 29, 2020 32.Dt SIGACTION 2 33.Os 34.Sh NAME 35.Nm sigaction 36.Nd software signal facilities 37.Sh LIBRARY 38.Lb libc 39.Sh SYNOPSIS 40.In signal.h 41.Bd -literal 42struct sigaction { 43 void (*sa_handler)(int); 44 void (*sa_sigaction)(int, siginfo_t *, void *); 45 int sa_flags; /* see signal options below */ 46 sigset_t sa_mask; /* signal mask to apply */ 47}; 48.Ed 49.Pp 50.Ft int 51.Fo sigaction 52.Fa "int sig" 53.Fa "const struct sigaction * restrict act" 54.Fa "struct sigaction * restrict oact" 55.Fc 56.Sh DESCRIPTION 57The system defines a set of signals that may be delivered to a process. 58Signal delivery resembles the occurrence of a hardware interrupt: 59the signal is normally blocked from further occurrence, the current thread 60context is saved, and a new one is built. 61A process may specify a 62.Em handler 63to which a signal is delivered, or specify that a signal is to be 64.Em ignored . 65A process may also specify that a default action is to be taken 66by the system when a signal occurs. 67A signal may also be 68.Em blocked 69for a thread, 70in which case it will not be delivered to that thread until it is 71.Em unblocked . 72The action to be taken on delivery is determined at the time 73of delivery. 74Normally, signal handlers execute on the current stack 75of the thread. 76This may be changed, on a per-handler basis, 77so that signals are taken on a special 78.Em "signal stack" . 79.Pp 80Signal routines normally execute with the signal that caused their 81invocation 82.Em blocked , 83but other signals may yet occur. 84A global 85.Em "signal mask" 86defines the set of signals currently blocked from delivery 87to a thread. 88The signal mask for a thread is initialized 89from that of its parent (normally empty). 90It may be changed with a 91.Xr sigprocmask 2 92or 93.Xr pthread_sigmask 3 94call, or when a signal is delivered to the thread. 95.Pp 96When a signal 97condition arises for a process or thread, the signal is added to a set of 98signals pending for the process or thread. 99Whether the signal is directed at the process in general or at a specific 100thread depends on how it is generated. 101For signals directed at a specific thread, 102if the signal is not currently 103.Em blocked 104by the thread then it is delivered to the thread. 105For signals directed at the process, 106if the signal is not currently 107.Em blocked 108by all threads then it is delivered to one thread that does not have it blocked 109(the selection of which is unspecified). 110Signals may be delivered any time a thread enters the operating system 111(e.g., during a system call, page fault or trap, or clock interrupt). 112If multiple signals are ready to be delivered at the same time, 113any signals that could be caused by traps are delivered first. 114Additional signals may be processed at the same time, with each 115appearing to interrupt the handlers for the previous signals 116before their first instructions. 117The set of pending signals is returned by the 118.Xr sigpending 2 119system call. 120When a caught signal 121is delivered, the current state of the thread is saved, 122a new signal mask is calculated (as described below), 123and the signal handler is invoked. 124The call to the handler 125is arranged so that if the signal handling routine returns 126normally the thread will resume execution in the context 127from before the signal's delivery. 128If the thread wishes to resume in a different context, then it 129must arrange to restore the previous context itself. 130.Pp 131When a signal is delivered to a thread a new signal mask is 132installed for the duration of the process' signal handler 133(or until a 134.Xr sigprocmask 2 135system call is made). 136This mask is formed by taking the union of the current signal mask set, 137the signal to be delivered, and 138the signal mask associated with the handler to be invoked. 139.Pp 140The 141.Fn sigaction 142system call 143assigns an action for a signal specified by 144.Fa sig . 145If 146.Fa act 147is non-NULL, it specifies an action 148.Dv ( SIG_DFL , 149.Dv SIG_IGN , 150or a handler routine) and mask to be used when delivering the specified signal. 151If 152.Fa oact 153is non-NULL, the previous handling information for the signal 154is returned to the user. 155.Pp 156The above declaration of 157.Vt "struct sigaction" 158is not literal. 159It is provided only to list the accessible members. 160See 161.In sys/signal.h 162for the actual definition. 163In particular, the storage occupied by 164.Va sa_handler 165and 166.Va sa_sigaction 167overlaps, and it is nonsensical for an application to attempt to use both 168simultaneously. 169.Pp 170Once a signal handler is installed, it normally remains installed 171until another 172.Fn sigaction 173system call is made, or an 174.Xr execve 2 175is performed. 176A signal-specific default action may be reset by 177setting 178.Va sa_handler 179to 180.Dv SIG_DFL . 181The defaults are process termination, possibly with core dump; 182no action; stopping the process; or continuing the process. 183See the signal list below for each signal's default action. 184If 185.Va sa_handler 186is 187.Dv SIG_DFL , 188the default action for the signal is to discard the signal, 189and if a signal is pending, 190the pending signal is discarded even if the signal is masked. 191If 192.Va sa_handler 193is set to 194.Dv SIG_IGN 195current and pending instances 196of the signal are ignored and discarded. 197.Pp 198Options may be specified by setting 199.Va sa_flags . 200The meaning of the various bits is as follows: 201.Bl -tag -offset indent -width SA_RESETHANDXX 202.It Dv SA_NOCLDSTOP 203If this bit is set when installing a catching function 204for the 205.Dv SIGCHLD 206signal, 207the 208.Dv SIGCHLD 209signal will be generated only when a child process exits, 210not when a child process stops. 211.It Dv SA_NOCLDWAIT 212If this bit is set when calling 213.Fn sigaction 214for the 215.Dv SIGCHLD 216signal, the system will not create zombie processes when children of 217the calling process exit. 218If the calling process subsequently issues a 219.Xr wait 2 220(or equivalent), it blocks until all of the calling process's child 221processes terminate, and then returns a value of \-1 with 222.Va errno 223set to 224.Er ECHILD . 225The same effect of avoiding zombie creation can also be achieved by setting 226.Va sa_handler 227for 228.Dv SIGCHLD 229to 230.Dv SIG_IGN . 231.It Dv SA_ONSTACK 232If this bit is set, the system will deliver the signal to the process 233on a 234.Em "signal stack" , 235specified by each thread with 236.Xr sigaltstack 2 . 237.It Dv SA_NODEFER 238If this bit is set, further occurrences of the delivered signal are 239not masked during the execution of the handler. 240.It Dv SA_RESETHAND 241If this bit is set, the handler is reset back to 242.Dv SIG_DFL 243at the moment the signal is delivered. 244.It Dv SA_RESTART 245See paragraph below. 246.It Dv SA_SIGINFO 247If this bit is set, the handler function is assumed to be pointed to by the 248.Va sa_sigaction 249member of 250.Vt "struct sigaction" 251and should match the prototype shown above or as below in 252.Sx EXAMPLES . 253This bit should not be set when assigning 254.Dv SIG_DFL 255or 256.Dv SIG_IGN . 257.El 258.Pp 259If a signal is caught during the system calls listed below, 260the call may be forced to terminate 261with the error 262.Er EINTR , 263the call may return with a data transfer shorter than requested, 264or the call may be restarted. 265Restart of pending calls is requested 266by setting the 267.Dv SA_RESTART 268bit in 269.Va sa_flags . 270The affected system calls include 271.Xr open 2 , 272.Xr read 2 , 273.Xr write 2 , 274.Xr sendto 2 , 275.Xr recvfrom 2 , 276.Xr sendmsg 2 277and 278.Xr recvmsg 2 279on a communications channel or a slow device (such as a terminal, 280but not a regular file) 281and during a 282.Xr wait 2 283or 284.Xr ioctl 2 . 285However, calls that have already committed are not restarted, 286but instead return a partial success (for example, a short read count). 287.Pp 288After a 289.Xr pthread_create 3 290the signal mask is inherited by the new thread and 291the set of pending signals and the signal stack for the new thread are empty. 292.Pp 293After a 294.Xr fork 2 295or 296.Xr vfork 2 297all signals, the signal mask, the signal stack, 298and the restart/interrupt flags are inherited by the child. 299.Pp 300The 301.Xr execve 2 302system call reinstates the default 303action for all signals which were caught and 304resets all signals to be caught on the user stack. 305Ignored signals remain ignored; 306the signal mask remains the same; 307signals that restart pending system calls continue to do so. 308.Pp 309The following is a list of all signals 310with names as in the include file 311.In signal.h : 312.Bl -column SIGVTALARMXX "create core imagexxx" 313.It Sy NAME Ta Sy Default Action Ta Sy Description 314.It Dv SIGHUP Ta terminate process Ta terminal line hangup 315.It Dv SIGINT Ta terminate process Ta interrupt program 316.It Dv SIGQUIT Ta create core image Ta quit program 317.It Dv SIGILL Ta create core image Ta illegal instruction 318.It Dv SIGTRAP Ta create core image Ta trace trap 319.It Dv SIGABRT Ta create core image Ta Xr abort 3 call (formerly Dv SIGIOT ) 320.It Dv SIGEMT Ta create core image Ta emulate instruction executed 321.It Dv SIGFPE Ta create core image Ta floating-point exception 322.It Dv SIGKILL Ta terminate process Ta kill program 323.It Dv SIGBUS Ta create core image Ta bus error 324.It Dv SIGSEGV Ta create core image Ta segmentation violation 325.It Dv SIGSYS Ta create core image Ta non-existent system call invoked 326.It Dv SIGPIPE Ta terminate process Ta write on a pipe with no reader 327.It Dv SIGALRM Ta terminate process Ta real-time timer expired 328.It Dv SIGTERM Ta terminate process Ta software termination signal 329.It Dv SIGURG Ta discard signal Ta urgent condition present on socket 330.It Dv SIGSTOP Ta stop process Ta stop (cannot be caught or ignored) 331.It Dv SIGTSTP Ta stop process Ta stop signal generated from keyboard 332.It Dv SIGCONT Ta discard signal Ta continue after stop 333.It Dv SIGCHLD Ta discard signal Ta child status has changed 334.It Dv SIGTTIN Ta stop process Ta background read attempted from control terminal 335.It Dv SIGTTOU Ta stop process Ta background write attempted to control terminal 336.It Dv SIGIO Ta discard signal Ta I/O is possible on a descriptor (see Xr fcntl 2 ) 337.It Dv SIGXCPU Ta terminate process Ta cpu time limit exceeded (see Xr setrlimit 2 ) 338.It Dv SIGXFSZ Ta terminate process Ta file size limit exceeded (see Xr setrlimit 2 ) 339.It Dv SIGVTALRM Ta terminate process Ta virtual time alarm (see Xr setitimer 2 ) 340.It Dv SIGPROF Ta terminate process Ta profiling timer alarm (see Xr setitimer 2 ) 341.It Dv SIGWINCH Ta discard signal Ta window size change 342.It Dv SIGINFO Ta discard signal Ta status request from keyboard 343.It Dv SIGUSR1 Ta terminate process Ta user defined signal 1 344.It Dv SIGUSR2 Ta terminate process Ta user defined signal 2 345.El 346.Sh NOTE 347The 348.Va sa_mask 349field specified in 350.Fa act 351is not allowed to block 352.Dv SIGKILL 353or 354.Dv SIGSTOP . 355Any attempt to do so will be silently ignored. 356.Pp 357The following functions are either reentrant or not interruptible 358by signals and are async-signal safe. 359Therefore applications may 360invoke them, without restriction, from signal-catching functions 361or from a child process after calling 362.Xr fork 2 363in a multi-threaded process: 364.Pp 365Base Interfaces: 366.Pp 367.Fn _Exit , 368.Fn _exit , 369.Fn accept , 370.Fn access , 371.Fn alarm , 372.Fn bind , 373.Fn cfgetispeed , 374.Fn cfgetospeed , 375.Fn cfsetispeed , 376.Fn cfsetospeed , 377.Fn chdir , 378.Fn chmod , 379.Fn chown , 380.Fn close , 381.Fn connect , 382.Fn creat , 383.Fn dup , 384.Fn dup2 , 385.Fn execl , 386.Fn execle , 387.Fn execv , 388.Fn execve , 389.Fn faccessat , 390.Fn fchdir , 391.Fn fchmod , 392.Fn fchmodat , 393.Fn fchown , 394.Fn fchownat , 395.Fn fcntl , 396.Fn fork , 397.Fn fstat , 398.Fn fstatat , 399.Fn fsync , 400.Fn ftruncate , 401.Fn getegid , 402.Fn geteuid , 403.Fn getgid , 404.Fn getgroups , 405.Fn getpeername , 406.Fn getpgrp , 407.Fn getpid , 408.Fn getppid , 409.Fn getsockname , 410.Fn getsockopt , 411.Fn getuid , 412.Fn kill , 413.Fn link , 414.Fn linkat , 415.Fn listen , 416.Fn lseek , 417.Fn lstat , 418.Fn mkdir , 419.Fn mkdirat , 420.Fn mkfifo , 421.Fn mkfifoat , 422.Fn mknod , 423.Fn mknodat , 424.Fn open , 425.Fn openat , 426.Fn pause , 427.Fn pipe , 428.Fn poll , 429.Fn pselect , 430.Fn pthread_sigmask , 431.Fn raise , 432.Fn read , 433.Fn readlink , 434.Fn readlinkat , 435.Fn recv , 436.Fn recvfrom , 437.Fn recvmsg , 438.Fn rename , 439.Fn renameat , 440.Fn rmdir , 441.Fn select , 442.Fn send , 443.Fn sendmsg , 444.Fn sendto , 445.Fn setgid , 446.Fn setpgid , 447.Fn setsid , 448.Fn setsockopt , 449.Fn setuid , 450.Fn shutdown , 451.Fn sigaction , 452.Fn sigaddset , 453.Fn sigdelset , 454.Fn sigemptyset , 455.Fn sigfillset , 456.Fn sigismember , 457.Fn signal , 458.Fn sigpending , 459.Fn sigprocmask , 460.Fn sigsuspend , 461.Fn sleep , 462.Fn sockatmark , 463.Fn socket , 464.Fn socketpair , 465.Fn stat , 466.Fn symlink , 467.Fn symlinkat , 468.Fn tcdrain , 469.Fn tcflow , 470.Fn tcflush , 471.Fn tcgetattr , 472.Fn tcgetpgrp , 473.Fn tcsendbreak , 474.Fn tcsetattr , 475.Fn tcsetpgrp , 476.Fn time , 477.Fn times , 478.Fn umask , 479.Fn uname , 480.Fn unlink , 481.Fn unlinkat , 482.Fn utime , 483.Fn wait , 484.Fn waitpid , 485.Fn write . 486.Pp 487X/Open Systems Interfaces: 488.Pp 489.Fn sigpause , 490.Fn sigset , 491.Fn utimes . 492.Pp 493Realtime Interfaces: 494.Pp 495.Fn aio_error , 496.Fn clock_gettime , 497.Fn timer_getoverrun , 498.Fn aio_return , 499.Fn fdatasync , 500.Fn sigqueue , 501.Fn timer_gettime , 502.Fn aio_suspend , 503.Fn sem_post , 504.Fn timer_settime . 505.Pp 506Base Interfaces not specified as async-signal safe by 507.Tn POSIX : 508.Pp 509.Fn fpathconf , 510.Fn pathconf , 511.Fn sysconf . 512.Pp 513Base Interfaces not specified as async-signal safe by 514.Tn POSIX , 515but planned to be: 516.Pp 517.Fn ffs , 518.Fn htonl , 519.Fn htons , 520.Fn memccpy , 521.Fn memchr , 522.Fn memcmp , 523.Fn memcpy , 524.Fn memmove , 525.Fn memset , 526.Fn ntohl , 527.Fn ntohs , 528.Fn stpcpy , 529.Fn stpncpy , 530.Fn strcat , 531.Fn strchr , 532.Fn strcmp , 533.Fn strcpy , 534.Fn strcspn , 535.Fn strlen , 536.Fn strncat , 537.Fn strncmp , 538.Fn strncpy , 539.Fn strnlen , 540.Fn strpbrk , 541.Fn strrchr , 542.Fn strspn , 543.Fn strstr , 544.Fn strtok_r , 545.Fn wcpcpy , 546.Fn wcpncpy , 547.Fn wcscat , 548.Fn wcschr , 549.Fn wcscmp , 550.Fn wcscpy , 551.Fn wcscspn , 552.Fn wcslen , 553.Fn wcsncat , 554.Fn wcsncmp , 555.Fn wcsncpy , 556.Fn wcsnlen , 557.Fn wcspbrk , 558.Fn wcsrchr , 559.Fn wcsspn , 560.Fn wcsstr , 561.Fn wcstok , 562.Fn wmemchr , 563.Fn wmemcmp , 564.Fn wmemcpy , 565.Fn wmemmove , 566.Fn wmemset . 567.Pp 568Extension Interfaces: 569.Pp 570.Fn accept4 , 571.Fn bindat , 572.Fn close_range , 573.Fn closefrom , 574.Fn connectat , 575.Fn eaccess , 576.Fn ffsl , 577.Fn ffsll , 578.Fn flock , 579.Fn fls , 580.Fn flsl , 581.Fn flsll , 582.Fn futimesat , 583.Fn pipe2 , 584.Fn strlcat . 585.Fn strlcpy , 586.Fn strsep . 587.Pp 588In addition, reading or writing 589.Va errno 590is async-signal safe. 591.Pp 592All functions not in the above lists are considered to be unsafe 593with respect to signals. 594That is to say, the behaviour of such 595functions is undefined when they are called from a signal handler 596that interrupted an unsafe function. 597In general though, signal handlers should do little more than set a 598flag; most other actions are not safe. 599.Pp 600Also, it is good practice to make a copy of the global variable 601.Va errno 602and restore it before returning from the signal handler. 603This protects against the side effect of 604.Va errno 605being set by functions called from inside the signal handler. 606.Sh RETURN VALUES 607.Rv -std sigaction 608.Sh EXAMPLES 609There are three possible prototypes the handler may match: 610.Bl -tag -offset indent -width short 611.It Tn ANSI C : 612.Ft void 613.Fn handler int ; 614.It Traditional BSD style: 615.Ft void 616.Fn handler int "int code" "struct sigcontext *scp" ; 617.It Tn POSIX Dv SA_SIGINFO : 618.Ft void 619.Fn handler int "siginfo_t *info" "ucontext_t *uap" ; 620.El 621.Pp 622The handler function should match the 623.Dv SA_SIGINFO 624prototype if the 625.Dv SA_SIGINFO 626bit is set in 627.Va sa_flags . 628It then should be pointed to by the 629.Va sa_sigaction 630member of 631.Vt "struct sigaction" . 632Note that you should not assign 633.Dv SIG_DFL 634or 635.Dv SIG_IGN 636this way. 637.Pp 638If the 639.Dv SA_SIGINFO 640flag is not set, the handler function should match 641either the 642.Tn ANSI C 643or traditional 644.Bx 645prototype and be pointed to by 646the 647.Va sa_handler 648member of 649.Vt "struct sigaction" . 650In practice, 651.Fx 652always sends the three arguments of the latter and since the 653.Tn ANSI C 654prototype is a subset, both will work. 655The 656.Va sa_handler 657member declaration in 658.Fx 659include files is that of 660.Tn ANSI C 661(as required by 662.Tn POSIX ) , 663so a function pointer of a 664.Bx Ns -style 665function needs to be casted to 666compile without warning. 667The traditional 668.Bx 669style is not portable and since its capabilities 670are a full subset of a 671.Dv SA_SIGINFO 672handler, 673its use is deprecated. 674.Pp 675The 676.Fa sig 677argument is the signal number, one of the 678.Dv SIG... 679values from 680.In signal.h . 681.Pp 682The 683.Fa code 684argument of the 685.Bx Ns -style 686handler and the 687.Va si_code 688member of the 689.Fa info 690argument to a 691.Dv SA_SIGINFO 692handler contain a numeric code explaining the 693cause of the signal, usually one of the 694.Dv SI_... 695values from 696.In sys/signal.h 697or codes specific to a signal, i.e., one of the 698.Dv FPE_... 699values for 700.Dv SIGFPE . 701.Pp 702The 703.Fa scp 704argument to a 705.Bx Ns -style 706handler points to an instance of 707.Vt "struct sigcontext" . 708.Pp 709The 710.Fa uap 711argument to a 712.Tn POSIX 713.Dv SA_SIGINFO 714handler points to an instance of 715ucontext_t. 716.Sh ERRORS 717The 718.Fn sigaction 719system call 720will fail and no new signal handler will be installed if one 721of the following occurs: 722.Bl -tag -width Er 723.It Bq Er EINVAL 724The 725.Fa sig 726argument 727is not a valid signal number. 728.It Bq Er EINVAL 729An attempt is made to ignore or supply a handler for 730.Dv SIGKILL 731or 732.Dv SIGSTOP . 733.El 734.Sh SEE ALSO 735.Xr kill 1 , 736.Xr kill 2 , 737.Xr ptrace 2 , 738.Xr setitimer 2 , 739.Xr setrlimit 2 , 740.Xr sigaltstack 2 , 741.Xr sigpending 2 , 742.Xr sigprocmask 2 , 743.Xr sigsuspend 2 , 744.Xr wait 2 , 745.Xr fpsetmask 3 , 746.Xr setjmp 3 , 747.Xr siginfo 3 , 748.Xr siginterrupt 3 , 749.Xr sigsetops 3 , 750.Xr ucontext 3 , 751.Xr tty 4 752.Sh STANDARDS 753The 754.Fn sigaction 755system call is expected to conform to 756.St -p1003.1-90 . 757The 758.Dv SA_ONSTACK 759and 760.Dv SA_RESTART 761flags are Berkeley extensions, 762as are the signals, 763.Dv SIGTRAP , 764.Dv SIGEMT , 765.Dv SIGBUS , 766.Dv SIGSYS , 767.Dv SIGURG , 768.Dv SIGIO , 769.Dv SIGXCPU , 770.Dv SIGXFSZ , 771.Dv SIGVTALRM , 772.Dv SIGPROF , 773.Dv SIGWINCH , 774and 775.Dv SIGINFO . 776Those signals are available on most 777.Bx Ns \-derived 778systems. 779The 780.Dv SA_NODEFER 781and 782.Dv SA_RESETHAND 783flags are intended for backwards compatibility with other operating 784systems. 785The 786.Dv SA_NOCLDSTOP , 787and 788.Dv SA_NOCLDWAIT 789.\" and 790.\" SA_SIGINFO 791flags are featuring options commonly found in other operating systems. 792The flags are approved by 793.St -susv2 , 794along with the option to avoid zombie creation by ignoring 795.Dv SIGCHLD . 796