131e31b8aSbellard /*
266fb9763Sbellard * Emulation of Linux signals
331e31b8aSbellard *
431e31b8aSbellard * Copyright (c) 2003 Fabrice Bellard
531e31b8aSbellard *
631e31b8aSbellard * This program is free software; you can redistribute it and/or modify
731e31b8aSbellard * it under the terms of the GNU General Public License as published by
831e31b8aSbellard * the Free Software Foundation; either version 2 of the License, or
931e31b8aSbellard * (at your option) any later version.
1031e31b8aSbellard *
1131e31b8aSbellard * This program is distributed in the hope that it will be useful,
1231e31b8aSbellard * but WITHOUT ANY WARRANTY; without even the implied warranty of
1331e31b8aSbellard * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
1431e31b8aSbellard * GNU General Public License for more details.
1531e31b8aSbellard *
1631e31b8aSbellard * You should have received a copy of the GNU General Public License
178167ee88SBlue Swirl * along with this program; if not, see <http://www.gnu.org/licenses/>.
1831e31b8aSbellard */
19d39594e9SPeter Maydell #include "qemu/osdep.h"
20a70dadc7SPeter Maydell #include "qemu/bitops.h"
21*c107521eSIlya Leoshkevich #include "qemu/cutils.h"
22d96bf49bSAlex Bennée #include "gdbstub/user.h"
2374781c08SPhilippe Mathieu-Daudé #include "exec/page-protection.h"
24e6037d04SRichard Henderson #include "hw/core/tcg-cpu-ops.h"
2585b4fa0cSPeter Maydell
2631e31b8aSbellard #include <sys/ucontext.h>
27edf8e2afSMika Westerberg #include <sys/resource.h>
2831e31b8aSbellard
293ef693a0Sbellard #include "qemu.h"
303b249d26SPeter Maydell #include "user-internals.h"
31a44d57a3SPeter Maydell #include "strace.h"
323ad0a769SPeter Maydell #include "loader.h"
33c8ee0a44SPaolo Bonzini #include "trace.h"
34befb7447SLaurent Vivier #include "signal-common.h"
35e6037d04SRichard Henderson #include "host-signal.h"
36bbf15aafSRichard Henderson #include "user/safe-syscall.h"
377dfd3ca8SHelge Deller #include "tcg/tcg.h"
3866fb9763Sbellard
39f84e313eSGustavo Romero /* target_siginfo_t must fit in gdbstub's siginfo save area. */
40f84e313eSGustavo Romero QEMU_BUILD_BUG_ON(sizeof(target_siginfo_t) > MAX_SIGINFO_LENGTH);
41f84e313eSGustavo Romero
42624f7979Spbrook static struct target_sigaction sigact_table[TARGET_NSIG];
4331e31b8aSbellard
4466fb9763Sbellard static void host_signal_handler(int host_signum, siginfo_t *info,
4566fb9763Sbellard void *puc);
4666fb9763Sbellard
47db2af69dSRichard Henderson /* Fallback addresses into sigtramp page. */
48db2af69dSRichard Henderson abi_ulong default_sigreturn;
49db2af69dSRichard Henderson abi_ulong default_rt_sigreturn;
509fcff3a6SLaurent Vivier
519fcff3a6SLaurent Vivier /*
52b60b91aaSRichard Henderson * System includes define _NSIG as SIGRTMAX + 1, but qemu (like the kernel)
53b60b91aaSRichard Henderson * defines TARGET_NSIG as TARGET_SIGRTMAX and the first signal is 1.
549fcff3a6SLaurent Vivier * Signal number 0 is reserved for use as kill(pid, 0), to test whether
559fcff3a6SLaurent Vivier * a process exists without sending it a signal.
569fcff3a6SLaurent Vivier */
57144bff03SMichael Forney #ifdef __SIGRTMAX
589fcff3a6SLaurent Vivier QEMU_BUILD_BUG_ON(__SIGRTMAX + 1 != _NSIG);
59144bff03SMichael Forney #endif
603ca05588SArnaud Patard static uint8_t host_to_target_signal_table[_NSIG] = {
617b72aa1dSHelge Deller #define MAKE_SIG_ENTRY(sig) [sig] = TARGET_##sig,
627b72aa1dSHelge Deller MAKE_SIGNAL_LIST
637b72aa1dSHelge Deller #undef MAKE_SIG_ENTRY
649e5f5284Sbellard };
659e5f5284Sbellard
669fcff3a6SLaurent Vivier static uint8_t target_to_host_signal_table[TARGET_NSIG + 1];
679fcff3a6SLaurent Vivier
689fcff3a6SLaurent Vivier /* valid sig is between 1 and _NSIG - 1 */
host_to_target_signal(int sig)691d9d8b55Spbrook int host_to_target_signal(int sig)
7031e31b8aSbellard {
71b60b91aaSRichard Henderson if (sig < 1) {
724cb05961Spbrook return sig;
739fcff3a6SLaurent Vivier }
74b60b91aaSRichard Henderson if (sig >= _NSIG) {
75b60b91aaSRichard Henderson return TARGET_NSIG + 1;
76b60b91aaSRichard Henderson }
779e5f5284Sbellard return host_to_target_signal_table[sig];
7831e31b8aSbellard }
7931e31b8aSbellard
809fcff3a6SLaurent Vivier /* valid sig is between 1 and TARGET_NSIG */
target_to_host_signal(int sig)814cb05961Spbrook int target_to_host_signal(int sig)
8231e31b8aSbellard {
83b60b91aaSRichard Henderson if (sig < 1) {
844cb05961Spbrook return sig;
859fcff3a6SLaurent Vivier }
86b60b91aaSRichard Henderson if (sig > TARGET_NSIG) {
87b60b91aaSRichard Henderson return _NSIG;
88b60b91aaSRichard Henderson }
899e5f5284Sbellard return target_to_host_signal_table[sig];
9031e31b8aSbellard }
9131e31b8aSbellard
target_sigaddset(target_sigset_t * set,int signum)92c227f099SAnthony Liguori static inline void target_sigaddset(target_sigset_t *set, int signum)
93f5545b5cSpbrook {
94f5545b5cSpbrook signum--;
95f5545b5cSpbrook abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
96f5545b5cSpbrook set->sig[signum / TARGET_NSIG_BPW] |= mask;
97f5545b5cSpbrook }
98f5545b5cSpbrook
target_sigismember(const target_sigset_t * set,int signum)99c227f099SAnthony Liguori static inline int target_sigismember(const target_sigset_t *set, int signum)
100f5545b5cSpbrook {
101f5545b5cSpbrook signum--;
102f5545b5cSpbrook abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
103f5545b5cSpbrook return ((set->sig[signum / TARGET_NSIG_BPW] & mask) != 0);
104f5545b5cSpbrook }
105f5545b5cSpbrook
host_to_target_sigset_internal(target_sigset_t * d,const sigset_t * s)106befb7447SLaurent Vivier void host_to_target_sigset_internal(target_sigset_t *d,
1079231944dSbellard const sigset_t *s)
10866fb9763Sbellard {
1099fcff3a6SLaurent Vivier int host_sig, target_sig;
110f5545b5cSpbrook target_sigemptyset(d);
1119fcff3a6SLaurent Vivier for (host_sig = 1; host_sig < _NSIG; host_sig++) {
1129fcff3a6SLaurent Vivier target_sig = host_to_target_signal(host_sig);
1139fcff3a6SLaurent Vivier if (target_sig < 1 || target_sig > TARGET_NSIG) {
1149fcff3a6SLaurent Vivier continue;
1159fcff3a6SLaurent Vivier }
1169fcff3a6SLaurent Vivier if (sigismember(s, host_sig)) {
1179fcff3a6SLaurent Vivier target_sigaddset(d, target_sig);
1189e5f5284Sbellard }
11966fb9763Sbellard }
12066fb9763Sbellard }
12166fb9763Sbellard
host_to_target_sigset(target_sigset_t * d,const sigset_t * s)122c227f099SAnthony Liguori void host_to_target_sigset(target_sigset_t *d, const sigset_t *s)
1239231944dSbellard {
124c227f099SAnthony Liguori target_sigset_t d1;
1259231944dSbellard int i;
1269231944dSbellard
1279231944dSbellard host_to_target_sigset_internal(&d1, s);
1289231944dSbellard for(i = 0;i < TARGET_NSIG_WORDS; i++)
129cbb21eedSMatthias Braun d->sig[i] = tswapal(d1.sig[i]);
1309231944dSbellard }
1319231944dSbellard
target_to_host_sigset_internal(sigset_t * d,const target_sigset_t * s)132befb7447SLaurent Vivier void target_to_host_sigset_internal(sigset_t *d,
133c227f099SAnthony Liguori const target_sigset_t *s)
13466fb9763Sbellard {
1359fcff3a6SLaurent Vivier int host_sig, target_sig;
136f5545b5cSpbrook sigemptyset(d);
1379fcff3a6SLaurent Vivier for (target_sig = 1; target_sig <= TARGET_NSIG; target_sig++) {
1389fcff3a6SLaurent Vivier host_sig = target_to_host_signal(target_sig);
1399fcff3a6SLaurent Vivier if (host_sig < 1 || host_sig >= _NSIG) {
1409fcff3a6SLaurent Vivier continue;
1419fcff3a6SLaurent Vivier }
1429fcff3a6SLaurent Vivier if (target_sigismember(s, target_sig)) {
1439fcff3a6SLaurent Vivier sigaddset(d, host_sig);
1449e5f5284Sbellard }
14566fb9763Sbellard }
14666fb9763Sbellard }
14766fb9763Sbellard
target_to_host_sigset(sigset_t * d,const target_sigset_t * s)148c227f099SAnthony Liguori void target_to_host_sigset(sigset_t *d, const target_sigset_t *s)
1499231944dSbellard {
150c227f099SAnthony Liguori target_sigset_t s1;
1519231944dSbellard int i;
1529231944dSbellard
1539231944dSbellard for(i = 0;i < TARGET_NSIG_WORDS; i++)
154cbb21eedSMatthias Braun s1.sig[i] = tswapal(s->sig[i]);
1559231944dSbellard target_to_host_sigset_internal(d, &s1);
1569231944dSbellard }
1579231944dSbellard
host_to_target_old_sigset(abi_ulong * old_sigset,const sigset_t * sigset)158992f48a0Sblueswir1 void host_to_target_old_sigset(abi_ulong *old_sigset,
15966fb9763Sbellard const sigset_t *sigset)
16066fb9763Sbellard {
161c227f099SAnthony Liguori target_sigset_t d;
1629e5f5284Sbellard host_to_target_sigset(&d, sigset);
1639e5f5284Sbellard *old_sigset = d.sig[0];
16466fb9763Sbellard }
16566fb9763Sbellard
target_to_host_old_sigset(sigset_t * sigset,const abi_ulong * old_sigset)16666fb9763Sbellard void target_to_host_old_sigset(sigset_t *sigset,
167992f48a0Sblueswir1 const abi_ulong *old_sigset)
16866fb9763Sbellard {
169c227f099SAnthony Liguori target_sigset_t d;
1709e5f5284Sbellard int i;
1719e5f5284Sbellard
1729e5f5284Sbellard d.sig[0] = *old_sigset;
1739e5f5284Sbellard for(i = 1;i < TARGET_NSIG_WORDS; i++)
1749e5f5284Sbellard d.sig[i] = 0;
1759e5f5284Sbellard target_to_host_sigset(sigset, &d);
17666fb9763Sbellard }
17766fb9763Sbellard
block_signals(void)1783d3efba0SPeter Maydell int block_signals(void)
1793d3efba0SPeter Maydell {
180e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
1813d3efba0SPeter Maydell sigset_t set;
1823d3efba0SPeter Maydell
1833d3efba0SPeter Maydell /* It's OK to block everything including SIGSEGV, because we won't
1843d3efba0SPeter Maydell * run any further guest code before unblocking signals in
1853d3efba0SPeter Maydell * process_pending_signals().
1863d3efba0SPeter Maydell */
1873d3efba0SPeter Maydell sigfillset(&set);
1883d3efba0SPeter Maydell sigprocmask(SIG_SETMASK, &set, 0);
1893d3efba0SPeter Maydell
190d73415a3SStefan Hajnoczi return qatomic_xchg(&ts->signal_pending, 1);
1913d3efba0SPeter Maydell }
1923d3efba0SPeter Maydell
1931c275925SAlex Barcelo /* Wrapper for sigprocmask function
1941c275925SAlex Barcelo * Emulates a sigprocmask in a safe way for the guest. Note that set and oldset
195af254a27SRichard Henderson * are host signal set, not guest ones. Returns -QEMU_ERESTARTSYS if
1963d3efba0SPeter Maydell * a signal was already pending and the syscall must be restarted, or
1973d3efba0SPeter Maydell * 0 on success.
1983d3efba0SPeter Maydell * If set is NULL, this is guaranteed not to fail.
1991c275925SAlex Barcelo */
do_sigprocmask(int how,const sigset_t * set,sigset_t * oldset)2001c275925SAlex Barcelo int do_sigprocmask(int how, const sigset_t *set, sigset_t *oldset)
2011c275925SAlex Barcelo {
202e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
2033d3efba0SPeter Maydell
2043d3efba0SPeter Maydell if (oldset) {
2053d3efba0SPeter Maydell *oldset = ts->signal_mask;
2063d3efba0SPeter Maydell }
207a7ec0f98SPeter Maydell
208a7ec0f98SPeter Maydell if (set) {
2093d3efba0SPeter Maydell int i;
210a7ec0f98SPeter Maydell
2113d3efba0SPeter Maydell if (block_signals()) {
212af254a27SRichard Henderson return -QEMU_ERESTARTSYS;
2133d3efba0SPeter Maydell }
214a7ec0f98SPeter Maydell
215a7ec0f98SPeter Maydell switch (how) {
216a7ec0f98SPeter Maydell case SIG_BLOCK:
2173d3efba0SPeter Maydell sigorset(&ts->signal_mask, &ts->signal_mask, set);
218a7ec0f98SPeter Maydell break;
219a7ec0f98SPeter Maydell case SIG_UNBLOCK:
2203d3efba0SPeter Maydell for (i = 1; i <= NSIG; ++i) {
2213d3efba0SPeter Maydell if (sigismember(set, i)) {
2223d3efba0SPeter Maydell sigdelset(&ts->signal_mask, i);
2233d3efba0SPeter Maydell }
224a7ec0f98SPeter Maydell }
225a7ec0f98SPeter Maydell break;
226a7ec0f98SPeter Maydell case SIG_SETMASK:
2273d3efba0SPeter Maydell ts->signal_mask = *set;
228a7ec0f98SPeter Maydell break;
229a7ec0f98SPeter Maydell default:
230a7ec0f98SPeter Maydell g_assert_not_reached();
231a7ec0f98SPeter Maydell }
2323d3efba0SPeter Maydell
2333d3efba0SPeter Maydell /* Silently ignore attempts to change blocking status of KILL or STOP */
2343d3efba0SPeter Maydell sigdelset(&ts->signal_mask, SIGKILL);
2353d3efba0SPeter Maydell sigdelset(&ts->signal_mask, SIGSTOP);
236a7ec0f98SPeter Maydell }
2373d3efba0SPeter Maydell return 0;
2381c275925SAlex Barcelo }
2391c275925SAlex Barcelo
2403d3efba0SPeter Maydell /* Just set the guest's signal mask to the specified value; the
2413d3efba0SPeter Maydell * caller is assumed to have called block_signals() already.
2423d3efba0SPeter Maydell */
set_sigmask(const sigset_t * set)243befb7447SLaurent Vivier void set_sigmask(const sigset_t *set)
2449eede5b6SPeter Maydell {
245e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
2463d3efba0SPeter Maydell
2473d3efba0SPeter Maydell ts->signal_mask = *set;
2489eede5b6SPeter Maydell }
2499eede5b6SPeter Maydell
250465e237bSLaurent Vivier /* sigaltstack management */
251465e237bSLaurent Vivier
on_sig_stack(unsigned long sp)252465e237bSLaurent Vivier int on_sig_stack(unsigned long sp)
253465e237bSLaurent Vivier {
254e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
2555bfce0b7SPeter Maydell
2565bfce0b7SPeter Maydell return (sp - ts->sigaltstack_used.ss_sp
2575bfce0b7SPeter Maydell < ts->sigaltstack_used.ss_size);
258465e237bSLaurent Vivier }
259465e237bSLaurent Vivier
sas_ss_flags(unsigned long sp)260465e237bSLaurent Vivier int sas_ss_flags(unsigned long sp)
261465e237bSLaurent Vivier {
262e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
2635bfce0b7SPeter Maydell
2645bfce0b7SPeter Maydell return (ts->sigaltstack_used.ss_size == 0 ? SS_DISABLE
265465e237bSLaurent Vivier : on_sig_stack(sp) ? SS_ONSTACK : 0);
266465e237bSLaurent Vivier }
267465e237bSLaurent Vivier
target_sigsp(abi_ulong sp,struct target_sigaction * ka)268465e237bSLaurent Vivier abi_ulong target_sigsp(abi_ulong sp, struct target_sigaction *ka)
269465e237bSLaurent Vivier {
270465e237bSLaurent Vivier /*
271465e237bSLaurent Vivier * This is the X/Open sanctioned signal stack switching.
272465e237bSLaurent Vivier */
273e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
2745bfce0b7SPeter Maydell
275465e237bSLaurent Vivier if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) {
2765bfce0b7SPeter Maydell return ts->sigaltstack_used.ss_sp + ts->sigaltstack_used.ss_size;
277465e237bSLaurent Vivier }
278465e237bSLaurent Vivier return sp;
279465e237bSLaurent Vivier }
280465e237bSLaurent Vivier
target_save_altstack(target_stack_t * uss,CPUArchState * env)281465e237bSLaurent Vivier void target_save_altstack(target_stack_t *uss, CPUArchState *env)
282465e237bSLaurent Vivier {
283e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
2845bfce0b7SPeter Maydell
2855bfce0b7SPeter Maydell __put_user(ts->sigaltstack_used.ss_sp, &uss->ss_sp);
286465e237bSLaurent Vivier __put_user(sas_ss_flags(get_sp_from_cpustate(env)), &uss->ss_flags);
2875bfce0b7SPeter Maydell __put_user(ts->sigaltstack_used.ss_size, &uss->ss_size);
288465e237bSLaurent Vivier }
289465e237bSLaurent Vivier
target_restore_altstack(target_stack_t * uss,CPUArchState * env)290ddc3e74dSRichard Henderson abi_long target_restore_altstack(target_stack_t *uss, CPUArchState *env)
29192bad948SRichard Henderson {
292e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
29392bad948SRichard Henderson size_t minstacksize = TARGET_MINSIGSTKSZ;
29492bad948SRichard Henderson target_stack_t ss;
29592bad948SRichard Henderson
29692bad948SRichard Henderson #if defined(TARGET_PPC64)
29792bad948SRichard Henderson /* ELF V2 for PPC64 has a 4K minimum stack size for signal handlers */
29892bad948SRichard Henderson struct image_info *image = ts->info;
29992bad948SRichard Henderson if (get_ppc64_abi(image) > 1) {
30092bad948SRichard Henderson minstacksize = 4096;
30192bad948SRichard Henderson }
30292bad948SRichard Henderson #endif
30392bad948SRichard Henderson
30492bad948SRichard Henderson __get_user(ss.ss_sp, &uss->ss_sp);
30592bad948SRichard Henderson __get_user(ss.ss_size, &uss->ss_size);
30692bad948SRichard Henderson __get_user(ss.ss_flags, &uss->ss_flags);
30792bad948SRichard Henderson
308ddc3e74dSRichard Henderson if (on_sig_stack(get_sp_from_cpustate(env))) {
30992bad948SRichard Henderson return -TARGET_EPERM;
31092bad948SRichard Henderson }
31192bad948SRichard Henderson
31292bad948SRichard Henderson switch (ss.ss_flags) {
31392bad948SRichard Henderson default:
31492bad948SRichard Henderson return -TARGET_EINVAL;
31592bad948SRichard Henderson
31692bad948SRichard Henderson case TARGET_SS_DISABLE:
31792bad948SRichard Henderson ss.ss_size = 0;
31892bad948SRichard Henderson ss.ss_sp = 0;
31992bad948SRichard Henderson break;
32092bad948SRichard Henderson
32192bad948SRichard Henderson case TARGET_SS_ONSTACK:
32292bad948SRichard Henderson case 0:
32392bad948SRichard Henderson if (ss.ss_size < minstacksize) {
32492bad948SRichard Henderson return -TARGET_ENOMEM;
32592bad948SRichard Henderson }
32692bad948SRichard Henderson break;
32792bad948SRichard Henderson }
32892bad948SRichard Henderson
32992bad948SRichard Henderson ts->sigaltstack_used.ss_sp = ss.ss_sp;
33092bad948SRichard Henderson ts->sigaltstack_used.ss_size = ss.ss_size;
33192bad948SRichard Henderson return 0;
33292bad948SRichard Henderson }
33392bad948SRichard Henderson
3349de5e440Sbellard /* siginfo conversion */
3359de5e440Sbellard
host_to_target_siginfo_noswap(target_siginfo_t * tinfo,const siginfo_t * info)336c227f099SAnthony Liguori static inline void host_to_target_siginfo_noswap(target_siginfo_t *tinfo,
3379de5e440Sbellard const siginfo_t *info)
33866fb9763Sbellard {
339a05c6409SRichard Henderson int sig = host_to_target_signal(info->si_signo);
340a70dadc7SPeter Maydell int si_code = info->si_code;
341a70dadc7SPeter Maydell int si_type;
3429de5e440Sbellard tinfo->si_signo = sig;
3439de5e440Sbellard tinfo->si_errno = 0;
344afd7cd92Spbrook tinfo->si_code = info->si_code;
345a05c6409SRichard Henderson
34655d72a7eSPeter Maydell /* This memset serves two purposes:
34755d72a7eSPeter Maydell * (1) ensure we don't leak random junk to the guest later
34855d72a7eSPeter Maydell * (2) placate false positives from gcc about fields
34955d72a7eSPeter Maydell * being used uninitialized if it chooses to inline both this
35055d72a7eSPeter Maydell * function and tswap_siginfo() into host_to_target_siginfo().
35155d72a7eSPeter Maydell */
35255d72a7eSPeter Maydell memset(tinfo->_sifields._pad, 0, sizeof(tinfo->_sifields._pad));
35355d72a7eSPeter Maydell
354a70dadc7SPeter Maydell /* This is awkward, because we have to use a combination of
355a70dadc7SPeter Maydell * the si_code and si_signo to figure out which of the union's
356a70dadc7SPeter Maydell * members are valid. (Within the host kernel it is always possible
357a70dadc7SPeter Maydell * to tell, but the kernel carefully avoids giving userspace the
358a70dadc7SPeter Maydell * high 16 bits of si_code, so we don't have the information to
359a70dadc7SPeter Maydell * do this the easy way...) We therefore make our best guess,
360a70dadc7SPeter Maydell * bearing in mind that a guest can spoof most of the si_codes
361a70dadc7SPeter Maydell * via rt_sigqueueinfo() if it likes.
362a70dadc7SPeter Maydell *
363a70dadc7SPeter Maydell * Once we have made our guess, we record it in the top 16 bits of
364a70dadc7SPeter Maydell * the si_code, so that tswap_siginfo() later can use it.
365a70dadc7SPeter Maydell * tswap_siginfo() will strip these top bits out before writing
366a70dadc7SPeter Maydell * si_code to the guest (sign-extending the lower bits).
367a70dadc7SPeter Maydell */
368a70dadc7SPeter Maydell
369a70dadc7SPeter Maydell switch (si_code) {
370a70dadc7SPeter Maydell case SI_USER:
371a70dadc7SPeter Maydell case SI_TKILL:
372a70dadc7SPeter Maydell case SI_KERNEL:
373a70dadc7SPeter Maydell /* Sent via kill(), tkill() or tgkill(), or direct from the kernel.
374a70dadc7SPeter Maydell * These are the only unspoofable si_code values.
375a70dadc7SPeter Maydell */
376a70dadc7SPeter Maydell tinfo->_sifields._kill._pid = info->si_pid;
377a70dadc7SPeter Maydell tinfo->_sifields._kill._uid = info->si_uid;
378a70dadc7SPeter Maydell si_type = QEMU_SI_KILL;
379a70dadc7SPeter Maydell break;
380a70dadc7SPeter Maydell default:
381a70dadc7SPeter Maydell /* Everything else is spoofable. Make best guess based on signal */
382a70dadc7SPeter Maydell switch (sig) {
383a70dadc7SPeter Maydell case TARGET_SIGCHLD:
384a05c6409SRichard Henderson tinfo->_sifields._sigchld._pid = info->si_pid;
385a05c6409SRichard Henderson tinfo->_sifields._sigchld._uid = info->si_uid;
386139e5de7SMatthias Schiffer if (si_code == CLD_EXITED)
3871c3dfb50SAlistair Francis tinfo->_sifields._sigchld._status = info->si_status;
388139e5de7SMatthias Schiffer else
389139e5de7SMatthias Schiffer tinfo->_sifields._sigchld._status
390139e5de7SMatthias Schiffer = host_to_target_signal(info->si_status & 0x7f)
391139e5de7SMatthias Schiffer | (info->si_status & ~0x7f);
392a05c6409SRichard Henderson tinfo->_sifields._sigchld._utime = info->si_utime;
393a05c6409SRichard Henderson tinfo->_sifields._sigchld._stime = info->si_stime;
394a70dadc7SPeter Maydell si_type = QEMU_SI_CHLD;
395a70dadc7SPeter Maydell break;
396a70dadc7SPeter Maydell case TARGET_SIGIO:
397a70dadc7SPeter Maydell tinfo->_sifields._sigpoll._band = info->si_band;
398a70dadc7SPeter Maydell tinfo->_sifields._sigpoll._fd = info->si_fd;
399a70dadc7SPeter Maydell si_type = QEMU_SI_POLL;
400a70dadc7SPeter Maydell break;
401a70dadc7SPeter Maydell default:
402a70dadc7SPeter Maydell /* Assume a sigqueue()/mq_notify()/rt_sigqueueinfo() source. */
4039de5e440Sbellard tinfo->_sifields._rt._pid = info->si_pid;
4049de5e440Sbellard tinfo->_sifields._rt._uid = info->si_uid;
4059de5e440Sbellard /* XXX: potential problem if 64 bit */
406a05c6409SRichard Henderson tinfo->_sifields._rt._sigval.sival_ptr
407a05c6409SRichard Henderson = (abi_ulong)(unsigned long)info->si_value.sival_ptr;
408a70dadc7SPeter Maydell si_type = QEMU_SI_RT;
409a70dadc7SPeter Maydell break;
4109de5e440Sbellard }
411a70dadc7SPeter Maydell break;
412a70dadc7SPeter Maydell }
413a70dadc7SPeter Maydell
414a70dadc7SPeter Maydell tinfo->si_code = deposit32(si_code, 16, 16, si_type);
41566fb9763Sbellard }
41666fb9763Sbellard
tswap_siginfo(target_siginfo_t * tinfo,const target_siginfo_t * info)4174d6d8a05SGustavo Romero static void tswap_siginfo(target_siginfo_t *tinfo,
418c227f099SAnthony Liguori const target_siginfo_t *info)
4199de5e440Sbellard {
420a70dadc7SPeter Maydell int si_type = extract32(info->si_code, 16, 16);
421a70dadc7SPeter Maydell int si_code = sextract32(info->si_code, 0, 16);
422a05c6409SRichard Henderson
423a70dadc7SPeter Maydell __put_user(info->si_signo, &tinfo->si_signo);
424a70dadc7SPeter Maydell __put_user(info->si_errno, &tinfo->si_errno);
425a70dadc7SPeter Maydell __put_user(si_code, &tinfo->si_code);
426a70dadc7SPeter Maydell
427a70dadc7SPeter Maydell /* We can use our internal marker of which fields in the structure
428a70dadc7SPeter Maydell * are valid, rather than duplicating the guesswork of
429a70dadc7SPeter Maydell * host_to_target_siginfo_noswap() here.
430a70dadc7SPeter Maydell */
431a70dadc7SPeter Maydell switch (si_type) {
432a70dadc7SPeter Maydell case QEMU_SI_KILL:
433a70dadc7SPeter Maydell __put_user(info->_sifields._kill._pid, &tinfo->_sifields._kill._pid);
434a70dadc7SPeter Maydell __put_user(info->_sifields._kill._uid, &tinfo->_sifields._kill._uid);
435a70dadc7SPeter Maydell break;
436a70dadc7SPeter Maydell case QEMU_SI_TIMER:
437a70dadc7SPeter Maydell __put_user(info->_sifields._timer._timer1,
438a70dadc7SPeter Maydell &tinfo->_sifields._timer._timer1);
439a70dadc7SPeter Maydell __put_user(info->_sifields._timer._timer2,
440a70dadc7SPeter Maydell &tinfo->_sifields._timer._timer2);
441a70dadc7SPeter Maydell break;
442a70dadc7SPeter Maydell case QEMU_SI_POLL:
443a70dadc7SPeter Maydell __put_user(info->_sifields._sigpoll._band,
444a70dadc7SPeter Maydell &tinfo->_sifields._sigpoll._band);
445a70dadc7SPeter Maydell __put_user(info->_sifields._sigpoll._fd,
446a70dadc7SPeter Maydell &tinfo->_sifields._sigpoll._fd);
447a70dadc7SPeter Maydell break;
448a70dadc7SPeter Maydell case QEMU_SI_FAULT:
449a70dadc7SPeter Maydell __put_user(info->_sifields._sigfault._addr,
450a70dadc7SPeter Maydell &tinfo->_sifields._sigfault._addr);
451a70dadc7SPeter Maydell break;
452a70dadc7SPeter Maydell case QEMU_SI_CHLD:
453a70dadc7SPeter Maydell __put_user(info->_sifields._sigchld._pid,
454a70dadc7SPeter Maydell &tinfo->_sifields._sigchld._pid);
455a70dadc7SPeter Maydell __put_user(info->_sifields._sigchld._uid,
456a70dadc7SPeter Maydell &tinfo->_sifields._sigchld._uid);
457a70dadc7SPeter Maydell __put_user(info->_sifields._sigchld._status,
458a70dadc7SPeter Maydell &tinfo->_sifields._sigchld._status);
459a70dadc7SPeter Maydell __put_user(info->_sifields._sigchld._utime,
460a70dadc7SPeter Maydell &tinfo->_sifields._sigchld._utime);
461a70dadc7SPeter Maydell __put_user(info->_sifields._sigchld._stime,
462a70dadc7SPeter Maydell &tinfo->_sifields._sigchld._stime);
463a70dadc7SPeter Maydell break;
464a70dadc7SPeter Maydell case QEMU_SI_RT:
465a70dadc7SPeter Maydell __put_user(info->_sifields._rt._pid, &tinfo->_sifields._rt._pid);
466a70dadc7SPeter Maydell __put_user(info->_sifields._rt._uid, &tinfo->_sifields._rt._uid);
467a70dadc7SPeter Maydell __put_user(info->_sifields._rt._sigval.sival_ptr,
468a70dadc7SPeter Maydell &tinfo->_sifields._rt._sigval.sival_ptr);
469a70dadc7SPeter Maydell break;
470a70dadc7SPeter Maydell default:
471a70dadc7SPeter Maydell g_assert_not_reached();
4729de5e440Sbellard }
4739de5e440Sbellard }
4749de5e440Sbellard
host_to_target_siginfo(target_siginfo_t * tinfo,const siginfo_t * info)475c227f099SAnthony Liguori void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info)
4769de5e440Sbellard {
47755d72a7eSPeter Maydell target_siginfo_t tgt_tmp;
47855d72a7eSPeter Maydell host_to_target_siginfo_noswap(&tgt_tmp, info);
47955d72a7eSPeter Maydell tswap_siginfo(tinfo, &tgt_tmp);
4809de5e440Sbellard }
4819de5e440Sbellard
4829de5e440Sbellard /* XXX: we support only POSIX RT signals are used. */
483aa1f17c1Sths /* XXX: find a solution for 64 bit (additional malloced data is needed) */
target_to_host_siginfo(siginfo_t * info,const target_siginfo_t * tinfo)484c227f099SAnthony Liguori void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo)
48566fb9763Sbellard {
48690c0f080SPeter Maydell /* This conversion is used only for the rt_sigqueueinfo syscall,
48790c0f080SPeter Maydell * and so we know that the _rt fields are the valid ones.
48890c0f080SPeter Maydell */
48990c0f080SPeter Maydell abi_ulong sival_ptr;
49090c0f080SPeter Maydell
49190c0f080SPeter Maydell __get_user(info->si_signo, &tinfo->si_signo);
49290c0f080SPeter Maydell __get_user(info->si_errno, &tinfo->si_errno);
49390c0f080SPeter Maydell __get_user(info->si_code, &tinfo->si_code);
49490c0f080SPeter Maydell __get_user(info->si_pid, &tinfo->_sifields._rt._pid);
49590c0f080SPeter Maydell __get_user(info->si_uid, &tinfo->_sifields._rt._uid);
49690c0f080SPeter Maydell __get_user(sival_ptr, &tinfo->_sifields._rt._sigval.sival_ptr);
49790c0f080SPeter Maydell info->si_value.sival_ptr = (void *)(long)sival_ptr;
49866fb9763Sbellard }
49966fb9763Sbellard
500edf8e2afSMika Westerberg /* returns 1 if given signal should dump core if not handled */
core_dump_signal(int sig)501edf8e2afSMika Westerberg static int core_dump_signal(int sig)
502edf8e2afSMika Westerberg {
503edf8e2afSMika Westerberg switch (sig) {
504edf8e2afSMika Westerberg case TARGET_SIGABRT:
505edf8e2afSMika Westerberg case TARGET_SIGFPE:
506edf8e2afSMika Westerberg case TARGET_SIGILL:
507edf8e2afSMika Westerberg case TARGET_SIGQUIT:
508edf8e2afSMika Westerberg case TARGET_SIGSEGV:
509edf8e2afSMika Westerberg case TARGET_SIGTRAP:
510edf8e2afSMika Westerberg case TARGET_SIGBUS:
511edf8e2afSMika Westerberg return (1);
512edf8e2afSMika Westerberg default:
513edf8e2afSMika Westerberg return (0);
514edf8e2afSMika Westerberg }
515edf8e2afSMika Westerberg }
516edf8e2afSMika Westerberg
signal_table_init(const char * rtsig_map)517*c107521eSIlya Leoshkevich static void signal_table_init(const char *rtsig_map)
518365510fbSLaurent Vivier {
519b60b91aaSRichard Henderson int hsig, tsig, count;
520365510fbSLaurent Vivier
521*c107521eSIlya Leoshkevich if (rtsig_map) {
522365510fbSLaurent Vivier /*
523*c107521eSIlya Leoshkevich * Map host RT signals to target RT signals according to the
524*c107521eSIlya Leoshkevich * user-provided specification.
525*c107521eSIlya Leoshkevich */
526*c107521eSIlya Leoshkevich const char *s = rtsig_map;
527*c107521eSIlya Leoshkevich
528*c107521eSIlya Leoshkevich while (true) {
529*c107521eSIlya Leoshkevich int i;
530*c107521eSIlya Leoshkevich
531*c107521eSIlya Leoshkevich if (qemu_strtoi(s, &s, 10, &tsig) || *s++ != ' ') {
532*c107521eSIlya Leoshkevich fprintf(stderr, "Malformed target signal in QEMU_RTSIG_MAP\n");
533*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
534*c107521eSIlya Leoshkevich }
535*c107521eSIlya Leoshkevich if (qemu_strtoi(s, &s, 10, &hsig) || *s++ != ' ') {
536*c107521eSIlya Leoshkevich fprintf(stderr, "Malformed host signal in QEMU_RTSIG_MAP\n");
537*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
538*c107521eSIlya Leoshkevich }
539*c107521eSIlya Leoshkevich if (qemu_strtoi(s, &s, 10, &count) || (*s && *s != ',')) {
540*c107521eSIlya Leoshkevich fprintf(stderr, "Malformed signal count in QEMU_RTSIG_MAP\n");
541*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
542*c107521eSIlya Leoshkevich }
543*c107521eSIlya Leoshkevich
544*c107521eSIlya Leoshkevich for (i = 0; i < count; i++, tsig++, hsig++) {
545*c107521eSIlya Leoshkevich if (tsig < TARGET_SIGRTMIN || tsig > TARGET_NSIG) {
546*c107521eSIlya Leoshkevich fprintf(stderr, "%d is not a target rt signal\n", tsig);
547*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
548*c107521eSIlya Leoshkevich }
549*c107521eSIlya Leoshkevich if (hsig < SIGRTMIN || hsig > SIGRTMAX) {
550*c107521eSIlya Leoshkevich fprintf(stderr, "%d is not a host rt signal\n", hsig);
551*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
552*c107521eSIlya Leoshkevich }
553*c107521eSIlya Leoshkevich if (host_to_target_signal_table[hsig]) {
554*c107521eSIlya Leoshkevich fprintf(stderr, "%d already maps %d\n",
555*c107521eSIlya Leoshkevich hsig, host_to_target_signal_table[hsig]);
556*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
557*c107521eSIlya Leoshkevich }
558*c107521eSIlya Leoshkevich host_to_target_signal_table[hsig] = tsig;
559*c107521eSIlya Leoshkevich }
560*c107521eSIlya Leoshkevich
561*c107521eSIlya Leoshkevich if (*s) {
562*c107521eSIlya Leoshkevich s++;
563*c107521eSIlya Leoshkevich } else {
564*c107521eSIlya Leoshkevich break;
565*c107521eSIlya Leoshkevich }
566*c107521eSIlya Leoshkevich }
567*c107521eSIlya Leoshkevich } else {
568*c107521eSIlya Leoshkevich /*
569*c107521eSIlya Leoshkevich * Default host-to-target RT signal mapping.
570*c107521eSIlya Leoshkevich *
5716bc024e7SLaurent Vivier * Signals are supported starting from TARGET_SIGRTMIN and going up
572b60b91aaSRichard Henderson * until we run out of host realtime signals. Glibc uses the lower 2
573b60b91aaSRichard Henderson * RT signals and (hopefully) nobody uses the upper ones.
574b60b91aaSRichard Henderson * This is why SIGRTMIN (34) is generally greater than __SIGRTMIN (32).
575b60b91aaSRichard Henderson * To fix this properly we would need to do manual signal delivery
576b60b91aaSRichard Henderson * multiplexed over a single host signal.
5776bc024e7SLaurent Vivier * Attempts for configure "missing" signals via sigaction will be
5786bc024e7SLaurent Vivier * silently ignored.
57938ee0a7dSRichard Henderson *
580*c107521eSIlya Leoshkevich * Reserve one signal for internal usage (see below).
581*c107521eSIlya Leoshkevich */
582*c107521eSIlya Leoshkevich
583*c107521eSIlya Leoshkevich hsig = SIGRTMIN + 1;
584*c107521eSIlya Leoshkevich for (tsig = TARGET_SIGRTMIN;
585*c107521eSIlya Leoshkevich hsig <= SIGRTMAX && tsig <= TARGET_NSIG;
586*c107521eSIlya Leoshkevich hsig++, tsig++) {
587*c107521eSIlya Leoshkevich host_to_target_signal_table[hsig] = tsig;
588*c107521eSIlya Leoshkevich }
589*c107521eSIlya Leoshkevich }
590*c107521eSIlya Leoshkevich
591*c107521eSIlya Leoshkevich /*
59238ee0a7dSRichard Henderson * Remap the target SIGABRT, so that we can distinguish host abort
59338ee0a7dSRichard Henderson * from guest abort. When the guest registers a signal handler or
59438ee0a7dSRichard Henderson * calls raise(SIGABRT), the host will raise SIG_RTn. If the guest
59538ee0a7dSRichard Henderson * arrives at dump_core_and_abort(), we will map back to host SIGABRT
59638ee0a7dSRichard Henderson * so that the parent (native or emulated) sees the correct signal.
59738ee0a7dSRichard Henderson * Finally, also map host to guest SIGABRT so that the emulated
59838ee0a7dSRichard Henderson * parent sees the correct mapping from wait status.
599365510fbSLaurent Vivier */
60038ee0a7dSRichard Henderson
60138ee0a7dSRichard Henderson host_to_target_signal_table[SIGABRT] = 0;
602*c107521eSIlya Leoshkevich for (hsig = SIGRTMIN; hsig <= SIGRTMAX; hsig++) {
603*c107521eSIlya Leoshkevich if (!host_to_target_signal_table[hsig]) {
604*c107521eSIlya Leoshkevich host_to_target_signal_table[hsig] = TARGET_SIGABRT;
605*c107521eSIlya Leoshkevich break;
606*c107521eSIlya Leoshkevich }
607*c107521eSIlya Leoshkevich }
608*c107521eSIlya Leoshkevich if (hsig > SIGRTMAX) {
609*c107521eSIlya Leoshkevich fprintf(stderr, "No rt signals left for SIGABRT mapping\n");
610*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
6116bc024e7SLaurent Vivier }
612365510fbSLaurent Vivier
613b60b91aaSRichard Henderson /* Invert the mapping that has already been assigned. */
614b60b91aaSRichard Henderson for (hsig = 1; hsig < _NSIG; hsig++) {
615b60b91aaSRichard Henderson tsig = host_to_target_signal_table[hsig];
616b60b91aaSRichard Henderson if (tsig) {
617*c107521eSIlya Leoshkevich if (target_to_host_signal_table[tsig]) {
618*c107521eSIlya Leoshkevich fprintf(stderr, "%d is already mapped to %d\n",
619*c107521eSIlya Leoshkevich tsig, target_to_host_signal_table[tsig]);
620*c107521eSIlya Leoshkevich exit(EXIT_FAILURE);
621*c107521eSIlya Leoshkevich }
622b60b91aaSRichard Henderson target_to_host_signal_table[tsig] = hsig;
623365510fbSLaurent Vivier }
624365510fbSLaurent Vivier }
6256bc024e7SLaurent Vivier
62638ee0a7dSRichard Henderson host_to_target_signal_table[SIGABRT] = TARGET_SIGABRT;
62738ee0a7dSRichard Henderson
628b60b91aaSRichard Henderson /* Map everything else out-of-bounds. */
629b60b91aaSRichard Henderson for (hsig = 1; hsig < _NSIG; hsig++) {
630b60b91aaSRichard Henderson if (host_to_target_signal_table[hsig] == 0) {
631b60b91aaSRichard Henderson host_to_target_signal_table[hsig] = TARGET_NSIG + 1;
632b60b91aaSRichard Henderson }
633b60b91aaSRichard Henderson }
634b60b91aaSRichard Henderson for (count = 0, tsig = 1; tsig <= TARGET_NSIG; tsig++) {
635b60b91aaSRichard Henderson if (target_to_host_signal_table[tsig] == 0) {
636b60b91aaSRichard Henderson target_to_host_signal_table[tsig] = _NSIG;
6376bc024e7SLaurent Vivier count++;
6386bc024e7SLaurent Vivier }
6396bc024e7SLaurent Vivier }
640b60b91aaSRichard Henderson
6416bc024e7SLaurent Vivier trace_signal_table_init(count);
6426bc024e7SLaurent Vivier }
643365510fbSLaurent Vivier
signal_init(const char * rtsig_map)644*c107521eSIlya Leoshkevich void signal_init(const char *rtsig_map)
64531e31b8aSbellard {
646e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
64758c4e36cSRichard Henderson struct sigaction act, oact;
6489e5f5284Sbellard
649365510fbSLaurent Vivier /* initialize signal conversion tables */
650*c107521eSIlya Leoshkevich signal_table_init(rtsig_map);
65131e31b8aSbellard
6523d3efba0SPeter Maydell /* Set the signal mask from the host mask. */
6533d3efba0SPeter Maydell sigprocmask(0, 0, &ts->signal_mask);
6543d3efba0SPeter Maydell
6559de5e440Sbellard sigfillset(&act.sa_mask);
65631e31b8aSbellard act.sa_flags = SA_SIGINFO;
65731e31b8aSbellard act.sa_sigaction = host_signal_handler;
65858c4e36cSRichard Henderson
65958c4e36cSRichard Henderson /*
66058c4e36cSRichard Henderson * A parent process may configure ignored signals, but all other
66158c4e36cSRichard Henderson * signals are default. For any target signals that have no host
66258c4e36cSRichard Henderson * mapping, set to ignore. For all core_dump_signal, install our
66358c4e36cSRichard Henderson * host signal handler so that we may invoke dump_core_and_abort.
66458c4e36cSRichard Henderson * This includes SIGSEGV and SIGBUS, which are also need our signal
66558c4e36cSRichard Henderson * handler for paging and exceptions.
66658c4e36cSRichard Henderson */
66758c4e36cSRichard Henderson for (int tsig = 1; tsig <= TARGET_NSIG; tsig++) {
66858c4e36cSRichard Henderson int hsig = target_to_host_signal(tsig);
66958c4e36cSRichard Henderson abi_ptr thand = TARGET_SIG_IGN;
67058c4e36cSRichard Henderson
67138ee0a7dSRichard Henderson if (hsig >= _NSIG) {
67238ee0a7dSRichard Henderson continue;
67338ee0a7dSRichard Henderson }
67458c4e36cSRichard Henderson
67538ee0a7dSRichard Henderson /* As we force remap SIGABRT, cannot probe and install in one step. */
67638ee0a7dSRichard Henderson if (tsig == TARGET_SIGABRT) {
67738ee0a7dSRichard Henderson sigaction(SIGABRT, NULL, &oact);
67838ee0a7dSRichard Henderson sigaction(hsig, &act, NULL);
67938ee0a7dSRichard Henderson } else {
68038ee0a7dSRichard Henderson struct sigaction *iact = core_dump_signal(tsig) ? &act : NULL;
68158c4e36cSRichard Henderson sigaction(hsig, iact, &oact);
68238ee0a7dSRichard Henderson }
68338ee0a7dSRichard Henderson
68458c4e36cSRichard Henderson if (oact.sa_sigaction != (void *)SIG_IGN) {
68558c4e36cSRichard Henderson thand = TARGET_SIG_DFL;
68631e31b8aSbellard }
68758c4e36cSRichard Henderson sigact_table[tsig - 1]._sa_handler = thand;
688624f7979Spbrook }
689dbde2c0cSRichard Henderson }
69031e31b8aSbellard
691c599d4d6SPeter Maydell /* Force a synchronously taken signal. The kernel force_sig() function
692c599d4d6SPeter Maydell * also forces the signal to "not blocked, not ignored", but for QEMU
693c599d4d6SPeter Maydell * that work is done in process_pending_signals().
694c599d4d6SPeter Maydell */
force_sig(int sig)695befb7447SLaurent Vivier void force_sig(int sig)
696c599d4d6SPeter Maydell {
697c599d4d6SPeter Maydell CPUState *cpu = thread_cpu;
698819121b9SPeter Maydell target_siginfo_t info = {};
699c599d4d6SPeter Maydell
700c599d4d6SPeter Maydell info.si_signo = sig;
701c599d4d6SPeter Maydell info.si_errno = 0;
702c599d4d6SPeter Maydell info.si_code = TARGET_SI_KERNEL;
703c599d4d6SPeter Maydell info._sifields._kill._pid = 0;
704c599d4d6SPeter Maydell info._sifields._kill._uid = 0;
70542e62aadSPhilippe Mathieu-Daudé queue_signal(cpu_env(cpu), info.si_signo, QEMU_SI_KILL, &info);
706c599d4d6SPeter Maydell }
70709391669SPeter Maydell
708af796960SPeter Maydell /*
709af796960SPeter Maydell * Force a synchronously taken QEMU_SI_FAULT signal. For QEMU the
710af796960SPeter Maydell * 'force' part is handled in process_pending_signals().
711af796960SPeter Maydell */
force_sig_fault(int sig,int code,abi_ulong addr)712af796960SPeter Maydell void force_sig_fault(int sig, int code, abi_ulong addr)
713af796960SPeter Maydell {
714af796960SPeter Maydell CPUState *cpu = thread_cpu;
715af796960SPeter Maydell target_siginfo_t info = {};
716af796960SPeter Maydell
717af796960SPeter Maydell info.si_signo = sig;
718af796960SPeter Maydell info.si_errno = 0;
719af796960SPeter Maydell info.si_code = code;
720af796960SPeter Maydell info._sifields._sigfault._addr = addr;
72142e62aadSPhilippe Mathieu-Daudé queue_signal(cpu_env(cpu), sig, QEMU_SI_FAULT, &info);
722af796960SPeter Maydell }
723af796960SPeter Maydell
72409391669SPeter Maydell /* Force a SIGSEGV if we couldn't write to memory trying to set
72509391669SPeter Maydell * up the signal frame. oldsig is the signal we were trying to handle
72609391669SPeter Maydell * at the point of failure.
72709391669SPeter Maydell */
72847ae93cdSMichael Clark #if !defined(TARGET_RISCV)
force_sigsegv(int oldsig)729befb7447SLaurent Vivier void force_sigsegv(int oldsig)
73009391669SPeter Maydell {
73109391669SPeter Maydell if (oldsig == SIGSEGV) {
73209391669SPeter Maydell /* Make sure we don't try to deliver the signal again; this will
733c599d4d6SPeter Maydell * end up with handle_pending_signal() calling dump_core_and_abort().
73409391669SPeter Maydell */
73509391669SPeter Maydell sigact_table[oldsig - 1]._sa_handler = TARGET_SIG_DFL;
73609391669SPeter Maydell }
737c4b35744SPeter Maydell force_sig(TARGET_SIGSEGV);
73809391669SPeter Maydell }
73947ae93cdSMichael Clark #endif
74047ae93cdSMichael Clark
cpu_loop_exit_sigsegv(CPUState * cpu,target_ulong addr,MMUAccessType access_type,bool maperr,uintptr_t ra)74172d2bbf9SRichard Henderson void cpu_loop_exit_sigsegv(CPUState *cpu, target_ulong addr,
74272d2bbf9SRichard Henderson MMUAccessType access_type, bool maperr, uintptr_t ra)
74372d2bbf9SRichard Henderson {
7441764ad70SRichard Henderson const TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
74572d2bbf9SRichard Henderson
74672d2bbf9SRichard Henderson if (tcg_ops->record_sigsegv) {
74772d2bbf9SRichard Henderson tcg_ops->record_sigsegv(cpu, addr, access_type, maperr, ra);
74872d2bbf9SRichard Henderson }
74972d2bbf9SRichard Henderson
75072d2bbf9SRichard Henderson force_sig_fault(TARGET_SIGSEGV,
75172d2bbf9SRichard Henderson maperr ? TARGET_SEGV_MAPERR : TARGET_SEGV_ACCERR,
75272d2bbf9SRichard Henderson addr);
75372d2bbf9SRichard Henderson cpu->exception_index = EXCP_INTERRUPT;
75472d2bbf9SRichard Henderson cpu_loop_exit_restore(cpu, ra);
75572d2bbf9SRichard Henderson }
75672d2bbf9SRichard Henderson
cpu_loop_exit_sigbus(CPUState * cpu,target_ulong addr,MMUAccessType access_type,uintptr_t ra)75712ed5640SRichard Henderson void cpu_loop_exit_sigbus(CPUState *cpu, target_ulong addr,
75812ed5640SRichard Henderson MMUAccessType access_type, uintptr_t ra)
75912ed5640SRichard Henderson {
7601764ad70SRichard Henderson const TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
76112ed5640SRichard Henderson
76212ed5640SRichard Henderson if (tcg_ops->record_sigbus) {
76312ed5640SRichard Henderson tcg_ops->record_sigbus(cpu, addr, access_type, ra);
76412ed5640SRichard Henderson }
76512ed5640SRichard Henderson
76612ed5640SRichard Henderson force_sig_fault(TARGET_SIGBUS, TARGET_BUS_ADRALN, addr);
76712ed5640SRichard Henderson cpu->exception_index = EXCP_INTERRUPT;
76812ed5640SRichard Henderson cpu_loop_exit_restore(cpu, ra);
76912ed5640SRichard Henderson }
77012ed5640SRichard Henderson
7719de5e440Sbellard /* abort execution with signal */
7728905770bSMarc-André Lureau static G_NORETURN
die_with_signal(int host_sig)773b8b50f1eSRichard Henderson void die_with_signal(int host_sig)
774b8b50f1eSRichard Henderson {
775b8b50f1eSRichard Henderson struct sigaction act = {
776b8b50f1eSRichard Henderson .sa_handler = SIG_DFL,
777b8b50f1eSRichard Henderson };
778b8b50f1eSRichard Henderson
779b8b50f1eSRichard Henderson /*
780b8b50f1eSRichard Henderson * The proper exit code for dying from an uncaught signal is -<signal>.
781b8b50f1eSRichard Henderson * The kernel doesn't allow exit() or _exit() to pass a negative value.
782b8b50f1eSRichard Henderson * To get the proper exit code we need to actually die from an uncaught
783b8b50f1eSRichard Henderson * signal. Here the default signal handler is installed, we send
784b8b50f1eSRichard Henderson * the signal and we wait for it to arrive.
785b8b50f1eSRichard Henderson */
786b8b50f1eSRichard Henderson sigfillset(&act.sa_mask);
787b8b50f1eSRichard Henderson sigaction(host_sig, &act, NULL);
788b8b50f1eSRichard Henderson
789b8b50f1eSRichard Henderson kill(getpid(), host_sig);
790b8b50f1eSRichard Henderson
791b8b50f1eSRichard Henderson /* Make sure the signal isn't masked (reusing the mask inside of act). */
792b8b50f1eSRichard Henderson sigdelset(&act.sa_mask, host_sig);
793b8b50f1eSRichard Henderson sigsuspend(&act.sa_mask);
794b8b50f1eSRichard Henderson
795b8b50f1eSRichard Henderson /* unreachable */
796ee72c47eSRichard Henderson _exit(EXIT_FAILURE);
797b8b50f1eSRichard Henderson }
798b8b50f1eSRichard Henderson
799b8b50f1eSRichard Henderson static G_NORETURN
dump_core_and_abort(CPUArchState * env,int target_sig)800b77af26eSRichard Henderson void dump_core_and_abort(CPUArchState *env, int target_sig)
80166fb9763Sbellard {
802b77af26eSRichard Henderson CPUState *cpu = env_cpu(env);
803e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(cpu);
804edf8e2afSMika Westerberg int host_sig, core_dumped = 0;
805c8ee0a44SPaolo Bonzini
80638ee0a7dSRichard Henderson /* On exit, undo the remapping of SIGABRT. */
80738ee0a7dSRichard Henderson if (target_sig == TARGET_SIGABRT) {
80838ee0a7dSRichard Henderson host_sig = SIGABRT;
80938ee0a7dSRichard Henderson } else {
81066393fb9SRiku Voipio host_sig = target_to_host_signal(target_sig);
81138ee0a7dSRichard Henderson }
812b5f95366SPeter Maydell trace_user_dump_core_and_abort(env, target_sig, host_sig);
813a2247f8eSAndreas Färber gdb_signalled(env, target_sig);
814603e4fd7Saurel32
815edf8e2afSMika Westerberg /* dump core if supported by target binary format */
81666393fb9SRiku Voipio if (core_dump_signal(target_sig) && (ts->bprm->core_dump != NULL)) {
817edf8e2afSMika Westerberg stop_all_tasks();
818edf8e2afSMika Westerberg core_dumped =
819a2247f8eSAndreas Färber ((*ts->bprm->core_dump)(target_sig, env) == 0);
820edf8e2afSMika Westerberg }
821edf8e2afSMika Westerberg if (core_dumped) {
822edf8e2afSMika Westerberg /* we already dumped the core of target process, we don't want
823edf8e2afSMika Westerberg * a coredump of qemu itself */
824edf8e2afSMika Westerberg struct rlimit nodump;
825edf8e2afSMika Westerberg getrlimit(RLIMIT_CORE, &nodump);
826edf8e2afSMika Westerberg nodump.rlim_cur=0;
827edf8e2afSMika Westerberg setrlimit(RLIMIT_CORE, &nodump);
828edf8e2afSMika Westerberg (void) fprintf(stderr, "qemu: uncaught target signal %d (%s) - %s\n",
82966393fb9SRiku Voipio target_sig, strsignal(host_sig), "core dumped" );
830edf8e2afSMika Westerberg }
831edf8e2afSMika Westerberg
832b77af26eSRichard Henderson preexit_cleanup(env, 128 + target_sig);
833b8b50f1eSRichard Henderson die_with_signal(host_sig);
8349de5e440Sbellard }
83566fb9763Sbellard
8369de5e440Sbellard /* queue a signal so that it will be send to the virtual CPU as soon
8379de5e440Sbellard as possible */
queue_signal(CPUArchState * env,int sig,int si_type,target_siginfo_t * info)838337e88d8SPeter Maydell void queue_signal(CPUArchState *env, int sig, int si_type,
8399d2803f7SPeter Maydell target_siginfo_t *info)
8409de5e440Sbellard {
84129a0af61SRichard Henderson CPUState *cpu = env_cpu(env);
842e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(cpu);
8439de5e440Sbellard
844c8ee0a44SPaolo Bonzini trace_user_queue_signal(env, sig);
845a7ec0f98SPeter Maydell
8469d2803f7SPeter Maydell info->si_code = deposit32(info->si_code, 16, 16, si_type);
847a70dadc7SPeter Maydell
848655ed67cSTimothy E Baldwin ts->sync_signal.info = *info;
849655ed67cSTimothy E Baldwin ts->sync_signal.pending = sig;
85066fb9763Sbellard /* signal that a new signal is pending */
851d73415a3SStefan Hajnoczi qatomic_set(&ts->signal_pending, 1);
8529de5e440Sbellard }
85366fb9763Sbellard
85407637888SWarner Losh
85507637888SWarner Losh /* Adjust the signal context to rewind out of safe-syscall if we're in it */
rewind_if_in_safe_syscall(void * puc)8564d330ceeSTimothy E Baldwin static inline void rewind_if_in_safe_syscall(void *puc)
8574d330ceeSTimothy E Baldwin {
8589940799bSRichard Henderson host_sigcontext *uc = (host_sigcontext *)puc;
85907637888SWarner Losh uintptr_t pcreg = host_signal_pc(uc);
86007637888SWarner Losh
86107637888SWarner Losh if (pcreg > (uintptr_t)safe_syscall_start
86207637888SWarner Losh && pcreg < (uintptr_t)safe_syscall_end) {
86307637888SWarner Losh host_signal_set_pc(uc, (uintptr_t)safe_syscall_start);
8644d330ceeSTimothy E Baldwin }
86507637888SWarner Losh }
8664d330ceeSTimothy E Baldwin
8677dfd3ca8SHelge Deller static G_NORETURN
die_from_signal(siginfo_t * info)8687dfd3ca8SHelge Deller void die_from_signal(siginfo_t *info)
8697dfd3ca8SHelge Deller {
8707dfd3ca8SHelge Deller char sigbuf[4], codebuf[12];
8717dfd3ca8SHelge Deller const char *sig, *code = NULL;
8727dfd3ca8SHelge Deller
8737dfd3ca8SHelge Deller switch (info->si_signo) {
8747dfd3ca8SHelge Deller case SIGSEGV:
8757dfd3ca8SHelge Deller sig = "SEGV";
8767dfd3ca8SHelge Deller switch (info->si_code) {
8777dfd3ca8SHelge Deller case SEGV_MAPERR:
8787dfd3ca8SHelge Deller code = "MAPERR";
8797dfd3ca8SHelge Deller break;
8807dfd3ca8SHelge Deller case SEGV_ACCERR:
8817dfd3ca8SHelge Deller code = "ACCERR";
8827dfd3ca8SHelge Deller break;
8837dfd3ca8SHelge Deller }
8847dfd3ca8SHelge Deller break;
8857dfd3ca8SHelge Deller case SIGBUS:
8867dfd3ca8SHelge Deller sig = "BUS";
8877dfd3ca8SHelge Deller switch (info->si_code) {
8887dfd3ca8SHelge Deller case BUS_ADRALN:
8897dfd3ca8SHelge Deller code = "ADRALN";
8907dfd3ca8SHelge Deller break;
8917dfd3ca8SHelge Deller case BUS_ADRERR:
8927dfd3ca8SHelge Deller code = "ADRERR";
8937dfd3ca8SHelge Deller break;
8947dfd3ca8SHelge Deller }
8957dfd3ca8SHelge Deller break;
8964a6ebc19SRichard Henderson case SIGILL:
8974a6ebc19SRichard Henderson sig = "ILL";
8984a6ebc19SRichard Henderson switch (info->si_code) {
8994a6ebc19SRichard Henderson case ILL_ILLOPC:
9004a6ebc19SRichard Henderson code = "ILLOPC";
9014a6ebc19SRichard Henderson break;
9024a6ebc19SRichard Henderson case ILL_ILLOPN:
9034a6ebc19SRichard Henderson code = "ILLOPN";
9044a6ebc19SRichard Henderson break;
9054a6ebc19SRichard Henderson case ILL_ILLADR:
9064a6ebc19SRichard Henderson code = "ILLADR";
9074a6ebc19SRichard Henderson break;
9084a6ebc19SRichard Henderson case ILL_PRVOPC:
9094a6ebc19SRichard Henderson code = "PRVOPC";
9104a6ebc19SRichard Henderson break;
9114a6ebc19SRichard Henderson case ILL_PRVREG:
9124a6ebc19SRichard Henderson code = "PRVREG";
9134a6ebc19SRichard Henderson break;
9144a6ebc19SRichard Henderson case ILL_COPROC:
9154a6ebc19SRichard Henderson code = "COPROC";
9164a6ebc19SRichard Henderson break;
9174a6ebc19SRichard Henderson }
9184a6ebc19SRichard Henderson break;
9194a6ebc19SRichard Henderson case SIGFPE:
9204a6ebc19SRichard Henderson sig = "FPE";
9214a6ebc19SRichard Henderson switch (info->si_code) {
9224a6ebc19SRichard Henderson case FPE_INTDIV:
9234a6ebc19SRichard Henderson code = "INTDIV";
9244a6ebc19SRichard Henderson break;
9254a6ebc19SRichard Henderson case FPE_INTOVF:
9264a6ebc19SRichard Henderson code = "INTOVF";
9274a6ebc19SRichard Henderson break;
9284a6ebc19SRichard Henderson }
9294a6ebc19SRichard Henderson break;
9304a6ebc19SRichard Henderson case SIGTRAP:
9314a6ebc19SRichard Henderson sig = "TRAP";
9324a6ebc19SRichard Henderson break;
9337dfd3ca8SHelge Deller default:
9347dfd3ca8SHelge Deller snprintf(sigbuf, sizeof(sigbuf), "%d", info->si_signo);
9357dfd3ca8SHelge Deller sig = sigbuf;
9367dfd3ca8SHelge Deller break;
9377dfd3ca8SHelge Deller }
9387dfd3ca8SHelge Deller if (code == NULL) {
9397dfd3ca8SHelge Deller snprintf(codebuf, sizeof(sigbuf), "%d", info->si_code);
9407dfd3ca8SHelge Deller code = codebuf;
9417dfd3ca8SHelge Deller }
9427dfd3ca8SHelge Deller
9437dfd3ca8SHelge Deller error_report("QEMU internal SIG%s {code=%s, addr=%p}",
9447dfd3ca8SHelge Deller sig, code, info->si_addr);
9457dfd3ca8SHelge Deller die_with_signal(info->si_signo);
9467dfd3ca8SHelge Deller }
9477dfd3ca8SHelge Deller
host_sigsegv_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)948f4e11681SRichard Henderson static void host_sigsegv_handler(CPUState *cpu, siginfo_t *info,
949f4e11681SRichard Henderson host_sigcontext *uc)
95031e31b8aSbellard {
951f4e11681SRichard Henderson uintptr_t host_addr = (uintptr_t)info->si_addr;
952e6037d04SRichard Henderson /*
953e6037d04SRichard Henderson * Convert forcefully to guest address space: addresses outside
954e6037d04SRichard Henderson * reserved_va are still valid to report via SEGV_MAPERR.
955e6037d04SRichard Henderson */
956f4e11681SRichard Henderson bool is_valid = h2g_valid(host_addr);
957f4e11681SRichard Henderson abi_ptr guest_addr = h2g_nocheck(host_addr);
958f4e11681SRichard Henderson uintptr_t pc = host_signal_pc(uc);
959f4e11681SRichard Henderson bool is_write = host_signal_write(info, uc);
960f4e11681SRichard Henderson MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
961f4e11681SRichard Henderson bool maperr;
962e6037d04SRichard Henderson
9637dfd3ca8SHelge Deller /* If this was a write to a TB protected page, restart. */
9647dfd3ca8SHelge Deller if (is_write
965f4e11681SRichard Henderson && is_valid
9667dfd3ca8SHelge Deller && info->si_code == SEGV_ACCERR
967f4e11681SRichard Henderson && handle_sigsegv_accerr_write(cpu, host_signal_mask(uc),
968f4e11681SRichard Henderson pc, guest_addr)) {
9697dfd3ca8SHelge Deller return;
9707dfd3ca8SHelge Deller }
9717dfd3ca8SHelge Deller
9727dfd3ca8SHelge Deller /*
9737dfd3ca8SHelge Deller * If the access was not on behalf of the guest, within the executable
9747dfd3ca8SHelge Deller * mapping of the generated code buffer, then it is a host bug.
9757dfd3ca8SHelge Deller */
9767dfd3ca8SHelge Deller if (access_type != MMU_INST_FETCH
9777dfd3ca8SHelge Deller && !in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
9787dfd3ca8SHelge Deller die_from_signal(info);
9797dfd3ca8SHelge Deller }
9807dfd3ca8SHelge Deller
981f4e11681SRichard Henderson maperr = true;
982f4e11681SRichard Henderson if (is_valid && info->si_code == SEGV_ACCERR) {
983e6037d04SRichard Henderson /*
984e6037d04SRichard Henderson * With reserved_va, the whole address space is PROT_NONE,
985e6037d04SRichard Henderson * which means that we may get ACCERR when we want MAPERR.
986e6037d04SRichard Henderson */
987e6037d04SRichard Henderson if (page_get_flags(guest_addr) & PAGE_VALID) {
98872d2bbf9SRichard Henderson maperr = false;
989e6037d04SRichard Henderson } else {
990e6037d04SRichard Henderson info->si_code = SEGV_MAPERR;
991e6037d04SRichard Henderson }
992e6037d04SRichard Henderson }
993e6037d04SRichard Henderson
994f4e11681SRichard Henderson sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
99572d2bbf9SRichard Henderson cpu_loop_exit_sigsegv(cpu, guest_addr, access_type, maperr, pc);
996f4e11681SRichard Henderson }
997f4e11681SRichard Henderson
host_sigbus_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)9986d913158SRobbin Ehn static uintptr_t host_sigbus_handler(CPUState *cpu, siginfo_t *info,
999f4e11681SRichard Henderson host_sigcontext *uc)
1000f4e11681SRichard Henderson {
1001f4e11681SRichard Henderson uintptr_t pc = host_signal_pc(uc);
1002f4e11681SRichard Henderson bool is_write = host_signal_write(info, uc);
1003f4e11681SRichard Henderson MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
1004f4e11681SRichard Henderson
1005f4e11681SRichard Henderson /*
1006f4e11681SRichard Henderson * If the access was not on behalf of the guest, within the executable
1007f4e11681SRichard Henderson * mapping of the generated code buffer, then it is a host bug.
1008f4e11681SRichard Henderson */
1009f4e11681SRichard Henderson if (!in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
1010f4e11681SRichard Henderson die_from_signal(info);
1011f4e11681SRichard Henderson }
1012f4e11681SRichard Henderson
1013742f0762SRichard Henderson if (info->si_code == BUS_ADRALN) {
1014f4e11681SRichard Henderson uintptr_t host_addr = (uintptr_t)info->si_addr;
1015f4e11681SRichard Henderson abi_ptr guest_addr = h2g_nocheck(host_addr);
1016f4e11681SRichard Henderson
1017f4e11681SRichard Henderson sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
1018742f0762SRichard Henderson cpu_loop_exit_sigbus(cpu, guest_addr, access_type, pc);
1019742f0762SRichard Henderson }
10206d913158SRobbin Ehn return pc;
1021e6037d04SRichard Henderson }
1022e6037d04SRichard Henderson
host_signal_handler(int host_sig,siginfo_t * info,void * puc)1023f4e11681SRichard Henderson static void host_signal_handler(int host_sig, siginfo_t *info, void *puc)
1024f4e11681SRichard Henderson {
1025f4e11681SRichard Henderson CPUState *cpu = thread_cpu;
1026f4e11681SRichard Henderson CPUArchState *env = cpu_env(cpu);
1027e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(cpu);
1028f4e11681SRichard Henderson target_siginfo_t tinfo;
1029f4e11681SRichard Henderson host_sigcontext *uc = puc;
1030f4e11681SRichard Henderson struct emulated_sigtable *k;
1031f4e11681SRichard Henderson int guest_sig;
1032f4e11681SRichard Henderson uintptr_t pc = 0;
1033f4e11681SRichard Henderson bool sync_sig = false;
1034f4e11681SRichard Henderson void *sigmask;
1035f4e11681SRichard Henderson
1036f4e11681SRichard Henderson /*
1037f4e11681SRichard Henderson * Non-spoofed SIGSEGV and SIGBUS are synchronous, and need special
10384a6ebc19SRichard Henderson * handling wrt signal blocking and unwinding. Non-spoofed SIGILL,
10394a6ebc19SRichard Henderson * SIGFPE, SIGTRAP are always host bugs.
1040f4e11681SRichard Henderson */
1041f4e11681SRichard Henderson if (info->si_code > 0) {
1042f4e11681SRichard Henderson switch (host_sig) {
1043f4e11681SRichard Henderson case SIGSEGV:
1044f4e11681SRichard Henderson /* Only returns on handle_sigsegv_accerr_write success. */
1045f4e11681SRichard Henderson host_sigsegv_handler(cpu, info, uc);
1046f4e11681SRichard Henderson return;
1047f4e11681SRichard Henderson case SIGBUS:
10486d913158SRobbin Ehn pc = host_sigbus_handler(cpu, info, uc);
1049e6037d04SRichard Henderson sync_sig = true;
1050f4e11681SRichard Henderson break;
10514a6ebc19SRichard Henderson case SIGILL:
10524a6ebc19SRichard Henderson case SIGFPE:
10534a6ebc19SRichard Henderson case SIGTRAP:
10544a6ebc19SRichard Henderson die_from_signal(info);
1055f4e11681SRichard Henderson }
1056e6037d04SRichard Henderson }
1057e6037d04SRichard Henderson
105831e31b8aSbellard /* get target signal number */
1059e6037d04SRichard Henderson guest_sig = host_to_target_signal(host_sig);
1060e6037d04SRichard Henderson if (guest_sig < 1 || guest_sig > TARGET_NSIG) {
106131e31b8aSbellard return;
1062e6037d04SRichard Henderson }
1063e6037d04SRichard Henderson trace_user_host_signal(env, host_sig, guest_sig);
1064e6037d04SRichard Henderson
1065e6037d04SRichard Henderson host_to_target_siginfo_noswap(&tinfo, info);
1066e6037d04SRichard Henderson k = &ts->sigtab[guest_sig - 1];
1067e6037d04SRichard Henderson k->info = tinfo;
1068e6037d04SRichard Henderson k->pending = guest_sig;
1069e6037d04SRichard Henderson ts->signal_pending = 1;
1070e6037d04SRichard Henderson
1071e6037d04SRichard Henderson /*
1072e6037d04SRichard Henderson * For synchronous signals, unwind the cpu state to the faulting
1073e6037d04SRichard Henderson * insn and then exit back to the main loop so that the signal
1074e6037d04SRichard Henderson * is delivered immediately.
1075e6037d04SRichard Henderson */
1076e6037d04SRichard Henderson if (sync_sig) {
1077e6037d04SRichard Henderson cpu->exception_index = EXCP_INTERRUPT;
1078e6037d04SRichard Henderson cpu_loop_exit_restore(cpu, pc);
1079e6037d04SRichard Henderson }
10804d330ceeSTimothy E Baldwin
10814d330ceeSTimothy E Baldwin rewind_if_in_safe_syscall(puc);
10824d330ceeSTimothy E Baldwin
1083e6037d04SRichard Henderson /*
1084e6037d04SRichard Henderson * Block host signals until target signal handler entered. We
10853d3efba0SPeter Maydell * can't block SIGSEGV or SIGBUS while we're executing guest
10863d3efba0SPeter Maydell * code in case the guest code provokes one in the window between
10873d3efba0SPeter Maydell * now and it getting out to the main loop. Signals will be
10883d3efba0SPeter Maydell * unblocked again in process_pending_signals().
10891d48fdd9SPeter Maydell *
1090c8c89a6aSRichard Henderson * WARNING: we cannot use sigfillset() here because the sigmask
10911d48fdd9SPeter Maydell * field is a kernel sigset_t, which is much smaller than the
10921d48fdd9SPeter Maydell * libc sigset_t which sigfillset() operates on. Using sigfillset()
10931d48fdd9SPeter Maydell * would write 0xff bytes off the end of the structure and trash
10941d48fdd9SPeter Maydell * data on the struct.
10953d3efba0SPeter Maydell */
1096f4e11681SRichard Henderson sigmask = host_signal_mask(uc);
1097c8c89a6aSRichard Henderson memset(sigmask, 0xff, SIGSET_T_SIZE);
1098c8c89a6aSRichard Henderson sigdelset(sigmask, SIGSEGV);
1099c8c89a6aSRichard Henderson sigdelset(sigmask, SIGBUS);
11003d3efba0SPeter Maydell
11019de5e440Sbellard /* interrupt the virtual CPU as soon as possible */
1102a2247f8eSAndreas Färber cpu_exit(thread_cpu);
110366fb9763Sbellard }
110431e31b8aSbellard
11050da46a6eSths /* do_sigaltstack() returns target values and errnos. */
1106579a97f7Sbellard /* compare linux/kernel/signal.c:do_sigaltstack() */
do_sigaltstack(abi_ulong uss_addr,abi_ulong uoss_addr,CPUArchState * env)11076b208755SRichard Henderson abi_long do_sigaltstack(abi_ulong uss_addr, abi_ulong uoss_addr,
11086b208755SRichard Henderson CPUArchState *env)
1109a04e134aSths {
111092bad948SRichard Henderson target_stack_t oss, *uoss = NULL;
111192bad948SRichard Henderson abi_long ret = -TARGET_EFAULT;
111292bad948SRichard Henderson
111392bad948SRichard Henderson if (uoss_addr) {
111492bad948SRichard Henderson /* Verify writability now, but do not alter user memory yet. */
111592bad948SRichard Henderson if (!lock_user_struct(VERIFY_WRITE, uoss, uoss_addr, 0)) {
111692bad948SRichard Henderson goto out;
111792bad948SRichard Henderson }
11186b208755SRichard Henderson target_save_altstack(&oss, env);
1119a04e134aSths }
1120a04e134aSths
112192bad948SRichard Henderson if (uss_addr) {
112292bad948SRichard Henderson target_stack_t *uss;
11230903c8beSTom Musta
11249eeb8306SRiku Voipio if (!lock_user_struct(VERIFY_READ, uss, uss_addr, 1)) {
1125a04e134aSths goto out;
11269eeb8306SRiku Voipio }
1127ddc3e74dSRichard Henderson ret = target_restore_altstack(uss, env);
112892bad948SRichard Henderson if (ret) {
1129a04e134aSths goto out;
1130a04e134aSths }
11310903c8beSTom Musta }
1132a04e134aSths
1133579a97f7Sbellard if (uoss_addr) {
113492bad948SRichard Henderson memcpy(uoss, &oss, sizeof(oss));
113592bad948SRichard Henderson unlock_user_struct(uoss, uoss_addr, 1);
113692bad948SRichard Henderson uoss = NULL;
1137a04e134aSths }
1138a04e134aSths ret = 0;
113992bad948SRichard Henderson
1140a04e134aSths out:
114192bad948SRichard Henderson if (uoss) {
114292bad948SRichard Henderson unlock_user_struct(uoss, uoss_addr, 0);
114392bad948SRichard Henderson }
1144a04e134aSths return ret;
1145a04e134aSths }
1146a04e134aSths
1147ef6a778eSTimothy E Baldwin /* do_sigaction() return target values and host errnos */
do_sigaction(int sig,const struct target_sigaction * act,struct target_sigaction * oact,abi_ulong ka_restorer)114866fb9763Sbellard int do_sigaction(int sig, const struct target_sigaction *act,
114902fb28e8SRichard Henderson struct target_sigaction *oact, abi_ulong ka_restorer)
115031e31b8aSbellard {
1151624f7979Spbrook struct target_sigaction *k;
1152773b93eeSbellard int host_sig;
11530da46a6eSths int ret = 0;
115431e31b8aSbellard
11556bc024e7SLaurent Vivier trace_signal_do_sigaction_guest(sig, TARGET_NSIG);
11566bc024e7SLaurent Vivier
1157ee3500d3SIlya Leoshkevich if (sig < 1 || sig > TARGET_NSIG) {
1158ee3500d3SIlya Leoshkevich return -TARGET_EINVAL;
1159ee3500d3SIlya Leoshkevich }
1160ee3500d3SIlya Leoshkevich
1161ee3500d3SIlya Leoshkevich if (act && (sig == TARGET_SIGKILL || sig == TARGET_SIGSTOP)) {
1162ef6a778eSTimothy E Baldwin return -TARGET_EINVAL;
1163ef6a778eSTimothy E Baldwin }
1164ef6a778eSTimothy E Baldwin
1165ef6a778eSTimothy E Baldwin if (block_signals()) {
1166af254a27SRichard Henderson return -QEMU_ERESTARTSYS;
1167ef6a778eSTimothy E Baldwin }
1168ef6a778eSTimothy E Baldwin
116966fb9763Sbellard k = &sigact_table[sig - 1];
117066fb9763Sbellard if (oact) {
1171d2565875SRichard Henderson __put_user(k->_sa_handler, &oact->_sa_handler);
1172d2565875SRichard Henderson __put_user(k->sa_flags, &oact->sa_flags);
11737f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1174d2565875SRichard Henderson __put_user(k->sa_restorer, &oact->sa_restorer);
1175106ec879Sbellard #endif
1176d2565875SRichard Henderson /* Not swapped. */
1177624f7979Spbrook oact->sa_mask = k->sa_mask;
117866fb9763Sbellard }
117966fb9763Sbellard if (act) {
1180d2565875SRichard Henderson __get_user(k->_sa_handler, &act->_sa_handler);
1181d2565875SRichard Henderson __get_user(k->sa_flags, &act->sa_flags);
11827f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1183d2565875SRichard Henderson __get_user(k->sa_restorer, &act->sa_restorer);
1184106ec879Sbellard #endif
118502fb28e8SRichard Henderson #ifdef TARGET_ARCH_HAS_KA_RESTORER
118602fb28e8SRichard Henderson k->ka_restorer = ka_restorer;
118702fb28e8SRichard Henderson #endif
1188d2565875SRichard Henderson /* To be swapped in target_to_host_sigset. */
1189624f7979Spbrook k->sa_mask = act->sa_mask;
1190773b93eeSbellard
1191773b93eeSbellard /* we update the host linux signal state */
1192773b93eeSbellard host_sig = target_to_host_signal(sig);
11936bc024e7SLaurent Vivier trace_signal_do_sigaction_host(host_sig, TARGET_NSIG);
11946bc024e7SLaurent Vivier if (host_sig > SIGRTMAX) {
11956bc024e7SLaurent Vivier /* we don't have enough host signals to map all target signals */
11966bc024e7SLaurent Vivier qemu_log_mask(LOG_UNIMP, "Unsupported target signal #%d, ignored\n",
11976bc024e7SLaurent Vivier sig);
11986bc024e7SLaurent Vivier /*
11996bc024e7SLaurent Vivier * we don't return an error here because some programs try to
12006bc024e7SLaurent Vivier * register an handler for all possible rt signals even if they
12016bc024e7SLaurent Vivier * don't need it.
12026bc024e7SLaurent Vivier * An error here can abort them whereas there can be no problem
12036bc024e7SLaurent Vivier * to not have the signal available later.
12046bc024e7SLaurent Vivier * This is the case for golang,
12056bc024e7SLaurent Vivier * See https://github.com/golang/go/issues/33746
12066bc024e7SLaurent Vivier * So we silently ignore the error.
12076bc024e7SLaurent Vivier */
12086bc024e7SLaurent Vivier return 0;
12096bc024e7SLaurent Vivier }
1210773b93eeSbellard if (host_sig != SIGSEGV && host_sig != SIGBUS) {
1211dbde2c0cSRichard Henderson struct sigaction act1;
1212dbde2c0cSRichard Henderson
1213773b93eeSbellard sigfillset(&act1.sa_mask);
1214773b93eeSbellard act1.sa_flags = SA_SIGINFO;
1215624f7979Spbrook if (k->_sa_handler == TARGET_SIG_IGN) {
1216dbde2c0cSRichard Henderson /*
1217dbde2c0cSRichard Henderson * It is important to update the host kernel signal ignore
1218dbde2c0cSRichard Henderson * state to avoid getting unexpected interrupted syscalls.
1219dbde2c0cSRichard Henderson */
1220773b93eeSbellard act1.sa_sigaction = (void *)SIG_IGN;
1221624f7979Spbrook } else if (k->_sa_handler == TARGET_SIG_DFL) {
1222dbde2c0cSRichard Henderson if (core_dump_signal(sig)) {
1223ca587a8eSaurel32 act1.sa_sigaction = host_signal_handler;
1224dbde2c0cSRichard Henderson } else {
1225773b93eeSbellard act1.sa_sigaction = (void *)SIG_DFL;
1226dbde2c0cSRichard Henderson }
1227773b93eeSbellard } else {
1228773b93eeSbellard act1.sa_sigaction = host_signal_handler;
1229dbde2c0cSRichard Henderson if (k->sa_flags & TARGET_SA_RESTART) {
1230dbde2c0cSRichard Henderson act1.sa_flags |= SA_RESTART;
1231dbde2c0cSRichard Henderson }
1232773b93eeSbellard }
12330da46a6eSths ret = sigaction(host_sig, &act1, NULL);
1234773b93eeSbellard }
123566fb9763Sbellard }
12360da46a6eSths return ret;
123766fb9763Sbellard }
123866fb9763Sbellard
handle_pending_signal(CPUArchState * cpu_env,int sig,struct emulated_sigtable * k)123931efaef1SPeter Maydell static void handle_pending_signal(CPUArchState *cpu_env, int sig,
124031efaef1SPeter Maydell struct emulated_sigtable *k)
1241eb552501SPeter Maydell {
124229a0af61SRichard Henderson CPUState *cpu = env_cpu(cpu_env);
1243eb552501SPeter Maydell abi_ulong handler;
12443d3efba0SPeter Maydell sigset_t set;
1245143bcc1dSRichard Henderson target_siginfo_t unswapped;
1246eb552501SPeter Maydell target_sigset_t target_old_set;
1247eb552501SPeter Maydell struct target_sigaction *sa;
1248e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(cpu);
1249eb552501SPeter Maydell
1250c8ee0a44SPaolo Bonzini trace_user_handle_signal(cpu_env, sig);
125166fb9763Sbellard /* dequeue signal */
125266fb9763Sbellard k->pending = 0;
12531fddef4bSbellard
12544d6d8a05SGustavo Romero /*
1255143bcc1dSRichard Henderson * Writes out siginfo values byteswapped, accordingly to the target.
1256143bcc1dSRichard Henderson * It also cleans the si_type from si_code making it correct for
1257143bcc1dSRichard Henderson * the target. We must hold on to the original unswapped copy for
1258143bcc1dSRichard Henderson * strace below, because si_type is still required there.
12594d6d8a05SGustavo Romero */
1260143bcc1dSRichard Henderson if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
1261143bcc1dSRichard Henderson unswapped = k->info;
1262143bcc1dSRichard Henderson }
12634d6d8a05SGustavo Romero tswap_siginfo(&k->info, &k->info);
12644d6d8a05SGustavo Romero
1265f84e313eSGustavo Romero sig = gdb_handlesig(cpu, sig, NULL, &k->info, sizeof(k->info));
12661fddef4bSbellard if (!sig) {
1267ca587a8eSaurel32 sa = NULL;
1268ca587a8eSaurel32 handler = TARGET_SIG_IGN;
1269ca587a8eSaurel32 } else {
1270624f7979Spbrook sa = &sigact_table[sig - 1];
1271624f7979Spbrook handler = sa->_sa_handler;
1272ca587a8eSaurel32 }
1273ca587a8eSaurel32
12744b25a506SJosh Kunz if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
1275143bcc1dSRichard Henderson print_taken_signal(sig, &unswapped);
12760cb581d6SPeter Maydell }
12770cb581d6SPeter Maydell
127866fb9763Sbellard if (handler == TARGET_SIG_DFL) {
1279ca587a8eSaurel32 /* default handler : ignore some signal. The other are job control or fatal */
1280ca587a8eSaurel32 if (sig == TARGET_SIGTSTP || sig == TARGET_SIGTTIN || sig == TARGET_SIGTTOU) {
1281ca587a8eSaurel32 kill(getpid(),SIGSTOP);
1282ca587a8eSaurel32 } else if (sig != TARGET_SIGCHLD &&
128366fb9763Sbellard sig != TARGET_SIGURG &&
1284ca587a8eSaurel32 sig != TARGET_SIGWINCH &&
1285ca587a8eSaurel32 sig != TARGET_SIGCONT) {
1286da91c192SIlya Leoshkevich dump_core_and_abort(cpu_env, sig);
128766fb9763Sbellard }
128866fb9763Sbellard } else if (handler == TARGET_SIG_IGN) {
128966fb9763Sbellard /* ignore sig */
129066fb9763Sbellard } else if (handler == TARGET_SIG_ERR) {
1291da91c192SIlya Leoshkevich dump_core_and_abort(cpu_env, sig);
129266fb9763Sbellard } else {
12939de5e440Sbellard /* compute the blocked signals during the handler execution */
12943d3efba0SPeter Maydell sigset_t *blocked_set;
12953d3efba0SPeter Maydell
1296624f7979Spbrook target_to_host_sigset(&set, &sa->sa_mask);
12979de5e440Sbellard /* SA_NODEFER indicates that the current signal should not be
12989de5e440Sbellard blocked during the handler */
1299624f7979Spbrook if (!(sa->sa_flags & TARGET_SA_NODEFER))
13009de5e440Sbellard sigaddset(&set, target_to_host_signal(sig));
13019de5e440Sbellard
13029de5e440Sbellard /* save the previous blocked signal state to restore it at the
13039de5e440Sbellard end of the signal execution (see do_sigreturn) */
13043d3efba0SPeter Maydell host_to_target_sigset_internal(&target_old_set, &ts->signal_mask);
13053d3efba0SPeter Maydell
13063d3efba0SPeter Maydell /* block signals in the handler */
13073d3efba0SPeter Maydell blocked_set = ts->in_sigsuspend ?
13083d3efba0SPeter Maydell &ts->sigsuspend_mask : &ts->signal_mask;
13093d3efba0SPeter Maydell sigorset(&ts->signal_mask, blocked_set, &set);
13103d3efba0SPeter Maydell ts->in_sigsuspend = 0;
13119de5e440Sbellard
1312bc8a22ccSbellard /* if the CPU is in VM86 mode, we restore the 32 bit values */
131384409ddbSj_mayer #if defined(TARGET_I386) && !defined(TARGET_X86_64)
1314bc8a22ccSbellard {
1315bc8a22ccSbellard CPUX86State *env = cpu_env;
1316bc8a22ccSbellard if (env->eflags & VM_MASK)
1317bc8a22ccSbellard save_v86_state(env);
1318bc8a22ccSbellard }
1319bc8a22ccSbellard #endif
13209de5e440Sbellard /* prepare the stack frame of the virtual CPU */
1321cb6ac802SLaurent Vivier #if defined(TARGET_ARCH_HAS_SETUP_FRAME)
1322cb6ac802SLaurent Vivier if (sa->sa_flags & TARGET_SA_SIGINFO) {
1323cb6ac802SLaurent Vivier setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1324cb6ac802SLaurent Vivier } else {
1325cb6ac802SLaurent Vivier setup_frame(sig, sa, &target_old_set, cpu_env);
1326cb6ac802SLaurent Vivier }
1327cb6ac802SLaurent Vivier #else
1328ff970904SRichard Henderson /* These targets do not have traditional signals. */
1329907f5fddSTimothy E Baldwin setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1330ff970904SRichard Henderson #endif
13317ec87e06SPeter Maydell if (sa->sa_flags & TARGET_SA_RESETHAND) {
1332624f7979Spbrook sa->_sa_handler = TARGET_SIG_DFL;
133366fb9763Sbellard }
13347ec87e06SPeter Maydell }
133531e31b8aSbellard }
1336e902d588SPeter Maydell
process_pending_signals(CPUArchState * cpu_env)1337e902d588SPeter Maydell void process_pending_signals(CPUArchState *cpu_env)
1338e902d588SPeter Maydell {
133929a0af61SRichard Henderson CPUState *cpu = env_cpu(cpu_env);
1340e902d588SPeter Maydell int sig;
1341e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(cpu);
13423d3efba0SPeter Maydell sigset_t set;
13433d3efba0SPeter Maydell sigset_t *blocked_set;
1344e902d588SPeter Maydell
1345d73415a3SStefan Hajnoczi while (qatomic_read(&ts->signal_pending)) {
13463d3efba0SPeter Maydell sigfillset(&set);
13473d3efba0SPeter Maydell sigprocmask(SIG_SETMASK, &set, 0);
13483d3efba0SPeter Maydell
13498bd3773cSPeter Maydell restart_scan:
1350655ed67cSTimothy E Baldwin sig = ts->sync_signal.pending;
1351655ed67cSTimothy E Baldwin if (sig) {
1352655ed67cSTimothy E Baldwin /* Synchronous signals are forced,
1353655ed67cSTimothy E Baldwin * see force_sig_info() and callers in Linux
1354655ed67cSTimothy E Baldwin * Note that not all of our queue_signal() calls in QEMU correspond
1355655ed67cSTimothy E Baldwin * to force_sig_info() calls in Linux (some are send_sig_info()).
1356655ed67cSTimothy E Baldwin * However it seems like a kernel bug to me to allow the process
1357655ed67cSTimothy E Baldwin * to block a synchronous signal since it could then just end up
1358655ed67cSTimothy E Baldwin * looping round and round indefinitely.
1359655ed67cSTimothy E Baldwin */
1360655ed67cSTimothy E Baldwin if (sigismember(&ts->signal_mask, target_to_host_signal_table[sig])
1361655ed67cSTimothy E Baldwin || sigact_table[sig - 1]._sa_handler == TARGET_SIG_IGN) {
1362655ed67cSTimothy E Baldwin sigdelset(&ts->signal_mask, target_to_host_signal_table[sig]);
1363655ed67cSTimothy E Baldwin sigact_table[sig - 1]._sa_handler = TARGET_SIG_DFL;
1364655ed67cSTimothy E Baldwin }
1365655ed67cSTimothy E Baldwin
136631efaef1SPeter Maydell handle_pending_signal(cpu_env, sig, &ts->sync_signal);
1367655ed67cSTimothy E Baldwin }
1368655ed67cSTimothy E Baldwin
1369e902d588SPeter Maydell for (sig = 1; sig <= TARGET_NSIG; sig++) {
13703d3efba0SPeter Maydell blocked_set = ts->in_sigsuspend ?
13713d3efba0SPeter Maydell &ts->sigsuspend_mask : &ts->signal_mask;
13723d3efba0SPeter Maydell
13733d3efba0SPeter Maydell if (ts->sigtab[sig - 1].pending &&
13743d3efba0SPeter Maydell (!sigismember(blocked_set,
1375655ed67cSTimothy E Baldwin target_to_host_signal_table[sig]))) {
137631efaef1SPeter Maydell handle_pending_signal(cpu_env, sig, &ts->sigtab[sig - 1]);
13778bd3773cSPeter Maydell /* Restart scan from the beginning, as handle_pending_signal
13788bd3773cSPeter Maydell * might have resulted in a new synchronous signal (eg SIGSEGV).
13798bd3773cSPeter Maydell */
13808bd3773cSPeter Maydell goto restart_scan;
1381e902d588SPeter Maydell }
1382e902d588SPeter Maydell }
13833d3efba0SPeter Maydell
13843d3efba0SPeter Maydell /* if no signal is pending, unblock signals and recheck (the act
13853d3efba0SPeter Maydell * of unblocking might cause us to take another host signal which
13863d3efba0SPeter Maydell * will set signal_pending again).
13873d3efba0SPeter Maydell */
1388d73415a3SStefan Hajnoczi qatomic_set(&ts->signal_pending, 0);
13893d3efba0SPeter Maydell ts->in_sigsuspend = 0;
13903d3efba0SPeter Maydell set = ts->signal_mask;
13913d3efba0SPeter Maydell sigdelset(&set, SIGSEGV);
13923d3efba0SPeter Maydell sigdelset(&set, SIGBUS);
13933d3efba0SPeter Maydell sigprocmask(SIG_SETMASK, &set, 0);
13943d3efba0SPeter Maydell }
13953d3efba0SPeter Maydell ts->in_sigsuspend = 0;
1396e902d588SPeter Maydell }
13970a99f093SRichard Henderson
process_sigsuspend_mask(sigset_t ** pset,target_ulong sigset,target_ulong sigsize)13980a99f093SRichard Henderson int process_sigsuspend_mask(sigset_t **pset, target_ulong sigset,
13990a99f093SRichard Henderson target_ulong sigsize)
14000a99f093SRichard Henderson {
1401e4e5cb4aSIlya Leoshkevich TaskState *ts = get_task_state(thread_cpu);
14020a99f093SRichard Henderson sigset_t *host_set = &ts->sigsuspend_mask;
14030a99f093SRichard Henderson target_sigset_t *target_sigset;
14040a99f093SRichard Henderson
14050a99f093SRichard Henderson if (sigsize != sizeof(*target_sigset)) {
14060a99f093SRichard Henderson /* Like the kernel, we enforce correct size sigsets */
14070a99f093SRichard Henderson return -TARGET_EINVAL;
14080a99f093SRichard Henderson }
14090a99f093SRichard Henderson
14100a99f093SRichard Henderson target_sigset = lock_user(VERIFY_READ, sigset, sigsize, 1);
14110a99f093SRichard Henderson if (!target_sigset) {
14120a99f093SRichard Henderson return -TARGET_EFAULT;
14130a99f093SRichard Henderson }
14140a99f093SRichard Henderson target_to_host_sigset(host_set, target_sigset);
14150a99f093SRichard Henderson unlock_user(target_sigset, sigset, 0);
14160a99f093SRichard Henderson
14170a99f093SRichard Henderson *pset = host_set;
14180a99f093SRichard Henderson return 0;
14190a99f093SRichard Henderson }
1420