xref: /openbmc/qemu/linux-user/signal.c (revision 851ed57d7a24ddf234a90b5bb196a143c84c10bc)
131e31b8aSbellard /*
266fb9763Sbellard  *  Emulation of Linux signals
331e31b8aSbellard  *
431e31b8aSbellard  *  Copyright (c) 2003 Fabrice Bellard
531e31b8aSbellard  *
631e31b8aSbellard  *  This program is free software; you can redistribute it and/or modify
731e31b8aSbellard  *  it under the terms of the GNU General Public License as published by
831e31b8aSbellard  *  the Free Software Foundation; either version 2 of the License, or
931e31b8aSbellard  *  (at your option) any later version.
1031e31b8aSbellard  *
1131e31b8aSbellard  *  This program is distributed in the hope that it will be useful,
1231e31b8aSbellard  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
1331e31b8aSbellard  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
1431e31b8aSbellard  *  GNU General Public License for more details.
1531e31b8aSbellard  *
1631e31b8aSbellard  *  You should have received a copy of the GNU General Public License
178167ee88SBlue Swirl  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
1831e31b8aSbellard  */
19d39594e9SPeter Maydell #include "qemu/osdep.h"
20a70dadc7SPeter Maydell #include "qemu/bitops.h"
21*c107521eSIlya Leoshkevich #include "qemu/cutils.h"
22d96bf49bSAlex Bennée #include "gdbstub/user.h"
2374781c08SPhilippe Mathieu-Daudé #include "exec/page-protection.h"
24e6037d04SRichard Henderson #include "hw/core/tcg-cpu-ops.h"
2585b4fa0cSPeter Maydell 
2631e31b8aSbellard #include <sys/ucontext.h>
27edf8e2afSMika Westerberg #include <sys/resource.h>
2831e31b8aSbellard 
293ef693a0Sbellard #include "qemu.h"
303b249d26SPeter Maydell #include "user-internals.h"
31a44d57a3SPeter Maydell #include "strace.h"
323ad0a769SPeter Maydell #include "loader.h"
33c8ee0a44SPaolo Bonzini #include "trace.h"
34befb7447SLaurent Vivier #include "signal-common.h"
35e6037d04SRichard Henderson #include "host-signal.h"
36bbf15aafSRichard Henderson #include "user/safe-syscall.h"
377dfd3ca8SHelge Deller #include "tcg/tcg.h"
3866fb9763Sbellard 
39f84e313eSGustavo Romero /* target_siginfo_t must fit in gdbstub's siginfo save area. */
40f84e313eSGustavo Romero QEMU_BUILD_BUG_ON(sizeof(target_siginfo_t) > MAX_SIGINFO_LENGTH);
41f84e313eSGustavo Romero 
42624f7979Spbrook static struct target_sigaction sigact_table[TARGET_NSIG];
4331e31b8aSbellard 
4466fb9763Sbellard static void host_signal_handler(int host_signum, siginfo_t *info,
4566fb9763Sbellard                                 void *puc);
4666fb9763Sbellard 
47db2af69dSRichard Henderson /* Fallback addresses into sigtramp page. */
48db2af69dSRichard Henderson abi_ulong default_sigreturn;
49db2af69dSRichard Henderson abi_ulong default_rt_sigreturn;
509fcff3a6SLaurent Vivier 
519fcff3a6SLaurent Vivier /*
52b60b91aaSRichard Henderson  * System includes define _NSIG as SIGRTMAX + 1, but qemu (like the kernel)
53b60b91aaSRichard Henderson  * defines TARGET_NSIG as TARGET_SIGRTMAX and the first signal is 1.
549fcff3a6SLaurent Vivier  * Signal number 0 is reserved for use as kill(pid, 0), to test whether
559fcff3a6SLaurent Vivier  * a process exists without sending it a signal.
569fcff3a6SLaurent Vivier  */
57144bff03SMichael Forney #ifdef __SIGRTMAX
589fcff3a6SLaurent Vivier QEMU_BUILD_BUG_ON(__SIGRTMAX + 1 != _NSIG);
59144bff03SMichael Forney #endif
603ca05588SArnaud Patard static uint8_t host_to_target_signal_table[_NSIG] = {
617b72aa1dSHelge Deller #define MAKE_SIG_ENTRY(sig)     [sig] = TARGET_##sig,
627b72aa1dSHelge Deller         MAKE_SIGNAL_LIST
637b72aa1dSHelge Deller #undef MAKE_SIG_ENTRY
649e5f5284Sbellard };
659e5f5284Sbellard 
669fcff3a6SLaurent Vivier static uint8_t target_to_host_signal_table[TARGET_NSIG + 1];
679fcff3a6SLaurent Vivier 
689fcff3a6SLaurent Vivier /* valid sig is between 1 and _NSIG - 1 */
host_to_target_signal(int sig)691d9d8b55Spbrook int host_to_target_signal(int sig)
7031e31b8aSbellard {
71b60b91aaSRichard Henderson     if (sig < 1) {
724cb05961Spbrook         return sig;
739fcff3a6SLaurent Vivier     }
74b60b91aaSRichard Henderson     if (sig >= _NSIG) {
75b60b91aaSRichard Henderson         return TARGET_NSIG + 1;
76b60b91aaSRichard Henderson     }
779e5f5284Sbellard     return host_to_target_signal_table[sig];
7831e31b8aSbellard }
7931e31b8aSbellard 
809fcff3a6SLaurent Vivier /* valid sig is between 1 and TARGET_NSIG */
target_to_host_signal(int sig)814cb05961Spbrook int target_to_host_signal(int sig)
8231e31b8aSbellard {
83b60b91aaSRichard Henderson     if (sig < 1) {
844cb05961Spbrook         return sig;
859fcff3a6SLaurent Vivier     }
86b60b91aaSRichard Henderson     if (sig > TARGET_NSIG) {
87b60b91aaSRichard Henderson         return _NSIG;
88b60b91aaSRichard Henderson     }
899e5f5284Sbellard     return target_to_host_signal_table[sig];
9031e31b8aSbellard }
9131e31b8aSbellard 
target_sigaddset(target_sigset_t * set,int signum)92c227f099SAnthony Liguori static inline void target_sigaddset(target_sigset_t *set, int signum)
93f5545b5cSpbrook {
94f5545b5cSpbrook     signum--;
95f5545b5cSpbrook     abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
96f5545b5cSpbrook     set->sig[signum / TARGET_NSIG_BPW] |= mask;
97f5545b5cSpbrook }
98f5545b5cSpbrook 
target_sigismember(const target_sigset_t * set,int signum)99c227f099SAnthony Liguori static inline int target_sigismember(const target_sigset_t *set, int signum)
100f5545b5cSpbrook {
101f5545b5cSpbrook     signum--;
102f5545b5cSpbrook     abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
103f5545b5cSpbrook     return ((set->sig[signum / TARGET_NSIG_BPW] & mask) != 0);
104f5545b5cSpbrook }
105f5545b5cSpbrook 
host_to_target_sigset_internal(target_sigset_t * d,const sigset_t * s)106befb7447SLaurent Vivier void host_to_target_sigset_internal(target_sigset_t *d,
1079231944dSbellard                                     const sigset_t *s)
10866fb9763Sbellard {
1099fcff3a6SLaurent Vivier     int host_sig, target_sig;
110f5545b5cSpbrook     target_sigemptyset(d);
1119fcff3a6SLaurent Vivier     for (host_sig = 1; host_sig < _NSIG; host_sig++) {
1129fcff3a6SLaurent Vivier         target_sig = host_to_target_signal(host_sig);
1139fcff3a6SLaurent Vivier         if (target_sig < 1 || target_sig > TARGET_NSIG) {
1149fcff3a6SLaurent Vivier             continue;
1159fcff3a6SLaurent Vivier         }
1169fcff3a6SLaurent Vivier         if (sigismember(s, host_sig)) {
1179fcff3a6SLaurent Vivier             target_sigaddset(d, target_sig);
1189e5f5284Sbellard         }
11966fb9763Sbellard     }
12066fb9763Sbellard }
12166fb9763Sbellard 
host_to_target_sigset(target_sigset_t * d,const sigset_t * s)122c227f099SAnthony Liguori void host_to_target_sigset(target_sigset_t *d, const sigset_t *s)
1239231944dSbellard {
124c227f099SAnthony Liguori     target_sigset_t d1;
1259231944dSbellard     int i;
1269231944dSbellard 
1279231944dSbellard     host_to_target_sigset_internal(&d1, s);
1289231944dSbellard     for(i = 0;i < TARGET_NSIG_WORDS; i++)
129cbb21eedSMatthias Braun         d->sig[i] = tswapal(d1.sig[i]);
1309231944dSbellard }
1319231944dSbellard 
target_to_host_sigset_internal(sigset_t * d,const target_sigset_t * s)132befb7447SLaurent Vivier void target_to_host_sigset_internal(sigset_t *d,
133c227f099SAnthony Liguori                                     const target_sigset_t *s)
13466fb9763Sbellard {
1359fcff3a6SLaurent Vivier     int host_sig, target_sig;
136f5545b5cSpbrook     sigemptyset(d);
1379fcff3a6SLaurent Vivier     for (target_sig = 1; target_sig <= TARGET_NSIG; target_sig++) {
1389fcff3a6SLaurent Vivier         host_sig = target_to_host_signal(target_sig);
1399fcff3a6SLaurent Vivier         if (host_sig < 1 || host_sig >= _NSIG) {
1409fcff3a6SLaurent Vivier             continue;
1419fcff3a6SLaurent Vivier         }
1429fcff3a6SLaurent Vivier         if (target_sigismember(s, target_sig)) {
1439fcff3a6SLaurent Vivier             sigaddset(d, host_sig);
1449e5f5284Sbellard         }
14566fb9763Sbellard     }
14666fb9763Sbellard }
14766fb9763Sbellard 
target_to_host_sigset(sigset_t * d,const target_sigset_t * s)148c227f099SAnthony Liguori void target_to_host_sigset(sigset_t *d, const target_sigset_t *s)
1499231944dSbellard {
150c227f099SAnthony Liguori     target_sigset_t s1;
1519231944dSbellard     int i;
1529231944dSbellard 
1539231944dSbellard     for(i = 0;i < TARGET_NSIG_WORDS; i++)
154cbb21eedSMatthias Braun         s1.sig[i] = tswapal(s->sig[i]);
1559231944dSbellard     target_to_host_sigset_internal(d, &s1);
1569231944dSbellard }
1579231944dSbellard 
host_to_target_old_sigset(abi_ulong * old_sigset,const sigset_t * sigset)158992f48a0Sblueswir1 void host_to_target_old_sigset(abi_ulong *old_sigset,
15966fb9763Sbellard                                const sigset_t *sigset)
16066fb9763Sbellard {
161c227f099SAnthony Liguori     target_sigset_t d;
1629e5f5284Sbellard     host_to_target_sigset(&d, sigset);
1639e5f5284Sbellard     *old_sigset = d.sig[0];
16466fb9763Sbellard }
16566fb9763Sbellard 
target_to_host_old_sigset(sigset_t * sigset,const abi_ulong * old_sigset)16666fb9763Sbellard void target_to_host_old_sigset(sigset_t *sigset,
167992f48a0Sblueswir1                                const abi_ulong *old_sigset)
16866fb9763Sbellard {
169c227f099SAnthony Liguori     target_sigset_t d;
1709e5f5284Sbellard     int i;
1719e5f5284Sbellard 
1729e5f5284Sbellard     d.sig[0] = *old_sigset;
1739e5f5284Sbellard     for(i = 1;i < TARGET_NSIG_WORDS; i++)
1749e5f5284Sbellard         d.sig[i] = 0;
1759e5f5284Sbellard     target_to_host_sigset(sigset, &d);
17666fb9763Sbellard }
17766fb9763Sbellard 
block_signals(void)1783d3efba0SPeter Maydell int block_signals(void)
1793d3efba0SPeter Maydell {
180e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
1813d3efba0SPeter Maydell     sigset_t set;
1823d3efba0SPeter Maydell 
1833d3efba0SPeter Maydell     /* It's OK to block everything including SIGSEGV, because we won't
1843d3efba0SPeter Maydell      * run any further guest code before unblocking signals in
1853d3efba0SPeter Maydell      * process_pending_signals().
1863d3efba0SPeter Maydell      */
1873d3efba0SPeter Maydell     sigfillset(&set);
1883d3efba0SPeter Maydell     sigprocmask(SIG_SETMASK, &set, 0);
1893d3efba0SPeter Maydell 
190d73415a3SStefan Hajnoczi     return qatomic_xchg(&ts->signal_pending, 1);
1913d3efba0SPeter Maydell }
1923d3efba0SPeter Maydell 
1931c275925SAlex Barcelo /* Wrapper for sigprocmask function
1941c275925SAlex Barcelo  * Emulates a sigprocmask in a safe way for the guest. Note that set and oldset
195af254a27SRichard Henderson  * are host signal set, not guest ones. Returns -QEMU_ERESTARTSYS if
1963d3efba0SPeter Maydell  * a signal was already pending and the syscall must be restarted, or
1973d3efba0SPeter Maydell  * 0 on success.
1983d3efba0SPeter Maydell  * If set is NULL, this is guaranteed not to fail.
1991c275925SAlex Barcelo  */
do_sigprocmask(int how,const sigset_t * set,sigset_t * oldset)2001c275925SAlex Barcelo int do_sigprocmask(int how, const sigset_t *set, sigset_t *oldset)
2011c275925SAlex Barcelo {
202e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2033d3efba0SPeter Maydell 
2043d3efba0SPeter Maydell     if (oldset) {
2053d3efba0SPeter Maydell         *oldset = ts->signal_mask;
2063d3efba0SPeter Maydell     }
207a7ec0f98SPeter Maydell 
208a7ec0f98SPeter Maydell     if (set) {
2093d3efba0SPeter Maydell         int i;
210a7ec0f98SPeter Maydell 
2113d3efba0SPeter Maydell         if (block_signals()) {
212af254a27SRichard Henderson             return -QEMU_ERESTARTSYS;
2133d3efba0SPeter Maydell         }
214a7ec0f98SPeter Maydell 
215a7ec0f98SPeter Maydell         switch (how) {
216a7ec0f98SPeter Maydell         case SIG_BLOCK:
2173d3efba0SPeter Maydell             sigorset(&ts->signal_mask, &ts->signal_mask, set);
218a7ec0f98SPeter Maydell             break;
219a7ec0f98SPeter Maydell         case SIG_UNBLOCK:
2203d3efba0SPeter Maydell             for (i = 1; i <= NSIG; ++i) {
2213d3efba0SPeter Maydell                 if (sigismember(set, i)) {
2223d3efba0SPeter Maydell                     sigdelset(&ts->signal_mask, i);
2233d3efba0SPeter Maydell                 }
224a7ec0f98SPeter Maydell             }
225a7ec0f98SPeter Maydell             break;
226a7ec0f98SPeter Maydell         case SIG_SETMASK:
2273d3efba0SPeter Maydell             ts->signal_mask = *set;
228a7ec0f98SPeter Maydell             break;
229a7ec0f98SPeter Maydell         default:
230a7ec0f98SPeter Maydell             g_assert_not_reached();
231a7ec0f98SPeter Maydell         }
2323d3efba0SPeter Maydell 
2333d3efba0SPeter Maydell         /* Silently ignore attempts to change blocking status of KILL or STOP */
2343d3efba0SPeter Maydell         sigdelset(&ts->signal_mask, SIGKILL);
2353d3efba0SPeter Maydell         sigdelset(&ts->signal_mask, SIGSTOP);
236a7ec0f98SPeter Maydell     }
2373d3efba0SPeter Maydell     return 0;
2381c275925SAlex Barcelo }
2391c275925SAlex Barcelo 
2403d3efba0SPeter Maydell /* Just set the guest's signal mask to the specified value; the
2413d3efba0SPeter Maydell  * caller is assumed to have called block_signals() already.
2423d3efba0SPeter Maydell  */
set_sigmask(const sigset_t * set)243befb7447SLaurent Vivier void set_sigmask(const sigset_t *set)
2449eede5b6SPeter Maydell {
245e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2463d3efba0SPeter Maydell 
2473d3efba0SPeter Maydell     ts->signal_mask = *set;
2489eede5b6SPeter Maydell }
2499eede5b6SPeter Maydell 
250465e237bSLaurent Vivier /* sigaltstack management */
251465e237bSLaurent Vivier 
on_sig_stack(unsigned long sp)252465e237bSLaurent Vivier int on_sig_stack(unsigned long sp)
253465e237bSLaurent Vivier {
254e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2555bfce0b7SPeter Maydell 
2565bfce0b7SPeter Maydell     return (sp - ts->sigaltstack_used.ss_sp
2575bfce0b7SPeter Maydell             < ts->sigaltstack_used.ss_size);
258465e237bSLaurent Vivier }
259465e237bSLaurent Vivier 
sas_ss_flags(unsigned long sp)260465e237bSLaurent Vivier int sas_ss_flags(unsigned long sp)
261465e237bSLaurent Vivier {
262e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2635bfce0b7SPeter Maydell 
2645bfce0b7SPeter Maydell     return (ts->sigaltstack_used.ss_size == 0 ? SS_DISABLE
265465e237bSLaurent Vivier             : on_sig_stack(sp) ? SS_ONSTACK : 0);
266465e237bSLaurent Vivier }
267465e237bSLaurent Vivier 
target_sigsp(abi_ulong sp,struct target_sigaction * ka)268465e237bSLaurent Vivier abi_ulong target_sigsp(abi_ulong sp, struct target_sigaction *ka)
269465e237bSLaurent Vivier {
270465e237bSLaurent Vivier     /*
271465e237bSLaurent Vivier      * This is the X/Open sanctioned signal stack switching.
272465e237bSLaurent Vivier      */
273e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2745bfce0b7SPeter Maydell 
275465e237bSLaurent Vivier     if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) {
2765bfce0b7SPeter Maydell         return ts->sigaltstack_used.ss_sp + ts->sigaltstack_used.ss_size;
277465e237bSLaurent Vivier     }
278465e237bSLaurent Vivier     return sp;
279465e237bSLaurent Vivier }
280465e237bSLaurent Vivier 
target_save_altstack(target_stack_t * uss,CPUArchState * env)281465e237bSLaurent Vivier void target_save_altstack(target_stack_t *uss, CPUArchState *env)
282465e237bSLaurent Vivier {
283e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2845bfce0b7SPeter Maydell 
2855bfce0b7SPeter Maydell     __put_user(ts->sigaltstack_used.ss_sp, &uss->ss_sp);
286465e237bSLaurent Vivier     __put_user(sas_ss_flags(get_sp_from_cpustate(env)), &uss->ss_flags);
2875bfce0b7SPeter Maydell     __put_user(ts->sigaltstack_used.ss_size, &uss->ss_size);
288465e237bSLaurent Vivier }
289465e237bSLaurent Vivier 
target_restore_altstack(target_stack_t * uss,CPUArchState * env)290ddc3e74dSRichard Henderson abi_long target_restore_altstack(target_stack_t *uss, CPUArchState *env)
29192bad948SRichard Henderson {
292e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
29392bad948SRichard Henderson     size_t minstacksize = TARGET_MINSIGSTKSZ;
29492bad948SRichard Henderson     target_stack_t ss;
29592bad948SRichard Henderson 
29692bad948SRichard Henderson #if defined(TARGET_PPC64)
29792bad948SRichard Henderson     /* ELF V2 for PPC64 has a 4K minimum stack size for signal handlers */
29892bad948SRichard Henderson     struct image_info *image = ts->info;
29992bad948SRichard Henderson     if (get_ppc64_abi(image) > 1) {
30092bad948SRichard Henderson         minstacksize = 4096;
30192bad948SRichard Henderson     }
30292bad948SRichard Henderson #endif
30392bad948SRichard Henderson 
30492bad948SRichard Henderson     __get_user(ss.ss_sp, &uss->ss_sp);
30592bad948SRichard Henderson     __get_user(ss.ss_size, &uss->ss_size);
30692bad948SRichard Henderson     __get_user(ss.ss_flags, &uss->ss_flags);
30792bad948SRichard Henderson 
308ddc3e74dSRichard Henderson     if (on_sig_stack(get_sp_from_cpustate(env))) {
30992bad948SRichard Henderson         return -TARGET_EPERM;
31092bad948SRichard Henderson     }
31192bad948SRichard Henderson 
31292bad948SRichard Henderson     switch (ss.ss_flags) {
31392bad948SRichard Henderson     default:
31492bad948SRichard Henderson         return -TARGET_EINVAL;
31592bad948SRichard Henderson 
31692bad948SRichard Henderson     case TARGET_SS_DISABLE:
31792bad948SRichard Henderson         ss.ss_size = 0;
31892bad948SRichard Henderson         ss.ss_sp = 0;
31992bad948SRichard Henderson         break;
32092bad948SRichard Henderson 
32192bad948SRichard Henderson     case TARGET_SS_ONSTACK:
32292bad948SRichard Henderson     case 0:
32392bad948SRichard Henderson         if (ss.ss_size < minstacksize) {
32492bad948SRichard Henderson             return -TARGET_ENOMEM;
32592bad948SRichard Henderson         }
32692bad948SRichard Henderson         break;
32792bad948SRichard Henderson     }
32892bad948SRichard Henderson 
32992bad948SRichard Henderson     ts->sigaltstack_used.ss_sp = ss.ss_sp;
33092bad948SRichard Henderson     ts->sigaltstack_used.ss_size = ss.ss_size;
33192bad948SRichard Henderson     return 0;
33292bad948SRichard Henderson }
33392bad948SRichard Henderson 
3349de5e440Sbellard /* siginfo conversion */
3359de5e440Sbellard 
host_to_target_siginfo_noswap(target_siginfo_t * tinfo,const siginfo_t * info)336c227f099SAnthony Liguori static inline void host_to_target_siginfo_noswap(target_siginfo_t *tinfo,
3379de5e440Sbellard                                                  const siginfo_t *info)
33866fb9763Sbellard {
339a05c6409SRichard Henderson     int sig = host_to_target_signal(info->si_signo);
340a70dadc7SPeter Maydell     int si_code = info->si_code;
341a70dadc7SPeter Maydell     int si_type;
3429de5e440Sbellard     tinfo->si_signo = sig;
3439de5e440Sbellard     tinfo->si_errno = 0;
344afd7cd92Spbrook     tinfo->si_code = info->si_code;
345a05c6409SRichard Henderson 
34655d72a7eSPeter Maydell     /* This memset serves two purposes:
34755d72a7eSPeter Maydell      * (1) ensure we don't leak random junk to the guest later
34855d72a7eSPeter Maydell      * (2) placate false positives from gcc about fields
34955d72a7eSPeter Maydell      *     being used uninitialized if it chooses to inline both this
35055d72a7eSPeter Maydell      *     function and tswap_siginfo() into host_to_target_siginfo().
35155d72a7eSPeter Maydell      */
35255d72a7eSPeter Maydell     memset(tinfo->_sifields._pad, 0, sizeof(tinfo->_sifields._pad));
35355d72a7eSPeter Maydell 
354a70dadc7SPeter Maydell     /* This is awkward, because we have to use a combination of
355a70dadc7SPeter Maydell      * the si_code and si_signo to figure out which of the union's
356a70dadc7SPeter Maydell      * members are valid. (Within the host kernel it is always possible
357a70dadc7SPeter Maydell      * to tell, but the kernel carefully avoids giving userspace the
358a70dadc7SPeter Maydell      * high 16 bits of si_code, so we don't have the information to
359a70dadc7SPeter Maydell      * do this the easy way...) We therefore make our best guess,
360a70dadc7SPeter Maydell      * bearing in mind that a guest can spoof most of the si_codes
361a70dadc7SPeter Maydell      * via rt_sigqueueinfo() if it likes.
362a70dadc7SPeter Maydell      *
363a70dadc7SPeter Maydell      * Once we have made our guess, we record it in the top 16 bits of
364a70dadc7SPeter Maydell      * the si_code, so that tswap_siginfo() later can use it.
365a70dadc7SPeter Maydell      * tswap_siginfo() will strip these top bits out before writing
366a70dadc7SPeter Maydell      * si_code to the guest (sign-extending the lower bits).
367a70dadc7SPeter Maydell      */
368a70dadc7SPeter Maydell 
369a70dadc7SPeter Maydell     switch (si_code) {
370a70dadc7SPeter Maydell     case SI_USER:
371a70dadc7SPeter Maydell     case SI_TKILL:
372a70dadc7SPeter Maydell     case SI_KERNEL:
373a70dadc7SPeter Maydell         /* Sent via kill(), tkill() or tgkill(), or direct from the kernel.
374a70dadc7SPeter Maydell          * These are the only unspoofable si_code values.
375a70dadc7SPeter Maydell          */
376a70dadc7SPeter Maydell         tinfo->_sifields._kill._pid = info->si_pid;
377a70dadc7SPeter Maydell         tinfo->_sifields._kill._uid = info->si_uid;
378a70dadc7SPeter Maydell         si_type = QEMU_SI_KILL;
379a70dadc7SPeter Maydell         break;
380a70dadc7SPeter Maydell     default:
381a70dadc7SPeter Maydell         /* Everything else is spoofable. Make best guess based on signal */
382a70dadc7SPeter Maydell         switch (sig) {
383a70dadc7SPeter Maydell         case TARGET_SIGCHLD:
384a05c6409SRichard Henderson             tinfo->_sifields._sigchld._pid = info->si_pid;
385a05c6409SRichard Henderson             tinfo->_sifields._sigchld._uid = info->si_uid;
386139e5de7SMatthias Schiffer             if (si_code == CLD_EXITED)
3871c3dfb50SAlistair Francis                 tinfo->_sifields._sigchld._status = info->si_status;
388139e5de7SMatthias Schiffer             else
389139e5de7SMatthias Schiffer                 tinfo->_sifields._sigchld._status
390139e5de7SMatthias Schiffer                     = host_to_target_signal(info->si_status & 0x7f)
391139e5de7SMatthias Schiffer                         | (info->si_status & ~0x7f);
392a05c6409SRichard Henderson             tinfo->_sifields._sigchld._utime = info->si_utime;
393a05c6409SRichard Henderson             tinfo->_sifields._sigchld._stime = info->si_stime;
394a70dadc7SPeter Maydell             si_type = QEMU_SI_CHLD;
395a70dadc7SPeter Maydell             break;
396a70dadc7SPeter Maydell         case TARGET_SIGIO:
397a70dadc7SPeter Maydell             tinfo->_sifields._sigpoll._band = info->si_band;
398a70dadc7SPeter Maydell             tinfo->_sifields._sigpoll._fd = info->si_fd;
399a70dadc7SPeter Maydell             si_type = QEMU_SI_POLL;
400a70dadc7SPeter Maydell             break;
401a70dadc7SPeter Maydell         default:
402a70dadc7SPeter Maydell             /* Assume a sigqueue()/mq_notify()/rt_sigqueueinfo() source. */
4039de5e440Sbellard             tinfo->_sifields._rt._pid = info->si_pid;
4049de5e440Sbellard             tinfo->_sifields._rt._uid = info->si_uid;
4059de5e440Sbellard             /* XXX: potential problem if 64 bit */
406a05c6409SRichard Henderson             tinfo->_sifields._rt._sigval.sival_ptr
407a05c6409SRichard Henderson                 = (abi_ulong)(unsigned long)info->si_value.sival_ptr;
408a70dadc7SPeter Maydell             si_type = QEMU_SI_RT;
409a70dadc7SPeter Maydell             break;
4109de5e440Sbellard         }
411a70dadc7SPeter Maydell         break;
412a70dadc7SPeter Maydell     }
413a70dadc7SPeter Maydell 
414a70dadc7SPeter Maydell     tinfo->si_code = deposit32(si_code, 16, 16, si_type);
41566fb9763Sbellard }
41666fb9763Sbellard 
tswap_siginfo(target_siginfo_t * tinfo,const target_siginfo_t * info)4174d6d8a05SGustavo Romero static void tswap_siginfo(target_siginfo_t *tinfo,
418c227f099SAnthony Liguori                           const target_siginfo_t *info)
4199de5e440Sbellard {
420a70dadc7SPeter Maydell     int si_type = extract32(info->si_code, 16, 16);
421a70dadc7SPeter Maydell     int si_code = sextract32(info->si_code, 0, 16);
422a05c6409SRichard Henderson 
423a70dadc7SPeter Maydell     __put_user(info->si_signo, &tinfo->si_signo);
424a70dadc7SPeter Maydell     __put_user(info->si_errno, &tinfo->si_errno);
425a70dadc7SPeter Maydell     __put_user(si_code, &tinfo->si_code);
426a70dadc7SPeter Maydell 
427a70dadc7SPeter Maydell     /* We can use our internal marker of which fields in the structure
428a70dadc7SPeter Maydell      * are valid, rather than duplicating the guesswork of
429a70dadc7SPeter Maydell      * host_to_target_siginfo_noswap() here.
430a70dadc7SPeter Maydell      */
431a70dadc7SPeter Maydell     switch (si_type) {
432a70dadc7SPeter Maydell     case QEMU_SI_KILL:
433a70dadc7SPeter Maydell         __put_user(info->_sifields._kill._pid, &tinfo->_sifields._kill._pid);
434a70dadc7SPeter Maydell         __put_user(info->_sifields._kill._uid, &tinfo->_sifields._kill._uid);
435a70dadc7SPeter Maydell         break;
436a70dadc7SPeter Maydell     case QEMU_SI_TIMER:
437a70dadc7SPeter Maydell         __put_user(info->_sifields._timer._timer1,
438a70dadc7SPeter Maydell                    &tinfo->_sifields._timer._timer1);
439a70dadc7SPeter Maydell         __put_user(info->_sifields._timer._timer2,
440a70dadc7SPeter Maydell                    &tinfo->_sifields._timer._timer2);
441a70dadc7SPeter Maydell         break;
442a70dadc7SPeter Maydell     case QEMU_SI_POLL:
443a70dadc7SPeter Maydell         __put_user(info->_sifields._sigpoll._band,
444a70dadc7SPeter Maydell                    &tinfo->_sifields._sigpoll._band);
445a70dadc7SPeter Maydell         __put_user(info->_sifields._sigpoll._fd,
446a70dadc7SPeter Maydell                    &tinfo->_sifields._sigpoll._fd);
447a70dadc7SPeter Maydell         break;
448a70dadc7SPeter Maydell     case QEMU_SI_FAULT:
449a70dadc7SPeter Maydell         __put_user(info->_sifields._sigfault._addr,
450a70dadc7SPeter Maydell                    &tinfo->_sifields._sigfault._addr);
451a70dadc7SPeter Maydell         break;
452a70dadc7SPeter Maydell     case QEMU_SI_CHLD:
453a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._pid,
454a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._pid);
455a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._uid,
456a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._uid);
457a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._status,
458a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._status);
459a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._utime,
460a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._utime);
461a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._stime,
462a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._stime);
463a70dadc7SPeter Maydell         break;
464a70dadc7SPeter Maydell     case QEMU_SI_RT:
465a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._pid, &tinfo->_sifields._rt._pid);
466a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._uid, &tinfo->_sifields._rt._uid);
467a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._sigval.sival_ptr,
468a70dadc7SPeter Maydell                    &tinfo->_sifields._rt._sigval.sival_ptr);
469a70dadc7SPeter Maydell         break;
470a70dadc7SPeter Maydell     default:
471a70dadc7SPeter Maydell         g_assert_not_reached();
4729de5e440Sbellard     }
4739de5e440Sbellard }
4749de5e440Sbellard 
host_to_target_siginfo(target_siginfo_t * tinfo,const siginfo_t * info)475c227f099SAnthony Liguori void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info)
4769de5e440Sbellard {
47755d72a7eSPeter Maydell     target_siginfo_t tgt_tmp;
47855d72a7eSPeter Maydell     host_to_target_siginfo_noswap(&tgt_tmp, info);
47955d72a7eSPeter Maydell     tswap_siginfo(tinfo, &tgt_tmp);
4809de5e440Sbellard }
4819de5e440Sbellard 
4829de5e440Sbellard /* XXX: we support only POSIX RT signals are used. */
483aa1f17c1Sths /* XXX: find a solution for 64 bit (additional malloced data is needed) */
target_to_host_siginfo(siginfo_t * info,const target_siginfo_t * tinfo)484c227f099SAnthony Liguori void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo)
48566fb9763Sbellard {
48690c0f080SPeter Maydell     /* This conversion is used only for the rt_sigqueueinfo syscall,
48790c0f080SPeter Maydell      * and so we know that the _rt fields are the valid ones.
48890c0f080SPeter Maydell      */
48990c0f080SPeter Maydell     abi_ulong sival_ptr;
49090c0f080SPeter Maydell 
49190c0f080SPeter Maydell     __get_user(info->si_signo, &tinfo->si_signo);
49290c0f080SPeter Maydell     __get_user(info->si_errno, &tinfo->si_errno);
49390c0f080SPeter Maydell     __get_user(info->si_code, &tinfo->si_code);
49490c0f080SPeter Maydell     __get_user(info->si_pid, &tinfo->_sifields._rt._pid);
49590c0f080SPeter Maydell     __get_user(info->si_uid, &tinfo->_sifields._rt._uid);
49690c0f080SPeter Maydell     __get_user(sival_ptr, &tinfo->_sifields._rt._sigval.sival_ptr);
49790c0f080SPeter Maydell     info->si_value.sival_ptr = (void *)(long)sival_ptr;
49866fb9763Sbellard }
49966fb9763Sbellard 
500edf8e2afSMika Westerberg /* returns 1 if given signal should dump core if not handled */
core_dump_signal(int sig)501edf8e2afSMika Westerberg static int core_dump_signal(int sig)
502edf8e2afSMika Westerberg {
503edf8e2afSMika Westerberg     switch (sig) {
504edf8e2afSMika Westerberg     case TARGET_SIGABRT:
505edf8e2afSMika Westerberg     case TARGET_SIGFPE:
506edf8e2afSMika Westerberg     case TARGET_SIGILL:
507edf8e2afSMika Westerberg     case TARGET_SIGQUIT:
508edf8e2afSMika Westerberg     case TARGET_SIGSEGV:
509edf8e2afSMika Westerberg     case TARGET_SIGTRAP:
510edf8e2afSMika Westerberg     case TARGET_SIGBUS:
511edf8e2afSMika Westerberg         return (1);
512edf8e2afSMika Westerberg     default:
513edf8e2afSMika Westerberg         return (0);
514edf8e2afSMika Westerberg     }
515edf8e2afSMika Westerberg }
516edf8e2afSMika Westerberg 
signal_table_init(const char * rtsig_map)517*c107521eSIlya Leoshkevich static void signal_table_init(const char *rtsig_map)
518365510fbSLaurent Vivier {
519b60b91aaSRichard Henderson     int hsig, tsig, count;
520365510fbSLaurent Vivier 
521*c107521eSIlya Leoshkevich     if (rtsig_map) {
522365510fbSLaurent Vivier         /*
523*c107521eSIlya Leoshkevich          * Map host RT signals to target RT signals according to the
524*c107521eSIlya Leoshkevich          * user-provided specification.
525*c107521eSIlya Leoshkevich          */
526*c107521eSIlya Leoshkevich         const char *s = rtsig_map;
527*c107521eSIlya Leoshkevich 
528*c107521eSIlya Leoshkevich         while (true) {
529*c107521eSIlya Leoshkevich             int i;
530*c107521eSIlya Leoshkevich 
531*c107521eSIlya Leoshkevich             if (qemu_strtoi(s, &s, 10, &tsig) || *s++ != ' ') {
532*c107521eSIlya Leoshkevich                 fprintf(stderr, "Malformed target signal in QEMU_RTSIG_MAP\n");
533*c107521eSIlya Leoshkevich                 exit(EXIT_FAILURE);
534*c107521eSIlya Leoshkevich             }
535*c107521eSIlya Leoshkevich             if (qemu_strtoi(s, &s, 10, &hsig) || *s++ != ' ') {
536*c107521eSIlya Leoshkevich                 fprintf(stderr, "Malformed host signal in QEMU_RTSIG_MAP\n");
537*c107521eSIlya Leoshkevich                 exit(EXIT_FAILURE);
538*c107521eSIlya Leoshkevich             }
539*c107521eSIlya Leoshkevich             if (qemu_strtoi(s, &s, 10, &count) || (*s && *s != ',')) {
540*c107521eSIlya Leoshkevich                 fprintf(stderr, "Malformed signal count in QEMU_RTSIG_MAP\n");
541*c107521eSIlya Leoshkevich                 exit(EXIT_FAILURE);
542*c107521eSIlya Leoshkevich             }
543*c107521eSIlya Leoshkevich 
544*c107521eSIlya Leoshkevich             for (i = 0; i < count; i++, tsig++, hsig++) {
545*c107521eSIlya Leoshkevich                 if (tsig < TARGET_SIGRTMIN || tsig > TARGET_NSIG) {
546*c107521eSIlya Leoshkevich                     fprintf(stderr, "%d is not a target rt signal\n", tsig);
547*c107521eSIlya Leoshkevich                     exit(EXIT_FAILURE);
548*c107521eSIlya Leoshkevich                 }
549*c107521eSIlya Leoshkevich                 if (hsig < SIGRTMIN || hsig > SIGRTMAX) {
550*c107521eSIlya Leoshkevich                     fprintf(stderr, "%d is not a host rt signal\n", hsig);
551*c107521eSIlya Leoshkevich                     exit(EXIT_FAILURE);
552*c107521eSIlya Leoshkevich                 }
553*c107521eSIlya Leoshkevich                 if (host_to_target_signal_table[hsig]) {
554*c107521eSIlya Leoshkevich                     fprintf(stderr, "%d already maps %d\n",
555*c107521eSIlya Leoshkevich                             hsig, host_to_target_signal_table[hsig]);
556*c107521eSIlya Leoshkevich                     exit(EXIT_FAILURE);
557*c107521eSIlya Leoshkevich                 }
558*c107521eSIlya Leoshkevich                 host_to_target_signal_table[hsig] = tsig;
559*c107521eSIlya Leoshkevich             }
560*c107521eSIlya Leoshkevich 
561*c107521eSIlya Leoshkevich             if (*s) {
562*c107521eSIlya Leoshkevich                 s++;
563*c107521eSIlya Leoshkevich             } else {
564*c107521eSIlya Leoshkevich                 break;
565*c107521eSIlya Leoshkevich             }
566*c107521eSIlya Leoshkevich         }
567*c107521eSIlya Leoshkevich     } else {
568*c107521eSIlya Leoshkevich         /*
569*c107521eSIlya Leoshkevich          * Default host-to-target RT signal mapping.
570*c107521eSIlya Leoshkevich          *
5716bc024e7SLaurent Vivier          * Signals are supported starting from TARGET_SIGRTMIN and going up
572b60b91aaSRichard Henderson          * until we run out of host realtime signals.  Glibc uses the lower 2
573b60b91aaSRichard Henderson          * RT signals and (hopefully) nobody uses the upper ones.
574b60b91aaSRichard Henderson          * This is why SIGRTMIN (34) is generally greater than __SIGRTMIN (32).
575b60b91aaSRichard Henderson          * To fix this properly we would need to do manual signal delivery
576b60b91aaSRichard Henderson          * multiplexed over a single host signal.
5776bc024e7SLaurent Vivier          * Attempts for configure "missing" signals via sigaction will be
5786bc024e7SLaurent Vivier          * silently ignored.
57938ee0a7dSRichard Henderson          *
580*c107521eSIlya Leoshkevich          * Reserve one signal for internal usage (see below).
581*c107521eSIlya Leoshkevich          */
582*c107521eSIlya Leoshkevich 
583*c107521eSIlya Leoshkevich         hsig = SIGRTMIN + 1;
584*c107521eSIlya Leoshkevich         for (tsig = TARGET_SIGRTMIN;
585*c107521eSIlya Leoshkevich              hsig <= SIGRTMAX && tsig <= TARGET_NSIG;
586*c107521eSIlya Leoshkevich              hsig++, tsig++) {
587*c107521eSIlya Leoshkevich             host_to_target_signal_table[hsig] = tsig;
588*c107521eSIlya Leoshkevich         }
589*c107521eSIlya Leoshkevich     }
590*c107521eSIlya Leoshkevich 
591*c107521eSIlya Leoshkevich     /*
59238ee0a7dSRichard Henderson      * Remap the target SIGABRT, so that we can distinguish host abort
59338ee0a7dSRichard Henderson      * from guest abort.  When the guest registers a signal handler or
59438ee0a7dSRichard Henderson      * calls raise(SIGABRT), the host will raise SIG_RTn.  If the guest
59538ee0a7dSRichard Henderson      * arrives at dump_core_and_abort(), we will map back to host SIGABRT
59638ee0a7dSRichard Henderson      * so that the parent (native or emulated) sees the correct signal.
59738ee0a7dSRichard Henderson      * Finally, also map host to guest SIGABRT so that the emulated
59838ee0a7dSRichard Henderson      * parent sees the correct mapping from wait status.
599365510fbSLaurent Vivier      */
60038ee0a7dSRichard Henderson 
60138ee0a7dSRichard Henderson     host_to_target_signal_table[SIGABRT] = 0;
602*c107521eSIlya Leoshkevich     for (hsig = SIGRTMIN; hsig <= SIGRTMAX; hsig++) {
603*c107521eSIlya Leoshkevich         if (!host_to_target_signal_table[hsig]) {
604*c107521eSIlya Leoshkevich             host_to_target_signal_table[hsig] = TARGET_SIGABRT;
605*c107521eSIlya Leoshkevich             break;
606*c107521eSIlya Leoshkevich         }
607*c107521eSIlya Leoshkevich     }
608*c107521eSIlya Leoshkevich     if (hsig > SIGRTMAX) {
609*c107521eSIlya Leoshkevich         fprintf(stderr, "No rt signals left for SIGABRT mapping\n");
610*c107521eSIlya Leoshkevich         exit(EXIT_FAILURE);
6116bc024e7SLaurent Vivier     }
612365510fbSLaurent Vivier 
613b60b91aaSRichard Henderson     /* Invert the mapping that has already been assigned. */
614b60b91aaSRichard Henderson     for (hsig = 1; hsig < _NSIG; hsig++) {
615b60b91aaSRichard Henderson         tsig = host_to_target_signal_table[hsig];
616b60b91aaSRichard Henderson         if (tsig) {
617*c107521eSIlya Leoshkevich             if (target_to_host_signal_table[tsig]) {
618*c107521eSIlya Leoshkevich                 fprintf(stderr, "%d is already mapped to %d\n",
619*c107521eSIlya Leoshkevich                         tsig, target_to_host_signal_table[tsig]);
620*c107521eSIlya Leoshkevich                 exit(EXIT_FAILURE);
621*c107521eSIlya Leoshkevich             }
622b60b91aaSRichard Henderson             target_to_host_signal_table[tsig] = hsig;
623365510fbSLaurent Vivier         }
624365510fbSLaurent Vivier     }
6256bc024e7SLaurent Vivier 
62638ee0a7dSRichard Henderson     host_to_target_signal_table[SIGABRT] = TARGET_SIGABRT;
62738ee0a7dSRichard Henderson 
628b60b91aaSRichard Henderson     /* Map everything else out-of-bounds. */
629b60b91aaSRichard Henderson     for (hsig = 1; hsig < _NSIG; hsig++) {
630b60b91aaSRichard Henderson         if (host_to_target_signal_table[hsig] == 0) {
631b60b91aaSRichard Henderson             host_to_target_signal_table[hsig] = TARGET_NSIG + 1;
632b60b91aaSRichard Henderson         }
633b60b91aaSRichard Henderson     }
634b60b91aaSRichard Henderson     for (count = 0, tsig = 1; tsig <= TARGET_NSIG; tsig++) {
635b60b91aaSRichard Henderson         if (target_to_host_signal_table[tsig] == 0) {
636b60b91aaSRichard Henderson             target_to_host_signal_table[tsig] = _NSIG;
6376bc024e7SLaurent Vivier             count++;
6386bc024e7SLaurent Vivier         }
6396bc024e7SLaurent Vivier     }
640b60b91aaSRichard Henderson 
6416bc024e7SLaurent Vivier     trace_signal_table_init(count);
6426bc024e7SLaurent Vivier }
643365510fbSLaurent Vivier 
signal_init(const char * rtsig_map)644*c107521eSIlya Leoshkevich void signal_init(const char *rtsig_map)
64531e31b8aSbellard {
646e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
64758c4e36cSRichard Henderson     struct sigaction act, oact;
6489e5f5284Sbellard 
649365510fbSLaurent Vivier     /* initialize signal conversion tables */
650*c107521eSIlya Leoshkevich     signal_table_init(rtsig_map);
65131e31b8aSbellard 
6523d3efba0SPeter Maydell     /* Set the signal mask from the host mask. */
6533d3efba0SPeter Maydell     sigprocmask(0, 0, &ts->signal_mask);
6543d3efba0SPeter Maydell 
6559de5e440Sbellard     sigfillset(&act.sa_mask);
65631e31b8aSbellard     act.sa_flags = SA_SIGINFO;
65731e31b8aSbellard     act.sa_sigaction = host_signal_handler;
65858c4e36cSRichard Henderson 
65958c4e36cSRichard Henderson     /*
66058c4e36cSRichard Henderson      * A parent process may configure ignored signals, but all other
66158c4e36cSRichard Henderson      * signals are default.  For any target signals that have no host
66258c4e36cSRichard Henderson      * mapping, set to ignore.  For all core_dump_signal, install our
66358c4e36cSRichard Henderson      * host signal handler so that we may invoke dump_core_and_abort.
66458c4e36cSRichard Henderson      * This includes SIGSEGV and SIGBUS, which are also need our signal
66558c4e36cSRichard Henderson      * handler for paging and exceptions.
66658c4e36cSRichard Henderson      */
66758c4e36cSRichard Henderson     for (int tsig = 1; tsig <= TARGET_NSIG; tsig++) {
66858c4e36cSRichard Henderson         int hsig = target_to_host_signal(tsig);
66958c4e36cSRichard Henderson         abi_ptr thand = TARGET_SIG_IGN;
67058c4e36cSRichard Henderson 
67138ee0a7dSRichard Henderson         if (hsig >= _NSIG) {
67238ee0a7dSRichard Henderson             continue;
67338ee0a7dSRichard Henderson         }
67458c4e36cSRichard Henderson 
67538ee0a7dSRichard Henderson         /* As we force remap SIGABRT, cannot probe and install in one step. */
67638ee0a7dSRichard Henderson         if (tsig == TARGET_SIGABRT) {
67738ee0a7dSRichard Henderson             sigaction(SIGABRT, NULL, &oact);
67838ee0a7dSRichard Henderson             sigaction(hsig, &act, NULL);
67938ee0a7dSRichard Henderson         } else {
68038ee0a7dSRichard Henderson             struct sigaction *iact = core_dump_signal(tsig) ? &act : NULL;
68158c4e36cSRichard Henderson             sigaction(hsig, iact, &oact);
68238ee0a7dSRichard Henderson         }
68338ee0a7dSRichard Henderson 
68458c4e36cSRichard Henderson         if (oact.sa_sigaction != (void *)SIG_IGN) {
68558c4e36cSRichard Henderson             thand = TARGET_SIG_DFL;
68631e31b8aSbellard         }
68758c4e36cSRichard Henderson         sigact_table[tsig - 1]._sa_handler = thand;
688624f7979Spbrook     }
689dbde2c0cSRichard Henderson }
69031e31b8aSbellard 
691c599d4d6SPeter Maydell /* Force a synchronously taken signal. The kernel force_sig() function
692c599d4d6SPeter Maydell  * also forces the signal to "not blocked, not ignored", but for QEMU
693c599d4d6SPeter Maydell  * that work is done in process_pending_signals().
694c599d4d6SPeter Maydell  */
force_sig(int sig)695befb7447SLaurent Vivier void force_sig(int sig)
696c599d4d6SPeter Maydell {
697c599d4d6SPeter Maydell     CPUState *cpu = thread_cpu;
698819121b9SPeter Maydell     target_siginfo_t info = {};
699c599d4d6SPeter Maydell 
700c599d4d6SPeter Maydell     info.si_signo = sig;
701c599d4d6SPeter Maydell     info.si_errno = 0;
702c599d4d6SPeter Maydell     info.si_code = TARGET_SI_KERNEL;
703c599d4d6SPeter Maydell     info._sifields._kill._pid = 0;
704c599d4d6SPeter Maydell     info._sifields._kill._uid = 0;
70542e62aadSPhilippe Mathieu-Daudé     queue_signal(cpu_env(cpu), info.si_signo, QEMU_SI_KILL, &info);
706c599d4d6SPeter Maydell }
70709391669SPeter Maydell 
708af796960SPeter Maydell /*
709af796960SPeter Maydell  * Force a synchronously taken QEMU_SI_FAULT signal. For QEMU the
710af796960SPeter Maydell  * 'force' part is handled in process_pending_signals().
711af796960SPeter Maydell  */
force_sig_fault(int sig,int code,abi_ulong addr)712af796960SPeter Maydell void force_sig_fault(int sig, int code, abi_ulong addr)
713af796960SPeter Maydell {
714af796960SPeter Maydell     CPUState *cpu = thread_cpu;
715af796960SPeter Maydell     target_siginfo_t info = {};
716af796960SPeter Maydell 
717af796960SPeter Maydell     info.si_signo = sig;
718af796960SPeter Maydell     info.si_errno = 0;
719af796960SPeter Maydell     info.si_code = code;
720af796960SPeter Maydell     info._sifields._sigfault._addr = addr;
72142e62aadSPhilippe Mathieu-Daudé     queue_signal(cpu_env(cpu), sig, QEMU_SI_FAULT, &info);
722af796960SPeter Maydell }
723af796960SPeter Maydell 
72409391669SPeter Maydell /* Force a SIGSEGV if we couldn't write to memory trying to set
72509391669SPeter Maydell  * up the signal frame. oldsig is the signal we were trying to handle
72609391669SPeter Maydell  * at the point of failure.
72709391669SPeter Maydell  */
72847ae93cdSMichael Clark #if !defined(TARGET_RISCV)
force_sigsegv(int oldsig)729befb7447SLaurent Vivier void force_sigsegv(int oldsig)
73009391669SPeter Maydell {
73109391669SPeter Maydell     if (oldsig == SIGSEGV) {
73209391669SPeter Maydell         /* Make sure we don't try to deliver the signal again; this will
733c599d4d6SPeter Maydell          * end up with handle_pending_signal() calling dump_core_and_abort().
73409391669SPeter Maydell          */
73509391669SPeter Maydell         sigact_table[oldsig - 1]._sa_handler = TARGET_SIG_DFL;
73609391669SPeter Maydell     }
737c4b35744SPeter Maydell     force_sig(TARGET_SIGSEGV);
73809391669SPeter Maydell }
73947ae93cdSMichael Clark #endif
74047ae93cdSMichael Clark 
cpu_loop_exit_sigsegv(CPUState * cpu,target_ulong addr,MMUAccessType access_type,bool maperr,uintptr_t ra)74172d2bbf9SRichard Henderson void cpu_loop_exit_sigsegv(CPUState *cpu, target_ulong addr,
74272d2bbf9SRichard Henderson                            MMUAccessType access_type, bool maperr, uintptr_t ra)
74372d2bbf9SRichard Henderson {
7441764ad70SRichard Henderson     const TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
74572d2bbf9SRichard Henderson 
74672d2bbf9SRichard Henderson     if (tcg_ops->record_sigsegv) {
74772d2bbf9SRichard Henderson         tcg_ops->record_sigsegv(cpu, addr, access_type, maperr, ra);
74872d2bbf9SRichard Henderson     }
74972d2bbf9SRichard Henderson 
75072d2bbf9SRichard Henderson     force_sig_fault(TARGET_SIGSEGV,
75172d2bbf9SRichard Henderson                     maperr ? TARGET_SEGV_MAPERR : TARGET_SEGV_ACCERR,
75272d2bbf9SRichard Henderson                     addr);
75372d2bbf9SRichard Henderson     cpu->exception_index = EXCP_INTERRUPT;
75472d2bbf9SRichard Henderson     cpu_loop_exit_restore(cpu, ra);
75572d2bbf9SRichard Henderson }
75672d2bbf9SRichard Henderson 
cpu_loop_exit_sigbus(CPUState * cpu,target_ulong addr,MMUAccessType access_type,uintptr_t ra)75712ed5640SRichard Henderson void cpu_loop_exit_sigbus(CPUState *cpu, target_ulong addr,
75812ed5640SRichard Henderson                           MMUAccessType access_type, uintptr_t ra)
75912ed5640SRichard Henderson {
7601764ad70SRichard Henderson     const TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
76112ed5640SRichard Henderson 
76212ed5640SRichard Henderson     if (tcg_ops->record_sigbus) {
76312ed5640SRichard Henderson         tcg_ops->record_sigbus(cpu, addr, access_type, ra);
76412ed5640SRichard Henderson     }
76512ed5640SRichard Henderson 
76612ed5640SRichard Henderson     force_sig_fault(TARGET_SIGBUS, TARGET_BUS_ADRALN, addr);
76712ed5640SRichard Henderson     cpu->exception_index = EXCP_INTERRUPT;
76812ed5640SRichard Henderson     cpu_loop_exit_restore(cpu, ra);
76912ed5640SRichard Henderson }
77012ed5640SRichard Henderson 
7719de5e440Sbellard /* abort execution with signal */
7728905770bSMarc-André Lureau static G_NORETURN
die_with_signal(int host_sig)773b8b50f1eSRichard Henderson void die_with_signal(int host_sig)
774b8b50f1eSRichard Henderson {
775b8b50f1eSRichard Henderson     struct sigaction act = {
776b8b50f1eSRichard Henderson         .sa_handler = SIG_DFL,
777b8b50f1eSRichard Henderson     };
778b8b50f1eSRichard Henderson 
779b8b50f1eSRichard Henderson     /*
780b8b50f1eSRichard Henderson      * The proper exit code for dying from an uncaught signal is -<signal>.
781b8b50f1eSRichard Henderson      * The kernel doesn't allow exit() or _exit() to pass a negative value.
782b8b50f1eSRichard Henderson      * To get the proper exit code we need to actually die from an uncaught
783b8b50f1eSRichard Henderson      * signal.  Here the default signal handler is installed, we send
784b8b50f1eSRichard Henderson      * the signal and we wait for it to arrive.
785b8b50f1eSRichard Henderson      */
786b8b50f1eSRichard Henderson     sigfillset(&act.sa_mask);
787b8b50f1eSRichard Henderson     sigaction(host_sig, &act, NULL);
788b8b50f1eSRichard Henderson 
789b8b50f1eSRichard Henderson     kill(getpid(), host_sig);
790b8b50f1eSRichard Henderson 
791b8b50f1eSRichard Henderson     /* Make sure the signal isn't masked (reusing the mask inside of act). */
792b8b50f1eSRichard Henderson     sigdelset(&act.sa_mask, host_sig);
793b8b50f1eSRichard Henderson     sigsuspend(&act.sa_mask);
794b8b50f1eSRichard Henderson 
795b8b50f1eSRichard Henderson     /* unreachable */
796ee72c47eSRichard Henderson     _exit(EXIT_FAILURE);
797b8b50f1eSRichard Henderson }
798b8b50f1eSRichard Henderson 
799b8b50f1eSRichard Henderson static G_NORETURN
dump_core_and_abort(CPUArchState * env,int target_sig)800b77af26eSRichard Henderson void dump_core_and_abort(CPUArchState *env, int target_sig)
80166fb9763Sbellard {
802b77af26eSRichard Henderson     CPUState *cpu = env_cpu(env);
803e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
804edf8e2afSMika Westerberg     int host_sig, core_dumped = 0;
805c8ee0a44SPaolo Bonzini 
80638ee0a7dSRichard Henderson     /* On exit, undo the remapping of SIGABRT. */
80738ee0a7dSRichard Henderson     if (target_sig == TARGET_SIGABRT) {
80838ee0a7dSRichard Henderson         host_sig = SIGABRT;
80938ee0a7dSRichard Henderson     } else {
81066393fb9SRiku Voipio         host_sig = target_to_host_signal(target_sig);
81138ee0a7dSRichard Henderson     }
812b5f95366SPeter Maydell     trace_user_dump_core_and_abort(env, target_sig, host_sig);
813a2247f8eSAndreas Färber     gdb_signalled(env, target_sig);
814603e4fd7Saurel32 
815edf8e2afSMika Westerberg     /* dump core if supported by target binary format */
81666393fb9SRiku Voipio     if (core_dump_signal(target_sig) && (ts->bprm->core_dump != NULL)) {
817edf8e2afSMika Westerberg         stop_all_tasks();
818edf8e2afSMika Westerberg         core_dumped =
819a2247f8eSAndreas Färber             ((*ts->bprm->core_dump)(target_sig, env) == 0);
820edf8e2afSMika Westerberg     }
821edf8e2afSMika Westerberg     if (core_dumped) {
822edf8e2afSMika Westerberg         /* we already dumped the core of target process, we don't want
823edf8e2afSMika Westerberg          * a coredump of qemu itself */
824edf8e2afSMika Westerberg         struct rlimit nodump;
825edf8e2afSMika Westerberg         getrlimit(RLIMIT_CORE, &nodump);
826edf8e2afSMika Westerberg         nodump.rlim_cur=0;
827edf8e2afSMika Westerberg         setrlimit(RLIMIT_CORE, &nodump);
828edf8e2afSMika Westerberg         (void) fprintf(stderr, "qemu: uncaught target signal %d (%s) - %s\n",
82966393fb9SRiku Voipio             target_sig, strsignal(host_sig), "core dumped" );
830edf8e2afSMika Westerberg     }
831edf8e2afSMika Westerberg 
832b77af26eSRichard Henderson     preexit_cleanup(env, 128 + target_sig);
833b8b50f1eSRichard Henderson     die_with_signal(host_sig);
8349de5e440Sbellard }
83566fb9763Sbellard 
8369de5e440Sbellard /* queue a signal so that it will be send to the virtual CPU as soon
8379de5e440Sbellard    as possible */
queue_signal(CPUArchState * env,int sig,int si_type,target_siginfo_t * info)838337e88d8SPeter Maydell void queue_signal(CPUArchState *env, int sig, int si_type,
8399d2803f7SPeter Maydell                   target_siginfo_t *info)
8409de5e440Sbellard {
84129a0af61SRichard Henderson     CPUState *cpu = env_cpu(env);
842e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
8439de5e440Sbellard 
844c8ee0a44SPaolo Bonzini     trace_user_queue_signal(env, sig);
845a7ec0f98SPeter Maydell 
8469d2803f7SPeter Maydell     info->si_code = deposit32(info->si_code, 16, 16, si_type);
847a70dadc7SPeter Maydell 
848655ed67cSTimothy E Baldwin     ts->sync_signal.info = *info;
849655ed67cSTimothy E Baldwin     ts->sync_signal.pending = sig;
85066fb9763Sbellard     /* signal that a new signal is pending */
851d73415a3SStefan Hajnoczi     qatomic_set(&ts->signal_pending, 1);
8529de5e440Sbellard }
85366fb9763Sbellard 
85407637888SWarner Losh 
85507637888SWarner Losh /* Adjust the signal context to rewind out of safe-syscall if we're in it */
rewind_if_in_safe_syscall(void * puc)8564d330ceeSTimothy E Baldwin static inline void rewind_if_in_safe_syscall(void *puc)
8574d330ceeSTimothy E Baldwin {
8589940799bSRichard Henderson     host_sigcontext *uc = (host_sigcontext *)puc;
85907637888SWarner Losh     uintptr_t pcreg = host_signal_pc(uc);
86007637888SWarner Losh 
86107637888SWarner Losh     if (pcreg > (uintptr_t)safe_syscall_start
86207637888SWarner Losh         && pcreg < (uintptr_t)safe_syscall_end) {
86307637888SWarner Losh         host_signal_set_pc(uc, (uintptr_t)safe_syscall_start);
8644d330ceeSTimothy E Baldwin     }
86507637888SWarner Losh }
8664d330ceeSTimothy E Baldwin 
8677dfd3ca8SHelge Deller static G_NORETURN
die_from_signal(siginfo_t * info)8687dfd3ca8SHelge Deller void die_from_signal(siginfo_t *info)
8697dfd3ca8SHelge Deller {
8707dfd3ca8SHelge Deller     char sigbuf[4], codebuf[12];
8717dfd3ca8SHelge Deller     const char *sig, *code = NULL;
8727dfd3ca8SHelge Deller 
8737dfd3ca8SHelge Deller     switch (info->si_signo) {
8747dfd3ca8SHelge Deller     case SIGSEGV:
8757dfd3ca8SHelge Deller         sig = "SEGV";
8767dfd3ca8SHelge Deller         switch (info->si_code) {
8777dfd3ca8SHelge Deller         case SEGV_MAPERR:
8787dfd3ca8SHelge Deller             code = "MAPERR";
8797dfd3ca8SHelge Deller             break;
8807dfd3ca8SHelge Deller         case SEGV_ACCERR:
8817dfd3ca8SHelge Deller             code = "ACCERR";
8827dfd3ca8SHelge Deller             break;
8837dfd3ca8SHelge Deller         }
8847dfd3ca8SHelge Deller         break;
8857dfd3ca8SHelge Deller     case SIGBUS:
8867dfd3ca8SHelge Deller         sig = "BUS";
8877dfd3ca8SHelge Deller         switch (info->si_code) {
8887dfd3ca8SHelge Deller         case BUS_ADRALN:
8897dfd3ca8SHelge Deller             code = "ADRALN";
8907dfd3ca8SHelge Deller             break;
8917dfd3ca8SHelge Deller         case BUS_ADRERR:
8927dfd3ca8SHelge Deller             code = "ADRERR";
8937dfd3ca8SHelge Deller             break;
8947dfd3ca8SHelge Deller         }
8957dfd3ca8SHelge Deller         break;
8964a6ebc19SRichard Henderson     case SIGILL:
8974a6ebc19SRichard Henderson         sig = "ILL";
8984a6ebc19SRichard Henderson         switch (info->si_code) {
8994a6ebc19SRichard Henderson         case ILL_ILLOPC:
9004a6ebc19SRichard Henderson             code = "ILLOPC";
9014a6ebc19SRichard Henderson             break;
9024a6ebc19SRichard Henderson         case ILL_ILLOPN:
9034a6ebc19SRichard Henderson             code = "ILLOPN";
9044a6ebc19SRichard Henderson             break;
9054a6ebc19SRichard Henderson         case ILL_ILLADR:
9064a6ebc19SRichard Henderson             code = "ILLADR";
9074a6ebc19SRichard Henderson             break;
9084a6ebc19SRichard Henderson         case ILL_PRVOPC:
9094a6ebc19SRichard Henderson             code = "PRVOPC";
9104a6ebc19SRichard Henderson             break;
9114a6ebc19SRichard Henderson         case ILL_PRVREG:
9124a6ebc19SRichard Henderson             code = "PRVREG";
9134a6ebc19SRichard Henderson             break;
9144a6ebc19SRichard Henderson         case ILL_COPROC:
9154a6ebc19SRichard Henderson             code = "COPROC";
9164a6ebc19SRichard Henderson             break;
9174a6ebc19SRichard Henderson         }
9184a6ebc19SRichard Henderson         break;
9194a6ebc19SRichard Henderson     case SIGFPE:
9204a6ebc19SRichard Henderson         sig = "FPE";
9214a6ebc19SRichard Henderson         switch (info->si_code) {
9224a6ebc19SRichard Henderson         case FPE_INTDIV:
9234a6ebc19SRichard Henderson             code = "INTDIV";
9244a6ebc19SRichard Henderson             break;
9254a6ebc19SRichard Henderson         case FPE_INTOVF:
9264a6ebc19SRichard Henderson             code = "INTOVF";
9274a6ebc19SRichard Henderson             break;
9284a6ebc19SRichard Henderson         }
9294a6ebc19SRichard Henderson         break;
9304a6ebc19SRichard Henderson     case SIGTRAP:
9314a6ebc19SRichard Henderson         sig = "TRAP";
9324a6ebc19SRichard Henderson         break;
9337dfd3ca8SHelge Deller     default:
9347dfd3ca8SHelge Deller         snprintf(sigbuf, sizeof(sigbuf), "%d", info->si_signo);
9357dfd3ca8SHelge Deller         sig = sigbuf;
9367dfd3ca8SHelge Deller         break;
9377dfd3ca8SHelge Deller     }
9387dfd3ca8SHelge Deller     if (code == NULL) {
9397dfd3ca8SHelge Deller         snprintf(codebuf, sizeof(sigbuf), "%d", info->si_code);
9407dfd3ca8SHelge Deller         code = codebuf;
9417dfd3ca8SHelge Deller     }
9427dfd3ca8SHelge Deller 
9437dfd3ca8SHelge Deller     error_report("QEMU internal SIG%s {code=%s, addr=%p}",
9447dfd3ca8SHelge Deller                  sig, code, info->si_addr);
9457dfd3ca8SHelge Deller     die_with_signal(info->si_signo);
9467dfd3ca8SHelge Deller }
9477dfd3ca8SHelge Deller 
host_sigsegv_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)948f4e11681SRichard Henderson static void host_sigsegv_handler(CPUState *cpu, siginfo_t *info,
949f4e11681SRichard Henderson                                  host_sigcontext *uc)
95031e31b8aSbellard {
951f4e11681SRichard Henderson     uintptr_t host_addr = (uintptr_t)info->si_addr;
952e6037d04SRichard Henderson     /*
953e6037d04SRichard Henderson      * Convert forcefully to guest address space: addresses outside
954e6037d04SRichard Henderson      * reserved_va are still valid to report via SEGV_MAPERR.
955e6037d04SRichard Henderson      */
956f4e11681SRichard Henderson     bool is_valid = h2g_valid(host_addr);
957f4e11681SRichard Henderson     abi_ptr guest_addr = h2g_nocheck(host_addr);
958f4e11681SRichard Henderson     uintptr_t pc = host_signal_pc(uc);
959f4e11681SRichard Henderson     bool is_write = host_signal_write(info, uc);
960f4e11681SRichard Henderson     MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
961f4e11681SRichard Henderson     bool maperr;
962e6037d04SRichard Henderson 
9637dfd3ca8SHelge Deller     /* If this was a write to a TB protected page, restart. */
9647dfd3ca8SHelge Deller     if (is_write
965f4e11681SRichard Henderson         && is_valid
9667dfd3ca8SHelge Deller         && info->si_code == SEGV_ACCERR
967f4e11681SRichard Henderson         && handle_sigsegv_accerr_write(cpu, host_signal_mask(uc),
968f4e11681SRichard Henderson                                        pc, guest_addr)) {
9697dfd3ca8SHelge Deller         return;
9707dfd3ca8SHelge Deller     }
9717dfd3ca8SHelge Deller 
9727dfd3ca8SHelge Deller     /*
9737dfd3ca8SHelge Deller      * If the access was not on behalf of the guest, within the executable
9747dfd3ca8SHelge Deller      * mapping of the generated code buffer, then it is a host bug.
9757dfd3ca8SHelge Deller      */
9767dfd3ca8SHelge Deller     if (access_type != MMU_INST_FETCH
9777dfd3ca8SHelge Deller         && !in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
9787dfd3ca8SHelge Deller         die_from_signal(info);
9797dfd3ca8SHelge Deller     }
9807dfd3ca8SHelge Deller 
981f4e11681SRichard Henderson     maperr = true;
982f4e11681SRichard Henderson     if (is_valid && info->si_code == SEGV_ACCERR) {
983e6037d04SRichard Henderson         /*
984e6037d04SRichard Henderson          * With reserved_va, the whole address space is PROT_NONE,
985e6037d04SRichard Henderson          * which means that we may get ACCERR when we want MAPERR.
986e6037d04SRichard Henderson          */
987e6037d04SRichard Henderson         if (page_get_flags(guest_addr) & PAGE_VALID) {
98872d2bbf9SRichard Henderson             maperr = false;
989e6037d04SRichard Henderson         } else {
990e6037d04SRichard Henderson             info->si_code = SEGV_MAPERR;
991e6037d04SRichard Henderson         }
992e6037d04SRichard Henderson     }
993e6037d04SRichard Henderson 
994f4e11681SRichard Henderson     sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
99572d2bbf9SRichard Henderson     cpu_loop_exit_sigsegv(cpu, guest_addr, access_type, maperr, pc);
996f4e11681SRichard Henderson }
997f4e11681SRichard Henderson 
host_sigbus_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)9986d913158SRobbin Ehn static uintptr_t host_sigbus_handler(CPUState *cpu, siginfo_t *info,
999f4e11681SRichard Henderson                                 host_sigcontext *uc)
1000f4e11681SRichard Henderson {
1001f4e11681SRichard Henderson     uintptr_t pc = host_signal_pc(uc);
1002f4e11681SRichard Henderson     bool is_write = host_signal_write(info, uc);
1003f4e11681SRichard Henderson     MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
1004f4e11681SRichard Henderson 
1005f4e11681SRichard Henderson     /*
1006f4e11681SRichard Henderson      * If the access was not on behalf of the guest, within the executable
1007f4e11681SRichard Henderson      * mapping of the generated code buffer, then it is a host bug.
1008f4e11681SRichard Henderson      */
1009f4e11681SRichard Henderson     if (!in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
1010f4e11681SRichard Henderson         die_from_signal(info);
1011f4e11681SRichard Henderson     }
1012f4e11681SRichard Henderson 
1013742f0762SRichard Henderson     if (info->si_code == BUS_ADRALN) {
1014f4e11681SRichard Henderson         uintptr_t host_addr = (uintptr_t)info->si_addr;
1015f4e11681SRichard Henderson         abi_ptr guest_addr = h2g_nocheck(host_addr);
1016f4e11681SRichard Henderson 
1017f4e11681SRichard Henderson         sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
1018742f0762SRichard Henderson         cpu_loop_exit_sigbus(cpu, guest_addr, access_type, pc);
1019742f0762SRichard Henderson     }
10206d913158SRobbin Ehn     return pc;
1021e6037d04SRichard Henderson }
1022e6037d04SRichard Henderson 
host_signal_handler(int host_sig,siginfo_t * info,void * puc)1023f4e11681SRichard Henderson static void host_signal_handler(int host_sig, siginfo_t *info, void *puc)
1024f4e11681SRichard Henderson {
1025f4e11681SRichard Henderson     CPUState *cpu = thread_cpu;
1026f4e11681SRichard Henderson     CPUArchState *env = cpu_env(cpu);
1027e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
1028f4e11681SRichard Henderson     target_siginfo_t tinfo;
1029f4e11681SRichard Henderson     host_sigcontext *uc = puc;
1030f4e11681SRichard Henderson     struct emulated_sigtable *k;
1031f4e11681SRichard Henderson     int guest_sig;
1032f4e11681SRichard Henderson     uintptr_t pc = 0;
1033f4e11681SRichard Henderson     bool sync_sig = false;
1034f4e11681SRichard Henderson     void *sigmask;
1035f4e11681SRichard Henderson 
1036f4e11681SRichard Henderson     /*
1037f4e11681SRichard Henderson      * Non-spoofed SIGSEGV and SIGBUS are synchronous, and need special
10384a6ebc19SRichard Henderson      * handling wrt signal blocking and unwinding.  Non-spoofed SIGILL,
10394a6ebc19SRichard Henderson      * SIGFPE, SIGTRAP are always host bugs.
1040f4e11681SRichard Henderson      */
1041f4e11681SRichard Henderson     if (info->si_code > 0) {
1042f4e11681SRichard Henderson         switch (host_sig) {
1043f4e11681SRichard Henderson         case SIGSEGV:
1044f4e11681SRichard Henderson             /* Only returns on handle_sigsegv_accerr_write success. */
1045f4e11681SRichard Henderson             host_sigsegv_handler(cpu, info, uc);
1046f4e11681SRichard Henderson             return;
1047f4e11681SRichard Henderson         case SIGBUS:
10486d913158SRobbin Ehn             pc = host_sigbus_handler(cpu, info, uc);
1049e6037d04SRichard Henderson             sync_sig = true;
1050f4e11681SRichard Henderson             break;
10514a6ebc19SRichard Henderson         case SIGILL:
10524a6ebc19SRichard Henderson         case SIGFPE:
10534a6ebc19SRichard Henderson         case SIGTRAP:
10544a6ebc19SRichard Henderson             die_from_signal(info);
1055f4e11681SRichard Henderson         }
1056e6037d04SRichard Henderson     }
1057e6037d04SRichard Henderson 
105831e31b8aSbellard     /* get target signal number */
1059e6037d04SRichard Henderson     guest_sig = host_to_target_signal(host_sig);
1060e6037d04SRichard Henderson     if (guest_sig < 1 || guest_sig > TARGET_NSIG) {
106131e31b8aSbellard         return;
1062e6037d04SRichard Henderson     }
1063e6037d04SRichard Henderson     trace_user_host_signal(env, host_sig, guest_sig);
1064e6037d04SRichard Henderson 
1065e6037d04SRichard Henderson     host_to_target_siginfo_noswap(&tinfo, info);
1066e6037d04SRichard Henderson     k = &ts->sigtab[guest_sig - 1];
1067e6037d04SRichard Henderson     k->info = tinfo;
1068e6037d04SRichard Henderson     k->pending = guest_sig;
1069e6037d04SRichard Henderson     ts->signal_pending = 1;
1070e6037d04SRichard Henderson 
1071e6037d04SRichard Henderson     /*
1072e6037d04SRichard Henderson      * For synchronous signals, unwind the cpu state to the faulting
1073e6037d04SRichard Henderson      * insn and then exit back to the main loop so that the signal
1074e6037d04SRichard Henderson      * is delivered immediately.
1075e6037d04SRichard Henderson      */
1076e6037d04SRichard Henderson     if (sync_sig) {
1077e6037d04SRichard Henderson         cpu->exception_index = EXCP_INTERRUPT;
1078e6037d04SRichard Henderson         cpu_loop_exit_restore(cpu, pc);
1079e6037d04SRichard Henderson     }
10804d330ceeSTimothy E Baldwin 
10814d330ceeSTimothy E Baldwin     rewind_if_in_safe_syscall(puc);
10824d330ceeSTimothy E Baldwin 
1083e6037d04SRichard Henderson     /*
1084e6037d04SRichard Henderson      * Block host signals until target signal handler entered. We
10853d3efba0SPeter Maydell      * can't block SIGSEGV or SIGBUS while we're executing guest
10863d3efba0SPeter Maydell      * code in case the guest code provokes one in the window between
10873d3efba0SPeter Maydell      * now and it getting out to the main loop. Signals will be
10883d3efba0SPeter Maydell      * unblocked again in process_pending_signals().
10891d48fdd9SPeter Maydell      *
1090c8c89a6aSRichard Henderson      * WARNING: we cannot use sigfillset() here because the sigmask
10911d48fdd9SPeter Maydell      * field is a kernel sigset_t, which is much smaller than the
10921d48fdd9SPeter Maydell      * libc sigset_t which sigfillset() operates on. Using sigfillset()
10931d48fdd9SPeter Maydell      * would write 0xff bytes off the end of the structure and trash
10941d48fdd9SPeter Maydell      * data on the struct.
10953d3efba0SPeter Maydell      */
1096f4e11681SRichard Henderson     sigmask = host_signal_mask(uc);
1097c8c89a6aSRichard Henderson     memset(sigmask, 0xff, SIGSET_T_SIZE);
1098c8c89a6aSRichard Henderson     sigdelset(sigmask, SIGSEGV);
1099c8c89a6aSRichard Henderson     sigdelset(sigmask, SIGBUS);
11003d3efba0SPeter Maydell 
11019de5e440Sbellard     /* interrupt the virtual CPU as soon as possible */
1102a2247f8eSAndreas Färber     cpu_exit(thread_cpu);
110366fb9763Sbellard }
110431e31b8aSbellard 
11050da46a6eSths /* do_sigaltstack() returns target values and errnos. */
1106579a97f7Sbellard /* compare linux/kernel/signal.c:do_sigaltstack() */
do_sigaltstack(abi_ulong uss_addr,abi_ulong uoss_addr,CPUArchState * env)11076b208755SRichard Henderson abi_long do_sigaltstack(abi_ulong uss_addr, abi_ulong uoss_addr,
11086b208755SRichard Henderson                         CPUArchState *env)
1109a04e134aSths {
111092bad948SRichard Henderson     target_stack_t oss, *uoss = NULL;
111192bad948SRichard Henderson     abi_long ret = -TARGET_EFAULT;
111292bad948SRichard Henderson 
111392bad948SRichard Henderson     if (uoss_addr) {
111492bad948SRichard Henderson         /* Verify writability now, but do not alter user memory yet. */
111592bad948SRichard Henderson         if (!lock_user_struct(VERIFY_WRITE, uoss, uoss_addr, 0)) {
111692bad948SRichard Henderson             goto out;
111792bad948SRichard Henderson         }
11186b208755SRichard Henderson         target_save_altstack(&oss, env);
1119a04e134aSths     }
1120a04e134aSths 
112192bad948SRichard Henderson     if (uss_addr) {
112292bad948SRichard Henderson         target_stack_t *uss;
11230903c8beSTom Musta 
11249eeb8306SRiku Voipio         if (!lock_user_struct(VERIFY_READ, uss, uss_addr, 1)) {
1125a04e134aSths             goto out;
11269eeb8306SRiku Voipio         }
1127ddc3e74dSRichard Henderson         ret = target_restore_altstack(uss, env);
112892bad948SRichard Henderson         if (ret) {
1129a04e134aSths             goto out;
1130a04e134aSths         }
11310903c8beSTom Musta     }
1132a04e134aSths 
1133579a97f7Sbellard     if (uoss_addr) {
113492bad948SRichard Henderson         memcpy(uoss, &oss, sizeof(oss));
113592bad948SRichard Henderson         unlock_user_struct(uoss, uoss_addr, 1);
113692bad948SRichard Henderson         uoss = NULL;
1137a04e134aSths     }
1138a04e134aSths     ret = 0;
113992bad948SRichard Henderson 
1140a04e134aSths  out:
114192bad948SRichard Henderson     if (uoss) {
114292bad948SRichard Henderson         unlock_user_struct(uoss, uoss_addr, 0);
114392bad948SRichard Henderson     }
1144a04e134aSths     return ret;
1145a04e134aSths }
1146a04e134aSths 
1147ef6a778eSTimothy E Baldwin /* do_sigaction() return target values and host errnos */
do_sigaction(int sig,const struct target_sigaction * act,struct target_sigaction * oact,abi_ulong ka_restorer)114866fb9763Sbellard int do_sigaction(int sig, const struct target_sigaction *act,
114902fb28e8SRichard Henderson                  struct target_sigaction *oact, abi_ulong ka_restorer)
115031e31b8aSbellard {
1151624f7979Spbrook     struct target_sigaction *k;
1152773b93eeSbellard     int host_sig;
11530da46a6eSths     int ret = 0;
115431e31b8aSbellard 
11556bc024e7SLaurent Vivier     trace_signal_do_sigaction_guest(sig, TARGET_NSIG);
11566bc024e7SLaurent Vivier 
1157ee3500d3SIlya Leoshkevich     if (sig < 1 || sig > TARGET_NSIG) {
1158ee3500d3SIlya Leoshkevich         return -TARGET_EINVAL;
1159ee3500d3SIlya Leoshkevich     }
1160ee3500d3SIlya Leoshkevich 
1161ee3500d3SIlya Leoshkevich     if (act && (sig == TARGET_SIGKILL || sig == TARGET_SIGSTOP)) {
1162ef6a778eSTimothy E Baldwin         return -TARGET_EINVAL;
1163ef6a778eSTimothy E Baldwin     }
1164ef6a778eSTimothy E Baldwin 
1165ef6a778eSTimothy E Baldwin     if (block_signals()) {
1166af254a27SRichard Henderson         return -QEMU_ERESTARTSYS;
1167ef6a778eSTimothy E Baldwin     }
1168ef6a778eSTimothy E Baldwin 
116966fb9763Sbellard     k = &sigact_table[sig - 1];
117066fb9763Sbellard     if (oact) {
1171d2565875SRichard Henderson         __put_user(k->_sa_handler, &oact->_sa_handler);
1172d2565875SRichard Henderson         __put_user(k->sa_flags, &oact->sa_flags);
11737f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1174d2565875SRichard Henderson         __put_user(k->sa_restorer, &oact->sa_restorer);
1175106ec879Sbellard #endif
1176d2565875SRichard Henderson         /* Not swapped.  */
1177624f7979Spbrook         oact->sa_mask = k->sa_mask;
117866fb9763Sbellard     }
117966fb9763Sbellard     if (act) {
1180d2565875SRichard Henderson         __get_user(k->_sa_handler, &act->_sa_handler);
1181d2565875SRichard Henderson         __get_user(k->sa_flags, &act->sa_flags);
11827f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1183d2565875SRichard Henderson         __get_user(k->sa_restorer, &act->sa_restorer);
1184106ec879Sbellard #endif
118502fb28e8SRichard Henderson #ifdef TARGET_ARCH_HAS_KA_RESTORER
118602fb28e8SRichard Henderson         k->ka_restorer = ka_restorer;
118702fb28e8SRichard Henderson #endif
1188d2565875SRichard Henderson         /* To be swapped in target_to_host_sigset.  */
1189624f7979Spbrook         k->sa_mask = act->sa_mask;
1190773b93eeSbellard 
1191773b93eeSbellard         /* we update the host linux signal state */
1192773b93eeSbellard         host_sig = target_to_host_signal(sig);
11936bc024e7SLaurent Vivier         trace_signal_do_sigaction_host(host_sig, TARGET_NSIG);
11946bc024e7SLaurent Vivier         if (host_sig > SIGRTMAX) {
11956bc024e7SLaurent Vivier             /* we don't have enough host signals to map all target signals */
11966bc024e7SLaurent Vivier             qemu_log_mask(LOG_UNIMP, "Unsupported target signal #%d, ignored\n",
11976bc024e7SLaurent Vivier                           sig);
11986bc024e7SLaurent Vivier             /*
11996bc024e7SLaurent Vivier              * we don't return an error here because some programs try to
12006bc024e7SLaurent Vivier              * register an handler for all possible rt signals even if they
12016bc024e7SLaurent Vivier              * don't need it.
12026bc024e7SLaurent Vivier              * An error here can abort them whereas there can be no problem
12036bc024e7SLaurent Vivier              * to not have the signal available later.
12046bc024e7SLaurent Vivier              * This is the case for golang,
12056bc024e7SLaurent Vivier              *   See https://github.com/golang/go/issues/33746
12066bc024e7SLaurent Vivier              * So we silently ignore the error.
12076bc024e7SLaurent Vivier              */
12086bc024e7SLaurent Vivier             return 0;
12096bc024e7SLaurent Vivier         }
1210773b93eeSbellard         if (host_sig != SIGSEGV && host_sig != SIGBUS) {
1211dbde2c0cSRichard Henderson             struct sigaction act1;
1212dbde2c0cSRichard Henderson 
1213773b93eeSbellard             sigfillset(&act1.sa_mask);
1214773b93eeSbellard             act1.sa_flags = SA_SIGINFO;
1215624f7979Spbrook             if (k->_sa_handler == TARGET_SIG_IGN) {
1216dbde2c0cSRichard Henderson                 /*
1217dbde2c0cSRichard Henderson                  * It is important to update the host kernel signal ignore
1218dbde2c0cSRichard Henderson                  * state to avoid getting unexpected interrupted syscalls.
1219dbde2c0cSRichard Henderson                  */
1220773b93eeSbellard                 act1.sa_sigaction = (void *)SIG_IGN;
1221624f7979Spbrook             } else if (k->_sa_handler == TARGET_SIG_DFL) {
1222dbde2c0cSRichard Henderson                 if (core_dump_signal(sig)) {
1223ca587a8eSaurel32                     act1.sa_sigaction = host_signal_handler;
1224dbde2c0cSRichard Henderson                 } else {
1225773b93eeSbellard                     act1.sa_sigaction = (void *)SIG_DFL;
1226dbde2c0cSRichard Henderson                 }
1227773b93eeSbellard             } else {
1228773b93eeSbellard                 act1.sa_sigaction = host_signal_handler;
1229dbde2c0cSRichard Henderson                 if (k->sa_flags & TARGET_SA_RESTART) {
1230dbde2c0cSRichard Henderson                     act1.sa_flags |= SA_RESTART;
1231dbde2c0cSRichard Henderson                 }
1232773b93eeSbellard             }
12330da46a6eSths             ret = sigaction(host_sig, &act1, NULL);
1234773b93eeSbellard         }
123566fb9763Sbellard     }
12360da46a6eSths     return ret;
123766fb9763Sbellard }
123866fb9763Sbellard 
handle_pending_signal(CPUArchState * cpu_env,int sig,struct emulated_sigtable * k)123931efaef1SPeter Maydell static void handle_pending_signal(CPUArchState *cpu_env, int sig,
124031efaef1SPeter Maydell                                   struct emulated_sigtable *k)
1241eb552501SPeter Maydell {
124229a0af61SRichard Henderson     CPUState *cpu = env_cpu(cpu_env);
1243eb552501SPeter Maydell     abi_ulong handler;
12443d3efba0SPeter Maydell     sigset_t set;
1245143bcc1dSRichard Henderson     target_siginfo_t unswapped;
1246eb552501SPeter Maydell     target_sigset_t target_old_set;
1247eb552501SPeter Maydell     struct target_sigaction *sa;
1248e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
1249eb552501SPeter Maydell 
1250c8ee0a44SPaolo Bonzini     trace_user_handle_signal(cpu_env, sig);
125166fb9763Sbellard     /* dequeue signal */
125266fb9763Sbellard     k->pending = 0;
12531fddef4bSbellard 
12544d6d8a05SGustavo Romero     /*
1255143bcc1dSRichard Henderson      * Writes out siginfo values byteswapped, accordingly to the target.
1256143bcc1dSRichard Henderson      * It also cleans the si_type from si_code making it correct for
1257143bcc1dSRichard Henderson      * the target.  We must hold on to the original unswapped copy for
1258143bcc1dSRichard Henderson      * strace below, because si_type is still required there.
12594d6d8a05SGustavo Romero      */
1260143bcc1dSRichard Henderson     if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
1261143bcc1dSRichard Henderson         unswapped = k->info;
1262143bcc1dSRichard Henderson     }
12634d6d8a05SGustavo Romero     tswap_siginfo(&k->info, &k->info);
12644d6d8a05SGustavo Romero 
1265f84e313eSGustavo Romero     sig = gdb_handlesig(cpu, sig, NULL, &k->info, sizeof(k->info));
12661fddef4bSbellard     if (!sig) {
1267ca587a8eSaurel32         sa = NULL;
1268ca587a8eSaurel32         handler = TARGET_SIG_IGN;
1269ca587a8eSaurel32     } else {
1270624f7979Spbrook         sa = &sigact_table[sig - 1];
1271624f7979Spbrook         handler = sa->_sa_handler;
1272ca587a8eSaurel32     }
1273ca587a8eSaurel32 
12744b25a506SJosh Kunz     if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
1275143bcc1dSRichard Henderson         print_taken_signal(sig, &unswapped);
12760cb581d6SPeter Maydell     }
12770cb581d6SPeter Maydell 
127866fb9763Sbellard     if (handler == TARGET_SIG_DFL) {
1279ca587a8eSaurel32         /* default handler : ignore some signal. The other are job control or fatal */
1280ca587a8eSaurel32         if (sig == TARGET_SIGTSTP || sig == TARGET_SIGTTIN || sig == TARGET_SIGTTOU) {
1281ca587a8eSaurel32             kill(getpid(),SIGSTOP);
1282ca587a8eSaurel32         } else if (sig != TARGET_SIGCHLD &&
128366fb9763Sbellard                    sig != TARGET_SIGURG &&
1284ca587a8eSaurel32                    sig != TARGET_SIGWINCH &&
1285ca587a8eSaurel32                    sig != TARGET_SIGCONT) {
1286da91c192SIlya Leoshkevich             dump_core_and_abort(cpu_env, sig);
128766fb9763Sbellard         }
128866fb9763Sbellard     } else if (handler == TARGET_SIG_IGN) {
128966fb9763Sbellard         /* ignore sig */
129066fb9763Sbellard     } else if (handler == TARGET_SIG_ERR) {
1291da91c192SIlya Leoshkevich         dump_core_and_abort(cpu_env, sig);
129266fb9763Sbellard     } else {
12939de5e440Sbellard         /* compute the blocked signals during the handler execution */
12943d3efba0SPeter Maydell         sigset_t *blocked_set;
12953d3efba0SPeter Maydell 
1296624f7979Spbrook         target_to_host_sigset(&set, &sa->sa_mask);
12979de5e440Sbellard         /* SA_NODEFER indicates that the current signal should not be
12989de5e440Sbellard            blocked during the handler */
1299624f7979Spbrook         if (!(sa->sa_flags & TARGET_SA_NODEFER))
13009de5e440Sbellard             sigaddset(&set, target_to_host_signal(sig));
13019de5e440Sbellard 
13029de5e440Sbellard         /* save the previous blocked signal state to restore it at the
13039de5e440Sbellard            end of the signal execution (see do_sigreturn) */
13043d3efba0SPeter Maydell         host_to_target_sigset_internal(&target_old_set, &ts->signal_mask);
13053d3efba0SPeter Maydell 
13063d3efba0SPeter Maydell         /* block signals in the handler */
13073d3efba0SPeter Maydell         blocked_set = ts->in_sigsuspend ?
13083d3efba0SPeter Maydell             &ts->sigsuspend_mask : &ts->signal_mask;
13093d3efba0SPeter Maydell         sigorset(&ts->signal_mask, blocked_set, &set);
13103d3efba0SPeter Maydell         ts->in_sigsuspend = 0;
13119de5e440Sbellard 
1312bc8a22ccSbellard         /* if the CPU is in VM86 mode, we restore the 32 bit values */
131384409ddbSj_mayer #if defined(TARGET_I386) && !defined(TARGET_X86_64)
1314bc8a22ccSbellard         {
1315bc8a22ccSbellard             CPUX86State *env = cpu_env;
1316bc8a22ccSbellard             if (env->eflags & VM_MASK)
1317bc8a22ccSbellard                 save_v86_state(env);
1318bc8a22ccSbellard         }
1319bc8a22ccSbellard #endif
13209de5e440Sbellard         /* prepare the stack frame of the virtual CPU */
1321cb6ac802SLaurent Vivier #if defined(TARGET_ARCH_HAS_SETUP_FRAME)
1322cb6ac802SLaurent Vivier         if (sa->sa_flags & TARGET_SA_SIGINFO) {
1323cb6ac802SLaurent Vivier             setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1324cb6ac802SLaurent Vivier         } else {
1325cb6ac802SLaurent Vivier             setup_frame(sig, sa, &target_old_set, cpu_env);
1326cb6ac802SLaurent Vivier         }
1327cb6ac802SLaurent Vivier #else
1328ff970904SRichard Henderson         /* These targets do not have traditional signals.  */
1329907f5fddSTimothy E Baldwin         setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1330ff970904SRichard Henderson #endif
13317ec87e06SPeter Maydell         if (sa->sa_flags & TARGET_SA_RESETHAND) {
1332624f7979Spbrook             sa->_sa_handler = TARGET_SIG_DFL;
133366fb9763Sbellard         }
13347ec87e06SPeter Maydell     }
133531e31b8aSbellard }
1336e902d588SPeter Maydell 
process_pending_signals(CPUArchState * cpu_env)1337e902d588SPeter Maydell void process_pending_signals(CPUArchState *cpu_env)
1338e902d588SPeter Maydell {
133929a0af61SRichard Henderson     CPUState *cpu = env_cpu(cpu_env);
1340e902d588SPeter Maydell     int sig;
1341e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
13423d3efba0SPeter Maydell     sigset_t set;
13433d3efba0SPeter Maydell     sigset_t *blocked_set;
1344e902d588SPeter Maydell 
1345d73415a3SStefan Hajnoczi     while (qatomic_read(&ts->signal_pending)) {
13463d3efba0SPeter Maydell         sigfillset(&set);
13473d3efba0SPeter Maydell         sigprocmask(SIG_SETMASK, &set, 0);
13483d3efba0SPeter Maydell 
13498bd3773cSPeter Maydell     restart_scan:
1350655ed67cSTimothy E Baldwin         sig = ts->sync_signal.pending;
1351655ed67cSTimothy E Baldwin         if (sig) {
1352655ed67cSTimothy E Baldwin             /* Synchronous signals are forced,
1353655ed67cSTimothy E Baldwin              * see force_sig_info() and callers in Linux
1354655ed67cSTimothy E Baldwin              * Note that not all of our queue_signal() calls in QEMU correspond
1355655ed67cSTimothy E Baldwin              * to force_sig_info() calls in Linux (some are send_sig_info()).
1356655ed67cSTimothy E Baldwin              * However it seems like a kernel bug to me to allow the process
1357655ed67cSTimothy E Baldwin              * to block a synchronous signal since it could then just end up
1358655ed67cSTimothy E Baldwin              * looping round and round indefinitely.
1359655ed67cSTimothy E Baldwin              */
1360655ed67cSTimothy E Baldwin             if (sigismember(&ts->signal_mask, target_to_host_signal_table[sig])
1361655ed67cSTimothy E Baldwin                 || sigact_table[sig - 1]._sa_handler == TARGET_SIG_IGN) {
1362655ed67cSTimothy E Baldwin                 sigdelset(&ts->signal_mask, target_to_host_signal_table[sig]);
1363655ed67cSTimothy E Baldwin                 sigact_table[sig - 1]._sa_handler = TARGET_SIG_DFL;
1364655ed67cSTimothy E Baldwin             }
1365655ed67cSTimothy E Baldwin 
136631efaef1SPeter Maydell             handle_pending_signal(cpu_env, sig, &ts->sync_signal);
1367655ed67cSTimothy E Baldwin         }
1368655ed67cSTimothy E Baldwin 
1369e902d588SPeter Maydell         for (sig = 1; sig <= TARGET_NSIG; sig++) {
13703d3efba0SPeter Maydell             blocked_set = ts->in_sigsuspend ?
13713d3efba0SPeter Maydell                 &ts->sigsuspend_mask : &ts->signal_mask;
13723d3efba0SPeter Maydell 
13733d3efba0SPeter Maydell             if (ts->sigtab[sig - 1].pending &&
13743d3efba0SPeter Maydell                 (!sigismember(blocked_set,
1375655ed67cSTimothy E Baldwin                               target_to_host_signal_table[sig]))) {
137631efaef1SPeter Maydell                 handle_pending_signal(cpu_env, sig, &ts->sigtab[sig - 1]);
13778bd3773cSPeter Maydell                 /* Restart scan from the beginning, as handle_pending_signal
13788bd3773cSPeter Maydell                  * might have resulted in a new synchronous signal (eg SIGSEGV).
13798bd3773cSPeter Maydell                  */
13808bd3773cSPeter Maydell                 goto restart_scan;
1381e902d588SPeter Maydell             }
1382e902d588SPeter Maydell         }
13833d3efba0SPeter Maydell 
13843d3efba0SPeter Maydell         /* if no signal is pending, unblock signals and recheck (the act
13853d3efba0SPeter Maydell          * of unblocking might cause us to take another host signal which
13863d3efba0SPeter Maydell          * will set signal_pending again).
13873d3efba0SPeter Maydell          */
1388d73415a3SStefan Hajnoczi         qatomic_set(&ts->signal_pending, 0);
13893d3efba0SPeter Maydell         ts->in_sigsuspend = 0;
13903d3efba0SPeter Maydell         set = ts->signal_mask;
13913d3efba0SPeter Maydell         sigdelset(&set, SIGSEGV);
13923d3efba0SPeter Maydell         sigdelset(&set, SIGBUS);
13933d3efba0SPeter Maydell         sigprocmask(SIG_SETMASK, &set, 0);
13943d3efba0SPeter Maydell     }
13953d3efba0SPeter Maydell     ts->in_sigsuspend = 0;
1396e902d588SPeter Maydell }
13970a99f093SRichard Henderson 
process_sigsuspend_mask(sigset_t ** pset,target_ulong sigset,target_ulong sigsize)13980a99f093SRichard Henderson int process_sigsuspend_mask(sigset_t **pset, target_ulong sigset,
13990a99f093SRichard Henderson                             target_ulong sigsize)
14000a99f093SRichard Henderson {
1401e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
14020a99f093SRichard Henderson     sigset_t *host_set = &ts->sigsuspend_mask;
14030a99f093SRichard Henderson     target_sigset_t *target_sigset;
14040a99f093SRichard Henderson 
14050a99f093SRichard Henderson     if (sigsize != sizeof(*target_sigset)) {
14060a99f093SRichard Henderson         /* Like the kernel, we enforce correct size sigsets */
14070a99f093SRichard Henderson         return -TARGET_EINVAL;
14080a99f093SRichard Henderson     }
14090a99f093SRichard Henderson 
14100a99f093SRichard Henderson     target_sigset = lock_user(VERIFY_READ, sigset, sigsize, 1);
14110a99f093SRichard Henderson     if (!target_sigset) {
14120a99f093SRichard Henderson         return -TARGET_EFAULT;
14130a99f093SRichard Henderson     }
14140a99f093SRichard Henderson     target_to_host_sigset(host_set, target_sigset);
14150a99f093SRichard Henderson     unlock_user(target_sigset, sigset, 0);
14160a99f093SRichard Henderson 
14170a99f093SRichard Henderson     *pset = host_set;
14180a99f093SRichard Henderson     return 0;
14190a99f093SRichard Henderson }
1420