xref: /openbmc/qemu/linux-user/signal.c (revision 8bdd3abc)
131e31b8aSbellard /*
266fb9763Sbellard  *  Emulation of Linux signals
331e31b8aSbellard  *
431e31b8aSbellard  *  Copyright (c) 2003 Fabrice Bellard
531e31b8aSbellard  *
631e31b8aSbellard  *  This program is free software; you can redistribute it and/or modify
731e31b8aSbellard  *  it under the terms of the GNU General Public License as published by
831e31b8aSbellard  *  the Free Software Foundation; either version 2 of the License, or
931e31b8aSbellard  *  (at your option) any later version.
1031e31b8aSbellard  *
1131e31b8aSbellard  *  This program is distributed in the hope that it will be useful,
1231e31b8aSbellard  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
1331e31b8aSbellard  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
1431e31b8aSbellard  *  GNU General Public License for more details.
1531e31b8aSbellard  *
1631e31b8aSbellard  *  You should have received a copy of the GNU General Public License
178167ee88SBlue Swirl  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
1831e31b8aSbellard  */
19d39594e9SPeter Maydell #include "qemu/osdep.h"
20a70dadc7SPeter Maydell #include "qemu/bitops.h"
21d96bf49bSAlex Bennée #include "gdbstub/user.h"
22e6037d04SRichard Henderson #include "hw/core/tcg-cpu-ops.h"
2385b4fa0cSPeter Maydell 
2431e31b8aSbellard #include <sys/ucontext.h>
25edf8e2afSMika Westerberg #include <sys/resource.h>
2631e31b8aSbellard 
273ef693a0Sbellard #include "qemu.h"
283b249d26SPeter Maydell #include "user-internals.h"
29a44d57a3SPeter Maydell #include "strace.h"
303ad0a769SPeter Maydell #include "loader.h"
31c8ee0a44SPaolo Bonzini #include "trace.h"
32befb7447SLaurent Vivier #include "signal-common.h"
33e6037d04SRichard Henderson #include "host-signal.h"
34bbf15aafSRichard Henderson #include "user/safe-syscall.h"
357dfd3ca8SHelge Deller #include "tcg/tcg.h"
3666fb9763Sbellard 
37624f7979Spbrook static struct target_sigaction sigact_table[TARGET_NSIG];
3831e31b8aSbellard 
3966fb9763Sbellard static void host_signal_handler(int host_signum, siginfo_t *info,
4066fb9763Sbellard                                 void *puc);
4166fb9763Sbellard 
42db2af69dSRichard Henderson /* Fallback addresses into sigtramp page. */
43db2af69dSRichard Henderson abi_ulong default_sigreturn;
44db2af69dSRichard Henderson abi_ulong default_rt_sigreturn;
459fcff3a6SLaurent Vivier 
469fcff3a6SLaurent Vivier /*
47b60b91aaSRichard Henderson  * System includes define _NSIG as SIGRTMAX + 1, but qemu (like the kernel)
48b60b91aaSRichard Henderson  * defines TARGET_NSIG as TARGET_SIGRTMAX and the first signal is 1.
499fcff3a6SLaurent Vivier  * Signal number 0 is reserved for use as kill(pid, 0), to test whether
509fcff3a6SLaurent Vivier  * a process exists without sending it a signal.
519fcff3a6SLaurent Vivier  */
52144bff03SMichael Forney #ifdef __SIGRTMAX
539fcff3a6SLaurent Vivier QEMU_BUILD_BUG_ON(__SIGRTMAX + 1 != _NSIG);
54144bff03SMichael Forney #endif
553ca05588SArnaud Patard static uint8_t host_to_target_signal_table[_NSIG] = {
567b72aa1dSHelge Deller #define MAKE_SIG_ENTRY(sig)     [sig] = TARGET_##sig,
577b72aa1dSHelge Deller         MAKE_SIGNAL_LIST
587b72aa1dSHelge Deller #undef MAKE_SIG_ENTRY
599e5f5284Sbellard };
609e5f5284Sbellard 
619fcff3a6SLaurent Vivier static uint8_t target_to_host_signal_table[TARGET_NSIG + 1];
629fcff3a6SLaurent Vivier 
639fcff3a6SLaurent Vivier /* valid sig is between 1 and _NSIG - 1 */
host_to_target_signal(int sig)641d9d8b55Spbrook int host_to_target_signal(int sig)
6531e31b8aSbellard {
66b60b91aaSRichard Henderson     if (sig < 1) {
674cb05961Spbrook         return sig;
689fcff3a6SLaurent Vivier     }
69b60b91aaSRichard Henderson     if (sig >= _NSIG) {
70b60b91aaSRichard Henderson         return TARGET_NSIG + 1;
71b60b91aaSRichard Henderson     }
729e5f5284Sbellard     return host_to_target_signal_table[sig];
7331e31b8aSbellard }
7431e31b8aSbellard 
759fcff3a6SLaurent Vivier /* valid sig is between 1 and TARGET_NSIG */
target_to_host_signal(int sig)764cb05961Spbrook int target_to_host_signal(int sig)
7731e31b8aSbellard {
78b60b91aaSRichard Henderson     if (sig < 1) {
794cb05961Spbrook         return sig;
809fcff3a6SLaurent Vivier     }
81b60b91aaSRichard Henderson     if (sig > TARGET_NSIG) {
82b60b91aaSRichard Henderson         return _NSIG;
83b60b91aaSRichard Henderson     }
849e5f5284Sbellard     return target_to_host_signal_table[sig];
8531e31b8aSbellard }
8631e31b8aSbellard 
target_sigaddset(target_sigset_t * set,int signum)87c227f099SAnthony Liguori static inline void target_sigaddset(target_sigset_t *set, int signum)
88f5545b5cSpbrook {
89f5545b5cSpbrook     signum--;
90f5545b5cSpbrook     abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
91f5545b5cSpbrook     set->sig[signum / TARGET_NSIG_BPW] |= mask;
92f5545b5cSpbrook }
93f5545b5cSpbrook 
target_sigismember(const target_sigset_t * set,int signum)94c227f099SAnthony Liguori static inline int target_sigismember(const target_sigset_t *set, int signum)
95f5545b5cSpbrook {
96f5545b5cSpbrook     signum--;
97f5545b5cSpbrook     abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
98f5545b5cSpbrook     return ((set->sig[signum / TARGET_NSIG_BPW] & mask) != 0);
99f5545b5cSpbrook }
100f5545b5cSpbrook 
host_to_target_sigset_internal(target_sigset_t * d,const sigset_t * s)101befb7447SLaurent Vivier void host_to_target_sigset_internal(target_sigset_t *d,
1029231944dSbellard                                     const sigset_t *s)
10366fb9763Sbellard {
1049fcff3a6SLaurent Vivier     int host_sig, target_sig;
105f5545b5cSpbrook     target_sigemptyset(d);
1069fcff3a6SLaurent Vivier     for (host_sig = 1; host_sig < _NSIG; host_sig++) {
1079fcff3a6SLaurent Vivier         target_sig = host_to_target_signal(host_sig);
1089fcff3a6SLaurent Vivier         if (target_sig < 1 || target_sig > TARGET_NSIG) {
1099fcff3a6SLaurent Vivier             continue;
1109fcff3a6SLaurent Vivier         }
1119fcff3a6SLaurent Vivier         if (sigismember(s, host_sig)) {
1129fcff3a6SLaurent Vivier             target_sigaddset(d, target_sig);
1139e5f5284Sbellard         }
11466fb9763Sbellard     }
11566fb9763Sbellard }
11666fb9763Sbellard 
host_to_target_sigset(target_sigset_t * d,const sigset_t * s)117c227f099SAnthony Liguori void host_to_target_sigset(target_sigset_t *d, const sigset_t *s)
1189231944dSbellard {
119c227f099SAnthony Liguori     target_sigset_t d1;
1209231944dSbellard     int i;
1219231944dSbellard 
1229231944dSbellard     host_to_target_sigset_internal(&d1, s);
1239231944dSbellard     for(i = 0;i < TARGET_NSIG_WORDS; i++)
124cbb21eedSMatthias Braun         d->sig[i] = tswapal(d1.sig[i]);
1259231944dSbellard }
1269231944dSbellard 
target_to_host_sigset_internal(sigset_t * d,const target_sigset_t * s)127befb7447SLaurent Vivier void target_to_host_sigset_internal(sigset_t *d,
128c227f099SAnthony Liguori                                     const target_sigset_t *s)
12966fb9763Sbellard {
1309fcff3a6SLaurent Vivier     int host_sig, target_sig;
131f5545b5cSpbrook     sigemptyset(d);
1329fcff3a6SLaurent Vivier     for (target_sig = 1; target_sig <= TARGET_NSIG; target_sig++) {
1339fcff3a6SLaurent Vivier         host_sig = target_to_host_signal(target_sig);
1349fcff3a6SLaurent Vivier         if (host_sig < 1 || host_sig >= _NSIG) {
1359fcff3a6SLaurent Vivier             continue;
1369fcff3a6SLaurent Vivier         }
1379fcff3a6SLaurent Vivier         if (target_sigismember(s, target_sig)) {
1389fcff3a6SLaurent Vivier             sigaddset(d, host_sig);
1399e5f5284Sbellard         }
14066fb9763Sbellard     }
14166fb9763Sbellard }
14266fb9763Sbellard 
target_to_host_sigset(sigset_t * d,const target_sigset_t * s)143c227f099SAnthony Liguori void target_to_host_sigset(sigset_t *d, const target_sigset_t *s)
1449231944dSbellard {
145c227f099SAnthony Liguori     target_sigset_t s1;
1469231944dSbellard     int i;
1479231944dSbellard 
1489231944dSbellard     for(i = 0;i < TARGET_NSIG_WORDS; i++)
149cbb21eedSMatthias Braun         s1.sig[i] = tswapal(s->sig[i]);
1509231944dSbellard     target_to_host_sigset_internal(d, &s1);
1519231944dSbellard }
1529231944dSbellard 
host_to_target_old_sigset(abi_ulong * old_sigset,const sigset_t * sigset)153992f48a0Sblueswir1 void host_to_target_old_sigset(abi_ulong *old_sigset,
15466fb9763Sbellard                                const sigset_t *sigset)
15566fb9763Sbellard {
156c227f099SAnthony Liguori     target_sigset_t d;
1579e5f5284Sbellard     host_to_target_sigset(&d, sigset);
1589e5f5284Sbellard     *old_sigset = d.sig[0];
15966fb9763Sbellard }
16066fb9763Sbellard 
target_to_host_old_sigset(sigset_t * sigset,const abi_ulong * old_sigset)16166fb9763Sbellard void target_to_host_old_sigset(sigset_t *sigset,
162992f48a0Sblueswir1                                const abi_ulong *old_sigset)
16366fb9763Sbellard {
164c227f099SAnthony Liguori     target_sigset_t d;
1659e5f5284Sbellard     int i;
1669e5f5284Sbellard 
1679e5f5284Sbellard     d.sig[0] = *old_sigset;
1689e5f5284Sbellard     for(i = 1;i < TARGET_NSIG_WORDS; i++)
1699e5f5284Sbellard         d.sig[i] = 0;
1709e5f5284Sbellard     target_to_host_sigset(sigset, &d);
17166fb9763Sbellard }
17266fb9763Sbellard 
block_signals(void)1733d3efba0SPeter Maydell int block_signals(void)
1743d3efba0SPeter Maydell {
1753d3efba0SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
1763d3efba0SPeter Maydell     sigset_t set;
1773d3efba0SPeter Maydell 
1783d3efba0SPeter Maydell     /* It's OK to block everything including SIGSEGV, because we won't
1793d3efba0SPeter Maydell      * run any further guest code before unblocking signals in
1803d3efba0SPeter Maydell      * process_pending_signals().
1813d3efba0SPeter Maydell      */
1823d3efba0SPeter Maydell     sigfillset(&set);
1833d3efba0SPeter Maydell     sigprocmask(SIG_SETMASK, &set, 0);
1843d3efba0SPeter Maydell 
185d73415a3SStefan Hajnoczi     return qatomic_xchg(&ts->signal_pending, 1);
1863d3efba0SPeter Maydell }
1873d3efba0SPeter Maydell 
1881c275925SAlex Barcelo /* Wrapper for sigprocmask function
1891c275925SAlex Barcelo  * Emulates a sigprocmask in a safe way for the guest. Note that set and oldset
190af254a27SRichard Henderson  * are host signal set, not guest ones. Returns -QEMU_ERESTARTSYS if
1913d3efba0SPeter Maydell  * a signal was already pending and the syscall must be restarted, or
1923d3efba0SPeter Maydell  * 0 on success.
1933d3efba0SPeter Maydell  * If set is NULL, this is guaranteed not to fail.
1941c275925SAlex Barcelo  */
do_sigprocmask(int how,const sigset_t * set,sigset_t * oldset)1951c275925SAlex Barcelo int do_sigprocmask(int how, const sigset_t *set, sigset_t *oldset)
1961c275925SAlex Barcelo {
1973d3efba0SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
1983d3efba0SPeter Maydell 
1993d3efba0SPeter Maydell     if (oldset) {
2003d3efba0SPeter Maydell         *oldset = ts->signal_mask;
2013d3efba0SPeter Maydell     }
202a7ec0f98SPeter Maydell 
203a7ec0f98SPeter Maydell     if (set) {
2043d3efba0SPeter Maydell         int i;
205a7ec0f98SPeter Maydell 
2063d3efba0SPeter Maydell         if (block_signals()) {
207af254a27SRichard Henderson             return -QEMU_ERESTARTSYS;
2083d3efba0SPeter Maydell         }
209a7ec0f98SPeter Maydell 
210a7ec0f98SPeter Maydell         switch (how) {
211a7ec0f98SPeter Maydell         case SIG_BLOCK:
2123d3efba0SPeter Maydell             sigorset(&ts->signal_mask, &ts->signal_mask, set);
213a7ec0f98SPeter Maydell             break;
214a7ec0f98SPeter Maydell         case SIG_UNBLOCK:
2153d3efba0SPeter Maydell             for (i = 1; i <= NSIG; ++i) {
2163d3efba0SPeter Maydell                 if (sigismember(set, i)) {
2173d3efba0SPeter Maydell                     sigdelset(&ts->signal_mask, i);
2183d3efba0SPeter Maydell                 }
219a7ec0f98SPeter Maydell             }
220a7ec0f98SPeter Maydell             break;
221a7ec0f98SPeter Maydell         case SIG_SETMASK:
2223d3efba0SPeter Maydell             ts->signal_mask = *set;
223a7ec0f98SPeter Maydell             break;
224a7ec0f98SPeter Maydell         default:
225a7ec0f98SPeter Maydell             g_assert_not_reached();
226a7ec0f98SPeter Maydell         }
2273d3efba0SPeter Maydell 
2283d3efba0SPeter Maydell         /* Silently ignore attempts to change blocking status of KILL or STOP */
2293d3efba0SPeter Maydell         sigdelset(&ts->signal_mask, SIGKILL);
2303d3efba0SPeter Maydell         sigdelset(&ts->signal_mask, SIGSTOP);
231a7ec0f98SPeter Maydell     }
2323d3efba0SPeter Maydell     return 0;
2331c275925SAlex Barcelo }
2341c275925SAlex Barcelo 
2353d3efba0SPeter Maydell /* Just set the guest's signal mask to the specified value; the
2363d3efba0SPeter Maydell  * caller is assumed to have called block_signals() already.
2373d3efba0SPeter Maydell  */
set_sigmask(const sigset_t * set)238befb7447SLaurent Vivier void set_sigmask(const sigset_t *set)
2399eede5b6SPeter Maydell {
2403d3efba0SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
2413d3efba0SPeter Maydell 
2423d3efba0SPeter Maydell     ts->signal_mask = *set;
2439eede5b6SPeter Maydell }
2449eede5b6SPeter Maydell 
245465e237bSLaurent Vivier /* sigaltstack management */
246465e237bSLaurent Vivier 
on_sig_stack(unsigned long sp)247465e237bSLaurent Vivier int on_sig_stack(unsigned long sp)
248465e237bSLaurent Vivier {
2495bfce0b7SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
2505bfce0b7SPeter Maydell 
2515bfce0b7SPeter Maydell     return (sp - ts->sigaltstack_used.ss_sp
2525bfce0b7SPeter Maydell             < ts->sigaltstack_used.ss_size);
253465e237bSLaurent Vivier }
254465e237bSLaurent Vivier 
sas_ss_flags(unsigned long sp)255465e237bSLaurent Vivier int sas_ss_flags(unsigned long sp)
256465e237bSLaurent Vivier {
2575bfce0b7SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
2585bfce0b7SPeter Maydell 
2595bfce0b7SPeter Maydell     return (ts->sigaltstack_used.ss_size == 0 ? SS_DISABLE
260465e237bSLaurent Vivier             : on_sig_stack(sp) ? SS_ONSTACK : 0);
261465e237bSLaurent Vivier }
262465e237bSLaurent Vivier 
target_sigsp(abi_ulong sp,struct target_sigaction * ka)263465e237bSLaurent Vivier abi_ulong target_sigsp(abi_ulong sp, struct target_sigaction *ka)
264465e237bSLaurent Vivier {
265465e237bSLaurent Vivier     /*
266465e237bSLaurent Vivier      * This is the X/Open sanctioned signal stack switching.
267465e237bSLaurent Vivier      */
2685bfce0b7SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
2695bfce0b7SPeter Maydell 
270465e237bSLaurent Vivier     if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) {
2715bfce0b7SPeter Maydell         return ts->sigaltstack_used.ss_sp + ts->sigaltstack_used.ss_size;
272465e237bSLaurent Vivier     }
273465e237bSLaurent Vivier     return sp;
274465e237bSLaurent Vivier }
275465e237bSLaurent Vivier 
target_save_altstack(target_stack_t * uss,CPUArchState * env)276465e237bSLaurent Vivier void target_save_altstack(target_stack_t *uss, CPUArchState *env)
277465e237bSLaurent Vivier {
2785bfce0b7SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
2795bfce0b7SPeter Maydell 
2805bfce0b7SPeter Maydell     __put_user(ts->sigaltstack_used.ss_sp, &uss->ss_sp);
281465e237bSLaurent Vivier     __put_user(sas_ss_flags(get_sp_from_cpustate(env)), &uss->ss_flags);
2825bfce0b7SPeter Maydell     __put_user(ts->sigaltstack_used.ss_size, &uss->ss_size);
283465e237bSLaurent Vivier }
284465e237bSLaurent Vivier 
target_restore_altstack(target_stack_t * uss,CPUArchState * env)285ddc3e74dSRichard Henderson abi_long target_restore_altstack(target_stack_t *uss, CPUArchState *env)
28692bad948SRichard Henderson {
28792bad948SRichard Henderson     TaskState *ts = (TaskState *)thread_cpu->opaque;
28892bad948SRichard Henderson     size_t minstacksize = TARGET_MINSIGSTKSZ;
28992bad948SRichard Henderson     target_stack_t ss;
29092bad948SRichard Henderson 
29192bad948SRichard Henderson #if defined(TARGET_PPC64)
29292bad948SRichard Henderson     /* ELF V2 for PPC64 has a 4K minimum stack size for signal handlers */
29392bad948SRichard Henderson     struct image_info *image = ts->info;
29492bad948SRichard Henderson     if (get_ppc64_abi(image) > 1) {
29592bad948SRichard Henderson         minstacksize = 4096;
29692bad948SRichard Henderson     }
29792bad948SRichard Henderson #endif
29892bad948SRichard Henderson 
29992bad948SRichard Henderson     __get_user(ss.ss_sp, &uss->ss_sp);
30092bad948SRichard Henderson     __get_user(ss.ss_size, &uss->ss_size);
30192bad948SRichard Henderson     __get_user(ss.ss_flags, &uss->ss_flags);
30292bad948SRichard Henderson 
303ddc3e74dSRichard Henderson     if (on_sig_stack(get_sp_from_cpustate(env))) {
30492bad948SRichard Henderson         return -TARGET_EPERM;
30592bad948SRichard Henderson     }
30692bad948SRichard Henderson 
30792bad948SRichard Henderson     switch (ss.ss_flags) {
30892bad948SRichard Henderson     default:
30992bad948SRichard Henderson         return -TARGET_EINVAL;
31092bad948SRichard Henderson 
31192bad948SRichard Henderson     case TARGET_SS_DISABLE:
31292bad948SRichard Henderson         ss.ss_size = 0;
31392bad948SRichard Henderson         ss.ss_sp = 0;
31492bad948SRichard Henderson         break;
31592bad948SRichard Henderson 
31692bad948SRichard Henderson     case TARGET_SS_ONSTACK:
31792bad948SRichard Henderson     case 0:
31892bad948SRichard Henderson         if (ss.ss_size < minstacksize) {
31992bad948SRichard Henderson             return -TARGET_ENOMEM;
32092bad948SRichard Henderson         }
32192bad948SRichard Henderson         break;
32292bad948SRichard Henderson     }
32392bad948SRichard Henderson 
32492bad948SRichard Henderson     ts->sigaltstack_used.ss_sp = ss.ss_sp;
32592bad948SRichard Henderson     ts->sigaltstack_used.ss_size = ss.ss_size;
32692bad948SRichard Henderson     return 0;
32792bad948SRichard Henderson }
32892bad948SRichard Henderson 
3299de5e440Sbellard /* siginfo conversion */
3309de5e440Sbellard 
host_to_target_siginfo_noswap(target_siginfo_t * tinfo,const siginfo_t * info)331c227f099SAnthony Liguori static inline void host_to_target_siginfo_noswap(target_siginfo_t *tinfo,
3329de5e440Sbellard                                                  const siginfo_t *info)
33366fb9763Sbellard {
334a05c6409SRichard Henderson     int sig = host_to_target_signal(info->si_signo);
335a70dadc7SPeter Maydell     int si_code = info->si_code;
336a70dadc7SPeter Maydell     int si_type;
3379de5e440Sbellard     tinfo->si_signo = sig;
3389de5e440Sbellard     tinfo->si_errno = 0;
339afd7cd92Spbrook     tinfo->si_code = info->si_code;
340a05c6409SRichard Henderson 
34155d72a7eSPeter Maydell     /* This memset serves two purposes:
34255d72a7eSPeter Maydell      * (1) ensure we don't leak random junk to the guest later
34355d72a7eSPeter Maydell      * (2) placate false positives from gcc about fields
34455d72a7eSPeter Maydell      *     being used uninitialized if it chooses to inline both this
34555d72a7eSPeter Maydell      *     function and tswap_siginfo() into host_to_target_siginfo().
34655d72a7eSPeter Maydell      */
34755d72a7eSPeter Maydell     memset(tinfo->_sifields._pad, 0, sizeof(tinfo->_sifields._pad));
34855d72a7eSPeter Maydell 
349a70dadc7SPeter Maydell     /* This is awkward, because we have to use a combination of
350a70dadc7SPeter Maydell      * the si_code and si_signo to figure out which of the union's
351a70dadc7SPeter Maydell      * members are valid. (Within the host kernel it is always possible
352a70dadc7SPeter Maydell      * to tell, but the kernel carefully avoids giving userspace the
353a70dadc7SPeter Maydell      * high 16 bits of si_code, so we don't have the information to
354a70dadc7SPeter Maydell      * do this the easy way...) We therefore make our best guess,
355a70dadc7SPeter Maydell      * bearing in mind that a guest can spoof most of the si_codes
356a70dadc7SPeter Maydell      * via rt_sigqueueinfo() if it likes.
357a70dadc7SPeter Maydell      *
358a70dadc7SPeter Maydell      * Once we have made our guess, we record it in the top 16 bits of
359a70dadc7SPeter Maydell      * the si_code, so that tswap_siginfo() later can use it.
360a70dadc7SPeter Maydell      * tswap_siginfo() will strip these top bits out before writing
361a70dadc7SPeter Maydell      * si_code to the guest (sign-extending the lower bits).
362a70dadc7SPeter Maydell      */
363a70dadc7SPeter Maydell 
364a70dadc7SPeter Maydell     switch (si_code) {
365a70dadc7SPeter Maydell     case SI_USER:
366a70dadc7SPeter Maydell     case SI_TKILL:
367a70dadc7SPeter Maydell     case SI_KERNEL:
368a70dadc7SPeter Maydell         /* Sent via kill(), tkill() or tgkill(), or direct from the kernel.
369a70dadc7SPeter Maydell          * These are the only unspoofable si_code values.
370a70dadc7SPeter Maydell          */
371a70dadc7SPeter Maydell         tinfo->_sifields._kill._pid = info->si_pid;
372a70dadc7SPeter Maydell         tinfo->_sifields._kill._uid = info->si_uid;
373a70dadc7SPeter Maydell         si_type = QEMU_SI_KILL;
374a70dadc7SPeter Maydell         break;
375a70dadc7SPeter Maydell     default:
376a70dadc7SPeter Maydell         /* Everything else is spoofable. Make best guess based on signal */
377a70dadc7SPeter Maydell         switch (sig) {
378a70dadc7SPeter Maydell         case TARGET_SIGCHLD:
379a05c6409SRichard Henderson             tinfo->_sifields._sigchld._pid = info->si_pid;
380a05c6409SRichard Henderson             tinfo->_sifields._sigchld._uid = info->si_uid;
381139e5de7SMatthias Schiffer             if (si_code == CLD_EXITED)
3821c3dfb50SAlistair Francis                 tinfo->_sifields._sigchld._status = info->si_status;
383139e5de7SMatthias Schiffer             else
384139e5de7SMatthias Schiffer                 tinfo->_sifields._sigchld._status
385139e5de7SMatthias Schiffer                     = host_to_target_signal(info->si_status & 0x7f)
386139e5de7SMatthias Schiffer                         | (info->si_status & ~0x7f);
387a05c6409SRichard Henderson             tinfo->_sifields._sigchld._utime = info->si_utime;
388a05c6409SRichard Henderson             tinfo->_sifields._sigchld._stime = info->si_stime;
389a70dadc7SPeter Maydell             si_type = QEMU_SI_CHLD;
390a70dadc7SPeter Maydell             break;
391a70dadc7SPeter Maydell         case TARGET_SIGIO:
392a70dadc7SPeter Maydell             tinfo->_sifields._sigpoll._band = info->si_band;
393a70dadc7SPeter Maydell             tinfo->_sifields._sigpoll._fd = info->si_fd;
394a70dadc7SPeter Maydell             si_type = QEMU_SI_POLL;
395a70dadc7SPeter Maydell             break;
396a70dadc7SPeter Maydell         default:
397a70dadc7SPeter Maydell             /* Assume a sigqueue()/mq_notify()/rt_sigqueueinfo() source. */
3989de5e440Sbellard             tinfo->_sifields._rt._pid = info->si_pid;
3999de5e440Sbellard             tinfo->_sifields._rt._uid = info->si_uid;
4009de5e440Sbellard             /* XXX: potential problem if 64 bit */
401a05c6409SRichard Henderson             tinfo->_sifields._rt._sigval.sival_ptr
402a05c6409SRichard Henderson                 = (abi_ulong)(unsigned long)info->si_value.sival_ptr;
403a70dadc7SPeter Maydell             si_type = QEMU_SI_RT;
404a70dadc7SPeter Maydell             break;
4059de5e440Sbellard         }
406a70dadc7SPeter Maydell         break;
407a70dadc7SPeter Maydell     }
408a70dadc7SPeter Maydell 
409a70dadc7SPeter Maydell     tinfo->si_code = deposit32(si_code, 16, 16, si_type);
41066fb9763Sbellard }
41166fb9763Sbellard 
tswap_siginfo(target_siginfo_t * tinfo,const target_siginfo_t * info)412befb7447SLaurent Vivier void tswap_siginfo(target_siginfo_t *tinfo,
413c227f099SAnthony Liguori                    const target_siginfo_t *info)
4149de5e440Sbellard {
415a70dadc7SPeter Maydell     int si_type = extract32(info->si_code, 16, 16);
416a70dadc7SPeter Maydell     int si_code = sextract32(info->si_code, 0, 16);
417a05c6409SRichard Henderson 
418a70dadc7SPeter Maydell     __put_user(info->si_signo, &tinfo->si_signo);
419a70dadc7SPeter Maydell     __put_user(info->si_errno, &tinfo->si_errno);
420a70dadc7SPeter Maydell     __put_user(si_code, &tinfo->si_code);
421a70dadc7SPeter Maydell 
422a70dadc7SPeter Maydell     /* We can use our internal marker of which fields in the structure
423a70dadc7SPeter Maydell      * are valid, rather than duplicating the guesswork of
424a70dadc7SPeter Maydell      * host_to_target_siginfo_noswap() here.
425a70dadc7SPeter Maydell      */
426a70dadc7SPeter Maydell     switch (si_type) {
427a70dadc7SPeter Maydell     case QEMU_SI_KILL:
428a70dadc7SPeter Maydell         __put_user(info->_sifields._kill._pid, &tinfo->_sifields._kill._pid);
429a70dadc7SPeter Maydell         __put_user(info->_sifields._kill._uid, &tinfo->_sifields._kill._uid);
430a70dadc7SPeter Maydell         break;
431a70dadc7SPeter Maydell     case QEMU_SI_TIMER:
432a70dadc7SPeter Maydell         __put_user(info->_sifields._timer._timer1,
433a70dadc7SPeter Maydell                    &tinfo->_sifields._timer._timer1);
434a70dadc7SPeter Maydell         __put_user(info->_sifields._timer._timer2,
435a70dadc7SPeter Maydell                    &tinfo->_sifields._timer._timer2);
436a70dadc7SPeter Maydell         break;
437a70dadc7SPeter Maydell     case QEMU_SI_POLL:
438a70dadc7SPeter Maydell         __put_user(info->_sifields._sigpoll._band,
439a70dadc7SPeter Maydell                    &tinfo->_sifields._sigpoll._band);
440a70dadc7SPeter Maydell         __put_user(info->_sifields._sigpoll._fd,
441a70dadc7SPeter Maydell                    &tinfo->_sifields._sigpoll._fd);
442a70dadc7SPeter Maydell         break;
443a70dadc7SPeter Maydell     case QEMU_SI_FAULT:
444a70dadc7SPeter Maydell         __put_user(info->_sifields._sigfault._addr,
445a70dadc7SPeter Maydell                    &tinfo->_sifields._sigfault._addr);
446a70dadc7SPeter Maydell         break;
447a70dadc7SPeter Maydell     case QEMU_SI_CHLD:
448a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._pid,
449a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._pid);
450a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._uid,
451a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._uid);
452a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._status,
453a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._status);
454a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._utime,
455a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._utime);
456a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._stime,
457a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._stime);
458a70dadc7SPeter Maydell         break;
459a70dadc7SPeter Maydell     case QEMU_SI_RT:
460a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._pid, &tinfo->_sifields._rt._pid);
461a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._uid, &tinfo->_sifields._rt._uid);
462a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._sigval.sival_ptr,
463a70dadc7SPeter Maydell                    &tinfo->_sifields._rt._sigval.sival_ptr);
464a70dadc7SPeter Maydell         break;
465a70dadc7SPeter Maydell     default:
466a70dadc7SPeter Maydell         g_assert_not_reached();
4679de5e440Sbellard     }
4689de5e440Sbellard }
4699de5e440Sbellard 
host_to_target_siginfo(target_siginfo_t * tinfo,const siginfo_t * info)470c227f099SAnthony Liguori void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info)
4719de5e440Sbellard {
47255d72a7eSPeter Maydell     target_siginfo_t tgt_tmp;
47355d72a7eSPeter Maydell     host_to_target_siginfo_noswap(&tgt_tmp, info);
47455d72a7eSPeter Maydell     tswap_siginfo(tinfo, &tgt_tmp);
4759de5e440Sbellard }
4769de5e440Sbellard 
4779de5e440Sbellard /* XXX: we support only POSIX RT signals are used. */
478aa1f17c1Sths /* XXX: find a solution for 64 bit (additional malloced data is needed) */
target_to_host_siginfo(siginfo_t * info,const target_siginfo_t * tinfo)479c227f099SAnthony Liguori void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo)
48066fb9763Sbellard {
48190c0f080SPeter Maydell     /* This conversion is used only for the rt_sigqueueinfo syscall,
48290c0f080SPeter Maydell      * and so we know that the _rt fields are the valid ones.
48390c0f080SPeter Maydell      */
48490c0f080SPeter Maydell     abi_ulong sival_ptr;
48590c0f080SPeter Maydell 
48690c0f080SPeter Maydell     __get_user(info->si_signo, &tinfo->si_signo);
48790c0f080SPeter Maydell     __get_user(info->si_errno, &tinfo->si_errno);
48890c0f080SPeter Maydell     __get_user(info->si_code, &tinfo->si_code);
48990c0f080SPeter Maydell     __get_user(info->si_pid, &tinfo->_sifields._rt._pid);
49090c0f080SPeter Maydell     __get_user(info->si_uid, &tinfo->_sifields._rt._uid);
49190c0f080SPeter Maydell     __get_user(sival_ptr, &tinfo->_sifields._rt._sigval.sival_ptr);
49290c0f080SPeter Maydell     info->si_value.sival_ptr = (void *)(long)sival_ptr;
49366fb9763Sbellard }
49466fb9763Sbellard 
495edf8e2afSMika Westerberg /* returns 1 if given signal should dump core if not handled */
core_dump_signal(int sig)496edf8e2afSMika Westerberg static int core_dump_signal(int sig)
497edf8e2afSMika Westerberg {
498edf8e2afSMika Westerberg     switch (sig) {
499edf8e2afSMika Westerberg     case TARGET_SIGABRT:
500edf8e2afSMika Westerberg     case TARGET_SIGFPE:
501edf8e2afSMika Westerberg     case TARGET_SIGILL:
502edf8e2afSMika Westerberg     case TARGET_SIGQUIT:
503edf8e2afSMika Westerberg     case TARGET_SIGSEGV:
504edf8e2afSMika Westerberg     case TARGET_SIGTRAP:
505edf8e2afSMika Westerberg     case TARGET_SIGBUS:
506edf8e2afSMika Westerberg         return (1);
507edf8e2afSMika Westerberg     default:
508edf8e2afSMika Westerberg         return (0);
509edf8e2afSMika Westerberg     }
510edf8e2afSMika Westerberg }
511edf8e2afSMika Westerberg 
signal_table_init(void)512365510fbSLaurent Vivier static void signal_table_init(void)
513365510fbSLaurent Vivier {
514b60b91aaSRichard Henderson     int hsig, tsig, count;
515365510fbSLaurent Vivier 
516365510fbSLaurent Vivier     /*
5176bc024e7SLaurent Vivier      * Signals are supported starting from TARGET_SIGRTMIN and going up
518b60b91aaSRichard Henderson      * until we run out of host realtime signals.  Glibc uses the lower 2
519b60b91aaSRichard Henderson      * RT signals and (hopefully) nobody uses the upper ones.
520b60b91aaSRichard Henderson      * This is why SIGRTMIN (34) is generally greater than __SIGRTMIN (32).
521b60b91aaSRichard Henderson      * To fix this properly we would need to do manual signal delivery
522b60b91aaSRichard Henderson      * multiplexed over a single host signal.
5236bc024e7SLaurent Vivier      * Attempts for configure "missing" signals via sigaction will be
5246bc024e7SLaurent Vivier      * silently ignored.
52538ee0a7dSRichard Henderson      *
52638ee0a7dSRichard Henderson      * Remap the target SIGABRT, so that we can distinguish host abort
52738ee0a7dSRichard Henderson      * from guest abort.  When the guest registers a signal handler or
52838ee0a7dSRichard Henderson      * calls raise(SIGABRT), the host will raise SIG_RTn.  If the guest
52938ee0a7dSRichard Henderson      * arrives at dump_core_and_abort(), we will map back to host SIGABRT
53038ee0a7dSRichard Henderson      * so that the parent (native or emulated) sees the correct signal.
53138ee0a7dSRichard Henderson      * Finally, also map host to guest SIGABRT so that the emulated
53238ee0a7dSRichard Henderson      * parent sees the correct mapping from wait status.
533365510fbSLaurent Vivier      */
53438ee0a7dSRichard Henderson 
53538ee0a7dSRichard Henderson     hsig = SIGRTMIN;
53638ee0a7dSRichard Henderson     host_to_target_signal_table[SIGABRT] = 0;
53738ee0a7dSRichard Henderson     host_to_target_signal_table[hsig++] = TARGET_SIGABRT;
53838ee0a7dSRichard Henderson 
53902d9f5b6SRichard Henderson     for (tsig = TARGET_SIGRTMIN;
54002d9f5b6SRichard Henderson          hsig <= SIGRTMAX && tsig <= TARGET_NSIG;
54102d9f5b6SRichard Henderson          hsig++, tsig++) {
542b60b91aaSRichard Henderson         host_to_target_signal_table[hsig] = tsig;
5436bc024e7SLaurent Vivier     }
544365510fbSLaurent Vivier 
545b60b91aaSRichard Henderson     /* Invert the mapping that has already been assigned. */
546b60b91aaSRichard Henderson     for (hsig = 1; hsig < _NSIG; hsig++) {
547b60b91aaSRichard Henderson         tsig = host_to_target_signal_table[hsig];
548b60b91aaSRichard Henderson         if (tsig) {
549b60b91aaSRichard Henderson             assert(target_to_host_signal_table[tsig] == 0);
550b60b91aaSRichard Henderson             target_to_host_signal_table[tsig] = hsig;
551365510fbSLaurent Vivier         }
552365510fbSLaurent Vivier     }
5536bc024e7SLaurent Vivier 
55438ee0a7dSRichard Henderson     host_to_target_signal_table[SIGABRT] = TARGET_SIGABRT;
55538ee0a7dSRichard Henderson 
556b60b91aaSRichard Henderson     /* Map everything else out-of-bounds. */
557b60b91aaSRichard Henderson     for (hsig = 1; hsig < _NSIG; hsig++) {
558b60b91aaSRichard Henderson         if (host_to_target_signal_table[hsig] == 0) {
559b60b91aaSRichard Henderson             host_to_target_signal_table[hsig] = TARGET_NSIG + 1;
560b60b91aaSRichard Henderson         }
561b60b91aaSRichard Henderson     }
562b60b91aaSRichard Henderson     for (count = 0, tsig = 1; tsig <= TARGET_NSIG; tsig++) {
563b60b91aaSRichard Henderson         if (target_to_host_signal_table[tsig] == 0) {
564b60b91aaSRichard Henderson             target_to_host_signal_table[tsig] = _NSIG;
5656bc024e7SLaurent Vivier             count++;
5666bc024e7SLaurent Vivier         }
5676bc024e7SLaurent Vivier     }
568b60b91aaSRichard Henderson 
5696bc024e7SLaurent Vivier     trace_signal_table_init(count);
5706bc024e7SLaurent Vivier }
571365510fbSLaurent Vivier 
signal_init(void)57231e31b8aSbellard void signal_init(void)
57331e31b8aSbellard {
5743d3efba0SPeter Maydell     TaskState *ts = (TaskState *)thread_cpu->opaque;
57558c4e36cSRichard Henderson     struct sigaction act, oact;
5769e5f5284Sbellard 
577365510fbSLaurent Vivier     /* initialize signal conversion tables */
578365510fbSLaurent Vivier     signal_table_init();
57931e31b8aSbellard 
5803d3efba0SPeter Maydell     /* Set the signal mask from the host mask. */
5813d3efba0SPeter Maydell     sigprocmask(0, 0, &ts->signal_mask);
5823d3efba0SPeter Maydell 
5839de5e440Sbellard     sigfillset(&act.sa_mask);
58431e31b8aSbellard     act.sa_flags = SA_SIGINFO;
58531e31b8aSbellard     act.sa_sigaction = host_signal_handler;
58658c4e36cSRichard Henderson 
58758c4e36cSRichard Henderson     /*
58858c4e36cSRichard Henderson      * A parent process may configure ignored signals, but all other
58958c4e36cSRichard Henderson      * signals are default.  For any target signals that have no host
59058c4e36cSRichard Henderson      * mapping, set to ignore.  For all core_dump_signal, install our
59158c4e36cSRichard Henderson      * host signal handler so that we may invoke dump_core_and_abort.
59258c4e36cSRichard Henderson      * This includes SIGSEGV and SIGBUS, which are also need our signal
59358c4e36cSRichard Henderson      * handler for paging and exceptions.
59458c4e36cSRichard Henderson      */
59558c4e36cSRichard Henderson     for (int tsig = 1; tsig <= TARGET_NSIG; tsig++) {
59658c4e36cSRichard Henderson         int hsig = target_to_host_signal(tsig);
59758c4e36cSRichard Henderson         abi_ptr thand = TARGET_SIG_IGN;
59858c4e36cSRichard Henderson 
59938ee0a7dSRichard Henderson         if (hsig >= _NSIG) {
60038ee0a7dSRichard Henderson             continue;
60138ee0a7dSRichard Henderson         }
60258c4e36cSRichard Henderson 
60338ee0a7dSRichard Henderson         /* As we force remap SIGABRT, cannot probe and install in one step. */
60438ee0a7dSRichard Henderson         if (tsig == TARGET_SIGABRT) {
60538ee0a7dSRichard Henderson             sigaction(SIGABRT, NULL, &oact);
60638ee0a7dSRichard Henderson             sigaction(hsig, &act, NULL);
60738ee0a7dSRichard Henderson         } else {
60838ee0a7dSRichard Henderson             struct sigaction *iact = core_dump_signal(tsig) ? &act : NULL;
60958c4e36cSRichard Henderson             sigaction(hsig, iact, &oact);
61038ee0a7dSRichard Henderson         }
61138ee0a7dSRichard Henderson 
61258c4e36cSRichard Henderson         if (oact.sa_sigaction != (void *)SIG_IGN) {
61358c4e36cSRichard Henderson             thand = TARGET_SIG_DFL;
61431e31b8aSbellard         }
61558c4e36cSRichard Henderson         sigact_table[tsig - 1]._sa_handler = thand;
616624f7979Spbrook     }
617dbde2c0cSRichard Henderson }
61831e31b8aSbellard 
619c599d4d6SPeter Maydell /* Force a synchronously taken signal. The kernel force_sig() function
620c599d4d6SPeter Maydell  * also forces the signal to "not blocked, not ignored", but for QEMU
621c599d4d6SPeter Maydell  * that work is done in process_pending_signals().
622c599d4d6SPeter Maydell  */
force_sig(int sig)623befb7447SLaurent Vivier void force_sig(int sig)
624c599d4d6SPeter Maydell {
625c599d4d6SPeter Maydell     CPUState *cpu = thread_cpu;
626b77af26eSRichard Henderson     CPUArchState *env = cpu_env(cpu);
627819121b9SPeter Maydell     target_siginfo_t info = {};
628c599d4d6SPeter Maydell 
629c599d4d6SPeter Maydell     info.si_signo = sig;
630c599d4d6SPeter Maydell     info.si_errno = 0;
631c599d4d6SPeter Maydell     info.si_code = TARGET_SI_KERNEL;
632c599d4d6SPeter Maydell     info._sifields._kill._pid = 0;
633c599d4d6SPeter Maydell     info._sifields._kill._uid = 0;
634c599d4d6SPeter Maydell     queue_signal(env, info.si_signo, QEMU_SI_KILL, &info);
635c599d4d6SPeter Maydell }
63609391669SPeter Maydell 
637af796960SPeter Maydell /*
638af796960SPeter Maydell  * Force a synchronously taken QEMU_SI_FAULT signal. For QEMU the
639af796960SPeter Maydell  * 'force' part is handled in process_pending_signals().
640af796960SPeter Maydell  */
force_sig_fault(int sig,int code,abi_ulong addr)641af796960SPeter Maydell void force_sig_fault(int sig, int code, abi_ulong addr)
642af796960SPeter Maydell {
643af796960SPeter Maydell     CPUState *cpu = thread_cpu;
644b77af26eSRichard Henderson     CPUArchState *env = cpu_env(cpu);
645af796960SPeter Maydell     target_siginfo_t info = {};
646af796960SPeter Maydell 
647af796960SPeter Maydell     info.si_signo = sig;
648af796960SPeter Maydell     info.si_errno = 0;
649af796960SPeter Maydell     info.si_code = code;
650af796960SPeter Maydell     info._sifields._sigfault._addr = addr;
651af796960SPeter Maydell     queue_signal(env, sig, QEMU_SI_FAULT, &info);
652af796960SPeter Maydell }
653af796960SPeter Maydell 
65409391669SPeter Maydell /* Force a SIGSEGV if we couldn't write to memory trying to set
65509391669SPeter Maydell  * up the signal frame. oldsig is the signal we were trying to handle
65609391669SPeter Maydell  * at the point of failure.
65709391669SPeter Maydell  */
65847ae93cdSMichael Clark #if !defined(TARGET_RISCV)
force_sigsegv(int oldsig)659befb7447SLaurent Vivier void force_sigsegv(int oldsig)
66009391669SPeter Maydell {
66109391669SPeter Maydell     if (oldsig == SIGSEGV) {
66209391669SPeter Maydell         /* Make sure we don't try to deliver the signal again; this will
663c599d4d6SPeter Maydell          * end up with handle_pending_signal() calling dump_core_and_abort().
66409391669SPeter Maydell          */
66509391669SPeter Maydell         sigact_table[oldsig - 1]._sa_handler = TARGET_SIG_DFL;
66609391669SPeter Maydell     }
667c4b35744SPeter Maydell     force_sig(TARGET_SIGSEGV);
66809391669SPeter Maydell }
66947ae93cdSMichael Clark #endif
67047ae93cdSMichael Clark 
cpu_loop_exit_sigsegv(CPUState * cpu,target_ulong addr,MMUAccessType access_type,bool maperr,uintptr_t ra)67172d2bbf9SRichard Henderson void cpu_loop_exit_sigsegv(CPUState *cpu, target_ulong addr,
67272d2bbf9SRichard Henderson                            MMUAccessType access_type, bool maperr, uintptr_t ra)
67372d2bbf9SRichard Henderson {
67472d2bbf9SRichard Henderson     const struct TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
67572d2bbf9SRichard Henderson 
67672d2bbf9SRichard Henderson     if (tcg_ops->record_sigsegv) {
67772d2bbf9SRichard Henderson         tcg_ops->record_sigsegv(cpu, addr, access_type, maperr, ra);
67872d2bbf9SRichard Henderson     }
67972d2bbf9SRichard Henderson 
68072d2bbf9SRichard Henderson     force_sig_fault(TARGET_SIGSEGV,
68172d2bbf9SRichard Henderson                     maperr ? TARGET_SEGV_MAPERR : TARGET_SEGV_ACCERR,
68272d2bbf9SRichard Henderson                     addr);
68372d2bbf9SRichard Henderson     cpu->exception_index = EXCP_INTERRUPT;
68472d2bbf9SRichard Henderson     cpu_loop_exit_restore(cpu, ra);
68572d2bbf9SRichard Henderson }
68672d2bbf9SRichard Henderson 
cpu_loop_exit_sigbus(CPUState * cpu,target_ulong addr,MMUAccessType access_type,uintptr_t ra)68712ed5640SRichard Henderson void cpu_loop_exit_sigbus(CPUState *cpu, target_ulong addr,
68812ed5640SRichard Henderson                           MMUAccessType access_type, uintptr_t ra)
68912ed5640SRichard Henderson {
69012ed5640SRichard Henderson     const struct TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
69112ed5640SRichard Henderson 
69212ed5640SRichard Henderson     if (tcg_ops->record_sigbus) {
69312ed5640SRichard Henderson         tcg_ops->record_sigbus(cpu, addr, access_type, ra);
69412ed5640SRichard Henderson     }
69512ed5640SRichard Henderson 
69612ed5640SRichard Henderson     force_sig_fault(TARGET_SIGBUS, TARGET_BUS_ADRALN, addr);
69712ed5640SRichard Henderson     cpu->exception_index = EXCP_INTERRUPT;
69812ed5640SRichard Henderson     cpu_loop_exit_restore(cpu, ra);
69912ed5640SRichard Henderson }
70012ed5640SRichard Henderson 
7019de5e440Sbellard /* abort execution with signal */
7028905770bSMarc-André Lureau static G_NORETURN
die_with_signal(int host_sig)703b8b50f1eSRichard Henderson void die_with_signal(int host_sig)
704b8b50f1eSRichard Henderson {
705b8b50f1eSRichard Henderson     struct sigaction act = {
706b8b50f1eSRichard Henderson         .sa_handler = SIG_DFL,
707b8b50f1eSRichard Henderson     };
708b8b50f1eSRichard Henderson 
709b8b50f1eSRichard Henderson     /*
710b8b50f1eSRichard Henderson      * The proper exit code for dying from an uncaught signal is -<signal>.
711b8b50f1eSRichard Henderson      * The kernel doesn't allow exit() or _exit() to pass a negative value.
712b8b50f1eSRichard Henderson      * To get the proper exit code we need to actually die from an uncaught
713b8b50f1eSRichard Henderson      * signal.  Here the default signal handler is installed, we send
714b8b50f1eSRichard Henderson      * the signal and we wait for it to arrive.
715b8b50f1eSRichard Henderson      */
716b8b50f1eSRichard Henderson     sigfillset(&act.sa_mask);
717b8b50f1eSRichard Henderson     sigaction(host_sig, &act, NULL);
718b8b50f1eSRichard Henderson 
719b8b50f1eSRichard Henderson     kill(getpid(), host_sig);
720b8b50f1eSRichard Henderson 
721b8b50f1eSRichard Henderson     /* Make sure the signal isn't masked (reusing the mask inside of act). */
722b8b50f1eSRichard Henderson     sigdelset(&act.sa_mask, host_sig);
723b8b50f1eSRichard Henderson     sigsuspend(&act.sa_mask);
724b8b50f1eSRichard Henderson 
725b8b50f1eSRichard Henderson     /* unreachable */
726ee72c47eSRichard Henderson     _exit(EXIT_FAILURE);
727b8b50f1eSRichard Henderson }
728b8b50f1eSRichard Henderson 
729b8b50f1eSRichard Henderson static G_NORETURN
dump_core_and_abort(CPUArchState * env,int target_sig)730b77af26eSRichard Henderson void dump_core_and_abort(CPUArchState *env, int target_sig)
73166fb9763Sbellard {
732b77af26eSRichard Henderson     CPUState *cpu = env_cpu(env);
7330429a971SAndreas Färber     TaskState *ts = (TaskState *)cpu->opaque;
734edf8e2afSMika Westerberg     int host_sig, core_dumped = 0;
735c8ee0a44SPaolo Bonzini 
73638ee0a7dSRichard Henderson     /* On exit, undo the remapping of SIGABRT. */
73738ee0a7dSRichard Henderson     if (target_sig == TARGET_SIGABRT) {
73838ee0a7dSRichard Henderson         host_sig = SIGABRT;
73938ee0a7dSRichard Henderson     } else {
74066393fb9SRiku Voipio         host_sig = target_to_host_signal(target_sig);
74138ee0a7dSRichard Henderson     }
742b5f95366SPeter Maydell     trace_user_dump_core_and_abort(env, target_sig, host_sig);
743a2247f8eSAndreas Färber     gdb_signalled(env, target_sig);
744603e4fd7Saurel32 
745edf8e2afSMika Westerberg     /* dump core if supported by target binary format */
74666393fb9SRiku Voipio     if (core_dump_signal(target_sig) && (ts->bprm->core_dump != NULL)) {
747edf8e2afSMika Westerberg         stop_all_tasks();
748edf8e2afSMika Westerberg         core_dumped =
749a2247f8eSAndreas Färber             ((*ts->bprm->core_dump)(target_sig, env) == 0);
750edf8e2afSMika Westerberg     }
751edf8e2afSMika Westerberg     if (core_dumped) {
752edf8e2afSMika Westerberg         /* we already dumped the core of target process, we don't want
753edf8e2afSMika Westerberg          * a coredump of qemu itself */
754edf8e2afSMika Westerberg         struct rlimit nodump;
755edf8e2afSMika Westerberg         getrlimit(RLIMIT_CORE, &nodump);
756edf8e2afSMika Westerberg         nodump.rlim_cur=0;
757edf8e2afSMika Westerberg         setrlimit(RLIMIT_CORE, &nodump);
758edf8e2afSMika Westerberg         (void) fprintf(stderr, "qemu: uncaught target signal %d (%s) - %s\n",
75966393fb9SRiku Voipio             target_sig, strsignal(host_sig), "core dumped" );
760edf8e2afSMika Westerberg     }
761edf8e2afSMika Westerberg 
762b77af26eSRichard Henderson     preexit_cleanup(env, 128 + target_sig);
763b8b50f1eSRichard Henderson     die_with_signal(host_sig);
7649de5e440Sbellard }
76566fb9763Sbellard 
7669de5e440Sbellard /* queue a signal so that it will be send to the virtual CPU as soon
7679de5e440Sbellard    as possible */
queue_signal(CPUArchState * env,int sig,int si_type,target_siginfo_t * info)768337e88d8SPeter Maydell void queue_signal(CPUArchState *env, int sig, int si_type,
7699d2803f7SPeter Maydell                   target_siginfo_t *info)
7709de5e440Sbellard {
77129a0af61SRichard Henderson     CPUState *cpu = env_cpu(env);
7720429a971SAndreas Färber     TaskState *ts = cpu->opaque;
7739de5e440Sbellard 
774c8ee0a44SPaolo Bonzini     trace_user_queue_signal(env, sig);
775a7ec0f98SPeter Maydell 
7769d2803f7SPeter Maydell     info->si_code = deposit32(info->si_code, 16, 16, si_type);
777a70dadc7SPeter Maydell 
778655ed67cSTimothy E Baldwin     ts->sync_signal.info = *info;
779655ed67cSTimothy E Baldwin     ts->sync_signal.pending = sig;
78066fb9763Sbellard     /* signal that a new signal is pending */
781d73415a3SStefan Hajnoczi     qatomic_set(&ts->signal_pending, 1);
7829de5e440Sbellard }
78366fb9763Sbellard 
78407637888SWarner Losh 
78507637888SWarner Losh /* Adjust the signal context to rewind out of safe-syscall if we're in it */
rewind_if_in_safe_syscall(void * puc)7864d330ceeSTimothy E Baldwin static inline void rewind_if_in_safe_syscall(void *puc)
7874d330ceeSTimothy E Baldwin {
7889940799bSRichard Henderson     host_sigcontext *uc = (host_sigcontext *)puc;
78907637888SWarner Losh     uintptr_t pcreg = host_signal_pc(uc);
79007637888SWarner Losh 
79107637888SWarner Losh     if (pcreg > (uintptr_t)safe_syscall_start
79207637888SWarner Losh         && pcreg < (uintptr_t)safe_syscall_end) {
79307637888SWarner Losh         host_signal_set_pc(uc, (uintptr_t)safe_syscall_start);
7944d330ceeSTimothy E Baldwin     }
79507637888SWarner Losh }
7964d330ceeSTimothy E Baldwin 
7977dfd3ca8SHelge Deller static G_NORETURN
die_from_signal(siginfo_t * info)7987dfd3ca8SHelge Deller void die_from_signal(siginfo_t *info)
7997dfd3ca8SHelge Deller {
8007dfd3ca8SHelge Deller     char sigbuf[4], codebuf[12];
8017dfd3ca8SHelge Deller     const char *sig, *code = NULL;
8027dfd3ca8SHelge Deller 
8037dfd3ca8SHelge Deller     switch (info->si_signo) {
8047dfd3ca8SHelge Deller     case SIGSEGV:
8057dfd3ca8SHelge Deller         sig = "SEGV";
8067dfd3ca8SHelge Deller         switch (info->si_code) {
8077dfd3ca8SHelge Deller         case SEGV_MAPERR:
8087dfd3ca8SHelge Deller             code = "MAPERR";
8097dfd3ca8SHelge Deller             break;
8107dfd3ca8SHelge Deller         case SEGV_ACCERR:
8117dfd3ca8SHelge Deller             code = "ACCERR";
8127dfd3ca8SHelge Deller             break;
8137dfd3ca8SHelge Deller         }
8147dfd3ca8SHelge Deller         break;
8157dfd3ca8SHelge Deller     case SIGBUS:
8167dfd3ca8SHelge Deller         sig = "BUS";
8177dfd3ca8SHelge Deller         switch (info->si_code) {
8187dfd3ca8SHelge Deller         case BUS_ADRALN:
8197dfd3ca8SHelge Deller             code = "ADRALN";
8207dfd3ca8SHelge Deller             break;
8217dfd3ca8SHelge Deller         case BUS_ADRERR:
8227dfd3ca8SHelge Deller             code = "ADRERR";
8237dfd3ca8SHelge Deller             break;
8247dfd3ca8SHelge Deller         }
8257dfd3ca8SHelge Deller         break;
8264a6ebc19SRichard Henderson     case SIGILL:
8274a6ebc19SRichard Henderson         sig = "ILL";
8284a6ebc19SRichard Henderson         switch (info->si_code) {
8294a6ebc19SRichard Henderson         case ILL_ILLOPC:
8304a6ebc19SRichard Henderson             code = "ILLOPC";
8314a6ebc19SRichard Henderson             break;
8324a6ebc19SRichard Henderson         case ILL_ILLOPN:
8334a6ebc19SRichard Henderson             code = "ILLOPN";
8344a6ebc19SRichard Henderson             break;
8354a6ebc19SRichard Henderson         case ILL_ILLADR:
8364a6ebc19SRichard Henderson             code = "ILLADR";
8374a6ebc19SRichard Henderson             break;
8384a6ebc19SRichard Henderson         case ILL_PRVOPC:
8394a6ebc19SRichard Henderson             code = "PRVOPC";
8404a6ebc19SRichard Henderson             break;
8414a6ebc19SRichard Henderson         case ILL_PRVREG:
8424a6ebc19SRichard Henderson             code = "PRVREG";
8434a6ebc19SRichard Henderson             break;
8444a6ebc19SRichard Henderson         case ILL_COPROC:
8454a6ebc19SRichard Henderson             code = "COPROC";
8464a6ebc19SRichard Henderson             break;
8474a6ebc19SRichard Henderson         }
8484a6ebc19SRichard Henderson         break;
8494a6ebc19SRichard Henderson     case SIGFPE:
8504a6ebc19SRichard Henderson         sig = "FPE";
8514a6ebc19SRichard Henderson         switch (info->si_code) {
8524a6ebc19SRichard Henderson         case FPE_INTDIV:
8534a6ebc19SRichard Henderson             code = "INTDIV";
8544a6ebc19SRichard Henderson             break;
8554a6ebc19SRichard Henderson         case FPE_INTOVF:
8564a6ebc19SRichard Henderson             code = "INTOVF";
8574a6ebc19SRichard Henderson             break;
8584a6ebc19SRichard Henderson         }
8594a6ebc19SRichard Henderson         break;
8604a6ebc19SRichard Henderson     case SIGTRAP:
8614a6ebc19SRichard Henderson         sig = "TRAP";
8624a6ebc19SRichard Henderson         break;
8637dfd3ca8SHelge Deller     default:
8647dfd3ca8SHelge Deller         snprintf(sigbuf, sizeof(sigbuf), "%d", info->si_signo);
8657dfd3ca8SHelge Deller         sig = sigbuf;
8667dfd3ca8SHelge Deller         break;
8677dfd3ca8SHelge Deller     }
8687dfd3ca8SHelge Deller     if (code == NULL) {
8697dfd3ca8SHelge Deller         snprintf(codebuf, sizeof(sigbuf), "%d", info->si_code);
8707dfd3ca8SHelge Deller         code = codebuf;
8717dfd3ca8SHelge Deller     }
8727dfd3ca8SHelge Deller 
8737dfd3ca8SHelge Deller     error_report("QEMU internal SIG%s {code=%s, addr=%p}",
8747dfd3ca8SHelge Deller                  sig, code, info->si_addr);
8757dfd3ca8SHelge Deller     die_with_signal(info->si_signo);
8767dfd3ca8SHelge Deller }
8777dfd3ca8SHelge Deller 
host_sigsegv_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)878f4e11681SRichard Henderson static void host_sigsegv_handler(CPUState *cpu, siginfo_t *info,
879f4e11681SRichard Henderson                                  host_sigcontext *uc)
88031e31b8aSbellard {
881f4e11681SRichard Henderson     uintptr_t host_addr = (uintptr_t)info->si_addr;
882e6037d04SRichard Henderson     /*
883e6037d04SRichard Henderson      * Convert forcefully to guest address space: addresses outside
884e6037d04SRichard Henderson      * reserved_va are still valid to report via SEGV_MAPERR.
885e6037d04SRichard Henderson      */
886f4e11681SRichard Henderson     bool is_valid = h2g_valid(host_addr);
887f4e11681SRichard Henderson     abi_ptr guest_addr = h2g_nocheck(host_addr);
888f4e11681SRichard Henderson     uintptr_t pc = host_signal_pc(uc);
889f4e11681SRichard Henderson     bool is_write = host_signal_write(info, uc);
890f4e11681SRichard Henderson     MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
891f4e11681SRichard Henderson     bool maperr;
892e6037d04SRichard Henderson 
8937dfd3ca8SHelge Deller     /* If this was a write to a TB protected page, restart. */
8947dfd3ca8SHelge Deller     if (is_write
895f4e11681SRichard Henderson         && is_valid
8967dfd3ca8SHelge Deller         && info->si_code == SEGV_ACCERR
897f4e11681SRichard Henderson         && handle_sigsegv_accerr_write(cpu, host_signal_mask(uc),
898f4e11681SRichard Henderson                                        pc, guest_addr)) {
8997dfd3ca8SHelge Deller         return;
9007dfd3ca8SHelge Deller     }
9017dfd3ca8SHelge Deller 
9027dfd3ca8SHelge Deller     /*
9037dfd3ca8SHelge Deller      * If the access was not on behalf of the guest, within the executable
9047dfd3ca8SHelge Deller      * mapping of the generated code buffer, then it is a host bug.
9057dfd3ca8SHelge Deller      */
9067dfd3ca8SHelge Deller     if (access_type != MMU_INST_FETCH
9077dfd3ca8SHelge Deller         && !in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
9087dfd3ca8SHelge Deller         die_from_signal(info);
9097dfd3ca8SHelge Deller     }
9107dfd3ca8SHelge Deller 
911f4e11681SRichard Henderson     maperr = true;
912f4e11681SRichard Henderson     if (is_valid && info->si_code == SEGV_ACCERR) {
913e6037d04SRichard Henderson         /*
914e6037d04SRichard Henderson          * With reserved_va, the whole address space is PROT_NONE,
915e6037d04SRichard Henderson          * which means that we may get ACCERR when we want MAPERR.
916e6037d04SRichard Henderson          */
917e6037d04SRichard Henderson         if (page_get_flags(guest_addr) & PAGE_VALID) {
91872d2bbf9SRichard Henderson             maperr = false;
919e6037d04SRichard Henderson         } else {
920e6037d04SRichard Henderson             info->si_code = SEGV_MAPERR;
921e6037d04SRichard Henderson         }
922e6037d04SRichard Henderson     }
923e6037d04SRichard Henderson 
924f4e11681SRichard Henderson     sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
92572d2bbf9SRichard Henderson     cpu_loop_exit_sigsegv(cpu, guest_addr, access_type, maperr, pc);
926f4e11681SRichard Henderson }
927f4e11681SRichard Henderson 
host_sigbus_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)928*8bdd3abcSRobbin Ehn static uintptr_t host_sigbus_handler(CPUState *cpu, siginfo_t *info,
929f4e11681SRichard Henderson                                 host_sigcontext *uc)
930f4e11681SRichard Henderson {
931f4e11681SRichard Henderson     uintptr_t pc = host_signal_pc(uc);
932f4e11681SRichard Henderson     bool is_write = host_signal_write(info, uc);
933f4e11681SRichard Henderson     MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
934f4e11681SRichard Henderson 
935f4e11681SRichard Henderson     /*
936f4e11681SRichard Henderson      * If the access was not on behalf of the guest, within the executable
937f4e11681SRichard Henderson      * mapping of the generated code buffer, then it is a host bug.
938f4e11681SRichard Henderson      */
939f4e11681SRichard Henderson     if (!in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
940f4e11681SRichard Henderson         die_from_signal(info);
941f4e11681SRichard Henderson     }
942f4e11681SRichard Henderson 
943742f0762SRichard Henderson     if (info->si_code == BUS_ADRALN) {
944f4e11681SRichard Henderson         uintptr_t host_addr = (uintptr_t)info->si_addr;
945f4e11681SRichard Henderson         abi_ptr guest_addr = h2g_nocheck(host_addr);
946f4e11681SRichard Henderson 
947f4e11681SRichard Henderson         sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
948742f0762SRichard Henderson         cpu_loop_exit_sigbus(cpu, guest_addr, access_type, pc);
949742f0762SRichard Henderson     }
950*8bdd3abcSRobbin Ehn     return pc;
951e6037d04SRichard Henderson }
952e6037d04SRichard Henderson 
host_signal_handler(int host_sig,siginfo_t * info,void * puc)953f4e11681SRichard Henderson static void host_signal_handler(int host_sig, siginfo_t *info, void *puc)
954f4e11681SRichard Henderson {
955f4e11681SRichard Henderson     CPUState *cpu = thread_cpu;
956f4e11681SRichard Henderson     CPUArchState *env = cpu_env(cpu);
957f4e11681SRichard Henderson     TaskState *ts = cpu->opaque;
958f4e11681SRichard Henderson     target_siginfo_t tinfo;
959f4e11681SRichard Henderson     host_sigcontext *uc = puc;
960f4e11681SRichard Henderson     struct emulated_sigtable *k;
961f4e11681SRichard Henderson     int guest_sig;
962f4e11681SRichard Henderson     uintptr_t pc = 0;
963f4e11681SRichard Henderson     bool sync_sig = false;
964f4e11681SRichard Henderson     void *sigmask;
965f4e11681SRichard Henderson 
966f4e11681SRichard Henderson     /*
967f4e11681SRichard Henderson      * Non-spoofed SIGSEGV and SIGBUS are synchronous, and need special
9684a6ebc19SRichard Henderson      * handling wrt signal blocking and unwinding.  Non-spoofed SIGILL,
9694a6ebc19SRichard Henderson      * SIGFPE, SIGTRAP are always host bugs.
970f4e11681SRichard Henderson      */
971f4e11681SRichard Henderson     if (info->si_code > 0) {
972f4e11681SRichard Henderson         switch (host_sig) {
973f4e11681SRichard Henderson         case SIGSEGV:
974f4e11681SRichard Henderson             /* Only returns on handle_sigsegv_accerr_write success. */
975f4e11681SRichard Henderson             host_sigsegv_handler(cpu, info, uc);
976f4e11681SRichard Henderson             return;
977f4e11681SRichard Henderson         case SIGBUS:
978*8bdd3abcSRobbin Ehn             pc = host_sigbus_handler(cpu, info, uc);
979e6037d04SRichard Henderson             sync_sig = true;
980f4e11681SRichard Henderson             break;
9814a6ebc19SRichard Henderson         case SIGILL:
9824a6ebc19SRichard Henderson         case SIGFPE:
9834a6ebc19SRichard Henderson         case SIGTRAP:
9844a6ebc19SRichard Henderson             die_from_signal(info);
985f4e11681SRichard Henderson         }
986e6037d04SRichard Henderson     }
987e6037d04SRichard Henderson 
98831e31b8aSbellard     /* get target signal number */
989e6037d04SRichard Henderson     guest_sig = host_to_target_signal(host_sig);
990e6037d04SRichard Henderson     if (guest_sig < 1 || guest_sig > TARGET_NSIG) {
99131e31b8aSbellard         return;
992e6037d04SRichard Henderson     }
993e6037d04SRichard Henderson     trace_user_host_signal(env, host_sig, guest_sig);
994e6037d04SRichard Henderson 
995e6037d04SRichard Henderson     host_to_target_siginfo_noswap(&tinfo, info);
996e6037d04SRichard Henderson     k = &ts->sigtab[guest_sig - 1];
997e6037d04SRichard Henderson     k->info = tinfo;
998e6037d04SRichard Henderson     k->pending = guest_sig;
999e6037d04SRichard Henderson     ts->signal_pending = 1;
1000e6037d04SRichard Henderson 
1001e6037d04SRichard Henderson     /*
1002e6037d04SRichard Henderson      * For synchronous signals, unwind the cpu state to the faulting
1003e6037d04SRichard Henderson      * insn and then exit back to the main loop so that the signal
1004e6037d04SRichard Henderson      * is delivered immediately.
1005e6037d04SRichard Henderson      */
1006e6037d04SRichard Henderson     if (sync_sig) {
1007e6037d04SRichard Henderson         cpu->exception_index = EXCP_INTERRUPT;
1008e6037d04SRichard Henderson         cpu_loop_exit_restore(cpu, pc);
1009e6037d04SRichard Henderson     }
10104d330ceeSTimothy E Baldwin 
10114d330ceeSTimothy E Baldwin     rewind_if_in_safe_syscall(puc);
10124d330ceeSTimothy E Baldwin 
1013e6037d04SRichard Henderson     /*
1014e6037d04SRichard Henderson      * Block host signals until target signal handler entered. We
10153d3efba0SPeter Maydell      * can't block SIGSEGV or SIGBUS while we're executing guest
10163d3efba0SPeter Maydell      * code in case the guest code provokes one in the window between
10173d3efba0SPeter Maydell      * now and it getting out to the main loop. Signals will be
10183d3efba0SPeter Maydell      * unblocked again in process_pending_signals().
10191d48fdd9SPeter Maydell      *
1020c8c89a6aSRichard Henderson      * WARNING: we cannot use sigfillset() here because the sigmask
10211d48fdd9SPeter Maydell      * field is a kernel sigset_t, which is much smaller than the
10221d48fdd9SPeter Maydell      * libc sigset_t which sigfillset() operates on. Using sigfillset()
10231d48fdd9SPeter Maydell      * would write 0xff bytes off the end of the structure and trash
10241d48fdd9SPeter Maydell      * data on the struct.
10253d3efba0SPeter Maydell      */
1026f4e11681SRichard Henderson     sigmask = host_signal_mask(uc);
1027c8c89a6aSRichard Henderson     memset(sigmask, 0xff, SIGSET_T_SIZE);
1028c8c89a6aSRichard Henderson     sigdelset(sigmask, SIGSEGV);
1029c8c89a6aSRichard Henderson     sigdelset(sigmask, SIGBUS);
10303d3efba0SPeter Maydell 
10319de5e440Sbellard     /* interrupt the virtual CPU as soon as possible */
1032a2247f8eSAndreas Färber     cpu_exit(thread_cpu);
103366fb9763Sbellard }
103431e31b8aSbellard 
10350da46a6eSths /* do_sigaltstack() returns target values and errnos. */
1036579a97f7Sbellard /* compare linux/kernel/signal.c:do_sigaltstack() */
do_sigaltstack(abi_ulong uss_addr,abi_ulong uoss_addr,CPUArchState * env)10376b208755SRichard Henderson abi_long do_sigaltstack(abi_ulong uss_addr, abi_ulong uoss_addr,
10386b208755SRichard Henderson                         CPUArchState *env)
1039a04e134aSths {
104092bad948SRichard Henderson     target_stack_t oss, *uoss = NULL;
104192bad948SRichard Henderson     abi_long ret = -TARGET_EFAULT;
104292bad948SRichard Henderson 
104392bad948SRichard Henderson     if (uoss_addr) {
104492bad948SRichard Henderson         /* Verify writability now, but do not alter user memory yet. */
104592bad948SRichard Henderson         if (!lock_user_struct(VERIFY_WRITE, uoss, uoss_addr, 0)) {
104692bad948SRichard Henderson             goto out;
104792bad948SRichard Henderson         }
10486b208755SRichard Henderson         target_save_altstack(&oss, env);
1049a04e134aSths     }
1050a04e134aSths 
105192bad948SRichard Henderson     if (uss_addr) {
105292bad948SRichard Henderson         target_stack_t *uss;
10530903c8beSTom Musta 
10549eeb8306SRiku Voipio         if (!lock_user_struct(VERIFY_READ, uss, uss_addr, 1)) {
1055a04e134aSths             goto out;
10569eeb8306SRiku Voipio         }
1057ddc3e74dSRichard Henderson         ret = target_restore_altstack(uss, env);
105892bad948SRichard Henderson         if (ret) {
1059a04e134aSths             goto out;
1060a04e134aSths         }
10610903c8beSTom Musta     }
1062a04e134aSths 
1063579a97f7Sbellard     if (uoss_addr) {
106492bad948SRichard Henderson         memcpy(uoss, &oss, sizeof(oss));
106592bad948SRichard Henderson         unlock_user_struct(uoss, uoss_addr, 1);
106692bad948SRichard Henderson         uoss = NULL;
1067a04e134aSths     }
1068a04e134aSths     ret = 0;
106992bad948SRichard Henderson 
1070a04e134aSths  out:
107192bad948SRichard Henderson     if (uoss) {
107292bad948SRichard Henderson         unlock_user_struct(uoss, uoss_addr, 0);
107392bad948SRichard Henderson     }
1074a04e134aSths     return ret;
1075a04e134aSths }
1076a04e134aSths 
1077ef6a778eSTimothy E Baldwin /* do_sigaction() return target values and host errnos */
do_sigaction(int sig,const struct target_sigaction * act,struct target_sigaction * oact,abi_ulong ka_restorer)107866fb9763Sbellard int do_sigaction(int sig, const struct target_sigaction *act,
107902fb28e8SRichard Henderson                  struct target_sigaction *oact, abi_ulong ka_restorer)
108031e31b8aSbellard {
1081624f7979Spbrook     struct target_sigaction *k;
1082773b93eeSbellard     int host_sig;
10830da46a6eSths     int ret = 0;
108431e31b8aSbellard 
10856bc024e7SLaurent Vivier     trace_signal_do_sigaction_guest(sig, TARGET_NSIG);
10866bc024e7SLaurent Vivier 
1087ee3500d3SIlya Leoshkevich     if (sig < 1 || sig > TARGET_NSIG) {
1088ee3500d3SIlya Leoshkevich         return -TARGET_EINVAL;
1089ee3500d3SIlya Leoshkevich     }
1090ee3500d3SIlya Leoshkevich 
1091ee3500d3SIlya Leoshkevich     if (act && (sig == TARGET_SIGKILL || sig == TARGET_SIGSTOP)) {
1092ef6a778eSTimothy E Baldwin         return -TARGET_EINVAL;
1093ef6a778eSTimothy E Baldwin     }
1094ef6a778eSTimothy E Baldwin 
1095ef6a778eSTimothy E Baldwin     if (block_signals()) {
1096af254a27SRichard Henderson         return -QEMU_ERESTARTSYS;
1097ef6a778eSTimothy E Baldwin     }
1098ef6a778eSTimothy E Baldwin 
109966fb9763Sbellard     k = &sigact_table[sig - 1];
110066fb9763Sbellard     if (oact) {
1101d2565875SRichard Henderson         __put_user(k->_sa_handler, &oact->_sa_handler);
1102d2565875SRichard Henderson         __put_user(k->sa_flags, &oact->sa_flags);
11037f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1104d2565875SRichard Henderson         __put_user(k->sa_restorer, &oact->sa_restorer);
1105106ec879Sbellard #endif
1106d2565875SRichard Henderson         /* Not swapped.  */
1107624f7979Spbrook         oact->sa_mask = k->sa_mask;
110866fb9763Sbellard     }
110966fb9763Sbellard     if (act) {
1110d2565875SRichard Henderson         __get_user(k->_sa_handler, &act->_sa_handler);
1111d2565875SRichard Henderson         __get_user(k->sa_flags, &act->sa_flags);
11127f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1113d2565875SRichard Henderson         __get_user(k->sa_restorer, &act->sa_restorer);
1114106ec879Sbellard #endif
111502fb28e8SRichard Henderson #ifdef TARGET_ARCH_HAS_KA_RESTORER
111602fb28e8SRichard Henderson         k->ka_restorer = ka_restorer;
111702fb28e8SRichard Henderson #endif
1118d2565875SRichard Henderson         /* To be swapped in target_to_host_sigset.  */
1119624f7979Spbrook         k->sa_mask = act->sa_mask;
1120773b93eeSbellard 
1121773b93eeSbellard         /* we update the host linux signal state */
1122773b93eeSbellard         host_sig = target_to_host_signal(sig);
11236bc024e7SLaurent Vivier         trace_signal_do_sigaction_host(host_sig, TARGET_NSIG);
11246bc024e7SLaurent Vivier         if (host_sig > SIGRTMAX) {
11256bc024e7SLaurent Vivier             /* we don't have enough host signals to map all target signals */
11266bc024e7SLaurent Vivier             qemu_log_mask(LOG_UNIMP, "Unsupported target signal #%d, ignored\n",
11276bc024e7SLaurent Vivier                           sig);
11286bc024e7SLaurent Vivier             /*
11296bc024e7SLaurent Vivier              * we don't return an error here because some programs try to
11306bc024e7SLaurent Vivier              * register an handler for all possible rt signals even if they
11316bc024e7SLaurent Vivier              * don't need it.
11326bc024e7SLaurent Vivier              * An error here can abort them whereas there can be no problem
11336bc024e7SLaurent Vivier              * to not have the signal available later.
11346bc024e7SLaurent Vivier              * This is the case for golang,
11356bc024e7SLaurent Vivier              *   See https://github.com/golang/go/issues/33746
11366bc024e7SLaurent Vivier              * So we silently ignore the error.
11376bc024e7SLaurent Vivier              */
11386bc024e7SLaurent Vivier             return 0;
11396bc024e7SLaurent Vivier         }
1140773b93eeSbellard         if (host_sig != SIGSEGV && host_sig != SIGBUS) {
1141dbde2c0cSRichard Henderson             struct sigaction act1;
1142dbde2c0cSRichard Henderson 
1143773b93eeSbellard             sigfillset(&act1.sa_mask);
1144773b93eeSbellard             act1.sa_flags = SA_SIGINFO;
1145624f7979Spbrook             if (k->_sa_handler == TARGET_SIG_IGN) {
1146dbde2c0cSRichard Henderson                 /*
1147dbde2c0cSRichard Henderson                  * It is important to update the host kernel signal ignore
1148dbde2c0cSRichard Henderson                  * state to avoid getting unexpected interrupted syscalls.
1149dbde2c0cSRichard Henderson                  */
1150773b93eeSbellard                 act1.sa_sigaction = (void *)SIG_IGN;
1151624f7979Spbrook             } else if (k->_sa_handler == TARGET_SIG_DFL) {
1152dbde2c0cSRichard Henderson                 if (core_dump_signal(sig)) {
1153ca587a8eSaurel32                     act1.sa_sigaction = host_signal_handler;
1154dbde2c0cSRichard Henderson                 } else {
1155773b93eeSbellard                     act1.sa_sigaction = (void *)SIG_DFL;
1156dbde2c0cSRichard Henderson                 }
1157773b93eeSbellard             } else {
1158773b93eeSbellard                 act1.sa_sigaction = host_signal_handler;
1159dbde2c0cSRichard Henderson                 if (k->sa_flags & TARGET_SA_RESTART) {
1160dbde2c0cSRichard Henderson                     act1.sa_flags |= SA_RESTART;
1161dbde2c0cSRichard Henderson                 }
1162773b93eeSbellard             }
11630da46a6eSths             ret = sigaction(host_sig, &act1, NULL);
1164773b93eeSbellard         }
116566fb9763Sbellard     }
11660da46a6eSths     return ret;
116766fb9763Sbellard }
116866fb9763Sbellard 
handle_pending_signal(CPUArchState * cpu_env,int sig,struct emulated_sigtable * k)116931efaef1SPeter Maydell static void handle_pending_signal(CPUArchState *cpu_env, int sig,
117031efaef1SPeter Maydell                                   struct emulated_sigtable *k)
1171eb552501SPeter Maydell {
117229a0af61SRichard Henderson     CPUState *cpu = env_cpu(cpu_env);
1173eb552501SPeter Maydell     abi_ulong handler;
11743d3efba0SPeter Maydell     sigset_t set;
1175eb552501SPeter Maydell     target_sigset_t target_old_set;
1176eb552501SPeter Maydell     struct target_sigaction *sa;
1177eb552501SPeter Maydell     TaskState *ts = cpu->opaque;
1178eb552501SPeter Maydell 
1179c8ee0a44SPaolo Bonzini     trace_user_handle_signal(cpu_env, sig);
118066fb9763Sbellard     /* dequeue signal */
118166fb9763Sbellard     k->pending = 0;
11821fddef4bSbellard 
1183db6b81d4SAndreas Färber     sig = gdb_handlesig(cpu, sig);
11841fddef4bSbellard     if (!sig) {
1185ca587a8eSaurel32         sa = NULL;
1186ca587a8eSaurel32         handler = TARGET_SIG_IGN;
1187ca587a8eSaurel32     } else {
1188624f7979Spbrook         sa = &sigact_table[sig - 1];
1189624f7979Spbrook         handler = sa->_sa_handler;
1190ca587a8eSaurel32     }
1191ca587a8eSaurel32 
11924b25a506SJosh Kunz     if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
11930cb581d6SPeter Maydell         print_taken_signal(sig, &k->info);
11940cb581d6SPeter Maydell     }
11950cb581d6SPeter Maydell 
119666fb9763Sbellard     if (handler == TARGET_SIG_DFL) {
1197ca587a8eSaurel32         /* default handler : ignore some signal. The other are job control or fatal */
1198ca587a8eSaurel32         if (sig == TARGET_SIGTSTP || sig == TARGET_SIGTTIN || sig == TARGET_SIGTTOU) {
1199ca587a8eSaurel32             kill(getpid(),SIGSTOP);
1200ca587a8eSaurel32         } else if (sig != TARGET_SIGCHLD &&
120166fb9763Sbellard                    sig != TARGET_SIGURG &&
1202ca587a8eSaurel32                    sig != TARGET_SIGWINCH &&
1203ca587a8eSaurel32                    sig != TARGET_SIGCONT) {
1204da91c192SIlya Leoshkevich             dump_core_and_abort(cpu_env, sig);
120566fb9763Sbellard         }
120666fb9763Sbellard     } else if (handler == TARGET_SIG_IGN) {
120766fb9763Sbellard         /* ignore sig */
120866fb9763Sbellard     } else if (handler == TARGET_SIG_ERR) {
1209da91c192SIlya Leoshkevich         dump_core_and_abort(cpu_env, sig);
121066fb9763Sbellard     } else {
12119de5e440Sbellard         /* compute the blocked signals during the handler execution */
12123d3efba0SPeter Maydell         sigset_t *blocked_set;
12133d3efba0SPeter Maydell 
1214624f7979Spbrook         target_to_host_sigset(&set, &sa->sa_mask);
12159de5e440Sbellard         /* SA_NODEFER indicates that the current signal should not be
12169de5e440Sbellard            blocked during the handler */
1217624f7979Spbrook         if (!(sa->sa_flags & TARGET_SA_NODEFER))
12189de5e440Sbellard             sigaddset(&set, target_to_host_signal(sig));
12199de5e440Sbellard 
12209de5e440Sbellard         /* save the previous blocked signal state to restore it at the
12219de5e440Sbellard            end of the signal execution (see do_sigreturn) */
12223d3efba0SPeter Maydell         host_to_target_sigset_internal(&target_old_set, &ts->signal_mask);
12233d3efba0SPeter Maydell 
12243d3efba0SPeter Maydell         /* block signals in the handler */
12253d3efba0SPeter Maydell         blocked_set = ts->in_sigsuspend ?
12263d3efba0SPeter Maydell             &ts->sigsuspend_mask : &ts->signal_mask;
12273d3efba0SPeter Maydell         sigorset(&ts->signal_mask, blocked_set, &set);
12283d3efba0SPeter Maydell         ts->in_sigsuspend = 0;
12299de5e440Sbellard 
1230bc8a22ccSbellard         /* if the CPU is in VM86 mode, we restore the 32 bit values */
123184409ddbSj_mayer #if defined(TARGET_I386) && !defined(TARGET_X86_64)
1232bc8a22ccSbellard         {
1233bc8a22ccSbellard             CPUX86State *env = cpu_env;
1234bc8a22ccSbellard             if (env->eflags & VM_MASK)
1235bc8a22ccSbellard                 save_v86_state(env);
1236bc8a22ccSbellard         }
1237bc8a22ccSbellard #endif
12389de5e440Sbellard         /* prepare the stack frame of the virtual CPU */
1239cb6ac802SLaurent Vivier #if defined(TARGET_ARCH_HAS_SETUP_FRAME)
1240cb6ac802SLaurent Vivier         if (sa->sa_flags & TARGET_SA_SIGINFO) {
1241cb6ac802SLaurent Vivier             setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1242cb6ac802SLaurent Vivier         } else {
1243cb6ac802SLaurent Vivier             setup_frame(sig, sa, &target_old_set, cpu_env);
1244cb6ac802SLaurent Vivier         }
1245cb6ac802SLaurent Vivier #else
1246ff970904SRichard Henderson         /* These targets do not have traditional signals.  */
1247907f5fddSTimothy E Baldwin         setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1248ff970904SRichard Henderson #endif
12497ec87e06SPeter Maydell         if (sa->sa_flags & TARGET_SA_RESETHAND) {
1250624f7979Spbrook             sa->_sa_handler = TARGET_SIG_DFL;
125166fb9763Sbellard         }
12527ec87e06SPeter Maydell     }
125331e31b8aSbellard }
1254e902d588SPeter Maydell 
process_pending_signals(CPUArchState * cpu_env)1255e902d588SPeter Maydell void process_pending_signals(CPUArchState *cpu_env)
1256e902d588SPeter Maydell {
125729a0af61SRichard Henderson     CPUState *cpu = env_cpu(cpu_env);
1258e902d588SPeter Maydell     int sig;
1259e902d588SPeter Maydell     TaskState *ts = cpu->opaque;
12603d3efba0SPeter Maydell     sigset_t set;
12613d3efba0SPeter Maydell     sigset_t *blocked_set;
1262e902d588SPeter Maydell 
1263d73415a3SStefan Hajnoczi     while (qatomic_read(&ts->signal_pending)) {
12643d3efba0SPeter Maydell         sigfillset(&set);
12653d3efba0SPeter Maydell         sigprocmask(SIG_SETMASK, &set, 0);
12663d3efba0SPeter Maydell 
12678bd3773cSPeter Maydell     restart_scan:
1268655ed67cSTimothy E Baldwin         sig = ts->sync_signal.pending;
1269655ed67cSTimothy E Baldwin         if (sig) {
1270655ed67cSTimothy E Baldwin             /* Synchronous signals are forced,
1271655ed67cSTimothy E Baldwin              * see force_sig_info() and callers in Linux
1272655ed67cSTimothy E Baldwin              * Note that not all of our queue_signal() calls in QEMU correspond
1273655ed67cSTimothy E Baldwin              * to force_sig_info() calls in Linux (some are send_sig_info()).
1274655ed67cSTimothy E Baldwin              * However it seems like a kernel bug to me to allow the process
1275655ed67cSTimothy E Baldwin              * to block a synchronous signal since it could then just end up
1276655ed67cSTimothy E Baldwin              * looping round and round indefinitely.
1277655ed67cSTimothy E Baldwin              */
1278655ed67cSTimothy E Baldwin             if (sigismember(&ts->signal_mask, target_to_host_signal_table[sig])
1279655ed67cSTimothy E Baldwin                 || sigact_table[sig - 1]._sa_handler == TARGET_SIG_IGN) {
1280655ed67cSTimothy E Baldwin                 sigdelset(&ts->signal_mask, target_to_host_signal_table[sig]);
1281655ed67cSTimothy E Baldwin                 sigact_table[sig - 1]._sa_handler = TARGET_SIG_DFL;
1282655ed67cSTimothy E Baldwin             }
1283655ed67cSTimothy E Baldwin 
128431efaef1SPeter Maydell             handle_pending_signal(cpu_env, sig, &ts->sync_signal);
1285655ed67cSTimothy E Baldwin         }
1286655ed67cSTimothy E Baldwin 
1287e902d588SPeter Maydell         for (sig = 1; sig <= TARGET_NSIG; sig++) {
12883d3efba0SPeter Maydell             blocked_set = ts->in_sigsuspend ?
12893d3efba0SPeter Maydell                 &ts->sigsuspend_mask : &ts->signal_mask;
12903d3efba0SPeter Maydell 
12913d3efba0SPeter Maydell             if (ts->sigtab[sig - 1].pending &&
12923d3efba0SPeter Maydell                 (!sigismember(blocked_set,
1293655ed67cSTimothy E Baldwin                               target_to_host_signal_table[sig]))) {
129431efaef1SPeter Maydell                 handle_pending_signal(cpu_env, sig, &ts->sigtab[sig - 1]);
12958bd3773cSPeter Maydell                 /* Restart scan from the beginning, as handle_pending_signal
12968bd3773cSPeter Maydell                  * might have resulted in a new synchronous signal (eg SIGSEGV).
12978bd3773cSPeter Maydell                  */
12988bd3773cSPeter Maydell                 goto restart_scan;
1299e902d588SPeter Maydell             }
1300e902d588SPeter Maydell         }
13013d3efba0SPeter Maydell 
13023d3efba0SPeter Maydell         /* if no signal is pending, unblock signals and recheck (the act
13033d3efba0SPeter Maydell          * of unblocking might cause us to take another host signal which
13043d3efba0SPeter Maydell          * will set signal_pending again).
13053d3efba0SPeter Maydell          */
1306d73415a3SStefan Hajnoczi         qatomic_set(&ts->signal_pending, 0);
13073d3efba0SPeter Maydell         ts->in_sigsuspend = 0;
13083d3efba0SPeter Maydell         set = ts->signal_mask;
13093d3efba0SPeter Maydell         sigdelset(&set, SIGSEGV);
13103d3efba0SPeter Maydell         sigdelset(&set, SIGBUS);
13113d3efba0SPeter Maydell         sigprocmask(SIG_SETMASK, &set, 0);
13123d3efba0SPeter Maydell     }
13133d3efba0SPeter Maydell     ts->in_sigsuspend = 0;
1314e902d588SPeter Maydell }
13150a99f093SRichard Henderson 
process_sigsuspend_mask(sigset_t ** pset,target_ulong sigset,target_ulong sigsize)13160a99f093SRichard Henderson int process_sigsuspend_mask(sigset_t **pset, target_ulong sigset,
13170a99f093SRichard Henderson                             target_ulong sigsize)
13180a99f093SRichard Henderson {
13190a99f093SRichard Henderson     TaskState *ts = (TaskState *)thread_cpu->opaque;
13200a99f093SRichard Henderson     sigset_t *host_set = &ts->sigsuspend_mask;
13210a99f093SRichard Henderson     target_sigset_t *target_sigset;
13220a99f093SRichard Henderson 
13230a99f093SRichard Henderson     if (sigsize != sizeof(*target_sigset)) {
13240a99f093SRichard Henderson         /* Like the kernel, we enforce correct size sigsets */
13250a99f093SRichard Henderson         return -TARGET_EINVAL;
13260a99f093SRichard Henderson     }
13270a99f093SRichard Henderson 
13280a99f093SRichard Henderson     target_sigset = lock_user(VERIFY_READ, sigset, sigsize, 1);
13290a99f093SRichard Henderson     if (!target_sigset) {
13300a99f093SRichard Henderson         return -TARGET_EFAULT;
13310a99f093SRichard Henderson     }
13320a99f093SRichard Henderson     target_to_host_sigset(host_set, target_sigset);
13330a99f093SRichard Henderson     unlock_user(target_sigset, sigset, 0);
13340a99f093SRichard Henderson 
13350a99f093SRichard Henderson     *pset = host_set;
13360a99f093SRichard Henderson     return 0;
13370a99f093SRichard Henderson }
1338