xref: /qemu/linux-user/signal.c (revision 74781c08)
131e31b8aSbellard /*
266fb9763Sbellard  *  Emulation of Linux signals
331e31b8aSbellard  *
431e31b8aSbellard  *  Copyright (c) 2003 Fabrice Bellard
531e31b8aSbellard  *
631e31b8aSbellard  *  This program is free software; you can redistribute it and/or modify
731e31b8aSbellard  *  it under the terms of the GNU General Public License as published by
831e31b8aSbellard  *  the Free Software Foundation; either version 2 of the License, or
931e31b8aSbellard  *  (at your option) any later version.
1031e31b8aSbellard  *
1131e31b8aSbellard  *  This program is distributed in the hope that it will be useful,
1231e31b8aSbellard  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
1331e31b8aSbellard  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
1431e31b8aSbellard  *  GNU General Public License for more details.
1531e31b8aSbellard  *
1631e31b8aSbellard  *  You should have received a copy of the GNU General Public License
178167ee88SBlue Swirl  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
1831e31b8aSbellard  */
19d39594e9SPeter Maydell #include "qemu/osdep.h"
20a70dadc7SPeter Maydell #include "qemu/bitops.h"
21d96bf49bSAlex Bennée #include "gdbstub/user.h"
22*74781c08SPhilippe Mathieu-Daudé #include "exec/page-protection.h"
23e6037d04SRichard Henderson #include "hw/core/tcg-cpu-ops.h"
2485b4fa0cSPeter Maydell 
2531e31b8aSbellard #include <sys/ucontext.h>
26edf8e2afSMika Westerberg #include <sys/resource.h>
2731e31b8aSbellard 
283ef693a0Sbellard #include "qemu.h"
293b249d26SPeter Maydell #include "user-internals.h"
30a44d57a3SPeter Maydell #include "strace.h"
313ad0a769SPeter Maydell #include "loader.h"
32c8ee0a44SPaolo Bonzini #include "trace.h"
33befb7447SLaurent Vivier #include "signal-common.h"
34e6037d04SRichard Henderson #include "host-signal.h"
35bbf15aafSRichard Henderson #include "user/safe-syscall.h"
367dfd3ca8SHelge Deller #include "tcg/tcg.h"
3766fb9763Sbellard 
38f84e313eSGustavo Romero /* target_siginfo_t must fit in gdbstub's siginfo save area. */
39f84e313eSGustavo Romero QEMU_BUILD_BUG_ON(sizeof(target_siginfo_t) > MAX_SIGINFO_LENGTH);
40f84e313eSGustavo Romero 
41624f7979Spbrook static struct target_sigaction sigact_table[TARGET_NSIG];
4231e31b8aSbellard 
4366fb9763Sbellard static void host_signal_handler(int host_signum, siginfo_t *info,
4466fb9763Sbellard                                 void *puc);
4566fb9763Sbellard 
46db2af69dSRichard Henderson /* Fallback addresses into sigtramp page. */
47db2af69dSRichard Henderson abi_ulong default_sigreturn;
48db2af69dSRichard Henderson abi_ulong default_rt_sigreturn;
499fcff3a6SLaurent Vivier 
509fcff3a6SLaurent Vivier /*
51b60b91aaSRichard Henderson  * System includes define _NSIG as SIGRTMAX + 1, but qemu (like the kernel)
52b60b91aaSRichard Henderson  * defines TARGET_NSIG as TARGET_SIGRTMAX and the first signal is 1.
539fcff3a6SLaurent Vivier  * Signal number 0 is reserved for use as kill(pid, 0), to test whether
549fcff3a6SLaurent Vivier  * a process exists without sending it a signal.
559fcff3a6SLaurent Vivier  */
56144bff03SMichael Forney #ifdef __SIGRTMAX
579fcff3a6SLaurent Vivier QEMU_BUILD_BUG_ON(__SIGRTMAX + 1 != _NSIG);
58144bff03SMichael Forney #endif
593ca05588SArnaud Patard static uint8_t host_to_target_signal_table[_NSIG] = {
607b72aa1dSHelge Deller #define MAKE_SIG_ENTRY(sig)     [sig] = TARGET_##sig,
617b72aa1dSHelge Deller         MAKE_SIGNAL_LIST
627b72aa1dSHelge Deller #undef MAKE_SIG_ENTRY
639e5f5284Sbellard };
649e5f5284Sbellard 
659fcff3a6SLaurent Vivier static uint8_t target_to_host_signal_table[TARGET_NSIG + 1];
669fcff3a6SLaurent Vivier 
679fcff3a6SLaurent Vivier /* valid sig is between 1 and _NSIG - 1 */
host_to_target_signal(int sig)681d9d8b55Spbrook int host_to_target_signal(int sig)
6931e31b8aSbellard {
70b60b91aaSRichard Henderson     if (sig < 1) {
714cb05961Spbrook         return sig;
729fcff3a6SLaurent Vivier     }
73b60b91aaSRichard Henderson     if (sig >= _NSIG) {
74b60b91aaSRichard Henderson         return TARGET_NSIG + 1;
75b60b91aaSRichard Henderson     }
769e5f5284Sbellard     return host_to_target_signal_table[sig];
7731e31b8aSbellard }
7831e31b8aSbellard 
799fcff3a6SLaurent Vivier /* valid sig is between 1 and TARGET_NSIG */
target_to_host_signal(int sig)804cb05961Spbrook int target_to_host_signal(int sig)
8131e31b8aSbellard {
82b60b91aaSRichard Henderson     if (sig < 1) {
834cb05961Spbrook         return sig;
849fcff3a6SLaurent Vivier     }
85b60b91aaSRichard Henderson     if (sig > TARGET_NSIG) {
86b60b91aaSRichard Henderson         return _NSIG;
87b60b91aaSRichard Henderson     }
889e5f5284Sbellard     return target_to_host_signal_table[sig];
8931e31b8aSbellard }
9031e31b8aSbellard 
target_sigaddset(target_sigset_t * set,int signum)91c227f099SAnthony Liguori static inline void target_sigaddset(target_sigset_t *set, int signum)
92f5545b5cSpbrook {
93f5545b5cSpbrook     signum--;
94f5545b5cSpbrook     abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
95f5545b5cSpbrook     set->sig[signum / TARGET_NSIG_BPW] |= mask;
96f5545b5cSpbrook }
97f5545b5cSpbrook 
target_sigismember(const target_sigset_t * set,int signum)98c227f099SAnthony Liguori static inline int target_sigismember(const target_sigset_t *set, int signum)
99f5545b5cSpbrook {
100f5545b5cSpbrook     signum--;
101f5545b5cSpbrook     abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW);
102f5545b5cSpbrook     return ((set->sig[signum / TARGET_NSIG_BPW] & mask) != 0);
103f5545b5cSpbrook }
104f5545b5cSpbrook 
host_to_target_sigset_internal(target_sigset_t * d,const sigset_t * s)105befb7447SLaurent Vivier void host_to_target_sigset_internal(target_sigset_t *d,
1069231944dSbellard                                     const sigset_t *s)
10766fb9763Sbellard {
1089fcff3a6SLaurent Vivier     int host_sig, target_sig;
109f5545b5cSpbrook     target_sigemptyset(d);
1109fcff3a6SLaurent Vivier     for (host_sig = 1; host_sig < _NSIG; host_sig++) {
1119fcff3a6SLaurent Vivier         target_sig = host_to_target_signal(host_sig);
1129fcff3a6SLaurent Vivier         if (target_sig < 1 || target_sig > TARGET_NSIG) {
1139fcff3a6SLaurent Vivier             continue;
1149fcff3a6SLaurent Vivier         }
1159fcff3a6SLaurent Vivier         if (sigismember(s, host_sig)) {
1169fcff3a6SLaurent Vivier             target_sigaddset(d, target_sig);
1179e5f5284Sbellard         }
11866fb9763Sbellard     }
11966fb9763Sbellard }
12066fb9763Sbellard 
host_to_target_sigset(target_sigset_t * d,const sigset_t * s)121c227f099SAnthony Liguori void host_to_target_sigset(target_sigset_t *d, const sigset_t *s)
1229231944dSbellard {
123c227f099SAnthony Liguori     target_sigset_t d1;
1249231944dSbellard     int i;
1259231944dSbellard 
1269231944dSbellard     host_to_target_sigset_internal(&d1, s);
1279231944dSbellard     for(i = 0;i < TARGET_NSIG_WORDS; i++)
128cbb21eedSMatthias Braun         d->sig[i] = tswapal(d1.sig[i]);
1299231944dSbellard }
1309231944dSbellard 
target_to_host_sigset_internal(sigset_t * d,const target_sigset_t * s)131befb7447SLaurent Vivier void target_to_host_sigset_internal(sigset_t *d,
132c227f099SAnthony Liguori                                     const target_sigset_t *s)
13366fb9763Sbellard {
1349fcff3a6SLaurent Vivier     int host_sig, target_sig;
135f5545b5cSpbrook     sigemptyset(d);
1369fcff3a6SLaurent Vivier     for (target_sig = 1; target_sig <= TARGET_NSIG; target_sig++) {
1379fcff3a6SLaurent Vivier         host_sig = target_to_host_signal(target_sig);
1389fcff3a6SLaurent Vivier         if (host_sig < 1 || host_sig >= _NSIG) {
1399fcff3a6SLaurent Vivier             continue;
1409fcff3a6SLaurent Vivier         }
1419fcff3a6SLaurent Vivier         if (target_sigismember(s, target_sig)) {
1429fcff3a6SLaurent Vivier             sigaddset(d, host_sig);
1439e5f5284Sbellard         }
14466fb9763Sbellard     }
14566fb9763Sbellard }
14666fb9763Sbellard 
target_to_host_sigset(sigset_t * d,const target_sigset_t * s)147c227f099SAnthony Liguori void target_to_host_sigset(sigset_t *d, const target_sigset_t *s)
1489231944dSbellard {
149c227f099SAnthony Liguori     target_sigset_t s1;
1509231944dSbellard     int i;
1519231944dSbellard 
1529231944dSbellard     for(i = 0;i < TARGET_NSIG_WORDS; i++)
153cbb21eedSMatthias Braun         s1.sig[i] = tswapal(s->sig[i]);
1549231944dSbellard     target_to_host_sigset_internal(d, &s1);
1559231944dSbellard }
1569231944dSbellard 
host_to_target_old_sigset(abi_ulong * old_sigset,const sigset_t * sigset)157992f48a0Sblueswir1 void host_to_target_old_sigset(abi_ulong *old_sigset,
15866fb9763Sbellard                                const sigset_t *sigset)
15966fb9763Sbellard {
160c227f099SAnthony Liguori     target_sigset_t d;
1619e5f5284Sbellard     host_to_target_sigset(&d, sigset);
1629e5f5284Sbellard     *old_sigset = d.sig[0];
16366fb9763Sbellard }
16466fb9763Sbellard 
target_to_host_old_sigset(sigset_t * sigset,const abi_ulong * old_sigset)16566fb9763Sbellard void target_to_host_old_sigset(sigset_t *sigset,
166992f48a0Sblueswir1                                const abi_ulong *old_sigset)
16766fb9763Sbellard {
168c227f099SAnthony Liguori     target_sigset_t d;
1699e5f5284Sbellard     int i;
1709e5f5284Sbellard 
1719e5f5284Sbellard     d.sig[0] = *old_sigset;
1729e5f5284Sbellard     for(i = 1;i < TARGET_NSIG_WORDS; i++)
1739e5f5284Sbellard         d.sig[i] = 0;
1749e5f5284Sbellard     target_to_host_sigset(sigset, &d);
17566fb9763Sbellard }
17666fb9763Sbellard 
block_signals(void)1773d3efba0SPeter Maydell int block_signals(void)
1783d3efba0SPeter Maydell {
179e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
1803d3efba0SPeter Maydell     sigset_t set;
1813d3efba0SPeter Maydell 
1823d3efba0SPeter Maydell     /* It's OK to block everything including SIGSEGV, because we won't
1833d3efba0SPeter Maydell      * run any further guest code before unblocking signals in
1843d3efba0SPeter Maydell      * process_pending_signals().
1853d3efba0SPeter Maydell      */
1863d3efba0SPeter Maydell     sigfillset(&set);
1873d3efba0SPeter Maydell     sigprocmask(SIG_SETMASK, &set, 0);
1883d3efba0SPeter Maydell 
189d73415a3SStefan Hajnoczi     return qatomic_xchg(&ts->signal_pending, 1);
1903d3efba0SPeter Maydell }
1913d3efba0SPeter Maydell 
1921c275925SAlex Barcelo /* Wrapper for sigprocmask function
1931c275925SAlex Barcelo  * Emulates a sigprocmask in a safe way for the guest. Note that set and oldset
194af254a27SRichard Henderson  * are host signal set, not guest ones. Returns -QEMU_ERESTARTSYS if
1953d3efba0SPeter Maydell  * a signal was already pending and the syscall must be restarted, or
1963d3efba0SPeter Maydell  * 0 on success.
1973d3efba0SPeter Maydell  * If set is NULL, this is guaranteed not to fail.
1981c275925SAlex Barcelo  */
do_sigprocmask(int how,const sigset_t * set,sigset_t * oldset)1991c275925SAlex Barcelo int do_sigprocmask(int how, const sigset_t *set, sigset_t *oldset)
2001c275925SAlex Barcelo {
201e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2023d3efba0SPeter Maydell 
2033d3efba0SPeter Maydell     if (oldset) {
2043d3efba0SPeter Maydell         *oldset = ts->signal_mask;
2053d3efba0SPeter Maydell     }
206a7ec0f98SPeter Maydell 
207a7ec0f98SPeter Maydell     if (set) {
2083d3efba0SPeter Maydell         int i;
209a7ec0f98SPeter Maydell 
2103d3efba0SPeter Maydell         if (block_signals()) {
211af254a27SRichard Henderson             return -QEMU_ERESTARTSYS;
2123d3efba0SPeter Maydell         }
213a7ec0f98SPeter Maydell 
214a7ec0f98SPeter Maydell         switch (how) {
215a7ec0f98SPeter Maydell         case SIG_BLOCK:
2163d3efba0SPeter Maydell             sigorset(&ts->signal_mask, &ts->signal_mask, set);
217a7ec0f98SPeter Maydell             break;
218a7ec0f98SPeter Maydell         case SIG_UNBLOCK:
2193d3efba0SPeter Maydell             for (i = 1; i <= NSIG; ++i) {
2203d3efba0SPeter Maydell                 if (sigismember(set, i)) {
2213d3efba0SPeter Maydell                     sigdelset(&ts->signal_mask, i);
2223d3efba0SPeter Maydell                 }
223a7ec0f98SPeter Maydell             }
224a7ec0f98SPeter Maydell             break;
225a7ec0f98SPeter Maydell         case SIG_SETMASK:
2263d3efba0SPeter Maydell             ts->signal_mask = *set;
227a7ec0f98SPeter Maydell             break;
228a7ec0f98SPeter Maydell         default:
229a7ec0f98SPeter Maydell             g_assert_not_reached();
230a7ec0f98SPeter Maydell         }
2313d3efba0SPeter Maydell 
2323d3efba0SPeter Maydell         /* Silently ignore attempts to change blocking status of KILL or STOP */
2333d3efba0SPeter Maydell         sigdelset(&ts->signal_mask, SIGKILL);
2343d3efba0SPeter Maydell         sigdelset(&ts->signal_mask, SIGSTOP);
235a7ec0f98SPeter Maydell     }
2363d3efba0SPeter Maydell     return 0;
2371c275925SAlex Barcelo }
2381c275925SAlex Barcelo 
2393d3efba0SPeter Maydell /* Just set the guest's signal mask to the specified value; the
2403d3efba0SPeter Maydell  * caller is assumed to have called block_signals() already.
2413d3efba0SPeter Maydell  */
set_sigmask(const sigset_t * set)242befb7447SLaurent Vivier void set_sigmask(const sigset_t *set)
2439eede5b6SPeter Maydell {
244e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2453d3efba0SPeter Maydell 
2463d3efba0SPeter Maydell     ts->signal_mask = *set;
2479eede5b6SPeter Maydell }
2489eede5b6SPeter Maydell 
249465e237bSLaurent Vivier /* sigaltstack management */
250465e237bSLaurent Vivier 
on_sig_stack(unsigned long sp)251465e237bSLaurent Vivier int on_sig_stack(unsigned long sp)
252465e237bSLaurent Vivier {
253e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2545bfce0b7SPeter Maydell 
2555bfce0b7SPeter Maydell     return (sp - ts->sigaltstack_used.ss_sp
2565bfce0b7SPeter Maydell             < ts->sigaltstack_used.ss_size);
257465e237bSLaurent Vivier }
258465e237bSLaurent Vivier 
sas_ss_flags(unsigned long sp)259465e237bSLaurent Vivier int sas_ss_flags(unsigned long sp)
260465e237bSLaurent Vivier {
261e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2625bfce0b7SPeter Maydell 
2635bfce0b7SPeter Maydell     return (ts->sigaltstack_used.ss_size == 0 ? SS_DISABLE
264465e237bSLaurent Vivier             : on_sig_stack(sp) ? SS_ONSTACK : 0);
265465e237bSLaurent Vivier }
266465e237bSLaurent Vivier 
target_sigsp(abi_ulong sp,struct target_sigaction * ka)267465e237bSLaurent Vivier abi_ulong target_sigsp(abi_ulong sp, struct target_sigaction *ka)
268465e237bSLaurent Vivier {
269465e237bSLaurent Vivier     /*
270465e237bSLaurent Vivier      * This is the X/Open sanctioned signal stack switching.
271465e237bSLaurent Vivier      */
272e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2735bfce0b7SPeter Maydell 
274465e237bSLaurent Vivier     if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) {
2755bfce0b7SPeter Maydell         return ts->sigaltstack_used.ss_sp + ts->sigaltstack_used.ss_size;
276465e237bSLaurent Vivier     }
277465e237bSLaurent Vivier     return sp;
278465e237bSLaurent Vivier }
279465e237bSLaurent Vivier 
target_save_altstack(target_stack_t * uss,CPUArchState * env)280465e237bSLaurent Vivier void target_save_altstack(target_stack_t *uss, CPUArchState *env)
281465e237bSLaurent Vivier {
282e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
2835bfce0b7SPeter Maydell 
2845bfce0b7SPeter Maydell     __put_user(ts->sigaltstack_used.ss_sp, &uss->ss_sp);
285465e237bSLaurent Vivier     __put_user(sas_ss_flags(get_sp_from_cpustate(env)), &uss->ss_flags);
2865bfce0b7SPeter Maydell     __put_user(ts->sigaltstack_used.ss_size, &uss->ss_size);
287465e237bSLaurent Vivier }
288465e237bSLaurent Vivier 
target_restore_altstack(target_stack_t * uss,CPUArchState * env)289ddc3e74dSRichard Henderson abi_long target_restore_altstack(target_stack_t *uss, CPUArchState *env)
29092bad948SRichard Henderson {
291e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
29292bad948SRichard Henderson     size_t minstacksize = TARGET_MINSIGSTKSZ;
29392bad948SRichard Henderson     target_stack_t ss;
29492bad948SRichard Henderson 
29592bad948SRichard Henderson #if defined(TARGET_PPC64)
29692bad948SRichard Henderson     /* ELF V2 for PPC64 has a 4K minimum stack size for signal handlers */
29792bad948SRichard Henderson     struct image_info *image = ts->info;
29892bad948SRichard Henderson     if (get_ppc64_abi(image) > 1) {
29992bad948SRichard Henderson         minstacksize = 4096;
30092bad948SRichard Henderson     }
30192bad948SRichard Henderson #endif
30292bad948SRichard Henderson 
30392bad948SRichard Henderson     __get_user(ss.ss_sp, &uss->ss_sp);
30492bad948SRichard Henderson     __get_user(ss.ss_size, &uss->ss_size);
30592bad948SRichard Henderson     __get_user(ss.ss_flags, &uss->ss_flags);
30692bad948SRichard Henderson 
307ddc3e74dSRichard Henderson     if (on_sig_stack(get_sp_from_cpustate(env))) {
30892bad948SRichard Henderson         return -TARGET_EPERM;
30992bad948SRichard Henderson     }
31092bad948SRichard Henderson 
31192bad948SRichard Henderson     switch (ss.ss_flags) {
31292bad948SRichard Henderson     default:
31392bad948SRichard Henderson         return -TARGET_EINVAL;
31492bad948SRichard Henderson 
31592bad948SRichard Henderson     case TARGET_SS_DISABLE:
31692bad948SRichard Henderson         ss.ss_size = 0;
31792bad948SRichard Henderson         ss.ss_sp = 0;
31892bad948SRichard Henderson         break;
31992bad948SRichard Henderson 
32092bad948SRichard Henderson     case TARGET_SS_ONSTACK:
32192bad948SRichard Henderson     case 0:
32292bad948SRichard Henderson         if (ss.ss_size < minstacksize) {
32392bad948SRichard Henderson             return -TARGET_ENOMEM;
32492bad948SRichard Henderson         }
32592bad948SRichard Henderson         break;
32692bad948SRichard Henderson     }
32792bad948SRichard Henderson 
32892bad948SRichard Henderson     ts->sigaltstack_used.ss_sp = ss.ss_sp;
32992bad948SRichard Henderson     ts->sigaltstack_used.ss_size = ss.ss_size;
33092bad948SRichard Henderson     return 0;
33192bad948SRichard Henderson }
33292bad948SRichard Henderson 
3339de5e440Sbellard /* siginfo conversion */
3349de5e440Sbellard 
host_to_target_siginfo_noswap(target_siginfo_t * tinfo,const siginfo_t * info)335c227f099SAnthony Liguori static inline void host_to_target_siginfo_noswap(target_siginfo_t *tinfo,
3369de5e440Sbellard                                                  const siginfo_t *info)
33766fb9763Sbellard {
338a05c6409SRichard Henderson     int sig = host_to_target_signal(info->si_signo);
339a70dadc7SPeter Maydell     int si_code = info->si_code;
340a70dadc7SPeter Maydell     int si_type;
3419de5e440Sbellard     tinfo->si_signo = sig;
3429de5e440Sbellard     tinfo->si_errno = 0;
343afd7cd92Spbrook     tinfo->si_code = info->si_code;
344a05c6409SRichard Henderson 
34555d72a7eSPeter Maydell     /* This memset serves two purposes:
34655d72a7eSPeter Maydell      * (1) ensure we don't leak random junk to the guest later
34755d72a7eSPeter Maydell      * (2) placate false positives from gcc about fields
34855d72a7eSPeter Maydell      *     being used uninitialized if it chooses to inline both this
34955d72a7eSPeter Maydell      *     function and tswap_siginfo() into host_to_target_siginfo().
35055d72a7eSPeter Maydell      */
35155d72a7eSPeter Maydell     memset(tinfo->_sifields._pad, 0, sizeof(tinfo->_sifields._pad));
35255d72a7eSPeter Maydell 
353a70dadc7SPeter Maydell     /* This is awkward, because we have to use a combination of
354a70dadc7SPeter Maydell      * the si_code and si_signo to figure out which of the union's
355a70dadc7SPeter Maydell      * members are valid. (Within the host kernel it is always possible
356a70dadc7SPeter Maydell      * to tell, but the kernel carefully avoids giving userspace the
357a70dadc7SPeter Maydell      * high 16 bits of si_code, so we don't have the information to
358a70dadc7SPeter Maydell      * do this the easy way...) We therefore make our best guess,
359a70dadc7SPeter Maydell      * bearing in mind that a guest can spoof most of the si_codes
360a70dadc7SPeter Maydell      * via rt_sigqueueinfo() if it likes.
361a70dadc7SPeter Maydell      *
362a70dadc7SPeter Maydell      * Once we have made our guess, we record it in the top 16 bits of
363a70dadc7SPeter Maydell      * the si_code, so that tswap_siginfo() later can use it.
364a70dadc7SPeter Maydell      * tswap_siginfo() will strip these top bits out before writing
365a70dadc7SPeter Maydell      * si_code to the guest (sign-extending the lower bits).
366a70dadc7SPeter Maydell      */
367a70dadc7SPeter Maydell 
368a70dadc7SPeter Maydell     switch (si_code) {
369a70dadc7SPeter Maydell     case SI_USER:
370a70dadc7SPeter Maydell     case SI_TKILL:
371a70dadc7SPeter Maydell     case SI_KERNEL:
372a70dadc7SPeter Maydell         /* Sent via kill(), tkill() or tgkill(), or direct from the kernel.
373a70dadc7SPeter Maydell          * These are the only unspoofable si_code values.
374a70dadc7SPeter Maydell          */
375a70dadc7SPeter Maydell         tinfo->_sifields._kill._pid = info->si_pid;
376a70dadc7SPeter Maydell         tinfo->_sifields._kill._uid = info->si_uid;
377a70dadc7SPeter Maydell         si_type = QEMU_SI_KILL;
378a70dadc7SPeter Maydell         break;
379a70dadc7SPeter Maydell     default:
380a70dadc7SPeter Maydell         /* Everything else is spoofable. Make best guess based on signal */
381a70dadc7SPeter Maydell         switch (sig) {
382a70dadc7SPeter Maydell         case TARGET_SIGCHLD:
383a05c6409SRichard Henderson             tinfo->_sifields._sigchld._pid = info->si_pid;
384a05c6409SRichard Henderson             tinfo->_sifields._sigchld._uid = info->si_uid;
385139e5de7SMatthias Schiffer             if (si_code == CLD_EXITED)
3861c3dfb50SAlistair Francis                 tinfo->_sifields._sigchld._status = info->si_status;
387139e5de7SMatthias Schiffer             else
388139e5de7SMatthias Schiffer                 tinfo->_sifields._sigchld._status
389139e5de7SMatthias Schiffer                     = host_to_target_signal(info->si_status & 0x7f)
390139e5de7SMatthias Schiffer                         | (info->si_status & ~0x7f);
391a05c6409SRichard Henderson             tinfo->_sifields._sigchld._utime = info->si_utime;
392a05c6409SRichard Henderson             tinfo->_sifields._sigchld._stime = info->si_stime;
393a70dadc7SPeter Maydell             si_type = QEMU_SI_CHLD;
394a70dadc7SPeter Maydell             break;
395a70dadc7SPeter Maydell         case TARGET_SIGIO:
396a70dadc7SPeter Maydell             tinfo->_sifields._sigpoll._band = info->si_band;
397a70dadc7SPeter Maydell             tinfo->_sifields._sigpoll._fd = info->si_fd;
398a70dadc7SPeter Maydell             si_type = QEMU_SI_POLL;
399a70dadc7SPeter Maydell             break;
400a70dadc7SPeter Maydell         default:
401a70dadc7SPeter Maydell             /* Assume a sigqueue()/mq_notify()/rt_sigqueueinfo() source. */
4029de5e440Sbellard             tinfo->_sifields._rt._pid = info->si_pid;
4039de5e440Sbellard             tinfo->_sifields._rt._uid = info->si_uid;
4049de5e440Sbellard             /* XXX: potential problem if 64 bit */
405a05c6409SRichard Henderson             tinfo->_sifields._rt._sigval.sival_ptr
406a05c6409SRichard Henderson                 = (abi_ulong)(unsigned long)info->si_value.sival_ptr;
407a70dadc7SPeter Maydell             si_type = QEMU_SI_RT;
408a70dadc7SPeter Maydell             break;
4099de5e440Sbellard         }
410a70dadc7SPeter Maydell         break;
411a70dadc7SPeter Maydell     }
412a70dadc7SPeter Maydell 
413a70dadc7SPeter Maydell     tinfo->si_code = deposit32(si_code, 16, 16, si_type);
41466fb9763Sbellard }
41566fb9763Sbellard 
tswap_siginfo(target_siginfo_t * tinfo,const target_siginfo_t * info)4164d6d8a05SGustavo Romero static void tswap_siginfo(target_siginfo_t *tinfo,
417c227f099SAnthony Liguori                           const target_siginfo_t *info)
4189de5e440Sbellard {
419a70dadc7SPeter Maydell     int si_type = extract32(info->si_code, 16, 16);
420a70dadc7SPeter Maydell     int si_code = sextract32(info->si_code, 0, 16);
421a05c6409SRichard Henderson 
422a70dadc7SPeter Maydell     __put_user(info->si_signo, &tinfo->si_signo);
423a70dadc7SPeter Maydell     __put_user(info->si_errno, &tinfo->si_errno);
424a70dadc7SPeter Maydell     __put_user(si_code, &tinfo->si_code);
425a70dadc7SPeter Maydell 
426a70dadc7SPeter Maydell     /* We can use our internal marker of which fields in the structure
427a70dadc7SPeter Maydell      * are valid, rather than duplicating the guesswork of
428a70dadc7SPeter Maydell      * host_to_target_siginfo_noswap() here.
429a70dadc7SPeter Maydell      */
430a70dadc7SPeter Maydell     switch (si_type) {
431a70dadc7SPeter Maydell     case QEMU_SI_KILL:
432a70dadc7SPeter Maydell         __put_user(info->_sifields._kill._pid, &tinfo->_sifields._kill._pid);
433a70dadc7SPeter Maydell         __put_user(info->_sifields._kill._uid, &tinfo->_sifields._kill._uid);
434a70dadc7SPeter Maydell         break;
435a70dadc7SPeter Maydell     case QEMU_SI_TIMER:
436a70dadc7SPeter Maydell         __put_user(info->_sifields._timer._timer1,
437a70dadc7SPeter Maydell                    &tinfo->_sifields._timer._timer1);
438a70dadc7SPeter Maydell         __put_user(info->_sifields._timer._timer2,
439a70dadc7SPeter Maydell                    &tinfo->_sifields._timer._timer2);
440a70dadc7SPeter Maydell         break;
441a70dadc7SPeter Maydell     case QEMU_SI_POLL:
442a70dadc7SPeter Maydell         __put_user(info->_sifields._sigpoll._band,
443a70dadc7SPeter Maydell                    &tinfo->_sifields._sigpoll._band);
444a70dadc7SPeter Maydell         __put_user(info->_sifields._sigpoll._fd,
445a70dadc7SPeter Maydell                    &tinfo->_sifields._sigpoll._fd);
446a70dadc7SPeter Maydell         break;
447a70dadc7SPeter Maydell     case QEMU_SI_FAULT:
448a70dadc7SPeter Maydell         __put_user(info->_sifields._sigfault._addr,
449a70dadc7SPeter Maydell                    &tinfo->_sifields._sigfault._addr);
450a70dadc7SPeter Maydell         break;
451a70dadc7SPeter Maydell     case QEMU_SI_CHLD:
452a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._pid,
453a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._pid);
454a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._uid,
455a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._uid);
456a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._status,
457a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._status);
458a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._utime,
459a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._utime);
460a70dadc7SPeter Maydell         __put_user(info->_sifields._sigchld._stime,
461a70dadc7SPeter Maydell                    &tinfo->_sifields._sigchld._stime);
462a70dadc7SPeter Maydell         break;
463a70dadc7SPeter Maydell     case QEMU_SI_RT:
464a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._pid, &tinfo->_sifields._rt._pid);
465a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._uid, &tinfo->_sifields._rt._uid);
466a70dadc7SPeter Maydell         __put_user(info->_sifields._rt._sigval.sival_ptr,
467a70dadc7SPeter Maydell                    &tinfo->_sifields._rt._sigval.sival_ptr);
468a70dadc7SPeter Maydell         break;
469a70dadc7SPeter Maydell     default:
470a70dadc7SPeter Maydell         g_assert_not_reached();
4719de5e440Sbellard     }
4729de5e440Sbellard }
4739de5e440Sbellard 
host_to_target_siginfo(target_siginfo_t * tinfo,const siginfo_t * info)474c227f099SAnthony Liguori void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info)
4759de5e440Sbellard {
47655d72a7eSPeter Maydell     target_siginfo_t tgt_tmp;
47755d72a7eSPeter Maydell     host_to_target_siginfo_noswap(&tgt_tmp, info);
47855d72a7eSPeter Maydell     tswap_siginfo(tinfo, &tgt_tmp);
4799de5e440Sbellard }
4809de5e440Sbellard 
4819de5e440Sbellard /* XXX: we support only POSIX RT signals are used. */
482aa1f17c1Sths /* XXX: find a solution for 64 bit (additional malloced data is needed) */
target_to_host_siginfo(siginfo_t * info,const target_siginfo_t * tinfo)483c227f099SAnthony Liguori void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo)
48466fb9763Sbellard {
48590c0f080SPeter Maydell     /* This conversion is used only for the rt_sigqueueinfo syscall,
48690c0f080SPeter Maydell      * and so we know that the _rt fields are the valid ones.
48790c0f080SPeter Maydell      */
48890c0f080SPeter Maydell     abi_ulong sival_ptr;
48990c0f080SPeter Maydell 
49090c0f080SPeter Maydell     __get_user(info->si_signo, &tinfo->si_signo);
49190c0f080SPeter Maydell     __get_user(info->si_errno, &tinfo->si_errno);
49290c0f080SPeter Maydell     __get_user(info->si_code, &tinfo->si_code);
49390c0f080SPeter Maydell     __get_user(info->si_pid, &tinfo->_sifields._rt._pid);
49490c0f080SPeter Maydell     __get_user(info->si_uid, &tinfo->_sifields._rt._uid);
49590c0f080SPeter Maydell     __get_user(sival_ptr, &tinfo->_sifields._rt._sigval.sival_ptr);
49690c0f080SPeter Maydell     info->si_value.sival_ptr = (void *)(long)sival_ptr;
49766fb9763Sbellard }
49866fb9763Sbellard 
499edf8e2afSMika Westerberg /* returns 1 if given signal should dump core if not handled */
core_dump_signal(int sig)500edf8e2afSMika Westerberg static int core_dump_signal(int sig)
501edf8e2afSMika Westerberg {
502edf8e2afSMika Westerberg     switch (sig) {
503edf8e2afSMika Westerberg     case TARGET_SIGABRT:
504edf8e2afSMika Westerberg     case TARGET_SIGFPE:
505edf8e2afSMika Westerberg     case TARGET_SIGILL:
506edf8e2afSMika Westerberg     case TARGET_SIGQUIT:
507edf8e2afSMika Westerberg     case TARGET_SIGSEGV:
508edf8e2afSMika Westerberg     case TARGET_SIGTRAP:
509edf8e2afSMika Westerberg     case TARGET_SIGBUS:
510edf8e2afSMika Westerberg         return (1);
511edf8e2afSMika Westerberg     default:
512edf8e2afSMika Westerberg         return (0);
513edf8e2afSMika Westerberg     }
514edf8e2afSMika Westerberg }
515edf8e2afSMika Westerberg 
signal_table_init(void)516365510fbSLaurent Vivier static void signal_table_init(void)
517365510fbSLaurent Vivier {
518b60b91aaSRichard Henderson     int hsig, tsig, count;
519365510fbSLaurent Vivier 
520365510fbSLaurent Vivier     /*
5216bc024e7SLaurent Vivier      * Signals are supported starting from TARGET_SIGRTMIN and going up
522b60b91aaSRichard Henderson      * until we run out of host realtime signals.  Glibc uses the lower 2
523b60b91aaSRichard Henderson      * RT signals and (hopefully) nobody uses the upper ones.
524b60b91aaSRichard Henderson      * This is why SIGRTMIN (34) is generally greater than __SIGRTMIN (32).
525b60b91aaSRichard Henderson      * To fix this properly we would need to do manual signal delivery
526b60b91aaSRichard Henderson      * multiplexed over a single host signal.
5276bc024e7SLaurent Vivier      * Attempts for configure "missing" signals via sigaction will be
5286bc024e7SLaurent Vivier      * silently ignored.
52938ee0a7dSRichard Henderson      *
53038ee0a7dSRichard Henderson      * Remap the target SIGABRT, so that we can distinguish host abort
53138ee0a7dSRichard Henderson      * from guest abort.  When the guest registers a signal handler or
53238ee0a7dSRichard Henderson      * calls raise(SIGABRT), the host will raise SIG_RTn.  If the guest
53338ee0a7dSRichard Henderson      * arrives at dump_core_and_abort(), we will map back to host SIGABRT
53438ee0a7dSRichard Henderson      * so that the parent (native or emulated) sees the correct signal.
53538ee0a7dSRichard Henderson      * Finally, also map host to guest SIGABRT so that the emulated
53638ee0a7dSRichard Henderson      * parent sees the correct mapping from wait status.
537365510fbSLaurent Vivier      */
53838ee0a7dSRichard Henderson 
53938ee0a7dSRichard Henderson     hsig = SIGRTMIN;
54038ee0a7dSRichard Henderson     host_to_target_signal_table[SIGABRT] = 0;
54138ee0a7dSRichard Henderson     host_to_target_signal_table[hsig++] = TARGET_SIGABRT;
54238ee0a7dSRichard Henderson 
54302d9f5b6SRichard Henderson     for (tsig = TARGET_SIGRTMIN;
54402d9f5b6SRichard Henderson          hsig <= SIGRTMAX && tsig <= TARGET_NSIG;
54502d9f5b6SRichard Henderson          hsig++, tsig++) {
546b60b91aaSRichard Henderson         host_to_target_signal_table[hsig] = tsig;
5476bc024e7SLaurent Vivier     }
548365510fbSLaurent Vivier 
549b60b91aaSRichard Henderson     /* Invert the mapping that has already been assigned. */
550b60b91aaSRichard Henderson     for (hsig = 1; hsig < _NSIG; hsig++) {
551b60b91aaSRichard Henderson         tsig = host_to_target_signal_table[hsig];
552b60b91aaSRichard Henderson         if (tsig) {
553b60b91aaSRichard Henderson             assert(target_to_host_signal_table[tsig] == 0);
554b60b91aaSRichard Henderson             target_to_host_signal_table[tsig] = hsig;
555365510fbSLaurent Vivier         }
556365510fbSLaurent Vivier     }
5576bc024e7SLaurent Vivier 
55838ee0a7dSRichard Henderson     host_to_target_signal_table[SIGABRT] = TARGET_SIGABRT;
55938ee0a7dSRichard Henderson 
560b60b91aaSRichard Henderson     /* Map everything else out-of-bounds. */
561b60b91aaSRichard Henderson     for (hsig = 1; hsig < _NSIG; hsig++) {
562b60b91aaSRichard Henderson         if (host_to_target_signal_table[hsig] == 0) {
563b60b91aaSRichard Henderson             host_to_target_signal_table[hsig] = TARGET_NSIG + 1;
564b60b91aaSRichard Henderson         }
565b60b91aaSRichard Henderson     }
566b60b91aaSRichard Henderson     for (count = 0, tsig = 1; tsig <= TARGET_NSIG; tsig++) {
567b60b91aaSRichard Henderson         if (target_to_host_signal_table[tsig] == 0) {
568b60b91aaSRichard Henderson             target_to_host_signal_table[tsig] = _NSIG;
5696bc024e7SLaurent Vivier             count++;
5706bc024e7SLaurent Vivier         }
5716bc024e7SLaurent Vivier     }
572b60b91aaSRichard Henderson 
5736bc024e7SLaurent Vivier     trace_signal_table_init(count);
5746bc024e7SLaurent Vivier }
575365510fbSLaurent Vivier 
signal_init(void)57631e31b8aSbellard void signal_init(void)
57731e31b8aSbellard {
578e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
57958c4e36cSRichard Henderson     struct sigaction act, oact;
5809e5f5284Sbellard 
581365510fbSLaurent Vivier     /* initialize signal conversion tables */
582365510fbSLaurent Vivier     signal_table_init();
58331e31b8aSbellard 
5843d3efba0SPeter Maydell     /* Set the signal mask from the host mask. */
5853d3efba0SPeter Maydell     sigprocmask(0, 0, &ts->signal_mask);
5863d3efba0SPeter Maydell 
5879de5e440Sbellard     sigfillset(&act.sa_mask);
58831e31b8aSbellard     act.sa_flags = SA_SIGINFO;
58931e31b8aSbellard     act.sa_sigaction = host_signal_handler;
59058c4e36cSRichard Henderson 
59158c4e36cSRichard Henderson     /*
59258c4e36cSRichard Henderson      * A parent process may configure ignored signals, but all other
59358c4e36cSRichard Henderson      * signals are default.  For any target signals that have no host
59458c4e36cSRichard Henderson      * mapping, set to ignore.  For all core_dump_signal, install our
59558c4e36cSRichard Henderson      * host signal handler so that we may invoke dump_core_and_abort.
59658c4e36cSRichard Henderson      * This includes SIGSEGV and SIGBUS, which are also need our signal
59758c4e36cSRichard Henderson      * handler for paging and exceptions.
59858c4e36cSRichard Henderson      */
59958c4e36cSRichard Henderson     for (int tsig = 1; tsig <= TARGET_NSIG; tsig++) {
60058c4e36cSRichard Henderson         int hsig = target_to_host_signal(tsig);
60158c4e36cSRichard Henderson         abi_ptr thand = TARGET_SIG_IGN;
60258c4e36cSRichard Henderson 
60338ee0a7dSRichard Henderson         if (hsig >= _NSIG) {
60438ee0a7dSRichard Henderson             continue;
60538ee0a7dSRichard Henderson         }
60658c4e36cSRichard Henderson 
60738ee0a7dSRichard Henderson         /* As we force remap SIGABRT, cannot probe and install in one step. */
60838ee0a7dSRichard Henderson         if (tsig == TARGET_SIGABRT) {
60938ee0a7dSRichard Henderson             sigaction(SIGABRT, NULL, &oact);
61038ee0a7dSRichard Henderson             sigaction(hsig, &act, NULL);
61138ee0a7dSRichard Henderson         } else {
61238ee0a7dSRichard Henderson             struct sigaction *iact = core_dump_signal(tsig) ? &act : NULL;
61358c4e36cSRichard Henderson             sigaction(hsig, iact, &oact);
61438ee0a7dSRichard Henderson         }
61538ee0a7dSRichard Henderson 
61658c4e36cSRichard Henderson         if (oact.sa_sigaction != (void *)SIG_IGN) {
61758c4e36cSRichard Henderson             thand = TARGET_SIG_DFL;
61831e31b8aSbellard         }
61958c4e36cSRichard Henderson         sigact_table[tsig - 1]._sa_handler = thand;
620624f7979Spbrook     }
621dbde2c0cSRichard Henderson }
62231e31b8aSbellard 
623c599d4d6SPeter Maydell /* Force a synchronously taken signal. The kernel force_sig() function
624c599d4d6SPeter Maydell  * also forces the signal to "not blocked, not ignored", but for QEMU
625c599d4d6SPeter Maydell  * that work is done in process_pending_signals().
626c599d4d6SPeter Maydell  */
force_sig(int sig)627befb7447SLaurent Vivier void force_sig(int sig)
628c599d4d6SPeter Maydell {
629c599d4d6SPeter Maydell     CPUState *cpu = thread_cpu;
630819121b9SPeter Maydell     target_siginfo_t info = {};
631c599d4d6SPeter Maydell 
632c599d4d6SPeter Maydell     info.si_signo = sig;
633c599d4d6SPeter Maydell     info.si_errno = 0;
634c599d4d6SPeter Maydell     info.si_code = TARGET_SI_KERNEL;
635c599d4d6SPeter Maydell     info._sifields._kill._pid = 0;
636c599d4d6SPeter Maydell     info._sifields._kill._uid = 0;
63742e62aadSPhilippe Mathieu-Daudé     queue_signal(cpu_env(cpu), info.si_signo, QEMU_SI_KILL, &info);
638c599d4d6SPeter Maydell }
63909391669SPeter Maydell 
640af796960SPeter Maydell /*
641af796960SPeter Maydell  * Force a synchronously taken QEMU_SI_FAULT signal. For QEMU the
642af796960SPeter Maydell  * 'force' part is handled in process_pending_signals().
643af796960SPeter Maydell  */
force_sig_fault(int sig,int code,abi_ulong addr)644af796960SPeter Maydell void force_sig_fault(int sig, int code, abi_ulong addr)
645af796960SPeter Maydell {
646af796960SPeter Maydell     CPUState *cpu = thread_cpu;
647af796960SPeter Maydell     target_siginfo_t info = {};
648af796960SPeter Maydell 
649af796960SPeter Maydell     info.si_signo = sig;
650af796960SPeter Maydell     info.si_errno = 0;
651af796960SPeter Maydell     info.si_code = code;
652af796960SPeter Maydell     info._sifields._sigfault._addr = addr;
65342e62aadSPhilippe Mathieu-Daudé     queue_signal(cpu_env(cpu), sig, QEMU_SI_FAULT, &info);
654af796960SPeter Maydell }
655af796960SPeter Maydell 
65609391669SPeter Maydell /* Force a SIGSEGV if we couldn't write to memory trying to set
65709391669SPeter Maydell  * up the signal frame. oldsig is the signal we were trying to handle
65809391669SPeter Maydell  * at the point of failure.
65909391669SPeter Maydell  */
66047ae93cdSMichael Clark #if !defined(TARGET_RISCV)
force_sigsegv(int oldsig)661befb7447SLaurent Vivier void force_sigsegv(int oldsig)
66209391669SPeter Maydell {
66309391669SPeter Maydell     if (oldsig == SIGSEGV) {
66409391669SPeter Maydell         /* Make sure we don't try to deliver the signal again; this will
665c599d4d6SPeter Maydell          * end up with handle_pending_signal() calling dump_core_and_abort().
66609391669SPeter Maydell          */
66709391669SPeter Maydell         sigact_table[oldsig - 1]._sa_handler = TARGET_SIG_DFL;
66809391669SPeter Maydell     }
669c4b35744SPeter Maydell     force_sig(TARGET_SIGSEGV);
67009391669SPeter Maydell }
67147ae93cdSMichael Clark #endif
67247ae93cdSMichael Clark 
cpu_loop_exit_sigsegv(CPUState * cpu,target_ulong addr,MMUAccessType access_type,bool maperr,uintptr_t ra)67372d2bbf9SRichard Henderson void cpu_loop_exit_sigsegv(CPUState *cpu, target_ulong addr,
67472d2bbf9SRichard Henderson                            MMUAccessType access_type, bool maperr, uintptr_t ra)
67572d2bbf9SRichard Henderson {
6761764ad70SRichard Henderson     const TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
67772d2bbf9SRichard Henderson 
67872d2bbf9SRichard Henderson     if (tcg_ops->record_sigsegv) {
67972d2bbf9SRichard Henderson         tcg_ops->record_sigsegv(cpu, addr, access_type, maperr, ra);
68072d2bbf9SRichard Henderson     }
68172d2bbf9SRichard Henderson 
68272d2bbf9SRichard Henderson     force_sig_fault(TARGET_SIGSEGV,
68372d2bbf9SRichard Henderson                     maperr ? TARGET_SEGV_MAPERR : TARGET_SEGV_ACCERR,
68472d2bbf9SRichard Henderson                     addr);
68572d2bbf9SRichard Henderson     cpu->exception_index = EXCP_INTERRUPT;
68672d2bbf9SRichard Henderson     cpu_loop_exit_restore(cpu, ra);
68772d2bbf9SRichard Henderson }
68872d2bbf9SRichard Henderson 
cpu_loop_exit_sigbus(CPUState * cpu,target_ulong addr,MMUAccessType access_type,uintptr_t ra)68912ed5640SRichard Henderson void cpu_loop_exit_sigbus(CPUState *cpu, target_ulong addr,
69012ed5640SRichard Henderson                           MMUAccessType access_type, uintptr_t ra)
69112ed5640SRichard Henderson {
6921764ad70SRichard Henderson     const TCGCPUOps *tcg_ops = CPU_GET_CLASS(cpu)->tcg_ops;
69312ed5640SRichard Henderson 
69412ed5640SRichard Henderson     if (tcg_ops->record_sigbus) {
69512ed5640SRichard Henderson         tcg_ops->record_sigbus(cpu, addr, access_type, ra);
69612ed5640SRichard Henderson     }
69712ed5640SRichard Henderson 
69812ed5640SRichard Henderson     force_sig_fault(TARGET_SIGBUS, TARGET_BUS_ADRALN, addr);
69912ed5640SRichard Henderson     cpu->exception_index = EXCP_INTERRUPT;
70012ed5640SRichard Henderson     cpu_loop_exit_restore(cpu, ra);
70112ed5640SRichard Henderson }
70212ed5640SRichard Henderson 
7039de5e440Sbellard /* abort execution with signal */
7048905770bSMarc-André Lureau static G_NORETURN
die_with_signal(int host_sig)705b8b50f1eSRichard Henderson void die_with_signal(int host_sig)
706b8b50f1eSRichard Henderson {
707b8b50f1eSRichard Henderson     struct sigaction act = {
708b8b50f1eSRichard Henderson         .sa_handler = SIG_DFL,
709b8b50f1eSRichard Henderson     };
710b8b50f1eSRichard Henderson 
711b8b50f1eSRichard Henderson     /*
712b8b50f1eSRichard Henderson      * The proper exit code for dying from an uncaught signal is -<signal>.
713b8b50f1eSRichard Henderson      * The kernel doesn't allow exit() or _exit() to pass a negative value.
714b8b50f1eSRichard Henderson      * To get the proper exit code we need to actually die from an uncaught
715b8b50f1eSRichard Henderson      * signal.  Here the default signal handler is installed, we send
716b8b50f1eSRichard Henderson      * the signal and we wait for it to arrive.
717b8b50f1eSRichard Henderson      */
718b8b50f1eSRichard Henderson     sigfillset(&act.sa_mask);
719b8b50f1eSRichard Henderson     sigaction(host_sig, &act, NULL);
720b8b50f1eSRichard Henderson 
721b8b50f1eSRichard Henderson     kill(getpid(), host_sig);
722b8b50f1eSRichard Henderson 
723b8b50f1eSRichard Henderson     /* Make sure the signal isn't masked (reusing the mask inside of act). */
724b8b50f1eSRichard Henderson     sigdelset(&act.sa_mask, host_sig);
725b8b50f1eSRichard Henderson     sigsuspend(&act.sa_mask);
726b8b50f1eSRichard Henderson 
727b8b50f1eSRichard Henderson     /* unreachable */
728ee72c47eSRichard Henderson     _exit(EXIT_FAILURE);
729b8b50f1eSRichard Henderson }
730b8b50f1eSRichard Henderson 
731b8b50f1eSRichard Henderson static G_NORETURN
dump_core_and_abort(CPUArchState * env,int target_sig)732b77af26eSRichard Henderson void dump_core_and_abort(CPUArchState *env, int target_sig)
73366fb9763Sbellard {
734b77af26eSRichard Henderson     CPUState *cpu = env_cpu(env);
735e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
736edf8e2afSMika Westerberg     int host_sig, core_dumped = 0;
737c8ee0a44SPaolo Bonzini 
73838ee0a7dSRichard Henderson     /* On exit, undo the remapping of SIGABRT. */
73938ee0a7dSRichard Henderson     if (target_sig == TARGET_SIGABRT) {
74038ee0a7dSRichard Henderson         host_sig = SIGABRT;
74138ee0a7dSRichard Henderson     } else {
74266393fb9SRiku Voipio         host_sig = target_to_host_signal(target_sig);
74338ee0a7dSRichard Henderson     }
744b5f95366SPeter Maydell     trace_user_dump_core_and_abort(env, target_sig, host_sig);
745a2247f8eSAndreas Färber     gdb_signalled(env, target_sig);
746603e4fd7Saurel32 
747edf8e2afSMika Westerberg     /* dump core if supported by target binary format */
74866393fb9SRiku Voipio     if (core_dump_signal(target_sig) && (ts->bprm->core_dump != NULL)) {
749edf8e2afSMika Westerberg         stop_all_tasks();
750edf8e2afSMika Westerberg         core_dumped =
751a2247f8eSAndreas Färber             ((*ts->bprm->core_dump)(target_sig, env) == 0);
752edf8e2afSMika Westerberg     }
753edf8e2afSMika Westerberg     if (core_dumped) {
754edf8e2afSMika Westerberg         /* we already dumped the core of target process, we don't want
755edf8e2afSMika Westerberg          * a coredump of qemu itself */
756edf8e2afSMika Westerberg         struct rlimit nodump;
757edf8e2afSMika Westerberg         getrlimit(RLIMIT_CORE, &nodump);
758edf8e2afSMika Westerberg         nodump.rlim_cur=0;
759edf8e2afSMika Westerberg         setrlimit(RLIMIT_CORE, &nodump);
760edf8e2afSMika Westerberg         (void) fprintf(stderr, "qemu: uncaught target signal %d (%s) - %s\n",
76166393fb9SRiku Voipio             target_sig, strsignal(host_sig), "core dumped" );
762edf8e2afSMika Westerberg     }
763edf8e2afSMika Westerberg 
764b77af26eSRichard Henderson     preexit_cleanup(env, 128 + target_sig);
765b8b50f1eSRichard Henderson     die_with_signal(host_sig);
7669de5e440Sbellard }
76766fb9763Sbellard 
7689de5e440Sbellard /* queue a signal so that it will be send to the virtual CPU as soon
7699de5e440Sbellard    as possible */
queue_signal(CPUArchState * env,int sig,int si_type,target_siginfo_t * info)770337e88d8SPeter Maydell void queue_signal(CPUArchState *env, int sig, int si_type,
7719d2803f7SPeter Maydell                   target_siginfo_t *info)
7729de5e440Sbellard {
77329a0af61SRichard Henderson     CPUState *cpu = env_cpu(env);
774e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
7759de5e440Sbellard 
776c8ee0a44SPaolo Bonzini     trace_user_queue_signal(env, sig);
777a7ec0f98SPeter Maydell 
7789d2803f7SPeter Maydell     info->si_code = deposit32(info->si_code, 16, 16, si_type);
779a70dadc7SPeter Maydell 
780655ed67cSTimothy E Baldwin     ts->sync_signal.info = *info;
781655ed67cSTimothy E Baldwin     ts->sync_signal.pending = sig;
78266fb9763Sbellard     /* signal that a new signal is pending */
783d73415a3SStefan Hajnoczi     qatomic_set(&ts->signal_pending, 1);
7849de5e440Sbellard }
78566fb9763Sbellard 
78607637888SWarner Losh 
78707637888SWarner Losh /* Adjust the signal context to rewind out of safe-syscall if we're in it */
rewind_if_in_safe_syscall(void * puc)7884d330ceeSTimothy E Baldwin static inline void rewind_if_in_safe_syscall(void *puc)
7894d330ceeSTimothy E Baldwin {
7909940799bSRichard Henderson     host_sigcontext *uc = (host_sigcontext *)puc;
79107637888SWarner Losh     uintptr_t pcreg = host_signal_pc(uc);
79207637888SWarner Losh 
79307637888SWarner Losh     if (pcreg > (uintptr_t)safe_syscall_start
79407637888SWarner Losh         && pcreg < (uintptr_t)safe_syscall_end) {
79507637888SWarner Losh         host_signal_set_pc(uc, (uintptr_t)safe_syscall_start);
7964d330ceeSTimothy E Baldwin     }
79707637888SWarner Losh }
7984d330ceeSTimothy E Baldwin 
7997dfd3ca8SHelge Deller static G_NORETURN
die_from_signal(siginfo_t * info)8007dfd3ca8SHelge Deller void die_from_signal(siginfo_t *info)
8017dfd3ca8SHelge Deller {
8027dfd3ca8SHelge Deller     char sigbuf[4], codebuf[12];
8037dfd3ca8SHelge Deller     const char *sig, *code = NULL;
8047dfd3ca8SHelge Deller 
8057dfd3ca8SHelge Deller     switch (info->si_signo) {
8067dfd3ca8SHelge Deller     case SIGSEGV:
8077dfd3ca8SHelge Deller         sig = "SEGV";
8087dfd3ca8SHelge Deller         switch (info->si_code) {
8097dfd3ca8SHelge Deller         case SEGV_MAPERR:
8107dfd3ca8SHelge Deller             code = "MAPERR";
8117dfd3ca8SHelge Deller             break;
8127dfd3ca8SHelge Deller         case SEGV_ACCERR:
8137dfd3ca8SHelge Deller             code = "ACCERR";
8147dfd3ca8SHelge Deller             break;
8157dfd3ca8SHelge Deller         }
8167dfd3ca8SHelge Deller         break;
8177dfd3ca8SHelge Deller     case SIGBUS:
8187dfd3ca8SHelge Deller         sig = "BUS";
8197dfd3ca8SHelge Deller         switch (info->si_code) {
8207dfd3ca8SHelge Deller         case BUS_ADRALN:
8217dfd3ca8SHelge Deller             code = "ADRALN";
8227dfd3ca8SHelge Deller             break;
8237dfd3ca8SHelge Deller         case BUS_ADRERR:
8247dfd3ca8SHelge Deller             code = "ADRERR";
8257dfd3ca8SHelge Deller             break;
8267dfd3ca8SHelge Deller         }
8277dfd3ca8SHelge Deller         break;
8284a6ebc19SRichard Henderson     case SIGILL:
8294a6ebc19SRichard Henderson         sig = "ILL";
8304a6ebc19SRichard Henderson         switch (info->si_code) {
8314a6ebc19SRichard Henderson         case ILL_ILLOPC:
8324a6ebc19SRichard Henderson             code = "ILLOPC";
8334a6ebc19SRichard Henderson             break;
8344a6ebc19SRichard Henderson         case ILL_ILLOPN:
8354a6ebc19SRichard Henderson             code = "ILLOPN";
8364a6ebc19SRichard Henderson             break;
8374a6ebc19SRichard Henderson         case ILL_ILLADR:
8384a6ebc19SRichard Henderson             code = "ILLADR";
8394a6ebc19SRichard Henderson             break;
8404a6ebc19SRichard Henderson         case ILL_PRVOPC:
8414a6ebc19SRichard Henderson             code = "PRVOPC";
8424a6ebc19SRichard Henderson             break;
8434a6ebc19SRichard Henderson         case ILL_PRVREG:
8444a6ebc19SRichard Henderson             code = "PRVREG";
8454a6ebc19SRichard Henderson             break;
8464a6ebc19SRichard Henderson         case ILL_COPROC:
8474a6ebc19SRichard Henderson             code = "COPROC";
8484a6ebc19SRichard Henderson             break;
8494a6ebc19SRichard Henderson         }
8504a6ebc19SRichard Henderson         break;
8514a6ebc19SRichard Henderson     case SIGFPE:
8524a6ebc19SRichard Henderson         sig = "FPE";
8534a6ebc19SRichard Henderson         switch (info->si_code) {
8544a6ebc19SRichard Henderson         case FPE_INTDIV:
8554a6ebc19SRichard Henderson             code = "INTDIV";
8564a6ebc19SRichard Henderson             break;
8574a6ebc19SRichard Henderson         case FPE_INTOVF:
8584a6ebc19SRichard Henderson             code = "INTOVF";
8594a6ebc19SRichard Henderson             break;
8604a6ebc19SRichard Henderson         }
8614a6ebc19SRichard Henderson         break;
8624a6ebc19SRichard Henderson     case SIGTRAP:
8634a6ebc19SRichard Henderson         sig = "TRAP";
8644a6ebc19SRichard Henderson         break;
8657dfd3ca8SHelge Deller     default:
8667dfd3ca8SHelge Deller         snprintf(sigbuf, sizeof(sigbuf), "%d", info->si_signo);
8677dfd3ca8SHelge Deller         sig = sigbuf;
8687dfd3ca8SHelge Deller         break;
8697dfd3ca8SHelge Deller     }
8707dfd3ca8SHelge Deller     if (code == NULL) {
8717dfd3ca8SHelge Deller         snprintf(codebuf, sizeof(sigbuf), "%d", info->si_code);
8727dfd3ca8SHelge Deller         code = codebuf;
8737dfd3ca8SHelge Deller     }
8747dfd3ca8SHelge Deller 
8757dfd3ca8SHelge Deller     error_report("QEMU internal SIG%s {code=%s, addr=%p}",
8767dfd3ca8SHelge Deller                  sig, code, info->si_addr);
8777dfd3ca8SHelge Deller     die_with_signal(info->si_signo);
8787dfd3ca8SHelge Deller }
8797dfd3ca8SHelge Deller 
host_sigsegv_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)880f4e11681SRichard Henderson static void host_sigsegv_handler(CPUState *cpu, siginfo_t *info,
881f4e11681SRichard Henderson                                  host_sigcontext *uc)
88231e31b8aSbellard {
883f4e11681SRichard Henderson     uintptr_t host_addr = (uintptr_t)info->si_addr;
884e6037d04SRichard Henderson     /*
885e6037d04SRichard Henderson      * Convert forcefully to guest address space: addresses outside
886e6037d04SRichard Henderson      * reserved_va are still valid to report via SEGV_MAPERR.
887e6037d04SRichard Henderson      */
888f4e11681SRichard Henderson     bool is_valid = h2g_valid(host_addr);
889f4e11681SRichard Henderson     abi_ptr guest_addr = h2g_nocheck(host_addr);
890f4e11681SRichard Henderson     uintptr_t pc = host_signal_pc(uc);
891f4e11681SRichard Henderson     bool is_write = host_signal_write(info, uc);
892f4e11681SRichard Henderson     MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
893f4e11681SRichard Henderson     bool maperr;
894e6037d04SRichard Henderson 
8957dfd3ca8SHelge Deller     /* If this was a write to a TB protected page, restart. */
8967dfd3ca8SHelge Deller     if (is_write
897f4e11681SRichard Henderson         && is_valid
8987dfd3ca8SHelge Deller         && info->si_code == SEGV_ACCERR
899f4e11681SRichard Henderson         && handle_sigsegv_accerr_write(cpu, host_signal_mask(uc),
900f4e11681SRichard Henderson                                        pc, guest_addr)) {
9017dfd3ca8SHelge Deller         return;
9027dfd3ca8SHelge Deller     }
9037dfd3ca8SHelge Deller 
9047dfd3ca8SHelge Deller     /*
9057dfd3ca8SHelge Deller      * If the access was not on behalf of the guest, within the executable
9067dfd3ca8SHelge Deller      * mapping of the generated code buffer, then it is a host bug.
9077dfd3ca8SHelge Deller      */
9087dfd3ca8SHelge Deller     if (access_type != MMU_INST_FETCH
9097dfd3ca8SHelge Deller         && !in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
9107dfd3ca8SHelge Deller         die_from_signal(info);
9117dfd3ca8SHelge Deller     }
9127dfd3ca8SHelge Deller 
913f4e11681SRichard Henderson     maperr = true;
914f4e11681SRichard Henderson     if (is_valid && info->si_code == SEGV_ACCERR) {
915e6037d04SRichard Henderson         /*
916e6037d04SRichard Henderson          * With reserved_va, the whole address space is PROT_NONE,
917e6037d04SRichard Henderson          * which means that we may get ACCERR when we want MAPERR.
918e6037d04SRichard Henderson          */
919e6037d04SRichard Henderson         if (page_get_flags(guest_addr) & PAGE_VALID) {
92072d2bbf9SRichard Henderson             maperr = false;
921e6037d04SRichard Henderson         } else {
922e6037d04SRichard Henderson             info->si_code = SEGV_MAPERR;
923e6037d04SRichard Henderson         }
924e6037d04SRichard Henderson     }
925e6037d04SRichard Henderson 
926f4e11681SRichard Henderson     sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
92772d2bbf9SRichard Henderson     cpu_loop_exit_sigsegv(cpu, guest_addr, access_type, maperr, pc);
928f4e11681SRichard Henderson }
929f4e11681SRichard Henderson 
host_sigbus_handler(CPUState * cpu,siginfo_t * info,host_sigcontext * uc)9306d913158SRobbin Ehn static uintptr_t host_sigbus_handler(CPUState *cpu, siginfo_t *info,
931f4e11681SRichard Henderson                                 host_sigcontext *uc)
932f4e11681SRichard Henderson {
933f4e11681SRichard Henderson     uintptr_t pc = host_signal_pc(uc);
934f4e11681SRichard Henderson     bool is_write = host_signal_write(info, uc);
935f4e11681SRichard Henderson     MMUAccessType access_type = adjust_signal_pc(&pc, is_write);
936f4e11681SRichard Henderson 
937f4e11681SRichard Henderson     /*
938f4e11681SRichard Henderson      * If the access was not on behalf of the guest, within the executable
939f4e11681SRichard Henderson      * mapping of the generated code buffer, then it is a host bug.
940f4e11681SRichard Henderson      */
941f4e11681SRichard Henderson     if (!in_code_gen_buffer((void *)(pc - tcg_splitwx_diff))) {
942f4e11681SRichard Henderson         die_from_signal(info);
943f4e11681SRichard Henderson     }
944f4e11681SRichard Henderson 
945742f0762SRichard Henderson     if (info->si_code == BUS_ADRALN) {
946f4e11681SRichard Henderson         uintptr_t host_addr = (uintptr_t)info->si_addr;
947f4e11681SRichard Henderson         abi_ptr guest_addr = h2g_nocheck(host_addr);
948f4e11681SRichard Henderson 
949f4e11681SRichard Henderson         sigprocmask(SIG_SETMASK, host_signal_mask(uc), NULL);
950742f0762SRichard Henderson         cpu_loop_exit_sigbus(cpu, guest_addr, access_type, pc);
951742f0762SRichard Henderson     }
9526d913158SRobbin Ehn     return pc;
953e6037d04SRichard Henderson }
954e6037d04SRichard Henderson 
host_signal_handler(int host_sig,siginfo_t * info,void * puc)955f4e11681SRichard Henderson static void host_signal_handler(int host_sig, siginfo_t *info, void *puc)
956f4e11681SRichard Henderson {
957f4e11681SRichard Henderson     CPUState *cpu = thread_cpu;
958f4e11681SRichard Henderson     CPUArchState *env = cpu_env(cpu);
959e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
960f4e11681SRichard Henderson     target_siginfo_t tinfo;
961f4e11681SRichard Henderson     host_sigcontext *uc = puc;
962f4e11681SRichard Henderson     struct emulated_sigtable *k;
963f4e11681SRichard Henderson     int guest_sig;
964f4e11681SRichard Henderson     uintptr_t pc = 0;
965f4e11681SRichard Henderson     bool sync_sig = false;
966f4e11681SRichard Henderson     void *sigmask;
967f4e11681SRichard Henderson 
968f4e11681SRichard Henderson     /*
969f4e11681SRichard Henderson      * Non-spoofed SIGSEGV and SIGBUS are synchronous, and need special
9704a6ebc19SRichard Henderson      * handling wrt signal blocking and unwinding.  Non-spoofed SIGILL,
9714a6ebc19SRichard Henderson      * SIGFPE, SIGTRAP are always host bugs.
972f4e11681SRichard Henderson      */
973f4e11681SRichard Henderson     if (info->si_code > 0) {
974f4e11681SRichard Henderson         switch (host_sig) {
975f4e11681SRichard Henderson         case SIGSEGV:
976f4e11681SRichard Henderson             /* Only returns on handle_sigsegv_accerr_write success. */
977f4e11681SRichard Henderson             host_sigsegv_handler(cpu, info, uc);
978f4e11681SRichard Henderson             return;
979f4e11681SRichard Henderson         case SIGBUS:
9806d913158SRobbin Ehn             pc = host_sigbus_handler(cpu, info, uc);
981e6037d04SRichard Henderson             sync_sig = true;
982f4e11681SRichard Henderson             break;
9834a6ebc19SRichard Henderson         case SIGILL:
9844a6ebc19SRichard Henderson         case SIGFPE:
9854a6ebc19SRichard Henderson         case SIGTRAP:
9864a6ebc19SRichard Henderson             die_from_signal(info);
987f4e11681SRichard Henderson         }
988e6037d04SRichard Henderson     }
989e6037d04SRichard Henderson 
99031e31b8aSbellard     /* get target signal number */
991e6037d04SRichard Henderson     guest_sig = host_to_target_signal(host_sig);
992e6037d04SRichard Henderson     if (guest_sig < 1 || guest_sig > TARGET_NSIG) {
99331e31b8aSbellard         return;
994e6037d04SRichard Henderson     }
995e6037d04SRichard Henderson     trace_user_host_signal(env, host_sig, guest_sig);
996e6037d04SRichard Henderson 
997e6037d04SRichard Henderson     host_to_target_siginfo_noswap(&tinfo, info);
998e6037d04SRichard Henderson     k = &ts->sigtab[guest_sig - 1];
999e6037d04SRichard Henderson     k->info = tinfo;
1000e6037d04SRichard Henderson     k->pending = guest_sig;
1001e6037d04SRichard Henderson     ts->signal_pending = 1;
1002e6037d04SRichard Henderson 
1003e6037d04SRichard Henderson     /*
1004e6037d04SRichard Henderson      * For synchronous signals, unwind the cpu state to the faulting
1005e6037d04SRichard Henderson      * insn and then exit back to the main loop so that the signal
1006e6037d04SRichard Henderson      * is delivered immediately.
1007e6037d04SRichard Henderson      */
1008e6037d04SRichard Henderson     if (sync_sig) {
1009e6037d04SRichard Henderson         cpu->exception_index = EXCP_INTERRUPT;
1010e6037d04SRichard Henderson         cpu_loop_exit_restore(cpu, pc);
1011e6037d04SRichard Henderson     }
10124d330ceeSTimothy E Baldwin 
10134d330ceeSTimothy E Baldwin     rewind_if_in_safe_syscall(puc);
10144d330ceeSTimothy E Baldwin 
1015e6037d04SRichard Henderson     /*
1016e6037d04SRichard Henderson      * Block host signals until target signal handler entered. We
10173d3efba0SPeter Maydell      * can't block SIGSEGV or SIGBUS while we're executing guest
10183d3efba0SPeter Maydell      * code in case the guest code provokes one in the window between
10193d3efba0SPeter Maydell      * now and it getting out to the main loop. Signals will be
10203d3efba0SPeter Maydell      * unblocked again in process_pending_signals().
10211d48fdd9SPeter Maydell      *
1022c8c89a6aSRichard Henderson      * WARNING: we cannot use sigfillset() here because the sigmask
10231d48fdd9SPeter Maydell      * field is a kernel sigset_t, which is much smaller than the
10241d48fdd9SPeter Maydell      * libc sigset_t which sigfillset() operates on. Using sigfillset()
10251d48fdd9SPeter Maydell      * would write 0xff bytes off the end of the structure and trash
10261d48fdd9SPeter Maydell      * data on the struct.
10273d3efba0SPeter Maydell      */
1028f4e11681SRichard Henderson     sigmask = host_signal_mask(uc);
1029c8c89a6aSRichard Henderson     memset(sigmask, 0xff, SIGSET_T_SIZE);
1030c8c89a6aSRichard Henderson     sigdelset(sigmask, SIGSEGV);
1031c8c89a6aSRichard Henderson     sigdelset(sigmask, SIGBUS);
10323d3efba0SPeter Maydell 
10339de5e440Sbellard     /* interrupt the virtual CPU as soon as possible */
1034a2247f8eSAndreas Färber     cpu_exit(thread_cpu);
103566fb9763Sbellard }
103631e31b8aSbellard 
10370da46a6eSths /* do_sigaltstack() returns target values and errnos. */
1038579a97f7Sbellard /* compare linux/kernel/signal.c:do_sigaltstack() */
do_sigaltstack(abi_ulong uss_addr,abi_ulong uoss_addr,CPUArchState * env)10396b208755SRichard Henderson abi_long do_sigaltstack(abi_ulong uss_addr, abi_ulong uoss_addr,
10406b208755SRichard Henderson                         CPUArchState *env)
1041a04e134aSths {
104292bad948SRichard Henderson     target_stack_t oss, *uoss = NULL;
104392bad948SRichard Henderson     abi_long ret = -TARGET_EFAULT;
104492bad948SRichard Henderson 
104592bad948SRichard Henderson     if (uoss_addr) {
104692bad948SRichard Henderson         /* Verify writability now, but do not alter user memory yet. */
104792bad948SRichard Henderson         if (!lock_user_struct(VERIFY_WRITE, uoss, uoss_addr, 0)) {
104892bad948SRichard Henderson             goto out;
104992bad948SRichard Henderson         }
10506b208755SRichard Henderson         target_save_altstack(&oss, env);
1051a04e134aSths     }
1052a04e134aSths 
105392bad948SRichard Henderson     if (uss_addr) {
105492bad948SRichard Henderson         target_stack_t *uss;
10550903c8beSTom Musta 
10569eeb8306SRiku Voipio         if (!lock_user_struct(VERIFY_READ, uss, uss_addr, 1)) {
1057a04e134aSths             goto out;
10589eeb8306SRiku Voipio         }
1059ddc3e74dSRichard Henderson         ret = target_restore_altstack(uss, env);
106092bad948SRichard Henderson         if (ret) {
1061a04e134aSths             goto out;
1062a04e134aSths         }
10630903c8beSTom Musta     }
1064a04e134aSths 
1065579a97f7Sbellard     if (uoss_addr) {
106692bad948SRichard Henderson         memcpy(uoss, &oss, sizeof(oss));
106792bad948SRichard Henderson         unlock_user_struct(uoss, uoss_addr, 1);
106892bad948SRichard Henderson         uoss = NULL;
1069a04e134aSths     }
1070a04e134aSths     ret = 0;
107192bad948SRichard Henderson 
1072a04e134aSths  out:
107392bad948SRichard Henderson     if (uoss) {
107492bad948SRichard Henderson         unlock_user_struct(uoss, uoss_addr, 0);
107592bad948SRichard Henderson     }
1076a04e134aSths     return ret;
1077a04e134aSths }
1078a04e134aSths 
1079ef6a778eSTimothy E Baldwin /* do_sigaction() return target values and host errnos */
do_sigaction(int sig,const struct target_sigaction * act,struct target_sigaction * oact,abi_ulong ka_restorer)108066fb9763Sbellard int do_sigaction(int sig, const struct target_sigaction *act,
108102fb28e8SRichard Henderson                  struct target_sigaction *oact, abi_ulong ka_restorer)
108231e31b8aSbellard {
1083624f7979Spbrook     struct target_sigaction *k;
1084773b93eeSbellard     int host_sig;
10850da46a6eSths     int ret = 0;
108631e31b8aSbellard 
10876bc024e7SLaurent Vivier     trace_signal_do_sigaction_guest(sig, TARGET_NSIG);
10886bc024e7SLaurent Vivier 
1089ee3500d3SIlya Leoshkevich     if (sig < 1 || sig > TARGET_NSIG) {
1090ee3500d3SIlya Leoshkevich         return -TARGET_EINVAL;
1091ee3500d3SIlya Leoshkevich     }
1092ee3500d3SIlya Leoshkevich 
1093ee3500d3SIlya Leoshkevich     if (act && (sig == TARGET_SIGKILL || sig == TARGET_SIGSTOP)) {
1094ef6a778eSTimothy E Baldwin         return -TARGET_EINVAL;
1095ef6a778eSTimothy E Baldwin     }
1096ef6a778eSTimothy E Baldwin 
1097ef6a778eSTimothy E Baldwin     if (block_signals()) {
1098af254a27SRichard Henderson         return -QEMU_ERESTARTSYS;
1099ef6a778eSTimothy E Baldwin     }
1100ef6a778eSTimothy E Baldwin 
110166fb9763Sbellard     k = &sigact_table[sig - 1];
110266fb9763Sbellard     if (oact) {
1103d2565875SRichard Henderson         __put_user(k->_sa_handler, &oact->_sa_handler);
1104d2565875SRichard Henderson         __put_user(k->sa_flags, &oact->sa_flags);
11057f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1106d2565875SRichard Henderson         __put_user(k->sa_restorer, &oact->sa_restorer);
1107106ec879Sbellard #endif
1108d2565875SRichard Henderson         /* Not swapped.  */
1109624f7979Spbrook         oact->sa_mask = k->sa_mask;
111066fb9763Sbellard     }
111166fb9763Sbellard     if (act) {
1112d2565875SRichard Henderson         __get_user(k->_sa_handler, &act->_sa_handler);
1113d2565875SRichard Henderson         __get_user(k->sa_flags, &act->sa_flags);
11147f047de1SRichard Henderson #ifdef TARGET_ARCH_HAS_SA_RESTORER
1115d2565875SRichard Henderson         __get_user(k->sa_restorer, &act->sa_restorer);
1116106ec879Sbellard #endif
111702fb28e8SRichard Henderson #ifdef TARGET_ARCH_HAS_KA_RESTORER
111802fb28e8SRichard Henderson         k->ka_restorer = ka_restorer;
111902fb28e8SRichard Henderson #endif
1120d2565875SRichard Henderson         /* To be swapped in target_to_host_sigset.  */
1121624f7979Spbrook         k->sa_mask = act->sa_mask;
1122773b93eeSbellard 
1123773b93eeSbellard         /* we update the host linux signal state */
1124773b93eeSbellard         host_sig = target_to_host_signal(sig);
11256bc024e7SLaurent Vivier         trace_signal_do_sigaction_host(host_sig, TARGET_NSIG);
11266bc024e7SLaurent Vivier         if (host_sig > SIGRTMAX) {
11276bc024e7SLaurent Vivier             /* we don't have enough host signals to map all target signals */
11286bc024e7SLaurent Vivier             qemu_log_mask(LOG_UNIMP, "Unsupported target signal #%d, ignored\n",
11296bc024e7SLaurent Vivier                           sig);
11306bc024e7SLaurent Vivier             /*
11316bc024e7SLaurent Vivier              * we don't return an error here because some programs try to
11326bc024e7SLaurent Vivier              * register an handler for all possible rt signals even if they
11336bc024e7SLaurent Vivier              * don't need it.
11346bc024e7SLaurent Vivier              * An error here can abort them whereas there can be no problem
11356bc024e7SLaurent Vivier              * to not have the signal available later.
11366bc024e7SLaurent Vivier              * This is the case for golang,
11376bc024e7SLaurent Vivier              *   See https://github.com/golang/go/issues/33746
11386bc024e7SLaurent Vivier              * So we silently ignore the error.
11396bc024e7SLaurent Vivier              */
11406bc024e7SLaurent Vivier             return 0;
11416bc024e7SLaurent Vivier         }
1142773b93eeSbellard         if (host_sig != SIGSEGV && host_sig != SIGBUS) {
1143dbde2c0cSRichard Henderson             struct sigaction act1;
1144dbde2c0cSRichard Henderson 
1145773b93eeSbellard             sigfillset(&act1.sa_mask);
1146773b93eeSbellard             act1.sa_flags = SA_SIGINFO;
1147624f7979Spbrook             if (k->_sa_handler == TARGET_SIG_IGN) {
1148dbde2c0cSRichard Henderson                 /*
1149dbde2c0cSRichard Henderson                  * It is important to update the host kernel signal ignore
1150dbde2c0cSRichard Henderson                  * state to avoid getting unexpected interrupted syscalls.
1151dbde2c0cSRichard Henderson                  */
1152773b93eeSbellard                 act1.sa_sigaction = (void *)SIG_IGN;
1153624f7979Spbrook             } else if (k->_sa_handler == TARGET_SIG_DFL) {
1154dbde2c0cSRichard Henderson                 if (core_dump_signal(sig)) {
1155ca587a8eSaurel32                     act1.sa_sigaction = host_signal_handler;
1156dbde2c0cSRichard Henderson                 } else {
1157773b93eeSbellard                     act1.sa_sigaction = (void *)SIG_DFL;
1158dbde2c0cSRichard Henderson                 }
1159773b93eeSbellard             } else {
1160773b93eeSbellard                 act1.sa_sigaction = host_signal_handler;
1161dbde2c0cSRichard Henderson                 if (k->sa_flags & TARGET_SA_RESTART) {
1162dbde2c0cSRichard Henderson                     act1.sa_flags |= SA_RESTART;
1163dbde2c0cSRichard Henderson                 }
1164773b93eeSbellard             }
11650da46a6eSths             ret = sigaction(host_sig, &act1, NULL);
1166773b93eeSbellard         }
116766fb9763Sbellard     }
11680da46a6eSths     return ret;
116966fb9763Sbellard }
117066fb9763Sbellard 
handle_pending_signal(CPUArchState * cpu_env,int sig,struct emulated_sigtable * k)117131efaef1SPeter Maydell static void handle_pending_signal(CPUArchState *cpu_env, int sig,
117231efaef1SPeter Maydell                                   struct emulated_sigtable *k)
1173eb552501SPeter Maydell {
117429a0af61SRichard Henderson     CPUState *cpu = env_cpu(cpu_env);
1175eb552501SPeter Maydell     abi_ulong handler;
11763d3efba0SPeter Maydell     sigset_t set;
1177143bcc1dSRichard Henderson     target_siginfo_t unswapped;
1178eb552501SPeter Maydell     target_sigset_t target_old_set;
1179eb552501SPeter Maydell     struct target_sigaction *sa;
1180e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
1181eb552501SPeter Maydell 
1182c8ee0a44SPaolo Bonzini     trace_user_handle_signal(cpu_env, sig);
118366fb9763Sbellard     /* dequeue signal */
118466fb9763Sbellard     k->pending = 0;
11851fddef4bSbellard 
11864d6d8a05SGustavo Romero     /*
1187143bcc1dSRichard Henderson      * Writes out siginfo values byteswapped, accordingly to the target.
1188143bcc1dSRichard Henderson      * It also cleans the si_type from si_code making it correct for
1189143bcc1dSRichard Henderson      * the target.  We must hold on to the original unswapped copy for
1190143bcc1dSRichard Henderson      * strace below, because si_type is still required there.
11914d6d8a05SGustavo Romero      */
1192143bcc1dSRichard Henderson     if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
1193143bcc1dSRichard Henderson         unswapped = k->info;
1194143bcc1dSRichard Henderson     }
11954d6d8a05SGustavo Romero     tswap_siginfo(&k->info, &k->info);
11964d6d8a05SGustavo Romero 
1197f84e313eSGustavo Romero     sig = gdb_handlesig(cpu, sig, NULL, &k->info, sizeof(k->info));
11981fddef4bSbellard     if (!sig) {
1199ca587a8eSaurel32         sa = NULL;
1200ca587a8eSaurel32         handler = TARGET_SIG_IGN;
1201ca587a8eSaurel32     } else {
1202624f7979Spbrook         sa = &sigact_table[sig - 1];
1203624f7979Spbrook         handler = sa->_sa_handler;
1204ca587a8eSaurel32     }
1205ca587a8eSaurel32 
12064b25a506SJosh Kunz     if (unlikely(qemu_loglevel_mask(LOG_STRACE))) {
1207143bcc1dSRichard Henderson         print_taken_signal(sig, &unswapped);
12080cb581d6SPeter Maydell     }
12090cb581d6SPeter Maydell 
121066fb9763Sbellard     if (handler == TARGET_SIG_DFL) {
1211ca587a8eSaurel32         /* default handler : ignore some signal. The other are job control or fatal */
1212ca587a8eSaurel32         if (sig == TARGET_SIGTSTP || sig == TARGET_SIGTTIN || sig == TARGET_SIGTTOU) {
1213ca587a8eSaurel32             kill(getpid(),SIGSTOP);
1214ca587a8eSaurel32         } else if (sig != TARGET_SIGCHLD &&
121566fb9763Sbellard                    sig != TARGET_SIGURG &&
1216ca587a8eSaurel32                    sig != TARGET_SIGWINCH &&
1217ca587a8eSaurel32                    sig != TARGET_SIGCONT) {
1218da91c192SIlya Leoshkevich             dump_core_and_abort(cpu_env, sig);
121966fb9763Sbellard         }
122066fb9763Sbellard     } else if (handler == TARGET_SIG_IGN) {
122166fb9763Sbellard         /* ignore sig */
122266fb9763Sbellard     } else if (handler == TARGET_SIG_ERR) {
1223da91c192SIlya Leoshkevich         dump_core_and_abort(cpu_env, sig);
122466fb9763Sbellard     } else {
12259de5e440Sbellard         /* compute the blocked signals during the handler execution */
12263d3efba0SPeter Maydell         sigset_t *blocked_set;
12273d3efba0SPeter Maydell 
1228624f7979Spbrook         target_to_host_sigset(&set, &sa->sa_mask);
12299de5e440Sbellard         /* SA_NODEFER indicates that the current signal should not be
12309de5e440Sbellard            blocked during the handler */
1231624f7979Spbrook         if (!(sa->sa_flags & TARGET_SA_NODEFER))
12329de5e440Sbellard             sigaddset(&set, target_to_host_signal(sig));
12339de5e440Sbellard 
12349de5e440Sbellard         /* save the previous blocked signal state to restore it at the
12359de5e440Sbellard            end of the signal execution (see do_sigreturn) */
12363d3efba0SPeter Maydell         host_to_target_sigset_internal(&target_old_set, &ts->signal_mask);
12373d3efba0SPeter Maydell 
12383d3efba0SPeter Maydell         /* block signals in the handler */
12393d3efba0SPeter Maydell         blocked_set = ts->in_sigsuspend ?
12403d3efba0SPeter Maydell             &ts->sigsuspend_mask : &ts->signal_mask;
12413d3efba0SPeter Maydell         sigorset(&ts->signal_mask, blocked_set, &set);
12423d3efba0SPeter Maydell         ts->in_sigsuspend = 0;
12439de5e440Sbellard 
1244bc8a22ccSbellard         /* if the CPU is in VM86 mode, we restore the 32 bit values */
124584409ddbSj_mayer #if defined(TARGET_I386) && !defined(TARGET_X86_64)
1246bc8a22ccSbellard         {
1247bc8a22ccSbellard             CPUX86State *env = cpu_env;
1248bc8a22ccSbellard             if (env->eflags & VM_MASK)
1249bc8a22ccSbellard                 save_v86_state(env);
1250bc8a22ccSbellard         }
1251bc8a22ccSbellard #endif
12529de5e440Sbellard         /* prepare the stack frame of the virtual CPU */
1253cb6ac802SLaurent Vivier #if defined(TARGET_ARCH_HAS_SETUP_FRAME)
1254cb6ac802SLaurent Vivier         if (sa->sa_flags & TARGET_SA_SIGINFO) {
1255cb6ac802SLaurent Vivier             setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1256cb6ac802SLaurent Vivier         } else {
1257cb6ac802SLaurent Vivier             setup_frame(sig, sa, &target_old_set, cpu_env);
1258cb6ac802SLaurent Vivier         }
1259cb6ac802SLaurent Vivier #else
1260ff970904SRichard Henderson         /* These targets do not have traditional signals.  */
1261907f5fddSTimothy E Baldwin         setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env);
1262ff970904SRichard Henderson #endif
12637ec87e06SPeter Maydell         if (sa->sa_flags & TARGET_SA_RESETHAND) {
1264624f7979Spbrook             sa->_sa_handler = TARGET_SIG_DFL;
126566fb9763Sbellard         }
12667ec87e06SPeter Maydell     }
126731e31b8aSbellard }
1268e902d588SPeter Maydell 
process_pending_signals(CPUArchState * cpu_env)1269e902d588SPeter Maydell void process_pending_signals(CPUArchState *cpu_env)
1270e902d588SPeter Maydell {
127129a0af61SRichard Henderson     CPUState *cpu = env_cpu(cpu_env);
1272e902d588SPeter Maydell     int sig;
1273e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(cpu);
12743d3efba0SPeter Maydell     sigset_t set;
12753d3efba0SPeter Maydell     sigset_t *blocked_set;
1276e902d588SPeter Maydell 
1277d73415a3SStefan Hajnoczi     while (qatomic_read(&ts->signal_pending)) {
12783d3efba0SPeter Maydell         sigfillset(&set);
12793d3efba0SPeter Maydell         sigprocmask(SIG_SETMASK, &set, 0);
12803d3efba0SPeter Maydell 
12818bd3773cSPeter Maydell     restart_scan:
1282655ed67cSTimothy E Baldwin         sig = ts->sync_signal.pending;
1283655ed67cSTimothy E Baldwin         if (sig) {
1284655ed67cSTimothy E Baldwin             /* Synchronous signals are forced,
1285655ed67cSTimothy E Baldwin              * see force_sig_info() and callers in Linux
1286655ed67cSTimothy E Baldwin              * Note that not all of our queue_signal() calls in QEMU correspond
1287655ed67cSTimothy E Baldwin              * to force_sig_info() calls in Linux (some are send_sig_info()).
1288655ed67cSTimothy E Baldwin              * However it seems like a kernel bug to me to allow the process
1289655ed67cSTimothy E Baldwin              * to block a synchronous signal since it could then just end up
1290655ed67cSTimothy E Baldwin              * looping round and round indefinitely.
1291655ed67cSTimothy E Baldwin              */
1292655ed67cSTimothy E Baldwin             if (sigismember(&ts->signal_mask, target_to_host_signal_table[sig])
1293655ed67cSTimothy E Baldwin                 || sigact_table[sig - 1]._sa_handler == TARGET_SIG_IGN) {
1294655ed67cSTimothy E Baldwin                 sigdelset(&ts->signal_mask, target_to_host_signal_table[sig]);
1295655ed67cSTimothy E Baldwin                 sigact_table[sig - 1]._sa_handler = TARGET_SIG_DFL;
1296655ed67cSTimothy E Baldwin             }
1297655ed67cSTimothy E Baldwin 
129831efaef1SPeter Maydell             handle_pending_signal(cpu_env, sig, &ts->sync_signal);
1299655ed67cSTimothy E Baldwin         }
1300655ed67cSTimothy E Baldwin 
1301e902d588SPeter Maydell         for (sig = 1; sig <= TARGET_NSIG; sig++) {
13023d3efba0SPeter Maydell             blocked_set = ts->in_sigsuspend ?
13033d3efba0SPeter Maydell                 &ts->sigsuspend_mask : &ts->signal_mask;
13043d3efba0SPeter Maydell 
13053d3efba0SPeter Maydell             if (ts->sigtab[sig - 1].pending &&
13063d3efba0SPeter Maydell                 (!sigismember(blocked_set,
1307655ed67cSTimothy E Baldwin                               target_to_host_signal_table[sig]))) {
130831efaef1SPeter Maydell                 handle_pending_signal(cpu_env, sig, &ts->sigtab[sig - 1]);
13098bd3773cSPeter Maydell                 /* Restart scan from the beginning, as handle_pending_signal
13108bd3773cSPeter Maydell                  * might have resulted in a new synchronous signal (eg SIGSEGV).
13118bd3773cSPeter Maydell                  */
13128bd3773cSPeter Maydell                 goto restart_scan;
1313e902d588SPeter Maydell             }
1314e902d588SPeter Maydell         }
13153d3efba0SPeter Maydell 
13163d3efba0SPeter Maydell         /* if no signal is pending, unblock signals and recheck (the act
13173d3efba0SPeter Maydell          * of unblocking might cause us to take another host signal which
13183d3efba0SPeter Maydell          * will set signal_pending again).
13193d3efba0SPeter Maydell          */
1320d73415a3SStefan Hajnoczi         qatomic_set(&ts->signal_pending, 0);
13213d3efba0SPeter Maydell         ts->in_sigsuspend = 0;
13223d3efba0SPeter Maydell         set = ts->signal_mask;
13233d3efba0SPeter Maydell         sigdelset(&set, SIGSEGV);
13243d3efba0SPeter Maydell         sigdelset(&set, SIGBUS);
13253d3efba0SPeter Maydell         sigprocmask(SIG_SETMASK, &set, 0);
13263d3efba0SPeter Maydell     }
13273d3efba0SPeter Maydell     ts->in_sigsuspend = 0;
1328e902d588SPeter Maydell }
13290a99f093SRichard Henderson 
process_sigsuspend_mask(sigset_t ** pset,target_ulong sigset,target_ulong sigsize)13300a99f093SRichard Henderson int process_sigsuspend_mask(sigset_t **pset, target_ulong sigset,
13310a99f093SRichard Henderson                             target_ulong sigsize)
13320a99f093SRichard Henderson {
1333e4e5cb4aSIlya Leoshkevich     TaskState *ts = get_task_state(thread_cpu);
13340a99f093SRichard Henderson     sigset_t *host_set = &ts->sigsuspend_mask;
13350a99f093SRichard Henderson     target_sigset_t *target_sigset;
13360a99f093SRichard Henderson 
13370a99f093SRichard Henderson     if (sigsize != sizeof(*target_sigset)) {
13380a99f093SRichard Henderson         /* Like the kernel, we enforce correct size sigsets */
13390a99f093SRichard Henderson         return -TARGET_EINVAL;
13400a99f093SRichard Henderson     }
13410a99f093SRichard Henderson 
13420a99f093SRichard Henderson     target_sigset = lock_user(VERIFY_READ, sigset, sigsize, 1);
13430a99f093SRichard Henderson     if (!target_sigset) {
13440a99f093SRichard Henderson         return -TARGET_EFAULT;
13450a99f093SRichard Henderson     }
13460a99f093SRichard Henderson     target_to_host_sigset(host_set, target_sigset);
13470a99f093SRichard Henderson     unlock_user(target_sigset, sigset, 0);
13480a99f093SRichard Henderson 
13490a99f093SRichard Henderson     *pset = host_set;
13500a99f093SRichard Henderson     return 0;
13510a99f093SRichard Henderson }
1352