1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2015 Anton Ivanov (aivanov@{brocade.com,kot-begemot.co.uk})
4 * Copyright (C) 2015 Thomas Meyer (thomas@m3y3r.de)
5 * Copyright (C) 2004 PathScale, Inc
6 * Copyright (C) 2004 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
15 #include <as-layout.h>
16 #include <kern_util.h>
18 #include <sysdep/mcontext.h>
19 #include <um_malloc.h>
20 #include <sys/ucontext.h>
22 void (*sig_info
[NSIG
])(int, struct siginfo
*, struct uml_pt_regs
*) = {
23 [SIGTRAP
] = relay_signal
,
24 [SIGFPE
] = relay_signal
,
25 [SIGILL
] = relay_signal
,
27 [SIGBUS
] = bus_handler
,
28 [SIGSEGV
] = segv_handler
,
29 [SIGIO
] = sigio_handler
,
32 static void sig_handler_common(int sig
, struct siginfo
*si
, mcontext_t
*mc
)
35 int save_errno
= errno
;
39 /* For segfaults, we want the data from the sigcontext. */
40 get_regs_from_mc(&r
, mc
);
41 GET_FAULTINFO_FROM_MC(r
.faultinfo
, mc
);
44 /* enable signals if sig isn't IRQ signal */
45 if ((sig
!= SIGIO
) && (sig
!= SIGWINCH
))
46 unblock_signals_trace();
48 (*sig_info
[sig
])(sig
, si
, &r
);
54 * These are the asynchronous signals. SIGPROF is excluded because we want to
55 * be able to profile all of UML, not just the non-critical sections. If
56 * profiling is not thread-safe, then that is not my problem. We can disable
57 * profiling when SMP is enabled in that case.
60 #define SIGIO_MASK (1 << SIGIO_BIT)
63 #define SIGALRM_MASK (1 << SIGALRM_BIT)
65 static int signals_enabled
;
66 static unsigned int signals_pending
;
67 static unsigned int signals_active
= 0;
69 void sig_handler(int sig
, struct siginfo
*si
, mcontext_t
*mc
)
73 enabled
= signals_enabled
;
74 if (!enabled
&& (sig
== SIGIO
)) {
75 signals_pending
|= SIGIO_MASK
;
79 block_signals_trace();
81 sig_handler_common(sig
, si
, mc
);
83 set_signals_trace(enabled
);
86 static void timer_real_alarm_handler(mcontext_t
*mc
)
88 struct uml_pt_regs regs
;
91 get_regs_from_mc(®s
, mc
);
93 memset(®s
, 0, sizeof(regs
));
94 timer_handler(SIGALRM
, NULL
, ®s
);
97 void timer_alarm_handler(int sig
, struct siginfo
*unused_si
, mcontext_t
*mc
)
101 enabled
= signals_enabled
;
102 if (!signals_enabled
) {
103 signals_pending
|= SIGALRM_MASK
;
107 block_signals_trace();
109 signals_active
|= SIGALRM_MASK
;
111 timer_real_alarm_handler(mc
);
113 signals_active
&= ~SIGALRM_MASK
;
115 set_signals_trace(enabled
);
118 void deliver_alarm(void) {
119 timer_alarm_handler(SIGALRM
, NULL
, NULL
);
122 void timer_set_signal_handler(void)
124 set_handler(SIGALRM
);
127 void set_sigstack(void *sig_stack
, int size
)
132 .ss_size
= size
- sizeof(void *)
135 if (sigaltstack(&stack
, NULL
) != 0)
136 panic("enabling signal stack failed, errno = %d\n", errno
);
139 static void (*handlers
[_NSIG
])(int sig
, struct siginfo
*si
, mcontext_t
*mc
) = {
140 [SIGSEGV
] = sig_handler
,
141 [SIGBUS
] = sig_handler
,
142 [SIGILL
] = sig_handler
,
143 [SIGFPE
] = sig_handler
,
144 [SIGTRAP
] = sig_handler
,
146 [SIGIO
] = sig_handler
,
147 [SIGWINCH
] = sig_handler
,
148 [SIGALRM
] = timer_alarm_handler
151 static void hard_handler(int sig
, siginfo_t
*si
, void *p
)
154 mcontext_t
*mc
= &uc
->uc_mcontext
;
155 unsigned long pending
= 1UL << sig
;
161 * pending comes back with one bit set for each
162 * interrupt that arrived while setting up the stack,
163 * plus a bit for this interrupt, plus the zero bit is
164 * set if this is a nested interrupt.
165 * If bail is true, then we interrupted another
166 * handler setting up the stack. In this case, we
167 * have to return, and the upper handler will deal
168 * with this interrupt.
170 bail
= to_irq_stack(&pending
);
174 nested
= pending
& 1;
177 while ((sig
= ffs(pending
)) != 0){
179 pending
&= ~(1 << sig
);
180 (*handlers
[sig
])(sig
, (struct siginfo
*)si
, mc
);
184 * Again, pending comes back with a mask of signals
185 * that arrived while tearing down the stack. If this
186 * is non-zero, we just go back, set up the stack
187 * again, and handle the new interrupts.
190 pending
= from_irq_stack(nested
);
194 void set_handler(int sig
)
196 struct sigaction action
;
197 int flags
= SA_SIGINFO
| SA_ONSTACK
;
200 action
.sa_sigaction
= hard_handler
;
203 sigemptyset(&action
.sa_mask
);
204 sigaddset(&action
.sa_mask
, SIGIO
);
205 sigaddset(&action
.sa_mask
, SIGWINCH
);
206 sigaddset(&action
.sa_mask
, SIGALRM
);
211 if (sigismember(&action
.sa_mask
, sig
))
212 flags
|= SA_RESTART
; /* if it's an irq signal */
214 action
.sa_flags
= flags
;
215 action
.sa_restorer
= NULL
;
216 if (sigaction(sig
, &action
, NULL
) < 0)
217 panic("sigaction failed - errno = %d\n", errno
);
219 sigemptyset(&sig_mask
);
220 sigaddset(&sig_mask
, sig
);
221 if (sigprocmask(SIG_UNBLOCK
, &sig_mask
, NULL
) < 0)
222 panic("sigprocmask failed - errno = %d\n", errno
);
225 int change_sig(int signal
, int on
)
229 sigemptyset(&sigset
);
230 sigaddset(&sigset
, signal
);
231 if (sigprocmask(on
? SIG_UNBLOCK
: SIG_BLOCK
, &sigset
, NULL
) < 0)
237 void block_signals(void)
241 * This must return with signals disabled, so this barrier
242 * ensures that writes are flushed out before the return.
243 * This might matter if gcc figures out how to inline this and
244 * decides to shuffle this code into the caller.
249 void unblock_signals(void)
253 if (signals_enabled
== 1)
259 * We loop because the IRQ handler returns with interrupts off. So,
260 * interrupts may have arrived and we need to re-enable them and
261 * recheck signals_pending.
265 * Save and reset save_pending after enabling signals. This
266 * way, signals_pending won't be changed while we're reading it.
268 * Setting signals_enabled and reading signals_pending must
269 * happen in this order, so have the barrier here.
273 save_pending
= signals_pending
;
274 if (save_pending
== 0)
280 * We have pending interrupts, so disable signals, as the
281 * handlers expect them off when they are called. They will
282 * be enabled again above. We need to trace this, as we're
283 * expected to be enabling interrupts already, but any more
284 * tracing that happens inside the handlers we call for the
285 * pending signals will mess up the tracing state.
288 um_trace_signals_off();
291 * Deal with SIGIO first because the alarm handler might
292 * schedule, leaving the pending SIGIO stranded until we come
295 * SIGIO's handler doesn't use siginfo or mcontext,
296 * so they can be NULL.
298 if (save_pending
& SIGIO_MASK
)
299 sig_handler_common(SIGIO
, NULL
, NULL
);
301 /* Do not reenter the handler */
303 if ((save_pending
& SIGALRM_MASK
) && (!(signals_active
& SIGALRM_MASK
)))
304 timer_real_alarm_handler(NULL
);
306 /* Rerun the loop only if there is still pending SIGIO and not in TIMER handler */
308 if (!(signals_pending
& SIGIO_MASK
) && (signals_active
& SIGALRM_MASK
))
311 /* Re-enable signals and trace that we're doing so. */
312 um_trace_signals_on();
317 int get_signals(void)
319 return signals_enabled
;
322 int set_signals(int enable
)
325 if (signals_enabled
== enable
)
328 ret
= signals_enabled
;
331 else block_signals();
336 int set_signals_trace(int enable
)
339 if (signals_enabled
== enable
)
342 ret
= signals_enabled
;
344 unblock_signals_trace();
346 block_signals_trace();
351 int os_is_signal_stack(void)
354 sigaltstack(NULL
, &ss
);
356 return ss
.ss_flags
& SS_ONSTACK
;