blob: 3437f02d6187347414949996ce2b42477c1a2c68 [file] [log] [blame]
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001/*
2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
Wichert Akkerman4dc8a2a1999-12-23 14:20:14 +00005 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
7 * Linux for s390 port by D.J. Barrow
8 * <barrow_dj@mail.yahoo.com,djbarrow@de.ibm.com>
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00009 * All rights reserved.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. The name of the author may not be used to endorse or promote products
20 * derived from this software without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000032 */
33
34#include "defs.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000035#include <fcntl.h>
Maarten ter Huurne40c174b2014-10-20 01:02:48 +020036
Dmitry V. Levin5503dd22015-02-13 02:12:14 +000037#include "regs.h"
Dmitry V. Levin7211dbc2015-02-28 12:20:21 +000038#include "ptrace.h"
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +000039
Denys Vlasenko84703742012-02-25 02:38:52 +010040#if defined(SPARC) || defined(SPARC64) || defined(MIPS)
Roland McGrath576b7842007-11-04 00:00:00 +000041typedef struct {
42 struct pt_regs si_regs;
43 int si_mask;
44} m_siginfo_t;
Roland McGrath30ff45e2003-01-30 20:15:23 +000045#elif defined HAVE_ASM_SIGCONTEXT_H
H.J. Lu35be5812012-04-16 13:00:01 +020046# if !defined(IA64) && !defined(X86_64) && !defined(X32)
Denys Vlasenko84703742012-02-25 02:38:52 +010047# include <asm/sigcontext.h>
Denys Vlasenkoa6d91de2012-03-16 12:02:22 +010048# endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000049#else /* !HAVE_ASM_SIGCONTEXT_H */
Denys Vlasenkob51f3642013-07-16 12:06:25 +020050# if defined M68K && !defined HAVE_STRUCT_SIGCONTEXT
51struct sigcontext {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000052 unsigned long sc_mask;
53 unsigned long sc_usp;
54 unsigned long sc_d0;
55 unsigned long sc_d1;
56 unsigned long sc_a0;
57 unsigned long sc_a1;
58 unsigned short sc_sr;
59 unsigned long sc_pc;
60 unsigned short sc_formatvec;
61};
Denys Vlasenkob51f3642013-07-16 12:06:25 +020062# endif /* M68K */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000063#endif /* !HAVE_ASM_SIGCONTEXT_H */
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020064
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000065#ifndef NSIG
Denys Vlasenko84703742012-02-25 02:38:52 +010066# warning: NSIG is not defined, using 32
67# define NSIG 32
Dmitry V. Levin38593e92014-02-26 16:51:28 +000068#elif NSIG < 32
69# error: NSIG < 32
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000070#endif
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020071
Roland McGrath2638cb42002-12-15 23:58:41 +000072/* The libc headers do not define this constant since it should only be
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020073 used by the implementation. So we define it here. */
Dmitry V. Levin5c7f6272014-02-08 00:26:06 +000074#ifndef SA_RESTORER
75# ifdef ASM_SA_RESTORER
76# define SA_RESTORER ASM_SA_RESTORER
Roland McGrath2638cb42002-12-15 23:58:41 +000077# endif
78#endif
79
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +000080/*
81 * Some architectures define SA_RESTORER in their headers,
82 * but do not actually have sa_restorer.
83 *
84 * Some architectures, otherwise, do not define SA_RESTORER in their headers,
85 * but actually have sa_restorer.
86 */
87#ifdef SA_RESTORER
88# if defined HPPA || defined IA64
89# define HAVE_SA_RESTORER 0
90# else
91# define HAVE_SA_RESTORER 1
92# endif
93#else /* !SA_RESTORER */
94# if defined SPARC || defined SPARC64
95# define HAVE_SA_RESTORER 1
96# else
97# define HAVE_SA_RESTORER 0
98# endif
Mike Frysingerd632e102014-08-09 09:04:18 -040099#endif
100
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000101#include "xlat/sigact_flags.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000102#include "xlat/sigprocmaskcmds.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000103
Nate Sammonsce780fc1999-03-29 23:23:13 +0000104/* Anonymous realtime signals. */
105/* Under glibc 2.1, SIGRTMIN et al are functions, but __SIGRTMIN is a
106 constant. This is what we want. Otherwise, just use SIGRTMIN. */
107#ifdef SIGRTMIN
108#ifndef __SIGRTMIN
109#define __SIGRTMIN SIGRTMIN
110#define __SIGRTMAX SIGRTMAX /* likewise */
111#endif
112#endif
113
Denys Vlasenkod9560c12011-08-19 17:41:28 +0200114/* Note on the size of sigset_t:
115 *
116 * In glibc, sigset_t is an array with space for 1024 bits (!),
117 * even though all arches supported by Linux have only 64 signals
118 * except MIPS, which has 128. IOW, it is 128 bytes long.
119 *
120 * In-kernel sigset_t is sized correctly (it is either 64 or 128 bit long).
121 * However, some old syscall return only 32 lower bits (one word).
122 * Example: sys_sigpending vs sys_rt_sigpending.
123 *
124 * Be aware of this fact when you try to
125 * memcpy(&tcp->u_arg[1], &something, sizeof(sigset_t))
126 * - sizeof(sigset_t) is much bigger than you think,
127 * it may overflow tcp->u_arg[] array, and it may try to copy more data
128 * than is really available in <something>.
129 * Similarly,
130 * umoven(tcp, addr, sizeof(sigset_t), &sigset)
131 * may be a bad idea: it'll try to read much more data than needed
132 * to fetch a sigset_t.
133 * Use (NSIG / 8) as a size instead.
134 */
135
Roland McGrathee36ce12004-09-04 03:53:10 +0000136const char *
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000137signame(const int sig)
Nate Sammonsce780fc1999-03-29 23:23:13 +0000138{
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000139 static char buf[sizeof("SIGRT_%u") + sizeof(int)*3];
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200140
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000141 if (sig >= 0) {
142 const unsigned int s = sig;
143
144 if (s < nsignals)
145 return signalent[s];
Nate Sammonsce780fc1999-03-29 23:23:13 +0000146#ifdef SIGRTMIN
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000147 if (s >= __SIGRTMIN && s <= __SIGRTMAX) {
148 sprintf(buf, "SIGRT_%u", s - __SIGRTMIN);
149 return buf;
150 }
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200151#endif
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000152 }
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200153 sprintf(buf, "%d", sig);
154 return buf;
Nate Sammonsce780fc1999-03-29 23:23:13 +0000155}
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000156
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000157static unsigned int
158popcount32(const uint32_t *a, unsigned int size)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000159{
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000160 unsigned int count = 0;
Denys Vlasenkod9560c12011-08-19 17:41:28 +0200161
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000162 for (; size; ++a, --size) {
163 uint32_t x = *a;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000164
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000165#ifdef HAVE___BUILTIN_POPCOUNT
166 count += __builtin_popcount(x);
Denys Vlasenkoa8773792013-07-18 20:42:41 +0200167#else
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000168 for (; x; ++count)
169 x &= x - 1;
Nate Sammons4a121431999-04-06 01:19:39 +0000170#endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000171 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100172
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000173 return count;
174}
175
176static const char *
177sprintsigmask_n(const char *prefix, const void *sig_mask, unsigned int bytes)
178{
179 /*
180 * The maximum number of signal names to be printed is NSIG * 2 / 3.
181 * Most of signal names have length 7,
182 * average length of signal names is less than 7.
183 * The length of prefix string does not exceed 16.
184 */
185 static char outstr[128 + 8 * (NSIG * 2 / 3)];
186
187 char *s;
188 const uint32_t *mask;
189 uint32_t inverted_mask[NSIG / 32];
190 unsigned int size;
191 int i;
192 char sep;
193
194 s = stpcpy(outstr, prefix);
195
196 mask = sig_mask;
197 /* length of signal mask in 4-byte words */
198 size = (bytes >= NSIG / 8) ? NSIG / 32 : (bytes + 3) / 4;
199
200 /* check whether 2/3 or more bits are set */
201 if (popcount32(mask, size) >= size * 32 * 2 / 3) {
202 /* show those signals that are NOT in the mask */
203 unsigned int j;
204 for (j = 0; j < size; ++j)
205 inverted_mask[j] = ~mask[j];
206 mask = inverted_mask;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000207 *s++ = '~';
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000208 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100209
210 sep = '[';
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000211 for (i = 0; (i = next_set_bit(mask, i, size * 32)) >= 0; ) {
212 ++i;
213 *s++ = sep;
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000214 if ((unsigned) i < nsignals) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000215 s = stpcpy(s, signalent[i] + 3);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000216 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000217#ifdef SIGRTMIN
218 else if (i >= __SIGRTMIN && i <= __SIGRTMAX) {
219 s += sprintf(s, "RT_%u", i - __SIGRTMIN);
220 }
221#endif
222 else {
223 s += sprintf(s, "%u", i);
224 }
225 sep = ' ';
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000226 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100227 if (sep == '[')
228 *s++ = sep;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000229 *s++ = ']';
230 *s = '\0';
231 return outstr;
232}
233
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000234#define tprintsigmask_addr(prefix, mask) \
235 tprints(sprintsigmask_n((prefix), (mask), sizeof(mask)))
Denys Vlasenko75f4e1f2013-07-18 20:37:06 +0200236
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000237#define sprintsigmask_val(prefix, mask) \
238 sprintsigmask_n((prefix), &(mask), sizeof(mask))
239
240#define tprintsigmask_val(prefix, mask) \
241 tprints(sprintsigmask_n((prefix), &(mask), sizeof(mask)))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000242
243void
Denys Vlasenkoeccc48c2011-06-09 01:28:11 +0200244printsignal(int nr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000245{
Denys Vlasenko5940e652011-09-01 09:55:05 +0200246 tprints(signame(nr));
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000247}
248
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000249void
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200250print_sigset_addr_len(struct tcb *tcp, long addr, long len)
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000251{
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000252 char mask[NSIG / 8];
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000253
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200254 if (!addr) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200255 tprints("NULL");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200256 return;
257 }
258 /* Here len is usually equals NSIG / 8 or current_wordsize.
259 * But we code this defensively:
260 */
261 if (len < 0) {
262 bad:
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000263 tprintf("%#lx", addr);
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200264 return;
265 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000266 if (len >= NSIG / 8)
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200267 len = NSIG / 8;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000268 else
269 len = (len + 3) & ~3;
270
271 if (umoven(tcp, addr, len, mask) < 0)
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200272 goto bad;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000273 tprints(sprintsigmask_n("", mask, len));
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000274}
275
John Hughes58265892001-10-18 15:13:53 +0000276#ifndef ILL_ILLOPC
277#define ILL_ILLOPC 1 /* illegal opcode */
278#define ILL_ILLOPN 2 /* illegal operand */
279#define ILL_ILLADR 3 /* illegal addressing mode */
280#define ILL_ILLTRP 4 /* illegal trap */
281#define ILL_PRVOPC 5 /* privileged opcode */
282#define ILL_PRVREG 6 /* privileged register */
283#define ILL_COPROC 7 /* coprocessor error */
284#define ILL_BADSTK 8 /* internal stack error */
285#define FPE_INTDIV 1 /* integer divide by zero */
286#define FPE_INTOVF 2 /* integer overflow */
287#define FPE_FLTDIV 3 /* floating point divide by zero */
288#define FPE_FLTOVF 4 /* floating point overflow */
289#define FPE_FLTUND 5 /* floating point underflow */
290#define FPE_FLTRES 6 /* floating point inexact result */
291#define FPE_FLTINV 7 /* floating point invalid operation */
292#define FPE_FLTSUB 8 /* subscript out of range */
293#define SEGV_MAPERR 1 /* address not mapped to object */
294#define SEGV_ACCERR 2 /* invalid permissions for mapped object */
295#define BUS_ADRALN 1 /* invalid address alignment */
296#define BUS_ADRERR 2 /* non-existant physical address */
297#define BUS_OBJERR 3 /* object specific hardware error */
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000298#define SYS_SECCOMP 1 /* seccomp triggered */
John Hughes58265892001-10-18 15:13:53 +0000299#define TRAP_BRKPT 1 /* process breakpoint */
300#define TRAP_TRACE 2 /* process trace trap */
301#define CLD_EXITED 1 /* child has exited */
302#define CLD_KILLED 2 /* child was killed */
303#define CLD_DUMPED 3 /* child terminated abnormally */
304#define CLD_TRAPPED 4 /* traced child has trapped */
305#define CLD_STOPPED 5 /* child has stopped */
306#define CLD_CONTINUED 6 /* stopped child has continued */
307#define POLL_IN 1 /* data input available */
308#define POLL_OUT 2 /* output buffers available */
309#define POLL_MSG 3 /* input message available */
310#define POLL_ERR 4 /* i/o error */
311#define POLL_PRI 5 /* high priority input available */
312#define POLL_HUP 6 /* device disconnected */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000313#define SI_KERNEL 0x80 /* sent by kernel */
John Hughes58265892001-10-18 15:13:53 +0000314#define SI_USER 0 /* sent by kill, sigsend, raise */
315#define SI_QUEUE -1 /* sent by sigqueue */
316#define SI_TIMER -2 /* sent by timer expiration */
317#define SI_MESGQ -3 /* sent by real time mesq state change */
318#define SI_ASYNCIO -4 /* sent by AIO completion */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000319#define SI_SIGIO -5 /* sent by SIGIO */
320#define SI_TKILL -6 /* sent by tkill */
Dmitry V. Levinb9d4d212014-03-11 01:57:02 +0000321#define SI_DETHREAD -7 /* sent by execve killing subsidiary threads */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000322#define SI_ASYNCNL -60 /* sent by asynch name lookup completion */
Denys Vlasenko2c4fb902012-03-15 17:24:49 +0100323#endif
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000324
Denys Vlasenko2c4fb902012-03-15 17:24:49 +0100325#ifndef SI_FROMUSER
326# define SI_FROMUSER(sip) ((sip)->si_code <= 0)
Denys Vlasenko84703742012-02-25 02:38:52 +0100327#endif
John Hughes58265892001-10-18 15:13:53 +0000328
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000329#include "xlat/siginfo_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000330#include "xlat/sigill_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000331#include "xlat/sigfpe_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000332#include "xlat/sigtrap_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000333#include "xlat/sigchld_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000334#include "xlat/sigpoll_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000335#include "xlat/sigprof_codes.h"
John Hughes58265892001-10-18 15:13:53 +0000336
337#ifdef SIGEMT
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000338#include "xlat/sigemt_codes.h"
John Hughes58265892001-10-18 15:13:53 +0000339#endif
340
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000341#include "xlat/sigsegv_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000342#include "xlat/sigbus_codes.h"
John Hughes58265892001-10-18 15:13:53 +0000343
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000344#ifndef SYS_SECCOMP
345# define SYS_SECCOMP 1
346#endif
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000347#include "xlat/sigsys_codes.h"
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000348
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000349static void
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000350printsigsource(const siginfo_t *sip)
351{
352 tprintf(", si_pid=%lu, si_uid=%lu",
353 (unsigned long) sip->si_pid,
354 (unsigned long) sip->si_uid);
355}
356
357static void
358printsigval(const siginfo_t *sip, int verbose)
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000359{
360 if (!verbose)
361 tprints(", ...");
362 else
363 tprintf(", si_value={int=%u, ptr=%#lx}",
364 sip->si_int,
365 (unsigned long) sip->si_ptr);
366}
367
John Hughes58265892001-10-18 15:13:53 +0000368void
Dmitry V. Levind8890b52015-02-07 15:47:24 +0000369printsiginfo(const siginfo_t *sip, int verbose)
John Hughes58265892001-10-18 15:13:53 +0000370{
Roland McGrathf9c49b22004-10-06 22:11:54 +0000371 const char *code;
John Hughes58265892001-10-18 15:13:53 +0000372
373 if (sip->si_signo == 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200374 tprints("{}");
John Hughes58265892001-10-18 15:13:53 +0000375 return;
376 }
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200377 tprints("{si_signo=");
John Hughes58265892001-10-18 15:13:53 +0000378 printsignal(sip->si_signo);
379 code = xlookup(siginfo_codes, sip->si_code);
380 if (!code) {
381 switch (sip->si_signo) {
382 case SIGTRAP:
383 code = xlookup(sigtrap_codes, sip->si_code);
384 break;
385 case SIGCHLD:
386 code = xlookup(sigchld_codes, sip->si_code);
387 break;
388 case SIGPOLL:
389 code = xlookup(sigpoll_codes, sip->si_code);
390 break;
391 case SIGPROF:
392 code = xlookup(sigprof_codes, sip->si_code);
393 break;
394 case SIGILL:
395 code = xlookup(sigill_codes, sip->si_code);
396 break;
397#ifdef SIGEMT
398 case SIGEMT:
399 code = xlookup(sigemt_codes, sip->si_code);
400 break;
401#endif
402 case SIGFPE:
403 code = xlookup(sigfpe_codes, sip->si_code);
404 break;
405 case SIGSEGV:
406 code = xlookup(sigsegv_codes, sip->si_code);
407 break;
408 case SIGBUS:
409 code = xlookup(sigbus_codes, sip->si_code);
410 break;
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000411 case SIGSYS:
412 code = xlookup(sigsys_codes, sip->si_code);
413 break;
John Hughes58265892001-10-18 15:13:53 +0000414 }
415 }
416 if (code)
417 tprintf(", si_code=%s", code);
418 else
419 tprintf(", si_code=%#x", sip->si_code);
420#ifdef SI_NOINFO
421 if (sip->si_code != SI_NOINFO)
422#endif
423 {
424 if (sip->si_errno) {
Dmitry V. Levinb2f8c772015-02-23 03:10:25 +0000425 tprints(", si_errno=");
426 if ((unsigned) sip->si_errno < nerrnos
427 && errnoent[sip->si_errno])
428 tprints(errnoent[sip->si_errno]);
John Hughes58265892001-10-18 15:13:53 +0000429 else
Dmitry V. Levinb2f8c772015-02-23 03:10:25 +0000430 tprintf("%d", sip->si_errno);
John Hughes58265892001-10-18 15:13:53 +0000431 }
432#ifdef SI_FROMUSER
433 if (SI_FROMUSER(sip)) {
John Hughes58265892001-10-18 15:13:53 +0000434 switch (sip->si_code) {
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000435#ifdef SI_USER
436 case SI_USER:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000437 printsigsource(sip);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000438 break;
439#endif
440#ifdef SI_TKILL
441 case SI_TKILL:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000442 printsigsource(sip);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000443 break;
444#endif
Dmitry V. Levin36ab3d52015-01-13 09:24:04 +0300445#if defined SI_TIMER \
446 && defined HAVE_SIGINFO_T_SI_TIMERID && defined HAVE_SIGINFO_T_SI_OVERRUN
John Hughes58265892001-10-18 15:13:53 +0000447 case SI_TIMER:
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000448 tprintf(", si_timerid=%#x, si_overrun=%d",
449 sip->si_timerid, sip->si_overrun);
450 printsigval(sip, verbose);
John Hughes58265892001-10-18 15:13:53 +0000451 break;
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000452#endif
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000453 default:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000454 printsigsource(sip);
455 if (sip->si_ptr)
456 printsigval(sip, verbose);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000457 break;
John Hughes58265892001-10-18 15:13:53 +0000458 }
John Hughes58265892001-10-18 15:13:53 +0000459 }
460 else
461#endif /* SI_FROMUSER */
462 {
463 switch (sip->si_signo) {
464 case SIGCHLD:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000465 printsigsource(sip);
466 tprints(", si_status=");
John Hughes58265892001-10-18 15:13:53 +0000467 if (sip->si_code == CLD_EXITED)
468 tprintf("%d", sip->si_status);
469 else
470 printsignal(sip->si_status);
John Hughes58265892001-10-18 15:13:53 +0000471 if (!verbose)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200472 tprints(", ...");
John Hughes58265892001-10-18 15:13:53 +0000473 else
H.J. Lu2bb45812012-04-15 11:17:13 -0700474 tprintf(", si_utime=%llu, si_stime=%llu",
475 (unsigned long long) sip->si_utime,
476 (unsigned long long) sip->si_stime);
John Hughes58265892001-10-18 15:13:53 +0000477 break;
478 case SIGILL: case SIGFPE:
479 case SIGSEGV: case SIGBUS:
480 tprintf(", si_addr=%#lx",
481 (unsigned long) sip->si_addr);
482 break;
483 case SIGPOLL:
484 switch (sip->si_code) {
485 case POLL_IN: case POLL_OUT: case POLL_MSG:
486 tprintf(", si_band=%ld",
487 (long) sip->si_band);
488 break;
489 }
490 break;
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000491#ifdef HAVE_SIGINFO_T_SI_SYSCALL
492 case SIGSYS:
493 tprintf(", si_call_addr=%#lx, si_syscall=%d, si_arch=%u",
494 (unsigned long) sip->si_call_addr,
495 sip->si_syscall, sip->si_arch);
496 break;
497#endif
John Hughes58265892001-10-18 15:13:53 +0000498 default:
Dmitry V. Levinb41e1c92011-03-10 23:14:47 +0000499 if (sip->si_pid || sip->si_uid)
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000500 printsigsource(sip);
501 if (sip->si_ptr)
502 printsigval(sip, verbose);
John Hughes58265892001-10-18 15:13:53 +0000503 }
504 }
505 }
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200506 tprints("}");
John Hughes58265892001-10-18 15:13:53 +0000507}
508
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +0100509void
510printsiginfo_at(struct tcb *tcp, long addr)
511{
512 siginfo_t si;
513 if (!addr) {
514 tprints("NULL");
515 return;
516 }
517 if (syserror(tcp)) {
518 tprintf("%#lx", addr);
519 return;
520 }
521 if (umove(tcp, addr, &si) < 0) {
522 tprints("{???}");
523 return;
524 }
525 printsiginfo(&si, verbose(tcp));
526}
527
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000528int
Denys Vlasenko12014262011-05-30 14:00:14 +0200529sys_sigsetmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000530{
531 if (entering(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000532 tprintsigmask_val("", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000533 }
534 else if (!syserror(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000535 tcp->auxstr = sprintsigmask_val("old mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000536 return RVAL_HEX | RVAL_STR;
537 }
538 return 0;
539}
540
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000541#ifdef HAVE_SIGACTION
542
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000543struct old_sigaction {
Denys Vlasenko86d94842013-02-08 12:59:13 +0100544 /* sa_handler may be a libc #define, need to use other name: */
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800545#ifdef MIPS
546 unsigned int sa_flags;
547 void (*__sa_handler)(int);
548 /* Kernel treats sa_mask as an array of longs. */
549 unsigned long sa_mask[NSIG / sizeof(long) ? NSIG / sizeof(long) : 1];
550#else
Denys Vlasenko86d94842013-02-08 12:59:13 +0100551 void (*__sa_handler)(int);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000552 unsigned long sa_mask;
553 unsigned long sa_flags;
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800554#endif /* !MIPS */
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +0000555#if HAVE_SA_RESTORER
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100556 void (*sa_restorer)(void);
557#endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000558};
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000559
Elliott Hughes458b3f22014-02-28 23:21:35 +0000560struct old_sigaction32 {
561 /* sa_handler may be a libc #define, need to use other name: */
562 uint32_t __sa_handler;
563 uint32_t sa_mask;
564 uint32_t sa_flags;
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +0000565#if HAVE_SA_RESTORER
Elliott Hughes458b3f22014-02-28 23:21:35 +0000566 uint32_t sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100567#endif
Elliott Hughes458b3f22014-02-28 23:21:35 +0000568};
569
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000570static void
571decode_old_sigaction(struct tcb *tcp, long addr)
572{
573 struct old_sigaction sa;
Elliott Hughes458b3f22014-02-28 23:21:35 +0000574 int r;
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000575
576 if (!addr) {
577 tprints("NULL");
578 return;
579 }
580 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp))) {
581 tprintf("%#lx", addr);
582 return;
583 }
Elliott Hughes458b3f22014-02-28 23:21:35 +0000584
585#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
586 if (current_wordsize != sizeof(sa.__sa_handler) && current_wordsize == 4) {
587 struct old_sigaction32 sa32;
588 r = umove(tcp, addr, &sa32);
589 if (r >= 0) {
590 memset(&sa, 0, sizeof(sa));
591 sa.__sa_handler = (void*)(uintptr_t)sa32.__sa_handler;
592 sa.sa_flags = sa32.sa_flags;
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +0000593#if HAVE_SA_RESTORER && defined SA_RESTORER
Elliott Hughes458b3f22014-02-28 23:21:35 +0000594 sa.sa_restorer = (void*)(uintptr_t)sa32.sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100595#endif
Elliott Hughes458b3f22014-02-28 23:21:35 +0000596 sa.sa_mask = sa32.sa_mask;
597 }
598 } else
599#endif
600 {
601 r = umove(tcp, addr, &sa);
602 }
603 if (r < 0) {
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000604 tprints("{...}");
605 return;
606 }
607
608 /* Architectures using function pointers, like
609 * hppa, may need to manipulate the function pointer
610 * to compute the result of a comparison. However,
611 * the __sa_handler function pointer exists only in
612 * the address space of the traced process, and can't
613 * be manipulated by strace. In order to prevent the
614 * compiler from generating code to manipulate
615 * __sa_handler we cast the function pointers to long. */
616 if ((long)sa.__sa_handler == (long)SIG_ERR)
617 tprints("{SIG_ERR, ");
618 else if ((long)sa.__sa_handler == (long)SIG_DFL)
619 tprints("{SIG_DFL, ");
620 else if ((long)sa.__sa_handler == (long)SIG_IGN)
621 tprints("{SIG_IGN, ");
622 else
623 tprintf("{%#lx, ", (long) sa.__sa_handler);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800624#ifdef MIPS
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000625 tprintsigmask_addr("", sa.sa_mask);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800626#else
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000627 tprintsigmask_val("", sa.sa_mask);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800628#endif
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000629 tprints(", ");
630 printflags(sigact_flags, sa.sa_flags, "SA_???");
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +0000631#if HAVE_SA_RESTORER && defined SA_RESTORER
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000632 if (sa.sa_flags & SA_RESTORER)
633 tprintf(", %p", sa.sa_restorer);
634#endif
635 tprints("}");
636}
637
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000638int
Denys Vlasenko12014262011-05-30 14:00:14 +0200639sys_sigaction(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000640{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000641 if (entering(tcp)) {
642 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200643 tprints(", ");
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000644 decode_old_sigaction(tcp, tcp->u_arg[1]);
645 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000646 } else
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000647 decode_old_sigaction(tcp, tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000648 return 0;
649}
650
651int
Denys Vlasenko12014262011-05-30 14:00:14 +0200652sys_signal(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000653{
654 if (entering(tcp)) {
655 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200656 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000657 switch (tcp->u_arg[1]) {
Jan Kratochvil1f942712008-08-06 21:38:52 +0000658 case (long) SIG_ERR:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200659 tprints("SIG_ERR");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000660 break;
Jan Kratochvil1f942712008-08-06 21:38:52 +0000661 case (long) SIG_DFL:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200662 tprints("SIG_DFL");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000663 break;
Jan Kratochvil1f942712008-08-06 21:38:52 +0000664 case (long) SIG_IGN:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200665 tprints("SIG_IGN");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000666 break;
667 default:
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000668 tprintf("%#lx", tcp->u_arg[1]);
669 }
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000670 return 0;
671 }
Dmitry V. Levin21a75342008-09-03 01:22:18 +0000672 else if (!syserror(tcp)) {
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000673 switch (tcp->u_rval) {
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100674 case (long) SIG_ERR:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000675 tcp->auxstr = "SIG_ERR"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100676 case (long) SIG_DFL:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000677 tcp->auxstr = "SIG_DFL"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100678 case (long) SIG_IGN:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000679 tcp->auxstr = "SIG_IGN"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100680 default:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000681 tcp->auxstr = NULL;
682 }
683 return RVAL_HEX | RVAL_STR;
684 }
Dmitry V. Levin21a75342008-09-03 01:22:18 +0000685 return 0;
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000686}
687
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000688#endif /* HAVE_SIGACTION */
689
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000690int
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000691sys_sigreturn(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000692{
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000693#if defined(ARM)
Roland McGrath0f87c492003-06-03 23:29:04 +0000694 if (entering(tcp)) {
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200695 struct arm_sigcontext {
696 unsigned long trap_no;
697 unsigned long error_code;
698 unsigned long oldmask;
699 unsigned long arm_r0;
700 unsigned long arm_r1;
701 unsigned long arm_r2;
702 unsigned long arm_r3;
703 unsigned long arm_r4;
704 unsigned long arm_r5;
705 unsigned long arm_r6;
706 unsigned long arm_r7;
707 unsigned long arm_r8;
708 unsigned long arm_r9;
709 unsigned long arm_r10;
710 unsigned long arm_fp;
711 unsigned long arm_ip;
712 unsigned long arm_sp;
713 unsigned long arm_lr;
714 unsigned long arm_pc;
715 unsigned long arm_cpsr;
716 unsigned long fault_address;
717 };
718 struct arm_ucontext {
719 unsigned long uc_flags;
720 unsigned long uc_link; /* struct ucontext* */
721 /* The next three members comprise stack_t struct: */
722 unsigned long ss_sp; /* void* */
723 unsigned long ss_flags; /* int */
724 unsigned long ss_size; /* size_t */
725 struct arm_sigcontext sc;
726 /* These two members are sigset_t: */
727 unsigned long uc_sigmask[2];
728 /* more fields follow, which we aren't interested in */
729 };
730 struct arm_ucontext uc;
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200731 if (umove(tcp, arm_regs.ARM_sp, &uc) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000732 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000733 /*
734 * Kernel fills out uc.sc.oldmask too when it sets up signal stack,
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200735 * but for sigmask restore, sigreturn syscall uses uc.uc_sigmask instead.
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200736 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000737 tprintsigmask_addr(") (mask ", uc.uc_sigmask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000738 }
Roland McGrath0f87c492003-06-03 23:29:04 +0000739#elif defined(S390) || defined(S390X)
Roland McGrath0f87c492003-06-03 23:29:04 +0000740 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200741 long usp;
Dmitry V. Levin085411b2015-03-04 21:40:00 +0000742 long mask[NSIG / 8 / sizeof(long)];
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200743 if (upeek(tcp->pid, PT_GPR15, &usp) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000744 return 0;
Dmitry V. Levin085411b2015-03-04 21:40:00 +0000745 if (umove(tcp, usp + __SIGNAL_FRAMESIZE, &mask) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000746 return 0;
Dmitry V. Levin085411b2015-03-04 21:40:00 +0000747# ifdef S390
748 usp = mask[0];
749 mask[0] = mask[1];
750 mask[1] = usp;
751# endif
752 tprintsigmask_addr(") (mask ", mask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000753 }
Dmitry V. Levin5dd336b2015-02-23 16:18:09 +0000754#elif defined I386 || defined X86_64 || defined X32
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000755 if (entering(tcp)) {
Dmitry V. Levinccb4fda2015-03-04 12:19:55 +0000756# ifndef I386
757 if (current_personality != 1) {
758 const unsigned long addr =
759 (unsigned long) *x86_64_rsp_ptr +
760 offsetof(struct ucontext, uc_sigmask);
761 tprints(") (mask ");
762 print_sigset_addr_len(tcp, addr, NSIG / 8);
763 return 0;
764 }
765# endif
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200766 struct i386_sigcontext_struct {
767 uint16_t gs, __gsh;
768 uint16_t fs, __fsh;
769 uint16_t es, __esh;
770 uint16_t ds, __dsh;
771 uint32_t edi;
772 uint32_t esi;
773 uint32_t ebp;
774 uint32_t esp;
775 uint32_t ebx;
776 uint32_t edx;
777 uint32_t ecx;
778 uint32_t eax;
779 uint32_t trapno;
780 uint32_t err;
781 uint32_t eip;
782 uint16_t cs, __csh;
783 uint32_t eflags;
784 uint32_t esp_at_signal;
785 uint16_t ss, __ssh;
786 uint32_t i387;
787 uint32_t oldmask;
788 uint32_t cr2;
789 };
790 struct i386_fpstate {
791 uint32_t cw;
792 uint32_t sw;
793 uint32_t tag;
794 uint32_t ipoff;
795 uint32_t cssel;
796 uint32_t dataoff;
797 uint32_t datasel;
798 uint8_t st[8][10]; /* 8*10 bytes: FP regs */
799 uint16_t status;
800 uint16_t magic;
801 uint32_t fxsr_env[6];
802 uint32_t mxcsr;
803 uint32_t reserved;
804 uint8_t stx[8][16]; /* 8*16 bytes: FP regs, each padded to 16 bytes */
805 uint8_t xmm[8][16]; /* 8 XMM regs */
806 uint32_t padding1[44];
807 uint32_t padding2[12]; /* union with struct _fpx_sw_bytes */
808 };
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200809 struct {
810 struct i386_sigcontext_struct sc;
811 struct i386_fpstate fp;
812 uint32_t extramask[1];
813 } signal_stack;
814 /* On i386, sc is followed on stack by struct fpstate
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100815 * and after it an additional u32 extramask[1] which holds
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200816 * upper half of the mask.
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100817 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000818 uint32_t sigmask[2];
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200819 if (umove(tcp, *i386_esp_ptr, &signal_stack) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000820 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000821 sigmask[0] = signal_stack.sc.oldmask;
822 sigmask[1] = signal_stack.extramask[0];
823 tprintsigmask_addr(") (mask ", sigmask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000824 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000825#elif defined(IA64)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000826 if (entering(tcp)) {
Dmitry V. Levin1e8a4542015-03-04 12:11:31 +0000827 long addr;
828 if (upeek(tcp->pid, PT_R12, &addr) < 0)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000829 return 0;
Dmitry V. Levin1e8a4542015-03-04 12:11:31 +0000830 /* offsetof(struct sigframe, sc) */
831# define OFFSETOF_STRUCT_SIGFRAME_SC 0xA0
832 addr += 16 + OFFSETOF_STRUCT_SIGFRAME_SC +
833 offsetof(struct sigcontext, sc_mask);
834 tprints(") (mask ");
835 print_sigset_addr_len(tcp, addr, NSIG / 8);
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000836 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000837#elif defined(POWERPC)
Roland McGrath0f87c492003-06-03 23:29:04 +0000838 if (entering(tcp)) {
Dmitry V. Levin577be252015-03-04 16:01:47 +0000839 long esp = ppc_regs.gpr[1];
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000840 struct sigcontext sc;
Anton Blanchardce6e33b2013-06-26 15:53:33 +0200841
Andreas Schwabedb39342010-02-23 00:18:51 +0100842 /* Skip dummy stack frame. */
Andreas Schwabd69fa492010-07-12 21:39:57 +0200843#ifdef POWERPC64
844 if (current_personality == 0)
845 esp += 128;
846 else
Andreas Schwabedb39342010-02-23 00:18:51 +0100847#endif
Dmitry V. Levin577be252015-03-04 16:01:47 +0000848 esp += 64;
849
850 tprints(") (mask ");
851 if (umove(tcp, esp, &sc) < 0) {
852 tprintf("%#lx", esp);
853 } else {
854 unsigned long mask[NSIG / 8 / sizeof(long)];
855#ifdef POWERPC64
856 if (current_personality == 0)
857 mask[0] = sc.oldmask | (sc._unused[3] << 32);
858 else
859#endif
860 {
861 mask[0] = sc.oldmask;
862 mask[1] = sc._unused[3];
863 }
864 tprintsigmask_val("", mask);
865 }
Roland McGrath0f87c492003-06-03 23:29:04 +0000866 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000867#elif defined(M68K)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000868 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200869 long usp;
870 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200871 if (upeek(tcp->pid, 4*PT_USP, &usp) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000872 return 0;
Roland McGrath0f87c492003-06-03 23:29:04 +0000873 if (umove(tcp, usp, &sc) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000874 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000875 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000876 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000877#elif defined(ALPHA)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000878 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200879 long fp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000880 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200881 if (upeek(tcp->pid, REG_FP, &fp) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000882 return 0;
Roland McGrath0f87c492003-06-03 23:29:04 +0000883 if (umove(tcp, fp, &sc) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000884 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000885 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000886 }
Denys Vlasenkoc36c3522012-02-25 02:47:15 +0100887#elif defined(SPARC) || defined(SPARC64)
Denys Vlasenkob63256e2011-06-07 12:13:24 +0200888 if (entering(tcp)) {
Dmitry V. Levindb199362015-03-04 17:52:42 +0000889 long fp = sparc_regs.u_regs[U_REG_FP] + sizeof(struct sparc_stackf);
890 struct {
891 m_siginfo_t si;
892 void *fpu_save;
893 long insns[2] __attribute__ ((aligned (8)));
894 unsigned int extramask[NSIG / 8 / sizeof(int) - 1];
895 } frame;
896
897 tprints(") (mask ");
898 if (umove(tcp, fp, &frame) < 0) {
899 tprintf("%#lx", fp);
900 } else {
901 unsigned int mask[NSIG / 8 / sizeof(int)];
902
903 mask[0] = frame.si.si_mask;
904 memcpy(mask + 1, frame.extramask, sizeof(frame.extramask));
905 tprintsigmask_val("", mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000906 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000907 }
Dmitry V. Levinfd6d2072015-03-04 20:04:02 +0000908#elif defined MIPS
Denys Vlasenkob63256e2011-06-07 12:13:24 +0200909 if (entering(tcp)) {
Dmitry V. Levinfd6d2072015-03-04 20:04:02 +0000910# if defined LINUX_MIPSO32
911 /*
912 * offsetof(struct sigframe, sf_mask) ==
913 * sizeof(sf_ass) + sizeof(sf_pad) + sizeof(struct sigcontext)
914 */
915 const long addr = mips_REG_SP + 6 * 4 +
916 sizeof(struct sigcontext);
917# else
918 /*
919 * This decodes rt_sigreturn.
920 * The 64-bit ABIs do not have sigreturn.
921 *
922 * offsetof(struct rt_sigframe, rs_uc) ==
923 * sizeof(sf_ass) + sizeof(sf_pad) + sizeof(struct siginfo)
924 */
925 const long addr = mips_REG_SP + 6 * 4 + 128 +
926 offsetof(struct ucontext, uc_sigmask);
927# endif
928 tprints(") (mask ");
929 print_sigset_addr_len(tcp, addr, NSIG / 8);
Wichert Akkermanf90da011999-10-31 21:15:38 +0000930 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000931#elif defined(CRISV10) || defined(CRISV32)
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000932 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200933 struct sigcontext sc;
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000934 long regs[PT_MAX+1];
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000935 if (ptrace(PTRACE_GETREGS, tcp->pid, NULL, (long)regs) < 0) {
Denys Vlasenko905e8e02013-02-26 12:30:09 +0100936 perror_msg("sigreturn: PTRACE_GETREGS");
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000937 return 0;
938 }
939 if (umove(tcp, regs[PT_USP], &sc) < 0)
940 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000941 tprintsigmask_val(") (mask ", sc.oldmask);
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000942 }
Chris Metcalfc8c66982009-12-28 10:00:15 -0500943#elif defined(TILE)
Chris Metcalfc8c66982009-12-28 10:00:15 -0500944 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200945 struct ucontext uc;
Denys Vlasenko56a52982011-06-09 01:36:29 +0200946
947 /* offset of ucontext in the kernel's sigframe structure */
Chris Metcalf5c0796f2013-05-21 20:25:22 -0400948# define SIGFRAME_UC_OFFSET C_ABI_SAVE_AREA_SIZE + sizeof(siginfo_t)
Chris Metcalf0b99a8a2013-02-05 17:48:33 +0100949 if (umove(tcp, tile_regs.sp + SIGFRAME_UC_OFFSET, &uc) < 0)
Chris Metcalfc8c66982009-12-28 10:00:15 -0500950 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000951 tprintsigmask_val(") (mask ", uc.uc_sigmask);
Chris Metcalfc8c66982009-12-28 10:00:15 -0500952 }
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200953#elif defined(MICROBLAZE)
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200954 /* TODO: Verify that this is correct... */
955 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200956 struct sigcontext sc;
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200957 long sp;
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200958 /* Read r1, the stack pointer. */
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200959 if (upeek(tcp->pid, 1 * 4, &sp) < 0)
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200960 return 0;
961 if (umove(tcp, sp, &sc) < 0)
962 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000963 tprintsigmask_val(") (mask ", sc.oldmask);
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200964 }
Wichert Akkermanc1652e22001-03-27 12:17:16 +0000965#else
Dmitry V. Levind4689922015-03-04 13:12:06 +0000966# warning sigreturn/rt_sigreturn signal mask decoding is not implemented for this architecture
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000967#endif
Dmitry V. Levinf112d072012-05-15 00:13:59 +0000968 return 0;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000969}
970
971int
Denys Vlasenko12014262011-05-30 14:00:14 +0200972sys_siggetmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000973{
974 if (exiting(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000975 tcp->auxstr = sprintsigmask_val("mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000976 }
977 return RVAL_HEX | RVAL_STR;
978}
979
980int
Dmitry V. Levine5e60852009-12-31 22:50:49 +0000981sys_sigsuspend(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000982{
983 if (entering(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000984 tprintsigmask_val("", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000985 }
986 return 0;
987}
988
Denys Vlasenko84703742012-02-25 02:38:52 +0100989#if !defined SS_ONSTACK
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000990#define SS_ONSTACK 1
991#define SS_DISABLE 2
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000992#endif
993
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000994#include "xlat/sigaltstack_flags.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000995
Dmitry V. Levin338c0692013-02-09 02:03:04 +0000996static void
Denys Vlasenko12014262011-05-30 14:00:14 +0200997print_stack_t(struct tcb *tcp, unsigned long addr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000998{
999 stack_t ss;
Dmitry V. Levind153bfc2014-02-26 22:29:27 +00001000 int r;
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001001
1002 if (!addr) {
1003 tprints("NULL");
Dmitry V. Levind153bfc2014-02-26 22:29:27 +00001004 return;
1005 }
1006
1007#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1008 if (current_wordsize != sizeof(ss.ss_sp) && current_wordsize == 4) {
1009 struct {
1010 uint32_t ss_sp;
1011 int32_t ss_flags;
1012 uint32_t ss_size;
1013 } ss32;
1014 r = umove(tcp, addr, &ss32);
1015 if (r >= 0) {
1016 memset(&ss, 0, sizeof(ss));
1017 ss.ss_sp = (void*)(unsigned long) ss32.ss_sp;
1018 ss.ss_flags = ss32.ss_flags;
1019 ss.ss_size = (unsigned long) ss32.ss_size;
1020 }
1021 } else
1022#endif
1023 {
1024 r = umove(tcp, addr, &ss);
1025 }
1026 if (r < 0) {
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001027 tprintf("%#lx", addr);
1028 } else {
1029 tprintf("{ss_sp=%#lx, ss_flags=", (unsigned long) ss.ss_sp);
1030 printflags(sigaltstack_flags, ss.ss_flags, "SS_???");
1031 tprintf(", ss_size=%lu}", (unsigned long) ss.ss_size);
1032 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001033}
1034
1035int
Denys Vlasenko12014262011-05-30 14:00:14 +02001036sys_sigaltstack(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001037{
1038 if (entering(tcp)) {
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001039 print_stack_t(tcp, tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001040 }
1041 else {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001042 tprints(", ");
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001043 print_stack_t(tcp, tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001044 }
1045 return 0;
1046}
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001047
1048#ifdef HAVE_SIGACTION
1049
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001050/* "Old" sigprocmask, which operates with word-sized signal masks */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001051int
Denys Vlasenko12014262011-05-30 14:00:14 +02001052sys_sigprocmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001053{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001054# ifdef ALPHA
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001055 if (entering(tcp)) {
Mike Frysingerdde045c2012-03-15 00:45:33 -04001056 /*
1057 * Alpha/OSF is different: it doesn't pass in two pointers,
1058 * but rather passes in the new bitmask as an argument and
1059 * then returns the old bitmask. This "works" because we
1060 * only have 64 signals to worry about. If you want more,
1061 * use of the rt_sigprocmask syscall is required.
1062 * Alpha:
1063 * old = osf_sigprocmask(how, new);
1064 * Everyone else:
1065 * ret = sigprocmask(how, &new, &old, ...);
1066 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001067 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001068 tprintsigmask_val(", ", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001069 }
1070 else if (!syserror(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001071 tcp->auxstr = sprintsigmask_val("old mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001072 return RVAL_HEX | RVAL_STR;
1073 }
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001074# else /* !ALPHA */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001075 if (entering(tcp)) {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001076 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001077 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001078 print_sigset_addr_len(tcp, tcp->u_arg[1], current_wordsize);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001079 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001080 }
1081 else {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001082 if (syserror(tcp))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001083 tprintf("%#lx", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001084 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001085 print_sigset_addr_len(tcp, tcp->u_arg[2], current_wordsize);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001086 }
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001087# endif /* !ALPHA */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001088 return 0;
1089}
1090
1091#endif /* HAVE_SIGACTION */
1092
1093int
Denys Vlasenko12014262011-05-30 14:00:14 +02001094sys_kill(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001095{
1096 if (entering(tcp)) {
Denys Vlasenkoe015d2d2013-02-15 14:58:52 +01001097 tprintf("%ld, %s",
1098 widen_to_long(tcp->u_arg[0]),
1099 signame(tcp->u_arg[1])
1100 );
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001101 }
1102 return 0;
1103}
1104
Roland McGrath8ffc3522003-07-09 09:47:49 +00001105int
Denys Vlasenko12014262011-05-30 14:00:14 +02001106sys_tgkill(struct tcb *tcp)
Roland McGrath8ffc3522003-07-09 09:47:49 +00001107{
1108 if (entering(tcp)) {
1109 tprintf("%ld, %ld, %s",
Denys Vlasenkoe015d2d2013-02-15 14:58:52 +01001110 widen_to_long(tcp->u_arg[0]),
1111 widen_to_long(tcp->u_arg[1]),
1112 signame(tcp->u_arg[2])
1113 );
Roland McGrath8ffc3522003-07-09 09:47:49 +00001114 }
1115 return 0;
1116}
Roland McGrath8ffc3522003-07-09 09:47:49 +00001117
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001118int
Denys Vlasenko12014262011-05-30 14:00:14 +02001119sys_sigpending(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001120{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001121 if (exiting(tcp)) {
1122 if (syserror(tcp))
1123 tprintf("%#lx", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001124 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001125 print_sigset_addr_len(tcp, tcp->u_arg[0], current_wordsize);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001126 }
1127 return 0;
1128}
1129
Denys Vlasenko12014262011-05-30 14:00:14 +02001130int
1131sys_rt_sigprocmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001132{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001133 /* Note: arg[3] is the length of the sigset. Kernel requires NSIG / 8 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001134 if (entering(tcp)) {
1135 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001136 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001137 print_sigset_addr_len(tcp, tcp->u_arg[1], tcp->u_arg[3]);
1138 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001139 }
1140 else {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001141 if (syserror(tcp))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001142 tprintf("%#lx", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001143 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001144 print_sigset_addr_len(tcp, tcp->u_arg[2], tcp->u_arg[3]);
Nate Sammonsdab325a1999-03-29 23:33:35 +00001145 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001146 }
1147 return 0;
1148}
1149
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001150/* Structure describing the action to be taken when a signal arrives. */
1151struct new_sigaction
1152{
Denys Vlasenko86d94842013-02-08 12:59:13 +01001153 /* sa_handler may be a libc #define, need to use other name: */
Chris Dearman2b4bb1c2013-12-09 19:58:42 -08001154#ifdef MIPS
1155 unsigned int sa_flags;
1156 void (*__sa_handler)(int);
1157#else
Denys Vlasenko86d94842013-02-08 12:59:13 +01001158 void (*__sa_handler)(int);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001159 unsigned long sa_flags;
Chris Dearman2b4bb1c2013-12-09 19:58:42 -08001160#endif /* !MIPS */
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +00001161#if HAVE_SA_RESTORER
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001162 void (*sa_restorer)(void);
1163#endif
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001164 /* Kernel treats sa_mask as an array of longs. */
1165 unsigned long sa_mask[NSIG / sizeof(long) ? NSIG / sizeof(long) : 1];
1166};
1167/* Same for i386-on-x86_64 and similar cases */
1168struct new_sigaction32
1169{
1170 uint32_t __sa_handler;
1171 uint32_t sa_flags;
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +00001172#if HAVE_SA_RESTORER
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001173 uint32_t sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001174#endif
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001175 uint32_t sa_mask[2 * (NSIG / sizeof(long) ? NSIG / sizeof(long) : 1)];
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001176};
1177
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001178static void
1179decode_new_sigaction(struct tcb *tcp, long addr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001180{
1181 struct new_sigaction sa;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001182 int r;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001183
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001184 if (!addr) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001185 tprints("NULL");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001186 return;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001187 }
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001188 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp))) {
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001189 tprintf("%#lx", addr);
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001190 return;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001191 }
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001192#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
Denys Vlasenko9fd4f962012-03-19 09:36:42 +01001193 if (current_wordsize != sizeof(sa.sa_flags) && current_wordsize == 4) {
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001194 struct new_sigaction32 sa32;
1195 r = umove(tcp, addr, &sa32);
1196 if (r >= 0) {
1197 memset(&sa, 0, sizeof(sa));
1198 sa.__sa_handler = (void*)(unsigned long)sa32.__sa_handler;
1199 sa.sa_flags = sa32.sa_flags;
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +00001200#if HAVE_SA_RESTORER && defined SA_RESTORER
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001201 sa.sa_restorer = (void*)(unsigned long)sa32.sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001202#endif
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001203 /* Kernel treats sa_mask as an array of longs.
1204 * For 32-bit process, "long" is uint32_t, thus, for example,
1205 * 32th bit in sa_mask will end up as bit 0 in sa_mask[1].
1206 * But for (64-bit) kernel, 32th bit in sa_mask is
1207 * 32th bit in 0th (64-bit) long!
1208 * For little-endian, it's the same.
1209 * For big-endian, we swap 32-bit words.
1210 */
1211 sa.sa_mask[0] = sa32.sa_mask[0] + ((long)(sa32.sa_mask[1]) << 32);
1212 }
1213 } else
1214#endif
1215 {
1216 r = umove(tcp, addr, &sa);
1217 }
1218 if (r < 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001219 tprints("{...}");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001220 return;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001221 }
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001222 /* Architectures using function pointers, like
1223 * hppa, may need to manipulate the function pointer
1224 * to compute the result of a comparison. However,
Denys Vlasenko86d94842013-02-08 12:59:13 +01001225 * the __sa_handler function pointer exists only in
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001226 * the address space of the traced process, and can't
1227 * be manipulated by strace. In order to prevent the
1228 * compiler from generating code to manipulate
Denys Vlasenko86d94842013-02-08 12:59:13 +01001229 * __sa_handler we cast the function pointers to long. */
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001230 if ((long)sa.__sa_handler == (long)SIG_ERR)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001231 tprints("{SIG_ERR, ");
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001232 else if ((long)sa.__sa_handler == (long)SIG_DFL)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001233 tprints("{SIG_DFL, ");
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001234 else if ((long)sa.__sa_handler == (long)SIG_IGN)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001235 tprints("{SIG_IGN, ");
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001236 else
1237 tprintf("{%#lx, ", (long) sa.__sa_handler);
Denys Vlasenko80b73a22013-07-18 10:10:46 +02001238 /*
1239 * Sigset size is in tcp->u_arg[4] (SPARC)
1240 * or in tcp->u_arg[3] (all other),
1241 * but kernel won't handle sys_rt_sigaction
1242 * with wrong sigset size (just returns EINVAL instead).
1243 * We just fetch the right size, which is NSIG / 8.
1244 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001245 tprintsigmask_val("", sa.sa_mask);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001246 tprints(", ");
Denys Vlasenko80b73a22013-07-18 10:10:46 +02001247
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001248 printflags(sigact_flags, sa.sa_flags, "SA_???");
Dmitry V. Levin24b8eb02015-02-28 17:17:09 +00001249#if HAVE_SA_RESTORER && defined SA_RESTORER
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001250 if (sa.sa_flags & SA_RESTORER)
1251 tprintf(", %p", sa.sa_restorer);
1252#endif
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001253 tprints("}");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001254}
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001255
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001256int
1257sys_rt_sigaction(struct tcb *tcp)
1258{
1259 if (entering(tcp)) {
1260 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001261 tprints(", ");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001262 decode_new_sigaction(tcp, tcp->u_arg[1]);
1263 tprints(", ");
1264 } else {
1265 decode_new_sigaction(tcp, tcp->u_arg[2]);
Denys Vlasenko9472a272013-02-12 11:43:46 +01001266#if defined(SPARC) || defined(SPARC64)
Wichert Akkermandacfb6e1999-06-03 14:21:07 +00001267 tprintf(", %#lx, %lu", tcp->u_arg[3], tcp->u_arg[4]);
1268#elif defined(ALPHA)
1269 tprintf(", %lu, %#lx", tcp->u_arg[3], tcp->u_arg[4]);
1270#else
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001271 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkermandacfb6e1999-06-03 14:21:07 +00001272#endif
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001273 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001274 return 0;
1275}
1276
Denys Vlasenko1d632462009-04-14 12:51:00 +00001277int
1278sys_rt_sigpending(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001279{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001280 if (exiting(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001281 /*
1282 * One of the few syscalls where sigset size (arg[1])
1283 * is allowed to be <= NSIG / 8, not strictly ==.
1284 * This allows non-rt sigpending() syscall
1285 * to reuse rt_sigpending() code in kernel.
1286 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001287 if (syserror(tcp))
1288 tprintf("%#lx", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001289 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001290 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[1]);
1291 tprintf(", %lu", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001292 }
1293 return 0;
1294}
Denys Vlasenko1d632462009-04-14 12:51:00 +00001295
1296int
1297sys_rt_sigsuspend(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001298{
1299 if (entering(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001300 /* NB: kernel requires arg[1] == NSIG / 8 */
1301 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[1]);
1302 tprintf(", %lu", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001303 }
1304 return 0;
1305}
Denys Vlasenko1d632462009-04-14 12:51:00 +00001306
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001307static void
1308print_sigqueueinfo(struct tcb *tcp, int sig, unsigned long uinfo)
1309{
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001310 printsignal(sig);
1311 tprints(", ");
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001312 printsiginfo_at(tcp, uinfo);
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001313}
1314
Denys Vlasenko1d632462009-04-14 12:51:00 +00001315int
1316sys_rt_sigqueueinfo(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001317{
1318 if (entering(tcp)) {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001319 tprintf("%lu, ", tcp->u_arg[0]);
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001320 print_sigqueueinfo(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1321 }
1322 return 0;
1323}
1324
1325int
1326sys_rt_tgsigqueueinfo(struct tcb *tcp)
1327{
1328 if (entering(tcp)) {
1329 tprintf("%lu, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
1330 print_sigqueueinfo(tcp, tcp->u_arg[2], tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001331 }
1332 return 0;
1333}
1334
Denys Vlasenko1d632462009-04-14 12:51:00 +00001335int sys_rt_sigtimedwait(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001336{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001337 /* NB: kernel requires arg[3] == NSIG / 8 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001338 if (entering(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001339 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[3]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001340 tprints(", ");
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001341 /* This is the only "return" parameter, */
1342 if (tcp->u_arg[1] != 0)
1343 return 0;
1344 /* ... if it's NULL, can decode all on entry */
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001345 tprints("NULL, ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001346 }
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001347 else if (tcp->u_arg[1] != 0) {
1348 /* syscall exit, and u_arg[1] wasn't NULL */
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001349 printsiginfo_at(tcp, tcp->u_arg[1]);
1350 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001351 }
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001352 else {
1353 /* syscall exit, and u_arg[1] was NULL */
1354 return 0;
1355 }
1356 print_timespec(tcp, tcp->u_arg[2]);
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001357 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001358 return 0;
1359};
1360
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001361int
Denys Vlasenko1d632462009-04-14 12:51:00 +00001362sys_restart_syscall(struct tcb *tcp)
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001363{
1364 if (entering(tcp))
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001365 tprints("<... resuming interrupted call ...>");
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001366 return 0;
1367}
1368
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001369static int
1370do_signalfd(struct tcb *tcp, int flags_arg)
Roland McGrathf46ccd32007-08-02 01:15:59 +00001371{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001372 /* NB: kernel requires arg[2] == NSIG / 8 */
Roland McGrathf46ccd32007-08-02 01:15:59 +00001373 if (entering(tcp)) {
Dmitry V. Levin31382132011-03-04 05:08:02 +03001374 printfd(tcp, tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001375 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001376 print_sigset_addr_len(tcp, tcp->u_arg[1], tcp->u_arg[2]);
Dmitry V. Levin9d2ee3d2009-10-05 13:45:19 +00001377 tprintf(", %lu", tcp->u_arg[2]);
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001378 if (flags_arg >= 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001379 tprints(", ");
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001380 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
1381 }
Roland McGrathf46ccd32007-08-02 01:15:59 +00001382 }
1383 return 0;
1384}
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001385
1386int
1387sys_signalfd(struct tcb *tcp)
1388{
1389 return do_signalfd(tcp, -1);
1390}
1391
1392int
1393sys_signalfd4(struct tcb *tcp)
1394{
1395 return do_signalfd(tcp, 3);
1396}