blob: e3072f11a6f0737b12e5a2d6e1edf708820ec588 [file] [log] [blame]
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001/*
2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
Wichert Akkerman4dc8a2a1999-12-23 14:20:14 +00005 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
7 * Linux for s390 port by D.J. Barrow
8 * <barrow_dj@mail.yahoo.com,djbarrow@de.ibm.com>
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00009 * All rights reserved.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. The name of the author may not be used to endorse or promote products
20 * derived from this software without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000032 */
33
34#include "defs.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000035#include <sys/user.h>
36#include <fcntl.h>
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000037
Wichert Akkerman36915a11999-07-13 15:45:02 +000038#ifdef HAVE_SYS_REG_H
39# include <sys/reg.h>
Wichert Akkermanfaf72222000-02-19 23:59:03 +000040#elif defined(HAVE_LINUX_PTRACE_H)
Denys Vlasenko84703742012-02-25 02:38:52 +010041# undef PTRACE_SYSCALL
Roland McGrathb0acdfd2004-03-01 21:31:02 +000042# ifdef HAVE_STRUCT_IA64_FPREG
43# define ia64_fpreg XXX_ia64_fpreg
44# endif
45# ifdef HAVE_STRUCT_PT_ALL_USER_REGS
46# define pt_all_user_regs XXX_pt_all_user_regs
47# endif
Ali Polatel0b4060f2013-09-24 20:04:32 +030048# ifdef HAVE_STRUCT_PTRACE_PEEKSIGINFO_ARGS
49# define ptrace_peeksiginfo_args XXX_ptrace_peeksiginfo_args
50# endif
Denys Vlasenko84703742012-02-25 02:38:52 +010051# include <linux/ptrace.h>
Ali Polatel0b4060f2013-09-24 20:04:32 +030052# undef ptrace_peeksiginfo_args
Roland McGrathb0acdfd2004-03-01 21:31:02 +000053# undef ia64_fpreg
54# undef pt_all_user_regs
Wichert Akkerman15dea971999-10-06 13:06:34 +000055#endif
Wichert Akkerman36915a11999-07-13 15:45:02 +000056
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +000057#ifdef IA64
58# include <asm/ptrace_offsets.h>
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020059#endif
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +000060
Denys Vlasenko84703742012-02-25 02:38:52 +010061#if defined(SPARC) || defined(SPARC64) || defined(MIPS)
Roland McGrath576b7842007-11-04 00:00:00 +000062typedef struct {
63 struct pt_regs si_regs;
64 int si_mask;
65} m_siginfo_t;
Roland McGrath30ff45e2003-01-30 20:15:23 +000066#elif defined HAVE_ASM_SIGCONTEXT_H
H.J. Lu35be5812012-04-16 13:00:01 +020067# if !defined(IA64) && !defined(X86_64) && !defined(X32)
Denys Vlasenko84703742012-02-25 02:38:52 +010068# include <asm/sigcontext.h>
Denys Vlasenkoa6d91de2012-03-16 12:02:22 +010069# endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000070#else /* !HAVE_ASM_SIGCONTEXT_H */
Denys Vlasenkob51f3642013-07-16 12:06:25 +020071# if defined M68K && !defined HAVE_STRUCT_SIGCONTEXT
72struct sigcontext {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000073 unsigned long sc_mask;
74 unsigned long sc_usp;
75 unsigned long sc_d0;
76 unsigned long sc_d1;
77 unsigned long sc_a0;
78 unsigned long sc_a1;
79 unsigned short sc_sr;
80 unsigned long sc_pc;
81 unsigned short sc_formatvec;
82};
Denys Vlasenkob51f3642013-07-16 12:06:25 +020083# endif /* M68K */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000084#endif /* !HAVE_ASM_SIGCONTEXT_H */
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020085
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000086#ifndef NSIG
Denys Vlasenko84703742012-02-25 02:38:52 +010087# warning: NSIG is not defined, using 32
88# define NSIG 32
Dmitry V. Levin38593e92014-02-26 16:51:28 +000089#elif NSIG < 32
90# error: NSIG < 32
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000091#endif
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020092
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000093#ifdef HAVE_SIGACTION
94
Roland McGrath2638cb42002-12-15 23:58:41 +000095/* The libc headers do not define this constant since it should only be
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020096 used by the implementation. So we define it here. */
Dmitry V. Levin5c7f6272014-02-08 00:26:06 +000097#ifndef SA_RESTORER
98# ifdef ASM_SA_RESTORER
99# define SA_RESTORER ASM_SA_RESTORER
Roland McGrath2638cb42002-12-15 23:58:41 +0000100# endif
101#endif
102
Roland McGrathd9f816f2004-09-04 03:39:20 +0000103static const struct xlat sigact_flags[] = {
Wichert Akkermanc7926982000-04-10 22:22:31 +0000104#ifdef SA_RESTORER
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000105 XLAT(SA_RESTORER),
Wichert Akkermanc7926982000-04-10 22:22:31 +0000106#endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000107#ifdef SA_STACK
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000108 XLAT(SA_STACK),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000109#endif
110#ifdef SA_RESTART
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000111 XLAT(SA_RESTART),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000112#endif
113#ifdef SA_INTERRUPT
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000114 XLAT(SA_INTERRUPT),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000115#endif
Roland McGrath4fef51d2008-07-18 01:02:41 +0000116#ifdef SA_NODEFER
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000117 XLAT(SA_NODEFER),
Roland McGrath4fef51d2008-07-18 01:02:41 +0000118#endif
119#if defined SA_NOMASK && SA_NODEFER != SA_NOMASK
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000120 XLAT(SA_NOMASK),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000121#endif
Roland McGrath4fef51d2008-07-18 01:02:41 +0000122#ifdef SA_RESETHAND
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000123 XLAT(SA_RESETHAND),
Roland McGrath4fef51d2008-07-18 01:02:41 +0000124#endif
125#if defined SA_ONESHOT && SA_ONESHOT != SA_RESETHAND
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000126 XLAT(SA_ONESHOT),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000127#endif
128#ifdef SA_SIGINFO
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000129 XLAT(SA_SIGINFO),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000130#endif
131#ifdef SA_RESETHAND
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000132 XLAT(SA_RESETHAND),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000133#endif
134#ifdef SA_ONSTACK
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000135 XLAT(SA_ONSTACK),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000136#endif
137#ifdef SA_NODEFER
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000138 XLAT(SA_NODEFER),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000139#endif
140#ifdef SA_NOCLDSTOP
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000141 XLAT(SA_NOCLDSTOP),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000142#endif
143#ifdef SA_NOCLDWAIT
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000144 XLAT(SA_NOCLDWAIT),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000145#endif
146#ifdef _SA_BSDCALL
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000147 XLAT(_SA_BSDCALL),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000148#endif
Chris Metcalfc8c66982009-12-28 10:00:15 -0500149#ifdef SA_NOPTRACE
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000150 XLAT(SA_NOPTRACE),
Chris Metcalfc8c66982009-12-28 10:00:15 -0500151#endif
Dmitry V. Levin59452732014-02-05 02:20:51 +0000152 XLAT_END
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000153};
154
Roland McGrathd9f816f2004-09-04 03:39:20 +0000155static const struct xlat sigprocmaskcmds[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000156 XLAT(SIG_BLOCK),
157 XLAT(SIG_UNBLOCK),
158 XLAT(SIG_SETMASK),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000159#ifdef SIG_SETMASK32
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000160 XLAT(SIG_SETMASK32),
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000161#endif
Dmitry V. Levin59452732014-02-05 02:20:51 +0000162 XLAT_END
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000163};
164
165#endif /* HAVE_SIGACTION */
166
Nate Sammonsce780fc1999-03-29 23:23:13 +0000167/* Anonymous realtime signals. */
168/* Under glibc 2.1, SIGRTMIN et al are functions, but __SIGRTMIN is a
169 constant. This is what we want. Otherwise, just use SIGRTMIN. */
170#ifdef SIGRTMIN
171#ifndef __SIGRTMIN
172#define __SIGRTMIN SIGRTMIN
173#define __SIGRTMAX SIGRTMAX /* likewise */
174#endif
175#endif
176
Denys Vlasenkod9560c12011-08-19 17:41:28 +0200177/* Note on the size of sigset_t:
178 *
179 * In glibc, sigset_t is an array with space for 1024 bits (!),
180 * even though all arches supported by Linux have only 64 signals
181 * except MIPS, which has 128. IOW, it is 128 bytes long.
182 *
183 * In-kernel sigset_t is sized correctly (it is either 64 or 128 bit long).
184 * However, some old syscall return only 32 lower bits (one word).
185 * Example: sys_sigpending vs sys_rt_sigpending.
186 *
187 * Be aware of this fact when you try to
188 * memcpy(&tcp->u_arg[1], &something, sizeof(sigset_t))
189 * - sizeof(sigset_t) is much bigger than you think,
190 * it may overflow tcp->u_arg[] array, and it may try to copy more data
191 * than is really available in <something>.
192 * Similarly,
193 * umoven(tcp, addr, sizeof(sigset_t), &sigset)
194 * may be a bad idea: it'll try to read much more data than needed
195 * to fetch a sigset_t.
196 * Use (NSIG / 8) as a size instead.
197 */
198
Roland McGrathee36ce12004-09-04 03:53:10 +0000199const char *
Denys Vlasenkoeccc48c2011-06-09 01:28:11 +0200200signame(int sig)
Nate Sammonsce780fc1999-03-29 23:23:13 +0000201{
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200202 static char buf[sizeof("SIGRT_%d") + sizeof(int)*3];
203
204 if (sig >= 0 && sig < nsignals)
Nate Sammonsce780fc1999-03-29 23:23:13 +0000205 return signalent[sig];
206#ifdef SIGRTMIN
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200207 if (sig >= __SIGRTMIN && sig <= __SIGRTMAX) {
208 sprintf(buf, "SIGRT_%d", (int)(sig - __SIGRTMIN));
Nate Sammonsce780fc1999-03-29 23:23:13 +0000209 return buf;
210 }
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200211#endif
212 sprintf(buf, "%d", sig);
213 return buf;
Nate Sammonsce780fc1999-03-29 23:23:13 +0000214}
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000215
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000216static unsigned int
217popcount32(const uint32_t *a, unsigned int size)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000218{
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000219 unsigned int count = 0;
Denys Vlasenkod9560c12011-08-19 17:41:28 +0200220
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000221 for (; size; ++a, --size) {
222 uint32_t x = *a;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000223
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000224#ifdef HAVE___BUILTIN_POPCOUNT
225 count += __builtin_popcount(x);
Denys Vlasenkoa8773792013-07-18 20:42:41 +0200226#else
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000227 for (; x; ++count)
228 x &= x - 1;
Nate Sammons4a121431999-04-06 01:19:39 +0000229#endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000230 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100231
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000232 return count;
233}
234
235static const char *
236sprintsigmask_n(const char *prefix, const void *sig_mask, unsigned int bytes)
237{
238 /*
239 * The maximum number of signal names to be printed is NSIG * 2 / 3.
240 * Most of signal names have length 7,
241 * average length of signal names is less than 7.
242 * The length of prefix string does not exceed 16.
243 */
244 static char outstr[128 + 8 * (NSIG * 2 / 3)];
245
246 char *s;
247 const uint32_t *mask;
248 uint32_t inverted_mask[NSIG / 32];
249 unsigned int size;
250 int i;
251 char sep;
252
253 s = stpcpy(outstr, prefix);
254
255 mask = sig_mask;
256 /* length of signal mask in 4-byte words */
257 size = (bytes >= NSIG / 8) ? NSIG / 32 : (bytes + 3) / 4;
258
259 /* check whether 2/3 or more bits are set */
260 if (popcount32(mask, size) >= size * 32 * 2 / 3) {
261 /* show those signals that are NOT in the mask */
262 unsigned int j;
263 for (j = 0; j < size; ++j)
264 inverted_mask[j] = ~mask[j];
265 mask = inverted_mask;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000266 *s++ = '~';
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000267 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100268
269 sep = '[';
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000270 for (i = 0; (i = next_set_bit(mask, i, size * 32)) >= 0; ) {
271 ++i;
272 *s++ = sep;
273 if (i < nsignals) {
274 s = stpcpy(s, signalent[i] + 3);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000275 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000276#ifdef SIGRTMIN
277 else if (i >= __SIGRTMIN && i <= __SIGRTMAX) {
278 s += sprintf(s, "RT_%u", i - __SIGRTMIN);
279 }
280#endif
281 else {
282 s += sprintf(s, "%u", i);
283 }
284 sep = ' ';
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000285 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100286 if (sep == '[')
287 *s++ = sep;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000288 *s++ = ']';
289 *s = '\0';
290 return outstr;
291}
292
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000293#define tprintsigmask_addr(prefix, mask) \
294 tprints(sprintsigmask_n((prefix), (mask), sizeof(mask)))
Denys Vlasenko75f4e1f2013-07-18 20:37:06 +0200295
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000296#define sprintsigmask_val(prefix, mask) \
297 sprintsigmask_n((prefix), &(mask), sizeof(mask))
298
299#define tprintsigmask_val(prefix, mask) \
300 tprints(sprintsigmask_n((prefix), &(mask), sizeof(mask)))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000301
302void
Denys Vlasenkoeccc48c2011-06-09 01:28:11 +0200303printsignal(int nr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000304{
Denys Vlasenko5940e652011-09-01 09:55:05 +0200305 tprints(signame(nr));
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000306}
307
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000308void
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200309print_sigset_addr_len(struct tcb *tcp, long addr, long len)
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000310{
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000311 char mask[NSIG / 8];
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000312
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200313 if (!addr) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200314 tprints("NULL");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200315 return;
316 }
317 /* Here len is usually equals NSIG / 8 or current_wordsize.
318 * But we code this defensively:
319 */
320 if (len < 0) {
321 bad:
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000322 tprintf("%#lx", addr);
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200323 return;
324 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000325 if (len >= NSIG / 8)
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200326 len = NSIG / 8;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000327 else
328 len = (len + 3) & ~3;
329
330 if (umoven(tcp, addr, len, mask) < 0)
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200331 goto bad;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000332 tprints(sprintsigmask_n("", mask, len));
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000333}
334
John Hughes58265892001-10-18 15:13:53 +0000335#ifndef ILL_ILLOPC
336#define ILL_ILLOPC 1 /* illegal opcode */
337#define ILL_ILLOPN 2 /* illegal operand */
338#define ILL_ILLADR 3 /* illegal addressing mode */
339#define ILL_ILLTRP 4 /* illegal trap */
340#define ILL_PRVOPC 5 /* privileged opcode */
341#define ILL_PRVREG 6 /* privileged register */
342#define ILL_COPROC 7 /* coprocessor error */
343#define ILL_BADSTK 8 /* internal stack error */
344#define FPE_INTDIV 1 /* integer divide by zero */
345#define FPE_INTOVF 2 /* integer overflow */
346#define FPE_FLTDIV 3 /* floating point divide by zero */
347#define FPE_FLTOVF 4 /* floating point overflow */
348#define FPE_FLTUND 5 /* floating point underflow */
349#define FPE_FLTRES 6 /* floating point inexact result */
350#define FPE_FLTINV 7 /* floating point invalid operation */
351#define FPE_FLTSUB 8 /* subscript out of range */
352#define SEGV_MAPERR 1 /* address not mapped to object */
353#define SEGV_ACCERR 2 /* invalid permissions for mapped object */
354#define BUS_ADRALN 1 /* invalid address alignment */
355#define BUS_ADRERR 2 /* non-existant physical address */
356#define BUS_OBJERR 3 /* object specific hardware error */
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000357#define SYS_SECCOMP 1 /* seccomp triggered */
John Hughes58265892001-10-18 15:13:53 +0000358#define TRAP_BRKPT 1 /* process breakpoint */
359#define TRAP_TRACE 2 /* process trace trap */
360#define CLD_EXITED 1 /* child has exited */
361#define CLD_KILLED 2 /* child was killed */
362#define CLD_DUMPED 3 /* child terminated abnormally */
363#define CLD_TRAPPED 4 /* traced child has trapped */
364#define CLD_STOPPED 5 /* child has stopped */
365#define CLD_CONTINUED 6 /* stopped child has continued */
366#define POLL_IN 1 /* data input available */
367#define POLL_OUT 2 /* output buffers available */
368#define POLL_MSG 3 /* input message available */
369#define POLL_ERR 4 /* i/o error */
370#define POLL_PRI 5 /* high priority input available */
371#define POLL_HUP 6 /* device disconnected */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000372#define SI_KERNEL 0x80 /* sent by kernel */
John Hughes58265892001-10-18 15:13:53 +0000373#define SI_USER 0 /* sent by kill, sigsend, raise */
374#define SI_QUEUE -1 /* sent by sigqueue */
375#define SI_TIMER -2 /* sent by timer expiration */
376#define SI_MESGQ -3 /* sent by real time mesq state change */
377#define SI_ASYNCIO -4 /* sent by AIO completion */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000378#define SI_SIGIO -5 /* sent by SIGIO */
379#define SI_TKILL -6 /* sent by tkill */
Dmitry V. Levinb9d4d212014-03-11 01:57:02 +0000380#define SI_DETHREAD -7 /* sent by execve killing subsidiary threads */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000381#define SI_ASYNCNL -60 /* sent by asynch name lookup completion */
Denys Vlasenko2c4fb902012-03-15 17:24:49 +0100382#endif
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000383
Denys Vlasenko2c4fb902012-03-15 17:24:49 +0100384#ifndef SI_FROMUSER
385# define SI_FROMUSER(sip) ((sip)->si_code <= 0)
Denys Vlasenko84703742012-02-25 02:38:52 +0100386#endif
John Hughes58265892001-10-18 15:13:53 +0000387
Roland McGrathd9f816f2004-09-04 03:39:20 +0000388static const struct xlat siginfo_codes[] = {
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000389#ifdef SI_KERNEL
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000390 XLAT(SI_KERNEL),
John Hughes58265892001-10-18 15:13:53 +0000391#endif
392#ifdef SI_USER
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000393 XLAT(SI_USER),
John Hughes58265892001-10-18 15:13:53 +0000394#endif
John Hughes58265892001-10-18 15:13:53 +0000395#ifdef SI_QUEUE
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000396 XLAT(SI_QUEUE),
John Hughes58265892001-10-18 15:13:53 +0000397#endif
398#ifdef SI_TIMER
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000399 XLAT(SI_TIMER),
John Hughes58265892001-10-18 15:13:53 +0000400#endif
John Hughes58265892001-10-18 15:13:53 +0000401#ifdef SI_MESGQ
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000402 XLAT(SI_MESGQ),
John Hughes58265892001-10-18 15:13:53 +0000403#endif
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000404#ifdef SI_ASYNCIO
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000405 XLAT(SI_ASYNCIO),
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000406#endif
Roland McGrath941b7402003-05-23 00:29:02 +0000407#ifdef SI_SIGIO
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000408 XLAT(SI_SIGIO),
Roland McGrath941b7402003-05-23 00:29:02 +0000409#endif
410#ifdef SI_TKILL
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000411 XLAT(SI_TKILL),
Roland McGrath941b7402003-05-23 00:29:02 +0000412#endif
Dmitry V. Levinb9d4d212014-03-11 01:57:02 +0000413#ifdef SI_DETHREAD
414 XLAT(SI_DETHREAD),
415#endif
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000416#ifdef SI_ASYNCNL
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000417 XLAT(SI_ASYNCNL),
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000418#endif
419#ifdef SI_NOINFO
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000420 XLAT(SI_NOINFO),
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000421#endif
422#ifdef SI_LWP
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000423 XLAT(SI_LWP),
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000424#endif
Dmitry V. Levin59452732014-02-05 02:20:51 +0000425 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000426};
427
Roland McGrathd9f816f2004-09-04 03:39:20 +0000428static const struct xlat sigill_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000429 XLAT(ILL_ILLOPC),
430 XLAT(ILL_ILLOPN),
431 XLAT(ILL_ILLADR),
432 XLAT(ILL_ILLTRP),
433 XLAT(ILL_PRVOPC),
434 XLAT(ILL_PRVREG),
435 XLAT(ILL_COPROC),
436 XLAT(ILL_BADSTK),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000437 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000438};
439
Roland McGrathd9f816f2004-09-04 03:39:20 +0000440static const struct xlat sigfpe_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000441 XLAT(FPE_INTDIV),
442 XLAT(FPE_INTOVF),
443 XLAT(FPE_FLTDIV),
444 XLAT(FPE_FLTOVF),
445 XLAT(FPE_FLTUND),
446 XLAT(FPE_FLTRES),
447 XLAT(FPE_FLTINV),
448 XLAT(FPE_FLTSUB),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000449 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000450};
451
Roland McGrathd9f816f2004-09-04 03:39:20 +0000452static const struct xlat sigtrap_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000453 XLAT(TRAP_BRKPT),
454 XLAT(TRAP_TRACE),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000455 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000456};
457
Roland McGrathd9f816f2004-09-04 03:39:20 +0000458static const struct xlat sigchld_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000459 XLAT(CLD_EXITED),
460 XLAT(CLD_KILLED),
461 XLAT(CLD_DUMPED),
462 XLAT(CLD_TRAPPED),
463 XLAT(CLD_STOPPED),
464 XLAT(CLD_CONTINUED),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000465 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000466};
467
Roland McGrathd9f816f2004-09-04 03:39:20 +0000468static const struct xlat sigpoll_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000469 XLAT(POLL_IN),
470 XLAT(POLL_OUT),
471 XLAT(POLL_MSG),
472 XLAT(POLL_ERR),
473 XLAT(POLL_PRI),
474 XLAT(POLL_HUP),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000475 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000476};
477
Roland McGrathd9f816f2004-09-04 03:39:20 +0000478static const struct xlat sigprof_codes[] = {
John Hughes58265892001-10-18 15:13:53 +0000479#ifdef PROF_SIG
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000480 XLAT(PROF_SIG),
John Hughes58265892001-10-18 15:13:53 +0000481#endif
Dmitry V. Levin59452732014-02-05 02:20:51 +0000482 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000483};
484
485#ifdef SIGEMT
Roland McGrathd9f816f2004-09-04 03:39:20 +0000486static const struct xlat sigemt_codes[] = {
John Hughes58265892001-10-18 15:13:53 +0000487#ifdef EMT_TAGOVF
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000488 XLAT(EMT_TAGOVF),
John Hughes58265892001-10-18 15:13:53 +0000489#endif
Dmitry V. Levin59452732014-02-05 02:20:51 +0000490 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000491};
492#endif
493
Roland McGrathd9f816f2004-09-04 03:39:20 +0000494static const struct xlat sigsegv_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000495 XLAT(SEGV_MAPERR),
496 XLAT(SEGV_ACCERR),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000497 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000498};
499
Roland McGrathd9f816f2004-09-04 03:39:20 +0000500static const struct xlat sigbus_codes[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +0000501 XLAT(BUS_ADRALN),
502 XLAT(BUS_ADRERR),
503 XLAT(BUS_OBJERR),
Dmitry V. Levin59452732014-02-05 02:20:51 +0000504 XLAT_END
John Hughes58265892001-10-18 15:13:53 +0000505};
506
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000507#ifndef SYS_SECCOMP
508# define SYS_SECCOMP 1
509#endif
510static const struct xlat sigsys_codes[] = {
511 XLAT(SYS_SECCOMP),
512 XLAT_END
513};
514
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000515static void
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000516printsigsource(const siginfo_t *sip)
517{
518 tprintf(", si_pid=%lu, si_uid=%lu",
519 (unsigned long) sip->si_pid,
520 (unsigned long) sip->si_uid);
521}
522
523static void
524printsigval(const siginfo_t *sip, int verbose)
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000525{
526 if (!verbose)
527 tprints(", ...");
528 else
529 tprintf(", si_value={int=%u, ptr=%#lx}",
530 sip->si_int,
531 (unsigned long) sip->si_ptr);
532}
533
John Hughes58265892001-10-18 15:13:53 +0000534void
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000535printsiginfo(siginfo_t *sip, int verbose)
John Hughes58265892001-10-18 15:13:53 +0000536{
Roland McGrathf9c49b22004-10-06 22:11:54 +0000537 const char *code;
John Hughes58265892001-10-18 15:13:53 +0000538
539 if (sip->si_signo == 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200540 tprints("{}");
John Hughes58265892001-10-18 15:13:53 +0000541 return;
542 }
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200543 tprints("{si_signo=");
John Hughes58265892001-10-18 15:13:53 +0000544 printsignal(sip->si_signo);
545 code = xlookup(siginfo_codes, sip->si_code);
546 if (!code) {
547 switch (sip->si_signo) {
548 case SIGTRAP:
549 code = xlookup(sigtrap_codes, sip->si_code);
550 break;
551 case SIGCHLD:
552 code = xlookup(sigchld_codes, sip->si_code);
553 break;
554 case SIGPOLL:
555 code = xlookup(sigpoll_codes, sip->si_code);
556 break;
557 case SIGPROF:
558 code = xlookup(sigprof_codes, sip->si_code);
559 break;
560 case SIGILL:
561 code = xlookup(sigill_codes, sip->si_code);
562 break;
563#ifdef SIGEMT
564 case SIGEMT:
565 code = xlookup(sigemt_codes, sip->si_code);
566 break;
567#endif
568 case SIGFPE:
569 code = xlookup(sigfpe_codes, sip->si_code);
570 break;
571 case SIGSEGV:
572 code = xlookup(sigsegv_codes, sip->si_code);
573 break;
574 case SIGBUS:
575 code = xlookup(sigbus_codes, sip->si_code);
576 break;
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000577 case SIGSYS:
578 code = xlookup(sigsys_codes, sip->si_code);
579 break;
John Hughes58265892001-10-18 15:13:53 +0000580 }
581 }
582 if (code)
583 tprintf(", si_code=%s", code);
584 else
585 tprintf(", si_code=%#x", sip->si_code);
586#ifdef SI_NOINFO
587 if (sip->si_code != SI_NOINFO)
588#endif
589 {
590 if (sip->si_errno) {
591 if (sip->si_errno < 0 || sip->si_errno >= nerrnos)
592 tprintf(", si_errno=%d", sip->si_errno);
593 else
594 tprintf(", si_errno=%s",
595 errnoent[sip->si_errno]);
596 }
597#ifdef SI_FROMUSER
598 if (SI_FROMUSER(sip)) {
John Hughes58265892001-10-18 15:13:53 +0000599 switch (sip->si_code) {
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000600#ifdef SI_USER
601 case SI_USER:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000602 printsigsource(sip);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000603 break;
604#endif
605#ifdef SI_TKILL
606 case SI_TKILL:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000607 printsigsource(sip);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000608 break;
609#endif
John Hughes58265892001-10-18 15:13:53 +0000610#ifdef SI_TIMER
611 case SI_TIMER:
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000612 tprintf(", si_timerid=%#x, si_overrun=%d",
613 sip->si_timerid, sip->si_overrun);
614 printsigval(sip, verbose);
John Hughes58265892001-10-18 15:13:53 +0000615 break;
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000616#endif
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000617 default:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000618 printsigsource(sip);
619 if (sip->si_ptr)
620 printsigval(sip, verbose);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000621 break;
John Hughes58265892001-10-18 15:13:53 +0000622 }
John Hughes58265892001-10-18 15:13:53 +0000623 }
624 else
625#endif /* SI_FROMUSER */
626 {
627 switch (sip->si_signo) {
628 case SIGCHLD:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000629 printsigsource(sip);
630 tprints(", si_status=");
John Hughes58265892001-10-18 15:13:53 +0000631 if (sip->si_code == CLD_EXITED)
632 tprintf("%d", sip->si_status);
633 else
634 printsignal(sip->si_status);
John Hughes58265892001-10-18 15:13:53 +0000635 if (!verbose)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200636 tprints(", ...");
John Hughes58265892001-10-18 15:13:53 +0000637 else
H.J. Lu2bb45812012-04-15 11:17:13 -0700638 tprintf(", si_utime=%llu, si_stime=%llu",
639 (unsigned long long) sip->si_utime,
640 (unsigned long long) sip->si_stime);
John Hughes58265892001-10-18 15:13:53 +0000641 break;
642 case SIGILL: case SIGFPE:
643 case SIGSEGV: case SIGBUS:
644 tprintf(", si_addr=%#lx",
645 (unsigned long) sip->si_addr);
646 break;
647 case SIGPOLL:
648 switch (sip->si_code) {
649 case POLL_IN: case POLL_OUT: case POLL_MSG:
650 tprintf(", si_band=%ld",
651 (long) sip->si_band);
652 break;
653 }
654 break;
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000655#ifdef HAVE_SIGINFO_T_SI_SYSCALL
656 case SIGSYS:
657 tprintf(", si_call_addr=%#lx, si_syscall=%d, si_arch=%u",
658 (unsigned long) sip->si_call_addr,
659 sip->si_syscall, sip->si_arch);
660 break;
661#endif
John Hughes58265892001-10-18 15:13:53 +0000662 default:
Dmitry V. Levinb41e1c92011-03-10 23:14:47 +0000663 if (sip->si_pid || sip->si_uid)
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000664 printsigsource(sip);
665 if (sip->si_ptr)
666 printsigval(sip, verbose);
John Hughes58265892001-10-18 15:13:53 +0000667 }
668 }
669 }
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200670 tprints("}");
John Hughes58265892001-10-18 15:13:53 +0000671}
672
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +0100673void
674printsiginfo_at(struct tcb *tcp, long addr)
675{
676 siginfo_t si;
677 if (!addr) {
678 tprints("NULL");
679 return;
680 }
681 if (syserror(tcp)) {
682 tprintf("%#lx", addr);
683 return;
684 }
685 if (umove(tcp, addr, &si) < 0) {
686 tprints("{???}");
687 return;
688 }
689 printsiginfo(&si, verbose(tcp));
690}
691
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000692int
Denys Vlasenko12014262011-05-30 14:00:14 +0200693sys_sigsetmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000694{
695 if (entering(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000696 tprintsigmask_val("", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000697 }
698 else if (!syserror(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000699 tcp->auxstr = sprintsigmask_val("old mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000700 return RVAL_HEX | RVAL_STR;
701 }
702 return 0;
703}
704
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000705#ifdef HAVE_SIGACTION
706
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000707struct old_sigaction {
Denys Vlasenko86d94842013-02-08 12:59:13 +0100708 /* sa_handler may be a libc #define, need to use other name: */
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800709#ifdef MIPS
710 unsigned int sa_flags;
711 void (*__sa_handler)(int);
712 /* Kernel treats sa_mask as an array of longs. */
713 unsigned long sa_mask[NSIG / sizeof(long) ? NSIG / sizeof(long) : 1];
714#else
Denys Vlasenko86d94842013-02-08 12:59:13 +0100715 void (*__sa_handler)(int);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000716 unsigned long sa_mask;
717 unsigned long sa_flags;
718 void (*sa_restorer)(void);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800719#endif /* !MIPS */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000720};
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000721
Elliott Hughes458b3f22014-02-28 23:21:35 +0000722struct old_sigaction32 {
723 /* sa_handler may be a libc #define, need to use other name: */
724 uint32_t __sa_handler;
725 uint32_t sa_mask;
726 uint32_t sa_flags;
727 uint32_t sa_restorer;
728};
729
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000730static void
731decode_old_sigaction(struct tcb *tcp, long addr)
732{
733 struct old_sigaction sa;
Elliott Hughes458b3f22014-02-28 23:21:35 +0000734 int r;
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000735
736 if (!addr) {
737 tprints("NULL");
738 return;
739 }
740 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp))) {
741 tprintf("%#lx", addr);
742 return;
743 }
Elliott Hughes458b3f22014-02-28 23:21:35 +0000744
745#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
746 if (current_wordsize != sizeof(sa.__sa_handler) && current_wordsize == 4) {
747 struct old_sigaction32 sa32;
748 r = umove(tcp, addr, &sa32);
749 if (r >= 0) {
750 memset(&sa, 0, sizeof(sa));
751 sa.__sa_handler = (void*)(uintptr_t)sa32.__sa_handler;
752 sa.sa_flags = sa32.sa_flags;
753 sa.sa_restorer = (void*)(uintptr_t)sa32.sa_restorer;
754 sa.sa_mask = sa32.sa_mask;
755 }
756 } else
757#endif
758 {
759 r = umove(tcp, addr, &sa);
760 }
761 if (r < 0) {
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000762 tprints("{...}");
763 return;
764 }
765
766 /* Architectures using function pointers, like
767 * hppa, may need to manipulate the function pointer
768 * to compute the result of a comparison. However,
769 * the __sa_handler function pointer exists only in
770 * the address space of the traced process, and can't
771 * be manipulated by strace. In order to prevent the
772 * compiler from generating code to manipulate
773 * __sa_handler we cast the function pointers to long. */
774 if ((long)sa.__sa_handler == (long)SIG_ERR)
775 tprints("{SIG_ERR, ");
776 else if ((long)sa.__sa_handler == (long)SIG_DFL)
777 tprints("{SIG_DFL, ");
778 else if ((long)sa.__sa_handler == (long)SIG_IGN)
779 tprints("{SIG_IGN, ");
780 else
781 tprintf("{%#lx, ", (long) sa.__sa_handler);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800782#ifdef MIPS
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000783 tprintsigmask_addr("", sa.sa_mask);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800784#else
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000785 tprintsigmask_val("", sa.sa_mask);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800786#endif
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000787 tprints(", ");
788 printflags(sigact_flags, sa.sa_flags, "SA_???");
789#ifdef SA_RESTORER
790 if (sa.sa_flags & SA_RESTORER)
791 tprintf(", %p", sa.sa_restorer);
792#endif
793 tprints("}");
794}
795
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000796int
Denys Vlasenko12014262011-05-30 14:00:14 +0200797sys_sigaction(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000798{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000799 if (entering(tcp)) {
800 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200801 tprints(", ");
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000802 decode_old_sigaction(tcp, tcp->u_arg[1]);
803 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000804 } else
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000805 decode_old_sigaction(tcp, tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000806 return 0;
807}
808
809int
Denys Vlasenko12014262011-05-30 14:00:14 +0200810sys_signal(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000811{
812 if (entering(tcp)) {
813 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200814 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000815 switch (tcp->u_arg[1]) {
Jan Kratochvil1f942712008-08-06 21:38:52 +0000816 case (long) SIG_ERR:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200817 tprints("SIG_ERR");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000818 break;
Jan Kratochvil1f942712008-08-06 21:38:52 +0000819 case (long) SIG_DFL:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200820 tprints("SIG_DFL");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000821 break;
Jan Kratochvil1f942712008-08-06 21:38:52 +0000822 case (long) SIG_IGN:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200823 tprints("SIG_IGN");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000824 break;
825 default:
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000826 tprintf("%#lx", tcp->u_arg[1]);
827 }
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000828 return 0;
829 }
Dmitry V. Levin21a75342008-09-03 01:22:18 +0000830 else if (!syserror(tcp)) {
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000831 switch (tcp->u_rval) {
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100832 case (long) SIG_ERR:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000833 tcp->auxstr = "SIG_ERR"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100834 case (long) SIG_DFL:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000835 tcp->auxstr = "SIG_DFL"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100836 case (long) SIG_IGN:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000837 tcp->auxstr = "SIG_IGN"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100838 default:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000839 tcp->auxstr = NULL;
840 }
841 return RVAL_HEX | RVAL_STR;
842 }
Dmitry V. Levin21a75342008-09-03 01:22:18 +0000843 return 0;
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000844}
845
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000846#endif /* HAVE_SIGACTION */
847
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000848int
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000849sys_sigreturn(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000850{
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000851#if defined(ARM)
Roland McGrath0f87c492003-06-03 23:29:04 +0000852 if (entering(tcp)) {
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200853 struct arm_sigcontext {
854 unsigned long trap_no;
855 unsigned long error_code;
856 unsigned long oldmask;
857 unsigned long arm_r0;
858 unsigned long arm_r1;
859 unsigned long arm_r2;
860 unsigned long arm_r3;
861 unsigned long arm_r4;
862 unsigned long arm_r5;
863 unsigned long arm_r6;
864 unsigned long arm_r7;
865 unsigned long arm_r8;
866 unsigned long arm_r9;
867 unsigned long arm_r10;
868 unsigned long arm_fp;
869 unsigned long arm_ip;
870 unsigned long arm_sp;
871 unsigned long arm_lr;
872 unsigned long arm_pc;
873 unsigned long arm_cpsr;
874 unsigned long fault_address;
875 };
876 struct arm_ucontext {
877 unsigned long uc_flags;
878 unsigned long uc_link; /* struct ucontext* */
879 /* The next three members comprise stack_t struct: */
880 unsigned long ss_sp; /* void* */
881 unsigned long ss_flags; /* int */
882 unsigned long ss_size; /* size_t */
883 struct arm_sigcontext sc;
884 /* These two members are sigset_t: */
885 unsigned long uc_sigmask[2];
886 /* more fields follow, which we aren't interested in */
887 };
888 struct arm_ucontext uc;
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200889 if (umove(tcp, arm_regs.ARM_sp, &uc) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000890 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000891 /*
892 * Kernel fills out uc.sc.oldmask too when it sets up signal stack,
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200893 * but for sigmask restore, sigreturn syscall uses uc.uc_sigmask instead.
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200894 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000895 tprintsigmask_addr(") (mask ", uc.uc_sigmask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000896 }
Roland McGrath0f87c492003-06-03 23:29:04 +0000897#elif defined(S390) || defined(S390X)
Roland McGrath0f87c492003-06-03 23:29:04 +0000898 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200899 long usp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000900 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200901 if (upeek(tcp->pid, PT_GPR15, &usp) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000902 return 0;
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100903 if (umove(tcp, usp + __SIGNAL_FRAMESIZE, &sc) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000904 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000905 tprintsigmask_addr(") (mask ", sc.oldmask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000906 }
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200907#elif defined(I386) || defined(X86_64)
908# if defined(X86_64)
909 if (current_personality == 0) /* 64-bit */
910 return 0;
911# endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000912 if (entering(tcp)) {
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200913 struct i386_sigcontext_struct {
914 uint16_t gs, __gsh;
915 uint16_t fs, __fsh;
916 uint16_t es, __esh;
917 uint16_t ds, __dsh;
918 uint32_t edi;
919 uint32_t esi;
920 uint32_t ebp;
921 uint32_t esp;
922 uint32_t ebx;
923 uint32_t edx;
924 uint32_t ecx;
925 uint32_t eax;
926 uint32_t trapno;
927 uint32_t err;
928 uint32_t eip;
929 uint16_t cs, __csh;
930 uint32_t eflags;
931 uint32_t esp_at_signal;
932 uint16_t ss, __ssh;
933 uint32_t i387;
934 uint32_t oldmask;
935 uint32_t cr2;
936 };
937 struct i386_fpstate {
938 uint32_t cw;
939 uint32_t sw;
940 uint32_t tag;
941 uint32_t ipoff;
942 uint32_t cssel;
943 uint32_t dataoff;
944 uint32_t datasel;
945 uint8_t st[8][10]; /* 8*10 bytes: FP regs */
946 uint16_t status;
947 uint16_t magic;
948 uint32_t fxsr_env[6];
949 uint32_t mxcsr;
950 uint32_t reserved;
951 uint8_t stx[8][16]; /* 8*16 bytes: FP regs, each padded to 16 bytes */
952 uint8_t xmm[8][16]; /* 8 XMM regs */
953 uint32_t padding1[44];
954 uint32_t padding2[12]; /* union with struct _fpx_sw_bytes */
955 };
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200956 struct {
957 struct i386_sigcontext_struct sc;
958 struct i386_fpstate fp;
959 uint32_t extramask[1];
960 } signal_stack;
961 /* On i386, sc is followed on stack by struct fpstate
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100962 * and after it an additional u32 extramask[1] which holds
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200963 * upper half of the mask.
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100964 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000965 uint32_t sigmask[2];
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200966 if (umove(tcp, *i386_esp_ptr, &signal_stack) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000967 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000968 sigmask[0] = signal_stack.sc.oldmask;
969 sigmask[1] = signal_stack.extramask[0];
970 tprintsigmask_addr(") (mask ", sigmask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000971 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000972#elif defined(IA64)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000973 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200974 struct sigcontext sc;
975 long sp;
Wichert Akkerman5ae21ea2000-05-01 01:53:59 +0000976 /* offset of sigcontext in the kernel's sigframe structure: */
977# define SIGFRAME_SC_OFFSET 0x90
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200978 if (upeek(tcp->pid, PT_R12, &sp) < 0)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000979 return 0;
Wichert Akkerman5ae21ea2000-05-01 01:53:59 +0000980 if (umove(tcp, sp + 16 + SIGFRAME_SC_OFFSET, &sc) < 0)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000981 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000982 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000983 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000984#elif defined(POWERPC)
Roland McGrath0f87c492003-06-03 23:29:04 +0000985 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200986 long esp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000987 struct sigcontext sc;
Anton Blanchardce6e33b2013-06-26 15:53:33 +0200988
989 esp = ppc_regs.gpr[1];
990
Andreas Schwabedb39342010-02-23 00:18:51 +0100991 /* Skip dummy stack frame. */
Andreas Schwabd69fa492010-07-12 21:39:57 +0200992#ifdef POWERPC64
993 if (current_personality == 0)
994 esp += 128;
995 else
996 esp += 64;
Andreas Schwabedb39342010-02-23 00:18:51 +0100997#else
998 esp += 64;
999#endif
Roland McGrath0f87c492003-06-03 23:29:04 +00001000 if (umove(tcp, esp, &sc) < 0)
1001 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001002 tprintsigmask_val(") (mask ", sc.oldmask);
Roland McGrath0f87c492003-06-03 23:29:04 +00001003 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001004#elif defined(M68K)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001005 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001006 long usp;
1007 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +02001008 if (upeek(tcp->pid, 4*PT_USP, &usp) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001009 return 0;
Roland McGrath0f87c492003-06-03 23:29:04 +00001010 if (umove(tcp, usp, &sc) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001011 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001012 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001013 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001014#elif defined(ALPHA)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001015 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001016 long fp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +00001017 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +02001018 if (upeek(tcp->pid, REG_FP, &fp) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001019 return 0;
Roland McGrath0f87c492003-06-03 23:29:04 +00001020 if (umove(tcp, fp, &sc) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001021 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001022 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001023 }
Denys Vlasenkoc36c3522012-02-25 02:47:15 +01001024#elif defined(SPARC) || defined(SPARC64)
Denys Vlasenkob63256e2011-06-07 12:13:24 +02001025 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001026 long i1;
Denys Vlasenko56a52982011-06-09 01:36:29 +02001027 m_siginfo_t si;
Denys Vlasenko48e4c1b2013-02-16 08:23:40 +01001028 i1 = sparc_regs.u_regs[U_REG_O1];
Denys Vlasenkob63256e2011-06-07 12:13:24 +02001029 if (umove(tcp, i1, &si) < 0) {
Denys Vlasenko905e8e02013-02-26 12:30:09 +01001030 perror_msg("sigreturn: umove");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001031 return 0;
1032 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001033 tprintsigmask_val(") (mask ", si.si_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001034 }
Denys Vlasenkoc36c3522012-02-25 02:47:15 +01001035#elif defined(LINUX_MIPSN32) || defined(LINUX_MIPSN64)
Roland McGrath542c2c62008-05-20 01:11:56 +00001036 /* This decodes rt_sigreturn. The 64-bit ABIs do not have
1037 sigreturn. */
Denys Vlasenkob63256e2011-06-07 12:13:24 +02001038 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001039 long sp;
1040 struct ucontext uc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +02001041 if (upeek(tcp->pid, REG_SP, &sp) < 0)
Denys Vlasenko5ae2b7c2009-02-27 20:32:52 +00001042 return 0;
Roland McGrath542c2c62008-05-20 01:11:56 +00001043 /* There are six words followed by a 128-byte siginfo. */
1044 sp = sp + 6 * 4 + 128;
1045 if (umove(tcp, sp, &uc) < 0)
Denys Vlasenko5ae2b7c2009-02-27 20:32:52 +00001046 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001047 tprintsigmask_val(") (mask ", uc.uc_sigmask);
Roland McGrath542c2c62008-05-20 01:11:56 +00001048 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001049#elif defined(MIPS)
Denys Vlasenkob63256e2011-06-07 12:13:24 +02001050 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001051 long sp;
1052 struct pt_regs regs;
1053 m_siginfo_t si;
Denys Vlasenko56a52982011-06-09 01:36:29 +02001054 if (ptrace(PTRACE_GETREGS, tcp->pid, (char *)&regs, 0) < 0) {
Denys Vlasenko905e8e02013-02-26 12:30:09 +01001055 perror_msg("sigreturn: PTRACE_GETREGS");
Denys Vlasenko56a52982011-06-09 01:36:29 +02001056 return 0;
1057 }
Roland McGrath576b7842007-11-04 00:00:00 +00001058 sp = regs.regs[29];
1059 if (umove(tcp, sp, &si) < 0)
Denys Vlasenkofacd45b2011-06-09 01:22:10 +02001060 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001061 tprintsigmask_val(") (mask ", si.si_mask);
Wichert Akkermanf90da011999-10-31 21:15:38 +00001062 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001063#elif defined(CRISV10) || defined(CRISV32)
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001064 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001065 struct sigcontext sc;
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001066 long regs[PT_MAX+1];
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001067 if (ptrace(PTRACE_GETREGS, tcp->pid, NULL, (long)regs) < 0) {
Denys Vlasenko905e8e02013-02-26 12:30:09 +01001068 perror_msg("sigreturn: PTRACE_GETREGS");
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001069 return 0;
1070 }
1071 if (umove(tcp, regs[PT_USP], &sc) < 0)
1072 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001073 tprintsigmask_val(") (mask ", sc.oldmask);
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001074 }
Chris Metcalfc8c66982009-12-28 10:00:15 -05001075#elif defined(TILE)
Chris Metcalfc8c66982009-12-28 10:00:15 -05001076 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001077 struct ucontext uc;
Denys Vlasenko56a52982011-06-09 01:36:29 +02001078
1079 /* offset of ucontext in the kernel's sigframe structure */
Chris Metcalf5c0796f2013-05-21 20:25:22 -04001080# define SIGFRAME_UC_OFFSET C_ABI_SAVE_AREA_SIZE + sizeof(siginfo_t)
Chris Metcalf0b99a8a2013-02-05 17:48:33 +01001081 if (umove(tcp, tile_regs.sp + SIGFRAME_UC_OFFSET, &uc) < 0)
Chris Metcalfc8c66982009-12-28 10:00:15 -05001082 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001083 tprintsigmask_val(") (mask ", uc.uc_sigmask);
Chris Metcalfc8c66982009-12-28 10:00:15 -05001084 }
Edgar E. Iglesias939caba2010-07-06 14:21:07 +02001085#elif defined(MICROBLAZE)
Edgar E. Iglesias939caba2010-07-06 14:21:07 +02001086 /* TODO: Verify that this is correct... */
1087 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +02001088 struct sigcontext sc;
Edgar E. Iglesias939caba2010-07-06 14:21:07 +02001089 long sp;
Edgar E. Iglesias939caba2010-07-06 14:21:07 +02001090 /* Read r1, the stack pointer. */
Denys Vlasenko752e5a02013-06-28 14:35:47 +02001091 if (upeek(tcp->pid, 1 * 4, &sp) < 0)
Edgar E. Iglesias939caba2010-07-06 14:21:07 +02001092 return 0;
1093 if (umove(tcp, sp, &sc) < 0)
1094 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001095 tprintsigmask_val(") (mask ", sc.oldmask);
Edgar E. Iglesias939caba2010-07-06 14:21:07 +02001096 }
Chris Zankel8f636ed2013-03-25 10:22:07 -07001097#elif defined(XTENSA)
1098 /* Xtensa only has rt_sys_sigreturn */
Vineet Gupta7daacbb2013-08-16 12:47:06 +05301099#elif defined(ARC)
1100 /* ARC syscall ABI only supports rt_sys_sigreturn */
Wichert Akkermanc1652e22001-03-27 12:17:16 +00001101#else
Dmitry V. Levinf112d072012-05-15 00:13:59 +00001102# warning No sys_sigreturn() for this architecture
1103# warning (no problem, just a reminder :-)
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +00001104#endif
Dmitry V. Levinf112d072012-05-15 00:13:59 +00001105 return 0;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001106}
1107
1108int
Denys Vlasenko12014262011-05-30 14:00:14 +02001109sys_siggetmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001110{
1111 if (exiting(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001112 tcp->auxstr = sprintsigmask_val("mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001113 }
1114 return RVAL_HEX | RVAL_STR;
1115}
1116
1117int
Dmitry V. Levine5e60852009-12-31 22:50:49 +00001118sys_sigsuspend(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001119{
1120 if (entering(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001121 tprintsigmask_val("", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001122 }
1123 return 0;
1124}
1125
Denys Vlasenko84703742012-02-25 02:38:52 +01001126#if !defined SS_ONSTACK
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001127#define SS_ONSTACK 1
1128#define SS_DISABLE 2
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001129#endif
1130
Roland McGrathd9f816f2004-09-04 03:39:20 +00001131static const struct xlat sigaltstack_flags[] = {
Dmitry V. Levinbce0cc62014-02-05 01:33:50 +00001132 XLAT(SS_ONSTACK),
1133 XLAT(SS_DISABLE),
Dmitry V. Levin59452732014-02-05 02:20:51 +00001134 XLAT_END
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001135};
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001136
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001137static void
Denys Vlasenko12014262011-05-30 14:00:14 +02001138print_stack_t(struct tcb *tcp, unsigned long addr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001139{
1140 stack_t ss;
Dmitry V. Levind153bfc2014-02-26 22:29:27 +00001141 int r;
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001142
1143 if (!addr) {
1144 tprints("NULL");
Dmitry V. Levind153bfc2014-02-26 22:29:27 +00001145 return;
1146 }
1147
1148#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1149 if (current_wordsize != sizeof(ss.ss_sp) && current_wordsize == 4) {
1150 struct {
1151 uint32_t ss_sp;
1152 int32_t ss_flags;
1153 uint32_t ss_size;
1154 } ss32;
1155 r = umove(tcp, addr, &ss32);
1156 if (r >= 0) {
1157 memset(&ss, 0, sizeof(ss));
1158 ss.ss_sp = (void*)(unsigned long) ss32.ss_sp;
1159 ss.ss_flags = ss32.ss_flags;
1160 ss.ss_size = (unsigned long) ss32.ss_size;
1161 }
1162 } else
1163#endif
1164 {
1165 r = umove(tcp, addr, &ss);
1166 }
1167 if (r < 0) {
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001168 tprintf("%#lx", addr);
1169 } else {
1170 tprintf("{ss_sp=%#lx, ss_flags=", (unsigned long) ss.ss_sp);
1171 printflags(sigaltstack_flags, ss.ss_flags, "SS_???");
1172 tprintf(", ss_size=%lu}", (unsigned long) ss.ss_size);
1173 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001174}
1175
1176int
Denys Vlasenko12014262011-05-30 14:00:14 +02001177sys_sigaltstack(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001178{
1179 if (entering(tcp)) {
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001180 print_stack_t(tcp, tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001181 }
1182 else {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001183 tprints(", ");
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001184 print_stack_t(tcp, tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001185 }
1186 return 0;
1187}
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001188
1189#ifdef HAVE_SIGACTION
1190
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001191/* "Old" sigprocmask, which operates with word-sized signal masks */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001192int
Denys Vlasenko12014262011-05-30 14:00:14 +02001193sys_sigprocmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001194{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001195# ifdef ALPHA
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001196 if (entering(tcp)) {
Mike Frysingerdde045c2012-03-15 00:45:33 -04001197 /*
1198 * Alpha/OSF is different: it doesn't pass in two pointers,
1199 * but rather passes in the new bitmask as an argument and
1200 * then returns the old bitmask. This "works" because we
1201 * only have 64 signals to worry about. If you want more,
1202 * use of the rt_sigprocmask syscall is required.
1203 * Alpha:
1204 * old = osf_sigprocmask(how, new);
1205 * Everyone else:
1206 * ret = sigprocmask(how, &new, &old, ...);
1207 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001208 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001209 tprintsigmask_val(", ", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001210 }
1211 else if (!syserror(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001212 tcp->auxstr = sprintsigmask_val("old mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001213 return RVAL_HEX | RVAL_STR;
1214 }
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001215# else /* !ALPHA */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001216 if (entering(tcp)) {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001217 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001218 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001219 print_sigset_addr_len(tcp, tcp->u_arg[1], current_wordsize);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001220 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001221 }
1222 else {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001223 if (syserror(tcp))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001224 tprintf("%#lx", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001225 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001226 print_sigset_addr_len(tcp, tcp->u_arg[2], current_wordsize);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001227 }
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001228# endif /* !ALPHA */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001229 return 0;
1230}
1231
1232#endif /* HAVE_SIGACTION */
1233
1234int
Denys Vlasenko12014262011-05-30 14:00:14 +02001235sys_kill(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001236{
1237 if (entering(tcp)) {
Denys Vlasenkoe015d2d2013-02-15 14:58:52 +01001238 tprintf("%ld, %s",
1239 widen_to_long(tcp->u_arg[0]),
1240 signame(tcp->u_arg[1])
1241 );
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001242 }
1243 return 0;
1244}
1245
Roland McGrath8ffc3522003-07-09 09:47:49 +00001246int
Denys Vlasenko12014262011-05-30 14:00:14 +02001247sys_tgkill(struct tcb *tcp)
Roland McGrath8ffc3522003-07-09 09:47:49 +00001248{
1249 if (entering(tcp)) {
1250 tprintf("%ld, %ld, %s",
Denys Vlasenkoe015d2d2013-02-15 14:58:52 +01001251 widen_to_long(tcp->u_arg[0]),
1252 widen_to_long(tcp->u_arg[1]),
1253 signame(tcp->u_arg[2])
1254 );
Roland McGrath8ffc3522003-07-09 09:47:49 +00001255 }
1256 return 0;
1257}
Roland McGrath8ffc3522003-07-09 09:47:49 +00001258
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001259int
Denys Vlasenko12014262011-05-30 14:00:14 +02001260sys_sigpending(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001261{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001262 if (exiting(tcp)) {
1263 if (syserror(tcp))
1264 tprintf("%#lx", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001265 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001266 print_sigset_addr_len(tcp, tcp->u_arg[0], current_wordsize);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001267 }
1268 return 0;
1269}
1270
Denys Vlasenko12014262011-05-30 14:00:14 +02001271int
1272sys_rt_sigprocmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001273{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001274 /* Note: arg[3] is the length of the sigset. Kernel requires NSIG / 8 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001275 if (entering(tcp)) {
1276 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001277 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001278 print_sigset_addr_len(tcp, tcp->u_arg[1], tcp->u_arg[3]);
1279 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001280 }
1281 else {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001282 if (syserror(tcp))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001283 tprintf("%#lx", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001284 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001285 print_sigset_addr_len(tcp, tcp->u_arg[2], tcp->u_arg[3]);
Nate Sammonsdab325a1999-03-29 23:33:35 +00001286 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001287 }
1288 return 0;
1289}
1290
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001291/* Structure describing the action to be taken when a signal arrives. */
1292struct new_sigaction
1293{
Denys Vlasenko86d94842013-02-08 12:59:13 +01001294 /* sa_handler may be a libc #define, need to use other name: */
Chris Dearman2b4bb1c2013-12-09 19:58:42 -08001295#ifdef MIPS
1296 unsigned int sa_flags;
1297 void (*__sa_handler)(int);
1298#else
Denys Vlasenko86d94842013-02-08 12:59:13 +01001299 void (*__sa_handler)(int);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001300 unsigned long sa_flags;
Denys Vlasenko86d94842013-02-08 12:59:13 +01001301 void (*sa_restorer)(void);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -08001302#endif /* !MIPS */
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001303 /* Kernel treats sa_mask as an array of longs. */
1304 unsigned long sa_mask[NSIG / sizeof(long) ? NSIG / sizeof(long) : 1];
1305};
1306/* Same for i386-on-x86_64 and similar cases */
1307struct new_sigaction32
1308{
1309 uint32_t __sa_handler;
1310 uint32_t sa_flags;
1311 uint32_t sa_restorer;
1312 uint32_t sa_mask[2 * (NSIG / sizeof(long) ? NSIG / sizeof(long) : 1)];
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001313};
1314
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001315static void
1316decode_new_sigaction(struct tcb *tcp, long addr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001317{
1318 struct new_sigaction sa;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001319 int r;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001320
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001321 if (!addr) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001322 tprints("NULL");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001323 return;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001324 }
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001325 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp))) {
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001326 tprintf("%#lx", addr);
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001327 return;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001328 }
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001329#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
Denys Vlasenko9fd4f962012-03-19 09:36:42 +01001330 if (current_wordsize != sizeof(sa.sa_flags) && current_wordsize == 4) {
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001331 struct new_sigaction32 sa32;
1332 r = umove(tcp, addr, &sa32);
1333 if (r >= 0) {
1334 memset(&sa, 0, sizeof(sa));
1335 sa.__sa_handler = (void*)(unsigned long)sa32.__sa_handler;
1336 sa.sa_flags = sa32.sa_flags;
1337 sa.sa_restorer = (void*)(unsigned long)sa32.sa_restorer;
1338 /* Kernel treats sa_mask as an array of longs.
1339 * For 32-bit process, "long" is uint32_t, thus, for example,
1340 * 32th bit in sa_mask will end up as bit 0 in sa_mask[1].
1341 * But for (64-bit) kernel, 32th bit in sa_mask is
1342 * 32th bit in 0th (64-bit) long!
1343 * For little-endian, it's the same.
1344 * For big-endian, we swap 32-bit words.
1345 */
1346 sa.sa_mask[0] = sa32.sa_mask[0] + ((long)(sa32.sa_mask[1]) << 32);
1347 }
1348 } else
1349#endif
1350 {
1351 r = umove(tcp, addr, &sa);
1352 }
1353 if (r < 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001354 tprints("{...}");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001355 return;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001356 }
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001357 /* Architectures using function pointers, like
1358 * hppa, may need to manipulate the function pointer
1359 * to compute the result of a comparison. However,
Denys Vlasenko86d94842013-02-08 12:59:13 +01001360 * the __sa_handler function pointer exists only in
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001361 * the address space of the traced process, and can't
1362 * be manipulated by strace. In order to prevent the
1363 * compiler from generating code to manipulate
Denys Vlasenko86d94842013-02-08 12:59:13 +01001364 * __sa_handler we cast the function pointers to long. */
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001365 if ((long)sa.__sa_handler == (long)SIG_ERR)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001366 tprints("{SIG_ERR, ");
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001367 else if ((long)sa.__sa_handler == (long)SIG_DFL)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001368 tprints("{SIG_DFL, ");
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001369 else if ((long)sa.__sa_handler == (long)SIG_IGN)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001370 tprints("{SIG_IGN, ");
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001371 else
1372 tprintf("{%#lx, ", (long) sa.__sa_handler);
Denys Vlasenko80b73a22013-07-18 10:10:46 +02001373 /*
1374 * Sigset size is in tcp->u_arg[4] (SPARC)
1375 * or in tcp->u_arg[3] (all other),
1376 * but kernel won't handle sys_rt_sigaction
1377 * with wrong sigset size (just returns EINVAL instead).
1378 * We just fetch the right size, which is NSIG / 8.
1379 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001380 tprintsigmask_val("", sa.sa_mask);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001381 tprints(", ");
Denys Vlasenko80b73a22013-07-18 10:10:46 +02001382
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001383 printflags(sigact_flags, sa.sa_flags, "SA_???");
1384#ifdef SA_RESTORER
1385 if (sa.sa_flags & SA_RESTORER)
1386 tprintf(", %p", sa.sa_restorer);
1387#endif
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001388 tprints("}");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001389}
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001390
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001391int
1392sys_rt_sigaction(struct tcb *tcp)
1393{
1394 if (entering(tcp)) {
1395 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001396 tprints(", ");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001397 decode_new_sigaction(tcp, tcp->u_arg[1]);
1398 tprints(", ");
1399 } else {
1400 decode_new_sigaction(tcp, tcp->u_arg[2]);
Denys Vlasenko9472a272013-02-12 11:43:46 +01001401#if defined(SPARC) || defined(SPARC64)
Wichert Akkermandacfb6e1999-06-03 14:21:07 +00001402 tprintf(", %#lx, %lu", tcp->u_arg[3], tcp->u_arg[4]);
1403#elif defined(ALPHA)
1404 tprintf(", %lu, %#lx", tcp->u_arg[3], tcp->u_arg[4]);
1405#else
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001406 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkermandacfb6e1999-06-03 14:21:07 +00001407#endif
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001408 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001409 return 0;
1410}
1411
Denys Vlasenko1d632462009-04-14 12:51:00 +00001412int
1413sys_rt_sigpending(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001414{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001415 if (exiting(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001416 /*
1417 * One of the few syscalls where sigset size (arg[1])
1418 * is allowed to be <= NSIG / 8, not strictly ==.
1419 * This allows non-rt sigpending() syscall
1420 * to reuse rt_sigpending() code in kernel.
1421 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001422 if (syserror(tcp))
1423 tprintf("%#lx", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001424 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001425 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[1]);
1426 tprintf(", %lu", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001427 }
1428 return 0;
1429}
Denys Vlasenko1d632462009-04-14 12:51:00 +00001430
1431int
1432sys_rt_sigsuspend(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001433{
1434 if (entering(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001435 /* NB: kernel requires arg[1] == NSIG / 8 */
1436 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[1]);
1437 tprintf(", %lu", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001438 }
1439 return 0;
1440}
Denys Vlasenko1d632462009-04-14 12:51:00 +00001441
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001442static void
1443print_sigqueueinfo(struct tcb *tcp, int sig, unsigned long uinfo)
1444{
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001445 printsignal(sig);
1446 tprints(", ");
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001447 printsiginfo_at(tcp, uinfo);
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001448}
1449
Denys Vlasenko1d632462009-04-14 12:51:00 +00001450int
1451sys_rt_sigqueueinfo(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001452{
1453 if (entering(tcp)) {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001454 tprintf("%lu, ", tcp->u_arg[0]);
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001455 print_sigqueueinfo(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1456 }
1457 return 0;
1458}
1459
1460int
1461sys_rt_tgsigqueueinfo(struct tcb *tcp)
1462{
1463 if (entering(tcp)) {
1464 tprintf("%lu, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
1465 print_sigqueueinfo(tcp, tcp->u_arg[2], tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001466 }
1467 return 0;
1468}
1469
Denys Vlasenko1d632462009-04-14 12:51:00 +00001470int sys_rt_sigtimedwait(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001471{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001472 /* NB: kernel requires arg[3] == NSIG / 8 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001473 if (entering(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001474 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[3]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001475 tprints(", ");
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001476 /* This is the only "return" parameter, */
1477 if (tcp->u_arg[1] != 0)
1478 return 0;
1479 /* ... if it's NULL, can decode all on entry */
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001480 tprints("NULL, ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001481 }
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001482 else if (tcp->u_arg[1] != 0) {
1483 /* syscall exit, and u_arg[1] wasn't NULL */
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001484 printsiginfo_at(tcp, tcp->u_arg[1]);
1485 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001486 }
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001487 else {
1488 /* syscall exit, and u_arg[1] was NULL */
1489 return 0;
1490 }
1491 print_timespec(tcp, tcp->u_arg[2]);
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001492 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001493 return 0;
1494};
1495
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001496int
Denys Vlasenko1d632462009-04-14 12:51:00 +00001497sys_restart_syscall(struct tcb *tcp)
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001498{
1499 if (entering(tcp))
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001500 tprints("<... resuming interrupted call ...>");
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001501 return 0;
1502}
1503
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001504static int
1505do_signalfd(struct tcb *tcp, int flags_arg)
Roland McGrathf46ccd32007-08-02 01:15:59 +00001506{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001507 /* NB: kernel requires arg[2] == NSIG / 8 */
Roland McGrathf46ccd32007-08-02 01:15:59 +00001508 if (entering(tcp)) {
Dmitry V. Levin31382132011-03-04 05:08:02 +03001509 printfd(tcp, tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001510 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001511 print_sigset_addr_len(tcp, tcp->u_arg[1], tcp->u_arg[2]);
Dmitry V. Levin9d2ee3d2009-10-05 13:45:19 +00001512 tprintf(", %lu", tcp->u_arg[2]);
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001513 if (flags_arg >= 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001514 tprints(", ");
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001515 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
1516 }
Roland McGrathf46ccd32007-08-02 01:15:59 +00001517 }
1518 return 0;
1519}
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001520
1521int
1522sys_signalfd(struct tcb *tcp)
1523{
1524 return do_signalfd(tcp, -1);
1525}
1526
1527int
1528sys_signalfd4(struct tcb *tcp)
1529{
1530 return do_signalfd(tcp, 3);
1531}