blob: 30358a195d957a0ab856f21e3d78558fdb33902c [file] [log] [blame]
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001/*
2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
Wichert Akkerman4dc8a2a1999-12-23 14:20:14 +00005 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
7 * Linux for s390 port by D.J. Barrow
8 * <barrow_dj@mail.yahoo.com,djbarrow@de.ibm.com>
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00009 * All rights reserved.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. The name of the author may not be used to endorse or promote products
20 * derived from this software without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000032 */
33
34#include "defs.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000035#include <fcntl.h>
Maarten ter Huurne40c174b2014-10-20 01:02:48 +020036
Dmitry V. Levinfadf3792015-02-13 00:26:38 +000037#include "ptrace.h"
Dmitry V. Levin5503dd22015-02-13 02:12:14 +000038#include "regs.h"
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +000039
Denys Vlasenko84703742012-02-25 02:38:52 +010040#if defined(SPARC) || defined(SPARC64) || defined(MIPS)
Roland McGrath576b7842007-11-04 00:00:00 +000041typedef struct {
42 struct pt_regs si_regs;
43 int si_mask;
44} m_siginfo_t;
Roland McGrath30ff45e2003-01-30 20:15:23 +000045#elif defined HAVE_ASM_SIGCONTEXT_H
H.J. Lu35be5812012-04-16 13:00:01 +020046# if !defined(IA64) && !defined(X86_64) && !defined(X32)
Denys Vlasenko84703742012-02-25 02:38:52 +010047# include <asm/sigcontext.h>
Denys Vlasenkoa6d91de2012-03-16 12:02:22 +010048# endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000049#else /* !HAVE_ASM_SIGCONTEXT_H */
Denys Vlasenkob51f3642013-07-16 12:06:25 +020050# if defined M68K && !defined HAVE_STRUCT_SIGCONTEXT
51struct sigcontext {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000052 unsigned long sc_mask;
53 unsigned long sc_usp;
54 unsigned long sc_d0;
55 unsigned long sc_d1;
56 unsigned long sc_a0;
57 unsigned long sc_a1;
58 unsigned short sc_sr;
59 unsigned long sc_pc;
60 unsigned short sc_formatvec;
61};
Denys Vlasenkob51f3642013-07-16 12:06:25 +020062# endif /* M68K */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000063#endif /* !HAVE_ASM_SIGCONTEXT_H */
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020064
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000065#ifndef NSIG
Denys Vlasenko84703742012-02-25 02:38:52 +010066# warning: NSIG is not defined, using 32
67# define NSIG 32
Dmitry V. Levin38593e92014-02-26 16:51:28 +000068#elif NSIG < 32
69# error: NSIG < 32
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000070#endif
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020071
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000072#ifdef HAVE_SIGACTION
73
Roland McGrath2638cb42002-12-15 23:58:41 +000074/* The libc headers do not define this constant since it should only be
Denys Vlasenko041b3ee2011-08-18 12:48:56 +020075 used by the implementation. So we define it here. */
Dmitry V. Levin5c7f6272014-02-08 00:26:06 +000076#ifndef SA_RESTORER
77# ifdef ASM_SA_RESTORER
78# define SA_RESTORER ASM_SA_RESTORER
Roland McGrath2638cb42002-12-15 23:58:41 +000079# endif
80#endif
81
Mike Frysingerdd80a872014-08-14 00:30:24 -040082/* Some arches define this in their headers, but don't actually have it,
Mike Frysingerd632e102014-08-09 09:04:18 -040083 so we have to delete the define. */
Mike Frysingerdd80a872014-08-14 00:30:24 -040084#if defined(HPPA) || defined(IA64)
Mike Frysingerd632e102014-08-09 09:04:18 -040085# undef SA_RESTORER
86#endif
87
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +000088#include "xlat/sigact_flags.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +000089#include "xlat/sigprocmaskcmds.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +000090
91#endif /* HAVE_SIGACTION */
92
Nate Sammonsce780fc1999-03-29 23:23:13 +000093/* Anonymous realtime signals. */
94/* Under glibc 2.1, SIGRTMIN et al are functions, but __SIGRTMIN is a
95 constant. This is what we want. Otherwise, just use SIGRTMIN. */
96#ifdef SIGRTMIN
97#ifndef __SIGRTMIN
98#define __SIGRTMIN SIGRTMIN
99#define __SIGRTMAX SIGRTMAX /* likewise */
100#endif
101#endif
102
Denys Vlasenkod9560c12011-08-19 17:41:28 +0200103/* Note on the size of sigset_t:
104 *
105 * In glibc, sigset_t is an array with space for 1024 bits (!),
106 * even though all arches supported by Linux have only 64 signals
107 * except MIPS, which has 128. IOW, it is 128 bytes long.
108 *
109 * In-kernel sigset_t is sized correctly (it is either 64 or 128 bit long).
110 * However, some old syscall return only 32 lower bits (one word).
111 * Example: sys_sigpending vs sys_rt_sigpending.
112 *
113 * Be aware of this fact when you try to
114 * memcpy(&tcp->u_arg[1], &something, sizeof(sigset_t))
115 * - sizeof(sigset_t) is much bigger than you think,
116 * it may overflow tcp->u_arg[] array, and it may try to copy more data
117 * than is really available in <something>.
118 * Similarly,
119 * umoven(tcp, addr, sizeof(sigset_t), &sigset)
120 * may be a bad idea: it'll try to read much more data than needed
121 * to fetch a sigset_t.
122 * Use (NSIG / 8) as a size instead.
123 */
124
Roland McGrathee36ce12004-09-04 03:53:10 +0000125const char *
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000126signame(const int sig)
Nate Sammonsce780fc1999-03-29 23:23:13 +0000127{
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000128 static char buf[sizeof("SIGRT_%u") + sizeof(int)*3];
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200129
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000130 if (sig >= 0) {
131 const unsigned int s = sig;
132
133 if (s < nsignals)
134 return signalent[s];
Nate Sammonsce780fc1999-03-29 23:23:13 +0000135#ifdef SIGRTMIN
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000136 if (s >= __SIGRTMIN && s <= __SIGRTMAX) {
137 sprintf(buf, "SIGRT_%u", s - __SIGRTMIN);
138 return buf;
139 }
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200140#endif
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000141 }
Denys Vlasenko041b3ee2011-08-18 12:48:56 +0200142 sprintf(buf, "%d", sig);
143 return buf;
Nate Sammonsce780fc1999-03-29 23:23:13 +0000144}
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000145
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000146static unsigned int
147popcount32(const uint32_t *a, unsigned int size)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000148{
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000149 unsigned int count = 0;
Denys Vlasenkod9560c12011-08-19 17:41:28 +0200150
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000151 for (; size; ++a, --size) {
152 uint32_t x = *a;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000153
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000154#ifdef HAVE___BUILTIN_POPCOUNT
155 count += __builtin_popcount(x);
Denys Vlasenkoa8773792013-07-18 20:42:41 +0200156#else
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000157 for (; x; ++count)
158 x &= x - 1;
Nate Sammons4a121431999-04-06 01:19:39 +0000159#endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000160 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100161
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000162 return count;
163}
164
165static const char *
166sprintsigmask_n(const char *prefix, const void *sig_mask, unsigned int bytes)
167{
168 /*
169 * The maximum number of signal names to be printed is NSIG * 2 / 3.
170 * Most of signal names have length 7,
171 * average length of signal names is less than 7.
172 * The length of prefix string does not exceed 16.
173 */
174 static char outstr[128 + 8 * (NSIG * 2 / 3)];
175
176 char *s;
177 const uint32_t *mask;
178 uint32_t inverted_mask[NSIG / 32];
179 unsigned int size;
180 int i;
181 char sep;
182
183 s = stpcpy(outstr, prefix);
184
185 mask = sig_mask;
186 /* length of signal mask in 4-byte words */
187 size = (bytes >= NSIG / 8) ? NSIG / 32 : (bytes + 3) / 4;
188
189 /* check whether 2/3 or more bits are set */
190 if (popcount32(mask, size) >= size * 32 * 2 / 3) {
191 /* show those signals that are NOT in the mask */
192 unsigned int j;
193 for (j = 0; j < size; ++j)
194 inverted_mask[j] = ~mask[j];
195 mask = inverted_mask;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000196 *s++ = '~';
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000197 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100198
199 sep = '[';
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000200 for (i = 0; (i = next_set_bit(mask, i, size * 32)) >= 0; ) {
201 ++i;
202 *s++ = sep;
Dmitry V. Levin3ed5d022014-09-10 13:46:04 +0000203 if ((unsigned) i < nsignals) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000204 s = stpcpy(s, signalent[i] + 3);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000205 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000206#ifdef SIGRTMIN
207 else if (i >= __SIGRTMIN && i <= __SIGRTMAX) {
208 s += sprintf(s, "RT_%u", i - __SIGRTMIN);
209 }
210#endif
211 else {
212 s += sprintf(s, "%u", i);
213 }
214 sep = ' ';
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000215 }
Denys Vlasenko4f3df072012-01-29 22:38:35 +0100216 if (sep == '[')
217 *s++ = sep;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000218 *s++ = ']';
219 *s = '\0';
220 return outstr;
221}
222
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000223#define tprintsigmask_addr(prefix, mask) \
224 tprints(sprintsigmask_n((prefix), (mask), sizeof(mask)))
Denys Vlasenko75f4e1f2013-07-18 20:37:06 +0200225
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000226#define sprintsigmask_val(prefix, mask) \
227 sprintsigmask_n((prefix), &(mask), sizeof(mask))
228
229#define tprintsigmask_val(prefix, mask) \
230 tprints(sprintsigmask_n((prefix), &(mask), sizeof(mask)))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000231
232void
Denys Vlasenkoeccc48c2011-06-09 01:28:11 +0200233printsignal(int nr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000234{
Denys Vlasenko5940e652011-09-01 09:55:05 +0200235 tprints(signame(nr));
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000236}
237
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000238void
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200239print_sigset_addr_len(struct tcb *tcp, long addr, long len)
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000240{
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000241 char mask[NSIG / 8];
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000242
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200243 if (!addr) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200244 tprints("NULL");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200245 return;
246 }
247 /* Here len is usually equals NSIG / 8 or current_wordsize.
248 * But we code this defensively:
249 */
250 if (len < 0) {
251 bad:
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000252 tprintf("%#lx", addr);
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200253 return;
254 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000255 if (len >= NSIG / 8)
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200256 len = NSIG / 8;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000257 else
258 len = (len + 3) & ~3;
259
260 if (umoven(tcp, addr, len, mask) < 0)
Denys Vlasenko5e133aa2013-07-18 17:02:21 +0200261 goto bad;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000262 tprints(sprintsigmask_n("", mask, len));
Dmitry V. Levin95ebf5a2006-10-13 20:25:12 +0000263}
264
John Hughes58265892001-10-18 15:13:53 +0000265#ifndef ILL_ILLOPC
266#define ILL_ILLOPC 1 /* illegal opcode */
267#define ILL_ILLOPN 2 /* illegal operand */
268#define ILL_ILLADR 3 /* illegal addressing mode */
269#define ILL_ILLTRP 4 /* illegal trap */
270#define ILL_PRVOPC 5 /* privileged opcode */
271#define ILL_PRVREG 6 /* privileged register */
272#define ILL_COPROC 7 /* coprocessor error */
273#define ILL_BADSTK 8 /* internal stack error */
274#define FPE_INTDIV 1 /* integer divide by zero */
275#define FPE_INTOVF 2 /* integer overflow */
276#define FPE_FLTDIV 3 /* floating point divide by zero */
277#define FPE_FLTOVF 4 /* floating point overflow */
278#define FPE_FLTUND 5 /* floating point underflow */
279#define FPE_FLTRES 6 /* floating point inexact result */
280#define FPE_FLTINV 7 /* floating point invalid operation */
281#define FPE_FLTSUB 8 /* subscript out of range */
282#define SEGV_MAPERR 1 /* address not mapped to object */
283#define SEGV_ACCERR 2 /* invalid permissions for mapped object */
284#define BUS_ADRALN 1 /* invalid address alignment */
285#define BUS_ADRERR 2 /* non-existant physical address */
286#define BUS_OBJERR 3 /* object specific hardware error */
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000287#define SYS_SECCOMP 1 /* seccomp triggered */
John Hughes58265892001-10-18 15:13:53 +0000288#define TRAP_BRKPT 1 /* process breakpoint */
289#define TRAP_TRACE 2 /* process trace trap */
290#define CLD_EXITED 1 /* child has exited */
291#define CLD_KILLED 2 /* child was killed */
292#define CLD_DUMPED 3 /* child terminated abnormally */
293#define CLD_TRAPPED 4 /* traced child has trapped */
294#define CLD_STOPPED 5 /* child has stopped */
295#define CLD_CONTINUED 6 /* stopped child has continued */
296#define POLL_IN 1 /* data input available */
297#define POLL_OUT 2 /* output buffers available */
298#define POLL_MSG 3 /* input message available */
299#define POLL_ERR 4 /* i/o error */
300#define POLL_PRI 5 /* high priority input available */
301#define POLL_HUP 6 /* device disconnected */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000302#define SI_KERNEL 0x80 /* sent by kernel */
John Hughes58265892001-10-18 15:13:53 +0000303#define SI_USER 0 /* sent by kill, sigsend, raise */
304#define SI_QUEUE -1 /* sent by sigqueue */
305#define SI_TIMER -2 /* sent by timer expiration */
306#define SI_MESGQ -3 /* sent by real time mesq state change */
307#define SI_ASYNCIO -4 /* sent by AIO completion */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000308#define SI_SIGIO -5 /* sent by SIGIO */
309#define SI_TKILL -6 /* sent by tkill */
Dmitry V. Levinb9d4d212014-03-11 01:57:02 +0000310#define SI_DETHREAD -7 /* sent by execve killing subsidiary threads */
Dmitry V. Levin7d4bff12011-03-10 21:41:34 +0000311#define SI_ASYNCNL -60 /* sent by asynch name lookup completion */
Denys Vlasenko2c4fb902012-03-15 17:24:49 +0100312#endif
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000313
Denys Vlasenko2c4fb902012-03-15 17:24:49 +0100314#ifndef SI_FROMUSER
315# define SI_FROMUSER(sip) ((sip)->si_code <= 0)
Denys Vlasenko84703742012-02-25 02:38:52 +0100316#endif
John Hughes58265892001-10-18 15:13:53 +0000317
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000318#include "xlat/siginfo_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000319#include "xlat/sigill_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000320#include "xlat/sigfpe_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000321#include "xlat/sigtrap_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000322#include "xlat/sigchld_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000323#include "xlat/sigpoll_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000324#include "xlat/sigprof_codes.h"
John Hughes58265892001-10-18 15:13:53 +0000325
326#ifdef SIGEMT
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000327#include "xlat/sigemt_codes.h"
John Hughes58265892001-10-18 15:13:53 +0000328#endif
329
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000330#include "xlat/sigsegv_codes.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000331#include "xlat/sigbus_codes.h"
John Hughes58265892001-10-18 15:13:53 +0000332
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000333#ifndef SYS_SECCOMP
334# define SYS_SECCOMP 1
335#endif
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000336#include "xlat/sigsys_codes.h"
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000337
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000338static void
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000339printsigsource(const siginfo_t *sip)
340{
341 tprintf(", si_pid=%lu, si_uid=%lu",
342 (unsigned long) sip->si_pid,
343 (unsigned long) sip->si_uid);
344}
345
346static void
347printsigval(const siginfo_t *sip, int verbose)
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000348{
349 if (!verbose)
350 tprints(", ...");
351 else
352 tprintf(", si_value={int=%u, ptr=%#lx}",
353 sip->si_int,
354 (unsigned long) sip->si_ptr);
355}
356
John Hughes58265892001-10-18 15:13:53 +0000357void
Dmitry V. Levind8890b52015-02-07 15:47:24 +0000358printsiginfo(const siginfo_t *sip, int verbose)
John Hughes58265892001-10-18 15:13:53 +0000359{
Roland McGrathf9c49b22004-10-06 22:11:54 +0000360 const char *code;
John Hughes58265892001-10-18 15:13:53 +0000361
362 if (sip->si_signo == 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200363 tprints("{}");
John Hughes58265892001-10-18 15:13:53 +0000364 return;
365 }
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200366 tprints("{si_signo=");
John Hughes58265892001-10-18 15:13:53 +0000367 printsignal(sip->si_signo);
368 code = xlookup(siginfo_codes, sip->si_code);
369 if (!code) {
370 switch (sip->si_signo) {
371 case SIGTRAP:
372 code = xlookup(sigtrap_codes, sip->si_code);
373 break;
374 case SIGCHLD:
375 code = xlookup(sigchld_codes, sip->si_code);
376 break;
377 case SIGPOLL:
378 code = xlookup(sigpoll_codes, sip->si_code);
379 break;
380 case SIGPROF:
381 code = xlookup(sigprof_codes, sip->si_code);
382 break;
383 case SIGILL:
384 code = xlookup(sigill_codes, sip->si_code);
385 break;
386#ifdef SIGEMT
387 case SIGEMT:
388 code = xlookup(sigemt_codes, sip->si_code);
389 break;
390#endif
391 case SIGFPE:
392 code = xlookup(sigfpe_codes, sip->si_code);
393 break;
394 case SIGSEGV:
395 code = xlookup(sigsegv_codes, sip->si_code);
396 break;
397 case SIGBUS:
398 code = xlookup(sigbus_codes, sip->si_code);
399 break;
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000400 case SIGSYS:
401 code = xlookup(sigsys_codes, sip->si_code);
402 break;
John Hughes58265892001-10-18 15:13:53 +0000403 }
404 }
405 if (code)
406 tprintf(", si_code=%s", code);
407 else
408 tprintf(", si_code=%#x", sip->si_code);
409#ifdef SI_NOINFO
410 if (sip->si_code != SI_NOINFO)
411#endif
412 {
413 if (sip->si_errno) {
Dmitry V. Levinb2f8c772015-02-23 03:10:25 +0000414 tprints(", si_errno=");
415 if ((unsigned) sip->si_errno < nerrnos
416 && errnoent[sip->si_errno])
417 tprints(errnoent[sip->si_errno]);
John Hughes58265892001-10-18 15:13:53 +0000418 else
Dmitry V. Levinb2f8c772015-02-23 03:10:25 +0000419 tprintf("%d", sip->si_errno);
John Hughes58265892001-10-18 15:13:53 +0000420 }
421#ifdef SI_FROMUSER
422 if (SI_FROMUSER(sip)) {
John Hughes58265892001-10-18 15:13:53 +0000423 switch (sip->si_code) {
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000424#ifdef SI_USER
425 case SI_USER:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000426 printsigsource(sip);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000427 break;
428#endif
429#ifdef SI_TKILL
430 case SI_TKILL:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000431 printsigsource(sip);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000432 break;
433#endif
Dmitry V. Levin36ab3d52015-01-13 09:24:04 +0300434#if defined SI_TIMER \
435 && defined HAVE_SIGINFO_T_SI_TIMERID && defined HAVE_SIGINFO_T_SI_OVERRUN
John Hughes58265892001-10-18 15:13:53 +0000436 case SI_TIMER:
Elliott Hughes4dd1e892014-03-10 19:27:22 +0000437 tprintf(", si_timerid=%#x, si_overrun=%d",
438 sip->si_timerid, sip->si_overrun);
439 printsigval(sip, verbose);
John Hughes58265892001-10-18 15:13:53 +0000440 break;
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000441#endif
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000442 default:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000443 printsigsource(sip);
444 if (sip->si_ptr)
445 printsigval(sip, verbose);
Dmitry V. Levin6d9e8e82011-03-10 22:18:56 +0000446 break;
John Hughes58265892001-10-18 15:13:53 +0000447 }
John Hughes58265892001-10-18 15:13:53 +0000448 }
449 else
450#endif /* SI_FROMUSER */
451 {
452 switch (sip->si_signo) {
453 case SIGCHLD:
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000454 printsigsource(sip);
455 tprints(", si_status=");
John Hughes58265892001-10-18 15:13:53 +0000456 if (sip->si_code == CLD_EXITED)
457 tprintf("%d", sip->si_status);
458 else
459 printsignal(sip->si_status);
John Hughes58265892001-10-18 15:13:53 +0000460 if (!verbose)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200461 tprints(", ...");
John Hughes58265892001-10-18 15:13:53 +0000462 else
H.J. Lu2bb45812012-04-15 11:17:13 -0700463 tprintf(", si_utime=%llu, si_stime=%llu",
464 (unsigned long long) sip->si_utime,
465 (unsigned long long) sip->si_stime);
John Hughes58265892001-10-18 15:13:53 +0000466 break;
467 case SIGILL: case SIGFPE:
468 case SIGSEGV: case SIGBUS:
469 tprintf(", si_addr=%#lx",
470 (unsigned long) sip->si_addr);
471 break;
472 case SIGPOLL:
473 switch (sip->si_code) {
474 case POLL_IN: case POLL_OUT: case POLL_MSG:
475 tprintf(", si_band=%ld",
476 (long) sip->si_band);
477 break;
478 }
479 break;
Dmitry V. Levinbc091e32014-03-11 22:18:40 +0000480#ifdef HAVE_SIGINFO_T_SI_SYSCALL
481 case SIGSYS:
482 tprintf(", si_call_addr=%#lx, si_syscall=%d, si_arch=%u",
483 (unsigned long) sip->si_call_addr,
484 sip->si_syscall, sip->si_arch);
485 break;
486#endif
John Hughes58265892001-10-18 15:13:53 +0000487 default:
Dmitry V. Levinb41e1c92011-03-10 23:14:47 +0000488 if (sip->si_pid || sip->si_uid)
Dmitry V. Levin4a524db2014-03-11 00:05:19 +0000489 printsigsource(sip);
490 if (sip->si_ptr)
491 printsigval(sip, verbose);
John Hughes58265892001-10-18 15:13:53 +0000492 }
493 }
494 }
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200495 tprints("}");
John Hughes58265892001-10-18 15:13:53 +0000496}
497
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +0100498void
499printsiginfo_at(struct tcb *tcp, long addr)
500{
501 siginfo_t si;
502 if (!addr) {
503 tprints("NULL");
504 return;
505 }
506 if (syserror(tcp)) {
507 tprintf("%#lx", addr);
508 return;
509 }
510 if (umove(tcp, addr, &si) < 0) {
511 tprints("{???}");
512 return;
513 }
514 printsiginfo(&si, verbose(tcp));
515}
516
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000517int
Denys Vlasenko12014262011-05-30 14:00:14 +0200518sys_sigsetmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000519{
520 if (entering(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000521 tprintsigmask_val("", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000522 }
523 else if (!syserror(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000524 tcp->auxstr = sprintsigmask_val("old mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000525 return RVAL_HEX | RVAL_STR;
526 }
527 return 0;
528}
529
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000530#ifdef HAVE_SIGACTION
531
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000532struct old_sigaction {
Denys Vlasenko86d94842013-02-08 12:59:13 +0100533 /* sa_handler may be a libc #define, need to use other name: */
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800534#ifdef MIPS
535 unsigned int sa_flags;
536 void (*__sa_handler)(int);
537 /* Kernel treats sa_mask as an array of longs. */
538 unsigned long sa_mask[NSIG / sizeof(long) ? NSIG / sizeof(long) : 1];
539#else
Denys Vlasenko86d94842013-02-08 12:59:13 +0100540 void (*__sa_handler)(int);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000541 unsigned long sa_mask;
542 unsigned long sa_flags;
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800543#endif /* !MIPS */
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100544#ifdef SA_RESTORER
545 void (*sa_restorer)(void);
546#endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000547};
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000548
Elliott Hughes458b3f22014-02-28 23:21:35 +0000549struct old_sigaction32 {
550 /* sa_handler may be a libc #define, need to use other name: */
551 uint32_t __sa_handler;
552 uint32_t sa_mask;
553 uint32_t sa_flags;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100554#ifdef SA_RESTORER
Elliott Hughes458b3f22014-02-28 23:21:35 +0000555 uint32_t sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100556#endif
Elliott Hughes458b3f22014-02-28 23:21:35 +0000557};
558
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000559static void
560decode_old_sigaction(struct tcb *tcp, long addr)
561{
562 struct old_sigaction sa;
Elliott Hughes458b3f22014-02-28 23:21:35 +0000563 int r;
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000564
565 if (!addr) {
566 tprints("NULL");
567 return;
568 }
569 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp))) {
570 tprintf("%#lx", addr);
571 return;
572 }
Elliott Hughes458b3f22014-02-28 23:21:35 +0000573
574#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
575 if (current_wordsize != sizeof(sa.__sa_handler) && current_wordsize == 4) {
576 struct old_sigaction32 sa32;
577 r = umove(tcp, addr, &sa32);
578 if (r >= 0) {
579 memset(&sa, 0, sizeof(sa));
580 sa.__sa_handler = (void*)(uintptr_t)sa32.__sa_handler;
581 sa.sa_flags = sa32.sa_flags;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100582#ifdef SA_RESTORER
Elliott Hughes458b3f22014-02-28 23:21:35 +0000583 sa.sa_restorer = (void*)(uintptr_t)sa32.sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +0100584#endif
Elliott Hughes458b3f22014-02-28 23:21:35 +0000585 sa.sa_mask = sa32.sa_mask;
586 }
587 } else
588#endif
589 {
590 r = umove(tcp, addr, &sa);
591 }
592 if (r < 0) {
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000593 tprints("{...}");
594 return;
595 }
596
597 /* Architectures using function pointers, like
598 * hppa, may need to manipulate the function pointer
599 * to compute the result of a comparison. However,
600 * the __sa_handler function pointer exists only in
601 * the address space of the traced process, and can't
602 * be manipulated by strace. In order to prevent the
603 * compiler from generating code to manipulate
604 * __sa_handler we cast the function pointers to long. */
605 if ((long)sa.__sa_handler == (long)SIG_ERR)
606 tprints("{SIG_ERR, ");
607 else if ((long)sa.__sa_handler == (long)SIG_DFL)
608 tprints("{SIG_DFL, ");
609 else if ((long)sa.__sa_handler == (long)SIG_IGN)
610 tprints("{SIG_IGN, ");
611 else
612 tprintf("{%#lx, ", (long) sa.__sa_handler);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800613#ifdef MIPS
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000614 tprintsigmask_addr("", sa.sa_mask);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800615#else
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000616 tprintsigmask_val("", sa.sa_mask);
Chris Dearman2b4bb1c2013-12-09 19:58:42 -0800617#endif
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000618 tprints(", ");
619 printflags(sigact_flags, sa.sa_flags, "SA_???");
620#ifdef SA_RESTORER
621 if (sa.sa_flags & SA_RESTORER)
622 tprintf(", %p", sa.sa_restorer);
623#endif
624 tprints("}");
625}
626
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000627int
Denys Vlasenko12014262011-05-30 14:00:14 +0200628sys_sigaction(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000629{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000630 if (entering(tcp)) {
631 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200632 tprints(", ");
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000633 decode_old_sigaction(tcp, tcp->u_arg[1]);
634 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000635 } else
Dmitry V. Levinac655a82014-01-07 22:41:30 +0000636 decode_old_sigaction(tcp, tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000637 return 0;
638}
639
640int
Denys Vlasenko12014262011-05-30 14:00:14 +0200641sys_signal(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000642{
643 if (entering(tcp)) {
644 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200645 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000646 switch (tcp->u_arg[1]) {
Jan Kratochvil1f942712008-08-06 21:38:52 +0000647 case (long) SIG_ERR:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200648 tprints("SIG_ERR");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000649 break;
Jan Kratochvil1f942712008-08-06 21:38:52 +0000650 case (long) SIG_DFL:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200651 tprints("SIG_DFL");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000652 break;
Jan Kratochvil1f942712008-08-06 21:38:52 +0000653 case (long) SIG_IGN:
Denys Vlasenko60fe8c12011-09-01 10:00:28 +0200654 tprints("SIG_IGN");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000655 break;
656 default:
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000657 tprintf("%#lx", tcp->u_arg[1]);
658 }
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000659 return 0;
660 }
Dmitry V. Levin21a75342008-09-03 01:22:18 +0000661 else if (!syserror(tcp)) {
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000662 switch (tcp->u_rval) {
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100663 case (long) SIG_ERR:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000664 tcp->auxstr = "SIG_ERR"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100665 case (long) SIG_DFL:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000666 tcp->auxstr = "SIG_DFL"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100667 case (long) SIG_IGN:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000668 tcp->auxstr = "SIG_IGN"; break;
Denys Vlasenko989ebc92012-03-17 04:42:07 +0100669 default:
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000670 tcp->auxstr = NULL;
671 }
672 return RVAL_HEX | RVAL_STR;
673 }
Dmitry V. Levin21a75342008-09-03 01:22:18 +0000674 return 0;
Wichert Akkerman16a03d22000-08-10 02:14:04 +0000675}
676
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000677#endif /* HAVE_SIGACTION */
678
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000679int
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000680sys_sigreturn(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000681{
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000682#if defined(ARM)
Roland McGrath0f87c492003-06-03 23:29:04 +0000683 if (entering(tcp)) {
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200684 struct arm_sigcontext {
685 unsigned long trap_no;
686 unsigned long error_code;
687 unsigned long oldmask;
688 unsigned long arm_r0;
689 unsigned long arm_r1;
690 unsigned long arm_r2;
691 unsigned long arm_r3;
692 unsigned long arm_r4;
693 unsigned long arm_r5;
694 unsigned long arm_r6;
695 unsigned long arm_r7;
696 unsigned long arm_r8;
697 unsigned long arm_r9;
698 unsigned long arm_r10;
699 unsigned long arm_fp;
700 unsigned long arm_ip;
701 unsigned long arm_sp;
702 unsigned long arm_lr;
703 unsigned long arm_pc;
704 unsigned long arm_cpsr;
705 unsigned long fault_address;
706 };
707 struct arm_ucontext {
708 unsigned long uc_flags;
709 unsigned long uc_link; /* struct ucontext* */
710 /* The next three members comprise stack_t struct: */
711 unsigned long ss_sp; /* void* */
712 unsigned long ss_flags; /* int */
713 unsigned long ss_size; /* size_t */
714 struct arm_sigcontext sc;
715 /* These two members are sigset_t: */
716 unsigned long uc_sigmask[2];
717 /* more fields follow, which we aren't interested in */
718 };
719 struct arm_ucontext uc;
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200720 if (umove(tcp, arm_regs.ARM_sp, &uc) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000721 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000722 /*
723 * Kernel fills out uc.sc.oldmask too when it sets up signal stack,
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200724 * but for sigmask restore, sigreturn syscall uses uc.uc_sigmask instead.
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200725 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000726 tprintsigmask_addr(") (mask ", uc.uc_sigmask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000727 }
Roland McGrath0f87c492003-06-03 23:29:04 +0000728#elif defined(S390) || defined(S390X)
Roland McGrath0f87c492003-06-03 23:29:04 +0000729 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200730 long usp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000731 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200732 if (upeek(tcp->pid, PT_GPR15, &usp) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000733 return 0;
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100734 if (umove(tcp, usp + __SIGNAL_FRAMESIZE, &sc) < 0)
Roland McGrath0f87c492003-06-03 23:29:04 +0000735 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000736 tprintsigmask_addr(") (mask ", sc.oldmask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000737 }
Dmitry V. Levin5dd336b2015-02-23 16:18:09 +0000738#elif defined I386 || defined X86_64 || defined X32
739# ifndef I386
740 /* sys_sigreturn is i386 personality only */
741 if (current_personality != 1)
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200742 return 0;
743# endif
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000744 if (entering(tcp)) {
Denys Vlasenko670b21b2013-07-17 17:26:56 +0200745 struct i386_sigcontext_struct {
746 uint16_t gs, __gsh;
747 uint16_t fs, __fsh;
748 uint16_t es, __esh;
749 uint16_t ds, __dsh;
750 uint32_t edi;
751 uint32_t esi;
752 uint32_t ebp;
753 uint32_t esp;
754 uint32_t ebx;
755 uint32_t edx;
756 uint32_t ecx;
757 uint32_t eax;
758 uint32_t trapno;
759 uint32_t err;
760 uint32_t eip;
761 uint16_t cs, __csh;
762 uint32_t eflags;
763 uint32_t esp_at_signal;
764 uint16_t ss, __ssh;
765 uint32_t i387;
766 uint32_t oldmask;
767 uint32_t cr2;
768 };
769 struct i386_fpstate {
770 uint32_t cw;
771 uint32_t sw;
772 uint32_t tag;
773 uint32_t ipoff;
774 uint32_t cssel;
775 uint32_t dataoff;
776 uint32_t datasel;
777 uint8_t st[8][10]; /* 8*10 bytes: FP regs */
778 uint16_t status;
779 uint16_t magic;
780 uint32_t fxsr_env[6];
781 uint32_t mxcsr;
782 uint32_t reserved;
783 uint8_t stx[8][16]; /* 8*16 bytes: FP regs, each padded to 16 bytes */
784 uint8_t xmm[8][16]; /* 8 XMM regs */
785 uint32_t padding1[44];
786 uint32_t padding2[12]; /* union with struct _fpx_sw_bytes */
787 };
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200788 struct {
789 struct i386_sigcontext_struct sc;
790 struct i386_fpstate fp;
791 uint32_t extramask[1];
792 } signal_stack;
793 /* On i386, sc is followed on stack by struct fpstate
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100794 * and after it an additional u32 extramask[1] which holds
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200795 * upper half of the mask.
Denys Vlasenkob11322f2012-01-10 16:40:35 +0100796 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000797 uint32_t sigmask[2];
Denys Vlasenkob51f3642013-07-16 12:06:25 +0200798 if (umove(tcp, *i386_esp_ptr, &signal_stack) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000799 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000800 sigmask[0] = signal_stack.sc.oldmask;
801 sigmask[1] = signal_stack.extramask[0];
802 tprintsigmask_addr(") (mask ", sigmask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000803 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000804#elif defined(IA64)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000805 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200806 struct sigcontext sc;
807 long sp;
Wichert Akkerman5ae21ea2000-05-01 01:53:59 +0000808 /* offset of sigcontext in the kernel's sigframe structure: */
809# define SIGFRAME_SC_OFFSET 0x90
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200810 if (upeek(tcp->pid, PT_R12, &sp) < 0)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000811 return 0;
Wichert Akkerman5ae21ea2000-05-01 01:53:59 +0000812 if (umove(tcp, sp + 16 + SIGFRAME_SC_OFFSET, &sc) < 0)
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000813 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000814 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman8b1b40c2000-02-03 21:58:30 +0000815 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000816#elif defined(POWERPC)
Roland McGrath0f87c492003-06-03 23:29:04 +0000817 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200818 long esp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000819 struct sigcontext sc;
Anton Blanchardce6e33b2013-06-26 15:53:33 +0200820
821 esp = ppc_regs.gpr[1];
822
Andreas Schwabedb39342010-02-23 00:18:51 +0100823 /* Skip dummy stack frame. */
Andreas Schwabd69fa492010-07-12 21:39:57 +0200824#ifdef POWERPC64
825 if (current_personality == 0)
826 esp += 128;
827 else
828 esp += 64;
Andreas Schwabedb39342010-02-23 00:18:51 +0100829#else
830 esp += 64;
831#endif
Roland McGrath0f87c492003-06-03 23:29:04 +0000832 if (umove(tcp, esp, &sc) < 0)
833 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000834 tprintsigmask_val(") (mask ", sc.oldmask);
Roland McGrath0f87c492003-06-03 23:29:04 +0000835 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000836#elif defined(M68K)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000837 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200838 long usp;
839 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200840 if (upeek(tcp->pid, 4*PT_USP, &usp) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000841 return 0;
Roland McGrath0f87c492003-06-03 23:29:04 +0000842 if (umove(tcp, usp, &sc) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000843 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000844 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000845 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000846#elif defined(ALPHA)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000847 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200848 long fp;
Dmitry V. Levine2de3bd2013-11-12 15:27:38 +0000849 struct sigcontext sc;
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200850 if (upeek(tcp->pid, REG_FP, &fp) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000851 return 0;
Roland McGrath0f87c492003-06-03 23:29:04 +0000852 if (umove(tcp, fp, &sc) < 0)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000853 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000854 tprintsigmask_val(") (mask ", sc.sc_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000855 }
Denys Vlasenkoc36c3522012-02-25 02:47:15 +0100856#elif defined(SPARC) || defined(SPARC64)
Denys Vlasenkob63256e2011-06-07 12:13:24 +0200857 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200858 long i1;
Denys Vlasenko56a52982011-06-09 01:36:29 +0200859 m_siginfo_t si;
Denys Vlasenko48e4c1b2013-02-16 08:23:40 +0100860 i1 = sparc_regs.u_regs[U_REG_O1];
Denys Vlasenkob63256e2011-06-07 12:13:24 +0200861 if (umove(tcp, i1, &si) < 0) {
Denys Vlasenko905e8e02013-02-26 12:30:09 +0100862 perror_msg("sigreturn: umove");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000863 return 0;
864 }
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000865 tprintsigmask_val(") (mask ", si.si_mask);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000866 }
Denys Vlasenkoc36c3522012-02-25 02:47:15 +0100867#elif defined(LINUX_MIPSN32) || defined(LINUX_MIPSN64)
Roland McGrath542c2c62008-05-20 01:11:56 +0000868 /* This decodes rt_sigreturn. The 64-bit ABIs do not have
869 sigreturn. */
Denys Vlasenkob63256e2011-06-07 12:13:24 +0200870 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200871 struct ucontext uc;
Roland McGrath542c2c62008-05-20 01:11:56 +0000872 /* There are six words followed by a 128-byte siginfo. */
Dmitry V. Levin4f2d1ae2015-02-15 03:27:13 +0000873 long sp = mips_REG_SP + 6 * 4 + 128;
Roland McGrath542c2c62008-05-20 01:11:56 +0000874 if (umove(tcp, sp, &uc) < 0)
Denys Vlasenko5ae2b7c2009-02-27 20:32:52 +0000875 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000876 tprintsigmask_val(") (mask ", uc.uc_sigmask);
Roland McGrath542c2c62008-05-20 01:11:56 +0000877 }
Dmitry V. Levin4f2d1ae2015-02-15 03:27:13 +0000878#elif defined(LINUX_MIPSO32)
Denys Vlasenkob63256e2011-06-07 12:13:24 +0200879 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200880 m_siginfo_t si;
Dmitry V. Levin4f2d1ae2015-02-15 03:27:13 +0000881 if (umove(tcp, mips_REG_SP, &si) < 0)
Denys Vlasenkofacd45b2011-06-09 01:22:10 +0200882 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000883 tprintsigmask_val(") (mask ", si.si_mask);
Wichert Akkermanf90da011999-10-31 21:15:38 +0000884 }
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000885#elif defined(CRISV10) || defined(CRISV32)
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000886 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200887 struct sigcontext sc;
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000888 long regs[PT_MAX+1];
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000889 if (ptrace(PTRACE_GETREGS, tcp->pid, NULL, (long)regs) < 0) {
Denys Vlasenko905e8e02013-02-26 12:30:09 +0100890 perror_msg("sigreturn: PTRACE_GETREGS");
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000891 return 0;
892 }
893 if (umove(tcp, regs[PT_USP], &sc) < 0)
894 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000895 tprintsigmask_val(") (mask ", sc.oldmask);
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000896 }
Chris Metcalfc8c66982009-12-28 10:00:15 -0500897#elif defined(TILE)
Chris Metcalfc8c66982009-12-28 10:00:15 -0500898 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200899 struct ucontext uc;
Denys Vlasenko56a52982011-06-09 01:36:29 +0200900
901 /* offset of ucontext in the kernel's sigframe structure */
Chris Metcalf5c0796f2013-05-21 20:25:22 -0400902# define SIGFRAME_UC_OFFSET C_ABI_SAVE_AREA_SIZE + sizeof(siginfo_t)
Chris Metcalf0b99a8a2013-02-05 17:48:33 +0100903 if (umove(tcp, tile_regs.sp + SIGFRAME_UC_OFFSET, &uc) < 0)
Chris Metcalfc8c66982009-12-28 10:00:15 -0500904 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000905 tprintsigmask_val(") (mask ", uc.uc_sigmask);
Chris Metcalfc8c66982009-12-28 10:00:15 -0500906 }
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200907#elif defined(MICROBLAZE)
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200908 /* TODO: Verify that this is correct... */
909 if (entering(tcp)) {
Denys Vlasenko56a52982011-06-09 01:36:29 +0200910 struct sigcontext sc;
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200911 long sp;
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200912 /* Read r1, the stack pointer. */
Denys Vlasenko752e5a02013-06-28 14:35:47 +0200913 if (upeek(tcp->pid, 1 * 4, &sp) < 0)
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200914 return 0;
915 if (umove(tcp, sp, &sc) < 0)
916 return 0;
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000917 tprintsigmask_val(") (mask ", sc.oldmask);
Edgar E. Iglesias939caba2010-07-06 14:21:07 +0200918 }
Chris Zankel8f636ed2013-03-25 10:22:07 -0700919#elif defined(XTENSA)
920 /* Xtensa only has rt_sys_sigreturn */
Vineet Gupta7daacbb2013-08-16 12:47:06 +0530921#elif defined(ARC)
922 /* ARC syscall ABI only supports rt_sys_sigreturn */
Wichert Akkermanc1652e22001-03-27 12:17:16 +0000923#else
Dmitry V. Levinf112d072012-05-15 00:13:59 +0000924# warning No sys_sigreturn() for this architecture
925# warning (no problem, just a reminder :-)
Denys Vlasenkoea0e6e82009-02-25 17:08:40 +0000926#endif
Dmitry V. Levinf112d072012-05-15 00:13:59 +0000927 return 0;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000928}
929
930int
Denys Vlasenko12014262011-05-30 14:00:14 +0200931sys_siggetmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000932{
933 if (exiting(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000934 tcp->auxstr = sprintsigmask_val("mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000935 }
936 return RVAL_HEX | RVAL_STR;
937}
938
939int
Dmitry V. Levine5e60852009-12-31 22:50:49 +0000940sys_sigsuspend(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000941{
942 if (entering(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +0000943 tprintsigmask_val("", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000944 }
945 return 0;
946}
947
Denys Vlasenko84703742012-02-25 02:38:52 +0100948#if !defined SS_ONSTACK
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000949#define SS_ONSTACK 1
950#define SS_DISABLE 2
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000951#endif
952
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +0000953#include "xlat/sigaltstack_flags.h"
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000954
Dmitry V. Levin338c0692013-02-09 02:03:04 +0000955static void
Denys Vlasenko12014262011-05-30 14:00:14 +0200956print_stack_t(struct tcb *tcp, unsigned long addr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000957{
958 stack_t ss;
Dmitry V. Levind153bfc2014-02-26 22:29:27 +0000959 int r;
Dmitry V. Levin338c0692013-02-09 02:03:04 +0000960
961 if (!addr) {
962 tprints("NULL");
Dmitry V. Levind153bfc2014-02-26 22:29:27 +0000963 return;
964 }
965
966#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
967 if (current_wordsize != sizeof(ss.ss_sp) && current_wordsize == 4) {
968 struct {
969 uint32_t ss_sp;
970 int32_t ss_flags;
971 uint32_t ss_size;
972 } ss32;
973 r = umove(tcp, addr, &ss32);
974 if (r >= 0) {
975 memset(&ss, 0, sizeof(ss));
976 ss.ss_sp = (void*)(unsigned long) ss32.ss_sp;
977 ss.ss_flags = ss32.ss_flags;
978 ss.ss_size = (unsigned long) ss32.ss_size;
979 }
980 } else
981#endif
982 {
983 r = umove(tcp, addr, &ss);
984 }
985 if (r < 0) {
Dmitry V. Levin338c0692013-02-09 02:03:04 +0000986 tprintf("%#lx", addr);
987 } else {
988 tprintf("{ss_sp=%#lx, ss_flags=", (unsigned long) ss.ss_sp);
989 printflags(sigaltstack_flags, ss.ss_flags, "SS_???");
990 tprintf(", ss_size=%lu}", (unsigned long) ss.ss_size);
991 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000992}
993
994int
Denys Vlasenko12014262011-05-30 14:00:14 +0200995sys_sigaltstack(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000996{
997 if (entering(tcp)) {
Dmitry V. Levin338c0692013-02-09 02:03:04 +0000998 print_stack_t(tcp, tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +0000999 }
1000 else {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001001 tprints(", ");
Dmitry V. Levin338c0692013-02-09 02:03:04 +00001002 print_stack_t(tcp, tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001003 }
1004 return 0;
1005}
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001006
1007#ifdef HAVE_SIGACTION
1008
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001009/* "Old" sigprocmask, which operates with word-sized signal masks */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001010int
Denys Vlasenko12014262011-05-30 14:00:14 +02001011sys_sigprocmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001012{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001013# ifdef ALPHA
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001014 if (entering(tcp)) {
Mike Frysingerdde045c2012-03-15 00:45:33 -04001015 /*
1016 * Alpha/OSF is different: it doesn't pass in two pointers,
1017 * but rather passes in the new bitmask as an argument and
1018 * then returns the old bitmask. This "works" because we
1019 * only have 64 signals to worry about. If you want more,
1020 * use of the rt_sigprocmask syscall is required.
1021 * Alpha:
1022 * old = osf_sigprocmask(how, new);
1023 * Everyone else:
1024 * ret = sigprocmask(how, &new, &old, ...);
1025 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001026 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001027 tprintsigmask_val(", ", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001028 }
1029 else if (!syserror(tcp)) {
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001030 tcp->auxstr = sprintsigmask_val("old mask ", tcp->u_rval);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001031 return RVAL_HEX | RVAL_STR;
1032 }
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001033# else /* !ALPHA */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001034 if (entering(tcp)) {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001035 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001036 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001037 print_sigset_addr_len(tcp, tcp->u_arg[1], current_wordsize);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001038 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001039 }
1040 else {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001041 if (syserror(tcp))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001042 tprintf("%#lx", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001043 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001044 print_sigset_addr_len(tcp, tcp->u_arg[2], current_wordsize);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001045 }
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001046# endif /* !ALPHA */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001047 return 0;
1048}
1049
1050#endif /* HAVE_SIGACTION */
1051
1052int
Denys Vlasenko12014262011-05-30 14:00:14 +02001053sys_kill(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001054{
1055 if (entering(tcp)) {
Denys Vlasenkoe015d2d2013-02-15 14:58:52 +01001056 tprintf("%ld, %s",
1057 widen_to_long(tcp->u_arg[0]),
1058 signame(tcp->u_arg[1])
1059 );
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001060 }
1061 return 0;
1062}
1063
Roland McGrath8ffc3522003-07-09 09:47:49 +00001064int
Denys Vlasenko12014262011-05-30 14:00:14 +02001065sys_tgkill(struct tcb *tcp)
Roland McGrath8ffc3522003-07-09 09:47:49 +00001066{
1067 if (entering(tcp)) {
1068 tprintf("%ld, %ld, %s",
Denys Vlasenkoe015d2d2013-02-15 14:58:52 +01001069 widen_to_long(tcp->u_arg[0]),
1070 widen_to_long(tcp->u_arg[1]),
1071 signame(tcp->u_arg[2])
1072 );
Roland McGrath8ffc3522003-07-09 09:47:49 +00001073 }
1074 return 0;
1075}
Roland McGrath8ffc3522003-07-09 09:47:49 +00001076
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001077int
Denys Vlasenko12014262011-05-30 14:00:14 +02001078sys_sigpending(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001079{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001080 if (exiting(tcp)) {
1081 if (syserror(tcp))
1082 tprintf("%#lx", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001083 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001084 print_sigset_addr_len(tcp, tcp->u_arg[0], current_wordsize);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001085 }
1086 return 0;
1087}
1088
Denys Vlasenko12014262011-05-30 14:00:14 +02001089int
1090sys_rt_sigprocmask(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001091{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001092 /* Note: arg[3] is the length of the sigset. Kernel requires NSIG / 8 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001093 if (entering(tcp)) {
1094 printxval(sigprocmaskcmds, tcp->u_arg[0], "SIG_???");
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001095 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001096 print_sigset_addr_len(tcp, tcp->u_arg[1], tcp->u_arg[3]);
1097 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001098 }
1099 else {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001100 if (syserror(tcp))
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001101 tprintf("%#lx", tcp->u_arg[2]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001102 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001103 print_sigset_addr_len(tcp, tcp->u_arg[2], tcp->u_arg[3]);
Nate Sammonsdab325a1999-03-29 23:33:35 +00001104 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001105 }
1106 return 0;
1107}
1108
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001109/* Structure describing the action to be taken when a signal arrives. */
1110struct new_sigaction
1111{
Denys Vlasenko86d94842013-02-08 12:59:13 +01001112 /* sa_handler may be a libc #define, need to use other name: */
Chris Dearman2b4bb1c2013-12-09 19:58:42 -08001113#ifdef MIPS
1114 unsigned int sa_flags;
1115 void (*__sa_handler)(int);
1116#else
Denys Vlasenko86d94842013-02-08 12:59:13 +01001117 void (*__sa_handler)(int);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001118 unsigned long sa_flags;
Chris Dearman2b4bb1c2013-12-09 19:58:42 -08001119#endif /* !MIPS */
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001120#ifdef SA_RESTORER
1121 void (*sa_restorer)(void);
1122#endif
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001123 /* Kernel treats sa_mask as an array of longs. */
1124 unsigned long sa_mask[NSIG / sizeof(long) ? NSIG / sizeof(long) : 1];
1125};
1126/* Same for i386-on-x86_64 and similar cases */
1127struct new_sigaction32
1128{
1129 uint32_t __sa_handler;
1130 uint32_t sa_flags;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001131#ifdef SA_RESTORER
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001132 uint32_t sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001133#endif
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001134 uint32_t sa_mask[2 * (NSIG / sizeof(long) ? NSIG / sizeof(long) : 1)];
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001135};
1136
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001137static void
1138decode_new_sigaction(struct tcb *tcp, long addr)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001139{
1140 struct new_sigaction sa;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001141 int r;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001142
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001143 if (!addr) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001144 tprints("NULL");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001145 return;
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001146 }
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001147 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp))) {
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001148 tprintf("%#lx", addr);
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001149 return;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001150 }
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001151#if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
Denys Vlasenko9fd4f962012-03-19 09:36:42 +01001152 if (current_wordsize != sizeof(sa.sa_flags) && current_wordsize == 4) {
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001153 struct new_sigaction32 sa32;
1154 r = umove(tcp, addr, &sa32);
1155 if (r >= 0) {
1156 memset(&sa, 0, sizeof(sa));
1157 sa.__sa_handler = (void*)(unsigned long)sa32.__sa_handler;
1158 sa.sa_flags = sa32.sa_flags;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001159#ifdef SA_RESTORER
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001160 sa.sa_restorer = (void*)(unsigned long)sa32.sa_restorer;
Vicente Olivert Rierac3a5c012014-09-11 20:05:18 +01001161#endif
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001162 /* Kernel treats sa_mask as an array of longs.
1163 * For 32-bit process, "long" is uint32_t, thus, for example,
1164 * 32th bit in sa_mask will end up as bit 0 in sa_mask[1].
1165 * But for (64-bit) kernel, 32th bit in sa_mask is
1166 * 32th bit in 0th (64-bit) long!
1167 * For little-endian, it's the same.
1168 * For big-endian, we swap 32-bit words.
1169 */
1170 sa.sa_mask[0] = sa32.sa_mask[0] + ((long)(sa32.sa_mask[1]) << 32);
1171 }
1172 } else
1173#endif
1174 {
1175 r = umove(tcp, addr, &sa);
1176 }
1177 if (r < 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001178 tprints("{...}");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001179 return;
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001180 }
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001181 /* Architectures using function pointers, like
1182 * hppa, may need to manipulate the function pointer
1183 * to compute the result of a comparison. However,
Denys Vlasenko86d94842013-02-08 12:59:13 +01001184 * the __sa_handler function pointer exists only in
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001185 * the address space of the traced process, and can't
1186 * be manipulated by strace. In order to prevent the
1187 * compiler from generating code to manipulate
Denys Vlasenko86d94842013-02-08 12:59:13 +01001188 * __sa_handler we cast the function pointers to long. */
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001189 if ((long)sa.__sa_handler == (long)SIG_ERR)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001190 tprints("{SIG_ERR, ");
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001191 else if ((long)sa.__sa_handler == (long)SIG_DFL)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001192 tprints("{SIG_DFL, ");
Carlos O'Donell4677c8a2009-09-09 18:13:19 +00001193 else if ((long)sa.__sa_handler == (long)SIG_IGN)
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001194 tprints("{SIG_IGN, ");
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001195 else
1196 tprintf("{%#lx, ", (long) sa.__sa_handler);
Denys Vlasenko80b73a22013-07-18 10:10:46 +02001197 /*
1198 * Sigset size is in tcp->u_arg[4] (SPARC)
1199 * or in tcp->u_arg[3] (all other),
1200 * but kernel won't handle sys_rt_sigaction
1201 * with wrong sigset size (just returns EINVAL instead).
1202 * We just fetch the right size, which is NSIG / 8.
1203 */
Dmitry V. Levin38593e92014-02-26 16:51:28 +00001204 tprintsigmask_val("", sa.sa_mask);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001205 tprints(", ");
Denys Vlasenko80b73a22013-07-18 10:10:46 +02001206
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001207 printflags(sigact_flags, sa.sa_flags, "SA_???");
1208#ifdef SA_RESTORER
1209 if (sa.sa_flags & SA_RESTORER)
1210 tprintf(", %p", sa.sa_restorer);
1211#endif
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001212 tprints("}");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001213}
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001214
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001215int
1216sys_rt_sigaction(struct tcb *tcp)
1217{
1218 if (entering(tcp)) {
1219 printsignal(tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001220 tprints(", ");
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001221 decode_new_sigaction(tcp, tcp->u_arg[1]);
1222 tprints(", ");
1223 } else {
1224 decode_new_sigaction(tcp, tcp->u_arg[2]);
Denys Vlasenko9472a272013-02-12 11:43:46 +01001225#if defined(SPARC) || defined(SPARC64)
Wichert Akkermandacfb6e1999-06-03 14:21:07 +00001226 tprintf(", %#lx, %lu", tcp->u_arg[3], tcp->u_arg[4]);
1227#elif defined(ALPHA)
1228 tprintf(", %lu, %#lx", tcp->u_arg[3], tcp->u_arg[4]);
1229#else
Denys Vlasenko7a862d72009-04-15 13:22:59 +00001230 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkermandacfb6e1999-06-03 14:21:07 +00001231#endif
Dmitry V. Levinac655a82014-01-07 22:41:30 +00001232 }
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001233 return 0;
1234}
1235
Denys Vlasenko1d632462009-04-14 12:51:00 +00001236int
1237sys_rt_sigpending(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001238{
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001239 if (exiting(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001240 /*
1241 * One of the few syscalls where sigset size (arg[1])
1242 * is allowed to be <= NSIG / 8, not strictly ==.
1243 * This allows non-rt sigpending() syscall
1244 * to reuse rt_sigpending() code in kernel.
1245 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001246 if (syserror(tcp))
1247 tprintf("%#lx", tcp->u_arg[0]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001248 else
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001249 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[1]);
1250 tprintf(", %lu", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001251 }
1252 return 0;
1253}
Denys Vlasenko1d632462009-04-14 12:51:00 +00001254
1255int
1256sys_rt_sigsuspend(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001257{
1258 if (entering(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001259 /* NB: kernel requires arg[1] == NSIG / 8 */
1260 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[1]);
1261 tprintf(", %lu", tcp->u_arg[1]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001262 }
1263 return 0;
1264}
Denys Vlasenko1d632462009-04-14 12:51:00 +00001265
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001266static void
1267print_sigqueueinfo(struct tcb *tcp, int sig, unsigned long uinfo)
1268{
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001269 printsignal(sig);
1270 tprints(", ");
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001271 printsiginfo_at(tcp, uinfo);
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001272}
1273
Denys Vlasenko1d632462009-04-14 12:51:00 +00001274int
1275sys_rt_sigqueueinfo(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001276{
1277 if (entering(tcp)) {
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001278 tprintf("%lu, ", tcp->u_arg[0]);
Dmitry V. Levin297632b2012-03-13 15:51:13 +00001279 print_sigqueueinfo(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1280 }
1281 return 0;
1282}
1283
1284int
1285sys_rt_tgsigqueueinfo(struct tcb *tcp)
1286{
1287 if (entering(tcp)) {
1288 tprintf("%lu, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
1289 print_sigqueueinfo(tcp, tcp->u_arg[2], tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001290 }
1291 return 0;
1292}
1293
Denys Vlasenko1d632462009-04-14 12:51:00 +00001294int sys_rt_sigtimedwait(struct tcb *tcp)
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001295{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001296 /* NB: kernel requires arg[3] == NSIG / 8 */
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001297 if (entering(tcp)) {
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001298 print_sigset_addr_len(tcp, tcp->u_arg[0], tcp->u_arg[3]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001299 tprints(", ");
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001300 /* This is the only "return" parameter, */
1301 if (tcp->u_arg[1] != 0)
1302 return 0;
1303 /* ... if it's NULL, can decode all on entry */
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001304 tprints("NULL, ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001305 }
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001306 else if (tcp->u_arg[1] != 0) {
1307 /* syscall exit, and u_arg[1] wasn't NULL */
Denys Vlasenkod4d3ede2013-02-13 16:31:32 +01001308 printsiginfo_at(tcp, tcp->u_arg[1]);
1309 tprints(", ");
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001310 }
Denys Vlasenkob1a78cf2009-04-15 13:31:59 +00001311 else {
1312 /* syscall exit, and u_arg[1] was NULL */
1313 return 0;
1314 }
1315 print_timespec(tcp, tcp->u_arg[2]);
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001316 tprintf(", %lu", tcp->u_arg[3]);
Wichert Akkerman76baf7c1999-02-19 00:21:36 +00001317 return 0;
1318};
1319
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001320int
Denys Vlasenko1d632462009-04-14 12:51:00 +00001321sys_restart_syscall(struct tcb *tcp)
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001322{
1323 if (entering(tcp))
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001324 tprints("<... resuming interrupted call ...>");
Roland McGrath79dcd7a2006-01-12 22:34:50 +00001325 return 0;
1326}
1327
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001328static int
1329do_signalfd(struct tcb *tcp, int flags_arg)
Roland McGrathf46ccd32007-08-02 01:15:59 +00001330{
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001331 /* NB: kernel requires arg[2] == NSIG / 8 */
Roland McGrathf46ccd32007-08-02 01:15:59 +00001332 if (entering(tcp)) {
Dmitry V. Levin31382132011-03-04 05:08:02 +03001333 printfd(tcp, tcp->u_arg[0]);
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001334 tprints(", ");
Denys Vlasenko5e133aa2013-07-18 17:02:21 +02001335 print_sigset_addr_len(tcp, tcp->u_arg[1], tcp->u_arg[2]);
Dmitry V. Levin9d2ee3d2009-10-05 13:45:19 +00001336 tprintf(", %lu", tcp->u_arg[2]);
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001337 if (flags_arg >= 0) {
Denys Vlasenko60fe8c12011-09-01 10:00:28 +02001338 tprints(", ");
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001339 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
1340 }
Roland McGrathf46ccd32007-08-02 01:15:59 +00001341 }
1342 return 0;
1343}
Dmitry V. Levin4371b102008-11-10 22:53:02 +00001344
1345int
1346sys_signalfd(struct tcb *tcp)
1347{
1348 return do_signalfd(tcp, -1);
1349}
1350
1351int
1352sys_signalfd4(struct tcb *tcp)
1353{
1354 return do_signalfd(tcp, 3);
1355}