blob: a1749e2946a41fed8ae7e3799a9b481532e17444 [file] [log] [blame]
florian15fa8a22015-03-03 14:56:17 +00001/* -*- mode: C; c-basic-offset: 3; -*- */
sewardjde4a1d02002-03-22 01:27:54 +00002
3/*--------------------------------------------------------------------*/
njned6b8242005-06-01 00:03:17 +00004/*--- Implementation of POSIX signals. m_signals.c ---*/
sewardjde4a1d02002-03-22 01:27:54 +00005/*--------------------------------------------------------------------*/
njned6b8242005-06-01 00:03:17 +00006
sewardjde4a1d02002-03-22 01:27:54 +00007/*
njnb9c427c2004-12-01 14:14:42 +00008 This file is part of Valgrind, a dynamic binary instrumentation
9 framework.
sewardjde4a1d02002-03-22 01:27:54 +000010
Elliott Hughesed398002017-06-21 14:41:24 -070011 Copyright (C) 2000-2017 Julian Seward
sewardjde4a1d02002-03-22 01:27:54 +000012 jseward@acm.org
sewardjde4a1d02002-03-22 01:27:54 +000013
14 This program is free software; you can redistribute it and/or
15 modify it under the terms of the GNU General Public License as
16 published by the Free Software Foundation; either version 2 of the
17 License, or (at your option) any later version.
18
19 This program is distributed in the hope that it will be useful, but
20 WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
22 General Public License for more details.
23
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
26 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
27 02111-1307, USA.
28
njn25e49d8e72002-09-23 09:36:25 +000029 The GNU General Public License is contained in the file COPYING.
sewardjde4a1d02002-03-22 01:27:54 +000030*/
31
jsgf855d93d2003-10-13 22:26:55 +000032/*
sewardjb5f6f512005-03-10 23:59:00 +000033 Signal handling.
jsgf855d93d2003-10-13 22:26:55 +000034
sewardjb5f6f512005-03-10 23:59:00 +000035 There are 4 distinct classes of signal:
jsgf855d93d2003-10-13 22:26:55 +000036
sewardjb5f6f512005-03-10 23:59:00 +000037 1. Synchronous, instruction-generated (SIGILL, FPE, BUS, SEGV and
38 TRAP): these are signals as a result of an instruction fault. If
39 we get one while running client code, then we just do the
40 appropriate thing. If it happens while running Valgrind code, then
41 it indicates a Valgrind bug. Note that we "manually" implement
42 automatic stack growth, such that if a fault happens near the
43 client process stack, it is extended in the same way the kernel
44 would, and the fault is never reported to the client program.
jsgf855d93d2003-10-13 22:26:55 +000045
njn1ee02e32009-05-04 06:54:04 +000046 2. Asynchronous variants of the above signals: If the kernel tries
sewardjb5f6f512005-03-10 23:59:00 +000047 to deliver a sync signal while it is blocked, it just kills the
48 process. Therefore, we can't block those signals if we want to be
49 able to report on bugs in Valgrind. This means that we're also
50 open to receiving those signals from other processes, sent with
51 kill. We could get away with just dropping them, since they aren't
52 really signals that processes send to each other.
jsgf855d93d2003-10-13 22:26:55 +000053
sewardjb5f6f512005-03-10 23:59:00 +000054 3. Synchronous, general signals. If a thread/process sends itself
55 a signal with kill, its expected to be synchronous: ie, the signal
56 will have been delivered by the time the syscall finishes.
57
sewardj67b38c32010-01-01 12:44:12 +000058 4. Asynchronous, general signals. All other signals, sent by
sewardjb5f6f512005-03-10 23:59:00 +000059 another process with kill. These are generally blocked, except for
60 two special cases: we poll for them each time we're about to run a
61 thread for a time quanta, and while running blocking syscalls.
jsgf855d93d2003-10-13 22:26:55 +000062
jsgf855d93d2003-10-13 22:26:55 +000063
sewardjebf58442010-03-01 16:42:56 +000064 In addition, we reserve one signal for internal use: SIGVGKILL.
sewardjb5f6f512005-03-10 23:59:00 +000065 SIGVGKILL is used to terminate threads. When one thread wants
66 another to exit, it will set its exitreason and send it SIGVGKILL
67 if it appears to be blocked in a syscall.
68
69
70 We use a kernel thread for each application thread. When the
71 thread allows itself to be open to signals, it sets the thread
72 signal mask to what the client application set it to. This means
73 that we get the kernel to do all signal routing: under Valgrind,
74 signals get delivered in the same way as in the non-Valgrind case
75 (the exception being for the sync signal set, since they're almost
76 always unblocked).
jsgf855d93d2003-10-13 22:26:55 +000077 */
sewardjde4a1d02002-03-22 01:27:54 +000078
njn1ee02e32009-05-04 06:54:04 +000079/*
80 Some more details...
81
82 First off, we take note of the client's requests (via sys_sigaction
83 and sys_sigprocmask) to set the signal state (handlers for each
84 signal, which are process-wide, + a mask for each signal, which is
85 per-thread). This info is duly recorded in the SCSS (static Client
86 signal state) in m_signals.c, and if the client later queries what
87 the state is, we merely fish the relevant info out of SCSS and give
88 it back.
89
90 However, we set the real signal state in the kernel to something
91 entirely different. This is recorded in SKSS, the static Kernel
92 signal state. What's nice (to the extent that anything is nice w.r.t
93 signals) is that there's a pure function to calculate SKSS from SCSS,
94 calculate_SKSS_from_SCSS. So when the client changes SCSS then we
95 recompute the associated SKSS and apply any changes from the previous
96 SKSS through to the kernel.
97
98 Now, that said, the general scheme we have now is, that regardless of
99 what the client puts into the SCSS (viz, asks for), what we would
100 like to do is as follows:
101
102 (1) run code on the virtual CPU with all signals blocked
103
104 (2) at convenient moments for us (that is, when the VCPU stops, and
105 control is back with the scheduler), ask the kernel "do you have
106 any signals for me?" and if it does, collect up the info, and
107 deliver them to the client (by building sigframes).
108
109 And that's almost what we do. The signal polling is done by
110 VG_(poll_signals), which calls through to VG_(sigtimedwait_zero) to
111 do the dirty work. (of which more later).
112
113 By polling signals, rather than catching them, we get to deal with
114 them only at convenient moments, rather than having to recover from
115 taking a signal while generated code is running.
116
117 Now unfortunately .. the above scheme only works for so-called async
118 signals. An async signal is one which isn't associated with any
119 particular instruction, eg Control-C (SIGINT). For those, it doesn't
120 matter if we don't deliver the signal to the client immediately; it
121 only matters that we deliver it eventually. Hence polling is OK.
122
123 But the other group -- sync signals -- are all related by the fact
124 that they are various ways for the host CPU to fail to execute an
125 instruction: SIGILL, SIGSEGV, SIGFPU. And they can't be deferred,
126 because obviously if a host instruction can't execute, well then we
127 have to immediately do Plan B, whatever that is.
128
129 So the next approximation of what happens is:
130
131 (1) run code on vcpu with all async signals blocked
132
133 (2) at convenient moments (when NOT running the vcpu), poll for async
134 signals.
135
136 (1) and (2) together imply that if the host does deliver a signal to
137 async_signalhandler while the VCPU is running, something's
138 seriously wrong.
139
140 (3) when running code on vcpu, don't block sync signals. Instead
141 register sync_signalhandler and catch any such via that. Of
142 course, that means an ugly recovery path if we do -- the
143 sync_signalhandler has to longjump, exiting out of the generated
144 code, and the assembly-dispatcher thingy that runs it, and gets
145 caught in m_scheduler, which then tells m_signals to deliver the
146 signal.
147
148 Now naturally (ha ha) even that might be tolerable, but there's
149 something worse: dealing with signals delivered to threads in
150 syscalls.
151
152 Obviously from the above, SKSS's signal mask (viz, what we really run
153 with) is way different from SCSS's signal mask (viz, what the client
154 thread thought it asked for). (eg) It may well be that the client
155 did not block control-C, so that it just expects to drop dead if it
156 receives ^C whilst blocked in a syscall, but by default we are
157 running with all async signals blocked, and so that signal could be
158 arbitrarily delayed, or perhaps even lost (not sure).
159
160 So what we have to do, when doing any syscall which SfMayBlock, is to
161 quickly switch in the SCSS-specified signal mask just before the
162 syscall, and switch it back just afterwards, and hope that we don't
florianad4e9792015-07-05 21:53:33 +0000163 get caught up in some weird race condition. This is the primary
njn1ee02e32009-05-04 06:54:04 +0000164 purpose of the ultra-magical pieces of assembly code in
165 coregrind/m_syswrap/syscall-<plat>.S
166
167 -----------
168
169 The ways in which V can come to hear of signals that need to be
170 forwarded to the client as are follows:
171
172 sync signals: can arrive at any time whatsoever. These are caught
173 by sync_signalhandler
174
175 async signals:
176
177 if running generated code
178 then these are blocked, so we don't expect to catch them in
179 async_signalhandler
180
181 else
182 if thread is blocked in a syscall marked SfMayBlock
183 then signals may be delivered to async_sighandler, since we
184 temporarily unblocked them for the duration of the syscall,
185 by using the real (SCSS) mask for this thread
186
187 else we're doing misc housekeeping activities (eg, making a translation,
188 washing our hair, etc). As in the normal case, these signals are
189 blocked, but we can and do poll for them using VG_(poll_signals).
190
191 Now, re VG_(poll_signals), it polls the kernel by doing
192 VG_(sigtimedwait_zero). This is trivial on Linux, since it's just a
193 syscall. But on Darwin and AIX, we have to cobble together the
194 functionality in a tedious, longwinded and probably error-prone way.
sewardj3b290482011-05-06 21:02:55 +0000195
196 Finally, if a gdb is debugging the process under valgrind,
197 the signal can be ignored if gdb tells this. So, before resuming the
198 scheduler/delivering the signal, a call to VG_(gdbserver_report_signal)
199 is done. If this returns True, the signal is delivered.
njn1ee02e32009-05-04 06:54:04 +0000200 */
201
njnc7561b92005-06-19 01:24:32 +0000202#include "pub_core_basics.h"
sewardj4cfea4f2006-10-14 19:26:10 +0000203#include "pub_core_vki.h"
sewardj489bfec2006-10-17 02:00:29 +0000204#include "pub_core_vkiscnums.h"
sewardj45f4e7c2005-09-27 19:20:21 +0000205#include "pub_core_debuglog.h"
njnc7561b92005-06-19 01:24:32 +0000206#include "pub_core_threadstate.h"
sewardj14c7cc52007-02-25 15:08:24 +0000207#include "pub_core_xarray.h"
sewardj45f4e7c2005-09-27 19:20:21 +0000208#include "pub_core_clientstate.h"
njn2521d322005-05-08 14:45:13 +0000209#include "pub_core_aspacemgr.h"
njnd2b17112005-04-19 04:10:25 +0000210#include "pub_core_errormgr.h"
sewardj3b290482011-05-06 21:02:55 +0000211#include "pub_core_gdbserver.h"
njn97405b22005-06-02 03:39:33 +0000212#include "pub_core_libcbase.h"
njn132bfcc2005-06-04 19:16:06 +0000213#include "pub_core_libcassert.h"
njn36a20fa2005-06-03 03:08:39 +0000214#include "pub_core_libcprint.h"
njnf39e9a32005-06-12 02:43:17 +0000215#include "pub_core_libcproc.h"
njnde62cbf2005-06-10 22:08:14 +0000216#include "pub_core_libcsignal.h"
njnf536bbb2005-06-13 04:21:38 +0000217#include "pub_core_machine.h"
njnaf1d7df2005-06-11 01:31:52 +0000218#include "pub_core_mallocfree.h"
njn20242342005-05-16 23:31:24 +0000219#include "pub_core_options.h"
njnc7561b92005-06-19 01:24:32 +0000220#include "pub_core_scheduler.h"
njn0c246472005-05-31 01:00:08 +0000221#include "pub_core_signals.h"
njn24a6efb2005-06-20 03:36:51 +0000222#include "pub_core_sigframe.h" // For VG_(sigframe_create)()
njn945ed2e2005-06-24 03:28:30 +0000223#include "pub_core_stacks.h" // For VG_(change_stack)()
njn24a6efb2005-06-20 03:36:51 +0000224#include "pub_core_stacktrace.h" // For VG_(get_and_pp_StackTrace)()
njn9abd6082005-06-17 21:31:45 +0000225#include "pub_core_syscall.h"
njnc1b01812005-06-17 22:19:06 +0000226#include "pub_core_syswrap.h"
njn43b9a8a2005-05-10 04:37:01 +0000227#include "pub_core_tooliface.h"
sewardjcf4ac712005-11-01 00:03:40 +0000228#include "pub_core_coredump.h"
sewardj985fabb2005-04-24 14:18:14 +0000229
njnd2b17112005-04-19 04:10:25 +0000230
sewardj018f7622002-05-15 21:13:39 +0000231/* ---------------------------------------------------------------------
232 Forwards decls.
233 ------------------------------------------------------------------ */
234
njn5a350be2009-04-30 03:05:05 +0000235static void sync_signalhandler ( Int sigNo, vki_siginfo_t *info,
236 struct vki_ucontext * );
237static void async_signalhandler ( Int sigNo, vki_siginfo_t *info,
238 struct vki_ucontext * );
239static void sigvgkill_handler ( Int sigNo, vki_siginfo_t *info,
240 struct vki_ucontext * );
sewardj018f7622002-05-15 21:13:39 +0000241
sewardjb5f6f512005-03-10 23:59:00 +0000242/* Maximum usable signal. */
243Int VG_(max_signal) = _VKI_NSIG;
nethercote759dda32004-08-07 18:16:56 +0000244
sewardjb5f6f512005-03-10 23:59:00 +0000245#define N_QUEUED_SIGNALS 8
nethercote759dda32004-08-07 18:16:56 +0000246
sewardjb5f6f512005-03-10 23:59:00 +0000247typedef struct SigQueue {
248 Int next;
249 vki_siginfo_t sigs[N_QUEUED_SIGNALS];
250} SigQueue;
nethercote759dda32004-08-07 18:16:56 +0000251
sewardj489bfec2006-10-17 02:00:29 +0000252/* ------ Macros for pulling stuff out of ucontexts ------ */
253
njncda2f0f2009-05-18 02:12:08 +0000254/* Q: what does VG_UCONTEXT_SYSCALL_SYSRES do? A: let's suppose the
njn5a350be2009-04-30 03:05:05 +0000255 machine context (uc) reflects the situation that a syscall had just
256 completed, quite literally -- that is, that the program counter was
257 now at the instruction following the syscall. (or we're slightly
258 downstream, but we're sure no relevant register has yet changed
njncda2f0f2009-05-18 02:12:08 +0000259 value.) Then VG_UCONTEXT_SYSCALL_SYSRES returns a SysRes reflecting
njn5a350be2009-04-30 03:05:05 +0000260 the result of the syscall; it does this by fishing relevant bits of
261 the machine state out of the uc. Of course if the program counter
262 was somewhere else entirely then the result is likely to be
njncda2f0f2009-05-18 02:12:08 +0000263 meaningless, so the caller of VG_UCONTEXT_SYSCALL_SYSRES has to be
njn5a350be2009-04-30 03:05:05 +0000264 very careful to pay attention to the results only when it is sure
265 that the said constraint on the program counter is indeed valid. */
sewardjf5f1e122010-01-02 13:24:58 +0000266
njn605f4882005-05-29 17:50:40 +0000267#if defined(VGP_x86_linux)
njnaf839f52005-06-23 03:27:57 +0000268# define VG_UCONTEXT_INSTR_PTR(uc) ((uc)->uc_mcontext.eip)
269# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_mcontext.esp)
sewardjacaec5f2005-08-19 16:02:59 +0000270# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
sewardja8d8e232005-06-07 20:04:56 +0000271 /* Convert the value in uc_mcontext.eax into a SysRes. */ \
cerion85665ca2005-06-20 15:51:07 +0000272 VG_(mk_SysRes_x86_linux)( (uc)->uc_mcontext.eax )
sewardj59570ff2010-01-01 11:59:33 +0000273# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
274 { (srP)->r_pc = (ULong)((uc)->uc_mcontext.eip); \
275 (srP)->r_sp = (ULong)((uc)->uc_mcontext.esp); \
276 (srP)->misc.X86.r_ebp = (uc)->uc_mcontext.ebp; \
277 }
sewardje7aa4ae2005-06-09 12:43:42 +0000278
njn605f4882005-05-29 17:50:40 +0000279#elif defined(VGP_amd64_linux)
njnaf839f52005-06-23 03:27:57 +0000280# define VG_UCONTEXT_INSTR_PTR(uc) ((uc)->uc_mcontext.rip)
281# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_mcontext.rsp)
sewardjacaec5f2005-08-19 16:02:59 +0000282# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
sewardje7aa4ae2005-06-09 12:43:42 +0000283 /* Convert the value in uc_mcontext.rax into a SysRes. */ \
cerion85665ca2005-06-20 15:51:07 +0000284 VG_(mk_SysRes_amd64_linux)( (uc)->uc_mcontext.rax )
sewardj59570ff2010-01-01 11:59:33 +0000285# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
286 { (srP)->r_pc = (uc)->uc_mcontext.rip; \
287 (srP)->r_sp = (uc)->uc_mcontext.rsp; \
288 (srP)->misc.AMD64.r_rbp = (uc)->uc_mcontext.rbp; \
289 }
sewardje7aa4ae2005-06-09 12:43:42 +0000290
cerion85665ca2005-06-20 15:51:07 +0000291#elif defined(VGP_ppc32_linux)
sewardja36dcfa2005-11-25 02:16:58 +0000292/* Comments from Paul Mackerras 25 Nov 05:
293
294 > I'm tracking down a problem where V's signal handling doesn't
295 > work properly on a ppc440gx running 2.4.20. The problem is that
296 > the ucontext being presented to V's sighandler seems completely
297 > bogus.
298
299 > V's kernel headers and hence ucontext layout are derived from
300 > 2.6.9. I compared include/asm-ppc/ucontext.h from 2.4.20 and
301 > 2.6.13.
302
303 > Can I just check my interpretation: the 2.4.20 one contains the
304 > uc_mcontext field in line, whereas the 2.6.13 one has a pointer
305 > to said struct? And so if V is using the 2.6.13 struct then a
306 > 2.4.20 one will make no sense to it.
307
308 Not quite... what is inline in the 2.4.20 version is a
309 sigcontext_struct, not an mcontext. The sigcontext looks like
310 this:
311
312 struct sigcontext_struct {
313 unsigned long _unused[4];
314 int signal;
315 unsigned long handler;
316 unsigned long oldmask;
317 struct pt_regs *regs;
318 };
319
320 The regs pointer of that struct ends up at the same offset as the
321 uc_regs of the 2.6 struct ucontext, and a struct pt_regs is the
322 same as the mc_gregs field of the mcontext. In fact the integer
323 regs are followed in memory by the floating point regs on 2.4.20.
324
325 Thus if you are using the 2.6 definitions, it should work on 2.4.20
326 provided that you go via uc->uc_regs rather than looking in
327 uc->uc_mcontext directly.
328
329 There is another subtlety: 2.4.20 doesn't save the vector regs when
330 delivering a signal, and 2.6.x only saves the vector regs if the
331 process has ever used an altivec instructions. If 2.6.x does save
332 the vector regs, it sets the MSR_VEC bit in
333 uc->uc_regs->mc_gregs[PT_MSR], otherwise it clears it. That bit
334 will always be clear under 2.4.20. So you can use that bit to tell
335 whether uc->uc_regs->mc_vregs is valid. */
sewardjf5f1e122010-01-02 13:24:58 +0000336# define VG_UCONTEXT_INSTR_PTR(uc) ((uc)->uc_regs->mc_gregs[VKI_PT_NIP])
337# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_regs->mc_gregs[VKI_PT_R1])
sewardj39a7c1d2005-11-24 03:54:38 +0000338# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
339 /* Convert the values in uc_mcontext r3,cr into a SysRes. */ \
340 VG_(mk_SysRes_ppc32_linux)( \
sewardja36dcfa2005-11-25 02:16:58 +0000341 (uc)->uc_regs->mc_gregs[VKI_PT_R3], \
342 (((uc)->uc_regs->mc_gregs[VKI_PT_CCR] >> 28) & 1) \
sewardj39a7c1d2005-11-24 03:54:38 +0000343 )
sewardjf5f1e122010-01-02 13:24:58 +0000344# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
345 { (srP)->r_pc = (ULong)((uc)->uc_regs->mc_gregs[VKI_PT_NIP]); \
346 (srP)->r_sp = (ULong)((uc)->uc_regs->mc_gregs[VKI_PT_R1]); \
347 (srP)->misc.PPC32.r_lr = (uc)->uc_regs->mc_gregs[VKI_PT_LNK]; \
348 }
cerion85665ca2005-06-20 15:51:07 +0000349
carllcae0cc22014-08-07 23:17:29 +0000350#elif defined(VGP_ppc64be_linux) || defined(VGP_ppc64le_linux)
sewardjf5f1e122010-01-02 13:24:58 +0000351# define VG_UCONTEXT_INSTR_PTR(uc) ((uc)->uc_mcontext.gp_regs[VKI_PT_NIP])
352# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_mcontext.gp_regs[VKI_PT_R1])
sewardjdcb6ec82006-01-19 03:44:10 +0000353 /* Dubious hack: if there is an error, only consider the lowest 8
354 bits of r3. memcheck/tests/post-syscall shows a case where an
355 interrupted syscall should have produced a ucontext with 0x4
356 (VKI_EINTR) in r3 but is in fact producing 0x204. */
357 /* Awaiting clarification from PaulM. Evidently 0x204 is
358 ERESTART_RESTARTBLOCK, which shouldn't have made it into user
359 space. */
360 static inline SysRes VG_UCONTEXT_SYSCALL_SYSRES( struct vki_ucontext* uc )
361 {
362 ULong err = (uc->uc_mcontext.gp_regs[VKI_PT_CCR] >> 28) & 1;
363 ULong r3 = uc->uc_mcontext.gp_regs[VKI_PT_R3];
364 if (err) r3 &= 0xFF;
365 return VG_(mk_SysRes_ppc64_linux)( r3, err );
366 }
sewardjf5f1e122010-01-02 13:24:58 +0000367# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
368 { (srP)->r_pc = (uc)->uc_mcontext.gp_regs[VKI_PT_NIP]; \
369 (srP)->r_sp = (uc)->uc_mcontext.gp_regs[VKI_PT_R1]; \
370 (srP)->misc.PPC64.r_lr = (uc)->uc_mcontext.gp_regs[VKI_PT_LNK]; \
371 }
sewardj2c48c7b2005-11-29 13:05:56 +0000372
sewardj59570ff2010-01-01 11:59:33 +0000373#elif defined(VGP_arm_linux)
374# define VG_UCONTEXT_INSTR_PTR(uc) ((uc)->uc_mcontext.arm_pc)
375# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_mcontext.arm_sp)
376# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
377 /* Convert the value in uc_mcontext.rax into a SysRes. */ \
378 VG_(mk_SysRes_arm_linux)( (uc)->uc_mcontext.arm_r0 )
379# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
380 { (srP)->r_pc = (uc)->uc_mcontext.arm_pc; \
381 (srP)->r_sp = (uc)->uc_mcontext.arm_sp; \
382 (srP)->misc.ARM.r14 = (uc)->uc_mcontext.arm_lr; \
383 (srP)->misc.ARM.r12 = (uc)->uc_mcontext.arm_ip; \
384 (srP)->misc.ARM.r11 = (uc)->uc_mcontext.arm_fp; \
sewardjfa5ce562010-09-23 22:05:59 +0000385 (srP)->misc.ARM.r7 = (uc)->uc_mcontext.arm_r7; \
sewardj59570ff2010-01-01 11:59:33 +0000386 }
387
sewardjf0c12502014-01-12 12:54:00 +0000388#elif defined(VGP_arm64_linux)
389# define VG_UCONTEXT_INSTR_PTR(uc) ((UWord)((uc)->uc_mcontext.pc))
390# define VG_UCONTEXT_STACK_PTR(uc) ((UWord)((uc)->uc_mcontext.sp))
391# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
392 /* Convert the value in uc_mcontext.regs[0] into a SysRes. */ \
393 VG_(mk_SysRes_arm64_linux)( (uc)->uc_mcontext.regs[0] )
394# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
395 { (srP)->r_pc = (uc)->uc_mcontext.pc; \
396 (srP)->r_sp = (uc)->uc_mcontext.sp; \
397 (srP)->misc.ARM64.x29 = (uc)->uc_mcontext.regs[29]; \
398 (srP)->misc.ARM64.x30 = (uc)->uc_mcontext.regs[30]; \
399 }
400
njnf76d27a2009-05-28 01:53:07 +0000401#elif defined(VGP_x86_darwin)
402
403 static inline Addr VG_UCONTEXT_INSTR_PTR( void* ucV ) {
404 ucontext_t* uc = (ucontext_t*)ucV;
405 struct __darwin_mcontext32* mc = uc->uc_mcontext;
406 struct __darwin_i386_thread_state* ss = &mc->__ss;
407 return ss->__eip;
408 }
409 static inline Addr VG_UCONTEXT_STACK_PTR( void* ucV ) {
410 ucontext_t* uc = (ucontext_t*)ucV;
411 struct __darwin_mcontext32* mc = uc->uc_mcontext;
412 struct __darwin_i386_thread_state* ss = &mc->__ss;
413 return ss->__esp;
414 }
415 static inline SysRes VG_UCONTEXT_SYSCALL_SYSRES( void* ucV,
416 UWord scclass ) {
417 /* this is complicated by the problem that there are 3 different
418 kinds of syscalls, each with its own return convention.
419 NB: scclass is a host word, hence UWord is good for both
420 amd64-darwin and x86-darwin */
421 ucontext_t* uc = (ucontext_t*)ucV;
422 struct __darwin_mcontext32* mc = uc->uc_mcontext;
423 struct __darwin_i386_thread_state* ss = &mc->__ss;
424 /* duplicates logic in m_syswrap.getSyscallStatusFromGuestState */
425 UInt carry = 1 & ss->__eflags;
426 UInt err = 0;
427 UInt wLO = 0;
428 UInt wHI = 0;
429 switch (scclass) {
430 case VG_DARWIN_SYSCALL_CLASS_UNIX:
431 err = carry;
432 wLO = ss->__eax;
433 wHI = ss->__edx;
434 break;
435 case VG_DARWIN_SYSCALL_CLASS_MACH:
436 wLO = ss->__eax;
437 break;
438 case VG_DARWIN_SYSCALL_CLASS_MDEP:
439 wLO = ss->__eax;
440 break;
441 default:
442 vg_assert(0);
443 break;
444 }
445 return VG_(mk_SysRes_x86_darwin)( scclass, err ? True : False,
446 wHI, wLO );
447 }
sewardj67b38c32010-01-01 12:44:12 +0000448 static inline
449 void VG_UCONTEXT_TO_UnwindStartRegs( UnwindStartRegs* srP,
450 void* ucV ) {
451 ucontext_t* uc = (ucontext_t*)(ucV);
njnf76d27a2009-05-28 01:53:07 +0000452 struct __darwin_mcontext32* mc = uc->uc_mcontext;
453 struct __darwin_i386_thread_state* ss = &mc->__ss;
sewardj67b38c32010-01-01 12:44:12 +0000454 srP->r_pc = (ULong)(ss->__eip);
455 srP->r_sp = (ULong)(ss->__esp);
456 srP->misc.X86.r_ebp = (UInt)(ss->__ebp);
njnf76d27a2009-05-28 01:53:07 +0000457 }
458
459#elif defined(VGP_amd64_darwin)
460
461 static inline Addr VG_UCONTEXT_INSTR_PTR( void* ucV ) {
sewardj625c3e72012-03-27 08:44:17 +0000462 ucontext_t* uc = (ucontext_t*)ucV;
463 struct __darwin_mcontext64* mc = uc->uc_mcontext;
464 struct __darwin_x86_thread_state64* ss = &mc->__ss;
465 return ss->__rip;
njnf76d27a2009-05-28 01:53:07 +0000466 }
467 static inline Addr VG_UCONTEXT_STACK_PTR( void* ucV ) {
sewardj625c3e72012-03-27 08:44:17 +0000468 ucontext_t* uc = (ucontext_t*)ucV;
469 struct __darwin_mcontext64* mc = uc->uc_mcontext;
470 struct __darwin_x86_thread_state64* ss = &mc->__ss;
471 return ss->__rsp;
njnf76d27a2009-05-28 01:53:07 +0000472 }
473 static inline SysRes VG_UCONTEXT_SYSCALL_SYSRES( void* ucV,
474 UWord scclass ) {
sewardj625c3e72012-03-27 08:44:17 +0000475 /* This is copied from the x86-darwin case. I'm not sure if it
476 is correct. */
477 ucontext_t* uc = (ucontext_t*)ucV;
478 struct __darwin_mcontext64* mc = uc->uc_mcontext;
479 struct __darwin_x86_thread_state64* ss = &mc->__ss;
480 /* duplicates logic in m_syswrap.getSyscallStatusFromGuestState */
481 ULong carry = 1 & ss->__rflags;
482 ULong err = 0;
483 ULong wLO = 0;
484 ULong wHI = 0;
485 switch (scclass) {
486 case VG_DARWIN_SYSCALL_CLASS_UNIX:
487 err = carry;
488 wLO = ss->__rax;
489 wHI = ss->__rdx;
490 break;
491 case VG_DARWIN_SYSCALL_CLASS_MACH:
492 wLO = ss->__rax;
493 break;
494 case VG_DARWIN_SYSCALL_CLASS_MDEP:
495 wLO = ss->__rax;
496 break;
497 default:
498 vg_assert(0);
499 break;
500 }
501 return VG_(mk_SysRes_amd64_darwin)( scclass, err ? True : False,
502 wHI, wLO );
njnf76d27a2009-05-28 01:53:07 +0000503 }
njnea2d6fd2010-07-01 00:20:20 +0000504 static inline
505 void VG_UCONTEXT_TO_UnwindStartRegs( UnwindStartRegs* srP,
506 void* ucV ) {
sewardj625c3e72012-03-27 08:44:17 +0000507 ucontext_t* uc = (ucontext_t*)ucV;
508 struct __darwin_mcontext64* mc = uc->uc_mcontext;
509 struct __darwin_x86_thread_state64* ss = &mc->__ss;
510 srP->r_pc = (ULong)(ss->__rip);
511 srP->r_sp = (ULong)(ss->__rsp);
512 srP->misc.AMD64.r_rbp = (ULong)(ss->__rbp);
njnf76d27a2009-05-28 01:53:07 +0000513 }
514
sewardjb5b87402011-03-07 16:05:35 +0000515#elif defined(VGP_s390x_linux)
516
517# define VG_UCONTEXT_INSTR_PTR(uc) ((uc)->uc_mcontext.regs.psw.addr)
518# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_mcontext.regs.gprs[15])
519# define VG_UCONTEXT_FRAME_PTR(uc) ((uc)->uc_mcontext.regs.gprs[11])
520# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
521 VG_(mk_SysRes_s390x_linux)((uc)->uc_mcontext.regs.gprs[2])
522# define VG_UCONTEXT_LINK_REG(uc) ((uc)->uc_mcontext.regs.gprs[14])
523
524# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
525 { (srP)->r_pc = (ULong)((uc)->uc_mcontext.regs.psw.addr); \
526 (srP)->r_sp = (ULong)((uc)->uc_mcontext.regs.gprs[15]); \
527 (srP)->misc.S390X.r_fp = (uc)->uc_mcontext.regs.gprs[11]; \
528 (srP)->misc.S390X.r_lr = (uc)->uc_mcontext.regs.gprs[14]; \
529 }
530
sewardj5db15402012-06-07 09:13:21 +0000531#elif defined(VGP_mips32_linux)
532# define VG_UCONTEXT_INSTR_PTR(uc) ((UWord)(((uc)->uc_mcontext.sc_pc)))
533# define VG_UCONTEXT_STACK_PTR(uc) ((UWord)((uc)->uc_mcontext.sc_regs[29]))
534# define VG_UCONTEXT_FRAME_PTR(uc) ((uc)->uc_mcontext.sc_regs[30])
535# define VG_UCONTEXT_SYSCALL_NUM(uc) ((uc)->uc_mcontext.sc_regs[2])
536# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
537 /* Convert the value in uc_mcontext.rax into a SysRes. */ \
538 VG_(mk_SysRes_mips32_linux)( (uc)->uc_mcontext.sc_regs[2], \
539 (uc)->uc_mcontext.sc_regs[3], \
540 (uc)->uc_mcontext.sc_regs[7])
541
542# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
543 { (srP)->r_pc = (uc)->uc_mcontext.sc_pc; \
544 (srP)->r_sp = (uc)->uc_mcontext.sc_regs[29]; \
545 (srP)->misc.MIPS32.r30 = (uc)->uc_mcontext.sc_regs[30]; \
546 (srP)->misc.MIPS32.r31 = (uc)->uc_mcontext.sc_regs[31]; \
547 (srP)->misc.MIPS32.r28 = (uc)->uc_mcontext.sc_regs[28]; \
548 }
549
petarj4df0bfc2013-02-27 23:17:33 +0000550#elif defined(VGP_mips64_linux)
551# define VG_UCONTEXT_INSTR_PTR(uc) (((uc)->uc_mcontext.sc_pc))
552# define VG_UCONTEXT_STACK_PTR(uc) ((uc)->uc_mcontext.sc_regs[29])
553# define VG_UCONTEXT_FRAME_PTR(uc) ((uc)->uc_mcontext.sc_regs[30])
554# define VG_UCONTEXT_SYSCALL_NUM(uc) ((uc)->uc_mcontext.sc_regs[2])
555# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
556 /* Convert the value in uc_mcontext.rax into a SysRes. */ \
557 VG_(mk_SysRes_mips64_linux)((uc)->uc_mcontext.sc_regs[2], \
558 (uc)->uc_mcontext.sc_regs[3], \
559 (uc)->uc_mcontext.sc_regs[7])
560
561# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
562 { (srP)->r_pc = (uc)->uc_mcontext.sc_pc; \
563 (srP)->r_sp = (uc)->uc_mcontext.sc_regs[29]; \
564 (srP)->misc.MIPS64.r30 = (uc)->uc_mcontext.sc_regs[30]; \
565 (srP)->misc.MIPS64.r31 = (uc)->uc_mcontext.sc_regs[31]; \
566 (srP)->misc.MIPS64.r28 = (uc)->uc_mcontext.sc_regs[28]; \
567 }
sewardj8eb8bab2015-07-21 14:44:28 +0000568
sewardj8eb8bab2015-07-21 14:44:28 +0000569#elif defined(VGP_x86_solaris)
570# define VG_UCONTEXT_INSTR_PTR(uc) ((Addr)(uc)->uc_mcontext.gregs[VKI_EIP])
571# define VG_UCONTEXT_STACK_PTR(uc) ((Addr)(uc)->uc_mcontext.gregs[VKI_UESP])
572# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
573 VG_(mk_SysRes_x86_solaris)((uc)->uc_mcontext.gregs[VKI_EFL] & 1, \
574 (uc)->uc_mcontext.gregs[VKI_EAX], \
575 (uc)->uc_mcontext.gregs[VKI_EFL] & 1 \
576 ? 0 : (uc)->uc_mcontext.gregs[VKI_EDX])
577# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
578 { (srP)->r_pc = (ULong)(uc)->uc_mcontext.gregs[VKI_EIP]; \
579 (srP)->r_sp = (ULong)(uc)->uc_mcontext.gregs[VKI_UESP]; \
580 (srP)->misc.X86.r_ebp = (uc)->uc_mcontext.gregs[VKI_EBP]; \
581 }
582
583#elif defined(VGP_amd64_solaris)
584# define VG_UCONTEXT_INSTR_PTR(uc) ((Addr)(uc)->uc_mcontext.gregs[VKI_REG_RIP])
585# define VG_UCONTEXT_STACK_PTR(uc) ((Addr)(uc)->uc_mcontext.gregs[VKI_REG_RSP])
586# define VG_UCONTEXT_SYSCALL_SYSRES(uc) \
587 VG_(mk_SysRes_amd64_solaris)((uc)->uc_mcontext.gregs[VKI_REG_RFL] & 1, \
588 (uc)->uc_mcontext.gregs[VKI_REG_RAX], \
589 (uc)->uc_mcontext.gregs[VKI_REG_RFL] & 1 \
590 ? 0 : (uc)->uc_mcontext.gregs[VKI_REG_RDX])
591# define VG_UCONTEXT_TO_UnwindStartRegs(srP, uc) \
592 { (srP)->r_pc = (uc)->uc_mcontext.gregs[VKI_REG_RIP]; \
593 (srP)->r_sp = (uc)->uc_mcontext.gregs[VKI_REG_RSP]; \
594 (srP)->misc.AMD64.r_rbp = (uc)->uc_mcontext.gregs[VKI_REG_RBP]; \
595 }
sewardj112711a2015-04-10 12:30:09 +0000596#else
njn605f4882005-05-29 17:50:40 +0000597# error Unknown platform
598#endif
599
sewardj489bfec2006-10-17 02:00:29 +0000600
601/* ------ Macros for pulling stuff out of siginfos ------ */
602
603/* These macros allow use of uniform names when working with
floriand2190292015-01-08 21:05:03 +0000604 both the Linux and Darwin vki definitions. */
sewardj489bfec2006-10-17 02:00:29 +0000605#if defined(VGO_linux)
606# define VKI_SIGINFO_si_addr _sifields._sigfault._addr
607# define VKI_SIGINFO_si_pid _sifields._kill._pid
sewardj8eb8bab2015-07-21 14:44:28 +0000608#elif defined(VGO_darwin) || defined(VGO_solaris)
njnf76d27a2009-05-28 01:53:07 +0000609# define VKI_SIGINFO_si_addr si_addr
610# define VKI_SIGINFO_si_pid si_pid
sewardj489bfec2006-10-17 02:00:29 +0000611#else
612# error Unknown OS
613#endif
614
615
nethercote759dda32004-08-07 18:16:56 +0000616/* ---------------------------------------------------------------------
sewardj018f7622002-05-15 21:13:39 +0000617 HIGH LEVEL STUFF TO DO WITH SIGNALS: POLICY (MOSTLY)
618 ------------------------------------------------------------------ */
619
sewardjde4a1d02002-03-22 01:27:54 +0000620/* ---------------------------------------------------------------------
sewardjde4a1d02002-03-22 01:27:54 +0000621 Signal state for this process.
622 ------------------------------------------------------------------ */
623
sewardj018f7622002-05-15 21:13:39 +0000624
nethercote73b526f2004-10-31 18:48:21 +0000625/* Base-ment of these arrays[_VKI_NSIG].
sewardjb48e5002002-05-13 00:16:03 +0000626
nethercote73b526f2004-10-31 18:48:21 +0000627 Valid signal numbers are 1 .. _VKI_NSIG inclusive.
sewardjb48e5002002-05-13 00:16:03 +0000628 Rather than subtracting 1 for indexing these arrays, which
629 is tedious and error-prone, they are simply dimensioned 1 larger,
630 and entry [0] is not used.
631 */
632
sewardjb48e5002002-05-13 00:16:03 +0000633
sewardj018f7622002-05-15 21:13:39 +0000634/* -----------------------------------------------------
635 Static client signal state (SCSS). This is the state
636 that the client thinks it has the kernel in.
637 SCSS records verbatim the client's settings. These
638 are mashed around only when SKSS is calculated from it.
639 -------------------------------------------------- */
sewardjb48e5002002-05-13 00:16:03 +0000640
sewardj018f7622002-05-15 21:13:39 +0000641typedef
642 struct {
643 void* scss_handler; /* VKI_SIG_DFL or VKI_SIG_IGN or ptr to
644 client's handler */
645 UInt scss_flags;
nethercote73b526f2004-10-31 18:48:21 +0000646 vki_sigset_t scss_mask;
sewardjb5f6f512005-03-10 23:59:00 +0000647 void* scss_restorer; /* where sigreturn goes */
njncda2f0f2009-05-18 02:12:08 +0000648 void* scss_sa_tramp; /* sa_tramp setting, Darwin only */
649 /* re _restorer and _sa_tramp, we merely record the values
650 supplied when the client does 'sigaction' and give them back
651 when requested. Otherwise they are simply ignored. */
sewardj018f7622002-05-15 21:13:39 +0000652 }
653 SCSS_Per_Signal;
sewardjb48e5002002-05-13 00:16:03 +0000654
sewardj018f7622002-05-15 21:13:39 +0000655typedef
656 struct {
sewardj2342c972002-05-22 23:34:20 +0000657 /* per-signal info */
nethercote73b526f2004-10-31 18:48:21 +0000658 SCSS_Per_Signal scss_per_sig[1+_VKI_NSIG];
sewardj2342c972002-05-22 23:34:20 +0000659
sewardj018f7622002-05-15 21:13:39 +0000660 /* Additional elements to SCSS not stored here:
661 - for each thread, the thread's blocking mask
662 - for each thread in WaitSIG, the set of waited-on sigs
663 */
664 }
665 SCSS;
sewardjb48e5002002-05-13 00:16:03 +0000666
njn695c16e2005-03-27 03:40:28 +0000667static SCSS scss;
sewardj018f7622002-05-15 21:13:39 +0000668
669
670/* -----------------------------------------------------
671 Static kernel signal state (SKSS). This is the state
672 that we have the kernel in. It is computed from SCSS.
673 -------------------------------------------------- */
674
675/* Let's do:
676 sigprocmask assigns to all thread masks
677 so that at least everything is always consistent
678 Flags:
jsgf855d93d2003-10-13 22:26:55 +0000679 SA_SIGINFO -- we always set it, and honour it for the client
sewardj018f7622002-05-15 21:13:39 +0000680 SA_NOCLDSTOP -- passed to kernel
sewardjb5f6f512005-03-10 23:59:00 +0000681 SA_ONESHOT or SA_RESETHAND -- pass through
jsgf855d93d2003-10-13 22:26:55 +0000682 SA_RESTART -- we observe this but set our handlers to always restart
sewardj8eb8bab2015-07-21 14:44:28 +0000683 (this doesn't apply to the Solaris port)
jsgf855d93d2003-10-13 22:26:55 +0000684 SA_NOMASK or SA_NODEFER -- we observe this, but our handlers block everything
sewardjb5f6f512005-03-10 23:59:00 +0000685 SA_ONSTACK -- pass through
686 SA_NOCLDWAIT -- pass through
sewardjb48e5002002-05-13 00:16:03 +0000687*/
sewardjde4a1d02002-03-22 01:27:54 +0000688
sewardj77e466c2002-04-14 02:29:29 +0000689
sewardj018f7622002-05-15 21:13:39 +0000690typedef
691 struct {
692 void* skss_handler; /* VKI_SIG_DFL or VKI_SIG_IGN
693 or ptr to our handler */
694 UInt skss_flags;
695 /* There is no skss_mask, since we know that we will always ask
jsgf855d93d2003-10-13 22:26:55 +0000696 for all signals to be blocked in our sighandlers. */
sewardj018f7622002-05-15 21:13:39 +0000697 /* Also there is no skss_restorer. */
698 }
699 SKSS_Per_Signal;
sewardjde4a1d02002-03-22 01:27:54 +0000700
sewardj018f7622002-05-15 21:13:39 +0000701typedef
702 struct {
nethercote73b526f2004-10-31 18:48:21 +0000703 SKSS_Per_Signal skss_per_sig[1+_VKI_NSIG];
sewardj018f7622002-05-15 21:13:39 +0000704 }
705 SKSS;
706
njn695c16e2005-03-27 03:40:28 +0000707static SKSS skss;
sewardjde4a1d02002-03-22 01:27:54 +0000708
sewardj3b290482011-05-06 21:02:55 +0000709/* returns True if signal is to be ignored.
710 To check this, possibly call gdbserver with tid. */
philippeb3014692015-05-17 13:38:25 +0000711static Bool is_sig_ign(vki_siginfo_t *info, ThreadId tid)
jsgf855d93d2003-10-13 22:26:55 +0000712{
philippeb3014692015-05-17 13:38:25 +0000713 vg_assert(info->si_signo >= 1 && info->si_signo <= _VKI_NSIG);
sewardj2e93c502002-04-12 11:12:52 +0000714
philippeb3014692015-05-17 13:38:25 +0000715 /* If VG_(gdbserver_report_signal) tells to report the signal,
716 then verify if this signal is not to be ignored. GDB might have
717 modified si_signo, so we check after the call to gdbserver. */
718 return !VG_(gdbserver_report_signal) (info, tid)
719 || scss.scss_per_sig[info->si_signo].scss_handler == VKI_SIG_IGN;
jsgf855d93d2003-10-13 22:26:55 +0000720}
sewardjb48e5002002-05-13 00:16:03 +0000721
sewardj018f7622002-05-15 21:13:39 +0000722/* ---------------------------------------------------------------------
723 Compute the SKSS required by the current SCSS.
724 ------------------------------------------------------------------ */
725
sewardj4f29ddf2002-05-03 22:29:04 +0000726static
sewardj018f7622002-05-15 21:13:39 +0000727void pp_SKSS ( void )
728{
729 Int sig;
730 VG_(printf)("\n\nSKSS:\n");
nethercote73b526f2004-10-31 18:48:21 +0000731 for (sig = 1; sig <= _VKI_NSIG; sig++) {
dirk61780382007-10-01 10:33:41 +0000732 VG_(printf)("sig %d: handler %p, flags 0x%x\n", sig,
njn695c16e2005-03-27 03:40:28 +0000733 skss.skss_per_sig[sig].skss_handler,
734 skss.skss_per_sig[sig].skss_flags );
sewardj77e466c2002-04-14 02:29:29 +0000735
sewardj018f7622002-05-15 21:13:39 +0000736 }
sewardj018f7622002-05-15 21:13:39 +0000737}
738
sewardj018f7622002-05-15 21:13:39 +0000739/* This is the core, clever bit. Computation is as follows:
740
741 For each signal
742 handler = if client has a handler, then our handler
jsgf855d93d2003-10-13 22:26:55 +0000743 else if client is DFL, then our handler as well
744 else (client must be IGN)
sewardjb5f6f512005-03-10 23:59:00 +0000745 then hander is IGN
sewardj018f7622002-05-15 21:13:39 +0000746*/
747static
748void calculate_SKSS_from_SCSS ( SKSS* dst )
749{
750 Int sig;
sewardj018f7622002-05-15 21:13:39 +0000751 UInt scss_flags;
752 UInt skss_flags;
753
nethercote73b526f2004-10-31 18:48:21 +0000754 for (sig = 1; sig <= _VKI_NSIG; sig++) {
jsgf855d93d2003-10-13 22:26:55 +0000755 void *skss_handler;
756 void *scss_handler;
757
njn695c16e2005-03-27 03:40:28 +0000758 scss_handler = scss.scss_per_sig[sig].scss_handler;
759 scss_flags = scss.scss_per_sig[sig].scss_flags;
sewardj018f7622002-05-15 21:13:39 +0000760
jsgf855d93d2003-10-13 22:26:55 +0000761 switch(sig) {
762 case VKI_SIGSEGV:
763 case VKI_SIGBUS:
764 case VKI_SIGFPE:
765 case VKI_SIGILL:
sewardjb5f6f512005-03-10 23:59:00 +0000766 case VKI_SIGTRAP:
jsgf855d93d2003-10-13 22:26:55 +0000767 /* For these, we always want to catch them and report, even
768 if the client code doesn't. */
njn695c16e2005-03-27 03:40:28 +0000769 skss_handler = sync_signalhandler;
jsgf855d93d2003-10-13 22:26:55 +0000770 break;
771
sewardjb5f6f512005-03-10 23:59:00 +0000772 case VKI_SIGCONT:
773 /* Let the kernel handle SIGCONT unless the client is actually
774 catching it. */
njn5a350be2009-04-30 03:05:05 +0000775 case VKI_SIGCHLD:
776 case VKI_SIGWINCH:
777 case VKI_SIGURG:
778 /* For signals which are have a default action of Ignore,
779 only set a handler if the client has set a signal handler.
780 Otherwise the kernel will interrupt a syscall which
781 wouldn't have otherwise been interrupted. */
njn695c16e2005-03-27 03:40:28 +0000782 if (scss.scss_per_sig[sig].scss_handler == VKI_SIG_DFL)
sewardjb5f6f512005-03-10 23:59:00 +0000783 skss_handler = VKI_SIG_DFL;
njn695c16e2005-03-27 03:40:28 +0000784 else if (scss.scss_per_sig[sig].scss_handler == VKI_SIG_IGN)
jsgf855d93d2003-10-13 22:26:55 +0000785 skss_handler = VKI_SIG_IGN;
sewardjb5f6f512005-03-10 23:59:00 +0000786 else
njn695c16e2005-03-27 03:40:28 +0000787 skss_handler = async_signalhandler;
jsgf855d93d2003-10-13 22:26:55 +0000788 break;
jsgf855d93d2003-10-13 22:26:55 +0000789
sewardjb5f6f512005-03-10 23:59:00 +0000790 default:
njna530fc62005-03-13 04:46:36 +0000791 // VKI_SIGVG* are runtime variables, so we can't make them
792 // cases in the switch, so we handle them in the 'default' case.
njn351d0062005-06-21 22:23:59 +0000793 if (sig == VG_SIGVGKILL)
sewardjb5f6f512005-03-10 23:59:00 +0000794 skss_handler = sigvgkill_handler;
sewardjb5f6f512005-03-10 23:59:00 +0000795 else {
796 if (scss_handler == VKI_SIG_IGN)
797 skss_handler = VKI_SIG_IGN;
798 else
njn695c16e2005-03-27 03:40:28 +0000799 skss_handler = async_signalhandler;
sewardjb5f6f512005-03-10 23:59:00 +0000800 }
801 break;
802 }
sewardj018f7622002-05-15 21:13:39 +0000803
sewardj018f7622002-05-15 21:13:39 +0000804 /* Flags */
805
806 skss_flags = 0;
jsgf855d93d2003-10-13 22:26:55 +0000807
sewardjb5f6f512005-03-10 23:59:00 +0000808 /* SA_NOCLDSTOP, SA_NOCLDWAIT: pass to kernel */
809 skss_flags |= scss_flags & (VKI_SA_NOCLDSTOP | VKI_SA_NOCLDWAIT);
jsgf855d93d2003-10-13 22:26:55 +0000810
sewardj018f7622002-05-15 21:13:39 +0000811 /* SA_ONESHOT: ignore client setting */
sewardjb5f6f512005-03-10 23:59:00 +0000812
sewardj8eb8bab2015-07-21 14:44:28 +0000813# if !defined(VGO_solaris)
sewardja8d8e232005-06-07 20:04:56 +0000814 /* SA_RESTART: ignore client setting and always set it for us.
815 Though we never rely on the kernel to restart a
jsgf855d93d2003-10-13 22:26:55 +0000816 syscall, we observe whether it wanted to restart the syscall
sewardja8d8e232005-06-07 20:04:56 +0000817 or not, which is needed by
818 VG_(fixup_guest_state_after_syscall_interrupted) */
sewardj018f7622002-05-15 21:13:39 +0000819 skss_flags |= VKI_SA_RESTART;
sewardj8eb8bab2015-07-21 14:44:28 +0000820#else
821 /* The above does not apply to the Solaris port, where the kernel does
822 not directly restart syscalls, but instead it checks SA_RESTART flag
823 and if it is set then it returns ERESTART to libc and the library
824 actually restarts the syscall. */
825 skss_flags |= scss_flags & VKI_SA_RESTART;
826# endif
jsgf855d93d2003-10-13 22:26:55 +0000827
828 /* SA_NOMASK: ignore it */
829
sewardj2342c972002-05-22 23:34:20 +0000830 /* SA_ONSTACK: client setting is irrelevant here */
sewardjb5f6f512005-03-10 23:59:00 +0000831 /* We don't set a signal stack, so ignore */
sewardj018f7622002-05-15 21:13:39 +0000832
jsgf855d93d2003-10-13 22:26:55 +0000833 /* always ask for SA_SIGINFO */
834 skss_flags |= VKI_SA_SIGINFO;
sewardj018f7622002-05-15 21:13:39 +0000835
fitzhardinge4f10ada2004-06-03 10:00:42 +0000836 /* use our own restorer */
837 skss_flags |= VKI_SA_RESTORER;
838
jsgf855d93d2003-10-13 22:26:55 +0000839 /* Create SKSS entry for this signal. */
sewardj6a3c26e2002-05-23 17:09:43 +0000840 if (sig != VKI_SIGKILL && sig != VKI_SIGSTOP)
841 dst->skss_per_sig[sig].skss_handler = skss_handler;
842 else
843 dst->skss_per_sig[sig].skss_handler = VKI_SIG_DFL;
844
sewardj018f7622002-05-15 21:13:39 +0000845 dst->skss_per_sig[sig].skss_flags = skss_flags;
846 }
847
848 /* Sanity checks. */
nethercote5fd72bb2004-11-04 19:28:38 +0000849 vg_assert(dst->skss_per_sig[VKI_SIGKILL].skss_handler == VKI_SIG_DFL);
850 vg_assert(dst->skss_per_sig[VKI_SIGSTOP].skss_handler == VKI_SIG_DFL);
sewardj018f7622002-05-15 21:13:39 +0000851
852 if (0)
853 pp_SKSS();
854}
855
856
857/* ---------------------------------------------------------------------
858 After a possible SCSS change, update SKSS and the kernel itself.
859 ------------------------------------------------------------------ */
860
njn9abd6082005-06-17 21:31:45 +0000861// We need two levels of macro-expansion here to convert __NR_rt_sigreturn
862// to a number before converting it to a string... sigh.
sewardj03d8aa82005-10-14 11:25:49 +0000863extern void my_sigreturn(void);
njn9abd6082005-06-17 21:31:45 +0000864
865#if defined(VGP_x86_linux)
njn5a350be2009-04-30 03:05:05 +0000866# define _MY_SIGRETURN(name) \
sewardjd9fc3822005-11-18 23:50:43 +0000867 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000868 ".globl my_sigreturn\n" \
njn9abd6082005-06-17 21:31:45 +0000869 "my_sigreturn:\n" \
870 " movl $" #name ", %eax\n" \
sewardj2fedc642005-11-19 02:02:57 +0000871 " int $0x80\n" \
872 ".previous\n"
sewardj59570ff2010-01-01 11:59:33 +0000873
njn9abd6082005-06-17 21:31:45 +0000874#elif defined(VGP_amd64_linux)
njn5a350be2009-04-30 03:05:05 +0000875# define _MY_SIGRETURN(name) \
sewardjd9fc3822005-11-18 23:50:43 +0000876 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000877 ".globl my_sigreturn\n" \
njn9abd6082005-06-17 21:31:45 +0000878 "my_sigreturn:\n" \
879 " movq $" #name ", %rax\n" \
sewardj2fedc642005-11-19 02:02:57 +0000880 " syscall\n" \
881 ".previous\n"
sewardj59570ff2010-01-01 11:59:33 +0000882
cerion85665ca2005-06-20 15:51:07 +0000883#elif defined(VGP_ppc32_linux)
njn5a350be2009-04-30 03:05:05 +0000884# define _MY_SIGRETURN(name) \
sewardjd9fc3822005-11-18 23:50:43 +0000885 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000886 ".globl my_sigreturn\n" \
cerion85665ca2005-06-20 15:51:07 +0000887 "my_sigreturn:\n" \
888 " li 0, " #name "\n" \
sewardj2fedc642005-11-19 02:02:57 +0000889 " sc\n" \
890 ".previous\n"
sewardj59570ff2010-01-01 11:59:33 +0000891
carllcae0cc22014-08-07 23:17:29 +0000892#elif defined(VGP_ppc64be_linux)
njn5a350be2009-04-30 03:05:05 +0000893# define _MY_SIGRETURN(name) \
cerion297c88f2005-12-22 15:53:12 +0000894 ".align 2\n" \
895 ".globl my_sigreturn\n" \
896 ".section \".opd\",\"aw\"\n" \
897 ".align 3\n" \
sewardj2c48c7b2005-11-29 13:05:56 +0000898 "my_sigreturn:\n" \
cerion297c88f2005-12-22 15:53:12 +0000899 ".quad .my_sigreturn,.TOC.@tocbase,0\n" \
900 ".previous\n" \
901 ".type .my_sigreturn,@function\n" \
902 ".globl .my_sigreturn\n" \
903 ".my_sigreturn:\n" \
sewardj2c48c7b2005-11-29 13:05:56 +0000904 " li 0, " #name "\n" \
cerion297c88f2005-12-22 15:53:12 +0000905 " sc\n"
sewardj59570ff2010-01-01 11:59:33 +0000906
carll582d5822014-08-07 23:35:54 +0000907#elif defined(VGP_ppc64le_linux)
908/* Little Endian supports ELF version 2. In the future, it may
909 * support other versions.
910 */
911# define _MY_SIGRETURN(name) \
912 ".align 2\n" \
913 ".globl my_sigreturn\n" \
914 ".type .my_sigreturn,@function\n" \
915 "my_sigreturn:\n" \
916 "#if _CALL_ELF == 2 \n" \
917 "0: addis 2,12,.TOC.-0b@ha\n" \
918 " addi 2,2,.TOC.-0b@l\n" \
919 " .localentry my_sigreturn,.-my_sigreturn\n" \
920 "#endif \n" \
921 " sc\n" \
922 " .size my_sigreturn,.-my_sigreturn\n"
923
sewardj59570ff2010-01-01 11:59:33 +0000924#elif defined(VGP_arm_linux)
925# define _MY_SIGRETURN(name) \
926 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000927 ".globl my_sigreturn\n" \
sewardj59570ff2010-01-01 11:59:33 +0000928 "my_sigreturn:\n\t" \
929 " mov r7, #" #name "\n\t" \
930 " svc 0x00000000\n" \
931 ".previous\n"
932
sewardjf0c12502014-01-12 12:54:00 +0000933#elif defined(VGP_arm64_linux)
934# define _MY_SIGRETURN(name) \
935 ".text\n" \
936 ".globl my_sigreturn\n" \
937 "my_sigreturn:\n\t" \
938 " mov x8, #" #name "\n\t" \
939 " svc 0x0\n" \
940 ".previous\n"
941
njnf76d27a2009-05-28 01:53:07 +0000942#elif defined(VGP_x86_darwin)
943# define _MY_SIGRETURN(name) \
944 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000945 ".globl my_sigreturn\n" \
njnf76d27a2009-05-28 01:53:07 +0000946 "my_sigreturn:\n" \
rhyskidda53331c2015-10-15 07:01:57 +0000947 " movl $" VG_STRINGIFY(__NR_DARWIN_FAKE_SIGRETURN) ",%eax\n" \
948 " int $0x80\n"
sewardj59570ff2010-01-01 11:59:33 +0000949
njnf76d27a2009-05-28 01:53:07 +0000950#elif defined(VGP_amd64_darwin)
njnf76d27a2009-05-28 01:53:07 +0000951# define _MY_SIGRETURN(name) \
952 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000953 ".globl my_sigreturn\n" \
njnf76d27a2009-05-28 01:53:07 +0000954 "my_sigreturn:\n" \
rhyskidda53331c2015-10-15 07:01:57 +0000955 " movq $" VG_STRINGIFY(__NR_DARWIN_FAKE_SIGRETURN) ",%rax\n" \
956 " syscall\n"
sewardj59570ff2010-01-01 11:59:33 +0000957
sewardjb5b87402011-03-07 16:05:35 +0000958#elif defined(VGP_s390x_linux)
959# define _MY_SIGRETURN(name) \
960 ".text\n" \
philippe9fdca562012-04-16 22:06:47 +0000961 ".globl my_sigreturn\n" \
sewardjb5b87402011-03-07 16:05:35 +0000962 "my_sigreturn:\n" \
963 " svc " #name "\n" \
964 ".previous\n"
965
sewardj5db15402012-06-07 09:13:21 +0000966#elif defined(VGP_mips32_linux)
967# define _MY_SIGRETURN(name) \
968 ".text\n" \
969 "my_sigreturn:\n" \
970 " li $2, " #name "\n" /* apparently $2 is v0 */ \
971 " syscall\n" \
972 ".previous\n"
973
petarj4df0bfc2013-02-27 23:17:33 +0000974#elif defined(VGP_mips64_linux)
975# define _MY_SIGRETURN(name) \
976 ".text\n" \
977 "my_sigreturn:\n" \
978 " li $2, " #name "\n" \
979 " syscall\n" \
980 ".previous\n"
981
sewardj8eb8bab2015-07-21 14:44:28 +0000982#elif defined(VGP_x86_solaris) || defined(VGP_amd64_solaris)
983/* Not used on Solaris. */
984# define _MY_SIGRETURN(name) \
985 ".text\n" \
986 ".globl my_sigreturn\n" \
987 "my_sigreturn:\n" \
988 "ud2\n" \
989 ".previous\n"
990
njn9abd6082005-06-17 21:31:45 +0000991#else
992# error Unknown platform
993#endif
994
njn5a350be2009-04-30 03:05:05 +0000995#define MY_SIGRETURN(name) _MY_SIGRETURN(name)
njn9abd6082005-06-17 21:31:45 +0000996asm(
njn5a350be2009-04-30 03:05:05 +0000997 MY_SIGRETURN(__NR_rt_sigreturn)
njn9abd6082005-06-17 21:31:45 +0000998);
999
1000
nethercote9dd11512004-08-04 15:31:30 +00001001static void handle_SCSS_change ( Bool force_update )
sewardj018f7622002-05-15 21:13:39 +00001002{
nethercote73b526f2004-10-31 18:48:21 +00001003 Int res, sig;
1004 SKSS skss_old;
njncda2f0f2009-05-18 02:12:08 +00001005 vki_sigaction_toK_t ksa;
1006 vki_sigaction_fromK_t ksa_old;
sewardj018f7622002-05-15 21:13:39 +00001007
sewardj018f7622002-05-15 21:13:39 +00001008 /* Remember old SKSS and calculate new one. */
njn695c16e2005-03-27 03:40:28 +00001009 skss_old = skss;
1010 calculate_SKSS_from_SCSS ( &skss );
sewardj018f7622002-05-15 21:13:39 +00001011
1012 /* Compare the new SKSS entries vs the old ones, and update kernel
1013 where they differ. */
sewardjb5f6f512005-03-10 23:59:00 +00001014 for (sig = 1; sig <= VG_(max_signal); sig++) {
sewardj018f7622002-05-15 21:13:39 +00001015
1016 /* Trying to do anything with SIGKILL is pointless; just ignore
1017 it. */
1018 if (sig == VKI_SIGKILL || sig == VKI_SIGSTOP)
1019 continue;
1020
sewardj018f7622002-05-15 21:13:39 +00001021 if (!force_update) {
1022 if ((skss_old.skss_per_sig[sig].skss_handler
njn695c16e2005-03-27 03:40:28 +00001023 == skss.skss_per_sig[sig].skss_handler)
sewardj018f7622002-05-15 21:13:39 +00001024 && (skss_old.skss_per_sig[sig].skss_flags
njn695c16e2005-03-27 03:40:28 +00001025 == skss.skss_per_sig[sig].skss_flags))
sewardj018f7622002-05-15 21:13:39 +00001026 /* no difference */
1027 continue;
1028 }
1029
njn695c16e2005-03-27 03:40:28 +00001030 ksa.ksa_handler = skss.skss_per_sig[sig].skss_handler;
1031 ksa.sa_flags = skss.skss_per_sig[sig].skss_flags;
njnf76d27a2009-05-28 01:53:07 +00001032# if !defined(VGP_ppc32_linux) && \
sewardj5db15402012-06-07 09:13:21 +00001033 !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
sewardj8eb8bab2015-07-21 14:44:28 +00001034 !defined(VGP_mips32_linux) && !defined(VGO_solaris)
njn9abd6082005-06-17 21:31:45 +00001035 ksa.sa_restorer = my_sigreturn;
sewardjce2a6152005-07-08 18:25:13 +00001036# endif
sewardj162bebd2005-07-09 10:43:45 +00001037 /* Re above ifdef (also the assertion below), PaulM says:
1038 The sa_restorer field is not used at all on ppc. Glibc
1039 converts the sigaction you give it into a kernel sigaction,
1040 but it doesn't put anything in the sa_restorer field.
1041 */
fitzhardinge4f10ada2004-06-03 10:00:42 +00001042
sewardjb5f6f512005-03-10 23:59:00 +00001043 /* block all signals in handler */
nethercote73b526f2004-10-31 18:48:21 +00001044 VG_(sigfillset)( &ksa.sa_mask );
1045 VG_(sigdelset)( &ksa.sa_mask, VKI_SIGKILL );
1046 VG_(sigdelset)( &ksa.sa_mask, VKI_SIGSTOP );
sewardj018f7622002-05-15 21:13:39 +00001047
sewardjb5f6f512005-03-10 23:59:00 +00001048 if (VG_(clo_trace_signals) && VG_(clo_verbosity) > 2)
sewardj738856f2009-07-15 14:48:32 +00001049 VG_(dmsg)("setting ksig %d to: hdlr %p, flags 0x%lx, "
1050 "mask(msb..lsb) 0x%llx 0x%llx\n",
1051 sig, ksa.ksa_handler,
1052 (UWord)ksa.sa_flags,
1053 _VKI_NSIG_WORDS > 1 ? (ULong)ksa.sa_mask.sig[1] : 0,
1054 (ULong)ksa.sa_mask.sig[0]);
sewardj018f7622002-05-15 21:13:39 +00001055
nethercote73b526f2004-10-31 18:48:21 +00001056 res = VG_(sigaction)( sig, &ksa, &ksa_old );
sewardj018f7622002-05-15 21:13:39 +00001057 vg_assert(res == 0);
1058
1059 /* Since we got the old sigaction more or less for free, might
1060 as well extract the maximum sanity-check value from it. */
1061 if (!force_update) {
1062 vg_assert(ksa_old.ksa_handler
1063 == skss_old.skss_per_sig[sig].skss_handler);
sewardj8eb8bab2015-07-21 14:44:28 +00001064# if defined(VGO_solaris)
1065 if (ksa_old.ksa_handler == VKI_SIG_DFL
1066 || ksa_old.ksa_handler == VKI_SIG_IGN) {
1067 /* The Solaris kernel ignores signal flags (except SA_NOCLDWAIT
1068 and SA_NOCLDSTOP) and a signal mask if a handler is set to
1069 SIG_DFL or SIG_IGN. */
1070 skss_old.skss_per_sig[sig].skss_flags
1071 &= (VKI_SA_NOCLDWAIT | VKI_SA_NOCLDSTOP);
1072 vg_assert(VG_(isemptysigset)( &ksa_old.sa_mask ));
1073 VG_(sigfillset)( &ksa_old.sa_mask );
1074 }
1075# endif
nethercote73b526f2004-10-31 18:48:21 +00001076 vg_assert(ksa_old.sa_flags
sewardj018f7622002-05-15 21:13:39 +00001077 == skss_old.skss_per_sig[sig].skss_flags);
njnf76d27a2009-05-28 01:53:07 +00001078# if !defined(VGP_ppc32_linux) && \
sewardj5db15402012-06-07 09:13:21 +00001079 !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
sewardj8eb8bab2015-07-21 14:44:28 +00001080 !defined(VGP_mips32_linux) && !defined(VGP_mips64_linux) && \
1081 !defined(VGO_solaris)
sewardjf0c12502014-01-12 12:54:00 +00001082 vg_assert(ksa_old.sa_restorer == my_sigreturn);
sewardjce2a6152005-07-08 18:25:13 +00001083# endif
nethercote73b526f2004-10-31 18:48:21 +00001084 VG_(sigaddset)( &ksa_old.sa_mask, VKI_SIGKILL );
1085 VG_(sigaddset)( &ksa_old.sa_mask, VKI_SIGSTOP );
1086 vg_assert(VG_(isfullsigset)( &ksa_old.sa_mask ));
sewardj018f7622002-05-15 21:13:39 +00001087 }
1088 }
sewardj018f7622002-05-15 21:13:39 +00001089}
1090
1091
1092/* ---------------------------------------------------------------------
1093 Update/query SCSS in accordance with client requests.
1094 ------------------------------------------------------------------ */
1095
sewardj2342c972002-05-22 23:34:20 +00001096/* Logic for this alt-stack stuff copied directly from do_sigaltstack
1097 in kernel/signal.[ch] */
1098
1099/* True if we are on the alternate signal stack. */
sewardjb5f6f512005-03-10 23:59:00 +00001100static Bool on_sig_stack ( ThreadId tid, Addr m_SP )
sewardj2342c972002-05-22 23:34:20 +00001101{
fitzhardinge98c4dc02004-03-16 08:27:29 +00001102 ThreadState *tst = VG_(get_ThreadState)(tid);
1103
njn5a350be2009-04-30 03:05:05 +00001104 return (m_SP - (Addr)tst->altstack.ss_sp < (Addr)tst->altstack.ss_size);
sewardj2342c972002-05-22 23:34:20 +00001105}
1106
nethercote511e4062004-09-11 13:34:08 +00001107static Int sas_ss_flags ( ThreadId tid, Addr m_SP )
sewardj2342c972002-05-22 23:34:20 +00001108{
fitzhardinge98c4dc02004-03-16 08:27:29 +00001109 ThreadState *tst = VG_(get_ThreadState)(tid);
1110
1111 return (tst->altstack.ss_size == 0
sewardj2342c972002-05-22 23:34:20 +00001112 ? VKI_SS_DISABLE
nethercote511e4062004-09-11 13:34:08 +00001113 : on_sig_stack(tid, m_SP) ? VKI_SS_ONSTACK : 0);
sewardj2342c972002-05-22 23:34:20 +00001114}
1115
1116
sewardja8d8e232005-06-07 20:04:56 +00001117SysRes VG_(do_sys_sigaltstack) ( ThreadId tid, vki_stack_t* ss, vki_stack_t* oss )
sewardj2342c972002-05-22 23:34:20 +00001118{
njn502badb2005-05-08 02:04:49 +00001119 Addr m_SP;
sewardj2342c972002-05-22 23:34:20 +00001120
1121 vg_assert(VG_(is_valid_tid)(tid));
njnf536bbb2005-06-13 04:21:38 +00001122 m_SP = VG_(get_SP)(tid);
sewardj2342c972002-05-22 23:34:20 +00001123
1124 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00001125 VG_(dmsg)("sys_sigaltstack: tid %u, "
sewardj738856f2009-07-15 14:48:32 +00001126 "ss %p{%p,sz=%llu,flags=0x%llx}, oss %p (current SP %p)\n",
1127 tid, (void*)ss,
1128 ss ? ss->ss_sp : 0,
1129 (ULong)(ss ? ss->ss_size : 0),
1130 (ULong)(ss ? ss->ss_flags : 0),
1131 (void*)oss, (void*)m_SP);
sewardj2342c972002-05-22 23:34:20 +00001132
1133 if (oss != NULL) {
fitzhardinge98c4dc02004-03-16 08:27:29 +00001134 oss->ss_sp = VG_(threads)[tid].altstack.ss_sp;
1135 oss->ss_size = VG_(threads)[tid].altstack.ss_size;
njn5a350be2009-04-30 03:05:05 +00001136 oss->ss_flags = VG_(threads)[tid].altstack.ss_flags
1137 | sas_ss_flags(tid, m_SP);
sewardj2342c972002-05-22 23:34:20 +00001138 }
1139
1140 if (ss != NULL) {
njnf536bbb2005-06-13 04:21:38 +00001141 if (on_sig_stack(tid, VG_(get_SP)(tid))) {
sewardja8d8e232005-06-07 20:04:56 +00001142 return VG_(mk_SysRes_Error)( VKI_EPERM );
sewardj2342c972002-05-22 23:34:20 +00001143 }
1144 if (ss->ss_flags != VKI_SS_DISABLE
1145 && ss->ss_flags != VKI_SS_ONSTACK
1146 && ss->ss_flags != 0) {
sewardja8d8e232005-06-07 20:04:56 +00001147 return VG_(mk_SysRes_Error)( VKI_EINVAL );
sewardj2342c972002-05-22 23:34:20 +00001148 }
1149 if (ss->ss_flags == VKI_SS_DISABLE) {
fitzhardinge98c4dc02004-03-16 08:27:29 +00001150 VG_(threads)[tid].altstack.ss_flags = VKI_SS_DISABLE;
sewardj2342c972002-05-22 23:34:20 +00001151 } else {
1152 if (ss->ss_size < VKI_MINSIGSTKSZ) {
sewardja8d8e232005-06-07 20:04:56 +00001153 return VG_(mk_SysRes_Error)( VKI_ENOMEM );
sewardj2342c972002-05-22 23:34:20 +00001154 }
jsgf855d93d2003-10-13 22:26:55 +00001155
nethercote20283c62004-11-04 19:43:22 +00001156 VG_(threads)[tid].altstack.ss_sp = ss->ss_sp;
1157 VG_(threads)[tid].altstack.ss_size = ss->ss_size;
fitzhardinge98c4dc02004-03-16 08:27:29 +00001158 VG_(threads)[tid].altstack.ss_flags = 0;
sewardj2342c972002-05-22 23:34:20 +00001159 }
sewardj2342c972002-05-22 23:34:20 +00001160 }
sewardja8d8e232005-06-07 20:04:56 +00001161 return VG_(mk_SysRes_Success)( 0 );
sewardj2342c972002-05-22 23:34:20 +00001162}
1163
1164
sewardja8d8e232005-06-07 20:04:56 +00001165SysRes VG_(do_sys_sigaction) ( Int signo,
njncda2f0f2009-05-18 02:12:08 +00001166 const vki_sigaction_toK_t* new_act,
1167 vki_sigaction_fromK_t* old_act )
sewardj018f7622002-05-15 21:13:39 +00001168{
sewardj018f7622002-05-15 21:13:39 +00001169 if (VG_(clo_trace_signals))
njn18a71e82010-07-06 04:21:47 +00001170 VG_(dmsg)("sys_sigaction: sigNo %d, "
sewardj738856f2009-07-15 14:48:32 +00001171 "new %#lx, old %#lx, new flags 0x%llx\n",
1172 signo, (UWord)new_act, (UWord)old_act,
1173 (ULong)(new_act ? new_act->sa_flags : 0));
sewardj018f7622002-05-15 21:13:39 +00001174
1175 /* Rule out various error conditions. The aim is to ensure that if
1176 when the call is passed to the kernel it will definitely
1177 succeed. */
1178
1179 /* Reject out-of-range signal numbers. */
sewardjb5f6f512005-03-10 23:59:00 +00001180 if (signo < 1 || signo > VG_(max_signal)) goto bad_signo;
sewardj018f7622002-05-15 21:13:39 +00001181
jsgf855d93d2003-10-13 22:26:55 +00001182 /* don't let them use our signals */
njn351d0062005-06-21 22:23:59 +00001183 if ( (signo > VG_SIGVGRTUSERMAX)
jsgf855d93d2003-10-13 22:26:55 +00001184 && new_act
sewardja8d8e232005-06-07 20:04:56 +00001185 && !(new_act->ksa_handler == VKI_SIG_DFL
1186 || new_act->ksa_handler == VKI_SIG_IGN) )
nethercote9c42a0f2003-11-17 10:37:19 +00001187 goto bad_signo_reserved;
jsgf855d93d2003-10-13 22:26:55 +00001188
sewardj018f7622002-05-15 21:13:39 +00001189 /* Reject attempts to set a handler (or set ignore) for SIGKILL. */
1190 if ( (signo == VKI_SIGKILL || signo == VKI_SIGSTOP)
1191 && new_act
1192 && new_act->ksa_handler != VKI_SIG_DFL)
1193 goto bad_sigkill_or_sigstop;
1194
1195 /* If the client supplied non-NULL old_act, copy the relevant SCSS
1196 entry into it. */
1197 if (old_act) {
njn695c16e2005-03-27 03:40:28 +00001198 old_act->ksa_handler = scss.scss_per_sig[signo].scss_handler;
1199 old_act->sa_flags = scss.scss_per_sig[signo].scss_flags;
1200 old_act->sa_mask = scss.scss_per_sig[signo].scss_mask;
sewardj8eb8bab2015-07-21 14:44:28 +00001201# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
1202 !defined(VGO_solaris)
njn695c16e2005-03-27 03:40:28 +00001203 old_act->sa_restorer = scss.scss_per_sig[signo].scss_restorer;
sewardj489bfec2006-10-17 02:00:29 +00001204# endif
sewardj018f7622002-05-15 21:13:39 +00001205 }
1206
1207 /* And now copy new SCSS entry from new_act. */
1208 if (new_act) {
njn695c16e2005-03-27 03:40:28 +00001209 scss.scss_per_sig[signo].scss_handler = new_act->ksa_handler;
1210 scss.scss_per_sig[signo].scss_flags = new_act->sa_flags;
1211 scss.scss_per_sig[signo].scss_mask = new_act->sa_mask;
sewardj489bfec2006-10-17 02:00:29 +00001212
njncda2f0f2009-05-18 02:12:08 +00001213 scss.scss_per_sig[signo].scss_restorer = NULL;
sewardj8eb8bab2015-07-21 14:44:28 +00001214# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
1215 !defined(VGO_solaris)
njn695c16e2005-03-27 03:40:28 +00001216 scss.scss_per_sig[signo].scss_restorer = new_act->sa_restorer;
sewardj489bfec2006-10-17 02:00:29 +00001217# endif
sewardjb5f6f512005-03-10 23:59:00 +00001218
njncda2f0f2009-05-18 02:12:08 +00001219 scss.scss_per_sig[signo].scss_sa_tramp = NULL;
njnf76d27a2009-05-28 01:53:07 +00001220# if defined(VGP_x86_darwin) || defined(VGP_amd64_darwin)
1221 scss.scss_per_sig[signo].scss_sa_tramp = new_act->sa_tramp;
1222# endif
njncda2f0f2009-05-18 02:12:08 +00001223
njn695c16e2005-03-27 03:40:28 +00001224 VG_(sigdelset)(&scss.scss_per_sig[signo].scss_mask, VKI_SIGKILL);
1225 VG_(sigdelset)(&scss.scss_per_sig[signo].scss_mask, VKI_SIGSTOP);
sewardj018f7622002-05-15 21:13:39 +00001226 }
1227
1228 /* All happy bunnies ... */
1229 if (new_act) {
nethercote9dd11512004-08-04 15:31:30 +00001230 handle_SCSS_change( False /* lazy update */ );
sewardj018f7622002-05-15 21:13:39 +00001231 }
sewardja8d8e232005-06-07 20:04:56 +00001232 return VG_(mk_SysRes_Success)( 0 );
sewardj018f7622002-05-15 21:13:39 +00001233
1234 bad_signo:
sewardjec6e27c2007-11-17 21:31:48 +00001235 if (VG_(showing_core_errors)() && !VG_(clo_xml)) {
sewardj738856f2009-07-15 14:48:32 +00001236 VG_(umsg)("Warning: bad signal number %d in sigaction()\n", signo);
sewardj9a3d8bd2005-05-23 14:47:52 +00001237 }
sewardja8d8e232005-06-07 20:04:56 +00001238 return VG_(mk_SysRes_Error)( VKI_EINVAL );
sewardj018f7622002-05-15 21:13:39 +00001239
nethercote9c42a0f2003-11-17 10:37:19 +00001240 bad_signo_reserved:
sewardjec6e27c2007-11-17 21:31:48 +00001241 if (VG_(showing_core_errors)() && !VG_(clo_xml)) {
sewardj738856f2009-07-15 14:48:32 +00001242 VG_(umsg)("Warning: ignored attempt to set %s handler in sigaction();\n",
philippe886fde32012-03-29 21:56:47 +00001243 VG_(signame)(signo));
sewardj738856f2009-07-15 14:48:32 +00001244 VG_(umsg)(" the %s signal is used internally by Valgrind\n",
philippe886fde32012-03-29 21:56:47 +00001245 VG_(signame)(signo));
fitzhardingebf459872003-11-18 16:55:33 +00001246 }
sewardja8d8e232005-06-07 20:04:56 +00001247 return VG_(mk_SysRes_Error)( VKI_EINVAL );
nethercote9c42a0f2003-11-17 10:37:19 +00001248
sewardj018f7622002-05-15 21:13:39 +00001249 bad_sigkill_or_sigstop:
sewardjec6e27c2007-11-17 21:31:48 +00001250 if (VG_(showing_core_errors)() && !VG_(clo_xml)) {
sewardj738856f2009-07-15 14:48:32 +00001251 VG_(umsg)("Warning: ignored attempt to set %s handler in sigaction();\n",
philippe886fde32012-03-29 21:56:47 +00001252 VG_(signame)(signo));
sewardj738856f2009-07-15 14:48:32 +00001253 VG_(umsg)(" the %s signal is uncatchable\n",
philippe886fde32012-03-29 21:56:47 +00001254 VG_(signame)(signo));
sewardj9a3d8bd2005-05-23 14:47:52 +00001255 }
sewardja8d8e232005-06-07 20:04:56 +00001256 return VG_(mk_SysRes_Error)( VKI_EINVAL );
sewardj018f7622002-05-15 21:13:39 +00001257}
1258
1259
1260static
1261void do_sigprocmask_bitops ( Int vki_how,
nethercote73b526f2004-10-31 18:48:21 +00001262 vki_sigset_t* orig_set,
1263 vki_sigset_t* modifier )
sewardj018f7622002-05-15 21:13:39 +00001264{
1265 switch (vki_how) {
1266 case VKI_SIG_BLOCK:
nethercote73b526f2004-10-31 18:48:21 +00001267 VG_(sigaddset_from_set)( orig_set, modifier );
sewardj018f7622002-05-15 21:13:39 +00001268 break;
1269 case VKI_SIG_UNBLOCK:
nethercote73b526f2004-10-31 18:48:21 +00001270 VG_(sigdelset_from_set)( orig_set, modifier );
sewardj018f7622002-05-15 21:13:39 +00001271 break;
1272 case VKI_SIG_SETMASK:
1273 *orig_set = *modifier;
1274 break;
1275 default:
njne427a662002-10-02 11:08:25 +00001276 VG_(core_panic)("do_sigprocmask_bitops");
sewardj018f7622002-05-15 21:13:39 +00001277 break;
1278 }
1279}
1280
tomf7781e92005-11-02 15:31:21 +00001281static
njn5a350be2009-04-30 03:05:05 +00001282HChar* format_sigset ( const vki_sigset_t* set )
tomf7781e92005-11-02 15:31:21 +00001283{
florian7b7d5942014-12-19 20:29:22 +00001284 static HChar buf[_VKI_NSIG_WORDS * 16 + 1];
tomf7781e92005-11-02 15:31:21 +00001285 int w;
1286
1287 VG_(strcpy)(buf, "");
1288
1289 for (w = _VKI_NSIG_WORDS - 1; w >= 0; w--)
1290 {
sewardja8ffda62008-07-18 18:23:24 +00001291# if _VKI_NSIG_BPW == 32
1292 VG_(sprintf)(buf + VG_(strlen)(buf), "%08llx",
1293 set ? (ULong)set->sig[w] : 0);
1294# elif _VKI_NSIG_BPW == 64
1295 VG_(sprintf)(buf + VG_(strlen)(buf), "%16llx",
1296 set ? (ULong)set->sig[w] : 0);
1297# else
1298# error "Unsupported value for _VKI_NSIG_BPW"
1299# endif
tomf7781e92005-11-02 15:31:21 +00001300 }
1301
1302 return buf;
1303}
1304
jsgf855d93d2003-10-13 22:26:55 +00001305/*
1306 This updates the thread's signal mask. There's no such thing as a
1307 process-wide signal mask.
sewardj018f7622002-05-15 21:13:39 +00001308
1309 Note that the thread signal masks are an implicit part of SCSS,
1310 which is why this routine is allowed to mess with them.
1311*/
1312static
1313void do_setmask ( ThreadId tid,
1314 Int how,
nethercote73b526f2004-10-31 18:48:21 +00001315 vki_sigset_t* newset,
1316 vki_sigset_t* oldset )
sewardj018f7622002-05-15 21:13:39 +00001317{
sewardj018f7622002-05-15 21:13:39 +00001318 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00001319 VG_(dmsg)("do_setmask: tid = %u how = %d (%s), newset = %p (%s)\n",
sewardj738856f2009-07-15 14:48:32 +00001320 tid, how,
1321 how==VKI_SIG_BLOCK ? "SIG_BLOCK" : (
1322 how==VKI_SIG_UNBLOCK ? "SIG_UNBLOCK" : (
1323 how==VKI_SIG_SETMASK ? "SIG_SETMASK" : "???")),
1324 newset, newset ? format_sigset(newset) : "NULL" );
sewardj018f7622002-05-15 21:13:39 +00001325
jsgf855d93d2003-10-13 22:26:55 +00001326 /* Just do this thread. */
1327 vg_assert(VG_(is_valid_tid)(tid));
1328 if (oldset) {
sewardjb5f6f512005-03-10 23:59:00 +00001329 *oldset = VG_(threads)[tid].sig_mask;
jsgf855d93d2003-10-13 22:26:55 +00001330 if (VG_(clo_trace_signals))
njn18a71e82010-07-06 04:21:47 +00001331 VG_(dmsg)("\toldset=%p %s\n", oldset, format_sigset(oldset));
sewardj018f7622002-05-15 21:13:39 +00001332 }
sewardj018f7622002-05-15 21:13:39 +00001333 if (newset) {
jsgf855d93d2003-10-13 22:26:55 +00001334 do_sigprocmask_bitops (how, &VG_(threads)[tid].sig_mask, newset );
nethercote73b526f2004-10-31 18:48:21 +00001335 VG_(sigdelset)(&VG_(threads)[tid].sig_mask, VKI_SIGKILL);
1336 VG_(sigdelset)(&VG_(threads)[tid].sig_mask, VKI_SIGSTOP);
sewardjb5f6f512005-03-10 23:59:00 +00001337 VG_(threads)[tid].tmp_sig_mask = VG_(threads)[tid].sig_mask;
sewardj018f7622002-05-15 21:13:39 +00001338 }
1339}
1340
1341
sewardja8d8e232005-06-07 20:04:56 +00001342SysRes VG_(do_sys_sigprocmask) ( ThreadId tid,
1343 Int how,
1344 vki_sigset_t* set,
1345 vki_sigset_t* oldset )
sewardj018f7622002-05-15 21:13:39 +00001346{
jsgf855d93d2003-10-13 22:26:55 +00001347 switch(how) {
njncda2f0f2009-05-18 02:12:08 +00001348 case VKI_SIG_BLOCK:
1349 case VKI_SIG_UNBLOCK:
1350 case VKI_SIG_SETMASK:
1351 vg_assert(VG_(is_valid_tid)(tid));
1352 do_setmask ( tid, how, set, oldset );
1353 return VG_(mk_SysRes_Success)( 0 );
jsgf855d93d2003-10-13 22:26:55 +00001354
njncda2f0f2009-05-18 02:12:08 +00001355 default:
sewardj738856f2009-07-15 14:48:32 +00001356 VG_(dmsg)("sigprocmask: unknown 'how' field %d\n", how);
njncda2f0f2009-05-18 02:12:08 +00001357 return VG_(mk_SysRes_Error)( VKI_EINVAL );
sewardj018f7622002-05-15 21:13:39 +00001358 }
1359}
1360
1361
sewardj018f7622002-05-15 21:13:39 +00001362/* ---------------------------------------------------------------------
1363 LOW LEVEL STUFF TO DO WITH SIGNALS: IMPLEMENTATION
1364 ------------------------------------------------------------------ */
sewardj77e466c2002-04-14 02:29:29 +00001365
sewardj2e93c502002-04-12 11:12:52 +00001366/* ---------------------------------------------------------------------
1367 Handy utilities to block/restore all host signals.
1368 ------------------------------------------------------------------ */
1369
1370/* Block all host signals, dumping the old mask in *saved_mask. */
njn444eba12005-05-12 03:47:31 +00001371static void block_all_host_signals ( /* OUT */ vki_sigset_t* saved_mask )
sewardj2e93c502002-04-12 11:12:52 +00001372{
1373 Int ret;
nethercote73b526f2004-10-31 18:48:21 +00001374 vki_sigset_t block_procmask;
1375 VG_(sigfillset)(&block_procmask);
1376 ret = VG_(sigprocmask)
sewardj2e93c502002-04-12 11:12:52 +00001377 (VKI_SIG_SETMASK, &block_procmask, saved_mask);
1378 vg_assert(ret == 0);
1379}
1380
1381/* Restore the blocking mask using the supplied saved one. */
njn444eba12005-05-12 03:47:31 +00001382static void restore_all_host_signals ( /* IN */ vki_sigset_t* saved_mask )
sewardj2e93c502002-04-12 11:12:52 +00001383{
1384 Int ret;
nethercote73b526f2004-10-31 18:48:21 +00001385 ret = VG_(sigprocmask)(VKI_SIG_SETMASK, saved_mask, NULL);
sewardj2e93c502002-04-12 11:12:52 +00001386 vg_assert(ret == 0);
1387}
sewardjde4a1d02002-03-22 01:27:54 +00001388
njn444eba12005-05-12 03:47:31 +00001389void VG_(clear_out_queued_signals)( ThreadId tid, vki_sigset_t* saved_mask )
1390{
1391 block_all_host_signals(saved_mask);
1392 if (VG_(threads)[tid].sig_queue != NULL) {
florian77eb20b2014-09-11 21:19:17 +00001393 VG_(free)(VG_(threads)[tid].sig_queue);
njn444eba12005-05-12 03:47:31 +00001394 VG_(threads)[tid].sig_queue = NULL;
1395 }
1396 restore_all_host_signals(saved_mask);
1397}
1398
sewardjde4a1d02002-03-22 01:27:54 +00001399/* ---------------------------------------------------------------------
1400 The signal simulation proper. A simplified version of what the
1401 Linux kernel does.
1402 ------------------------------------------------------------------ */
1403
sewardjde4a1d02002-03-22 01:27:54 +00001404/* Set up a stack frame (VgSigContext) for the client's signal
nethercotefedd8102004-09-13 15:19:34 +00001405 handler. */
sewardj2c5ffbe2005-03-12 13:32:06 +00001406static
njn5a350be2009-04-30 03:05:05 +00001407void push_signal_frame ( ThreadId tid, const vki_siginfo_t *siginfo,
1408 const struct vki_ucontext *uc )
sewardjde4a1d02002-03-22 01:27:54 +00001409{
sewardj8eb8bab2015-07-21 14:44:28 +00001410 Bool on_altstack;
nethercote6eec4602004-09-13 14:15:36 +00001411 Addr esp_top_of_frame;
sewardj2e93c502002-04-12 11:12:52 +00001412 ThreadState* tst;
jsgf855d93d2003-10-13 22:26:55 +00001413 Int sigNo = siginfo->si_signo;
sewardj2e93c502002-04-12 11:12:52 +00001414
sewardjb5f6f512005-03-10 23:59:00 +00001415 vg_assert(sigNo >= 1 && sigNo <= VG_(max_signal));
sewardj018f7622002-05-15 21:13:39 +00001416 vg_assert(VG_(is_valid_tid)(tid));
1417 tst = & VG_(threads)[tid];
sewardj2e93c502002-04-12 11:12:52 +00001418
sewardja672ea32006-04-29 18:03:14 +00001419 if (VG_(clo_trace_signals)) {
floriana5e06c32015-08-05 21:16:09 +00001420 VG_(dmsg)("push_signal_frame (thread %u): signal %d\n", tid, sigNo);
sewardja672ea32006-04-29 18:03:14 +00001421 VG_(get_and_pp_StackTrace)(tid, 10);
1422 }
jsgf855d93d2003-10-13 22:26:55 +00001423
sewardj2342c972002-05-22 23:34:20 +00001424 if (/* this signal asked to run on an alt stack */
njn695c16e2005-03-27 03:40:28 +00001425 (scss.scss_per_sig[sigNo].scss_flags & VKI_SA_ONSTACK )
sewardj2342c972002-05-22 23:34:20 +00001426 && /* there is a defined and enabled alt stack, which we're not
1427 already using. Logic from get_sigframe in
1428 arch/i386/kernel/signal.c. */
njnf536bbb2005-06-13 04:21:38 +00001429 sas_ss_flags(tid, VG_(get_SP)(tid)) == 0
sewardj2342c972002-05-22 23:34:20 +00001430 ) {
sewardj8eb8bab2015-07-21 14:44:28 +00001431 on_altstack = True;
sewardj2342c972002-05-22 23:34:20 +00001432 esp_top_of_frame
fitzhardinge98c4dc02004-03-16 08:27:29 +00001433 = (Addr)(tst->altstack.ss_sp) + tst->altstack.ss_size;
sewardj2342c972002-05-22 23:34:20 +00001434 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00001435 VG_(dmsg)("delivering signal %d (%s) to thread %u: "
sewardj738856f2009-07-15 14:48:32 +00001436 "on ALT STACK (%p-%p; %ld bytes)\n",
philippe886fde32012-03-29 21:56:47 +00001437 sigNo, VG_(signame)(sigNo), tid, tst->altstack.ss_sp,
sewardj738856f2009-07-15 14:48:32 +00001438 (UChar *)tst->altstack.ss_sp + tst->altstack.ss_size,
1439 (Word)tst->altstack.ss_size );
sewardj2342c972002-05-22 23:34:20 +00001440 } else {
sewardj8eb8bab2015-07-21 14:44:28 +00001441 on_altstack = False;
njnaf839f52005-06-23 03:27:57 +00001442 esp_top_of_frame = VG_(get_SP)(tid) - VG_STACK_REDZONE_SZB;
sewardj2342c972002-05-22 23:34:20 +00001443 }
sewardjb5f6f512005-03-10 23:59:00 +00001444
sewardj8eb8bab2015-07-21 14:44:28 +00001445 /* Signal delivery to tools */
1446 VG_TRACK( pre_deliver_signal, tid, sigNo, on_altstack );
1447
njn695c16e2005-03-27 03:40:28 +00001448 vg_assert(scss.scss_per_sig[sigNo].scss_handler != VKI_SIG_IGN);
1449 vg_assert(scss.scss_per_sig[sigNo].scss_handler != VKI_SIG_DFL);
sewardjb5f6f512005-03-10 23:59:00 +00001450
1451 /* This may fail if the client stack is busted; if that happens,
1452 the whole process will exit rather than simply calling the
1453 signal handler. */
sewardj8eb8bab2015-07-21 14:44:28 +00001454 VG_(sigframe_create) (tid, on_altstack, esp_top_of_frame, siginfo, uc,
sewardj985fabb2005-04-24 14:18:14 +00001455 scss.scss_per_sig[sigNo].scss_handler,
1456 scss.scss_per_sig[sigNo].scss_flags,
1457 &tst->sig_mask,
1458 scss.scss_per_sig[sigNo].scss_restorer);
sewardjde4a1d02002-03-22 01:27:54 +00001459}
1460
sewardjde4a1d02002-03-22 01:27:54 +00001461
florian2b8059a2012-10-14 16:45:23 +00001462const HChar *VG_(signame)(Int sigNo)
sewardjde4a1d02002-03-22 01:27:54 +00001463{
florianf44ff622014-12-20 16:52:08 +00001464 static HChar buf[20]; // large enough
sewardjb48e5002002-05-13 00:16:03 +00001465
jsgf855d93d2003-10-13 22:26:55 +00001466 switch(sigNo) {
sewardj489bfec2006-10-17 02:00:29 +00001467 case VKI_SIGHUP: return "SIGHUP";
1468 case VKI_SIGINT: return "SIGINT";
1469 case VKI_SIGQUIT: return "SIGQUIT";
1470 case VKI_SIGILL: return "SIGILL";
1471 case VKI_SIGTRAP: return "SIGTRAP";
1472 case VKI_SIGABRT: return "SIGABRT";
1473 case VKI_SIGBUS: return "SIGBUS";
1474 case VKI_SIGFPE: return "SIGFPE";
1475 case VKI_SIGKILL: return "SIGKILL";
1476 case VKI_SIGUSR1: return "SIGUSR1";
1477 case VKI_SIGUSR2: return "SIGUSR2";
1478 case VKI_SIGSEGV: return "SIGSEGV";
sewardj8eb8bab2015-07-21 14:44:28 +00001479 case VKI_SIGSYS: return "SIGSYS";
sewardj489bfec2006-10-17 02:00:29 +00001480 case VKI_SIGPIPE: return "SIGPIPE";
1481 case VKI_SIGALRM: return "SIGALRM";
1482 case VKI_SIGTERM: return "SIGTERM";
1483# if defined(VKI_SIGSTKFLT)
1484 case VKI_SIGSTKFLT: return "SIGSTKFLT";
1485# endif
1486 case VKI_SIGCHLD: return "SIGCHLD";
1487 case VKI_SIGCONT: return "SIGCONT";
1488 case VKI_SIGSTOP: return "SIGSTOP";
1489 case VKI_SIGTSTP: return "SIGTSTP";
1490 case VKI_SIGTTIN: return "SIGTTIN";
1491 case VKI_SIGTTOU: return "SIGTTOU";
1492 case VKI_SIGURG: return "SIGURG";
1493 case VKI_SIGXCPU: return "SIGXCPU";
1494 case VKI_SIGXFSZ: return "SIGXFSZ";
1495 case VKI_SIGVTALRM: return "SIGVTALRM";
1496 case VKI_SIGPROF: return "SIGPROF";
1497 case VKI_SIGWINCH: return "SIGWINCH";
1498 case VKI_SIGIO: return "SIGIO";
njncda2f0f2009-05-18 02:12:08 +00001499# if defined(VKI_SIGPWR)
sewardj489bfec2006-10-17 02:00:29 +00001500 case VKI_SIGPWR: return "SIGPWR";
njncda2f0f2009-05-18 02:12:08 +00001501# endif
sewardj8eb8bab2015-07-21 14:44:28 +00001502# if defined(VKI_SIGUNUSED) && (VKI_SIGUNUSED != VKI_SIGSYS)
sewardj489bfec2006-10-17 02:00:29 +00001503 case VKI_SIGUNUSED: return "SIGUNUSED";
1504# endif
sewardjde4a1d02002-03-22 01:27:54 +00001505
sewardj8eb8bab2015-07-21 14:44:28 +00001506 /* Solaris-specific signals. */
1507# if defined(VKI_SIGEMT)
1508 case VKI_SIGEMT: return "SIGEMT";
1509# endif
1510# if defined(VKI_SIGWAITING)
1511 case VKI_SIGWAITING: return "SIGWAITING";
1512# endif
1513# if defined(VKI_SIGLWP)
1514 case VKI_SIGLWP: return "SIGLWP";
1515# endif
1516# if defined(VKI_SIGFREEZE)
1517 case VKI_SIGFREEZE: return "SIGFREEZE";
1518# endif
1519# if defined(VKI_SIGTHAW)
1520 case VKI_SIGTHAW: return "SIGTHAW";
1521# endif
1522# if defined(VKI_SIGCANCEL)
1523 case VKI_SIGCANCEL: return "SIGCANCEL";
1524# endif
1525# if defined(VKI_SIGLOST)
1526 case VKI_SIGLOST: return "SIGLOST";
1527# endif
1528# if defined(VKI_SIGXRES)
1529 case VKI_SIGXRES: return "SIGXRES";
1530# endif
1531# if defined(VKI_SIGJVM1)
1532 case VKI_SIGJVM1: return "SIGJVM1";
1533# endif
1534# if defined(VKI_SIGJVM2)
1535 case VKI_SIGJVM2: return "SIGJVM2";
1536# endif
1537
njncda2f0f2009-05-18 02:12:08 +00001538# if defined(VKI_SIGRTMIN) && defined(VKI_SIGRTMAX)
jsgf855d93d2003-10-13 22:26:55 +00001539 case VKI_SIGRTMIN ... VKI_SIGRTMAX:
sewardjb5f6f512005-03-10 23:59:00 +00001540 VG_(sprintf)(buf, "SIGRT%d", sigNo-VKI_SIGRTMIN);
jsgf855d93d2003-10-13 22:26:55 +00001541 return buf;
njncda2f0f2009-05-18 02:12:08 +00001542# endif
sewardjde4a1d02002-03-22 01:27:54 +00001543
jsgf855d93d2003-10-13 22:26:55 +00001544 default:
1545 VG_(sprintf)(buf, "SIG%d", sigNo);
1546 return buf;
1547 }
1548}
sewardjde4a1d02002-03-22 01:27:54 +00001549
jsgf855d93d2003-10-13 22:26:55 +00001550/* Hit ourselves with a signal using the default handler */
1551void VG_(kill_self)(Int sigNo)
1552{
njnf76d27a2009-05-28 01:53:07 +00001553 Int r;
njncda2f0f2009-05-18 02:12:08 +00001554 vki_sigset_t mask, origmask;
1555 vki_sigaction_toK_t sa, origsa2;
1556 vki_sigaction_fromK_t origsa;
sewardj018f7622002-05-15 21:13:39 +00001557
jsgf855d93d2003-10-13 22:26:55 +00001558 sa.ksa_handler = VKI_SIG_DFL;
nethercote73b526f2004-10-31 18:48:21 +00001559 sa.sa_flags = 0;
sewardj8eb8bab2015-07-21 14:44:28 +00001560# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
1561 !defined(VGO_solaris)
nethercote73b526f2004-10-31 18:48:21 +00001562 sa.sa_restorer = 0;
sewardj489bfec2006-10-17 02:00:29 +00001563# endif
nethercote73b526f2004-10-31 18:48:21 +00001564 VG_(sigemptyset)(&sa.sa_mask);
sewardj2e93c502002-04-12 11:12:52 +00001565
nethercote73b526f2004-10-31 18:48:21 +00001566 VG_(sigaction)(sigNo, &sa, &origsa);
sewardj018f7622002-05-15 21:13:39 +00001567
sewardjb5f6f512005-03-10 23:59:00 +00001568 VG_(sigemptyset)(&mask);
1569 VG_(sigaddset)(&mask, sigNo);
1570 VG_(sigprocmask)(VKI_SIG_UNBLOCK, &mask, &origmask);
jsgf855d93d2003-10-13 22:26:55 +00001571
njnf76d27a2009-05-28 01:53:07 +00001572 r = VG_(kill)(VG_(getpid)(), sigNo);
sewardj8eb8bab2015-07-21 14:44:28 +00001573# if !defined(VGO_darwin)
njnf76d27a2009-05-28 01:53:07 +00001574 /* This sometimes fails with EPERM on Darwin. I don't know why. */
sewardjc7ffc942011-03-28 16:26:42 +00001575 vg_assert(r == 0);
1576# endif
jsgf855d93d2003-10-13 22:26:55 +00001577
njncda2f0f2009-05-18 02:12:08 +00001578 VG_(convert_sigaction_fromK_to_toK)( &origsa, &origsa2 );
1579 VG_(sigaction)(sigNo, &origsa2, NULL);
nethercote73b526f2004-10-31 18:48:21 +00001580 VG_(sigprocmask)(VKI_SIG_SETMASK, &origmask, NULL);
jsgf855d93d2003-10-13 22:26:55 +00001581}
1582
njn36fce1b2009-04-28 01:55:01 +00001583// The si_code describes where the signal came from. Some come from the
1584// kernel, eg.: seg faults, illegal opcodes. Some come from the user, eg.:
1585// from kill() (SI_USER), or timer_settime() (SI_TIMER), or an async I/O
1586// request (SI_ASYNCIO). There's lots of implementation-defined leeway in
njnf76d27a2009-05-28 01:53:07 +00001587// POSIX, but the user vs. kernal distinction is what we want here. We also
1588// pass in some other details that can help when si_code is unreliable.
1589static Bool is_signal_from_kernel(ThreadId tid, int signum, int si_code)
njn36fce1b2009-04-28 01:55:01 +00001590{
sewardj8eb8bab2015-07-21 14:44:28 +00001591# if defined(VGO_linux) || defined(VGO_solaris)
njn36fce1b2009-04-28 01:55:01 +00001592 // On Linux, SI_USER is zero, negative values are from the user, positive
1593 // values are from the kernel. There are SI_FROMUSER and SI_FROMKERNEL
1594 // macros but we don't use them here because other platforms don't have
1595 // them.
1596 return ( si_code > VKI_SI_USER ? True : False );
sewardj6e9de462011-06-28 07:25:29 +00001597
1598# elif defined(VGO_darwin)
njnf76d27a2009-05-28 01:53:07 +00001599 // On Darwin 9.6.0, the si_code is completely unreliable. It should be the
1600 // case that 0 means "user", and >0 means "kernel". But:
1601 // - For SIGSEGV, it seems quite reliable.
1602 // - For SIGBUS, it's always 2.
1603 // - For SIGFPE, it's often 0, even for kernel ones (eg.
1604 // div-by-integer-zero always gives zero).
1605 // - For SIGILL, it's unclear.
1606 // - For SIGTRAP, it's always 1.
1607 // You can see the "NOTIMP" (not implemented) status of a number of the
1608 // sub-cases in sys/signal.h. Hopefully future versions of Darwin will
1609 // get this right.
1610
1611 // If we're blocked waiting on a syscall, it must be a user signal, because
1612 // the kernel won't generate sync signals within syscalls.
1613 if (VG_(threads)[tid].status == VgTs_WaitSys) {
1614 return False;
1615
1616 // If it's a SIGSEGV, use the proper condition, since it's fairly reliable.
1617 } else if (SIGSEGV == signum) {
1618 return ( si_code > 0 ? True : False );
1619
1620 // If it's anything else, assume it's kernel-generated. Reason being that
1621 // kernel-generated sync signals are more common, and it's probable that
1622 // misdiagnosing a user signal as a kernel signal is better than the
1623 // opposite.
1624 } else {
1625 return True;
1626 }
sewardj6e9de462011-06-28 07:25:29 +00001627# else
1628# error Unknown OS
1629# endif
njn36fce1b2009-04-28 01:55:01 +00001630}
1631
jsgf855d93d2003-10-13 22:26:55 +00001632/*
sewardjb5f6f512005-03-10 23:59:00 +00001633 Perform the default action of a signal. If the signal is fatal, it
Elliott Hughesa0664b92017-04-18 17:46:52 -07001634 terminates all other threads, but it doesn't actually kill
1635 the process and calling thread.
jsgf855d93d2003-10-13 22:26:55 +00001636
1637 If we're not being quiet, then print out some more detail about
1638 fatal signals (esp. core dumping signals).
1639 */
njn695c16e2005-03-27 03:40:28 +00001640static void default_action(const vki_siginfo_t *info, ThreadId tid)
jsgf855d93d2003-10-13 22:26:55 +00001641{
1642 Int sigNo = info->si_signo;
sewardjb5f6f512005-03-10 23:59:00 +00001643 Bool terminate = False; /* kills process */
1644 Bool core = False; /* kills process w/ core */
1645 struct vki_rlimit corelim;
1646 Bool could_core;
Elliott Hughesed398002017-06-21 14:41:24 -07001647 ThreadState* tst = VG_(get_ThreadState)(tid);
jsgf855d93d2003-10-13 22:26:55 +00001648
sewardjb5f6f512005-03-10 23:59:00 +00001649 vg_assert(VG_(is_running_thread)(tid));
1650
jsgf855d93d2003-10-13 22:26:55 +00001651 switch(sigNo) {
njncda2f0f2009-05-18 02:12:08 +00001652 case VKI_SIGQUIT: /* core */
1653 case VKI_SIGILL: /* core */
1654 case VKI_SIGABRT: /* core */
1655 case VKI_SIGFPE: /* core */
1656 case VKI_SIGSEGV: /* core */
1657 case VKI_SIGBUS: /* core */
1658 case VKI_SIGTRAP: /* core */
sewardj8eb8bab2015-07-21 14:44:28 +00001659 case VKI_SIGSYS: /* core */
njncda2f0f2009-05-18 02:12:08 +00001660 case VKI_SIGXCPU: /* core */
1661 case VKI_SIGXFSZ: /* core */
sewardj8eb8bab2015-07-21 14:44:28 +00001662
1663 /* Solaris-specific signals. */
1664# if defined(VKI_SIGEMT)
1665 case VKI_SIGEMT: /* core */
1666# endif
1667
njncda2f0f2009-05-18 02:12:08 +00001668 terminate = True;
1669 core = True;
1670 break;
jsgf855d93d2003-10-13 22:26:55 +00001671
njncda2f0f2009-05-18 02:12:08 +00001672 case VKI_SIGHUP: /* term */
1673 case VKI_SIGINT: /* term */
1674 case VKI_SIGKILL: /* term - we won't see this */
1675 case VKI_SIGPIPE: /* term */
1676 case VKI_SIGALRM: /* term */
1677 case VKI_SIGTERM: /* term */
1678 case VKI_SIGUSR1: /* term */
1679 case VKI_SIGUSR2: /* term */
1680 case VKI_SIGIO: /* term */
1681# if defined(VKI_SIGPWR)
1682 case VKI_SIGPWR: /* term */
1683# endif
njncda2f0f2009-05-18 02:12:08 +00001684 case VKI_SIGPROF: /* term */
1685 case VKI_SIGVTALRM: /* term */
1686# if defined(VKI_SIGRTMIN) && defined(VKI_SIGRTMAX)
1687 case VKI_SIGRTMIN ... VKI_SIGRTMAX: /* term */
1688# endif
sewardj8eb8bab2015-07-21 14:44:28 +00001689
1690 /* Solaris-specific signals. */
1691# if defined(VKI_SIGLOST)
1692 case VKI_SIGLOST: /* term */
1693# endif
1694
njncda2f0f2009-05-18 02:12:08 +00001695 terminate = True;
1696 break;
jsgf855d93d2003-10-13 22:26:55 +00001697 }
1698
1699 vg_assert(!core || (core && terminate));
1700
fitzhardinge98abfc72003-12-16 02:05:15 +00001701 if (VG_(clo_trace_signals))
sewardj738856f2009-07-15 14:48:32 +00001702 VG_(dmsg)("delivering %d (code %d) to default handler; action: %s%s\n",
1703 sigNo, info->si_code, terminate ? "terminate" : "ignore",
1704 core ? "+core" : "");
fitzhardinge98abfc72003-12-16 02:05:15 +00001705
sewardjb5f6f512005-03-10 23:59:00 +00001706 if (!terminate)
1707 return; /* nothing to do */
fitzhardinge4a4d1082004-03-15 23:46:54 +00001708
Elliott Hughesed398002017-06-21 14:41:24 -07001709#if defined(VGO_linux)
1710 if (terminate && (tst->ptrace & VKI_PT_PTRACED)
1711 && (sigNo != VKI_SIGKILL)) {
1712 VG_(kill)(VG_(getpid)(), VKI_SIGSTOP);
1713 return;
1714 }
1715#endif
1716
sewardjb5f6f512005-03-10 23:59:00 +00001717 could_core = core;
1718
1719 if (core) {
1720 /* If they set the core-size limit to zero, don't generate a
1721 core file */
fitzhardinge61a53412004-03-15 23:44:11 +00001722
sewardjb5f6f512005-03-10 23:59:00 +00001723 VG_(getrlimit)(VKI_RLIMIT_CORE, &corelim);
fitzhardinge61a53412004-03-15 23:44:11 +00001724
sewardjb5f6f512005-03-10 23:59:00 +00001725 if (corelim.rlim_cur == 0)
1726 core = False;
1727 }
fitzhardinge61a53412004-03-15 23:44:11 +00001728
Elliott Hughesa0664b92017-04-18 17:46:52 -07001729 if ( VG_(clo_verbosity) >= 1
1730 || (could_core && is_signal_from_kernel(tid, sigNo, info->si_code))
1731 || VG_(clo_xml) ) {
1732 if (VG_(clo_xml)) {
1733 VG_(printf_xml)("<fatal_signal>\n");
1734 VG_(printf_xml)(" <tid>%d</tid>\n", tid);
Elliott Hughesa0664b92017-04-18 17:46:52 -07001735 if (tst->thread_name) {
1736 VG_(printf_xml)(" <threadname>%s</threadname>\n",
1737 tst->thread_name);
1738 }
1739 VG_(printf_xml)(" <signo>%d</signo>\n", sigNo);
1740 VG_(printf_xml)(" <signame>%s</signame>\n", VG_(signame)(sigNo));
1741 VG_(printf_xml)(" <sicode>%d</sicode>\n", info->si_code);
1742 } else {
1743 VG_(umsg)(
1744 "\n"
1745 "Process terminating with default action of signal %d (%s)%s\n",
1746 sigNo, VG_(signame)(sigNo), core ? ": dumping core" : "");
1747 }
jsgf855d93d2003-10-13 22:26:55 +00001748
sewardjb5f6f512005-03-10 23:59:00 +00001749 /* Be helpful - decode some more details about this fault */
njnf76d27a2009-05-28 01:53:07 +00001750 if (is_signal_from_kernel(tid, sigNo, info->si_code)) {
florian2b8059a2012-10-14 16:45:23 +00001751 const HChar *event = NULL;
sewardjb5f6f512005-03-10 23:59:00 +00001752 Bool haveaddr = True;
jsgf855d93d2003-10-13 22:26:55 +00001753
sewardjb5f6f512005-03-10 23:59:00 +00001754 switch(sigNo) {
1755 case VKI_SIGSEGV:
1756 switch(info->si_code) {
sewardj738856f2009-07-15 14:48:32 +00001757 case VKI_SEGV_MAPERR: event = "Access not within mapped region";
1758 break;
1759 case VKI_SEGV_ACCERR: event = "Bad permissions for mapped region";
1760 break;
njn059539d2009-04-28 08:00:23 +00001761 case VKI_SEGV_MADE_UP_GPF:
sewardjb5f6f512005-03-10 23:59:00 +00001762 /* General Protection Fault: The CPU/kernel
1763 isn't telling us anything useful, but this
1764 is commonly the result of exceeding a
sewardj74b4cca2005-10-20 01:37:15 +00001765 segment limit. */
1766 event = "General Protection Fault";
sewardjb5f6f512005-03-10 23:59:00 +00001767 haveaddr = False;
jsgf855d93d2003-10-13 22:26:55 +00001768 break;
1769 }
sewardj45f4e7c2005-09-27 19:20:21 +00001770#if 0
1771 {
florian7b7d5942014-12-19 20:29:22 +00001772 HChar buf[50]; // large enough
sewardj45f4e7c2005-09-27 19:20:21 +00001773 VG_(am_show_nsegments)(0,"post segfault");
1774 VG_(sprintf)(buf, "/bin/cat /proc/%d/maps", VG_(getpid)());
1775 VG_(system)(buf);
1776 }
1777#endif
sewardjb5f6f512005-03-10 23:59:00 +00001778 break;
jsgf855d93d2003-10-13 22:26:55 +00001779
sewardjb5f6f512005-03-10 23:59:00 +00001780 case VKI_SIGILL:
1781 switch(info->si_code) {
tom148250b2005-11-12 00:13:20 +00001782 case VKI_ILL_ILLOPC: event = "Illegal opcode"; break;
1783 case VKI_ILL_ILLOPN: event = "Illegal operand"; break;
1784 case VKI_ILL_ILLADR: event = "Illegal addressing mode"; break;
1785 case VKI_ILL_ILLTRP: event = "Illegal trap"; break;
1786 case VKI_ILL_PRVOPC: event = "Privileged opcode"; break;
1787 case VKI_ILL_PRVREG: event = "Privileged register"; break;
1788 case VKI_ILL_COPROC: event = "Coprocessor error"; break;
1789 case VKI_ILL_BADSTK: event = "Internal stack error"; break;
sewardjb5f6f512005-03-10 23:59:00 +00001790 }
1791 break;
1792
1793 case VKI_SIGFPE:
1794 switch (info->si_code) {
tom148250b2005-11-12 00:13:20 +00001795 case VKI_FPE_INTDIV: event = "Integer divide by zero"; break;
1796 case VKI_FPE_INTOVF: event = "Integer overflow"; break;
1797 case VKI_FPE_FLTDIV: event = "FP divide by zero"; break;
1798 case VKI_FPE_FLTOVF: event = "FP overflow"; break;
1799 case VKI_FPE_FLTUND: event = "FP underflow"; break;
1800 case VKI_FPE_FLTRES: event = "FP inexact"; break;
1801 case VKI_FPE_FLTINV: event = "FP invalid operation"; break;
1802 case VKI_FPE_FLTSUB: event = "FP subscript out of range"; break;
sewardj8eb8bab2015-07-21 14:44:28 +00001803
1804 /* Solaris-specific codes. */
1805# if defined(VKI_FPE_FLTDEN)
1806 case VKI_FPE_FLTDEN: event = "FP denormalize"; break;
1807# endif
sewardjb5f6f512005-03-10 23:59:00 +00001808 }
1809 break;
1810
1811 case VKI_SIGBUS:
1812 switch (info->si_code) {
tom148250b2005-11-12 00:13:20 +00001813 case VKI_BUS_ADRALN: event = "Invalid address alignment"; break;
1814 case VKI_BUS_ADRERR: event = "Non-existent physical address"; break;
1815 case VKI_BUS_OBJERR: event = "Hardware error"; break;
sewardjb5f6f512005-03-10 23:59:00 +00001816 }
1817 break;
sewardj3059d272007-12-21 01:24:59 +00001818 } /* switch (sigNo) */
sewardjb5f6f512005-03-10 23:59:00 +00001819
Elliott Hughesa0664b92017-04-18 17:46:52 -07001820 if (VG_(clo_xml)) {
1821 if (event != NULL)
1822 VG_(printf_xml)(" <event>%s</event>\n", event);
1823 if (haveaddr)
1824 VG_(printf_xml)(" <siaddr>%p</siaddr>\n",
1825 info->VKI_SIGINFO_si_addr);
1826 } else {
1827 if (event != NULL) {
1828 if (haveaddr)
1829 VG_(umsg)(" %s at address %p\n",
1830 event, info->VKI_SIGINFO_si_addr);
1831 else
1832 VG_(umsg)(" %s\n", event);
1833 }
1834 }
jsgf855d93d2003-10-13 22:26:55 +00001835 }
sewardj3059d272007-12-21 01:24:59 +00001836 /* Print a stack trace. Be cautious if the thread's SP is in an
1837 obviously stupid place (not mapped readable) that would
1838 likely cause a segfault. */
1839 if (VG_(is_valid_tid)(tid)) {
florian2baf7532012-07-26 02:41:31 +00001840 Word first_ip_delta = 0;
sewardj8eb8bab2015-07-21 14:44:28 +00001841#if defined(VGO_linux) || defined(VGO_solaris)
florianede9caf2012-07-15 01:31:45 +00001842 /* Make sure that the address stored in the stack pointer is
1843 located in a mapped page. That is not necessarily so. E.g.
1844 consider the scenario where the stack pointer was decreased
1845 and now has a value that is just below the end of a page that has
1846 not been mapped yet. In that case VG_(am_is_valid_for_client)
1847 will consider the address of the stack pointer invalid and that
1848 would cause a back-trace of depth 1 to be printed, instead of a
1849 full back-trace. */
1850 if (tid == 1) { // main thread
1851 Addr esp = VG_(get_SP)(tid);
1852 Addr base = VG_PGROUNDDN(esp - VG_STACK_REDZONE_SZB);
Elliott Hughesa0664b92017-04-18 17:46:52 -07001853 if (VG_(am_addr_is_in_extensible_client_stack)(base)
1854 && VG_(extend_stack)(tid, base)) {
florianede9caf2012-07-15 01:31:45 +00001855 if (VG_(clo_trace_signals))
1856 VG_(dmsg)(" -> extended stack base to %#lx\n",
1857 VG_PGROUNDDN(esp));
1858 }
1859 }
1860#endif
florian2baf7532012-07-26 02:41:31 +00001861#if defined(VGA_s390x)
1862 if (sigNo == VKI_SIGILL) {
1863 /* The guest instruction address has been adjusted earlier to
1864 point to the insn following the one that could not be decoded.
1865 When printing the back-trace here we need to undo that
1866 adjustment so the first line in the back-trace reports the
1867 correct address. */
1868 Addr addr = (Addr)info->VKI_SIGINFO_si_addr;
1869 UChar byte = ((UChar *)addr)[0];
1870 Int insn_length = ((((byte >> 6) + 1) >> 1) + 1) << 1;
1871
1872 first_ip_delta = -insn_length;
1873 }
1874#endif
sewardj3059d272007-12-21 01:24:59 +00001875 ExeContext* ec = VG_(am_is_valid_for_client)
1876 (VG_(get_SP)(tid), sizeof(Addr), VKI_PROT_READ)
florian2baf7532012-07-26 02:41:31 +00001877 ? VG_(record_ExeContext)( tid, first_ip_delta )
florianbb4f5da2012-07-23 15:40:41 +00001878 : VG_(record_depth_1_ExeContext)( tid,
florian2baf7532012-07-26 02:41:31 +00001879 first_ip_delta );
sewardj3059d272007-12-21 01:24:59 +00001880 vg_assert(ec);
1881 VG_(pp_ExeContext)( ec );
fitzhardinge126c64f2003-12-08 21:58:37 +00001882 }
sewardj95d86c02007-12-18 01:49:23 +00001883 if (sigNo == VKI_SIGSEGV
florianfcd96352013-01-21 20:29:54 +00001884 && is_signal_from_kernel(tid, sigNo, info->si_code)
sewardj95d86c02007-12-18 01:49:23 +00001885 && info->si_code == VKI_SEGV_MAPERR) {
sewardj738856f2009-07-15 14:48:32 +00001886 VG_(umsg)(" If you believe this happened as a result of a stack\n" );
1887 VG_(umsg)(" overflow in your program's main thread (unlikely but\n");
1888 VG_(umsg)(" possible), you can try to increase the size of the\n" );
1889 VG_(umsg)(" main thread stack using the --main-stacksize= flag.\n" );
sewardj95d86c02007-12-18 01:49:23 +00001890 // FIXME: assumes main ThreadId == 1
1891 if (VG_(is_valid_tid)(1)) {
sewardj738856f2009-07-15 14:48:32 +00001892 VG_(umsg)(
philippedfa54a52013-03-13 21:44:07 +00001893 " The main thread stack size used in this run was %lu.\n",
1894 VG_(threads)[1].client_stack_szB);
sewardj95d86c02007-12-18 01:49:23 +00001895 }
1896 }
Elliott Hughesa0664b92017-04-18 17:46:52 -07001897 if (VG_(clo_xml)) {
1898 /* postamble */
1899 VG_(printf_xml)("</fatal_signal>\n");
1900 VG_(printf_xml)("\n");
1901 }
sewardjb5f6f512005-03-10 23:59:00 +00001902 }
1903
philippe2d1f2562014-09-19 08:57:29 +00001904 if (VG_(clo_vgdb) != Vg_VgdbNo
1905 && VG_(dyn_vgdb_error) <= VG_(get_n_errs_shown)() + 1) {
1906 /* Note: we add + 1 to n_errs_shown as the fatal signal was not
1907 reported through error msg, and so was not counted. */
philippeb3014692015-05-17 13:38:25 +00001908 VG_(gdbserver_report_fatal_signal) (info, tid);
philippe2d1f2562014-09-19 08:57:29 +00001909 }
1910
sewardjb5f6f512005-03-10 23:59:00 +00001911 if (core) {
florian90694062015-05-16 16:17:52 +00001912 static const struct vki_rlimit zero = { 0, 0 };
fitzhardinge4a4d1082004-03-15 23:46:54 +00001913
njn67229832005-08-28 04:38:12 +00001914 VG_(make_coredump)(tid, info, corelim.rlim_cur);
fitzhardinged65dcad2004-03-13 02:06:58 +00001915
sewardjb5f6f512005-03-10 23:59:00 +00001916 /* Make sure we don't get a confusing kernel-generated
1917 coredump when we finally exit */
1918 VG_(setrlimit)(VKI_RLIMIT_CORE, &zero);
1919 }
fitzhardinged65dcad2004-03-13 02:06:58 +00001920
sewardj1d887112005-05-30 21:44:08 +00001921 // what's this for?
1922 //VG_(threads)[VG_(master_tid)].os_state.fatalsig = sigNo;
sewardjde4a1d02002-03-22 01:27:54 +00001923
Elliott Hughesa0664b92017-04-18 17:46:52 -07001924 /* everyone but tid dies */
sewardjb5f6f512005-03-10 23:59:00 +00001925 VG_(nuke_all_threads_except)(tid, VgSrc_FatalSig);
Elliott Hughesa0664b92017-04-18 17:46:52 -07001926 VG_(reap_threads)(tid);
1927 /* stash fatal signal in this thread */
sewardjb5f6f512005-03-10 23:59:00 +00001928 VG_(threads)[tid].exitreason = VgSrc_FatalSig;
1929 VG_(threads)[tid].os_state.fatalsig = sigNo;
sewardjb48e5002002-05-13 00:16:03 +00001930}
1931
sewardjb5f6f512005-03-10 23:59:00 +00001932/*
1933 This does the business of delivering a signal to a thread. It may
1934 be called from either a real signal handler, or from normal code to
1935 cause the thread to enter the signal handler.
sewardj5e2f0012004-12-13 14:10:34 +00001936
sewardjb5f6f512005-03-10 23:59:00 +00001937 This updates the thread state, but it does not set it to be
1938 Runnable.
1939*/
njn5a350be2009-04-30 03:05:05 +00001940static void deliver_signal ( ThreadId tid, const vki_siginfo_t *info,
1941 const struct vki_ucontext *uc )
sewardjde4a1d02002-03-22 01:27:54 +00001942{
jsgf855d93d2003-10-13 22:26:55 +00001943 Int sigNo = info->si_signo;
njn695c16e2005-03-27 03:40:28 +00001944 SCSS_Per_Signal *handler = &scss.scss_per_sig[sigNo];
fitzhardinge98abfc72003-12-16 02:05:15 +00001945 void *handler_fn;
jsgf855d93d2003-10-13 22:26:55 +00001946 ThreadState *tst = VG_(get_ThreadState)(tid);
1947
1948 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00001949 VG_(dmsg)("delivering signal %d (%s):%d to thread %u\n",
philippe886fde32012-03-29 21:56:47 +00001950 sigNo, VG_(signame)(sigNo), info->si_code, tid );
jsgf855d93d2003-10-13 22:26:55 +00001951
njn351d0062005-06-21 22:23:59 +00001952 if (sigNo == VG_SIGVGKILL) {
sewardjb5f6f512005-03-10 23:59:00 +00001953 /* If this is a SIGVGKILL, we're expecting it to interrupt any
1954 blocked syscall. It doesn't matter whether the VCPU state is
1955 set to restart or not, because we don't expect it will
1956 execute any more client instructions. */
1957 vg_assert(VG_(is_exiting)(tid));
jsgf855d93d2003-10-13 22:26:55 +00001958 return;
1959 }
1960
sewardjb5f6f512005-03-10 23:59:00 +00001961 /* If the client specifies SIG_IGN, treat it as SIG_DFL.
jsgf855d93d2003-10-13 22:26:55 +00001962
njn9ec0f3e2005-03-13 06:00:47 +00001963 If deliver_signal() is being called on a thread, we want
sewardjb5f6f512005-03-10 23:59:00 +00001964 the signal to get through no matter what; if they're ignoring
1965 it, then we do this override (this is so we can send it SIGSEGV,
1966 etc). */
fitzhardinge98abfc72003-12-16 02:05:15 +00001967 handler_fn = handler->scss_handler;
sewardjb5f6f512005-03-10 23:59:00 +00001968 if (handler_fn == VKI_SIG_IGN)
fitzhardinge98abfc72003-12-16 02:05:15 +00001969 handler_fn = VKI_SIG_DFL;
1970
1971 vg_assert(handler_fn != VKI_SIG_IGN);
jsgf855d93d2003-10-13 22:26:55 +00001972
fitzhardinge98abfc72003-12-16 02:05:15 +00001973 if (handler_fn == VKI_SIG_DFL) {
njn695c16e2005-03-27 03:40:28 +00001974 default_action(info, tid);
jsgf855d93d2003-10-13 22:26:55 +00001975 } else {
1976 /* Create a signal delivery frame, and set the client's %ESP and
1977 %EIP so that when execution continues, we will enter the
1978 signal handler with the frame on top of the client's stack,
sewardjb5f6f512005-03-10 23:59:00 +00001979 as it expects.
1980
1981 Signal delivery can fail if the client stack is too small or
1982 missing, and we can't push the frame. If that happens,
1983 push_signal_frame will cause the whole process to exit when
1984 we next hit the scheduler.
1985 */
jsgf855d93d2003-10-13 22:26:55 +00001986 vg_assert(VG_(is_valid_tid)(tid));
sewardjb5f6f512005-03-10 23:59:00 +00001987
tomadacaf92007-12-21 10:24:24 +00001988 push_signal_frame ( tid, info, uc );
jsgf855d93d2003-10-13 22:26:55 +00001989
1990 if (handler->scss_flags & VKI_SA_ONESHOT) {
1991 /* Do the ONESHOT thing. */
1992 handler->scss_handler = VKI_SIG_DFL;
1993
nethercote9dd11512004-08-04 15:31:30 +00001994 handle_SCSS_change( False /* lazy update */ );
jsgf855d93d2003-10-13 22:26:55 +00001995 }
sewardjb5f6f512005-03-10 23:59:00 +00001996
1997 /* At this point:
1998 tst->sig_mask is the current signal mask
1999 tst->tmp_sig_mask is the same as sig_mask, unless we're in sigsuspend
2000 handler->scss_mask is the mask set by the handler
2001
2002 Handler gets a mask of tmp_sig_mask|handler_mask|signo
2003 */
2004 tst->sig_mask = tst->tmp_sig_mask;
2005 if (!(handler->scss_flags & VKI_SA_NOMASK)) {
2006 VG_(sigaddset_from_set)(&tst->sig_mask, &handler->scss_mask);
2007 VG_(sigaddset)(&tst->sig_mask, sigNo);
sewardjb5f6f512005-03-10 23:59:00 +00002008 tst->tmp_sig_mask = tst->sig_mask;
2009 }
2010 }
2011
2012 /* Thread state is ready to go - just add Runnable */
2013}
2014
njn06244e72005-06-21 22:27:19 +00002015static void resume_scheduler(ThreadId tid)
2016{
2017 ThreadState *tst = VG_(get_ThreadState)(tid);
2018
2019 vg_assert(tst->os_state.lwpid == VG_(gettid)());
2020
2021 if (tst->sched_jmpbuf_valid) {
2022 /* Can't continue; must longjmp back to the scheduler and thus
2023 enter the sighandler immediately. */
sewardj6c591e12011-04-11 16:17:51 +00002024 VG_MINIMAL_LONGJMP(tst->sched_jmpbuf);
njn06244e72005-06-21 22:27:19 +00002025 }
2026}
2027
njn9ec0f3e2005-03-13 06:00:47 +00002028static void synth_fault_common(ThreadId tid, Addr addr, Int si_code)
2029{
2030 vki_siginfo_t info;
2031
2032 vg_assert(VG_(threads)[tid].status == VgTs_Runnable);
2033
njn5a350be2009-04-30 03:05:05 +00002034 VG_(memset)(&info, 0, sizeof(info));
njn9ec0f3e2005-03-13 06:00:47 +00002035 info.si_signo = VKI_SIGSEGV;
2036 info.si_code = si_code;
sewardj489bfec2006-10-17 02:00:29 +00002037 info.VKI_SIGINFO_si_addr = (void*)addr;
njn9ec0f3e2005-03-13 06:00:47 +00002038
philippe448e2bf2013-03-03 17:52:31 +00002039 /* Even if gdbserver indicates to ignore the signal, we must deliver it.
2040 So ignore the return value of VG_(gdbserver_report_signal). */
philippeb3014692015-05-17 13:38:25 +00002041 (void) VG_(gdbserver_report_signal) (&info, tid);
sewardj3b290482011-05-06 21:02:55 +00002042
njn9ec0f3e2005-03-13 06:00:47 +00002043 /* If they're trying to block the signal, force it to be delivered */
2044 if (VG_(sigismember)(&VG_(threads)[tid].sig_mask, VKI_SIGSEGV))
2045 VG_(set_default_handler)(VKI_SIGSEGV);
2046
tomadacaf92007-12-21 10:24:24 +00002047 deliver_signal(tid, &info, NULL);
njn9ec0f3e2005-03-13 06:00:47 +00002048}
2049
2050// Synthesize a fault where the address is OK, but the page
2051// permissions are bad.
2052void VG_(synth_fault_perms)(ThreadId tid, Addr addr)
2053{
njn059539d2009-04-28 08:00:23 +00002054 synth_fault_common(tid, addr, VKI_SEGV_ACCERR);
njn9ec0f3e2005-03-13 06:00:47 +00002055}
2056
2057// Synthesize a fault where the address there's nothing mapped at the address.
2058void VG_(synth_fault_mapping)(ThreadId tid, Addr addr)
2059{
njn059539d2009-04-28 08:00:23 +00002060 synth_fault_common(tid, addr, VKI_SEGV_MAPERR);
njn9ec0f3e2005-03-13 06:00:47 +00002061}
2062
2063// Synthesize a misc memory fault.
2064void VG_(synth_fault)(ThreadId tid)
2065{
njn059539d2009-04-28 08:00:23 +00002066 synth_fault_common(tid, 0, VKI_SEGV_MADE_UP_GPF);
njn9ec0f3e2005-03-13 06:00:47 +00002067}
2068
2069// Synthesise a SIGILL.
2070void VG_(synth_sigill)(ThreadId tid, Addr addr)
2071{
2072 vki_siginfo_t info;
2073
2074 vg_assert(VG_(threads)[tid].status == VgTs_Runnable);
2075
njn5a350be2009-04-30 03:05:05 +00002076 VG_(memset)(&info, 0, sizeof(info));
njn9ec0f3e2005-03-13 06:00:47 +00002077 info.si_signo = VKI_SIGILL;
sewardj489bfec2006-10-17 02:00:29 +00002078 info.si_code = VKI_ILL_ILLOPC; /* jrs: no idea what this should be */
2079 info.VKI_SIGINFO_si_addr = (void*)addr;
njn9ec0f3e2005-03-13 06:00:47 +00002080
philippeb3014692015-05-17 13:38:25 +00002081 if (VG_(gdbserver_report_signal) (&info, tid)) {
sewardj3b290482011-05-06 21:02:55 +00002082 resume_scheduler(tid);
2083 deliver_signal(tid, &info, NULL);
2084 }
2085 else
2086 resume_scheduler(tid);
njn9ec0f3e2005-03-13 06:00:47 +00002087}
2088
sewardj1c0ce7a2009-07-01 08:10:49 +00002089// Synthesise a SIGBUS.
2090void VG_(synth_sigbus)(ThreadId tid)
2091{
2092 vki_siginfo_t info;
2093
2094 vg_assert(VG_(threads)[tid].status == VgTs_Runnable);
2095
2096 VG_(memset)(&info, 0, sizeof(info));
2097 info.si_signo = VKI_SIGBUS;
2098 /* There are several meanings to SIGBUS (as per POSIX, presumably),
2099 but the most widely understood is "invalid address alignment",
2100 so let's use that. */
2101 info.si_code = VKI_BUS_ADRALN;
2102 /* If we knew the invalid address in question, we could put it
2103 in .si_addr. Oh well. */
2104 /* info.VKI_SIGINFO_si_addr = (void*)addr; */
2105
philippeb3014692015-05-17 13:38:25 +00002106 if (VG_(gdbserver_report_signal) (&info, tid)) {
sewardj3b290482011-05-06 21:02:55 +00002107 resume_scheduler(tid);
2108 deliver_signal(tid, &info, NULL);
2109 }
2110 else
2111 resume_scheduler(tid);
sewardj1c0ce7a2009-07-01 08:10:49 +00002112}
2113
sewardj86df1552006-02-07 20:56:41 +00002114// Synthesise a SIGTRAP.
2115void VG_(synth_sigtrap)(ThreadId tid)
2116{
2117 vki_siginfo_t info;
tomadacaf92007-12-21 10:24:24 +00002118 struct vki_ucontext uc;
njnf76d27a2009-05-28 01:53:07 +00002119# if defined(VGP_x86_darwin)
2120 struct __darwin_mcontext32 mc;
2121# elif defined(VGP_amd64_darwin)
2122 struct __darwin_mcontext64 mc;
2123# endif
sewardj86df1552006-02-07 20:56:41 +00002124
2125 vg_assert(VG_(threads)[tid].status == VgTs_Runnable);
2126
njn5a350be2009-04-30 03:05:05 +00002127 VG_(memset)(&info, 0, sizeof(info));
2128 VG_(memset)(&uc, 0, sizeof(uc));
sewardj86df1552006-02-07 20:56:41 +00002129 info.si_signo = VKI_SIGTRAP;
tomadacaf92007-12-21 10:24:24 +00002130 info.si_code = VKI_TRAP_BRKPT; /* tjh: only ever called for a brkpt ins */
njncda2f0f2009-05-18 02:12:08 +00002131
2132# if defined(VGP_x86_linux) || defined(VGP_amd64_linux)
tomadacaf92007-12-21 10:24:24 +00002133 uc.uc_mcontext.trapno = 3; /* tjh: this is the x86 trap number
2134 for a breakpoint trap... */
tom8b243022008-06-13 08:37:49 +00002135 uc.uc_mcontext.err = 0; /* tjh: no error code for x86
2136 breakpoint trap... */
njnf76d27a2009-05-28 01:53:07 +00002137# elif defined(VGP_x86_darwin) || defined(VGP_amd64_darwin)
2138 /* the same thing, but using Darwin field/struct names */
2139 VG_(memset)(&mc, 0, sizeof(mc));
2140 uc.uc_mcontext = &mc;
2141 uc.uc_mcontext->__es.__trapno = 3;
2142 uc.uc_mcontext->__es.__err = 0;
sewardj8eb8bab2015-07-21 14:44:28 +00002143# elif defined(VGP_x86_solaris)
2144 uc.uc_mcontext.gregs[VKI_ERR] = 0;
2145 uc.uc_mcontext.gregs[VKI_TRAPNO] = VKI_T_BPTFLT;
njncda2f0f2009-05-18 02:12:08 +00002146# endif
sewardj86df1552006-02-07 20:56:41 +00002147
sewardjb5b87402011-03-07 16:05:35 +00002148 /* fixs390: do we need to do anything here for s390 ? */
philippeb3014692015-05-17 13:38:25 +00002149 if (VG_(gdbserver_report_signal) (&info, tid)) {
sewardj3b290482011-05-06 21:02:55 +00002150 resume_scheduler(tid);
2151 deliver_signal(tid, &info, &uc);
2152 }
2153 else
2154 resume_scheduler(tid);
sewardj86df1552006-02-07 20:56:41 +00002155}
2156
petarj80e5c172012-10-19 14:45:17 +00002157// Synthesise a SIGFPE.
2158void VG_(synth_sigfpe)(ThreadId tid, UInt code)
2159{
petarj4df0bfc2013-02-27 23:17:33 +00002160// Only tested on mips32 and mips64
2161#if !defined(VGA_mips32) && !defined(VGA_mips64)
petarj80e5c172012-10-19 14:45:17 +00002162 vg_assert(0);
2163#else
2164 vki_siginfo_t info;
2165 struct vki_ucontext uc;
2166
2167 vg_assert(VG_(threads)[tid].status == VgTs_Runnable);
2168
2169 VG_(memset)(&info, 0, sizeof(info));
2170 VG_(memset)(&uc, 0, sizeof(uc));
2171 info.si_signo = VKI_SIGFPE;
2172 info.si_code = code;
2173
Elliott Hughesed398002017-06-21 14:41:24 -07002174 if (VG_(gdbserver_report_signal) (&info, tid)) {
petarj80e5c172012-10-19 14:45:17 +00002175 resume_scheduler(tid);
2176 deliver_signal(tid, &info, &uc);
2177 }
2178 else
2179 resume_scheduler(tid);
2180#endif
2181}
2182
sewardjb5f6f512005-03-10 23:59:00 +00002183/* Make a signal pending for a thread, for later delivery.
2184 VG_(poll_signals) will arrange for it to be delivered at the right
2185 time.
2186
2187 tid==0 means add it to the process-wide queue, and not sent it to a
2188 specific thread.
2189*/
sewardj2c5ffbe2005-03-12 13:32:06 +00002190static
sewardjb5f6f512005-03-10 23:59:00 +00002191void queue_signal(ThreadId tid, const vki_siginfo_t *si)
2192{
2193 ThreadState *tst;
2194 SigQueue *sq;
2195 vki_sigset_t savedmask;
2196
2197 tst = VG_(get_ThreadState)(tid);
2198
2199 /* Protect the signal queue against async deliveries */
njn444eba12005-05-12 03:47:31 +00002200 block_all_host_signals(&savedmask);
sewardjb5f6f512005-03-10 23:59:00 +00002201
2202 if (tst->sig_queue == NULL) {
florian77eb20b2014-09-11 21:19:17 +00002203 tst->sig_queue = VG_(malloc)("signals.qs.1", sizeof(*tst->sig_queue));
sewardjb5f6f512005-03-10 23:59:00 +00002204 VG_(memset)(tst->sig_queue, 0, sizeof(*tst->sig_queue));
2205 }
2206 sq = tst->sig_queue;
2207
2208 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00002209 VG_(dmsg)("Queueing signal %d (idx %d) to thread %u\n",
sewardj738856f2009-07-15 14:48:32 +00002210 si->si_signo, sq->next, tid);
sewardjb5f6f512005-03-10 23:59:00 +00002211
2212 /* Add signal to the queue. If the queue gets overrun, then old
2213 queued signals may get lost.
2214
2215 XXX We should also keep a sigset of pending signals, so that at
2216 least a non-siginfo signal gets deliviered.
2217 */
2218 if (sq->sigs[sq->next].si_signo != 0)
floriana5e06c32015-08-05 21:16:09 +00002219 VG_(umsg)("Signal %d being dropped from thread %u's queue\n",
sewardj738856f2009-07-15 14:48:32 +00002220 sq->sigs[sq->next].si_signo, tid);
sewardjb5f6f512005-03-10 23:59:00 +00002221
2222 sq->sigs[sq->next] = *si;
2223 sq->next = (sq->next+1) % N_QUEUED_SIGNALS;
2224
njn444eba12005-05-12 03:47:31 +00002225 restore_all_host_signals(&savedmask);
sewardjb5f6f512005-03-10 23:59:00 +00002226}
2227
2228/*
2229 Returns the next queued signal for thread tid which is in "set".
2230 tid==0 means process-wide signal. Set si_signo to 0 when the
2231 signal has been delivered.
2232
2233 Must be called with all signals blocked, to protect against async
2234 deliveries.
2235*/
2236static vki_siginfo_t *next_queued(ThreadId tid, const vki_sigset_t *set)
2237{
2238 ThreadState *tst = VG_(get_ThreadState)(tid);
2239 SigQueue *sq;
2240 Int idx;
2241 vki_siginfo_t *ret = NULL;
2242
2243 sq = tst->sig_queue;
2244 if (sq == NULL)
2245 goto out;
jsgf855d93d2003-10-13 22:26:55 +00002246
sewardjb5f6f512005-03-10 23:59:00 +00002247 idx = sq->next;
2248 do {
2249 if (0)
2250 VG_(printf)("idx=%d si_signo=%d inset=%d\n", idx,
sewardj738856f2009-07-15 14:48:32 +00002251 sq->sigs[idx].si_signo,
2252 VG_(sigismember)(set, sq->sigs[idx].si_signo));
jsgf855d93d2003-10-13 22:26:55 +00002253
sewardj738856f2009-07-15 14:48:32 +00002254 if (sq->sigs[idx].si_signo != 0
2255 && VG_(sigismember)(set, sq->sigs[idx].si_signo)) {
sewardjb5f6f512005-03-10 23:59:00 +00002256 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00002257 VG_(dmsg)("Returning queued signal %d (idx %d) for thread %u\n",
sewardj738856f2009-07-15 14:48:32 +00002258 sq->sigs[idx].si_signo, idx, tid);
sewardjb5f6f512005-03-10 23:59:00 +00002259 ret = &sq->sigs[idx];
2260 goto out;
jsgf855d93d2003-10-13 22:26:55 +00002261 }
2262
sewardjb5f6f512005-03-10 23:59:00 +00002263 idx = (idx + 1) % N_QUEUED_SIGNALS;
2264 } while(idx != sq->next);
2265 out:
sewardj489bfec2006-10-17 02:00:29 +00002266 return ret;
jsgf855d93d2003-10-13 22:26:55 +00002267}
2268
njn3b6b2aa2009-04-30 03:30:09 +00002269static int sanitize_si_code(int si_code)
2270{
2271#if defined(VGO_linux)
2272 /* The linux kernel uses the top 16 bits of si_code for it's own
2273 use and only exports the bottom 16 bits to user space - at least
2274 that is the theory, but it turns out that there are some kernels
2275 around that forget to mask out the top 16 bits so we do it here.
2276
2277 The kernel treats the bottom 16 bits as signed and (when it does
2278 mask them off) sign extends them when exporting to user space so
2279 we do the same thing here. */
2280 return (Short)si_code;
sewardj8eb8bab2015-07-21 14:44:28 +00002281#elif defined(VGO_darwin) || defined(VGO_solaris)
njn3b6b2aa2009-04-30 03:30:09 +00002282 return si_code;
njn52040a42009-04-30 04:00:13 +00002283#else
2284# error Unknown OS
njn3b6b2aa2009-04-30 03:30:09 +00002285#endif
2286}
2287
sewardj8eb8bab2015-07-21 14:44:28 +00002288#if defined(VGO_solaris)
2289/* Following function is used to switch Valgrind from a client stack back onto
2290 a Valgrind stack. It is used only when the door_return call was invoked by
2291 the client because this is the only syscall which is executed directly on
2292 the client stack (see syscall-{x86,amd64}-solaris.S). The switch onto the
2293 Valgrind stack has to be made as soon as possible because there is no
2294 guarantee that there is enough space on the client stack to run the
2295 complete signal machinery. Also, Valgrind has to be switched back onto its
2296 stack before a simulated signal frame is created because that will
2297 overwrite the real sigframe built by the kernel. */
2298static void async_signalhandler_solaris_preprocess(ThreadId tid, Int *signo,
2299 vki_siginfo_t *info,
2300 struct vki_ucontext *uc)
2301{
2302# define RECURSION_BIT 0x1000
2303 Addr sp;
2304 vki_sigframe_t *frame;
2305 ThreadState *tst = VG_(get_ThreadState)(tid);
2306 Int rec_signo;
2307
2308 /* If not doing door_return then return instantly. */
2309 if (!tst->os_state.in_door_return)
2310 return;
2311
2312 /* Check for the recursion:
2313 v ...
2314 | async_signalhandler - executed on the client stack
2315 v async_signalhandler_solaris_preprocess - first call switches the
2316 | stacks and sets the RECURSION_BIT flag
2317 v async_signalhandler - executed on the Valgrind stack
2318 | async_signalhandler_solaris_preprocess - the RECURSION_BIT flag is
2319 v set, clear it and return
2320 */
2321 if (*signo & RECURSION_BIT) {
2322 *signo &= ~RECURSION_BIT;
2323 return;
2324 }
2325
2326 rec_signo = *signo | RECURSION_BIT;
2327
2328# if defined(VGP_x86_solaris)
2329 /* Register %ebx/%rbx points to the top of the original V stack. */
2330 sp = uc->uc_mcontext.gregs[VKI_EBX];
2331# elif defined(VGP_amd64_solaris)
2332 sp = uc->uc_mcontext.gregs[VKI_REG_RBX];
2333# else
2334# error "Unknown platform"
2335# endif
2336
2337 /* Build a fake signal frame, similarly as in sigframe-solaris.c. */
2338 /* Calculate a new stack pointer. */
2339 sp -= sizeof(vki_sigframe_t);
2340 sp = VG_ROUNDDN(sp, 16) - sizeof(UWord);
2341
2342 /* Fill in the frame. */
2343 frame = (vki_sigframe_t*)sp;
2344 /* Set a bogus return address. */
2345 frame->return_addr = (void*)~0UL;
2346 frame->a1_signo = rec_signo;
2347 /* The first parameter has to be 16-byte aligned, resembling a function
2348 call. */
2349 {
2350 /* Using
2351 vg_assert(VG_IS_16_ALIGNED(&frame->a1_signo));
2352 seems to get miscompiled on amd64 with GCC 4.7.2. */
2353 Addr signo_addr = (Addr)&frame->a1_signo;
2354 vg_assert(VG_IS_16_ALIGNED(signo_addr));
2355 }
2356 frame->a2_siginfo = &frame->siginfo;
2357 frame->siginfo = *info;
2358 frame->ucontext = *uc;
2359
2360# if defined(VGP_x86_solaris)
2361 frame->a3_ucontext = &frame->ucontext;
2362
2363 /* Switch onto the V stack and restart the signal processing. */
2364 __asm__ __volatile__(
2365 "xorl %%ebp, %%ebp\n"
2366 "movl %[sp], %%esp\n"
2367 "jmp async_signalhandler\n"
2368 :
2369 : [sp] "a" (sp)
2370 : /*"ebp"*/);
2371
2372# elif defined(VGP_amd64_solaris)
2373 __asm__ __volatile__(
2374 "xorq %%rbp, %%rbp\n"
2375 "movq %[sp], %%rsp\n"
2376 "jmp async_signalhandler\n"
2377 :
2378 : [sp] "a" (sp), "D" (rec_signo), "S" (&frame->siginfo),
2379 "d" (&frame->ucontext)
2380 : /*"rbp"*/);
2381# else
2382# error "Unknown platform"
2383# endif
2384
2385 /* We should never get here. */
2386 vg_assert(0);
2387
2388# undef RECURSION_BIT
2389}
2390#endif
2391
jsgf855d93d2003-10-13 22:26:55 +00002392/*
sewardjb5f6f512005-03-10 23:59:00 +00002393 Receive an async signal from the kernel.
jsgf855d93d2003-10-13 22:26:55 +00002394
sewardjb5f6f512005-03-10 23:59:00 +00002395 This should only happen when the thread is blocked in a syscall,
2396 since that's the only time this set of signals is unblocked.
jsgf855d93d2003-10-13 22:26:55 +00002397*/
2398static
njn5a350be2009-04-30 03:05:05 +00002399void async_signalhandler ( Int sigNo,
2400 vki_siginfo_t *info, struct vki_ucontext *uc )
jsgf855d93d2003-10-13 22:26:55 +00002401{
njn5a350be2009-04-30 03:05:05 +00002402 ThreadId tid = VG_(lwpid_to_vgtid)(VG_(gettid)());
2403 ThreadState* tst = VG_(get_ThreadState)(tid);
njncda2f0f2009-05-18 02:12:08 +00002404 SysRes sres;
jsgf855d93d2003-10-13 22:26:55 +00002405
njn5a350be2009-04-30 03:05:05 +00002406 vg_assert(tst->status == VgTs_WaitSys);
sewardj8eb8bab2015-07-21 14:44:28 +00002407
2408# if defined(VGO_solaris)
2409 async_signalhandler_solaris_preprocess(tid, &sigNo, info, uc);
2410# endif
2411
2412 /* The thread isn't currently running, make it so before going on */
njn5a350be2009-04-30 03:05:05 +00002413 VG_(acquire_BigLock)(tid, "async_signalhandler");
2414
njn3b6b2aa2009-04-30 03:30:09 +00002415 info->si_code = sanitize_si_code(info->si_code);
tom9f4a7bf2005-11-13 00:01:20 +00002416
sewardjb5f6f512005-03-10 23:59:00 +00002417 if (VG_(clo_trace_signals))
Elliott Hughesed398002017-06-21 14:41:24 -07002418 VG_(dmsg)("async signal handler: signal=%d, tid=%u, si_code=%d, "
2419 "exitreason %s\n",
2420 sigNo, tid, info->si_code,
2421 VG_(name_of_VgSchedReturnCode)(tst->exitreason));
2422
2423 /* */
2424 if (tst->exitreason == VgSrc_FatalSig)
2425 resume_scheduler(tid);
sewardjb5f6f512005-03-10 23:59:00 +00002426
njncda2f0f2009-05-18 02:12:08 +00002427 /* Update thread state properly. The signal can only have been
2428 delivered whilst we were in
2429 coregrind/m_syswrap/syscall-<PLAT>.S, and only then in the
2430 window between the two sigprocmask calls, since at all other
2431 times, we run with async signals on the host blocked. Hence
2432 make enquiries on the basis that we were in or very close to a
2433 syscall, and attempt to fix up the guest state accordingly.
2434
2435 (normal async signals occurring during computation are blocked,
2436 but periodically polled for using VG_(sigtimedwait_zero), and
2437 delivered at a point convenient for us. Hence this routine only
2438 deals with signals that are delivered to a thread during a
2439 syscall.) */
2440
2441 /* First, extract a SysRes from the ucontext_t* given to this
2442 handler. If it is subsequently established by
2443 VG_(fixup_guest_state_after_syscall_interrupted) that the
2444 syscall was complete but the results had not been committed yet
2445 to the guest state, then it'll have to commit the results itself
2446 "by hand", and so we need to extract the SysRes. Of course if
2447 the thread was not in that particular window then the
2448 SysRes will be meaningless, but that's OK too because
2449 VG_(fixup_guest_state_after_syscall_interrupted) will detect
2450 that the thread was not in said window and ignore the SysRes. */
2451
njnf76d27a2009-05-28 01:53:07 +00002452 /* To make matters more complex still, on Darwin we need to know
2453 the "class" of the syscall under consideration in order to be
2454 able to extract the a correct SysRes. The class will have been
2455 saved just before the syscall, by VG_(client_syscall), into this
2456 thread's tst->arch.vex.guest_SC_CLASS. Hence: */
2457# if defined(VGO_darwin)
2458 sres = VG_UCONTEXT_SYSCALL_SYSRES(uc, tst->arch.vex.guest_SC_CLASS);
2459# else
njncda2f0f2009-05-18 02:12:08 +00002460 sres = VG_UCONTEXT_SYSCALL_SYSRES(uc);
njnf76d27a2009-05-28 01:53:07 +00002461# endif
njncda2f0f2009-05-18 02:12:08 +00002462
2463 /* (1) */
sewardja8d8e232005-06-07 20:04:56 +00002464 VG_(fixup_guest_state_after_syscall_interrupted)(
2465 tid,
njnaf839f52005-06-23 03:27:57 +00002466 VG_UCONTEXT_INSTR_PTR(uc),
njncda2f0f2009-05-18 02:12:08 +00002467 sres,
sewardj8eb8bab2015-07-21 14:44:28 +00002468 !!(scss.scss_per_sig[sigNo].scss_flags & VKI_SA_RESTART),
2469 uc
sewardja8d8e232005-06-07 20:04:56 +00002470 );
sewardjb5f6f512005-03-10 23:59:00 +00002471
njncda2f0f2009-05-18 02:12:08 +00002472 /* (2) */
Elliott Hughesed398002017-06-21 14:41:24 -07002473 /* Set up the thread's state to deliver a signal.
2474 However, if exitreason is VgSrc_FatalSig, then thread tid was
2475 taken out of a syscall by VG_(nuke_all_threads_except).
2476 But after the emission of VKI_SIGKILL, another (fatal) async
2477 signal might be sent. In such a case, we must not handle this
2478 signal, as the thread is supposed to die first.
2479 => resume the scheduler for such a thread, so that the scheduler
2480 can let the thread die. */
2481 if (tst->exitreason != VgSrc_FatalSig
2482 && !is_sig_ign(info, tid))
tomadacaf92007-12-21 10:24:24 +00002483 deliver_signal(tid, info, uc);
sewardjb5f6f512005-03-10 23:59:00 +00002484
njncda2f0f2009-05-18 02:12:08 +00002485 /* It's crucial that (1) and (2) happen in the order (1) then (2)
2486 and not the other way around. (1) fixes up the guest thread
2487 state to reflect the fact that the syscall was interrupted --
2488 either to restart the syscall or to return EINTR. (2) then sets
2489 up the thread state to deliver the signal. Then we resume
2490 execution. First, the signal handler is run, since that's the
2491 second adjustment we made to the thread state. If that returns,
2492 then we resume at the guest state created by (1), viz, either
2493 the syscall returns EINTR or is restarted.
2494
2495 If (2) was done before (1) the outcome would be completely
2496 different, and wrong. */
2497
sewardjb5f6f512005-03-10 23:59:00 +00002498 /* longjmp back to the thread's main loop to start executing the
2499 handler. */
njn06244e72005-06-21 22:27:19 +00002500 resume_scheduler(tid);
sewardjb5f6f512005-03-10 23:59:00 +00002501
njn5a350be2009-04-30 03:05:05 +00002502 VG_(core_panic)("async_signalhandler: got unexpected signal "
2503 "while outside of scheduler");
jsgf855d93d2003-10-13 22:26:55 +00002504}
2505
florian017d8f52015-03-23 17:13:04 +00002506/* Extend the stack of thread #tid to cover addr. It is expected that
2507 addr either points into an already mapped anonymous segment or into a
2508 reservation segment abutting the stack segment. Everything else is a bug.
sewardjb5f6f512005-03-10 23:59:00 +00002509
2510 Returns True on success, False on failure.
2511
2512 Succeeds without doing anything if addr is already within a segment.
2513
2514 Failure could be caused by:
florian017d8f52015-03-23 17:13:04 +00002515 - addr not below a growable segment
florian15fa8a22015-03-03 14:56:17 +00002516 - new stack size would exceed the stack limit for the given thread
sewardjb5f6f512005-03-10 23:59:00 +00002517 - mmap failed for some other reason
florian15fa8a22015-03-03 14:56:17 +00002518*/
2519Bool VG_(extend_stack)(ThreadId tid, Addr addr)
sewardjb5f6f512005-03-10 23:59:00 +00002520{
sewardj45f4e7c2005-09-27 19:20:21 +00002521 SizeT udelta;
Elliott Hughesa0664b92017-04-18 17:46:52 -07002522 Addr new_stack_base;
sewardjb5f6f512005-03-10 23:59:00 +00002523
florian15fa8a22015-03-03 14:56:17 +00002524 /* Get the segment containing addr. */
2525 const NSegment* seg = VG_(am_find_nsegment)(addr);
florian017d8f52015-03-23 17:13:04 +00002526 vg_assert(seg != NULL);
sewardj45f4e7c2005-09-27 19:20:21 +00002527
florianbe38cdd2015-03-02 21:10:46 +00002528 /* TODO: the test "seg->kind == SkAnonC" is really inadequate,
2529 because although it tests whether the segment is mapped
2530 _somehow_, it doesn't check that it has the right permissions
2531 (r,w, maybe x) ? */
florian15fa8a22015-03-03 14:56:17 +00002532 if (seg->kind == SkAnonC)
sewardj45f4e7c2005-09-27 19:20:21 +00002533 /* addr is already mapped. Nothing to do. */
sewardjb5f6f512005-03-10 23:59:00 +00002534 return True;
2535
florian15fa8a22015-03-03 14:56:17 +00002536 const NSegment* seg_next = VG_(am_next_nsegment)( seg, True/*fwds*/ );
florian017d8f52015-03-23 17:13:04 +00002537 vg_assert(seg_next != NULL);
sewardjb5f6f512005-03-10 23:59:00 +00002538
sewardj45f4e7c2005-09-27 19:20:21 +00002539 udelta = VG_PGROUNDUP(seg_next->start - addr);
Elliott Hughesa0664b92017-04-18 17:46:52 -07002540 new_stack_base = seg_next->start - udelta;
florian15fa8a22015-03-03 14:56:17 +00002541
sewardj45f4e7c2005-09-27 19:20:21 +00002542 VG_(debugLog)(1, "signals",
Elliott Hughesa0664b92017-04-18 17:46:52 -07002543 "extending a stack base 0x%lx down by %lu"
2544 " new base 0x%lx to cover 0x%lx\n",
2545 seg_next->start, udelta, new_stack_base, addr);
florian15fa8a22015-03-03 14:56:17 +00002546 Bool overflow;
sewardj45f4e7c2005-09-27 19:20:21 +00002547 if (! VG_(am_extend_into_adjacent_reservation_client)
florian15fa8a22015-03-03 14:56:17 +00002548 ( seg_next->start, -(SSizeT)udelta, &overflow )) {
florian15fa8a22015-03-03 14:56:17 +00002549 if (overflow)
floriana5e06c32015-08-05 21:16:09 +00002550 VG_(umsg)("Stack overflow in thread #%u: can't grow stack to %#lx\n",
florian15fa8a22015-03-03 14:56:17 +00002551 tid, new_stack_base);
2552 else
floriana5e06c32015-08-05 21:16:09 +00002553 VG_(umsg)("Cannot map memory to grow the stack for thread #%u "
florian15fa8a22015-03-03 14:56:17 +00002554 "to %#lx\n", tid, new_stack_base);
sewardjb5f6f512005-03-10 23:59:00 +00002555 return False;
sewardj45f4e7c2005-09-27 19:20:21 +00002556 }
sewardjb5f6f512005-03-10 23:59:00 +00002557
rjwalsh0140af52005-06-04 20:42:33 +00002558 /* When we change the main stack, we have to let the stack handling
2559 code know about it. */
Elliott Hughesa0664b92017-04-18 17:46:52 -07002560 VG_(change_stack)(VG_(clstk_id), new_stack_base, VG_(clstk_end));
sewardjb5f6f512005-03-10 23:59:00 +00002561
2562 if (VG_(clo_sanity_level) > 2)
2563 VG_(sanity_check_general)(False);
2564
2565 return True;
2566}
2567
philippeb5a02e72015-10-22 19:14:30 +00002568static fault_catcher_t fault_catcher = NULL;
sewardjb5f6f512005-03-10 23:59:00 +00002569
philippeb5a02e72015-10-22 19:14:30 +00002570fault_catcher_t VG_(set_fault_catcher)(fault_catcher_t catcher)
sewardjb5f6f512005-03-10 23:59:00 +00002571{
philippeb5a02e72015-10-22 19:14:30 +00002572 fault_catcher_t prev_catcher = fault_catcher;
sewardjb5f6f512005-03-10 23:59:00 +00002573 fault_catcher = catcher;
philippeb5a02e72015-10-22 19:14:30 +00002574 return prev_catcher;
sewardjb5f6f512005-03-10 23:59:00 +00002575}
2576
njn96986052009-04-30 07:41:24 +00002577static
njn2d5ff4f2009-05-03 22:53:19 +00002578void sync_signalhandler_from_user ( ThreadId tid,
njn96986052009-04-30 07:41:24 +00002579 Int sigNo, vki_siginfo_t *info, struct vki_ucontext *uc )
2580{
2581 ThreadId qtid;
2582
njn2d5ff4f2009-05-03 22:53:19 +00002583 /* If some user-process sent us a sync signal (ie. it's not the result
njn96986052009-04-30 07:41:24 +00002584 of a faulting instruction), then how we treat it depends on when it
2585 arrives... */
2586
sewardj8eb8bab2015-07-21 14:44:28 +00002587 if (VG_(threads)[tid].status == VgTs_WaitSys
2588# if defined(VGO_solaris)
2589 /* Check if the signal was really received while doing a blocking
2590 syscall. Only then the async_signalhandler() path can be used. */
2591 && VG_(is_ip_in_blocking_syscall)(tid, VG_UCONTEXT_INSTR_PTR(uc))
2592# endif
2593 ) {
njn96986052009-04-30 07:41:24 +00002594 /* Signal arrived while we're blocked in a syscall. This means that
2595 the client's signal mask was applied. In other words, so we can't
2596 get here unless the client wants this signal right now. This means
2597 we can simply use the async_signalhandler. */
2598 if (VG_(clo_trace_signals))
sewardj738856f2009-07-15 14:48:32 +00002599 VG_(dmsg)("Delivering user-sent sync signal %d as async signal\n",
2600 sigNo);
njn96986052009-04-30 07:41:24 +00002601
2602 async_signalhandler(sigNo, info, uc);
2603 VG_(core_panic)("async_signalhandler returned!?\n");
2604
2605 } else {
2606 /* Signal arrived while in generated client code, or while running
2607 Valgrind core code. That means that every thread has these signals
2608 unblocked, so we can't rely on the kernel to route them properly, so
2609 we need to queue them manually. */
2610 if (VG_(clo_trace_signals))
sewardj738856f2009-07-15 14:48:32 +00002611 VG_(dmsg)("Routing user-sent sync signal %d via queue\n", sigNo);
njn96986052009-04-30 07:41:24 +00002612
2613# if defined(VGO_linux)
2614 /* On Linux, first we have to do a sanity check of the siginfo. */
2615 if (info->VKI_SIGINFO_si_pid == 0) {
2616 /* There's a per-user limit of pending siginfo signals. If
2617 you exceed this, by having more than that number of
2618 pending signals with siginfo, then new signals are
2619 delivered without siginfo. This condition can be caused
2620 by any unrelated program you're running at the same time
2621 as Valgrind, if it has a large number of pending siginfo
2622 signals which it isn't taking delivery of.
2623
2624 Since we depend on siginfo to work out why we were sent a
2625 signal and what we should do about it, we really can't
2626 continue unless we get it. */
sewardj738856f2009-07-15 14:48:32 +00002627 VG_(umsg)("Signal %d (%s) appears to have lost its siginfo; "
philippe886fde32012-03-29 21:56:47 +00002628 "I can't go on.\n", sigNo, VG_(signame)(sigNo));
njn96986052009-04-30 07:41:24 +00002629 VG_(printf)(
2630" This may be because one of your programs has consumed your ration of\n"
2631" siginfo structures. For more information, see:\n"
2632" http://kerneltrap.org/mailarchive/1/message/25599/thread\n"
2633" Basically, some program on your system is building up a large queue of\n"
2634" pending signals, and this causes the siginfo data for other signals to\n"
2635" be dropped because it's exceeding a system limit. However, Valgrind\n"
2636" absolutely needs siginfo for SIGSEGV. A workaround is to track down the\n"
2637" offending program and avoid running it while using Valgrind, but there\n"
2638" is no easy way to do this. Apparently the problem was fixed in kernel\n"
2639" 2.6.12.\n");
2640
2641 /* It's a fatal signal, so we force the default handler. */
2642 VG_(set_default_handler)(sigNo);
2643 deliver_signal(tid, info, uc);
2644 resume_scheduler(tid);
2645 VG_(exit)(99); /* If we can't resume, then just exit */
2646 }
2647# endif
2648
2649 qtid = 0; /* shared pending by default */
2650# if defined(VGO_linux)
2651 if (info->si_code == VKI_SI_TKILL)
2652 qtid = tid; /* directed to us specifically */
2653# endif
2654 queue_signal(qtid, info);
2655 }
2656}
2657
sewardjb5b87402011-03-07 16:05:35 +00002658/* Returns the reported fault address for an exact address */
2659static Addr fault_mask(Addr in)
2660{
2661 /* We have to use VG_PGROUNDDN because faults on s390x only deliver
2662 the page address but not the address within a page.
2663 */
2664# if defined(VGA_s390x)
2665 return VG_PGROUNDDN(in);
2666# else
2667 return in;
2668#endif
2669}
2670
njn96986052009-04-30 07:41:24 +00002671/* Returns True if the sync signal was due to the stack requiring extension
2672 and the extension was successful.
2673*/
2674static Bool extend_stack_if_appropriate(ThreadId tid, vki_siginfo_t* info)
2675{
2676 Addr fault;
2677 Addr esp;
florian4465bd52015-04-14 19:59:21 +00002678 NSegment const *seg, *seg_next;
njn96986052009-04-30 07:41:24 +00002679
2680 if (info->si_signo != VKI_SIGSEGV)
2681 return False;
2682
2683 fault = (Addr)info->VKI_SIGINFO_si_addr;
2684 esp = VG_(get_SP)(tid);
2685 seg = VG_(am_find_nsegment)(fault);
florian4465bd52015-04-14 19:59:21 +00002686 seg_next = seg ? VG_(am_next_nsegment)( seg, True/*fwds*/ )
2687 : NULL;
njn96986052009-04-30 07:41:24 +00002688
2689 if (VG_(clo_trace_signals)) {
2690 if (seg == NULL)
floriana5e06c32015-08-05 21:16:09 +00002691 VG_(dmsg)("SIGSEGV: si_code=%d faultaddr=%#lx tid=%u ESP=%#lx "
sewardj738856f2009-07-15 14:48:32 +00002692 "seg=NULL\n",
2693 info->si_code, fault, tid, esp);
njn96986052009-04-30 07:41:24 +00002694 else
floriana5e06c32015-08-05 21:16:09 +00002695 VG_(dmsg)("SIGSEGV: si_code=%d faultaddr=%#lx tid=%u ESP=%#lx "
sewardj738856f2009-07-15 14:48:32 +00002696 "seg=%#lx-%#lx\n",
2697 info->si_code, fault, tid, esp, seg->start, seg->end);
njn96986052009-04-30 07:41:24 +00002698 }
2699
2700 if (info->si_code == VKI_SEGV_MAPERR
2701 && seg
florian4465bd52015-04-14 19:59:21 +00002702 && seg->kind == SkResvn
2703 && seg->smode == SmUpper
2704 && seg_next
2705 && seg_next->kind == SkAnonC
sewardjb5b87402011-03-07 16:05:35 +00002706 && fault >= fault_mask(esp - VG_STACK_REDZONE_SZB)) {
njn96986052009-04-30 07:41:24 +00002707 /* If the fault address is above esp but below the current known
2708 stack segment base, and it was a fault because there was
2709 nothing mapped there (as opposed to a permissions fault),
2710 then extend the stack segment.
2711 */
2712 Addr base = VG_PGROUNDDN(esp - VG_STACK_REDZONE_SZB);
Elliott Hughesa0664b92017-04-18 17:46:52 -07002713 if (VG_(am_addr_is_in_extensible_client_stack)(base)
2714 && VG_(extend_stack)(tid, base)) {
njn96986052009-04-30 07:41:24 +00002715 if (VG_(clo_trace_signals))
sewardj738856f2009-07-15 14:48:32 +00002716 VG_(dmsg)(" -> extended stack base to %#lx\n",
2717 VG_PGROUNDDN(fault));
njn96986052009-04-30 07:41:24 +00002718 return True;
2719 } else {
njn96986052009-04-30 07:41:24 +00002720 return False;
2721 }
2722 } else {
2723 return False;
2724 }
2725}
2726
2727static
njn2d5ff4f2009-05-03 22:53:19 +00002728void sync_signalhandler_from_kernel ( ThreadId tid,
njn96986052009-04-30 07:41:24 +00002729 Int sigNo, vki_siginfo_t *info, struct vki_ucontext *uc )
2730{
2731 /* Check to see if some part of Valgrind itself is interested in faults.
2732 The fault catcher should never be set whilst we're in generated code, so
2733 check for that. AFAIK the only use of the catcher right now is
2734 memcheck's leak detector. */
2735 if (fault_catcher) {
2736 vg_assert(VG_(in_generated_code) == False);
2737
2738 (*fault_catcher)(sigNo, (Addr)info->VKI_SIGINFO_si_addr);
2739 /* If the catcher returns, then it didn't handle the fault,
2740 so carry on panicking. */
2741 }
2742
2743 if (extend_stack_if_appropriate(tid, info)) {
2744 /* Stack extension occurred, so we don't need to do anything else; upon
2745 returning from this function, we'll restart the host (hence guest)
2746 instruction. */
2747 } else {
2748 /* OK, this is a signal we really have to deal with. If it came
2749 from the client's code, then we can jump back into the scheduler
2750 and have it delivered. Otherwise it's a Valgrind bug. */
2751 ThreadState *tst = VG_(get_ThreadState)(tid);
2752
2753 if (VG_(sigismember)(&tst->sig_mask, sigNo)) {
2754 /* signal is blocked, but they're not allowed to block faults */
2755 VG_(set_default_handler)(sigNo);
2756 }
2757
2758 if (VG_(in_generated_code)) {
philippeb3014692015-05-17 13:38:25 +00002759 if (VG_(gdbserver_report_signal) (info, tid)
sewardj3b290482011-05-06 21:02:55 +00002760 || VG_(sigismember)(&tst->sig_mask, sigNo)) {
2761 /* Can't continue; must longjmp back to the scheduler and thus
2762 enter the sighandler immediately. */
2763 deliver_signal(tid, info, uc);
2764 resume_scheduler(tid);
2765 }
2766 else
2767 resume_scheduler(tid);
njn96986052009-04-30 07:41:24 +00002768 }
2769
2770 /* If resume_scheduler returns or its our fault, it means we
2771 don't have longjmp set up, implying that we weren't running
2772 client code, and therefore it was actually generated by
2773 Valgrind internally.
2774 */
sewardj738856f2009-07-15 14:48:32 +00002775 VG_(dmsg)("VALGRIND INTERNAL ERROR: Valgrind received "
2776 "a signal %d (%s) - exiting\n",
philippe886fde32012-03-29 21:56:47 +00002777 sigNo, VG_(signame)(sigNo));
njn96986052009-04-30 07:41:24 +00002778
floriana5e06c32015-08-05 21:16:09 +00002779 VG_(dmsg)("si_code=%d; Faulting address: %p; sp: %#lx\n",
sewardj738856f2009-07-15 14:48:32 +00002780 info->si_code, info->VKI_SIGINFO_si_addr,
2781 VG_UCONTEXT_STACK_PTR(uc));
njn96986052009-04-30 07:41:24 +00002782
2783 if (0)
2784 VG_(kill_self)(sigNo); /* generate a core dump */
2785
2786 //if (tid == 0) /* could happen after everyone has exited */
2787 // tid = VG_(master_tid);
2788 vg_assert(tid != 0);
2789
sewardj59570ff2010-01-01 11:59:33 +00002790 UnwindStartRegs startRegs;
2791 VG_(memset)(&startRegs, 0, sizeof(startRegs));
2792
2793 VG_UCONTEXT_TO_UnwindStartRegs(&startRegs, uc);
2794 VG_(core_panic_at)("Killed by fatal signal", &startRegs);
njn96986052009-04-30 07:41:24 +00002795 }
2796}
sewardjb5f6f512005-03-10 23:59:00 +00002797
jsgf855d93d2003-10-13 22:26:55 +00002798/*
sewardj2a99cf62004-11-24 10:44:19 +00002799 Receive a sync signal from the host.
jsgf855d93d2003-10-13 22:26:55 +00002800*/
2801static
njn5a350be2009-04-30 03:05:05 +00002802void sync_signalhandler ( Int sigNo,
2803 vki_siginfo_t *info, struct vki_ucontext *uc )
jsgf855d93d2003-10-13 22:26:55 +00002804{
sewardj42781722006-12-17 19:36:06 +00002805 ThreadId tid = VG_(lwpid_to_vgtid)(VG_(gettid)());
njn2d5ff4f2009-05-03 22:53:19 +00002806 Bool from_user;
jsgf855d93d2003-10-13 22:26:55 +00002807
njn5a350be2009-04-30 03:05:05 +00002808 if (0)
2809 VG_(printf)("sync_sighandler(%d, %p, %p)\n", sigNo, info, uc);
2810
jsgf855d93d2003-10-13 22:26:55 +00002811 vg_assert(info != NULL);
2812 vg_assert(info->si_signo == sigNo);
Elliott Hughesa0664b92017-04-18 17:46:52 -07002813 vg_assert(sigNo == VKI_SIGSEGV
2814 || sigNo == VKI_SIGBUS
2815 || sigNo == VKI_SIGFPE
2816 || sigNo == VKI_SIGILL
2817 || sigNo == VKI_SIGTRAP);
jsgf855d93d2003-10-13 22:26:55 +00002818
njn3b6b2aa2009-04-30 03:30:09 +00002819 info->si_code = sanitize_si_code(info->si_code);
tom9f4a7bf2005-11-13 00:01:20 +00002820
njnf76d27a2009-05-28 01:53:07 +00002821 from_user = !is_signal_from_kernel(tid, sigNo, info->si_code);
njn81f52d12009-04-30 03:49:06 +00002822
2823 if (VG_(clo_trace_signals)) {
sewardj738856f2009-07-15 14:48:32 +00002824 VG_(dmsg)("sync signal handler: "
2825 "signal=%d, si_code=%d, EIP=%#lx, eip=%#lx, from %s\n",
2826 sigNo, info->si_code, VG_(get_IP)(tid),
2827 VG_UCONTEXT_INSTR_PTR(uc),
2828 ( from_user ? "user" : "kernel" ));
njn81f52d12009-04-30 03:49:06 +00002829 }
2830 vg_assert(sigNo >= 1 && sigNo <= VG_(max_signal));
2831
njn36fce1b2009-04-28 01:55:01 +00002832 /* // debug code:
2833 if (0) {
2834 VG_(printf)("info->si_signo %d\n", info->si_signo);
2835 VG_(printf)("info->si_errno %d\n", info->si_errno);
2836 VG_(printf)("info->si_code %d\n", info->si_code);
2837 VG_(printf)("info->si_pid %d\n", info->si_pid);
2838 VG_(printf)("info->si_uid %d\n", info->si_uid);
2839 VG_(printf)("info->si_status %d\n", info->si_status);
2840 VG_(printf)("info->si_addr %p\n", info->si_addr);
2841 }
2842 */
2843
2844 /* Figure out if the signal is being sent from outside the process.
2845 (Why do we care?) If the signal is from the user rather than the
njn96986052009-04-30 07:41:24 +00002846 kernel, then treat it more like an async signal than a sync signal --
njn36fce1b2009-04-28 01:55:01 +00002847 that is, merely queue it for later delivery. */
njn2d5ff4f2009-05-03 22:53:19 +00002848 if (from_user) {
njnc8a91072009-05-20 06:51:11 +00002849 sync_signalhandler_from_user( tid, sigNo, info, uc);
njn96986052009-04-30 07:41:24 +00002850 } else {
njnc8a91072009-05-20 06:51:11 +00002851 sync_signalhandler_from_kernel(tid, sigNo, info, uc);
jsgf855d93d2003-10-13 22:26:55 +00002852 }
sewardj8eb8bab2015-07-21 14:44:28 +00002853
2854# if defined(VGO_solaris)
2855 /* On Solaris we have to return from signal handler manually. */
2856 VG_(do_syscall2)(__NR_context, VKI_SETCONTEXT, (UWord)uc);
2857# endif
jsgf855d93d2003-10-13 22:26:55 +00002858}
2859
2860
2861/*
sewardjb5f6f512005-03-10 23:59:00 +00002862 Kill this thread. Makes it leave any syscall it might be currently
2863 blocked in, and return to the scheduler. This doesn't mark the thread
2864 as exiting; that's the caller's job.
jsgf855d93d2003-10-13 22:26:55 +00002865 */
njn5a350be2009-04-30 03:05:05 +00002866static void sigvgkill_handler(int signo, vki_siginfo_t *si,
2867 struct vki_ucontext *uc)
jsgf855d93d2003-10-13 22:26:55 +00002868{
sewardj42781722006-12-17 19:36:06 +00002869 ThreadId tid = VG_(lwpid_to_vgtid)(VG_(gettid)());
sewardj489bfec2006-10-17 02:00:29 +00002870 ThreadStatus at_signal = VG_(threads)[tid].status;
sewardjb5f6f512005-03-10 23:59:00 +00002871
2872 if (VG_(clo_trace_signals))
floriana5e06c32015-08-05 21:16:09 +00002873 VG_(dmsg)("sigvgkill for lwp %d tid %u\n", VG_(gettid)(), tid);
sewardj489bfec2006-10-17 02:00:29 +00002874
sewardjad0a3a82006-12-17 18:58:55 +00002875 VG_(acquire_BigLock)(tid, "sigvgkill_handler");
sewardjb5f6f512005-03-10 23:59:00 +00002876
njn351d0062005-06-21 22:23:59 +00002877 vg_assert(signo == VG_SIGVGKILL);
jsgf855d93d2003-10-13 22:26:55 +00002878 vg_assert(si->si_signo == signo);
2879
sewardj489bfec2006-10-17 02:00:29 +00002880 /* jrs 2006 August 3: the following assertion seems incorrect to
2881 me, and fails on AIX. sigvgkill could be sent to a thread which
2882 is runnable - see VG_(nuke_all_threads_except) in the scheduler.
2883 Hence comment these out ..
2884
2885 vg_assert(VG_(threads)[tid].status == VgTs_WaitSys);
2886 VG_(post_syscall)(tid);
2887
2888 and instead do:
2889 */
2890 if (at_signal == VgTs_WaitSys)
2891 VG_(post_syscall)(tid);
2892 /* jrs 2006 August 3 ends */
sewardjb5f6f512005-03-10 23:59:00 +00002893
njn06244e72005-06-21 22:27:19 +00002894 resume_scheduler(tid);
sewardjb5f6f512005-03-10 23:59:00 +00002895
2896 VG_(core_panic)("sigvgkill_handler couldn't return to the scheduler\n");
sewardjde4a1d02002-03-22 01:27:54 +00002897}
2898
sewardjde4a1d02002-03-22 01:27:54 +00002899static __attribute((unused))
njncda2f0f2009-05-18 02:12:08 +00002900void pp_ksigaction ( vki_sigaction_toK_t* sa )
sewardjde4a1d02002-03-22 01:27:54 +00002901{
2902 Int i;
njn695c16e2005-03-27 03:40:28 +00002903 VG_(printf)("pp_ksigaction: handler %p, flags 0x%x, restorer %p\n",
sewardj489bfec2006-10-17 02:00:29 +00002904 sa->ksa_handler,
2905 (UInt)sa->sa_flags,
sewardj8eb8bab2015-07-21 14:44:28 +00002906# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
2907 !defined(VGO_solaris)
sewardj489bfec2006-10-17 02:00:29 +00002908 sa->sa_restorer
2909# else
sewardja8ffda62008-07-18 18:23:24 +00002910 (void*)0
sewardj489bfec2006-10-17 02:00:29 +00002911# endif
2912 );
njn695c16e2005-03-27 03:40:28 +00002913 VG_(printf)("pp_ksigaction: { ");
sewardjb5f6f512005-03-10 23:59:00 +00002914 for (i = 1; i <= VG_(max_signal); i++)
Elliott Hughesa0664b92017-04-18 17:46:52 -07002915 if (VG_(sigismember)(&(sa->sa_mask),i))
sewardjde4a1d02002-03-22 01:27:54 +00002916 VG_(printf)("%d ", i);
2917 VG_(printf)("}\n");
2918}
2919
jsgf855d93d2003-10-13 22:26:55 +00002920/*
sewardjb5f6f512005-03-10 23:59:00 +00002921 Force signal handler to default
jsgf855d93d2003-10-13 22:26:55 +00002922 */
sewardjb5f6f512005-03-10 23:59:00 +00002923void VG_(set_default_handler)(Int signo)
2924{
njncda2f0f2009-05-18 02:12:08 +00002925 vki_sigaction_toK_t sa;
sewardjb5f6f512005-03-10 23:59:00 +00002926
2927 sa.ksa_handler = VKI_SIG_DFL;
2928 sa.sa_flags = 0;
sewardj8eb8bab2015-07-21 14:44:28 +00002929# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
2930 !defined(VGO_solaris)
sewardjb5f6f512005-03-10 23:59:00 +00002931 sa.sa_restorer = 0;
sewardj489bfec2006-10-17 02:00:29 +00002932# endif
sewardjb5f6f512005-03-10 23:59:00 +00002933 VG_(sigemptyset)(&sa.sa_mask);
2934
2935 VG_(do_sys_sigaction)(signo, &sa, NULL);
2936}
2937
2938/*
2939 Poll for pending signals, and set the next one up for delivery.
2940 */
2941void VG_(poll_signals)(ThreadId tid)
jsgf855d93d2003-10-13 22:26:55 +00002942{
sewardjb5f6f512005-03-10 23:59:00 +00002943 vki_siginfo_t si, *sip;
2944 vki_sigset_t pollset;
2945 ThreadState *tst = VG_(get_ThreadState)(tid);
sewardjb5f6f512005-03-10 23:59:00 +00002946 vki_sigset_t saved_mask;
jsgf855d93d2003-10-13 22:26:55 +00002947
Elliott Hughesed398002017-06-21 14:41:24 -07002948 if (tst->exitreason == VgSrc_FatalSig) {
2949 /* This task has been requested to die due to a fatal signal
2950 received by the process. So, we cannot poll new signals,
2951 as we are supposed to die asap. If we would poll and deliver
2952 a new (maybe fatal) signal, this could cause a deadlock, as
2953 this thread would believe it has to terminate the other threads
2954 and wait for them to die, while we already have a thread doing
2955 that. */
2956 if (VG_(clo_trace_signals))
2957 VG_(dmsg)("poll_signals: not polling as thread %u is exitreason %s\n",
2958 tid, VG_(name_of_VgSchedReturnCode)(tst->exitreason));
2959 return;
2960 }
2961
sewardjb5f6f512005-03-10 23:59:00 +00002962 /* look for all the signals this thread isn't blocking */
njncda2f0f2009-05-18 02:12:08 +00002963 /* pollset = ~tst->sig_mask */
2964 VG_(sigcomplementset)( &pollset, &tst->sig_mask );
jsgf855d93d2003-10-13 22:26:55 +00002965
njn444eba12005-05-12 03:47:31 +00002966 block_all_host_signals(&saved_mask); // protect signal queue
sewardjb5f6f512005-03-10 23:59:00 +00002967
2968 /* First look for any queued pending signals */
2969 sip = next_queued(tid, &pollset); /* this thread */
2970
2971 if (sip == NULL)
2972 sip = next_queued(0, &pollset); /* process-wide */
2973
2974 /* If there was nothing queued, ask the kernel for a pending signal */
sewardj489bfec2006-10-17 02:00:29 +00002975 if (sip == NULL && VG_(sigtimedwait_zero)(&pollset, &si) > 0) {
sewardjb5f6f512005-03-10 23:59:00 +00002976 if (VG_(clo_trace_signals))
Elliott Hughesed398002017-06-21 14:41:24 -07002977 VG_(dmsg)("poll_signals: got signal %d for thread %u exitreason %s\n",
2978 si.si_signo, tid,
2979 VG_(name_of_VgSchedReturnCode)(tst->exitreason));
sewardjb5f6f512005-03-10 23:59:00 +00002980 sip = &si;
thughes8abf3922004-10-16 10:59:49 +00002981 }
fitzhardingee1c06d82003-10-30 07:21:44 +00002982
sewardjb5f6f512005-03-10 23:59:00 +00002983 if (sip != NULL) {
2984 /* OK, something to do; deliver it */
2985 if (VG_(clo_trace_signals))
Elliott Hughesed398002017-06-21 14:41:24 -07002986 VG_(dmsg)("Polling found signal %d for tid %u exitreason %s\n",
2987 sip->si_signo, tid,
2988 VG_(name_of_VgSchedReturnCode)(tst->exitreason));
philippeb3014692015-05-17 13:38:25 +00002989 if (!is_sig_ign(sip, tid))
tomadacaf92007-12-21 10:24:24 +00002990 deliver_signal(tid, sip, NULL);
sewardjb5f6f512005-03-10 23:59:00 +00002991 else if (VG_(clo_trace_signals))
sewardj738856f2009-07-15 14:48:32 +00002992 VG_(dmsg)(" signal %d ignored\n", sip->si_signo);
sewardjb5f6f512005-03-10 23:59:00 +00002993
2994 sip->si_signo = 0; /* remove from signal queue, if that's
2995 where it came from */
jsgf855d93d2003-10-13 22:26:55 +00002996 }
2997
njn444eba12005-05-12 03:47:31 +00002998 restore_all_host_signals(&saved_mask);
sewardjb5f6f512005-03-10 23:59:00 +00002999}
3000
sewardj018f7622002-05-15 21:13:39 +00003001/* At startup, copy the process' real signal state to the SCSS.
3002 Whilst doing this, block all real signals. Then calculate SKSS and
3003 set the kernel to that. Also initialise DCSS.
sewardjde4a1d02002-03-22 01:27:54 +00003004*/
3005void VG_(sigstartup_actions) ( void )
3006{
njncda2f0f2009-05-18 02:12:08 +00003007 Int i, ret, vKI_SIGRTMIN;
nethercote73b526f2004-10-31 18:48:21 +00003008 vki_sigset_t saved_procmask;
njncda2f0f2009-05-18 02:12:08 +00003009 vki_sigaction_fromK_t sa;
3010
3011 VG_(memset)(&scss, 0, sizeof(scss));
3012 VG_(memset)(&skss, 0, sizeof(skss));
3013
3014# if defined(VKI_SIGRTMIN)
3015 vKI_SIGRTMIN = VKI_SIGRTMIN;
3016# else
3017 vKI_SIGRTMIN = 0; /* eg Darwin */
3018# endif
sewardjde4a1d02002-03-22 01:27:54 +00003019
sewardj2e93c502002-04-12 11:12:52 +00003020 /* VG_(printf)("SIGSTARTUP\n"); */
jsgf855d93d2003-10-13 22:26:55 +00003021 /* Block all signals. saved_procmask remembers the previous mask,
3022 which the first thread inherits.
3023 */
njn444eba12005-05-12 03:47:31 +00003024 block_all_host_signals( &saved_procmask );
sewardjde4a1d02002-03-22 01:27:54 +00003025
sewardj018f7622002-05-15 21:13:39 +00003026 /* Copy per-signal settings to SCSS. */
nethercote73b526f2004-10-31 18:48:21 +00003027 for (i = 1; i <= _VKI_NSIG; i++) {
sewardj018f7622002-05-15 21:13:39 +00003028 /* Get the old host action */
nethercote73b526f2004-10-31 18:48:21 +00003029 ret = VG_(sigaction)(i, NULL, &sa);
sewardj018f7622002-05-15 21:13:39 +00003030
njnea2d6fd2010-07-01 00:20:20 +00003031# if defined(VGP_x86_darwin) || defined(VGP_amd64_darwin)
njnf76d27a2009-05-28 01:53:07 +00003032 /* apparently we may not even ask about the disposition of these
3033 signals, let alone change them */
3034 if (ret != 0 && (i == VKI_SIGKILL || i == VKI_SIGSTOP))
3035 continue;
3036# endif
3037
sewardjb5f6f512005-03-10 23:59:00 +00003038 if (ret != 0)
3039 break;
3040
3041 /* Try setting it back to see if this signal is really
3042 available */
njncda2f0f2009-05-18 02:12:08 +00003043 if (vKI_SIGRTMIN > 0 /* it actually exists on this platform */
3044 && i >= vKI_SIGRTMIN) {
3045 vki_sigaction_toK_t tsa, sa2;
sewardjb5f6f512005-03-10 23:59:00 +00003046
njn695c16e2005-03-27 03:40:28 +00003047 tsa.ksa_handler = (void *)sync_signalhandler;
sewardjb5f6f512005-03-10 23:59:00 +00003048 tsa.sa_flags = VKI_SA_SIGINFO;
sewardj8eb8bab2015-07-21 14:44:28 +00003049# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
3050 !defined(VGO_solaris)
sewardjb5f6f512005-03-10 23:59:00 +00003051 tsa.sa_restorer = 0;
sewardj489bfec2006-10-17 02:00:29 +00003052# endif
sewardjb5f6f512005-03-10 23:59:00 +00003053 VG_(sigfillset)(&tsa.sa_mask);
3054
3055 /* try setting it to some arbitrary handler */
3056 if (VG_(sigaction)(i, &tsa, NULL) != 0) {
3057 /* failed - not really usable */
3058 break;
3059 }
3060
njncda2f0f2009-05-18 02:12:08 +00003061 VG_(convert_sigaction_fromK_to_toK)( &sa, &sa2 );
3062 ret = VG_(sigaction)(i, &sa2, NULL);
sewardjb5f6f512005-03-10 23:59:00 +00003063 vg_assert(ret == 0);
3064 }
3065
3066 VG_(max_signal) = i;
3067
3068 if (VG_(clo_trace_signals) && VG_(clo_verbosity) > 2)
njn8a7b41b2007-09-23 00:51:24 +00003069 VG_(printf)("snaffling handler 0x%lx for signal %d\n",
sewardj018f7622002-05-15 21:13:39 +00003070 (Addr)(sa.ksa_handler), i );
3071
njn695c16e2005-03-27 03:40:28 +00003072 scss.scss_per_sig[i].scss_handler = sa.ksa_handler;
3073 scss.scss_per_sig[i].scss_flags = sa.sa_flags;
3074 scss.scss_per_sig[i].scss_mask = sa.sa_mask;
njncda2f0f2009-05-18 02:12:08 +00003075
3076 scss.scss_per_sig[i].scss_restorer = NULL;
sewardj8eb8bab2015-07-21 14:44:28 +00003077# if !defined(VGP_x86_darwin) && !defined(VGP_amd64_darwin) && \
3078 !defined(VGO_solaris)
njn695c16e2005-03-27 03:40:28 +00003079 scss.scss_per_sig[i].scss_restorer = sa.sa_restorer;
sewardj489bfec2006-10-17 02:00:29 +00003080# endif
njncda2f0f2009-05-18 02:12:08 +00003081
3082 scss.scss_per_sig[i].scss_sa_tramp = NULL;
njnf76d27a2009-05-28 01:53:07 +00003083# if defined(VGP_x86_darwin) || defined(VGP_amd64_darwin)
3084 scss.scss_per_sig[i].scss_sa_tramp = NULL;
3085 /*sa.sa_tramp;*/
3086 /* We can't know what it was, because Darwin's sys_sigaction
3087 doesn't tell us. */
3088# endif
sewardj018f7622002-05-15 21:13:39 +00003089 }
3090
sewardjb5f6f512005-03-10 23:59:00 +00003091 if (VG_(clo_trace_signals))
Elliott Hughesed398002017-06-21 14:41:24 -07003092 VG_(dmsg)("Max kernel-supported signal is %d, VG_SIGVGKILL is %d\n",
3093 VG_(max_signal), VG_SIGVGKILL);
sewardjb5f6f512005-03-10 23:59:00 +00003094
jsgf855d93d2003-10-13 22:26:55 +00003095 /* Our private internal signals are treated as ignored */
njn351d0062005-06-21 22:23:59 +00003096 scss.scss_per_sig[VG_SIGVGKILL].scss_handler = VKI_SIG_IGN;
3097 scss.scss_per_sig[VG_SIGVGKILL].scss_flags = VKI_SA_SIGINFO;
3098 VG_(sigfillset)(&scss.scss_per_sig[VG_SIGVGKILL].scss_mask);
jsgf855d93d2003-10-13 22:26:55 +00003099
sewardj018f7622002-05-15 21:13:39 +00003100 /* Copy the process' signal mask into the root thread. */
sewardj1d887112005-05-30 21:44:08 +00003101 vg_assert(VG_(threads)[1].status == VgTs_Init);
3102 for (i = 2; i < VG_N_THREADS; i++)
3103 vg_assert(VG_(threads)[i].status == VgTs_Empty);
3104
3105 VG_(threads)[1].sig_mask = saved_procmask;
3106 VG_(threads)[1].tmp_sig_mask = saved_procmask;
sewardj7a61d912002-04-25 01:27:35 +00003107
sewardj018f7622002-05-15 21:13:39 +00003108 /* Calculate SKSS and apply it. This also sets the initial kernel
3109 mask we need to run with. */
nethercote9dd11512004-08-04 15:31:30 +00003110 handle_SCSS_change( True /* forced update */ );
jsgf855d93d2003-10-13 22:26:55 +00003111
sewardjb5f6f512005-03-10 23:59:00 +00003112 /* Leave with all signals still blocked; the thread scheduler loop
3113 will set the appropriate mask at the appropriate time. */
sewardjde4a1d02002-03-22 01:27:54 +00003114}
3115
sewardjde4a1d02002-03-22 01:27:54 +00003116/*--------------------------------------------------------------------*/
njned6b8242005-06-01 00:03:17 +00003117/*--- end ---*/
sewardjde4a1d02002-03-22 01:27:54 +00003118/*--------------------------------------------------------------------*/