| /* |
| * Emulation of Linux signals |
| * |
| * Copyright (c) 2003 Fabrice Bellard |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, see <http://www.gnu.org/licenses/>. |
| */ |
| #include "qemu/osdep.h" |
| #include "qemu/bitops.h" |
| #include <sys/ucontext.h> |
| #include <sys/resource.h> |
| |
| #include "qemu.h" |
| #include "qemu-common.h" |
| #include "target_signal.h" |
| #include "trace.h" |
| |
| static struct target_sigaltstack target_sigaltstack_used = { |
| .ss_sp = 0, |
| .ss_size = 0, |
| .ss_flags = TARGET_SS_DISABLE, |
| }; |
| |
| static struct target_sigaction sigact_table[TARGET_NSIG]; |
| |
| static void host_signal_handler(int host_signum, siginfo_t *info, |
| void *puc); |
| |
| static uint8_t host_to_target_signal_table[_NSIG] = { |
| [SIGHUP] = TARGET_SIGHUP, |
| [SIGINT] = TARGET_SIGINT, |
| [SIGQUIT] = TARGET_SIGQUIT, |
| [SIGILL] = TARGET_SIGILL, |
| [SIGTRAP] = TARGET_SIGTRAP, |
| [SIGABRT] = TARGET_SIGABRT, |
| /* [SIGIOT] = TARGET_SIGIOT,*/ |
| [SIGBUS] = TARGET_SIGBUS, |
| [SIGFPE] = TARGET_SIGFPE, |
| [SIGKILL] = TARGET_SIGKILL, |
| [SIGUSR1] = TARGET_SIGUSR1, |
| [SIGSEGV] = TARGET_SIGSEGV, |
| [SIGUSR2] = TARGET_SIGUSR2, |
| [SIGPIPE] = TARGET_SIGPIPE, |
| [SIGALRM] = TARGET_SIGALRM, |
| [SIGTERM] = TARGET_SIGTERM, |
| #ifdef SIGSTKFLT |
| [SIGSTKFLT] = TARGET_SIGSTKFLT, |
| #endif |
| [SIGCHLD] = TARGET_SIGCHLD, |
| [SIGCONT] = TARGET_SIGCONT, |
| [SIGSTOP] = TARGET_SIGSTOP, |
| [SIGTSTP] = TARGET_SIGTSTP, |
| [SIGTTIN] = TARGET_SIGTTIN, |
| [SIGTTOU] = TARGET_SIGTTOU, |
| [SIGURG] = TARGET_SIGURG, |
| [SIGXCPU] = TARGET_SIGXCPU, |
| [SIGXFSZ] = TARGET_SIGXFSZ, |
| [SIGVTALRM] = TARGET_SIGVTALRM, |
| [SIGPROF] = TARGET_SIGPROF, |
| [SIGWINCH] = TARGET_SIGWINCH, |
| [SIGIO] = TARGET_SIGIO, |
| [SIGPWR] = TARGET_SIGPWR, |
| [SIGSYS] = TARGET_SIGSYS, |
| /* next signals stay the same */ |
| /* Nasty hack: Reverse SIGRTMIN and SIGRTMAX to avoid overlap with |
| host libpthread signals. This assumes no one actually uses SIGRTMAX :-/ |
| To fix this properly we need to do manual signal delivery multiplexed |
| over a single host signal. */ |
| [__SIGRTMIN] = __SIGRTMAX, |
| [__SIGRTMAX] = __SIGRTMIN, |
| }; |
| static uint8_t target_to_host_signal_table[_NSIG]; |
| |
| static inline int on_sig_stack(unsigned long sp) |
| { |
| return (sp - target_sigaltstack_used.ss_sp |
| < target_sigaltstack_used.ss_size); |
| } |
| |
| static inline int sas_ss_flags(unsigned long sp) |
| { |
| return (target_sigaltstack_used.ss_size == 0 ? SS_DISABLE |
| : on_sig_stack(sp) ? SS_ONSTACK : 0); |
| } |
| |
| int host_to_target_signal(int sig) |
| { |
| if (sig < 0 || sig >= _NSIG) |
| return sig; |
| return host_to_target_signal_table[sig]; |
| } |
| |
| int target_to_host_signal(int sig) |
| { |
| if (sig < 0 || sig >= _NSIG) |
| return sig; |
| return target_to_host_signal_table[sig]; |
| } |
| |
| static inline void target_sigemptyset(target_sigset_t *set) |
| { |
| memset(set, 0, sizeof(*set)); |
| } |
| |
| static inline void target_sigaddset(target_sigset_t *set, int signum) |
| { |
| signum--; |
| abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW); |
| set->sig[signum / TARGET_NSIG_BPW] |= mask; |
| } |
| |
| static inline int target_sigismember(const target_sigset_t *set, int signum) |
| { |
| signum--; |
| abi_ulong mask = (abi_ulong)1 << (signum % TARGET_NSIG_BPW); |
| return ((set->sig[signum / TARGET_NSIG_BPW] & mask) != 0); |
| } |
| |
| static void host_to_target_sigset_internal(target_sigset_t *d, |
| const sigset_t *s) |
| { |
| int i; |
| target_sigemptyset(d); |
| for (i = 1; i <= TARGET_NSIG; i++) { |
| if (sigismember(s, i)) { |
| target_sigaddset(d, host_to_target_signal(i)); |
| } |
| } |
| } |
| |
| void host_to_target_sigset(target_sigset_t *d, const sigset_t *s) |
| { |
| target_sigset_t d1; |
| int i; |
| |
| host_to_target_sigset_internal(&d1, s); |
| for(i = 0;i < TARGET_NSIG_WORDS; i++) |
| d->sig[i] = tswapal(d1.sig[i]); |
| } |
| |
| static void target_to_host_sigset_internal(sigset_t *d, |
| const target_sigset_t *s) |
| { |
| int i; |
| sigemptyset(d); |
| for (i = 1; i <= TARGET_NSIG; i++) { |
| if (target_sigismember(s, i)) { |
| sigaddset(d, target_to_host_signal(i)); |
| } |
| } |
| } |
| |
| void target_to_host_sigset(sigset_t *d, const target_sigset_t *s) |
| { |
| target_sigset_t s1; |
| int i; |
| |
| for(i = 0;i < TARGET_NSIG_WORDS; i++) |
| s1.sig[i] = tswapal(s->sig[i]); |
| target_to_host_sigset_internal(d, &s1); |
| } |
| |
| void host_to_target_old_sigset(abi_ulong *old_sigset, |
| const sigset_t *sigset) |
| { |
| target_sigset_t d; |
| host_to_target_sigset(&d, sigset); |
| *old_sigset = d.sig[0]; |
| } |
| |
| void target_to_host_old_sigset(sigset_t *sigset, |
| const abi_ulong *old_sigset) |
| { |
| target_sigset_t d; |
| int i; |
| |
| d.sig[0] = *old_sigset; |
| for(i = 1;i < TARGET_NSIG_WORDS; i++) |
| d.sig[i] = 0; |
| target_to_host_sigset(sigset, &d); |
| } |
| |
| int block_signals(void) |
| { |
| TaskState *ts = (TaskState *)thread_cpu->opaque; |
| sigset_t set; |
| |
| /* It's OK to block everything including SIGSEGV, because we won't |
| * run any further guest code before unblocking signals in |
| * process_pending_signals(). |
| */ |
| sigfillset(&set); |
| sigprocmask(SIG_SETMASK, &set, 0); |
| |
| return atomic_xchg(&ts->signal_pending, 1); |
| } |
| |
| /* Wrapper for sigprocmask function |
| * Emulates a sigprocmask in a safe way for the guest. Note that set and oldset |
| * are host signal set, not guest ones. Returns -TARGET_ERESTARTSYS if |
| * a signal was already pending and the syscall must be restarted, or |
| * 0 on success. |
| * If set is NULL, this is guaranteed not to fail. |
| */ |
| int do_sigprocmask(int how, const sigset_t *set, sigset_t *oldset) |
| { |
| TaskState *ts = (TaskState *)thread_cpu->opaque; |
| |
| if (oldset) { |
| *oldset = ts->signal_mask; |
| } |
| |
| if (set) { |
| int i; |
| |
| if (block_signals()) { |
| return -TARGET_ERESTARTSYS; |
| } |
| |
| switch (how) { |
| case SIG_BLOCK: |
| sigorset(&ts->signal_mask, &ts->signal_mask, set); |
| break; |
| case SIG_UNBLOCK: |
| for (i = 1; i <= NSIG; ++i) { |
| if (sigismember(set, i)) { |
| sigdelset(&ts->signal_mask, i); |
| } |
| } |
| break; |
| case SIG_SETMASK: |
| ts->signal_mask = *set; |
| break; |
| default: |
| g_assert_not_reached(); |
| } |
| |
| /* Silently ignore attempts to change blocking status of KILL or STOP */ |
| sigdelset(&ts->signal_mask, SIGKILL); |
| sigdelset(&ts->signal_mask, SIGSTOP); |
| } |
| return 0; |
| } |
| |
| #if !defined(TARGET_OPENRISC) && !defined(TARGET_UNICORE32) && \ |
| !defined(TARGET_X86_64) && !defined(TARGET_NIOS2) |
| /* Just set the guest's signal mask to the specified value; the |
| * caller is assumed to have called block_signals() already. |
| */ |
| static void set_sigmask(const sigset_t *set) |
| { |
| TaskState *ts = (TaskState *)thread_cpu->opaque; |
| |
| ts->signal_mask = *set; |
| } |
| #endif |
| |
| /* siginfo conversion */ |
| |
| static inline void host_to_target_siginfo_noswap(target_siginfo_t *tinfo, |
| const siginfo_t *info) |
| { |
| int sig = host_to_target_signal(info->si_signo); |
| int si_code = info->si_code; |
| int si_type; |
| tinfo->si_signo = sig; |
| tinfo->si_errno = 0; |
| tinfo->si_code = info->si_code; |
| |
| /* This memset serves two purposes: |
| * (1) ensure we don't leak random junk to the guest later |
| * (2) placate false positives from gcc about fields |
| * being used uninitialized if it chooses to inline both this |
| * function and tswap_siginfo() into host_to_target_siginfo(). |
| */ |
| memset(tinfo->_sifields._pad, 0, sizeof(tinfo->_sifields._pad)); |
| |
| /* This is awkward, because we have to use a combination of |
| * the si_code and si_signo to figure out which of the union's |
| * members are valid. (Within the host kernel it is always possible |
| * to tell, but the kernel carefully avoids giving userspace the |
| * high 16 bits of si_code, so we don't have the information to |
| * do this the easy way...) We therefore make our best guess, |
| * bearing in mind that a guest can spoof most of the si_codes |
| * via rt_sigqueueinfo() if it likes. |
| * |
| * Once we have made our guess, we record it in the top 16 bits of |
| * the si_code, so that tswap_siginfo() later can use it. |
| * tswap_siginfo() will strip these top bits out before writing |
| * si_code to the guest (sign-extending the lower bits). |
| */ |
| |
| switch (si_code) { |
| case SI_USER: |
| case SI_TKILL: |
| case SI_KERNEL: |
| /* Sent via kill(), tkill() or tgkill(), or direct from the kernel. |
| * These are the only unspoofable si_code values. |
| */ |
| tinfo->_sifields._kill._pid = info->si_pid; |
| tinfo->_sifields._kill._uid = info->si_uid; |
| si_type = QEMU_SI_KILL; |
| break; |
| default: |
| /* Everything else is spoofable. Make best guess based on signal */ |
| switch (sig) { |
| case TARGET_SIGCHLD: |
| tinfo->_sifields._sigchld._pid = info->si_pid; |
| tinfo->_sifields._sigchld._uid = info->si_uid; |
| tinfo->_sifields._sigchld._status |
| = host_to_target_waitstatus(info->si_status); |
| tinfo->_sifields._sigchld._utime = info->si_utime; |
| tinfo->_sifields._sigchld._stime = info->si_stime; |
| si_type = QEMU_SI_CHLD; |
| break; |
| case TARGET_SIGIO: |
| tinfo->_sifields._sigpoll._band = info->si_band; |
| tinfo->_sifields._sigpoll._fd = info->si_fd; |
| si_type = QEMU_SI_POLL; |
| break; |
| default: |
| /* Assume a sigqueue()/mq_notify()/rt_sigqueueinfo() source. */ |
| tinfo->_sifields._rt._pid = info->si_pid; |
| tinfo->_sifields._rt._uid = info->si_uid; |
| /* XXX: potential problem if 64 bit */ |
| tinfo->_sifields._rt._sigval.sival_ptr |
| = (abi_ulong)(unsigned long)info->si_value.sival_ptr; |
| si_type = QEMU_SI_RT; |
| break; |
| } |
| break; |
| } |
| |
| tinfo->si_code = deposit32(si_code, 16, 16, si_type); |
| } |
| |
| static void tswap_siginfo(target_siginfo_t *tinfo, |
| const target_siginfo_t *info) |
| { |
| int si_type = extract32(info->si_code, 16, 16); |
| int si_code = sextract32(info->si_code, 0, 16); |
| |
| __put_user(info->si_signo, &tinfo->si_signo); |
| __put_user(info->si_errno, &tinfo->si_errno); |
| __put_user(si_code, &tinfo->si_code); |
| |
| /* We can use our internal marker of which fields in the structure |
| * are valid, rather than duplicating the guesswork of |
| * host_to_target_siginfo_noswap() here. |
| */ |
| switch (si_type) { |
| case QEMU_SI_KILL: |
| __put_user(info->_sifields._kill._pid, &tinfo->_sifields._kill._pid); |
| __put_user(info->_sifields._kill._uid, &tinfo->_sifields._kill._uid); |
| break; |
| case QEMU_SI_TIMER: |
| __put_user(info->_sifields._timer._timer1, |
| &tinfo->_sifields._timer._timer1); |
| __put_user(info->_sifields._timer._timer2, |
| &tinfo->_sifields._timer._timer2); |
| break; |
| case QEMU_SI_POLL: |
| __put_user(info->_sifields._sigpoll._band, |
| &tinfo->_sifields._sigpoll._band); |
| __put_user(info->_sifields._sigpoll._fd, |
| &tinfo->_sifields._sigpoll._fd); |
| break; |
| case QEMU_SI_FAULT: |
| __put_user(info->_sifields._sigfault._addr, |
| &tinfo->_sifields._sigfault._addr); |
| break; |
| case QEMU_SI_CHLD: |
| __put_user(info->_sifields._sigchld._pid, |
| &tinfo->_sifields._sigchld._pid); |
| __put_user(info->_sifields._sigchld._uid, |
| &tinfo->_sifields._sigchld._uid); |
| __put_user(info->_sifields._sigchld._status, |
| &tinfo->_sifields._sigchld._status); |
| __put_user(info->_sifields._sigchld._utime, |
| &tinfo->_sifields._sigchld._utime); |
| __put_user(info->_sifields._sigchld._stime, |
| &tinfo->_sifields._sigchld._stime); |
| break; |
| case QEMU_SI_RT: |
| __put_user(info->_sifields._rt._pid, &tinfo->_sifields._rt._pid); |
| __put_user(info->_sifields._rt._uid, &tinfo->_sifields._rt._uid); |
| __put_user(info->_sifields._rt._sigval.sival_ptr, |
| &tinfo->_sifields._rt._sigval.sival_ptr); |
| break; |
| default: |
| g_assert_not_reached(); |
| } |
| } |
| |
| void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info) |
| { |
| target_siginfo_t tgt_tmp; |
| host_to_target_siginfo_noswap(&tgt_tmp, info); |
| tswap_siginfo(tinfo, &tgt_tmp); |
| } |
| |
| /* XXX: we support only POSIX RT signals are used. */ |
| /* XXX: find a solution for 64 bit (additional malloced data is needed) */ |
| void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo) |
| { |
| /* This conversion is used only for the rt_sigqueueinfo syscall, |
| * and so we know that the _rt fields are the valid ones. |
| */ |
| abi_ulong sival_ptr; |
| |
| __get_user(info->si_signo, &tinfo->si_signo); |
| __get_user(info->si_errno, &tinfo->si_errno); |
| __get_user(info->si_code, &tinfo->si_code); |
| __get_user(info->si_pid, &tinfo->_sifields._rt._pid); |
| __get_user(info->si_uid, &tinfo->_sifields._rt._uid); |
| __get_user(sival_ptr, &tinfo->_sifields._rt._sigval.sival_ptr); |
| info->si_value.sival_ptr = (void *)(long)sival_ptr; |
| } |
| |
| static int fatal_signal (int sig) |
| { |
| switch (sig) { |
| case TARGET_SIGCHLD: |
| case TARGET_SIGURG: |
| case TARGET_SIGWINCH: |
| /* Ignored by default. */ |
| return 0; |
| case TARGET_SIGCONT: |
| case TARGET_SIGSTOP: |
| case TARGET_SIGTSTP: |
| case TARGET_SIGTTIN: |
| case TARGET_SIGTTOU: |
| /* Job control signals. */ |
| return 0; |
| default: |
| return 1; |
| } |
| } |
| |
| /* returns 1 if given signal should dump core if not handled */ |
| static int core_dump_signal(int sig) |
| { |
| switch (sig) { |
| case TARGET_SIGABRT: |
| case TARGET_SIGFPE: |
| case TARGET_SIGILL: |
| case TARGET_SIGQUIT: |
| case TARGET_SIGSEGV: |
| case TARGET_SIGTRAP: |
| case TARGET_SIGBUS: |
| return (1); |
| default: |
| return (0); |
| } |
| } |
| |
| void signal_init(void) |
| { |
| TaskState *ts = (TaskState *)thread_cpu->opaque; |
| struct sigaction act; |
| struct sigaction oact; |
| int i, j; |
| int host_sig; |
| |
| /* generate signal conversion tables */ |
| for(i = 1; i < _NSIG; i++) { |
| if (host_to_target_signal_table[i] == 0) |
| host_to_target_signal_table[i] = i; |
| } |
| for(i = 1; i < _NSIG; i++) { |
| j = host_to_target_signal_table[i]; |
| target_to_host_signal_table[j] = i; |
| } |
| |
| /* Set the signal mask from the host mask. */ |
| sigprocmask(0, 0, &ts->signal_mask); |
| |
| /* set all host signal handlers. ALL signals are blocked during |
| the handlers to serialize them. */ |
| memset(sigact_table, 0, sizeof(sigact_table)); |
| |
| sigfillset(&act.sa_mask); |
| act.sa_flags = SA_SIGINFO; |
| act.sa_sigaction = host_signal_handler; |
| for(i = 1; i <= TARGET_NSIG; i++) { |
| host_sig = target_to_host_signal(i); |
| sigaction(host_sig, NULL, &oact); |
| if (oact.sa_sigaction == (void *)SIG_IGN) { |
| sigact_table[i - 1]._sa_handler = TARGET_SIG_IGN; |
| } else if (oact.sa_sigaction == (void *)SIG_DFL) { |
| sigact_table[i - 1]._sa_handler = TARGET_SIG_DFL; |
| } |
| /* If there's already a handler installed then something has |
| gone horribly wrong, so don't even try to handle that case. */ |
| /* Install some handlers for our own use. We need at least |
| SIGSEGV and SIGBUS, to detect exceptions. We can not just |
| trap all signals because it affects syscall interrupt |
| behavior. But do trap all default-fatal signals. */ |
| if (fatal_signal (i)) |
| sigaction(host_sig, &act, NULL); |
| } |
| } |
| |
| #if !(defined(TARGET_X86_64) || defined(TARGET_UNICORE32)) |
| /* Force a synchronously taken signal. The kernel force_sig() function |
| * also forces the signal to "not blocked, not ignored", but for QEMU |
| * that work is done in process_pending_signals(). |
| */ |
| static void force_sig(int sig) |
| { |
| CPUState *cpu = thread_cpu; |
| CPUArchState *env = cpu->env_ptr; |
| target_siginfo_t info; |
| |
| info.si_signo = sig; |
| info.si_errno = 0; |
| info.si_code = TARGET_SI_KERNEL; |
| info._sifields._kill._pid = 0; |
| info._sifields._kill._uid = 0; |
| queue_signal(env, info.si_signo, QEMU_SI_KILL, &info); |
| } |
| |
| /* Force a SIGSEGV if we couldn't write to memory trying to set |
| * up the signal frame. oldsig is the signal we were trying to handle |
| * at the point of failure. |
| */ |
| static void force_sigsegv(int oldsig) |
| { |
| if (oldsig == SIGSEGV) { |
| /* Make sure we don't try to deliver the signal again; this will |
| * end up with handle_pending_signal() calling dump_core_and_abort(). |
| */ |
| sigact_table[oldsig - 1]._sa_handler = TARGET_SIG_DFL; |
| } |
| force_sig(TARGET_SIGSEGV); |
| } |
| #endif |
| |
| /* abort execution with signal */ |
| static void QEMU_NORETURN dump_core_and_abort(int target_sig) |
| { |
| CPUState *cpu = thread_cpu; |
| CPUArchState *env = cpu->env_ptr; |
| TaskState *ts = (TaskState *)cpu->opaque; |
| int host_sig, core_dumped = 0; |
| struct sigaction act; |
| |
| host_sig = target_to_host_signal(target_sig); |
| trace_user_force_sig(env, target_sig, host_sig); |
| gdb_signalled(env, target_sig); |
| |
| /* dump core if supported by target binary format */ |
| if (core_dump_signal(target_sig) && (ts->bprm->core_dump != NULL)) { |
| stop_all_tasks(); |
| core_dumped = |
| ((*ts->bprm->core_dump)(target_sig, env) == 0); |
| } |
| if (core_dumped) { |
| /* we already dumped the core of target process, we don't want |
| * a coredump of qemu itself */ |
| struct rlimit nodump; |
| getrlimit(RLIMIT_CORE, &nodump); |
| nodump.rlim_cur=0; |
| setrlimit(RLIMIT_CORE, &nodump); |
| (void) fprintf(stderr, "qemu: uncaught target signal %d (%s) - %s\n", |
| target_sig, strsignal(host_sig), "core dumped" ); |
| } |
| |
| /* The proper exit code for dying from an uncaught signal is |
| * -<signal>. The kernel doesn't allow exit() or _exit() to pass |
| * a negative value. To get the proper exit code we need to |
| * actually die from an uncaught signal. Here the default signal |
| * handler is installed, we send ourself a signal and we wait for |
| * it to arrive. */ |
| sigfillset(&act.sa_mask); |
| act.sa_handler = SIG_DFL; |
| act.sa_flags = 0; |
| sigaction(host_sig, &act, NULL); |
| |
| /* For some reason raise(host_sig) doesn't send the signal when |
| * statically linked on x86-64. */ |
| kill(getpid(), host_sig); |
| |
| /* Make sure the signal isn't masked (just reuse the mask inside |
| of act) */ |
| sigdelset(&act.sa_mask, host_sig); |
| sigsuspend(&act.sa_mask); |
| |
| /* unreachable */ |
| abort(); |
| } |
| |
| /* queue a signal so that it will be send to the virtual CPU as soon |
| as possible */ |
| int queue_signal(CPUArchState *env, int sig, int si_type, |
| target_siginfo_t *info) |
| { |
| CPUState *cpu = ENV_GET_CPU(env); |
| TaskState *ts = cpu->opaque; |
| |
| trace_user_queue_signal(env, sig); |
| |
| info->si_code = deposit32(info->si_code, 16, 16, si_type); |
| |
| ts->sync_signal.info = *info; |
| ts->sync_signal.pending = sig; |
| /* signal that a new signal is pending */ |
| atomic_set(&ts->signal_pending, 1); |
| return 1; /* indicates that the signal was queued */ |
| } |
| |
| #ifndef HAVE_SAFE_SYSCALL |
| static inline void rewind_if_in_safe_syscall(void *puc) |
| { |
| /* Default version: never rewind */ |
| } |
| #endif |
| |
| static void host_signal_handler(int host_signum, siginfo_t *info, |
| void *puc) |
| { |
| CPUArchState *env = thread_cpu->env_ptr; |
| CPUState *cpu = ENV_GET_CPU(env); |
| TaskState *ts = cpu->opaque; |
| |
| int sig; |
| target_siginfo_t tinfo; |
| ucontext_t *uc = puc; |
| struct emulated_sigtable *k; |
| |
| /* the CPU emulator uses some host signals to detect exceptions, |
| we forward to it some signals */ |
| if ((host_signum == SIGSEGV || host_signum == SIGBUS) |
| && info->si_code > 0) { |
| if (cpu_signal_handler(host_signum, info, puc)) |
| return; |
| } |
| |
| /* get target signal number */ |
| sig = host_to_target_signal(host_signum); |
| if (sig < 1 || sig > TARGET_NSIG) |
| return; |
| trace_user_host_signal(env, host_signum, sig); |
| |
| rewind_if_in_safe_syscall(puc); |
| |
| host_to_target_siginfo_noswap(&tinfo, info); |
| k = &ts->sigtab[sig - 1]; |
| k->info = tinfo; |
| k->pending = sig; |
| ts->signal_pending = 1; |
| |
| /* Block host signals until target signal handler entered. We |
| * can't block SIGSEGV or SIGBUS while we're executing guest |
| * code in case the guest code provokes one in the window between |
| * now and it getting out to the main loop. Signals will be |
| * unblocked again in process_pending_signals(). |
| * |
| * WARNING: we cannot use sigfillset() here because the uc_sigmask |
| * field is a kernel sigset_t, which is much smaller than the |
| * libc sigset_t which sigfillset() operates on. Using sigfillset() |
| * would write 0xff bytes off the end of the structure and trash |
| * data on the struct. |
| * We can't use sizeof(uc->uc_sigmask) either, because the libc |
| * headers define the struct field with the wrong (too large) type. |
| */ |
| memset(&uc->uc_sigmask, 0xff, SIGSET_T_SIZE); |
| sigdelset(&uc->uc_sigmask, SIGSEGV); |
| sigdelset(&uc->uc_sigmask, SIGBUS); |
| |
| /* interrupt the virtual CPU as soon as possible */ |
| cpu_exit(thread_cpu); |
| } |
| |
| /* do_sigaltstack() returns target values and errnos. */ |
| /* compare linux/kernel/signal.c:do_sigaltstack() */ |
| abi_long do_sigaltstack(abi_ulong uss_addr, abi_ulong uoss_addr, abi_ulong sp) |
| { |
| int ret; |
| struct target_sigaltstack oss; |
| |
| /* XXX: test errors */ |
| if(uoss_addr) |
| { |
| __put_user(target_sigaltstack_used.ss_sp, &oss.ss_sp); |
| __put_user(target_sigaltstack_used.ss_size, &oss.ss_size); |
| __put_user(sas_ss_flags(sp), &oss.ss_flags); |
| } |
| |
| if(uss_addr) |
| { |
| struct target_sigaltstack *uss; |
| struct target_sigaltstack ss; |
| size_t minstacksize = TARGET_MINSIGSTKSZ; |
| |
| #if defined(TARGET_PPC64) |
| /* ELF V2 for PPC64 has a 4K minimum stack size for signal handlers */ |
| struct image_info *image = ((TaskState *)thread_cpu->opaque)->info; |
| if (get_ppc64_abi(image) > 1) { |
| minstacksize = 4096; |
| } |
| #endif |
| |
| ret = -TARGET_EFAULT; |
| if (!lock_user_struct(VERIFY_READ, uss, uss_addr, 1)) { |
| goto out; |
| } |
| __get_user(ss.ss_sp, &uss->ss_sp); |
| __get_user(ss.ss_size, &uss->ss_size); |
| __get_user(ss.ss_flags, &uss->ss_flags); |
| unlock_user_struct(uss, uss_addr, 0); |
| |
| ret = -TARGET_EPERM; |
| if (on_sig_stack(sp)) |
| goto out; |
| |
| ret = -TARGET_EINVAL; |
| if (ss.ss_flags != TARGET_SS_DISABLE |
| && ss.ss_flags != TARGET_SS_ONSTACK |
| && ss.ss_flags != 0) |
| goto out; |
| |
| if (ss.ss_flags == TARGET_SS_DISABLE) { |
| ss.ss_size = 0; |
| ss.ss_sp = 0; |
| } else { |
| ret = -TARGET_ENOMEM; |
| if (ss.ss_size < minstacksize) { |
| goto out; |
| } |
| } |
| |
| target_sigaltstack_used.ss_sp = ss.ss_sp; |
| target_sigaltstack_used.ss_size = ss.ss_size; |
| } |
| |
| if (uoss_addr) { |
| ret = -TARGET_EFAULT; |
| if (copy_to_user(uoss_addr, &oss, sizeof(oss))) |
| goto out; |
| } |
| |
| ret = 0; |
| out: |
| return ret; |
| } |
| |
| /* do_sigaction() return target values and host errnos */ |
| int do_sigaction(int sig, const struct target_sigaction *act, |
| struct target_sigaction *oact) |
| { |
| struct target_sigaction *k; |
| struct sigaction act1; |
| int host_sig; |
| int ret = 0; |
| |
| if (sig < 1 || sig > TARGET_NSIG || sig == TARGET_SIGKILL || sig == TARGET_SIGSTOP) { |
| return -TARGET_EINVAL; |
| } |
| |
| if (block_signals()) { |
| return -TARGET_ERESTARTSYS; |
| } |
| |
| k = &sigact_table[sig - 1]; |
| if (oact) { |
| __put_user(k->_sa_handler, &oact->_sa_handler); |
| __put_user(k->sa_flags, &oact->sa_flags); |
| #if !defined(TARGET_MIPS) |
| __put_user(k->sa_restorer, &oact->sa_restorer); |
| #endif |
| /* Not swapped. */ |
| oact->sa_mask = k->sa_mask; |
| } |
| if (act) { |
| /* FIXME: This is not threadsafe. */ |
| __get_user(k->_sa_handler, &act->_sa_handler); |
| __get_user(k->sa_flags, &act->sa_flags); |
| #if !defined(TARGET_MIPS) |
| __get_user(k->sa_restorer, &act->sa_restorer); |
| #endif |
| /* To be swapped in target_to_host_sigset. */ |
| k->sa_mask = act->sa_mask; |
| |
| /* we update the host linux signal state */ |
| host_sig = target_to_host_signal(sig); |
| if (host_sig != SIGSEGV && host_sig != SIGBUS) { |
| sigfillset(&act1.sa_mask); |
| act1.sa_flags = SA_SIGINFO; |
| if (k->sa_flags & TARGET_SA_RESTART) |
| act1.sa_flags |= SA_RESTART; |
| /* NOTE: it is important to update the host kernel signal |
| ignore state to avoid getting unexpected interrupted |
| syscalls */ |
| if (k->_sa_handler == TARGET_SIG_IGN) { |
| act1.sa_sigaction = (void *)SIG_IGN; |
| } else if (k->_sa_handler == TARGET_SIG_DFL) { |
| if (fatal_signal (sig)) |
| act1.sa_sigaction = host_signal_handler; |
| else |
| act1.sa_sigaction = (void *)SIG_DFL; |
| } else { |
| act1.sa_sigaction = host_signal_handler; |
| } |
| ret = sigaction(host_sig, &act1, NULL); |
| } |
| } |
| return ret; |
| } |
| |
| #if defined(TARGET_I386) && TARGET_ABI_BITS == 32 |
| |
| /* from the Linux kernel */ |
| |
| struct target_fpreg { |
| uint16_t significand[4]; |
| uint16_t exponent; |
| }; |
| |
| struct target_fpxreg { |
| uint16_t significand[4]; |
| uint16_t exponent; |
| uint16_t padding[3]; |
| }; |
| |
| struct target_xmmreg { |
| abi_ulong element[4]; |
| }; |
| |
| struct target_fpstate { |
| /* Regular FPU environment */ |
| abi_ulong cw; |
| abi_ulong sw; |
| abi_ulong tag; |
| abi_ulong ipoff; |
| abi_ulong cssel; |
| abi_ulong dataoff; |
| abi_ulong datasel; |
| struct target_fpreg _st[8]; |
| uint16_t status; |
| uint16_t magic; /* 0xffff = regular FPU data only */ |
| |
| /* FXSR FPU environment */ |
| abi_ulong _fxsr_env[6]; /* FXSR FPU env is ignored */ |
| abi_ulong mxcsr; |
| abi_ulong reserved; |
| struct target_fpxreg _fxsr_st[8]; /* FXSR FPU reg data is ignored */ |
| struct target_xmmreg _xmm[8]; |
| abi_ulong padding[56]; |
| }; |
| |
| #define X86_FXSR_MAGIC 0x0000 |
| |
| struct target_sigcontext { |
| uint16_t gs, __gsh; |
| uint16_t fs, __fsh; |
| uint16_t es, __esh; |
| uint16_t ds, __dsh; |
| abi_ulong edi; |
| abi_ulong esi; |
| abi_ulong ebp; |
| abi_ulong esp; |
| abi_ulong ebx; |
| abi_ulong edx; |
| abi_ulong ecx; |
| abi_ulong eax; |
| abi_ulong trapno; |
| abi_ulong err; |
| abi_ulong eip; |
| uint16_t cs, __csh; |
| abi_ulong eflags; |
| abi_ulong esp_at_signal; |
| uint16_t ss, __ssh; |
| abi_ulong fpstate; /* pointer */ |
| abi_ulong oldmask; |
| abi_ulong cr2; |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| struct sigframe |
| { |
| abi_ulong pretcode; |
| int sig; |
| struct target_sigcontext sc; |
| struct target_fpstate fpstate; |
| abi_ulong extramask[TARGET_NSIG_WORDS-1]; |
| char retcode[8]; |
| }; |
| |
| struct rt_sigframe |
| { |
| abi_ulong pretcode; |
| int sig; |
| abi_ulong pinfo; |
| abi_ulong puc; |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| struct target_fpstate fpstate; |
| char retcode[8]; |
| }; |
| |
| /* |
| * Set up a signal frame. |
| */ |
| |
| /* XXX: save x87 state */ |
| static void setup_sigcontext(struct target_sigcontext *sc, |
| struct target_fpstate *fpstate, CPUX86State *env, abi_ulong mask, |
| abi_ulong fpstate_addr) |
| { |
| CPUState *cs = CPU(x86_env_get_cpu(env)); |
| uint16_t magic; |
| |
| /* already locked in setup_frame() */ |
| __put_user(env->segs[R_GS].selector, (unsigned int *)&sc->gs); |
| __put_user(env->segs[R_FS].selector, (unsigned int *)&sc->fs); |
| __put_user(env->segs[R_ES].selector, (unsigned int *)&sc->es); |
| __put_user(env->segs[R_DS].selector, (unsigned int *)&sc->ds); |
| __put_user(env->regs[R_EDI], &sc->edi); |
| __put_user(env->regs[R_ESI], &sc->esi); |
| __put_user(env->regs[R_EBP], &sc->ebp); |
| __put_user(env->regs[R_ESP], &sc->esp); |
| __put_user(env->regs[R_EBX], &sc->ebx); |
| __put_user(env->regs[R_EDX], &sc->edx); |
| __put_user(env->regs[R_ECX], &sc->ecx); |
| __put_user(env->regs[R_EAX], &sc->eax); |
| __put_user(cs->exception_index, &sc->trapno); |
| __put_user(env->error_code, &sc->err); |
| __put_user(env->eip, &sc->eip); |
| __put_user(env->segs[R_CS].selector, (unsigned int *)&sc->cs); |
| __put_user(env->eflags, &sc->eflags); |
| __put_user(env->regs[R_ESP], &sc->esp_at_signal); |
| __put_user(env->segs[R_SS].selector, (unsigned int *)&sc->ss); |
| |
| cpu_x86_fsave(env, fpstate_addr, 1); |
| fpstate->status = fpstate->sw; |
| magic = 0xffff; |
| __put_user(magic, &fpstate->magic); |
| __put_user(fpstate_addr, &sc->fpstate); |
| |
| /* non-iBCS2 extensions.. */ |
| __put_user(mask, &sc->oldmask); |
| __put_user(env->cr[2], &sc->cr2); |
| } |
| |
| /* |
| * Determine which stack to use.. |
| */ |
| |
| static inline abi_ulong |
| get_sigframe(struct target_sigaction *ka, CPUX86State *env, size_t frame_size) |
| { |
| unsigned long esp; |
| |
| /* Default to using normal stack */ |
| esp = env->regs[R_ESP]; |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if (ka->sa_flags & TARGET_SA_ONSTACK) { |
| if (sas_ss_flags(esp) == 0) { |
| esp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| } else { |
| |
| /* This is the legacy signal stack switching. */ |
| if ((env->segs[R_SS].selector & 0xffff) != __USER_DS && |
| !(ka->sa_flags & TARGET_SA_RESTORER) && |
| ka->sa_restorer) { |
| esp = (unsigned long) ka->sa_restorer; |
| } |
| } |
| return (esp - frame_size) & -8ul; |
| } |
| |
| /* compare linux/arch/i386/kernel/signal.c:setup_frame() */ |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUX86State *env) |
| { |
| abi_ulong frame_addr; |
| struct sigframe *frame; |
| int i; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_frame(env, frame_addr); |
| |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) |
| goto give_sigsegv; |
| |
| __put_user(sig, &frame->sig); |
| |
| setup_sigcontext(&frame->sc, &frame->fpstate, env, set->sig[0], |
| frame_addr + offsetof(struct sigframe, fpstate)); |
| |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->extramask[i - 1]); |
| } |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| __put_user(ka->sa_restorer, &frame->pretcode); |
| } else { |
| uint16_t val16; |
| abi_ulong retcode_addr; |
| retcode_addr = frame_addr + offsetof(struct sigframe, retcode); |
| __put_user(retcode_addr, &frame->pretcode); |
| /* This is popl %eax ; movl $,%eax ; int $0x80 */ |
| val16 = 0xb858; |
| __put_user(val16, (uint16_t *)(frame->retcode+0)); |
| __put_user(TARGET_NR_sigreturn, (int *)(frame->retcode+2)); |
| val16 = 0x80cd; |
| __put_user(val16, (uint16_t *)(frame->retcode+6)); |
| } |
| |
| |
| /* Set up registers for signal handler */ |
| env->regs[R_ESP] = frame_addr; |
| env->eip = ka->_sa_handler; |
| |
| cpu_x86_load_seg(env, R_DS, __USER_DS); |
| cpu_x86_load_seg(env, R_ES, __USER_DS); |
| cpu_x86_load_seg(env, R_SS, __USER_DS); |
| cpu_x86_load_seg(env, R_CS, __USER_CS); |
| env->eflags &= ~TF_MASK; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| /* compare linux/arch/i386/kernel/signal.c:setup_rt_frame() */ |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUX86State *env) |
| { |
| abi_ulong frame_addr, addr; |
| struct rt_sigframe *frame; |
| int i; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_rt_frame(env, frame_addr); |
| |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) |
| goto give_sigsegv; |
| |
| __put_user(sig, &frame->sig); |
| addr = frame_addr + offsetof(struct rt_sigframe, info); |
| __put_user(addr, &frame->pinfo); |
| addr = frame_addr + offsetof(struct rt_sigframe, uc); |
| __put_user(addr, &frame->puc); |
| tswap_siginfo(&frame->info, info); |
| |
| /* Create the ucontext. */ |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(get_sp_from_cpustate(env)), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| setup_sigcontext(&frame->uc.tuc_mcontext, &frame->fpstate, env, |
| set->sig[0], frame_addr + offsetof(struct rt_sigframe, fpstate)); |
| |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| __put_user(ka->sa_restorer, &frame->pretcode); |
| } else { |
| uint16_t val16; |
| addr = frame_addr + offsetof(struct rt_sigframe, retcode); |
| __put_user(addr, &frame->pretcode); |
| /* This is movl $,%eax ; int $0x80 */ |
| __put_user(0xb8, (char *)(frame->retcode+0)); |
| __put_user(TARGET_NR_rt_sigreturn, (int *)(frame->retcode+1)); |
| val16 = 0x80cd; |
| __put_user(val16, (uint16_t *)(frame->retcode+5)); |
| } |
| |
| /* Set up registers for signal handler */ |
| env->regs[R_ESP] = frame_addr; |
| env->eip = ka->_sa_handler; |
| |
| cpu_x86_load_seg(env, R_DS, __USER_DS); |
| cpu_x86_load_seg(env, R_ES, __USER_DS); |
| cpu_x86_load_seg(env, R_SS, __USER_DS); |
| cpu_x86_load_seg(env, R_CS, __USER_CS); |
| env->eflags &= ~TF_MASK; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| static int |
| restore_sigcontext(CPUX86State *env, struct target_sigcontext *sc) |
| { |
| unsigned int err = 0; |
| abi_ulong fpstate_addr; |
| unsigned int tmpflags; |
| |
| cpu_x86_load_seg(env, R_GS, tswap16(sc->gs)); |
| cpu_x86_load_seg(env, R_FS, tswap16(sc->fs)); |
| cpu_x86_load_seg(env, R_ES, tswap16(sc->es)); |
| cpu_x86_load_seg(env, R_DS, tswap16(sc->ds)); |
| |
| env->regs[R_EDI] = tswapl(sc->edi); |
| env->regs[R_ESI] = tswapl(sc->esi); |
| env->regs[R_EBP] = tswapl(sc->ebp); |
| env->regs[R_ESP] = tswapl(sc->esp); |
| env->regs[R_EBX] = tswapl(sc->ebx); |
| env->regs[R_EDX] = tswapl(sc->edx); |
| env->regs[R_ECX] = tswapl(sc->ecx); |
| env->regs[R_EAX] = tswapl(sc->eax); |
| env->eip = tswapl(sc->eip); |
| |
| cpu_x86_load_seg(env, R_CS, lduw_p(&sc->cs) | 3); |
| cpu_x86_load_seg(env, R_SS, lduw_p(&sc->ss) | 3); |
| |
| tmpflags = tswapl(sc->eflags); |
| env->eflags = (env->eflags & ~0x40DD5) | (tmpflags & 0x40DD5); |
| // regs->orig_eax = -1; /* disable syscall checks */ |
| |
| fpstate_addr = tswapl(sc->fpstate); |
| if (fpstate_addr != 0) { |
| if (!access_ok(VERIFY_READ, fpstate_addr, |
| sizeof(struct target_fpstate))) |
| goto badframe; |
| cpu_x86_frstor(env, fpstate_addr, 1); |
| } |
| |
| return err; |
| badframe: |
| return 1; |
| } |
| |
| long do_sigreturn(CPUX86State *env) |
| { |
| struct sigframe *frame; |
| abi_ulong frame_addr = env->regs[R_ESP] - 8; |
| target_sigset_t target_set; |
| sigset_t set; |
| int i; |
| |
| trace_user_do_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) |
| goto badframe; |
| /* set blocked signals */ |
| __get_user(target_set.sig[0], &frame->sc.oldmask); |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(target_set.sig[i], &frame->extramask[i - 1]); |
| } |
| |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| |
| /* restore registers */ |
| if (restore_sigcontext(env, &frame->sc)) |
| goto badframe; |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUX86State *env) |
| { |
| abi_ulong frame_addr; |
| struct rt_sigframe *frame; |
| sigset_t set; |
| |
| frame_addr = env->regs[R_ESP] - 4; |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) |
| goto badframe; |
| target_to_host_sigset(&set, &frame->uc.tuc_sigmask); |
| set_sigmask(&set); |
| |
| if (restore_sigcontext(env, &frame->uc.tuc_mcontext)) { |
| goto badframe; |
| } |
| |
| if (do_sigaltstack(frame_addr + offsetof(struct rt_sigframe, uc.tuc_stack), 0, |
| get_sp_from_cpustate(env)) == -EFAULT) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_AARCH64) |
| |
| struct target_sigcontext { |
| uint64_t fault_address; |
| /* AArch64 registers */ |
| uint64_t regs[31]; |
| uint64_t sp; |
| uint64_t pc; |
| uint64_t pstate; |
| /* 4K reserved for FP/SIMD state and future expansion */ |
| char __reserved[4096] __attribute__((__aligned__(16))); |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| target_sigset_t tuc_sigmask; |
| /* glibc uses a 1024-bit sigset_t */ |
| char __unused[1024 / 8 - sizeof(target_sigset_t)]; |
| /* last for future expansion */ |
| struct target_sigcontext tuc_mcontext; |
| }; |
| |
| /* |
| * Header to be used at the beginning of structures extending the user |
| * context. Such structures must be placed after the rt_sigframe on the stack |
| * and be 16-byte aligned. The last structure must be a dummy one with the |
| * magic and size set to 0. |
| */ |
| struct target_aarch64_ctx { |
| uint32_t magic; |
| uint32_t size; |
| }; |
| |
| #define TARGET_FPSIMD_MAGIC 0x46508001 |
| |
| struct target_fpsimd_context { |
| struct target_aarch64_ctx head; |
| uint32_t fpsr; |
| uint32_t fpcr; |
| uint64_t vregs[32 * 2]; /* really uint128_t vregs[32] */ |
| }; |
| |
| /* |
| * Auxiliary context saved in the sigcontext.__reserved array. Not exported to |
| * user space as it will change with the addition of new context. User space |
| * should check the magic/size information. |
| */ |
| struct target_aux_context { |
| struct target_fpsimd_context fpsimd; |
| /* additional context to be added before "end" */ |
| struct target_aarch64_ctx end; |
| }; |
| |
| struct target_rt_sigframe { |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| uint64_t fp; |
| uint64_t lr; |
| uint32_t tramp[2]; |
| }; |
| |
| static int target_setup_sigframe(struct target_rt_sigframe *sf, |
| CPUARMState *env, target_sigset_t *set) |
| { |
| int i; |
| struct target_aux_context *aux = |
| (struct target_aux_context *)sf->uc.tuc_mcontext.__reserved; |
| |
| /* set up the stack frame for unwinding */ |
| __put_user(env->xregs[29], &sf->fp); |
| __put_user(env->xregs[30], &sf->lr); |
| |
| for (i = 0; i < 31; i++) { |
| __put_user(env->xregs[i], &sf->uc.tuc_mcontext.regs[i]); |
| } |
| __put_user(env->xregs[31], &sf->uc.tuc_mcontext.sp); |
| __put_user(env->pc, &sf->uc.tuc_mcontext.pc); |
| __put_user(pstate_read(env), &sf->uc.tuc_mcontext.pstate); |
| |
| __put_user(env->exception.vaddress, &sf->uc.tuc_mcontext.fault_address); |
| |
| for (i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &sf->uc.tuc_sigmask.sig[i]); |
| } |
| |
| for (i = 0; i < 32; i++) { |
| #ifdef TARGET_WORDS_BIGENDIAN |
| __put_user(env->vfp.regs[i * 2], &aux->fpsimd.vregs[i * 2 + 1]); |
| __put_user(env->vfp.regs[i * 2 + 1], &aux->fpsimd.vregs[i * 2]); |
| #else |
| __put_user(env->vfp.regs[i * 2], &aux->fpsimd.vregs[i * 2]); |
| __put_user(env->vfp.regs[i * 2 + 1], &aux->fpsimd.vregs[i * 2 + 1]); |
| #endif |
| } |
| __put_user(vfp_get_fpsr(env), &aux->fpsimd.fpsr); |
| __put_user(vfp_get_fpcr(env), &aux->fpsimd.fpcr); |
| __put_user(TARGET_FPSIMD_MAGIC, &aux->fpsimd.head.magic); |
| __put_user(sizeof(struct target_fpsimd_context), |
| &aux->fpsimd.head.size); |
| |
| /* set the "end" magic */ |
| __put_user(0, &aux->end.magic); |
| __put_user(0, &aux->end.size); |
| |
| return 0; |
| } |
| |
| static int target_restore_sigframe(CPUARMState *env, |
| struct target_rt_sigframe *sf) |
| { |
| sigset_t set; |
| int i; |
| struct target_aux_context *aux = |
| (struct target_aux_context *)sf->uc.tuc_mcontext.__reserved; |
| uint32_t magic, size, fpsr, fpcr; |
| uint64_t pstate; |
| |
| target_to_host_sigset(&set, &sf->uc.tuc_sigmask); |
| set_sigmask(&set); |
| |
| for (i = 0; i < 31; i++) { |
| __get_user(env->xregs[i], &sf->uc.tuc_mcontext.regs[i]); |
| } |
| |
| __get_user(env->xregs[31], &sf->uc.tuc_mcontext.sp); |
| __get_user(env->pc, &sf->uc.tuc_mcontext.pc); |
| __get_user(pstate, &sf->uc.tuc_mcontext.pstate); |
| pstate_write(env, pstate); |
| |
| __get_user(magic, &aux->fpsimd.head.magic); |
| __get_user(size, &aux->fpsimd.head.size); |
| |
| if (magic != TARGET_FPSIMD_MAGIC |
| || size != sizeof(struct target_fpsimd_context)) { |
| return 1; |
| } |
| |
| for (i = 0; i < 32; i++) { |
| #ifdef TARGET_WORDS_BIGENDIAN |
| __get_user(env->vfp.regs[i * 2], &aux->fpsimd.vregs[i * 2 + 1]); |
| __get_user(env->vfp.regs[i * 2 + 1], &aux->fpsimd.vregs[i * 2]); |
| #else |
| __get_user(env->vfp.regs[i * 2], &aux->fpsimd.vregs[i * 2]); |
| __get_user(env->vfp.regs[i * 2 + 1], &aux->fpsimd.vregs[i * 2 + 1]); |
| #endif |
| } |
| __get_user(fpsr, &aux->fpsimd.fpsr); |
| vfp_set_fpsr(env, fpsr); |
| __get_user(fpcr, &aux->fpsimd.fpcr); |
| vfp_set_fpcr(env, fpcr); |
| |
| return 0; |
| } |
| |
| static abi_ulong get_sigframe(struct target_sigaction *ka, CPUARMState *env) |
| { |
| abi_ulong sp; |
| |
| sp = env->xregs[31]; |
| |
| /* |
| * This is the X/Open sanctioned signal stack switching. |
| */ |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| sp = (sp - sizeof(struct target_rt_sigframe)) & ~15; |
| |
| return sp; |
| } |
| |
| static void target_setup_frame(int usig, struct target_sigaction *ka, |
| target_siginfo_t *info, target_sigset_t *set, |
| CPUARMState *env) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr, return_addr; |
| |
| frame_addr = get_sigframe(ka, env); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| |
| __put_user(target_sigaltstack_used.ss_sp, |
| &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->xregs[31]), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| target_setup_sigframe(frame, env, set); |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| return_addr = ka->sa_restorer; |
| } else { |
| /* mov x8,#__NR_rt_sigreturn; svc #0 */ |
| __put_user(0xd2801168, &frame->tramp[0]); |
| __put_user(0xd4000001, &frame->tramp[1]); |
| return_addr = frame_addr + offsetof(struct target_rt_sigframe, tramp); |
| } |
| env->xregs[0] = usig; |
| env->xregs[31] = frame_addr; |
| env->xregs[29] = env->xregs[31] + offsetof(struct target_rt_sigframe, fp); |
| env->pc = ka->_sa_handler; |
| env->xregs[30] = return_addr; |
| if (info) { |
| tswap_siginfo(&frame->info, info); |
| env->xregs[1] = frame_addr + offsetof(struct target_rt_sigframe, info); |
| env->xregs[2] = frame_addr + offsetof(struct target_rt_sigframe, uc); |
| } |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(usig); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, target_sigset_t *set, |
| CPUARMState *env) |
| { |
| target_setup_frame(sig, ka, info, set, env); |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUARMState *env) |
| { |
| target_setup_frame(sig, ka, 0, set, env); |
| } |
| |
| long do_rt_sigreturn(CPUARMState *env) |
| { |
| struct target_rt_sigframe *frame = NULL; |
| abi_ulong frame_addr = env->xregs[31]; |
| |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (frame_addr & 15) { |
| goto badframe; |
| } |
| |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| if (target_restore_sigframe(env, frame)) { |
| goto badframe; |
| } |
| |
| if (do_sigaltstack(frame_addr + |
| offsetof(struct target_rt_sigframe, uc.tuc_stack), |
| 0, get_sp_from_cpustate(env)) == -EFAULT) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_sigreturn(CPUARMState *env) |
| { |
| return do_rt_sigreturn(env); |
| } |
| |
| #elif defined(TARGET_ARM) |
| |
| struct target_sigcontext { |
| abi_ulong trap_no; |
| abi_ulong error_code; |
| abi_ulong oldmask; |
| abi_ulong arm_r0; |
| abi_ulong arm_r1; |
| abi_ulong arm_r2; |
| abi_ulong arm_r3; |
| abi_ulong arm_r4; |
| abi_ulong arm_r5; |
| abi_ulong arm_r6; |
| abi_ulong arm_r7; |
| abi_ulong arm_r8; |
| abi_ulong arm_r9; |
| abi_ulong arm_r10; |
| abi_ulong arm_fp; |
| abi_ulong arm_ip; |
| abi_ulong arm_sp; |
| abi_ulong arm_lr; |
| abi_ulong arm_pc; |
| abi_ulong arm_cpsr; |
| abi_ulong fault_address; |
| }; |
| |
| struct target_ucontext_v1 { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| struct target_ucontext_v2 { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| char __unused[128 - sizeof(target_sigset_t)]; |
| abi_ulong tuc_regspace[128] __attribute__((__aligned__(8))); |
| }; |
| |
| struct target_user_vfp { |
| uint64_t fpregs[32]; |
| abi_ulong fpscr; |
| }; |
| |
| struct target_user_vfp_exc { |
| abi_ulong fpexc; |
| abi_ulong fpinst; |
| abi_ulong fpinst2; |
| }; |
| |
| struct target_vfp_sigframe { |
| abi_ulong magic; |
| abi_ulong size; |
| struct target_user_vfp ufp; |
| struct target_user_vfp_exc ufp_exc; |
| } __attribute__((__aligned__(8))); |
| |
| struct target_iwmmxt_sigframe { |
| abi_ulong magic; |
| abi_ulong size; |
| uint64_t regs[16]; |
| /* Note that not all the coprocessor control registers are stored here */ |
| uint32_t wcssf; |
| uint32_t wcasf; |
| uint32_t wcgr0; |
| uint32_t wcgr1; |
| uint32_t wcgr2; |
| uint32_t wcgr3; |
| } __attribute__((__aligned__(8))); |
| |
| #define TARGET_VFP_MAGIC 0x56465001 |
| #define TARGET_IWMMXT_MAGIC 0x12ef842a |
| |
| struct sigframe_v1 |
| { |
| struct target_sigcontext sc; |
| abi_ulong extramask[TARGET_NSIG_WORDS-1]; |
| abi_ulong retcode; |
| }; |
| |
| struct sigframe_v2 |
| { |
| struct target_ucontext_v2 uc; |
| abi_ulong retcode; |
| }; |
| |
| struct rt_sigframe_v1 |
| { |
| abi_ulong pinfo; |
| abi_ulong puc; |
| struct target_siginfo info; |
| struct target_ucontext_v1 uc; |
| abi_ulong retcode; |
| }; |
| |
| struct rt_sigframe_v2 |
| { |
| struct target_siginfo info; |
| struct target_ucontext_v2 uc; |
| abi_ulong retcode; |
| }; |
| |
| #define TARGET_CONFIG_CPU_32 1 |
| |
| /* |
| * For ARM syscalls, we encode the syscall number into the instruction. |
| */ |
| #define SWI_SYS_SIGRETURN (0xef000000|(TARGET_NR_sigreturn + ARM_SYSCALL_BASE)) |
| #define SWI_SYS_RT_SIGRETURN (0xef000000|(TARGET_NR_rt_sigreturn + ARM_SYSCALL_BASE)) |
| |
| /* |
| * For Thumb syscalls, we pass the syscall number via r7. We therefore |
| * need two 16-bit instructions. |
| */ |
| #define SWI_THUMB_SIGRETURN (0xdf00 << 16 | 0x2700 | (TARGET_NR_sigreturn)) |
| #define SWI_THUMB_RT_SIGRETURN (0xdf00 << 16 | 0x2700 | (TARGET_NR_rt_sigreturn)) |
| |
| static const abi_ulong retcodes[4] = { |
| SWI_SYS_SIGRETURN, SWI_THUMB_SIGRETURN, |
| SWI_SYS_RT_SIGRETURN, SWI_THUMB_RT_SIGRETURN |
| }; |
| |
| |
| static inline int valid_user_regs(CPUARMState *regs) |
| { |
| return 1; |
| } |
| |
| static void |
| setup_sigcontext(struct target_sigcontext *sc, /*struct _fpstate *fpstate,*/ |
| CPUARMState *env, abi_ulong mask) |
| { |
| __put_user(env->regs[0], &sc->arm_r0); |
| __put_user(env->regs[1], &sc->arm_r1); |
| __put_user(env->regs[2], &sc->arm_r2); |
| __put_user(env->regs[3], &sc->arm_r3); |
| __put_user(env->regs[4], &sc->arm_r4); |
| __put_user(env->regs[5], &sc->arm_r5); |
| __put_user(env->regs[6], &sc->arm_r6); |
| __put_user(env->regs[7], &sc->arm_r7); |
| __put_user(env->regs[8], &sc->arm_r8); |
| __put_user(env->regs[9], &sc->arm_r9); |
| __put_user(env->regs[10], &sc->arm_r10); |
| __put_user(env->regs[11], &sc->arm_fp); |
| __put_user(env->regs[12], &sc->arm_ip); |
| __put_user(env->regs[13], &sc->arm_sp); |
| __put_user(env->regs[14], &sc->arm_lr); |
| __put_user(env->regs[15], &sc->arm_pc); |
| #ifdef TARGET_CONFIG_CPU_32 |
| __put_user(cpsr_read(env), &sc->arm_cpsr); |
| #endif |
| |
| __put_user(/* current->thread.trap_no */ 0, &sc->trap_no); |
| __put_user(/* current->thread.error_code */ 0, &sc->error_code); |
| __put_user(/* current->thread.address */ 0, &sc->fault_address); |
| __put_user(mask, &sc->oldmask); |
| } |
| |
| static inline abi_ulong |
| get_sigframe(struct target_sigaction *ka, CPUARMState *regs, int framesize) |
| { |
| unsigned long sp = regs->regs[13]; |
| |
| /* |
| * This is the X/Open sanctioned signal stack switching. |
| */ |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| /* |
| * ATPCS B01 mandates 8-byte alignment |
| */ |
| return (sp - framesize) & ~7; |
| } |
| |
| static void |
| setup_return(CPUARMState *env, struct target_sigaction *ka, |
| abi_ulong *rc, abi_ulong frame_addr, int usig, abi_ulong rc_addr) |
| { |
| abi_ulong handler = ka->_sa_handler; |
| abi_ulong retcode; |
| int thumb = handler & 1; |
| uint32_t cpsr = cpsr_read(env); |
| |
| cpsr &= ~CPSR_IT; |
| if (thumb) { |
| cpsr |= CPSR_T; |
| } else { |
| cpsr &= ~CPSR_T; |
| } |
| |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| retcode = ka->sa_restorer; |
| } else { |
| unsigned int idx = thumb; |
| |
| if (ka->sa_flags & TARGET_SA_SIGINFO) { |
| idx += 2; |
| } |
| |
| __put_user(retcodes[idx], rc); |
| |
| retcode = rc_addr + thumb; |
| } |
| |
| env->regs[0] = usig; |
| env->regs[13] = frame_addr; |
| env->regs[14] = retcode; |
| env->regs[15] = handler & (thumb ? ~1 : ~3); |
| cpsr_write(env, cpsr, CPSR_IT | CPSR_T, CPSRWriteByInstr); |
| } |
| |
| static abi_ulong *setup_sigframe_v2_vfp(abi_ulong *regspace, CPUARMState *env) |
| { |
| int i; |
| struct target_vfp_sigframe *vfpframe; |
| vfpframe = (struct target_vfp_sigframe *)regspace; |
| __put_user(TARGET_VFP_MAGIC, &vfpframe->magic); |
| __put_user(sizeof(*vfpframe), &vfpframe->size); |
| for (i = 0; i < 32; i++) { |
| __put_user(float64_val(env->vfp.regs[i]), &vfpframe->ufp.fpregs[i]); |
| } |
| __put_user(vfp_get_fpscr(env), &vfpframe->ufp.fpscr); |
| __put_user(env->vfp.xregs[ARM_VFP_FPEXC], &vfpframe->ufp_exc.fpexc); |
| __put_user(env->vfp.xregs[ARM_VFP_FPINST], &vfpframe->ufp_exc.fpinst); |
| __put_user(env->vfp.xregs[ARM_VFP_FPINST2], &vfpframe->ufp_exc.fpinst2); |
| return (abi_ulong*)(vfpframe+1); |
| } |
| |
| static abi_ulong *setup_sigframe_v2_iwmmxt(abi_ulong *regspace, |
| CPUARMState *env) |
| { |
| int i; |
| struct target_iwmmxt_sigframe *iwmmxtframe; |
| iwmmxtframe = (struct target_iwmmxt_sigframe *)regspace; |
| __put_user(TARGET_IWMMXT_MAGIC, &iwmmxtframe->magic); |
| __put_user(sizeof(*iwmmxtframe), &iwmmxtframe->size); |
| for (i = 0; i < 16; i++) { |
| __put_user(env->iwmmxt.regs[i], &iwmmxtframe->regs[i]); |
| } |
| __put_user(env->vfp.xregs[ARM_IWMMXT_wCSSF], &iwmmxtframe->wcssf); |
| __put_user(env->vfp.xregs[ARM_IWMMXT_wCASF], &iwmmxtframe->wcssf); |
| __put_user(env->vfp.xregs[ARM_IWMMXT_wCGR0], &iwmmxtframe->wcgr0); |
| __put_user(env->vfp.xregs[ARM_IWMMXT_wCGR1], &iwmmxtframe->wcgr1); |
| __put_user(env->vfp.xregs[ARM_IWMMXT_wCGR2], &iwmmxtframe->wcgr2); |
| __put_user(env->vfp.xregs[ARM_IWMMXT_wCGR3], &iwmmxtframe->wcgr3); |
| return (abi_ulong*)(iwmmxtframe+1); |
| } |
| |
| static void setup_sigframe_v2(struct target_ucontext_v2 *uc, |
| target_sigset_t *set, CPUARMState *env) |
| { |
| struct target_sigaltstack stack; |
| int i; |
| abi_ulong *regspace; |
| |
| /* Clear all the bits of the ucontext we don't use. */ |
| memset(uc, 0, offsetof(struct target_ucontext_v2, tuc_mcontext)); |
| |
| memset(&stack, 0, sizeof(stack)); |
| __put_user(target_sigaltstack_used.ss_sp, &stack.ss_sp); |
| __put_user(target_sigaltstack_used.ss_size, &stack.ss_size); |
| __put_user(sas_ss_flags(get_sp_from_cpustate(env)), &stack.ss_flags); |
| memcpy(&uc->tuc_stack, &stack, sizeof(stack)); |
| |
| setup_sigcontext(&uc->tuc_mcontext, env, set->sig[0]); |
| /* Save coprocessor signal frame. */ |
| regspace = uc->tuc_regspace; |
| if (arm_feature(env, ARM_FEATURE_VFP)) { |
| regspace = setup_sigframe_v2_vfp(regspace, env); |
| } |
| if (arm_feature(env, ARM_FEATURE_IWMMXT)) { |
| regspace = setup_sigframe_v2_iwmmxt(regspace, env); |
| } |
| |
| /* Write terminating magic word */ |
| __put_user(0, regspace); |
| |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &uc->tuc_sigmask.sig[i]); |
| } |
| } |
| |
| /* compare linux/arch/arm/kernel/signal.c:setup_frame() */ |
| static void setup_frame_v1(int usig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUARMState *regs) |
| { |
| struct sigframe_v1 *frame; |
| abi_ulong frame_addr = get_sigframe(ka, regs, sizeof(*frame)); |
| int i; |
| |
| trace_user_setup_frame(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto sigsegv; |
| } |
| |
| setup_sigcontext(&frame->sc, regs, set->sig[0]); |
| |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->extramask[i - 1]); |
| } |
| |
| setup_return(regs, ka, &frame->retcode, frame_addr, usig, |
| frame_addr + offsetof(struct sigframe_v1, retcode)); |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| sigsegv: |
| force_sigsegv(usig); |
| } |
| |
| static void setup_frame_v2(int usig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUARMState *regs) |
| { |
| struct sigframe_v2 *frame; |
| abi_ulong frame_addr = get_sigframe(ka, regs, sizeof(*frame)); |
| |
| trace_user_setup_frame(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto sigsegv; |
| } |
| |
| setup_sigframe_v2(&frame->uc, set, regs); |
| |
| setup_return(regs, ka, &frame->retcode, frame_addr, usig, |
| frame_addr + offsetof(struct sigframe_v2, retcode)); |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| sigsegv: |
| force_sigsegv(usig); |
| } |
| |
| static void setup_frame(int usig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUARMState *regs) |
| { |
| if (get_osversion() >= 0x020612) { |
| setup_frame_v2(usig, ka, set, regs); |
| } else { |
| setup_frame_v1(usig, ka, set, regs); |
| } |
| } |
| |
| /* compare linux/arch/arm/kernel/signal.c:setup_rt_frame() */ |
| static void setup_rt_frame_v1(int usig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUARMState *env) |
| { |
| struct rt_sigframe_v1 *frame; |
| abi_ulong frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| struct target_sigaltstack stack; |
| int i; |
| abi_ulong info_addr, uc_addr; |
| |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto sigsegv; |
| } |
| |
| info_addr = frame_addr + offsetof(struct rt_sigframe_v1, info); |
| __put_user(info_addr, &frame->pinfo); |
| uc_addr = frame_addr + offsetof(struct rt_sigframe_v1, uc); |
| __put_user(uc_addr, &frame->puc); |
| tswap_siginfo(&frame->info, info); |
| |
| /* Clear all the bits of the ucontext we don't use. */ |
| memset(&frame->uc, 0, offsetof(struct target_ucontext_v1, tuc_mcontext)); |
| |
| memset(&stack, 0, sizeof(stack)); |
| __put_user(target_sigaltstack_used.ss_sp, &stack.ss_sp); |
| __put_user(target_sigaltstack_used.ss_size, &stack.ss_size); |
| __put_user(sas_ss_flags(get_sp_from_cpustate(env)), &stack.ss_flags); |
| memcpy(&frame->uc.tuc_stack, &stack, sizeof(stack)); |
| |
| setup_sigcontext(&frame->uc.tuc_mcontext, env, set->sig[0]); |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| setup_return(env, ka, &frame->retcode, frame_addr, usig, |
| frame_addr + offsetof(struct rt_sigframe_v1, retcode)); |
| |
| env->regs[1] = info_addr; |
| env->regs[2] = uc_addr; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| sigsegv: |
| force_sigsegv(usig); |
| } |
| |
| static void setup_rt_frame_v2(int usig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUARMState *env) |
| { |
| struct rt_sigframe_v2 *frame; |
| abi_ulong frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| abi_ulong info_addr, uc_addr; |
| |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto sigsegv; |
| } |
| |
| info_addr = frame_addr + offsetof(struct rt_sigframe_v2, info); |
| uc_addr = frame_addr + offsetof(struct rt_sigframe_v2, uc); |
| tswap_siginfo(&frame->info, info); |
| |
| setup_sigframe_v2(&frame->uc, set, env); |
| |
| setup_return(env, ka, &frame->retcode, frame_addr, usig, |
| frame_addr + offsetof(struct rt_sigframe_v2, retcode)); |
| |
| env->regs[1] = info_addr; |
| env->regs[2] = uc_addr; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| sigsegv: |
| force_sigsegv(usig); |
| } |
| |
| static void setup_rt_frame(int usig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUARMState *env) |
| { |
| if (get_osversion() >= 0x020612) { |
| setup_rt_frame_v2(usig, ka, info, set, env); |
| } else { |
| setup_rt_frame_v1(usig, ka, info, set, env); |
| } |
| } |
| |
| static int |
| restore_sigcontext(CPUARMState *env, struct target_sigcontext *sc) |
| { |
| int err = 0; |
| uint32_t cpsr; |
| |
| __get_user(env->regs[0], &sc->arm_r0); |
| __get_user(env->regs[1], &sc->arm_r1); |
| __get_user(env->regs[2], &sc->arm_r2); |
| __get_user(env->regs[3], &sc->arm_r3); |
| __get_user(env->regs[4], &sc->arm_r4); |
| __get_user(env->regs[5], &sc->arm_r5); |
| __get_user(env->regs[6], &sc->arm_r6); |
| __get_user(env->regs[7], &sc->arm_r7); |
| __get_user(env->regs[8], &sc->arm_r8); |
| __get_user(env->regs[9], &sc->arm_r9); |
| __get_user(env->regs[10], &sc->arm_r10); |
| __get_user(env->regs[11], &sc->arm_fp); |
| __get_user(env->regs[12], &sc->arm_ip); |
| __get_user(env->regs[13], &sc->arm_sp); |
| __get_user(env->regs[14], &sc->arm_lr); |
| __get_user(env->regs[15], &sc->arm_pc); |
| #ifdef TARGET_CONFIG_CPU_32 |
| __get_user(cpsr, &sc->arm_cpsr); |
| cpsr_write(env, cpsr, CPSR_USER | CPSR_EXEC, CPSRWriteByInstr); |
| #endif |
| |
| err |= !valid_user_regs(env); |
| |
| return err; |
| } |
| |
| static long do_sigreturn_v1(CPUARMState *env) |
| { |
| abi_ulong frame_addr; |
| struct sigframe_v1 *frame = NULL; |
| target_sigset_t set; |
| sigset_t host_set; |
| int i; |
| |
| /* |
| * Since we stacked the signal on a 64-bit boundary, |
| * then 'sp' should be word aligned here. If it's |
| * not, then the user is trying to mess with us. |
| */ |
| frame_addr = env->regs[13]; |
| trace_user_do_sigreturn(env, frame_addr); |
| if (frame_addr & 7) { |
| goto badframe; |
| } |
| |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| __get_user(set.sig[0], &frame->sc.oldmask); |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(set.sig[i], &frame->extramask[i - 1]); |
| } |
| |
| target_to_host_sigset_internal(&host_set, &set); |
| set_sigmask(&host_set); |
| |
| if (restore_sigcontext(env, &frame->sc)) { |
| goto badframe; |
| } |
| |
| #if 0 |
| /* Send SIGTRAP if we're single-stepping */ |
| if (ptrace_cancel_bpt(current)) |
| send_sig(SIGTRAP, current, 1); |
| #endif |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| static abi_ulong *restore_sigframe_v2_vfp(CPUARMState *env, abi_ulong *regspace) |
| { |
| int i; |
| abi_ulong magic, sz; |
| uint32_t fpscr, fpexc; |
| struct target_vfp_sigframe *vfpframe; |
| vfpframe = (struct target_vfp_sigframe *)regspace; |
| |
| __get_user(magic, &vfpframe->magic); |
| __get_user(sz, &vfpframe->size); |
| if (magic != TARGET_VFP_MAGIC || sz != sizeof(*vfpframe)) { |
| return 0; |
| } |
| for (i = 0; i < 32; i++) { |
| __get_user(float64_val(env->vfp.regs[i]), &vfpframe->ufp.fpregs[i]); |
| } |
| __get_user(fpscr, &vfpframe->ufp.fpscr); |
| vfp_set_fpscr(env, fpscr); |
| __get_user(fpexc, &vfpframe->ufp_exc.fpexc); |
| /* Sanitise FPEXC: ensure VFP is enabled, FPINST2 is invalid |
| * and the exception flag is cleared |
| */ |
| fpexc |= (1 << 30); |
| fpexc &= ~((1 << 31) | (1 << 28)); |
| env->vfp.xregs[ARM_VFP_FPEXC] = fpexc; |
| __get_user(env->vfp.xregs[ARM_VFP_FPINST], &vfpframe->ufp_exc.fpinst); |
| __get_user(env->vfp.xregs[ARM_VFP_FPINST2], &vfpframe->ufp_exc.fpinst2); |
| return (abi_ulong*)(vfpframe + 1); |
| } |
| |
| static abi_ulong *restore_sigframe_v2_iwmmxt(CPUARMState *env, |
| abi_ulong *regspace) |
| { |
| int i; |
| abi_ulong magic, sz; |
| struct target_iwmmxt_sigframe *iwmmxtframe; |
| iwmmxtframe = (struct target_iwmmxt_sigframe *)regspace; |
| |
| __get_user(magic, &iwmmxtframe->magic); |
| __get_user(sz, &iwmmxtframe->size); |
| if (magic != TARGET_IWMMXT_MAGIC || sz != sizeof(*iwmmxtframe)) { |
| return 0; |
| } |
| for (i = 0; i < 16; i++) { |
| __get_user(env->iwmmxt.regs[i], &iwmmxtframe->regs[i]); |
| } |
| __get_user(env->vfp.xregs[ARM_IWMMXT_wCSSF], &iwmmxtframe->wcssf); |
| __get_user(env->vfp.xregs[ARM_IWMMXT_wCASF], &iwmmxtframe->wcssf); |
| __get_user(env->vfp.xregs[ARM_IWMMXT_wCGR0], &iwmmxtframe->wcgr0); |
| __get_user(env->vfp.xregs[ARM_IWMMXT_wCGR1], &iwmmxtframe->wcgr1); |
| __get_user(env->vfp.xregs[ARM_IWMMXT_wCGR2], &iwmmxtframe->wcgr2); |
| __get_user(env->vfp.xregs[ARM_IWMMXT_wCGR3], &iwmmxtframe->wcgr3); |
| return (abi_ulong*)(iwmmxtframe + 1); |
| } |
| |
| static int do_sigframe_return_v2(CPUARMState *env, |
| target_ulong context_addr, |
| struct target_ucontext_v2 *uc) |
| { |
| sigset_t host_set; |
| abi_ulong *regspace; |
| |
| target_to_host_sigset(&host_set, &uc->tuc_sigmask); |
| set_sigmask(&host_set); |
| |
| if (restore_sigcontext(env, &uc->tuc_mcontext)) |
| return 1; |
| |
| /* Restore coprocessor signal frame */ |
| regspace = uc->tuc_regspace; |
| if (arm_feature(env, ARM_FEATURE_VFP)) { |
| regspace = restore_sigframe_v2_vfp(env, regspace); |
| if (!regspace) { |
| return 1; |
| } |
| } |
| if (arm_feature(env, ARM_FEATURE_IWMMXT)) { |
| regspace = restore_sigframe_v2_iwmmxt(env, regspace); |
| if (!regspace) { |
| return 1; |
| } |
| } |
| |
| if (do_sigaltstack(context_addr |
| + offsetof(struct target_ucontext_v2, tuc_stack), |
| 0, get_sp_from_cpustate(env)) == -EFAULT) { |
| return 1; |
| } |
| |
| #if 0 |
| /* Send SIGTRAP if we're single-stepping */ |
| if (ptrace_cancel_bpt(current)) |
| send_sig(SIGTRAP, current, 1); |
| #endif |
| |
| return 0; |
| } |
| |
| static long do_sigreturn_v2(CPUARMState *env) |
| { |
| abi_ulong frame_addr; |
| struct sigframe_v2 *frame = NULL; |
| |
| /* |
| * Since we stacked the signal on a 64-bit boundary, |
| * then 'sp' should be word aligned here. If it's |
| * not, then the user is trying to mess with us. |
| */ |
| frame_addr = env->regs[13]; |
| trace_user_do_sigreturn(env, frame_addr); |
| if (frame_addr & 7) { |
| goto badframe; |
| } |
| |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| if (do_sigframe_return_v2(env, |
| frame_addr |
| + offsetof(struct sigframe_v2, uc), |
| &frame->uc)) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_sigreturn(CPUARMState *env) |
| { |
| if (get_osversion() >= 0x020612) { |
| return do_sigreturn_v2(env); |
| } else { |
| return do_sigreturn_v1(env); |
| } |
| } |
| |
| static long do_rt_sigreturn_v1(CPUARMState *env) |
| { |
| abi_ulong frame_addr; |
| struct rt_sigframe_v1 *frame = NULL; |
| sigset_t host_set; |
| |
| /* |
| * Since we stacked the signal on a 64-bit boundary, |
| * then 'sp' should be word aligned here. If it's |
| * not, then the user is trying to mess with us. |
| */ |
| frame_addr = env->regs[13]; |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (frame_addr & 7) { |
| goto badframe; |
| } |
| |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| target_to_host_sigset(&host_set, &frame->uc.tuc_sigmask); |
| set_sigmask(&host_set); |
| |
| if (restore_sigcontext(env, &frame->uc.tuc_mcontext)) { |
| goto badframe; |
| } |
| |
| if (do_sigaltstack(frame_addr + offsetof(struct rt_sigframe_v1, uc.tuc_stack), 0, get_sp_from_cpustate(env)) == -EFAULT) |
| goto badframe; |
| |
| #if 0 |
| /* Send SIGTRAP if we're single-stepping */ |
| if (ptrace_cancel_bpt(current)) |
| send_sig(SIGTRAP, current, 1); |
| #endif |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| static long do_rt_sigreturn_v2(CPUARMState *env) |
| { |
| abi_ulong frame_addr; |
| struct rt_sigframe_v2 *frame = NULL; |
| |
| /* |
| * Since we stacked the signal on a 64-bit boundary, |
| * then 'sp' should be word aligned here. If it's |
| * not, then the user is trying to mess with us. |
| */ |
| frame_addr = env->regs[13]; |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (frame_addr & 7) { |
| goto badframe; |
| } |
| |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| if (do_sigframe_return_v2(env, |
| frame_addr |
| + offsetof(struct rt_sigframe_v2, uc), |
| &frame->uc)) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUARMState *env) |
| { |
| if (get_osversion() >= 0x020612) { |
| return do_rt_sigreturn_v2(env); |
| } else { |
| return do_rt_sigreturn_v1(env); |
| } |
| } |
| |
| #elif defined(TARGET_SPARC) |
| |
| #define __SUNOS_MAXWIN 31 |
| |
| /* This is what SunOS does, so shall I. */ |
| struct target_sigcontext { |
| abi_ulong sigc_onstack; /* state to restore */ |
| |
| abi_ulong sigc_mask; /* sigmask to restore */ |
| abi_ulong sigc_sp; /* stack pointer */ |
| abi_ulong sigc_pc; /* program counter */ |
| abi_ulong sigc_npc; /* next program counter */ |
| abi_ulong sigc_psr; /* for condition codes etc */ |
| abi_ulong sigc_g1; /* User uses these two registers */ |
| abi_ulong sigc_o0; /* within the trampoline code. */ |
| |
| /* Now comes information regarding the users window set |
| * at the time of the signal. |
| */ |
| abi_ulong sigc_oswins; /* outstanding windows */ |
| |
| /* stack ptrs for each regwin buf */ |
| char *sigc_spbuf[__SUNOS_MAXWIN]; |
| |
| /* Windows to restore after signal */ |
| struct { |
| abi_ulong locals[8]; |
| abi_ulong ins[8]; |
| } sigc_wbuf[__SUNOS_MAXWIN]; |
| }; |
| /* A Sparc stack frame */ |
| struct sparc_stackf { |
| abi_ulong locals[8]; |
| abi_ulong ins[8]; |
| /* It's simpler to treat fp and callers_pc as elements of ins[] |
| * since we never need to access them ourselves. |
| */ |
| char *structptr; |
| abi_ulong xargs[6]; |
| abi_ulong xxargs[1]; |
| }; |
| |
| typedef struct { |
| struct { |
| abi_ulong psr; |
| abi_ulong pc; |
| abi_ulong npc; |
| abi_ulong y; |
| abi_ulong u_regs[16]; /* globals and ins */ |
| } si_regs; |
| int si_mask; |
| } __siginfo_t; |
| |
| typedef struct { |
| abi_ulong si_float_regs[32]; |
| unsigned long si_fsr; |
| unsigned long si_fpqdepth; |
| struct { |
| unsigned long *insn_addr; |
| unsigned long insn; |
| } si_fpqueue [16]; |
| } qemu_siginfo_fpu_t; |
| |
| |
| struct target_signal_frame { |
| struct sparc_stackf ss; |
| __siginfo_t info; |
| abi_ulong fpu_save; |
| abi_ulong insns[2] __attribute__ ((aligned (8))); |
| abi_ulong extramask[TARGET_NSIG_WORDS - 1]; |
| abi_ulong extra_size; /* Should be 0 */ |
| qemu_siginfo_fpu_t fpu_state; |
| }; |
| struct target_rt_signal_frame { |
| struct sparc_stackf ss; |
| siginfo_t info; |
| abi_ulong regs[20]; |
| sigset_t mask; |
| abi_ulong fpu_save; |
| unsigned int insns[2]; |
| stack_t stack; |
| unsigned int extra_size; /* Should be 0 */ |
| qemu_siginfo_fpu_t fpu_state; |
| }; |
| |
| #define UREG_O0 16 |
| #define UREG_O6 22 |
| #define UREG_I0 0 |
| #define UREG_I1 1 |
| #define UREG_I2 2 |
| #define UREG_I3 3 |
| #define UREG_I4 4 |
| #define UREG_I5 5 |
| #define UREG_I6 6 |
| #define UREG_I7 7 |
| #define UREG_L0 8 |
| #define UREG_FP UREG_I6 |
| #define UREG_SP UREG_O6 |
| |
| static inline abi_ulong get_sigframe(struct target_sigaction *sa, |
| CPUSPARCState *env, |
| unsigned long framesize) |
| { |
| abi_ulong sp; |
| |
| sp = env->regwptr[UREG_FP]; |
| |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if (sa->sa_flags & TARGET_SA_ONSTACK) { |
| if (!on_sig_stack(sp) |
| && !((target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size) & 7)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| } |
| return sp - framesize; |
| } |
| |
| static int |
| setup___siginfo(__siginfo_t *si, CPUSPARCState *env, abi_ulong mask) |
| { |
| int err = 0, i; |
| |
| __put_user(env->psr, &si->si_regs.psr); |
| __put_user(env->pc, &si->si_regs.pc); |
| __put_user(env->npc, &si->si_regs.npc); |
| __put_user(env->y, &si->si_regs.y); |
| for (i=0; i < 8; i++) { |
| __put_user(env->gregs[i], &si->si_regs.u_regs[i]); |
| } |
| for (i=0; i < 8; i++) { |
| __put_user(env->regwptr[UREG_I0 + i], &si->si_regs.u_regs[i+8]); |
| } |
| __put_user(mask, &si->si_mask); |
| return err; |
| } |
| |
| #if 0 |
| static int |
| setup_sigcontext(struct target_sigcontext *sc, /*struct _fpstate *fpstate,*/ |
| CPUSPARCState *env, unsigned long mask) |
| { |
| int err = 0; |
| |
| __put_user(mask, &sc->sigc_mask); |
| __put_user(env->regwptr[UREG_SP], &sc->sigc_sp); |
| __put_user(env->pc, &sc->sigc_pc); |
| __put_user(env->npc, &sc->sigc_npc); |
| __put_user(env->psr, &sc->sigc_psr); |
| __put_user(env->gregs[1], &sc->sigc_g1); |
| __put_user(env->regwptr[UREG_O0], &sc->sigc_o0); |
| |
| return err; |
| } |
| #endif |
| #define NF_ALIGNEDSZ (((sizeof(struct target_signal_frame) + 7) & (~7))) |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUSPARCState *env) |
| { |
| abi_ulong sf_addr; |
| struct target_signal_frame *sf; |
| int sigframe_size, err, i; |
| |
| /* 1. Make sure everything is clean */ |
| //synchronize_user_stack(); |
| |
| sigframe_size = NF_ALIGNEDSZ; |
| sf_addr = get_sigframe(ka, env, sigframe_size); |
| trace_user_setup_frame(env, sf_addr); |
| |
| sf = lock_user(VERIFY_WRITE, sf_addr, |
| sizeof(struct target_signal_frame), 0); |
| if (!sf) { |
| goto sigsegv; |
| } |
| #if 0 |
| if (invalid_frame_pointer(sf, sigframe_size)) |
| goto sigill_and_return; |
| #endif |
| /* 2. Save the current process state */ |
| err = setup___siginfo(&sf->info, env, set->sig[0]); |
| __put_user(0, &sf->extra_size); |
| |
| //save_fpu_state(regs, &sf->fpu_state); |
| //__put_user(&sf->fpu_state, &sf->fpu_save); |
| |
| __put_user(set->sig[0], &sf->info.si_mask); |
| for (i = 0; i < TARGET_NSIG_WORDS - 1; i++) { |
| __put_user(set->sig[i + 1], &sf->extramask[i]); |
| } |
| |
| for (i = 0; i < 8; i++) { |
| __put_user(env->regwptr[i + UREG_L0], &sf->ss.locals[i]); |
| } |
| for (i = 0; i < 8; i++) { |
| __put_user(env->regwptr[i + UREG_I0], &sf->ss.ins[i]); |
| } |
| if (err) |
| goto sigsegv; |
| |
| /* 3. signal handler back-trampoline and parameters */ |
| env->regwptr[UREG_FP] = sf_addr; |
| env->regwptr[UREG_I0] = sig; |
| env->regwptr[UREG_I1] = sf_addr + |
| offsetof(struct target_signal_frame, info); |
| env->regwptr[UREG_I2] = sf_addr + |
| offsetof(struct target_signal_frame, info); |
| |
| /* 4. signal handler */ |
| env->pc = ka->_sa_handler; |
| env->npc = (env->pc + 4); |
| /* 5. return to kernel instructions */ |
| if (ka->sa_restorer) { |
| env->regwptr[UREG_I7] = ka->sa_restorer; |
| } else { |
| uint32_t val32; |
| |
| env->regwptr[UREG_I7] = sf_addr + |
| offsetof(struct target_signal_frame, insns) - 2 * 4; |
| |
| /* mov __NR_sigreturn, %g1 */ |
| val32 = 0x821020d8; |
| __put_user(val32, &sf->insns[0]); |
| |
| /* t 0x10 */ |
| val32 = 0x91d02010; |
| __put_user(val32, &sf->insns[1]); |
| if (err) |
| goto sigsegv; |
| |
| /* Flush instruction space. */ |
| // flush_sig_insns(current->mm, (unsigned long) &(sf->insns[0])); |
| // tb_flush(env); |
| } |
| unlock_user(sf, sf_addr, sizeof(struct target_signal_frame)); |
| return; |
| #if 0 |
| sigill_and_return: |
| force_sig(TARGET_SIGILL); |
| #endif |
| sigsegv: |
| unlock_user(sf, sf_addr, sizeof(struct target_signal_frame)); |
| force_sigsegv(sig); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUSPARCState *env) |
| { |
| fprintf(stderr, "setup_rt_frame: not implemented\n"); |
| } |
| |
| long do_sigreturn(CPUSPARCState *env) |
| { |
| abi_ulong sf_addr; |
| struct target_signal_frame *sf; |
| uint32_t up_psr, pc, npc; |
| target_sigset_t set; |
| sigset_t host_set; |
| int err=0, i; |
| |
| sf_addr = env->regwptr[UREG_FP]; |
| trace_user_do_sigreturn(env, sf_addr); |
| if (!lock_user_struct(VERIFY_READ, sf, sf_addr, 1)) { |
| goto segv_and_exit; |
| } |
| |
| /* 1. Make sure we are not getting garbage from the user */ |
| |
| if (sf_addr & 3) |
| goto segv_and_exit; |
| |
| __get_user(pc, &sf->info.si_regs.pc); |
| __get_user(npc, &sf->info.si_regs.npc); |
| |
| if ((pc | npc) & 3) { |
| goto segv_and_exit; |
| } |
| |
| /* 2. Restore the state */ |
| __get_user(up_psr, &sf->info.si_regs.psr); |
| |
| /* User can only change condition codes and FPU enabling in %psr. */ |
| env->psr = (up_psr & (PSR_ICC /* | PSR_EF */)) |
| | (env->psr & ~(PSR_ICC /* | PSR_EF */)); |
| |
| env->pc = pc; |
| env->npc = npc; |
| __get_user(env->y, &sf->info.si_regs.y); |
| for (i=0; i < 8; i++) { |
| __get_user(env->gregs[i], &sf->info.si_regs.u_regs[i]); |
| } |
| for (i=0; i < 8; i++) { |
| __get_user(env->regwptr[i + UREG_I0], &sf->info.si_regs.u_regs[i+8]); |
| } |
| |
| /* FIXME: implement FPU save/restore: |
| * __get_user(fpu_save, &sf->fpu_save); |
| * if (fpu_save) |
| * err |= restore_fpu_state(env, fpu_save); |
| */ |
| |
| /* This is pretty much atomic, no amount locking would prevent |
| * the races which exist anyways. |
| */ |
| __get_user(set.sig[0], &sf->info.si_mask); |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(set.sig[i], &sf->extramask[i - 1]); |
| } |
| |
| target_to_host_sigset_internal(&host_set, &set); |
| set_sigmask(&host_set); |
| |
| if (err) { |
| goto segv_and_exit; |
| } |
| unlock_user_struct(sf, sf_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| segv_and_exit: |
| unlock_user_struct(sf, sf_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUSPARCState *env) |
| { |
| trace_user_do_rt_sigreturn(env, 0); |
| fprintf(stderr, "do_rt_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| #if defined(TARGET_SPARC64) && !defined(TARGET_ABI32) |
| #define MC_TSTATE 0 |
| #define MC_PC 1 |
| #define MC_NPC 2 |
| #define MC_Y 3 |
| #define MC_G1 4 |
| #define MC_G2 5 |
| #define MC_G3 6 |
| #define MC_G4 7 |
| #define MC_G5 8 |
| #define MC_G6 9 |
| #define MC_G7 10 |
| #define MC_O0 11 |
| #define MC_O1 12 |
| #define MC_O2 13 |
| #define MC_O3 14 |
| #define MC_O4 15 |
| #define MC_O5 16 |
| #define MC_O6 17 |
| #define MC_O7 18 |
| #define MC_NGREG 19 |
| |
| typedef abi_ulong target_mc_greg_t; |
| typedef target_mc_greg_t target_mc_gregset_t[MC_NGREG]; |
| |
| struct target_mc_fq { |
| abi_ulong *mcfq_addr; |
| uint32_t mcfq_insn; |
| }; |
| |
| struct target_mc_fpu { |
| union { |
| uint32_t sregs[32]; |
| uint64_t dregs[32]; |
| //uint128_t qregs[16]; |
| } mcfpu_fregs; |
| abi_ulong mcfpu_fsr; |
| abi_ulong mcfpu_fprs; |
| abi_ulong mcfpu_gsr; |
| struct target_mc_fq *mcfpu_fq; |
| unsigned char mcfpu_qcnt; |
| unsigned char mcfpu_qentsz; |
| unsigned char mcfpu_enab; |
| }; |
| typedef struct target_mc_fpu target_mc_fpu_t; |
| |
| typedef struct { |
| target_mc_gregset_t mc_gregs; |
| target_mc_greg_t mc_fp; |
| target_mc_greg_t mc_i7; |
| target_mc_fpu_t mc_fpregs; |
| } target_mcontext_t; |
| |
| struct target_ucontext { |
| struct target_ucontext *tuc_link; |
| abi_ulong tuc_flags; |
| target_sigset_t tuc_sigmask; |
| target_mcontext_t tuc_mcontext; |
| }; |
| |
| /* A V9 register window */ |
| struct target_reg_window { |
| abi_ulong locals[8]; |
| abi_ulong ins[8]; |
| }; |
| |
| #define TARGET_STACK_BIAS 2047 |
| |
| /* {set, get}context() needed for 64-bit SparcLinux userland. */ |
| void sparc64_set_context(CPUSPARCState *env) |
| { |
| abi_ulong ucp_addr; |
| struct target_ucontext *ucp; |
| target_mc_gregset_t *grp; |
| abi_ulong pc, npc, tstate; |
| abi_ulong fp, i7, w_addr; |
| unsigned int i; |
| |
| ucp_addr = env->regwptr[UREG_I0]; |
| if (!lock_user_struct(VERIFY_READ, ucp, ucp_addr, 1)) { |
| goto do_sigsegv; |
| } |
| grp = &ucp->tuc_mcontext.mc_gregs; |
| __get_user(pc, &((*grp)[MC_PC])); |
| __get_user(npc, &((*grp)[MC_NPC])); |
| if ((pc | npc) & 3) { |
| goto do_sigsegv; |
| } |
| if (env->regwptr[UREG_I1]) { |
| target_sigset_t target_set; |
| sigset_t set; |
| |
| if (TARGET_NSIG_WORDS == 1) { |
| __get_user(target_set.sig[0], &ucp->tuc_sigmask.sig[0]); |
| } else { |
| abi_ulong *src, *dst; |
| src = ucp->tuc_sigmask.sig; |
| dst = target_set.sig; |
| for (i = 0; i < TARGET_NSIG_WORDS; i++, dst++, src++) { |
| __get_user(*dst, src); |
| } |
| } |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| } |
| env->pc = pc; |
| env->npc = npc; |
| __get_user(env->y, &((*grp)[MC_Y])); |
| __get_user(tstate, &((*grp)[MC_TSTATE])); |
| env->asi = (tstate >> 24) & 0xff; |
| cpu_put_ccr(env, tstate >> 32); |
| cpu_put_cwp64(env, tstate & 0x1f); |
| __get_user(env->gregs[1], (&(*grp)[MC_G1])); |
| __get_user(env->gregs[2], (&(*grp)[MC_G2])); |
| __get_user(env->gregs[3], (&(*grp)[MC_G3])); |
| __get_user(env->gregs[4], (&(*grp)[MC_G4])); |
| __get_user(env->gregs[5], (&(*grp)[MC_G5])); |
| __get_user(env->gregs[6], (&(*grp)[MC_G6])); |
| __get_user(env->gregs[7], (&(*grp)[MC_G7])); |
| __get_user(env->regwptr[UREG_I0], (&(*grp)[MC_O0])); |
| __get_user(env->regwptr[UREG_I1], (&(*grp)[MC_O1])); |
| __get_user(env->regwptr[UREG_I2], (&(*grp)[MC_O2])); |
| __get_user(env->regwptr[UREG_I3], (&(*grp)[MC_O3])); |
| __get_user(env->regwptr[UREG_I4], (&(*grp)[MC_O4])); |
| __get_user(env->regwptr[UREG_I5], (&(*grp)[MC_O5])); |
| __get_user(env->regwptr[UREG_I6], (&(*grp)[MC_O6])); |
| __get_user(env->regwptr[UREG_I7], (&(*grp)[MC_O7])); |
| |
| __get_user(fp, &(ucp->tuc_mcontext.mc_fp)); |
| __get_user(i7, &(ucp->tuc_mcontext.mc_i7)); |
| |
| w_addr = TARGET_STACK_BIAS+env->regwptr[UREG_I6]; |
| if (put_user(fp, w_addr + offsetof(struct target_reg_window, ins[6]), |
| abi_ulong) != 0) { |
| goto do_sigsegv; |
| } |
| if (put_user(i7, w_addr + offsetof(struct target_reg_window, ins[7]), |
| abi_ulong) != 0) { |
| goto do_sigsegv; |
| } |
| /* FIXME this does not match how the kernel handles the FPU in |
| * its sparc64_set_context implementation. In particular the FPU |
| * is only restored if fenab is non-zero in: |
| * __get_user(fenab, &(ucp->tuc_mcontext.mc_fpregs.mcfpu_enab)); |
| */ |
| __get_user(env->fprs, &(ucp->tuc_mcontext.mc_fpregs.mcfpu_fprs)); |
| { |
| uint32_t *src = ucp->tuc_mcontext.mc_fpregs.mcfpu_fregs.sregs; |
| for (i = 0; i < 64; i++, src++) { |
| if (i & 1) { |
| __get_user(env->fpr[i/2].l.lower, src); |
| } else { |
| __get_user(env->fpr[i/2].l.upper, src); |
| } |
| } |
| } |
| __get_user(env->fsr, |
| &(ucp->tuc_mcontext.mc_fpregs.mcfpu_fsr)); |
| __get_user(env->gsr, |
| &(ucp->tuc_mcontext.mc_fpregs.mcfpu_gsr)); |
| unlock_user_struct(ucp, ucp_addr, 0); |
| return; |
| do_sigsegv: |
| unlock_user_struct(ucp, ucp_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| } |
| |
| void sparc64_get_context(CPUSPARCState *env) |
| { |
| abi_ulong ucp_addr; |
| struct target_ucontext *ucp; |
| target_mc_gregset_t *grp; |
| target_mcontext_t *mcp; |
| abi_ulong fp, i7, w_addr; |
| int err; |
| unsigned int i; |
| target_sigset_t target_set; |
| sigset_t set; |
| |
| ucp_addr = env->regwptr[UREG_I0]; |
| if (!lock_user_struct(VERIFY_WRITE, ucp, ucp_addr, 0)) { |
| goto do_sigsegv; |
| } |
| |
| mcp = &ucp->tuc_mcontext; |
| grp = &mcp->mc_gregs; |
| |
| /* Skip over the trap instruction, first. */ |
| env->pc = env->npc; |
| env->npc += 4; |
| |
| /* If we're only reading the signal mask then do_sigprocmask() |
| * is guaranteed not to fail, which is important because we don't |
| * have any way to signal a failure or restart this operation since |
| * this is not a normal syscall. |
| */ |
| err = do_sigprocmask(0, NULL, &set); |
| assert(err == 0); |
| host_to_target_sigset_internal(&target_set, &set); |
| if (TARGET_NSIG_WORDS == 1) { |
| __put_user(target_set.sig[0], |
| (abi_ulong *)&ucp->tuc_sigmask); |
| } else { |
| abi_ulong *src, *dst; |
| src = target_set.sig; |
| dst = ucp->tuc_sigmask.sig; |
| for (i = 0; i < TARGET_NSIG_WORDS; i++, dst++, src++) { |
| __put_user(*src, dst); |
| } |
| if (err) |
| goto do_sigsegv; |
| } |
| |
| /* XXX: tstate must be saved properly */ |
| // __put_user(env->tstate, &((*grp)[MC_TSTATE])); |
| __put_user(env->pc, &((*grp)[MC_PC])); |
| __put_user(env->npc, &((*grp)[MC_NPC])); |
| __put_user(env->y, &((*grp)[MC_Y])); |
| __put_user(env->gregs[1], &((*grp)[MC_G1])); |
| __put_user(env->gregs[2], &((*grp)[MC_G2])); |
| __put_user(env->gregs[3], &((*grp)[MC_G3])); |
| __put_user(env->gregs[4], &((*grp)[MC_G4])); |
| __put_user(env->gregs[5], &((*grp)[MC_G5])); |
| __put_user(env->gregs[6], &((*grp)[MC_G6])); |
| __put_user(env->gregs[7], &((*grp)[MC_G7])); |
| __put_user(env->regwptr[UREG_I0], &((*grp)[MC_O0])); |
| __put_user(env->regwptr[UREG_I1], &((*grp)[MC_O1])); |
| __put_user(env->regwptr[UREG_I2], &((*grp)[MC_O2])); |
| __put_user(env->regwptr[UREG_I3], &((*grp)[MC_O3])); |
| __put_user(env->regwptr[UREG_I4], &((*grp)[MC_O4])); |
| __put_user(env->regwptr[UREG_I5], &((*grp)[MC_O5])); |
| __put_user(env->regwptr[UREG_I6], &((*grp)[MC_O6])); |
| __put_user(env->regwptr[UREG_I7], &((*grp)[MC_O7])); |
| |
| w_addr = TARGET_STACK_BIAS+env->regwptr[UREG_I6]; |
| fp = i7 = 0; |
| if (get_user(fp, w_addr + offsetof(struct target_reg_window, ins[6]), |
| abi_ulong) != 0) { |
| goto do_sigsegv; |
| } |
| if (get_user(i7, w_addr + offsetof(struct target_reg_window, ins[7]), |
| abi_ulong) != 0) { |
| goto do_sigsegv; |
| } |
| __put_user(fp, &(mcp->mc_fp)); |
| __put_user(i7, &(mcp->mc_i7)); |
| |
| { |
| uint32_t *dst = ucp->tuc_mcontext.mc_fpregs.mcfpu_fregs.sregs; |
| for (i = 0; i < 64; i++, dst++) { |
| if (i & 1) { |
| __put_user(env->fpr[i/2].l.lower, dst); |
| } else { |
| __put_user(env->fpr[i/2].l.upper, dst); |
| } |
| } |
| } |
| __put_user(env->fsr, &(mcp->mc_fpregs.mcfpu_fsr)); |
| __put_user(env->gsr, &(mcp->mc_fpregs.mcfpu_gsr)); |
| __put_user(env->fprs, &(mcp->mc_fpregs.mcfpu_fprs)); |
| |
| if (err) |
| goto do_sigsegv; |
| unlock_user_struct(ucp, ucp_addr, 1); |
| return; |
| do_sigsegv: |
| unlock_user_struct(ucp, ucp_addr, 1); |
| force_sig(TARGET_SIGSEGV); |
| } |
| #endif |
| #elif defined(TARGET_MIPS) || defined(TARGET_MIPS64) |
| |
| # if defined(TARGET_ABI_MIPSO32) |
| struct target_sigcontext { |
| uint32_t sc_regmask; /* Unused */ |
| uint32_t sc_status; |
| uint64_t sc_pc; |
| uint64_t sc_regs[32]; |
| uint64_t sc_fpregs[32]; |
| uint32_t sc_ownedfp; /* Unused */ |
| uint32_t sc_fpc_csr; |
| uint32_t sc_fpc_eir; /* Unused */ |
| uint32_t sc_used_math; |
| uint32_t sc_dsp; /* dsp status, was sc_ssflags */ |
| uint32_t pad0; |
| uint64_t sc_mdhi; |
| uint64_t sc_mdlo; |
| target_ulong sc_hi1; /* Was sc_cause */ |
| target_ulong sc_lo1; /* Was sc_badvaddr */ |
| target_ulong sc_hi2; /* Was sc_sigset[4] */ |
| target_ulong sc_lo2; |
| target_ulong sc_hi3; |
| target_ulong sc_lo3; |
| }; |
| # else /* N32 || N64 */ |
| struct target_sigcontext { |
| uint64_t sc_regs[32]; |
| uint64_t sc_fpregs[32]; |
| uint64_t sc_mdhi; |
| uint64_t sc_hi1; |
| uint64_t sc_hi2; |
| uint64_t sc_hi3; |
| uint64_t sc_mdlo; |
| uint64_t sc_lo1; |
| uint64_t sc_lo2; |
| uint64_t sc_lo3; |
| uint64_t sc_pc; |
| uint32_t sc_fpc_csr; |
| uint32_t sc_used_math; |
| uint32_t sc_dsp; |
| uint32_t sc_reserved; |
| }; |
| # endif /* O32 */ |
| |
| struct sigframe { |
| uint32_t sf_ass[4]; /* argument save space for o32 */ |
| uint32_t sf_code[2]; /* signal trampoline */ |
| struct target_sigcontext sf_sc; |
| target_sigset_t sf_mask; |
| }; |
| |
| struct target_ucontext { |
| target_ulong tuc_flags; |
| target_ulong tuc_link; |
| target_stack_t tuc_stack; |
| target_ulong pad0; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; |
| }; |
| |
| struct target_rt_sigframe { |
| uint32_t rs_ass[4]; /* argument save space for o32 */ |
| uint32_t rs_code[2]; /* signal trampoline */ |
| struct target_siginfo rs_info; |
| struct target_ucontext rs_uc; |
| }; |
| |
| /* Install trampoline to jump back from signal handler */ |
| static inline int install_sigtramp(unsigned int *tramp, unsigned int syscall) |
| { |
| int err = 0; |
| |
| /* |
| * Set up the return code ... |
| * |
| * li v0, __NR__foo_sigreturn |
| * syscall |
| */ |
| |
| __put_user(0x24020000 + syscall, tramp + 0); |
| __put_user(0x0000000c , tramp + 1); |
| return err; |
| } |
| |
| static inline void setup_sigcontext(CPUMIPSState *regs, |
| struct target_sigcontext *sc) |
| { |
| int i; |
| |
| __put_user(exception_resume_pc(regs), &sc->sc_pc); |
| regs->hflags &= ~MIPS_HFLAG_BMASK; |
| |
| __put_user(0, &sc->sc_regs[0]); |
| for (i = 1; i < 32; ++i) { |
| __put_user(regs->active_tc.gpr[i], &sc->sc_regs[i]); |
| } |
| |
| __put_user(regs->active_tc.HI[0], &sc->sc_mdhi); |
| __put_user(regs->active_tc.LO[0], &sc->sc_mdlo); |
| |
| /* Rather than checking for dsp existence, always copy. The storage |
| would just be garbage otherwise. */ |
| __put_user(regs->active_tc.HI[1], &sc->sc_hi1); |
| __put_user(regs->active_tc.HI[2], &sc->sc_hi2); |
| __put_user(regs->active_tc.HI[3], &sc->sc_hi3); |
| __put_user(regs->active_tc.LO[1], &sc->sc_lo1); |
| __put_user(regs->active_tc.LO[2], &sc->sc_lo2); |
| __put_user(regs->active_tc.LO[3], &sc->sc_lo3); |
| { |
| uint32_t dsp = cpu_rddsp(0x3ff, regs); |
| __put_user(dsp, &sc->sc_dsp); |
| } |
| |
| __put_user(1, &sc->sc_used_math); |
| |
| for (i = 0; i < 32; ++i) { |
| __put_user(regs->active_fpu.fpr[i].d, &sc->sc_fpregs[i]); |
| } |
| } |
| |
| static inline void |
| restore_sigcontext(CPUMIPSState *regs, struct target_sigcontext *sc) |
| { |
| int i; |
| |
| __get_user(regs->CP0_EPC, &sc->sc_pc); |
| |
| __get_user(regs->active_tc.HI[0], &sc->sc_mdhi); |
| __get_user(regs->active_tc.LO[0], &sc->sc_mdlo); |
| |
| for (i = 1; i < 32; ++i) { |
| __get_user(regs->active_tc.gpr[i], &sc->sc_regs[i]); |
| } |
| |
| __get_user(regs->active_tc.HI[1], &sc->sc_hi1); |
| __get_user(regs->active_tc.HI[2], &sc->sc_hi2); |
| __get_user(regs->active_tc.HI[3], &sc->sc_hi3); |
| __get_user(regs->active_tc.LO[1], &sc->sc_lo1); |
| __get_user(regs->active_tc.LO[2], &sc->sc_lo2); |
| __get_user(regs->active_tc.LO[3], &sc->sc_lo3); |
| { |
| uint32_t dsp; |
| __get_user(dsp, &sc->sc_dsp); |
| cpu_wrdsp(dsp, 0x3ff, regs); |
| } |
| |
| for (i = 0; i < 32; ++i) { |
| __get_user(regs->active_fpu.fpr[i].d, &sc->sc_fpregs[i]); |
| } |
| } |
| |
| /* |
| * Determine which stack to use.. |
| */ |
| static inline abi_ulong |
| get_sigframe(struct target_sigaction *ka, CPUMIPSState *regs, size_t frame_size) |
| { |
| unsigned long sp; |
| |
| /* Default to using normal stack */ |
| sp = regs->active_tc.gpr[29]; |
| |
| /* |
| * FPU emulator may have its own trampoline active just |
| * above the user stack, 16-bytes before the next lowest |
| * 16 byte boundary. Try to avoid trashing it. |
| */ |
| sp -= 32; |
| |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) && (sas_ss_flags (sp) == 0)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| return (sp - frame_size) & ~7; |
| } |
| |
| static void mips_set_hflags_isa_mode_from_pc(CPUMIPSState *env) |
| { |
| if (env->insn_flags & (ASE_MIPS16 | ASE_MICROMIPS)) { |
| env->hflags &= ~MIPS_HFLAG_M16; |
| env->hflags |= (env->active_tc.PC & 1) << MIPS_HFLAG_M16_SHIFT; |
| env->active_tc.PC &= ~(target_ulong) 1; |
| } |
| } |
| |
| # if defined(TARGET_ABI_MIPSO32) |
| /* compare linux/arch/mips/kernel/signal.c:setup_frame() */ |
| static void setup_frame(int sig, struct target_sigaction * ka, |
| target_sigset_t *set, CPUMIPSState *regs) |
| { |
| struct sigframe *frame; |
| abi_ulong frame_addr; |
| int i; |
| |
| frame_addr = get_sigframe(ka, regs, sizeof(*frame)); |
| trace_user_setup_frame(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| install_sigtramp(frame->sf_code, TARGET_NR_sigreturn); |
| |
| setup_sigcontext(regs, &frame->sf_sc); |
| |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->sf_mask.sig[i]); |
| } |
| |
| /* |
| * Arguments to signal handler: |
| * |
| * a0 = signal number |
| * a1 = 0 (should be cause) |
| * a2 = pointer to struct sigcontext |
| * |
| * $25 and PC point to the signal handler, $29 points to the |
| * struct sigframe. |
| */ |
| regs->active_tc.gpr[ 4] = sig; |
| regs->active_tc.gpr[ 5] = 0; |
| regs->active_tc.gpr[ 6] = frame_addr + offsetof(struct sigframe, sf_sc); |
| regs->active_tc.gpr[29] = frame_addr; |
| regs->active_tc.gpr[31] = frame_addr + offsetof(struct sigframe, sf_code); |
| /* The original kernel code sets CP0_EPC to the handler |
| * since it returns to userland using eret |
| * we cannot do this here, and we must set PC directly */ |
| regs->active_tc.PC = regs->active_tc.gpr[25] = ka->_sa_handler; |
| mips_set_hflags_isa_mode_from_pc(regs); |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| long do_sigreturn(CPUMIPSState *regs) |
| { |
| struct sigframe *frame; |
| abi_ulong frame_addr; |
| sigset_t blocked; |
| target_sigset_t target_set; |
| int i; |
| |
| frame_addr = regs->active_tc.gpr[29]; |
| trace_user_do_sigreturn(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) |
| goto badframe; |
| |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(target_set.sig[i], &frame->sf_mask.sig[i]); |
| } |
| |
| target_to_host_sigset_internal(&blocked, &target_set); |
| set_sigmask(&blocked); |
| |
| restore_sigcontext(regs, &frame->sf_sc); |
| |
| #if 0 |
| /* |
| * Don't let your children do this ... |
| */ |
| __asm__ __volatile__( |
| "move\t$29, %0\n\t" |
| "j\tsyscall_exit" |
| :/* no outputs */ |
| :"r" (®s)); |
| /* Unreached */ |
| #endif |
| |
| regs->active_tc.PC = regs->CP0_EPC; |
| mips_set_hflags_isa_mode_from_pc(regs); |
| /* I am not sure this is right, but it seems to work |
| * maybe a problem with nested signals ? */ |
| regs->CP0_EPC = 0; |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| # endif /* O32 */ |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUMIPSState *env) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr; |
| int i; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| install_sigtramp(frame->rs_code, TARGET_NR_rt_sigreturn); |
| |
| tswap_siginfo(&frame->rs_info, info); |
| |
| __put_user(0, &frame->rs_uc.tuc_flags); |
| __put_user(0, &frame->rs_uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, &frame->rs_uc.tuc_stack.ss_sp); |
| __put_user(target_sigaltstack_used.ss_size, &frame->rs_uc.tuc_stack.ss_size); |
| __put_user(sas_ss_flags(get_sp_from_cpustate(env)), |
| &frame->rs_uc.tuc_stack.ss_flags); |
| |
| setup_sigcontext(env, &frame->rs_uc.tuc_mcontext); |
| |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->rs_uc.tuc_sigmask.sig[i]); |
| } |
| |
| /* |
| * Arguments to signal handler: |
| * |
| * a0 = signal number |
| * a1 = pointer to siginfo_t |
| * a2 = pointer to struct ucontext |
| * |
| * $25 and PC point to the signal handler, $29 points to the |
| * struct sigframe. |
| */ |
| env->active_tc.gpr[ 4] = sig; |
| env->active_tc.gpr[ 5] = frame_addr |
| + offsetof(struct target_rt_sigframe, rs_info); |
| env->active_tc.gpr[ 6] = frame_addr |
| + offsetof(struct target_rt_sigframe, rs_uc); |
| env->active_tc.gpr[29] = frame_addr; |
| env->active_tc.gpr[31] = frame_addr |
| + offsetof(struct target_rt_sigframe, rs_code); |
| /* The original kernel code sets CP0_EPC to the handler |
| * since it returns to userland using eret |
| * we cannot do this here, and we must set PC directly */ |
| env->active_tc.PC = env->active_tc.gpr[25] = ka->_sa_handler; |
| mips_set_hflags_isa_mode_from_pc(env); |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(sig); |
| } |
| |
| long do_rt_sigreturn(CPUMIPSState *env) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr; |
| sigset_t blocked; |
| |
| frame_addr = env->active_tc.gpr[29]; |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| target_to_host_sigset(&blocked, &frame->rs_uc.tuc_sigmask); |
| set_sigmask(&blocked); |
| |
| restore_sigcontext(env, &frame->rs_uc.tuc_mcontext); |
| |
| if (do_sigaltstack(frame_addr + |
| offsetof(struct target_rt_sigframe, rs_uc.tuc_stack), |
| 0, get_sp_from_cpustate(env)) == -EFAULT) |
| goto badframe; |
| |
| env->active_tc.PC = env->CP0_EPC; |
| mips_set_hflags_isa_mode_from_pc(env); |
| /* I am not sure this is right, but it seems to work |
| * maybe a problem with nested signals ? */ |
| env->CP0_EPC = 0; |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_SH4) |
| |
| /* |
| * code and data structures from linux kernel: |
| * include/asm-sh/sigcontext.h |
| * arch/sh/kernel/signal.c |
| */ |
| |
| struct target_sigcontext { |
| target_ulong oldmask; |
| |
| /* CPU registers */ |
| target_ulong sc_gregs[16]; |
| target_ulong sc_pc; |
| target_ulong sc_pr; |
| target_ulong sc_sr; |
| target_ulong sc_gbr; |
| target_ulong sc_mach; |
| target_ulong sc_macl; |
| |
| /* FPU registers */ |
| target_ulong sc_fpregs[16]; |
| target_ulong sc_xfpregs[16]; |
| unsigned int sc_fpscr; |
| unsigned int sc_fpul; |
| unsigned int sc_ownedfp; |
| }; |
| |
| struct target_sigframe |
| { |
| struct target_sigcontext sc; |
| target_ulong extramask[TARGET_NSIG_WORDS-1]; |
| uint16_t retcode[3]; |
| }; |
| |
| |
| struct target_ucontext { |
| target_ulong tuc_flags; |
| struct target_ucontext *tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| struct target_rt_sigframe |
| { |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| uint16_t retcode[3]; |
| }; |
| |
| |
| #define MOVW(n) (0x9300|((n)-2)) /* Move mem word at PC+n to R3 */ |
| #define TRAP_NOARG 0xc310 /* Syscall w/no args (NR in R3) SH3/4 */ |
| |
| static abi_ulong get_sigframe(struct target_sigaction *ka, |
| unsigned long sp, size_t frame_size) |
| { |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) && (sas_ss_flags(sp) == 0)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| return (sp - frame_size) & -8ul; |
| } |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, |
| CPUSH4State *regs, unsigned long mask) |
| { |
| int i; |
| |
| #define COPY(x) __put_user(regs->x, &sc->sc_##x) |
| COPY(gregs[0]); COPY(gregs[1]); |
| COPY(gregs[2]); COPY(gregs[3]); |
| COPY(gregs[4]); COPY(gregs[5]); |
| COPY(gregs[6]); COPY(gregs[7]); |
| COPY(gregs[8]); COPY(gregs[9]); |
| COPY(gregs[10]); COPY(gregs[11]); |
| COPY(gregs[12]); COPY(gregs[13]); |
| COPY(gregs[14]); COPY(gregs[15]); |
| COPY(gbr); COPY(mach); |
| COPY(macl); COPY(pr); |
| COPY(sr); COPY(pc); |
| #undef COPY |
| |
| for (i=0; i<16; i++) { |
| __put_user(regs->fregs[i], &sc->sc_fpregs[i]); |
| } |
| __put_user(regs->fpscr, &sc->sc_fpscr); |
| __put_user(regs->fpul, &sc->sc_fpul); |
| |
| /* non-iBCS2 extensions.. */ |
| __put_user(mask, &sc->oldmask); |
| } |
| |
| static void restore_sigcontext(CPUSH4State *regs, struct target_sigcontext *sc) |
| { |
| int i; |
| |
| #define COPY(x) __get_user(regs->x, &sc->sc_##x) |
| COPY(gregs[0]); COPY(gregs[1]); |
| COPY(gregs[2]); COPY(gregs[3]); |
| COPY(gregs[4]); COPY(gregs[5]); |
| COPY(gregs[6]); COPY(gregs[7]); |
| COPY(gregs[8]); COPY(gregs[9]); |
| COPY(gregs[10]); COPY(gregs[11]); |
| COPY(gregs[12]); COPY(gregs[13]); |
| COPY(gregs[14]); COPY(gregs[15]); |
| COPY(gbr); COPY(mach); |
| COPY(macl); COPY(pr); |
| COPY(sr); COPY(pc); |
| #undef COPY |
| |
| for (i=0; i<16; i++) { |
| __get_user(regs->fregs[i], &sc->sc_fpregs[i]); |
| } |
| __get_user(regs->fpscr, &sc->sc_fpscr); |
| __get_user(regs->fpul, &sc->sc_fpul); |
| |
| regs->tra = -1; /* disable syscall checks */ |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUSH4State *regs) |
| { |
| struct target_sigframe *frame; |
| abi_ulong frame_addr; |
| int i; |
| |
| frame_addr = get_sigframe(ka, regs->gregs[15], sizeof(*frame)); |
| trace_user_setup_frame(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| setup_sigcontext(&frame->sc, regs, set->sig[0]); |
| |
| for (i = 0; i < TARGET_NSIG_WORDS - 1; i++) { |
| __put_user(set->sig[i + 1], &frame->extramask[i]); |
| } |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| regs->pr = (unsigned long) ka->sa_restorer; |
| } else { |
| /* Generate return code (system call to sigreturn) */ |
| abi_ulong retcode_addr = frame_addr + |
| offsetof(struct target_sigframe, retcode); |
| __put_user(MOVW(2), &frame->retcode[0]); |
| __put_user(TRAP_NOARG, &frame->retcode[1]); |
| __put_user((TARGET_NR_sigreturn), &frame->retcode[2]); |
| regs->pr = (unsigned long) retcode_addr; |
| } |
| |
| /* Set up registers for signal handler */ |
| regs->gregs[15] = frame_addr; |
| regs->gregs[4] = sig; /* Arg for signal handler */ |
| regs->gregs[5] = 0; |
| regs->gregs[6] = frame_addr += offsetof(typeof(*frame), sc); |
| regs->pc = (unsigned long) ka->_sa_handler; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(sig); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUSH4State *regs) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr; |
| int i; |
| |
| frame_addr = get_sigframe(ka, regs->gregs[15], sizeof(*frame)); |
| trace_user_setup_rt_frame(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| tswap_siginfo(&frame->info, info); |
| |
| /* Create the ucontext. */ |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, (unsigned long *)&frame->uc.tuc_link); |
| __put_user((unsigned long)target_sigaltstack_used.ss_sp, |
| &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(regs->gregs[15]), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| setup_sigcontext(&frame->uc.tuc_mcontext, |
| regs, set->sig[0]); |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| regs->pr = (unsigned long) ka->sa_restorer; |
| } else { |
| /* Generate return code (system call to sigreturn) */ |
| abi_ulong retcode_addr = frame_addr + |
| offsetof(struct target_rt_sigframe, retcode); |
| __put_user(MOVW(2), &frame->retcode[0]); |
| __put_user(TRAP_NOARG, &frame->retcode[1]); |
| __put_user((TARGET_NR_rt_sigreturn), &frame->retcode[2]); |
| regs->pr = (unsigned long) retcode_addr; |
| } |
| |
| /* Set up registers for signal handler */ |
| regs->gregs[15] = frame_addr; |
| regs->gregs[4] = sig; /* Arg for signal handler */ |
| regs->gregs[5] = frame_addr + offsetof(typeof(*frame), info); |
| regs->gregs[6] = frame_addr + offsetof(typeof(*frame), uc); |
| regs->pc = (unsigned long) ka->_sa_handler; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(sig); |
| } |
| |
| long do_sigreturn(CPUSH4State *regs) |
| { |
| struct target_sigframe *frame; |
| abi_ulong frame_addr; |
| sigset_t blocked; |
| target_sigset_t target_set; |
| int i; |
| int err = 0; |
| |
| frame_addr = regs->gregs[15]; |
| trace_user_do_sigreturn(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| __get_user(target_set.sig[0], &frame->sc.oldmask); |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(target_set.sig[i], &frame->extramask[i - 1]); |
| } |
| |
| if (err) |
| goto badframe; |
| |
| target_to_host_sigset_internal(&blocked, &target_set); |
| set_sigmask(&blocked); |
| |
| restore_sigcontext(regs, &frame->sc); |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUSH4State *regs) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr; |
| sigset_t blocked; |
| |
| frame_addr = regs->gregs[15]; |
| trace_user_do_rt_sigreturn(regs, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| target_to_host_sigset(&blocked, &frame->uc.tuc_sigmask); |
| set_sigmask(&blocked); |
| |
| restore_sigcontext(regs, &frame->uc.tuc_mcontext); |
| |
| if (do_sigaltstack(frame_addr + |
| offsetof(struct target_rt_sigframe, uc.tuc_stack), |
| 0, get_sp_from_cpustate(regs)) == -EFAULT) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| #elif defined(TARGET_MICROBLAZE) |
| |
| struct target_sigcontext { |
| struct target_pt_regs regs; /* needs to be first */ |
| uint32_t oldmask; |
| }; |
| |
| struct target_stack_t { |
| abi_ulong ss_sp; |
| int ss_flags; |
| unsigned int ss_size; |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| struct target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| uint32_t tuc_extramask[TARGET_NSIG_WORDS - 1]; |
| }; |
| |
| /* Signal frames. */ |
| struct target_signal_frame { |
| struct target_ucontext uc; |
| uint32_t extramask[TARGET_NSIG_WORDS - 1]; |
| uint32_t tramp[2]; |
| }; |
| |
| struct rt_signal_frame { |
| siginfo_t info; |
| struct ucontext uc; |
| uint32_t tramp[2]; |
| }; |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, CPUMBState *env) |
| { |
| __put_user(env->regs[0], &sc->regs.r0); |
| __put_user(env->regs[1], &sc->regs.r1); |
| __put_user(env->regs[2], &sc->regs.r2); |
| __put_user(env->regs[3], &sc->regs.r3); |
| __put_user(env->regs[4], &sc->regs.r4); |
| __put_user(env->regs[5], &sc->regs.r5); |
| __put_user(env->regs[6], &sc->regs.r6); |
| __put_user(env->regs[7], &sc->regs.r7); |
| __put_user(env->regs[8], &sc->regs.r8); |
| __put_user(env->regs[9], &sc->regs.r9); |
| __put_user(env->regs[10], &sc->regs.r10); |
| __put_user(env->regs[11], &sc->regs.r11); |
| __put_user(env->regs[12], &sc->regs.r12); |
| __put_user(env->regs[13], &sc->regs.r13); |
| __put_user(env->regs[14], &sc->regs.r14); |
| __put_user(env->regs[15], &sc->regs.r15); |
| __put_user(env->regs[16], &sc->regs.r16); |
| __put_user(env->regs[17], &sc->regs.r17); |
| __put_user(env->regs[18], &sc->regs.r18); |
| __put_user(env->regs[19], &sc->regs.r19); |
| __put_user(env->regs[20], &sc->regs.r20); |
| __put_user(env->regs[21], &sc->regs.r21); |
| __put_user(env->regs[22], &sc->regs.r22); |
| __put_user(env->regs[23], &sc->regs.r23); |
| __put_user(env->regs[24], &sc->regs.r24); |
| __put_user(env->regs[25], &sc->regs.r25); |
| __put_user(env->regs[26], &sc->regs.r26); |
| __put_user(env->regs[27], &sc->regs.r27); |
| __put_user(env->regs[28], &sc->regs.r28); |
| __put_user(env->regs[29], &sc->regs.r29); |
| __put_user(env->regs[30], &sc->regs.r30); |
| __put_user(env->regs[31], &sc->regs.r31); |
| __put_user(env->sregs[SR_PC], &sc->regs.pc); |
| } |
| |
| static void restore_sigcontext(struct target_sigcontext *sc, CPUMBState *env) |
| { |
| __get_user(env->regs[0], &sc->regs.r0); |
| __get_user(env->regs[1], &sc->regs.r1); |
| __get_user(env->regs[2], &sc->regs.r2); |
| __get_user(env->regs[3], &sc->regs.r3); |
| __get_user(env->regs[4], &sc->regs.r4); |
| __get_user(env->regs[5], &sc->regs.r5); |
| __get_user(env->regs[6], &sc->regs.r6); |
| __get_user(env->regs[7], &sc->regs.r7); |
| __get_user(env->regs[8], &sc->regs.r8); |
| __get_user(env->regs[9], &sc->regs.r9); |
| __get_user(env->regs[10], &sc->regs.r10); |
| __get_user(env->regs[11], &sc->regs.r11); |
| __get_user(env->regs[12], &sc->regs.r12); |
| __get_user(env->regs[13], &sc->regs.r13); |
| __get_user(env->regs[14], &sc->regs.r14); |
| __get_user(env->regs[15], &sc->regs.r15); |
| __get_user(env->regs[16], &sc->regs.r16); |
| __get_user(env->regs[17], &sc->regs.r17); |
| __get_user(env->regs[18], &sc->regs.r18); |
| __get_user(env->regs[19], &sc->regs.r19); |
| __get_user(env->regs[20], &sc->regs.r20); |
| __get_user(env->regs[21], &sc->regs.r21); |
| __get_user(env->regs[22], &sc->regs.r22); |
| __get_user(env->regs[23], &sc->regs.r23); |
| __get_user(env->regs[24], &sc->regs.r24); |
| __get_user(env->regs[25], &sc->regs.r25); |
| __get_user(env->regs[26], &sc->regs.r26); |
| __get_user(env->regs[27], &sc->regs.r27); |
| __get_user(env->regs[28], &sc->regs.r28); |
| __get_user(env->regs[29], &sc->regs.r29); |
| __get_user(env->regs[30], &sc->regs.r30); |
| __get_user(env->regs[31], &sc->regs.r31); |
| __get_user(env->sregs[SR_PC], &sc->regs.pc); |
| } |
| |
| static abi_ulong get_sigframe(struct target_sigaction *ka, |
| CPUMBState *env, int frame_size) |
| { |
| abi_ulong sp = env->regs[1]; |
| |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) != 0 && !on_sig_stack(sp)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| return ((sp - frame_size) & -8UL); |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUMBState *env) |
| { |
| struct target_signal_frame *frame; |
| abi_ulong frame_addr; |
| int i; |
| |
| frame_addr = get_sigframe(ka, env, sizeof *frame); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) |
| goto badframe; |
| |
| /* Save the mask. */ |
| __put_user(set->sig[0], &frame->uc.tuc_mcontext.oldmask); |
| |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->extramask[i - 1]); |
| } |
| |
| setup_sigcontext(&frame->uc.tuc_mcontext, env); |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| /* minus 8 is offset to cater for "rtsd r15,8" offset */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| env->regs[15] = ((unsigned long)ka->sa_restorer)-8; |
| } else { |
| uint32_t t; |
| /* Note, these encodings are _big endian_! */ |
| /* addi r12, r0, __NR_sigreturn */ |
| t = 0x31800000UL | TARGET_NR_sigreturn; |
| __put_user(t, frame->tramp + 0); |
| /* brki r14, 0x8 */ |
| t = 0xb9cc0008UL; |
| __put_user(t, frame->tramp + 1); |
| |
| /* Return from sighandler will jump to the tramp. |
| Negative 8 offset because return is rtsd r15, 8 */ |
| env->regs[15] = frame_addr + offsetof(struct target_signal_frame, tramp) |
| - 8; |
| } |
| |
| /* Set up registers for signal handler */ |
| env->regs[1] = frame_addr; |
| /* Signal handler args: */ |
| env->regs[5] = sig; /* Arg 0: signum */ |
| env->regs[6] = 0; |
| /* arg 1: sigcontext */ |
| env->regs[7] = frame_addr += offsetof(typeof(*frame), uc); |
| |
| /* Offset of 4 to handle microblaze rtid r14, 0 */ |
| env->sregs[SR_PC] = (unsigned long)ka->_sa_handler; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| badframe: |
| force_sigsegv(sig); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUMBState *env) |
| { |
| fprintf(stderr, "Microblaze setup_rt_frame: not implemented\n"); |
| } |
| |
| long do_sigreturn(CPUMBState *env) |
| { |
| struct target_signal_frame *frame; |
| abi_ulong frame_addr; |
| target_sigset_t target_set; |
| sigset_t set; |
| int i; |
| |
| frame_addr = env->regs[R_SP]; |
| trace_user_do_sigreturn(env, frame_addr); |
| /* Make sure the guest isn't playing games. */ |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 1)) |
| goto badframe; |
| |
| /* Restore blocked signals */ |
| __get_user(target_set.sig[0], &frame->uc.tuc_mcontext.oldmask); |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(target_set.sig[i], &frame->extramask[i - 1]); |
| } |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| |
| restore_sigcontext(&frame->uc.tuc_mcontext, env); |
| /* We got here through a sigreturn syscall, our path back is via an |
| rtb insn so setup r14 for that. */ |
| env->regs[14] = env->sregs[SR_PC]; |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUMBState *env) |
| { |
| trace_user_do_rt_sigreturn(env, 0); |
| fprintf(stderr, "Microblaze do_rt_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| #elif defined(TARGET_CRIS) |
| |
| struct target_sigcontext { |
| struct target_pt_regs regs; /* needs to be first */ |
| uint32_t oldmask; |
| uint32_t usp; /* usp before stacking this gunk on it */ |
| }; |
| |
| /* Signal frames. */ |
| struct target_signal_frame { |
| struct target_sigcontext sc; |
| uint32_t extramask[TARGET_NSIG_WORDS - 1]; |
| uint16_t retcode[4]; /* Trampoline code. */ |
| }; |
| |
| struct rt_signal_frame { |
| siginfo_t *pinfo; |
| void *puc; |
| siginfo_t info; |
| struct ucontext uc; |
| uint16_t retcode[4]; /* Trampoline code. */ |
| }; |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, CPUCRISState *env) |
| { |
| __put_user(env->regs[0], &sc->regs.r0); |
| __put_user(env->regs[1], &sc->regs.r1); |
| __put_user(env->regs[2], &sc->regs.r2); |
| __put_user(env->regs[3], &sc->regs.r3); |
| __put_user(env->regs[4], &sc->regs.r4); |
| __put_user(env->regs[5], &sc->regs.r5); |
| __put_user(env->regs[6], &sc->regs.r6); |
| __put_user(env->regs[7], &sc->regs.r7); |
| __put_user(env->regs[8], &sc->regs.r8); |
| __put_user(env->regs[9], &sc->regs.r9); |
| __put_user(env->regs[10], &sc->regs.r10); |
| __put_user(env->regs[11], &sc->regs.r11); |
| __put_user(env->regs[12], &sc->regs.r12); |
| __put_user(env->regs[13], &sc->regs.r13); |
| __put_user(env->regs[14], &sc->usp); |
| __put_user(env->regs[15], &sc->regs.acr); |
| __put_user(env->pregs[PR_MOF], &sc->regs.mof); |
| __put_user(env->pregs[PR_SRP], &sc->regs.srp); |
| __put_user(env->pc, &sc->regs.erp); |
| } |
| |
| static void restore_sigcontext(struct target_sigcontext *sc, CPUCRISState *env) |
| { |
| __get_user(env->regs[0], &sc->regs.r0); |
| __get_user(env->regs[1], &sc->regs.r1); |
| __get_user(env->regs[2], &sc->regs.r2); |
| __get_user(env->regs[3], &sc->regs.r3); |
| __get_user(env->regs[4], &sc->regs.r4); |
| __get_user(env->regs[5], &sc->regs.r5); |
| __get_user(env->regs[6], &sc->regs.r6); |
| __get_user(env->regs[7], &sc->regs.r7); |
| __get_user(env->regs[8], &sc->regs.r8); |
| __get_user(env->regs[9], &sc->regs.r9); |
| __get_user(env->regs[10], &sc->regs.r10); |
| __get_user(env->regs[11], &sc->regs.r11); |
| __get_user(env->regs[12], &sc->regs.r12); |
| __get_user(env->regs[13], &sc->regs.r13); |
| __get_user(env->regs[14], &sc->usp); |
| __get_user(env->regs[15], &sc->regs.acr); |
| __get_user(env->pregs[PR_MOF], &sc->regs.mof); |
| __get_user(env->pregs[PR_SRP], &sc->regs.srp); |
| __get_user(env->pc, &sc->regs.erp); |
| } |
| |
| static abi_ulong get_sigframe(CPUCRISState *env, int framesize) |
| { |
| abi_ulong sp; |
| /* Align the stack downwards to 4. */ |
| sp = (env->regs[R_SP] & ~3); |
| return sp - framesize; |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUCRISState *env) |
| { |
| struct target_signal_frame *frame; |
| abi_ulong frame_addr; |
| int i; |
| |
| frame_addr = get_sigframe(env, sizeof *frame); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) |
| goto badframe; |
| |
| /* |
| * The CRIS signal return trampoline. A real linux/CRIS kernel doesn't |
| * use this trampoline anymore but it sets it up for GDB. |
| * In QEMU, using the trampoline simplifies things a bit so we use it. |
| * |
| * This is movu.w __NR_sigreturn, r9; break 13; |
| */ |
| __put_user(0x9c5f, frame->retcode+0); |
| __put_user(TARGET_NR_sigreturn, |
| frame->retcode + 1); |
| __put_user(0xe93d, frame->retcode + 2); |
| |
| /* Save the mask. */ |
| __put_user(set->sig[0], &frame->sc.oldmask); |
| |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->extramask[i - 1]); |
| } |
| |
| setup_sigcontext(&frame->sc, env); |
| |
| /* Move the stack and setup the arguments for the handler. */ |
| env->regs[R_SP] = frame_addr; |
| env->regs[10] = sig; |
| env->pc = (unsigned long) ka->_sa_handler; |
| /* Link SRP so the guest returns through the trampoline. */ |
| env->pregs[PR_SRP] = frame_addr + offsetof(typeof(*frame), retcode); |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| badframe: |
| force_sigsegv(sig); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUCRISState *env) |
| { |
| fprintf(stderr, "CRIS setup_rt_frame: not implemented\n"); |
| } |
| |
| long do_sigreturn(CPUCRISState *env) |
| { |
| struct target_signal_frame *frame; |
| abi_ulong frame_addr; |
| target_sigset_t target_set; |
| sigset_t set; |
| int i; |
| |
| frame_addr = env->regs[R_SP]; |
| trace_user_do_sigreturn(env, frame_addr); |
| /* Make sure the guest isn't playing games. */ |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| /* Restore blocked signals */ |
| __get_user(target_set.sig[0], &frame->sc.oldmask); |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(target_set.sig[i], &frame->extramask[i - 1]); |
| } |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| |
| restore_sigcontext(&frame->sc, env); |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUCRISState *env) |
| { |
| trace_user_do_rt_sigreturn(env, 0); |
| fprintf(stderr, "CRIS do_rt_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| #elif defined(TARGET_NIOS2) |
| |
| #define MCONTEXT_VERSION 2 |
| |
| struct target_sigcontext { |
| int version; |
| unsigned long gregs[32]; |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| struct target_rt_sigframe { |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| }; |
| |
| static unsigned long sigsp(unsigned long sp, struct target_sigaction *ka) |
| { |
| if (unlikely((ka->sa_flags & SA_ONSTACK)) && !sas_ss_flags(sp)) { |
| #ifdef CONFIG_STACK_GROWSUP |
| return target_sigaltstack_used.ss_sp; |
| #else |
| return target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| #endif |
| } |
| return sp; |
| } |
| |
| static int rt_setup_ucontext(struct target_ucontext *uc, CPUNios2State *env) |
| { |
| unsigned long *gregs = uc->tuc_mcontext.gregs; |
| |
| __put_user(MCONTEXT_VERSION, &uc->tuc_mcontext.version); |
| __put_user(env->regs[1], &gregs[0]); |
| __put_user(env->regs[2], &gregs[1]); |
| __put_user(env->regs[3], &gregs[2]); |
| __put_user(env->regs[4], &gregs[3]); |
| __put_user(env->regs[5], &gregs[4]); |
| __put_user(env->regs[6], &gregs[5]); |
| __put_user(env->regs[7], &gregs[6]); |
| __put_user(env->regs[8], &gregs[7]); |
| __put_user(env->regs[9], &gregs[8]); |
| __put_user(env->regs[10], &gregs[9]); |
| __put_user(env->regs[11], &gregs[10]); |
| __put_user(env->regs[12], &gregs[11]); |
| __put_user(env->regs[13], &gregs[12]); |
| __put_user(env->regs[14], &gregs[13]); |
| __put_user(env->regs[15], &gregs[14]); |
| __put_user(env->regs[16], &gregs[15]); |
| __put_user(env->regs[17], &gregs[16]); |
| __put_user(env->regs[18], &gregs[17]); |
| __put_user(env->regs[19], &gregs[18]); |
| __put_user(env->regs[20], &gregs[19]); |
| __put_user(env->regs[21], &gregs[20]); |
| __put_user(env->regs[22], &gregs[21]); |
| __put_user(env->regs[23], &gregs[22]); |
| __put_user(env->regs[R_RA], &gregs[23]); |
| __put_user(env->regs[R_FP], &gregs[24]); |
| __put_user(env->regs[R_GP], &gregs[25]); |
| __put_user(env->regs[R_EA], &gregs[27]); |
| __put_user(env->regs[R_SP], &gregs[28]); |
| |
| return 0; |
| } |
| |
| static int rt_restore_ucontext(CPUNios2State *env, struct target_ucontext *uc, |
| int *pr2) |
| { |
| int temp; |
| abi_ulong off, frame_addr = env->regs[R_SP]; |
| unsigned long *gregs = uc->tuc_mcontext.gregs; |
| int err; |
| |
| /* Always make any pending restarted system calls return -EINTR */ |
| /* current->restart_block.fn = do_no_restart_syscall; */ |
| |
| __get_user(temp, &uc->tuc_mcontext.version); |
| if (temp != MCONTEXT_VERSION) { |
| return 1; |
| } |
| |
| /* restore passed registers */ |
| __get_user(env->regs[1], &gregs[0]); |
| __get_user(env->regs[2], &gregs[1]); |
| __get_user(env->regs[3], &gregs[2]); |
| __get_user(env->regs[4], &gregs[3]); |
| __get_user(env->regs[5], &gregs[4]); |
| __get_user(env->regs[6], &gregs[5]); |
| __get_user(env->regs[7], &gregs[6]); |
| __get_user(env->regs[8], &gregs[7]); |
| __get_user(env->regs[9], &gregs[8]); |
| __get_user(env->regs[10], &gregs[9]); |
| __get_user(env->regs[11], &gregs[10]); |
| __get_user(env->regs[12], &gregs[11]); |
| __get_user(env->regs[13], &gregs[12]); |
| __get_user(env->regs[14], &gregs[13]); |
| __get_user(env->regs[15], &gregs[14]); |
| __get_user(env->regs[16], &gregs[15]); |
| __get_user(env->regs[17], &gregs[16]); |
| __get_user(env->regs[18], &gregs[17]); |
| __get_user(env->regs[19], &gregs[18]); |
| __get_user(env->regs[20], &gregs[19]); |
| __get_user(env->regs[21], &gregs[20]); |
| __get_user(env->regs[22], &gregs[21]); |
| __get_user(env->regs[23], &gregs[22]); |
| /* gregs[23] is handled below */ |
| /* Verify, should this be settable */ |
| __get_user(env->regs[R_FP], &gregs[24]); |
| /* Verify, should this be settable */ |
| __get_user(env->regs[R_GP], &gregs[25]); |
| /* Not really necessary no user settable bits */ |
| __get_user(temp, &gregs[26]); |
| __get_user(env->regs[R_EA], &gregs[27]); |
| |
| __get_user(env->regs[R_RA], &gregs[23]); |
| __get_user(env->regs[R_SP], &gregs[28]); |
| |
| off = offsetof(struct target_rt_sigframe, uc.tuc_stack); |
| err = do_sigaltstack(frame_addr + off, 0, get_sp_from_cpustate(env)); |
| if (err == -EFAULT) { |
| return 1; |
| } |
| |
| *pr2 = env->regs[2]; |
| return 0; |
| } |
| |
| static void *get_sigframe(struct target_sigaction *ka, CPUNios2State *env, |
| size_t frame_size) |
| { |
| unsigned long usp; |
| |
| /* Default to using normal stack. */ |
| usp = env->regs[R_SP]; |
| |
| /* This is the X/Open sanctioned signal stack switching. */ |
| usp = sigsp(usp, ka); |
| |
| /* Verify, is it 32 or 64 bit aligned */ |
| return (void *)((usp - frame_size) & -8UL); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, |
| CPUNios2State *env) |
| { |
| struct target_rt_sigframe *frame; |
| int i, err = 0; |
| |
| frame = get_sigframe(ka, env, sizeof(*frame)); |
| |
| if (ka->sa_flags & SA_SIGINFO) { |
| tswap_siginfo(&frame->info, info); |
| } |
| |
| /* Create the ucontext. */ |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->regs[R_SP]), &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, &frame->uc.tuc_stack.ss_size); |
| err |= rt_setup_ucontext(&frame->uc, env); |
| for (i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user((abi_ulong)set->sig[i], |
| (abi_ulong *)&frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| if (err) { |
| goto give_sigsegv; |
| } |
| |
| /* Set up to return from userspace; jump to fixed address sigreturn |
| trampoline on kuser page. */ |
| env->regs[R_RA] = (unsigned long) (0x1044); |
| |
| /* Set up registers for signal handler */ |
| env->regs[R_SP] = (unsigned long) frame; |
| env->regs[4] = (unsigned long) sig; |
| env->regs[5] = (unsigned long) &frame->info; |
| env->regs[6] = (unsigned long) &frame->uc; |
| env->regs[R_EA] = (unsigned long) ka->_sa_handler; |
| return; |
| |
| give_sigsegv: |
| if (sig == TARGET_SIGSEGV) { |
| ka->_sa_handler = TARGET_SIG_DFL; |
| } |
| force_sigsegv(sig); |
| return; |
| } |
| |
| long do_sigreturn(CPUNios2State *env) |
| { |
| trace_user_do_sigreturn(env, 0); |
| fprintf(stderr, "do_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| long do_rt_sigreturn(CPUNios2State *env) |
| { |
| /* Verify, can we follow the stack back */ |
| abi_ulong frame_addr = env->regs[R_SP]; |
| struct target_rt_sigframe *frame; |
| sigset_t set; |
| int rval; |
| |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| |
| target_to_host_sigset(&set, &frame->uc.tuc_sigmask); |
| do_sigprocmask(SIG_SETMASK, &set, NULL); |
| |
| if (rt_restore_ucontext(env, &frame->uc, &rval)) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return rval; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return 0; |
| } |
| /* TARGET_NIOS2 */ |
| |
| #elif defined(TARGET_OPENRISC) |
| |
| struct target_sigcontext { |
| struct target_pt_regs regs; |
| abi_ulong oldmask; |
| abi_ulong usp; |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| struct target_rt_sigframe { |
| abi_ulong pinfo; |
| uint64_t puc; |
| struct target_siginfo info; |
| struct target_sigcontext sc; |
| struct target_ucontext uc; |
| unsigned char retcode[16]; /* trampoline code */ |
| }; |
| |
| /* This is the asm-generic/ucontext.h version */ |
| #if 0 |
| static int restore_sigcontext(CPUOpenRISCState *regs, |
| struct target_sigcontext *sc) |
| { |
| unsigned int err = 0; |
| unsigned long old_usp; |
| |
| /* Alwys make any pending restarted system call return -EINTR */ |
| current_thread_info()->restart_block.fn = do_no_restart_syscall; |
| |
| /* restore the regs from &sc->regs (same as sc, since regs is first) |
| * (sc is already checked for VERIFY_READ since the sigframe was |
| * checked in sys_sigreturn previously) |
| */ |
| |
| if (copy_from_user(regs, &sc, sizeof(struct target_pt_regs))) { |
| goto badframe; |
| } |
| |
| /* make sure the U-flag is set so user-mode cannot fool us */ |
| |
| regs->sr &= ~SR_SM; |
| |
| /* restore the old USP as it was before we stacked the sc etc. |
| * (we cannot just pop the sigcontext since we aligned the sp and |
| * stuff after pushing it) |
| */ |
| |
| __get_user(old_usp, &sc->usp); |
| phx_signal("old_usp 0x%lx", old_usp); |
| |
| __PHX__ REALLY /* ??? */ |
| wrusp(old_usp); |
| regs->gpr[1] = old_usp; |
| |
| /* TODO: the other ports use regs->orig_XX to disable syscall checks |
| * after this completes, but we don't use that mechanism. maybe we can |
| * use it now ? |
| */ |
| |
| return err; |
| |
| badframe: |
| return 1; |
| } |
| #endif |
| |
| /* Set up a signal frame. */ |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, |
| CPUOpenRISCState *regs, |
| unsigned long mask) |
| { |
| unsigned long usp = regs->gpr[1]; |
| |
| /* copy the regs. they are first in sc so we can use sc directly */ |
| |
| /*copy_to_user(&sc, regs, sizeof(struct target_pt_regs));*/ |
| |
| /* Set the frametype to CRIS_FRAME_NORMAL for the execution of |
| the signal handler. The frametype will be restored to its previous |
| value in restore_sigcontext. */ |
| /*regs->frametype = CRIS_FRAME_NORMAL;*/ |
| |
| /* then some other stuff */ |
| __put_user(mask, &sc->oldmask); |
| __put_user(usp, &sc->usp); |
| } |
| |
| static inline unsigned long align_sigframe(unsigned long sp) |
| { |
| return sp & ~3UL; |
| } |
| |
| static inline abi_ulong get_sigframe(struct target_sigaction *ka, |
| CPUOpenRISCState *regs, |
| size_t frame_size) |
| { |
| unsigned long sp = regs->gpr[1]; |
| int onsigstack = on_sig_stack(sp); |
| |
| /* redzone */ |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) != 0 && !onsigstack) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| sp = align_sigframe(sp - frame_size); |
| |
| /* |
| * If we are on the alternate signal stack and would overflow it, don't. |
| * Return an always-bogus address instead so we will die with SIGSEGV. |
| */ |
| |
| if (onsigstack && !likely(on_sig_stack(sp))) { |
| return -1L; |
| } |
| |
| return sp; |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUOpenRISCState *env) |
| { |
| int err = 0; |
| abi_ulong frame_addr; |
| unsigned long return_ip; |
| struct target_rt_sigframe *frame; |
| abi_ulong info_addr, uc_addr; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| info_addr = frame_addr + offsetof(struct target_rt_sigframe, info); |
| __put_user(info_addr, &frame->pinfo); |
| uc_addr = frame_addr + offsetof(struct target_rt_sigframe, uc); |
| __put_user(uc_addr, &frame->puc); |
| |
| if (ka->sa_flags & SA_SIGINFO) { |
| tswap_siginfo(&frame->info, info); |
| } |
| |
| /*err |= __clear_user(&frame->uc, offsetof(struct ucontext, uc_mcontext));*/ |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, |
| &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->gpr[1]), &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| setup_sigcontext(&frame->sc, env, set->sig[0]); |
| |
| /*err |= copy_to_user(frame->uc.tuc_sigmask, set, sizeof(*set));*/ |
| |
| /* trampoline - the desired return ip is the retcode itself */ |
| return_ip = (unsigned long)&frame->retcode; |
| /* This is l.ori r11,r0,__NR_sigreturn, l.sys 1 */ |
| __put_user(0xa960, (short *)(frame->retcode + 0)); |
| __put_user(TARGET_NR_rt_sigreturn, (short *)(frame->retcode + 2)); |
| __put_user(0x20000001, (unsigned long *)(frame->retcode + 4)); |
| __put_user(0x15000000, (unsigned long *)(frame->retcode + 8)); |
| |
| if (err) { |
| goto give_sigsegv; |
| } |
| |
| /* TODO what is the current->exec_domain stuff and invmap ? */ |
| |
| /* Set up registers for signal handler */ |
| env->pc = (unsigned long)ka->_sa_handler; /* what we enter NOW */ |
| env->gpr[9] = (unsigned long)return_ip; /* what we enter LATER */ |
| env->gpr[3] = (unsigned long)sig; /* arg 1: signo */ |
| env->gpr[4] = (unsigned long)&frame->info; /* arg 2: (siginfo_t*) */ |
| env->gpr[5] = (unsigned long)&frame->uc; /* arg 3: ucontext */ |
| |
| /* actually move the usp to reflect the stacked frame */ |
| env->gpr[1] = (unsigned long)frame; |
| |
| return; |
| |
| give_sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(sig); |
| } |
| |
| long do_sigreturn(CPUOpenRISCState *env) |
| { |
| trace_user_do_sigreturn(env, 0); |
| fprintf(stderr, "do_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| long do_rt_sigreturn(CPUOpenRISCState *env) |
| { |
| trace_user_do_rt_sigreturn(env, 0); |
| fprintf(stderr, "do_rt_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| /* TARGET_OPENRISC */ |
| |
| #elif defined(TARGET_S390X) |
| |
| #define __NUM_GPRS 16 |
| #define __NUM_FPRS 16 |
| #define __NUM_ACRS 16 |
| |
| #define S390_SYSCALL_SIZE 2 |
| #define __SIGNAL_FRAMESIZE 160 /* FIXME: 31-bit mode -> 96 */ |
| |
| #define _SIGCONTEXT_NSIG 64 |
| #define _SIGCONTEXT_NSIG_BPW 64 /* FIXME: 31-bit mode -> 32 */ |
| #define _SIGCONTEXT_NSIG_WORDS (_SIGCONTEXT_NSIG / _SIGCONTEXT_NSIG_BPW) |
| #define _SIGMASK_COPY_SIZE (sizeof(unsigned long)*_SIGCONTEXT_NSIG_WORDS) |
| #define PSW_ADDR_AMODE 0x0000000000000000UL /* 0x80000000UL for 31-bit */ |
| #define S390_SYSCALL_OPCODE ((uint16_t)0x0a00) |
| |
| typedef struct { |
| target_psw_t psw; |
| target_ulong gprs[__NUM_GPRS]; |
| unsigned int acrs[__NUM_ACRS]; |
| } target_s390_regs_common; |
| |
| typedef struct { |
| unsigned int fpc; |
| double fprs[__NUM_FPRS]; |
| } target_s390_fp_regs; |
| |
| typedef struct { |
| target_s390_regs_common regs; |
| target_s390_fp_regs fpregs; |
| } target_sigregs; |
| |
| struct target_sigcontext { |
| target_ulong oldmask[_SIGCONTEXT_NSIG_WORDS]; |
| target_sigregs *sregs; |
| }; |
| |
| typedef struct { |
| uint8_t callee_used_stack[__SIGNAL_FRAMESIZE]; |
| struct target_sigcontext sc; |
| target_sigregs sregs; |
| int signo; |
| uint8_t retcode[S390_SYSCALL_SIZE]; |
| } sigframe; |
| |
| struct target_ucontext { |
| target_ulong tuc_flags; |
| struct target_ucontext *tuc_link; |
| target_stack_t tuc_stack; |
| target_sigregs tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| typedef struct { |
| uint8_t callee_used_stack[__SIGNAL_FRAMESIZE]; |
| uint8_t retcode[S390_SYSCALL_SIZE]; |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| } rt_sigframe; |
| |
| static inline abi_ulong |
| get_sigframe(struct target_sigaction *ka, CPUS390XState *env, size_t frame_size) |
| { |
| abi_ulong sp; |
| |
| /* Default to using normal stack */ |
| sp = env->regs[15]; |
| |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if (ka->sa_flags & TARGET_SA_ONSTACK) { |
| if (!sas_ss_flags(sp)) { |
| sp = target_sigaltstack_used.ss_sp + |
| target_sigaltstack_used.ss_size; |
| } |
| } |
| |
| /* This is the legacy signal stack switching. */ |
| else if (/* FIXME !user_mode(regs) */ 0 && |
| !(ka->sa_flags & TARGET_SA_RESTORER) && |
| ka->sa_restorer) { |
| sp = (abi_ulong) ka->sa_restorer; |
| } |
| |
| return (sp - frame_size) & -8ul; |
| } |
| |
| static void save_sigregs(CPUS390XState *env, target_sigregs *sregs) |
| { |
| int i; |
| //save_access_regs(current->thread.acrs); FIXME |
| |
| /* Copy a 'clean' PSW mask to the user to avoid leaking |
| information about whether PER is currently on. */ |
| __put_user(env->psw.mask, &sregs->regs.psw.mask); |
| __put_user(env->psw.addr, &sregs->regs.psw.addr); |
| for (i = 0; i < 16; i++) { |
| __put_user(env->regs[i], &sregs->regs.gprs[i]); |
| } |
| for (i = 0; i < 16; i++) { |
| __put_user(env->aregs[i], &sregs->regs.acrs[i]); |
| } |
| /* |
| * We have to store the fp registers to current->thread.fp_regs |
| * to merge them with the emulated registers. |
| */ |
| //save_fp_regs(¤t->thread.fp_regs); FIXME |
| for (i = 0; i < 16; i++) { |
| __put_user(get_freg(env, i)->ll, &sregs->fpregs.fprs[i]); |
| } |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUS390XState *env) |
| { |
| sigframe *frame; |
| abi_ulong frame_addr; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| __put_user(set->sig[0], &frame->sc.oldmask[0]); |
| |
| save_sigregs(env, &frame->sregs); |
| |
| __put_user((abi_ulong)(unsigned long)&frame->sregs, |
| (abi_ulong *)&frame->sc.sregs); |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| env->regs[14] = (unsigned long) |
| ka->sa_restorer | PSW_ADDR_AMODE; |
| } else { |
| env->regs[14] = (frame_addr + offsetof(sigframe, retcode)) |
| | PSW_ADDR_AMODE; |
| __put_user(S390_SYSCALL_OPCODE | TARGET_NR_sigreturn, |
| (uint16_t *)(frame->retcode)); |
| } |
| |
| /* Set up backchain. */ |
| __put_user(env->regs[15], (abi_ulong *) frame); |
| |
| /* Set up registers for signal handler */ |
| env->regs[15] = frame_addr; |
| env->psw.addr = (target_ulong) ka->_sa_handler | PSW_ADDR_AMODE; |
| |
| env->regs[2] = sig; //map_signal(sig); |
| env->regs[3] = frame_addr += offsetof(typeof(*frame), sc); |
| |
| /* We forgot to include these in the sigcontext. |
| To avoid breaking binary compatibility, they are passed as args. */ |
| env->regs[4] = 0; // FIXME: no clue... current->thread.trap_no; |
| env->regs[5] = 0; // FIXME: no clue... current->thread.prot_addr; |
| |
| /* Place signal number on stack to allow backtrace from handler. */ |
| __put_user(env->regs[2], &frame->signo); |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUS390XState *env) |
| { |
| int i; |
| rt_sigframe *frame; |
| abi_ulong frame_addr; |
| |
| frame_addr = get_sigframe(ka, env, sizeof *frame); |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| tswap_siginfo(&frame->info, info); |
| |
| /* Create the ucontext. */ |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user((abi_ulong)0, (abi_ulong *)&frame->uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(get_sp_from_cpustate(env)), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, &frame->uc.tuc_stack.ss_size); |
| save_sigregs(env, &frame->uc.tuc_mcontext); |
| for (i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user((abi_ulong)set->sig[i], |
| (abi_ulong *)&frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| /* Set up to return from userspace. If provided, use a stub |
| already in userspace. */ |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| env->regs[14] = (unsigned long) ka->sa_restorer | PSW_ADDR_AMODE; |
| } else { |
| env->regs[14] = (unsigned long) frame->retcode | PSW_ADDR_AMODE; |
| __put_user(S390_SYSCALL_OPCODE | TARGET_NR_rt_sigreturn, |
| (uint16_t *)(frame->retcode)); |
| } |
| |
| /* Set up backchain. */ |
| __put_user(env->regs[15], (abi_ulong *) frame); |
| |
| /* Set up registers for signal handler */ |
| env->regs[15] = frame_addr; |
| env->psw.addr = (target_ulong) ka->_sa_handler | PSW_ADDR_AMODE; |
| |
| env->regs[2] = sig; //map_signal(sig); |
| env->regs[3] = frame_addr + offsetof(typeof(*frame), info); |
| env->regs[4] = frame_addr + offsetof(typeof(*frame), uc); |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| static int |
| restore_sigregs(CPUS390XState *env, target_sigregs *sc) |
| { |
| int err = 0; |
| int i; |
| |
| for (i = 0; i < 16; i++) { |
| __get_user(env->regs[i], &sc->regs.gprs[i]); |
| } |
| |
| __get_user(env->psw.mask, &sc->regs.psw.mask); |
| trace_user_s390x_restore_sigregs(env, (unsigned long long)sc->regs.psw.addr, |
| (unsigned long long)env->psw.addr); |
| __get_user(env->psw.addr, &sc->regs.psw.addr); |
| /* FIXME: 31-bit -> | PSW_ADDR_AMODE */ |
| |
| for (i = 0; i < 16; i++) { |
| __get_user(env->aregs[i], &sc->regs.acrs[i]); |
| } |
| for (i = 0; i < 16; i++) { |
| __get_user(get_freg(env, i)->ll, &sc->fpregs.fprs[i]); |
| } |
| |
| return err; |
| } |
| |
| long do_sigreturn(CPUS390XState *env) |
| { |
| sigframe *frame; |
| abi_ulong frame_addr = env->regs[15]; |
| target_sigset_t target_set; |
| sigset_t set; |
| |
| trace_user_do_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| __get_user(target_set.sig[0], &frame->sc.oldmask[0]); |
| |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); /* ~_BLOCKABLE? */ |
| |
| if (restore_sigregs(env, &frame->sregs)) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUS390XState *env) |
| { |
| rt_sigframe *frame; |
| abi_ulong frame_addr = env->regs[15]; |
| sigset_t set; |
| |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| target_to_host_sigset(&set, &frame->uc.tuc_sigmask); |
| |
| set_sigmask(&set); /* ~_BLOCKABLE? */ |
| |
| if (restore_sigregs(env, &frame->uc.tuc_mcontext)) { |
| goto badframe; |
| } |
| |
| if (do_sigaltstack(frame_addr + offsetof(rt_sigframe, uc.tuc_stack), 0, |
| get_sp_from_cpustate(env)) == -EFAULT) { |
| goto badframe; |
| } |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_PPC) |
| |
| /* Size of dummy stack frame allocated when calling signal handler. |
| See arch/powerpc/include/asm/ptrace.h. */ |
| #if defined(TARGET_PPC64) |
| #define SIGNAL_FRAMESIZE 128 |
| #else |
| #define SIGNAL_FRAMESIZE 64 |
| #endif |
| |
| /* See arch/powerpc/include/asm/ucontext.h. Only used for 32-bit PPC; |
| on 64-bit PPC, sigcontext and mcontext are one and the same. */ |
| struct target_mcontext { |
| target_ulong mc_gregs[48]; |
| /* Includes fpscr. */ |
| uint64_t mc_fregs[33]; |
| #if defined(TARGET_PPC64) |
| /* Pointer to the vector regs */ |
| target_ulong v_regs; |
| #else |
| target_ulong mc_pad[2]; |
| #endif |
| /* We need to handle Altivec and SPE at the same time, which no |
| kernel needs to do. Fortunately, the kernel defines this bit to |
| be Altivec-register-large all the time, rather than trying to |
| twiddle it based on the specific platform. */ |
| union { |
| /* SPE vector registers. One extra for SPEFSCR. */ |
| uint32_t spe[33]; |
| /* Altivec vector registers. The packing of VSCR and VRSAVE |
| varies depending on whether we're PPC64 or not: PPC64 splits |
| them apart; PPC32 stuffs them together. |
| We also need to account for the VSX registers on PPC64 |
| */ |
| #if defined(TARGET_PPC64) |
| #define QEMU_NVRREG (34 + 16) |
| /* On ppc64, this mcontext structure is naturally *unaligned*, |
| * or rather it is aligned on a 8 bytes boundary but not on |
| * a 16 bytes one. This pad fixes it up. This is also why the |
| * vector regs are referenced by the v_regs pointer above so |
| * any amount of padding can be added here |
| */ |
| target_ulong pad; |
| #else |
| /* On ppc32, we are already aligned to 16 bytes */ |
| #define QEMU_NVRREG 33 |
| #endif |
| /* We cannot use ppc_avr_t here as we do *not* want the implied |
| * 16-bytes alignment that would result from it. This would have |
| * the effect of making the whole struct target_mcontext aligned |
| * which breaks the layout of struct target_ucontext on ppc64. |
| */ |
| uint64_t altivec[QEMU_NVRREG][2]; |
| #undef QEMU_NVRREG |
| } mc_vregs; |
| }; |
| |
| /* See arch/powerpc/include/asm/sigcontext.h. */ |
| struct target_sigcontext { |
| target_ulong _unused[4]; |
| int32_t signal; |
| #if defined(TARGET_PPC64) |
| int32_t pad0; |
| #endif |
| target_ulong handler; |
| target_ulong oldmask; |
| target_ulong regs; /* struct pt_regs __user * */ |
| #if defined(TARGET_PPC64) |
| struct target_mcontext mcontext; |
| #endif |
| }; |
| |
| /* Indices for target_mcontext.mc_gregs, below. |
| See arch/powerpc/include/asm/ptrace.h for details. */ |
| enum { |
| TARGET_PT_R0 = 0, |
| TARGET_PT_R1 = 1, |
| TARGET_PT_R2 = 2, |
| TARGET_PT_R3 = 3, |
| TARGET_PT_R4 = 4, |
| TARGET_PT_R5 = 5, |
| TARGET_PT_R6 = 6, |
| TARGET_PT_R7 = 7, |
| TARGET_PT_R8 = 8, |
| TARGET_PT_R9 = 9, |
| TARGET_PT_R10 = 10, |
| TARGET_PT_R11 = 11, |
| TARGET_PT_R12 = 12, |
| TARGET_PT_R13 = 13, |
| TARGET_PT_R14 = 14, |
| TARGET_PT_R15 = 15, |
| TARGET_PT_R16 = 16, |
| TARGET_PT_R17 = 17, |
| TARGET_PT_R18 = 18, |
| TARGET_PT_R19 = 19, |
| TARGET_PT_R20 = 20, |
| TARGET_PT_R21 = 21, |
| TARGET_PT_R22 = 22, |
| TARGET_PT_R23 = 23, |
| TARGET_PT_R24 = 24, |
| TARGET_PT_R25 = 25, |
| TARGET_PT_R26 = 26, |
| TARGET_PT_R27 = 27, |
| TARGET_PT_R28 = 28, |
| TARGET_PT_R29 = 29, |
| TARGET_PT_R30 = 30, |
| TARGET_PT_R31 = 31, |
| TARGET_PT_NIP = 32, |
| TARGET_PT_MSR = 33, |
| TARGET_PT_ORIG_R3 = 34, |
| TARGET_PT_CTR = 35, |
| TARGET_PT_LNK = 36, |
| TARGET_PT_XER = 37, |
| TARGET_PT_CCR = 38, |
| /* Yes, there are two registers with #39. One is 64-bit only. */ |
| TARGET_PT_MQ = 39, |
| TARGET_PT_SOFTE = 39, |
| TARGET_PT_TRAP = 40, |
| TARGET_PT_DAR = 41, |
| TARGET_PT_DSISR = 42, |
| TARGET_PT_RESULT = 43, |
| TARGET_PT_REGS_COUNT = 44 |
| }; |
| |
| |
| struct target_ucontext { |
| target_ulong tuc_flags; |
| target_ulong tuc_link; /* struct ucontext __user * */ |
| struct target_sigaltstack tuc_stack; |
| #if !defined(TARGET_PPC64) |
| int32_t tuc_pad[7]; |
| target_ulong tuc_regs; /* struct mcontext __user * |
| points to uc_mcontext field */ |
| #endif |
| target_sigset_t tuc_sigmask; |
| #if defined(TARGET_PPC64) |
| target_sigset_t unused[15]; /* Allow for uc_sigmask growth */ |
| struct target_sigcontext tuc_sigcontext; |
| #else |
| int32_t tuc_maskext[30]; |
| int32_t tuc_pad2[3]; |
| struct target_mcontext tuc_mcontext; |
| #endif |
| }; |
| |
| /* See arch/powerpc/kernel/signal_32.c. */ |
| struct target_sigframe { |
| struct target_sigcontext sctx; |
| struct target_mcontext mctx; |
| int32_t abigap[56]; |
| }; |
| |
| #if defined(TARGET_PPC64) |
| |
| #define TARGET_TRAMP_SIZE 6 |
| |
| struct target_rt_sigframe { |
| /* sys_rt_sigreturn requires the ucontext be the first field */ |
| struct target_ucontext uc; |
| target_ulong _unused[2]; |
| uint32_t trampoline[TARGET_TRAMP_SIZE]; |
| target_ulong pinfo; /* struct siginfo __user * */ |
| target_ulong puc; /* void __user * */ |
| struct target_siginfo info; |
| /* 64 bit ABI allows for 288 bytes below sp before decrementing it. */ |
| char abigap[288]; |
| } __attribute__((aligned(16))); |
| |
| #else |
| |
| struct target_rt_sigframe { |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| int32_t abigap[56]; |
| }; |
| |
| #endif |
| |
| #if defined(TARGET_PPC64) |
| |
| struct target_func_ptr { |
| target_ulong entry; |
| target_ulong toc; |
| }; |
| |
| #endif |
| |
| /* We use the mc_pad field for the signal return trampoline. */ |
| #define tramp mc_pad |
| |
| /* See arch/powerpc/kernel/signal.c. */ |
| static target_ulong get_sigframe(struct target_sigaction *ka, |
| CPUPPCState *env, |
| int frame_size) |
| { |
| target_ulong oldsp; |
| |
| oldsp = env->gpr[1]; |
| |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) && |
| (sas_ss_flags(oldsp) == 0)) { |
| oldsp = (target_sigaltstack_used.ss_sp |
| + target_sigaltstack_used.ss_size); |
| } |
| |
| return (oldsp - frame_size) & ~0xFUL; |
| } |
| |
| #if ((defined(TARGET_WORDS_BIGENDIAN) && defined(HOST_WORDS_BIGENDIAN)) || \ |
| (!defined(HOST_WORDS_BIGENDIAN) && !defined(TARGET_WORDS_BIGENDIAN))) |
| #define PPC_VEC_HI 0 |
| #define PPC_VEC_LO 1 |
| #else |
| #define PPC_VEC_HI 1 |
| #define PPC_VEC_LO 0 |
| #endif |
| |
| |
| static void save_user_regs(CPUPPCState *env, struct target_mcontext *frame) |
| { |
| target_ulong msr = env->msr; |
| int i; |
| target_ulong ccr = 0; |
| |
| /* In general, the kernel attempts to be intelligent about what it |
| needs to save for Altivec/FP/SPE registers. We don't care that |
| much, so we just go ahead and save everything. */ |
| |
| /* Save general registers. */ |
| for (i = 0; i < ARRAY_SIZE(env->gpr); i++) { |
| __put_user(env->gpr[i], &frame->mc_gregs[i]); |
| } |
| __put_user(env->nip, &frame->mc_gregs[TARGET_PT_NIP]); |
| __put_user(env->ctr, &frame->mc_gregs[TARGET_PT_CTR]); |
| __put_user(env->lr, &frame->mc_gregs[TARGET_PT_LNK]); |
| __put_user(env->xer, &frame->mc_gregs[TARGET_PT_XER]); |
| |
| for (i = 0; i < ARRAY_SIZE(env->crf); i++) { |
| ccr |= env->crf[i] << (32 - ((i + 1) * 4)); |
| } |
| __put_user(ccr, &frame->mc_gregs[TARGET_PT_CCR]); |
| |
| /* Save Altivec registers if necessary. */ |
| if (env->insns_flags & PPC_ALTIVEC) { |
| uint32_t *vrsave; |
| for (i = 0; i < ARRAY_SIZE(env->avr); i++) { |
| ppc_avr_t *avr = &env->avr[i]; |
| ppc_avr_t *vreg = (ppc_avr_t *)&frame->mc_vregs.altivec[i]; |
| |
| __put_user(avr->u64[PPC_VEC_HI], &vreg->u64[0]); |
| __put_user(avr->u64[PPC_VEC_LO], &vreg->u64[1]); |
| } |
| /* Set MSR_VR in the saved MSR value to indicate that |
| frame->mc_vregs contains valid data. */ |
| msr |= MSR_VR; |
| #if defined(TARGET_PPC64) |
| vrsave = (uint32_t *)&frame->mc_vregs.altivec[33]; |
| /* 64-bit needs to put a pointer to the vectors in the frame */ |
| __put_user(h2g(frame->mc_vregs.altivec), &frame->v_regs); |
| #else |
| vrsave = (uint32_t *)&frame->mc_vregs.altivec[32]; |
| #endif |
| __put_user((uint32_t)env->spr[SPR_VRSAVE], vrsave); |
| } |
| |
| /* Save VSX second halves */ |
| if (env->insns_flags2 & PPC2_VSX) { |
| uint64_t *vsregs = (uint64_t *)&frame->mc_vregs.altivec[34]; |
| for (i = 0; i < ARRAY_SIZE(env->vsr); i++) { |
| __put_user(env->vsr[i], &vsregs[i]); |
| } |
| } |
| |
| /* Save floating point registers. */ |
| if (env->insns_flags & PPC_FLOAT) { |
| for (i = 0; i < ARRAY_SIZE(env->fpr); i++) { |
| __put_user(env->fpr[i], &frame->mc_fregs[i]); |
| } |
| __put_user((uint64_t) env->fpscr, &frame->mc_fregs[32]); |
| } |
| |
| /* Save SPE registers. The kernel only saves the high half. */ |
| if (env->insns_flags & PPC_SPE) { |
| #if defined(TARGET_PPC64) |
| for (i = 0; i < ARRAY_SIZE(env->gpr); i++) { |
| __put_user(env->gpr[i] >> 32, &frame->mc_vregs.spe[i]); |
| } |
| #else |
| for (i = 0; i < ARRAY_SIZE(env->gprh); i++) { |
| __put_user(env->gprh[i], &frame->mc_vregs.spe[i]); |
| } |
| #endif |
| /* Set MSR_SPE in the saved MSR value to indicate that |
| frame->mc_vregs contains valid data. */ |
| msr |= MSR_SPE; |
| __put_user(env->spe_fscr, &frame->mc_vregs.spe[32]); |
| } |
| |
| /* Store MSR. */ |
| __put_user(msr, &frame->mc_gregs[TARGET_PT_MSR]); |
| } |
| |
| static void encode_trampoline(int sigret, uint32_t *tramp) |
| { |
| /* Set up the sigreturn trampoline: li r0,sigret; sc. */ |
| if (sigret) { |
| __put_user(0x38000000 | sigret, &tramp[0]); |
| __put_user(0x44000002, &tramp[1]); |
| } |
| } |
| |
| static void restore_user_regs(CPUPPCState *env, |
| struct target_mcontext *frame, int sig) |
| { |
| target_ulong save_r2 = 0; |
| target_ulong msr; |
| target_ulong ccr; |
| |
| int i; |
| |
| if (!sig) { |
| save_r2 = env->gpr[2]; |
| } |
| |
| /* Restore general registers. */ |
| for (i = 0; i < ARRAY_SIZE(env->gpr); i++) { |
| __get_user(env->gpr[i], &frame->mc_gregs[i]); |
| } |
| __get_user(env->nip, &frame->mc_gregs[TARGET_PT_NIP]); |
| __get_user(env->ctr, &frame->mc_gregs[TARGET_PT_CTR]); |
| __get_user(env->lr, &frame->mc_gregs[TARGET_PT_LNK]); |
| __get_user(env->xer, &frame->mc_gregs[TARGET_PT_XER]); |
| __get_user(ccr, &frame->mc_gregs[TARGET_PT_CCR]); |
| |
| for (i = 0; i < ARRAY_SIZE(env->crf); i++) { |
| env->crf[i] = (ccr >> (32 - ((i + 1) * 4))) & 0xf; |
| } |
| |
| if (!sig) { |
| env->gpr[2] = save_r2; |
| } |
| /* Restore MSR. */ |
| __get_user(msr, &frame->mc_gregs[TARGET_PT_MSR]); |
| |
| /* If doing signal return, restore the previous little-endian mode. */ |
| if (sig) |
| env->msr = (env->msr & ~(1ull << MSR_LE)) | (msr & (1ull << MSR_LE)); |
| |
| /* Restore Altivec registers if necessary. */ |
| if (env->insns_flags & PPC_ALTIVEC) { |
| ppc_avr_t *v_regs; |
| uint32_t *vrsave; |
| #if defined(TARGET_PPC64) |
| uint64_t v_addr; |
| /* 64-bit needs to recover the pointer to the vectors from the frame */ |
| __get_user(v_addr, &frame->v_regs); |
| v_regs = g2h(v_addr); |
| #else |
| v_regs = (ppc_avr_t *)frame->mc_vregs.altivec; |
| #endif |
| for (i = 0; i < ARRAY_SIZE(env->avr); i++) { |
| ppc_avr_t *avr = &env->avr[i]; |
| ppc_avr_t *vreg = &v_regs[i]; |
| |
| __get_user(avr->u64[PPC_VEC_HI], &vreg->u64[0]); |
| __get_user(avr->u64[PPC_VEC_LO], &vreg->u64[1]); |
| } |
| /* Set MSR_VEC in the saved MSR value to indicate that |
| frame->mc_vregs contains valid data. */ |
| #if defined(TARGET_PPC64) |
| vrsave = (uint32_t *)&v_regs[33]; |
| #else |
| vrsave = (uint32_t *)&v_regs[32]; |
| #endif |
| __get_user(env->spr[SPR_VRSAVE], vrsave); |
| } |
| |
| /* Restore VSX second halves */ |
| if (env->insns_flags2 & PPC2_VSX) { |
| uint64_t *vsregs = (uint64_t *)&frame->mc_vregs.altivec[34]; |
| for (i = 0; i < ARRAY_SIZE(env->vsr); i++) { |
| __get_user(env->vsr[i], &vsregs[i]); |
| } |
| } |
| |
| /* Restore floating point registers. */ |
| if (env->insns_flags & PPC_FLOAT) { |
| uint64_t fpscr; |
| for (i = 0; i < ARRAY_SIZE(env->fpr); i++) { |
| __get_user(env->fpr[i], &frame->mc_fregs[i]); |
| } |
| __get_user(fpscr, &frame->mc_fregs[32]); |
| env->fpscr = (uint32_t) fpscr; |
| } |
| |
| /* Save SPE registers. The kernel only saves the high half. */ |
| if (env->insns_flags & PPC_SPE) { |
| #if defined(TARGET_PPC64) |
| for (i = 0; i < ARRAY_SIZE(env->gpr); i++) { |
| uint32_t hi; |
| |
| __get_user(hi, &frame->mc_vregs.spe[i]); |
| env->gpr[i] = ((uint64_t)hi << 32) | ((uint32_t) env->gpr[i]); |
| } |
| #else |
| for (i = 0; i < ARRAY_SIZE(env->gprh); i++) { |
| __get_user(env->gprh[i], &frame->mc_vregs.spe[i]); |
| } |
| #endif |
| __get_user(env->spe_fscr, &frame->mc_vregs.spe[32]); |
| } |
| } |
| |
| #if !defined(TARGET_PPC64) |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUPPCState *env) |
| { |
| struct target_sigframe *frame; |
| struct target_sigcontext *sc; |
| target_ulong frame_addr, newsp; |
| int err = 0; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 1)) |
| goto sigsegv; |
| sc = &frame->sctx; |
| |
| __put_user(ka->_sa_handler, &sc->handler); |
| __put_user(set->sig[0], &sc->oldmask); |
| __put_user(set->sig[1], &sc->_unused[3]); |
| __put_user(h2g(&frame->mctx), &sc->regs); |
| __put_user(sig, &sc->signal); |
| |
| /* Save user regs. */ |
| save_user_regs(env, &frame->mctx); |
| |
| /* Construct the trampoline code on the stack. */ |
| encode_trampoline(TARGET_NR_sigreturn, (uint32_t *)&frame->mctx.tramp); |
| |
| /* The kernel checks for the presence of a VDSO here. We don't |
| emulate a vdso, so use a sigreturn system call. */ |
| env->lr = (target_ulong) h2g(frame->mctx.tramp); |
| |
| /* Turn off all fp exceptions. */ |
| env->fpscr = 0; |
| |
| /* Create a stack frame for the caller of the handler. */ |
| newsp = frame_addr - SIGNAL_FRAMESIZE; |
| err |= put_user(env->gpr[1], newsp, target_ulong); |
| |
| if (err) |
| goto sigsegv; |
| |
| /* Set up registers for signal handler. */ |
| env->gpr[1] = newsp; |
| env->gpr[3] = sig; |
| env->gpr[4] = frame_addr + offsetof(struct target_sigframe, sctx); |
| |
| env->nip = (target_ulong) ka->_sa_handler; |
| |
| /* Signal handlers are entered in big-endian mode. */ |
| env->msr &= ~(1ull << MSR_LE); |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(sig); |
| } |
| #endif /* !defined(TARGET_PPC64) */ |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUPPCState *env) |
| { |
| struct target_rt_sigframe *rt_sf; |
| uint32_t *trampptr = 0; |
| struct target_mcontext *mctx = 0; |
| target_ulong rt_sf_addr, newsp = 0; |
| int i, err = 0; |
| #if defined(TARGET_PPC64) |
| struct target_sigcontext *sc = 0; |
| struct image_info *image = ((TaskState *)thread_cpu->opaque)->info; |
| #endif |
| |
| rt_sf_addr = get_sigframe(ka, env, sizeof(*rt_sf)); |
| if (!lock_user_struct(VERIFY_WRITE, rt_sf, rt_sf_addr, 1)) |
| goto sigsegv; |
| |
| tswap_siginfo(&rt_sf->info, info); |
| |
| __put_user(0, &rt_sf->uc.tuc_flags); |
| __put_user(0, &rt_sf->uc.tuc_link); |
| __put_user((target_ulong)target_sigaltstack_used.ss_sp, |
| &rt_sf->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->gpr[1]), |
| &rt_sf->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &rt_sf->uc.tuc_stack.ss_size); |
| #if !defined(TARGET_PPC64) |
| __put_user(h2g (&rt_sf->uc.tuc_mcontext), |
| &rt_sf->uc.tuc_regs); |
| #endif |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &rt_sf->uc.tuc_sigmask.sig[i]); |
| } |
| |
| #if defined(TARGET_PPC64) |
| mctx = &rt_sf->uc.tuc_sigcontext.mcontext; |
| trampptr = &rt_sf->trampoline[0]; |
| |
| sc = &rt_sf->uc.tuc_sigcontext; |
| __put_user(h2g(mctx), &sc->regs); |
| __put_user(sig, &sc->signal); |
| #else |
| mctx = &rt_sf->uc.tuc_mcontext; |
| trampptr = (uint32_t *)&rt_sf->uc.tuc_mcontext.tramp; |
| #endif |
| |
| save_user_regs(env, mctx); |
| encode_trampoline(TARGET_NR_rt_sigreturn, trampptr); |
| |
| /* The kernel checks for the presence of a VDSO here. We don't |
| emulate a vdso, so use a sigreturn system call. */ |
| env->lr = (target_ulong) h2g(trampptr); |
| |
| /* Turn off all fp exceptions. */ |
| env->fpscr = 0; |
| |
| /* Create a stack frame for the caller of the handler. */ |
| newsp = rt_sf_addr - (SIGNAL_FRAMESIZE + 16); |
| err |= put_user(env->gpr[1], newsp, target_ulong); |
| |
| if (err) |
| goto sigsegv; |
| |
| /* Set up registers for signal handler. */ |
| env->gpr[1] = newsp; |
| env->gpr[3] = (target_ulong) sig; |
| env->gpr[4] = (target_ulong) h2g(&rt_sf->info); |
| env->gpr[5] = (target_ulong) h2g(&rt_sf->uc); |
| env->gpr[6] = (target_ulong) h2g(rt_sf); |
| |
| #if defined(TARGET_PPC64) |
| if (get_ppc64_abi(image) < 2) { |
| /* ELFv1 PPC64 function pointers are pointers to OPD entries. */ |
| struct target_func_ptr *handler = |
| (struct target_func_ptr *)g2h(ka->_sa_handler); |
| env->nip = tswapl(handler->entry); |
| env->gpr[2] = tswapl(handler->toc); |
| } else { |
| /* ELFv2 PPC64 function pointers are entry points, but R12 |
| * must also be set */ |
| env->nip = tswapl((target_ulong) ka->_sa_handler); |
| env->gpr[12] = env->nip; |
| } |
| #else |
| env->nip = (target_ulong) ka->_sa_handler; |
| #endif |
| |
| /* Signal handlers are entered in big-endian mode. */ |
| env->msr &= ~(1ull << MSR_LE); |
| |
| unlock_user_struct(rt_sf, rt_sf_addr, 1); |
| return; |
| |
| sigsegv: |
| unlock_user_struct(rt_sf, rt_sf_addr, 1); |
| force_sigsegv(sig); |
| |
| } |
| |
| #if !defined(TARGET_PPC64) |
| long do_sigreturn(CPUPPCState *env) |
| { |
| struct target_sigcontext *sc = NULL; |
| struct target_mcontext *sr = NULL; |
| target_ulong sr_addr = 0, sc_addr; |
| sigset_t blocked; |
| target_sigset_t set; |
| |
| sc_addr = env->gpr[1] + SIGNAL_FRAMESIZE; |
| if (!lock_user_struct(VERIFY_READ, sc, sc_addr, 1)) |
| goto sigsegv; |
| |
| #if defined(TARGET_PPC64) |
| set.sig[0] = sc->oldmask + ((uint64_t)(sc->_unused[3]) << 32); |
| #else |
| __get_user(set.sig[0], &sc->oldmask); |
| __get_user(set.sig[1], &sc->_unused[3]); |
| #endif |
| target_to_host_sigset_internal(&blocked, &set); |
| set_sigmask(&blocked); |
| |
| __get_user(sr_addr, &sc->regs); |
| if (!lock_user_struct(VERIFY_READ, sr, sr_addr, 1)) |
| goto sigsegv; |
| restore_user_regs(env, sr, 1); |
| |
| unlock_user_struct(sr, sr_addr, 1); |
| unlock_user_struct(sc, sc_addr, 1); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| sigsegv: |
| unlock_user_struct(sr, sr_addr, 1); |
| unlock_user_struct(sc, sc_addr, 1); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| #endif /* !defined(TARGET_PPC64) */ |
| |
| /* See arch/powerpc/kernel/signal_32.c. */ |
| static int do_setcontext(struct target_ucontext *ucp, CPUPPCState *env, int sig) |
| { |
| struct target_mcontext *mcp; |
| target_ulong mcp_addr; |
| sigset_t blocked; |
| target_sigset_t set; |
| |
| if (copy_from_user(&set, h2g(ucp) + offsetof(struct target_ucontext, tuc_sigmask), |
| sizeof (set))) |
| return 1; |
| |
| #if defined(TARGET_PPC64) |
| mcp_addr = h2g(ucp) + |
| offsetof(struct target_ucontext, tuc_sigcontext.mcontext); |
| #else |
| __get_user(mcp_addr, &ucp->tuc_regs); |
| #endif |
| |
| if (!lock_user_struct(VERIFY_READ, mcp, mcp_addr, 1)) |
| return 1; |
| |
| target_to_host_sigset_internal(&blocked, &set); |
| set_sigmask(&blocked); |
| restore_user_regs(env, mcp, sig); |
| |
| unlock_user_struct(mcp, mcp_addr, 1); |
| return 0; |
| } |
| |
| long do_rt_sigreturn(CPUPPCState *env) |
| { |
| struct target_rt_sigframe *rt_sf = NULL; |
| target_ulong rt_sf_addr; |
| |
| rt_sf_addr = env->gpr[1] + SIGNAL_FRAMESIZE + 16; |
| if (!lock_user_struct(VERIFY_READ, rt_sf, rt_sf_addr, 1)) |
| goto sigsegv; |
| |
| if (do_setcontext(&rt_sf->uc, env, 1)) |
| goto sigsegv; |
| |
| do_sigaltstack(rt_sf_addr |
| + offsetof(struct target_rt_sigframe, uc.tuc_stack), |
| 0, env->gpr[1]); |
| |
| unlock_user_struct(rt_sf, rt_sf_addr, 1); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| sigsegv: |
| unlock_user_struct(rt_sf, rt_sf_addr, 1); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_M68K) |
| |
| struct target_sigcontext { |
| abi_ulong sc_mask; |
| abi_ulong sc_usp; |
| abi_ulong sc_d0; |
| abi_ulong sc_d1; |
| abi_ulong sc_a0; |
| abi_ulong sc_a1; |
| unsigned short sc_sr; |
| abi_ulong sc_pc; |
| }; |
| |
| struct target_sigframe |
| { |
| abi_ulong pretcode; |
| int sig; |
| int code; |
| abi_ulong psc; |
| char retcode[8]; |
| abi_ulong extramask[TARGET_NSIG_WORDS-1]; |
| struct target_sigcontext sc; |
| }; |
| |
| typedef int target_greg_t; |
| #define TARGET_NGREG 18 |
| typedef target_greg_t target_gregset_t[TARGET_NGREG]; |
| |
| typedef struct target_fpregset { |
| int f_fpcntl[3]; |
| int f_fpregs[8*3]; |
| } target_fpregset_t; |
| |
| struct target_mcontext { |
| int version; |
| target_gregset_t gregs; |
| target_fpregset_t fpregs; |
| }; |
| |
| #define TARGET_MCONTEXT_VERSION 2 |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_mcontext tuc_mcontext; |
| abi_long tuc_filler[80]; |
| target_sigset_t tuc_sigmask; |
| }; |
| |
| struct target_rt_sigframe |
| { |
| abi_ulong pretcode; |
| int sig; |
| abi_ulong pinfo; |
| abi_ulong puc; |
| char retcode[8]; |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| }; |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, CPUM68KState *env, |
| abi_ulong mask) |
| { |
| __put_user(mask, &sc->sc_mask); |
| __put_user(env->aregs[7], &sc->sc_usp); |
| __put_user(env->dregs[0], &sc->sc_d0); |
| __put_user(env->dregs[1], &sc->sc_d1); |
| __put_user(env->aregs[0], &sc->sc_a0); |
| __put_user(env->aregs[1], &sc->sc_a1); |
| __put_user(env->sr, &sc->sc_sr); |
| __put_user(env->pc, &sc->sc_pc); |
| } |
| |
| static void |
| restore_sigcontext(CPUM68KState *env, struct target_sigcontext *sc) |
| { |
| int temp; |
| |
| __get_user(env->aregs[7], &sc->sc_usp); |
| __get_user(env->dregs[0], &sc->sc_d0); |
| __get_user(env->dregs[1], &sc->sc_d1); |
| __get_user(env->aregs[0], &sc->sc_a0); |
| __get_user(env->aregs[1], &sc->sc_a1); |
| __get_user(env->pc, &sc->sc_pc); |
| __get_user(temp, &sc->sc_sr); |
| env->sr = (env->sr & 0xff00) | (temp & 0xff); |
| } |
| |
| /* |
| * Determine which stack to use.. |
| */ |
| static inline abi_ulong |
| get_sigframe(struct target_sigaction *ka, CPUM68KState *regs, |
| size_t frame_size) |
| { |
| unsigned long sp; |
| |
| sp = regs->aregs[7]; |
| |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if ((ka->sa_flags & TARGET_SA_ONSTACK) && (sas_ss_flags (sp) == 0)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| return ((sp - frame_size) & -8UL); |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUM68KState *env) |
| { |
| struct target_sigframe *frame; |
| abi_ulong frame_addr; |
| abi_ulong retcode_addr; |
| abi_ulong sc_addr; |
| int i; |
| |
| frame_addr = get_sigframe(ka, env, sizeof *frame); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| __put_user(sig, &frame->sig); |
| |
| sc_addr = frame_addr + offsetof(struct target_sigframe, sc); |
| __put_user(sc_addr, &frame->psc); |
| |
| setup_sigcontext(&frame->sc, env, set->sig[0]); |
| |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->extramask[i - 1]); |
| } |
| |
| /* Set up to return from userspace. */ |
| |
| retcode_addr = frame_addr + offsetof(struct target_sigframe, retcode); |
| __put_user(retcode_addr, &frame->pretcode); |
| |
| /* moveq #,d0; trap #0 */ |
| |
| __put_user(0x70004e40 + (TARGET_NR_sigreturn << 16), |
| (uint32_t *)(frame->retcode)); |
| |
| /* Set up to return from userspace */ |
| |
| env->aregs[7] = frame_addr; |
| env->pc = ka->_sa_handler; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| static inline int target_rt_setup_ucontext(struct target_ucontext *uc, |
| CPUM68KState *env) |
| { |
| target_greg_t *gregs = uc->tuc_mcontext.gregs; |
| |
| __put_user(TARGET_MCONTEXT_VERSION, &uc->tuc_mcontext.version); |
| __put_user(env->dregs[0], &gregs[0]); |
| __put_user(env->dregs[1], &gregs[1]); |
| __put_user(env->dregs[2], &gregs[2]); |
| __put_user(env->dregs[3], &gregs[3]); |
| __put_user(env->dregs[4], &gregs[4]); |
| __put_user(env->dregs[5], &gregs[5]); |
| __put_user(env->dregs[6], &gregs[6]); |
| __put_user(env->dregs[7], &gregs[7]); |
| __put_user(env->aregs[0], &gregs[8]); |
| __put_user(env->aregs[1], &gregs[9]); |
| __put_user(env->aregs[2], &gregs[10]); |
| __put_user(env->aregs[3], &gregs[11]); |
| __put_user(env->aregs[4], &gregs[12]); |
| __put_user(env->aregs[5], &gregs[13]); |
| __put_user(env->aregs[6], &gregs[14]); |
| __put_user(env->aregs[7], &gregs[15]); |
| __put_user(env->pc, &gregs[16]); |
| __put_user(env->sr, &gregs[17]); |
| |
| return 0; |
| } |
| |
| static inline int target_rt_restore_ucontext(CPUM68KState *env, |
| struct target_ucontext *uc) |
| { |
| int temp; |
| target_greg_t *gregs = uc->tuc_mcontext.gregs; |
| |
| __get_user(temp, &uc->tuc_mcontext.version); |
| if (temp != TARGET_MCONTEXT_VERSION) |
| goto badframe; |
| |
| /* restore passed registers */ |
| __get_user(env->dregs[0], &gregs[0]); |
| __get_user(env->dregs[1], &gregs[1]); |
| __get_user(env->dregs[2], &gregs[2]); |
| __get_user(env->dregs[3], &gregs[3]); |
| __get_user(env->dregs[4], &gregs[4]); |
| __get_user(env->dregs[5], &gregs[5]); |
| __get_user(env->dregs[6], &gregs[6]); |
| __get_user(env->dregs[7], &gregs[7]); |
| __get_user(env->aregs[0], &gregs[8]); |
| __get_user(env->aregs[1], &gregs[9]); |
| __get_user(env->aregs[2], &gregs[10]); |
| __get_user(env->aregs[3], &gregs[11]); |
| __get_user(env->aregs[4], &gregs[12]); |
| __get_user(env->aregs[5], &gregs[13]); |
| __get_user(env->aregs[6], &gregs[14]); |
| __get_user(env->aregs[7], &gregs[15]); |
| __get_user(env->pc, &gregs[16]); |
| __get_user(temp, &gregs[17]); |
| env->sr = (env->sr & 0xff00) | (temp & 0xff); |
| |
| return 0; |
| |
| badframe: |
| return 1; |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUM68KState *env) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr; |
| abi_ulong retcode_addr; |
| abi_ulong info_addr; |
| abi_ulong uc_addr; |
| int err = 0; |
| int i; |
| |
| frame_addr = get_sigframe(ka, env, sizeof *frame); |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| __put_user(sig, &frame->sig); |
| |
| info_addr = frame_addr + offsetof(struct target_rt_sigframe, info); |
| __put_user(info_addr, &frame->pinfo); |
| |
| uc_addr = frame_addr + offsetof(struct target_rt_sigframe, uc); |
| __put_user(uc_addr, &frame->puc); |
| |
| tswap_siginfo(&frame->info, info); |
| |
| /* Create the ucontext */ |
| |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, |
| &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->aregs[7]), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| err |= target_rt_setup_ucontext(&frame->uc, env); |
| |
| if (err) |
| goto give_sigsegv; |
| |
| for(i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| /* Set up to return from userspace. */ |
| |
| retcode_addr = frame_addr + offsetof(struct target_sigframe, retcode); |
| __put_user(retcode_addr, &frame->pretcode); |
| |
| /* moveq #,d0; notb d0; trap #0 */ |
| |
| __put_user(0x70004600 + ((TARGET_NR_rt_sigreturn ^ 0xff) << 16), |
| (uint32_t *)(frame->retcode + 0)); |
| __put_user(0x4e40, (uint16_t *)(frame->retcode + 4)); |
| |
| if (err) |
| goto give_sigsegv; |
| |
| /* Set up to return from userspace */ |
| |
| env->aregs[7] = frame_addr; |
| env->pc = ka->_sa_handler; |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| unlock_user_struct(frame, frame_addr, 1); |
| force_sigsegv(sig); |
| } |
| |
| long do_sigreturn(CPUM68KState *env) |
| { |
| struct target_sigframe *frame; |
| abi_ulong frame_addr = env->aregs[7] - 4; |
| target_sigset_t target_set; |
| sigset_t set; |
| int i; |
| |
| trace_user_do_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) |
| goto badframe; |
| |
| /* set blocked signals */ |
| |
| __get_user(target_set.sig[0], &frame->sc.sc_mask); |
| |
| for(i = 1; i < TARGET_NSIG_WORDS; i++) { |
| __get_user(target_set.sig[i], &frame->extramask[i - 1]); |
| } |
| |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| |
| /* restore registers */ |
| |
| restore_sigcontext(env, &frame->sc); |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUM68KState *env) |
| { |
| struct target_rt_sigframe *frame; |
| abi_ulong frame_addr = env->aregs[7] - 4; |
| target_sigset_t target_set; |
| sigset_t set; |
| |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) |
| goto badframe; |
| |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| |
| /* restore registers */ |
| |
| if (target_rt_restore_ucontext(env, &frame->uc)) |
| goto badframe; |
| |
| if (do_sigaltstack(frame_addr + |
| offsetof(struct target_rt_sigframe, uc.tuc_stack), |
| 0, get_sp_from_cpustate(env)) == -EFAULT) |
| goto badframe; |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_ALPHA) |
| |
| struct target_sigcontext { |
| abi_long sc_onstack; |
| abi_long sc_mask; |
| abi_long sc_pc; |
| abi_long sc_ps; |
| abi_long sc_regs[32]; |
| abi_long sc_ownedfp; |
| abi_long sc_fpregs[32]; |
| abi_ulong sc_fpcr; |
| abi_ulong sc_fp_control; |
| abi_ulong sc_reserved1; |
| abi_ulong sc_reserved2; |
| abi_ulong sc_ssize; |
| abi_ulong sc_sbase; |
| abi_ulong sc_traparg_a0; |
| abi_ulong sc_traparg_a1; |
| abi_ulong sc_traparg_a2; |
| abi_ulong sc_fp_trap_pc; |
| abi_ulong sc_fp_trigger_sum; |
| abi_ulong sc_fp_trigger_inst; |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| abi_ulong tuc_osf_sigmask; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; |
| }; |
| |
| struct target_sigframe { |
| struct target_sigcontext sc; |
| unsigned int retcode[3]; |
| }; |
| |
| struct target_rt_sigframe { |
| target_siginfo_t info; |
| struct target_ucontext uc; |
| unsigned int retcode[3]; |
| }; |
| |
| #define INSN_MOV_R30_R16 0x47fe0410 |
| #define INSN_LDI_R0 0x201f0000 |
| #define INSN_CALLSYS 0x00000083 |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, CPUAlphaState *env, |
| abi_ulong frame_addr, target_sigset_t *set) |
| { |
| int i; |
| |
| __put_user(on_sig_stack(frame_addr), &sc->sc_onstack); |
| __put_user(set->sig[0], &sc->sc_mask); |
| __put_user(env->pc, &sc->sc_pc); |
| __put_user(8, &sc->sc_ps); |
| |
| for (i = 0; i < 31; ++i) { |
| __put_user(env->ir[i], &sc->sc_regs[i]); |
| } |
| __put_user(0, &sc->sc_regs[31]); |
| |
| for (i = 0; i < 31; ++i) { |
| __put_user(env->fir[i], &sc->sc_fpregs[i]); |
| } |
| __put_user(0, &sc->sc_fpregs[31]); |
| __put_user(cpu_alpha_load_fpcr(env), &sc->sc_fpcr); |
| |
| __put_user(0, &sc->sc_traparg_a0); /* FIXME */ |
| __put_user(0, &sc->sc_traparg_a1); /* FIXME */ |
| __put_user(0, &sc->sc_traparg_a2); /* FIXME */ |
| } |
| |
| static void restore_sigcontext(CPUAlphaState *env, |
| struct target_sigcontext *sc) |
| { |
| uint64_t fpcr; |
| int i; |
| |
| __get_user(env->pc, &sc->sc_pc); |
| |
| for (i = 0; i < 31; ++i) { |
| __get_user(env->ir[i], &sc->sc_regs[i]); |
| } |
| for (i = 0; i < 31; ++i) { |
| __get_user(env->fir[i], &sc->sc_fpregs[i]); |
| } |
| |
| __get_user(fpcr, &sc->sc_fpcr); |
| cpu_alpha_store_fpcr(env, fpcr); |
| } |
| |
| static inline abi_ulong get_sigframe(struct target_sigaction *sa, |
| CPUAlphaState *env, |
| unsigned long framesize) |
| { |
| abi_ulong sp = env->ir[IR_SP]; |
| |
| /* This is the X/Open sanctioned signal stack switching. */ |
| if ((sa->sa_flags & TARGET_SA_ONSTACK) != 0 && !sas_ss_flags(sp)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| return (sp - framesize) & -32; |
| } |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUAlphaState *env) |
| { |
| abi_ulong frame_addr, r26; |
| struct target_sigframe *frame; |
| int err = 0; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| setup_sigcontext(&frame->sc, env, frame_addr, set); |
| |
| if (ka->sa_restorer) { |
| r26 = ka->sa_restorer; |
| } else { |
| __put_user(INSN_MOV_R30_R16, &frame->retcode[0]); |
| __put_user(INSN_LDI_R0 + TARGET_NR_sigreturn, |
| &frame->retcode[1]); |
| __put_user(INSN_CALLSYS, &frame->retcode[2]); |
| /* imb() */ |
| r26 = frame_addr; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| |
| if (err) { |
| give_sigsegv: |
| force_sigsegv(sig); |
| return; |
| } |
| |
| env->ir[IR_RA] = r26; |
| env->ir[IR_PV] = env->pc = ka->_sa_handler; |
| env->ir[IR_A0] = sig; |
| env->ir[IR_A1] = 0; |
| env->ir[IR_A2] = frame_addr + offsetof(struct target_sigframe, sc); |
| env->ir[IR_SP] = frame_addr; |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUAlphaState *env) |
| { |
| abi_ulong frame_addr, r26; |
| struct target_rt_sigframe *frame; |
| int i, err = 0; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| tswap_siginfo(&frame->info, info); |
| |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| __put_user(set->sig[0], &frame->uc.tuc_osf_sigmask); |
| __put_user(target_sigaltstack_used.ss_sp, |
| &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->ir[IR_SP]), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| setup_sigcontext(&frame->uc.tuc_mcontext, env, frame_addr, set); |
| for (i = 0; i < TARGET_NSIG_WORDS; ++i) { |
| __put_user(set->sig[i], &frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| if (ka->sa_restorer) { |
| r26 = ka->sa_restorer; |
| } else { |
| __put_user(INSN_MOV_R30_R16, &frame->retcode[0]); |
| __put_user(INSN_LDI_R0 + TARGET_NR_rt_sigreturn, |
| &frame->retcode[1]); |
| __put_user(INSN_CALLSYS, &frame->retcode[2]); |
| /* imb(); */ |
| r26 = frame_addr; |
| } |
| |
| if (err) { |
| give_sigsegv: |
| force_sigsegv(sig); |
| return; |
| } |
| |
| env->ir[IR_RA] = r26; |
| env->ir[IR_PV] = env->pc = ka->_sa_handler; |
| env->ir[IR_A0] = sig; |
| env->ir[IR_A1] = frame_addr + offsetof(struct target_rt_sigframe, info); |
| env->ir[IR_A2] = frame_addr + offsetof(struct target_rt_sigframe, uc); |
| env->ir[IR_SP] = frame_addr; |
| } |
| |
| long do_sigreturn(CPUAlphaState *env) |
| { |
| struct target_sigcontext *sc; |
| abi_ulong sc_addr = env->ir[IR_A0]; |
| target_sigset_t target_set; |
| sigset_t set; |
| |
| if (!lock_user_struct(VERIFY_READ, sc, sc_addr, 1)) { |
| goto badframe; |
| } |
| |
| target_sigemptyset(&target_set); |
| __get_user(target_set.sig[0], &sc->sc_mask); |
| |
| target_to_host_sigset_internal(&set, &target_set); |
| set_sigmask(&set); |
| |
| restore_sigcontext(env, sc); |
| unlock_user_struct(sc, sc_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| long do_rt_sigreturn(CPUAlphaState *env) |
| { |
| abi_ulong frame_addr = env->ir[IR_A0]; |
| struct target_rt_sigframe *frame; |
| sigset_t set; |
| |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| target_to_host_sigset(&set, &frame->uc.tuc_sigmask); |
| set_sigmask(&set); |
| |
| restore_sigcontext(env, &frame->uc.tuc_mcontext); |
| if (do_sigaltstack(frame_addr + offsetof(struct target_rt_sigframe, |
| uc.tuc_stack), |
| 0, env->ir[IR_SP]) == -EFAULT) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_TILEGX) |
| |
| struct target_sigcontext { |
| union { |
| /* General-purpose registers. */ |
| abi_ulong gregs[56]; |
| struct { |
| abi_ulong __gregs[53]; |
| abi_ulong tp; /* Aliases gregs[TREG_TP]. */ |
| abi_ulong sp; /* Aliases gregs[TREG_SP]. */ |
| abi_ulong lr; /* Aliases gregs[TREG_LR]. */ |
| }; |
| }; |
| abi_ulong pc; /* Program counter. */ |
| abi_ulong ics; /* In Interrupt Critical Section? */ |
| abi_ulong faultnum; /* Fault number. */ |
| abi_ulong pad[5]; |
| }; |
| |
| struct target_ucontext { |
| abi_ulong tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; /* mask last for extensibility */ |
| }; |
| |
| struct target_rt_sigframe { |
| unsigned char save_area[16]; /* caller save area */ |
| struct target_siginfo info; |
| struct target_ucontext uc; |
| abi_ulong retcode[2]; |
| }; |
| |
| #define INSN_MOVELI_R10_139 0x00045fe551483000ULL /* { moveli r10, 139 } */ |
| #define INSN_SWINT1 0x286b180051485000ULL /* { swint1 } */ |
| |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, |
| CPUArchState *env, int signo) |
| { |
| int i; |
| |
| for (i = 0; i < TILEGX_R_COUNT; ++i) { |
| __put_user(env->regs[i], &sc->gregs[i]); |
| } |
| |
| __put_user(env->pc, &sc->pc); |
| __put_user(0, &sc->ics); |
| __put_user(signo, &sc->faultnum); |
| } |
| |
| static void restore_sigcontext(CPUTLGState *env, struct target_sigcontext *sc) |
| { |
| int i; |
| |
| for (i = 0; i < TILEGX_R_COUNT; ++i) { |
| __get_user(env->regs[i], &sc->gregs[i]); |
| } |
| |
| __get_user(env->pc, &sc->pc); |
| } |
| |
| static abi_ulong get_sigframe(struct target_sigaction *ka, CPUArchState *env, |
| size_t frame_size) |
| { |
| unsigned long sp = env->regs[TILEGX_R_SP]; |
| |
| if (on_sig_stack(sp) && !likely(on_sig_stack(sp - frame_size))) { |
| return -1UL; |
| } |
| |
| if ((ka->sa_flags & SA_ONSTACK) && !sas_ss_flags(sp)) { |
| sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size; |
| } |
| |
| sp -= frame_size; |
| sp &= -16UL; |
| return sp; |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUArchState *env) |
| { |
| abi_ulong frame_addr; |
| struct target_rt_sigframe *frame; |
| unsigned long restorer; |
| |
| frame_addr = get_sigframe(ka, env, sizeof(*frame)); |
| trace_user_setup_rt_frame(env, frame_addr); |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| /* Always write at least the signal number for the stack backtracer. */ |
| if (ka->sa_flags & TARGET_SA_SIGINFO) { |
| /* At sigreturn time, restore the callee-save registers too. */ |
| tswap_siginfo(&frame->info, info); |
| /* regs->flags |= PT_FLAGS_RESTORE_REGS; FIXME: we can skip it? */ |
| } else { |
| __put_user(info->si_signo, &frame->info.si_signo); |
| } |
| |
| /* Create the ucontext. */ |
| __put_user(0, &frame->uc.tuc_flags); |
| __put_user(0, &frame->uc.tuc_link); |
| __put_user(target_sigaltstack_used.ss_sp, &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(env->regs[TILEGX_R_SP]), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, &frame->uc.tuc_stack.ss_size); |
| setup_sigcontext(&frame->uc.tuc_mcontext, env, info->si_signo); |
| |
| if (ka->sa_flags & TARGET_SA_RESTORER) { |
| restorer = (unsigned long) ka->sa_restorer; |
| } else { |
| __put_user(INSN_MOVELI_R10_139, &frame->retcode[0]); |
| __put_user(INSN_SWINT1, &frame->retcode[1]); |
| restorer = frame_addr + offsetof(struct target_rt_sigframe, retcode); |
| } |
| env->pc = (unsigned long) ka->_sa_handler; |
| env->regs[TILEGX_R_SP] = (unsigned long) frame; |
| env->regs[TILEGX_R_LR] = restorer; |
| env->regs[0] = (unsigned long) sig; |
| env->regs[1] = (unsigned long) &frame->info; |
| env->regs[2] = (unsigned long) &frame->uc; |
| /* regs->flags |= PT_FLAGS_CALLER_SAVES; FIXME: we can skip it? */ |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| long do_rt_sigreturn(CPUTLGState *env) |
| { |
| abi_ulong frame_addr = env->regs[TILEGX_R_SP]; |
| struct target_rt_sigframe *frame; |
| sigset_t set; |
| |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| target_to_host_sigset(&set, &frame->uc.tuc_sigmask); |
| set_sigmask(&set); |
| |
| restore_sigcontext(env, &frame->uc.tuc_mcontext); |
| if (do_sigaltstack(frame_addr + offsetof(struct target_rt_sigframe, |
| uc.tuc_stack), |
| 0, env->regs[TILEGX_R_SP]) == -EFAULT) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| |
| badframe: |
| unlock_user_struct(frame, frame_addr, 0); |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #elif defined(TARGET_HPPA) |
| |
| struct target_sigcontext { |
| abi_ulong sc_flags; |
| abi_ulong sc_gr[32]; |
| uint64_t sc_fr[32]; |
| abi_ulong sc_iasq[2]; |
| abi_ulong sc_iaoq[2]; |
| abi_ulong sc_sar; |
| }; |
| |
| struct target_ucontext { |
| abi_uint tuc_flags; |
| abi_ulong tuc_link; |
| target_stack_t tuc_stack; |
| abi_uint pad[1]; |
| struct target_sigcontext tuc_mcontext; |
| target_sigset_t tuc_sigmask; |
| }; |
| |
| struct target_rt_sigframe { |
| abi_uint tramp[9]; |
| target_siginfo_t info; |
| struct target_ucontext uc; |
| /* hidden location of upper halves of pa2.0 64-bit gregs */ |
| }; |
| |
| static void setup_sigcontext(struct target_sigcontext *sc, CPUArchState *env) |
| { |
| int flags = 0; |
| int i; |
| |
| /* ??? if on_sig_stack, flags |= 1 (PARISC_SC_FLAG_ONSTACK). */ |
| |
| if (env->iaoq_f < TARGET_PAGE_SIZE) { |
| /* In the gateway page, executing a syscall. */ |
| flags |= 2; /* PARISC_SC_FLAG_IN_SYSCALL */ |
| __put_user(env->gr[31], &sc->sc_iaoq[0]); |
| __put_user(env->gr[31] + 4, &sc->sc_iaoq[1]); |
| } else { |
| __put_user(env->iaoq_f, &sc->sc_iaoq[0]); |
| __put_user(env->iaoq_b, &sc->sc_iaoq[1]); |
| } |
| __put_user(0, &sc->sc_iasq[0]); |
| __put_user(0, &sc->sc_iasq[1]); |
| __put_user(flags, &sc->sc_flags); |
| |
| __put_user(cpu_hppa_get_psw(env), &sc->sc_gr[0]); |
| for (i = 1; i < 32; ++i) { |
| __put_user(env->gr[i], &sc->sc_gr[i]); |
| } |
| |
| __put_user((uint64_t)env->fr0_shadow << 32, &sc->sc_fr[0]); |
| for (i = 1; i < 32; ++i) { |
| __put_user(env->fr[i], &sc->sc_fr[i]); |
| } |
| |
| __put_user(env->sar, &sc->sc_sar); |
| } |
| |
| static void restore_sigcontext(CPUArchState *env, struct target_sigcontext *sc) |
| { |
| target_ulong psw; |
| int i; |
| |
| __get_user(psw, &sc->sc_gr[0]); |
| cpu_hppa_put_psw(env, psw); |
| |
| for (i = 1; i < 32; ++i) { |
| __get_user(env->gr[i], &sc->sc_gr[i]); |
| } |
| for (i = 0; i < 32; ++i) { |
| __get_user(env->fr[i], &sc->sc_fr[i]); |
| } |
| cpu_hppa_loaded_fr0(env); |
| |
| __get_user(env->iaoq_f, &sc->sc_iaoq[0]); |
| __get_user(env->iaoq_b, &sc->sc_iaoq[1]); |
| __get_user(env->sar, &sc->sc_sar); |
| } |
| |
| /* No, this doesn't look right, but it's copied straight from the kernel. */ |
| #define PARISC_RT_SIGFRAME_SIZE32 \ |
| ((sizeof(struct target_rt_sigframe) + 48 + 64) & -64) |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUArchState *env) |
| { |
| abi_ulong frame_addr, sp, haddr; |
| struct target_rt_sigframe *frame; |
| int i; |
| |
| sp = env->gr[30]; |
| if (ka->sa_flags & TARGET_SA_ONSTACK) { |
| if (sas_ss_flags(sp) == 0) { |
| sp = (target_sigaltstack_used.ss_sp + 0x7f) & ~0x3f; |
| } |
| } |
| frame_addr = QEMU_ALIGN_UP(sp, 64); |
| sp = frame_addr + PARISC_RT_SIGFRAME_SIZE32; |
| |
| trace_user_setup_rt_frame(env, frame_addr); |
| |
| if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) { |
| goto give_sigsegv; |
| } |
| |
| tswap_siginfo(&frame->info, info); |
| frame->uc.tuc_flags = 0; |
| frame->uc.tuc_link = 0; |
| |
| __put_user(target_sigaltstack_used.ss_sp, &frame->uc.tuc_stack.ss_sp); |
| __put_user(sas_ss_flags(get_sp_from_cpustate(env)), |
| &frame->uc.tuc_stack.ss_flags); |
| __put_user(target_sigaltstack_used.ss_size, |
| &frame->uc.tuc_stack.ss_size); |
| |
| for (i = 0; i < TARGET_NSIG_WORDS; i++) { |
| __put_user(set->sig[i], &frame->uc.tuc_sigmask.sig[i]); |
| } |
| |
| setup_sigcontext(&frame->uc.tuc_mcontext, env); |
| |
| __put_user(0x34190000, frame->tramp + 0); /* ldi 0,%r25 */ |
| __put_user(0x3414015a, frame->tramp + 1); /* ldi __NR_rt_sigreturn,%r20 */ |
| __put_user(0xe4008200, frame->tramp + 2); /* be,l 0x100(%sr2,%r0) */ |
| __put_user(0x08000240, frame->tramp + 3); /* nop */ |
| |
| unlock_user_struct(frame, frame_addr, 1); |
| |
| env->gr[2] = h2g(frame->tramp); |
| env->gr[30] = sp; |
| env->gr[26] = sig; |
| env->gr[25] = h2g(&frame->info); |
| env->gr[24] = h2g(&frame->uc); |
| |
| haddr = ka->_sa_handler; |
| if (haddr & 2) { |
| /* Function descriptor. */ |
| target_ulong *fdesc, dest; |
| |
| haddr &= -4; |
| if (!lock_user_struct(VERIFY_READ, fdesc, haddr, 1)) { |
| goto give_sigsegv; |
| } |
| __get_user(dest, fdesc); |
| __get_user(env->gr[19], fdesc + 1); |
| unlock_user_struct(fdesc, haddr, 1); |
| haddr = dest; |
| } |
| env->iaoq_f = haddr; |
| env->iaoq_b = haddr + 4;; |
| return; |
| |
| give_sigsegv: |
| force_sigsegv(sig); |
| } |
| |
| long do_rt_sigreturn(CPUArchState *env) |
| { |
| abi_ulong frame_addr = env->gr[30] - PARISC_RT_SIGFRAME_SIZE32; |
| struct target_rt_sigframe *frame; |
| sigset_t set; |
| |
| trace_user_do_rt_sigreturn(env, frame_addr); |
| if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) { |
| goto badframe; |
| } |
| target_to_host_sigset(&set, &frame->uc.tuc_sigmask); |
| set_sigmask(&set); |
| |
| restore_sigcontext(env, &frame->uc.tuc_mcontext); |
| unlock_user_struct(frame, frame_addr, 0); |
| |
| if (do_sigaltstack(frame_addr + offsetof(struct target_rt_sigframe, |
| uc.tuc_stack), |
| 0, env->gr[30]) == -EFAULT) { |
| goto badframe; |
| } |
| |
| unlock_user_struct(frame, frame_addr, 0); |
| return -TARGET_QEMU_ESIGRETURN; |
| |
| badframe: |
| force_sig(TARGET_SIGSEGV); |
| return -TARGET_QEMU_ESIGRETURN; |
| } |
| |
| #else |
| |
| static void setup_frame(int sig, struct target_sigaction *ka, |
| target_sigset_t *set, CPUArchState *env) |
| { |
| fprintf(stderr, "setup_frame: not implemented\n"); |
| } |
| |
| static void setup_rt_frame(int sig, struct target_sigaction *ka, |
| target_siginfo_t *info, |
| target_sigset_t *set, CPUArchState *env) |
| { |
| fprintf(stderr, "setup_rt_frame: not implemented\n"); |
| } |
| |
| long do_sigreturn(CPUArchState *env) |
| { |
| fprintf(stderr, "do_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| long do_rt_sigreturn(CPUArchState *env) |
| { |
| fprintf(stderr, "do_rt_sigreturn: not implemented\n"); |
| return -TARGET_ENOSYS; |
| } |
| |
| #endif |
| |
| static void handle_pending_signal(CPUArchState *cpu_env, int sig, |
| struct emulated_sigtable *k) |
| { |
| CPUState *cpu = ENV_GET_CPU(cpu_env); |
| abi_ulong handler; |
| sigset_t set; |
| target_sigset_t target_old_set; |
| struct target_sigaction *sa; |
| TaskState *ts = cpu->opaque; |
| |
| trace_user_handle_signal(cpu_env, sig); |
| /* dequeue signal */ |
| k->pending = 0; |
| |
| sig = gdb_handlesig(cpu, sig); |
| if (!sig) { |
| sa = NULL; |
| handler = TARGET_SIG_IGN; |
| } else { |
| sa = &sigact_table[sig - 1]; |
| handler = sa->_sa_handler; |
| } |
| |
| if (do_strace) { |
| print_taken_signal(sig, &k->info); |
| } |
| |
| if (handler == TARGET_SIG_DFL) { |
| /* default handler : ignore some signal. The other are job control or fatal */ |
| if (sig == TARGET_SIGTSTP || sig == TARGET_SIGTTIN || sig == TARGET_SIGTTOU) { |
| kill(getpid(),SIGSTOP); |
| } else if (sig != TARGET_SIGCHLD && |
| sig != TARGET_SIGURG && |
| sig != TARGET_SIGWINCH && |
| sig != TARGET_SIGCONT) { |
| dump_core_and_abort(sig); |
| } |
| } else if (handler == TARGET_SIG_IGN) { |
| /* ignore sig */ |
| } else if (handler == TARGET_SIG_ERR) { |
| dump_core_and_abort(sig); |
| } else { |
| /* compute the blocked signals during the handler execution */ |
| sigset_t *blocked_set; |
| |
| target_to_host_sigset(&set, &sa->sa_mask); |
| /* SA_NODEFER indicates that the current signal should not be |
| blocked during the handler */ |
| if (!(sa->sa_flags & TARGET_SA_NODEFER)) |
| sigaddset(&set, target_to_host_signal(sig)); |
| |
| /* save the previous blocked signal state to restore it at the |
| end of the signal execution (see do_sigreturn) */ |
| host_to_target_sigset_internal(&target_old_set, &ts->signal_mask); |
| |
| /* block signals in the handler */ |
| blocked_set = ts->in_sigsuspend ? |
| &ts->sigsuspend_mask : &ts->signal_mask; |
| sigorset(&ts->signal_mask, blocked_set, &set); |
| ts->in_sigsuspend = 0; |
| |
| /* if the CPU is in VM86 mode, we restore the 32 bit values */ |
| #if defined(TARGET_I386) && !defined(TARGET_X86_64) |
| { |
| CPUX86State *env = cpu_env; |
| if (env->eflags & VM_MASK) |
| save_v86_state(env); |
| } |
| #endif |
| /* prepare the stack frame of the virtual CPU */ |
| #if defined(TARGET_ABI_MIPSN32) || defined(TARGET_ABI_MIPSN64) \ |
| || defined(TARGET_OPENRISC) || defined(TARGET_TILEGX) \ |
| || defined(TARGET_PPC64) || defined(TARGET_HPPA) \ |
| || defined(TARGET_NIOS2) |
| /* These targets do not have traditional signals. */ |
| setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env); |
| #else |
| if (sa->sa_flags & TARGET_SA_SIGINFO) |
| setup_rt_frame(sig, sa, &k->info, &target_old_set, cpu_env); |
| else |
| setup_frame(sig, sa, &target_old_set, cpu_env); |
| #endif |
| if (sa->sa_flags & TARGET_SA_RESETHAND) { |
| sa->_sa_handler = TARGET_SIG_DFL; |
| } |
| } |
| } |
| |
| void process_pending_signals(CPUArchState *cpu_env) |
| { |
| CPUState *cpu = ENV_GET_CPU(cpu_env); |
| int sig; |
| TaskState *ts = cpu->opaque; |
| sigset_t set; |
| sigset_t *blocked_set; |
| |
| while (atomic_read(&ts->signal_pending)) { |
| /* FIXME: This is not threadsafe. */ |
| sigfillset(&set); |
| sigprocmask(SIG_SETMASK, &set, 0); |
| |
| restart_scan: |
| sig = ts->sync_signal.pending; |
| if (sig) { |
| /* Synchronous signals are forced, |
| * see force_sig_info() and callers in Linux |
| * Note that not all of our queue_signal() calls in QEMU correspond |
| * to force_sig_info() calls in Linux (some are send_sig_info()). |
| * However it seems like a kernel bug to me to allow the process |
| * to block a synchronous signal since it could then just end up |
| * looping round and round indefinitely. |
| */ |
| if (sigismember(&ts->signal_mask, target_to_host_signal_table[sig]) |
| || sigact_table[sig - 1]._sa_handler == TARGET_SIG_IGN) { |
| sigdelset(&ts->signal_mask, target_to_host_signal_table[sig]); |
| sigact_table[sig - 1]._sa_handler = TARGET_SIG_DFL; |
| } |
| |
| handle_pending_signal(cpu_env, sig, &ts->sync_signal); |
| } |
| |
| for (sig = 1; sig <= TARGET_NSIG; sig++) { |
| blocked_set = ts->in_sigsuspend ? |
| &ts->sigsuspend_mask : &ts->signal_mask; |
| |
| if (ts->sigtab[sig - 1].pending && |
| (!sigismember(blocked_set, |
| target_to_host_signal_table[sig]))) { |
| handle_pending_signal(cpu_env, sig, &ts->sigtab[sig - 1]); |
| /* Restart scan from the beginning, as handle_pending_signal |
| * might have resulted in a new synchronous signal (eg SIGSEGV). |
| */ |
| goto restart_scan; |
| } |
| } |
| |
| /* if no signal is pending, unblock signals and recheck (the act |
| * of unblocking might cause us to take another host signal which |
| * will set signal_pending again). |
| */ |
| atomic_set(&ts->signal_pending, 0); |
| ts->in_sigsuspend = 0; |
| set = ts->signal_mask; |
| sigdelset(&set, SIGSEGV); |
| sigdelset(&set, SIGBUS); |
| sigprocmask(SIG_SETMASK, &set, 0); |
| } |
| ts->in_sigsuspend = 0; |
| } |