]> git.proxmox.com Git - mirror_qemu.git/blob - linux-user/riscv/signal.c
target/s390x: Fix LCBB overwriting the top 32 bits
[mirror_qemu.git] / linux-user / riscv / signal.c
1 /*
2 * Emulation of Linux signals
3 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
18 */
19 #include "qemu/osdep.h"
20 #include "qemu.h"
21 #include "user-internals.h"
22 #include "signal-common.h"
23 #include "linux-user/trace.h"
24
25 /* Signal handler invocation must be transparent for the code being
26 interrupted. Complete CPU (hart) state is saved on entry and restored
27 before returning from the handler. Process sigmask is also saved to block
28 signals while the handler is running. The handler gets its own stack,
29 which also doubles as storage for the CPU state and sigmask.
30
31 The code below is qemu re-implementation of arch/riscv/kernel/signal.c */
32
33 struct target_sigcontext {
34 abi_long pc;
35 abi_long gpr[31]; /* x0 is not present, so all offsets must be -1 */
36 uint64_t fpr[32];
37 uint32_t fcsr;
38 }; /* cf. riscv-linux:arch/riscv/include/uapi/asm/ptrace.h */
39
40 struct target_ucontext {
41 unsigned long uc_flags;
42 struct target_ucontext *uc_link;
43 target_stack_t uc_stack;
44 target_sigset_t uc_sigmask;
45 uint8_t __unused[1024 / 8 - sizeof(target_sigset_t)];
46 struct target_sigcontext uc_mcontext QEMU_ALIGNED(16);
47 };
48
49 struct target_rt_sigframe {
50 struct target_siginfo info;
51 struct target_ucontext uc;
52 };
53
54 static abi_ulong get_sigframe(struct target_sigaction *ka,
55 CPURISCVState *regs, size_t framesize)
56 {
57 abi_ulong sp = get_sp_from_cpustate(regs);
58
59 /* If we are on the alternate signal stack and would overflow it, don't.
60 Return an always-bogus address instead so we will die with SIGSEGV. */
61 if (on_sig_stack(sp) && !likely(on_sig_stack(sp - framesize))) {
62 return -1L;
63 }
64
65 /* This is the X/Open sanctioned signal stack switching. */
66 sp = target_sigsp(sp, ka) - framesize;
67 sp &= ~0xf;
68
69 return sp;
70 }
71
72 static void setup_sigcontext(struct target_sigcontext *sc, CPURISCVState *env)
73 {
74 int i;
75
76 __put_user(env->pc, &sc->pc);
77
78 for (i = 1; i < 32; i++) {
79 __put_user(env->gpr[i], &sc->gpr[i - 1]);
80 }
81 for (i = 0; i < 32; i++) {
82 __put_user(env->fpr[i], &sc->fpr[i]);
83 }
84
85 uint32_t fcsr = riscv_csr_read(env, CSR_FCSR);
86 __put_user(fcsr, &sc->fcsr);
87 }
88
89 static void setup_ucontext(struct target_ucontext *uc,
90 CPURISCVState *env, target_sigset_t *set)
91 {
92 __put_user(0, &(uc->uc_flags));
93 __put_user(0, &(uc->uc_link));
94
95 target_save_altstack(&uc->uc_stack, env);
96
97 int i;
98 for (i = 0; i < TARGET_NSIG_WORDS; i++) {
99 __put_user(set->sig[i], &(uc->uc_sigmask.sig[i]));
100 }
101
102 setup_sigcontext(&uc->uc_mcontext, env);
103 }
104
105 void setup_rt_frame(int sig, struct target_sigaction *ka,
106 target_siginfo_t *info,
107 target_sigset_t *set, CPURISCVState *env)
108 {
109 abi_ulong frame_addr;
110 struct target_rt_sigframe *frame;
111
112 frame_addr = get_sigframe(ka, env, sizeof(*frame));
113 trace_user_setup_rt_frame(env, frame_addr);
114
115 if (!lock_user_struct(VERIFY_WRITE, frame, frame_addr, 0)) {
116 goto badframe;
117 }
118
119 setup_ucontext(&frame->uc, env, set);
120 tswap_siginfo(&frame->info, info);
121
122 env->pc = ka->_sa_handler;
123 env->gpr[xSP] = frame_addr;
124 env->gpr[xA0] = sig;
125 env->gpr[xA1] = frame_addr + offsetof(struct target_rt_sigframe, info);
126 env->gpr[xA2] = frame_addr + offsetof(struct target_rt_sigframe, uc);
127 env->gpr[xRA] = default_rt_sigreturn;
128
129 return;
130
131 badframe:
132 unlock_user_struct(frame, frame_addr, 1);
133 if (sig == TARGET_SIGSEGV) {
134 ka->_sa_handler = TARGET_SIG_DFL;
135 }
136 force_sig(TARGET_SIGSEGV);
137 }
138
139 static void restore_sigcontext(CPURISCVState *env, struct target_sigcontext *sc)
140 {
141 int i;
142
143 __get_user(env->pc, &sc->pc);
144
145 for (i = 1; i < 32; ++i) {
146 __get_user(env->gpr[i], &sc->gpr[i - 1]);
147 }
148 for (i = 0; i < 32; ++i) {
149 __get_user(env->fpr[i], &sc->fpr[i]);
150 }
151
152 uint32_t fcsr;
153 __get_user(fcsr, &sc->fcsr);
154 riscv_csr_write(env, CSR_FCSR, fcsr);
155 }
156
157 static void restore_ucontext(CPURISCVState *env, struct target_ucontext *uc)
158 {
159 sigset_t blocked;
160 target_sigset_t target_set;
161 int i;
162
163 target_sigemptyset(&target_set);
164 for (i = 0; i < TARGET_NSIG_WORDS; i++) {
165 __get_user(target_set.sig[i], &(uc->uc_sigmask.sig[i]));
166 }
167
168 target_to_host_sigset_internal(&blocked, &target_set);
169 set_sigmask(&blocked);
170
171 restore_sigcontext(env, &uc->uc_mcontext);
172 }
173
174 long do_rt_sigreturn(CPURISCVState *env)
175 {
176 struct target_rt_sigframe *frame;
177 abi_ulong frame_addr;
178
179 frame_addr = env->gpr[xSP];
180 trace_user_do_sigreturn(env, frame_addr);
181 if (!lock_user_struct(VERIFY_READ, frame, frame_addr, 1)) {
182 goto badframe;
183 }
184
185 restore_ucontext(env, &frame->uc);
186 target_restore_altstack(&frame->uc.uc_stack, env);
187
188 unlock_user_struct(frame, frame_addr, 0);
189 return -QEMU_ESIGRETURN;
190
191 badframe:
192 unlock_user_struct(frame, frame_addr, 0);
193 force_sig(TARGET_SIGSEGV);
194 return 0;
195 }
196
197 void setup_sigtramp(abi_ulong sigtramp_page)
198 {
199 uint32_t *tramp = lock_user(VERIFY_WRITE, sigtramp_page, 8, 0);
200 assert(tramp != NULL);
201
202 __put_user(0x08b00893, tramp + 0); /* li a7, 139 = __NR_rt_sigreturn */
203 __put_user(0x00000073, tramp + 1); /* ecall */
204
205 default_rt_sigreturn = sigtramp_page;
206 unlock_user(tramp, sigtramp_page, 8);
207 }