signal.c 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. /*
  2. * Copyright (C) 2004 PathScale, Inc
  3. * Licensed under the GPL
  4. */
  5. #include <signal.h>
  6. #include <stdio.h>
  7. #include <unistd.h>
  8. #include <stdlib.h>
  9. #include <errno.h>
  10. #include <stdarg.h>
  11. #include <string.h>
  12. #include <sys/mman.h>
  13. #include "user_util.h"
  14. #include "user.h"
  15. #include "signal_kern.h"
  16. #include "sysdep/sigcontext.h"
  17. #include "sysdep/signal.h"
  18. #include "sigcontext.h"
  19. #include "mode.h"
  20. #include "os.h"
  21. /* These are the asynchronous signals. SIGVTALRM and SIGARLM are handled
  22. * together under SIGVTALRM_BIT. SIGPROF is excluded because we want to
  23. * be able to profile all of UML, not just the non-critical sections. If
  24. * profiling is not thread-safe, then that is not my problem. We can disable
  25. * profiling when SMP is enabled in that case.
  26. */
  27. #define SIGIO_BIT 0
  28. #define SIGIO_MASK (1 << SIGIO_BIT)
  29. #define SIGVTALRM_BIT 1
  30. #define SIGVTALRM_MASK (1 << SIGVTALRM_BIT)
  31. #define SIGALRM_BIT 2
  32. #define SIGALRM_MASK (1 << SIGALRM_BIT)
  33. static int signals_enabled = 1;
  34. static int pending = 0;
  35. void sig_handler(ARCH_SIGHDLR_PARAM)
  36. {
  37. struct sigcontext *sc;
  38. int enabled;
  39. /* Must be the first thing that this handler does - x86_64 stores
  40. * the sigcontext in %rdx, and we need to save it before it has a
  41. * chance to get trashed.
  42. */
  43. ARCH_GET_SIGCONTEXT(sc, sig);
  44. enabled = signals_enabled;
  45. if(!enabled && (sig == SIGIO)){
  46. pending |= SIGIO_MASK;
  47. return;
  48. }
  49. block_signals();
  50. CHOOSE_MODE_PROC(sig_handler_common_tt, sig_handler_common_skas,
  51. sig, sc);
  52. set_signals(enabled);
  53. }
  54. extern int timer_irq_inited;
  55. static void real_alarm_handler(int sig, struct sigcontext *sc)
  56. {
  57. if(!timer_irq_inited){
  58. signals_enabled = 1;
  59. return;
  60. }
  61. if(sig == SIGALRM)
  62. switch_timers(0);
  63. CHOOSE_MODE_PROC(sig_handler_common_tt, sig_handler_common_skas,
  64. sig, sc);
  65. if(sig == SIGALRM)
  66. switch_timers(1);
  67. }
  68. void alarm_handler(ARCH_SIGHDLR_PARAM)
  69. {
  70. struct sigcontext *sc;
  71. int enabled;
  72. ARCH_GET_SIGCONTEXT(sc, sig);
  73. enabled = signals_enabled;
  74. if(!signals_enabled){
  75. if(sig == SIGVTALRM)
  76. pending |= SIGVTALRM_MASK;
  77. else pending |= SIGALRM_MASK;
  78. return;
  79. }
  80. block_signals();
  81. real_alarm_handler(sig, sc);
  82. set_signals(enabled);
  83. }
  84. extern void do_boot_timer_handler(struct sigcontext * sc);
  85. void boot_timer_handler(ARCH_SIGHDLR_PARAM)
  86. {
  87. struct sigcontext *sc;
  88. int enabled;
  89. ARCH_GET_SIGCONTEXT(sc, sig);
  90. enabled = signals_enabled;
  91. if(!enabled){
  92. if(sig == SIGVTALRM)
  93. pending |= SIGVTALRM_MASK;
  94. else pending |= SIGALRM_MASK;
  95. return;
  96. }
  97. block_signals();
  98. do_boot_timer_handler(sc);
  99. set_signals(enabled);
  100. }
  101. void set_sigstack(void *sig_stack, int size)
  102. {
  103. stack_t stack = ((stack_t) { .ss_flags = 0,
  104. .ss_sp = (__ptr_t) sig_stack,
  105. .ss_size = size - sizeof(void *) });
  106. if(sigaltstack(&stack, NULL) != 0)
  107. panic("enabling signal stack failed, errno = %d\n", errno);
  108. }
  109. void remove_sigstack(void)
  110. {
  111. stack_t stack = ((stack_t) { .ss_flags = SS_DISABLE,
  112. .ss_sp = NULL,
  113. .ss_size = 0 });
  114. if(sigaltstack(&stack, NULL) != 0)
  115. panic("disabling signal stack failed, errno = %d\n", errno);
  116. }
  117. void set_handler(int sig, void (*handler)(int), int flags, ...)
  118. {
  119. struct sigaction action;
  120. va_list ap;
  121. sigset_t sig_mask;
  122. int mask;
  123. va_start(ap, flags);
  124. action.sa_handler = handler;
  125. sigemptyset(&action.sa_mask);
  126. while((mask = va_arg(ap, int)) != -1){
  127. sigaddset(&action.sa_mask, mask);
  128. }
  129. va_end(ap);
  130. action.sa_flags = flags;
  131. action.sa_restorer = NULL;
  132. if(sigaction(sig, &action, NULL) < 0)
  133. panic("sigaction failed - errno = %d\n", errno);
  134. sigemptyset(&sig_mask);
  135. sigaddset(&sig_mask, sig);
  136. if(sigprocmask(SIG_UNBLOCK, &sig_mask, NULL) < 0)
  137. panic("sigprocmask failed - errno = %d\n", errno);
  138. }
  139. int change_sig(int signal, int on)
  140. {
  141. sigset_t sigset, old;
  142. sigemptyset(&sigset);
  143. sigaddset(&sigset, signal);
  144. sigprocmask(on ? SIG_UNBLOCK : SIG_BLOCK, &sigset, &old);
  145. return(!sigismember(&old, signal));
  146. }
  147. void block_signals(void)
  148. {
  149. signals_enabled = 0;
  150. }
  151. void unblock_signals(void)
  152. {
  153. int save_pending;
  154. if(signals_enabled == 1)
  155. return;
  156. /* We loop because the IRQ handler returns with interrupts off. So,
  157. * interrupts may have arrived and we need to re-enable them and
  158. * recheck pending.
  159. */
  160. while(1){
  161. /* Save and reset save_pending after enabling signals. This
  162. * way, pending won't be changed while we're reading it.
  163. */
  164. signals_enabled = 1;
  165. save_pending = pending;
  166. if(save_pending == 0)
  167. return;
  168. pending = 0;
  169. /* We have pending interrupts, so disable signals, as the
  170. * handlers expect them off when they are called. They will
  171. * be enabled again above.
  172. */
  173. signals_enabled = 0;
  174. /* Deal with SIGIO first because the alarm handler might
  175. * schedule, leaving the pending SIGIO stranded until we come
  176. * back here.
  177. */
  178. if(save_pending & SIGIO_MASK)
  179. CHOOSE_MODE_PROC(sig_handler_common_tt,
  180. sig_handler_common_skas, SIGIO, NULL);
  181. if(save_pending & SIGALRM_MASK)
  182. real_alarm_handler(SIGALRM, NULL);
  183. if(save_pending & SIGVTALRM_MASK)
  184. real_alarm_handler(SIGVTALRM, NULL);
  185. }
  186. }
  187. int get_signals(void)
  188. {
  189. return signals_enabled;
  190. }
  191. int set_signals(int enable)
  192. {
  193. int ret;
  194. if(signals_enabled == enable)
  195. return enable;
  196. ret = signals_enabled;
  197. if(enable)
  198. unblock_signals();
  199. else block_signals();
  200. return ret;
  201. }
  202. void os_usr1_signal(int on)
  203. {
  204. change_sig(SIGUSR1, on);
  205. }