signal.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237
  1. /*
  2. * Copyright (C) 2004 PathScale, Inc
  3. * Licensed under the GPL
  4. */
  5. #include <signal.h>
  6. #include <stdio.h>
  7. #include <unistd.h>
  8. #include <stdlib.h>
  9. #include <errno.h>
  10. #include <stdarg.h>
  11. #include <string.h>
  12. #include <sys/mman.h>
  13. #include "user_util.h"
  14. #include "user.h"
  15. #include "signal_kern.h"
  16. #include "sysdep/sigcontext.h"
  17. #include "sysdep/signal.h"
  18. #include "sigcontext.h"
  19. #include "mode.h"
  20. #include "os.h"
  21. /* These are the asynchronous signals. SIGVTALRM and SIGARLM are handled
  22. * together under SIGVTALRM_BIT. SIGPROF is excluded because we want to
  23. * be able to profile all of UML, not just the non-critical sections. If
  24. * profiling is not thread-safe, then that is not my problem. We can disable
  25. * profiling when SMP is enabled in that case.
  26. */
  27. #define SIGIO_BIT 0
  28. #define SIGIO_MASK (1 << SIGIO_BIT)
  29. #define SIGVTALRM_BIT 1
  30. #define SIGVTALRM_MASK (1 << SIGVTALRM_BIT)
  31. #define SIGALRM_BIT 2
  32. #define SIGALRM_MASK (1 << SIGALRM_BIT)
  33. static int signals_enabled = 1;
  34. static int pending = 0;
  35. void sig_handler(ARCH_SIGHDLR_PARAM)
  36. {
  37. struct sigcontext *sc;
  38. int enabled;
  39. /* Must be the first thing that this handler does - x86_64 stores
  40. * the sigcontext in %rdx, and we need to save it before it has a
  41. * chance to get trashed.
  42. */
  43. ARCH_GET_SIGCONTEXT(sc, sig);
  44. enabled = signals_enabled;
  45. if(!enabled && (sig == SIGIO)){
  46. pending |= SIGIO_MASK;
  47. return;
  48. }
  49. block_signals();
  50. CHOOSE_MODE_PROC(sig_handler_common_tt, sig_handler_common_skas,
  51. sig, sc);
  52. set_signals(enabled);
  53. }
  54. extern int timer_irq_inited;
  55. static void real_alarm_handler(int sig, struct sigcontext *sc)
  56. {
  57. if(!timer_irq_inited){
  58. signals_enabled = 1;
  59. return;
  60. }
  61. if(sig == SIGALRM)
  62. switch_timers(0);
  63. CHOOSE_MODE_PROC(sig_handler_common_tt, sig_handler_common_skas,
  64. sig, sc);
  65. if(sig == SIGALRM)
  66. switch_timers(1);
  67. }
  68. void alarm_handler(ARCH_SIGHDLR_PARAM)
  69. {
  70. struct sigcontext *sc;
  71. int enabled;
  72. ARCH_GET_SIGCONTEXT(sc, sig);
  73. enabled = signals_enabled;
  74. if(!signals_enabled){
  75. if(sig == SIGVTALRM)
  76. pending |= SIGVTALRM_MASK;
  77. else pending |= SIGALRM_MASK;
  78. return;
  79. }
  80. block_signals();
  81. real_alarm_handler(sig, sc);
  82. set_signals(enabled);
  83. }
  84. void set_sigstack(void *sig_stack, int size)
  85. {
  86. stack_t stack = ((stack_t) { .ss_flags = 0,
  87. .ss_sp = (__ptr_t) sig_stack,
  88. .ss_size = size - sizeof(void *) });
  89. if(sigaltstack(&stack, NULL) != 0)
  90. panic("enabling signal stack failed, errno = %d\n", errno);
  91. }
  92. void remove_sigstack(void)
  93. {
  94. stack_t stack = ((stack_t) { .ss_flags = SS_DISABLE,
  95. .ss_sp = NULL,
  96. .ss_size = 0 });
  97. if(sigaltstack(&stack, NULL) != 0)
  98. panic("disabling signal stack failed, errno = %d\n", errno);
  99. }
  100. void set_handler(int sig, void (*handler)(int), int flags, ...)
  101. {
  102. struct sigaction action;
  103. va_list ap;
  104. sigset_t sig_mask;
  105. int mask;
  106. va_start(ap, flags);
  107. action.sa_handler = handler;
  108. sigemptyset(&action.sa_mask);
  109. while((mask = va_arg(ap, int)) != -1){
  110. sigaddset(&action.sa_mask, mask);
  111. }
  112. va_end(ap);
  113. action.sa_flags = flags;
  114. action.sa_restorer = NULL;
  115. if(sigaction(sig, &action, NULL) < 0)
  116. panic("sigaction failed - errno = %d\n", errno);
  117. sigemptyset(&sig_mask);
  118. sigaddset(&sig_mask, sig);
  119. if(sigprocmask(SIG_UNBLOCK, &sig_mask, NULL) < 0)
  120. panic("sigprocmask failed - errno = %d\n", errno);
  121. }
  122. int change_sig(int signal, int on)
  123. {
  124. sigset_t sigset, old;
  125. sigemptyset(&sigset);
  126. sigaddset(&sigset, signal);
  127. sigprocmask(on ? SIG_UNBLOCK : SIG_BLOCK, &sigset, &old);
  128. return(!sigismember(&old, signal));
  129. }
  130. void block_signals(void)
  131. {
  132. signals_enabled = 0;
  133. }
  134. void unblock_signals(void)
  135. {
  136. int save_pending;
  137. if(signals_enabled == 1)
  138. return;
  139. /* We loop because the IRQ handler returns with interrupts off. So,
  140. * interrupts may have arrived and we need to re-enable them and
  141. * recheck pending.
  142. */
  143. while(1){
  144. /* Save and reset save_pending after enabling signals. This
  145. * way, pending won't be changed while we're reading it.
  146. */
  147. signals_enabled = 1;
  148. save_pending = pending;
  149. if(save_pending == 0)
  150. return;
  151. pending = 0;
  152. /* We have pending interrupts, so disable signals, as the
  153. * handlers expect them off when they are called. They will
  154. * be enabled again above.
  155. */
  156. signals_enabled = 0;
  157. /* Deal with SIGIO first because the alarm handler might
  158. * schedule, leaving the pending SIGIO stranded until we come
  159. * back here.
  160. */
  161. if(save_pending & SIGIO_MASK)
  162. CHOOSE_MODE_PROC(sig_handler_common_tt,
  163. sig_handler_common_skas, SIGIO, NULL);
  164. if(save_pending & SIGALRM_MASK)
  165. real_alarm_handler(SIGALRM, NULL);
  166. if(save_pending & SIGVTALRM_MASK)
  167. real_alarm_handler(SIGVTALRM, NULL);
  168. }
  169. }
  170. int get_signals(void)
  171. {
  172. return signals_enabled;
  173. }
  174. int set_signals(int enable)
  175. {
  176. int ret;
  177. if(signals_enabled == enable)
  178. return enable;
  179. ret = signals_enabled;
  180. if(enable)
  181. unblock_signals();
  182. else block_signals();
  183. return ret;
  184. }
  185. void os_usr1_signal(int on)
  186. {
  187. change_sig(SIGUSR1, on);
  188. }