• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1// Copyright 2012 The Go Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
5//go:build unix
6
7package runtime
8
9import (
10	"internal/abi"
11	"internal/runtime/atomic"
12	"runtime/internal/sys"
13	"unsafe"
14)
15
16// sigTabT is the type of an entry in the global sigtable array.
17// sigtable is inherently system dependent, and appears in OS-specific files,
18// but sigTabT is the same for all Unixy systems.
19// The sigtable array is indexed by a system signal number to get the flags
20// and printable name of each signal.
21type sigTabT struct {
22	flags int32
23	name  string
24}
25
26//go:linkname os_sigpipe os.sigpipe
27func os_sigpipe() {
28	systemstack(sigpipe)
29}
30
31func signame(sig uint32) string {
32	if sig >= uint32(len(sigtable)) {
33		return ""
34	}
35	return sigtable[sig].name
36}
37
38const (
39	_SIG_DFL uintptr = 0
40	_SIG_IGN uintptr = 1
41)
42
43// sigPreempt is the signal used for non-cooperative preemption.
44//
45// There's no good way to choose this signal, but there are some
46// heuristics:
47//
48// 1. It should be a signal that's passed-through by debuggers by
49// default. On Linux, this is SIGALRM, SIGURG, SIGCHLD, SIGIO,
50// SIGVTALRM, SIGPROF, and SIGWINCH, plus some glibc-internal signals.
51//
52// 2. It shouldn't be used internally by libc in mixed Go/C binaries
53// because libc may assume it's the only thing that can handle these
54// signals. For example SIGCANCEL or SIGSETXID.
55//
56// 3. It should be a signal that can happen spuriously without
57// consequences. For example, SIGALRM is a bad choice because the
58// signal handler can't tell if it was caused by the real process
59// alarm or not (arguably this means the signal is broken, but I
60// digress). SIGUSR1 and SIGUSR2 are also bad because those are often
61// used in meaningful ways by applications.
62//
63// 4. We need to deal with platforms without real-time signals (like
64// macOS), so those are out.
65//
66// We use SIGURG because it meets all of these criteria, is extremely
67// unlikely to be used by an application for its "real" meaning (both
68// because out-of-band data is basically unused and because SIGURG
69// doesn't report which socket has the condition, making it pretty
70// useless), and even if it is, the application has to be ready for
71// spurious SIGURG. SIGIO wouldn't be a bad choice either, but is more
72// likely to be used for real.
73const sigPreempt = _SIGURG
74
75// Stores the signal handlers registered before Go installed its own.
76// These signal handlers will be invoked in cases where Go doesn't want to
77// handle a particular signal (e.g., signal occurred on a non-Go thread).
78// See sigfwdgo for more information on when the signals are forwarded.
79//
80// This is read by the signal handler; accesses should use
81// atomic.Loaduintptr and atomic.Storeuintptr.
82var fwdSig [_NSIG]uintptr
83
84// handlingSig is indexed by signal number and is non-zero if we are
85// currently handling the signal. Or, to put it another way, whether
86// the signal handler is currently set to the Go signal handler or not.
87// This is uint32 rather than bool so that we can use atomic instructions.
88var handlingSig [_NSIG]uint32
89
90// channels for synchronizing signal mask updates with the signal mask
91// thread
92var (
93	disableSigChan  chan uint32
94	enableSigChan   chan uint32
95	maskUpdatedChan chan struct{}
96)
97
98func init() {
99	// _NSIG is the number of signals on this operating system.
100	// sigtable should describe what to do for all the possible signals.
101	if len(sigtable) != _NSIG {
102		print("runtime: len(sigtable)=", len(sigtable), " _NSIG=", _NSIG, "\n")
103		throw("bad sigtable len")
104	}
105}
106
107var signalsOK bool
108
109// Initialize signals.
110// Called by libpreinit so runtime may not be initialized.
111//
112//go:nosplit
113//go:nowritebarrierrec
114func initsig(preinit bool) {
115	if !preinit {
116		// It's now OK for signal handlers to run.
117		signalsOK = true
118	}
119
120	// For c-archive/c-shared this is called by libpreinit with
121	// preinit == true.
122	if (isarchive || islibrary) && !preinit {
123		return
124	}
125
126	for i := uint32(0); i < _NSIG; i++ {
127		t := &sigtable[i]
128		if t.flags == 0 || t.flags&_SigDefault != 0 {
129			continue
130		}
131
132		// We don't need to use atomic operations here because
133		// there shouldn't be any other goroutines running yet.
134		fwdSig[i] = getsig(i)
135
136		if !sigInstallGoHandler(i) {
137			// Even if we are not installing a signal handler,
138			// set SA_ONSTACK if necessary.
139			if fwdSig[i] != _SIG_DFL && fwdSig[i] != _SIG_IGN {
140				setsigstack(i)
141			} else if fwdSig[i] == _SIG_IGN {
142				sigInitIgnored(i)
143			}
144			continue
145		}
146
147		handlingSig[i] = 1
148		setsig(i, abi.FuncPCABIInternal(sighandler))
149	}
150}
151
152//go:nosplit
153//go:nowritebarrierrec
154func sigInstallGoHandler(sig uint32) bool {
155	// For some signals, we respect an inherited SIG_IGN handler
156	// rather than insist on installing our own default handler.
157	// Even these signals can be fetched using the os/signal package.
158	switch sig {
159	case _SIGHUP, _SIGINT:
160		if atomic.Loaduintptr(&fwdSig[sig]) == _SIG_IGN {
161			return false
162		}
163	}
164
165	if (GOOS == "linux" || GOOS == "android") && !iscgo && sig == sigPerThreadSyscall {
166		// sigPerThreadSyscall is the same signal used by glibc for
167		// per-thread syscalls on Linux. We use it for the same purpose
168		// in non-cgo binaries.
169		return true
170	}
171
172	t := &sigtable[sig]
173	if t.flags&_SigSetStack != 0 {
174		return false
175	}
176
177	// When built using c-archive or c-shared, only install signal
178	// handlers for synchronous signals and SIGPIPE and sigPreempt.
179	if (isarchive || islibrary) && t.flags&_SigPanic == 0 && sig != _SIGPIPE && sig != sigPreempt {
180		return false
181	}
182
183	return true
184}
185
186// sigenable enables the Go signal handler to catch the signal sig.
187// It is only called while holding the os/signal.handlers lock,
188// via os/signal.enableSignal and signal_enable.
189func sigenable(sig uint32) {
190	if sig >= uint32(len(sigtable)) {
191		return
192	}
193
194	// SIGPROF is handled specially for profiling.
195	if sig == _SIGPROF {
196		return
197	}
198
199	t := &sigtable[sig]
200	if t.flags&_SigNotify != 0 {
201		ensureSigM()
202		enableSigChan <- sig
203		<-maskUpdatedChan
204		if atomic.Cas(&handlingSig[sig], 0, 1) {
205			atomic.Storeuintptr(&fwdSig[sig], getsig(sig))
206			setsig(sig, abi.FuncPCABIInternal(sighandler))
207		}
208	}
209}
210
211// sigdisable disables the Go signal handler for the signal sig.
212// It is only called while holding the os/signal.handlers lock,
213// via os/signal.disableSignal and signal_disable.
214func sigdisable(sig uint32) {
215	if sig >= uint32(len(sigtable)) {
216		return
217	}
218
219	// SIGPROF is handled specially for profiling.
220	if sig == _SIGPROF {
221		return
222	}
223
224	t := &sigtable[sig]
225	if t.flags&_SigNotify != 0 {
226		ensureSigM()
227		disableSigChan <- sig
228		<-maskUpdatedChan
229
230		// If initsig does not install a signal handler for a
231		// signal, then to go back to the state before Notify
232		// we should remove the one we installed.
233		if !sigInstallGoHandler(sig) {
234			atomic.Store(&handlingSig[sig], 0)
235			setsig(sig, atomic.Loaduintptr(&fwdSig[sig]))
236		}
237	}
238}
239
240// sigignore ignores the signal sig.
241// It is only called while holding the os/signal.handlers lock,
242// via os/signal.ignoreSignal and signal_ignore.
243func sigignore(sig uint32) {
244	if sig >= uint32(len(sigtable)) {
245		return
246	}
247
248	// SIGPROF is handled specially for profiling.
249	if sig == _SIGPROF {
250		return
251	}
252
253	t := &sigtable[sig]
254	if t.flags&_SigNotify != 0 {
255		atomic.Store(&handlingSig[sig], 0)
256		setsig(sig, _SIG_IGN)
257	}
258}
259
260// clearSignalHandlers clears all signal handlers that are not ignored
261// back to the default. This is called by the child after a fork, so that
262// we can enable the signal mask for the exec without worrying about
263// running a signal handler in the child.
264//
265//go:nosplit
266//go:nowritebarrierrec
267func clearSignalHandlers() {
268	for i := uint32(0); i < _NSIG; i++ {
269		if atomic.Load(&handlingSig[i]) != 0 {
270			setsig(i, _SIG_DFL)
271		}
272	}
273}
274
275// setProcessCPUProfilerTimer is called when the profiling timer changes.
276// It is called with prof.signalLock held. hz is the new timer, and is 0 if
277// profiling is being disabled. Enable or disable the signal as
278// required for -buildmode=c-archive.
279func setProcessCPUProfilerTimer(hz int32) {
280	if hz != 0 {
281		// Enable the Go signal handler if not enabled.
282		if atomic.Cas(&handlingSig[_SIGPROF], 0, 1) {
283			h := getsig(_SIGPROF)
284			// If no signal handler was installed before, then we record
285			// _SIG_IGN here. When we turn off profiling (below) we'll start
286			// ignoring SIGPROF signals. We do this, rather than change
287			// to SIG_DFL, because there may be a pending SIGPROF
288			// signal that has not yet been delivered to some other thread.
289			// If we change to SIG_DFL when turning off profiling, the
290			// program will crash when that SIGPROF is delivered. We assume
291			// that programs that use profiling don't want to crash on a
292			// stray SIGPROF. See issue 19320.
293			// We do the change here instead of when turning off profiling,
294			// because there we may race with a signal handler running
295			// concurrently, in particular, sigfwdgo may observe _SIG_DFL and
296			// die. See issue 43828.
297			if h == _SIG_DFL {
298				h = _SIG_IGN
299			}
300			atomic.Storeuintptr(&fwdSig[_SIGPROF], h)
301			setsig(_SIGPROF, abi.FuncPCABIInternal(sighandler))
302		}
303
304		var it itimerval
305		it.it_interval.tv_sec = 0
306		it.it_interval.set_usec(1000000 / hz)
307		it.it_value = it.it_interval
308		setitimer(_ITIMER_PROF, &it, nil)
309	} else {
310		setitimer(_ITIMER_PROF, &itimerval{}, nil)
311
312		// If the Go signal handler should be disabled by default,
313		// switch back to the signal handler that was installed
314		// when we enabled profiling. We don't try to handle the case
315		// of a program that changes the SIGPROF handler while Go
316		// profiling is enabled.
317		if !sigInstallGoHandler(_SIGPROF) {
318			if atomic.Cas(&handlingSig[_SIGPROF], 1, 0) {
319				h := atomic.Loaduintptr(&fwdSig[_SIGPROF])
320				setsig(_SIGPROF, h)
321			}
322		}
323	}
324}
325
326// setThreadCPUProfilerHz makes any thread-specific changes required to
327// implement profiling at a rate of hz.
328// No changes required on Unix systems when using setitimer.
329func setThreadCPUProfilerHz(hz int32) {
330	getg().m.profilehz = hz
331}
332
333func sigpipe() {
334	if signal_ignored(_SIGPIPE) || sigsend(_SIGPIPE) {
335		return
336	}
337	dieFromSignal(_SIGPIPE)
338}
339
340// doSigPreempt handles a preemption signal on gp.
341func doSigPreempt(gp *g, ctxt *sigctxt) {
342	// Check if this G wants to be preempted and is safe to
343	// preempt.
344	if wantAsyncPreempt(gp) {
345		if ok, newpc := isAsyncSafePoint(gp, ctxt.sigpc(), ctxt.sigsp(), ctxt.siglr()); ok {
346			// Adjust the PC and inject a call to asyncPreempt.
347			ctxt.pushCall(abi.FuncPCABI0(asyncPreempt), newpc)
348		}
349	}
350
351	// Acknowledge the preemption.
352	gp.m.preemptGen.Add(1)
353	gp.m.signalPending.Store(0)
354
355	if GOOS == "darwin" || GOOS == "ios" {
356		pendingPreemptSignals.Add(-1)
357	}
358}
359
360const preemptMSupported = true
361
362// preemptM sends a preemption request to mp. This request may be
363// handled asynchronously and may be coalesced with other requests to
364// the M. When the request is received, if the running G or P are
365// marked for preemption and the goroutine is at an asynchronous
366// safe-point, it will preempt the goroutine. It always atomically
367// increments mp.preemptGen after handling a preemption request.
368func preemptM(mp *m) {
369	// On Darwin, don't try to preempt threads during exec.
370	// Issue #41702.
371	if GOOS == "darwin" || GOOS == "ios" {
372		execLock.rlock()
373	}
374
375	if mp.signalPending.CompareAndSwap(0, 1) {
376		if GOOS == "darwin" || GOOS == "ios" {
377			pendingPreemptSignals.Add(1)
378		}
379
380		// If multiple threads are preempting the same M, it may send many
381		// signals to the same M such that it hardly make progress, causing
382		// live-lock problem. Apparently this could happen on darwin. See
383		// issue #37741.
384		// Only send a signal if there isn't already one pending.
385		signalM(mp, sigPreempt)
386	}
387
388	if GOOS == "darwin" || GOOS == "ios" {
389		execLock.runlock()
390	}
391}
392
393// sigFetchG fetches the value of G safely when running in a signal handler.
394// On some architectures, the g value may be clobbered when running in a VDSO.
395// See issue #32912.
396//
397//go:nosplit
398func sigFetchG(c *sigctxt) *g {
399	switch GOARCH {
400	case "arm", "arm64", "loong64", "ppc64", "ppc64le", "riscv64", "s390x":
401		if !iscgo && inVDSOPage(c.sigpc()) {
402			// When using cgo, we save the g on TLS and load it from there
403			// in sigtramp. Just use that.
404			// Otherwise, before making a VDSO call we save the g to the
405			// bottom of the signal stack. Fetch from there.
406			// TODO: in efence mode, stack is sysAlloc'd, so this wouldn't
407			// work.
408			sp := getcallersp()
409			s := spanOf(sp)
410			if s != nil && s.state.get() == mSpanManual && s.base() < sp && sp < s.limit {
411				gp := *(**g)(unsafe.Pointer(s.base()))
412				return gp
413			}
414			return nil
415		}
416	}
417	return getg()
418}
419
420// sigtrampgo is called from the signal handler function, sigtramp,
421// written in assembly code.
422// This is called by the signal handler, and the world may be stopped.
423//
424// It must be nosplit because getg() is still the G that was running
425// (if any) when the signal was delivered, but it's (usually) called
426// on the gsignal stack. Until this switches the G to gsignal, the
427// stack bounds check won't work.
428//
429//go:nosplit
430//go:nowritebarrierrec
431func sigtrampgo(sig uint32, info *siginfo, ctx unsafe.Pointer) {
432	if sigfwdgo(sig, info, ctx) {
433		return
434	}
435	c := &sigctxt{info, ctx}
436	gp := sigFetchG(c)
437	setg(gp)
438	if gp == nil || (gp.m != nil && gp.m.isExtraInC) {
439		if sig == _SIGPROF {
440			// Some platforms (Linux) have per-thread timers, which we use in
441			// combination with the process-wide timer. Avoid double-counting.
442			if validSIGPROF(nil, c) {
443				sigprofNonGoPC(c.sigpc())
444			}
445			return
446		}
447		if sig == sigPreempt && preemptMSupported && debug.asyncpreemptoff == 0 {
448			// This is probably a signal from preemptM sent
449			// while executing Go code but received while
450			// executing non-Go code.
451			// We got past sigfwdgo, so we know that there is
452			// no non-Go signal handler for sigPreempt.
453			// The default behavior for sigPreempt is to ignore
454			// the signal, so badsignal will be a no-op anyway.
455			if GOOS == "darwin" || GOOS == "ios" {
456				pendingPreemptSignals.Add(-1)
457			}
458			return
459		}
460		c.fixsigcode(sig)
461		// Set g to nil here and badsignal will use g0 by needm.
462		// TODO: reuse the current m here by using the gsignal and adjustSignalStack,
463		// since the current g maybe a normal goroutine and actually running on the signal stack,
464		// it may hit stack split that is not expected here.
465		if gp != nil {
466			setg(nil)
467		}
468		badsignal(uintptr(sig), c)
469		// Restore g
470		if gp != nil {
471			setg(gp)
472		}
473		return
474	}
475
476	setg(gp.m.gsignal)
477
478	// If some non-Go code called sigaltstack, adjust.
479	var gsignalStack gsignalStack
480	setStack := adjustSignalStack(sig, gp.m, &gsignalStack)
481	if setStack {
482		gp.m.gsignal.stktopsp = getcallersp()
483	}
484
485	if gp.stackguard0 == stackFork {
486		signalDuringFork(sig)
487	}
488
489	c.fixsigcode(sig)
490	sighandler(sig, info, ctx, gp)
491	setg(gp)
492	if setStack {
493		restoreGsignalStack(&gsignalStack)
494	}
495}
496
497// If the signal handler receives a SIGPROF signal on a non-Go thread,
498// it tries to collect a traceback into sigprofCallers.
499// sigprofCallersUse is set to non-zero while sigprofCallers holds a traceback.
500var sigprofCallers cgoCallers
501var sigprofCallersUse uint32
502
503// sigprofNonGo is called if we receive a SIGPROF signal on a non-Go thread,
504// and the signal handler collected a stack trace in sigprofCallers.
505// When this is called, sigprofCallersUse will be non-zero.
506// g is nil, and what we can do is very limited.
507//
508// It is called from the signal handling functions written in assembly code that
509// are active for cgo programs, cgoSigtramp and sigprofNonGoWrapper, which have
510// not verified that the SIGPROF delivery corresponds to the best available
511// profiling source for this thread.
512//
513//go:nosplit
514//go:nowritebarrierrec
515func sigprofNonGo(sig uint32, info *siginfo, ctx unsafe.Pointer) {
516	if prof.hz.Load() != 0 {
517		c := &sigctxt{info, ctx}
518		// Some platforms (Linux) have per-thread timers, which we use in
519		// combination with the process-wide timer. Avoid double-counting.
520		if validSIGPROF(nil, c) {
521			n := 0
522			for n < len(sigprofCallers) && sigprofCallers[n] != 0 {
523				n++
524			}
525			cpuprof.addNonGo(sigprofCallers[:n])
526		}
527	}
528
529	atomic.Store(&sigprofCallersUse, 0)
530}
531
532// sigprofNonGoPC is called when a profiling signal arrived on a
533// non-Go thread and we have a single PC value, not a stack trace.
534// g is nil, and what we can do is very limited.
535//
536//go:nosplit
537//go:nowritebarrierrec
538func sigprofNonGoPC(pc uintptr) {
539	if prof.hz.Load() != 0 {
540		stk := []uintptr{
541			pc,
542			abi.FuncPCABIInternal(_ExternalCode) + sys.PCQuantum,
543		}
544		cpuprof.addNonGo(stk)
545	}
546}
547
548// adjustSignalStack adjusts the current stack guard based on the
549// stack pointer that is actually in use while handling a signal.
550// We do this in case some non-Go code called sigaltstack.
551// This reports whether the stack was adjusted, and if so stores the old
552// signal stack in *gsigstack.
553//
554//go:nosplit
555func adjustSignalStack(sig uint32, mp *m, gsigStack *gsignalStack) bool {
556	sp := uintptr(unsafe.Pointer(&sig))
557	if sp >= mp.gsignal.stack.lo && sp < mp.gsignal.stack.hi {
558		return false
559	}
560
561	var st stackt
562	sigaltstack(nil, &st)
563	stsp := uintptr(unsafe.Pointer(st.ss_sp))
564	if st.ss_flags&_SS_DISABLE == 0 && sp >= stsp && sp < stsp+st.ss_size {
565		setGsignalStack(&st, gsigStack)
566		return true
567	}
568
569	if sp >= mp.g0.stack.lo && sp < mp.g0.stack.hi {
570		// The signal was delivered on the g0 stack.
571		// This can happen when linked with C code
572		// using the thread sanitizer, which collects
573		// signals then delivers them itself by calling
574		// the signal handler directly when C code,
575		// including C code called via cgo, calls a
576		// TSAN-intercepted function such as malloc.
577		//
578		// We check this condition last as g0.stack.lo
579		// may be not very accurate (see mstart).
580		st := stackt{ss_size: mp.g0.stack.hi - mp.g0.stack.lo}
581		setSignalstackSP(&st, mp.g0.stack.lo)
582		setGsignalStack(&st, gsigStack)
583		return true
584	}
585
586	// sp is not within gsignal stack, g0 stack, or sigaltstack. Bad.
587	setg(nil)
588	needm(true)
589	if st.ss_flags&_SS_DISABLE != 0 {
590		noSignalStack(sig)
591	} else {
592		sigNotOnStack(sig, sp, mp)
593	}
594	dropm()
595	return false
596}
597
598// crashing is the number of m's we have waited for when implementing
599// GOTRACEBACK=crash when a signal is received.
600var crashing atomic.Int32
601
602// testSigtrap and testSigusr1 are used by the runtime tests. If
603// non-nil, it is called on SIGTRAP/SIGUSR1. If it returns true, the
604// normal behavior on this signal is suppressed.
605var testSigtrap func(info *siginfo, ctxt *sigctxt, gp *g) bool
606var testSigusr1 func(gp *g) bool
607
608// sigsysIgnored is non-zero if we are currently ignoring SIGSYS. See issue #69065.
609var sigsysIgnored uint32
610
611//go:linkname ignoreSIGSYS os.ignoreSIGSYS
612func ignoreSIGSYS() {
613	atomic.Store(&sigsysIgnored, 1)
614}
615
616//go:linkname restoreSIGSYS os.restoreSIGSYS
617func restoreSIGSYS() {
618	atomic.Store(&sigsysIgnored, 0)
619}
620
621// sighandler is invoked when a signal occurs. The global g will be
622// set to a gsignal goroutine and we will be running on the alternate
623// signal stack. The parameter gp will be the value of the global g
624// when the signal occurred. The sig, info, and ctxt parameters are
625// from the system signal handler: they are the parameters passed when
626// the SA is passed to the sigaction system call.
627//
628// The garbage collector may have stopped the world, so write barriers
629// are not allowed.
630//
631//go:nowritebarrierrec
632func sighandler(sig uint32, info *siginfo, ctxt unsafe.Pointer, gp *g) {
633	// The g executing the signal handler. This is almost always
634	// mp.gsignal. See delayedSignal for an exception.
635	gsignal := getg()
636	mp := gsignal.m
637	c := &sigctxt{info, ctxt}
638
639	// Cgo TSAN (not the Go race detector) intercepts signals and calls the
640	// signal handler at a later time. When the signal handler is called, the
641	// memory may have changed, but the signal context remains old. The
642	// unmatched signal context and memory makes it unsafe to unwind or inspect
643	// the stack. So we ignore delayed non-fatal signals that will cause a stack
644	// inspection (profiling signal and preemption signal).
645	// cgo_yield is only non-nil for TSAN, and is specifically used to trigger
646	// signal delivery. We use that as an indicator of delayed signals.
647	// For delayed signals, the handler is called on the g0 stack (see
648	// adjustSignalStack).
649	delayedSignal := *cgo_yield != nil && mp != nil && gsignal.stack == mp.g0.stack
650
651	if sig == _SIGPROF {
652		// Some platforms (Linux) have per-thread timers, which we use in
653		// combination with the process-wide timer. Avoid double-counting.
654		if !delayedSignal && validSIGPROF(mp, c) {
655			sigprof(c.sigpc(), c.sigsp(), c.siglr(), gp, mp)
656		}
657		return
658	}
659
660	if sig == _SIGTRAP && testSigtrap != nil && testSigtrap(info, (*sigctxt)(noescape(unsafe.Pointer(c))), gp) {
661		return
662	}
663
664	if sig == _SIGUSR1 && testSigusr1 != nil && testSigusr1(gp) {
665		return
666	}
667
668	if (GOOS == "linux" || GOOS == "android") && sig == sigPerThreadSyscall {
669		// sigPerThreadSyscall is the same signal used by glibc for
670		// per-thread syscalls on Linux. We use it for the same purpose
671		// in non-cgo binaries. Since this signal is not _SigNotify,
672		// there is nothing more to do once we run the syscall.
673		runPerThreadSyscall()
674		return
675	}
676
677	if sig == sigPreempt && debug.asyncpreemptoff == 0 && !delayedSignal {
678		// Might be a preemption signal.
679		doSigPreempt(gp, c)
680		// Even if this was definitely a preemption signal, it
681		// may have been coalesced with another signal, so we
682		// still let it through to the application.
683	}
684
685	flags := int32(_SigThrow)
686	if sig < uint32(len(sigtable)) {
687		flags = sigtable[sig].flags
688	}
689	if !c.sigFromUser() && flags&_SigPanic != 0 && (gp.throwsplit || gp != mp.curg) {
690		// We can't safely sigpanic because it may grow the
691		// stack. Abort in the signal handler instead.
692		//
693		// Also don't inject a sigpanic if we are not on a
694		// user G stack. Either we're in the runtime, or we're
695		// running C code. Either way we cannot recover.
696		flags = _SigThrow
697	}
698	if isAbortPC(c.sigpc()) {
699		// On many architectures, the abort function just
700		// causes a memory fault. Don't turn that into a panic.
701		flags = _SigThrow
702	}
703	if !c.sigFromUser() && flags&_SigPanic != 0 {
704		// The signal is going to cause a panic.
705		// Arrange the stack so that it looks like the point
706		// where the signal occurred made a call to the
707		// function sigpanic. Then set the PC to sigpanic.
708
709		// Have to pass arguments out of band since
710		// augmenting the stack frame would break
711		// the unwinding code.
712		gp.sig = sig
713		gp.sigcode0 = uintptr(c.sigcode())
714		gp.sigcode1 = c.fault()
715		gp.sigpc = c.sigpc()
716
717		c.preparePanic(sig, gp)
718		return
719	}
720
721	if c.sigFromUser() || flags&_SigNotify != 0 {
722		if sigsend(sig) {
723			return
724		}
725	}
726
727	if c.sigFromUser() && signal_ignored(sig) {
728		return
729	}
730
731	if sig == _SIGSYS && c.sigFromSeccomp() && atomic.Load(&sigsysIgnored) != 0 {
732		return
733	}
734
735	if flags&_SigKill != 0 {
736		dieFromSignal(sig)
737	}
738
739	// _SigThrow means that we should exit now.
740	// If we get here with _SigPanic, it means that the signal
741	// was sent to us by a program (c.sigFromUser() is true);
742	// in that case, if we didn't handle it in sigsend, we exit now.
743	if flags&(_SigThrow|_SigPanic) == 0 {
744		return
745	}
746
747	mp.throwing = throwTypeRuntime
748	mp.caughtsig.set(gp)
749
750	if crashing.Load() == 0 {
751		startpanic_m()
752	}
753
754	gp = fatalsignal(sig, c, gp, mp)
755
756	level, _, docrash := gotraceback()
757	if level > 0 {
758		goroutineheader(gp)
759		tracebacktrap(c.sigpc(), c.sigsp(), c.siglr(), gp)
760		if crashing.Load() > 0 && gp != mp.curg && mp.curg != nil && readgstatus(mp.curg)&^_Gscan == _Grunning {
761			// tracebackothers on original m skipped this one; trace it now.
762			goroutineheader(mp.curg)
763			traceback(^uintptr(0), ^uintptr(0), 0, mp.curg)
764		} else if crashing.Load() == 0 {
765			tracebackothers(gp)
766			print("\n")
767		}
768		dumpregs(c)
769	}
770
771	if docrash {
772		var crashSleepMicros uint32 = 5000
773		var watchdogTimeoutMicros uint32 = 2000 * crashSleepMicros
774
775		isCrashThread := false
776		if crashing.CompareAndSwap(0, 1) {
777			isCrashThread = true
778		} else {
779			crashing.Add(1)
780		}
781		if crashing.Load() < mcount()-int32(extraMLength.Load()) {
782			// There are other m's that need to dump their stacks.
783			// Relay SIGQUIT to the next m by sending it to the current process.
784			// All m's that have already received SIGQUIT have signal masks blocking
785			// receipt of any signals, so the SIGQUIT will go to an m that hasn't seen it yet.
786			// The first m will wait until all ms received the SIGQUIT, then crash/exit.
787			// Just in case the relaying gets botched, each m involved in
788			// the relay sleeps for 5 seconds and then does the crash/exit itself.
789			// The faulting m is crashing first so it is the faulting thread in the core dump (see issue #63277):
790			// in expected operation, the first m will wait until the last m has received the SIGQUIT,
791			// and then run crash/exit and the process is gone.
792			// However, if it spends more than 10 seconds to send SIGQUIT to all ms,
793			// any of ms may crash/exit the process after waiting for 10 seconds.
794			print("\n-----\n\n")
795			raiseproc(_SIGQUIT)
796		}
797		if isCrashThread {
798			// Sleep for short intervals so that we can crash quickly after all ms have received SIGQUIT.
799			// Reset the timer whenever we see more ms received SIGQUIT
800			// to make it have enough time to crash (see issue #64752).
801			timeout := watchdogTimeoutMicros
802			maxCrashing := crashing.Load()
803			for timeout > 0 && (crashing.Load() < mcount()-int32(extraMLength.Load())) {
804				usleep(crashSleepMicros)
805				timeout -= crashSleepMicros
806
807				if c := crashing.Load(); c > maxCrashing {
808					// We make progress, so reset the watchdog timeout
809					maxCrashing = c
810					timeout = watchdogTimeoutMicros
811				}
812			}
813		} else {
814			maxCrashing := int32(0)
815			c := crashing.Load()
816			for c > maxCrashing {
817				maxCrashing = c
818				usleep(watchdogTimeoutMicros)
819				c = crashing.Load()
820			}
821		}
822		printDebugLog()
823		crash()
824	}
825
826	printDebugLog()
827
828	exit(2)
829}
830
831func fatalsignal(sig uint32, c *sigctxt, gp *g, mp *m) *g {
832	if sig < uint32(len(sigtable)) {
833		print(sigtable[sig].name, "\n")
834	} else {
835		print("Signal ", sig, "\n")
836	}
837
838	if isSecureMode() {
839		exit(2)
840	}
841
842	print("PC=", hex(c.sigpc()), " m=", mp.id, " sigcode=", c.sigcode())
843	if sig == _SIGSEGV || sig == _SIGBUS {
844		print(" addr=", hex(c.fault()))
845	}
846	print("\n")
847	if mp.incgo && gp == mp.g0 && mp.curg != nil {
848		print("signal arrived during cgo execution\n")
849		// Switch to curg so that we get a traceback of the Go code
850		// leading up to the cgocall, which switched from curg to g0.
851		gp = mp.curg
852	}
853	if sig == _SIGILL || sig == _SIGFPE {
854		// It would be nice to know how long the instruction is.
855		// Unfortunately, that's complicated to do in general (mostly for x86
856		// and s930x, but other archs have non-standard instruction lengths also).
857		// Opt to print 16 bytes, which covers most instructions.
858		const maxN = 16
859		n := uintptr(maxN)
860		// We have to be careful, though. If we're near the end of
861		// a page and the following page isn't mapped, we could
862		// segfault. So make sure we don't straddle a page (even though
863		// that could lead to printing an incomplete instruction).
864		// We're assuming here we can read at least the page containing the PC.
865		// I suppose it is possible that the page is mapped executable but not readable?
866		pc := c.sigpc()
867		if n > physPageSize-pc%physPageSize {
868			n = physPageSize - pc%physPageSize
869		}
870		print("instruction bytes:")
871		b := (*[maxN]byte)(unsafe.Pointer(pc))
872		for i := uintptr(0); i < n; i++ {
873			print(" ", hex(b[i]))
874		}
875		println()
876	}
877	print("\n")
878	return gp
879}
880
881// sigpanic turns a synchronous signal into a run-time panic.
882// If the signal handler sees a synchronous panic, it arranges the
883// stack to look like the function where the signal occurred called
884// sigpanic, sets the signal's PC value to sigpanic, and returns from
885// the signal handler. The effect is that the program will act as
886// though the function that got the signal simply called sigpanic
887// instead.
888//
889// This must NOT be nosplit because the linker doesn't know where
890// sigpanic calls can be injected.
891//
892// The signal handler must not inject a call to sigpanic if
893// getg().throwsplit, since sigpanic may need to grow the stack.
894//
895// This is exported via linkname to assembly in runtime/cgo.
896//
897//go:linkname sigpanic
898func sigpanic() {
899	gp := getg()
900	if !canpanic() {
901		throw("unexpected signal during runtime execution")
902	}
903
904	switch gp.sig {
905	case _SIGBUS:
906		if gp.sigcode0 == _BUS_ADRERR && gp.sigcode1 < 0x1000 {
907			panicmem()
908		}
909		// Support runtime/debug.SetPanicOnFault.
910		if gp.paniconfault {
911			panicmemAddr(gp.sigcode1)
912		}
913		print("unexpected fault address ", hex(gp.sigcode1), "\n")
914		throw("fault")
915	case _SIGSEGV:
916		if (gp.sigcode0 == 0 || gp.sigcode0 == _SEGV_MAPERR || gp.sigcode0 == _SEGV_ACCERR) && gp.sigcode1 < 0x1000 {
917			panicmem()
918		}
919		// Support runtime/debug.SetPanicOnFault.
920		if gp.paniconfault {
921			panicmemAddr(gp.sigcode1)
922		}
923		if inUserArenaChunk(gp.sigcode1) {
924			// We could check that the arena chunk is explicitly set to fault,
925			// but the fact that we faulted on accessing it is enough to prove
926			// that it is.
927			print("accessed data from freed user arena ", hex(gp.sigcode1), "\n")
928		} else {
929			print("unexpected fault address ", hex(gp.sigcode1), "\n")
930		}
931		throw("fault")
932	case _SIGFPE:
933		switch gp.sigcode0 {
934		case _FPE_INTDIV:
935			panicdivide()
936		case _FPE_INTOVF:
937			panicoverflow()
938		}
939		panicfloat()
940	}
941
942	if gp.sig >= uint32(len(sigtable)) {
943		// can't happen: we looked up gp.sig in sigtable to decide to call sigpanic
944		throw("unexpected signal value")
945	}
946	panic(errorString(sigtable[gp.sig].name))
947}
948
949// dieFromSignal kills the program with a signal.
950// This provides the expected exit status for the shell.
951// This is only called with fatal signals expected to kill the process.
952//
953//go:nosplit
954//go:nowritebarrierrec
955func dieFromSignal(sig uint32) {
956	unblocksig(sig)
957	// Mark the signal as unhandled to ensure it is forwarded.
958	atomic.Store(&handlingSig[sig], 0)
959	raise(sig)
960
961	// That should have killed us. On some systems, though, raise
962	// sends the signal to the whole process rather than to just
963	// the current thread, which means that the signal may not yet
964	// have been delivered. Give other threads a chance to run and
965	// pick up the signal.
966	osyield()
967	osyield()
968	osyield()
969
970	// If that didn't work, try _SIG_DFL.
971	setsig(sig, _SIG_DFL)
972	raise(sig)
973
974	osyield()
975	osyield()
976	osyield()
977
978	// If we are still somehow running, just exit with the wrong status.
979	exit(2)
980}
981
982// raisebadsignal is called when a signal is received on a non-Go
983// thread, and the Go program does not want to handle it (that is, the
984// program has not called os/signal.Notify for the signal).
985func raisebadsignal(sig uint32, c *sigctxt) {
986	if sig == _SIGPROF {
987		// Ignore profiling signals that arrive on non-Go threads.
988		return
989	}
990
991	var handler uintptr
992	var flags int32
993	if sig >= _NSIG {
994		handler = _SIG_DFL
995	} else {
996		handler = atomic.Loaduintptr(&fwdSig[sig])
997		flags = sigtable[sig].flags
998	}
999
1000	// If the signal is ignored, raising the signal is no-op.
1001	if handler == _SIG_IGN || (handler == _SIG_DFL && flags&_SigIgn != 0) {
1002		return
1003	}
1004
1005	// Reset the signal handler and raise the signal.
1006	// We are currently running inside a signal handler, so the
1007	// signal is blocked. We need to unblock it before raising the
1008	// signal, or the signal we raise will be ignored until we return
1009	// from the signal handler. We know that the signal was unblocked
1010	// before entering the handler, or else we would not have received
1011	// it. That means that we don't have to worry about blocking it
1012	// again.
1013	unblocksig(sig)
1014	setsig(sig, handler)
1015
1016	// If we're linked into a non-Go program we want to try to
1017	// avoid modifying the original context in which the signal
1018	// was raised. If the handler is the default, we know it
1019	// is non-recoverable, so we don't have to worry about
1020	// re-installing sighandler. At this point we can just
1021	// return and the signal will be re-raised and caught by
1022	// the default handler with the correct context.
1023	//
1024	// On FreeBSD, the libthr sigaction code prevents
1025	// this from working so we fall through to raise.
1026	if GOOS != "freebsd" && (isarchive || islibrary) && handler == _SIG_DFL && !c.sigFromUser() {
1027		return
1028	}
1029
1030	raise(sig)
1031
1032	// Give the signal a chance to be delivered.
1033	// In almost all real cases the program is about to crash,
1034	// so sleeping here is not a waste of time.
1035	usleep(1000)
1036
1037	// If the signal didn't cause the program to exit, restore the
1038	// Go signal handler and carry on.
1039	//
1040	// We may receive another instance of the signal before we
1041	// restore the Go handler, but that is not so bad: we know
1042	// that the Go program has been ignoring the signal.
1043	setsig(sig, abi.FuncPCABIInternal(sighandler))
1044}
1045
1046//go:nosplit
1047func crash() {
1048	dieFromSignal(_SIGABRT)
1049}
1050
1051// ensureSigM starts one global, sleeping thread to make sure at least one thread
1052// is available to catch signals enabled for os/signal.
1053func ensureSigM() {
1054	if maskUpdatedChan != nil {
1055		return
1056	}
1057	maskUpdatedChan = make(chan struct{})
1058	disableSigChan = make(chan uint32)
1059	enableSigChan = make(chan uint32)
1060	go func() {
1061		// Signal masks are per-thread, so make sure this goroutine stays on one
1062		// thread.
1063		LockOSThread()
1064		defer UnlockOSThread()
1065		// The sigBlocked mask contains the signals not active for os/signal,
1066		// initially all signals except the essential. When signal.Notify()/Stop is called,
1067		// sigenable/sigdisable in turn notify this thread to update its signal
1068		// mask accordingly.
1069		sigBlocked := sigset_all
1070		for i := range sigtable {
1071			if !blockableSig(uint32(i)) {
1072				sigdelset(&sigBlocked, i)
1073			}
1074		}
1075		sigprocmask(_SIG_SETMASK, &sigBlocked, nil)
1076		for {
1077			select {
1078			case sig := <-enableSigChan:
1079				if sig > 0 {
1080					sigdelset(&sigBlocked, int(sig))
1081				}
1082			case sig := <-disableSigChan:
1083				if sig > 0 && blockableSig(sig) {
1084					sigaddset(&sigBlocked, int(sig))
1085				}
1086			}
1087			sigprocmask(_SIG_SETMASK, &sigBlocked, nil)
1088			maskUpdatedChan <- struct{}{}
1089		}
1090	}()
1091}
1092
1093// This is called when we receive a signal when there is no signal stack.
1094// This can only happen if non-Go code calls sigaltstack to disable the
1095// signal stack.
1096func noSignalStack(sig uint32) {
1097	println("signal", sig, "received on thread with no signal stack")
1098	throw("non-Go code disabled sigaltstack")
1099}
1100
1101// This is called if we receive a signal when there is a signal stack
1102// but we are not on it. This can only happen if non-Go code called
1103// sigaction without setting the SS_ONSTACK flag.
1104func sigNotOnStack(sig uint32, sp uintptr, mp *m) {
1105	println("signal", sig, "received but handler not on signal stack")
1106	print("mp.gsignal stack [", hex(mp.gsignal.stack.lo), " ", hex(mp.gsignal.stack.hi), "], ")
1107	print("mp.g0 stack [", hex(mp.g0.stack.lo), " ", hex(mp.g0.stack.hi), "], sp=", hex(sp), "\n")
1108	throw("non-Go code set up signal handler without SA_ONSTACK flag")
1109}
1110
1111// signalDuringFork is called if we receive a signal while doing a fork.
1112// We do not want signals at that time, as a signal sent to the process
1113// group may be delivered to the child process, causing confusion.
1114// This should never be called, because we block signals across the fork;
1115// this function is just a safety check. See issue 18600 for background.
1116func signalDuringFork(sig uint32) {
1117	println("signal", sig, "received during fork")
1118	throw("signal received during fork")
1119}
1120
1121// This runs on a foreign stack, without an m or a g. No stack split.
1122//
1123//go:nosplit
1124//go:norace
1125//go:nowritebarrierrec
1126func badsignal(sig uintptr, c *sigctxt) {
1127	if !iscgo && !cgoHasExtraM {
1128		// There is no extra M. needm will not be able to grab
1129		// an M. Instead of hanging, just crash.
1130		// Cannot call split-stack function as there is no G.
1131		writeErrStr("fatal: bad g in signal handler\n")
1132		exit(2)
1133		*(*uintptr)(unsafe.Pointer(uintptr(123))) = 2
1134	}
1135	needm(true)
1136	if !sigsend(uint32(sig)) {
1137		// A foreign thread received the signal sig, and the
1138		// Go code does not want to handle it.
1139		raisebadsignal(uint32(sig), c)
1140	}
1141	dropm()
1142}
1143
1144//go:noescape
1145func sigfwd(fn uintptr, sig uint32, info *siginfo, ctx unsafe.Pointer)
1146
1147// Determines if the signal should be handled by Go and if not, forwards the
1148// signal to the handler that was installed before Go's. Returns whether the
1149// signal was forwarded.
1150// This is called by the signal handler, and the world may be stopped.
1151//
1152//go:nosplit
1153//go:nowritebarrierrec
1154func sigfwdgo(sig uint32, info *siginfo, ctx unsafe.Pointer) bool {
1155	if sig >= uint32(len(sigtable)) {
1156		return false
1157	}
1158	fwdFn := atomic.Loaduintptr(&fwdSig[sig])
1159	flags := sigtable[sig].flags
1160
1161	// If we aren't handling the signal, forward it.
1162	if atomic.Load(&handlingSig[sig]) == 0 || !signalsOK {
1163		// If the signal is ignored, doing nothing is the same as forwarding.
1164		if fwdFn == _SIG_IGN || (fwdFn == _SIG_DFL && flags&_SigIgn != 0) {
1165			return true
1166		}
1167		// We are not handling the signal and there is no other handler to forward to.
1168		// Crash with the default behavior.
1169		if fwdFn == _SIG_DFL {
1170			setsig(sig, _SIG_DFL)
1171			dieFromSignal(sig)
1172			return false
1173		}
1174
1175		sigfwd(fwdFn, sig, info, ctx)
1176		return true
1177	}
1178
1179	// This function and its caller sigtrampgo assumes SIGPIPE is delivered on the
1180	// originating thread. This property does not hold on macOS (golang.org/issue/33384),
1181	// so we have no choice but to ignore SIGPIPE.
1182	if (GOOS == "darwin" || GOOS == "ios") && sig == _SIGPIPE {
1183		return true
1184	}
1185
1186	// If there is no handler to forward to, no need to forward.
1187	if fwdFn == _SIG_DFL {
1188		return false
1189	}
1190
1191	c := &sigctxt{info, ctx}
1192	// Only forward synchronous signals and SIGPIPE.
1193	// Unfortunately, user generated SIGPIPEs will also be forwarded, because si_code
1194	// is set to _SI_USER even for a SIGPIPE raised from a write to a closed socket
1195	// or pipe.
1196	if (c.sigFromUser() || flags&_SigPanic == 0) && sig != _SIGPIPE {
1197		return false
1198	}
1199	// Determine if the signal occurred inside Go code. We test that:
1200	//   (1) we weren't in VDSO page,
1201	//   (2) we were in a goroutine (i.e., m.curg != nil), and
1202	//   (3) we weren't in CGO.
1203	//   (4) we weren't in dropped extra m.
1204	gp := sigFetchG(c)
1205	if gp != nil && gp.m != nil && gp.m.curg != nil && !gp.m.isExtraInC && !gp.m.incgo {
1206		return false
1207	}
1208
1209	// Signal not handled by Go, forward it.
1210	if fwdFn != _SIG_IGN {
1211		sigfwd(fwdFn, sig, info, ctx)
1212	}
1213
1214	return true
1215}
1216
1217// sigsave saves the current thread's signal mask into *p.
1218// This is used to preserve the non-Go signal mask when a non-Go
1219// thread calls a Go function.
1220// This is nosplit and nowritebarrierrec because it is called by needm
1221// which may be called on a non-Go thread with no g available.
1222//
1223//go:nosplit
1224//go:nowritebarrierrec
1225func sigsave(p *sigset) {
1226	sigprocmask(_SIG_SETMASK, nil, p)
1227}
1228
1229// msigrestore sets the current thread's signal mask to sigmask.
1230// This is used to restore the non-Go signal mask when a non-Go thread
1231// calls a Go function.
1232// This is nosplit and nowritebarrierrec because it is called by dropm
1233// after g has been cleared.
1234//
1235//go:nosplit
1236//go:nowritebarrierrec
1237func msigrestore(sigmask sigset) {
1238	sigprocmask(_SIG_SETMASK, &sigmask, nil)
1239}
1240
1241// sigsetAllExiting is used by sigblock(true) when a thread is
1242// exiting.
1243var sigsetAllExiting = func() sigset {
1244	res := sigset_all
1245
1246	// Apply GOOS-specific overrides here, rather than in osinit,
1247	// because osinit may be called before sigsetAllExiting is
1248	// initialized (#51913).
1249	if GOOS == "linux" && iscgo {
1250		// #42494 glibc and musl reserve some signals for
1251		// internal use and require they not be blocked by
1252		// the rest of a normal C runtime. When the go runtime
1253		// blocks...unblocks signals, temporarily, the blocked
1254		// interval of time is generally very short. As such,
1255		// these expectations of *libc code are mostly met by
1256		// the combined go+cgo system of threads. However,
1257		// when go causes a thread to exit, via a return from
1258		// mstart(), the combined runtime can deadlock if
1259		// these signals are blocked. Thus, don't block these
1260		// signals when exiting threads.
1261		// - glibc: SIGCANCEL (32), SIGSETXID (33)
1262		// - musl: SIGTIMER (32), SIGCANCEL (33), SIGSYNCCALL (34)
1263		sigdelset(&res, 32)
1264		sigdelset(&res, 33)
1265		sigdelset(&res, 34)
1266	}
1267
1268	return res
1269}()
1270
1271// sigblock blocks signals in the current thread's signal mask.
1272// This is used to block signals while setting up and tearing down g
1273// when a non-Go thread calls a Go function. When a thread is exiting
1274// we use the sigsetAllExiting value, otherwise the OS specific
1275// definition of sigset_all is used.
1276// This is nosplit and nowritebarrierrec because it is called by needm
1277// which may be called on a non-Go thread with no g available.
1278//
1279//go:nosplit
1280//go:nowritebarrierrec
1281func sigblock(exiting bool) {
1282	if exiting {
1283		sigprocmask(_SIG_SETMASK, &sigsetAllExiting, nil)
1284		return
1285	}
1286	sigprocmask(_SIG_SETMASK, &sigset_all, nil)
1287}
1288
1289// unblocksig removes sig from the current thread's signal mask.
1290// This is nosplit and nowritebarrierrec because it is called from
1291// dieFromSignal, which can be called by sigfwdgo while running in the
1292// signal handler, on the signal stack, with no g available.
1293//
1294//go:nosplit
1295//go:nowritebarrierrec
1296func unblocksig(sig uint32) {
1297	var set sigset
1298	sigaddset(&set, int(sig))
1299	sigprocmask(_SIG_UNBLOCK, &set, nil)
1300}
1301
1302// minitSignals is called when initializing a new m to set the
1303// thread's alternate signal stack and signal mask.
1304func minitSignals() {
1305	minitSignalStack()
1306	minitSignalMask()
1307}
1308
1309// minitSignalStack is called when initializing a new m to set the
1310// alternate signal stack. If the alternate signal stack is not set
1311// for the thread (the normal case) then set the alternate signal
1312// stack to the gsignal stack. If the alternate signal stack is set
1313// for the thread (the case when a non-Go thread sets the alternate
1314// signal stack and then calls a Go function) then set the gsignal
1315// stack to the alternate signal stack. We also set the alternate
1316// signal stack to the gsignal stack if cgo is not used (regardless
1317// of whether it is already set). Record which choice was made in
1318// newSigstack, so that it can be undone in unminit.
1319func minitSignalStack() {
1320	mp := getg().m
1321	var st stackt
1322	sigaltstack(nil, &st)
1323	if st.ss_flags&_SS_DISABLE != 0 || !iscgo {
1324		signalstack(&mp.gsignal.stack)
1325		mp.newSigstack = true
1326	} else {
1327		setGsignalStack(&st, &mp.goSigStack)
1328		mp.newSigstack = false
1329	}
1330}
1331
1332// minitSignalMask is called when initializing a new m to set the
1333// thread's signal mask. When this is called all signals have been
1334// blocked for the thread.  This starts with m.sigmask, which was set
1335// either from initSigmask for a newly created thread or by calling
1336// sigsave if this is a non-Go thread calling a Go function. It
1337// removes all essential signals from the mask, thus causing those
1338// signals to not be blocked. Then it sets the thread's signal mask.
1339// After this is called the thread can receive signals.
1340func minitSignalMask() {
1341	nmask := getg().m.sigmask
1342	for i := range sigtable {
1343		if !blockableSig(uint32(i)) {
1344			sigdelset(&nmask, i)
1345		}
1346	}
1347	sigprocmask(_SIG_SETMASK, &nmask, nil)
1348}
1349
1350// unminitSignals is called from dropm, via unminit, to undo the
1351// effect of calling minit on a non-Go thread.
1352//
1353//go:nosplit
1354func unminitSignals() {
1355	if getg().m.newSigstack {
1356		st := stackt{ss_flags: _SS_DISABLE}
1357		sigaltstack(&st, nil)
1358	} else {
1359		// We got the signal stack from someone else. Restore
1360		// the Go-allocated stack in case this M gets reused
1361		// for another thread (e.g., it's an extram). Also, on
1362		// Android, libc allocates a signal stack for all
1363		// threads, so it's important to restore the Go stack
1364		// even on Go-created threads so we can free it.
1365		restoreGsignalStack(&getg().m.goSigStack)
1366	}
1367}
1368
1369// blockableSig reports whether sig may be blocked by the signal mask.
1370// We never want to block the signals marked _SigUnblock;
1371// these are the synchronous signals that turn into a Go panic.
1372// We never want to block the preemption signal if it is being used.
1373// In a Go program--not a c-archive/c-shared--we never want to block
1374// the signals marked _SigKill or _SigThrow, as otherwise it's possible
1375// for all running threads to block them and delay their delivery until
1376// we start a new thread. When linked into a C program we let the C code
1377// decide on the disposition of those signals.
1378func blockableSig(sig uint32) bool {
1379	flags := sigtable[sig].flags
1380	if flags&_SigUnblock != 0 {
1381		return false
1382	}
1383	if sig == sigPreempt && preemptMSupported && debug.asyncpreemptoff == 0 {
1384		return false
1385	}
1386	if isarchive || islibrary {
1387		return true
1388	}
1389	return flags&(_SigKill|_SigThrow) == 0
1390}
1391
1392// gsignalStack saves the fields of the gsignal stack changed by
1393// setGsignalStack.
1394type gsignalStack struct {
1395	stack       stack
1396	stackguard0 uintptr
1397	stackguard1 uintptr
1398	stktopsp    uintptr
1399}
1400
1401// setGsignalStack sets the gsignal stack of the current m to an
1402// alternate signal stack returned from the sigaltstack system call.
1403// It saves the old values in *old for use by restoreGsignalStack.
1404// This is used when handling a signal if non-Go code has set the
1405// alternate signal stack.
1406//
1407//go:nosplit
1408//go:nowritebarrierrec
1409func setGsignalStack(st *stackt, old *gsignalStack) {
1410	gp := getg()
1411	if old != nil {
1412		old.stack = gp.m.gsignal.stack
1413		old.stackguard0 = gp.m.gsignal.stackguard0
1414		old.stackguard1 = gp.m.gsignal.stackguard1
1415		old.stktopsp = gp.m.gsignal.stktopsp
1416	}
1417	stsp := uintptr(unsafe.Pointer(st.ss_sp))
1418	gp.m.gsignal.stack.lo = stsp
1419	gp.m.gsignal.stack.hi = stsp + st.ss_size
1420	gp.m.gsignal.stackguard0 = stsp + stackGuard
1421	gp.m.gsignal.stackguard1 = stsp + stackGuard
1422}
1423
1424// restoreGsignalStack restores the gsignal stack to the value it had
1425// before entering the signal handler.
1426//
1427//go:nosplit
1428//go:nowritebarrierrec
1429func restoreGsignalStack(st *gsignalStack) {
1430	gp := getg().m.gsignal
1431	gp.stack = st.stack
1432	gp.stackguard0 = st.stackguard0
1433	gp.stackguard1 = st.stackguard1
1434	gp.stktopsp = st.stktopsp
1435}
1436
1437// signalstack sets the current thread's alternate signal stack to s.
1438//
1439//go:nosplit
1440func signalstack(s *stack) {
1441	st := stackt{ss_size: s.hi - s.lo}
1442	setSignalstackSP(&st, s.lo)
1443	sigaltstack(&st, nil)
1444}
1445
1446// setsigsegv is used on darwin/arm64 to fake a segmentation fault.
1447//
1448// This is exported via linkname to assembly in runtime/cgo.
1449//
1450//go:nosplit
1451//go:linkname setsigsegv
1452func setsigsegv(pc uintptr) {
1453	gp := getg()
1454	gp.sig = _SIGSEGV
1455	gp.sigpc = pc
1456	gp.sigcode0 = _SEGV_MAPERR
1457	gp.sigcode1 = 0 // TODO: emulate si_addr
1458}
1459