signal.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386
  1. /*
  2. * linux/arch/m32r/kernel/signal.c
  3. *
  4. * Copyright (c) 2003 Hitoshi Yamamoto
  5. *
  6. * Taken from i386 version.
  7. * Copyright (C) 1991, 1992 Linus Torvalds
  8. *
  9. * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
  10. * 2000-06-20 Pentium III FXSR, SSE support by Gareth Hughes
  11. */
  12. #include <linux/sched.h>
  13. #include <linux/mm.h>
  14. #include <linux/smp.h>
  15. #include <linux/kernel.h>
  16. #include <linux/signal.h>
  17. #include <linux/errno.h>
  18. #include <linux/wait.h>
  19. #include <linux/unistd.h>
  20. #include <linux/stddef.h>
  21. #include <linux/personality.h>
  22. #include <linux/freezer.h>
  23. #include <linux/tracehook.h>
  24. #include <asm/cacheflush.h>
  25. #include <asm/ucontext.h>
  26. #include <asm/uaccess.h>
  27. #define DEBUG_SIG 0
  28. #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
  29. asmlinkage int
  30. sys_sigaltstack(const stack_t __user *uss, stack_t __user *uoss,
  31. unsigned long r2, unsigned long r3, unsigned long r4,
  32. unsigned long r5, unsigned long r6, struct pt_regs *regs)
  33. {
  34. return do_sigaltstack(uss, uoss, regs->spu);
  35. }
  36. /*
  37. * Do a signal return; undo the signal stack.
  38. */
  39. struct rt_sigframe
  40. {
  41. int sig;
  42. struct siginfo __user *pinfo;
  43. void __user *puc;
  44. struct siginfo info;
  45. struct ucontext uc;
  46. // struct _fpstate fpstate;
  47. };
  48. static int
  49. restore_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc,
  50. int *r0_p)
  51. {
  52. unsigned int err = 0;
  53. /* Always make any pending restarted system calls return -EINTR */
  54. current_thread_info()->restart_block.fn = do_no_restart_syscall;
  55. #define COPY(x) err |= __get_user(regs->x, &sc->sc_##x)
  56. COPY(r4);
  57. COPY(r5);
  58. COPY(r6);
  59. COPY(pt_regs);
  60. /* COPY(r0); Skip r0 */
  61. COPY(r1);
  62. COPY(r2);
  63. COPY(r3);
  64. COPY(r7);
  65. COPY(r8);
  66. COPY(r9);
  67. COPY(r10);
  68. COPY(r11);
  69. COPY(r12);
  70. COPY(acc0h);
  71. COPY(acc0l);
  72. COPY(acc1h); /* ISA_DSP_LEVEL2 only */
  73. COPY(acc1l); /* ISA_DSP_LEVEL2 only */
  74. COPY(psw);
  75. COPY(bpc);
  76. COPY(bbpsw);
  77. COPY(bbpc);
  78. COPY(spu);
  79. COPY(fp);
  80. COPY(lr);
  81. COPY(spi);
  82. #undef COPY
  83. regs->syscall_nr = -1; /* disable syscall checks */
  84. err |= __get_user(*r0_p, &sc->sc_r0);
  85. return err;
  86. }
  87. asmlinkage int
  88. sys_rt_sigreturn(unsigned long r0, unsigned long r1,
  89. unsigned long r2, unsigned long r3, unsigned long r4,
  90. unsigned long r5, unsigned long r6, struct pt_regs *regs)
  91. {
  92. struct rt_sigframe __user *frame = (struct rt_sigframe __user *)regs->spu;
  93. sigset_t set;
  94. int result;
  95. if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
  96. goto badframe;
  97. if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
  98. goto badframe;
  99. sigdelsetmask(&set, ~_BLOCKABLE);
  100. set_current_blocked(&set);
  101. if (restore_sigcontext(regs, &frame->uc.uc_mcontext, &result))
  102. goto badframe;
  103. if (do_sigaltstack(&frame->uc.uc_stack, NULL, regs->spu) == -EFAULT)
  104. goto badframe;
  105. return result;
  106. badframe:
  107. force_sig(SIGSEGV, current);
  108. return 0;
  109. }
  110. /*
  111. * Set up a signal frame.
  112. */
  113. static int
  114. setup_sigcontext(struct sigcontext __user *sc, struct pt_regs *regs,
  115. unsigned long mask)
  116. {
  117. int err = 0;
  118. #define COPY(x) err |= __put_user(regs->x, &sc->sc_##x)
  119. COPY(r4);
  120. COPY(r5);
  121. COPY(r6);
  122. COPY(pt_regs);
  123. COPY(r0);
  124. COPY(r1);
  125. COPY(r2);
  126. COPY(r3);
  127. COPY(r7);
  128. COPY(r8);
  129. COPY(r9);
  130. COPY(r10);
  131. COPY(r11);
  132. COPY(r12);
  133. COPY(acc0h);
  134. COPY(acc0l);
  135. COPY(acc1h); /* ISA_DSP_LEVEL2 only */
  136. COPY(acc1l); /* ISA_DSP_LEVEL2 only */
  137. COPY(psw);
  138. COPY(bpc);
  139. COPY(bbpsw);
  140. COPY(bbpc);
  141. COPY(spu);
  142. COPY(fp);
  143. COPY(lr);
  144. COPY(spi);
  145. #undef COPY
  146. err |= __put_user(mask, &sc->oldmask);
  147. return err;
  148. }
  149. /*
  150. * Determine which stack to use..
  151. */
  152. static inline void __user *
  153. get_sigframe(struct k_sigaction *ka, unsigned long sp, size_t frame_size)
  154. {
  155. /* This is the X/Open sanctioned signal stack switching. */
  156. if (ka->sa.sa_flags & SA_ONSTACK) {
  157. if (sas_ss_flags(sp) == 0)
  158. sp = current->sas_ss_sp + current->sas_ss_size;
  159. }
  160. return (void __user *)((sp - frame_size) & -8ul);
  161. }
  162. static int setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
  163. sigset_t *set, struct pt_regs *regs)
  164. {
  165. struct rt_sigframe __user *frame;
  166. int err = 0;
  167. int signal;
  168. frame = get_sigframe(ka, regs->spu, sizeof(*frame));
  169. if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
  170. goto give_sigsegv;
  171. signal = current_thread_info()->exec_domain
  172. && current_thread_info()->exec_domain->signal_invmap
  173. && sig < 32
  174. ? current_thread_info()->exec_domain->signal_invmap[sig]
  175. : sig;
  176. err |= __put_user(signal, &frame->sig);
  177. if (err)
  178. goto give_sigsegv;
  179. err |= __put_user(&frame->info, &frame->pinfo);
  180. err |= __put_user(&frame->uc, &frame->puc);
  181. err |= copy_siginfo_to_user(&frame->info, info);
  182. if (err)
  183. goto give_sigsegv;
  184. /* Create the ucontext. */
  185. err |= __put_user(0, &frame->uc.uc_flags);
  186. err |= __put_user(0, &frame->uc.uc_link);
  187. err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
  188. err |= __put_user(sas_ss_flags(regs->spu),
  189. &frame->uc.uc_stack.ss_flags);
  190. err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
  191. err |= setup_sigcontext(&frame->uc.uc_mcontext, regs, set->sig[0]);
  192. err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
  193. if (err)
  194. goto give_sigsegv;
  195. /* Set up to return from userspace. */
  196. regs->lr = (unsigned long)ka->sa.sa_restorer;
  197. /* Set up registers for signal handler */
  198. regs->spu = (unsigned long)frame;
  199. regs->r0 = signal; /* Arg for signal handler */
  200. regs->r1 = (unsigned long)&frame->info;
  201. regs->r2 = (unsigned long)&frame->uc;
  202. regs->bpc = (unsigned long)ka->sa.sa_handler;
  203. set_fs(USER_DS);
  204. #if DEBUG_SIG
  205. printk("SIG deliver (%s:%d): sp=%p pc=%p\n",
  206. current->comm, current->pid, frame, regs->pc);
  207. #endif
  208. return 0;
  209. give_sigsegv:
  210. force_sigsegv(sig, current);
  211. return -EFAULT;
  212. }
  213. static int prev_insn(struct pt_regs *regs)
  214. {
  215. u16 inst;
  216. if (get_user(inst, (u16 __user *)(regs->bpc - 2)))
  217. return -EFAULT;
  218. if ((inst & 0xfff0) == 0x10f0) /* trap ? */
  219. regs->bpc -= 2;
  220. else
  221. regs->bpc -= 4;
  222. regs->syscall_nr = -1;
  223. return 0;
  224. }
  225. /*
  226. * OK, we're invoking a handler
  227. */
  228. static int
  229. handle_signal(unsigned long sig, struct k_sigaction *ka, siginfo_t *info,
  230. sigset_t *oldset, struct pt_regs *regs)
  231. {
  232. /* Are we from a system call? */
  233. if (regs->syscall_nr >= 0) {
  234. /* If so, check system call restarting.. */
  235. switch (regs->r0) {
  236. case -ERESTART_RESTARTBLOCK:
  237. case -ERESTARTNOHAND:
  238. regs->r0 = -EINTR;
  239. break;
  240. case -ERESTARTSYS:
  241. if (!(ka->sa.sa_flags & SA_RESTART)) {
  242. regs->r0 = -EINTR;
  243. break;
  244. }
  245. /* fallthrough */
  246. case -ERESTARTNOINTR:
  247. regs->r0 = regs->orig_r0;
  248. if (prev_insn(regs) < 0)
  249. return -EFAULT;
  250. }
  251. }
  252. /* Set up the stack frame */
  253. if (setup_rt_frame(sig, ka, info, oldset, regs))
  254. return -EFAULT;
  255. block_sigmask(ka, sig);
  256. return 0;
  257. }
  258. /*
  259. * Note that 'init' is a special process: it doesn't get signals it doesn't
  260. * want to handle. Thus you cannot kill init even with a SIGKILL even by
  261. * mistake.
  262. */
  263. static void do_signal(struct pt_regs *regs)
  264. {
  265. siginfo_t info;
  266. int signr;
  267. struct k_sigaction ka;
  268. sigset_t *oldset;
  269. /*
  270. * We want the common case to go fast, which
  271. * is why we may in certain cases get here from
  272. * kernel mode. Just return without doing anything
  273. * if so.
  274. */
  275. if (!user_mode(regs))
  276. return;
  277. if (try_to_freeze())
  278. goto no_signal;
  279. if (test_thread_flag(TIF_RESTORE_SIGMASK))
  280. oldset = &current->saved_sigmask;
  281. else
  282. oldset = &current->blocked;
  283. signr = get_signal_to_deliver(&info, &ka, regs, NULL);
  284. if (signr > 0) {
  285. /* Re-enable any watchpoints before delivering the
  286. * signal to user space. The processor register will
  287. * have been cleared if the watchpoint triggered
  288. * inside the kernel.
  289. */
  290. /* Whee! Actually deliver the signal. */
  291. if (handle_signal(signr, &ka, &info, oldset, regs) == 0)
  292. clear_thread_flag(TIF_RESTORE_SIGMASK);
  293. return;
  294. }
  295. no_signal:
  296. /* Did we come from a system call? */
  297. if (regs->syscall_nr >= 0) {
  298. /* Restart the system call - no handlers present */
  299. if (regs->r0 == -ERESTARTNOHAND ||
  300. regs->r0 == -ERESTARTSYS ||
  301. regs->r0 == -ERESTARTNOINTR) {
  302. regs->r0 = regs->orig_r0;
  303. prev_insn(regs);
  304. } else if (regs->r0 == -ERESTART_RESTARTBLOCK){
  305. regs->r0 = regs->orig_r0;
  306. regs->r7 = __NR_restart_syscall;
  307. prev_insn(regs);
  308. }
  309. }
  310. restore_saved_sigmask();
  311. }
  312. /*
  313. * notification of userspace execution resumption
  314. * - triggered by current->work.notify_resume
  315. */
  316. void do_notify_resume(struct pt_regs *regs, __u32 thread_info_flags)
  317. {
  318. /* Pending single-step? */
  319. if (thread_info_flags & _TIF_SINGLESTEP)
  320. clear_thread_flag(TIF_SINGLESTEP);
  321. /* deal with pending signal delivery */
  322. if (thread_info_flags & _TIF_SIGPENDING)
  323. do_signal(regs);
  324. if (thread_info_flags & _TIF_NOTIFY_RESUME) {
  325. clear_thread_flag(TIF_NOTIFY_RESUME);
  326. tracehook_notify_resume(regs);
  327. }
  328. clear_thread_flag(TIF_IRET);
  329. }