signal.c 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. /*
  2. * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
  3. * Licensed under the GPL
  4. */
  5. #include <linux/module.h>
  6. #include <linux/ptrace.h>
  7. #include <linux/sched.h>
  8. #include <asm/siginfo.h>
  9. #include <asm/signal.h>
  10. #include <asm/unistd.h>
  11. #include "frame_kern.h"
  12. #include "kern_util.h"
  13. EXPORT_SYMBOL(block_signals);
  14. EXPORT_SYMBOL(unblock_signals);
  15. #define _S(nr) (1<<((nr)-1))
  16. #define _BLOCKABLE (~(_S(SIGKILL) | _S(SIGSTOP)))
  17. /*
  18. * OK, we're invoking a handler
  19. */
  20. static void handle_signal(struct pt_regs *regs, unsigned long signr,
  21. struct k_sigaction *ka, siginfo_t *info)
  22. {
  23. sigset_t *oldset = sigmask_to_save();
  24. unsigned long sp;
  25. int err;
  26. /* Did we come from a system call? */
  27. if (PT_REGS_SYSCALL_NR(regs) >= 0) {
  28. /* If so, check system call restarting.. */
  29. switch (PT_REGS_SYSCALL_RET(regs)) {
  30. case -ERESTART_RESTARTBLOCK:
  31. case -ERESTARTNOHAND:
  32. PT_REGS_SYSCALL_RET(regs) = -EINTR;
  33. break;
  34. case -ERESTARTSYS:
  35. if (!(ka->sa.sa_flags & SA_RESTART)) {
  36. PT_REGS_SYSCALL_RET(regs) = -EINTR;
  37. break;
  38. }
  39. /* fallthrough */
  40. case -ERESTARTNOINTR:
  41. PT_REGS_RESTART_SYSCALL(regs);
  42. PT_REGS_ORIG_SYSCALL(regs) = PT_REGS_SYSCALL_NR(regs);
  43. break;
  44. }
  45. }
  46. sp = PT_REGS_SP(regs);
  47. if ((ka->sa.sa_flags & SA_ONSTACK) && (sas_ss_flags(sp) == 0))
  48. sp = current->sas_ss_sp + current->sas_ss_size;
  49. #ifdef CONFIG_ARCH_HAS_SC_SIGNALS
  50. if (!(ka->sa.sa_flags & SA_SIGINFO))
  51. err = setup_signal_stack_sc(sp, signr, ka, regs, oldset);
  52. else
  53. #endif
  54. err = setup_signal_stack_si(sp, signr, ka, regs, info, oldset);
  55. if (err)
  56. force_sigsegv(signr, current);
  57. else
  58. block_sigmask(ka, signr);
  59. }
  60. static int kern_do_signal(struct pt_regs *regs)
  61. {
  62. struct k_sigaction ka_copy;
  63. siginfo_t info;
  64. int sig, handled_sig = 0;
  65. while ((sig = get_signal_to_deliver(&info, &ka_copy, regs, NULL)) > 0) {
  66. handled_sig = 1;
  67. /* Whee! Actually deliver the signal. */
  68. handle_signal(regs, sig, &ka_copy, &info);
  69. }
  70. /* Did we come from a system call? */
  71. if (!handled_sig && (PT_REGS_SYSCALL_NR(regs) >= 0)) {
  72. /* Restart the system call - no handlers present */
  73. switch (PT_REGS_SYSCALL_RET(regs)) {
  74. case -ERESTARTNOHAND:
  75. case -ERESTARTSYS:
  76. case -ERESTARTNOINTR:
  77. PT_REGS_ORIG_SYSCALL(regs) = PT_REGS_SYSCALL_NR(regs);
  78. PT_REGS_RESTART_SYSCALL(regs);
  79. break;
  80. case -ERESTART_RESTARTBLOCK:
  81. PT_REGS_ORIG_SYSCALL(regs) = __NR_restart_syscall;
  82. PT_REGS_RESTART_SYSCALL(regs);
  83. break;
  84. }
  85. }
  86. /*
  87. * This closes a way to execute a system call on the host. If
  88. * you set a breakpoint on a system call instruction and singlestep
  89. * from it, the tracing thread used to PTRACE_SINGLESTEP the process
  90. * rather than PTRACE_SYSCALL it, allowing the system call to execute
  91. * on the host. The tracing thread will check this flag and
  92. * PTRACE_SYSCALL if necessary.
  93. */
  94. if (current->ptrace & PT_DTRACE)
  95. current->thread.singlestep_syscall =
  96. is_syscall(PT_REGS_IP(&current->thread.regs));
  97. /*
  98. * if there's no signal to deliver, we just put the saved sigmask
  99. * back
  100. */
  101. if (!handled_sig)
  102. restore_saved_sigmask();
  103. return handled_sig;
  104. }
  105. int do_signal(void)
  106. {
  107. return kern_do_signal(&current->thread.regs);
  108. }
  109. /*
  110. * Atomically swap in the new signal mask, and wait for a signal.
  111. */
  112. long sys_sigsuspend(int history0, int history1, old_sigset_t mask)
  113. {
  114. sigset_t blocked;
  115. siginitset(&blocked, mask);
  116. return sigsuspend(&blocked);
  117. }
  118. long sys_sigaltstack(const stack_t __user *uss, stack_t __user *uoss)
  119. {
  120. return do_sigaltstack(uss, uoss, PT_REGS_SP(&current->thread.regs));
  121. }