signal.c 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. /*
  2. * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
  3. * Licensed under the GPL
  4. */
  5. #include <linux/module.h>
  6. #include <linux/ptrace.h>
  7. #include <linux/sched.h>
  8. #include <asm/siginfo.h>
  9. #include <asm/signal.h>
  10. #include <asm/unistd.h>
  11. #include "frame_kern.h"
  12. #include "kern_util.h"
  13. EXPORT_SYMBOL(block_signals);
  14. EXPORT_SYMBOL(unblock_signals);
  15. #define _S(nr) (1<<((nr)-1))
  16. #define _BLOCKABLE (~(_S(SIGKILL) | _S(SIGSTOP)))
  17. /*
  18. * OK, we're invoking a handler
  19. */
  20. static int handle_signal(struct pt_regs *regs, unsigned long signr,
  21. struct k_sigaction *ka, struct siginfo *info,
  22. sigset_t *oldset)
  23. {
  24. unsigned long sp;
  25. int err;
  26. /* Always make any pending restarted system calls return -EINTR */
  27. current_thread_info()->restart_block.fn = do_no_restart_syscall;
  28. /* Did we come from a system call? */
  29. if (PT_REGS_SYSCALL_NR(regs) >= 0) {
  30. /* If so, check system call restarting.. */
  31. switch (PT_REGS_SYSCALL_RET(regs)) {
  32. case -ERESTART_RESTARTBLOCK:
  33. case -ERESTARTNOHAND:
  34. PT_REGS_SYSCALL_RET(regs) = -EINTR;
  35. break;
  36. case -ERESTARTSYS:
  37. if (!(ka->sa.sa_flags & SA_RESTART)) {
  38. PT_REGS_SYSCALL_RET(regs) = -EINTR;
  39. break;
  40. }
  41. /* fallthrough */
  42. case -ERESTARTNOINTR:
  43. PT_REGS_RESTART_SYSCALL(regs);
  44. PT_REGS_ORIG_SYSCALL(regs) = PT_REGS_SYSCALL_NR(regs);
  45. break;
  46. }
  47. }
  48. sp = PT_REGS_SP(regs);
  49. if ((ka->sa.sa_flags & SA_ONSTACK) && (sas_ss_flags(sp) == 0))
  50. sp = current->sas_ss_sp + current->sas_ss_size;
  51. #ifdef CONFIG_ARCH_HAS_SC_SIGNALS
  52. if (!(ka->sa.sa_flags & SA_SIGINFO))
  53. err = setup_signal_stack_sc(sp, signr, ka, regs, oldset);
  54. else
  55. #endif
  56. err = setup_signal_stack_si(sp, signr, ka, regs, info, oldset);
  57. if (err)
  58. force_sigsegv(signr, current);
  59. else
  60. block_sigmask(ka, signr);
  61. return err;
  62. }
  63. static int kern_do_signal(struct pt_regs *regs)
  64. {
  65. struct k_sigaction ka_copy;
  66. struct siginfo info;
  67. sigset_t *oldset;
  68. int sig, handled_sig = 0;
  69. if (test_thread_flag(TIF_RESTORE_SIGMASK))
  70. oldset = &current->saved_sigmask;
  71. else
  72. oldset = &current->blocked;
  73. while ((sig = get_signal_to_deliver(&info, &ka_copy, regs, NULL)) > 0) {
  74. handled_sig = 1;
  75. /* Whee! Actually deliver the signal. */
  76. if (!handle_signal(regs, sig, &ka_copy, &info, oldset)) {
  77. /*
  78. * a signal was successfully delivered; the saved
  79. * sigmask will have been stored in the signal frame,
  80. * and will be restored by sigreturn, so we can simply
  81. * clear the TIF_RESTORE_SIGMASK flag
  82. */
  83. if (test_thread_flag(TIF_RESTORE_SIGMASK))
  84. clear_thread_flag(TIF_RESTORE_SIGMASK);
  85. break;
  86. }
  87. }
  88. /* Did we come from a system call? */
  89. if (!handled_sig && (PT_REGS_SYSCALL_NR(regs) >= 0)) {
  90. /* Restart the system call - no handlers present */
  91. switch (PT_REGS_SYSCALL_RET(regs)) {
  92. case -ERESTARTNOHAND:
  93. case -ERESTARTSYS:
  94. case -ERESTARTNOINTR:
  95. PT_REGS_ORIG_SYSCALL(regs) = PT_REGS_SYSCALL_NR(regs);
  96. PT_REGS_RESTART_SYSCALL(regs);
  97. break;
  98. case -ERESTART_RESTARTBLOCK:
  99. PT_REGS_ORIG_SYSCALL(regs) = __NR_restart_syscall;
  100. PT_REGS_RESTART_SYSCALL(regs);
  101. break;
  102. }
  103. }
  104. /*
  105. * This closes a way to execute a system call on the host. If
  106. * you set a breakpoint on a system call instruction and singlestep
  107. * from it, the tracing thread used to PTRACE_SINGLESTEP the process
  108. * rather than PTRACE_SYSCALL it, allowing the system call to execute
  109. * on the host. The tracing thread will check this flag and
  110. * PTRACE_SYSCALL if necessary.
  111. */
  112. if (current->ptrace & PT_DTRACE)
  113. current->thread.singlestep_syscall =
  114. is_syscall(PT_REGS_IP(&current->thread.regs));
  115. /*
  116. * if there's no signal to deliver, we just put the saved sigmask
  117. * back
  118. */
  119. if (!handled_sig && test_thread_flag(TIF_RESTORE_SIGMASK)) {
  120. clear_thread_flag(TIF_RESTORE_SIGMASK);
  121. sigprocmask(SIG_SETMASK, &current->saved_sigmask, NULL);
  122. }
  123. return handled_sig;
  124. }
  125. int do_signal(void)
  126. {
  127. return kern_do_signal(&current->thread.regs);
  128. }
  129. /*
  130. * Atomically swap in the new signal mask, and wait for a signal.
  131. */
  132. long sys_sigsuspend(int history0, int history1, old_sigset_t mask)
  133. {
  134. sigset_t blocked;
  135. mask &= _BLOCKABLE;
  136. siginitset(&blocked, mask);
  137. set_current_blocked(&blocked);
  138. current->state = TASK_INTERRUPTIBLE;
  139. schedule();
  140. set_thread_flag(TIF_RESTORE_SIGMASK);
  141. return -ERESTARTNOHAND;
  142. }
  143. long sys_sigaltstack(const stack_t __user *uss, stack_t __user *uoss)
  144. {
  145. return do_sigaltstack(uss, uoss, PT_REGS_SP(&current->thread.regs));
  146. }