Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Copyright (C) 2004 PathScale, Inc | |
ba180fd4 | 3 | * Copyright (C) 2004 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) |
1da177e4 LT |
4 | * Licensed under the GPL |
5 | */ | |
6 | ||
0805d89c | 7 | #include <stdlib.h> |
0805d89c | 8 | #include <stdarg.h> |
ba180fd4 JD |
9 | #include <errno.h> |
10 | #include <signal.h> | |
11 | #include <strings.h> | |
37185b33 AV |
12 | #include <as-layout.h> |
13 | #include <kern_util.h> | |
14 | #include <os.h> | |
15 | #include <sysdep/mcontext.h> | |
d3c1cfcd | 16 | #include "internal.h" |
1da177e4 | 17 | |
72383d43 | 18 | void (*sig_info[NSIG])(int, struct siginfo *, struct uml_pt_regs *) = { |
75ada8ff JD |
19 | [SIGTRAP] = relay_signal, |
20 | [SIGFPE] = relay_signal, | |
21 | [SIGILL] = relay_signal, | |
22 | [SIGWINCH] = winch, | |
23 | [SIGBUS] = bus_handler, | |
24 | [SIGSEGV] = segv_handler, | |
25 | [SIGIO] = sigio_handler, | |
26 | [SIGVTALRM] = timer_handler }; | |
27 | ||
9a8c1359 | 28 | static void sig_handler_common(int sig, struct siginfo *si, mcontext_t *mc) |
75ada8ff | 29 | { |
e6a2d1f7 JD |
30 | struct uml_pt_regs r; |
31 | int save_errno = errno; | |
75ada8ff | 32 | |
e6a2d1f7 | 33 | r.is_user = 0; |
75ada8ff | 34 | if (sig == SIGSEGV) { |
e6a2d1f7 | 35 | /* For segfaults, we want the data from the sigcontext. */ |
ab1c0cc7 | 36 | get_regs_from_mc(&r, mc); |
248b74c7 | 37 | GET_FAULTINFO_FROM_MC(r.faultinfo, mc); |
e6a2d1f7 | 38 | } |
75ada8ff | 39 | |
e6a2d1f7 | 40 | /* enable signals if sig isn't IRQ signal */ |
75ada8ff JD |
41 | if ((sig != SIGIO) && (sig != SIGWINCH) && (sig != SIGVTALRM)) |
42 | unblock_signals(); | |
43 | ||
d3c1cfcd | 44 | (*sig_info[sig])(sig, si, &r); |
75ada8ff JD |
45 | |
46 | errno = save_errno; | |
75ada8ff JD |
47 | } |
48 | ||
ba180fd4 | 49 | /* |
61b63c55 | 50 | * These are the asynchronous signals. SIGPROF is excluded because we want to |
1d7173ba JD |
51 | * be able to profile all of UML, not just the non-critical sections. If |
52 | * profiling is not thread-safe, then that is not my problem. We can disable | |
53 | * profiling when SMP is enabled in that case. | |
54 | */ | |
55 | #define SIGIO_BIT 0 | |
56 | #define SIGIO_MASK (1 << SIGIO_BIT) | |
57 | ||
58 | #define SIGVTALRM_BIT 1 | |
59 | #define SIGVTALRM_MASK (1 << SIGVTALRM_BIT) | |
60 | ||
fce8c41c | 61 | static int signals_enabled; |
cfef8f34 | 62 | static unsigned int signals_pending; |
1d7173ba | 63 | |
9a8c1359 | 64 | void sig_handler(int sig, struct siginfo *si, mcontext_t *mc) |
1da177e4 | 65 | { |
1d7173ba JD |
66 | int enabled; |
67 | ||
1d7173ba | 68 | enabled = signals_enabled; |
ba180fd4 | 69 | if (!enabled && (sig == SIGIO)) { |
cfef8f34 | 70 | signals_pending |= SIGIO_MASK; |
1d7173ba JD |
71 | return; |
72 | } | |
73 | ||
74 | block_signals(); | |
75 | ||
d3c1cfcd | 76 | sig_handler_common(sig, si, mc); |
1d7173ba JD |
77 | |
78 | set_signals(enabled); | |
1da177e4 LT |
79 | } |
80 | ||
248b74c7 | 81 | static void real_alarm_handler(mcontext_t *mc) |
1da177e4 | 82 | { |
77bf4400 | 83 | struct uml_pt_regs regs; |
2ea5bc5e | 84 | |
248b74c7 | 85 | if (mc != NULL) |
ab1c0cc7 | 86 | get_regs_from_mc(®s, mc); |
77bf4400 | 87 | regs.is_user = 0; |
2ea5bc5e | 88 | unblock_signals(); |
d3c1cfcd | 89 | timer_handler(SIGVTALRM, NULL, ®s); |
1d7173ba JD |
90 | } |
91 | ||
d3c1cfcd | 92 | void alarm_handler(int sig, struct siginfo *unused_si, mcontext_t *mc) |
1d7173ba | 93 | { |
1d7173ba JD |
94 | int enabled; |
95 | ||
1d7173ba | 96 | enabled = signals_enabled; |
ba180fd4 | 97 | if (!signals_enabled) { |
cfef8f34 | 98 | signals_pending |= SIGVTALRM_MASK; |
1d7173ba JD |
99 | return; |
100 | } | |
101 | ||
102 | block_signals(); | |
103 | ||
248b74c7 | 104 | real_alarm_handler(mc); |
1d7173ba | 105 | set_signals(enabled); |
1da177e4 LT |
106 | } |
107 | ||
78a26e25 JD |
108 | void timer_init(void) |
109 | { | |
00361683 | 110 | set_handler(SIGVTALRM); |
78a26e25 JD |
111 | } |
112 | ||
0805d89c GS |
113 | void set_sigstack(void *sig_stack, int size) |
114 | { | |
9a75551a HWH |
115 | stack_t stack = { |
116 | .ss_flags = 0, | |
117 | .ss_sp = sig_stack, | |
118 | .ss_size = size - sizeof(void *) | |
119 | }; | |
0805d89c | 120 | |
ba180fd4 | 121 | if (sigaltstack(&stack, NULL) != 0) |
0805d89c GS |
122 | panic("enabling signal stack failed, errno = %d\n", errno); |
123 | } | |
124 | ||
9a8c1359 | 125 | static void (*handlers[_NSIG])(int sig, struct siginfo *si, mcontext_t *mc) = { |
00361683 AV |
126 | [SIGSEGV] = sig_handler, |
127 | [SIGBUS] = sig_handler, | |
128 | [SIGILL] = sig_handler, | |
129 | [SIGFPE] = sig_handler, | |
130 | [SIGTRAP] = sig_handler, | |
131 | ||
132 | [SIGIO] = sig_handler, | |
133 | [SIGWINCH] = sig_handler, | |
134 | [SIGVTALRM] = alarm_handler | |
135 | }; | |
4b84c69b | 136 | |
248b74c7 | 137 | |
d3c1cfcd | 138 | static void hard_handler(int sig, siginfo_t *si, void *p) |
c14b8494 | 139 | { |
248b74c7 AV |
140 | struct ucontext *uc = p; |
141 | mcontext_t *mc = &uc->uc_mcontext; | |
508a9274 | 142 | unsigned long pending = 1UL << sig; |
c14b8494 JD |
143 | |
144 | do { | |
145 | int nested, bail; | |
146 | ||
147 | /* | |
148 | * pending comes back with one bit set for each | |
149 | * interrupt that arrived while setting up the stack, | |
150 | * plus a bit for this interrupt, plus the zero bit is | |
151 | * set if this is a nested interrupt. | |
152 | * If bail is true, then we interrupted another | |
153 | * handler setting up the stack. In this case, we | |
154 | * have to return, and the upper handler will deal | |
155 | * with this interrupt. | |
156 | */ | |
508a9274 | 157 | bail = to_irq_stack(&pending); |
ba180fd4 | 158 | if (bail) |
c14b8494 JD |
159 | return; |
160 | ||
161 | nested = pending & 1; | |
162 | pending &= ~1; | |
163 | ||
ba180fd4 | 164 | while ((sig = ffs(pending)) != 0){ |
c14b8494 JD |
165 | sig--; |
166 | pending &= ~(1 << sig); | |
9a8c1359 | 167 | (*handlers[sig])(sig, (struct siginfo *)si, mc); |
c14b8494 JD |
168 | } |
169 | ||
ba180fd4 JD |
170 | /* |
171 | * Again, pending comes back with a mask of signals | |
c14b8494 JD |
172 | * that arrived while tearing down the stack. If this |
173 | * is non-zero, we just go back, set up the stack | |
174 | * again, and handle the new interrupts. | |
175 | */ | |
ba180fd4 | 176 | if (!nested) |
c14b8494 | 177 | pending = from_irq_stack(nested); |
ba180fd4 | 178 | } while (pending); |
c14b8494 JD |
179 | } |
180 | ||
00361683 | 181 | void set_handler(int sig) |
0805d89c GS |
182 | { |
183 | struct sigaction action; | |
e87df986 | 184 | int flags = SA_SIGINFO | SA_ONSTACK; |
1d7173ba | 185 | sigset_t sig_mask; |
0805d89c | 186 | |
7eb12255 | 187 | action.sa_sigaction = hard_handler; |
4b84c69b | 188 | |
e87df986 | 189 | /* block irq ones */ |
0805d89c | 190 | sigemptyset(&action.sa_mask); |
e87df986 AV |
191 | sigaddset(&action.sa_mask, SIGVTALRM); |
192 | sigaddset(&action.sa_mask, SIGIO); | |
193 | sigaddset(&action.sa_mask, SIGWINCH); | |
4b84c69b | 194 | |
e6a2d1f7 JD |
195 | if (sig == SIGSEGV) |
196 | flags |= SA_NODEFER; | |
197 | ||
e87df986 AV |
198 | if (sigismember(&action.sa_mask, sig)) |
199 | flags |= SA_RESTART; /* if it's an irq signal */ | |
200 | ||
201 | action.sa_flags = flags; | |
0805d89c | 202 | action.sa_restorer = NULL; |
ba180fd4 | 203 | if (sigaction(sig, &action, NULL) < 0) |
1d7173ba JD |
204 | panic("sigaction failed - errno = %d\n", errno); |
205 | ||
206 | sigemptyset(&sig_mask); | |
207 | sigaddset(&sig_mask, sig); | |
ba180fd4 | 208 | if (sigprocmask(SIG_UNBLOCK, &sig_mask, NULL) < 0) |
1d7173ba | 209 | panic("sigprocmask failed - errno = %d\n", errno); |
0805d89c GS |
210 | } |
211 | ||
212 | int change_sig(int signal, int on) | |
213 | { | |
cfef8f34 | 214 | sigset_t sigset; |
0805d89c GS |
215 | |
216 | sigemptyset(&sigset); | |
217 | sigaddset(&sigset, signal); | |
cfef8f34 | 218 | if (sigprocmask(on ? SIG_UNBLOCK : SIG_BLOCK, &sigset, NULL) < 0) |
c9a3072d | 219 | return -errno; |
cfef8f34 JD |
220 | |
221 | return 0; | |
0805d89c GS |
222 | } |
223 | ||
0805d89c GS |
224 | void block_signals(void) |
225 | { | |
1d7173ba | 226 | signals_enabled = 0; |
ba180fd4 JD |
227 | /* |
228 | * This must return with signals disabled, so this barrier | |
53b17332 JD |
229 | * ensures that writes are flushed out before the return. |
230 | * This might matter if gcc figures out how to inline this and | |
231 | * decides to shuffle this code into the caller. | |
232 | */ | |
fce8c41c | 233 | barrier(); |
0805d89c GS |
234 | } |
235 | ||
236 | void unblock_signals(void) | |
237 | { | |
1d7173ba | 238 | int save_pending; |
0805d89c | 239 | |
ba180fd4 | 240 | if (signals_enabled == 1) |
1d7173ba | 241 | return; |
0805d89c | 242 | |
ba180fd4 JD |
243 | /* |
244 | * We loop because the IRQ handler returns with interrupts off. So, | |
1d7173ba | 245 | * interrupts may have arrived and we need to re-enable them and |
cfef8f34 | 246 | * recheck signals_pending. |
1d7173ba | 247 | */ |
5134d8fe | 248 | while (1) { |
ba180fd4 JD |
249 | /* |
250 | * Save and reset save_pending after enabling signals. This | |
cfef8f34 | 251 | * way, signals_pending won't be changed while we're reading it. |
1d7173ba JD |
252 | */ |
253 | signals_enabled = 1; | |
254 | ||
ba180fd4 | 255 | /* |
cfef8f34 | 256 | * Setting signals_enabled and reading signals_pending must |
53b17332 JD |
257 | * happen in this order. |
258 | */ | |
fce8c41c | 259 | barrier(); |
53b17332 | 260 | |
cfef8f34 | 261 | save_pending = signals_pending; |
fce8c41c | 262 | if (save_pending == 0) |
1d7173ba JD |
263 | return; |
264 | ||
cfef8f34 | 265 | signals_pending = 0; |
1d7173ba | 266 | |
ba180fd4 JD |
267 | /* |
268 | * We have pending interrupts, so disable signals, as the | |
1d7173ba JD |
269 | * handlers expect them off when they are called. They will |
270 | * be enabled again above. | |
271 | */ | |
272 | ||
273 | signals_enabled = 0; | |
274 | ||
ba180fd4 JD |
275 | /* |
276 | * Deal with SIGIO first because the alarm handler might | |
1d7173ba JD |
277 | * schedule, leaving the pending SIGIO stranded until we come |
278 | * back here. | |
d3c1cfcd MP |
279 | * |
280 | * SIGIO's handler doesn't use siginfo or mcontext, | |
281 | * so they can be NULL. | |
1d7173ba | 282 | */ |
ba180fd4 | 283 | if (save_pending & SIGIO_MASK) |
d3c1cfcd | 284 | sig_handler_common(SIGIO, NULL, NULL); |
1d7173ba | 285 | |
ba180fd4 | 286 | if (save_pending & SIGVTALRM_MASK) |
61b63c55 | 287 | real_alarm_handler(NULL); |
1d7173ba | 288 | } |
0805d89c GS |
289 | } |
290 | ||
291 | int get_signals(void) | |
292 | { | |
1d7173ba | 293 | return signals_enabled; |
0805d89c GS |
294 | } |
295 | ||
296 | int set_signals(int enable) | |
297 | { | |
0805d89c | 298 | int ret; |
ba180fd4 | 299 | if (signals_enabled == enable) |
1d7173ba | 300 | return enable; |
0805d89c | 301 | |
1d7173ba | 302 | ret = signals_enabled; |
ba180fd4 | 303 | if (enable) |
1d7173ba JD |
304 | unblock_signals(); |
305 | else block_signals(); | |
0805d89c | 306 | |
1d7173ba | 307 | return ret; |
0805d89c | 308 | } |
f72c22e4 RW |
309 | |
310 | int os_is_signal_stack(void) | |
311 | { | |
312 | stack_t ss; | |
313 | sigaltstack(NULL, &ss); | |
314 | ||
315 | return ss.ss_flags & SS_ONSTACK; | |
316 | } |