um: net: replace GFP_KERNEL with GFP_ATOMIC when spinlock is held
[deliverable/linux.git] / arch / um / os-Linux / signal.c
CommitLineData
1da177e4
LT
1/*
2 * Copyright (C) 2004 PathScale, Inc
ba180fd4 3 * Copyright (C) 2004 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
1da177e4
LT
4 * Licensed under the GPL
5 */
6
0805d89c 7#include <stdlib.h>
0805d89c 8#include <stdarg.h>
ba180fd4
JD
9#include <errno.h>
10#include <signal.h>
11#include <strings.h>
37185b33
AV
12#include <as-layout.h>
13#include <kern_util.h>
14#include <os.h>
15#include <sysdep/mcontext.h>
d3c1cfcd 16#include "internal.h"
1da177e4 17
72383d43 18void (*sig_info[NSIG])(int, struct siginfo *, struct uml_pt_regs *) = {
75ada8ff
JD
19 [SIGTRAP] = relay_signal,
20 [SIGFPE] = relay_signal,
21 [SIGILL] = relay_signal,
22 [SIGWINCH] = winch,
23 [SIGBUS] = bus_handler,
24 [SIGSEGV] = segv_handler,
25 [SIGIO] = sigio_handler,
26 [SIGVTALRM] = timer_handler };
27
9a8c1359 28static void sig_handler_common(int sig, struct siginfo *si, mcontext_t *mc)
75ada8ff 29{
e6a2d1f7
JD
30 struct uml_pt_regs r;
31 int save_errno = errno;
75ada8ff 32
e6a2d1f7 33 r.is_user = 0;
75ada8ff 34 if (sig == SIGSEGV) {
e6a2d1f7 35 /* For segfaults, we want the data from the sigcontext. */
ab1c0cc7 36 get_regs_from_mc(&r, mc);
248b74c7 37 GET_FAULTINFO_FROM_MC(r.faultinfo, mc);
e6a2d1f7 38 }
75ada8ff 39
e6a2d1f7 40 /* enable signals if sig isn't IRQ signal */
75ada8ff
JD
41 if ((sig != SIGIO) && (sig != SIGWINCH) && (sig != SIGVTALRM))
42 unblock_signals();
43
d3c1cfcd 44 (*sig_info[sig])(sig, si, &r);
75ada8ff
JD
45
46 errno = save_errno;
75ada8ff
JD
47}
48
ba180fd4 49/*
61b63c55 50 * These are the asynchronous signals. SIGPROF is excluded because we want to
1d7173ba
JD
51 * be able to profile all of UML, not just the non-critical sections. If
52 * profiling is not thread-safe, then that is not my problem. We can disable
53 * profiling when SMP is enabled in that case.
54 */
55#define SIGIO_BIT 0
56#define SIGIO_MASK (1 << SIGIO_BIT)
57
58#define SIGVTALRM_BIT 1
59#define SIGVTALRM_MASK (1 << SIGVTALRM_BIT)
60
fce8c41c 61static int signals_enabled;
cfef8f34 62static unsigned int signals_pending;
1d7173ba 63
9a8c1359 64void sig_handler(int sig, struct siginfo *si, mcontext_t *mc)
1da177e4 65{
1d7173ba
JD
66 int enabled;
67
1d7173ba 68 enabled = signals_enabled;
ba180fd4 69 if (!enabled && (sig == SIGIO)) {
cfef8f34 70 signals_pending |= SIGIO_MASK;
1d7173ba
JD
71 return;
72 }
73
74 block_signals();
75
d3c1cfcd 76 sig_handler_common(sig, si, mc);
1d7173ba
JD
77
78 set_signals(enabled);
1da177e4
LT
79}
80
248b74c7 81static void real_alarm_handler(mcontext_t *mc)
1da177e4 82{
77bf4400 83 struct uml_pt_regs regs;
2ea5bc5e 84
248b74c7 85 if (mc != NULL)
ab1c0cc7 86 get_regs_from_mc(&regs, mc);
77bf4400 87 regs.is_user = 0;
2ea5bc5e 88 unblock_signals();
d3c1cfcd 89 timer_handler(SIGVTALRM, NULL, &regs);
1d7173ba
JD
90}
91
d3c1cfcd 92void alarm_handler(int sig, struct siginfo *unused_si, mcontext_t *mc)
1d7173ba 93{
1d7173ba
JD
94 int enabled;
95
1d7173ba 96 enabled = signals_enabled;
ba180fd4 97 if (!signals_enabled) {
cfef8f34 98 signals_pending |= SIGVTALRM_MASK;
1d7173ba
JD
99 return;
100 }
101
102 block_signals();
103
248b74c7 104 real_alarm_handler(mc);
1d7173ba 105 set_signals(enabled);
1da177e4
LT
106}
107
78a26e25
JD
108void timer_init(void)
109{
00361683 110 set_handler(SIGVTALRM);
78a26e25
JD
111}
112
0805d89c
GS
113void set_sigstack(void *sig_stack, int size)
114{
9a75551a
HWH
115 stack_t stack = {
116 .ss_flags = 0,
117 .ss_sp = sig_stack,
118 .ss_size = size - sizeof(void *)
119 };
0805d89c 120
ba180fd4 121 if (sigaltstack(&stack, NULL) != 0)
0805d89c
GS
122 panic("enabling signal stack failed, errno = %d\n", errno);
123}
124
9a8c1359 125static void (*handlers[_NSIG])(int sig, struct siginfo *si, mcontext_t *mc) = {
00361683
AV
126 [SIGSEGV] = sig_handler,
127 [SIGBUS] = sig_handler,
128 [SIGILL] = sig_handler,
129 [SIGFPE] = sig_handler,
130 [SIGTRAP] = sig_handler,
131
132 [SIGIO] = sig_handler,
133 [SIGWINCH] = sig_handler,
134 [SIGVTALRM] = alarm_handler
135};
4b84c69b 136
248b74c7 137
d3c1cfcd 138static void hard_handler(int sig, siginfo_t *si, void *p)
c14b8494 139{
248b74c7
AV
140 struct ucontext *uc = p;
141 mcontext_t *mc = &uc->uc_mcontext;
508a9274 142 unsigned long pending = 1UL << sig;
c14b8494
JD
143
144 do {
145 int nested, bail;
146
147 /*
148 * pending comes back with one bit set for each
149 * interrupt that arrived while setting up the stack,
150 * plus a bit for this interrupt, plus the zero bit is
151 * set if this is a nested interrupt.
152 * If bail is true, then we interrupted another
153 * handler setting up the stack. In this case, we
154 * have to return, and the upper handler will deal
155 * with this interrupt.
156 */
508a9274 157 bail = to_irq_stack(&pending);
ba180fd4 158 if (bail)
c14b8494
JD
159 return;
160
161 nested = pending & 1;
162 pending &= ~1;
163
ba180fd4 164 while ((sig = ffs(pending)) != 0){
c14b8494
JD
165 sig--;
166 pending &= ~(1 << sig);
9a8c1359 167 (*handlers[sig])(sig, (struct siginfo *)si, mc);
c14b8494
JD
168 }
169
ba180fd4
JD
170 /*
171 * Again, pending comes back with a mask of signals
c14b8494
JD
172 * that arrived while tearing down the stack. If this
173 * is non-zero, we just go back, set up the stack
174 * again, and handle the new interrupts.
175 */
ba180fd4 176 if (!nested)
c14b8494 177 pending = from_irq_stack(nested);
ba180fd4 178 } while (pending);
c14b8494
JD
179}
180
00361683 181void set_handler(int sig)
0805d89c
GS
182{
183 struct sigaction action;
e87df986 184 int flags = SA_SIGINFO | SA_ONSTACK;
1d7173ba 185 sigset_t sig_mask;
0805d89c 186
7eb12255 187 action.sa_sigaction = hard_handler;
4b84c69b 188
e87df986 189 /* block irq ones */
0805d89c 190 sigemptyset(&action.sa_mask);
e87df986
AV
191 sigaddset(&action.sa_mask, SIGVTALRM);
192 sigaddset(&action.sa_mask, SIGIO);
193 sigaddset(&action.sa_mask, SIGWINCH);
4b84c69b 194
e6a2d1f7
JD
195 if (sig == SIGSEGV)
196 flags |= SA_NODEFER;
197
e87df986
AV
198 if (sigismember(&action.sa_mask, sig))
199 flags |= SA_RESTART; /* if it's an irq signal */
200
201 action.sa_flags = flags;
0805d89c 202 action.sa_restorer = NULL;
ba180fd4 203 if (sigaction(sig, &action, NULL) < 0)
1d7173ba
JD
204 panic("sigaction failed - errno = %d\n", errno);
205
206 sigemptyset(&sig_mask);
207 sigaddset(&sig_mask, sig);
ba180fd4 208 if (sigprocmask(SIG_UNBLOCK, &sig_mask, NULL) < 0)
1d7173ba 209 panic("sigprocmask failed - errno = %d\n", errno);
0805d89c
GS
210}
211
212int change_sig(int signal, int on)
213{
cfef8f34 214 sigset_t sigset;
0805d89c
GS
215
216 sigemptyset(&sigset);
217 sigaddset(&sigset, signal);
cfef8f34 218 if (sigprocmask(on ? SIG_UNBLOCK : SIG_BLOCK, &sigset, NULL) < 0)
c9a3072d 219 return -errno;
cfef8f34
JD
220
221 return 0;
0805d89c
GS
222}
223
0805d89c
GS
224void block_signals(void)
225{
1d7173ba 226 signals_enabled = 0;
ba180fd4
JD
227 /*
228 * This must return with signals disabled, so this barrier
53b17332
JD
229 * ensures that writes are flushed out before the return.
230 * This might matter if gcc figures out how to inline this and
231 * decides to shuffle this code into the caller.
232 */
fce8c41c 233 barrier();
0805d89c
GS
234}
235
236void unblock_signals(void)
237{
1d7173ba 238 int save_pending;
0805d89c 239
ba180fd4 240 if (signals_enabled == 1)
1d7173ba 241 return;
0805d89c 242
ba180fd4
JD
243 /*
244 * We loop because the IRQ handler returns with interrupts off. So,
1d7173ba 245 * interrupts may have arrived and we need to re-enable them and
cfef8f34 246 * recheck signals_pending.
1d7173ba 247 */
5134d8fe 248 while (1) {
ba180fd4
JD
249 /*
250 * Save and reset save_pending after enabling signals. This
cfef8f34 251 * way, signals_pending won't be changed while we're reading it.
1d7173ba
JD
252 */
253 signals_enabled = 1;
254
ba180fd4 255 /*
cfef8f34 256 * Setting signals_enabled and reading signals_pending must
53b17332
JD
257 * happen in this order.
258 */
fce8c41c 259 barrier();
53b17332 260
cfef8f34 261 save_pending = signals_pending;
fce8c41c 262 if (save_pending == 0)
1d7173ba
JD
263 return;
264
cfef8f34 265 signals_pending = 0;
1d7173ba 266
ba180fd4
JD
267 /*
268 * We have pending interrupts, so disable signals, as the
1d7173ba
JD
269 * handlers expect them off when they are called. They will
270 * be enabled again above.
271 */
272
273 signals_enabled = 0;
274
ba180fd4
JD
275 /*
276 * Deal with SIGIO first because the alarm handler might
1d7173ba
JD
277 * schedule, leaving the pending SIGIO stranded until we come
278 * back here.
d3c1cfcd
MP
279 *
280 * SIGIO's handler doesn't use siginfo or mcontext,
281 * so they can be NULL.
1d7173ba 282 */
ba180fd4 283 if (save_pending & SIGIO_MASK)
d3c1cfcd 284 sig_handler_common(SIGIO, NULL, NULL);
1d7173ba 285
ba180fd4 286 if (save_pending & SIGVTALRM_MASK)
61b63c55 287 real_alarm_handler(NULL);
1d7173ba 288 }
0805d89c
GS
289}
290
291int get_signals(void)
292{
1d7173ba 293 return signals_enabled;
0805d89c
GS
294}
295
296int set_signals(int enable)
297{
0805d89c 298 int ret;
ba180fd4 299 if (signals_enabled == enable)
1d7173ba 300 return enable;
0805d89c 301
1d7173ba 302 ret = signals_enabled;
ba180fd4 303 if (enable)
1d7173ba
JD
304 unblock_signals();
305 else block_signals();
0805d89c 306
1d7173ba 307 return ret;
0805d89c 308}
f72c22e4
RW
309
310int os_is_signal_stack(void)
311{
312 stack_t ss;
313 sigaltstack(NULL, &ss);
314
315 return ss.ss_flags & SS_ONSTACK;
316}
This page took 0.689005 seconds and 5 git commands to generate.