89ef90df985fd0fcbd8ed817cbb819ba7ba9615d
2 * Copyright (C) 1991, 1992 Linus Torvalds
3 * Copyright (C) 2000, 2001, 2002 Andi Kleen SuSE Labs
5 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
6 * 2000-06-20 Pentium III FXSR, SSE support by Gareth Hughes
7 * 2000-2002 x86-64 support by Andi Kleen
10 #include <linux/sched.h>
12 #include <linux/smp.h>
13 #include <linux/kernel.h>
14 #include <linux/signal.h>
15 #include <linux/errno.h>
16 #include <linux/wait.h>
17 #include <linux/ptrace.h>
18 #include <linux/tracehook.h>
19 #include <linux/unistd.h>
20 #include <linux/stddef.h>
21 #include <linux/personality.h>
22 #include <linux/uaccess.h>
24 #include <asm/processor.h>
25 #include <asm/ucontext.h>
30 #include <asm/proto.h>
31 #include <asm/ia32_unistd.h>
33 #endif /* CONFIG_X86_64 */
35 #include <asm/syscall.h>
36 #include <asm/syscalls.h>
38 #include <asm/sigframe.h>
40 #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
42 #define __FIX_EFLAGS (X86_EFLAGS_AC | X86_EFLAGS_OF | \
43 X86_EFLAGS_DF | X86_EFLAGS_TF | X86_EFLAGS_SF | \
44 X86_EFLAGS_ZF | X86_EFLAGS_AF | X86_EFLAGS_PF | \
48 # define FIX_EFLAGS (__FIX_EFLAGS | X86_EFLAGS_RF)
50 # define FIX_EFLAGS __FIX_EFLAGS
53 #define COPY(x) do { \
54 get_user_ex(regs->x, &sc->x); \
57 #define GET_SEG(seg) ({ \
59 get_user_ex(tmp, &sc->seg); \
63 #define COPY_SEG(seg) do { \
64 regs->seg = GET_SEG(seg); \
67 #define COPY_SEG_CPL3(seg) do { \
68 regs->seg = GET_SEG(seg) | 3; \
72 restore_sigcontext(struct pt_regs
*regs
, struct sigcontext __user
*sc
,
76 unsigned int tmpflags
;
79 /* Always make any pending restarted system calls return -EINTR */
80 current_thread_info()->restart_block
.fn
= do_no_restart_syscall
;
85 set_user_gs(regs
, GET_SEG(gs
));
89 #endif /* CONFIG_X86_32 */
91 COPY(di
); COPY(si
); COPY(bp
); COPY(sp
); COPY(bx
);
92 COPY(dx
); COPY(cx
); COPY(ip
);
103 #endif /* CONFIG_X86_64 */
108 #else /* !CONFIG_X86_32 */
109 /* Kernel saves and restores only the CS segment register on signals,
110 * which is the bare minimum needed to allow mixed 32/64-bit code.
111 * App's signal handler can save/restore other segments if needed. */
113 #endif /* CONFIG_X86_32 */
115 get_user_ex(tmpflags
, &sc
->flags
);
116 regs
->flags
= (regs
->flags
& ~FIX_EFLAGS
) | (tmpflags
& FIX_EFLAGS
);
117 regs
->orig_ax
= -1; /* disable syscall checks */
119 get_user_ex(buf
, &sc
->fpstate
);
120 err
|= restore_i387_xstate(buf
);
122 get_user_ex(*pax
, &sc
->ax
);
123 } get_user_catch(err
);
129 setup_sigcontext(struct sigcontext __user
*sc
, void __user
*fpstate
,
130 struct pt_regs
*regs
, unsigned long mask
)
137 put_user_ex(get_user_gs(regs
), (unsigned int __user
*)&sc
->gs
);
138 put_user_ex(regs
->fs
, (unsigned int __user
*)&sc
->fs
);
139 put_user_ex(regs
->es
, (unsigned int __user
*)&sc
->es
);
140 put_user_ex(regs
->ds
, (unsigned int __user
*)&sc
->ds
);
141 #endif /* CONFIG_X86_32 */
143 put_user_ex(regs
->di
, &sc
->di
);
144 put_user_ex(regs
->si
, &sc
->si
);
145 put_user_ex(regs
->bp
, &sc
->bp
);
146 put_user_ex(regs
->sp
, &sc
->sp
);
147 put_user_ex(regs
->bx
, &sc
->bx
);
148 put_user_ex(regs
->dx
, &sc
->dx
);
149 put_user_ex(regs
->cx
, &sc
->cx
);
150 put_user_ex(regs
->ax
, &sc
->ax
);
152 put_user_ex(regs
->r8
, &sc
->r8
);
153 put_user_ex(regs
->r9
, &sc
->r9
);
154 put_user_ex(regs
->r10
, &sc
->r10
);
155 put_user_ex(regs
->r11
, &sc
->r11
);
156 put_user_ex(regs
->r12
, &sc
->r12
);
157 put_user_ex(regs
->r13
, &sc
->r13
);
158 put_user_ex(regs
->r14
, &sc
->r14
);
159 put_user_ex(regs
->r15
, &sc
->r15
);
160 #endif /* CONFIG_X86_64 */
162 put_user_ex(current
->thread
.trap_no
, &sc
->trapno
);
163 put_user_ex(current
->thread
.error_code
, &sc
->err
);
164 put_user_ex(regs
->ip
, &sc
->ip
);
166 put_user_ex(regs
->cs
, (unsigned int __user
*)&sc
->cs
);
167 put_user_ex(regs
->flags
, &sc
->flags
);
168 put_user_ex(regs
->sp
, &sc
->sp_at_signal
);
169 put_user_ex(regs
->ss
, (unsigned int __user
*)&sc
->ss
);
170 #else /* !CONFIG_X86_32 */
171 put_user_ex(regs
->flags
, &sc
->flags
);
172 put_user_ex(regs
->cs
, &sc
->cs
);
173 put_user_ex(0, &sc
->gs
);
174 put_user_ex(0, &sc
->fs
);
175 #endif /* CONFIG_X86_32 */
177 put_user_ex(fpstate
, &sc
->fpstate
);
179 /* non-iBCS2 extensions.. */
180 put_user_ex(mask
, &sc
->oldmask
);
181 put_user_ex(current
->thread
.cr2
, &sc
->cr2
);
182 } put_user_catch(err
);
188 * Set up a signal frame.
191 static const struct {
195 } __attribute__((packed
)) retcode
= {
196 0xb858, /* popl %eax; movl $..., %eax */
198 0x80cd, /* int $0x80 */
201 static const struct {
206 } __attribute__((packed
)) rt_retcode
= {
207 0xb8, /* movl $..., %eax */
209 0x80cd, /* int $0x80 */
214 * Determine which stack to use..
216 static inline void __user
*
217 get_sigframe(struct k_sigaction
*ka
, struct pt_regs
*regs
, size_t frame_size
,
218 void __user
**fpstate
)
222 /* Default to using normal stack */
226 * If we are on the alternate signal stack and would overflow it, don't.
227 * Return an always-bogus address instead so we will die with SIGSEGV.
229 if (on_sig_stack(sp
) && !likely(on_sig_stack(sp
- frame_size
)))
230 return (void __user
*) -1L;
232 /* This is the X/Open sanctioned signal stack switching. */
233 if (ka
->sa
.sa_flags
& SA_ONSTACK
) {
234 if (sas_ss_flags(sp
) == 0)
235 sp
= current
->sas_ss_sp
+ current
->sas_ss_size
;
237 /* This is the legacy signal stack switching. */
238 if ((regs
->ss
& 0xffff) != __USER_DS
&&
239 !(ka
->sa
.sa_flags
& SA_RESTORER
) &&
241 sp
= (unsigned long) ka
->sa
.sa_restorer
;
245 sp
= sp
- sig_xstate_size
;
246 *fpstate
= (void __user
*) sp
;
247 if (save_i387_xstate(*fpstate
) < 0)
248 return (void __user
*)-1L;
253 * Align the stack pointer according to the i386 ABI,
254 * i.e. so that on function entry ((sp + 4) & 15) == 0.
256 sp
= ((sp
+ 4) & -16ul) - 4;
258 return (void __user
*) sp
;
262 __setup_frame(int sig
, struct k_sigaction
*ka
, sigset_t
*set
,
263 struct pt_regs
*regs
)
265 struct sigframe __user
*frame
;
266 void __user
*restorer
;
268 void __user
*fpstate
= NULL
;
270 frame
= get_sigframe(ka
, regs
, sizeof(*frame
), &fpstate
);
272 if (!access_ok(VERIFY_WRITE
, frame
, sizeof(*frame
)))
275 if (__put_user(sig
, &frame
->sig
))
278 if (setup_sigcontext(&frame
->sc
, fpstate
, regs
, set
->sig
[0]))
281 if (_NSIG_WORDS
> 1) {
282 if (__copy_to_user(&frame
->extramask
, &set
->sig
[1],
283 sizeof(frame
->extramask
)))
287 if (current
->mm
->context
.vdso
)
288 restorer
= VDSO32_SYMBOL(current
->mm
->context
.vdso
, sigreturn
);
290 restorer
= &frame
->retcode
;
291 if (ka
->sa
.sa_flags
& SA_RESTORER
)
292 restorer
= ka
->sa
.sa_restorer
;
294 /* Set up to return from userspace. */
295 err
|= __put_user(restorer
, &frame
->pretcode
);
298 * This is popl %eax ; movl $__NR_sigreturn, %eax ; int $0x80
300 * WE DO NOT USE IT ANY MORE! It's only left here for historical
301 * reasons and because gdb uses it as a signature to notice
302 * signal handler stack frames.
304 err
|= __put_user(*((u64
*)&retcode
), (u64
*)frame
->retcode
);
309 /* Set up registers for signal handler */
310 regs
->sp
= (unsigned long)frame
;
311 regs
->ip
= (unsigned long)ka
->sa
.sa_handler
;
312 regs
->ax
= (unsigned long)sig
;
316 regs
->ds
= __USER_DS
;
317 regs
->es
= __USER_DS
;
318 regs
->ss
= __USER_DS
;
319 regs
->cs
= __USER_CS
;
324 static int __setup_rt_frame(int sig
, struct k_sigaction
*ka
, siginfo_t
*info
,
325 sigset_t
*set
, struct pt_regs
*regs
)
327 struct rt_sigframe __user
*frame
;
328 void __user
*restorer
;
330 void __user
*fpstate
= NULL
;
332 frame
= get_sigframe(ka
, regs
, sizeof(*frame
), &fpstate
);
334 if (!access_ok(VERIFY_WRITE
, frame
, sizeof(*frame
)))
338 put_user_ex(sig
, &frame
->sig
);
339 put_user_ex(&frame
->info
, &frame
->pinfo
);
340 put_user_ex(&frame
->uc
, &frame
->puc
);
341 err
|= copy_siginfo_to_user(&frame
->info
, info
);
343 /* Create the ucontext. */
345 put_user_ex(UC_FP_XSTATE
, &frame
->uc
.uc_flags
);
347 put_user_ex(0, &frame
->uc
.uc_flags
);
348 put_user_ex(0, &frame
->uc
.uc_link
);
349 put_user_ex(current
->sas_ss_sp
, &frame
->uc
.uc_stack
.ss_sp
);
350 put_user_ex(sas_ss_flags(regs
->sp
),
351 &frame
->uc
.uc_stack
.ss_flags
);
352 put_user_ex(current
->sas_ss_size
, &frame
->uc
.uc_stack
.ss_size
);
353 err
|= setup_sigcontext(&frame
->uc
.uc_mcontext
, fpstate
,
355 err
|= __copy_to_user(&frame
->uc
.uc_sigmask
, set
, sizeof(*set
));
357 /* Set up to return from userspace. */
358 restorer
= VDSO32_SYMBOL(current
->mm
->context
.vdso
, rt_sigreturn
);
359 if (ka
->sa
.sa_flags
& SA_RESTORER
)
360 restorer
= ka
->sa
.sa_restorer
;
361 put_user_ex(restorer
, &frame
->pretcode
);
364 * This is movl $__NR_rt_sigreturn, %ax ; int $0x80
366 * WE DO NOT USE IT ANY MORE! It's only left here for historical
367 * reasons and because gdb uses it as a signature to notice
368 * signal handler stack frames.
370 put_user_ex(*((u64
*)&rt_retcode
), (u64
*)frame
->retcode
);
371 } put_user_catch(err
);
376 /* Set up registers for signal handler */
377 regs
->sp
= (unsigned long)frame
;
378 regs
->ip
= (unsigned long)ka
->sa
.sa_handler
;
379 regs
->ax
= (unsigned long)sig
;
380 regs
->dx
= (unsigned long)&frame
->info
;
381 regs
->cx
= (unsigned long)&frame
->uc
;
383 regs
->ds
= __USER_DS
;
384 regs
->es
= __USER_DS
;
385 regs
->ss
= __USER_DS
;
386 regs
->cs
= __USER_CS
;
390 #else /* !CONFIG_X86_32 */
392 * Determine which stack to use..
395 get_sigframe(struct k_sigaction
*ka
, struct pt_regs
*regs
, size_t frame_size
,
396 void __user
**fpstate
)
400 /* Default to using normal stack - redzone */
403 /* This is the X/Open sanctioned signal stack switching. */
404 if (ka
->sa
.sa_flags
& SA_ONSTACK
) {
405 if (sas_ss_flags(sp
) == 0)
406 sp
= current
->sas_ss_sp
+ current
->sas_ss_size
;
410 sp
-= sig_xstate_size
;
411 *fpstate
= (void __user
*)round_down(sp
, 64);
413 if (save_i387_xstate(*fpstate
) < 0)
414 return (void __user
*) -1L;
418 return (void __user
*)round_down(sp
, 16) - 8;
421 static int __setup_rt_frame(int sig
, struct k_sigaction
*ka
, siginfo_t
*info
,
422 sigset_t
*set
, struct pt_regs
*regs
)
424 struct rt_sigframe __user
*frame
;
425 void __user
*fp
= NULL
;
427 struct task_struct
*me
= current
;
429 frame
= get_sigframe(ka
, regs
, sizeof(struct rt_sigframe
), &fp
);
431 if (!access_ok(VERIFY_WRITE
, frame
, sizeof(*frame
)))
434 if (ka
->sa
.sa_flags
& SA_SIGINFO
) {
435 if (copy_siginfo_to_user(&frame
->info
, info
))
440 /* Create the ucontext. */
442 put_user_ex(UC_FP_XSTATE
, &frame
->uc
.uc_flags
);
444 put_user_ex(0, &frame
->uc
.uc_flags
);
445 put_user_ex(0, &frame
->uc
.uc_link
);
446 put_user_ex(me
->sas_ss_sp
, &frame
->uc
.uc_stack
.ss_sp
);
447 put_user_ex(sas_ss_flags(regs
->sp
),
448 &frame
->uc
.uc_stack
.ss_flags
);
449 put_user_ex(me
->sas_ss_size
, &frame
->uc
.uc_stack
.ss_size
);
450 err
|= setup_sigcontext(&frame
->uc
.uc_mcontext
, fp
, regs
, set
->sig
[0]);
451 err
|= __copy_to_user(&frame
->uc
.uc_sigmask
, set
, sizeof(*set
));
453 /* Set up to return from userspace. If provided, use a stub
454 already in userspace. */
455 /* x86-64 should always use SA_RESTORER. */
456 if (ka
->sa
.sa_flags
& SA_RESTORER
) {
457 put_user_ex(ka
->sa
.sa_restorer
, &frame
->pretcode
);
459 /* could use a vstub here */
462 } put_user_catch(err
);
467 /* Set up registers for signal handler */
469 /* In case the signal handler was declared without prototypes */
472 /* This also works for non SA_SIGINFO handlers because they expect the
473 next argument after the signal number on the stack. */
474 regs
->si
= (unsigned long)&frame
->info
;
475 regs
->dx
= (unsigned long)&frame
->uc
;
476 regs
->ip
= (unsigned long) ka
->sa
.sa_handler
;
478 regs
->sp
= (unsigned long)frame
;
480 /* Set up the CS register to run signal handlers in 64-bit mode,
481 even if the handler happens to be interrupting 32-bit code. */
482 regs
->cs
= __USER_CS
;
486 #endif /* CONFIG_X86_32 */
490 * Atomically swap in the new signal mask, and wait for a signal.
493 sys_sigsuspend(int history0
, int history1
, old_sigset_t mask
)
496 spin_lock_irq(¤t
->sighand
->siglock
);
497 current
->saved_sigmask
= current
->blocked
;
498 siginitset(¤t
->blocked
, mask
);
500 spin_unlock_irq(¤t
->sighand
->siglock
);
502 current
->state
= TASK_INTERRUPTIBLE
;
504 set_restore_sigmask();
506 return -ERESTARTNOHAND
;
510 sys_sigaction(int sig
, const struct old_sigaction __user
*act
,
511 struct old_sigaction __user
*oact
)
513 struct k_sigaction new_ka
, old_ka
;
519 if (!access_ok(VERIFY_READ
, act
, sizeof(*act
)))
523 get_user_ex(new_ka
.sa
.sa_handler
, &act
->sa_handler
);
524 get_user_ex(new_ka
.sa
.sa_flags
, &act
->sa_flags
);
525 get_user_ex(mask
, &act
->sa_mask
);
526 get_user_ex(new_ka
.sa
.sa_restorer
, &act
->sa_restorer
);
527 } get_user_catch(ret
);
531 siginitset(&new_ka
.sa
.sa_mask
, mask
);
534 ret
= do_sigaction(sig
, act
? &new_ka
: NULL
, oact
? &old_ka
: NULL
);
537 if (!access_ok(VERIFY_WRITE
, oact
, sizeof(*oact
)))
541 put_user_ex(old_ka
.sa
.sa_handler
, &oact
->sa_handler
);
542 put_user_ex(old_ka
.sa
.sa_flags
, &oact
->sa_flags
);
543 put_user_ex(old_ka
.sa
.sa_mask
.sig
[0], &oact
->sa_mask
);
544 put_user_ex(old_ka
.sa
.sa_restorer
, &oact
->sa_restorer
);
545 } put_user_catch(ret
);
553 #endif /* CONFIG_X86_32 */
556 int sys_sigaltstack(struct pt_regs
*regs
)
558 const stack_t __user
*uss
= (const stack_t __user
*)regs
->bx
;
559 stack_t __user
*uoss
= (stack_t __user
*)regs
->cx
;
561 return do_sigaltstack(uss
, uoss
, regs
->sp
);
563 #else /* !CONFIG_X86_32 */
565 sys_sigaltstack(const stack_t __user
*uss
, stack_t __user
*uoss
,
566 struct pt_regs
*regs
)
568 return do_sigaltstack(uss
, uoss
, regs
->sp
);
570 #endif /* CONFIG_X86_32 */
573 * Do a signal return; undo the signal stack.
576 unsigned long sys_sigreturn(struct pt_regs
*regs
)
578 struct sigframe __user
*frame
;
582 frame
= (struct sigframe __user
*)(regs
->sp
- 8);
584 if (!access_ok(VERIFY_READ
, frame
, sizeof(*frame
)))
586 if (__get_user(set
.sig
[0], &frame
->sc
.oldmask
) || (_NSIG_WORDS
> 1
587 && __copy_from_user(&set
.sig
[1], &frame
->extramask
,
588 sizeof(frame
->extramask
))))
591 sigdelsetmask(&set
, ~_BLOCKABLE
);
592 spin_lock_irq(¤t
->sighand
->siglock
);
593 current
->blocked
= set
;
595 spin_unlock_irq(¤t
->sighand
->siglock
);
597 if (restore_sigcontext(regs
, &frame
->sc
, &ax
))
602 signal_fault(regs
, frame
, "sigreturn");
606 #endif /* CONFIG_X86_32 */
608 long sys_rt_sigreturn(struct pt_regs
*regs
)
610 struct rt_sigframe __user
*frame
;
614 frame
= (struct rt_sigframe __user
*)(regs
->sp
- sizeof(long));
615 if (!access_ok(VERIFY_READ
, frame
, sizeof(*frame
)))
617 if (__copy_from_user(&set
, &frame
->uc
.uc_sigmask
, sizeof(set
)))
620 sigdelsetmask(&set
, ~_BLOCKABLE
);
621 spin_lock_irq(¤t
->sighand
->siglock
);
622 current
->blocked
= set
;
624 spin_unlock_irq(¤t
->sighand
->siglock
);
626 if (restore_sigcontext(regs
, &frame
->uc
.uc_mcontext
, &ax
))
629 if (do_sigaltstack(&frame
->uc
.uc_stack
, NULL
, regs
->sp
) == -EFAULT
)
635 signal_fault(regs
, frame
, "rt_sigreturn");
640 * OK, we're invoking a handler:
642 static int signr_convert(int sig
)
645 struct thread_info
*info
= current_thread_info();
647 if (info
->exec_domain
&& info
->exec_domain
->signal_invmap
&& sig
< 32)
648 return info
->exec_domain
->signal_invmap
[sig
];
649 #endif /* CONFIG_X86_32 */
656 #define ia32_setup_frame __setup_frame
657 #define ia32_setup_rt_frame __setup_rt_frame
659 #else /* !CONFIG_X86_32 */
661 #ifdef CONFIG_IA32_EMULATION
662 #define is_ia32 test_thread_flag(TIF_IA32)
663 #else /* !CONFIG_IA32_EMULATION */
665 #endif /* CONFIG_IA32_EMULATION */
667 int ia32_setup_rt_frame(int sig
, struct k_sigaction
*ka
, siginfo_t
*info
,
668 sigset_t
*set
, struct pt_regs
*regs
);
669 int ia32_setup_frame(int sig
, struct k_sigaction
*ka
,
670 sigset_t
*set
, struct pt_regs
*regs
);
672 #endif /* CONFIG_X86_32 */
675 setup_rt_frame(int sig
, struct k_sigaction
*ka
, siginfo_t
*info
,
676 sigset_t
*set
, struct pt_regs
*regs
)
678 int usig
= signr_convert(sig
);
681 /* Set up the stack frame */
683 if (ka
->sa
.sa_flags
& SA_SIGINFO
)
684 ret
= ia32_setup_rt_frame(usig
, ka
, info
, set
, regs
);
686 ret
= ia32_setup_frame(usig
, ka
, set
, regs
);
688 ret
= __setup_rt_frame(sig
, ka
, info
, set
, regs
);
691 force_sigsegv(sig
, current
);
699 handle_signal(unsigned long sig
, siginfo_t
*info
, struct k_sigaction
*ka
,
700 sigset_t
*oldset
, struct pt_regs
*regs
)
704 /* Are we from a system call? */
705 if (syscall_get_nr(current
, regs
) >= 0) {
706 /* If so, check system call restarting.. */
707 switch (syscall_get_error(current
, regs
)) {
708 case -ERESTART_RESTARTBLOCK
:
709 case -ERESTARTNOHAND
:
714 if (!(ka
->sa
.sa_flags
& SA_RESTART
)) {
719 case -ERESTARTNOINTR
:
720 regs
->ax
= regs
->orig_ax
;
727 * If TF is set due to a debugger (TIF_FORCED_TF), clear the TF
728 * flag so that register information in the sigcontext is correct.
730 if (unlikely(regs
->flags
& X86_EFLAGS_TF
) &&
731 likely(test_and_clear_thread_flag(TIF_FORCED_TF
)))
732 regs
->flags
&= ~X86_EFLAGS_TF
;
734 ret
= setup_rt_frame(sig
, ka
, info
, oldset
, regs
);
741 * This has nothing to do with segment registers,
742 * despite the name. This magic affects uaccess.h
743 * macros' behavior. Reset it to the normal setting.
749 * Clear the direction flag as per the ABI for function entry.
751 regs
->flags
&= ~X86_EFLAGS_DF
;
754 * Clear TF when entering the signal handler, but
755 * notify any tracer that was single-stepping it.
756 * The tracer may want to single-step inside the
759 regs
->flags
&= ~X86_EFLAGS_TF
;
761 spin_lock_irq(¤t
->sighand
->siglock
);
762 sigorsets(¤t
->blocked
, ¤t
->blocked
, &ka
->sa
.sa_mask
);
763 if (!(ka
->sa
.sa_flags
& SA_NODEFER
))
764 sigaddset(¤t
->blocked
, sig
);
766 spin_unlock_irq(¤t
->sighand
->siglock
);
768 tracehook_signal_handler(sig
, info
, ka
, regs
,
769 test_thread_flag(TIF_SINGLESTEP
));
775 #define NR_restart_syscall __NR_restart_syscall
776 #else /* !CONFIG_X86_32 */
777 #define NR_restart_syscall \
778 test_thread_flag(TIF_IA32) ? __NR_ia32_restart_syscall : __NR_restart_syscall
779 #endif /* CONFIG_X86_32 */
782 * Note that 'init' is a special process: it doesn't get signals it doesn't
783 * want to handle. Thus you cannot kill init even with a SIGKILL even by
786 static void do_signal(struct pt_regs
*regs
)
788 struct k_sigaction ka
;
794 * We want the common case to go fast, which is why we may in certain
795 * cases get here from kernel mode. Just return without doing anything
797 * X86_32: vm86 regs switched out by assembly code before reaching
798 * here, so testing against kernel CS suffices.
800 if (!user_mode(regs
))
803 if (current_thread_info()->status
& TS_RESTORE_SIGMASK
)
804 oldset
= ¤t
->saved_sigmask
;
806 oldset
= ¤t
->blocked
;
808 signr
= get_signal_to_deliver(&info
, &ka
, regs
, NULL
);
811 * Re-enable any watchpoints before delivering the
812 * signal to user space. The processor register will
813 * have been cleared if the watchpoint triggered
816 if (current
->thread
.debugreg7
)
817 set_debugreg(current
->thread
.debugreg7
, 7);
819 /* Whee! Actually deliver the signal. */
820 if (handle_signal(signr
, &info
, &ka
, oldset
, regs
) == 0) {
822 * A signal was successfully delivered; the saved
823 * sigmask will have been stored in the signal frame,
824 * and will be restored by sigreturn, so we can simply
825 * clear the TS_RESTORE_SIGMASK flag.
827 current_thread_info()->status
&= ~TS_RESTORE_SIGMASK
;
832 /* Did we come from a system call? */
833 if (syscall_get_nr(current
, regs
) >= 0) {
834 /* Restart the system call - no handlers present */
835 switch (syscall_get_error(current
, regs
)) {
836 case -ERESTARTNOHAND
:
838 case -ERESTARTNOINTR
:
839 regs
->ax
= regs
->orig_ax
;
843 case -ERESTART_RESTARTBLOCK
:
844 regs
->ax
= NR_restart_syscall
;
851 * If there's no signal to deliver, we just put the saved sigmask
854 if (current_thread_info()->status
& TS_RESTORE_SIGMASK
) {
855 current_thread_info()->status
&= ~TS_RESTORE_SIGMASK
;
856 sigprocmask(SIG_SETMASK
, ¤t
->saved_sigmask
, NULL
);
861 * notification of userspace execution resumption
862 * - triggered by the TIF_WORK_MASK flags
865 do_notify_resume(struct pt_regs
*regs
, void *unused
, __u32 thread_info_flags
)
867 #if defined(CONFIG_X86_64) && defined(CONFIG_X86_MCE)
868 /* notify userspace of pending MCEs */
869 if (thread_info_flags
& _TIF_MCE_NOTIFY
)
871 #endif /* CONFIG_X86_64 && CONFIG_X86_MCE */
873 /* deal with pending signal delivery */
874 if (thread_info_flags
& _TIF_SIGPENDING
)
877 if (thread_info_flags
& _TIF_NOTIFY_RESUME
) {
878 clear_thread_flag(TIF_NOTIFY_RESUME
);
879 tracehook_notify_resume(regs
);
883 clear_thread_flag(TIF_IRET
);
884 #endif /* CONFIG_X86_32 */
887 void signal_fault(struct pt_regs
*regs
, void __user
*frame
, char *where
)
889 struct task_struct
*me
= current
;
891 if (show_unhandled_signals
&& printk_ratelimit()) {
893 "%s[%d] bad frame in %s frame:%p ip:%lx sp:%lx orax:%lx",
894 task_pid_nr(current
) > 1 ? KERN_INFO
: KERN_EMERG
,
895 me
->comm
, me
->pid
, where
, frame
,
896 regs
->ip
, regs
->sp
, regs
->orig_ax
);
897 print_vma_addr(" in ", regs
->ip
);
898 printk(KERN_CONT
"\n");
901 force_sig(SIGSEGV
, me
);
This page took 0.061396 seconds and 4 git commands to generate.