~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/h8300/kernel/signal.c

Version: ~ [ linux-5.4-rc7 ] ~ [ linux-5.3.11 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.84 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.154 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.201 ] ~ [ linux-4.8.17 ] ~ [ linux-4.7.10 ] ~ [ linux-4.6.7 ] ~ [ linux-4.5.7 ] ~ [ linux-4.4.201 ] ~ [ linux-4.3.6 ] ~ [ linux-4.2.8 ] ~ [ linux-4.1.52 ] ~ [ linux-4.0.9 ] ~ [ linux-3.19.8 ] ~ [ linux-3.18.140 ] ~ [ linux-3.17.8 ] ~ [ linux-3.16.77 ] ~ [ linux-3.15.10 ] ~ [ linux-3.14.79 ] ~ [ linux-3.13.11 ] ~ [ linux-3.12.74 ] ~ [ linux-3.11.10 ] ~ [ linux-3.10.108 ] ~ [ linux-3.9.11 ] ~ [ linux-3.8.13 ] ~ [ linux-3.7.10 ] ~ [ linux-3.6.11 ] ~ [ linux-3.5.7 ] ~ [ linux-3.4.113 ] ~ [ linux-3.3.8 ] ~ [ linux-3.2.102 ] ~ [ linux-3.1.10 ] ~ [ linux-3.0.101 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.5 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /*
  2  *  linux/arch/h8300/kernel/signal.c
  3  *
  4  *  Copyright (C) 1991, 1992  Linus Torvalds
  5  *
  6  * This file is subject to the terms and conditions of the GNU General Public
  7  * License.  See the file COPYING in the main directory of this archive
  8  * for more details.
  9  */
 10 
 11 /*
 12  * uClinux H8/300 support by Yoshinori Sato <ysato@users.sourceforge.jp>
 13  *                and David McCullough <davidm@snapgear.com>
 14  *
 15  * Based on
 16  * Linux/m68k by Hamish Macdonald
 17  */
 18 
 19 /*
 20  * ++roman (07/09/96): implemented signal stacks (specially for tosemu on
 21  * Atari :-) Current limitation: Only one sigstack can be active at one time.
 22  * If a second signal with SA_ONSTACK set arrives while working on a sigstack,
 23  * SA_ONSTACK is ignored. This behaviour avoids lots of trouble with nested
 24  * signal handlers!
 25  */
 26 
 27 #include <linux/sched.h>
 28 #include <linux/mm.h>
 29 #include <linux/kernel.h>
 30 #include <linux/signal.h>
 31 #include <linux/syscalls.h>
 32 #include <linux/errno.h>
 33 #include <linux/wait.h>
 34 #include <linux/ptrace.h>
 35 #include <linux/unistd.h>
 36 #include <linux/stddef.h>
 37 #include <linux/highuid.h>
 38 #include <linux/personality.h>
 39 #include <linux/tty.h>
 40 #include <linux/binfmts.h>
 41 #include <linux/freezer.h>
 42 #include <linux/tracehook.h>
 43 
 44 #include <asm/setup.h>
 45 #include <asm/uaccess.h>
 46 #include <asm/pgtable.h>
 47 #include <asm/traps.h>
 48 #include <asm/ucontext.h>
 49 
 50 #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
 51 
 52 asmlinkage int do_signal(struct pt_regs *regs, sigset_t *oldset);
 53 
 54 /*
 55  * Atomically swap in the new signal mask, and wait for a signal.
 56  */
 57 asmlinkage int do_sigsuspend(struct pt_regs *regs)
 58 {
 59         old_sigset_t mask = regs->er3;
 60         sigset_t saveset;
 61 
 62         mask &= _BLOCKABLE;
 63         spin_lock_irq(&current->sighand->siglock);
 64         saveset = current->blocked;
 65         siginitset(&current->blocked, mask);
 66         recalc_sigpending();
 67         spin_unlock_irq(&current->sighand->siglock);
 68 
 69         regs->er0 = -EINTR;
 70         while (1) {
 71                 current->state = TASK_INTERRUPTIBLE;
 72                 schedule();
 73                 if (do_signal(regs, &saveset))
 74                         return -EINTR;
 75         }
 76 }
 77 
 78 asmlinkage int
 79 do_rt_sigsuspend(struct pt_regs *regs)
 80 {
 81         sigset_t *unewset = (sigset_t *)regs->er1;
 82         size_t sigsetsize = (size_t)regs->er2;
 83         sigset_t saveset, newset;
 84 
 85         /* XXX: Don't preclude handling different sized sigset_t's.  */
 86         if (sigsetsize != sizeof(sigset_t))
 87                 return -EINVAL;
 88 
 89         if (copy_from_user(&newset, unewset, sizeof(newset)))
 90                 return -EFAULT;
 91         sigdelsetmask(&newset, ~_BLOCKABLE);
 92 
 93         spin_lock_irq(&current->sighand->siglock);
 94         saveset = current->blocked;
 95         current->blocked = newset;
 96         recalc_sigpending();
 97         spin_unlock_irq(&current->sighand->siglock);
 98 
 99         regs->er0 = -EINTR;
100         while (1) {
101                 current->state = TASK_INTERRUPTIBLE;
102                 schedule();
103                 if (do_signal(regs, &saveset))
104                         return -EINTR;
105         }
106 }
107 
108 asmlinkage int 
109 sys_sigaction(int sig, const struct old_sigaction *act,
110               struct old_sigaction *oact)
111 {
112         struct k_sigaction new_ka, old_ka;
113         int ret;
114 
115         if (act) {
116                 old_sigset_t mask;
117                 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
118                     __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
119                     __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
120                         return -EFAULT;
121                 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
122                 __get_user(mask, &act->sa_mask);
123                 siginitset(&new_ka.sa.sa_mask, mask);
124         }
125 
126         ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
127 
128         if (!ret && oact) {
129                 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
130                     __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
131                     __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
132                         return -EFAULT;
133                 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
134                 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
135         }
136 
137         return ret;
138 }
139 
140 asmlinkage int
141 sys_sigaltstack(const stack_t *uss, stack_t *uoss)
142 {
143         return do_sigaltstack(uss, uoss, rdusp());
144 }
145 
146 
147 /*
148  * Do a signal return; undo the signal stack.
149  *
150  * Keep the return code on the stack quadword aligned!
151  * That makes the cache flush below easier.
152  */
153 
154 struct sigframe
155 {
156         long dummy_er0;
157         long dummy_vector;
158 #if defined(CONFIG_CPU_H8S)
159         short dummy_exr;
160 #endif
161         long dummy_pc;
162         char *pretcode;
163         unsigned char retcode[8];
164         unsigned long extramask[_NSIG_WORDS-1];
165         struct sigcontext sc;
166         int sig;
167 } __attribute__((aligned(2),packed));
168 
169 struct rt_sigframe
170 {
171         long dummy_er0;
172         long dummy_vector;
173 #if defined(CONFIG_CPU_H8S)
174         short dummy_exr;
175 #endif
176         long dummy_pc;
177         char *pretcode;
178         struct siginfo *pinfo;
179         void *puc;
180         unsigned char retcode[8];
181         struct siginfo info;
182         struct ucontext uc;
183         int sig;
184 } __attribute__((aligned(2),packed));
185 
186 static inline int
187 restore_sigcontext(struct pt_regs *regs, struct sigcontext *usc,
188                    int *pd0)
189 {
190         int err = 0;
191         unsigned int ccr;
192         unsigned int usp;
193         unsigned int er0;
194 
195         /* Always make any pending restarted system calls return -EINTR */
196         current_thread_info()->restart_block.fn = do_no_restart_syscall;
197 
198 #define COPY(r) err |= __get_user(regs->r, &usc->sc_##r)    /* restore passed registers */
199         COPY(er1);
200         COPY(er2);
201         COPY(er3);
202         COPY(er5);
203         COPY(pc);
204         ccr = regs->ccr & 0x10;
205         COPY(ccr);
206 #undef COPY
207         regs->ccr &= 0xef;
208         regs->ccr |= ccr;
209         regs->orig_er0 = -1;            /* disable syscall checks */
210         err |= __get_user(usp, &usc->sc_usp);
211         wrusp(usp);
212 
213         err |= __get_user(er0, &usc->sc_er0);
214         *pd0 = er0;
215         return err;
216 }
217 
218 asmlinkage int do_sigreturn(unsigned long __unused,...)
219 {
220         struct pt_regs *regs = (struct pt_regs *) (&__unused - 1);
221         unsigned long usp = rdusp();
222         struct sigframe *frame = (struct sigframe *)(usp - 4);
223         sigset_t set;
224         int er0;
225 
226         if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
227                 goto badframe;
228         if (__get_user(set.sig[0], &frame->sc.sc_mask) ||
229             (_NSIG_WORDS > 1 &&
230              __copy_from_user(&set.sig[1], &frame->extramask,
231                               sizeof(frame->extramask))))
232                 goto badframe;
233 
234         sigdelsetmask(&set, ~_BLOCKABLE);
235         spin_lock_irq(&current->sighand->siglock);
236         current->blocked = set;
237         recalc_sigpending();
238         spin_unlock_irq(&current->sighand->siglock);
239         
240         if (restore_sigcontext(regs, &frame->sc, &er0))
241                 goto badframe;
242         return er0;
243 
244 badframe:
245         force_sig(SIGSEGV, current);
246         return 0;
247 }
248 
249 asmlinkage int do_rt_sigreturn(unsigned long __unused,...)
250 {
251         struct pt_regs *regs = (struct pt_regs *) &__unused;
252         unsigned long usp = rdusp();
253         struct rt_sigframe *frame = (struct rt_sigframe *)(usp - 4);
254         sigset_t set;
255         int er0;
256 
257         if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
258                 goto badframe;
259         if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
260                 goto badframe;
261 
262         sigdelsetmask(&set, ~_BLOCKABLE);
263         spin_unlock_irq(&current->sighand->siglock);
264         current->blocked = set;
265         recalc_sigpending();
266         spin_lock_irq(&current->sighand->siglock);
267         
268         if (restore_sigcontext(regs, &frame->uc.uc_mcontext, &er0))
269                 goto badframe;
270 
271         if (do_sigaltstack(&frame->uc.uc_stack, NULL, usp) == -EFAULT)
272                 goto badframe;
273 
274         return er0;
275 
276 badframe:
277         force_sig(SIGSEGV, current);
278         return 0;
279 }
280 
281 static int setup_sigcontext(struct sigcontext __user *sc, struct pt_regs *regs,
282                              unsigned long mask)
283 {
284         int err = 0;
285 
286         err |= __put_user(regs->er0, &sc->sc_er0);
287         err |= __put_user(regs->er1, &sc->sc_er1);
288         err |= __put_user(regs->er2, &sc->sc_er2);
289         err |= __put_user(regs->er3, &sc->sc_er3);
290         err |= __put_user(regs->er4, &sc->sc_er4);
291         err |= __put_user(regs->er5, &sc->sc_er5);
292         err |= __put_user(regs->er6, &sc->sc_er6);
293         err |= __put_user(rdusp(),   &sc->sc_usp);
294         err |= __put_user(regs->pc,  &sc->sc_pc);
295         err |= __put_user(regs->ccr, &sc->sc_ccr);
296         err |= __put_user(mask,      &sc->sc_mask);
297 
298         return err;
299 }
300 
301 static inline void *
302 get_sigframe(struct k_sigaction *ka, struct pt_regs *regs, size_t frame_size)
303 {
304         unsigned long usp;
305 
306         /* Default to using normal stack.  */
307         usp = rdusp();
308 
309         /* This is the X/Open sanctioned signal stack switching.  */
310         if (ka->sa.sa_flags & SA_ONSTACK) {
311                 if (!sas_ss_flags(usp))
312                         usp = current->sas_ss_sp + current->sas_ss_size;
313         }
314         return (void *)((usp - frame_size) & -8UL);
315 }
316 
317 static void setup_frame (int sig, struct k_sigaction *ka,
318                          sigset_t *set, struct pt_regs *regs)
319 {
320         struct sigframe *frame;
321         int err = 0;
322         int usig;
323         unsigned char *ret;
324 
325         frame = get_sigframe(ka, regs, sizeof(*frame));
326 
327         if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
328                 goto give_sigsegv;
329 
330         usig = current_thread_info()->exec_domain
331                 && current_thread_info()->exec_domain->signal_invmap
332                 && sig < 32
333                 ? current_thread_info()->exec_domain->signal_invmap[sig]
334                 : sig;
335 
336         err |= __put_user(usig, &frame->sig);
337         if (err)
338                 goto give_sigsegv;
339 
340         err |= setup_sigcontext(&frame->sc, regs, set->sig[0]);
341         if (err)
342                 goto give_sigsegv;
343 
344         if (_NSIG_WORDS > 1) {
345                 err |= copy_to_user(frame->extramask, &set->sig[1],
346                                     sizeof(frame->extramask));
347                 if (err)
348                         goto give_sigsegv;
349         }
350 
351         ret = frame->retcode;
352         if (ka->sa.sa_flags & SA_RESTORER)
353                 ret = (unsigned char *)(ka->sa.sa_restorer);
354         else {
355                 /* sub.l er0,er0; mov.b #__NR_sigreturn,r0l; trapa #0 */
356                 err |= __put_user(0x1a80f800 + (__NR_sigreturn & 0xff),
357                                   (unsigned long *)(frame->retcode + 0));
358                 err |= __put_user(0x5700, (unsigned short *)(frame->retcode + 4));
359         }
360 
361         /* Set up to return from userspace.  */
362         err |= __put_user(ret, &frame->pretcode);
363 
364         if (err)
365                 goto give_sigsegv;
366 
367         /* Set up registers for signal handler */
368         wrusp ((unsigned long) frame);
369         regs->pc = (unsigned long) ka->sa.sa_handler;
370         regs->er0 = (current_thread_info()->exec_domain
371                            && current_thread_info()->exec_domain->signal_invmap
372                            && sig < 32
373                            ? current_thread_info()->exec_domain->signal_invmap[sig]
374                           : sig);
375         regs->er1 = (unsigned long)&(frame->sc);
376         regs->er5 = current->mm->start_data;    /* GOT base */
377 
378         return;
379 
380 give_sigsegv:
381         force_sigsegv(sig, current);
382 }
383 
384 static void setup_rt_frame (int sig, struct k_sigaction *ka, siginfo_t *info,
385                             sigset_t *set, struct pt_regs *regs)
386 {
387         struct rt_sigframe *frame;
388         int err = 0;
389         int usig;
390         unsigned char *ret;
391 
392         frame = get_sigframe(ka, regs, sizeof(*frame));
393 
394         if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
395                 goto give_sigsegv;
396 
397         usig = current_thread_info()->exec_domain
398                 && current_thread_info()->exec_domain->signal_invmap
399                 && sig < 32
400                 ? current_thread_info()->exec_domain->signal_invmap[sig]
401                 : sig;
402 
403         err |= __put_user(usig, &frame->sig);
404         if (err)
405                 goto give_sigsegv;
406 
407         err |= __put_user(&frame->info, &frame->pinfo);
408         err |= __put_user(&frame->uc, &frame->puc);
409         err |= copy_siginfo_to_user(&frame->info, info);
410         if (err)
411                 goto give_sigsegv;
412 
413         /* Create the ucontext.  */
414         err |= __put_user(0, &frame->uc.uc_flags);
415         err |= __put_user(0, &frame->uc.uc_link);
416         err |= __put_user((void *)current->sas_ss_sp,
417                           &frame->uc.uc_stack.ss_sp);
418         err |= __put_user(sas_ss_flags(rdusp()),
419                           &frame->uc.uc_stack.ss_flags);
420         err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
421         err |= setup_sigcontext(&frame->uc.uc_mcontext, regs, set->sig[0]);
422         err |= copy_to_user (&frame->uc.uc_sigmask, set, sizeof(*set));
423         if (err)
424                 goto give_sigsegv;
425 
426         /* Set up to return from userspace.  */
427         ret = frame->retcode;
428         if (ka->sa.sa_flags & SA_RESTORER)
429                 ret = (unsigned char *)(ka->sa.sa_restorer);
430         else {
431                 /* sub.l er0,er0; mov.b #__NR_sigreturn,r0l; trapa #0 */
432                 err |= __put_user(0x1a80f800 + (__NR_sigreturn & 0xff),
433                                   (unsigned long *)(frame->retcode + 0));
434                 err |= __put_user(0x5700, (unsigned short *)(frame->retcode + 4));
435         }
436         err |= __put_user(ret, &frame->pretcode);
437 
438         if (err)
439                 goto give_sigsegv;
440 
441         /* Set up registers for signal handler */
442         wrusp ((unsigned long) frame);
443         regs->pc  = (unsigned long) ka->sa.sa_handler;
444         regs->er0 = (current_thread_info()->exec_domain
445                      && current_thread_info()->exec_domain->signal_invmap
446                      && sig < 32
447                      ? current_thread_info()->exec_domain->signal_invmap[sig]
448                      : sig);
449         regs->er1 = (unsigned long)&(frame->info);
450         regs->er2 = (unsigned long)&frame->uc;
451         regs->er5 = current->mm->start_data;    /* GOT base */
452 
453         return;
454 
455 give_sigsegv:
456         force_sigsegv(sig, current);
457 }
458 
459 /*
460  * OK, we're invoking a handler
461  */
462 static void
463 handle_signal(unsigned long sig, siginfo_t *info, struct k_sigaction *ka,
464               sigset_t *oldset, struct pt_regs * regs)
465 {
466         /* are we from a system call? */
467         if (regs->orig_er0 >= 0) {
468                 switch (regs->er0) {
469                         case -ERESTART_RESTARTBLOCK:
470                         case -ERESTARTNOHAND:
471                                 regs->er0 = -EINTR;
472                                 break;
473 
474                         case -ERESTARTSYS:
475                                 if (!(ka->sa.sa_flags & SA_RESTART)) {
476                                         regs->er0 = -EINTR;
477                                         break;
478                                 }
479                         /* fallthrough */
480                         case -ERESTARTNOINTR:
481                                 regs->er0 = regs->orig_er0;
482                                 regs->pc -= 2;
483                 }
484         }
485 
486         /* set up the stack frame */
487         if (ka->sa.sa_flags & SA_SIGINFO)
488                 setup_rt_frame(sig, ka, info, oldset, regs);
489         else
490                 setup_frame(sig, ka, oldset, regs);
491 
492         spin_lock_irq(&current->sighand->siglock);
493         sigorsets(&current->blocked,&current->blocked,&ka->sa.sa_mask);
494         if (!(ka->sa.sa_flags & SA_NODEFER))
495                 sigaddset(&current->blocked,sig);
496         recalc_sigpending();
497         spin_unlock_irq(&current->sighand->siglock);
498 }
499 
500 /*
501  * Note that 'init' is a special process: it doesn't get signals it doesn't
502  * want to handle. Thus you cannot kill init even with a SIGKILL even by
503  * mistake.
504  */
505 asmlinkage int do_signal(struct pt_regs *regs, sigset_t *oldset)
506 {
507         siginfo_t info;
508         int signr;
509         struct k_sigaction ka;
510 
511         /*
512          * We want the common case to go fast, which
513          * is why we may in certain cases get here from
514          * kernel mode. Just return without doing anything
515          * if so.
516          */
517         if ((regs->ccr & 0x10))
518                 return 1;
519 
520         if (try_to_freeze())
521                 goto no_signal;
522 
523         current->thread.esp0 = (unsigned long) regs;
524 
525         if (!oldset)
526                 oldset = &current->blocked;
527 
528         signr = get_signal_to_deliver(&info, &ka, regs, NULL);
529         if (signr > 0) {
530                 /* Whee!  Actually deliver the signal.  */
531                 handle_signal(signr, &info, &ka, oldset, regs);
532                 return 1;
533         }
534  no_signal:
535         /* Did we come from a system call? */
536         if (regs->orig_er0 >= 0) {
537                 /* Restart the system call - no handlers present */
538                 if (regs->er0 == -ERESTARTNOHAND ||
539                     regs->er0 == -ERESTARTSYS ||
540                     regs->er0 == -ERESTARTNOINTR) {
541                         regs->er0 = regs->orig_er0;
542                         regs->pc -= 2;
543                 }
544                 if (regs->er0 == -ERESTART_RESTARTBLOCK){
545                         regs->er0 = __NR_restart_syscall;
546                         regs->pc -= 2;
547                 }
548         }
549         return 0;
550 }
551 
552 asmlinkage void do_notify_resume(struct pt_regs *regs, u32 thread_info_flags)
553 {
554         if (thread_info_flags & (_TIF_SIGPENDING | _TIF_RESTORE_SIGMASK))
555                 do_signal(regs, NULL);
556 
557         if (thread_info_flags & _TIF_NOTIFY_RESUME) {
558                 clear_thread_flag(TIF_NOTIFY_RESUME);
559                 tracehook_notify_resume(regs);
560                 if (current->replacement_session_keyring)
561                         key_replace_session_keyring();
562         }
563 }
564 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | Wiki (Japanese) | Wiki (English) | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

osdn.jp