~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/um/kernel/signal.c

Version: ~ [ linux-6.1-rc7 ] ~ [ linux-6.0.10 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.80 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.156 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.225 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.267 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.300 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.334 ] ~ [ linux-4.8.17 ] ~ [ linux-4.7.10 ] ~ [ linux-4.6.7 ] ~ [ linux-4.5.7 ] ~ [ linux-4.4.302 ] ~ [ linux-4.3.6 ] ~ [ linux-4.2.8 ] ~ [ linux-4.1.52 ] ~ [ linux-4.0.9 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /*
  2  * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
  3  * Licensed under the GPL
  4  */
  5 
  6 #include <linux/module.h>
  7 #include <linux/ptrace.h>
  8 #include <linux/sched.h>
  9 #include <asm/siginfo.h>
 10 #include <asm/signal.h>
 11 #include <asm/unistd.h>
 12 #include <frame_kern.h>
 13 #include <kern_util.h>
 14 
 15 EXPORT_SYMBOL(block_signals);
 16 EXPORT_SYMBOL(unblock_signals);
 17 
 18 /*
 19  * OK, we're invoking a handler
 20  */
 21 static void handle_signal(struct ksignal *ksig, struct pt_regs *regs)
 22 {
 23         sigset_t *oldset = sigmask_to_save();
 24         int singlestep = 0;
 25         unsigned long sp;
 26         int err;
 27 
 28         if ((current->ptrace & PT_DTRACE) && (current->ptrace & PT_PTRACED))
 29                 singlestep = 1;
 30 
 31         /* Did we come from a system call? */
 32         if (PT_REGS_SYSCALL_NR(regs) >= 0) {
 33                 /* If so, check system call restarting.. */
 34                 switch (PT_REGS_SYSCALL_RET(regs)) {
 35                 case -ERESTART_RESTARTBLOCK:
 36                 case -ERESTARTNOHAND:
 37                         PT_REGS_SYSCALL_RET(regs) = -EINTR;
 38                         break;
 39 
 40                 case -ERESTARTSYS:
 41                         if (!(ksig->ka.sa.sa_flags & SA_RESTART)) {
 42                                 PT_REGS_SYSCALL_RET(regs) = -EINTR;
 43                                 break;
 44                         }
 45                 /* fallthrough */
 46                 case -ERESTARTNOINTR:
 47                         PT_REGS_RESTART_SYSCALL(regs);
 48                         PT_REGS_ORIG_SYSCALL(regs) = PT_REGS_SYSCALL_NR(regs);
 49                         break;
 50                 }
 51         }
 52 
 53         sp = PT_REGS_SP(regs);
 54         if ((ksig->ka.sa.sa_flags & SA_ONSTACK) && (sas_ss_flags(sp) == 0))
 55                 sp = current->sas_ss_sp + current->sas_ss_size;
 56 
 57 #ifdef CONFIG_ARCH_HAS_SC_SIGNALS
 58         if (!(ksig->ka.sa.sa_flags & SA_SIGINFO))
 59                 err = setup_signal_stack_sc(sp, ksig, regs, oldset);
 60         else
 61 #endif
 62                 err = setup_signal_stack_si(sp, ksig, regs, oldset);
 63 
 64         signal_setup_done(err, ksig, singlestep);
 65 }
 66 
 67 void do_signal(struct pt_regs *regs)
 68 {
 69         struct ksignal ksig;
 70         int handled_sig = 0;
 71 
 72         while (get_signal(&ksig)) {
 73                 handled_sig = 1;
 74                 /* Whee!  Actually deliver the signal.  */
 75                 handle_signal(&ksig, regs);
 76         }
 77 
 78         /* Did we come from a system call? */
 79         if (!handled_sig && (PT_REGS_SYSCALL_NR(regs) >= 0)) {
 80                 /* Restart the system call - no handlers present */
 81                 switch (PT_REGS_SYSCALL_RET(regs)) {
 82                 case -ERESTARTNOHAND:
 83                 case -ERESTARTSYS:
 84                 case -ERESTARTNOINTR:
 85                         PT_REGS_ORIG_SYSCALL(regs) = PT_REGS_SYSCALL_NR(regs);
 86                         PT_REGS_RESTART_SYSCALL(regs);
 87                         break;
 88                 case -ERESTART_RESTARTBLOCK:
 89                         PT_REGS_ORIG_SYSCALL(regs) = __NR_restart_syscall;
 90                         PT_REGS_RESTART_SYSCALL(regs);
 91                         break;
 92                 }
 93         }
 94 
 95         /*
 96          * This closes a way to execute a system call on the host.  If
 97          * you set a breakpoint on a system call instruction and singlestep
 98          * from it, the tracing thread used to PTRACE_SINGLESTEP the process
 99          * rather than PTRACE_SYSCALL it, allowing the system call to execute
100          * on the host.  The tracing thread will check this flag and
101          * PTRACE_SYSCALL if necessary.
102          */
103         if (current->ptrace & PT_DTRACE)
104                 current->thread.singlestep_syscall =
105                         is_syscall(PT_REGS_IP(&current->thread.regs));
106 
107         /*
108          * if there's no signal to deliver, we just put the saved sigmask
109          * back
110          */
111         if (!handled_sig)
112                 restore_saved_sigmask();
113 }
114 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | Wiki (Japanese) | Wiki (English) | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

osdn.jp