]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/x86/kernel/signal_32.c
x86: signal: cosmetic unification of setup_sigcontext()
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / kernel / signal_32.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (C) 1991, 1992 Linus Torvalds
3 *
4 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
5 * 2000-06-20 Pentium III FXSR, SSE support by Gareth Hughes
6 */
7e907f48 7#include <linux/list.h>
1da177e4 8
7e907f48
IM
9#include <linux/personality.h>
10#include <linux/binfmts.h>
11#include <linux/suspend.h>
1da177e4 12#include <linux/kernel.h>
7e907f48 13#include <linux/ptrace.h>
1da177e4 14#include <linux/signal.h>
7e907f48
IM
15#include <linux/stddef.h>
16#include <linux/unistd.h>
1da177e4 17#include <linux/errno.h>
7e907f48 18#include <linux/sched.h>
1da177e4 19#include <linux/wait.h>
36a03308 20#include <linux/tracehook.h>
1da177e4 21#include <linux/elf.h>
7e907f48
IM
22#include <linux/smp.h>
23#include <linux/mm.h>
24
1da177e4
LT
25#include <asm/processor.h>
26#include <asm/ucontext.h>
27#include <asm/uaccess.h>
28#include <asm/i387.h>
6c3652ef 29#include <asm/vdso.h>
bb57925f 30#include <asm/syscall.h>
bbc1f698 31#include <asm/syscalls.h>
7e907f48 32
123a6347 33#include "sigframe.h"
1da177e4 34
1da177e4
LT
35#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
36
1a176803
HH
37#define __FIX_EFLAGS (X86_EFLAGS_AC | X86_EFLAGS_OF | \
38 X86_EFLAGS_DF | X86_EFLAGS_TF | X86_EFLAGS_SF | \
39 X86_EFLAGS_ZF | X86_EFLAGS_AF | X86_EFLAGS_PF | \
40 X86_EFLAGS_CF)
41
42#ifdef CONFIG_X86_32
43# define FIX_EFLAGS (__FIX_EFLAGS | X86_EFLAGS_RF)
44#else
45# define FIX_EFLAGS __FIX_EFLAGS
46#endif
47
1da177e4
LT
48/*
49 * Atomically swap in the new signal mask, and wait for a signal.
50 */
51asmlinkage int
52sys_sigsuspend(int history0, int history1, old_sigset_t mask)
53{
1da177e4
LT
54 mask &= _BLOCKABLE;
55 spin_lock_irq(&current->sighand->siglock);
283828f3 56 current->saved_sigmask = current->blocked;
1da177e4
LT
57 siginitset(&current->blocked, mask);
58 recalc_sigpending();
59 spin_unlock_irq(&current->sighand->siglock);
60
283828f3
DH
61 current->state = TASK_INTERRUPTIBLE;
62 schedule();
5a8da0ea 63 set_restore_sigmask();
7e907f48 64
283828f3 65 return -ERESTARTNOHAND;
1da177e4
LT
66}
67
7e907f48 68asmlinkage int
1da177e4
LT
69sys_sigaction(int sig, const struct old_sigaction __user *act,
70 struct old_sigaction __user *oact)
71{
72 struct k_sigaction new_ka, old_ka;
73 int ret;
74
75 if (act) {
76 old_sigset_t mask;
7e907f48 77
1da177e4
LT
78 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
79 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
80 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
81 return -EFAULT;
7e907f48 82
1da177e4
LT
83 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
84 __get_user(mask, &act->sa_mask);
85 siginitset(&new_ka.sa.sa_mask, mask);
86 }
87
88 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
89
90 if (!ret && oact) {
91 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
92 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
93 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
94 return -EFAULT;
7e907f48 95
1da177e4
LT
96 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
97 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
98 }
99
100 return ret;
101}
102
7e907f48 103asmlinkage int sys_sigaltstack(unsigned long bx)
1da177e4 104{
7e907f48
IM
105 /*
106 * This is needed to make gcc realize it doesn't own the
107 * "struct pt_regs"
108 */
65ea5b03
PA
109 struct pt_regs *regs = (struct pt_regs *)&bx;
110 const stack_t __user *uss = (const stack_t __user *)bx;
111 stack_t __user *uoss = (stack_t __user *)regs->cx;
1da177e4 112
65ea5b03 113 return do_sigaltstack(uss, uoss, regs->sp);
1da177e4
LT
114}
115
a2e8d3dc
HS
116#define COPY(x) { \
117 err |= __get_user(regs->x, &sc->x); \
118}
119
120#define COPY_SEG(seg) { \
121 unsigned short tmp; \
122 err |= __get_user(tmp, &sc->seg); \
123 regs->seg = tmp; \
124}
125
126#define COPY_SEG_STRICT(seg) { \
127 unsigned short tmp; \
128 err |= __get_user(tmp, &sc->seg); \
129 regs->seg = tmp | 3; \
130}
131
132#define GET_SEG(seg) { \
133 unsigned short tmp; \
134 err |= __get_user(tmp, &sc->seg); \
135 loadsegment(seg, tmp); \
136}
1da177e4
LT
137
138/*
139 * Do a signal return; undo the signal stack.
140 */
1da177e4 141static int
866bc13f
HH
142restore_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc,
143 unsigned long *pax)
1da177e4 144{
69e13ad5
HS
145 void __user *buf;
146 unsigned int tmpflags;
1da177e4
LT
147 unsigned int err = 0;
148
149 /* Always make any pending restarted system calls return -EINTR */
150 current_thread_info()->restart_block.fn = do_no_restart_syscall;
151
709110bd 152#ifdef CONFIG_X86_32
464d1a78
JF
153 GET_SEG(gs);
154 COPY_SEG(fs);
1da177e4
LT
155 COPY_SEG(es);
156 COPY_SEG(ds);
709110bd
HS
157#endif /* CONFIG_X86_32 */
158
ac66f3fd
HH
159 COPY(di); COPY(si); COPY(bp); COPY(sp); COPY(bx);
160 COPY(dx); COPY(cx); COPY(ip);
709110bd
HS
161
162#ifdef CONFIG_X86_64
163 COPY(r8);
164 COPY(r9);
165 COPY(r10);
166 COPY(r11);
167 COPY(r12);
168 COPY(r13);
169 COPY(r14);
170 COPY(r15);
171#endif /* CONFIG_X86_64 */
172
173#ifdef CONFIG_X86_32
1da177e4
LT
174 COPY_SEG_STRICT(cs);
175 COPY_SEG_STRICT(ss);
709110bd
HS
176#else /* !CONFIG_X86_32 */
177 /* Kernel saves and restores only the CS segment register on signals,
178 * which is the bare minimum needed to allow mixed 32/64-bit code.
179 * App's signal handler can save/restore other segments if needed. */
180 COPY_SEG_STRICT(cs);
181#endif /* CONFIG_X86_32 */
7e907f48 182
69e13ad5
HS
183 err |= __get_user(tmpflags, &sc->flags);
184 regs->flags = (regs->flags & ~FIX_EFLAGS) | (tmpflags & FIX_EFLAGS);
185 regs->orig_ax = -1; /* disable syscall checks */
7e907f48 186
69e13ad5
HS
187 err |= __get_user(buf, &sc->fpstate);
188 err |= restore_i387_xstate(buf);
1da177e4 189
866bc13f 190 err |= __get_user(*pax, &sc->ax);
1da177e4 191 return err;
1da177e4
LT
192}
193
866bc13f 194asmlinkage unsigned long sys_sigreturn(unsigned long __unused)
1da177e4 195{
7e907f48
IM
196 struct sigframe __user *frame;
197 struct pt_regs *regs;
866bc13f 198 unsigned long ax;
7e907f48
IM
199 sigset_t set;
200
201 regs = (struct pt_regs *) &__unused;
202 frame = (struct sigframe __user *)(regs->sp - 8);
1da177e4
LT
203
204 if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
205 goto badframe;
7e907f48 206 if (__get_user(set.sig[0], &frame->sc.oldmask) || (_NSIG_WORDS > 1
1da177e4
LT
207 && __copy_from_user(&set.sig[1], &frame->extramask,
208 sizeof(frame->extramask))))
209 goto badframe;
210
211 sigdelsetmask(&set, ~_BLOCKABLE);
212 spin_lock_irq(&current->sighand->siglock);
213 current->blocked = set;
214 recalc_sigpending();
215 spin_unlock_irq(&current->sighand->siglock);
7e907f48 216
65ea5b03 217 if (restore_sigcontext(regs, &frame->sc, &ax))
1da177e4 218 goto badframe;
65ea5b03 219 return ax;
1da177e4
LT
220
221badframe:
03252919 222 if (show_unhandled_signals && printk_ratelimit()) {
1181f8b5 223 printk("%s%s[%d] bad frame in sigreturn frame:"
97b44ae6 224 "%p ip:%lx sp:%lx oeax:%lx",
19c5870c 225 task_pid_nr(current) > 1 ? KERN_INFO : KERN_EMERG,
65ea5b03
PA
226 current->comm, task_pid_nr(current), frame, regs->ip,
227 regs->sp, regs->orig_ax);
03252919 228 print_vma_addr(" in ", regs->ip);
97b44ae6 229 printk(KERN_CONT "\n");
03252919 230 }
abd4f750 231
1da177e4 232 force_sig(SIGSEGV, current);
7e907f48 233
1da177e4 234 return 0;
7e907f48 235}
1da177e4 236
e6babb6b 237static long do_rt_sigreturn(struct pt_regs *regs)
1da177e4 238{
2d19c458 239 struct rt_sigframe __user *frame;
866bc13f 240 unsigned long ax;
1da177e4 241 sigset_t set;
1da177e4 242
2d19c458 243 frame = (struct rt_sigframe __user *)(regs->sp - sizeof(long));
1da177e4
LT
244 if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
245 goto badframe;
246 if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
247 goto badframe;
248
249 sigdelsetmask(&set, ~_BLOCKABLE);
250 spin_lock_irq(&current->sighand->siglock);
251 current->blocked = set;
252 recalc_sigpending();
253 spin_unlock_irq(&current->sighand->siglock);
7e907f48 254
65ea5b03 255 if (restore_sigcontext(regs, &frame->uc.uc_mcontext, &ax))
1da177e4
LT
256 goto badframe;
257
65ea5b03 258 if (do_sigaltstack(&frame->uc.uc_stack, NULL, regs->sp) == -EFAULT)
1da177e4
LT
259 goto badframe;
260
65ea5b03 261 return ax;
1da177e4
LT
262
263badframe:
e6babb6b 264 signal_fault(regs, frame, "rt_sigreturn");
1da177e4 265 return 0;
7e907f48 266}
1da177e4 267
e6babb6b
HS
268asmlinkage int sys_rt_sigreturn(unsigned long __unused)
269{
270 struct pt_regs *regs = (struct pt_regs *)&__unused;
271
272 return do_rt_sigreturn(regs);
273}
274
1da177e4
LT
275/*
276 * Set up a signal frame.
277 */
1da177e4 278static int
ab513701 279setup_sigcontext(struct sigcontext __user *sc, void __user *fpstate,
1da177e4
LT
280 struct pt_regs *regs, unsigned long mask)
281{
15002fa9 282 int err = 0;
1da177e4 283
15002fa9
HS
284#ifdef CONFIG_X86_32
285 {
286 unsigned int tmp;
1da177e4 287
15002fa9
HS
288 savesegment(gs, tmp);
289 err |= __put_user(tmp, (unsigned int __user *)&sc->gs);
290 }
291 err |= __put_user(regs->fs, (unsigned int __user *)&sc->fs);
65ea5b03
PA
292 err |= __put_user(regs->es, (unsigned int __user *)&sc->es);
293 err |= __put_user(regs->ds, (unsigned int __user *)&sc->ds);
15002fa9
HS
294#endif /* CONFIG_X86_32 */
295
742fa54a
PA
296 err |= __put_user(regs->di, &sc->di);
297 err |= __put_user(regs->si, &sc->si);
298 err |= __put_user(regs->bp, &sc->bp);
299 err |= __put_user(regs->sp, &sc->sp);
300 err |= __put_user(regs->bx, &sc->bx);
301 err |= __put_user(regs->dx, &sc->dx);
302 err |= __put_user(regs->cx, &sc->cx);
303 err |= __put_user(regs->ax, &sc->ax);
15002fa9
HS
304#ifdef CONFIG_X86_64
305 err |= __put_user(regs->r8, &sc->r8);
306 err |= __put_user(regs->r9, &sc->r9);
307 err |= __put_user(regs->r10, &sc->r10);
308 err |= __put_user(regs->r11, &sc->r11);
309 err |= __put_user(regs->r12, &sc->r12);
310 err |= __put_user(regs->r13, &sc->r13);
311 err |= __put_user(regs->r14, &sc->r14);
312 err |= __put_user(regs->r15, &sc->r15);
313#endif /* CONFIG_X86_64 */
314
1da177e4
LT
315 err |= __put_user(current->thread.trap_no, &sc->trapno);
316 err |= __put_user(current->thread.error_code, &sc->err);
742fa54a 317 err |= __put_user(regs->ip, &sc->ip);
15002fa9 318#ifdef CONFIG_X86_32
65ea5b03 319 err |= __put_user(regs->cs, (unsigned int __user *)&sc->cs);
742fa54a
PA
320 err |= __put_user(regs->flags, &sc->flags);
321 err |= __put_user(regs->sp, &sc->sp_at_signal);
65ea5b03 322 err |= __put_user(regs->ss, (unsigned int __user *)&sc->ss);
15002fa9
HS
323#else /* !CONFIG_X86_32 */
324 err |= __put_user(regs->flags, &sc->flags);
325 err |= __put_user(regs->cs, &sc->cs);
326 err |= __put_user(0, &sc->gs);
327 err |= __put_user(0, &sc->fs);
328#endif /* CONFIG_X86_32 */
1da177e4 329
4b33669e 330 err |= __put_user(fpstate, &sc->fpstate);
1da177e4
LT
331
332 /* non-iBCS2 extensions.. */
333 err |= __put_user(mask, &sc->oldmask);
334 err |= __put_user(current->thread.cr2, &sc->cr2);
335
336 return err;
337}
338
339/*
340 * Determine which stack to use..
341 */
342static inline void __user *
3c1c7f10 343get_sigframe(struct k_sigaction *ka, struct pt_regs *regs, size_t frame_size,
ab513701 344 void **fpstate)
1da177e4 345{
65ea5b03 346 unsigned long sp;
1da177e4
LT
347
348 /* Default to using normal stack */
65ea5b03 349 sp = regs->sp;
1da177e4 350
83bd0102
RM
351 /*
352 * If we are on the alternate signal stack and would overflow it, don't.
353 * Return an always-bogus address instead so we will die with SIGSEGV.
354 */
65ea5b03 355 if (on_sig_stack(sp) && !likely(on_sig_stack(sp - frame_size)))
83bd0102
RM
356 return (void __user *) -1L;
357
1da177e4
LT
358 /* This is the X/Open sanctioned signal stack switching. */
359 if (ka->sa.sa_flags & SA_ONSTACK) {
65ea5b03
PA
360 if (sas_ss_flags(sp) == 0)
361 sp = current->sas_ss_sp + current->sas_ss_size;
7e907f48
IM
362 } else {
363 /* This is the legacy signal stack switching. */
364 if ((regs->ss & 0xffff) != __USER_DS &&
365 !(ka->sa.sa_flags & SA_RESTORER) &&
366 ka->sa.sa_restorer)
367 sp = (unsigned long) ka->sa.sa_restorer;
1da177e4
LT
368 }
369
3c1c7f10
SS
370 if (used_math()) {
371 sp = sp - sig_xstate_size;
372 *fpstate = (struct _fpstate *) sp;
4b33669e
HS
373 if (save_i387_xstate(*fpstate) < 0)
374 return (void __user *)-1L;
3c1c7f10
SS
375 }
376
65ea5b03 377 sp -= frame_size;
7e907f48
IM
378 /*
379 * Align the stack pointer according to the i386 ABI,
380 * i.e. so that on function entry ((sp + 4) & 15) == 0.
381 */
65ea5b03 382 sp = ((sp + 4) & -16ul) - 4;
7e907f48 383
65ea5b03 384 return (void __user *) sp;
1da177e4
LT
385}
386
7e907f48 387static int
1d13024e
HS
388__setup_frame(int sig, struct k_sigaction *ka, sigset_t *set,
389 struct pt_regs *regs)
1da177e4 390{
1da177e4 391 struct sigframe __user *frame;
7e907f48 392 void __user *restorer;
1da177e4 393 int err = 0;
ab513701 394 void __user *fpstate = NULL;
1da177e4 395
3c1c7f10 396 frame = get_sigframe(ka, regs, sizeof(*frame), &fpstate);
1da177e4
LT
397
398 if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
3d0aedd9 399 return -EFAULT;
1da177e4 400
2ba48e16 401 if (__put_user(sig, &frame->sig))
3d0aedd9 402 return -EFAULT;
1da177e4 403
2ba48e16 404 if (setup_sigcontext(&frame->sc, fpstate, regs, set->sig[0]))
3d0aedd9 405 return -EFAULT;
1da177e4
LT
406
407 if (_NSIG_WORDS > 1) {
2ba48e16
HS
408 if (__copy_to_user(&frame->extramask, &set->sig[1],
409 sizeof(frame->extramask)))
3d0aedd9 410 return -EFAULT;
1da177e4
LT
411 }
412
1a3e4ca4 413 if (current->mm->context.vdso)
6c3652ef 414 restorer = VDSO32_SYMBOL(current->mm->context.vdso, sigreturn);
9fbbd4dd 415 else
ade1af77 416 restorer = &frame->retcode;
1da177e4
LT
417 if (ka->sa.sa_flags & SA_RESTORER)
418 restorer = ka->sa.sa_restorer;
419
420 /* Set up to return from userspace. */
421 err |= __put_user(restorer, &frame->pretcode);
7e907f48 422
1da177e4 423 /*
7e907f48 424 * This is popl %eax ; movl $__NR_sigreturn, %eax ; int $0x80
1da177e4
LT
425 *
426 * WE DO NOT USE IT ANY MORE! It's only left here for historical
427 * reasons and because gdb uses it as a signature to notice
428 * signal handler stack frames.
429 */
430 err |= __put_user(0xb858, (short __user *)(frame->retcode+0));
431 err |= __put_user(__NR_sigreturn, (int __user *)(frame->retcode+2));
432 err |= __put_user(0x80cd, (short __user *)(frame->retcode+6));
433
434 if (err)
3d0aedd9 435 return -EFAULT;
1da177e4
LT
436
437 /* Set up registers for signal handler */
7e907f48
IM
438 regs->sp = (unsigned long)frame;
439 regs->ip = (unsigned long)ka->sa.sa_handler;
440 regs->ax = (unsigned long)sig;
92bc2056
HH
441 regs->dx = 0;
442 regs->cx = 0;
1da177e4 443
65ea5b03
PA
444 regs->ds = __USER_DS;
445 regs->es = __USER_DS;
446 regs->ss = __USER_DS;
447 regs->cs = __USER_CS;
1da177e4 448
283828f3 449 return 0;
1da177e4
LT
450}
451
1d13024e
HS
452static int __setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
453 sigset_t *set, struct pt_regs *regs)
1da177e4 454{
1da177e4 455 struct rt_sigframe __user *frame;
7e907f48 456 void __user *restorer;
1da177e4 457 int err = 0;
ab513701 458 void __user *fpstate = NULL;
1da177e4 459
3c1c7f10 460 frame = get_sigframe(ka, regs, sizeof(*frame), &fpstate);
1da177e4
LT
461
462 if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
3d0aedd9 463 return -EFAULT;
1da177e4 464
13ad7725 465 err |= __put_user(sig, &frame->sig);
1da177e4
LT
466 err |= __put_user(&frame->info, &frame->pinfo);
467 err |= __put_user(&frame->uc, &frame->puc);
468 err |= copy_siginfo_to_user(&frame->info, info);
469 if (err)
3d0aedd9 470 return -EFAULT;
1da177e4
LT
471
472 /* Create the ucontext. */
c37b5efe
SS
473 if (cpu_has_xsave)
474 err |= __put_user(UC_FP_XSTATE, &frame->uc.uc_flags);
475 else
476 err |= __put_user(0, &frame->uc.uc_flags);
1da177e4
LT
477 err |= __put_user(0, &frame->uc.uc_link);
478 err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
65ea5b03 479 err |= __put_user(sas_ss_flags(regs->sp),
1da177e4
LT
480 &frame->uc.uc_stack.ss_flags);
481 err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
3c1c7f10 482 err |= setup_sigcontext(&frame->uc.uc_mcontext, fpstate,
7e907f48 483 regs, set->sig[0]);
1da177e4
LT
484 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
485 if (err)
3d0aedd9 486 return -EFAULT;
1da177e4
LT
487
488 /* Set up to return from userspace. */
6c3652ef 489 restorer = VDSO32_SYMBOL(current->mm->context.vdso, rt_sigreturn);
1da177e4
LT
490 if (ka->sa.sa_flags & SA_RESTORER)
491 restorer = ka->sa.sa_restorer;
492 err |= __put_user(restorer, &frame->pretcode);
7e907f48 493
1da177e4 494 /*
7e907f48 495 * This is movl $__NR_rt_sigreturn, %ax ; int $0x80
1da177e4
LT
496 *
497 * WE DO NOT USE IT ANY MORE! It's only left here for historical
498 * reasons and because gdb uses it as a signature to notice
499 * signal handler stack frames.
500 */
501 err |= __put_user(0xb8, (char __user *)(frame->retcode+0));
502 err |= __put_user(__NR_rt_sigreturn, (int __user *)(frame->retcode+1));
503 err |= __put_user(0x80cd, (short __user *)(frame->retcode+5));
504
505 if (err)
3d0aedd9 506 return -EFAULT;
1da177e4
LT
507
508 /* Set up registers for signal handler */
7e907f48
IM
509 regs->sp = (unsigned long)frame;
510 regs->ip = (unsigned long)ka->sa.sa_handler;
13ad7725 511 regs->ax = (unsigned long)sig;
7e907f48
IM
512 regs->dx = (unsigned long)&frame->info;
513 regs->cx = (unsigned long)&frame->uc;
1da177e4 514
65ea5b03
PA
515 regs->ds = __USER_DS;
516 regs->es = __USER_DS;
517 regs->ss = __USER_DS;
518 regs->cs = __USER_CS;
1da177e4 519
283828f3 520 return 0;
1da177e4
LT
521}
522
523/*
7e907f48
IM
524 * OK, we're invoking a handler:
525 */
8d8c13bd
HS
526static int signr_convert(int sig)
527{
96bf84b7 528#ifdef CONFIG_X86_32
8d8c13bd
HS
529 struct thread_info *info = current_thread_info();
530
531 if (info->exec_domain && info->exec_domain->signal_invmap && sig < 32)
532 return info->exec_domain->signal_invmap[sig];
96bf84b7 533#endif /* CONFIG_X86_32 */
8d8c13bd
HS
534 return sig;
535}
536
cabf5035
HS
537#ifdef CONFIG_X86_32
538
455edbc4 539#define is_ia32 1
4694d239
HS
540#define ia32_setup_frame __setup_frame
541#define ia32_setup_rt_frame __setup_rt_frame
455edbc4 542
cabf5035
HS
543#else /* !CONFIG_X86_32 */
544
545#ifdef CONFIG_IA32_EMULATION
546#define is_ia32 test_thread_flag(TIF_IA32)
547#else /* !CONFIG_IA32_EMULATION */
548#define is_ia32 0
549#endif /* CONFIG_IA32_EMULATION */
550
551#endif /* CONFIG_X86_32 */
552
1d13024e
HS
553static int
554setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
555 sigset_t *set, struct pt_regs *regs)
556{
8d8c13bd 557 int usig = signr_convert(sig);
1d13024e
HS
558 int ret;
559
560 /* Set up the stack frame */
455edbc4
HS
561 if (is_ia32) {
562 if (ka->sa.sa_flags & SA_SIGINFO)
4694d239 563 ret = ia32_setup_rt_frame(usig, ka, info, set, regs);
455edbc4 564 else
4694d239 565 ret = ia32_setup_frame(usig, ka, set, regs);
455edbc4
HS
566 } else
567 ret = __setup_rt_frame(sig, ka, info, set, regs);
1d13024e 568
3d0aedd9
HS
569 if (ret) {
570 force_sigsegv(sig, current);
571 return -EFAULT;
572 }
573
1d13024e
HS
574 return ret;
575}
576
7c1def16 577static int
1da177e4 578handle_signal(unsigned long sig, siginfo_t *info, struct k_sigaction *ka,
ac66f3fd 579 sigset_t *oldset, struct pt_regs *regs)
1da177e4 580{
7c1def16
RM
581 int ret;
582
1da177e4 583 /* Are we from a system call? */
bb57925f 584 if (syscall_get_nr(current, regs) >= 0) {
1da177e4 585 /* If so, check system call restarting.. */
bb57925f 586 switch (syscall_get_error(current, regs)) {
ac66f3fd
HH
587 case -ERESTART_RESTARTBLOCK:
588 case -ERESTARTNOHAND:
589 regs->ax = -EINTR;
590 break;
591
592 case -ERESTARTSYS:
593 if (!(ka->sa.sa_flags & SA_RESTART)) {
65ea5b03 594 regs->ax = -EINTR;
1da177e4 595 break;
ac66f3fd
HH
596 }
597 /* fallthrough */
598 case -ERESTARTNOINTR:
599 regs->ax = regs->orig_ax;
600 regs->ip -= 2;
601 break;
1da177e4
LT
602 }
603 }
604
605 /*
e1f28773
RM
606 * If TF is set due to a debugger (TIF_FORCED_TF), clear the TF
607 * flag so that register information in the sigcontext is correct.
1da177e4 608 */
65ea5b03 609 if (unlikely(regs->flags & X86_EFLAGS_TF) &&
e1f28773 610 likely(test_and_clear_thread_flag(TIF_FORCED_TF)))
65ea5b03 611 regs->flags &= ~X86_EFLAGS_TF;
1da177e4 612
1d13024e 613 ret = setup_rt_frame(sig, ka, info, oldset, regs);
1da177e4 614
7e907f48
IM
615 if (ret)
616 return ret;
7c1def16 617
86d3237c
HS
618#ifdef CONFIG_X86_64
619 /*
620 * This has nothing to do with segment registers,
621 * despite the name. This magic affects uaccess.h
622 * macros' behavior. Reset it to the normal setting.
623 */
624 set_fs(USER_DS);
625#endif
626
8b9c5ff3
RM
627 /*
628 * Clear the direction flag as per the ABI for function entry.
629 */
630 regs->flags &= ~X86_EFLAGS_DF;
631
632 /*
633 * Clear TF when entering the signal handler, but
634 * notify any tracer that was single-stepping it.
635 * The tracer may want to single-step inside the
636 * handler too.
637 */
638 regs->flags &= ~X86_EFLAGS_TF;
8b9c5ff3 639
7e907f48
IM
640 spin_lock_irq(&current->sighand->siglock);
641 sigorsets(&current->blocked, &current->blocked, &ka->sa.sa_mask);
642 if (!(ka->sa.sa_flags & SA_NODEFER))
643 sigaddset(&current->blocked, sig);
644 recalc_sigpending();
645 spin_unlock_irq(&current->sighand->siglock);
646
36a03308
RM
647 tracehook_signal_handler(sig, info, ka, regs,
648 test_thread_flag(TIF_SINGLESTEP));
649
7e907f48 650 return 0;
1da177e4
LT
651}
652
57917752 653#ifdef CONFIG_X86_32
8fcd8e20 654#define NR_restart_syscall __NR_restart_syscall
57917752
HS
655#else /* !CONFIG_X86_32 */
656#define NR_restart_syscall \
657 test_thread_flag(TIF_IA32) ? __NR_ia32_restart_syscall : __NR_restart_syscall
658#endif /* CONFIG_X86_32 */
659
1da177e4
LT
660/*
661 * Note that 'init' is a special process: it doesn't get signals it doesn't
662 * want to handle. Thus you cannot kill init even with a SIGKILL even by
663 * mistake.
664 */
75604d7f 665static void do_signal(struct pt_regs *regs)
1da177e4 666{
ac66f3fd 667 struct k_sigaction ka;
1da177e4
LT
668 siginfo_t info;
669 int signr;
283828f3 670 sigset_t *oldset;
1da177e4
LT
671
672 /*
ac66f3fd
HH
673 * We want the common case to go fast, which is why we may in certain
674 * cases get here from kernel mode. Just return without doing anything
675 * if so.
676 * X86_32: vm86 regs switched out by assembly code before reaching
677 * here, so testing against kernel CS suffices.
1da177e4 678 */
717b594a 679 if (!user_mode(regs))
283828f3 680 return;
1da177e4 681
5a8da0ea 682 if (current_thread_info()->status & TS_RESTORE_SIGMASK)
283828f3
DH
683 oldset = &current->saved_sigmask;
684 else
1da177e4
LT
685 oldset = &current->blocked;
686
687 signr = get_signal_to_deliver(&info, &ka, regs, NULL);
688 if (signr > 0) {
7e907f48
IM
689 /*
690 * Re-enable any watchpoints before delivering the
1da177e4
LT
691 * signal to user space. The processor register will
692 * have been cleared if the watchpoint triggered
693 * inside the kernel.
694 */
ac66f3fd 695 if (current->thread.debugreg7)
0f534093 696 set_debugreg(current->thread.debugreg7, 7);
1da177e4 697
7e907f48 698 /* Whee! Actually deliver the signal. */
283828f3 699 if (handle_signal(signr, &info, &ka, oldset, regs) == 0) {
7e907f48 700 /*
5a8da0ea 701 * A signal was successfully delivered; the saved
283828f3
DH
702 * sigmask will have been stored in the signal frame,
703 * and will be restored by sigreturn, so we can simply
5a8da0ea 704 * clear the TS_RESTORE_SIGMASK flag.
7e907f48 705 */
5a8da0ea 706 current_thread_info()->status &= ~TS_RESTORE_SIGMASK;
283828f3 707 }
283828f3 708 return;
1da177e4
LT
709 }
710
1da177e4 711 /* Did we come from a system call? */
bb57925f 712 if (syscall_get_nr(current, regs) >= 0) {
1da177e4 713 /* Restart the system call - no handlers present */
bb57925f 714 switch (syscall_get_error(current, regs)) {
283828f3
DH
715 case -ERESTARTNOHAND:
716 case -ERESTARTSYS:
717 case -ERESTARTNOINTR:
65ea5b03
PA
718 regs->ax = regs->orig_ax;
719 regs->ip -= 2;
283828f3
DH
720 break;
721
722 case -ERESTART_RESTARTBLOCK:
8fcd8e20 723 regs->ax = NR_restart_syscall;
65ea5b03 724 regs->ip -= 2;
283828f3 725 break;
1da177e4
LT
726 }
727 }
283828f3 728
ac66f3fd
HH
729 /*
730 * If there's no signal to deliver, we just put the saved sigmask
731 * back.
732 */
5a8da0ea
RM
733 if (current_thread_info()->status & TS_RESTORE_SIGMASK) {
734 current_thread_info()->status &= ~TS_RESTORE_SIGMASK;
283828f3
DH
735 sigprocmask(SIG_SETMASK, &current->saved_sigmask, NULL);
736 }
1da177e4
LT
737}
738
739/*
740 * notification of userspace execution resumption
283828f3 741 * - triggered by the TIF_WORK_MASK flags
1da177e4 742 */
7e907f48
IM
743void
744do_notify_resume(struct pt_regs *regs, void *unused, __u32 thread_info_flags)
1da177e4 745{
ee847c54
HS
746#if defined(CONFIG_X86_64) && defined(CONFIG_X86_MCE)
747 /* notify userspace of pending MCEs */
748 if (thread_info_flags & _TIF_MCE_NOTIFY)
749 mce_notify_user();
750#endif /* CONFIG_X86_64 && CONFIG_X86_MCE */
751
1da177e4 752 /* deal with pending signal delivery */
5a8da0ea 753 if (thread_info_flags & _TIF_SIGPENDING)
283828f3 754 do_signal(regs);
8f4d37ec 755
59e52130
RM
756 if (thread_info_flags & _TIF_NOTIFY_RESUME) {
757 clear_thread_flag(TIF_NOTIFY_RESUME);
758 tracehook_notify_resume(regs);
759 }
760
ee847c54 761#ifdef CONFIG_X86_32
1da177e4 762 clear_thread_flag(TIF_IRET);
ee847c54 763#endif /* CONFIG_X86_32 */
1da177e4 764}
72fa50f4
HS
765
766void signal_fault(struct pt_regs *regs, void __user *frame, char *where)
767{
768 struct task_struct *me = current;
769
770 if (show_unhandled_signals && printk_ratelimit()) {
771 printk(KERN_INFO
772 "%s[%d] bad frame in %s frame:%p ip:%lx sp:%lx orax:%lx",
773 me->comm, me->pid, where, frame,
774 regs->ip, regs->sp, regs->orig_ax);
775 print_vma_addr(" in ", regs->ip);
776 printk(KERN_CONT "\n");
777 }
778
779 force_sig(SIGSEGV, me);
780}