aboutsummaryrefslogtreecommitdiffstats
path: root/arch/m32r/kernel/signal.c
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@ppc970.osdl.org>2005-04-16 18:20:36 -0400
committerLinus Torvalds <torvalds@ppc970.osdl.org>2005-04-16 18:20:36 -0400
commit1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (patch)
tree0bba044c4ce775e45a88a51686b5d9f90697ea9d /arch/m32r/kernel/signal.c
Linux-2.6.12-rc2v2.6.12-rc2
Initial git repository build. I'm not bothering with the full history, even though we have it. We can create a separate "historical" git archive of that later if we want to, and in the meantime it's about 3.2GB when imported into git - space that would just make the early git days unnecessarily complicated, when we don't have a lot of good infrastructure for it. Let it rip!
Diffstat (limited to 'arch/m32r/kernel/signal.c')
-rw-r--r--arch/m32r/kernel/signal.c438
1 files changed, 438 insertions, 0 deletions
diff --git a/arch/m32r/kernel/signal.c b/arch/m32r/kernel/signal.c
new file mode 100644
index 000000000000..50311eb07a24
--- /dev/null
+++ b/arch/m32r/kernel/signal.c
@@ -0,0 +1,438 @@
1/*
2 * linux/arch/m32r/kernel/signal.c
3 *
4 * Copyright (c) 2003 Hitoshi Yamamoto
5 *
6 * Taken from i386 version.
7 * Copyright (C) 1991, 1992 Linus Torvalds
8 *
9 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
10 * 2000-06-20 Pentium III FXSR, SSE support by Gareth Hughes
11 */
12
13#include <linux/config.h>
14#include <linux/sched.h>
15#include <linux/mm.h>
16#include <linux/smp.h>
17#include <linux/smp_lock.h>
18#include <linux/kernel.h>
19#include <linux/signal.h>
20#include <linux/errno.h>
21#include <linux/wait.h>
22#include <linux/unistd.h>
23#include <linux/stddef.h>
24#include <linux/personality.h>
25#include <linux/suspend.h>
26#include <asm/cacheflush.h>
27#include <asm/ucontext.h>
28#include <asm/uaccess.h>
29
30#define DEBUG_SIG 0
31
32#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
33
34int do_signal(struct pt_regs *, sigset_t *);
35
36asmlinkage int
37sys_rt_sigsuspend(sigset_t *unewset, size_t sigsetsize,
38 unsigned long r2, unsigned long r3, unsigned long r4,
39 unsigned long r5, unsigned long r6, struct pt_regs regs)
40{
41 sigset_t saveset, newset;
42
43 /* XXX: Don't preclude handling different sized sigset_t's. */
44 if (sigsetsize != sizeof(sigset_t))
45 return -EINVAL;
46
47 if (copy_from_user(&newset, unewset, sizeof(newset)))
48 return -EFAULT;
49 sigdelsetmask(&newset, ~_BLOCKABLE);
50
51 spin_lock_irq(&current->sighand->siglock);
52 saveset = current->blocked;
53 current->blocked = newset;
54 recalc_sigpending();
55 spin_unlock_irq(&current->sighand->siglock);
56
57 regs.r0 = -EINTR;
58 while (1) {
59 current->state = TASK_INTERRUPTIBLE;
60 schedule();
61 if (do_signal(&regs, &saveset))
62 return regs.r0;
63 }
64}
65
66asmlinkage int
67sys_sigaltstack(const stack_t __user *uss, stack_t __user *uoss,
68 unsigned long r2, unsigned long r3, unsigned long r4,
69 unsigned long r5, unsigned long r6, struct pt_regs regs)
70{
71 return do_sigaltstack(uss, uoss, regs.spu);
72}
73
74
75/*
76 * Do a signal return; undo the signal stack.
77 */
78
79struct rt_sigframe
80{
81 int sig;
82 struct siginfo *pinfo;
83 void *puc;
84 struct siginfo info;
85 struct ucontext uc;
86// struct _fpstate fpstate;
87};
88
89static int
90restore_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc,
91 int *r0_p)
92{
93 unsigned int err = 0;
94
95 /* Always make any pending restarted system calls return -EINTR */
96 current_thread_info()->restart_block.fn = do_no_restart_syscall;
97
98#define COPY(x) err |= __get_user(regs->x, &sc->sc_##x)
99 COPY(r4);
100 COPY(r5);
101 COPY(r6);
102 COPY(pt_regs);
103 /* COPY(r0); Skip r0 */
104 COPY(r1);
105 COPY(r2);
106 COPY(r3);
107 COPY(r7);
108 COPY(r8);
109 COPY(r9);
110 COPY(r10);
111 COPY(r11);
112 COPY(r12);
113#if defined(CONFIG_ISA_M32R2) && defined(CONFIG_ISA_DSP_LEVEL2)
114 COPY(acc0h);
115 COPY(acc0l);
116 COPY(acc1h);
117 COPY(acc1l);
118#elif defined(CONFIG_ISA_M32R2) || defined(CONFIG_ISA_M32R)
119 COPY(acch);
120 COPY(accl);
121#else
122#error unknown isa configuration
123#endif
124 COPY(psw);
125 COPY(bpc);
126 COPY(bbpsw);
127 COPY(bbpc);
128 COPY(spu);
129 COPY(fp);
130 COPY(lr);
131 COPY(spi);
132#undef COPY
133
134 regs->syscall_nr = -1; /* disable syscall checks */
135 err |= __get_user(*r0_p, &sc->sc_r0);
136
137 return err;
138}
139
140asmlinkage int
141sys_rt_sigreturn(unsigned long r0, unsigned long r1,
142 unsigned long r2, unsigned long r3, unsigned long r4,
143 unsigned long r5, unsigned long r6, struct pt_regs regs)
144{
145 struct rt_sigframe __user *frame = (struct rt_sigframe __user *)regs.spu;
146 sigset_t set;
147 stack_t st;
148 int result;
149
150 if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
151 goto badframe;
152 if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
153 goto badframe;
154
155 sigdelsetmask(&set, ~_BLOCKABLE);
156 spin_lock_irq(&current->sighand->siglock);
157 current->blocked = set;
158 recalc_sigpending();
159 spin_unlock_irq(&current->sighand->siglock);
160
161 if (restore_sigcontext(&regs, &frame->uc.uc_mcontext, &result))
162 goto badframe;
163
164 if (__copy_from_user(&st, &frame->uc.uc_stack, sizeof(st)))
165 goto badframe;
166 /* It is more difficult to avoid calling this function than to
167 call it and ignore errors. */
168 do_sigaltstack(&st, NULL, regs.spu);
169
170 return result;
171
172badframe:
173 force_sig(SIGSEGV, current);
174 return 0;
175}
176
177/*
178 * Set up a signal frame.
179 */
180
181static int
182setup_sigcontext(struct sigcontext __user *sc, struct pt_regs *regs,
183 unsigned long mask)
184{
185 int err = 0;
186
187#define COPY(x) err |= __put_user(regs->x, &sc->sc_##x)
188 COPY(r4);
189 COPY(r5);
190 COPY(r6);
191 COPY(pt_regs);
192 COPY(r0);
193 COPY(r1);
194 COPY(r2);
195 COPY(r3);
196 COPY(r7);
197 COPY(r8);
198 COPY(r9);
199 COPY(r10);
200 COPY(r11);
201 COPY(r12);
202#if defined(CONFIG_ISA_M32R2) && defined(CONFIG_ISA_DSP_LEVEL2)
203 COPY(acc0h);
204 COPY(acc0l);
205 COPY(acc1h);
206 COPY(acc1l);
207#elif defined(CONFIG_ISA_M32R2) || defined(CONFIG_ISA_M32R)
208 COPY(acch);
209 COPY(accl);
210#else
211#error unknown isa configuration
212#endif
213 COPY(psw);
214 COPY(bpc);
215 COPY(bbpsw);
216 COPY(bbpc);
217 COPY(spu);
218 COPY(fp);
219 COPY(lr);
220 COPY(spi);
221#undef COPY
222
223 err |= __put_user(mask, &sc->oldmask);
224
225 return err;
226}
227
228/*
229 * Determine which stack to use..
230 */
231static inline void __user *
232get_sigframe(struct k_sigaction *ka, unsigned long sp, size_t frame_size)
233{
234 /* This is the X/Open sanctioned signal stack switching. */
235 if (ka->sa.sa_flags & SA_ONSTACK) {
236 if (sas_ss_flags(sp) == 0)
237 sp = current->sas_ss_sp + current->sas_ss_size;
238 }
239
240 return (void __user *)((sp - frame_size) & -8ul);
241}
242
243static void setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
244 sigset_t *set, struct pt_regs *regs)
245{
246 struct rt_sigframe __user *frame;
247 int err = 0;
248 int signal;
249
250 frame = get_sigframe(ka, regs->spu, sizeof(*frame));
251
252 if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
253 goto give_sigsegv;
254
255 signal = current_thread_info()->exec_domain
256 && current_thread_info()->exec_domain->signal_invmap
257 && sig < 32
258 ? current_thread_info()->exec_domain->signal_invmap[sig]
259 : sig;
260
261 err |= __put_user(signal, &frame->sig);
262 if (err)
263 goto give_sigsegv;
264
265 err |= __put_user(&frame->info, &frame->pinfo);
266 err |= __put_user(&frame->uc, &frame->puc);
267 err |= copy_siginfo_to_user(&frame->info, info);
268 if (err)
269 goto give_sigsegv;
270
271 /* Create the ucontext. */
272 err |= __put_user(0, &frame->uc.uc_flags);
273 err |= __put_user(0, &frame->uc.uc_link);
274 err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
275 err |= __put_user(sas_ss_flags(regs->spu),
276 &frame->uc.uc_stack.ss_flags);
277 err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
278 err |= setup_sigcontext(&frame->uc.uc_mcontext, regs, set->sig[0]);
279 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
280 if (err)
281 goto give_sigsegv;
282
283 /* Set up to return from userspace. */
284 regs->lr = (unsigned long)ka->sa.sa_restorer;
285
286 /* Set up registers for signal handler */
287 regs->spu = (unsigned long)frame;
288 regs->r0 = signal; /* Arg for signal handler */
289 regs->r1 = (unsigned long)&frame->info;
290 regs->r2 = (unsigned long)&frame->uc;
291 regs->bpc = (unsigned long)ka->sa.sa_handler;
292
293 set_fs(USER_DS);
294
295#if DEBUG_SIG
296 printk("SIG deliver (%s:%d): sp=%p pc=%p\n",
297 current->comm, current->pid, frame, regs->pc);
298#endif
299
300 return;
301
302give_sigsegv:
303 force_sigsegv(sig, current);
304}
305
306/*
307 * OK, we're invoking a handler
308 */
309
310static void
311handle_signal(unsigned long sig, struct k_sigaction *ka, siginfo_t *info,
312 sigset_t *oldset, struct pt_regs *regs)
313{
314 unsigned short inst;
315
316 /* Are we from a system call? */
317 if (regs->syscall_nr >= 0) {
318 /* If so, check system call restarting.. */
319 switch (regs->r0) {
320 case -ERESTART_RESTARTBLOCK:
321 case -ERESTARTNOHAND:
322 regs->r0 = -EINTR;
323 break;
324
325 case -ERESTARTSYS:
326 if (!(ka->sa.sa_flags & SA_RESTART)) {
327 regs->r0 = -EINTR;
328 break;
329 }
330 /* fallthrough */
331 case -ERESTARTNOINTR:
332 regs->r0 = regs->orig_r0;
333 inst = *(unsigned short *)(regs->bpc - 2);
334 if ((inst & 0xfff0) == 0x10f0) /* trap ? */
335 regs->bpc -= 2;
336 else
337 regs->bpc -= 4;
338 }
339 }
340
341 /* Set up the stack frame */
342 setup_rt_frame(sig, ka, info, oldset, regs);
343
344 if (!(ka->sa.sa_flags & SA_NODEFER)) {
345 spin_lock_irq(&current->sighand->siglock);
346 sigorsets(&current->blocked,&current->blocked,&ka->sa.sa_mask);
347 sigaddset(&current->blocked,sig);
348 recalc_sigpending();
349 spin_unlock_irq(&current->sighand->siglock);
350 }
351}
352
353/*
354 * Note that 'init' is a special process: it doesn't get signals it doesn't
355 * want to handle. Thus you cannot kill init even with a SIGKILL even by
356 * mistake.
357 */
358int do_signal(struct pt_regs *regs, sigset_t *oldset)
359{
360 siginfo_t info;
361 int signr;
362 struct k_sigaction ka;
363 unsigned short inst;
364
365 /*
366 * We want the common case to go fast, which
367 * is why we may in certain cases get here from
368 * kernel mode. Just return without doing anything
369 * if so.
370 */
371 if (!user_mode(regs))
372 return 1;
373
374 if (current->flags & PF_FREEZE) {
375 refrigerator(0);
376 goto no_signal;
377 }
378
379 if (!oldset)
380 oldset = &current->blocked;
381
382 signr = get_signal_to_deliver(&info, &ka, regs, NULL);
383 if (signr > 0) {
384 /* Reenable any watchpoints before delivering the
385 * signal to user space. The processor register will
386 * have been cleared if the watchpoint triggered
387 * inside the kernel.
388 */
389
390 /* Whee! Actually deliver the signal. */
391 handle_signal(signr, &ka, &info, oldset, regs);
392 return 1;
393 }
394
395 no_signal:
396 /* Did we come from a system call? */
397 if (regs->syscall_nr >= 0) {
398 /* Restart the system call - no handlers present */
399 if (regs->r0 == -ERESTARTNOHAND ||
400 regs->r0 == -ERESTARTSYS ||
401 regs->r0 == -ERESTARTNOINTR) {
402 regs->r0 = regs->orig_r0;
403 inst = *(unsigned short *)(regs->bpc - 2);
404 if ((inst & 0xfff0) == 0x10f0) /* trap ? */
405 regs->bpc -= 2;
406 else
407 regs->bpc -= 4;
408 }
409 if (regs->r0 == -ERESTART_RESTARTBLOCK){
410 regs->r0 = regs->orig_r0;
411 regs->r7 = __NR_restart_syscall;
412 inst = *(unsigned short *)(regs->bpc - 2);
413 if ((inst & 0xfff0) == 0x10f0) /* trap ? */
414 regs->bpc -= 2;
415 else
416 regs->bpc -= 4;
417 }
418 }
419 return 0;
420}
421
422/*
423 * notification of userspace execution resumption
424 * - triggered by current->work.notify_resume
425 */
426void do_notify_resume(struct pt_regs *regs, sigset_t *oldset,
427 __u32 thread_info_flags)
428{
429 /* Pending single-step? */
430 if (thread_info_flags & _TIF_SINGLESTEP)
431 clear_thread_flag(TIF_SINGLESTEP);
432
433 /* deal with pending signal delivery */
434 if (thread_info_flags & _TIF_SIGPENDING)
435 do_signal(regs,oldset);
436
437 clear_thread_flag(TIF_IRET);
438}