2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Copyright (C) 1991, 1992 Linus Torvalds
|
|
|
|
*
|
|
|
|
* 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
|
|
|
|
* 2000-06-20 Pentium III FXSR, SSE support by Gareth Hughes
|
|
|
|
*/
|
2008-03-06 16:33:08 +07:00
|
|
|
#include <linux/list.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
#include <linux/personality.h>
|
|
|
|
#include <linux/binfmts.h>
|
|
|
|
#include <linux/suspend.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/kernel.h>
|
2008-03-06 16:33:08 +07:00
|
|
|
#include <linux/ptrace.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/signal.h>
|
2008-03-06 16:33:08 +07:00
|
|
|
#include <linux/stddef.h>
|
|
|
|
#include <linux/unistd.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/errno.h>
|
2008-03-06 16:33:08 +07:00
|
|
|
#include <linux/sched.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/wait.h>
|
2008-03-15 07:46:38 +07:00
|
|
|
#include <linux/tracehook.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/elf.h>
|
2008-03-06 16:33:08 +07:00
|
|
|
#include <linux/smp.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <asm/processor.h>
|
|
|
|
#include <asm/ucontext.h>
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
#include <asm/i387.h>
|
2008-01-30 19:30:42 +07:00
|
|
|
#include <asm/vdso.h>
|
2008-09-06 06:26:55 +07:00
|
|
|
#include <asm/syscall.h>
|
2008-07-21 23:04:13 +07:00
|
|
|
#include <asm/syscalls.h>
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2008-02-09 03:10:00 +07:00
|
|
|
#include "sigframe.h"
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
|
|
|
|
|
2008-02-09 03:09:59 +07:00
|
|
|
#define __FIX_EFLAGS (X86_EFLAGS_AC | X86_EFLAGS_OF | \
|
|
|
|
X86_EFLAGS_DF | X86_EFLAGS_TF | X86_EFLAGS_SF | \
|
|
|
|
X86_EFLAGS_ZF | X86_EFLAGS_AF | X86_EFLAGS_PF | \
|
|
|
|
X86_EFLAGS_CF)
|
|
|
|
|
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
# define FIX_EFLAGS (__FIX_EFLAGS | X86_EFLAGS_RF)
|
|
|
|
#else
|
|
|
|
# define FIX_EFLAGS __FIX_EFLAGS
|
|
|
|
#endif
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Atomically swap in the new signal mask, and wait for a signal.
|
|
|
|
*/
|
|
|
|
asmlinkage int
|
|
|
|
sys_sigsuspend(int history0, int history1, old_sigset_t mask)
|
|
|
|
{
|
|
|
|
mask &= _BLOCKABLE;
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
2006-01-19 08:44:00 +07:00
|
|
|
current->saved_sigmask = current->blocked;
|
2005-04-17 05:20:36 +07:00
|
|
|
siginitset(¤t->blocked, mask);
|
|
|
|
recalc_sigpending();
|
|
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
|
|
|
|
2006-01-19 08:44:00 +07:00
|
|
|
current->state = TASK_INTERRUPTIBLE;
|
|
|
|
schedule();
|
2008-04-30 14:53:10 +07:00
|
|
|
set_restore_sigmask();
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2006-01-19 08:44:00 +07:00
|
|
|
return -ERESTARTNOHAND;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
asmlinkage int
|
2005-04-17 05:20:36 +07:00
|
|
|
sys_sigaction(int sig, const struct old_sigaction __user *act,
|
|
|
|
struct old_sigaction __user *oact)
|
|
|
|
{
|
|
|
|
struct k_sigaction new_ka, old_ka;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (act) {
|
|
|
|
old_sigset_t mask;
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
|
|
|
|
__get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
|
|
|
|
__get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
|
|
|
|
return -EFAULT;
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
__get_user(new_ka.sa.sa_flags, &act->sa_flags);
|
|
|
|
__get_user(mask, &act->sa_mask);
|
|
|
|
siginitset(&new_ka.sa.sa_mask, mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
|
|
|
|
|
|
|
|
if (!ret && oact) {
|
|
|
|
if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
|
|
|
|
__put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
|
|
|
|
__put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
|
|
|
|
return -EFAULT;
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
__put_user(old_ka.sa.sa_flags, &oact->sa_flags);
|
|
|
|
__put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
asmlinkage int sys_sigaltstack(unsigned long bx)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-03-06 16:33:08 +07:00
|
|
|
/*
|
|
|
|
* This is needed to make gcc realize it doesn't own the
|
|
|
|
* "struct pt_regs"
|
|
|
|
*/
|
2008-01-30 19:30:56 +07:00
|
|
|
struct pt_regs *regs = (struct pt_regs *)&bx;
|
|
|
|
const stack_t __user *uss = (const stack_t __user *)bx;
|
|
|
|
stack_t __user *uoss = (stack_t __user *)regs->cx;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
return do_sigaltstack(uss, uoss, regs->sp);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-10-03 12:09:20 +07:00
|
|
|
#define COPY(x) { \
|
|
|
|
err |= __get_user(regs->x, &sc->x); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define COPY_SEG(seg) { \
|
|
|
|
unsigned short tmp; \
|
|
|
|
err |= __get_user(tmp, &sc->seg); \
|
|
|
|
regs->seg = tmp; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define COPY_SEG_STRICT(seg) { \
|
|
|
|
unsigned short tmp; \
|
|
|
|
err |= __get_user(tmp, &sc->seg); \
|
|
|
|
regs->seg = tmp | 3; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define GET_SEG(seg) { \
|
|
|
|
unsigned short tmp; \
|
|
|
|
err |= __get_user(tmp, &sc->seg); \
|
|
|
|
loadsegment(seg, tmp); \
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Do a signal return; undo the signal stack.
|
|
|
|
*/
|
|
|
|
static int
|
2008-02-09 03:10:02 +07:00
|
|
|
restore_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc,
|
|
|
|
unsigned long *pax)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-10-03 12:18:47 +07:00
|
|
|
void __user *buf;
|
|
|
|
unsigned int tmpflags;
|
2005-04-17 05:20:36 +07:00
|
|
|
unsigned int err = 0;
|
|
|
|
|
|
|
|
/* Always make any pending restarted system calls return -EINTR */
|
|
|
|
current_thread_info()->restart_block.fn = do_no_restart_syscall;
|
|
|
|
|
2007-02-13 19:26:20 +07:00
|
|
|
GET_SEG(gs);
|
|
|
|
COPY_SEG(fs);
|
2005-04-17 05:20:36 +07:00
|
|
|
COPY_SEG(es);
|
|
|
|
COPY_SEG(ds);
|
2008-02-09 03:09:58 +07:00
|
|
|
COPY(di); COPY(si); COPY(bp); COPY(sp); COPY(bx);
|
|
|
|
COPY(dx); COPY(cx); COPY(ip);
|
2005-04-17 05:20:36 +07:00
|
|
|
COPY_SEG_STRICT(cs);
|
|
|
|
COPY_SEG_STRICT(ss);
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2008-10-03 12:18:47 +07:00
|
|
|
err |= __get_user(tmpflags, &sc->flags);
|
|
|
|
regs->flags = (regs->flags & ~FIX_EFLAGS) | (tmpflags & FIX_EFLAGS);
|
|
|
|
regs->orig_ax = -1; /* disable syscall checks */
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2008-10-03 12:18:47 +07:00
|
|
|
err |= __get_user(buf, &sc->fpstate);
|
|
|
|
err |= restore_i387_xstate(buf);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-02-09 03:10:02 +07:00
|
|
|
err |= __get_user(*pax, &sc->ax);
|
2005-04-17 05:20:36 +07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2008-02-09 03:10:02 +07:00
|
|
|
asmlinkage unsigned long sys_sigreturn(unsigned long __unused)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-03-06 16:33:08 +07:00
|
|
|
struct sigframe __user *frame;
|
|
|
|
struct pt_regs *regs;
|
2008-02-09 03:10:02 +07:00
|
|
|
unsigned long ax;
|
2008-03-06 16:33:08 +07:00
|
|
|
sigset_t set;
|
|
|
|
|
|
|
|
regs = (struct pt_regs *) &__unused;
|
|
|
|
frame = (struct sigframe __user *)(regs->sp - 8);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
|
|
|
|
goto badframe;
|
2008-03-06 16:33:08 +07:00
|
|
|
if (__get_user(set.sig[0], &frame->sc.oldmask) || (_NSIG_WORDS > 1
|
2005-04-17 05:20:36 +07:00
|
|
|
&& __copy_from_user(&set.sig[1], &frame->extramask,
|
|
|
|
sizeof(frame->extramask))))
|
|
|
|
goto badframe;
|
|
|
|
|
|
|
|
sigdelsetmask(&set, ~_BLOCKABLE);
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
|
|
current->blocked = set;
|
|
|
|
recalc_sigpending();
|
|
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
if (restore_sigcontext(regs, &frame->sc, &ax))
|
2005-04-17 05:20:36 +07:00
|
|
|
goto badframe;
|
2008-01-30 19:30:56 +07:00
|
|
|
return ax;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
badframe:
|
2008-01-30 19:33:18 +07:00
|
|
|
if (show_unhandled_signals && printk_ratelimit()) {
|
2008-07-04 03:12:13 +07:00
|
|
|
printk("%s%s[%d] bad frame in sigreturn frame:"
|
2008-03-06 16:43:17 +07:00
|
|
|
"%p ip:%lx sp:%lx oeax:%lx",
|
2007-10-19 13:40:41 +07:00
|
|
|
task_pid_nr(current) > 1 ? KERN_INFO : KERN_EMERG,
|
2008-01-30 19:30:56 +07:00
|
|
|
current->comm, task_pid_nr(current), frame, regs->ip,
|
|
|
|
regs->sp, regs->orig_ax);
|
2008-01-30 19:33:18 +07:00
|
|
|
print_vma_addr(" in ", regs->ip);
|
2008-03-06 16:43:17 +07:00
|
|
|
printk(KERN_CONT "\n");
|
2008-01-30 19:33:18 +07:00
|
|
|
}
|
2007-07-22 16:12:28 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
force_sig(SIGSEGV, current);
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
return 0;
|
2008-03-06 16:33:08 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-09-13 07:03:31 +07:00
|
|
|
static long do_rt_sigreturn(struct pt_regs *regs)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-02-09 03:10:00 +07:00
|
|
|
struct rt_sigframe __user *frame;
|
2008-02-09 03:10:02 +07:00
|
|
|
unsigned long ax;
|
2005-04-17 05:20:36 +07:00
|
|
|
sigset_t set;
|
|
|
|
|
2008-02-09 03:10:00 +07:00
|
|
|
frame = (struct rt_sigframe __user *)(regs->sp - sizeof(long));
|
2005-04-17 05:20:36 +07:00
|
|
|
if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
|
|
|
|
goto badframe;
|
|
|
|
if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
|
|
|
|
goto badframe;
|
|
|
|
|
|
|
|
sigdelsetmask(&set, ~_BLOCKABLE);
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
|
|
current->blocked = set;
|
|
|
|
recalc_sigpending();
|
|
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
if (restore_sigcontext(regs, &frame->uc.uc_mcontext, &ax))
|
2005-04-17 05:20:36 +07:00
|
|
|
goto badframe;
|
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
if (do_sigaltstack(&frame->uc.uc_stack, NULL, regs->sp) == -EFAULT)
|
2005-04-17 05:20:36 +07:00
|
|
|
goto badframe;
|
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
return ax;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
badframe:
|
2008-09-13 07:03:31 +07:00
|
|
|
signal_fault(regs, frame, "rt_sigreturn");
|
2005-04-17 05:20:36 +07:00
|
|
|
return 0;
|
2008-03-06 16:33:08 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-09-13 07:03:31 +07:00
|
|
|
asmlinkage int sys_rt_sigreturn(unsigned long __unused)
|
|
|
|
{
|
|
|
|
struct pt_regs *regs = (struct pt_regs *)&__unused;
|
|
|
|
|
|
|
|
return do_rt_sigreturn(regs);
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Set up a signal frame.
|
|
|
|
*/
|
|
|
|
static int
|
2008-07-30 00:29:22 +07:00
|
|
|
setup_sigcontext(struct sigcontext __user *sc, void __user *fpstate,
|
2005-04-17 05:20:36 +07:00
|
|
|
struct pt_regs *regs, unsigned long mask)
|
|
|
|
{
|
|
|
|
int tmp, err = 0;
|
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->fs, (unsigned int __user *)&sc->fs);
|
2007-02-13 19:26:20 +07:00
|
|
|
savesegment(gs, tmp);
|
|
|
|
err |= __put_user(tmp, (unsigned int __user *)&sc->gs);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->es, (unsigned int __user *)&sc->es);
|
|
|
|
err |= __put_user(regs->ds, (unsigned int __user *)&sc->ds);
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->di, &sc->di);
|
|
|
|
err |= __put_user(regs->si, &sc->si);
|
|
|
|
err |= __put_user(regs->bp, &sc->bp);
|
|
|
|
err |= __put_user(regs->sp, &sc->sp);
|
|
|
|
err |= __put_user(regs->bx, &sc->bx);
|
|
|
|
err |= __put_user(regs->dx, &sc->dx);
|
|
|
|
err |= __put_user(regs->cx, &sc->cx);
|
|
|
|
err |= __put_user(regs->ax, &sc->ax);
|
2005-04-17 05:20:36 +07:00
|
|
|
err |= __put_user(current->thread.trap_no, &sc->trapno);
|
|
|
|
err |= __put_user(current->thread.error_code, &sc->err);
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->ip, &sc->ip);
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->cs, (unsigned int __user *)&sc->cs);
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->flags, &sc->flags);
|
|
|
|
err |= __put_user(regs->sp, &sc->sp_at_signal);
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(regs->ss, (unsigned int __user *)&sc->ss);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-07-30 00:29:22 +07:00
|
|
|
tmp = save_i387_xstate(fpstate);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (tmp < 0)
|
2008-03-06 16:33:08 +07:00
|
|
|
err = 1;
|
2005-04-17 05:20:36 +07:00
|
|
|
else
|
2008-03-06 16:33:08 +07:00
|
|
|
err |= __put_user(tmp ? fpstate : NULL, &sc->fpstate);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* non-iBCS2 extensions.. */
|
|
|
|
err |= __put_user(mask, &sc->oldmask);
|
|
|
|
err |= __put_user(current->thread.cr2, &sc->cr2);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Determine which stack to use..
|
|
|
|
*/
|
|
|
|
static inline void __user *
|
2008-07-30 00:29:21 +07:00
|
|
|
get_sigframe(struct k_sigaction *ka, struct pt_regs *regs, size_t frame_size,
|
2008-07-30 00:29:22 +07:00
|
|
|
void **fpstate)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-01-30 19:30:56 +07:00
|
|
|
unsigned long sp;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Default to using normal stack */
|
2008-01-30 19:30:56 +07:00
|
|
|
sp = regs->sp;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
x86: protect against sigaltstack wraparound
cf http://lkml.org/lkml/2007/10/3/41
To summarize: on Linux, SA_ONSTACK decides whether you are already on the
signal stack based on the value of the SP at the time of a signal. If
you are not already inside the range, you are not "on the signal stack"
and so the new signal handler frame starts over at the base of the signal
stack.
sigaltstack (and sigstack before it) was invented in BSD. There, the
SA_ONSTACK behavior has always been different. It uses a kernel state
flag to decide, rather than the SP value. When you first take an
SA_ONSTACK signal and switch to the alternate signal stack, it sets the
SS_ONSTACK flag in the thread's sigaltstack state in the kernel.
Thereafter you are "on the signal stack" and don't switch SP before
pushing a handler frame no matter what the SP value is. Only when you
sigreturn from the original handler context do you clear the SS_ONSTACK
flag so that a new handler frame will start over at the base of the
alternate signal stack.
The undesireable effect of the Linux behavior is that an overflow of the
alternate signal stack can not only go undetected, but lead to a ring
buffer effect of clobbering the original handler frame at the base of the
signal stack for each successive signal that comes just after the
overflow. This is what Shi Weihua's test case demonstrates. Normally
this does not come up because of the signal mask, but the test case uses
SA_NODEFER for its SIGSEGV handler.
The other subtle part of the existing Linux semantics is that a simple
longjmp out of a signal handler serves to take you off the signal stack
in a safe and reliable fashion without having used sigreturn (nor having
just returned from the handler normally, which means the same). After
the longjmp (or even informal stack switching not via any proper libc or
kernel interface), the alternate signal stack stands ready to be used
again.
A paranoid program would allocate a PROT_NONE red zone around its
alternate signal stack. Then a small overflow would trigger a SIGSEGV in
handler setup, and be fatal (core dump) whether or not SIGSEGV is
blocked. As with thread stack red zones, that cannot catch all overflows
(or underflows). e.g., a local array as large as page size allocated in
a function called from a handler, but not actually touched before more
calls push more stack, could cause an overflow that silently pushes into
some unrelated allocated pages.
The BSD behavior does not do anything in particular about overflow. But
it does at least avoid the wraparound or "ring buffer effect", so you'll
just get a straightforward all-out overflow down your address space past
the low end of the alternate signal stack. I don't know what the BSD
behavior is for longjmp out of an SA_ONSTACK handler.
The POSIX wording relating to sigaltstack is pretty minimal. I don't
think it speaks to this issue one way or another. (The program that
overflows its stack is clearly in undefined behavior territory of one
sort or another anyhow.)
Given the longjmp issue and the potential for highly subtle complications
in existing programs relying on this in arcane ways deep in their code, I
am very dubious about changing the behavior to the BSD style persistent
flag. I think Shi Weihua's patches have a similar effect by tracking the
SP used in the last handler setup.
I think it would be sensible for the signal handler setup code to detect
when it would itself be causing a stack overflow. Maybe something like
the following patch (untested). This issue exists in the same way on all
machines, so ideally they would all do a similar check.
When it's the handler function itself or its callees that cause the
overflow, rather than the signal handler frame setup alone crossing the
boundary, this still won't help. But I don't see any way to distinguish
that from the valid longjmp case.
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2008-01-30 19:30:06 +07:00
|
|
|
/*
|
|
|
|
* If we are on the alternate signal stack and would overflow it, don't.
|
|
|
|
* Return an always-bogus address instead so we will die with SIGSEGV.
|
|
|
|
*/
|
2008-01-30 19:30:56 +07:00
|
|
|
if (on_sig_stack(sp) && !likely(on_sig_stack(sp - frame_size)))
|
x86: protect against sigaltstack wraparound
cf http://lkml.org/lkml/2007/10/3/41
To summarize: on Linux, SA_ONSTACK decides whether you are already on the
signal stack based on the value of the SP at the time of a signal. If
you are not already inside the range, you are not "on the signal stack"
and so the new signal handler frame starts over at the base of the signal
stack.
sigaltstack (and sigstack before it) was invented in BSD. There, the
SA_ONSTACK behavior has always been different. It uses a kernel state
flag to decide, rather than the SP value. When you first take an
SA_ONSTACK signal and switch to the alternate signal stack, it sets the
SS_ONSTACK flag in the thread's sigaltstack state in the kernel.
Thereafter you are "on the signal stack" and don't switch SP before
pushing a handler frame no matter what the SP value is. Only when you
sigreturn from the original handler context do you clear the SS_ONSTACK
flag so that a new handler frame will start over at the base of the
alternate signal stack.
The undesireable effect of the Linux behavior is that an overflow of the
alternate signal stack can not only go undetected, but lead to a ring
buffer effect of clobbering the original handler frame at the base of the
signal stack for each successive signal that comes just after the
overflow. This is what Shi Weihua's test case demonstrates. Normally
this does not come up because of the signal mask, but the test case uses
SA_NODEFER for its SIGSEGV handler.
The other subtle part of the existing Linux semantics is that a simple
longjmp out of a signal handler serves to take you off the signal stack
in a safe and reliable fashion without having used sigreturn (nor having
just returned from the handler normally, which means the same). After
the longjmp (or even informal stack switching not via any proper libc or
kernel interface), the alternate signal stack stands ready to be used
again.
A paranoid program would allocate a PROT_NONE red zone around its
alternate signal stack. Then a small overflow would trigger a SIGSEGV in
handler setup, and be fatal (core dump) whether or not SIGSEGV is
blocked. As with thread stack red zones, that cannot catch all overflows
(or underflows). e.g., a local array as large as page size allocated in
a function called from a handler, but not actually touched before more
calls push more stack, could cause an overflow that silently pushes into
some unrelated allocated pages.
The BSD behavior does not do anything in particular about overflow. But
it does at least avoid the wraparound or "ring buffer effect", so you'll
just get a straightforward all-out overflow down your address space past
the low end of the alternate signal stack. I don't know what the BSD
behavior is for longjmp out of an SA_ONSTACK handler.
The POSIX wording relating to sigaltstack is pretty minimal. I don't
think it speaks to this issue one way or another. (The program that
overflows its stack is clearly in undefined behavior territory of one
sort or another anyhow.)
Given the longjmp issue and the potential for highly subtle complications
in existing programs relying on this in arcane ways deep in their code, I
am very dubious about changing the behavior to the BSD style persistent
flag. I think Shi Weihua's patches have a similar effect by tracking the
SP used in the last handler setup.
I think it would be sensible for the signal handler setup code to detect
when it would itself be causing a stack overflow. Maybe something like
the following patch (untested). This issue exists in the same way on all
machines, so ideally they would all do a similar check.
When it's the handler function itself or its callees that cause the
overflow, rather than the signal handler frame setup alone crossing the
boundary, this still won't help. But I don't see any way to distinguish
that from the valid longjmp case.
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2008-01-30 19:30:06 +07:00
|
|
|
return (void __user *) -1L;
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/* This is the X/Open sanctioned signal stack switching. */
|
|
|
|
if (ka->sa.sa_flags & SA_ONSTACK) {
|
2008-01-30 19:30:56 +07:00
|
|
|
if (sas_ss_flags(sp) == 0)
|
|
|
|
sp = current->sas_ss_sp + current->sas_ss_size;
|
2008-03-06 16:33:08 +07:00
|
|
|
} else {
|
|
|
|
/* This is the legacy signal stack switching. */
|
|
|
|
if ((regs->ss & 0xffff) != __USER_DS &&
|
|
|
|
!(ka->sa.sa_flags & SA_RESTORER) &&
|
|
|
|
ka->sa.sa_restorer)
|
|
|
|
sp = (unsigned long) ka->sa.sa_restorer;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-07-30 00:29:21 +07:00
|
|
|
if (used_math()) {
|
|
|
|
sp = sp - sig_xstate_size;
|
|
|
|
*fpstate = (struct _fpstate *) sp;
|
|
|
|
}
|
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
sp -= frame_size;
|
2008-03-06 16:33:08 +07:00
|
|
|
/*
|
|
|
|
* Align the stack pointer according to the i386 ABI,
|
|
|
|
* i.e. so that on function entry ((sp + 4) & 15) == 0.
|
|
|
|
*/
|
2008-01-30 19:30:56 +07:00
|
|
|
sp = ((sp + 4) & -16ul) - 4;
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
return (void __user *) sp;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
static int
|
2008-09-06 06:28:06 +07:00
|
|
|
__setup_frame(int sig, struct k_sigaction *ka, sigset_t *set,
|
|
|
|
struct pt_regs *regs)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct sigframe __user *frame;
|
2008-03-06 16:33:08 +07:00
|
|
|
void __user *restorer;
|
2005-04-17 05:20:36 +07:00
|
|
|
int err = 0;
|
2008-07-30 00:29:22 +07:00
|
|
|
void __user *fpstate = NULL;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-07-30 00:29:21 +07:00
|
|
|
frame = get_sigframe(ka, regs, sizeof(*frame), &fpstate);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-09-13 07:02:53 +07:00
|
|
|
if (__put_user(sig, &frame->sig))
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-09-13 07:02:53 +07:00
|
|
|
if (setup_sigcontext(&frame->sc, fpstate, regs, set->sig[0]))
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (_NSIG_WORDS > 1) {
|
2008-09-13 07:02:53 +07:00
|
|
|
if (__copy_to_user(&frame->extramask, &set->sig[1],
|
|
|
|
sizeof(frame->extramask)))
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-04-09 15:29:27 +07:00
|
|
|
if (current->mm->context.vdso)
|
2008-01-30 19:30:42 +07:00
|
|
|
restorer = VDSO32_SYMBOL(current->mm->context.vdso, sigreturn);
|
2007-02-13 19:26:26 +07:00
|
|
|
else
|
2008-01-30 19:33:23 +07:00
|
|
|
restorer = &frame->retcode;
|
2005-04-17 05:20:36 +07:00
|
|
|
if (ka->sa.sa_flags & SA_RESTORER)
|
|
|
|
restorer = ka->sa.sa_restorer;
|
|
|
|
|
|
|
|
/* Set up to return from userspace. */
|
|
|
|
err |= __put_user(restorer, &frame->pretcode);
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
2008-03-06 16:33:08 +07:00
|
|
|
* This is popl %eax ; movl $__NR_sigreturn, %eax ; int $0x80
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
* WE DO NOT USE IT ANY MORE! It's only left here for historical
|
|
|
|
* reasons and because gdb uses it as a signature to notice
|
|
|
|
* signal handler stack frames.
|
|
|
|
*/
|
|
|
|
err |= __put_user(0xb858, (short __user *)(frame->retcode+0));
|
|
|
|
err |= __put_user(__NR_sigreturn, (int __user *)(frame->retcode+2));
|
|
|
|
err |= __put_user(0x80cd, (short __user *)(frame->retcode+6));
|
|
|
|
|
|
|
|
if (err)
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Set up registers for signal handler */
|
2008-03-06 16:33:08 +07:00
|
|
|
regs->sp = (unsigned long)frame;
|
|
|
|
regs->ip = (unsigned long)ka->sa.sa_handler;
|
|
|
|
regs->ax = (unsigned long)sig;
|
2008-02-09 03:09:56 +07:00
|
|
|
regs->dx = 0;
|
|
|
|
regs->cx = 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
regs->ds = __USER_DS;
|
|
|
|
regs->es = __USER_DS;
|
|
|
|
regs->ss = __USER_DS;
|
|
|
|
regs->cs = __USER_CS;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-01-19 08:44:00 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-09-06 06:28:06 +07:00
|
|
|
static int __setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
|
|
|
|
sigset_t *set, struct pt_regs *regs)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct rt_sigframe __user *frame;
|
2008-03-06 16:33:08 +07:00
|
|
|
void __user *restorer;
|
2005-04-17 05:20:36 +07:00
|
|
|
int err = 0;
|
2008-07-30 00:29:22 +07:00
|
|
|
void __user *fpstate = NULL;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-07-30 00:29:21 +07:00
|
|
|
frame = get_sigframe(ka, regs, sizeof(*frame), &fpstate);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-09-06 06:28:38 +07:00
|
|
|
err |= __put_user(sig, &frame->sig);
|
2005-04-17 05:20:36 +07:00
|
|
|
err |= __put_user(&frame->info, &frame->pinfo);
|
|
|
|
err |= __put_user(&frame->uc, &frame->puc);
|
|
|
|
err |= copy_siginfo_to_user(&frame->info, info);
|
|
|
|
if (err)
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Create the ucontext. */
|
2008-07-30 00:29:25 +07:00
|
|
|
if (cpu_has_xsave)
|
|
|
|
err |= __put_user(UC_FP_XSTATE, &frame->uc.uc_flags);
|
|
|
|
else
|
|
|
|
err |= __put_user(0, &frame->uc.uc_flags);
|
2005-04-17 05:20:36 +07:00
|
|
|
err |= __put_user(0, &frame->uc.uc_link);
|
|
|
|
err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
|
2008-01-30 19:30:56 +07:00
|
|
|
err |= __put_user(sas_ss_flags(regs->sp),
|
2005-04-17 05:20:36 +07:00
|
|
|
&frame->uc.uc_stack.ss_flags);
|
|
|
|
err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
|
2008-07-30 00:29:21 +07:00
|
|
|
err |= setup_sigcontext(&frame->uc.uc_mcontext, fpstate,
|
2008-03-06 16:33:08 +07:00
|
|
|
regs, set->sig[0]);
|
2005-04-17 05:20:36 +07:00
|
|
|
err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
|
|
|
|
if (err)
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Set up to return from userspace. */
|
2008-01-30 19:30:42 +07:00
|
|
|
restorer = VDSO32_SYMBOL(current->mm->context.vdso, rt_sigreturn);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (ka->sa.sa_flags & SA_RESTORER)
|
|
|
|
restorer = ka->sa.sa_restorer;
|
|
|
|
err |= __put_user(restorer, &frame->pretcode);
|
2008-03-06 16:33:08 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
2008-03-06 16:33:08 +07:00
|
|
|
* This is movl $__NR_rt_sigreturn, %ax ; int $0x80
|
2005-04-17 05:20:36 +07:00
|
|
|
*
|
|
|
|
* WE DO NOT USE IT ANY MORE! It's only left here for historical
|
|
|
|
* reasons and because gdb uses it as a signature to notice
|
|
|
|
* signal handler stack frames.
|
|
|
|
*/
|
|
|
|
err |= __put_user(0xb8, (char __user *)(frame->retcode+0));
|
|
|
|
err |= __put_user(__NR_rt_sigreturn, (int __user *)(frame->retcode+1));
|
|
|
|
err |= __put_user(0x80cd, (short __user *)(frame->retcode+5));
|
|
|
|
|
|
|
|
if (err)
|
2008-09-13 07:01:09 +07:00
|
|
|
return -EFAULT;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Set up registers for signal handler */
|
2008-03-06 16:33:08 +07:00
|
|
|
regs->sp = (unsigned long)frame;
|
|
|
|
regs->ip = (unsigned long)ka->sa.sa_handler;
|
2008-09-06 06:28:38 +07:00
|
|
|
regs->ax = (unsigned long)sig;
|
2008-03-06 16:33:08 +07:00
|
|
|
regs->dx = (unsigned long)&frame->info;
|
|
|
|
regs->cx = (unsigned long)&frame->uc;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-01-30 19:30:56 +07:00
|
|
|
regs->ds = __USER_DS;
|
|
|
|
regs->es = __USER_DS;
|
|
|
|
regs->ss = __USER_DS;
|
|
|
|
regs->cs = __USER_CS;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-01-19 08:44:00 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2008-03-06 16:33:08 +07:00
|
|
|
* OK, we're invoking a handler:
|
|
|
|
*/
|
2008-09-25 09:10:29 +07:00
|
|
|
static int signr_convert(int sig)
|
|
|
|
{
|
|
|
|
struct thread_info *info = current_thread_info();
|
|
|
|
|
|
|
|
if (info->exec_domain && info->exec_domain->signal_invmap && sig < 32)
|
|
|
|
return info->exec_domain->signal_invmap[sig];
|
|
|
|
return sig;
|
|
|
|
}
|
|
|
|
|
2008-09-25 09:13:11 +07:00
|
|
|
#define is_ia32 1
|
2008-09-25 09:13:29 +07:00
|
|
|
#define ia32_setup_frame __setup_frame
|
|
|
|
#define ia32_setup_rt_frame __setup_rt_frame
|
2008-09-25 09:13:11 +07:00
|
|
|
|
2008-09-06 06:28:06 +07:00
|
|
|
static int
|
|
|
|
setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
|
|
|
|
sigset_t *set, struct pt_regs *regs)
|
|
|
|
{
|
2008-09-25 09:10:29 +07:00
|
|
|
int usig = signr_convert(sig);
|
2008-09-06 06:28:06 +07:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Set up the stack frame */
|
2008-09-25 09:13:11 +07:00
|
|
|
if (is_ia32) {
|
|
|
|
if (ka->sa.sa_flags & SA_SIGINFO)
|
2008-09-25 09:13:29 +07:00
|
|
|
ret = ia32_setup_rt_frame(usig, ka, info, set, regs);
|
2008-09-25 09:13:11 +07:00
|
|
|
else
|
2008-09-25 09:13:29 +07:00
|
|
|
ret = ia32_setup_frame(usig, ka, set, regs);
|
2008-09-25 09:13:11 +07:00
|
|
|
} else
|
|
|
|
ret = __setup_rt_frame(sig, ka, info, set, regs);
|
2008-09-06 06:28:06 +07:00
|
|
|
|
2008-09-13 07:01:09 +07:00
|
|
|
if (ret) {
|
|
|
|
force_sigsegv(sig, current);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
2008-09-06 06:28:06 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-06-23 14:08:21 +07:00
|
|
|
static int
|
2005-04-17 05:20:36 +07:00
|
|
|
handle_signal(unsigned long sig, siginfo_t *info, struct k_sigaction *ka,
|
2008-02-09 03:09:58 +07:00
|
|
|
sigset_t *oldset, struct pt_regs *regs)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2005-06-23 14:08:21 +07:00
|
|
|
int ret;
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/* Are we from a system call? */
|
2008-09-06 06:26:55 +07:00
|
|
|
if (syscall_get_nr(current, regs) >= 0) {
|
2005-04-17 05:20:36 +07:00
|
|
|
/* If so, check system call restarting.. */
|
2008-09-06 06:26:55 +07:00
|
|
|
switch (syscall_get_error(current, regs)) {
|
2008-02-09 03:09:58 +07:00
|
|
|
case -ERESTART_RESTARTBLOCK:
|
|
|
|
case -ERESTARTNOHAND:
|
|
|
|
regs->ax = -EINTR;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case -ERESTARTSYS:
|
|
|
|
if (!(ka->sa.sa_flags & SA_RESTART)) {
|
2008-01-30 19:30:56 +07:00
|
|
|
regs->ax = -EINTR;
|
2005-04-17 05:20:36 +07:00
|
|
|
break;
|
2008-02-09 03:09:58 +07:00
|
|
|
}
|
|
|
|
/* fallthrough */
|
|
|
|
case -ERESTARTNOINTR:
|
|
|
|
regs->ax = regs->orig_ax;
|
|
|
|
regs->ip -= 2;
|
|
|
|
break;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2008-01-30 19:30:50 +07:00
|
|
|
* If TF is set due to a debugger (TIF_FORCED_TF), clear the TF
|
|
|
|
* flag so that register information in the sigcontext is correct.
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
2008-01-30 19:30:56 +07:00
|
|
|
if (unlikely(regs->flags & X86_EFLAGS_TF) &&
|
2008-01-30 19:30:50 +07:00
|
|
|
likely(test_and_clear_thread_flag(TIF_FORCED_TF)))
|
2008-01-30 19:30:56 +07:00
|
|
|
regs->flags &= ~X86_EFLAGS_TF;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-09-06 06:28:06 +07:00
|
|
|
ret = setup_rt_frame(sig, ka, info, oldset, regs);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
2005-06-23 14:08:21 +07:00
|
|
|
|
2008-09-24 07:22:32 +07:00
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
/*
|
|
|
|
* This has nothing to do with segment registers,
|
|
|
|
* despite the name. This magic affects uaccess.h
|
|
|
|
* macros' behavior. Reset it to the normal setting.
|
|
|
|
*/
|
|
|
|
set_fs(USER_DS);
|
|
|
|
#endif
|
|
|
|
|
2008-04-20 04:26:54 +07:00
|
|
|
/*
|
|
|
|
* Clear the direction flag as per the ABI for function entry.
|
|
|
|
*/
|
|
|
|
regs->flags &= ~X86_EFLAGS_DF;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Clear TF when entering the signal handler, but
|
|
|
|
* notify any tracer that was single-stepping it.
|
|
|
|
* The tracer may want to single-step inside the
|
|
|
|
* handler too.
|
|
|
|
*/
|
|
|
|
regs->flags &= ~X86_EFLAGS_TF;
|
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
|
|
sigorsets(¤t->blocked, ¤t->blocked, &ka->sa.sa_mask);
|
|
|
|
if (!(ka->sa.sa_flags & SA_NODEFER))
|
|
|
|
sigaddset(¤t->blocked, sig);
|
|
|
|
recalc_sigpending();
|
|
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
|
|
|
|
2008-03-15 07:46:38 +07:00
|
|
|
tracehook_signal_handler(sig, info, ka, regs,
|
|
|
|
test_thread_flag(TIF_SINGLESTEP));
|
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-09-06 06:27:39 +07:00
|
|
|
#define NR_restart_syscall __NR_restart_syscall
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Note that 'init' is a special process: it doesn't get signals it doesn't
|
|
|
|
* want to handle. Thus you cannot kill init even with a SIGKILL even by
|
|
|
|
* mistake.
|
|
|
|
*/
|
2008-01-30 19:31:17 +07:00
|
|
|
static void do_signal(struct pt_regs *regs)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-02-09 03:09:58 +07:00
|
|
|
struct k_sigaction ka;
|
2005-04-17 05:20:36 +07:00
|
|
|
siginfo_t info;
|
|
|
|
int signr;
|
2006-01-19 08:44:00 +07:00
|
|
|
sigset_t *oldset;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
2008-02-09 03:09:58 +07:00
|
|
|
* We want the common case to go fast, which is why we may in certain
|
|
|
|
* cases get here from kernel mode. Just return without doing anything
|
|
|
|
* if so.
|
|
|
|
* X86_32: vm86 regs switched out by assembly code before reaching
|
|
|
|
* here, so testing against kernel CS suffices.
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
2005-06-23 14:08:45 +07:00
|
|
|
if (!user_mode(regs))
|
2006-01-19 08:44:00 +07:00
|
|
|
return;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-04-30 14:53:10 +07:00
|
|
|
if (current_thread_info()->status & TS_RESTORE_SIGMASK)
|
2006-01-19 08:44:00 +07:00
|
|
|
oldset = ¤t->saved_sigmask;
|
|
|
|
else
|
2005-04-17 05:20:36 +07:00
|
|
|
oldset = ¤t->blocked;
|
|
|
|
|
|
|
|
signr = get_signal_to_deliver(&info, &ka, regs, NULL);
|
|
|
|
if (signr > 0) {
|
2008-03-06 16:33:08 +07:00
|
|
|
/*
|
|
|
|
* Re-enable any watchpoints before delivering the
|
2005-04-17 05:20:36 +07:00
|
|
|
* signal to user space. The processor register will
|
|
|
|
* have been cleared if the watchpoint triggered
|
|
|
|
* inside the kernel.
|
|
|
|
*/
|
2008-02-09 03:09:58 +07:00
|
|
|
if (current->thread.debugreg7)
|
2008-01-30 19:30:59 +07:00
|
|
|
set_debugreg(current->thread.debugreg7, 7);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-03-06 16:33:08 +07:00
|
|
|
/* Whee! Actually deliver the signal. */
|
2006-01-19 08:44:00 +07:00
|
|
|
if (handle_signal(signr, &info, &ka, oldset, regs) == 0) {
|
2008-03-06 16:33:08 +07:00
|
|
|
/*
|
2008-04-30 14:53:10 +07:00
|
|
|
* A signal was successfully delivered; the saved
|
2006-01-19 08:44:00 +07:00
|
|
|
* sigmask will have been stored in the signal frame,
|
|
|
|
* and will be restored by sigreturn, so we can simply
|
2008-04-30 14:53:10 +07:00
|
|
|
* clear the TS_RESTORE_SIGMASK flag.
|
2008-03-06 16:33:08 +07:00
|
|
|
*/
|
2008-04-30 14:53:10 +07:00
|
|
|
current_thread_info()->status &= ~TS_RESTORE_SIGMASK;
|
2006-01-19 08:44:00 +07:00
|
|
|
}
|
|
|
|
return;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Did we come from a system call? */
|
2008-09-06 06:26:55 +07:00
|
|
|
if (syscall_get_nr(current, regs) >= 0) {
|
2005-04-17 05:20:36 +07:00
|
|
|
/* Restart the system call - no handlers present */
|
2008-09-06 06:26:55 +07:00
|
|
|
switch (syscall_get_error(current, regs)) {
|
2006-01-19 08:44:00 +07:00
|
|
|
case -ERESTARTNOHAND:
|
|
|
|
case -ERESTARTSYS:
|
|
|
|
case -ERESTARTNOINTR:
|
2008-01-30 19:30:56 +07:00
|
|
|
regs->ax = regs->orig_ax;
|
|
|
|
regs->ip -= 2;
|
2006-01-19 08:44:00 +07:00
|
|
|
break;
|
|
|
|
|
|
|
|
case -ERESTART_RESTARTBLOCK:
|
2008-09-06 06:27:39 +07:00
|
|
|
regs->ax = NR_restart_syscall;
|
2008-01-30 19:30:56 +07:00
|
|
|
regs->ip -= 2;
|
2006-01-19 08:44:00 +07:00
|
|
|
break;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
}
|
2006-01-19 08:44:00 +07:00
|
|
|
|
2008-02-09 03:09:58 +07:00
|
|
|
/*
|
|
|
|
* If there's no signal to deliver, we just put the saved sigmask
|
|
|
|
* back.
|
|
|
|
*/
|
2008-04-30 14:53:10 +07:00
|
|
|
if (current_thread_info()->status & TS_RESTORE_SIGMASK) {
|
|
|
|
current_thread_info()->status &= ~TS_RESTORE_SIGMASK;
|
2006-01-19 08:44:00 +07:00
|
|
|
sigprocmask(SIG_SETMASK, ¤t->saved_sigmask, NULL);
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* notification of userspace execution resumption
|
2006-01-19 08:44:00 +07:00
|
|
|
* - triggered by the TIF_WORK_MASK flags
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
2008-03-06 16:33:08 +07:00
|
|
|
void
|
|
|
|
do_notify_resume(struct pt_regs *regs, void *unused, __u32 thread_info_flags)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2008-09-24 07:21:45 +07:00
|
|
|
#if defined(CONFIG_X86_64) && defined(CONFIG_X86_MCE)
|
|
|
|
/* notify userspace of pending MCEs */
|
|
|
|
if (thread_info_flags & _TIF_MCE_NOTIFY)
|
|
|
|
mce_notify_user();
|
|
|
|
#endif /* CONFIG_X86_64 && CONFIG_X86_MCE */
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/* deal with pending signal delivery */
|
2008-04-30 14:53:10 +07:00
|
|
|
if (thread_info_flags & _TIF_SIGPENDING)
|
2006-01-19 08:44:00 +07:00
|
|
|
do_signal(regs);
|
2008-01-26 03:08:29 +07:00
|
|
|
|
2008-04-20 09:10:57 +07:00
|
|
|
if (thread_info_flags & _TIF_NOTIFY_RESUME) {
|
|
|
|
clear_thread_flag(TIF_NOTIFY_RESUME);
|
|
|
|
tracehook_notify_resume(regs);
|
|
|
|
}
|
|
|
|
|
2008-09-24 07:21:45 +07:00
|
|
|
#ifdef CONFIG_X86_32
|
2005-04-17 05:20:36 +07:00
|
|
|
clear_thread_flag(TIF_IRET);
|
2008-09-24 07:21:45 +07:00
|
|
|
#endif /* CONFIG_X86_32 */
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
2008-09-06 06:27:11 +07:00
|
|
|
|
|
|
|
void signal_fault(struct pt_regs *regs, void __user *frame, char *where)
|
|
|
|
{
|
|
|
|
struct task_struct *me = current;
|
|
|
|
|
|
|
|
if (show_unhandled_signals && printk_ratelimit()) {
|
|
|
|
printk(KERN_INFO
|
|
|
|
"%s[%d] bad frame in %s frame:%p ip:%lx sp:%lx orax:%lx",
|
|
|
|
me->comm, me->pid, where, frame,
|
|
|
|
regs->ip, regs->sp, regs->orig_ax);
|
|
|
|
print_vma_addr(" in ", regs->ip);
|
|
|
|
printk(KERN_CONT "\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
force_sig(SIGSEGV, me);
|
|
|
|
}
|