new helper: signal_delivered()
[deliverable/linux.git] / arch / s390 / kernel / compat_signal.c
CommitLineData
1da177e4 1/*
54dfe5dd 2 * arch/s390/kernel/compat_signal.c
1da177e4 3 *
54dfe5dd 4 * Copyright (C) IBM Corp. 2000,2006
1da177e4
LT
5 * Author(s): Denis Joseph Barrow (djbarrow@de.ibm.com,barrow_dj@yahoo.com)
6 * Gerhard Tonn (ton@de.ibm.com)
7 *
8 * Copyright (C) 1991, 1992 Linus Torvalds
9 *
10 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
11 */
12
1da177e4
LT
13#include <linux/compat.h>
14#include <linux/sched.h>
15#include <linux/mm.h>
16#include <linux/smp.h>
1da177e4
LT
17#include <linux/kernel.h>
18#include <linux/signal.h>
19#include <linux/errno.h>
20#include <linux/wait.h>
21#include <linux/ptrace.h>
22#include <linux/unistd.h>
23#include <linux/stddef.h>
24#include <linux/tty.h>
25#include <linux/personality.h>
26#include <linux/binfmts.h>
27#include <asm/ucontext.h>
28#include <asm/uaccess.h>
29#include <asm/lowcore.h>
a0616cde 30#include <asm/switch_to.h>
1da177e4
LT
31#include "compat_linux.h"
32#include "compat_ptrace.h"
a806170e 33#include "entry.h"
1da177e4 34
1da177e4
LT
35typedef struct
36{
37 __u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
38 struct sigcontext32 sc;
39 _sigregs32 sregs;
40 int signo;
ea2a4d3a 41 __u32 gprs_high[NUM_GPRS];
1da177e4
LT
42 __u8 retcode[S390_SYSCALL_SIZE];
43} sigframe32;
44
45typedef struct
46{
47 __u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
48 __u8 retcode[S390_SYSCALL_SIZE];
49 compat_siginfo_t info;
50 struct ucontext32 uc;
ea2a4d3a 51 __u32 gprs_high[NUM_GPRS];
1da177e4
LT
52} rt_sigframe32;
53
1da177e4
LT
54int copy_siginfo_to_user32(compat_siginfo_t __user *to, siginfo_t *from)
55{
56 int err;
57
58 if (!access_ok (VERIFY_WRITE, to, sizeof(compat_siginfo_t)))
59 return -EFAULT;
60
61 /* If you change siginfo_t structure, please be sure
62 this code is fixed accordingly.
63 It should never copy any pad contained in the structure
64 to avoid security leaks, but must copy the generic
65 3 ints plus the relevant union member.
66 This routine must convert siginfo from 64bit to 32bit as well
67 at the same time. */
68 err = __put_user(from->si_signo, &to->si_signo);
69 err |= __put_user(from->si_errno, &to->si_errno);
70 err |= __put_user((short)from->si_code, &to->si_code);
71 if (from->si_code < 0)
72 err |= __copy_to_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE);
73 else {
74 switch (from->si_code >> 16) {
75 case __SI_RT >> 16: /* This is not generated by the kernel as of now. */
76 case __SI_MESGQ >> 16:
77 err |= __put_user(from->si_int, &to->si_int);
78 /* fallthrough */
79 case __SI_KILL >> 16:
80 err |= __put_user(from->si_pid, &to->si_pid);
81 err |= __put_user(from->si_uid, &to->si_uid);
82 break;
83 case __SI_CHLD >> 16:
84 err |= __put_user(from->si_pid, &to->si_pid);
85 err |= __put_user(from->si_uid, &to->si_uid);
86 err |= __put_user(from->si_utime, &to->si_utime);
87 err |= __put_user(from->si_stime, &to->si_stime);
88 err |= __put_user(from->si_status, &to->si_status);
89 break;
90 case __SI_FAULT >> 16:
91 err |= __put_user((unsigned long) from->si_addr,
92 &to->si_addr);
93 break;
94 case __SI_POLL >> 16:
95 err |= __put_user(from->si_band, &to->si_band);
96 err |= __put_user(from->si_fd, &to->si_fd);
97 break;
98 case __SI_TIMER >> 16:
99 err |= __put_user(from->si_tid, &to->si_tid);
100 err |= __put_user(from->si_overrun, &to->si_overrun);
101 err |= __put_user(from->si_int, &to->si_int);
102 break;
103 default:
104 break;
105 }
106 }
107 return err;
108}
109
110int copy_siginfo_from_user32(siginfo_t *to, compat_siginfo_t __user *from)
111{
112 int err;
113 u32 tmp;
114
115 if (!access_ok (VERIFY_READ, from, sizeof(compat_siginfo_t)))
116 return -EFAULT;
117
118 err = __get_user(to->si_signo, &from->si_signo);
119 err |= __get_user(to->si_errno, &from->si_errno);
120 err |= __get_user(to->si_code, &from->si_code);
121
122 if (to->si_code < 0)
123 err |= __copy_from_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE);
124 else {
125 switch (to->si_code >> 16) {
126 case __SI_RT >> 16: /* This is not generated by the kernel as of now. */
127 case __SI_MESGQ >> 16:
128 err |= __get_user(to->si_int, &from->si_int);
129 /* fallthrough */
130 case __SI_KILL >> 16:
131 err |= __get_user(to->si_pid, &from->si_pid);
132 err |= __get_user(to->si_uid, &from->si_uid);
133 break;
134 case __SI_CHLD >> 16:
135 err |= __get_user(to->si_pid, &from->si_pid);
136 err |= __get_user(to->si_uid, &from->si_uid);
137 err |= __get_user(to->si_utime, &from->si_utime);
138 err |= __get_user(to->si_stime, &from->si_stime);
139 err |= __get_user(to->si_status, &from->si_status);
140 break;
141 case __SI_FAULT >> 16:
142 err |= __get_user(tmp, &from->si_addr);
3c52e49d
MS
143 to->si_addr = (void __force __user *)
144 (u64) (tmp & PSW32_ADDR_INSN);
1da177e4
LT
145 break;
146 case __SI_POLL >> 16:
147 err |= __get_user(to->si_band, &from->si_band);
148 err |= __get_user(to->si_fd, &from->si_fd);
149 break;
150 case __SI_TIMER >> 16:
151 err |= __get_user(to->si_tid, &from->si_tid);
152 err |= __get_user(to->si_overrun, &from->si_overrun);
153 err |= __get_user(to->si_int, &from->si_int);
154 break;
155 default:
156 break;
157 }
158 }
159 return err;
160}
161
1da177e4
LT
162asmlinkage long
163sys32_sigaction(int sig, const struct old_sigaction32 __user *act,
164 struct old_sigaction32 __user *oact)
165{
166 struct k_sigaction new_ka, old_ka;
167 unsigned long sa_handler, sa_restorer;
168 int ret;
169
170 if (act) {
171 compat_old_sigset_t mask;
172 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
173 __get_user(sa_handler, &act->sa_handler) ||
12bae235
HC
174 __get_user(sa_restorer, &act->sa_restorer) ||
175 __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
176 __get_user(mask, &act->sa_mask))
1da177e4
LT
177 return -EFAULT;
178 new_ka.sa.sa_handler = (__sighandler_t) sa_handler;
179 new_ka.sa.sa_restorer = (void (*)(void)) sa_restorer;
1da177e4
LT
180 siginitset(&new_ka.sa.sa_mask, mask);
181 }
182
183 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
184
185 if (!ret && oact) {
186 sa_handler = (unsigned long) old_ka.sa.sa_handler;
187 sa_restorer = (unsigned long) old_ka.sa.sa_restorer;
188 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
189 __put_user(sa_handler, &oact->sa_handler) ||
12bae235
HC
190 __put_user(sa_restorer, &oact->sa_restorer) ||
191 __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
192 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
1da177e4 193 return -EFAULT;
1da177e4
LT
194 }
195
196 return ret;
197}
198
1da177e4
LT
199asmlinkage long
200sys32_rt_sigaction(int sig, const struct sigaction32 __user *act,
201 struct sigaction32 __user *oact, size_t sigsetsize)
202{
203 struct k_sigaction new_ka, old_ka;
204 unsigned long sa_handler;
205 int ret;
206 compat_sigset_t set32;
207
208 /* XXX: Don't preclude handling different sized sigset_t's. */
209 if (sigsetsize != sizeof(compat_sigset_t))
210 return -EINVAL;
211
212 if (act) {
213 ret = get_user(sa_handler, &act->sa_handler);
214 ret |= __copy_from_user(&set32, &act->sa_mask,
215 sizeof(compat_sigset_t));
399c1d8d
MS
216 new_ka.sa.sa_mask.sig[0] =
217 set32.sig[0] | (((long)set32.sig[1]) << 32);
1da177e4
LT
218 ret |= __get_user(new_ka.sa.sa_flags, &act->sa_flags);
219
220 if (ret)
221 return -EFAULT;
222 new_ka.sa.sa_handler = (__sighandler_t) sa_handler;
223 }
224
225 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
226
227 if (!ret && oact) {
399c1d8d
MS
228 set32.sig[1] = (old_ka.sa.sa_mask.sig[0] >> 32);
229 set32.sig[0] = old_ka.sa.sa_mask.sig[0];
1da177e4
LT
230 ret = put_user((unsigned long)old_ka.sa.sa_handler, &oact->sa_handler);
231 ret |= __copy_to_user(&oact->sa_mask, &set32,
232 sizeof(compat_sigset_t));
233 ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
234 }
235
236 return ret;
237}
238
239asmlinkage long
03ff9a23 240sys32_sigaltstack(const stack_t32 __user *uss, stack_t32 __user *uoss)
1da177e4 241{
03ff9a23 242 struct pt_regs *regs = task_pt_regs(current);
1da177e4
LT
243 stack_t kss, koss;
244 unsigned long ss_sp;
245 int ret, err = 0;
246 mm_segment_t old_fs = get_fs();
247
248 if (uss) {
249 if (!access_ok(VERIFY_READ, uss, sizeof(*uss)))
250 return -EFAULT;
251 err |= __get_user(ss_sp, &uss->ss_sp);
252 err |= __get_user(kss.ss_size, &uss->ss_size);
253 err |= __get_user(kss.ss_flags, &uss->ss_flags);
254 if (err)
255 return -EFAULT;
c2814476 256 kss.ss_sp = (void __user *) ss_sp;
1da177e4
LT
257 }
258
259 set_fs (KERNEL_DS);
2b67fc46
HC
260 ret = do_sigaltstack((stack_t __force __user *) (uss ? &kss : NULL),
261 (stack_t __force __user *) (uoss ? &koss : NULL),
1da177e4
LT
262 regs->gprs[15]);
263 set_fs (old_fs);
264
265 if (!ret && uoss) {
266 if (!access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)))
267 return -EFAULT;
268 ss_sp = (unsigned long) koss.ss_sp;
269 err |= __put_user(ss_sp, &uoss->ss_sp);
270 err |= __put_user(koss.ss_size, &uoss->ss_size);
271 err |= __put_user(koss.ss_flags, &uoss->ss_flags);
272 if (err)
273 return -EFAULT;
274 }
275 return ret;
276}
277
278static int save_sigregs32(struct pt_regs *regs, _sigregs32 __user *sregs)
279{
280 _s390_regs_common32 regs32;
281 int err, i;
282
b50511e4
MS
283 regs32.psw.mask = psw32_user_bits |
284 ((__u32)(regs->psw.mask >> 32) & PSW32_MASK_USER);
d4e81b35
MS
285 regs32.psw.addr = (__u32) regs->psw.addr |
286 (__u32)(regs->psw.mask & PSW_MASK_BA);
1da177e4
LT
287 for (i = 0; i < NUM_GPRS; i++)
288 regs32.gprs[i] = (__u32) regs->gprs[i];
289 save_access_regs(current->thread.acrs);
290 memcpy(regs32.acrs, current->thread.acrs, sizeof(regs32.acrs));
291 err = __copy_to_user(&sregs->regs, &regs32, sizeof(regs32));
292 if (err)
293 return err;
294 save_fp_regs(&current->thread.fp_regs);
295 /* s390_fp_regs and _s390_fp_regs32 are the same ! */
296 return __copy_to_user(&sregs->fpregs, &current->thread.fp_regs,
297 sizeof(_s390_fp_regs32));
298}
299
300static int restore_sigregs32(struct pt_regs *regs,_sigregs32 __user *sregs)
301{
302 _s390_regs_common32 regs32;
303 int err, i;
304
305 /* Alwys make any pending restarted system call return -EINTR */
306 current_thread_info()->restart_block.fn = do_no_restart_syscall;
307
308 err = __copy_from_user(&regs32, &sregs->regs, sizeof(regs32));
309 if (err)
310 return err;
b50511e4 311 regs->psw.mask = (regs->psw.mask & ~PSW_MASK_USER) |
d4e81b35
MS
312 (__u64)(regs32.psw.mask & PSW32_MASK_USER) << 32 |
313 (__u64)(regs32.psw.addr & PSW32_ADDR_AMODE);
1da177e4
LT
314 regs->psw.addr = (__u64)(regs32.psw.addr & PSW32_ADDR_INSN);
315 for (i = 0; i < NUM_GPRS; i++)
316 regs->gprs[i] = (__u64) regs32.gprs[i];
317 memcpy(current->thread.acrs, regs32.acrs, sizeof(current->thread.acrs));
318 restore_access_regs(current->thread.acrs);
319
320 err = __copy_from_user(&current->thread.fp_regs, &sregs->fpregs,
321 sizeof(_s390_fp_regs32));
322 current->thread.fp_regs.fpc &= FPC_VALID_MASK;
323 if (err)
324 return err;
325
326 restore_fp_regs(&current->thread.fp_regs);
b6ef5bb3 327 clear_thread_flag(TIF_SYSCALL); /* No longer in a system call */
1da177e4
LT
328 return 0;
329}
330
ea2a4d3a
HC
331static int save_sigregs_gprs_high(struct pt_regs *regs, __u32 __user *uregs)
332{
333 __u32 gprs_high[NUM_GPRS];
334 int i;
335
336 for (i = 0; i < NUM_GPRS; i++)
337 gprs_high[i] = regs->gprs[i] >> 32;
338
339 return __copy_to_user(uregs, &gprs_high, sizeof(gprs_high));
340}
341
342static int restore_sigregs_gprs_high(struct pt_regs *regs, __u32 __user *uregs)
343{
344 __u32 gprs_high[NUM_GPRS];
345 int err, i;
346
347 err = __copy_from_user(&gprs_high, uregs, sizeof(gprs_high));
348 if (err)
349 return err;
350 for (i = 0; i < NUM_GPRS; i++)
351 *(__u32 *)&regs->gprs[i] = gprs_high[i];
352 return 0;
353}
354
03ff9a23 355asmlinkage long sys32_sigreturn(void)
1da177e4 356{
03ff9a23 357 struct pt_regs *regs = task_pt_regs(current);
1da177e4
LT
358 sigframe32 __user *frame = (sigframe32 __user *)regs->gprs[15];
359 sigset_t set;
360
361 if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
362 goto badframe;
363 if (__copy_from_user(&set.sig, &frame->sc.oldmask, _SIGMASK_COPY_SIZE32))
364 goto badframe;
391c62fe 365 set_current_blocked(&set);
1da177e4
LT
366 if (restore_sigregs32(regs, &frame->sregs))
367 goto badframe;
ea2a4d3a
HC
368 if (restore_sigregs_gprs_high(regs, frame->gprs_high))
369 goto badframe;
1da177e4 370 return regs->gprs[2];
1da177e4
LT
371badframe:
372 force_sig(SIGSEGV, current);
373 return 0;
374}
375
03ff9a23 376asmlinkage long sys32_rt_sigreturn(void)
1da177e4 377{
03ff9a23 378 struct pt_regs *regs = task_pt_regs(current);
1da177e4
LT
379 rt_sigframe32 __user *frame = (rt_sigframe32 __user *)regs->gprs[15];
380 sigset_t set;
381 stack_t st;
382 __u32 ss_sp;
383 int err;
384 mm_segment_t old_fs = get_fs();
385
386 if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
387 goto badframe;
388 if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
389 goto badframe;
391c62fe 390 set_current_blocked(&set);
1da177e4
LT
391 if (restore_sigregs32(regs, &frame->uc.uc_mcontext))
392 goto badframe;
ea2a4d3a
HC
393 if (restore_sigregs_gprs_high(regs, frame->gprs_high))
394 goto badframe;
1da177e4 395 err = __get_user(ss_sp, &frame->uc.uc_stack.ss_sp);
c2814476 396 st.ss_sp = compat_ptr(ss_sp);
1da177e4
LT
397 err |= __get_user(st.ss_size, &frame->uc.uc_stack.ss_size);
398 err |= __get_user(st.ss_flags, &frame->uc.uc_stack.ss_flags);
399 if (err)
400 goto badframe;
1da177e4 401 set_fs (KERNEL_DS);
2b67fc46 402 do_sigaltstack((stack_t __force __user *)&st, NULL, regs->gprs[15]);
1da177e4 403 set_fs (old_fs);
1da177e4 404 return regs->gprs[2];
1da177e4 405badframe:
03ff9a23
MS
406 force_sig(SIGSEGV, current);
407 return 0;
1da177e4
LT
408}
409
410/*
411 * Set up a signal frame.
412 */
413
414
415/*
416 * Determine which stack to use..
417 */
418static inline void __user *
419get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size)
420{
421 unsigned long sp;
422
423 /* Default to using normal stack */
424 sp = (unsigned long) A(regs->gprs[15]);
425
de553438
HC
426 /* Overflow on alternate signal stack gives SIGSEGV. */
427 if (on_sig_stack(sp) && !on_sig_stack((sp - frame_size) & -8UL))
428 return (void __user *) -1UL;
429
1da177e4
LT
430 /* This is the X/Open sanctioned signal stack switching. */
431 if (ka->sa.sa_flags & SA_ONSTACK) {
28f22378 432 if (! sas_ss_flags(sp))
1da177e4
LT
433 sp = current->sas_ss_sp + current->sas_ss_size;
434 }
435
1da177e4
LT
436 return (void __user *)((sp - frame_size) & -8ul);
437}
438
439static inline int map_signal(int sig)
440{
441 if (current_thread_info()->exec_domain
442 && current_thread_info()->exec_domain->signal_invmap
443 && sig < 32)
444 return current_thread_info()->exec_domain->signal_invmap[sig];
445 else
446 return sig;
447}
448
54dfe5dd 449static int setup_frame32(int sig, struct k_sigaction *ka,
1da177e4
LT
450 sigset_t *set, struct pt_regs * regs)
451{
452 sigframe32 __user *frame = get_sigframe(ka, regs, sizeof(sigframe32));
453 if (!access_ok(VERIFY_WRITE, frame, sizeof(sigframe32)))
454 goto give_sigsegv;
455
de553438
HC
456 if (frame == (void __user *) -1UL)
457 goto give_sigsegv;
458
1da177e4
LT
459 if (__copy_to_user(&frame->sc.oldmask, &set->sig, _SIGMASK_COPY_SIZE32))
460 goto give_sigsegv;
461
462 if (save_sigregs32(regs, &frame->sregs))
463 goto give_sigsegv;
ea2a4d3a
HC
464 if (save_sigregs_gprs_high(regs, frame->gprs_high))
465 goto give_sigsegv;
1da177e4
LT
466 if (__put_user((unsigned long) &frame->sregs, &frame->sc.sregs))
467 goto give_sigsegv;
468
469 /* Set up to return from userspace. If provided, use a stub
470 already in userspace. */
471 if (ka->sa.sa_flags & SA_RESTORER) {
d4e81b35 472 regs->gprs[14] = (__u64) ka->sa.sa_restorer | PSW32_ADDR_AMODE;
1da177e4 473 } else {
d4e81b35 474 regs->gprs[14] = (__u64) frame->retcode | PSW32_ADDR_AMODE;
1da177e4 475 if (__put_user(S390_SYSCALL_OPCODE | __NR_sigreturn,
3c52e49d 476 (u16 __force __user *)(frame->retcode)))
1da177e4
LT
477 goto give_sigsegv;
478 }
479
480 /* Set up backchain. */
481 if (__put_user(regs->gprs[15], (unsigned int __user *) frame))
482 goto give_sigsegv;
483
484 /* Set up registers for signal handler */
3c52e49d 485 regs->gprs[15] = (__force __u64) frame;
d4e81b35 486 regs->psw.mask |= PSW_MASK_BA; /* force amode 31 */
3c52e49d 487 regs->psw.addr = (__force __u64) ka->sa.sa_handler;
1da177e4
LT
488
489 regs->gprs[2] = map_signal(sig);
3c52e49d 490 regs->gprs[3] = (__force __u64) &frame->sc;
1da177e4
LT
491
492 /* We forgot to include these in the sigcontext.
493 To avoid breaking binary compatibility, they are passed as args. */
aa33c8cb
MS
494 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL ||
495 sig == SIGTRAP || sig == SIGFPE) {
496 /* set extra registers only for synchronous signals */
497 regs->gprs[4] = regs->int_code & 127;
498 regs->gprs[5] = regs->int_parm_long;
499 }
1da177e4
LT
500
501 /* Place signal number on stack to allow backtrace from handler. */
3c52e49d 502 if (__put_user(regs->gprs[2], (int __force __user *) &frame->signo))
1da177e4 503 goto give_sigsegv;
54dfe5dd 504 return 0;
1da177e4
LT
505
506give_sigsegv:
507 force_sigsegv(sig, current);
54dfe5dd 508 return -EFAULT;
1da177e4
LT
509}
510
54dfe5dd 511static int setup_rt_frame32(int sig, struct k_sigaction *ka, siginfo_t *info,
1da177e4
LT
512 sigset_t *set, struct pt_regs * regs)
513{
514 int err = 0;
515 rt_sigframe32 __user *frame = get_sigframe(ka, regs, sizeof(rt_sigframe32));
516 if (!access_ok(VERIFY_WRITE, frame, sizeof(rt_sigframe32)))
517 goto give_sigsegv;
518
de553438
HC
519 if (frame == (void __user *) -1UL)
520 goto give_sigsegv;
521
1da177e4
LT
522 if (copy_siginfo_to_user32(&frame->info, info))
523 goto give_sigsegv;
524
525 /* Create the ucontext. */
ea2a4d3a 526 err |= __put_user(UC_EXTENDED, &frame->uc.uc_flags);
1da177e4
LT
527 err |= __put_user(0, &frame->uc.uc_link);
528 err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
529 err |= __put_user(sas_ss_flags(regs->gprs[15]),
530 &frame->uc.uc_stack.ss_flags);
531 err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
532 err |= save_sigregs32(regs, &frame->uc.uc_mcontext);
ea2a4d3a 533 err |= save_sigregs_gprs_high(regs, frame->gprs_high);
1da177e4
LT
534 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
535 if (err)
536 goto give_sigsegv;
537
538 /* Set up to return from userspace. If provided, use a stub
539 already in userspace. */
540 if (ka->sa.sa_flags & SA_RESTORER) {
207a0549 541 regs->gprs[14] = (__u64) ka->sa.sa_restorer | PSW32_ADDR_AMODE;
1da177e4 542 } else {
207a0549 543 regs->gprs[14] = (__u64) frame->retcode | PSW32_ADDR_AMODE;
1da177e4 544 err |= __put_user(S390_SYSCALL_OPCODE | __NR_rt_sigreturn,
3c52e49d 545 (u16 __force __user *)(frame->retcode));
1da177e4
LT
546 }
547
548 /* Set up backchain. */
3c52e49d 549 if (__put_user(regs->gprs[15], (unsigned int __force __user *) frame))
1da177e4
LT
550 goto give_sigsegv;
551
552 /* Set up registers for signal handler */
3c52e49d 553 regs->gprs[15] = (__force __u64) frame;
d4e81b35 554 regs->psw.mask |= PSW_MASK_BA; /* force amode 31 */
1da177e4
LT
555 regs->psw.addr = (__u64) ka->sa.sa_handler;
556
557 regs->gprs[2] = map_signal(sig);
3c52e49d
MS
558 regs->gprs[3] = (__force __u64) &frame->info;
559 regs->gprs[4] = (__force __u64) &frame->uc;
54dfe5dd 560 return 0;
1da177e4
LT
561
562give_sigsegv:
563 force_sigsegv(sig, current);
54dfe5dd 564 return -EFAULT;
1da177e4
LT
565}
566
567/*
568 * OK, we're invoking a handler
569 */
570
a610d6e6 571void handle_signal32(unsigned long sig, struct k_sigaction *ka,
391c62fe 572 siginfo_t *info, sigset_t *oldset, struct pt_regs *regs)
1da177e4 573{
54dfe5dd
HC
574 int ret;
575
1da177e4
LT
576 /* Set up the stack frame */
577 if (ka->sa.sa_flags & SA_SIGINFO)
54dfe5dd 578 ret = setup_rt_frame32(sig, ka, info, oldset, regs);
1da177e4 579 else
54dfe5dd 580 ret = setup_frame32(sig, ka, oldset, regs);
391c62fe 581 if (ret)
a610d6e6 582 return;
efee984c 583 signal_delivered(sig, info, ka, regs,
a610d6e6 584 test_thread_flag(TIF_SINGLE_STEP));
1da177e4
LT
585}
586
This page took 0.55231 seconds and 5 git commands to generate.