sparc: switch to use of generic old sigaction
authorAl Viro <viro@zeniv.linux.org.uk>
Wed, 26 Dec 2012 00:18:40 +0000 (19:18 -0500)
committerAl Viro <viro@zeniv.linux.org.uk>
Mon, 4 Feb 2013 03:43:35 +0000 (22:43 -0500)
note that due to historical accident we do *not* directly take
generic versions - need to check and invert the sign of signal
number first.

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
arch/sparc/Kconfig
arch/sparc/include/uapi/asm/signal.h
arch/sparc/kernel/sys32.S
arch/sparc/kernel/sys_sparc32.c
arch/sparc/kernel/sys_sparc_32.c
arch/sparc/kernel/systbls_32.S

index 9d2c395440df5d696b7dceeb9ab65c8bd9543e3c..1a8ef82b3475b68b40b3b7c072ee6421dbfc43a8 100644 (file)
@@ -53,6 +53,7 @@ config SPARC32
        select GENERIC_ATOMIC64
        select CLZ_TAB
        select HAVE_UID16
+       select OLD_SIGACTION
 
 config SPARC64
        def_bool 64BIT
@@ -549,6 +550,7 @@ config COMPAT
        select COMPAT_BINFMT_ELF
        select HAVE_UID16
        select ARCH_WANT_OLD_COMPAT_IPC
+       select COMPAT_OLD_SIGACTION
 
 config SYSVIPC_COMPAT
        bool
index 284836f0b7dcca0dcd69ecf206fc16689a0342e5..f387400fcfdf1562b5a586552d3b4ce46de28f2f 100644 (file)
@@ -160,7 +160,6 @@ struct __new_sigaction {
        __sigrestore_t          sa_restorer;  /* not used by Linux/SPARC yet */
        __new_sigset_t          sa_mask;
 };
-#endif
 
 struct __old_sigaction {
        __sighandler_t          sa_handler;
@@ -168,6 +167,7 @@ struct __old_sigaction {
        unsigned long           sa_flags;
        void                    (*sa_restorer)(void);  /* not used by Linux/SPARC yet */
 };
+#endif
 
 typedef struct sigaltstack {
        void                    __user *ss_sp;
index 8475a474273ae1c615ce4277dd3bf74ba1ce9f0a..9d2e99658aff04af5b4dacb68d40a57143fe3b5c 100644 (file)
@@ -60,7 +60,7 @@ SIGN1(sys32_setitimer, compat_sys_setitimer, %o0)
 SIGN1(sys32_getitimer, compat_sys_getitimer, %o0)
 SIGN1(sys32_sethostname, sys_sethostname, %o1)
 SIGN1(sys32_swapon, sys_swapon, %o1)
-SIGN1(sys32_sigaction, compat_sys_sigaction, %o0)
+SIGN1(sys32_sigaction, compat_sys_sparc_sigaction, %o0)
 SIGN1(sys32_rt_sigaction, compat_sys_rt_sigaction, %o0)
 SIGN1(sys32_sigprocmask, compat_sys_sigprocmask, %o0)
 SIGN1(sys32_rt_sigprocmask, compat_sys_rt_sigprocmask, %o0)
index 4e96771a1b5936cdd634bd8f70c03a08ee2bd900..dcce0a6216cffef8e81fe980151624cd040d9ee2 100644 (file)
@@ -211,41 +211,12 @@ asmlinkage long compat_sys_sysfs(int option, u32 arg1, u32 arg2)
        return sys_sysfs(option, arg1, arg2);
 }
 
-asmlinkage long compat_sys_sigaction(int sig, struct old_sigaction32 __user *act,
-                                    struct old_sigaction32 __user *oact)
+COMPAT_SYSCALL_DEFINE3(sparc_sigaction, int, sig,
+                       struct compat_old_sigaction __user *,act,
+                       struct compat_old_sigaction __user *,oact)
 {
-        struct k_sigaction new_ka, old_ka;
-        int ret;
-
        WARN_ON_ONCE(sig >= 0);
-       sig = -sig;
-
-        if (act) {
-               compat_old_sigset_t mask;
-               u32 u_handler, u_restorer;
-               
-               ret = get_user(u_handler, &act->sa_handler);
-               new_ka.sa.sa_handler =  compat_ptr(u_handler);
-               ret |= __get_user(u_restorer, &act->sa_restorer);
-               new_ka.sa.sa_restorer = compat_ptr(u_restorer);
-               ret |= __get_user(new_ka.sa.sa_flags, &act->sa_flags);
-               ret |= __get_user(mask, &act->sa_mask);
-               if (ret)
-                       return ret;
-               new_ka.ka_restorer = NULL;
-               siginitset(&new_ka.sa.sa_mask, mask);
-        }
-
-        ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
-
-       if (!ret && oact) {
-               ret = put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler);
-               ret |= __put_user(ptr_to_compat(old_ka.sa.sa_restorer), &oact->sa_restorer);
-               ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
-               ret |= __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
-        }
-
-       return ret;
+       return compat_sys_sigaction(-sig, act, oact);
 }
 
 COMPAT_SYSCALL_DEFINE5(rt_sigaction, int, sig,
index cdd2d7035930170d54feab1cb72699509984ae10..3a8d1844402e5223a1aa2f941c9f02628fef82d6 100644 (file)
@@ -160,41 +160,12 @@ sparc_breakpoint (struct pt_regs *regs)
 #endif
 }
 
-asmlinkage int
-sparc_sigaction (int sig, const struct old_sigaction __user *act,
-                struct old_sigaction __user *oact)
+SYSCALL_DEFINE3(sparc_sigaction, int, sig,
+               struct old_sigaction __user *,act,
+               struct old_sigaction __user *,oact)
 {
-       struct k_sigaction new_ka, old_ka;
-       int ret;
-
        WARN_ON_ONCE(sig >= 0);
-       sig = -sig;
-
-       if (act) {
-               unsigned long mask;
-
-               if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
-                   __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
-                   __get_user(new_ka.sa.sa_restorer, &act->sa_restorer) ||
-                   __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
-                   __get_user(mask, &act->sa_mask))
-                       return -EFAULT;
-               siginitset(&new_ka.sa.sa_mask, mask);
-               new_ka.ka_restorer = NULL;
-       }
-
-       ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
-
-       if (!ret && oact) {
-               if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
-                   __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
-                   __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer) ||
-                   __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
-                   __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
-                       return -EFAULT;
-       }
-
-       return ret;
+       return sys_sigaction(-sig, act, oact);
 }
 
 SYSCALL_DEFINE5(rt_sigaction, int, sig,
index 6ac43c36bbbfb98ad769ba6492f66a5fbb2ab554..7b87171ecf1e91803ce0a3908c629118d205c020 100644 (file)
@@ -55,7 +55,7 @@ sys_call_table:
 /*180*/        .long sys_flistxattr, sys_removexattr, sys_lremovexattr, sys_sigpending, sys_ni_syscall
 /*185*/        .long sys_setpgid, sys_fremovexattr, sys_tkill, sys_exit_group, sys_newuname
 /*190*/        .long sys_init_module, sys_personality, sparc_remap_file_pages, sys_epoll_create, sys_epoll_ctl
-/*195*/        .long sys_epoll_wait, sys_ioprio_set, sys_getppid, sparc_sigaction, sys_sgetmask
+/*195*/        .long sys_epoll_wait, sys_ioprio_set, sys_getppid, sys_sparc_sigaction, sys_sgetmask
 /*200*/        .long sys_ssetmask, sys_sigsuspend, sys_newlstat, sys_uselib, sys_old_readdir
 /*205*/        .long sys_readahead, sys_socketcall, sys_syslog, sys_lookup_dcookie, sys_fadvise64
 /*210*/        .long sys_fadvise64_64, sys_tgkill, sys_waitpid, sys_swapoff, sys_sysinfo
This page took 0.02818 seconds and 5 git commands to generate.