Linux Audio

Check our new training course

In-person Linux kernel drivers training

Jun 16-20, 2025
Register
Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 *    Copyright IBM Corp. 2000, 2006
 
 
  4 *    Author(s): Denis Joseph Barrow (djbarrow@de.ibm.com,barrow_dj@yahoo.com)
  5 *               Gerhard Tonn (ton@de.ibm.com)                  
  6 *
  7 *  Copyright (C) 1991, 1992  Linus Torvalds
  8 *
  9 *  1997-11-28  Modified for POSIX.1b signals by Richard Henderson
 10 */
 11
 12#include <linux/compat.h>
 13#include <linux/sched.h>
 14#include <linux/sched/task_stack.h>
 15#include <linux/mm.h>
 16#include <linux/smp.h>
 17#include <linux/kernel.h>
 18#include <linux/signal.h>
 19#include <linux/errno.h>
 20#include <linux/wait.h>
 21#include <linux/ptrace.h>
 22#include <linux/unistd.h>
 23#include <linux/stddef.h>
 24#include <linux/tty.h>
 25#include <linux/personality.h>
 26#include <linux/binfmts.h>
 27#include <asm/vdso-symbols.h>
 28#include <asm/access-regs.h>
 29#include <asm/ucontext.h>
 30#include <linux/uaccess.h>
 31#include <asm/lowcore.h>
 32#include <asm/fpu.h>
 33#include "compat_linux.h"
 34#include "compat_ptrace.h"
 35#include "entry.h"
 36
 37typedef struct 
 38{
 39	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 40	struct sigcontext32 sc;
 41	_sigregs32 sregs;
 42	int signo;
 43	_sigregs_ext32 sregs_ext;
 44	__u16 svc_insn;		/* Offset of svc_insn is NOT fixed! */
 45} sigframe32;
 46
 47typedef struct 
 48{
 49	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 50	__u16 svc_insn;
 51	compat_siginfo_t info;
 52	struct ucontext32 uc;
 
 53} rt_sigframe32;
 54
 55/* Store registers needed to create the signal frame */
 56static void store_sigregs(void)
 57{
 58	save_access_regs(current->thread.acrs);
 59	save_user_fpu_regs();
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 60}
 61
 62/* Load registers after signal return */
 63static void load_sigregs(void)
 64{
 65	restore_access_regs(current->thread.acrs);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 66}
 67
 68static int save_sigregs32(struct pt_regs *regs, _sigregs32 __user *sregs)
 69{
 70	_sigregs32 user_sregs;
 71	int i;
 72
 73	user_sregs.regs.psw.mask = (__u32)(regs->psw.mask >> 32);
 74	user_sregs.regs.psw.mask &= PSW32_MASK_USER | PSW32_MASK_RI;
 75	user_sregs.regs.psw.mask |= PSW32_USER_BITS;
 76	user_sregs.regs.psw.addr = (__u32) regs->psw.addr |
 77		(__u32)(regs->psw.mask & PSW_MASK_BA);
 78	for (i = 0; i < NUM_GPRS; i++)
 79		user_sregs.regs.gprs[i] = (__u32) regs->gprs[i];
 80	memcpy(&user_sregs.regs.acrs, current->thread.acrs,
 81	       sizeof(user_sregs.regs.acrs));
 82	fpregs_store((_s390_fp_regs *) &user_sregs.fpregs, &current->thread.ufpu);
 83	if (__copy_to_user(sregs, &user_sregs, sizeof(_sigregs32)))
 84		return -EFAULT;
 85	return 0;
 
 
 
 86}
 87
 88static int restore_sigregs32(struct pt_regs *regs,_sigregs32 __user *sregs)
 89{
 90	_sigregs32 user_sregs;
 91	int i;
 92
 93	/* Always make any pending restarted system call return -EINTR */
 94	current->restart_block.fn = do_no_restart_syscall;
 95
 96	if (__copy_from_user(&user_sregs, &sregs->regs, sizeof(user_sregs)))
 97		return -EFAULT;
 98
 99	if (!is_ri_task(current) && (user_sregs.regs.psw.mask & PSW32_MASK_RI))
100		return -EINVAL;
101
102	/* Use regs->psw.mask instead of PSW_USER_BITS to preserve PER bit. */
103	regs->psw.mask = (regs->psw.mask & ~(PSW_MASK_USER | PSW_MASK_RI)) |
104		(__u64)(user_sregs.regs.psw.mask & PSW32_MASK_USER) << 32 |
105		(__u64)(user_sregs.regs.psw.mask & PSW32_MASK_RI) << 32 |
106		(__u64)(user_sregs.regs.psw.addr & PSW32_ADDR_AMODE);
107	/* Check for invalid user address space control. */
108	if ((regs->psw.mask & PSW_MASK_ASC) == PSW_ASC_HOME)
109		regs->psw.mask = PSW_ASC_PRIMARY |
110			(regs->psw.mask & ~PSW_MASK_ASC);
111	regs->psw.addr = (__u64)(user_sregs.regs.psw.addr & PSW32_ADDR_INSN);
112	for (i = 0; i < NUM_GPRS; i++)
113		regs->gprs[i] = (__u64) user_sregs.regs.gprs[i];
114	memcpy(&current->thread.acrs, &user_sregs.regs.acrs,
115	       sizeof(current->thread.acrs));
116	fpregs_load((_s390_fp_regs *)&user_sregs.fpregs, &current->thread.ufpu);
 
 
 
 
 
117
118	clear_pt_regs_flag(regs, PIF_SYSCALL); /* No longer in a system call */
 
119	return 0;
120}
121
122static int save_sigregs_ext32(struct pt_regs *regs,
123			      _sigregs_ext32 __user *sregs_ext)
124{
125	__u32 gprs_high[NUM_GPRS];
126	__u64 vxrs[__NUM_VXRS_LOW];
127	int i;
128
129	/* Save high gprs to signal stack */
130	for (i = 0; i < NUM_GPRS; i++)
131		gprs_high[i] = regs->gprs[i] >> 32;
132	if (__copy_to_user(&sregs_ext->gprs_high, &gprs_high,
133			   sizeof(sregs_ext->gprs_high)))
134		return -EFAULT;
135
136	/* Save vector registers to signal stack */
137	if (cpu_has_vx()) {
138		for (i = 0; i < __NUM_VXRS_LOW; i++)
139			vxrs[i] = current->thread.ufpu.vxrs[i].low;
140		if (__copy_to_user(&sregs_ext->vxrs_low, vxrs,
141				   sizeof(sregs_ext->vxrs_low)) ||
142		    __copy_to_user(&sregs_ext->vxrs_high,
143				   current->thread.ufpu.vxrs + __NUM_VXRS_LOW,
144				   sizeof(sregs_ext->vxrs_high)))
145			return -EFAULT;
146	}
147	return 0;
148}
149
150static int restore_sigregs_ext32(struct pt_regs *regs,
151				 _sigregs_ext32 __user *sregs_ext)
152{
153	__u32 gprs_high[NUM_GPRS];
154	__u64 vxrs[__NUM_VXRS_LOW];
155	int i;
156
157	/* Restore high gprs from signal stack */
158	if (__copy_from_user(&gprs_high, &sregs_ext->gprs_high,
159			     sizeof(sregs_ext->gprs_high)))
160		return -EFAULT;
161	for (i = 0; i < NUM_GPRS; i++)
162		*(__u32 *)&regs->gprs[i] = gprs_high[i];
163
164	/* Restore vector registers from signal stack */
165	if (cpu_has_vx()) {
166		if (__copy_from_user(vxrs, &sregs_ext->vxrs_low,
167				     sizeof(sregs_ext->vxrs_low)) ||
168		    __copy_from_user(current->thread.ufpu.vxrs + __NUM_VXRS_LOW,
169				     &sregs_ext->vxrs_high,
170				     sizeof(sregs_ext->vxrs_high)))
171			return -EFAULT;
172		for (i = 0; i < __NUM_VXRS_LOW; i++)
173			current->thread.ufpu.vxrs[i].low = vxrs[i];
174	}
175	return 0;
176}
177
178COMPAT_SYSCALL_DEFINE0(sigreturn)
179{
180	struct pt_regs *regs = task_pt_regs(current);
181	sigframe32 __user *frame = (sigframe32 __user *)regs->gprs[15];
182	sigset_t set;
183
184	if (get_compat_sigset(&set, (compat_sigset_t __user *)frame->sc.oldmask))
 
 
185		goto badframe;
186	set_current_blocked(&set);
187	save_user_fpu_regs();
188	if (restore_sigregs32(regs, &frame->sregs))
189		goto badframe;
190	if (restore_sigregs_ext32(regs, &frame->sregs_ext))
191		goto badframe;
192	load_sigregs();
193	return regs->gprs[2];
194badframe:
195	force_sig(SIGSEGV);
196	return 0;
197}
198
199COMPAT_SYSCALL_DEFINE0(rt_sigreturn)
200{
201	struct pt_regs *regs = task_pt_regs(current);
202	rt_sigframe32 __user *frame = (rt_sigframe32 __user *)regs->gprs[15];
203	sigset_t set;
 
 
 
 
204
205	if (get_compat_sigset(&set, &frame->uc.uc_sigmask))
206		goto badframe;
207	set_current_blocked(&set);
208	if (compat_restore_altstack(&frame->uc.uc_stack))
209		goto badframe;
210	save_user_fpu_regs();
211	if (restore_sigregs32(regs, &frame->uc.uc_mcontext))
212		goto badframe;
213	if (restore_sigregs_ext32(regs, &frame->uc.uc_mcontext_ext))
214		goto badframe;
215	load_sigregs();
 
 
 
 
 
 
 
 
216	return regs->gprs[2];
217badframe:
218	force_sig(SIGSEGV);
219	return 0;
220}	
221
222/*
223 * Set up a signal frame.
224 */
225
226
227/*
228 * Determine which stack to use..
229 */
230static inline void __user *
231get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size)
232{
233	unsigned long sp;
234
235	/* Default to using normal stack */
236	sp = (unsigned long) A(regs->gprs[15]);
237
238	/* Overflow on alternate signal stack gives SIGSEGV. */
239	if (on_sig_stack(sp) && !on_sig_stack((sp - frame_size) & -8UL))
240		return (void __user *) -1UL;
241
242	/* This is the X/Open sanctioned signal stack switching.  */
243	if (ka->sa.sa_flags & SA_ONSTACK) {
244		if (! sas_ss_flags(sp))
245			sp = current->sas_ss_sp + current->sas_ss_size;
246	}
247
248	return (void __user *)((sp - frame_size) & -8ul);
249}
250
251static int setup_frame32(struct ksignal *ksig, sigset_t *set,
252			 struct pt_regs *regs)
253{
254	int sig = ksig->sig;
255	sigframe32 __user *frame;
256	unsigned long restorer;
257	size_t frame_size;
258
259	/*
260	 * gprs_high are always present for 31-bit compat tasks.
261	 * The space for vector registers is only allocated if
262	 * the machine supports it
263	 */
264	frame_size = sizeof(*frame) - sizeof(frame->sregs_ext.__reserved);
265	if (!cpu_has_vx())
266		frame_size -= sizeof(frame->sregs_ext.vxrs_low) +
267			      sizeof(frame->sregs_ext.vxrs_high);
268	frame = get_sigframe(&ksig->ka, regs, frame_size);
269	if (frame == (void __user *) -1UL)
270		return -EFAULT;
271
272	/* Set up backchain. */
273	if (__put_user(regs->gprs[15], (unsigned int __user *) frame))
274		return -EFAULT;
 
 
 
275
276	/* Create struct sigcontext32 on the signal stack */
277	if (put_compat_sigset((compat_sigset_t __user *)frame->sc.oldmask,
278			      set, sizeof(compat_sigset_t)))
279		return -EFAULT;
280	if (__put_user(ptr_to_compat(&frame->sregs), &frame->sc.sregs))
281		return -EFAULT;
282
283	/* Store registers needed to create the signal frame */
284	store_sigregs();
285
286	/* Create _sigregs32 on the signal stack */
287	if (save_sigregs32(regs, &frame->sregs))
288		return -EFAULT;
289
290	/* Place signal number on stack to allow backtrace from handler.  */
291	if (__put_user(regs->gprs[2], (int __force __user *) &frame->signo))
292		return -EFAULT;
293
294	/* Create _sigregs_ext32 on the signal stack */
295	if (save_sigregs_ext32(regs, &frame->sregs_ext))
296		return -EFAULT;
297
298	/* Set up to return from userspace.  If provided, use a stub
299	   already in userspace.  */
300	if (ksig->ka.sa.sa_flags & SA_RESTORER) {
301		restorer = (unsigned long __force)
302			ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE;
303	} else {
304		restorer = VDSO32_SYMBOL(current, sigreturn);
 
 
 
305        }
306
 
 
 
 
307	/* Set up registers for signal handler */
308	regs->gprs[14] = restorer;
309	regs->gprs[15] = (__force __u64) frame;
310	/* Force 31 bit amode and default user address space control. */
311	regs->psw.mask = PSW_MASK_BA |
312		(PSW_USER_BITS & PSW_MASK_ASC) |
313		(regs->psw.mask & ~PSW_MASK_ASC);
314	regs->psw.addr = (__force __u64) ksig->ka.sa.sa_handler;
315
316	regs->gprs[2] = sig;
317	regs->gprs[3] = (__force __u64) &frame->sc;
318
319	/* We forgot to include these in the sigcontext.
320	   To avoid breaking binary compatibility, they are passed as args. */
321	if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL ||
322	    sig == SIGTRAP || sig == SIGFPE) {
323		/* set extra registers only for synchronous signals */
324		regs->gprs[4] = regs->int_code & 127;
325		regs->gprs[5] = regs->int_parm_long;
326		regs->gprs[6] = current->thread.last_break;
327	}
328
 
 
 
329	return 0;
 
 
 
 
330}
331
332static int setup_rt_frame32(struct ksignal *ksig, sigset_t *set,
333			    struct pt_regs *regs)
334{
335	rt_sigframe32 __user *frame;
336	unsigned long restorer;
337	size_t frame_size;
338	u32 uc_flags;
339
340	frame_size = sizeof(*frame) -
341		     sizeof(frame->uc.uc_mcontext_ext.__reserved);
342	/*
343	 * gprs_high are always present for 31-bit compat tasks.
344	 * The space for vector registers is only allocated if
345	 * the machine supports it
346	 */
347	uc_flags = UC_GPRS_HIGH;
348	if (cpu_has_vx()) {
349		uc_flags |= UC_VXRS;
350	} else {
351		frame_size -= sizeof(frame->uc.uc_mcontext_ext.vxrs_low) +
352			      sizeof(frame->uc.uc_mcontext_ext.vxrs_high);
353	}
354	frame = get_sigframe(&ksig->ka, regs, frame_size);
355	if (frame == (void __user *) -1UL)
356		return -EFAULT;
357
358	/* Set up backchain. */
359	if (__put_user(regs->gprs[15], (unsigned int __force __user *) frame))
360		return -EFAULT;
 
 
 
 
 
 
 
 
 
 
 
 
361
362	/* Set up to return from userspace.  If provided, use a stub
363	   already in userspace.  */
364	if (ksig->ka.sa.sa_flags & SA_RESTORER) {
365		restorer = (unsigned long __force)
366			ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE;
367	} else {
368		restorer = VDSO32_SYMBOL(current, rt_sigreturn);
 
 
369	}
370
371	/* Create siginfo on the signal stack */
372	if (copy_siginfo_to_user32(&frame->info, &ksig->info))
373		return -EFAULT;
374
375	/* Store registers needed to create the signal frame */
376	store_sigregs();
377
378	/* Create ucontext on the signal stack. */
379	if (__put_user(uc_flags, &frame->uc.uc_flags) ||
380	    __put_user(0, &frame->uc.uc_link) ||
381	    __compat_save_altstack(&frame->uc.uc_stack, regs->gprs[15]) ||
382	    save_sigregs32(regs, &frame->uc.uc_mcontext) ||
383	    put_compat_sigset(&frame->uc.uc_sigmask, set, sizeof(compat_sigset_t)) ||
384	    save_sigregs_ext32(regs, &frame->uc.uc_mcontext_ext))
385		return -EFAULT;
386
387	/* Set up registers for signal handler */
388	regs->gprs[14] = restorer;
389	regs->gprs[15] = (__force __u64) frame;
390	/* Force 31 bit amode and default user address space control. */
391	regs->psw.mask = PSW_MASK_BA |
392		(PSW_USER_BITS & PSW_MASK_ASC) |
393		(regs->psw.mask & ~PSW_MASK_ASC);
394	regs->psw.addr = (__u64 __force) ksig->ka.sa.sa_handler;
395
396	regs->gprs[2] = ksig->sig;
397	regs->gprs[3] = (__force __u64) &frame->info;
398	regs->gprs[4] = (__force __u64) &frame->uc;
399	regs->gprs[5] = current->thread.last_break;
400	return 0;
 
 
 
 
401}
402
403/*
404 * OK, we're invoking a handler
405 */	
406
407void handle_signal32(struct ksignal *ksig, sigset_t *oldset,
408		     struct pt_regs *regs)
409{
410	int ret;
411
412	/* Set up the stack frame */
413	if (ksig->ka.sa.sa_flags & SA_SIGINFO)
414		ret = setup_rt_frame32(ksig, oldset, regs);
415	else
416		ret = setup_frame32(ksig, oldset, regs);
417
418	signal_setup_done(ret, ksig, test_thread_flag(TIF_SINGLE_STEP));
 
 
419}
420
v3.5.6
 
  1/*
  2 *  arch/s390/kernel/compat_signal.c
  3 *
  4 *    Copyright (C) IBM Corp. 2000,2006
  5 *    Author(s): Denis Joseph Barrow (djbarrow@de.ibm.com,barrow_dj@yahoo.com)
  6 *               Gerhard Tonn (ton@de.ibm.com)                  
  7 *
  8 *  Copyright (C) 1991, 1992  Linus Torvalds
  9 *
 10 *  1997-11-28  Modified for POSIX.1b signals by Richard Henderson
 11 */
 12
 13#include <linux/compat.h>
 14#include <linux/sched.h>
 
 15#include <linux/mm.h>
 16#include <linux/smp.h>
 17#include <linux/kernel.h>
 18#include <linux/signal.h>
 19#include <linux/errno.h>
 20#include <linux/wait.h>
 21#include <linux/ptrace.h>
 22#include <linux/unistd.h>
 23#include <linux/stddef.h>
 24#include <linux/tty.h>
 25#include <linux/personality.h>
 26#include <linux/binfmts.h>
 
 
 27#include <asm/ucontext.h>
 28#include <asm/uaccess.h>
 29#include <asm/lowcore.h>
 30#include <asm/switch_to.h>
 31#include "compat_linux.h"
 32#include "compat_ptrace.h"
 33#include "entry.h"
 34
 35typedef struct 
 36{
 37	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 38	struct sigcontext32 sc;
 39	_sigregs32 sregs;
 40	int signo;
 41	__u32 gprs_high[NUM_GPRS];
 42	__u8 retcode[S390_SYSCALL_SIZE];
 43} sigframe32;
 44
 45typedef struct 
 46{
 47	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 48	__u8 retcode[S390_SYSCALL_SIZE];
 49	compat_siginfo_t info;
 50	struct ucontext32 uc;
 51	__u32 gprs_high[NUM_GPRS];
 52} rt_sigframe32;
 53
 54int copy_siginfo_to_user32(compat_siginfo_t __user *to, siginfo_t *from)
 
 55{
 56	int err;
 57
 58	if (!access_ok (VERIFY_WRITE, to, sizeof(compat_siginfo_t)))
 59		return -EFAULT;
 60
 61	/* If you change siginfo_t structure, please be sure
 62	   this code is fixed accordingly.
 63	   It should never copy any pad contained in the structure
 64	   to avoid security leaks, but must copy the generic
 65	   3 ints plus the relevant union member.  
 66	   This routine must convert siginfo from 64bit to 32bit as well
 67	   at the same time.  */
 68	err = __put_user(from->si_signo, &to->si_signo);
 69	err |= __put_user(from->si_errno, &to->si_errno);
 70	err |= __put_user((short)from->si_code, &to->si_code);
 71	if (from->si_code < 0)
 72		err |= __copy_to_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE);
 73	else {
 74		switch (from->si_code >> 16) {
 75		case __SI_RT >> 16: /* This is not generated by the kernel as of now.  */
 76		case __SI_MESGQ >> 16:
 77			err |= __put_user(from->si_int, &to->si_int);
 78			/* fallthrough */
 79		case __SI_KILL >> 16:
 80			err |= __put_user(from->si_pid, &to->si_pid);
 81			err |= __put_user(from->si_uid, &to->si_uid);
 82			break;
 83		case __SI_CHLD >> 16:
 84			err |= __put_user(from->si_pid, &to->si_pid);
 85			err |= __put_user(from->si_uid, &to->si_uid);
 86			err |= __put_user(from->si_utime, &to->si_utime);
 87			err |= __put_user(from->si_stime, &to->si_stime);
 88			err |= __put_user(from->si_status, &to->si_status);
 89			break;
 90		case __SI_FAULT >> 16:
 91			err |= __put_user((unsigned long) from->si_addr,
 92					  &to->si_addr);
 93			break;
 94		case __SI_POLL >> 16:
 95			err |= __put_user(from->si_band, &to->si_band);
 96			err |= __put_user(from->si_fd, &to->si_fd);
 97			break;
 98		case __SI_TIMER >> 16:
 99			err |= __put_user(from->si_tid, &to->si_tid);
100			err |= __put_user(from->si_overrun, &to->si_overrun);
101			err |= __put_user(from->si_int, &to->si_int);
102			break;
103		default:
104			break;
105		}
106	}
107	return err;
108}
109
110int copy_siginfo_from_user32(siginfo_t *to, compat_siginfo_t __user *from)
 
111{
112	int err;
113	u32 tmp;
114
115	if (!access_ok (VERIFY_READ, from, sizeof(compat_siginfo_t)))
116		return -EFAULT;
117
118	err = __get_user(to->si_signo, &from->si_signo);
119	err |= __get_user(to->si_errno, &from->si_errno);
120	err |= __get_user(to->si_code, &from->si_code);
121
122	if (to->si_code < 0)
123		err |= __copy_from_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE);
124	else {
125		switch (to->si_code >> 16) {
126		case __SI_RT >> 16: /* This is not generated by the kernel as of now.  */
127		case __SI_MESGQ >> 16:
128			err |= __get_user(to->si_int, &from->si_int);
129			/* fallthrough */
130		case __SI_KILL >> 16:
131			err |= __get_user(to->si_pid, &from->si_pid);
132			err |= __get_user(to->si_uid, &from->si_uid);
133			break;
134		case __SI_CHLD >> 16:
135			err |= __get_user(to->si_pid, &from->si_pid);
136			err |= __get_user(to->si_uid, &from->si_uid);
137			err |= __get_user(to->si_utime, &from->si_utime);
138			err |= __get_user(to->si_stime, &from->si_stime);
139			err |= __get_user(to->si_status, &from->si_status);
140			break;
141		case __SI_FAULT >> 16:
142			err |= __get_user(tmp, &from->si_addr);
143			to->si_addr = (void __force __user *)
144				(u64) (tmp & PSW32_ADDR_INSN);
145			break;
146		case __SI_POLL >> 16:
147			err |= __get_user(to->si_band, &from->si_band);
148			err |= __get_user(to->si_fd, &from->si_fd);
149			break;
150		case __SI_TIMER >> 16:
151			err |= __get_user(to->si_tid, &from->si_tid);
152			err |= __get_user(to->si_overrun, &from->si_overrun);
153			err |= __get_user(to->si_int, &from->si_int);
154			break;
155		default:
156			break;
157		}
158	}
159	return err;
160}
161
162asmlinkage long
163sys32_sigaction(int sig, const struct old_sigaction32 __user *act,
164		 struct old_sigaction32 __user *oact)
165{
166        struct k_sigaction new_ka, old_ka;
167	unsigned long sa_handler, sa_restorer;
168        int ret;
169
170        if (act) {
171		compat_old_sigset_t mask;
172		if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
173		    __get_user(sa_handler, &act->sa_handler) ||
174		    __get_user(sa_restorer, &act->sa_restorer) ||
175		    __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
176		    __get_user(mask, &act->sa_mask))
177			return -EFAULT;
178		new_ka.sa.sa_handler = (__sighandler_t) sa_handler;
179		new_ka.sa.sa_restorer = (void (*)(void)) sa_restorer;
180		siginitset(&new_ka.sa.sa_mask, mask);
181        }
182
183        ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
184
185	if (!ret && oact) {
186		sa_handler = (unsigned long) old_ka.sa.sa_handler;
187		sa_restorer = (unsigned long) old_ka.sa.sa_restorer;
188		if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
189		    __put_user(sa_handler, &oact->sa_handler) ||
190		    __put_user(sa_restorer, &oact->sa_restorer) ||
191		    __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
192		    __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
193			return -EFAULT;
194        }
195
196	return ret;
197}
198
199asmlinkage long
200sys32_rt_sigaction(int sig, const struct sigaction32 __user *act,
201	   struct sigaction32 __user *oact,  size_t sigsetsize)
202{
203	struct k_sigaction new_ka, old_ka;
204	unsigned long sa_handler;
205	int ret;
206	compat_sigset_t set32;
207
208	/* XXX: Don't preclude handling different sized sigset_t's.  */
209	if (sigsetsize != sizeof(compat_sigset_t))
210		return -EINVAL;
211
212	if (act) {
213		ret = get_user(sa_handler, &act->sa_handler);
214		ret |= __copy_from_user(&set32, &act->sa_mask,
215					sizeof(compat_sigset_t));
216		new_ka.sa.sa_mask.sig[0] =
217			set32.sig[0] | (((long)set32.sig[1]) << 32);
218		ret |= __get_user(new_ka.sa.sa_flags, &act->sa_flags);
219		
220		if (ret)
221			return -EFAULT;
222		new_ka.sa.sa_handler = (__sighandler_t) sa_handler;
223	}
224
225	ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
226
227	if (!ret && oact) {
228		set32.sig[1] = (old_ka.sa.sa_mask.sig[0] >> 32);
229		set32.sig[0] = old_ka.sa.sa_mask.sig[0];
230		ret = put_user((unsigned long)old_ka.sa.sa_handler, &oact->sa_handler);
231		ret |= __copy_to_user(&oact->sa_mask, &set32,
232				      sizeof(compat_sigset_t));
233		ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
234	}
235
236	return ret;
237}
238
239asmlinkage long
240sys32_sigaltstack(const stack_t32 __user *uss, stack_t32 __user *uoss)
241{
242	struct pt_regs *regs = task_pt_regs(current);
243	stack_t kss, koss;
244	unsigned long ss_sp;
245	int ret, err = 0;
246	mm_segment_t old_fs = get_fs();
247
248	if (uss) {
249		if (!access_ok(VERIFY_READ, uss, sizeof(*uss)))
250			return -EFAULT;
251		err |= __get_user(ss_sp, &uss->ss_sp);
252		err |= __get_user(kss.ss_size, &uss->ss_size);
253		err |= __get_user(kss.ss_flags, &uss->ss_flags);
254		if (err)
255			return -EFAULT;
256		kss.ss_sp = (void __user *) ss_sp;
257	}
258
259	set_fs (KERNEL_DS);
260	ret = do_sigaltstack((stack_t __force __user *) (uss ? &kss : NULL),
261			     (stack_t __force __user *) (uoss ? &koss : NULL),
262			     regs->gprs[15]);
263	set_fs (old_fs);
264
265	if (!ret && uoss) {
266		if (!access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)))
267			return -EFAULT;
268		ss_sp = (unsigned long) koss.ss_sp;
269		err |= __put_user(ss_sp, &uoss->ss_sp);
270		err |= __put_user(koss.ss_size, &uoss->ss_size);
271		err |= __put_user(koss.ss_flags, &uoss->ss_flags);
272		if (err)
273			return -EFAULT;
274	}
275	return ret;
276}
277
278static int save_sigregs32(struct pt_regs *regs, _sigregs32 __user *sregs)
279{
280	_s390_regs_common32 regs32;
281	int err, i;
282
283	regs32.psw.mask = psw32_user_bits |
284		((__u32)(regs->psw.mask >> 32) & PSW32_MASK_USER);
285	regs32.psw.addr = (__u32) regs->psw.addr |
 
286		(__u32)(regs->psw.mask & PSW_MASK_BA);
287	for (i = 0; i < NUM_GPRS; i++)
288		regs32.gprs[i] = (__u32) regs->gprs[i];
289	save_access_regs(current->thread.acrs);
290	memcpy(regs32.acrs, current->thread.acrs, sizeof(regs32.acrs));
291	err = __copy_to_user(&sregs->regs, &regs32, sizeof(regs32));
292	if (err)
293		return err;
294	save_fp_regs(&current->thread.fp_regs);
295	/* s390_fp_regs and _s390_fp_regs32 are the same ! */
296	return __copy_to_user(&sregs->fpregs, &current->thread.fp_regs,
297			      sizeof(_s390_fp_regs32));
298}
299
300static int restore_sigregs32(struct pt_regs *regs,_sigregs32 __user *sregs)
301{
302	_s390_regs_common32 regs32;
303	int err, i;
 
 
 
 
 
 
304
305	/* Alwys make any pending restarted system call return -EINTR */
306	current_thread_info()->restart_block.fn = do_no_restart_syscall;
307
308	err = __copy_from_user(&regs32, &sregs->regs, sizeof(regs32));
309	if (err)
310		return err;
311	regs->psw.mask = (regs->psw.mask & ~PSW_MASK_USER) |
312		(__u64)(regs32.psw.mask & PSW32_MASK_USER) << 32 |
313		(__u64)(regs32.psw.addr & PSW32_ADDR_AMODE);
314	regs->psw.addr = (__u64)(regs32.psw.addr & PSW32_ADDR_INSN);
 
 
 
315	for (i = 0; i < NUM_GPRS; i++)
316		regs->gprs[i] = (__u64) regs32.gprs[i];
317	memcpy(current->thread.acrs, regs32.acrs, sizeof(current->thread.acrs));
318	restore_access_regs(current->thread.acrs);
319
320	err = __copy_from_user(&current->thread.fp_regs, &sregs->fpregs,
321			       sizeof(_s390_fp_regs32));
322	current->thread.fp_regs.fpc &= FPC_VALID_MASK;
323	if (err)
324		return err;
325
326	restore_fp_regs(&current->thread.fp_regs);
327	clear_thread_flag(TIF_SYSCALL);	/* No longer in a system call */
328	return 0;
329}
330
331static int save_sigregs_gprs_high(struct pt_regs *regs, __u32 __user *uregs)
 
332{
333	__u32 gprs_high[NUM_GPRS];
 
334	int i;
335
 
336	for (i = 0; i < NUM_GPRS; i++)
337		gprs_high[i] = regs->gprs[i] >> 32;
 
 
 
338
339	return __copy_to_user(uregs, &gprs_high, sizeof(gprs_high));
 
 
 
 
 
 
 
 
 
 
 
340}
341
342static int restore_sigregs_gprs_high(struct pt_regs *regs, __u32 __user *uregs)
 
343{
344	__u32 gprs_high[NUM_GPRS];
345	int err, i;
 
346
347	err = __copy_from_user(&gprs_high, uregs, sizeof(gprs_high));
348	if (err)
349		return err;
 
350	for (i = 0; i < NUM_GPRS; i++)
351		*(__u32 *)&regs->gprs[i] = gprs_high[i];
 
 
 
 
 
 
 
 
 
 
 
 
352	return 0;
353}
354
355asmlinkage long sys32_sigreturn(void)
356{
357	struct pt_regs *regs = task_pt_regs(current);
358	sigframe32 __user *frame = (sigframe32 __user *)regs->gprs[15];
359	sigset_t set;
360
361	if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
362		goto badframe;
363	if (__copy_from_user(&set.sig, &frame->sc.oldmask, _SIGMASK_COPY_SIZE32))
364		goto badframe;
365	set_current_blocked(&set);
 
366	if (restore_sigregs32(regs, &frame->sregs))
367		goto badframe;
368	if (restore_sigregs_gprs_high(regs, frame->gprs_high))
369		goto badframe;
 
370	return regs->gprs[2];
371badframe:
372	force_sig(SIGSEGV, current);
373	return 0;
374}
375
376asmlinkage long sys32_rt_sigreturn(void)
377{
378	struct pt_regs *regs = task_pt_regs(current);
379	rt_sigframe32 __user *frame = (rt_sigframe32 __user *)regs->gprs[15];
380	sigset_t set;
381	stack_t st;
382	__u32 ss_sp;
383	int err;
384	mm_segment_t old_fs = get_fs();
385
386	if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
387		goto badframe;
388	if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
 
389		goto badframe;
390	set_current_blocked(&set);
391	if (restore_sigregs32(regs, &frame->uc.uc_mcontext))
392		goto badframe;
393	if (restore_sigregs_gprs_high(regs, frame->gprs_high))
394		goto badframe;
395	err = __get_user(ss_sp, &frame->uc.uc_stack.ss_sp);
396	st.ss_sp = compat_ptr(ss_sp);
397	err |= __get_user(st.ss_size, &frame->uc.uc_stack.ss_size);
398	err |= __get_user(st.ss_flags, &frame->uc.uc_stack.ss_flags);
399	if (err)
400		goto badframe; 
401	set_fs (KERNEL_DS);
402	do_sigaltstack((stack_t __force __user *)&st, NULL, regs->gprs[15]);
403	set_fs (old_fs);
404	return regs->gprs[2];
405badframe:
406	force_sig(SIGSEGV, current);
407	return 0;
408}	
409
410/*
411 * Set up a signal frame.
412 */
413
414
415/*
416 * Determine which stack to use..
417 */
418static inline void __user *
419get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size)
420{
421	unsigned long sp;
422
423	/* Default to using normal stack */
424	sp = (unsigned long) A(regs->gprs[15]);
425
426	/* Overflow on alternate signal stack gives SIGSEGV. */
427	if (on_sig_stack(sp) && !on_sig_stack((sp - frame_size) & -8UL))
428		return (void __user *) -1UL;
429
430	/* This is the X/Open sanctioned signal stack switching.  */
431	if (ka->sa.sa_flags & SA_ONSTACK) {
432		if (! sas_ss_flags(sp))
433			sp = current->sas_ss_sp + current->sas_ss_size;
434	}
435
436	return (void __user *)((sp - frame_size) & -8ul);
437}
438
439static inline int map_signal(int sig)
 
440{
441	if (current_thread_info()->exec_domain
442	    && current_thread_info()->exec_domain->signal_invmap
443	    && sig < 32)
444		return current_thread_info()->exec_domain->signal_invmap[sig];
445        else
446		return sig;
447}
 
 
 
 
 
 
 
 
 
 
448
449static int setup_frame32(int sig, struct k_sigaction *ka,
450			sigset_t *set, struct pt_regs * regs)
451{
452	sigframe32 __user *frame = get_sigframe(ka, regs, sizeof(sigframe32));
453	if (!access_ok(VERIFY_WRITE, frame, sizeof(sigframe32)))
454		goto give_sigsegv;
455
456	if (frame == (void __user *) -1UL)
457		goto give_sigsegv;
 
 
 
 
458
459	if (__copy_to_user(&frame->sc.oldmask, &set->sig, _SIGMASK_COPY_SIZE32))
460		goto give_sigsegv;
461
 
462	if (save_sigregs32(regs, &frame->sregs))
463		goto give_sigsegv;
464	if (save_sigregs_gprs_high(regs, frame->gprs_high))
465		goto give_sigsegv;
466	if (__put_user((unsigned long) &frame->sregs, &frame->sc.sregs))
467		goto give_sigsegv;
 
 
 
 
468
469	/* Set up to return from userspace.  If provided, use a stub
470	   already in userspace.  */
471	if (ka->sa.sa_flags & SA_RESTORER) {
472		regs->gprs[14] = (__u64) ka->sa.sa_restorer | PSW32_ADDR_AMODE;
 
473	} else {
474		regs->gprs[14] = (__u64) frame->retcode | PSW32_ADDR_AMODE;
475		if (__put_user(S390_SYSCALL_OPCODE | __NR_sigreturn,
476			       (u16 __force __user *)(frame->retcode)))
477			goto give_sigsegv;
478        }
479
480	/* Set up backchain. */
481	if (__put_user(regs->gprs[15], (unsigned int __user *) frame))
482		goto give_sigsegv;
483
484	/* Set up registers for signal handler */
 
485	regs->gprs[15] = (__force __u64) frame;
486	regs->psw.mask |= PSW_MASK_BA;		/* force amode 31 */
487	regs->psw.addr = (__force __u64) ka->sa.sa_handler;
 
 
 
488
489	regs->gprs[2] = map_signal(sig);
490	regs->gprs[3] = (__force __u64) &frame->sc;
491
492	/* We forgot to include these in the sigcontext.
493	   To avoid breaking binary compatibility, they are passed as args. */
494	if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL ||
495	    sig == SIGTRAP || sig == SIGFPE) {
496		/* set extra registers only for synchronous signals */
497		regs->gprs[4] = regs->int_code & 127;
498		regs->gprs[5] = regs->int_parm_long;
 
499	}
500
501	/* Place signal number on stack to allow backtrace from handler.  */
502	if (__put_user(regs->gprs[2], (int __force __user *) &frame->signo))
503		goto give_sigsegv;
504	return 0;
505
506give_sigsegv:
507	force_sigsegv(sig, current);
508	return -EFAULT;
509}
510
511static int setup_rt_frame32(int sig, struct k_sigaction *ka, siginfo_t *info,
512			   sigset_t *set, struct pt_regs * regs)
513{
514	int err = 0;
515	rt_sigframe32 __user *frame = get_sigframe(ka, regs, sizeof(rt_sigframe32));
516	if (!access_ok(VERIFY_WRITE, frame, sizeof(rt_sigframe32)))
517		goto give_sigsegv;
518
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
519	if (frame == (void __user *) -1UL)
520		goto give_sigsegv;
521
522	if (copy_siginfo_to_user32(&frame->info, info))
523		goto give_sigsegv;
524
525	/* Create the ucontext.  */
526	err |= __put_user(UC_EXTENDED, &frame->uc.uc_flags);
527	err |= __put_user(0, &frame->uc.uc_link);
528	err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
529	err |= __put_user(sas_ss_flags(regs->gprs[15]),
530	                  &frame->uc.uc_stack.ss_flags);
531	err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
532	err |= save_sigregs32(regs, &frame->uc.uc_mcontext);
533	err |= save_sigregs_gprs_high(regs, frame->gprs_high);
534	err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
535	if (err)
536		goto give_sigsegv;
537
538	/* Set up to return from userspace.  If provided, use a stub
539	   already in userspace.  */
540	if (ka->sa.sa_flags & SA_RESTORER) {
541		regs->gprs[14] = (__u64) ka->sa.sa_restorer | PSW32_ADDR_AMODE;
 
542	} else {
543		regs->gprs[14] = (__u64) frame->retcode | PSW32_ADDR_AMODE;
544		err |= __put_user(S390_SYSCALL_OPCODE | __NR_rt_sigreturn,
545				  (u16 __force __user *)(frame->retcode));
546	}
547
548	/* Set up backchain. */
549	if (__put_user(regs->gprs[15], (unsigned int __force __user *) frame))
550		goto give_sigsegv;
 
 
 
 
 
 
 
 
 
 
 
 
551
552	/* Set up registers for signal handler */
 
553	regs->gprs[15] = (__force __u64) frame;
554	regs->psw.mask |= PSW_MASK_BA;		/* force amode 31 */
555	regs->psw.addr = (__u64) ka->sa.sa_handler;
 
 
 
556
557	regs->gprs[2] = map_signal(sig);
558	regs->gprs[3] = (__force __u64) &frame->info;
559	regs->gprs[4] = (__force __u64) &frame->uc;
 
560	return 0;
561
562give_sigsegv:
563	force_sigsegv(sig, current);
564	return -EFAULT;
565}
566
567/*
568 * OK, we're invoking a handler
569 */	
570
571void handle_signal32(unsigned long sig, struct k_sigaction *ka,
572		    siginfo_t *info, sigset_t *oldset, struct pt_regs *regs)
573{
574	int ret;
575
576	/* Set up the stack frame */
577	if (ka->sa.sa_flags & SA_SIGINFO)
578		ret = setup_rt_frame32(sig, ka, info, oldset, regs);
579	else
580		ret = setup_frame32(sig, ka, oldset, regs);
581	if (ret)
582		return;
583	signal_delivered(sig, info, ka, regs,
584				 test_thread_flag(TIF_SINGLE_STEP));
585}
586