Linux Audio

Check our new training course

Loading...
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 *    Copyright IBM Corp. 2000, 2006
 
 
  4 *    Author(s): Denis Joseph Barrow (djbarrow@de.ibm.com,barrow_dj@yahoo.com)
  5 *               Gerhard Tonn (ton@de.ibm.com)                  
  6 *
  7 *  Copyright (C) 1991, 1992  Linus Torvalds
  8 *
  9 *  1997-11-28  Modified for POSIX.1b signals by Richard Henderson
 10 */
 11
 12#include <linux/compat.h>
 13#include <linux/sched.h>
 14#include <linux/sched/task_stack.h>
 15#include <linux/mm.h>
 16#include <linux/smp.h>
 17#include <linux/kernel.h>
 18#include <linux/signal.h>
 19#include <linux/errno.h>
 20#include <linux/wait.h>
 21#include <linux/ptrace.h>
 22#include <linux/unistd.h>
 23#include <linux/stddef.h>
 24#include <linux/tty.h>
 25#include <linux/personality.h>
 26#include <linux/binfmts.h>
 27#include <asm/ucontext.h>
 28#include <linux/uaccess.h>
 29#include <asm/lowcore.h>
 30#include <asm/switch_to.h>
 31#include <asm/vdso.h>
 32#include <asm/fpu/api.h>
 33#include "compat_linux.h"
 34#include "compat_ptrace.h"
 35#include "entry.h"
 36
 
 
 37typedef struct 
 38{
 39	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 40	struct sigcontext32 sc;
 41	_sigregs32 sregs;
 42	int signo;
 43	_sigregs_ext32 sregs_ext;
 44	__u16 svc_insn;		/* Offset of svc_insn is NOT fixed! */
 45} sigframe32;
 46
 47typedef struct 
 48{
 49	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 50	__u16 svc_insn;
 51	compat_siginfo_t info;
 52	struct ucontext32 uc;
 
 53} rt_sigframe32;
 54
 55/* Store registers needed to create the signal frame */
 56static void store_sigregs(void)
 57{
 58	save_access_regs(current->thread.acrs);
 59	save_fpu_regs();
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 60}
 61
 62/* Load registers after signal return */
 63static void load_sigregs(void)
 64{
 65	restore_access_regs(current->thread.acrs);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 66}
 67
 68static int save_sigregs32(struct pt_regs *regs, _sigregs32 __user *sregs)
 69{
 70	_sigregs32 user_sregs;
 71	int i;
 72
 73	user_sregs.regs.psw.mask = (__u32)(regs->psw.mask >> 32);
 74	user_sregs.regs.psw.mask &= PSW32_MASK_USER | PSW32_MASK_RI;
 75	user_sregs.regs.psw.mask |= PSW32_USER_BITS;
 76	user_sregs.regs.psw.addr = (__u32) regs->psw.addr |
 77		(__u32)(regs->psw.mask & PSW_MASK_BA);
 78	for (i = 0; i < NUM_GPRS; i++)
 79		user_sregs.regs.gprs[i] = (__u32) regs->gprs[i];
 80	memcpy(&user_sregs.regs.acrs, current->thread.acrs,
 81	       sizeof(user_sregs.regs.acrs));
 82	fpregs_store((_s390_fp_regs *) &user_sregs.fpregs, &current->thread.fpu);
 83	if (__copy_to_user(sregs, &user_sregs, sizeof(_sigregs32)))
 84		return -EFAULT;
 85	return 0;
 
 
 
 86}
 87
 88static int restore_sigregs32(struct pt_regs *regs,_sigregs32 __user *sregs)
 89{
 90	_sigregs32 user_sregs;
 91	int i;
 92
 93	/* Always make any pending restarted system call return -EINTR */
 94	current->restart_block.fn = do_no_restart_syscall;
 95
 96	if (__copy_from_user(&user_sregs, &sregs->regs, sizeof(user_sregs)))
 97		return -EFAULT;
 98
 99	if (!is_ri_task(current) && (user_sregs.regs.psw.mask & PSW32_MASK_RI))
100		return -EINVAL;
101
102	/* Use regs->psw.mask instead of PSW_USER_BITS to preserve PER bit. */
103	regs->psw.mask = (regs->psw.mask & ~(PSW_MASK_USER | PSW_MASK_RI)) |
104		(__u64)(user_sregs.regs.psw.mask & PSW32_MASK_USER) << 32 |
105		(__u64)(user_sregs.regs.psw.mask & PSW32_MASK_RI) << 32 |
106		(__u64)(user_sregs.regs.psw.addr & PSW32_ADDR_AMODE);
107	/* Check for invalid user address space control. */
108	if ((regs->psw.mask & PSW_MASK_ASC) == PSW_ASC_HOME)
109		regs->psw.mask = PSW_ASC_PRIMARY |
110			(regs->psw.mask & ~PSW_MASK_ASC);
111	regs->psw.addr = (__u64)(user_sregs.regs.psw.addr & PSW32_ADDR_INSN);
112	for (i = 0; i < NUM_GPRS; i++)
113		regs->gprs[i] = (__u64) user_sregs.regs.gprs[i];
114	memcpy(&current->thread.acrs, &user_sregs.regs.acrs,
115	       sizeof(current->thread.acrs));
116	fpregs_load((_s390_fp_regs *) &user_sregs.fpregs, &current->thread.fpu);
117
118	clear_pt_regs_flag(regs, PIF_SYSCALL); /* No longer in a system call */
 
 
 
 
 
 
 
119	return 0;
120}
121
122static int save_sigregs_ext32(struct pt_regs *regs,
123			      _sigregs_ext32 __user *sregs_ext)
124{
125	__u32 gprs_high[NUM_GPRS];
126	__u64 vxrs[__NUM_VXRS_LOW];
127	int i;
128
129	/* Save high gprs to signal stack */
130	for (i = 0; i < NUM_GPRS; i++)
131		gprs_high[i] = regs->gprs[i] >> 32;
132	if (__copy_to_user(&sregs_ext->gprs_high, &gprs_high,
133			   sizeof(sregs_ext->gprs_high)))
134		return -EFAULT;
135
136	/* Save vector registers to signal stack */
137	if (cpu_has_vx()) {
138		for (i = 0; i < __NUM_VXRS_LOW; i++)
139			vxrs[i] = current->thread.fpu.vxrs[i].low;
140		if (__copy_to_user(&sregs_ext->vxrs_low, vxrs,
141				   sizeof(sregs_ext->vxrs_low)) ||
142		    __copy_to_user(&sregs_ext->vxrs_high,
143				   current->thread.fpu.vxrs + __NUM_VXRS_LOW,
144				   sizeof(sregs_ext->vxrs_high)))
145			return -EFAULT;
146	}
147	return 0;
148}
149
150static int restore_sigregs_ext32(struct pt_regs *regs,
151				 _sigregs_ext32 __user *sregs_ext)
152{
153	__u32 gprs_high[NUM_GPRS];
154	__u64 vxrs[__NUM_VXRS_LOW];
155	int i;
156
157	/* Restore high gprs from signal stack */
158	if (__copy_from_user(&gprs_high, &sregs_ext->gprs_high,
159			     sizeof(sregs_ext->gprs_high)))
160		return -EFAULT;
161	for (i = 0; i < NUM_GPRS; i++)
162		*(__u32 *)&regs->gprs[i] = gprs_high[i];
163
164	/* Restore vector registers from signal stack */
165	if (cpu_has_vx()) {
166		if (__copy_from_user(vxrs, &sregs_ext->vxrs_low,
167				     sizeof(sregs_ext->vxrs_low)) ||
168		    __copy_from_user(current->thread.fpu.vxrs + __NUM_VXRS_LOW,
169				     &sregs_ext->vxrs_high,
170				     sizeof(sregs_ext->vxrs_high)))
171			return -EFAULT;
172		for (i = 0; i < __NUM_VXRS_LOW; i++)
173			current->thread.fpu.vxrs[i].low = vxrs[i];
174	}
175	return 0;
176}
177
178COMPAT_SYSCALL_DEFINE0(sigreturn)
179{
180	struct pt_regs *regs = task_pt_regs(current);
181	sigframe32 __user *frame = (sigframe32 __user *)regs->gprs[15];
182	sigset_t set;
183
184	if (get_compat_sigset(&set, (compat_sigset_t __user *)frame->sc.oldmask))
 
 
185		goto badframe;
 
186	set_current_blocked(&set);
187	save_fpu_regs();
188	if (restore_sigregs32(regs, &frame->sregs))
189		goto badframe;
190	if (restore_sigregs_ext32(regs, &frame->sregs_ext))
191		goto badframe;
192	load_sigregs();
193	return regs->gprs[2];
194badframe:
195	force_sig(SIGSEGV);
196	return 0;
197}
198
199COMPAT_SYSCALL_DEFINE0(rt_sigreturn)
200{
201	struct pt_regs *regs = task_pt_regs(current);
202	rt_sigframe32 __user *frame = (rt_sigframe32 __user *)regs->gprs[15];
203	sigset_t set;
 
 
 
 
204
205	if (get_compat_sigset(&set, &frame->uc.uc_sigmask))
206		goto badframe;
207	set_current_blocked(&set);
208	if (compat_restore_altstack(&frame->uc.uc_stack))
209		goto badframe;
210	save_fpu_regs();
 
211	if (restore_sigregs32(regs, &frame->uc.uc_mcontext))
212		goto badframe;
213	if (restore_sigregs_ext32(regs, &frame->uc.uc_mcontext_ext))
214		goto badframe;
215	load_sigregs();
 
 
 
 
 
 
 
 
216	return regs->gprs[2];
217badframe:
218	force_sig(SIGSEGV);
219	return 0;
220}	
221
222/*
223 * Set up a signal frame.
224 */
225
226
227/*
228 * Determine which stack to use..
229 */
230static inline void __user *
231get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size)
232{
233	unsigned long sp;
234
235	/* Default to using normal stack */
236	sp = (unsigned long) A(regs->gprs[15]);
237
238	/* Overflow on alternate signal stack gives SIGSEGV. */
239	if (on_sig_stack(sp) && !on_sig_stack((sp - frame_size) & -8UL))
240		return (void __user *) -1UL;
241
242	/* This is the X/Open sanctioned signal stack switching.  */
243	if (ka->sa.sa_flags & SA_ONSTACK) {
244		if (! sas_ss_flags(sp))
245			sp = current->sas_ss_sp + current->sas_ss_size;
246	}
247
 
 
 
 
 
 
 
248	return (void __user *)((sp - frame_size) & -8ul);
249}
250
251static int setup_frame32(struct ksignal *ksig, sigset_t *set,
252			 struct pt_regs *regs)
253{
254	int sig = ksig->sig;
255	sigframe32 __user *frame;
256	unsigned long restorer;
257	size_t frame_size;
258
259	/*
260	 * gprs_high are always present for 31-bit compat tasks.
261	 * The space for vector registers is only allocated if
262	 * the machine supports it
263	 */
264	frame_size = sizeof(*frame) - sizeof(frame->sregs_ext.__reserved);
265	if (!cpu_has_vx())
266		frame_size -= sizeof(frame->sregs_ext.vxrs_low) +
267			      sizeof(frame->sregs_ext.vxrs_high);
268	frame = get_sigframe(&ksig->ka, regs, frame_size);
269	if (frame == (void __user *) -1UL)
270		return -EFAULT;
271
272	/* Set up backchain. */
273	if (__put_user(regs->gprs[15], (unsigned int __user *) frame))
274		return -EFAULT;
 
 
 
275
276	/* Create struct sigcontext32 on the signal stack */
277	if (put_compat_sigset((compat_sigset_t __user *)frame->sc.oldmask,
278			      set, sizeof(compat_sigset_t)))
279		return -EFAULT;
280	if (__put_user(ptr_to_compat(&frame->sregs), &frame->sc.sregs))
281		return -EFAULT;
282
283	/* Store registers needed to create the signal frame */
284	store_sigregs();
285
286	/* Create _sigregs32 on the signal stack */
287	if (save_sigregs32(regs, &frame->sregs))
288		return -EFAULT;
289
290	/* Place signal number on stack to allow backtrace from handler.  */
291	if (__put_user(regs->gprs[2], (int __force __user *) &frame->signo))
292		return -EFAULT;
293
294	/* Create _sigregs_ext32 on the signal stack */
295	if (save_sigregs_ext32(regs, &frame->sregs_ext))
296		return -EFAULT;
297
298	/* Set up to return from userspace.  If provided, use a stub
299	   already in userspace.  */
300	if (ksig->ka.sa.sa_flags & SA_RESTORER) {
301		restorer = (unsigned long __force)
302			ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE;
303	} else {
304		restorer = VDSO32_SYMBOL(current, sigreturn);
 
 
 
305        }
306
 
 
 
 
307	/* Set up registers for signal handler */
308	regs->gprs[14] = restorer;
309	regs->gprs[15] = (__force __u64) frame;
310	/* Force 31 bit amode and default user address space control. */
311	regs->psw.mask = PSW_MASK_BA |
312		(PSW_USER_BITS & PSW_MASK_ASC) |
313		(regs->psw.mask & ~PSW_MASK_ASC);
314	regs->psw.addr = (__force __u64) ksig->ka.sa.sa_handler;
315
316	regs->gprs[2] = sig;
317	regs->gprs[3] = (__force __u64) &frame->sc;
318
319	/* We forgot to include these in the sigcontext.
320	   To avoid breaking binary compatibility, they are passed as args. */
321	if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL ||
322	    sig == SIGTRAP || sig == SIGFPE) {
323		/* set extra registers only for synchronous signals */
324		regs->gprs[4] = regs->int_code & 127;
325		regs->gprs[5] = regs->int_parm_long;
326		regs->gprs[6] = current->thread.last_break;
327	}
328
 
 
 
329	return 0;
 
 
 
 
330}
331
332static int setup_rt_frame32(struct ksignal *ksig, sigset_t *set,
333			    struct pt_regs *regs)
334{
335	rt_sigframe32 __user *frame;
336	unsigned long restorer;
337	size_t frame_size;
338	u32 uc_flags;
339
340	frame_size = sizeof(*frame) -
341		     sizeof(frame->uc.uc_mcontext_ext.__reserved);
342	/*
343	 * gprs_high are always present for 31-bit compat tasks.
344	 * The space for vector registers is only allocated if
345	 * the machine supports it
346	 */
347	uc_flags = UC_GPRS_HIGH;
348	if (cpu_has_vx()) {
349		uc_flags |= UC_VXRS;
350	} else {
351		frame_size -= sizeof(frame->uc.uc_mcontext_ext.vxrs_low) +
352			      sizeof(frame->uc.uc_mcontext_ext.vxrs_high);
353	}
354	frame = get_sigframe(&ksig->ka, regs, frame_size);
355	if (frame == (void __user *) -1UL)
356		return -EFAULT;
357
358	/* Set up backchain. */
359	if (__put_user(regs->gprs[15], (unsigned int __force __user *) frame))
360		return -EFAULT;
 
 
 
 
 
 
 
 
 
 
 
 
361
362	/* Set up to return from userspace.  If provided, use a stub
363	   already in userspace.  */
364	if (ksig->ka.sa.sa_flags & SA_RESTORER) {
365		restorer = (unsigned long __force)
366			ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE;
367	} else {
368		restorer = VDSO32_SYMBOL(current, rt_sigreturn);
 
 
369	}
370
371	/* Create siginfo on the signal stack */
372	if (copy_siginfo_to_user32(&frame->info, &ksig->info))
373		return -EFAULT;
374
375	/* Store registers needed to create the signal frame */
376	store_sigregs();
377
378	/* Create ucontext on the signal stack. */
379	if (__put_user(uc_flags, &frame->uc.uc_flags) ||
380	    __put_user(0, &frame->uc.uc_link) ||
381	    __compat_save_altstack(&frame->uc.uc_stack, regs->gprs[15]) ||
382	    save_sigregs32(regs, &frame->uc.uc_mcontext) ||
383	    put_compat_sigset(&frame->uc.uc_sigmask, set, sizeof(compat_sigset_t)) ||
384	    save_sigregs_ext32(regs, &frame->uc.uc_mcontext_ext))
385		return -EFAULT;
386
387	/* Set up registers for signal handler */
388	regs->gprs[14] = restorer;
389	regs->gprs[15] = (__force __u64) frame;
390	/* Force 31 bit amode and default user address space control. */
391	regs->psw.mask = PSW_MASK_BA |
392		(PSW_USER_BITS & PSW_MASK_ASC) |
393		(regs->psw.mask & ~PSW_MASK_ASC);
394	regs->psw.addr = (__u64 __force) ksig->ka.sa.sa_handler;
395
396	regs->gprs[2] = ksig->sig;
397	regs->gprs[3] = (__force __u64) &frame->info;
398	regs->gprs[4] = (__force __u64) &frame->uc;
399	regs->gprs[5] = current->thread.last_break;
400	return 0;
 
 
 
 
401}
402
403/*
404 * OK, we're invoking a handler
405 */	
406
407void handle_signal32(struct ksignal *ksig, sigset_t *oldset,
408		     struct pt_regs *regs)
409{
 
410	int ret;
411
412	/* Set up the stack frame */
413	if (ksig->ka.sa.sa_flags & SA_SIGINFO)
414		ret = setup_rt_frame32(ksig, oldset, regs);
415	else
416		ret = setup_frame32(ksig, oldset, regs);
417
418	signal_setup_done(ret, ksig, test_thread_flag(TIF_SINGLE_STEP));
 
 
 
 
 
419}
420
v3.1
 
  1/*
  2 *  arch/s390/kernel/compat_signal.c
  3 *
  4 *    Copyright (C) IBM Corp. 2000,2006
  5 *    Author(s): Denis Joseph Barrow (djbarrow@de.ibm.com,barrow_dj@yahoo.com)
  6 *               Gerhard Tonn (ton@de.ibm.com)                  
  7 *
  8 *  Copyright (C) 1991, 1992  Linus Torvalds
  9 *
 10 *  1997-11-28  Modified for POSIX.1b signals by Richard Henderson
 11 */
 12
 13#include <linux/compat.h>
 14#include <linux/sched.h>
 
 15#include <linux/mm.h>
 16#include <linux/smp.h>
 17#include <linux/kernel.h>
 18#include <linux/signal.h>
 19#include <linux/errno.h>
 20#include <linux/wait.h>
 21#include <linux/ptrace.h>
 22#include <linux/unistd.h>
 23#include <linux/stddef.h>
 24#include <linux/tty.h>
 25#include <linux/personality.h>
 26#include <linux/binfmts.h>
 27#include <asm/ucontext.h>
 28#include <asm/uaccess.h>
 29#include <asm/lowcore.h>
 
 
 
 30#include "compat_linux.h"
 31#include "compat_ptrace.h"
 32#include "entry.h"
 33
 34#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
 35
 36typedef struct 
 37{
 38	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 39	struct sigcontext32 sc;
 40	_sigregs32 sregs;
 41	int signo;
 42	__u32 gprs_high[NUM_GPRS];
 43	__u8 retcode[S390_SYSCALL_SIZE];
 44} sigframe32;
 45
 46typedef struct 
 47{
 48	__u8 callee_used_stack[__SIGNAL_FRAMESIZE32];
 49	__u8 retcode[S390_SYSCALL_SIZE];
 50	compat_siginfo_t info;
 51	struct ucontext32 uc;
 52	__u32 gprs_high[NUM_GPRS];
 53} rt_sigframe32;
 54
 55int copy_siginfo_to_user32(compat_siginfo_t __user *to, siginfo_t *from)
 
 56{
 57	int err;
 58
 59	if (!access_ok (VERIFY_WRITE, to, sizeof(compat_siginfo_t)))
 60		return -EFAULT;
 61
 62	/* If you change siginfo_t structure, please be sure
 63	   this code is fixed accordingly.
 64	   It should never copy any pad contained in the structure
 65	   to avoid security leaks, but must copy the generic
 66	   3 ints plus the relevant union member.  
 67	   This routine must convert siginfo from 64bit to 32bit as well
 68	   at the same time.  */
 69	err = __put_user(from->si_signo, &to->si_signo);
 70	err |= __put_user(from->si_errno, &to->si_errno);
 71	err |= __put_user((short)from->si_code, &to->si_code);
 72	if (from->si_code < 0)
 73		err |= __copy_to_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE);
 74	else {
 75		switch (from->si_code >> 16) {
 76		case __SI_RT >> 16: /* This is not generated by the kernel as of now.  */
 77		case __SI_MESGQ >> 16:
 78			err |= __put_user(from->si_int, &to->si_int);
 79			/* fallthrough */
 80		case __SI_KILL >> 16:
 81			err |= __put_user(from->si_pid, &to->si_pid);
 82			err |= __put_user(from->si_uid, &to->si_uid);
 83			break;
 84		case __SI_CHLD >> 16:
 85			err |= __put_user(from->si_pid, &to->si_pid);
 86			err |= __put_user(from->si_uid, &to->si_uid);
 87			err |= __put_user(from->si_utime, &to->si_utime);
 88			err |= __put_user(from->si_stime, &to->si_stime);
 89			err |= __put_user(from->si_status, &to->si_status);
 90			break;
 91		case __SI_FAULT >> 16:
 92			err |= __put_user((unsigned long) from->si_addr,
 93					  &to->si_addr);
 94			break;
 95		case __SI_POLL >> 16:
 96			err |= __put_user(from->si_band, &to->si_band);
 97			err |= __put_user(from->si_fd, &to->si_fd);
 98			break;
 99		case __SI_TIMER >> 16:
100			err |= __put_user(from->si_tid, &to->si_tid);
101			err |= __put_user(from->si_overrun, &to->si_overrun);
102			err |= __put_user(from->si_int, &to->si_int);
103			break;
104		default:
105			break;
106		}
107	}
108	return err;
109}
110
111int copy_siginfo_from_user32(siginfo_t *to, compat_siginfo_t __user *from)
 
112{
113	int err;
114	u32 tmp;
115
116	if (!access_ok (VERIFY_READ, from, sizeof(compat_siginfo_t)))
117		return -EFAULT;
118
119	err = __get_user(to->si_signo, &from->si_signo);
120	err |= __get_user(to->si_errno, &from->si_errno);
121	err |= __get_user(to->si_code, &from->si_code);
122
123	if (to->si_code < 0)
124		err |= __copy_from_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE);
125	else {
126		switch (to->si_code >> 16) {
127		case __SI_RT >> 16: /* This is not generated by the kernel as of now.  */
128		case __SI_MESGQ >> 16:
129			err |= __get_user(to->si_int, &from->si_int);
130			/* fallthrough */
131		case __SI_KILL >> 16:
132			err |= __get_user(to->si_pid, &from->si_pid);
133			err |= __get_user(to->si_uid, &from->si_uid);
134			break;
135		case __SI_CHLD >> 16:
136			err |= __get_user(to->si_pid, &from->si_pid);
137			err |= __get_user(to->si_uid, &from->si_uid);
138			err |= __get_user(to->si_utime, &from->si_utime);
139			err |= __get_user(to->si_stime, &from->si_stime);
140			err |= __get_user(to->si_status, &from->si_status);
141			break;
142		case __SI_FAULT >> 16:
143			err |= __get_user(tmp, &from->si_addr);
144			to->si_addr = (void __user *)(u64) (tmp & PSW32_ADDR_INSN);
145			break;
146		case __SI_POLL >> 16:
147			err |= __get_user(to->si_band, &from->si_band);
148			err |= __get_user(to->si_fd, &from->si_fd);
149			break;
150		case __SI_TIMER >> 16:
151			err |= __get_user(to->si_tid, &from->si_tid);
152			err |= __get_user(to->si_overrun, &from->si_overrun);
153			err |= __get_user(to->si_int, &from->si_int);
154			break;
155		default:
156			break;
157		}
158	}
159	return err;
160}
161
162asmlinkage long
163sys32_sigaction(int sig, const struct old_sigaction32 __user *act,
164		 struct old_sigaction32 __user *oact)
165{
166        struct k_sigaction new_ka, old_ka;
167	unsigned long sa_handler, sa_restorer;
168        int ret;
169
170        if (act) {
171		compat_old_sigset_t mask;
172		if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
173		    __get_user(sa_handler, &act->sa_handler) ||
174		    __get_user(sa_restorer, &act->sa_restorer) ||
175		    __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
176		    __get_user(mask, &act->sa_mask))
177			return -EFAULT;
178		new_ka.sa.sa_handler = (__sighandler_t) sa_handler;
179		new_ka.sa.sa_restorer = (void (*)(void)) sa_restorer;
180		siginitset(&new_ka.sa.sa_mask, mask);
181        }
182
183        ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
184
185	if (!ret && oact) {
186		sa_handler = (unsigned long) old_ka.sa.sa_handler;
187		sa_restorer = (unsigned long) old_ka.sa.sa_restorer;
188		if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
189		    __put_user(sa_handler, &oact->sa_handler) ||
190		    __put_user(sa_restorer, &oact->sa_restorer) ||
191		    __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
192		    __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
193			return -EFAULT;
194        }
195
196	return ret;
197}
198
199asmlinkage long
200sys32_rt_sigaction(int sig, const struct sigaction32 __user *act,
201	   struct sigaction32 __user *oact,  size_t sigsetsize)
202{
203	struct k_sigaction new_ka, old_ka;
204	unsigned long sa_handler;
205	int ret;
206	compat_sigset_t set32;
207
208	/* XXX: Don't preclude handling different sized sigset_t's.  */
209	if (sigsetsize != sizeof(compat_sigset_t))
210		return -EINVAL;
211
212	if (act) {
213		ret = get_user(sa_handler, &act->sa_handler);
214		ret |= __copy_from_user(&set32, &act->sa_mask,
215					sizeof(compat_sigset_t));
216		switch (_NSIG_WORDS) {
217		case 4: new_ka.sa.sa_mask.sig[3] = set32.sig[6]
218				| (((long)set32.sig[7]) << 32);
219		case 3: new_ka.sa.sa_mask.sig[2] = set32.sig[4]
220				| (((long)set32.sig[5]) << 32);
221		case 2: new_ka.sa.sa_mask.sig[1] = set32.sig[2]
222				| (((long)set32.sig[3]) << 32);
223		case 1: new_ka.sa.sa_mask.sig[0] = set32.sig[0]
224				| (((long)set32.sig[1]) << 32);
225		}
226		ret |= __get_user(new_ka.sa.sa_flags, &act->sa_flags);
227		
228		if (ret)
229			return -EFAULT;
230		new_ka.sa.sa_handler = (__sighandler_t) sa_handler;
231	}
232
233	ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
234
235	if (!ret && oact) {
236		switch (_NSIG_WORDS) {
237		case 4:
238			set32.sig[7] = (old_ka.sa.sa_mask.sig[3] >> 32);
239			set32.sig[6] = old_ka.sa.sa_mask.sig[3];
240		case 3:
241			set32.sig[5] = (old_ka.sa.sa_mask.sig[2] >> 32);
242			set32.sig[4] = old_ka.sa.sa_mask.sig[2];
243		case 2:
244			set32.sig[3] = (old_ka.sa.sa_mask.sig[1] >> 32);
245			set32.sig[2] = old_ka.sa.sa_mask.sig[1];
246		case 1:
247			set32.sig[1] = (old_ka.sa.sa_mask.sig[0] >> 32);
248			set32.sig[0] = old_ka.sa.sa_mask.sig[0];
249		}
250		ret = put_user((unsigned long)old_ka.sa.sa_handler, &oact->sa_handler);
251		ret |= __copy_to_user(&oact->sa_mask, &set32,
252				      sizeof(compat_sigset_t));
253		ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
254	}
255
256	return ret;
257}
258
259asmlinkage long
260sys32_sigaltstack(const stack_t32 __user *uss, stack_t32 __user *uoss)
261{
262	struct pt_regs *regs = task_pt_regs(current);
263	stack_t kss, koss;
264	unsigned long ss_sp;
265	int ret, err = 0;
266	mm_segment_t old_fs = get_fs();
267
268	if (uss) {
269		if (!access_ok(VERIFY_READ, uss, sizeof(*uss)))
270			return -EFAULT;
271		err |= __get_user(ss_sp, &uss->ss_sp);
272		err |= __get_user(kss.ss_size, &uss->ss_size);
273		err |= __get_user(kss.ss_flags, &uss->ss_flags);
274		if (err)
275			return -EFAULT;
276		kss.ss_sp = (void __user *) ss_sp;
277	}
278
279	set_fs (KERNEL_DS);
280	ret = do_sigaltstack((stack_t __force __user *) (uss ? &kss : NULL),
281			     (stack_t __force __user *) (uoss ? &koss : NULL),
282			     regs->gprs[15]);
283	set_fs (old_fs);
284
285	if (!ret && uoss) {
286		if (!access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)))
287			return -EFAULT;
288		ss_sp = (unsigned long) koss.ss_sp;
289		err |= __put_user(ss_sp, &uoss->ss_sp);
290		err |= __put_user(koss.ss_size, &uoss->ss_size);
291		err |= __put_user(koss.ss_flags, &uoss->ss_flags);
292		if (err)
293			return -EFAULT;
294	}
295	return ret;
296}
297
298static int save_sigregs32(struct pt_regs *regs, _sigregs32 __user *sregs)
299{
300	_s390_regs_common32 regs32;
301	int err, i;
302
303	regs32.psw.mask = PSW32_MASK_MERGE(psw32_user_bits,
304					   (__u32)(regs->psw.mask >> 32));
305	regs32.psw.addr = PSW32_ADDR_AMODE31 | (__u32) regs->psw.addr;
 
 
306	for (i = 0; i < NUM_GPRS; i++)
307		regs32.gprs[i] = (__u32) regs->gprs[i];
308	save_access_regs(current->thread.acrs);
309	memcpy(regs32.acrs, current->thread.acrs, sizeof(regs32.acrs));
310	err = __copy_to_user(&sregs->regs, &regs32, sizeof(regs32));
311	if (err)
312		return err;
313	save_fp_regs(&current->thread.fp_regs);
314	/* s390_fp_regs and _s390_fp_regs32 are the same ! */
315	return __copy_to_user(&sregs->fpregs, &current->thread.fp_regs,
316			      sizeof(_s390_fp_regs32));
317}
318
319static int restore_sigregs32(struct pt_regs *regs,_sigregs32 __user *sregs)
320{
321	_s390_regs_common32 regs32;
322	int err, i;
323
324	/* Alwys make any pending restarted system call return -EINTR */
325	current_thread_info()->restart_block.fn = do_no_restart_syscall;
326
327	err = __copy_from_user(&regs32, &sregs->regs, sizeof(regs32));
328	if (err)
329		return err;
330	regs->psw.mask = PSW_MASK_MERGE(regs->psw.mask,
331				        (__u64)regs32.psw.mask << 32);
332	regs->psw.addr = (__u64)(regs32.psw.addr & PSW32_ADDR_INSN);
 
 
 
 
 
 
 
 
 
 
333	for (i = 0; i < NUM_GPRS; i++)
334		regs->gprs[i] = (__u64) regs32.gprs[i];
335	memcpy(current->thread.acrs, regs32.acrs, sizeof(current->thread.acrs));
336	restore_access_regs(current->thread.acrs);
 
337
338	err = __copy_from_user(&current->thread.fp_regs, &sregs->fpregs,
339			       sizeof(_s390_fp_regs32));
340	current->thread.fp_regs.fpc &= FPC_VALID_MASK;
341	if (err)
342		return err;
343
344	restore_fp_regs(&current->thread.fp_regs);
345	regs->svcnr = 0;	/* disable syscall checks */
346	return 0;
347}
348
349static int save_sigregs_gprs_high(struct pt_regs *regs, __u32 __user *uregs)
 
350{
351	__u32 gprs_high[NUM_GPRS];
 
352	int i;
353
 
354	for (i = 0; i < NUM_GPRS; i++)
355		gprs_high[i] = regs->gprs[i] >> 32;
 
 
 
356
357	return __copy_to_user(uregs, &gprs_high, sizeof(gprs_high));
 
 
 
 
 
 
 
 
 
 
 
358}
359
360static int restore_sigregs_gprs_high(struct pt_regs *regs, __u32 __user *uregs)
 
361{
362	__u32 gprs_high[NUM_GPRS];
363	int err, i;
 
364
365	err = __copy_from_user(&gprs_high, uregs, sizeof(gprs_high));
366	if (err)
367		return err;
 
368	for (i = 0; i < NUM_GPRS; i++)
369		*(__u32 *)&regs->gprs[i] = gprs_high[i];
 
 
 
 
 
 
 
 
 
 
 
 
370	return 0;
371}
372
373asmlinkage long sys32_sigreturn(void)
374{
375	struct pt_regs *regs = task_pt_regs(current);
376	sigframe32 __user *frame = (sigframe32 __user *)regs->gprs[15];
377	sigset_t set;
378
379	if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
380		goto badframe;
381	if (__copy_from_user(&set.sig, &frame->sc.oldmask, _SIGMASK_COPY_SIZE32))
382		goto badframe;
383	sigdelsetmask(&set, ~_BLOCKABLE);
384	set_current_blocked(&set);
 
385	if (restore_sigregs32(regs, &frame->sregs))
386		goto badframe;
387	if (restore_sigregs_gprs_high(regs, frame->gprs_high))
388		goto badframe;
 
389	return regs->gprs[2];
390badframe:
391	force_sig(SIGSEGV, current);
392	return 0;
393}
394
395asmlinkage long sys32_rt_sigreturn(void)
396{
397	struct pt_regs *regs = task_pt_regs(current);
398	rt_sigframe32 __user *frame = (rt_sigframe32 __user *)regs->gprs[15];
399	sigset_t set;
400	stack_t st;
401	__u32 ss_sp;
402	int err;
403	mm_segment_t old_fs = get_fs();
404
405	if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
406		goto badframe;
407	if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
 
408		goto badframe;
409	sigdelsetmask(&set, ~_BLOCKABLE);
410	set_current_blocked(&set);
411	if (restore_sigregs32(regs, &frame->uc.uc_mcontext))
412		goto badframe;
413	if (restore_sigregs_gprs_high(regs, frame->gprs_high))
414		goto badframe;
415	err = __get_user(ss_sp, &frame->uc.uc_stack.ss_sp);
416	st.ss_sp = compat_ptr(ss_sp);
417	err |= __get_user(st.ss_size, &frame->uc.uc_stack.ss_size);
418	err |= __get_user(st.ss_flags, &frame->uc.uc_stack.ss_flags);
419	if (err)
420		goto badframe; 
421	set_fs (KERNEL_DS);
422	do_sigaltstack((stack_t __force __user *)&st, NULL, regs->gprs[15]);
423	set_fs (old_fs);
424	return regs->gprs[2];
425badframe:
426	force_sig(SIGSEGV, current);
427	return 0;
428}	
429
430/*
431 * Set up a signal frame.
432 */
433
434
435/*
436 * Determine which stack to use..
437 */
438static inline void __user *
439get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size)
440{
441	unsigned long sp;
442
443	/* Default to using normal stack */
444	sp = (unsigned long) A(regs->gprs[15]);
445
446	/* Overflow on alternate signal stack gives SIGSEGV. */
447	if (on_sig_stack(sp) && !on_sig_stack((sp - frame_size) & -8UL))
448		return (void __user *) -1UL;
449
450	/* This is the X/Open sanctioned signal stack switching.  */
451	if (ka->sa.sa_flags & SA_ONSTACK) {
452		if (! sas_ss_flags(sp))
453			sp = current->sas_ss_sp + current->sas_ss_size;
454	}
455
456	/* This is the legacy signal stack switching. */
457	else if (!user_mode(regs) &&
458		 !(ka->sa.sa_flags & SA_RESTORER) &&
459		 ka->sa.sa_restorer) {
460		sp = (unsigned long) ka->sa.sa_restorer;
461	}
462
463	return (void __user *)((sp - frame_size) & -8ul);
464}
465
466static inline int map_signal(int sig)
 
467{
468	if (current_thread_info()->exec_domain
469	    && current_thread_info()->exec_domain->signal_invmap
470	    && sig < 32)
471		return current_thread_info()->exec_domain->signal_invmap[sig];
472        else
473		return sig;
474}
 
 
 
 
 
 
 
 
 
 
475
476static int setup_frame32(int sig, struct k_sigaction *ka,
477			sigset_t *set, struct pt_regs * regs)
478{
479	sigframe32 __user *frame = get_sigframe(ka, regs, sizeof(sigframe32));
480	if (!access_ok(VERIFY_WRITE, frame, sizeof(sigframe32)))
481		goto give_sigsegv;
482
483	if (frame == (void __user *) -1UL)
484		goto give_sigsegv;
 
 
 
 
485
486	if (__copy_to_user(&frame->sc.oldmask, &set->sig, _SIGMASK_COPY_SIZE32))
487		goto give_sigsegv;
488
 
489	if (save_sigregs32(regs, &frame->sregs))
490		goto give_sigsegv;
491	if (save_sigregs_gprs_high(regs, frame->gprs_high))
492		goto give_sigsegv;
493	if (__put_user((unsigned long) &frame->sregs, &frame->sc.sregs))
494		goto give_sigsegv;
 
 
 
 
495
496	/* Set up to return from userspace.  If provided, use a stub
497	   already in userspace.  */
498	if (ka->sa.sa_flags & SA_RESTORER) {
499		regs->gprs[14] = (__u64) ka->sa.sa_restorer;
 
500	} else {
501		regs->gprs[14] = (__u64) frame->retcode;
502		if (__put_user(S390_SYSCALL_OPCODE | __NR_sigreturn,
503		               (u16 __user *)(frame->retcode)))
504			goto give_sigsegv;
505        }
506
507	/* Set up backchain. */
508	if (__put_user(regs->gprs[15], (unsigned int __user *) frame))
509		goto give_sigsegv;
510
511	/* Set up registers for signal handler */
512	regs->gprs[15] = (__u64) frame;
513	regs->psw.addr = (__u64) ka->sa.sa_handler;
 
 
 
 
 
514
515	regs->gprs[2] = map_signal(sig);
516	regs->gprs[3] = (__u64) &frame->sc;
517
518	/* We forgot to include these in the sigcontext.
519	   To avoid breaking binary compatibility, they are passed as args. */
520	regs->gprs[4] = current->thread.trap_no;
521	regs->gprs[5] = current->thread.prot_addr;
 
 
 
 
 
522
523	/* Place signal number on stack to allow backtrace from handler.  */
524	if (__put_user(regs->gprs[2], (int __user *) &frame->signo))
525		goto give_sigsegv;
526	return 0;
527
528give_sigsegv:
529	force_sigsegv(sig, current);
530	return -EFAULT;
531}
532
533static int setup_rt_frame32(int sig, struct k_sigaction *ka, siginfo_t *info,
534			   sigset_t *set, struct pt_regs * regs)
535{
536	int err = 0;
537	rt_sigframe32 __user *frame = get_sigframe(ka, regs, sizeof(rt_sigframe32));
538	if (!access_ok(VERIFY_WRITE, frame, sizeof(rt_sigframe32)))
539		goto give_sigsegv;
540
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
541	if (frame == (void __user *) -1UL)
542		goto give_sigsegv;
543
544	if (copy_siginfo_to_user32(&frame->info, info))
545		goto give_sigsegv;
546
547	/* Create the ucontext.  */
548	err |= __put_user(UC_EXTENDED, &frame->uc.uc_flags);
549	err |= __put_user(0, &frame->uc.uc_link);
550	err |= __put_user(current->sas_ss_sp, &frame->uc.uc_stack.ss_sp);
551	err |= __put_user(sas_ss_flags(regs->gprs[15]),
552	                  &frame->uc.uc_stack.ss_flags);
553	err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
554	err |= save_sigregs32(regs, &frame->uc.uc_mcontext);
555	err |= save_sigregs_gprs_high(regs, frame->gprs_high);
556	err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
557	if (err)
558		goto give_sigsegv;
559
560	/* Set up to return from userspace.  If provided, use a stub
561	   already in userspace.  */
562	if (ka->sa.sa_flags & SA_RESTORER) {
563		regs->gprs[14] = (__u64) ka->sa.sa_restorer;
 
564	} else {
565		regs->gprs[14] = (__u64) frame->retcode;
566		err |= __put_user(S390_SYSCALL_OPCODE | __NR_rt_sigreturn,
567		                  (u16 __user *)(frame->retcode));
568	}
569
570	/* Set up backchain. */
571	if (__put_user(regs->gprs[15], (unsigned int __user *) frame))
572		goto give_sigsegv;
 
 
 
 
 
 
 
 
 
 
 
 
573
574	/* Set up registers for signal handler */
575	regs->gprs[15] = (__u64) frame;
576	regs->psw.addr = (__u64) ka->sa.sa_handler;
577
578	regs->gprs[2] = map_signal(sig);
579	regs->gprs[3] = (__u64) &frame->info;
580	regs->gprs[4] = (__u64) &frame->uc;
 
 
 
 
 
 
581	return 0;
582
583give_sigsegv:
584	force_sigsegv(sig, current);
585	return -EFAULT;
586}
587
588/*
589 * OK, we're invoking a handler
590 */	
591
592int handle_signal32(unsigned long sig, struct k_sigaction *ka,
593		    siginfo_t *info, sigset_t *oldset, struct pt_regs *regs)
594{
595	sigset_t blocked;
596	int ret;
597
598	/* Set up the stack frame */
599	if (ka->sa.sa_flags & SA_SIGINFO)
600		ret = setup_rt_frame32(sig, ka, info, oldset, regs);
601	else
602		ret = setup_frame32(sig, ka, oldset, regs);
603	if (ret)
604		return ret;
605	sigorsets(&blocked, &current->blocked, &ka->sa.sa_mask);
606	if (!(ka->sa.sa_flags & SA_NODEFER))
607		sigaddset(&blocked, sig);
608	set_current_blocked(&blocked);
609	return 0;
610}
611