📄 signal32.c
字号:
/* * arch/s390/kernel/signal32.c * * S390 version * Copyright (C) 2000 IBM Deutschland Entwicklung GmbH, IBM Corporation * Author(s): Denis Joseph Barrow (djbarrow@de.ibm.com,barrow_dj@yahoo.com) * Gerhard Tonn (ton@de.ibm.com) * * Copyright (C) 1991, 1992 Linus Torvalds * * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson */#include <linux/config.h>#include <linux/sched.h>#include <linux/mm.h>#include <linux/smp.h>#include <linux/smp_lock.h>#include <linux/kernel.h>#include <linux/signal.h>#include <linux/errno.h>#include <linux/wait.h>#include <linux/ptrace.h>#include <linux/unistd.h>#include <linux/stddef.h>#include <linux/personality.h>#include <asm/ucontext.h>#include <asm/uaccess.h>#include "linux32.h"#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))#define _USER_PSW_MASK32 0x0701C00080000000typedef struct { __u8 callee_used_stack[__SIGNAL_FRAMESIZE32]; struct sigcontext32 sc; _sigregs32 sregs; __u8 retcode[S390_SYSCALL_SIZE];} sigframe32;typedef struct { __u8 callee_used_stack[__SIGNAL_FRAMESIZE32]; __u8 retcode[S390_SYSCALL_SIZE]; struct siginfo32 info; struct ucontext32 uc;} rt_sigframe32;asmlinkage int FASTCALL(do_signal(struct pt_regs *regs, sigset_t *oldset));int do_signal32(struct pt_regs *regs, sigset_t *oldset);int copy_siginfo_to_user32(siginfo_t32 *to, siginfo_t *from){ int err; if (!access_ok (VERIFY_WRITE, to, sizeof(siginfo_t32))) return -EFAULT; /* If you change siginfo_t structure, please be sure this code is fixed accordingly. It should never copy any pad contained in the structure to avoid security leaks, but must copy the generic 3 ints plus the relevant union member. This routine must convert siginfo from 64bit to 32bit as well at the same time. */ err = __put_user(from->si_signo, &to->si_signo); err |= __put_user(from->si_errno, &to->si_errno); err |= __put_user((short)from->si_code, &to->si_code); if (from->si_code < 0) err |= __copy_to_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE); else { switch (from->si_code >> 16) { case __SI_KILL >> 16: err |= __put_user(from->si_pid, &to->si_pid); err |= __put_user(from->si_uid, &to->si_uid); break; case __SI_CHLD >> 16: err |= __put_user(from->si_pid, &to->si_pid); err |= __put_user(from->si_uid, &to->si_uid); err |= __put_user(from->si_utime, &to->si_utime); err |= __put_user(from->si_stime, &to->si_stime); err |= __put_user(from->si_status, &to->si_status); break; case __SI_FAULT >> 16: err |= __put_user(from->si_addr, &to->si_addr); break; case __SI_POLL >> 16: case __SI_TIMER >> 16: err |= __put_user(from->si_band, &to->si_band); err |= __put_user(from->si_fd, &to->si_fd); break; default: break; /* case __SI_RT: This is not generated by the kernel as of now. */ } } return err;}/* * Atomically swap in the new signal mask, and wait for a signal. */asmlinkage intsys32_sigsuspend(struct pt_regs * regs,int history0, int history1, old_sigset_t mask){ sigset_t saveset; mask &= _BLOCKABLE; spin_lock_irq(¤t->sigmask_lock); saveset = current->blocked; siginitset(¤t->blocked, mask); recalc_sigpending(current); spin_unlock_irq(¤t->sigmask_lock); regs->gprs[2] = -EINTR; while (1) { set_current_state(TASK_INTERRUPTIBLE); schedule(); if (do_signal32(regs, &saveset)) return -EINTR; }}asmlinkage intsys32_rt_sigsuspend(struct pt_regs * regs,sigset_t32 *unewset, size_t sigsetsize){ sigset_t saveset, newset; sigset_t32 set32; /* XXX: Don't preclude handling different sized sigset_t's. */ if (sigsetsize != sizeof(sigset_t)) return -EINVAL; if (copy_from_user(&set32, unewset, sizeof(set32))) return -EFAULT; switch (_NSIG_WORDS) { case 4: newset.sig[3] = set32.sig[6] + (((long)set32.sig[7]) << 32); case 3: newset.sig[2] = set32.sig[4] + (((long)set32.sig[5]) << 32); case 2: newset.sig[1] = set32.sig[2] + (((long)set32.sig[3]) << 32); case 1: newset.sig[0] = set32.sig[0] + (((long)set32.sig[1]) << 32); } sigdelsetmask(&newset, ~_BLOCKABLE); spin_lock_irq(¤t->sigmask_lock); saveset = current->blocked; current->blocked = newset; recalc_sigpending(current); spin_unlock_irq(¤t->sigmask_lock); regs->gprs[2] = -EINTR; while (1) { set_current_state(TASK_INTERRUPTIBLE); schedule(); if (do_signal32(regs, &saveset)) return -EINTR; }} asmlinkage intsys32_sigaction(int sig, const struct old_sigaction32 *act, struct old_sigaction32 *oact){ struct k_sigaction new_ka, old_ka; int ret; if (act) { old_sigset_t32 mask; if (verify_area(VERIFY_READ, act, sizeof(*act)) || __get_user((unsigned long)new_ka.sa.sa_handler, &act->sa_handler) || __get_user((unsigned long)new_ka.sa.sa_restorer, &act->sa_restorer)) return -EFAULT; __get_user(new_ka.sa.sa_flags, &act->sa_flags); __get_user(mask, &act->sa_mask); siginitset(&new_ka.sa.sa_mask, mask); } ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); if (!ret && oact) { if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || __put_user((unsigned long)old_ka.sa.sa_handler, &oact->sa_handler) || __put_user((unsigned long)old_ka.sa.sa_restorer, &oact->sa_restorer)) return -EFAULT; __put_user(old_ka.sa.sa_flags, &oact->sa_flags); __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); } return ret;}intdo_sigaction(int sig, const struct k_sigaction *act, struct k_sigaction *oact);asmlinkage long sys32_rt_sigaction(int sig, const struct sigaction32 *act, struct sigaction32 *oact, size_t sigsetsize){ struct k_sigaction new_ka, old_ka; int ret; sigset_t32 set32; /* XXX: Don't preclude handling different sized sigset_t's. */ if (sigsetsize != sizeof(sigset_t32)) return -EINVAL; if (act) { ret = get_user((unsigned long)new_ka.sa.sa_handler, &act->sa_handler); ret |= __copy_from_user(&set32, &act->sa_mask, sizeof(sigset_t32)); switch (_NSIG_WORDS) { case 4: new_ka.sa.sa_mask.sig[3] = set32.sig[6] | (((long)set32.sig[7]) << 32); case 3: new_ka.sa.sa_mask.sig[2] = set32.sig[4] | (((long)set32.sig[5]) << 32); case 2: new_ka.sa.sa_mask.sig[1] = set32.sig[2] | (((long)set32.sig[3]) << 32); case 1: new_ka.sa.sa_mask.sig[0] = set32.sig[0] | (((long)set32.sig[1]) << 32); } ret |= __get_user(new_ka.sa.sa_flags, &act->sa_flags); if (ret) return -EFAULT; } ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); if (!ret && oact) { switch (_NSIG_WORDS) { case 4: set32.sig[7] = (old_ka.sa.sa_mask.sig[3] >> 32); set32.sig[6] = old_ka.sa.sa_mask.sig[3]; case 3: set32.sig[5] = (old_ka.sa.sa_mask.sig[2] >> 32); set32.sig[4] = old_ka.sa.sa_mask.sig[2]; case 2: set32.sig[3] = (old_ka.sa.sa_mask.sig[1] >> 32); set32.sig[2] = old_ka.sa.sa_mask.sig[1]; case 1: set32.sig[1] = (old_ka.sa.sa_mask.sig[0] >> 32); set32.sig[0] = old_ka.sa.sa_mask.sig[0]; } ret = put_user((unsigned long)old_ka.sa.sa_handler, &oact->sa_handler); ret |= __copy_to_user(&oact->sa_mask, &set32, sizeof(sigset_t32)); ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); } return ret;}asmlinkage intsys32_sigaltstack(const stack_t32 *uss, stack_t32 *uoss, struct pt_regs *regs){ stack_t kss, koss; int ret, err = 0; mm_segment_t old_fs = get_fs(); if (uss) { if (!access_ok(VERIFY_READ, uss, sizeof(*uss))) return -EFAULT; err |= __get_user(kss.ss_sp, &uss->ss_sp); err |= __get_user(kss.ss_size, &uss->ss_size); err |= __get_user(kss.ss_flags, &uss->ss_flags); if (err) return -EFAULT; } set_fs (KERNEL_DS); ret = do_sigaltstack(uss ? &kss : NULL , uoss ? &koss : NULL, regs->gprs[15]); set_fs (old_fs); if (!ret && uoss) { if (!access_ok(VERIFY_WRITE, uoss, sizeof(*uoss))) return -EFAULT; err |= __put_user(koss.ss_sp, &uoss->ss_sp); err |= __put_user(koss.ss_size, &uoss->ss_size); err |= __put_user(koss.ss_flags, &uoss->ss_flags); if (err) return -EFAULT; } return ret;}static int save_sigregs32(struct pt_regs *regs,_sigregs32 *sregs){ int err = 0; s390_fp_regs fpregs; int i; for(i=0; i<NUM_GPRS; i++) err |= __put_user(regs->gprs[i], &sregs->regs.gprs[i]); for(i=0; i<NUM_ACRS; i++) err |= __put_user(regs->acrs[i], &sregs->regs.acrs[i]); err |= __copy_to_user(&sregs->regs.psw.mask, ®s->psw.mask, 4); err |= __copy_to_user(&sregs->regs.psw.addr, ((char*)®s->psw.addr)+4, 4); if(!err) { save_fp_regs(&fpregs); __put_user(fpregs.fpc, &sregs->fpregs.fpc); for(i=0; i<NUM_FPRS; i++) err |= __put_user(fpregs.fprs[i].d, &sregs->fpregs.fprs[i].d); } return(err); }static int restore_sigregs32(struct pt_regs *regs,_sigregs32 *sregs){ int err = 0; s390_fp_regs fpregs; psw_t saved_psw=regs->psw; int i; for(i=0; i<NUM_GPRS; i++) err |= __get_user(regs->gprs[i], &sregs->regs.gprs[i]); for(i=0; i<NUM_ACRS; i++) err |= __get_user(regs->acrs[i], &sregs->regs.acrs[i]); err |= __copy_from_user(®s->psw.mask, &sregs->regs.psw.mask, 4); err |= __copy_from_user(((char*)®s->psw.addr)+4, &sregs->regs.psw.addr, 4); if(!err) { regs->trap = -1; /* disable syscall checks */ regs->psw.mask=(saved_psw.mask&~PSW_MASK_DEBUGCHANGE)| (regs->psw.mask&PSW_MASK_DEBUGCHANGE); regs->psw.addr=(saved_psw.addr&~PSW_ADDR_DEBUGCHANGE)| (regs->psw.addr&PSW_ADDR_DEBUGCHANGE); __get_user(fpregs.fpc, &sregs->fpregs.fpc); for(i=0; i<NUM_FPRS; i++) err |= __get_user(fpregs.fprs[i].d, &sregs->fpregs.fprs[i].d); if(!err) restore_fp_regs(&fpregs); } return(err);}asmlinkage long sys32_sigreturn(struct pt_regs *regs){ sigframe32 *frame = (sigframe32 *)regs->gprs[15]; sigset_t set; if (verify_area(VERIFY_READ, frame, sizeof(*frame))) goto badframe; if (__copy_from_user(&set.sig, &frame->sc.oldmask, _SIGMASK_COPY_SIZE32)) goto badframe; sigdelsetmask(&set, ~_BLOCKABLE); spin_lock_irq(¤t->sigmask_lock); current->blocked = set; recalc_sigpending(current); spin_unlock_irq(¤t->sigmask_lock); if (restore_sigregs32(regs, &frame->sregs)) goto badframe; return regs->gprs[2];badframe: force_sig(SIGSEGV, current); return 0;
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -