signal.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622
  1. /*
  2. * linux/arch/sh/kernel/signal.c
  3. *
  4. * Copyright (C) 1991, 1992 Linus Torvalds
  5. *
  6. * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
  7. *
  8. * SuperH version: Copyright (C) 1999, 2000 Niibe Yutaka & Kaz Kojima
  9. *
  10. */
  11. #include <linux/sched.h>
  12. #include <linux/mm.h>
  13. #include <linux/smp.h>
  14. #include <linux/smp_lock.h>
  15. #include <linux/kernel.h>
  16. #include <linux/signal.h>
  17. #include <linux/errno.h>
  18. #include <linux/wait.h>
  19. #include <linux/ptrace.h>
  20. #include <linux/unistd.h>
  21. #include <linux/stddef.h>
  22. #include <linux/tty.h>
  23. #include <linux/elf.h>
  24. #include <linux/personality.h>
  25. #include <linux/binfmts.h>
  26. #include <asm/ucontext.h>
  27. #include <asm/uaccess.h>
  28. #include <asm/pgtable.h>
  29. #include <asm/cacheflush.h>
  30. #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
  31. /*
  32. * Atomically swap in the new signal mask, and wait for a signal.
  33. */
  34. asmlinkage int
  35. sys_sigsuspend(old_sigset_t mask,
  36. unsigned long r5, unsigned long r6, unsigned long r7,
  37. struct pt_regs __regs)
  38. {
  39. mask &= _BLOCKABLE;
  40. spin_lock_irq(&current->sighand->siglock);
  41. current->saved_sigmask = current->blocked;
  42. siginitset(&current->blocked, mask);
  43. recalc_sigpending();
  44. spin_unlock_irq(&current->sighand->siglock);
  45. current->state = TASK_INTERRUPTIBLE;
  46. schedule();
  47. set_thread_flag(TIF_RESTORE_SIGMASK);
  48. return -ERESTARTNOHAND;
  49. }
  50. asmlinkage int
  51. sys_sigaction(int sig, const struct old_sigaction __user *act,
  52. struct old_sigaction __user *oact)
  53. {
  54. struct k_sigaction new_ka, old_ka;
  55. int ret;
  56. if (act) {
  57. old_sigset_t mask;
  58. if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
  59. __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
  60. __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
  61. return -EFAULT;
  62. __get_user(new_ka.sa.sa_flags, &act->sa_flags);
  63. __get_user(mask, &act->sa_mask);
  64. siginitset(&new_ka.sa.sa_mask, mask);
  65. }
  66. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  67. if (!ret && oact) {
  68. if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
  69. __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
  70. __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
  71. return -EFAULT;
  72. __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
  73. __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
  74. }
  75. return ret;
  76. }
  77. asmlinkage int
  78. sys_sigaltstack(const stack_t __user *uss, stack_t __user *uoss,
  79. unsigned long r6, unsigned long r7,
  80. struct pt_regs __regs)
  81. {
  82. struct pt_regs *regs = RELOC_HIDE(&__regs, 0);
  83. return do_sigaltstack(uss, uoss, regs->regs[15]);
  84. }
  85. /*
  86. * Do a signal return; undo the signal stack.
  87. */
  88. #define MOVW(n) (0x9300|((n)-2)) /* Move mem word at PC+n to R3 */
  89. #if defined(CONFIG_CPU_SH2) || defined(CONFIG_CPU_SH2A)
  90. #define TRAP_NOARG 0xc320 /* Syscall w/no args (NR in R3) */
  91. #else
  92. #define TRAP_NOARG 0xc310 /* Syscall w/no args (NR in R3) */
  93. #endif
  94. #define OR_R0_R0 0x200b /* or r0,r0 (insert to avoid hardware bug) */
  95. struct sigframe
  96. {
  97. struct sigcontext sc;
  98. unsigned long extramask[_NSIG_WORDS-1];
  99. u16 retcode[8];
  100. };
  101. struct rt_sigframe
  102. {
  103. struct siginfo info;
  104. struct ucontext uc;
  105. u16 retcode[8];
  106. };
  107. #ifdef CONFIG_SH_FPU
  108. static inline int restore_sigcontext_fpu(struct sigcontext __user *sc)
  109. {
  110. struct task_struct *tsk = current;
  111. if (!(cpu_data->flags & CPU_HAS_FPU))
  112. return 0;
  113. set_used_math();
  114. return __copy_from_user(&tsk->thread.fpu.hard, &sc->sc_fpregs[0],
  115. sizeof(long)*(16*2+2));
  116. }
  117. static inline int save_sigcontext_fpu(struct sigcontext __user *sc,
  118. struct pt_regs *regs)
  119. {
  120. struct task_struct *tsk = current;
  121. if (!(cpu_data->flags & CPU_HAS_FPU))
  122. return 0;
  123. if (!used_math()) {
  124. __put_user(0, &sc->sc_ownedfp);
  125. return 0;
  126. }
  127. __put_user(1, &sc->sc_ownedfp);
  128. /* This will cause a "finit" to be triggered by the next
  129. attempted FPU operation by the 'current' process.
  130. */
  131. clear_used_math();
  132. unlazy_fpu(tsk, regs);
  133. return __copy_to_user(&sc->sc_fpregs[0], &tsk->thread.fpu.hard,
  134. sizeof(long)*(16*2+2));
  135. }
  136. #endif /* CONFIG_SH_FPU */
  137. static int
  138. restore_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc, int *r0_p)
  139. {
  140. unsigned int err = 0;
  141. #define COPY(x) err |= __get_user(regs->x, &sc->sc_##x)
  142. COPY(regs[1]);
  143. COPY(regs[2]); COPY(regs[3]);
  144. COPY(regs[4]); COPY(regs[5]);
  145. COPY(regs[6]); COPY(regs[7]);
  146. COPY(regs[8]); COPY(regs[9]);
  147. COPY(regs[10]); COPY(regs[11]);
  148. COPY(regs[12]); COPY(regs[13]);
  149. COPY(regs[14]); COPY(regs[15]);
  150. COPY(gbr); COPY(mach);
  151. COPY(macl); COPY(pr);
  152. COPY(sr); COPY(pc);
  153. #undef COPY
  154. #ifdef CONFIG_SH_FPU
  155. if (cpu_data->flags & CPU_HAS_FPU) {
  156. int owned_fp;
  157. struct task_struct *tsk = current;
  158. regs->sr |= SR_FD; /* Release FPU */
  159. clear_fpu(tsk, regs);
  160. clear_used_math();
  161. __get_user (owned_fp, &sc->sc_ownedfp);
  162. if (owned_fp)
  163. err |= restore_sigcontext_fpu(sc);
  164. }
  165. #endif
  166. regs->tra = -1; /* disable syscall checks */
  167. err |= __get_user(*r0_p, &sc->sc_regs[0]);
  168. return err;
  169. }
  170. asmlinkage int sys_sigreturn(unsigned long r4, unsigned long r5,
  171. unsigned long r6, unsigned long r7,
  172. struct pt_regs __regs)
  173. {
  174. struct pt_regs *regs = RELOC_HIDE(&__regs, 0);
  175. struct sigframe __user *frame = (struct sigframe __user *)regs->regs[15];
  176. sigset_t set;
  177. int r0;
  178. if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
  179. goto badframe;
  180. if (__get_user(set.sig[0], &frame->sc.oldmask)
  181. || (_NSIG_WORDS > 1
  182. && __copy_from_user(&set.sig[1], &frame->extramask,
  183. sizeof(frame->extramask))))
  184. goto badframe;
  185. sigdelsetmask(&set, ~_BLOCKABLE);
  186. spin_lock_irq(&current->sighand->siglock);
  187. current->blocked = set;
  188. recalc_sigpending();
  189. spin_unlock_irq(&current->sighand->siglock);
  190. if (restore_sigcontext(regs, &frame->sc, &r0))
  191. goto badframe;
  192. return r0;
  193. badframe:
  194. force_sig(SIGSEGV, current);
  195. return 0;
  196. }
  197. asmlinkage int sys_rt_sigreturn(unsigned long r4, unsigned long r5,
  198. unsigned long r6, unsigned long r7,
  199. struct pt_regs __regs)
  200. {
  201. struct pt_regs *regs = RELOC_HIDE(&__regs, 0);
  202. struct rt_sigframe __user *frame = (struct rt_sigframe __user *)regs->regs[15];
  203. sigset_t set;
  204. stack_t st;
  205. int r0;
  206. if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
  207. goto badframe;
  208. if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
  209. goto badframe;
  210. sigdelsetmask(&set, ~_BLOCKABLE);
  211. spin_lock_irq(&current->sighand->siglock);
  212. current->blocked = set;
  213. recalc_sigpending();
  214. spin_unlock_irq(&current->sighand->siglock);
  215. if (restore_sigcontext(regs, &frame->uc.uc_mcontext, &r0))
  216. goto badframe;
  217. if (__copy_from_user(&st, &frame->uc.uc_stack, sizeof(st)))
  218. goto badframe;
  219. /* It is more difficult to avoid calling this function than to
  220. call it and ignore errors. */
  221. do_sigaltstack(&st, NULL, regs->regs[15]);
  222. return r0;
  223. badframe:
  224. force_sig(SIGSEGV, current);
  225. return 0;
  226. }
  227. /*
  228. * Set up a signal frame.
  229. */
  230. static int
  231. setup_sigcontext(struct sigcontext __user *sc, struct pt_regs *regs,
  232. unsigned long mask)
  233. {
  234. int err = 0;
  235. #define COPY(x) err |= __put_user(regs->x, &sc->sc_##x)
  236. COPY(regs[0]); COPY(regs[1]);
  237. COPY(regs[2]); COPY(regs[3]);
  238. COPY(regs[4]); COPY(regs[5]);
  239. COPY(regs[6]); COPY(regs[7]);
  240. COPY(regs[8]); COPY(regs[9]);
  241. COPY(regs[10]); COPY(regs[11]);
  242. COPY(regs[12]); COPY(regs[13]);
  243. COPY(regs[14]); COPY(regs[15]);
  244. COPY(gbr); COPY(mach);
  245. COPY(macl); COPY(pr);
  246. COPY(sr); COPY(pc);
  247. #undef COPY
  248. #ifdef CONFIG_SH_FPU
  249. err |= save_sigcontext_fpu(sc, regs);
  250. #endif
  251. /* non-iBCS2 extensions.. */
  252. err |= __put_user(mask, &sc->oldmask);
  253. return err;
  254. }
  255. /*
  256. * Determine which stack to use..
  257. */
  258. static inline void __user *
  259. get_sigframe(struct k_sigaction *ka, unsigned long sp, size_t frame_size)
  260. {
  261. if (ka->sa.sa_flags & SA_ONSTACK) {
  262. if (sas_ss_flags(sp) == 0)
  263. sp = current->sas_ss_sp + current->sas_ss_size;
  264. }
  265. return (void __user *)((sp - frame_size) & -8ul);
  266. }
  267. /* These symbols are defined with the addresses in the vsyscall page.
  268. See vsyscall-trapa.S. */
  269. extern void __user __kernel_sigreturn;
  270. extern void __user __kernel_rt_sigreturn;
  271. static int setup_frame(int sig, struct k_sigaction *ka,
  272. sigset_t *set, struct pt_regs *regs)
  273. {
  274. struct sigframe __user *frame;
  275. int err = 0;
  276. int signal;
  277. frame = get_sigframe(ka, regs->regs[15], sizeof(*frame));
  278. if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
  279. goto give_sigsegv;
  280. signal = current_thread_info()->exec_domain
  281. && current_thread_info()->exec_domain->signal_invmap
  282. && sig < 32
  283. ? current_thread_info()->exec_domain->signal_invmap[sig]
  284. : sig;
  285. err |= setup_sigcontext(&frame->sc, regs, set->sig[0]);
  286. if (_NSIG_WORDS > 1)
  287. err |= __copy_to_user(frame->extramask, &set->sig[1],
  288. sizeof(frame->extramask));
  289. /* Set up to return from userspace. If provided, use a stub
  290. already in userspace. */
  291. if (ka->sa.sa_flags & SA_RESTORER) {
  292. regs->pr = (unsigned long) ka->sa.sa_restorer;
  293. #ifdef CONFIG_VSYSCALL
  294. } else if (likely(current->mm->context.vdso)) {
  295. regs->pr = VDSO_SYM(&__kernel_sigreturn);
  296. #endif
  297. } else {
  298. /* Generate return code (system call to sigreturn) */
  299. err |= __put_user(MOVW(7), &frame->retcode[0]);
  300. err |= __put_user(TRAP_NOARG, &frame->retcode[1]);
  301. err |= __put_user(OR_R0_R0, &frame->retcode[2]);
  302. err |= __put_user(OR_R0_R0, &frame->retcode[3]);
  303. err |= __put_user(OR_R0_R0, &frame->retcode[4]);
  304. err |= __put_user(OR_R0_R0, &frame->retcode[5]);
  305. err |= __put_user(OR_R0_R0, &frame->retcode[6]);
  306. err |= __put_user((__NR_sigreturn), &frame->retcode[7]);
  307. regs->pr = (unsigned long) frame->retcode;
  308. }
  309. if (err)
  310. goto give_sigsegv;
  311. /* Set up registers for signal handler */
  312. regs->regs[15] = (unsigned long) frame;
  313. regs->regs[4] = signal; /* Arg for signal handler */
  314. regs->regs[5] = 0;
  315. regs->regs[6] = (unsigned long) &frame->sc;
  316. regs->pc = (unsigned long) ka->sa.sa_handler;
  317. set_fs(USER_DS);
  318. pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n",
  319. current->comm, current->pid, frame, regs->pc, regs->pr);
  320. flush_cache_sigtramp(regs->pr);
  321. if ((-regs->pr & (L1_CACHE_BYTES-1)) < sizeof(frame->retcode))
  322. flush_cache_sigtramp(regs->pr + L1_CACHE_BYTES);
  323. return 0;
  324. give_sigsegv:
  325. force_sigsegv(sig, current);
  326. return -EFAULT;
  327. }
  328. static int setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
  329. sigset_t *set, struct pt_regs *regs)
  330. {
  331. struct rt_sigframe __user *frame;
  332. int err = 0;
  333. int signal;
  334. frame = get_sigframe(ka, regs->regs[15], sizeof(*frame));
  335. if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
  336. goto give_sigsegv;
  337. signal = current_thread_info()->exec_domain
  338. && current_thread_info()->exec_domain->signal_invmap
  339. && sig < 32
  340. ? current_thread_info()->exec_domain->signal_invmap[sig]
  341. : sig;
  342. err |= copy_siginfo_to_user(&frame->info, info);
  343. /* Create the ucontext. */
  344. err |= __put_user(0, &frame->uc.uc_flags);
  345. err |= __put_user(0, &frame->uc.uc_link);
  346. err |= __put_user((void *)current->sas_ss_sp,
  347. &frame->uc.uc_stack.ss_sp);
  348. err |= __put_user(sas_ss_flags(regs->regs[15]),
  349. &frame->uc.uc_stack.ss_flags);
  350. err |= __put_user(current->sas_ss_size, &frame->uc.uc_stack.ss_size);
  351. err |= setup_sigcontext(&frame->uc.uc_mcontext,
  352. regs, set->sig[0]);
  353. err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
  354. /* Set up to return from userspace. If provided, use a stub
  355. already in userspace. */
  356. if (ka->sa.sa_flags & SA_RESTORER) {
  357. regs->pr = (unsigned long) ka->sa.sa_restorer;
  358. #ifdef CONFIG_VSYSCALL
  359. } else if (likely(current->mm->context.vdso)) {
  360. regs->pr = VDSO_SYM(&__kernel_rt_sigreturn);
  361. #endif
  362. } else {
  363. /* Generate return code (system call to rt_sigreturn) */
  364. err |= __put_user(MOVW(7), &frame->retcode[0]);
  365. err |= __put_user(TRAP_NOARG, &frame->retcode[1]);
  366. err |= __put_user(OR_R0_R0, &frame->retcode[2]);
  367. err |= __put_user(OR_R0_R0, &frame->retcode[3]);
  368. err |= __put_user(OR_R0_R0, &frame->retcode[4]);
  369. err |= __put_user(OR_R0_R0, &frame->retcode[5]);
  370. err |= __put_user(OR_R0_R0, &frame->retcode[6]);
  371. err |= __put_user((__NR_rt_sigreturn), &frame->retcode[7]);
  372. regs->pr = (unsigned long) frame->retcode;
  373. }
  374. if (err)
  375. goto give_sigsegv;
  376. /* Set up registers for signal handler */
  377. regs->regs[15] = (unsigned long) frame;
  378. regs->regs[4] = signal; /* Arg for signal handler */
  379. regs->regs[5] = (unsigned long) &frame->info;
  380. regs->regs[6] = (unsigned long) &frame->uc;
  381. regs->pc = (unsigned long) ka->sa.sa_handler;
  382. set_fs(USER_DS);
  383. pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n",
  384. current->comm, current->pid, frame, regs->pc, regs->pr);
  385. flush_cache_sigtramp(regs->pr);
  386. if ((-regs->pr & (L1_CACHE_BYTES-1)) < sizeof(frame->retcode))
  387. flush_cache_sigtramp(regs->pr + L1_CACHE_BYTES);
  388. return 0;
  389. give_sigsegv:
  390. force_sigsegv(sig, current);
  391. return -EFAULT;
  392. }
  393. /*
  394. * OK, we're invoking a handler
  395. */
  396. static int
  397. handle_signal(unsigned long sig, struct k_sigaction *ka, siginfo_t *info,
  398. sigset_t *oldset, struct pt_regs *regs)
  399. {
  400. int ret;
  401. /* Are we from a system call? */
  402. if (regs->tra >= 0) {
  403. /* If so, check system call restarting.. */
  404. switch (regs->regs[0]) {
  405. case -ERESTARTNOHAND:
  406. regs->regs[0] = -EINTR;
  407. break;
  408. case -ERESTARTSYS:
  409. if (!(ka->sa.sa_flags & SA_RESTART)) {
  410. regs->regs[0] = -EINTR;
  411. break;
  412. }
  413. /* fallthrough */
  414. case -ERESTARTNOINTR:
  415. regs->pc -= 2;
  416. }
  417. } else {
  418. /* gUSA handling */
  419. #ifdef CONFIG_PREEMPT
  420. unsigned long flags;
  421. local_irq_save(flags);
  422. #endif
  423. if (regs->regs[15] >= 0xc0000000) {
  424. int offset = (int)regs->regs[15];
  425. /* Reset stack pointer: clear critical region mark */
  426. regs->regs[15] = regs->regs[1];
  427. if (regs->pc < regs->regs[0])
  428. /* Go to rewind point #1 */
  429. regs->pc = regs->regs[0] + offset - 2;
  430. }
  431. #ifdef CONFIG_PREEMPT
  432. local_irq_restore(flags);
  433. #endif
  434. }
  435. /* Set up the stack frame */
  436. if (ka->sa.sa_flags & SA_SIGINFO)
  437. ret = setup_rt_frame(sig, ka, info, oldset, regs);
  438. else
  439. ret = setup_frame(sig, ka, oldset, regs);
  440. if (ka->sa.sa_flags & SA_ONESHOT)
  441. ka->sa.sa_handler = SIG_DFL;
  442. if (ret == 0) {
  443. spin_lock_irq(&current->sighand->siglock);
  444. sigorsets(&current->blocked,&current->blocked,&ka->sa.sa_mask);
  445. if (!(ka->sa.sa_flags & SA_NODEFER))
  446. sigaddset(&current->blocked,sig);
  447. recalc_sigpending();
  448. spin_unlock_irq(&current->sighand->siglock);
  449. }
  450. return ret;
  451. }
  452. /*
  453. * Note that 'init' is a special process: it doesn't get signals it doesn't
  454. * want to handle. Thus you cannot kill init even with a SIGKILL even by
  455. * mistake.
  456. *
  457. * Note that we go through the signals twice: once to check the signals that
  458. * the kernel can handle, and then we build all the user-level signal handling
  459. * stack-frames in one go after that.
  460. */
  461. static void do_signal(struct pt_regs *regs, unsigned int save_r0)
  462. {
  463. siginfo_t info;
  464. int signr;
  465. struct k_sigaction ka;
  466. sigset_t *oldset;
  467. /*
  468. * We want the common case to go fast, which
  469. * is why we may in certain cases get here from
  470. * kernel mode. Just return without doing anything
  471. * if so.
  472. */
  473. if (!user_mode(regs))
  474. return;
  475. if (try_to_freeze())
  476. goto no_signal;
  477. if (test_thread_flag(TIF_RESTORE_SIGMASK))
  478. oldset = &current->saved_sigmask;
  479. else
  480. oldset = &current->blocked;
  481. signr = get_signal_to_deliver(&info, &ka, regs, NULL);
  482. if (signr > 0) {
  483. /* Whee! Actually deliver the signal. */
  484. if (handle_signal(signr, &ka, &info, oldset, regs) == 0) {
  485. /* a signal was successfully delivered; the saved
  486. * sigmask will have been stored in the signal frame,
  487. * and will be restored by sigreturn, so we can simply
  488. * clear the TIF_RESTORE_SIGMASK flag */
  489. if (test_thread_flag(TIF_RESTORE_SIGMASK))
  490. clear_thread_flag(TIF_RESTORE_SIGMASK);
  491. }
  492. }
  493. no_signal:
  494. /* Did we come from a system call? */
  495. if (regs->tra >= 0) {
  496. /* Restart the system call - no handlers present */
  497. if (regs->regs[0] == -ERESTARTNOHAND ||
  498. regs->regs[0] == -ERESTARTSYS ||
  499. regs->regs[0] == -ERESTARTNOINTR) {
  500. regs->regs[0] = save_r0;
  501. regs->pc -= 2;
  502. } else if (regs->regs[0] == -ERESTART_RESTARTBLOCK) {
  503. regs->pc -= 2;
  504. regs->regs[3] = __NR_restart_syscall;
  505. }
  506. }
  507. /* if there's no signal to deliver, we just put the saved sigmask
  508. * back */
  509. if (test_thread_flag(TIF_RESTORE_SIGMASK)) {
  510. clear_thread_flag(TIF_RESTORE_SIGMASK);
  511. sigprocmask(SIG_SETMASK, &current->saved_sigmask, NULL);
  512. }
  513. }
  514. asmlinkage void do_notify_resume(struct pt_regs *regs, unsigned int save_r0,
  515. __u32 thread_info_flags)
  516. {
  517. /* deal with pending signal delivery */
  518. if (thread_info_flags & (_TIF_SIGPENDING | _TIF_RESTORE_SIGMASK))
  519. do_signal(regs, save_r0);
  520. }