|
@@ -31,48 +31,52 @@
|
|
|
|
|
|
|
|
|
_syscall5(int, rt_sigaction, int, a, int, b, int, c, int, d, int, e);
|
|
|
-static void __rt_sigreturn_stub (void);
|
|
|
-static void __sigreturn_stub (void);
|
|
|
+static void __rt_sigreturn_stub(void);
|
|
|
+static void __sigreturn_stub(void);
|
|
|
|
|
|
-int
|
|
|
-__libc_sigaction (int sig, __const struct sigaction *act, struct sigaction *oact)
|
|
|
+int __libc_sigaction(int sig, const struct sigaction *act, struct sigaction *oact)
|
|
|
{
|
|
|
- int ret;
|
|
|
- struct old_kernel_sigaction kact, koact;
|
|
|
- unsigned long stub = 0;
|
|
|
- int saved_errno = errno;
|
|
|
-
|
|
|
- if (act)
|
|
|
- {
|
|
|
- kact.k_sa_handler = act->sa_handler;
|
|
|
- memcpy (&kact.sa_mask, &act->sa_mask, sizeof(sigset_t));
|
|
|
- if (((kact.sa_flags = act->sa_flags) & SA_SIGINFO)!= 0)
|
|
|
- stub = (unsigned long) &__rt_sigreturn_stub;
|
|
|
- else
|
|
|
- stub = (unsigned long) &__sigreturn_stub;
|
|
|
- stub -= 8;
|
|
|
- kact.sa_restorer = NULL;
|
|
|
- }
|
|
|
-
|
|
|
- ret = rt_sigaction(sig,
|
|
|
- (int)(act ? &kact : NULL),
|
|
|
- (int)(oact ? &koact : NULL),
|
|
|
- stub,
|
|
|
- _NSIG / 8);
|
|
|
+ int ret;
|
|
|
+ struct old_kernel_sigaction kact, koact;
|
|
|
+ unsigned long stub = 0;
|
|
|
+ int saved_errno = errno;
|
|
|
|
|
|
- if (ret >= 0 || errno != ENOSYS)
|
|
|
- {
|
|
|
- if (oact && ret >= 0)
|
|
|
- {
|
|
|
- oact->sa_handler = koact.k_sa_handler;
|
|
|
- memcpy (&oact->sa_mask, &koact.sa_mask, sizeof (sigset_t));
|
|
|
- oact->sa_flags = koact.sa_flags;
|
|
|
- oact->sa_restorer = koact.sa_restorer;
|
|
|
- }
|
|
|
- return ret;
|
|
|
- }
|
|
|
- __set_errno (saved_errno);
|
|
|
- return -1;
|
|
|
+ if (act) {
|
|
|
+ kact.k_sa_handler = act->sa_handler;
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+ memcpy(&kact.sa_mask, &act->sa_mask, sizeof(sigset_t));
|
|
|
+ kact.sa_flags = act->sa_flags;
|
|
|
+ if (kact.sa_flags & SA_SIGINFO)
|
|
|
+ stub = (unsigned long) &__rt_sigreturn_stub;
|
|
|
+ else
|
|
|
+ stub = (unsigned long) &__sigreturn_stub;
|
|
|
+ stub -= 8;
|
|
|
+ kact.sa_restorer = NULL;
|
|
|
+ }
|
|
|
+
|
|
|
+ * if _NSIG / 8 does not match kernel's sizeof(sigset_t) */
|
|
|
+ ret = rt_sigaction(sig,
|
|
|
+ (int)(act ? &kact : NULL),
|
|
|
+ (int)(oact ? &koact : NULL),
|
|
|
+ stub,
|
|
|
+ _NSIG / 8);
|
|
|
+
|
|
|
+
|
|
|
+ if (ret >= 0 || errno != ENOSYS) {
|
|
|
+ if (oact && ret >= 0) {
|
|
|
+ oact->sa_handler = koact.k_sa_handler;
|
|
|
+
|
|
|
+ memcpy(&oact->sa_mask, &koact.sa_mask, sizeof(sigset_t));
|
|
|
+ oact->sa_flags = koact.sa_flags;
|
|
|
+ oact->sa_restorer = koact.sa_restorer;
|
|
|
+ }
|
|
|
+ return ret;
|
|
|
+ }
|
|
|
+ __set_errno(saved_errno);
|
|
|
+ return -1;
|
|
|
}
|
|
|
|
|
|
#ifndef LIBC_SIGACTION
|
|
@@ -81,18 +85,22 @@ libc_hidden_weak(sigaction)
|
|
|
#endif
|
|
|
|
|
|
static void
|
|
|
-__rt_sigreturn_stub (void)
|
|
|
+__rt_sigreturn_stub(void)
|
|
|
{
|
|
|
- __asm__ ("mov %0, %%g1\n\t"
|
|
|
- "ta 0x10\n\t"
|
|
|
- :
|
|
|
- : "i" (__NR_rt_sigreturn));
|
|
|
+ __asm__(
|
|
|
+ "mov %0, %%g1\n\t"
|
|
|
+ "ta 0x10\n\t"
|
|
|
+ :
|
|
|
+ : "i" (__NR_rt_sigreturn)
|
|
|
+ );
|
|
|
}
|
|
|
static void
|
|
|
-__sigreturn_stub (void)
|
|
|
+__sigreturn_stub(void)
|
|
|
{
|
|
|
- __asm__ ("mov %0, %%g1\n\t"
|
|
|
- "ta 0x10\n\t"
|
|
|
- :
|
|
|
- : "i" (__NR_sigreturn));
|
|
|
+ __asm__(
|
|
|
+ "mov %0, %%g1\n\t"
|
|
|
+ "ta 0x10\n\t"
|
|
|
+ :
|
|
|
+ : "i" (__NR_sigreturn)
|
|
|
+ );
|
|
|
}
|