Linux Audio

Check our new training course

Loading...
v6.8
   1// SPDX-License-Identifier: GPL-2.0-or-later
   2/*
   3 * Signal handling for 32bit PPC and 32bit tasks on 64bit PPC
   4 *
   5 *  PowerPC version
   6 *    Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
   7 * Copyright (C) 2001 IBM
   8 * Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
   9 * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
  10 *
  11 *  Derived from "arch/i386/kernel/signal.c"
  12 *    Copyright (C) 1991, 1992 Linus Torvalds
  13 *    1997-11-28  Modified for POSIX.1b signals by Richard Henderson
  14 */
  15
  16#include <linux/sched.h>
  17#include <linux/mm.h>
  18#include <linux/smp.h>
  19#include <linux/kernel.h>
  20#include <linux/signal.h>
  21#include <linux/errno.h>
  22#include <linux/elf.h>
  23#include <linux/ptrace.h>
  24#include <linux/pagemap.h>
  25#include <linux/ratelimit.h>
  26#include <linux/syscalls.h>
  27#ifdef CONFIG_PPC64
  28#include <linux/compat.h>
  29#else
  30#include <linux/wait.h>
  31#include <linux/unistd.h>
  32#include <linux/stddef.h>
  33#include <linux/tty.h>
  34#include <linux/binfmts.h>
  35#endif
  36
  37#include <linux/uaccess.h>
  38#include <asm/cacheflush.h>
  39#include <asm/syscalls.h>
  40#include <asm/sigcontext.h>
  41#include <asm/vdso.h>
  42#include <asm/switch_to.h>
  43#include <asm/tm.h>
  44#include <asm/asm-prototypes.h>
  45#ifdef CONFIG_PPC64
  46#include <asm/syscalls_32.h>
  47#include <asm/unistd.h>
  48#else
  49#include <asm/ucontext.h>
  50#endif
  51
  52#include "signal.h"
  53
  54
  55#ifdef CONFIG_PPC64
  56#define old_sigaction	old_sigaction32
  57#define sigcontext	sigcontext32
  58#define mcontext	mcontext32
  59#define ucontext	ucontext32
  60
  61/*
  62 * Userspace code may pass a ucontext which doesn't include VSX added
  63 * at the end.  We need to check for this case.
  64 */
  65#define UCONTEXTSIZEWITHOUTVSX \
  66		(sizeof(struct ucontext) - sizeof(elf_vsrreghalf_t32))
  67
  68/*
  69 * Returning 0 means we return to userspace via
  70 * ret_from_except and thus restore all user
  71 * registers from *regs.  This is what we need
  72 * to do when a signal has been delivered.
  73 */
  74
  75#define GP_REGS_SIZE	min(sizeof(elf_gregset_t32), sizeof(struct pt_regs32))
  76#undef __SIGNAL_FRAMESIZE
  77#define __SIGNAL_FRAMESIZE	__SIGNAL_FRAMESIZE32
  78#undef ELF_NVRREG
  79#define ELF_NVRREG	ELF_NVRREG32
  80
  81/*
  82 * Functions for flipping sigsets (thanks to brain dead generic
  83 * implementation that makes things simple for little endian only)
  84 */
  85#define unsafe_put_sigset_t	unsafe_put_compat_sigset
  86#define unsafe_get_sigset_t	unsafe_get_compat_sigset
  87
  88#define to_user_ptr(p)		ptr_to_compat(p)
  89#define from_user_ptr(p)	compat_ptr(p)
  90
  91static __always_inline int
  92__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
  93{
  94	elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
  95	int val, i;
  96
  97	for (i = 0; i <= PT_RESULT; i ++) {
  98		/* Force usr to alway see softe as 1 (interrupts enabled) */
  99		if (i == PT_SOFTE)
 100			val = 1;
 101		else
 102			val = gregs[i];
 103
 104		unsafe_put_user(val, &frame->mc_gregs[i], failed);
 105	}
 106	return 0;
 107
 108failed:
 109	return 1;
 110}
 111
 112static __always_inline int
 113__unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
 114{
 115	elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
 116	int i;
 117
 118	for (i = 0; i <= PT_RESULT; i++) {
 119		if ((i == PT_MSR) || (i == PT_SOFTE))
 120			continue;
 121		unsafe_get_user(gregs[i], &sr->mc_gregs[i], failed);
 122	}
 123	return 0;
 124
 125failed:
 126	return 1;
 127}
 128
 129#else /* CONFIG_PPC64 */
 130
 131#define GP_REGS_SIZE	min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
 132
 133#define unsafe_put_sigset_t(uset, set, label) do {			\
 134	sigset_t __user *__us = uset	;				\
 135	const sigset_t *__s = set;					\
 136									\
 137	unsafe_copy_to_user(__us, __s, sizeof(*__us), label);		\
 138} while (0)
 139
 140#define unsafe_get_sigset_t	unsafe_get_user_sigset
 141
 142#define to_user_ptr(p)		((unsigned long)(p))
 143#define from_user_ptr(p)	((void __user *)(p))
 144
 145static __always_inline int
 146__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
 147{
 148	unsafe_copy_to_user(&frame->mc_gregs, regs, GP_REGS_SIZE, failed);
 149	return 0;
 150
 151failed:
 152	return 1;
 153}
 154
 155static __always_inline
 156int __unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
 157{
 158	/* copy up to but not including MSR */
 159	unsafe_copy_from_user(regs, &sr->mc_gregs, PT_MSR * sizeof(elf_greg_t), failed);
 160
 161	/* copy from orig_r3 (the word after the MSR) up to the end */
 162	unsafe_copy_from_user(&regs->orig_gpr3, &sr->mc_gregs[PT_ORIG_R3],
 163			      GP_REGS_SIZE - PT_ORIG_R3 * sizeof(elf_greg_t), failed);
 164
 165	return 0;
 166
 167failed:
 168	return 1;
 169}
 170#endif
 171
 172#define unsafe_save_general_regs(regs, frame, label) do {	\
 173	if (__unsafe_save_general_regs(regs, frame))		\
 174		goto label;					\
 175} while (0)
 176
 177#define unsafe_restore_general_regs(regs, frame, label) do {	\
 178	if (__unsafe_restore_general_regs(regs, frame))		\
 179		goto label;					\
 180} while (0)
 181
 182/*
 183 * When we have signals to deliver, we set up on the
 184 * user stack, going down from the original stack pointer:
 185 *	an ABI gap of 56 words
 186 *	an mcontext struct
 187 *	a sigcontext struct
 188 *	a gap of __SIGNAL_FRAMESIZE bytes
 189 *
 190 * Each of these things must be a multiple of 16 bytes in size. The following
 191 * structure represent all of this except the __SIGNAL_FRAMESIZE gap
 192 *
 193 */
 194struct sigframe {
 195	struct sigcontext sctx;		/* the sigcontext */
 196	struct mcontext	mctx;		/* all the register values */
 197#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 198	struct sigcontext sctx_transact;
 199	struct mcontext	mctx_transact;
 200#endif
 201	/*
 202	 * Programs using the rs6000/xcoff abi can save up to 19 gp
 203	 * regs and 18 fp regs below sp before decrementing it.
 204	 */
 205	int			abigap[56];
 206};
 207
 208/*
 209 *  When we have rt signals to deliver, we set up on the
 210 *  user stack, going down from the original stack pointer:
 211 *	one rt_sigframe struct (siginfo + ucontext + ABI gap)
 212 *	a gap of __SIGNAL_FRAMESIZE+16 bytes
 213 *  (the +16 is to get the siginfo and ucontext in the same
 214 *  positions as in older kernels).
 215 *
 216 *  Each of these things must be a multiple of 16 bytes in size.
 217 *
 218 */
 219struct rt_sigframe {
 220#ifdef CONFIG_PPC64
 221	compat_siginfo_t info;
 222#else
 223	struct siginfo info;
 224#endif
 225	struct ucontext	uc;
 226#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 227	struct ucontext	uc_transact;
 228#endif
 229	/*
 230	 * Programs using the rs6000/xcoff abi can save up to 19 gp
 231	 * regs and 18 fp regs below sp before decrementing it.
 232	 */
 233	int			abigap[56];
 234};
 235
 236unsigned long get_min_sigframe_size_32(void)
 237{
 238	return max(sizeof(struct rt_sigframe) + __SIGNAL_FRAMESIZE + 16,
 239		   sizeof(struct sigframe) + __SIGNAL_FRAMESIZE);
 240}
 241
 242/*
 243 * Save the current user registers on the user stack.
 244 * We only save the altivec/spe registers if the process has used
 245 * altivec/spe instructions at some point.
 246 */
 247static void prepare_save_user_regs(int ctx_has_vsx_region)
 248{
 249	/* Make sure floating point registers are stored in regs */
 250	flush_fp_to_thread(current);
 251#ifdef CONFIG_ALTIVEC
 252	if (current->thread.used_vr)
 253		flush_altivec_to_thread(current);
 254	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 255		current->thread.vrsave = mfspr(SPRN_VRSAVE);
 256#endif
 257#ifdef CONFIG_VSX
 258	if (current->thread.used_vsr && ctx_has_vsx_region)
 259		flush_vsx_to_thread(current);
 260#endif
 261#ifdef CONFIG_SPE
 262	if (current->thread.used_spe)
 263		flush_spe_to_thread(current);
 264#endif
 265}
 266
 267static __always_inline int
 268__unsafe_save_user_regs(struct pt_regs *regs, struct mcontext __user *frame,
 269			struct mcontext __user *tm_frame, int ctx_has_vsx_region)
 270{
 271	unsigned long msr = regs->msr;
 272
 273	/* save general registers */
 274	unsafe_save_general_regs(regs, frame, failed);
 275
 276#ifdef CONFIG_ALTIVEC
 277	/* save altivec registers */
 278	if (current->thread.used_vr) {
 279		unsafe_copy_to_user(&frame->mc_vregs, &current->thread.vr_state,
 280				    ELF_NVRREG * sizeof(vector128), failed);
 281		/* set MSR_VEC in the saved MSR value to indicate that
 282		   frame->mc_vregs contains valid data */
 283		msr |= MSR_VEC;
 284	}
 285	/* else assert((regs->msr & MSR_VEC) == 0) */
 286
 287	/* We always copy to/from vrsave, it's 0 if we don't have or don't
 288	 * use altivec. Since VSCR only contains 32 bits saved in the least
 289	 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
 290	 * most significant bits of that same vector. --BenH
 291	 * Note that the current VRSAVE value is in the SPR at this point.
 292	 */
 293	unsafe_put_user(current->thread.vrsave, (u32 __user *)&frame->mc_vregs[32],
 294			failed);
 295#endif /* CONFIG_ALTIVEC */
 296	unsafe_copy_fpr_to_user(&frame->mc_fregs, current, failed);
 297
 298	/*
 299	 * Clear the MSR VSX bit to indicate there is no valid state attached
 300	 * to this context, except in the specific case below where we set it.
 301	 */
 302	msr &= ~MSR_VSX;
 303#ifdef CONFIG_VSX
 304	/*
 305	 * Copy VSR 0-31 upper half from thread_struct to local
 306	 * buffer, then write that to userspace.  Also set MSR_VSX in
 307	 * the saved MSR value to indicate that frame->mc_vregs
 308	 * contains valid data
 309	 */
 310	if (current->thread.used_vsr && ctx_has_vsx_region) {
 311		unsafe_copy_vsx_to_user(&frame->mc_vsregs, current, failed);
 312		msr |= MSR_VSX;
 313	}
 314#endif /* CONFIG_VSX */
 315#ifdef CONFIG_SPE
 316	/* save spe registers */
 317	if (current->thread.used_spe) {
 318		unsafe_copy_to_user(&frame->mc_vregs, current->thread.evr,
 319				    ELF_NEVRREG * sizeof(u32), failed);
 320		/* set MSR_SPE in the saved MSR value to indicate that
 321		   frame->mc_vregs contains valid data */
 322		msr |= MSR_SPE;
 323	}
 324	/* else assert((regs->msr & MSR_SPE) == 0) */
 325
 326	/* We always copy to/from spefscr */
 327	unsafe_put_user(current->thread.spefscr,
 328			(u32 __user *)&frame->mc_vregs + ELF_NEVRREG, failed);
 329#endif /* CONFIG_SPE */
 330
 331	unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
 332
 333	/* We need to write 0 the MSR top 32 bits in the tm frame so that we
 334	 * can check it on the restore to see if TM is active
 335	 */
 336	if (tm_frame)
 337		unsafe_put_user(0, &tm_frame->mc_gregs[PT_MSR], failed);
 338
 339	return 0;
 340
 341failed:
 342	return 1;
 343}
 344
 345#define unsafe_save_user_regs(regs, frame, tm_frame, has_vsx, label) do { \
 346	if (__unsafe_save_user_regs(regs, frame, tm_frame, has_vsx))	\
 347		goto label;						\
 348} while (0)
 349
 350#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 351/*
 352 * Save the current user registers on the user stack.
 353 * We only save the altivec/spe registers if the process has used
 354 * altivec/spe instructions at some point.
 355 * We also save the transactional registers to a second ucontext in the
 356 * frame.
 357 *
 358 * See __unsafe_save_user_regs() and signal_64.c:setup_tm_sigcontexts().
 359 */
 360static void prepare_save_tm_user_regs(void)
 361{
 362	WARN_ON(tm_suspend_disabled);
 363
 364	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 365		current->thread.ckvrsave = mfspr(SPRN_VRSAVE);
 366}
 367
 368static __always_inline int
 369save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
 370			 struct mcontext __user *tm_frame, unsigned long msr)
 371{
 372	/* Save both sets of general registers */
 373	unsafe_save_general_regs(&current->thread.ckpt_regs, frame, failed);
 374	unsafe_save_general_regs(regs, tm_frame, failed);
 375
 376	/* Stash the top half of the 64bit MSR into the 32bit MSR word
 377	 * of the transactional mcontext.  This way we have a backward-compatible
 378	 * MSR in the 'normal' (checkpointed) mcontext and additionally one can
 379	 * also look at what type of transaction (T or S) was active at the
 380	 * time of the signal.
 381	 */
 382	unsafe_put_user((msr >> 32), &tm_frame->mc_gregs[PT_MSR], failed);
 383
 384	/* save altivec registers */
 385	if (current->thread.used_vr) {
 386		unsafe_copy_to_user(&frame->mc_vregs, &current->thread.ckvr_state,
 387				    ELF_NVRREG * sizeof(vector128), failed);
 388		if (msr & MSR_VEC)
 389			unsafe_copy_to_user(&tm_frame->mc_vregs,
 390					    &current->thread.vr_state,
 391					    ELF_NVRREG * sizeof(vector128), failed);
 392		else
 393			unsafe_copy_to_user(&tm_frame->mc_vregs,
 394					    &current->thread.ckvr_state,
 395					    ELF_NVRREG * sizeof(vector128), failed);
 396
 397		/* set MSR_VEC in the saved MSR value to indicate that
 398		 * frame->mc_vregs contains valid data
 399		 */
 400		msr |= MSR_VEC;
 401	}
 402
 403	/* We always copy to/from vrsave, it's 0 if we don't have or don't
 404	 * use altivec. Since VSCR only contains 32 bits saved in the least
 405	 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
 406	 * most significant bits of that same vector. --BenH
 407	 */
 408	unsafe_put_user(current->thread.ckvrsave,
 409			(u32 __user *)&frame->mc_vregs[32], failed);
 410	if (msr & MSR_VEC)
 411		unsafe_put_user(current->thread.vrsave,
 412				(u32 __user *)&tm_frame->mc_vregs[32], failed);
 413	else
 414		unsafe_put_user(current->thread.ckvrsave,
 415				(u32 __user *)&tm_frame->mc_vregs[32], failed);
 416
 417	unsafe_copy_ckfpr_to_user(&frame->mc_fregs, current, failed);
 418	if (msr & MSR_FP)
 419		unsafe_copy_fpr_to_user(&tm_frame->mc_fregs, current, failed);
 420	else
 421		unsafe_copy_ckfpr_to_user(&tm_frame->mc_fregs, current, failed);
 422
 423	/*
 424	 * Copy VSR 0-31 upper half from thread_struct to local
 425	 * buffer, then write that to userspace.  Also set MSR_VSX in
 426	 * the saved MSR value to indicate that frame->mc_vregs
 427	 * contains valid data
 428	 */
 429	if (current->thread.used_vsr) {
 430		unsafe_copy_ckvsx_to_user(&frame->mc_vsregs, current, failed);
 431		if (msr & MSR_VSX)
 432			unsafe_copy_vsx_to_user(&tm_frame->mc_vsregs, current, failed);
 433		else
 434			unsafe_copy_ckvsx_to_user(&tm_frame->mc_vsregs, current, failed);
 435
 436		msr |= MSR_VSX;
 437	}
 438
 439	unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
 440
 441	return 0;
 442
 443failed:
 444	return 1;
 445}
 446#else
 447static void prepare_save_tm_user_regs(void) { }
 448
 449static __always_inline int
 450save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
 451			 struct mcontext __user *tm_frame, unsigned long msr)
 452{
 453	return 0;
 454}
 455#endif
 456
 457#define unsafe_save_tm_user_regs(regs, frame, tm_frame, msr, label) do { \
 458	if (save_tm_user_regs_unsafe(regs, frame, tm_frame, msr))	\
 459		goto label;						\
 460} while (0)
 461
 462/*
 463 * Restore the current user register values from the user stack,
 464 * (except for MSR).
 465 */
 466static long restore_user_regs(struct pt_regs *regs,
 467			      struct mcontext __user *sr, int sig)
 468{
 469	unsigned int save_r2 = 0;
 470	unsigned long msr;
 471#ifdef CONFIG_VSX
 472	int i;
 473#endif
 474
 475	if (!user_read_access_begin(sr, sizeof(*sr)))
 476		return 1;
 477	/*
 478	 * restore general registers but not including MSR or SOFTE. Also
 479	 * take care of keeping r2 (TLS) intact if not a signal
 480	 */
 481	if (!sig)
 482		save_r2 = (unsigned int)regs->gpr[2];
 483	unsafe_restore_general_regs(regs, sr, failed);
 484	set_trap_norestart(regs);
 485	unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
 486	if (!sig)
 487		regs->gpr[2] = (unsigned long) save_r2;
 488
 489	/* if doing signal return, restore the previous little-endian mode */
 490	if (sig)
 491		regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
 492
 493#ifdef CONFIG_ALTIVEC
 494	/*
 495	 * Force the process to reload the altivec registers from
 496	 * current->thread when it next does altivec instructions
 497	 */
 498	regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
 499	if (msr & MSR_VEC) {
 500		/* restore altivec registers from the stack */
 501		unsafe_copy_from_user(&current->thread.vr_state, &sr->mc_vregs,
 502				      sizeof(sr->mc_vregs), failed);
 503		current->thread.used_vr = true;
 504	} else if (current->thread.used_vr)
 505		memset(&current->thread.vr_state, 0,
 506		       ELF_NVRREG * sizeof(vector128));
 507
 508	/* Always get VRSAVE back */
 509	unsafe_get_user(current->thread.vrsave, (u32 __user *)&sr->mc_vregs[32], failed);
 510	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 511		mtspr(SPRN_VRSAVE, current->thread.vrsave);
 512#endif /* CONFIG_ALTIVEC */
 513	unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
 514
 515#ifdef CONFIG_VSX
 516	/*
 517	 * Force the process to reload the VSX registers from
 518	 * current->thread when it next does VSX instruction.
 519	 */
 520	regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
 521	if (msr & MSR_VSX) {
 522		/*
 523		 * Restore altivec registers from the stack to a local
 524		 * buffer, then write this out to the thread_struct
 525		 */
 526		unsafe_copy_vsx_from_user(current, &sr->mc_vsregs, failed);
 527		current->thread.used_vsr = true;
 528	} else if (current->thread.used_vsr)
 529		for (i = 0; i < 32 ; i++)
 530			current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
 531#endif /* CONFIG_VSX */
 532	/*
 533	 * force the process to reload the FP registers from
 534	 * current->thread when it next does FP instructions
 535	 */
 536	regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
 537
 538#ifdef CONFIG_SPE
 539	/*
 540	 * Force the process to reload the spe registers from
 541	 * current->thread when it next does spe instructions.
 542	 * Since this is user ABI, we must enforce the sizing.
 543	 */
 544	BUILD_BUG_ON(sizeof(current->thread.spe) != ELF_NEVRREG * sizeof(u32));
 545	regs_set_return_msr(regs, regs->msr & ~MSR_SPE);
 546	if (msr & MSR_SPE) {
 547		/* restore spe registers from the stack */
 548		unsafe_copy_from_user(&current->thread.spe, &sr->mc_vregs,
 549				      sizeof(current->thread.spe), failed);
 550		current->thread.used_spe = true;
 551	} else if (current->thread.used_spe)
 552		memset(&current->thread.spe, 0, sizeof(current->thread.spe));
 553
 554	/* Always get SPEFSCR back */
 555	unsafe_get_user(current->thread.spefscr, (u32 __user *)&sr->mc_vregs + ELF_NEVRREG, failed);
 556#endif /* CONFIG_SPE */
 557
 558	user_read_access_end();
 559	return 0;
 560
 561failed:
 562	user_read_access_end();
 563	return 1;
 564}
 565
 566#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 567/*
 568 * Restore the current user register values from the user stack, except for
 569 * MSR, and recheckpoint the original checkpointed register state for processes
 570 * in transactions.
 571 */
 572static long restore_tm_user_regs(struct pt_regs *regs,
 573				 struct mcontext __user *sr,
 574				 struct mcontext __user *tm_sr)
 575{
 576	unsigned long msr, msr_hi;
 577	int i;
 578
 579	if (tm_suspend_disabled)
 580		return 1;
 581	/*
 582	 * restore general registers but not including MSR or SOFTE. Also
 583	 * take care of keeping r2 (TLS) intact if not a signal.
 584	 * See comment in signal_64.c:restore_tm_sigcontexts();
 585	 * TFHAR is restored from the checkpointed NIP; TEXASR and TFIAR
 586	 * were set by the signal delivery.
 587	 */
 588	if (!user_read_access_begin(sr, sizeof(*sr)))
 589		return 1;
 590
 591	unsafe_restore_general_regs(&current->thread.ckpt_regs, sr, failed);
 592	unsafe_get_user(current->thread.tm_tfhar, &sr->mc_gregs[PT_NIP], failed);
 593	unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
 594
 595	/* Restore the previous little-endian mode */
 596	regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
 597
 598	regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
 599	if (msr & MSR_VEC) {
 600		/* restore altivec registers from the stack */
 601		unsafe_copy_from_user(&current->thread.ckvr_state, &sr->mc_vregs,
 602				      sizeof(sr->mc_vregs), failed);
 603		current->thread.used_vr = true;
 604	} else if (current->thread.used_vr) {
 605		memset(&current->thread.vr_state, 0,
 606		       ELF_NVRREG * sizeof(vector128));
 607		memset(&current->thread.ckvr_state, 0,
 608		       ELF_NVRREG * sizeof(vector128));
 609	}
 610
 611	/* Always get VRSAVE back */
 612	unsafe_get_user(current->thread.ckvrsave,
 613			(u32 __user *)&sr->mc_vregs[32], failed);
 614	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 615		mtspr(SPRN_VRSAVE, current->thread.ckvrsave);
 616
 617	regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
 618
 619	unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
 620
 621	regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
 622	if (msr & MSR_VSX) {
 623		/*
 624		 * Restore altivec registers from the stack to a local
 625		 * buffer, then write this out to the thread_struct
 626		 */
 627		unsafe_copy_ckvsx_from_user(current, &sr->mc_vsregs, failed);
 628		current->thread.used_vsr = true;
 629	} else if (current->thread.used_vsr)
 630		for (i = 0; i < 32 ; i++) {
 631			current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
 632			current->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
 633		}
 634
 635	user_read_access_end();
 636
 637	if (!user_read_access_begin(tm_sr, sizeof(*tm_sr)))
 638		return 1;
 639
 640	unsafe_restore_general_regs(regs, tm_sr, failed);
 641
 642	/* restore altivec registers from the stack */
 643	if (msr & MSR_VEC)
 644		unsafe_copy_from_user(&current->thread.vr_state, &tm_sr->mc_vregs,
 645				      sizeof(sr->mc_vregs), failed);
 646
 647	/* Always get VRSAVE back */
 648	unsafe_get_user(current->thread.vrsave,
 649			(u32 __user *)&tm_sr->mc_vregs[32], failed);
 650
 651	unsafe_copy_ckfpr_from_user(current, &tm_sr->mc_fregs, failed);
 652
 653	if (msr & MSR_VSX) {
 654		/*
 655		 * Restore altivec registers from the stack to a local
 656		 * buffer, then write this out to the thread_struct
 657		 */
 658		unsafe_copy_vsx_from_user(current, &tm_sr->mc_vsregs, failed);
 659		current->thread.used_vsr = true;
 660	}
 661
 662	/* Get the top half of the MSR from the user context */
 663	unsafe_get_user(msr_hi, &tm_sr->mc_gregs[PT_MSR], failed);
 664	msr_hi <<= 32;
 665
 666	user_read_access_end();
 667
 668	/* If TM bits are set to the reserved value, it's an invalid context */
 669	if (MSR_TM_RESV(msr_hi))
 670		return 1;
 671
 672	/*
 673	 * Disabling preemption, since it is unsafe to be preempted
 674	 * with MSR[TS] set without recheckpointing.
 675	 */
 676	preempt_disable();
 677
 678	/*
 679	 * CAUTION:
 680	 * After regs->MSR[TS] being updated, make sure that get_user(),
 681	 * put_user() or similar functions are *not* called. These
 682	 * functions can generate page faults which will cause the process
 683	 * to be de-scheduled with MSR[TS] set but without calling
 684	 * tm_recheckpoint(). This can cause a bug.
 685	 *
 686	 * Pull in the MSR TM bits from the user context
 687	 */
 688	regs_set_return_msr(regs, (regs->msr & ~MSR_TS_MASK) | (msr_hi & MSR_TS_MASK));
 689	/* Now, recheckpoint.  This loads up all of the checkpointed (older)
 690	 * registers, including FP and V[S]Rs.  After recheckpointing, the
 691	 * transactional versions should be loaded.
 692	 */
 693	tm_enable();
 694	/* Make sure the transaction is marked as failed */
 695	current->thread.tm_texasr |= TEXASR_FS;
 696	/* This loads the checkpointed FP/VEC state, if used */
 697	tm_recheckpoint(&current->thread);
 698
 699	/* This loads the speculative FP/VEC state, if used */
 700	msr_check_and_set(msr & (MSR_FP | MSR_VEC));
 701	if (msr & MSR_FP) {
 702		load_fp_state(&current->thread.fp_state);
 703		regs_set_return_msr(regs, regs->msr | (MSR_FP | current->thread.fpexc_mode));
 704	}
 705	if (msr & MSR_VEC) {
 706		load_vr_state(&current->thread.vr_state);
 707		regs_set_return_msr(regs, regs->msr | MSR_VEC);
 708	}
 709
 710	preempt_enable();
 711
 712	return 0;
 713
 714failed:
 715	user_read_access_end();
 716	return 1;
 717}
 718#else
 719static long restore_tm_user_regs(struct pt_regs *regs, struct mcontext __user *sr,
 720				 struct mcontext __user *tm_sr)
 721{
 722	return 0;
 723}
 724#endif
 725
 726#ifdef CONFIG_PPC64
 727
 728#define copy_siginfo_to_user	copy_siginfo_to_user32
 729
 730#endif /* CONFIG_PPC64 */
 731
 732/*
 733 * Set up a signal frame for a "real-time" signal handler
 734 * (one which gets siginfo).
 735 */
 736int handle_rt_signal32(struct ksignal *ksig, sigset_t *oldset,
 737		       struct task_struct *tsk)
 738{
 739	struct rt_sigframe __user *frame;
 740	struct mcontext __user *mctx;
 741	struct mcontext __user *tm_mctx = NULL;
 742	unsigned long newsp = 0;
 743	unsigned long tramp;
 744	struct pt_regs *regs = tsk->thread.regs;
 745	/* Save the thread's msr before get_tm_stackpointer() changes it */
 746	unsigned long msr = regs->msr;
 747
 748	/* Set up Signal Frame */
 749	frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
 750	mctx = &frame->uc.uc_mcontext;
 751#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 752	tm_mctx = &frame->uc_transact.uc_mcontext;
 753#endif
 754	if (MSR_TM_ACTIVE(msr))
 755		prepare_save_tm_user_regs();
 756	else
 757		prepare_save_user_regs(1);
 758
 759	if (!user_access_begin(frame, sizeof(*frame)))
 760		goto badframe;
 761
 762	/* Put the siginfo & fill in most of the ucontext */
 763	unsafe_put_user(0, &frame->uc.uc_flags, failed);
 764#ifdef CONFIG_PPC64
 765	unsafe_compat_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
 766#else
 767	unsafe_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
 768#endif
 769	unsafe_put_user(to_user_ptr(&frame->uc.uc_mcontext), &frame->uc.uc_regs, failed);
 770
 771	if (MSR_TM_ACTIVE(msr)) {
 772#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 773		unsafe_put_user((unsigned long)&frame->uc_transact,
 774				&frame->uc.uc_link, failed);
 775		unsafe_put_user((unsigned long)tm_mctx,
 776				&frame->uc_transact.uc_regs, failed);
 777#endif
 778		unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
 779	} else {
 780		unsafe_put_user(0, &frame->uc.uc_link, failed);
 781		unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
 782	}
 783
 784	/* Save user registers on the stack */
 785	if (tsk->mm->context.vdso) {
 786		tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp_rt32);
 787	} else {
 788		tramp = (unsigned long)mctx->mc_pad;
 789		unsafe_put_user(PPC_RAW_LI(_R0, __NR_rt_sigreturn), &mctx->mc_pad[0], failed);
 790		unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
 791		asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
 792	}
 793	unsafe_put_sigset_t(&frame->uc.uc_sigmask, oldset, failed);
 794
 795	user_access_end();
 796
 797	if (copy_siginfo_to_user(&frame->info, &ksig->info))
 798		goto badframe;
 799
 800	regs->link = tramp;
 801
 802#ifdef CONFIG_PPC_FPU_REGS
 803	tsk->thread.fp_state.fpscr = 0;	/* turn off all fp exceptions */
 804#endif
 805
 806	/* create a stack frame for the caller of the handler */
 807	newsp = ((unsigned long)frame) - (__SIGNAL_FRAMESIZE + 16);
 808	if (put_user(regs->gpr[1], (u32 __user *)newsp))
 809		goto badframe;
 810
 811	/* Fill registers for signal handler */
 812	regs->gpr[1] = newsp;
 813	regs->gpr[3] = ksig->sig;
 814	regs->gpr[4] = (unsigned long)&frame->info;
 815	regs->gpr[5] = (unsigned long)&frame->uc;
 816	regs->gpr[6] = (unsigned long)frame;
 817	regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
 818	/* enter the signal handler in native-endian mode */
 819	regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
 820
 821	return 0;
 822
 823failed:
 824	user_access_end();
 825
 826badframe:
 827	signal_fault(tsk, regs, "handle_rt_signal32", frame);
 828
 829	return 1;
 830}
 831
 832/*
 833 * OK, we're invoking a handler
 834 */
 835int handle_signal32(struct ksignal *ksig, sigset_t *oldset,
 836		struct task_struct *tsk)
 837{
 838	struct sigcontext __user *sc;
 839	struct sigframe __user *frame;
 840	struct mcontext __user *mctx;
 841	struct mcontext __user *tm_mctx = NULL;
 842	unsigned long newsp = 0;
 843	unsigned long tramp;
 844	struct pt_regs *regs = tsk->thread.regs;
 845	/* Save the thread's msr before get_tm_stackpointer() changes it */
 846	unsigned long msr = regs->msr;
 847
 848	/* Set up Signal Frame */
 849	frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
 850	mctx = &frame->mctx;
 851#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 852	tm_mctx = &frame->mctx_transact;
 853#endif
 854	if (MSR_TM_ACTIVE(msr))
 855		prepare_save_tm_user_regs();
 856	else
 857		prepare_save_user_regs(1);
 858
 859	if (!user_access_begin(frame, sizeof(*frame)))
 860		goto badframe;
 861	sc = (struct sigcontext __user *) &frame->sctx;
 862
 863#if _NSIG != 64
 864#error "Please adjust handle_signal()"
 865#endif
 866	unsafe_put_user(to_user_ptr(ksig->ka.sa.sa_handler), &sc->handler, failed);
 867	unsafe_put_user(oldset->sig[0], &sc->oldmask, failed);
 868#ifdef CONFIG_PPC64
 869	unsafe_put_user((oldset->sig[0] >> 32), &sc->_unused[3], failed);
 870#else
 871	unsafe_put_user(oldset->sig[1], &sc->_unused[3], failed);
 872#endif
 873	unsafe_put_user(to_user_ptr(mctx), &sc->regs, failed);
 874	unsafe_put_user(ksig->sig, &sc->signal, failed);
 875
 876	if (MSR_TM_ACTIVE(msr))
 877		unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
 878	else
 879		unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
 880
 881	if (tsk->mm->context.vdso) {
 882		tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp32);
 883	} else {
 884		tramp = (unsigned long)mctx->mc_pad;
 885		unsafe_put_user(PPC_RAW_LI(_R0, __NR_sigreturn), &mctx->mc_pad[0], failed);
 886		unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
 887		asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
 888	}
 889	user_access_end();
 890
 891	regs->link = tramp;
 892
 893#ifdef CONFIG_PPC_FPU_REGS
 894	tsk->thread.fp_state.fpscr = 0;	/* turn off all fp exceptions */
 895#endif
 896
 897	/* create a stack frame for the caller of the handler */
 898	newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
 899	if (put_user(regs->gpr[1], (u32 __user *)newsp))
 900		goto badframe;
 901
 902	regs->gpr[1] = newsp;
 903	regs->gpr[3] = ksig->sig;
 904	regs->gpr[4] = (unsigned long) sc;
 905	regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
 906	/* enter the signal handler in native-endian mode */
 907	regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
 908
 909	return 0;
 910
 911failed:
 912	user_access_end();
 913
 914badframe:
 915	signal_fault(tsk, regs, "handle_signal32", frame);
 916
 917	return 1;
 918}
 919
 920static int do_setcontext(struct ucontext __user *ucp, struct pt_regs *regs, int sig)
 921{
 922	sigset_t set;
 923	struct mcontext __user *mcp;
 924
 925	if (!user_read_access_begin(ucp, sizeof(*ucp)))
 926		return -EFAULT;
 927
 928	unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
 929#ifdef CONFIG_PPC64
 930	{
 931		u32 cmcp;
 932
 933		unsafe_get_user(cmcp, &ucp->uc_regs, failed);
 934		mcp = (struct mcontext __user *)(u64)cmcp;
 935	}
 936#else
 937	unsafe_get_user(mcp, &ucp->uc_regs, failed);
 938#endif
 939	user_read_access_end();
 940
 941	set_current_blocked(&set);
 942	if (restore_user_regs(regs, mcp, sig))
 943		return -EFAULT;
 944
 945	return 0;
 946
 947failed:
 948	user_read_access_end();
 949	return -EFAULT;
 950}
 951
 952#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 953static int do_setcontext_tm(struct ucontext __user *ucp,
 954			    struct ucontext __user *tm_ucp,
 955			    struct pt_regs *regs)
 956{
 957	sigset_t set;
 958	struct mcontext __user *mcp;
 959	struct mcontext __user *tm_mcp;
 960	u32 cmcp;
 961	u32 tm_cmcp;
 962
 963	if (!user_read_access_begin(ucp, sizeof(*ucp)))
 964		return -EFAULT;
 965
 966	unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
 967	unsafe_get_user(cmcp, &ucp->uc_regs, failed);
 968
 969	user_read_access_end();
 970
 971	if (__get_user(tm_cmcp, &tm_ucp->uc_regs))
 972		return -EFAULT;
 973	mcp = (struct mcontext __user *)(u64)cmcp;
 974	tm_mcp = (struct mcontext __user *)(u64)tm_cmcp;
 975	/* no need to check access_ok(mcp), since mcp < 4GB */
 976
 977	set_current_blocked(&set);
 978	if (restore_tm_user_regs(regs, mcp, tm_mcp))
 979		return -EFAULT;
 980
 981	return 0;
 982
 983failed:
 984	user_read_access_end();
 985	return -EFAULT;
 986}
 987#endif
 988
 989#ifdef CONFIG_PPC64
 990COMPAT_SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
 991		       struct ucontext __user *, new_ctx, int, ctx_size)
 992#else
 993SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
 994		       struct ucontext __user *, new_ctx, long, ctx_size)
 995#endif
 996{
 997	struct pt_regs *regs = current_pt_regs();
 998	int ctx_has_vsx_region = 0;
 999
1000#ifdef CONFIG_PPC64
1001	unsigned long new_msr = 0;
1002
1003	if (new_ctx) {
1004		struct mcontext __user *mcp;
1005		u32 cmcp;
1006
1007		/*
1008		 * Get pointer to the real mcontext.  No need for
1009		 * access_ok since we are dealing with compat
1010		 * pointers.
1011		 */
1012		if (__get_user(cmcp, &new_ctx->uc_regs))
1013			return -EFAULT;
1014		mcp = (struct mcontext __user *)(u64)cmcp;
1015		if (__get_user(new_msr, &mcp->mc_gregs[PT_MSR]))
1016			return -EFAULT;
1017	}
1018	/*
1019	 * Check that the context is not smaller than the original
1020	 * size (with VMX but without VSX)
1021	 */
1022	if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
1023		return -EINVAL;
1024	/*
1025	 * If the new context state sets the MSR VSX bits but
1026	 * it doesn't provide VSX state.
1027	 */
1028	if ((ctx_size < sizeof(struct ucontext)) &&
1029	    (new_msr & MSR_VSX))
1030		return -EINVAL;
1031	/* Does the context have enough room to store VSX data? */
1032	if (ctx_size >= sizeof(struct ucontext))
1033		ctx_has_vsx_region = 1;
1034#else
1035	/* Context size is for future use. Right now, we only make sure
1036	 * we are passed something we understand
1037	 */
1038	if (ctx_size < sizeof(struct ucontext))
1039		return -EINVAL;
1040#endif
1041	if (old_ctx != NULL) {
1042		struct mcontext __user *mctx;
1043
1044		/*
1045		 * old_ctx might not be 16-byte aligned, in which
1046		 * case old_ctx->uc_mcontext won't be either.
1047		 * Because we have the old_ctx->uc_pad2 field
1048		 * before old_ctx->uc_mcontext, we need to round down
1049		 * from &old_ctx->uc_mcontext to a 16-byte boundary.
1050		 */
1051		mctx = (struct mcontext __user *)
1052			((unsigned long) &old_ctx->uc_mcontext & ~0xfUL);
1053		prepare_save_user_regs(ctx_has_vsx_region);
1054		if (!user_write_access_begin(old_ctx, ctx_size))
1055			return -EFAULT;
1056		unsafe_save_user_regs(regs, mctx, NULL, ctx_has_vsx_region, failed);
1057		unsafe_put_sigset_t(&old_ctx->uc_sigmask, &current->blocked, failed);
1058		unsafe_put_user(to_user_ptr(mctx), &old_ctx->uc_regs, failed);
1059		user_write_access_end();
1060	}
1061	if (new_ctx == NULL)
1062		return 0;
1063	if (!access_ok(new_ctx, ctx_size) ||
1064	    fault_in_readable((char __user *)new_ctx, ctx_size))
1065		return -EFAULT;
1066
1067	/*
1068	 * If we get a fault copying the context into the kernel's
1069	 * image of the user's registers, we can't just return -EFAULT
1070	 * because the user's registers will be corrupted.  For instance
1071	 * the NIP value may have been updated but not some of the
1072	 * other registers.  Given that we have done the access_ok
1073	 * and successfully read the first and last bytes of the region
1074	 * above, this should only happen in an out-of-memory situation
1075	 * or if another thread unmaps the region containing the context.
1076	 * We kill the task with a SIGSEGV in this situation.
1077	 */
1078	if (do_setcontext(new_ctx, regs, 0)) {
1079		force_exit_sig(SIGSEGV);
1080		return -EFAULT;
1081	}
1082
1083	set_thread_flag(TIF_RESTOREALL);
1084	return 0;
1085
1086failed:
1087	user_write_access_end();
1088	return -EFAULT;
1089}
1090
1091#ifdef CONFIG_PPC64
1092COMPAT_SYSCALL_DEFINE0(rt_sigreturn)
1093#else
1094SYSCALL_DEFINE0(rt_sigreturn)
1095#endif
1096{
1097	struct rt_sigframe __user *rt_sf;
1098	struct pt_regs *regs = current_pt_regs();
1099	int tm_restore = 0;
1100#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1101	struct ucontext __user *uc_transact;
1102	unsigned long msr_hi;
1103	unsigned long tmp;
1104#endif
1105	/* Always make any pending restarted system calls return -EINTR */
1106	current->restart_block.fn = do_no_restart_syscall;
1107
1108	rt_sf = (struct rt_sigframe __user *)
1109		(regs->gpr[1] + __SIGNAL_FRAMESIZE + 16);
1110	if (!access_ok(rt_sf, sizeof(*rt_sf)))
1111		goto bad;
1112
1113#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1114	/*
1115	 * If there is a transactional state then throw it away.
1116	 * The purpose of a sigreturn is to destroy all traces of the
1117	 * signal frame, this includes any transactional state created
1118	 * within in. We only check for suspended as we can never be
1119	 * active in the kernel, we are active, there is nothing better to
1120	 * do than go ahead and Bad Thing later.
1121	 * The cause is not important as there will never be a
1122	 * recheckpoint so it's not user visible.
1123	 */
1124	if (MSR_TM_SUSPENDED(mfmsr()))
1125		tm_reclaim_current(0);
1126
1127	if (__get_user(tmp, &rt_sf->uc.uc_link))
1128		goto bad;
1129	uc_transact = (struct ucontext __user *)(uintptr_t)tmp;
1130	if (uc_transact) {
1131		u32 cmcp;
1132		struct mcontext __user *mcp;
1133
1134		if (__get_user(cmcp, &uc_transact->uc_regs))
1135			return -EFAULT;
1136		mcp = (struct mcontext __user *)(u64)cmcp;
1137		/* The top 32 bits of the MSR are stashed in the transactional
1138		 * ucontext. */
1139		if (__get_user(msr_hi, &mcp->mc_gregs[PT_MSR]))
1140			goto bad;
1141
1142		if (MSR_TM_ACTIVE(msr_hi<<32)) {
1143			/* Trying to start TM on non TM system */
1144			if (!cpu_has_feature(CPU_FTR_TM))
1145				goto bad;
1146			/* We only recheckpoint on return if we're
1147			 * transaction.
1148			 */
1149			tm_restore = 1;
1150			if (do_setcontext_tm(&rt_sf->uc, uc_transact, regs))
1151				goto bad;
1152		}
1153	}
1154	if (!tm_restore) {
1155		/*
1156		 * Unset regs->msr because ucontext MSR TS is not
1157		 * set, and recheckpoint was not called. This avoid
1158		 * hitting a TM Bad thing at RFID
1159		 */
1160		regs_set_return_msr(regs, regs->msr & ~MSR_TS_MASK);
1161	}
1162	/* Fall through, for non-TM restore */
1163#endif
1164	if (!tm_restore)
1165		if (do_setcontext(&rt_sf->uc, regs, 1))
1166			goto bad;
1167
1168	/*
1169	 * It's not clear whether or why it is desirable to save the
1170	 * sigaltstack setting on signal delivery and restore it on
1171	 * signal return.  But other architectures do this and we have
1172	 * always done it up until now so it is probably better not to
1173	 * change it.  -- paulus
1174	 */
1175#ifdef CONFIG_PPC64
1176	if (compat_restore_altstack(&rt_sf->uc.uc_stack))
1177		goto bad;
1178#else
1179	if (restore_altstack(&rt_sf->uc.uc_stack))
1180		goto bad;
1181#endif
1182	set_thread_flag(TIF_RESTOREALL);
1183	return 0;
1184
1185 bad:
1186	signal_fault(current, regs, "sys_rt_sigreturn", rt_sf);
1187
1188	force_sig(SIGSEGV);
1189	return 0;
1190}
1191
1192#ifdef CONFIG_PPC32
1193SYSCALL_DEFINE3(debug_setcontext, struct ucontext __user *, ctx,
1194			 int, ndbg, struct sig_dbg_op __user *, dbg)
1195{
1196	struct pt_regs *regs = current_pt_regs();
1197	struct sig_dbg_op op;
1198	int i;
1199	unsigned long new_msr = regs->msr;
1200#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1201	unsigned long new_dbcr0 = current->thread.debug.dbcr0;
1202#endif
1203
1204	for (i=0; i<ndbg; i++) {
1205		if (copy_from_user(&op, dbg + i, sizeof(op)))
1206			return -EFAULT;
1207		switch (op.dbg_type) {
1208		case SIG_DBG_SINGLE_STEPPING:
1209#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1210			if (op.dbg_value) {
1211				new_msr |= MSR_DE;
1212				new_dbcr0 |= (DBCR0_IDM | DBCR0_IC);
1213			} else {
1214				new_dbcr0 &= ~DBCR0_IC;
1215				if (!DBCR_ACTIVE_EVENTS(new_dbcr0,
1216						current->thread.debug.dbcr1)) {
1217					new_msr &= ~MSR_DE;
1218					new_dbcr0 &= ~DBCR0_IDM;
1219				}
1220			}
1221#else
1222			if (op.dbg_value)
1223				new_msr |= MSR_SE;
1224			else
1225				new_msr &= ~MSR_SE;
1226#endif
1227			break;
1228		case SIG_DBG_BRANCH_TRACING:
1229#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1230			return -EINVAL;
1231#else
1232			if (op.dbg_value)
1233				new_msr |= MSR_BE;
1234			else
1235				new_msr &= ~MSR_BE;
1236#endif
1237			break;
1238
1239		default:
1240			return -EINVAL;
1241		}
1242	}
1243
1244	/* We wait until here to actually install the values in the
1245	   registers so if we fail in the above loop, it will not
1246	   affect the contents of these registers.  After this point,
1247	   failure is a problem, anyway, and it's very unlikely unless
1248	   the user is really doing something wrong. */
1249	regs_set_return_msr(regs, new_msr);
1250#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1251	current->thread.debug.dbcr0 = new_dbcr0;
1252#endif
1253
1254	if (!access_ok(ctx, sizeof(*ctx)) ||
1255	    fault_in_readable((char __user *)ctx, sizeof(*ctx)))
1256		return -EFAULT;
1257
1258	/*
1259	 * If we get a fault copying the context into the kernel's
1260	 * image of the user's registers, we can't just return -EFAULT
1261	 * because the user's registers will be corrupted.  For instance
1262	 * the NIP value may have been updated but not some of the
1263	 * other registers.  Given that we have done the access_ok
1264	 * and successfully read the first and last bytes of the region
1265	 * above, this should only happen in an out-of-memory situation
1266	 * or if another thread unmaps the region containing the context.
1267	 * We kill the task with a SIGSEGV in this situation.
1268	 */
1269	if (do_setcontext(ctx, regs, 1)) {
1270		signal_fault(current, regs, "sys_debug_setcontext", ctx);
1271
1272		force_sig(SIGSEGV);
1273		goto out;
1274	}
1275
1276	/*
1277	 * It's not clear whether or why it is desirable to save the
1278	 * sigaltstack setting on signal delivery and restore it on
1279	 * signal return.  But other architectures do this and we have
1280	 * always done it up until now so it is probably better not to
1281	 * change it.  -- paulus
1282	 */
1283	restore_altstack(&ctx->uc_stack);
1284
1285	set_thread_flag(TIF_RESTOREALL);
1286 out:
1287	return 0;
1288}
1289#endif
1290
1291/*
1292 * Do a signal return; undo the signal stack.
1293 */
1294#ifdef CONFIG_PPC64
1295COMPAT_SYSCALL_DEFINE0(sigreturn)
1296#else
1297SYSCALL_DEFINE0(sigreturn)
1298#endif
1299{
1300	struct pt_regs *regs = current_pt_regs();
1301	struct sigframe __user *sf;
1302	struct sigcontext __user *sc;
1303	struct sigcontext sigctx;
1304	struct mcontext __user *sr;
1305	sigset_t set;
1306	struct mcontext __user *mcp;
1307	struct mcontext __user *tm_mcp = NULL;
1308	unsigned long long msr_hi = 0;
1309
1310	/* Always make any pending restarted system calls return -EINTR */
1311	current->restart_block.fn = do_no_restart_syscall;
1312
1313	sf = (struct sigframe __user *)(regs->gpr[1] + __SIGNAL_FRAMESIZE);
1314	sc = &sf->sctx;
1315	if (copy_from_user(&sigctx, sc, sizeof(sigctx)))
1316		goto badframe;
1317
1318#ifdef CONFIG_PPC64
1319	/*
1320	 * Note that PPC32 puts the upper 32 bits of the sigmask in the
1321	 * unused part of the signal stackframe
1322	 */
1323	set.sig[0] = sigctx.oldmask + ((long)(sigctx._unused[3]) << 32);
1324#else
1325	set.sig[0] = sigctx.oldmask;
1326	set.sig[1] = sigctx._unused[3];
1327#endif
1328	set_current_blocked(&set);
1329
1330	mcp = (struct mcontext __user *)&sf->mctx;
1331#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1332	tm_mcp = (struct mcontext __user *)&sf->mctx_transact;
1333	if (__get_user(msr_hi, &tm_mcp->mc_gregs[PT_MSR]))
1334		goto badframe;
1335#endif
1336	if (MSR_TM_ACTIVE(msr_hi<<32)) {
1337		if (!cpu_has_feature(CPU_FTR_TM))
1338			goto badframe;
1339		if (restore_tm_user_regs(regs, mcp, tm_mcp))
1340			goto badframe;
1341	} else {
1342		sr = (struct mcontext __user *)from_user_ptr(sigctx.regs);
1343		if (restore_user_regs(regs, sr, 1)) {
1344			signal_fault(current, regs, "sys_sigreturn", sr);
1345
1346			force_sig(SIGSEGV);
1347			return 0;
1348		}
1349	}
1350
1351	set_thread_flag(TIF_RESTOREALL);
1352	return 0;
1353
1354badframe:
1355	signal_fault(current, regs, "sys_sigreturn", sc);
1356
1357	force_sig(SIGSEGV);
1358	return 0;
1359}
v6.2
   1// SPDX-License-Identifier: GPL-2.0-or-later
   2/*
   3 * Signal handling for 32bit PPC and 32bit tasks on 64bit PPC
   4 *
   5 *  PowerPC version
   6 *    Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
   7 * Copyright (C) 2001 IBM
   8 * Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
   9 * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
  10 *
  11 *  Derived from "arch/i386/kernel/signal.c"
  12 *    Copyright (C) 1991, 1992 Linus Torvalds
  13 *    1997-11-28  Modified for POSIX.1b signals by Richard Henderson
  14 */
  15
  16#include <linux/sched.h>
  17#include <linux/mm.h>
  18#include <linux/smp.h>
  19#include <linux/kernel.h>
  20#include <linux/signal.h>
  21#include <linux/errno.h>
  22#include <linux/elf.h>
  23#include <linux/ptrace.h>
  24#include <linux/pagemap.h>
  25#include <linux/ratelimit.h>
  26#include <linux/syscalls.h>
  27#ifdef CONFIG_PPC64
  28#include <linux/compat.h>
  29#else
  30#include <linux/wait.h>
  31#include <linux/unistd.h>
  32#include <linux/stddef.h>
  33#include <linux/tty.h>
  34#include <linux/binfmts.h>
  35#endif
  36
  37#include <linux/uaccess.h>
  38#include <asm/cacheflush.h>
  39#include <asm/syscalls.h>
  40#include <asm/sigcontext.h>
  41#include <asm/vdso.h>
  42#include <asm/switch_to.h>
  43#include <asm/tm.h>
  44#include <asm/asm-prototypes.h>
  45#ifdef CONFIG_PPC64
  46#include <asm/syscalls_32.h>
  47#include <asm/unistd.h>
  48#else
  49#include <asm/ucontext.h>
  50#endif
  51
  52#include "signal.h"
  53
  54
  55#ifdef CONFIG_PPC64
  56#define old_sigaction	old_sigaction32
  57#define sigcontext	sigcontext32
  58#define mcontext	mcontext32
  59#define ucontext	ucontext32
  60
  61/*
  62 * Userspace code may pass a ucontext which doesn't include VSX added
  63 * at the end.  We need to check for this case.
  64 */
  65#define UCONTEXTSIZEWITHOUTVSX \
  66		(sizeof(struct ucontext) - sizeof(elf_vsrreghalf_t32))
  67
  68/*
  69 * Returning 0 means we return to userspace via
  70 * ret_from_except and thus restore all user
  71 * registers from *regs.  This is what we need
  72 * to do when a signal has been delivered.
  73 */
  74
  75#define GP_REGS_SIZE	min(sizeof(elf_gregset_t32), sizeof(struct pt_regs32))
  76#undef __SIGNAL_FRAMESIZE
  77#define __SIGNAL_FRAMESIZE	__SIGNAL_FRAMESIZE32
  78#undef ELF_NVRREG
  79#define ELF_NVRREG	ELF_NVRREG32
  80
  81/*
  82 * Functions for flipping sigsets (thanks to brain dead generic
  83 * implementation that makes things simple for little endian only)
  84 */
  85#define unsafe_put_sigset_t	unsafe_put_compat_sigset
  86#define unsafe_get_sigset_t	unsafe_get_compat_sigset
  87
  88#define to_user_ptr(p)		ptr_to_compat(p)
  89#define from_user_ptr(p)	compat_ptr(p)
  90
  91static __always_inline int
  92__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
  93{
  94	elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
  95	int val, i;
  96
  97	for (i = 0; i <= PT_RESULT; i ++) {
  98		/* Force usr to alway see softe as 1 (interrupts enabled) */
  99		if (i == PT_SOFTE)
 100			val = 1;
 101		else
 102			val = gregs[i];
 103
 104		unsafe_put_user(val, &frame->mc_gregs[i], failed);
 105	}
 106	return 0;
 107
 108failed:
 109	return 1;
 110}
 111
 112static __always_inline int
 113__unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
 114{
 115	elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
 116	int i;
 117
 118	for (i = 0; i <= PT_RESULT; i++) {
 119		if ((i == PT_MSR) || (i == PT_SOFTE))
 120			continue;
 121		unsafe_get_user(gregs[i], &sr->mc_gregs[i], failed);
 122	}
 123	return 0;
 124
 125failed:
 126	return 1;
 127}
 128
 129#else /* CONFIG_PPC64 */
 130
 131#define GP_REGS_SIZE	min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
 132
 133#define unsafe_put_sigset_t(uset, set, label) do {			\
 134	sigset_t __user *__us = uset	;				\
 135	const sigset_t *__s = set;					\
 136									\
 137	unsafe_copy_to_user(__us, __s, sizeof(*__us), label);		\
 138} while (0)
 139
 140#define unsafe_get_sigset_t	unsafe_get_user_sigset
 141
 142#define to_user_ptr(p)		((unsigned long)(p))
 143#define from_user_ptr(p)	((void __user *)(p))
 144
 145static __always_inline int
 146__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
 147{
 148	unsafe_copy_to_user(&frame->mc_gregs, regs, GP_REGS_SIZE, failed);
 149	return 0;
 150
 151failed:
 152	return 1;
 153}
 154
 155static __always_inline
 156int __unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
 157{
 158	/* copy up to but not including MSR */
 159	unsafe_copy_from_user(regs, &sr->mc_gregs, PT_MSR * sizeof(elf_greg_t), failed);
 160
 161	/* copy from orig_r3 (the word after the MSR) up to the end */
 162	unsafe_copy_from_user(&regs->orig_gpr3, &sr->mc_gregs[PT_ORIG_R3],
 163			      GP_REGS_SIZE - PT_ORIG_R3 * sizeof(elf_greg_t), failed);
 164
 165	return 0;
 166
 167failed:
 168	return 1;
 169}
 170#endif
 171
 172#define unsafe_save_general_regs(regs, frame, label) do {	\
 173	if (__unsafe_save_general_regs(regs, frame))		\
 174		goto label;					\
 175} while (0)
 176
 177#define unsafe_restore_general_regs(regs, frame, label) do {	\
 178	if (__unsafe_restore_general_regs(regs, frame))		\
 179		goto label;					\
 180} while (0)
 181
 182/*
 183 * When we have signals to deliver, we set up on the
 184 * user stack, going down from the original stack pointer:
 185 *	an ABI gap of 56 words
 186 *	an mcontext struct
 187 *	a sigcontext struct
 188 *	a gap of __SIGNAL_FRAMESIZE bytes
 189 *
 190 * Each of these things must be a multiple of 16 bytes in size. The following
 191 * structure represent all of this except the __SIGNAL_FRAMESIZE gap
 192 *
 193 */
 194struct sigframe {
 195	struct sigcontext sctx;		/* the sigcontext */
 196	struct mcontext	mctx;		/* all the register values */
 197#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 198	struct sigcontext sctx_transact;
 199	struct mcontext	mctx_transact;
 200#endif
 201	/*
 202	 * Programs using the rs6000/xcoff abi can save up to 19 gp
 203	 * regs and 18 fp regs below sp before decrementing it.
 204	 */
 205	int			abigap[56];
 206};
 207
 208/*
 209 *  When we have rt signals to deliver, we set up on the
 210 *  user stack, going down from the original stack pointer:
 211 *	one rt_sigframe struct (siginfo + ucontext + ABI gap)
 212 *	a gap of __SIGNAL_FRAMESIZE+16 bytes
 213 *  (the +16 is to get the siginfo and ucontext in the same
 214 *  positions as in older kernels).
 215 *
 216 *  Each of these things must be a multiple of 16 bytes in size.
 217 *
 218 */
 219struct rt_sigframe {
 220#ifdef CONFIG_PPC64
 221	compat_siginfo_t info;
 222#else
 223	struct siginfo info;
 224#endif
 225	struct ucontext	uc;
 226#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 227	struct ucontext	uc_transact;
 228#endif
 229	/*
 230	 * Programs using the rs6000/xcoff abi can save up to 19 gp
 231	 * regs and 18 fp regs below sp before decrementing it.
 232	 */
 233	int			abigap[56];
 234};
 235
 236unsigned long get_min_sigframe_size_32(void)
 237{
 238	return max(sizeof(struct rt_sigframe) + __SIGNAL_FRAMESIZE + 16,
 239		   sizeof(struct sigframe) + __SIGNAL_FRAMESIZE);
 240}
 241
 242/*
 243 * Save the current user registers on the user stack.
 244 * We only save the altivec/spe registers if the process has used
 245 * altivec/spe instructions at some point.
 246 */
 247static void prepare_save_user_regs(int ctx_has_vsx_region)
 248{
 249	/* Make sure floating point registers are stored in regs */
 250	flush_fp_to_thread(current);
 251#ifdef CONFIG_ALTIVEC
 252	if (current->thread.used_vr)
 253		flush_altivec_to_thread(current);
 254	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 255		current->thread.vrsave = mfspr(SPRN_VRSAVE);
 256#endif
 257#ifdef CONFIG_VSX
 258	if (current->thread.used_vsr && ctx_has_vsx_region)
 259		flush_vsx_to_thread(current);
 260#endif
 261#ifdef CONFIG_SPE
 262	if (current->thread.used_spe)
 263		flush_spe_to_thread(current);
 264#endif
 265}
 266
 267static int __unsafe_save_user_regs(struct pt_regs *regs, struct mcontext __user *frame,
 268				   struct mcontext __user *tm_frame, int ctx_has_vsx_region)
 
 269{
 270	unsigned long msr = regs->msr;
 271
 272	/* save general registers */
 273	unsafe_save_general_regs(regs, frame, failed);
 274
 275#ifdef CONFIG_ALTIVEC
 276	/* save altivec registers */
 277	if (current->thread.used_vr) {
 278		unsafe_copy_to_user(&frame->mc_vregs, &current->thread.vr_state,
 279				    ELF_NVRREG * sizeof(vector128), failed);
 280		/* set MSR_VEC in the saved MSR value to indicate that
 281		   frame->mc_vregs contains valid data */
 282		msr |= MSR_VEC;
 283	}
 284	/* else assert((regs->msr & MSR_VEC) == 0) */
 285
 286	/* We always copy to/from vrsave, it's 0 if we don't have or don't
 287	 * use altivec. Since VSCR only contains 32 bits saved in the least
 288	 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
 289	 * most significant bits of that same vector. --BenH
 290	 * Note that the current VRSAVE value is in the SPR at this point.
 291	 */
 292	unsafe_put_user(current->thread.vrsave, (u32 __user *)&frame->mc_vregs[32],
 293			failed);
 294#endif /* CONFIG_ALTIVEC */
 295	unsafe_copy_fpr_to_user(&frame->mc_fregs, current, failed);
 296
 297	/*
 298	 * Clear the MSR VSX bit to indicate there is no valid state attached
 299	 * to this context, except in the specific case below where we set it.
 300	 */
 301	msr &= ~MSR_VSX;
 302#ifdef CONFIG_VSX
 303	/*
 304	 * Copy VSR 0-31 upper half from thread_struct to local
 305	 * buffer, then write that to userspace.  Also set MSR_VSX in
 306	 * the saved MSR value to indicate that frame->mc_vregs
 307	 * contains valid data
 308	 */
 309	if (current->thread.used_vsr && ctx_has_vsx_region) {
 310		unsafe_copy_vsx_to_user(&frame->mc_vsregs, current, failed);
 311		msr |= MSR_VSX;
 312	}
 313#endif /* CONFIG_VSX */
 314#ifdef CONFIG_SPE
 315	/* save spe registers */
 316	if (current->thread.used_spe) {
 317		unsafe_copy_to_user(&frame->mc_vregs, current->thread.evr,
 318				    ELF_NEVRREG * sizeof(u32), failed);
 319		/* set MSR_SPE in the saved MSR value to indicate that
 320		   frame->mc_vregs contains valid data */
 321		msr |= MSR_SPE;
 322	}
 323	/* else assert((regs->msr & MSR_SPE) == 0) */
 324
 325	/* We always copy to/from spefscr */
 326	unsafe_put_user(current->thread.spefscr,
 327			(u32 __user *)&frame->mc_vregs + ELF_NEVRREG, failed);
 328#endif /* CONFIG_SPE */
 329
 330	unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
 331
 332	/* We need to write 0 the MSR top 32 bits in the tm frame so that we
 333	 * can check it on the restore to see if TM is active
 334	 */
 335	if (tm_frame)
 336		unsafe_put_user(0, &tm_frame->mc_gregs[PT_MSR], failed);
 337
 338	return 0;
 339
 340failed:
 341	return 1;
 342}
 343
 344#define unsafe_save_user_regs(regs, frame, tm_frame, has_vsx, label) do { \
 345	if (__unsafe_save_user_regs(regs, frame, tm_frame, has_vsx))	\
 346		goto label;						\
 347} while (0)
 348
 349#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 350/*
 351 * Save the current user registers on the user stack.
 352 * We only save the altivec/spe registers if the process has used
 353 * altivec/spe instructions at some point.
 354 * We also save the transactional registers to a second ucontext in the
 355 * frame.
 356 *
 357 * See __unsafe_save_user_regs() and signal_64.c:setup_tm_sigcontexts().
 358 */
 359static void prepare_save_tm_user_regs(void)
 360{
 361	WARN_ON(tm_suspend_disabled);
 362
 363	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 364		current->thread.ckvrsave = mfspr(SPRN_VRSAVE);
 365}
 366
 367static int save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
 368				    struct mcontext __user *tm_frame, unsigned long msr)
 
 369{
 370	/* Save both sets of general registers */
 371	unsafe_save_general_regs(&current->thread.ckpt_regs, frame, failed);
 372	unsafe_save_general_regs(regs, tm_frame, failed);
 373
 374	/* Stash the top half of the 64bit MSR into the 32bit MSR word
 375	 * of the transactional mcontext.  This way we have a backward-compatible
 376	 * MSR in the 'normal' (checkpointed) mcontext and additionally one can
 377	 * also look at what type of transaction (T or S) was active at the
 378	 * time of the signal.
 379	 */
 380	unsafe_put_user((msr >> 32), &tm_frame->mc_gregs[PT_MSR], failed);
 381
 382	/* save altivec registers */
 383	if (current->thread.used_vr) {
 384		unsafe_copy_to_user(&frame->mc_vregs, &current->thread.ckvr_state,
 385				    ELF_NVRREG * sizeof(vector128), failed);
 386		if (msr & MSR_VEC)
 387			unsafe_copy_to_user(&tm_frame->mc_vregs,
 388					    &current->thread.vr_state,
 389					    ELF_NVRREG * sizeof(vector128), failed);
 390		else
 391			unsafe_copy_to_user(&tm_frame->mc_vregs,
 392					    &current->thread.ckvr_state,
 393					    ELF_NVRREG * sizeof(vector128), failed);
 394
 395		/* set MSR_VEC in the saved MSR value to indicate that
 396		 * frame->mc_vregs contains valid data
 397		 */
 398		msr |= MSR_VEC;
 399	}
 400
 401	/* We always copy to/from vrsave, it's 0 if we don't have or don't
 402	 * use altivec. Since VSCR only contains 32 bits saved in the least
 403	 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
 404	 * most significant bits of that same vector. --BenH
 405	 */
 406	unsafe_put_user(current->thread.ckvrsave,
 407			(u32 __user *)&frame->mc_vregs[32], failed);
 408	if (msr & MSR_VEC)
 409		unsafe_put_user(current->thread.vrsave,
 410				(u32 __user *)&tm_frame->mc_vregs[32], failed);
 411	else
 412		unsafe_put_user(current->thread.ckvrsave,
 413				(u32 __user *)&tm_frame->mc_vregs[32], failed);
 414
 415	unsafe_copy_ckfpr_to_user(&frame->mc_fregs, current, failed);
 416	if (msr & MSR_FP)
 417		unsafe_copy_fpr_to_user(&tm_frame->mc_fregs, current, failed);
 418	else
 419		unsafe_copy_ckfpr_to_user(&tm_frame->mc_fregs, current, failed);
 420
 421	/*
 422	 * Copy VSR 0-31 upper half from thread_struct to local
 423	 * buffer, then write that to userspace.  Also set MSR_VSX in
 424	 * the saved MSR value to indicate that frame->mc_vregs
 425	 * contains valid data
 426	 */
 427	if (current->thread.used_vsr) {
 428		unsafe_copy_ckvsx_to_user(&frame->mc_vsregs, current, failed);
 429		if (msr & MSR_VSX)
 430			unsafe_copy_vsx_to_user(&tm_frame->mc_vsregs, current, failed);
 431		else
 432			unsafe_copy_ckvsx_to_user(&tm_frame->mc_vsregs, current, failed);
 433
 434		msr |= MSR_VSX;
 435	}
 436
 437	unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
 438
 439	return 0;
 440
 441failed:
 442	return 1;
 443}
 444#else
 445static void prepare_save_tm_user_regs(void) { }
 446
 447static int save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
 448				    struct mcontext __user *tm_frame, unsigned long msr)
 
 449{
 450	return 0;
 451}
 452#endif
 453
 454#define unsafe_save_tm_user_regs(regs, frame, tm_frame, msr, label) do { \
 455	if (save_tm_user_regs_unsafe(regs, frame, tm_frame, msr))	\
 456		goto label;						\
 457} while (0)
 458
 459/*
 460 * Restore the current user register values from the user stack,
 461 * (except for MSR).
 462 */
 463static long restore_user_regs(struct pt_regs *regs,
 464			      struct mcontext __user *sr, int sig)
 465{
 466	unsigned int save_r2 = 0;
 467	unsigned long msr;
 468#ifdef CONFIG_VSX
 469	int i;
 470#endif
 471
 472	if (!user_read_access_begin(sr, sizeof(*sr)))
 473		return 1;
 474	/*
 475	 * restore general registers but not including MSR or SOFTE. Also
 476	 * take care of keeping r2 (TLS) intact if not a signal
 477	 */
 478	if (!sig)
 479		save_r2 = (unsigned int)regs->gpr[2];
 480	unsafe_restore_general_regs(regs, sr, failed);
 481	set_trap_norestart(regs);
 482	unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
 483	if (!sig)
 484		regs->gpr[2] = (unsigned long) save_r2;
 485
 486	/* if doing signal return, restore the previous little-endian mode */
 487	if (sig)
 488		regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
 489
 490#ifdef CONFIG_ALTIVEC
 491	/*
 492	 * Force the process to reload the altivec registers from
 493	 * current->thread when it next does altivec instructions
 494	 */
 495	regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
 496	if (msr & MSR_VEC) {
 497		/* restore altivec registers from the stack */
 498		unsafe_copy_from_user(&current->thread.vr_state, &sr->mc_vregs,
 499				      sizeof(sr->mc_vregs), failed);
 500		current->thread.used_vr = true;
 501	} else if (current->thread.used_vr)
 502		memset(&current->thread.vr_state, 0,
 503		       ELF_NVRREG * sizeof(vector128));
 504
 505	/* Always get VRSAVE back */
 506	unsafe_get_user(current->thread.vrsave, (u32 __user *)&sr->mc_vregs[32], failed);
 507	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 508		mtspr(SPRN_VRSAVE, current->thread.vrsave);
 509#endif /* CONFIG_ALTIVEC */
 510	unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
 511
 512#ifdef CONFIG_VSX
 513	/*
 514	 * Force the process to reload the VSX registers from
 515	 * current->thread when it next does VSX instruction.
 516	 */
 517	regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
 518	if (msr & MSR_VSX) {
 519		/*
 520		 * Restore altivec registers from the stack to a local
 521		 * buffer, then write this out to the thread_struct
 522		 */
 523		unsafe_copy_vsx_from_user(current, &sr->mc_vsregs, failed);
 524		current->thread.used_vsr = true;
 525	} else if (current->thread.used_vsr)
 526		for (i = 0; i < 32 ; i++)
 527			current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
 528#endif /* CONFIG_VSX */
 529	/*
 530	 * force the process to reload the FP registers from
 531	 * current->thread when it next does FP instructions
 532	 */
 533	regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
 534
 535#ifdef CONFIG_SPE
 536	/*
 537	 * Force the process to reload the spe registers from
 538	 * current->thread when it next does spe instructions.
 539	 * Since this is user ABI, we must enforce the sizing.
 540	 */
 541	BUILD_BUG_ON(sizeof(current->thread.spe) != ELF_NEVRREG * sizeof(u32));
 542	regs_set_return_msr(regs, regs->msr & ~MSR_SPE);
 543	if (msr & MSR_SPE) {
 544		/* restore spe registers from the stack */
 545		unsafe_copy_from_user(&current->thread.spe, &sr->mc_vregs,
 546				      sizeof(current->thread.spe), failed);
 547		current->thread.used_spe = true;
 548	} else if (current->thread.used_spe)
 549		memset(&current->thread.spe, 0, sizeof(current->thread.spe));
 550
 551	/* Always get SPEFSCR back */
 552	unsafe_get_user(current->thread.spefscr, (u32 __user *)&sr->mc_vregs + ELF_NEVRREG, failed);
 553#endif /* CONFIG_SPE */
 554
 555	user_read_access_end();
 556	return 0;
 557
 558failed:
 559	user_read_access_end();
 560	return 1;
 561}
 562
 563#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 564/*
 565 * Restore the current user register values from the user stack, except for
 566 * MSR, and recheckpoint the original checkpointed register state for processes
 567 * in transactions.
 568 */
 569static long restore_tm_user_regs(struct pt_regs *regs,
 570				 struct mcontext __user *sr,
 571				 struct mcontext __user *tm_sr)
 572{
 573	unsigned long msr, msr_hi;
 574	int i;
 575
 576	if (tm_suspend_disabled)
 577		return 1;
 578	/*
 579	 * restore general registers but not including MSR or SOFTE. Also
 580	 * take care of keeping r2 (TLS) intact if not a signal.
 581	 * See comment in signal_64.c:restore_tm_sigcontexts();
 582	 * TFHAR is restored from the checkpointed NIP; TEXASR and TFIAR
 583	 * were set by the signal delivery.
 584	 */
 585	if (!user_read_access_begin(sr, sizeof(*sr)))
 586		return 1;
 587
 588	unsafe_restore_general_regs(&current->thread.ckpt_regs, sr, failed);
 589	unsafe_get_user(current->thread.tm_tfhar, &sr->mc_gregs[PT_NIP], failed);
 590	unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
 591
 592	/* Restore the previous little-endian mode */
 593	regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
 594
 595	regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
 596	if (msr & MSR_VEC) {
 597		/* restore altivec registers from the stack */
 598		unsafe_copy_from_user(&current->thread.ckvr_state, &sr->mc_vregs,
 599				      sizeof(sr->mc_vregs), failed);
 600		current->thread.used_vr = true;
 601	} else if (current->thread.used_vr) {
 602		memset(&current->thread.vr_state, 0,
 603		       ELF_NVRREG * sizeof(vector128));
 604		memset(&current->thread.ckvr_state, 0,
 605		       ELF_NVRREG * sizeof(vector128));
 606	}
 607
 608	/* Always get VRSAVE back */
 609	unsafe_get_user(current->thread.ckvrsave,
 610			(u32 __user *)&sr->mc_vregs[32], failed);
 611	if (cpu_has_feature(CPU_FTR_ALTIVEC))
 612		mtspr(SPRN_VRSAVE, current->thread.ckvrsave);
 613
 614	regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
 615
 616	unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
 617
 618	regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
 619	if (msr & MSR_VSX) {
 620		/*
 621		 * Restore altivec registers from the stack to a local
 622		 * buffer, then write this out to the thread_struct
 623		 */
 624		unsafe_copy_ckvsx_from_user(current, &sr->mc_vsregs, failed);
 625		current->thread.used_vsr = true;
 626	} else if (current->thread.used_vsr)
 627		for (i = 0; i < 32 ; i++) {
 628			current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
 629			current->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
 630		}
 631
 632	user_read_access_end();
 633
 634	if (!user_read_access_begin(tm_sr, sizeof(*tm_sr)))
 635		return 1;
 636
 637	unsafe_restore_general_regs(regs, tm_sr, failed);
 638
 639	/* restore altivec registers from the stack */
 640	if (msr & MSR_VEC)
 641		unsafe_copy_from_user(&current->thread.vr_state, &tm_sr->mc_vregs,
 642				      sizeof(sr->mc_vregs), failed);
 643
 644	/* Always get VRSAVE back */
 645	unsafe_get_user(current->thread.vrsave,
 646			(u32 __user *)&tm_sr->mc_vregs[32], failed);
 647
 648	unsafe_copy_ckfpr_from_user(current, &tm_sr->mc_fregs, failed);
 649
 650	if (msr & MSR_VSX) {
 651		/*
 652		 * Restore altivec registers from the stack to a local
 653		 * buffer, then write this out to the thread_struct
 654		 */
 655		unsafe_copy_vsx_from_user(current, &tm_sr->mc_vsregs, failed);
 656		current->thread.used_vsr = true;
 657	}
 658
 659	/* Get the top half of the MSR from the user context */
 660	unsafe_get_user(msr_hi, &tm_sr->mc_gregs[PT_MSR], failed);
 661	msr_hi <<= 32;
 662
 663	user_read_access_end();
 664
 665	/* If TM bits are set to the reserved value, it's an invalid context */
 666	if (MSR_TM_RESV(msr_hi))
 667		return 1;
 668
 669	/*
 670	 * Disabling preemption, since it is unsafe to be preempted
 671	 * with MSR[TS] set without recheckpointing.
 672	 */
 673	preempt_disable();
 674
 675	/*
 676	 * CAUTION:
 677	 * After regs->MSR[TS] being updated, make sure that get_user(),
 678	 * put_user() or similar functions are *not* called. These
 679	 * functions can generate page faults which will cause the process
 680	 * to be de-scheduled with MSR[TS] set but without calling
 681	 * tm_recheckpoint(). This can cause a bug.
 682	 *
 683	 * Pull in the MSR TM bits from the user context
 684	 */
 685	regs_set_return_msr(regs, (regs->msr & ~MSR_TS_MASK) | (msr_hi & MSR_TS_MASK));
 686	/* Now, recheckpoint.  This loads up all of the checkpointed (older)
 687	 * registers, including FP and V[S]Rs.  After recheckpointing, the
 688	 * transactional versions should be loaded.
 689	 */
 690	tm_enable();
 691	/* Make sure the transaction is marked as failed */
 692	current->thread.tm_texasr |= TEXASR_FS;
 693	/* This loads the checkpointed FP/VEC state, if used */
 694	tm_recheckpoint(&current->thread);
 695
 696	/* This loads the speculative FP/VEC state, if used */
 697	msr_check_and_set(msr & (MSR_FP | MSR_VEC));
 698	if (msr & MSR_FP) {
 699		load_fp_state(&current->thread.fp_state);
 700		regs_set_return_msr(regs, regs->msr | (MSR_FP | current->thread.fpexc_mode));
 701	}
 702	if (msr & MSR_VEC) {
 703		load_vr_state(&current->thread.vr_state);
 704		regs_set_return_msr(regs, regs->msr | MSR_VEC);
 705	}
 706
 707	preempt_enable();
 708
 709	return 0;
 710
 711failed:
 712	user_read_access_end();
 713	return 1;
 714}
 715#else
 716static long restore_tm_user_regs(struct pt_regs *regs, struct mcontext __user *sr,
 717				 struct mcontext __user *tm_sr)
 718{
 719	return 0;
 720}
 721#endif
 722
 723#ifdef CONFIG_PPC64
 724
 725#define copy_siginfo_to_user	copy_siginfo_to_user32
 726
 727#endif /* CONFIG_PPC64 */
 728
 729/*
 730 * Set up a signal frame for a "real-time" signal handler
 731 * (one which gets siginfo).
 732 */
 733int handle_rt_signal32(struct ksignal *ksig, sigset_t *oldset,
 734		       struct task_struct *tsk)
 735{
 736	struct rt_sigframe __user *frame;
 737	struct mcontext __user *mctx;
 738	struct mcontext __user *tm_mctx = NULL;
 739	unsigned long newsp = 0;
 740	unsigned long tramp;
 741	struct pt_regs *regs = tsk->thread.regs;
 742	/* Save the thread's msr before get_tm_stackpointer() changes it */
 743	unsigned long msr = regs->msr;
 744
 745	/* Set up Signal Frame */
 746	frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
 747	mctx = &frame->uc.uc_mcontext;
 748#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 749	tm_mctx = &frame->uc_transact.uc_mcontext;
 750#endif
 751	if (MSR_TM_ACTIVE(msr))
 752		prepare_save_tm_user_regs();
 753	else
 754		prepare_save_user_regs(1);
 755
 756	if (!user_access_begin(frame, sizeof(*frame)))
 757		goto badframe;
 758
 759	/* Put the siginfo & fill in most of the ucontext */
 760	unsafe_put_user(0, &frame->uc.uc_flags, failed);
 761#ifdef CONFIG_PPC64
 762	unsafe_compat_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
 763#else
 764	unsafe_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
 765#endif
 766	unsafe_put_user(to_user_ptr(&frame->uc.uc_mcontext), &frame->uc.uc_regs, failed);
 767
 768	if (MSR_TM_ACTIVE(msr)) {
 769#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 770		unsafe_put_user((unsigned long)&frame->uc_transact,
 771				&frame->uc.uc_link, failed);
 772		unsafe_put_user((unsigned long)tm_mctx,
 773				&frame->uc_transact.uc_regs, failed);
 774#endif
 775		unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
 776	} else {
 777		unsafe_put_user(0, &frame->uc.uc_link, failed);
 778		unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
 779	}
 780
 781	/* Save user registers on the stack */
 782	if (tsk->mm->context.vdso) {
 783		tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp_rt32);
 784	} else {
 785		tramp = (unsigned long)mctx->mc_pad;
 786		unsafe_put_user(PPC_RAW_LI(_R0, __NR_rt_sigreturn), &mctx->mc_pad[0], failed);
 787		unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
 788		asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
 789	}
 790	unsafe_put_sigset_t(&frame->uc.uc_sigmask, oldset, failed);
 791
 792	user_access_end();
 793
 794	if (copy_siginfo_to_user(&frame->info, &ksig->info))
 795		goto badframe;
 796
 797	regs->link = tramp;
 798
 799#ifdef CONFIG_PPC_FPU_REGS
 800	tsk->thread.fp_state.fpscr = 0;	/* turn off all fp exceptions */
 801#endif
 802
 803	/* create a stack frame for the caller of the handler */
 804	newsp = ((unsigned long)frame) - (__SIGNAL_FRAMESIZE + 16);
 805	if (put_user(regs->gpr[1], (u32 __user *)newsp))
 806		goto badframe;
 807
 808	/* Fill registers for signal handler */
 809	regs->gpr[1] = newsp;
 810	regs->gpr[3] = ksig->sig;
 811	regs->gpr[4] = (unsigned long)&frame->info;
 812	regs->gpr[5] = (unsigned long)&frame->uc;
 813	regs->gpr[6] = (unsigned long)frame;
 814	regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
 815	/* enter the signal handler in native-endian mode */
 816	regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
 817
 818	return 0;
 819
 820failed:
 821	user_access_end();
 822
 823badframe:
 824	signal_fault(tsk, regs, "handle_rt_signal32", frame);
 825
 826	return 1;
 827}
 828
 829/*
 830 * OK, we're invoking a handler
 831 */
 832int handle_signal32(struct ksignal *ksig, sigset_t *oldset,
 833		struct task_struct *tsk)
 834{
 835	struct sigcontext __user *sc;
 836	struct sigframe __user *frame;
 837	struct mcontext __user *mctx;
 838	struct mcontext __user *tm_mctx = NULL;
 839	unsigned long newsp = 0;
 840	unsigned long tramp;
 841	struct pt_regs *regs = tsk->thread.regs;
 842	/* Save the thread's msr before get_tm_stackpointer() changes it */
 843	unsigned long msr = regs->msr;
 844
 845	/* Set up Signal Frame */
 846	frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
 847	mctx = &frame->mctx;
 848#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 849	tm_mctx = &frame->mctx_transact;
 850#endif
 851	if (MSR_TM_ACTIVE(msr))
 852		prepare_save_tm_user_regs();
 853	else
 854		prepare_save_user_regs(1);
 855
 856	if (!user_access_begin(frame, sizeof(*frame)))
 857		goto badframe;
 858	sc = (struct sigcontext __user *) &frame->sctx;
 859
 860#if _NSIG != 64
 861#error "Please adjust handle_signal()"
 862#endif
 863	unsafe_put_user(to_user_ptr(ksig->ka.sa.sa_handler), &sc->handler, failed);
 864	unsafe_put_user(oldset->sig[0], &sc->oldmask, failed);
 865#ifdef CONFIG_PPC64
 866	unsafe_put_user((oldset->sig[0] >> 32), &sc->_unused[3], failed);
 867#else
 868	unsafe_put_user(oldset->sig[1], &sc->_unused[3], failed);
 869#endif
 870	unsafe_put_user(to_user_ptr(mctx), &sc->regs, failed);
 871	unsafe_put_user(ksig->sig, &sc->signal, failed);
 872
 873	if (MSR_TM_ACTIVE(msr))
 874		unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
 875	else
 876		unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
 877
 878	if (tsk->mm->context.vdso) {
 879		tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp32);
 880	} else {
 881		tramp = (unsigned long)mctx->mc_pad;
 882		unsafe_put_user(PPC_RAW_LI(_R0, __NR_sigreturn), &mctx->mc_pad[0], failed);
 883		unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
 884		asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
 885	}
 886	user_access_end();
 887
 888	regs->link = tramp;
 889
 890#ifdef CONFIG_PPC_FPU_REGS
 891	tsk->thread.fp_state.fpscr = 0;	/* turn off all fp exceptions */
 892#endif
 893
 894	/* create a stack frame for the caller of the handler */
 895	newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
 896	if (put_user(regs->gpr[1], (u32 __user *)newsp))
 897		goto badframe;
 898
 899	regs->gpr[1] = newsp;
 900	regs->gpr[3] = ksig->sig;
 901	regs->gpr[4] = (unsigned long) sc;
 902	regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
 903	/* enter the signal handler in native-endian mode */
 904	regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
 905
 906	return 0;
 907
 908failed:
 909	user_access_end();
 910
 911badframe:
 912	signal_fault(tsk, regs, "handle_signal32", frame);
 913
 914	return 1;
 915}
 916
 917static int do_setcontext(struct ucontext __user *ucp, struct pt_regs *regs, int sig)
 918{
 919	sigset_t set;
 920	struct mcontext __user *mcp;
 921
 922	if (!user_read_access_begin(ucp, sizeof(*ucp)))
 923		return -EFAULT;
 924
 925	unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
 926#ifdef CONFIG_PPC64
 927	{
 928		u32 cmcp;
 929
 930		unsafe_get_user(cmcp, &ucp->uc_regs, failed);
 931		mcp = (struct mcontext __user *)(u64)cmcp;
 932	}
 933#else
 934	unsafe_get_user(mcp, &ucp->uc_regs, failed);
 935#endif
 936	user_read_access_end();
 937
 938	set_current_blocked(&set);
 939	if (restore_user_regs(regs, mcp, sig))
 940		return -EFAULT;
 941
 942	return 0;
 943
 944failed:
 945	user_read_access_end();
 946	return -EFAULT;
 947}
 948
 949#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
 950static int do_setcontext_tm(struct ucontext __user *ucp,
 951			    struct ucontext __user *tm_ucp,
 952			    struct pt_regs *regs)
 953{
 954	sigset_t set;
 955	struct mcontext __user *mcp;
 956	struct mcontext __user *tm_mcp;
 957	u32 cmcp;
 958	u32 tm_cmcp;
 959
 960	if (!user_read_access_begin(ucp, sizeof(*ucp)))
 961		return -EFAULT;
 962
 963	unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
 964	unsafe_get_user(cmcp, &ucp->uc_regs, failed);
 965
 966	user_read_access_end();
 967
 968	if (__get_user(tm_cmcp, &tm_ucp->uc_regs))
 969		return -EFAULT;
 970	mcp = (struct mcontext __user *)(u64)cmcp;
 971	tm_mcp = (struct mcontext __user *)(u64)tm_cmcp;
 972	/* no need to check access_ok(mcp), since mcp < 4GB */
 973
 974	set_current_blocked(&set);
 975	if (restore_tm_user_regs(regs, mcp, tm_mcp))
 976		return -EFAULT;
 977
 978	return 0;
 979
 980failed:
 981	user_read_access_end();
 982	return -EFAULT;
 983}
 984#endif
 985
 986#ifdef CONFIG_PPC64
 987COMPAT_SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
 988		       struct ucontext __user *, new_ctx, int, ctx_size)
 989#else
 990SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
 991		       struct ucontext __user *, new_ctx, long, ctx_size)
 992#endif
 993{
 994	struct pt_regs *regs = current_pt_regs();
 995	int ctx_has_vsx_region = 0;
 996
 997#ifdef CONFIG_PPC64
 998	unsigned long new_msr = 0;
 999
1000	if (new_ctx) {
1001		struct mcontext __user *mcp;
1002		u32 cmcp;
1003
1004		/*
1005		 * Get pointer to the real mcontext.  No need for
1006		 * access_ok since we are dealing with compat
1007		 * pointers.
1008		 */
1009		if (__get_user(cmcp, &new_ctx->uc_regs))
1010			return -EFAULT;
1011		mcp = (struct mcontext __user *)(u64)cmcp;
1012		if (__get_user(new_msr, &mcp->mc_gregs[PT_MSR]))
1013			return -EFAULT;
1014	}
1015	/*
1016	 * Check that the context is not smaller than the original
1017	 * size (with VMX but without VSX)
1018	 */
1019	if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
1020		return -EINVAL;
1021	/*
1022	 * If the new context state sets the MSR VSX bits but
1023	 * it doesn't provide VSX state.
1024	 */
1025	if ((ctx_size < sizeof(struct ucontext)) &&
1026	    (new_msr & MSR_VSX))
1027		return -EINVAL;
1028	/* Does the context have enough room to store VSX data? */
1029	if (ctx_size >= sizeof(struct ucontext))
1030		ctx_has_vsx_region = 1;
1031#else
1032	/* Context size is for future use. Right now, we only make sure
1033	 * we are passed something we understand
1034	 */
1035	if (ctx_size < sizeof(struct ucontext))
1036		return -EINVAL;
1037#endif
1038	if (old_ctx != NULL) {
1039		struct mcontext __user *mctx;
1040
1041		/*
1042		 * old_ctx might not be 16-byte aligned, in which
1043		 * case old_ctx->uc_mcontext won't be either.
1044		 * Because we have the old_ctx->uc_pad2 field
1045		 * before old_ctx->uc_mcontext, we need to round down
1046		 * from &old_ctx->uc_mcontext to a 16-byte boundary.
1047		 */
1048		mctx = (struct mcontext __user *)
1049			((unsigned long) &old_ctx->uc_mcontext & ~0xfUL);
1050		prepare_save_user_regs(ctx_has_vsx_region);
1051		if (!user_write_access_begin(old_ctx, ctx_size))
1052			return -EFAULT;
1053		unsafe_save_user_regs(regs, mctx, NULL, ctx_has_vsx_region, failed);
1054		unsafe_put_sigset_t(&old_ctx->uc_sigmask, &current->blocked, failed);
1055		unsafe_put_user(to_user_ptr(mctx), &old_ctx->uc_regs, failed);
1056		user_write_access_end();
1057	}
1058	if (new_ctx == NULL)
1059		return 0;
1060	if (!access_ok(new_ctx, ctx_size) ||
1061	    fault_in_readable((char __user *)new_ctx, ctx_size))
1062		return -EFAULT;
1063
1064	/*
1065	 * If we get a fault copying the context into the kernel's
1066	 * image of the user's registers, we can't just return -EFAULT
1067	 * because the user's registers will be corrupted.  For instance
1068	 * the NIP value may have been updated but not some of the
1069	 * other registers.  Given that we have done the access_ok
1070	 * and successfully read the first and last bytes of the region
1071	 * above, this should only happen in an out-of-memory situation
1072	 * or if another thread unmaps the region containing the context.
1073	 * We kill the task with a SIGSEGV in this situation.
1074	 */
1075	if (do_setcontext(new_ctx, regs, 0)) {
1076		force_exit_sig(SIGSEGV);
1077		return -EFAULT;
1078	}
1079
1080	set_thread_flag(TIF_RESTOREALL);
1081	return 0;
1082
1083failed:
1084	user_write_access_end();
1085	return -EFAULT;
1086}
1087
1088#ifdef CONFIG_PPC64
1089COMPAT_SYSCALL_DEFINE0(rt_sigreturn)
1090#else
1091SYSCALL_DEFINE0(rt_sigreturn)
1092#endif
1093{
1094	struct rt_sigframe __user *rt_sf;
1095	struct pt_regs *regs = current_pt_regs();
1096	int tm_restore = 0;
1097#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1098	struct ucontext __user *uc_transact;
1099	unsigned long msr_hi;
1100	unsigned long tmp;
1101#endif
1102	/* Always make any pending restarted system calls return -EINTR */
1103	current->restart_block.fn = do_no_restart_syscall;
1104
1105	rt_sf = (struct rt_sigframe __user *)
1106		(regs->gpr[1] + __SIGNAL_FRAMESIZE + 16);
1107	if (!access_ok(rt_sf, sizeof(*rt_sf)))
1108		goto bad;
1109
1110#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1111	/*
1112	 * If there is a transactional state then throw it away.
1113	 * The purpose of a sigreturn is to destroy all traces of the
1114	 * signal frame, this includes any transactional state created
1115	 * within in. We only check for suspended as we can never be
1116	 * active in the kernel, we are active, there is nothing better to
1117	 * do than go ahead and Bad Thing later.
1118	 * The cause is not important as there will never be a
1119	 * recheckpoint so it's not user visible.
1120	 */
1121	if (MSR_TM_SUSPENDED(mfmsr()))
1122		tm_reclaim_current(0);
1123
1124	if (__get_user(tmp, &rt_sf->uc.uc_link))
1125		goto bad;
1126	uc_transact = (struct ucontext __user *)(uintptr_t)tmp;
1127	if (uc_transact) {
1128		u32 cmcp;
1129		struct mcontext __user *mcp;
1130
1131		if (__get_user(cmcp, &uc_transact->uc_regs))
1132			return -EFAULT;
1133		mcp = (struct mcontext __user *)(u64)cmcp;
1134		/* The top 32 bits of the MSR are stashed in the transactional
1135		 * ucontext. */
1136		if (__get_user(msr_hi, &mcp->mc_gregs[PT_MSR]))
1137			goto bad;
1138
1139		if (MSR_TM_ACTIVE(msr_hi<<32)) {
1140			/* Trying to start TM on non TM system */
1141			if (!cpu_has_feature(CPU_FTR_TM))
1142				goto bad;
1143			/* We only recheckpoint on return if we're
1144			 * transaction.
1145			 */
1146			tm_restore = 1;
1147			if (do_setcontext_tm(&rt_sf->uc, uc_transact, regs))
1148				goto bad;
1149		}
1150	}
1151	if (!tm_restore) {
1152		/*
1153		 * Unset regs->msr because ucontext MSR TS is not
1154		 * set, and recheckpoint was not called. This avoid
1155		 * hitting a TM Bad thing at RFID
1156		 */
1157		regs_set_return_msr(regs, regs->msr & ~MSR_TS_MASK);
1158	}
1159	/* Fall through, for non-TM restore */
1160#endif
1161	if (!tm_restore)
1162		if (do_setcontext(&rt_sf->uc, regs, 1))
1163			goto bad;
1164
1165	/*
1166	 * It's not clear whether or why it is desirable to save the
1167	 * sigaltstack setting on signal delivery and restore it on
1168	 * signal return.  But other architectures do this and we have
1169	 * always done it up until now so it is probably better not to
1170	 * change it.  -- paulus
1171	 */
1172#ifdef CONFIG_PPC64
1173	if (compat_restore_altstack(&rt_sf->uc.uc_stack))
1174		goto bad;
1175#else
1176	if (restore_altstack(&rt_sf->uc.uc_stack))
1177		goto bad;
1178#endif
1179	set_thread_flag(TIF_RESTOREALL);
1180	return 0;
1181
1182 bad:
1183	signal_fault(current, regs, "sys_rt_sigreturn", rt_sf);
1184
1185	force_sig(SIGSEGV);
1186	return 0;
1187}
1188
1189#ifdef CONFIG_PPC32
1190SYSCALL_DEFINE3(debug_setcontext, struct ucontext __user *, ctx,
1191			 int, ndbg, struct sig_dbg_op __user *, dbg)
1192{
1193	struct pt_regs *regs = current_pt_regs();
1194	struct sig_dbg_op op;
1195	int i;
1196	unsigned long new_msr = regs->msr;
1197#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1198	unsigned long new_dbcr0 = current->thread.debug.dbcr0;
1199#endif
1200
1201	for (i=0; i<ndbg; i++) {
1202		if (copy_from_user(&op, dbg + i, sizeof(op)))
1203			return -EFAULT;
1204		switch (op.dbg_type) {
1205		case SIG_DBG_SINGLE_STEPPING:
1206#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1207			if (op.dbg_value) {
1208				new_msr |= MSR_DE;
1209				new_dbcr0 |= (DBCR0_IDM | DBCR0_IC);
1210			} else {
1211				new_dbcr0 &= ~DBCR0_IC;
1212				if (!DBCR_ACTIVE_EVENTS(new_dbcr0,
1213						current->thread.debug.dbcr1)) {
1214					new_msr &= ~MSR_DE;
1215					new_dbcr0 &= ~DBCR0_IDM;
1216				}
1217			}
1218#else
1219			if (op.dbg_value)
1220				new_msr |= MSR_SE;
1221			else
1222				new_msr &= ~MSR_SE;
1223#endif
1224			break;
1225		case SIG_DBG_BRANCH_TRACING:
1226#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1227			return -EINVAL;
1228#else
1229			if (op.dbg_value)
1230				new_msr |= MSR_BE;
1231			else
1232				new_msr &= ~MSR_BE;
1233#endif
1234			break;
1235
1236		default:
1237			return -EINVAL;
1238		}
1239	}
1240
1241	/* We wait until here to actually install the values in the
1242	   registers so if we fail in the above loop, it will not
1243	   affect the contents of these registers.  After this point,
1244	   failure is a problem, anyway, and it's very unlikely unless
1245	   the user is really doing something wrong. */
1246	regs_set_return_msr(regs, new_msr);
1247#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1248	current->thread.debug.dbcr0 = new_dbcr0;
1249#endif
1250
1251	if (!access_ok(ctx, sizeof(*ctx)) ||
1252	    fault_in_readable((char __user *)ctx, sizeof(*ctx)))
1253		return -EFAULT;
1254
1255	/*
1256	 * If we get a fault copying the context into the kernel's
1257	 * image of the user's registers, we can't just return -EFAULT
1258	 * because the user's registers will be corrupted.  For instance
1259	 * the NIP value may have been updated but not some of the
1260	 * other registers.  Given that we have done the access_ok
1261	 * and successfully read the first and last bytes of the region
1262	 * above, this should only happen in an out-of-memory situation
1263	 * or if another thread unmaps the region containing the context.
1264	 * We kill the task with a SIGSEGV in this situation.
1265	 */
1266	if (do_setcontext(ctx, regs, 1)) {
1267		signal_fault(current, regs, "sys_debug_setcontext", ctx);
1268
1269		force_sig(SIGSEGV);
1270		goto out;
1271	}
1272
1273	/*
1274	 * It's not clear whether or why it is desirable to save the
1275	 * sigaltstack setting on signal delivery and restore it on
1276	 * signal return.  But other architectures do this and we have
1277	 * always done it up until now so it is probably better not to
1278	 * change it.  -- paulus
1279	 */
1280	restore_altstack(&ctx->uc_stack);
1281
1282	set_thread_flag(TIF_RESTOREALL);
1283 out:
1284	return 0;
1285}
1286#endif
1287
1288/*
1289 * Do a signal return; undo the signal stack.
1290 */
1291#ifdef CONFIG_PPC64
1292COMPAT_SYSCALL_DEFINE0(sigreturn)
1293#else
1294SYSCALL_DEFINE0(sigreturn)
1295#endif
1296{
1297	struct pt_regs *regs = current_pt_regs();
1298	struct sigframe __user *sf;
1299	struct sigcontext __user *sc;
1300	struct sigcontext sigctx;
1301	struct mcontext __user *sr;
1302	sigset_t set;
1303	struct mcontext __user *mcp;
1304	struct mcontext __user *tm_mcp = NULL;
1305	unsigned long long msr_hi = 0;
1306
1307	/* Always make any pending restarted system calls return -EINTR */
1308	current->restart_block.fn = do_no_restart_syscall;
1309
1310	sf = (struct sigframe __user *)(regs->gpr[1] + __SIGNAL_FRAMESIZE);
1311	sc = &sf->sctx;
1312	if (copy_from_user(&sigctx, sc, sizeof(sigctx)))
1313		goto badframe;
1314
1315#ifdef CONFIG_PPC64
1316	/*
1317	 * Note that PPC32 puts the upper 32 bits of the sigmask in the
1318	 * unused part of the signal stackframe
1319	 */
1320	set.sig[0] = sigctx.oldmask + ((long)(sigctx._unused[3]) << 32);
1321#else
1322	set.sig[0] = sigctx.oldmask;
1323	set.sig[1] = sigctx._unused[3];
1324#endif
1325	set_current_blocked(&set);
1326
1327	mcp = (struct mcontext __user *)&sf->mctx;
1328#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1329	tm_mcp = (struct mcontext __user *)&sf->mctx_transact;
1330	if (__get_user(msr_hi, &tm_mcp->mc_gregs[PT_MSR]))
1331		goto badframe;
1332#endif
1333	if (MSR_TM_ACTIVE(msr_hi<<32)) {
1334		if (!cpu_has_feature(CPU_FTR_TM))
1335			goto badframe;
1336		if (restore_tm_user_regs(regs, mcp, tm_mcp))
1337			goto badframe;
1338	} else {
1339		sr = (struct mcontext __user *)from_user_ptr(sigctx.regs);
1340		if (restore_user_regs(regs, sr, 1)) {
1341			signal_fault(current, regs, "sys_sigreturn", sr);
1342
1343			force_sig(SIGSEGV);
1344			return 0;
1345		}
1346	}
1347
1348	set_thread_flag(TIF_RESTOREALL);
1349	return 0;
1350
1351badframe:
1352	signal_fault(current, regs, "sys_sigreturn", sc);
1353
1354	force_sig(SIGSEGV);
1355	return 0;
1356}