Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Signal handling for 32bit PPC and 32bit tasks on 64bit PPC
4 *
5 * PowerPC version
6 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
7 * Copyright (C) 2001 IBM
8 * Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
9 * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
10 *
11 * Derived from "arch/i386/kernel/signal.c"
12 * Copyright (C) 1991, 1992 Linus Torvalds
13 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
14 */
15
16#include <linux/sched.h>
17#include <linux/mm.h>
18#include <linux/smp.h>
19#include <linux/kernel.h>
20#include <linux/signal.h>
21#include <linux/errno.h>
22#include <linux/elf.h>
23#include <linux/ptrace.h>
24#include <linux/pagemap.h>
25#include <linux/ratelimit.h>
26#include <linux/syscalls.h>
27#ifdef CONFIG_PPC64
28#include <linux/compat.h>
29#else
30#include <linux/wait.h>
31#include <linux/unistd.h>
32#include <linux/stddef.h>
33#include <linux/tty.h>
34#include <linux/binfmts.h>
35#endif
36
37#include <linux/uaccess.h>
38#include <asm/cacheflush.h>
39#include <asm/syscalls.h>
40#include <asm/sigcontext.h>
41#include <asm/vdso.h>
42#include <asm/switch_to.h>
43#include <asm/tm.h>
44#include <asm/asm-prototypes.h>
45#ifdef CONFIG_PPC64
46#include <asm/syscalls_32.h>
47#include <asm/unistd.h>
48#else
49#include <asm/ucontext.h>
50#endif
51
52#include "signal.h"
53
54
55#ifdef CONFIG_PPC64
56#define old_sigaction old_sigaction32
57#define sigcontext sigcontext32
58#define mcontext mcontext32
59#define ucontext ucontext32
60
61/*
62 * Userspace code may pass a ucontext which doesn't include VSX added
63 * at the end. We need to check for this case.
64 */
65#define UCONTEXTSIZEWITHOUTVSX \
66 (sizeof(struct ucontext) - sizeof(elf_vsrreghalf_t32))
67
68/*
69 * Returning 0 means we return to userspace via
70 * ret_from_except and thus restore all user
71 * registers from *regs. This is what we need
72 * to do when a signal has been delivered.
73 */
74
75#define GP_REGS_SIZE min(sizeof(elf_gregset_t32), sizeof(struct pt_regs32))
76#undef __SIGNAL_FRAMESIZE
77#define __SIGNAL_FRAMESIZE __SIGNAL_FRAMESIZE32
78#undef ELF_NVRREG
79#define ELF_NVRREG ELF_NVRREG32
80
81/*
82 * Functions for flipping sigsets (thanks to brain dead generic
83 * implementation that makes things simple for little endian only)
84 */
85#define unsafe_put_sigset_t unsafe_put_compat_sigset
86#define unsafe_get_sigset_t unsafe_get_compat_sigset
87
88#define to_user_ptr(p) ptr_to_compat(p)
89#define from_user_ptr(p) compat_ptr(p)
90
91static __always_inline int
92__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
93{
94 elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
95 int val, i;
96
97 for (i = 0; i <= PT_RESULT; i ++) {
98 /* Force usr to alway see softe as 1 (interrupts enabled) */
99 if (i == PT_SOFTE)
100 val = 1;
101 else
102 val = gregs[i];
103
104 unsafe_put_user(val, &frame->mc_gregs[i], failed);
105 }
106 return 0;
107
108failed:
109 return 1;
110}
111
112static __always_inline int
113__unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
114{
115 elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
116 int i;
117
118 for (i = 0; i <= PT_RESULT; i++) {
119 if ((i == PT_MSR) || (i == PT_SOFTE))
120 continue;
121 unsafe_get_user(gregs[i], &sr->mc_gregs[i], failed);
122 }
123 return 0;
124
125failed:
126 return 1;
127}
128
129#else /* CONFIG_PPC64 */
130
131#define GP_REGS_SIZE min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
132
133#define unsafe_put_sigset_t(uset, set, label) do { \
134 sigset_t __user *__us = uset ; \
135 const sigset_t *__s = set; \
136 \
137 unsafe_copy_to_user(__us, __s, sizeof(*__us), label); \
138} while (0)
139
140#define unsafe_get_sigset_t unsafe_get_user_sigset
141
142#define to_user_ptr(p) ((unsigned long)(p))
143#define from_user_ptr(p) ((void __user *)(p))
144
145static __always_inline int
146__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
147{
148 unsafe_copy_to_user(&frame->mc_gregs, regs, GP_REGS_SIZE, failed);
149 return 0;
150
151failed:
152 return 1;
153}
154
155static __always_inline
156int __unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
157{
158 /* copy up to but not including MSR */
159 unsafe_copy_from_user(regs, &sr->mc_gregs, PT_MSR * sizeof(elf_greg_t), failed);
160
161 /* copy from orig_r3 (the word after the MSR) up to the end */
162 unsafe_copy_from_user(®s->orig_gpr3, &sr->mc_gregs[PT_ORIG_R3],
163 GP_REGS_SIZE - PT_ORIG_R3 * sizeof(elf_greg_t), failed);
164
165 return 0;
166
167failed:
168 return 1;
169}
170#endif
171
172#define unsafe_save_general_regs(regs, frame, label) do { \
173 if (__unsafe_save_general_regs(regs, frame)) \
174 goto label; \
175} while (0)
176
177#define unsafe_restore_general_regs(regs, frame, label) do { \
178 if (__unsafe_restore_general_regs(regs, frame)) \
179 goto label; \
180} while (0)
181
182/*
183 * When we have signals to deliver, we set up on the
184 * user stack, going down from the original stack pointer:
185 * an ABI gap of 56 words
186 * an mcontext struct
187 * a sigcontext struct
188 * a gap of __SIGNAL_FRAMESIZE bytes
189 *
190 * Each of these things must be a multiple of 16 bytes in size. The following
191 * structure represent all of this except the __SIGNAL_FRAMESIZE gap
192 *
193 */
194struct sigframe {
195 struct sigcontext sctx; /* the sigcontext */
196 struct mcontext mctx; /* all the register values */
197#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
198 struct sigcontext sctx_transact;
199 struct mcontext mctx_transact;
200#endif
201 /*
202 * Programs using the rs6000/xcoff abi can save up to 19 gp
203 * regs and 18 fp regs below sp before decrementing it.
204 */
205 int abigap[56];
206};
207
208/*
209 * When we have rt signals to deliver, we set up on the
210 * user stack, going down from the original stack pointer:
211 * one rt_sigframe struct (siginfo + ucontext + ABI gap)
212 * a gap of __SIGNAL_FRAMESIZE+16 bytes
213 * (the +16 is to get the siginfo and ucontext in the same
214 * positions as in older kernels).
215 *
216 * Each of these things must be a multiple of 16 bytes in size.
217 *
218 */
219struct rt_sigframe {
220#ifdef CONFIG_PPC64
221 compat_siginfo_t info;
222#else
223 struct siginfo info;
224#endif
225 struct ucontext uc;
226#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
227 struct ucontext uc_transact;
228#endif
229 /*
230 * Programs using the rs6000/xcoff abi can save up to 19 gp
231 * regs and 18 fp regs below sp before decrementing it.
232 */
233 int abigap[56];
234};
235
236unsigned long get_min_sigframe_size_32(void)
237{
238 return max(sizeof(struct rt_sigframe) + __SIGNAL_FRAMESIZE + 16,
239 sizeof(struct sigframe) + __SIGNAL_FRAMESIZE);
240}
241
242/*
243 * Save the current user registers on the user stack.
244 * We only save the altivec/spe registers if the process has used
245 * altivec/spe instructions at some point.
246 */
247static void prepare_save_user_regs(int ctx_has_vsx_region)
248{
249 /* Make sure floating point registers are stored in regs */
250 flush_fp_to_thread(current);
251#ifdef CONFIG_ALTIVEC
252 if (current->thread.used_vr)
253 flush_altivec_to_thread(current);
254 if (cpu_has_feature(CPU_FTR_ALTIVEC))
255 current->thread.vrsave = mfspr(SPRN_VRSAVE);
256#endif
257#ifdef CONFIG_VSX
258 if (current->thread.used_vsr && ctx_has_vsx_region)
259 flush_vsx_to_thread(current);
260#endif
261#ifdef CONFIG_SPE
262 if (current->thread.used_spe)
263 flush_spe_to_thread(current);
264#endif
265}
266
267static __always_inline int
268__unsafe_save_user_regs(struct pt_regs *regs, struct mcontext __user *frame,
269 struct mcontext __user *tm_frame, int ctx_has_vsx_region)
270{
271 unsigned long msr = regs->msr;
272
273 /* save general registers */
274 unsafe_save_general_regs(regs, frame, failed);
275
276#ifdef CONFIG_ALTIVEC
277 /* save altivec registers */
278 if (current->thread.used_vr) {
279 unsafe_copy_to_user(&frame->mc_vregs, ¤t->thread.vr_state,
280 ELF_NVRREG * sizeof(vector128), failed);
281 /* set MSR_VEC in the saved MSR value to indicate that
282 frame->mc_vregs contains valid data */
283 msr |= MSR_VEC;
284 }
285 /* else assert((regs->msr & MSR_VEC) == 0) */
286
287 /* We always copy to/from vrsave, it's 0 if we don't have or don't
288 * use altivec. Since VSCR only contains 32 bits saved in the least
289 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
290 * most significant bits of that same vector. --BenH
291 * Note that the current VRSAVE value is in the SPR at this point.
292 */
293 unsafe_put_user(current->thread.vrsave, (u32 __user *)&frame->mc_vregs[32],
294 failed);
295#endif /* CONFIG_ALTIVEC */
296 unsafe_copy_fpr_to_user(&frame->mc_fregs, current, failed);
297
298 /*
299 * Clear the MSR VSX bit to indicate there is no valid state attached
300 * to this context, except in the specific case below where we set it.
301 */
302 msr &= ~MSR_VSX;
303#ifdef CONFIG_VSX
304 /*
305 * Copy VSR 0-31 upper half from thread_struct to local
306 * buffer, then write that to userspace. Also set MSR_VSX in
307 * the saved MSR value to indicate that frame->mc_vregs
308 * contains valid data
309 */
310 if (current->thread.used_vsr && ctx_has_vsx_region) {
311 unsafe_copy_vsx_to_user(&frame->mc_vsregs, current, failed);
312 msr |= MSR_VSX;
313 }
314#endif /* CONFIG_VSX */
315#ifdef CONFIG_SPE
316 /* save spe registers */
317 if (current->thread.used_spe) {
318 unsafe_copy_to_user(&frame->mc_vregs, current->thread.evr,
319 ELF_NEVRREG * sizeof(u32), failed);
320 /* set MSR_SPE in the saved MSR value to indicate that
321 frame->mc_vregs contains valid data */
322 msr |= MSR_SPE;
323 }
324 /* else assert((regs->msr & MSR_SPE) == 0) */
325
326 /* We always copy to/from spefscr */
327 unsafe_put_user(current->thread.spefscr,
328 (u32 __user *)&frame->mc_vregs + ELF_NEVRREG, failed);
329#endif /* CONFIG_SPE */
330
331 unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
332
333 /* We need to write 0 the MSR top 32 bits in the tm frame so that we
334 * can check it on the restore to see if TM is active
335 */
336 if (tm_frame)
337 unsafe_put_user(0, &tm_frame->mc_gregs[PT_MSR], failed);
338
339 return 0;
340
341failed:
342 return 1;
343}
344
345#define unsafe_save_user_regs(regs, frame, tm_frame, has_vsx, label) do { \
346 if (__unsafe_save_user_regs(regs, frame, tm_frame, has_vsx)) \
347 goto label; \
348} while (0)
349
350#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
351/*
352 * Save the current user registers on the user stack.
353 * We only save the altivec/spe registers if the process has used
354 * altivec/spe instructions at some point.
355 * We also save the transactional registers to a second ucontext in the
356 * frame.
357 *
358 * See __unsafe_save_user_regs() and signal_64.c:setup_tm_sigcontexts().
359 */
360static void prepare_save_tm_user_regs(void)
361{
362 WARN_ON(tm_suspend_disabled);
363
364 if (cpu_has_feature(CPU_FTR_ALTIVEC))
365 current->thread.ckvrsave = mfspr(SPRN_VRSAVE);
366}
367
368static __always_inline int
369save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
370 struct mcontext __user *tm_frame, unsigned long msr)
371{
372 /* Save both sets of general registers */
373 unsafe_save_general_regs(¤t->thread.ckpt_regs, frame, failed);
374 unsafe_save_general_regs(regs, tm_frame, failed);
375
376 /* Stash the top half of the 64bit MSR into the 32bit MSR word
377 * of the transactional mcontext. This way we have a backward-compatible
378 * MSR in the 'normal' (checkpointed) mcontext and additionally one can
379 * also look at what type of transaction (T or S) was active at the
380 * time of the signal.
381 */
382 unsafe_put_user((msr >> 32), &tm_frame->mc_gregs[PT_MSR], failed);
383
384 /* save altivec registers */
385 if (current->thread.used_vr) {
386 unsafe_copy_to_user(&frame->mc_vregs, ¤t->thread.ckvr_state,
387 ELF_NVRREG * sizeof(vector128), failed);
388 if (msr & MSR_VEC)
389 unsafe_copy_to_user(&tm_frame->mc_vregs,
390 ¤t->thread.vr_state,
391 ELF_NVRREG * sizeof(vector128), failed);
392 else
393 unsafe_copy_to_user(&tm_frame->mc_vregs,
394 ¤t->thread.ckvr_state,
395 ELF_NVRREG * sizeof(vector128), failed);
396
397 /* set MSR_VEC in the saved MSR value to indicate that
398 * frame->mc_vregs contains valid data
399 */
400 msr |= MSR_VEC;
401 }
402
403 /* We always copy to/from vrsave, it's 0 if we don't have or don't
404 * use altivec. Since VSCR only contains 32 bits saved in the least
405 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
406 * most significant bits of that same vector. --BenH
407 */
408 unsafe_put_user(current->thread.ckvrsave,
409 (u32 __user *)&frame->mc_vregs[32], failed);
410 if (msr & MSR_VEC)
411 unsafe_put_user(current->thread.vrsave,
412 (u32 __user *)&tm_frame->mc_vregs[32], failed);
413 else
414 unsafe_put_user(current->thread.ckvrsave,
415 (u32 __user *)&tm_frame->mc_vregs[32], failed);
416
417 unsafe_copy_ckfpr_to_user(&frame->mc_fregs, current, failed);
418 if (msr & MSR_FP)
419 unsafe_copy_fpr_to_user(&tm_frame->mc_fregs, current, failed);
420 else
421 unsafe_copy_ckfpr_to_user(&tm_frame->mc_fregs, current, failed);
422
423 /*
424 * Copy VSR 0-31 upper half from thread_struct to local
425 * buffer, then write that to userspace. Also set MSR_VSX in
426 * the saved MSR value to indicate that frame->mc_vregs
427 * contains valid data
428 */
429 if (current->thread.used_vsr) {
430 unsafe_copy_ckvsx_to_user(&frame->mc_vsregs, current, failed);
431 if (msr & MSR_VSX)
432 unsafe_copy_vsx_to_user(&tm_frame->mc_vsregs, current, failed);
433 else
434 unsafe_copy_ckvsx_to_user(&tm_frame->mc_vsregs, current, failed);
435
436 msr |= MSR_VSX;
437 }
438
439 unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
440
441 return 0;
442
443failed:
444 return 1;
445}
446#else
447static void prepare_save_tm_user_regs(void) { }
448
449static __always_inline int
450save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
451 struct mcontext __user *tm_frame, unsigned long msr)
452{
453 return 0;
454}
455#endif
456
457#define unsafe_save_tm_user_regs(regs, frame, tm_frame, msr, label) do { \
458 if (save_tm_user_regs_unsafe(regs, frame, tm_frame, msr)) \
459 goto label; \
460} while (0)
461
462/*
463 * Restore the current user register values from the user stack,
464 * (except for MSR).
465 */
466static long restore_user_regs(struct pt_regs *regs,
467 struct mcontext __user *sr, int sig)
468{
469 unsigned int save_r2 = 0;
470 unsigned long msr;
471#ifdef CONFIG_VSX
472 int i;
473#endif
474
475 if (!user_read_access_begin(sr, sizeof(*sr)))
476 return 1;
477 /*
478 * restore general registers but not including MSR or SOFTE. Also
479 * take care of keeping r2 (TLS) intact if not a signal
480 */
481 if (!sig)
482 save_r2 = (unsigned int)regs->gpr[2];
483 unsafe_restore_general_regs(regs, sr, failed);
484 set_trap_norestart(regs);
485 unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
486 if (!sig)
487 regs->gpr[2] = (unsigned long) save_r2;
488
489 /* if doing signal return, restore the previous little-endian mode */
490 if (sig)
491 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
492
493#ifdef CONFIG_ALTIVEC
494 /*
495 * Force the process to reload the altivec registers from
496 * current->thread when it next does altivec instructions
497 */
498 regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
499 if (msr & MSR_VEC) {
500 /* restore altivec registers from the stack */
501 unsafe_copy_from_user(¤t->thread.vr_state, &sr->mc_vregs,
502 sizeof(sr->mc_vregs), failed);
503 current->thread.used_vr = true;
504 } else if (current->thread.used_vr)
505 memset(¤t->thread.vr_state, 0,
506 ELF_NVRREG * sizeof(vector128));
507
508 /* Always get VRSAVE back */
509 unsafe_get_user(current->thread.vrsave, (u32 __user *)&sr->mc_vregs[32], failed);
510 if (cpu_has_feature(CPU_FTR_ALTIVEC))
511 mtspr(SPRN_VRSAVE, current->thread.vrsave);
512#endif /* CONFIG_ALTIVEC */
513 unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
514
515#ifdef CONFIG_VSX
516 /*
517 * Force the process to reload the VSX registers from
518 * current->thread when it next does VSX instruction.
519 */
520 regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
521 if (msr & MSR_VSX) {
522 /*
523 * Restore altivec registers from the stack to a local
524 * buffer, then write this out to the thread_struct
525 */
526 unsafe_copy_vsx_from_user(current, &sr->mc_vsregs, failed);
527 current->thread.used_vsr = true;
528 } else if (current->thread.used_vsr)
529 for (i = 0; i < 32 ; i++)
530 current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
531#endif /* CONFIG_VSX */
532 /*
533 * force the process to reload the FP registers from
534 * current->thread when it next does FP instructions
535 */
536 regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
537
538#ifdef CONFIG_SPE
539 /*
540 * Force the process to reload the spe registers from
541 * current->thread when it next does spe instructions.
542 * Since this is user ABI, we must enforce the sizing.
543 */
544 BUILD_BUG_ON(sizeof(current->thread.spe) != ELF_NEVRREG * sizeof(u32));
545 regs_set_return_msr(regs, regs->msr & ~MSR_SPE);
546 if (msr & MSR_SPE) {
547 /* restore spe registers from the stack */
548 unsafe_copy_from_user(¤t->thread.spe, &sr->mc_vregs,
549 sizeof(current->thread.spe), failed);
550 current->thread.used_spe = true;
551 } else if (current->thread.used_spe)
552 memset(¤t->thread.spe, 0, sizeof(current->thread.spe));
553
554 /* Always get SPEFSCR back */
555 unsafe_get_user(current->thread.spefscr, (u32 __user *)&sr->mc_vregs + ELF_NEVRREG, failed);
556#endif /* CONFIG_SPE */
557
558 user_read_access_end();
559 return 0;
560
561failed:
562 user_read_access_end();
563 return 1;
564}
565
566#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
567/*
568 * Restore the current user register values from the user stack, except for
569 * MSR, and recheckpoint the original checkpointed register state for processes
570 * in transactions.
571 */
572static long restore_tm_user_regs(struct pt_regs *regs,
573 struct mcontext __user *sr,
574 struct mcontext __user *tm_sr)
575{
576 unsigned long msr, msr_hi;
577 int i;
578
579 if (tm_suspend_disabled)
580 return 1;
581 /*
582 * restore general registers but not including MSR or SOFTE. Also
583 * take care of keeping r2 (TLS) intact if not a signal.
584 * See comment in signal_64.c:restore_tm_sigcontexts();
585 * TFHAR is restored from the checkpointed NIP; TEXASR and TFIAR
586 * were set by the signal delivery.
587 */
588 if (!user_read_access_begin(sr, sizeof(*sr)))
589 return 1;
590
591 unsafe_restore_general_regs(¤t->thread.ckpt_regs, sr, failed);
592 unsafe_get_user(current->thread.tm_tfhar, &sr->mc_gregs[PT_NIP], failed);
593 unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
594
595 /* Restore the previous little-endian mode */
596 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
597
598 regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
599 if (msr & MSR_VEC) {
600 /* restore altivec registers from the stack */
601 unsafe_copy_from_user(¤t->thread.ckvr_state, &sr->mc_vregs,
602 sizeof(sr->mc_vregs), failed);
603 current->thread.used_vr = true;
604 } else if (current->thread.used_vr) {
605 memset(¤t->thread.vr_state, 0,
606 ELF_NVRREG * sizeof(vector128));
607 memset(¤t->thread.ckvr_state, 0,
608 ELF_NVRREG * sizeof(vector128));
609 }
610
611 /* Always get VRSAVE back */
612 unsafe_get_user(current->thread.ckvrsave,
613 (u32 __user *)&sr->mc_vregs[32], failed);
614 if (cpu_has_feature(CPU_FTR_ALTIVEC))
615 mtspr(SPRN_VRSAVE, current->thread.ckvrsave);
616
617 regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
618
619 unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
620
621 regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
622 if (msr & MSR_VSX) {
623 /*
624 * Restore altivec registers from the stack to a local
625 * buffer, then write this out to the thread_struct
626 */
627 unsafe_copy_ckvsx_from_user(current, &sr->mc_vsregs, failed);
628 current->thread.used_vsr = true;
629 } else if (current->thread.used_vsr)
630 for (i = 0; i < 32 ; i++) {
631 current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
632 current->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
633 }
634
635 user_read_access_end();
636
637 if (!user_read_access_begin(tm_sr, sizeof(*tm_sr)))
638 return 1;
639
640 unsafe_restore_general_regs(regs, tm_sr, failed);
641
642 /* restore altivec registers from the stack */
643 if (msr & MSR_VEC)
644 unsafe_copy_from_user(¤t->thread.vr_state, &tm_sr->mc_vregs,
645 sizeof(sr->mc_vregs), failed);
646
647 /* Always get VRSAVE back */
648 unsafe_get_user(current->thread.vrsave,
649 (u32 __user *)&tm_sr->mc_vregs[32], failed);
650
651 unsafe_copy_ckfpr_from_user(current, &tm_sr->mc_fregs, failed);
652
653 if (msr & MSR_VSX) {
654 /*
655 * Restore altivec registers from the stack to a local
656 * buffer, then write this out to the thread_struct
657 */
658 unsafe_copy_vsx_from_user(current, &tm_sr->mc_vsregs, failed);
659 current->thread.used_vsr = true;
660 }
661
662 /* Get the top half of the MSR from the user context */
663 unsafe_get_user(msr_hi, &tm_sr->mc_gregs[PT_MSR], failed);
664 msr_hi <<= 32;
665
666 user_read_access_end();
667
668 /* If TM bits are set to the reserved value, it's an invalid context */
669 if (MSR_TM_RESV(msr_hi))
670 return 1;
671
672 /*
673 * Disabling preemption, since it is unsafe to be preempted
674 * with MSR[TS] set without recheckpointing.
675 */
676 preempt_disable();
677
678 /*
679 * CAUTION:
680 * After regs->MSR[TS] being updated, make sure that get_user(),
681 * put_user() or similar functions are *not* called. These
682 * functions can generate page faults which will cause the process
683 * to be de-scheduled with MSR[TS] set but without calling
684 * tm_recheckpoint(). This can cause a bug.
685 *
686 * Pull in the MSR TM bits from the user context
687 */
688 regs_set_return_msr(regs, (regs->msr & ~MSR_TS_MASK) | (msr_hi & MSR_TS_MASK));
689 /* Now, recheckpoint. This loads up all of the checkpointed (older)
690 * registers, including FP and V[S]Rs. After recheckpointing, the
691 * transactional versions should be loaded.
692 */
693 tm_enable();
694 /* Make sure the transaction is marked as failed */
695 current->thread.tm_texasr |= TEXASR_FS;
696 /* This loads the checkpointed FP/VEC state, if used */
697 tm_recheckpoint(¤t->thread);
698
699 /* This loads the speculative FP/VEC state, if used */
700 msr_check_and_set(msr & (MSR_FP | MSR_VEC));
701 if (msr & MSR_FP) {
702 load_fp_state(¤t->thread.fp_state);
703 regs_set_return_msr(regs, regs->msr | (MSR_FP | current->thread.fpexc_mode));
704 }
705 if (msr & MSR_VEC) {
706 load_vr_state(¤t->thread.vr_state);
707 regs_set_return_msr(regs, regs->msr | MSR_VEC);
708 }
709
710 preempt_enable();
711
712 return 0;
713
714failed:
715 user_read_access_end();
716 return 1;
717}
718#else
719static long restore_tm_user_regs(struct pt_regs *regs, struct mcontext __user *sr,
720 struct mcontext __user *tm_sr)
721{
722 return 0;
723}
724#endif
725
726#ifdef CONFIG_PPC64
727
728#define copy_siginfo_to_user copy_siginfo_to_user32
729
730#endif /* CONFIG_PPC64 */
731
732/*
733 * Set up a signal frame for a "real-time" signal handler
734 * (one which gets siginfo).
735 */
736int handle_rt_signal32(struct ksignal *ksig, sigset_t *oldset,
737 struct task_struct *tsk)
738{
739 struct rt_sigframe __user *frame;
740 struct mcontext __user *mctx;
741 struct mcontext __user *tm_mctx = NULL;
742 unsigned long newsp = 0;
743 unsigned long tramp;
744 struct pt_regs *regs = tsk->thread.regs;
745 /* Save the thread's msr before get_tm_stackpointer() changes it */
746 unsigned long msr = regs->msr;
747
748 /* Set up Signal Frame */
749 frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
750 mctx = &frame->uc.uc_mcontext;
751#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
752 tm_mctx = &frame->uc_transact.uc_mcontext;
753#endif
754 if (MSR_TM_ACTIVE(msr))
755 prepare_save_tm_user_regs();
756 else
757 prepare_save_user_regs(1);
758
759 if (!user_access_begin(frame, sizeof(*frame)))
760 goto badframe;
761
762 /* Put the siginfo & fill in most of the ucontext */
763 unsafe_put_user(0, &frame->uc.uc_flags, failed);
764#ifdef CONFIG_PPC64
765 unsafe_compat_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
766#else
767 unsafe_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
768#endif
769 unsafe_put_user(to_user_ptr(&frame->uc.uc_mcontext), &frame->uc.uc_regs, failed);
770
771 if (MSR_TM_ACTIVE(msr)) {
772#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
773 unsafe_put_user((unsigned long)&frame->uc_transact,
774 &frame->uc.uc_link, failed);
775 unsafe_put_user((unsigned long)tm_mctx,
776 &frame->uc_transact.uc_regs, failed);
777#endif
778 unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
779 } else {
780 unsafe_put_user(0, &frame->uc.uc_link, failed);
781 unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
782 }
783
784 /* Save user registers on the stack */
785 if (tsk->mm->context.vdso) {
786 tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp_rt32);
787 } else {
788 tramp = (unsigned long)mctx->mc_pad;
789 unsafe_put_user(PPC_RAW_LI(_R0, __NR_rt_sigreturn), &mctx->mc_pad[0], failed);
790 unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
791 asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
792 }
793 unsafe_put_sigset_t(&frame->uc.uc_sigmask, oldset, failed);
794
795 user_access_end();
796
797 if (copy_siginfo_to_user(&frame->info, &ksig->info))
798 goto badframe;
799
800 regs->link = tramp;
801
802#ifdef CONFIG_PPC_FPU_REGS
803 tsk->thread.fp_state.fpscr = 0; /* turn off all fp exceptions */
804#endif
805
806 /* create a stack frame for the caller of the handler */
807 newsp = ((unsigned long)frame) - (__SIGNAL_FRAMESIZE + 16);
808 if (put_user(regs->gpr[1], (u32 __user *)newsp))
809 goto badframe;
810
811 /* Fill registers for signal handler */
812 regs->gpr[1] = newsp;
813 regs->gpr[3] = ksig->sig;
814 regs->gpr[4] = (unsigned long)&frame->info;
815 regs->gpr[5] = (unsigned long)&frame->uc;
816 regs->gpr[6] = (unsigned long)frame;
817 regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
818 /* enter the signal handler in native-endian mode */
819 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
820
821 return 0;
822
823failed:
824 user_access_end();
825
826badframe:
827 signal_fault(tsk, regs, "handle_rt_signal32", frame);
828
829 return 1;
830}
831
832/*
833 * OK, we're invoking a handler
834 */
835int handle_signal32(struct ksignal *ksig, sigset_t *oldset,
836 struct task_struct *tsk)
837{
838 struct sigcontext __user *sc;
839 struct sigframe __user *frame;
840 struct mcontext __user *mctx;
841 struct mcontext __user *tm_mctx = NULL;
842 unsigned long newsp = 0;
843 unsigned long tramp;
844 struct pt_regs *regs = tsk->thread.regs;
845 /* Save the thread's msr before get_tm_stackpointer() changes it */
846 unsigned long msr = regs->msr;
847
848 /* Set up Signal Frame */
849 frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
850 mctx = &frame->mctx;
851#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
852 tm_mctx = &frame->mctx_transact;
853#endif
854 if (MSR_TM_ACTIVE(msr))
855 prepare_save_tm_user_regs();
856 else
857 prepare_save_user_regs(1);
858
859 if (!user_access_begin(frame, sizeof(*frame)))
860 goto badframe;
861 sc = (struct sigcontext __user *) &frame->sctx;
862
863#if _NSIG != 64
864#error "Please adjust handle_signal()"
865#endif
866 unsafe_put_user(to_user_ptr(ksig->ka.sa.sa_handler), &sc->handler, failed);
867 unsafe_put_user(oldset->sig[0], &sc->oldmask, failed);
868#ifdef CONFIG_PPC64
869 unsafe_put_user((oldset->sig[0] >> 32), &sc->_unused[3], failed);
870#else
871 unsafe_put_user(oldset->sig[1], &sc->_unused[3], failed);
872#endif
873 unsafe_put_user(to_user_ptr(mctx), &sc->regs, failed);
874 unsafe_put_user(ksig->sig, &sc->signal, failed);
875
876 if (MSR_TM_ACTIVE(msr))
877 unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
878 else
879 unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
880
881 if (tsk->mm->context.vdso) {
882 tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp32);
883 } else {
884 tramp = (unsigned long)mctx->mc_pad;
885 unsafe_put_user(PPC_RAW_LI(_R0, __NR_sigreturn), &mctx->mc_pad[0], failed);
886 unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
887 asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
888 }
889 user_access_end();
890
891 regs->link = tramp;
892
893#ifdef CONFIG_PPC_FPU_REGS
894 tsk->thread.fp_state.fpscr = 0; /* turn off all fp exceptions */
895#endif
896
897 /* create a stack frame for the caller of the handler */
898 newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
899 if (put_user(regs->gpr[1], (u32 __user *)newsp))
900 goto badframe;
901
902 regs->gpr[1] = newsp;
903 regs->gpr[3] = ksig->sig;
904 regs->gpr[4] = (unsigned long) sc;
905 regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
906 /* enter the signal handler in native-endian mode */
907 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
908
909 return 0;
910
911failed:
912 user_access_end();
913
914badframe:
915 signal_fault(tsk, regs, "handle_signal32", frame);
916
917 return 1;
918}
919
920static int do_setcontext(struct ucontext __user *ucp, struct pt_regs *regs, int sig)
921{
922 sigset_t set;
923 struct mcontext __user *mcp;
924
925 if (!user_read_access_begin(ucp, sizeof(*ucp)))
926 return -EFAULT;
927
928 unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
929#ifdef CONFIG_PPC64
930 {
931 u32 cmcp;
932
933 unsafe_get_user(cmcp, &ucp->uc_regs, failed);
934 mcp = (struct mcontext __user *)(u64)cmcp;
935 }
936#else
937 unsafe_get_user(mcp, &ucp->uc_regs, failed);
938#endif
939 user_read_access_end();
940
941 set_current_blocked(&set);
942 if (restore_user_regs(regs, mcp, sig))
943 return -EFAULT;
944
945 return 0;
946
947failed:
948 user_read_access_end();
949 return -EFAULT;
950}
951
952#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
953static int do_setcontext_tm(struct ucontext __user *ucp,
954 struct ucontext __user *tm_ucp,
955 struct pt_regs *regs)
956{
957 sigset_t set;
958 struct mcontext __user *mcp;
959 struct mcontext __user *tm_mcp;
960 u32 cmcp;
961 u32 tm_cmcp;
962
963 if (!user_read_access_begin(ucp, sizeof(*ucp)))
964 return -EFAULT;
965
966 unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
967 unsafe_get_user(cmcp, &ucp->uc_regs, failed);
968
969 user_read_access_end();
970
971 if (__get_user(tm_cmcp, &tm_ucp->uc_regs))
972 return -EFAULT;
973 mcp = (struct mcontext __user *)(u64)cmcp;
974 tm_mcp = (struct mcontext __user *)(u64)tm_cmcp;
975 /* no need to check access_ok(mcp), since mcp < 4GB */
976
977 set_current_blocked(&set);
978 if (restore_tm_user_regs(regs, mcp, tm_mcp))
979 return -EFAULT;
980
981 return 0;
982
983failed:
984 user_read_access_end();
985 return -EFAULT;
986}
987#endif
988
989#ifdef CONFIG_PPC64
990COMPAT_SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
991 struct ucontext __user *, new_ctx, int, ctx_size)
992#else
993SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
994 struct ucontext __user *, new_ctx, long, ctx_size)
995#endif
996{
997 struct pt_regs *regs = current_pt_regs();
998 int ctx_has_vsx_region = 0;
999
1000#ifdef CONFIG_PPC64
1001 unsigned long new_msr = 0;
1002
1003 if (new_ctx) {
1004 struct mcontext __user *mcp;
1005 u32 cmcp;
1006
1007 /*
1008 * Get pointer to the real mcontext. No need for
1009 * access_ok since we are dealing with compat
1010 * pointers.
1011 */
1012 if (__get_user(cmcp, &new_ctx->uc_regs))
1013 return -EFAULT;
1014 mcp = (struct mcontext __user *)(u64)cmcp;
1015 if (__get_user(new_msr, &mcp->mc_gregs[PT_MSR]))
1016 return -EFAULT;
1017 }
1018 /*
1019 * Check that the context is not smaller than the original
1020 * size (with VMX but without VSX)
1021 */
1022 if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
1023 return -EINVAL;
1024 /*
1025 * If the new context state sets the MSR VSX bits but
1026 * it doesn't provide VSX state.
1027 */
1028 if ((ctx_size < sizeof(struct ucontext)) &&
1029 (new_msr & MSR_VSX))
1030 return -EINVAL;
1031 /* Does the context have enough room to store VSX data? */
1032 if (ctx_size >= sizeof(struct ucontext))
1033 ctx_has_vsx_region = 1;
1034#else
1035 /* Context size is for future use. Right now, we only make sure
1036 * we are passed something we understand
1037 */
1038 if (ctx_size < sizeof(struct ucontext))
1039 return -EINVAL;
1040#endif
1041 if (old_ctx != NULL) {
1042 struct mcontext __user *mctx;
1043
1044 /*
1045 * old_ctx might not be 16-byte aligned, in which
1046 * case old_ctx->uc_mcontext won't be either.
1047 * Because we have the old_ctx->uc_pad2 field
1048 * before old_ctx->uc_mcontext, we need to round down
1049 * from &old_ctx->uc_mcontext to a 16-byte boundary.
1050 */
1051 mctx = (struct mcontext __user *)
1052 ((unsigned long) &old_ctx->uc_mcontext & ~0xfUL);
1053 prepare_save_user_regs(ctx_has_vsx_region);
1054 if (!user_write_access_begin(old_ctx, ctx_size))
1055 return -EFAULT;
1056 unsafe_save_user_regs(regs, mctx, NULL, ctx_has_vsx_region, failed);
1057 unsafe_put_sigset_t(&old_ctx->uc_sigmask, ¤t->blocked, failed);
1058 unsafe_put_user(to_user_ptr(mctx), &old_ctx->uc_regs, failed);
1059 user_write_access_end();
1060 }
1061 if (new_ctx == NULL)
1062 return 0;
1063 if (!access_ok(new_ctx, ctx_size) ||
1064 fault_in_readable((char __user *)new_ctx, ctx_size))
1065 return -EFAULT;
1066
1067 /*
1068 * If we get a fault copying the context into the kernel's
1069 * image of the user's registers, we can't just return -EFAULT
1070 * because the user's registers will be corrupted. For instance
1071 * the NIP value may have been updated but not some of the
1072 * other registers. Given that we have done the access_ok
1073 * and successfully read the first and last bytes of the region
1074 * above, this should only happen in an out-of-memory situation
1075 * or if another thread unmaps the region containing the context.
1076 * We kill the task with a SIGSEGV in this situation.
1077 */
1078 if (do_setcontext(new_ctx, regs, 0)) {
1079 force_exit_sig(SIGSEGV);
1080 return -EFAULT;
1081 }
1082
1083 set_thread_flag(TIF_RESTOREALL);
1084 return 0;
1085
1086failed:
1087 user_write_access_end();
1088 return -EFAULT;
1089}
1090
1091#ifdef CONFIG_PPC64
1092COMPAT_SYSCALL_DEFINE0(rt_sigreturn)
1093#else
1094SYSCALL_DEFINE0(rt_sigreturn)
1095#endif
1096{
1097 struct rt_sigframe __user *rt_sf;
1098 struct pt_regs *regs = current_pt_regs();
1099 int tm_restore = 0;
1100#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1101 struct ucontext __user *uc_transact;
1102 unsigned long msr_hi;
1103 unsigned long tmp;
1104#endif
1105 /* Always make any pending restarted system calls return -EINTR */
1106 current->restart_block.fn = do_no_restart_syscall;
1107
1108 rt_sf = (struct rt_sigframe __user *)
1109 (regs->gpr[1] + __SIGNAL_FRAMESIZE + 16);
1110 if (!access_ok(rt_sf, sizeof(*rt_sf)))
1111 goto bad;
1112
1113#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1114 /*
1115 * If there is a transactional state then throw it away.
1116 * The purpose of a sigreturn is to destroy all traces of the
1117 * signal frame, this includes any transactional state created
1118 * within in. We only check for suspended as we can never be
1119 * active in the kernel, we are active, there is nothing better to
1120 * do than go ahead and Bad Thing later.
1121 * The cause is not important as there will never be a
1122 * recheckpoint so it's not user visible.
1123 */
1124 if (MSR_TM_SUSPENDED(mfmsr()))
1125 tm_reclaim_current(0);
1126
1127 if (__get_user(tmp, &rt_sf->uc.uc_link))
1128 goto bad;
1129 uc_transact = (struct ucontext __user *)(uintptr_t)tmp;
1130 if (uc_transact) {
1131 u32 cmcp;
1132 struct mcontext __user *mcp;
1133
1134 if (__get_user(cmcp, &uc_transact->uc_regs))
1135 return -EFAULT;
1136 mcp = (struct mcontext __user *)(u64)cmcp;
1137 /* The top 32 bits of the MSR are stashed in the transactional
1138 * ucontext. */
1139 if (__get_user(msr_hi, &mcp->mc_gregs[PT_MSR]))
1140 goto bad;
1141
1142 if (MSR_TM_ACTIVE(msr_hi<<32)) {
1143 /* Trying to start TM on non TM system */
1144 if (!cpu_has_feature(CPU_FTR_TM))
1145 goto bad;
1146 /* We only recheckpoint on return if we're
1147 * transaction.
1148 */
1149 tm_restore = 1;
1150 if (do_setcontext_tm(&rt_sf->uc, uc_transact, regs))
1151 goto bad;
1152 }
1153 }
1154 if (!tm_restore) {
1155 /*
1156 * Unset regs->msr because ucontext MSR TS is not
1157 * set, and recheckpoint was not called. This avoid
1158 * hitting a TM Bad thing at RFID
1159 */
1160 regs_set_return_msr(regs, regs->msr & ~MSR_TS_MASK);
1161 }
1162 /* Fall through, for non-TM restore */
1163#endif
1164 if (!tm_restore)
1165 if (do_setcontext(&rt_sf->uc, regs, 1))
1166 goto bad;
1167
1168 /*
1169 * It's not clear whether or why it is desirable to save the
1170 * sigaltstack setting on signal delivery and restore it on
1171 * signal return. But other architectures do this and we have
1172 * always done it up until now so it is probably better not to
1173 * change it. -- paulus
1174 */
1175#ifdef CONFIG_PPC64
1176 if (compat_restore_altstack(&rt_sf->uc.uc_stack))
1177 goto bad;
1178#else
1179 if (restore_altstack(&rt_sf->uc.uc_stack))
1180 goto bad;
1181#endif
1182 set_thread_flag(TIF_RESTOREALL);
1183 return 0;
1184
1185 bad:
1186 signal_fault(current, regs, "sys_rt_sigreturn", rt_sf);
1187
1188 force_sig(SIGSEGV);
1189 return 0;
1190}
1191
1192#ifdef CONFIG_PPC32
1193SYSCALL_DEFINE3(debug_setcontext, struct ucontext __user *, ctx,
1194 int, ndbg, struct sig_dbg_op __user *, dbg)
1195{
1196 struct pt_regs *regs = current_pt_regs();
1197 struct sig_dbg_op op;
1198 int i;
1199 unsigned long new_msr = regs->msr;
1200#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1201 unsigned long new_dbcr0 = current->thread.debug.dbcr0;
1202#endif
1203
1204 for (i=0; i<ndbg; i++) {
1205 if (copy_from_user(&op, dbg + i, sizeof(op)))
1206 return -EFAULT;
1207 switch (op.dbg_type) {
1208 case SIG_DBG_SINGLE_STEPPING:
1209#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1210 if (op.dbg_value) {
1211 new_msr |= MSR_DE;
1212 new_dbcr0 |= (DBCR0_IDM | DBCR0_IC);
1213 } else {
1214 new_dbcr0 &= ~DBCR0_IC;
1215 if (!DBCR_ACTIVE_EVENTS(new_dbcr0,
1216 current->thread.debug.dbcr1)) {
1217 new_msr &= ~MSR_DE;
1218 new_dbcr0 &= ~DBCR0_IDM;
1219 }
1220 }
1221#else
1222 if (op.dbg_value)
1223 new_msr |= MSR_SE;
1224 else
1225 new_msr &= ~MSR_SE;
1226#endif
1227 break;
1228 case SIG_DBG_BRANCH_TRACING:
1229#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1230 return -EINVAL;
1231#else
1232 if (op.dbg_value)
1233 new_msr |= MSR_BE;
1234 else
1235 new_msr &= ~MSR_BE;
1236#endif
1237 break;
1238
1239 default:
1240 return -EINVAL;
1241 }
1242 }
1243
1244 /* We wait until here to actually install the values in the
1245 registers so if we fail in the above loop, it will not
1246 affect the contents of these registers. After this point,
1247 failure is a problem, anyway, and it's very unlikely unless
1248 the user is really doing something wrong. */
1249 regs_set_return_msr(regs, new_msr);
1250#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1251 current->thread.debug.dbcr0 = new_dbcr0;
1252#endif
1253
1254 if (!access_ok(ctx, sizeof(*ctx)) ||
1255 fault_in_readable((char __user *)ctx, sizeof(*ctx)))
1256 return -EFAULT;
1257
1258 /*
1259 * If we get a fault copying the context into the kernel's
1260 * image of the user's registers, we can't just return -EFAULT
1261 * because the user's registers will be corrupted. For instance
1262 * the NIP value may have been updated but not some of the
1263 * other registers. Given that we have done the access_ok
1264 * and successfully read the first and last bytes of the region
1265 * above, this should only happen in an out-of-memory situation
1266 * or if another thread unmaps the region containing the context.
1267 * We kill the task with a SIGSEGV in this situation.
1268 */
1269 if (do_setcontext(ctx, regs, 1)) {
1270 signal_fault(current, regs, "sys_debug_setcontext", ctx);
1271
1272 force_sig(SIGSEGV);
1273 goto out;
1274 }
1275
1276 /*
1277 * It's not clear whether or why it is desirable to save the
1278 * sigaltstack setting on signal delivery and restore it on
1279 * signal return. But other architectures do this and we have
1280 * always done it up until now so it is probably better not to
1281 * change it. -- paulus
1282 */
1283 restore_altstack(&ctx->uc_stack);
1284
1285 set_thread_flag(TIF_RESTOREALL);
1286 out:
1287 return 0;
1288}
1289#endif
1290
1291/*
1292 * Do a signal return; undo the signal stack.
1293 */
1294#ifdef CONFIG_PPC64
1295COMPAT_SYSCALL_DEFINE0(sigreturn)
1296#else
1297SYSCALL_DEFINE0(sigreturn)
1298#endif
1299{
1300 struct pt_regs *regs = current_pt_regs();
1301 struct sigframe __user *sf;
1302 struct sigcontext __user *sc;
1303 struct sigcontext sigctx;
1304 struct mcontext __user *sr;
1305 sigset_t set;
1306 struct mcontext __user *mcp;
1307 struct mcontext __user *tm_mcp = NULL;
1308 unsigned long long msr_hi = 0;
1309
1310 /* Always make any pending restarted system calls return -EINTR */
1311 current->restart_block.fn = do_no_restart_syscall;
1312
1313 sf = (struct sigframe __user *)(regs->gpr[1] + __SIGNAL_FRAMESIZE);
1314 sc = &sf->sctx;
1315 if (copy_from_user(&sigctx, sc, sizeof(sigctx)))
1316 goto badframe;
1317
1318#ifdef CONFIG_PPC64
1319 /*
1320 * Note that PPC32 puts the upper 32 bits of the sigmask in the
1321 * unused part of the signal stackframe
1322 */
1323 set.sig[0] = sigctx.oldmask + ((long)(sigctx._unused[3]) << 32);
1324#else
1325 set.sig[0] = sigctx.oldmask;
1326 set.sig[1] = sigctx._unused[3];
1327#endif
1328 set_current_blocked(&set);
1329
1330 mcp = (struct mcontext __user *)&sf->mctx;
1331#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1332 tm_mcp = (struct mcontext __user *)&sf->mctx_transact;
1333 if (__get_user(msr_hi, &tm_mcp->mc_gregs[PT_MSR]))
1334 goto badframe;
1335#endif
1336 if (MSR_TM_ACTIVE(msr_hi<<32)) {
1337 if (!cpu_has_feature(CPU_FTR_TM))
1338 goto badframe;
1339 if (restore_tm_user_regs(regs, mcp, tm_mcp))
1340 goto badframe;
1341 } else {
1342 sr = (struct mcontext __user *)from_user_ptr(sigctx.regs);
1343 if (restore_user_regs(regs, sr, 1)) {
1344 signal_fault(current, regs, "sys_sigreturn", sr);
1345
1346 force_sig(SIGSEGV);
1347 return 0;
1348 }
1349 }
1350
1351 set_thread_flag(TIF_RESTOREALL);
1352 return 0;
1353
1354badframe:
1355 signal_fault(current, regs, "sys_sigreturn", sc);
1356
1357 force_sig(SIGSEGV);
1358 return 0;
1359}
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Signal handling for 32bit PPC and 32bit tasks on 64bit PPC
4 *
5 * PowerPC version
6 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
7 * Copyright (C) 2001 IBM
8 * Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
9 * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
10 *
11 * Derived from "arch/i386/kernel/signal.c"
12 * Copyright (C) 1991, 1992 Linus Torvalds
13 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
14 */
15
16#include <linux/sched.h>
17#include <linux/mm.h>
18#include <linux/smp.h>
19#include <linux/kernel.h>
20#include <linux/signal.h>
21#include <linux/errno.h>
22#include <linux/elf.h>
23#include <linux/ptrace.h>
24#include <linux/pagemap.h>
25#include <linux/ratelimit.h>
26#include <linux/syscalls.h>
27#ifdef CONFIG_PPC64
28#include <linux/compat.h>
29#else
30#include <linux/wait.h>
31#include <linux/unistd.h>
32#include <linux/stddef.h>
33#include <linux/tty.h>
34#include <linux/binfmts.h>
35#endif
36
37#include <linux/uaccess.h>
38#include <asm/cacheflush.h>
39#include <asm/syscalls.h>
40#include <asm/sigcontext.h>
41#include <asm/vdso.h>
42#include <asm/switch_to.h>
43#include <asm/tm.h>
44#include <asm/asm-prototypes.h>
45#ifdef CONFIG_PPC64
46#include <asm/syscalls_32.h>
47#include <asm/unistd.h>
48#else
49#include <asm/ucontext.h>
50#endif
51
52#include "signal.h"
53
54
55#ifdef CONFIG_PPC64
56#define old_sigaction old_sigaction32
57#define sigcontext sigcontext32
58#define mcontext mcontext32
59#define ucontext ucontext32
60
61/*
62 * Userspace code may pass a ucontext which doesn't include VSX added
63 * at the end. We need to check for this case.
64 */
65#define UCONTEXTSIZEWITHOUTVSX \
66 (sizeof(struct ucontext) - sizeof(elf_vsrreghalf_t32))
67
68/*
69 * Returning 0 means we return to userspace via
70 * ret_from_except and thus restore all user
71 * registers from *regs. This is what we need
72 * to do when a signal has been delivered.
73 */
74
75#define GP_REGS_SIZE min(sizeof(elf_gregset_t32), sizeof(struct pt_regs32))
76#undef __SIGNAL_FRAMESIZE
77#define __SIGNAL_FRAMESIZE __SIGNAL_FRAMESIZE32
78#undef ELF_NVRREG
79#define ELF_NVRREG ELF_NVRREG32
80
81/*
82 * Functions for flipping sigsets (thanks to brain dead generic
83 * implementation that makes things simple for little endian only)
84 */
85#define unsafe_put_sigset_t unsafe_put_compat_sigset
86#define unsafe_get_sigset_t unsafe_get_compat_sigset
87
88#define to_user_ptr(p) ptr_to_compat(p)
89#define from_user_ptr(p) compat_ptr(p)
90
91static __always_inline int
92__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
93{
94 elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
95 int val, i;
96
97 for (i = 0; i <= PT_RESULT; i ++) {
98 /* Force usr to alway see softe as 1 (interrupts enabled) */
99 if (i == PT_SOFTE)
100 val = 1;
101 else
102 val = gregs[i];
103
104 unsafe_put_user(val, &frame->mc_gregs[i], failed);
105 }
106 return 0;
107
108failed:
109 return 1;
110}
111
112static __always_inline int
113__unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
114{
115 elf_greg_t64 *gregs = (elf_greg_t64 *)regs;
116 int i;
117
118 for (i = 0; i <= PT_RESULT; i++) {
119 if ((i == PT_MSR) || (i == PT_SOFTE))
120 continue;
121 unsafe_get_user(gregs[i], &sr->mc_gregs[i], failed);
122 }
123 return 0;
124
125failed:
126 return 1;
127}
128
129#else /* CONFIG_PPC64 */
130
131#define GP_REGS_SIZE min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
132
133#define unsafe_put_sigset_t(uset, set, label) do { \
134 sigset_t __user *__us = uset ; \
135 const sigset_t *__s = set; \
136 \
137 unsafe_copy_to_user(__us, __s, sizeof(*__us), label); \
138} while (0)
139
140#define unsafe_get_sigset_t unsafe_get_user_sigset
141
142#define to_user_ptr(p) ((unsigned long)(p))
143#define from_user_ptr(p) ((void __user *)(p))
144
145static __always_inline int
146__unsafe_save_general_regs(struct pt_regs *regs, struct mcontext __user *frame)
147{
148 unsafe_copy_to_user(&frame->mc_gregs, regs, GP_REGS_SIZE, failed);
149 return 0;
150
151failed:
152 return 1;
153}
154
155static __always_inline
156int __unsafe_restore_general_regs(struct pt_regs *regs, struct mcontext __user *sr)
157{
158 /* copy up to but not including MSR */
159 unsafe_copy_from_user(regs, &sr->mc_gregs, PT_MSR * sizeof(elf_greg_t), failed);
160
161 /* copy from orig_r3 (the word after the MSR) up to the end */
162 unsafe_copy_from_user(®s->orig_gpr3, &sr->mc_gregs[PT_ORIG_R3],
163 GP_REGS_SIZE - PT_ORIG_R3 * sizeof(elf_greg_t), failed);
164
165 return 0;
166
167failed:
168 return 1;
169}
170#endif
171
172#define unsafe_save_general_regs(regs, frame, label) do { \
173 if (__unsafe_save_general_regs(regs, frame)) \
174 goto label; \
175} while (0)
176
177#define unsafe_restore_general_regs(regs, frame, label) do { \
178 if (__unsafe_restore_general_regs(regs, frame)) \
179 goto label; \
180} while (0)
181
182/*
183 * When we have signals to deliver, we set up on the
184 * user stack, going down from the original stack pointer:
185 * an ABI gap of 56 words
186 * an mcontext struct
187 * a sigcontext struct
188 * a gap of __SIGNAL_FRAMESIZE bytes
189 *
190 * Each of these things must be a multiple of 16 bytes in size. The following
191 * structure represent all of this except the __SIGNAL_FRAMESIZE gap
192 *
193 */
194struct sigframe {
195 struct sigcontext sctx; /* the sigcontext */
196 struct mcontext mctx; /* all the register values */
197#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
198 struct sigcontext sctx_transact;
199 struct mcontext mctx_transact;
200#endif
201 /*
202 * Programs using the rs6000/xcoff abi can save up to 19 gp
203 * regs and 18 fp regs below sp before decrementing it.
204 */
205 int abigap[56];
206};
207
208/*
209 * When we have rt signals to deliver, we set up on the
210 * user stack, going down from the original stack pointer:
211 * one rt_sigframe struct (siginfo + ucontext + ABI gap)
212 * a gap of __SIGNAL_FRAMESIZE+16 bytes
213 * (the +16 is to get the siginfo and ucontext in the same
214 * positions as in older kernels).
215 *
216 * Each of these things must be a multiple of 16 bytes in size.
217 *
218 */
219struct rt_sigframe {
220#ifdef CONFIG_PPC64
221 compat_siginfo_t info;
222#else
223 struct siginfo info;
224#endif
225 struct ucontext uc;
226#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
227 struct ucontext uc_transact;
228#endif
229 /*
230 * Programs using the rs6000/xcoff abi can save up to 19 gp
231 * regs and 18 fp regs below sp before decrementing it.
232 */
233 int abigap[56];
234};
235
236unsigned long get_min_sigframe_size_32(void)
237{
238 return max(sizeof(struct rt_sigframe) + __SIGNAL_FRAMESIZE + 16,
239 sizeof(struct sigframe) + __SIGNAL_FRAMESIZE);
240}
241
242/*
243 * Save the current user registers on the user stack.
244 * We only save the altivec/spe registers if the process has used
245 * altivec/spe instructions at some point.
246 */
247static void prepare_save_user_regs(int ctx_has_vsx_region)
248{
249 /* Make sure floating point registers are stored in regs */
250 flush_fp_to_thread(current);
251#ifdef CONFIG_ALTIVEC
252 if (current->thread.used_vr)
253 flush_altivec_to_thread(current);
254 if (cpu_has_feature(CPU_FTR_ALTIVEC))
255 current->thread.vrsave = mfspr(SPRN_VRSAVE);
256#endif
257#ifdef CONFIG_VSX
258 if (current->thread.used_vsr && ctx_has_vsx_region)
259 flush_vsx_to_thread(current);
260#endif
261#ifdef CONFIG_SPE
262 if (current->thread.used_spe)
263 flush_spe_to_thread(current);
264#endif
265}
266
267static int __unsafe_save_user_regs(struct pt_regs *regs, struct mcontext __user *frame,
268 struct mcontext __user *tm_frame, int ctx_has_vsx_region)
269{
270 unsigned long msr = regs->msr;
271
272 /* save general registers */
273 unsafe_save_general_regs(regs, frame, failed);
274
275#ifdef CONFIG_ALTIVEC
276 /* save altivec registers */
277 if (current->thread.used_vr) {
278 unsafe_copy_to_user(&frame->mc_vregs, ¤t->thread.vr_state,
279 ELF_NVRREG * sizeof(vector128), failed);
280 /* set MSR_VEC in the saved MSR value to indicate that
281 frame->mc_vregs contains valid data */
282 msr |= MSR_VEC;
283 }
284 /* else assert((regs->msr & MSR_VEC) == 0) */
285
286 /* We always copy to/from vrsave, it's 0 if we don't have or don't
287 * use altivec. Since VSCR only contains 32 bits saved in the least
288 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
289 * most significant bits of that same vector. --BenH
290 * Note that the current VRSAVE value is in the SPR at this point.
291 */
292 unsafe_put_user(current->thread.vrsave, (u32 __user *)&frame->mc_vregs[32],
293 failed);
294#endif /* CONFIG_ALTIVEC */
295 unsafe_copy_fpr_to_user(&frame->mc_fregs, current, failed);
296
297 /*
298 * Clear the MSR VSX bit to indicate there is no valid state attached
299 * to this context, except in the specific case below where we set it.
300 */
301 msr &= ~MSR_VSX;
302#ifdef CONFIG_VSX
303 /*
304 * Copy VSR 0-31 upper half from thread_struct to local
305 * buffer, then write that to userspace. Also set MSR_VSX in
306 * the saved MSR value to indicate that frame->mc_vregs
307 * contains valid data
308 */
309 if (current->thread.used_vsr && ctx_has_vsx_region) {
310 unsafe_copy_vsx_to_user(&frame->mc_vsregs, current, failed);
311 msr |= MSR_VSX;
312 }
313#endif /* CONFIG_VSX */
314#ifdef CONFIG_SPE
315 /* save spe registers */
316 if (current->thread.used_spe) {
317 unsafe_copy_to_user(&frame->mc_vregs, current->thread.evr,
318 ELF_NEVRREG * sizeof(u32), failed);
319 /* set MSR_SPE in the saved MSR value to indicate that
320 frame->mc_vregs contains valid data */
321 msr |= MSR_SPE;
322 }
323 /* else assert((regs->msr & MSR_SPE) == 0) */
324
325 /* We always copy to/from spefscr */
326 unsafe_put_user(current->thread.spefscr,
327 (u32 __user *)&frame->mc_vregs + ELF_NEVRREG, failed);
328#endif /* CONFIG_SPE */
329
330 unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
331
332 /* We need to write 0 the MSR top 32 bits in the tm frame so that we
333 * can check it on the restore to see if TM is active
334 */
335 if (tm_frame)
336 unsafe_put_user(0, &tm_frame->mc_gregs[PT_MSR], failed);
337
338 return 0;
339
340failed:
341 return 1;
342}
343
344#define unsafe_save_user_regs(regs, frame, tm_frame, has_vsx, label) do { \
345 if (__unsafe_save_user_regs(regs, frame, tm_frame, has_vsx)) \
346 goto label; \
347} while (0)
348
349#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
350/*
351 * Save the current user registers on the user stack.
352 * We only save the altivec/spe registers if the process has used
353 * altivec/spe instructions at some point.
354 * We also save the transactional registers to a second ucontext in the
355 * frame.
356 *
357 * See __unsafe_save_user_regs() and signal_64.c:setup_tm_sigcontexts().
358 */
359static void prepare_save_tm_user_regs(void)
360{
361 WARN_ON(tm_suspend_disabled);
362
363 if (cpu_has_feature(CPU_FTR_ALTIVEC))
364 current->thread.ckvrsave = mfspr(SPRN_VRSAVE);
365}
366
367static int save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
368 struct mcontext __user *tm_frame, unsigned long msr)
369{
370 /* Save both sets of general registers */
371 unsafe_save_general_regs(¤t->thread.ckpt_regs, frame, failed);
372 unsafe_save_general_regs(regs, tm_frame, failed);
373
374 /* Stash the top half of the 64bit MSR into the 32bit MSR word
375 * of the transactional mcontext. This way we have a backward-compatible
376 * MSR in the 'normal' (checkpointed) mcontext and additionally one can
377 * also look at what type of transaction (T or S) was active at the
378 * time of the signal.
379 */
380 unsafe_put_user((msr >> 32), &tm_frame->mc_gregs[PT_MSR], failed);
381
382 /* save altivec registers */
383 if (current->thread.used_vr) {
384 unsafe_copy_to_user(&frame->mc_vregs, ¤t->thread.ckvr_state,
385 ELF_NVRREG * sizeof(vector128), failed);
386 if (msr & MSR_VEC)
387 unsafe_copy_to_user(&tm_frame->mc_vregs,
388 ¤t->thread.vr_state,
389 ELF_NVRREG * sizeof(vector128), failed);
390 else
391 unsafe_copy_to_user(&tm_frame->mc_vregs,
392 ¤t->thread.ckvr_state,
393 ELF_NVRREG * sizeof(vector128), failed);
394
395 /* set MSR_VEC in the saved MSR value to indicate that
396 * frame->mc_vregs contains valid data
397 */
398 msr |= MSR_VEC;
399 }
400
401 /* We always copy to/from vrsave, it's 0 if we don't have or don't
402 * use altivec. Since VSCR only contains 32 bits saved in the least
403 * significant bits of a vector, we "cheat" and stuff VRSAVE in the
404 * most significant bits of that same vector. --BenH
405 */
406 unsafe_put_user(current->thread.ckvrsave,
407 (u32 __user *)&frame->mc_vregs[32], failed);
408 if (msr & MSR_VEC)
409 unsafe_put_user(current->thread.vrsave,
410 (u32 __user *)&tm_frame->mc_vregs[32], failed);
411 else
412 unsafe_put_user(current->thread.ckvrsave,
413 (u32 __user *)&tm_frame->mc_vregs[32], failed);
414
415 unsafe_copy_ckfpr_to_user(&frame->mc_fregs, current, failed);
416 if (msr & MSR_FP)
417 unsafe_copy_fpr_to_user(&tm_frame->mc_fregs, current, failed);
418 else
419 unsafe_copy_ckfpr_to_user(&tm_frame->mc_fregs, current, failed);
420
421 /*
422 * Copy VSR 0-31 upper half from thread_struct to local
423 * buffer, then write that to userspace. Also set MSR_VSX in
424 * the saved MSR value to indicate that frame->mc_vregs
425 * contains valid data
426 */
427 if (current->thread.used_vsr) {
428 unsafe_copy_ckvsx_to_user(&frame->mc_vsregs, current, failed);
429 if (msr & MSR_VSX)
430 unsafe_copy_vsx_to_user(&tm_frame->mc_vsregs, current, failed);
431 else
432 unsafe_copy_ckvsx_to_user(&tm_frame->mc_vsregs, current, failed);
433
434 msr |= MSR_VSX;
435 }
436
437 unsafe_put_user(msr, &frame->mc_gregs[PT_MSR], failed);
438
439 return 0;
440
441failed:
442 return 1;
443}
444#else
445static void prepare_save_tm_user_regs(void) { }
446
447static int save_tm_user_regs_unsafe(struct pt_regs *regs, struct mcontext __user *frame,
448 struct mcontext __user *tm_frame, unsigned long msr)
449{
450 return 0;
451}
452#endif
453
454#define unsafe_save_tm_user_regs(regs, frame, tm_frame, msr, label) do { \
455 if (save_tm_user_regs_unsafe(regs, frame, tm_frame, msr)) \
456 goto label; \
457} while (0)
458
459/*
460 * Restore the current user register values from the user stack,
461 * (except for MSR).
462 */
463static long restore_user_regs(struct pt_regs *regs,
464 struct mcontext __user *sr, int sig)
465{
466 unsigned int save_r2 = 0;
467 unsigned long msr;
468#ifdef CONFIG_VSX
469 int i;
470#endif
471
472 if (!user_read_access_begin(sr, sizeof(*sr)))
473 return 1;
474 /*
475 * restore general registers but not including MSR or SOFTE. Also
476 * take care of keeping r2 (TLS) intact if not a signal
477 */
478 if (!sig)
479 save_r2 = (unsigned int)regs->gpr[2];
480 unsafe_restore_general_regs(regs, sr, failed);
481 set_trap_norestart(regs);
482 unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
483 if (!sig)
484 regs->gpr[2] = (unsigned long) save_r2;
485
486 /* if doing signal return, restore the previous little-endian mode */
487 if (sig)
488 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
489
490#ifdef CONFIG_ALTIVEC
491 /*
492 * Force the process to reload the altivec registers from
493 * current->thread when it next does altivec instructions
494 */
495 regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
496 if (msr & MSR_VEC) {
497 /* restore altivec registers from the stack */
498 unsafe_copy_from_user(¤t->thread.vr_state, &sr->mc_vregs,
499 sizeof(sr->mc_vregs), failed);
500 current->thread.used_vr = true;
501 } else if (current->thread.used_vr)
502 memset(¤t->thread.vr_state, 0,
503 ELF_NVRREG * sizeof(vector128));
504
505 /* Always get VRSAVE back */
506 unsafe_get_user(current->thread.vrsave, (u32 __user *)&sr->mc_vregs[32], failed);
507 if (cpu_has_feature(CPU_FTR_ALTIVEC))
508 mtspr(SPRN_VRSAVE, current->thread.vrsave);
509#endif /* CONFIG_ALTIVEC */
510 unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
511
512#ifdef CONFIG_VSX
513 /*
514 * Force the process to reload the VSX registers from
515 * current->thread when it next does VSX instruction.
516 */
517 regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
518 if (msr & MSR_VSX) {
519 /*
520 * Restore altivec registers from the stack to a local
521 * buffer, then write this out to the thread_struct
522 */
523 unsafe_copy_vsx_from_user(current, &sr->mc_vsregs, failed);
524 current->thread.used_vsr = true;
525 } else if (current->thread.used_vsr)
526 for (i = 0; i < 32 ; i++)
527 current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
528#endif /* CONFIG_VSX */
529 /*
530 * force the process to reload the FP registers from
531 * current->thread when it next does FP instructions
532 */
533 regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
534
535#ifdef CONFIG_SPE
536 /*
537 * Force the process to reload the spe registers from
538 * current->thread when it next does spe instructions.
539 * Since this is user ABI, we must enforce the sizing.
540 */
541 BUILD_BUG_ON(sizeof(current->thread.spe) != ELF_NEVRREG * sizeof(u32));
542 regs_set_return_msr(regs, regs->msr & ~MSR_SPE);
543 if (msr & MSR_SPE) {
544 /* restore spe registers from the stack */
545 unsafe_copy_from_user(¤t->thread.spe, &sr->mc_vregs,
546 sizeof(current->thread.spe), failed);
547 current->thread.used_spe = true;
548 } else if (current->thread.used_spe)
549 memset(¤t->thread.spe, 0, sizeof(current->thread.spe));
550
551 /* Always get SPEFSCR back */
552 unsafe_get_user(current->thread.spefscr, (u32 __user *)&sr->mc_vregs + ELF_NEVRREG, failed);
553#endif /* CONFIG_SPE */
554
555 user_read_access_end();
556 return 0;
557
558failed:
559 user_read_access_end();
560 return 1;
561}
562
563#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
564/*
565 * Restore the current user register values from the user stack, except for
566 * MSR, and recheckpoint the original checkpointed register state for processes
567 * in transactions.
568 */
569static long restore_tm_user_regs(struct pt_regs *regs,
570 struct mcontext __user *sr,
571 struct mcontext __user *tm_sr)
572{
573 unsigned long msr, msr_hi;
574 int i;
575
576 if (tm_suspend_disabled)
577 return 1;
578 /*
579 * restore general registers but not including MSR or SOFTE. Also
580 * take care of keeping r2 (TLS) intact if not a signal.
581 * See comment in signal_64.c:restore_tm_sigcontexts();
582 * TFHAR is restored from the checkpointed NIP; TEXASR and TFIAR
583 * were set by the signal delivery.
584 */
585 if (!user_read_access_begin(sr, sizeof(*sr)))
586 return 1;
587
588 unsafe_restore_general_regs(¤t->thread.ckpt_regs, sr, failed);
589 unsafe_get_user(current->thread.tm_tfhar, &sr->mc_gregs[PT_NIP], failed);
590 unsafe_get_user(msr, &sr->mc_gregs[PT_MSR], failed);
591
592 /* Restore the previous little-endian mode */
593 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (msr & MSR_LE));
594
595 regs_set_return_msr(regs, regs->msr & ~MSR_VEC);
596 if (msr & MSR_VEC) {
597 /* restore altivec registers from the stack */
598 unsafe_copy_from_user(¤t->thread.ckvr_state, &sr->mc_vregs,
599 sizeof(sr->mc_vregs), failed);
600 current->thread.used_vr = true;
601 } else if (current->thread.used_vr) {
602 memset(¤t->thread.vr_state, 0,
603 ELF_NVRREG * sizeof(vector128));
604 memset(¤t->thread.ckvr_state, 0,
605 ELF_NVRREG * sizeof(vector128));
606 }
607
608 /* Always get VRSAVE back */
609 unsafe_get_user(current->thread.ckvrsave,
610 (u32 __user *)&sr->mc_vregs[32], failed);
611 if (cpu_has_feature(CPU_FTR_ALTIVEC))
612 mtspr(SPRN_VRSAVE, current->thread.ckvrsave);
613
614 regs_set_return_msr(regs, regs->msr & ~(MSR_FP | MSR_FE0 | MSR_FE1));
615
616 unsafe_copy_fpr_from_user(current, &sr->mc_fregs, failed);
617
618 regs_set_return_msr(regs, regs->msr & ~MSR_VSX);
619 if (msr & MSR_VSX) {
620 /*
621 * Restore altivec registers from the stack to a local
622 * buffer, then write this out to the thread_struct
623 */
624 unsafe_copy_ckvsx_from_user(current, &sr->mc_vsregs, failed);
625 current->thread.used_vsr = true;
626 } else if (current->thread.used_vsr)
627 for (i = 0; i < 32 ; i++) {
628 current->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
629 current->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
630 }
631
632 user_read_access_end();
633
634 if (!user_read_access_begin(tm_sr, sizeof(*tm_sr)))
635 return 1;
636
637 unsafe_restore_general_regs(regs, tm_sr, failed);
638
639 /* restore altivec registers from the stack */
640 if (msr & MSR_VEC)
641 unsafe_copy_from_user(¤t->thread.vr_state, &tm_sr->mc_vregs,
642 sizeof(sr->mc_vregs), failed);
643
644 /* Always get VRSAVE back */
645 unsafe_get_user(current->thread.vrsave,
646 (u32 __user *)&tm_sr->mc_vregs[32], failed);
647
648 unsafe_copy_ckfpr_from_user(current, &tm_sr->mc_fregs, failed);
649
650 if (msr & MSR_VSX) {
651 /*
652 * Restore altivec registers from the stack to a local
653 * buffer, then write this out to the thread_struct
654 */
655 unsafe_copy_vsx_from_user(current, &tm_sr->mc_vsregs, failed);
656 current->thread.used_vsr = true;
657 }
658
659 /* Get the top half of the MSR from the user context */
660 unsafe_get_user(msr_hi, &tm_sr->mc_gregs[PT_MSR], failed);
661 msr_hi <<= 32;
662
663 user_read_access_end();
664
665 /* If TM bits are set to the reserved value, it's an invalid context */
666 if (MSR_TM_RESV(msr_hi))
667 return 1;
668
669 /*
670 * Disabling preemption, since it is unsafe to be preempted
671 * with MSR[TS] set without recheckpointing.
672 */
673 preempt_disable();
674
675 /*
676 * CAUTION:
677 * After regs->MSR[TS] being updated, make sure that get_user(),
678 * put_user() or similar functions are *not* called. These
679 * functions can generate page faults which will cause the process
680 * to be de-scheduled with MSR[TS] set but without calling
681 * tm_recheckpoint(). This can cause a bug.
682 *
683 * Pull in the MSR TM bits from the user context
684 */
685 regs_set_return_msr(regs, (regs->msr & ~MSR_TS_MASK) | (msr_hi & MSR_TS_MASK));
686 /* Now, recheckpoint. This loads up all of the checkpointed (older)
687 * registers, including FP and V[S]Rs. After recheckpointing, the
688 * transactional versions should be loaded.
689 */
690 tm_enable();
691 /* Make sure the transaction is marked as failed */
692 current->thread.tm_texasr |= TEXASR_FS;
693 /* This loads the checkpointed FP/VEC state, if used */
694 tm_recheckpoint(¤t->thread);
695
696 /* This loads the speculative FP/VEC state, if used */
697 msr_check_and_set(msr & (MSR_FP | MSR_VEC));
698 if (msr & MSR_FP) {
699 load_fp_state(¤t->thread.fp_state);
700 regs_set_return_msr(regs, regs->msr | (MSR_FP | current->thread.fpexc_mode));
701 }
702 if (msr & MSR_VEC) {
703 load_vr_state(¤t->thread.vr_state);
704 regs_set_return_msr(regs, regs->msr | MSR_VEC);
705 }
706
707 preempt_enable();
708
709 return 0;
710
711failed:
712 user_read_access_end();
713 return 1;
714}
715#else
716static long restore_tm_user_regs(struct pt_regs *regs, struct mcontext __user *sr,
717 struct mcontext __user *tm_sr)
718{
719 return 0;
720}
721#endif
722
723#ifdef CONFIG_PPC64
724
725#define copy_siginfo_to_user copy_siginfo_to_user32
726
727#endif /* CONFIG_PPC64 */
728
729/*
730 * Set up a signal frame for a "real-time" signal handler
731 * (one which gets siginfo).
732 */
733int handle_rt_signal32(struct ksignal *ksig, sigset_t *oldset,
734 struct task_struct *tsk)
735{
736 struct rt_sigframe __user *frame;
737 struct mcontext __user *mctx;
738 struct mcontext __user *tm_mctx = NULL;
739 unsigned long newsp = 0;
740 unsigned long tramp;
741 struct pt_regs *regs = tsk->thread.regs;
742 /* Save the thread's msr before get_tm_stackpointer() changes it */
743 unsigned long msr = regs->msr;
744
745 /* Set up Signal Frame */
746 frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
747 mctx = &frame->uc.uc_mcontext;
748#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
749 tm_mctx = &frame->uc_transact.uc_mcontext;
750#endif
751 if (MSR_TM_ACTIVE(msr))
752 prepare_save_tm_user_regs();
753 else
754 prepare_save_user_regs(1);
755
756 if (!user_access_begin(frame, sizeof(*frame)))
757 goto badframe;
758
759 /* Put the siginfo & fill in most of the ucontext */
760 unsafe_put_user(0, &frame->uc.uc_flags, failed);
761#ifdef CONFIG_PPC64
762 unsafe_compat_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
763#else
764 unsafe_save_altstack(&frame->uc.uc_stack, regs->gpr[1], failed);
765#endif
766 unsafe_put_user(to_user_ptr(&frame->uc.uc_mcontext), &frame->uc.uc_regs, failed);
767
768 if (MSR_TM_ACTIVE(msr)) {
769#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
770 unsafe_put_user((unsigned long)&frame->uc_transact,
771 &frame->uc.uc_link, failed);
772 unsafe_put_user((unsigned long)tm_mctx,
773 &frame->uc_transact.uc_regs, failed);
774#endif
775 unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
776 } else {
777 unsafe_put_user(0, &frame->uc.uc_link, failed);
778 unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
779 }
780
781 /* Save user registers on the stack */
782 if (tsk->mm->context.vdso) {
783 tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp_rt32);
784 } else {
785 tramp = (unsigned long)mctx->mc_pad;
786 unsafe_put_user(PPC_RAW_LI(_R0, __NR_rt_sigreturn), &mctx->mc_pad[0], failed);
787 unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
788 asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
789 }
790 unsafe_put_sigset_t(&frame->uc.uc_sigmask, oldset, failed);
791
792 user_access_end();
793
794 if (copy_siginfo_to_user(&frame->info, &ksig->info))
795 goto badframe;
796
797 regs->link = tramp;
798
799#ifdef CONFIG_PPC_FPU_REGS
800 tsk->thread.fp_state.fpscr = 0; /* turn off all fp exceptions */
801#endif
802
803 /* create a stack frame for the caller of the handler */
804 newsp = ((unsigned long)frame) - (__SIGNAL_FRAMESIZE + 16);
805 if (put_user(regs->gpr[1], (u32 __user *)newsp))
806 goto badframe;
807
808 /* Fill registers for signal handler */
809 regs->gpr[1] = newsp;
810 regs->gpr[3] = ksig->sig;
811 regs->gpr[4] = (unsigned long)&frame->info;
812 regs->gpr[5] = (unsigned long)&frame->uc;
813 regs->gpr[6] = (unsigned long)frame;
814 regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
815 /* enter the signal handler in native-endian mode */
816 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
817
818 return 0;
819
820failed:
821 user_access_end();
822
823badframe:
824 signal_fault(tsk, regs, "handle_rt_signal32", frame);
825
826 return 1;
827}
828
829/*
830 * OK, we're invoking a handler
831 */
832int handle_signal32(struct ksignal *ksig, sigset_t *oldset,
833 struct task_struct *tsk)
834{
835 struct sigcontext __user *sc;
836 struct sigframe __user *frame;
837 struct mcontext __user *mctx;
838 struct mcontext __user *tm_mctx = NULL;
839 unsigned long newsp = 0;
840 unsigned long tramp;
841 struct pt_regs *regs = tsk->thread.regs;
842 /* Save the thread's msr before get_tm_stackpointer() changes it */
843 unsigned long msr = regs->msr;
844
845 /* Set up Signal Frame */
846 frame = get_sigframe(ksig, tsk, sizeof(*frame), 1);
847 mctx = &frame->mctx;
848#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
849 tm_mctx = &frame->mctx_transact;
850#endif
851 if (MSR_TM_ACTIVE(msr))
852 prepare_save_tm_user_regs();
853 else
854 prepare_save_user_regs(1);
855
856 if (!user_access_begin(frame, sizeof(*frame)))
857 goto badframe;
858 sc = (struct sigcontext __user *) &frame->sctx;
859
860#if _NSIG != 64
861#error "Please adjust handle_signal()"
862#endif
863 unsafe_put_user(to_user_ptr(ksig->ka.sa.sa_handler), &sc->handler, failed);
864 unsafe_put_user(oldset->sig[0], &sc->oldmask, failed);
865#ifdef CONFIG_PPC64
866 unsafe_put_user((oldset->sig[0] >> 32), &sc->_unused[3], failed);
867#else
868 unsafe_put_user(oldset->sig[1], &sc->_unused[3], failed);
869#endif
870 unsafe_put_user(to_user_ptr(mctx), &sc->regs, failed);
871 unsafe_put_user(ksig->sig, &sc->signal, failed);
872
873 if (MSR_TM_ACTIVE(msr))
874 unsafe_save_tm_user_regs(regs, mctx, tm_mctx, msr, failed);
875 else
876 unsafe_save_user_regs(regs, mctx, tm_mctx, 1, failed);
877
878 if (tsk->mm->context.vdso) {
879 tramp = VDSO32_SYMBOL(tsk->mm->context.vdso, sigtramp32);
880 } else {
881 tramp = (unsigned long)mctx->mc_pad;
882 unsafe_put_user(PPC_RAW_LI(_R0, __NR_sigreturn), &mctx->mc_pad[0], failed);
883 unsafe_put_user(PPC_RAW_SC(), &mctx->mc_pad[1], failed);
884 asm("dcbst %y0; sync; icbi %y0; sync" :: "Z" (mctx->mc_pad[0]));
885 }
886 user_access_end();
887
888 regs->link = tramp;
889
890#ifdef CONFIG_PPC_FPU_REGS
891 tsk->thread.fp_state.fpscr = 0; /* turn off all fp exceptions */
892#endif
893
894 /* create a stack frame for the caller of the handler */
895 newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
896 if (put_user(regs->gpr[1], (u32 __user *)newsp))
897 goto badframe;
898
899 regs->gpr[1] = newsp;
900 regs->gpr[3] = ksig->sig;
901 regs->gpr[4] = (unsigned long) sc;
902 regs_set_return_ip(regs, (unsigned long) ksig->ka.sa.sa_handler);
903 /* enter the signal handler in native-endian mode */
904 regs_set_return_msr(regs, (regs->msr & ~MSR_LE) | (MSR_KERNEL & MSR_LE));
905
906 return 0;
907
908failed:
909 user_access_end();
910
911badframe:
912 signal_fault(tsk, regs, "handle_signal32", frame);
913
914 return 1;
915}
916
917static int do_setcontext(struct ucontext __user *ucp, struct pt_regs *regs, int sig)
918{
919 sigset_t set;
920 struct mcontext __user *mcp;
921
922 if (!user_read_access_begin(ucp, sizeof(*ucp)))
923 return -EFAULT;
924
925 unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
926#ifdef CONFIG_PPC64
927 {
928 u32 cmcp;
929
930 unsafe_get_user(cmcp, &ucp->uc_regs, failed);
931 mcp = (struct mcontext __user *)(u64)cmcp;
932 }
933#else
934 unsafe_get_user(mcp, &ucp->uc_regs, failed);
935#endif
936 user_read_access_end();
937
938 set_current_blocked(&set);
939 if (restore_user_regs(regs, mcp, sig))
940 return -EFAULT;
941
942 return 0;
943
944failed:
945 user_read_access_end();
946 return -EFAULT;
947}
948
949#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
950static int do_setcontext_tm(struct ucontext __user *ucp,
951 struct ucontext __user *tm_ucp,
952 struct pt_regs *regs)
953{
954 sigset_t set;
955 struct mcontext __user *mcp;
956 struct mcontext __user *tm_mcp;
957 u32 cmcp;
958 u32 tm_cmcp;
959
960 if (!user_read_access_begin(ucp, sizeof(*ucp)))
961 return -EFAULT;
962
963 unsafe_get_sigset_t(&set, &ucp->uc_sigmask, failed);
964 unsafe_get_user(cmcp, &ucp->uc_regs, failed);
965
966 user_read_access_end();
967
968 if (__get_user(tm_cmcp, &tm_ucp->uc_regs))
969 return -EFAULT;
970 mcp = (struct mcontext __user *)(u64)cmcp;
971 tm_mcp = (struct mcontext __user *)(u64)tm_cmcp;
972 /* no need to check access_ok(mcp), since mcp < 4GB */
973
974 set_current_blocked(&set);
975 if (restore_tm_user_regs(regs, mcp, tm_mcp))
976 return -EFAULT;
977
978 return 0;
979
980failed:
981 user_read_access_end();
982 return -EFAULT;
983}
984#endif
985
986#ifdef CONFIG_PPC64
987COMPAT_SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
988 struct ucontext __user *, new_ctx, int, ctx_size)
989#else
990SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
991 struct ucontext __user *, new_ctx, long, ctx_size)
992#endif
993{
994 struct pt_regs *regs = current_pt_regs();
995 int ctx_has_vsx_region = 0;
996
997#ifdef CONFIG_PPC64
998 unsigned long new_msr = 0;
999
1000 if (new_ctx) {
1001 struct mcontext __user *mcp;
1002 u32 cmcp;
1003
1004 /*
1005 * Get pointer to the real mcontext. No need for
1006 * access_ok since we are dealing with compat
1007 * pointers.
1008 */
1009 if (__get_user(cmcp, &new_ctx->uc_regs))
1010 return -EFAULT;
1011 mcp = (struct mcontext __user *)(u64)cmcp;
1012 if (__get_user(new_msr, &mcp->mc_gregs[PT_MSR]))
1013 return -EFAULT;
1014 }
1015 /*
1016 * Check that the context is not smaller than the original
1017 * size (with VMX but without VSX)
1018 */
1019 if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
1020 return -EINVAL;
1021 /*
1022 * If the new context state sets the MSR VSX bits but
1023 * it doesn't provide VSX state.
1024 */
1025 if ((ctx_size < sizeof(struct ucontext)) &&
1026 (new_msr & MSR_VSX))
1027 return -EINVAL;
1028 /* Does the context have enough room to store VSX data? */
1029 if (ctx_size >= sizeof(struct ucontext))
1030 ctx_has_vsx_region = 1;
1031#else
1032 /* Context size is for future use. Right now, we only make sure
1033 * we are passed something we understand
1034 */
1035 if (ctx_size < sizeof(struct ucontext))
1036 return -EINVAL;
1037#endif
1038 if (old_ctx != NULL) {
1039 struct mcontext __user *mctx;
1040
1041 /*
1042 * old_ctx might not be 16-byte aligned, in which
1043 * case old_ctx->uc_mcontext won't be either.
1044 * Because we have the old_ctx->uc_pad2 field
1045 * before old_ctx->uc_mcontext, we need to round down
1046 * from &old_ctx->uc_mcontext to a 16-byte boundary.
1047 */
1048 mctx = (struct mcontext __user *)
1049 ((unsigned long) &old_ctx->uc_mcontext & ~0xfUL);
1050 prepare_save_user_regs(ctx_has_vsx_region);
1051 if (!user_write_access_begin(old_ctx, ctx_size))
1052 return -EFAULT;
1053 unsafe_save_user_regs(regs, mctx, NULL, ctx_has_vsx_region, failed);
1054 unsafe_put_sigset_t(&old_ctx->uc_sigmask, ¤t->blocked, failed);
1055 unsafe_put_user(to_user_ptr(mctx), &old_ctx->uc_regs, failed);
1056 user_write_access_end();
1057 }
1058 if (new_ctx == NULL)
1059 return 0;
1060 if (!access_ok(new_ctx, ctx_size) ||
1061 fault_in_readable((char __user *)new_ctx, ctx_size))
1062 return -EFAULT;
1063
1064 /*
1065 * If we get a fault copying the context into the kernel's
1066 * image of the user's registers, we can't just return -EFAULT
1067 * because the user's registers will be corrupted. For instance
1068 * the NIP value may have been updated but not some of the
1069 * other registers. Given that we have done the access_ok
1070 * and successfully read the first and last bytes of the region
1071 * above, this should only happen in an out-of-memory situation
1072 * or if another thread unmaps the region containing the context.
1073 * We kill the task with a SIGSEGV in this situation.
1074 */
1075 if (do_setcontext(new_ctx, regs, 0)) {
1076 force_exit_sig(SIGSEGV);
1077 return -EFAULT;
1078 }
1079
1080 set_thread_flag(TIF_RESTOREALL);
1081 return 0;
1082
1083failed:
1084 user_write_access_end();
1085 return -EFAULT;
1086}
1087
1088#ifdef CONFIG_PPC64
1089COMPAT_SYSCALL_DEFINE0(rt_sigreturn)
1090#else
1091SYSCALL_DEFINE0(rt_sigreturn)
1092#endif
1093{
1094 struct rt_sigframe __user *rt_sf;
1095 struct pt_regs *regs = current_pt_regs();
1096 int tm_restore = 0;
1097#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1098 struct ucontext __user *uc_transact;
1099 unsigned long msr_hi;
1100 unsigned long tmp;
1101#endif
1102 /* Always make any pending restarted system calls return -EINTR */
1103 current->restart_block.fn = do_no_restart_syscall;
1104
1105 rt_sf = (struct rt_sigframe __user *)
1106 (regs->gpr[1] + __SIGNAL_FRAMESIZE + 16);
1107 if (!access_ok(rt_sf, sizeof(*rt_sf)))
1108 goto bad;
1109
1110#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1111 /*
1112 * If there is a transactional state then throw it away.
1113 * The purpose of a sigreturn is to destroy all traces of the
1114 * signal frame, this includes any transactional state created
1115 * within in. We only check for suspended as we can never be
1116 * active in the kernel, we are active, there is nothing better to
1117 * do than go ahead and Bad Thing later.
1118 * The cause is not important as there will never be a
1119 * recheckpoint so it's not user visible.
1120 */
1121 if (MSR_TM_SUSPENDED(mfmsr()))
1122 tm_reclaim_current(0);
1123
1124 if (__get_user(tmp, &rt_sf->uc.uc_link))
1125 goto bad;
1126 uc_transact = (struct ucontext __user *)(uintptr_t)tmp;
1127 if (uc_transact) {
1128 u32 cmcp;
1129 struct mcontext __user *mcp;
1130
1131 if (__get_user(cmcp, &uc_transact->uc_regs))
1132 return -EFAULT;
1133 mcp = (struct mcontext __user *)(u64)cmcp;
1134 /* The top 32 bits of the MSR are stashed in the transactional
1135 * ucontext. */
1136 if (__get_user(msr_hi, &mcp->mc_gregs[PT_MSR]))
1137 goto bad;
1138
1139 if (MSR_TM_ACTIVE(msr_hi<<32)) {
1140 /* Trying to start TM on non TM system */
1141 if (!cpu_has_feature(CPU_FTR_TM))
1142 goto bad;
1143 /* We only recheckpoint on return if we're
1144 * transaction.
1145 */
1146 tm_restore = 1;
1147 if (do_setcontext_tm(&rt_sf->uc, uc_transact, regs))
1148 goto bad;
1149 }
1150 }
1151 if (!tm_restore) {
1152 /*
1153 * Unset regs->msr because ucontext MSR TS is not
1154 * set, and recheckpoint was not called. This avoid
1155 * hitting a TM Bad thing at RFID
1156 */
1157 regs_set_return_msr(regs, regs->msr & ~MSR_TS_MASK);
1158 }
1159 /* Fall through, for non-TM restore */
1160#endif
1161 if (!tm_restore)
1162 if (do_setcontext(&rt_sf->uc, regs, 1))
1163 goto bad;
1164
1165 /*
1166 * It's not clear whether or why it is desirable to save the
1167 * sigaltstack setting on signal delivery and restore it on
1168 * signal return. But other architectures do this and we have
1169 * always done it up until now so it is probably better not to
1170 * change it. -- paulus
1171 */
1172#ifdef CONFIG_PPC64
1173 if (compat_restore_altstack(&rt_sf->uc.uc_stack))
1174 goto bad;
1175#else
1176 if (restore_altstack(&rt_sf->uc.uc_stack))
1177 goto bad;
1178#endif
1179 set_thread_flag(TIF_RESTOREALL);
1180 return 0;
1181
1182 bad:
1183 signal_fault(current, regs, "sys_rt_sigreturn", rt_sf);
1184
1185 force_sig(SIGSEGV);
1186 return 0;
1187}
1188
1189#ifdef CONFIG_PPC32
1190SYSCALL_DEFINE3(debug_setcontext, struct ucontext __user *, ctx,
1191 int, ndbg, struct sig_dbg_op __user *, dbg)
1192{
1193 struct pt_regs *regs = current_pt_regs();
1194 struct sig_dbg_op op;
1195 int i;
1196 unsigned long new_msr = regs->msr;
1197#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1198 unsigned long new_dbcr0 = current->thread.debug.dbcr0;
1199#endif
1200
1201 for (i=0; i<ndbg; i++) {
1202 if (copy_from_user(&op, dbg + i, sizeof(op)))
1203 return -EFAULT;
1204 switch (op.dbg_type) {
1205 case SIG_DBG_SINGLE_STEPPING:
1206#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1207 if (op.dbg_value) {
1208 new_msr |= MSR_DE;
1209 new_dbcr0 |= (DBCR0_IDM | DBCR0_IC);
1210 } else {
1211 new_dbcr0 &= ~DBCR0_IC;
1212 if (!DBCR_ACTIVE_EVENTS(new_dbcr0,
1213 current->thread.debug.dbcr1)) {
1214 new_msr &= ~MSR_DE;
1215 new_dbcr0 &= ~DBCR0_IDM;
1216 }
1217 }
1218#else
1219 if (op.dbg_value)
1220 new_msr |= MSR_SE;
1221 else
1222 new_msr &= ~MSR_SE;
1223#endif
1224 break;
1225 case SIG_DBG_BRANCH_TRACING:
1226#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1227 return -EINVAL;
1228#else
1229 if (op.dbg_value)
1230 new_msr |= MSR_BE;
1231 else
1232 new_msr &= ~MSR_BE;
1233#endif
1234 break;
1235
1236 default:
1237 return -EINVAL;
1238 }
1239 }
1240
1241 /* We wait until here to actually install the values in the
1242 registers so if we fail in the above loop, it will not
1243 affect the contents of these registers. After this point,
1244 failure is a problem, anyway, and it's very unlikely unless
1245 the user is really doing something wrong. */
1246 regs_set_return_msr(regs, new_msr);
1247#ifdef CONFIG_PPC_ADV_DEBUG_REGS
1248 current->thread.debug.dbcr0 = new_dbcr0;
1249#endif
1250
1251 if (!access_ok(ctx, sizeof(*ctx)) ||
1252 fault_in_readable((char __user *)ctx, sizeof(*ctx)))
1253 return -EFAULT;
1254
1255 /*
1256 * If we get a fault copying the context into the kernel's
1257 * image of the user's registers, we can't just return -EFAULT
1258 * because the user's registers will be corrupted. For instance
1259 * the NIP value may have been updated but not some of the
1260 * other registers. Given that we have done the access_ok
1261 * and successfully read the first and last bytes of the region
1262 * above, this should only happen in an out-of-memory situation
1263 * or if another thread unmaps the region containing the context.
1264 * We kill the task with a SIGSEGV in this situation.
1265 */
1266 if (do_setcontext(ctx, regs, 1)) {
1267 signal_fault(current, regs, "sys_debug_setcontext", ctx);
1268
1269 force_sig(SIGSEGV);
1270 goto out;
1271 }
1272
1273 /*
1274 * It's not clear whether or why it is desirable to save the
1275 * sigaltstack setting on signal delivery and restore it on
1276 * signal return. But other architectures do this and we have
1277 * always done it up until now so it is probably better not to
1278 * change it. -- paulus
1279 */
1280 restore_altstack(&ctx->uc_stack);
1281
1282 set_thread_flag(TIF_RESTOREALL);
1283 out:
1284 return 0;
1285}
1286#endif
1287
1288/*
1289 * Do a signal return; undo the signal stack.
1290 */
1291#ifdef CONFIG_PPC64
1292COMPAT_SYSCALL_DEFINE0(sigreturn)
1293#else
1294SYSCALL_DEFINE0(sigreturn)
1295#endif
1296{
1297 struct pt_regs *regs = current_pt_regs();
1298 struct sigframe __user *sf;
1299 struct sigcontext __user *sc;
1300 struct sigcontext sigctx;
1301 struct mcontext __user *sr;
1302 sigset_t set;
1303 struct mcontext __user *mcp;
1304 struct mcontext __user *tm_mcp = NULL;
1305 unsigned long long msr_hi = 0;
1306
1307 /* Always make any pending restarted system calls return -EINTR */
1308 current->restart_block.fn = do_no_restart_syscall;
1309
1310 sf = (struct sigframe __user *)(regs->gpr[1] + __SIGNAL_FRAMESIZE);
1311 sc = &sf->sctx;
1312 if (copy_from_user(&sigctx, sc, sizeof(sigctx)))
1313 goto badframe;
1314
1315#ifdef CONFIG_PPC64
1316 /*
1317 * Note that PPC32 puts the upper 32 bits of the sigmask in the
1318 * unused part of the signal stackframe
1319 */
1320 set.sig[0] = sigctx.oldmask + ((long)(sigctx._unused[3]) << 32);
1321#else
1322 set.sig[0] = sigctx.oldmask;
1323 set.sig[1] = sigctx._unused[3];
1324#endif
1325 set_current_blocked(&set);
1326
1327 mcp = (struct mcontext __user *)&sf->mctx;
1328#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1329 tm_mcp = (struct mcontext __user *)&sf->mctx_transact;
1330 if (__get_user(msr_hi, &tm_mcp->mc_gregs[PT_MSR]))
1331 goto badframe;
1332#endif
1333 if (MSR_TM_ACTIVE(msr_hi<<32)) {
1334 if (!cpu_has_feature(CPU_FTR_TM))
1335 goto badframe;
1336 if (restore_tm_user_regs(regs, mcp, tm_mcp))
1337 goto badframe;
1338 } else {
1339 sr = (struct mcontext __user *)from_user_ptr(sigctx.regs);
1340 if (restore_user_regs(regs, sr, 1)) {
1341 signal_fault(current, regs, "sys_sigreturn", sr);
1342
1343 force_sig(SIGSEGV);
1344 return 0;
1345 }
1346 }
1347
1348 set_thread_flag(TIF_RESTOREALL);
1349 return 0;
1350
1351badframe:
1352 signal_fault(current, regs, "sys_sigreturn", sc);
1353
1354 force_sig(SIGSEGV);
1355 return 0;
1356}