blob: aa9b048c476632853ecdeba6908d3e5817afb9fc [file] [log] [blame]
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +10001/*
2 * Common signal handling code for both 32 and 64 bits
3 *
4 * Copyright (c) 2007 Benjamin Herrenschmidt, IBM Coproration
5 * Extracted from signal_32.c and signal_64.c
6 *
7 * This file is subject to the terms and conditions of the GNU General
8 * Public License. See the file README.legal in the main directory of
9 * this archive for more details.
10 */
11
Roland McGrath6558ba22008-07-27 16:49:50 +100012#include <linux/tracehook.h>
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +100013#include <linux/signal.h>
Ananth N Mavinakayanahalli8b7b80b2012-08-23 21:31:32 +000014#include <linux/uprobes.h>
Benjamin Herrenschmidt18b246f2012-02-22 16:48:32 +110015#include <linux/key.h>
Li Zhong106ed882013-05-13 16:16:42 +000016#include <linux/context_tracking.h>
K.Prasad06532a62010-06-15 11:35:41 +053017#include <asm/hw_breakpoint.h>
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +100018#include <asm/uaccess.h>
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +100019#include <asm/unistd.h>
David Howellsae3a1972012-03-28 18:30:02 +010020#include <asm/debug.h>
Michael Neuling2b3f8e82013-05-26 18:09:41 +000021#include <asm/tm.h>
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +100022
Christoph Hellwigdb277e92007-06-04 15:15:51 +100023#include "signal.h"
24
Olof Johanssond0c3d532007-10-12 10:20:07 +100025/* Log an error when sending an unhandled signal to a process. Controlled
26 * through debug.exception-trace sysctl.
27 */
28
Benjamin Herrenschmidte34166a2013-05-14 17:02:11 +100029int show_unhandled_signals = 1;
Olof Johanssond0c3d532007-10-12 10:20:07 +100030
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +100031/*
32 * Allocate space for the signal frame
33 */
Michael Neuling2b3f8e82013-05-26 18:09:41 +000034void __user * get_sigframe(struct k_sigaction *ka, unsigned long sp,
Josh Boyerefbda862009-03-25 06:23:59 +000035 size_t frame_size, int is_32)
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +100036{
37 unsigned long oldsp, newsp;
38
39 /* Default to using normal stack */
Michael Neuling2b3f8e82013-05-26 18:09:41 +000040 oldsp = get_clean_sp(sp, is_32);
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +100041
42 /* Check for alt stack */
43 if ((ka->sa.sa_flags & SA_ONSTACK) &&
44 current->sas_ss_size && !on_sig_stack(oldsp))
45 oldsp = (current->sas_ss_sp + current->sas_ss_size);
46
47 /* Get aligned frame */
48 newsp = (oldsp - frame_size) & ~0xFUL;
49
50 /* Check access */
51 if (!access_ok(VERIFY_WRITE, (void __user *)newsp, oldsp - newsp))
52 return NULL;
53
54 return (void __user *)newsp;
55}
56
Christoph Hellwigf478f542007-06-04 15:15:52 +100057static void check_syscall_restart(struct pt_regs *regs, struct k_sigaction *ka,
58 int has_handler)
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +100059{
60 unsigned long ret = regs->gpr[3];
61 int restart = 1;
62
63 /* syscall ? */
64 if (TRAP(regs) != 0x0C00)
65 return;
66
67 /* error signalled ? */
68 if (!(regs->ccr & 0x10000000))
69 return;
70
71 switch (ret) {
72 case ERESTART_RESTARTBLOCK:
73 case ERESTARTNOHAND:
74 /* ERESTARTNOHAND means that the syscall should only be
75 * restarted if there was no handler for the signal, and since
76 * we only get here if there is a handler, we dont restart.
77 */
78 restart = !has_handler;
79 break;
80 case ERESTARTSYS:
81 /* ERESTARTSYS means to restart the syscall if there is no
82 * handler or the handler was registered with SA_RESTART
83 */
84 restart = !has_handler || (ka->sa.sa_flags & SA_RESTART) != 0;
85 break;
86 case ERESTARTNOINTR:
87 /* ERESTARTNOINTR means that the syscall should be
88 * called again after the signal handler returns.
89 */
90 break;
91 default:
92 return;
93 }
94 if (restart) {
95 if (ret == ERESTART_RESTARTBLOCK)
96 regs->gpr[0] = __NR_restart_syscall;
97 else
98 regs->gpr[3] = regs->orig_gpr3;
99 regs->nip -= 4;
100 regs->result = 0;
101 } else {
102 regs->result = -EINTR;
103 regs->gpr[3] = EINTR;
104 regs->ccr |= 0x10000000;
105 }
106}
Christoph Hellwig69d15f62007-06-04 15:15:50 +1000107
Richard Weinberger129b69d2014-03-02 14:46:11 +0100108static void do_signal(struct pt_regs *regs)
Christoph Hellwigf478f542007-06-04 15:15:52 +1000109{
Al Virob7f9a112012-05-02 09:59:21 -0400110 sigset_t *oldset = sigmask_to_save();
Richard Weinberger129b69d2014-03-02 14:46:11 +0100111 struct ksignal ksig;
Christoph Hellwigf478f542007-06-04 15:15:52 +1000112 int ret;
113 int is32 = is_32bit_task();
114
Richard Weinberger129b69d2014-03-02 14:46:11 +0100115 get_signal(&ksig);
Christoph Hellwigf478f542007-06-04 15:15:52 +1000116
Christoph Hellwigf478f542007-06-04 15:15:52 +1000117 /* Is there any syscall restart business here ? */
Richard Weinberger129b69d2014-03-02 14:46:11 +0100118 check_syscall_restart(regs, &ksig.ka, ksig.sig > 0);
Christoph Hellwigf478f542007-06-04 15:15:52 +1000119
Richard Weinberger129b69d2014-03-02 14:46:11 +0100120 if (ksig.sig <= 0) {
Christoph Hellwigf478f542007-06-04 15:15:52 +1000121 /* No signal to deliver -- put the saved sigmask back */
Al Viro51a7b442012-05-21 23:33:55 -0400122 restore_saved_sigmask();
Al Viro9a81c162010-09-20 21:48:57 +0100123 regs->trap = 0;
Richard Weinberger129b69d2014-03-02 14:46:11 +0100124 return; /* no signals delivered */
Christoph Hellwigf478f542007-06-04 15:15:52 +1000125 }
126
Dave Kleikamp3bffb652010-02-08 11:51:18 +0000127#ifndef CONFIG_PPC_ADV_DEBUG_REGS
Christoph Hellwigf478f542007-06-04 15:15:52 +1000128 /*
129 * Reenable the DABR before delivering the signal to
130 * user space. The DABR will have been cleared if it
131 * triggered inside the kernel.
132 */
Michael Neuling9422de32012-12-20 14:06:44 +0000133 if (current->thread.hw_brk.address &&
134 current->thread.hw_brk.type)
Paul Gortmaker21f58502014-04-29 15:25:17 -0400135 __set_breakpoint(&current->thread.hw_brk);
Luis Machadod6a61bf2008-07-24 02:10:41 +1000136#endif
K.Prasad06532a62010-06-15 11:35:41 +0530137 /* Re-enable the breakpoints for the signal stack */
138 thread_change_pc(current, regs);
Christoph Hellwigf478f542007-06-04 15:15:52 +1000139
140 if (is32) {
Richard Weinberger129b69d2014-03-02 14:46:11 +0100141 if (ksig.ka.sa.sa_flags & SA_SIGINFO)
142 ret = handle_rt_signal32(&ksig, oldset, regs);
Christoph Hellwigf478f542007-06-04 15:15:52 +1000143 else
Richard Weinberger129b69d2014-03-02 14:46:11 +0100144 ret = handle_signal32(&ksig, oldset, regs);
Christoph Hellwigf478f542007-06-04 15:15:52 +1000145 } else {
Richard Weinberger129b69d2014-03-02 14:46:11 +0100146 ret = handle_rt_signal64(&ksig, oldset, regs);
Christoph Hellwigf478f542007-06-04 15:15:52 +1000147 }
148
Al Viro9a81c162010-09-20 21:48:57 +0100149 regs->trap = 0;
Richard Weinberger129b69d2014-03-02 14:46:11 +0100150 signal_setup_done(ret, &ksig, test_thread_flag(TIF_SINGLESTEP));
Christoph Hellwigf478f542007-06-04 15:15:52 +1000151}
152
Benjamin Herrenschmidt18b246f2012-02-22 16:48:32 +1100153void do_notify_resume(struct pt_regs *regs, unsigned long thread_info_flags)
Roland McGrath7d6d6372008-07-27 16:52:52 +1000154{
Li Zhong106ed882013-05-13 16:16:42 +0000155 user_exit();
156
Oleg Nesterovf57d56d2012-10-28 18:17:11 +0100157 if (thread_info_flags & _TIF_UPROBE)
Ananth N Mavinakayanahalli8b7b80b2012-08-23 21:31:32 +0000158 uprobe_notify_resume(regs);
Ananth N Mavinakayanahalli8b7b80b2012-08-23 21:31:32 +0000159
Roland McGrath7d6d6372008-07-27 16:52:52 +1000160 if (thread_info_flags & _TIF_SIGPENDING)
Benjamin Herrenschmidt18b246f2012-02-22 16:48:32 +1100161 do_signal(regs);
Roland McGrath7d6d6372008-07-27 16:52:52 +1000162
163 if (thread_info_flags & _TIF_NOTIFY_RESUME) {
164 clear_thread_flag(TIF_NOTIFY_RESUME);
165 tracehook_notify_resume(regs);
166 }
Li Zhong106ed882013-05-13 16:16:42 +0000167
168 user_enter();
Roland McGrath7d6d6372008-07-27 16:52:52 +1000169}
Michael Neuling2b3f8e82013-05-26 18:09:41 +0000170
171unsigned long get_tm_stackpointer(struct pt_regs *regs)
172{
173 /* When in an active transaction that takes a signal, we need to be
174 * careful with the stack. It's possible that the stack has moved back
175 * up after the tbegin. The obvious case here is when the tbegin is
176 * called inside a function that returns before a tend. In this case,
177 * the stack is part of the checkpointed transactional memory state.
178 * If we write over this non transactionally or in suspend, we are in
179 * trouble because if we get a tm abort, the program counter and stack
180 * pointer will be back at the tbegin but our in memory stack won't be
181 * valid anymore.
182 *
183 * To avoid this, when taking a signal in an active transaction, we
184 * need to use the stack pointer from the checkpointed state, rather
185 * than the speculated state. This ensures that the signal context
186 * (written tm suspended) will be written below the stack required for
187 * the rollback. The transaction is aborted becuase of the treclaim,
188 * so any memory written between the tbegin and the signal will be
189 * rolled back anyway.
190 *
191 * For signals taken in non-TM or suspended mode, we use the
192 * normal/non-checkpointed stack pointer.
193 */
194
195#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
196 if (MSR_TM_ACTIVE(regs->msr)) {
Paul Mackerrasd31626f2014-01-13 15:56:29 +1100197 tm_reclaim_current(TM_CAUSE_SIGNAL);
Michael Neuling2b3f8e82013-05-26 18:09:41 +0000198 if (MSR_TM_TRANSACTIONAL(regs->msr))
199 return current->thread.ckpt_regs.gpr[1];
200 }
201#endif
202 return regs->gpr[1];
203}