blob: 4292ea39baa46e2c3915cc36b81c4ab767b28c7b [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * PowerPC version
4 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
5 *
6 * Derived from "arch/i386/kernel/signal.c"
7 * Copyright (C) 1991, 1992 Linus Torvalds
8 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
Linus Torvalds1da177e2005-04-16 15:20:36 -070011#include <linux/sched.h>
12#include <linux/mm.h>
13#include <linux/smp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
15#include <linux/signal.h>
16#include <linux/errno.h>
17#include <linux/wait.h>
18#include <linux/unistd.h>
19#include <linux/stddef.h>
20#include <linux/elf.h>
21#include <linux/ptrace.h>
Christian Dietrich76462232011-06-04 05:36:54 +000022#include <linux/ratelimit.h>
Al Virof3675642018-05-02 23:20:47 +100023#include <linux/syscalls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070024
25#include <asm/sigcontext.h>
26#include <asm/ucontext.h>
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080027#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#include <asm/pgtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include <asm/unistd.h>
30#include <asm/cacheflush.h>
Arnd Bergmanna7f31842006-03-23 00:00:08 +010031#include <asm/syscalls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032#include <asm/vdso.h>
David Howellsae3a1972012-03-28 18:30:02 +010033#include <asm/switch_to.h>
Michael Neuling2b0a5762013-02-13 16:21:41 +000034#include <asm/tm.h>
Daniel Axtens0545d542016-09-06 15:32:43 +100035#include <asm/asm-prototypes.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +100037#include "signal.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Linus Torvalds1da177e2005-04-16 15:20:36 -070039
Tobias Klauser6741f3a2005-05-06 12:10:04 +100040#define GP_REGS_SIZE min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
Linus Torvalds1da177e2005-04-16 15:20:36 -070041#define FP_REGS_SIZE sizeof(elf_fpregset_t)
42
43#define TRAMP_TRACEBACK 3
44#define TRAMP_SIZE 6
45
46/*
47 * When we have signals to deliver, we set up on the user stack,
48 * going down from the original stack pointer:
49 * 1) a rt_sigframe struct which contains the ucontext
50 * 2) a gap of __SIGNAL_FRAMESIZE bytes which acts as a dummy caller
51 * frame for the signal handler.
52 */
53
54struct rt_sigframe {
55 /* sys_rt_sigreturn requires the ucontext be the first field */
56 struct ucontext uc;
Michael Neuling2b0a5762013-02-13 16:21:41 +000057#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
58 struct ucontext uc_transact;
59#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070060 unsigned long _unused[2];
61 unsigned int tramp[TRAMP_SIZE];
Al Viro29e646d2006-02-01 05:28:09 -050062 struct siginfo __user *pinfo;
63 void __user *puc;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064 struct siginfo info;
Paul Mackerras573ebfa2014-02-26 17:07:38 +110065 /* New 64 bit little-endian ABI allows redzone of 512 bytes below sp */
66 char abigap[USER_REDZONE_SIZE];
Linus Torvalds1da177e2005-04-16 15:20:36 -070067} __attribute__ ((aligned (16)));
68
Olof Johanssond0c3d532007-10-12 10:20:07 +100069static const char fmt32[] = KERN_INFO \
70 "%s[%d]: bad frame in %s: %08lx nip %08lx lr %08lx\n";
71static const char fmt64[] = KERN_INFO \
72 "%s[%d]: bad frame in %s: %016lx nip %016lx lr %016lx\n";
73
Linus Torvalds1da177e2005-04-16 15:20:36 -070074/*
Anshuman Khandual2476c092015-07-20 08:28:43 +053075 * This computes a quad word aligned pointer inside the vmx_reserve array
76 * element. For historical reasons sigcontext might not be quad word aligned,
77 * but the location we write the VMX regs to must be. See the comment in
78 * sigcontext for more detail.
79 */
80#ifdef CONFIG_ALTIVEC
81static elf_vrreg_t __user *sigcontext_vmx_regs(struct sigcontext __user *sc)
82{
83 return (elf_vrreg_t __user *) (((unsigned long)sc->vmx_reserve + 15) & ~0xful);
84}
85#endif
86
87/*
Linus Torvalds1da177e2005-04-16 15:20:36 -070088 * Set up the sigcontext for the signal frame.
89 */
90
Cyril Burd1199432016-09-23 16:18:12 +100091static long setup_sigcontext(struct sigcontext __user *sc,
92 struct task_struct *tsk, int signr, sigset_t *set,
93 unsigned long handler, int ctx_has_vsx_region)
Linus Torvalds1da177e2005-04-16 15:20:36 -070094{
95 /* When CONFIG_ALTIVEC is set, we _always_ setup v_regs even if the
96 * process never used altivec yet (MSR_VEC is zero in pt_regs of
97 * the context). This is very important because we must ensure we
98 * don't lose the VRSAVE content that may have been set prior to
99 * the process doing its first vector operation
Adam Buchbinder48fc7f72012-09-19 21:48:00 -0400100 * Userland shall check AT_HWCAP to know whether it can rely on the
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101 * v_regs pointer or not
102 */
103#ifdef CONFIG_ALTIVEC
Anshuman Khandual2476c092015-07-20 08:28:43 +0530104 elf_vrreg_t __user *v_regs = sigcontext_vmx_regs(sc);
Anton Blanchardd96f2342016-05-29 22:03:51 +1000105 unsigned long vrsave;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106#endif
Cyril Burd1199432016-09-23 16:18:12 +1000107 struct pt_regs *regs = tsk->thread.regs;
Benjamin Herrenschmidt0be234a2008-06-02 16:22:59 +1000108 unsigned long msr = regs->msr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109 long err = 0;
Madhavan Srinivasana8a4b032017-08-20 23:28:24 +0530110 /* Force usr to alway see softe as 1 (interrupts enabled) */
111 unsigned long softe = 0x1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112
Cyril Burd1199432016-09-23 16:18:12 +1000113 BUG_ON(tsk != current);
114
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115#ifdef CONFIG_ALTIVEC
116 err |= __put_user(v_regs, &sc->v_regs);
117
118 /* save altivec registers */
Cyril Burd1199432016-09-23 16:18:12 +1000119 if (tsk->thread.used_vr) {
120 flush_altivec_to_thread(tsk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121 /* Copy 33 vec registers (vr0..31 and vscr) to the stack */
Cyril Burd1199432016-09-23 16:18:12 +1000122 err |= __copy_to_user(v_regs, &tsk->thread.vr_state,
Paul Mackerrasde79f7b2013-09-10 20:20:42 +1000123 33 * sizeof(vector128));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700124 /* set MSR_VEC in the MSR value in the frame to indicate that sc->v_reg)
125 * contains valid data.
126 */
Benjamin Herrenschmidt0be234a2008-06-02 16:22:59 +1000127 msr |= MSR_VEC;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128 }
129 /* We always copy to/from vrsave, it's 0 if we don't have or don't
130 * use altivec.
131 */
Anton Blanchardd96f2342016-05-29 22:03:51 +1000132 vrsave = 0;
133 if (cpu_has_feature(CPU_FTR_ALTIVEC)) {
134 vrsave = mfspr(SPRN_VRSAVE);
Cyril Burd1199432016-09-23 16:18:12 +1000135 tsk->thread.vrsave = vrsave;
Anton Blanchardd96f2342016-05-29 22:03:51 +1000136 }
137
138 err |= __put_user(vrsave, (u32 __user *)&v_regs[33]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139#else /* CONFIG_ALTIVEC */
140 err |= __put_user(0, &sc->v_regs);
141#endif /* CONFIG_ALTIVEC */
Cyril Burd1199432016-09-23 16:18:12 +1000142 flush_fp_to_thread(tsk);
Michael Neuling6a274c02008-07-02 14:06:37 +1000143 /* copy fpr regs and fpscr */
Cyril Burd1199432016-09-23 16:18:12 +1000144 err |= copy_fpr_to_user(&sc->fp_regs, tsk);
Michael Neulingec67ad82013-11-25 11:12:20 +1100145
146 /*
147 * Clear the MSR VSX bit to indicate there is no valid state attached
148 * to this context, except in the specific case below where we set it.
149 */
150 msr &= ~MSR_VSX;
Michael Neulingc6e67712008-06-25 14:07:18 +1000151#ifdef CONFIG_VSX
Michael Neulingce48b212008-06-25 14:07:18 +1000152 /*
153 * Copy VSX low doubleword to local buffer for formatting,
154 * then out to userspace. Update v_regs to point after the
155 * VMX data.
156 */
Cyril Burd1199432016-09-23 16:18:12 +1000157 if (tsk->thread.used_vsr && ctx_has_vsx_region) {
158 flush_vsx_to_thread(tsk);
Michael Neulingce48b212008-06-25 14:07:18 +1000159 v_regs += ELF_NVRREG;
Cyril Burd1199432016-09-23 16:18:12 +1000160 err |= copy_vsx_to_user(v_regs, tsk);
Michael Neulingce48b212008-06-25 14:07:18 +1000161 /* set MSR_VSX in the MSR value in the frame to
162 * indicate that sc->vs_reg) contains valid data.
163 */
164 msr |= MSR_VSX;
165 }
Michael Neulingc6e67712008-06-25 14:07:18 +1000166#endif /* CONFIG_VSX */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167 err |= __put_user(&sc->gp_regs, &sc->regs);
Paul Mackerras1bd79332006-03-08 13:24:22 +1100168 WARN_ON(!FULL_REGS(regs));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700169 err |= __copy_to_user(&sc->gp_regs, regs, GP_REGS_SIZE);
Benjamin Herrenschmidt0be234a2008-06-02 16:22:59 +1000170 err |= __put_user(msr, &sc->gp_regs[PT_MSR]);
Madhavan Srinivasana8a4b032017-08-20 23:28:24 +0530171 err |= __put_user(softe, &sc->gp_regs[PT_SOFTE]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700172 err |= __put_user(signr, &sc->signal);
173 err |= __put_user(handler, &sc->handler);
174 if (set != NULL)
175 err |= __put_user(set->sig[0], &sc->oldmask);
176
177 return err;
178}
179
Michael Neuling2b0a5762013-02-13 16:21:41 +0000180#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
181/*
182 * As above, but Transactional Memory is in use, so deliver sigcontexts
183 * containing checkpointed and transactional register states.
184 *
Michael Neuling2b3f8e82013-05-26 18:09:41 +0000185 * To do this, we treclaim (done before entering here) to gather both sets of
186 * registers and set up the 'normal' sigcontext registers with rolled-back
187 * register values such that a simple signal handler sees a correct
188 * checkpointed register state. If interested, a TM-aware sighandler can
189 * examine the transactional registers in the 2nd sigcontext to determine the
190 * real origin of the signal.
Michael Neuling2b0a5762013-02-13 16:21:41 +0000191 */
192static long setup_tm_sigcontexts(struct sigcontext __user *sc,
193 struct sigcontext __user *tm_sc,
Cyril Burd1199432016-09-23 16:18:12 +1000194 struct task_struct *tsk,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000195 int signr, sigset_t *set, unsigned long handler)
196{
197 /* When CONFIG_ALTIVEC is set, we _always_ setup v_regs even if the
198 * process never used altivec yet (MSR_VEC is zero in pt_regs of
199 * the context). This is very important because we must ensure we
200 * don't lose the VRSAVE content that may have been set prior to
201 * the process doing its first vector operation
202 * Userland shall check AT_HWCAP to know wether it can rely on the
203 * v_regs pointer or not.
204 */
205#ifdef CONFIG_ALTIVEC
Anshuman Khandual2476c092015-07-20 08:28:43 +0530206 elf_vrreg_t __user *v_regs = sigcontext_vmx_regs(sc);
207 elf_vrreg_t __user *tm_v_regs = sigcontext_vmx_regs(tm_sc);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000208#endif
Cyril Burd1199432016-09-23 16:18:12 +1000209 struct pt_regs *regs = tsk->thread.regs;
Gustavo Romero1c200e62017-12-31 18:20:45 -0500210 unsigned long msr = tsk->thread.regs->msr;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000211 long err = 0;
212
Cyril Burd1199432016-09-23 16:18:12 +1000213 BUG_ON(tsk != current);
214
Michael Neuling2b0a5762013-02-13 16:21:41 +0000215 BUG_ON(!MSR_TM_ACTIVE(regs->msr));
216
Michael Neuling92fb8692017-10-12 21:17:19 +1100217 WARN_ON(tm_suspend_disabled);
218
Gustavo Romero1c200e62017-12-31 18:20:45 -0500219 /* Restore checkpointed FP, VEC, and VSX bits from ckpt_regs as
220 * it contains the correct FP, VEC, VSX state after we treclaimed
221 * the transaction and giveup_all() was called on reclaiming.
222 */
223 msr |= tsk->thread.ckpt_regs.msr & (MSR_FP | MSR_VEC | MSR_VSX);
224
Paul Mackerrasd31626f2014-01-13 15:56:29 +1100225 /* Remove TM bits from thread's MSR. The MSR in the sigcontext
226 * just indicates to userland that we were doing a transaction, but we
227 * don't want to return in transactional state. This also ensures
228 * that flush_fp_to_thread won't set TIF_RESTORE_TM again.
229 */
230 regs->msr &= ~MSR_TS_MASK;
231
Michael Neuling2b0a5762013-02-13 16:21:41 +0000232#ifdef CONFIG_ALTIVEC
233 err |= __put_user(v_regs, &sc->v_regs);
234 err |= __put_user(tm_v_regs, &tm_sc->v_regs);
235
236 /* save altivec registers */
Cyril Burd1199432016-09-23 16:18:12 +1000237 if (tsk->thread.used_vr) {
Michael Neuling2b0a5762013-02-13 16:21:41 +0000238 /* Copy 33 vec registers (vr0..31 and vscr) to the stack */
Cyril Bur000ec282016-09-23 16:18:25 +1000239 err |= __copy_to_user(v_regs, &tsk->thread.ckvr_state,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000240 33 * sizeof(vector128));
241 /* If VEC was enabled there are transactional VRs valid too,
242 * else they're a copy of the checkpointed VRs.
243 */
244 if (msr & MSR_VEC)
245 err |= __copy_to_user(tm_v_regs,
Cyril Burdc310662016-09-23 16:18:24 +1000246 &tsk->thread.vr_state,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000247 33 * sizeof(vector128));
248 else
249 err |= __copy_to_user(tm_v_regs,
Cyril Bur000ec282016-09-23 16:18:25 +1000250 &tsk->thread.ckvr_state,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000251 33 * sizeof(vector128));
252
253 /* set MSR_VEC in the MSR value in the frame to indicate
254 * that sc->v_reg contains valid data.
255 */
256 msr |= MSR_VEC;
257 }
258 /* We always copy to/from vrsave, it's 0 if we don't have or don't
259 * use altivec.
260 */
Paul Mackerras408a7e02013-08-05 14:13:16 +1000261 if (cpu_has_feature(CPU_FTR_ALTIVEC))
Cyril Bur000ec282016-09-23 16:18:25 +1000262 tsk->thread.ckvrsave = mfspr(SPRN_VRSAVE);
263 err |= __put_user(tsk->thread.ckvrsave, (u32 __user *)&v_regs[33]);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000264 if (msr & MSR_VEC)
Cyril Burdc310662016-09-23 16:18:24 +1000265 err |= __put_user(tsk->thread.vrsave,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000266 (u32 __user *)&tm_v_regs[33]);
267 else
Cyril Bur000ec282016-09-23 16:18:25 +1000268 err |= __put_user(tsk->thread.ckvrsave,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000269 (u32 __user *)&tm_v_regs[33]);
270
271#else /* CONFIG_ALTIVEC */
272 err |= __put_user(0, &sc->v_regs);
273 err |= __put_user(0, &tm_sc->v_regs);
274#endif /* CONFIG_ALTIVEC */
275
276 /* copy fpr regs and fpscr */
Cyril Bur000ec282016-09-23 16:18:25 +1000277 err |= copy_ckfpr_to_user(&sc->fp_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000278 if (msr & MSR_FP)
Cyril Burd1199432016-09-23 16:18:12 +1000279 err |= copy_fpr_to_user(&tm_sc->fp_regs, tsk);
Cyril Burdc310662016-09-23 16:18:24 +1000280 else
Cyril Bur000ec282016-09-23 16:18:25 +1000281 err |= copy_ckfpr_to_user(&tm_sc->fp_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000282
283#ifdef CONFIG_VSX
284 /*
285 * Copy VSX low doubleword to local buffer for formatting,
286 * then out to userspace. Update v_regs to point after the
287 * VMX data.
288 */
Cyril Burd1199432016-09-23 16:18:12 +1000289 if (tsk->thread.used_vsr) {
Michael Neuling2b0a5762013-02-13 16:21:41 +0000290 v_regs += ELF_NVRREG;
291 tm_v_regs += ELF_NVRREG;
292
Cyril Bur000ec282016-09-23 16:18:25 +1000293 err |= copy_ckvsx_to_user(v_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000294
295 if (msr & MSR_VSX)
Cyril Burd1199432016-09-23 16:18:12 +1000296 err |= copy_vsx_to_user(tm_v_regs, tsk);
Cyril Burdc310662016-09-23 16:18:24 +1000297 else
Cyril Bur000ec282016-09-23 16:18:25 +1000298 err |= copy_ckvsx_to_user(tm_v_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000299
300 /* set MSR_VSX in the MSR value in the frame to
301 * indicate that sc->vs_reg) contains valid data.
302 */
303 msr |= MSR_VSX;
304 }
305#endif /* CONFIG_VSX */
306
307 err |= __put_user(&sc->gp_regs, &sc->regs);
308 err |= __put_user(&tm_sc->gp_regs, &tm_sc->regs);
309 WARN_ON(!FULL_REGS(regs));
310 err |= __copy_to_user(&tm_sc->gp_regs, regs, GP_REGS_SIZE);
311 err |= __copy_to_user(&sc->gp_regs,
Cyril Burd1199432016-09-23 16:18:12 +1000312 &tsk->thread.ckpt_regs, GP_REGS_SIZE);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000313 err |= __put_user(msr, &tm_sc->gp_regs[PT_MSR]);
314 err |= __put_user(msr, &sc->gp_regs[PT_MSR]);
315 err |= __put_user(signr, &sc->signal);
316 err |= __put_user(handler, &sc->handler);
317 if (set != NULL)
318 err |= __put_user(set->sig[0], &sc->oldmask);
319
320 return err;
321}
322#endif
323
Linus Torvalds1da177e2005-04-16 15:20:36 -0700324/*
325 * Restore the sigcontext from the signal frame.
326 */
327
Cyril Burd1199432016-09-23 16:18:12 +1000328static long restore_sigcontext(struct task_struct *tsk, sigset_t *set, int sig,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700329 struct sigcontext __user *sc)
330{
331#ifdef CONFIG_ALTIVEC
332 elf_vrreg_t __user *v_regs;
333#endif
334 unsigned long err = 0;
335 unsigned long save_r13 = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336 unsigned long msr;
Cyril Burd1199432016-09-23 16:18:12 +1000337 struct pt_regs *regs = tsk->thread.regs;
Michael Neuling6a274c02008-07-02 14:06:37 +1000338#ifdef CONFIG_VSX
339 int i;
340#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700341
Cyril Burd1199432016-09-23 16:18:12 +1000342 BUG_ON(tsk != current);
343
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344 /* If this is not a signal return, we preserve the TLS in r13 */
345 if (!sig)
346 save_r13 = regs->gpr[13];
347
Stephen Rothwellfcbc5a92008-06-27 16:18:27 +1000348 /* copy the GPRs */
349 err |= __copy_from_user(regs->gpr, sc->gp_regs, sizeof(regs->gpr));
350 err |= __get_user(regs->nip, &sc->gp_regs[PT_NIP]);
Paul Mackerrasfab5db92006-06-07 16:14:40 +1000351 /* get MSR separately, transfer the LE bit if doing signal return */
352 err |= __get_user(msr, &sc->gp_regs[PT_MSR]);
353 if (sig)
354 regs->msr = (regs->msr & ~MSR_LE) | (msr & MSR_LE);
Stephen Rothwellfcbc5a92008-06-27 16:18:27 +1000355 err |= __get_user(regs->orig_gpr3, &sc->gp_regs[PT_ORIG_R3]);
356 err |= __get_user(regs->ctr, &sc->gp_regs[PT_CTR]);
357 err |= __get_user(regs->link, &sc->gp_regs[PT_LNK]);
358 err |= __get_user(regs->xer, &sc->gp_regs[PT_XER]);
359 err |= __get_user(regs->ccr, &sc->gp_regs[PT_CCR]);
Paul Mackerrasfab5db92006-06-07 16:14:40 +1000360 /* skip SOFTE */
Al Viro9a81c162010-09-20 21:48:57 +0100361 regs->trap = 0;
Stephen Rothwellfcbc5a92008-06-27 16:18:27 +1000362 err |= __get_user(regs->dar, &sc->gp_regs[PT_DAR]);
363 err |= __get_user(regs->dsisr, &sc->gp_regs[PT_DSISR]);
364 err |= __get_user(regs->result, &sc->gp_regs[PT_RESULT]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700365
366 if (!sig)
367 regs->gpr[13] = save_r13;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368 if (set != NULL)
369 err |= __get_user(set->sig[0], &sc->oldmask);
370
Paul Mackerras5388fb12006-01-11 22:11:39 +1100371 /*
Paul Mackerrasae62fbb2007-06-26 14:49:11 +1000372 * Force reload of FP/VEC.
Cyril Burd1199432016-09-23 16:18:12 +1000373 * This has to be done before copying stuff into tsk->thread.fpr/vr
Paul Mackerrasae62fbb2007-06-26 14:49:11 +1000374 * for the reasons explained in the previous comment.
375 */
Michael Neulingce48b212008-06-25 14:07:18 +1000376 regs->msr &= ~(MSR_FP | MSR_FE0 | MSR_FE1 | MSR_VEC | MSR_VSX);
Paul Mackerrasae62fbb2007-06-26 14:49:11 +1000377
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378#ifdef CONFIG_ALTIVEC
379 err |= __get_user(v_regs, &sc->v_regs);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 if (err)
381 return err;
Linus Torvalds96d4f262019-01-03 18:57:57 -0800382 if (v_regs && !access_ok(v_regs, 34 * sizeof(vector128)))
Paul Mackerras7c85d1f2006-06-09 13:02:59 +1000383 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384 /* Copy 33 vec registers (vr0..31 and vscr) from the stack */
Simon Guoe1c0d662016-07-26 16:06:01 +0800385 if (v_regs != NULL && (msr & MSR_VEC) != 0) {
Cyril Burd1199432016-09-23 16:18:12 +1000386 err |= __copy_from_user(&tsk->thread.vr_state, v_regs,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 33 * sizeof(vector128));
Cyril Burd1199432016-09-23 16:18:12 +1000388 tsk->thread.used_vr = true;
389 } else if (tsk->thread.used_vr) {
390 memset(&tsk->thread.vr_state, 0, 33 * sizeof(vector128));
Simon Guoe1c0d662016-07-26 16:06:01 +0800391 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700392 /* Always get VRSAVE back */
Anton Blanchardb0d436c2013-08-07 02:01:24 +1000393 if (v_regs != NULL)
Cyril Burd1199432016-09-23 16:18:12 +1000394 err |= __get_user(tsk->thread.vrsave, (u32 __user *)&v_regs[33]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395 else
Cyril Burd1199432016-09-23 16:18:12 +1000396 tsk->thread.vrsave = 0;
Paul Mackerras408a7e02013-08-05 14:13:16 +1000397 if (cpu_has_feature(CPU_FTR_ALTIVEC))
Cyril Burd1199432016-09-23 16:18:12 +1000398 mtspr(SPRN_VRSAVE, tsk->thread.vrsave);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700399#endif /* CONFIG_ALTIVEC */
Michael Neulingc6e67712008-06-25 14:07:18 +1000400 /* restore floating point */
Cyril Burd1199432016-09-23 16:18:12 +1000401 err |= copy_fpr_from_user(tsk, &sc->fp_regs);
Michael Neuling6a274c02008-07-02 14:06:37 +1000402#ifdef CONFIG_VSX
Michael Neulingce48b212008-06-25 14:07:18 +1000403 /*
404 * Get additional VSX data. Update v_regs to point after the
405 * VMX data. Copy VSX low doubleword from userspace to local
406 * buffer for formatting, then into the taskstruct.
407 */
408 v_regs += ELF_NVRREG;
Simon Guoe1c0d662016-07-26 16:06:01 +0800409 if ((msr & MSR_VSX) != 0) {
Cyril Burd1199432016-09-23 16:18:12 +1000410 err |= copy_vsx_from_user(tsk, v_regs);
411 tsk->thread.used_vsr = true;
412 } else {
Michael Neuling6a274c02008-07-02 14:06:37 +1000413 for (i = 0; i < 32 ; i++)
Cyril Burd1199432016-09-23 16:18:12 +1000414 tsk->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
415 }
Michael Neulingc6e67712008-06-25 14:07:18 +1000416#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700417 return err;
418}
419
Michael Neuling2b0a5762013-02-13 16:21:41 +0000420#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
421/*
422 * Restore the two sigcontexts from the frame of a transactional processes.
423 */
424
Cyril Burd1199432016-09-23 16:18:12 +1000425static long restore_tm_sigcontexts(struct task_struct *tsk,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000426 struct sigcontext __user *sc,
427 struct sigcontext __user *tm_sc)
428{
429#ifdef CONFIG_ALTIVEC
430 elf_vrreg_t __user *v_regs, *tm_v_regs;
431#endif
432 unsigned long err = 0;
433 unsigned long msr;
Cyril Burd1199432016-09-23 16:18:12 +1000434 struct pt_regs *regs = tsk->thread.regs;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000435#ifdef CONFIG_VSX
436 int i;
437#endif
Cyril Burd1199432016-09-23 16:18:12 +1000438
439 BUG_ON(tsk != current);
440
Michael Neuling92fb8692017-10-12 21:17:19 +1100441 if (tm_suspend_disabled)
442 return -EINVAL;
443
Michael Neuling2b0a5762013-02-13 16:21:41 +0000444 /* copy the GPRs */
445 err |= __copy_from_user(regs->gpr, tm_sc->gp_regs, sizeof(regs->gpr));
Cyril Burd1199432016-09-23 16:18:12 +1000446 err |= __copy_from_user(&tsk->thread.ckpt_regs, sc->gp_regs,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000447 sizeof(regs->gpr));
448
449 /*
450 * TFHAR is restored from the checkpointed 'wound-back' ucontext's NIP.
451 * TEXASR was set by the signal delivery reclaim, as was TFIAR.
452 * Users doing anything abhorrent like thread-switching w/ signals for
453 * TM-Suspended code will have to back TEXASR/TFIAR up themselves.
454 * For the case of getting a signal and simply returning from it,
455 * we don't need to re-copy them here.
456 */
457 err |= __get_user(regs->nip, &tm_sc->gp_regs[PT_NIP]);
Cyril Burd1199432016-09-23 16:18:12 +1000458 err |= __get_user(tsk->thread.tm_tfhar, &sc->gp_regs[PT_NIP]);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000459
460 /* get MSR separately, transfer the LE bit if doing signal return */
461 err |= __get_user(msr, &sc->gp_regs[PT_MSR]);
Michael Neulingd2b9d2a2015-11-19 15:44:44 +1100462 /* Don't allow reserved mode. */
463 if (MSR_TM_RESV(msr))
464 return -EINVAL;
465
Michael Neuling87b4e532013-06-09 21:23:19 +1000466 /* pull in MSR LE from user context */
Michael Neuling2b0a5762013-02-13 16:21:41 +0000467 regs->msr = (regs->msr & ~MSR_LE) | (msr & MSR_LE);
468
469 /* The following non-GPR non-FPR non-VR state is also checkpointed: */
470 err |= __get_user(regs->ctr, &tm_sc->gp_regs[PT_CTR]);
471 err |= __get_user(regs->link, &tm_sc->gp_regs[PT_LNK]);
472 err |= __get_user(regs->xer, &tm_sc->gp_regs[PT_XER]);
473 err |= __get_user(regs->ccr, &tm_sc->gp_regs[PT_CCR]);
Cyril Burd1199432016-09-23 16:18:12 +1000474 err |= __get_user(tsk->thread.ckpt_regs.ctr,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000475 &sc->gp_regs[PT_CTR]);
Cyril Burd1199432016-09-23 16:18:12 +1000476 err |= __get_user(tsk->thread.ckpt_regs.link,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000477 &sc->gp_regs[PT_LNK]);
Cyril Burd1199432016-09-23 16:18:12 +1000478 err |= __get_user(tsk->thread.ckpt_regs.xer,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000479 &sc->gp_regs[PT_XER]);
Cyril Burd1199432016-09-23 16:18:12 +1000480 err |= __get_user(tsk->thread.ckpt_regs.ccr,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000481 &sc->gp_regs[PT_CCR]);
482
483 /* These regs are not checkpointed; they can go in 'regs'. */
484 err |= __get_user(regs->trap, &sc->gp_regs[PT_TRAP]);
485 err |= __get_user(regs->dar, &sc->gp_regs[PT_DAR]);
486 err |= __get_user(regs->dsisr, &sc->gp_regs[PT_DSISR]);
487 err |= __get_user(regs->result, &sc->gp_regs[PT_RESULT]);
488
489 /*
Michael Neuling2b0a5762013-02-13 16:21:41 +0000490 * Force reload of FP/VEC.
Cyril Burd1199432016-09-23 16:18:12 +1000491 * This has to be done before copying stuff into tsk->thread.fpr/vr
Michael Neuling2b0a5762013-02-13 16:21:41 +0000492 * for the reasons explained in the previous comment.
493 */
494 regs->msr &= ~(MSR_FP | MSR_FE0 | MSR_FE1 | MSR_VEC | MSR_VSX);
495
496#ifdef CONFIG_ALTIVEC
497 err |= __get_user(v_regs, &sc->v_regs);
498 err |= __get_user(tm_v_regs, &tm_sc->v_regs);
499 if (err)
500 return err;
Linus Torvalds96d4f262019-01-03 18:57:57 -0800501 if (v_regs && !access_ok(v_regs, 34 * sizeof(vector128)))
Michael Neuling2b0a5762013-02-13 16:21:41 +0000502 return -EFAULT;
Linus Torvalds96d4f262019-01-03 18:57:57 -0800503 if (tm_v_regs && !access_ok(tm_v_regs, 34 * sizeof(vector128)))
Michael Neuling2b0a5762013-02-13 16:21:41 +0000504 return -EFAULT;
505 /* Copy 33 vec registers (vr0..31 and vscr) from the stack */
Anton Blanchardb0d436c2013-08-07 02:01:24 +1000506 if (v_regs != NULL && tm_v_regs != NULL && (msr & MSR_VEC) != 0) {
Cyril Bur000ec282016-09-23 16:18:25 +1000507 err |= __copy_from_user(&tsk->thread.ckvr_state, v_regs,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000508 33 * sizeof(vector128));
Cyril Burdc310662016-09-23 16:18:24 +1000509 err |= __copy_from_user(&tsk->thread.vr_state, tm_v_regs,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000510 33 * sizeof(vector128));
Simon Guoe1c0d662016-07-26 16:06:01 +0800511 current->thread.used_vr = true;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000512 }
Cyril Burd1199432016-09-23 16:18:12 +1000513 else if (tsk->thread.used_vr) {
514 memset(&tsk->thread.vr_state, 0, 33 * sizeof(vector128));
Cyril Bur000ec282016-09-23 16:18:25 +1000515 memset(&tsk->thread.ckvr_state, 0, 33 * sizeof(vector128));
Michael Neuling2b0a5762013-02-13 16:21:41 +0000516 }
517 /* Always get VRSAVE back */
Anton Blanchardb0d436c2013-08-07 02:01:24 +1000518 if (v_regs != NULL && tm_v_regs != NULL) {
Cyril Bur000ec282016-09-23 16:18:25 +1000519 err |= __get_user(tsk->thread.ckvrsave,
Cyril Burdc310662016-09-23 16:18:24 +1000520 (u32 __user *)&v_regs[33]);
521 err |= __get_user(tsk->thread.vrsave,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000522 (u32 __user *)&tm_v_regs[33]);
523 }
524 else {
Cyril Burd1199432016-09-23 16:18:12 +1000525 tsk->thread.vrsave = 0;
Cyril Bur000ec282016-09-23 16:18:25 +1000526 tsk->thread.ckvrsave = 0;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000527 }
Paul Mackerras408a7e02013-08-05 14:13:16 +1000528 if (cpu_has_feature(CPU_FTR_ALTIVEC))
Cyril Burd1199432016-09-23 16:18:12 +1000529 mtspr(SPRN_VRSAVE, tsk->thread.vrsave);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000530#endif /* CONFIG_ALTIVEC */
531 /* restore floating point */
Cyril Burdc310662016-09-23 16:18:24 +1000532 err |= copy_fpr_from_user(tsk, &tm_sc->fp_regs);
Cyril Bur000ec282016-09-23 16:18:25 +1000533 err |= copy_ckfpr_from_user(tsk, &sc->fp_regs);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000534#ifdef CONFIG_VSX
535 /*
536 * Get additional VSX data. Update v_regs to point after the
537 * VMX data. Copy VSX low doubleword from userspace to local
538 * buffer for formatting, then into the taskstruct.
539 */
540 if (v_regs && ((msr & MSR_VSX) != 0)) {
541 v_regs += ELF_NVRREG;
542 tm_v_regs += ELF_NVRREG;
Cyril Burdc310662016-09-23 16:18:24 +1000543 err |= copy_vsx_from_user(tsk, tm_v_regs);
Cyril Bur000ec282016-09-23 16:18:25 +1000544 err |= copy_ckvsx_from_user(tsk, v_regs);
Cyril Burd1199432016-09-23 16:18:12 +1000545 tsk->thread.used_vsr = true;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000546 } else {
547 for (i = 0; i < 32 ; i++) {
Cyril Burd1199432016-09-23 16:18:12 +1000548 tsk->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
Cyril Bur000ec282016-09-23 16:18:25 +1000549 tsk->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000550 }
551 }
552#endif
553 tm_enable();
Michael Neulinge6b8fd02014-04-04 20:19:48 +1100554 /* Make sure the transaction is marked as failed */
Cyril Burd1199432016-09-23 16:18:12 +1000555 tsk->thread.tm_texasr |= TEXASR_FS;
Breno Leitaoe1c37432018-11-21 17:21:09 -0200556
557 /*
558 * Disabling preemption, since it is unsafe to be preempted
559 * with MSR[TS] set without recheckpointing.
560 */
561 preempt_disable();
562
563 /* pull in MSR TS bits from user context */
Breno Leitaoe620d452019-01-16 14:47:44 -0200564 regs->msr |= msr & MSR_TS_MASK;
Breno Leitaoe1c37432018-11-21 17:21:09 -0200565
566 /*
567 * Ensure that TM is enabled in regs->msr before we leave the signal
568 * handler. It could be the case that (a) user disabled the TM bit
569 * through the manipulation of the MSR bits in uc_mcontext or (b) the
570 * TM bit was disabled because a sufficient number of context switches
571 * happened whilst in the signal handler and load_tm overflowed,
572 * disabling the TM bit. In either case we can end up with an illegal
573 * TM state leading to a TM Bad Thing when we return to userspace.
574 *
575 * CAUTION:
576 * After regs->MSR[TS] being updated, make sure that get_user(),
577 * put_user() or similar functions are *not* called. These
578 * functions can generate page faults which will cause the process
579 * to be de-scheduled with MSR[TS] set but without calling
580 * tm_recheckpoint(). This can cause a bug.
581 */
582 regs->msr |= MSR_TM;
583
Michael Neuling2b0a5762013-02-13 16:21:41 +0000584 /* This loads the checkpointed FP/VEC state, if used */
Cyril Bureb5c3f12017-11-02 14:09:05 +1100585 tm_recheckpoint(&tsk->thread);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000586
Cyril Burdc310662016-09-23 16:18:24 +1000587 msr_check_and_set(msr & (MSR_FP | MSR_VEC));
Michael Neuling2b0a5762013-02-13 16:21:41 +0000588 if (msr & MSR_FP) {
Cyril Burdc310662016-09-23 16:18:24 +1000589 load_fp_state(&tsk->thread.fp_state);
Cyril Burd1199432016-09-23 16:18:12 +1000590 regs->msr |= (MSR_FP | tsk->thread.fpexc_mode);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000591 }
592 if (msr & MSR_VEC) {
Cyril Burdc310662016-09-23 16:18:24 +1000593 load_vr_state(&tsk->thread.vr_state);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000594 regs->msr |= MSR_VEC;
595 }
596
Breno Leitaoe1c37432018-11-21 17:21:09 -0200597 preempt_enable();
598
Michael Neuling2b0a5762013-02-13 16:21:41 +0000599 return err;
600}
601#endif
602
Linus Torvalds1da177e2005-04-16 15:20:36 -0700603/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604 * Setup the trampoline code on the stack
605 */
606static long setup_trampoline(unsigned int syscall, unsigned int __user *tramp)
607{
608 int i;
609 long err = 0;
610
611 /* addi r1, r1, __SIGNAL_FRAMESIZE # Pop the dummy stackframe */
Christophe Leroyd16952a2018-11-09 17:33:28 +0000612 err |= __put_user(PPC_INST_ADDI | __PPC_RT(R1) | __PPC_RA(R1) |
613 (__SIGNAL_FRAMESIZE & 0xffff), &tramp[0]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614 /* li r0, __NR_[rt_]sigreturn| */
Christophe Leroyd16952a2018-11-09 17:33:28 +0000615 err |= __put_user(PPC_INST_ADDI | (syscall & 0xffff), &tramp[1]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700616 /* sc */
Christophe Leroyd16952a2018-11-09 17:33:28 +0000617 err |= __put_user(PPC_INST_SC, &tramp[2]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700618
619 /* Minimal traceback info */
620 for (i=TRAMP_TRACEBACK; i < TRAMP_SIZE ;i++)
621 err |= __put_user(0, &tramp[i]);
622
623 if (!err)
624 flush_icache_range((unsigned long) &tramp[0],
625 (unsigned long) &tramp[TRAMP_SIZE]);
626
627 return err;
628}
629
630/*
Michael Neulingc1cb2992008-07-08 18:43:41 +1000631 * Userspace code may pass a ucontext which doesn't include VSX added
632 * at the end. We need to check for this case.
633 */
634#define UCONTEXTSIZEWITHOUTVSX \
635 (sizeof(struct ucontext) - 32*sizeof(long))
636
637/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700638 * Handle {get,set,swap}_context operations
639 */
Al Virof3675642018-05-02 23:20:47 +1000640SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
641 struct ucontext __user *, new_ctx, long, ctx_size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700642{
643 unsigned char tmp;
644 sigset_t set;
Michael Neulingc1cb2992008-07-08 18:43:41 +1000645 unsigned long new_msr = 0;
Michael Neuling16c29d12008-10-23 00:42:36 +0000646 int ctx_has_vsx_region = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700647
Michael Neulingc1cb2992008-07-08 18:43:41 +1000648 if (new_ctx &&
Michael Neuling16c29d12008-10-23 00:42:36 +0000649 get_user(new_msr, &new_ctx->uc_mcontext.gp_regs[PT_MSR]))
Michael Neulingc1cb2992008-07-08 18:43:41 +1000650 return -EFAULT;
651 /*
652 * Check that the context is not smaller than the original
653 * size (with VMX but without VSX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700654 */
Michael Neulingc1cb2992008-07-08 18:43:41 +1000655 if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700656 return -EINVAL;
Michael Neulingc1cb2992008-07-08 18:43:41 +1000657 /*
658 * If the new context state sets the MSR VSX bits but
659 * it doesn't provide VSX state.
660 */
661 if ((ctx_size < sizeof(struct ucontext)) &&
662 (new_msr & MSR_VSX))
663 return -EINVAL;
Michael Neuling16c29d12008-10-23 00:42:36 +0000664 /* Does the context have enough room to store VSX data? */
665 if (ctx_size >= sizeof(struct ucontext))
666 ctx_has_vsx_region = 1;
667
Linus Torvalds1da177e2005-04-16 15:20:36 -0700668 if (old_ctx != NULL) {
Linus Torvalds96d4f262019-01-03 18:57:57 -0800669 if (!access_ok(old_ctx, ctx_size)
Cyril Burd1199432016-09-23 16:18:12 +1000670 || setup_sigcontext(&old_ctx->uc_mcontext, current, 0, NULL, 0,
Michael Neuling16c29d12008-10-23 00:42:36 +0000671 ctx_has_vsx_region)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700672 || __copy_to_user(&old_ctx->uc_sigmask,
673 &current->blocked, sizeof(sigset_t)))
674 return -EFAULT;
675 }
676 if (new_ctx == NULL)
677 return 0;
Linus Torvalds96d4f262019-01-03 18:57:57 -0800678 if (!access_ok(new_ctx, ctx_size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700679 || __get_user(tmp, (u8 __user *) new_ctx)
Michael Neuling16c29d12008-10-23 00:42:36 +0000680 || __get_user(tmp, (u8 __user *) new_ctx + ctx_size - 1))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700681 return -EFAULT;
682
683 /*
684 * If we get a fault copying the context into the kernel's
685 * image of the user's registers, we can't just return -EFAULT
686 * because the user's registers will be corrupted. For instance
687 * the NIP value may have been updated but not some of the
688 * other registers. Given that we have done the access_ok
689 * and successfully read the first and last bytes of the region
690 * above, this should only happen in an out-of-memory situation
691 * or if another thread unmaps the region containing the context.
692 * We kill the task with a SIGSEGV in this situation.
693 */
694
695 if (__copy_from_user(&set, &new_ctx->uc_sigmask, sizeof(set)))
696 do_exit(SIGSEGV);
Al Viro17440f12012-04-27 14:09:19 -0400697 set_current_blocked(&set);
Cyril Burd1199432016-09-23 16:18:12 +1000698 if (restore_sigcontext(current, NULL, 0, &new_ctx->uc_mcontext))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699 do_exit(SIGSEGV);
700
701 /* This returns like rt_sigreturn */
David Woodhouse401d1f02005-11-15 18:52:18 +0000702 set_thread_flag(TIF_RESTOREALL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700703 return 0;
704}
705
706
707/*
708 * Do a signal return; undo the signal stack.
709 */
710
Al Virof3675642018-05-02 23:20:47 +1000711SYSCALL_DEFINE0(rt_sigreturn)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700712{
Al Virof3675642018-05-02 23:20:47 +1000713 struct pt_regs *regs = current_pt_regs();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 struct ucontext __user *uc = (struct ucontext __user *)regs->gpr[1];
715 sigset_t set;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000716#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
717 unsigned long msr;
718#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700719
720 /* Always make any pending restarted system calls return -EINTR */
Andy Lutomirskif56141e2015-02-12 15:01:14 -0800721 current->restart_block.fn = do_no_restart_syscall;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700722
Linus Torvalds96d4f262019-01-03 18:57:57 -0800723 if (!access_ok(uc, sizeof(*uc)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724 goto badframe;
725
726 if (__copy_from_user(&set, &uc->uc_sigmask, sizeof(set)))
727 goto badframe;
Al Viro17440f12012-04-27 14:09:19 -0400728 set_current_blocked(&set);
Cyril Bur78a3e882016-08-23 10:46:17 +1000729
Michael Neuling2b0a5762013-02-13 16:21:41 +0000730#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
Cyril Bur78a3e882016-08-23 10:46:17 +1000731 /*
732 * If there is a transactional state then throw it away.
733 * The purpose of a sigreturn is to destroy all traces of the
734 * signal frame, this includes any transactional state created
735 * within in. We only check for suspended as we can never be
736 * active in the kernel, we are active, there is nothing better to
737 * do than go ahead and Bad Thing later.
738 * The cause is not important as there will never be a
739 * recheckpoint so it's not user visible.
740 */
741 if (MSR_TM_SUSPENDED(mfmsr()))
742 tm_reclaim_current(0);
743
Breno Leitaoe620d452019-01-16 14:47:44 -0200744 /*
745 * Disable MSR[TS] bit also, so, if there is an exception in the
746 * code below (as a page fault in copy_ckvsx_to_user()), it does
747 * not recheckpoint this task if there was a context switch inside
748 * the exception.
749 *
750 * A major page fault can indirectly call schedule(). A reschedule
751 * process in the middle of an exception can have a side effect
752 * (Changing the CPU MSR[TS] state), since schedule() is called
753 * with the CPU MSR[TS] disable and returns with MSR[TS]=Suspended
754 * (switch_to() calls tm_recheckpoint() for the 'new' process). In
755 * this case, the process continues to be the same in the CPU, but
756 * the CPU state just changed.
757 *
758 * This can cause a TM Bad Thing, since the MSR in the stack will
759 * have the MSR[TS]=0, and this is what will be used to RFID.
760 *
761 * Clearing MSR[TS] state here will avoid a recheckpoint if there
762 * is any process reschedule in kernel space. The MSR[TS] state
763 * does not need to be saved also, since it will be replaced with
764 * the MSR[TS] that came from user context later, at
765 * restore_tm_sigcontexts.
766 */
767 regs->msr &= ~MSR_TS_MASK;
768
Michael Neuling2b0a5762013-02-13 16:21:41 +0000769 if (__get_user(msr, &uc->uc_mcontext.gp_regs[PT_MSR]))
770 goto badframe;
Michael Neuling87b4e532013-06-09 21:23:19 +1000771 if (MSR_TM_ACTIVE(msr)) {
Michael Neuling2b0a5762013-02-13 16:21:41 +0000772 /* We recheckpoint on return. */
773 struct ucontext __user *uc_transact;
774 if (__get_user(uc_transact, &uc->uc_link))
775 goto badframe;
Cyril Burd1199432016-09-23 16:18:12 +1000776 if (restore_tm_sigcontexts(current, &uc->uc_mcontext,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000777 &uc_transact->uc_mcontext))
778 goto badframe;
Breno Leitao897bc3d2019-01-09 11:16:45 -0200779 } else
Michael Neuling2b0a5762013-02-13 16:21:41 +0000780#endif
Breno Leitao897bc3d2019-01-09 11:16:45 -0200781 {
Breno Leitao6f5b9f02018-11-26 18:12:00 -0200782 /*
Breno Leitao897bc3d2019-01-09 11:16:45 -0200783 * Fall through, for non-TM restore
784 *
Breno Leitao6f5b9f02018-11-26 18:12:00 -0200785 * Unset MSR[TS] on the thread regs since MSR from user
786 * context does not have MSR active, and recheckpoint was
787 * not called since restore_tm_sigcontexts() was not called
788 * also.
789 *
790 * If not unsetting it, the code can RFID to userspace with
791 * MSR[TS] set, but without CPU in the proper state,
792 * causing a TM bad thing.
793 */
794 current->thread.regs->msr &= ~MSR_TS_MASK;
795 if (restore_sigcontext(current, NULL, 1, &uc->uc_mcontext))
796 goto badframe;
797 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700798
Al Viro7cce2462012-12-23 03:26:46 -0500799 if (restore_altstack(&uc->uc_stack))
800 goto badframe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700801
David Woodhouse401d1f02005-11-15 18:52:18 +0000802 set_thread_flag(TIF_RESTOREALL);
803 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700804
805badframe:
Christian Dietrich76462232011-06-04 05:36:54 +0000806 if (show_unhandled_signals)
807 printk_ratelimited(regs->msr & MSR_64BIT ? fmt64 : fmt32,
808 current->comm, current->pid, "rt_sigreturn",
809 (long)uc, regs->nip, regs->link);
Olof Johanssond0c3d532007-10-12 10:20:07 +1000810
Linus Torvalds1da177e2005-04-16 15:20:36 -0700811 force_sig(SIGSEGV, current);
812 return 0;
813}
814
Cyril Burd1199432016-09-23 16:18:12 +1000815int handle_rt_signal64(struct ksignal *ksig, sigset_t *set,
816 struct task_struct *tsk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700817{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818 struct rt_sigframe __user *frame;
819 unsigned long newsp = 0;
820 long err = 0;
Cyril Burd1199432016-09-23 16:18:12 +1000821 struct pt_regs *regs = tsk->thread.regs;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700822
Cyril Burd1199432016-09-23 16:18:12 +1000823 BUG_ON(tsk != current);
824
825 frame = get_sigframe(ksig, get_tm_stackpointer(tsk), sizeof(*frame), 0);
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +1000826 if (unlikely(frame == NULL))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700827 goto badframe;
828
829 err |= __put_user(&frame->info, &frame->pinfo);
830 err |= __put_user(&frame->uc, &frame->puc);
Richard Weinberger129b69d2014-03-02 14:46:11 +0100831 err |= copy_siginfo_to_user(&frame->info, &ksig->info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700832 if (err)
833 goto badframe;
834
835 /* Create the ucontext. */
836 err |= __put_user(0, &frame->uc.uc_flags);
Al Viro7cce2462012-12-23 03:26:46 -0500837 err |= __save_altstack(&frame->uc.uc_stack, regs->gpr[1]);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000838#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
839 if (MSR_TM_ACTIVE(regs->msr)) {
840 /* The ucontext_t passed to userland points to the second
841 * ucontext_t (for transactional state) with its uc_link ptr.
842 */
843 err |= __put_user(&frame->uc_transact, &frame->uc.uc_link);
844 err |= setup_tm_sigcontexts(&frame->uc.uc_mcontext,
845 &frame->uc_transact.uc_mcontext,
Cyril Burd1199432016-09-23 16:18:12 +1000846 tsk, ksig->sig, NULL,
Richard Weinberger129b69d2014-03-02 14:46:11 +0100847 (unsigned long)ksig->ka.sa.sa_handler);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000848 } else
849#endif
850 {
851 err |= __put_user(0, &frame->uc.uc_link);
Cyril Burd1199432016-09-23 16:18:12 +1000852 err |= setup_sigcontext(&frame->uc.uc_mcontext, tsk, ksig->sig,
Richard Weinberger129b69d2014-03-02 14:46:11 +0100853 NULL, (unsigned long)ksig->ka.sa.sa_handler,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000854 1);
855 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700856 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
857 if (err)
858 goto badframe;
859
Paul Mackerrascc657f52005-11-14 21:55:15 +1100860 /* Make sure signal handler doesn't get spurious FP exceptions */
Cyril Burd1199432016-09-23 16:18:12 +1000861 tsk->thread.fp_state.fpscr = 0;
Paul Mackerrascc657f52005-11-14 21:55:15 +1100862
Linus Torvalds1da177e2005-04-16 15:20:36 -0700863 /* Set up to return from userspace. */
Cyril Burd1199432016-09-23 16:18:12 +1000864 if (vdso64_rt_sigtramp && tsk->mm->context.vdso_base) {
865 regs->link = tsk->mm->context.vdso_base + vdso64_rt_sigtramp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700866 } else {
867 err |= setup_trampoline(__NR_rt_sigreturn, &frame->tramp[0]);
868 if (err)
869 goto badframe;
870 regs->link = (unsigned long) &frame->tramp[0];
871 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700872
873 /* Allocate a dummy caller frame for the signal handler. */
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +1000874 newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700875 err |= put_user(regs->gpr[1], (unsigned long __user *)newsp);
876
877 /* Set up "regs" so we "return" to the signal handler. */
Rusty Russelld606b922013-11-20 22:15:03 +1100878 if (is_elf2_task()) {
Richard Weinberger129b69d2014-03-02 14:46:11 +0100879 regs->nip = (unsigned long) ksig->ka.sa.sa_handler;
Rusty Russelld606b922013-11-20 22:15:03 +1100880 regs->gpr[12] = regs->nip;
881 } else {
882 /* Handler is *really* a pointer to the function descriptor for
883 * the signal routine. The first entry in the function
884 * descriptor is the entry address of signal and the second
885 * entry is the TOC value we need to use.
886 */
887 func_descr_t __user *funct_desc_ptr =
Richard Weinberger129b69d2014-03-02 14:46:11 +0100888 (func_descr_t __user *) ksig->ka.sa.sa_handler;
Rusty Russelld606b922013-11-20 22:15:03 +1100889
890 err |= get_user(regs->nip, &funct_desc_ptr->entry);
891 err |= get_user(regs->gpr[2], &funct_desc_ptr->toc);
892 }
893
Anton Blancharde871c6b2013-09-23 12:04:43 +1000894 /* enter the signal handler in native-endian mode */
Paul Mackerrasfab5db92006-06-07 16:14:40 +1000895 regs->msr &= ~MSR_LE;
Anton Blancharde871c6b2013-09-23 12:04:43 +1000896 regs->msr |= (MSR_KERNEL & MSR_LE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700897 regs->gpr[1] = newsp;
Richard Weinberger129b69d2014-03-02 14:46:11 +0100898 regs->gpr[3] = ksig->sig;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700899 regs->result = 0;
Richard Weinberger129b69d2014-03-02 14:46:11 +0100900 if (ksig->ka.sa.sa_flags & SA_SIGINFO) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700901 err |= get_user(regs->gpr[4], (unsigned long __user *)&frame->pinfo);
902 err |= get_user(regs->gpr[5], (unsigned long __user *)&frame->puc);
903 regs->gpr[6] = (unsigned long) frame;
904 } else {
905 regs->gpr[4] = (unsigned long)&frame->uc.uc_mcontext;
906 }
907 if (err)
908 goto badframe;
909
Richard Weinberger129b69d2014-03-02 14:46:11 +0100910 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700911
912badframe:
Christian Dietrich76462232011-06-04 05:36:54 +0000913 if (show_unhandled_signals)
914 printk_ratelimited(regs->msr & MSR_64BIT ? fmt64 : fmt32,
Cyril Burd1199432016-09-23 16:18:12 +1000915 tsk->comm, tsk->pid, "setup_rt_frame",
Christian Dietrich76462232011-06-04 05:36:54 +0000916 (long)frame, regs->nip, regs->link);
Olof Johanssond0c3d532007-10-12 10:20:07 +1000917
Richard Weinberger129b69d2014-03-02 14:46:11 +0100918 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700919}