blob: 16b41470ec9258050e25cb0d28d81ae1d2aa8f19 [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * PowerPC version
4 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
5 *
6 * Derived from "arch/i386/kernel/signal.c"
7 * Copyright (C) 1991, 1992 Linus Torvalds
8 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
Linus Torvalds1da177e2005-04-16 15:20:36 -070011#include <linux/sched.h>
12#include <linux/mm.h>
13#include <linux/smp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
15#include <linux/signal.h>
16#include <linux/errno.h>
17#include <linux/wait.h>
18#include <linux/unistd.h>
19#include <linux/stddef.h>
20#include <linux/elf.h>
21#include <linux/ptrace.h>
Christian Dietrich76462232011-06-04 05:36:54 +000022#include <linux/ratelimit.h>
Al Virof3675642018-05-02 23:20:47 +100023#include <linux/syscalls.h>
Christophe Leroy96032f92020-07-07 18:32:25 +000024#include <linux/pagemap.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025
26#include <asm/sigcontext.h>
27#include <asm/ucontext.h>
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080028#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include <asm/unistd.h>
30#include <asm/cacheflush.h>
Arnd Bergmanna7f31842006-03-23 00:00:08 +010031#include <asm/syscalls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032#include <asm/vdso.h>
David Howellsae3a1972012-03-28 18:30:02 +010033#include <asm/switch_to.h>
Michael Neuling2b0a5762013-02-13 16:21:41 +000034#include <asm/tm.h>
Daniel Axtens0545d542016-09-06 15:32:43 +100035#include <asm/asm-prototypes.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036
Benjamin Herrenschmidt22e38f22007-06-04 15:15:49 +100037#include "signal.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Linus Torvalds1da177e2005-04-16 15:20:36 -070039
Tobias Klauser6741f3a2005-05-06 12:10:04 +100040#define GP_REGS_SIZE min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
Linus Torvalds1da177e2005-04-16 15:20:36 -070041#define FP_REGS_SIZE sizeof(elf_fpregset_t)
42
Nicholas Piggin0138ba52020-05-11 20:19:52 +100043#define TRAMP_TRACEBACK 4
44#define TRAMP_SIZE 7
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
46/*
47 * When we have signals to deliver, we set up on the user stack,
48 * going down from the original stack pointer:
49 * 1) a rt_sigframe struct which contains the ucontext
50 * 2) a gap of __SIGNAL_FRAMESIZE bytes which acts as a dummy caller
51 * frame for the signal handler.
52 */
53
54struct rt_sigframe {
55 /* sys_rt_sigreturn requires the ucontext be the first field */
56 struct ucontext uc;
Michael Neuling2b0a5762013-02-13 16:21:41 +000057#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
58 struct ucontext uc_transact;
59#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070060 unsigned long _unused[2];
61 unsigned int tramp[TRAMP_SIZE];
Al Viro29e646d2006-02-01 05:28:09 -050062 struct siginfo __user *pinfo;
63 void __user *puc;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064 struct siginfo info;
Paul Mackerras573ebfa2014-02-26 17:07:38 +110065 /* New 64 bit little-endian ABI allows redzone of 512 bytes below sp */
66 char abigap[USER_REDZONE_SIZE];
Linus Torvalds1da177e2005-04-16 15:20:36 -070067} __attribute__ ((aligned (16)));
68
Linus Torvalds1da177e2005-04-16 15:20:36 -070069/*
Anshuman Khandual2476c092015-07-20 08:28:43 +053070 * This computes a quad word aligned pointer inside the vmx_reserve array
71 * element. For historical reasons sigcontext might not be quad word aligned,
72 * but the location we write the VMX regs to must be. See the comment in
73 * sigcontext for more detail.
74 */
75#ifdef CONFIG_ALTIVEC
76static elf_vrreg_t __user *sigcontext_vmx_regs(struct sigcontext __user *sc)
77{
78 return (elf_vrreg_t __user *) (((unsigned long)sc->vmx_reserve + 15) & ~0xful);
79}
80#endif
81
Christopher M. Riedlc6c96452021-02-26 19:12:52 -060082static void prepare_setup_sigcontext(struct task_struct *tsk)
83{
84#ifdef CONFIG_ALTIVEC
85 /* save altivec registers */
86 if (tsk->thread.used_vr)
87 flush_altivec_to_thread(tsk);
88 if (cpu_has_feature(CPU_FTR_ALTIVEC))
89 tsk->thread.vrsave = mfspr(SPRN_VRSAVE);
90#endif /* CONFIG_ALTIVEC */
91
92 flush_fp_to_thread(tsk);
93
94#ifdef CONFIG_VSX
95 if (tsk->thread.used_vsr)
96 flush_vsx_to_thread(tsk);
97#endif /* CONFIG_VSX */
98}
99
Anshuman Khandual2476c092015-07-20 08:28:43 +0530100/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101 * Set up the sigcontext for the signal frame.
102 */
103
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600104#define unsafe_setup_sigcontext(sc, tsk, signr, set, handler, ctx_has_vsx_region, label)\
105do { \
106 if (__unsafe_setup_sigcontext(sc, tsk, signr, set, handler, ctx_has_vsx_region))\
107 goto label; \
108} while (0)
109static long notrace __unsafe_setup_sigcontext(struct sigcontext __user *sc,
110 struct task_struct *tsk, int signr, sigset_t *set,
111 unsigned long handler, int ctx_has_vsx_region)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112{
113 /* When CONFIG_ALTIVEC is set, we _always_ setup v_regs even if the
114 * process never used altivec yet (MSR_VEC is zero in pt_regs of
115 * the context). This is very important because we must ensure we
116 * don't lose the VRSAVE content that may have been set prior to
117 * the process doing its first vector operation
Adam Buchbinder48fc7f72012-09-19 21:48:00 -0400118 * Userland shall check AT_HWCAP to know whether it can rely on the
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119 * v_regs pointer or not
120 */
121#ifdef CONFIG_ALTIVEC
Anshuman Khandual2476c092015-07-20 08:28:43 +0530122 elf_vrreg_t __user *v_regs = sigcontext_vmx_regs(sc);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123#endif
Cyril Burd1199432016-09-23 16:18:12 +1000124 struct pt_regs *regs = tsk->thread.regs;
Benjamin Herrenschmidt0be234a2008-06-02 16:22:59 +1000125 unsigned long msr = regs->msr;
Madhavan Srinivasana8a4b032017-08-20 23:28:24 +0530126 /* Force usr to alway see softe as 1 (interrupts enabled) */
127 unsigned long softe = 0x1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128
Cyril Burd1199432016-09-23 16:18:12 +1000129 BUG_ON(tsk != current);
130
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131#ifdef CONFIG_ALTIVEC
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600132 unsafe_put_user(v_regs, &sc->v_regs, efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133
134 /* save altivec registers */
Cyril Burd1199432016-09-23 16:18:12 +1000135 if (tsk->thread.used_vr) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 /* Copy 33 vec registers (vr0..31 and vscr) to the stack */
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600137 unsafe_copy_to_user(v_regs, &tsk->thread.vr_state,
138 33 * sizeof(vector128), efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139 /* set MSR_VEC in the MSR value in the frame to indicate that sc->v_reg)
140 * contains valid data.
141 */
Benjamin Herrenschmidt0be234a2008-06-02 16:22:59 +1000142 msr |= MSR_VEC;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143 }
144 /* We always copy to/from vrsave, it's 0 if we don't have or don't
145 * use altivec.
146 */
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600147 unsafe_put_user(tsk->thread.vrsave, (u32 __user *)&v_regs[33], efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148#else /* CONFIG_ALTIVEC */
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600149 unsafe_put_user(0, &sc->v_regs, efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150#endif /* CONFIG_ALTIVEC */
Michael Neuling6a274c02008-07-02 14:06:37 +1000151 /* copy fpr regs and fpscr */
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600152 unsafe_copy_fpr_to_user(&sc->fp_regs, tsk, efault_out);
Michael Neulingec67ad82013-11-25 11:12:20 +1100153
154 /*
155 * Clear the MSR VSX bit to indicate there is no valid state attached
156 * to this context, except in the specific case below where we set it.
157 */
158 msr &= ~MSR_VSX;
Michael Neulingc6e67712008-06-25 14:07:18 +1000159#ifdef CONFIG_VSX
Michael Neulingce48b212008-06-25 14:07:18 +1000160 /*
161 * Copy VSX low doubleword to local buffer for formatting,
162 * then out to userspace. Update v_regs to point after the
163 * VMX data.
164 */
Cyril Burd1199432016-09-23 16:18:12 +1000165 if (tsk->thread.used_vsr && ctx_has_vsx_region) {
Michael Neulingce48b212008-06-25 14:07:18 +1000166 v_regs += ELF_NVRREG;
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600167 unsafe_copy_vsx_to_user(v_regs, tsk, efault_out);
Michael Neulingce48b212008-06-25 14:07:18 +1000168 /* set MSR_VSX in the MSR value in the frame to
169 * indicate that sc->vs_reg) contains valid data.
170 */
171 msr |= MSR_VSX;
172 }
Michael Neulingc6e67712008-06-25 14:07:18 +1000173#endif /* CONFIG_VSX */
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600174 unsafe_put_user(&sc->gp_regs, &sc->regs, efault_out);
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600175 unsafe_copy_to_user(&sc->gp_regs, regs, GP_REGS_SIZE, efault_out);
176 unsafe_put_user(msr, &sc->gp_regs[PT_MSR], efault_out);
177 unsafe_put_user(softe, &sc->gp_regs[PT_SOFTE], efault_out);
178 unsafe_put_user(signr, &sc->signal, efault_out);
179 unsafe_put_user(handler, &sc->handler, efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700180 if (set != NULL)
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600181 unsafe_put_user(set->sig[0], &sc->oldmask, efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600183 return 0;
184
185efault_out:
186 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187}
188
Michael Neuling2b0a5762013-02-13 16:21:41 +0000189#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
190/*
191 * As above, but Transactional Memory is in use, so deliver sigcontexts
192 * containing checkpointed and transactional register states.
193 *
Michael Neuling2b3f8e82013-05-26 18:09:41 +0000194 * To do this, we treclaim (done before entering here) to gather both sets of
195 * registers and set up the 'normal' sigcontext registers with rolled-back
196 * register values such that a simple signal handler sees a correct
197 * checkpointed register state. If interested, a TM-aware sighandler can
198 * examine the transactional registers in the 2nd sigcontext to determine the
199 * real origin of the signal.
Michael Neuling2b0a5762013-02-13 16:21:41 +0000200 */
201static long setup_tm_sigcontexts(struct sigcontext __user *sc,
202 struct sigcontext __user *tm_sc,
Cyril Burd1199432016-09-23 16:18:12 +1000203 struct task_struct *tsk,
Gustavo Luiz Duarte2464cc42020-02-11 00:38:29 -0300204 int signr, sigset_t *set, unsigned long handler,
205 unsigned long msr)
Michael Neuling2b0a5762013-02-13 16:21:41 +0000206{
207 /* When CONFIG_ALTIVEC is set, we _always_ setup v_regs even if the
208 * process never used altivec yet (MSR_VEC is zero in pt_regs of
209 * the context). This is very important because we must ensure we
210 * don't lose the VRSAVE content that may have been set prior to
211 * the process doing its first vector operation
212 * Userland shall check AT_HWCAP to know wether it can rely on the
213 * v_regs pointer or not.
214 */
215#ifdef CONFIG_ALTIVEC
Anshuman Khandual2476c092015-07-20 08:28:43 +0530216 elf_vrreg_t __user *v_regs = sigcontext_vmx_regs(sc);
217 elf_vrreg_t __user *tm_v_regs = sigcontext_vmx_regs(tm_sc);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000218#endif
Cyril Burd1199432016-09-23 16:18:12 +1000219 struct pt_regs *regs = tsk->thread.regs;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000220 long err = 0;
221
Cyril Burd1199432016-09-23 16:18:12 +1000222 BUG_ON(tsk != current);
223
Gustavo Luiz Duarte2464cc42020-02-11 00:38:29 -0300224 BUG_ON(!MSR_TM_ACTIVE(msr));
Michael Neuling2b0a5762013-02-13 16:21:41 +0000225
Michael Neuling92fb8692017-10-12 21:17:19 +1100226 WARN_ON(tm_suspend_disabled);
227
Gustavo Romero1c200e62017-12-31 18:20:45 -0500228 /* Restore checkpointed FP, VEC, and VSX bits from ckpt_regs as
229 * it contains the correct FP, VEC, VSX state after we treclaimed
230 * the transaction and giveup_all() was called on reclaiming.
231 */
232 msr |= tsk->thread.ckpt_regs.msr & (MSR_FP | MSR_VEC | MSR_VSX);
233
Michael Neuling2b0a5762013-02-13 16:21:41 +0000234#ifdef CONFIG_ALTIVEC
235 err |= __put_user(v_regs, &sc->v_regs);
236 err |= __put_user(tm_v_regs, &tm_sc->v_regs);
237
238 /* save altivec registers */
Cyril Burd1199432016-09-23 16:18:12 +1000239 if (tsk->thread.used_vr) {
Michael Neuling2b0a5762013-02-13 16:21:41 +0000240 /* Copy 33 vec registers (vr0..31 and vscr) to the stack */
Cyril Bur000ec282016-09-23 16:18:25 +1000241 err |= __copy_to_user(v_regs, &tsk->thread.ckvr_state,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000242 33 * sizeof(vector128));
243 /* If VEC was enabled there are transactional VRs valid too,
244 * else they're a copy of the checkpointed VRs.
245 */
246 if (msr & MSR_VEC)
247 err |= __copy_to_user(tm_v_regs,
Cyril Burdc310662016-09-23 16:18:24 +1000248 &tsk->thread.vr_state,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000249 33 * sizeof(vector128));
250 else
251 err |= __copy_to_user(tm_v_regs,
Cyril Bur000ec282016-09-23 16:18:25 +1000252 &tsk->thread.ckvr_state,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000253 33 * sizeof(vector128));
254
255 /* set MSR_VEC in the MSR value in the frame to indicate
256 * that sc->v_reg contains valid data.
257 */
258 msr |= MSR_VEC;
259 }
260 /* We always copy to/from vrsave, it's 0 if we don't have or don't
261 * use altivec.
262 */
Paul Mackerras408a7e02013-08-05 14:13:16 +1000263 if (cpu_has_feature(CPU_FTR_ALTIVEC))
Cyril Bur000ec282016-09-23 16:18:25 +1000264 tsk->thread.ckvrsave = mfspr(SPRN_VRSAVE);
265 err |= __put_user(tsk->thread.ckvrsave, (u32 __user *)&v_regs[33]);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000266 if (msr & MSR_VEC)
Cyril Burdc310662016-09-23 16:18:24 +1000267 err |= __put_user(tsk->thread.vrsave,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000268 (u32 __user *)&tm_v_regs[33]);
269 else
Cyril Bur000ec282016-09-23 16:18:25 +1000270 err |= __put_user(tsk->thread.ckvrsave,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000271 (u32 __user *)&tm_v_regs[33]);
272
273#else /* CONFIG_ALTIVEC */
274 err |= __put_user(0, &sc->v_regs);
275 err |= __put_user(0, &tm_sc->v_regs);
276#endif /* CONFIG_ALTIVEC */
277
278 /* copy fpr regs and fpscr */
Cyril Bur000ec282016-09-23 16:18:25 +1000279 err |= copy_ckfpr_to_user(&sc->fp_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000280 if (msr & MSR_FP)
Cyril Burd1199432016-09-23 16:18:12 +1000281 err |= copy_fpr_to_user(&tm_sc->fp_regs, tsk);
Cyril Burdc310662016-09-23 16:18:24 +1000282 else
Cyril Bur000ec282016-09-23 16:18:25 +1000283 err |= copy_ckfpr_to_user(&tm_sc->fp_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000284
285#ifdef CONFIG_VSX
286 /*
287 * Copy VSX low doubleword to local buffer for formatting,
288 * then out to userspace. Update v_regs to point after the
289 * VMX data.
290 */
Cyril Burd1199432016-09-23 16:18:12 +1000291 if (tsk->thread.used_vsr) {
Michael Neuling2b0a5762013-02-13 16:21:41 +0000292 v_regs += ELF_NVRREG;
293 tm_v_regs += ELF_NVRREG;
294
Cyril Bur000ec282016-09-23 16:18:25 +1000295 err |= copy_ckvsx_to_user(v_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000296
297 if (msr & MSR_VSX)
Cyril Burd1199432016-09-23 16:18:12 +1000298 err |= copy_vsx_to_user(tm_v_regs, tsk);
Cyril Burdc310662016-09-23 16:18:24 +1000299 else
Cyril Bur000ec282016-09-23 16:18:25 +1000300 err |= copy_ckvsx_to_user(tm_v_regs, tsk);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000301
302 /* set MSR_VSX in the MSR value in the frame to
303 * indicate that sc->vs_reg) contains valid data.
304 */
305 msr |= MSR_VSX;
306 }
307#endif /* CONFIG_VSX */
308
309 err |= __put_user(&sc->gp_regs, &sc->regs);
310 err |= __put_user(&tm_sc->gp_regs, &tm_sc->regs);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000311 err |= __copy_to_user(&tm_sc->gp_regs, regs, GP_REGS_SIZE);
312 err |= __copy_to_user(&sc->gp_regs,
Cyril Burd1199432016-09-23 16:18:12 +1000313 &tsk->thread.ckpt_regs, GP_REGS_SIZE);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000314 err |= __put_user(msr, &tm_sc->gp_regs[PT_MSR]);
315 err |= __put_user(msr, &sc->gp_regs[PT_MSR]);
316 err |= __put_user(signr, &sc->signal);
317 err |= __put_user(handler, &sc->handler);
318 if (set != NULL)
319 err |= __put_user(set->sig[0], &sc->oldmask);
320
321 return err;
322}
323#endif
324
Linus Torvalds1da177e2005-04-16 15:20:36 -0700325/*
326 * Restore the sigcontext from the signal frame.
327 */
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600328#define unsafe_restore_sigcontext(tsk, set, sig, sc, label) do { \
329 if (__unsafe_restore_sigcontext(tsk, set, sig, sc)) \
330 goto label; \
331} while (0)
332static long notrace __unsafe_restore_sigcontext(struct task_struct *tsk, sigset_t *set,
333 int sig, struct sigcontext __user *sc)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700334{
335#ifdef CONFIG_ALTIVEC
336 elf_vrreg_t __user *v_regs;
337#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700338 unsigned long save_r13 = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700339 unsigned long msr;
Cyril Burd1199432016-09-23 16:18:12 +1000340 struct pt_regs *regs = tsk->thread.regs;
Michael Neuling6a274c02008-07-02 14:06:37 +1000341#ifdef CONFIG_VSX
342 int i;
343#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344
Cyril Burd1199432016-09-23 16:18:12 +1000345 BUG_ON(tsk != current);
346
Linus Torvalds1da177e2005-04-16 15:20:36 -0700347 /* If this is not a signal return, we preserve the TLS in r13 */
348 if (!sig)
349 save_r13 = regs->gpr[13];
350
Stephen Rothwellfcbc5a92008-06-27 16:18:27 +1000351 /* copy the GPRs */
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600352 unsafe_copy_from_user(regs->gpr, sc->gp_regs, sizeof(regs->gpr), efault_out);
353 unsafe_get_user(regs->nip, &sc->gp_regs[PT_NIP], efault_out);
Paul Mackerrasfab5db92006-06-07 16:14:40 +1000354 /* get MSR separately, transfer the LE bit if doing signal return */
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600355 unsafe_get_user(msr, &sc->gp_regs[PT_MSR], efault_out);
Paul Mackerrasfab5db92006-06-07 16:14:40 +1000356 if (sig)
357 regs->msr = (regs->msr & ~MSR_LE) | (msr & MSR_LE);
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600358 unsafe_get_user(regs->orig_gpr3, &sc->gp_regs[PT_ORIG_R3], efault_out);
359 unsafe_get_user(regs->ctr, &sc->gp_regs[PT_CTR], efault_out);
360 unsafe_get_user(regs->link, &sc->gp_regs[PT_LNK], efault_out);
361 unsafe_get_user(regs->xer, &sc->gp_regs[PT_XER], efault_out);
362 unsafe_get_user(regs->ccr, &sc->gp_regs[PT_CCR], efault_out);
Nicholas Piggin4e0e45b2020-05-07 22:13:32 +1000363 /* Don't allow userspace to set SOFTE */
364 set_trap_norestart(regs);
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600365 unsafe_get_user(regs->dar, &sc->gp_regs[PT_DAR], efault_out);
366 unsafe_get_user(regs->dsisr, &sc->gp_regs[PT_DSISR], efault_out);
367 unsafe_get_user(regs->result, &sc->gp_regs[PT_RESULT], efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368
369 if (!sig)
370 regs->gpr[13] = save_r13;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700371 if (set != NULL)
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600372 unsafe_get_user(set->sig[0], &sc->oldmask, efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373
Paul Mackerras5388fb12006-01-11 22:11:39 +1100374 /*
Paul Mackerrasae62fbb2007-06-26 14:49:11 +1000375 * Force reload of FP/VEC.
Cyril Burd1199432016-09-23 16:18:12 +1000376 * This has to be done before copying stuff into tsk->thread.fpr/vr
Paul Mackerrasae62fbb2007-06-26 14:49:11 +1000377 * for the reasons explained in the previous comment.
378 */
Michael Neulingce48b212008-06-25 14:07:18 +1000379 regs->msr &= ~(MSR_FP | MSR_FE0 | MSR_FE1 | MSR_VEC | MSR_VSX);
Paul Mackerrasae62fbb2007-06-26 14:49:11 +1000380
Linus Torvalds1da177e2005-04-16 15:20:36 -0700381#ifdef CONFIG_ALTIVEC
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600382 unsafe_get_user(v_regs, &sc->v_regs, efault_out);
Linus Torvalds96d4f262019-01-03 18:57:57 -0800383 if (v_regs && !access_ok(v_regs, 34 * sizeof(vector128)))
Paul Mackerras7c85d1f2006-06-09 13:02:59 +1000384 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385 /* Copy 33 vec registers (vr0..31 and vscr) from the stack */
Simon Guoe1c0d662016-07-26 16:06:01 +0800386 if (v_regs != NULL && (msr & MSR_VEC) != 0) {
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600387 unsafe_copy_from_user(&tsk->thread.vr_state, v_regs,
388 33 * sizeof(vector128), efault_out);
Cyril Burd1199432016-09-23 16:18:12 +1000389 tsk->thread.used_vr = true;
390 } else if (tsk->thread.used_vr) {
391 memset(&tsk->thread.vr_state, 0, 33 * sizeof(vector128));
Simon Guoe1c0d662016-07-26 16:06:01 +0800392 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393 /* Always get VRSAVE back */
Anton Blanchardb0d436c2013-08-07 02:01:24 +1000394 if (v_regs != NULL)
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600395 unsafe_get_user(tsk->thread.vrsave, (u32 __user *)&v_regs[33], efault_out);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700396 else
Cyril Burd1199432016-09-23 16:18:12 +1000397 tsk->thread.vrsave = 0;
Paul Mackerras408a7e02013-08-05 14:13:16 +1000398 if (cpu_has_feature(CPU_FTR_ALTIVEC))
Cyril Burd1199432016-09-23 16:18:12 +1000399 mtspr(SPRN_VRSAVE, tsk->thread.vrsave);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400#endif /* CONFIG_ALTIVEC */
Michael Neulingc6e67712008-06-25 14:07:18 +1000401 /* restore floating point */
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600402 unsafe_copy_fpr_from_user(tsk, &sc->fp_regs, efault_out);
Michael Neuling6a274c02008-07-02 14:06:37 +1000403#ifdef CONFIG_VSX
Michael Neulingce48b212008-06-25 14:07:18 +1000404 /*
405 * Get additional VSX data. Update v_regs to point after the
406 * VMX data. Copy VSX low doubleword from userspace to local
407 * buffer for formatting, then into the taskstruct.
408 */
409 v_regs += ELF_NVRREG;
Simon Guoe1c0d662016-07-26 16:06:01 +0800410 if ((msr & MSR_VSX) != 0) {
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600411 unsafe_copy_vsx_from_user(tsk, v_regs, efault_out);
Cyril Burd1199432016-09-23 16:18:12 +1000412 tsk->thread.used_vsr = true;
413 } else {
Michael Neuling6a274c02008-07-02 14:06:37 +1000414 for (i = 0; i < 32 ; i++)
Cyril Burd1199432016-09-23 16:18:12 +1000415 tsk->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
416 }
Michael Neulingc6e67712008-06-25 14:07:18 +1000417#endif
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600418 return 0;
419
420efault_out:
421 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700422}
423
Michael Neuling2b0a5762013-02-13 16:21:41 +0000424#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
425/*
426 * Restore the two sigcontexts from the frame of a transactional processes.
427 */
428
Cyril Burd1199432016-09-23 16:18:12 +1000429static long restore_tm_sigcontexts(struct task_struct *tsk,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000430 struct sigcontext __user *sc,
431 struct sigcontext __user *tm_sc)
432{
433#ifdef CONFIG_ALTIVEC
434 elf_vrreg_t __user *v_regs, *tm_v_regs;
435#endif
436 unsigned long err = 0;
437 unsigned long msr;
Cyril Burd1199432016-09-23 16:18:12 +1000438 struct pt_regs *regs = tsk->thread.regs;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000439#ifdef CONFIG_VSX
440 int i;
441#endif
Cyril Burd1199432016-09-23 16:18:12 +1000442
443 BUG_ON(tsk != current);
444
Michael Neuling92fb8692017-10-12 21:17:19 +1100445 if (tm_suspend_disabled)
446 return -EINVAL;
447
Michael Neuling2b0a5762013-02-13 16:21:41 +0000448 /* copy the GPRs */
449 err |= __copy_from_user(regs->gpr, tm_sc->gp_regs, sizeof(regs->gpr));
Cyril Burd1199432016-09-23 16:18:12 +1000450 err |= __copy_from_user(&tsk->thread.ckpt_regs, sc->gp_regs,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000451 sizeof(regs->gpr));
452
453 /*
454 * TFHAR is restored from the checkpointed 'wound-back' ucontext's NIP.
455 * TEXASR was set by the signal delivery reclaim, as was TFIAR.
456 * Users doing anything abhorrent like thread-switching w/ signals for
457 * TM-Suspended code will have to back TEXASR/TFIAR up themselves.
458 * For the case of getting a signal and simply returning from it,
459 * we don't need to re-copy them here.
460 */
461 err |= __get_user(regs->nip, &tm_sc->gp_regs[PT_NIP]);
Cyril Burd1199432016-09-23 16:18:12 +1000462 err |= __get_user(tsk->thread.tm_tfhar, &sc->gp_regs[PT_NIP]);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000463
464 /* get MSR separately, transfer the LE bit if doing signal return */
465 err |= __get_user(msr, &sc->gp_regs[PT_MSR]);
Michael Neulingd2b9d2a2015-11-19 15:44:44 +1100466 /* Don't allow reserved mode. */
467 if (MSR_TM_RESV(msr))
468 return -EINVAL;
469
Michael Neuling87b4e532013-06-09 21:23:19 +1000470 /* pull in MSR LE from user context */
Michael Neuling2b0a5762013-02-13 16:21:41 +0000471 regs->msr = (regs->msr & ~MSR_LE) | (msr & MSR_LE);
472
473 /* The following non-GPR non-FPR non-VR state is also checkpointed: */
474 err |= __get_user(regs->ctr, &tm_sc->gp_regs[PT_CTR]);
475 err |= __get_user(regs->link, &tm_sc->gp_regs[PT_LNK]);
476 err |= __get_user(regs->xer, &tm_sc->gp_regs[PT_XER]);
477 err |= __get_user(regs->ccr, &tm_sc->gp_regs[PT_CCR]);
Cyril Burd1199432016-09-23 16:18:12 +1000478 err |= __get_user(tsk->thread.ckpt_regs.ctr,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000479 &sc->gp_regs[PT_CTR]);
Cyril Burd1199432016-09-23 16:18:12 +1000480 err |= __get_user(tsk->thread.ckpt_regs.link,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000481 &sc->gp_regs[PT_LNK]);
Cyril Burd1199432016-09-23 16:18:12 +1000482 err |= __get_user(tsk->thread.ckpt_regs.xer,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000483 &sc->gp_regs[PT_XER]);
Cyril Burd1199432016-09-23 16:18:12 +1000484 err |= __get_user(tsk->thread.ckpt_regs.ccr,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000485 &sc->gp_regs[PT_CCR]);
Nicholas Piggin4e0e45b2020-05-07 22:13:32 +1000486 /* Don't allow userspace to set SOFTE */
487 set_trap_norestart(regs);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000488 /* These regs are not checkpointed; they can go in 'regs'. */
Michael Neuling2b0a5762013-02-13 16:21:41 +0000489 err |= __get_user(regs->dar, &sc->gp_regs[PT_DAR]);
490 err |= __get_user(regs->dsisr, &sc->gp_regs[PT_DSISR]);
491 err |= __get_user(regs->result, &sc->gp_regs[PT_RESULT]);
492
493 /*
Michael Neuling2b0a5762013-02-13 16:21:41 +0000494 * Force reload of FP/VEC.
Cyril Burd1199432016-09-23 16:18:12 +1000495 * This has to be done before copying stuff into tsk->thread.fpr/vr
Michael Neuling2b0a5762013-02-13 16:21:41 +0000496 * for the reasons explained in the previous comment.
497 */
498 regs->msr &= ~(MSR_FP | MSR_FE0 | MSR_FE1 | MSR_VEC | MSR_VSX);
499
500#ifdef CONFIG_ALTIVEC
501 err |= __get_user(v_regs, &sc->v_regs);
502 err |= __get_user(tm_v_regs, &tm_sc->v_regs);
503 if (err)
504 return err;
Linus Torvalds96d4f262019-01-03 18:57:57 -0800505 if (v_regs && !access_ok(v_regs, 34 * sizeof(vector128)))
Michael Neuling2b0a5762013-02-13 16:21:41 +0000506 return -EFAULT;
Linus Torvalds96d4f262019-01-03 18:57:57 -0800507 if (tm_v_regs && !access_ok(tm_v_regs, 34 * sizeof(vector128)))
Michael Neuling2b0a5762013-02-13 16:21:41 +0000508 return -EFAULT;
509 /* Copy 33 vec registers (vr0..31 and vscr) from the stack */
Anton Blanchardb0d436c2013-08-07 02:01:24 +1000510 if (v_regs != NULL && tm_v_regs != NULL && (msr & MSR_VEC) != 0) {
Cyril Bur000ec282016-09-23 16:18:25 +1000511 err |= __copy_from_user(&tsk->thread.ckvr_state, v_regs,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000512 33 * sizeof(vector128));
Cyril Burdc310662016-09-23 16:18:24 +1000513 err |= __copy_from_user(&tsk->thread.vr_state, tm_v_regs,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000514 33 * sizeof(vector128));
Simon Guoe1c0d662016-07-26 16:06:01 +0800515 current->thread.used_vr = true;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000516 }
Cyril Burd1199432016-09-23 16:18:12 +1000517 else if (tsk->thread.used_vr) {
518 memset(&tsk->thread.vr_state, 0, 33 * sizeof(vector128));
Cyril Bur000ec282016-09-23 16:18:25 +1000519 memset(&tsk->thread.ckvr_state, 0, 33 * sizeof(vector128));
Michael Neuling2b0a5762013-02-13 16:21:41 +0000520 }
521 /* Always get VRSAVE back */
Anton Blanchardb0d436c2013-08-07 02:01:24 +1000522 if (v_regs != NULL && tm_v_regs != NULL) {
Cyril Bur000ec282016-09-23 16:18:25 +1000523 err |= __get_user(tsk->thread.ckvrsave,
Cyril Burdc310662016-09-23 16:18:24 +1000524 (u32 __user *)&v_regs[33]);
525 err |= __get_user(tsk->thread.vrsave,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000526 (u32 __user *)&tm_v_regs[33]);
527 }
528 else {
Cyril Burd1199432016-09-23 16:18:12 +1000529 tsk->thread.vrsave = 0;
Cyril Bur000ec282016-09-23 16:18:25 +1000530 tsk->thread.ckvrsave = 0;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000531 }
Paul Mackerras408a7e02013-08-05 14:13:16 +1000532 if (cpu_has_feature(CPU_FTR_ALTIVEC))
Cyril Burd1199432016-09-23 16:18:12 +1000533 mtspr(SPRN_VRSAVE, tsk->thread.vrsave);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000534#endif /* CONFIG_ALTIVEC */
535 /* restore floating point */
Cyril Burdc310662016-09-23 16:18:24 +1000536 err |= copy_fpr_from_user(tsk, &tm_sc->fp_regs);
Cyril Bur000ec282016-09-23 16:18:25 +1000537 err |= copy_ckfpr_from_user(tsk, &sc->fp_regs);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000538#ifdef CONFIG_VSX
539 /*
540 * Get additional VSX data. Update v_regs to point after the
541 * VMX data. Copy VSX low doubleword from userspace to local
542 * buffer for formatting, then into the taskstruct.
543 */
544 if (v_regs && ((msr & MSR_VSX) != 0)) {
545 v_regs += ELF_NVRREG;
546 tm_v_regs += ELF_NVRREG;
Cyril Burdc310662016-09-23 16:18:24 +1000547 err |= copy_vsx_from_user(tsk, tm_v_regs);
Cyril Bur000ec282016-09-23 16:18:25 +1000548 err |= copy_ckvsx_from_user(tsk, v_regs);
Cyril Burd1199432016-09-23 16:18:12 +1000549 tsk->thread.used_vsr = true;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000550 } else {
551 for (i = 0; i < 32 ; i++) {
Cyril Burd1199432016-09-23 16:18:12 +1000552 tsk->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
Cyril Bur000ec282016-09-23 16:18:25 +1000553 tsk->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000554 }
555 }
556#endif
557 tm_enable();
Michael Neulinge6b8fd02014-04-04 20:19:48 +1100558 /* Make sure the transaction is marked as failed */
Cyril Burd1199432016-09-23 16:18:12 +1000559 tsk->thread.tm_texasr |= TEXASR_FS;
Breno Leitaoe1c37432018-11-21 17:21:09 -0200560
561 /*
562 * Disabling preemption, since it is unsafe to be preempted
563 * with MSR[TS] set without recheckpointing.
564 */
565 preempt_disable();
566
567 /* pull in MSR TS bits from user context */
Breno Leitaoe620d452019-01-16 14:47:44 -0200568 regs->msr |= msr & MSR_TS_MASK;
Breno Leitaoe1c37432018-11-21 17:21:09 -0200569
570 /*
571 * Ensure that TM is enabled in regs->msr before we leave the signal
572 * handler. It could be the case that (a) user disabled the TM bit
573 * through the manipulation of the MSR bits in uc_mcontext or (b) the
574 * TM bit was disabled because a sufficient number of context switches
575 * happened whilst in the signal handler and load_tm overflowed,
576 * disabling the TM bit. In either case we can end up with an illegal
577 * TM state leading to a TM Bad Thing when we return to userspace.
578 *
579 * CAUTION:
580 * After regs->MSR[TS] being updated, make sure that get_user(),
581 * put_user() or similar functions are *not* called. These
582 * functions can generate page faults which will cause the process
583 * to be de-scheduled with MSR[TS] set but without calling
584 * tm_recheckpoint(). This can cause a bug.
585 */
586 regs->msr |= MSR_TM;
587
Michael Neuling2b0a5762013-02-13 16:21:41 +0000588 /* This loads the checkpointed FP/VEC state, if used */
Cyril Bureb5c3f12017-11-02 14:09:05 +1100589 tm_recheckpoint(&tsk->thread);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000590
Cyril Burdc310662016-09-23 16:18:24 +1000591 msr_check_and_set(msr & (MSR_FP | MSR_VEC));
Michael Neuling2b0a5762013-02-13 16:21:41 +0000592 if (msr & MSR_FP) {
Cyril Burdc310662016-09-23 16:18:24 +1000593 load_fp_state(&tsk->thread.fp_state);
Cyril Burd1199432016-09-23 16:18:12 +1000594 regs->msr |= (MSR_FP | tsk->thread.fpexc_mode);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000595 }
596 if (msr & MSR_VEC) {
Cyril Burdc310662016-09-23 16:18:24 +1000597 load_vr_state(&tsk->thread.vr_state);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000598 regs->msr |= MSR_VEC;
599 }
600
Breno Leitaoe1c37432018-11-21 17:21:09 -0200601 preempt_enable();
602
Michael Neuling2b0a5762013-02-13 16:21:41 +0000603 return err;
604}
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600605#else /* !CONFIG_PPC_TRANSACTIONAL_MEM */
606static long restore_tm_sigcontexts(struct task_struct *tsk, struct sigcontext __user *sc,
607 struct sigcontext __user *tm_sc)
608{
609 return -EINVAL;
610}
Michael Neuling2b0a5762013-02-13 16:21:41 +0000611#endif
612
Linus Torvalds1da177e2005-04-16 15:20:36 -0700613/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614 * Setup the trampoline code on the stack
615 */
616static long setup_trampoline(unsigned int syscall, unsigned int __user *tramp)
617{
618 int i;
619 long err = 0;
620
Christophe Leroy1c9debb2021-05-20 10:23:03 +0000621 /* Call the handler and pop the dummy stackframe*/
622 err |= __put_user(PPC_RAW_BCTRL(), &tramp[0]);
623 err |= __put_user(PPC_RAW_ADDI(_R1, _R1, __SIGNAL_FRAMESIZE), &tramp[1]);
624
625 err |= __put_user(PPC_RAW_LI(_R0, syscall), &tramp[2]);
626 err |= __put_user(PPC_RAW_SC(), &tramp[3]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700627
628 /* Minimal traceback info */
629 for (i=TRAMP_TRACEBACK; i < TRAMP_SIZE ;i++)
630 err |= __put_user(0, &tramp[i]);
631
632 if (!err)
633 flush_icache_range((unsigned long) &tramp[0],
634 (unsigned long) &tramp[TRAMP_SIZE]);
635
636 return err;
637}
638
639/*
Michael Neulingc1cb2992008-07-08 18:43:41 +1000640 * Userspace code may pass a ucontext which doesn't include VSX added
641 * at the end. We need to check for this case.
642 */
643#define UCONTEXTSIZEWITHOUTVSX \
644 (sizeof(struct ucontext) - 32*sizeof(long))
645
646/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700647 * Handle {get,set,swap}_context operations
648 */
Al Virof3675642018-05-02 23:20:47 +1000649SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
650 struct ucontext __user *, new_ctx, long, ctx_size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700651{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 sigset_t set;
Michael Neulingc1cb2992008-07-08 18:43:41 +1000653 unsigned long new_msr = 0;
Michael Neuling16c29d12008-10-23 00:42:36 +0000654 int ctx_has_vsx_region = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700655
Michael Neulingc1cb2992008-07-08 18:43:41 +1000656 if (new_ctx &&
Michael Neuling16c29d12008-10-23 00:42:36 +0000657 get_user(new_msr, &new_ctx->uc_mcontext.gp_regs[PT_MSR]))
Michael Neulingc1cb2992008-07-08 18:43:41 +1000658 return -EFAULT;
659 /*
660 * Check that the context is not smaller than the original
661 * size (with VMX but without VSX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700662 */
Michael Neulingc1cb2992008-07-08 18:43:41 +1000663 if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700664 return -EINVAL;
Michael Neulingc1cb2992008-07-08 18:43:41 +1000665 /*
666 * If the new context state sets the MSR VSX bits but
667 * it doesn't provide VSX state.
668 */
669 if ((ctx_size < sizeof(struct ucontext)) &&
670 (new_msr & MSR_VSX))
671 return -EINVAL;
Michael Neuling16c29d12008-10-23 00:42:36 +0000672 /* Does the context have enough room to store VSX data? */
673 if (ctx_size >= sizeof(struct ucontext))
674 ctx_has_vsx_region = 1;
675
Linus Torvalds1da177e2005-04-16 15:20:36 -0700676 if (old_ctx != NULL) {
Christopher M. Riedlc6c96452021-02-26 19:12:52 -0600677 prepare_setup_sigcontext(current);
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600678 if (!user_write_access_begin(old_ctx, ctx_size))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700679 return -EFAULT;
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600680
681 unsafe_setup_sigcontext(&old_ctx->uc_mcontext, current, 0, NULL,
682 0, ctx_has_vsx_region, efault_out);
683 unsafe_copy_to_user(&old_ctx->uc_sigmask, &current->blocked,
684 sizeof(sigset_t), efault_out);
685
686 user_write_access_end();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700687 }
688 if (new_ctx == NULL)
689 return 0;
Christophe Leroy96032f92020-07-07 18:32:25 +0000690 if (!access_ok(new_ctx, ctx_size) ||
691 fault_in_pages_readable((u8 __user *)new_ctx, ctx_size))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700692 return -EFAULT;
693
694 /*
695 * If we get a fault copying the context into the kernel's
696 * image of the user's registers, we can't just return -EFAULT
697 * because the user's registers will be corrupted. For instance
698 * the NIP value may have been updated but not some of the
699 * other registers. Given that we have done the access_ok
700 * and successfully read the first and last bytes of the region
701 * above, this should only happen in an out-of-memory situation
702 * or if another thread unmaps the region containing the context.
703 * We kill the task with a SIGSEGV in this situation.
704 */
705
Christopher M. Riedld3ccc972021-02-26 19:12:59 -0600706 if (__get_user_sigset(&set, &new_ctx->uc_sigmask))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700707 do_exit(SIGSEGV);
Al Viro17440f12012-04-27 14:09:19 -0400708 set_current_blocked(&set);
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600709
710 if (!user_read_access_begin(new_ctx, ctx_size))
711 return -EFAULT;
712 if (__unsafe_restore_sigcontext(current, NULL, 0, &new_ctx->uc_mcontext)) {
713 user_read_access_end();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 do_exit(SIGSEGV);
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600715 }
716 user_read_access_end();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700717
718 /* This returns like rt_sigreturn */
David Woodhouse401d1f02005-11-15 18:52:18 +0000719 set_thread_flag(TIF_RESTOREALL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700720 return 0;
Christopher M. Riedl7bb081c2021-02-26 19:12:55 -0600721
722efault_out:
723 user_write_access_end();
724 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725}
726
727
728/*
729 * Do a signal return; undo the signal stack.
730 */
731
Al Virof3675642018-05-02 23:20:47 +1000732SYSCALL_DEFINE0(rt_sigreturn)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700733{
Al Virof3675642018-05-02 23:20:47 +1000734 struct pt_regs *regs = current_pt_regs();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700735 struct ucontext __user *uc = (struct ucontext __user *)regs->gpr[1];
736 sigset_t set;
Michael Neuling2b0a5762013-02-13 16:21:41 +0000737 unsigned long msr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700738
739 /* Always make any pending restarted system calls return -EINTR */
Andy Lutomirskif56141e2015-02-12 15:01:14 -0800740 current->restart_block.fn = do_no_restart_syscall;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700741
Linus Torvalds96d4f262019-01-03 18:57:57 -0800742 if (!access_ok(uc, sizeof(*uc)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743 goto badframe;
744
Christopher M. Riedld3ccc972021-02-26 19:12:59 -0600745 if (__get_user_sigset(&set, &uc->uc_sigmask))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700746 goto badframe;
Al Viro17440f12012-04-27 14:09:19 -0400747 set_current_blocked(&set);
Cyril Bur78a3e882016-08-23 10:46:17 +1000748
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600749 if (IS_ENABLED(CONFIG_PPC_TRANSACTIONAL_MEM)) {
750 /*
751 * If there is a transactional state then throw it away.
752 * The purpose of a sigreturn is to destroy all traces of the
753 * signal frame, this includes any transactional state created
754 * within in. We only check for suspended as we can never be
755 * active in the kernel, we are active, there is nothing better to
756 * do than go ahead and Bad Thing later.
757 * The cause is not important as there will never be a
758 * recheckpoint so it's not user visible.
759 */
760 if (MSR_TM_SUSPENDED(mfmsr()))
761 tm_reclaim_current(0);
Cyril Bur78a3e882016-08-23 10:46:17 +1000762
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600763 /*
764 * Disable MSR[TS] bit also, so, if there is an exception in the
765 * code below (as a page fault in copy_ckvsx_to_user()), it does
766 * not recheckpoint this task if there was a context switch inside
767 * the exception.
768 *
769 * A major page fault can indirectly call schedule(). A reschedule
770 * process in the middle of an exception can have a side effect
771 * (Changing the CPU MSR[TS] state), since schedule() is called
772 * with the CPU MSR[TS] disable and returns with MSR[TS]=Suspended
773 * (switch_to() calls tm_recheckpoint() for the 'new' process). In
774 * this case, the process continues to be the same in the CPU, but
775 * the CPU state just changed.
776 *
777 * This can cause a TM Bad Thing, since the MSR in the stack will
778 * have the MSR[TS]=0, and this is what will be used to RFID.
779 *
780 * Clearing MSR[TS] state here will avoid a recheckpoint if there
781 * is any process reschedule in kernel space. The MSR[TS] state
782 * does not need to be saved also, since it will be replaced with
783 * the MSR[TS] that came from user context later, at
784 * restore_tm_sigcontexts.
785 */
786 regs->msr &= ~MSR_TS_MASK;
Breno Leitaoe620d452019-01-16 14:47:44 -0200787
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600788 if (__get_user(msr, &uc->uc_mcontext.gp_regs[PT_MSR]))
789 goto badframe;
790 }
791
792 if (IS_ENABLED(CONFIG_PPC_TRANSACTIONAL_MEM) && MSR_TM_ACTIVE(msr)) {
Michael Neuling2b0a5762013-02-13 16:21:41 +0000793 /* We recheckpoint on return. */
794 struct ucontext __user *uc_transact;
Michael Neulingf16d80b2019-07-19 15:05:02 +1000795
796 /* Trying to start TM on non TM system */
797 if (!cpu_has_feature(CPU_FTR_TM))
798 goto badframe;
799
Michael Neuling2b0a5762013-02-13 16:21:41 +0000800 if (__get_user(uc_transact, &uc->uc_link))
801 goto badframe;
Cyril Burd1199432016-09-23 16:18:12 +1000802 if (restore_tm_sigcontexts(current, &uc->uc_mcontext,
Michael Neuling2b0a5762013-02-13 16:21:41 +0000803 &uc_transact->uc_mcontext))
804 goto badframe;
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600805 } else {
Breno Leitao6f5b9f02018-11-26 18:12:00 -0200806 /*
Breno Leitao897bc3d2019-01-09 11:16:45 -0200807 * Fall through, for non-TM restore
808 *
Breno Leitao6f5b9f02018-11-26 18:12:00 -0200809 * Unset MSR[TS] on the thread regs since MSR from user
810 * context does not have MSR active, and recheckpoint was
811 * not called since restore_tm_sigcontexts() was not called
812 * also.
813 *
814 * If not unsetting it, the code can RFID to userspace with
815 * MSR[TS] set, but without CPU in the proper state,
816 * causing a TM bad thing.
817 */
818 current->thread.regs->msr &= ~MSR_TS_MASK;
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600819 if (!user_read_access_begin(&uc->uc_mcontext, sizeof(uc->uc_mcontext)))
Breno Leitao6f5b9f02018-11-26 18:12:00 -0200820 goto badframe;
Daniel Axtens0f924332021-02-26 19:12:58 -0600821
822 unsafe_restore_sigcontext(current, NULL, 1, &uc->uc_mcontext,
823 badframe_block);
824
Christopher M. Riedl193323e2021-02-26 19:12:56 -0600825 user_read_access_end();
Breno Leitao6f5b9f02018-11-26 18:12:00 -0200826 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700827
Al Viro7cce2462012-12-23 03:26:46 -0500828 if (restore_altstack(&uc->uc_stack))
829 goto badframe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700830
David Woodhouse401d1f02005-11-15 18:52:18 +0000831 set_thread_flag(TIF_RESTOREALL);
832 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700833
Daniel Axtens0f924332021-02-26 19:12:58 -0600834badframe_block:
835 user_read_access_end();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700836badframe:
Christophe Leroy7fe8f772020-08-18 17:19:23 +0000837 signal_fault(current, regs, "rt_sigreturn", uc);
Olof Johanssond0c3d532007-10-12 10:20:07 +1000838
Eric W. Biederman3cf5d072019-05-23 10:17:27 -0500839 force_sig(SIGSEGV);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700840 return 0;
841}
842
Cyril Burd1199432016-09-23 16:18:12 +1000843int handle_rt_signal64(struct ksignal *ksig, sigset_t *set,
844 struct task_struct *tsk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700845{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700846 struct rt_sigframe __user *frame;
847 unsigned long newsp = 0;
848 long err = 0;
Cyril Burd1199432016-09-23 16:18:12 +1000849 struct pt_regs *regs = tsk->thread.regs;
Gustavo Luiz Duarte2464cc42020-02-11 00:38:29 -0300850 /* Save the thread's msr before get_tm_stackpointer() changes it */
851 unsigned long msr = regs->msr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700852
Christophe Leroyc180cb32020-08-18 17:19:22 +0000853 frame = get_sigframe(ksig, tsk, sizeof(*frame), 0);
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600854
855 /*
856 * This only applies when calling unsafe_setup_sigcontext() and must be
857 * called before opening the uaccess window.
858 */
859 if (!MSR_TM_ACTIVE(msr))
860 prepare_setup_sigcontext(tsk);
861
862 if (!user_write_access_begin(frame, sizeof(*frame)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700863 goto badframe;
864
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600865 unsafe_put_user(&frame->info, &frame->pinfo, badframe_block);
866 unsafe_put_user(&frame->uc, &frame->puc, badframe_block);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700867
868 /* Create the ucontext. */
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600869 unsafe_put_user(0, &frame->uc.uc_flags, badframe_block);
870 unsafe_save_altstack(&frame->uc.uc_stack, regs->gpr[1], badframe_block);
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600871
Gustavo Luiz Duarte2464cc42020-02-11 00:38:29 -0300872 if (MSR_TM_ACTIVE(msr)) {
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600873#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
Michael Neuling2b0a5762013-02-13 16:21:41 +0000874 /* The ucontext_t passed to userland points to the second
875 * ucontext_t (for transactional state) with its uc_link ptr.
876 */
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600877 unsafe_put_user(&frame->uc_transact, &frame->uc.uc_link, badframe_block);
878
879 user_write_access_end();
880
Michael Neuling2b0a5762013-02-13 16:21:41 +0000881 err |= setup_tm_sigcontexts(&frame->uc.uc_mcontext,
882 &frame->uc_transact.uc_mcontext,
Cyril Burd1199432016-09-23 16:18:12 +1000883 tsk, ksig->sig, NULL,
Gustavo Luiz Duarte2464cc42020-02-11 00:38:29 -0300884 (unsigned long)ksig->ka.sa.sa_handler,
885 msr);
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600886
887 if (!user_write_access_begin(&frame->uc.uc_sigmask,
888 sizeof(frame->uc.uc_sigmask)))
889 goto badframe;
890
Michael Neuling2b0a5762013-02-13 16:21:41 +0000891#endif
Christopher M. Riedl2d196302021-02-26 19:12:54 -0600892 } else {
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600893 unsafe_put_user(0, &frame->uc.uc_link, badframe_block);
894 unsafe_setup_sigcontext(&frame->uc.uc_mcontext, tsk, ksig->sig,
895 NULL, (unsigned long)ksig->ka.sa.sa_handler,
896 1, badframe_block);
Michael Neuling2b0a5762013-02-13 16:21:41 +0000897 }
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600898
899 unsafe_copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set), badframe_block);
900 user_write_access_end();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700901
Michael Ellermane41d6c32021-06-08 23:46:05 +1000902 /* Save the siginfo outside of the unsafe block. */
903 if (copy_siginfo_to_user(&frame->info, &ksig->info))
904 goto badframe;
905
Paul Mackerrascc657f52005-11-14 21:55:15 +1100906 /* Make sure signal handler doesn't get spurious FP exceptions */
Cyril Burd1199432016-09-23 16:18:12 +1000907 tsk->thread.fp_state.fpscr = 0;
Paul Mackerrascc657f52005-11-14 21:55:15 +1100908
Linus Torvalds1da177e2005-04-16 15:20:36 -0700909 /* Set up to return from userspace. */
Christophe Leroy91bf6952020-09-27 09:16:33 +0000910 if (tsk->mm->context.vdso) {
911 regs->nip = VDSO64_SYMBOL(tsk->mm->context.vdso, sigtramp_rt64);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700912 } else {
913 err |= setup_trampoline(__NR_rt_sigreturn, &frame->tramp[0]);
914 if (err)
915 goto badframe;
Nicholas Piggin0138ba52020-05-11 20:19:52 +1000916 regs->nip = (unsigned long) &frame->tramp[0];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700917 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700918
919 /* Allocate a dummy caller frame for the signal handler. */
Benjamin Herrenschmidta3f61dc2007-06-04 17:22:48 +1000920 newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700921 err |= put_user(regs->gpr[1], (unsigned long __user *)newsp);
922
923 /* Set up "regs" so we "return" to the signal handler. */
Rusty Russelld606b922013-11-20 22:15:03 +1100924 if (is_elf2_task()) {
Nicholas Piggin0138ba52020-05-11 20:19:52 +1000925 regs->ctr = (unsigned long) ksig->ka.sa.sa_handler;
926 regs->gpr[12] = regs->ctr;
Rusty Russelld606b922013-11-20 22:15:03 +1100927 } else {
928 /* Handler is *really* a pointer to the function descriptor for
929 * the signal routine. The first entry in the function
930 * descriptor is the entry address of signal and the second
931 * entry is the TOC value we need to use.
932 */
933 func_descr_t __user *funct_desc_ptr =
Richard Weinberger129b69d2014-03-02 14:46:11 +0100934 (func_descr_t __user *) ksig->ka.sa.sa_handler;
Rusty Russelld606b922013-11-20 22:15:03 +1100935
Nicholas Piggin0138ba52020-05-11 20:19:52 +1000936 err |= get_user(regs->ctr, &funct_desc_ptr->entry);
Rusty Russelld606b922013-11-20 22:15:03 +1100937 err |= get_user(regs->gpr[2], &funct_desc_ptr->toc);
938 }
939
Anton Blancharde871c6b2013-09-23 12:04:43 +1000940 /* enter the signal handler in native-endian mode */
Paul Mackerrasfab5db92006-06-07 16:14:40 +1000941 regs->msr &= ~MSR_LE;
Anton Blancharde871c6b2013-09-23 12:04:43 +1000942 regs->msr |= (MSR_KERNEL & MSR_LE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700943 regs->gpr[1] = newsp;
Richard Weinberger129b69d2014-03-02 14:46:11 +0100944 regs->gpr[3] = ksig->sig;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700945 regs->result = 0;
Richard Weinberger129b69d2014-03-02 14:46:11 +0100946 if (ksig->ka.sa.sa_flags & SA_SIGINFO) {
Michael Ellermana3309222021-06-10 17:29:49 +1000947 regs->gpr[4] = (unsigned long)&frame->info;
948 regs->gpr[5] = (unsigned long)&frame->uc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700949 regs->gpr[6] = (unsigned long) frame;
950 } else {
951 regs->gpr[4] = (unsigned long)&frame->uc.uc_mcontext;
952 }
953 if (err)
954 goto badframe;
955
Richard Weinberger129b69d2014-03-02 14:46:11 +0100956 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700957
Daniel Axtens96d7a4e2021-02-26 19:12:57 -0600958badframe_block:
959 user_write_access_end();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700960badframe:
Christophe Leroy7fe8f772020-08-18 17:19:23 +0000961 signal_fault(current, regs, "handle_rt_signal64", frame);
Olof Johanssond0c3d532007-10-12 10:20:07 +1000962
Richard Weinberger129b69d2014-03-02 14:46:11 +0100963 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700964}