blob: d05c78eace1bf7f6ca1dc5f5e689dd12e637b0e0 [file] [log] [blame]
Thomas Gleixnerd2912cb2019-06-04 10:11:33 +02001// SPDX-License-Identifier: GPL-2.0-only
Aurelien Jacquiot03a34752011-10-04 11:04:34 -04002/*
3 * Port on Texas Instruments TMS320C6x architecture
4 *
5 * Copyright (C) 2004, 2006, 2009, 2010, 2011 Texas Instruments Incorporated
6 * Author: Aurelien Jacquiot (aurelien.jacquiot@jaluna.com)
7 *
8 * Updated for 2.6.34: Mark Salter <msalter@redhat.com>
Aurelien Jacquiot03a34752011-10-04 11:04:34 -04009 */
10
11#include <linux/kernel.h>
12#include <linux/uaccess.h>
13#include <linux/syscalls.h>
14#include <linux/tracehook.h>
15
16#include <asm/ucontext.h>
17#include <asm/cacheflush.h>
18
19
Aurelien Jacquiot03a34752011-10-04 11:04:34 -040020/*
21 * Do a signal return, undo the signal stack.
22 */
23
24#define RETCODE_SIZE (9 << 2) /* 9 instructions = 36 bytes */
25
26struct rt_sigframe {
27 struct siginfo __user *pinfo;
28 void __user *puc;
29 struct siginfo info;
30 struct ucontext uc;
31 unsigned long retcode[RETCODE_SIZE >> 2];
32};
33
34static int restore_sigcontext(struct pt_regs *regs,
35 struct sigcontext __user *sc)
36{
37 int err = 0;
38
39 /* The access_ok check was done by caller, so use __get_user here */
40#define COPY(x) (err |= __get_user(regs->x, &sc->sc_##x))
41
42 COPY(sp); COPY(a4); COPY(b4); COPY(a6); COPY(b6); COPY(a8); COPY(b8);
43 COPY(a0); COPY(a1); COPY(a2); COPY(a3); COPY(a5); COPY(a7); COPY(a9);
44 COPY(b0); COPY(b1); COPY(b2); COPY(b3); COPY(b5); COPY(b7); COPY(b9);
45
46 COPY(a16); COPY(a17); COPY(a18); COPY(a19);
47 COPY(a20); COPY(a21); COPY(a22); COPY(a23);
48 COPY(a24); COPY(a25); COPY(a26); COPY(a27);
49 COPY(a28); COPY(a29); COPY(a30); COPY(a31);
50 COPY(b16); COPY(b17); COPY(b18); COPY(b19);
51 COPY(b20); COPY(b21); COPY(b22); COPY(b23);
52 COPY(b24); COPY(b25); COPY(b26); COPY(b27);
53 COPY(b28); COPY(b29); COPY(b30); COPY(b31);
54
55 COPY(csr); COPY(pc);
56
57#undef COPY
58
59 return err;
60}
61
62asmlinkage int do_rt_sigreturn(struct pt_regs *regs)
63{
64 struct rt_sigframe __user *frame;
65 sigset_t set;
66
Al Viro2a3fdc12012-04-22 03:30:18 -040067 /* Always make any pending restarted system calls return -EINTR */
Andy Lutomirskif56141e2015-02-12 15:01:14 -080068 current->restart_block.fn = do_no_restart_syscall;
Al Viro2a3fdc12012-04-22 03:30:18 -040069
Aurelien Jacquiot03a34752011-10-04 11:04:34 -040070 /*
71 * Since we stacked the signal on a dword boundary,
72 * 'sp' should be dword aligned here. If it's
73 * not, then the user is trying to mess with us.
74 */
75 if (regs->sp & 7)
76 goto badframe;
77
78 frame = (struct rt_sigframe __user *) ((unsigned long) regs->sp + 8);
79
Linus Torvalds96d4f262019-01-03 18:57:57 -080080 if (!access_ok(frame, sizeof(*frame)))
Aurelien Jacquiot03a34752011-10-04 11:04:34 -040081 goto badframe;
82 if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
83 goto badframe;
84
Matt Fleming6e61ee32012-04-05 14:25:14 -070085 set_current_blocked(&set);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -040086
87 if (restore_sigcontext(regs, &frame->uc.uc_mcontext))
88 goto badframe;
89
90 return regs->a4;
91
92badframe:
Eric W. Biederman3cf5d072019-05-23 10:17:27 -050093 force_sig(SIGSEGV);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -040094 return 0;
95}
96
97static int setup_sigcontext(struct sigcontext __user *sc, struct pt_regs *regs,
98 unsigned long mask)
99{
100 int err = 0;
101
102 err |= __put_user(mask, &sc->sc_mask);
103
104 /* The access_ok check was done by caller, so use __put_user here */
105#define COPY(x) (err |= __put_user(regs->x, &sc->sc_##x))
106
107 COPY(sp); COPY(a4); COPY(b4); COPY(a6); COPY(b6); COPY(a8); COPY(b8);
108 COPY(a0); COPY(a1); COPY(a2); COPY(a3); COPY(a5); COPY(a7); COPY(a9);
109 COPY(b0); COPY(b1); COPY(b2); COPY(b3); COPY(b5); COPY(b7); COPY(b9);
110
111 COPY(a16); COPY(a17); COPY(a18); COPY(a19);
112 COPY(a20); COPY(a21); COPY(a22); COPY(a23);
113 COPY(a24); COPY(a25); COPY(a26); COPY(a27);
114 COPY(a28); COPY(a29); COPY(a30); COPY(a31);
115 COPY(b16); COPY(b17); COPY(b18); COPY(b19);
116 COPY(b20); COPY(b21); COPY(b22); COPY(b23);
117 COPY(b24); COPY(b25); COPY(b26); COPY(b27);
118 COPY(b28); COPY(b29); COPY(b30); COPY(b31);
119
120 COPY(csr); COPY(pc);
121
122#undef COPY
123
124 return err;
125}
126
Richard Weinberger615869e2014-03-05 13:43:56 +0100127static inline void __user *get_sigframe(struct ksignal *ksig,
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400128 struct pt_regs *regs,
129 unsigned long framesize)
130{
Richard Weinberger615869e2014-03-05 13:43:56 +0100131 unsigned long sp = sigsp(regs->sp, ksig);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400132
133 /*
134 * No matter what happens, 'sp' must be dword
135 * aligned. Otherwise, nasty things will happen
136 */
137 return (void __user *)((sp - framesize) & ~7);
138}
139
Richard Weinbergere19c0252013-10-06 23:09:48 +0200140static int setup_rt_frame(struct ksignal *ksig, sigset_t *set,
141 struct pt_regs *regs)
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400142{
143 struct rt_sigframe __user *frame;
144 unsigned long __user *retcode;
145 int err = 0;
146
Richard Weinberger615869e2014-03-05 13:43:56 +0100147 frame = get_sigframe(ksig, regs, sizeof(*frame));
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400148
Linus Torvalds96d4f262019-01-03 18:57:57 -0800149 if (!access_ok(frame, sizeof(*frame)))
Richard Weinbergere19c0252013-10-06 23:09:48 +0200150 return -EFAULT;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400151
152 err |= __put_user(&frame->info, &frame->pinfo);
153 err |= __put_user(&frame->uc, &frame->puc);
Richard Weinbergere19c0252013-10-06 23:09:48 +0200154 err |= copy_siginfo_to_user(&frame->info, &ksig->info);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400155
156 /* Clear all the bits of the ucontext we don't use. */
157 err |= __clear_user(&frame->uc, offsetof(struct ucontext, uc_mcontext));
158
159 err |= setup_sigcontext(&frame->uc.uc_mcontext, regs, set->sig[0]);
160 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
161
162 /* Set up to return from userspace */
163 retcode = (unsigned long __user *) &frame->retcode;
164
165 /* The access_ok check was done above, so use __put_user here */
166#define COPY(x) (err |= __put_user(x, retcode++))
167
168 COPY(0x0000002AUL | (__NR_rt_sigreturn << 7));
169 /* MVK __NR_rt_sigreturn,B0 */
170 COPY(0x10000000UL); /* SWE */
171 COPY(0x00006000UL); /* NOP 4 */
172 COPY(0x00006000UL); /* NOP 4 */
173 COPY(0x00006000UL); /* NOP 4 */
174 COPY(0x00006000UL); /* NOP 4 */
175 COPY(0x00006000UL); /* NOP 4 */
176 COPY(0x00006000UL); /* NOP 4 */
177 COPY(0x00006000UL); /* NOP 4 */
178
179#undef COPY
180
181 if (err)
Richard Weinbergere19c0252013-10-06 23:09:48 +0200182 return -EFAULT;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400183
184 flush_icache_range((unsigned long) &frame->retcode,
185 (unsigned long) &frame->retcode + RETCODE_SIZE);
186
187 retcode = (unsigned long __user *) &frame->retcode;
188
189 /* Change user context to branch to signal handler */
190 regs->sp = (unsigned long) frame - 8;
191 regs->b3 = (unsigned long) retcode;
Richard Weinbergere19c0252013-10-06 23:09:48 +0200192 regs->pc = (unsigned long) ksig->ka.sa.sa_handler;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400193
194 /* Give the signal number to the handler */
Richard Weinbergere19c0252013-10-06 23:09:48 +0200195 regs->a4 = ksig->sig;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400196
197 /*
198 * For realtime signals we must also set the second and third
199 * arguments for the signal handler.
200 * -- Peter Maydell <pmaydell@chiark.greenend.org.uk> 2000-12-06
201 */
202 regs->b4 = (unsigned long)&frame->info;
203 regs->a6 = (unsigned long)&frame->uc;
204
205 return 0;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400206}
207
208static inline void
209handle_restart(struct pt_regs *regs, struct k_sigaction *ka, int has_handler)
210{
211 switch (regs->a4) {
212 case -ERESTARTNOHAND:
213 if (!has_handler)
214 goto do_restart;
215 regs->a4 = -EINTR;
216 break;
217
218 case -ERESTARTSYS:
219 if (has_handler && !(ka->sa.sa_flags & SA_RESTART)) {
220 regs->a4 = -EINTR;
221 break;
222 }
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -0500223 fallthrough;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400224 case -ERESTARTNOINTR:
225do_restart:
226 regs->a4 = regs->orig_a4;
227 regs->pc -= 4;
228 break;
229 }
230}
231
232/*
233 * handle the actual delivery of a signal to userspace
234 */
Richard Weinbergere19c0252013-10-06 23:09:48 +0200235static void handle_signal(struct ksignal *ksig, struct pt_regs *regs,
236 int syscall)
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400237{
Richard Weinbergere19c0252013-10-06 23:09:48 +0200238 int ret;
239
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400240 /* Are we from a system call? */
241 if (syscall) {
242 /* If so, check system call restarting.. */
243 switch (regs->a4) {
244 case -ERESTART_RESTARTBLOCK:
245 case -ERESTARTNOHAND:
246 regs->a4 = -EINTR;
247 break;
248
249 case -ERESTARTSYS:
Richard Weinbergere19c0252013-10-06 23:09:48 +0200250 if (!(ksig->ka.sa.sa_flags & SA_RESTART)) {
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400251 regs->a4 = -EINTR;
252 break;
253 }
254
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -0500255 fallthrough;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400256 case -ERESTARTNOINTR:
257 regs->a4 = regs->orig_a4;
258 regs->pc -= 4;
259 }
260 }
261
262 /* Set up the stack frame */
Richard Weinbergere19c0252013-10-06 23:09:48 +0200263 ret = setup_rt_frame(ksig, sigmask_to_save(), regs);
264 signal_setup_done(ret, ksig, 0);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400265}
266
267/*
268 * handle a potential signal
269 */
270static void do_signal(struct pt_regs *regs, int syscall)
271{
Richard Weinbergere19c0252013-10-06 23:09:48 +0200272 struct ksignal ksig;
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400273
274 /* we want the common case to go fast, which is why we may in certain
275 * cases get here from kernel mode */
276 if (!user_mode(regs))
277 return;
278
Richard Weinbergere19c0252013-10-06 23:09:48 +0200279 if (get_signal(&ksig)) {
280 handle_signal(&ksig, regs, syscall);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400281 return;
282 }
283
284 /* did we come from a system call? */
285 if (syscall) {
286 /* restart the system call - no handlers present */
287 switch (regs->a4) {
288 case -ERESTARTNOHAND:
289 case -ERESTARTSYS:
290 case -ERESTARTNOINTR:
291 regs->a4 = regs->orig_a4;
292 regs->pc -= 4;
293 break;
294
295 case -ERESTART_RESTARTBLOCK:
296 regs->a4 = regs->orig_a4;
297 regs->b0 = __NR_restart_syscall;
298 regs->pc -= 4;
299 break;
300 }
301 }
302
303 /* if there's no signal to deliver, we just put the saved sigmask
304 * back */
Al Viro51a7b442012-05-21 23:33:55 -0400305 restore_saved_sigmask();
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400306}
307
308/*
309 * notification of userspace execution resumption
310 * - triggered by current->work.notify_resume
311 */
312asmlinkage void do_notify_resume(struct pt_regs *regs, u32 thread_info_flags,
313 int syscall)
314{
315 /* deal with pending signal delivery */
Al Viro6fd84c02012-05-23 15:28:58 -0400316 if (thread_info_flags & (1 << TIF_SIGPENDING))
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400317 do_signal(regs, syscall);
318
319 if (thread_info_flags & (1 << TIF_NOTIFY_RESUME)) {
320 clear_thread_flag(TIF_NOTIFY_RESUME);
321 tracehook_notify_resume(regs);
Aurelien Jacquiot03a34752011-10-04 11:04:34 -0400322 }
323}