powerpc/mm/radix: Fix kernel crash when running subpage protect test
[linux-2.6-block.git] / arch / powerpc / kernel / signal_64.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * PowerPC version
3 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
4 *
5 * Derived from "arch/i386/kernel/signal.c"
6 * Copyright (C) 1991, 1992 Linus Torvalds
7 * 1997-11-28 Modified for POSIX.1b signals by Richard Henderson
8 *
9 * This program is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU General Public License
11 * as published by the Free Software Foundation; either version
12 * 2 of the License, or (at your option) any later version.
13 */
14
1da177e4
LT
15#include <linux/sched.h>
16#include <linux/mm.h>
17#include <linux/smp.h>
1da177e4
LT
18#include <linux/kernel.h>
19#include <linux/signal.h>
20#include <linux/errno.h>
21#include <linux/wait.h>
22#include <linux/unistd.h>
23#include <linux/stddef.h>
24#include <linux/elf.h>
25#include <linux/ptrace.h>
76462232 26#include <linux/ratelimit.h>
f3675644 27#include <linux/syscalls.h>
1da177e4
LT
28
29#include <asm/sigcontext.h>
30#include <asm/ucontext.h>
7c0f6ba6 31#include <linux/uaccess.h>
1da177e4 32#include <asm/pgtable.h>
1da177e4
LT
33#include <asm/unistd.h>
34#include <asm/cacheflush.h>
a7f31841 35#include <asm/syscalls.h>
1da177e4 36#include <asm/vdso.h>
ae3a197e 37#include <asm/switch_to.h>
2b0a576d 38#include <asm/tm.h>
0545d543 39#include <asm/asm-prototypes.h>
1da177e4 40
22e38f29 41#include "signal.h"
1da177e4 42
1da177e4 43
6741f3a7 44#define GP_REGS_SIZE min(sizeof(elf_gregset_t), sizeof(struct pt_regs))
1da177e4
LT
45#define FP_REGS_SIZE sizeof(elf_fpregset_t)
46
47#define TRAMP_TRACEBACK 3
48#define TRAMP_SIZE 6
49
50/*
51 * When we have signals to deliver, we set up on the user stack,
52 * going down from the original stack pointer:
53 * 1) a rt_sigframe struct which contains the ucontext
54 * 2) a gap of __SIGNAL_FRAMESIZE bytes which acts as a dummy caller
55 * frame for the signal handler.
56 */
57
58struct rt_sigframe {
59 /* sys_rt_sigreturn requires the ucontext be the first field */
60 struct ucontext uc;
2b0a576d
MN
61#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
62 struct ucontext uc_transact;
63#endif
1da177e4
LT
64 unsigned long _unused[2];
65 unsigned int tramp[TRAMP_SIZE];
29e646df
AV
66 struct siginfo __user *pinfo;
67 void __user *puc;
1da177e4 68 struct siginfo info;
573ebfa6
PM
69 /* New 64 bit little-endian ABI allows redzone of 512 bytes below sp */
70 char abigap[USER_REDZONE_SIZE];
1da177e4
LT
71} __attribute__ ((aligned (16)));
72
d0c3d534
OJ
73static const char fmt32[] = KERN_INFO \
74 "%s[%d]: bad frame in %s: %08lx nip %08lx lr %08lx\n";
75static const char fmt64[] = KERN_INFO \
76 "%s[%d]: bad frame in %s: %016lx nip %016lx lr %016lx\n";
77
2476c09f
AK
78/*
79 * This computes a quad word aligned pointer inside the vmx_reserve array
80 * element. For historical reasons sigcontext might not be quad word aligned,
81 * but the location we write the VMX regs to must be. See the comment in
82 * sigcontext for more detail.
83 */
84#ifdef CONFIG_ALTIVEC
85static elf_vrreg_t __user *sigcontext_vmx_regs(struct sigcontext __user *sc)
86{
87 return (elf_vrreg_t __user *) (((unsigned long)sc->vmx_reserve + 15) & ~0xful);
88}
89#endif
90
1da177e4
LT
91/*
92 * Set up the sigcontext for the signal frame.
93 */
94
d1199431
CB
95static long setup_sigcontext(struct sigcontext __user *sc,
96 struct task_struct *tsk, int signr, sigset_t *set,
97 unsigned long handler, int ctx_has_vsx_region)
1da177e4
LT
98{
99 /* When CONFIG_ALTIVEC is set, we _always_ setup v_regs even if the
100 * process never used altivec yet (MSR_VEC is zero in pt_regs of
101 * the context). This is very important because we must ensure we
102 * don't lose the VRSAVE content that may have been set prior to
103 * the process doing its first vector operation
48fc7f7e 104 * Userland shall check AT_HWCAP to know whether it can rely on the
1da177e4
LT
105 * v_regs pointer or not
106 */
107#ifdef CONFIG_ALTIVEC
2476c09f 108 elf_vrreg_t __user *v_regs = sigcontext_vmx_regs(sc);
d96f234f 109 unsigned long vrsave;
1da177e4 110#endif
d1199431 111 struct pt_regs *regs = tsk->thread.regs;
0be234a4 112 unsigned long msr = regs->msr;
1da177e4 113 long err = 0;
a8a4b03a
MS
114 /* Force usr to alway see softe as 1 (interrupts enabled) */
115 unsigned long softe = 0x1;
1da177e4 116
d1199431
CB
117 BUG_ON(tsk != current);
118
1da177e4
LT
119#ifdef CONFIG_ALTIVEC
120 err |= __put_user(v_regs, &sc->v_regs);
121
122 /* save altivec registers */
d1199431
CB
123 if (tsk->thread.used_vr) {
124 flush_altivec_to_thread(tsk);
1da177e4 125 /* Copy 33 vec registers (vr0..31 and vscr) to the stack */
d1199431 126 err |= __copy_to_user(v_regs, &tsk->thread.vr_state,
de79f7b9 127 33 * sizeof(vector128));
1da177e4
LT
128 /* set MSR_VEC in the MSR value in the frame to indicate that sc->v_reg)
129 * contains valid data.
130 */
0be234a4 131 msr |= MSR_VEC;
1da177e4
LT
132 }
133 /* We always copy to/from vrsave, it's 0 if we don't have or don't
134 * use altivec.
135 */
d96f234f
AB
136 vrsave = 0;
137 if (cpu_has_feature(CPU_FTR_ALTIVEC)) {
138 vrsave = mfspr(SPRN_VRSAVE);
d1199431 139 tsk->thread.vrsave = vrsave;
d96f234f
AB
140 }
141
142 err |= __put_user(vrsave, (u32 __user *)&v_regs[33]);
1da177e4
LT
143#else /* CONFIG_ALTIVEC */
144 err |= __put_user(0, &sc->v_regs);
145#endif /* CONFIG_ALTIVEC */
d1199431 146 flush_fp_to_thread(tsk);
6a274c08 147 /* copy fpr regs and fpscr */
d1199431 148 err |= copy_fpr_to_user(&sc->fp_regs, tsk);
ec67ad82
MN
149
150 /*
151 * Clear the MSR VSX bit to indicate there is no valid state attached
152 * to this context, except in the specific case below where we set it.
153 */
154 msr &= ~MSR_VSX;
c6e6771b 155#ifdef CONFIG_VSX
ce48b210
MN
156 /*
157 * Copy VSX low doubleword to local buffer for formatting,
158 * then out to userspace. Update v_regs to point after the
159 * VMX data.
160 */
d1199431
CB
161 if (tsk->thread.used_vsr && ctx_has_vsx_region) {
162 flush_vsx_to_thread(tsk);
ce48b210 163 v_regs += ELF_NVRREG;
d1199431 164 err |= copy_vsx_to_user(v_regs, tsk);
ce48b210
MN
165 /* set MSR_VSX in the MSR value in the frame to
166 * indicate that sc->vs_reg) contains valid data.
167 */
168 msr |= MSR_VSX;
169 }
c6e6771b 170#endif /* CONFIG_VSX */
1da177e4 171 err |= __put_user(&sc->gp_regs, &sc->regs);
1bd79336 172 WARN_ON(!FULL_REGS(regs));
1da177e4 173 err |= __copy_to_user(&sc->gp_regs, regs, GP_REGS_SIZE);
0be234a4 174 err |= __put_user(msr, &sc->gp_regs[PT_MSR]);
a8a4b03a 175 err |= __put_user(softe, &sc->gp_regs[PT_SOFTE]);
1da177e4
LT
176 err |= __put_user(signr, &sc->signal);
177 err |= __put_user(handler, &sc->handler);
178 if (set != NULL)
179 err |= __put_user(set->sig[0], &sc->oldmask);
180
181 return err;
182}
183
2b0a576d
MN
184#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
185/*
186 * As above, but Transactional Memory is in use, so deliver sigcontexts
187 * containing checkpointed and transactional register states.
188 *
2b3f8e87
MN
189 * To do this, we treclaim (done before entering here) to gather both sets of
190 * registers and set up the 'normal' sigcontext registers with rolled-back
191 * register values such that a simple signal handler sees a correct
192 * checkpointed register state. If interested, a TM-aware sighandler can
193 * examine the transactional registers in the 2nd sigcontext to determine the
194 * real origin of the signal.
2b0a576d
MN
195 */
196static long setup_tm_sigcontexts(struct sigcontext __user *sc,
197 struct sigcontext __user *tm_sc,
d1199431 198 struct task_struct *tsk,
2b0a576d
MN
199 int signr, sigset_t *set, unsigned long handler)
200{
201 /* When CONFIG_ALTIVEC is set, we _always_ setup v_regs even if the
202 * process never used altivec yet (MSR_VEC is zero in pt_regs of
203 * the context). This is very important because we must ensure we
204 * don't lose the VRSAVE content that may have been set prior to
205 * the process doing its first vector operation
206 * Userland shall check AT_HWCAP to know wether it can rely on the
207 * v_regs pointer or not.
208 */
209#ifdef CONFIG_ALTIVEC
2476c09f
AK
210 elf_vrreg_t __user *v_regs = sigcontext_vmx_regs(sc);
211 elf_vrreg_t __user *tm_v_regs = sigcontext_vmx_regs(tm_sc);
2b0a576d 212#endif
d1199431 213 struct pt_regs *regs = tsk->thread.regs;
1c200e63 214 unsigned long msr = tsk->thread.regs->msr;
2b0a576d
MN
215 long err = 0;
216
d1199431
CB
217 BUG_ON(tsk != current);
218
2b0a576d
MN
219 BUG_ON(!MSR_TM_ACTIVE(regs->msr));
220
92fb8690
MN
221 WARN_ON(tm_suspend_disabled);
222
1c200e63
GR
223 /* Restore checkpointed FP, VEC, and VSX bits from ckpt_regs as
224 * it contains the correct FP, VEC, VSX state after we treclaimed
225 * the transaction and giveup_all() was called on reclaiming.
226 */
227 msr |= tsk->thread.ckpt_regs.msr & (MSR_FP | MSR_VEC | MSR_VSX);
228
d31626f7
PM
229 /* Remove TM bits from thread's MSR. The MSR in the sigcontext
230 * just indicates to userland that we were doing a transaction, but we
231 * don't want to return in transactional state. This also ensures
232 * that flush_fp_to_thread won't set TIF_RESTORE_TM again.
233 */
234 regs->msr &= ~MSR_TS_MASK;
235
2b0a576d
MN
236#ifdef CONFIG_ALTIVEC
237 err |= __put_user(v_regs, &sc->v_regs);
238 err |= __put_user(tm_v_regs, &tm_sc->v_regs);
239
240 /* save altivec registers */
d1199431 241 if (tsk->thread.used_vr) {
2b0a576d 242 /* Copy 33 vec registers (vr0..31 and vscr) to the stack */
000ec280 243 err |= __copy_to_user(v_regs, &tsk->thread.ckvr_state,
2b0a576d
MN
244 33 * sizeof(vector128));
245 /* If VEC was enabled there are transactional VRs valid too,
246 * else they're a copy of the checkpointed VRs.
247 */
248 if (msr & MSR_VEC)
249 err |= __copy_to_user(tm_v_regs,
dc310669 250 &tsk->thread.vr_state,
2b0a576d
MN
251 33 * sizeof(vector128));
252 else
253 err |= __copy_to_user(tm_v_regs,
000ec280 254 &tsk->thread.ckvr_state,
2b0a576d
MN
255 33 * sizeof(vector128));
256
257 /* set MSR_VEC in the MSR value in the frame to indicate
258 * that sc->v_reg contains valid data.
259 */
260 msr |= MSR_VEC;
261 }
262 /* We always copy to/from vrsave, it's 0 if we don't have or don't
263 * use altivec.
264 */
408a7e08 265 if (cpu_has_feature(CPU_FTR_ALTIVEC))
000ec280
CB
266 tsk->thread.ckvrsave = mfspr(SPRN_VRSAVE);
267 err |= __put_user(tsk->thread.ckvrsave, (u32 __user *)&v_regs[33]);
2b0a576d 268 if (msr & MSR_VEC)
dc310669 269 err |= __put_user(tsk->thread.vrsave,
2b0a576d
MN
270 (u32 __user *)&tm_v_regs[33]);
271 else
000ec280 272 err |= __put_user(tsk->thread.ckvrsave,
2b0a576d
MN
273 (u32 __user *)&tm_v_regs[33]);
274
275#else /* CONFIG_ALTIVEC */
276 err |= __put_user(0, &sc->v_regs);
277 err |= __put_user(0, &tm_sc->v_regs);
278#endif /* CONFIG_ALTIVEC */
279
280 /* copy fpr regs and fpscr */
000ec280 281 err |= copy_ckfpr_to_user(&sc->fp_regs, tsk);
2b0a576d 282 if (msr & MSR_FP)
d1199431 283 err |= copy_fpr_to_user(&tm_sc->fp_regs, tsk);
dc310669 284 else
000ec280 285 err |= copy_ckfpr_to_user(&tm_sc->fp_regs, tsk);
2b0a576d
MN
286
287#ifdef CONFIG_VSX
288 /*
289 * Copy VSX low doubleword to local buffer for formatting,
290 * then out to userspace. Update v_regs to point after the
291 * VMX data.
292 */
d1199431 293 if (tsk->thread.used_vsr) {
2b0a576d
MN
294 v_regs += ELF_NVRREG;
295 tm_v_regs += ELF_NVRREG;
296
000ec280 297 err |= copy_ckvsx_to_user(v_regs, tsk);
2b0a576d
MN
298
299 if (msr & MSR_VSX)
d1199431 300 err |= copy_vsx_to_user(tm_v_regs, tsk);
dc310669 301 else
000ec280 302 err |= copy_ckvsx_to_user(tm_v_regs, tsk);
2b0a576d
MN
303
304 /* set MSR_VSX in the MSR value in the frame to
305 * indicate that sc->vs_reg) contains valid data.
306 */
307 msr |= MSR_VSX;
308 }
309#endif /* CONFIG_VSX */
310
311 err |= __put_user(&sc->gp_regs, &sc->regs);
312 err |= __put_user(&tm_sc->gp_regs, &tm_sc->regs);
313 WARN_ON(!FULL_REGS(regs));
314 err |= __copy_to_user(&tm_sc->gp_regs, regs, GP_REGS_SIZE);
315 err |= __copy_to_user(&sc->gp_regs,
d1199431 316 &tsk->thread.ckpt_regs, GP_REGS_SIZE);
2b0a576d
MN
317 err |= __put_user(msr, &tm_sc->gp_regs[PT_MSR]);
318 err |= __put_user(msr, &sc->gp_regs[PT_MSR]);
319 err |= __put_user(signr, &sc->signal);
320 err |= __put_user(handler, &sc->handler);
321 if (set != NULL)
322 err |= __put_user(set->sig[0], &sc->oldmask);
323
324 return err;
325}
326#endif
327
1da177e4
LT
328/*
329 * Restore the sigcontext from the signal frame.
330 */
331
d1199431 332static long restore_sigcontext(struct task_struct *tsk, sigset_t *set, int sig,
1da177e4
LT
333 struct sigcontext __user *sc)
334{
335#ifdef CONFIG_ALTIVEC
336 elf_vrreg_t __user *v_regs;
337#endif
338 unsigned long err = 0;
339 unsigned long save_r13 = 0;
1da177e4 340 unsigned long msr;
d1199431 341 struct pt_regs *regs = tsk->thread.regs;
6a274c08
MN
342#ifdef CONFIG_VSX
343 int i;
344#endif
1da177e4 345
d1199431
CB
346 BUG_ON(tsk != current);
347
1da177e4
LT
348 /* If this is not a signal return, we preserve the TLS in r13 */
349 if (!sig)
350 save_r13 = regs->gpr[13];
351
fcbc5a97
SR
352 /* copy the GPRs */
353 err |= __copy_from_user(regs->gpr, sc->gp_regs, sizeof(regs->gpr));
354 err |= __get_user(regs->nip, &sc->gp_regs[PT_NIP]);
fab5db97
PM
355 /* get MSR separately, transfer the LE bit if doing signal return */
356 err |= __get_user(msr, &sc->gp_regs[PT_MSR]);
357 if (sig)
358 regs->msr = (regs->msr & ~MSR_LE) | (msr & MSR_LE);
fcbc5a97
SR
359 err |= __get_user(regs->orig_gpr3, &sc->gp_regs[PT_ORIG_R3]);
360 err |= __get_user(regs->ctr, &sc->gp_regs[PT_CTR]);
361 err |= __get_user(regs->link, &sc->gp_regs[PT_LNK]);
362 err |= __get_user(regs->xer, &sc->gp_regs[PT_XER]);
363 err |= __get_user(regs->ccr, &sc->gp_regs[PT_CCR]);
fab5db97 364 /* skip SOFTE */
9a81c16b 365 regs->trap = 0;
fcbc5a97
SR
366 err |= __get_user(regs->dar, &sc->gp_regs[PT_DAR]);
367 err |= __get_user(regs->dsisr, &sc->gp_regs[PT_DSISR]);
368 err |= __get_user(regs->result, &sc->gp_regs[PT_RESULT]);
1da177e4
LT
369
370 if (!sig)
371 regs->gpr[13] = save_r13;
1da177e4
LT
372 if (set != NULL)
373 err |= __get_user(set->sig[0], &sc->oldmask);
374
ae62fbb5
PM
375 /*
376 * Force reload of FP/VEC.
d1199431 377 * This has to be done before copying stuff into tsk->thread.fpr/vr
ae62fbb5
PM
378 * for the reasons explained in the previous comment.
379 */
ce48b210 380 regs->msr &= ~(MSR_FP | MSR_FE0 | MSR_FE1 | MSR_VEC | MSR_VSX);
ae62fbb5 381
1da177e4
LT
382#ifdef CONFIG_ALTIVEC
383 err |= __get_user(v_regs, &sc->v_regs);
1da177e4
LT
384 if (err)
385 return err;
96d4f267 386 if (v_regs && !access_ok(v_regs, 34 * sizeof(vector128)))
7c85d1f9 387 return -EFAULT;
1da177e4 388 /* Copy 33 vec registers (vr0..31 and vscr) from the stack */
e1c0d66f 389 if (v_regs != NULL && (msr & MSR_VEC) != 0) {
d1199431 390 err |= __copy_from_user(&tsk->thread.vr_state, v_regs,
1da177e4 391 33 * sizeof(vector128));
d1199431
CB
392 tsk->thread.used_vr = true;
393 } else if (tsk->thread.used_vr) {
394 memset(&tsk->thread.vr_state, 0, 33 * sizeof(vector128));
e1c0d66f 395 }
1da177e4 396 /* Always get VRSAVE back */
b0d436c7 397 if (v_regs != NULL)
d1199431 398 err |= __get_user(tsk->thread.vrsave, (u32 __user *)&v_regs[33]);
1da177e4 399 else
d1199431 400 tsk->thread.vrsave = 0;
408a7e08 401 if (cpu_has_feature(CPU_FTR_ALTIVEC))
d1199431 402 mtspr(SPRN_VRSAVE, tsk->thread.vrsave);
1da177e4 403#endif /* CONFIG_ALTIVEC */
c6e6771b 404 /* restore floating point */
d1199431 405 err |= copy_fpr_from_user(tsk, &sc->fp_regs);
6a274c08 406#ifdef CONFIG_VSX
ce48b210
MN
407 /*
408 * Get additional VSX data. Update v_regs to point after the
409 * VMX data. Copy VSX low doubleword from userspace to local
410 * buffer for formatting, then into the taskstruct.
411 */
412 v_regs += ELF_NVRREG;
e1c0d66f 413 if ((msr & MSR_VSX) != 0) {
d1199431
CB
414 err |= copy_vsx_from_user(tsk, v_regs);
415 tsk->thread.used_vsr = true;
416 } else {
6a274c08 417 for (i = 0; i < 32 ; i++)
d1199431
CB
418 tsk->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
419 }
c6e6771b 420#endif
1da177e4
LT
421 return err;
422}
423
2b0a576d
MN
424#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
425/*
426 * Restore the two sigcontexts from the frame of a transactional processes.
427 */
428
d1199431 429static long restore_tm_sigcontexts(struct task_struct *tsk,
2b0a576d
MN
430 struct sigcontext __user *sc,
431 struct sigcontext __user *tm_sc)
432{
433#ifdef CONFIG_ALTIVEC
434 elf_vrreg_t __user *v_regs, *tm_v_regs;
435#endif
436 unsigned long err = 0;
437 unsigned long msr;
d1199431 438 struct pt_regs *regs = tsk->thread.regs;
2b0a576d
MN
439#ifdef CONFIG_VSX
440 int i;
441#endif
d1199431
CB
442
443 BUG_ON(tsk != current);
444
92fb8690
MN
445 if (tm_suspend_disabled)
446 return -EINVAL;
447
2b0a576d
MN
448 /* copy the GPRs */
449 err |= __copy_from_user(regs->gpr, tm_sc->gp_regs, sizeof(regs->gpr));
d1199431 450 err |= __copy_from_user(&tsk->thread.ckpt_regs, sc->gp_regs,
2b0a576d
MN
451 sizeof(regs->gpr));
452
453 /*
454 * TFHAR is restored from the checkpointed 'wound-back' ucontext's NIP.
455 * TEXASR was set by the signal delivery reclaim, as was TFIAR.
456 * Users doing anything abhorrent like thread-switching w/ signals for
457 * TM-Suspended code will have to back TEXASR/TFIAR up themselves.
458 * For the case of getting a signal and simply returning from it,
459 * we don't need to re-copy them here.
460 */
461 err |= __get_user(regs->nip, &tm_sc->gp_regs[PT_NIP]);
d1199431 462 err |= __get_user(tsk->thread.tm_tfhar, &sc->gp_regs[PT_NIP]);
2b0a576d
MN
463
464 /* get MSR separately, transfer the LE bit if doing signal return */
465 err |= __get_user(msr, &sc->gp_regs[PT_MSR]);
d2b9d2a5
MN
466 /* Don't allow reserved mode. */
467 if (MSR_TM_RESV(msr))
468 return -EINVAL;
469
87b4e539 470 /* pull in MSR LE from user context */
2b0a576d
MN
471 regs->msr = (regs->msr & ~MSR_LE) | (msr & MSR_LE);
472
473 /* The following non-GPR non-FPR non-VR state is also checkpointed: */
474 err |= __get_user(regs->ctr, &tm_sc->gp_regs[PT_CTR]);
475 err |= __get_user(regs->link, &tm_sc->gp_regs[PT_LNK]);
476 err |= __get_user(regs->xer, &tm_sc->gp_regs[PT_XER]);
477 err |= __get_user(regs->ccr, &tm_sc->gp_regs[PT_CCR]);
d1199431 478 err |= __get_user(tsk->thread.ckpt_regs.ctr,
2b0a576d 479 &sc->gp_regs[PT_CTR]);
d1199431 480 err |= __get_user(tsk->thread.ckpt_regs.link,
2b0a576d 481 &sc->gp_regs[PT_LNK]);
d1199431 482 err |= __get_user(tsk->thread.ckpt_regs.xer,
2b0a576d 483 &sc->gp_regs[PT_XER]);
d1199431 484 err |= __get_user(tsk->thread.ckpt_regs.ccr,
2b0a576d
MN
485 &sc->gp_regs[PT_CCR]);
486
487 /* These regs are not checkpointed; they can go in 'regs'. */
488 err |= __get_user(regs->trap, &sc->gp_regs[PT_TRAP]);
489 err |= __get_user(regs->dar, &sc->gp_regs[PT_DAR]);
490 err |= __get_user(regs->dsisr, &sc->gp_regs[PT_DSISR]);
491 err |= __get_user(regs->result, &sc->gp_regs[PT_RESULT]);
492
2b0a576d
MN
493 /*
494 * Force reload of FP/VEC.
d1199431 495 * This has to be done before copying stuff into tsk->thread.fpr/vr
2b0a576d
MN
496 * for the reasons explained in the previous comment.
497 */
498 regs->msr &= ~(MSR_FP | MSR_FE0 | MSR_FE1 | MSR_VEC | MSR_VSX);
499
500#ifdef CONFIG_ALTIVEC
501 err |= __get_user(v_regs, &sc->v_regs);
502 err |= __get_user(tm_v_regs, &tm_sc->v_regs);
503 if (err)
504 return err;
96d4f267 505 if (v_regs && !access_ok(v_regs, 34 * sizeof(vector128)))
2b0a576d 506 return -EFAULT;
96d4f267 507 if (tm_v_regs && !access_ok(tm_v_regs, 34 * sizeof(vector128)))
2b0a576d
MN
508 return -EFAULT;
509 /* Copy 33 vec registers (vr0..31 and vscr) from the stack */
b0d436c7 510 if (v_regs != NULL && tm_v_regs != NULL && (msr & MSR_VEC) != 0) {
000ec280 511 err |= __copy_from_user(&tsk->thread.ckvr_state, v_regs,
2b0a576d 512 33 * sizeof(vector128));
dc310669 513 err |= __copy_from_user(&tsk->thread.vr_state, tm_v_regs,
2b0a576d 514 33 * sizeof(vector128));
e1c0d66f 515 current->thread.used_vr = true;
2b0a576d 516 }
d1199431
CB
517 else if (tsk->thread.used_vr) {
518 memset(&tsk->thread.vr_state, 0, 33 * sizeof(vector128));
000ec280 519 memset(&tsk->thread.ckvr_state, 0, 33 * sizeof(vector128));
2b0a576d
MN
520 }
521 /* Always get VRSAVE back */
b0d436c7 522 if (v_regs != NULL && tm_v_regs != NULL) {
000ec280 523 err |= __get_user(tsk->thread.ckvrsave,
dc310669
CB
524 (u32 __user *)&v_regs[33]);
525 err |= __get_user(tsk->thread.vrsave,
2b0a576d
MN
526 (u32 __user *)&tm_v_regs[33]);
527 }
528 else {
d1199431 529 tsk->thread.vrsave = 0;
000ec280 530 tsk->thread.ckvrsave = 0;
2b0a576d 531 }
408a7e08 532 if (cpu_has_feature(CPU_FTR_ALTIVEC))
d1199431 533 mtspr(SPRN_VRSAVE, tsk->thread.vrsave);
2b0a576d
MN
534#endif /* CONFIG_ALTIVEC */
535 /* restore floating point */
dc310669 536 err |= copy_fpr_from_user(tsk, &tm_sc->fp_regs);
000ec280 537 err |= copy_ckfpr_from_user(tsk, &sc->fp_regs);
2b0a576d
MN
538#ifdef CONFIG_VSX
539 /*
540 * Get additional VSX data. Update v_regs to point after the
541 * VMX data. Copy VSX low doubleword from userspace to local
542 * buffer for formatting, then into the taskstruct.
543 */
544 if (v_regs && ((msr & MSR_VSX) != 0)) {
545 v_regs += ELF_NVRREG;
546 tm_v_regs += ELF_NVRREG;
dc310669 547 err |= copy_vsx_from_user(tsk, tm_v_regs);
000ec280 548 err |= copy_ckvsx_from_user(tsk, v_regs);
d1199431 549 tsk->thread.used_vsr = true;
2b0a576d
MN
550 } else {
551 for (i = 0; i < 32 ; i++) {
d1199431 552 tsk->thread.fp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
000ec280 553 tsk->thread.ckfp_state.fpr[i][TS_VSRLOWOFFSET] = 0;
2b0a576d
MN
554 }
555 }
556#endif
557 tm_enable();
e6b8fd02 558 /* Make sure the transaction is marked as failed */
d1199431 559 tsk->thread.tm_texasr |= TEXASR_FS;
e1c3743e
BL
560
561 /*
562 * Disabling preemption, since it is unsafe to be preempted
563 * with MSR[TS] set without recheckpointing.
564 */
565 preempt_disable();
566
567 /* pull in MSR TS bits from user context */
568 regs->msr = (regs->msr & ~MSR_TS_MASK) | (msr & MSR_TS_MASK);
569
570 /*
571 * Ensure that TM is enabled in regs->msr before we leave the signal
572 * handler. It could be the case that (a) user disabled the TM bit
573 * through the manipulation of the MSR bits in uc_mcontext or (b) the
574 * TM bit was disabled because a sufficient number of context switches
575 * happened whilst in the signal handler and load_tm overflowed,
576 * disabling the TM bit. In either case we can end up with an illegal
577 * TM state leading to a TM Bad Thing when we return to userspace.
578 *
579 * CAUTION:
580 * After regs->MSR[TS] being updated, make sure that get_user(),
581 * put_user() or similar functions are *not* called. These
582 * functions can generate page faults which will cause the process
583 * to be de-scheduled with MSR[TS] set but without calling
584 * tm_recheckpoint(). This can cause a bug.
585 */
586 regs->msr |= MSR_TM;
587
2b0a576d 588 /* This loads the checkpointed FP/VEC state, if used */
eb5c3f1c 589 tm_recheckpoint(&tsk->thread);
2b0a576d 590
dc310669 591 msr_check_and_set(msr & (MSR_FP | MSR_VEC));
2b0a576d 592 if (msr & MSR_FP) {
dc310669 593 load_fp_state(&tsk->thread.fp_state);
d1199431 594 regs->msr |= (MSR_FP | tsk->thread.fpexc_mode);
2b0a576d
MN
595 }
596 if (msr & MSR_VEC) {
dc310669 597 load_vr_state(&tsk->thread.vr_state);
2b0a576d
MN
598 regs->msr |= MSR_VEC;
599 }
600
e1c3743e
BL
601 preempt_enable();
602
2b0a576d
MN
603 return err;
604}
605#endif
606
1da177e4
LT
607/*
608 * Setup the trampoline code on the stack
609 */
610static long setup_trampoline(unsigned int syscall, unsigned int __user *tramp)
611{
612 int i;
613 long err = 0;
614
615 /* addi r1, r1, __SIGNAL_FRAMESIZE # Pop the dummy stackframe */
d16952a6
CL
616 err |= __put_user(PPC_INST_ADDI | __PPC_RT(R1) | __PPC_RA(R1) |
617 (__SIGNAL_FRAMESIZE & 0xffff), &tramp[0]);
1da177e4 618 /* li r0, __NR_[rt_]sigreturn| */
d16952a6 619 err |= __put_user(PPC_INST_ADDI | (syscall & 0xffff), &tramp[1]);
1da177e4 620 /* sc */
d16952a6 621 err |= __put_user(PPC_INST_SC, &tramp[2]);
1da177e4
LT
622
623 /* Minimal traceback info */
624 for (i=TRAMP_TRACEBACK; i < TRAMP_SIZE ;i++)
625 err |= __put_user(0, &tramp[i]);
626
627 if (!err)
628 flush_icache_range((unsigned long) &tramp[0],
629 (unsigned long) &tramp[TRAMP_SIZE]);
630
631 return err;
632}
633
c1cb299e
MN
634/*
635 * Userspace code may pass a ucontext which doesn't include VSX added
636 * at the end. We need to check for this case.
637 */
638#define UCONTEXTSIZEWITHOUTVSX \
639 (sizeof(struct ucontext) - 32*sizeof(long))
640
1da177e4
LT
641/*
642 * Handle {get,set,swap}_context operations
643 */
f3675644
AV
644SYSCALL_DEFINE3(swapcontext, struct ucontext __user *, old_ctx,
645 struct ucontext __user *, new_ctx, long, ctx_size)
1da177e4
LT
646{
647 unsigned char tmp;
648 sigset_t set;
c1cb299e 649 unsigned long new_msr = 0;
16c29d18 650 int ctx_has_vsx_region = 0;
1da177e4 651
c1cb299e 652 if (new_ctx &&
16c29d18 653 get_user(new_msr, &new_ctx->uc_mcontext.gp_regs[PT_MSR]))
c1cb299e
MN
654 return -EFAULT;
655 /*
656 * Check that the context is not smaller than the original
657 * size (with VMX but without VSX)
1da177e4 658 */
c1cb299e 659 if (ctx_size < UCONTEXTSIZEWITHOUTVSX)
1da177e4 660 return -EINVAL;
c1cb299e
MN
661 /*
662 * If the new context state sets the MSR VSX bits but
663 * it doesn't provide VSX state.
664 */
665 if ((ctx_size < sizeof(struct ucontext)) &&
666 (new_msr & MSR_VSX))
667 return -EINVAL;
16c29d18
MN
668 /* Does the context have enough room to store VSX data? */
669 if (ctx_size >= sizeof(struct ucontext))
670 ctx_has_vsx_region = 1;
671
1da177e4 672 if (old_ctx != NULL) {
96d4f267 673 if (!access_ok(old_ctx, ctx_size)
d1199431 674 || setup_sigcontext(&old_ctx->uc_mcontext, current, 0, NULL, 0,
16c29d18 675 ctx_has_vsx_region)
1da177e4
LT
676 || __copy_to_user(&old_ctx->uc_sigmask,
677 &current->blocked, sizeof(sigset_t)))
678 return -EFAULT;
679 }
680 if (new_ctx == NULL)
681 return 0;
96d4f267 682 if (!access_ok(new_ctx, ctx_size)
1da177e4 683 || __get_user(tmp, (u8 __user *) new_ctx)
16c29d18 684 || __get_user(tmp, (u8 __user *) new_ctx + ctx_size - 1))
1da177e4
LT
685 return -EFAULT;
686
687 /*
688 * If we get a fault copying the context into the kernel's
689 * image of the user's registers, we can't just return -EFAULT
690 * because the user's registers will be corrupted. For instance
691 * the NIP value may have been updated but not some of the
692 * other registers. Given that we have done the access_ok
693 * and successfully read the first and last bytes of the region
694 * above, this should only happen in an out-of-memory situation
695 * or if another thread unmaps the region containing the context.
696 * We kill the task with a SIGSEGV in this situation.
697 */
698
699 if (__copy_from_user(&set, &new_ctx->uc_sigmask, sizeof(set)))
700 do_exit(SIGSEGV);
17440f17 701 set_current_blocked(&set);
d1199431 702 if (restore_sigcontext(current, NULL, 0, &new_ctx->uc_mcontext))
1da177e4
LT
703 do_exit(SIGSEGV);
704
705 /* This returns like rt_sigreturn */
401d1f02 706 set_thread_flag(TIF_RESTOREALL);
1da177e4
LT
707 return 0;
708}
709
710
711/*
712 * Do a signal return; undo the signal stack.
713 */
714
f3675644 715SYSCALL_DEFINE0(rt_sigreturn)
1da177e4 716{
f3675644 717 struct pt_regs *regs = current_pt_regs();
1da177e4
LT
718 struct ucontext __user *uc = (struct ucontext __user *)regs->gpr[1];
719 sigset_t set;
2b0a576d
MN
720#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
721 unsigned long msr;
722#endif
1da177e4
LT
723
724 /* Always make any pending restarted system calls return -EINTR */
f56141e3 725 current->restart_block.fn = do_no_restart_syscall;
1da177e4 726
96d4f267 727 if (!access_ok(uc, sizeof(*uc)))
1da177e4
LT
728 goto badframe;
729
730 if (__copy_from_user(&set, &uc->uc_sigmask, sizeof(set)))
731 goto badframe;
17440f17 732 set_current_blocked(&set);
78a3e888 733
2b0a576d 734#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
78a3e888
CB
735 /*
736 * If there is a transactional state then throw it away.
737 * The purpose of a sigreturn is to destroy all traces of the
738 * signal frame, this includes any transactional state created
739 * within in. We only check for suspended as we can never be
740 * active in the kernel, we are active, there is nothing better to
741 * do than go ahead and Bad Thing later.
742 * The cause is not important as there will never be a
743 * recheckpoint so it's not user visible.
744 */
745 if (MSR_TM_SUSPENDED(mfmsr()))
746 tm_reclaim_current(0);
747
2b0a576d
MN
748 if (__get_user(msr, &uc->uc_mcontext.gp_regs[PT_MSR]))
749 goto badframe;
87b4e539 750 if (MSR_TM_ACTIVE(msr)) {
2b0a576d
MN
751 /* We recheckpoint on return. */
752 struct ucontext __user *uc_transact;
753 if (__get_user(uc_transact, &uc->uc_link))
754 goto badframe;
d1199431 755 if (restore_tm_sigcontexts(current, &uc->uc_mcontext,
2b0a576d
MN
756 &uc_transact->uc_mcontext))
757 goto badframe;
897bc3df 758 } else
2b0a576d 759#endif
897bc3df 760 {
6f5b9f01 761 /*
897bc3df
BL
762 * Fall through, for non-TM restore
763 *
6f5b9f01
BL
764 * Unset MSR[TS] on the thread regs since MSR from user
765 * context does not have MSR active, and recheckpoint was
766 * not called since restore_tm_sigcontexts() was not called
767 * also.
768 *
769 * If not unsetting it, the code can RFID to userspace with
770 * MSR[TS] set, but without CPU in the proper state,
771 * causing a TM bad thing.
772 */
773 current->thread.regs->msr &= ~MSR_TS_MASK;
774 if (restore_sigcontext(current, NULL, 1, &uc->uc_mcontext))
775 goto badframe;
776 }
1da177e4 777
7cce2465
AV
778 if (restore_altstack(&uc->uc_stack))
779 goto badframe;
1da177e4 780
401d1f02
DW
781 set_thread_flag(TIF_RESTOREALL);
782 return 0;
1da177e4
LT
783
784badframe:
76462232
CD
785 if (show_unhandled_signals)
786 printk_ratelimited(regs->msr & MSR_64BIT ? fmt64 : fmt32,
787 current->comm, current->pid, "rt_sigreturn",
788 (long)uc, regs->nip, regs->link);
d0c3d534 789
1da177e4
LT
790 force_sig(SIGSEGV, current);
791 return 0;
792}
793
d1199431
CB
794int handle_rt_signal64(struct ksignal *ksig, sigset_t *set,
795 struct task_struct *tsk)
1da177e4 796{
1da177e4
LT
797 struct rt_sigframe __user *frame;
798 unsigned long newsp = 0;
799 long err = 0;
d1199431
CB
800 struct pt_regs *regs = tsk->thread.regs;
801
802 BUG_ON(tsk != current);
1da177e4 803
d1199431 804 frame = get_sigframe(ksig, get_tm_stackpointer(tsk), sizeof(*frame), 0);
a3f61dc0 805 if (unlikely(frame == NULL))
1da177e4
LT
806 goto badframe;
807
808 err |= __put_user(&frame->info, &frame->pinfo);
809 err |= __put_user(&frame->uc, &frame->puc);
129b69df 810 err |= copy_siginfo_to_user(&frame->info, &ksig->info);
1da177e4
LT
811 if (err)
812 goto badframe;
813
814 /* Create the ucontext. */
815 err |= __put_user(0, &frame->uc.uc_flags);
7cce2465 816 err |= __save_altstack(&frame->uc.uc_stack, regs->gpr[1]);
2b0a576d
MN
817#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
818 if (MSR_TM_ACTIVE(regs->msr)) {
819 /* The ucontext_t passed to userland points to the second
820 * ucontext_t (for transactional state) with its uc_link ptr.
821 */
822 err |= __put_user(&frame->uc_transact, &frame->uc.uc_link);
823 err |= setup_tm_sigcontexts(&frame->uc.uc_mcontext,
824 &frame->uc_transact.uc_mcontext,
d1199431 825 tsk, ksig->sig, NULL,
129b69df 826 (unsigned long)ksig->ka.sa.sa_handler);
2b0a576d
MN
827 } else
828#endif
829 {
830 err |= __put_user(0, &frame->uc.uc_link);
d1199431 831 err |= setup_sigcontext(&frame->uc.uc_mcontext, tsk, ksig->sig,
129b69df 832 NULL, (unsigned long)ksig->ka.sa.sa_handler,
2b0a576d
MN
833 1);
834 }
1da177e4
LT
835 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
836 if (err)
837 goto badframe;
838
cc657f53 839 /* Make sure signal handler doesn't get spurious FP exceptions */
d1199431 840 tsk->thread.fp_state.fpscr = 0;
cc657f53 841
1da177e4 842 /* Set up to return from userspace. */
d1199431
CB
843 if (vdso64_rt_sigtramp && tsk->mm->context.vdso_base) {
844 regs->link = tsk->mm->context.vdso_base + vdso64_rt_sigtramp;
1da177e4
LT
845 } else {
846 err |= setup_trampoline(__NR_rt_sigreturn, &frame->tramp[0]);
847 if (err)
848 goto badframe;
849 regs->link = (unsigned long) &frame->tramp[0];
850 }
1da177e4
LT
851
852 /* Allocate a dummy caller frame for the signal handler. */
a3f61dc0 853 newsp = ((unsigned long)frame) - __SIGNAL_FRAMESIZE;
1da177e4
LT
854 err |= put_user(regs->gpr[1], (unsigned long __user *)newsp);
855
856 /* Set up "regs" so we "return" to the signal handler. */
d606b92a 857 if (is_elf2_task()) {
129b69df 858 regs->nip = (unsigned long) ksig->ka.sa.sa_handler;
d606b92a
RR
859 regs->gpr[12] = regs->nip;
860 } else {
861 /* Handler is *really* a pointer to the function descriptor for
862 * the signal routine. The first entry in the function
863 * descriptor is the entry address of signal and the second
864 * entry is the TOC value we need to use.
865 */
866 func_descr_t __user *funct_desc_ptr =
129b69df 867 (func_descr_t __user *) ksig->ka.sa.sa_handler;
d606b92a
RR
868
869 err |= get_user(regs->nip, &funct_desc_ptr->entry);
870 err |= get_user(regs->gpr[2], &funct_desc_ptr->toc);
871 }
872
e871c6bb 873 /* enter the signal handler in native-endian mode */
fab5db97 874 regs->msr &= ~MSR_LE;
e871c6bb 875 regs->msr |= (MSR_KERNEL & MSR_LE);
1da177e4 876 regs->gpr[1] = newsp;
129b69df 877 regs->gpr[3] = ksig->sig;
1da177e4 878 regs->result = 0;
129b69df 879 if (ksig->ka.sa.sa_flags & SA_SIGINFO) {
1da177e4
LT
880 err |= get_user(regs->gpr[4], (unsigned long __user *)&frame->pinfo);
881 err |= get_user(regs->gpr[5], (unsigned long __user *)&frame->puc);
882 regs->gpr[6] = (unsigned long) frame;
883 } else {
884 regs->gpr[4] = (unsigned long)&frame->uc.uc_mcontext;
885 }
886 if (err)
887 goto badframe;
888
129b69df 889 return 0;
1da177e4
LT
890
891badframe:
76462232
CD
892 if (show_unhandled_signals)
893 printk_ratelimited(regs->msr & MSR_64BIT ? fmt64 : fmt32,
d1199431 894 tsk->comm, tsk->pid, "setup_rt_frame",
76462232 895 (long)frame, regs->nip, regs->link);
d0c3d534 896
129b69df 897 return 1;
1da177e4 898}