Commit | Line | Data |
---|---|---|
ac689eb7 JB |
1 | /* |
2 | * OpenRISC signal.c | |
3 | * | |
4 | * Linux architectural port borrowing liberally from similar works of | |
5 | * others. All original copyrights apply as per the original source | |
6 | * declaration. | |
7 | * | |
8 | * Modifications for the OpenRISC architecture: | |
9 | * Copyright (C) 2003 Matjaz Breskvar <phoenix@bsemi.com> | |
10 | * Copyright (C) 2010-2011 Jonas Bonn <jonas@southpole.se> | |
11 | * | |
12 | * This program is free software; you can redistribute it and/or | |
13 | * modify it under the terms of the GNU General Public License | |
14 | * as published by the Free Software Foundation; either version | |
15 | * 2 of the License, or (at your option) any later version. | |
16 | */ | |
17 | ||
18 | #include <linux/sched.h> | |
19 | #include <linux/mm.h> | |
20 | #include <linux/smp.h> | |
21 | #include <linux/kernel.h> | |
22 | #include <linux/signal.h> | |
23 | #include <linux/errno.h> | |
24 | #include <linux/wait.h> | |
25 | #include <linux/ptrace.h> | |
26 | #include <linux/unistd.h> | |
27 | #include <linux/stddef.h> | |
28 | #include <linux/tracehook.h> | |
29 | ||
30 | #include <asm/processor.h> | |
10f67dbf | 31 | #include <asm/syscall.h> |
ac689eb7 JB |
32 | #include <asm/ucontext.h> |
33 | #include <asm/uaccess.h> | |
34 | ||
35 | #define DEBUG_SIG 0 | |
36 | ||
ac689eb7 | 37 | struct rt_sigframe { |
ac689eb7 JB |
38 | struct siginfo info; |
39 | struct ucontext uc; | |
40 | unsigned char retcode[16]; /* trampoline code */ | |
41 | }; | |
42 | ||
10f67dbf JB |
43 | static int restore_sigcontext(struct pt_regs *regs, |
44 | struct sigcontext __user *sc) | |
ac689eb7 | 45 | { |
10f67dbf | 46 | int err = 0; |
ac689eb7 | 47 | |
10f67dbf | 48 | /* Always make any pending restarted system calls return -EINTR */ |
ac689eb7 JB |
49 | current_thread_info()->restart_block.fn = do_no_restart_syscall; |
50 | ||
d7cb6667 JB |
51 | /* |
52 | * Restore the regs from &sc->regs. | |
ac689eb7 JB |
53 | * (sc is already checked for VERIFY_READ since the sigframe was |
54 | * checked in sys_sigreturn previously) | |
55 | */ | |
10f67dbf JB |
56 | err |= __copy_from_user(regs, sc->regs.gpr, 32 * sizeof(unsigned long)); |
57 | err |= __copy_from_user(®s->pc, &sc->regs.pc, sizeof(unsigned long)); | |
58 | err |= __copy_from_user(®s->sr, &sc->regs.sr, sizeof(unsigned long)); | |
ac689eb7 JB |
59 | |
60 | /* make sure the SM-bit is cleared so user-mode cannot fool us */ | |
61 | regs->sr &= ~SPR_SR_SM; | |
62 | ||
10f67dbf JB |
63 | regs->orig_gpr11 = -1; /* Avoid syscall restart checks */ |
64 | ||
ac689eb7 JB |
65 | /* TODO: the other ports use regs->orig_XX to disable syscall checks |
66 | * after this completes, but we don't use that mechanism. maybe we can | |
67 | * use it now ? | |
68 | */ | |
69 | ||
70 | return err; | |
ac689eb7 JB |
71 | } |
72 | ||
73 | asmlinkage long _sys_rt_sigreturn(struct pt_regs *regs) | |
74 | { | |
75 | struct rt_sigframe *frame = (struct rt_sigframe __user *)regs->sp; | |
76 | sigset_t set; | |
ac689eb7 JB |
77 | |
78 | /* | |
79 | * Since we stacked the signal on a dword boundary, | |
80 | * then frame should be dword aligned here. If it's | |
81 | * not, then the user is trying to mess with us. | |
82 | */ | |
83 | if (((long)frame) & 3) | |
84 | goto badframe; | |
85 | ||
86 | if (!access_ok(VERIFY_READ, frame, sizeof(*frame))) | |
87 | goto badframe; | |
88 | if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set))) | |
89 | goto badframe; | |
90 | ||
d8d4b20d | 91 | set_current_blocked(&set); |
ac689eb7 JB |
92 | |
93 | if (restore_sigcontext(regs, &frame->uc.uc_mcontext)) | |
94 | goto badframe; | |
95 | ||
faec5a96 | 96 | if (restore_altstack(&frame->uc.uc_stack)) |
d26654e5 | 97 | goto badframe; |
ac689eb7 JB |
98 | |
99 | return regs->gpr[11]; | |
100 | ||
101 | badframe: | |
102 | force_sig(SIGSEGV, current); | |
103 | return 0; | |
104 | } | |
105 | ||
106 | /* | |
107 | * Set up a signal frame. | |
108 | */ | |
109 | ||
10f67dbf | 110 | static int setup_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc) |
ac689eb7 JB |
111 | { |
112 | int err = 0; | |
ac689eb7 | 113 | |
d7cb6667 | 114 | /* copy the regs */ |
10f67dbf JB |
115 | /* There should be no need to save callee-saved registers here... |
116 | * ...but we save them anyway. Revisit this | |
117 | */ | |
d7cb6667 JB |
118 | err |= __copy_to_user(sc->regs.gpr, regs, 32 * sizeof(unsigned long)); |
119 | err |= __copy_to_user(&sc->regs.pc, ®s->pc, sizeof(unsigned long)); | |
120 | err |= __copy_to_user(&sc->regs.sr, ®s->sr, sizeof(unsigned long)); | |
ac689eb7 | 121 | |
ac689eb7 JB |
122 | return err; |
123 | } | |
124 | ||
125 | static inline unsigned long align_sigframe(unsigned long sp) | |
126 | { | |
127 | return sp & ~3UL; | |
128 | } | |
129 | ||
130 | /* | |
131 | * Work out where the signal frame should go. It's either on the user stack | |
132 | * or the alternate stack. | |
133 | */ | |
134 | ||
135 | static inline void __user *get_sigframe(struct k_sigaction *ka, | |
136 | struct pt_regs *regs, size_t frame_size) | |
137 | { | |
138 | unsigned long sp = regs->sp; | |
139 | int onsigstack = on_sig_stack(sp); | |
140 | ||
141 | /* redzone */ | |
142 | sp -= STACK_FRAME_OVERHEAD; | |
143 | ||
144 | /* This is the X/Open sanctioned signal stack switching. */ | |
145 | if ((ka->sa.sa_flags & SA_ONSTACK) && !onsigstack) { | |
146 | if (current->sas_ss_size) | |
147 | sp = current->sas_ss_sp + current->sas_ss_size; | |
148 | } | |
149 | ||
150 | sp = align_sigframe(sp - frame_size); | |
151 | ||
152 | /* | |
153 | * If we are on the alternate signal stack and would overflow it, don't. | |
154 | * Return an always-bogus address instead so we will die with SIGSEGV. | |
155 | */ | |
156 | if (onsigstack && !likely(on_sig_stack(sp))) | |
157 | return (void __user *)-1L; | |
158 | ||
159 | return (void __user *)sp; | |
160 | } | |
161 | ||
162 | /* grab and setup a signal frame. | |
163 | * | |
164 | * basically we stack a lot of state info, and arrange for the | |
165 | * user-mode program to return to the kernel using either a | |
166 | * trampoline which performs the syscall sigreturn, or a provided | |
167 | * user-mode trampoline. | |
168 | */ | |
548dafe8 RW |
169 | static int setup_rt_frame(struct ksignal *ksig, sigset_t *set, |
170 | struct pt_regs *regs) | |
ac689eb7 JB |
171 | { |
172 | struct rt_sigframe *frame; | |
173 | unsigned long return_ip; | |
174 | int err = 0; | |
175 | ||
548dafe8 RW |
176 | frame = get_sigframe(&ksig->ka, regs, sizeof(*frame)); |
177 | ||
ac689eb7 | 178 | if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame))) |
548dafe8 | 179 | return -EFAULT; |
ac689eb7 | 180 | |
10f67dbf | 181 | /* Create siginfo. */ |
548dafe8 RW |
182 | if (ksig->ka.sa.sa_flags & SA_SIGINFO) |
183 | err |= copy_siginfo_to_user(&frame->info, &ksig->info); | |
ac689eb7 | 184 | |
10f67dbf | 185 | /* Create the ucontext. */ |
ac689eb7 JB |
186 | err |= __put_user(0, &frame->uc.uc_flags); |
187 | err |= __put_user(NULL, &frame->uc.uc_link); | |
faec5a96 | 188 | err |= __save_altstack(&frame->uc.uc_stack, regs->sp); |
10f67dbf | 189 | err |= setup_sigcontext(regs, &frame->uc.uc_mcontext); |
ac689eb7 JB |
190 | |
191 | err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set)); | |
192 | ||
193 | if (err) | |
548dafe8 | 194 | return -EFAULT; |
ac689eb7 JB |
195 | |
196 | /* trampoline - the desired return ip is the retcode itself */ | |
197 | return_ip = (unsigned long)&frame->retcode; | |
10f67dbf JB |
198 | /* This is: |
199 | l.ori r11,r0,__NR_sigreturn | |
200 | l.sys 1 | |
201 | */ | |
202 | err |= __put_user(0xa960, (short *)(frame->retcode + 0)); | |
203 | err |= __put_user(__NR_rt_sigreturn, (short *)(frame->retcode + 2)); | |
ac689eb7 JB |
204 | err |= __put_user(0x20000001, (unsigned long *)(frame->retcode + 4)); |
205 | err |= __put_user(0x15000000, (unsigned long *)(frame->retcode + 8)); | |
206 | ||
207 | if (err) | |
548dafe8 | 208 | return -EFAULT; |
ac689eb7 JB |
209 | |
210 | /* TODO what is the current->exec_domain stuff and invmap ? */ | |
211 | ||
212 | /* Set up registers for signal handler */ | |
548dafe8 | 213 | regs->pc = (unsigned long)ksig->ka.sa.sa_handler; /* what we enter NOW */ |
ac689eb7 | 214 | regs->gpr[9] = (unsigned long)return_ip; /* what we enter LATER */ |
548dafe8 | 215 | regs->gpr[3] = (unsigned long)ksig->sig; /* arg 1: signo */ |
ac689eb7 JB |
216 | regs->gpr[4] = (unsigned long)&frame->info; /* arg 2: (siginfo_t*) */ |
217 | regs->gpr[5] = (unsigned long)&frame->uc; /* arg 3: ucontext */ | |
218 | ||
219 | /* actually move the usp to reflect the stacked frame */ | |
220 | regs->sp = (unsigned long)frame; | |
221 | ||
e933c70d | 222 | return 0; |
ac689eb7 JB |
223 | } |
224 | ||
39974d08 | 225 | static inline void |
548dafe8 | 226 | handle_signal(struct ksignal *ksig, struct pt_regs *regs) |
ac689eb7 | 227 | { |
e933c70d MF |
228 | int ret; |
229 | ||
548dafe8 | 230 | ret = setup_rt_frame(ksig, sigmask_to_save(), regs); |
ac689eb7 | 231 | |
548dafe8 | 232 | signal_setup_done(ret, ksig, test_thread_flag(TIF_SINGLESTEP)); |
ac689eb7 JB |
233 | } |
234 | ||
235 | /* | |
236 | * Note that 'init' is a special process: it doesn't get signals it doesn't | |
237 | * want to handle. Thus you cannot kill init even with a SIGKILL even by | |
238 | * mistake. | |
239 | * | |
240 | * Also note that the regs structure given here as an argument, is the latest | |
241 | * pushed pt_regs. It may or may not be the same as the first pushed registers | |
242 | * when the initial usermode->kernelmode transition took place. Therefore | |
243 | * we can use user_mode(regs) to see if we came directly from kernel or user | |
244 | * mode below. | |
245 | */ | |
246 | ||
10f67dbf | 247 | int do_signal(struct pt_regs *regs, int syscall) |
ac689eb7 | 248 | { |
548dafe8 | 249 | struct ksignal ksig; |
10f67dbf JB |
250 | unsigned long continue_addr = 0; |
251 | unsigned long restart_addr = 0; | |
252 | unsigned long retval = 0; | |
253 | int restart = 0; | |
254 | ||
255 | if (syscall) { | |
256 | continue_addr = regs->pc; | |
257 | restart_addr = continue_addr - 4; | |
258 | retval = regs->gpr[11]; | |
259 | ||
260 | /* | |
261 | * Setup syscall restart here so that a debugger will | |
262 | * see the already changed PC. | |
263 | */ | |
264 | switch (retval) { | |
ac689eb7 | 265 | case -ERESTART_RESTARTBLOCK: |
10f67dbf JB |
266 | restart = -2; |
267 | /* Fall through */ | |
ac689eb7 | 268 | case -ERESTARTNOHAND: |
ac689eb7 | 269 | case -ERESTARTSYS: |
ac689eb7 | 270 | case -ERESTARTNOINTR: |
10f67dbf JB |
271 | restart++; |
272 | regs->gpr[11] = regs->orig_gpr11; | |
273 | regs->pc = restart_addr; | |
ac689eb7 JB |
274 | break; |
275 | } | |
10f67dbf | 276 | } |
ac689eb7 | 277 | |
10f67dbf | 278 | /* |
548dafe8 RW |
279 | * Get the signal to deliver. During the call to get_signal the |
280 | * debugger may change all our registers so we may need to revert | |
281 | * the decision to restart the syscall; specifically, if the PC is | |
282 | * changed, don't restart the syscall. | |
10f67dbf | 283 | */ |
548dafe8 | 284 | if (get_signal(&ksig)) { |
10f67dbf JB |
285 | if (unlikely(restart) && regs->pc == restart_addr) { |
286 | if (retval == -ERESTARTNOHAND || | |
287 | retval == -ERESTART_RESTARTBLOCK | |
288 | || (retval == -ERESTARTSYS | |
548dafe8 | 289 | && !(ksig.ka.sa.sa_flags & SA_RESTART))) { |
10f67dbf JB |
290 | /* No automatic restart */ |
291 | regs->gpr[11] = -EINTR; | |
292 | regs->pc = continue_addr; | |
293 | } | |
ac689eb7 | 294 | } |
548dafe8 | 295 | handle_signal(&ksig, regs); |
10f67dbf JB |
296 | } else { |
297 | /* no handler */ | |
298 | restore_saved_sigmask(); | |
299 | /* | |
300 | * Restore pt_regs PC as syscall restart will be handled by | |
301 | * kernel without return to userspace | |
302 | */ | |
303 | if (unlikely(restart) && regs->pc == restart_addr) { | |
304 | regs->pc = continue_addr; | |
305 | return restart; | |
306 | } | |
ac689eb7 JB |
307 | } |
308 | ||
10f67dbf | 309 | return 0; |
ac689eb7 JB |
310 | } |
311 | ||
10f67dbf JB |
312 | asmlinkage int |
313 | do_work_pending(struct pt_regs *regs, unsigned int thread_flags, int syscall) | |
ac689eb7 | 314 | { |
10f67dbf JB |
315 | do { |
316 | if (likely(thread_flags & _TIF_NEED_RESCHED)) { | |
317 | schedule(); | |
318 | } else { | |
319 | if (unlikely(!user_mode(regs))) | |
320 | return 0; | |
321 | local_irq_enable(); | |
322 | if (thread_flags & _TIF_SIGPENDING) { | |
323 | int restart = do_signal(regs, syscall); | |
324 | if (unlikely(restart)) { | |
325 | /* | |
326 | * Restart without handlers. | |
327 | * Deal with it without leaving | |
328 | * the kernel space. | |
329 | */ | |
330 | return restart; | |
331 | } | |
332 | syscall = 0; | |
333 | } else { | |
334 | clear_thread_flag(TIF_NOTIFY_RESUME); | |
335 | tracehook_notify_resume(regs); | |
336 | } | |
337 | } | |
338 | local_irq_disable(); | |
339 | thread_flags = current_thread_info()->flags; | |
340 | } while (thread_flags & _TIF_WORK_MASK); | |
341 | return 0; | |
ac689eb7 | 342 | } |