blob: 7abc908ebea0db0328a1febee1eda74ce7321614 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/arch/arm/kernel/signal.c
3 *
Russell Kingab72b002009-10-25 15:39:37 +00004 * Copyright (C) 1995-2009 Russell King
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070010#include <linux/errno.h>
Russell King48be69a2013-07-24 00:29:18 +010011#include <linux/random.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012#include <linux/signal.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/personality.h>
Russell King33fa9b12008-09-06 11:35:55 +010014#include <linux/uaccess.h>
David Howells733e5e42009-09-09 08:30:21 +010015#include <linux/tracehook.h>
David A. Longc7edc9e2014-03-07 11:23:04 -050016#include <linux/uprobes.h>
Thomas Garnierffecead2017-09-07 08:30:46 -070017#include <linux/syscalls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018
Russell Kingee90dab2006-11-09 14:20:47 +000019#include <asm/elf.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <asm/cacheflush.h>
Russell King48be69a2013-07-24 00:29:18 +010021#include <asm/traps.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022#include <asm/ucontext.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023#include <asm/unistd.h>
Imre Deak82c6f5a2010-04-11 15:58:27 +010024#include <asm/vfp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025
Victor Kamensky574e2b52013-08-27 22:41:57 -070026extern const unsigned long sigreturn_codes[7];
Linus Torvalds1da177e2005-04-16 15:20:36 -070027
Russell King48be69a2013-07-24 00:29:18 +010028static unsigned long signal_return_offset;
29
Lennert Buytenhek3bec6ded2006-06-27 22:56:18 +010030#ifdef CONFIG_CRUNCH
Hartley Sweeten65a50532009-08-04 23:20:45 +010031static int preserve_crunch_context(struct crunch_sigframe __user *frame)
Lennert Buytenhek3bec6ded2006-06-27 22:56:18 +010032{
33 char kbuf[sizeof(*frame) + 8];
34 struct crunch_sigframe *kframe;
35
36 /* the crunch context must be 64 bit aligned */
37 kframe = (struct crunch_sigframe *)((unsigned long)(kbuf + 8) & ~7);
38 kframe->magic = CRUNCH_MAGIC;
39 kframe->size = CRUNCH_STORAGE_SIZE;
40 crunch_task_copy(current_thread_info(), &kframe->storage);
41 return __copy_to_user(frame, kframe, sizeof(*frame));
42}
43
Hartley Sweeten65a50532009-08-04 23:20:45 +010044static int restore_crunch_context(struct crunch_sigframe __user *frame)
Lennert Buytenhek3bec6ded2006-06-27 22:56:18 +010045{
46 char kbuf[sizeof(*frame) + 8];
47 struct crunch_sigframe *kframe;
48
49 /* the crunch context must be 64 bit aligned */
50 kframe = (struct crunch_sigframe *)((unsigned long)(kbuf + 8) & ~7);
51 if (__copy_from_user(kframe, frame, sizeof(*frame)))
52 return -1;
53 if (kframe->magic != CRUNCH_MAGIC ||
54 kframe->size != CRUNCH_STORAGE_SIZE)
55 return -1;
56 crunch_task_restore(current_thread_info(), &kframe->storage);
57 return 0;
58}
59#endif
60
Linus Torvalds1da177e2005-04-16 15:20:36 -070061#ifdef CONFIG_IWMMXT
62
Linus Torvalds1da177e2005-04-16 15:20:36 -070063static int preserve_iwmmxt_context(struct iwmmxt_sigframe *frame)
64{
Hugh Dickins69b04752005-10-29 18:16:36 -070065 char kbuf[sizeof(*frame) + 8];
66 struct iwmmxt_sigframe *kframe;
Linus Torvalds1da177e2005-04-16 15:20:36 -070067
68 /* the iWMMXt context must be 64 bit aligned */
Hugh Dickins69b04752005-10-29 18:16:36 -070069 kframe = (struct iwmmxt_sigframe *)((unsigned long)(kbuf + 8) & ~7);
Daniel Jacobowitz85fe0682006-06-24 23:46:21 +010070 kframe->magic = IWMMXT_MAGIC;
71 kframe->size = IWMMXT_STORAGE_SIZE;
Hugh Dickins69b04752005-10-29 18:16:36 -070072 iwmmxt_task_copy(current_thread_info(), &kframe->storage);
73 return __copy_to_user(frame, kframe, sizeof(*frame));
Linus Torvalds1da177e2005-04-16 15:20:36 -070074}
75
76static int restore_iwmmxt_context(struct iwmmxt_sigframe *frame)
77{
Hugh Dickins69b04752005-10-29 18:16:36 -070078 char kbuf[sizeof(*frame) + 8];
79 struct iwmmxt_sigframe *kframe;
Linus Torvalds1da177e2005-04-16 15:20:36 -070080
Hugh Dickins69b04752005-10-29 18:16:36 -070081 /* the iWMMXt context must be 64 bit aligned */
82 kframe = (struct iwmmxt_sigframe *)((unsigned long)(kbuf + 8) & ~7);
83 if (__copy_from_user(kframe, frame, sizeof(*frame)))
84 return -1;
Daniel Jacobowitz85fe0682006-06-24 23:46:21 +010085 if (kframe->magic != IWMMXT_MAGIC ||
86 kframe->size != IWMMXT_STORAGE_SIZE)
Hugh Dickins69b04752005-10-29 18:16:36 -070087 return -1;
88 iwmmxt_task_restore(current_thread_info(), &kframe->storage);
89 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070090}
91
92#endif
93
Imre Deak82c6f5a2010-04-11 15:58:27 +010094#ifdef CONFIG_VFP
95
96static int preserve_vfp_context(struct vfp_sigframe __user *frame)
97{
Julien Thierry6f86d532019-02-14 09:49:16 -050098 struct vfp_sigframe kframe;
Imre Deak82c6f5a2010-04-11 15:58:27 +010099 int err = 0;
100
Julien Thierry6f86d532019-02-14 09:49:16 -0500101 memset(&kframe, 0, sizeof(kframe));
102 kframe.magic = VFP_MAGIC;
103 kframe.size = VFP_STORAGE_SIZE;
Imre Deak82c6f5a2010-04-11 15:58:27 +0100104
Julien Thierry6f86d532019-02-14 09:49:16 -0500105 err = vfp_preserve_user_clear_hwstate(&kframe.ufp, &kframe.ufp_exc);
Will Deacon24988142012-04-23 15:38:28 +0100106 if (err)
Julien Thierry6f86d532019-02-14 09:49:16 -0500107 return err;
Imre Deak82c6f5a2010-04-11 15:58:27 +0100108
Julien Thierry6f86d532019-02-14 09:49:16 -0500109 return __copy_to_user(frame, &kframe, sizeof(kframe));
Imre Deak82c6f5a2010-04-11 15:58:27 +0100110}
111
Russell King9c91b962018-11-07 11:43:58 -0500112static int restore_vfp_context(struct vfp_sigframe __user *auxp)
Imre Deak82c6f5a2010-04-11 15:58:27 +0100113{
Russell King9c91b962018-11-07 11:43:58 -0500114 struct vfp_sigframe frame;
115 int err;
Imre Deak82c6f5a2010-04-11 15:58:27 +0100116
Russell King9c91b962018-11-07 11:43:58 -0500117 err = __copy_from_user(&frame, (char __user *) auxp, sizeof(frame));
Imre Deak82c6f5a2010-04-11 15:58:27 +0100118
119 if (err)
Russell King9c91b962018-11-07 11:43:58 -0500120 return err;
121
122 if (frame.magic != VFP_MAGIC || frame.size != VFP_STORAGE_SIZE)
Imre Deak82c6f5a2010-04-11 15:58:27 +0100123 return -EINVAL;
124
Russell King9c91b962018-11-07 11:43:58 -0500125 return vfp_restore_user_hwstate(&frame.ufp, &frame.ufp_exc);
Imre Deak82c6f5a2010-04-11 15:58:27 +0100126}
127
128#endif
129
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131 * Do a signal return; undo the signal stack. These are aligned to 64-bit.
132 */
133struct sigframe {
Russell King7d4fdc12006-06-15 20:13:25 +0100134 struct ucontext uc;
Nicolas Pitrefcca5382006-01-18 22:38:47 +0000135 unsigned long retcode[2];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136};
137
138struct rt_sigframe {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139 struct siginfo info;
Russell Kingcb3504e2006-06-15 20:18:25 +0100140 struct sigframe sig;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141};
142
Russell King68071482006-06-15 20:23:02 +0100143static int restore_sigframe(struct pt_regs *regs, struct sigframe __user *sf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144{
Russell King50f032c2018-11-07 11:43:57 -0500145 struct sigcontext context;
Daniel Jacobowitz85fe0682006-06-24 23:46:21 +0100146 struct aux_sigframe __user *aux;
Russell King68071482006-06-15 20:23:02 +0100147 sigset_t set;
148 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149
Russell King68071482006-06-15 20:23:02 +0100150 err = __copy_from_user(&set, &sf->uc.uc_sigmask, sizeof(set));
Al Viro77097ae2012-04-27 13:58:59 -0400151 if (err == 0)
Matt Fleming101d9b02012-03-05 15:05:34 -0800152 set_current_blocked(&set);
Russell King68071482006-06-15 20:23:02 +0100153
Russell King50f032c2018-11-07 11:43:57 -0500154 err |= __copy_from_user(&context, &sf->uc.uc_mcontext, sizeof(context));
155 if (err == 0) {
156 regs->ARM_r0 = context.arm_r0;
157 regs->ARM_r1 = context.arm_r1;
158 regs->ARM_r2 = context.arm_r2;
159 regs->ARM_r3 = context.arm_r3;
160 regs->ARM_r4 = context.arm_r4;
161 regs->ARM_r5 = context.arm_r5;
162 regs->ARM_r6 = context.arm_r6;
163 regs->ARM_r7 = context.arm_r7;
164 regs->ARM_r8 = context.arm_r8;
165 regs->ARM_r9 = context.arm_r9;
166 regs->ARM_r10 = context.arm_r10;
167 regs->ARM_fp = context.arm_fp;
168 regs->ARM_ip = context.arm_ip;
169 regs->ARM_sp = context.arm_sp;
170 regs->ARM_lr = context.arm_lr;
171 regs->ARM_pc = context.arm_pc;
172 regs->ARM_cpsr = context.arm_cpsr;
173 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174
175 err |= !valid_user_regs(regs);
176
Daniel Jacobowitz85fe0682006-06-24 23:46:21 +0100177 aux = (struct aux_sigframe __user *) sf->uc.uc_regspace;
Lennert Buytenhek3bec6ded2006-06-27 22:56:18 +0100178#ifdef CONFIG_CRUNCH
179 if (err == 0)
180 err |= restore_crunch_context(&aux->crunch);
181#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182#ifdef CONFIG_IWMMXT
183 if (err == 0 && test_thread_flag(TIF_USING_IWMMXT))
184 err |= restore_iwmmxt_context(&aux->iwmmxt);
185#endif
186#ifdef CONFIG_VFP
Imre Deak82c6f5a2010-04-11 15:58:27 +0100187 if (err == 0)
188 err |= restore_vfp_context(&aux->vfp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700189#endif
190
191 return err;
192}
193
194asmlinkage int sys_sigreturn(struct pt_regs *regs)
195{
196 struct sigframe __user *frame;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700197
198 /* Always make any pending restarted system calls return -EINTR */
Andy Lutomirskif56141e2015-02-12 15:01:14 -0800199 current->restart_block.fn = do_no_restart_syscall;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200
201 /*
202 * Since we stacked the signal on a 64-bit boundary,
203 * then 'sp' should be word aligned here. If it's
204 * not, then the user is trying to mess with us.
205 */
206 if (regs->ARM_sp & 7)
207 goto badframe;
208
209 frame = (struct sigframe __user *)regs->ARM_sp;
210
211 if (!access_ok(VERIFY_READ, frame, sizeof (*frame)))
212 goto badframe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700213
Russell King68071482006-06-15 20:23:02 +0100214 if (restore_sigframe(regs, frame))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215 goto badframe;
216
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 return regs->ARM_r0;
218
219badframe:
220 force_sig(SIGSEGV, current);
221 return 0;
222}
223
224asmlinkage int sys_rt_sigreturn(struct pt_regs *regs)
225{
226 struct rt_sigframe __user *frame;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227
228 /* Always make any pending restarted system calls return -EINTR */
Andy Lutomirskif56141e2015-02-12 15:01:14 -0800229 current->restart_block.fn = do_no_restart_syscall;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700230
231 /*
232 * Since we stacked the signal on a 64-bit boundary,
233 * then 'sp' should be word aligned here. If it's
234 * not, then the user is trying to mess with us.
235 */
236 if (regs->ARM_sp & 7)
237 goto badframe;
238
239 frame = (struct rt_sigframe __user *)regs->ARM_sp;
240
241 if (!access_ok(VERIFY_READ, frame, sizeof (*frame)))
242 goto badframe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243
Russell King68071482006-06-15 20:23:02 +0100244 if (restore_sigframe(regs, &frame->sig))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700245 goto badframe;
246
Al Viroec93ac82012-12-23 01:52:54 -0500247 if (restore_altstack(&frame->sig.uc.uc_stack))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700248 goto badframe;
249
Linus Torvalds1da177e2005-04-16 15:20:36 -0700250 return regs->ARM_r0;
251
252badframe:
253 force_sig(SIGSEGV, current);
254 return 0;
255}
256
257static int
Russell Kingaca6ca12006-06-15 20:28:03 +0100258setup_sigframe(struct sigframe __user *sf, struct pt_regs *regs, sigset_t *set)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259{
Daniel Jacobowitz85fe0682006-06-24 23:46:21 +0100260 struct aux_sigframe __user *aux;
Julien Thierry31ac7812019-02-14 09:49:15 -0500261 struct sigcontext context;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262 int err = 0;
263
Julien Thierry31ac7812019-02-14 09:49:15 -0500264 context = (struct sigcontext) {
265 .arm_r0 = regs->ARM_r0,
266 .arm_r1 = regs->ARM_r1,
267 .arm_r2 = regs->ARM_r2,
268 .arm_r3 = regs->ARM_r3,
269 .arm_r4 = regs->ARM_r4,
270 .arm_r5 = regs->ARM_r5,
271 .arm_r6 = regs->ARM_r6,
272 .arm_r7 = regs->ARM_r7,
273 .arm_r8 = regs->ARM_r8,
274 .arm_r9 = regs->ARM_r9,
275 .arm_r10 = regs->ARM_r10,
276 .arm_fp = regs->ARM_fp,
277 .arm_ip = regs->ARM_ip,
278 .arm_sp = regs->ARM_sp,
279 .arm_lr = regs->ARM_lr,
280 .arm_pc = regs->ARM_pc,
281 .arm_cpsr = regs->ARM_cpsr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700282
Julien Thierry31ac7812019-02-14 09:49:15 -0500283 .trap_no = current->thread.trap_no,
284 .error_code = current->thread.error_code,
285 .fault_address = current->thread.address,
286 .oldmask = set->sig[0],
287 };
288
289 err |= __copy_to_user(&sf->uc.uc_mcontext, &context, sizeof(context));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700290
Russell Kingaca6ca12006-06-15 20:28:03 +0100291 err |= __copy_to_user(&sf->uc.uc_sigmask, set, sizeof(*set));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292
Daniel Jacobowitz85fe0682006-06-24 23:46:21 +0100293 aux = (struct aux_sigframe __user *) sf->uc.uc_regspace;
Lennert Buytenhek3bec6ded2006-06-27 22:56:18 +0100294#ifdef CONFIG_CRUNCH
295 if (err == 0)
296 err |= preserve_crunch_context(&aux->crunch);
297#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298#ifdef CONFIG_IWMMXT
299 if (err == 0 && test_thread_flag(TIF_USING_IWMMXT))
300 err |= preserve_iwmmxt_context(&aux->iwmmxt);
301#endif
302#ifdef CONFIG_VFP
Imre Deak82c6f5a2010-04-11 15:58:27 +0100303 if (err == 0)
304 err |= preserve_vfp_context(&aux->vfp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700305#endif
Julien Thierryc4fa56d2019-02-14 09:49:18 -0500306 err |= __put_user(0, &aux->end_magic);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307
308 return err;
309}
310
311static inline void __user *
Al Viro7e243642012-11-07 17:53:13 -0500312get_sigframe(struct ksignal *ksig, struct pt_regs *regs, int framesize)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700313{
Al Viro7e243642012-11-07 17:53:13 -0500314 unsigned long sp = sigsp(regs->ARM_sp, ksig);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700315 void __user *frame;
316
317 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700318 * ATPCS B01 mandates 8-byte alignment
319 */
320 frame = (void __user *)((sp - framesize) & ~7);
321
322 /*
323 * Check that we can actually write to the signal frame.
324 */
325 if (!access_ok(VERIFY_WRITE, frame, framesize))
326 frame = NULL;
327
328 return frame;
329}
330
Al Viro7e243642012-11-07 17:53:13 -0500331static int
332setup_return(struct pt_regs *regs, struct ksignal *ksig,
333 unsigned long __user *rc, void __user *frame)
334{
335 unsigned long handler = (unsigned long)ksig->ka.sa.sa_handler;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336 unsigned long retcode;
337 int thumb = 0;
Russell King53399052011-02-20 12:22:52 +0000338 unsigned long cpsr = regs->ARM_cpsr & ~(PSR_f | PSR_E_BIT);
339
340 cpsr |= PSR_ENDSTATE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700341
342 /*
343 * Maybe we need to deliver a 32-bit signal to a 26-bit task.
344 */
Al Viro7e243642012-11-07 17:53:13 -0500345 if (ksig->ka.sa.sa_flags & SA_THIRTYTWO)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346 cpsr = (cpsr & ~MODE_MASK) | USR_MODE;
347
348#ifdef CONFIG_ARM_THUMB
349 if (elf_hwcap & HWCAP_THUMB) {
350 /*
351 * The LSB of the handler determines if we're going to
352 * be using THUMB or ARM mode for this signal handler.
353 */
354 thumb = handler & 1;
355
T.J. Purtell6ecf8302013-11-06 18:38:05 +0100356 /*
Russell King9b556132015-09-11 16:44:02 +0100357 * Clear the If-Then Thumb-2 execution state. ARM spec
358 * requires this to be all 000s in ARM mode. Snapdragon
359 * S4/Krait misbehaves on a Thumb=>ARM signal transition
360 * without this.
361 *
362 * We must do this whenever we are running on a Thumb-2
363 * capable CPU, which includes ARMv6T2. However, we elect
Russell King12fc7302015-09-16 11:08:49 +0100364 * to always do this to simplify the code; this field is
365 * marked UNK/SBZP for older architectures.
T.J. Purtell6ecf8302013-11-06 18:38:05 +0100366 */
367 cpsr &= ~PSR_IT_MASK;
T.J. Purtell6ecf8302013-11-06 18:38:05 +0100368
Catalin Marinasd71e1352009-05-30 14:00:15 +0100369 if (thumb) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700370 cpsr |= PSR_T_BIT;
Catalin Marinasd71e1352009-05-30 14:00:15 +0100371 } else
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372 cpsr &= ~PSR_T_BIT;
373 }
374#endif
375
Al Viro7e243642012-11-07 17:53:13 -0500376 if (ksig->ka.sa.sa_flags & SA_RESTORER) {
377 retcode = (unsigned long)ksig->ka.sa.sa_restorer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378 } else {
Nicolas Pitrefcca5382006-01-18 22:38:47 +0000379 unsigned int idx = thumb << 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380
Al Viro7e243642012-11-07 17:53:13 -0500381 if (ksig->ka.sa.sa_flags & SA_SIGINFO)
Nicolas Pitrefcca5382006-01-18 22:38:47 +0000382 idx += 3;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700383
Jonathan Austin9dfc28b2013-04-18 18:37:24 +0100384 /*
385 * Put the sigreturn code on the stack no matter which return
386 * mechanism we use in order to remain ABI compliant
387 */
Nicolas Pitrefcca5382006-01-18 22:38:47 +0000388 if (__put_user(sigreturn_codes[idx], rc) ||
389 __put_user(sigreturn_codes[idx+1], rc+1))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700390 return 1;
391
Russell King8c0cc8a2013-08-03 10:39:51 +0100392#ifdef CONFIG_MMU
393 if (cpsr & MODE32_BIT) {
Russell King48be69a2013-07-24 00:29:18 +0100394 struct mm_struct *mm = current->mm;
395
Russell Kinge00d3492005-06-22 20:26:05 +0100396 /*
Russell King48be69a2013-07-24 00:29:18 +0100397 * 32-bit code can use the signal return page
398 * except when the MPU has protected the vectors
399 * page from PL0
Russell Kinge00d3492005-06-22 20:26:05 +0100400 */
Russell King48be69a2013-07-24 00:29:18 +0100401 retcode = mm->context.sigpage + signal_return_offset +
402 (idx << 2) + thumb;
Russell King8c0cc8a2013-08-03 10:39:51 +0100403 } else
404#endif
405 {
Russell Kinge00d3492005-06-22 20:26:05 +0100406 /*
407 * Ensure that the instruction cache sees
408 * the return code written onto the stack.
409 */
410 flush_icache_range((unsigned long)rc,
Nicolas Pitrefcca5382006-01-18 22:38:47 +0000411 (unsigned long)(rc + 2));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700412
Russell Kinge00d3492005-06-22 20:26:05 +0100413 retcode = ((unsigned long)rc) + thumb;
414 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700415 }
416
Richard Weinbergera4980442014-07-13 15:24:03 +0200417 regs->ARM_r0 = ksig->sig;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418 regs->ARM_sp = (unsigned long)frame;
419 regs->ARM_lr = retcode;
420 regs->ARM_pc = handler;
421 regs->ARM_cpsr = cpsr;
422
423 return 0;
424}
425
426static int
Al Viro7e243642012-11-07 17:53:13 -0500427setup_frame(struct ksignal *ksig, sigset_t *set, struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700428{
Al Viro7e243642012-11-07 17:53:13 -0500429 struct sigframe __user *frame = get_sigframe(ksig, regs, sizeof(*frame));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430 int err = 0;
431
432 if (!frame)
433 return 1;
434
Russell Kingca195cf2006-06-24 22:41:09 +0100435 /*
436 * Set uc.uc_flags to a value which sc.trap_no would never have.
437 */
Julien Thierryc4fa56d2019-02-14 09:49:18 -0500438 err = __put_user(0x5ac3c35a, &frame->uc.uc_flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700439
Russell Kingaca6ca12006-06-15 20:28:03 +0100440 err |= setup_sigframe(frame, regs, set);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441 if (err == 0)
Al Viro7e243642012-11-07 17:53:13 -0500442 err = setup_return(regs, ksig, frame->retcode, frame);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700443
444 return err;
445}
446
447static int
Al Viro7e243642012-11-07 17:53:13 -0500448setup_rt_frame(struct ksignal *ksig, sigset_t *set, struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449{
Al Viro7e243642012-11-07 17:53:13 -0500450 struct rt_sigframe __user *frame = get_sigframe(ksig, regs, sizeof(*frame));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700451 int err = 0;
452
453 if (!frame)
454 return 1;
455
Al Viro7e243642012-11-07 17:53:13 -0500456 err |= copy_siginfo_to_user(&frame->info, &ksig->info);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700457
Julien Thierryc4fa56d2019-02-14 09:49:18 -0500458 err |= __put_user(0, &frame->sig.uc.uc_flags);
459 err |= __put_user(NULL, &frame->sig.uc.uc_link);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460
Al Viroec93ac82012-12-23 01:52:54 -0500461 err |= __save_altstack(&frame->sig.uc.uc_stack, regs->ARM_sp);
Russell Kingaca6ca12006-06-15 20:28:03 +0100462 err |= setup_sigframe(&frame->sig, regs, set);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700463 if (err == 0)
Al Viro7e243642012-11-07 17:53:13 -0500464 err = setup_return(regs, ksig, frame->sig.retcode, frame);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465
466 if (err == 0) {
467 /*
468 * For realtime signals we must also set the second and third
469 * arguments for the signal handler.
470 * -- Peter Maydell <pmaydell@chiark.greenend.org.uk> 2000-12-06
471 */
472 regs->ARM_r1 = (unsigned long)&frame->info;
Russell Kingcb3504e2006-06-15 20:18:25 +0100473 regs->ARM_r2 = (unsigned long)&frame->sig.uc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700474 }
475
476 return err;
477}
478
Linus Torvalds1da177e2005-04-16 15:20:36 -0700479/*
480 * OK, we're invoking a handler
481 */
Al Viro7e243642012-11-07 17:53:13 -0500482static void handle_signal(struct ksignal *ksig, struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700483{
Al Virob7f9a112012-05-02 09:59:21 -0400484 sigset_t *oldset = sigmask_to_save();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485 int ret;
486
487 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488 * Set up the stack frame
489 */
Al Viro7e243642012-11-07 17:53:13 -0500490 if (ksig->ka.sa.sa_flags & SA_SIGINFO)
491 ret = setup_rt_frame(ksig, oldset, regs);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700492 else
Al Viro7e243642012-11-07 17:53:13 -0500493 ret = setup_frame(ksig, oldset, regs);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700494
495 /*
496 * Check that the resulting registers are actually sane.
497 */
498 ret |= !valid_user_regs(regs);
499
Al Viro7e243642012-11-07 17:53:13 -0500500 signal_setup_done(ret, ksig, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700501}
502
503/*
504 * Note that 'init' is a special process: it doesn't get signals it doesn't
505 * want to handle. Thus you cannot kill init even with a SIGKILL even by
506 * mistake.
507 *
508 * Note that we go through the signals twice: once to check the signals that
509 * the kernel can handle, and then we build all the user-level signal handling
510 * stack-frames in one go after that.
511 */
Al Viro81783782012-07-19 17:48:21 +0100512static int do_signal(struct pt_regs *regs, int syscall)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513{
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100514 unsigned int retval = 0, continue_addr = 0, restart_addr = 0;
Al Viro7e243642012-11-07 17:53:13 -0500515 struct ksignal ksig;
Al Viro81783782012-07-19 17:48:21 +0100516 int restart = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700517
518 /*
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100519 * If we were from a system call, check for system call restarting...
520 */
521 if (syscall) {
522 continue_addr = regs->ARM_pc;
523 restart_addr = continue_addr - (thumb_mode(regs) ? 2 : 4);
524 retval = regs->ARM_r0;
525
526 /*
527 * Prepare for system call restart. We do this here so that a
528 * debugger will see the already changed PSW.
529 */
530 switch (retval) {
Al Viro81783782012-07-19 17:48:21 +0100531 case -ERESTART_RESTARTBLOCK:
Al Viro66285212012-07-19 17:48:50 +0100532 restart -= 2;
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100533 case -ERESTARTNOHAND:
534 case -ERESTARTSYS:
535 case -ERESTARTNOINTR:
Al Viro81783782012-07-19 17:48:21 +0100536 restart++;
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100537 regs->ARM_r0 = regs->ARM_ORIG_r0;
538 regs->ARM_pc = restart_addr;
539 break;
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100540 }
541 }
542
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100543 /*
544 * Get the signal to deliver. When running under ptrace, at this
545 * point the debugger may change all our registers ...
546 */
Al Viro81783782012-07-19 17:48:21 +0100547 /*
548 * Depending on the signal settings we may need to revert the
549 * decision to restart the system call. But skip this if a
550 * debugger has chosen to restart at a different PC.
551 */
Al Viro7e243642012-11-07 17:53:13 -0500552 if (get_signal(&ksig)) {
553 /* handler */
554 if (unlikely(restart) && regs->ARM_pc == restart_addr) {
Will Deaconad82cc02012-07-19 17:46:44 +0100555 if (retval == -ERESTARTNOHAND ||
556 retval == -ERESTART_RESTARTBLOCK
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100557 || (retval == -ERESTARTSYS
Al Viro7e243642012-11-07 17:53:13 -0500558 && !(ksig.ka.sa.sa_flags & SA_RESTART))) {
Arnd Bergmann2af68df2011-05-03 18:32:55 +0100559 regs->ARM_r0 = -EINTR;
560 regs->ARM_pc = continue_addr;
561 }
562 }
Al Viro7e243642012-11-07 17:53:13 -0500563 handle_signal(&ksig, regs);
564 } else {
565 /* no handler */
566 restore_saved_sigmask();
567 if (unlikely(restart) && regs->ARM_pc == restart_addr) {
568 regs->ARM_pc = continue_addr;
569 return restart;
570 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571 }
Al Viro7e243642012-11-07 17:53:13 -0500572 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700573}
574
Al Viro81783782012-07-19 17:48:21 +0100575asmlinkage int
Al Viro0a267fa2012-07-19 17:47:55 +0100576do_work_pending(struct pt_regs *regs, unsigned int thread_flags, int syscall)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577{
Russell King3302cad2015-08-20 16:13:37 +0100578 /*
579 * The assembly code enters us with IRQs off, but it hasn't
580 * informed the tracing code of that for efficiency reasons.
581 * Update the trace code with the current status.
582 */
583 trace_hardirqs_off();
Al Viro0a267fa2012-07-19 17:47:55 +0100584 do {
585 if (likely(thread_flags & _TIF_NEED_RESCHED)) {
586 schedule();
587 } else {
588 if (unlikely(!user_mode(regs)))
Al Viro81783782012-07-19 17:48:21 +0100589 return 0;
Al Viro0a267fa2012-07-19 17:47:55 +0100590 local_irq_enable();
591 if (thread_flags & _TIF_SIGPENDING) {
Al Viro66285212012-07-19 17:48:50 +0100592 int restart = do_signal(regs, syscall);
593 if (unlikely(restart)) {
Al Viro81783782012-07-19 17:48:21 +0100594 /*
595 * Restart without handlers.
596 * Deal with it without leaving
597 * the kernel space.
598 */
Al Viro66285212012-07-19 17:48:50 +0100599 return restart;
Al Viro81783782012-07-19 17:48:21 +0100600 }
Al Viro0a267fa2012-07-19 17:47:55 +0100601 syscall = 0;
David A. Longc7edc9e2014-03-07 11:23:04 -0500602 } else if (thread_flags & _TIF_UPROBE) {
David A. Longc7edc9e2014-03-07 11:23:04 -0500603 uprobe_notify_resume(regs);
Al Viro0a267fa2012-07-19 17:47:55 +0100604 } else {
605 clear_thread_flag(TIF_NOTIFY_RESUME);
606 tracehook_notify_resume(regs);
607 }
608 }
609 local_irq_disable();
610 thread_flags = current_thread_info()->flags;
611 } while (thread_flags & _TIF_WORK_MASK);
Al Viro81783782012-07-19 17:48:21 +0100612 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700613}
Russell King48be69a2013-07-24 00:29:18 +0100614
Russell King48be69a2013-07-24 00:29:18 +0100615struct page *get_signal_page(void)
616{
Russell Kinge0d40752013-08-03 10:30:05 +0100617 unsigned long ptr;
618 unsigned offset;
619 struct page *page;
620 void *addr;
Russell King48be69a2013-07-24 00:29:18 +0100621
Russell Kinge0d40752013-08-03 10:30:05 +0100622 page = alloc_pages(GFP_KERNEL, 0);
Russell King48be69a2013-07-24 00:29:18 +0100623
Russell Kinge0d40752013-08-03 10:30:05 +0100624 if (!page)
625 return NULL;
Russell King48be69a2013-07-24 00:29:18 +0100626
Russell Kinge0d40752013-08-03 10:30:05 +0100627 addr = page_address(page);
Russell King48be69a2013-07-24 00:29:18 +0100628
Russell Kinge0d40752013-08-03 10:30:05 +0100629 /* Give the signal return code some randomness */
630 offset = 0x200 + (get_random_int() & 0x7fc);
631 signal_return_offset = offset;
Russell King48be69a2013-07-24 00:29:18 +0100632
Russell Kinge0d40752013-08-03 10:30:05 +0100633 /*
634 * Copy signal return handlers into the vector page, and
635 * set sigreturn to be a pointer to these.
636 */
637 memcpy(addr + offset, sigreturn_codes, sizeof(sigreturn_codes));
Russell King48be69a2013-07-24 00:29:18 +0100638
Russell Kinge0d40752013-08-03 10:30:05 +0100639 ptr = (unsigned long)addr + offset;
640 flush_icache_range(ptr, ptr + sizeof(sigreturn_codes));
Russell King48be69a2013-07-24 00:29:18 +0100641
Russell Kinge0d40752013-08-03 10:30:05 +0100642 return page;
Russell King48be69a2013-07-24 00:29:18 +0100643}
Thomas Garnierffecead2017-09-07 08:30:46 -0700644
645/* Defer to generic check */
646asmlinkage void addr_limit_check_failed(void)
647{
648 addr_limit_user_check();
649}