signal.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Signal Handling for ARC
  4. *
  5. * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com)
  6. *
  7. * vineetg: Jan 2010 (Restarting of timer related syscalls)
  8. *
  9. * vineetg: Nov 2009 (Everything needed for TIF_RESTORE_SIGMASK)
  10. * -do_signal() supports TIF_RESTORE_SIGMASK
  11. * -do_signal() no longer needs oldset, required by OLD sys_sigsuspend
  12. * -sys_rt_sigsuspend() now comes from generic code, so discard arch
  13. * implementation
  14. * -sys_sigsuspend() no longer needs to fudge ptregs, hence that arg removed
  15. * -sys_sigsuspend() no longer loops for do_signal(), sets TIF_xxx and leaves
  16. * the job to do_signal()
  17. *
  18. * vineetg: July 2009
  19. * -Modified Code to support the uClibc provided userland sigreturn stub
  20. * to avoid kernel synthesizing it on user stack at runtime, costing TLB
  21. * probes and Cache line flushes.
  22. *
  23. * vineetg: July 2009
  24. * -In stash_usr_regs( ) and restore_usr_regs( ), save/restore of user regs
  25. * in done in block copy rather than one word at a time.
  26. * This saves around 2K of code and improves LMBench lat_sig <catch>
  27. *
  28. * rajeshwarr: Feb 2009
  29. * - Support for Realtime Signals
  30. *
  31. * vineetg: Aug 11th 2008: Bug #94183
  32. * -ViXS were still seeing crashes when using insmod to load drivers.
  33. * It turned out that the code to change Execute permssions for TLB entries
  34. * of user was not guarded for interrupts (mod_tlb_permission)
  35. * This was causing TLB entries to be overwritten on unrelated indexes
  36. *
  37. * Vineetg: July 15th 2008: Bug #94183
  38. * -Exception happens in Delay slot of a JMP, and before user space resumes,
  39. * Signal is delivered (Ctrl + C) = >SIGINT.
  40. * setup_frame( ) sets up PC,SP,BLINK to enable user space signal handler
  41. * to run, but doesn't clear the Delay slot bit from status32. As a result,
  42. * on resuming user mode, signal handler branches off to BTA of orig JMP
  43. * -FIX: clear the DE bit from status32 in setup_frame( )
  44. *
  45. * Rahul Trivedi, Kanika Nema: Codito Technologies 2004
  46. */
  47. #include <linux/signal.h>
  48. #include <linux/ptrace.h>
  49. #include <linux/personality.h>
  50. #include <linux/uaccess.h>
  51. #include <linux/syscalls.h>
  52. #include <linux/resume_user_mode.h>
  53. #include <linux/sched/task_stack.h>
  54. #include <asm/ucontext.h>
  55. #include <asm/entry.h>
  56. struct rt_sigframe {
  57. struct siginfo info;
  58. struct ucontext uc;
  59. #define MAGIC_SIGALTSTK 0x07302004
  60. unsigned int sigret_magic;
  61. };
  62. static int save_arcv2_regs(struct sigcontext __user *mctx, struct pt_regs *regs)
  63. {
  64. int err = 0;
  65. #ifndef CONFIG_ISA_ARCOMPACT
  66. struct user_regs_arcv2 v2abi;
  67. v2abi.r30 = regs->r30;
  68. #ifdef CONFIG_ARC_HAS_ACCL_REGS
  69. v2abi.r58 = regs->r58;
  70. v2abi.r59 = regs->r59;
  71. #else
  72. v2abi.r58 = v2abi.r59 = 0;
  73. #endif
  74. err = __copy_to_user(&mctx->v2abi, (void const *)&v2abi, sizeof(v2abi));
  75. #endif
  76. return err;
  77. }
  78. static int restore_arcv2_regs(struct sigcontext __user *mctx, struct pt_regs *regs)
  79. {
  80. int err = 0;
  81. #ifndef CONFIG_ISA_ARCOMPACT
  82. struct user_regs_arcv2 v2abi;
  83. err = __copy_from_user(&v2abi, &mctx->v2abi, sizeof(v2abi));
  84. regs->r30 = v2abi.r30;
  85. #ifdef CONFIG_ARC_HAS_ACCL_REGS
  86. regs->r58 = v2abi.r58;
  87. regs->r59 = v2abi.r59;
  88. #endif
  89. #endif
  90. return err;
  91. }
  92. static int
  93. stash_usr_regs(struct rt_sigframe __user *sf, struct pt_regs *regs,
  94. sigset_t *set)
  95. {
  96. int err;
  97. struct user_regs_struct uregs;
  98. uregs.scratch.bta = regs->bta;
  99. uregs.scratch.lp_start = regs->lp_start;
  100. uregs.scratch.lp_end = regs->lp_end;
  101. uregs.scratch.lp_count = regs->lp_count;
  102. uregs.scratch.status32 = regs->status32;
  103. uregs.scratch.ret = regs->ret;
  104. uregs.scratch.blink = regs->blink;
  105. uregs.scratch.fp = regs->fp;
  106. uregs.scratch.gp = regs->r26;
  107. uregs.scratch.r12 = regs->r12;
  108. uregs.scratch.r11 = regs->r11;
  109. uregs.scratch.r10 = regs->r10;
  110. uregs.scratch.r9 = regs->r9;
  111. uregs.scratch.r8 = regs->r8;
  112. uregs.scratch.r7 = regs->r7;
  113. uregs.scratch.r6 = regs->r6;
  114. uregs.scratch.r5 = regs->r5;
  115. uregs.scratch.r4 = regs->r4;
  116. uregs.scratch.r3 = regs->r3;
  117. uregs.scratch.r2 = regs->r2;
  118. uregs.scratch.r1 = regs->r1;
  119. uregs.scratch.r0 = regs->r0;
  120. uregs.scratch.sp = regs->sp;
  121. err = __copy_to_user(&(sf->uc.uc_mcontext.regs.scratch), &uregs.scratch,
  122. sizeof(sf->uc.uc_mcontext.regs.scratch));
  123. if (is_isa_arcv2())
  124. err |= save_arcv2_regs(&(sf->uc.uc_mcontext), regs);
  125. err |= __copy_to_user(&sf->uc.uc_sigmask, set, sizeof(sigset_t));
  126. return err ? -EFAULT : 0;
  127. }
  128. static int restore_usr_regs(struct pt_regs *regs, struct rt_sigframe __user *sf)
  129. {
  130. sigset_t set;
  131. int err;
  132. struct user_regs_struct uregs;
  133. err = __copy_from_user(&set, &sf->uc.uc_sigmask, sizeof(set));
  134. err |= __copy_from_user(&uregs.scratch,
  135. &(sf->uc.uc_mcontext.regs.scratch),
  136. sizeof(sf->uc.uc_mcontext.regs.scratch));
  137. if (is_isa_arcv2())
  138. err |= restore_arcv2_regs(&(sf->uc.uc_mcontext), regs);
  139. if (err)
  140. return -EFAULT;
  141. set_current_blocked(&set);
  142. regs->bta = uregs.scratch.bta;
  143. regs->lp_start = uregs.scratch.lp_start;
  144. regs->lp_end = uregs.scratch.lp_end;
  145. regs->lp_count = uregs.scratch.lp_count;
  146. regs->status32 = uregs.scratch.status32;
  147. regs->ret = uregs.scratch.ret;
  148. regs->blink = uregs.scratch.blink;
  149. regs->fp = uregs.scratch.fp;
  150. regs->r26 = uregs.scratch.gp;
  151. regs->r12 = uregs.scratch.r12;
  152. regs->r11 = uregs.scratch.r11;
  153. regs->r10 = uregs.scratch.r10;
  154. regs->r9 = uregs.scratch.r9;
  155. regs->r8 = uregs.scratch.r8;
  156. regs->r7 = uregs.scratch.r7;
  157. regs->r6 = uregs.scratch.r6;
  158. regs->r5 = uregs.scratch.r5;
  159. regs->r4 = uregs.scratch.r4;
  160. regs->r3 = uregs.scratch.r3;
  161. regs->r2 = uregs.scratch.r2;
  162. regs->r1 = uregs.scratch.r1;
  163. regs->r0 = uregs.scratch.r0;
  164. regs->sp = uregs.scratch.sp;
  165. return 0;
  166. }
  167. static inline int is_do_ss_needed(unsigned int magic)
  168. {
  169. if (MAGIC_SIGALTSTK == magic)
  170. return 1;
  171. else
  172. return 0;
  173. }
  174. SYSCALL_DEFINE0(rt_sigreturn)
  175. {
  176. struct rt_sigframe __user *sf;
  177. unsigned int magic;
  178. struct pt_regs *regs = current_pt_regs();
  179. /* Always make any pending restarted system calls return -EINTR */
  180. current->restart_block.fn = do_no_restart_syscall;
  181. /* Since we stacked the signal on a word boundary,
  182. * then 'sp' should be word aligned here. If it's
  183. * not, then the user is trying to mess with us.
  184. */
  185. if (regs->sp & 3)
  186. goto badframe;
  187. sf = (struct rt_sigframe __force __user *)(regs->sp);
  188. if (!access_ok(sf, sizeof(*sf)))
  189. goto badframe;
  190. if (__get_user(magic, &sf->sigret_magic))
  191. goto badframe;
  192. if (unlikely(is_do_ss_needed(magic)))
  193. if (restore_altstack(&sf->uc.uc_stack))
  194. goto badframe;
  195. if (restore_usr_regs(regs, sf))
  196. goto badframe;
  197. /* Don't restart from sigreturn */
  198. syscall_wont_restart(regs);
  199. /*
  200. * Ensure that sigreturn always returns to user mode (in case the
  201. * regs saved on user stack got fudged between save and sigreturn)
  202. * Otherwise it is easy to panic the kernel with a custom
  203. * signal handler and/or restorer which clobberes the status32/ret
  204. * to return to a bogus location in kernel mode.
  205. */
  206. regs->status32 |= STATUS_U_MASK;
  207. return regs->r0;
  208. badframe:
  209. force_sig(SIGSEGV);
  210. return 0;
  211. }
  212. /*
  213. * Determine which stack to use..
  214. */
  215. static inline void __user *get_sigframe(struct ksignal *ksig,
  216. struct pt_regs *regs,
  217. unsigned long framesize)
  218. {
  219. unsigned long sp = sigsp(regs->sp, ksig);
  220. void __user *frame;
  221. /* No matter what happens, 'sp' must be word
  222. * aligned otherwise nasty things could happen
  223. */
  224. /* ATPCS B01 mandates 8-byte alignment */
  225. frame = (void __user *)((sp - framesize) & ~7);
  226. /* Check that we can actually write to the signal frame */
  227. if (!access_ok(frame, framesize))
  228. frame = NULL;
  229. return frame;
  230. }
  231. static int
  232. setup_rt_frame(struct ksignal *ksig, sigset_t *set, struct pt_regs *regs)
  233. {
  234. struct rt_sigframe __user *sf;
  235. unsigned int magic = 0;
  236. int err = 0;
  237. sf = get_sigframe(ksig, regs, sizeof(struct rt_sigframe));
  238. if (!sf)
  239. return 1;
  240. /*
  241. * w/o SA_SIGINFO, struct ucontext is partially populated (only
  242. * uc_mcontext/uc_sigmask) for kernel's normal user state preservation
  243. * during signal handler execution. This works for SA_SIGINFO as well
  244. * although the semantics are now overloaded (the same reg state can be
  245. * inspected by userland: but are they allowed to fiddle with it ?
  246. */
  247. err |= stash_usr_regs(sf, regs, set);
  248. /*
  249. * SA_SIGINFO requires 3 args to signal handler:
  250. * #1: sig-no (common to any handler)
  251. * #2: struct siginfo
  252. * #3: struct ucontext (completely populated)
  253. */
  254. if (unlikely(ksig->ka.sa.sa_flags & SA_SIGINFO)) {
  255. err |= copy_siginfo_to_user(&sf->info, &ksig->info);
  256. err |= __put_user(0, &sf->uc.uc_flags);
  257. err |= __put_user(NULL, &sf->uc.uc_link);
  258. err |= __save_altstack(&sf->uc.uc_stack, regs->sp);
  259. /* setup args 2 and 3 for user mode handler */
  260. regs->r1 = (unsigned long)&sf->info;
  261. regs->r2 = (unsigned long)&sf->uc;
  262. /*
  263. * small optim to avoid unconditionally calling do_sigaltstack
  264. * in sigreturn path, now that we only have rt_sigreturn
  265. */
  266. magic = MAGIC_SIGALTSTK;
  267. }
  268. err |= __put_user(magic, &sf->sigret_magic);
  269. if (err)
  270. return err;
  271. /* #1 arg to the user Signal handler */
  272. regs->r0 = ksig->sig;
  273. /* setup PC of user space signal handler */
  274. regs->ret = (unsigned long)ksig->ka.sa.sa_handler;
  275. /*
  276. * handler returns using sigreturn stub provided already by userspace
  277. * If not, nuke the process right away
  278. */
  279. if(!(ksig->ka.sa.sa_flags & SA_RESTORER))
  280. return 1;
  281. regs->blink = (unsigned long)ksig->ka.sa.sa_restorer;
  282. /* User Stack for signal handler will be above the frame just carved */
  283. regs->sp = (unsigned long)sf;
  284. /*
  285. * Bug 94183, Clear the DE bit, so that when signal handler
  286. * starts to run, it doesn't use BTA
  287. */
  288. regs->status32 &= ~STATUS_DE_MASK;
  289. regs->status32 |= STATUS_L_MASK;
  290. return err;
  291. }
  292. static void arc_restart_syscall(struct k_sigaction *ka, struct pt_regs *regs)
  293. {
  294. switch (regs->r0) {
  295. case -ERESTART_RESTARTBLOCK:
  296. case -ERESTARTNOHAND:
  297. /*
  298. * ERESTARTNOHAND means that the syscall should
  299. * only be restarted if there was no handler for
  300. * the signal, and since we only get here if there
  301. * is a handler, we don't restart
  302. */
  303. regs->r0 = -EINTR; /* ERESTART_xxx is internal */
  304. break;
  305. case -ERESTARTSYS:
  306. /*
  307. * ERESTARTSYS means to restart the syscall if
  308. * there is no handler or the handler was
  309. * registered with SA_RESTART
  310. */
  311. if (!(ka->sa.sa_flags & SA_RESTART)) {
  312. regs->r0 = -EINTR;
  313. break;
  314. }
  315. fallthrough;
  316. case -ERESTARTNOINTR:
  317. /*
  318. * ERESTARTNOINTR means that the syscall should
  319. * be called again after the signal handler returns.
  320. * Setup reg state just as it was before doing the trap
  321. * r0 has been clobbered with sys call ret code thus it
  322. * needs to be reloaded with orig first arg to syscall
  323. * in orig_r0. Rest of relevant reg-file:
  324. * r8 (syscall num) and (r1 - r7) will be reset to
  325. * their orig user space value when we ret from kernel
  326. */
  327. regs->r0 = regs->orig_r0;
  328. regs->ret -= is_isa_arcv2() ? 2 : 4;
  329. break;
  330. }
  331. }
  332. /*
  333. * OK, we're invoking a handler
  334. */
  335. static void
  336. handle_signal(struct ksignal *ksig, struct pt_regs *regs)
  337. {
  338. sigset_t *oldset = sigmask_to_save();
  339. int failed;
  340. /* Set up the stack frame */
  341. failed = setup_rt_frame(ksig, oldset, regs);
  342. signal_setup_done(failed, ksig, 0);
  343. }
  344. void do_signal(struct pt_regs *regs)
  345. {
  346. struct ksignal ksig;
  347. int restart_scall;
  348. restart_scall = in_syscall(regs) && syscall_restartable(regs);
  349. if (test_thread_flag(TIF_SIGPENDING) && get_signal(&ksig)) {
  350. if (restart_scall) {
  351. arc_restart_syscall(&ksig.ka, regs);
  352. syscall_wont_restart(regs); /* No more restarts */
  353. }
  354. handle_signal(&ksig, regs);
  355. return;
  356. }
  357. if (restart_scall) {
  358. /* No handler for syscall: restart it */
  359. if (regs->r0 == -ERESTARTNOHAND ||
  360. regs->r0 == -ERESTARTSYS || regs->r0 == -ERESTARTNOINTR) {
  361. regs->r0 = regs->orig_r0;
  362. regs->ret -= is_isa_arcv2() ? 2 : 4;
  363. } else if (regs->r0 == -ERESTART_RESTARTBLOCK) {
  364. regs->r8 = __NR_restart_syscall;
  365. regs->ret -= is_isa_arcv2() ? 2 : 4;
  366. }
  367. syscall_wont_restart(regs); /* No more restarts */
  368. }
  369. /* If there's no signal to deliver, restore the saved sigmask back */
  370. restore_saved_sigmask();
  371. }
  372. void do_notify_resume(struct pt_regs *regs)
  373. {
  374. /*
  375. * ASM glue guarantees that this is only called when returning to
  376. * user mode
  377. */
  378. if (test_thread_flag(TIF_NOTIFY_RESUME))
  379. resume_user_mode_work(regs);
  380. }