Merge tag 'v3.3.7' into 3.3/master
[zen-stable.git] / arch / c6x / kernel / signal.c
blob304f675826e93a249595ec65d5c81bb5629a9d85
1 /*
2 * Port on Texas Instruments TMS320C6x architecture
4 * Copyright (C) 2004, 2006, 2009, 2010, 2011 Texas Instruments Incorporated
5 * Author: Aurelien Jacquiot (aurelien.jacquiot@jaluna.com)
7 * Updated for 2.6.34: Mark Salter <msalter@redhat.com>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2 as
11 * published by the Free Software Foundation.
14 #include <linux/kernel.h>
15 #include <linux/uaccess.h>
16 #include <linux/syscalls.h>
17 #include <linux/tracehook.h>
19 #include <asm/ucontext.h>
20 #include <asm/cacheflush.h>
23 #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
26 * Do a signal return, undo the signal stack.
29 #define RETCODE_SIZE (9 << 2) /* 9 instructions = 36 bytes */
31 struct rt_sigframe {
32 struct siginfo __user *pinfo;
33 void __user *puc;
34 struct siginfo info;
35 struct ucontext uc;
36 unsigned long retcode[RETCODE_SIZE >> 2];
39 static int restore_sigcontext(struct pt_regs *regs,
40 struct sigcontext __user *sc)
42 int err = 0;
44 /* The access_ok check was done by caller, so use __get_user here */
45 #define COPY(x) (err |= __get_user(regs->x, &sc->sc_##x))
47 COPY(sp); COPY(a4); COPY(b4); COPY(a6); COPY(b6); COPY(a8); COPY(b8);
48 COPY(a0); COPY(a1); COPY(a2); COPY(a3); COPY(a5); COPY(a7); COPY(a9);
49 COPY(b0); COPY(b1); COPY(b2); COPY(b3); COPY(b5); COPY(b7); COPY(b9);
51 COPY(a16); COPY(a17); COPY(a18); COPY(a19);
52 COPY(a20); COPY(a21); COPY(a22); COPY(a23);
53 COPY(a24); COPY(a25); COPY(a26); COPY(a27);
54 COPY(a28); COPY(a29); COPY(a30); COPY(a31);
55 COPY(b16); COPY(b17); COPY(b18); COPY(b19);
56 COPY(b20); COPY(b21); COPY(b22); COPY(b23);
57 COPY(b24); COPY(b25); COPY(b26); COPY(b27);
58 COPY(b28); COPY(b29); COPY(b30); COPY(b31);
60 COPY(csr); COPY(pc);
62 #undef COPY
64 return err;
67 asmlinkage int do_rt_sigreturn(struct pt_regs *regs)
69 struct rt_sigframe __user *frame;
70 sigset_t set;
73 * Since we stacked the signal on a dword boundary,
74 * 'sp' should be dword aligned here. If it's
75 * not, then the user is trying to mess with us.
77 if (regs->sp & 7)
78 goto badframe;
80 frame = (struct rt_sigframe __user *) ((unsigned long) regs->sp + 8);
82 if (!access_ok(VERIFY_READ, frame, sizeof(*frame)))
83 goto badframe;
84 if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
85 goto badframe;
87 sigdelsetmask(&set, ~_BLOCKABLE);
88 spin_lock_irq(&current->sighand->siglock);
89 current->blocked = set;
90 recalc_sigpending();
91 spin_unlock_irq(&current->sighand->siglock);
93 if (restore_sigcontext(regs, &frame->uc.uc_mcontext))
94 goto badframe;
96 return regs->a4;
98 badframe:
99 force_sig(SIGSEGV, current);
100 return 0;
103 static int setup_sigcontext(struct sigcontext __user *sc, struct pt_regs *regs,
104 unsigned long mask)
106 int err = 0;
108 err |= __put_user(mask, &sc->sc_mask);
110 /* The access_ok check was done by caller, so use __put_user here */
111 #define COPY(x) (err |= __put_user(regs->x, &sc->sc_##x))
113 COPY(sp); COPY(a4); COPY(b4); COPY(a6); COPY(b6); COPY(a8); COPY(b8);
114 COPY(a0); COPY(a1); COPY(a2); COPY(a3); COPY(a5); COPY(a7); COPY(a9);
115 COPY(b0); COPY(b1); COPY(b2); COPY(b3); COPY(b5); COPY(b7); COPY(b9);
117 COPY(a16); COPY(a17); COPY(a18); COPY(a19);
118 COPY(a20); COPY(a21); COPY(a22); COPY(a23);
119 COPY(a24); COPY(a25); COPY(a26); COPY(a27);
120 COPY(a28); COPY(a29); COPY(a30); COPY(a31);
121 COPY(b16); COPY(b17); COPY(b18); COPY(b19);
122 COPY(b20); COPY(b21); COPY(b22); COPY(b23);
123 COPY(b24); COPY(b25); COPY(b26); COPY(b27);
124 COPY(b28); COPY(b29); COPY(b30); COPY(b31);
126 COPY(csr); COPY(pc);
128 #undef COPY
130 return err;
133 static inline void __user *get_sigframe(struct k_sigaction *ka,
134 struct pt_regs *regs,
135 unsigned long framesize)
137 unsigned long sp = regs->sp;
140 * This is the X/Open sanctioned signal stack switching.
142 if ((ka->sa.sa_flags & SA_ONSTACK) && sas_ss_flags(sp) == 0)
143 sp = current->sas_ss_sp + current->sas_ss_size;
146 * No matter what happens, 'sp' must be dword
147 * aligned. Otherwise, nasty things will happen
149 return (void __user *)((sp - framesize) & ~7);
152 static int setup_rt_frame(int signr, struct k_sigaction *ka, siginfo_t *info,
153 sigset_t *set, struct pt_regs *regs)
155 struct rt_sigframe __user *frame;
156 unsigned long __user *retcode;
157 int err = 0;
159 frame = get_sigframe(ka, regs, sizeof(*frame));
161 if (!access_ok(VERIFY_WRITE, frame, sizeof(*frame)))
162 goto segv_and_exit;
164 err |= __put_user(&frame->info, &frame->pinfo);
165 err |= __put_user(&frame->uc, &frame->puc);
166 err |= copy_siginfo_to_user(&frame->info, info);
168 /* Clear all the bits of the ucontext we don't use. */
169 err |= __clear_user(&frame->uc, offsetof(struct ucontext, uc_mcontext));
171 err |= setup_sigcontext(&frame->uc.uc_mcontext, regs, set->sig[0]);
172 err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
174 /* Set up to return from userspace */
175 retcode = (unsigned long __user *) &frame->retcode;
177 /* The access_ok check was done above, so use __put_user here */
178 #define COPY(x) (err |= __put_user(x, retcode++))
180 COPY(0x0000002AUL | (__NR_rt_sigreturn << 7));
181 /* MVK __NR_rt_sigreturn,B0 */
182 COPY(0x10000000UL); /* SWE */
183 COPY(0x00006000UL); /* NOP 4 */
184 COPY(0x00006000UL); /* NOP 4 */
185 COPY(0x00006000UL); /* NOP 4 */
186 COPY(0x00006000UL); /* NOP 4 */
187 COPY(0x00006000UL); /* NOP 4 */
188 COPY(0x00006000UL); /* NOP 4 */
189 COPY(0x00006000UL); /* NOP 4 */
191 #undef COPY
193 if (err)
194 goto segv_and_exit;
196 flush_icache_range((unsigned long) &frame->retcode,
197 (unsigned long) &frame->retcode + RETCODE_SIZE);
199 retcode = (unsigned long __user *) &frame->retcode;
201 /* Change user context to branch to signal handler */
202 regs->sp = (unsigned long) frame - 8;
203 regs->b3 = (unsigned long) retcode;
204 regs->pc = (unsigned long) ka->sa.sa_handler;
206 /* Give the signal number to the handler */
207 regs->a4 = signr;
210 * For realtime signals we must also set the second and third
211 * arguments for the signal handler.
212 * -- Peter Maydell <pmaydell@chiark.greenend.org.uk> 2000-12-06
214 regs->b4 = (unsigned long)&frame->info;
215 regs->a6 = (unsigned long)&frame->uc;
217 return 0;
219 segv_and_exit:
220 force_sigsegv(signr, current);
221 return -EFAULT;
224 static inline void
225 handle_restart(struct pt_regs *regs, struct k_sigaction *ka, int has_handler)
227 switch (regs->a4) {
228 case -ERESTARTNOHAND:
229 if (!has_handler)
230 goto do_restart;
231 regs->a4 = -EINTR;
232 break;
234 case -ERESTARTSYS:
235 if (has_handler && !(ka->sa.sa_flags & SA_RESTART)) {
236 regs->a4 = -EINTR;
237 break;
239 /* fallthrough */
240 case -ERESTARTNOINTR:
241 do_restart:
242 regs->a4 = regs->orig_a4;
243 regs->pc -= 4;
244 break;
249 * handle the actual delivery of a signal to userspace
251 static int handle_signal(int sig,
252 siginfo_t *info, struct k_sigaction *ka,
253 sigset_t *oldset, struct pt_regs *regs,
254 int syscall)
256 int ret;
258 /* Are we from a system call? */
259 if (syscall) {
260 /* If so, check system call restarting.. */
261 switch (regs->a4) {
262 case -ERESTART_RESTARTBLOCK:
263 case -ERESTARTNOHAND:
264 regs->a4 = -EINTR;
265 break;
267 case -ERESTARTSYS:
268 if (!(ka->sa.sa_flags & SA_RESTART)) {
269 regs->a4 = -EINTR;
270 break;
273 /* fallthrough */
274 case -ERESTARTNOINTR:
275 regs->a4 = regs->orig_a4;
276 regs->pc -= 4;
280 /* Set up the stack frame */
281 ret = setup_rt_frame(sig, ka, info, oldset, regs);
282 if (ret == 0) {
283 spin_lock_irq(&current->sighand->siglock);
284 sigorsets(&current->blocked, &current->blocked,
285 &ka->sa.sa_mask);
286 if (!(ka->sa.sa_flags & SA_NODEFER))
287 sigaddset(&current->blocked, sig);
288 recalc_sigpending();
289 spin_unlock_irq(&current->sighand->siglock);
292 return ret;
296 * handle a potential signal
298 static void do_signal(struct pt_regs *regs, int syscall)
300 struct k_sigaction ka;
301 siginfo_t info;
302 sigset_t *oldset;
303 int signr;
305 /* we want the common case to go fast, which is why we may in certain
306 * cases get here from kernel mode */
307 if (!user_mode(regs))
308 return;
310 if (test_thread_flag(TIF_RESTORE_SIGMASK))
311 oldset = &current->saved_sigmask;
312 else
313 oldset = &current->blocked;
315 signr = get_signal_to_deliver(&info, &ka, regs, NULL);
316 if (signr > 0) {
317 if (handle_signal(signr, &info, &ka, oldset,
318 regs, syscall) == 0) {
319 /* a signal was successfully delivered; the saved
320 * sigmask will have been stored in the signal frame,
321 * and will be restored by sigreturn, so we can simply
322 * clear the TIF_RESTORE_SIGMASK flag */
323 if (test_thread_flag(TIF_RESTORE_SIGMASK))
324 clear_thread_flag(TIF_RESTORE_SIGMASK);
326 tracehook_signal_handler(signr, &info, &ka, regs, 0);
329 return;
332 /* did we come from a system call? */
333 if (syscall) {
334 /* restart the system call - no handlers present */
335 switch (regs->a4) {
336 case -ERESTARTNOHAND:
337 case -ERESTARTSYS:
338 case -ERESTARTNOINTR:
339 regs->a4 = regs->orig_a4;
340 regs->pc -= 4;
341 break;
343 case -ERESTART_RESTARTBLOCK:
344 regs->a4 = regs->orig_a4;
345 regs->b0 = __NR_restart_syscall;
346 regs->pc -= 4;
347 break;
351 /* if there's no signal to deliver, we just put the saved sigmask
352 * back */
353 if (test_thread_flag(TIF_RESTORE_SIGMASK)) {
354 clear_thread_flag(TIF_RESTORE_SIGMASK);
355 sigprocmask(SIG_SETMASK, &current->saved_sigmask, NULL);
360 * notification of userspace execution resumption
361 * - triggered by current->work.notify_resume
363 asmlinkage void do_notify_resume(struct pt_regs *regs, u32 thread_info_flags,
364 int syscall)
366 /* deal with pending signal delivery */
367 if (thread_info_flags & ((1 << TIF_SIGPENDING) |
368 (1 << TIF_RESTORE_SIGMASK)))
369 do_signal(regs, syscall);
371 if (thread_info_flags & (1 << TIF_NOTIFY_RESUME)) {
372 clear_thread_flag(TIF_NOTIFY_RESUME);
373 tracehook_notify_resume(regs);
374 if (current->replacement_session_keyring)
375 key_replace_session_keyring();