xref: /openbmc/linux/arch/arm64/kernel/signal.c (revision c595db6d7c8bcf87ef42204391fa890e5950e566)
1  // SPDX-License-Identifier: GPL-2.0-only
2  /*
3   * Based on arch/arm/kernel/signal.c
4   *
5   * Copyright (C) 1995-2009 Russell King
6   * Copyright (C) 2012 ARM Ltd.
7   */
8  
9  #include <linux/cache.h>
10  #include <linux/compat.h>
11  #include <linux/errno.h>
12  #include <linux/kernel.h>
13  #include <linux/signal.h>
14  #include <linux/freezer.h>
15  #include <linux/stddef.h>
16  #include <linux/uaccess.h>
17  #include <linux/sizes.h>
18  #include <linux/string.h>
19  #include <linux/resume_user_mode.h>
20  #include <linux/ratelimit.h>
21  #include <linux/syscalls.h>
22  
23  #include <asm/daifflags.h>
24  #include <asm/debug-monitors.h>
25  #include <asm/elf.h>
26  #include <asm/exception.h>
27  #include <asm/cacheflush.h>
28  #include <asm/ucontext.h>
29  #include <asm/unistd.h>
30  #include <asm/fpsimd.h>
31  #include <asm/ptrace.h>
32  #include <asm/syscall.h>
33  #include <asm/signal32.h>
34  #include <asm/traps.h>
35  #include <asm/vdso.h>
36  
37  /*
38   * Do a signal return; undo the signal stack. These are aligned to 128-bit.
39   */
40  struct rt_sigframe {
41  	struct siginfo info;
42  	struct ucontext uc;
43  };
44  
45  struct frame_record {
46  	u64 fp;
47  	u64 lr;
48  };
49  
50  struct rt_sigframe_user_layout {
51  	struct rt_sigframe __user *sigframe;
52  	struct frame_record __user *next_frame;
53  
54  	unsigned long size;	/* size of allocated sigframe data */
55  	unsigned long limit;	/* largest allowed size */
56  
57  	unsigned long fpsimd_offset;
58  	unsigned long esr_offset;
59  	unsigned long sve_offset;
60  	unsigned long tpidr2_offset;
61  	unsigned long za_offset;
62  	unsigned long zt_offset;
63  	unsigned long extra_offset;
64  	unsigned long end_offset;
65  };
66  
67  #define BASE_SIGFRAME_SIZE round_up(sizeof(struct rt_sigframe), 16)
68  #define TERMINATOR_SIZE round_up(sizeof(struct _aarch64_ctx), 16)
69  #define EXTRA_CONTEXT_SIZE round_up(sizeof(struct extra_context), 16)
70  
init_user_layout(struct rt_sigframe_user_layout * user)71  static void init_user_layout(struct rt_sigframe_user_layout *user)
72  {
73  	const size_t reserved_size =
74  		sizeof(user->sigframe->uc.uc_mcontext.__reserved);
75  
76  	memset(user, 0, sizeof(*user));
77  	user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved);
78  
79  	user->limit = user->size + reserved_size;
80  
81  	user->limit -= TERMINATOR_SIZE;
82  	user->limit -= EXTRA_CONTEXT_SIZE;
83  	/* Reserve space for extension and terminator ^ */
84  }
85  
sigframe_size(struct rt_sigframe_user_layout const * user)86  static size_t sigframe_size(struct rt_sigframe_user_layout const *user)
87  {
88  	return round_up(max(user->size, sizeof(struct rt_sigframe)), 16);
89  }
90  
91  /*
92   * Sanity limit on the approximate maximum size of signal frame we'll
93   * try to generate.  Stack alignment padding and the frame record are
94   * not taken into account.  This limit is not a guarantee and is
95   * NOT ABI.
96   */
97  #define SIGFRAME_MAXSZ SZ_256K
98  
__sigframe_alloc(struct rt_sigframe_user_layout * user,unsigned long * offset,size_t size,bool extend)99  static int __sigframe_alloc(struct rt_sigframe_user_layout *user,
100  			    unsigned long *offset, size_t size, bool extend)
101  {
102  	size_t padded_size = round_up(size, 16);
103  
104  	if (padded_size > user->limit - user->size &&
105  	    !user->extra_offset &&
106  	    extend) {
107  		int ret;
108  
109  		user->limit += EXTRA_CONTEXT_SIZE;
110  		ret = __sigframe_alloc(user, &user->extra_offset,
111  				       sizeof(struct extra_context), false);
112  		if (ret) {
113  			user->limit -= EXTRA_CONTEXT_SIZE;
114  			return ret;
115  		}
116  
117  		/* Reserve space for the __reserved[] terminator */
118  		user->size += TERMINATOR_SIZE;
119  
120  		/*
121  		 * Allow expansion up to SIGFRAME_MAXSZ, ensuring space for
122  		 * the terminator:
123  		 */
124  		user->limit = SIGFRAME_MAXSZ - TERMINATOR_SIZE;
125  	}
126  
127  	/* Still not enough space?  Bad luck! */
128  	if (padded_size > user->limit - user->size)
129  		return -ENOMEM;
130  
131  	*offset = user->size;
132  	user->size += padded_size;
133  
134  	return 0;
135  }
136  
137  /*
138   * Allocate space for an optional record of <size> bytes in the user
139   * signal frame.  The offset from the signal frame base address to the
140   * allocated block is assigned to *offset.
141   */
sigframe_alloc(struct rt_sigframe_user_layout * user,unsigned long * offset,size_t size)142  static int sigframe_alloc(struct rt_sigframe_user_layout *user,
143  			  unsigned long *offset, size_t size)
144  {
145  	return __sigframe_alloc(user, offset, size, true);
146  }
147  
148  /* Allocate the null terminator record and prevent further allocations */
sigframe_alloc_end(struct rt_sigframe_user_layout * user)149  static int sigframe_alloc_end(struct rt_sigframe_user_layout *user)
150  {
151  	int ret;
152  
153  	/* Un-reserve the space reserved for the terminator: */
154  	user->limit += TERMINATOR_SIZE;
155  
156  	ret = sigframe_alloc(user, &user->end_offset,
157  			     sizeof(struct _aarch64_ctx));
158  	if (ret)
159  		return ret;
160  
161  	/* Prevent further allocation: */
162  	user->limit = user->size;
163  	return 0;
164  }
165  
apply_user_offset(struct rt_sigframe_user_layout const * user,unsigned long offset)166  static void __user *apply_user_offset(
167  	struct rt_sigframe_user_layout const *user, unsigned long offset)
168  {
169  	char __user *base = (char __user *)user->sigframe;
170  
171  	return base + offset;
172  }
173  
174  struct user_ctxs {
175  	struct fpsimd_context __user *fpsimd;
176  	u32 fpsimd_size;
177  	struct sve_context __user *sve;
178  	u32 sve_size;
179  	struct tpidr2_context __user *tpidr2;
180  	u32 tpidr2_size;
181  	struct za_context __user *za;
182  	u32 za_size;
183  	struct zt_context __user *zt;
184  	u32 zt_size;
185  };
186  
preserve_fpsimd_context(struct fpsimd_context __user * ctx)187  static int preserve_fpsimd_context(struct fpsimd_context __user *ctx)
188  {
189  	struct user_fpsimd_state const *fpsimd =
190  		&current->thread.uw.fpsimd_state;
191  	int err;
192  
193  	/* copy the FP and status/control registers */
194  	err = __copy_to_user(ctx->vregs, fpsimd->vregs, sizeof(fpsimd->vregs));
195  	__put_user_error(fpsimd->fpsr, &ctx->fpsr, err);
196  	__put_user_error(fpsimd->fpcr, &ctx->fpcr, err);
197  
198  	/* copy the magic/size information */
199  	__put_user_error(FPSIMD_MAGIC, &ctx->head.magic, err);
200  	__put_user_error(sizeof(struct fpsimd_context), &ctx->head.size, err);
201  
202  	return err ? -EFAULT : 0;
203  }
204  
restore_fpsimd_context(struct user_ctxs * user)205  static int restore_fpsimd_context(struct user_ctxs *user)
206  {
207  	struct user_fpsimd_state fpsimd;
208  	int err = 0;
209  
210  	/* check the size information */
211  	if (user->fpsimd_size != sizeof(struct fpsimd_context))
212  		return -EINVAL;
213  
214  	/* copy the FP and status/control registers */
215  	err = __copy_from_user(fpsimd.vregs, &(user->fpsimd->vregs),
216  			       sizeof(fpsimd.vregs));
217  	__get_user_error(fpsimd.fpsr, &(user->fpsimd->fpsr), err);
218  	__get_user_error(fpsimd.fpcr, &(user->fpsimd->fpcr), err);
219  
220  	clear_thread_flag(TIF_SVE);
221  	current->thread.fp_type = FP_STATE_FPSIMD;
222  
223  	/* load the hardware registers from the fpsimd_state structure */
224  	if (!err)
225  		fpsimd_update_current_state(&fpsimd);
226  
227  	return err ? -EFAULT : 0;
228  }
229  
230  
231  #ifdef CONFIG_ARM64_SVE
232  
preserve_sve_context(struct sve_context __user * ctx)233  static int preserve_sve_context(struct sve_context __user *ctx)
234  {
235  	int err = 0;
236  	u16 reserved[ARRAY_SIZE(ctx->__reserved)];
237  	u16 flags = 0;
238  	unsigned int vl = task_get_sve_vl(current);
239  	unsigned int vq = 0;
240  
241  	if (thread_sm_enabled(&current->thread)) {
242  		vl = task_get_sme_vl(current);
243  		vq = sve_vq_from_vl(vl);
244  		flags |= SVE_SIG_FLAG_SM;
245  	} else if (current->thread.fp_type == FP_STATE_SVE) {
246  		vq = sve_vq_from_vl(vl);
247  	}
248  
249  	memset(reserved, 0, sizeof(reserved));
250  
251  	__put_user_error(SVE_MAGIC, &ctx->head.magic, err);
252  	__put_user_error(round_up(SVE_SIG_CONTEXT_SIZE(vq), 16),
253  			 &ctx->head.size, err);
254  	__put_user_error(vl, &ctx->vl, err);
255  	__put_user_error(flags, &ctx->flags, err);
256  	BUILD_BUG_ON(sizeof(ctx->__reserved) != sizeof(reserved));
257  	err |= __copy_to_user(&ctx->__reserved, reserved, sizeof(reserved));
258  
259  	if (vq) {
260  		/*
261  		 * This assumes that the SVE state has already been saved to
262  		 * the task struct by calling the function
263  		 * fpsimd_signal_preserve_current_state().
264  		 */
265  		err |= __copy_to_user((char __user *)ctx + SVE_SIG_REGS_OFFSET,
266  				      current->thread.sve_state,
267  				      SVE_SIG_REGS_SIZE(vq));
268  	}
269  
270  	return err ? -EFAULT : 0;
271  }
272  
restore_sve_fpsimd_context(struct user_ctxs * user)273  static int restore_sve_fpsimd_context(struct user_ctxs *user)
274  {
275  	int err = 0;
276  	unsigned int vl, vq;
277  	struct user_fpsimd_state fpsimd;
278  	u16 user_vl, flags;
279  
280  	if (user->sve_size < sizeof(*user->sve))
281  		return -EINVAL;
282  
283  	__get_user_error(user_vl, &(user->sve->vl), err);
284  	__get_user_error(flags, &(user->sve->flags), err);
285  	if (err)
286  		return err;
287  
288  	if (flags & SVE_SIG_FLAG_SM) {
289  		if (!system_supports_sme())
290  			return -EINVAL;
291  
292  		vl = task_get_sme_vl(current);
293  	} else {
294  		/*
295  		 * A SME only system use SVE for streaming mode so can
296  		 * have a SVE formatted context with a zero VL and no
297  		 * payload data.
298  		 */
299  		if (!system_supports_sve() && !system_supports_sme())
300  			return -EINVAL;
301  
302  		vl = task_get_sve_vl(current);
303  	}
304  
305  	if (user_vl != vl)
306  		return -EINVAL;
307  
308  	if (user->sve_size == sizeof(*user->sve)) {
309  		clear_thread_flag(TIF_SVE);
310  		current->thread.svcr &= ~SVCR_SM_MASK;
311  		current->thread.fp_type = FP_STATE_FPSIMD;
312  		goto fpsimd_only;
313  	}
314  
315  	vq = sve_vq_from_vl(vl);
316  
317  	if (user->sve_size < SVE_SIG_CONTEXT_SIZE(vq))
318  		return -EINVAL;
319  
320  	/*
321  	 * Careful: we are about __copy_from_user() directly into
322  	 * thread.sve_state with preemption enabled, so protection is
323  	 * needed to prevent a racing context switch from writing stale
324  	 * registers back over the new data.
325  	 */
326  
327  	fpsimd_flush_task_state(current);
328  	/* From now, fpsimd_thread_switch() won't touch thread.sve_state */
329  
330  	sve_alloc(current, true);
331  	if (!current->thread.sve_state) {
332  		clear_thread_flag(TIF_SVE);
333  		return -ENOMEM;
334  	}
335  
336  	err = __copy_from_user(current->thread.sve_state,
337  			       (char __user const *)user->sve +
338  					SVE_SIG_REGS_OFFSET,
339  			       SVE_SIG_REGS_SIZE(vq));
340  	if (err)
341  		return -EFAULT;
342  
343  	if (flags & SVE_SIG_FLAG_SM)
344  		current->thread.svcr |= SVCR_SM_MASK;
345  	else
346  		set_thread_flag(TIF_SVE);
347  	current->thread.fp_type = FP_STATE_SVE;
348  
349  fpsimd_only:
350  	/* copy the FP and status/control registers */
351  	/* restore_sigframe() already checked that user->fpsimd != NULL. */
352  	err = __copy_from_user(fpsimd.vregs, user->fpsimd->vregs,
353  			       sizeof(fpsimd.vregs));
354  	__get_user_error(fpsimd.fpsr, &user->fpsimd->fpsr, err);
355  	__get_user_error(fpsimd.fpcr, &user->fpsimd->fpcr, err);
356  
357  	/* load the hardware registers from the fpsimd_state structure */
358  	if (!err)
359  		fpsimd_update_current_state(&fpsimd);
360  
361  	return err ? -EFAULT : 0;
362  }
363  
364  #else /* ! CONFIG_ARM64_SVE */
365  
restore_sve_fpsimd_context(struct user_ctxs * user)366  static int restore_sve_fpsimd_context(struct user_ctxs *user)
367  {
368  	WARN_ON_ONCE(1);
369  	return -EINVAL;
370  }
371  
372  /* Turn any non-optimised out attempts to use this into a link error: */
373  extern int preserve_sve_context(void __user *ctx);
374  
375  #endif /* ! CONFIG_ARM64_SVE */
376  
377  #ifdef CONFIG_ARM64_SME
378  
preserve_tpidr2_context(struct tpidr2_context __user * ctx)379  static int preserve_tpidr2_context(struct tpidr2_context __user *ctx)
380  {
381  	int err = 0;
382  
383  	current->thread.tpidr2_el0 = read_sysreg_s(SYS_TPIDR2_EL0);
384  
385  	__put_user_error(TPIDR2_MAGIC, &ctx->head.magic, err);
386  	__put_user_error(sizeof(*ctx), &ctx->head.size, err);
387  	__put_user_error(current->thread.tpidr2_el0, &ctx->tpidr2, err);
388  
389  	return err;
390  }
391  
restore_tpidr2_context(struct user_ctxs * user)392  static int restore_tpidr2_context(struct user_ctxs *user)
393  {
394  	u64 tpidr2_el0;
395  	int err = 0;
396  
397  	if (user->tpidr2_size != sizeof(*user->tpidr2))
398  		return -EINVAL;
399  
400  	__get_user_error(tpidr2_el0, &user->tpidr2->tpidr2, err);
401  	if (!err)
402  		write_sysreg_s(tpidr2_el0, SYS_TPIDR2_EL0);
403  
404  	return err;
405  }
406  
preserve_za_context(struct za_context __user * ctx)407  static int preserve_za_context(struct za_context __user *ctx)
408  {
409  	int err = 0;
410  	u16 reserved[ARRAY_SIZE(ctx->__reserved)];
411  	unsigned int vl = task_get_sme_vl(current);
412  	unsigned int vq;
413  
414  	if (thread_za_enabled(&current->thread))
415  		vq = sve_vq_from_vl(vl);
416  	else
417  		vq = 0;
418  
419  	memset(reserved, 0, sizeof(reserved));
420  
421  	__put_user_error(ZA_MAGIC, &ctx->head.magic, err);
422  	__put_user_error(round_up(ZA_SIG_CONTEXT_SIZE(vq), 16),
423  			 &ctx->head.size, err);
424  	__put_user_error(vl, &ctx->vl, err);
425  	BUILD_BUG_ON(sizeof(ctx->__reserved) != sizeof(reserved));
426  	err |= __copy_to_user(&ctx->__reserved, reserved, sizeof(reserved));
427  
428  	if (vq) {
429  		/*
430  		 * This assumes that the ZA state has already been saved to
431  		 * the task struct by calling the function
432  		 * fpsimd_signal_preserve_current_state().
433  		 */
434  		err |= __copy_to_user((char __user *)ctx + ZA_SIG_REGS_OFFSET,
435  				      current->thread.sme_state,
436  				      ZA_SIG_REGS_SIZE(vq));
437  	}
438  
439  	return err ? -EFAULT : 0;
440  }
441  
restore_za_context(struct user_ctxs * user)442  static int restore_za_context(struct user_ctxs *user)
443  {
444  	int err = 0;
445  	unsigned int vq;
446  	u16 user_vl;
447  
448  	if (user->za_size < sizeof(*user->za))
449  		return -EINVAL;
450  
451  	__get_user_error(user_vl, &(user->za->vl), err);
452  	if (err)
453  		return err;
454  
455  	if (user_vl != task_get_sme_vl(current))
456  		return -EINVAL;
457  
458  	if (user->za_size == sizeof(*user->za)) {
459  		current->thread.svcr &= ~SVCR_ZA_MASK;
460  		return 0;
461  	}
462  
463  	vq = sve_vq_from_vl(user_vl);
464  
465  	if (user->za_size < ZA_SIG_CONTEXT_SIZE(vq))
466  		return -EINVAL;
467  
468  	/*
469  	 * Careful: we are about __copy_from_user() directly into
470  	 * thread.sme_state with preemption enabled, so protection is
471  	 * needed to prevent a racing context switch from writing stale
472  	 * registers back over the new data.
473  	 */
474  
475  	fpsimd_flush_task_state(current);
476  	/* From now, fpsimd_thread_switch() won't touch thread.sve_state */
477  
478  	sme_alloc(current, true);
479  	if (!current->thread.sme_state) {
480  		current->thread.svcr &= ~SVCR_ZA_MASK;
481  		clear_thread_flag(TIF_SME);
482  		return -ENOMEM;
483  	}
484  
485  	err = __copy_from_user(current->thread.sme_state,
486  			       (char __user const *)user->za +
487  					ZA_SIG_REGS_OFFSET,
488  			       ZA_SIG_REGS_SIZE(vq));
489  	if (err)
490  		return -EFAULT;
491  
492  	set_thread_flag(TIF_SME);
493  	current->thread.svcr |= SVCR_ZA_MASK;
494  
495  	return 0;
496  }
497  
preserve_zt_context(struct zt_context __user * ctx)498  static int preserve_zt_context(struct zt_context __user *ctx)
499  {
500  	int err = 0;
501  	u16 reserved[ARRAY_SIZE(ctx->__reserved)];
502  
503  	if (WARN_ON(!thread_za_enabled(&current->thread)))
504  		return -EINVAL;
505  
506  	memset(reserved, 0, sizeof(reserved));
507  
508  	__put_user_error(ZT_MAGIC, &ctx->head.magic, err);
509  	__put_user_error(round_up(ZT_SIG_CONTEXT_SIZE(1), 16),
510  			 &ctx->head.size, err);
511  	__put_user_error(1, &ctx->nregs, err);
512  	BUILD_BUG_ON(sizeof(ctx->__reserved) != sizeof(reserved));
513  	err |= __copy_to_user(&ctx->__reserved, reserved, sizeof(reserved));
514  
515  	/*
516  	 * This assumes that the ZT state has already been saved to
517  	 * the task struct by calling the function
518  	 * fpsimd_signal_preserve_current_state().
519  	 */
520  	err |= __copy_to_user((char __user *)ctx + ZT_SIG_REGS_OFFSET,
521  			      thread_zt_state(&current->thread),
522  			      ZT_SIG_REGS_SIZE(1));
523  
524  	return err ? -EFAULT : 0;
525  }
526  
restore_zt_context(struct user_ctxs * user)527  static int restore_zt_context(struct user_ctxs *user)
528  {
529  	int err;
530  	u16 nregs;
531  
532  	/* ZA must be restored first for this check to be valid */
533  	if (!thread_za_enabled(&current->thread))
534  		return -EINVAL;
535  
536  	if (user->zt_size != ZT_SIG_CONTEXT_SIZE(1))
537  		return -EINVAL;
538  
539  	if (__copy_from_user(&nregs, &(user->zt->nregs), sizeof(nregs)))
540  		return -EFAULT;
541  
542  	if (nregs != 1)
543  		return -EINVAL;
544  
545  	/*
546  	 * Careful: we are about __copy_from_user() directly into
547  	 * thread.zt_state with preemption enabled, so protection is
548  	 * needed to prevent a racing context switch from writing stale
549  	 * registers back over the new data.
550  	 */
551  
552  	fpsimd_flush_task_state(current);
553  	/* From now, fpsimd_thread_switch() won't touch ZT in thread state */
554  
555  	err = __copy_from_user(thread_zt_state(&current->thread),
556  			       (char __user const *)user->zt +
557  					ZT_SIG_REGS_OFFSET,
558  			       ZT_SIG_REGS_SIZE(1));
559  	if (err)
560  		return -EFAULT;
561  
562  	return 0;
563  }
564  
565  #else /* ! CONFIG_ARM64_SME */
566  
567  /* Turn any non-optimised out attempts to use these into a link error: */
568  extern int preserve_tpidr2_context(void __user *ctx);
569  extern int restore_tpidr2_context(struct user_ctxs *user);
570  extern int preserve_za_context(void __user *ctx);
571  extern int restore_za_context(struct user_ctxs *user);
572  extern int preserve_zt_context(void __user *ctx);
573  extern int restore_zt_context(struct user_ctxs *user);
574  
575  #endif /* ! CONFIG_ARM64_SME */
576  
parse_user_sigframe(struct user_ctxs * user,struct rt_sigframe __user * sf)577  static int parse_user_sigframe(struct user_ctxs *user,
578  			       struct rt_sigframe __user *sf)
579  {
580  	struct sigcontext __user *const sc = &sf->uc.uc_mcontext;
581  	struct _aarch64_ctx __user *head;
582  	char __user *base = (char __user *)&sc->__reserved;
583  	size_t offset = 0;
584  	size_t limit = sizeof(sc->__reserved);
585  	bool have_extra_context = false;
586  	char const __user *const sfp = (char const __user *)sf;
587  
588  	user->fpsimd = NULL;
589  	user->sve = NULL;
590  	user->tpidr2 = NULL;
591  	user->za = NULL;
592  	user->zt = NULL;
593  
594  	if (!IS_ALIGNED((unsigned long)base, 16))
595  		goto invalid;
596  
597  	while (1) {
598  		int err = 0;
599  		u32 magic, size;
600  		char const __user *userp;
601  		struct extra_context const __user *extra;
602  		u64 extra_datap;
603  		u32 extra_size;
604  		struct _aarch64_ctx const __user *end;
605  		u32 end_magic, end_size;
606  
607  		if (limit - offset < sizeof(*head))
608  			goto invalid;
609  
610  		if (!IS_ALIGNED(offset, 16))
611  			goto invalid;
612  
613  		head = (struct _aarch64_ctx __user *)(base + offset);
614  		__get_user_error(magic, &head->magic, err);
615  		__get_user_error(size, &head->size, err);
616  		if (err)
617  			return err;
618  
619  		if (limit - offset < size)
620  			goto invalid;
621  
622  		switch (magic) {
623  		case 0:
624  			if (size)
625  				goto invalid;
626  
627  			goto done;
628  
629  		case FPSIMD_MAGIC:
630  			if (!system_supports_fpsimd())
631  				goto invalid;
632  			if (user->fpsimd)
633  				goto invalid;
634  
635  			user->fpsimd = (struct fpsimd_context __user *)head;
636  			user->fpsimd_size = size;
637  			break;
638  
639  		case ESR_MAGIC:
640  			/* ignore */
641  			break;
642  
643  		case SVE_MAGIC:
644  			if (!system_supports_sve() && !system_supports_sme())
645  				goto invalid;
646  
647  			if (user->sve)
648  				goto invalid;
649  
650  			user->sve = (struct sve_context __user *)head;
651  			user->sve_size = size;
652  			break;
653  
654  		case TPIDR2_MAGIC:
655  			if (!system_supports_tpidr2())
656  				goto invalid;
657  
658  			if (user->tpidr2)
659  				goto invalid;
660  
661  			user->tpidr2 = (struct tpidr2_context __user *)head;
662  			user->tpidr2_size = size;
663  			break;
664  
665  		case ZA_MAGIC:
666  			if (!system_supports_sme())
667  				goto invalid;
668  
669  			if (user->za)
670  				goto invalid;
671  
672  			user->za = (struct za_context __user *)head;
673  			user->za_size = size;
674  			break;
675  
676  		case ZT_MAGIC:
677  			if (!system_supports_sme2())
678  				goto invalid;
679  
680  			if (user->zt)
681  				goto invalid;
682  
683  			user->zt = (struct zt_context __user *)head;
684  			user->zt_size = size;
685  			break;
686  
687  		case EXTRA_MAGIC:
688  			if (have_extra_context)
689  				goto invalid;
690  
691  			if (size < sizeof(*extra))
692  				goto invalid;
693  
694  			userp = (char const __user *)head;
695  
696  			extra = (struct extra_context const __user *)userp;
697  			userp += size;
698  
699  			__get_user_error(extra_datap, &extra->datap, err);
700  			__get_user_error(extra_size, &extra->size, err);
701  			if (err)
702  				return err;
703  
704  			/* Check for the dummy terminator in __reserved[]: */
705  
706  			if (limit - offset - size < TERMINATOR_SIZE)
707  				goto invalid;
708  
709  			end = (struct _aarch64_ctx const __user *)userp;
710  			userp += TERMINATOR_SIZE;
711  
712  			__get_user_error(end_magic, &end->magic, err);
713  			__get_user_error(end_size, &end->size, err);
714  			if (err)
715  				return err;
716  
717  			if (end_magic || end_size)
718  				goto invalid;
719  
720  			/* Prevent looping/repeated parsing of extra_context */
721  			have_extra_context = true;
722  
723  			base = (__force void __user *)extra_datap;
724  			if (!IS_ALIGNED((unsigned long)base, 16))
725  				goto invalid;
726  
727  			if (!IS_ALIGNED(extra_size, 16))
728  				goto invalid;
729  
730  			if (base != userp)
731  				goto invalid;
732  
733  			/* Reject "unreasonably large" frames: */
734  			if (extra_size > sfp + SIGFRAME_MAXSZ - userp)
735  				goto invalid;
736  
737  			/*
738  			 * Ignore trailing terminator in __reserved[]
739  			 * and start parsing extra data:
740  			 */
741  			offset = 0;
742  			limit = extra_size;
743  
744  			if (!access_ok(base, limit))
745  				goto invalid;
746  
747  			continue;
748  
749  		default:
750  			goto invalid;
751  		}
752  
753  		if (size < sizeof(*head))
754  			goto invalid;
755  
756  		if (limit - offset < size)
757  			goto invalid;
758  
759  		offset += size;
760  	}
761  
762  done:
763  	return 0;
764  
765  invalid:
766  	return -EINVAL;
767  }
768  
restore_sigframe(struct pt_regs * regs,struct rt_sigframe __user * sf)769  static int restore_sigframe(struct pt_regs *regs,
770  			    struct rt_sigframe __user *sf)
771  {
772  	sigset_t set;
773  	int i, err;
774  	struct user_ctxs user;
775  
776  	err = __copy_from_user(&set, &sf->uc.uc_sigmask, sizeof(set));
777  	if (err == 0)
778  		set_current_blocked(&set);
779  
780  	for (i = 0; i < 31; i++)
781  		__get_user_error(regs->regs[i], &sf->uc.uc_mcontext.regs[i],
782  				 err);
783  	__get_user_error(regs->sp, &sf->uc.uc_mcontext.sp, err);
784  	__get_user_error(regs->pc, &sf->uc.uc_mcontext.pc, err);
785  	__get_user_error(regs->pstate, &sf->uc.uc_mcontext.pstate, err);
786  
787  	/*
788  	 * Avoid sys_rt_sigreturn() restarting.
789  	 */
790  	forget_syscall(regs);
791  
792  	err |= !valid_user_regs(&regs->user_regs, current);
793  	if (err == 0)
794  		err = parse_user_sigframe(&user, sf);
795  
796  	if (err == 0 && system_supports_fpsimd()) {
797  		if (!user.fpsimd)
798  			return -EINVAL;
799  
800  		if (user.sve)
801  			err = restore_sve_fpsimd_context(&user);
802  		else
803  			err = restore_fpsimd_context(&user);
804  	}
805  
806  	if (err == 0 && system_supports_tpidr2() && user.tpidr2)
807  		err = restore_tpidr2_context(&user);
808  
809  	if (err == 0 && system_supports_sme() && user.za)
810  		err = restore_za_context(&user);
811  
812  	if (err == 0 && system_supports_sme2() && user.zt)
813  		err = restore_zt_context(&user);
814  
815  	return err;
816  }
817  
SYSCALL_DEFINE0(rt_sigreturn)818  SYSCALL_DEFINE0(rt_sigreturn)
819  {
820  	struct pt_regs *regs = current_pt_regs();
821  	struct rt_sigframe __user *frame;
822  
823  	/* Always make any pending restarted system calls return -EINTR */
824  	current->restart_block.fn = do_no_restart_syscall;
825  
826  	/*
827  	 * Since we stacked the signal on a 128-bit boundary, then 'sp' should
828  	 * be word aligned here.
829  	 */
830  	if (regs->sp & 15)
831  		goto badframe;
832  
833  	frame = (struct rt_sigframe __user *)regs->sp;
834  
835  	if (!access_ok(frame, sizeof (*frame)))
836  		goto badframe;
837  
838  	if (restore_sigframe(regs, frame))
839  		goto badframe;
840  
841  	if (restore_altstack(&frame->uc.uc_stack))
842  		goto badframe;
843  
844  	return regs->regs[0];
845  
846  badframe:
847  	arm64_notify_segfault(regs->sp);
848  	return 0;
849  }
850  
851  /*
852   * Determine the layout of optional records in the signal frame
853   *
854   * add_all: if true, lays out the biggest possible signal frame for
855   *	this task; otherwise, generates a layout for the current state
856   *	of the task.
857   */
setup_sigframe_layout(struct rt_sigframe_user_layout * user,bool add_all)858  static int setup_sigframe_layout(struct rt_sigframe_user_layout *user,
859  				 bool add_all)
860  {
861  	int err;
862  
863  	if (system_supports_fpsimd()) {
864  		err = sigframe_alloc(user, &user->fpsimd_offset,
865  				     sizeof(struct fpsimd_context));
866  		if (err)
867  			return err;
868  	}
869  
870  	/* fault information, if valid */
871  	if (add_all || current->thread.fault_code) {
872  		err = sigframe_alloc(user, &user->esr_offset,
873  				     sizeof(struct esr_context));
874  		if (err)
875  			return err;
876  	}
877  
878  	if (system_supports_sve() || system_supports_sme()) {
879  		unsigned int vq = 0;
880  
881  		if (add_all || current->thread.fp_type == FP_STATE_SVE ||
882  		    thread_sm_enabled(&current->thread)) {
883  			int vl = max(sve_max_vl(), sme_max_vl());
884  
885  			if (!add_all)
886  				vl = thread_get_cur_vl(&current->thread);
887  
888  			vq = sve_vq_from_vl(vl);
889  		}
890  
891  		err = sigframe_alloc(user, &user->sve_offset,
892  				     SVE_SIG_CONTEXT_SIZE(vq));
893  		if (err)
894  			return err;
895  	}
896  
897  	if (system_supports_tpidr2()) {
898  		err = sigframe_alloc(user, &user->tpidr2_offset,
899  				     sizeof(struct tpidr2_context));
900  		if (err)
901  			return err;
902  	}
903  
904  	if (system_supports_sme()) {
905  		unsigned int vl;
906  		unsigned int vq = 0;
907  
908  		if (add_all)
909  			vl = sme_max_vl();
910  		else
911  			vl = task_get_sme_vl(current);
912  
913  		if (thread_za_enabled(&current->thread))
914  			vq = sve_vq_from_vl(vl);
915  
916  		err = sigframe_alloc(user, &user->za_offset,
917  				     ZA_SIG_CONTEXT_SIZE(vq));
918  		if (err)
919  			return err;
920  	}
921  
922  	if (system_supports_sme2()) {
923  		if (add_all || thread_za_enabled(&current->thread)) {
924  			err = sigframe_alloc(user, &user->zt_offset,
925  					     ZT_SIG_CONTEXT_SIZE(1));
926  			if (err)
927  				return err;
928  		}
929  	}
930  
931  	return sigframe_alloc_end(user);
932  }
933  
setup_sigframe(struct rt_sigframe_user_layout * user,struct pt_regs * regs,sigset_t * set)934  static int setup_sigframe(struct rt_sigframe_user_layout *user,
935  			  struct pt_regs *regs, sigset_t *set)
936  {
937  	int i, err = 0;
938  	struct rt_sigframe __user *sf = user->sigframe;
939  
940  	/* set up the stack frame for unwinding */
941  	__put_user_error(regs->regs[29], &user->next_frame->fp, err);
942  	__put_user_error(regs->regs[30], &user->next_frame->lr, err);
943  
944  	for (i = 0; i < 31; i++)
945  		__put_user_error(regs->regs[i], &sf->uc.uc_mcontext.regs[i],
946  				 err);
947  	__put_user_error(regs->sp, &sf->uc.uc_mcontext.sp, err);
948  	__put_user_error(regs->pc, &sf->uc.uc_mcontext.pc, err);
949  	__put_user_error(regs->pstate, &sf->uc.uc_mcontext.pstate, err);
950  
951  	__put_user_error(current->thread.fault_address, &sf->uc.uc_mcontext.fault_address, err);
952  
953  	err |= __copy_to_user(&sf->uc.uc_sigmask, set, sizeof(*set));
954  
955  	if (err == 0 && system_supports_fpsimd()) {
956  		struct fpsimd_context __user *fpsimd_ctx =
957  			apply_user_offset(user, user->fpsimd_offset);
958  		err |= preserve_fpsimd_context(fpsimd_ctx);
959  	}
960  
961  	/* fault information, if valid */
962  	if (err == 0 && user->esr_offset) {
963  		struct esr_context __user *esr_ctx =
964  			apply_user_offset(user, user->esr_offset);
965  
966  		__put_user_error(ESR_MAGIC, &esr_ctx->head.magic, err);
967  		__put_user_error(sizeof(*esr_ctx), &esr_ctx->head.size, err);
968  		__put_user_error(current->thread.fault_code, &esr_ctx->esr, err);
969  	}
970  
971  	/* Scalable Vector Extension state (including streaming), if present */
972  	if ((system_supports_sve() || system_supports_sme()) &&
973  	    err == 0 && user->sve_offset) {
974  		struct sve_context __user *sve_ctx =
975  			apply_user_offset(user, user->sve_offset);
976  		err |= preserve_sve_context(sve_ctx);
977  	}
978  
979  	/* TPIDR2 if supported */
980  	if (system_supports_tpidr2() && err == 0) {
981  		struct tpidr2_context __user *tpidr2_ctx =
982  			apply_user_offset(user, user->tpidr2_offset);
983  		err |= preserve_tpidr2_context(tpidr2_ctx);
984  	}
985  
986  	/* ZA state if present */
987  	if (system_supports_sme() && err == 0 && user->za_offset) {
988  		struct za_context __user *za_ctx =
989  			apply_user_offset(user, user->za_offset);
990  		err |= preserve_za_context(za_ctx);
991  	}
992  
993  	/* ZT state if present */
994  	if (system_supports_sme2() && err == 0 && user->zt_offset) {
995  		struct zt_context __user *zt_ctx =
996  			apply_user_offset(user, user->zt_offset);
997  		err |= preserve_zt_context(zt_ctx);
998  	}
999  
1000  	if (err == 0 && user->extra_offset) {
1001  		char __user *sfp = (char __user *)user->sigframe;
1002  		char __user *userp =
1003  			apply_user_offset(user, user->extra_offset);
1004  
1005  		struct extra_context __user *extra;
1006  		struct _aarch64_ctx __user *end;
1007  		u64 extra_datap;
1008  		u32 extra_size;
1009  
1010  		extra = (struct extra_context __user *)userp;
1011  		userp += EXTRA_CONTEXT_SIZE;
1012  
1013  		end = (struct _aarch64_ctx __user *)userp;
1014  		userp += TERMINATOR_SIZE;
1015  
1016  		/*
1017  		 * extra_datap is just written to the signal frame.
1018  		 * The value gets cast back to a void __user *
1019  		 * during sigreturn.
1020  		 */
1021  		extra_datap = (__force u64)userp;
1022  		extra_size = sfp + round_up(user->size, 16) - userp;
1023  
1024  		__put_user_error(EXTRA_MAGIC, &extra->head.magic, err);
1025  		__put_user_error(EXTRA_CONTEXT_SIZE, &extra->head.size, err);
1026  		__put_user_error(extra_datap, &extra->datap, err);
1027  		__put_user_error(extra_size, &extra->size, err);
1028  
1029  		/* Add the terminator */
1030  		__put_user_error(0, &end->magic, err);
1031  		__put_user_error(0, &end->size, err);
1032  	}
1033  
1034  	/* set the "end" magic */
1035  	if (err == 0) {
1036  		struct _aarch64_ctx __user *end =
1037  			apply_user_offset(user, user->end_offset);
1038  
1039  		__put_user_error(0, &end->magic, err);
1040  		__put_user_error(0, &end->size, err);
1041  	}
1042  
1043  	return err;
1044  }
1045  
get_sigframe(struct rt_sigframe_user_layout * user,struct ksignal * ksig,struct pt_regs * regs)1046  static int get_sigframe(struct rt_sigframe_user_layout *user,
1047  			 struct ksignal *ksig, struct pt_regs *regs)
1048  {
1049  	unsigned long sp, sp_top;
1050  	int err;
1051  
1052  	init_user_layout(user);
1053  	err = setup_sigframe_layout(user, false);
1054  	if (err)
1055  		return err;
1056  
1057  	sp = sp_top = sigsp(regs->sp, ksig);
1058  
1059  	sp = round_down(sp - sizeof(struct frame_record), 16);
1060  	user->next_frame = (struct frame_record __user *)sp;
1061  
1062  	sp = round_down(sp, 16) - sigframe_size(user);
1063  	user->sigframe = (struct rt_sigframe __user *)sp;
1064  
1065  	/*
1066  	 * Check that we can actually write to the signal frame.
1067  	 */
1068  	if (!access_ok(user->sigframe, sp_top - sp))
1069  		return -EFAULT;
1070  
1071  	return 0;
1072  }
1073  
setup_return(struct pt_regs * regs,struct k_sigaction * ka,struct rt_sigframe_user_layout * user,int usig)1074  static void setup_return(struct pt_regs *regs, struct k_sigaction *ka,
1075  			 struct rt_sigframe_user_layout *user, int usig)
1076  {
1077  	__sigrestore_t sigtramp;
1078  
1079  	regs->regs[0] = usig;
1080  	regs->sp = (unsigned long)user->sigframe;
1081  	regs->regs[29] = (unsigned long)&user->next_frame->fp;
1082  	regs->pc = (unsigned long)ka->sa.sa_handler;
1083  
1084  	/*
1085  	 * Signal delivery is a (wacky) indirect function call in
1086  	 * userspace, so simulate the same setting of BTYPE as a BLR
1087  	 * <register containing the signal handler entry point>.
1088  	 * Signal delivery to a location in a PROT_BTI guarded page
1089  	 * that is not a function entry point will now trigger a
1090  	 * SIGILL in userspace.
1091  	 *
1092  	 * If the signal handler entry point is not in a PROT_BTI
1093  	 * guarded page, this is harmless.
1094  	 */
1095  	if (system_supports_bti()) {
1096  		regs->pstate &= ~PSR_BTYPE_MASK;
1097  		regs->pstate |= PSR_BTYPE_C;
1098  	}
1099  
1100  	/* TCO (Tag Check Override) always cleared for signal handlers */
1101  	regs->pstate &= ~PSR_TCO_BIT;
1102  
1103  	/* Signal handlers are invoked with ZA and streaming mode disabled */
1104  	if (system_supports_sme()) {
1105  		/*
1106  		 * If we were in streaming mode the saved register
1107  		 * state was SVE but we will exit SM and use the
1108  		 * FPSIMD register state - flush the saved FPSIMD
1109  		 * register state in case it gets loaded.
1110  		 */
1111  		if (current->thread.svcr & SVCR_SM_MASK) {
1112  			memset(&current->thread.uw.fpsimd_state, 0,
1113  			       sizeof(current->thread.uw.fpsimd_state));
1114  			current->thread.fp_type = FP_STATE_FPSIMD;
1115  		}
1116  
1117  		current->thread.svcr &= ~(SVCR_ZA_MASK |
1118  					  SVCR_SM_MASK);
1119  		sme_smstop();
1120  	}
1121  
1122  	if (ka->sa.sa_flags & SA_RESTORER)
1123  		sigtramp = ka->sa.sa_restorer;
1124  	else
1125  		sigtramp = VDSO_SYMBOL(current->mm->context.vdso, sigtramp);
1126  
1127  	regs->regs[30] = (unsigned long)sigtramp;
1128  }
1129  
setup_rt_frame(int usig,struct ksignal * ksig,sigset_t * set,struct pt_regs * regs)1130  static int setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set,
1131  			  struct pt_regs *regs)
1132  {
1133  	struct rt_sigframe_user_layout user;
1134  	struct rt_sigframe __user *frame;
1135  	int err = 0;
1136  
1137  	fpsimd_signal_preserve_current_state();
1138  
1139  	if (get_sigframe(&user, ksig, regs))
1140  		return 1;
1141  
1142  	frame = user.sigframe;
1143  
1144  	__put_user_error(0, &frame->uc.uc_flags, err);
1145  	__put_user_error(NULL, &frame->uc.uc_link, err);
1146  
1147  	err |= __save_altstack(&frame->uc.uc_stack, regs->sp);
1148  	err |= setup_sigframe(&user, regs, set);
1149  	if (err == 0) {
1150  		setup_return(regs, &ksig->ka, &user, usig);
1151  		if (ksig->ka.sa.sa_flags & SA_SIGINFO) {
1152  			err |= copy_siginfo_to_user(&frame->info, &ksig->info);
1153  			regs->regs[1] = (unsigned long)&frame->info;
1154  			regs->regs[2] = (unsigned long)&frame->uc;
1155  		}
1156  	}
1157  
1158  	return err;
1159  }
1160  
setup_restart_syscall(struct pt_regs * regs)1161  static void setup_restart_syscall(struct pt_regs *regs)
1162  {
1163  	if (is_compat_task())
1164  		compat_setup_restart_syscall(regs);
1165  	else
1166  		regs->regs[8] = __NR_restart_syscall;
1167  }
1168  
1169  /*
1170   * OK, we're invoking a handler
1171   */
handle_signal(struct ksignal * ksig,struct pt_regs * regs)1172  static void handle_signal(struct ksignal *ksig, struct pt_regs *regs)
1173  {
1174  	sigset_t *oldset = sigmask_to_save();
1175  	int usig = ksig->sig;
1176  	int ret;
1177  
1178  	rseq_signal_deliver(ksig, regs);
1179  
1180  	/*
1181  	 * Set up the stack frame
1182  	 */
1183  	if (is_compat_task()) {
1184  		if (ksig->ka.sa.sa_flags & SA_SIGINFO)
1185  			ret = compat_setup_rt_frame(usig, ksig, oldset, regs);
1186  		else
1187  			ret = compat_setup_frame(usig, ksig, oldset, regs);
1188  	} else {
1189  		ret = setup_rt_frame(usig, ksig, oldset, regs);
1190  	}
1191  
1192  	/*
1193  	 * Check that the resulting registers are actually sane.
1194  	 */
1195  	ret |= !valid_user_regs(&regs->user_regs, current);
1196  
1197  	/* Step into the signal handler if we are stepping */
1198  	signal_setup_done(ret, ksig, test_thread_flag(TIF_SINGLESTEP));
1199  }
1200  
1201  /*
1202   * Note that 'init' is a special process: it doesn't get signals it doesn't
1203   * want to handle. Thus you cannot kill init even with a SIGKILL even by
1204   * mistake.
1205   *
1206   * Note that we go through the signals twice: once to check the signals that
1207   * the kernel can handle, and then we build all the user-level signal handling
1208   * stack-frames in one go after that.
1209   */
do_signal(struct pt_regs * regs)1210  static void do_signal(struct pt_regs *regs)
1211  {
1212  	unsigned long continue_addr = 0, restart_addr = 0;
1213  	int retval = 0;
1214  	struct ksignal ksig;
1215  	bool syscall = in_syscall(regs);
1216  
1217  	/*
1218  	 * If we were from a system call, check for system call restarting...
1219  	 */
1220  	if (syscall) {
1221  		continue_addr = regs->pc;
1222  		restart_addr = continue_addr - (compat_thumb_mode(regs) ? 2 : 4);
1223  		retval = regs->regs[0];
1224  
1225  		/*
1226  		 * Avoid additional syscall restarting via ret_to_user.
1227  		 */
1228  		forget_syscall(regs);
1229  
1230  		/*
1231  		 * Prepare for system call restart. We do this here so that a
1232  		 * debugger will see the already changed PC.
1233  		 */
1234  		switch (retval) {
1235  		case -ERESTARTNOHAND:
1236  		case -ERESTARTSYS:
1237  		case -ERESTARTNOINTR:
1238  		case -ERESTART_RESTARTBLOCK:
1239  			regs->regs[0] = regs->orig_x0;
1240  			regs->pc = restart_addr;
1241  			break;
1242  		}
1243  	}
1244  
1245  	/*
1246  	 * Get the signal to deliver. When running under ptrace, at this point
1247  	 * the debugger may change all of our registers.
1248  	 */
1249  	if (get_signal(&ksig)) {
1250  		/*
1251  		 * Depending on the signal settings, we may need to revert the
1252  		 * decision to restart the system call, but skip this if a
1253  		 * debugger has chosen to restart at a different PC.
1254  		 */
1255  		if (regs->pc == restart_addr &&
1256  		    (retval == -ERESTARTNOHAND ||
1257  		     retval == -ERESTART_RESTARTBLOCK ||
1258  		     (retval == -ERESTARTSYS &&
1259  		      !(ksig.ka.sa.sa_flags & SA_RESTART)))) {
1260  			syscall_set_return_value(current, regs, -EINTR, 0);
1261  			regs->pc = continue_addr;
1262  		}
1263  
1264  		handle_signal(&ksig, regs);
1265  		return;
1266  	}
1267  
1268  	/*
1269  	 * Handle restarting a different system call. As above, if a debugger
1270  	 * has chosen to restart at a different PC, ignore the restart.
1271  	 */
1272  	if (syscall && regs->pc == restart_addr) {
1273  		if (retval == -ERESTART_RESTARTBLOCK)
1274  			setup_restart_syscall(regs);
1275  		user_rewind_single_step(current);
1276  	}
1277  
1278  	restore_saved_sigmask();
1279  }
1280  
do_notify_resume(struct pt_regs * regs,unsigned long thread_flags)1281  void do_notify_resume(struct pt_regs *regs, unsigned long thread_flags)
1282  {
1283  	do {
1284  		if (thread_flags & _TIF_NEED_RESCHED) {
1285  			/* Unmask Debug and SError for the next task */
1286  			local_daif_restore(DAIF_PROCCTX_NOIRQ);
1287  
1288  			schedule();
1289  		} else {
1290  			local_daif_restore(DAIF_PROCCTX);
1291  
1292  			if (thread_flags & _TIF_UPROBE)
1293  				uprobe_notify_resume(regs);
1294  
1295  			if (thread_flags & _TIF_MTE_ASYNC_FAULT) {
1296  				clear_thread_flag(TIF_MTE_ASYNC_FAULT);
1297  				send_sig_fault(SIGSEGV, SEGV_MTEAERR,
1298  					       (void __user *)NULL, current);
1299  			}
1300  
1301  			if (thread_flags & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL))
1302  				do_signal(regs);
1303  
1304  			if (thread_flags & _TIF_NOTIFY_RESUME)
1305  				resume_user_mode_work(regs);
1306  
1307  			if (thread_flags & _TIF_FOREIGN_FPSTATE)
1308  				fpsimd_restore_current_state();
1309  		}
1310  
1311  		local_daif_mask();
1312  		thread_flags = read_thread_flags();
1313  	} while (thread_flags & _TIF_WORK_MASK);
1314  }
1315  
1316  unsigned long __ro_after_init signal_minsigstksz;
1317  
1318  /*
1319   * Determine the stack space required for guaranteed signal devliery.
1320   * This function is used to populate AT_MINSIGSTKSZ at process startup.
1321   * cpufeatures setup is assumed to be complete.
1322   */
minsigstksz_setup(void)1323  void __init minsigstksz_setup(void)
1324  {
1325  	struct rt_sigframe_user_layout user;
1326  
1327  	init_user_layout(&user);
1328  
1329  	/*
1330  	 * If this fails, SIGFRAME_MAXSZ needs to be enlarged.  It won't
1331  	 * be big enough, but it's our best guess:
1332  	 */
1333  	if (WARN_ON(setup_sigframe_layout(&user, true)))
1334  		return;
1335  
1336  	signal_minsigstksz = sigframe_size(&user) +
1337  		round_up(sizeof(struct frame_record), 16) +
1338  		16; /* max alignment padding */
1339  }
1340  
1341  /*
1342   * Compile-time assertions for siginfo_t offsets. Check NSIG* as well, as
1343   * changes likely come with new fields that should be added below.
1344   */
1345  static_assert(NSIGILL	== 11);
1346  static_assert(NSIGFPE	== 15);
1347  static_assert(NSIGSEGV	== 10);
1348  static_assert(NSIGBUS	== 5);
1349  static_assert(NSIGTRAP	== 6);
1350  static_assert(NSIGCHLD	== 6);
1351  static_assert(NSIGSYS	== 2);
1352  static_assert(sizeof(siginfo_t) == 128);
1353  static_assert(__alignof__(siginfo_t) == 8);
1354  static_assert(offsetof(siginfo_t, si_signo)	== 0x00);
1355  static_assert(offsetof(siginfo_t, si_errno)	== 0x04);
1356  static_assert(offsetof(siginfo_t, si_code)	== 0x08);
1357  static_assert(offsetof(siginfo_t, si_pid)	== 0x10);
1358  static_assert(offsetof(siginfo_t, si_uid)	== 0x14);
1359  static_assert(offsetof(siginfo_t, si_tid)	== 0x10);
1360  static_assert(offsetof(siginfo_t, si_overrun)	== 0x14);
1361  static_assert(offsetof(siginfo_t, si_status)	== 0x18);
1362  static_assert(offsetof(siginfo_t, si_utime)	== 0x20);
1363  static_assert(offsetof(siginfo_t, si_stime)	== 0x28);
1364  static_assert(offsetof(siginfo_t, si_value)	== 0x18);
1365  static_assert(offsetof(siginfo_t, si_int)	== 0x18);
1366  static_assert(offsetof(siginfo_t, si_ptr)	== 0x18);
1367  static_assert(offsetof(siginfo_t, si_addr)	== 0x10);
1368  static_assert(offsetof(siginfo_t, si_addr_lsb)	== 0x18);
1369  static_assert(offsetof(siginfo_t, si_lower)	== 0x20);
1370  static_assert(offsetof(siginfo_t, si_upper)	== 0x28);
1371  static_assert(offsetof(siginfo_t, si_pkey)	== 0x20);
1372  static_assert(offsetof(siginfo_t, si_perf_data)	== 0x18);
1373  static_assert(offsetof(siginfo_t, si_perf_type)	== 0x20);
1374  static_assert(offsetof(siginfo_t, si_perf_flags) == 0x24);
1375  static_assert(offsetof(siginfo_t, si_band)	== 0x10);
1376  static_assert(offsetof(siginfo_t, si_fd)	== 0x18);
1377  static_assert(offsetof(siginfo_t, si_call_addr)	== 0x10);
1378  static_assert(offsetof(siginfo_t, si_syscall)	== 0x18);
1379  static_assert(offsetof(siginfo_t, si_arch)	== 0x1c);
1380