1d2912cb1SThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
24adeefe1SVineet Gupta /*
34adeefe1SVineet Gupta * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com)
44adeefe1SVineet Gupta *
54adeefe1SVineet Gupta * Amit Bhor, Kanika Nema: Codito Technologies 2004
64adeefe1SVineet Gupta */
74adeefe1SVineet Gupta
84adeefe1SVineet Gupta #include <linux/errno.h>
94adeefe1SVineet Gupta #include <linux/module.h>
104adeefe1SVineet Gupta #include <linux/sched.h>
1129930025SIngo Molnar #include <linux/sched/task.h>
1268db0cf1SIngo Molnar #include <linux/sched/task_stack.h>
1329930025SIngo Molnar
144adeefe1SVineet Gupta #include <linux/mm.h>
154adeefe1SVineet Gupta #include <linux/fs.h>
164adeefe1SVineet Gupta #include <linux/unistd.h>
174adeefe1SVineet Gupta #include <linux/ptrace.h>
184adeefe1SVineet Gupta #include <linux/slab.h>
194adeefe1SVineet Gupta #include <linux/syscalls.h>
204adeefe1SVineet Gupta #include <linux/elf.h>
214adeefe1SVineet Gupta #include <linux/tick.h>
224adeefe1SVineet Gupta
23f45ba2bdSVineet Gupta #include <asm/fpu.h>
24f45ba2bdSVineet Gupta
SYSCALL_DEFINE1(arc_settls,void *,user_tls_data_ptr)254adeefe1SVineet Gupta SYSCALL_DEFINE1(arc_settls, void *, user_tls_data_ptr)
264adeefe1SVineet Gupta {
274adeefe1SVineet Gupta task_thread_info(current)->thr_ptr = (unsigned int)user_tls_data_ptr;
284adeefe1SVineet Gupta return 0;
294adeefe1SVineet Gupta }
304adeefe1SVineet Gupta
314adeefe1SVineet Gupta /*
324adeefe1SVineet Gupta * We return the user space TLS data ptr as sys-call return code
334adeefe1SVineet Gupta * Ideally it should be copy to user.
344adeefe1SVineet Gupta * However we can cheat by the fact that some sys-calls do return
354adeefe1SVineet Gupta * absurdly high values
364adeefe1SVineet Gupta * Since the tls dat aptr is not going to be in range of 0xFFFF_xxxx
374adeefe1SVineet Gupta * it won't be considered a sys-call error
384adeefe1SVineet Gupta * and it will be loads better than copy-to-user, which is a definite
394adeefe1SVineet Gupta * D-TLB Miss
404adeefe1SVineet Gupta */
SYSCALL_DEFINE0(arc_gettls)414adeefe1SVineet Gupta SYSCALL_DEFINE0(arc_gettls)
424adeefe1SVineet Gupta {
434adeefe1SVineet Gupta return task_thread_info(current)->thr_ptr;
444adeefe1SVineet Gupta }
45bf90e1eaSVineet Gupta
SYSCALL_DEFINE3(arc_usr_cmpxchg,int __user *,uaddr,int,expected,int,new)4623fc539eSArnd Bergmann SYSCALL_DEFINE3(arc_usr_cmpxchg, int __user *, uaddr, int, expected, int, new)
4791e040a7SVineet Gupta {
48e6e335bfSVineet Gupta struct pt_regs *regs = current_pt_regs();
49e8708786SPeter Zijlstra u32 uval;
50e8708786SPeter Zijlstra int ret;
5191e040a7SVineet Gupta
5291e040a7SVineet Gupta /*
53f79f7a2dSBhaskar Chowdhury * This is only for old cores lacking LLOCK/SCOND, which by definition
5491e040a7SVineet Gupta * can't possibly be SMP. Thus doesn't need to be SMP safe.
5591e040a7SVineet Gupta * And this also helps reduce the overhead for serializing in
5691e040a7SVineet Gupta * the UP case
5791e040a7SVineet Gupta */
5891e040a7SVineet Gupta WARN_ON_ONCE(IS_ENABLED(CONFIG_SMP));
5991e040a7SVineet Gupta
60f79f7a2dSBhaskar Chowdhury /* Z indicates to userspace if operation succeeded */
61e6e335bfSVineet Gupta regs->status32 &= ~STATUS_Z_MASK;
62e6e335bfSVineet Gupta
6396d4f267SLinus Torvalds ret = access_ok(uaddr, sizeof(*uaddr));
64e8708786SPeter Zijlstra if (!ret)
65e8708786SPeter Zijlstra goto fail;
6691e040a7SVineet Gupta
67e8708786SPeter Zijlstra again:
6891e040a7SVineet Gupta preempt_disable();
6991e040a7SVineet Gupta
70e8708786SPeter Zijlstra ret = __get_user(uval, uaddr);
71e8708786SPeter Zijlstra if (ret)
72e8708786SPeter Zijlstra goto fault;
7391e040a7SVineet Gupta
74e8708786SPeter Zijlstra if (uval != expected)
75e8708786SPeter Zijlstra goto out;
76e8708786SPeter Zijlstra
77e8708786SPeter Zijlstra ret = __put_user(new, uaddr);
78e8708786SPeter Zijlstra if (ret)
79e8708786SPeter Zijlstra goto fault;
80e8708786SPeter Zijlstra
81e6e335bfSVineet Gupta regs->status32 |= STATUS_Z_MASK;
8291e040a7SVineet Gupta
83e8708786SPeter Zijlstra out:
84e8708786SPeter Zijlstra preempt_enable();
85e8708786SPeter Zijlstra return uval;
86e8708786SPeter Zijlstra
87e8708786SPeter Zijlstra fault:
8891e040a7SVineet Gupta preempt_enable();
8991e040a7SVineet Gupta
90e8708786SPeter Zijlstra if (unlikely(ret != -EFAULT))
91e8708786SPeter Zijlstra goto fail;
92e8708786SPeter Zijlstra
93d8ed45c5SMichel Lespinasse mmap_read_lock(current->mm);
9464019a2eSPeter Xu ret = fixup_user_fault(current->mm, (unsigned long) uaddr,
95e8708786SPeter Zijlstra FAULT_FLAG_WRITE, NULL);
96d8ed45c5SMichel Lespinasse mmap_read_unlock(current->mm);
97e8708786SPeter Zijlstra
98e8708786SPeter Zijlstra if (likely(!ret))
99e8708786SPeter Zijlstra goto again;
100e8708786SPeter Zijlstra
101e8708786SPeter Zijlstra fail:
1023cf5d076SEric W. Biederman force_sig(SIGSEGV);
103e8708786SPeter Zijlstra return ret;
10491e040a7SVineet Gupta }
10591e040a7SVineet Gupta
10664f42cecSVineet Gupta #ifdef CONFIG_ISA_ARCV2
10764f42cecSVineet Gupta
arch_cpu_idle(void)108fa35e42aSThomas Gleixner void arch_cpu_idle(void)
109bf90e1eaSVineet Gupta {
110f79f7a2dSBhaskar Chowdhury /* Re-enable interrupts <= default irq priority before committing SLEEP */
11164f42cecSVineet Gupta const unsigned int arg = 0x10 | ARCV2_IRQ_DEF_PRIO;
11264f42cecSVineet Gupta
113512b5b89SVineet Gupta __asm__ __volatile__(
114512b5b89SVineet Gupta "sleep %0 \n"
115512b5b89SVineet Gupta :
11664f42cecSVineet Gupta :"I"(arg)); /* can't be "r" has to be embedded const */
11789b30987SPeter Zijlstra
11889b30987SPeter Zijlstra raw_local_irq_disable();
119bf90e1eaSVineet Gupta }
120bf90e1eaSVineet Gupta
121644fa02bSNoam Camus #else /* ARC700 */
12264f42cecSVineet Gupta
arch_cpu_idle(void)12364f42cecSVineet Gupta void arch_cpu_idle(void)
12464f42cecSVineet Gupta {
125f79f7a2dSBhaskar Chowdhury /* sleep, but enable both set E1/E2 (levels of interrupts) before committing */
12664f42cecSVineet Gupta __asm__ __volatile__("sleep 0x3 \n");
12789b30987SPeter Zijlstra raw_local_irq_disable();
12864f42cecSVineet Gupta }
12964f42cecSVineet Gupta
13064f42cecSVineet Gupta #endif
13164f42cecSVineet Gupta
132bf90e1eaSVineet Gupta asmlinkage void ret_from_fork(void);
133bf90e1eaSVineet Gupta
13418e1d1b1SAlex Dowad /*
13518e1d1b1SAlex Dowad * Copy architecture-specific thread state
13618e1d1b1SAlex Dowad *
13718e1d1b1SAlex Dowad * Layout of Child kernel mode stack as setup at the end of this function is
138bf90e1eaSVineet Gupta *
139bf90e1eaSVineet Gupta * | ... |
140bf90e1eaSVineet Gupta * | ... |
141bf90e1eaSVineet Gupta * | unused |
142bf90e1eaSVineet Gupta * | |
143bf90e1eaSVineet Gupta * ------------------
144*fd476197SVineet Gupta * | r25 | <==== top of Stack (thread_info.ksp)
145bf90e1eaSVineet Gupta * ~ ~
14609074950SVineet Gupta * | --to-- | (CALLEE Regs of kernel mode)
147bf90e1eaSVineet Gupta * | r13 |
148bf90e1eaSVineet Gupta * ------------------
149bf90e1eaSVineet Gupta * | fp |
150bf90e1eaSVineet Gupta * | blink | @ret_from_fork
151bf90e1eaSVineet Gupta * ------------------
152bf90e1eaSVineet Gupta * | |
153bf90e1eaSVineet Gupta * ~ ~
154bf90e1eaSVineet Gupta * ~ ~
155bf90e1eaSVineet Gupta * | |
156bf90e1eaSVineet Gupta * ------------------
157bf90e1eaSVineet Gupta * | r12 |
158bf90e1eaSVineet Gupta * ~ ~
159bf90e1eaSVineet Gupta * | --to-- | (scratch Regs of user mode)
160bf90e1eaSVineet Gupta * | r0 |
1613ebedbb2SVineet Gupta * ------------------
1623ebedbb2SVineet Gupta * | SP |
1633ebedbb2SVineet Gupta * | orig_r0 |
164502a0c77SVineet Gupta * | event/ECR |
165bf90e1eaSVineet Gupta * ------------------ <===== END of PAGE
166bf90e1eaSVineet Gupta */
copy_thread(struct task_struct * p,const struct kernel_clone_args * args)167c5febea0SEric W. Biederman int copy_thread(struct task_struct *p, const struct kernel_clone_args *args)
168bf90e1eaSVineet Gupta {
169c5febea0SEric W. Biederman unsigned long clone_flags = args->flags;
170c5febea0SEric W. Biederman unsigned long usp = args->stack;
171c5febea0SEric W. Biederman unsigned long tls = args->tls;
172bf90e1eaSVineet Gupta struct pt_regs *c_regs; /* child's pt_regs */
173bf90e1eaSVineet Gupta unsigned long *childksp; /* to unwind out of __switch_to() */
174bf90e1eaSVineet Gupta struct callee_regs *c_callee; /* child's callee regs */
175bf90e1eaSVineet Gupta struct callee_regs *parent_callee; /* paren't callee */
176bf90e1eaSVineet Gupta struct pt_regs *regs = current_pt_regs();
177bf90e1eaSVineet Gupta
178bf90e1eaSVineet Gupta /* Mark the specific anchors to begin with (see pic above) */
179bf90e1eaSVineet Gupta c_regs = task_pt_regs(p);
180bf90e1eaSVineet Gupta childksp = (unsigned long *)c_regs - 2; /* 2 words for FP/BLINK */
181bf90e1eaSVineet Gupta c_callee = ((struct callee_regs *)childksp) - 1;
182bf90e1eaSVineet Gupta
183bf90e1eaSVineet Gupta /*
184*fd476197SVineet Gupta * __switch_to() uses thread_info.ksp to start unwinding stack
185bf90e1eaSVineet Gupta * For kernel threads we don't need to create callee regs, the
186bf90e1eaSVineet Gupta * stack layout nevertheless needs to remain the same.
187bf90e1eaSVineet Gupta * Also, since __switch_to anyways unwinds callee regs, we use
188bf90e1eaSVineet Gupta * this to populate kernel thread entry-pt/args into callee regs,
189bf90e1eaSVineet Gupta * so that ret_from_kernel_thread() becomes simpler.
190bf90e1eaSVineet Gupta */
191*fd476197SVineet Gupta task_thread_info(p)->ksp = (unsigned long)c_callee; /* THREAD_INFO_KSP */
192bf90e1eaSVineet Gupta
193bf90e1eaSVineet Gupta /* __switch_to expects FP(0), BLINK(return addr) at top */
194bf90e1eaSVineet Gupta childksp[0] = 0; /* fp */
195bf90e1eaSVineet Gupta childksp[1] = (unsigned long)ret_from_fork; /* blink */
196bf90e1eaSVineet Gupta
1975bd2e97cSEric W. Biederman if (unlikely(args->fn)) {
198bf90e1eaSVineet Gupta memset(c_regs, 0, sizeof(struct pt_regs));
199bf90e1eaSVineet Gupta
2005bd2e97cSEric W. Biederman c_callee->r13 = (unsigned long)args->fn_arg;
2015bd2e97cSEric W. Biederman c_callee->r14 = (unsigned long)args->fn;
202bf90e1eaSVineet Gupta
203bf90e1eaSVineet Gupta return 0;
204bf90e1eaSVineet Gupta }
205bf90e1eaSVineet Gupta
206bf90e1eaSVineet Gupta /*--------- User Task Only --------------*/
207bf90e1eaSVineet Gupta
208bf90e1eaSVineet Gupta /* __switch_to expects FP(0), BLINK(return addr) at top of stack */
209bf90e1eaSVineet Gupta childksp[0] = 0; /* for POP fp */
210bf90e1eaSVineet Gupta childksp[1] = (unsigned long)ret_from_fork; /* for POP blink */
211bf90e1eaSVineet Gupta
212bf90e1eaSVineet Gupta /* Copy parents pt regs on child's kernel mode stack */
213bf90e1eaSVineet Gupta *c_regs = *regs;
214bf90e1eaSVineet Gupta
215bf90e1eaSVineet Gupta if (usp)
216bf90e1eaSVineet Gupta c_regs->sp = usp;
217bf90e1eaSVineet Gupta
218bf90e1eaSVineet Gupta c_regs->r0 = 0; /* fork returns 0 in child */
219bf90e1eaSVineet Gupta
220bf90e1eaSVineet Gupta parent_callee = ((struct callee_regs *)regs) - 1;
221bf90e1eaSVineet Gupta *c_callee = *parent_callee;
222bf90e1eaSVineet Gupta
223bf90e1eaSVineet Gupta if (unlikely(clone_flags & CLONE_SETTLS)) {
224bf90e1eaSVineet Gupta /*
225bf90e1eaSVineet Gupta * set task's userland tls data ptr from 4th arg
226bf90e1eaSVineet Gupta * clone C-lib call is difft from clone sys-call
227bf90e1eaSVineet Gupta */
228bd71c453SVineet Gupta task_thread_info(p)->thr_ptr = tls;
229bf90e1eaSVineet Gupta } else {
230bf90e1eaSVineet Gupta /* Normal fork case: set parent's TLS ptr in child */
231bf90e1eaSVineet Gupta task_thread_info(p)->thr_ptr =
232bf90e1eaSVineet Gupta task_thread_info(current)->thr_ptr;
233bf90e1eaSVineet Gupta }
234bf90e1eaSVineet Gupta
235c58a584fSVineet Gupta
236c58a584fSVineet Gupta /*
237c58a584fSVineet Gupta * setup usermode thread pointer #1:
238c58a584fSVineet Gupta * when child is picked by scheduler, __switch_to() uses @c_callee to
239c58a584fSVineet Gupta * populate usermode callee regs: this works (despite being in a kernel
240c58a584fSVineet Gupta * function) since special return path for child @ret_from_fork()
241c58a584fSVineet Gupta * ensures those regs are not clobbered all the way to RTIE to usermode
242c58a584fSVineet Gupta */
243c58a584fSVineet Gupta c_callee->r25 = task_thread_info(p)->thr_ptr;
244c58a584fSVineet Gupta
245bf90e1eaSVineet Gupta return 0;
246bf90e1eaSVineet Gupta }
247bf90e1eaSVineet Gupta
248bf90e1eaSVineet Gupta /*
2492ab402dfSVineet Gupta * Do necessary setup to start up a new user task
2502ab402dfSVineet Gupta */
start_thread(struct pt_regs * regs,unsigned long pc,unsigned long usp)2512ab402dfSVineet Gupta void start_thread(struct pt_regs *regs, unsigned long pc, unsigned long usp)
2522ab402dfSVineet Gupta {
2532ab402dfSVineet Gupta regs->sp = usp;
2542ab402dfSVineet Gupta regs->ret = pc;
2552ab402dfSVineet Gupta
2562ab402dfSVineet Gupta /*
2572ab402dfSVineet Gupta * [U]ser Mode bit set
2582ab402dfSVineet Gupta * [L] ZOL loop inhibited to begin with - cleared by a LP insn
2592ab402dfSVineet Gupta * Interrupts enabled
2602ab402dfSVineet Gupta */
2611f6ccfffSVineet Gupta regs->status32 = STATUS_U_MASK | STATUS_L_MASK | ISA_INIT_STATUS_BITS;
2622ab402dfSVineet Gupta
263f45ba2bdSVineet Gupta fpu_init_task(regs);
264f45ba2bdSVineet Gupta
2652ab402dfSVineet Gupta /* bogus seed values for debugging */
2662ab402dfSVineet Gupta regs->lp_start = 0x10;
2672ab402dfSVineet Gupta regs->lp_end = 0x80;
2682ab402dfSVineet Gupta }
2692ab402dfSVineet Gupta
2702ab402dfSVineet Gupta /*
271bf90e1eaSVineet Gupta * Some archs flush debug and FPU info here
272bf90e1eaSVineet Gupta */
flush_thread(void)273bf90e1eaSVineet Gupta void flush_thread(void)
274bf90e1eaSVineet Gupta {
275bf90e1eaSVineet Gupta }
276bf90e1eaSVineet Gupta
elf_check_arch(const struct elf32_hdr * x)277bf90e1eaSVineet Gupta int elf_check_arch(const struct elf32_hdr *x)
278bf90e1eaSVineet Gupta {
279bf90e1eaSVineet Gupta unsigned int eflags;
280bf90e1eaSVineet Gupta
2811f6ccfffSVineet Gupta if (x->e_machine != EM_ARC_INUSE) {
2821f6ccfffSVineet Gupta pr_err("ELF not built for %s ISA\n",
2831f6ccfffSVineet Gupta is_isa_arcompact() ? "ARCompact":"ARCv2");
284bf90e1eaSVineet Gupta return 0;
2851f6ccfffSVineet Gupta }
286bf90e1eaSVineet Gupta
287bf90e1eaSVineet Gupta eflags = x->e_flags;
288840c054fSVineet Gupta if ((eflags & EF_ARC_OSABI_MSK) != EF_ARC_OSABI_CURRENT) {
289bf90e1eaSVineet Gupta pr_err("ABI mismatch - you need newer toolchain\n");
290e21294a7SEric W. Biederman force_fatal_sig(SIGSEGV);
291bf90e1eaSVineet Gupta return 0;
292bf90e1eaSVineet Gupta }
293bf90e1eaSVineet Gupta
294bf90e1eaSVineet Gupta return 1;
295bf90e1eaSVineet Gupta }
296bf90e1eaSVineet Gupta EXPORT_SYMBOL(elf_check_arch);
297