ia32_trap.c revision 162361
1135446Strhodes/*-
2254897Serwin * Copyright (c) 2004 Marcel Moolenaar
3135446Strhodes * All rights reserved.
4135446Strhodes *
5193149Sdougb * Redistribution and use in source and binary forms, with or without
6135446Strhodes * modification, are permitted provided that the following conditions
7135446Strhodes * are met:
8135446Strhodes *
9135446Strhodes * 1. Redistributions of source code must retain the above copyright
10135446Strhodes *    notice, this list of conditions and the following disclaimer.
11135446Strhodes * 2. Redistributions in binary form must reproduce the above copyright
12135446Strhodes *    notice, this list of conditions and the following disclaimer in the
13135446Strhodes *    documentation and/or other materials provided with the distribution.
14135446Strhodes *
15135446Strhodes * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16135446Strhodes * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17135446Strhodes * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18254897Serwin * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19135446Strhodes * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20170222Sdougb * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21170222Sdougb * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22135446Strhodes * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23135446Strhodes * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24135446Strhodes * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25135446Strhodes */
26135446Strhodes
27135446Strhodes#include <sys/cdefs.h>
28135446Strhodes__FBSDID("$FreeBSD: head/sys/ia64/ia32/ia32_trap.c 162361 2006-09-16 17:03:02Z rwatson $");
29
30#include <sys/param.h>
31#include <sys/systm.h>
32#include <sys/ktr.h>
33#include <sys/sysproto.h>
34#include <sys/kernel.h>
35#include <sys/lock.h>
36#include <sys/mutex.h>
37#include <sys/pioctl.h>
38#include <sys/proc.h>
39#include <sys/ptrace.h>
40#include <sys/signalvar.h>
41#include <sys/syscall.h>
42#include <sys/sysent.h>
43#include <machine/cpu.h>
44#include <machine/fpu.h>
45#include <machine/frame.h>
46#include <machine/md_var.h>
47#include <i386/include/psl.h>
48
49#include <security/audit/audit.h>
50
51extern char *syscallnames[];
52
53static void
54ia32_syscall(struct trapframe *tf)
55{
56	uint64_t args64[8];
57	uint32_t args[8];
58	struct thread *td;
59	struct proc *p;
60	struct sysent *callp;
61	caddr_t params;
62	register_t eflags;
63	u_int code;
64	int error, i, narg;
65	ksiginfo_t ksi;
66
67	PCPU_LAZY_INC(cnt.v_syscall);
68
69	td = curthread;
70	params = (caddr_t)(tf->tf_special.sp & ((1L<<32)-1)) +
71	    sizeof(uint32_t);
72	code = tf->tf_scratch.gr8;		/* eax */
73	eflags = ia64_get_eflag();
74	p = td->td_proc;
75
76	if (p->p_sysent->sv_prepsyscall == NULL) {
77		if (code == SYS_syscall) {
78			/* Code is first argument, followed by actual args. */
79			code = fuword32(params);
80			params += sizeof(int);
81		} else if (code == SYS___syscall) {
82			/*
83			 * Like syscall, but code is a quad, so as to maintain
84			 * quad alignment for the rest of the arguments.  We
85			 * use a 32-bit fetch in case params is not aligned.
86			 */
87			code = fuword32(params);
88			params += sizeof(quad_t);
89		}
90	} else
91		(*p->p_sysent->sv_prepsyscall)(tf, args, &code, &params);
92
93	if (p->p_sysent->sv_mask)
94		code &= p->p_sysent->sv_mask;
95
96	if (code >= p->p_sysent->sv_size)
97		callp = &p->p_sysent->sv_table[0];
98	else
99		callp = &p->p_sysent->sv_table[code];
100
101	narg = callp->sy_narg;
102
103	/* copyin and the ktrsyscall()/ktrsysret() code is MP-aware */
104	if (params != NULL && narg != 0)
105		error = copyin(params, (caddr_t)args, narg * sizeof(int));
106	else
107		error = 0;
108
109	for (i = 0; i < narg; i++)
110		args64[i] = args[i];
111
112#ifdef KTRACE
113	if (KTRPOINT(td, KTR_SYSCALL))
114		ktrsyscall(code, narg, args64);
115#endif
116	CTR4(KTR_SYSC, "syscall enter thread %p pid %d proc %s code %d", td,
117	    td->td_proc->p_pid, td->td_proc->p_comm, code);
118
119	if (error == 0) {
120		td->td_retval[0] = 0;
121		td->td_retval[1] = tf->tf_scratch.gr10;	/* edx */
122
123		STOPEVENT(p, S_SCE, narg);
124
125		PTRACESTOP_SC(p, td, S_PT_SCE);
126
127		AUDIT_SYSCALL_ENTER(code, td);
128		error = (*callp->sy_call)(td, args64);
129		AUDIT_SYSCALL_EXIT(error, td);
130	}
131
132	switch (error) {
133	case 0:
134		tf->tf_scratch.gr8 = td->td_retval[0];	/* eax */
135		tf->tf_scratch.gr10 = td->td_retval[1];	/* edx */
136		ia64_set_eflag(ia64_get_eflag() & ~PSL_C);
137		break;
138
139	case ERESTART:
140		/*
141		 * Reconstruct pc, assuming lcall $X,y is 7 bytes,
142		 * int 0x80 is 2 bytes. XXX Assume int 0x80.
143		 */
144		tf->tf_special.iip -= 2;
145		break;
146
147	case EJUSTRETURN:
148		break;
149
150	default:
151		if (p->p_sysent->sv_errsize) {
152			if (error >= p->p_sysent->sv_errsize)
153				error = -1;	/* XXX */
154			else
155				error = p->p_sysent->sv_errtbl[error];
156		}
157		tf->tf_scratch.gr8 = error;
158		ia64_set_eflag(ia64_get_eflag() | PSL_C);
159		break;
160	}
161
162	/*
163	 * Traced syscall.
164	 */
165	if ((eflags & PSL_T) && !(eflags & PSL_VM)) {
166		ia64_set_eflag(ia64_get_eflag() & ~PSL_T);
167		ksiginfo_init_trap(&ksi);
168		ksi.ksi_signo = SIGTRAP;
169		ksi.ksi_code = TRAP_TRACE;
170		ksi.ksi_addr = (void *)tf->tf_special.iip;
171		trapsignal(td, &ksi);
172	}
173
174	/*
175	 * Check for misbehavior.
176	 */
177	WITNESS_WARN(WARN_PANIC, NULL, "System call %s returning",
178	    (code >= 0 && code < SYS_MAXSYSCALL) ? syscallnames[code] : "???");
179	KASSERT(td->td_critnest == 0,
180	    ("System call %s returning in a critical section",
181	    (code >= 0 && code < SYS_MAXSYSCALL) ? syscallnames[code] : "???"));
182	KASSERT(td->td_locks == 0,
183	    ("System call %s returning with %d locks held",
184	    (code >= 0 && code < SYS_MAXSYSCALL) ? syscallnames[code] : "???",
185	    td->td_locks));
186
187	/*
188	 * End of syscall tracing.
189	 */
190	CTR4(KTR_SYSC, "syscall exit thread %p pid %d proc %s code %d", td,
191	    td->td_proc->p_pid, td->td_proc->p_comm, code);
192#ifdef KTRACE
193	if (KTRPOINT(td, KTR_SYSRET))
194		ktrsysret(code, error, td->td_retval[0]);
195#endif
196
197	/*
198	 * This works because errno is findable through the
199	 * register set.  If we ever support an emulation where this
200	 * is not the case, this code will need to be revisited.
201	 */
202	STOPEVENT(p, S_SCX, code);
203
204	PTRACESTOP_SC(p, td, S_PT_SCX);
205}
206
207/*
208 * ia32_trap() is called from exception.S to handle the IA-32 specific
209 * interruption vectors.
210 */
211void
212ia32_trap(int vector, struct trapframe *tf)
213{
214	struct proc *p;
215	struct thread *td;
216	uint64_t ucode;
217	int sig;
218	ksiginfo_t ksi;
219
220	KASSERT(TRAPF_USERMODE(tf), ("%s: In kernel mode???", __func__));
221
222	ia64_set_fpsr(IA64_FPSR_DEFAULT);
223	PCPU_LAZY_INC(cnt.v_trap);
224
225	td = curthread;
226	td->td_frame = tf;
227	td->td_pticks = 0;
228	p = td->td_proc;
229	if (td->td_ucred != p->p_ucred)
230		cred_update_thread(td);
231	sig = 0;
232	ucode = 0;
233	switch (vector) {
234	case IA64_VEC_IA32_EXCEPTION:
235		switch ((tf->tf_special.isr >> 16) & 0xffff) {
236		case IA32_EXCEPTION_DIVIDE:
237			ucode = FPE_INTDIV;
238			sig = SIGFPE;
239			break;
240		case IA32_EXCEPTION_DEBUG:
241		case IA32_EXCEPTION_BREAK:
242			sig = SIGTRAP;
243			break;
244		case IA32_EXCEPTION_OVERFLOW:
245			ucode = FPE_INTOVF;
246			sig = SIGFPE;
247			break;
248		case IA32_EXCEPTION_BOUND:
249			ucode = FPE_FLTSUB;
250			sig = SIGFPE;
251			break;
252		case IA32_EXCEPTION_DNA:
253			ucode = 0;
254			sig = SIGFPE;
255			break;
256		case IA32_EXCEPTION_NOT_PRESENT:
257		case IA32_EXCEPTION_STACK_FAULT:
258		case IA32_EXCEPTION_GPFAULT:
259			ucode = (tf->tf_special.isr & 0xffff) + BUS_SEGM_FAULT;
260			sig = SIGBUS;
261			break;
262		case IA32_EXCEPTION_FPERROR:
263			ucode = 0;	/* XXX */
264			sig = SIGFPE;
265			break;
266		case IA32_EXCEPTION_ALIGNMENT_CHECK:
267			ucode = tf->tf_special.ifa;	/* VA */
268			sig = SIGBUS;
269			break;
270		case IA32_EXCEPTION_STREAMING_SIMD:
271			ucode = 0; /* XXX */
272			sig = SIGFPE;
273			break;
274		default:
275			trap_panic(vector, tf);
276			break;
277		}
278		break;
279
280	case IA64_VEC_IA32_INTERCEPT:
281		/* XXX Maybe need to emulate ia32 instruction. */
282		trap_panic(vector, tf);
283
284	case IA64_VEC_IA32_INTERRUPT:
285		/* INT n instruction - probably a syscall. */
286		if (((tf->tf_special.isr >> 16) & 0xffff) == 0x80) {
287			ia32_syscall(tf);
288			goto out;
289		}
290		ucode = (tf->tf_special.isr >> 16) & 0xffff;
291		sig = SIGILL;
292		break;
293
294	default:
295		/* Should never happen of course. */
296		trap_panic(vector, tf);
297		break;
298	}
299
300	KASSERT(sig != 0, ("%s: signal not set", __func__));
301
302	ksiginfo_init_trap(&ksi);
303	ksi.ksi_signo = sig;
304	ksi.ksi_code = (int)ucode; /* XXX */
305	/* ksi.ksi_addr */
306	trapsignal(td, &ksi);
307
308out:
309	userret(td, tf);
310	mtx_assert(&Giant, MA_NOTOWNED);
311	do_ast(tf);
312}
313