ia32_signal.c revision 151316
1114987Speter/*-
2114987Speter * Copyright (c) 2003 Peter Wemm
3114987Speter * Copyright (c) 1982, 1987, 1990 The Regents of the University of California.
4114987Speter * All rights reserved.
5114987Speter *
6114987Speter * This code is derived from software contributed to Berkeley by
7114987Speter * William Jolitz.
8114987Speter *
9114987Speter * Redistribution and use in source and binary forms, with or without
10114987Speter * modification, are permitted provided that the following conditions
11114987Speter * are met:
12114987Speter * 1. Redistributions of source code must retain the above copyright
13114987Speter *    notice, this list of conditions and the following disclaimer.
14114987Speter * 2. Redistributions in binary form must reproduce the above copyright
15114987Speter *    notice, this list of conditions and the following disclaimer in the
16114987Speter *    documentation and/or other materials provided with the distribution.
17114987Speter * 4. Neither the name of the University nor the names of its contributors
18114987Speter *    may be used to endorse or promote products derived from this software
19114987Speter *    without specific prior written permission.
20114987Speter *
21114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24114987Speter * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31114987Speter * SUCH DAMAGE.
32114987Speter */
33114987Speter
34118031Sobrien#include <sys/cdefs.h>
35118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_signal.c 151316 2005-10-14 12:43:47Z davidxu $");
36118031Sobrien
37114987Speter#include "opt_compat.h"
38114987Speter
39114987Speter#include <sys/param.h>
40114987Speter#include <sys/exec.h>
41114987Speter#include <sys/fcntl.h>
42114987Speter#include <sys/imgact.h>
43114987Speter#include <sys/kernel.h>
44114987Speter#include <sys/lock.h>
45114987Speter#include <sys/malloc.h>
46114987Speter#include <sys/mutex.h>
47114987Speter#include <sys/mman.h>
48114987Speter#include <sys/namei.h>
49114987Speter#include <sys/pioctl.h>
50114987Speter#include <sys/proc.h>
51114987Speter#include <sys/procfs.h>
52114987Speter#include <sys/resourcevar.h>
53114987Speter#include <sys/systm.h>
54114987Speter#include <sys/signalvar.h>
55114987Speter#include <sys/stat.h>
56114987Speter#include <sys/sx.h>
57114987Speter#include <sys/syscall.h>
58114987Speter#include <sys/sysctl.h>
59114987Speter#include <sys/sysent.h>
60114987Speter#include <sys/vnode.h>
61114987Speter
62114987Speter#include <vm/vm.h>
63114987Speter#include <vm/vm_kern.h>
64114987Speter#include <vm/vm_param.h>
65114987Speter#include <vm/pmap.h>
66114987Speter#include <vm/vm_map.h>
67114987Speter#include <vm/vm_object.h>
68114987Speter#include <vm/vm_extern.h>
69114987Speter
70119336Speter#include <compat/freebsd32/freebsd32_util.h>
71119336Speter#include <compat/freebsd32/freebsd32_proto.h>
72119336Speter#include <compat/ia32/ia32_signal.h>
73114987Speter#include <machine/psl.h>
74114987Speter#include <machine/segments.h>
75114987Speter#include <machine/specialreg.h>
76114987Speter#include <machine/frame.h>
77114987Speter#include <machine/md_var.h>
78114987Speter#include <machine/pcb.h>
79114987Speter#include <machine/cpufunc.h>
80114987Speter
81114987Speter#ifdef COMPAT_FREEBSD4
82151316Sdavidxustatic void freebsd4_ia32_sendsig(sig_t, ksiginfo_t *, sigset_t *);
83114987Speter#endif
84114987Speterstatic void ia32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp);
85114987Speterstatic int ia32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp);
86114987Speter
87114987Speterextern int _ucode32sel, _udatasel;
88114987Speter
89114987Speter#define	CS_SECURE(cs)		(ISPL(cs) == SEL_UPL)
90114987Speter#define	EFL_SECURE(ef, oef)	((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
91114987Speter
92114987Speterstatic void
93114987Speteria32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp)
94114987Speter{
95114987Speter
96150631Speter	mcp->mc_ownedfp = fpugetregs(td, (struct savefpu *)&mcp->mc_fpstate);
97122292Speter	mcp->mc_fpformat = fpuformat();
98114987Speter}
99114987Speter
100114987Speterstatic int
101114987Speteria32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp)
102114987Speter{
103114987Speter
104114987Speter	if (mcp->mc_fpformat == _MC_FPFMT_NODEV)
105114987Speter		return (0);
106114987Speter	else if (mcp->mc_fpformat != _MC_FPFMT_XMM)
107114987Speter		return (EINVAL);
108114987Speter	else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE)
109114987Speter		/* We don't care what state is left in the FPU or PCB. */
110114987Speter		fpstate_drop(td);
111114987Speter	else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU ||
112114987Speter	    mcp->mc_ownedfp == _MC_FPOWNED_PCB) {
113114987Speter		/*
114122292Speter		 * XXX we violate the dubious requirement that fpusetregs()
115114987Speter		 * be called with interrupts disabled.
116114987Speter		 */
117150631Speter		fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate);
118114987Speter	} else
119114987Speter		return (EINVAL);
120114987Speter	return (0);
121114987Speter}
122114987Speter
123114987Speter/*
124150631Speter * Get machine context.
125150631Speter */
126150631Speterstatic int
127150631Speteria32_get_mcontext(struct thread *td, struct ia32_mcontext *mcp, int flags)
128150631Speter{
129150631Speter	struct trapframe *tp;
130150631Speter
131150631Speter	tp = td->td_frame;
132150631Speter
133150631Speter	PROC_LOCK(curthread->td_proc);
134150631Speter	mcp->mc_onstack = sigonstack(tp->tf_rsp);
135150631Speter	PROC_UNLOCK(curthread->td_proc);
136150631Speter	mcp->mc_gs = td->td_pcb->pcb_gs;
137150631Speter	mcp->mc_fs = td->td_pcb->pcb_fs;
138150631Speter	mcp->mc_es = td->td_pcb->pcb_es;
139150631Speter	mcp->mc_ds = td->td_pcb->pcb_ds;
140150631Speter	mcp->mc_edi = tp->tf_rdi;
141150631Speter	mcp->mc_esi = tp->tf_rsi;
142150631Speter	mcp->mc_ebp = tp->tf_rbp;
143150631Speter	mcp->mc_isp = tp->tf_rsp;
144150631Speter	if (flags & GET_MC_CLEAR_RET) {
145150631Speter		mcp->mc_eax = 0;
146150631Speter		mcp->mc_edx = 0;
147150631Speter	} else {
148150631Speter		mcp->mc_eax = tp->tf_rax;
149150631Speter		mcp->mc_edx = tp->tf_rdx;
150150631Speter	}
151150631Speter	mcp->mc_ebx = tp->tf_rbx;
152150631Speter	mcp->mc_ecx = tp->tf_rcx;
153150631Speter	mcp->mc_eip = tp->tf_rip;
154150631Speter	mcp->mc_cs = tp->tf_cs;
155150631Speter	mcp->mc_eflags = tp->tf_rflags;
156150631Speter	mcp->mc_esp = tp->tf_rsp;
157150631Speter	mcp->mc_ss = tp->tf_ss;
158150631Speter	mcp->mc_len = sizeof(*mcp);
159150631Speter	ia32_get_fpcontext(td, mcp);
160150631Speter	return (0);
161150631Speter}
162150631Speter
163150631Speter/*
164150631Speter * Set machine context.
165150631Speter *
166150631Speter * However, we don't set any but the user modifiable flags, and we won't
167150631Speter * touch the cs selector.
168150631Speter */
169150631Speterstatic int
170150631Speteria32_set_mcontext(struct thread *td, const struct ia32_mcontext *mcp)
171150631Speter{
172150631Speter	struct trapframe *tp;
173150631Speter	long rflags;
174150631Speter	int ret;
175150631Speter
176150631Speter	tp = td->td_frame;
177150631Speter	if (mcp->mc_len != sizeof(*mcp))
178150631Speter		return (EINVAL);
179150631Speter	rflags = (mcp->mc_eflags & PSL_USERCHANGE) |
180150631Speter	    (tp->tf_rflags & ~PSL_USERCHANGE);
181150631Speter	ret = ia32_set_fpcontext(td, mcp);
182150631Speter	if (ret != 0)
183150631Speter		return (ret);
184150631Speter#if 0	/* XXX deal with load_fs() and friends */
185150631Speter	tp->tf_fs = mcp->mc_fs;
186150631Speter	tp->tf_es = mcp->mc_es;
187150631Speter	tp->tf_ds = mcp->mc_ds;
188150631Speter#endif
189150631Speter	tp->tf_rdi = mcp->mc_edi;
190150631Speter	tp->tf_rsi = mcp->mc_esi;
191150631Speter	tp->tf_rbp = mcp->mc_ebp;
192150631Speter	tp->tf_rbx = mcp->mc_ebx;
193150631Speter	tp->tf_rdx = mcp->mc_edx;
194150631Speter	tp->tf_rcx = mcp->mc_ecx;
195150631Speter	tp->tf_rax = mcp->mc_eax;
196150631Speter	/* trapno, err */
197150631Speter	tp->tf_rip = mcp->mc_eip;
198150631Speter	tp->tf_rflags = rflags;
199150631Speter	tp->tf_rsp = mcp->mc_esp;
200150631Speter	tp->tf_ss = mcp->mc_ss;
201150631Speter#if 0	/* XXX deal with load_gs() and friends */
202150631Speter	td->td_pcb->pcb_gs = mcp->mc_gs;
203150631Speter#endif
204150631Speter	td->td_pcb->pcb_flags |= PCB_FULLCTX;
205150631Speter	return (0);
206150631Speter}
207150631Speter
208150631Speter/*
209150631Speter * The first two fields of a ucontext_t are the signal mask and
210150631Speter * the machine context.  The next field is uc_link; we want to
211150631Speter * avoid destroying the link when copying out contexts.
212150631Speter */
213150631Speter#define	UC_COPY_SIZE	offsetof(struct ia32_ucontext, uc_link)
214150631Speter
215150631Speterint
216150631Speterfreebsd32_getcontext(struct thread *td, struct freebsd32_getcontext_args *uap)
217150631Speter{
218150631Speter	struct ia32_ucontext uc;
219150631Speter	int ret;
220150631Speter
221150631Speter	if (uap->ucp == NULL)
222150631Speter		ret = EINVAL;
223150631Speter	else {
224150631Speter		ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET);
225150631Speter		PROC_LOCK(td->td_proc);
226150631Speter		uc.uc_sigmask = td->td_sigmask;
227150631Speter		PROC_UNLOCK(td->td_proc);
228150631Speter		ret = copyout(&uc, uap->ucp, UC_COPY_SIZE);
229150631Speter	}
230150631Speter	return (ret);
231150631Speter}
232150631Speter
233150631Speterint
234150631Speterfreebsd32_setcontext(struct thread *td, struct freebsd32_setcontext_args *uap)
235150631Speter{
236150631Speter	struct ia32_ucontext uc;
237150631Speter	int ret;
238150631Speter
239150631Speter	if (uap->ucp == NULL)
240150631Speter		ret = EINVAL;
241150631Speter	else {
242150631Speter		ret = copyin(uap->ucp, &uc, UC_COPY_SIZE);
243150631Speter		if (ret == 0) {
244150631Speter			ret = ia32_set_mcontext(td, &uc.uc_mcontext);
245150631Speter			if (ret == 0) {
246150631Speter				SIG_CANTMASK(uc.uc_sigmask);
247150631Speter				PROC_LOCK(td->td_proc);
248150631Speter				td->td_sigmask = uc.uc_sigmask;
249150631Speter				PROC_UNLOCK(td->td_proc);
250150631Speter			}
251150631Speter		}
252150631Speter	}
253150631Speter	return (ret == 0 ? EJUSTRETURN : ret);
254150631Speter}
255150631Speter
256150631Speterint
257150631Speterfreebsd32_swapcontext(struct thread *td, struct freebsd32_swapcontext_args *uap)
258150631Speter{
259150631Speter	struct ia32_ucontext uc;
260150631Speter	int ret;
261150631Speter
262150631Speter	if (uap->oucp == NULL || uap->ucp == NULL)
263150631Speter		ret = EINVAL;
264150631Speter	else {
265150631Speter		ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET);
266150631Speter		PROC_LOCK(td->td_proc);
267150631Speter		uc.uc_sigmask = td->td_sigmask;
268150631Speter		PROC_UNLOCK(td->td_proc);
269150631Speter		ret = copyout(&uc, uap->oucp, UC_COPY_SIZE);
270150631Speter		if (ret == 0) {
271150631Speter			ret = copyin(uap->ucp, &uc, UC_COPY_SIZE);
272150631Speter			if (ret == 0) {
273150631Speter				ret = ia32_set_mcontext(td, &uc.uc_mcontext);
274150631Speter				if (ret == 0) {
275150631Speter					SIG_CANTMASK(uc.uc_sigmask);
276150631Speter					PROC_LOCK(td->td_proc);
277150631Speter					td->td_sigmask = uc.uc_sigmask;
278150631Speter					PROC_UNLOCK(td->td_proc);
279150631Speter				}
280150631Speter			}
281150631Speter		}
282150631Speter	}
283150631Speter	return (ret == 0 ? EJUSTRETURN : ret);
284150631Speter}
285150631Speter
286150631Speter/*
287114987Speter * Send an interrupt to process.
288114987Speter *
289114987Speter * Stack is set up to allow sigcode stored
290114987Speter * at top to call routine, followed by kcall
291114987Speter * to sigreturn routine below.  After sigreturn
292114987Speter * resets the signal mask, the stack, and the
293114987Speter * frame pointer, it returns to the user
294114987Speter * specified pc, psl.
295114987Speter */
296114987Speter#ifdef COMPAT_FREEBSD4
297114987Speterstatic void
298151316Sdavidxufreebsd4_ia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
299114987Speter{
300114987Speter	struct ia32_sigframe4 sf, *sfp;
301151316Sdavidxu	struct ia32_siginfo siginfo;
302114987Speter	struct proc *p;
303114987Speter	struct thread *td;
304114987Speter	struct sigacts *psp;
305114987Speter	struct trapframe *regs;
306114987Speter	int oonstack;
307151316Sdavidxu	int sig;
308114987Speter
309114987Speter	td = curthread;
310114987Speter	p = td->td_proc;
311151316Sdavidxu	siginfo_to_ia32siginfo(&ksi->ksi_info, &siginfo);
312151316Sdavidxu
313114987Speter	PROC_LOCK_ASSERT(p, MA_OWNED);
314151316Sdavidxu	sig = siginfo.si_signo;
315114987Speter	psp = p->p_sigacts;
316123119Speter	mtx_assert(&psp->ps_mtx, MA_OWNED);
317114987Speter	regs = td->td_frame;
318114987Speter	oonstack = sigonstack(regs->tf_rsp);
319114987Speter
320114987Speter	/* Save user context. */
321114987Speter	bzero(&sf, sizeof(sf));
322114987Speter	sf.sf_uc.uc_sigmask = *mask;
323124092Sdavidxu	sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp;
324124092Sdavidxu	sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size;
325124092Sdavidxu	sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
326114987Speter	    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
327114987Speter	sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
328114987Speter	sf.sf_uc.uc_mcontext.mc_gs = rgs();
329114987Speter	sf.sf_uc.uc_mcontext.mc_fs = rfs();
330114987Speter	__asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es));
331114987Speter	__asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds));
332114987Speter	sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi;
333114987Speter	sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi;
334114987Speter	sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp;
335114987Speter	sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */
336114987Speter	sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx;
337114987Speter	sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx;
338114987Speter	sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx;
339114987Speter	sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax;
340114987Speter	sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno;
341114987Speter	sf.sf_uc.uc_mcontext.mc_err = regs->tf_err;
342114987Speter	sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip;
343114987Speter	sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs;
344114987Speter	sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags;
345114987Speter	sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp;
346114987Speter	sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss;
347114987Speter
348114987Speter	/* Allocate space for the signal handler context. */
349124092Sdavidxu	if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
350114987Speter	    SIGISMEMBER(psp->ps_sigonstack, sig)) {
351124092Sdavidxu		sfp = (struct ia32_sigframe4 *)(td->td_sigstk.ss_sp +
352124092Sdavidxu		    td->td_sigstk.ss_size - sizeof(sf));
353114987Speter	} else
354114987Speter		sfp = (struct ia32_sigframe4 *)regs->tf_rsp - 1;
355114987Speter	PROC_UNLOCK(p);
356114987Speter
357114987Speter	/* Translate the signal if appropriate. */
358114987Speter	if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize)
359114987Speter		sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)];
360114987Speter
361114987Speter	/* Build the argument list for the signal handler. */
362114987Speter	sf.sf_signum = sig;
363114987Speter	sf.sf_ucontext = (register_t)&sfp->sf_uc;
364126089Speter	if (SIGISMEMBER(psp->ps_siginfo, sig)) {
365114987Speter		/* Signal handler installed with SA_SIGINFO. */
366114987Speter		sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si;
367114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
368114987Speter
369114987Speter		/* Fill in POSIX parts */
370151316Sdavidxu		sf.sf_si = siginfo;
371114987Speter		sf.sf_si.si_signo = sig;
372114987Speter	} else {
373114987Speter		/* Old FreeBSD-style arguments. */
374151316Sdavidxu		sf.sf_siginfo = siginfo.si_code;
375151316Sdavidxu		sf.sf_addr = (u_int32_t)siginfo.si_addr;
376114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
377114987Speter	}
378123119Speter	mtx_unlock(&psp->ps_mtx);
379114987Speter
380114987Speter	/*
381114987Speter	 * Copy the sigframe out to the user's stack.
382114987Speter	 */
383114987Speter	if (copyout(&sf, sfp, sizeof(*sfp)) != 0) {
384114987Speter#ifdef DEBUG
385114987Speter		printf("process %ld has trashed its stack\n", (long)p->p_pid);
386114987Speter#endif
387114987Speter		PROC_LOCK(p);
388114987Speter		sigexit(td, SIGILL);
389114987Speter	}
390114987Speter
391114987Speter	regs->tf_rsp = (uintptr_t)sfp;
392119336Speter	regs->tf_rip = FREEBSD32_PS_STRINGS - sz_freebsd4_ia32_sigcode;
393114987Speter	regs->tf_rflags &= ~PSL_T;
394114987Speter	regs->tf_cs = _ucode32sel;
395114987Speter	regs->tf_ss = _udatasel;
396114987Speter	load_ds(_udatasel);
397114987Speter	td->td_pcb->pcb_ds = _udatasel;
398114987Speter	load_es(_udatasel);
399114987Speter	td->td_pcb->pcb_es = _udatasel;
400114987Speter	/* leave user %fs and %gs untouched */
401114987Speter	PROC_LOCK(p);
402123119Speter	mtx_lock(&psp->ps_mtx);
403114987Speter}
404114987Speter#endif	/* COMPAT_FREEBSD4 */
405114987Speter
406114987Spetervoid
407151316Sdavidxuia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
408114987Speter{
409114987Speter	struct ia32_sigframe sf, *sfp;
410151316Sdavidxu	struct ia32_siginfo siginfo;
411114987Speter	struct proc *p;
412114987Speter	struct thread *td;
413114987Speter	struct sigacts *psp;
414114987Speter	char *sp;
415114987Speter	struct trapframe *regs;
416114987Speter	int oonstack;
417151316Sdavidxu	int sig;
418114987Speter
419151316Sdavidxu	siginfo_to_ia32siginfo(&ksi->ksi_info, &siginfo);
420114987Speter	td = curthread;
421114987Speter	p = td->td_proc;
422114987Speter	PROC_LOCK_ASSERT(p, MA_OWNED);
423151316Sdavidxu	sig = siginfo.si_signo;
424114987Speter	psp = p->p_sigacts;
425114987Speter#ifdef COMPAT_FREEBSD4
426114987Speter	if (SIGISMEMBER(psp->ps_freebsd4, sig)) {
427151316Sdavidxu		freebsd4_ia32_sendsig(catcher, ksi, mask);
428114987Speter		return;
429114987Speter	}
430114987Speter#endif
431123119Speter	mtx_assert(&psp->ps_mtx, MA_OWNED);
432114987Speter	regs = td->td_frame;
433114987Speter	oonstack = sigonstack(regs->tf_rsp);
434114987Speter
435114987Speter	/* Save user context. */
436114987Speter	bzero(&sf, sizeof(sf));
437114987Speter	sf.sf_uc.uc_sigmask = *mask;
438124092Sdavidxu	sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp;
439124092Sdavidxu	sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size;
440124092Sdavidxu	sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
441114987Speter	    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
442114987Speter	sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
443114987Speter	sf.sf_uc.uc_mcontext.mc_gs = rgs();
444114987Speter	sf.sf_uc.uc_mcontext.mc_fs = rfs();
445114987Speter	__asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es));
446114987Speter	__asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds));
447114987Speter	sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi;
448114987Speter	sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi;
449114987Speter	sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp;
450114987Speter	sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */
451114987Speter	sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx;
452114987Speter	sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx;
453114987Speter	sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx;
454114987Speter	sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax;
455114987Speter	sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno;
456114987Speter	sf.sf_uc.uc_mcontext.mc_err = regs->tf_err;
457114987Speter	sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip;
458114987Speter	sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs;
459114987Speter	sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags;
460114987Speter	sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp;
461114987Speter	sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss;
462114987Speter	sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */
463114987Speter	ia32_get_fpcontext(td, &sf.sf_uc.uc_mcontext);
464114987Speter	fpstate_drop(td);
465114987Speter
466114987Speter	/* Allocate space for the signal handler context. */
467124092Sdavidxu	if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
468114987Speter	    SIGISMEMBER(psp->ps_sigonstack, sig)) {
469124092Sdavidxu		sp = td->td_sigstk.ss_sp +
470124092Sdavidxu		    td->td_sigstk.ss_size - sizeof(sf);
471114987Speter	} else
472114987Speter		sp = (char *)regs->tf_rsp - sizeof(sf);
473114987Speter	/* Align to 16 bytes. */
474114987Speter	sfp = (struct ia32_sigframe *)((uintptr_t)sp & ~0xF);
475114987Speter	PROC_UNLOCK(p);
476114987Speter
477114987Speter	/* Translate the signal if appropriate. */
478114987Speter	if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize)
479114987Speter		sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)];
480114987Speter
481114987Speter	/* Build the argument list for the signal handler. */
482114987Speter	sf.sf_signum = sig;
483114987Speter	sf.sf_ucontext = (register_t)&sfp->sf_uc;
484126089Speter	if (SIGISMEMBER(psp->ps_siginfo, sig)) {
485114987Speter		/* Signal handler installed with SA_SIGINFO. */
486114987Speter		sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si;
487114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
488114987Speter
489114987Speter		/* Fill in POSIX parts */
490151316Sdavidxu		sf.sf_si = siginfo;
491114987Speter		sf.sf_si.si_signo = sig;
492114987Speter	} else {
493114987Speter		/* Old FreeBSD-style arguments. */
494151316Sdavidxu		sf.sf_siginfo = siginfo.si_code;
495151316Sdavidxu		sf.sf_addr = (u_int32_t)siginfo.si_addr;
496114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
497114987Speter	}
498123119Speter	mtx_unlock(&psp->ps_mtx);
499114987Speter
500114987Speter	/*
501114987Speter	 * Copy the sigframe out to the user's stack.
502114987Speter	 */
503114987Speter	if (copyout(&sf, sfp, sizeof(*sfp)) != 0) {
504114987Speter#ifdef DEBUG
505114987Speter		printf("process %ld has trashed its stack\n", (long)p->p_pid);
506114987Speter#endif
507114987Speter		PROC_LOCK(p);
508114987Speter		sigexit(td, SIGILL);
509114987Speter	}
510114987Speter
511114987Speter	regs->tf_rsp = (uintptr_t)sfp;
512119336Speter	regs->tf_rip = FREEBSD32_PS_STRINGS - *(p->p_sysent->sv_szsigcode);
513114987Speter	regs->tf_rflags &= ~PSL_T;
514114987Speter	regs->tf_cs = _ucode32sel;
515114987Speter	regs->tf_ss = _udatasel;
516114987Speter	load_ds(_udatasel);
517114987Speter	td->td_pcb->pcb_ds = _udatasel;
518114987Speter	load_es(_udatasel);
519114987Speter	td->td_pcb->pcb_es = _udatasel;
520114987Speter	/* leave user %fs and %gs untouched */
521114987Speter	PROC_LOCK(p);
522123119Speter	mtx_lock(&psp->ps_mtx);
523114987Speter}
524114987Speter
525114987Speter/*
526114987Speter * System call to cleanup state after a signal
527114987Speter * has been taken.  Reset signal mask and
528114987Speter * stack state from context left by sendsig (above).
529114987Speter * Return to previous pc and psl as specified by
530114987Speter * context left by sendsig. Check carefully to
531114987Speter * make sure that the user has not modified the
532114987Speter * state to gain improper privileges.
533114987Speter */
534114987Speter#ifdef COMPAT_FREEBSD4
535114987Speter/*
536114987Speter * MPSAFE
537114987Speter */
538114987Speterint
539119336Speterfreebsd4_freebsd32_sigreturn(td, uap)
540114987Speter	struct thread *td;
541119336Speter	struct freebsd4_freebsd32_sigreturn_args /* {
542119336Speter		const struct freebsd4_freebsd32_ucontext *sigcntxp;
543114987Speter	} */ *uap;
544114987Speter{
545114987Speter	struct ia32_ucontext4 uc;
546114987Speter	struct proc *p = td->td_proc;
547114987Speter	struct trapframe *regs;
548114987Speter	const struct ia32_ucontext4 *ucp;
549114987Speter	int cs, eflags, error;
550151316Sdavidxu	ksiginfo_t ksi;
551114987Speter
552114987Speter	error = copyin(uap->sigcntxp, &uc, sizeof(uc));
553114987Speter	if (error != 0)
554114987Speter		return (error);
555114987Speter	ucp = &uc;
556114987Speter	regs = td->td_frame;
557114987Speter	eflags = ucp->uc_mcontext.mc_eflags;
558114987Speter	/*
559114987Speter	 * Don't allow users to change privileged or reserved flags.
560114987Speter	 */
561114987Speter	/*
562114987Speter	 * XXX do allow users to change the privileged flag PSL_RF.
563114987Speter	 * The cpu sets PSL_RF in tf_eflags for faults.  Debuggers
564114987Speter	 * should sometimes set it there too.  tf_eflags is kept in
565114987Speter	 * the signal context during signal handling and there is no
566114987Speter	 * other place to remember it, so the PSL_RF bit may be
567114987Speter	 * corrupted by the signal handler without us knowing.
568114987Speter	 * Corruption of the PSL_RF bit at worst causes one more or
569114987Speter	 * one less debugger trap, so allowing it is fairly harmless.
570114987Speter	 */
571114987Speter	if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) {
572119336Speter		printf("freebsd4_freebsd32_sigreturn: eflags = 0x%x\n", eflags);
573114987Speter		return (EINVAL);
574114987Speter	}
575114987Speter
576114987Speter	/*
577114987Speter	 * Don't allow users to load a valid privileged %cs.  Let the
578114987Speter	 * hardware check for invalid selectors, excess privilege in
579114987Speter	 * other selectors, invalid %eip's and invalid %esp's.
580114987Speter	 */
581114987Speter	cs = ucp->uc_mcontext.mc_cs;
582114987Speter	if (!CS_SECURE(cs)) {
583114987Speter		printf("freebsd4_sigreturn: cs = 0x%x\n", cs);
584151316Sdavidxu		ksiginfo_init_trap(&ksi);
585151316Sdavidxu		ksi.ksi_signo = SIGBUS;
586151316Sdavidxu		ksi.ksi_code = BUS_OBJERR;
587151316Sdavidxu		ksi.ksi_trapno = T_PROTFLT;
588151316Sdavidxu		ksi.ksi_addr = (void *)regs->tf_rip;
589151316Sdavidxu		trapsignal(td, &ksi);
590114987Speter		return (EINVAL);
591114987Speter	}
592114987Speter
593114987Speter	/* Segment selectors restored by sigtramp.S */
594114987Speter	regs->tf_rdi = ucp->uc_mcontext.mc_edi;
595114987Speter	regs->tf_rsi = ucp->uc_mcontext.mc_esi;
596114987Speter	regs->tf_rbp = ucp->uc_mcontext.mc_ebp;
597114987Speter	regs->tf_rbx = ucp->uc_mcontext.mc_ebx;
598114987Speter	regs->tf_rdx = ucp->uc_mcontext.mc_edx;
599114987Speter	regs->tf_rcx = ucp->uc_mcontext.mc_ecx;
600114987Speter	regs->tf_rax = ucp->uc_mcontext.mc_eax;
601114987Speter	regs->tf_trapno = ucp->uc_mcontext.mc_trapno;
602114987Speter	regs->tf_err = ucp->uc_mcontext.mc_err;
603114987Speter	regs->tf_rip = ucp->uc_mcontext.mc_eip;
604114987Speter	regs->tf_cs = cs;
605114987Speter	regs->tf_rflags = ucp->uc_mcontext.mc_eflags;
606114987Speter	regs->tf_rsp = ucp->uc_mcontext.mc_esp;
607114987Speter	regs->tf_ss = ucp->uc_mcontext.mc_ss;
608114987Speter
609114987Speter	PROC_LOCK(p);
610114987Speter	td->td_sigmask = ucp->uc_sigmask;
611114987Speter	SIG_CANTMASK(td->td_sigmask);
612114987Speter	signotify(td);
613114987Speter	PROC_UNLOCK(p);
614114987Speter	return (EJUSTRETURN);
615114987Speter}
616114987Speter#endif	/* COMPAT_FREEBSD4 */
617114987Speter
618114987Speter/*
619114987Speter * MPSAFE
620114987Speter */
621114987Speterint
622119336Speterfreebsd32_sigreturn(td, uap)
623114987Speter	struct thread *td;
624119336Speter	struct freebsd32_sigreturn_args /* {
625119336Speter		const struct freebsd32_ucontext *sigcntxp;
626114987Speter	} */ *uap;
627114987Speter{
628114987Speter	struct ia32_ucontext uc;
629114987Speter	struct proc *p = td->td_proc;
630114987Speter	struct trapframe *regs;
631114987Speter	const struct ia32_ucontext *ucp;
632114987Speter	int cs, eflags, error, ret;
633151316Sdavidxu	ksiginfo_t ksi;
634114987Speter
635114987Speter	error = copyin(uap->sigcntxp, &uc, sizeof(uc));
636114987Speter	if (error != 0)
637114987Speter		return (error);
638114987Speter	ucp = &uc;
639114987Speter	regs = td->td_frame;
640114987Speter	eflags = ucp->uc_mcontext.mc_eflags;
641114987Speter	/*
642114987Speter	 * Don't allow users to change privileged or reserved flags.
643114987Speter	 */
644114987Speter	/*
645114987Speter	 * XXX do allow users to change the privileged flag PSL_RF.
646114987Speter	 * The cpu sets PSL_RF in tf_eflags for faults.  Debuggers
647114987Speter	 * should sometimes set it there too.  tf_eflags is kept in
648114987Speter	 * the signal context during signal handling and there is no
649114987Speter	 * other place to remember it, so the PSL_RF bit may be
650114987Speter	 * corrupted by the signal handler without us knowing.
651114987Speter	 * Corruption of the PSL_RF bit at worst causes one more or
652114987Speter	 * one less debugger trap, so allowing it is fairly harmless.
653114987Speter	 */
654114987Speter	if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) {
655119336Speter		printf("freebsd32_sigreturn: eflags = 0x%x\n", eflags);
656114987Speter		return (EINVAL);
657114987Speter	}
658114987Speter
659114987Speter	/*
660114987Speter	 * Don't allow users to load a valid privileged %cs.  Let the
661114987Speter	 * hardware check for invalid selectors, excess privilege in
662114987Speter	 * other selectors, invalid %eip's and invalid %esp's.
663114987Speter	 */
664114987Speter	cs = ucp->uc_mcontext.mc_cs;
665114987Speter	if (!CS_SECURE(cs)) {
666114987Speter		printf("sigreturn: cs = 0x%x\n", cs);
667151316Sdavidxu		ksiginfo_init_trap(&ksi);
668151316Sdavidxu		ksi.ksi_signo = SIGBUS;
669151316Sdavidxu		ksi.ksi_code = BUS_OBJERR;
670151316Sdavidxu		ksi.ksi_trapno = T_PROTFLT;
671151316Sdavidxu		ksi.ksi_addr = (void *)regs->tf_rip;
672151316Sdavidxu		trapsignal(td, &ksi);
673114987Speter		return (EINVAL);
674114987Speter	}
675114987Speter
676114987Speter	ret = ia32_set_fpcontext(td, &ucp->uc_mcontext);
677114987Speter	if (ret != 0)
678114987Speter		return (ret);
679114987Speter
680114987Speter	/* Segment selectors restored by sigtramp.S */
681114987Speter	regs->tf_rdi = ucp->uc_mcontext.mc_edi;
682114987Speter	regs->tf_rsi = ucp->uc_mcontext.mc_esi;
683114987Speter	regs->tf_rbp = ucp->uc_mcontext.mc_ebp;
684114987Speter	regs->tf_rbx = ucp->uc_mcontext.mc_ebx;
685114987Speter	regs->tf_rdx = ucp->uc_mcontext.mc_edx;
686114987Speter	regs->tf_rcx = ucp->uc_mcontext.mc_ecx;
687114987Speter	regs->tf_rax = ucp->uc_mcontext.mc_eax;
688114987Speter	regs->tf_trapno = ucp->uc_mcontext.mc_trapno;
689114987Speter	regs->tf_err = ucp->uc_mcontext.mc_err;
690114987Speter	regs->tf_rip = ucp->uc_mcontext.mc_eip;
691114987Speter	regs->tf_cs = cs;
692114987Speter	regs->tf_rflags = ucp->uc_mcontext.mc_eflags;
693114987Speter	regs->tf_rsp = ucp->uc_mcontext.mc_esp;
694114987Speter	regs->tf_ss = ucp->uc_mcontext.mc_ss;
695114987Speter
696114987Speter	PROC_LOCK(p);
697114987Speter	td->td_sigmask = ucp->uc_sigmask;
698114987Speter	SIG_CANTMASK(td->td_sigmask);
699114987Speter	signotify(td);
700114987Speter	PROC_UNLOCK(p);
701114987Speter	return (EJUSTRETURN);
702114987Speter}
703122303Speter
704122303Speter/*
705122303Speter * Clear registers on exec
706122303Speter */
707122303Spetervoid
708122303Speteria32_setregs(td, entry, stack, ps_strings)
709122303Speter	struct thread *td;
710122303Speter	u_long entry;
711122303Speter	u_long stack;
712122303Speter	u_long ps_strings;
713122303Speter{
714122303Speter	struct trapframe *regs = td->td_frame;
715122303Speter	struct pcb *pcb = td->td_pcb;
716122303Speter
717122303Speter	wrmsr(MSR_FSBASE, 0);
718122303Speter	wrmsr(MSR_KGSBASE, 0);	/* User value while we're in the kernel */
719122303Speter	pcb->pcb_fsbase = 0;
720122303Speter	pcb->pcb_gsbase = 0;
721122303Speter	load_ds(_udatasel);
722122303Speter	load_es(_udatasel);
723122303Speter	load_fs(_udatasel);
724122303Speter	load_gs(_udatasel);
725122303Speter	pcb->pcb_ds = _udatasel;
726122303Speter	pcb->pcb_es = _udatasel;
727122303Speter	pcb->pcb_fs = _udatasel;
728122303Speter	pcb->pcb_gs = _udatasel;
729122303Speter
730122303Speter	bzero((char *)regs, sizeof(struct trapframe));
731122303Speter	regs->tf_rip = entry;
732122303Speter	regs->tf_rsp = stack;
733122303Speter	regs->tf_rflags = PSL_USER | (regs->tf_rflags & PSL_T);
734122303Speter	regs->tf_ss = _udatasel;
735122303Speter	regs->tf_cs = _ucode32sel;
736122303Speter	regs->tf_rbx = ps_strings;
737122303Speter	load_cr0(rcr0() | CR0_MP | CR0_TS);
738122303Speter	fpstate_drop(td);
739122303Speter
740122303Speter	/* Return via doreti so that we can change to a different %cs */
741122303Speter	pcb->pcb_flags |= PCB_FULLCTX;
742122303Speter	td->td_retval[1] = 0;
743122303Speter}
744151316Sdavidxu
745151316Sdavidxuvoid
746151316Sdavidxusiginfo_to_ia32siginfo(siginfo_t *src, struct ia32_siginfo *dst)
747151316Sdavidxu{
748151316Sdavidxu	dst->si_signo = src->si_signo;
749151316Sdavidxu	dst->si_errno = src->si_errno;
750151316Sdavidxu	dst->si_code = src->si_code;
751151316Sdavidxu	dst->si_pid = src->si_pid;
752151316Sdavidxu	dst->si_uid = src->si_uid;
753151316Sdavidxu	dst->si_status = src->si_status;
754151316Sdavidxu	dst->si_addr = dst->si_addr;
755151316Sdavidxu	dst->si_value.sigval_int = src->si_value.sigval_int;
756151316Sdavidxu	dst->si_band = src->si_band;
757151316Sdavidxu	dst->__spare__[0] = src->si_trapno;
758151316Sdavidxu}
759