ia32_signal.c revision 151316
1114987Speter/*- 2114987Speter * Copyright (c) 2003 Peter Wemm 3114987Speter * Copyright (c) 1982, 1987, 1990 The Regents of the University of California. 4114987Speter * All rights reserved. 5114987Speter * 6114987Speter * This code is derived from software contributed to Berkeley by 7114987Speter * William Jolitz. 8114987Speter * 9114987Speter * Redistribution and use in source and binary forms, with or without 10114987Speter * modification, are permitted provided that the following conditions 11114987Speter * are met: 12114987Speter * 1. Redistributions of source code must retain the above copyright 13114987Speter * notice, this list of conditions and the following disclaimer. 14114987Speter * 2. Redistributions in binary form must reproduce the above copyright 15114987Speter * notice, this list of conditions and the following disclaimer in the 16114987Speter * documentation and/or other materials provided with the distribution. 17114987Speter * 4. Neither the name of the University nor the names of its contributors 18114987Speter * may be used to endorse or promote products derived from this software 19114987Speter * without specific prior written permission. 20114987Speter * 21114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24114987Speter * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31114987Speter * SUCH DAMAGE. 32114987Speter */ 33114987Speter 34118031Sobrien#include <sys/cdefs.h> 35118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_signal.c 151316 2005-10-14 12:43:47Z davidxu $"); 36118031Sobrien 37114987Speter#include "opt_compat.h" 38114987Speter 39114987Speter#include <sys/param.h> 40114987Speter#include <sys/exec.h> 41114987Speter#include <sys/fcntl.h> 42114987Speter#include <sys/imgact.h> 43114987Speter#include <sys/kernel.h> 44114987Speter#include <sys/lock.h> 45114987Speter#include <sys/malloc.h> 46114987Speter#include <sys/mutex.h> 47114987Speter#include <sys/mman.h> 48114987Speter#include <sys/namei.h> 49114987Speter#include <sys/pioctl.h> 50114987Speter#include <sys/proc.h> 51114987Speter#include <sys/procfs.h> 52114987Speter#include <sys/resourcevar.h> 53114987Speter#include <sys/systm.h> 54114987Speter#include <sys/signalvar.h> 55114987Speter#include <sys/stat.h> 56114987Speter#include <sys/sx.h> 57114987Speter#include <sys/syscall.h> 58114987Speter#include <sys/sysctl.h> 59114987Speter#include <sys/sysent.h> 60114987Speter#include <sys/vnode.h> 61114987Speter 62114987Speter#include <vm/vm.h> 63114987Speter#include <vm/vm_kern.h> 64114987Speter#include <vm/vm_param.h> 65114987Speter#include <vm/pmap.h> 66114987Speter#include <vm/vm_map.h> 67114987Speter#include <vm/vm_object.h> 68114987Speter#include <vm/vm_extern.h> 69114987Speter 70119336Speter#include <compat/freebsd32/freebsd32_util.h> 71119336Speter#include <compat/freebsd32/freebsd32_proto.h> 72119336Speter#include <compat/ia32/ia32_signal.h> 73114987Speter#include <machine/psl.h> 74114987Speter#include <machine/segments.h> 75114987Speter#include <machine/specialreg.h> 76114987Speter#include <machine/frame.h> 77114987Speter#include <machine/md_var.h> 78114987Speter#include <machine/pcb.h> 79114987Speter#include <machine/cpufunc.h> 80114987Speter 81114987Speter#ifdef COMPAT_FREEBSD4 82151316Sdavidxustatic void freebsd4_ia32_sendsig(sig_t, ksiginfo_t *, sigset_t *); 83114987Speter#endif 84114987Speterstatic void ia32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp); 85114987Speterstatic int ia32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp); 86114987Speter 87114987Speterextern int _ucode32sel, _udatasel; 88114987Speter 89114987Speter#define CS_SECURE(cs) (ISPL(cs) == SEL_UPL) 90114987Speter#define EFL_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0) 91114987Speter 92114987Speterstatic void 93114987Speteria32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp) 94114987Speter{ 95114987Speter 96150631Speter mcp->mc_ownedfp = fpugetregs(td, (struct savefpu *)&mcp->mc_fpstate); 97122292Speter mcp->mc_fpformat = fpuformat(); 98114987Speter} 99114987Speter 100114987Speterstatic int 101114987Speteria32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp) 102114987Speter{ 103114987Speter 104114987Speter if (mcp->mc_fpformat == _MC_FPFMT_NODEV) 105114987Speter return (0); 106114987Speter else if (mcp->mc_fpformat != _MC_FPFMT_XMM) 107114987Speter return (EINVAL); 108114987Speter else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE) 109114987Speter /* We don't care what state is left in the FPU or PCB. */ 110114987Speter fpstate_drop(td); 111114987Speter else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU || 112114987Speter mcp->mc_ownedfp == _MC_FPOWNED_PCB) { 113114987Speter /* 114122292Speter * XXX we violate the dubious requirement that fpusetregs() 115114987Speter * be called with interrupts disabled. 116114987Speter */ 117150631Speter fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate); 118114987Speter } else 119114987Speter return (EINVAL); 120114987Speter return (0); 121114987Speter} 122114987Speter 123114987Speter/* 124150631Speter * Get machine context. 125150631Speter */ 126150631Speterstatic int 127150631Speteria32_get_mcontext(struct thread *td, struct ia32_mcontext *mcp, int flags) 128150631Speter{ 129150631Speter struct trapframe *tp; 130150631Speter 131150631Speter tp = td->td_frame; 132150631Speter 133150631Speter PROC_LOCK(curthread->td_proc); 134150631Speter mcp->mc_onstack = sigonstack(tp->tf_rsp); 135150631Speter PROC_UNLOCK(curthread->td_proc); 136150631Speter mcp->mc_gs = td->td_pcb->pcb_gs; 137150631Speter mcp->mc_fs = td->td_pcb->pcb_fs; 138150631Speter mcp->mc_es = td->td_pcb->pcb_es; 139150631Speter mcp->mc_ds = td->td_pcb->pcb_ds; 140150631Speter mcp->mc_edi = tp->tf_rdi; 141150631Speter mcp->mc_esi = tp->tf_rsi; 142150631Speter mcp->mc_ebp = tp->tf_rbp; 143150631Speter mcp->mc_isp = tp->tf_rsp; 144150631Speter if (flags & GET_MC_CLEAR_RET) { 145150631Speter mcp->mc_eax = 0; 146150631Speter mcp->mc_edx = 0; 147150631Speter } else { 148150631Speter mcp->mc_eax = tp->tf_rax; 149150631Speter mcp->mc_edx = tp->tf_rdx; 150150631Speter } 151150631Speter mcp->mc_ebx = tp->tf_rbx; 152150631Speter mcp->mc_ecx = tp->tf_rcx; 153150631Speter mcp->mc_eip = tp->tf_rip; 154150631Speter mcp->mc_cs = tp->tf_cs; 155150631Speter mcp->mc_eflags = tp->tf_rflags; 156150631Speter mcp->mc_esp = tp->tf_rsp; 157150631Speter mcp->mc_ss = tp->tf_ss; 158150631Speter mcp->mc_len = sizeof(*mcp); 159150631Speter ia32_get_fpcontext(td, mcp); 160150631Speter return (0); 161150631Speter} 162150631Speter 163150631Speter/* 164150631Speter * Set machine context. 165150631Speter * 166150631Speter * However, we don't set any but the user modifiable flags, and we won't 167150631Speter * touch the cs selector. 168150631Speter */ 169150631Speterstatic int 170150631Speteria32_set_mcontext(struct thread *td, const struct ia32_mcontext *mcp) 171150631Speter{ 172150631Speter struct trapframe *tp; 173150631Speter long rflags; 174150631Speter int ret; 175150631Speter 176150631Speter tp = td->td_frame; 177150631Speter if (mcp->mc_len != sizeof(*mcp)) 178150631Speter return (EINVAL); 179150631Speter rflags = (mcp->mc_eflags & PSL_USERCHANGE) | 180150631Speter (tp->tf_rflags & ~PSL_USERCHANGE); 181150631Speter ret = ia32_set_fpcontext(td, mcp); 182150631Speter if (ret != 0) 183150631Speter return (ret); 184150631Speter#if 0 /* XXX deal with load_fs() and friends */ 185150631Speter tp->tf_fs = mcp->mc_fs; 186150631Speter tp->tf_es = mcp->mc_es; 187150631Speter tp->tf_ds = mcp->mc_ds; 188150631Speter#endif 189150631Speter tp->tf_rdi = mcp->mc_edi; 190150631Speter tp->tf_rsi = mcp->mc_esi; 191150631Speter tp->tf_rbp = mcp->mc_ebp; 192150631Speter tp->tf_rbx = mcp->mc_ebx; 193150631Speter tp->tf_rdx = mcp->mc_edx; 194150631Speter tp->tf_rcx = mcp->mc_ecx; 195150631Speter tp->tf_rax = mcp->mc_eax; 196150631Speter /* trapno, err */ 197150631Speter tp->tf_rip = mcp->mc_eip; 198150631Speter tp->tf_rflags = rflags; 199150631Speter tp->tf_rsp = mcp->mc_esp; 200150631Speter tp->tf_ss = mcp->mc_ss; 201150631Speter#if 0 /* XXX deal with load_gs() and friends */ 202150631Speter td->td_pcb->pcb_gs = mcp->mc_gs; 203150631Speter#endif 204150631Speter td->td_pcb->pcb_flags |= PCB_FULLCTX; 205150631Speter return (0); 206150631Speter} 207150631Speter 208150631Speter/* 209150631Speter * The first two fields of a ucontext_t are the signal mask and 210150631Speter * the machine context. The next field is uc_link; we want to 211150631Speter * avoid destroying the link when copying out contexts. 212150631Speter */ 213150631Speter#define UC_COPY_SIZE offsetof(struct ia32_ucontext, uc_link) 214150631Speter 215150631Speterint 216150631Speterfreebsd32_getcontext(struct thread *td, struct freebsd32_getcontext_args *uap) 217150631Speter{ 218150631Speter struct ia32_ucontext uc; 219150631Speter int ret; 220150631Speter 221150631Speter if (uap->ucp == NULL) 222150631Speter ret = EINVAL; 223150631Speter else { 224150631Speter ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET); 225150631Speter PROC_LOCK(td->td_proc); 226150631Speter uc.uc_sigmask = td->td_sigmask; 227150631Speter PROC_UNLOCK(td->td_proc); 228150631Speter ret = copyout(&uc, uap->ucp, UC_COPY_SIZE); 229150631Speter } 230150631Speter return (ret); 231150631Speter} 232150631Speter 233150631Speterint 234150631Speterfreebsd32_setcontext(struct thread *td, struct freebsd32_setcontext_args *uap) 235150631Speter{ 236150631Speter struct ia32_ucontext uc; 237150631Speter int ret; 238150631Speter 239150631Speter if (uap->ucp == NULL) 240150631Speter ret = EINVAL; 241150631Speter else { 242150631Speter ret = copyin(uap->ucp, &uc, UC_COPY_SIZE); 243150631Speter if (ret == 0) { 244150631Speter ret = ia32_set_mcontext(td, &uc.uc_mcontext); 245150631Speter if (ret == 0) { 246150631Speter SIG_CANTMASK(uc.uc_sigmask); 247150631Speter PROC_LOCK(td->td_proc); 248150631Speter td->td_sigmask = uc.uc_sigmask; 249150631Speter PROC_UNLOCK(td->td_proc); 250150631Speter } 251150631Speter } 252150631Speter } 253150631Speter return (ret == 0 ? EJUSTRETURN : ret); 254150631Speter} 255150631Speter 256150631Speterint 257150631Speterfreebsd32_swapcontext(struct thread *td, struct freebsd32_swapcontext_args *uap) 258150631Speter{ 259150631Speter struct ia32_ucontext uc; 260150631Speter int ret; 261150631Speter 262150631Speter if (uap->oucp == NULL || uap->ucp == NULL) 263150631Speter ret = EINVAL; 264150631Speter else { 265150631Speter ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET); 266150631Speter PROC_LOCK(td->td_proc); 267150631Speter uc.uc_sigmask = td->td_sigmask; 268150631Speter PROC_UNLOCK(td->td_proc); 269150631Speter ret = copyout(&uc, uap->oucp, UC_COPY_SIZE); 270150631Speter if (ret == 0) { 271150631Speter ret = copyin(uap->ucp, &uc, UC_COPY_SIZE); 272150631Speter if (ret == 0) { 273150631Speter ret = ia32_set_mcontext(td, &uc.uc_mcontext); 274150631Speter if (ret == 0) { 275150631Speter SIG_CANTMASK(uc.uc_sigmask); 276150631Speter PROC_LOCK(td->td_proc); 277150631Speter td->td_sigmask = uc.uc_sigmask; 278150631Speter PROC_UNLOCK(td->td_proc); 279150631Speter } 280150631Speter } 281150631Speter } 282150631Speter } 283150631Speter return (ret == 0 ? EJUSTRETURN : ret); 284150631Speter} 285150631Speter 286150631Speter/* 287114987Speter * Send an interrupt to process. 288114987Speter * 289114987Speter * Stack is set up to allow sigcode stored 290114987Speter * at top to call routine, followed by kcall 291114987Speter * to sigreturn routine below. After sigreturn 292114987Speter * resets the signal mask, the stack, and the 293114987Speter * frame pointer, it returns to the user 294114987Speter * specified pc, psl. 295114987Speter */ 296114987Speter#ifdef COMPAT_FREEBSD4 297114987Speterstatic void 298151316Sdavidxufreebsd4_ia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask) 299114987Speter{ 300114987Speter struct ia32_sigframe4 sf, *sfp; 301151316Sdavidxu struct ia32_siginfo siginfo; 302114987Speter struct proc *p; 303114987Speter struct thread *td; 304114987Speter struct sigacts *psp; 305114987Speter struct trapframe *regs; 306114987Speter int oonstack; 307151316Sdavidxu int sig; 308114987Speter 309114987Speter td = curthread; 310114987Speter p = td->td_proc; 311151316Sdavidxu siginfo_to_ia32siginfo(&ksi->ksi_info, &siginfo); 312151316Sdavidxu 313114987Speter PROC_LOCK_ASSERT(p, MA_OWNED); 314151316Sdavidxu sig = siginfo.si_signo; 315114987Speter psp = p->p_sigacts; 316123119Speter mtx_assert(&psp->ps_mtx, MA_OWNED); 317114987Speter regs = td->td_frame; 318114987Speter oonstack = sigonstack(regs->tf_rsp); 319114987Speter 320114987Speter /* Save user context. */ 321114987Speter bzero(&sf, sizeof(sf)); 322114987Speter sf.sf_uc.uc_sigmask = *mask; 323124092Sdavidxu sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp; 324124092Sdavidxu sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size; 325124092Sdavidxu sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) 326114987Speter ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE; 327114987Speter sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0; 328114987Speter sf.sf_uc.uc_mcontext.mc_gs = rgs(); 329114987Speter sf.sf_uc.uc_mcontext.mc_fs = rfs(); 330114987Speter __asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es)); 331114987Speter __asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds)); 332114987Speter sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi; 333114987Speter sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi; 334114987Speter sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp; 335114987Speter sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */ 336114987Speter sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx; 337114987Speter sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx; 338114987Speter sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx; 339114987Speter sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax; 340114987Speter sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno; 341114987Speter sf.sf_uc.uc_mcontext.mc_err = regs->tf_err; 342114987Speter sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip; 343114987Speter sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs; 344114987Speter sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags; 345114987Speter sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp; 346114987Speter sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss; 347114987Speter 348114987Speter /* Allocate space for the signal handler context. */ 349124092Sdavidxu if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack && 350114987Speter SIGISMEMBER(psp->ps_sigonstack, sig)) { 351124092Sdavidxu sfp = (struct ia32_sigframe4 *)(td->td_sigstk.ss_sp + 352124092Sdavidxu td->td_sigstk.ss_size - sizeof(sf)); 353114987Speter } else 354114987Speter sfp = (struct ia32_sigframe4 *)regs->tf_rsp - 1; 355114987Speter PROC_UNLOCK(p); 356114987Speter 357114987Speter /* Translate the signal if appropriate. */ 358114987Speter if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize) 359114987Speter sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; 360114987Speter 361114987Speter /* Build the argument list for the signal handler. */ 362114987Speter sf.sf_signum = sig; 363114987Speter sf.sf_ucontext = (register_t)&sfp->sf_uc; 364126089Speter if (SIGISMEMBER(psp->ps_siginfo, sig)) { 365114987Speter /* Signal handler installed with SA_SIGINFO. */ 366114987Speter sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si; 367114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 368114987Speter 369114987Speter /* Fill in POSIX parts */ 370151316Sdavidxu sf.sf_si = siginfo; 371114987Speter sf.sf_si.si_signo = sig; 372114987Speter } else { 373114987Speter /* Old FreeBSD-style arguments. */ 374151316Sdavidxu sf.sf_siginfo = siginfo.si_code; 375151316Sdavidxu sf.sf_addr = (u_int32_t)siginfo.si_addr; 376114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 377114987Speter } 378123119Speter mtx_unlock(&psp->ps_mtx); 379114987Speter 380114987Speter /* 381114987Speter * Copy the sigframe out to the user's stack. 382114987Speter */ 383114987Speter if (copyout(&sf, sfp, sizeof(*sfp)) != 0) { 384114987Speter#ifdef DEBUG 385114987Speter printf("process %ld has trashed its stack\n", (long)p->p_pid); 386114987Speter#endif 387114987Speter PROC_LOCK(p); 388114987Speter sigexit(td, SIGILL); 389114987Speter } 390114987Speter 391114987Speter regs->tf_rsp = (uintptr_t)sfp; 392119336Speter regs->tf_rip = FREEBSD32_PS_STRINGS - sz_freebsd4_ia32_sigcode; 393114987Speter regs->tf_rflags &= ~PSL_T; 394114987Speter regs->tf_cs = _ucode32sel; 395114987Speter regs->tf_ss = _udatasel; 396114987Speter load_ds(_udatasel); 397114987Speter td->td_pcb->pcb_ds = _udatasel; 398114987Speter load_es(_udatasel); 399114987Speter td->td_pcb->pcb_es = _udatasel; 400114987Speter /* leave user %fs and %gs untouched */ 401114987Speter PROC_LOCK(p); 402123119Speter mtx_lock(&psp->ps_mtx); 403114987Speter} 404114987Speter#endif /* COMPAT_FREEBSD4 */ 405114987Speter 406114987Spetervoid 407151316Sdavidxuia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask) 408114987Speter{ 409114987Speter struct ia32_sigframe sf, *sfp; 410151316Sdavidxu struct ia32_siginfo siginfo; 411114987Speter struct proc *p; 412114987Speter struct thread *td; 413114987Speter struct sigacts *psp; 414114987Speter char *sp; 415114987Speter struct trapframe *regs; 416114987Speter int oonstack; 417151316Sdavidxu int sig; 418114987Speter 419151316Sdavidxu siginfo_to_ia32siginfo(&ksi->ksi_info, &siginfo); 420114987Speter td = curthread; 421114987Speter p = td->td_proc; 422114987Speter PROC_LOCK_ASSERT(p, MA_OWNED); 423151316Sdavidxu sig = siginfo.si_signo; 424114987Speter psp = p->p_sigacts; 425114987Speter#ifdef COMPAT_FREEBSD4 426114987Speter if (SIGISMEMBER(psp->ps_freebsd4, sig)) { 427151316Sdavidxu freebsd4_ia32_sendsig(catcher, ksi, mask); 428114987Speter return; 429114987Speter } 430114987Speter#endif 431123119Speter mtx_assert(&psp->ps_mtx, MA_OWNED); 432114987Speter regs = td->td_frame; 433114987Speter oonstack = sigonstack(regs->tf_rsp); 434114987Speter 435114987Speter /* Save user context. */ 436114987Speter bzero(&sf, sizeof(sf)); 437114987Speter sf.sf_uc.uc_sigmask = *mask; 438124092Sdavidxu sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp; 439124092Sdavidxu sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size; 440124092Sdavidxu sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) 441114987Speter ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE; 442114987Speter sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0; 443114987Speter sf.sf_uc.uc_mcontext.mc_gs = rgs(); 444114987Speter sf.sf_uc.uc_mcontext.mc_fs = rfs(); 445114987Speter __asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es)); 446114987Speter __asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds)); 447114987Speter sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi; 448114987Speter sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi; 449114987Speter sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp; 450114987Speter sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */ 451114987Speter sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx; 452114987Speter sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx; 453114987Speter sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx; 454114987Speter sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax; 455114987Speter sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno; 456114987Speter sf.sf_uc.uc_mcontext.mc_err = regs->tf_err; 457114987Speter sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip; 458114987Speter sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs; 459114987Speter sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags; 460114987Speter sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp; 461114987Speter sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss; 462114987Speter sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */ 463114987Speter ia32_get_fpcontext(td, &sf.sf_uc.uc_mcontext); 464114987Speter fpstate_drop(td); 465114987Speter 466114987Speter /* Allocate space for the signal handler context. */ 467124092Sdavidxu if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack && 468114987Speter SIGISMEMBER(psp->ps_sigonstack, sig)) { 469124092Sdavidxu sp = td->td_sigstk.ss_sp + 470124092Sdavidxu td->td_sigstk.ss_size - sizeof(sf); 471114987Speter } else 472114987Speter sp = (char *)regs->tf_rsp - sizeof(sf); 473114987Speter /* Align to 16 bytes. */ 474114987Speter sfp = (struct ia32_sigframe *)((uintptr_t)sp & ~0xF); 475114987Speter PROC_UNLOCK(p); 476114987Speter 477114987Speter /* Translate the signal if appropriate. */ 478114987Speter if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize) 479114987Speter sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; 480114987Speter 481114987Speter /* Build the argument list for the signal handler. */ 482114987Speter sf.sf_signum = sig; 483114987Speter sf.sf_ucontext = (register_t)&sfp->sf_uc; 484126089Speter if (SIGISMEMBER(psp->ps_siginfo, sig)) { 485114987Speter /* Signal handler installed with SA_SIGINFO. */ 486114987Speter sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si; 487114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 488114987Speter 489114987Speter /* Fill in POSIX parts */ 490151316Sdavidxu sf.sf_si = siginfo; 491114987Speter sf.sf_si.si_signo = sig; 492114987Speter } else { 493114987Speter /* Old FreeBSD-style arguments. */ 494151316Sdavidxu sf.sf_siginfo = siginfo.si_code; 495151316Sdavidxu sf.sf_addr = (u_int32_t)siginfo.si_addr; 496114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 497114987Speter } 498123119Speter mtx_unlock(&psp->ps_mtx); 499114987Speter 500114987Speter /* 501114987Speter * Copy the sigframe out to the user's stack. 502114987Speter */ 503114987Speter if (copyout(&sf, sfp, sizeof(*sfp)) != 0) { 504114987Speter#ifdef DEBUG 505114987Speter printf("process %ld has trashed its stack\n", (long)p->p_pid); 506114987Speter#endif 507114987Speter PROC_LOCK(p); 508114987Speter sigexit(td, SIGILL); 509114987Speter } 510114987Speter 511114987Speter regs->tf_rsp = (uintptr_t)sfp; 512119336Speter regs->tf_rip = FREEBSD32_PS_STRINGS - *(p->p_sysent->sv_szsigcode); 513114987Speter regs->tf_rflags &= ~PSL_T; 514114987Speter regs->tf_cs = _ucode32sel; 515114987Speter regs->tf_ss = _udatasel; 516114987Speter load_ds(_udatasel); 517114987Speter td->td_pcb->pcb_ds = _udatasel; 518114987Speter load_es(_udatasel); 519114987Speter td->td_pcb->pcb_es = _udatasel; 520114987Speter /* leave user %fs and %gs untouched */ 521114987Speter PROC_LOCK(p); 522123119Speter mtx_lock(&psp->ps_mtx); 523114987Speter} 524114987Speter 525114987Speter/* 526114987Speter * System call to cleanup state after a signal 527114987Speter * has been taken. Reset signal mask and 528114987Speter * stack state from context left by sendsig (above). 529114987Speter * Return to previous pc and psl as specified by 530114987Speter * context left by sendsig. Check carefully to 531114987Speter * make sure that the user has not modified the 532114987Speter * state to gain improper privileges. 533114987Speter */ 534114987Speter#ifdef COMPAT_FREEBSD4 535114987Speter/* 536114987Speter * MPSAFE 537114987Speter */ 538114987Speterint 539119336Speterfreebsd4_freebsd32_sigreturn(td, uap) 540114987Speter struct thread *td; 541119336Speter struct freebsd4_freebsd32_sigreturn_args /* { 542119336Speter const struct freebsd4_freebsd32_ucontext *sigcntxp; 543114987Speter } */ *uap; 544114987Speter{ 545114987Speter struct ia32_ucontext4 uc; 546114987Speter struct proc *p = td->td_proc; 547114987Speter struct trapframe *regs; 548114987Speter const struct ia32_ucontext4 *ucp; 549114987Speter int cs, eflags, error; 550151316Sdavidxu ksiginfo_t ksi; 551114987Speter 552114987Speter error = copyin(uap->sigcntxp, &uc, sizeof(uc)); 553114987Speter if (error != 0) 554114987Speter return (error); 555114987Speter ucp = &uc; 556114987Speter regs = td->td_frame; 557114987Speter eflags = ucp->uc_mcontext.mc_eflags; 558114987Speter /* 559114987Speter * Don't allow users to change privileged or reserved flags. 560114987Speter */ 561114987Speter /* 562114987Speter * XXX do allow users to change the privileged flag PSL_RF. 563114987Speter * The cpu sets PSL_RF in tf_eflags for faults. Debuggers 564114987Speter * should sometimes set it there too. tf_eflags is kept in 565114987Speter * the signal context during signal handling and there is no 566114987Speter * other place to remember it, so the PSL_RF bit may be 567114987Speter * corrupted by the signal handler without us knowing. 568114987Speter * Corruption of the PSL_RF bit at worst causes one more or 569114987Speter * one less debugger trap, so allowing it is fairly harmless. 570114987Speter */ 571114987Speter if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) { 572119336Speter printf("freebsd4_freebsd32_sigreturn: eflags = 0x%x\n", eflags); 573114987Speter return (EINVAL); 574114987Speter } 575114987Speter 576114987Speter /* 577114987Speter * Don't allow users to load a valid privileged %cs. Let the 578114987Speter * hardware check for invalid selectors, excess privilege in 579114987Speter * other selectors, invalid %eip's and invalid %esp's. 580114987Speter */ 581114987Speter cs = ucp->uc_mcontext.mc_cs; 582114987Speter if (!CS_SECURE(cs)) { 583114987Speter printf("freebsd4_sigreturn: cs = 0x%x\n", cs); 584151316Sdavidxu ksiginfo_init_trap(&ksi); 585151316Sdavidxu ksi.ksi_signo = SIGBUS; 586151316Sdavidxu ksi.ksi_code = BUS_OBJERR; 587151316Sdavidxu ksi.ksi_trapno = T_PROTFLT; 588151316Sdavidxu ksi.ksi_addr = (void *)regs->tf_rip; 589151316Sdavidxu trapsignal(td, &ksi); 590114987Speter return (EINVAL); 591114987Speter } 592114987Speter 593114987Speter /* Segment selectors restored by sigtramp.S */ 594114987Speter regs->tf_rdi = ucp->uc_mcontext.mc_edi; 595114987Speter regs->tf_rsi = ucp->uc_mcontext.mc_esi; 596114987Speter regs->tf_rbp = ucp->uc_mcontext.mc_ebp; 597114987Speter regs->tf_rbx = ucp->uc_mcontext.mc_ebx; 598114987Speter regs->tf_rdx = ucp->uc_mcontext.mc_edx; 599114987Speter regs->tf_rcx = ucp->uc_mcontext.mc_ecx; 600114987Speter regs->tf_rax = ucp->uc_mcontext.mc_eax; 601114987Speter regs->tf_trapno = ucp->uc_mcontext.mc_trapno; 602114987Speter regs->tf_err = ucp->uc_mcontext.mc_err; 603114987Speter regs->tf_rip = ucp->uc_mcontext.mc_eip; 604114987Speter regs->tf_cs = cs; 605114987Speter regs->tf_rflags = ucp->uc_mcontext.mc_eflags; 606114987Speter regs->tf_rsp = ucp->uc_mcontext.mc_esp; 607114987Speter regs->tf_ss = ucp->uc_mcontext.mc_ss; 608114987Speter 609114987Speter PROC_LOCK(p); 610114987Speter td->td_sigmask = ucp->uc_sigmask; 611114987Speter SIG_CANTMASK(td->td_sigmask); 612114987Speter signotify(td); 613114987Speter PROC_UNLOCK(p); 614114987Speter return (EJUSTRETURN); 615114987Speter} 616114987Speter#endif /* COMPAT_FREEBSD4 */ 617114987Speter 618114987Speter/* 619114987Speter * MPSAFE 620114987Speter */ 621114987Speterint 622119336Speterfreebsd32_sigreturn(td, uap) 623114987Speter struct thread *td; 624119336Speter struct freebsd32_sigreturn_args /* { 625119336Speter const struct freebsd32_ucontext *sigcntxp; 626114987Speter } */ *uap; 627114987Speter{ 628114987Speter struct ia32_ucontext uc; 629114987Speter struct proc *p = td->td_proc; 630114987Speter struct trapframe *regs; 631114987Speter const struct ia32_ucontext *ucp; 632114987Speter int cs, eflags, error, ret; 633151316Sdavidxu ksiginfo_t ksi; 634114987Speter 635114987Speter error = copyin(uap->sigcntxp, &uc, sizeof(uc)); 636114987Speter if (error != 0) 637114987Speter return (error); 638114987Speter ucp = &uc; 639114987Speter regs = td->td_frame; 640114987Speter eflags = ucp->uc_mcontext.mc_eflags; 641114987Speter /* 642114987Speter * Don't allow users to change privileged or reserved flags. 643114987Speter */ 644114987Speter /* 645114987Speter * XXX do allow users to change the privileged flag PSL_RF. 646114987Speter * The cpu sets PSL_RF in tf_eflags for faults. Debuggers 647114987Speter * should sometimes set it there too. tf_eflags is kept in 648114987Speter * the signal context during signal handling and there is no 649114987Speter * other place to remember it, so the PSL_RF bit may be 650114987Speter * corrupted by the signal handler without us knowing. 651114987Speter * Corruption of the PSL_RF bit at worst causes one more or 652114987Speter * one less debugger trap, so allowing it is fairly harmless. 653114987Speter */ 654114987Speter if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) { 655119336Speter printf("freebsd32_sigreturn: eflags = 0x%x\n", eflags); 656114987Speter return (EINVAL); 657114987Speter } 658114987Speter 659114987Speter /* 660114987Speter * Don't allow users to load a valid privileged %cs. Let the 661114987Speter * hardware check for invalid selectors, excess privilege in 662114987Speter * other selectors, invalid %eip's and invalid %esp's. 663114987Speter */ 664114987Speter cs = ucp->uc_mcontext.mc_cs; 665114987Speter if (!CS_SECURE(cs)) { 666114987Speter printf("sigreturn: cs = 0x%x\n", cs); 667151316Sdavidxu ksiginfo_init_trap(&ksi); 668151316Sdavidxu ksi.ksi_signo = SIGBUS; 669151316Sdavidxu ksi.ksi_code = BUS_OBJERR; 670151316Sdavidxu ksi.ksi_trapno = T_PROTFLT; 671151316Sdavidxu ksi.ksi_addr = (void *)regs->tf_rip; 672151316Sdavidxu trapsignal(td, &ksi); 673114987Speter return (EINVAL); 674114987Speter } 675114987Speter 676114987Speter ret = ia32_set_fpcontext(td, &ucp->uc_mcontext); 677114987Speter if (ret != 0) 678114987Speter return (ret); 679114987Speter 680114987Speter /* Segment selectors restored by sigtramp.S */ 681114987Speter regs->tf_rdi = ucp->uc_mcontext.mc_edi; 682114987Speter regs->tf_rsi = ucp->uc_mcontext.mc_esi; 683114987Speter regs->tf_rbp = ucp->uc_mcontext.mc_ebp; 684114987Speter regs->tf_rbx = ucp->uc_mcontext.mc_ebx; 685114987Speter regs->tf_rdx = ucp->uc_mcontext.mc_edx; 686114987Speter regs->tf_rcx = ucp->uc_mcontext.mc_ecx; 687114987Speter regs->tf_rax = ucp->uc_mcontext.mc_eax; 688114987Speter regs->tf_trapno = ucp->uc_mcontext.mc_trapno; 689114987Speter regs->tf_err = ucp->uc_mcontext.mc_err; 690114987Speter regs->tf_rip = ucp->uc_mcontext.mc_eip; 691114987Speter regs->tf_cs = cs; 692114987Speter regs->tf_rflags = ucp->uc_mcontext.mc_eflags; 693114987Speter regs->tf_rsp = ucp->uc_mcontext.mc_esp; 694114987Speter regs->tf_ss = ucp->uc_mcontext.mc_ss; 695114987Speter 696114987Speter PROC_LOCK(p); 697114987Speter td->td_sigmask = ucp->uc_sigmask; 698114987Speter SIG_CANTMASK(td->td_sigmask); 699114987Speter signotify(td); 700114987Speter PROC_UNLOCK(p); 701114987Speter return (EJUSTRETURN); 702114987Speter} 703122303Speter 704122303Speter/* 705122303Speter * Clear registers on exec 706122303Speter */ 707122303Spetervoid 708122303Speteria32_setregs(td, entry, stack, ps_strings) 709122303Speter struct thread *td; 710122303Speter u_long entry; 711122303Speter u_long stack; 712122303Speter u_long ps_strings; 713122303Speter{ 714122303Speter struct trapframe *regs = td->td_frame; 715122303Speter struct pcb *pcb = td->td_pcb; 716122303Speter 717122303Speter wrmsr(MSR_FSBASE, 0); 718122303Speter wrmsr(MSR_KGSBASE, 0); /* User value while we're in the kernel */ 719122303Speter pcb->pcb_fsbase = 0; 720122303Speter pcb->pcb_gsbase = 0; 721122303Speter load_ds(_udatasel); 722122303Speter load_es(_udatasel); 723122303Speter load_fs(_udatasel); 724122303Speter load_gs(_udatasel); 725122303Speter pcb->pcb_ds = _udatasel; 726122303Speter pcb->pcb_es = _udatasel; 727122303Speter pcb->pcb_fs = _udatasel; 728122303Speter pcb->pcb_gs = _udatasel; 729122303Speter 730122303Speter bzero((char *)regs, sizeof(struct trapframe)); 731122303Speter regs->tf_rip = entry; 732122303Speter regs->tf_rsp = stack; 733122303Speter regs->tf_rflags = PSL_USER | (regs->tf_rflags & PSL_T); 734122303Speter regs->tf_ss = _udatasel; 735122303Speter regs->tf_cs = _ucode32sel; 736122303Speter regs->tf_rbx = ps_strings; 737122303Speter load_cr0(rcr0() | CR0_MP | CR0_TS); 738122303Speter fpstate_drop(td); 739122303Speter 740122303Speter /* Return via doreti so that we can change to a different %cs */ 741122303Speter pcb->pcb_flags |= PCB_FULLCTX; 742122303Speter td->td_retval[1] = 0; 743122303Speter} 744151316Sdavidxu 745151316Sdavidxuvoid 746151316Sdavidxusiginfo_to_ia32siginfo(siginfo_t *src, struct ia32_siginfo *dst) 747151316Sdavidxu{ 748151316Sdavidxu dst->si_signo = src->si_signo; 749151316Sdavidxu dst->si_errno = src->si_errno; 750151316Sdavidxu dst->si_code = src->si_code; 751151316Sdavidxu dst->si_pid = src->si_pid; 752151316Sdavidxu dst->si_uid = src->si_uid; 753151316Sdavidxu dst->si_status = src->si_status; 754151316Sdavidxu dst->si_addr = dst->si_addr; 755151316Sdavidxu dst->si_value.sigval_int = src->si_value.sigval_int; 756151316Sdavidxu dst->si_band = src->si_band; 757151316Sdavidxu dst->__spare__[0] = src->si_trapno; 758151316Sdavidxu} 759