ia32_signal.c revision 163018
1114987Speter/*- 2114987Speter * Copyright (c) 2003 Peter Wemm 3114987Speter * Copyright (c) 1982, 1987, 1990 The Regents of the University of California. 4114987Speter * All rights reserved. 5114987Speter * 6114987Speter * This code is derived from software contributed to Berkeley by 7114987Speter * William Jolitz. 8114987Speter * 9114987Speter * Redistribution and use in source and binary forms, with or without 10114987Speter * modification, are permitted provided that the following conditions 11114987Speter * are met: 12114987Speter * 1. Redistributions of source code must retain the above copyright 13114987Speter * notice, this list of conditions and the following disclaimer. 14114987Speter * 2. Redistributions in binary form must reproduce the above copyright 15114987Speter * notice, this list of conditions and the following disclaimer in the 16114987Speter * documentation and/or other materials provided with the distribution. 17114987Speter * 4. Neither the name of the University nor the names of its contributors 18114987Speter * may be used to endorse or promote products derived from this software 19114987Speter * without specific prior written permission. 20114987Speter * 21114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24114987Speter * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31114987Speter * SUCH DAMAGE. 32114987Speter */ 33114987Speter 34118031Sobrien#include <sys/cdefs.h> 35118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_signal.c 163018 2006-10-05 01:56:11Z davidxu $"); 36118031Sobrien 37114987Speter#include "opt_compat.h" 38114987Speter 39114987Speter#include <sys/param.h> 40114987Speter#include <sys/exec.h> 41114987Speter#include <sys/fcntl.h> 42114987Speter#include <sys/imgact.h> 43114987Speter#include <sys/kernel.h> 44114987Speter#include <sys/lock.h> 45114987Speter#include <sys/malloc.h> 46114987Speter#include <sys/mutex.h> 47114987Speter#include <sys/mman.h> 48114987Speter#include <sys/namei.h> 49114987Speter#include <sys/pioctl.h> 50114987Speter#include <sys/proc.h> 51114987Speter#include <sys/procfs.h> 52114987Speter#include <sys/resourcevar.h> 53114987Speter#include <sys/systm.h> 54114987Speter#include <sys/signalvar.h> 55114987Speter#include <sys/stat.h> 56114987Speter#include <sys/sx.h> 57114987Speter#include <sys/syscall.h> 58114987Speter#include <sys/sysctl.h> 59114987Speter#include <sys/sysent.h> 60114987Speter#include <sys/vnode.h> 61114987Speter 62114987Speter#include <vm/vm.h> 63114987Speter#include <vm/vm_kern.h> 64114987Speter#include <vm/vm_param.h> 65114987Speter#include <vm/pmap.h> 66114987Speter#include <vm/vm_map.h> 67114987Speter#include <vm/vm_object.h> 68114987Speter#include <vm/vm_extern.h> 69114987Speter 70163018Sdavidxu#include <compat/freebsd32/freebsd32_signal.h> 71119336Speter#include <compat/freebsd32/freebsd32_util.h> 72119336Speter#include <compat/freebsd32/freebsd32_proto.h> 73119336Speter#include <compat/ia32/ia32_signal.h> 74114987Speter#include <machine/psl.h> 75114987Speter#include <machine/segments.h> 76114987Speter#include <machine/specialreg.h> 77114987Speter#include <machine/frame.h> 78114987Speter#include <machine/md_var.h> 79114987Speter#include <machine/pcb.h> 80114987Speter#include <machine/cpufunc.h> 81114987Speter 82114987Speter#ifdef COMPAT_FREEBSD4 83151316Sdavidxustatic void freebsd4_ia32_sendsig(sig_t, ksiginfo_t *, sigset_t *); 84114987Speter#endif 85114987Speterstatic void ia32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp); 86114987Speterstatic int ia32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp); 87114987Speter 88114987Speterextern int _ucode32sel, _udatasel; 89114987Speter 90114987Speter#define CS_SECURE(cs) (ISPL(cs) == SEL_UPL) 91114987Speter#define EFL_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0) 92114987Speter 93114987Speterstatic void 94114987Speteria32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp) 95114987Speter{ 96114987Speter 97150631Speter mcp->mc_ownedfp = fpugetregs(td, (struct savefpu *)&mcp->mc_fpstate); 98122292Speter mcp->mc_fpformat = fpuformat(); 99114987Speter} 100114987Speter 101114987Speterstatic int 102114987Speteria32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp) 103114987Speter{ 104114987Speter 105114987Speter if (mcp->mc_fpformat == _MC_FPFMT_NODEV) 106114987Speter return (0); 107114987Speter else if (mcp->mc_fpformat != _MC_FPFMT_XMM) 108114987Speter return (EINVAL); 109114987Speter else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE) 110114987Speter /* We don't care what state is left in the FPU or PCB. */ 111114987Speter fpstate_drop(td); 112114987Speter else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU || 113114987Speter mcp->mc_ownedfp == _MC_FPOWNED_PCB) { 114114987Speter /* 115122292Speter * XXX we violate the dubious requirement that fpusetregs() 116114987Speter * be called with interrupts disabled. 117114987Speter */ 118150631Speter fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate); 119114987Speter } else 120114987Speter return (EINVAL); 121114987Speter return (0); 122114987Speter} 123114987Speter 124114987Speter/* 125150631Speter * Get machine context. 126150631Speter */ 127150631Speterstatic int 128150631Speteria32_get_mcontext(struct thread *td, struct ia32_mcontext *mcp, int flags) 129150631Speter{ 130150631Speter struct trapframe *tp; 131150631Speter 132150631Speter tp = td->td_frame; 133150631Speter 134150631Speter PROC_LOCK(curthread->td_proc); 135150631Speter mcp->mc_onstack = sigonstack(tp->tf_rsp); 136150631Speter PROC_UNLOCK(curthread->td_proc); 137150631Speter mcp->mc_gs = td->td_pcb->pcb_gs; 138150631Speter mcp->mc_fs = td->td_pcb->pcb_fs; 139150631Speter mcp->mc_es = td->td_pcb->pcb_es; 140150631Speter mcp->mc_ds = td->td_pcb->pcb_ds; 141150631Speter mcp->mc_edi = tp->tf_rdi; 142150631Speter mcp->mc_esi = tp->tf_rsi; 143150631Speter mcp->mc_ebp = tp->tf_rbp; 144150631Speter mcp->mc_isp = tp->tf_rsp; 145150631Speter if (flags & GET_MC_CLEAR_RET) { 146150631Speter mcp->mc_eax = 0; 147150631Speter mcp->mc_edx = 0; 148150631Speter } else { 149150631Speter mcp->mc_eax = tp->tf_rax; 150150631Speter mcp->mc_edx = tp->tf_rdx; 151150631Speter } 152150631Speter mcp->mc_ebx = tp->tf_rbx; 153150631Speter mcp->mc_ecx = tp->tf_rcx; 154150631Speter mcp->mc_eip = tp->tf_rip; 155150631Speter mcp->mc_cs = tp->tf_cs; 156150631Speter mcp->mc_eflags = tp->tf_rflags; 157150631Speter mcp->mc_esp = tp->tf_rsp; 158150631Speter mcp->mc_ss = tp->tf_ss; 159150631Speter mcp->mc_len = sizeof(*mcp); 160150631Speter ia32_get_fpcontext(td, mcp); 161150631Speter return (0); 162150631Speter} 163150631Speter 164150631Speter/* 165150631Speter * Set machine context. 166150631Speter * 167150631Speter * However, we don't set any but the user modifiable flags, and we won't 168150631Speter * touch the cs selector. 169150631Speter */ 170150631Speterstatic int 171150631Speteria32_set_mcontext(struct thread *td, const struct ia32_mcontext *mcp) 172150631Speter{ 173150631Speter struct trapframe *tp; 174150631Speter long rflags; 175150631Speter int ret; 176150631Speter 177150631Speter tp = td->td_frame; 178150631Speter if (mcp->mc_len != sizeof(*mcp)) 179150631Speter return (EINVAL); 180150631Speter rflags = (mcp->mc_eflags & PSL_USERCHANGE) | 181150631Speter (tp->tf_rflags & ~PSL_USERCHANGE); 182150631Speter ret = ia32_set_fpcontext(td, mcp); 183150631Speter if (ret != 0) 184150631Speter return (ret); 185150631Speter#if 0 /* XXX deal with load_fs() and friends */ 186150631Speter tp->tf_fs = mcp->mc_fs; 187150631Speter tp->tf_es = mcp->mc_es; 188150631Speter tp->tf_ds = mcp->mc_ds; 189150631Speter#endif 190150631Speter tp->tf_rdi = mcp->mc_edi; 191150631Speter tp->tf_rsi = mcp->mc_esi; 192150631Speter tp->tf_rbp = mcp->mc_ebp; 193150631Speter tp->tf_rbx = mcp->mc_ebx; 194150631Speter tp->tf_rdx = mcp->mc_edx; 195150631Speter tp->tf_rcx = mcp->mc_ecx; 196150631Speter tp->tf_rax = mcp->mc_eax; 197150631Speter /* trapno, err */ 198150631Speter tp->tf_rip = mcp->mc_eip; 199150631Speter tp->tf_rflags = rflags; 200150631Speter tp->tf_rsp = mcp->mc_esp; 201150631Speter tp->tf_ss = mcp->mc_ss; 202150631Speter#if 0 /* XXX deal with load_gs() and friends */ 203150631Speter td->td_pcb->pcb_gs = mcp->mc_gs; 204150631Speter#endif 205150631Speter td->td_pcb->pcb_flags |= PCB_FULLCTX; 206150631Speter return (0); 207150631Speter} 208150631Speter 209150631Speter/* 210150631Speter * The first two fields of a ucontext_t are the signal mask and 211150631Speter * the machine context. The next field is uc_link; we want to 212150631Speter * avoid destroying the link when copying out contexts. 213150631Speter */ 214150631Speter#define UC_COPY_SIZE offsetof(struct ia32_ucontext, uc_link) 215150631Speter 216150631Speterint 217150631Speterfreebsd32_getcontext(struct thread *td, struct freebsd32_getcontext_args *uap) 218150631Speter{ 219150631Speter struct ia32_ucontext uc; 220150631Speter int ret; 221150631Speter 222150631Speter if (uap->ucp == NULL) 223150631Speter ret = EINVAL; 224150631Speter else { 225150631Speter ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET); 226150631Speter PROC_LOCK(td->td_proc); 227150631Speter uc.uc_sigmask = td->td_sigmask; 228150631Speter PROC_UNLOCK(td->td_proc); 229150631Speter ret = copyout(&uc, uap->ucp, UC_COPY_SIZE); 230150631Speter } 231150631Speter return (ret); 232150631Speter} 233150631Speter 234150631Speterint 235150631Speterfreebsd32_setcontext(struct thread *td, struct freebsd32_setcontext_args *uap) 236150631Speter{ 237150631Speter struct ia32_ucontext uc; 238150631Speter int ret; 239150631Speter 240150631Speter if (uap->ucp == NULL) 241150631Speter ret = EINVAL; 242150631Speter else { 243150631Speter ret = copyin(uap->ucp, &uc, UC_COPY_SIZE); 244150631Speter if (ret == 0) { 245150631Speter ret = ia32_set_mcontext(td, &uc.uc_mcontext); 246150631Speter if (ret == 0) { 247150631Speter SIG_CANTMASK(uc.uc_sigmask); 248150631Speter PROC_LOCK(td->td_proc); 249150631Speter td->td_sigmask = uc.uc_sigmask; 250150631Speter PROC_UNLOCK(td->td_proc); 251150631Speter } 252150631Speter } 253150631Speter } 254150631Speter return (ret == 0 ? EJUSTRETURN : ret); 255150631Speter} 256150631Speter 257150631Speterint 258150631Speterfreebsd32_swapcontext(struct thread *td, struct freebsd32_swapcontext_args *uap) 259150631Speter{ 260150631Speter struct ia32_ucontext uc; 261150631Speter int ret; 262150631Speter 263150631Speter if (uap->oucp == NULL || uap->ucp == NULL) 264150631Speter ret = EINVAL; 265150631Speter else { 266150631Speter ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET); 267150631Speter PROC_LOCK(td->td_proc); 268150631Speter uc.uc_sigmask = td->td_sigmask; 269150631Speter PROC_UNLOCK(td->td_proc); 270150631Speter ret = copyout(&uc, uap->oucp, UC_COPY_SIZE); 271150631Speter if (ret == 0) { 272150631Speter ret = copyin(uap->ucp, &uc, UC_COPY_SIZE); 273150631Speter if (ret == 0) { 274150631Speter ret = ia32_set_mcontext(td, &uc.uc_mcontext); 275150631Speter if (ret == 0) { 276150631Speter SIG_CANTMASK(uc.uc_sigmask); 277150631Speter PROC_LOCK(td->td_proc); 278150631Speter td->td_sigmask = uc.uc_sigmask; 279150631Speter PROC_UNLOCK(td->td_proc); 280150631Speter } 281150631Speter } 282150631Speter } 283150631Speter } 284150631Speter return (ret == 0 ? EJUSTRETURN : ret); 285150631Speter} 286150631Speter 287150631Speter/* 288114987Speter * Send an interrupt to process. 289114987Speter * 290114987Speter * Stack is set up to allow sigcode stored 291114987Speter * at top to call routine, followed by kcall 292114987Speter * to sigreturn routine below. After sigreturn 293114987Speter * resets the signal mask, the stack, and the 294114987Speter * frame pointer, it returns to the user 295114987Speter * specified pc, psl. 296114987Speter */ 297114987Speter#ifdef COMPAT_FREEBSD4 298114987Speterstatic void 299151316Sdavidxufreebsd4_ia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask) 300114987Speter{ 301114987Speter struct ia32_sigframe4 sf, *sfp; 302163018Sdavidxu struct siginfo32 siginfo; 303114987Speter struct proc *p; 304114987Speter struct thread *td; 305114987Speter struct sigacts *psp; 306114987Speter struct trapframe *regs; 307114987Speter int oonstack; 308151316Sdavidxu int sig; 309114987Speter 310114987Speter td = curthread; 311114987Speter p = td->td_proc; 312163018Sdavidxu siginfo_to_siginfo32(&ksi->ksi_info, &siginfo); 313151316Sdavidxu 314114987Speter PROC_LOCK_ASSERT(p, MA_OWNED); 315151316Sdavidxu sig = siginfo.si_signo; 316114987Speter psp = p->p_sigacts; 317123119Speter mtx_assert(&psp->ps_mtx, MA_OWNED); 318114987Speter regs = td->td_frame; 319114987Speter oonstack = sigonstack(regs->tf_rsp); 320114987Speter 321114987Speter /* Save user context. */ 322114987Speter bzero(&sf, sizeof(sf)); 323114987Speter sf.sf_uc.uc_sigmask = *mask; 324124092Sdavidxu sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp; 325124092Sdavidxu sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size; 326124092Sdavidxu sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) 327114987Speter ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE; 328114987Speter sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0; 329114987Speter sf.sf_uc.uc_mcontext.mc_gs = rgs(); 330114987Speter sf.sf_uc.uc_mcontext.mc_fs = rfs(); 331114987Speter __asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es)); 332114987Speter __asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds)); 333114987Speter sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi; 334114987Speter sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi; 335114987Speter sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp; 336114987Speter sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */ 337114987Speter sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx; 338114987Speter sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx; 339114987Speter sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx; 340114987Speter sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax; 341114987Speter sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno; 342114987Speter sf.sf_uc.uc_mcontext.mc_err = regs->tf_err; 343114987Speter sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip; 344114987Speter sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs; 345114987Speter sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags; 346114987Speter sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp; 347114987Speter sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss; 348114987Speter 349114987Speter /* Allocate space for the signal handler context. */ 350124092Sdavidxu if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack && 351114987Speter SIGISMEMBER(psp->ps_sigonstack, sig)) { 352124092Sdavidxu sfp = (struct ia32_sigframe4 *)(td->td_sigstk.ss_sp + 353124092Sdavidxu td->td_sigstk.ss_size - sizeof(sf)); 354114987Speter } else 355114987Speter sfp = (struct ia32_sigframe4 *)regs->tf_rsp - 1; 356114987Speter PROC_UNLOCK(p); 357114987Speter 358114987Speter /* Translate the signal if appropriate. */ 359114987Speter if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize) 360114987Speter sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; 361114987Speter 362114987Speter /* Build the argument list for the signal handler. */ 363114987Speter sf.sf_signum = sig; 364114987Speter sf.sf_ucontext = (register_t)&sfp->sf_uc; 365126089Speter if (SIGISMEMBER(psp->ps_siginfo, sig)) { 366114987Speter /* Signal handler installed with SA_SIGINFO. */ 367114987Speter sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si; 368114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 369114987Speter 370114987Speter /* Fill in POSIX parts */ 371151316Sdavidxu sf.sf_si = siginfo; 372114987Speter sf.sf_si.si_signo = sig; 373114987Speter } else { 374114987Speter /* Old FreeBSD-style arguments. */ 375151316Sdavidxu sf.sf_siginfo = siginfo.si_code; 376151316Sdavidxu sf.sf_addr = (u_int32_t)siginfo.si_addr; 377114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 378114987Speter } 379123119Speter mtx_unlock(&psp->ps_mtx); 380114987Speter 381114987Speter /* 382114987Speter * Copy the sigframe out to the user's stack. 383114987Speter */ 384114987Speter if (copyout(&sf, sfp, sizeof(*sfp)) != 0) { 385114987Speter#ifdef DEBUG 386114987Speter printf("process %ld has trashed its stack\n", (long)p->p_pid); 387114987Speter#endif 388114987Speter PROC_LOCK(p); 389114987Speter sigexit(td, SIGILL); 390114987Speter } 391114987Speter 392114987Speter regs->tf_rsp = (uintptr_t)sfp; 393119336Speter regs->tf_rip = FREEBSD32_PS_STRINGS - sz_freebsd4_ia32_sigcode; 394114987Speter regs->tf_rflags &= ~PSL_T; 395114987Speter regs->tf_cs = _ucode32sel; 396114987Speter regs->tf_ss = _udatasel; 397114987Speter load_ds(_udatasel); 398114987Speter td->td_pcb->pcb_ds = _udatasel; 399114987Speter load_es(_udatasel); 400114987Speter td->td_pcb->pcb_es = _udatasel; 401114987Speter /* leave user %fs and %gs untouched */ 402114987Speter PROC_LOCK(p); 403123119Speter mtx_lock(&psp->ps_mtx); 404114987Speter} 405114987Speter#endif /* COMPAT_FREEBSD4 */ 406114987Speter 407114987Spetervoid 408151316Sdavidxuia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask) 409114987Speter{ 410114987Speter struct ia32_sigframe sf, *sfp; 411163018Sdavidxu struct siginfo32 siginfo; 412114987Speter struct proc *p; 413114987Speter struct thread *td; 414114987Speter struct sigacts *psp; 415114987Speter char *sp; 416114987Speter struct trapframe *regs; 417114987Speter int oonstack; 418151316Sdavidxu int sig; 419114987Speter 420163018Sdavidxu siginfo_to_siginfo32(&ksi->ksi_info, &siginfo); 421114987Speter td = curthread; 422114987Speter p = td->td_proc; 423114987Speter PROC_LOCK_ASSERT(p, MA_OWNED); 424151316Sdavidxu sig = siginfo.si_signo; 425114987Speter psp = p->p_sigacts; 426114987Speter#ifdef COMPAT_FREEBSD4 427114987Speter if (SIGISMEMBER(psp->ps_freebsd4, sig)) { 428151316Sdavidxu freebsd4_ia32_sendsig(catcher, ksi, mask); 429114987Speter return; 430114987Speter } 431114987Speter#endif 432123119Speter mtx_assert(&psp->ps_mtx, MA_OWNED); 433114987Speter regs = td->td_frame; 434114987Speter oonstack = sigonstack(regs->tf_rsp); 435114987Speter 436114987Speter /* Save user context. */ 437114987Speter bzero(&sf, sizeof(sf)); 438114987Speter sf.sf_uc.uc_sigmask = *mask; 439124092Sdavidxu sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp; 440124092Sdavidxu sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size; 441124092Sdavidxu sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) 442114987Speter ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE; 443114987Speter sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0; 444114987Speter sf.sf_uc.uc_mcontext.mc_gs = rgs(); 445114987Speter sf.sf_uc.uc_mcontext.mc_fs = rfs(); 446114987Speter __asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es)); 447114987Speter __asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds)); 448114987Speter sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi; 449114987Speter sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi; 450114987Speter sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp; 451114987Speter sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */ 452114987Speter sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx; 453114987Speter sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx; 454114987Speter sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx; 455114987Speter sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax; 456114987Speter sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno; 457114987Speter sf.sf_uc.uc_mcontext.mc_err = regs->tf_err; 458114987Speter sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip; 459114987Speter sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs; 460114987Speter sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags; 461114987Speter sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp; 462114987Speter sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss; 463114987Speter sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */ 464114987Speter ia32_get_fpcontext(td, &sf.sf_uc.uc_mcontext); 465114987Speter fpstate_drop(td); 466114987Speter 467114987Speter /* Allocate space for the signal handler context. */ 468124092Sdavidxu if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack && 469114987Speter SIGISMEMBER(psp->ps_sigonstack, sig)) { 470124092Sdavidxu sp = td->td_sigstk.ss_sp + 471124092Sdavidxu td->td_sigstk.ss_size - sizeof(sf); 472114987Speter } else 473114987Speter sp = (char *)regs->tf_rsp - sizeof(sf); 474114987Speter /* Align to 16 bytes. */ 475114987Speter sfp = (struct ia32_sigframe *)((uintptr_t)sp & ~0xF); 476114987Speter PROC_UNLOCK(p); 477114987Speter 478114987Speter /* Translate the signal if appropriate. */ 479114987Speter if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize) 480114987Speter sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; 481114987Speter 482114987Speter /* Build the argument list for the signal handler. */ 483114987Speter sf.sf_signum = sig; 484114987Speter sf.sf_ucontext = (register_t)&sfp->sf_uc; 485126089Speter if (SIGISMEMBER(psp->ps_siginfo, sig)) { 486114987Speter /* Signal handler installed with SA_SIGINFO. */ 487114987Speter sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si; 488114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 489114987Speter 490114987Speter /* Fill in POSIX parts */ 491151316Sdavidxu sf.sf_si = siginfo; 492114987Speter sf.sf_si.si_signo = sig; 493114987Speter } else { 494114987Speter /* Old FreeBSD-style arguments. */ 495151316Sdavidxu sf.sf_siginfo = siginfo.si_code; 496151316Sdavidxu sf.sf_addr = (u_int32_t)siginfo.si_addr; 497114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 498114987Speter } 499123119Speter mtx_unlock(&psp->ps_mtx); 500114987Speter 501114987Speter /* 502114987Speter * Copy the sigframe out to the user's stack. 503114987Speter */ 504114987Speter if (copyout(&sf, sfp, sizeof(*sfp)) != 0) { 505114987Speter#ifdef DEBUG 506114987Speter printf("process %ld has trashed its stack\n", (long)p->p_pid); 507114987Speter#endif 508114987Speter PROC_LOCK(p); 509114987Speter sigexit(td, SIGILL); 510114987Speter } 511114987Speter 512114987Speter regs->tf_rsp = (uintptr_t)sfp; 513119336Speter regs->tf_rip = FREEBSD32_PS_STRINGS - *(p->p_sysent->sv_szsigcode); 514114987Speter regs->tf_rflags &= ~PSL_T; 515114987Speter regs->tf_cs = _ucode32sel; 516114987Speter regs->tf_ss = _udatasel; 517114987Speter load_ds(_udatasel); 518114987Speter td->td_pcb->pcb_ds = _udatasel; 519114987Speter load_es(_udatasel); 520114987Speter td->td_pcb->pcb_es = _udatasel; 521114987Speter /* leave user %fs and %gs untouched */ 522114987Speter PROC_LOCK(p); 523123119Speter mtx_lock(&psp->ps_mtx); 524114987Speter} 525114987Speter 526114987Speter/* 527114987Speter * System call to cleanup state after a signal 528114987Speter * has been taken. Reset signal mask and 529114987Speter * stack state from context left by sendsig (above). 530114987Speter * Return to previous pc and psl as specified by 531114987Speter * context left by sendsig. Check carefully to 532114987Speter * make sure that the user has not modified the 533114987Speter * state to gain improper privileges. 534114987Speter */ 535114987Speter#ifdef COMPAT_FREEBSD4 536114987Speter/* 537114987Speter * MPSAFE 538114987Speter */ 539114987Speterint 540119336Speterfreebsd4_freebsd32_sigreturn(td, uap) 541114987Speter struct thread *td; 542119336Speter struct freebsd4_freebsd32_sigreturn_args /* { 543119336Speter const struct freebsd4_freebsd32_ucontext *sigcntxp; 544114987Speter } */ *uap; 545114987Speter{ 546114987Speter struct ia32_ucontext4 uc; 547114987Speter struct proc *p = td->td_proc; 548114987Speter struct trapframe *regs; 549114987Speter const struct ia32_ucontext4 *ucp; 550114987Speter int cs, eflags, error; 551151316Sdavidxu ksiginfo_t ksi; 552114987Speter 553114987Speter error = copyin(uap->sigcntxp, &uc, sizeof(uc)); 554114987Speter if (error != 0) 555114987Speter return (error); 556114987Speter ucp = &uc; 557114987Speter regs = td->td_frame; 558114987Speter eflags = ucp->uc_mcontext.mc_eflags; 559114987Speter /* 560114987Speter * Don't allow users to change privileged or reserved flags. 561114987Speter */ 562114987Speter /* 563114987Speter * XXX do allow users to change the privileged flag PSL_RF. 564114987Speter * The cpu sets PSL_RF in tf_eflags for faults. Debuggers 565114987Speter * should sometimes set it there too. tf_eflags is kept in 566114987Speter * the signal context during signal handling and there is no 567114987Speter * other place to remember it, so the PSL_RF bit may be 568114987Speter * corrupted by the signal handler without us knowing. 569114987Speter * Corruption of the PSL_RF bit at worst causes one more or 570114987Speter * one less debugger trap, so allowing it is fairly harmless. 571114987Speter */ 572114987Speter if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) { 573119336Speter printf("freebsd4_freebsd32_sigreturn: eflags = 0x%x\n", eflags); 574114987Speter return (EINVAL); 575114987Speter } 576114987Speter 577114987Speter /* 578114987Speter * Don't allow users to load a valid privileged %cs. Let the 579114987Speter * hardware check for invalid selectors, excess privilege in 580114987Speter * other selectors, invalid %eip's and invalid %esp's. 581114987Speter */ 582114987Speter cs = ucp->uc_mcontext.mc_cs; 583114987Speter if (!CS_SECURE(cs)) { 584114987Speter printf("freebsd4_sigreturn: cs = 0x%x\n", cs); 585151316Sdavidxu ksiginfo_init_trap(&ksi); 586151316Sdavidxu ksi.ksi_signo = SIGBUS; 587151316Sdavidxu ksi.ksi_code = BUS_OBJERR; 588151316Sdavidxu ksi.ksi_trapno = T_PROTFLT; 589151316Sdavidxu ksi.ksi_addr = (void *)regs->tf_rip; 590151316Sdavidxu trapsignal(td, &ksi); 591114987Speter return (EINVAL); 592114987Speter } 593114987Speter 594114987Speter /* Segment selectors restored by sigtramp.S */ 595114987Speter regs->tf_rdi = ucp->uc_mcontext.mc_edi; 596114987Speter regs->tf_rsi = ucp->uc_mcontext.mc_esi; 597114987Speter regs->tf_rbp = ucp->uc_mcontext.mc_ebp; 598114987Speter regs->tf_rbx = ucp->uc_mcontext.mc_ebx; 599114987Speter regs->tf_rdx = ucp->uc_mcontext.mc_edx; 600114987Speter regs->tf_rcx = ucp->uc_mcontext.mc_ecx; 601114987Speter regs->tf_rax = ucp->uc_mcontext.mc_eax; 602114987Speter regs->tf_trapno = ucp->uc_mcontext.mc_trapno; 603114987Speter regs->tf_err = ucp->uc_mcontext.mc_err; 604114987Speter regs->tf_rip = ucp->uc_mcontext.mc_eip; 605114987Speter regs->tf_cs = cs; 606114987Speter regs->tf_rflags = ucp->uc_mcontext.mc_eflags; 607114987Speter regs->tf_rsp = ucp->uc_mcontext.mc_esp; 608114987Speter regs->tf_ss = ucp->uc_mcontext.mc_ss; 609114987Speter 610114987Speter PROC_LOCK(p); 611114987Speter td->td_sigmask = ucp->uc_sigmask; 612114987Speter SIG_CANTMASK(td->td_sigmask); 613114987Speter signotify(td); 614114987Speter PROC_UNLOCK(p); 615114987Speter return (EJUSTRETURN); 616114987Speter} 617114987Speter#endif /* COMPAT_FREEBSD4 */ 618114987Speter 619114987Speter/* 620114987Speter * MPSAFE 621114987Speter */ 622114987Speterint 623119336Speterfreebsd32_sigreturn(td, uap) 624114987Speter struct thread *td; 625119336Speter struct freebsd32_sigreturn_args /* { 626119336Speter const struct freebsd32_ucontext *sigcntxp; 627114987Speter } */ *uap; 628114987Speter{ 629114987Speter struct ia32_ucontext uc; 630114987Speter struct proc *p = td->td_proc; 631114987Speter struct trapframe *regs; 632114987Speter const struct ia32_ucontext *ucp; 633114987Speter int cs, eflags, error, ret; 634151316Sdavidxu ksiginfo_t ksi; 635114987Speter 636114987Speter error = copyin(uap->sigcntxp, &uc, sizeof(uc)); 637114987Speter if (error != 0) 638114987Speter return (error); 639114987Speter ucp = &uc; 640114987Speter regs = td->td_frame; 641114987Speter eflags = ucp->uc_mcontext.mc_eflags; 642114987Speter /* 643114987Speter * Don't allow users to change privileged or reserved flags. 644114987Speter */ 645114987Speter /* 646114987Speter * XXX do allow users to change the privileged flag PSL_RF. 647114987Speter * The cpu sets PSL_RF in tf_eflags for faults. Debuggers 648114987Speter * should sometimes set it there too. tf_eflags is kept in 649114987Speter * the signal context during signal handling and there is no 650114987Speter * other place to remember it, so the PSL_RF bit may be 651114987Speter * corrupted by the signal handler without us knowing. 652114987Speter * Corruption of the PSL_RF bit at worst causes one more or 653114987Speter * one less debugger trap, so allowing it is fairly harmless. 654114987Speter */ 655114987Speter if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) { 656119336Speter printf("freebsd32_sigreturn: eflags = 0x%x\n", eflags); 657114987Speter return (EINVAL); 658114987Speter } 659114987Speter 660114987Speter /* 661114987Speter * Don't allow users to load a valid privileged %cs. Let the 662114987Speter * hardware check for invalid selectors, excess privilege in 663114987Speter * other selectors, invalid %eip's and invalid %esp's. 664114987Speter */ 665114987Speter cs = ucp->uc_mcontext.mc_cs; 666114987Speter if (!CS_SECURE(cs)) { 667114987Speter printf("sigreturn: cs = 0x%x\n", cs); 668151316Sdavidxu ksiginfo_init_trap(&ksi); 669151316Sdavidxu ksi.ksi_signo = SIGBUS; 670151316Sdavidxu ksi.ksi_code = BUS_OBJERR; 671151316Sdavidxu ksi.ksi_trapno = T_PROTFLT; 672151316Sdavidxu ksi.ksi_addr = (void *)regs->tf_rip; 673151316Sdavidxu trapsignal(td, &ksi); 674114987Speter return (EINVAL); 675114987Speter } 676114987Speter 677114987Speter ret = ia32_set_fpcontext(td, &ucp->uc_mcontext); 678114987Speter if (ret != 0) 679114987Speter return (ret); 680114987Speter 681114987Speter /* Segment selectors restored by sigtramp.S */ 682114987Speter regs->tf_rdi = ucp->uc_mcontext.mc_edi; 683114987Speter regs->tf_rsi = ucp->uc_mcontext.mc_esi; 684114987Speter regs->tf_rbp = ucp->uc_mcontext.mc_ebp; 685114987Speter regs->tf_rbx = ucp->uc_mcontext.mc_ebx; 686114987Speter regs->tf_rdx = ucp->uc_mcontext.mc_edx; 687114987Speter regs->tf_rcx = ucp->uc_mcontext.mc_ecx; 688114987Speter regs->tf_rax = ucp->uc_mcontext.mc_eax; 689114987Speter regs->tf_trapno = ucp->uc_mcontext.mc_trapno; 690114987Speter regs->tf_err = ucp->uc_mcontext.mc_err; 691114987Speter regs->tf_rip = ucp->uc_mcontext.mc_eip; 692114987Speter regs->tf_cs = cs; 693114987Speter regs->tf_rflags = ucp->uc_mcontext.mc_eflags; 694114987Speter regs->tf_rsp = ucp->uc_mcontext.mc_esp; 695114987Speter regs->tf_ss = ucp->uc_mcontext.mc_ss; 696114987Speter 697114987Speter PROC_LOCK(p); 698114987Speter td->td_sigmask = ucp->uc_sigmask; 699114987Speter SIG_CANTMASK(td->td_sigmask); 700114987Speter signotify(td); 701114987Speter PROC_UNLOCK(p); 702114987Speter return (EJUSTRETURN); 703114987Speter} 704122303Speter 705122303Speter/* 706122303Speter * Clear registers on exec 707122303Speter */ 708122303Spetervoid 709122303Speteria32_setregs(td, entry, stack, ps_strings) 710122303Speter struct thread *td; 711122303Speter u_long entry; 712122303Speter u_long stack; 713122303Speter u_long ps_strings; 714122303Speter{ 715122303Speter struct trapframe *regs = td->td_frame; 716122303Speter struct pcb *pcb = td->td_pcb; 717122303Speter 718122303Speter wrmsr(MSR_FSBASE, 0); 719122303Speter wrmsr(MSR_KGSBASE, 0); /* User value while we're in the kernel */ 720122303Speter pcb->pcb_fsbase = 0; 721122303Speter pcb->pcb_gsbase = 0; 722122303Speter load_ds(_udatasel); 723122303Speter load_es(_udatasel); 724122303Speter load_fs(_udatasel); 725122303Speter load_gs(_udatasel); 726122303Speter pcb->pcb_ds = _udatasel; 727122303Speter pcb->pcb_es = _udatasel; 728122303Speter pcb->pcb_fs = _udatasel; 729122303Speter pcb->pcb_gs = _udatasel; 730122303Speter 731122303Speter bzero((char *)regs, sizeof(struct trapframe)); 732122303Speter regs->tf_rip = entry; 733122303Speter regs->tf_rsp = stack; 734122303Speter regs->tf_rflags = PSL_USER | (regs->tf_rflags & PSL_T); 735122303Speter regs->tf_ss = _udatasel; 736122303Speter regs->tf_cs = _ucode32sel; 737122303Speter regs->tf_rbx = ps_strings; 738122303Speter load_cr0(rcr0() | CR0_MP | CR0_TS); 739122303Speter fpstate_drop(td); 740122303Speter 741122303Speter /* Return via doreti so that we can change to a different %cs */ 742122303Speter pcb->pcb_flags |= PCB_FULLCTX; 743122303Speter td->td_retval[1] = 0; 744122303Speter} 745