ia32_signal.c revision 163018
1114987Speter/*-
2114987Speter * Copyright (c) 2003 Peter Wemm
3114987Speter * Copyright (c) 1982, 1987, 1990 The Regents of the University of California.
4114987Speter * All rights reserved.
5114987Speter *
6114987Speter * This code is derived from software contributed to Berkeley by
7114987Speter * William Jolitz.
8114987Speter *
9114987Speter * Redistribution and use in source and binary forms, with or without
10114987Speter * modification, are permitted provided that the following conditions
11114987Speter * are met:
12114987Speter * 1. Redistributions of source code must retain the above copyright
13114987Speter *    notice, this list of conditions and the following disclaimer.
14114987Speter * 2. Redistributions in binary form must reproduce the above copyright
15114987Speter *    notice, this list of conditions and the following disclaimer in the
16114987Speter *    documentation and/or other materials provided with the distribution.
17114987Speter * 4. Neither the name of the University nor the names of its contributors
18114987Speter *    may be used to endorse or promote products derived from this software
19114987Speter *    without specific prior written permission.
20114987Speter *
21114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24114987Speter * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31114987Speter * SUCH DAMAGE.
32114987Speter */
33114987Speter
34118031Sobrien#include <sys/cdefs.h>
35118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_signal.c 163018 2006-10-05 01:56:11Z davidxu $");
36118031Sobrien
37114987Speter#include "opt_compat.h"
38114987Speter
39114987Speter#include <sys/param.h>
40114987Speter#include <sys/exec.h>
41114987Speter#include <sys/fcntl.h>
42114987Speter#include <sys/imgact.h>
43114987Speter#include <sys/kernel.h>
44114987Speter#include <sys/lock.h>
45114987Speter#include <sys/malloc.h>
46114987Speter#include <sys/mutex.h>
47114987Speter#include <sys/mman.h>
48114987Speter#include <sys/namei.h>
49114987Speter#include <sys/pioctl.h>
50114987Speter#include <sys/proc.h>
51114987Speter#include <sys/procfs.h>
52114987Speter#include <sys/resourcevar.h>
53114987Speter#include <sys/systm.h>
54114987Speter#include <sys/signalvar.h>
55114987Speter#include <sys/stat.h>
56114987Speter#include <sys/sx.h>
57114987Speter#include <sys/syscall.h>
58114987Speter#include <sys/sysctl.h>
59114987Speter#include <sys/sysent.h>
60114987Speter#include <sys/vnode.h>
61114987Speter
62114987Speter#include <vm/vm.h>
63114987Speter#include <vm/vm_kern.h>
64114987Speter#include <vm/vm_param.h>
65114987Speter#include <vm/pmap.h>
66114987Speter#include <vm/vm_map.h>
67114987Speter#include <vm/vm_object.h>
68114987Speter#include <vm/vm_extern.h>
69114987Speter
70163018Sdavidxu#include <compat/freebsd32/freebsd32_signal.h>
71119336Speter#include <compat/freebsd32/freebsd32_util.h>
72119336Speter#include <compat/freebsd32/freebsd32_proto.h>
73119336Speter#include <compat/ia32/ia32_signal.h>
74114987Speter#include <machine/psl.h>
75114987Speter#include <machine/segments.h>
76114987Speter#include <machine/specialreg.h>
77114987Speter#include <machine/frame.h>
78114987Speter#include <machine/md_var.h>
79114987Speter#include <machine/pcb.h>
80114987Speter#include <machine/cpufunc.h>
81114987Speter
82114987Speter#ifdef COMPAT_FREEBSD4
83151316Sdavidxustatic void freebsd4_ia32_sendsig(sig_t, ksiginfo_t *, sigset_t *);
84114987Speter#endif
85114987Speterstatic void ia32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp);
86114987Speterstatic int ia32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp);
87114987Speter
88114987Speterextern int _ucode32sel, _udatasel;
89114987Speter
90114987Speter#define	CS_SECURE(cs)		(ISPL(cs) == SEL_UPL)
91114987Speter#define	EFL_SECURE(ef, oef)	((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
92114987Speter
93114987Speterstatic void
94114987Speteria32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp)
95114987Speter{
96114987Speter
97150631Speter	mcp->mc_ownedfp = fpugetregs(td, (struct savefpu *)&mcp->mc_fpstate);
98122292Speter	mcp->mc_fpformat = fpuformat();
99114987Speter}
100114987Speter
101114987Speterstatic int
102114987Speteria32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp)
103114987Speter{
104114987Speter
105114987Speter	if (mcp->mc_fpformat == _MC_FPFMT_NODEV)
106114987Speter		return (0);
107114987Speter	else if (mcp->mc_fpformat != _MC_FPFMT_XMM)
108114987Speter		return (EINVAL);
109114987Speter	else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE)
110114987Speter		/* We don't care what state is left in the FPU or PCB. */
111114987Speter		fpstate_drop(td);
112114987Speter	else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU ||
113114987Speter	    mcp->mc_ownedfp == _MC_FPOWNED_PCB) {
114114987Speter		/*
115122292Speter		 * XXX we violate the dubious requirement that fpusetregs()
116114987Speter		 * be called with interrupts disabled.
117114987Speter		 */
118150631Speter		fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate);
119114987Speter	} else
120114987Speter		return (EINVAL);
121114987Speter	return (0);
122114987Speter}
123114987Speter
124114987Speter/*
125150631Speter * Get machine context.
126150631Speter */
127150631Speterstatic int
128150631Speteria32_get_mcontext(struct thread *td, struct ia32_mcontext *mcp, int flags)
129150631Speter{
130150631Speter	struct trapframe *tp;
131150631Speter
132150631Speter	tp = td->td_frame;
133150631Speter
134150631Speter	PROC_LOCK(curthread->td_proc);
135150631Speter	mcp->mc_onstack = sigonstack(tp->tf_rsp);
136150631Speter	PROC_UNLOCK(curthread->td_proc);
137150631Speter	mcp->mc_gs = td->td_pcb->pcb_gs;
138150631Speter	mcp->mc_fs = td->td_pcb->pcb_fs;
139150631Speter	mcp->mc_es = td->td_pcb->pcb_es;
140150631Speter	mcp->mc_ds = td->td_pcb->pcb_ds;
141150631Speter	mcp->mc_edi = tp->tf_rdi;
142150631Speter	mcp->mc_esi = tp->tf_rsi;
143150631Speter	mcp->mc_ebp = tp->tf_rbp;
144150631Speter	mcp->mc_isp = tp->tf_rsp;
145150631Speter	if (flags & GET_MC_CLEAR_RET) {
146150631Speter		mcp->mc_eax = 0;
147150631Speter		mcp->mc_edx = 0;
148150631Speter	} else {
149150631Speter		mcp->mc_eax = tp->tf_rax;
150150631Speter		mcp->mc_edx = tp->tf_rdx;
151150631Speter	}
152150631Speter	mcp->mc_ebx = tp->tf_rbx;
153150631Speter	mcp->mc_ecx = tp->tf_rcx;
154150631Speter	mcp->mc_eip = tp->tf_rip;
155150631Speter	mcp->mc_cs = tp->tf_cs;
156150631Speter	mcp->mc_eflags = tp->tf_rflags;
157150631Speter	mcp->mc_esp = tp->tf_rsp;
158150631Speter	mcp->mc_ss = tp->tf_ss;
159150631Speter	mcp->mc_len = sizeof(*mcp);
160150631Speter	ia32_get_fpcontext(td, mcp);
161150631Speter	return (0);
162150631Speter}
163150631Speter
164150631Speter/*
165150631Speter * Set machine context.
166150631Speter *
167150631Speter * However, we don't set any but the user modifiable flags, and we won't
168150631Speter * touch the cs selector.
169150631Speter */
170150631Speterstatic int
171150631Speteria32_set_mcontext(struct thread *td, const struct ia32_mcontext *mcp)
172150631Speter{
173150631Speter	struct trapframe *tp;
174150631Speter	long rflags;
175150631Speter	int ret;
176150631Speter
177150631Speter	tp = td->td_frame;
178150631Speter	if (mcp->mc_len != sizeof(*mcp))
179150631Speter		return (EINVAL);
180150631Speter	rflags = (mcp->mc_eflags & PSL_USERCHANGE) |
181150631Speter	    (tp->tf_rflags & ~PSL_USERCHANGE);
182150631Speter	ret = ia32_set_fpcontext(td, mcp);
183150631Speter	if (ret != 0)
184150631Speter		return (ret);
185150631Speter#if 0	/* XXX deal with load_fs() and friends */
186150631Speter	tp->tf_fs = mcp->mc_fs;
187150631Speter	tp->tf_es = mcp->mc_es;
188150631Speter	tp->tf_ds = mcp->mc_ds;
189150631Speter#endif
190150631Speter	tp->tf_rdi = mcp->mc_edi;
191150631Speter	tp->tf_rsi = mcp->mc_esi;
192150631Speter	tp->tf_rbp = mcp->mc_ebp;
193150631Speter	tp->tf_rbx = mcp->mc_ebx;
194150631Speter	tp->tf_rdx = mcp->mc_edx;
195150631Speter	tp->tf_rcx = mcp->mc_ecx;
196150631Speter	tp->tf_rax = mcp->mc_eax;
197150631Speter	/* trapno, err */
198150631Speter	tp->tf_rip = mcp->mc_eip;
199150631Speter	tp->tf_rflags = rflags;
200150631Speter	tp->tf_rsp = mcp->mc_esp;
201150631Speter	tp->tf_ss = mcp->mc_ss;
202150631Speter#if 0	/* XXX deal with load_gs() and friends */
203150631Speter	td->td_pcb->pcb_gs = mcp->mc_gs;
204150631Speter#endif
205150631Speter	td->td_pcb->pcb_flags |= PCB_FULLCTX;
206150631Speter	return (0);
207150631Speter}
208150631Speter
209150631Speter/*
210150631Speter * The first two fields of a ucontext_t are the signal mask and
211150631Speter * the machine context.  The next field is uc_link; we want to
212150631Speter * avoid destroying the link when copying out contexts.
213150631Speter */
214150631Speter#define	UC_COPY_SIZE	offsetof(struct ia32_ucontext, uc_link)
215150631Speter
216150631Speterint
217150631Speterfreebsd32_getcontext(struct thread *td, struct freebsd32_getcontext_args *uap)
218150631Speter{
219150631Speter	struct ia32_ucontext uc;
220150631Speter	int ret;
221150631Speter
222150631Speter	if (uap->ucp == NULL)
223150631Speter		ret = EINVAL;
224150631Speter	else {
225150631Speter		ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET);
226150631Speter		PROC_LOCK(td->td_proc);
227150631Speter		uc.uc_sigmask = td->td_sigmask;
228150631Speter		PROC_UNLOCK(td->td_proc);
229150631Speter		ret = copyout(&uc, uap->ucp, UC_COPY_SIZE);
230150631Speter	}
231150631Speter	return (ret);
232150631Speter}
233150631Speter
234150631Speterint
235150631Speterfreebsd32_setcontext(struct thread *td, struct freebsd32_setcontext_args *uap)
236150631Speter{
237150631Speter	struct ia32_ucontext uc;
238150631Speter	int ret;
239150631Speter
240150631Speter	if (uap->ucp == NULL)
241150631Speter		ret = EINVAL;
242150631Speter	else {
243150631Speter		ret = copyin(uap->ucp, &uc, UC_COPY_SIZE);
244150631Speter		if (ret == 0) {
245150631Speter			ret = ia32_set_mcontext(td, &uc.uc_mcontext);
246150631Speter			if (ret == 0) {
247150631Speter				SIG_CANTMASK(uc.uc_sigmask);
248150631Speter				PROC_LOCK(td->td_proc);
249150631Speter				td->td_sigmask = uc.uc_sigmask;
250150631Speter				PROC_UNLOCK(td->td_proc);
251150631Speter			}
252150631Speter		}
253150631Speter	}
254150631Speter	return (ret == 0 ? EJUSTRETURN : ret);
255150631Speter}
256150631Speter
257150631Speterint
258150631Speterfreebsd32_swapcontext(struct thread *td, struct freebsd32_swapcontext_args *uap)
259150631Speter{
260150631Speter	struct ia32_ucontext uc;
261150631Speter	int ret;
262150631Speter
263150631Speter	if (uap->oucp == NULL || uap->ucp == NULL)
264150631Speter		ret = EINVAL;
265150631Speter	else {
266150631Speter		ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET);
267150631Speter		PROC_LOCK(td->td_proc);
268150631Speter		uc.uc_sigmask = td->td_sigmask;
269150631Speter		PROC_UNLOCK(td->td_proc);
270150631Speter		ret = copyout(&uc, uap->oucp, UC_COPY_SIZE);
271150631Speter		if (ret == 0) {
272150631Speter			ret = copyin(uap->ucp, &uc, UC_COPY_SIZE);
273150631Speter			if (ret == 0) {
274150631Speter				ret = ia32_set_mcontext(td, &uc.uc_mcontext);
275150631Speter				if (ret == 0) {
276150631Speter					SIG_CANTMASK(uc.uc_sigmask);
277150631Speter					PROC_LOCK(td->td_proc);
278150631Speter					td->td_sigmask = uc.uc_sigmask;
279150631Speter					PROC_UNLOCK(td->td_proc);
280150631Speter				}
281150631Speter			}
282150631Speter		}
283150631Speter	}
284150631Speter	return (ret == 0 ? EJUSTRETURN : ret);
285150631Speter}
286150631Speter
287150631Speter/*
288114987Speter * Send an interrupt to process.
289114987Speter *
290114987Speter * Stack is set up to allow sigcode stored
291114987Speter * at top to call routine, followed by kcall
292114987Speter * to sigreturn routine below.  After sigreturn
293114987Speter * resets the signal mask, the stack, and the
294114987Speter * frame pointer, it returns to the user
295114987Speter * specified pc, psl.
296114987Speter */
297114987Speter#ifdef COMPAT_FREEBSD4
298114987Speterstatic void
299151316Sdavidxufreebsd4_ia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
300114987Speter{
301114987Speter	struct ia32_sigframe4 sf, *sfp;
302163018Sdavidxu	struct siginfo32 siginfo;
303114987Speter	struct proc *p;
304114987Speter	struct thread *td;
305114987Speter	struct sigacts *psp;
306114987Speter	struct trapframe *regs;
307114987Speter	int oonstack;
308151316Sdavidxu	int sig;
309114987Speter
310114987Speter	td = curthread;
311114987Speter	p = td->td_proc;
312163018Sdavidxu	siginfo_to_siginfo32(&ksi->ksi_info, &siginfo);
313151316Sdavidxu
314114987Speter	PROC_LOCK_ASSERT(p, MA_OWNED);
315151316Sdavidxu	sig = siginfo.si_signo;
316114987Speter	psp = p->p_sigacts;
317123119Speter	mtx_assert(&psp->ps_mtx, MA_OWNED);
318114987Speter	regs = td->td_frame;
319114987Speter	oonstack = sigonstack(regs->tf_rsp);
320114987Speter
321114987Speter	/* Save user context. */
322114987Speter	bzero(&sf, sizeof(sf));
323114987Speter	sf.sf_uc.uc_sigmask = *mask;
324124092Sdavidxu	sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp;
325124092Sdavidxu	sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size;
326124092Sdavidxu	sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
327114987Speter	    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
328114987Speter	sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
329114987Speter	sf.sf_uc.uc_mcontext.mc_gs = rgs();
330114987Speter	sf.sf_uc.uc_mcontext.mc_fs = rfs();
331114987Speter	__asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es));
332114987Speter	__asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds));
333114987Speter	sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi;
334114987Speter	sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi;
335114987Speter	sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp;
336114987Speter	sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */
337114987Speter	sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx;
338114987Speter	sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx;
339114987Speter	sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx;
340114987Speter	sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax;
341114987Speter	sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno;
342114987Speter	sf.sf_uc.uc_mcontext.mc_err = regs->tf_err;
343114987Speter	sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip;
344114987Speter	sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs;
345114987Speter	sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags;
346114987Speter	sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp;
347114987Speter	sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss;
348114987Speter
349114987Speter	/* Allocate space for the signal handler context. */
350124092Sdavidxu	if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
351114987Speter	    SIGISMEMBER(psp->ps_sigonstack, sig)) {
352124092Sdavidxu		sfp = (struct ia32_sigframe4 *)(td->td_sigstk.ss_sp +
353124092Sdavidxu		    td->td_sigstk.ss_size - sizeof(sf));
354114987Speter	} else
355114987Speter		sfp = (struct ia32_sigframe4 *)regs->tf_rsp - 1;
356114987Speter	PROC_UNLOCK(p);
357114987Speter
358114987Speter	/* Translate the signal if appropriate. */
359114987Speter	if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize)
360114987Speter		sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)];
361114987Speter
362114987Speter	/* Build the argument list for the signal handler. */
363114987Speter	sf.sf_signum = sig;
364114987Speter	sf.sf_ucontext = (register_t)&sfp->sf_uc;
365126089Speter	if (SIGISMEMBER(psp->ps_siginfo, sig)) {
366114987Speter		/* Signal handler installed with SA_SIGINFO. */
367114987Speter		sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si;
368114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
369114987Speter
370114987Speter		/* Fill in POSIX parts */
371151316Sdavidxu		sf.sf_si = siginfo;
372114987Speter		sf.sf_si.si_signo = sig;
373114987Speter	} else {
374114987Speter		/* Old FreeBSD-style arguments. */
375151316Sdavidxu		sf.sf_siginfo = siginfo.si_code;
376151316Sdavidxu		sf.sf_addr = (u_int32_t)siginfo.si_addr;
377114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
378114987Speter	}
379123119Speter	mtx_unlock(&psp->ps_mtx);
380114987Speter
381114987Speter	/*
382114987Speter	 * Copy the sigframe out to the user's stack.
383114987Speter	 */
384114987Speter	if (copyout(&sf, sfp, sizeof(*sfp)) != 0) {
385114987Speter#ifdef DEBUG
386114987Speter		printf("process %ld has trashed its stack\n", (long)p->p_pid);
387114987Speter#endif
388114987Speter		PROC_LOCK(p);
389114987Speter		sigexit(td, SIGILL);
390114987Speter	}
391114987Speter
392114987Speter	regs->tf_rsp = (uintptr_t)sfp;
393119336Speter	regs->tf_rip = FREEBSD32_PS_STRINGS - sz_freebsd4_ia32_sigcode;
394114987Speter	regs->tf_rflags &= ~PSL_T;
395114987Speter	regs->tf_cs = _ucode32sel;
396114987Speter	regs->tf_ss = _udatasel;
397114987Speter	load_ds(_udatasel);
398114987Speter	td->td_pcb->pcb_ds = _udatasel;
399114987Speter	load_es(_udatasel);
400114987Speter	td->td_pcb->pcb_es = _udatasel;
401114987Speter	/* leave user %fs and %gs untouched */
402114987Speter	PROC_LOCK(p);
403123119Speter	mtx_lock(&psp->ps_mtx);
404114987Speter}
405114987Speter#endif	/* COMPAT_FREEBSD4 */
406114987Speter
407114987Spetervoid
408151316Sdavidxuia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
409114987Speter{
410114987Speter	struct ia32_sigframe sf, *sfp;
411163018Sdavidxu	struct siginfo32 siginfo;
412114987Speter	struct proc *p;
413114987Speter	struct thread *td;
414114987Speter	struct sigacts *psp;
415114987Speter	char *sp;
416114987Speter	struct trapframe *regs;
417114987Speter	int oonstack;
418151316Sdavidxu	int sig;
419114987Speter
420163018Sdavidxu	siginfo_to_siginfo32(&ksi->ksi_info, &siginfo);
421114987Speter	td = curthread;
422114987Speter	p = td->td_proc;
423114987Speter	PROC_LOCK_ASSERT(p, MA_OWNED);
424151316Sdavidxu	sig = siginfo.si_signo;
425114987Speter	psp = p->p_sigacts;
426114987Speter#ifdef COMPAT_FREEBSD4
427114987Speter	if (SIGISMEMBER(psp->ps_freebsd4, sig)) {
428151316Sdavidxu		freebsd4_ia32_sendsig(catcher, ksi, mask);
429114987Speter		return;
430114987Speter	}
431114987Speter#endif
432123119Speter	mtx_assert(&psp->ps_mtx, MA_OWNED);
433114987Speter	regs = td->td_frame;
434114987Speter	oonstack = sigonstack(regs->tf_rsp);
435114987Speter
436114987Speter	/* Save user context. */
437114987Speter	bzero(&sf, sizeof(sf));
438114987Speter	sf.sf_uc.uc_sigmask = *mask;
439124092Sdavidxu	sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp;
440124092Sdavidxu	sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size;
441124092Sdavidxu	sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
442114987Speter	    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
443114987Speter	sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
444114987Speter	sf.sf_uc.uc_mcontext.mc_gs = rgs();
445114987Speter	sf.sf_uc.uc_mcontext.mc_fs = rfs();
446114987Speter	__asm __volatile("movl %%es,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_es));
447114987Speter	__asm __volatile("movl %%ds,%0" : "=rm" (sf.sf_uc.uc_mcontext.mc_ds));
448114987Speter	sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi;
449114987Speter	sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi;
450114987Speter	sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp;
451114987Speter	sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */
452114987Speter	sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx;
453114987Speter	sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx;
454114987Speter	sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx;
455114987Speter	sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax;
456114987Speter	sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno;
457114987Speter	sf.sf_uc.uc_mcontext.mc_err = regs->tf_err;
458114987Speter	sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip;
459114987Speter	sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs;
460114987Speter	sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags;
461114987Speter	sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp;
462114987Speter	sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss;
463114987Speter	sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */
464114987Speter	ia32_get_fpcontext(td, &sf.sf_uc.uc_mcontext);
465114987Speter	fpstate_drop(td);
466114987Speter
467114987Speter	/* Allocate space for the signal handler context. */
468124092Sdavidxu	if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
469114987Speter	    SIGISMEMBER(psp->ps_sigonstack, sig)) {
470124092Sdavidxu		sp = td->td_sigstk.ss_sp +
471124092Sdavidxu		    td->td_sigstk.ss_size - sizeof(sf);
472114987Speter	} else
473114987Speter		sp = (char *)regs->tf_rsp - sizeof(sf);
474114987Speter	/* Align to 16 bytes. */
475114987Speter	sfp = (struct ia32_sigframe *)((uintptr_t)sp & ~0xF);
476114987Speter	PROC_UNLOCK(p);
477114987Speter
478114987Speter	/* Translate the signal if appropriate. */
479114987Speter	if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize)
480114987Speter		sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)];
481114987Speter
482114987Speter	/* Build the argument list for the signal handler. */
483114987Speter	sf.sf_signum = sig;
484114987Speter	sf.sf_ucontext = (register_t)&sfp->sf_uc;
485126089Speter	if (SIGISMEMBER(psp->ps_siginfo, sig)) {
486114987Speter		/* Signal handler installed with SA_SIGINFO. */
487114987Speter		sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si;
488114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
489114987Speter
490114987Speter		/* Fill in POSIX parts */
491151316Sdavidxu		sf.sf_si = siginfo;
492114987Speter		sf.sf_si.si_signo = sig;
493114987Speter	} else {
494114987Speter		/* Old FreeBSD-style arguments. */
495151316Sdavidxu		sf.sf_siginfo = siginfo.si_code;
496151316Sdavidxu		sf.sf_addr = (u_int32_t)siginfo.si_addr;
497114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
498114987Speter	}
499123119Speter	mtx_unlock(&psp->ps_mtx);
500114987Speter
501114987Speter	/*
502114987Speter	 * Copy the sigframe out to the user's stack.
503114987Speter	 */
504114987Speter	if (copyout(&sf, sfp, sizeof(*sfp)) != 0) {
505114987Speter#ifdef DEBUG
506114987Speter		printf("process %ld has trashed its stack\n", (long)p->p_pid);
507114987Speter#endif
508114987Speter		PROC_LOCK(p);
509114987Speter		sigexit(td, SIGILL);
510114987Speter	}
511114987Speter
512114987Speter	regs->tf_rsp = (uintptr_t)sfp;
513119336Speter	regs->tf_rip = FREEBSD32_PS_STRINGS - *(p->p_sysent->sv_szsigcode);
514114987Speter	regs->tf_rflags &= ~PSL_T;
515114987Speter	regs->tf_cs = _ucode32sel;
516114987Speter	regs->tf_ss = _udatasel;
517114987Speter	load_ds(_udatasel);
518114987Speter	td->td_pcb->pcb_ds = _udatasel;
519114987Speter	load_es(_udatasel);
520114987Speter	td->td_pcb->pcb_es = _udatasel;
521114987Speter	/* leave user %fs and %gs untouched */
522114987Speter	PROC_LOCK(p);
523123119Speter	mtx_lock(&psp->ps_mtx);
524114987Speter}
525114987Speter
526114987Speter/*
527114987Speter * System call to cleanup state after a signal
528114987Speter * has been taken.  Reset signal mask and
529114987Speter * stack state from context left by sendsig (above).
530114987Speter * Return to previous pc and psl as specified by
531114987Speter * context left by sendsig. Check carefully to
532114987Speter * make sure that the user has not modified the
533114987Speter * state to gain improper privileges.
534114987Speter */
535114987Speter#ifdef COMPAT_FREEBSD4
536114987Speter/*
537114987Speter * MPSAFE
538114987Speter */
539114987Speterint
540119336Speterfreebsd4_freebsd32_sigreturn(td, uap)
541114987Speter	struct thread *td;
542119336Speter	struct freebsd4_freebsd32_sigreturn_args /* {
543119336Speter		const struct freebsd4_freebsd32_ucontext *sigcntxp;
544114987Speter	} */ *uap;
545114987Speter{
546114987Speter	struct ia32_ucontext4 uc;
547114987Speter	struct proc *p = td->td_proc;
548114987Speter	struct trapframe *regs;
549114987Speter	const struct ia32_ucontext4 *ucp;
550114987Speter	int cs, eflags, error;
551151316Sdavidxu	ksiginfo_t ksi;
552114987Speter
553114987Speter	error = copyin(uap->sigcntxp, &uc, sizeof(uc));
554114987Speter	if (error != 0)
555114987Speter		return (error);
556114987Speter	ucp = &uc;
557114987Speter	regs = td->td_frame;
558114987Speter	eflags = ucp->uc_mcontext.mc_eflags;
559114987Speter	/*
560114987Speter	 * Don't allow users to change privileged or reserved flags.
561114987Speter	 */
562114987Speter	/*
563114987Speter	 * XXX do allow users to change the privileged flag PSL_RF.
564114987Speter	 * The cpu sets PSL_RF in tf_eflags for faults.  Debuggers
565114987Speter	 * should sometimes set it there too.  tf_eflags is kept in
566114987Speter	 * the signal context during signal handling and there is no
567114987Speter	 * other place to remember it, so the PSL_RF bit may be
568114987Speter	 * corrupted by the signal handler without us knowing.
569114987Speter	 * Corruption of the PSL_RF bit at worst causes one more or
570114987Speter	 * one less debugger trap, so allowing it is fairly harmless.
571114987Speter	 */
572114987Speter	if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) {
573119336Speter		printf("freebsd4_freebsd32_sigreturn: eflags = 0x%x\n", eflags);
574114987Speter		return (EINVAL);
575114987Speter	}
576114987Speter
577114987Speter	/*
578114987Speter	 * Don't allow users to load a valid privileged %cs.  Let the
579114987Speter	 * hardware check for invalid selectors, excess privilege in
580114987Speter	 * other selectors, invalid %eip's and invalid %esp's.
581114987Speter	 */
582114987Speter	cs = ucp->uc_mcontext.mc_cs;
583114987Speter	if (!CS_SECURE(cs)) {
584114987Speter		printf("freebsd4_sigreturn: cs = 0x%x\n", cs);
585151316Sdavidxu		ksiginfo_init_trap(&ksi);
586151316Sdavidxu		ksi.ksi_signo = SIGBUS;
587151316Sdavidxu		ksi.ksi_code = BUS_OBJERR;
588151316Sdavidxu		ksi.ksi_trapno = T_PROTFLT;
589151316Sdavidxu		ksi.ksi_addr = (void *)regs->tf_rip;
590151316Sdavidxu		trapsignal(td, &ksi);
591114987Speter		return (EINVAL);
592114987Speter	}
593114987Speter
594114987Speter	/* Segment selectors restored by sigtramp.S */
595114987Speter	regs->tf_rdi = ucp->uc_mcontext.mc_edi;
596114987Speter	regs->tf_rsi = ucp->uc_mcontext.mc_esi;
597114987Speter	regs->tf_rbp = ucp->uc_mcontext.mc_ebp;
598114987Speter	regs->tf_rbx = ucp->uc_mcontext.mc_ebx;
599114987Speter	regs->tf_rdx = ucp->uc_mcontext.mc_edx;
600114987Speter	regs->tf_rcx = ucp->uc_mcontext.mc_ecx;
601114987Speter	regs->tf_rax = ucp->uc_mcontext.mc_eax;
602114987Speter	regs->tf_trapno = ucp->uc_mcontext.mc_trapno;
603114987Speter	regs->tf_err = ucp->uc_mcontext.mc_err;
604114987Speter	regs->tf_rip = ucp->uc_mcontext.mc_eip;
605114987Speter	regs->tf_cs = cs;
606114987Speter	regs->tf_rflags = ucp->uc_mcontext.mc_eflags;
607114987Speter	regs->tf_rsp = ucp->uc_mcontext.mc_esp;
608114987Speter	regs->tf_ss = ucp->uc_mcontext.mc_ss;
609114987Speter
610114987Speter	PROC_LOCK(p);
611114987Speter	td->td_sigmask = ucp->uc_sigmask;
612114987Speter	SIG_CANTMASK(td->td_sigmask);
613114987Speter	signotify(td);
614114987Speter	PROC_UNLOCK(p);
615114987Speter	return (EJUSTRETURN);
616114987Speter}
617114987Speter#endif	/* COMPAT_FREEBSD4 */
618114987Speter
619114987Speter/*
620114987Speter * MPSAFE
621114987Speter */
622114987Speterint
623119336Speterfreebsd32_sigreturn(td, uap)
624114987Speter	struct thread *td;
625119336Speter	struct freebsd32_sigreturn_args /* {
626119336Speter		const struct freebsd32_ucontext *sigcntxp;
627114987Speter	} */ *uap;
628114987Speter{
629114987Speter	struct ia32_ucontext uc;
630114987Speter	struct proc *p = td->td_proc;
631114987Speter	struct trapframe *regs;
632114987Speter	const struct ia32_ucontext *ucp;
633114987Speter	int cs, eflags, error, ret;
634151316Sdavidxu	ksiginfo_t ksi;
635114987Speter
636114987Speter	error = copyin(uap->sigcntxp, &uc, sizeof(uc));
637114987Speter	if (error != 0)
638114987Speter		return (error);
639114987Speter	ucp = &uc;
640114987Speter	regs = td->td_frame;
641114987Speter	eflags = ucp->uc_mcontext.mc_eflags;
642114987Speter	/*
643114987Speter	 * Don't allow users to change privileged or reserved flags.
644114987Speter	 */
645114987Speter	/*
646114987Speter	 * XXX do allow users to change the privileged flag PSL_RF.
647114987Speter	 * The cpu sets PSL_RF in tf_eflags for faults.  Debuggers
648114987Speter	 * should sometimes set it there too.  tf_eflags is kept in
649114987Speter	 * the signal context during signal handling and there is no
650114987Speter	 * other place to remember it, so the PSL_RF bit may be
651114987Speter	 * corrupted by the signal handler without us knowing.
652114987Speter	 * Corruption of the PSL_RF bit at worst causes one more or
653114987Speter	 * one less debugger trap, so allowing it is fairly harmless.
654114987Speter	 */
655114987Speter	if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) {
656119336Speter		printf("freebsd32_sigreturn: eflags = 0x%x\n", eflags);
657114987Speter		return (EINVAL);
658114987Speter	}
659114987Speter
660114987Speter	/*
661114987Speter	 * Don't allow users to load a valid privileged %cs.  Let the
662114987Speter	 * hardware check for invalid selectors, excess privilege in
663114987Speter	 * other selectors, invalid %eip's and invalid %esp's.
664114987Speter	 */
665114987Speter	cs = ucp->uc_mcontext.mc_cs;
666114987Speter	if (!CS_SECURE(cs)) {
667114987Speter		printf("sigreturn: cs = 0x%x\n", cs);
668151316Sdavidxu		ksiginfo_init_trap(&ksi);
669151316Sdavidxu		ksi.ksi_signo = SIGBUS;
670151316Sdavidxu		ksi.ksi_code = BUS_OBJERR;
671151316Sdavidxu		ksi.ksi_trapno = T_PROTFLT;
672151316Sdavidxu		ksi.ksi_addr = (void *)regs->tf_rip;
673151316Sdavidxu		trapsignal(td, &ksi);
674114987Speter		return (EINVAL);
675114987Speter	}
676114987Speter
677114987Speter	ret = ia32_set_fpcontext(td, &ucp->uc_mcontext);
678114987Speter	if (ret != 0)
679114987Speter		return (ret);
680114987Speter
681114987Speter	/* Segment selectors restored by sigtramp.S */
682114987Speter	regs->tf_rdi = ucp->uc_mcontext.mc_edi;
683114987Speter	regs->tf_rsi = ucp->uc_mcontext.mc_esi;
684114987Speter	regs->tf_rbp = ucp->uc_mcontext.mc_ebp;
685114987Speter	regs->tf_rbx = ucp->uc_mcontext.mc_ebx;
686114987Speter	regs->tf_rdx = ucp->uc_mcontext.mc_edx;
687114987Speter	regs->tf_rcx = ucp->uc_mcontext.mc_ecx;
688114987Speter	regs->tf_rax = ucp->uc_mcontext.mc_eax;
689114987Speter	regs->tf_trapno = ucp->uc_mcontext.mc_trapno;
690114987Speter	regs->tf_err = ucp->uc_mcontext.mc_err;
691114987Speter	regs->tf_rip = ucp->uc_mcontext.mc_eip;
692114987Speter	regs->tf_cs = cs;
693114987Speter	regs->tf_rflags = ucp->uc_mcontext.mc_eflags;
694114987Speter	regs->tf_rsp = ucp->uc_mcontext.mc_esp;
695114987Speter	regs->tf_ss = ucp->uc_mcontext.mc_ss;
696114987Speter
697114987Speter	PROC_LOCK(p);
698114987Speter	td->td_sigmask = ucp->uc_sigmask;
699114987Speter	SIG_CANTMASK(td->td_sigmask);
700114987Speter	signotify(td);
701114987Speter	PROC_UNLOCK(p);
702114987Speter	return (EJUSTRETURN);
703114987Speter}
704122303Speter
705122303Speter/*
706122303Speter * Clear registers on exec
707122303Speter */
708122303Spetervoid
709122303Speteria32_setregs(td, entry, stack, ps_strings)
710122303Speter	struct thread *td;
711122303Speter	u_long entry;
712122303Speter	u_long stack;
713122303Speter	u_long ps_strings;
714122303Speter{
715122303Speter	struct trapframe *regs = td->td_frame;
716122303Speter	struct pcb *pcb = td->td_pcb;
717122303Speter
718122303Speter	wrmsr(MSR_FSBASE, 0);
719122303Speter	wrmsr(MSR_KGSBASE, 0);	/* User value while we're in the kernel */
720122303Speter	pcb->pcb_fsbase = 0;
721122303Speter	pcb->pcb_gsbase = 0;
722122303Speter	load_ds(_udatasel);
723122303Speter	load_es(_udatasel);
724122303Speter	load_fs(_udatasel);
725122303Speter	load_gs(_udatasel);
726122303Speter	pcb->pcb_ds = _udatasel;
727122303Speter	pcb->pcb_es = _udatasel;
728122303Speter	pcb->pcb_fs = _udatasel;
729122303Speter	pcb->pcb_gs = _udatasel;
730122303Speter
731122303Speter	bzero((char *)regs, sizeof(struct trapframe));
732122303Speter	regs->tf_rip = entry;
733122303Speter	regs->tf_rsp = stack;
734122303Speter	regs->tf_rflags = PSL_USER | (regs->tf_rflags & PSL_T);
735122303Speter	regs->tf_ss = _udatasel;
736122303Speter	regs->tf_cs = _ucode32sel;
737122303Speter	regs->tf_rbx = ps_strings;
738122303Speter	load_cr0(rcr0() | CR0_MP | CR0_TS);
739122303Speter	fpstate_drop(td);
740122303Speter
741122303Speter	/* Return via doreti so that we can change to a different %cs */
742122303Speter	pcb->pcb_flags |= PCB_FULLCTX;
743122303Speter	td->td_retval[1] = 0;
744122303Speter}
745