ia32_signal.c revision 198507
1114987Speter/*-
2114987Speter * Copyright (c) 2003 Peter Wemm
3114987Speter * Copyright (c) 1982, 1987, 1990 The Regents of the University of California.
4114987Speter * All rights reserved.
5114987Speter *
6114987Speter * This code is derived from software contributed to Berkeley by
7114987Speter * William Jolitz.
8114987Speter *
9114987Speter * Redistribution and use in source and binary forms, with or without
10114987Speter * modification, are permitted provided that the following conditions
11114987Speter * are met:
12114987Speter * 1. Redistributions of source code must retain the above copyright
13114987Speter *    notice, this list of conditions and the following disclaimer.
14114987Speter * 2. Redistributions in binary form must reproduce the above copyright
15114987Speter *    notice, this list of conditions and the following disclaimer in the
16114987Speter *    documentation and/or other materials provided with the distribution.
17114987Speter * 4. Neither the name of the University nor the names of its contributors
18114987Speter *    may be used to endorse or promote products derived from this software
19114987Speter *    without specific prior written permission.
20114987Speter *
21114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24114987Speter * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31114987Speter * SUCH DAMAGE.
32114987Speter */
33114987Speter
34118031Sobrien#include <sys/cdefs.h>
35118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_signal.c 198507 2009-10-27 10:47:58Z kib $");
36118031Sobrien
37114987Speter#include "opt_compat.h"
38114987Speter
39114987Speter#include <sys/param.h>
40114987Speter#include <sys/exec.h>
41114987Speter#include <sys/fcntl.h>
42114987Speter#include <sys/imgact.h>
43114987Speter#include <sys/kernel.h>
44114987Speter#include <sys/lock.h>
45114987Speter#include <sys/malloc.h>
46114987Speter#include <sys/mutex.h>
47114987Speter#include <sys/mman.h>
48114987Speter#include <sys/namei.h>
49114987Speter#include <sys/pioctl.h>
50114987Speter#include <sys/proc.h>
51114987Speter#include <sys/procfs.h>
52114987Speter#include <sys/resourcevar.h>
53114987Speter#include <sys/systm.h>
54114987Speter#include <sys/signalvar.h>
55114987Speter#include <sys/stat.h>
56114987Speter#include <sys/sx.h>
57114987Speter#include <sys/syscall.h>
58114987Speter#include <sys/sysctl.h>
59114987Speter#include <sys/sysent.h>
60114987Speter#include <sys/vnode.h>
61114987Speter
62114987Speter#include <vm/vm.h>
63114987Speter#include <vm/vm_kern.h>
64114987Speter#include <vm/vm_param.h>
65114987Speter#include <vm/pmap.h>
66114987Speter#include <vm/vm_map.h>
67114987Speter#include <vm/vm_object.h>
68114987Speter#include <vm/vm_extern.h>
69114987Speter
70163018Sdavidxu#include <compat/freebsd32/freebsd32_signal.h>
71119336Speter#include <compat/freebsd32/freebsd32_util.h>
72119336Speter#include <compat/freebsd32/freebsd32_proto.h>
73119336Speter#include <compat/ia32/ia32_signal.h>
74114987Speter#include <machine/psl.h>
75114987Speter#include <machine/segments.h>
76114987Speter#include <machine/specialreg.h>
77114987Speter#include <machine/frame.h>
78114987Speter#include <machine/md_var.h>
79114987Speter#include <machine/pcb.h>
80114987Speter#include <machine/cpufunc.h>
81114987Speter
82114987Speter#ifdef COMPAT_FREEBSD4
83151316Sdavidxustatic void freebsd4_ia32_sendsig(sig_t, ksiginfo_t *, sigset_t *);
84114987Speter#endif
85114987Speterstatic void ia32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp);
86114987Speterstatic int ia32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp);
87114987Speter
88114987Speter#define	CS_SECURE(cs)		(ISPL(cs) == SEL_UPL)
89114987Speter#define	EFL_SECURE(ef, oef)	((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
90114987Speter
91114987Speterstatic void
92114987Speteria32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp)
93114987Speter{
94114987Speter
95150631Speter	mcp->mc_ownedfp = fpugetregs(td, (struct savefpu *)&mcp->mc_fpstate);
96122292Speter	mcp->mc_fpformat = fpuformat();
97114987Speter}
98114987Speter
99114987Speterstatic int
100114987Speteria32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp)
101114987Speter{
102114987Speter
103114987Speter	if (mcp->mc_fpformat == _MC_FPFMT_NODEV)
104114987Speter		return (0);
105114987Speter	else if (mcp->mc_fpformat != _MC_FPFMT_XMM)
106114987Speter		return (EINVAL);
107114987Speter	else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE)
108114987Speter		/* We don't care what state is left in the FPU or PCB. */
109114987Speter		fpstate_drop(td);
110114987Speter	else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU ||
111114987Speter	    mcp->mc_ownedfp == _MC_FPOWNED_PCB) {
112114987Speter		/*
113122292Speter		 * XXX we violate the dubious requirement that fpusetregs()
114114987Speter		 * be called with interrupts disabled.
115114987Speter		 */
116150631Speter		fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate);
117114987Speter	} else
118114987Speter		return (EINVAL);
119114987Speter	return (0);
120114987Speter}
121114987Speter
122114987Speter/*
123150631Speter * Get machine context.
124150631Speter */
125150631Speterstatic int
126150631Speteria32_get_mcontext(struct thread *td, struct ia32_mcontext *mcp, int flags)
127150631Speter{
128150631Speter	struct trapframe *tp;
129150631Speter
130150631Speter	tp = td->td_frame;
131150631Speter
132150631Speter	PROC_LOCK(curthread->td_proc);
133150631Speter	mcp->mc_onstack = sigonstack(tp->tf_rsp);
134150631Speter	PROC_UNLOCK(curthread->td_proc);
135190620Skib	/* Entry into kernel always sets TF_HASSEGS */
136190620Skib	mcp->mc_gs = tp->tf_gs;
137190620Skib	mcp->mc_fs = tp->tf_fs;
138190620Skib	mcp->mc_es = tp->tf_es;
139190620Skib	mcp->mc_ds = tp->tf_ds;
140150631Speter	mcp->mc_edi = tp->tf_rdi;
141150631Speter	mcp->mc_esi = tp->tf_rsi;
142150631Speter	mcp->mc_ebp = tp->tf_rbp;
143150631Speter	mcp->mc_isp = tp->tf_rsp;
144150631Speter	if (flags & GET_MC_CLEAR_RET) {
145150631Speter		mcp->mc_eax = 0;
146150631Speter		mcp->mc_edx = 0;
147150631Speter	} else {
148150631Speter		mcp->mc_eax = tp->tf_rax;
149150631Speter		mcp->mc_edx = tp->tf_rdx;
150150631Speter	}
151150631Speter	mcp->mc_ebx = tp->tf_rbx;
152150631Speter	mcp->mc_ecx = tp->tf_rcx;
153150631Speter	mcp->mc_eip = tp->tf_rip;
154150631Speter	mcp->mc_cs = tp->tf_cs;
155150631Speter	mcp->mc_eflags = tp->tf_rflags;
156150631Speter	mcp->mc_esp = tp->tf_rsp;
157150631Speter	mcp->mc_ss = tp->tf_ss;
158150631Speter	mcp->mc_len = sizeof(*mcp);
159150631Speter	ia32_get_fpcontext(td, mcp);
160190620Skib	mcp->mc_fsbase = td->td_pcb->pcb_fsbase;
161190620Skib	mcp->mc_gsbase = td->td_pcb->pcb_gsbase;
162195486Skib	td->td_pcb->pcb_full_iret = 1;
163150631Speter	return (0);
164150631Speter}
165150631Speter
166150631Speter/*
167150631Speter * Set machine context.
168150631Speter *
169150631Speter * However, we don't set any but the user modifiable flags, and we won't
170150631Speter * touch the cs selector.
171150631Speter */
172150631Speterstatic int
173150631Speteria32_set_mcontext(struct thread *td, const struct ia32_mcontext *mcp)
174150631Speter{
175150631Speter	struct trapframe *tp;
176150631Speter	long rflags;
177150631Speter	int ret;
178150631Speter
179150631Speter	tp = td->td_frame;
180150631Speter	if (mcp->mc_len != sizeof(*mcp))
181150631Speter		return (EINVAL);
182150631Speter	rflags = (mcp->mc_eflags & PSL_USERCHANGE) |
183150631Speter	    (tp->tf_rflags & ~PSL_USERCHANGE);
184150631Speter	ret = ia32_set_fpcontext(td, mcp);
185150631Speter	if (ret != 0)
186150631Speter		return (ret);
187190620Skib	tp->tf_gs = mcp->mc_gs;
188150631Speter	tp->tf_fs = mcp->mc_fs;
189150631Speter	tp->tf_es = mcp->mc_es;
190150631Speter	tp->tf_ds = mcp->mc_ds;
191190620Skib	tp->tf_flags = TF_HASSEGS;
192150631Speter	tp->tf_rdi = mcp->mc_edi;
193150631Speter	tp->tf_rsi = mcp->mc_esi;
194150631Speter	tp->tf_rbp = mcp->mc_ebp;
195150631Speter	tp->tf_rbx = mcp->mc_ebx;
196150631Speter	tp->tf_rdx = mcp->mc_edx;
197150631Speter	tp->tf_rcx = mcp->mc_ecx;
198150631Speter	tp->tf_rax = mcp->mc_eax;
199150631Speter	/* trapno, err */
200150631Speter	tp->tf_rip = mcp->mc_eip;
201150631Speter	tp->tf_rflags = rflags;
202150631Speter	tp->tf_rsp = mcp->mc_esp;
203150631Speter	tp->tf_ss = mcp->mc_ss;
204150631Speter	td->td_pcb->pcb_flags |= PCB_FULLCTX;
205195486Skib	td->td_pcb->pcb_full_iret = 1;
206150631Speter	return (0);
207150631Speter}
208150631Speter
209150631Speter/*
210150631Speter * The first two fields of a ucontext_t are the signal mask and
211150631Speter * the machine context.  The next field is uc_link; we want to
212150631Speter * avoid destroying the link when copying out contexts.
213150631Speter */
214150631Speter#define	UC_COPY_SIZE	offsetof(struct ia32_ucontext, uc_link)
215150631Speter
216150631Speterint
217150631Speterfreebsd32_getcontext(struct thread *td, struct freebsd32_getcontext_args *uap)
218150631Speter{
219150631Speter	struct ia32_ucontext uc;
220150631Speter	int ret;
221150631Speter
222150631Speter	if (uap->ucp == NULL)
223150631Speter		ret = EINVAL;
224150631Speter	else {
225150631Speter		ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET);
226150631Speter		PROC_LOCK(td->td_proc);
227150631Speter		uc.uc_sigmask = td->td_sigmask;
228150631Speter		PROC_UNLOCK(td->td_proc);
229150631Speter		ret = copyout(&uc, uap->ucp, UC_COPY_SIZE);
230150631Speter	}
231150631Speter	return (ret);
232150631Speter}
233150631Speter
234150631Speterint
235150631Speterfreebsd32_setcontext(struct thread *td, struct freebsd32_setcontext_args *uap)
236150631Speter{
237150631Speter	struct ia32_ucontext uc;
238150631Speter	int ret;
239150631Speter
240150631Speter	if (uap->ucp == NULL)
241150631Speter		ret = EINVAL;
242150631Speter	else {
243150631Speter		ret = copyin(uap->ucp, &uc, UC_COPY_SIZE);
244150631Speter		if (ret == 0) {
245150631Speter			ret = ia32_set_mcontext(td, &uc.uc_mcontext);
246150631Speter			if (ret == 0) {
247198507Skib				kern_sigprocmask(td, SIG_SETMASK,
248198507Skib				    &uc.uc_sigmask, NULL, 0);
249150631Speter			}
250150631Speter		}
251150631Speter	}
252150631Speter	return (ret == 0 ? EJUSTRETURN : ret);
253150631Speter}
254150631Speter
255150631Speterint
256150631Speterfreebsd32_swapcontext(struct thread *td, struct freebsd32_swapcontext_args *uap)
257150631Speter{
258150631Speter	struct ia32_ucontext uc;
259150631Speter	int ret;
260150631Speter
261150631Speter	if (uap->oucp == NULL || uap->ucp == NULL)
262150631Speter		ret = EINVAL;
263150631Speter	else {
264150631Speter		ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET);
265150631Speter		PROC_LOCK(td->td_proc);
266150631Speter		uc.uc_sigmask = td->td_sigmask;
267150631Speter		PROC_UNLOCK(td->td_proc);
268150631Speter		ret = copyout(&uc, uap->oucp, UC_COPY_SIZE);
269150631Speter		if (ret == 0) {
270150631Speter			ret = copyin(uap->ucp, &uc, UC_COPY_SIZE);
271150631Speter			if (ret == 0) {
272150631Speter				ret = ia32_set_mcontext(td, &uc.uc_mcontext);
273150631Speter				if (ret == 0) {
274198507Skib					kern_sigprocmask(td, SIG_SETMASK,
275198507Skib					    &uc.uc_sigmask, NULL, 0);
276150631Speter				}
277150631Speter			}
278150631Speter		}
279150631Speter	}
280150631Speter	return (ret == 0 ? EJUSTRETURN : ret);
281150631Speter}
282150631Speter
283150631Speter/*
284114987Speter * Send an interrupt to process.
285114987Speter *
286114987Speter * Stack is set up to allow sigcode stored
287114987Speter * at top to call routine, followed by kcall
288114987Speter * to sigreturn routine below.  After sigreturn
289114987Speter * resets the signal mask, the stack, and the
290114987Speter * frame pointer, it returns to the user
291114987Speter * specified pc, psl.
292114987Speter */
293114987Speter#ifdef COMPAT_FREEBSD4
294114987Speterstatic void
295151316Sdavidxufreebsd4_ia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
296114987Speter{
297114987Speter	struct ia32_sigframe4 sf, *sfp;
298163018Sdavidxu	struct siginfo32 siginfo;
299114987Speter	struct proc *p;
300114987Speter	struct thread *td;
301114987Speter	struct sigacts *psp;
302114987Speter	struct trapframe *regs;
303114987Speter	int oonstack;
304151316Sdavidxu	int sig;
305114987Speter
306114987Speter	td = curthread;
307114987Speter	p = td->td_proc;
308163018Sdavidxu	siginfo_to_siginfo32(&ksi->ksi_info, &siginfo);
309151316Sdavidxu
310114987Speter	PROC_LOCK_ASSERT(p, MA_OWNED);
311151316Sdavidxu	sig = siginfo.si_signo;
312114987Speter	psp = p->p_sigacts;
313123119Speter	mtx_assert(&psp->ps_mtx, MA_OWNED);
314114987Speter	regs = td->td_frame;
315114987Speter	oonstack = sigonstack(regs->tf_rsp);
316114987Speter
317114987Speter	/* Save user context. */
318114987Speter	bzero(&sf, sizeof(sf));
319114987Speter	sf.sf_uc.uc_sigmask = *mask;
320124092Sdavidxu	sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp;
321124092Sdavidxu	sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size;
322124092Sdavidxu	sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
323114987Speter	    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
324114987Speter	sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
325114987Speter	sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi;
326114987Speter	sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi;
327114987Speter	sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp;
328114987Speter	sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */
329114987Speter	sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx;
330114987Speter	sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx;
331114987Speter	sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx;
332114987Speter	sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax;
333114987Speter	sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno;
334114987Speter	sf.sf_uc.uc_mcontext.mc_err = regs->tf_err;
335114987Speter	sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip;
336114987Speter	sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs;
337114987Speter	sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags;
338114987Speter	sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp;
339114987Speter	sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss;
340190620Skib	sf.sf_uc.uc_mcontext.mc_ds = regs->tf_ds;
341190620Skib	sf.sf_uc.uc_mcontext.mc_es = regs->tf_es;
342190620Skib	sf.sf_uc.uc_mcontext.mc_fs = regs->tf_fs;
343190620Skib	sf.sf_uc.uc_mcontext.mc_gs = regs->tf_gs;
344114987Speter
345114987Speter	/* Allocate space for the signal handler context. */
346124092Sdavidxu	if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
347114987Speter	    SIGISMEMBER(psp->ps_sigonstack, sig)) {
348124092Sdavidxu		sfp = (struct ia32_sigframe4 *)(td->td_sigstk.ss_sp +
349124092Sdavidxu		    td->td_sigstk.ss_size - sizeof(sf));
350114987Speter	} else
351114987Speter		sfp = (struct ia32_sigframe4 *)regs->tf_rsp - 1;
352114987Speter	PROC_UNLOCK(p);
353114987Speter
354114987Speter	/* Translate the signal if appropriate. */
355114987Speter	if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize)
356114987Speter		sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)];
357114987Speter
358114987Speter	/* Build the argument list for the signal handler. */
359114987Speter	sf.sf_signum = sig;
360114987Speter	sf.sf_ucontext = (register_t)&sfp->sf_uc;
361126089Speter	if (SIGISMEMBER(psp->ps_siginfo, sig)) {
362114987Speter		/* Signal handler installed with SA_SIGINFO. */
363114987Speter		sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si;
364114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
365114987Speter
366114987Speter		/* Fill in POSIX parts */
367151316Sdavidxu		sf.sf_si = siginfo;
368114987Speter		sf.sf_si.si_signo = sig;
369114987Speter	} else {
370114987Speter		/* Old FreeBSD-style arguments. */
371151316Sdavidxu		sf.sf_siginfo = siginfo.si_code;
372151316Sdavidxu		sf.sf_addr = (u_int32_t)siginfo.si_addr;
373114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
374114987Speter	}
375123119Speter	mtx_unlock(&psp->ps_mtx);
376114987Speter
377114987Speter	/*
378114987Speter	 * Copy the sigframe out to the user's stack.
379114987Speter	 */
380114987Speter	if (copyout(&sf, sfp, sizeof(*sfp)) != 0) {
381114987Speter#ifdef DEBUG
382114987Speter		printf("process %ld has trashed its stack\n", (long)p->p_pid);
383114987Speter#endif
384114987Speter		PROC_LOCK(p);
385114987Speter		sigexit(td, SIGILL);
386114987Speter	}
387114987Speter
388114987Speter	regs->tf_rsp = (uintptr_t)sfp;
389119336Speter	regs->tf_rip = FREEBSD32_PS_STRINGS - sz_freebsd4_ia32_sigcode;
390177145Skib	regs->tf_rflags &= ~(PSL_T | PSL_D);
391114987Speter	regs->tf_cs = _ucode32sel;
392114987Speter	regs->tf_ss = _udatasel;
393190620Skib	regs->tf_ds = _udatasel;
394190620Skib	regs->tf_es = _udatasel;
395195486Skib	td->td_pcb->pcb_full_iret = 1;
396114987Speter	/* leave user %fs and %gs untouched */
397114987Speter	PROC_LOCK(p);
398123119Speter	mtx_lock(&psp->ps_mtx);
399114987Speter}
400114987Speter#endif	/* COMPAT_FREEBSD4 */
401114987Speter
402114987Spetervoid
403151316Sdavidxuia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
404114987Speter{
405114987Speter	struct ia32_sigframe sf, *sfp;
406163018Sdavidxu	struct siginfo32 siginfo;
407114987Speter	struct proc *p;
408114987Speter	struct thread *td;
409114987Speter	struct sigacts *psp;
410114987Speter	char *sp;
411114987Speter	struct trapframe *regs;
412114987Speter	int oonstack;
413151316Sdavidxu	int sig;
414114987Speter
415163018Sdavidxu	siginfo_to_siginfo32(&ksi->ksi_info, &siginfo);
416114987Speter	td = curthread;
417114987Speter	p = td->td_proc;
418114987Speter	PROC_LOCK_ASSERT(p, MA_OWNED);
419151316Sdavidxu	sig = siginfo.si_signo;
420114987Speter	psp = p->p_sigacts;
421114987Speter#ifdef COMPAT_FREEBSD4
422114987Speter	if (SIGISMEMBER(psp->ps_freebsd4, sig)) {
423151316Sdavidxu		freebsd4_ia32_sendsig(catcher, ksi, mask);
424114987Speter		return;
425114987Speter	}
426114987Speter#endif
427123119Speter	mtx_assert(&psp->ps_mtx, MA_OWNED);
428114987Speter	regs = td->td_frame;
429114987Speter	oonstack = sigonstack(regs->tf_rsp);
430114987Speter
431114987Speter	/* Save user context. */
432114987Speter	bzero(&sf, sizeof(sf));
433114987Speter	sf.sf_uc.uc_sigmask = *mask;
434124092Sdavidxu	sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp;
435124092Sdavidxu	sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size;
436124092Sdavidxu	sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
437114987Speter	    ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
438114987Speter	sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
439114987Speter	sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi;
440114987Speter	sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi;
441114987Speter	sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp;
442114987Speter	sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */
443114987Speter	sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx;
444114987Speter	sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx;
445114987Speter	sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx;
446114987Speter	sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax;
447114987Speter	sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno;
448114987Speter	sf.sf_uc.uc_mcontext.mc_err = regs->tf_err;
449114987Speter	sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip;
450114987Speter	sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs;
451114987Speter	sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags;
452114987Speter	sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp;
453114987Speter	sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss;
454190620Skib	sf.sf_uc.uc_mcontext.mc_ds = regs->tf_ds;
455190620Skib	sf.sf_uc.uc_mcontext.mc_es = regs->tf_es;
456190620Skib	sf.sf_uc.uc_mcontext.mc_fs = regs->tf_fs;
457190620Skib	sf.sf_uc.uc_mcontext.mc_gs = regs->tf_gs;
458114987Speter	sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */
459114987Speter	ia32_get_fpcontext(td, &sf.sf_uc.uc_mcontext);
460114987Speter	fpstate_drop(td);
461190620Skib	sf.sf_uc.uc_mcontext.mc_fsbase = td->td_pcb->pcb_fsbase;
462190620Skib	sf.sf_uc.uc_mcontext.mc_gsbase = td->td_pcb->pcb_gsbase;
463114987Speter
464114987Speter	/* Allocate space for the signal handler context. */
465124092Sdavidxu	if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
466114987Speter	    SIGISMEMBER(psp->ps_sigonstack, sig)) {
467124092Sdavidxu		sp = td->td_sigstk.ss_sp +
468124092Sdavidxu		    td->td_sigstk.ss_size - sizeof(sf);
469114987Speter	} else
470114987Speter		sp = (char *)regs->tf_rsp - sizeof(sf);
471114987Speter	/* Align to 16 bytes. */
472114987Speter	sfp = (struct ia32_sigframe *)((uintptr_t)sp & ~0xF);
473114987Speter	PROC_UNLOCK(p);
474114987Speter
475114987Speter	/* Translate the signal if appropriate. */
476114987Speter	if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize)
477114987Speter		sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)];
478114987Speter
479114987Speter	/* Build the argument list for the signal handler. */
480114987Speter	sf.sf_signum = sig;
481114987Speter	sf.sf_ucontext = (register_t)&sfp->sf_uc;
482126089Speter	if (SIGISMEMBER(psp->ps_siginfo, sig)) {
483114987Speter		/* Signal handler installed with SA_SIGINFO. */
484114987Speter		sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si;
485114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
486114987Speter
487114987Speter		/* Fill in POSIX parts */
488151316Sdavidxu		sf.sf_si = siginfo;
489114987Speter		sf.sf_si.si_signo = sig;
490114987Speter	} else {
491114987Speter		/* Old FreeBSD-style arguments. */
492151316Sdavidxu		sf.sf_siginfo = siginfo.si_code;
493151316Sdavidxu		sf.sf_addr = (u_int32_t)siginfo.si_addr;
494114987Speter		sf.sf_ah = (u_int32_t)(uintptr_t)catcher;
495114987Speter	}
496123119Speter	mtx_unlock(&psp->ps_mtx);
497114987Speter
498114987Speter	/*
499114987Speter	 * Copy the sigframe out to the user's stack.
500114987Speter	 */
501114987Speter	if (copyout(&sf, sfp, sizeof(*sfp)) != 0) {
502114987Speter#ifdef DEBUG
503114987Speter		printf("process %ld has trashed its stack\n", (long)p->p_pid);
504114987Speter#endif
505114987Speter		PROC_LOCK(p);
506114987Speter		sigexit(td, SIGILL);
507114987Speter	}
508114987Speter
509114987Speter	regs->tf_rsp = (uintptr_t)sfp;
510119336Speter	regs->tf_rip = FREEBSD32_PS_STRINGS - *(p->p_sysent->sv_szsigcode);
511177145Skib	regs->tf_rflags &= ~(PSL_T | PSL_D);
512114987Speter	regs->tf_cs = _ucode32sel;
513114987Speter	regs->tf_ss = _udatasel;
514190620Skib	regs->tf_ds = _udatasel;
515190620Skib	regs->tf_es = _udatasel;
516195486Skib	td->td_pcb->pcb_full_iret = 1;
517190620Skib	/* XXXKIB leave user %fs and %gs untouched */
518114987Speter	PROC_LOCK(p);
519123119Speter	mtx_lock(&psp->ps_mtx);
520114987Speter}
521114987Speter
522114987Speter/*
523114987Speter * System call to cleanup state after a signal
524114987Speter * has been taken.  Reset signal mask and
525114987Speter * stack state from context left by sendsig (above).
526114987Speter * Return to previous pc and psl as specified by
527114987Speter * context left by sendsig. Check carefully to
528114987Speter * make sure that the user has not modified the
529114987Speter * state to gain improper privileges.
530114987Speter */
531114987Speter#ifdef COMPAT_FREEBSD4
532114987Speter/*
533114987Speter * MPSAFE
534114987Speter */
535114987Speterint
536119336Speterfreebsd4_freebsd32_sigreturn(td, uap)
537114987Speter	struct thread *td;
538119336Speter	struct freebsd4_freebsd32_sigreturn_args /* {
539119336Speter		const struct freebsd4_freebsd32_ucontext *sigcntxp;
540114987Speter	} */ *uap;
541114987Speter{
542114987Speter	struct ia32_ucontext4 uc;
543114987Speter	struct trapframe *regs;
544198507Skib	struct ia32_ucontext4 *ucp;
545114987Speter	int cs, eflags, error;
546151316Sdavidxu	ksiginfo_t ksi;
547114987Speter
548114987Speter	error = copyin(uap->sigcntxp, &uc, sizeof(uc));
549114987Speter	if (error != 0)
550114987Speter		return (error);
551114987Speter	ucp = &uc;
552114987Speter	regs = td->td_frame;
553114987Speter	eflags = ucp->uc_mcontext.mc_eflags;
554114987Speter	/*
555114987Speter	 * Don't allow users to change privileged or reserved flags.
556114987Speter	 */
557114987Speter	/*
558114987Speter	 * XXX do allow users to change the privileged flag PSL_RF.
559114987Speter	 * The cpu sets PSL_RF in tf_eflags for faults.  Debuggers
560114987Speter	 * should sometimes set it there too.  tf_eflags is kept in
561114987Speter	 * the signal context during signal handling and there is no
562114987Speter	 * other place to remember it, so the PSL_RF bit may be
563114987Speter	 * corrupted by the signal handler without us knowing.
564114987Speter	 * Corruption of the PSL_RF bit at worst causes one more or
565114987Speter	 * one less debugger trap, so allowing it is fairly harmless.
566114987Speter	 */
567114987Speter	if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) {
568119336Speter		printf("freebsd4_freebsd32_sigreturn: eflags = 0x%x\n", eflags);
569114987Speter		return (EINVAL);
570114987Speter	}
571114987Speter
572114987Speter	/*
573114987Speter	 * Don't allow users to load a valid privileged %cs.  Let the
574114987Speter	 * hardware check for invalid selectors, excess privilege in
575114987Speter	 * other selectors, invalid %eip's and invalid %esp's.
576114987Speter	 */
577114987Speter	cs = ucp->uc_mcontext.mc_cs;
578114987Speter	if (!CS_SECURE(cs)) {
579114987Speter		printf("freebsd4_sigreturn: cs = 0x%x\n", cs);
580151316Sdavidxu		ksiginfo_init_trap(&ksi);
581151316Sdavidxu		ksi.ksi_signo = SIGBUS;
582151316Sdavidxu		ksi.ksi_code = BUS_OBJERR;
583151316Sdavidxu		ksi.ksi_trapno = T_PROTFLT;
584151316Sdavidxu		ksi.ksi_addr = (void *)regs->tf_rip;
585151316Sdavidxu		trapsignal(td, &ksi);
586114987Speter		return (EINVAL);
587114987Speter	}
588114987Speter
589114987Speter	regs->tf_rdi = ucp->uc_mcontext.mc_edi;
590114987Speter	regs->tf_rsi = ucp->uc_mcontext.mc_esi;
591114987Speter	regs->tf_rbp = ucp->uc_mcontext.mc_ebp;
592114987Speter	regs->tf_rbx = ucp->uc_mcontext.mc_ebx;
593114987Speter	regs->tf_rdx = ucp->uc_mcontext.mc_edx;
594114987Speter	regs->tf_rcx = ucp->uc_mcontext.mc_ecx;
595114987Speter	regs->tf_rax = ucp->uc_mcontext.mc_eax;
596114987Speter	regs->tf_trapno = ucp->uc_mcontext.mc_trapno;
597114987Speter	regs->tf_err = ucp->uc_mcontext.mc_err;
598114987Speter	regs->tf_rip = ucp->uc_mcontext.mc_eip;
599114987Speter	regs->tf_cs = cs;
600114987Speter	regs->tf_rflags = ucp->uc_mcontext.mc_eflags;
601114987Speter	regs->tf_rsp = ucp->uc_mcontext.mc_esp;
602114987Speter	regs->tf_ss = ucp->uc_mcontext.mc_ss;
603190620Skib	regs->tf_ds = ucp->uc_mcontext.mc_ds;
604190620Skib	regs->tf_es = ucp->uc_mcontext.mc_es;
605190620Skib	regs->tf_fs = ucp->uc_mcontext.mc_fs;
606190620Skib	regs->tf_gs = ucp->uc_mcontext.mc_gs;
607114987Speter
608198507Skib	kern_sigprocmask(td, SIG_SETMASK, &ucp->uc_sigmask, NULL, 0);
609195486Skib	td->td_pcb->pcb_full_iret = 1;
610114987Speter	return (EJUSTRETURN);
611114987Speter}
612114987Speter#endif	/* COMPAT_FREEBSD4 */
613114987Speter
614114987Speter/*
615114987Speter * MPSAFE
616114987Speter */
617114987Speterint
618119336Speterfreebsd32_sigreturn(td, uap)
619114987Speter	struct thread *td;
620119336Speter	struct freebsd32_sigreturn_args /* {
621119336Speter		const struct freebsd32_ucontext *sigcntxp;
622114987Speter	} */ *uap;
623114987Speter{
624114987Speter	struct ia32_ucontext uc;
625114987Speter	struct trapframe *regs;
626198507Skib	struct ia32_ucontext *ucp;
627114987Speter	int cs, eflags, error, ret;
628151316Sdavidxu	ksiginfo_t ksi;
629114987Speter
630114987Speter	error = copyin(uap->sigcntxp, &uc, sizeof(uc));
631114987Speter	if (error != 0)
632114987Speter		return (error);
633114987Speter	ucp = &uc;
634114987Speter	regs = td->td_frame;
635114987Speter	eflags = ucp->uc_mcontext.mc_eflags;
636114987Speter	/*
637114987Speter	 * Don't allow users to change privileged or reserved flags.
638114987Speter	 */
639114987Speter	/*
640114987Speter	 * XXX do allow users to change the privileged flag PSL_RF.
641114987Speter	 * The cpu sets PSL_RF in tf_eflags for faults.  Debuggers
642114987Speter	 * should sometimes set it there too.  tf_eflags is kept in
643114987Speter	 * the signal context during signal handling and there is no
644114987Speter	 * other place to remember it, so the PSL_RF bit may be
645114987Speter	 * corrupted by the signal handler without us knowing.
646114987Speter	 * Corruption of the PSL_RF bit at worst causes one more or
647114987Speter	 * one less debugger trap, so allowing it is fairly harmless.
648114987Speter	 */
649114987Speter	if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) {
650119336Speter		printf("freebsd32_sigreturn: eflags = 0x%x\n", eflags);
651114987Speter		return (EINVAL);
652114987Speter	}
653114987Speter
654114987Speter	/*
655114987Speter	 * Don't allow users to load a valid privileged %cs.  Let the
656114987Speter	 * hardware check for invalid selectors, excess privilege in
657114987Speter	 * other selectors, invalid %eip's and invalid %esp's.
658114987Speter	 */
659114987Speter	cs = ucp->uc_mcontext.mc_cs;
660114987Speter	if (!CS_SECURE(cs)) {
661114987Speter		printf("sigreturn: cs = 0x%x\n", cs);
662151316Sdavidxu		ksiginfo_init_trap(&ksi);
663151316Sdavidxu		ksi.ksi_signo = SIGBUS;
664151316Sdavidxu		ksi.ksi_code = BUS_OBJERR;
665151316Sdavidxu		ksi.ksi_trapno = T_PROTFLT;
666151316Sdavidxu		ksi.ksi_addr = (void *)regs->tf_rip;
667151316Sdavidxu		trapsignal(td, &ksi);
668114987Speter		return (EINVAL);
669114987Speter	}
670114987Speter
671114987Speter	ret = ia32_set_fpcontext(td, &ucp->uc_mcontext);
672114987Speter	if (ret != 0)
673114987Speter		return (ret);
674114987Speter
675114987Speter	regs->tf_rdi = ucp->uc_mcontext.mc_edi;
676114987Speter	regs->tf_rsi = ucp->uc_mcontext.mc_esi;
677114987Speter	regs->tf_rbp = ucp->uc_mcontext.mc_ebp;
678114987Speter	regs->tf_rbx = ucp->uc_mcontext.mc_ebx;
679114987Speter	regs->tf_rdx = ucp->uc_mcontext.mc_edx;
680114987Speter	regs->tf_rcx = ucp->uc_mcontext.mc_ecx;
681114987Speter	regs->tf_rax = ucp->uc_mcontext.mc_eax;
682114987Speter	regs->tf_trapno = ucp->uc_mcontext.mc_trapno;
683114987Speter	regs->tf_err = ucp->uc_mcontext.mc_err;
684114987Speter	regs->tf_rip = ucp->uc_mcontext.mc_eip;
685114987Speter	regs->tf_cs = cs;
686114987Speter	regs->tf_rflags = ucp->uc_mcontext.mc_eflags;
687114987Speter	regs->tf_rsp = ucp->uc_mcontext.mc_esp;
688114987Speter	regs->tf_ss = ucp->uc_mcontext.mc_ss;
689190620Skib	regs->tf_ds = ucp->uc_mcontext.mc_ds;
690190620Skib	regs->tf_es = ucp->uc_mcontext.mc_es;
691190620Skib	regs->tf_fs = ucp->uc_mcontext.mc_fs;
692190620Skib	regs->tf_gs = ucp->uc_mcontext.mc_gs;
693190620Skib	regs->tf_flags = TF_HASSEGS;
694114987Speter
695198507Skib	kern_sigprocmask(td, SIG_SETMASK, &ucp->uc_sigmask, NULL, 0);
696195486Skib	td->td_pcb->pcb_full_iret = 1;
697114987Speter	return (EJUSTRETURN);
698114987Speter}
699122303Speter
700122303Speter/*
701122303Speter * Clear registers on exec
702122303Speter */
703122303Spetervoid
704122303Speteria32_setregs(td, entry, stack, ps_strings)
705122303Speter	struct thread *td;
706122303Speter	u_long entry;
707122303Speter	u_long stack;
708122303Speter	u_long ps_strings;
709122303Speter{
710122303Speter	struct trapframe *regs = td->td_frame;
711122303Speter	struct pcb *pcb = td->td_pcb;
712122303Speter
713190620Skib	mtx_lock(&dt_lock);
714190620Skib	if (td->td_proc->p_md.md_ldt != NULL)
715190620Skib		user_ldt_free(td);
716190620Skib	else
717190620Skib		mtx_unlock(&dt_lock);
718190620Skib
719122303Speter	pcb->pcb_fsbase = 0;
720122303Speter	pcb->pcb_gsbase = 0;
721189423Sjhb	pcb->pcb_initial_fpucw = __INITIAL_FPUCW_I386__;
722122303Speter
723122303Speter	bzero((char *)regs, sizeof(struct trapframe));
724122303Speter	regs->tf_rip = entry;
725122303Speter	regs->tf_rsp = stack;
726122303Speter	regs->tf_rflags = PSL_USER | (regs->tf_rflags & PSL_T);
727122303Speter	regs->tf_ss = _udatasel;
728122303Speter	regs->tf_cs = _ucode32sel;
729122303Speter	regs->tf_rbx = ps_strings;
730190620Skib	regs->tf_ds = _udatasel;
731190620Skib	regs->tf_es = _udatasel;
732190620Skib	regs->tf_fs = _ufssel;
733190620Skib	regs->tf_gs = _ugssel;
734190620Skib	regs->tf_flags = TF_HASSEGS;
735190620Skib
736122303Speter	load_cr0(rcr0() | CR0_MP | CR0_TS);
737122303Speter	fpstate_drop(td);
738122303Speter
739122303Speter	/* Return via doreti so that we can change to a different %cs */
740180992Skib	pcb->pcb_flags |= PCB_FULLCTX | PCB_32BIT;
741182684Skib	pcb->pcb_flags &= ~PCB_GS32BIT;
742195486Skib	td->td_pcb->pcb_full_iret = 1;
743122303Speter	td->td_retval[1] = 0;
744122303Speter}
745