ia32_signal.c revision 198507
1114987Speter/*- 2114987Speter * Copyright (c) 2003 Peter Wemm 3114987Speter * Copyright (c) 1982, 1987, 1990 The Regents of the University of California. 4114987Speter * All rights reserved. 5114987Speter * 6114987Speter * This code is derived from software contributed to Berkeley by 7114987Speter * William Jolitz. 8114987Speter * 9114987Speter * Redistribution and use in source and binary forms, with or without 10114987Speter * modification, are permitted provided that the following conditions 11114987Speter * are met: 12114987Speter * 1. Redistributions of source code must retain the above copyright 13114987Speter * notice, this list of conditions and the following disclaimer. 14114987Speter * 2. Redistributions in binary form must reproduce the above copyright 15114987Speter * notice, this list of conditions and the following disclaimer in the 16114987Speter * documentation and/or other materials provided with the distribution. 17114987Speter * 4. Neither the name of the University nor the names of its contributors 18114987Speter * may be used to endorse or promote products derived from this software 19114987Speter * without specific prior written permission. 20114987Speter * 21114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24114987Speter * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31114987Speter * SUCH DAMAGE. 32114987Speter */ 33114987Speter 34118031Sobrien#include <sys/cdefs.h> 35118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_signal.c 198507 2009-10-27 10:47:58Z kib $"); 36118031Sobrien 37114987Speter#include "opt_compat.h" 38114987Speter 39114987Speter#include <sys/param.h> 40114987Speter#include <sys/exec.h> 41114987Speter#include <sys/fcntl.h> 42114987Speter#include <sys/imgact.h> 43114987Speter#include <sys/kernel.h> 44114987Speter#include <sys/lock.h> 45114987Speter#include <sys/malloc.h> 46114987Speter#include <sys/mutex.h> 47114987Speter#include <sys/mman.h> 48114987Speter#include <sys/namei.h> 49114987Speter#include <sys/pioctl.h> 50114987Speter#include <sys/proc.h> 51114987Speter#include <sys/procfs.h> 52114987Speter#include <sys/resourcevar.h> 53114987Speter#include <sys/systm.h> 54114987Speter#include <sys/signalvar.h> 55114987Speter#include <sys/stat.h> 56114987Speter#include <sys/sx.h> 57114987Speter#include <sys/syscall.h> 58114987Speter#include <sys/sysctl.h> 59114987Speter#include <sys/sysent.h> 60114987Speter#include <sys/vnode.h> 61114987Speter 62114987Speter#include <vm/vm.h> 63114987Speter#include <vm/vm_kern.h> 64114987Speter#include <vm/vm_param.h> 65114987Speter#include <vm/pmap.h> 66114987Speter#include <vm/vm_map.h> 67114987Speter#include <vm/vm_object.h> 68114987Speter#include <vm/vm_extern.h> 69114987Speter 70163018Sdavidxu#include <compat/freebsd32/freebsd32_signal.h> 71119336Speter#include <compat/freebsd32/freebsd32_util.h> 72119336Speter#include <compat/freebsd32/freebsd32_proto.h> 73119336Speter#include <compat/ia32/ia32_signal.h> 74114987Speter#include <machine/psl.h> 75114987Speter#include <machine/segments.h> 76114987Speter#include <machine/specialreg.h> 77114987Speter#include <machine/frame.h> 78114987Speter#include <machine/md_var.h> 79114987Speter#include <machine/pcb.h> 80114987Speter#include <machine/cpufunc.h> 81114987Speter 82114987Speter#ifdef COMPAT_FREEBSD4 83151316Sdavidxustatic void freebsd4_ia32_sendsig(sig_t, ksiginfo_t *, sigset_t *); 84114987Speter#endif 85114987Speterstatic void ia32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp); 86114987Speterstatic int ia32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp); 87114987Speter 88114987Speter#define CS_SECURE(cs) (ISPL(cs) == SEL_UPL) 89114987Speter#define EFL_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0) 90114987Speter 91114987Speterstatic void 92114987Speteria32_get_fpcontext(struct thread *td, struct ia32_mcontext *mcp) 93114987Speter{ 94114987Speter 95150631Speter mcp->mc_ownedfp = fpugetregs(td, (struct savefpu *)&mcp->mc_fpstate); 96122292Speter mcp->mc_fpformat = fpuformat(); 97114987Speter} 98114987Speter 99114987Speterstatic int 100114987Speteria32_set_fpcontext(struct thread *td, const struct ia32_mcontext *mcp) 101114987Speter{ 102114987Speter 103114987Speter if (mcp->mc_fpformat == _MC_FPFMT_NODEV) 104114987Speter return (0); 105114987Speter else if (mcp->mc_fpformat != _MC_FPFMT_XMM) 106114987Speter return (EINVAL); 107114987Speter else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE) 108114987Speter /* We don't care what state is left in the FPU or PCB. */ 109114987Speter fpstate_drop(td); 110114987Speter else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU || 111114987Speter mcp->mc_ownedfp == _MC_FPOWNED_PCB) { 112114987Speter /* 113122292Speter * XXX we violate the dubious requirement that fpusetregs() 114114987Speter * be called with interrupts disabled. 115114987Speter */ 116150631Speter fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate); 117114987Speter } else 118114987Speter return (EINVAL); 119114987Speter return (0); 120114987Speter} 121114987Speter 122114987Speter/* 123150631Speter * Get machine context. 124150631Speter */ 125150631Speterstatic int 126150631Speteria32_get_mcontext(struct thread *td, struct ia32_mcontext *mcp, int flags) 127150631Speter{ 128150631Speter struct trapframe *tp; 129150631Speter 130150631Speter tp = td->td_frame; 131150631Speter 132150631Speter PROC_LOCK(curthread->td_proc); 133150631Speter mcp->mc_onstack = sigonstack(tp->tf_rsp); 134150631Speter PROC_UNLOCK(curthread->td_proc); 135190620Skib /* Entry into kernel always sets TF_HASSEGS */ 136190620Skib mcp->mc_gs = tp->tf_gs; 137190620Skib mcp->mc_fs = tp->tf_fs; 138190620Skib mcp->mc_es = tp->tf_es; 139190620Skib mcp->mc_ds = tp->tf_ds; 140150631Speter mcp->mc_edi = tp->tf_rdi; 141150631Speter mcp->mc_esi = tp->tf_rsi; 142150631Speter mcp->mc_ebp = tp->tf_rbp; 143150631Speter mcp->mc_isp = tp->tf_rsp; 144150631Speter if (flags & GET_MC_CLEAR_RET) { 145150631Speter mcp->mc_eax = 0; 146150631Speter mcp->mc_edx = 0; 147150631Speter } else { 148150631Speter mcp->mc_eax = tp->tf_rax; 149150631Speter mcp->mc_edx = tp->tf_rdx; 150150631Speter } 151150631Speter mcp->mc_ebx = tp->tf_rbx; 152150631Speter mcp->mc_ecx = tp->tf_rcx; 153150631Speter mcp->mc_eip = tp->tf_rip; 154150631Speter mcp->mc_cs = tp->tf_cs; 155150631Speter mcp->mc_eflags = tp->tf_rflags; 156150631Speter mcp->mc_esp = tp->tf_rsp; 157150631Speter mcp->mc_ss = tp->tf_ss; 158150631Speter mcp->mc_len = sizeof(*mcp); 159150631Speter ia32_get_fpcontext(td, mcp); 160190620Skib mcp->mc_fsbase = td->td_pcb->pcb_fsbase; 161190620Skib mcp->mc_gsbase = td->td_pcb->pcb_gsbase; 162195486Skib td->td_pcb->pcb_full_iret = 1; 163150631Speter return (0); 164150631Speter} 165150631Speter 166150631Speter/* 167150631Speter * Set machine context. 168150631Speter * 169150631Speter * However, we don't set any but the user modifiable flags, and we won't 170150631Speter * touch the cs selector. 171150631Speter */ 172150631Speterstatic int 173150631Speteria32_set_mcontext(struct thread *td, const struct ia32_mcontext *mcp) 174150631Speter{ 175150631Speter struct trapframe *tp; 176150631Speter long rflags; 177150631Speter int ret; 178150631Speter 179150631Speter tp = td->td_frame; 180150631Speter if (mcp->mc_len != sizeof(*mcp)) 181150631Speter return (EINVAL); 182150631Speter rflags = (mcp->mc_eflags & PSL_USERCHANGE) | 183150631Speter (tp->tf_rflags & ~PSL_USERCHANGE); 184150631Speter ret = ia32_set_fpcontext(td, mcp); 185150631Speter if (ret != 0) 186150631Speter return (ret); 187190620Skib tp->tf_gs = mcp->mc_gs; 188150631Speter tp->tf_fs = mcp->mc_fs; 189150631Speter tp->tf_es = mcp->mc_es; 190150631Speter tp->tf_ds = mcp->mc_ds; 191190620Skib tp->tf_flags = TF_HASSEGS; 192150631Speter tp->tf_rdi = mcp->mc_edi; 193150631Speter tp->tf_rsi = mcp->mc_esi; 194150631Speter tp->tf_rbp = mcp->mc_ebp; 195150631Speter tp->tf_rbx = mcp->mc_ebx; 196150631Speter tp->tf_rdx = mcp->mc_edx; 197150631Speter tp->tf_rcx = mcp->mc_ecx; 198150631Speter tp->tf_rax = mcp->mc_eax; 199150631Speter /* trapno, err */ 200150631Speter tp->tf_rip = mcp->mc_eip; 201150631Speter tp->tf_rflags = rflags; 202150631Speter tp->tf_rsp = mcp->mc_esp; 203150631Speter tp->tf_ss = mcp->mc_ss; 204150631Speter td->td_pcb->pcb_flags |= PCB_FULLCTX; 205195486Skib td->td_pcb->pcb_full_iret = 1; 206150631Speter return (0); 207150631Speter} 208150631Speter 209150631Speter/* 210150631Speter * The first two fields of a ucontext_t are the signal mask and 211150631Speter * the machine context. The next field is uc_link; we want to 212150631Speter * avoid destroying the link when copying out contexts. 213150631Speter */ 214150631Speter#define UC_COPY_SIZE offsetof(struct ia32_ucontext, uc_link) 215150631Speter 216150631Speterint 217150631Speterfreebsd32_getcontext(struct thread *td, struct freebsd32_getcontext_args *uap) 218150631Speter{ 219150631Speter struct ia32_ucontext uc; 220150631Speter int ret; 221150631Speter 222150631Speter if (uap->ucp == NULL) 223150631Speter ret = EINVAL; 224150631Speter else { 225150631Speter ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET); 226150631Speter PROC_LOCK(td->td_proc); 227150631Speter uc.uc_sigmask = td->td_sigmask; 228150631Speter PROC_UNLOCK(td->td_proc); 229150631Speter ret = copyout(&uc, uap->ucp, UC_COPY_SIZE); 230150631Speter } 231150631Speter return (ret); 232150631Speter} 233150631Speter 234150631Speterint 235150631Speterfreebsd32_setcontext(struct thread *td, struct freebsd32_setcontext_args *uap) 236150631Speter{ 237150631Speter struct ia32_ucontext uc; 238150631Speter int ret; 239150631Speter 240150631Speter if (uap->ucp == NULL) 241150631Speter ret = EINVAL; 242150631Speter else { 243150631Speter ret = copyin(uap->ucp, &uc, UC_COPY_SIZE); 244150631Speter if (ret == 0) { 245150631Speter ret = ia32_set_mcontext(td, &uc.uc_mcontext); 246150631Speter if (ret == 0) { 247198507Skib kern_sigprocmask(td, SIG_SETMASK, 248198507Skib &uc.uc_sigmask, NULL, 0); 249150631Speter } 250150631Speter } 251150631Speter } 252150631Speter return (ret == 0 ? EJUSTRETURN : ret); 253150631Speter} 254150631Speter 255150631Speterint 256150631Speterfreebsd32_swapcontext(struct thread *td, struct freebsd32_swapcontext_args *uap) 257150631Speter{ 258150631Speter struct ia32_ucontext uc; 259150631Speter int ret; 260150631Speter 261150631Speter if (uap->oucp == NULL || uap->ucp == NULL) 262150631Speter ret = EINVAL; 263150631Speter else { 264150631Speter ia32_get_mcontext(td, &uc.uc_mcontext, GET_MC_CLEAR_RET); 265150631Speter PROC_LOCK(td->td_proc); 266150631Speter uc.uc_sigmask = td->td_sigmask; 267150631Speter PROC_UNLOCK(td->td_proc); 268150631Speter ret = copyout(&uc, uap->oucp, UC_COPY_SIZE); 269150631Speter if (ret == 0) { 270150631Speter ret = copyin(uap->ucp, &uc, UC_COPY_SIZE); 271150631Speter if (ret == 0) { 272150631Speter ret = ia32_set_mcontext(td, &uc.uc_mcontext); 273150631Speter if (ret == 0) { 274198507Skib kern_sigprocmask(td, SIG_SETMASK, 275198507Skib &uc.uc_sigmask, NULL, 0); 276150631Speter } 277150631Speter } 278150631Speter } 279150631Speter } 280150631Speter return (ret == 0 ? EJUSTRETURN : ret); 281150631Speter} 282150631Speter 283150631Speter/* 284114987Speter * Send an interrupt to process. 285114987Speter * 286114987Speter * Stack is set up to allow sigcode stored 287114987Speter * at top to call routine, followed by kcall 288114987Speter * to sigreturn routine below. After sigreturn 289114987Speter * resets the signal mask, the stack, and the 290114987Speter * frame pointer, it returns to the user 291114987Speter * specified pc, psl. 292114987Speter */ 293114987Speter#ifdef COMPAT_FREEBSD4 294114987Speterstatic void 295151316Sdavidxufreebsd4_ia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask) 296114987Speter{ 297114987Speter struct ia32_sigframe4 sf, *sfp; 298163018Sdavidxu struct siginfo32 siginfo; 299114987Speter struct proc *p; 300114987Speter struct thread *td; 301114987Speter struct sigacts *psp; 302114987Speter struct trapframe *regs; 303114987Speter int oonstack; 304151316Sdavidxu int sig; 305114987Speter 306114987Speter td = curthread; 307114987Speter p = td->td_proc; 308163018Sdavidxu siginfo_to_siginfo32(&ksi->ksi_info, &siginfo); 309151316Sdavidxu 310114987Speter PROC_LOCK_ASSERT(p, MA_OWNED); 311151316Sdavidxu sig = siginfo.si_signo; 312114987Speter psp = p->p_sigacts; 313123119Speter mtx_assert(&psp->ps_mtx, MA_OWNED); 314114987Speter regs = td->td_frame; 315114987Speter oonstack = sigonstack(regs->tf_rsp); 316114987Speter 317114987Speter /* Save user context. */ 318114987Speter bzero(&sf, sizeof(sf)); 319114987Speter sf.sf_uc.uc_sigmask = *mask; 320124092Sdavidxu sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp; 321124092Sdavidxu sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size; 322124092Sdavidxu sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) 323114987Speter ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE; 324114987Speter sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0; 325114987Speter sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi; 326114987Speter sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi; 327114987Speter sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp; 328114987Speter sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */ 329114987Speter sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx; 330114987Speter sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx; 331114987Speter sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx; 332114987Speter sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax; 333114987Speter sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno; 334114987Speter sf.sf_uc.uc_mcontext.mc_err = regs->tf_err; 335114987Speter sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip; 336114987Speter sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs; 337114987Speter sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags; 338114987Speter sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp; 339114987Speter sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss; 340190620Skib sf.sf_uc.uc_mcontext.mc_ds = regs->tf_ds; 341190620Skib sf.sf_uc.uc_mcontext.mc_es = regs->tf_es; 342190620Skib sf.sf_uc.uc_mcontext.mc_fs = regs->tf_fs; 343190620Skib sf.sf_uc.uc_mcontext.mc_gs = regs->tf_gs; 344114987Speter 345114987Speter /* Allocate space for the signal handler context. */ 346124092Sdavidxu if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack && 347114987Speter SIGISMEMBER(psp->ps_sigonstack, sig)) { 348124092Sdavidxu sfp = (struct ia32_sigframe4 *)(td->td_sigstk.ss_sp + 349124092Sdavidxu td->td_sigstk.ss_size - sizeof(sf)); 350114987Speter } else 351114987Speter sfp = (struct ia32_sigframe4 *)regs->tf_rsp - 1; 352114987Speter PROC_UNLOCK(p); 353114987Speter 354114987Speter /* Translate the signal if appropriate. */ 355114987Speter if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize) 356114987Speter sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; 357114987Speter 358114987Speter /* Build the argument list for the signal handler. */ 359114987Speter sf.sf_signum = sig; 360114987Speter sf.sf_ucontext = (register_t)&sfp->sf_uc; 361126089Speter if (SIGISMEMBER(psp->ps_siginfo, sig)) { 362114987Speter /* Signal handler installed with SA_SIGINFO. */ 363114987Speter sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si; 364114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 365114987Speter 366114987Speter /* Fill in POSIX parts */ 367151316Sdavidxu sf.sf_si = siginfo; 368114987Speter sf.sf_si.si_signo = sig; 369114987Speter } else { 370114987Speter /* Old FreeBSD-style arguments. */ 371151316Sdavidxu sf.sf_siginfo = siginfo.si_code; 372151316Sdavidxu sf.sf_addr = (u_int32_t)siginfo.si_addr; 373114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 374114987Speter } 375123119Speter mtx_unlock(&psp->ps_mtx); 376114987Speter 377114987Speter /* 378114987Speter * Copy the sigframe out to the user's stack. 379114987Speter */ 380114987Speter if (copyout(&sf, sfp, sizeof(*sfp)) != 0) { 381114987Speter#ifdef DEBUG 382114987Speter printf("process %ld has trashed its stack\n", (long)p->p_pid); 383114987Speter#endif 384114987Speter PROC_LOCK(p); 385114987Speter sigexit(td, SIGILL); 386114987Speter } 387114987Speter 388114987Speter regs->tf_rsp = (uintptr_t)sfp; 389119336Speter regs->tf_rip = FREEBSD32_PS_STRINGS - sz_freebsd4_ia32_sigcode; 390177145Skib regs->tf_rflags &= ~(PSL_T | PSL_D); 391114987Speter regs->tf_cs = _ucode32sel; 392114987Speter regs->tf_ss = _udatasel; 393190620Skib regs->tf_ds = _udatasel; 394190620Skib regs->tf_es = _udatasel; 395195486Skib td->td_pcb->pcb_full_iret = 1; 396114987Speter /* leave user %fs and %gs untouched */ 397114987Speter PROC_LOCK(p); 398123119Speter mtx_lock(&psp->ps_mtx); 399114987Speter} 400114987Speter#endif /* COMPAT_FREEBSD4 */ 401114987Speter 402114987Spetervoid 403151316Sdavidxuia32_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask) 404114987Speter{ 405114987Speter struct ia32_sigframe sf, *sfp; 406163018Sdavidxu struct siginfo32 siginfo; 407114987Speter struct proc *p; 408114987Speter struct thread *td; 409114987Speter struct sigacts *psp; 410114987Speter char *sp; 411114987Speter struct trapframe *regs; 412114987Speter int oonstack; 413151316Sdavidxu int sig; 414114987Speter 415163018Sdavidxu siginfo_to_siginfo32(&ksi->ksi_info, &siginfo); 416114987Speter td = curthread; 417114987Speter p = td->td_proc; 418114987Speter PROC_LOCK_ASSERT(p, MA_OWNED); 419151316Sdavidxu sig = siginfo.si_signo; 420114987Speter psp = p->p_sigacts; 421114987Speter#ifdef COMPAT_FREEBSD4 422114987Speter if (SIGISMEMBER(psp->ps_freebsd4, sig)) { 423151316Sdavidxu freebsd4_ia32_sendsig(catcher, ksi, mask); 424114987Speter return; 425114987Speter } 426114987Speter#endif 427123119Speter mtx_assert(&psp->ps_mtx, MA_OWNED); 428114987Speter regs = td->td_frame; 429114987Speter oonstack = sigonstack(regs->tf_rsp); 430114987Speter 431114987Speter /* Save user context. */ 432114987Speter bzero(&sf, sizeof(sf)); 433114987Speter sf.sf_uc.uc_sigmask = *mask; 434124092Sdavidxu sf.sf_uc.uc_stack.ss_sp = (uintptr_t)td->td_sigstk.ss_sp; 435124092Sdavidxu sf.sf_uc.uc_stack.ss_size = td->td_sigstk.ss_size; 436124092Sdavidxu sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) 437114987Speter ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE; 438114987Speter sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0; 439114987Speter sf.sf_uc.uc_mcontext.mc_edi = regs->tf_rdi; 440114987Speter sf.sf_uc.uc_mcontext.mc_esi = regs->tf_rsi; 441114987Speter sf.sf_uc.uc_mcontext.mc_ebp = regs->tf_rbp; 442114987Speter sf.sf_uc.uc_mcontext.mc_isp = regs->tf_rsp; /* XXX */ 443114987Speter sf.sf_uc.uc_mcontext.mc_ebx = regs->tf_rbx; 444114987Speter sf.sf_uc.uc_mcontext.mc_edx = regs->tf_rdx; 445114987Speter sf.sf_uc.uc_mcontext.mc_ecx = regs->tf_rcx; 446114987Speter sf.sf_uc.uc_mcontext.mc_eax = regs->tf_rax; 447114987Speter sf.sf_uc.uc_mcontext.mc_trapno = regs->tf_trapno; 448114987Speter sf.sf_uc.uc_mcontext.mc_err = regs->tf_err; 449114987Speter sf.sf_uc.uc_mcontext.mc_eip = regs->tf_rip; 450114987Speter sf.sf_uc.uc_mcontext.mc_cs = regs->tf_cs; 451114987Speter sf.sf_uc.uc_mcontext.mc_eflags = regs->tf_rflags; 452114987Speter sf.sf_uc.uc_mcontext.mc_esp = regs->tf_rsp; 453114987Speter sf.sf_uc.uc_mcontext.mc_ss = regs->tf_ss; 454190620Skib sf.sf_uc.uc_mcontext.mc_ds = regs->tf_ds; 455190620Skib sf.sf_uc.uc_mcontext.mc_es = regs->tf_es; 456190620Skib sf.sf_uc.uc_mcontext.mc_fs = regs->tf_fs; 457190620Skib sf.sf_uc.uc_mcontext.mc_gs = regs->tf_gs; 458114987Speter sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */ 459114987Speter ia32_get_fpcontext(td, &sf.sf_uc.uc_mcontext); 460114987Speter fpstate_drop(td); 461190620Skib sf.sf_uc.uc_mcontext.mc_fsbase = td->td_pcb->pcb_fsbase; 462190620Skib sf.sf_uc.uc_mcontext.mc_gsbase = td->td_pcb->pcb_gsbase; 463114987Speter 464114987Speter /* Allocate space for the signal handler context. */ 465124092Sdavidxu if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack && 466114987Speter SIGISMEMBER(psp->ps_sigonstack, sig)) { 467124092Sdavidxu sp = td->td_sigstk.ss_sp + 468124092Sdavidxu td->td_sigstk.ss_size - sizeof(sf); 469114987Speter } else 470114987Speter sp = (char *)regs->tf_rsp - sizeof(sf); 471114987Speter /* Align to 16 bytes. */ 472114987Speter sfp = (struct ia32_sigframe *)((uintptr_t)sp & ~0xF); 473114987Speter PROC_UNLOCK(p); 474114987Speter 475114987Speter /* Translate the signal if appropriate. */ 476114987Speter if (p->p_sysent->sv_sigtbl && sig <= p->p_sysent->sv_sigsize) 477114987Speter sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; 478114987Speter 479114987Speter /* Build the argument list for the signal handler. */ 480114987Speter sf.sf_signum = sig; 481114987Speter sf.sf_ucontext = (register_t)&sfp->sf_uc; 482126089Speter if (SIGISMEMBER(psp->ps_siginfo, sig)) { 483114987Speter /* Signal handler installed with SA_SIGINFO. */ 484114987Speter sf.sf_siginfo = (u_int32_t)(uintptr_t)&sfp->sf_si; 485114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 486114987Speter 487114987Speter /* Fill in POSIX parts */ 488151316Sdavidxu sf.sf_si = siginfo; 489114987Speter sf.sf_si.si_signo = sig; 490114987Speter } else { 491114987Speter /* Old FreeBSD-style arguments. */ 492151316Sdavidxu sf.sf_siginfo = siginfo.si_code; 493151316Sdavidxu sf.sf_addr = (u_int32_t)siginfo.si_addr; 494114987Speter sf.sf_ah = (u_int32_t)(uintptr_t)catcher; 495114987Speter } 496123119Speter mtx_unlock(&psp->ps_mtx); 497114987Speter 498114987Speter /* 499114987Speter * Copy the sigframe out to the user's stack. 500114987Speter */ 501114987Speter if (copyout(&sf, sfp, sizeof(*sfp)) != 0) { 502114987Speter#ifdef DEBUG 503114987Speter printf("process %ld has trashed its stack\n", (long)p->p_pid); 504114987Speter#endif 505114987Speter PROC_LOCK(p); 506114987Speter sigexit(td, SIGILL); 507114987Speter } 508114987Speter 509114987Speter regs->tf_rsp = (uintptr_t)sfp; 510119336Speter regs->tf_rip = FREEBSD32_PS_STRINGS - *(p->p_sysent->sv_szsigcode); 511177145Skib regs->tf_rflags &= ~(PSL_T | PSL_D); 512114987Speter regs->tf_cs = _ucode32sel; 513114987Speter regs->tf_ss = _udatasel; 514190620Skib regs->tf_ds = _udatasel; 515190620Skib regs->tf_es = _udatasel; 516195486Skib td->td_pcb->pcb_full_iret = 1; 517190620Skib /* XXXKIB leave user %fs and %gs untouched */ 518114987Speter PROC_LOCK(p); 519123119Speter mtx_lock(&psp->ps_mtx); 520114987Speter} 521114987Speter 522114987Speter/* 523114987Speter * System call to cleanup state after a signal 524114987Speter * has been taken. Reset signal mask and 525114987Speter * stack state from context left by sendsig (above). 526114987Speter * Return to previous pc and psl as specified by 527114987Speter * context left by sendsig. Check carefully to 528114987Speter * make sure that the user has not modified the 529114987Speter * state to gain improper privileges. 530114987Speter */ 531114987Speter#ifdef COMPAT_FREEBSD4 532114987Speter/* 533114987Speter * MPSAFE 534114987Speter */ 535114987Speterint 536119336Speterfreebsd4_freebsd32_sigreturn(td, uap) 537114987Speter struct thread *td; 538119336Speter struct freebsd4_freebsd32_sigreturn_args /* { 539119336Speter const struct freebsd4_freebsd32_ucontext *sigcntxp; 540114987Speter } */ *uap; 541114987Speter{ 542114987Speter struct ia32_ucontext4 uc; 543114987Speter struct trapframe *regs; 544198507Skib struct ia32_ucontext4 *ucp; 545114987Speter int cs, eflags, error; 546151316Sdavidxu ksiginfo_t ksi; 547114987Speter 548114987Speter error = copyin(uap->sigcntxp, &uc, sizeof(uc)); 549114987Speter if (error != 0) 550114987Speter return (error); 551114987Speter ucp = &uc; 552114987Speter regs = td->td_frame; 553114987Speter eflags = ucp->uc_mcontext.mc_eflags; 554114987Speter /* 555114987Speter * Don't allow users to change privileged or reserved flags. 556114987Speter */ 557114987Speter /* 558114987Speter * XXX do allow users to change the privileged flag PSL_RF. 559114987Speter * The cpu sets PSL_RF in tf_eflags for faults. Debuggers 560114987Speter * should sometimes set it there too. tf_eflags is kept in 561114987Speter * the signal context during signal handling and there is no 562114987Speter * other place to remember it, so the PSL_RF bit may be 563114987Speter * corrupted by the signal handler without us knowing. 564114987Speter * Corruption of the PSL_RF bit at worst causes one more or 565114987Speter * one less debugger trap, so allowing it is fairly harmless. 566114987Speter */ 567114987Speter if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) { 568119336Speter printf("freebsd4_freebsd32_sigreturn: eflags = 0x%x\n", eflags); 569114987Speter return (EINVAL); 570114987Speter } 571114987Speter 572114987Speter /* 573114987Speter * Don't allow users to load a valid privileged %cs. Let the 574114987Speter * hardware check for invalid selectors, excess privilege in 575114987Speter * other selectors, invalid %eip's and invalid %esp's. 576114987Speter */ 577114987Speter cs = ucp->uc_mcontext.mc_cs; 578114987Speter if (!CS_SECURE(cs)) { 579114987Speter printf("freebsd4_sigreturn: cs = 0x%x\n", cs); 580151316Sdavidxu ksiginfo_init_trap(&ksi); 581151316Sdavidxu ksi.ksi_signo = SIGBUS; 582151316Sdavidxu ksi.ksi_code = BUS_OBJERR; 583151316Sdavidxu ksi.ksi_trapno = T_PROTFLT; 584151316Sdavidxu ksi.ksi_addr = (void *)regs->tf_rip; 585151316Sdavidxu trapsignal(td, &ksi); 586114987Speter return (EINVAL); 587114987Speter } 588114987Speter 589114987Speter regs->tf_rdi = ucp->uc_mcontext.mc_edi; 590114987Speter regs->tf_rsi = ucp->uc_mcontext.mc_esi; 591114987Speter regs->tf_rbp = ucp->uc_mcontext.mc_ebp; 592114987Speter regs->tf_rbx = ucp->uc_mcontext.mc_ebx; 593114987Speter regs->tf_rdx = ucp->uc_mcontext.mc_edx; 594114987Speter regs->tf_rcx = ucp->uc_mcontext.mc_ecx; 595114987Speter regs->tf_rax = ucp->uc_mcontext.mc_eax; 596114987Speter regs->tf_trapno = ucp->uc_mcontext.mc_trapno; 597114987Speter regs->tf_err = ucp->uc_mcontext.mc_err; 598114987Speter regs->tf_rip = ucp->uc_mcontext.mc_eip; 599114987Speter regs->tf_cs = cs; 600114987Speter regs->tf_rflags = ucp->uc_mcontext.mc_eflags; 601114987Speter regs->tf_rsp = ucp->uc_mcontext.mc_esp; 602114987Speter regs->tf_ss = ucp->uc_mcontext.mc_ss; 603190620Skib regs->tf_ds = ucp->uc_mcontext.mc_ds; 604190620Skib regs->tf_es = ucp->uc_mcontext.mc_es; 605190620Skib regs->tf_fs = ucp->uc_mcontext.mc_fs; 606190620Skib regs->tf_gs = ucp->uc_mcontext.mc_gs; 607114987Speter 608198507Skib kern_sigprocmask(td, SIG_SETMASK, &ucp->uc_sigmask, NULL, 0); 609195486Skib td->td_pcb->pcb_full_iret = 1; 610114987Speter return (EJUSTRETURN); 611114987Speter} 612114987Speter#endif /* COMPAT_FREEBSD4 */ 613114987Speter 614114987Speter/* 615114987Speter * MPSAFE 616114987Speter */ 617114987Speterint 618119336Speterfreebsd32_sigreturn(td, uap) 619114987Speter struct thread *td; 620119336Speter struct freebsd32_sigreturn_args /* { 621119336Speter const struct freebsd32_ucontext *sigcntxp; 622114987Speter } */ *uap; 623114987Speter{ 624114987Speter struct ia32_ucontext uc; 625114987Speter struct trapframe *regs; 626198507Skib struct ia32_ucontext *ucp; 627114987Speter int cs, eflags, error, ret; 628151316Sdavidxu ksiginfo_t ksi; 629114987Speter 630114987Speter error = copyin(uap->sigcntxp, &uc, sizeof(uc)); 631114987Speter if (error != 0) 632114987Speter return (error); 633114987Speter ucp = &uc; 634114987Speter regs = td->td_frame; 635114987Speter eflags = ucp->uc_mcontext.mc_eflags; 636114987Speter /* 637114987Speter * Don't allow users to change privileged or reserved flags. 638114987Speter */ 639114987Speter /* 640114987Speter * XXX do allow users to change the privileged flag PSL_RF. 641114987Speter * The cpu sets PSL_RF in tf_eflags for faults. Debuggers 642114987Speter * should sometimes set it there too. tf_eflags is kept in 643114987Speter * the signal context during signal handling and there is no 644114987Speter * other place to remember it, so the PSL_RF bit may be 645114987Speter * corrupted by the signal handler without us knowing. 646114987Speter * Corruption of the PSL_RF bit at worst causes one more or 647114987Speter * one less debugger trap, so allowing it is fairly harmless. 648114987Speter */ 649114987Speter if (!EFL_SECURE(eflags & ~PSL_RF, regs->tf_rflags & ~PSL_RF)) { 650119336Speter printf("freebsd32_sigreturn: eflags = 0x%x\n", eflags); 651114987Speter return (EINVAL); 652114987Speter } 653114987Speter 654114987Speter /* 655114987Speter * Don't allow users to load a valid privileged %cs. Let the 656114987Speter * hardware check for invalid selectors, excess privilege in 657114987Speter * other selectors, invalid %eip's and invalid %esp's. 658114987Speter */ 659114987Speter cs = ucp->uc_mcontext.mc_cs; 660114987Speter if (!CS_SECURE(cs)) { 661114987Speter printf("sigreturn: cs = 0x%x\n", cs); 662151316Sdavidxu ksiginfo_init_trap(&ksi); 663151316Sdavidxu ksi.ksi_signo = SIGBUS; 664151316Sdavidxu ksi.ksi_code = BUS_OBJERR; 665151316Sdavidxu ksi.ksi_trapno = T_PROTFLT; 666151316Sdavidxu ksi.ksi_addr = (void *)regs->tf_rip; 667151316Sdavidxu trapsignal(td, &ksi); 668114987Speter return (EINVAL); 669114987Speter } 670114987Speter 671114987Speter ret = ia32_set_fpcontext(td, &ucp->uc_mcontext); 672114987Speter if (ret != 0) 673114987Speter return (ret); 674114987Speter 675114987Speter regs->tf_rdi = ucp->uc_mcontext.mc_edi; 676114987Speter regs->tf_rsi = ucp->uc_mcontext.mc_esi; 677114987Speter regs->tf_rbp = ucp->uc_mcontext.mc_ebp; 678114987Speter regs->tf_rbx = ucp->uc_mcontext.mc_ebx; 679114987Speter regs->tf_rdx = ucp->uc_mcontext.mc_edx; 680114987Speter regs->tf_rcx = ucp->uc_mcontext.mc_ecx; 681114987Speter regs->tf_rax = ucp->uc_mcontext.mc_eax; 682114987Speter regs->tf_trapno = ucp->uc_mcontext.mc_trapno; 683114987Speter regs->tf_err = ucp->uc_mcontext.mc_err; 684114987Speter regs->tf_rip = ucp->uc_mcontext.mc_eip; 685114987Speter regs->tf_cs = cs; 686114987Speter regs->tf_rflags = ucp->uc_mcontext.mc_eflags; 687114987Speter regs->tf_rsp = ucp->uc_mcontext.mc_esp; 688114987Speter regs->tf_ss = ucp->uc_mcontext.mc_ss; 689190620Skib regs->tf_ds = ucp->uc_mcontext.mc_ds; 690190620Skib regs->tf_es = ucp->uc_mcontext.mc_es; 691190620Skib regs->tf_fs = ucp->uc_mcontext.mc_fs; 692190620Skib regs->tf_gs = ucp->uc_mcontext.mc_gs; 693190620Skib regs->tf_flags = TF_HASSEGS; 694114987Speter 695198507Skib kern_sigprocmask(td, SIG_SETMASK, &ucp->uc_sigmask, NULL, 0); 696195486Skib td->td_pcb->pcb_full_iret = 1; 697114987Speter return (EJUSTRETURN); 698114987Speter} 699122303Speter 700122303Speter/* 701122303Speter * Clear registers on exec 702122303Speter */ 703122303Spetervoid 704122303Speteria32_setregs(td, entry, stack, ps_strings) 705122303Speter struct thread *td; 706122303Speter u_long entry; 707122303Speter u_long stack; 708122303Speter u_long ps_strings; 709122303Speter{ 710122303Speter struct trapframe *regs = td->td_frame; 711122303Speter struct pcb *pcb = td->td_pcb; 712122303Speter 713190620Skib mtx_lock(&dt_lock); 714190620Skib if (td->td_proc->p_md.md_ldt != NULL) 715190620Skib user_ldt_free(td); 716190620Skib else 717190620Skib mtx_unlock(&dt_lock); 718190620Skib 719122303Speter pcb->pcb_fsbase = 0; 720122303Speter pcb->pcb_gsbase = 0; 721189423Sjhb pcb->pcb_initial_fpucw = __INITIAL_FPUCW_I386__; 722122303Speter 723122303Speter bzero((char *)regs, sizeof(struct trapframe)); 724122303Speter regs->tf_rip = entry; 725122303Speter regs->tf_rsp = stack; 726122303Speter regs->tf_rflags = PSL_USER | (regs->tf_rflags & PSL_T); 727122303Speter regs->tf_ss = _udatasel; 728122303Speter regs->tf_cs = _ucode32sel; 729122303Speter regs->tf_rbx = ps_strings; 730190620Skib regs->tf_ds = _udatasel; 731190620Skib regs->tf_es = _udatasel; 732190620Skib regs->tf_fs = _ufssel; 733190620Skib regs->tf_gs = _ugssel; 734190620Skib regs->tf_flags = TF_HASSEGS; 735190620Skib 736122303Speter load_cr0(rcr0() | CR0_MP | CR0_TS); 737122303Speter fpstate_drop(td); 738122303Speter 739122303Speter /* Return via doreti so that we can change to a different %cs */ 740180992Skib pcb->pcb_flags |= PCB_FULLCTX | PCB_32BIT; 741182684Skib pcb->pcb_flags &= ~PCB_GS32BIT; 742195486Skib td->td_pcb->pcb_full_iret = 1; 743122303Speter td->td_retval[1] = 0; 744122303Speter} 745