ia32_syscall.c revision 155313
1114987Speter/*-
2114987Speter * Copyright (C) 1994, David Greenman
3114987Speter * Copyright (c) 1990, 1993
4114987Speter *	The Regents of the University of California.  All rights reserved.
5114987Speter *
6114987Speter * This code is derived from software contributed to Berkeley by
7114987Speter * the University of Utah, and William Jolitz.
8114987Speter *
9114987Speter * Redistribution and use in source and binary forms, with or without
10114987Speter * modification, are permitted provided that the following conditions
11114987Speter * are met:
12114987Speter * 1. Redistributions of source code must retain the above copyright
13114987Speter *    notice, this list of conditions and the following disclaimer.
14114987Speter * 2. Redistributions in binary form must reproduce the above copyright
15114987Speter *    notice, this list of conditions and the following disclaimer in the
16114987Speter *    documentation and/or other materials provided with the distribution.
17114987Speter * 3. All advertising materials mentioning features or use of this software
18114987Speter *    must display the following acknowledgement:
19114987Speter *	This product includes software developed by the University of
20114987Speter *	California, Berkeley and its contributors.
21114987Speter * 4. Neither the name of the University nor the names of its contributors
22114987Speter *    may be used to endorse or promote products derived from this software
23114987Speter *    without specific prior written permission.
24114987Speter *
25114987Speter * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26114987Speter * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27114987Speter * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28114987Speter * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29114987Speter * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30114987Speter * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31114987Speter * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32114987Speter * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33114987Speter * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34114987Speter * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35114987Speter * SUCH DAMAGE.
36114987Speter */
37114987Speter
38118031Sobrien#include <sys/cdefs.h>
39118031Sobrien__FBSDID("$FreeBSD: head/sys/amd64/ia32/ia32_syscall.c 155313 2006-02-04 20:37:20Z wsalamon $");
40118031Sobrien
41114987Speter/*
42114987Speter * 386 Trap and System call handling
43114987Speter */
44114987Speter
45114987Speter#include "opt_clock.h"
46114987Speter#include "opt_cpu.h"
47114987Speter#include "opt_isa.h"
48114987Speter#include "opt_ktrace.h"
49114987Speter
50114987Speter#include <sys/param.h>
51114987Speter#include <sys/bus.h>
52114987Speter#include <sys/systm.h>
53114987Speter#include <sys/proc.h>
54114987Speter#include <sys/pioctl.h>
55114987Speter#include <sys/kernel.h>
56114987Speter#include <sys/ktr.h>
57114987Speter#include <sys/lock.h>
58114987Speter#include <sys/mutex.h>
59114987Speter#include <sys/resourcevar.h>
60114987Speter#include <sys/signalvar.h>
61114987Speter#include <sys/syscall.h>
62114987Speter#include <sys/sysctl.h>
63114987Speter#include <sys/sysent.h>
64114987Speter#include <sys/uio.h>
65114987Speter#include <sys/vmmeter.h>
66114987Speter#ifdef KTRACE
67114987Speter#include <sys/ktrace.h>
68114987Speter#endif
69155313Swsalamon#include <security/audit/audit.h>
70114987Speter
71114987Speter#include <vm/vm.h>
72114987Speter#include <vm/vm_param.h>
73114987Speter#include <vm/pmap.h>
74114987Speter#include <vm/vm_kern.h>
75114987Speter#include <vm/vm_map.h>
76114987Speter#include <vm/vm_page.h>
77114987Speter#include <vm/vm_extern.h>
78114987Speter
79114987Speter#include <machine/cpu.h>
80122849Speter#include <machine/intr_machdep.h>
81114987Speter#include <machine/md_var.h>
82114987Speter
83114987Speter#define	IDTVEC(name)	__CONCAT(X,name)
84114987Speter
85114987Speterextern inthand_t IDTVEC(int0x80_syscall), IDTVEC(rsvd);
86119336Speterextern const char *freebsd32_syscallnames[];
87114987Speter
88114987Spetervoid ia32_syscall(struct trapframe frame);	/* Called from asm code */
89114987Speter
90114987Spetervoid
91114987Speteria32_syscall(struct trapframe frame)
92114987Speter{
93114987Speter	caddr_t params;
94114987Speter	int i;
95114987Speter	struct sysent *callp;
96114987Speter	struct thread *td = curthread;
97114987Speter	struct proc *p = td->td_proc;
98114987Speter	register_t orig_tf_rflags;
99114987Speter	u_int sticks;
100114987Speter	int error;
101114987Speter	int narg;
102114987Speter	u_int32_t args[8];
103114987Speter	u_int64_t args64[8];
104114987Speter	u_int code;
105151316Sdavidxu	ksiginfo_t ksi;
106114987Speter
107114987Speter	/*
108114987Speter	 * note: PCPU_LAZY_INC() can only be used if we can afford
109114987Speter	 * occassional inaccuracy in the count.
110114987Speter	 */
111144971Sjhb	PCPU_LAZY_INC(cnt.v_syscall);
112114987Speter
113114987Speter	sticks = td->td_sticks;
114114987Speter	td->td_frame = &frame;
115114987Speter	if (td->td_ucred != p->p_ucred)
116114987Speter		cred_update_thread(td);
117114987Speter	params = (caddr_t)frame.tf_rsp + sizeof(u_int32_t);
118114987Speter	code = frame.tf_rax;
119114987Speter	orig_tf_rflags = frame.tf_rflags;
120114987Speter
121114987Speter	if (p->p_sysent->sv_prepsyscall) {
122114987Speter		/*
123114987Speter		 * The prep code is MP aware.
124114987Speter		 */
125114987Speter		(*p->p_sysent->sv_prepsyscall)(&frame, args, &code, &params);
126114987Speter	} else {
127114987Speter		/*
128114987Speter		 * Need to check if this is a 32 bit or 64 bit syscall.
129114987Speter		 * fuword is MP aware.
130114987Speter		 */
131114987Speter		if (code == SYS_syscall) {
132114987Speter			/*
133114987Speter			 * Code is first argument, followed by actual args.
134114987Speter			 */
135114987Speter			code = fuword32(params);
136114987Speter			params += sizeof(int);
137114987Speter		} else if (code == SYS___syscall) {
138114987Speter			/*
139114987Speter			 * Like syscall, but code is a quad, so as to maintain
140114987Speter			 * quad alignment for the rest of the arguments.
141114987Speter			 * We use a 32-bit fetch in case params is not
142114987Speter			 * aligned.
143114987Speter			 */
144114987Speter			code = fuword32(params);
145114987Speter			params += sizeof(quad_t);
146114987Speter		}
147114987Speter	}
148114987Speter
149114987Speter 	if (p->p_sysent->sv_mask)
150114987Speter 		code &= p->p_sysent->sv_mask;
151114987Speter
152114987Speter 	if (code >= p->p_sysent->sv_size)
153114987Speter 		callp = &p->p_sysent->sv_table[0];
154114987Speter  	else
155114987Speter 		callp = &p->p_sysent->sv_table[code];
156114987Speter
157114987Speter	narg = callp->sy_narg & SYF_ARGMASK;
158114987Speter
159114987Speter	/*
160114987Speter	 * copyin and the ktrsyscall()/ktrsysret() code is MP-aware
161114987Speter	 */
162114987Speter	if (params != NULL && narg != 0)
163114987Speter		error = copyin(params, (caddr_t)args,
164114987Speter		    (u_int)(narg * sizeof(int)));
165114987Speter	else
166114987Speter		error = 0;
167114987Speter
168114987Speter	for (i = 0; i < narg; i++)
169114987Speter		args64[i] = args[i];
170114987Speter
171114987Speter#ifdef KTRACE
172114987Speter	if (KTRPOINT(td, KTR_SYSCALL))
173114987Speter		ktrsyscall(code, narg, args64);
174114987Speter#endif
175114987Speter	/*
176114987Speter	 * Try to run the syscall without Giant if the syscall
177114987Speter	 * is MP safe.
178114987Speter	 */
179114987Speter	if ((callp->sy_narg & SYF_MPSAFE) == 0)
180114987Speter		mtx_lock(&Giant);
181114987Speter
182114987Speter	if (error == 0) {
183114987Speter		td->td_retval[0] = 0;
184114987Speter		td->td_retval[1] = frame.tf_rdx;
185114987Speter
186114987Speter		STOPEVENT(p, S_SCE, narg);
187114987Speter
188155313Swsalamon		AUDIT_SYSCALL_ENTER(code, td);
189114987Speter		error = (*callp->sy_call)(td, args64);
190155313Swsalamon		AUDIT_SYSCALL_EXIT(error, td);
191114987Speter	}
192114987Speter
193114987Speter	switch (error) {
194114987Speter	case 0:
195114987Speter		frame.tf_rax = td->td_retval[0];
196114987Speter		frame.tf_rdx = td->td_retval[1];
197114987Speter		frame.tf_rflags &= ~PSL_C;
198114987Speter		break;
199114987Speter
200114987Speter	case ERESTART:
201114987Speter		/*
202114987Speter		 * Reconstruct pc, assuming lcall $X,y is 7 bytes,
203114987Speter		 * int 0x80 is 2 bytes. We saved this in tf_err.
204114987Speter		 */
205114987Speter		frame.tf_rip -= frame.tf_err;
206114987Speter		break;
207114987Speter
208114987Speter	case EJUSTRETURN:
209114987Speter		break;
210114987Speter
211114987Speter	default:
212114987Speter 		if (p->p_sysent->sv_errsize) {
213114987Speter 			if (error >= p->p_sysent->sv_errsize)
214114987Speter  				error = -1;	/* XXX */
215114987Speter   			else
216114987Speter  				error = p->p_sysent->sv_errtbl[error];
217114987Speter		}
218114987Speter		frame.tf_rax = error;
219114987Speter		frame.tf_rflags |= PSL_C;
220114987Speter		break;
221114987Speter	}
222114987Speter
223114987Speter	/*
224114987Speter	 * Release Giant if we previously set it.
225114987Speter	 */
226114987Speter	if ((callp->sy_narg & SYF_MPSAFE) == 0)
227114987Speter		mtx_unlock(&Giant);
228114987Speter
229114987Speter	/*
230114987Speter	 * Traced syscall.
231114987Speter	 */
232114987Speter	if (orig_tf_rflags & PSL_T) {
233114987Speter		frame.tf_rflags &= ~PSL_T;
234151316Sdavidxu		ksiginfo_init_trap(&ksi);
235151316Sdavidxu		ksi.ksi_signo = SIGTRAP;
236151316Sdavidxu		ksi.ksi_code = TRAP_TRACE;
237151316Sdavidxu		ksi.ksi_addr = (void *)frame.tf_rip;
238151316Sdavidxu		trapsignal(td, &ksi);
239114987Speter	}
240114987Speter
241114987Speter	/*
242114987Speter	 * Handle reschedule and other end-of-syscall issues
243114987Speter	 */
244114987Speter	userret(td, &frame, sticks);
245114987Speter
246114987Speter#ifdef KTRACE
247114987Speter	if (KTRPOINT(td, KTR_SYSRET))
248114987Speter		ktrsysret(code, error, td->td_retval[0]);
249114987Speter#endif
250114987Speter
251114987Speter	/*
252114987Speter	 * This works because errno is findable through the
253114987Speter	 * register set.  If we ever support an emulation where this
254114987Speter	 * is not the case, this code will need to be revisited.
255114987Speter	 */
256114987Speter	STOPEVENT(p, S_SCX, code);
257114987Speter
258114987Speter	WITNESS_WARN(WARN_PANIC, NULL, "System call %s returning",
259119336Speter	    (code >= 0 && code < SYS_MAXSYSCALL) ? freebsd32_syscallnames[code] : "???");
260114987Speter	mtx_assert(&sched_lock, MA_NOTOWNED);
261114987Speter	mtx_assert(&Giant, MA_NOTOWNED);
262114987Speter}
263114987Speter
264114987Speter
265114987Speterstatic void
266114987Speteria32_syscall_enable(void *dummy)
267114987Speter{
268114987Speter
269120346Speter 	setidt(IDT_SYSCALL, &IDTVEC(int0x80_syscall), SDT_SYSIGT, SEL_UPL, 0);
270114987Speter}
271114987Speter
272114987Speterstatic void
273114987Speteria32_syscall_disable(void *dummy)
274114987Speter{
275114987Speter
276120346Speter 	setidt(IDT_SYSCALL, &IDTVEC(rsvd), SDT_SYSIGT, SEL_KPL, 0);
277114987Speter}
278114987Speter
279114987SpeterSYSINIT(ia32_syscall, SI_SUB_EXEC, SI_ORDER_ANY, ia32_syscall_enable, NULL);
280114987SpeterSYSUNINIT(ia32_syscall, SI_SUB_EXEC, SI_ORDER_ANY, ia32_syscall_disable, NULL);
281