The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/arm64/arm64/exec_machdep.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2014 Andrew Turner
    3  * All rights reserved.
    4  *
    5  * Redistribution and use in source and binary forms, with or without
    6  * modification, are permitted provided that the following conditions
    7  * are met:
    8  * 1. Redistributions of source code must retain the above copyright
    9  *    notice, this list of conditions and the following disclaimer.
   10  * 2. Redistributions in binary form must reproduce the above copyright
   11  *    notice, this list of conditions and the following disclaimer in the
   12  *    documentation and/or other materials provided with the distribution.
   13  *
   14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   24  * SUCH DAMAGE.
   25  *
   26  */
   27 
   28 #include <sys/cdefs.h>
   29 __FBSDID("$FreeBSD$");
   30 
   31 #include <sys/param.h>
   32 #include <sys/systm.h>
   33 #include <sys/exec.h>
   34 #include <sys/imgact.h>
   35 #include <sys/kdb.h>
   36 #include <sys/kernel.h>
   37 #include <sys/ktr.h>
   38 #include <sys/limits.h>
   39 #include <sys/lock.h>
   40 #include <sys/mutex.h>
   41 #include <sys/proc.h>
   42 #include <sys/ptrace.h>
   43 #include <sys/reg.h>
   44 #include <sys/rwlock.h>
   45 #include <sys/signalvar.h>
   46 #include <sys/syscallsubr.h>
   47 #include <sys/sysent.h>
   48 #include <sys/sysproto.h>
   49 #include <sys/ucontext.h>
   50 
   51 #include <vm/vm.h>
   52 #include <vm/vm_param.h>
   53 #include <vm/pmap.h>
   54 #include <vm/vm_map.h>
   55 
   56 #include <machine/armreg.h>
   57 #include <machine/kdb.h>
   58 #include <machine/md_var.h>
   59 #include <machine/pcb.h>
   60 
   61 #ifdef VFP
   62 #include <machine/vfp.h>
   63 #endif
   64 
   65 _Static_assert(sizeof(mcontext_t) == 880, "mcontext_t size incorrect");
   66 _Static_assert(sizeof(ucontext_t) == 960, "ucontext_t size incorrect");
   67 _Static_assert(sizeof(siginfo_t) == 80, "siginfo_t size incorrect");
   68 
   69 static void get_fpcontext(struct thread *td, mcontext_t *mcp);
   70 static void set_fpcontext(struct thread *td, mcontext_t *mcp);
   71 
   72 int
   73 fill_regs(struct thread *td, struct reg *regs)
   74 {
   75         struct trapframe *frame;
   76 
   77         frame = td->td_frame;
   78         regs->sp = frame->tf_sp;
   79         regs->lr = frame->tf_lr;
   80         regs->elr = frame->tf_elr;
   81         regs->spsr = frame->tf_spsr;
   82 
   83         memcpy(regs->x, frame->tf_x, sizeof(regs->x));
   84 
   85 #ifdef COMPAT_FREEBSD32
   86         /*
   87          * We may be called here for a 32bits process, if we're using a
   88          * 64bits debugger. If so, put PC and SPSR where it expects it.
   89          */
   90         if (SV_PROC_FLAG(td->td_proc, SV_ILP32)) {
   91                 regs->x[15] = frame->tf_elr;
   92                 regs->x[16] = frame->tf_spsr;
   93         }
   94 #endif
   95         return (0);
   96 }
   97 
   98 int
   99 set_regs(struct thread *td, struct reg *regs)
  100 {
  101         struct trapframe *frame;
  102 
  103         frame = td->td_frame;
  104         frame->tf_sp = regs->sp;
  105         frame->tf_lr = regs->lr;
  106 
  107         memcpy(frame->tf_x, regs->x, sizeof(frame->tf_x));
  108 
  109 #ifdef COMPAT_FREEBSD32
  110         if (SV_PROC_FLAG(td->td_proc, SV_ILP32)) {
  111                 /*
  112                  * We may be called for a 32bits process if we're using
  113                  * a 64bits debugger. If so, get PC and SPSR from where
  114                  * it put it.
  115                  */
  116                 frame->tf_elr = regs->x[15];
  117                 frame->tf_spsr &= ~PSR_SETTABLE_32;
  118                 frame->tf_spsr |= regs->x[16] & PSR_SETTABLE_32;
  119                 /* Don't allow userspace to ask to continue single stepping.
  120                  * The SPSR.SS field doesn't exist when the EL1 is AArch32.
  121                  * As the SPSR.DIT field has moved in its place don't
  122                  * allow userspace to set the SPSR.SS field.
  123                  */
  124         } else
  125 #endif
  126         {
  127                 frame->tf_elr = regs->elr;
  128                 frame->tf_spsr &= ~PSR_SETTABLE_64;
  129                 frame->tf_spsr |= regs->spsr & PSR_SETTABLE_64;
  130                 /* Enable single stepping if userspace asked fot it */
  131                 if ((frame->tf_spsr & PSR_SS) != 0) {
  132                         td->td_pcb->pcb_flags |= PCB_SINGLE_STEP;
  133 
  134                         WRITE_SPECIALREG(mdscr_el1,
  135                             READ_SPECIALREG(mdscr_el1) | MDSCR_SS);
  136                         isb();
  137                 }
  138         }
  139         return (0);
  140 }
  141 
  142 int
  143 fill_fpregs(struct thread *td, struct fpreg *regs)
  144 {
  145 #ifdef VFP
  146         struct pcb *pcb;
  147 
  148         pcb = td->td_pcb;
  149         if ((pcb->pcb_fpflags & PCB_FP_STARTED) != 0) {
  150                 /*
  151                  * If we have just been running VFP instructions we will
  152                  * need to save the state to memcpy it below.
  153                  */
  154                 if (td == curthread)
  155                         vfp_save_state(td, pcb);
  156         }
  157 
  158         KASSERT(pcb->pcb_fpusaved == &pcb->pcb_fpustate,
  159             ("Called fill_fpregs while the kernel is using the VFP"));
  160         memcpy(regs->fp_q, pcb->pcb_fpustate.vfp_regs,
  161             sizeof(regs->fp_q));
  162         regs->fp_cr = pcb->pcb_fpustate.vfp_fpcr;
  163         regs->fp_sr = pcb->pcb_fpustate.vfp_fpsr;
  164 #else
  165         memset(regs, 0, sizeof(*regs));
  166 #endif
  167         return (0);
  168 }
  169 
  170 int
  171 set_fpregs(struct thread *td, struct fpreg *regs)
  172 {
  173 #ifdef VFP
  174         struct pcb *pcb;
  175 
  176         pcb = td->td_pcb;
  177         KASSERT(pcb->pcb_fpusaved == &pcb->pcb_fpustate,
  178             ("Called set_fpregs while the kernel is using the VFP"));
  179         memcpy(pcb->pcb_fpustate.vfp_regs, regs->fp_q, sizeof(regs->fp_q));
  180         pcb->pcb_fpustate.vfp_fpcr = regs->fp_cr;
  181         pcb->pcb_fpustate.vfp_fpsr = regs->fp_sr;
  182 #endif
  183         return (0);
  184 }
  185 
  186 int
  187 fill_dbregs(struct thread *td, struct dbreg *regs)
  188 {
  189         struct debug_monitor_state *monitor;
  190         int i;
  191         uint8_t debug_ver, nbkpts, nwtpts;
  192 
  193         memset(regs, 0, sizeof(*regs));
  194 
  195         extract_user_id_field(ID_AA64DFR0_EL1, ID_AA64DFR0_DebugVer_SHIFT,
  196             &debug_ver);
  197         extract_user_id_field(ID_AA64DFR0_EL1, ID_AA64DFR0_BRPs_SHIFT,
  198             &nbkpts);
  199         extract_user_id_field(ID_AA64DFR0_EL1, ID_AA64DFR0_WRPs_SHIFT,
  200             &nwtpts);
  201 
  202         /*
  203          * The BRPs field contains the number of breakpoints - 1. Armv8-A
  204          * allows the hardware to provide 2-16 breakpoints so this won't
  205          * overflow an 8 bit value. The same applies to the WRPs field.
  206          */
  207         nbkpts++;
  208         nwtpts++;
  209 
  210         regs->db_debug_ver = debug_ver;
  211         regs->db_nbkpts = nbkpts;
  212         regs->db_nwtpts = nwtpts;
  213 
  214         monitor = &td->td_pcb->pcb_dbg_regs;
  215         if ((monitor->dbg_flags & DBGMON_ENABLED) != 0) {
  216                 for (i = 0; i < nbkpts; i++) {
  217                         regs->db_breakregs[i].dbr_addr = monitor->dbg_bvr[i];
  218                         regs->db_breakregs[i].dbr_ctrl = monitor->dbg_bcr[i];
  219                 }
  220                 for (i = 0; i < nwtpts; i++) {
  221                         regs->db_watchregs[i].dbw_addr = monitor->dbg_wvr[i];
  222                         regs->db_watchregs[i].dbw_ctrl = monitor->dbg_wcr[i];
  223                 }
  224         }
  225 
  226         return (0);
  227 }
  228 
  229 int
  230 set_dbregs(struct thread *td, struct dbreg *regs)
  231 {
  232         struct debug_monitor_state *monitor;
  233         uint64_t addr;
  234         uint32_t ctrl;
  235         int i;
  236 
  237         monitor = &td->td_pcb->pcb_dbg_regs;
  238         monitor->dbg_enable_count = 0;
  239 
  240         for (i = 0; i < DBG_BRP_MAX; i++) {
  241                 addr = regs->db_breakregs[i].dbr_addr;
  242                 ctrl = regs->db_breakregs[i].dbr_ctrl;
  243 
  244                 /*
  245                  * Don't let the user set a breakpoint on a kernel or
  246                  * non-canonical user address.
  247                  */
  248                 if (addr >= VM_MAXUSER_ADDRESS)
  249                         return (EINVAL);
  250 
  251                 /*
  252                  * The lowest 2 bits are ignored, so record the effective
  253                  * address.
  254                  */
  255                 addr = rounddown2(addr, 4);
  256 
  257                 /*
  258                  * Some control fields are ignored, and other bits reserved.
  259                  * Only unlinked, address-matching breakpoints are supported.
  260                  *
  261                  * XXX: fields that appear unvalidated, such as BAS, have
  262                  * constrained undefined behaviour. If the user mis-programs
  263                  * these, there is no risk to the system.
  264                  */
  265                 ctrl &= DBGBCR_EN | DBGBCR_PMC | DBGBCR_BAS;
  266                 if ((ctrl & DBGBCR_EN) != 0) {
  267                         /* Only target EL0. */
  268                         if ((ctrl & DBGBCR_PMC) != DBGBCR_PMC_EL0)
  269                                 return (EINVAL);
  270 
  271                         monitor->dbg_enable_count++;
  272                 }
  273 
  274                 monitor->dbg_bvr[i] = addr;
  275                 monitor->dbg_bcr[i] = ctrl;
  276         }
  277 
  278         for (i = 0; i < DBG_WRP_MAX; i++) {
  279                 addr = regs->db_watchregs[i].dbw_addr;
  280                 ctrl = regs->db_watchregs[i].dbw_ctrl;
  281 
  282                 /*
  283                  * Don't let the user set a watchpoint on a kernel or
  284                  * non-canonical user address.
  285                  */
  286                 if (addr >= VM_MAXUSER_ADDRESS)
  287                         return (EINVAL);
  288 
  289                 /*
  290                  * Some control fields are ignored, and other bits reserved.
  291                  * Only unlinked watchpoints are supported.
  292                  */
  293                 ctrl &= DBGWCR_EN | DBGWCR_PAC | DBGWCR_LSC | DBGWCR_BAS |
  294                     DBGWCR_MASK;
  295 
  296                 if ((ctrl & DBGWCR_EN) != 0) {
  297                         /* Only target EL0. */
  298                         if ((ctrl & DBGWCR_PAC) != DBGWCR_PAC_EL0)
  299                                 return (EINVAL);
  300 
  301                         /* Must set at least one of the load/store bits. */
  302                         if ((ctrl & DBGWCR_LSC) == 0)
  303                                 return (EINVAL);
  304 
  305                         /*
  306                          * When specifying the address range with BAS, the MASK
  307                          * field must be zero.
  308                          */
  309                         if ((ctrl & DBGWCR_BAS) != DBGWCR_BAS &&
  310                             (ctrl & DBGWCR_MASK) != 0)
  311                                 return (EINVAL);
  312 
  313                         monitor->dbg_enable_count++;
  314                 }
  315                 monitor->dbg_wvr[i] = addr;
  316                 monitor->dbg_wcr[i] = ctrl;
  317         }
  318 
  319         if (monitor->dbg_enable_count > 0)
  320                 monitor->dbg_flags |= DBGMON_ENABLED;
  321 
  322         return (0);
  323 }
  324 
  325 #ifdef COMPAT_FREEBSD32
  326 int
  327 fill_regs32(struct thread *td, struct reg32 *regs)
  328 {
  329         int i;
  330         struct trapframe *tf;
  331 
  332         tf = td->td_frame;
  333         for (i = 0; i < 13; i++)
  334                 regs->r[i] = tf->tf_x[i];
  335         /* For arm32, SP is r13 and LR is r14 */
  336         regs->r_sp = tf->tf_x[13];
  337         regs->r_lr = tf->tf_x[14];
  338         regs->r_pc = tf->tf_elr;
  339         regs->r_cpsr = tf->tf_spsr;
  340 
  341         return (0);
  342 }
  343 
  344 int
  345 set_regs32(struct thread *td, struct reg32 *regs)
  346 {
  347         int i;
  348         struct trapframe *tf;
  349 
  350         tf = td->td_frame;
  351         for (i = 0; i < 13; i++)
  352                 tf->tf_x[i] = regs->r[i];
  353         /* For arm 32, SP is r13 an LR is r14 */
  354         tf->tf_x[13] = regs->r_sp;
  355         tf->tf_x[14] = regs->r_lr;
  356         tf->tf_elr = regs->r_pc;
  357         tf->tf_spsr &= ~PSR_SETTABLE_32;
  358         tf->tf_spsr |= regs->r_cpsr & PSR_SETTABLE_32;
  359 
  360         return (0);
  361 }
  362 
  363 /* XXX fill/set dbregs/fpregs are stubbed on 32-bit arm. */
  364 int
  365 fill_fpregs32(struct thread *td, struct fpreg32 *regs)
  366 {
  367 
  368         memset(regs, 0, sizeof(*regs));
  369         return (0);
  370 }
  371 
  372 int
  373 set_fpregs32(struct thread *td, struct fpreg32 *regs)
  374 {
  375 
  376         return (0);
  377 }
  378 
  379 int
  380 fill_dbregs32(struct thread *td, struct dbreg32 *regs)
  381 {
  382 
  383         memset(regs, 0, sizeof(*regs));
  384         return (0);
  385 }
  386 
  387 int
  388 set_dbregs32(struct thread *td, struct dbreg32 *regs)
  389 {
  390 
  391         return (0);
  392 }
  393 #endif
  394 
  395 void
  396 exec_setregs(struct thread *td, struct image_params *imgp, uintptr_t stack)
  397 {
  398         struct trapframe *tf = td->td_frame;
  399         struct pcb *pcb = td->td_pcb;
  400 
  401         memset(tf, 0, sizeof(struct trapframe));
  402 
  403         tf->tf_x[0] = stack;
  404         tf->tf_sp = STACKALIGN(stack);
  405         tf->tf_lr = imgp->entry_addr;
  406         tf->tf_elr = imgp->entry_addr;
  407 
  408         td->td_pcb->pcb_tpidr_el0 = 0;
  409         td->td_pcb->pcb_tpidrro_el0 = 0;
  410         WRITE_SPECIALREG(tpidrro_el0, 0);
  411         WRITE_SPECIALREG(tpidr_el0, 0);
  412 
  413 #ifdef VFP
  414         vfp_reset_state(td, pcb);
  415 #endif
  416 
  417         /*
  418          * Clear debug register state. It is not applicable to the new process.
  419          */
  420         bzero(&pcb->pcb_dbg_regs, sizeof(pcb->pcb_dbg_regs));
  421 
  422         /* Generate new pointer authentication keys */
  423         ptrauth_exec(td);
  424 }
  425 
  426 /* Sanity check these are the same size, they will be memcpy'd to and from */
  427 CTASSERT(sizeof(((struct trapframe *)0)->tf_x) ==
  428     sizeof((struct gpregs *)0)->gp_x);
  429 CTASSERT(sizeof(((struct trapframe *)0)->tf_x) ==
  430     sizeof((struct reg *)0)->x);
  431 
  432 int
  433 get_mcontext(struct thread *td, mcontext_t *mcp, int clear_ret)
  434 {
  435         struct trapframe *tf = td->td_frame;
  436 
  437         if (clear_ret & GET_MC_CLEAR_RET) {
  438                 mcp->mc_gpregs.gp_x[0] = 0;
  439                 mcp->mc_gpregs.gp_spsr = tf->tf_spsr & ~PSR_C;
  440         } else {
  441                 mcp->mc_gpregs.gp_x[0] = tf->tf_x[0];
  442                 mcp->mc_gpregs.gp_spsr = tf->tf_spsr;
  443         }
  444 
  445         memcpy(&mcp->mc_gpregs.gp_x[1], &tf->tf_x[1],
  446             sizeof(mcp->mc_gpregs.gp_x[1]) * (nitems(mcp->mc_gpregs.gp_x) - 1));
  447 
  448         mcp->mc_gpregs.gp_sp = tf->tf_sp;
  449         mcp->mc_gpregs.gp_lr = tf->tf_lr;
  450         mcp->mc_gpregs.gp_elr = tf->tf_elr;
  451         get_fpcontext(td, mcp);
  452 
  453         return (0);
  454 }
  455 
  456 int
  457 set_mcontext(struct thread *td, mcontext_t *mcp)
  458 {
  459         struct trapframe *tf = td->td_frame;
  460         uint32_t spsr;
  461 
  462         spsr = mcp->mc_gpregs.gp_spsr;
  463         if ((spsr & PSR_M_MASK) != PSR_M_EL0t ||
  464             (spsr & PSR_AARCH32) != 0 ||
  465             (spsr & PSR_DAIF) != (td->td_frame->tf_spsr & PSR_DAIF))
  466                 return (EINVAL); 
  467 
  468         memcpy(tf->tf_x, mcp->mc_gpregs.gp_x, sizeof(tf->tf_x));
  469 
  470         tf->tf_sp = mcp->mc_gpregs.gp_sp;
  471         tf->tf_lr = mcp->mc_gpregs.gp_lr;
  472         tf->tf_elr = mcp->mc_gpregs.gp_elr;
  473         tf->tf_spsr = mcp->mc_gpregs.gp_spsr;
  474         if ((tf->tf_spsr & PSR_SS) != 0) {
  475                 td->td_pcb->pcb_flags |= PCB_SINGLE_STEP;
  476 
  477                 WRITE_SPECIALREG(mdscr_el1,
  478                     READ_SPECIALREG(mdscr_el1) | MDSCR_SS);
  479                 isb();
  480         }
  481         set_fpcontext(td, mcp);
  482 
  483         return (0);
  484 }
  485 
  486 static void
  487 get_fpcontext(struct thread *td, mcontext_t *mcp)
  488 {
  489 #ifdef VFP
  490         struct pcb *curpcb;
  491 
  492         MPASS(td == curthread);
  493 
  494         curpcb = curthread->td_pcb;
  495         if ((curpcb->pcb_fpflags & PCB_FP_STARTED) != 0) {
  496                 /*
  497                  * If we have just been running VFP instructions we will
  498                  * need to save the state to memcpy it below.
  499                  */
  500                 vfp_save_state(td, curpcb);
  501         }
  502 
  503         KASSERT(curpcb->pcb_fpusaved == &curpcb->pcb_fpustate,
  504             ("Called get_fpcontext while the kernel is using the VFP"));
  505         KASSERT((curpcb->pcb_fpflags & ~PCB_FP_USERMASK) == 0,
  506             ("Non-userspace FPU flags set in get_fpcontext"));
  507         memcpy(mcp->mc_fpregs.fp_q, curpcb->pcb_fpustate.vfp_regs,
  508             sizeof(mcp->mc_fpregs.fp_q));
  509         mcp->mc_fpregs.fp_cr = curpcb->pcb_fpustate.vfp_fpcr;
  510         mcp->mc_fpregs.fp_sr = curpcb->pcb_fpustate.vfp_fpsr;
  511         mcp->mc_fpregs.fp_flags = curpcb->pcb_fpflags;
  512         mcp->mc_flags |= _MC_FP_VALID;
  513 #endif
  514 }
  515 
  516 static void
  517 set_fpcontext(struct thread *td, mcontext_t *mcp)
  518 {
  519 #ifdef VFP
  520         struct pcb *curpcb;
  521 
  522         MPASS(td == curthread);
  523         if ((mcp->mc_flags & _MC_FP_VALID) != 0) {
  524                 curpcb = curthread->td_pcb;
  525 
  526                 /*
  527                  * Discard any vfp state for the current thread, we
  528                  * are about to override it.
  529                  */
  530                 critical_enter();
  531                 vfp_discard(td);
  532                 critical_exit();
  533 
  534                 KASSERT(curpcb->pcb_fpusaved == &curpcb->pcb_fpustate,
  535                     ("Called set_fpcontext while the kernel is using the VFP"));
  536                 memcpy(curpcb->pcb_fpustate.vfp_regs, mcp->mc_fpregs.fp_q,
  537                     sizeof(mcp->mc_fpregs.fp_q));
  538                 curpcb->pcb_fpustate.vfp_fpcr = mcp->mc_fpregs.fp_cr;
  539                 curpcb->pcb_fpustate.vfp_fpsr = mcp->mc_fpregs.fp_sr;
  540                 curpcb->pcb_fpflags = mcp->mc_fpregs.fp_flags & PCB_FP_USERMASK;
  541         }
  542 #endif
  543 }
  544 
  545 int
  546 sys_sigreturn(struct thread *td, struct sigreturn_args *uap)
  547 {
  548         ucontext_t uc;
  549         int error;
  550 
  551         if (copyin(uap->sigcntxp, &uc, sizeof(uc)))
  552                 return (EFAULT);
  553 
  554         error = set_mcontext(td, &uc.uc_mcontext);
  555         if (error != 0)
  556                 return (error);
  557 
  558         /* Restore signal mask. */
  559         kern_sigprocmask(td, SIG_SETMASK, &uc.uc_sigmask, NULL, 0);
  560 
  561         return (EJUSTRETURN);
  562 }
  563 
  564 void
  565 sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
  566 {
  567         struct thread *td;
  568         struct proc *p;
  569         struct trapframe *tf;
  570         struct sigframe *fp, frame;
  571         struct sigacts *psp;
  572         int onstack, sig;
  573 
  574         td = curthread;
  575         p = td->td_proc;
  576         PROC_LOCK_ASSERT(p, MA_OWNED);
  577 
  578         sig = ksi->ksi_signo;
  579         psp = p->p_sigacts;
  580         mtx_assert(&psp->ps_mtx, MA_OWNED);
  581 
  582         tf = td->td_frame;
  583         onstack = sigonstack(tf->tf_sp);
  584 
  585         CTR4(KTR_SIG, "sendsig: td=%p (%s) catcher=%p sig=%d", td, p->p_comm,
  586             catcher, sig);
  587 
  588         /* Allocate and validate space for the signal handler context. */
  589         if ((td->td_pflags & TDP_ALTSTACK) != 0 && !onstack &&
  590             SIGISMEMBER(psp->ps_sigonstack, sig)) {
  591                 fp = (struct sigframe *)((uintptr_t)td->td_sigstk.ss_sp +
  592                     td->td_sigstk.ss_size);
  593 #if defined(COMPAT_43)
  594                 td->td_sigstk.ss_flags |= SS_ONSTACK;
  595 #endif
  596         } else {
  597                 fp = (struct sigframe *)td->td_frame->tf_sp;
  598         }
  599 
  600         /* Make room, keeping the stack aligned */
  601         fp--;
  602         fp = (struct sigframe *)STACKALIGN(fp);
  603 
  604         /* Fill in the frame to copy out */
  605         bzero(&frame, sizeof(frame));
  606         get_mcontext(td, &frame.sf_uc.uc_mcontext, 0);
  607         frame.sf_si = ksi->ksi_info;
  608         frame.sf_uc.uc_sigmask = *mask;
  609         frame.sf_uc.uc_stack = td->td_sigstk;
  610         frame.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK) != 0 ?
  611             (onstack ? SS_ONSTACK : 0) : SS_DISABLE;
  612         mtx_unlock(&psp->ps_mtx);
  613         PROC_UNLOCK(td->td_proc);
  614 
  615         /* Copy the sigframe out to the user's stack. */
  616         if (copyout(&frame, fp, sizeof(*fp)) != 0) {
  617                 /* Process has trashed its stack. Kill it. */
  618                 CTR2(KTR_SIG, "sendsig: sigexit td=%p fp=%p", td, fp);
  619                 PROC_LOCK(p);
  620                 sigexit(td, SIGILL);
  621         }
  622 
  623         tf->tf_x[0] = sig;
  624         tf->tf_x[1] = (register_t)&fp->sf_si;
  625         tf->tf_x[2] = (register_t)&fp->sf_uc;
  626         tf->tf_x[8] = (register_t)catcher;
  627         tf->tf_sp = (register_t)fp;
  628         tf->tf_elr = (register_t)PROC_SIGCODE(p);
  629 
  630         /* Clear the single step flag while in the signal handler */
  631         if ((td->td_pcb->pcb_flags & PCB_SINGLE_STEP) != 0) {
  632                 td->td_pcb->pcb_flags &= ~PCB_SINGLE_STEP;
  633                 WRITE_SPECIALREG(mdscr_el1,
  634                     READ_SPECIALREG(mdscr_el1) & ~MDSCR_SS);
  635                 isb();
  636         }
  637 
  638         CTR3(KTR_SIG, "sendsig: return td=%p pc=%#x sp=%#x", td, tf->tf_elr,
  639             tf->tf_sp);
  640 
  641         PROC_LOCK(p);
  642         mtx_lock(&psp->ps_mtx);
  643 }

Cache object: 736335627a46895dac198a8c9ee0c1e9


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.