The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/i386/svr4/svr4_machdep.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*
    2  * Copyright (c) 1998 Mark Newton
    3  * Copyright (c) 1994 Christos Zoulas
    4  * All rights reserved.
    5  *
    6  * Redistribution and use in source and binary forms, with or without
    7  * modification, are permitted provided that the following conditions
    8  * are met:
    9  * 1. Redistributions of source code must retain the above copyright
   10  *    notice, this list of conditions and the following disclaimer.
   11  * 2. Redistributions in binary form must reproduce the above copyright
   12  *    notice, this list of conditions and the following disclaimer in the
   13  *    documentation and/or other materials provided with the distribution.
   14  * 3. The name of the author may not be used to endorse or promote products
   15  *    derived from this software without specific prior written permission
   16  *
   17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
   18  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
   19  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
   20  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
   21  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
   22  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
   23  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
   24  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
   25  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
   26  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   27  *
   28  * $FreeBSD: releng/5.1/sys/i386/svr4/svr4_machdep.c 114983 2003-05-13 20:36:02Z jhb $
   29  */
   30 
   31 #include <sys/types.h>
   32 #include <sys/param.h>
   33 #include <sys/systm.h>
   34 #include <sys/exec.h>
   35 #include <sys/filedesc.h>
   36 #include <sys/lock.h>
   37 #include <sys/mutex.h>
   38 #include <sys/proc.h>
   39 #include <sys/signal.h>
   40 #include <sys/signalvar.h>
   41 
   42 #include <machine/cpu.h>
   43 #include <machine/cpufunc.h>
   44 #include <machine/psl.h>
   45 #include <machine/reg.h>
   46 #include <machine/specialreg.h>
   47 #include <machine/sysarch.h>
   48 #include <machine/vm86.h>
   49 #include <machine/vmparam.h>
   50 
   51 #include <vm/vm.h>
   52 #include <vm/pmap.h>
   53 
   54 #include <compat/svr4/svr4.h>
   55 #include <compat/svr4/svr4_types.h>
   56 #include <compat/svr4/svr4_signal.h>
   57 #include <i386/svr4/svr4_machdep.h>
   58 #include <compat/svr4/svr4_ucontext.h>
   59 #include <compat/svr4/svr4_proto.h>
   60 #include <compat/svr4/svr4_util.h>
   61 
   62 #undef sigcode
   63 #undef szsigcode
   64 
   65 extern int svr4_szsigcode;
   66 extern char svr4_sigcode[];
   67 extern int _udatasel, _ucodesel;
   68 
   69 static void svr4_getsiginfo(union svr4_siginfo *, int, u_long, caddr_t);
   70 
   71 #if !defined(__NetBSD__)
   72   /* taken from /sys/arch/i386/include/psl.h on NetBSD-1.3 */
   73 # define PSL_MBZ 0xffc08028
   74 # define PSL_USERSTATIC (PSL_USER | PSL_MBZ | PSL_IOPL | PSL_NT | PSL_VM | PSL_VIF | PSL_VIP)
   75 # define USERMODE(c, f) (ISPL(c) == SEL_UPL)
   76 #endif
   77 
   78 #if defined(__NetBSD__)
   79 void
   80 svr4_setregs(td, epp, stack)
   81         struct thread *td;
   82         struct exec_package *epp;
   83         u_long stack;
   84 {
   85         register struct pcb *pcb = td->td_pcb;
   86 
   87         pcb->pcb_savefpu.sv_env.en_cw = __SVR4_NPXCW__;
   88         setregs(td, epp, stack, 0UL);
   89 }
   90 #endif /* __NetBSD__ */
   91 
   92 void
   93 svr4_getcontext(td, uc, mask, oonstack)
   94         struct thread *td;
   95         struct svr4_ucontext *uc;
   96         sigset_t *mask;
   97         int oonstack;
   98 {
   99         struct proc *p = td->td_proc;
  100         struct trapframe *tf = td->td_frame;
  101         svr4_greg_t *r = uc->uc_mcontext.greg;
  102         struct svr4_sigaltstack *s = &uc->uc_stack;
  103 #if defined(DONE_MORE_SIGALTSTACK_WORK)
  104         struct sigacts *psp;
  105         struct sigaltstack *sf;
  106 #endif
  107 
  108         PROC_LOCK(p);
  109 #if defined(DONE_MORE_SIGALTSTACK_WORK)
  110         psp = p->p_sigacts;
  111         sf = &p->p_sigstk;
  112 #endif
  113 
  114         memset(uc, 0, sizeof(struct svr4_ucontext));
  115 
  116         uc->uc_link = p->p_emuldata;
  117         /*
  118          * Set the general purpose registers
  119          */
  120 #ifdef VM86
  121         if (tf->tf_eflags & PSL_VM) {
  122                 r[SVR4_X86_GS] = tf->tf_vm86_gs;
  123                 r[SVR4_X86_FS] = tf->tf_vm86_fs;
  124                 r[SVR4_X86_ES] = tf->tf_vm86_es;
  125                 r[SVR4_X86_DS] = tf->tf_vm86_ds;
  126                 r[SVR4_X86_EFL] = get_vflags(td);
  127         } else
  128 #endif
  129         {
  130 #if defined(__NetBSD__)
  131                 __asm("movl %%gs,%w0" : "=r" (r[SVR4_X86_GS]));
  132                 __asm("movl %%fs,%w0" : "=r" (r[SVR4_X86_FS]));
  133 #else
  134                 r[SVR4_X86_GS] = rgs();
  135                 r[SVR4_X86_FS] = tf->tf_fs;
  136 #endif
  137                 r[SVR4_X86_ES] = tf->tf_es;
  138                 r[SVR4_X86_DS] = tf->tf_ds;
  139                 r[SVR4_X86_EFL] = tf->tf_eflags;
  140         }
  141         r[SVR4_X86_EDI] = tf->tf_edi;
  142         r[SVR4_X86_ESI] = tf->tf_esi;
  143         r[SVR4_X86_EBP] = tf->tf_ebp;
  144         r[SVR4_X86_ESP] = tf->tf_esp;
  145         r[SVR4_X86_EBX] = tf->tf_ebx;
  146         r[SVR4_X86_EDX] = tf->tf_edx;
  147         r[SVR4_X86_ECX] = tf->tf_ecx;
  148         r[SVR4_X86_EAX] = tf->tf_eax;
  149         r[SVR4_X86_TRAPNO] = tf->tf_trapno;
  150         r[SVR4_X86_ERR] = tf->tf_err;
  151         r[SVR4_X86_EIP] = tf->tf_eip;
  152         r[SVR4_X86_CS] = tf->tf_cs;
  153         r[SVR4_X86_UESP] = 0;
  154         r[SVR4_X86_SS] = tf->tf_ss;
  155 
  156         /*
  157          * Set the signal stack
  158          */
  159 #if defined(DONE_MORE_SIGALTSTACK_WORK)
  160         bsd_to_svr4_sigaltstack(sf, s);
  161 #else
  162         s->ss_sp = (void *)(((u_long) tf->tf_esp) & ~(16384 - 1));
  163         s->ss_size = 16384;
  164         s->ss_flags = 0;
  165 #endif
  166         PROC_UNLOCK(p);
  167 
  168         /*
  169          * Set the signal mask
  170          */
  171         bsd_to_svr4_sigset(mask, &uc->uc_sigmask);
  172 
  173         /*
  174          * Set the flags
  175          */
  176         uc->uc_flags = SVR4_UC_SIGMASK|SVR4_UC_CPU|SVR4_UC_STACK;
  177 }
  178 
  179 
  180 /*
  181  * Set to ucontext specified. Reset signal mask and
  182  * stack state from context.
  183  * Return to previous pc and psl as specified by
  184  * context left by sendsig. Check carefully to
  185  * make sure that the user has not modified the
  186  * psl to gain improper privileges or to cause
  187  * a machine fault.
  188  */
  189 int
  190 svr4_setcontext(td, uc)
  191         struct thread *td;
  192         struct svr4_ucontext *uc;
  193 {
  194 #if defined(DONE_MORE_SIGALTSTACK_WORK)
  195         struct sigacts *psp;
  196 #endif
  197         struct proc *p = td->td_proc;
  198         register struct trapframe *tf;
  199         svr4_greg_t *r = uc->uc_mcontext.greg;
  200         struct svr4_sigaltstack *s = &uc->uc_stack;
  201         struct sigaltstack *sf;
  202         sigset_t mask;
  203 
  204         PROC_LOCK(p);
  205 #if defined(DONE_MORE_SIGALTSTACK_WORK)
  206         psp = p->p_sigacts;
  207 #endif
  208         sf = &p->p_sigstk;
  209 
  210         /*
  211          * XXX:
  212          * Should we check the value of flags to determine what to restore?
  213          * What to do with uc_link?
  214          * What to do with floating point stuff?
  215          * Should we bother with the rest of the registers that we
  216          * set to 0 right now?
  217          */
  218 
  219         if ((uc->uc_flags & SVR4_UC_CPU) == 0) {
  220                 PROC_UNLOCK(p);
  221                 return 0;
  222         }
  223 
  224         DPRINTF(("svr4_setcontext(%d)\n", p->p_pid));
  225 
  226         tf = td->td_frame;
  227 
  228         /*
  229          * Restore register context.
  230          */
  231 #ifdef VM86
  232 #warning "VM86 doesn't work yet, please don't try to use it."
  233         if (r[SVR4_X86_EFL] & PSL_VM) {
  234                 tf->tf_vm86_gs = r[SVR4_X86_GS];
  235                 tf->tf_vm86_fs = r[SVR4_X86_FS];
  236                 tf->tf_vm86_es = r[SVR4_X86_ES];
  237                 tf->tf_vm86_ds = r[SVR4_X86_DS];
  238                 set_vflags(td, r[SVR4_X86_EFL]);
  239         } else
  240 #endif
  241         {
  242                 /*
  243                  * Check for security violations.  If we're returning to
  244                  * protected mode, the CPU will validate the segment registers
  245                  * automatically and generate a trap on violations.  We handle
  246                  * the trap, rather than doing all of the checking here.
  247                  */
  248                 if (((r[SVR4_X86_EFL] ^ tf->tf_eflags) & PSL_USERSTATIC) != 0 ||
  249                     !USERMODE(r[SVR4_X86_CS], r[SVR4_X86_EFL])) {
  250                         PROC_UNLOCK(p);
  251                         return (EINVAL);
  252                 }
  253 
  254 #if defined(__NetBSD__)
  255                 /* %fs and %gs were restored by the trampoline. */
  256 #else
  257                 /* %gs was restored by the trampoline. */
  258                 tf->tf_fs = r[SVR4_X86_FS];
  259 #endif
  260                 tf->tf_es = r[SVR4_X86_ES];
  261                 tf->tf_ds = r[SVR4_X86_DS];
  262                 tf->tf_eflags = r[SVR4_X86_EFL];
  263         }
  264         tf->tf_edi = r[SVR4_X86_EDI];
  265         tf->tf_esi = r[SVR4_X86_ESI];
  266         tf->tf_ebp = r[SVR4_X86_EBP];
  267         tf->tf_ebx = r[SVR4_X86_EBX];
  268         tf->tf_edx = r[SVR4_X86_EDX];
  269         tf->tf_ecx = r[SVR4_X86_ECX];
  270         tf->tf_eax = r[SVR4_X86_EAX];
  271         tf->tf_trapno = r[SVR4_X86_TRAPNO];
  272         tf->tf_err = r[SVR4_X86_ERR];
  273         tf->tf_eip = r[SVR4_X86_EIP];
  274         tf->tf_cs = r[SVR4_X86_CS];
  275         tf->tf_ss = r[SVR4_X86_SS];
  276         tf->tf_esp = r[SVR4_X86_ESP];
  277 
  278         p->p_emuldata = uc->uc_link;
  279         /*
  280          * restore signal stack
  281          */
  282         if (uc->uc_flags & SVR4_UC_STACK) {
  283                 svr4_to_bsd_sigaltstack(s, sf);
  284         }
  285 
  286         /*
  287          * restore signal mask
  288          */
  289         if (uc->uc_flags & SVR4_UC_SIGMASK) {
  290 #if defined(DEBUG_SVR4)
  291                 {
  292                         int i;
  293                         for (i = 0; i < 4; i++)
  294                                 DPRINTF(("\tuc_sigmask[%d] = %lx\n", i,
  295                                                 uc->uc_sigmask.bits[i]));
  296                 }
  297 #endif
  298                 svr4_to_bsd_sigset(&uc->uc_sigmask, &mask);
  299                 SIG_CANTMASK(mask);
  300                 td->td_sigmask = mask;
  301                 signotify(td);
  302         }
  303         PROC_UNLOCK(p);
  304 
  305         return 0; /*EJUSTRETURN;*/
  306 }
  307 
  308 
  309 static void
  310 svr4_getsiginfo(si, sig, code, addr)
  311         union svr4_siginfo      *si;
  312         int                      sig;
  313         u_long                   code;
  314         caddr_t                  addr;
  315 {
  316         si->si_signo = bsd_to_svr4_sig[sig];
  317         si->si_errno = 0;
  318         si->si_addr  = addr;
  319 
  320         switch (code) {
  321         case T_PRIVINFLT:
  322                 si->si_code = SVR4_ILL_PRVOPC;
  323                 si->si_trap = SVR4_T_PRIVINFLT;
  324                 break;
  325 
  326         case T_BPTFLT:
  327                 si->si_code = SVR4_TRAP_BRKPT;
  328                 si->si_trap = SVR4_T_BPTFLT;
  329                 break;
  330 
  331         case T_ARITHTRAP:
  332                 si->si_code = SVR4_FPE_INTOVF;
  333                 si->si_trap = SVR4_T_DIVIDE;
  334                 break;
  335 
  336         case T_PROTFLT:
  337                 si->si_code = SVR4_SEGV_ACCERR;
  338                 si->si_trap = SVR4_T_PROTFLT;
  339                 break;
  340 
  341         case T_TRCTRAP:
  342                 si->si_code = SVR4_TRAP_TRACE;
  343                 si->si_trap = SVR4_T_TRCTRAP;
  344                 break;
  345 
  346         case T_PAGEFLT:
  347                 si->si_code = SVR4_SEGV_ACCERR;
  348                 si->si_trap = SVR4_T_PAGEFLT;
  349                 break;
  350 
  351         case T_ALIGNFLT:
  352                 si->si_code = SVR4_BUS_ADRALN;
  353                 si->si_trap = SVR4_T_ALIGNFLT;
  354                 break;
  355 
  356         case T_DIVIDE:
  357                 si->si_code = SVR4_FPE_FLTDIV;
  358                 si->si_trap = SVR4_T_DIVIDE;
  359                 break;
  360 
  361         case T_OFLOW:
  362                 si->si_code = SVR4_FPE_FLTOVF;
  363                 si->si_trap = SVR4_T_DIVIDE;
  364                 break;
  365 
  366         case T_BOUND:
  367                 si->si_code = SVR4_FPE_FLTSUB;
  368                 si->si_trap = SVR4_T_BOUND;
  369                 break;
  370 
  371         case T_DNA:
  372                 si->si_code = SVR4_FPE_FLTINV;
  373                 si->si_trap = SVR4_T_DNA;
  374                 break;
  375 
  376         case T_FPOPFLT:
  377                 si->si_code = SVR4_FPE_FLTINV;
  378                 si->si_trap = SVR4_T_FPOPFLT;
  379                 break;
  380 
  381         case T_SEGNPFLT:
  382                 si->si_code = SVR4_SEGV_MAPERR;
  383                 si->si_trap = SVR4_T_SEGNPFLT;
  384                 break;
  385 
  386         case T_STKFLT:
  387                 si->si_code = SVR4_ILL_BADSTK;
  388                 si->si_trap = SVR4_T_STKFLT;
  389                 break;
  390 
  391         default:
  392                 si->si_code = 0;
  393                 si->si_trap = 0;
  394 #if defined(DEBUG_SVR4)
  395                 printf("sig %d code %ld\n", sig, code);
  396 /*              panic("svr4_getsiginfo");*/
  397 #endif
  398                 break;
  399         }
  400 }
  401 
  402 
  403 /*
  404  * Send an interrupt to process.
  405  *
  406  * Stack is set up to allow sigcode stored
  407  * in u. to call routine. After the handler is
  408  * done svr4 will call setcontext for us
  409  * with the user context we just set up, and we
  410  * will return to the user pc, psl.
  411  */
  412 void
  413 svr4_sendsig(catcher, sig, mask, code)
  414         sig_t catcher;
  415         int sig;
  416         sigset_t *mask;
  417         u_long code;
  418 {
  419         register struct thread *td = curthread;
  420         struct proc *p = td->td_proc;
  421         register struct trapframe *tf;
  422         struct svr4_sigframe *fp, frame;
  423         struct sigacts *psp;
  424         int oonstack;
  425 
  426 #if defined(DEBUG_SVR4)
  427         printf("svr4_sendsig(%d)\n", sig);
  428 #endif
  429         PROC_LOCK_ASSERT(p, MA_OWNED);
  430         psp = p->p_sigacts;
  431         mtx_assert(&psp->ps_mtx, MA_OWNED);
  432 
  433         tf = td->td_frame;
  434         oonstack = sigonstack(tf->tf_esp);
  435 
  436         /*
  437          * Allocate space for the signal handler context.
  438          */
  439         if ((p->p_flag & P_ALTSTACK) && !oonstack &&
  440             SIGISMEMBER(psp->ps_sigonstack, sig)) {
  441                 fp = (struct svr4_sigframe *)(p->p_sigstk.ss_sp +
  442                     p->p_sigstk.ss_size - sizeof(struct svr4_sigframe));
  443                 p->p_sigstk.ss_flags |= SS_ONSTACK;
  444         } else {
  445                 fp = (struct svr4_sigframe *)tf->tf_esp - 1;
  446         }
  447         mtx_unlock(&psp->ps_mtx);
  448         PROC_UNLOCK(p);
  449 
  450         /* 
  451          * Build the argument list for the signal handler.
  452          * Notes:
  453          *      - we always build the whole argument list, even when we
  454          *        don't need to [when SA_SIGINFO is not set, we don't need
  455          *        to pass all sf_si and sf_uc]
  456          *      - we don't pass the correct signal address [we need to
  457          *        modify many kernel files to enable that]
  458          */
  459 
  460         svr4_getcontext(td, &frame.sf_uc, mask, oonstack);
  461 #if defined(DEBUG_SVR4)
  462         printf("obtained ucontext\n");
  463 #endif
  464         svr4_getsiginfo(&frame.sf_si, sig, code, (caddr_t) tf->tf_eip);
  465 #if defined(DEBUG_SVR4)
  466         printf("obtained siginfo\n");
  467 #endif
  468         frame.sf_signum = frame.sf_si.si_signo;
  469         frame.sf_sip = &fp->sf_si;
  470         frame.sf_ucp = &fp->sf_uc;
  471         frame.sf_handler = catcher;
  472 #if defined(DEBUG_SVR4)
  473         printf("sig = %d, sip %p, ucp = %p, handler = %p\n", 
  474                frame.sf_signum, frame.sf_sip, frame.sf_ucp, frame.sf_handler);
  475 #endif
  476 
  477         if (copyout(&frame, fp, sizeof(frame)) != 0) {
  478                 /*
  479                  * Process has trashed its stack; give it an illegal
  480                  * instruction to halt it in its tracks.
  481                  */
  482                 PROC_LOCK(p);
  483                 sigexit(td, SIGILL);
  484                 /* NOTREACHED */
  485         }
  486 #if defined(__NetBSD__)
  487         /*
  488          * Build context to run handler in.
  489          */
  490         tf->tf_es = GSEL(GUSERLDT_SEL, SEL_UPL);
  491         tf->tf_ds = GSEL(GUSERLDT_SEL, SEL_UPL);
  492         tf->tf_eip = (int)(((char *)PS_STRINGS) -
  493              svr4_szsigcode);
  494         tf->tf_cs = GSEL(GUSERLDT_SEL, SEL_UPL);
  495 
  496         tf->tf_eflags &= ~(PSL_T|PSL_VM|PSL_AC);
  497         tf->tf_esp = (int)fp;
  498         tf->tf_ss = GSEL(GUSERLDT_SEL, SEL_UPL);
  499 #else
  500         tf->tf_esp = (int)fp;
  501         tf->tf_eip = (int)(((char *)PS_STRINGS) - *(p->p_sysent->sv_szsigcode));
  502         tf->tf_eflags &= ~PSL_T;
  503         tf->tf_cs = _ucodesel;
  504         tf->tf_ds = _udatasel;
  505         tf->tf_es = _udatasel;
  506         tf->tf_fs = _udatasel;
  507         load_gs(_udatasel);
  508         tf->tf_ss = _udatasel;
  509         PROC_LOCK(p);
  510         mtx_lock(&psp->ps_mtx);
  511 #endif
  512 }
  513 
  514 
  515 
  516 int
  517 svr4_sys_sysarch(td, v)
  518         struct thread *td;
  519         struct svr4_sys_sysarch_args *v;
  520 {
  521         struct svr4_sys_sysarch_args *uap = v;
  522 #if 0   /* USER_LDT */
  523 #if defined(__NetBSD__)
  524         caddr_t sg = stackgap_init(p->p_emul);
  525 #else
  526         caddr_t sg = stackgap_init();
  527 #endif
  528         int error;
  529 #endif
  530 
  531         switch (uap->op) {
  532         case SVR4_SYSARCH_FPHW:
  533                 return 0;
  534 
  535         case SVR4_SYSARCH_DSCR:
  536 #if 0   /* USER_LDT */
  537 #warning "USER_LDT doesn't work - are you sure you want this?"
  538                 {
  539                         struct i386_set_ldt_args sa, *sap;
  540                         struct sys_sysarch_args ua;
  541 
  542                         struct svr4_ssd ssd;
  543                         union descriptor bsd;
  544 
  545                         if ((error = copyin(uap->a1, &ssd,
  546                                             sizeof(ssd))) != 0) {
  547                                 printf("Cannot copy arg1\n");
  548                                 return error;
  549                         }
  550 
  551                         printf("s=%x, b=%x, l=%x, a1=%x a2=%x\n",
  552                                ssd.selector, ssd.base, ssd.limit,
  553                                ssd.access1, ssd.access2);
  554 
  555                         /* We can only set ldt's for now. */
  556                         if (!ISLDT(ssd.selector)) {
  557                                 printf("Not an ldt\n");
  558                                 return EPERM;
  559                         }
  560 
  561                         /* Oh, well we don't cleanup either */
  562                         if (ssd.access1 == 0)
  563                                 return 0;
  564 
  565                         bsd.sd.sd_lobase = ssd.base & 0xffffff;
  566                         bsd.sd.sd_hibase = (ssd.base >> 24) & 0xff;
  567 
  568                         bsd.sd.sd_lolimit = ssd.limit & 0xffff;
  569                         bsd.sd.sd_hilimit = (ssd.limit >> 16) & 0xf;
  570 
  571                         bsd.sd.sd_type = ssd.access1 & 0x1f;
  572                         bsd.sd.sd_dpl =  (ssd.access1 >> 5) & 0x3;
  573                         bsd.sd.sd_p = (ssd.access1 >> 7) & 0x1;
  574 
  575                         bsd.sd.sd_xx = ssd.access2 & 0x3;
  576                         bsd.sd.sd_def32 = (ssd.access2 >> 2) & 0x1;
  577                         bsd.sd.sd_gran = (ssd.access2 >> 3)& 0x1;
  578 
  579                         sa.start = IDXSEL(ssd.selector);
  580                         sa.desc = stackgap_alloc(&sg, sizeof(union descriptor));
  581                         sa.num = 1;
  582                         sap = stackgap_alloc(&sg,
  583                                              sizeof(struct i386_set_ldt_args));
  584 
  585                         if ((error = copyout(&sa, sap, sizeof(sa))) != 0) {
  586                                 printf("Cannot copyout args\n");
  587                                 return error;
  588                         }
  589 
  590                         ua.op = I386_SET_LDT;
  591                         ua.parms = (char *) sap;
  592 
  593                         if ((error = copyout(&bsd, sa.desc, sizeof(bsd))) != 0) {
  594                                 printf("Cannot copyout desc\n");
  595                                 return error;
  596                         }
  597 
  598                         return sys_sysarch(td, &ua, retval);
  599                 }
  600 #endif
  601 
  602         default:
  603                 printf("svr4_sysarch(%d), a1 %p\n", uap->op,
  604                        uap->a1);
  605                 return 0;
  606         }
  607 }

Cache object: 41399b1cbb6a596967b89324a2bdb061


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.