1 /*
2 * Copyright (c) 1998 Mark Newton
3 * Copyright (c) 1994 Christos Zoulas
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 *
28 * $FreeBSD: releng/5.1/sys/i386/svr4/svr4_machdep.c 114983 2003-05-13 20:36:02Z jhb $
29 */
30
31 #include <sys/types.h>
32 #include <sys/param.h>
33 #include <sys/systm.h>
34 #include <sys/exec.h>
35 #include <sys/filedesc.h>
36 #include <sys/lock.h>
37 #include <sys/mutex.h>
38 #include <sys/proc.h>
39 #include <sys/signal.h>
40 #include <sys/signalvar.h>
41
42 #include <machine/cpu.h>
43 #include <machine/cpufunc.h>
44 #include <machine/psl.h>
45 #include <machine/reg.h>
46 #include <machine/specialreg.h>
47 #include <machine/sysarch.h>
48 #include <machine/vm86.h>
49 #include <machine/vmparam.h>
50
51 #include <vm/vm.h>
52 #include <vm/pmap.h>
53
54 #include <compat/svr4/svr4.h>
55 #include <compat/svr4/svr4_types.h>
56 #include <compat/svr4/svr4_signal.h>
57 #include <i386/svr4/svr4_machdep.h>
58 #include <compat/svr4/svr4_ucontext.h>
59 #include <compat/svr4/svr4_proto.h>
60 #include <compat/svr4/svr4_util.h>
61
62 #undef sigcode
63 #undef szsigcode
64
65 extern int svr4_szsigcode;
66 extern char svr4_sigcode[];
67 extern int _udatasel, _ucodesel;
68
69 static void svr4_getsiginfo(union svr4_siginfo *, int, u_long, caddr_t);
70
71 #if !defined(__NetBSD__)
72 /* taken from /sys/arch/i386/include/psl.h on NetBSD-1.3 */
73 # define PSL_MBZ 0xffc08028
74 # define PSL_USERSTATIC (PSL_USER | PSL_MBZ | PSL_IOPL | PSL_NT | PSL_VM | PSL_VIF | PSL_VIP)
75 # define USERMODE(c, f) (ISPL(c) == SEL_UPL)
76 #endif
77
78 #if defined(__NetBSD__)
79 void
80 svr4_setregs(td, epp, stack)
81 struct thread *td;
82 struct exec_package *epp;
83 u_long stack;
84 {
85 register struct pcb *pcb = td->td_pcb;
86
87 pcb->pcb_savefpu.sv_env.en_cw = __SVR4_NPXCW__;
88 setregs(td, epp, stack, 0UL);
89 }
90 #endif /* __NetBSD__ */
91
92 void
93 svr4_getcontext(td, uc, mask, oonstack)
94 struct thread *td;
95 struct svr4_ucontext *uc;
96 sigset_t *mask;
97 int oonstack;
98 {
99 struct proc *p = td->td_proc;
100 struct trapframe *tf = td->td_frame;
101 svr4_greg_t *r = uc->uc_mcontext.greg;
102 struct svr4_sigaltstack *s = &uc->uc_stack;
103 #if defined(DONE_MORE_SIGALTSTACK_WORK)
104 struct sigacts *psp;
105 struct sigaltstack *sf;
106 #endif
107
108 PROC_LOCK(p);
109 #if defined(DONE_MORE_SIGALTSTACK_WORK)
110 psp = p->p_sigacts;
111 sf = &p->p_sigstk;
112 #endif
113
114 memset(uc, 0, sizeof(struct svr4_ucontext));
115
116 uc->uc_link = p->p_emuldata;
117 /*
118 * Set the general purpose registers
119 */
120 #ifdef VM86
121 if (tf->tf_eflags & PSL_VM) {
122 r[SVR4_X86_GS] = tf->tf_vm86_gs;
123 r[SVR4_X86_FS] = tf->tf_vm86_fs;
124 r[SVR4_X86_ES] = tf->tf_vm86_es;
125 r[SVR4_X86_DS] = tf->tf_vm86_ds;
126 r[SVR4_X86_EFL] = get_vflags(td);
127 } else
128 #endif
129 {
130 #if defined(__NetBSD__)
131 __asm("movl %%gs,%w0" : "=r" (r[SVR4_X86_GS]));
132 __asm("movl %%fs,%w0" : "=r" (r[SVR4_X86_FS]));
133 #else
134 r[SVR4_X86_GS] = rgs();
135 r[SVR4_X86_FS] = tf->tf_fs;
136 #endif
137 r[SVR4_X86_ES] = tf->tf_es;
138 r[SVR4_X86_DS] = tf->tf_ds;
139 r[SVR4_X86_EFL] = tf->tf_eflags;
140 }
141 r[SVR4_X86_EDI] = tf->tf_edi;
142 r[SVR4_X86_ESI] = tf->tf_esi;
143 r[SVR4_X86_EBP] = tf->tf_ebp;
144 r[SVR4_X86_ESP] = tf->tf_esp;
145 r[SVR4_X86_EBX] = tf->tf_ebx;
146 r[SVR4_X86_EDX] = tf->tf_edx;
147 r[SVR4_X86_ECX] = tf->tf_ecx;
148 r[SVR4_X86_EAX] = tf->tf_eax;
149 r[SVR4_X86_TRAPNO] = tf->tf_trapno;
150 r[SVR4_X86_ERR] = tf->tf_err;
151 r[SVR4_X86_EIP] = tf->tf_eip;
152 r[SVR4_X86_CS] = tf->tf_cs;
153 r[SVR4_X86_UESP] = 0;
154 r[SVR4_X86_SS] = tf->tf_ss;
155
156 /*
157 * Set the signal stack
158 */
159 #if defined(DONE_MORE_SIGALTSTACK_WORK)
160 bsd_to_svr4_sigaltstack(sf, s);
161 #else
162 s->ss_sp = (void *)(((u_long) tf->tf_esp) & ~(16384 - 1));
163 s->ss_size = 16384;
164 s->ss_flags = 0;
165 #endif
166 PROC_UNLOCK(p);
167
168 /*
169 * Set the signal mask
170 */
171 bsd_to_svr4_sigset(mask, &uc->uc_sigmask);
172
173 /*
174 * Set the flags
175 */
176 uc->uc_flags = SVR4_UC_SIGMASK|SVR4_UC_CPU|SVR4_UC_STACK;
177 }
178
179
180 /*
181 * Set to ucontext specified. Reset signal mask and
182 * stack state from context.
183 * Return to previous pc and psl as specified by
184 * context left by sendsig. Check carefully to
185 * make sure that the user has not modified the
186 * psl to gain improper privileges or to cause
187 * a machine fault.
188 */
189 int
190 svr4_setcontext(td, uc)
191 struct thread *td;
192 struct svr4_ucontext *uc;
193 {
194 #if defined(DONE_MORE_SIGALTSTACK_WORK)
195 struct sigacts *psp;
196 #endif
197 struct proc *p = td->td_proc;
198 register struct trapframe *tf;
199 svr4_greg_t *r = uc->uc_mcontext.greg;
200 struct svr4_sigaltstack *s = &uc->uc_stack;
201 struct sigaltstack *sf;
202 sigset_t mask;
203
204 PROC_LOCK(p);
205 #if defined(DONE_MORE_SIGALTSTACK_WORK)
206 psp = p->p_sigacts;
207 #endif
208 sf = &p->p_sigstk;
209
210 /*
211 * XXX:
212 * Should we check the value of flags to determine what to restore?
213 * What to do with uc_link?
214 * What to do with floating point stuff?
215 * Should we bother with the rest of the registers that we
216 * set to 0 right now?
217 */
218
219 if ((uc->uc_flags & SVR4_UC_CPU) == 0) {
220 PROC_UNLOCK(p);
221 return 0;
222 }
223
224 DPRINTF(("svr4_setcontext(%d)\n", p->p_pid));
225
226 tf = td->td_frame;
227
228 /*
229 * Restore register context.
230 */
231 #ifdef VM86
232 #warning "VM86 doesn't work yet, please don't try to use it."
233 if (r[SVR4_X86_EFL] & PSL_VM) {
234 tf->tf_vm86_gs = r[SVR4_X86_GS];
235 tf->tf_vm86_fs = r[SVR4_X86_FS];
236 tf->tf_vm86_es = r[SVR4_X86_ES];
237 tf->tf_vm86_ds = r[SVR4_X86_DS];
238 set_vflags(td, r[SVR4_X86_EFL]);
239 } else
240 #endif
241 {
242 /*
243 * Check for security violations. If we're returning to
244 * protected mode, the CPU will validate the segment registers
245 * automatically and generate a trap on violations. We handle
246 * the trap, rather than doing all of the checking here.
247 */
248 if (((r[SVR4_X86_EFL] ^ tf->tf_eflags) & PSL_USERSTATIC) != 0 ||
249 !USERMODE(r[SVR4_X86_CS], r[SVR4_X86_EFL])) {
250 PROC_UNLOCK(p);
251 return (EINVAL);
252 }
253
254 #if defined(__NetBSD__)
255 /* %fs and %gs were restored by the trampoline. */
256 #else
257 /* %gs was restored by the trampoline. */
258 tf->tf_fs = r[SVR4_X86_FS];
259 #endif
260 tf->tf_es = r[SVR4_X86_ES];
261 tf->tf_ds = r[SVR4_X86_DS];
262 tf->tf_eflags = r[SVR4_X86_EFL];
263 }
264 tf->tf_edi = r[SVR4_X86_EDI];
265 tf->tf_esi = r[SVR4_X86_ESI];
266 tf->tf_ebp = r[SVR4_X86_EBP];
267 tf->tf_ebx = r[SVR4_X86_EBX];
268 tf->tf_edx = r[SVR4_X86_EDX];
269 tf->tf_ecx = r[SVR4_X86_ECX];
270 tf->tf_eax = r[SVR4_X86_EAX];
271 tf->tf_trapno = r[SVR4_X86_TRAPNO];
272 tf->tf_err = r[SVR4_X86_ERR];
273 tf->tf_eip = r[SVR4_X86_EIP];
274 tf->tf_cs = r[SVR4_X86_CS];
275 tf->tf_ss = r[SVR4_X86_SS];
276 tf->tf_esp = r[SVR4_X86_ESP];
277
278 p->p_emuldata = uc->uc_link;
279 /*
280 * restore signal stack
281 */
282 if (uc->uc_flags & SVR4_UC_STACK) {
283 svr4_to_bsd_sigaltstack(s, sf);
284 }
285
286 /*
287 * restore signal mask
288 */
289 if (uc->uc_flags & SVR4_UC_SIGMASK) {
290 #if defined(DEBUG_SVR4)
291 {
292 int i;
293 for (i = 0; i < 4; i++)
294 DPRINTF(("\tuc_sigmask[%d] = %lx\n", i,
295 uc->uc_sigmask.bits[i]));
296 }
297 #endif
298 svr4_to_bsd_sigset(&uc->uc_sigmask, &mask);
299 SIG_CANTMASK(mask);
300 td->td_sigmask = mask;
301 signotify(td);
302 }
303 PROC_UNLOCK(p);
304
305 return 0; /*EJUSTRETURN;*/
306 }
307
308
309 static void
310 svr4_getsiginfo(si, sig, code, addr)
311 union svr4_siginfo *si;
312 int sig;
313 u_long code;
314 caddr_t addr;
315 {
316 si->si_signo = bsd_to_svr4_sig[sig];
317 si->si_errno = 0;
318 si->si_addr = addr;
319
320 switch (code) {
321 case T_PRIVINFLT:
322 si->si_code = SVR4_ILL_PRVOPC;
323 si->si_trap = SVR4_T_PRIVINFLT;
324 break;
325
326 case T_BPTFLT:
327 si->si_code = SVR4_TRAP_BRKPT;
328 si->si_trap = SVR4_T_BPTFLT;
329 break;
330
331 case T_ARITHTRAP:
332 si->si_code = SVR4_FPE_INTOVF;
333 si->si_trap = SVR4_T_DIVIDE;
334 break;
335
336 case T_PROTFLT:
337 si->si_code = SVR4_SEGV_ACCERR;
338 si->si_trap = SVR4_T_PROTFLT;
339 break;
340
341 case T_TRCTRAP:
342 si->si_code = SVR4_TRAP_TRACE;
343 si->si_trap = SVR4_T_TRCTRAP;
344 break;
345
346 case T_PAGEFLT:
347 si->si_code = SVR4_SEGV_ACCERR;
348 si->si_trap = SVR4_T_PAGEFLT;
349 break;
350
351 case T_ALIGNFLT:
352 si->si_code = SVR4_BUS_ADRALN;
353 si->si_trap = SVR4_T_ALIGNFLT;
354 break;
355
356 case T_DIVIDE:
357 si->si_code = SVR4_FPE_FLTDIV;
358 si->si_trap = SVR4_T_DIVIDE;
359 break;
360
361 case T_OFLOW:
362 si->si_code = SVR4_FPE_FLTOVF;
363 si->si_trap = SVR4_T_DIVIDE;
364 break;
365
366 case T_BOUND:
367 si->si_code = SVR4_FPE_FLTSUB;
368 si->si_trap = SVR4_T_BOUND;
369 break;
370
371 case T_DNA:
372 si->si_code = SVR4_FPE_FLTINV;
373 si->si_trap = SVR4_T_DNA;
374 break;
375
376 case T_FPOPFLT:
377 si->si_code = SVR4_FPE_FLTINV;
378 si->si_trap = SVR4_T_FPOPFLT;
379 break;
380
381 case T_SEGNPFLT:
382 si->si_code = SVR4_SEGV_MAPERR;
383 si->si_trap = SVR4_T_SEGNPFLT;
384 break;
385
386 case T_STKFLT:
387 si->si_code = SVR4_ILL_BADSTK;
388 si->si_trap = SVR4_T_STKFLT;
389 break;
390
391 default:
392 si->si_code = 0;
393 si->si_trap = 0;
394 #if defined(DEBUG_SVR4)
395 printf("sig %d code %ld\n", sig, code);
396 /* panic("svr4_getsiginfo");*/
397 #endif
398 break;
399 }
400 }
401
402
403 /*
404 * Send an interrupt to process.
405 *
406 * Stack is set up to allow sigcode stored
407 * in u. to call routine. After the handler is
408 * done svr4 will call setcontext for us
409 * with the user context we just set up, and we
410 * will return to the user pc, psl.
411 */
412 void
413 svr4_sendsig(catcher, sig, mask, code)
414 sig_t catcher;
415 int sig;
416 sigset_t *mask;
417 u_long code;
418 {
419 register struct thread *td = curthread;
420 struct proc *p = td->td_proc;
421 register struct trapframe *tf;
422 struct svr4_sigframe *fp, frame;
423 struct sigacts *psp;
424 int oonstack;
425
426 #if defined(DEBUG_SVR4)
427 printf("svr4_sendsig(%d)\n", sig);
428 #endif
429 PROC_LOCK_ASSERT(p, MA_OWNED);
430 psp = p->p_sigacts;
431 mtx_assert(&psp->ps_mtx, MA_OWNED);
432
433 tf = td->td_frame;
434 oonstack = sigonstack(tf->tf_esp);
435
436 /*
437 * Allocate space for the signal handler context.
438 */
439 if ((p->p_flag & P_ALTSTACK) && !oonstack &&
440 SIGISMEMBER(psp->ps_sigonstack, sig)) {
441 fp = (struct svr4_sigframe *)(p->p_sigstk.ss_sp +
442 p->p_sigstk.ss_size - sizeof(struct svr4_sigframe));
443 p->p_sigstk.ss_flags |= SS_ONSTACK;
444 } else {
445 fp = (struct svr4_sigframe *)tf->tf_esp - 1;
446 }
447 mtx_unlock(&psp->ps_mtx);
448 PROC_UNLOCK(p);
449
450 /*
451 * Build the argument list for the signal handler.
452 * Notes:
453 * - we always build the whole argument list, even when we
454 * don't need to [when SA_SIGINFO is not set, we don't need
455 * to pass all sf_si and sf_uc]
456 * - we don't pass the correct signal address [we need to
457 * modify many kernel files to enable that]
458 */
459
460 svr4_getcontext(td, &frame.sf_uc, mask, oonstack);
461 #if defined(DEBUG_SVR4)
462 printf("obtained ucontext\n");
463 #endif
464 svr4_getsiginfo(&frame.sf_si, sig, code, (caddr_t) tf->tf_eip);
465 #if defined(DEBUG_SVR4)
466 printf("obtained siginfo\n");
467 #endif
468 frame.sf_signum = frame.sf_si.si_signo;
469 frame.sf_sip = &fp->sf_si;
470 frame.sf_ucp = &fp->sf_uc;
471 frame.sf_handler = catcher;
472 #if defined(DEBUG_SVR4)
473 printf("sig = %d, sip %p, ucp = %p, handler = %p\n",
474 frame.sf_signum, frame.sf_sip, frame.sf_ucp, frame.sf_handler);
475 #endif
476
477 if (copyout(&frame, fp, sizeof(frame)) != 0) {
478 /*
479 * Process has trashed its stack; give it an illegal
480 * instruction to halt it in its tracks.
481 */
482 PROC_LOCK(p);
483 sigexit(td, SIGILL);
484 /* NOTREACHED */
485 }
486 #if defined(__NetBSD__)
487 /*
488 * Build context to run handler in.
489 */
490 tf->tf_es = GSEL(GUSERLDT_SEL, SEL_UPL);
491 tf->tf_ds = GSEL(GUSERLDT_SEL, SEL_UPL);
492 tf->tf_eip = (int)(((char *)PS_STRINGS) -
493 svr4_szsigcode);
494 tf->tf_cs = GSEL(GUSERLDT_SEL, SEL_UPL);
495
496 tf->tf_eflags &= ~(PSL_T|PSL_VM|PSL_AC);
497 tf->tf_esp = (int)fp;
498 tf->tf_ss = GSEL(GUSERLDT_SEL, SEL_UPL);
499 #else
500 tf->tf_esp = (int)fp;
501 tf->tf_eip = (int)(((char *)PS_STRINGS) - *(p->p_sysent->sv_szsigcode));
502 tf->tf_eflags &= ~PSL_T;
503 tf->tf_cs = _ucodesel;
504 tf->tf_ds = _udatasel;
505 tf->tf_es = _udatasel;
506 tf->tf_fs = _udatasel;
507 load_gs(_udatasel);
508 tf->tf_ss = _udatasel;
509 PROC_LOCK(p);
510 mtx_lock(&psp->ps_mtx);
511 #endif
512 }
513
514
515
516 int
517 svr4_sys_sysarch(td, v)
518 struct thread *td;
519 struct svr4_sys_sysarch_args *v;
520 {
521 struct svr4_sys_sysarch_args *uap = v;
522 #if 0 /* USER_LDT */
523 #if defined(__NetBSD__)
524 caddr_t sg = stackgap_init(p->p_emul);
525 #else
526 caddr_t sg = stackgap_init();
527 #endif
528 int error;
529 #endif
530
531 switch (uap->op) {
532 case SVR4_SYSARCH_FPHW:
533 return 0;
534
535 case SVR4_SYSARCH_DSCR:
536 #if 0 /* USER_LDT */
537 #warning "USER_LDT doesn't work - are you sure you want this?"
538 {
539 struct i386_set_ldt_args sa, *sap;
540 struct sys_sysarch_args ua;
541
542 struct svr4_ssd ssd;
543 union descriptor bsd;
544
545 if ((error = copyin(uap->a1, &ssd,
546 sizeof(ssd))) != 0) {
547 printf("Cannot copy arg1\n");
548 return error;
549 }
550
551 printf("s=%x, b=%x, l=%x, a1=%x a2=%x\n",
552 ssd.selector, ssd.base, ssd.limit,
553 ssd.access1, ssd.access2);
554
555 /* We can only set ldt's for now. */
556 if (!ISLDT(ssd.selector)) {
557 printf("Not an ldt\n");
558 return EPERM;
559 }
560
561 /* Oh, well we don't cleanup either */
562 if (ssd.access1 == 0)
563 return 0;
564
565 bsd.sd.sd_lobase = ssd.base & 0xffffff;
566 bsd.sd.sd_hibase = (ssd.base >> 24) & 0xff;
567
568 bsd.sd.sd_lolimit = ssd.limit & 0xffff;
569 bsd.sd.sd_hilimit = (ssd.limit >> 16) & 0xf;
570
571 bsd.sd.sd_type = ssd.access1 & 0x1f;
572 bsd.sd.sd_dpl = (ssd.access1 >> 5) & 0x3;
573 bsd.sd.sd_p = (ssd.access1 >> 7) & 0x1;
574
575 bsd.sd.sd_xx = ssd.access2 & 0x3;
576 bsd.sd.sd_def32 = (ssd.access2 >> 2) & 0x1;
577 bsd.sd.sd_gran = (ssd.access2 >> 3)& 0x1;
578
579 sa.start = IDXSEL(ssd.selector);
580 sa.desc = stackgap_alloc(&sg, sizeof(union descriptor));
581 sa.num = 1;
582 sap = stackgap_alloc(&sg,
583 sizeof(struct i386_set_ldt_args));
584
585 if ((error = copyout(&sa, sap, sizeof(sa))) != 0) {
586 printf("Cannot copyout args\n");
587 return error;
588 }
589
590 ua.op = I386_SET_LDT;
591 ua.parms = (char *) sap;
592
593 if ((error = copyout(&bsd, sa.desc, sizeof(bsd))) != 0) {
594 printf("Cannot copyout desc\n");
595 return error;
596 }
597
598 return sys_sysarch(td, &ua, retval);
599 }
600 #endif
601
602 default:
603 printf("svr4_sysarch(%d), a1 %p\n", uap->op,
604 uap->a1);
605 return 0;
606 }
607 }
Cache object: 41399b1cbb6a596967b89324a2bdb061
|