2 * Copyright (c) 1998 Mark Newton
3 * Copyright (c) 1994 Christos Zoulas
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
32 #include <sys/types.h>
33 #include <sys/param.h>
34 #include <sys/systm.h>
36 #include <sys/filedesc.h>
38 #include <sys/mutex.h>
40 #include <sys/signal.h>
41 #include <sys/signalvar.h>
43 #include <machine/cpu.h>
44 #include <machine/cpufunc.h>
45 #include <machine/psl.h>
46 #include <machine/reg.h>
47 #include <machine/specialreg.h>
48 #include <machine/sysarch.h>
49 #include <machine/vm86.h>
50 #include <machine/vmparam.h>
55 #include <compat/svr4/svr4.h>
56 #include <compat/svr4/svr4_types.h>
57 #include <compat/svr4/svr4_signal.h>
58 #include <i386/svr4/svr4_machdep.h>
59 #include <compat/svr4/svr4_ucontext.h>
60 #include <compat/svr4/svr4_proto.h>
61 #include <compat/svr4/svr4_util.h>
66 extern int svr4_szsigcode;
67 extern char svr4_sigcode[];
68 extern int _udatasel, _ucodesel;
70 static void svr4_getsiginfo(union svr4_siginfo *, int, u_long, caddr_t);
72 #if !defined(__NetBSD__)
73 /* taken from /sys/arch/i386/include/psl.h on NetBSD-1.3 */
74 # define PSL_MBZ 0xffc08028
75 # define PSL_USERSTATIC (PSL_USER | PSL_MBZ | PSL_IOPL | PSL_NT | PSL_VM | PSL_VIF | PSL_VIP)
76 # define USERMODE(c, f) (ISPL(c) == SEL_UPL)
79 #if defined(__NetBSD__)
81 svr4_setregs(td, epp, stack)
83 struct exec_package *epp;
86 register struct pcb *pcb = td->td_pcb;
88 pcb->pcb_savefpu.sv_env.en_cw = __SVR4_NPXCW__;
89 setregs(td, epp, stack, 0UL);
91 #endif /* __NetBSD__ */
94 svr4_getcontext(td, uc, mask, oonstack)
96 struct svr4_ucontext *uc;
100 struct proc *p = td->td_proc;
101 struct trapframe *tf = td->td_frame;
102 svr4_greg_t *r = uc->uc_mcontext.greg;
103 struct svr4_sigaltstack *s = &uc->uc_stack;
104 #if defined(DONE_MORE_SIGALTSTACK_WORK)
106 struct sigaltstack *sf;
110 #if defined(DONE_MORE_SIGALTSTACK_WORK)
115 memset(uc, 0, sizeof(struct svr4_ucontext));
117 uc->uc_link = p->p_emuldata;
119 * Set the general purpose registers
122 if (tf->tf_eflags & PSL_VM) {
123 r[SVR4_X86_GS] = tf->tf_vm86_gs;
124 r[SVR4_X86_FS] = tf->tf_vm86_fs;
125 r[SVR4_X86_ES] = tf->tf_vm86_es;
126 r[SVR4_X86_DS] = tf->tf_vm86_ds;
127 r[SVR4_X86_EFL] = get_vflags(td);
131 #if defined(__NetBSD__)
132 __asm("movl %%gs,%w0" : "=r" (r[SVR4_X86_GS]));
133 __asm("movl %%fs,%w0" : "=r" (r[SVR4_X86_FS]));
135 r[SVR4_X86_GS] = rgs();
136 r[SVR4_X86_FS] = tf->tf_fs;
138 r[SVR4_X86_ES] = tf->tf_es;
139 r[SVR4_X86_DS] = tf->tf_ds;
140 r[SVR4_X86_EFL] = tf->tf_eflags;
142 r[SVR4_X86_EDI] = tf->tf_edi;
143 r[SVR4_X86_ESI] = tf->tf_esi;
144 r[SVR4_X86_EBP] = tf->tf_ebp;
145 r[SVR4_X86_ESP] = tf->tf_esp;
146 r[SVR4_X86_EBX] = tf->tf_ebx;
147 r[SVR4_X86_EDX] = tf->tf_edx;
148 r[SVR4_X86_ECX] = tf->tf_ecx;
149 r[SVR4_X86_EAX] = tf->tf_eax;
150 r[SVR4_X86_TRAPNO] = tf->tf_trapno;
151 r[SVR4_X86_ERR] = tf->tf_err;
152 r[SVR4_X86_EIP] = tf->tf_eip;
153 r[SVR4_X86_CS] = tf->tf_cs;
154 r[SVR4_X86_UESP] = 0;
155 r[SVR4_X86_SS] = tf->tf_ss;
158 * Set the signal stack
160 #if defined(DONE_MORE_SIGALTSTACK_WORK)
161 bsd_to_svr4_sigaltstack(sf, s);
163 s->ss_sp = (void *)(((u_long) tf->tf_esp) & ~(16384 - 1));
170 * Set the signal mask
172 bsd_to_svr4_sigset(mask, &uc->uc_sigmask);
177 uc->uc_flags = SVR4_UC_SIGMASK|SVR4_UC_CPU|SVR4_UC_STACK;
182 * Set to ucontext specified. Reset signal mask and
183 * stack state from context.
184 * Return to previous pc and psl as specified by
185 * context left by sendsig. Check carefully to
186 * make sure that the user has not modified the
187 * psl to gain improper privileges or to cause
191 svr4_setcontext(td, uc)
193 struct svr4_ucontext *uc;
195 #if defined(DONE_MORE_SIGALTSTACK_WORK)
198 struct proc *p = td->td_proc;
199 register struct trapframe *tf;
200 svr4_greg_t *r = uc->uc_mcontext.greg;
201 struct svr4_sigaltstack *s = &uc->uc_stack;
202 struct sigaltstack *sf;
206 #if defined(DONE_MORE_SIGALTSTACK_WORK)
213 * Should we check the value of flags to determine what to restore?
214 * What to do with uc_link?
215 * What to do with floating point stuff?
216 * Should we bother with the rest of the registers that we
217 * set to 0 right now?
220 if ((uc->uc_flags & SVR4_UC_CPU) == 0) {
225 DPRINTF(("svr4_setcontext(%d)\n", p->p_pid));
230 * Restore register context.
233 #warning "VM86 doesn't work yet, please don't try to use it."
234 if (r[SVR4_X86_EFL] & PSL_VM) {
235 tf->tf_vm86_gs = r[SVR4_X86_GS];
236 tf->tf_vm86_fs = r[SVR4_X86_FS];
237 tf->tf_vm86_es = r[SVR4_X86_ES];
238 tf->tf_vm86_ds = r[SVR4_X86_DS];
239 set_vflags(td, r[SVR4_X86_EFL]);
244 * Check for security violations. If we're returning to
245 * protected mode, the CPU will validate the segment registers
246 * automatically and generate a trap on violations. We handle
247 * the trap, rather than doing all of the checking here.
249 if (((r[SVR4_X86_EFL] ^ tf->tf_eflags) & PSL_USERSTATIC) != 0 ||
250 !USERMODE(r[SVR4_X86_CS], r[SVR4_X86_EFL])) {
255 #if defined(__NetBSD__)
256 /* %fs and %gs were restored by the trampoline. */
258 /* %gs was restored by the trampoline. */
259 tf->tf_fs = r[SVR4_X86_FS];
261 tf->tf_es = r[SVR4_X86_ES];
262 tf->tf_ds = r[SVR4_X86_DS];
263 tf->tf_eflags = r[SVR4_X86_EFL];
265 tf->tf_edi = r[SVR4_X86_EDI];
266 tf->tf_esi = r[SVR4_X86_ESI];
267 tf->tf_ebp = r[SVR4_X86_EBP];
268 tf->tf_ebx = r[SVR4_X86_EBX];
269 tf->tf_edx = r[SVR4_X86_EDX];
270 tf->tf_ecx = r[SVR4_X86_ECX];
271 tf->tf_eax = r[SVR4_X86_EAX];
272 tf->tf_trapno = r[SVR4_X86_TRAPNO];
273 tf->tf_err = r[SVR4_X86_ERR];
274 tf->tf_eip = r[SVR4_X86_EIP];
275 tf->tf_cs = r[SVR4_X86_CS];
276 tf->tf_ss = r[SVR4_X86_SS];
277 tf->tf_esp = r[SVR4_X86_ESP];
279 p->p_emuldata = uc->uc_link;
281 * restore signal stack
283 if (uc->uc_flags & SVR4_UC_STACK) {
284 svr4_to_bsd_sigaltstack(s, sf);
288 * restore signal mask
290 if (uc->uc_flags & SVR4_UC_SIGMASK) {
291 #if defined(DEBUG_SVR4)
294 for (i = 0; i < 4; i++)
295 DPRINTF(("\tuc_sigmask[%d] = %lx\n", i,
296 uc->uc_sigmask.bits[i]));
299 svr4_to_bsd_sigset(&uc->uc_sigmask, &mask);
301 td->td_sigmask = mask;
306 return 0; /*EJUSTRETURN;*/
311 svr4_getsiginfo(si, sig, code, addr)
312 union svr4_siginfo *si;
317 si->svr4_si_signo = bsd_to_svr4_sig[sig];
318 si->svr4_si_errno = 0;
319 si->svr4_si_addr = addr;
323 si->svr4_si_code = SVR4_ILL_PRVOPC;
324 si->svr4_si_trap = SVR4_T_PRIVINFLT;
328 si->svr4_si_code = SVR4_TRAP_BRKPT;
329 si->svr4_si_trap = SVR4_T_BPTFLT;
333 si->svr4_si_code = SVR4_FPE_INTOVF;
334 si->svr4_si_trap = SVR4_T_DIVIDE;
338 si->svr4_si_code = SVR4_SEGV_ACCERR;
339 si->svr4_si_trap = SVR4_T_PROTFLT;
343 si->svr4_si_code = SVR4_TRAP_TRACE;
344 si->svr4_si_trap = SVR4_T_TRCTRAP;
348 si->svr4_si_code = SVR4_SEGV_ACCERR;
349 si->svr4_si_trap = SVR4_T_PAGEFLT;
353 si->svr4_si_code = SVR4_BUS_ADRALN;
354 si->svr4_si_trap = SVR4_T_ALIGNFLT;
358 si->svr4_si_code = SVR4_FPE_FLTDIV;
359 si->svr4_si_trap = SVR4_T_DIVIDE;
363 si->svr4_si_code = SVR4_FPE_FLTOVF;
364 si->svr4_si_trap = SVR4_T_DIVIDE;
368 si->svr4_si_code = SVR4_FPE_FLTSUB;
369 si->svr4_si_trap = SVR4_T_BOUND;
373 si->svr4_si_code = SVR4_FPE_FLTINV;
374 si->svr4_si_trap = SVR4_T_DNA;
378 si->svr4_si_code = SVR4_FPE_FLTINV;
379 si->svr4_si_trap = SVR4_T_FPOPFLT;
383 si->svr4_si_code = SVR4_SEGV_MAPERR;
384 si->svr4_si_trap = SVR4_T_SEGNPFLT;
388 si->svr4_si_code = SVR4_ILL_BADSTK;
389 si->svr4_si_trap = SVR4_T_STKFLT;
393 si->svr4_si_code = 0;
394 si->svr4_si_trap = 0;
395 #if defined(DEBUG_SVR4)
396 printf("sig %d code %ld\n", sig, code);
397 /* panic("svr4_getsiginfo");*/
405 * Send an interrupt to process.
407 * Stack is set up to allow sigcode stored
408 * in u. to call routine. After the handler is
409 * done svr4 will call setcontext for us
410 * with the user context we just set up, and we
411 * will return to the user pc, psl.
414 svr4_sendsig(catcher, ksi, mask)
419 register struct thread *td = curthread;
420 struct proc *p = td->td_proc;
421 register struct trapframe *tf;
422 struct svr4_sigframe *fp, frame;
428 PROC_LOCK_ASSERT(p, MA_OWNED);
429 sig = ksi->ksi_signo;
430 #if defined(DEBUG_SVR4)
431 printf("svr4_sendsig(%d)\n", sig);
433 code = ksi->ksi_trapno; /* use trap No. */
435 mtx_assert(&psp->ps_mtx, MA_OWNED);
438 oonstack = sigonstack(tf->tf_esp);
441 * Allocate space for the signal handler context.
443 if ((td->td_pflags & TDP_ALTSTACK) && !oonstack &&
444 SIGISMEMBER(psp->ps_sigonstack, sig)) {
445 fp = (struct svr4_sigframe *)(td->td_sigstk.ss_sp +
446 td->td_sigstk.ss_size - sizeof(struct svr4_sigframe));
447 td->td_sigstk.ss_flags |= SS_ONSTACK;
449 fp = (struct svr4_sigframe *)tf->tf_esp - 1;
451 mtx_unlock(&psp->ps_mtx);
455 * Build the argument list for the signal handler.
457 * - we always build the whole argument list, even when we
458 * don't need to [when SA_SIGINFO is not set, we don't need
459 * to pass all sf_si and sf_uc]
460 * - we don't pass the correct signal address [we need to
461 * modify many kernel files to enable that]
464 svr4_getcontext(td, &frame.sf_uc, mask, oonstack);
465 #if defined(DEBUG_SVR4)
466 printf("obtained ucontext\n");
468 svr4_getsiginfo(&frame.sf_si, sig, code, (caddr_t) tf->tf_eip);
469 #if defined(DEBUG_SVR4)
470 printf("obtained siginfo\n");
472 frame.sf_signum = frame.sf_si.svr4_si_signo;
473 frame.sf_sip = &fp->sf_si;
474 frame.sf_ucp = &fp->sf_uc;
475 frame.sf_handler = catcher;
476 #if defined(DEBUG_SVR4)
477 printf("sig = %d, sip %p, ucp = %p, handler = %p\n",
478 frame.sf_signum, frame.sf_sip, frame.sf_ucp, frame.sf_handler);
481 if (copyout(&frame, fp, sizeof(frame)) != 0) {
483 * Process has trashed its stack; give it an illegal
484 * instruction to halt it in its tracks.
490 #if defined(__NetBSD__)
492 * Build context to run handler in.
494 tf->tf_es = GSEL(GUSERLDT_SEL, SEL_UPL);
495 tf->tf_ds = GSEL(GUSERLDT_SEL, SEL_UPL);
496 tf->tf_eip = (int)(((char *)PS_STRINGS) -
498 tf->tf_cs = GSEL(GUSERLDT_SEL, SEL_UPL);
500 tf->tf_eflags &= ~(PSL_T|PSL_VM|PSL_AC|PSL_D);
501 tf->tf_esp = (int)fp;
502 tf->tf_ss = GSEL(GUSERLDT_SEL, SEL_UPL);
504 tf->tf_esp = (int)fp;
505 tf->tf_eip = (int)(((char *)PS_STRINGS) - *(p->p_sysent->sv_szsigcode));
506 tf->tf_eflags &= ~(PSL_T | PSL_D);
507 tf->tf_cs = _ucodesel;
508 tf->tf_ds = _udatasel;
509 tf->tf_es = _udatasel;
510 tf->tf_fs = _udatasel;
512 tf->tf_ss = _udatasel;
514 mtx_lock(&psp->ps_mtx);
521 svr4_sys_sysarch(td, v)
523 struct svr4_sys_sysarch_args *v;
525 struct svr4_sys_sysarch_args *uap = v;
527 #if defined(__NetBSD__)
528 caddr_t sg = stackgap_init(p->p_emul);
530 caddr_t sg = stackgap_init();
536 case SVR4_SYSARCH_FPHW:
539 case SVR4_SYSARCH_DSCR:
541 #warning "USER_LDT doesn't work - are you sure you want this?"
543 struct i386_set_ldt_args sa, *sap;
544 struct sys_sysarch_args ua;
547 union descriptor bsd;
549 if ((error = copyin(uap->a1, &ssd,
550 sizeof(ssd))) != 0) {
551 printf("Cannot copy arg1\n");
555 printf("s=%x, b=%x, l=%x, a1=%x a2=%x\n",
556 ssd.selector, ssd.base, ssd.limit,
557 ssd.access1, ssd.access2);
559 /* We can only set ldt's for now. */
560 if (!ISLDT(ssd.selector)) {
561 printf("Not an ldt\n");
565 /* Oh, well we don't cleanup either */
566 if (ssd.access1 == 0)
569 bsd.sd.sd_lobase = ssd.base & 0xffffff;
570 bsd.sd.sd_hibase = (ssd.base >> 24) & 0xff;
572 bsd.sd.sd_lolimit = ssd.limit & 0xffff;
573 bsd.sd.sd_hilimit = (ssd.limit >> 16) & 0xf;
575 bsd.sd.sd_type = ssd.access1 & 0x1f;
576 bsd.sd.sd_dpl = (ssd.access1 >> 5) & 0x3;
577 bsd.sd.sd_p = (ssd.access1 >> 7) & 0x1;
579 bsd.sd.sd_xx = ssd.access2 & 0x3;
580 bsd.sd.sd_def32 = (ssd.access2 >> 2) & 0x1;
581 bsd.sd.sd_gran = (ssd.access2 >> 3)& 0x1;
583 sa.start = IDXSEL(ssd.selector);
584 sa.desc = stackgap_alloc(&sg, sizeof(union descriptor));
586 sap = stackgap_alloc(&sg,
587 sizeof(struct i386_set_ldt_args));
589 if ((error = copyout(&sa, sap, sizeof(sa))) != 0) {
590 printf("Cannot copyout args\n");
594 ua.op = I386_SET_LDT;
595 ua.parms = (char *) sap;
597 if ((error = copyout(&bsd, sa.desc, sizeof(bsd))) != 0) {
598 printf("Cannot copyout desc\n");
602 return sys_sysarch(td, &ua, retval);
607 printf("svr4_sysarch(%d), a1 %p\n", uap->op,