1/* $NetBSD: linux32_machdep.c,v 1.37 2016/09/02 07:51:05 maxv Exp $ */
2
3/*-
4 * Copyright (c) 2006 Emmanuel Dreyfus, all rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 * must display the following acknowledgement:
16 * This product includes software developed by Emmanuel Dreyfus
17 * 4. The name of the author may not be used to endorse or promote
18 * products derived from this software without specific prior written
19 * permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE THE AUTHOR AND CONTRIBUTORS ``AS IS''
22 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
23 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
25 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
29 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
32 */
33#include <sys/cdefs.h>
34__KERNEL_RCSID(0, "$NetBSD: linux32_machdep.c,v 1.37 2016/09/02 07:51:05 maxv Exp $");
35
36#include <sys/param.h>
37#include <sys/proc.h>
38#include <sys/exec.h>
39
40#include <machine/vmparam.h>
41#include <machine/cpufunc.h>
42#include <machine/netbsd32_machdep.h>
43
44#include <x86/fpu.h>
45
46#include <compat/netbsd32/netbsd32.h>
47#include <compat/netbsd32/netbsd32_syscallargs.h>
48
49#include <compat/linux/common/linux_types.h>
50#include <compat/linux/common/linux_emuldata.h>
51#include <compat/linux/common/linux_signal.h>
52#include <compat/linux/common/linux_errno.h>
53#include <compat/linux/common/linux_exec.h>
54#include <compat/linux/common/linux_ipc.h>
55#include <compat/linux/common/linux_sem.h>
56#include <compat/linux/linux_syscallargs.h>
57
58#include <compat/linux32/common/linux32_types.h>
59#include <compat/linux32/common/linux32_errno.h>
60#include <compat/linux32/common/linux32_machdep.h>
61#include <compat/linux32/common/linux32_signal.h>
62#include <compat/linux32/common/linux32_exec.h>
63#include <compat/linux32/common/linux32_ipc.h>
64#include <compat/linux32/common/linux32_sem.h>
65#include <compat/linux32/linux32_syscallargs.h>
66
67#ifdef DEBUG_LINUX
68#define DPRINTF(a) uprintf a
69#else
70#define DPRINTF(a)
71#endif
72
73extern char linux32_sigcode[];
74extern char linux32_rt_sigcode[];
75extern char linux32_esigcode[];
76
77static void linux32_save_ucontext(struct lwp *, struct trapframe *,
78 const sigset_t *, struct sigaltstack *, struct linux32_ucontext *);
79static void linux32_save_sigcontext(struct lwp *, struct trapframe *,
80 const sigset_t *, struct linux32_sigcontext *);
81static void linux32_rt_sendsig(const ksiginfo_t *, const sigset_t *);
82static void linux32_old_sendsig(const ksiginfo_t *, const sigset_t *);
83static int linux32_restore_sigcontext(struct lwp *,
84 struct linux32_sigcontext *, register_t *);
85
86void
87linux32_sendsig(const ksiginfo_t *ksi, const sigset_t *mask)
88{
89 if (SIGACTION(curproc, ksi->ksi_signo).sa_flags & SA_SIGINFO)
90 linux32_rt_sendsig(ksi, mask);
91 else
92 linux32_old_sendsig(ksi, mask);
93 return;
94}
95
96void
97linux32_old_sendsig(const ksiginfo_t *ksi, const sigset_t *mask)
98{
99 struct lwp *l = curlwp;
100 struct proc *p = l->l_proc;
101 struct trapframe *tf;
102 struct linux32_sigframe *fp, frame;
103 int onstack, error;
104 int sig = ksi->ksi_signo;
105 sig_t catcher = SIGACTION(p, sig).sa_handler;
106 struct sigaltstack *sas = &l->l_sigstk;
107
108 tf = l->l_md.md_regs;
109 /* Do we need to jump onto the signal stack? */
110 onstack = (sas->ss_flags & (SS_DISABLE | SS_ONSTACK)) == 0 &&
111 (SIGACTION(p, sig).sa_flags & SA_ONSTACK) != 0;
112
113
114 /* Allocate space for the signal handler context. */
115 if (onstack)
116 fp = (struct linux32_sigframe *)((char *)sas->ss_sp +
117 sas->ss_size);
118 else
119 fp = (struct linux32_sigframe *)tf->tf_rsp;
120 fp--;
121
122 DPRINTF(("old: onstack = %d, fp = %p sig = %d rip = 0x%lx\n",
123 onstack, fp, sig, tf->tf_rip));
124
125 /* Build stack frame for signal trampoline. */
126 NETBSD32PTR32(frame.sf_handler, catcher);
127 frame.sf_sig = native_to_linux32_signo[sig];
128
129 linux32_save_sigcontext(l, tf, mask, &frame.sf_sc);
130
131 sendsig_reset(l, sig);
132 mutex_exit(p->p_lock);
133 error = copyout(&frame, fp, sizeof(frame));
134 mutex_enter(p->p_lock);
135
136 if (error != 0) {
137 /*
138 * Process has trashed its stack; give it an illegal
139 * instruction to halt it in its tracks.
140 */
141 sigexit(l, SIGILL);
142 /* NOTREACHED */
143 }
144
145 /*
146 * Build context to run handler in.
147 */
148 tf->tf_fs = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
149 tf->tf_es = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
150 tf->tf_ds = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
151 tf->tf_rip = ((long)p->p_sigctx.ps_sigcode) & 0xffffffff;
152 tf->tf_cs = GSEL(GUCODE32_SEL, SEL_UPL) & 0xffffffff;
153 tf->tf_rflags &= ~PSL_CLEARSIG & 0xffffffff;
154 tf->tf_rsp = (long)fp & 0xffffffff;
155 tf->tf_ss = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
156
157 /* Remember that we're now on the signal stack. */
158 if (onstack)
159 sas->ss_flags |= SS_ONSTACK;
160
161 return;
162}
163
164void
165linux32_rt_sendsig(const ksiginfo_t *ksi, const sigset_t *mask)
166{
167 struct lwp *l = curlwp;
168 struct proc *p = l->l_proc;
169 struct trapframe *tf;
170 struct linux32_rt_sigframe *fp, frame;
171 int onstack, error;
172 linux32_siginfo_t *lsi;
173 int sig = ksi->ksi_signo;
174 sig_t catcher = SIGACTION(p, sig).sa_handler;
175 struct sigaltstack *sas = &l->l_sigstk;
176
177 tf = l->l_md.md_regs;
178 /* Do we need to jump onto the signal stack? */
179 onstack = (sas->ss_flags & (SS_DISABLE | SS_ONSTACK)) == 0 &&
180 (SIGACTION(p, sig).sa_flags & SA_ONSTACK) != 0;
181
182
183 /* Allocate space for the signal handler context. */
184 if (onstack)
185 fp = (struct linux32_rt_sigframe *)((char *)sas->ss_sp +
186 sas->ss_size);
187 else
188 fp = (struct linux32_rt_sigframe *)tf->tf_rsp;
189 fp--;
190
191 /* Build stack frame for signal trampoline. */
192 NETBSD32PTR32(frame.sf_handler, catcher);
193 frame.sf_sig = native_to_linux32_signo[sig];
194 NETBSD32PTR32(frame.sf_sip, &fp->sf_si);
195 NETBSD32PTR32(frame.sf_ucp, &fp->sf_uc);
196
197 DPRINTF(("rt: onstack = %d, fp = %p sig = %d rip = 0x%lx\n",
198 onstack, fp, sig, tf->tf_rip));
199
200 lsi = &frame.sf_si;
201 (void)memset(lsi, 0, sizeof(frame.sf_si));
202 lsi->lsi_errno = native_to_linux32_errno[ksi->ksi_errno];
203 lsi->lsi_code = native_to_linux_si_code(ksi->ksi_code);
204 lsi->lsi_signo = frame.sf_sig;
205 switch (lsi->lsi_signo) {
206 case LINUX32_SIGILL:
207 case LINUX32_SIGFPE:
208 case LINUX32_SIGSEGV:
209 case LINUX32_SIGBUS:
210 case LINUX32_SIGTRAP:
211 NETBSD32PTR32(lsi->lsi_addr, ksi->ksi_addr);
212 break;
213 case LINUX32_SIGCHLD:
214 lsi->lsi_uid = ksi->ksi_uid;
215 lsi->lsi_pid = ksi->ksi_pid;
216 lsi->lsi_utime = ksi->ksi_utime;
217 lsi->lsi_stime = ksi->ksi_stime;
218 lsi->lsi_status = native_to_linux_si_status(ksi->ksi_code,
219 ksi->ksi_status);
220 break;
221 case LINUX32_SIGIO:
222 lsi->lsi_band = ksi->ksi_band;
223 lsi->lsi_fd = ksi->ksi_fd;
224 break;
225 default:
226 lsi->lsi_uid = ksi->ksi_uid;
227 lsi->lsi_pid = ksi->ksi_pid;
228 if (lsi->lsi_signo == LINUX32_SIGALRM ||
229 lsi->lsi_signo >= LINUX32_SIGRTMIN)
230 NETBSD32PTR32(lsi->lsi_value.sival_ptr,
231 ksi->ksi_value.sival_ptr);
232 break;
233 }
234
235 /* Save register context. */
236 linux32_save_ucontext(l, tf, mask, sas, &frame.sf_uc);
237 sendsig_reset(l, sig);
238 mutex_exit(p->p_lock);
239 error = copyout(&frame, fp, sizeof(frame));
240 mutex_enter(p->p_lock);
241
242 if (error != 0) {
243 /*
244 * Process has trashed its stack; give it an illegal
245 * instruction to halt it in its tracks.
246 */
247 sigexit(l, SIGILL);
248 /* NOTREACHED */
249 }
250
251 /*
252 * Build context to run handler in.
253 */
254 tf->tf_fs = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
255 tf->tf_es = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
256 tf->tf_ds = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
257 tf->tf_rip = (((long)p->p_sigctx.ps_sigcode) +
258 (linux32_rt_sigcode - linux32_sigcode)) & 0xffffffff;
259 tf->tf_cs = GSEL(GUCODE32_SEL, SEL_UPL) & 0xffffffff;
260 tf->tf_rflags &= ~PSL_CLEARSIG & 0xffffffff;
261 tf->tf_rsp = (long)fp & 0xffffffff;
262 tf->tf_ss = GSEL(GUDATA32_SEL, SEL_UPL) & 0xffffffff;
263
264 /* Remember that we're now on the signal stack. */
265 if (onstack)
266 sas->ss_flags |= SS_ONSTACK;
267
268 return;
269}
270
271void
272linux32_setregs(struct lwp *l, struct exec_package *pack, u_long stack)
273{
274 struct pcb *pcb = lwp_getpcb(l);
275 struct trapframe *tf;
276 struct proc *p = l->l_proc;
277
278#if defined(USER_LDT) && 0
279 pmap_ldt_cleanup(l);
280#endif
281
282 netbsd32_adjust_limits(p);
283
284 fpu_save_area_clear(l, __Linux_NPXCW__);
285
286 l->l_md.md_flags |= MDL_COMPAT32; /* Forces iret not sysret */
287 pcb->pcb_flags = PCB_COMPAT32;
288
289 p->p_flag |= PK_32;
290
291 tf = l->l_md.md_regs;
292 tf->tf_rax = 0;
293 tf->tf_rbx = (u_int32_t)p->p_psstrp;
294 tf->tf_rcx = pack->ep_entry & 0xffffffff;
295 tf->tf_rdx = 0;
296 tf->tf_rsi = 0;
297 tf->tf_rdi = 0;
298 tf->tf_rbp = 0;
299 tf->tf_rsp = stack & 0xffffffff;
300 tf->tf_r8 = 0;
301 tf->tf_r9 = 0;
302 tf->tf_r10 = 0;
303 tf->tf_r11 = 0;
304 tf->tf_r12 = 0;
305 tf->tf_r13 = 0;
306 tf->tf_r14 = 0;
307 tf->tf_r15 = 0;
308 tf->tf_rip = pack->ep_entry & 0xffffffff;
309 tf->tf_rflags = PSL_USERSET;
310 tf->tf_cs = GSEL(GUCODE32_SEL, SEL_UPL);
311 tf->tf_ss = GSEL(GUDATA32_SEL, SEL_UPL);
312 tf->tf_ds = GSEL(GUDATA32_SEL, SEL_UPL);
313 tf->tf_es = GSEL(GUDATA32_SEL, SEL_UPL);
314 cpu_fsgs_zero(l);
315 cpu_fsgs_reload(l, GSEL(GUDATA32_SEL, SEL_UPL), GSEL(GUDATA32_SEL, SEL_UPL));
316}
317
318static void
319linux32_save_ucontext(struct lwp *l, struct trapframe *tf,
320 const sigset_t *mask, struct sigaltstack *sas, struct linux32_ucontext *uc)
321{
322
323 uc->uc_flags = 0;
324 NETBSD32PTR32(uc->uc_link, NULL);
325 native_to_linux32_sigaltstack(&uc->uc_stack, sas);
326 linux32_save_sigcontext(l, tf, mask, &uc->uc_mcontext);
327 native_to_linux32_sigset(&uc->uc_sigmask, mask);
328 (void)memset(&uc->uc_fpregs_mem, 0, sizeof(uc->uc_fpregs_mem));
329}
330
331static void
332linux32_save_sigcontext(struct lwp *l, struct trapframe *tf,
333 const sigset_t *mask, struct linux32_sigcontext *sc)
334{
335 struct pcb *pcb = lwp_getpcb(l);
336
337 /* Save register context. */
338 sc->sc_gs = tf->tf_gs;
339 sc->sc_fs = tf->tf_fs;
340 sc->sc_es = tf->tf_es;
341 sc->sc_ds = tf->tf_ds;
342 sc->sc_eflags = tf->tf_rflags;
343 sc->sc_edi = tf->tf_rdi;
344 sc->sc_esi = tf->tf_rsi;
345 sc->sc_esp = tf->tf_rsp;
346 sc->sc_ebp = tf->tf_rbp;
347 sc->sc_ebx = tf->tf_rbx;
348 sc->sc_edx = tf->tf_rdx;
349 sc->sc_ecx = tf->tf_rcx;
350 sc->sc_eax = tf->tf_rax;
351 sc->sc_eip = tf->tf_rip;
352 sc->sc_cs = tf->tf_cs;
353 sc->sc_esp_at_signal = tf->tf_rsp;
354 sc->sc_ss = tf->tf_ss;
355 sc->sc_err = tf->tf_err;
356 sc->sc_trapno = tf->tf_trapno;
357 sc->sc_cr2 = pcb->pcb_cr2;
358 NETBSD32PTR32(sc->sc_387, NULL);
359
360 /* Save signal stack. */
361 /* Linux doesn't save the onstack flag in sigframe */
362
363 /* Save signal mask. */
364 native_to_linux32_old_sigset(&sc->sc_mask, mask);
365}
366
367int
368linux32_sys_sigreturn(struct lwp *l,
369 const struct linux32_sys_sigreturn_args *uap, register_t *retval)
370{
371 /* {
372 syscallarg(linux32_sigcontextp_t) scp;
373 } */
374 struct linux32_sigcontext ctx;
375 int error;
376
377 if ((error = copyin(SCARG_P32(uap, scp), &ctx, sizeof(ctx))) != 0)
378 return error;
379
380 return linux32_restore_sigcontext(l, &ctx, retval);
381}
382
383int
384linux32_sys_rt_sigreturn(struct lwp *l,
385 const struct linux32_sys_rt_sigreturn_args *uap, register_t *retval)
386{
387 /* {
388 syscallarg(linux32_ucontextp_t) ucp;
389 } */
390 struct linux32_ucontext ctx;
391 int error;
392
393 if ((error = copyin(SCARG_P32(uap, ucp), &ctx, sizeof(ctx))) != 0)
394 return error;
395
396 return linux32_restore_sigcontext(l, &ctx.uc_mcontext, retval);
397}
398
399static int
400linux32_restore_sigcontext(struct lwp *l, struct linux32_sigcontext *scp,
401 register_t *retval)
402{
403 struct trapframe *tf;
404 struct proc *p = l->l_proc;
405 struct sigaltstack *sas = &l->l_sigstk;
406 struct pcb *pcb;
407 sigset_t mask;
408 ssize_t ss_gap;
409 register_t fssel, gssel;
410
411 /* Restore register context. */
412 tf = l->l_md.md_regs;
413 pcb = lwp_getpcb(l);
414 DPRINTF(("sigreturn enter rsp=0x%lx rip=0x%lx\n", tf->tf_rsp,
415 tf->tf_rip));
416
417 /*
418 * Check for security violations.
419 */
420 if (((scp->sc_eflags ^ tf->tf_rflags) & PSL_USERSTATIC) != 0 ||
421 !USERMODE(scp->sc_cs, scp->sc_eflags))
422 return EINVAL;
423
424 if (scp->sc_fs != 0 && !VALID_USER_DSEL32(scp->sc_fs) &&
425 !(VALID_USER_FSEL32(scp->sc_fs) && pcb->pcb_fs != 0))
426 return EINVAL;
427
428 if (scp->sc_gs != 0 && !VALID_USER_DSEL32(scp->sc_gs) &&
429 !(VALID_USER_GSEL32(scp->sc_gs) && pcb->pcb_gs != 0))
430 return EINVAL;
431
432 if (scp->sc_es != 0 && !VALID_USER_DSEL32(scp->sc_es))
433 return EINVAL;
434
435 if (!VALID_USER_DSEL32(scp->sc_ds) ||
436 !VALID_USER_DSEL32(scp->sc_ss))
437 return EINVAL;
438
439 if (scp->sc_eip >= VM_MAXUSER_ADDRESS32)
440 return EINVAL;
441
442 gssel = (register_t)scp->sc_gs & 0xffff;
443 fssel = (register_t)scp->sc_fs & 0xffff;
444 cpu_fsgs_reload(l, fssel, gssel);
445 tf->tf_es = (register_t)scp->sc_es & 0xffff;
446 tf->tf_ds = (register_t)scp->sc_ds & 0xffff;
447 tf->tf_rflags &= ~PSL_USER;
448 tf->tf_rflags |= ((register_t)scp->sc_eflags & PSL_USER);
449 tf->tf_rdi = (register_t)scp->sc_edi & 0xffffffff;
450 tf->tf_rsi = (register_t)scp->sc_esi & 0xffffffff;
451 tf->tf_rbp = (register_t)scp->sc_ebp & 0xffffffff;
452 tf->tf_rbx = (register_t)scp->sc_ebx & 0xffffffff;
453 tf->tf_rdx = (register_t)scp->sc_edx & 0xffffffff;
454 tf->tf_rcx = (register_t)scp->sc_ecx & 0xffffffff;
455 tf->tf_rax = (register_t)scp->sc_eax & 0xffffffff;
456 tf->tf_rip = (register_t)scp->sc_eip & 0xffffffff;
457 tf->tf_cs = (register_t)scp->sc_cs & 0xffff;
458 tf->tf_rsp = (register_t)scp->sc_esp_at_signal & 0xffffffff;
459 tf->tf_ss = (register_t)scp->sc_ss & 0xffff;
460
461 mutex_enter(p->p_lock);
462
463 /* Restore signal stack. */
464 ss_gap = (ssize_t)
465 ((char *)NETBSD32IPTR64(scp->sc_esp_at_signal)
466 - (char *)sas->ss_sp);
467 if (ss_gap >= 0 && ss_gap < sas->ss_size)
468 sas->ss_flags |= SS_ONSTACK;
469 else
470 sas->ss_flags &= ~SS_ONSTACK;
471
472 /* Restore signal mask. */
473 linux32_old_to_native_sigset(&mask, &scp->sc_mask);
474 (void) sigprocmask1(l, SIG_SETMASK, &mask, 0);
475
476 mutex_exit(p->p_lock);
477
478 DPRINTF(("linux32_sigreturn: rip = 0x%lx, rsp = 0x%lx, flags = 0x%lx\n",
479 tf->tf_rip, tf->tf_rsp, tf->tf_rflags));
480 return EJUSTRETURN;
481}
482
483int
484linux32_sys_set_thread_area(struct lwp *l,
485 const struct linux32_sys_set_thread_area_args *uap, register_t *retval)
486{
487 /* {
488 syscallarg(linux32_user_descp_t) desc;
489 } */
490
491 return linux_lwp_setprivate(l, SCARG_P32(uap, desc));
492}
493
494int
495linux32_sys_get_thread_area(struct lwp *l,
496 const struct linux32_sys_get_thread_area_args *uap, register_t *retval)
497{
498 /* {
499 syscallarg(linux32_user_descp_t) desc;
500 } */
501
502 /* glibc doesn't actually call this. */
503 return ENOSYS;
504}
505
506int
507linux32_sys_modify_ldt(struct lwp *l, const struct linux32_sys_modify_ldt_args *uap, register_t *retval)
508{
509 /* {
510 syscallarg(int) func;
511 syscallarg(netbsd32_charp) ptr;
512 syscallarg(netbsd32_size_t) bytecount;
513 } */
514 struct linux_sys_modify_ldt_args ua;
515
516 NETBSD32TO64_UAP(func);
517 NETBSD32TOP_UAP(ptr, void *);
518 NETBSD32TOX_UAP(bytecount, size_t);
519 return linux_sys_modify_ldt(l, &ua, retval);
520}
521