2004-08-16 07:55:06 +00:00
|
|
|
/*-
|
2017-11-27 15:03:07 +00:00
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
2004-08-16 07:55:06 +00:00
|
|
|
* Copyright (c) 2004 Tim J. Robbins
|
|
|
|
* Copyright (c) 2003 Peter Wemm
|
|
|
|
* Copyright (c) 2002 Doug Rabson
|
|
|
|
* Copyright (c) 1998-1999 Andrew Gallatin
|
2012-01-15 13:23:18 +00:00
|
|
|
* Copyright (c) 1994-1996 Søren Schmidt
|
2004-08-16 07:55:06 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer
|
|
|
|
* in this position and unchanged.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2018-11-06 15:29:44 +00:00
|
|
|
#include "opt_compat.h"
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2010-03-11 14:49:06 +00:00
|
|
|
#ifndef COMPAT_FREEBSD32
|
|
|
|
#error "Unable to compile Linux-emulator due to missing COMPAT_FREEBSD32 option!"
|
2004-08-16 07:55:06 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#define __ELF_WORD_SIZE 32
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/exec.h>
|
Implement the linux syscalls
openat, mkdirat, mknodat, fchownat, futimesat, fstatat, unlinkat,
renameat, linkat, symlinkat, readlinkat, fchmodat, faccessat.
Submitted by: rdivacky
Sponsored by: Google Summer of Code 2007
Tested by: pho
2008-04-08 09:45:49 +00:00
|
|
|
#include <sys/fcntl.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <sys/imgact.h>
|
|
|
|
#include <sys/imgact_elf.h>
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/module.h>
|
|
|
|
#include <sys/mutex.h>
|
|
|
|
#include <sys/proc.h>
|
2004-11-27 06:51:39 +00:00
|
|
|
#include <sys/resourcevar.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <sys/signalvar.h>
|
|
|
|
#include <sys/syscallsubr.h>
|
2018-03-23 17:16:36 +00:00
|
|
|
#include <sys/sysctl.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <sys/sysent.h>
|
|
|
|
#include <sys/sysproto.h>
|
|
|
|
#include <sys/vnode.h>
|
2006-08-15 14:58:15 +00:00
|
|
|
#include <sys/eventhandler.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
#include <vm/vm.h>
|
|
|
|
#include <vm/pmap.h>
|
|
|
|
#include <vm/vm_extern.h>
|
|
|
|
#include <vm/vm_map.h>
|
|
|
|
#include <vm/vm_object.h>
|
|
|
|
#include <vm/vm_page.h>
|
|
|
|
#include <vm/vm_param.h>
|
|
|
|
|
|
|
|
#include <machine/cpu.h>
|
|
|
|
#include <machine/md_var.h>
|
2004-11-27 06:51:39 +00:00
|
|
|
#include <machine/pcb.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <machine/specialreg.h>
|
2018-03-27 20:57:51 +00:00
|
|
|
#include <machine/trap.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
#include <amd64/linux32/linux.h>
|
|
|
|
#include <amd64/linux32/linux32_proto.h>
|
2006-08-15 14:58:15 +00:00
|
|
|
#include <compat/linux/linux_emul.h>
|
2013-01-29 18:41:30 +00:00
|
|
|
#include <compat/linux/linux_ioctl.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <compat/linux/linux_mib.h>
|
2009-03-04 12:14:33 +00:00
|
|
|
#include <compat/linux/linux_misc.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
#include <compat/linux/linux_signal.h>
|
|
|
|
#include <compat/linux/linux_util.h>
|
2015-05-24 15:28:17 +00:00
|
|
|
#include <compat/linux/linux_vdso.h>
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
MODULE_VERSION(linux, 1);
|
|
|
|
|
2015-05-24 15:30:52 +00:00
|
|
|
const char *linux_kplatform;
|
2015-05-24 15:28:17 +00:00
|
|
|
static int linux_szsigcode;
|
|
|
|
static vm_object_t linux_shared_page_obj;
|
|
|
|
static char *linux_shared_page_mapping;
|
|
|
|
extern char _binary_linux32_locore_o_start;
|
|
|
|
extern char _binary_linux32_locore_o_end;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2015-10-22 21:28:20 +00:00
|
|
|
extern struct sysent linux32_sysent[LINUX32_SYS_MAXSYSCALL];
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
SET_DECLARE(linux_ioctl_handler_set, struct linux_ioctl_handler);
|
|
|
|
|
2019-12-03 23:17:54 +00:00
|
|
|
static int linux_fixup_elf(uintptr_t *stack_base,
|
2004-08-16 07:55:06 +00:00
|
|
|
struct image_params *iparams);
|
2019-11-18 20:07:43 +00:00
|
|
|
static int linux_copyout_strings(struct image_params *imgp,
|
2019-12-03 23:17:54 +00:00
|
|
|
uintptr_t *stack_base);
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
static void linux_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask);
|
2018-03-19 21:26:32 +00:00
|
|
|
static void linux_exec_setregs(struct thread *td,
|
2019-12-03 23:17:54 +00:00
|
|
|
struct image_params *imgp, uintptr_t stack);
|
2007-05-14 22:40:04 +00:00
|
|
|
static void linux32_fixlimit(struct rlimit *rl, int which);
|
2018-03-13 16:40:29 +00:00
|
|
|
static bool linux32_trans_osrel(const Elf_Note *note, int32_t *osrel);
|
2015-05-24 15:28:17 +00:00
|
|
|
static void linux_vdso_install(void *param);
|
|
|
|
static void linux_vdso_deinstall(void *param);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
#define LINUX_T_UNKNOWN 255
|
|
|
|
static int _bsd_to_linux_trapcode[] = {
|
|
|
|
LINUX_T_UNKNOWN, /* 0 */
|
|
|
|
6, /* 1 T_PRIVINFLT */
|
|
|
|
LINUX_T_UNKNOWN, /* 2 */
|
|
|
|
3, /* 3 T_BPTFLT */
|
|
|
|
LINUX_T_UNKNOWN, /* 4 */
|
|
|
|
LINUX_T_UNKNOWN, /* 5 */
|
|
|
|
16, /* 6 T_ARITHTRAP */
|
|
|
|
254, /* 7 T_ASTFLT */
|
|
|
|
LINUX_T_UNKNOWN, /* 8 */
|
|
|
|
13, /* 9 T_PROTFLT */
|
|
|
|
1, /* 10 T_TRCTRAP */
|
|
|
|
LINUX_T_UNKNOWN, /* 11 */
|
|
|
|
14, /* 12 T_PAGEFLT */
|
|
|
|
LINUX_T_UNKNOWN, /* 13 */
|
|
|
|
17, /* 14 T_ALIGNFLT */
|
|
|
|
LINUX_T_UNKNOWN, /* 15 */
|
|
|
|
LINUX_T_UNKNOWN, /* 16 */
|
|
|
|
LINUX_T_UNKNOWN, /* 17 */
|
|
|
|
0, /* 18 T_DIVIDE */
|
|
|
|
2, /* 19 T_NMI */
|
|
|
|
4, /* 20 T_OFLOW */
|
|
|
|
5, /* 21 T_BOUND */
|
|
|
|
7, /* 22 T_DNA */
|
|
|
|
8, /* 23 T_DOUBLEFLT */
|
|
|
|
9, /* 24 T_FPOPFLT */
|
|
|
|
10, /* 25 T_TSSFLT */
|
|
|
|
11, /* 26 T_SEGNPFLT */
|
|
|
|
12, /* 27 T_STKFLT */
|
|
|
|
18, /* 28 T_MCHK */
|
|
|
|
19, /* 29 T_XMMFLT */
|
|
|
|
15 /* 30 T_RESERVED */
|
|
|
|
};
|
|
|
|
#define bsd_to_linux_trapcode(code) \
|
2016-04-19 23:41:46 +00:00
|
|
|
((code)<nitems(_bsd_to_linux_trapcode)? \
|
2004-08-16 07:55:06 +00:00
|
|
|
_bsd_to_linux_trapcode[(code)]: \
|
|
|
|
LINUX_T_UNKNOWN)
|
|
|
|
|
|
|
|
struct linux32_ps_strings {
|
|
|
|
u_int32_t ps_argvstr; /* first of 0 or more argument strings */
|
2005-03-23 08:27:59 +00:00
|
|
|
u_int ps_nargvstr; /* the number of argument strings */
|
2004-08-16 07:55:06 +00:00
|
|
|
u_int32_t ps_envstr; /* first of 0 or more environment strings */
|
2005-03-23 08:27:59 +00:00
|
|
|
u_int ps_nenvstr; /* the number of environment strings */
|
2004-08-16 07:55:06 +00:00
|
|
|
};
|
|
|
|
|
2015-05-24 15:28:17 +00:00
|
|
|
LINUX_VDSO_SYM_INTPTR(linux32_sigcode);
|
|
|
|
LINUX_VDSO_SYM_INTPTR(linux32_rt_sigcode);
|
|
|
|
LINUX_VDSO_SYM_INTPTR(linux32_vsyscall);
|
2015-05-24 15:30:52 +00:00
|
|
|
LINUX_VDSO_SYM_CHAR(linux_platform);
|
2015-05-24 15:28:17 +00:00
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
/*
|
|
|
|
* If FreeBSD & Linux have a difference of opinion about what a trap
|
|
|
|
* means, deal with it here.
|
|
|
|
*
|
|
|
|
* MPSAFE
|
|
|
|
*/
|
|
|
|
static int
|
2018-03-19 21:26:32 +00:00
|
|
|
linux_translate_traps(int signal, int trap_code)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
if (signal != SIGBUS)
|
2018-03-23 17:28:04 +00:00
|
|
|
return (signal);
|
2004-08-16 07:55:06 +00:00
|
|
|
switch (trap_code) {
|
|
|
|
case T_PROTFLT:
|
|
|
|
case T_TSSFLT:
|
|
|
|
case T_DOUBLEFLT:
|
|
|
|
case T_PAGEFLT:
|
2018-03-23 17:28:04 +00:00
|
|
|
return (SIGSEGV);
|
2004-08-16 07:55:06 +00:00
|
|
|
default:
|
2018-03-23 17:28:04 +00:00
|
|
|
return (signal);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-18 20:07:43 +00:00
|
|
|
static int
|
2019-12-09 19:17:28 +00:00
|
|
|
linux_copyout_auxargs(struct image_params *imgp, uintptr_t base)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
Elf32_Auxargs *args;
|
2018-05-24 16:25:18 +00:00
|
|
|
Elf32_Auxinfo *argarray, *pos;
|
2019-11-18 20:07:43 +00:00
|
|
|
int error, issetugid;
|
2009-03-04 12:14:33 +00:00
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
args = (Elf32_Auxargs *)imgp->auxargs;
|
2018-05-24 16:25:18 +00:00
|
|
|
argarray = pos = malloc(LINUX_AT_COUNT * sizeof(*pos), M_TEMP,
|
|
|
|
M_WAITOK | M_ZERO);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2016-01-27 07:20:55 +00:00
|
|
|
issetugid = imgp->proc->p_flag & P_SUGID ? 1 : 0;
|
2018-05-24 16:25:18 +00:00
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_SYSINFO_EHDR,
|
2015-05-24 15:28:17 +00:00
|
|
|
imgp->proc->p_sysent->sv_shared_page_base);
|
2018-05-24 16:25:18 +00:00
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_SYSINFO, linux32_vsyscall);
|
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_HWCAP, cpu_feature);
|
2009-05-10 18:43:43 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Do not export AT_CLKTCK when emulating Linux kernel prior to 2.4.0,
|
|
|
|
* as it has appeared in the 2.4.0-rc7 first time.
|
|
|
|
* Being exported, AT_CLKTCK is returned by sysconf(_SC_CLK_TCK),
|
|
|
|
* glibc falls back to the hard-coded CLK_TCK value when aux entry
|
|
|
|
* is not present.
|
|
|
|
* Also see linux_times() implementation.
|
|
|
|
*/
|
|
|
|
if (linux_kernver(curthread) >= LINUX_KERNVER_2004000)
|
2018-05-24 16:25:18 +00:00
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_CLKTCK, stclohz);
|
|
|
|
AUXARGS_ENTRY(pos, AT_PHDR, args->phdr);
|
|
|
|
AUXARGS_ENTRY(pos, AT_PHENT, args->phent);
|
|
|
|
AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum);
|
|
|
|
AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz);
|
|
|
|
AUXARGS_ENTRY(pos, AT_FLAGS, args->flags);
|
|
|
|
AUXARGS_ENTRY(pos, AT_ENTRY, args->entry);
|
|
|
|
AUXARGS_ENTRY(pos, AT_BASE, args->base);
|
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_SECURE, issetugid);
|
|
|
|
AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_ucred->cr_ruid);
|
|
|
|
AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_ucred->cr_svuid);
|
|
|
|
AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_ucred->cr_rgid);
|
|
|
|
AUXARGS_ENTRY(pos, AT_EGID, imgp->proc->p_ucred->cr_svgid);
|
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_PLATFORM, PTROUT(linux_platform));
|
2015-05-24 16:24:24 +00:00
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_RANDOM, PTROUT(imgp->canary));
|
|
|
|
if (imgp->execpathp != 0)
|
|
|
|
AUXARGS_ENTRY(pos, LINUX_AT_EXECFN, PTROUT(imgp->execpathp));
|
2009-03-04 12:14:33 +00:00
|
|
|
if (args->execfd != -1)
|
2018-05-24 16:25:18 +00:00
|
|
|
AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd);
|
|
|
|
AUXARGS_ENTRY(pos, AT_NULL, 0);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
free(imgp->auxargs, M_TEMP);
|
|
|
|
imgp->auxargs = NULL;
|
2018-06-12 22:54:48 +00:00
|
|
|
KASSERT(pos - argarray <= LINUX_AT_COUNT, ("Too many auxargs"));
|
2018-05-24 16:25:18 +00:00
|
|
|
|
2019-12-09 19:17:28 +00:00
|
|
|
error = copyout(argarray, (void *)base,
|
|
|
|
sizeof(*argarray) * LINUX_AT_COUNT);
|
2018-05-24 16:25:18 +00:00
|
|
|
free(argarray, M_TEMP);
|
2019-11-18 20:07:43 +00:00
|
|
|
return (error);
|
2019-11-15 23:01:43 +00:00
|
|
|
}
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2019-11-15 23:01:43 +00:00
|
|
|
static int
|
2019-12-03 23:17:54 +00:00
|
|
|
linux_fixup_elf(uintptr_t *stack_base, struct image_params *imgp)
|
2019-11-15 23:01:43 +00:00
|
|
|
{
|
|
|
|
Elf32_Addr *base;
|
|
|
|
|
|
|
|
base = (Elf32_Addr *)*stack_base;
|
2004-08-16 07:55:06 +00:00
|
|
|
base--;
|
2018-05-24 16:25:18 +00:00
|
|
|
if (suword32(base, (uint32_t)imgp->args->argc) == -1)
|
|
|
|
return (EFAULT);
|
2019-12-03 23:17:54 +00:00
|
|
|
*stack_base = (uintptr_t)base;
|
2015-05-24 14:55:12 +00:00
|
|
|
return (0);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
linux_rt_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
struct thread *td = curthread;
|
|
|
|
struct proc *p = td->td_proc;
|
|
|
|
struct sigacts *psp;
|
|
|
|
struct trapframe *regs;
|
|
|
|
struct l_rt_sigframe *fp, frame;
|
|
|
|
int oonstack;
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
int sig;
|
|
|
|
int code;
|
2018-02-05 17:29:12 +00:00
|
|
|
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
sig = ksi->ksi_signo;
|
|
|
|
code = ksi->ksi_code;
|
2004-08-16 07:55:06 +00:00
|
|
|
PROC_LOCK_ASSERT(p, MA_OWNED);
|
|
|
|
psp = p->p_sigacts;
|
|
|
|
mtx_assert(&psp->ps_mtx, MA_OWNED);
|
|
|
|
regs = td->td_frame;
|
|
|
|
oonstack = sigonstack(regs->tf_rsp);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Allocate space for the signal handler context. */
|
2004-08-16 07:55:06 +00:00
|
|
|
if ((td->td_pflags & TDP_ALTSTACK) && !oonstack &&
|
|
|
|
SIGISMEMBER(psp->ps_sigonstack, sig)) {
|
2016-01-27 17:55:01 +00:00
|
|
|
fp = (struct l_rt_sigframe *)((uintptr_t)td->td_sigstk.ss_sp +
|
2004-08-16 07:55:06 +00:00
|
|
|
td->td_sigstk.ss_size - sizeof(struct l_rt_sigframe));
|
|
|
|
} else
|
|
|
|
fp = (struct l_rt_sigframe *)regs->tf_rsp - 1;
|
|
|
|
mtx_unlock(&psp->ps_mtx);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Build the argument list for the signal handler. */
|
2015-05-24 17:47:20 +00:00
|
|
|
sig = bsd_to_linux_signal(sig);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
bzero(&frame, sizeof(frame));
|
|
|
|
|
|
|
|
frame.sf_handler = PTROUT(catcher);
|
|
|
|
frame.sf_sig = sig;
|
|
|
|
frame.sf_siginfo = PTROUT(&fp->sf_si);
|
|
|
|
frame.sf_ucontext = PTROUT(&fp->sf_sc);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Fill in POSIX parts. */
|
2008-10-19 10:02:26 +00:00
|
|
|
ksiginfo_to_lsiginfo(ksi, &frame.sf_si, sig);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
/*
|
2018-03-13 00:40:05 +00:00
|
|
|
* Build the signal context to be used by sigreturn and libgcc unwind.
|
2004-08-16 07:55:06 +00:00
|
|
|
*/
|
|
|
|
frame.sf_sc.uc_flags = 0; /* XXX ??? */
|
|
|
|
frame.sf_sc.uc_link = 0; /* XXX ??? */
|
|
|
|
|
|
|
|
frame.sf_sc.uc_stack.ss_sp = PTROUT(td->td_sigstk.ss_sp);
|
|
|
|
frame.sf_sc.uc_stack.ss_size = td->td_sigstk.ss_size;
|
|
|
|
frame.sf_sc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
|
|
|
|
? ((oonstack) ? LINUX_SS_ONSTACK : 0) : LINUX_SS_DISABLE;
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
|
|
|
|
bsd_to_linux_sigset(mask, &frame.sf_sc.uc_sigmask);
|
|
|
|
|
2015-05-24 17:47:20 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_mask = frame.sf_sc.uc_sigmask.__mask;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_edi = regs->tf_rdi;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_esi = regs->tf_rsi;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_ebp = regs->tf_rbp;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_ebx = regs->tf_rbx;
|
2015-05-24 15:28:17 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_esp = regs->tf_rsp;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_edx = regs->tf_rdx;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_ecx = regs->tf_rcx;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_eax = regs->tf_rax;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_eip = regs->tf_rip;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_cs = regs->tf_cs;
|
2009-04-01 13:09:26 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_gs = regs->tf_gs;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_fs = regs->tf_fs;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_es = regs->tf_es;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_ds = regs->tf_ds;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_eflags = regs->tf_rflags;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_esp_at_signal = regs->tf_rsp;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_ss = regs->tf_ss;
|
|
|
|
frame.sf_sc.uc_mcontext.sc_err = regs->tf_err;
|
2007-09-20 13:46:26 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_cr2 = (u_int32_t)(uintptr_t)ksi->ksi_addr;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.uc_mcontext.sc_trapno = bsd_to_linux_trapcode(code);
|
|
|
|
|
|
|
|
if (copyout(&frame, fp, sizeof(frame)) != 0) {
|
|
|
|
/*
|
|
|
|
* Process has trashed its stack; give it an illegal
|
|
|
|
* instruction to halt it in its tracks.
|
|
|
|
*/
|
|
|
|
PROC_LOCK(p);
|
|
|
|
sigexit(td, SIGILL);
|
|
|
|
}
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Build context to run handler in. */
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_rsp = PTROUT(fp);
|
2015-05-24 15:28:17 +00:00
|
|
|
regs->tf_rip = linux32_rt_sigcode;
|
2008-03-13 10:54:38 +00:00
|
|
|
regs->tf_rflags &= ~(PSL_T | PSL_D);
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_cs = _ucode32sel;
|
|
|
|
regs->tf_ss = _udatasel;
|
2009-04-01 13:09:26 +00:00
|
|
|
regs->tf_ds = _udatasel;
|
|
|
|
regs->tf_es = _udatasel;
|
|
|
|
regs->tf_fs = _ufssel;
|
|
|
|
regs->tf_gs = _ugssel;
|
|
|
|
regs->tf_flags = TF_HASSEGS;
|
2010-12-22 00:18:42 +00:00
|
|
|
set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
|
2004-08-16 07:55:06 +00:00
|
|
|
PROC_LOCK(p);
|
|
|
|
mtx_lock(&psp->ps_mtx);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Send an interrupt to process.
|
|
|
|
*
|
|
|
|
* Stack is set up to allow sigcode stored
|
|
|
|
* in u. to call routine, followed by kcall
|
|
|
|
* to sigreturn routine below. After sigreturn
|
|
|
|
* resets the signal mask, the stack, and the
|
|
|
|
* frame pointer, it returns to the user
|
|
|
|
* specified pc, psl.
|
|
|
|
*/
|
|
|
|
static void
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
linux_sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
struct thread *td = curthread;
|
|
|
|
struct proc *p = td->td_proc;
|
|
|
|
struct sigacts *psp;
|
|
|
|
struct trapframe *regs;
|
|
|
|
struct l_sigframe *fp, frame;
|
|
|
|
l_sigset_t lmask;
|
2015-05-24 17:47:20 +00:00
|
|
|
int oonstack;
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
int sig, code;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
sig = ksi->ksi_signo;
|
|
|
|
code = ksi->ksi_code;
|
2004-08-16 07:55:06 +00:00
|
|
|
PROC_LOCK_ASSERT(p, MA_OWNED);
|
|
|
|
psp = p->p_sigacts;
|
|
|
|
mtx_assert(&psp->ps_mtx, MA_OWNED);
|
|
|
|
if (SIGISMEMBER(psp->ps_siginfo, sig)) {
|
|
|
|
/* Signal handler installed with SA_SIGINFO. */
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
linux_rt_sendsig(catcher, ksi, mask);
|
2004-08-16 07:55:06 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
regs = td->td_frame;
|
|
|
|
oonstack = sigonstack(regs->tf_rsp);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Allocate space for the signal handler context. */
|
2004-08-16 07:55:06 +00:00
|
|
|
if ((td->td_pflags & TDP_ALTSTACK) && !oonstack &&
|
|
|
|
SIGISMEMBER(psp->ps_sigonstack, sig)) {
|
2016-01-27 17:55:01 +00:00
|
|
|
fp = (struct l_sigframe *)((uintptr_t)td->td_sigstk.ss_sp +
|
2004-08-16 07:55:06 +00:00
|
|
|
td->td_sigstk.ss_size - sizeof(struct l_sigframe));
|
|
|
|
} else
|
|
|
|
fp = (struct l_sigframe *)regs->tf_rsp - 1;
|
|
|
|
mtx_unlock(&psp->ps_mtx);
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Build the argument list for the signal handler. */
|
2015-05-24 17:47:20 +00:00
|
|
|
sig = bsd_to_linux_signal(sig);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
bzero(&frame, sizeof(frame));
|
|
|
|
|
|
|
|
frame.sf_handler = PTROUT(catcher);
|
|
|
|
frame.sf_sig = sig;
|
|
|
|
|
|
|
|
bsd_to_linux_sigset(mask, &lmask);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Build the signal context to be used by sigreturn. */
|
2015-05-24 17:47:20 +00:00
|
|
|
frame.sf_sc.sc_mask = lmask.__mask;
|
2009-04-01 13:09:26 +00:00
|
|
|
frame.sf_sc.sc_gs = regs->tf_gs;
|
|
|
|
frame.sf_sc.sc_fs = regs->tf_fs;
|
|
|
|
frame.sf_sc.sc_es = regs->tf_es;
|
|
|
|
frame.sf_sc.sc_ds = regs->tf_ds;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.sc_edi = regs->tf_rdi;
|
|
|
|
frame.sf_sc.sc_esi = regs->tf_rsi;
|
|
|
|
frame.sf_sc.sc_ebp = regs->tf_rbp;
|
|
|
|
frame.sf_sc.sc_ebx = regs->tf_rbx;
|
2015-05-24 15:28:17 +00:00
|
|
|
frame.sf_sc.sc_esp = regs->tf_rsp;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.sc_edx = regs->tf_rdx;
|
|
|
|
frame.sf_sc.sc_ecx = regs->tf_rcx;
|
|
|
|
frame.sf_sc.sc_eax = regs->tf_rax;
|
|
|
|
frame.sf_sc.sc_eip = regs->tf_rip;
|
|
|
|
frame.sf_sc.sc_cs = regs->tf_cs;
|
|
|
|
frame.sf_sc.sc_eflags = regs->tf_rflags;
|
|
|
|
frame.sf_sc.sc_esp_at_signal = regs->tf_rsp;
|
|
|
|
frame.sf_sc.sc_ss = regs->tf_ss;
|
|
|
|
frame.sf_sc.sc_err = regs->tf_err;
|
2007-09-20 13:46:26 +00:00
|
|
|
frame.sf_sc.sc_cr2 = (u_int32_t)(uintptr_t)ksi->ksi_addr;
|
2004-08-16 07:55:06 +00:00
|
|
|
frame.sf_sc.sc_trapno = bsd_to_linux_trapcode(code);
|
|
|
|
|
2015-05-24 17:47:20 +00:00
|
|
|
frame.sf_extramask[0] = lmask.__mask;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
if (copyout(&frame, fp, sizeof(frame)) != 0) {
|
|
|
|
/*
|
|
|
|
* Process has trashed its stack; give it an illegal
|
|
|
|
* instruction to halt it in its tracks.
|
|
|
|
*/
|
|
|
|
PROC_LOCK(p);
|
|
|
|
sigexit(td, SIGILL);
|
|
|
|
}
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Build context to run handler in. */
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_rsp = PTROUT(fp);
|
2015-05-24 15:28:17 +00:00
|
|
|
regs->tf_rip = linux32_sigcode;
|
2008-03-13 10:54:38 +00:00
|
|
|
regs->tf_rflags &= ~(PSL_T | PSL_D);
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_cs = _ucode32sel;
|
|
|
|
regs->tf_ss = _udatasel;
|
2009-04-01 13:09:26 +00:00
|
|
|
regs->tf_ds = _udatasel;
|
|
|
|
regs->tf_es = _udatasel;
|
|
|
|
regs->tf_fs = _ufssel;
|
|
|
|
regs->tf_gs = _ugssel;
|
|
|
|
regs->tf_flags = TF_HASSEGS;
|
2010-12-22 00:18:42 +00:00
|
|
|
set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
|
2004-08-16 07:55:06 +00:00
|
|
|
PROC_LOCK(p);
|
|
|
|
mtx_lock(&psp->ps_mtx);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* System call to cleanup state after a signal
|
|
|
|
* has been taken. Reset signal mask and
|
|
|
|
* stack state from context left by sendsig (above).
|
|
|
|
* Return to previous pc and psl as specified by
|
|
|
|
* context left by sendsig. Check carefully to
|
|
|
|
* make sure that the user has not modified the
|
|
|
|
* psl to gain improper privileges or to cause
|
|
|
|
* a machine fault.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
linux_sigreturn(struct thread *td, struct linux_sigreturn_args *args)
|
|
|
|
{
|
|
|
|
struct l_sigframe frame;
|
|
|
|
struct trapframe *regs;
|
2009-10-27 10:47:58 +00:00
|
|
|
sigset_t bmask;
|
2004-08-16 07:55:06 +00:00
|
|
|
l_sigset_t lmask;
|
2015-05-24 17:47:20 +00:00
|
|
|
int eflags;
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
ksiginfo_t ksi;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
regs = td->td_frame;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The trampoline code hands us the sigframe.
|
|
|
|
* It is unsafe to keep track of it ourselves, in the event that a
|
|
|
|
* program jumps out of a signal handler.
|
|
|
|
*/
|
|
|
|
if (copyin(args->sfp, &frame, sizeof(frame)) != 0)
|
|
|
|
return (EFAULT);
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Check for security violations. */
|
2004-08-16 07:55:06 +00:00
|
|
|
#define EFLAGS_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
|
|
|
|
eflags = frame.sf_sc.sc_eflags;
|
2013-11-14 15:37:20 +00:00
|
|
|
if (!EFLAGS_SECURE(eflags, regs->tf_rflags))
|
2004-08-16 07:55:06 +00:00
|
|
|
return(EINVAL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't allow users to load a valid privileged %cs. Let the
|
|
|
|
* hardware check for invalid selectors, excess privilege in
|
|
|
|
* other selectors, invalid %eip's and invalid %esp's.
|
|
|
|
*/
|
|
|
|
#define CS_SECURE(cs) (ISPL(cs) == SEL_UPL)
|
|
|
|
if (!CS_SECURE(frame.sf_sc.sc_cs)) {
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
ksiginfo_init_trap(&ksi);
|
|
|
|
ksi.ksi_signo = SIGBUS;
|
|
|
|
ksi.ksi_code = BUS_OBJERR;
|
|
|
|
ksi.ksi_trapno = T_PROTFLT;
|
|
|
|
ksi.ksi_addr = (void *)regs->tf_rip;
|
|
|
|
trapsignal(td, &ksi);
|
2004-08-16 07:55:06 +00:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
2015-05-24 17:47:20 +00:00
|
|
|
lmask.__mask = frame.sf_sc.sc_mask;
|
|
|
|
lmask.__mask = frame.sf_extramask[0];
|
2009-10-27 10:47:58 +00:00
|
|
|
linux_to_bsd_sigset(&lmask, &bmask);
|
|
|
|
kern_sigprocmask(td, SIG_SETMASK, &bmask, NULL, 0);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Restore signal context. */
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_rdi = frame.sf_sc.sc_edi;
|
|
|
|
regs->tf_rsi = frame.sf_sc.sc_esi;
|
|
|
|
regs->tf_rbp = frame.sf_sc.sc_ebp;
|
|
|
|
regs->tf_rbx = frame.sf_sc.sc_ebx;
|
|
|
|
regs->tf_rdx = frame.sf_sc.sc_edx;
|
|
|
|
regs->tf_rcx = frame.sf_sc.sc_ecx;
|
|
|
|
regs->tf_rax = frame.sf_sc.sc_eax;
|
|
|
|
regs->tf_rip = frame.sf_sc.sc_eip;
|
|
|
|
regs->tf_cs = frame.sf_sc.sc_cs;
|
2009-04-01 13:09:26 +00:00
|
|
|
regs->tf_ds = frame.sf_sc.sc_ds;
|
|
|
|
regs->tf_es = frame.sf_sc.sc_es;
|
|
|
|
regs->tf_fs = frame.sf_sc.sc_fs;
|
|
|
|
regs->tf_gs = frame.sf_sc.sc_gs;
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_rflags = eflags;
|
|
|
|
regs->tf_rsp = frame.sf_sc.sc_esp_at_signal;
|
|
|
|
regs->tf_ss = frame.sf_sc.sc_ss;
|
2010-12-22 00:18:42 +00:00
|
|
|
set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
return (EJUSTRETURN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* System call to cleanup state after a signal
|
|
|
|
* has been taken. Reset signal mask and
|
|
|
|
* stack state from context left by rt_sendsig (above).
|
|
|
|
* Return to previous pc and psl as specified by
|
|
|
|
* context left by sendsig. Check carefully to
|
|
|
|
* make sure that the user has not modified the
|
|
|
|
* psl to gain improper privileges or to cause
|
|
|
|
* a machine fault.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
linux_rt_sigreturn(struct thread *td, struct linux_rt_sigreturn_args *args)
|
|
|
|
{
|
|
|
|
struct l_ucontext uc;
|
|
|
|
struct l_sigcontext *context;
|
2009-10-27 10:47:58 +00:00
|
|
|
sigset_t bmask;
|
2004-08-16 07:55:06 +00:00
|
|
|
l_stack_t *lss;
|
|
|
|
stack_t ss;
|
|
|
|
struct trapframe *regs;
|
|
|
|
int eflags;
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
ksiginfo_t ksi;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
regs = td->td_frame;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The trampoline code hands us the ucontext.
|
|
|
|
* It is unsafe to keep track of it ourselves, in the event that a
|
|
|
|
* program jumps out of a signal handler.
|
|
|
|
*/
|
|
|
|
if (copyin(args->ucp, &uc, sizeof(uc)) != 0)
|
|
|
|
return (EFAULT);
|
|
|
|
|
|
|
|
context = &uc.uc_mcontext;
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Check for security violations. */
|
2004-08-16 07:55:06 +00:00
|
|
|
#define EFLAGS_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
|
|
|
|
eflags = context->sc_eflags;
|
2013-11-14 15:37:20 +00:00
|
|
|
if (!EFLAGS_SECURE(eflags, regs->tf_rflags))
|
2004-08-16 07:55:06 +00:00
|
|
|
return(EINVAL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't allow users to load a valid privileged %cs. Let the
|
|
|
|
* hardware check for invalid selectors, excess privilege in
|
|
|
|
* other selectors, invalid %eip's and invalid %esp's.
|
|
|
|
*/
|
|
|
|
#define CS_SECURE(cs) (ISPL(cs) == SEL_UPL)
|
|
|
|
if (!CS_SECURE(context->sc_cs)) {
|
1. Change prototype of trapsignal and sendsig to use ksiginfo_t *, most
changes in MD code are trivial, before this change, trapsignal and
sendsig use discrete parameters, now they uses member fields of
ksiginfo_t structure. For sendsig, this change allows us to pass
POSIX realtime signal value to user code.
2. Remove cpu_thread_siginfo, it is no longer needed because we now always
generate ksiginfo_t data and feed it to libpthread.
3. Add p_sigqueue to proc structure to hold shared signals which were
blocked by all threads in the proc.
4. Add td_sigqueue to thread structure to hold all signals delivered to
thread.
5. i386 and amd64 now return POSIX standard si_code, other arches will
be fixed.
6. In this sigqueue implementation, pending signal set is kept as before,
an extra siginfo list holds additional siginfo_t data for signals.
kernel code uses psignal() still behavior as before, it won't be failed
even under memory pressure, only exception is when deleting a signal,
we should call sigqueue_delete to remove signal from sigqueue but
not SIGDELSET. Current there is no kernel code will deliver a signal
with additional data, so kernel should be as stable as before,
a ksiginfo can carry more information, for example, allow signal to
be delivered but throw away siginfo data if memory is not enough.
SIGKILL and SIGSTOP have fast path in sigqueue_add, because they can
not be caught or masked.
The sigqueue() syscall allows user code to queue a signal to target
process, if resource is unavailable, EAGAIN will be returned as
specification said.
Just before thread exits, signal queue memory will be freed by
sigqueue_flush.
Current, all signals are allowed to be queued, not only realtime signals.
Earlier patch reviewed by: jhb, deischen
Tested on: i386, amd64
2005-10-14 12:43:47 +00:00
|
|
|
ksiginfo_init_trap(&ksi);
|
|
|
|
ksi.ksi_signo = SIGBUS;
|
|
|
|
ksi.ksi_code = BUS_OBJERR;
|
|
|
|
ksi.ksi_trapno = T_PROTFLT;
|
|
|
|
ksi.ksi_addr = (void *)regs->tf_rip;
|
|
|
|
trapsignal(td, &ksi);
|
2004-08-16 07:55:06 +00:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
2009-10-27 10:47:58 +00:00
|
|
|
linux_to_bsd_sigset(&uc.uc_sigmask, &bmask);
|
|
|
|
kern_sigprocmask(td, SIG_SETMASK, &bmask, NULL, 0);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Restore signal context
|
|
|
|
*/
|
2009-04-01 13:09:26 +00:00
|
|
|
regs->tf_gs = context->sc_gs;
|
|
|
|
regs->tf_fs = context->sc_fs;
|
|
|
|
regs->tf_es = context->sc_es;
|
|
|
|
regs->tf_ds = context->sc_ds;
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_rdi = context->sc_edi;
|
|
|
|
regs->tf_rsi = context->sc_esi;
|
|
|
|
regs->tf_rbp = context->sc_ebp;
|
|
|
|
regs->tf_rbx = context->sc_ebx;
|
|
|
|
regs->tf_rdx = context->sc_edx;
|
|
|
|
regs->tf_rcx = context->sc_ecx;
|
|
|
|
regs->tf_rax = context->sc_eax;
|
|
|
|
regs->tf_rip = context->sc_eip;
|
|
|
|
regs->tf_cs = context->sc_cs;
|
|
|
|
regs->tf_rflags = eflags;
|
|
|
|
regs->tf_rsp = context->sc_esp_at_signal;
|
|
|
|
regs->tf_ss = context->sc_ss;
|
2010-12-22 00:18:42 +00:00
|
|
|
set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* call sigaltstack & ignore results..
|
|
|
|
*/
|
|
|
|
lss = &uc.uc_stack;
|
|
|
|
ss.ss_sp = PTRIN(lss->ss_sp);
|
|
|
|
ss.ss_size = lss->ss_size;
|
|
|
|
ss.ss_flags = linux_to_bsd_sigaltstack(lss->ss_flags);
|
|
|
|
|
|
|
|
(void)kern_sigaltstack(td, &ss, NULL);
|
|
|
|
|
|
|
|
return (EJUSTRETURN);
|
|
|
|
}
|
|
|
|
|
Reorganize syscall entry and leave handling.
Extend struct sysvec with three new elements:
sv_fetch_syscall_args - the method to fetch syscall arguments from
usermode into struct syscall_args. The structure is machine-depended
(this might be reconsidered after all architectures are converted).
sv_set_syscall_retval - the method to set a return value for usermode
from the syscall. It is a generalization of
cpu_set_syscall_retval(9) to allow ABIs to override the way to set a
return value.
sv_syscallnames - the table of syscall names.
Use sv_set_syscall_retval in kern_sigsuspend() instead of hardcoding
the call to cpu_set_syscall_retval().
The new functions syscallenter(9) and syscallret(9) are provided that
use sv_*syscall* pointers and contain the common repeated code from
the syscall() implementations for the architecture-specific syscall
trap handlers.
Syscallenter() fetches arguments, calls syscall implementation from
ABI sysent table, and set up return frame. The end of syscall
bookkeeping is done by syscallret().
Take advantage of single place for MI syscall handling code and
implement ptrace_lwpinfo pl_flags PL_FLAG_SCE, PL_FLAG_SCX and
PL_FLAG_EXEC. The SCE and SCX flags notify the debugger that the
thread is stopped at syscall entry or return point respectively. The
EXEC flag augments SCX and notifies debugger that the process address
space was changed by one of exec(2)-family syscalls.
The i386, amd64, sparc64, sun4v, powerpc and ia64 syscall()s are
changed to use syscallenter()/syscallret(). MIPS and arm are not
converted and use the mostly unchanged syscall() implementation.
Reviewed by: jhb, marcel, marius, nwhitehorn, stas
Tested by: marcel (ia64), marius (sparc64), nwhitehorn (powerpc),
stas (mips)
MFC after: 1 month
2010-05-23 18:32:02 +00:00
|
|
|
static int
|
2017-06-12 21:03:23 +00:00
|
|
|
linux32_fetch_syscall_args(struct thread *td)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
Reorganize syscall entry and leave handling.
Extend struct sysvec with three new elements:
sv_fetch_syscall_args - the method to fetch syscall arguments from
usermode into struct syscall_args. The structure is machine-depended
(this might be reconsidered after all architectures are converted).
sv_set_syscall_retval - the method to set a return value for usermode
from the syscall. It is a generalization of
cpu_set_syscall_retval(9) to allow ABIs to override the way to set a
return value.
sv_syscallnames - the table of syscall names.
Use sv_set_syscall_retval in kern_sigsuspend() instead of hardcoding
the call to cpu_set_syscall_retval().
The new functions syscallenter(9) and syscallret(9) are provided that
use sv_*syscall* pointers and contain the common repeated code from
the syscall() implementations for the architecture-specific syscall
trap handlers.
Syscallenter() fetches arguments, calls syscall implementation from
ABI sysent table, and set up return frame. The end of syscall
bookkeeping is done by syscallret().
Take advantage of single place for MI syscall handling code and
implement ptrace_lwpinfo pl_flags PL_FLAG_SCE, PL_FLAG_SCX and
PL_FLAG_EXEC. The SCE and SCX flags notify the debugger that the
thread is stopped at syscall entry or return point respectively. The
EXEC flag augments SCX and notifies debugger that the process address
space was changed by one of exec(2)-family syscalls.
The i386, amd64, sparc64, sun4v, powerpc and ia64 syscall()s are
changed to use syscallenter()/syscallret(). MIPS and arm are not
converted and use the mostly unchanged syscall() implementation.
Reviewed by: jhb, marcel, marius, nwhitehorn, stas
Tested by: marcel (ia64), marius (sparc64), nwhitehorn (powerpc),
stas (mips)
MFC after: 1 month
2010-05-23 18:32:02 +00:00
|
|
|
struct proc *p;
|
|
|
|
struct trapframe *frame;
|
2017-06-12 21:03:23 +00:00
|
|
|
struct syscall_args *sa;
|
Reorganize syscall entry and leave handling.
Extend struct sysvec with three new elements:
sv_fetch_syscall_args - the method to fetch syscall arguments from
usermode into struct syscall_args. The structure is machine-depended
(this might be reconsidered after all architectures are converted).
sv_set_syscall_retval - the method to set a return value for usermode
from the syscall. It is a generalization of
cpu_set_syscall_retval(9) to allow ABIs to override the way to set a
return value.
sv_syscallnames - the table of syscall names.
Use sv_set_syscall_retval in kern_sigsuspend() instead of hardcoding
the call to cpu_set_syscall_retval().
The new functions syscallenter(9) and syscallret(9) are provided that
use sv_*syscall* pointers and contain the common repeated code from
the syscall() implementations for the architecture-specific syscall
trap handlers.
Syscallenter() fetches arguments, calls syscall implementation from
ABI sysent table, and set up return frame. The end of syscall
bookkeeping is done by syscallret().
Take advantage of single place for MI syscall handling code and
implement ptrace_lwpinfo pl_flags PL_FLAG_SCE, PL_FLAG_SCX and
PL_FLAG_EXEC. The SCE and SCX flags notify the debugger that the
thread is stopped at syscall entry or return point respectively. The
EXEC flag augments SCX and notifies debugger that the process address
space was changed by one of exec(2)-family syscalls.
The i386, amd64, sparc64, sun4v, powerpc and ia64 syscall()s are
changed to use syscallenter()/syscallret(). MIPS and arm are not
converted and use the mostly unchanged syscall() implementation.
Reviewed by: jhb, marcel, marius, nwhitehorn, stas
Tested by: marcel (ia64), marius (sparc64), nwhitehorn (powerpc),
stas (mips)
MFC after: 1 month
2010-05-23 18:32:02 +00:00
|
|
|
|
|
|
|
p = td->td_proc;
|
|
|
|
frame = td->td_frame;
|
2017-06-12 21:03:23 +00:00
|
|
|
sa = &td->td_sa;
|
Reorganize syscall entry and leave handling.
Extend struct sysvec with three new elements:
sv_fetch_syscall_args - the method to fetch syscall arguments from
usermode into struct syscall_args. The structure is machine-depended
(this might be reconsidered after all architectures are converted).
sv_set_syscall_retval - the method to set a return value for usermode
from the syscall. It is a generalization of
cpu_set_syscall_retval(9) to allow ABIs to override the way to set a
return value.
sv_syscallnames - the table of syscall names.
Use sv_set_syscall_retval in kern_sigsuspend() instead of hardcoding
the call to cpu_set_syscall_retval().
The new functions syscallenter(9) and syscallret(9) are provided that
use sv_*syscall* pointers and contain the common repeated code from
the syscall() implementations for the architecture-specific syscall
trap handlers.
Syscallenter() fetches arguments, calls syscall implementation from
ABI sysent table, and set up return frame. The end of syscall
bookkeeping is done by syscallret().
Take advantage of single place for MI syscall handling code and
implement ptrace_lwpinfo pl_flags PL_FLAG_SCE, PL_FLAG_SCX and
PL_FLAG_EXEC. The SCE and SCX flags notify the debugger that the
thread is stopped at syscall entry or return point respectively. The
EXEC flag augments SCX and notifies debugger that the process address
space was changed by one of exec(2)-family syscalls.
The i386, amd64, sparc64, sun4v, powerpc and ia64 syscall()s are
changed to use syscallenter()/syscallret(). MIPS and arm are not
converted and use the mostly unchanged syscall() implementation.
Reviewed by: jhb, marcel, marius, nwhitehorn, stas
Tested by: marcel (ia64), marius (sparc64), nwhitehorn (powerpc),
stas (mips)
MFC after: 1 month
2010-05-23 18:32:02 +00:00
|
|
|
|
|
|
|
sa->args[0] = frame->tf_rbx;
|
|
|
|
sa->args[1] = frame->tf_rcx;
|
|
|
|
sa->args[2] = frame->tf_rdx;
|
|
|
|
sa->args[3] = frame->tf_rsi;
|
|
|
|
sa->args[4] = frame->tf_rdi;
|
|
|
|
sa->args[5] = frame->tf_rbp; /* Unconfirmed */
|
|
|
|
sa->code = frame->tf_rax;
|
|
|
|
|
|
|
|
if (sa->code >= p->p_sysent->sv_size)
|
2015-05-24 17:38:02 +00:00
|
|
|
/* nosys */
|
2015-10-22 21:23:58 +00:00
|
|
|
sa->callp = &p->p_sysent->sv_table[p->p_sysent->sv_size - 1];
|
Reorganize syscall entry and leave handling.
Extend struct sysvec with three new elements:
sv_fetch_syscall_args - the method to fetch syscall arguments from
usermode into struct syscall_args. The structure is machine-depended
(this might be reconsidered after all architectures are converted).
sv_set_syscall_retval - the method to set a return value for usermode
from the syscall. It is a generalization of
cpu_set_syscall_retval(9) to allow ABIs to override the way to set a
return value.
sv_syscallnames - the table of syscall names.
Use sv_set_syscall_retval in kern_sigsuspend() instead of hardcoding
the call to cpu_set_syscall_retval().
The new functions syscallenter(9) and syscallret(9) are provided that
use sv_*syscall* pointers and contain the common repeated code from
the syscall() implementations for the architecture-specific syscall
trap handlers.
Syscallenter() fetches arguments, calls syscall implementation from
ABI sysent table, and set up return frame. The end of syscall
bookkeeping is done by syscallret().
Take advantage of single place for MI syscall handling code and
implement ptrace_lwpinfo pl_flags PL_FLAG_SCE, PL_FLAG_SCX and
PL_FLAG_EXEC. The SCE and SCX flags notify the debugger that the
thread is stopped at syscall entry or return point respectively. The
EXEC flag augments SCX and notifies debugger that the process address
space was changed by one of exec(2)-family syscalls.
The i386, amd64, sparc64, sun4v, powerpc and ia64 syscall()s are
changed to use syscallenter()/syscallret(). MIPS and arm are not
converted and use the mostly unchanged syscall() implementation.
Reviewed by: jhb, marcel, marius, nwhitehorn, stas
Tested by: marcel (ia64), marius (sparc64), nwhitehorn (powerpc),
stas (mips)
MFC after: 1 month
2010-05-23 18:32:02 +00:00
|
|
|
else
|
|
|
|
sa->callp = &p->p_sysent->sv_table[sa->code];
|
|
|
|
sa->narg = sa->callp->sy_narg;
|
|
|
|
|
|
|
|
td->td_retval[0] = 0;
|
|
|
|
td->td_retval[1] = frame->tf_rdx;
|
|
|
|
|
|
|
|
return (0);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Clear registers on exec
|
|
|
|
* XXX copied from ia32_signal.c.
|
|
|
|
*/
|
|
|
|
static void
|
2019-12-03 23:17:54 +00:00
|
|
|
linux_exec_setregs(struct thread *td, struct image_params *imgp,
|
|
|
|
uintptr_t stack)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
struct trapframe *regs = td->td_frame;
|
|
|
|
struct pcb *pcb = td->td_pcb;
|
2018-04-12 20:43:39 +00:00
|
|
|
register_t saved_rflags;
|
|
|
|
|
|
|
|
regs = td->td_frame;
|
|
|
|
pcb = td->td_pcb;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2009-04-01 13:09:26 +00:00
|
|
|
if (td->td_proc->p_md.md_ldt != NULL)
|
|
|
|
user_ldt_free(td);
|
|
|
|
|
2007-03-30 00:06:21 +00:00
|
|
|
critical_enter();
|
2004-08-16 07:55:06 +00:00
|
|
|
wrmsr(MSR_FSBASE, 0);
|
|
|
|
wrmsr(MSR_KGSBASE, 0); /* User value while we're in the kernel */
|
|
|
|
pcb->pcb_fsbase = 0;
|
|
|
|
pcb->pcb_gsbase = 0;
|
2007-03-30 00:06:21 +00:00
|
|
|
critical_exit();
|
2009-03-05 19:42:11 +00:00
|
|
|
pcb->pcb_initial_fpucw = __LINUX_NPXCW__;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2018-04-12 20:43:39 +00:00
|
|
|
saved_rflags = regs->tf_rflags & PSL_T;
|
2004-08-16 07:55:06 +00:00
|
|
|
bzero((char *)regs, sizeof(struct trapframe));
|
2010-03-25 14:24:00 +00:00
|
|
|
regs->tf_rip = imgp->entry_addr;
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_rsp = stack;
|
2018-04-12 20:43:39 +00:00
|
|
|
regs->tf_rflags = PSL_USER | saved_rflags;
|
2009-04-01 13:09:26 +00:00
|
|
|
regs->tf_gs = _ugssel;
|
|
|
|
regs->tf_fs = _ufssel;
|
|
|
|
regs->tf_es = _udatasel;
|
|
|
|
regs->tf_ds = _udatasel;
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_ss = _udatasel;
|
2009-04-01 13:09:26 +00:00
|
|
|
regs->tf_flags = TF_HASSEGS;
|
2004-08-16 07:55:06 +00:00
|
|
|
regs->tf_cs = _ucode32sel;
|
2020-04-15 20:21:30 +00:00
|
|
|
regs->tf_rbx = (register_t)imgp->ps_strings;
|
2011-01-14 21:09:01 +00:00
|
|
|
|
2005-09-22 15:46:21 +00:00
|
|
|
fpstate_drop(td);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2010-12-07 12:44:33 +00:00
|
|
|
/* Do full restore on return so that we can change to a different %cs */
|
2010-12-22 00:18:42 +00:00
|
|
|
set_pcb_flags(pcb, PCB_32BIT | PCB_FULL_IRET);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX copied from ia32_sysvec.c.
|
|
|
|
*/
|
2019-11-18 20:07:43 +00:00
|
|
|
static int
|
2019-12-03 23:17:54 +00:00
|
|
|
linux_copyout_strings(struct image_params *imgp, uintptr_t *stack_base)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
2019-11-18 20:07:43 +00:00
|
|
|
int argc, envc, error;
|
2004-08-16 07:55:06 +00:00
|
|
|
u_int32_t *vectp;
|
2019-12-03 23:17:54 +00:00
|
|
|
char *stringp;
|
|
|
|
uintptr_t destp, ustringp;
|
2004-08-16 07:55:06 +00:00
|
|
|
struct linux32_ps_strings *arginfo;
|
2015-05-24 16:24:24 +00:00
|
|
|
char canary[LINUX_AT_RANDOM_LEN];
|
|
|
|
size_t execpath_len;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Calculate string base and vector table pointers. */
|
2015-05-24 16:24:24 +00:00
|
|
|
if (imgp->execpath != NULL && imgp->auxargs != NULL)
|
|
|
|
execpath_len = strlen(imgp->execpath) + 1;
|
|
|
|
else
|
|
|
|
execpath_len = 0;
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
arginfo = (struct linux32_ps_strings *)LINUX32_PS_STRINGS;
|
2019-12-03 23:17:54 +00:00
|
|
|
destp = (uintptr_t)arginfo;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2015-05-24 16:24:24 +00:00
|
|
|
if (execpath_len != 0) {
|
2019-12-03 23:17:54 +00:00
|
|
|
destp -= execpath_len;
|
2019-12-09 19:18:05 +00:00
|
|
|
destp = rounddown2(destp, sizeof(uint32_t));
|
2020-04-16 21:53:17 +00:00
|
|
|
imgp->execpathp = (void *)destp;
|
|
|
|
error = copyout(imgp->execpath, imgp->execpathp, execpath_len);
|
2019-11-18 20:07:43 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2015-05-24 16:24:24 +00:00
|
|
|
}
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Prepare the canary for SSP. */
|
2015-05-24 16:24:24 +00:00
|
|
|
arc4rand(canary, sizeof(canary), 0);
|
2019-12-09 19:18:05 +00:00
|
|
|
destp -= roundup(sizeof(canary), sizeof(uint32_t));
|
2020-04-16 21:53:17 +00:00
|
|
|
imgp->canary = (void *)destp;
|
|
|
|
error = copyout(canary, imgp->canary, sizeof(canary));
|
2019-11-18 20:07:43 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2015-05-24 16:24:24 +00:00
|
|
|
|
2019-12-03 23:17:54 +00:00
|
|
|
/* Allocate room for the argument and environment strings. */
|
|
|
|
destp -= ARG_MAX - imgp->args->stringspace;
|
2019-12-09 19:18:05 +00:00
|
|
|
destp = rounddown2(destp, sizeof(uint32_t));
|
2019-12-03 23:17:54 +00:00
|
|
|
ustringp = destp;
|
|
|
|
|
2019-11-18 20:07:43 +00:00
|
|
|
if (imgp->auxargs) {
|
2019-12-09 19:17:28 +00:00
|
|
|
/*
|
|
|
|
* Allocate room on the stack for the ELF auxargs
|
|
|
|
* array. It has LINUX_AT_COUNT entries.
|
|
|
|
*/
|
|
|
|
destp -= LINUX_AT_COUNT * sizeof(Elf32_Auxinfo);
|
2019-12-09 19:18:05 +00:00
|
|
|
destp = rounddown2(destp, sizeof(uint32_t));
|
2019-11-18 20:07:43 +00:00
|
|
|
}
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2019-12-03 23:17:54 +00:00
|
|
|
vectp = (uint32_t *)destp;
|
|
|
|
|
2018-04-19 16:00:34 +00:00
|
|
|
/*
|
|
|
|
* Allocate room for the argv[] and env vectors including the
|
|
|
|
* terminating NULL pointers.
|
|
|
|
*/
|
|
|
|
vectp -= imgp->args->argc + 1 + imgp->args->envc + 1;
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* vectp also becomes our initial stack base. */
|
2019-12-03 23:17:54 +00:00
|
|
|
*stack_base = (uintptr_t)vectp;
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2005-01-29 23:12:00 +00:00
|
|
|
stringp = imgp->args->begin_argv;
|
|
|
|
argc = imgp->args->argc;
|
|
|
|
envc = imgp->args->envc;
|
2019-12-03 23:17:54 +00:00
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Copy out strings - arguments and environment. */
|
2019-12-03 23:17:54 +00:00
|
|
|
error = copyout(stringp, (void *)ustringp,
|
|
|
|
ARG_MAX - imgp->args->stringspace);
|
2019-11-18 20:07:43 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Fill in "ps_strings" struct for ps, w, etc. */
|
2019-11-18 20:07:43 +00:00
|
|
|
if (suword32(&arginfo->ps_argvstr, (uint32_t)(intptr_t)vectp) != 0 ||
|
|
|
|
suword32(&arginfo->ps_nargvstr, argc) != 0)
|
|
|
|
return (EFAULT);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Fill in argument portion of vector table. */
|
2004-08-16 07:55:06 +00:00
|
|
|
for (; argc > 0; --argc) {
|
2019-12-03 23:17:54 +00:00
|
|
|
if (suword32(vectp++, ustringp) != 0)
|
2019-11-18 20:07:43 +00:00
|
|
|
return (EFAULT);
|
2004-08-16 07:55:06 +00:00
|
|
|
while (*stringp++ != 0)
|
2019-12-03 23:17:54 +00:00
|
|
|
ustringp++;
|
|
|
|
ustringp++;
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* A null vector table pointer separates the argp's from the envp's. */
|
2019-11-18 20:07:43 +00:00
|
|
|
if (suword32(vectp++, 0) != 0)
|
|
|
|
return (EFAULT);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2019-11-18 20:07:43 +00:00
|
|
|
if (suword32(&arginfo->ps_envstr, (uint32_t)(intptr_t)vectp) != 0 ||
|
|
|
|
suword32(&arginfo->ps_nenvstr, envc) != 0)
|
|
|
|
return (EFAULT);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* Fill in environment portion of vector table. */
|
2004-08-16 07:55:06 +00:00
|
|
|
for (; envc > 0; --envc) {
|
2019-12-03 23:17:54 +00:00
|
|
|
if (suword32(vectp++, ustringp) != 0)
|
2019-11-18 20:07:43 +00:00
|
|
|
return (EFAULT);
|
2004-08-16 07:55:06 +00:00
|
|
|
while (*stringp++ != 0)
|
2019-12-03 23:17:54 +00:00
|
|
|
ustringp++;
|
|
|
|
ustringp++;
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
2018-03-13 00:40:05 +00:00
|
|
|
/* The end of the vector table is a null pointer. */
|
2019-11-18 20:07:43 +00:00
|
|
|
if (suword32(vectp, 0) != 0)
|
|
|
|
return (EFAULT);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2019-12-09 19:17:28 +00:00
|
|
|
if (imgp->auxargs) {
|
|
|
|
vectp++;
|
|
|
|
error = imgp->sysent->sv_copyout_auxargs(imgp,
|
|
|
|
(uintptr_t)vectp);
|
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2019-11-18 20:07:43 +00:00
|
|
|
return (0);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
2020-02-26 14:26:36 +00:00
|
|
|
static SYSCTL_NODE(_compat, OID_AUTO, linux32, CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
|
2004-08-16 07:55:06 +00:00
|
|
|
"32-bit Linux emulation");
|
|
|
|
|
|
|
|
static u_long linux32_maxdsiz = LINUX32_MAXDSIZ;
|
|
|
|
SYSCTL_ULONG(_compat_linux32, OID_AUTO, maxdsiz, CTLFLAG_RW,
|
|
|
|
&linux32_maxdsiz, 0, "");
|
|
|
|
static u_long linux32_maxssiz = LINUX32_MAXSSIZ;
|
|
|
|
SYSCTL_ULONG(_compat_linux32, OID_AUTO, maxssiz, CTLFLAG_RW,
|
|
|
|
&linux32_maxssiz, 0, "");
|
|
|
|
static u_long linux32_maxvmem = LINUX32_MAXVMEM;
|
|
|
|
SYSCTL_ULONG(_compat_linux32, OID_AUTO, maxvmem, CTLFLAG_RW,
|
|
|
|
&linux32_maxvmem, 0, "");
|
|
|
|
|
|
|
|
static void
|
2007-05-14 22:40:04 +00:00
|
|
|
linux32_fixlimit(struct rlimit *rl, int which)
|
2004-08-16 07:55:06 +00:00
|
|
|
{
|
|
|
|
|
2007-05-14 22:40:04 +00:00
|
|
|
switch (which) {
|
|
|
|
case RLIMIT_DATA:
|
2009-01-31 20:46:01 +00:00
|
|
|
if (linux32_maxdsiz != 0) {
|
2007-05-14 22:40:04 +00:00
|
|
|
if (rl->rlim_cur > linux32_maxdsiz)
|
|
|
|
rl->rlim_cur = linux32_maxdsiz;
|
|
|
|
if (rl->rlim_max > linux32_maxdsiz)
|
|
|
|
rl->rlim_max = linux32_maxdsiz;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case RLIMIT_STACK:
|
|
|
|
if (linux32_maxssiz != 0) {
|
|
|
|
if (rl->rlim_cur > linux32_maxssiz)
|
|
|
|
rl->rlim_cur = linux32_maxssiz;
|
|
|
|
if (rl->rlim_max > linux32_maxssiz)
|
|
|
|
rl->rlim_max = linux32_maxssiz;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case RLIMIT_VMEM:
|
|
|
|
if (linux32_maxvmem != 0) {
|
|
|
|
if (rl->rlim_cur > linux32_maxvmem)
|
|
|
|
rl->rlim_cur = linux32_maxvmem;
|
|
|
|
if (rl->rlim_max > linux32_maxvmem)
|
|
|
|
rl->rlim_max = linux32_maxvmem;
|
|
|
|
}
|
|
|
|
break;
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct sysentvec elf_linux_sysvec = {
|
2015-10-22 21:28:20 +00:00
|
|
|
.sv_size = LINUX32_SYS_MAXSYSCALL,
|
|
|
|
.sv_table = linux32_sysent,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_errsize = ELAST + 1,
|
2018-03-22 12:58:49 +00:00
|
|
|
.sv_errtbl = linux_errtbl,
|
2018-03-19 21:26:32 +00:00
|
|
|
.sv_transtrap = linux_translate_traps,
|
|
|
|
.sv_fixup = linux_fixup_elf,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_sendsig = linux_sendsig,
|
2015-05-24 15:28:17 +00:00
|
|
|
.sv_sigcode = &_binary_linux32_locore_o_start,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_szsigcode = &linux_szsigcode,
|
|
|
|
.sv_name = "Linux ELF32",
|
|
|
|
.sv_coredump = elf32_coredump,
|
2018-03-19 21:26:32 +00:00
|
|
|
.sv_imgact_try = linux_exec_imgact_try,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_minsigstksz = LINUX_MINSIGSTKSZ,
|
|
|
|
.sv_minuser = VM_MIN_ADDRESS,
|
2011-03-13 14:58:02 +00:00
|
|
|
.sv_maxuser = LINUX32_MAXUSER,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_usrstack = LINUX32_USRSTACK,
|
|
|
|
.sv_psstrings = LINUX32_PS_STRINGS,
|
|
|
|
.sv_stackprot = VM_PROT_ALL,
|
2019-11-15 23:01:43 +00:00
|
|
|
.sv_copyout_auxargs = linux_copyout_auxargs,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_copyout_strings = linux_copyout_strings,
|
2018-03-19 21:26:32 +00:00
|
|
|
.sv_setregs = linux_exec_setregs,
|
2008-09-24 10:14:37 +00:00
|
|
|
.sv_fixlimit = linux32_fixlimit,
|
|
|
|
.sv_maxssiz = &linux32_maxssiz,
|
2011-03-13 14:58:02 +00:00
|
|
|
.sv_flags = SV_ABI_LINUX | SV_ILP32 | SV_IA32 | SV_SHP,
|
Reorganize syscall entry and leave handling.
Extend struct sysvec with three new elements:
sv_fetch_syscall_args - the method to fetch syscall arguments from
usermode into struct syscall_args. The structure is machine-depended
(this might be reconsidered after all architectures are converted).
sv_set_syscall_retval - the method to set a return value for usermode
from the syscall. It is a generalization of
cpu_set_syscall_retval(9) to allow ABIs to override the way to set a
return value.
sv_syscallnames - the table of syscall names.
Use sv_set_syscall_retval in kern_sigsuspend() instead of hardcoding
the call to cpu_set_syscall_retval().
The new functions syscallenter(9) and syscallret(9) are provided that
use sv_*syscall* pointers and contain the common repeated code from
the syscall() implementations for the architecture-specific syscall
trap handlers.
Syscallenter() fetches arguments, calls syscall implementation from
ABI sysent table, and set up return frame. The end of syscall
bookkeeping is done by syscallret().
Take advantage of single place for MI syscall handling code and
implement ptrace_lwpinfo pl_flags PL_FLAG_SCE, PL_FLAG_SCX and
PL_FLAG_EXEC. The SCE and SCX flags notify the debugger that the
thread is stopped at syscall entry or return point respectively. The
EXEC flag augments SCX and notifies debugger that the process address
space was changed by one of exec(2)-family syscalls.
The i386, amd64, sparc64, sun4v, powerpc and ia64 syscall()s are
changed to use syscallenter()/syscallret(). MIPS and arm are not
converted and use the mostly unchanged syscall() implementation.
Reviewed by: jhb, marcel, marius, nwhitehorn, stas
Tested by: marcel (ia64), marius (sparc64), nwhitehorn (powerpc),
stas (mips)
MFC after: 1 month
2010-05-23 18:32:02 +00:00
|
|
|
.sv_set_syscall_retval = cpu_set_syscall_retval,
|
|
|
|
.sv_fetch_syscall_args = linux32_fetch_syscall_args,
|
|
|
|
.sv_syscallnames = NULL,
|
2011-03-13 14:58:02 +00:00
|
|
|
.sv_shared_page_base = LINUX32_SHAREDPAGE,
|
|
|
|
.sv_shared_page_len = PAGE_SIZE,
|
2011-03-08 19:01:45 +00:00
|
|
|
.sv_schedtail = linux_schedtail,
|
2015-05-24 14:53:16 +00:00
|
|
|
.sv_thread_detach = linux_thread_detach,
|
2018-02-05 17:29:12 +00:00
|
|
|
.sv_trap = NULL,
|
2004-08-16 07:55:06 +00:00
|
|
|
};
|
2015-05-24 15:28:17 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
linux_vdso_install(void *param)
|
|
|
|
{
|
|
|
|
|
2018-02-05 17:29:12 +00:00
|
|
|
linux_szsigcode = (&_binary_linux32_locore_o_end -
|
2015-05-24 15:28:17 +00:00
|
|
|
&_binary_linux32_locore_o_start);
|
|
|
|
|
|
|
|
if (linux_szsigcode > elf_linux_sysvec.sv_shared_page_len)
|
|
|
|
panic("Linux invalid vdso size\n");
|
|
|
|
|
|
|
|
__elfN(linux_vdso_fixup)(&elf_linux_sysvec);
|
|
|
|
|
|
|
|
linux_shared_page_obj = __elfN(linux_shared_page_init)
|
|
|
|
(&linux_shared_page_mapping);
|
|
|
|
|
2017-07-30 21:24:20 +00:00
|
|
|
__elfN(linux_vdso_reloc)(&elf_linux_sysvec);
|
2015-05-24 15:28:17 +00:00
|
|
|
|
|
|
|
bcopy(elf_linux_sysvec.sv_sigcode, linux_shared_page_mapping,
|
|
|
|
linux_szsigcode);
|
|
|
|
elf_linux_sysvec.sv_shared_page_obj = linux_shared_page_obj;
|
2015-05-24 15:30:52 +00:00
|
|
|
|
|
|
|
linux_kplatform = linux_shared_page_mapping +
|
2017-07-30 21:24:20 +00:00
|
|
|
(linux_platform - (caddr_t)elf_linux_sysvec.sv_shared_page_base);
|
2015-05-24 15:28:17 +00:00
|
|
|
}
|
|
|
|
SYSINIT(elf_linux_vdso_init, SI_SUB_EXEC, SI_ORDER_ANY,
|
2018-03-23 20:32:54 +00:00
|
|
|
linux_vdso_install, NULL);
|
2015-05-24 15:28:17 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
linux_vdso_deinstall(void *param)
|
|
|
|
{
|
|
|
|
|
|
|
|
__elfN(linux_shared_page_fini)(linux_shared_page_obj);
|
2018-03-14 13:20:36 +00:00
|
|
|
}
|
2015-05-24 15:28:17 +00:00
|
|
|
SYSUNINIT(elf_linux_vdso_uninit, SI_SUB_EXEC, SI_ORDER_FIRST,
|
2018-03-23 20:32:54 +00:00
|
|
|
linux_vdso_deinstall, NULL);
|
2004-08-16 07:55:06 +00:00
|
|
|
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
static char GNU_ABI_VENDOR[] = "GNU";
|
|
|
|
static int GNULINUX_ABI_DESC = 0;
|
|
|
|
|
2018-03-13 16:40:29 +00:00
|
|
|
static bool
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
linux32_trans_osrel(const Elf_Note *note, int32_t *osrel)
|
|
|
|
{
|
|
|
|
const Elf32_Word *desc;
|
|
|
|
uintptr_t p;
|
|
|
|
|
|
|
|
p = (uintptr_t)(note + 1);
|
|
|
|
p += roundup2(note->n_namesz, sizeof(Elf32_Addr));
|
|
|
|
|
|
|
|
desc = (const Elf32_Word *)p;
|
|
|
|
if (desc[0] != GNULINUX_ABI_DESC)
|
2018-03-13 16:40:29 +00:00
|
|
|
return (false);
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
|
|
|
|
/*
|
2018-06-22 00:02:03 +00:00
|
|
|
* For Linux we encode osrel using the Linux convention of
|
|
|
|
* (version << 16) | (major << 8) | (minor)
|
|
|
|
* See macro in linux_mib.h
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
*/
|
2018-06-22 00:02:03 +00:00
|
|
|
*osrel = LINUX_KERNVER(desc[1], desc[2], desc[3]);
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
|
2018-03-13 16:40:29 +00:00
|
|
|
return (true);
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
}
|
2009-03-13 16:40:51 +00:00
|
|
|
|
|
|
|
static Elf_Brandnote linux32_brandnote = {
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
.hdr.n_namesz = sizeof(GNU_ABI_VENDOR),
|
|
|
|
.hdr.n_descsz = 16, /* XXX at least 16 */
|
2009-03-13 16:40:51 +00:00
|
|
|
.hdr.n_type = 1,
|
Fix handling of .note.ABI-tag section for GNU systems [1].
Handle GNU/Linux according to LSB Core Specification 4.0,
Chapter 11. Object Format, 11.8. ABI note tag.
Also check the first word of desc, not only name, according to
glibc abi-tags specification to distinguish between Linux and
kFreeBSD.
Add explicit handling for Debian GNU/kFreeBSD, which runs
on our kernels as well [2].
In {amd64,i386}/trap.c, when checking osrel of the current process,
also check the ABI to not change the signal behaviour for Linux
binary processes, now that we save an osrel version for all three
from the lists above in struct proc [2].
These changes make it possible to run FreeBSD, Debian GNU/kFreeBSD
and Linux binaries on the same machine again for at least i386 and
amd64, and no longer break kFreeBSD which was detected as GNU(/Linux).
PR: kern/135468
Submitted by: dchagin [1] (initial patch)
Suggested by: kib [2]
Tested by: Petr Salinger (Petr.Salinger seznam.cz) for kFreeBSD
Reviewed by: kib
MFC after: 3 days
2009-08-24 16:19:47 +00:00
|
|
|
.vendor = GNU_ABI_VENDOR,
|
|
|
|
.flags = BN_TRANSLATE_OSREL,
|
|
|
|
.trans_osrel = linux32_trans_osrel
|
2009-03-13 16:40:51 +00:00
|
|
|
};
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
static Elf32_Brandinfo linux_brand = {
|
2008-09-24 10:14:37 +00:00
|
|
|
.brand = ELFOSABI_LINUX,
|
|
|
|
.machine = EM_386,
|
|
|
|
.compat_3_brand = "Linux",
|
2019-12-16 20:07:04 +00:00
|
|
|
.emul_path = linux_emul_path,
|
2008-09-24 10:14:37 +00:00
|
|
|
.interp_path = "/lib/ld-linux.so.1",
|
|
|
|
.sysvec = &elf_linux_sysvec,
|
|
|
|
.interp_newpath = NULL,
|
2009-03-13 16:40:51 +00:00
|
|
|
.brand_note = &linux32_brandnote,
|
2014-06-17 05:29:18 +00:00
|
|
|
.flags = BI_CAN_EXEC_DYN | BI_BRAND_NOTE
|
2008-09-24 10:14:37 +00:00
|
|
|
};
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
static Elf32_Brandinfo linux_glibc2brand = {
|
2008-09-24 10:14:37 +00:00
|
|
|
.brand = ELFOSABI_LINUX,
|
|
|
|
.machine = EM_386,
|
|
|
|
.compat_3_brand = "Linux",
|
2019-12-16 20:07:04 +00:00
|
|
|
.emul_path = linux_emul_path,
|
2008-09-24 10:14:37 +00:00
|
|
|
.interp_path = "/lib/ld-linux.so.2",
|
|
|
|
.sysvec = &elf_linux_sysvec,
|
|
|
|
.interp_newpath = NULL,
|
2009-03-13 16:40:51 +00:00
|
|
|
.brand_note = &linux32_brandnote,
|
2014-06-17 05:29:18 +00:00
|
|
|
.flags = BI_CAN_EXEC_DYN | BI_BRAND_NOTE
|
2008-09-24 10:14:37 +00:00
|
|
|
};
|
2004-08-16 07:55:06 +00:00
|
|
|
|
2017-07-03 10:24:49 +00:00
|
|
|
static Elf32_Brandinfo linux_muslbrand = {
|
|
|
|
.brand = ELFOSABI_LINUX,
|
|
|
|
.machine = EM_386,
|
|
|
|
.compat_3_brand = "Linux",
|
2019-12-16 20:07:04 +00:00
|
|
|
.emul_path = linux_emul_path,
|
2017-07-03 10:24:49 +00:00
|
|
|
.interp_path = "/lib/ld-musl-i386.so.1",
|
|
|
|
.sysvec = &elf_linux_sysvec,
|
|
|
|
.interp_newpath = NULL,
|
|
|
|
.brand_note = &linux32_brandnote,
|
|
|
|
.flags = BI_CAN_EXEC_DYN | BI_BRAND_NOTE
|
|
|
|
};
|
|
|
|
|
2004-08-16 07:55:06 +00:00
|
|
|
Elf32_Brandinfo *linux_brandlist[] = {
|
2008-09-24 10:14:37 +00:00
|
|
|
&linux_brand,
|
|
|
|
&linux_glibc2brand,
|
2017-07-03 10:24:49 +00:00
|
|
|
&linux_muslbrand,
|
2008-09-24 10:14:37 +00:00
|
|
|
NULL
|
|
|
|
};
|
2004-08-16 07:55:06 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
linux_elf_modevent(module_t mod, int type, void *data)
|
|
|
|
{
|
|
|
|
Elf32_Brandinfo **brandinfo;
|
|
|
|
int error;
|
|
|
|
struct linux_ioctl_handler **lihp;
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
|
|
|
|
switch(type) {
|
|
|
|
case MOD_LOAD:
|
|
|
|
for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL;
|
|
|
|
++brandinfo)
|
|
|
|
if (elf32_insert_brand_entry(*brandinfo) < 0)
|
|
|
|
error = EINVAL;
|
|
|
|
if (error == 0) {
|
|
|
|
SET_FOREACH(lihp, linux_ioctl_handler_set)
|
2018-11-06 13:51:08 +00:00
|
|
|
linux32_ioctl_register_handler(*lihp);
|
2009-05-10 18:16:07 +00:00
|
|
|
stclohz = (stathz ? stathz : hz);
|
2004-08-16 07:55:06 +00:00
|
|
|
if (bootverbose)
|
|
|
|
printf("Linux ELF exec handler installed\n");
|
|
|
|
} else
|
|
|
|
printf("cannot insert Linux ELF brand handler\n");
|
|
|
|
break;
|
|
|
|
case MOD_UNLOAD:
|
|
|
|
for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL;
|
|
|
|
++brandinfo)
|
|
|
|
if (elf32_brand_inuse(*brandinfo))
|
|
|
|
error = EBUSY;
|
|
|
|
if (error == 0) {
|
|
|
|
for (brandinfo = &linux_brandlist[0];
|
|
|
|
*brandinfo != NULL; ++brandinfo)
|
|
|
|
if (elf32_remove_brand_entry(*brandinfo) < 0)
|
|
|
|
error = EINVAL;
|
|
|
|
}
|
|
|
|
if (error == 0) {
|
|
|
|
SET_FOREACH(lihp, linux_ioctl_handler_set)
|
2018-11-06 13:51:08 +00:00
|
|
|
linux32_ioctl_unregister_handler(*lihp);
|
2004-08-16 07:55:06 +00:00
|
|
|
if (bootverbose)
|
|
|
|
printf("Linux ELF exec handler removed\n");
|
|
|
|
} else
|
|
|
|
printf("Could not deinstall ELF interpreter entry\n");
|
|
|
|
break;
|
|
|
|
default:
|
2015-05-24 14:55:12 +00:00
|
|
|
return (EOPNOTSUPP);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
2015-05-24 14:55:12 +00:00
|
|
|
return (error);
|
2004-08-16 07:55:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static moduledata_t linux_elf_mod = {
|
|
|
|
"linuxelf",
|
|
|
|
linux_elf_modevent,
|
2012-10-10 08:36:38 +00:00
|
|
|
0
|
2004-08-16 07:55:06 +00:00
|
|
|
};
|
|
|
|
|
2010-10-12 09:18:17 +00:00
|
|
|
DECLARE_MODULE_TIED(linuxelf, linux_elf_mod, SI_SUB_EXEC, SI_ORDER_ANY);
|
2015-05-24 15:51:18 +00:00
|
|
|
MODULE_DEPEND(linuxelf, linux_common, 1, 1, 1);
|
2016-04-05 22:36:48 +00:00
|
|
|
FEATURE(linux, "Linux 32bit support");
|