7c5d1690e9
The miscellaneous x86 sysent->sv_setregs() implementations tried to migrate PSL_T from the previous program to the new executed one, but they evaluated regs->tf_eflags after the whole regs structure was bzeroed. Make this functional by saving PSL_T value before zeroing. Note that if the debugger is not attached, executing the first instruction in the new program with PSL_T set results in SIGTRAP, and since all intercepted signals are reset to default dispostion on exec(2), this means that non-debugged process gets killed immediately if PSL_T is inherited. In particular, since suid images drop P_TRACED, attempt to set PSL_T for execution of such program would kill the process. Another issue with userspace PSL_T handling is that it is reset by trap(). It is reasonable to clear PSL_T when entering SIGTRAP handler, to allow the signal to be handled without recursion or delivery of blocked fault. But it is not reasonable to return back to the normal flow with PSL_T cleared. This is too late to change, I think. Discussed with: bde, Ali Mashtizadeh Sponsored by: The FreeBSD Foundation MFC after: 3 weeks Differential revision: https://reviews.freebsd.org/D14995 |
||
---|---|---|
.. | ||
linux32_dummy.c | ||
linux32_genassym.c | ||
linux32_locore.s | ||
linux32_machdep.c | ||
linux32_proto.h | ||
linux32_support.s | ||
linux32_syscall.h | ||
linux32_syscalls.c | ||
linux32_sysent.c | ||
linux32_systrace_args.c | ||
linux32_sysvec.c | ||
linux32_vdso.lds.s | ||
linux.h | ||
Makefile | ||
syscalls.conf | ||
syscalls.master |