xref: /netbsd-src/sys/arch/usermode/target/i386/cpu_i386.c (revision d8ce26fe5b2dbc730902a9e9b1bec600912101df)
1*d8ce26feSmaxv /* $NetBSD: cpu_i386.c,v 1.8 2018/11/27 14:09:54 maxv Exp $ */
2a1d9faf5Sreinoud 
3a1d9faf5Sreinoud /*-
4a1d9faf5Sreinoud  * Copyright (c) 2011 Reinoud Zandijk <reinoud@netbsd.org>
5a1d9faf5Sreinoud  * Copyright (c) 2007 Jared D. McNeill <jmcneill@invisible.ca>
6a1d9faf5Sreinoud  * All rights reserved.
7a1d9faf5Sreinoud  *
8a1d9faf5Sreinoud  * Redistribution and use in source and binary forms, with or without
9a1d9faf5Sreinoud  * modification, are permitted provided that the following conditions
10a1d9faf5Sreinoud  * are met:
11a1d9faf5Sreinoud  * 1. Redistributions of source code must retain the above copyright
12a1d9faf5Sreinoud  *    notice, this list of conditions and the following disclaimer.
13a1d9faf5Sreinoud  * 2. Redistributions in binary form must reproduce the above copyright
14a1d9faf5Sreinoud  *    notice, this list of conditions and the following disclaimer in the
15a1d9faf5Sreinoud  *    documentation and/or other materials provided with the distribution.
16a1d9faf5Sreinoud  *
17a1d9faf5Sreinoud  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
18a1d9faf5Sreinoud  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
19a1d9faf5Sreinoud  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
20a1d9faf5Sreinoud  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
21a1d9faf5Sreinoud  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
22a1d9faf5Sreinoud  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23a1d9faf5Sreinoud  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
24a1d9faf5Sreinoud  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
25a1d9faf5Sreinoud  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
26a1d9faf5Sreinoud  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27a1d9faf5Sreinoud  * POSSIBILITY OF SUCH DAMAGE.
28a1d9faf5Sreinoud  */
29a1d9faf5Sreinoud 
30a1d9faf5Sreinoud 
31a1d9faf5Sreinoud #include <sys/cdefs.h>
32*d8ce26feSmaxv __KERNEL_RCSID(0, "$NetBSD: cpu_i386.c,v 1.8 2018/11/27 14:09:54 maxv Exp $");
33a1d9faf5Sreinoud 
34a1d9faf5Sreinoud #include <sys/types.h>
35a1d9faf5Sreinoud #include <sys/systm.h>
36a1d9faf5Sreinoud #include <sys/param.h>
37a1d9faf5Sreinoud #include <sys/time.h>
38a1d9faf5Sreinoud #include <sys/exec.h>
39a1d9faf5Sreinoud #include <sys/buf.h>
40a1d9faf5Sreinoud #include <sys/boot_flag.h>
41a1d9faf5Sreinoud #include <sys/ucontext.h>
42a1d9faf5Sreinoud #include <sys/utsname.h>
43a1d9faf5Sreinoud #include <machine/pcb.h>
44a1d9faf5Sreinoud #include <machine/psl.h>
45a1d9faf5Sreinoud 
46a1d9faf5Sreinoud #include <uvm/uvm_extern.h>
47a1d9faf5Sreinoud #include <uvm/uvm_page.h>
48a1d9faf5Sreinoud 
49a1d9faf5Sreinoud #include <dev/mm.h>
50a1d9faf5Sreinoud #include <machine/machdep.h>
51a1d9faf5Sreinoud #include <machine/thunk.h>
522a35e8d9Sreinoud #include <machine/mcontext.h>
53a1d9faf5Sreinoud 
54cd980be6Sreinoud #include "opt_exec.h"
55cd980be6Sreinoud 
56a1d9faf5Sreinoud #if 0
57a50c0670Smaya static void dump_regs(register_t *reg);
58a1d9faf5Sreinoud 
59a1d9faf5Sreinoud static void
60a1d9faf5Sreinoud dump_regs(register_t *reg)
61a1d9faf5Sreinoud {
62a1d9faf5Sreinoud 	int i;
63a1d9faf5Sreinoud 
64a1d9faf5Sreinoud 	/* register dump before call */
65a1d9faf5Sreinoud 	const char *name[] = {"GS", "FS", "ES", "DS", "EDI", "ESI", "EBP", "ESP",
66a1d9faf5Sreinoud 		"EBX", "EDX", "ECX", "EAX", "TRAPNO", "ERR", "EIP", "CS", "EFL",
67a1d9faf5Sreinoud 		"UESP", "SS"};
68a1d9faf5Sreinoud 
69a1d9faf5Sreinoud 	for (i =0; i < 19; i++)
70a1d9faf5Sreinoud 		printf("reg[%02d] (%6s) = %"PRIx32"\n", i, name[i], (uint32_t) reg[i]);
71a1d9faf5Sreinoud }
72a1d9faf5Sreinoud #endif
73a1d9faf5Sreinoud 
74a1d9faf5Sreinoud 
75a1d9faf5Sreinoud /* from sys/arch/i386/include/frame.h : KEEP IN SYNC */
76a1d9faf5Sreinoud 
77a1d9faf5Sreinoud /*
78a1d9faf5Sreinoud  * New-style signal frame
79a1d9faf5Sreinoud  */
80a1d9faf5Sreinoud struct sigframe_siginfo {
81a1d9faf5Sreinoud 	int		sf_ra;		/* return address for handler */
82a1d9faf5Sreinoud 	int		sf_signum;	/* "signum" argument for handler */
83a1d9faf5Sreinoud 	siginfo_t	*sf_sip;	/* "sip" argument for handler */
84a1d9faf5Sreinoud 	ucontext_t	*sf_ucp;	/* "ucp" argument for handler */
85a1d9faf5Sreinoud 	siginfo_t	sf_si;		/* actual saved siginfo */
86a1d9faf5Sreinoud 	ucontext_t	sf_uc;		/* actual saved ucontext */
87a1d9faf5Sreinoud };
88a1d9faf5Sreinoud 
89a1d9faf5Sreinoud 
90a1d9faf5Sreinoud /*
91a1d9faf5Sreinoud  * mcontext extensions to handle signal delivery.
92a1d9faf5Sreinoud  */
93a1d9faf5Sreinoud 
94a1d9faf5Sreinoud void
sendsig_siginfo(const ksiginfo_t * ksi,const sigset_t * mask)95a1d9faf5Sreinoud sendsig_siginfo(const ksiginfo_t *ksi, const sigset_t *mask)
96a1d9faf5Sreinoud {
97a1d9faf5Sreinoud 	struct lwp *l = curlwp;
98a1d9faf5Sreinoud 	struct proc *p = l->l_proc;
99a1d9faf5Sreinoud 	struct pcb *pcb = lwp_getpcb(l);
100a1d9faf5Sreinoud 	struct sigacts *ps = p->p_sigacts;
101a1d9faf5Sreinoud 	struct sigframe_siginfo *fp, frame;
102a1d9faf5Sreinoud 	int sig = ksi->ksi_signo;
103a1d9faf5Sreinoud 	sig_t catcher = SIGACTION(p, sig).sa_handler;
104cd980be6Sreinoud 	ucontext_t *ucp;
105cd980be6Sreinoud 	register_t *reg;
106a1d9faf5Sreinoud 	int onstack, error;
107a1d9faf5Sreinoud 
108a1d9faf5Sreinoud 	KASSERT(mutex_owned(p->p_lock));
109a1d9faf5Sreinoud 
110cd980be6Sreinoud 	ucp = &pcb->pcb_userret_ucp;
111c058f6dfSreinoud 	reg = (register_t *) &ucp->uc_mcontext.__gregs;
112a1d9faf5Sreinoud #if 0
113cd980be6Sreinoud 	thunk_printf("%s: ", __func__);
114cd980be6Sreinoud 	thunk_printf("flags %d, ", (int) ksi->ksi_flags);
115cd980be6Sreinoud 	thunk_printf("to lwp %d, signo %d, code %d, errno %d\n",
116a1d9faf5Sreinoud 		(int) ksi->ksi_lid,
117a1d9faf5Sreinoud 		ksi->ksi_signo,
118a1d9faf5Sreinoud 		ksi->ksi_code,
119a1d9faf5Sreinoud 		ksi->ksi_errno);
120a1d9faf5Sreinoud #endif
121a1d9faf5Sreinoud 
122a1d9faf5Sreinoud 	/* do we need to jump onto the signal stack? */
123a1d9faf5Sreinoud 	onstack = (l->l_sigstk.ss_flags & (SS_DISABLE | SS_ONSTACK)) == 0
124a1d9faf5Sreinoud 	    && (SIGACTION(p, sig).sa_flags & SA_ONSTACK) != 0;
125a1d9faf5Sreinoud 
126a1d9faf5Sreinoud 	fp = (void *) reg[17];	/* ESP */
127a1d9faf5Sreinoud 	if (onstack)
128a1d9faf5Sreinoud 		fp = (void *)
129a1d9faf5Sreinoud 			((char *) l->l_sigstk.ss_sp + l->l_sigstk.ss_size);
130a1d9faf5Sreinoud 
131a1d9faf5Sreinoud 	fp--;
132a1d9faf5Sreinoud 
133a1d9faf5Sreinoud 	/* set up stack frame */
134*d8ce26feSmaxv 	memset(&frame, 0, sizeof(frame));
135a1d9faf5Sreinoud 	frame.sf_ra = (int)ps->sa_sigdesc[sig].sd_tramp;
136a1d9faf5Sreinoud 	frame.sf_signum = sig;
137a1d9faf5Sreinoud 	frame.sf_sip = &fp->sf_si;
138a1d9faf5Sreinoud 	frame.sf_ucp = &fp->sf_uc;
139a1d9faf5Sreinoud 	frame.sf_si._info = ksi->ksi_info;
140a1d9faf5Sreinoud 
141a1d9faf5Sreinoud 	/* copy our userret context into sf_uc */
142a1d9faf5Sreinoud 	memcpy(&frame.sf_uc, ucp, sizeof(ucontext_t));
143a1d9faf5Sreinoud 	frame.sf_uc.uc_sigmask = *mask;
144a1d9faf5Sreinoud 	frame.sf_uc.uc_link = l->l_ctxlink; /* XXX ??? */
145a1d9faf5Sreinoud 	frame.sf_uc.uc_flags |= (l->l_sigstk.ss_flags & SS_ONSTACK)
146a1d9faf5Sreinoud 	    ? _UC_SETSTACK : _UC_CLRSTACK;
147a1d9faf5Sreinoud 	memset(&frame.sf_uc.uc_stack, 0, sizeof(frame.sf_uc.uc_stack));
148a1d9faf5Sreinoud 
149a1d9faf5Sreinoud 	sendsig_reset(l, sig);
150a1d9faf5Sreinoud 
151a1d9faf5Sreinoud 	/* copyout our frame to the stackframe */
152a1d9faf5Sreinoud 	mutex_exit(p->p_lock);
153a1d9faf5Sreinoud 	error = copyout(&frame, fp, sizeof(frame));
154a1d9faf5Sreinoud 	mutex_enter(p->p_lock);
155a1d9faf5Sreinoud 
156a1d9faf5Sreinoud 	if (error != 0) {
157a1d9faf5Sreinoud 		/*
158a1d9faf5Sreinoud 		 * Process has trashed its stack; give it an illegal
159a1d9faf5Sreinoud 		 * instruction to halt it in its tracks.
160a1d9faf5Sreinoud 		 */
161a1d9faf5Sreinoud 		sigexit(l, SIGILL);
162a1d9faf5Sreinoud 		/* NOTREACHED */
163a1d9faf5Sreinoud 	}
164a1d9faf5Sreinoud 
165a1d9faf5Sreinoud 	/* set catcher and the new stack pointer */
166a1d9faf5Sreinoud 	reg[17] = (register_t) fp;	/* ESP */
167a1d9faf5Sreinoud 	reg[14] = (register_t) catcher;	/* EIP */
168a1d9faf5Sreinoud 
169a1d9faf5Sreinoud 	/* Remember that we're now on the signal stack. */
170a1d9faf5Sreinoud 	if (onstack)
171a1d9faf5Sreinoud 		l->l_sigstk.ss_flags |= SS_ONSTACK;
172a1d9faf5Sreinoud }
173a1d9faf5Sreinoud 
174a1d9faf5Sreinoud void
setregs(struct lwp * l,struct exec_package * pack,vaddr_t stack)175a1d9faf5Sreinoud setregs(struct lwp *l, struct exec_package *pack, vaddr_t stack)
176a1d9faf5Sreinoud {
177a1d9faf5Sreinoud 	struct pcb *pcb = lwp_getpcb(l);
178cd980be6Sreinoud 	ucontext_t *ucp;
179a1d9faf5Sreinoud 	uint *reg, i;
180a1d9faf5Sreinoud 
181a1d9faf5Sreinoud #ifdef DEBUG_EXEC
182a1d9faf5Sreinoud 	printf("setregs called: lwp %p, exec package %p, stack %p\n",
183a1d9faf5Sreinoud 		l, pack, (void *) stack);
184a1d9faf5Sreinoud 	printf("current stat of pcb %p\n", pcb);
185a1d9faf5Sreinoud 	printf("\tpcb->pcb_ucp.uc_stack.ss_sp   = %p\n",
186a1d9faf5Sreinoud 		pcb->pcb_ucp.uc_stack.ss_sp);
187a1d9faf5Sreinoud 	printf("\tpcb->pcb_ucp.uc_stack.ss_size = %d\n",
188a1d9faf5Sreinoud 		(int) pcb->pcb_ucp.uc_stack.ss_size);
189a1d9faf5Sreinoud #endif
190a1d9faf5Sreinoud 
191cd980be6Sreinoud 	/* set up the user context */
192cd980be6Sreinoud 	ucp = &pcb->pcb_userret_ucp;
193c058f6dfSreinoud 	reg = (int *) &ucp->uc_mcontext.__gregs;
194a1d9faf5Sreinoud 	for (i = 4; i < 11; i++)
195a1d9faf5Sreinoud 		reg[i] = 0;
196a1d9faf5Sreinoud 
197cd980be6Sreinoud 	/* use given stack */
198a1d9faf5Sreinoud 	ucp->uc_stack.ss_sp = (void *) (stack-4);	/* to prevent clearing */
199a1d9faf5Sreinoud 	ucp->uc_stack.ss_size = 0; //pack->ep_ssize;
2008caa1870Sreinoud 	thunk_makecontext(ucp, (void *) pack->ep_entry,
2018caa1870Sreinoud 		0, NULL, NULL, NULL, NULL);
202a1d9faf5Sreinoud 
203a1d9faf5Sreinoud 	/* patch up */
204a1d9faf5Sreinoud 	reg[ 8] = l->l_proc->p_psstrp;	/* _REG_EBX */
205a1d9faf5Sreinoud 	reg[17] = (stack);		/* _REG_UESP */
206a1d9faf5Sreinoud 
207a1d9faf5Sreinoud 	//dump_regs(reg);
208a1d9faf5Sreinoud 
209a1d9faf5Sreinoud #ifdef DEBUG_EXEC
210a1d9faf5Sreinoud 	printf("updated pcb %p\n", pcb);
211a1d9faf5Sreinoud 	printf("\tpcb->pcb_ucp.uc_stack.ss_sp   = %p\n",
212a1d9faf5Sreinoud 		pcb->pcb_ucp.uc_stack.ss_sp);
213a1d9faf5Sreinoud 	printf("\tpcb->pcb_ucp.uc_stack.ss_size = %d\n",
214a1d9faf5Sreinoud 		(int) pcb->pcb_ucp.uc_stack.ss_size);
215a1d9faf5Sreinoud 	printf("\tpack->ep_entry                = %p\n",
216a1d9faf5Sreinoud 		(void *) pack->ep_entry);
217a1d9faf5Sreinoud #endif
218a1d9faf5Sreinoud }
219a1d9faf5Sreinoud 
220a1d9faf5Sreinoud void
md_syscall_get_syscallnumber(ucontext_t * ucp,uint32_t * code)221a1d9faf5Sreinoud md_syscall_get_syscallnumber(ucontext_t *ucp, uint32_t *code)
222a1d9faf5Sreinoud {
223c058f6dfSreinoud 	uint *reg = (int *) &ucp->uc_mcontext.__gregs;
224a1d9faf5Sreinoud 	*code = reg[11];			/* EAX */
225a1d9faf5Sreinoud }
226a1d9faf5Sreinoud 
227a1d9faf5Sreinoud int
md_syscall_getargs(lwp_t * l,ucontext_t * ucp,int nargs,int argsize,register_t * args)228a1d9faf5Sreinoud md_syscall_getargs(lwp_t *l, ucontext_t *ucp, int nargs, int argsize,
229a1d9faf5Sreinoud 	register_t *args)
230a1d9faf5Sreinoud {
231c058f6dfSreinoud 	uint *reg = (int *) &ucp->uc_mcontext.__gregs;
232a1d9faf5Sreinoud 	register_t *sp = (register_t *) reg[17];/* ESP */
233a1d9faf5Sreinoud 	int ret;
234a1d9faf5Sreinoud 
235a1d9faf5Sreinoud 	//dump_regs(reg);
236a1d9faf5Sreinoud 	ret = copyin(sp + 1, args, argsize);
237a1d9faf5Sreinoud 
238a1d9faf5Sreinoud 	return ret;
239a1d9faf5Sreinoud }
240a1d9faf5Sreinoud 
241a1d9faf5Sreinoud void
md_syscall_set_returnargs(lwp_t * l,ucontext_t * ucp,int error,register_t * rval)242a1d9faf5Sreinoud md_syscall_set_returnargs(lwp_t *l, ucontext_t *ucp,
243a1d9faf5Sreinoud 	int error, register_t *rval)
244a1d9faf5Sreinoud {
245c058f6dfSreinoud 	register_t *reg = (register_t *) &ucp->uc_mcontext.__gregs;
246a1d9faf5Sreinoud 
247a1d9faf5Sreinoud 	reg[16] &= ~PSL_C;		/* EFL */
248a1d9faf5Sreinoud 	if (error > 0) {
249a1d9faf5Sreinoud 		rval[0] = error;
250a1d9faf5Sreinoud 		reg[16] |= PSL_C;	/* EFL */
251a1d9faf5Sreinoud 	}
252a1d9faf5Sreinoud 
253a1d9faf5Sreinoud 	/* set return parameters */
254a1d9faf5Sreinoud 	reg[11]	= rval[0];		/* EAX */
255a1d9faf5Sreinoud 	if (error == 0)
256a1d9faf5Sreinoud 		reg[ 9] = rval[1];	/* EDX */
257a1d9faf5Sreinoud 
258a1d9faf5Sreinoud 	//dump_regs(reg);
259a1d9faf5Sreinoud }
260a1d9faf5Sreinoud 
261a1d9faf5Sreinoud register_t
md_get_pc(ucontext_t * ucp)262a1d9faf5Sreinoud md_get_pc(ucontext_t *ucp)
263a1d9faf5Sreinoud {
264b74ba047Sreinoud 	KASSERT(ucp);
265c058f6dfSreinoud 	register_t *reg = (register_t *) &ucp->uc_mcontext.__gregs;
266a1d9faf5Sreinoud 
267a1d9faf5Sreinoud 	return reg[14];			/* EIP */
268a1d9faf5Sreinoud }
269a1d9faf5Sreinoud 
270cd980be6Sreinoud register_t
md_get_sp(ucontext_t * ucp)271cd980be6Sreinoud md_get_sp(ucontext_t *ucp)
272cd980be6Sreinoud {
273b74ba047Sreinoud 	KASSERT(ucp);
274c058f6dfSreinoud 	register_t *reg = (register_t *) &ucp->uc_mcontext.__gregs;
275cd980be6Sreinoud 
276cd980be6Sreinoud 	return reg[17];			/* ESP */
277cd980be6Sreinoud }
278cd980be6Sreinoud 
279a1d9faf5Sreinoud int
md_syscall_check_opcode(ucontext_t * ucp)280a1d9faf5Sreinoud md_syscall_check_opcode(ucontext_t *ucp)
281a1d9faf5Sreinoud {
282a1d9faf5Sreinoud 	uint32_t opcode;
283a1d9faf5Sreinoud 
284a1d9faf5Sreinoud 	md_syscall_get_opcode(ucp, &opcode);
285a1d9faf5Sreinoud 
286a1d9faf5Sreinoud 	switch (opcode) {
287a1d9faf5Sreinoud 	case 0xff0f:	/* UD1      */
288a1d9faf5Sreinoud 	case 0xff0b:	/* UD2      */
289a1d9faf5Sreinoud 	case 0x80cd:	/* int $80  */
290a1d9faf5Sreinoud 	case 0x340f:	/* sysenter */
291a1d9faf5Sreinoud 	case 0x050f:	/* syscall */
292a1d9faf5Sreinoud 		return 1;
293a1d9faf5Sreinoud 	default:
294a1d9faf5Sreinoud 		return 0;
295a1d9faf5Sreinoud 	}
296a1d9faf5Sreinoud }
297a1d9faf5Sreinoud 
298a1d9faf5Sreinoud void
md_syscall_get_opcode(ucontext_t * ucp,uint32_t * opcode)299a1d9faf5Sreinoud md_syscall_get_opcode(ucontext_t *ucp, uint32_t *opcode)
300a1d9faf5Sreinoud {
301b74ba047Sreinoud 	KASSERT(ucp);
302c058f6dfSreinoud 	register_t *reg = (register_t *) &ucp->uc_mcontext.__gregs;
303a1d9faf5Sreinoud //	uint8_t  *p8  = (uint8_t *) (reg[14]);
304a1d9faf5Sreinoud 	uint16_t *p16 = (uint16_t*) (reg[14]);	/* EIP */
305a1d9faf5Sreinoud 
306a1d9faf5Sreinoud 	switch (*p16) {
307a1d9faf5Sreinoud 	case 0xff0f:	/* UD1      */
308a1d9faf5Sreinoud 	case 0xff0b:	/* UD2      */
309a1d9faf5Sreinoud 	case 0x80cd:	/* int $80  */
310a1d9faf5Sreinoud 	case 0x340f:	/* sysenter */
311a1d9faf5Sreinoud 	case 0x050f:	/* syscall */
312a1d9faf5Sreinoud 		*opcode = *p16;
313a1d9faf5Sreinoud 		break;
314a1d9faf5Sreinoud 	default:
315a1d9faf5Sreinoud 		*opcode = 0;
316a1d9faf5Sreinoud 	}
317a1d9faf5Sreinoud }
318a1d9faf5Sreinoud 
319a1d9faf5Sreinoud void
md_syscall_inc_pc(ucontext_t * ucp,uint32_t opcode)320a1d9faf5Sreinoud md_syscall_inc_pc(ucontext_t *ucp, uint32_t opcode)
321a1d9faf5Sreinoud {
322b74ba047Sreinoud 	KASSERT(ucp);
323c058f6dfSreinoud 	uint *reg = (int *) &ucp->uc_mcontext.__gregs;
324a1d9faf5Sreinoud 
325a1d9faf5Sreinoud 	/* advance program counter */
326a1d9faf5Sreinoud 	switch (opcode) {
327a1d9faf5Sreinoud 	case 0xff0f:	/* UD1      */
328a1d9faf5Sreinoud 	case 0xff0b:	/* UD2      */
329a1d9faf5Sreinoud 	case 0x80cd:	/* int $80  */
330a1d9faf5Sreinoud 	case 0x340f:	/* sysenter */
331a1d9faf5Sreinoud 	case 0x050f:	/* syscall */
332a1d9faf5Sreinoud 		reg[14] += 2;	/* EIP */
333a1d9faf5Sreinoud 		break;
334a1d9faf5Sreinoud 	default:
335a1d9faf5Sreinoud 		panic("%s, unknown illegal instruction: opcode = %x\n",
336a1d9faf5Sreinoud 			__func__, (uint32_t) opcode);
337a1d9faf5Sreinoud 	}
338a1d9faf5Sreinoud }
339a1d9faf5Sreinoud 
340a1d9faf5Sreinoud void
md_syscall_dec_pc(ucontext_t * ucp,uint32_t opcode)341a1d9faf5Sreinoud md_syscall_dec_pc(ucontext_t *ucp, uint32_t opcode)
342a1d9faf5Sreinoud {
343b74ba047Sreinoud 	KASSERT(ucp);
344c058f6dfSreinoud 	uint *reg = (int *) &ucp->uc_mcontext.__gregs;
345a1d9faf5Sreinoud 
346a1d9faf5Sreinoud 	switch (opcode) {
347a1d9faf5Sreinoud 	case 0xff0f:	/* UD1      */
348a1d9faf5Sreinoud 	case 0xff0b:	/* UD2      */
349a1d9faf5Sreinoud 	case 0x80cd:	/* int $80  */
350a1d9faf5Sreinoud 	case 0x340f:	/* sysenter */
351a1d9faf5Sreinoud 	case 0x050f:	/* syscall */
352a1d9faf5Sreinoud 		reg[14] -= 2;	/* EIP */
353a1d9faf5Sreinoud 		break;
354a1d9faf5Sreinoud 	default:
355a1d9faf5Sreinoud 		panic("%s, unknown illegal instruction: opcode = %x\n",
356a1d9faf5Sreinoud 			__func__, (uint32_t) opcode);
357a1d9faf5Sreinoud 	}
358a1d9faf5Sreinoud }
359a1d9faf5Sreinoud 
360