aboutsummaryrefslogtreecommitdiffstats
path: root/usr.bin/cpio
diff options
context:
space:
mode:
authorJohn Baldwin <jhb@FreeBSD.org>2015-12-21 22:16:09 +0000
committerJohn Baldwin <jhb@FreeBSD.org>2015-12-21 22:16:09 +0000
commit8f3ccefcd6b537533dad9f717f0b75a8d2d6dc44 (patch)
treead3f4fe1b0da43d4716aaf41824e16f8e6473e99 /usr.bin/cpio
parentb56353e88afe14a2a4784313315e4b220911443b (diff)
downloadsrc-8f3ccefcd6b537533dad9f717f0b75a8d2d6dc44.tar.gz
src-8f3ccefcd6b537533dad9f717f0b75a8d2d6dc44.zip
MFC 291947:
Set %esp correctly in the extended TSS. The pcb is saved at the top of the kernel stack on x86 platforms. The initial kenrel stack pointer is set in the TSS so that the trapframe from user -> kernel transitions begins directly below the pcb and grows down. The XSAVE changes moved the FPU save area out of the pcb and into a variable-sized area after the pcb. This required updating the expressions to calculate the initial stack pointer from 'stacktop - sizeof(pcb)' to 'stacktop - sizeof(pcb) + FPU save area size'. The i386_set_ioperm() system call allows user applications to access individual I/O ports via the I/O port permission bitmap in the TSS. On FreeBSD this requires allocating a custom per-process TSS instead of using the shared per-CPU TSS. The expression to initialize the initial kernel stack pointer in the per-process TSS created for i386_set_ioperm() was not properly updated after the XSAVE changes. Processes that used i386_set_ioperm() would trash the trapframe during subsequent context switches resulting in panics from memory corruption. This changes fixes the kernel stack pointer calculation for the per-process TSS.
Notes
Notes: svn path=/stable/10/; revision=292572
Diffstat (limited to 'usr.bin/cpio')
0 files changed, 0 insertions, 0 deletions