cachepc-qemu

Fork of AMDESE/qemu with changes for cachepc side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-qemu
Log | Files | Refs | Submodules | LICENSE | sfeed.txt

safe-syscall.inc.S (2949B)


      1/*
      2 * safe-syscall.inc.S : host-specific assembly fragment
      3 * to handle signals occurring at the same time as system calls.
      4 * This is intended to be included by linux-user/safe-syscall.S
      5 *
      6 * Written by Richard Henderson <rth@twiddle.net>
      7 * Copyright (C) 2016 Red Hat, Inc.
      8 *
      9 * This work is licensed under the terms of the GNU GPL, version 2 or later.
     10 * See the COPYING file in the top-level directory.
     11 */
     12
     13	.global safe_syscall_base
     14	.global safe_syscall_start
     15	.global safe_syscall_end
     16	.type	safe_syscall_base, %function
     17
     18	.cfi_sections	.debug_frame
     19
     20	.text
     21	.syntax unified
     22	.arm
     23	.align 2
     24
     25	/* This is the entry point for making a system call. The calling
     26	 * convention here is that of a C varargs function with the
     27	 * first argument an 'int *' to the signal_pending flag, the
     28	 * second one the system call number (as a 'long'), and all further
     29	 * arguments being syscall arguments (also 'long').
     30	 * We return a long which is the syscall's return value, which
     31	 * may be negative-errno on failure. Conversion to the
     32	 * -1-and-errno-set convention is done by the calling wrapper.
     33	 */
     34safe_syscall_base:
     35	.fnstart
     36	.cfi_startproc
     37	mov	r12, sp			/* save entry stack */
     38	push	{ r4, r5, r6, r7, r8, lr }
     39	.save	{ r4, r5, r6, r7, r8, lr }
     40	.cfi_adjust_cfa_offset 24
     41	.cfi_rel_offset r4, 0
     42	.cfi_rel_offset r5, 4
     43	.cfi_rel_offset r6, 8
     44	.cfi_rel_offset r7, 12
     45	.cfi_rel_offset r8, 16
     46	.cfi_rel_offset lr, 20
     47
     48	/* The syscall calling convention isn't the same as the C one:
     49	 * we enter with r0 == *signal_pending
     50	 *               r1 == syscall number
     51	 *               r2, r3, [sp+0] ... [sp+12] == syscall arguments
     52	 *               and return the result in r0
     53	 * and the syscall instruction needs
     54	 *               r7 == syscall number
     55	 *               r0 ... r6 == syscall arguments
     56	 *               and returns the result in r0
     57	 * Shuffle everything around appropriately.
     58	 * Note the 16 bytes that we pushed to save registers.
     59	 */
     60	mov	r8, r0			/* copy signal_pending */
     61	mov	r7, r1			/* syscall number */
     62	mov	r0, r2			/* syscall args */
     63	mov	r1, r3
     64	ldm	r12, { r2, r3, r4, r5, r6 }
     65
     66	/* This next sequence of code works in conjunction with the
     67	 * rewind_if_safe_syscall_function(). If a signal is taken
     68	 * and the interrupted PC is anywhere between 'safe_syscall_start'
     69	 * and 'safe_syscall_end' then we rewind it to 'safe_syscall_start'.
     70	 * The code sequence must therefore be able to cope with this, and
     71	 * the syscall instruction must be the final one in the sequence.
     72	 */
     73safe_syscall_start:
     74	/* if signal_pending is non-zero, don't do the call */
     75	ldr	r12, [r8]		/* signal_pending */
     76	tst	r12, r12
     77	bne	1f
     78	swi	0
     79safe_syscall_end:
     80	/* code path for having successfully executed the syscall */
     81	pop	{ r4, r5, r6, r7, r8, pc }
     82
     831:
     84	/* code path when we didn't execute the syscall */
     85	ldr	r0, =-TARGET_ERESTARTSYS
     86	pop	{ r4, r5, r6, r7, r8, pc }
     87	.fnend
     88	.cfi_endproc
     89
     90	.size	safe_syscall_base, .-safe_syscall_base