xref: /qemu/common-user/host/arm/safe-syscall.inc.S (revision b9d2af3c62c22870c02410d5c9c6d097ee0ddf3f)
1/*
2 * safe-syscall.inc.S : host-specific assembly fragment
3 * to handle signals occurring at the same time as system calls.
4 * This is intended to be included by linux-user/safe-syscall.S
5 *
6 * Written by Richard Henderson <rth@twiddle.net>
7 * Copyright (C) 2016 Red Hat, Inc.
8 *
9 * This work is licensed under the terms of the GNU GPL, version 2 or later.
10 * See the COPYING file in the top-level directory.
11 */
12
13        .global safe_syscall_base
14        .global safe_syscall_start
15        .global safe_syscall_end
16        .type   safe_syscall_base, %function
17
18        .cfi_sections   .debug_frame
19
20        .text
21        .syntax unified
22        .arm
23        .align 2
24
25        /* This is the entry point for making a system call. The calling
26         * convention here is that of a C varargs function with the
27         * first argument an 'int *' to the signal_pending flag, the
28         * second one the system call number (as a 'long'), and all further
29         * arguments being syscall arguments (also 'long').
30         * We return a long which is the syscall's return value, which
31         * may be negative-errno on failure. Conversion to the
32         * -1-and-errno-set convention is done by the calling wrapper.
33         */
34safe_syscall_base:
35        .fnstart
36        .cfi_startproc
37        mov     r12, sp                 /* save entry stack */
38        push    { r4, r5, r6, r7, r8, lr }
39        .save   { r4, r5, r6, r7, r8, lr }
40        .cfi_adjust_cfa_offset 24
41        .cfi_rel_offset r4, 0
42        .cfi_rel_offset r5, 4
43        .cfi_rel_offset r6, 8
44        .cfi_rel_offset r7, 12
45        .cfi_rel_offset r8, 16
46        .cfi_rel_offset lr, 20
47
48        /* The syscall calling convention isn't the same as the C one:
49         * we enter with r0 == *signal_pending
50         *               r1 == syscall number
51         *               r2, r3, [sp+0] ... [sp+12] == syscall arguments
52         *               and return the result in r0
53         * and the syscall instruction needs
54         *               r7 == syscall number
55         *               r0 ... r6 == syscall arguments
56         *               and returns the result in r0
57         * Shuffle everything around appropriately.
58         * Note the 16 bytes that we pushed to save registers.
59         */
60        mov     r8, r0                  /* copy signal_pending */
61        mov     r7, r1                  /* syscall number */
62        mov     r0, r2                  /* syscall args */
63        mov     r1, r3
64        ldm     r12, { r2, r3, r4, r5, r6 }
65
66        /* This next sequence of code works in conjunction with the
67         * rewind_if_safe_syscall_function(). If a signal is taken
68         * and the interrupted PC is anywhere between 'safe_syscall_start'
69         * and 'safe_syscall_end' then we rewind it to 'safe_syscall_start'.
70         * The code sequence must therefore be able to cope with this, and
71         * the syscall instruction must be the final one in the sequence.
72         */
73safe_syscall_start:
74        /* if signal_pending is non-zero, don't do the call */
75        ldr     r12, [r8]               /* signal_pending */
76        tst     r12, r12
77        bne     1f
78        swi     0
79safe_syscall_end:
80        /* code path for having successfully executed the syscall */
81        pop     { r4, r5, r6, r7, r8, pc }
82
831:
84        /* code path when we didn't execute the syscall */
85        ldr     r0, =-TARGET_ERESTARTSYS
86        pop     { r4, r5, r6, r7, r8, pc }
87        .fnend
88        .cfi_endproc
89
90        .size   safe_syscall_base, .-safe_syscall_base
91