blob: 5e403b0a359e8d374e7cb374ffd17c907c7da77d [file] [log] [blame]
##--------------------------------------------------------------------##
##--- Support for doing system calls. syscall-x86-linux.S ---##
##--------------------------------------------------------------------##
/*
This file is part of Valgrind, a dynamic binary instrumentation
framework.
Copyright (C) 2000-2005 Julian Seward
jseward@acm.org
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; either version 2 of the
License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
02111-1307, USA.
The GNU General Public License is contained in the file COPYING.
*/
#include "core_asm.h"
#include "vki_unistd.h"
#include "libvex_guest_offsets.h"
.globl VG_(sigreturn)
VG_(sigreturn):
movl $__NR_rt_sigreturn, %eax
int $0x80
/*
Perform a syscall for the client. This will run a syscall
with the client's specific per-thread signal mask.
The structure of this function is such that, if the syscall is
interrupted by a signal, we can determine exactly what
execution state we were in with respect to the execution of
the syscall by examining the value of %eip in the signal
handler. This means that we can always do the appropriate
thing to precisely emulate the kernel's signal/syscall
interactions.
The syscall number is taken from the argument, even though it
should also be in regs->m_eax. The syscall result is written
back to regs->m_eax on completion.
Returns 0 if the syscall was successfully called (even if the
syscall itself failed), or a -ve error code if one of the
sigprocmasks failed (there's no way to determine which one
failed).
VGA_(interrupted_syscall)() does the thread state fixup in the
case where we were interrupted by a signal.
Prototype:
Int VGA_(do_syscall_for_client_WRK)(
Int syscallno, // 0
void* guest_state, // 4
const vki_sigset_t *sysmask, // 8
const vki_sigset_t *postmask, // 12
Int nsigwords) // 16
*/
/* from vki_arch.h */
#define VKI_SIG_SETMASK 2
.globl VGA_(do_syscall_for_client_WRK)
VGA_(do_syscall_for_client_WRK):
/* save callee-saved regs */
push %esi
push %edi
push %ebx
push %ebp
#define FSZ ((4+1)*4) /* 4 args + ret addr */
1: /* Even though we can't take a signal until the sigprocmask completes,
start the range early.
If eip is in the range [1,2), the syscall hasn't been started yet */
/* Set the signal mask which should be current during the syscall. */
movl $__NR_rt_sigprocmask, %eax
movl $VKI_SIG_SETMASK, %ebx
movl 8+FSZ(%esp), %ecx
movl 12+FSZ(%esp), %edx
movl 16+FSZ(%esp), %esi
int $0x80
testl %eax, %eax
js 5f /* sigprocmask failed */
movl 4+FSZ(%esp), %eax /* eax == ThreadState * */
movl OFFSET_x86_EBX(%eax), %ebx
movl OFFSET_x86_ECX(%eax), %ecx
movl OFFSET_x86_EDX(%eax), %edx
movl OFFSET_x86_ESI(%eax), %esi
movl OFFSET_x86_EDI(%eax), %edi
movl OFFSET_x86_EBP(%eax), %ebp
movl 0+FSZ(%esp), %eax /* use syscallno argument rather than thread EAX */
/* If eip==2, then the syscall was either just about to start,
or was interrupted and the kernel was restarting it. */
2: int $0x80
3: /* In the range [3, 4), the syscall result is in %eax, but hasn't been
committed to EAX. */
movl 4+FSZ(%esp), %ebx
movl %eax, OFFSET_x86_EAX(%ebx) /* save back to EAX */
4: /* Re-block signals. If eip is in [4,5), then the syscall is complete and
we needn't worry about it. */
movl $__NR_rt_sigprocmask, %eax
movl $VKI_SIG_SETMASK, %ebx
movl 12+FSZ(%esp), %ecx
xorl %edx, %edx
movl 16+FSZ(%esp), %esi
int $0x80
5: /* now safe from signals */
popl %ebp
popl %ebx
popl %edi
popl %esi
#undef FSZ
ret
.section .rodata
/* export the ranges so that
VG_(fixup_guest_state_after_syscall_interrupted) can do the
right thing */
.globl VGA_(blksys_setup)
.globl VGA_(blksys_restart)
.globl VGA_(blksys_complete)
.globl VGA_(blksys_committed)
.globl VGA_(blksys_finished)
VGA_(blksys_setup): .long 1b
VGA_(blksys_restart): .long 2b
VGA_(blksys_complete): .long 3b
VGA_(blksys_committed): .long 4b
VGA_(blksys_finished): .long 5b
.previous
/* Let the linker know we don't need an executable stack */
.section .note.GNU-stack,"",@progbits
##--------------------------------------------------------------------##
##--- end ---##
##--------------------------------------------------------------------##