mirror of
https://sourceware.org/git/glibc.git
synced 2025-10-26 00:57:39 +03:00
We stopped adding "Contributed by" or similar lines in sources in 2012 in favour of git logs and keeping the Contributors section of the glibc manual up to date. Removing these lines makes the license header a bit more consistent across files and also removes the possibility of error in attribution when license blocks or files are copied across since the contributed-by lines don't actually reflect reality in those cases. Move all "Contributed by" and similar lines (Written by, Test by, etc.) into a new file CONTRIBUTED-BY to retain record of these contributions. These contributors are also mentioned in manual/contrib.texi, so we just maintain this additional record as a courtesy to the earlier developers. The following scripts were used to filter a list of files to edit in place and to clean up the CONTRIBUTED-BY file respectively. These were not added to the glibc sources because they're not expected to be of any use in future given that this is a one time task: https://gist.github.com/siddhesh/b5ecac94eabfd72ed2916d6d8157e7dc https://gist.github.com/siddhesh/15ea1f5e435ace9774f485030695ee02 Reviewed-by: Carlos O'Donell <carlos@redhat.com>
124 lines
3.8 KiB
ArmAsm
124 lines
3.8 KiB
ArmAsm
/* Copyright (C) 2002-2021 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#include <sysdep.h>
|
|
|
|
#if SHSTK_ENABLED
|
|
# include <asm/prctl.h>
|
|
# include "ucontext_i.h"
|
|
|
|
/* Use CALL to push __start_context onto the new stack as well as the new
|
|
shadow stack. RDI points to ucontext:
|
|
Incoming:
|
|
__ssp[0]: The original caller's shadow stack pointer.
|
|
__ssp[1]: The size of the new shadow stack.
|
|
__ssp[2]: The size of the new shadow stack.
|
|
Outgoing:
|
|
__ssp[0]: The new shadow stack pointer.
|
|
__ssp[1]: The base address of the new shadow stack.
|
|
__ssp[2]: The size of the new shadow stack.
|
|
*/
|
|
|
|
ENTRY(__push___start_context)
|
|
/* Save the pointer to ucontext. */
|
|
movq %rdi, %r9
|
|
/* Get the original shadow stack pointer. */
|
|
rdsspq %r8
|
|
/* Save the original stack pointer. */
|
|
movq %rsp, %rdx
|
|
/* Load the top of the new stack into RSI. */
|
|
movq oRSP(%rdi), %rsi
|
|
/* Add 8 bytes to RSI since CALL will push the 8-byte return
|
|
address onto stack. */
|
|
leaq 8(%rsi), %rsp
|
|
/* Allocate the new shadow stack. The size of the new shadow
|
|
stack is passed in __ssp[1]. */
|
|
lea (oSSP + 8)(%rdi), %RSI_LP
|
|
movl $ARCH_CET_ALLOC_SHSTK, %edi
|
|
movl $__NR_arch_prctl, %eax
|
|
/* The new shadow stack base is returned in __ssp[1]. */
|
|
syscall
|
|
testq %rax, %rax
|
|
jne L(hlt) /* This should never happen. */
|
|
|
|
/* Get the size of the new shadow stack. */
|
|
movq 8(%rsi), %rdi
|
|
|
|
/* Get the base address of the new shadow stack. */
|
|
movq (%rsi), %rsi
|
|
|
|
/* Use the restore stoken to restore the new shadow stack. */
|
|
rstorssp -8(%rsi, %rdi)
|
|
|
|
/* Save the restore token on the original shadow stack. */
|
|
saveprevssp
|
|
|
|
/* Push the address of "jmp __start_context" onto the new stack
|
|
as well as the new shadow stack. */
|
|
call 1f
|
|
jmp __start_context
|
|
1:
|
|
|
|
/* Get the new shadow stack pointer. */
|
|
rdsspq %rdi
|
|
|
|
/* Use the restore stoken to restore the original shadow stack. */
|
|
rstorssp -8(%r8)
|
|
|
|
/* Save the restore token on the new shadow stack. */
|
|
saveprevssp
|
|
|
|
/* Store the new shadow stack pointer in __ssp[0]. */
|
|
movq %rdi, oSSP(%r9)
|
|
|
|
/* Restore the original stack. */
|
|
mov %rdx, %rsp
|
|
ret
|
|
END(__push___start_context)
|
|
#endif
|
|
|
|
/* This is the helper code which gets called if a function which is
|
|
registered with 'makecontext' returns. In this case we have to
|
|
install the context listed in the uc_link element of the context
|
|
'makecontext' manipulated at the time of the 'makecontext' call.
|
|
If the pointer is NULL the process must terminate. */
|
|
|
|
|
|
ENTRY(__start_context)
|
|
/* This removes the parameters passed to the function given to
|
|
'makecontext' from the stack. RBX contains the address
|
|
on the stack pointer for the next context. */
|
|
movq %rbx, %rsp
|
|
|
|
/* Don't use pop here so that stack is aligned to 16 bytes. */
|
|
movq (%rsp), %rdi /* This is the next context. */
|
|
testq %rdi, %rdi
|
|
je 2f /* If it is zero exit. */
|
|
|
|
call __setcontext
|
|
/* If this returns (which can happen if the syscall fails) we'll
|
|
exit the program with the return error value (-1). */
|
|
movq %rax,%rdi
|
|
|
|
2:
|
|
call HIDDEN_JUMPTARGET(exit)
|
|
/* The 'exit' call should never return. In case it does cause
|
|
the process to terminate. */
|
|
L(hlt):
|
|
hlt
|
|
END(__start_context)
|