]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/ia32/ia32entry.S
Merge tag 'pm+acpi-fixes-3.12-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...
[mirror_ubuntu-artful-kernel.git] / arch / x86 / ia32 / ia32entry.S
CommitLineData
1da177e4
LT
1/*
2 * Compatibility mode system call entry point for x86-64.
3 *
4 * Copyright 2000-2002 Andi Kleen, SuSE Labs.
5 */
6
7#include <asm/dwarf2.h>
8#include <asm/calling.h>
e2d5df93 9#include <asm/asm-offsets.h>
1da177e4
LT
10#include <asm/current.h>
11#include <asm/errno.h>
12#include <asm/ia32_unistd.h>
13#include <asm/thread_info.h>
14#include <asm/segment.h>
2601e64d 15#include <asm/irqflags.h>
1ce6f868 16#include <asm/asm.h>
63bcff2a 17#include <asm/smap.h>
1da177e4 18#include <linux/linkage.h>
d7e7528b 19#include <linux/err.h>
1da177e4 20
5cbf1565
RM
21/* Avoid __ASSEMBLER__'ifying <linux/audit.h> just for this. */
22#include <linux/elf-em.h>
23#define AUDIT_ARCH_I386 (EM_386|__AUDIT_ARCH_LE)
24#define __AUDIT_ARCH_LE 0x40000000
25
26#ifndef CONFIG_AUDITSYSCALL
24e35800
JB
27#define sysexit_audit ia32_ret_from_sys_call
28#define sysretl_audit ia32_ret_from_sys_call
5cbf1565
RM
29#endif
30
ea714547
JO
31 .section .entry.text, "ax"
32
1da177e4
LT
33 .macro IA32_ARG_FIXUP noebp=0
34 movl %edi,%r8d
35 .if \noebp
36 .else
37 movl %ebp,%r9d
38 .endif
39 xchg %ecx,%esi
40 movl %ebx,%edi
41 movl %edx,%edx /* zero extension */
42 .endm
43
44 /* clobbers %eax */
24e35800 45 .macro CLEAR_RREGS offset=0, _r9=rax
1da177e4 46 xorl %eax,%eax
24e35800
JB
47 movq %rax,\offset+R11(%rsp)
48 movq %rax,\offset+R10(%rsp)
49 movq %\_r9,\offset+R9(%rsp)
50 movq %rax,\offset+R8(%rsp)
1da177e4
LT
51 .endm
52
d4d67150
RM
53 /*
54 * Reload arg registers from stack in case ptrace changed them.
55 * We don't reload %eax because syscall_trace_enter() returned
eefdca04
RM
56 * the %rax value we should see. Instead, we just truncate that
57 * value to 32 bits again as we did on entry from user mode.
58 * If it's a new value set by user_regset during entry tracing,
59 * this matches the normal truncation of the user-mode value.
60 * If it's -1 to make us punt the syscall, then (u32)-1 is still
61 * an appropriately invalid value.
d4d67150 62 */
295286a8
JB
63 .macro LOAD_ARGS32 offset, _r9=0
64 .if \_r9
176df245 65 movl \offset+16(%rsp),%r9d
295286a8 66 .endif
176df245
AK
67 movl \offset+40(%rsp),%ecx
68 movl \offset+48(%rsp),%edx
69 movl \offset+56(%rsp),%esi
70 movl \offset+64(%rsp),%edi
eefdca04 71 movl %eax,%eax /* zero extension */
176df245
AK
72 .endm
73
2765130b
JB
74 .macro CFI_STARTPROC32 simple
75 CFI_STARTPROC \simple
76 CFI_UNDEFINED r8
77 CFI_UNDEFINED r9
78 CFI_UNDEFINED r10
79 CFI_UNDEFINED r11
80 CFI_UNDEFINED r12
81 CFI_UNDEFINED r13
82 CFI_UNDEFINED r14
83 CFI_UNDEFINED r15
84 .endm
85
2be29982
JF
86#ifdef CONFIG_PARAVIRT
87ENTRY(native_usergs_sysret32)
88 swapgs
89 sysretl
90ENDPROC(native_usergs_sysret32)
91
92ENTRY(native_irq_enable_sysexit)
93 swapgs
94 sti
95 sysexit
96ENDPROC(native_irq_enable_sysexit)
97#endif
98
1da177e4
LT
99/*
100 * 32bit SYSENTER instruction entry.
101 *
102 * Arguments:
103 * %eax System call number.
104 * %ebx Arg1
105 * %ecx Arg2
106 * %edx Arg3
107 * %esi Arg4
108 * %edi Arg5
109 * %ebp user stack
110 * 0(%ebp) Arg6
111 *
112 * Interrupts off.
113 *
114 * This is purely a fast path. For anything complicated we use the int 0x80
115 * path below. Set up a complete hardware stack frame to share code
116 * with the int 0x80 path.
117 */
118ENTRY(ia32_sysenter_target)
2765130b 119 CFI_STARTPROC32 simple
adf14236 120 CFI_SIGNAL_FRAME
7effaa88
JB
121 CFI_DEF_CFA rsp,0
122 CFI_REGISTER rsp,rbp
457da70e 123 SWAPGS_UNSAFE_STACK
9af45651
BG
124 movq PER_CPU_VAR(kernel_stack), %rsp
125 addq $(KERNEL_STACK_OFFSET),%rsp
2601e64d
IM
126 /*
127 * No need to follow this irqs on/off section: the syscall
128 * disabled irqs, here we enable it straight after entry:
129 */
66804154 130 ENABLE_INTERRUPTS(CLBR_NONE)
1da177e4 131 movl %ebp,%ebp /* zero extension */
60cf637a 132 pushq_cfi $__USER32_DS
7effaa88 133 /*CFI_REL_OFFSET ss,0*/
60cf637a 134 pushq_cfi %rbp
7effaa88 135 CFI_REL_OFFSET rsp,0
60cf637a 136 pushfq_cfi
7effaa88 137 /*CFI_REL_OFFSET rflags,0*/
46db09d3 138 movl TI_sysenter_return+THREAD_INFO(%rsp,3*8-KERNEL_STACK_OFFSET),%r10d
7effaa88 139 CFI_REGISTER rip,r10
60cf637a 140 pushq_cfi $__USER32_CS
7effaa88 141 /*CFI_REL_OFFSET cs,0*/
1da177e4 142 movl %eax, %eax
60cf637a 143 pushq_cfi %r10
7effaa88 144 CFI_REL_OFFSET rip,0
60cf637a 145 pushq_cfi %rax
1da177e4 146 cld
cac0e0a7 147 SAVE_ARGS 0,1,0
1da177e4
LT
148 /* no need to do an access_ok check here because rbp has been
149 32bit zero extended */
63bcff2a 150 ASM_STAC
295286a8 1511: movl (%rbp),%ebp
1ce6f868 152 _ASM_EXTABLE(1b,ia32_badarg)
63bcff2a 153 ASM_CLAC
46db09d3
JB
154 orl $TS_COMPAT,TI_status+THREAD_INFO(%rsp,RIP-ARGOFFSET)
155 testl $_TIF_WORK_SYSCALL_ENTRY,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
7effaa88 156 CFI_REMEMBER_STATE
1da177e4 157 jnz sysenter_tracesys
36d001c7 158 cmpq $(IA32_NR_syscalls-1),%rax
67d53ea5 159 ja ia32_badsys
d4d67150 160sysenter_do_call:
295286a8 161 IA32_ARG_FIXUP
5cbf1565 162sysenter_dispatch:
1da177e4
LT
163 call *ia32_sys_call_table(,%rax,8)
164 movq %rax,RAX-ARGOFFSET(%rsp)
66804154 165 DISABLE_INTERRUPTS(CLBR_NONE)
2601e64d 166 TRACE_IRQS_OFF
46db09d3 167 testl $_TIF_ALLWORK_MASK,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
5cbf1565
RM
168 jnz sysexit_audit
169sysexit_from_sys_call:
46db09d3 170 andl $~TS_COMPAT,TI_status+THREAD_INFO(%rsp,RIP-ARGOFFSET)
1da177e4
LT
171 /* clear IF, that popfq doesn't enable interrupts early */
172 andl $~0x200,EFLAGS-R11(%rsp)
36197c92
RM
173 movl RIP-R11(%rsp),%edx /* User %eip */
174 CFI_REGISTER rip,rdx
838feb47 175 RESTORE_ARGS 0,24,0,0,0,0
24e35800
JB
176 xorq %r8,%r8
177 xorq %r9,%r9
178 xorq %r10,%r10
179 xorq %r11,%r11
60cf637a 180 popfq_cfi
7effaa88 181 /*CFI_RESTORE rflags*/
60cf637a 182 popq_cfi %rcx /* User %esp */
7effaa88 183 CFI_REGISTER rsp,rcx
2601e64d 184 TRACE_IRQS_ON
2be29982 185 ENABLE_INTERRUPTS_SYSEXIT32
1da177e4 186
5cbf1565
RM
187#ifdef CONFIG_AUDITSYSCALL
188 .macro auditsys_entry_common
189 movl %esi,%r9d /* 6th arg: 4th syscall arg */
190 movl %edx,%r8d /* 5th arg: 3rd syscall arg */
191 /* (already in %ecx) 4th arg: 2nd syscall arg */
192 movl %ebx,%edx /* 3rd arg: 1st syscall arg */
193 movl %eax,%esi /* 2nd arg: syscall number */
194 movl $AUDIT_ARCH_I386,%edi /* 1st arg: audit arch */
b05d8447 195 call __audit_syscall_entry
5cbf1565 196 movl RAX-ARGOFFSET(%rsp),%eax /* reload syscall number */
36d001c7 197 cmpq $(IA32_NR_syscalls-1),%rax
5cbf1565
RM
198 ja ia32_badsys
199 movl %ebx,%edi /* reload 1st syscall arg */
200 movl RCX-ARGOFFSET(%rsp),%esi /* reload 2nd syscall arg */
201 movl RDX-ARGOFFSET(%rsp),%edx /* reload 3rd syscall arg */
202 movl RSI-ARGOFFSET(%rsp),%ecx /* reload 4th syscall arg */
203 movl RDI-ARGOFFSET(%rsp),%r8d /* reload 5th syscall arg */
204 .endm
205
81766741 206 .macro auditsys_exit exit
46db09d3 207 testl $(_TIF_ALLWORK_MASK & ~_TIF_SYSCALL_AUDIT),TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
24e35800 208 jnz ia32_ret_from_sys_call
5cbf1565 209 TRACE_IRQS_ON
40a1ef95 210 ENABLE_INTERRUPTS(CLBR_NONE)
5cbf1565 211 movl %eax,%esi /* second arg, syscall return value */
d7e7528b 212 cmpl $-MAX_ERRNO,%eax /* is it an error ? */
f031cd25
EP
213 jbe 1f
214 movslq %eax, %rsi /* if error sign extend to 64 bits */
2151: setbe %al /* 1 if error, 0 if not */
5cbf1565 216 movzbl %al,%edi /* zero-extend that into %edi */
d7e7528b
EP
217 call __audit_syscall_exit
218 movq RAX-ARGOFFSET(%rsp),%rax /* reload syscall return value */
5cbf1565 219 movl $(_TIF_ALLWORK_MASK & ~_TIF_SYSCALL_AUDIT),%edi
40a1ef95 220 DISABLE_INTERRUPTS(CLBR_NONE)
5cbf1565 221 TRACE_IRQS_OFF
46db09d3 222 testl %edi,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
24e35800
JB
223 jz \exit
224 CLEAR_RREGS -ARGOFFSET
225 jmp int_with_check
5cbf1565
RM
226 .endm
227
228sysenter_auditsys:
7effaa88 229 CFI_RESTORE_STATE
5cbf1565
RM
230 auditsys_entry_common
231 movl %ebp,%r9d /* reload 6th syscall arg */
232 jmp sysenter_dispatch
233
234sysexit_audit:
235 auditsys_exit sysexit_from_sys_call
236#endif
237
238sysenter_tracesys:
5cbf1565 239#ifdef CONFIG_AUDITSYSCALL
46db09d3 240 testl $(_TIF_WORK_SYSCALL_ENTRY & ~_TIF_SYSCALL_AUDIT),TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
5cbf1565
RM
241 jz sysenter_auditsys
242#endif
1da177e4
LT
243 SAVE_REST
244 CLEAR_RREGS
48ee679a 245 movq $-ENOSYS,RAX(%rsp)/* ptrace can change this for a bad syscall */
1da177e4
LT
246 movq %rsp,%rdi /* &pt_regs -> arg1 */
247 call syscall_trace_enter
176df245 248 LOAD_ARGS32 ARGOFFSET /* reload args from stack in case ptrace changed it */
1da177e4 249 RESTORE_REST
36d001c7 250 cmpq $(IA32_NR_syscalls-1),%rax
48ee679a 251 ja int_ret_from_sys_call /* sysenter_tracesys has set RAX(%rsp) */
1da177e4
LT
252 jmp sysenter_do_call
253 CFI_ENDPROC
4b787e0b 254ENDPROC(ia32_sysenter_target)
1da177e4
LT
255
256/*
257 * 32bit SYSCALL instruction entry.
258 *
259 * Arguments:
260 * %eax System call number.
261 * %ebx Arg1
262 * %ecx return EIP
263 * %edx Arg3
264 * %esi Arg4
265 * %edi Arg5
266 * %ebp Arg2 [note: not saved in the stack frame, should not be touched]
267 * %esp user stack
268 * 0(%esp) Arg6
269 *
270 * Interrupts off.
271 *
272 * This is purely a fast path. For anything complicated we use the int 0x80
273 * path below. Set up a complete hardware stack frame to share code
274 * with the int 0x80 path.
275 */
276ENTRY(ia32_cstar_target)
2765130b 277 CFI_STARTPROC32 simple
adf14236 278 CFI_SIGNAL_FRAME
9af45651 279 CFI_DEF_CFA rsp,KERNEL_STACK_OFFSET
7effaa88
JB
280 CFI_REGISTER rip,rcx
281 /*CFI_REGISTER rflags,r11*/
457da70e 282 SWAPGS_UNSAFE_STACK
1da177e4 283 movl %esp,%r8d
7effaa88 284 CFI_REGISTER rsp,r8
9af45651 285 movq PER_CPU_VAR(kernel_stack),%rsp
2601e64d
IM
286 /*
287 * No need to follow this irqs on/off section: the syscall
288 * disabled irqs and here we enable it straight after entry:
289 */
66804154 290 ENABLE_INTERRUPTS(CLBR_NONE)
cac0e0a7 291 SAVE_ARGS 8,0,0
1da177e4
LT
292 movl %eax,%eax /* zero extension */
293 movq %rax,ORIG_RAX-ARGOFFSET(%rsp)
294 movq %rcx,RIP-ARGOFFSET(%rsp)
7effaa88 295 CFI_REL_OFFSET rip,RIP-ARGOFFSET
1da177e4
LT
296 movq %rbp,RCX-ARGOFFSET(%rsp) /* this lies slightly to ptrace */
297 movl %ebp,%ecx
298 movq $__USER32_CS,CS-ARGOFFSET(%rsp)
299 movq $__USER32_DS,SS-ARGOFFSET(%rsp)
300 movq %r11,EFLAGS-ARGOFFSET(%rsp)
7effaa88 301 /*CFI_REL_OFFSET rflags,EFLAGS-ARGOFFSET*/
1da177e4 302 movq %r8,RSP-ARGOFFSET(%rsp)
7effaa88 303 CFI_REL_OFFSET rsp,RSP-ARGOFFSET
1da177e4
LT
304 /* no need to do an access_ok check here because r8 has been
305 32bit zero extended */
306 /* hardware stack frame is complete now */
63bcff2a 307 ASM_STAC
1da177e4 3081: movl (%r8),%r9d
a3e859fe 309 _ASM_EXTABLE(1b,ia32_badarg)
63bcff2a 310 ASM_CLAC
46db09d3
JB
311 orl $TS_COMPAT,TI_status+THREAD_INFO(%rsp,RIP-ARGOFFSET)
312 testl $_TIF_WORK_SYSCALL_ENTRY,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
7effaa88 313 CFI_REMEMBER_STATE
1da177e4 314 jnz cstar_tracesys
36d001c7 315 cmpq $IA32_NR_syscalls-1,%rax
67d53ea5 316 ja ia32_badsys
295286a8 317cstar_do_call:
1da177e4 318 IA32_ARG_FIXUP 1
5cbf1565 319cstar_dispatch:
1da177e4
LT
320 call *ia32_sys_call_table(,%rax,8)
321 movq %rax,RAX-ARGOFFSET(%rsp)
66804154 322 DISABLE_INTERRUPTS(CLBR_NONE)
2601e64d 323 TRACE_IRQS_OFF
46db09d3 324 testl $_TIF_ALLWORK_MASK,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
5cbf1565
RM
325 jnz sysretl_audit
326sysretl_from_sys_call:
46db09d3 327 andl $~TS_COMPAT,TI_status+THREAD_INFO(%rsp,RIP-ARGOFFSET)
838feb47 328 RESTORE_ARGS 0,-ARG_SKIP,0,0,0
1da177e4 329 movl RIP-ARGOFFSET(%rsp),%ecx
7effaa88 330 CFI_REGISTER rip,rcx
1da177e4 331 movl EFLAGS-ARGOFFSET(%rsp),%r11d
7effaa88 332 /*CFI_REGISTER rflags,r11*/
24e35800
JB
333 xorq %r10,%r10
334 xorq %r9,%r9
335 xorq %r8,%r8
2601e64d 336 TRACE_IRQS_ON
1da177e4 337 movl RSP-ARGOFFSET(%rsp),%esp
7effaa88 338 CFI_RESTORE rsp
2be29982 339 USERGS_SYSRET32
1da177e4 340
5cbf1565
RM
341#ifdef CONFIG_AUDITSYSCALL
342cstar_auditsys:
7effaa88 343 CFI_RESTORE_STATE
5cbf1565
RM
344 movl %r9d,R9-ARGOFFSET(%rsp) /* register to be clobbered by call */
345 auditsys_entry_common
346 movl R9-ARGOFFSET(%rsp),%r9d /* reload 6th syscall arg */
347 jmp cstar_dispatch
348
349sysretl_audit:
81766741 350 auditsys_exit sysretl_from_sys_call
5cbf1565
RM
351#endif
352
353cstar_tracesys:
354#ifdef CONFIG_AUDITSYSCALL
46db09d3 355 testl $(_TIF_WORK_SYSCALL_ENTRY & ~_TIF_SYSCALL_AUDIT),TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
5cbf1565
RM
356 jz cstar_auditsys
357#endif
ecd744ee 358 xchgl %r9d,%ebp
1da177e4 359 SAVE_REST
24e35800 360 CLEAR_RREGS 0, r9
48ee679a 361 movq $-ENOSYS,RAX(%rsp) /* ptrace can change this for a bad syscall */
1da177e4
LT
362 movq %rsp,%rdi /* &pt_regs -> arg1 */
363 call syscall_trace_enter
295286a8 364 LOAD_ARGS32 ARGOFFSET, 1 /* reload args from stack in case ptrace changed it */
1da177e4 365 RESTORE_REST
ecd744ee 366 xchgl %ebp,%r9d
36d001c7 367 cmpq $(IA32_NR_syscalls-1),%rax
48ee679a 368 ja int_ret_from_sys_call /* cstar_tracesys has set RAX(%rsp) */
1da177e4 369 jmp cstar_do_call
4b787e0b 370END(ia32_cstar_target)
1da177e4
LT
371
372ia32_badarg:
63bcff2a 373 ASM_CLAC
1da177e4
LT
374 movq $-EFAULT,%rax
375 jmp ia32_sysret
376 CFI_ENDPROC
377
378/*
379 * Emulated IA32 system calls via int 0x80.
380 *
381 * Arguments:
382 * %eax System call number.
383 * %ebx Arg1
384 * %ecx Arg2
385 * %edx Arg3
386 * %esi Arg4
387 * %edi Arg5
388 * %ebp Arg6 [note: not saved in the stack frame, should not be touched]
389 *
390 * Notes:
391 * Uses the same stack frame as the x86-64 version.
392 * All registers except %eax must be saved (but ptrace may violate that)
393 * Arguments are zero extended. For system calls that want sign extension and
394 * take long arguments a wrapper is needed. Most calls can just be called
395 * directly.
396 * Assumes it is only called from user space and entered with interrupts off.
397 */
398
399ENTRY(ia32_syscall)
cdc1793e 400 CFI_STARTPROC32 simple
adf14236 401 CFI_SIGNAL_FRAME
7effaa88
JB
402 CFI_DEF_CFA rsp,SS+8-RIP
403 /*CFI_REL_OFFSET ss,SS-RIP*/
404 CFI_REL_OFFSET rsp,RSP-RIP
405 /*CFI_REL_OFFSET rflags,EFLAGS-RIP*/
406 /*CFI_REL_OFFSET cs,CS-RIP*/
407 CFI_REL_OFFSET rip,RIP-RIP
360c044e 408 PARAVIRT_ADJUST_EXCEPTION_FRAME
66804154 409 SWAPGS
2601e64d
IM
410 /*
411 * No need to follow this irqs on/off section: the syscall
412 * disabled irqs and here we enable it straight after entry:
413 */
66804154 414 ENABLE_INTERRUPTS(CLBR_NONE)
1da177e4 415 movl %eax,%eax
60cf637a 416 pushq_cfi %rax
1da177e4
LT
417 cld
418 /* note the registers are not zero extended to the sf.
419 this could be a problem. */
cac0e0a7 420 SAVE_ARGS 0,1,0
46db09d3
JB
421 orl $TS_COMPAT,TI_status+THREAD_INFO(%rsp,RIP-ARGOFFSET)
422 testl $_TIF_WORK_SYSCALL_ENTRY,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
1da177e4 423 jnz ia32_tracesys
36d001c7 424 cmpq $(IA32_NR_syscalls-1),%rax
c09249f8
RM
425 ja ia32_badsys
426ia32_do_call:
1da177e4
LT
427 IA32_ARG_FIXUP
428 call *ia32_sys_call_table(,%rax,8) # xxx: rip relative
429ia32_sysret:
430 movq %rax,RAX-ARGOFFSET(%rsp)
24e35800
JB
431ia32_ret_from_sys_call:
432 CLEAR_RREGS -ARGOFFSET
1da177e4
LT
433 jmp int_ret_from_sys_call
434
435ia32_tracesys:
436 SAVE_REST
cdc1793e 437 CLEAR_RREGS
8ab32bb8 438 movq $-ENOSYS,RAX(%rsp) /* ptrace can change this for a bad syscall */
1da177e4
LT
439 movq %rsp,%rdi /* &pt_regs -> arg1 */
440 call syscall_trace_enter
176df245 441 LOAD_ARGS32 ARGOFFSET /* reload args from stack in case ptrace changed it */
1da177e4 442 RESTORE_REST
36d001c7 443 cmpq $(IA32_NR_syscalls-1),%rax
c09249f8
RM
444 ja int_ret_from_sys_call /* ia32_tracesys has set RAX(%rsp) */
445 jmp ia32_do_call
4b787e0b 446END(ia32_syscall)
1da177e4
LT
447
448ia32_badsys:
449 movq $0,ORIG_RAX-ARGOFFSET(%rsp)
24e35800
JB
450 movq $-ENOSYS,%rax
451 jmp ia32_sysret
1da177e4 452
1da177e4
LT
453 CFI_ENDPROC
454
d2475b8f 455 .macro PTREGSCALL label, func
f6b2bc84
JB
456 ALIGN
457GLOBAL(\label)
1da177e4 458 leaq \func(%rip),%rax
1da177e4
LT
459 jmp ia32_ptregs_common
460 .endm
461
2765130b 462 CFI_STARTPROC32
7effaa88 463
3fe26fa3
AV
464 PTREGSCALL stub32_rt_sigreturn, sys32_rt_sigreturn
465 PTREGSCALL stub32_sigreturn, sys32_sigreturn
466 PTREGSCALL stub32_execve, compat_sys_execve
467 PTREGSCALL stub32_fork, sys_fork
468 PTREGSCALL stub32_vfork, sys_vfork
1da177e4 469
1d4b4b29
AV
470 ALIGN
471GLOBAL(stub32_clone)
472 leaq sys_clone(%rip),%rax
473 mov %r8, %rcx
474 jmp ia32_ptregs_common
475
f6b2bc84
JB
476 ALIGN
477ia32_ptregs_common:
1da177e4 478 popq %r11
2765130b
JB
479 CFI_ENDPROC
480 CFI_STARTPROC32 simple
adf14236 481 CFI_SIGNAL_FRAME
2765130b
JB
482 CFI_DEF_CFA rsp,SS+8-ARGOFFSET
483 CFI_REL_OFFSET rax,RAX-ARGOFFSET
484 CFI_REL_OFFSET rcx,RCX-ARGOFFSET
485 CFI_REL_OFFSET rdx,RDX-ARGOFFSET
486 CFI_REL_OFFSET rsi,RSI-ARGOFFSET
487 CFI_REL_OFFSET rdi,RDI-ARGOFFSET
488 CFI_REL_OFFSET rip,RIP-ARGOFFSET
489/* CFI_REL_OFFSET cs,CS-ARGOFFSET*/
490/* CFI_REL_OFFSET rflags,EFLAGS-ARGOFFSET*/
491 CFI_REL_OFFSET rsp,RSP-ARGOFFSET
492/* CFI_REL_OFFSET ss,SS-ARGOFFSET*/
1da177e4
LT
493 SAVE_REST
494 call *%rax
495 RESTORE_REST
496 jmp ia32_sysret /* misbalances the return cache */
497 CFI_ENDPROC
4b787e0b 498END(ia32_ptregs_common)