2 * linux/arch/x86_64/entry.S
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 * Copyright (C) 2000, 2001, 2002 Andi Kleen SuSE Labs
6 * Copyright (C) 2000 Pavel Machek <pavel@suse.cz>
10 * entry.S contains the system-call and fault low-level handling routines.
12 * NOTE: This code handles signal-recognition, which happens every time
13 * after an interrupt and after each system call.
15 * Normal syscalls and interrupts don't save a full stack frame, this is
16 * only done for syscall tracing, signals or fork/exec et.al.
18 * A note on terminology:
19 * - top of stack: Architecture defined interrupt frame from SS to RIP
20 * at the top of the kernel process stack.
21 * - partial stack frame: partially saved registers upto R11.
22 * - full stack frame: Like partial stack frame, but all register saved.
25 * - CFI macros are used to generate dwarf2 unwind information for better
26 * backtraces. They don't change any code.
27 * - SAVE_ALL/RESTORE_ALL - Save/restore all registers
28 * - SAVE_ARGS/RESTORE_ARGS - Save/restore registers that C functions modify.
29 * There are unfortunately lots of special cases where some registers
30 * not touched. The macro is a big mess that should be cleaned up.
31 * - SAVE_REST/RESTORE_REST - Handle the registers not saved by SAVE_ARGS.
32 * Gives a full stack frame.
33 * - ENTRY/END Define functions in the symbol table.
34 * - FIXUP_TOP_OF_STACK/RESTORE_TOP_OF_STACK - Fix up the hardware stack
35 * frame that is otherwise undefined after a SYSCALL
36 * - TRACE_IRQ_* - Trace hard interrupt state for lock debugging.
37 * - errorentry/paranoidentry/zeroentry - Define exception entry points.
40 #include <linux/linkage.h>
41 #include <asm/segment.h>
42 #include <asm/cache.h>
43 #include <asm/errno.h>
44 #include <asm/dwarf2.h>
45 #include <asm/calling.h>
46 #include <asm/asm-offsets.h>
48 #include <asm/unistd.h>
49 #include <asm/thread_info.h>
50 #include <asm/hw_irq.h>
52 #include <asm/irqflags.h>
53 #include <asm/paravirt.h>
54 #include <asm/ftrace.h>
56 /* Avoid __ASSEMBLER__'ifying <linux/audit.h> just for this. */
57 #include <linux/elf-em.h>
58 #define AUDIT_ARCH_X86_64 (EM_X86_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
59 #define __AUDIT_ARCH_64BIT 0x80000000
60 #define __AUDIT_ARCH_LE 0x40000000
64 * Some macro's to hide the most frequently occuring CFI annotations.
68 CFI_ADJUST_CFA_OFFSET 8
73 CFI_ADJUST_CFA_OFFSET -8
76 .macro movq_cfi reg offset=0
77 movq %\reg, \offset(%rsp)
78 CFI_REL_OFFSET \reg, \offset
81 #ifdef CONFIG_FUNCTION_TRACER
82 #ifdef CONFIG_DYNAMIC_FTRACE
89 /* taken from glibc */
101 subq $MCOUNT_INSN_SIZE, %rdi
121 #else /* ! CONFIG_DYNAMIC_FTRACE */
123 cmpq $ftrace_stub, ftrace_trace_function
130 /* taken from glibc */
140 movq 0x38(%rsp), %rdi
142 subq $MCOUNT_INSN_SIZE, %rdi
144 call *ftrace_trace_function
157 #endif /* CONFIG_DYNAMIC_FTRACE */
158 #endif /* CONFIG_FUNCTION_TRACER */
160 #ifndef CONFIG_PREEMPT
161 #define retint_kernel retint_restore_args
164 #ifdef CONFIG_PARAVIRT
165 ENTRY(native_usergs_sysret64)
168 #endif /* CONFIG_PARAVIRT */
171 .macro TRACE_IRQS_IRETQ offset=ARGOFFSET
172 #ifdef CONFIG_TRACE_IRQFLAGS
173 bt $9,EFLAGS-\offset(%rsp) /* interrupts off? */
181 * C code is not supposed to know about undefined top of stack. Every time
182 * a C function with an pt_regs argument is called from the SYSCALL based
183 * fast path FIXUP_TOP_OF_STACK is needed.
184 * RESTORE_TOP_OF_STACK syncs the syscall state after any possible ptregs
188 /* %rsp:at FRAMEEND */
189 .macro FIXUP_TOP_OF_STACK tmp
190 movq %gs:pda_oldrsp,\tmp
192 movq $__USER_DS,SS(%rsp)
193 movq $__USER_CS,CS(%rsp)
195 movq R11(%rsp),\tmp /* get eflags */
196 movq \tmp,EFLAGS(%rsp)
199 .macro RESTORE_TOP_OF_STACK tmp,offset=0
200 movq RSP-\offset(%rsp),\tmp
201 movq \tmp,%gs:pda_oldrsp
202 movq EFLAGS-\offset(%rsp),\tmp
203 movq \tmp,R11-\offset(%rsp)
206 .macro FAKE_STACK_FRAME child_rip
207 /* push in order ss, rsp, eflags, cs, rip */
209 pushq $__KERNEL_DS /* ss */
210 CFI_ADJUST_CFA_OFFSET 8
211 /*CFI_REL_OFFSET ss,0*/
213 CFI_ADJUST_CFA_OFFSET 8
215 pushq $(1<<9) /* eflags - interrupts on */
216 CFI_ADJUST_CFA_OFFSET 8
217 /*CFI_REL_OFFSET rflags,0*/
218 pushq $__KERNEL_CS /* cs */
219 CFI_ADJUST_CFA_OFFSET 8
220 /*CFI_REL_OFFSET cs,0*/
221 pushq \child_rip /* rip */
222 CFI_ADJUST_CFA_OFFSET 8
224 pushq %rax /* orig rax */
225 CFI_ADJUST_CFA_OFFSET 8
228 .macro UNFAKE_STACK_FRAME
230 CFI_ADJUST_CFA_OFFSET -(6*8)
234 * initial frame state for interrupts (and exceptions without error code)
236 .macro EMPTY_FRAME start=1 offset=0
240 CFI_DEF_CFA rsp,8+\offset
242 CFI_DEF_CFA_OFFSET 8+\offset
247 * initial frame state for interrupts (and exceptions without error code)
249 .macro INTR_FRAME start=1 offset=0
250 EMPTY_FRAME \start, SS+8+\offset-RIP
251 /*CFI_REL_OFFSET ss, SS+\offset-RIP*/
252 CFI_REL_OFFSET rsp, RSP+\offset-RIP
253 /*CFI_REL_OFFSET rflags, EFLAGS+\offset-RIP*/
254 /*CFI_REL_OFFSET cs, CS+\offset-RIP*/
255 CFI_REL_OFFSET rip, RIP+\offset-RIP
259 * initial frame state for exceptions with error code (and interrupts
260 * with vector already pushed)
262 .macro XCPT_FRAME start=1 offset=0
263 INTR_FRAME \start, RIP+\offset-ORIG_RAX
264 /*CFI_REL_OFFSET orig_rax, ORIG_RAX-ORIG_RAX*/
268 * frame that enables calling into C.
270 .macro PARTIAL_FRAME start=1 offset=0
271 XCPT_FRAME \start, ORIG_RAX+\offset-ARGOFFSET
272 CFI_REL_OFFSET rdi, RDI+\offset-ARGOFFSET
273 CFI_REL_OFFSET rsi, RSI+\offset-ARGOFFSET
274 CFI_REL_OFFSET rdx, RDX+\offset-ARGOFFSET
275 CFI_REL_OFFSET rcx, RCX+\offset-ARGOFFSET
276 CFI_REL_OFFSET rax, RAX+\offset-ARGOFFSET
277 CFI_REL_OFFSET r8, R8+\offset-ARGOFFSET
278 CFI_REL_OFFSET r9, R9+\offset-ARGOFFSET
279 CFI_REL_OFFSET r10, R10+\offset-ARGOFFSET
280 CFI_REL_OFFSET r11, R11+\offset-ARGOFFSET
284 * frame that enables passing a complete pt_regs to a C function.
286 .macro DEFAULT_FRAME start=1 offset=0
287 PARTIAL_FRAME \start, R11+\offset-R15
288 CFI_REL_OFFSET rbx, RBX+\offset
289 CFI_REL_OFFSET rbp, RBP+\offset
290 CFI_REL_OFFSET r12, R12+\offset
291 CFI_REL_OFFSET r13, R13+\offset
292 CFI_REL_OFFSET r14, R14+\offset
293 CFI_REL_OFFSET r15, R15+\offset
296 /* save partial stack frame */
300 movq_cfi rdi, RDI+16-ARGOFFSET
301 movq_cfi rsi, RSI+16-ARGOFFSET
302 movq_cfi rdx, RDX+16-ARGOFFSET
303 movq_cfi rcx, RCX+16-ARGOFFSET
304 movq_cfi rax, RAX+16-ARGOFFSET
305 movq_cfi r8, R8+16-ARGOFFSET
306 movq_cfi r9, R9+16-ARGOFFSET
307 movq_cfi r10, R10+16-ARGOFFSET
308 movq_cfi r11, R11+16-ARGOFFSET
310 leaq -ARGOFFSET+16(%rsp),%rdi /* arg1 for handler */
311 movq_cfi rbp, 8 /* push %rbp */
312 leaq 8(%rsp), %rbp /* mov %rsp, %ebp */
317 * irqcount is used to check if a CPU is already on an interrupt stack
318 * or not. While this is essentially redundant with preempt_count it is
319 * a little cheaper to use a separate counter in the PDA (short of
320 * moving irq_enter into assembly, which would be too much work)
322 1: incl %gs:pda_irqcount
324 popq_cfi %rax /* move return address... */
325 mov %gs:pda_irqstackptr,%rsp
327 pushq_cfi %rax /* ... to the new stack */
329 * We entered an interrupt context - irqs are off:
337 * A newly forked process directly context switches into this.
342 push kernel_eflags(%rip)
343 CFI_ADJUST_CFA_OFFSET 8
344 popf # reset kernel eflags
345 CFI_ADJUST_CFA_OFFSET -8
347 GET_THREAD_INFO(%rcx)
348 testl $(_TIF_SYSCALL_TRACE|_TIF_SYSCALL_AUDIT),TI_flags(%rcx)
352 testl $3,CS-ARGOFFSET(%rsp) # from kernel_thread?
353 je int_ret_from_sys_call
354 testl $_TIF_IA32,TI_flags(%rcx)
355 jnz int_ret_from_sys_call
356 RESTORE_TOP_OF_STACK %rdi,ARGOFFSET
357 jmp ret_from_sys_call
360 call syscall_trace_leave
361 GET_THREAD_INFO(%rcx)
367 * System call entry. Upto 6 arguments in registers are supported.
369 * SYSCALL does not save anything on the stack and does not change the
375 * rax system call number
377 * rcx return address for syscall/sysret, C arg3
380 * r10 arg3 (--> moved to rcx for C)
383 * r11 eflags for syscall/sysret, temporary for C
384 * r12-r15,rbp,rbx saved by C code, not touched.
386 * Interrupts are off on entry.
387 * Only called from user space.
389 * XXX if we had a free scratch register we could save the RSP into the stack frame
390 * and report it properly in ps. Unfortunately we haven't.
392 * When user can change the frames always force IRET. That is because
393 * it deals with uncanonical addresses better. SYSRET has trouble
394 * with them due to bugs in both AMD and Intel CPUs.
400 CFI_DEF_CFA rsp,PDA_STACKOFFSET
402 /*CFI_REGISTER rflags,r11*/
405 * A hypervisor implementation might want to use a label
406 * after the swapgs, so that it can do the swapgs
407 * for the guest and jump here on syscall.
409 ENTRY(system_call_after_swapgs)
411 movq %rsp,%gs:pda_oldrsp
412 movq %gs:pda_kernelstack,%rsp
414 * No need to follow this irqs off/on section - it's straight
417 ENABLE_INTERRUPTS(CLBR_NONE)
419 movq %rax,ORIG_RAX-ARGOFFSET(%rsp)
420 movq %rcx,RIP-ARGOFFSET(%rsp)
421 CFI_REL_OFFSET rip,RIP-ARGOFFSET
422 GET_THREAD_INFO(%rcx)
423 testl $_TIF_WORK_SYSCALL_ENTRY,TI_flags(%rcx)
425 system_call_fastpath:
426 cmpq $__NR_syscall_max,%rax
429 call *sys_call_table(,%rax,8) # XXX: rip relative
430 movq %rax,RAX-ARGOFFSET(%rsp)
432 * Syscall return path ending with SYSRET (fast path)
433 * Has incomplete stack frame and undefined top of stack.
436 movl $_TIF_ALLWORK_MASK,%edi
440 GET_THREAD_INFO(%rcx)
441 DISABLE_INTERRUPTS(CLBR_NONE)
443 movl TI_flags(%rcx),%edx
448 * sysretq will re-enable interrupts:
451 movq RIP-ARGOFFSET(%rsp),%rcx
453 RESTORE_ARGS 0,-ARG_SKIP,1
454 /*CFI_REGISTER rflags,r11*/
455 movq %gs:pda_oldrsp, %rsp
459 /* Handle reschedules */
460 /* edx: work, edi: workmask */
462 bt $TIF_NEED_RESCHED,%edx
465 ENABLE_INTERRUPTS(CLBR_NONE)
467 CFI_ADJUST_CFA_OFFSET 8
470 CFI_ADJUST_CFA_OFFSET -8
473 /* Handle a signal */
476 ENABLE_INTERRUPTS(CLBR_NONE)
477 #ifdef CONFIG_AUDITSYSCALL
478 bt $TIF_SYSCALL_AUDIT,%edx
481 /* edx: work flags (arg3) */
482 leaq do_notify_resume(%rip),%rax
483 leaq -ARGOFFSET(%rsp),%rdi # &pt_regs -> arg1
484 xorl %esi,%esi # oldset -> arg2
485 call ptregscall_common
486 movl $_TIF_WORK_MASK,%edi
487 /* Use IRET because user could have changed frame. This
488 works because ptregscall_common has called FIXUP_TOP_OF_STACK. */
489 DISABLE_INTERRUPTS(CLBR_NONE)
494 movq $-ENOSYS,RAX-ARGOFFSET(%rsp)
495 jmp ret_from_sys_call
497 #ifdef CONFIG_AUDITSYSCALL
499 * Fast path for syscall audit without full syscall trace.
500 * We just call audit_syscall_entry() directly, and then
501 * jump back to the normal fast path.
504 movq %r10,%r9 /* 6th arg: 4th syscall arg */
505 movq %rdx,%r8 /* 5th arg: 3rd syscall arg */
506 movq %rsi,%rcx /* 4th arg: 2nd syscall arg */
507 movq %rdi,%rdx /* 3rd arg: 1st syscall arg */
508 movq %rax,%rsi /* 2nd arg: syscall number */
509 movl $AUDIT_ARCH_X86_64,%edi /* 1st arg: audit arch */
510 call audit_syscall_entry
511 LOAD_ARGS 0 /* reload call-clobbered registers */
512 jmp system_call_fastpath
515 * Return fast path for syscall audit. Call audit_syscall_exit()
516 * directly and then jump back to the fast path with TIF_SYSCALL_AUDIT
520 movq %rax,%rsi /* second arg, syscall return value */
521 cmpq $0,%rax /* is it < 0? */
522 setl %al /* 1 if so, 0 if not */
523 movzbl %al,%edi /* zero-extend that into %edi */
524 inc %edi /* first arg, 0->1(AUDITSC_SUCCESS), 1->2(AUDITSC_FAILURE) */
525 call audit_syscall_exit
526 movl $(_TIF_ALLWORK_MASK & ~_TIF_SYSCALL_AUDIT),%edi
528 #endif /* CONFIG_AUDITSYSCALL */
530 /* Do syscall tracing */
532 #ifdef CONFIG_AUDITSYSCALL
533 testl $(_TIF_WORK_SYSCALL_ENTRY & ~_TIF_SYSCALL_AUDIT),TI_flags(%rcx)
537 movq $-ENOSYS,RAX(%rsp) /* ptrace can change this for a bad syscall */
538 FIXUP_TOP_OF_STACK %rdi
540 call syscall_trace_enter
542 * Reload arg registers from stack in case ptrace changed them.
543 * We don't reload %rax because syscall_trace_enter() returned
544 * the value it wants us to use in the table lookup.
546 LOAD_ARGS ARGOFFSET, 1
548 cmpq $__NR_syscall_max,%rax
549 ja int_ret_from_sys_call /* RAX(%rsp) set to -ENOSYS above */
550 movq %r10,%rcx /* fixup for C */
551 call *sys_call_table(,%rax,8)
552 movq %rax,RAX-ARGOFFSET(%rsp)
553 /* Use IRET because user could have changed frame */
556 * Syscall return path ending with IRET.
557 * Has correct top of stack, but partial stack frame.
559 .globl int_ret_from_sys_call
560 .globl int_with_check
561 int_ret_from_sys_call:
562 DISABLE_INTERRUPTS(CLBR_NONE)
564 testl $3,CS-ARGOFFSET(%rsp)
565 je retint_restore_args
566 movl $_TIF_ALLWORK_MASK,%edi
567 /* edi: mask to check */
570 GET_THREAD_INFO(%rcx)
571 movl TI_flags(%rcx),%edx
574 andl $~TS_COMPAT,TI_status(%rcx)
577 /* Either reschedule or signal or syscall exit tracking needed. */
578 /* First do a reschedule test. */
579 /* edx: work, edi: workmask */
581 bt $TIF_NEED_RESCHED,%edx
584 ENABLE_INTERRUPTS(CLBR_NONE)
586 CFI_ADJUST_CFA_OFFSET 8
589 CFI_ADJUST_CFA_OFFSET -8
590 DISABLE_INTERRUPTS(CLBR_NONE)
594 /* handle signals and tracing -- both require a full stack frame */
597 ENABLE_INTERRUPTS(CLBR_NONE)
599 /* Check for syscall exit trace */
600 testl $_TIF_WORK_SYSCALL_EXIT,%edx
603 CFI_ADJUST_CFA_OFFSET 8
604 leaq 8(%rsp),%rdi # &ptregs -> arg1
605 call syscall_trace_leave
607 CFI_ADJUST_CFA_OFFSET -8
608 andl $~(_TIF_WORK_SYSCALL_EXIT|_TIF_SYSCALL_EMU),%edi
612 testl $_TIF_DO_NOTIFY_MASK,%edx
614 movq %rsp,%rdi # &ptregs -> arg1
615 xorl %esi,%esi # oldset -> arg2
616 call do_notify_resume
617 1: movl $_TIF_WORK_MASK,%edi
620 DISABLE_INTERRUPTS(CLBR_NONE)
627 * Certain special system calls that need to save a complete full stack frame.
630 .macro PTREGSCALL label,func,arg
633 leaq \func(%rip),%rax
634 leaq -ARGOFFSET+8(%rsp),\arg /* 8 for return address */
635 jmp ptregscall_common
641 PTREGSCALL stub_clone, sys_clone, %r8
642 PTREGSCALL stub_fork, sys_fork, %rdi
643 PTREGSCALL stub_vfork, sys_vfork, %rdi
644 PTREGSCALL stub_sigaltstack, sys_sigaltstack, %rdx
645 PTREGSCALL stub_iopl, sys_iopl, %rsi
647 ENTRY(ptregscall_common)
649 CFI_ADJUST_CFA_OFFSET -8
650 CFI_REGISTER rip, r11
653 CFI_REGISTER rip, r15
654 FIXUP_TOP_OF_STACK %r11
656 RESTORE_TOP_OF_STACK %r11
658 CFI_REGISTER rip, r11
661 CFI_ADJUST_CFA_OFFSET 8
662 CFI_REL_OFFSET rip, 0
665 END(ptregscall_common)
670 CFI_ADJUST_CFA_OFFSET -8
671 CFI_REGISTER rip, r11
673 FIXUP_TOP_OF_STACK %r11
676 RESTORE_TOP_OF_STACK %r11
679 jmp int_ret_from_sys_call
684 * sigreturn is special because it needs to restore all registers on return.
685 * This cannot be done with SYSRET, so use the IRET return path instead.
687 ENTRY(stub_rt_sigreturn)
690 CFI_ADJUST_CFA_OFFSET -8
693 FIXUP_TOP_OF_STACK %r11
694 call sys_rt_sigreturn
695 movq %rax,RAX(%rsp) # fixme, this could be done at the higher layer
697 jmp int_ret_from_sys_call
699 END(stub_rt_sigreturn)
702 * Build the entry stubs and pointer table with some assembler magic.
703 * We pack 7 stubs into a single 32-byte chunk, which will fit in a
704 * single cache line on all modern x86 implementations.
706 .section .init.rodata,"a"
710 .p2align CONFIG_X86_L1_CACHE_SHIFT
711 ENTRY(irq_entries_start)
713 vector=FIRST_EXTERNAL_VECTOR
714 .rept (NR_VECTORS-FIRST_EXTERNAL_VECTOR+6)/7
717 .if vector < NR_VECTORS
718 .if vector <> FIRST_EXTERNAL_VECTOR
719 CFI_ADJUST_CFA_OFFSET -8
721 1: pushq $(~vector+0x80) /* Note: always in signed byte range */
722 CFI_ADJUST_CFA_OFFSET 8
723 .if ((vector-FIRST_EXTERNAL_VECTOR)%7) <> 6
732 2: jmp common_interrupt
735 END(irq_entries_start)
742 * Interrupt entry/exit.
744 * Interrupt entry points save only callee clobbered registers in fast path.
746 * Entry runs with interrupts off.
749 /* 0(%rsp): ~(interrupt number) */
750 .macro interrupt func
752 CFI_ADJUST_CFA_OFFSET 10*8
759 * The interrupt stubs push (~vector+0x80) onto the stack and
760 * then jump to common_interrupt.
762 .p2align CONFIG_X86_L1_CACHE_SHIFT
765 addq $-0x80,(%rsp) /* Adjust vector to [-256,-1] range */
767 /* 0(%rsp): oldrsp-ARGOFFSET */
769 DISABLE_INTERRUPTS(CLBR_NONE)
771 decl %gs:pda_irqcount
773 CFI_DEF_CFA_REGISTER rsp
774 CFI_ADJUST_CFA_OFFSET -8
776 GET_THREAD_INFO(%rcx)
777 testl $3,CS-ARGOFFSET(%rsp)
780 /* Interrupt came from user space */
782 * Has a correct top of stack, but a partial stack frame
783 * %rcx: thread info. Interrupts off.
785 retint_with_reschedule:
786 movl $_TIF_WORK_MASK,%edi
789 movl TI_flags(%rcx),%edx
794 retint_swapgs: /* return to user-space */
796 * The iretq could re-enable interrupts:
798 DISABLE_INTERRUPTS(CLBR_ANY)
803 retint_restore_args: /* return to kernel space */
804 DISABLE_INTERRUPTS(CLBR_ANY)
806 * The iretq could re-enable interrupts:
815 .section __ex_table, "a"
816 .quad irq_return, bad_iret
819 #ifdef CONFIG_PARAVIRT
823 .section __ex_table,"a"
824 .quad native_iret, bad_iret
831 * The iret traps when the %cs or %ss being restored is bogus.
832 * We've lost the original trap vector and error code.
833 * #GPF is the most likely one to get for an invalid selector.
834 * So pretend we completed the iret and took the #GPF in user mode.
836 * We are now running with the kernel GS after exception recovery.
837 * But error_entry expects us to have user GS to match the user %cs,
843 jmp general_protection
847 /* edi: workmask, edx: work */
850 bt $TIF_NEED_RESCHED,%edx
853 ENABLE_INTERRUPTS(CLBR_NONE)
855 CFI_ADJUST_CFA_OFFSET 8
858 CFI_ADJUST_CFA_OFFSET -8
859 GET_THREAD_INFO(%rcx)
860 DISABLE_INTERRUPTS(CLBR_NONE)
865 testl $_TIF_DO_NOTIFY_MASK,%edx
868 ENABLE_INTERRUPTS(CLBR_NONE)
870 movq $-1,ORIG_RAX(%rsp)
871 xorl %esi,%esi # oldset
872 movq %rsp,%rdi # &pt_regs
873 call do_notify_resume
875 DISABLE_INTERRUPTS(CLBR_NONE)
877 GET_THREAD_INFO(%rcx)
878 jmp retint_with_reschedule
880 #ifdef CONFIG_PREEMPT
881 /* Returning to kernel space. Check if we need preemption */
882 /* rcx: threadinfo. interrupts off. */
884 cmpl $0,TI_preempt_count(%rcx)
885 jnz retint_restore_args
886 bt $TIF_NEED_RESCHED,TI_flags(%rcx)
887 jnc retint_restore_args
888 bt $9,EFLAGS-ARGOFFSET(%rsp) /* interrupts off? */
889 jnc retint_restore_args
890 call preempt_schedule_irq
895 END(common_interrupt)
902 .macro apicinterrupt num,func
905 CFI_ADJUST_CFA_OFFSET 8
911 ENTRY(thermal_interrupt)
912 apicinterrupt THERMAL_APIC_VECTOR,smp_thermal_interrupt
913 END(thermal_interrupt)
915 ENTRY(threshold_interrupt)
916 apicinterrupt THRESHOLD_APIC_VECTOR,mce_threshold_interrupt
917 END(threshold_interrupt)
920 ENTRY(reschedule_interrupt)
921 apicinterrupt RESCHEDULE_VECTOR,smp_reschedule_interrupt
922 END(reschedule_interrupt)
924 .macro INVALIDATE_ENTRY num
925 ENTRY(invalidate_interrupt\num)
926 apicinterrupt INVALIDATE_TLB_VECTOR_START+\num,smp_invalidate_interrupt
927 END(invalidate_interrupt\num)
939 ENTRY(call_function_interrupt)
940 apicinterrupt CALL_FUNCTION_VECTOR,smp_call_function_interrupt
941 END(call_function_interrupt)
942 ENTRY(call_function_single_interrupt)
943 apicinterrupt CALL_FUNCTION_SINGLE_VECTOR,smp_call_function_single_interrupt
944 END(call_function_single_interrupt)
945 ENTRY(irq_move_cleanup_interrupt)
946 apicinterrupt IRQ_MOVE_CLEANUP_VECTOR,smp_irq_move_cleanup_interrupt
947 END(irq_move_cleanup_interrupt)
950 ENTRY(apic_timer_interrupt)
951 apicinterrupt LOCAL_TIMER_VECTOR,smp_apic_timer_interrupt
952 END(apic_timer_interrupt)
954 ENTRY(uv_bau_message_intr1)
955 apicinterrupt 220,uv_bau_message_interrupt
956 END(uv_bau_message_intr1)
958 ENTRY(error_interrupt)
959 apicinterrupt ERROR_APIC_VECTOR,smp_error_interrupt
962 ENTRY(spurious_interrupt)
963 apicinterrupt SPURIOUS_APIC_VECTOR,smp_spurious_interrupt
964 END(spurious_interrupt)
967 * Exception entry points.
971 PARAVIRT_ADJUST_EXCEPTION_FRAME
972 pushq_cfi $-1 /* ORIG_RAX: no syscall to restart */
974 CFI_ADJUST_CFA_OFFSET 15*8
977 movq %rsp,%rdi /* pt_regs pointer */
978 xorl %esi,%esi /* no error code */
980 jmp error_exit /* %ebx: no swapgs flag */
984 .macro errorentry sym
986 PARAVIRT_ADJUST_EXCEPTION_FRAME
988 CFI_ADJUST_CFA_OFFSET 15*8
991 movq %rsp,%rdi /* pt_regs pointer */
992 movq ORIG_RAX(%rsp),%rsi /* get error code */
993 movq $-1,ORIG_RAX(%rsp) /* no syscall to restart */
995 jmp error_exit /* %ebx: no swapgs flag */
999 /* error code is on the stack already */
1000 /* handle NMI like exceptions that can happen everywhere */
1001 .macro paranoidentry sym, ist=0, irqtrace=1
1005 movl $MSR_GS_BASE,%ecx
1013 movq %gs:pda_data_offset, %rbp
1019 movq ORIG_RAX(%rsp),%rsi
1020 movq $-1,ORIG_RAX(%rsp)
1022 subq $EXCEPTION_STKSZ, per_cpu__init_tss + TSS_ist + (\ist - 1) * 8(%rbp)
1026 addq $EXCEPTION_STKSZ, per_cpu__init_tss + TSS_ist + (\ist - 1) * 8(%rbp)
1028 DISABLE_INTERRUPTS(CLBR_NONE)
1035 * "Paranoid" exit path from exception stack.
1036 * Paranoid because this is used by NMIs and cannot take
1037 * any kernel state for granted.
1038 * We don't do kernel preemption checks here, because only
1039 * NMI should be common and it does not enable IRQs and
1040 * cannot get reschedule ticks.
1042 * "trace" is 0 for the NMI handler only, because irq-tracing
1043 * is fundamentally NMI-unsafe. (we cannot change the soft and
1044 * hard flags at once, atomically)
1046 .macro paranoidexit trace=1
1047 /* ebx: no swapgs flag */
1048 paranoid_exit\trace:
1049 testl %ebx,%ebx /* swapgs needed? */
1050 jnz paranoid_restore\trace
1052 jnz paranoid_userspace\trace
1053 paranoid_swapgs\trace:
1058 paranoid_restore\trace:
1061 paranoid_userspace\trace:
1062 GET_THREAD_INFO(%rcx)
1063 movl TI_flags(%rcx),%ebx
1064 andl $_TIF_WORK_MASK,%ebx
1065 jz paranoid_swapgs\trace
1066 movq %rsp,%rdi /* &pt_regs */
1068 movq %rax,%rsp /* switch stack for scheduling */
1069 testl $_TIF_NEED_RESCHED,%ebx
1070 jnz paranoid_schedule\trace
1071 movl %ebx,%edx /* arg3: thread flags */
1075 ENABLE_INTERRUPTS(CLBR_NONE)
1076 xorl %esi,%esi /* arg2: oldset */
1077 movq %rsp,%rdi /* arg1: &pt_regs */
1078 call do_notify_resume
1079 DISABLE_INTERRUPTS(CLBR_NONE)
1083 jmp paranoid_userspace\trace
1084 paranoid_schedule\trace:
1088 ENABLE_INTERRUPTS(CLBR_ANY)
1090 DISABLE_INTERRUPTS(CLBR_ANY)
1094 jmp paranoid_userspace\trace
1099 * Exception entry point. This expects an error code/orig_rax on the stack.
1100 * returns in "no swapgs flag" in %ebx.
1102 KPROBE_ENTRY(error_entry)
1104 CFI_ADJUST_CFA_OFFSET 15*8
1105 /* oldrax contains error code */
1124 je error_kernelspace
1133 * There are two places in the kernel that can potentially fault with
1134 * usergs. Handle them here. The exception handlers after iret run with
1135 * kernel gs again, so don't set the user space flag. B stepping K8s
1136 * sometimes report an truncated RIP for IRET exceptions returning to
1137 * compat mode. Check for these here too.
1141 leaq irq_return(%rip),%rcx
1142 cmpq %rcx,RIP+8(%rsp)
1144 movl %ecx,%ecx /* zero extend */
1145 cmpq %rcx,RIP+8(%rsp)
1147 cmpq $gs_change,RIP+8(%rsp)
1150 KPROBE_END(error_entry)
1153 /* ebx: no swapgs flag (1: don't need swapgs, 0: need it) */
1154 KPROBE_ENTRY(error_exit)
1158 DISABLE_INTERRUPTS(CLBR_NONE)
1160 GET_THREAD_INFO(%rcx)
1163 LOCKDEP_SYS_EXIT_IRQ
1164 movl TI_flags(%rcx),%edx
1165 movl $_TIF_WORK_MASK,%edi
1170 KPROBE_END(error_exit)
1172 /* Reload gs selector with exception handling */
1173 /* edi: new selector */
1174 ENTRY(native_load_gs_index)
1177 CFI_ADJUST_CFA_OFFSET 8
1178 DISABLE_INTERRUPTS(CLBR_ANY | ~(CLBR_RDI))
1182 2: mfence /* workaround */
1185 CFI_ADJUST_CFA_OFFSET -8
1188 ENDPROC(native_load_gs_index)
1190 .section __ex_table,"a"
1192 .quad gs_change,bad_gs
1194 .section .fixup,"ax"
1195 /* running with kernelgs */
1197 SWAPGS /* switch back to user gs */
1204 * Create a kernel thread.
1206 * C extern interface:
1207 * extern long kernel_thread(int (*fn)(void *), void * arg, unsigned long flags)
1209 * asm input arguments:
1210 * rdi: fn, rsi: arg, rdx: flags
1212 ENTRY(kernel_thread)
1214 FAKE_STACK_FRAME $child_rip
1217 # rdi: flags, rsi: usp, rdx: will be &pt_regs
1219 orq kernel_thread_flags(%rip),%rdi
1232 * It isn't worth to check for reschedule here,
1233 * so internally to the x86_64 port you can rely on kernel_thread()
1234 * not to reschedule the child before returning, this avoids the need
1235 * of hacks for example to fork off the per-CPU idle tasks.
1236 * [Hopefully no generic code relies on the reschedule -AK]
1242 ENDPROC(kernel_thread)
1245 pushq $0 # fake return address
1248 * Here we are in the child and the registers are set as they were
1249 * at kernel_thread() invocation in the parent.
1261 * execve(). This function needs to use IRET, not SYSRET, to set up all state properly.
1263 * C extern interface:
1264 * extern long execve(char *name, char **argv, char **envp)
1266 * asm input arguments:
1267 * rdi: name, rsi: argv, rdx: envp
1269 * We want to fallback into:
1270 * extern long sys_execve(char *name, char **argv,char **envp, struct pt_regs *regs)
1272 * do_sys_execve asm fallback arguments:
1273 * rdi: name, rsi: argv, rdx: envp, rcx: fake frame on the stack
1275 ENTRY(kernel_execve)
1281 movq %rax, RAX(%rsp)
1284 je int_ret_from_sys_call
1289 ENDPROC(kernel_execve)
1291 KPROBE_ENTRY(page_fault)
1292 errorentry do_page_fault
1293 KPROBE_END(page_fault)
1295 ENTRY(coprocessor_error)
1296 zeroentry do_coprocessor_error
1297 END(coprocessor_error)
1299 ENTRY(simd_coprocessor_error)
1300 zeroentry do_simd_coprocessor_error
1301 END(simd_coprocessor_error)
1303 ENTRY(device_not_available)
1304 zeroentry do_device_not_available
1305 END(device_not_available)
1307 /* runs on exception stack */
1310 PARAVIRT_ADJUST_EXCEPTION_FRAME
1312 CFI_ADJUST_CFA_OFFSET 8
1313 paranoidentry do_debug, DEBUG_STACK
1317 /* runs on exception stack */
1320 PARAVIRT_ADJUST_EXCEPTION_FRAME
1322 CFI_ADJUST_CFA_OFFSET 8
1323 paranoidentry do_nmi, 0, 0
1324 #ifdef CONFIG_TRACE_IRQFLAGS
1334 PARAVIRT_ADJUST_EXCEPTION_FRAME
1336 CFI_ADJUST_CFA_OFFSET 8
1337 paranoidentry do_int3, DEBUG_STACK
1343 zeroentry do_overflow
1351 zeroentry do_invalid_op
1354 ENTRY(coprocessor_segment_overrun)
1355 zeroentry do_coprocessor_segment_overrun
1356 END(coprocessor_segment_overrun)
1358 /* runs on exception stack */
1361 PARAVIRT_ADJUST_EXCEPTION_FRAME
1362 paranoidentry do_double_fault
1368 errorentry do_invalid_TSS
1371 ENTRY(segment_not_present)
1372 errorentry do_segment_not_present
1373 END(segment_not_present)
1375 /* runs on exception stack */
1376 ENTRY(stack_segment)
1378 PARAVIRT_ADJUST_EXCEPTION_FRAME
1379 paranoidentry do_stack_segment
1384 KPROBE_ENTRY(general_protection)
1385 errorentry do_general_protection
1386 KPROBE_END(general_protection)
1388 ENTRY(alignment_check)
1389 errorentry do_alignment_check
1390 END(alignment_check)
1393 zeroentry do_divide_error
1396 ENTRY(spurious_interrupt_bug)
1397 zeroentry do_spurious_interrupt_bug
1398 END(spurious_interrupt_bug)
1400 #ifdef CONFIG_X86_MCE
1401 /* runs on exception stack */
1402 ENTRY(machine_check)
1404 PARAVIRT_ADJUST_EXCEPTION_FRAME
1406 CFI_ADJUST_CFA_OFFSET 8
1407 paranoidentry do_machine_check
1413 /* Call softirq on interrupt stack. Interrupts are off. */
1417 CFI_ADJUST_CFA_OFFSET 8
1418 CFI_REL_OFFSET rbp,0
1420 CFI_DEF_CFA_REGISTER rbp
1421 incl %gs:pda_irqcount
1422 cmove %gs:pda_irqstackptr,%rsp
1423 push %rbp # backlink for old unwinder
1426 CFI_DEF_CFA_REGISTER rsp
1427 CFI_ADJUST_CFA_OFFSET -8
1428 decl %gs:pda_irqcount
1431 ENDPROC(call_softirq)
1433 KPROBE_ENTRY(ignore_sysret)
1438 ENDPROC(ignore_sysret)
1441 ENTRY(xen_hypervisor_callback)
1442 zeroentry xen_do_hypervisor_callback
1443 END(xen_hypervisor_callback)
1446 # A note on the "critical region" in our callback handler.
1447 # We want to avoid stacking callback handlers due to events occurring
1448 # during handling of the last event. To do this, we keep events disabled
1449 # until we've done all processing. HOWEVER, we must enable events before
1450 # popping the stack frame (can't be done atomically) and so it would still
1451 # be possible to get enough handler activations to overflow the stack.
1452 # Although unlikely, bugs of that kind are hard to track down, so we'd
1453 # like to avoid the possibility.
1454 # So, on entry to the handler we detect whether we interrupted an
1455 # existing activation in its critical region -- if so, we pop the current
1456 # activation and restart the handler using the previous one.
1458 ENTRY(xen_do_hypervisor_callback) # do_hypervisor_callback(struct *pt_regs)
1460 /* Since we don't modify %rdi, evtchn_do_upall(struct *pt_regs) will
1461 see the correct pointer to the pt_regs */
1462 movq %rdi, %rsp # we don't return, adjust the stack frame
1465 11: incl %gs:pda_irqcount
1467 CFI_DEF_CFA_REGISTER rbp
1468 cmovzq %gs:pda_irqstackptr,%rsp
1469 pushq %rbp # backlink for old unwinder
1470 call xen_evtchn_do_upcall
1472 CFI_DEF_CFA_REGISTER rsp
1473 decl %gs:pda_irqcount
1476 END(do_hypervisor_callback)
1479 # Hypervisor uses this for application faults while it executes.
1480 # We get here for two reasons:
1481 # 1. Fault while reloading DS, ES, FS or GS
1482 # 2. Fault while executing IRET
1483 # Category 1 we do not need to fix up as Xen has already reloaded all segment
1484 # registers that could be reloaded and zeroed the others.
1485 # Category 2 we fix up by killing the current process. We cannot use the
1486 # normal Linux return path in this case because if we use the IRET hypercall
1487 # to pop the stack frame we end up in an infinite loop of failsafe callbacks.
1488 # We distinguish between categories by comparing each saved segment register
1489 # with its current contents: any discrepancy means we in category 1.
1491 ENTRY(xen_failsafe_callback)
1493 /*CFI_REL_OFFSET gs,GS*/
1494 /*CFI_REL_OFFSET fs,FS*/
1495 /*CFI_REL_OFFSET es,ES*/
1496 /*CFI_REL_OFFSET ds,DS*/
1497 CFI_REL_OFFSET r11,8
1498 CFI_REL_OFFSET rcx,0
1512 /* All segments match their saved values => Category 2 (Bad IRET). */
1518 CFI_ADJUST_CFA_OFFSET -0x30
1519 pushq_cfi $0 /* RIP */
1522 jmp general_protection
1524 1: /* Segment mismatch => Category 1 (Bad segment). Retry the IRET. */
1530 CFI_ADJUST_CFA_OFFSET -0x30
1535 END(xen_failsafe_callback)
1537 #endif /* CONFIG_XEN */