]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - arch/x86/kernel/entry_64.S
e8372e08f8c2512a0b21a51d2b9c6e4ffda63f41
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / kernel / entry_64.S
1 /*
2 * linux/arch/x86_64/entry.S
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 * Copyright (C) 2000, 2001, 2002 Andi Kleen SuSE Labs
6 * Copyright (C) 2000 Pavel Machek <pavel@suse.cz>
7 */
8
9 /*
10 * entry.S contains the system-call and fault low-level handling routines.
11 *
12 * Some of this is documented in Documentation/x86/entry_64.txt
13 *
14 * NOTE: This code handles signal-recognition, which happens every time
15 * after an interrupt and after each system call.
16 *
17 * Normal syscalls and interrupts don't save a full stack frame, this is
18 * only done for syscall tracing, signals or fork/exec et.al.
19 *
20 * A note on terminology:
21 * - top of stack: Architecture defined interrupt frame from SS to RIP
22 * at the top of the kernel process stack.
23 * - partial stack frame: partially saved registers up to R11.
24 * - full stack frame: Like partial stack frame, but all register saved.
25 *
26 * Some macro usage:
27 * - CFI macros are used to generate dwarf2 unwind information for better
28 * backtraces. They don't change any code.
29 * - ENTRY/END Define functions in the symbol table.
30 * - FIXUP_TOP_OF_STACK/RESTORE_TOP_OF_STACK - Fix up the hardware stack
31 * frame that is otherwise undefined after a SYSCALL
32 * - TRACE_IRQ_* - Trace hard interrupt state for lock debugging.
33 * - idtentry - Define exception entry points.
34 */
35
36 #include <linux/linkage.h>
37 #include <asm/segment.h>
38 #include <asm/cache.h>
39 #include <asm/errno.h>
40 #include <asm/dwarf2.h>
41 #include <asm/calling.h>
42 #include <asm/asm-offsets.h>
43 #include <asm/msr.h>
44 #include <asm/unistd.h>
45 #include <asm/thread_info.h>
46 #include <asm/hw_irq.h>
47 #include <asm/page_types.h>
48 #include <asm/irqflags.h>
49 #include <asm/paravirt.h>
50 #include <asm/percpu.h>
51 #include <asm/asm.h>
52 #include <asm/context_tracking.h>
53 #include <asm/smap.h>
54 #include <asm/pgtable_types.h>
55 #include <linux/err.h>
56
57 /* Avoid __ASSEMBLER__'ifying <linux/audit.h> just for this. */
58 #include <linux/elf-em.h>
59 #define AUDIT_ARCH_X86_64 (EM_X86_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
60 #define __AUDIT_ARCH_64BIT 0x80000000
61 #define __AUDIT_ARCH_LE 0x40000000
62
63 .code64
64 .section .entry.text, "ax"
65
66
67 #ifndef CONFIG_PREEMPT
68 #define retint_kernel retint_restore_args
69 #endif
70
71 #ifdef CONFIG_PARAVIRT
72 ENTRY(native_usergs_sysret64)
73 swapgs
74 sysretq
75 ENDPROC(native_usergs_sysret64)
76 #endif /* CONFIG_PARAVIRT */
77
78
79 .macro TRACE_IRQS_IRETQ offset=ARGOFFSET
80 #ifdef CONFIG_TRACE_IRQFLAGS
81 bt $9,EFLAGS-\offset(%rsp) /* interrupts off? */
82 jnc 1f
83 TRACE_IRQS_ON
84 1:
85 #endif
86 .endm
87
88 /*
89 * When dynamic function tracer is enabled it will add a breakpoint
90 * to all locations that it is about to modify, sync CPUs, update
91 * all the code, sync CPUs, then remove the breakpoints. In this time
92 * if lockdep is enabled, it might jump back into the debug handler
93 * outside the updating of the IST protection. (TRACE_IRQS_ON/OFF).
94 *
95 * We need to change the IDT table before calling TRACE_IRQS_ON/OFF to
96 * make sure the stack pointer does not get reset back to the top
97 * of the debug stack, and instead just reuses the current stack.
98 */
99 #if defined(CONFIG_DYNAMIC_FTRACE) && defined(CONFIG_TRACE_IRQFLAGS)
100
101 .macro TRACE_IRQS_OFF_DEBUG
102 call debug_stack_set_zero
103 TRACE_IRQS_OFF
104 call debug_stack_reset
105 .endm
106
107 .macro TRACE_IRQS_ON_DEBUG
108 call debug_stack_set_zero
109 TRACE_IRQS_ON
110 call debug_stack_reset
111 .endm
112
113 .macro TRACE_IRQS_IRETQ_DEBUG offset=ARGOFFSET
114 bt $9,EFLAGS-\offset(%rsp) /* interrupts off? */
115 jnc 1f
116 TRACE_IRQS_ON_DEBUG
117 1:
118 .endm
119
120 #else
121 # define TRACE_IRQS_OFF_DEBUG TRACE_IRQS_OFF
122 # define TRACE_IRQS_ON_DEBUG TRACE_IRQS_ON
123 # define TRACE_IRQS_IRETQ_DEBUG TRACE_IRQS_IRETQ
124 #endif
125
126 /*
127 * C code is not supposed to know about undefined top of stack. Every time
128 * a C function with an pt_regs argument is called from the SYSCALL based
129 * fast path FIXUP_TOP_OF_STACK is needed.
130 * RESTORE_TOP_OF_STACK syncs the syscall state after any possible ptregs
131 * manipulation.
132 */
133
134 /* %rsp:at FRAMEEND */
135 .macro FIXUP_TOP_OF_STACK tmp offset=0
136 movq PER_CPU_VAR(old_rsp),\tmp
137 movq \tmp,RSP+\offset(%rsp)
138 movq $__USER_DS,SS+\offset(%rsp)
139 movq $__USER_CS,CS+\offset(%rsp)
140 movq RIP+\offset(%rsp),\tmp /* get rip */
141 movq \tmp,RCX+\offset(%rsp) /* copy it to rcx as sysret would do */
142 movq R11+\offset(%rsp),\tmp /* get eflags */
143 movq \tmp,EFLAGS+\offset(%rsp)
144 .endm
145
146 .macro RESTORE_TOP_OF_STACK tmp offset=0
147 movq RSP+\offset(%rsp),\tmp
148 movq \tmp,PER_CPU_VAR(old_rsp)
149 movq EFLAGS+\offset(%rsp),\tmp
150 movq \tmp,R11+\offset(%rsp)
151 .endm
152
153 /*
154 * initial frame state for interrupts (and exceptions without error code)
155 */
156 .macro EMPTY_FRAME start=1 offset=0
157 .if \start
158 CFI_STARTPROC simple
159 CFI_SIGNAL_FRAME
160 CFI_DEF_CFA rsp,8+\offset
161 .else
162 CFI_DEF_CFA_OFFSET 8+\offset
163 .endif
164 .endm
165
166 /*
167 * initial frame state for interrupts (and exceptions without error code)
168 */
169 .macro INTR_FRAME start=1 offset=0
170 EMPTY_FRAME \start, SS+8+\offset-RIP
171 /*CFI_REL_OFFSET ss, SS+\offset-RIP*/
172 CFI_REL_OFFSET rsp, RSP+\offset-RIP
173 /*CFI_REL_OFFSET rflags, EFLAGS+\offset-RIP*/
174 /*CFI_REL_OFFSET cs, CS+\offset-RIP*/
175 CFI_REL_OFFSET rip, RIP+\offset-RIP
176 .endm
177
178 /*
179 * initial frame state for exceptions with error code (and interrupts
180 * with vector already pushed)
181 */
182 .macro XCPT_FRAME start=1 offset=0
183 INTR_FRAME \start, RIP+\offset-ORIG_RAX
184 .endm
185
186 /*
187 * frame that enables passing a complete pt_regs to a C function.
188 */
189 .macro DEFAULT_FRAME start=1 offset=0
190 XCPT_FRAME \start, ORIG_RAX+\offset-ARGOFFSET
191 CFI_REL_OFFSET rdi, RDI+\offset-ARGOFFSET
192 CFI_REL_OFFSET rsi, RSI+\offset-ARGOFFSET
193 CFI_REL_OFFSET rdx, RDX+\offset-ARGOFFSET
194 CFI_REL_OFFSET rcx, RCX+\offset-ARGOFFSET
195 CFI_REL_OFFSET rax, RAX+\offset-ARGOFFSET
196 CFI_REL_OFFSET r8, R8+\offset-ARGOFFSET
197 CFI_REL_OFFSET r9, R9+\offset-ARGOFFSET
198 CFI_REL_OFFSET r10, R10+\offset-ARGOFFSET
199 CFI_REL_OFFSET r11, R11+\offset-ARGOFFSET
200 CFI_REL_OFFSET rbx, RBX+\offset
201 CFI_REL_OFFSET rbp, RBP+\offset
202 CFI_REL_OFFSET r12, R12+\offset
203 CFI_REL_OFFSET r13, R13+\offset
204 CFI_REL_OFFSET r14, R14+\offset
205 CFI_REL_OFFSET r15, R15+\offset
206 .endm
207
208 ENTRY(save_paranoid)
209 XCPT_FRAME 1 RDI+8
210 cld
211 SAVE_C_REGS 8
212 SAVE_EXTRA_REGS 8
213 movl $1,%ebx
214 movl $MSR_GS_BASE,%ecx
215 rdmsr
216 testl %edx,%edx
217 js 1f /* negative -> in kernel */
218 SWAPGS
219 xorl %ebx,%ebx
220 1: ret
221 CFI_ENDPROC
222 END(save_paranoid)
223
224 /*
225 * A newly forked process directly context switches into this address.
226 *
227 * rdi: prev task we switched from
228 */
229 ENTRY(ret_from_fork)
230 DEFAULT_FRAME
231
232 LOCK ; btr $TIF_FORK,TI_flags(%r8)
233
234 pushq_cfi $0x0002
235 popfq_cfi # reset kernel eflags
236
237 call schedule_tail # rdi: 'prev' task parameter
238
239 GET_THREAD_INFO(%rcx)
240
241 RESTORE_EXTRA_REGS
242
243 testl $3, CS-ARGOFFSET(%rsp) # from kernel_thread?
244 jz 1f
245
246 testl $_TIF_IA32, TI_flags(%rcx) # 32-bit compat task needs IRET
247 jnz int_ret_from_sys_call
248
249 RESTORE_TOP_OF_STACK %rdi, -ARGOFFSET
250 jmp ret_from_sys_call # go to the SYSRET fastpath
251
252 1:
253 movq %rbp, %rdi
254 call *%rbx
255 movl $0, RAX(%rsp)
256 RESTORE_EXTRA_REGS
257 jmp int_ret_from_sys_call
258 CFI_ENDPROC
259 END(ret_from_fork)
260
261 /*
262 * System call entry. Up to 6 arguments in registers are supported.
263 *
264 * SYSCALL does not save anything on the stack and does not change the
265 * stack pointer. However, it does mask the flags register for us, so
266 * CLD and CLAC are not needed.
267 */
268
269 /*
270 * Register setup:
271 * rax system call number
272 * rdi arg0
273 * rcx return address for syscall/sysret, C arg3
274 * rsi arg1
275 * rdx arg2
276 * r10 arg3 (--> moved to rcx for C)
277 * r8 arg4
278 * r9 arg5
279 * r11 eflags for syscall/sysret, temporary for C
280 * r12-r15,rbp,rbx saved by C code, not touched.
281 *
282 * Interrupts are off on entry.
283 * Only called from user space.
284 *
285 * XXX if we had a free scratch register we could save the RSP into the stack frame
286 * and report it properly in ps. Unfortunately we haven't.
287 *
288 * When user can change the frames always force IRET. That is because
289 * it deals with uncanonical addresses better. SYSRET has trouble
290 * with them due to bugs in both AMD and Intel CPUs.
291 */
292
293 ENTRY(system_call)
294 CFI_STARTPROC simple
295 CFI_SIGNAL_FRAME
296 CFI_DEF_CFA rsp,KERNEL_STACK_OFFSET
297 CFI_REGISTER rip,rcx
298 /*CFI_REGISTER rflags,r11*/
299 SWAPGS_UNSAFE_STACK
300 /*
301 * A hypervisor implementation might want to use a label
302 * after the swapgs, so that it can do the swapgs
303 * for the guest and jump here on syscall.
304 */
305 GLOBAL(system_call_after_swapgs)
306
307 movq %rsp,PER_CPU_VAR(old_rsp)
308 movq PER_CPU_VAR(kernel_stack),%rsp
309 /*
310 * No need to follow this irqs off/on section - it's straight
311 * and short:
312 */
313 ENABLE_INTERRUPTS(CLBR_NONE)
314 ALLOC_PT_GPREGS_ON_STACK 8
315 SAVE_C_REGS_EXCEPT_RAX_RCX
316 movq $-ENOSYS,RAX-ARGOFFSET(%rsp)
317 movq_cfi rax,(ORIG_RAX-ARGOFFSET)
318 movq %rcx,RIP-ARGOFFSET(%rsp)
319 CFI_REL_OFFSET rip,RIP-ARGOFFSET
320 testl $_TIF_WORK_SYSCALL_ENTRY,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
321 jnz tracesys
322 system_call_fastpath:
323 #if __SYSCALL_MASK == ~0
324 cmpq $__NR_syscall_max,%rax
325 #else
326 andl $__SYSCALL_MASK,%eax
327 cmpl $__NR_syscall_max,%eax
328 #endif
329 ja ret_from_sys_call /* and return regs->ax */
330 movq %r10,%rcx
331 call *sys_call_table(,%rax,8) # XXX: rip relative
332 movq %rax,RAX-ARGOFFSET(%rsp)
333 /*
334 * Syscall return path ending with SYSRET (fast path)
335 * Has incomplete stack frame and undefined top of stack.
336 */
337 ret_from_sys_call:
338 testl $_TIF_ALLWORK_MASK,TI_flags+THREAD_INFO(%rsp,RIP-ARGOFFSET)
339 jnz int_ret_from_sys_call_fixup /* Go the the slow path */
340
341 LOCKDEP_SYS_EXIT
342 DISABLE_INTERRUPTS(CLBR_NONE)
343 TRACE_IRQS_OFF
344 CFI_REMEMBER_STATE
345 /*
346 * sysretq will re-enable interrupts:
347 */
348 TRACE_IRQS_ON
349 RESTORE_C_REGS_EXCEPT_RCX
350 movq RIP-ARGOFFSET(%rsp),%rcx
351 CFI_REGISTER rip,rcx
352 /*CFI_REGISTER rflags,r11*/
353 movq PER_CPU_VAR(old_rsp), %rsp
354 USERGS_SYSRET64
355
356 CFI_RESTORE_STATE
357
358 int_ret_from_sys_call_fixup:
359 FIXUP_TOP_OF_STACK %r11, -ARGOFFSET
360 jmp int_ret_from_sys_call
361
362 /* Do syscall tracing */
363 tracesys:
364 movq %rsp, %rdi
365 movq $AUDIT_ARCH_X86_64, %rsi
366 call syscall_trace_enter_phase1
367 test %rax, %rax
368 jnz tracesys_phase2 /* if needed, run the slow path */
369 RESTORE_C_REGS_EXCEPT_RAX /* else restore clobbered regs */
370 movq ORIG_RAX-ARGOFFSET(%rsp), %rax
371 jmp system_call_fastpath /* and return to the fast path */
372
373 tracesys_phase2:
374 SAVE_EXTRA_REGS
375 FIXUP_TOP_OF_STACK %rdi
376 movq %rsp, %rdi
377 movq $AUDIT_ARCH_X86_64, %rsi
378 movq %rax,%rdx
379 call syscall_trace_enter_phase2
380
381 /*
382 * Reload arg registers from stack in case ptrace changed them.
383 * We don't reload %rax because syscall_trace_entry_phase2() returned
384 * the value it wants us to use in the table lookup.
385 */
386 RESTORE_C_REGS_EXCEPT_RAX
387 RESTORE_EXTRA_REGS
388 #if __SYSCALL_MASK == ~0
389 cmpq $__NR_syscall_max,%rax
390 #else
391 andl $__SYSCALL_MASK,%eax
392 cmpl $__NR_syscall_max,%eax
393 #endif
394 ja int_ret_from_sys_call /* RAX(%rsp) is already set */
395 movq %r10,%rcx /* fixup for C */
396 call *sys_call_table(,%rax,8)
397 movq %rax,RAX-ARGOFFSET(%rsp)
398 /* Use IRET because user could have changed frame */
399
400 /*
401 * Syscall return path ending with IRET.
402 * Has correct top of stack, but partial stack frame.
403 */
404 GLOBAL(int_ret_from_sys_call)
405 DISABLE_INTERRUPTS(CLBR_NONE)
406 TRACE_IRQS_OFF
407 movl $_TIF_ALLWORK_MASK,%edi
408 /* edi: mask to check */
409 GLOBAL(int_with_check)
410 LOCKDEP_SYS_EXIT_IRQ
411 GET_THREAD_INFO(%rcx)
412 movl TI_flags(%rcx),%edx
413 andl %edi,%edx
414 jnz int_careful
415 andl $~TS_COMPAT,TI_status(%rcx)
416 jmp retint_swapgs
417
418 /* Either reschedule or signal or syscall exit tracking needed. */
419 /* First do a reschedule test. */
420 /* edx: work, edi: workmask */
421 int_careful:
422 bt $TIF_NEED_RESCHED,%edx
423 jnc int_very_careful
424 TRACE_IRQS_ON
425 ENABLE_INTERRUPTS(CLBR_NONE)
426 pushq_cfi %rdi
427 SCHEDULE_USER
428 popq_cfi %rdi
429 DISABLE_INTERRUPTS(CLBR_NONE)
430 TRACE_IRQS_OFF
431 jmp int_with_check
432
433 /* handle signals and tracing -- both require a full stack frame */
434 int_very_careful:
435 TRACE_IRQS_ON
436 ENABLE_INTERRUPTS(CLBR_NONE)
437 int_check_syscall_exit_work:
438 SAVE_EXTRA_REGS
439 /* Check for syscall exit trace */
440 testl $_TIF_WORK_SYSCALL_EXIT,%edx
441 jz int_signal
442 pushq_cfi %rdi
443 leaq 8(%rsp),%rdi # &ptregs -> arg1
444 call syscall_trace_leave
445 popq_cfi %rdi
446 andl $~(_TIF_WORK_SYSCALL_EXIT|_TIF_SYSCALL_EMU),%edi
447 jmp int_restore_rest
448
449 int_signal:
450 testl $_TIF_DO_NOTIFY_MASK,%edx
451 jz 1f
452 movq %rsp,%rdi # &ptregs -> arg1
453 xorl %esi,%esi # oldset -> arg2
454 call do_notify_resume
455 1: movl $_TIF_WORK_MASK,%edi
456 int_restore_rest:
457 RESTORE_EXTRA_REGS
458 DISABLE_INTERRUPTS(CLBR_NONE)
459 TRACE_IRQS_OFF
460 jmp int_with_check
461 CFI_ENDPROC
462 END(system_call)
463
464 .macro FORK_LIKE func
465 ENTRY(stub_\func)
466 CFI_STARTPROC
467 DEFAULT_FRAME 0, 8 /* offset 8: return address */
468 SAVE_EXTRA_REGS 8
469 FIXUP_TOP_OF_STACK %r11, 8
470 call sys_\func
471 RESTORE_TOP_OF_STACK %r11, 8
472 ret
473 CFI_ENDPROC
474 END(stub_\func)
475 .endm
476
477 .macro FIXED_FRAME label,func
478 ENTRY(\label)
479 CFI_STARTPROC
480 DEFAULT_FRAME 0, 8 /* offset 8: return address */
481 FIXUP_TOP_OF_STACK %r11, 8-ARGOFFSET
482 call \func
483 RESTORE_TOP_OF_STACK %r11, 8-ARGOFFSET
484 ret
485 CFI_ENDPROC
486 END(\label)
487 .endm
488
489 FORK_LIKE clone
490 FORK_LIKE fork
491 FORK_LIKE vfork
492 FIXED_FRAME stub_iopl, sys_iopl
493
494 ENTRY(stub_execve)
495 CFI_STARTPROC
496 addq $8, %rsp
497 DEFAULT_FRAME 0
498 SAVE_EXTRA_REGS
499 FIXUP_TOP_OF_STACK %r11
500 call sys_execve
501 movq %rax,RAX(%rsp)
502 RESTORE_EXTRA_REGS
503 jmp int_ret_from_sys_call
504 CFI_ENDPROC
505 END(stub_execve)
506
507 ENTRY(stub_execveat)
508 CFI_STARTPROC
509 addq $8, %rsp
510 DEFAULT_FRAME 0
511 SAVE_EXTRA_REGS
512 FIXUP_TOP_OF_STACK %r11
513 call sys_execveat
514 RESTORE_TOP_OF_STACK %r11
515 movq %rax,RAX(%rsp)
516 RESTORE_EXTRA_REGS
517 jmp int_ret_from_sys_call
518 CFI_ENDPROC
519 END(stub_execveat)
520
521 /*
522 * sigreturn is special because it needs to restore all registers on return.
523 * This cannot be done with SYSRET, so use the IRET return path instead.
524 */
525 ENTRY(stub_rt_sigreturn)
526 CFI_STARTPROC
527 addq $8, %rsp
528 DEFAULT_FRAME 0
529 SAVE_EXTRA_REGS
530 FIXUP_TOP_OF_STACK %r11
531 call sys_rt_sigreturn
532 movq %rax,RAX(%rsp) # fixme, this could be done at the higher layer
533 RESTORE_EXTRA_REGS
534 jmp int_ret_from_sys_call
535 CFI_ENDPROC
536 END(stub_rt_sigreturn)
537
538 #ifdef CONFIG_X86_X32_ABI
539 ENTRY(stub_x32_rt_sigreturn)
540 CFI_STARTPROC
541 addq $8, %rsp
542 DEFAULT_FRAME 0
543 SAVE_EXTRA_REGS
544 FIXUP_TOP_OF_STACK %r11
545 call sys32_x32_rt_sigreturn
546 movq %rax,RAX(%rsp) # fixme, this could be done at the higher layer
547 RESTORE_EXTRA_REGS
548 jmp int_ret_from_sys_call
549 CFI_ENDPROC
550 END(stub_x32_rt_sigreturn)
551
552 ENTRY(stub_x32_execve)
553 CFI_STARTPROC
554 addq $8, %rsp
555 DEFAULT_FRAME 0
556 SAVE_EXTRA_REGS
557 FIXUP_TOP_OF_STACK %r11
558 call compat_sys_execve
559 RESTORE_TOP_OF_STACK %r11
560 movq %rax,RAX(%rsp)
561 RESTORE_EXTRA_REGS
562 jmp int_ret_from_sys_call
563 CFI_ENDPROC
564 END(stub_x32_execve)
565
566 ENTRY(stub_x32_execveat)
567 CFI_STARTPROC
568 addq $8, %rsp
569 DEFAULT_FRAME 0
570 SAVE_EXTRA_REGS
571 FIXUP_TOP_OF_STACK %r11
572 call compat_sys_execveat
573 RESTORE_TOP_OF_STACK %r11
574 movq %rax,RAX(%rsp)
575 RESTORE_EXTRA_REGS
576 jmp int_ret_from_sys_call
577 CFI_ENDPROC
578 END(stub_x32_execveat)
579
580 #endif
581
582 /*
583 * Build the entry stubs and pointer table with some assembler magic.
584 * We pack 7 stubs into a single 32-byte chunk, which will fit in a
585 * single cache line on all modern x86 implementations.
586 */
587 .section .init.rodata,"a"
588 ENTRY(interrupt)
589 .section .entry.text
590 .p2align 5
591 .p2align CONFIG_X86_L1_CACHE_SHIFT
592 ENTRY(irq_entries_start)
593 INTR_FRAME
594 vector=FIRST_EXTERNAL_VECTOR
595 .rept (FIRST_SYSTEM_VECTOR-FIRST_EXTERNAL_VECTOR+6)/7
596 .balign 32
597 .rept 7
598 .if vector < FIRST_SYSTEM_VECTOR
599 .if vector <> FIRST_EXTERNAL_VECTOR
600 CFI_ADJUST_CFA_OFFSET -8
601 .endif
602 1: pushq_cfi $(~vector+0x80) /* Note: always in signed byte range */
603 .if ((vector-FIRST_EXTERNAL_VECTOR)%7) <> 6
604 jmp 2f
605 .endif
606 .previous
607 .quad 1b
608 .section .entry.text
609 vector=vector+1
610 .endif
611 .endr
612 2: jmp common_interrupt
613 .endr
614 CFI_ENDPROC
615 END(irq_entries_start)
616
617 .previous
618 END(interrupt)
619 .previous
620
621 /*
622 * Interrupt entry/exit.
623 *
624 * Interrupt entry points save only callee clobbered registers in fast path.
625 *
626 * Entry runs with interrupts off.
627 */
628
629 /* 0(%rsp): ~(interrupt number) */
630 .macro interrupt func
631 cld
632 ALLOC_PT_GPREGS_ON_STACK -RBP
633 SAVE_C_REGS -RBP
634 /* this goes to 0(%rsp) for unwinder, not for saving the value: */
635 SAVE_EXTRA_REGS_RBP -RBP
636
637 leaq -RBP(%rsp),%rdi /* arg1 for \func (pointer to pt_regs) */
638
639 testl $3, CS-RBP(%rsp)
640 je 1f
641 SWAPGS
642 1:
643 /*
644 * irq_count is used to check if a CPU is already on an interrupt stack
645 * or not. While this is essentially redundant with preempt_count it is
646 * a little cheaper to use a separate counter in the PDA (short of
647 * moving irq_enter into assembly, which would be too much work)
648 */
649 movq %rsp, %rsi
650 incl PER_CPU_VAR(irq_count)
651 cmovzq PER_CPU_VAR(irq_stack_ptr),%rsp
652 CFI_DEF_CFA_REGISTER rsi
653 pushq %rsi
654 CFI_ESCAPE 0x0f /* DW_CFA_def_cfa_expression */, 6, \
655 0x77 /* DW_OP_breg7 */, 0, \
656 0x06 /* DW_OP_deref */, \
657 0x08 /* DW_OP_const1u */, SS+8-RBP, \
658 0x22 /* DW_OP_plus */
659 /* We entered an interrupt context - irqs are off: */
660 TRACE_IRQS_OFF
661
662 call \func
663 .endm
664
665 /*
666 * The interrupt stubs push (~vector+0x80) onto the stack and
667 * then jump to common_interrupt.
668 */
669 .p2align CONFIG_X86_L1_CACHE_SHIFT
670 common_interrupt:
671 XCPT_FRAME
672 ASM_CLAC
673 addq $-0x80,(%rsp) /* Adjust vector to [-256,-1] range */
674 interrupt do_IRQ
675 /* 0(%rsp): old_rsp-ARGOFFSET */
676 ret_from_intr:
677 DISABLE_INTERRUPTS(CLBR_NONE)
678 TRACE_IRQS_OFF
679 decl PER_CPU_VAR(irq_count)
680
681 /* Restore saved previous stack */
682 popq %rsi
683 CFI_DEF_CFA rsi,SS+8-RBP /* reg/off reset after def_cfa_expr */
684 leaq ARGOFFSET-RBP(%rsi), %rsp
685 CFI_DEF_CFA_REGISTER rsp
686 CFI_ADJUST_CFA_OFFSET RBP-ARGOFFSET
687
688 exit_intr:
689 GET_THREAD_INFO(%rcx)
690 testl $3,CS-ARGOFFSET(%rsp)
691 je retint_kernel
692
693 /* Interrupt came from user space */
694 /*
695 * Has a correct top of stack, but a partial stack frame
696 * %rcx: thread info. Interrupts off.
697 */
698 retint_with_reschedule:
699 movl $_TIF_WORK_MASK,%edi
700 retint_check:
701 LOCKDEP_SYS_EXIT_IRQ
702 movl TI_flags(%rcx),%edx
703 andl %edi,%edx
704 CFI_REMEMBER_STATE
705 jnz retint_careful
706
707 retint_swapgs: /* return to user-space */
708 /*
709 * The iretq could re-enable interrupts:
710 */
711 DISABLE_INTERRUPTS(CLBR_ANY)
712 TRACE_IRQS_IRETQ
713
714 /*
715 * Try to use SYSRET instead of IRET if we're returning to
716 * a completely clean 64-bit userspace context.
717 */
718 movq (RCX-ARGOFFSET)(%rsp), %rcx
719 cmpq %rcx,(RIP-ARGOFFSET)(%rsp) /* RCX == RIP */
720 jne opportunistic_sysret_failed
721
722 /*
723 * On Intel CPUs, sysret with non-canonical RCX/RIP will #GP
724 * in kernel space. This essentially lets the user take over
725 * the kernel, since userspace controls RSP. It's not worth
726 * testing for canonicalness exactly -- this check detects any
727 * of the 17 high bits set, which is true for non-canonical
728 * or kernel addresses. (This will pessimize vsyscall=native.
729 * Big deal.)
730 *
731 * If virtual addresses ever become wider, this will need
732 * to be updated to remain correct on both old and new CPUs.
733 */
734 .ifne __VIRTUAL_MASK_SHIFT - 47
735 .error "virtual address width changed -- sysret checks need update"
736 .endif
737 shr $__VIRTUAL_MASK_SHIFT, %rcx
738 jnz opportunistic_sysret_failed
739
740 cmpq $__USER_CS,(CS-ARGOFFSET)(%rsp) /* CS must match SYSRET */
741 jne opportunistic_sysret_failed
742
743 movq (R11-ARGOFFSET)(%rsp), %r11
744 cmpq %r11,(EFLAGS-ARGOFFSET)(%rsp) /* R11 == RFLAGS */
745 jne opportunistic_sysret_failed
746
747 testq $X86_EFLAGS_RF,%r11 /* sysret can't restore RF */
748 jnz opportunistic_sysret_failed
749
750 /* nothing to check for RSP */
751
752 cmpq $__USER_DS,(SS-ARGOFFSET)(%rsp) /* SS must match SYSRET */
753 jne opportunistic_sysret_failed
754
755 /*
756 * We win! This label is here just for ease of understanding
757 * perf profiles. Nothing jumps here.
758 */
759 irq_return_via_sysret:
760 CFI_REMEMBER_STATE
761 RESTORE_C_REGS
762 REMOVE_PT_GPREGS_FROM_STACK 8
763 movq (RSP-RIP)(%rsp),%rsp
764 USERGS_SYSRET64
765 CFI_RESTORE_STATE
766
767 opportunistic_sysret_failed:
768 SWAPGS
769 jmp restore_args
770
771 retint_restore_args: /* return to kernel space */
772 DISABLE_INTERRUPTS(CLBR_ANY)
773 /*
774 * The iretq could re-enable interrupts:
775 */
776 TRACE_IRQS_IRETQ
777 restore_args:
778 RESTORE_C_REGS
779 REMOVE_PT_GPREGS_FROM_STACK 8
780
781 irq_return:
782 INTERRUPT_RETURN
783
784 ENTRY(native_iret)
785 /*
786 * Are we returning to a stack segment from the LDT? Note: in
787 * 64-bit mode SS:RSP on the exception stack is always valid.
788 */
789 #ifdef CONFIG_X86_ESPFIX64
790 testb $4,(SS-RIP)(%rsp)
791 jnz native_irq_return_ldt
792 #endif
793
794 .global native_irq_return_iret
795 native_irq_return_iret:
796 /*
797 * This may fault. Non-paranoid faults on return to userspace are
798 * handled by fixup_bad_iret. These include #SS, #GP, and #NP.
799 * Double-faults due to espfix64 are handled in do_double_fault.
800 * Other faults here are fatal.
801 */
802 iretq
803
804 #ifdef CONFIG_X86_ESPFIX64
805 native_irq_return_ldt:
806 pushq_cfi %rax
807 pushq_cfi %rdi
808 SWAPGS
809 movq PER_CPU_VAR(espfix_waddr),%rdi
810 movq %rax,(0*8)(%rdi) /* RAX */
811 movq (2*8)(%rsp),%rax /* RIP */
812 movq %rax,(1*8)(%rdi)
813 movq (3*8)(%rsp),%rax /* CS */
814 movq %rax,(2*8)(%rdi)
815 movq (4*8)(%rsp),%rax /* RFLAGS */
816 movq %rax,(3*8)(%rdi)
817 movq (6*8)(%rsp),%rax /* SS */
818 movq %rax,(5*8)(%rdi)
819 movq (5*8)(%rsp),%rax /* RSP */
820 movq %rax,(4*8)(%rdi)
821 andl $0xffff0000,%eax
822 popq_cfi %rdi
823 orq PER_CPU_VAR(espfix_stack),%rax
824 SWAPGS
825 movq %rax,%rsp
826 popq_cfi %rax
827 jmp native_irq_return_iret
828 #endif
829
830 /* edi: workmask, edx: work */
831 retint_careful:
832 CFI_RESTORE_STATE
833 bt $TIF_NEED_RESCHED,%edx
834 jnc retint_signal
835 TRACE_IRQS_ON
836 ENABLE_INTERRUPTS(CLBR_NONE)
837 pushq_cfi %rdi
838 SCHEDULE_USER
839 popq_cfi %rdi
840 GET_THREAD_INFO(%rcx)
841 DISABLE_INTERRUPTS(CLBR_NONE)
842 TRACE_IRQS_OFF
843 jmp retint_check
844
845 retint_signal:
846 testl $_TIF_DO_NOTIFY_MASK,%edx
847 jz retint_swapgs
848 TRACE_IRQS_ON
849 ENABLE_INTERRUPTS(CLBR_NONE)
850 SAVE_EXTRA_REGS
851 movq $-1,ORIG_RAX(%rsp)
852 xorl %esi,%esi # oldset
853 movq %rsp,%rdi # &pt_regs
854 call do_notify_resume
855 RESTORE_EXTRA_REGS
856 DISABLE_INTERRUPTS(CLBR_NONE)
857 TRACE_IRQS_OFF
858 GET_THREAD_INFO(%rcx)
859 jmp retint_with_reschedule
860
861 #ifdef CONFIG_PREEMPT
862 /* Returning to kernel space. Check if we need preemption */
863 /* rcx: threadinfo. interrupts off. */
864 ENTRY(retint_kernel)
865 cmpl $0,PER_CPU_VAR(__preempt_count)
866 jnz retint_restore_args
867 bt $9,EFLAGS-ARGOFFSET(%rsp) /* interrupts off? */
868 jnc retint_restore_args
869 call preempt_schedule_irq
870 jmp exit_intr
871 #endif
872 CFI_ENDPROC
873 END(common_interrupt)
874
875 /*
876 * APIC interrupts.
877 */
878 .macro apicinterrupt3 num sym do_sym
879 ENTRY(\sym)
880 INTR_FRAME
881 ASM_CLAC
882 pushq_cfi $~(\num)
883 .Lcommon_\sym:
884 interrupt \do_sym
885 jmp ret_from_intr
886 CFI_ENDPROC
887 END(\sym)
888 .endm
889
890 #ifdef CONFIG_TRACING
891 #define trace(sym) trace_##sym
892 #define smp_trace(sym) smp_trace_##sym
893
894 .macro trace_apicinterrupt num sym
895 apicinterrupt3 \num trace(\sym) smp_trace(\sym)
896 .endm
897 #else
898 .macro trace_apicinterrupt num sym do_sym
899 .endm
900 #endif
901
902 .macro apicinterrupt num sym do_sym
903 apicinterrupt3 \num \sym \do_sym
904 trace_apicinterrupt \num \sym
905 .endm
906
907 #ifdef CONFIG_SMP
908 apicinterrupt3 IRQ_MOVE_CLEANUP_VECTOR \
909 irq_move_cleanup_interrupt smp_irq_move_cleanup_interrupt
910 apicinterrupt3 REBOOT_VECTOR \
911 reboot_interrupt smp_reboot_interrupt
912 #endif
913
914 #ifdef CONFIG_X86_UV
915 apicinterrupt3 UV_BAU_MESSAGE \
916 uv_bau_message_intr1 uv_bau_message_interrupt
917 #endif
918 apicinterrupt LOCAL_TIMER_VECTOR \
919 apic_timer_interrupt smp_apic_timer_interrupt
920 apicinterrupt X86_PLATFORM_IPI_VECTOR \
921 x86_platform_ipi smp_x86_platform_ipi
922
923 #ifdef CONFIG_HAVE_KVM
924 apicinterrupt3 POSTED_INTR_VECTOR \
925 kvm_posted_intr_ipi smp_kvm_posted_intr_ipi
926 #endif
927
928 #ifdef CONFIG_X86_MCE_THRESHOLD
929 apicinterrupt THRESHOLD_APIC_VECTOR \
930 threshold_interrupt smp_threshold_interrupt
931 #endif
932
933 #ifdef CONFIG_X86_THERMAL_VECTOR
934 apicinterrupt THERMAL_APIC_VECTOR \
935 thermal_interrupt smp_thermal_interrupt
936 #endif
937
938 #ifdef CONFIG_SMP
939 apicinterrupt CALL_FUNCTION_SINGLE_VECTOR \
940 call_function_single_interrupt smp_call_function_single_interrupt
941 apicinterrupt CALL_FUNCTION_VECTOR \
942 call_function_interrupt smp_call_function_interrupt
943 apicinterrupt RESCHEDULE_VECTOR \
944 reschedule_interrupt smp_reschedule_interrupt
945 #endif
946
947 apicinterrupt ERROR_APIC_VECTOR \
948 error_interrupt smp_error_interrupt
949 apicinterrupt SPURIOUS_APIC_VECTOR \
950 spurious_interrupt smp_spurious_interrupt
951
952 #ifdef CONFIG_IRQ_WORK
953 apicinterrupt IRQ_WORK_VECTOR \
954 irq_work_interrupt smp_irq_work_interrupt
955 #endif
956
957 /*
958 * Exception entry points.
959 */
960 #define INIT_TSS_IST(x) PER_CPU_VAR(init_tss) + (TSS_ist + ((x) - 1) * 8)
961
962 .macro idtentry sym do_sym has_error_code:req paranoid=0 shift_ist=-1
963 ENTRY(\sym)
964 /* Sanity check */
965 .if \shift_ist != -1 && \paranoid == 0
966 .error "using shift_ist requires paranoid=1"
967 .endif
968
969 .if \has_error_code
970 XCPT_FRAME
971 .else
972 INTR_FRAME
973 .endif
974
975 ASM_CLAC
976 PARAVIRT_ADJUST_EXCEPTION_FRAME
977
978 .ifeq \has_error_code
979 pushq_cfi $-1 /* ORIG_RAX: no syscall to restart */
980 .endif
981
982 ALLOC_PT_GPREGS_ON_STACK
983
984 .if \paranoid
985 .if \paranoid == 1
986 CFI_REMEMBER_STATE
987 testl $3, CS(%rsp) /* If coming from userspace, switch */
988 jnz 1f /* stacks. */
989 .endif
990 call save_paranoid
991 .else
992 call error_entry
993 .endif
994
995 DEFAULT_FRAME 0
996
997 .if \paranoid
998 .if \shift_ist != -1
999 TRACE_IRQS_OFF_DEBUG /* reload IDT in case of recursion */
1000 .else
1001 TRACE_IRQS_OFF
1002 .endif
1003 .endif
1004
1005 movq %rsp,%rdi /* pt_regs pointer */
1006
1007 .if \has_error_code
1008 movq ORIG_RAX(%rsp),%rsi /* get error code */
1009 movq $-1,ORIG_RAX(%rsp) /* no syscall to restart */
1010 .else
1011 xorl %esi,%esi /* no error code */
1012 .endif
1013
1014 .if \shift_ist != -1
1015 subq $EXCEPTION_STKSZ, INIT_TSS_IST(\shift_ist)
1016 .endif
1017
1018 call \do_sym
1019
1020 .if \shift_ist != -1
1021 addq $EXCEPTION_STKSZ, INIT_TSS_IST(\shift_ist)
1022 .endif
1023
1024 .if \paranoid
1025 jmp paranoid_exit /* %ebx: no swapgs flag */
1026 .else
1027 jmp error_exit /* %ebx: no swapgs flag */
1028 .endif
1029
1030 .if \paranoid == 1
1031 CFI_RESTORE_STATE
1032 /*
1033 * Paranoid entry from userspace. Switch stacks and treat it
1034 * as a normal entry. This means that paranoid handlers
1035 * run in real process context if user_mode(regs).
1036 */
1037 1:
1038 call error_entry
1039
1040 DEFAULT_FRAME 0
1041
1042 movq %rsp,%rdi /* pt_regs pointer */
1043 call sync_regs
1044 movq %rax,%rsp /* switch stack */
1045
1046 movq %rsp,%rdi /* pt_regs pointer */
1047
1048 .if \has_error_code
1049 movq ORIG_RAX(%rsp),%rsi /* get error code */
1050 movq $-1,ORIG_RAX(%rsp) /* no syscall to restart */
1051 .else
1052 xorl %esi,%esi /* no error code */
1053 .endif
1054
1055 call \do_sym
1056
1057 jmp error_exit /* %ebx: no swapgs flag */
1058 .endif
1059
1060 CFI_ENDPROC
1061 END(\sym)
1062 .endm
1063
1064 #ifdef CONFIG_TRACING
1065 .macro trace_idtentry sym do_sym has_error_code:req
1066 idtentry trace(\sym) trace(\do_sym) has_error_code=\has_error_code
1067 idtentry \sym \do_sym has_error_code=\has_error_code
1068 .endm
1069 #else
1070 .macro trace_idtentry sym do_sym has_error_code:req
1071 idtentry \sym \do_sym has_error_code=\has_error_code
1072 .endm
1073 #endif
1074
1075 idtentry divide_error do_divide_error has_error_code=0
1076 idtentry overflow do_overflow has_error_code=0
1077 idtentry bounds do_bounds has_error_code=0
1078 idtentry invalid_op do_invalid_op has_error_code=0
1079 idtentry device_not_available do_device_not_available has_error_code=0
1080 idtentry double_fault do_double_fault has_error_code=1 paranoid=2
1081 idtentry coprocessor_segment_overrun do_coprocessor_segment_overrun has_error_code=0
1082 idtentry invalid_TSS do_invalid_TSS has_error_code=1
1083 idtentry segment_not_present do_segment_not_present has_error_code=1
1084 idtentry spurious_interrupt_bug do_spurious_interrupt_bug has_error_code=0
1085 idtentry coprocessor_error do_coprocessor_error has_error_code=0
1086 idtentry alignment_check do_alignment_check has_error_code=1
1087 idtentry simd_coprocessor_error do_simd_coprocessor_error has_error_code=0
1088
1089
1090 /* Reload gs selector with exception handling */
1091 /* edi: new selector */
1092 ENTRY(native_load_gs_index)
1093 CFI_STARTPROC
1094 pushfq_cfi
1095 DISABLE_INTERRUPTS(CLBR_ANY & ~CLBR_RDI)
1096 SWAPGS
1097 gs_change:
1098 movl %edi,%gs
1099 2: mfence /* workaround */
1100 SWAPGS
1101 popfq_cfi
1102 ret
1103 CFI_ENDPROC
1104 END(native_load_gs_index)
1105
1106 _ASM_EXTABLE(gs_change,bad_gs)
1107 .section .fixup,"ax"
1108 /* running with kernelgs */
1109 bad_gs:
1110 SWAPGS /* switch back to user gs */
1111 xorl %eax,%eax
1112 movl %eax,%gs
1113 jmp 2b
1114 .previous
1115
1116 /* Call softirq on interrupt stack. Interrupts are off. */
1117 ENTRY(do_softirq_own_stack)
1118 CFI_STARTPROC
1119 pushq_cfi %rbp
1120 CFI_REL_OFFSET rbp,0
1121 mov %rsp,%rbp
1122 CFI_DEF_CFA_REGISTER rbp
1123 incl PER_CPU_VAR(irq_count)
1124 cmove PER_CPU_VAR(irq_stack_ptr),%rsp
1125 push %rbp # backlink for old unwinder
1126 call __do_softirq
1127 leaveq
1128 CFI_RESTORE rbp
1129 CFI_DEF_CFA_REGISTER rsp
1130 CFI_ADJUST_CFA_OFFSET -8
1131 decl PER_CPU_VAR(irq_count)
1132 ret
1133 CFI_ENDPROC
1134 END(do_softirq_own_stack)
1135
1136 #ifdef CONFIG_XEN
1137 idtentry xen_hypervisor_callback xen_do_hypervisor_callback has_error_code=0
1138
1139 /*
1140 * A note on the "critical region" in our callback handler.
1141 * We want to avoid stacking callback handlers due to events occurring
1142 * during handling of the last event. To do this, we keep events disabled
1143 * until we've done all processing. HOWEVER, we must enable events before
1144 * popping the stack frame (can't be done atomically) and so it would still
1145 * be possible to get enough handler activations to overflow the stack.
1146 * Although unlikely, bugs of that kind are hard to track down, so we'd
1147 * like to avoid the possibility.
1148 * So, on entry to the handler we detect whether we interrupted an
1149 * existing activation in its critical region -- if so, we pop the current
1150 * activation and restart the handler using the previous one.
1151 */
1152 ENTRY(xen_do_hypervisor_callback) # do_hypervisor_callback(struct *pt_regs)
1153 CFI_STARTPROC
1154 /*
1155 * Since we don't modify %rdi, evtchn_do_upall(struct *pt_regs) will
1156 * see the correct pointer to the pt_regs
1157 */
1158 movq %rdi, %rsp # we don't return, adjust the stack frame
1159 CFI_ENDPROC
1160 DEFAULT_FRAME
1161 11: incl PER_CPU_VAR(irq_count)
1162 movq %rsp,%rbp
1163 CFI_DEF_CFA_REGISTER rbp
1164 cmovzq PER_CPU_VAR(irq_stack_ptr),%rsp
1165 pushq %rbp # backlink for old unwinder
1166 call xen_evtchn_do_upcall
1167 popq %rsp
1168 CFI_DEF_CFA_REGISTER rsp
1169 decl PER_CPU_VAR(irq_count)
1170 #ifndef CONFIG_PREEMPT
1171 call xen_maybe_preempt_hcall
1172 #endif
1173 jmp error_exit
1174 CFI_ENDPROC
1175 END(xen_do_hypervisor_callback)
1176
1177 /*
1178 * Hypervisor uses this for application faults while it executes.
1179 * We get here for two reasons:
1180 * 1. Fault while reloading DS, ES, FS or GS
1181 * 2. Fault while executing IRET
1182 * Category 1 we do not need to fix up as Xen has already reloaded all segment
1183 * registers that could be reloaded and zeroed the others.
1184 * Category 2 we fix up by killing the current process. We cannot use the
1185 * normal Linux return path in this case because if we use the IRET hypercall
1186 * to pop the stack frame we end up in an infinite loop of failsafe callbacks.
1187 * We distinguish between categories by comparing each saved segment register
1188 * with its current contents: any discrepancy means we in category 1.
1189 */
1190 ENTRY(xen_failsafe_callback)
1191 INTR_FRAME 1 (6*8)
1192 /*CFI_REL_OFFSET gs,GS*/
1193 /*CFI_REL_OFFSET fs,FS*/
1194 /*CFI_REL_OFFSET es,ES*/
1195 /*CFI_REL_OFFSET ds,DS*/
1196 CFI_REL_OFFSET r11,8
1197 CFI_REL_OFFSET rcx,0
1198 movw %ds,%cx
1199 cmpw %cx,0x10(%rsp)
1200 CFI_REMEMBER_STATE
1201 jne 1f
1202 movw %es,%cx
1203 cmpw %cx,0x18(%rsp)
1204 jne 1f
1205 movw %fs,%cx
1206 cmpw %cx,0x20(%rsp)
1207 jne 1f
1208 movw %gs,%cx
1209 cmpw %cx,0x28(%rsp)
1210 jne 1f
1211 /* All segments match their saved values => Category 2 (Bad IRET). */
1212 movq (%rsp),%rcx
1213 CFI_RESTORE rcx
1214 movq 8(%rsp),%r11
1215 CFI_RESTORE r11
1216 addq $0x30,%rsp
1217 CFI_ADJUST_CFA_OFFSET -0x30
1218 pushq_cfi $0 /* RIP */
1219 pushq_cfi %r11
1220 pushq_cfi %rcx
1221 jmp general_protection
1222 CFI_RESTORE_STATE
1223 1: /* Segment mismatch => Category 1 (Bad segment). Retry the IRET. */
1224 movq (%rsp),%rcx
1225 CFI_RESTORE rcx
1226 movq 8(%rsp),%r11
1227 CFI_RESTORE r11
1228 addq $0x30,%rsp
1229 CFI_ADJUST_CFA_OFFSET -0x30
1230 pushq_cfi $-1 /* orig_ax = -1 => not a system call */
1231 ALLOC_PT_GPREGS_ON_STACK
1232 SAVE_C_REGS
1233 SAVE_EXTRA_REGS
1234 jmp error_exit
1235 CFI_ENDPROC
1236 END(xen_failsafe_callback)
1237
1238 apicinterrupt3 HYPERVISOR_CALLBACK_VECTOR \
1239 xen_hvm_callback_vector xen_evtchn_do_upcall
1240
1241 #endif /* CONFIG_XEN */
1242
1243 #if IS_ENABLED(CONFIG_HYPERV)
1244 apicinterrupt3 HYPERVISOR_CALLBACK_VECTOR \
1245 hyperv_callback_vector hyperv_vector_handler
1246 #endif /* CONFIG_HYPERV */
1247
1248 idtentry debug do_debug has_error_code=0 paranoid=1 shift_ist=DEBUG_STACK
1249 idtentry int3 do_int3 has_error_code=0 paranoid=1 shift_ist=DEBUG_STACK
1250 idtentry stack_segment do_stack_segment has_error_code=1
1251 #ifdef CONFIG_XEN
1252 idtentry xen_debug do_debug has_error_code=0
1253 idtentry xen_int3 do_int3 has_error_code=0
1254 idtentry xen_stack_segment do_stack_segment has_error_code=1
1255 #endif
1256 idtentry general_protection do_general_protection has_error_code=1
1257 trace_idtentry page_fault do_page_fault has_error_code=1
1258 #ifdef CONFIG_KVM_GUEST
1259 idtentry async_page_fault do_async_page_fault has_error_code=1
1260 #endif
1261 #ifdef CONFIG_X86_MCE
1262 idtentry machine_check has_error_code=0 paranoid=1 do_sym=*machine_check_vector(%rip)
1263 #endif
1264
1265 /*
1266 * "Paranoid" exit path from exception stack. This is invoked
1267 * only on return from non-NMI IST interrupts that came
1268 * from kernel space.
1269 *
1270 * We may be returning to very strange contexts (e.g. very early
1271 * in syscall entry), so checking for preemption here would
1272 * be complicated. Fortunately, we there's no good reason
1273 * to try to handle preemption here.
1274 */
1275
1276 /* ebx: no swapgs flag */
1277 ENTRY(paranoid_exit)
1278 DEFAULT_FRAME
1279 DISABLE_INTERRUPTS(CLBR_NONE)
1280 TRACE_IRQS_OFF_DEBUG
1281 testl %ebx,%ebx /* swapgs needed? */
1282 jnz paranoid_restore
1283 TRACE_IRQS_IRETQ 0
1284 SWAPGS_UNSAFE_STACK
1285 RESTORE_EXTRA_REGS
1286 RESTORE_C_REGS
1287 REMOVE_PT_GPREGS_FROM_STACK 8
1288 INTERRUPT_RETURN
1289 paranoid_restore:
1290 TRACE_IRQS_IRETQ_DEBUG 0
1291 RESTORE_EXTRA_REGS
1292 RESTORE_C_REGS
1293 REMOVE_PT_GPREGS_FROM_STACK 8
1294 INTERRUPT_RETURN
1295 CFI_ENDPROC
1296 END(paranoid_exit)
1297
1298 /*
1299 * Exception entry point. This expects an error code/orig_rax on the stack.
1300 * returns in "no swapgs flag" in %ebx.
1301 */
1302 ENTRY(error_entry)
1303 XCPT_FRAME
1304 CFI_ADJUST_CFA_OFFSET 15*8
1305 /* oldrax contains error code */
1306 cld
1307 SAVE_C_REGS 8
1308 SAVE_EXTRA_REGS 8
1309 xorl %ebx,%ebx
1310 testl $3,CS+8(%rsp)
1311 je error_kernelspace
1312 error_swapgs:
1313 SWAPGS
1314 error_sti:
1315 TRACE_IRQS_OFF
1316 ret
1317
1318 /*
1319 * There are two places in the kernel that can potentially fault with
1320 * usergs. Handle them here. B stepping K8s sometimes report a
1321 * truncated RIP for IRET exceptions returning to compat mode. Check
1322 * for these here too.
1323 */
1324 error_kernelspace:
1325 CFI_REL_OFFSET rcx, RCX+8
1326 incl %ebx
1327 leaq native_irq_return_iret(%rip),%rcx
1328 cmpq %rcx,RIP+8(%rsp)
1329 je error_bad_iret
1330 movl %ecx,%eax /* zero extend */
1331 cmpq %rax,RIP+8(%rsp)
1332 je bstep_iret
1333 cmpq $gs_change,RIP+8(%rsp)
1334 je error_swapgs
1335 jmp error_sti
1336
1337 bstep_iret:
1338 /* Fix truncated RIP */
1339 movq %rcx,RIP+8(%rsp)
1340 /* fall through */
1341
1342 error_bad_iret:
1343 SWAPGS
1344 mov %rsp,%rdi
1345 call fixup_bad_iret
1346 mov %rax,%rsp
1347 decl %ebx /* Return to usergs */
1348 jmp error_sti
1349 CFI_ENDPROC
1350 END(error_entry)
1351
1352
1353 /* ebx: no swapgs flag (1: don't need swapgs, 0: need it) */
1354 ENTRY(error_exit)
1355 DEFAULT_FRAME
1356 movl %ebx,%eax
1357 RESTORE_EXTRA_REGS
1358 DISABLE_INTERRUPTS(CLBR_NONE)
1359 TRACE_IRQS_OFF
1360 GET_THREAD_INFO(%rcx)
1361 testl %eax,%eax
1362 jne retint_kernel
1363 LOCKDEP_SYS_EXIT_IRQ
1364 movl TI_flags(%rcx),%edx
1365 movl $_TIF_WORK_MASK,%edi
1366 andl %edi,%edx
1367 jnz retint_careful
1368 jmp retint_swapgs
1369 CFI_ENDPROC
1370 END(error_exit)
1371
1372 /*
1373 * Test if a given stack is an NMI stack or not.
1374 */
1375 .macro test_in_nmi reg stack nmi_ret normal_ret
1376 cmpq %\reg, \stack
1377 ja \normal_ret
1378 subq $EXCEPTION_STKSZ, %\reg
1379 cmpq %\reg, \stack
1380 jb \normal_ret
1381 jmp \nmi_ret
1382 .endm
1383
1384 /* runs on exception stack */
1385 ENTRY(nmi)
1386 INTR_FRAME
1387 PARAVIRT_ADJUST_EXCEPTION_FRAME
1388 /*
1389 * We allow breakpoints in NMIs. If a breakpoint occurs, then
1390 * the iretq it performs will take us out of NMI context.
1391 * This means that we can have nested NMIs where the next
1392 * NMI is using the top of the stack of the previous NMI. We
1393 * can't let it execute because the nested NMI will corrupt the
1394 * stack of the previous NMI. NMI handlers are not re-entrant
1395 * anyway.
1396 *
1397 * To handle this case we do the following:
1398 * Check the a special location on the stack that contains
1399 * a variable that is set when NMIs are executing.
1400 * The interrupted task's stack is also checked to see if it
1401 * is an NMI stack.
1402 * If the variable is not set and the stack is not the NMI
1403 * stack then:
1404 * o Set the special variable on the stack
1405 * o Copy the interrupt frame into a "saved" location on the stack
1406 * o Copy the interrupt frame into a "copy" location on the stack
1407 * o Continue processing the NMI
1408 * If the variable is set or the previous stack is the NMI stack:
1409 * o Modify the "copy" location to jump to the repeate_nmi
1410 * o return back to the first NMI
1411 *
1412 * Now on exit of the first NMI, we first clear the stack variable
1413 * The NMI stack will tell any nested NMIs at that point that it is
1414 * nested. Then we pop the stack normally with iret, and if there was
1415 * a nested NMI that updated the copy interrupt stack frame, a
1416 * jump will be made to the repeat_nmi code that will handle the second
1417 * NMI.
1418 */
1419
1420 /* Use %rdx as out temp variable throughout */
1421 pushq_cfi %rdx
1422 CFI_REL_OFFSET rdx, 0
1423
1424 /*
1425 * If %cs was not the kernel segment, then the NMI triggered in user
1426 * space, which means it is definitely not nested.
1427 */
1428 cmpl $__KERNEL_CS, 16(%rsp)
1429 jne first_nmi
1430
1431 /*
1432 * Check the special variable on the stack to see if NMIs are
1433 * executing.
1434 */
1435 cmpl $1, -8(%rsp)
1436 je nested_nmi
1437
1438 /*
1439 * Now test if the previous stack was an NMI stack.
1440 * We need the double check. We check the NMI stack to satisfy the
1441 * race when the first NMI clears the variable before returning.
1442 * We check the variable because the first NMI could be in a
1443 * breakpoint routine using a breakpoint stack.
1444 */
1445 lea 6*8(%rsp), %rdx
1446 test_in_nmi rdx, 4*8(%rsp), nested_nmi, first_nmi
1447 CFI_REMEMBER_STATE
1448
1449 nested_nmi:
1450 /*
1451 * Do nothing if we interrupted the fixup in repeat_nmi.
1452 * It's about to repeat the NMI handler, so we are fine
1453 * with ignoring this one.
1454 */
1455 movq $repeat_nmi, %rdx
1456 cmpq 8(%rsp), %rdx
1457 ja 1f
1458 movq $end_repeat_nmi, %rdx
1459 cmpq 8(%rsp), %rdx
1460 ja nested_nmi_out
1461
1462 1:
1463 /* Set up the interrupted NMIs stack to jump to repeat_nmi */
1464 leaq -1*8(%rsp), %rdx
1465 movq %rdx, %rsp
1466 CFI_ADJUST_CFA_OFFSET 1*8
1467 leaq -10*8(%rsp), %rdx
1468 pushq_cfi $__KERNEL_DS
1469 pushq_cfi %rdx
1470 pushfq_cfi
1471 pushq_cfi $__KERNEL_CS
1472 pushq_cfi $repeat_nmi
1473
1474 /* Put stack back */
1475 addq $(6*8), %rsp
1476 CFI_ADJUST_CFA_OFFSET -6*8
1477
1478 nested_nmi_out:
1479 popq_cfi %rdx
1480 CFI_RESTORE rdx
1481
1482 /* No need to check faults here */
1483 INTERRUPT_RETURN
1484
1485 CFI_RESTORE_STATE
1486 first_nmi:
1487 /*
1488 * Because nested NMIs will use the pushed location that we
1489 * stored in rdx, we must keep that space available.
1490 * Here's what our stack frame will look like:
1491 * +-------------------------+
1492 * | original SS |
1493 * | original Return RSP |
1494 * | original RFLAGS |
1495 * | original CS |
1496 * | original RIP |
1497 * +-------------------------+
1498 * | temp storage for rdx |
1499 * +-------------------------+
1500 * | NMI executing variable |
1501 * +-------------------------+
1502 * | copied SS |
1503 * | copied Return RSP |
1504 * | copied RFLAGS |
1505 * | copied CS |
1506 * | copied RIP |
1507 * +-------------------------+
1508 * | Saved SS |
1509 * | Saved Return RSP |
1510 * | Saved RFLAGS |
1511 * | Saved CS |
1512 * | Saved RIP |
1513 * +-------------------------+
1514 * | pt_regs |
1515 * +-------------------------+
1516 *
1517 * The saved stack frame is used to fix up the copied stack frame
1518 * that a nested NMI may change to make the interrupted NMI iret jump
1519 * to the repeat_nmi. The original stack frame and the temp storage
1520 * is also used by nested NMIs and can not be trusted on exit.
1521 */
1522 /* Do not pop rdx, nested NMIs will corrupt that part of the stack */
1523 movq (%rsp), %rdx
1524 CFI_RESTORE rdx
1525
1526 /* Set the NMI executing variable on the stack. */
1527 pushq_cfi $1
1528
1529 /*
1530 * Leave room for the "copied" frame
1531 */
1532 subq $(5*8), %rsp
1533 CFI_ADJUST_CFA_OFFSET 5*8
1534
1535 /* Copy the stack frame to the Saved frame */
1536 .rept 5
1537 pushq_cfi 11*8(%rsp)
1538 .endr
1539 CFI_DEF_CFA_OFFSET SS+8-RIP
1540
1541 /* Everything up to here is safe from nested NMIs */
1542
1543 /*
1544 * If there was a nested NMI, the first NMI's iret will return
1545 * here. But NMIs are still enabled and we can take another
1546 * nested NMI. The nested NMI checks the interrupted RIP to see
1547 * if it is between repeat_nmi and end_repeat_nmi, and if so
1548 * it will just return, as we are about to repeat an NMI anyway.
1549 * This makes it safe to copy to the stack frame that a nested
1550 * NMI will update.
1551 */
1552 repeat_nmi:
1553 /*
1554 * Update the stack variable to say we are still in NMI (the update
1555 * is benign for the non-repeat case, where 1 was pushed just above
1556 * to this very stack slot).
1557 */
1558 movq $1, 10*8(%rsp)
1559
1560 /* Make another copy, this one may be modified by nested NMIs */
1561 addq $(10*8), %rsp
1562 CFI_ADJUST_CFA_OFFSET -10*8
1563 .rept 5
1564 pushq_cfi -6*8(%rsp)
1565 .endr
1566 subq $(5*8), %rsp
1567 CFI_DEF_CFA_OFFSET SS+8-RIP
1568 end_repeat_nmi:
1569
1570 /*
1571 * Everything below this point can be preempted by a nested
1572 * NMI if the first NMI took an exception and reset our iret stack
1573 * so that we repeat another NMI.
1574 */
1575 pushq_cfi $-1 /* ORIG_RAX: no syscall to restart */
1576 ALLOC_PT_GPREGS_ON_STACK
1577
1578 /*
1579 * Use save_paranoid to handle SWAPGS, but no need to use paranoid_exit
1580 * as we should not be calling schedule in NMI context.
1581 * Even with normal interrupts enabled. An NMI should not be
1582 * setting NEED_RESCHED or anything that normal interrupts and
1583 * exceptions might do.
1584 */
1585 call save_paranoid
1586 DEFAULT_FRAME 0
1587
1588 /*
1589 * Save off the CR2 register. If we take a page fault in the NMI then
1590 * it could corrupt the CR2 value. If the NMI preempts a page fault
1591 * handler before it was able to read the CR2 register, and then the
1592 * NMI itself takes a page fault, the page fault that was preempted
1593 * will read the information from the NMI page fault and not the
1594 * origin fault. Save it off and restore it if it changes.
1595 * Use the r12 callee-saved register.
1596 */
1597 movq %cr2, %r12
1598
1599 /* paranoidentry do_nmi, 0; without TRACE_IRQS_OFF */
1600 movq %rsp,%rdi
1601 movq $-1,%rsi
1602 call do_nmi
1603
1604 /* Did the NMI take a page fault? Restore cr2 if it did */
1605 movq %cr2, %rcx
1606 cmpq %rcx, %r12
1607 je 1f
1608 movq %r12, %cr2
1609 1:
1610
1611 testl %ebx,%ebx /* swapgs needed? */
1612 jnz nmi_restore
1613 nmi_swapgs:
1614 SWAPGS_UNSAFE_STACK
1615 nmi_restore:
1616 RESTORE_EXTRA_REGS
1617 RESTORE_C_REGS
1618 /* Pop the extra iret frame at once */
1619 REMOVE_PT_GPREGS_FROM_STACK 6*8
1620
1621 /* Clear the NMI executing stack variable */
1622 movq $0, 5*8(%rsp)
1623 jmp irq_return
1624 CFI_ENDPROC
1625 END(nmi)
1626
1627 ENTRY(ignore_sysret)
1628 CFI_STARTPROC
1629 mov $-ENOSYS,%eax
1630 sysret
1631 CFI_ENDPROC
1632 END(ignore_sysret)
1633