Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 2 | * Compatibility mode system call entry point for x86-64. |
| 3 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 4 | * Copyright 2000-2002 Andi Kleen, SuSE Labs. |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 5 | */ |
Ingo Molnar | d36f947 | 2015-06-03 18:29:26 +0200 | [diff] [blame] | 6 | #include "calling.h" |
Sam Ravnborg | e2d5df9 | 2005-09-09 21:28:48 +0200 | [diff] [blame] | 7 | #include <asm/asm-offsets.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 8 | #include <asm/current.h> |
| 9 | #include <asm/errno.h> |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 10 | #include <asm/ia32_unistd.h> |
| 11 | #include <asm/thread_info.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 12 | #include <asm/segment.h> |
Ingo Molnar | 2601e64 | 2006-07-03 00:24:45 -0700 | [diff] [blame] | 13 | #include <asm/irqflags.h> |
H. Peter Anvin | 1ce6f86 | 2012-04-20 12:19:50 -0700 | [diff] [blame] | 14 | #include <asm/asm.h> |
H. Peter Anvin | 63bcff2 | 2012-09-21 12:43:12 -0700 | [diff] [blame] | 15 | #include <asm/smap.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 16 | #include <linux/linkage.h> |
Eric Paris | d7e7528 | 2012-01-03 14:23:06 -0500 | [diff] [blame] | 17 | #include <linux/err.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 18 | |
Jiri Olsa | ea71454 | 2011-03-07 19:10:39 +0100 | [diff] [blame] | 19 | .section .entry.text, "ax" |
| 20 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 21 | /* |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 22 | * 32-bit SYSENTER instruction entry. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 23 | * |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 24 | * SYSENTER loads ss, rsp, cs, and rip from previously programmed MSRs. |
| 25 | * IF and VM in rflags are cleared (IOW: interrupts are off). |
| 26 | * SYSENTER does not save anything on the stack, |
| 27 | * and does not save old rip (!!!) and rflags. |
| 28 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 29 | * Arguments: |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 30 | * eax system call number |
| 31 | * ebx arg1 |
| 32 | * ecx arg2 |
| 33 | * edx arg3 |
| 34 | * esi arg4 |
| 35 | * edi arg5 |
| 36 | * ebp user stack |
| 37 | * 0(%ebp) arg6 |
| 38 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 39 | * This is purely a fast path. For anything complicated we use the int 0x80 |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 40 | * path below. We set up a complete hardware stack frame to share code |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 41 | * with the int 0x80 path. |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 42 | */ |
Ingo Molnar | 4c8cd0c | 2015-06-08 08:33:56 +0200 | [diff] [blame] | 43 | ENTRY(entry_SYSENTER_compat) |
Andy Lutomirski | b611acf | 2015-10-05 17:47:55 -0700 | [diff] [blame] | 44 | /* Interrupts are off on entry. */ |
Jeremy Fitzhardinge | 457da70 | 2008-06-26 07:28:51 -0700 | [diff] [blame] | 45 | SWAPGS_UNSAFE_STACK |
Denys Vlasenko | 3a23208 | 2015-04-24 17:31:35 +0200 | [diff] [blame] | 46 | movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp |
Denys Vlasenko | a232e3d | 2015-03-27 11:36:20 +0100 | [diff] [blame] | 47 | |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 48 | /* |
| 49 | * User tracing code (ptrace or signal handlers) might assume that |
| 50 | * the saved RAX contains a 32-bit number when we're invoking a 32-bit |
| 51 | * syscall. Just in case the high bits are nonzero, zero-extend |
| 52 | * the syscall number. (This could almost certainly be deleted |
| 53 | * with no ill effects.) |
| 54 | */ |
Denys Vlasenko | 4ee8ec1 | 2015-03-27 11:36:21 +0100 | [diff] [blame] | 55 | movl %eax, %eax |
| 56 | |
Denys Vlasenko | 4c9c0e9 | 2015-03-31 19:00:04 +0200 | [diff] [blame] | 57 | /* Construct struct pt_regs on stack */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 58 | pushq $__USER32_DS /* pt_regs->ss */ |
Andy Lutomirski | 30bfa7b | 2015-12-16 23:18:48 -0800 | [diff] [blame] | 59 | pushq %rbp /* pt_regs->sp (stashed in bp) */ |
Andy Lutomirski | b611acf | 2015-10-05 17:47:55 -0700 | [diff] [blame] | 60 | |
| 61 | /* |
| 62 | * Push flags. This is nasty. First, interrupts are currently |
| 63 | * off, but we need pt_regs->flags to have IF set. Second, even |
| 64 | * if TF was set when SYSENTER started, it's clear by now. We fix |
| 65 | * that later using TIF_SINGLESTEP. |
| 66 | */ |
| 67 | pushfq /* pt_regs->flags (except IF = 0) */ |
| 68 | orl $X86_EFLAGS_IF, (%rsp) /* Fix saved flags */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 69 | pushq $__USER32_CS /* pt_regs->cs */ |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 70 | xorq %r8,%r8 |
| 71 | pushq %r8 /* pt_regs->ip = 0 (placeholder) */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 72 | pushq %rax /* pt_regs->orig_ax */ |
| 73 | pushq %rdi /* pt_regs->di */ |
| 74 | pushq %rsi /* pt_regs->si */ |
| 75 | pushq %rdx /* pt_regs->dx */ |
Andy Lutomirski | 30bfa7b | 2015-12-16 23:18:48 -0800 | [diff] [blame] | 76 | pushq %rcx /* pt_regs->cx */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 77 | pushq $-ENOSYS /* pt_regs->ax */ |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 78 | pushq %r8 /* pt_regs->r8 = 0 */ |
| 79 | pushq %r8 /* pt_regs->r9 = 0 */ |
| 80 | pushq %r8 /* pt_regs->r10 = 0 */ |
| 81 | pushq %r8 /* pt_regs->r11 = 0 */ |
| 82 | pushq %rbx /* pt_regs->rbx */ |
Andy Lutomirski | 30bfa7b | 2015-12-16 23:18:48 -0800 | [diff] [blame] | 83 | pushq %rbp /* pt_regs->rbp (will be overwritten) */ |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 84 | pushq %r8 /* pt_regs->r12 = 0 */ |
| 85 | pushq %r8 /* pt_regs->r13 = 0 */ |
| 86 | pushq %r8 /* pt_regs->r14 = 0 */ |
| 87 | pushq %r8 /* pt_regs->r15 = 0 */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 88 | cld |
Denys Vlasenko | 4c9c0e9 | 2015-03-31 19:00:04 +0200 | [diff] [blame] | 89 | |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 90 | /* |
Andy Lutomirski | e786041 | 2016-03-09 19:00:25 -0800 | [diff] [blame] | 91 | * SYSENTER doesn't filter flags, so we need to clear NT and AC |
Andy Lutomirski | 8c7aa69 | 2014-10-01 11:49:04 -0700 | [diff] [blame] | 92 | * ourselves. To save a few cycles, we can check whether |
Andy Lutomirski | e786041 | 2016-03-09 19:00:25 -0800 | [diff] [blame] | 93 | * either was set instead of doing an unconditional popfq. |
Andy Lutomirski | b611acf | 2015-10-05 17:47:55 -0700 | [diff] [blame] | 94 | * This needs to happen before enabling interrupts so that |
| 95 | * we don't get preempted with NT set. |
Borislav Petkov | 374a3a3 | 2015-10-09 19:08:59 +0200 | [diff] [blame] | 96 | * |
Andy Lutomirski | f2b3757 | 2016-03-09 19:00:30 -0800 | [diff] [blame^] | 97 | * If TF is set, we will single-step all the way to here -- do_debug |
| 98 | * will ignore all the traps. (Yes, this is slow, but so is |
| 99 | * single-stepping in general. This allows us to avoid having |
| 100 | * a more complicated code to handle the case where a user program |
| 101 | * forces us to single-step through the SYSENTER entry code.) |
| 102 | * |
Borislav Petkov | f74acf0 | 2015-12-12 11:27:57 +0100 | [diff] [blame] | 103 | * NB.: .Lsysenter_fix_flags is a label with the code under it moved |
Borislav Petkov | 374a3a3 | 2015-10-09 19:08:59 +0200 | [diff] [blame] | 104 | * out-of-line as an optimization: NT is unlikely to be set in the |
| 105 | * majority of the cases and instead of polluting the I$ unnecessarily, |
| 106 | * we're keeping that code behind a branch which will predict as |
| 107 | * not-taken and therefore its instructions won't be fetched. |
Andy Lutomirski | 8c7aa69 | 2014-10-01 11:49:04 -0700 | [diff] [blame] | 108 | */ |
Andy Lutomirski | f2b3757 | 2016-03-09 19:00:30 -0800 | [diff] [blame^] | 109 | testl $X86_EFLAGS_NT|X86_EFLAGS_AC|X86_EFLAGS_TF, EFLAGS(%rsp) |
Borislav Petkov | f74acf0 | 2015-12-12 11:27:57 +0100 | [diff] [blame] | 110 | jnz .Lsysenter_fix_flags |
| 111 | .Lsysenter_flags_fixed: |
Andy Lutomirski | 8c7aa69 | 2014-10-01 11:49:04 -0700 | [diff] [blame] | 112 | |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 113 | /* |
| 114 | * User mode is traced as though IRQs are on, and SYSENTER |
| 115 | * turned them off. |
| 116 | */ |
| 117 | TRACE_IRQS_OFF |
Andy Lutomirski | e62a254 | 2015-10-05 17:48:02 -0700 | [diff] [blame] | 118 | |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 119 | movq %rsp, %rdi |
| 120 | call do_fast_syscall_32 |
Boris Ostrovsky | 91e2eea | 2015-11-19 16:55:45 -0500 | [diff] [blame] | 121 | /* XEN PV guests always use IRET path */ |
| 122 | ALTERNATIVE "testl %eax, %eax; jz .Lsyscall_32_done", \ |
| 123 | "jmp .Lsyscall_32_done", X86_FEATURE_XENPV |
Andy Lutomirski | 7841b40 | 2015-10-05 17:48:12 -0700 | [diff] [blame] | 124 | jmp sysret32_from_system_call |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 125 | |
Borislav Petkov | f74acf0 | 2015-12-12 11:27:57 +0100 | [diff] [blame] | 126 | .Lsysenter_fix_flags: |
Andy Lutomirski | b611acf | 2015-10-05 17:47:55 -0700 | [diff] [blame] | 127 | pushq $X86_EFLAGS_FIXED |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 128 | popfq |
Borislav Petkov | f74acf0 | 2015-12-12 11:27:57 +0100 | [diff] [blame] | 129 | jmp .Lsysenter_flags_fixed |
Andy Lutomirski | f2b3757 | 2016-03-09 19:00:30 -0800 | [diff] [blame^] | 130 | GLOBAL(__end_entry_SYSENTER_compat) |
Ingo Molnar | 4c8cd0c | 2015-06-08 08:33:56 +0200 | [diff] [blame] | 131 | ENDPROC(entry_SYSENTER_compat) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 132 | |
| 133 | /* |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 134 | * 32-bit SYSCALL instruction entry. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 135 | * |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 136 | * 32-bit SYSCALL saves rip to rcx, clears rflags.RF, then saves rflags to r11, |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 137 | * then loads new ss, cs, and rip from previously programmed MSRs. |
| 138 | * rflags gets masked by a value from another MSR (so CLD and CLAC |
| 139 | * are not needed). SYSCALL does not save anything on the stack |
| 140 | * and does not change rsp. |
| 141 | * |
| 142 | * Note: rflags saving+masking-with-MSR happens only in Long mode |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 143 | * (in legacy 32-bit mode, IF, RF and VM bits are cleared and that's it). |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 144 | * Don't get confused: rflags saving+masking depends on Long Mode Active bit |
| 145 | * (EFER.LMA=1), NOT on bitness of userspace where SYSCALL executes |
| 146 | * or target CS descriptor's L bit (SYSCALL does not read segment descriptors). |
| 147 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 148 | * Arguments: |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 149 | * eax system call number |
| 150 | * ecx return address |
| 151 | * ebx arg1 |
| 152 | * ebp arg2 (note: not saved in the stack frame, should not be touched) |
| 153 | * edx arg3 |
| 154 | * esi arg4 |
| 155 | * edi arg5 |
| 156 | * esp user stack |
| 157 | * 0(%esp) arg6 |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 158 | */ |
Ingo Molnar | 2cd2355 | 2015-06-08 08:28:07 +0200 | [diff] [blame] | 159 | ENTRY(entry_SYSCALL_compat) |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 160 | /* Interrupts are off on entry. */ |
Jeremy Fitzhardinge | 457da70 | 2008-06-26 07:28:51 -0700 | [diff] [blame] | 161 | SWAPGS_UNSAFE_STACK |
Andy Lutomirski | e62a254 | 2015-10-05 17:48:02 -0700 | [diff] [blame] | 162 | |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 163 | /* Stash user ESP and switch to the kernel stack. */ |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 164 | movl %esp, %r8d |
| 165 | movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp |
Denys Vlasenko | a232e3d | 2015-03-27 11:36:20 +0100 | [diff] [blame] | 166 | |
Denys Vlasenko | 4ee8ec1 | 2015-03-27 11:36:21 +0100 | [diff] [blame] | 167 | /* Zero-extending 32-bit regs, do not remove */ |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 168 | movl %eax, %eax |
Denys Vlasenko | 4ee8ec1 | 2015-03-27 11:36:21 +0100 | [diff] [blame] | 169 | |
Denys Vlasenko | 4c9c0e9 | 2015-03-31 19:00:04 +0200 | [diff] [blame] | 170 | /* Construct struct pt_regs on stack */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 171 | pushq $__USER32_DS /* pt_regs->ss */ |
| 172 | pushq %r8 /* pt_regs->sp */ |
| 173 | pushq %r11 /* pt_regs->flags */ |
| 174 | pushq $__USER32_CS /* pt_regs->cs */ |
| 175 | pushq %rcx /* pt_regs->ip */ |
| 176 | pushq %rax /* pt_regs->orig_ax */ |
| 177 | pushq %rdi /* pt_regs->di */ |
| 178 | pushq %rsi /* pt_regs->si */ |
| 179 | pushq %rdx /* pt_regs->dx */ |
Andy Lutomirski | 30bfa7b | 2015-12-16 23:18:48 -0800 | [diff] [blame] | 180 | pushq %rbp /* pt_regs->cx (stashed in bp) */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 181 | pushq $-ENOSYS /* pt_regs->ax */ |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 182 | xorq %r8,%r8 |
| 183 | pushq %r8 /* pt_regs->r8 = 0 */ |
| 184 | pushq %r8 /* pt_regs->r9 = 0 */ |
| 185 | pushq %r8 /* pt_regs->r10 = 0 */ |
| 186 | pushq %r8 /* pt_regs->r11 = 0 */ |
| 187 | pushq %rbx /* pt_regs->rbx */ |
Andy Lutomirski | 30bfa7b | 2015-12-16 23:18:48 -0800 | [diff] [blame] | 188 | pushq %rbp /* pt_regs->rbp (will be overwritten) */ |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 189 | pushq %r8 /* pt_regs->r12 = 0 */ |
| 190 | pushq %r8 /* pt_regs->r13 = 0 */ |
| 191 | pushq %r8 /* pt_regs->r14 = 0 */ |
| 192 | pushq %r8 /* pt_regs->r15 = 0 */ |
Denys Vlasenko | 4c9c0e9 | 2015-03-31 19:00:04 +0200 | [diff] [blame] | 193 | |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 194 | /* |
| 195 | * User mode is traced as though IRQs are on, and SYSENTER |
| 196 | * turned them off. |
| 197 | */ |
| 198 | TRACE_IRQS_OFF |
| 199 | |
| 200 | movq %rsp, %rdi |
| 201 | call do_fast_syscall_32 |
Boris Ostrovsky | 91e2eea | 2015-11-19 16:55:45 -0500 | [diff] [blame] | 202 | /* XEN PV guests always use IRET path */ |
| 203 | ALTERNATIVE "testl %eax, %eax; jz .Lsyscall_32_done", \ |
| 204 | "jmp .Lsyscall_32_done", X86_FEATURE_XENPV |
Andy Lutomirski | 7841b40 | 2015-10-05 17:48:12 -0700 | [diff] [blame] | 205 | |
| 206 | /* Opportunistic SYSRET */ |
| 207 | sysret32_from_system_call: |
| 208 | TRACE_IRQS_ON /* User mode traces as IRQs on. */ |
| 209 | movq RBX(%rsp), %rbx /* pt_regs->rbx */ |
| 210 | movq RBP(%rsp), %rbp /* pt_regs->rbp */ |
| 211 | movq EFLAGS(%rsp), %r11 /* pt_regs->flags (in r11) */ |
| 212 | movq RIP(%rsp), %rcx /* pt_regs->ip (in rcx) */ |
| 213 | addq $RAX, %rsp /* Skip r8-r15 */ |
| 214 | popq %rax /* pt_regs->rax */ |
| 215 | popq %rdx /* Skip pt_regs->cx */ |
| 216 | popq %rdx /* pt_regs->dx */ |
| 217 | popq %rsi /* pt_regs->si */ |
| 218 | popq %rdi /* pt_regs->di */ |
| 219 | |
| 220 | /* |
| 221 | * USERGS_SYSRET32 does: |
| 222 | * GSBASE = user's GS base |
| 223 | * EIP = ECX |
| 224 | * RFLAGS = R11 |
| 225 | * CS = __USER32_CS |
| 226 | * SS = __USER_DS |
| 227 | * |
| 228 | * ECX will not match pt_regs->cx, but we're returning to a vDSO |
| 229 | * trampoline that will fix up RCX, so this is okay. |
| 230 | * |
| 231 | * R12-R15 are callee-saved, so they contain whatever was in them |
| 232 | * when the system call started, which is already known to user |
| 233 | * code. We zero R8-R10 to avoid info leaks. |
| 234 | */ |
| 235 | xorq %r8, %r8 |
| 236 | xorq %r9, %r9 |
| 237 | xorq %r10, %r10 |
| 238 | movq RSP-ORIG_RAX(%rsp), %rsp |
Boris Ostrovsky | 75ef821 | 2015-11-19 16:55:47 -0500 | [diff] [blame] | 239 | swapgs |
| 240 | sysretl |
Ingo Molnar | 2cd2355 | 2015-06-08 08:28:07 +0200 | [diff] [blame] | 241 | END(entry_SYSCALL_compat) |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 242 | |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 243 | /* |
| 244 | * Emulated IA32 system calls via int 0x80. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 245 | * |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 246 | * Arguments: |
| 247 | * eax system call number |
| 248 | * ebx arg1 |
| 249 | * ecx arg2 |
| 250 | * edx arg3 |
| 251 | * esi arg4 |
| 252 | * edi arg5 |
| 253 | * ebp arg6 (note: not saved in the stack frame, should not be touched) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 254 | * |
| 255 | * Notes: |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 256 | * Uses the same stack frame as the x86-64 version. |
| 257 | * All registers except eax must be saved (but ptrace may violate that). |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 258 | * Arguments are zero extended. For system calls that want sign extension and |
| 259 | * take long arguments a wrapper is needed. Most calls can just be called |
| 260 | * directly. |
Denys Vlasenko | b87cf63 | 2015-02-26 14:40:32 -0800 | [diff] [blame] | 261 | * Assumes it is only called from user space and entered with interrupts off. |
| 262 | */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 263 | |
Ingo Molnar | 2cd2355 | 2015-06-08 08:28:07 +0200 | [diff] [blame] | 264 | ENTRY(entry_INT80_compat) |
Denys Vlasenko | a232e3d | 2015-03-27 11:36:20 +0100 | [diff] [blame] | 265 | /* |
| 266 | * Interrupts are off on entry. |
Denys Vlasenko | a232e3d | 2015-03-27 11:36:20 +0100 | [diff] [blame] | 267 | */ |
Jeremy Fitzhardinge | 360c044 | 2008-07-08 15:06:28 -0700 | [diff] [blame] | 268 | PARAVIRT_ADJUST_EXCEPTION_FRAME |
Andy Lutomirski | 3d44d51 | 2016-02-24 12:18:49 -0800 | [diff] [blame] | 269 | ASM_CLAC /* Do this early to minimize exposure */ |
Jeremy Fitzhardinge | 6680415 | 2008-06-25 00:19:29 -0400 | [diff] [blame] | 270 | SWAPGS |
Denys Vlasenko | a232e3d | 2015-03-27 11:36:20 +0100 | [diff] [blame] | 271 | |
Andy Lutomirski | ee08c6b | 2015-10-05 17:48:09 -0700 | [diff] [blame] | 272 | /* |
| 273 | * User tracing code (ptrace or signal handlers) might assume that |
| 274 | * the saved RAX contains a 32-bit number when we're invoking a 32-bit |
| 275 | * syscall. Just in case the high bits are nonzero, zero-extend |
| 276 | * the syscall number. (This could almost certainly be deleted |
| 277 | * with no ill effects.) |
| 278 | */ |
Ingo Molnar | 54ad726 | 2015-06-05 13:02:28 +0200 | [diff] [blame] | 279 | movl %eax, %eax |
Denys Vlasenko | 4ee8ec1 | 2015-03-27 11:36:21 +0100 | [diff] [blame] | 280 | |
Denys Vlasenko | 4c9c0e9 | 2015-03-31 19:00:04 +0200 | [diff] [blame] | 281 | /* Construct struct pt_regs on stack (iret frame is already on stack) */ |
Ingo Molnar | 131484c | 2015-05-28 12:21:47 +0200 | [diff] [blame] | 282 | pushq %rax /* pt_regs->orig_ax */ |
| 283 | pushq %rdi /* pt_regs->di */ |
| 284 | pushq %rsi /* pt_regs->si */ |
| 285 | pushq %rdx /* pt_regs->dx */ |
| 286 | pushq %rcx /* pt_regs->cx */ |
| 287 | pushq $-ENOSYS /* pt_regs->ax */ |
Andy Lutomirski | 8169aff | 2015-10-05 17:48:05 -0700 | [diff] [blame] | 288 | xorq %r8,%r8 |
| 289 | pushq %r8 /* pt_regs->r8 = 0 */ |
| 290 | pushq %r8 /* pt_regs->r9 = 0 */ |
| 291 | pushq %r8 /* pt_regs->r10 = 0 */ |
| 292 | pushq %r8 /* pt_regs->r11 = 0 */ |
| 293 | pushq %rbx /* pt_regs->rbx */ |
| 294 | pushq %rbp /* pt_regs->rbp */ |
| 295 | pushq %r12 /* pt_regs->r12 */ |
| 296 | pushq %r13 /* pt_regs->r13 */ |
| 297 | pushq %r14 /* pt_regs->r14 */ |
| 298 | pushq %r15 /* pt_regs->r15 */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 299 | cld |
Denys Vlasenko | 4c9c0e9 | 2015-03-31 19:00:04 +0200 | [diff] [blame] | 300 | |
Denys Vlasenko | 73cbf68 | 2015-06-02 21:04:02 +0200 | [diff] [blame] | 301 | /* |
Andy Lutomirski | ee08c6b | 2015-10-05 17:48:09 -0700 | [diff] [blame] | 302 | * User mode is traced as though IRQs are on, and the interrupt |
| 303 | * gate turned them off. |
Denys Vlasenko | 73cbf68 | 2015-06-02 21:04:02 +0200 | [diff] [blame] | 304 | */ |
Andy Lutomirski | ee08c6b | 2015-10-05 17:48:09 -0700 | [diff] [blame] | 305 | TRACE_IRQS_OFF |
| 306 | |
| 307 | movq %rsp, %rdi |
Andy Lutomirski | 657c1ee | 2015-10-16 15:42:54 -0700 | [diff] [blame] | 308 | call do_syscall_32_irqs_off |
Andy Lutomirski | a474e67 | 2015-10-05 17:48:11 -0700 | [diff] [blame] | 309 | .Lsyscall_32_done: |
Andy Lutomirski | ee08c6b | 2015-10-05 17:48:09 -0700 | [diff] [blame] | 310 | |
| 311 | /* Go back to user mode. */ |
| 312 | TRACE_IRQS_ON |
| 313 | SWAPGS |
| 314 | jmp restore_regs_and_iret |
Ingo Molnar | 2cd2355 | 2015-06-08 08:28:07 +0200 | [diff] [blame] | 315 | END(entry_INT80_compat) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 316 | |
Jan Beulich | f6b2bc8 | 2011-11-29 11:24:10 +0000 | [diff] [blame] | 317 | ALIGN |
Al Viro | 1d4b4b2 | 2012-10-22 22:34:11 -0400 | [diff] [blame] | 318 | GLOBAL(stub32_clone) |
Denys Vlasenko | 5cdc683 | 2015-06-03 15:58:49 +0200 | [diff] [blame] | 319 | /* |
Denys Vlasenko | 7a5a982 | 2015-06-03 15:58:50 +0200 | [diff] [blame] | 320 | * The 32-bit clone ABI is: clone(..., int tls_val, int *child_tidptr). |
| 321 | * The 64-bit clone ABI is: clone(..., int *child_tidptr, int tls_val). |
| 322 | * |
| 323 | * The native 64-bit kernel's sys_clone() implements the latter, |
| 324 | * so we need to swap arguments here before calling it: |
Denys Vlasenko | 5cdc683 | 2015-06-03 15:58:49 +0200 | [diff] [blame] | 325 | */ |
Denys Vlasenko | 7a5a982 | 2015-06-03 15:58:50 +0200 | [diff] [blame] | 326 | xchg %r8, %rcx |
Andy Lutomirski | 8169aff | 2015-10-05 17:48:05 -0700 | [diff] [blame] | 327 | jmp sys_clone |