2 * linux/arch/i386/entry.S
4 * Copyright (C) 1991, 1992 Linus Torvalds
8 * entry.S contains the system-call and fault low-level handling routines.
9 * This also contains the timer-interrupt handler, as well as all interrupts
10 * and faults that can result in a task-switch.
12 * NOTE: This code handles signal-recognition, which happens every time
13 * after a timer-interrupt and after each system call.
15 * I changed all the .align's to 4 (16 byte alignment), as that's faster
18 * Stack layout in 'ret_from_system_call':
19 * ptrace needs to have all regs on the stack.
20 * if the order here is changed, it needs to be
21 * updated in fork.c:copy_process, signal.c:do_signal,
22 * ptrace.c and ptrace.h
40 * "current" is in register %ebx during any slow entries.
43 #include <linux/config.h>
44 #include <linux/linkage.h>
45 #include <asm/thread_info.h>
46 #include <asm/errno.h>
47 #include <asm/segment.h>
51 #include "irq_vectors.h"
53 #define nr_syscalls ((syscall_table_size)/4)
79 #define preempt_stop cli
82 #define resume_kernel restore_nocheck
96 movl $(__USER_DS), %edx; \
100 #define RESTORE_INT_REGS \
109 #define RESTORE_REGS \
113 .section .fixup,"ax"; \
119 .section __ex_table,"a";\
129 GET_THREAD_INFO(%ebp)
134 * Return to user mode is not as complex as all this looks,
135 * but we want the default path for a system call return to
136 * go as quickly as possible which is why some of this is
137 * less clear than it otherwise should be.
140 # userspace resumption stub bypassing syscall exit tracing
145 GET_THREAD_INFO(%ebp)
146 movl EFLAGS(%esp), %eax # mix EFLAGS and CS
148 testl $(VM_MASK | 3), %eax
150 ENTRY(resume_userspace)
151 cli # make sure we don't miss an interrupt
152 # setting need_resched or sigpending
153 # between sampling and the iret
154 movl TI_flags(%ebp), %ecx
155 andl $_TIF_WORK_MASK, %ecx # is there any work to be done on
156 # int/exception return?
160 #ifdef CONFIG_PREEMPT
163 cmpl $0,TI_preempt_count(%ebp) # non-zero preempt_count ?
166 movl TI_flags(%ebp), %ecx # need_resched set ?
167 testb $_TIF_NEED_RESCHED, %cl
169 testl $IF_MASK,EFLAGS(%esp) # interrupts off (exception path) ?
171 call preempt_schedule_irq
175 /* SYSENTER_RETURN points to after the "sysenter" instruction in
176 the vsyscall page. See vsyscall-sysentry.S, which defines the symbol. */
178 # sysenter call handler stub
179 ENTRY(sysenter_entry)
180 movl TSS_sysenter_esp0(%esp),%esp
187 pushl $SYSENTER_RETURN
190 * Load the potential sixth argument from user stack.
191 * Careful about security.
193 cmpl $__PAGE_OFFSET-3,%ebp
196 .section __ex_table,"a"
198 .long 1b,syscall_fault
203 GET_THREAD_INFO(%ebp)
205 /* Note, _TIF_SECCOMP is bit number 8, and so it needs testw and not testb */
206 testw $(_TIF_SYSCALL_EMU|_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT),TI_flags(%ebp)
207 jnz syscall_trace_entry
208 cmpl $(nr_syscalls), %eax
210 call *sys_call_table(,%eax,4)
213 movl TI_flags(%ebp), %ecx
214 testw $_TIF_ALLWORK_MASK, %cx
215 jne syscall_exit_work
216 /* if something modifies registers it must also disable sysexit */
218 movl OLDESP(%esp), %ecx
224 # system call handler stub
226 pushl %eax # save orig_eax
228 GET_THREAD_INFO(%ebp)
229 # system call tracing in operation / emulation
230 /* Note, _TIF_SECCOMP is bit number 8, and so it needs testw and not testb */
231 testw $(_TIF_SYSCALL_EMU|_TIF_SYSCALL_TRACE|_TIF_SECCOMP|_TIF_SYSCALL_AUDIT),TI_flags(%ebp)
232 jnz syscall_trace_entry
233 cmpl $(nr_syscalls), %eax
236 call *sys_call_table(,%eax,4)
237 movl %eax,EAX(%esp) # store the return value
239 cli # make sure we don't miss an interrupt
240 # setting need_resched or sigpending
241 # between sampling and the iret
242 movl TI_flags(%ebp), %ecx
243 testw $_TIF_ALLWORK_MASK, %cx # current->work
244 jne syscall_exit_work
247 movl EFLAGS(%esp), %eax # mix EFLAGS, SS and CS
248 # Warning: OLDSS(%esp) contains the wrong/random values if we
249 # are returning to the kernel.
250 # See comments in process.c:copy_thread() for details.
251 movb OLDSS(%esp), %ah
253 andl $(VM_MASK | (4 << 8) | 3), %eax
254 cmpl $((4 << 8) | 3), %eax
255 je ldt_ss # returning to user-space with LDT SS
263 pushl $0 # no error code
267 .section __ex_table,"a"
273 larl OLDSS(%esp), %eax
275 testl $0x00400000, %eax # returning to 32bit stack?
276 jnz restore_nocheck # allright, normal return
277 /* If returning to userspace with 16bit stack,
278 * try to fix the higher word of ESP, as the CPU
280 * This is an "official" bug of all the x86-compatible
281 * CPUs, which we can try to work around to make
282 * dosemu and wine happy. */
283 subl $8, %esp # reserve space for switch16 pointer
286 /* Set up the 16bit stack frame with switch32 pointer on top,
287 * and a switch16 pointer on top of the current frame. */
288 call setup_x86_bogus_stack
290 lss 20+4(%esp), %esp # switch to 16bit stack
292 .section __ex_table,"a"
297 # perform work that needs to be done immediately before resumption
300 testb $_TIF_NEED_RESCHED, %cl
304 cli # make sure we don't miss an interrupt
305 # setting need_resched or sigpending
306 # between sampling and the iret
307 movl TI_flags(%ebp), %ecx
308 andl $_TIF_WORK_MASK, %ecx # is there any work to be done other
309 # than syscall tracing?
311 testb $_TIF_NEED_RESCHED, %cl
314 work_notifysig: # deal with pending signals and
315 # notify-resume requests
316 testl $VM_MASK, EFLAGS(%esp)
318 jne work_notifysig_v86 # returning to kernel-space or
321 call do_notify_resume
326 pushl %ecx # save ti_flags for do_notify_resume
327 call save_v86_state # %eax contains pt_regs pointer
331 call do_notify_resume
334 # perform syscall exit tracing
337 movl $-ENOSYS,EAX(%esp)
340 call do_syscall_trace
342 jne resume_userspace # ret != 0 -> running under PTRACE_SYSEMU,
343 # so must skip actual syscall
344 movl ORIG_EAX(%esp), %eax
345 cmpl $(nr_syscalls), %eax
349 # perform syscall exit tracing
352 testb $(_TIF_SYSCALL_TRACE|_TIF_SYSCALL_AUDIT|_TIF_SINGLESTEP), %cl
354 sti # could let do_syscall_trace() call
358 call do_syscall_trace
363 pushl %eax # save orig_eax
365 GET_THREAD_INFO(%ebp)
366 movl $-EFAULT,EAX(%esp)
371 movl $-ENOSYS,EAX(%esp)
374 #define FIXUP_ESPFIX_STACK \
376 /* switch to 32bit stack using the pointer on top of 16bit stack */ \
377 lss %ss:CPU_16BIT_STACK_SIZE-8, %esp; \
378 /* copy data from 16bit stack to 32bit stack */ \
379 call fixup_x86_bogus_stack; \
380 /* put ESP to the proper location */ \
382 #define UNWIND_ESPFIX_STACK \
385 /* see if on 16bit stack */ \
386 cmpw $__ESPFIX_SS, %ax; \
388 movl $__KERNEL_DS, %edx; \
391 /* switch to 32bit stack */ \
396 * Build the entry stubs and pointer table with
397 * some assembler magic.
404 ENTRY(irq_entries_start)
422 #define BUILD_INTERRUPT(name, nr) \
430 /* The include is where all of the SMP etc. interrupts come from */
431 #include "entry_arch.h"
434 pushl $0 # no error code
435 pushl $do_divide_error
452 movl ES(%esp), %edi # get the function address
453 movl ORIG_EAX(%esp), %edx # get the error code
454 movl %eax, ORIG_EAX(%esp)
456 movl $(__USER_DS), %ecx
459 movl %esp,%eax # pt_regs pointer
461 jmp ret_from_exception
463 ENTRY(coprocessor_error)
465 pushl $do_coprocessor_error
468 ENTRY(simd_coprocessor_error)
470 pushl $do_simd_coprocessor_error
473 ENTRY(device_not_available)
474 pushl $-1 # mark this as an int
477 testl $0x4, %eax # EM (math emulation bit)
478 jne device_not_available_emulate
480 call math_state_restore
481 jmp ret_from_exception
482 device_not_available_emulate:
483 pushl $0 # temporary storage for ORIG_EIP
486 jmp ret_from_exception
489 * Debug traps and NMI can happen at the one SYSENTER instruction
490 * that sets up the real kernel stack. Check here, since we can't
491 * allow the wrong stack to be used.
493 * "TSS_sysenter_esp0+12" is because the NMI/debug handler will have
494 * already pushed 3 words if it hits on the sysenter instruction:
495 * eflags, cs and eip.
497 * We just load the right stack, and push the three (known) values
498 * by hand onto the new stack - while updating the return eip past
499 * the instruction that would have done it for sysenter.
501 #define FIX_STACK(offset, ok, label) \
502 cmpw $__KERNEL_CS,4(%esp); \
505 movl TSS_sysenter_esp0+offset(%esp),%esp; \
507 pushl $__KERNEL_CS; \
508 pushl $sysenter_past_esp
511 cmpl $sysenter_entry,(%esp)
512 jne debug_stack_correct
513 FIX_STACK(12, debug_stack_correct, debug_esp_fix_insn)
515 pushl $-1 # mark this as an int
517 xorl %edx,%edx # error code 0
518 movl %esp,%eax # pt_regs pointer
520 jmp ret_from_exception
523 * NMI is doubly nasty. It can happen _while_ we're handling
524 * a debug fault, and the debug fault hasn't yet been able to
525 * clear up the stack. So we first check whether we got an
526 * NMI on the sysenter entry path, but after that we need to
527 * check whether we got an NMI on the debug path where the debug
528 * fault happened on the sysenter path.
533 cmpw $__ESPFIX_SS, %ax
536 cmpl $sysenter_entry,(%esp)
540 /* Do not access memory above the end of our stack page,
541 * it might not exist.
543 andl $(THREAD_SIZE-1),%eax
544 cmpl $(THREAD_SIZE-20),%eax
546 jae nmi_stack_correct
547 cmpl $sysenter_entry,12(%esp)
548 je nmi_debug_stack_check
552 xorl %edx,%edx # zero error code
553 movl %esp,%eax # pt_regs pointer
558 FIX_STACK(12,nmi_stack_correct, 1)
559 jmp nmi_stack_correct
560 nmi_debug_stack_check:
561 cmpw $__KERNEL_CS,16(%esp)
562 jne nmi_stack_correct
563 cmpl $debug - 1,(%esp)
564 jle nmi_stack_correct
565 cmpl $debug_esp_fix_insn,(%esp)
566 jle nmi_debug_stack_fixup
567 nmi_debug_stack_fixup:
568 FIX_STACK(24,nmi_stack_correct, 1)
569 jmp nmi_stack_correct
572 /* create the pointer to lss back */
577 /* copy the iret frame of 12 bytes */
583 FIXUP_ESPFIX_STACK # %eax == %esp
584 xorl %edx,%edx # zero error code
587 lss 12+4(%esp), %esp # back to 16bit stack
589 .section __ex_table,"a"
595 pushl $-1 # mark this as an int
597 xorl %edx,%edx # zero error code
598 movl %esp,%eax # pt_regs pointer
600 jmp ret_from_exception
618 ENTRY(coprocessor_segment_overrun)
620 pushl $do_coprocessor_segment_overrun
624 pushl $do_invalid_TSS
627 ENTRY(segment_not_present)
628 pushl $do_segment_not_present
632 pushl $do_stack_segment
635 KPROBE_ENTRY(general_protection)
636 pushl $do_general_protection
640 ENTRY(alignment_check)
641 pushl $do_alignment_check
644 KPROBE_ENTRY(page_fault)
649 #ifdef CONFIG_X86_MCE
652 pushl machine_check_vector
656 ENTRY(spurious_interrupt_bug)
658 pushl $do_spurious_interrupt_bug
661 #include "syscall_table.S"
663 syscall_table_size=(.-sys_call_table)