Jeremy Fitzhardinge | cdacc12 | 2008-07-08 15:06:46 -0700 | [diff] [blame] | 1 | /* |
Juergen Gross | edcb5cf | 2017-08-16 19:31:56 +0200 | [diff] [blame] | 2 | * Asm versions of Xen pv-ops, suitable for direct use. |
Tejun Heo | 130ace1 | 2009-02-06 00:57:48 +0900 | [diff] [blame] | 3 | * |
| 4 | * We only bother with direct forms (ie, vcpu in pda) of the |
Juergen Gross | edcb5cf | 2017-08-16 19:31:56 +0200 | [diff] [blame] | 5 | * operations here; the indirect forms are better handled in C. |
Jeremy Fitzhardinge | cdacc12 | 2008-07-08 15:06:46 -0700 | [diff] [blame] | 6 | */ |
| 7 | |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 8 | #include <asm/errno.h> |
Brian Gerst | 9af4565 | 2009-01-19 00:38:58 +0900 | [diff] [blame] | 9 | #include <asm/percpu.h> |
Jeremy Fitzhardinge | 5393744 | 2009-02-02 13:55:42 -0800 | [diff] [blame] | 10 | #include <asm/processor-flags.h> |
| 11 | #include <asm/segment.h> |
Denys Vlasenko | 63332a8 | 2015-04-24 17:31:33 +0200 | [diff] [blame] | 12 | #include <asm/asm-offsets.h> |
Denys Vlasenko | 3a23208 | 2015-04-24 17:31:35 +0200 | [diff] [blame] | 13 | #include <asm/thread_info.h> |
Jeremy Fitzhardinge | cdacc12 | 2008-07-08 15:06:46 -0700 | [diff] [blame] | 14 | |
| 15 | #include <xen/interface/xen.h> |
| 16 | |
Juergen Gross | edcb5cf | 2017-08-16 19:31:56 +0200 | [diff] [blame] | 17 | #include <linux/linkage.h> |
Jeremy Fitzhardinge | cdacc12 | 2008-07-08 15:06:46 -0700 | [diff] [blame] | 18 | |
Jeremy Fitzhardinge | 997409d | 2008-07-08 15:07:00 -0700 | [diff] [blame] | 19 | ENTRY(xen_adjust_exception_frame) |
Tejun Heo | 130ace1 | 2009-02-06 00:57:48 +0900 | [diff] [blame] | 20 | mov 8+0(%rsp), %rcx |
| 21 | mov 8+8(%rsp), %r11 |
Jeremy Fitzhardinge | 997409d | 2008-07-08 15:07:00 -0700 | [diff] [blame] | 22 | ret $16 |
Josh Poimboeuf | 9fd2160 | 2016-01-21 16:49:10 -0600 | [diff] [blame] | 23 | ENDPROC(xen_adjust_exception_frame) |
Jeremy Fitzhardinge | 997409d | 2008-07-08 15:07:00 -0700 | [diff] [blame] | 24 | |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 25 | hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32 |
| 26 | /* |
Tejun Heo | 130ace1 | 2009-02-06 00:57:48 +0900 | [diff] [blame] | 27 | * Xen64 iret frame: |
| 28 | * |
| 29 | * ss |
| 30 | * rsp |
| 31 | * rflags |
| 32 | * cs |
| 33 | * rip <-- standard iret frame |
| 34 | * |
| 35 | * flags |
| 36 | * |
| 37 | * rcx } |
| 38 | * r11 }<-- pushed by hypercall page |
| 39 | * rsp->rax } |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 40 | */ |
Jeremy Fitzhardinge | cdacc12 | 2008-07-08 15:06:46 -0700 | [diff] [blame] | 41 | ENTRY(xen_iret) |
| 42 | pushq $0 |
Juergen Gross | edcb5cf | 2017-08-16 19:31:56 +0200 | [diff] [blame] | 43 | jmp hypercall_iret |
Jeremy Fitzhardinge | cdacc12 | 2008-07-08 15:06:46 -0700 | [diff] [blame] | 44 | |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 45 | ENTRY(xen_sysret64) |
Tejun Heo | 130ace1 | 2009-02-06 00:57:48 +0900 | [diff] [blame] | 46 | /* |
| 47 | * We're already on the usermode stack at this point, but |
| 48 | * still with the kernel gs, so we can easily switch back |
| 49 | */ |
Ingo Molnar | c38e503 | 2015-03-17 14:42:59 +0100 | [diff] [blame] | 50 | movq %rsp, PER_CPU_VAR(rsp_scratch) |
Denys Vlasenko | 3a23208 | 2015-04-24 17:31:35 +0200 | [diff] [blame] | 51 | movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 52 | |
| 53 | pushq $__USER_DS |
Ingo Molnar | c38e503 | 2015-03-17 14:42:59 +0100 | [diff] [blame] | 54 | pushq PER_CPU_VAR(rsp_scratch) |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 55 | pushq %r11 |
| 56 | pushq $__USER_CS |
| 57 | pushq %rcx |
| 58 | |
| 59 | pushq $VGCF_in_syscall |
Juergen Gross | edcb5cf | 2017-08-16 19:31:56 +0200 | [diff] [blame] | 60 | jmp hypercall_iret |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 61 | |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 62 | /* |
Tejun Heo | 130ace1 | 2009-02-06 00:57:48 +0900 | [diff] [blame] | 63 | * Xen handles syscall callbacks much like ordinary exceptions, which |
| 64 | * means we have: |
| 65 | * - kernel gs |
| 66 | * - kernel rsp |
| 67 | * - an iret-like stack frame on the stack (including rcx and r11): |
| 68 | * ss |
| 69 | * rsp |
| 70 | * rflags |
| 71 | * cs |
| 72 | * rip |
| 73 | * r11 |
| 74 | * rsp->rcx |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 75 | */ |
| 76 | |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 77 | /* Normal 64-bit system call target */ |
| 78 | ENTRY(xen_syscall_target) |
Andy Lutomirski | 8a9949b | 2017-08-07 20:59:21 -0700 | [diff] [blame] | 79 | popq %rcx |
| 80 | popq %r11 |
Andy Lutomirski | fa2016a | 2017-08-14 22:36:19 -0700 | [diff] [blame] | 81 | |
| 82 | /* |
| 83 | * Neither Xen nor the kernel really knows what the old SS and |
| 84 | * CS were. The kernel expects __USER_DS and __USER_CS, so |
| 85 | * report those values even though Xen will guess its own values. |
| 86 | */ |
| 87 | movq $__USER_DS, 4*8(%rsp) |
| 88 | movq $__USER_CS, 1*8(%rsp) |
| 89 | |
Andy Lutomirski | 8a9949b | 2017-08-07 20:59:21 -0700 | [diff] [blame] | 90 | jmp entry_SYSCALL_64_after_hwframe |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 91 | ENDPROC(xen_syscall_target) |
| 92 | |
| 93 | #ifdef CONFIG_IA32_EMULATION |
| 94 | |
| 95 | /* 32-bit compat syscall target */ |
| 96 | ENTRY(xen_syscall32_target) |
Andy Lutomirski | 8a9949b | 2017-08-07 20:59:21 -0700 | [diff] [blame] | 97 | popq %rcx |
| 98 | popq %r11 |
Andy Lutomirski | fa2016a | 2017-08-14 22:36:19 -0700 | [diff] [blame] | 99 | |
| 100 | /* |
| 101 | * Neither Xen nor the kernel really knows what the old SS and |
| 102 | * CS were. The kernel expects __USER32_DS and __USER32_CS, so |
| 103 | * report those values even though Xen will guess its own values. |
| 104 | */ |
| 105 | movq $__USER32_DS, 4*8(%rsp) |
| 106 | movq $__USER32_CS, 1*8(%rsp) |
| 107 | |
Andy Lutomirski | 8a9949b | 2017-08-07 20:59:21 -0700 | [diff] [blame] | 108 | jmp entry_SYSCALL_compat_after_hwframe |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 109 | ENDPROC(xen_syscall32_target) |
| 110 | |
| 111 | /* 32-bit compat sysenter target */ |
| 112 | ENTRY(xen_sysenter_target) |
Andy Lutomirski | 8a9949b | 2017-08-07 20:59:21 -0700 | [diff] [blame] | 113 | mov 0*8(%rsp), %rcx |
| 114 | mov 1*8(%rsp), %r11 |
| 115 | mov 5*8(%rsp), %rsp |
Ingo Molnar | 4c8cd0c | 2015-06-08 08:33:56 +0200 | [diff] [blame] | 116 | jmp entry_SYSENTER_compat |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 117 | ENDPROC(xen_sysenter_target) |
| 118 | |
| 119 | #else /* !CONFIG_IA32_EMULATION */ |
| 120 | |
| 121 | ENTRY(xen_syscall32_target) |
| 122 | ENTRY(xen_sysenter_target) |
Tejun Heo | 130ace1 | 2009-02-06 00:57:48 +0900 | [diff] [blame] | 123 | lea 16(%rsp), %rsp /* strip %rcx, %r11 */ |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 124 | mov $-ENOSYS, %rax |
Jeremy Fitzhardinge | 6aaf5d6 | 2009-11-25 13:15:38 -0800 | [diff] [blame] | 125 | pushq $0 |
Jeremy Fitzhardinge | 6fcac6d | 2008-07-08 15:07:14 -0700 | [diff] [blame] | 126 | jmp hypercall_iret |
| 127 | ENDPROC(xen_syscall32_target) |
| 128 | ENDPROC(xen_sysenter_target) |
| 129 | |
| 130 | #endif /* CONFIG_IA32_EMULATION */ |