blob: 3a3b6a211584e3ce3aaf2f680790c38e1b817eab [file] [log] [blame]
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -07001/*
Juergen Grossedcb5cf2017-08-16 19:31:56 +02002 * Asm versions of Xen pv-ops, suitable for direct use.
Tejun Heo130ace12009-02-06 00:57:48 +09003 *
4 * We only bother with direct forms (ie, vcpu in pda) of the
Juergen Grossedcb5cf2017-08-16 19:31:56 +02005 * operations here; the indirect forms are better handled in C.
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -07006 */
7
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -07008#include <asm/errno.h>
Brian Gerst9af45652009-01-19 00:38:58 +09009#include <asm/percpu.h>
Jeremy Fitzhardinge53937442009-02-02 13:55:42 -080010#include <asm/processor-flags.h>
11#include <asm/segment.h>
Denys Vlasenko63332a82015-04-24 17:31:33 +020012#include <asm/asm-offsets.h>
Denys Vlasenko3a232082015-04-24 17:31:35 +020013#include <asm/thread_info.h>
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070014
15#include <xen/interface/xen.h>
16
Juergen Grossedcb5cf2017-08-16 19:31:56 +020017#include <linux/linkage.h>
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070018
Jeremy Fitzhardinge997409d2008-07-08 15:07:00 -070019ENTRY(xen_adjust_exception_frame)
Tejun Heo130ace12009-02-06 00:57:48 +090020 mov 8+0(%rsp), %rcx
21 mov 8+8(%rsp), %r11
Jeremy Fitzhardinge997409d2008-07-08 15:07:00 -070022 ret $16
Josh Poimboeuf9fd21602016-01-21 16:49:10 -060023ENDPROC(xen_adjust_exception_frame)
Jeremy Fitzhardinge997409d2008-07-08 15:07:00 -070024
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070025hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32
26/*
Tejun Heo130ace12009-02-06 00:57:48 +090027 * Xen64 iret frame:
28 *
29 * ss
30 * rsp
31 * rflags
32 * cs
33 * rip <-- standard iret frame
34 *
35 * flags
36 *
37 * rcx }
38 * r11 }<-- pushed by hypercall page
39 * rsp->rax }
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070040 */
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070041ENTRY(xen_iret)
42 pushq $0
Juergen Grossedcb5cf2017-08-16 19:31:56 +020043 jmp hypercall_iret
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070044
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070045ENTRY(xen_sysret64)
Tejun Heo130ace12009-02-06 00:57:48 +090046 /*
47 * We're already on the usermode stack at this point, but
48 * still with the kernel gs, so we can easily switch back
49 */
Ingo Molnarc38e5032015-03-17 14:42:59 +010050 movq %rsp, PER_CPU_VAR(rsp_scratch)
Denys Vlasenko3a232082015-04-24 17:31:35 +020051 movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070052
53 pushq $__USER_DS
Ingo Molnarc38e5032015-03-17 14:42:59 +010054 pushq PER_CPU_VAR(rsp_scratch)
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070055 pushq %r11
56 pushq $__USER_CS
57 pushq %rcx
58
59 pushq $VGCF_in_syscall
Juergen Grossedcb5cf2017-08-16 19:31:56 +020060 jmp hypercall_iret
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070061
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070062/*
Tejun Heo130ace12009-02-06 00:57:48 +090063 * Xen handles syscall callbacks much like ordinary exceptions, which
64 * means we have:
65 * - kernel gs
66 * - kernel rsp
67 * - an iret-like stack frame on the stack (including rcx and r11):
68 * ss
69 * rsp
70 * rflags
71 * cs
72 * rip
73 * r11
74 * rsp->rcx
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070075 */
76
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070077/* Normal 64-bit system call target */
78ENTRY(xen_syscall_target)
Andy Lutomirski8a9949b2017-08-07 20:59:21 -070079 popq %rcx
80 popq %r11
Andy Lutomirskifa2016a2017-08-14 22:36:19 -070081
82 /*
83 * Neither Xen nor the kernel really knows what the old SS and
84 * CS were. The kernel expects __USER_DS and __USER_CS, so
85 * report those values even though Xen will guess its own values.
86 */
87 movq $__USER_DS, 4*8(%rsp)
88 movq $__USER_CS, 1*8(%rsp)
89
Andy Lutomirski8a9949b2017-08-07 20:59:21 -070090 jmp entry_SYSCALL_64_after_hwframe
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070091ENDPROC(xen_syscall_target)
92
93#ifdef CONFIG_IA32_EMULATION
94
95/* 32-bit compat syscall target */
96ENTRY(xen_syscall32_target)
Andy Lutomirski8a9949b2017-08-07 20:59:21 -070097 popq %rcx
98 popq %r11
Andy Lutomirskifa2016a2017-08-14 22:36:19 -070099
100 /*
101 * Neither Xen nor the kernel really knows what the old SS and
102 * CS were. The kernel expects __USER32_DS and __USER32_CS, so
103 * report those values even though Xen will guess its own values.
104 */
105 movq $__USER32_DS, 4*8(%rsp)
106 movq $__USER32_CS, 1*8(%rsp)
107
Andy Lutomirski8a9949b2017-08-07 20:59:21 -0700108 jmp entry_SYSCALL_compat_after_hwframe
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700109ENDPROC(xen_syscall32_target)
110
111/* 32-bit compat sysenter target */
112ENTRY(xen_sysenter_target)
Andy Lutomirski8a9949b2017-08-07 20:59:21 -0700113 mov 0*8(%rsp), %rcx
114 mov 1*8(%rsp), %r11
115 mov 5*8(%rsp), %rsp
Ingo Molnar4c8cd0c2015-06-08 08:33:56 +0200116 jmp entry_SYSENTER_compat
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700117ENDPROC(xen_sysenter_target)
118
119#else /* !CONFIG_IA32_EMULATION */
120
121ENTRY(xen_syscall32_target)
122ENTRY(xen_sysenter_target)
Tejun Heo130ace12009-02-06 00:57:48 +0900123 lea 16(%rsp), %rsp /* strip %rcx, %r11 */
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700124 mov $-ENOSYS, %rax
Jeremy Fitzhardinge6aaf5d62009-11-25 13:15:38 -0800125 pushq $0
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700126 jmp hypercall_iret
127ENDPROC(xen_syscall32_target)
128ENDPROC(xen_sysenter_target)
129
130#endif /* CONFIG_IA32_EMULATION */