xen-asm_64.S 4.1 KB
Newer Older
1
/* SPDX-License-Identifier: GPL-2.0 */
2
/*
3
 * Asm versions of Xen pv-ops, suitable for direct use.
4 5
 *
 * We only bother with direct forms (ie, vcpu in pda) of the
6
 * operations here; the indirect forms are better handled in C.
7 8
 */

9
#include <asm/errno.h>
10
#include <asm/percpu.h>
11 12
#include <asm/processor-flags.h>
#include <asm/segment.h>
13
#include <asm/asm-offsets.h>
14
#include <asm/thread_info.h>
15
#include <asm/asm.h>
16 17 18

#include <xen/interface/xen.h>

19
#include <linux/init.h>
20
#include <linux/linkage.h>
21

22
.macro xen_pv_trap name
23
SYM_CODE_START(xen_\name)
24 25 26
	pop %rcx
	pop %r11
	jmp  \name
27
SYM_CODE_END(xen_\name)
28
_ASM_NOKPROBE(xen_\name)
29 30
.endm

31
xen_pv_trap asm_exc_divide_error
32 33 34
xen_pv_trap debug
xen_pv_trap xendebug
xen_pv_trap int3
35
xen_pv_trap xennmi
36
xen_pv_trap asm_exc_overflow
37
xen_pv_trap asm_exc_bounds
38
xen_pv_trap asm_exc_invalid_op
39
xen_pv_trap asm_exc_device_not_available
40
xen_pv_trap double_fault
41
xen_pv_trap asm_exc_coproc_segment_overrun
42
xen_pv_trap asm_exc_invalid_tss
43
xen_pv_trap asm_exc_segment_not_present
44
xen_pv_trap asm_exc_stack_segment
45
xen_pv_trap asm_exc_general_protection
46 47 48 49 50 51 52 53 54 55 56 57
xen_pv_trap page_fault
xen_pv_trap spurious_interrupt_bug
xen_pv_trap coprocessor_error
xen_pv_trap alignment_check
#ifdef CONFIG_X86_MCE
xen_pv_trap machine_check
#endif /* CONFIG_X86_MCE */
xen_pv_trap simd_coprocessor_error
#ifdef CONFIG_IA32_EMULATION
xen_pv_trap entry_INT80_compat
#endif
xen_pv_trap hypervisor_callback
58

59
	__INIT
60
SYM_CODE_START(xen_early_idt_handler_array)
61 62 63 64 65 66 67 68
	i = 0
	.rept NUM_EXCEPTION_VECTORS
	pop %rcx
	pop %r11
	jmp early_idt_handler_array + i*EARLY_IDT_HANDLER_SIZE
	i = i + 1
	.fill xen_early_idt_handler_array + i*XEN_EARLY_IDT_HANDLER_SIZE - ., 1, 0xcc
	.endr
69
SYM_CODE_END(xen_early_idt_handler_array)
70 71
	__FINIT

72 73
hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32
/*
74 75 76 77 78 79 80 81 82 83 84 85 86
 * Xen64 iret frame:
 *
 *	ss
 *	rsp
 *	rflags
 *	cs
 *	rip		<-- standard iret frame
 *
 *	flags
 *
 *	rcx		}
 *	r11		}<-- pushed by hypercall page
 * rsp->rax		}
87
 */
88
SYM_CODE_START(xen_iret)
89
	pushq $0
90
	jmp hypercall_iret
91
SYM_CODE_END(xen_iret)
92

93
SYM_CODE_START(xen_sysret64)
94 95
	/*
	 * We're already on the usermode stack at this point, but
96 97 98
	 * still with the kernel gs, so we can easily switch back.
	 *
	 * tss.sp2 is scratch space.
99
	 */
100
	movq %rsp, PER_CPU_VAR(cpu_tss_rw + TSS_sp2)
101
	movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp
102 103

	pushq $__USER_DS
104
	pushq PER_CPU_VAR(cpu_tss_rw + TSS_sp2)
105 106 107 108 109
	pushq %r11
	pushq $__USER_CS
	pushq %rcx

	pushq $VGCF_in_syscall
110
	jmp hypercall_iret
111
SYM_CODE_END(xen_sysret64)
112 113

/*
114 115 116 117 118 119 120 121 122 123 124 125
 * Xen handles syscall callbacks much like ordinary exceptions, which
 * means we have:
 * - kernel gs
 * - kernel rsp
 * - an iret-like stack frame on the stack (including rcx and r11):
 *	ss
 *	rsp
 *	rflags
 *	cs
 *	rip
 *	r11
 * rsp->rcx
126 127 128
 */

/* Normal 64-bit system call target */
129
SYM_FUNC_START(xen_syscall_target)
130 131
	popq %rcx
	popq %r11
132 133 134 135 136 137 138 139 140

	/*
	 * Neither Xen nor the kernel really knows what the old SS and
	 * CS were.  The kernel expects __USER_DS and __USER_CS, so
	 * report those values even though Xen will guess its own values.
	 */
	movq $__USER_DS, 4*8(%rsp)
	movq $__USER_CS, 1*8(%rsp)

141
	jmp entry_SYSCALL_64_after_hwframe
142
SYM_FUNC_END(xen_syscall_target)
143 144 145 146

#ifdef CONFIG_IA32_EMULATION

/* 32-bit compat syscall target */
147
SYM_FUNC_START(xen_syscall32_target)
148 149
	popq %rcx
	popq %r11
150 151 152 153 154 155 156 157 158

	/*
	 * Neither Xen nor the kernel really knows what the old SS and
	 * CS were.  The kernel expects __USER32_DS and __USER32_CS, so
	 * report those values even though Xen will guess its own values.
	 */
	movq $__USER32_DS, 4*8(%rsp)
	movq $__USER32_CS, 1*8(%rsp)

159
	jmp entry_SYSCALL_compat_after_hwframe
160
SYM_FUNC_END(xen_syscall32_target)
161 162

/* 32-bit compat sysenter target */
163
SYM_FUNC_START(xen_sysenter_target)
164 165 166
	mov 0*8(%rsp), %rcx
	mov 1*8(%rsp), %r11
	mov 5*8(%rsp), %rsp
167
	jmp entry_SYSENTER_compat
168
SYM_FUNC_END(xen_sysenter_target)
169 170 171

#else /* !CONFIG_IA32_EMULATION */

J
Jiri Slaby 已提交
172
SYM_FUNC_START_ALIAS(xen_syscall32_target)
173
SYM_FUNC_START(xen_sysenter_target)
174
	lea 16(%rsp), %rsp	/* strip %rcx, %r11 */
175
	mov $-ENOSYS, %rax
176
	pushq $0
177
	jmp hypercall_iret
178
SYM_FUNC_END(xen_sysenter_target)
J
Jiri Slaby 已提交
179
SYM_FUNC_END_ALIAS(xen_syscall32_target)
180 181

#endif	/* CONFIG_IA32_EMULATION */