xen-asm_64.S 2.7 KB
Newer Older
1
/*
2
 * Asm versions of Xen pv-ops, suitable for direct use.
3 4
 *
 * We only bother with direct forms (ie, vcpu in pda) of the
5
 * operations here; the indirect forms are better handled in C.
6 7
 */

8
#include <asm/errno.h>
9
#include <asm/percpu.h>
10 11
#include <asm/processor-flags.h>
#include <asm/segment.h>
12
#include <asm/asm-offsets.h>
13
#include <asm/thread_info.h>
14 15 16

#include <xen/interface/xen.h>

17
#include <linux/linkage.h>
18

19
ENTRY(xen_adjust_exception_frame)
20 21
	mov 8+0(%rsp), %rcx
	mov 8+8(%rsp), %r11
22
	ret $16
23
ENDPROC(xen_adjust_exception_frame)
24

25 26
hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32
/*
27 28 29 30 31 32 33 34 35 36 37 38 39
 * Xen64 iret frame:
 *
 *	ss
 *	rsp
 *	rflags
 *	cs
 *	rip		<-- standard iret frame
 *
 *	flags
 *
 *	rcx		}
 *	r11		}<-- pushed by hypercall page
 * rsp->rax		}
40
 */
41 42
ENTRY(xen_iret)
	pushq $0
43
	jmp hypercall_iret
44

45
ENTRY(xen_sysret64)
46 47 48 49
	/*
	 * We're already on the usermode stack at this point, but
	 * still with the kernel gs, so we can easily switch back
	 */
50
	movq %rsp, PER_CPU_VAR(rsp_scratch)
51
	movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp
52 53

	pushq $__USER_DS
54
	pushq PER_CPU_VAR(rsp_scratch)
55 56 57 58 59
	pushq %r11
	pushq $__USER_CS
	pushq %rcx

	pushq $VGCF_in_syscall
60
	jmp hypercall_iret
61 62

/*
63 64 65 66 67 68 69 70 71 72 73 74
 * Xen handles syscall callbacks much like ordinary exceptions, which
 * means we have:
 * - kernel gs
 * - kernel rsp
 * - an iret-like stack frame on the stack (including rcx and r11):
 *	ss
 *	rsp
 *	rflags
 *	cs
 *	rip
 *	r11
 * rsp->rcx
75 76 77 78
 */

/* Normal 64-bit system call target */
ENTRY(xen_syscall_target)
79 80
	popq %rcx
	popq %r11
81 82 83 84 85 86 87 88 89

	/*
	 * Neither Xen nor the kernel really knows what the old SS and
	 * CS were.  The kernel expects __USER_DS and __USER_CS, so
	 * report those values even though Xen will guess its own values.
	 */
	movq $__USER_DS, 4*8(%rsp)
	movq $__USER_CS, 1*8(%rsp)

90
	jmp entry_SYSCALL_64_after_hwframe
91 92 93 94 95 96
ENDPROC(xen_syscall_target)

#ifdef CONFIG_IA32_EMULATION

/* 32-bit compat syscall target */
ENTRY(xen_syscall32_target)
97 98
	popq %rcx
	popq %r11
99 100 101 102 103 104 105 106 107

	/*
	 * Neither Xen nor the kernel really knows what the old SS and
	 * CS were.  The kernel expects __USER32_DS and __USER32_CS, so
	 * report those values even though Xen will guess its own values.
	 */
	movq $__USER32_DS, 4*8(%rsp)
	movq $__USER32_CS, 1*8(%rsp)

108
	jmp entry_SYSCALL_compat_after_hwframe
109 110 111 112
ENDPROC(xen_syscall32_target)

/* 32-bit compat sysenter target */
ENTRY(xen_sysenter_target)
113 114 115
	mov 0*8(%rsp), %rcx
	mov 1*8(%rsp), %r11
	mov 5*8(%rsp), %rsp
116
	jmp entry_SYSENTER_compat
117 118 119 120 121 122
ENDPROC(xen_sysenter_target)

#else /* !CONFIG_IA32_EMULATION */

ENTRY(xen_syscall32_target)
ENTRY(xen_sysenter_target)
123
	lea 16(%rsp), %rsp	/* strip %rcx, %r11 */
124
	mov $-ENOSYS, %rax
125
	pushq $0
126 127 128 129 130
	jmp hypercall_iret
ENDPROC(xen_syscall32_target)
ENDPROC(xen_sysenter_target)

#endif	/* CONFIG_IA32_EMULATION */