blob: d205a283efe01cb09cef23177f42fc9672578c15 [file] [log] [blame]
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -07001/*
2 Asm versions of Xen pv-ops, suitable for either direct use or inlining.
3 The inline versions are the same as the direct-use versions, with the
4 pre- and post-amble chopped off.
5
6 This code is encoded for size rather than absolute efficiency,
7 with a view to being able to inline as much as possible.
8
9 We only bother with direct forms (ie, vcpu in pda) of the operations
10 here; the indirect forms are better handled in C, since they're
11 generally too large to inline anyway.
12 */
13
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070014#include <asm/errno.h>
Brian Gerst9af45652009-01-19 00:38:58 +090015#include <asm/percpu.h>
Jeremy Fitzhardinge53937442009-02-02 13:55:42 -080016#include <asm/processor-flags.h>
17#include <asm/segment.h>
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070018
19#include <xen/interface/xen.h>
20
Jeremy Fitzhardinge53937442009-02-02 13:55:42 -080021#include "xen-asm.h"
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070022
Jeremy Fitzhardinge997409d2008-07-08 15:07:00 -070023ENTRY(xen_adjust_exception_frame)
24 mov 8+0(%rsp),%rcx
25 mov 8+8(%rsp),%r11
26 ret $16
27
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070028hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32
29/*
30 Xen64 iret frame:
31
32 ss
33 rsp
34 rflags
35 cs
36 rip <-- standard iret frame
37
38 flags
39
40 rcx }
41 r11 }<-- pushed by hypercall page
42rsp -> rax }
43 */
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070044ENTRY(xen_iret)
45 pushq $0
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700461: jmp hypercall_iret
47ENDPATCH(xen_iret)
48RELOC(xen_iret, 1b+1)
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070049
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070050/*
51 sysexit is not used for 64-bit processes, so it's
52 only ever used to return to 32-bit compat userspace.
53 */
Jeremy Fitzhardingecdacc122008-07-08 15:06:46 -070054ENTRY(xen_sysexit)
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070055 pushq $__USER32_DS
56 pushq %rcx
57 pushq $X86_EFLAGS_IF
58 pushq $__USER32_CS
59 pushq %rdx
60
Jeremy Fitzhardinge2dc16972008-07-21 16:49:58 -070061 pushq $0
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700621: jmp hypercall_iret
63ENDPATCH(xen_sysexit)
64RELOC(xen_sysexit, 1b+1)
65
66ENTRY(xen_sysret64)
67 /* We're already on the usermode stack at this point, but still
68 with the kernel gs, so we can easily switch back */
Brian Gerst3d1e42a2009-01-19 00:38:58 +090069 movq %rsp, PER_CPU_VAR(old_rsp)
Brian Gerst9af45652009-01-19 00:38:58 +090070 movq PER_CPU_VAR(kernel_stack),%rsp
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070071
72 pushq $__USER_DS
Brian Gerst3d1e42a2009-01-19 00:38:58 +090073 pushq PER_CPU_VAR(old_rsp)
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070074 pushq %r11
75 pushq $__USER_CS
76 pushq %rcx
77
78 pushq $VGCF_in_syscall
791: jmp hypercall_iret
80ENDPATCH(xen_sysret64)
81RELOC(xen_sysret64, 1b+1)
82
83ENTRY(xen_sysret32)
84 /* We're already on the usermode stack at this point, but still
85 with the kernel gs, so we can easily switch back */
Brian Gerst3d1e42a2009-01-19 00:38:58 +090086 movq %rsp, PER_CPU_VAR(old_rsp)
Brian Gerst9af45652009-01-19 00:38:58 +090087 movq PER_CPU_VAR(kernel_stack), %rsp
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070088
89 pushq $__USER32_DS
Brian Gerst3d1e42a2009-01-19 00:38:58 +090090 pushq PER_CPU_VAR(old_rsp)
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070091 pushq %r11
92 pushq $__USER32_CS
93 pushq %rcx
94
95 pushq $VGCF_in_syscall
961: jmp hypercall_iret
97ENDPATCH(xen_sysret32)
98RELOC(xen_sysret32, 1b+1)
99
100/*
101 Xen handles syscall callbacks much like ordinary exceptions,
102 which means we have:
103 - kernel gs
104 - kernel rsp
105 - an iret-like stack frame on the stack (including rcx and r11):
106 ss
107 rsp
108 rflags
109 cs
110 rip
111 r11
112 rsp-> rcx
113
114 In all the entrypoints, we undo all that to make it look
115 like a CPU-generated syscall/sysenter and jump to the normal
116 entrypoint.
117 */
118
119.macro undo_xen_syscall
120 mov 0*8(%rsp),%rcx
121 mov 1*8(%rsp),%r11
122 mov 5*8(%rsp),%rsp
123.endm
124
125/* Normal 64-bit system call target */
126ENTRY(xen_syscall_target)
127 undo_xen_syscall
128 jmp system_call_after_swapgs
129ENDPROC(xen_syscall_target)
130
131#ifdef CONFIG_IA32_EMULATION
132
133/* 32-bit compat syscall target */
134ENTRY(xen_syscall32_target)
135 undo_xen_syscall
136 jmp ia32_cstar_target
137ENDPROC(xen_syscall32_target)
138
139/* 32-bit compat sysenter target */
140ENTRY(xen_sysenter_target)
141 undo_xen_syscall
142 jmp ia32_sysenter_target
143ENDPROC(xen_sysenter_target)
144
145#else /* !CONFIG_IA32_EMULATION */
146
147ENTRY(xen_syscall32_target)
148ENTRY(xen_sysenter_target)
149 lea 16(%rsp), %rsp /* strip %rcx,%r11 */
150 mov $-ENOSYS, %rax
151 pushq $VGCF_in_syscall
152 jmp hypercall_iret
153ENDPROC(xen_syscall32_target)
154ENDPROC(xen_sysenter_target)
155
156#endif /* CONFIG_IA32_EMULATION */