]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/x86/xen/xen-asm_64.S
x86/asm/entry: Untangle 'ia32_sysenter_target' into two entry points: entry_SYSENTER_...
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / xen / xen-asm_64.S
CommitLineData
cdacc127 1/*
130ace11
TH
2 * Asm versions of Xen pv-ops, suitable for either direct use or
3 * inlining. The inline versions are the same as the direct-use
4 * versions, with the pre- and post-amble chopped off.
5 *
6 * This code is encoded for size rather than absolute efficiency, with
7 * a view to being able to inline as much as possible.
8 *
9 * We only bother with direct forms (ie, vcpu in pda) of the
10 * operations here; the indirect forms are better handled in C, since
11 * they're generally too large to inline anyway.
cdacc127
JF
12 */
13
6fcac6d3 14#include <asm/errno.h>
9af45651 15#include <asm/percpu.h>
5393744b
JF
16#include <asm/processor-flags.h>
17#include <asm/segment.h>
63332a84 18#include <asm/asm-offsets.h>
3a23208e 19#include <asm/thread_info.h>
cdacc127
JF
20
21#include <xen/interface/xen.h>
22
5393744b 23#include "xen-asm.h"
cdacc127 24
997409d3 25ENTRY(xen_adjust_exception_frame)
130ace11
TH
26 mov 8+0(%rsp), %rcx
27 mov 8+8(%rsp), %r11
997409d3
JF
28 ret $16
29
6fcac6d3
JF
30hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32
31/*
130ace11
TH
32 * Xen64 iret frame:
33 *
34 * ss
35 * rsp
36 * rflags
37 * cs
38 * rip <-- standard iret frame
39 *
40 * flags
41 *
42 * rcx }
43 * r11 }<-- pushed by hypercall page
44 * rsp->rax }
6fcac6d3 45 */
cdacc127
JF
46ENTRY(xen_iret)
47 pushq $0
6fcac6d3
JF
481: jmp hypercall_iret
49ENDPATCH(xen_iret)
50RELOC(xen_iret, 1b+1)
cdacc127 51
6fcac6d3 52ENTRY(xen_sysret64)
130ace11
TH
53 /*
54 * We're already on the usermode stack at this point, but
55 * still with the kernel gs, so we can easily switch back
56 */
c38e5038 57 movq %rsp, PER_CPU_VAR(rsp_scratch)
3a23208e 58 movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp
6fcac6d3
JF
59
60 pushq $__USER_DS
c38e5038 61 pushq PER_CPU_VAR(rsp_scratch)
6fcac6d3
JF
62 pushq %r11
63 pushq $__USER_CS
64 pushq %rcx
65
66 pushq $VGCF_in_syscall
671: jmp hypercall_iret
68ENDPATCH(xen_sysret64)
69RELOC(xen_sysret64, 1b+1)
70
71ENTRY(xen_sysret32)
130ace11
TH
72 /*
73 * We're already on the usermode stack at this point, but
74 * still with the kernel gs, so we can easily switch back
75 */
c38e5038 76 movq %rsp, PER_CPU_VAR(rsp_scratch)
3a23208e 77 movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp
6fcac6d3
JF
78
79 pushq $__USER32_DS
c38e5038 80 pushq PER_CPU_VAR(rsp_scratch)
6fcac6d3
JF
81 pushq %r11
82 pushq $__USER32_CS
83 pushq %rcx
84
6aaf5d63 85 pushq $0
6fcac6d3
JF
861: jmp hypercall_iret
87ENDPATCH(xen_sysret32)
88RELOC(xen_sysret32, 1b+1)
89
90/*
130ace11
TH
91 * Xen handles syscall callbacks much like ordinary exceptions, which
92 * means we have:
93 * - kernel gs
94 * - kernel rsp
95 * - an iret-like stack frame on the stack (including rcx and r11):
96 * ss
97 * rsp
98 * rflags
99 * cs
100 * rip
101 * r11
102 * rsp->rcx
103 *
104 * In all the entrypoints, we undo all that to make it look like a
105 * CPU-generated syscall/sysenter and jump to the normal entrypoint.
6fcac6d3
JF
106 */
107
108.macro undo_xen_syscall
130ace11
TH
109 mov 0*8(%rsp), %rcx
110 mov 1*8(%rsp), %r11
111 mov 5*8(%rsp), %rsp
6fcac6d3
JF
112.endm
113
114/* Normal 64-bit system call target */
115ENTRY(xen_syscall_target)
116 undo_xen_syscall
117 jmp system_call_after_swapgs
118ENDPROC(xen_syscall_target)
119
120#ifdef CONFIG_IA32_EMULATION
121
122/* 32-bit compat syscall target */
123ENTRY(xen_syscall32_target)
124 undo_xen_syscall
2cd23553 125 jmp entry_SYSCALL_compat
6fcac6d3
JF
126ENDPROC(xen_syscall32_target)
127
128/* 32-bit compat sysenter target */
129ENTRY(xen_sysenter_target)
130 undo_xen_syscall
4c8cd0c5 131 jmp entry_SYSENTER_compat
6fcac6d3
JF
132ENDPROC(xen_sysenter_target)
133
134#else /* !CONFIG_IA32_EMULATION */
135
136ENTRY(xen_syscall32_target)
137ENTRY(xen_sysenter_target)
130ace11 138 lea 16(%rsp), %rsp /* strip %rcx, %r11 */
6fcac6d3 139 mov $-ENOSYS, %rax
6aaf5d63 140 pushq $0
6fcac6d3
JF
141 jmp hypercall_iret
142ENDPROC(xen_syscall32_target)
143ENDPROC(xen_sysenter_target)
144
145#endif /* CONFIG_IA32_EMULATION */