1 /* SPDX-License-Identifier: GPL-2.0 */
3 * Asm versions of Xen pv-ops, suitable for direct use.
5 * We only bother with direct forms (ie, vcpu in pda) of the
6 * operations here; the indirect forms are better handled in C.
10 #include <asm/percpu.h>
11 #include <asm/processor-flags.h>
12 #include <asm/segment.h>
13 #include <asm/asm-offsets.h>
14 #include <asm/thread_info.h>
17 #include <xen/interface/xen.h>
19 #include <linux/init.h>
20 #include <linux/linkage.h>
22 .macro xen_pv_trap name
23 SYM_CODE_START(xen_\name)
27 SYM_CODE_END(xen_\name)
28 _ASM_NOKPROBE(xen_\name)
31 xen_pv_trap divide_error
38 xen_pv_trap invalid_op
39 xen_pv_trap device_not_available
40 xen_pv_trap double_fault
41 xen_pv_trap coprocessor_segment_overrun
42 xen_pv_trap invalid_TSS
43 xen_pv_trap segment_not_present
44 xen_pv_trap stack_segment
45 xen_pv_trap general_protection
46 xen_pv_trap page_fault
47 xen_pv_trap spurious_interrupt_bug
48 xen_pv_trap coprocessor_error
49 xen_pv_trap alignment_check
51 xen_pv_trap machine_check
52 #endif /* CONFIG_X86_MCE */
53 xen_pv_trap simd_coprocessor_error
54 #ifdef CONFIG_IA32_EMULATION
55 xen_pv_trap entry_INT80_compat
57 xen_pv_trap hypervisor_callback
60 SYM_CODE_START(xen_early_idt_handler_array)
62 .rept NUM_EXCEPTION_VECTORS
65 jmp early_idt_handler_array + i*EARLY_IDT_HANDLER_SIZE
67 .fill xen_early_idt_handler_array + i*XEN_EARLY_IDT_HANDLER_SIZE - ., 1, 0xcc
69 SYM_CODE_END(xen_early_idt_handler_array)
72 hypercall_iret = hypercall_page + __HYPERVISOR_iret * 32
80 * rip <-- standard iret frame
85 * r11 }<-- pushed by hypercall page
88 SYM_CODE_START(xen_iret)
91 SYM_CODE_END(xen_iret)
93 SYM_CODE_START(xen_sysret64)
95 * We're already on the usermode stack at this point, but
96 * still with the kernel gs, so we can easily switch back.
98 * tss.sp2 is scratch space.
100 movq %rsp, PER_CPU_VAR(cpu_tss_rw + TSS_sp2)
101 movq PER_CPU_VAR(cpu_current_top_of_stack), %rsp
104 pushq PER_CPU_VAR(cpu_tss_rw + TSS_sp2)
109 pushq $VGCF_in_syscall
111 SYM_CODE_END(xen_sysret64)
114 * Xen handles syscall callbacks much like ordinary exceptions, which
118 * - an iret-like stack frame on the stack (including rcx and r11):
128 /* Normal 64-bit system call target */
129 SYM_FUNC_START(xen_syscall_target)
134 * Neither Xen nor the kernel really knows what the old SS and
135 * CS were. The kernel expects __USER_DS and __USER_CS, so
136 * report those values even though Xen will guess its own values.
138 movq $__USER_DS, 4*8(%rsp)
139 movq $__USER_CS, 1*8(%rsp)
141 jmp entry_SYSCALL_64_after_hwframe
142 SYM_FUNC_END(xen_syscall_target)
144 #ifdef CONFIG_IA32_EMULATION
146 /* 32-bit compat syscall target */
147 SYM_FUNC_START(xen_syscall32_target)
152 * Neither Xen nor the kernel really knows what the old SS and
153 * CS were. The kernel expects __USER32_DS and __USER32_CS, so
154 * report those values even though Xen will guess its own values.
156 movq $__USER32_DS, 4*8(%rsp)
157 movq $__USER32_CS, 1*8(%rsp)
159 jmp entry_SYSCALL_compat_after_hwframe
160 SYM_FUNC_END(xen_syscall32_target)
162 /* 32-bit compat sysenter target */
163 SYM_FUNC_START(xen_sysenter_target)
167 jmp entry_SYSENTER_compat
168 SYM_FUNC_END(xen_sysenter_target)
170 #else /* !CONFIG_IA32_EMULATION */
172 SYM_FUNC_START_ALIAS(xen_syscall32_target)
173 SYM_FUNC_START(xen_sysenter_target)
174 lea 16(%rsp), %rsp /* strip %rcx, %r11 */
178 SYM_FUNC_END(xen_sysenter_target)
179 SYM_FUNC_END_ALIAS(xen_syscall32_target)
181 #endif /* CONFIG_IA32_EMULATION */