123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- /******************************************************************************
- * hypercall.S
- *
- * Xen hypercall wrappers
- *
- * Stefano Stabellini <stefano.stabellini@eu.citrix.com>, Citrix, 2012
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License version 2
- * as published by the Free Software Foundation; or, when distributed
- * separately from the Linux kernel or incorporated into other
- * software packages, subject to the following license:
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this source file (the "Software"), to deal in the Software without
- * restriction, including without limitation the rights to use, copy, modify,
- * merge, publish, distribute, sublicense, and/or sell copies of the Software,
- * and to permit persons to whom the Software is furnished to do so, subject to
- * the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
- * IN THE SOFTWARE.
- */
- /*
- * The Xen hypercall calling convention is very similar to the ARM
- * procedure calling convention: the first paramter is passed in r0, the
- * second in r1, the third in r2 and the fourth in r3. Considering that
- * Xen hypercalls have 5 arguments at most, the fifth paramter is passed
- * in r4, differently from the procedure calling convention of using the
- * stack for that case.
- *
- * The hypercall number is passed in r12.
- *
- * The return value is in r0.
- *
- * The hvc ISS is required to be 0xEA1, that is the Xen specific ARM
- * hypercall tag.
- */
- #include <linux/linkage.h>
- #include <asm/assembler.h>
- #include <asm/opcodes-virt.h>
- #include <xen/interface/xen.h>
- #define XEN_IMM 0xEA1
- #define HYPERCALL_SIMPLE(hypercall) \
- ENTRY(HYPERVISOR_##hypercall) \
- mov r12, #__HYPERVISOR_##hypercall; \
- __HVC(XEN_IMM); \
- ret lr; \
- ENDPROC(HYPERVISOR_##hypercall)
- #define HYPERCALL0 HYPERCALL_SIMPLE
- #define HYPERCALL1 HYPERCALL_SIMPLE
- #define HYPERCALL2 HYPERCALL_SIMPLE
- #define HYPERCALL3 HYPERCALL_SIMPLE
- #define HYPERCALL4 HYPERCALL_SIMPLE
- #define HYPERCALL5(hypercall) \
- ENTRY(HYPERVISOR_##hypercall) \
- stmdb sp!, {r4} \
- ldr r4, [sp, #4] \
- mov r12, #__HYPERVISOR_##hypercall; \
- __HVC(XEN_IMM); \
- ldm sp!, {r4} \
- ret lr \
- ENDPROC(HYPERVISOR_##hypercall)
- .text
- HYPERCALL2(xen_version);
- HYPERCALL3(console_io);
- HYPERCALL3(grant_table_op);
- HYPERCALL2(sched_op);
- HYPERCALL2(event_channel_op);
- HYPERCALL2(hvm_op);
- HYPERCALL2(memory_op);
- HYPERCALL2(physdev_op);
- HYPERCALL3(vcpu_op);
- HYPERCALL1(tmem_op);
- HYPERCALL1(platform_op_raw);
- HYPERCALL2(multicall);
- HYPERCALL2(vm_assist);
- HYPERCALL3(dm_op);
- ENTRY(privcmd_call)
- stmdb sp!, {r4}
- mov r12, r0
- mov r0, r1
- mov r1, r2
- mov r2, r3
- ldr r3, [sp, #8]
- /*
- * Privcmd calls are issued by the userspace. We need to allow the
- * kernel to access the userspace memory before issuing the hypercall.
- */
- uaccess_enable r4
- /* r4 is loaded now as we use it as scratch register before */
- ldr r4, [sp, #4]
- __HVC(XEN_IMM)
- /*
- * Disable userspace access from kernel. This is fine to do it
- * unconditionally as no set_fs(KERNEL_DS)/set_fs(get_ds()) is
- * called before.
- */
- uaccess_disable r4
- ldm sp!, {r4}
- ret lr
- ENDPROC(privcmd_call);
|