|  | /****************************************************************************** | 
|  | * hypercall.S | 
|  | * | 
|  | * Xen hypercall wrappers | 
|  | * | 
|  | * Stefano Stabellini <stefano.stabellini@eu.citrix.com>, Citrix, 2012 | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU General Public License version 2 | 
|  | * as published by the Free Software Foundation; or, when distributed | 
|  | * separately from the Linux kernel or incorporated into other | 
|  | * software packages, subject to the following license: | 
|  | * | 
|  | * Permission is hereby granted, free of charge, to any person obtaining a copy | 
|  | * of this source file (the "Software"), to deal in the Software without | 
|  | * restriction, including without limitation the rights to use, copy, modify, | 
|  | * merge, publish, distribute, sublicense, and/or sell copies of the Software, | 
|  | * and to permit persons to whom the Software is furnished to do so, subject to | 
|  | * the following conditions: | 
|  | * | 
|  | * The above copyright notice and this permission notice shall be included in | 
|  | * all copies or substantial portions of the Software. | 
|  | * | 
|  | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | 
|  | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | 
|  | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | 
|  | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | 
|  | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING | 
|  | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS | 
|  | * IN THE SOFTWARE. | 
|  | */ | 
|  |  | 
|  | /* | 
|  | * The Xen hypercall calling convention is very similar to the ARM | 
|  | * procedure calling convention: the first paramter is passed in r0, the | 
|  | * second in r1, the third in r2 and the fourth in r3. Considering that | 
|  | * Xen hypercalls have 5 arguments at most, the fifth paramter is passed | 
|  | * in r4, differently from the procedure calling convention of using the | 
|  | * stack for that case. | 
|  | * | 
|  | * The hypercall number is passed in r12. | 
|  | * | 
|  | * The return value is in r0. | 
|  | * | 
|  | * The hvc ISS is required to be 0xEA1, that is the Xen specific ARM | 
|  | * hypercall tag. | 
|  | */ | 
|  |  | 
|  | #include <linux/linkage.h> | 
|  | #include <asm/assembler.h> | 
|  | #include <asm/opcodes-virt.h> | 
|  | #include <xen/interface/xen.h> | 
|  |  | 
|  |  | 
|  | #define XEN_IMM 0xEA1 | 
|  |  | 
|  | #define HYPERCALL_SIMPLE(hypercall)		\ | 
|  | ENTRY(HYPERVISOR_##hypercall)			\ | 
|  | mov r12, #__HYPERVISOR_##hypercall;	\ | 
|  | __HVC(XEN_IMM);						\ | 
|  | ret lr;					\ | 
|  | ENDPROC(HYPERVISOR_##hypercall) | 
|  |  | 
|  | #define HYPERCALL0 HYPERCALL_SIMPLE | 
|  | #define HYPERCALL1 HYPERCALL_SIMPLE | 
|  | #define HYPERCALL2 HYPERCALL_SIMPLE | 
|  | #define HYPERCALL3 HYPERCALL_SIMPLE | 
|  | #define HYPERCALL4 HYPERCALL_SIMPLE | 
|  |  | 
|  | #define HYPERCALL5(hypercall)			\ | 
|  | ENTRY(HYPERVISOR_##hypercall)			\ | 
|  | stmdb sp!, {r4}						\ | 
|  | ldr r4, [sp, #4]					\ | 
|  | mov r12, #__HYPERVISOR_##hypercall;	\ | 
|  | __HVC(XEN_IMM);						\ | 
|  | ldm sp!, {r4}						\ | 
|  | ret lr					\ | 
|  | ENDPROC(HYPERVISOR_##hypercall) | 
|  |  | 
|  | .text | 
|  |  | 
|  | HYPERCALL2(xen_version); | 
|  | HYPERCALL3(console_io); | 
|  | HYPERCALL3(grant_table_op); | 
|  | HYPERCALL2(sched_op); | 
|  | HYPERCALL2(event_channel_op); | 
|  | HYPERCALL2(hvm_op); | 
|  | HYPERCALL2(memory_op); | 
|  | HYPERCALL2(physdev_op); | 
|  | HYPERCALL3(vcpu_op); | 
|  | HYPERCALL1(tmem_op); | 
|  | HYPERCALL1(platform_op_raw); | 
|  | HYPERCALL2(multicall); | 
|  | HYPERCALL2(vm_assist); | 
|  | HYPERCALL3(dm_op); | 
|  |  | 
|  | ENTRY(privcmd_call) | 
|  | stmdb sp!, {r4} | 
|  | mov r12, r0 | 
|  | mov r0, r1 | 
|  | mov r1, r2 | 
|  | mov r2, r3 | 
|  | ldr r3, [sp, #8] | 
|  | /* | 
|  | * Privcmd calls are issued by the userspace. We need to allow the | 
|  | * kernel to access the userspace memory before issuing the hypercall. | 
|  | */ | 
|  | uaccess_enable r4 | 
|  |  | 
|  | /* r4 is loaded now as we use it as scratch register before */ | 
|  | ldr r4, [sp, #4] | 
|  | __HVC(XEN_IMM) | 
|  |  | 
|  | /* | 
|  | * Disable userspace access from kernel. This is fine to do it | 
|  | * unconditionally as no set_fs(KERNEL_DS)/set_fs(get_ds()) is | 
|  | * called before. | 
|  | */ | 
|  | uaccess_disable r4 | 
|  |  | 
|  | ldm sp!, {r4} | 
|  | ret lr | 
|  | ENDPROC(privcmd_call); |