xen-x86_64.h revision 183340
1/****************************************************************************** 2 * xen-x86_64.h 3 * 4 * Guest OS interface to x86 64-bit Xen. 5 * 6 * Permission is hereby granted, free of charge, to any person obtaining a copy 7 * of this software and associated documentation files (the "Software"), to 8 * deal in the Software without restriction, including without limitation the 9 * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or 10 * sell copies of the Software, and to permit persons to whom the Software is 11 * furnished to do so, subject to the following conditions: 12 * 13 * The above copyright notice and this permission notice shall be included in 14 * all copies or substantial portions of the Software. 15 * 16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 19 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING 21 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER 22 * DEALINGS IN THE SOFTWARE. 23 * 24 * Copyright (c) 2004-2006, K A Fraser 25 */ 26 27#ifndef __XEN_PUBLIC_ARCH_X86_XEN_X86_64_H__ 28#define __XEN_PUBLIC_ARCH_X86_XEN_X86_64_H__ 29 30/* 31 * Hypercall interface: 32 * Input: %rdi, %rsi, %rdx, %r10, %r8 (arguments 1-5) 33 * Output: %rax 34 * Access is via hypercall page (set up by guest loader or via a Xen MSR): 35 * call hypercall_page + hypercall-number * 32 36 * Clobbered: argument registers (e.g., 2-arg hypercall clobbers %rdi,%rsi) 37 */ 38 39#if __XEN_INTERFACE_VERSION__ < 0x00030203 40/* 41 * Legacy hypercall interface: 42 * As above, except the entry sequence to the hypervisor is: 43 * mov $hypercall-number*32,%eax ; syscall 44 * Clobbered: %rcx, %r11, argument registers (as above) 45 */ 46#define TRAP_INSTR "syscall" 47#endif 48 49/* 50 * 64-bit segment selectors 51 * These flat segments are in the Xen-private section of every GDT. Since these 52 * are also present in the initial GDT, many OSes will be able to avoid 53 * installing their own GDT. 54 */ 55 56#define FLAT_RING3_CS32 0xe023 /* GDT index 260 */ 57#define FLAT_RING3_CS64 0xe033 /* GDT index 261 */ 58#define FLAT_RING3_DS32 0xe02b /* GDT index 262 */ 59#define FLAT_RING3_DS64 0x0000 /* NULL selector */ 60#define FLAT_RING3_SS32 0xe02b /* GDT index 262 */ 61#define FLAT_RING3_SS64 0xe02b /* GDT index 262 */ 62 63#define FLAT_KERNEL_DS64 FLAT_RING3_DS64 64#define FLAT_KERNEL_DS32 FLAT_RING3_DS32 65#define FLAT_KERNEL_DS FLAT_KERNEL_DS64 66#define FLAT_KERNEL_CS64 FLAT_RING3_CS64 67#define FLAT_KERNEL_CS32 FLAT_RING3_CS32 68#define FLAT_KERNEL_CS FLAT_KERNEL_CS64 69#define FLAT_KERNEL_SS64 FLAT_RING3_SS64 70#define FLAT_KERNEL_SS32 FLAT_RING3_SS32 71#define FLAT_KERNEL_SS FLAT_KERNEL_SS64 72 73#define FLAT_USER_DS64 FLAT_RING3_DS64 74#define FLAT_USER_DS32 FLAT_RING3_DS32 75#define FLAT_USER_DS FLAT_USER_DS64 76#define FLAT_USER_CS64 FLAT_RING3_CS64 77#define FLAT_USER_CS32 FLAT_RING3_CS32 78#define FLAT_USER_CS FLAT_USER_CS64 79#define FLAT_USER_SS64 FLAT_RING3_SS64 80#define FLAT_USER_SS32 FLAT_RING3_SS32 81#define FLAT_USER_SS FLAT_USER_SS64 82 83#define __HYPERVISOR_VIRT_START 0xFFFF800000000000 84#define __HYPERVISOR_VIRT_END 0xFFFF880000000000 85#define __MACH2PHYS_VIRT_START 0xFFFF800000000000 86#define __MACH2PHYS_VIRT_END 0xFFFF804000000000 87 88#ifndef HYPERVISOR_VIRT_START 89#define HYPERVISOR_VIRT_START mk_unsigned_long(__HYPERVISOR_VIRT_START) 90#define HYPERVISOR_VIRT_END mk_unsigned_long(__HYPERVISOR_VIRT_END) 91#endif 92 93#define MACH2PHYS_VIRT_START mk_unsigned_long(__MACH2PHYS_VIRT_START) 94#define MACH2PHYS_VIRT_END mk_unsigned_long(__MACH2PHYS_VIRT_END) 95#define MACH2PHYS_NR_ENTRIES ((MACH2PHYS_VIRT_END-MACH2PHYS_VIRT_START)>>3) 96#ifndef machine_to_phys_mapping 97#define machine_to_phys_mapping ((unsigned long *)HYPERVISOR_VIRT_START) 98#endif 99 100/* 101 * int HYPERVISOR_set_segment_base(unsigned int which, unsigned long base) 102 * @which == SEGBASE_* ; @base == 64-bit base address 103 * Returns 0 on success. 104 */ 105#define SEGBASE_FS 0 106#define SEGBASE_GS_USER 1 107#define SEGBASE_GS_KERNEL 2 108#define SEGBASE_GS_USER_SEL 3 /* Set user %gs specified in base[15:0] */ 109 110/* 111 * int HYPERVISOR_iret(void) 112 * All arguments are on the kernel stack, in the following format. 113 * Never returns if successful. Current kernel context is lost. 114 * The saved CS is mapped as follows: 115 * RING0 -> RING3 kernel mode. 116 * RING1 -> RING3 kernel mode. 117 * RING2 -> RING3 kernel mode. 118 * RING3 -> RING3 user mode. 119 * However RING0 indicates that the guest kernel should return to iteself 120 * directly with 121 * orb $3,1*8(%rsp) 122 * iretq 123 * If flags contains VGCF_in_syscall: 124 * Restore RAX, RIP, RFLAGS, RSP. 125 * Discard R11, RCX, CS, SS. 126 * Otherwise: 127 * Restore RAX, R11, RCX, CS:RIP, RFLAGS, SS:RSP. 128 * All other registers are saved on hypercall entry and restored to user. 129 */ 130/* Guest exited in SYSCALL context? Return to guest with SYSRET? */ 131#define _VGCF_in_syscall 8 132#define VGCF_in_syscall (1<<_VGCF_in_syscall) 133#define VGCF_IN_SYSCALL VGCF_in_syscall 134 135#ifndef __ASSEMBLY__ 136 137struct iret_context { 138 /* Top of stack (%rsp at point of hypercall). */ 139 uint64_t rax, r11, rcx, flags, rip, cs, rflags, rsp, ss; 140 /* Bottom of iret stack frame. */ 141}; 142 143#if defined(__GNUC__) && !defined(__STRICT_ANSI__) 144/* Anonymous union includes both 32- and 64-bit names (e.g., eax/rax). */ 145#define __DECL_REG(name) union { \ 146 uint64_t r ## name, e ## name; \ 147 uint32_t _e ## name; \ 148} 149#else 150/* Non-gcc sources must always use the proper 64-bit name (e.g., rax). */ 151#define __DECL_REG(name) uint64_t r ## name 152#endif 153 154struct cpu_user_regs { 155 uint64_t r15; 156 uint64_t r14; 157 uint64_t r13; 158 uint64_t r12; 159 __DECL_REG(bp); 160 __DECL_REG(bx); 161 uint64_t r11; 162 uint64_t r10; 163 uint64_t r9; 164 uint64_t r8; 165 __DECL_REG(ax); 166 __DECL_REG(cx); 167 __DECL_REG(dx); 168 __DECL_REG(si); 169 __DECL_REG(di); 170 uint32_t error_code; /* private */ 171 uint32_t entry_vector; /* private */ 172 __DECL_REG(ip); 173 uint16_t cs, _pad0[1]; 174 uint8_t saved_upcall_mask; 175 uint8_t _pad1[3]; 176 __DECL_REG(flags); /* rflags.IF == !saved_upcall_mask */ 177 __DECL_REG(sp); 178 uint16_t ss, _pad2[3]; 179 uint16_t es, _pad3[3]; 180 uint16_t ds, _pad4[3]; 181 uint16_t fs, _pad5[3]; /* Non-zero => takes precedence over fs_base. */ 182 uint16_t gs, _pad6[3]; /* Non-zero => takes precedence over gs_base_usr. */ 183}; 184typedef struct cpu_user_regs cpu_user_regs_t; 185DEFINE_XEN_GUEST_HANDLE(cpu_user_regs_t); 186 187#undef __DECL_REG 188 189#define xen_pfn_to_cr3(pfn) ((unsigned long)(pfn) << 12) 190#define xen_cr3_to_pfn(cr3) ((unsigned long)(cr3) >> 12) 191 192struct arch_vcpu_info { 193 unsigned long cr2; 194 unsigned long pad; /* sizeof(vcpu_info_t) == 64 */ 195}; 196typedef struct arch_vcpu_info arch_vcpu_info_t; 197 198typedef unsigned long xen_callback_t; 199 200#endif /* !__ASSEMBLY__ */ 201 202#endif /* __XEN_PUBLIC_ARCH_X86_XEN_X86_64_H__ */ 203 204/* 205 * Local variables: 206 * mode: C 207 * c-set-style: "BSD" 208 * c-basic-offset: 4 209 * tab-width: 4 210 * indent-tabs-mode: nil 211 * End: 212 */ 213