Blame view

kernel/linux-rt-4.4.41/arch/x86/include/asm/xen/interface_32.h 2.88 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
  /******************************************************************************
   * arch-x86_32.h
   *
   * Guest OS interface to x86 32-bit Xen.
   *
   * Copyright (c) 2004, K A Fraser
   */
  
  #ifndef _ASM_X86_XEN_INTERFACE_32_H
  #define _ASM_X86_XEN_INTERFACE_32_H
  
  
  /*
   * These flat segments are in the Xen-private section of every GDT. Since these
   * are also present in the initial GDT, many OSes will be able to avoid
   * installing their own GDT.
   */
  #define FLAT_RING1_CS 0xe019    /* GDT index 259 */
  #define FLAT_RING1_DS 0xe021    /* GDT index 260 */
  #define FLAT_RING1_SS 0xe021    /* GDT index 260 */
  #define FLAT_RING3_CS 0xe02b    /* GDT index 261 */
  #define FLAT_RING3_DS 0xe033    /* GDT index 262 */
  #define FLAT_RING3_SS 0xe033    /* GDT index 262 */
  
  #define FLAT_KERNEL_CS FLAT_RING1_CS
  #define FLAT_KERNEL_DS FLAT_RING1_DS
  #define FLAT_KERNEL_SS FLAT_RING1_SS
  #define FLAT_USER_CS    FLAT_RING3_CS
  #define FLAT_USER_DS    FLAT_RING3_DS
  #define FLAT_USER_SS    FLAT_RING3_SS
  
  /* And the trap vector is... */
  #define TRAP_INSTR "int $0x82"
  
  #define __MACH2PHYS_VIRT_START 0xF5800000
  #define __MACH2PHYS_VIRT_END   0xF6800000
  
  #define __MACH2PHYS_SHIFT      2
  
  /*
   * Virtual addresses beyond this are not modifiable by guest OSes. The
   * machine->physical mapping table starts at this address, read-only.
   */
  #define __HYPERVISOR_VIRT_START 0xF5800000
  
  #ifndef __ASSEMBLY__
  
  struct cpu_user_regs {
      uint32_t ebx;
      uint32_t ecx;
      uint32_t edx;
      uint32_t esi;
      uint32_t edi;
      uint32_t ebp;
      uint32_t eax;
      uint16_t error_code;    /* private */
      uint16_t entry_vector;  /* private */
      uint32_t eip;
      uint16_t cs;
      uint8_t  saved_upcall_mask;
      uint8_t  _pad0;
      uint32_t eflags;        /* eflags.IF == !saved_upcall_mask */
      uint32_t esp;
      uint16_t ss, _pad1;
      uint16_t es, _pad2;
      uint16_t ds, _pad3;
      uint16_t fs, _pad4;
      uint16_t gs, _pad5;
  };
  DEFINE_GUEST_HANDLE_STRUCT(cpu_user_regs);
  
  typedef uint64_t tsc_timestamp_t; /* RDTSC timestamp */
  
  struct arch_vcpu_info {
      unsigned long cr2;
      unsigned long pad[5]; /* sizeof(struct vcpu_info) == 64 */
  };
  
  struct xen_callback {
  	unsigned long cs;
  	unsigned long eip;
  };
  typedef struct xen_callback xen_callback_t;
  
  #define XEN_CALLBACK(__cs, __eip)				\
  	((struct xen_callback){ .cs = (__cs), .eip = (unsigned long)(__eip) })
  #endif /* !__ASSEMBLY__ */
  
  
  /*
   * Page-directory addresses above 4GB do not fit into architectural %cr3.
   * When accessing %cr3, or equivalent field in vcpu_guest_context, guests
   * must use the following accessor macros to pack/unpack valid MFNs.
   *
   * Note that Xen is using the fact that the pagetable base is always
   * page-aligned, and putting the 12 MSB of the address into the 12 LSB
   * of cr3.
   */
  #define xen_pfn_to_cr3(pfn) (((unsigned)(pfn) << 12) | ((unsigned)(pfn) >> 20))
  #define xen_cr3_to_pfn(cr3) (((unsigned)(cr3) >> 12) | ((unsigned)(cr3) << 20))
  
  #endif /* _ASM_X86_XEN_INTERFACE_32_H */