diff options
author | Jeremy Fitzhardinge <jeremy@goop.org> | 2008-07-08 15:06:37 -0700 |
---|---|---|
committer | Ingo Molnar <mingo@elte.hu> | 2008-07-16 10:57:00 +0200 |
commit | e74359028d5489a281fb2c379a47b1d3cb14526e (patch) | |
tree | 564a2049511f15e5c0187fc31b16a45e5b614999 /crypto/blowfish.c | |
parent | ca15f20f1126f897500ade892a2d598a08da1b56 (diff) | |
download | kernel-crypto-e74359028d5489a281fb2c379a47b1d3cb14526e.tar.gz kernel-crypto-e74359028d5489a281fb2c379a47b1d3cb14526e.tar.xz kernel-crypto-e74359028d5489a281fb2c379a47b1d3cb14526e.zip |
xen64: fix calls into hypercall page
The 64-bit calling convention for hypercalls uses different registers
from 32-bit. Annoyingly, gcc's asm syntax doesn't have a way to
specify one of the extra numeric reigisters in a constraint, so we
must use explicitly placed register variables. Given that we have to
do it for some args, may as well do it for all.
Also fix syntax gcc generates for the call instruction itself. We
need a plain direct call, but the asm expansion which works on 32-bit
generates a rip-relative addressing mode in 64-bit, which is treated
as an indirect call. The alternative is to pass the hypercall page
offset into the asm, and have it add it to the hypercall page start
address to generate the call.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Stephen Tweedie <sct@redhat.com>
Cc: Eduardo Habkost <ehabkost@redhat.com>
Cc: Mark McLoughlin <markmc@redhat.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Diffstat (limited to 'crypto/blowfish.c')
0 files changed, 0 insertions, 0 deletions