image/svg+xmlSYSCALL—Fast System CallInstruction Operand EncodingDescriptionSYSCALL invokes an OS system-call handler at privilege level 0. It does so by loading RIP from the IA32_LSTAR MSR (after saving the address of the instruction following SYSCALL into RCX). (The WRMSR instruction ensures that the IA32_LSTAR MSR always contain a canonical address.)SYSCALL also saves RFLAGS into R11 and then masks RFLAGS using the IA32_FMASK MSR (MSR address C0000084H); specifically, the processor clears in RFLAGS every bit corresponding to a bit that is set in the IA32_FMASK MSR.SYSCALL loads the CS and SS selectors with values derived from bits47:32 of the IA32_STAR MSR. However, the CS and SS descriptor caches are not loaded from the descriptors (in GDT or LDT) referenced by those selectors. Instead, the descriptor caches are loaded with fixed values. See the Operation section for details. It is the respon-sibility of OS software to ensure that the descriptors (in GDT or LDT) referenced by those selector values corre-spond to the fixed values loaded into the descriptor caches; the SYSCALL instruction does not ensure this correspondence.The SYSCALL instruction does not save the stack pointer (RSP). If the OS system-call handler will change the stack pointer, it is the responsibility of software to save the previous value of the stack pointer. This might be done prior to executing SYSCALL, with software restoring the stack pointer with the instruction following SYSCALL (which will be executed after SYSRET). Alternatively, the OS system-call handler may save the stack pointer and restore it before executing SYSRET.When shadow stacks are enabled at a privilege level where the SYSCALL instruction is invoked, the SSP is saved to the IA32_PL3_SSP MSR. If shadow stacks are enabled at privilege level 0, the SSP is loaded with 0. Refer to Chapter 6, “Procedure Calls, Interrupts, and Exceptions” and Chapter 18, “Control-Flow Enforcement Technology (CET)” in the Intel® 64 and IA-32 Architectures Software Developer’s Manual, Volume 1 for additional CET details.Instruction ordering. Instructions following a SYSCALL may be fetched from memory before earlier instructions complete execution, but they will not execute (even speculatively) until all instructions prior to the SYSCALL have completed execution (the later instructions may execute before data stored by the earlier instructions have become globally visible).OperationIF (CS.L 1 ) or (IA32_EFER.LMA 1) or (IA32_EFER.SCE 1)(* Not in 64-Bit Mode or SYSCALL/SYSRET not enabled in IA32_EFER *)THEN #UD;FI;RCX := RIP;(* Will contain address of next instruction *)RIP := IA32_LSTAR;R11 := RFLAGS;RFLAGS := RFLAGS AND NOT(IA32_FMASK);CS.Selector := IA32_STAR[47:32] AND FFFCH(* Operating system provides CS; RPL forced to 0 *)(* Set rest of CS to a fixed value *)CS.Base := 0;(* Flat segment *)OpcodeInstructionOp/ En64-Bit ModeCompat/Leg ModeDescription0F 05SYSCALLZOValidInvalidFast call to privilege level 0 system procedures.Op/EnOperand 1Operand 2Operand 3Operand 4ZONANANANA

image/svg+xmlCS.Limit := FFFFFH;(* With 4-KByte granularity, implies a 4-GByte limit *)CS.Type := 11;(* Execute/read code, accessed *)CS.S := 1;CS.DPL := 0;CS.P := 1;CS.L := 1;(* Entry is to 64-bit mode *)CS.D := 0;(* Required if CS.L = 1 *)CS.G := 1;(* 4-KByte granularity *)IF ShadowStackEnabled(CPL)THEN (* adjust so bits 63:N get the value of bit N–1, where N is the CPU’s maximum linear-address width *)IA32_PL3_SSP := LA_adjust(SSP);(* With shadow stacks enabled the system call is supported from Ring 3 to Ring 0 *)(* OS supporting Ring 0 to Ring 0 system calls or Ring 1/2 to ring 0 system call *)(* Must preserve the contents of IA32_PL3_SSP to avoid losing ring 3 state *)FI;CPL := 0;IF ShadowStackEnabled(CPL)SSP := 0;FI;IF EndbranchEnabled(CPL)IA32_S_CET.TRACKER = WAIT_FOR_ENDBRANCHIA32_S_CET.SUPPRESS = 0FI;SS.Selector := IA32_STAR[47:32] + 8;(* SS just above CS *)(* Set rest of SS to a fixed value *)SS.Base := 0;(* Flat segment *)SS.Limit := FFFFFH;(* With 4-KByte granularity, implies a 4-GByte limit *)SS.Type := 3;(* Read/write data, accessed *)SS.S := 1;SS.DPL := 0;SS.P := 1;SS.B := 1;(* 32-bit stack segment *)SS.G := 1;(* 4-KByte granularity *)Flags AffectedAll.Protected Mode Exceptions#UDThe SYSCALL instruction is not recognized in protected mode.Real-Address Mode Exceptions#UDThe SYSCALL instruction is not recognized in real-address mode.Virtual-8086 Mode Exceptions#UDThe SYSCALL instruction is not recognized in virtual-8086 mode.Compatibility Mode Exceptions#UDThe SYSCALL instruction is not recognized in compatibility mode.

image/svg+xml64-Bit Mode Exceptions#UDIf IA32_EFER.SCE = 0.If the LOCK prefix is used.

This UNOFFICIAL reference was generated from the official Intel® 64 and IA-32 Architectures Software Developer’s Manual by a dumb script. There is no guarantee that some parts aren't mangled or broken and is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.