Commit ad7daed2 authored by Juergen Gross's avatar Juergen Gross Committed by Colin Watson

xen: Setup hypercall page for PVH

Add the needed code to setup the hypercall page for calling into the
Xen hypervisor.

Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into
Signed-off-by: 's avatarJuergen Gross <>
Reviewed-by: 's avatarRoger Pau Monné <>
Reviewed-by: 's avatarDaniel Kiper <>
Tested-by: Hans van Kranenburg's avatarHans van Kranenburg <>

Origin: upstream,
Last-Update: 2019-01-07

Patch-Name: xen-pvh-setup-hypercall-page.patch
parent 6c3df9cf
......@@ -20,15 +20,95 @@
#include <grub/misc.h>
#include <grub/memory.h>
#include <grub/mm.h>
#include <grub/i386/cpuid.h>
#include <grub/i386/io.h>
#include <grub/xen.h>
#include <xen/hvm/start_info.h>
#include <grub/machine/kernel.h>
grub_uint64_t grub_rsdp_addr;
static char hypercall_page[GRUB_XEN_PAGE_SIZE]
__attribute__ ((aligned (GRUB_XEN_PAGE_SIZE)));
static grub_uint32_t xen_cpuid_base;
static void
grub_xen_cons_msg (const char *msg)
const char *c;
for (c = msg; *c; c++)
static void
grub_xen_panic (const char *msg)
grub_xen_cons_msg (msg);
grub_xen_cons_msg ("System halted!\n");
asm volatile ("cli");
while (1)
asm volatile ("hlt");
static void
grub_xen_cpuid_base (void)
grub_uint32_t base, eax, signature[3];
for (base = 0x40000000; base < 0x40010000; base += 0x100)
grub_cpuid (base, eax, signature[0], signature[1], signature[2]);
if (!grub_memcmp ("XenVMMXenVMM", signature, 12) && (eax - base) >= 2)
xen_cpuid_base = base;
grub_xen_panic ("Found no Xen signature!\n");
static void
grub_xen_setup_hypercall_page (void)
grub_uint32_t msr, addr, eax, ebx, ecx, edx;
/* Get base address of Xen-specific MSRs. */
grub_cpuid (xen_cpuid_base + 2, eax, ebx, ecx, edx);
msr = ebx;
addr = (grub_uint32_t) (&hypercall_page);
/* Specify hypercall page address for Xen. */
asm volatile ("wrmsr" : : "c" (msr), "a" (addr), "d" (0) : "memory");
grub_xen_hypercall (grub_uint32_t callno, grub_uint32_t a0,
grub_uint32_t a1, grub_uint32_t a2,
grub_uint32_t a3, grub_uint32_t a4,
grub_uint32_t a5 __attribute__ ((unused)))
grub_uint32_t res;
asm volatile ("call *%[callno]"
: "=a" (res), "+b" (a0), "+c" (a1), "+d" (a2),
"+S" (a3), "+D" (a4)
: [callno] "a" (&hypercall_page[callno * 32])
: "memory");
return res;
grub_xen_setup_pvh (void)
grub_xen_cpuid_base ();
grub_xen_setup_hypercall_page ();
......@@ -260,6 +260,13 @@ typedef struct arch_shared_info arch_shared_info_t;
* Debug console IO port, also called "port E9 hack". Each character written
* to this IO port will be printed on the hypervisor console, subject to log
* level restrictions.
#endif /* __XEN_PUBLIC_ARCH_X86_XEN_H__ */
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment