summaryrefslogtreecommitdiff
path: root/docs/guest-guide/x86/hypercall-abi.rst
blob: 14c48929d7487ae45ccb70adf2469b6feff28353 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
.. SPDX-License-Identifier: CC-BY-4.0

Hypercall ABI
=============

Hypercalls are system calls to Xen.  Two modes of guest operation are
supported, and up to 6 individual parameters are supported.

Hypercalls may only be issued by kernel-level software [1]_.

Registers
---------

The registers used for hypercalls depends on the operating mode of the guest.

.. list-table::
   :header-rows: 1

   * - ABI
     - Hypercall Index
     - Parameters (1 - 6)
     - Result

   * - 64bit
     - RAX
     - RDI RSI RDX R10 R8 R9
     - RAX

   * - 32bit
     - EAX
     - EBX ECX EDX ESI EDI EBP
     - EAX

32 and 64bit PV guests have an ABI fixed by their guest type.  The ABI for an
HVM guest depends on whether the vCPU is operating in a 64bit segment or not
[2]_.


Parameters
----------

Different hypercalls take a different number of parameters.  Each hypercall
potentially clobbers each of its parameter registers; a guest may not rely on
the parameter registers staying the same.  A debug build of Xen checks this by
deliberately poisoning the parameter registers before returning back to the
guest.


Mode transfer
-------------

The exact sequence of instructions required to issue a hypercall differs
between virtualisation mode and hardware vendor.

.. list-table::
   :header-rows: 1

   * - Guest
     - Transfer instruction

   * - 32bit PV
     - INT 0x82

   * - 64bit PV
     - SYSCALL

   * - Intel HVM
     - VMCALL

   * - AMD HVM
     - VMMCALL

To abstract away the details, Xen implements an interface known as the
Hypercall Page.  This allows a guest to make a hypercall without needing to
perform mode-specific or vendor-specific setup.


Hypercall Page
==============

The hypercall page is a page of guest RAM into which Xen will write suitable
transfer stubs.

Creating a hypercall page is an isolated operation from Xen's point of view.
It is the guests responsibility to ensure that the hypercall page, once
written by Xen, is mapped with executable permissions so it may be used.
Multiple hypercall pages may be created by the guest, if it wishes.

The stubs are arranged by hypercall index, and start on 32-byte boundaries.
To invoke a specific hypercall, ``call`` the relevant stub [3]_:

.. code-block:: none

   call hypercall_page + index * 32

There result is an ABI which is invariant of the exact operating mode or
hardware vendor.  This is intended to simplify guest kernel interfaces by
abstracting away the details of how it is currently running.


Creating Hypercall Pages
------------------------

Guests which are started using the PV boot protocol may set set
``XEN_ELFNOTE_HYPERCALL_PAGE`` to have the nominated page written as a
hypercall page during construction.  This mechanism is common for PV guests,
and allows hypercalls to be issued with no additional setup.

Any guest can locate the Xen CPUID leaves and read the *hypercall transfer
page* information, which specifies an MSR that can be used to create
additional hypercall pages.  When a guest physical address is written to the
MSR, Xen writes a hypercall page into the nominated guest page.  This
mechanism is common for HVM guests which are typically started via legacy
means.


.. rubric:: Footnotes

.. [1] For HVM guests, ``HVMOP_guest_request_vm_event`` may be configured to
       be usable from userspace, but this behaviour is not default.

.. [2] While it is possible to use compatibility mode segments in a 64bit
       kernel, hypercalls issues from such a mode will be interpreted with the
       32bit ABI.  Such a setup is not expected in production scenarios.

.. [3] ``HYPERCALL_iret`` is special.  It is only implemented for PV guests
       and takes all its parameters on the stack.  This stub should be
       ``jmp``'d to, rather than ``call``'d.  HVM guests have this stub
       implemented as ``ud2a`` to prevent accidental use.