1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
|
c::is_xen() use cpuid in order to detect we're under XEN
diff -up ./c/stuff.xs.pl.tv2 ./c/stuff.xs.pl
--- ./c/stuff.xs.pl.tv2 2012-01-09 10:49:22.807894338 +0100
+++ ./c/stuff.xs.pl 2012-01-09 11:03:04.124482279 +0100
@@ -105,6 +105,40 @@ int length_of_space_padded(char *str, in
return len;
}
+int pv_context;
+static void cpuid(uint32_t idx,
+ uint32_t *eax,
+ uint32_t *ebx,
+ uint32_t *ecx,
+ uint32_t *edx)
+{
+ asm volatile (
+ "test %1,%1 ; jz 1f ; ud2a ; .ascii \"xen\" ; 1: cpuid"
+ : "=a" (*eax), "=b" (*ebx), "=c" (*ecx), "=d" (*edx)
+ : "0" (idx), "1" (pv_context) );
+}
+
+static int check_for_xen(void)
+{
+ uint32_t eax, ebx, ecx, edx;
+ char signature[13];
+
+ cpuid(0x40000000, &eax, &ebx, &ecx, &edx);
+ *(uint32_t *)(signature + 0) = ebx;
+ *(uint32_t *)(signature + 4) = ecx;
+ *(uint32_t *)(signature + 8) = edx;
+ signature[12] = ' . "'\0'" . ';
+
+ if ( strcmp("XenVMMXenVMM", signature) || (eax < 0x40000002) )
+ return 0;
+
+ cpuid(0x40000001, &eax, &ebx, &ecx, &edx);
+ printf("Running in %s context on Xen v%d.%d.\n",
+ pv_context ? "PV" : "HVM", (uint16_t)(eax >> 16), (uint16_t)eax);
+ return 1;
+}
+
+
MODULE = c::stuff PACKAGE = c::stuff
';
@@ -116,6 +150,46 @@ pcmcia_probe()
print '
int
+is_xen()
+ CODE:
+ pid_t pid;
+ int status;
+ uint32_t dummy;
+
+ /* Check for execution in HVM context. */
+ if ( check_for_xen() )
+ return 0;
+
+ /* Now we check for execution in PV context. */
+ pv_context = 1;
+
+ /*
+ * Fork a child to test the paravirtualised CPUID instruction.
+ * If executed outside Xen PV context, the extended opcode will fault.
+ */
+ pid = fork();
+ switch ( pid )
+ {
+ case 0:
+ /* Child: test paravirtualised CPUID opcode and then exit cleanly. */
+ cpuid(0x40000000, &dummy, &dummy, &dummy, &dummy);
+ exit(0);
+ case -1:
+ fprintf(stderr, "Fork failed.\n");
+ return 0;
+ }
+
+ /*
+ * Parent waits for child to terminate and checks for clean exit.
+ * Only if the exit is clean is it safe for us to try the extended CPUID.
+ */
+ waitpid(pid, &status, 0);
+ if ( WIFEXITED(status) && check_for_xen() )
+ return 0;
+
+ return 0;
+
+int
del_partition(hd, part_number)
int hd
int part_number
|