xref: /kvmtool/kvm.c (revision 090f898eae55c67f87ae2e1a7fcd39584f8f7455)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3eda03319SPekka Enberg #include "kvm/interrupt.h"
4f3150089SPekka Enberg #include "kvm/util.h"
5eda03319SPekka Enberg 
66c7d8514SPekka Enberg #include <linux/kvm.h>
7f5ab5f67SPekka Enberg 
8f5ab5f67SPekka Enberg #include <asm/bootparam.h>
9f5ab5f67SPekka Enberg 
10ae1fae34SPekka Enberg #include <sys/ioctl.h>
111f9cff23SPekka Enberg #include <inttypes.h>
121f9cff23SPekka Enberg #include <sys/mman.h>
132da26a59SPekka Enberg #include <stdbool.h>
146e5e8b8dSPekka Enberg #include <assert.h>
1506e41eeaSPekka Enberg #include <limits.h>
16f5ab5f67SPekka Enberg #include <stdarg.h>
17b8f6afcdSPekka Enberg #include <stdlib.h>
18f5ab5f67SPekka Enberg #include <string.h>
190d1f17ecSPekka Enberg #include <unistd.h>
201f9cff23SPekka Enberg #include <stdio.h>
21b8f6afcdSPekka Enberg #include <fcntl.h>
22b8f6afcdSPekka Enberg 
231f9cff23SPekka Enberg /*
241f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
251f9cff23SPekka Enberg  */
261f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
271f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
281f9cff23SPekka Enberg #endif
291f9cff23SPekka Enberg 
30ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
310d1f17ecSPekka Enberg 
32ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
33ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
34ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
519b1fb1c3SPekka Enberg };
529b1fb1c3SPekka Enberg 
536753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset)
546753ed2fSPekka Enberg {
556753ed2fSPekka Enberg 	return ((uint32_t)selector << 4) + (uint32_t) offset;
566753ed2fSPekka Enberg }
576753ed2fSPekka Enberg 
586753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset)
59ae1fae34SPekka Enberg {
60ae1fae34SPekka Enberg 	return self->ram_start + offset;
61ae1fae34SPekka Enberg }
62ae1fae34SPekka Enberg 
636753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset)
646753ed2fSPekka Enberg {
656753ed2fSPekka Enberg 	unsigned long flat = segment_to_flat(selector, offset);
666753ed2fSPekka Enberg 
676753ed2fSPekka Enberg 	return guest_flat_to_host(self, flat);
686753ed2fSPekka Enberg }
696753ed2fSPekka Enberg 
70ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
71b8f6afcdSPekka Enberg {
7228fa19c0SPekka Enberg 	int ret;
73b8f6afcdSPekka Enberg 
7473ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
754076b041SPekka Enberg 	if (ret < 0)
764076b041SPekka Enberg 		return false;
774076b041SPekka Enberg 
784076b041SPekka Enberg 	return ret;
794076b041SPekka Enberg }
804076b041SPekka Enberg 
814076b041SPekka Enberg static struct kvm *kvm__new(void)
824076b041SPekka Enberg {
834076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
844076b041SPekka Enberg 
854076b041SPekka Enberg 	if (!self)
864076b041SPekka Enberg 		die("out of memory");
874076b041SPekka Enberg 
884076b041SPekka Enberg 	return self;
894076b041SPekka Enberg }
904076b041SPekka Enberg 
919ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
929ef4c68eSPekka Enberg {
939ef4c68eSPekka Enberg 	free(self->ram_start);
949ef4c68eSPekka Enberg 	free(self);
959ef4c68eSPekka Enberg }
969ef4c68eSPekka Enberg 
97ae1fae34SPekka Enberg struct kvm *kvm__init(void)
984076b041SPekka Enberg {
992b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1004076b041SPekka Enberg 	struct kvm *self;
1010d1f17ecSPekka Enberg 	long page_size;
1021f9cff23SPekka Enberg 	int mmap_size;
1034076b041SPekka Enberg 	int ret;
1044076b041SPekka Enberg 
1054076b041SPekka Enberg 	self = kvm__new();
1064076b041SPekka Enberg 
10773ac60e6SPekka Enberg 	self->sys_fd = open("/dev/kvm", O_RDWR);
10873ac60e6SPekka Enberg 	if (self->sys_fd < 0)
109f5ab5f67SPekka Enberg 		die_perror("open");
110b8f6afcdSPekka Enberg 
11173ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1126c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
113f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1146c7d8514SPekka Enberg 
11573ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
11673ac60e6SPekka Enberg 	if (self->vm_fd < 0)
117f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
11828fa19c0SPekka Enberg 
1194076b041SPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_USER_MEMORY))
120f5ab5f67SPekka Enberg 		die("KVM_CAP_USER_MEMORY is not supported");
1212da26a59SPekka Enberg 
1220d1f17ecSPekka Enberg 	self->ram_size		= 64UL * 1024UL * 1024UL;
1230d1f17ecSPekka Enberg 
1240d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
1250d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
1260d1f17ecSPekka Enberg 		die("out of memory");
1270d1f17ecSPekka Enberg 
1282b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
1292b0e3342SPekka Enberg 		.slot			= 0,
1302b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
1310d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
1320d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
1332b0e3342SPekka Enberg 	};
1342b0e3342SPekka Enberg 
13573ac60e6SPekka Enberg 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem, 1);
1362b0e3342SPekka Enberg 	if (ret < 0)
137f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
1382b0e3342SPekka Enberg 
139895c2fefSPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_SET_TSS_ADDR))
140f5ab5f67SPekka Enberg 		die("KVM_CAP_SET_TSS_ADDR is not supported");
141895c2fefSPekka Enberg 
14273ac60e6SPekka Enberg 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
143895c2fefSPekka Enberg 	if (ret < 0)
144f5ab5f67SPekka Enberg 		die_perror("KVM_SET_TSS_ADDR ioctl");
145895c2fefSPekka Enberg 
14673ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
1472b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
148f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
1492b0e3342SPekka Enberg 
1501f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
1511f9cff23SPekka Enberg 	if (mmap_size < 0)
152f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
1531f9cff23SPekka Enberg 
1541f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
1551f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
1561f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
1571f9cff23SPekka Enberg 
1584076b041SPekka Enberg 	return self;
1594076b041SPekka Enberg }
1604076b041SPekka Enberg 
161ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
162aee6632eSPekka Enberg {
163aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
164aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
165aee6632eSPekka Enberg 	};
166aee6632eSPekka Enberg 
167aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
168b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
169aee6632eSPekka Enberg }
170aee6632eSPekka Enberg 
1715f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
172b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
173dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
174009b0758SPekka Enberg 
175edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
176009b0758SPekka Enberg {
177009b0758SPekka Enberg 	void *p;
178009b0758SPekka Enberg 	int nr;
179009b0758SPekka Enberg 
180009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
181009b0758SPekka Enberg 		die_perror("lseek");
182009b0758SPekka Enberg 
1836753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
184009b0758SPekka Enberg 
185009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
186009b0758SPekka Enberg 		p += nr;
187009b0758SPekka Enberg 
188dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
189edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
190dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
191edc8a14dSPekka Enberg 
1927fb218bdSPekka Enberg 	return true;
193009b0758SPekka Enberg }
194009b0758SPekka Enberg 
1957fb218bdSPekka Enberg /*
1967fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
1977fb218bdSPekka Enberg  * default.
1987fb218bdSPekka Enberg  */
1997fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
200ae1fae34SPekka Enberg 
201ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
20222489bb0SCyrill Gorcunov static const char fakebios_vector[]	= { 0xcf };
203ae1fae34SPekka Enberg 
20410943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS		4
20510943d14SPekka Enberg 
2066d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline)
207ae1fae34SPekka Enberg {
208bc75b0aeSCyrill Gorcunov 	struct real_intr_desc intr;
20922489bb0SCyrill Gorcunov 	struct boot_params boot;
2104b62331fSPekka Enberg 	unsigned long setup_sects;
2117fb218bdSPekka Enberg 	ssize_t setup_size;
21222489bb0SCyrill Gorcunov 	void *p;
213ae1fae34SPekka Enberg 	int nr;
214ae1fae34SPekka Enberg 
2155d67eaf6SPekka Enberg 	/*
2165d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2175d67eaf6SPekka Enberg 	 * memory layout.
2185d67eaf6SPekka Enberg 	 */
2195d67eaf6SPekka Enberg 
220009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
221009b0758SPekka Enberg 		die_perror("lseek");
222009b0758SPekka Enberg 
223ae1fae34SPekka Enberg 	read(fd, &boot, sizeof(boot));
224ae1fae34SPekka Enberg 
225ae1fae34SPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0)
2267fb218bdSPekka Enberg 		return false;
227ae1fae34SPekka Enberg 
228e93ab78aSPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
229e93ab78aSPekka Enberg 		die_perror("lseek");
230e93ab78aSPekka Enberg 
2314cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
2324cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
23310943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
23410943d14SPekka Enberg 
23554d4a626SPekka Enberg 	setup_size = setup_sects << 9;
2366753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
237ae1fae34SPekka Enberg 
2387fb218bdSPekka Enberg 	if (read(fd, p, setup_size) != setup_size)
2397fb218bdSPekka Enberg 		die_perror("read");
2407fb218bdSPekka Enberg 
2416753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
242ae1fae34SPekka Enberg 
243ae1fae34SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
244ae1fae34SPekka Enberg 		p += nr;
245ae1fae34SPekka Enberg 
246dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
247edc8a14dSPekka Enberg 	/*
248edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
249edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
250edc8a14dSPekka Enberg 	 */
251edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
252dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
253edc8a14dSPekka Enberg 
254ea684828SCyrill Gorcunov 	/*
25522489bb0SCyrill Gorcunov 	 * Setup a *fake* real mode vector table, it has only
25622489bb0SCyrill Gorcunov 	 * one real hadler which does just iret
25722489bb0SCyrill Gorcunov 	 *
25822489bb0SCyrill Gorcunov 	 * we need a place for 1 byte so lets put
25922489bb0SCyrill Gorcunov 	 * it where the BIOS lives -- BDA area
260ea684828SCyrill Gorcunov 	 */
26122489bb0SCyrill Gorcunov 	p = guest_flat_to_host(self, BDA_START);
26222489bb0SCyrill Gorcunov 	memcpy(p, fakebios_vector, sizeof(fakebios_vector));
263bc75b0aeSCyrill Gorcunov 	intr = (struct real_intr_desc) {
26422489bb0SCyrill Gorcunov 		.segment	= BDA_START >> 4,
26522489bb0SCyrill Gorcunov 		.offset		= 0,
266ea684828SCyrill Gorcunov 	};
267ea684828SCyrill Gorcunov 	p = guest_flat_to_host(self, 0);
268bc75b0aeSCyrill Gorcunov 	interrupt_table__setup(&self->interrupt_table, &intr);
269bc75b0aeSCyrill Gorcunov 	interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE);
270ea684828SCyrill Gorcunov 
2717fb218bdSPekka Enberg 	return true;
272ae1fae34SPekka Enberg }
273ae1fae34SPekka Enberg 
2746d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
2756d1f350dSCyrill Gorcunov 			const char *kernel_cmdline)
276ae1fae34SPekka Enberg {
2777fb218bdSPekka Enberg 	bool ret;
278ae1fae34SPekka Enberg 	int fd;
279ae1fae34SPekka Enberg 
280ae1fae34SPekka Enberg 	fd = open(kernel_filename, O_RDONLY);
281ae1fae34SPekka Enberg 	if (fd < 0)
282ae1fae34SPekka Enberg 		die("unable to open kernel");
283ae1fae34SPekka Enberg 
2846d1f350dSCyrill Gorcunov 	ret = load_bzimage(kvm, fd, kernel_cmdline);
285009b0758SPekka Enberg 	if (ret)
286009b0758SPekka Enberg 		goto found_kernel;
287ae1fae34SPekka Enberg 
288009b0758SPekka Enberg 	ret = load_flat_binary(kvm, fd);
289009b0758SPekka Enberg 	if (ret)
290009b0758SPekka Enberg 		goto found_kernel;
291009b0758SPekka Enberg 
292009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
293009b0758SPekka Enberg 
294009b0758SPekka Enberg found_kernel:
295ae1fae34SPekka Enberg 	return ret;
296ae1fae34SPekka Enberg }
297ae1fae34SPekka Enberg 
29806e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
29906e41eeaSPekka Enberg {
30006e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
30106e41eeaSPekka Enberg 
30206e41eeaSPekka Enberg 	return ip - (cs << 4);
30306e41eeaSPekka Enberg }
30406e41eeaSPekka Enberg 
305f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
30606e41eeaSPekka Enberg {
307f326512aSPekka Enberg 	uint64_t cs;
308f326512aSPekka Enberg 
309f326512aSPekka Enberg 	/*
310f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
311f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
312f326512aSPekka Enberg 	 */
313f326512aSPekka Enberg 	if (self->sregs.cr0 & 0x01)
314f326512aSPekka Enberg 		return ip;
315f326512aSPekka Enberg 
316f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
31706e41eeaSPekka Enberg 
31806e41eeaSPekka Enberg 	return ip + (cs << 4);
31906e41eeaSPekka Enberg }
32006e41eeaSPekka Enberg 
321dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
322dbdb74c2SPekka Enberg {
323dbdb74c2SPekka Enberg 	/*
324dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
325dbdb74c2SPekka Enberg 	 */
326dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
327dbdb74c2SPekka Enberg }
328dbdb74c2SPekka Enberg 
3297fb218bdSPekka Enberg void kvm__reset_vcpu(struct kvm *self)
330ae1fae34SPekka Enberg {
33153602077SPekka Enberg 	self->sregs = (struct kvm_sregs) {
33253602077SPekka Enberg 		.cr0		= 0x60000010ULL,
33353602077SPekka Enberg 		.cs		= (struct kvm_segment) {
334dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
335dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
33653602077SPekka Enberg 			.limit		= 0xffffU,
33753602077SPekka Enberg 			.type		= 0x0bU,
33853602077SPekka Enberg 			.present	= 1,
33953602077SPekka Enberg 			.dpl		= 0x03,
34053602077SPekka Enberg 			.s		= 1,
34153602077SPekka Enberg 		},
34253602077SPekka Enberg 		.ss		= (struct kvm_segment) {
343dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
344dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
34553602077SPekka Enberg 			.limit		= 0xffffU,
34653602077SPekka Enberg 			.type		= 0x03U,
34753602077SPekka Enberg 			.present	= 1,
34853602077SPekka Enberg 			.dpl		= 0x03,
34953602077SPekka Enberg 			.s		= 1,
35053602077SPekka Enberg 		},
35153602077SPekka Enberg 		.ds		= (struct kvm_segment) {
352dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
353dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
35453602077SPekka Enberg 			.limit		= 0xffffU,
35553602077SPekka Enberg 			.type		= 0x03U,
35653602077SPekka Enberg 			.present	= 1,
35753602077SPekka Enberg 			.dpl		= 0x03,
35853602077SPekka Enberg 			.s		= 1,
35953602077SPekka Enberg 		},
36053602077SPekka Enberg 		.es		= (struct kvm_segment) {
361dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
362dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
36353602077SPekka Enberg 			.limit		= 0xffffU,
36453602077SPekka Enberg 			.type		= 0x03U,
36553602077SPekka Enberg 			.present	= 1,
36653602077SPekka Enberg 			.dpl		= 0x03,
36753602077SPekka Enberg 			.s		= 1,
36853602077SPekka Enberg 		},
36953602077SPekka Enberg 		.fs		= (struct kvm_segment) {
370dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
371dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
37253602077SPekka Enberg 			.limit		= 0xffffU,
37353602077SPekka Enberg 			.type		= 0x03U,
37453602077SPekka Enberg 			.present	= 1,
37553602077SPekka Enberg 			.dpl		= 0x03,
37653602077SPekka Enberg 			.s		= 1,
37753602077SPekka Enberg 		},
37853602077SPekka Enberg 		.gs		= (struct kvm_segment) {
379dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
380dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
38153602077SPekka Enberg 			.limit		= 0xffffU,
38253602077SPekka Enberg 			.type		= 0x03U,
38353602077SPekka Enberg 			.present	= 1,
38453602077SPekka Enberg 			.dpl		= 0x03,
38553602077SPekka Enberg 			.s		= 1,
38653602077SPekka Enberg 		},
38753602077SPekka Enberg 		.tr		= (struct kvm_segment) {
38853602077SPekka Enberg 			.limit		= 0xffffU,
38953602077SPekka Enberg 			.present	= 1,
39053602077SPekka Enberg 			.type		= 0x03U,
39153602077SPekka Enberg 		},
39253602077SPekka Enberg 		.ldt		= (struct kvm_segment) {
39353602077SPekka Enberg 			.limit		= 0xffffU,
39453602077SPekka Enberg 			.present	= 1,
3957085d935SPekka Enberg 			.type		= 0x02U,
39653602077SPekka Enberg 		},
39753602077SPekka Enberg 		.gdt		= (struct kvm_dtable) {
39853602077SPekka Enberg 			.limit		= 0xffffU,
39953602077SPekka Enberg 		},
40053602077SPekka Enberg 		.idt		= (struct kvm_dtable) {
40153602077SPekka Enberg 			.limit		= 0xffffU,
40253602077SPekka Enberg 		},
40353602077SPekka Enberg 	};
40453602077SPekka Enberg 
40553602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
40653602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
40706e41eeaSPekka Enberg 
40806e41eeaSPekka Enberg 	self->regs = (struct kvm_regs) {
40906e41eeaSPekka Enberg 		/* We start the guest in 16-bit real mode  */
41006e41eeaSPekka Enberg 		.rflags		= 0x0000000000000002ULL,
411dbdb74c2SPekka Enberg 
412dbdb74c2SPekka Enberg 		.rip		= self->boot_ip,
413dbdb74c2SPekka Enberg 		.rsp		= self->boot_sp,
414dbdb74c2SPekka Enberg 		.rbp		= self->boot_sp,
41506e41eeaSPekka Enberg 	};
41606e41eeaSPekka Enberg 
41706e41eeaSPekka Enberg 	if (self->regs.rip > USHRT_MAX)
41806e41eeaSPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
41906e41eeaSPekka Enberg 
42006e41eeaSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
42106e41eeaSPekka Enberg 		die_perror("KVM_SET_REGS failed");
42206e41eeaSPekka Enberg 
423ce4d0766SPekka Enberg 	self->fpu = (struct kvm_fpu) {
424ce4d0766SPekka Enberg 		.fcw		= 0x37f,
425ce4d0766SPekka Enberg 		.mxcsr		= 0x1f80,
426ce4d0766SPekka Enberg 	};
427ce4d0766SPekka Enberg 
428ce4d0766SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
429ce4d0766SPekka Enberg 		die_perror("KVM_SET_FPU failed");
430ce4d0766SPekka Enberg 
431ae1fae34SPekka Enberg }
432ae1fae34SPekka Enberg 
433ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
434ae1fae34SPekka Enberg {
435ae1fae34SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0)
436ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
437ae1fae34SPekka Enberg }
438ae1fae34SPekka Enberg 
43953602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
44053602077SPekka Enberg {
441ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
44253602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
443ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
44453602077SPekka Enberg }
44553602077SPekka Enberg 
446ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
4477118d2caSPekka Enberg {
44853602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
44953602077SPekka Enberg 	unsigned long cr4, cr8;
4507118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
4517118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
4527118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
4537118d2caSPekka Enberg 	unsigned long r10, r11, r12;
4547118d2caSPekka Enberg 	unsigned long r13, r14, r15;
4557118d2caSPekka Enberg 	unsigned long rip, rsp;
45653602077SPekka Enberg 	struct kvm_sregs sregs;
457a2fe6199SPekka Enberg 	unsigned long rflags;
4587118d2caSPekka Enberg 	struct kvm_regs regs;
459ce5e0ecbSPekka Enberg 	int i;
4607118d2caSPekka Enberg 
4617118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
4627118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
4637118d2caSPekka Enberg 
464a2fe6199SPekka Enberg 	rflags = regs.rflags;
465a2fe6199SPekka Enberg 
4667118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
4677118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
4687118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
4697118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
4707118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
4717118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
4727118d2caSPekka Enberg 
4737118d2caSPekka Enberg 	printf("Registers:\n");
4742177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
475ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
4767118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
4777118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
4787118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
4797118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
48053602077SPekka Enberg 
48153602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
48253602077SPekka Enberg 		die("KVM_GET_REGS failed");
48353602077SPekka Enberg 
48453602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
48553602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
48653602077SPekka Enberg 
48753602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
48853602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
489ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
490ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
49153602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
49253602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
49353602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
49453602077SPekka Enberg 	print_segment("es ", &sregs.es);
49553602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
49653602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
497ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
498ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
4992049569dSPekka Enberg 	printf(" [ efer: %016lx  apic base: %016lx  nmi: %s ]\n", (uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
5002049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
501ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
502ce5e0ecbSPekka Enberg 	printf(" ");
503ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
504ce5e0ecbSPekka Enberg 		printf("%016lx ", (uint64_t) sregs.interrupt_bitmap[i]);
505ce5e0ecbSPekka Enberg 	printf("\n");
5067118d2caSPekka Enberg }
5077118d2caSPekka Enberg 
508ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
5096f10be05SPekka Enberg {
5106f10be05SPekka Enberg 	unsigned int code_bytes = 64;
5116f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
5126f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
5136f10be05SPekka Enberg 	unsigned char c;
514ae1fae34SPekka Enberg 	unsigned int i;
5156f10be05SPekka Enberg 	uint8_t *ip;
5166f10be05SPekka Enberg 
5172a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
5182a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
5192a601aafSPekka Enberg 
5202a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
5212a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
5222a601aafSPekka Enberg 
523f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
5246f10be05SPekka Enberg 
5256f10be05SPekka Enberg 	printf("Code: ");
5266f10be05SPekka Enberg 
5276f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
5286e8abc38SPekka Enberg 		c = *ip;
5296e8abc38SPekka Enberg 
530f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
5316f10be05SPekka Enberg 			printf("<%02x> ", c);
5326f10be05SPekka Enberg 		else
5336f10be05SPekka Enberg 			printf("%02x ", c);
5346f10be05SPekka Enberg 	}
5356f10be05SPekka Enberg 
5366f10be05SPekka Enberg 	printf("\n");
5376f10be05SPekka Enberg }
538*090f898eSCyrill Gorcunov 
539*090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
540*090f898eSCyrill Gorcunov {
541*090f898eSCyrill Gorcunov 	unsigned char *p;
542*090f898eSCyrill Gorcunov 	unsigned long n;
543*090f898eSCyrill Gorcunov 
544*090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
545*090f898eSCyrill Gorcunov 	if (!size)
546*090f898eSCyrill Gorcunov 		return;
547*090f898eSCyrill Gorcunov 
548*090f898eSCyrill Gorcunov 	p = (unsigned char *)guest_flat_to_host(self, addr);
549*090f898eSCyrill Gorcunov 
550*090f898eSCyrill Gorcunov 	printf("Guest memory dump:\n");
551*090f898eSCyrill Gorcunov 
552*090f898eSCyrill Gorcunov 	for (n = 0; n < size; n+=8)
553*090f898eSCyrill Gorcunov 		printf("0x%08lx: %02x%02x%02x%02x %02x%02x%02x%02x\n",
554*090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
555*090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
556*090f898eSCyrill Gorcunov }
557