xref: /kvmtool/kvm.c (revision 0ed849e624b8dd726c475dd9d9be151d1b3ca1ec)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3eda03319SPekka Enberg #include "kvm/interrupt.h"
4f3150089SPekka Enberg #include "kvm/util.h"
5eda03319SPekka Enberg 
66c7d8514SPekka Enberg #include <linux/kvm.h>
7f5ab5f67SPekka Enberg 
8f5ab5f67SPekka Enberg #include <asm/bootparam.h>
9f5ab5f67SPekka Enberg 
10ae1fae34SPekka Enberg #include <sys/ioctl.h>
111f9cff23SPekka Enberg #include <inttypes.h>
121f9cff23SPekka Enberg #include <sys/mman.h>
132da26a59SPekka Enberg #include <stdbool.h>
146e5e8b8dSPekka Enberg #include <assert.h>
1506e41eeaSPekka Enberg #include <limits.h>
16f5ab5f67SPekka Enberg #include <stdarg.h>
17b8f6afcdSPekka Enberg #include <stdlib.h>
18f5ab5f67SPekka Enberg #include <string.h>
190d1f17ecSPekka Enberg #include <unistd.h>
201f9cff23SPekka Enberg #include <stdio.h>
21b8f6afcdSPekka Enberg #include <fcntl.h>
22b8f6afcdSPekka Enberg 
231f9cff23SPekka Enberg /*
241f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
251f9cff23SPekka Enberg  */
261f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
271f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
281f9cff23SPekka Enberg #endif
291f9cff23SPekka Enberg 
30ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
310d1f17ecSPekka Enberg 
32ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
33ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
34ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
519b1fb1c3SPekka Enberg };
529b1fb1c3SPekka Enberg 
5348cf3877SPekka Enberg static inline bool host_ptr_in_ram(struct kvm *self, void *p)
5448cf3877SPekka Enberg {
5548cf3877SPekka Enberg 	return self->ram_start <= p && p < (self->ram_start + self->ram_size);
5648cf3877SPekka Enberg }
5748cf3877SPekka Enberg 
586753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset)
596753ed2fSPekka Enberg {
606753ed2fSPekka Enberg 	return ((uint32_t)selector << 4) + (uint32_t) offset;
616753ed2fSPekka Enberg }
626753ed2fSPekka Enberg 
636753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset)
64ae1fae34SPekka Enberg {
65ae1fae34SPekka Enberg 	return self->ram_start + offset;
66ae1fae34SPekka Enberg }
67ae1fae34SPekka Enberg 
686753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset)
696753ed2fSPekka Enberg {
706753ed2fSPekka Enberg 	unsigned long flat = segment_to_flat(selector, offset);
716753ed2fSPekka Enberg 
726753ed2fSPekka Enberg 	return guest_flat_to_host(self, flat);
736753ed2fSPekka Enberg }
746753ed2fSPekka Enberg 
75ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
76b8f6afcdSPekka Enberg {
7728fa19c0SPekka Enberg 	int ret;
78b8f6afcdSPekka Enberg 
7973ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
804076b041SPekka Enberg 	if (ret < 0)
814076b041SPekka Enberg 		return false;
824076b041SPekka Enberg 
834076b041SPekka Enberg 	return ret;
844076b041SPekka Enberg }
854076b041SPekka Enberg 
864076b041SPekka Enberg static struct kvm *kvm__new(void)
874076b041SPekka Enberg {
884076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
894076b041SPekka Enberg 
904076b041SPekka Enberg 	if (!self)
914076b041SPekka Enberg 		die("out of memory");
924076b041SPekka Enberg 
934076b041SPekka Enberg 	return self;
944076b041SPekka Enberg }
954076b041SPekka Enberg 
969ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
979ef4c68eSPekka Enberg {
989ef4c68eSPekka Enberg 	free(self->ram_start);
999ef4c68eSPekka Enberg 	free(self);
1009ef4c68eSPekka Enberg }
1019ef4c68eSPekka Enberg 
102ae1fae34SPekka Enberg struct kvm *kvm__init(void)
1034076b041SPekka Enberg {
1042b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1059687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
1064076b041SPekka Enberg 	struct kvm *self;
1070d1f17ecSPekka Enberg 	long page_size;
1081f9cff23SPekka Enberg 	int mmap_size;
1094076b041SPekka Enberg 	int ret;
1104076b041SPekka Enberg 
1114076b041SPekka Enberg 	self = kvm__new();
1124076b041SPekka Enberg 
11373ac60e6SPekka Enberg 	self->sys_fd = open("/dev/kvm", O_RDWR);
11473ac60e6SPekka Enberg 	if (self->sys_fd < 0)
115f5ab5f67SPekka Enberg 		die_perror("open");
116b8f6afcdSPekka Enberg 
11773ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1186c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
119f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1206c7d8514SPekka Enberg 
12173ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
12273ac60e6SPekka Enberg 	if (self->vm_fd < 0)
123f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
12428fa19c0SPekka Enberg 
1259687927dSAsias He 	if (!kvm__supports_extension(self, KVM_CAP_COALESCED_MMIO))
1269687927dSAsias He 		die("KVM_CAP_COALESCED_MMIO is not supported");
1279687927dSAsias He 
1289687927dSAsias He 	if (!kvm__supports_extension(self, KVM_CAP_SET_TSS_ADDR))
1299687927dSAsias He 		die("KVM_CAP_SET_TSS_ADDR is not supported");
1309687927dSAsias He 
1319687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
1329687927dSAsias He 	if (ret < 0)
1339687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
1349687927dSAsias He 
1359687927dSAsias He 	if (!kvm__supports_extension(self, KVM_CAP_PIT2))
1369687927dSAsias He 		die("KVM_CAP_PIT2 is not supported");
1379687927dSAsias He 
1389687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config);
1399687927dSAsias He 	if (ret < 0)
1409687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
1419687927dSAsias He 
1424076b041SPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_USER_MEMORY))
143f5ab5f67SPekka Enberg 		die("KVM_CAP_USER_MEMORY is not supported");
1442da26a59SPekka Enberg 
1450d1f17ecSPekka Enberg 	self->ram_size		= 64UL * 1024UL * 1024UL;
1460d1f17ecSPekka Enberg 
1470d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
1480d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
1490d1f17ecSPekka Enberg 		die("out of memory");
1500d1f17ecSPekka Enberg 
1512b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
1522b0e3342SPekka Enberg 		.slot			= 0,
1532b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
1540d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
1550d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
1562b0e3342SPekka Enberg 	};
1572b0e3342SPekka Enberg 
158b6e68186SAsias He 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
1592b0e3342SPekka Enberg 	if (ret < 0)
160f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
1612b0e3342SPekka Enberg 
1629687927dSAsias He 	if (!kvm__supports_extension(self, KVM_CAP_IRQ_ROUTING))
1639687927dSAsias He 		die("KVM_CAP_IRQ_ROUTING is not supported");
164895c2fefSPekka Enberg 
1659687927dSAsias He 	if (!kvm__supports_extension(self, KVM_CAP_IRQCHIP))
1669687927dSAsias He 		die("KVM_CAP_IRQCHIP is not supported");
1679687927dSAsias He 
1689687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP);
169895c2fefSPekka Enberg 	if (ret < 0)
1709687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
1719687927dSAsias He 
1729687927dSAsias He 	if (!kvm__supports_extension(self, KVM_CAP_IRQ_INJECT_STATUS))
1739687927dSAsias He 		die("KVM_KVM_CAP_IRQ_INJECT_STATUS is not supported");
174895c2fefSPekka Enberg 
17573ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
1762b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
177f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
1782b0e3342SPekka Enberg 
1791f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
1801f9cff23SPekka Enberg 	if (mmap_size < 0)
181f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
1821f9cff23SPekka Enberg 
1831f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
1841f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
1851f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
1861f9cff23SPekka Enberg 
1874076b041SPekka Enberg 	return self;
1884076b041SPekka Enberg }
1894076b041SPekka Enberg 
190ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
191aee6632eSPekka Enberg {
192aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
193aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
194aee6632eSPekka Enberg 	};
195aee6632eSPekka Enberg 
196aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
197b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
198aee6632eSPekka Enberg }
199aee6632eSPekka Enberg 
2005f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
201b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
202dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
2032dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
2042dd4a4edSCyrill Gorcunov 
2052dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED	0x202
206a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
207009b0758SPekka Enberg 
208edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
209009b0758SPekka Enberg {
210009b0758SPekka Enberg 	void *p;
211009b0758SPekka Enberg 	int nr;
212009b0758SPekka Enberg 
213009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
214009b0758SPekka Enberg 		die_perror("lseek");
215009b0758SPekka Enberg 
2166753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
217009b0758SPekka Enberg 
218009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
219009b0758SPekka Enberg 		p += nr;
220009b0758SPekka Enberg 
221dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
222edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
223dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
224edc8a14dSPekka Enberg 
2257fb218bdSPekka Enberg 	return true;
226009b0758SPekka Enberg }
227009b0758SPekka Enberg 
2287fb218bdSPekka Enberg /*
2297fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
2307fb218bdSPekka Enberg  * default.
2317fb218bdSPekka Enberg  */
2327fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
233ae1fae34SPekka Enberg 
234ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
235ae1fae34SPekka Enberg 
23610943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS		4
23710943d14SPekka Enberg 
2386d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline)
239ae1fae34SPekka Enberg {
240bc75b0aeSCyrill Gorcunov 	struct real_intr_desc intr;
24122489bb0SCyrill Gorcunov 	struct boot_params boot;
2424b62331fSPekka Enberg 	unsigned long setup_sects;
243305d9054SCyrill Gorcunov 	unsigned int intr_addr;
2442dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
2457fb218bdSPekka Enberg 	ssize_t setup_size;
24622489bb0SCyrill Gorcunov 	void *p;
247ae1fae34SPekka Enberg 	int nr;
248ae1fae34SPekka Enberg 
2495d67eaf6SPekka Enberg 	/*
2505d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2515d67eaf6SPekka Enberg 	 * memory layout.
2525d67eaf6SPekka Enberg 	 */
2535d67eaf6SPekka Enberg 
254009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
255009b0758SPekka Enberg 		die_perror("lseek");
256009b0758SPekka Enberg 
257ae1fae34SPekka Enberg 	read(fd, &boot, sizeof(boot));
258ae1fae34SPekka Enberg 
259ae1fae34SPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0)
2607fb218bdSPekka Enberg 		return false;
261ae1fae34SPekka Enberg 
2622dd4a4edSCyrill Gorcunov 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) {
263ad681038SCyrill Gorcunov 		warning("Too old kernel");
264ad681038SCyrill Gorcunov 		return false;
265ad681038SCyrill Gorcunov 	}
266ad681038SCyrill Gorcunov 
267e93ab78aSPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
268e93ab78aSPekka Enberg 		die_perror("lseek");
269e93ab78aSPekka Enberg 
2704cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
2714cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
27210943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
27310943d14SPekka Enberg 
27454d4a626SPekka Enberg 	setup_size = setup_sects << 9;
2756753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
276ae1fae34SPekka Enberg 
2777fb218bdSPekka Enberg 	if (read(fd, p, setup_size) != setup_size)
2787fb218bdSPekka Enberg 		die_perror("read");
2797fb218bdSPekka Enberg 
2806753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
281ae1fae34SPekka Enberg 
282ae1fae34SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
283ae1fae34SPekka Enberg 		p += nr;
284ae1fae34SPekka Enberg 
285a43f6460SCyrill Gorcunov 	p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET);
286debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
287debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
288debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
289debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
290ad681038SCyrill Gorcunov 
2912dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
2922dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
293debcfac0SCyrill Gorcunov 	}
294debcfac0SCyrill Gorcunov 
295a43f6460SCyrill Gorcunov #define hdr_offset(member)			\
296a43f6460SCyrill Gorcunov 	offsetof(struct boot_params, hdr) +	\
297a43f6460SCyrill Gorcunov 	offsetof(struct setup_header, member)
298a43f6460SCyrill Gorcunov #define guest_hdr(kvm, member)			\
299a43f6460SCyrill Gorcunov 	guest_real_to_host(kvm,			\
300a43f6460SCyrill Gorcunov 		BOOT_LOADER_SELECTOR,		\
301a43f6460SCyrill Gorcunov 		hdr_offset(member))
302a43f6460SCyrill Gorcunov 
303a43f6460SCyrill Gorcunov 	/* some fields in guest header have to be updated */
304a43f6460SCyrill Gorcunov 	p = guest_hdr(self, cmd_line_ptr);
305a43f6460SCyrill Gorcunov 	*(uint32_t *)p = BOOT_CMDLINE_OFFSET;
306a43f6460SCyrill Gorcunov 
307a43f6460SCyrill Gorcunov 	p = guest_hdr(self, type_of_loader);
308a43f6460SCyrill Gorcunov 	*(uint8_t *)p = 0xff;
309a43f6460SCyrill Gorcunov 
310a43f6460SCyrill Gorcunov 	p = guest_hdr(self, heap_end_ptr);
311a43f6460SCyrill Gorcunov 	*(uint16_t *)p = 0xfe00;
312a43f6460SCyrill Gorcunov 
313a43f6460SCyrill Gorcunov 	p = guest_hdr(self, loadflags);
314a43f6460SCyrill Gorcunov 	*(uint8_t *)p |= CAN_USE_HEAP;
315a43f6460SCyrill Gorcunov 
316dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
317edc8a14dSPekka Enberg 	/*
318edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
319edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
320edc8a14dSPekka Enberg 	 */
321edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
322dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
323edc8a14dSPekka Enberg 
324ea684828SCyrill Gorcunov 	/*
32522489bb0SCyrill Gorcunov 	 * Setup a *fake* real mode vector table, it has only
32622489bb0SCyrill Gorcunov 	 * one real hadler which does just iret
32722489bb0SCyrill Gorcunov 	 *
328305d9054SCyrill Gorcunov 	 * This is where the BIOS lives -- BDA area
329ea684828SCyrill Gorcunov 	 */
330305d9054SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + 0, 16);
331305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
3328b8fb6c7SCyrill Gorcunov 	memcpy(p, intfake, intfake_end - intfake);
333bc75b0aeSCyrill Gorcunov 	intr = (struct real_intr_desc) {
334305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
33522489bb0SCyrill Gorcunov 		.offset		= 0,
336ea684828SCyrill Gorcunov 	};
337bc75b0aeSCyrill Gorcunov 	interrupt_table__setup(&self->interrupt_table, &intr);
338305d9054SCyrill Gorcunov 
3398b8fb6c7SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + (intfake_end - intfake), 16);
340305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
3418b8fb6c7SCyrill Gorcunov 	memcpy(p, int10, int10_end - int10);
342305d9054SCyrill Gorcunov 	intr = (struct real_intr_desc) {
343305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
344305d9054SCyrill Gorcunov 		.offset		= 0,
345305d9054SCyrill Gorcunov 	};
346305d9054SCyrill Gorcunov 	interrupt_table__set(&self->interrupt_table, &intr, 0x10);
347305d9054SCyrill Gorcunov 
348305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, 0);
349bc75b0aeSCyrill Gorcunov 	interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE);
350ea684828SCyrill Gorcunov 
3517fb218bdSPekka Enberg 	return true;
352ae1fae34SPekka Enberg }
353ae1fae34SPekka Enberg 
3546d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
3556d1f350dSCyrill Gorcunov 			const char *kernel_cmdline)
356ae1fae34SPekka Enberg {
3577fb218bdSPekka Enberg 	bool ret;
358ae1fae34SPekka Enberg 	int fd;
359ae1fae34SPekka Enberg 
360ae1fae34SPekka Enberg 	fd = open(kernel_filename, O_RDONLY);
361ae1fae34SPekka Enberg 	if (fd < 0)
362ae1fae34SPekka Enberg 		die("unable to open kernel");
363ae1fae34SPekka Enberg 
3646d1f350dSCyrill Gorcunov 	ret = load_bzimage(kvm, fd, kernel_cmdline);
365009b0758SPekka Enberg 	if (ret)
366009b0758SPekka Enberg 		goto found_kernel;
367ae1fae34SPekka Enberg 
368009b0758SPekka Enberg 	ret = load_flat_binary(kvm, fd);
369009b0758SPekka Enberg 	if (ret)
370009b0758SPekka Enberg 		goto found_kernel;
371009b0758SPekka Enberg 
372009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
373009b0758SPekka Enberg 
374009b0758SPekka Enberg found_kernel:
375ae1fae34SPekka Enberg 	return ret;
376ae1fae34SPekka Enberg }
377ae1fae34SPekka Enberg 
37806e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
37906e41eeaSPekka Enberg {
38006e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
38106e41eeaSPekka Enberg 
38206e41eeaSPekka Enberg 	return ip - (cs << 4);
38306e41eeaSPekka Enberg }
38406e41eeaSPekka Enberg 
385f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self)
386f01944c8SPekka Enberg {
387f01944c8SPekka Enberg 	return self->sregs.cr0 & 0x01;
388f01944c8SPekka Enberg }
389f01944c8SPekka Enberg 
390f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
39106e41eeaSPekka Enberg {
392f326512aSPekka Enberg 	uint64_t cs;
393f326512aSPekka Enberg 
394f326512aSPekka Enberg 	/*
395f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
396f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
397f326512aSPekka Enberg 	 */
398f01944c8SPekka Enberg 	if (is_in_protected_mode(self))
399f326512aSPekka Enberg 		return ip;
400f326512aSPekka Enberg 
401f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
40206e41eeaSPekka Enberg 
40306e41eeaSPekka Enberg 	return ip + (cs << 4);
40406e41eeaSPekka Enberg }
40506e41eeaSPekka Enberg 
406dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
407dbdb74c2SPekka Enberg {
408dbdb74c2SPekka Enberg 	/*
409dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
410dbdb74c2SPekka Enberg 	 */
411dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
412dbdb74c2SPekka Enberg }
413dbdb74c2SPekka Enberg 
41453d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs)
41553d48714SPekka Enberg {
41653d48714SPekka Enberg 	struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs));
41753d48714SPekka Enberg 
41853d48714SPekka Enberg 	if (!self)
41953d48714SPekka Enberg 		die("out of memory");
42053d48714SPekka Enberg 
42153d48714SPekka Enberg 	return self;
42253d48714SPekka Enberg }
42353d48714SPekka Enberg 
42453d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER	0x10
42553d48714SPekka Enberg 
42653d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS		0x174
42753d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP		0x175
42853d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP		0x176
42953d48714SPekka Enberg 
43053d48714SPekka Enberg #define MSR_IA32_STAR			0xc0000081
43153d48714SPekka Enberg #define MSR_IA32_LSTAR			0xc0000082
43253d48714SPekka Enberg #define MSR_IA32_CSTAR			0xc0000083
43353d48714SPekka Enberg #define MSR_IA32_FMASK			0xc0000084
43453d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE		0xc0000102
43553d48714SPekka Enberg 
43653d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data)	\
43753d48714SPekka Enberg 	(struct kvm_msr_entry) { .index = _index, .data = _data }
43853d48714SPekka Enberg 
43953d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self)
44053d48714SPekka Enberg {
44153d48714SPekka Enberg 	unsigned long ndx = 0;
44253d48714SPekka Enberg 
44353d48714SPekka Enberg 	self->msrs = kvm_msrs__new(100);
44453d48714SPekka Enberg 
44553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS,	0x0);
44653d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP,	0x0);
44753d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP,	0x0);
4488b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64
44953d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR,		0x0);
45053d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR,		0x0);
45153d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE,	0x0);
45253d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK,		0x0);
45353d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR,		0x0);
45444069a9dSCyrill Gorcunov #endif
45553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER,	0x0);
45653d48714SPekka Enberg 
45753d48714SPekka Enberg 	self->msrs->nmsrs	= ndx;
45853d48714SPekka Enberg 
45953d48714SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0)
46053d48714SPekka Enberg 		die_perror("KVM_SET_MSRS failed");
46153d48714SPekka Enberg }
46253d48714SPekka Enberg 
4633d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self)
4643d78d3a5SPekka Enberg {
4653d78d3a5SPekka Enberg 	self->fpu = (struct kvm_fpu) {
4663d78d3a5SPekka Enberg 		.fcw		= 0x37f,
4673d78d3a5SPekka Enberg 		.mxcsr		= 0x1f80,
4683d78d3a5SPekka Enberg 	};
4693d78d3a5SPekka Enberg 
4703d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
4713d78d3a5SPekka Enberg 		die_perror("KVM_SET_FPU failed");
4723d78d3a5SPekka Enberg }
4733d78d3a5SPekka Enberg 
4743d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self)
4753d78d3a5SPekka Enberg {
4763d78d3a5SPekka Enberg 	self->regs = (struct kvm_regs) {
4773d78d3a5SPekka Enberg 		/* We start the guest in 16-bit real mode  */
4783d78d3a5SPekka Enberg 		.rflags		= 0x0000000000000002ULL,
4793d78d3a5SPekka Enberg 
4803d78d3a5SPekka Enberg 		.rip		= self->boot_ip,
4813d78d3a5SPekka Enberg 		.rsp		= self->boot_sp,
4823d78d3a5SPekka Enberg 		.rbp		= self->boot_sp,
4833d78d3a5SPekka Enberg 	};
4843d78d3a5SPekka Enberg 
4853d78d3a5SPekka Enberg 	if (self->regs.rip > USHRT_MAX)
4863d78d3a5SPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
4873d78d3a5SPekka Enberg 
4883d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
4893d78d3a5SPekka Enberg 		die_perror("KVM_SET_REGS failed");
4903d78d3a5SPekka Enberg }
4913d78d3a5SPekka Enberg 
4923d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self)
493ae1fae34SPekka Enberg {
49453602077SPekka Enberg 
495*0ed849e6SAsias He 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
496*0ed849e6SAsias He 		die_perror("KVM_GET_SREGS failed");
497*0ed849e6SAsias He 	self->sregs.cs.selector = self->boot_selector;
498*0ed849e6SAsias He 	self->sregs.cs.base = selector_to_base(self->boot_selector);
49953602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
50053602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
5013d78d3a5SPekka Enberg }
50206e41eeaSPekka Enberg 
5033d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self)
5043d78d3a5SPekka Enberg {
5053d78d3a5SPekka Enberg 	kvm__setup_sregs(self);
506dbdb74c2SPekka Enberg 
5073d78d3a5SPekka Enberg 	kvm__setup_regs(self);
50806e41eeaSPekka Enberg 
5093d78d3a5SPekka Enberg 	kvm__setup_fpu(self);
51053d48714SPekka Enberg 
51153d48714SPekka Enberg 	kvm__setup_msrs(self);
512ae1fae34SPekka Enberg }
513ae1fae34SPekka Enberg 
514ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
515ae1fae34SPekka Enberg {
516ae1fae34SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0)
517ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
518ae1fae34SPekka Enberg }
519ae1fae34SPekka Enberg 
5208351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable)
5218351aaddSPekka Enberg {
5228351aaddSPekka Enberg 	printf(" %s                 %016" PRIx64 "  %08" PRIx16 "\n",
5238351aaddSPekka Enberg 		name, (uint64_t) dtable->base, (uint16_t) dtable->limit);
5248351aaddSPekka Enberg }
5258351aaddSPekka Enberg 
52653602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
52753602077SPekka Enberg {
528ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
52953602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
530ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
53153602077SPekka Enberg }
53253602077SPekka Enberg 
533ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
5347118d2caSPekka Enberg {
53553602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
53653602077SPekka Enberg 	unsigned long cr4, cr8;
5377118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
5387118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
5397118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
5407118d2caSPekka Enberg 	unsigned long r10, r11, r12;
5417118d2caSPekka Enberg 	unsigned long r13, r14, r15;
5427118d2caSPekka Enberg 	unsigned long rip, rsp;
54353602077SPekka Enberg 	struct kvm_sregs sregs;
544a2fe6199SPekka Enberg 	unsigned long rflags;
5457118d2caSPekka Enberg 	struct kvm_regs regs;
546ce5e0ecbSPekka Enberg 	int i;
5477118d2caSPekka Enberg 
5487118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
5497118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
5507118d2caSPekka Enberg 
551a2fe6199SPekka Enberg 	rflags = regs.rflags;
552a2fe6199SPekka Enberg 
5537118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
5547118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
5557118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
5567118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
5577118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
5587118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
5597118d2caSPekka Enberg 
5607118d2caSPekka Enberg 	printf("Registers:\n");
5612177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
562ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
5637118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
5647118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
5657118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
5667118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
56753602077SPekka Enberg 
56853602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
56953602077SPekka Enberg 		die("KVM_GET_REGS failed");
57053602077SPekka Enberg 
57153602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
57253602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
57353602077SPekka Enberg 
57453602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
57553602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
576ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
577ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
57853602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
57953602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
58053602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
58153602077SPekka Enberg 	print_segment("es ", &sregs.es);
58253602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
58353602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
584ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
585ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
5868351aaddSPekka Enberg 	print_dtable("gdt", &sregs.gdt);
5878351aaddSPekka Enberg 	print_dtable("idt", &sregs.idt);
5880f9983b2SCyrill Gorcunov 	printf(" [ efer: %016" PRIx64 "  apic base: %016" PRIx64 "  nmi: %s ]\n",
5890f9983b2SCyrill Gorcunov 		(uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
5902049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
591ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
592ce5e0ecbSPekka Enberg 	printf(" ");
593ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
5940f9983b2SCyrill Gorcunov 		printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]);
595ce5e0ecbSPekka Enberg 	printf("\n");
5967118d2caSPekka Enberg }
5977118d2caSPekka Enberg 
598ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
5996f10be05SPekka Enberg {
6006f10be05SPekka Enberg 	unsigned int code_bytes = 64;
6016f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
6026f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
6036f10be05SPekka Enberg 	unsigned char c;
604ae1fae34SPekka Enberg 	unsigned int i;
6056f10be05SPekka Enberg 	uint8_t *ip;
6066f10be05SPekka Enberg 
6072a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
6082a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
6092a601aafSPekka Enberg 
6102a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
6112a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
6122a601aafSPekka Enberg 
613f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
6146f10be05SPekka Enberg 
6156f10be05SPekka Enberg 	printf("Code: ");
6166f10be05SPekka Enberg 
6176f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
61848cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, ip))
61948cf3877SPekka Enberg 			break;
62048cf3877SPekka Enberg 
6216e8abc38SPekka Enberg 		c = *ip;
6226e8abc38SPekka Enberg 
623f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
6246f10be05SPekka Enberg 			printf("<%02x> ", c);
6256f10be05SPekka Enberg 		else
6266f10be05SPekka Enberg 			printf("%02x ", c);
6276f10be05SPekka Enberg 	}
6286f10be05SPekka Enberg 
6296f10be05SPekka Enberg 	printf("\n");
6302a7d39a4SPekka Enberg 
6312a7d39a4SPekka Enberg 	printf("Stack:\n");
6322a7d39a4SPekka Enberg 	kvm__dump_mem(self, self->regs.rsp, 32);
6336f10be05SPekka Enberg }
634090f898eSCyrill Gorcunov 
635f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self)
636f01944c8SPekka Enberg {
637f01944c8SPekka Enberg 	uint64_t *pte1;
638f01944c8SPekka Enberg 	uint64_t *pte2;
639f01944c8SPekka Enberg 	uint64_t *pte3;
640f01944c8SPekka Enberg 	uint64_t *pte4;
641f01944c8SPekka Enberg 
642f01944c8SPekka Enberg 	if (!is_in_protected_mode(self))
643f01944c8SPekka Enberg 		return;
644f01944c8SPekka Enberg 
645f01944c8SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
646f01944c8SPekka Enberg 		die("KVM_GET_SREGS failed");
647f01944c8SPekka Enberg 
648f01944c8SPekka Enberg 	pte4	= guest_flat_to_host(self, self->sregs.cr3);
64948cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte4))
65048cf3877SPekka Enberg 		return;
65148cf3877SPekka Enberg 
652f01944c8SPekka Enberg 	pte3	= guest_flat_to_host(self, (*pte4 & ~0xfff));
65348cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte3))
65448cf3877SPekka Enberg 		return;
65548cf3877SPekka Enberg 
656f01944c8SPekka Enberg 	pte2	= guest_flat_to_host(self, (*pte3 & ~0xfff));
65748cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte2))
65848cf3877SPekka Enberg 		return;
65948cf3877SPekka Enberg 
660f01944c8SPekka Enberg 	pte1	= guest_flat_to_host(self, (*pte2 & ~0xfff));
66148cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte1))
66248cf3877SPekka Enberg 		return;
663f01944c8SPekka Enberg 
664f01944c8SPekka Enberg 	printf("Page Tables:\n");
665f01944c8SPekka Enberg 	if (*pte2 & (1 << 7))
6660f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64
6670f9983b2SCyrill Gorcunov 			"   pte2: %016" PRIx64 "\n",
6680f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2);
669f01944c8SPekka Enberg 	else
6700f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64 "   pte2: %016"
6710f9983b2SCyrill Gorcunov 			PRIx64 "   pte1: %016" PRIx64 "\n",
6720f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2, *pte1);
673f01944c8SPekka Enberg }
674f01944c8SPekka Enberg 
675090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
676090f898eSCyrill Gorcunov {
677090f898eSCyrill Gorcunov 	unsigned char *p;
678090f898eSCyrill Gorcunov 	unsigned long n;
679090f898eSCyrill Gorcunov 
680090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
681090f898eSCyrill Gorcunov 	if (!size)
682090f898eSCyrill Gorcunov 		return;
683090f898eSCyrill Gorcunov 
6842a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
685090f898eSCyrill Gorcunov 
68648cf3877SPekka Enberg 	for (n = 0; n < size; n+=8) {
68748cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
68848cf3877SPekka Enberg 			break;
68948cf3877SPekka Enberg 
690090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
691090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
692090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
693090f898eSCyrill Gorcunov 	}
69448cf3877SPekka Enberg }
695