1ae1fae34SPekka Enberg #include "kvm/kvm.h" 2ae1fae34SPekka Enberg 3eda03319SPekka Enberg #include "kvm/interrupt.h" 4c78b8713SAsias He #include "kvm/cpufeature.h" 52f3976eeSPekka Enberg #include "kvm/e820.h" 6f3150089SPekka Enberg #include "kvm/util.h" 7eda03319SPekka Enberg 86c7d8514SPekka Enberg #include <linux/kvm.h> 9f5ab5f67SPekka Enberg 10f5ab5f67SPekka Enberg #include <asm/bootparam.h> 11f5ab5f67SPekka Enberg 12ae1fae34SPekka Enberg #include <sys/ioctl.h> 131f9cff23SPekka Enberg #include <inttypes.h> 141f9cff23SPekka Enberg #include <sys/mman.h> 152da26a59SPekka Enberg #include <stdbool.h> 166e5e8b8dSPekka Enberg #include <assert.h> 1706e41eeaSPekka Enberg #include <limits.h> 18f5ab5f67SPekka Enberg #include <stdarg.h> 19b8f6afcdSPekka Enberg #include <stdlib.h> 20f5ab5f67SPekka Enberg #include <string.h> 210d1f17ecSPekka Enberg #include <unistd.h> 221f9cff23SPekka Enberg #include <stdio.h> 23b8f6afcdSPekka Enberg #include <fcntl.h> 24b8f6afcdSPekka Enberg 251f9cff23SPekka Enberg /* 261f9cff23SPekka Enberg * Compatibility code. Remove this when we move to tools/kvm. 271f9cff23SPekka Enberg */ 281f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR 291f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR 17 301f9cff23SPekka Enberg #endif 311f9cff23SPekka Enberg 32ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason 330d1f17ecSPekka Enberg 34ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = { 35ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN), 36ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION), 37ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO), 38ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL), 39ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG), 40ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT), 41ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO), 42ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN), 43ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN), 44ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY), 45ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR), 46ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR), 47ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS), 48ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC), 49ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET), 50ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR), 51ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI), 52ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR), 539b1fb1c3SPekka Enberg }; 549b1fb1c3SPekka Enberg 5555e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext) \ 5655e19624SCyrill Gorcunov .name = #ext, \ 5755e19624SCyrill Gorcunov .code = ext 5855e19624SCyrill Gorcunov 5955e19624SCyrill Gorcunov struct { 6055e19624SCyrill Gorcunov const char *name; 6155e19624SCyrill Gorcunov int code; 6255e19624SCyrill Gorcunov } kvm_req_ext[] = { 6355e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) }, 6455e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) }, 6555e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_PIT2) }, 6655e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) }, 6755e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) }, 6855e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) }, 697c0ec28fSCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_HLT) }, 7055e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) }, 71d38ad31aSCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) }, 7255e19624SCyrill Gorcunov }; 7355e19624SCyrill Gorcunov 74ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension) 75b8f6afcdSPekka Enberg { 7628fa19c0SPekka Enberg int ret; 77b8f6afcdSPekka Enberg 7873ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension); 794076b041SPekka Enberg if (ret < 0) 804076b041SPekka Enberg return false; 814076b041SPekka Enberg 824076b041SPekka Enberg return ret; 834076b041SPekka Enberg } 844076b041SPekka Enberg 8555e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self) 8655e19624SCyrill Gorcunov { 8755e19624SCyrill Gorcunov unsigned int i; 8855e19624SCyrill Gorcunov 8955e19624SCyrill Gorcunov for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) { 9055e19624SCyrill Gorcunov if (!kvm__supports_extension(self, kvm_req_ext[i].code)) { 9155e19624SCyrill Gorcunov error("Unsuppored KVM extension detected: %s", 9255e19624SCyrill Gorcunov kvm_req_ext[i].name); 9355e19624SCyrill Gorcunov return (int)-i; 9455e19624SCyrill Gorcunov } 9555e19624SCyrill Gorcunov } 9655e19624SCyrill Gorcunov 9755e19624SCyrill Gorcunov return 0; 9855e19624SCyrill Gorcunov } 9955e19624SCyrill Gorcunov 1004076b041SPekka Enberg static struct kvm *kvm__new(void) 1014076b041SPekka Enberg { 1024076b041SPekka Enberg struct kvm *self = calloc(1, sizeof *self); 1034076b041SPekka Enberg 1044076b041SPekka Enberg if (!self) 1054076b041SPekka Enberg die("out of memory"); 1064076b041SPekka Enberg 1074076b041SPekka Enberg return self; 1084076b041SPekka Enberg } 1094076b041SPekka Enberg 1109ef4c68eSPekka Enberg void kvm__delete(struct kvm *self) 1119ef4c68eSPekka Enberg { 1129ef4c68eSPekka Enberg free(self->ram_start); 1139ef4c68eSPekka Enberg free(self); 1149ef4c68eSPekka Enberg } 1159ef4c68eSPekka Enberg 116c78b8713SAsias He static bool kvm__cpu_supports_vm(void) 117c78b8713SAsias He { 118c78b8713SAsias He struct cpuid_regs regs; 119831fbf23SPekka Enberg uint32_t eax_base; 120831fbf23SPekka Enberg int feature; 121c78b8713SAsias He 122c78b8713SAsias He regs = (struct cpuid_regs) { 123831fbf23SPekka Enberg .eax = 0x00, 124c78b8713SAsias He }; 125c78b8713SAsias He host_cpuid(®s); 126c78b8713SAsias He 127ae87afbfSCyrill Gorcunov switch (regs.ebx) { 128ae87afbfSCyrill Gorcunov case CPUID_VENDOR_INTEL_1: 129831fbf23SPekka Enberg eax_base = 0x00; 130831fbf23SPekka Enberg feature = KVM__X86_FEATURE_VMX; 131ae87afbfSCyrill Gorcunov break; 13234649df9SPekka Enberg 133ae87afbfSCyrill Gorcunov case CPUID_VENDOR_AMD_1: 134831fbf23SPekka Enberg eax_base = 0x80000000; 135831fbf23SPekka Enberg feature = KVM__X86_FEATURE_SVM; 136ae87afbfSCyrill Gorcunov break; 13734649df9SPekka Enberg 13834649df9SPekka Enberg default: 13934649df9SPekka Enberg return false; 140ae87afbfSCyrill Gorcunov } 141ae87afbfSCyrill Gorcunov 142831fbf23SPekka Enberg regs = (struct cpuid_regs) { 143831fbf23SPekka Enberg .eax = eax_base, 144831fbf23SPekka Enberg }; 145831fbf23SPekka Enberg host_cpuid(®s); 146831fbf23SPekka Enberg 147831fbf23SPekka Enberg if (regs.eax < eax_base + 0x01) 148831fbf23SPekka Enberg return false; 149831fbf23SPekka Enberg 150831fbf23SPekka Enberg regs = (struct cpuid_regs) { 151831fbf23SPekka Enberg .eax = eax_base + 0x01 152831fbf23SPekka Enberg }; 153831fbf23SPekka Enberg host_cpuid(®s); 154831fbf23SPekka Enberg 155831fbf23SPekka Enberg return regs.ecx & (1 << feature); 156c78b8713SAsias He } 157c78b8713SAsias He 158192a99d1SCyrill Gorcunov struct kvm *kvm__init(const char *kvm_dev, unsigned long ram_size) 1594076b041SPekka Enberg { 1602b0e3342SPekka Enberg struct kvm_userspace_memory_region mem; 1619687927dSAsias He struct kvm_pit_config pit_config = { .flags = 0, }; 1624076b041SPekka Enberg struct kvm *self; 1630d1f17ecSPekka Enberg long page_size; 1641f9cff23SPekka Enberg int mmap_size; 1654076b041SPekka Enberg int ret; 1664076b041SPekka Enberg 167c78b8713SAsias He if (!kvm__cpu_supports_vm()) 168c78b8713SAsias He die("Your CPU does not support hardware virtualization"); 169c78b8713SAsias He 1704076b041SPekka Enberg self = kvm__new(); 1714076b041SPekka Enberg 1726d7c36ceSPekka Enberg self->sys_fd = open(kvm_dev, O_RDWR); 1736d7c36ceSPekka Enberg if (self->sys_fd < 0) { 1746d7c36ceSPekka Enberg if (errno == ENOENT) 1756d7c36ceSPekka Enberg die("'%s' not found. Please make sure you have CONFIG_KVM enabled.", kvm_dev); 1766d7c36ceSPekka Enberg 177f5ab5f67SPekka Enberg die_perror("open"); 1786d7c36ceSPekka Enberg } 179b8f6afcdSPekka Enberg 18073ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0); 1816c7d8514SPekka Enberg if (ret != KVM_API_VERSION) 182f5ab5f67SPekka Enberg die_perror("KVM_API_VERSION ioctl"); 1836c7d8514SPekka Enberg 18473ac60e6SPekka Enberg self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0); 18573ac60e6SPekka Enberg if (self->vm_fd < 0) 186f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VM ioctl"); 18728fa19c0SPekka Enberg 18855e19624SCyrill Gorcunov if (kvm__check_extensions(self)) 18955e19624SCyrill Gorcunov die("A required KVM extention is not supported by OS"); 1909687927dSAsias He 1919687927dSAsias He ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000); 1929687927dSAsias He if (ret < 0) 1939687927dSAsias He die_perror("KVM_SET_TSS_ADDR ioctl"); 1949687927dSAsias He 1959687927dSAsias He ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config); 1969687927dSAsias He if (ret < 0) 1979687927dSAsias He die_perror("KVM_CREATE_PIT2 ioctl"); 1989687927dSAsias He 199192a99d1SCyrill Gorcunov self->ram_size = ram_size; 2000d1f17ecSPekka Enberg 2010d1f17ecSPekka Enberg page_size = sysconf(_SC_PAGESIZE); 2020d1f17ecSPekka Enberg if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0) 2030d1f17ecSPekka Enberg die("out of memory"); 2040d1f17ecSPekka Enberg 2052b0e3342SPekka Enberg mem = (struct kvm_userspace_memory_region) { 2062b0e3342SPekka Enberg .slot = 0, 2072b0e3342SPekka Enberg .guest_phys_addr = 0x0UL, 2080d1f17ecSPekka Enberg .memory_size = self->ram_size, 2090d1f17ecSPekka Enberg .userspace_addr = (unsigned long) self->ram_start, 2102b0e3342SPekka Enberg }; 2112b0e3342SPekka Enberg 212b6e68186SAsias He ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem); 2132b0e3342SPekka Enberg if (ret < 0) 214f5ab5f67SPekka Enberg die_perror("KVM_SET_USER_MEMORY_REGION ioctl"); 2152b0e3342SPekka Enberg 2169687927dSAsias He ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP); 217895c2fefSPekka Enberg if (ret < 0) 2189687927dSAsias He die_perror("KVM_CREATE_IRQCHIP ioctl"); 2199687927dSAsias He 22073ac60e6SPekka Enberg self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0); 2212b0e3342SPekka Enberg if (self->vcpu_fd < 0) 222f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VCPU ioctl"); 2232b0e3342SPekka Enberg 2241f9cff23SPekka Enberg mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0); 2251f9cff23SPekka Enberg if (mmap_size < 0) 226f5ab5f67SPekka Enberg die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl"); 2271f9cff23SPekka Enberg 2281f9cff23SPekka Enberg self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0); 2291f9cff23SPekka Enberg if (self->kvm_run == MAP_FAILED) 2301f9cff23SPekka Enberg die("unable to mmap vcpu fd"); 2311f9cff23SPekka Enberg 2324076b041SPekka Enberg return self; 2334076b041SPekka Enberg } 2344076b041SPekka Enberg 235ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self) 236aee6632eSPekka Enberg { 237aee6632eSPekka Enberg struct kvm_guest_debug debug = { 238aee6632eSPekka Enberg .control = KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP, 239aee6632eSPekka Enberg }; 240aee6632eSPekka Enberg 241aee6632eSPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0) 242b625d4b6SCyrill Gorcunov warning("KVM_SET_GUEST_DEBUG failed"); 243aee6632eSPekka Enberg } 244aee6632eSPekka Enberg 2455f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR 0x1000 246b08e9ec4SPekka Enberg #define BOOT_LOADER_IP 0x0000 247dbdb74c2SPekka Enberg #define BOOT_LOADER_SP 0x8000 2482dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET 0x20000 2492dd4a4edSCyrill Gorcunov 2502dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED 0x202 251a43f6460SCyrill Gorcunov #define LOAD_HIGH 0x01 252009b0758SPekka Enberg 253edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd) 254009b0758SPekka Enberg { 255009b0758SPekka Enberg void *p; 256009b0758SPekka Enberg int nr; 257009b0758SPekka Enberg 258009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 259009b0758SPekka Enberg die_perror("lseek"); 260009b0758SPekka Enberg 2616753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 262009b0758SPekka Enberg 263009b0758SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 264009b0758SPekka Enberg p += nr; 265009b0758SPekka Enberg 266dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 267edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP; 268dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 269edc8a14dSPekka Enberg 2707fb218bdSPekka Enberg return true; 271009b0758SPekka Enberg } 272009b0758SPekka Enberg 2737fb218bdSPekka Enberg /* 2747fb218bdSPekka Enberg * The protected mode kernel part of a modern bzImage is loaded at 1 MB by 2757fb218bdSPekka Enberg * default. 2767fb218bdSPekka Enberg */ 2777fb218bdSPekka Enberg #define BZ_KERNEL_START 0x100000UL 278ae1fae34SPekka Enberg 279ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC = "HdrS"; 280ae1fae34SPekka Enberg 28110943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS 4 28210943d14SPekka Enberg 2836d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline) 284ae1fae34SPekka Enberg { 285b9271160SPekka Enberg struct boot_params *kern_boot; 2864b62331fSPekka Enberg unsigned long setup_sects; 287b9271160SPekka Enberg struct boot_params boot; 2882dd4a4edSCyrill Gorcunov size_t cmdline_size; 2897fb218bdSPekka Enberg ssize_t setup_size; 29022489bb0SCyrill Gorcunov void *p; 291ae1fae34SPekka Enberg int nr; 292ae1fae34SPekka Enberg 2935d67eaf6SPekka Enberg /* 2945d67eaf6SPekka Enberg * See Documentation/x86/boot.txt for details no bzImage on-disk and 2955d67eaf6SPekka Enberg * memory layout. 2965d67eaf6SPekka Enberg */ 2975d67eaf6SPekka Enberg 298009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 299009b0758SPekka Enberg die_perror("lseek"); 300009b0758SPekka Enberg 3017ada9b6bSPekka Enberg if (read(fd, &boot, sizeof(boot)) != sizeof(boot)) 302*2346d461SPekka Enberg return false; 303ae1fae34SPekka Enberg 304ae1fae34SPekka Enberg if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0) 3057fb218bdSPekka Enberg return false; 306ae1fae34SPekka Enberg 3072dd4a4edSCyrill Gorcunov if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) { 308ad681038SCyrill Gorcunov warning("Too old kernel"); 309ad681038SCyrill Gorcunov return false; 310ad681038SCyrill Gorcunov } 311ad681038SCyrill Gorcunov 312e93ab78aSPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 313e93ab78aSPekka Enberg die_perror("lseek"); 314e93ab78aSPekka Enberg 3154cf542bbSCyrill Gorcunov if (!boot.hdr.setup_sects) 3164cf542bbSCyrill Gorcunov boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS; 31710943d14SPekka Enberg setup_sects = boot.hdr.setup_sects + 1; 31810943d14SPekka Enberg 31954d4a626SPekka Enberg setup_size = setup_sects << 9; 3206753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 321ae1fae34SPekka Enberg 3227fb218bdSPekka Enberg if (read(fd, p, setup_size) != setup_size) 3237fb218bdSPekka Enberg die_perror("read"); 3247fb218bdSPekka Enberg 3256753ed2fSPekka Enberg p = guest_flat_to_host(self, BZ_KERNEL_START); 326ae1fae34SPekka Enberg 327ae1fae34SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 328ae1fae34SPekka Enberg p += nr; 329ae1fae34SPekka Enberg 330a43f6460SCyrill Gorcunov p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET); 331debcfac0SCyrill Gorcunov if (kernel_cmdline) { 332debcfac0SCyrill Gorcunov cmdline_size = strlen(kernel_cmdline) + 1; 333debcfac0SCyrill Gorcunov if (cmdline_size > boot.hdr.cmdline_size) 334debcfac0SCyrill Gorcunov cmdline_size = boot.hdr.cmdline_size; 335ad681038SCyrill Gorcunov 3362dd4a4edSCyrill Gorcunov memset(p, 0, boot.hdr.cmdline_size); 3372dd4a4edSCyrill Gorcunov memcpy(p, kernel_cmdline, cmdline_size - 1); 338debcfac0SCyrill Gorcunov } 339debcfac0SCyrill Gorcunov 340b9271160SPekka Enberg kern_boot = guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x00); 341a43f6460SCyrill Gorcunov 342b9271160SPekka Enberg kern_boot->hdr.cmd_line_ptr = BOOT_CMDLINE_OFFSET; 343b9271160SPekka Enberg kern_boot->hdr.type_of_loader = 0xff; 344b9271160SPekka Enberg kern_boot->hdr.heap_end_ptr = 0xfe00; 345b9271160SPekka Enberg kern_boot->hdr.loadflags |= CAN_USE_HEAP; 346a43f6460SCyrill Gorcunov 347dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 348edc8a14dSPekka Enberg /* 349edc8a14dSPekka Enberg * The real-mode setup code starts at offset 0x200 of a bzImage. See 350edc8a14dSPekka Enberg * Documentation/x86/boot.txt for details. 351edc8a14dSPekka Enberg */ 352edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP + 0x200; 353dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 354edc8a14dSPekka Enberg 355ea684828SCyrill Gorcunov /* 3569292f776SCyrill Gorcunov * Drum roll, BIOS is coming to live, oh dear... 357ea684828SCyrill Gorcunov */ 3589292f776SCyrill Gorcunov setup_bios(self); 359ea684828SCyrill Gorcunov 3607fb218bdSPekka Enberg return true; 361ae1fae34SPekka Enberg } 362ae1fae34SPekka Enberg 3636d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename, 3646d1f350dSCyrill Gorcunov const char *kernel_cmdline) 365ae1fae34SPekka Enberg { 3667fb218bdSPekka Enberg bool ret; 367ae1fae34SPekka Enberg int fd; 368ae1fae34SPekka Enberg 369ae1fae34SPekka Enberg fd = open(kernel_filename, O_RDONLY); 370ae1fae34SPekka Enberg if (fd < 0) 371ae1fae34SPekka Enberg die("unable to open kernel"); 372ae1fae34SPekka Enberg 3736d1f350dSCyrill Gorcunov ret = load_bzimage(kvm, fd, kernel_cmdline); 374009b0758SPekka Enberg if (ret) 375009b0758SPekka Enberg goto found_kernel; 376ae1fae34SPekka Enberg 377009b0758SPekka Enberg ret = load_flat_binary(kvm, fd); 378009b0758SPekka Enberg if (ret) 379009b0758SPekka Enberg goto found_kernel; 380009b0758SPekka Enberg 381009b0758SPekka Enberg die("%s is not a valid bzImage or flat binary", kernel_filename); 382009b0758SPekka Enberg 383009b0758SPekka Enberg found_kernel: 384ae1fae34SPekka Enberg return ret; 385ae1fae34SPekka Enberg } 386ae1fae34SPekka Enberg 38706e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip) 38806e41eeaSPekka Enberg { 38906e41eeaSPekka Enberg uint64_t cs = self->sregs.cs.selector; 39006e41eeaSPekka Enberg 39106e41eeaSPekka Enberg return ip - (cs << 4); 39206e41eeaSPekka Enberg } 39306e41eeaSPekka Enberg 394f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self) 395f01944c8SPekka Enberg { 396f01944c8SPekka Enberg return self->sregs.cr0 & 0x01; 397f01944c8SPekka Enberg } 398f01944c8SPekka Enberg 399f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip) 40006e41eeaSPekka Enberg { 401f326512aSPekka Enberg uint64_t cs; 402f326512aSPekka Enberg 403f326512aSPekka Enberg /* 404f326512aSPekka Enberg * NOTE! We should take code segment base address into account here. 405f326512aSPekka Enberg * Luckily it's usually zero because Linux uses flat memory model. 406f326512aSPekka Enberg */ 407f01944c8SPekka Enberg if (is_in_protected_mode(self)) 408f326512aSPekka Enberg return ip; 409f326512aSPekka Enberg 410f326512aSPekka Enberg cs = self->sregs.cs.selector; 41106e41eeaSPekka Enberg 41206e41eeaSPekka Enberg return ip + (cs << 4); 41306e41eeaSPekka Enberg } 41406e41eeaSPekka Enberg 415dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector) 416dbdb74c2SPekka Enberg { 417dbdb74c2SPekka Enberg /* 418dbdb74c2SPekka Enberg * KVM on Intel requires 'base' to be 'selector * 16' in real mode. 419dbdb74c2SPekka Enberg */ 420dbdb74c2SPekka Enberg return (uint32_t)selector * 16; 421dbdb74c2SPekka Enberg } 422dbdb74c2SPekka Enberg 42353d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs) 42453d48714SPekka Enberg { 42553d48714SPekka Enberg struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs)); 42653d48714SPekka Enberg 42753d48714SPekka Enberg if (!self) 42853d48714SPekka Enberg die("out of memory"); 42953d48714SPekka Enberg 43053d48714SPekka Enberg return self; 43153d48714SPekka Enberg } 43253d48714SPekka Enberg 43353d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER 0x10 43453d48714SPekka Enberg 43553d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS 0x174 43653d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP 0x175 43753d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP 0x176 43853d48714SPekka Enberg 43953d48714SPekka Enberg #define MSR_IA32_STAR 0xc0000081 44053d48714SPekka Enberg #define MSR_IA32_LSTAR 0xc0000082 44153d48714SPekka Enberg #define MSR_IA32_CSTAR 0xc0000083 44253d48714SPekka Enberg #define MSR_IA32_FMASK 0xc0000084 44353d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE 0xc0000102 44453d48714SPekka Enberg 44553d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data) \ 44653d48714SPekka Enberg (struct kvm_msr_entry) { .index = _index, .data = _data } 44753d48714SPekka Enberg 44853d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self) 44953d48714SPekka Enberg { 45053d48714SPekka Enberg unsigned long ndx = 0; 45153d48714SPekka Enberg 45253d48714SPekka Enberg self->msrs = kvm_msrs__new(100); 45353d48714SPekka Enberg 45453d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS, 0x0); 45553d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP, 0x0); 45653d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP, 0x0); 4578b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64 45853d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR, 0x0); 45953d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR, 0x0); 46053d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE, 0x0); 46153d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK, 0x0); 46253d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR, 0x0); 46344069a9dSCyrill Gorcunov #endif 46453d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER, 0x0); 46553d48714SPekka Enberg 46653d48714SPekka Enberg self->msrs->nmsrs = ndx; 46753d48714SPekka Enberg 46853d48714SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0) 46953d48714SPekka Enberg die_perror("KVM_SET_MSRS failed"); 47053d48714SPekka Enberg } 47153d48714SPekka Enberg 4723d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self) 4733d78d3a5SPekka Enberg { 4743d78d3a5SPekka Enberg self->fpu = (struct kvm_fpu) { 4753d78d3a5SPekka Enberg .fcw = 0x37f, 4763d78d3a5SPekka Enberg .mxcsr = 0x1f80, 4773d78d3a5SPekka Enberg }; 4783d78d3a5SPekka Enberg 4793d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0) 4803d78d3a5SPekka Enberg die_perror("KVM_SET_FPU failed"); 4813d78d3a5SPekka Enberg } 4823d78d3a5SPekka Enberg 4833d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self) 4843d78d3a5SPekka Enberg { 4853d78d3a5SPekka Enberg self->regs = (struct kvm_regs) { 4863d78d3a5SPekka Enberg /* We start the guest in 16-bit real mode */ 4873d78d3a5SPekka Enberg .rflags = 0x0000000000000002ULL, 4883d78d3a5SPekka Enberg 4893d78d3a5SPekka Enberg .rip = self->boot_ip, 4903d78d3a5SPekka Enberg .rsp = self->boot_sp, 4913d78d3a5SPekka Enberg .rbp = self->boot_sp, 4923d78d3a5SPekka Enberg }; 4933d78d3a5SPekka Enberg 4943d78d3a5SPekka Enberg if (self->regs.rip > USHRT_MAX) 4953d78d3a5SPekka Enberg die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip); 4963d78d3a5SPekka Enberg 4973d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0) 4983d78d3a5SPekka Enberg die_perror("KVM_SET_REGS failed"); 4993d78d3a5SPekka Enberg } 5003d78d3a5SPekka Enberg 5013d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self) 502ae1fae34SPekka Enberg { 50353602077SPekka Enberg 5040ed849e6SAsias He if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 5050ed849e6SAsias He die_perror("KVM_GET_SREGS failed"); 5064a7c140aSAsias He 5070ed849e6SAsias He self->sregs.cs.selector = self->boot_selector; 5080ed849e6SAsias He self->sregs.cs.base = selector_to_base(self->boot_selector); 5094e42cf94SAsias He self->sregs.ss.selector = self->boot_selector; 5104e42cf94SAsias He self->sregs.ss.base = selector_to_base(self->boot_selector); 5114e42cf94SAsias He self->sregs.ds.selector = self->boot_selector; 5124e42cf94SAsias He self->sregs.ds.base = selector_to_base(self->boot_selector); 5134e42cf94SAsias He self->sregs.es.selector = self->boot_selector; 5144e42cf94SAsias He self->sregs.es.base = selector_to_base(self->boot_selector); 5154e42cf94SAsias He self->sregs.fs.selector = self->boot_selector; 5164e42cf94SAsias He self->sregs.fs.base = selector_to_base(self->boot_selector); 5174e42cf94SAsias He self->sregs.gs.selector = self->boot_selector; 5184e42cf94SAsias He self->sregs.gs.base = selector_to_base(self->boot_selector); 5194a7c140aSAsias He 52053602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0) 52153602077SPekka Enberg die_perror("KVM_SET_SREGS failed"); 5223d78d3a5SPekka Enberg } 52306e41eeaSPekka Enberg 5243d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self) 5253d78d3a5SPekka Enberg { 5263d78d3a5SPekka Enberg kvm__setup_sregs(self); 527dbdb74c2SPekka Enberg 5283d78d3a5SPekka Enberg kvm__setup_regs(self); 52906e41eeaSPekka Enberg 5303d78d3a5SPekka Enberg kvm__setup_fpu(self); 53153d48714SPekka Enberg 53253d48714SPekka Enberg kvm__setup_msrs(self); 533ae1fae34SPekka Enberg } 534ae1fae34SPekka Enberg 5352f3976eeSPekka Enberg void kvm__setup_mem(struct kvm *self) 5362f3976eeSPekka Enberg { 5372f3976eeSPekka Enberg struct e820_entry *mem_map; 5382f3976eeSPekka Enberg unsigned char *size; 5392f3976eeSPekka Enberg 5402f3976eeSPekka Enberg size = guest_flat_to_host(self, E820_MAP_SIZE); 5412f3976eeSPekka Enberg mem_map = guest_flat_to_host(self, E820_MAP_START); 5422f3976eeSPekka Enberg 5432f3976eeSPekka Enberg *size = 4; 5442f3976eeSPekka Enberg 5452f3976eeSPekka Enberg mem_map[0] = (struct e820_entry) { 5462f3976eeSPekka Enberg .addr = REAL_MODE_IVT_BEGIN, 5472f3976eeSPekka Enberg .size = BDA_END - REAL_MODE_IVT_BEGIN, 5482f3976eeSPekka Enberg .type = E820_MEM_RESERVED, 5492f3976eeSPekka Enberg }; 5502f3976eeSPekka Enberg mem_map[1] = (struct e820_entry) { 5512f3976eeSPekka Enberg .addr = BDA_END, 5522f3976eeSPekka Enberg .size = EBDA_END - BDA_END, 5532f3976eeSPekka Enberg .type = E820_MEM_USABLE, 5542f3976eeSPekka Enberg }; 5552f3976eeSPekka Enberg mem_map[2] = (struct e820_entry) { 5562f3976eeSPekka Enberg .addr = EBDA_END, 5572f3976eeSPekka Enberg .size = BZ_KERNEL_START - EBDA_END, 5582f3976eeSPekka Enberg .type = E820_MEM_RESERVED, 5592f3976eeSPekka Enberg }; 5602f3976eeSPekka Enberg mem_map[3] = (struct e820_entry) { 5612f3976eeSPekka Enberg .addr = BZ_KERNEL_START, 5622f3976eeSPekka Enberg .size = self->ram_size - BZ_KERNEL_START, 5632f3976eeSPekka Enberg .type = E820_MEM_USABLE, 5642f3976eeSPekka Enberg }; 5652f3976eeSPekka Enberg } 5662f3976eeSPekka Enberg 567ae1fae34SPekka Enberg void kvm__run(struct kvm *self) 568ae1fae34SPekka Enberg { 569ae1fae34SPekka Enberg if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0) 570ae1fae34SPekka Enberg die_perror("KVM_RUN failed"); 571ae1fae34SPekka Enberg } 572ae1fae34SPekka Enberg 5738351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable) 5748351aaddSPekka Enberg { 5758351aaddSPekka Enberg printf(" %s %016" PRIx64 " %08" PRIx16 "\n", 5768351aaddSPekka Enberg name, (uint64_t) dtable->base, (uint16_t) dtable->limit); 5778351aaddSPekka Enberg } 5788351aaddSPekka Enberg 57953602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg) 58053602077SPekka Enberg { 581ce556636SPekka Enberg printf(" %s %04" PRIx16 " %016" PRIx64 " %08" PRIx32 " %02" PRIx8 " %x %x %x %x %x %x %x\n", 58253602077SPekka Enberg name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit, 583ce556636SPekka Enberg (uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl); 58453602077SPekka Enberg } 58553602077SPekka Enberg 586ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self) 5877118d2caSPekka Enberg { 58853602077SPekka Enberg unsigned long cr0, cr2, cr3; 58953602077SPekka Enberg unsigned long cr4, cr8; 5907118d2caSPekka Enberg unsigned long rax, rbx, rcx; 5917118d2caSPekka Enberg unsigned long rdx, rsi, rdi; 5927118d2caSPekka Enberg unsigned long rbp, r8, r9; 5937118d2caSPekka Enberg unsigned long r10, r11, r12; 5947118d2caSPekka Enberg unsigned long r13, r14, r15; 5957118d2caSPekka Enberg unsigned long rip, rsp; 59653602077SPekka Enberg struct kvm_sregs sregs; 597a2fe6199SPekka Enberg unsigned long rflags; 5987118d2caSPekka Enberg struct kvm_regs regs; 599ce5e0ecbSPekka Enberg int i; 6007118d2caSPekka Enberg 6017118d2caSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, ®s) < 0) 6027118d2caSPekka Enberg die("KVM_GET_REGS failed"); 6037118d2caSPekka Enberg 604a2fe6199SPekka Enberg rflags = regs.rflags; 605a2fe6199SPekka Enberg 6067118d2caSPekka Enberg rip = regs.rip; rsp = regs.rsp; 6077118d2caSPekka Enberg rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx; 6087118d2caSPekka Enberg rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi; 6097118d2caSPekka Enberg rbp = regs.rbp; r8 = regs.r8; r9 = regs.r9; 6107118d2caSPekka Enberg r10 = regs.r10; r11 = regs.r11; r12 = regs.r12; 6117118d2caSPekka Enberg r13 = regs.r13; r14 = regs.r14; r15 = regs.r15; 6127118d2caSPekka Enberg 6137118d2caSPekka Enberg printf("Registers:\n"); 6142177ec43SPekka Enberg printf(" rip: %016lx rsp: %016lx flags: %016lx\n", rip, rsp, rflags); 615ea2e4ea0SCyrill Gorcunov printf(" rax: %016lx rbx: %016lx rcx: %016lx\n", rax, rbx, rcx); 6167118d2caSPekka Enberg printf(" rdx: %016lx rsi: %016lx rdi: %016lx\n", rdx, rsi, rdi); 6177118d2caSPekka Enberg printf(" rbp: %016lx r8: %016lx r9: %016lx\n", rbp, r8, r9); 6187118d2caSPekka Enberg printf(" r10: %016lx r11: %016lx r12: %016lx\n", r10, r11, r12); 6197118d2caSPekka Enberg printf(" r13: %016lx r14: %016lx r15: %016lx\n", r13, r14, r15); 62053602077SPekka Enberg 62153602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0) 62253602077SPekka Enberg die("KVM_GET_REGS failed"); 62353602077SPekka Enberg 62453602077SPekka Enberg cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3; 62553602077SPekka Enberg cr4 = sregs.cr4; cr8 = sregs.cr8; 62653602077SPekka Enberg 62753602077SPekka Enberg printf(" cr0: %016lx cr2: %016lx cr3: %016lx\n", cr0, cr2, cr3); 62853602077SPekka Enberg printf(" cr4: %016lx cr8: %016lx\n", cr4, cr8); 629ce5e0ecbSPekka Enberg printf("Segment registers:\n"); 630ce556636SPekka Enberg printf(" register selector base limit type p dpl db s l g avl\n"); 63153602077SPekka Enberg print_segment("cs ", &sregs.cs); 63253602077SPekka Enberg print_segment("ss ", &sregs.ss); 63353602077SPekka Enberg print_segment("ds ", &sregs.ds); 63453602077SPekka Enberg print_segment("es ", &sregs.es); 63553602077SPekka Enberg print_segment("fs ", &sregs.fs); 63653602077SPekka Enberg print_segment("gs ", &sregs.gs); 637ce5e0ecbSPekka Enberg print_segment("tr ", &sregs.tr); 638ce5e0ecbSPekka Enberg print_segment("ldt", &sregs.ldt); 6398351aaddSPekka Enberg print_dtable("gdt", &sregs.gdt); 6408351aaddSPekka Enberg print_dtable("idt", &sregs.idt); 6410f9983b2SCyrill Gorcunov printf(" [ efer: %016" PRIx64 " apic base: %016" PRIx64 " nmi: %s ]\n", 6420f9983b2SCyrill Gorcunov (uint64_t) sregs.efer, (uint64_t) sregs.apic_base, 6432049569dSPekka Enberg (self->nmi_disabled ? "disabled" : "enabled")); 644ce5e0ecbSPekka Enberg printf("Interrupt bitmap:\n"); 645ce5e0ecbSPekka Enberg printf(" "); 646ce5e0ecbSPekka Enberg for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++) 6470f9983b2SCyrill Gorcunov printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]); 648ce5e0ecbSPekka Enberg printf("\n"); 6497118d2caSPekka Enberg } 6507118d2caSPekka Enberg 651ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self) 6526f10be05SPekka Enberg { 6536f10be05SPekka Enberg unsigned int code_bytes = 64; 6546f10be05SPekka Enberg unsigned int code_prologue = code_bytes * 43 / 64; 6556f10be05SPekka Enberg unsigned int code_len = code_bytes; 6566f10be05SPekka Enberg unsigned char c; 657ae1fae34SPekka Enberg unsigned int i; 6586f10be05SPekka Enberg uint8_t *ip; 6596f10be05SPekka Enberg 6602a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0) 6612a601aafSPekka Enberg die("KVM_GET_REGS failed"); 6622a601aafSPekka Enberg 6632a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 6642a601aafSPekka Enberg die("KVM_GET_SREGS failed"); 6652a601aafSPekka Enberg 666f326512aSPekka Enberg ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue); 6676f10be05SPekka Enberg 6686f10be05SPekka Enberg printf("Code: "); 6696f10be05SPekka Enberg 6706f10be05SPekka Enberg for (i = 0; i < code_len; i++, ip++) { 67148cf3877SPekka Enberg if (!host_ptr_in_ram(self, ip)) 67248cf3877SPekka Enberg break; 67348cf3877SPekka Enberg 6746e8abc38SPekka Enberg c = *ip; 6756e8abc38SPekka Enberg 676f326512aSPekka Enberg if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip))) 6776f10be05SPekka Enberg printf("<%02x> ", c); 6786f10be05SPekka Enberg else 6796f10be05SPekka Enberg printf("%02x ", c); 6806f10be05SPekka Enberg } 6816f10be05SPekka Enberg 6826f10be05SPekka Enberg printf("\n"); 6832a7d39a4SPekka Enberg 6842a7d39a4SPekka Enberg printf("Stack:\n"); 6852a7d39a4SPekka Enberg kvm__dump_mem(self, self->regs.rsp, 32); 6866f10be05SPekka Enberg } 687090f898eSCyrill Gorcunov 688f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self) 689f01944c8SPekka Enberg { 690f01944c8SPekka Enberg uint64_t *pte1; 691f01944c8SPekka Enberg uint64_t *pte2; 692f01944c8SPekka Enberg uint64_t *pte3; 693f01944c8SPekka Enberg uint64_t *pte4; 694f01944c8SPekka Enberg 695f01944c8SPekka Enberg if (!is_in_protected_mode(self)) 696f01944c8SPekka Enberg return; 697f01944c8SPekka Enberg 698f01944c8SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 699f01944c8SPekka Enberg die("KVM_GET_SREGS failed"); 700f01944c8SPekka Enberg 701f01944c8SPekka Enberg pte4 = guest_flat_to_host(self, self->sregs.cr3); 70248cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte4)) 70348cf3877SPekka Enberg return; 70448cf3877SPekka Enberg 705f01944c8SPekka Enberg pte3 = guest_flat_to_host(self, (*pte4 & ~0xfff)); 70648cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte3)) 70748cf3877SPekka Enberg return; 70848cf3877SPekka Enberg 709f01944c8SPekka Enberg pte2 = guest_flat_to_host(self, (*pte3 & ~0xfff)); 71048cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte2)) 71148cf3877SPekka Enberg return; 71248cf3877SPekka Enberg 713f01944c8SPekka Enberg pte1 = guest_flat_to_host(self, (*pte2 & ~0xfff)); 71448cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte1)) 71548cf3877SPekka Enberg return; 716f01944c8SPekka Enberg 717f01944c8SPekka Enberg printf("Page Tables:\n"); 718f01944c8SPekka Enberg if (*pte2 & (1 << 7)) 7190f9983b2SCyrill Gorcunov printf(" pte4: %016" PRIx64 " pte3: %016" PRIx64 7200f9983b2SCyrill Gorcunov " pte2: %016" PRIx64 "\n", 7210f9983b2SCyrill Gorcunov *pte4, *pte3, *pte2); 722f01944c8SPekka Enberg else 7230f9983b2SCyrill Gorcunov printf(" pte4: %016" PRIx64 " pte3: %016" PRIx64 " pte2: %016" 7240f9983b2SCyrill Gorcunov PRIx64 " pte1: %016" PRIx64 "\n", 7250f9983b2SCyrill Gorcunov *pte4, *pte3, *pte2, *pte1); 726f01944c8SPekka Enberg } 727f01944c8SPekka Enberg 728090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size) 729090f898eSCyrill Gorcunov { 730090f898eSCyrill Gorcunov unsigned char *p; 731090f898eSCyrill Gorcunov unsigned long n; 732090f898eSCyrill Gorcunov 733090f898eSCyrill Gorcunov size &= ~7; /* mod 8 */ 734090f898eSCyrill Gorcunov if (!size) 735090f898eSCyrill Gorcunov return; 736090f898eSCyrill Gorcunov 7372a7d39a4SPekka Enberg p = guest_flat_to_host(self, addr); 738090f898eSCyrill Gorcunov 73948cf3877SPekka Enberg for (n = 0; n < size; n+=8) { 74048cf3877SPekka Enberg if (!host_ptr_in_ram(self, p + n)) 74148cf3877SPekka Enberg break; 74248cf3877SPekka Enberg 743090f898eSCyrill Gorcunov printf(" 0x%08lx: %02x %02x %02x %02x %02x %02x %02x %02x\n", 744090f898eSCyrill Gorcunov addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3], 745090f898eSCyrill Gorcunov p[n + 4], p[n + 5], p[n + 6], p[n + 7]); 746090f898eSCyrill Gorcunov } 74748cf3877SPekka Enberg } 748