xref: /kvmtool/kvm.c (revision 2346d461f0a263811399ce061a57b965a357afc4)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3eda03319SPekka Enberg #include "kvm/interrupt.h"
4c78b8713SAsias He #include "kvm/cpufeature.h"
52f3976eeSPekka Enberg #include "kvm/e820.h"
6f3150089SPekka Enberg #include "kvm/util.h"
7eda03319SPekka Enberg 
86c7d8514SPekka Enberg #include <linux/kvm.h>
9f5ab5f67SPekka Enberg 
10f5ab5f67SPekka Enberg #include <asm/bootparam.h>
11f5ab5f67SPekka Enberg 
12ae1fae34SPekka Enberg #include <sys/ioctl.h>
131f9cff23SPekka Enberg #include <inttypes.h>
141f9cff23SPekka Enberg #include <sys/mman.h>
152da26a59SPekka Enberg #include <stdbool.h>
166e5e8b8dSPekka Enberg #include <assert.h>
1706e41eeaSPekka Enberg #include <limits.h>
18f5ab5f67SPekka Enberg #include <stdarg.h>
19b8f6afcdSPekka Enberg #include <stdlib.h>
20f5ab5f67SPekka Enberg #include <string.h>
210d1f17ecSPekka Enberg #include <unistd.h>
221f9cff23SPekka Enberg #include <stdio.h>
23b8f6afcdSPekka Enberg #include <fcntl.h>
24b8f6afcdSPekka Enberg 
251f9cff23SPekka Enberg /*
261f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
271f9cff23SPekka Enberg  */
281f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
291f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
301f9cff23SPekka Enberg #endif
311f9cff23SPekka Enberg 
32ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
330d1f17ecSPekka Enberg 
34ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
51ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
52ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
539b1fb1c3SPekka Enberg };
549b1fb1c3SPekka Enberg 
5555e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
5655e19624SCyrill Gorcunov 	.name = #ext,			\
5755e19624SCyrill Gorcunov 	.code = ext
5855e19624SCyrill Gorcunov 
5955e19624SCyrill Gorcunov struct {
6055e19624SCyrill Gorcunov 	const char *name;
6155e19624SCyrill Gorcunov 	int code;
6255e19624SCyrill Gorcunov } kvm_req_ext[] = {
6355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
6455e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
6555e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
6655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
6755e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
6855e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
697c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
7055e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
71d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
7255e19624SCyrill Gorcunov };
7355e19624SCyrill Gorcunov 
74ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
75b8f6afcdSPekka Enberg {
7628fa19c0SPekka Enberg 	int ret;
77b8f6afcdSPekka Enberg 
7873ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
794076b041SPekka Enberg 	if (ret < 0)
804076b041SPekka Enberg 		return false;
814076b041SPekka Enberg 
824076b041SPekka Enberg 	return ret;
834076b041SPekka Enberg }
844076b041SPekka Enberg 
8555e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self)
8655e19624SCyrill Gorcunov {
8755e19624SCyrill Gorcunov 	unsigned int i;
8855e19624SCyrill Gorcunov 
8955e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
9055e19624SCyrill Gorcunov 		if (!kvm__supports_extension(self, kvm_req_ext[i].code)) {
9155e19624SCyrill Gorcunov 			error("Unsuppored KVM extension detected: %s",
9255e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
9355e19624SCyrill Gorcunov 			return (int)-i;
9455e19624SCyrill Gorcunov 		}
9555e19624SCyrill Gorcunov 	}
9655e19624SCyrill Gorcunov 
9755e19624SCyrill Gorcunov 	return 0;
9855e19624SCyrill Gorcunov }
9955e19624SCyrill Gorcunov 
1004076b041SPekka Enberg static struct kvm *kvm__new(void)
1014076b041SPekka Enberg {
1024076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
1034076b041SPekka Enberg 
1044076b041SPekka Enberg 	if (!self)
1054076b041SPekka Enberg 		die("out of memory");
1064076b041SPekka Enberg 
1074076b041SPekka Enberg 	return self;
1084076b041SPekka Enberg }
1094076b041SPekka Enberg 
1109ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
1119ef4c68eSPekka Enberg {
1129ef4c68eSPekka Enberg 	free(self->ram_start);
1139ef4c68eSPekka Enberg 	free(self);
1149ef4c68eSPekka Enberg }
1159ef4c68eSPekka Enberg 
116c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
117c78b8713SAsias He {
118c78b8713SAsias He 	struct cpuid_regs regs;
119831fbf23SPekka Enberg 	uint32_t eax_base;
120831fbf23SPekka Enberg 	int feature;
121c78b8713SAsias He 
122c78b8713SAsias He 	regs	= (struct cpuid_regs) {
123831fbf23SPekka Enberg 		.eax		= 0x00,
124c78b8713SAsias He 	};
125c78b8713SAsias He 	host_cpuid(&regs);
126c78b8713SAsias He 
127ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
128ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
129831fbf23SPekka Enberg 		eax_base	= 0x00;
130831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_VMX;
131ae87afbfSCyrill Gorcunov 		break;
13234649df9SPekka Enberg 
133ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
134831fbf23SPekka Enberg 		eax_base	= 0x80000000;
135831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_SVM;
136ae87afbfSCyrill Gorcunov 		break;
13734649df9SPekka Enberg 
13834649df9SPekka Enberg 	default:
13934649df9SPekka Enberg 		return false;
140ae87afbfSCyrill Gorcunov 	}
141ae87afbfSCyrill Gorcunov 
142831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
143831fbf23SPekka Enberg 		.eax		= eax_base,
144831fbf23SPekka Enberg 	};
145831fbf23SPekka Enberg 	host_cpuid(&regs);
146831fbf23SPekka Enberg 
147831fbf23SPekka Enberg 	if (regs.eax < eax_base + 0x01)
148831fbf23SPekka Enberg 		return false;
149831fbf23SPekka Enberg 
150831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
151831fbf23SPekka Enberg 		.eax		= eax_base + 0x01
152831fbf23SPekka Enberg 	};
153831fbf23SPekka Enberg 	host_cpuid(&regs);
154831fbf23SPekka Enberg 
155831fbf23SPekka Enberg 	return regs.ecx & (1 << feature);
156c78b8713SAsias He }
157c78b8713SAsias He 
158192a99d1SCyrill Gorcunov struct kvm *kvm__init(const char *kvm_dev, unsigned long ram_size)
1594076b041SPekka Enberg {
1602b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1619687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
1624076b041SPekka Enberg 	struct kvm *self;
1630d1f17ecSPekka Enberg 	long page_size;
1641f9cff23SPekka Enberg 	int mmap_size;
1654076b041SPekka Enberg 	int ret;
1664076b041SPekka Enberg 
167c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
168c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
169c78b8713SAsias He 
1704076b041SPekka Enberg 	self = kvm__new();
1714076b041SPekka Enberg 
1726d7c36ceSPekka Enberg 	self->sys_fd = open(kvm_dev, O_RDWR);
1736d7c36ceSPekka Enberg 	if (self->sys_fd < 0) {
1746d7c36ceSPekka Enberg 		if (errno == ENOENT)
1756d7c36ceSPekka Enberg 			die("'%s' not found. Please make sure you have CONFIG_KVM enabled.", kvm_dev);
1766d7c36ceSPekka Enberg 
177f5ab5f67SPekka Enberg 		die_perror("open");
1786d7c36ceSPekka Enberg 	}
179b8f6afcdSPekka Enberg 
18073ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1816c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
182f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1836c7d8514SPekka Enberg 
18473ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
18573ac60e6SPekka Enberg 	if (self->vm_fd < 0)
186f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
18728fa19c0SPekka Enberg 
18855e19624SCyrill Gorcunov 	if (kvm__check_extensions(self))
18955e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
1909687927dSAsias He 
1919687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
1929687927dSAsias He 	if (ret < 0)
1939687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
1949687927dSAsias He 
1959687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config);
1969687927dSAsias He 	if (ret < 0)
1979687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
1989687927dSAsias He 
199192a99d1SCyrill Gorcunov 	self->ram_size		= ram_size;
2000d1f17ecSPekka Enberg 
2010d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
2020d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
2030d1f17ecSPekka Enberg 		die("out of memory");
2040d1f17ecSPekka Enberg 
2052b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
2062b0e3342SPekka Enberg 		.slot			= 0,
2072b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
2080d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
2090d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
2102b0e3342SPekka Enberg 	};
2112b0e3342SPekka Enberg 
212b6e68186SAsias He 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
2132b0e3342SPekka Enberg 	if (ret < 0)
214f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
2152b0e3342SPekka Enberg 
2169687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP);
217895c2fefSPekka Enberg 	if (ret < 0)
2189687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
2199687927dSAsias He 
22073ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
2212b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
222f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
2232b0e3342SPekka Enberg 
2241f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
2251f9cff23SPekka Enberg 	if (mmap_size < 0)
226f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
2271f9cff23SPekka Enberg 
2281f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
2291f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
2301f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
2311f9cff23SPekka Enberg 
2324076b041SPekka Enberg 	return self;
2334076b041SPekka Enberg }
2344076b041SPekka Enberg 
235ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
236aee6632eSPekka Enberg {
237aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
238aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
239aee6632eSPekka Enberg 	};
240aee6632eSPekka Enberg 
241aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
242b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
243aee6632eSPekka Enberg }
244aee6632eSPekka Enberg 
2455f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
246b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
247dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
2482dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
2492dd4a4edSCyrill Gorcunov 
2502dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED	0x202
251a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
252009b0758SPekka Enberg 
253edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
254009b0758SPekka Enberg {
255009b0758SPekka Enberg 	void *p;
256009b0758SPekka Enberg 	int nr;
257009b0758SPekka Enberg 
258009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
259009b0758SPekka Enberg 		die_perror("lseek");
260009b0758SPekka Enberg 
2616753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
262009b0758SPekka Enberg 
263009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
264009b0758SPekka Enberg 		p += nr;
265009b0758SPekka Enberg 
266dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
267edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
268dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
269edc8a14dSPekka Enberg 
2707fb218bdSPekka Enberg 	return true;
271009b0758SPekka Enberg }
272009b0758SPekka Enberg 
2737fb218bdSPekka Enberg /*
2747fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
2757fb218bdSPekka Enberg  * default.
2767fb218bdSPekka Enberg  */
2777fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
278ae1fae34SPekka Enberg 
279ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
280ae1fae34SPekka Enberg 
28110943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS		4
28210943d14SPekka Enberg 
2836d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline)
284ae1fae34SPekka Enberg {
285b9271160SPekka Enberg 	struct boot_params *kern_boot;
2864b62331fSPekka Enberg 	unsigned long setup_sects;
287b9271160SPekka Enberg 	struct boot_params boot;
2882dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
2897fb218bdSPekka Enberg 	ssize_t setup_size;
29022489bb0SCyrill Gorcunov 	void *p;
291ae1fae34SPekka Enberg 	int nr;
292ae1fae34SPekka Enberg 
2935d67eaf6SPekka Enberg 	/*
2945d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2955d67eaf6SPekka Enberg 	 * memory layout.
2965d67eaf6SPekka Enberg 	 */
2975d67eaf6SPekka Enberg 
298009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
299009b0758SPekka Enberg 		die_perror("lseek");
300009b0758SPekka Enberg 
3017ada9b6bSPekka Enberg 	if (read(fd, &boot, sizeof(boot)) != sizeof(boot))
302*2346d461SPekka Enberg 		return false;
303ae1fae34SPekka Enberg 
304ae1fae34SPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0)
3057fb218bdSPekka Enberg 		return false;
306ae1fae34SPekka Enberg 
3072dd4a4edSCyrill Gorcunov 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) {
308ad681038SCyrill Gorcunov 		warning("Too old kernel");
309ad681038SCyrill Gorcunov 		return false;
310ad681038SCyrill Gorcunov 	}
311ad681038SCyrill Gorcunov 
312e93ab78aSPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
313e93ab78aSPekka Enberg 		die_perror("lseek");
314e93ab78aSPekka Enberg 
3154cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
3164cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
31710943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
31810943d14SPekka Enberg 
31954d4a626SPekka Enberg 	setup_size = setup_sects << 9;
3206753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
321ae1fae34SPekka Enberg 
3227fb218bdSPekka Enberg 	if (read(fd, p, setup_size) != setup_size)
3237fb218bdSPekka Enberg 		die_perror("read");
3247fb218bdSPekka Enberg 
3256753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
326ae1fae34SPekka Enberg 
327ae1fae34SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
328ae1fae34SPekka Enberg 		p += nr;
329ae1fae34SPekka Enberg 
330a43f6460SCyrill Gorcunov 	p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET);
331debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
332debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
333debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
334debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
335ad681038SCyrill Gorcunov 
3362dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
3372dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
338debcfac0SCyrill Gorcunov 	}
339debcfac0SCyrill Gorcunov 
340b9271160SPekka Enberg 	kern_boot	= guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x00);
341a43f6460SCyrill Gorcunov 
342b9271160SPekka Enberg 	kern_boot->hdr.cmd_line_ptr	= BOOT_CMDLINE_OFFSET;
343b9271160SPekka Enberg 	kern_boot->hdr.type_of_loader	= 0xff;
344b9271160SPekka Enberg 	kern_boot->hdr.heap_end_ptr	= 0xfe00;
345b9271160SPekka Enberg 	kern_boot->hdr.loadflags	|= CAN_USE_HEAP;
346a43f6460SCyrill Gorcunov 
347dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
348edc8a14dSPekka Enberg 	/*
349edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
350edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
351edc8a14dSPekka Enberg 	 */
352edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
353dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
354edc8a14dSPekka Enberg 
355ea684828SCyrill Gorcunov 	/*
3569292f776SCyrill Gorcunov 	 * Drum roll, BIOS is coming to live, oh dear...
357ea684828SCyrill Gorcunov 	 */
3589292f776SCyrill Gorcunov 	setup_bios(self);
359ea684828SCyrill Gorcunov 
3607fb218bdSPekka Enberg 	return true;
361ae1fae34SPekka Enberg }
362ae1fae34SPekka Enberg 
3636d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
3646d1f350dSCyrill Gorcunov 			const char *kernel_cmdline)
365ae1fae34SPekka Enberg {
3667fb218bdSPekka Enberg 	bool ret;
367ae1fae34SPekka Enberg 	int fd;
368ae1fae34SPekka Enberg 
369ae1fae34SPekka Enberg 	fd = open(kernel_filename, O_RDONLY);
370ae1fae34SPekka Enberg 	if (fd < 0)
371ae1fae34SPekka Enberg 		die("unable to open kernel");
372ae1fae34SPekka Enberg 
3736d1f350dSCyrill Gorcunov 	ret = load_bzimage(kvm, fd, kernel_cmdline);
374009b0758SPekka Enberg 	if (ret)
375009b0758SPekka Enberg 		goto found_kernel;
376ae1fae34SPekka Enberg 
377009b0758SPekka Enberg 	ret = load_flat_binary(kvm, fd);
378009b0758SPekka Enberg 	if (ret)
379009b0758SPekka Enberg 		goto found_kernel;
380009b0758SPekka Enberg 
381009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
382009b0758SPekka Enberg 
383009b0758SPekka Enberg found_kernel:
384ae1fae34SPekka Enberg 	return ret;
385ae1fae34SPekka Enberg }
386ae1fae34SPekka Enberg 
38706e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
38806e41eeaSPekka Enberg {
38906e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
39006e41eeaSPekka Enberg 
39106e41eeaSPekka Enberg 	return ip - (cs << 4);
39206e41eeaSPekka Enberg }
39306e41eeaSPekka Enberg 
394f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self)
395f01944c8SPekka Enberg {
396f01944c8SPekka Enberg 	return self->sregs.cr0 & 0x01;
397f01944c8SPekka Enberg }
398f01944c8SPekka Enberg 
399f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
40006e41eeaSPekka Enberg {
401f326512aSPekka Enberg 	uint64_t cs;
402f326512aSPekka Enberg 
403f326512aSPekka Enberg 	/*
404f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
405f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
406f326512aSPekka Enberg 	 */
407f01944c8SPekka Enberg 	if (is_in_protected_mode(self))
408f326512aSPekka Enberg 		return ip;
409f326512aSPekka Enberg 
410f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
41106e41eeaSPekka Enberg 
41206e41eeaSPekka Enberg 	return ip + (cs << 4);
41306e41eeaSPekka Enberg }
41406e41eeaSPekka Enberg 
415dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
416dbdb74c2SPekka Enberg {
417dbdb74c2SPekka Enberg 	/*
418dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
419dbdb74c2SPekka Enberg 	 */
420dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
421dbdb74c2SPekka Enberg }
422dbdb74c2SPekka Enberg 
42353d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs)
42453d48714SPekka Enberg {
42553d48714SPekka Enberg 	struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs));
42653d48714SPekka Enberg 
42753d48714SPekka Enberg 	if (!self)
42853d48714SPekka Enberg 		die("out of memory");
42953d48714SPekka Enberg 
43053d48714SPekka Enberg 	return self;
43153d48714SPekka Enberg }
43253d48714SPekka Enberg 
43353d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER	0x10
43453d48714SPekka Enberg 
43553d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS		0x174
43653d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP		0x175
43753d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP		0x176
43853d48714SPekka Enberg 
43953d48714SPekka Enberg #define MSR_IA32_STAR			0xc0000081
44053d48714SPekka Enberg #define MSR_IA32_LSTAR			0xc0000082
44153d48714SPekka Enberg #define MSR_IA32_CSTAR			0xc0000083
44253d48714SPekka Enberg #define MSR_IA32_FMASK			0xc0000084
44353d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE		0xc0000102
44453d48714SPekka Enberg 
44553d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data)	\
44653d48714SPekka Enberg 	(struct kvm_msr_entry) { .index = _index, .data = _data }
44753d48714SPekka Enberg 
44853d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self)
44953d48714SPekka Enberg {
45053d48714SPekka Enberg 	unsigned long ndx = 0;
45153d48714SPekka Enberg 
45253d48714SPekka Enberg 	self->msrs = kvm_msrs__new(100);
45353d48714SPekka Enberg 
45453d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS,	0x0);
45553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP,	0x0);
45653d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP,	0x0);
4578b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64
45853d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR,		0x0);
45953d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR,		0x0);
46053d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE,	0x0);
46153d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK,		0x0);
46253d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR,		0x0);
46344069a9dSCyrill Gorcunov #endif
46453d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER,	0x0);
46553d48714SPekka Enberg 
46653d48714SPekka Enberg 	self->msrs->nmsrs	= ndx;
46753d48714SPekka Enberg 
46853d48714SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0)
46953d48714SPekka Enberg 		die_perror("KVM_SET_MSRS failed");
47053d48714SPekka Enberg }
47153d48714SPekka Enberg 
4723d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self)
4733d78d3a5SPekka Enberg {
4743d78d3a5SPekka Enberg 	self->fpu = (struct kvm_fpu) {
4753d78d3a5SPekka Enberg 		.fcw		= 0x37f,
4763d78d3a5SPekka Enberg 		.mxcsr		= 0x1f80,
4773d78d3a5SPekka Enberg 	};
4783d78d3a5SPekka Enberg 
4793d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
4803d78d3a5SPekka Enberg 		die_perror("KVM_SET_FPU failed");
4813d78d3a5SPekka Enberg }
4823d78d3a5SPekka Enberg 
4833d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self)
4843d78d3a5SPekka Enberg {
4853d78d3a5SPekka Enberg 	self->regs = (struct kvm_regs) {
4863d78d3a5SPekka Enberg 		/* We start the guest in 16-bit real mode  */
4873d78d3a5SPekka Enberg 		.rflags		= 0x0000000000000002ULL,
4883d78d3a5SPekka Enberg 
4893d78d3a5SPekka Enberg 		.rip		= self->boot_ip,
4903d78d3a5SPekka Enberg 		.rsp		= self->boot_sp,
4913d78d3a5SPekka Enberg 		.rbp		= self->boot_sp,
4923d78d3a5SPekka Enberg 	};
4933d78d3a5SPekka Enberg 
4943d78d3a5SPekka Enberg 	if (self->regs.rip > USHRT_MAX)
4953d78d3a5SPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
4963d78d3a5SPekka Enberg 
4973d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
4983d78d3a5SPekka Enberg 		die_perror("KVM_SET_REGS failed");
4993d78d3a5SPekka Enberg }
5003d78d3a5SPekka Enberg 
5013d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self)
502ae1fae34SPekka Enberg {
50353602077SPekka Enberg 
5040ed849e6SAsias He 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
5050ed849e6SAsias He 		die_perror("KVM_GET_SREGS failed");
5064a7c140aSAsias He 
5070ed849e6SAsias He 	self->sregs.cs.selector	= self->boot_selector;
5080ed849e6SAsias He 	self->sregs.cs.base	= selector_to_base(self->boot_selector);
5094e42cf94SAsias He 	self->sregs.ss.selector	= self->boot_selector;
5104e42cf94SAsias He 	self->sregs.ss.base	= selector_to_base(self->boot_selector);
5114e42cf94SAsias He 	self->sregs.ds.selector	= self->boot_selector;
5124e42cf94SAsias He 	self->sregs.ds.base	= selector_to_base(self->boot_selector);
5134e42cf94SAsias He 	self->sregs.es.selector	= self->boot_selector;
5144e42cf94SAsias He 	self->sregs.es.base	= selector_to_base(self->boot_selector);
5154e42cf94SAsias He 	self->sregs.fs.selector	= self->boot_selector;
5164e42cf94SAsias He 	self->sregs.fs.base	= selector_to_base(self->boot_selector);
5174e42cf94SAsias He 	self->sregs.gs.selector	= self->boot_selector;
5184e42cf94SAsias He 	self->sregs.gs.base	= selector_to_base(self->boot_selector);
5194a7c140aSAsias He 
52053602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
52153602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
5223d78d3a5SPekka Enberg }
52306e41eeaSPekka Enberg 
5243d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self)
5253d78d3a5SPekka Enberg {
5263d78d3a5SPekka Enberg 	kvm__setup_sregs(self);
527dbdb74c2SPekka Enberg 
5283d78d3a5SPekka Enberg 	kvm__setup_regs(self);
52906e41eeaSPekka Enberg 
5303d78d3a5SPekka Enberg 	kvm__setup_fpu(self);
53153d48714SPekka Enberg 
53253d48714SPekka Enberg 	kvm__setup_msrs(self);
533ae1fae34SPekka Enberg }
534ae1fae34SPekka Enberg 
5352f3976eeSPekka Enberg void kvm__setup_mem(struct kvm *self)
5362f3976eeSPekka Enberg {
5372f3976eeSPekka Enberg 	struct e820_entry *mem_map;
5382f3976eeSPekka Enberg 	unsigned char *size;
5392f3976eeSPekka Enberg 
5402f3976eeSPekka Enberg 	size		= guest_flat_to_host(self, E820_MAP_SIZE);
5412f3976eeSPekka Enberg 	mem_map		= guest_flat_to_host(self, E820_MAP_START);
5422f3976eeSPekka Enberg 
5432f3976eeSPekka Enberg 	*size		= 4;
5442f3976eeSPekka Enberg 
5452f3976eeSPekka Enberg 	mem_map[0]	= (struct e820_entry) {
5462f3976eeSPekka Enberg 		.addr		= REAL_MODE_IVT_BEGIN,
5472f3976eeSPekka Enberg 		.size		= BDA_END - REAL_MODE_IVT_BEGIN,
5482f3976eeSPekka Enberg 		.type		= E820_MEM_RESERVED,
5492f3976eeSPekka Enberg 	};
5502f3976eeSPekka Enberg 	mem_map[1]	= (struct e820_entry) {
5512f3976eeSPekka Enberg 		.addr		= BDA_END,
5522f3976eeSPekka Enberg 		.size		= EBDA_END - BDA_END,
5532f3976eeSPekka Enberg 		.type		= E820_MEM_USABLE,
5542f3976eeSPekka Enberg 	};
5552f3976eeSPekka Enberg 	mem_map[2]	= (struct e820_entry) {
5562f3976eeSPekka Enberg 		.addr		= EBDA_END,
5572f3976eeSPekka Enberg 		.size		= BZ_KERNEL_START - EBDA_END,
5582f3976eeSPekka Enberg 		.type		= E820_MEM_RESERVED,
5592f3976eeSPekka Enberg 	};
5602f3976eeSPekka Enberg 	mem_map[3]	= (struct e820_entry) {
5612f3976eeSPekka Enberg 		.addr		= BZ_KERNEL_START,
5622f3976eeSPekka Enberg 		.size		= self->ram_size - BZ_KERNEL_START,
5632f3976eeSPekka Enberg 		.type		= E820_MEM_USABLE,
5642f3976eeSPekka Enberg 	};
5652f3976eeSPekka Enberg }
5662f3976eeSPekka Enberg 
567ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
568ae1fae34SPekka Enberg {
569ae1fae34SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0)
570ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
571ae1fae34SPekka Enberg }
572ae1fae34SPekka Enberg 
5738351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable)
5748351aaddSPekka Enberg {
5758351aaddSPekka Enberg 	printf(" %s                 %016" PRIx64 "  %08" PRIx16 "\n",
5768351aaddSPekka Enberg 		name, (uint64_t) dtable->base, (uint16_t) dtable->limit);
5778351aaddSPekka Enberg }
5788351aaddSPekka Enberg 
57953602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
58053602077SPekka Enberg {
581ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
58253602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
583ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
58453602077SPekka Enberg }
58553602077SPekka Enberg 
586ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
5877118d2caSPekka Enberg {
58853602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
58953602077SPekka Enberg 	unsigned long cr4, cr8;
5907118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
5917118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
5927118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
5937118d2caSPekka Enberg 	unsigned long r10, r11, r12;
5947118d2caSPekka Enberg 	unsigned long r13, r14, r15;
5957118d2caSPekka Enberg 	unsigned long rip, rsp;
59653602077SPekka Enberg 	struct kvm_sregs sregs;
597a2fe6199SPekka Enberg 	unsigned long rflags;
5987118d2caSPekka Enberg 	struct kvm_regs regs;
599ce5e0ecbSPekka Enberg 	int i;
6007118d2caSPekka Enberg 
6017118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
6027118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
6037118d2caSPekka Enberg 
604a2fe6199SPekka Enberg 	rflags = regs.rflags;
605a2fe6199SPekka Enberg 
6067118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
6077118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
6087118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
6097118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
6107118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
6117118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
6127118d2caSPekka Enberg 
6137118d2caSPekka Enberg 	printf("Registers:\n");
6142177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
615ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
6167118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
6177118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
6187118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
6197118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
62053602077SPekka Enberg 
62153602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
62253602077SPekka Enberg 		die("KVM_GET_REGS failed");
62353602077SPekka Enberg 
62453602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
62553602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
62653602077SPekka Enberg 
62753602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
62853602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
629ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
630ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
63153602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
63253602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
63353602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
63453602077SPekka Enberg 	print_segment("es ", &sregs.es);
63553602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
63653602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
637ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
638ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
6398351aaddSPekka Enberg 	print_dtable("gdt", &sregs.gdt);
6408351aaddSPekka Enberg 	print_dtable("idt", &sregs.idt);
6410f9983b2SCyrill Gorcunov 	printf(" [ efer: %016" PRIx64 "  apic base: %016" PRIx64 "  nmi: %s ]\n",
6420f9983b2SCyrill Gorcunov 		(uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
6432049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
644ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
645ce5e0ecbSPekka Enberg 	printf(" ");
646ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
6470f9983b2SCyrill Gorcunov 		printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]);
648ce5e0ecbSPekka Enberg 	printf("\n");
6497118d2caSPekka Enberg }
6507118d2caSPekka Enberg 
651ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
6526f10be05SPekka Enberg {
6536f10be05SPekka Enberg 	unsigned int code_bytes = 64;
6546f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
6556f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
6566f10be05SPekka Enberg 	unsigned char c;
657ae1fae34SPekka Enberg 	unsigned int i;
6586f10be05SPekka Enberg 	uint8_t *ip;
6596f10be05SPekka Enberg 
6602a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
6612a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
6622a601aafSPekka Enberg 
6632a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
6642a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
6652a601aafSPekka Enberg 
666f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
6676f10be05SPekka Enberg 
6686f10be05SPekka Enberg 	printf("Code: ");
6696f10be05SPekka Enberg 
6706f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
67148cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, ip))
67248cf3877SPekka Enberg 			break;
67348cf3877SPekka Enberg 
6746e8abc38SPekka Enberg 		c = *ip;
6756e8abc38SPekka Enberg 
676f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
6776f10be05SPekka Enberg 			printf("<%02x> ", c);
6786f10be05SPekka Enberg 		else
6796f10be05SPekka Enberg 			printf("%02x ", c);
6806f10be05SPekka Enberg 	}
6816f10be05SPekka Enberg 
6826f10be05SPekka Enberg 	printf("\n");
6832a7d39a4SPekka Enberg 
6842a7d39a4SPekka Enberg 	printf("Stack:\n");
6852a7d39a4SPekka Enberg 	kvm__dump_mem(self, self->regs.rsp, 32);
6866f10be05SPekka Enberg }
687090f898eSCyrill Gorcunov 
688f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self)
689f01944c8SPekka Enberg {
690f01944c8SPekka Enberg 	uint64_t *pte1;
691f01944c8SPekka Enberg 	uint64_t *pte2;
692f01944c8SPekka Enberg 	uint64_t *pte3;
693f01944c8SPekka Enberg 	uint64_t *pte4;
694f01944c8SPekka Enberg 
695f01944c8SPekka Enberg 	if (!is_in_protected_mode(self))
696f01944c8SPekka Enberg 		return;
697f01944c8SPekka Enberg 
698f01944c8SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
699f01944c8SPekka Enberg 		die("KVM_GET_SREGS failed");
700f01944c8SPekka Enberg 
701f01944c8SPekka Enberg 	pte4	= guest_flat_to_host(self, self->sregs.cr3);
70248cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte4))
70348cf3877SPekka Enberg 		return;
70448cf3877SPekka Enberg 
705f01944c8SPekka Enberg 	pte3	= guest_flat_to_host(self, (*pte4 & ~0xfff));
70648cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte3))
70748cf3877SPekka Enberg 		return;
70848cf3877SPekka Enberg 
709f01944c8SPekka Enberg 	pte2	= guest_flat_to_host(self, (*pte3 & ~0xfff));
71048cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte2))
71148cf3877SPekka Enberg 		return;
71248cf3877SPekka Enberg 
713f01944c8SPekka Enberg 	pte1	= guest_flat_to_host(self, (*pte2 & ~0xfff));
71448cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte1))
71548cf3877SPekka Enberg 		return;
716f01944c8SPekka Enberg 
717f01944c8SPekka Enberg 	printf("Page Tables:\n");
718f01944c8SPekka Enberg 	if (*pte2 & (1 << 7))
7190f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64
7200f9983b2SCyrill Gorcunov 			"   pte2: %016" PRIx64 "\n",
7210f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2);
722f01944c8SPekka Enberg 	else
7230f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64 "   pte2: %016"
7240f9983b2SCyrill Gorcunov 			PRIx64 "   pte1: %016" PRIx64 "\n",
7250f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2, *pte1);
726f01944c8SPekka Enberg }
727f01944c8SPekka Enberg 
728090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
729090f898eSCyrill Gorcunov {
730090f898eSCyrill Gorcunov 	unsigned char *p;
731090f898eSCyrill Gorcunov 	unsigned long n;
732090f898eSCyrill Gorcunov 
733090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
734090f898eSCyrill Gorcunov 	if (!size)
735090f898eSCyrill Gorcunov 		return;
736090f898eSCyrill Gorcunov 
7372a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
738090f898eSCyrill Gorcunov 
73948cf3877SPekka Enberg 	for (n = 0; n < size; n+=8) {
74048cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
74148cf3877SPekka Enberg 			break;
74248cf3877SPekka Enberg 
743090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
744090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
745090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
746090f898eSCyrill Gorcunov 	}
74748cf3877SPekka Enberg }
748