xref: /kvmtool/kvm.c (revision 2dd4a4ed1e37816c52f3408f0f4dba2ba72ef153)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3eda03319SPekka Enberg #include "kvm/interrupt.h"
4f3150089SPekka Enberg #include "kvm/util.h"
5eda03319SPekka Enberg 
66c7d8514SPekka Enberg #include <linux/kvm.h>
7f5ab5f67SPekka Enberg 
8f5ab5f67SPekka Enberg #include <asm/bootparam.h>
9f5ab5f67SPekka Enberg 
10ae1fae34SPekka Enberg #include <sys/ioctl.h>
111f9cff23SPekka Enberg #include <inttypes.h>
121f9cff23SPekka Enberg #include <sys/mman.h>
132da26a59SPekka Enberg #include <stdbool.h>
146e5e8b8dSPekka Enberg #include <assert.h>
1506e41eeaSPekka Enberg #include <limits.h>
16f5ab5f67SPekka Enberg #include <stdarg.h>
17b8f6afcdSPekka Enberg #include <stdlib.h>
18f5ab5f67SPekka Enberg #include <string.h>
190d1f17ecSPekka Enberg #include <unistd.h>
201f9cff23SPekka Enberg #include <stdio.h>
21b8f6afcdSPekka Enberg #include <fcntl.h>
22b8f6afcdSPekka Enberg 
231f9cff23SPekka Enberg /*
241f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
251f9cff23SPekka Enberg  */
261f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
271f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
281f9cff23SPekka Enberg #endif
291f9cff23SPekka Enberg 
30ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
310d1f17ecSPekka Enberg 
32ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
33ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
34ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
519b1fb1c3SPekka Enberg };
529b1fb1c3SPekka Enberg 
5348cf3877SPekka Enberg static inline bool host_ptr_in_ram(struct kvm *self, void *p)
5448cf3877SPekka Enberg {
5548cf3877SPekka Enberg 	return self->ram_start <= p && p < (self->ram_start + self->ram_size);
5648cf3877SPekka Enberg }
5748cf3877SPekka Enberg 
586753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset)
596753ed2fSPekka Enberg {
606753ed2fSPekka Enberg 	return ((uint32_t)selector << 4) + (uint32_t) offset;
616753ed2fSPekka Enberg }
626753ed2fSPekka Enberg 
636753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset)
64ae1fae34SPekka Enberg {
65ae1fae34SPekka Enberg 	return self->ram_start + offset;
66ae1fae34SPekka Enberg }
67ae1fae34SPekka Enberg 
686753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset)
696753ed2fSPekka Enberg {
706753ed2fSPekka Enberg 	unsigned long flat = segment_to_flat(selector, offset);
716753ed2fSPekka Enberg 
726753ed2fSPekka Enberg 	return guest_flat_to_host(self, flat);
736753ed2fSPekka Enberg }
746753ed2fSPekka Enberg 
75ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
76b8f6afcdSPekka Enberg {
7728fa19c0SPekka Enberg 	int ret;
78b8f6afcdSPekka Enberg 
7973ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
804076b041SPekka Enberg 	if (ret < 0)
814076b041SPekka Enberg 		return false;
824076b041SPekka Enberg 
834076b041SPekka Enberg 	return ret;
844076b041SPekka Enberg }
854076b041SPekka Enberg 
864076b041SPekka Enberg static struct kvm *kvm__new(void)
874076b041SPekka Enberg {
884076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
894076b041SPekka Enberg 
904076b041SPekka Enberg 	if (!self)
914076b041SPekka Enberg 		die("out of memory");
924076b041SPekka Enberg 
934076b041SPekka Enberg 	return self;
944076b041SPekka Enberg }
954076b041SPekka Enberg 
969ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
979ef4c68eSPekka Enberg {
989ef4c68eSPekka Enberg 	free(self->ram_start);
999ef4c68eSPekka Enberg 	free(self);
1009ef4c68eSPekka Enberg }
1019ef4c68eSPekka Enberg 
102ae1fae34SPekka Enberg struct kvm *kvm__init(void)
1034076b041SPekka Enberg {
1042b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1054076b041SPekka Enberg 	struct kvm *self;
1060d1f17ecSPekka Enberg 	long page_size;
1071f9cff23SPekka Enberg 	int mmap_size;
1084076b041SPekka Enberg 	int ret;
1094076b041SPekka Enberg 
1104076b041SPekka Enberg 	self = kvm__new();
1114076b041SPekka Enberg 
11273ac60e6SPekka Enberg 	self->sys_fd = open("/dev/kvm", O_RDWR);
11373ac60e6SPekka Enberg 	if (self->sys_fd < 0)
114f5ab5f67SPekka Enberg 		die_perror("open");
115b8f6afcdSPekka Enberg 
11673ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1176c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
118f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1196c7d8514SPekka Enberg 
12073ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
12173ac60e6SPekka Enberg 	if (self->vm_fd < 0)
122f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
12328fa19c0SPekka Enberg 
1244076b041SPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_USER_MEMORY))
125f5ab5f67SPekka Enberg 		die("KVM_CAP_USER_MEMORY is not supported");
1262da26a59SPekka Enberg 
1270d1f17ecSPekka Enberg 	self->ram_size		= 64UL * 1024UL * 1024UL;
1280d1f17ecSPekka Enberg 
1290d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
1300d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
1310d1f17ecSPekka Enberg 		die("out of memory");
1320d1f17ecSPekka Enberg 
1332b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
1342b0e3342SPekka Enberg 		.slot			= 0,
1352b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
1360d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
1370d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
1382b0e3342SPekka Enberg 	};
1392b0e3342SPekka Enberg 
14073ac60e6SPekka Enberg 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem, 1);
1412b0e3342SPekka Enberg 	if (ret < 0)
142f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
1432b0e3342SPekka Enberg 
144895c2fefSPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_SET_TSS_ADDR))
145f5ab5f67SPekka Enberg 		die("KVM_CAP_SET_TSS_ADDR is not supported");
146895c2fefSPekka Enberg 
14773ac60e6SPekka Enberg 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
148895c2fefSPekka Enberg 	if (ret < 0)
149f5ab5f67SPekka Enberg 		die_perror("KVM_SET_TSS_ADDR ioctl");
150895c2fefSPekka Enberg 
15173ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
1522b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
153f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
1542b0e3342SPekka Enberg 
1551f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
1561f9cff23SPekka Enberg 	if (mmap_size < 0)
157f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
1581f9cff23SPekka Enberg 
1591f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
1601f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
1611f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
1621f9cff23SPekka Enberg 
1634076b041SPekka Enberg 	return self;
1644076b041SPekka Enberg }
1654076b041SPekka Enberg 
166ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
167aee6632eSPekka Enberg {
168aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
169aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
170aee6632eSPekka Enberg 	};
171aee6632eSPekka Enberg 
172aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
173b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
174aee6632eSPekka Enberg }
175aee6632eSPekka Enberg 
1765f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
177b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
178dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
179*2dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
180*2dd4a4edSCyrill Gorcunov 
181*2dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED	0x202
182009b0758SPekka Enberg 
183edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
184009b0758SPekka Enberg {
185009b0758SPekka Enberg 	void *p;
186009b0758SPekka Enberg 	int nr;
187009b0758SPekka Enberg 
188009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
189009b0758SPekka Enberg 		die_perror("lseek");
190009b0758SPekka Enberg 
1916753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
192009b0758SPekka Enberg 
193009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
194009b0758SPekka Enberg 		p += nr;
195009b0758SPekka Enberg 
196dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
197edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
198dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
199edc8a14dSPekka Enberg 
2007fb218bdSPekka Enberg 	return true;
201009b0758SPekka Enberg }
202009b0758SPekka Enberg 
2037fb218bdSPekka Enberg /*
2047fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
2057fb218bdSPekka Enberg  * default.
2067fb218bdSPekka Enberg  */
2077fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
208ae1fae34SPekka Enberg 
209ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
210ae1fae34SPekka Enberg 
21110943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS		4
21210943d14SPekka Enberg 
2136d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline)
214ae1fae34SPekka Enberg {
215bc75b0aeSCyrill Gorcunov 	struct real_intr_desc intr;
21622489bb0SCyrill Gorcunov 	struct boot_params boot;
2174b62331fSPekka Enberg 	unsigned long setup_sects;
218305d9054SCyrill Gorcunov 	unsigned int intr_addr;
219*2dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
2207fb218bdSPekka Enberg 	ssize_t setup_size;
22122489bb0SCyrill Gorcunov 	void *p;
222ae1fae34SPekka Enberg 	int nr;
223ae1fae34SPekka Enberg 
2245d67eaf6SPekka Enberg 	/*
2255d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2265d67eaf6SPekka Enberg 	 * memory layout.
2275d67eaf6SPekka Enberg 	 */
2285d67eaf6SPekka Enberg 
229009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
230009b0758SPekka Enberg 		die_perror("lseek");
231009b0758SPekka Enberg 
232ae1fae34SPekka Enberg 	read(fd, &boot, sizeof(boot));
233ae1fae34SPekka Enberg 
234ae1fae34SPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0)
2357fb218bdSPekka Enberg 		return false;
236ae1fae34SPekka Enberg 
237*2dd4a4edSCyrill Gorcunov 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) {
238ad681038SCyrill Gorcunov 		warning("Too old kernel");
239ad681038SCyrill Gorcunov 		return false;
240ad681038SCyrill Gorcunov 	}
241ad681038SCyrill Gorcunov 
242e93ab78aSPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
243e93ab78aSPekka Enberg 		die_perror("lseek");
244e93ab78aSPekka Enberg 
2454cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
2464cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
24710943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
24810943d14SPekka Enberg 
24954d4a626SPekka Enberg 	setup_size = setup_sects << 9;
2506753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
251ae1fae34SPekka Enberg 
2527fb218bdSPekka Enberg 	if (read(fd, p, setup_size) != setup_size)
2537fb218bdSPekka Enberg 		die_perror("read");
2547fb218bdSPekka Enberg 
2556753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
256ae1fae34SPekka Enberg 
257ae1fae34SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
258ae1fae34SPekka Enberg 		p += nr;
259ae1fae34SPekka Enberg 
260debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
261debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
262debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
263debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
264ad681038SCyrill Gorcunov 
265*2dd4a4edSCyrill Gorcunov 		p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET);
266*2dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
267*2dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
268ad681038SCyrill Gorcunov 
269*2dd4a4edSCyrill Gorcunov 		p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x228);
270*2dd4a4edSCyrill Gorcunov 		*(unsigned long *)p = BOOT_CMDLINE_OFFSET;
271debcfac0SCyrill Gorcunov 	}
272debcfac0SCyrill Gorcunov 
273dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
274edc8a14dSPekka Enberg 	/*
275edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
276edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
277edc8a14dSPekka Enberg 	 */
278edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
279dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
280edc8a14dSPekka Enberg 
281ea684828SCyrill Gorcunov 	/*
28222489bb0SCyrill Gorcunov 	 * Setup a *fake* real mode vector table, it has only
28322489bb0SCyrill Gorcunov 	 * one real hadler which does just iret
28422489bb0SCyrill Gorcunov 	 *
285305d9054SCyrill Gorcunov 	 * This is where the BIOS lives -- BDA area
286ea684828SCyrill Gorcunov 	 */
287305d9054SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + 0, 16);
288305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
289305d9054SCyrill Gorcunov 	memcpy(p, intfake, intfake_size);
290bc75b0aeSCyrill Gorcunov 	intr = (struct real_intr_desc) {
291305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
29222489bb0SCyrill Gorcunov 		.offset		= 0,
293ea684828SCyrill Gorcunov 	};
294bc75b0aeSCyrill Gorcunov 	interrupt_table__setup(&self->interrupt_table, &intr);
295305d9054SCyrill Gorcunov 
296305d9054SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + intfake_size, 16);
297305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
298305d9054SCyrill Gorcunov 	memcpy(p, int10, int10_size);
299305d9054SCyrill Gorcunov 	intr = (struct real_intr_desc) {
300305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
301305d9054SCyrill Gorcunov 		.offset		= 0,
302305d9054SCyrill Gorcunov 	};
303305d9054SCyrill Gorcunov 	interrupt_table__set(&self->interrupt_table, &intr, 0x10);
304305d9054SCyrill Gorcunov 
305305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, 0);
306bc75b0aeSCyrill Gorcunov 	interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE);
307ea684828SCyrill Gorcunov 
3087fb218bdSPekka Enberg 	return true;
309ae1fae34SPekka Enberg }
310ae1fae34SPekka Enberg 
3116d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
3126d1f350dSCyrill Gorcunov 			const char *kernel_cmdline)
313ae1fae34SPekka Enberg {
3147fb218bdSPekka Enberg 	bool ret;
315ae1fae34SPekka Enberg 	int fd;
316ae1fae34SPekka Enberg 
317ae1fae34SPekka Enberg 	fd = open(kernel_filename, O_RDONLY);
318ae1fae34SPekka Enberg 	if (fd < 0)
319ae1fae34SPekka Enberg 		die("unable to open kernel");
320ae1fae34SPekka Enberg 
3216d1f350dSCyrill Gorcunov 	ret = load_bzimage(kvm, fd, kernel_cmdline);
322009b0758SPekka Enberg 	if (ret)
323009b0758SPekka Enberg 		goto found_kernel;
324ae1fae34SPekka Enberg 
325009b0758SPekka Enberg 	ret = load_flat_binary(kvm, fd);
326009b0758SPekka Enberg 	if (ret)
327009b0758SPekka Enberg 		goto found_kernel;
328009b0758SPekka Enberg 
329009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
330009b0758SPekka Enberg 
331009b0758SPekka Enberg found_kernel:
332ae1fae34SPekka Enberg 	return ret;
333ae1fae34SPekka Enberg }
334ae1fae34SPekka Enberg 
33506e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
33606e41eeaSPekka Enberg {
33706e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
33806e41eeaSPekka Enberg 
33906e41eeaSPekka Enberg 	return ip - (cs << 4);
34006e41eeaSPekka Enberg }
34106e41eeaSPekka Enberg 
342f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self)
343f01944c8SPekka Enberg {
344f01944c8SPekka Enberg 	return self->sregs.cr0 & 0x01;
345f01944c8SPekka Enberg }
346f01944c8SPekka Enberg 
347f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
34806e41eeaSPekka Enberg {
349f326512aSPekka Enberg 	uint64_t cs;
350f326512aSPekka Enberg 
351f326512aSPekka Enberg 	/*
352f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
353f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
354f326512aSPekka Enberg 	 */
355f01944c8SPekka Enberg 	if (is_in_protected_mode(self))
356f326512aSPekka Enberg 		return ip;
357f326512aSPekka Enberg 
358f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
35906e41eeaSPekka Enberg 
36006e41eeaSPekka Enberg 	return ip + (cs << 4);
36106e41eeaSPekka Enberg }
36206e41eeaSPekka Enberg 
363dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
364dbdb74c2SPekka Enberg {
365dbdb74c2SPekka Enberg 	/*
366dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
367dbdb74c2SPekka Enberg 	 */
368dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
369dbdb74c2SPekka Enberg }
370dbdb74c2SPekka Enberg 
37153d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs)
37253d48714SPekka Enberg {
37353d48714SPekka Enberg 	struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs));
37453d48714SPekka Enberg 
37553d48714SPekka Enberg 	if (!self)
37653d48714SPekka Enberg 		die("out of memory");
37753d48714SPekka Enberg 
37853d48714SPekka Enberg 	return self;
37953d48714SPekka Enberg }
38053d48714SPekka Enberg 
38153d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER	0x10
38253d48714SPekka Enberg 
38353d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS		0x174
38453d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP		0x175
38553d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP		0x176
38653d48714SPekka Enberg 
38753d48714SPekka Enberg #define MSR_IA32_STAR			0xc0000081
38853d48714SPekka Enberg #define MSR_IA32_LSTAR			0xc0000082
38953d48714SPekka Enberg #define MSR_IA32_CSTAR			0xc0000083
39053d48714SPekka Enberg #define MSR_IA32_FMASK			0xc0000084
39153d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE		0xc0000102
39253d48714SPekka Enberg 
39353d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data)	\
39453d48714SPekka Enberg 	(struct kvm_msr_entry) { .index = _index, .data = _data }
39553d48714SPekka Enberg 
39653d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self)
39753d48714SPekka Enberg {
39853d48714SPekka Enberg 	unsigned long ndx = 0;
39953d48714SPekka Enberg 
40053d48714SPekka Enberg 	self->msrs = kvm_msrs__new(100);
40153d48714SPekka Enberg 
40253d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS,	0x0);
40353d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP,	0x0);
40453d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP,	0x0);
40553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR,		0x0);
40653d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR,		0x0);
40753d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE,	0x0);
40853d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK,		0x0);
40953d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR,		0x0);
41053d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER,	0x0);
41153d48714SPekka Enberg 
41253d48714SPekka Enberg 	self->msrs->nmsrs	= ndx;
41353d48714SPekka Enberg 
41453d48714SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0)
41553d48714SPekka Enberg 		die_perror("KVM_SET_MSRS failed");
41653d48714SPekka Enberg }
41753d48714SPekka Enberg 
4183d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self)
4193d78d3a5SPekka Enberg {
4203d78d3a5SPekka Enberg 	self->fpu = (struct kvm_fpu) {
4213d78d3a5SPekka Enberg 		.fcw		= 0x37f,
4223d78d3a5SPekka Enberg 		.mxcsr		= 0x1f80,
4233d78d3a5SPekka Enberg 	};
4243d78d3a5SPekka Enberg 
4253d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
4263d78d3a5SPekka Enberg 		die_perror("KVM_SET_FPU failed");
4273d78d3a5SPekka Enberg }
4283d78d3a5SPekka Enberg 
4293d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self)
4303d78d3a5SPekka Enberg {
4313d78d3a5SPekka Enberg 	self->regs = (struct kvm_regs) {
4323d78d3a5SPekka Enberg 		/* We start the guest in 16-bit real mode  */
4333d78d3a5SPekka Enberg 		.rflags		= 0x0000000000000002ULL,
4343d78d3a5SPekka Enberg 
4353d78d3a5SPekka Enberg 		.rip		= self->boot_ip,
4363d78d3a5SPekka Enberg 		.rsp		= self->boot_sp,
4373d78d3a5SPekka Enberg 		.rbp		= self->boot_sp,
4383d78d3a5SPekka Enberg 	};
4393d78d3a5SPekka Enberg 
4403d78d3a5SPekka Enberg 	if (self->regs.rip > USHRT_MAX)
4413d78d3a5SPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
4423d78d3a5SPekka Enberg 
4433d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
4443d78d3a5SPekka Enberg 		die_perror("KVM_SET_REGS failed");
4453d78d3a5SPekka Enberg }
4463d78d3a5SPekka Enberg 
4473d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self)
448ae1fae34SPekka Enberg {
44953602077SPekka Enberg 	self->sregs = (struct kvm_sregs) {
45053602077SPekka Enberg 		.cr0		= 0x60000010ULL,
45153602077SPekka Enberg 		.cs		= (struct kvm_segment) {
452dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
453dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
45453602077SPekka Enberg 			.limit		= 0xffffU,
45553602077SPekka Enberg 			.type		= 0x0bU,
45653602077SPekka Enberg 			.present	= 1,
45753602077SPekka Enberg 			.dpl		= 0x03,
45853602077SPekka Enberg 			.s		= 1,
45953602077SPekka Enberg 		},
46053602077SPekka Enberg 		.ss		= (struct kvm_segment) {
461dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
462dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
46353602077SPekka Enberg 			.limit		= 0xffffU,
46453602077SPekka Enberg 			.type		= 0x03U,
46553602077SPekka Enberg 			.present	= 1,
46653602077SPekka Enberg 			.dpl		= 0x03,
46753602077SPekka Enberg 			.s		= 1,
46853602077SPekka Enberg 		},
46953602077SPekka Enberg 		.ds		= (struct kvm_segment) {
470dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
471dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
47253602077SPekka Enberg 			.limit		= 0xffffU,
47353602077SPekka Enberg 			.type		= 0x03U,
47453602077SPekka Enberg 			.present	= 1,
47553602077SPekka Enberg 			.dpl		= 0x03,
47653602077SPekka Enberg 			.s		= 1,
47753602077SPekka Enberg 		},
47853602077SPekka Enberg 		.es		= (struct kvm_segment) {
479dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
480dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
48153602077SPekka Enberg 			.limit		= 0xffffU,
48253602077SPekka Enberg 			.type		= 0x03U,
48353602077SPekka Enberg 			.present	= 1,
48453602077SPekka Enberg 			.dpl		= 0x03,
48553602077SPekka Enberg 			.s		= 1,
48653602077SPekka Enberg 		},
48753602077SPekka Enberg 		.fs		= (struct kvm_segment) {
488dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
489dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
49053602077SPekka Enberg 			.limit		= 0xffffU,
49153602077SPekka Enberg 			.type		= 0x03U,
49253602077SPekka Enberg 			.present	= 1,
49353602077SPekka Enberg 			.dpl		= 0x03,
49453602077SPekka Enberg 			.s		= 1,
49553602077SPekka Enberg 		},
49653602077SPekka Enberg 		.gs		= (struct kvm_segment) {
497dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
498dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
49953602077SPekka Enberg 			.limit		= 0xffffU,
50053602077SPekka Enberg 			.type		= 0x03U,
50153602077SPekka Enberg 			.present	= 1,
50253602077SPekka Enberg 			.dpl		= 0x03,
50353602077SPekka Enberg 			.s		= 1,
50453602077SPekka Enberg 		},
50553602077SPekka Enberg 		.tr		= (struct kvm_segment) {
50653602077SPekka Enberg 			.limit		= 0xffffU,
50753602077SPekka Enberg 			.present	= 1,
50853602077SPekka Enberg 			.type		= 0x03U,
50953602077SPekka Enberg 		},
51053602077SPekka Enberg 		.ldt		= (struct kvm_segment) {
51153602077SPekka Enberg 			.limit		= 0xffffU,
51253602077SPekka Enberg 			.present	= 1,
5137085d935SPekka Enberg 			.type		= 0x02U,
51453602077SPekka Enberg 		},
51553602077SPekka Enberg 		.gdt		= (struct kvm_dtable) {
51653602077SPekka Enberg 			.limit		= 0xffffU,
51753602077SPekka Enberg 		},
51853602077SPekka Enberg 		.idt		= (struct kvm_dtable) {
51953602077SPekka Enberg 			.limit		= 0xffffU,
52053602077SPekka Enberg 		},
52153602077SPekka Enberg 	};
52253602077SPekka Enberg 
52353602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
52453602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
5253d78d3a5SPekka Enberg }
52606e41eeaSPekka Enberg 
5273d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self)
5283d78d3a5SPekka Enberg {
5293d78d3a5SPekka Enberg 	kvm__setup_sregs(self);
530dbdb74c2SPekka Enberg 
5313d78d3a5SPekka Enberg 	kvm__setup_regs(self);
53206e41eeaSPekka Enberg 
5333d78d3a5SPekka Enberg 	kvm__setup_fpu(self);
53453d48714SPekka Enberg 
53553d48714SPekka Enberg 	kvm__setup_msrs(self);
536ae1fae34SPekka Enberg }
537ae1fae34SPekka Enberg 
538ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
539ae1fae34SPekka Enberg {
540ae1fae34SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0)
541ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
542ae1fae34SPekka Enberg }
543ae1fae34SPekka Enberg 
5448351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable)
5458351aaddSPekka Enberg {
5468351aaddSPekka Enberg 	printf(" %s                 %016" PRIx64 "  %08" PRIx16 "\n",
5478351aaddSPekka Enberg 		name, (uint64_t) dtable->base, (uint16_t) dtable->limit);
5488351aaddSPekka Enberg }
5498351aaddSPekka Enberg 
55053602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
55153602077SPekka Enberg {
552ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
55353602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
554ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
55553602077SPekka Enberg }
55653602077SPekka Enberg 
557ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
5587118d2caSPekka Enberg {
55953602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
56053602077SPekka Enberg 	unsigned long cr4, cr8;
5617118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
5627118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
5637118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
5647118d2caSPekka Enberg 	unsigned long r10, r11, r12;
5657118d2caSPekka Enberg 	unsigned long r13, r14, r15;
5667118d2caSPekka Enberg 	unsigned long rip, rsp;
56753602077SPekka Enberg 	struct kvm_sregs sregs;
568a2fe6199SPekka Enberg 	unsigned long rflags;
5697118d2caSPekka Enberg 	struct kvm_regs regs;
570ce5e0ecbSPekka Enberg 	int i;
5717118d2caSPekka Enberg 
5727118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
5737118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
5747118d2caSPekka Enberg 
575a2fe6199SPekka Enberg 	rflags = regs.rflags;
576a2fe6199SPekka Enberg 
5777118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
5787118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
5797118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
5807118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
5817118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
5827118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
5837118d2caSPekka Enberg 
5847118d2caSPekka Enberg 	printf("Registers:\n");
5852177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
586ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
5877118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
5887118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
5897118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
5907118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
59153602077SPekka Enberg 
59253602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
59353602077SPekka Enberg 		die("KVM_GET_REGS failed");
59453602077SPekka Enberg 
59553602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
59653602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
59753602077SPekka Enberg 
59853602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
59953602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
600ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
601ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
60253602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
60353602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
60453602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
60553602077SPekka Enberg 	print_segment("es ", &sregs.es);
60653602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
60753602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
608ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
609ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
6108351aaddSPekka Enberg 	print_dtable("gdt", &sregs.gdt);
6118351aaddSPekka Enberg 	print_dtable("idt", &sregs.idt);
6122049569dSPekka Enberg 	printf(" [ efer: %016lx  apic base: %016lx  nmi: %s ]\n", (uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
6132049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
614ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
615ce5e0ecbSPekka Enberg 	printf(" ");
616ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
617ce5e0ecbSPekka Enberg 		printf("%016lx ", (uint64_t) sregs.interrupt_bitmap[i]);
618ce5e0ecbSPekka Enberg 	printf("\n");
6197118d2caSPekka Enberg }
6207118d2caSPekka Enberg 
621ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
6226f10be05SPekka Enberg {
6236f10be05SPekka Enberg 	unsigned int code_bytes = 64;
6246f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
6256f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
6266f10be05SPekka Enberg 	unsigned char c;
627ae1fae34SPekka Enberg 	unsigned int i;
6286f10be05SPekka Enberg 	uint8_t *ip;
6296f10be05SPekka Enberg 
6302a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
6312a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
6322a601aafSPekka Enberg 
6332a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
6342a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
6352a601aafSPekka Enberg 
636f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
6376f10be05SPekka Enberg 
6386f10be05SPekka Enberg 	printf("Code: ");
6396f10be05SPekka Enberg 
6406f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
64148cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, ip))
64248cf3877SPekka Enberg 			break;
64348cf3877SPekka Enberg 
6446e8abc38SPekka Enberg 		c = *ip;
6456e8abc38SPekka Enberg 
646f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
6476f10be05SPekka Enberg 			printf("<%02x> ", c);
6486f10be05SPekka Enberg 		else
6496f10be05SPekka Enberg 			printf("%02x ", c);
6506f10be05SPekka Enberg 	}
6516f10be05SPekka Enberg 
6526f10be05SPekka Enberg 	printf("\n");
6532a7d39a4SPekka Enberg 
6542a7d39a4SPekka Enberg 	printf("Stack:\n");
6552a7d39a4SPekka Enberg 	kvm__dump_mem(self, self->regs.rsp, 32);
6566f10be05SPekka Enberg }
657090f898eSCyrill Gorcunov 
658f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self)
659f01944c8SPekka Enberg {
660f01944c8SPekka Enberg 	uint64_t *pte1;
661f01944c8SPekka Enberg 	uint64_t *pte2;
662f01944c8SPekka Enberg 	uint64_t *pte3;
663f01944c8SPekka Enberg 	uint64_t *pte4;
664f01944c8SPekka Enberg 
665f01944c8SPekka Enberg 	if (!is_in_protected_mode(self))
666f01944c8SPekka Enberg 		return;
667f01944c8SPekka Enberg 
668f01944c8SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
669f01944c8SPekka Enberg 		die("KVM_GET_SREGS failed");
670f01944c8SPekka Enberg 
671f01944c8SPekka Enberg 	pte4	= guest_flat_to_host(self, self->sregs.cr3);
67248cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte4))
67348cf3877SPekka Enberg 		return;
67448cf3877SPekka Enberg 
675f01944c8SPekka Enberg 	pte3	= guest_flat_to_host(self, (*pte4 & ~0xfff));
67648cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte3))
67748cf3877SPekka Enberg 		return;
67848cf3877SPekka Enberg 
679f01944c8SPekka Enberg 	pte2	= guest_flat_to_host(self, (*pte3 & ~0xfff));
68048cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte2))
68148cf3877SPekka Enberg 		return;
68248cf3877SPekka Enberg 
683f01944c8SPekka Enberg 	pte1	= guest_flat_to_host(self, (*pte2 & ~0xfff));
68448cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte1))
68548cf3877SPekka Enberg 		return;
686f01944c8SPekka Enberg 
687f01944c8SPekka Enberg 	printf("Page Tables:\n");
688f01944c8SPekka Enberg 	if (*pte2 & (1 << 7))
689f01944c8SPekka Enberg 		printf(" pte4: %016lx   pte3: %016lx   pte2: %016lx\n", *pte4, *pte3, *pte2);
690f01944c8SPekka Enberg 	else
691f01944c8SPekka Enberg 		printf(" pte4: %016lx   pte3: %016lx   pte2: %016lx   pte1: %016lx\n", *pte4, *pte3, *pte2, *pte1);
692f01944c8SPekka Enberg }
693f01944c8SPekka Enberg 
694090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
695090f898eSCyrill Gorcunov {
696090f898eSCyrill Gorcunov 	unsigned char *p;
697090f898eSCyrill Gorcunov 	unsigned long n;
698090f898eSCyrill Gorcunov 
699090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
700090f898eSCyrill Gorcunov 	if (!size)
701090f898eSCyrill Gorcunov 		return;
702090f898eSCyrill Gorcunov 
7032a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
704090f898eSCyrill Gorcunov 
70548cf3877SPekka Enberg 	for (n = 0; n < size; n+=8) {
70648cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
70748cf3877SPekka Enberg 			break;
70848cf3877SPekka Enberg 
709090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
710090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
711090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
712090f898eSCyrill Gorcunov 	}
71348cf3877SPekka Enberg }
714