xref: /kvmtool/kvm.c (revision 48cf3877343510e498890e10443bf387ffdf1c14)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3eda03319SPekka Enberg #include "kvm/interrupt.h"
4f3150089SPekka Enberg #include "kvm/util.h"
5eda03319SPekka Enberg 
66c7d8514SPekka Enberg #include <linux/kvm.h>
7f5ab5f67SPekka Enberg 
8f5ab5f67SPekka Enberg #include <asm/bootparam.h>
9f5ab5f67SPekka Enberg 
10ae1fae34SPekka Enberg #include <sys/ioctl.h>
111f9cff23SPekka Enberg #include <inttypes.h>
121f9cff23SPekka Enberg #include <sys/mman.h>
132da26a59SPekka Enberg #include <stdbool.h>
146e5e8b8dSPekka Enberg #include <assert.h>
1506e41eeaSPekka Enberg #include <limits.h>
16f5ab5f67SPekka Enberg #include <stdarg.h>
17b8f6afcdSPekka Enberg #include <stdlib.h>
18f5ab5f67SPekka Enberg #include <string.h>
190d1f17ecSPekka Enberg #include <unistd.h>
201f9cff23SPekka Enberg #include <stdio.h>
21b8f6afcdSPekka Enberg #include <fcntl.h>
22b8f6afcdSPekka Enberg 
231f9cff23SPekka Enberg /*
241f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
251f9cff23SPekka Enberg  */
261f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
271f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
281f9cff23SPekka Enberg #endif
291f9cff23SPekka Enberg 
30ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
310d1f17ecSPekka Enberg 
32ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
33ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
34ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
519b1fb1c3SPekka Enberg };
529b1fb1c3SPekka Enberg 
53*48cf3877SPekka Enberg static inline bool host_ptr_in_ram(struct kvm *self, void *p)
54*48cf3877SPekka Enberg {
55*48cf3877SPekka Enberg 	return self->ram_start <= p && p < (self->ram_start + self->ram_size);
56*48cf3877SPekka Enberg }
57*48cf3877SPekka Enberg 
586753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset)
596753ed2fSPekka Enberg {
606753ed2fSPekka Enberg 	return ((uint32_t)selector << 4) + (uint32_t) offset;
616753ed2fSPekka Enberg }
626753ed2fSPekka Enberg 
636753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset)
64ae1fae34SPekka Enberg {
65ae1fae34SPekka Enberg 	return self->ram_start + offset;
66ae1fae34SPekka Enberg }
67ae1fae34SPekka Enberg 
686753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset)
696753ed2fSPekka Enberg {
706753ed2fSPekka Enberg 	unsigned long flat = segment_to_flat(selector, offset);
716753ed2fSPekka Enberg 
726753ed2fSPekka Enberg 	return guest_flat_to_host(self, flat);
736753ed2fSPekka Enberg }
746753ed2fSPekka Enberg 
75ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
76b8f6afcdSPekka Enberg {
7728fa19c0SPekka Enberg 	int ret;
78b8f6afcdSPekka Enberg 
7973ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
804076b041SPekka Enberg 	if (ret < 0)
814076b041SPekka Enberg 		return false;
824076b041SPekka Enberg 
834076b041SPekka Enberg 	return ret;
844076b041SPekka Enberg }
854076b041SPekka Enberg 
864076b041SPekka Enberg static struct kvm *kvm__new(void)
874076b041SPekka Enberg {
884076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
894076b041SPekka Enberg 
904076b041SPekka Enberg 	if (!self)
914076b041SPekka Enberg 		die("out of memory");
924076b041SPekka Enberg 
934076b041SPekka Enberg 	return self;
944076b041SPekka Enberg }
954076b041SPekka Enberg 
969ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
979ef4c68eSPekka Enberg {
989ef4c68eSPekka Enberg 	free(self->ram_start);
999ef4c68eSPekka Enberg 	free(self);
1009ef4c68eSPekka Enberg }
1019ef4c68eSPekka Enberg 
102ae1fae34SPekka Enberg struct kvm *kvm__init(void)
1034076b041SPekka Enberg {
1042b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1054076b041SPekka Enberg 	struct kvm *self;
1060d1f17ecSPekka Enberg 	long page_size;
1071f9cff23SPekka Enberg 	int mmap_size;
1084076b041SPekka Enberg 	int ret;
1094076b041SPekka Enberg 
1104076b041SPekka Enberg 	self = kvm__new();
1114076b041SPekka Enberg 
11273ac60e6SPekka Enberg 	self->sys_fd = open("/dev/kvm", O_RDWR);
11373ac60e6SPekka Enberg 	if (self->sys_fd < 0)
114f5ab5f67SPekka Enberg 		die_perror("open");
115b8f6afcdSPekka Enberg 
11673ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1176c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
118f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1196c7d8514SPekka Enberg 
12073ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
12173ac60e6SPekka Enberg 	if (self->vm_fd < 0)
122f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
12328fa19c0SPekka Enberg 
1244076b041SPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_USER_MEMORY))
125f5ab5f67SPekka Enberg 		die("KVM_CAP_USER_MEMORY is not supported");
1262da26a59SPekka Enberg 
1270d1f17ecSPekka Enberg 	self->ram_size		= 64UL * 1024UL * 1024UL;
1280d1f17ecSPekka Enberg 
1290d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
1300d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
1310d1f17ecSPekka Enberg 		die("out of memory");
1320d1f17ecSPekka Enberg 
1332b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
1342b0e3342SPekka Enberg 		.slot			= 0,
1352b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
1360d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
1370d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
1382b0e3342SPekka Enberg 	};
1392b0e3342SPekka Enberg 
14073ac60e6SPekka Enberg 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem, 1);
1412b0e3342SPekka Enberg 	if (ret < 0)
142f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
1432b0e3342SPekka Enberg 
144895c2fefSPekka Enberg 	if (!kvm__supports_extension(self, KVM_CAP_SET_TSS_ADDR))
145f5ab5f67SPekka Enberg 		die("KVM_CAP_SET_TSS_ADDR is not supported");
146895c2fefSPekka Enberg 
14773ac60e6SPekka Enberg 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
148895c2fefSPekka Enberg 	if (ret < 0)
149f5ab5f67SPekka Enberg 		die_perror("KVM_SET_TSS_ADDR ioctl");
150895c2fefSPekka Enberg 
15173ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
1522b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
153f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
1542b0e3342SPekka Enberg 
1551f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
1561f9cff23SPekka Enberg 	if (mmap_size < 0)
157f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
1581f9cff23SPekka Enberg 
1591f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
1601f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
1611f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
1621f9cff23SPekka Enberg 
1634076b041SPekka Enberg 	return self;
1644076b041SPekka Enberg }
1654076b041SPekka Enberg 
166ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
167aee6632eSPekka Enberg {
168aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
169aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
170aee6632eSPekka Enberg 	};
171aee6632eSPekka Enberg 
172aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
173b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
174aee6632eSPekka Enberg }
175aee6632eSPekka Enberg 
1765f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
177b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
178dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
179009b0758SPekka Enberg 
180edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
181009b0758SPekka Enberg {
182009b0758SPekka Enberg 	void *p;
183009b0758SPekka Enberg 	int nr;
184009b0758SPekka Enberg 
185009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
186009b0758SPekka Enberg 		die_perror("lseek");
187009b0758SPekka Enberg 
1886753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
189009b0758SPekka Enberg 
190009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
191009b0758SPekka Enberg 		p += nr;
192009b0758SPekka Enberg 
193dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
194edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
195dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
196edc8a14dSPekka Enberg 
1977fb218bdSPekka Enberg 	return true;
198009b0758SPekka Enberg }
199009b0758SPekka Enberg 
2007fb218bdSPekka Enberg /*
2017fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
2027fb218bdSPekka Enberg  * default.
2037fb218bdSPekka Enberg  */
2047fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
205ae1fae34SPekka Enberg 
206ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
207ae1fae34SPekka Enberg 
20810943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS		4
20910943d14SPekka Enberg 
2106d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline)
211ae1fae34SPekka Enberg {
212bc75b0aeSCyrill Gorcunov 	struct real_intr_desc intr;
21322489bb0SCyrill Gorcunov 	struct boot_params boot;
2144b62331fSPekka Enberg 	unsigned long setup_sects;
215305d9054SCyrill Gorcunov 	unsigned int intr_addr;
216debcfac0SCyrill Gorcunov 	size_t cmdline_size, cmdline_offset;
2177fb218bdSPekka Enberg 	ssize_t setup_size;
21822489bb0SCyrill Gorcunov 	void *p;
219ae1fae34SPekka Enberg 	int nr;
220ae1fae34SPekka Enberg 
2215d67eaf6SPekka Enberg 	/*
2225d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2235d67eaf6SPekka Enberg 	 * memory layout.
2245d67eaf6SPekka Enberg 	 */
2255d67eaf6SPekka Enberg 
226009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
227009b0758SPekka Enberg 		die_perror("lseek");
228009b0758SPekka Enberg 
229ae1fae34SPekka Enberg 	read(fd, &boot, sizeof(boot));
230ae1fae34SPekka Enberg 
231ae1fae34SPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0)
2327fb218bdSPekka Enberg 		return false;
233ae1fae34SPekka Enberg 
234ad681038SCyrill Gorcunov 	if (boot.hdr.version < 0x0200) {
235ad681038SCyrill Gorcunov 		warning("Too old kernel");
236ad681038SCyrill Gorcunov 		return false;
237ad681038SCyrill Gorcunov 	}
238ad681038SCyrill Gorcunov 
239e93ab78aSPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
240e93ab78aSPekka Enberg 		die_perror("lseek");
241e93ab78aSPekka Enberg 
2424cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
2434cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
24410943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
24510943d14SPekka Enberg 
24654d4a626SPekka Enberg 	setup_size = setup_sects << 9;
2476753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
248ae1fae34SPekka Enberg 
2497fb218bdSPekka Enberg 	if (read(fd, p, setup_size) != setup_size)
2507fb218bdSPekka Enberg 		die_perror("read");
2517fb218bdSPekka Enberg 
2526753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
253ae1fae34SPekka Enberg 
254ae1fae34SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
255ae1fae34SPekka Enberg 		p += nr;
256ae1fae34SPekka Enberg 
257debcfac0SCyrill Gorcunov 	if (boot.hdr.version < 0x0206)
258debcfac0SCyrill Gorcunov 		boot.hdr.cmdline_size = 256;
259debcfac0SCyrill Gorcunov 
260debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
261debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
262debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
263debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
264ad681038SCyrill Gorcunov 	} else
265ad681038SCyrill Gorcunov 		cmdline_size = 0;
266ad681038SCyrill Gorcunov 
267ad681038SCyrill Gorcunov 
268ad681038SCyrill Gorcunov 	if (boot.hdr.version < 0x0202 || !(boot.hdr.loadflags & 0x01))
269ad681038SCyrill Gorcunov 		cmdline_offset = (0x9ff0 - cmdline_size) & ~15;
270ad681038SCyrill Gorcunov 	else
271ad681038SCyrill Gorcunov 		cmdline_offset = 0x10000;
272ad681038SCyrill Gorcunov 
27383f4324cSCyrill Gorcunov 	if (kernel_cmdline) {
27483f4324cSCyrill Gorcunov 		p = guest_flat_to_host(self, cmdline_offset);
27583f4324cSCyrill Gorcunov 		memset(p, 0, cmdline_size);
27683f4324cSCyrill Gorcunov 		strcpy(p, kernel_cmdline);
27783f4324cSCyrill Gorcunov 	}
27883f4324cSCyrill Gorcunov 
279ad681038SCyrill Gorcunov 	if (boot.hdr.version >= 0x0200) {
280ad681038SCyrill Gorcunov 		if (boot.hdr.version >= 0x0202) {
281ad681038SCyrill Gorcunov 			boot.hdr.cmd_line_ptr =
282ad681038SCyrill Gorcunov 				(BOOT_LOADER_SELECTOR << 4) + cmdline_offset;
283ad681038SCyrill Gorcunov 		} else if (boot.hdr.version >= 0x0201) {
284ad681038SCyrill Gorcunov 			boot.hdr.heap_end_ptr = cmdline_offset - 0x0200;
285ad681038SCyrill Gorcunov 			boot.hdr.loadflags |= CAN_USE_HEAP;
286ad681038SCyrill Gorcunov 		}
287ad681038SCyrill Gorcunov 
288debcfac0SCyrill Gorcunov 	}
289debcfac0SCyrill Gorcunov 
290dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
291edc8a14dSPekka Enberg 	/*
292edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
293edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
294edc8a14dSPekka Enberg 	 */
295edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
296dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
297edc8a14dSPekka Enberg 
298ea684828SCyrill Gorcunov 	/*
29922489bb0SCyrill Gorcunov 	 * Setup a *fake* real mode vector table, it has only
30022489bb0SCyrill Gorcunov 	 * one real hadler which does just iret
30122489bb0SCyrill Gorcunov 	 *
302305d9054SCyrill Gorcunov 	 * This is where the BIOS lives -- BDA area
303ea684828SCyrill Gorcunov 	 */
304305d9054SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + 0, 16);
305305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
306305d9054SCyrill Gorcunov 	memcpy(p, intfake, intfake_size);
307bc75b0aeSCyrill Gorcunov 	intr = (struct real_intr_desc) {
308305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
30922489bb0SCyrill Gorcunov 		.offset		= 0,
310ea684828SCyrill Gorcunov 	};
311bc75b0aeSCyrill Gorcunov 	interrupt_table__setup(&self->interrupt_table, &intr);
312305d9054SCyrill Gorcunov 
313305d9054SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + intfake_size, 16);
314305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
315305d9054SCyrill Gorcunov 	memcpy(p, int10, int10_size);
316305d9054SCyrill Gorcunov 	intr = (struct real_intr_desc) {
317305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
318305d9054SCyrill Gorcunov 		.offset		= 0,
319305d9054SCyrill Gorcunov 	};
320305d9054SCyrill Gorcunov 	interrupt_table__set(&self->interrupt_table, &intr, 0x10);
321305d9054SCyrill Gorcunov 
322305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, 0);
323bc75b0aeSCyrill Gorcunov 	interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE);
324ea684828SCyrill Gorcunov 
3257fb218bdSPekka Enberg 	return true;
326ae1fae34SPekka Enberg }
327ae1fae34SPekka Enberg 
3286d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
3296d1f350dSCyrill Gorcunov 			const char *kernel_cmdline)
330ae1fae34SPekka Enberg {
3317fb218bdSPekka Enberg 	bool ret;
332ae1fae34SPekka Enberg 	int fd;
333ae1fae34SPekka Enberg 
334ae1fae34SPekka Enberg 	fd = open(kernel_filename, O_RDONLY);
335ae1fae34SPekka Enberg 	if (fd < 0)
336ae1fae34SPekka Enberg 		die("unable to open kernel");
337ae1fae34SPekka Enberg 
3386d1f350dSCyrill Gorcunov 	ret = load_bzimage(kvm, fd, kernel_cmdline);
339009b0758SPekka Enberg 	if (ret)
340009b0758SPekka Enberg 		goto found_kernel;
341ae1fae34SPekka Enberg 
342009b0758SPekka Enberg 	ret = load_flat_binary(kvm, fd);
343009b0758SPekka Enberg 	if (ret)
344009b0758SPekka Enberg 		goto found_kernel;
345009b0758SPekka Enberg 
346009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
347009b0758SPekka Enberg 
348009b0758SPekka Enberg found_kernel:
349ae1fae34SPekka Enberg 	return ret;
350ae1fae34SPekka Enberg }
351ae1fae34SPekka Enberg 
35206e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
35306e41eeaSPekka Enberg {
35406e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
35506e41eeaSPekka Enberg 
35606e41eeaSPekka Enberg 	return ip - (cs << 4);
35706e41eeaSPekka Enberg }
35806e41eeaSPekka Enberg 
359f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self)
360f01944c8SPekka Enberg {
361f01944c8SPekka Enberg 	return self->sregs.cr0 & 0x01;
362f01944c8SPekka Enberg }
363f01944c8SPekka Enberg 
364f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
36506e41eeaSPekka Enberg {
366f326512aSPekka Enberg 	uint64_t cs;
367f326512aSPekka Enberg 
368f326512aSPekka Enberg 	/*
369f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
370f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
371f326512aSPekka Enberg 	 */
372f01944c8SPekka Enberg 	if (is_in_protected_mode(self))
373f326512aSPekka Enberg 		return ip;
374f326512aSPekka Enberg 
375f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
37606e41eeaSPekka Enberg 
37706e41eeaSPekka Enberg 	return ip + (cs << 4);
37806e41eeaSPekka Enberg }
37906e41eeaSPekka Enberg 
380dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
381dbdb74c2SPekka Enberg {
382dbdb74c2SPekka Enberg 	/*
383dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
384dbdb74c2SPekka Enberg 	 */
385dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
386dbdb74c2SPekka Enberg }
387dbdb74c2SPekka Enberg 
38853d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs)
38953d48714SPekka Enberg {
39053d48714SPekka Enberg 	struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs));
39153d48714SPekka Enberg 
39253d48714SPekka Enberg 	if (!self)
39353d48714SPekka Enberg 		die("out of memory");
39453d48714SPekka Enberg 
39553d48714SPekka Enberg 	return self;
39653d48714SPekka Enberg }
39753d48714SPekka Enberg 
39853d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER	0x10
39953d48714SPekka Enberg 
40053d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS		0x174
40153d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP		0x175
40253d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP		0x176
40353d48714SPekka Enberg 
40453d48714SPekka Enberg #define MSR_IA32_STAR			0xc0000081
40553d48714SPekka Enberg #define MSR_IA32_LSTAR			0xc0000082
40653d48714SPekka Enberg #define MSR_IA32_CSTAR			0xc0000083
40753d48714SPekka Enberg #define MSR_IA32_FMASK			0xc0000084
40853d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE		0xc0000102
40953d48714SPekka Enberg 
41053d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data)	\
41153d48714SPekka Enberg 	(struct kvm_msr_entry) { .index = _index, .data = _data }
41253d48714SPekka Enberg 
41353d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self)
41453d48714SPekka Enberg {
41553d48714SPekka Enberg 	unsigned long ndx = 0;
41653d48714SPekka Enberg 
41753d48714SPekka Enberg 	self->msrs = kvm_msrs__new(100);
41853d48714SPekka Enberg 
41953d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS,	0x0);
42053d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP,	0x0);
42153d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP,	0x0);
42253d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR,		0x0);
42353d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR,		0x0);
42453d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE,	0x0);
42553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK,		0x0);
42653d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR,		0x0);
42753d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER,	0x0);
42853d48714SPekka Enberg 
42953d48714SPekka Enberg 	self->msrs->nmsrs	= ndx;
43053d48714SPekka Enberg 
43153d48714SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0)
43253d48714SPekka Enberg 		die_perror("KVM_SET_MSRS failed");
43353d48714SPekka Enberg }
43453d48714SPekka Enberg 
4353d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self)
4363d78d3a5SPekka Enberg {
4373d78d3a5SPekka Enberg 	self->fpu = (struct kvm_fpu) {
4383d78d3a5SPekka Enberg 		.fcw		= 0x37f,
4393d78d3a5SPekka Enberg 		.mxcsr		= 0x1f80,
4403d78d3a5SPekka Enberg 	};
4413d78d3a5SPekka Enberg 
4423d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
4433d78d3a5SPekka Enberg 		die_perror("KVM_SET_FPU failed");
4443d78d3a5SPekka Enberg }
4453d78d3a5SPekka Enberg 
4463d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self)
4473d78d3a5SPekka Enberg {
4483d78d3a5SPekka Enberg 	self->regs = (struct kvm_regs) {
4493d78d3a5SPekka Enberg 		/* We start the guest in 16-bit real mode  */
4503d78d3a5SPekka Enberg 		.rflags		= 0x0000000000000002ULL,
4513d78d3a5SPekka Enberg 
4523d78d3a5SPekka Enberg 		.rip		= self->boot_ip,
4533d78d3a5SPekka Enberg 		.rsp		= self->boot_sp,
4543d78d3a5SPekka Enberg 		.rbp		= self->boot_sp,
4553d78d3a5SPekka Enberg 	};
4563d78d3a5SPekka Enberg 
4573d78d3a5SPekka Enberg 	if (self->regs.rip > USHRT_MAX)
4583d78d3a5SPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
4593d78d3a5SPekka Enberg 
4603d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
4613d78d3a5SPekka Enberg 		die_perror("KVM_SET_REGS failed");
4623d78d3a5SPekka Enberg }
4633d78d3a5SPekka Enberg 
4643d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self)
465ae1fae34SPekka Enberg {
46653602077SPekka Enberg 	self->sregs = (struct kvm_sregs) {
46753602077SPekka Enberg 		.cr0		= 0x60000010ULL,
46853602077SPekka Enberg 		.cs		= (struct kvm_segment) {
469dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
470dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
47153602077SPekka Enberg 			.limit		= 0xffffU,
47253602077SPekka Enberg 			.type		= 0x0bU,
47353602077SPekka Enberg 			.present	= 1,
47453602077SPekka Enberg 			.dpl		= 0x03,
47553602077SPekka Enberg 			.s		= 1,
47653602077SPekka Enberg 		},
47753602077SPekka Enberg 		.ss		= (struct kvm_segment) {
478dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
479dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
48053602077SPekka Enberg 			.limit		= 0xffffU,
48153602077SPekka Enberg 			.type		= 0x03U,
48253602077SPekka Enberg 			.present	= 1,
48353602077SPekka Enberg 			.dpl		= 0x03,
48453602077SPekka Enberg 			.s		= 1,
48553602077SPekka Enberg 		},
48653602077SPekka Enberg 		.ds		= (struct kvm_segment) {
487dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
488dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
48953602077SPekka Enberg 			.limit		= 0xffffU,
49053602077SPekka Enberg 			.type		= 0x03U,
49153602077SPekka Enberg 			.present	= 1,
49253602077SPekka Enberg 			.dpl		= 0x03,
49353602077SPekka Enberg 			.s		= 1,
49453602077SPekka Enberg 		},
49553602077SPekka Enberg 		.es		= (struct kvm_segment) {
496dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
497dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
49853602077SPekka Enberg 			.limit		= 0xffffU,
49953602077SPekka Enberg 			.type		= 0x03U,
50053602077SPekka Enberg 			.present	= 1,
50153602077SPekka Enberg 			.dpl		= 0x03,
50253602077SPekka Enberg 			.s		= 1,
50353602077SPekka Enberg 		},
50453602077SPekka Enberg 		.fs		= (struct kvm_segment) {
505dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
506dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
50753602077SPekka Enberg 			.limit		= 0xffffU,
50853602077SPekka Enberg 			.type		= 0x03U,
50953602077SPekka Enberg 			.present	= 1,
51053602077SPekka Enberg 			.dpl		= 0x03,
51153602077SPekka Enberg 			.s		= 1,
51253602077SPekka Enberg 		},
51353602077SPekka Enberg 		.gs		= (struct kvm_segment) {
514dbdb74c2SPekka Enberg 			.selector	= self->boot_selector,
515dbdb74c2SPekka Enberg 			.base		= selector_to_base(self->boot_selector),
51653602077SPekka Enberg 			.limit		= 0xffffU,
51753602077SPekka Enberg 			.type		= 0x03U,
51853602077SPekka Enberg 			.present	= 1,
51953602077SPekka Enberg 			.dpl		= 0x03,
52053602077SPekka Enberg 			.s		= 1,
52153602077SPekka Enberg 		},
52253602077SPekka Enberg 		.tr		= (struct kvm_segment) {
52353602077SPekka Enberg 			.limit		= 0xffffU,
52453602077SPekka Enberg 			.present	= 1,
52553602077SPekka Enberg 			.type		= 0x03U,
52653602077SPekka Enberg 		},
52753602077SPekka Enberg 		.ldt		= (struct kvm_segment) {
52853602077SPekka Enberg 			.limit		= 0xffffU,
52953602077SPekka Enberg 			.present	= 1,
5307085d935SPekka Enberg 			.type		= 0x02U,
53153602077SPekka Enberg 		},
53253602077SPekka Enberg 		.gdt		= (struct kvm_dtable) {
53353602077SPekka Enberg 			.limit		= 0xffffU,
53453602077SPekka Enberg 		},
53553602077SPekka Enberg 		.idt		= (struct kvm_dtable) {
53653602077SPekka Enberg 			.limit		= 0xffffU,
53753602077SPekka Enberg 		},
53853602077SPekka Enberg 	};
53953602077SPekka Enberg 
54053602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
54153602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
5423d78d3a5SPekka Enberg }
54306e41eeaSPekka Enberg 
5443d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self)
5453d78d3a5SPekka Enberg {
5463d78d3a5SPekka Enberg 	kvm__setup_sregs(self);
547dbdb74c2SPekka Enberg 
5483d78d3a5SPekka Enberg 	kvm__setup_regs(self);
54906e41eeaSPekka Enberg 
5503d78d3a5SPekka Enberg 	kvm__setup_fpu(self);
55153d48714SPekka Enberg 
55253d48714SPekka Enberg 	kvm__setup_msrs(self);
553ae1fae34SPekka Enberg }
554ae1fae34SPekka Enberg 
555ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
556ae1fae34SPekka Enberg {
557ae1fae34SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0)
558ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
559ae1fae34SPekka Enberg }
560ae1fae34SPekka Enberg 
5618351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable)
5628351aaddSPekka Enberg {
5638351aaddSPekka Enberg 	printf(" %s                 %016" PRIx64 "  %08" PRIx16 "\n",
5648351aaddSPekka Enberg 		name, (uint64_t) dtable->base, (uint16_t) dtable->limit);
5658351aaddSPekka Enberg }
5668351aaddSPekka Enberg 
56753602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
56853602077SPekka Enberg {
569ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
57053602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
571ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
57253602077SPekka Enberg }
57353602077SPekka Enberg 
574ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
5757118d2caSPekka Enberg {
57653602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
57753602077SPekka Enberg 	unsigned long cr4, cr8;
5787118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
5797118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
5807118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
5817118d2caSPekka Enberg 	unsigned long r10, r11, r12;
5827118d2caSPekka Enberg 	unsigned long r13, r14, r15;
5837118d2caSPekka Enberg 	unsigned long rip, rsp;
58453602077SPekka Enberg 	struct kvm_sregs sregs;
585a2fe6199SPekka Enberg 	unsigned long rflags;
5867118d2caSPekka Enberg 	struct kvm_regs regs;
587ce5e0ecbSPekka Enberg 	int i;
5887118d2caSPekka Enberg 
5897118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
5907118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
5917118d2caSPekka Enberg 
592a2fe6199SPekka Enberg 	rflags = regs.rflags;
593a2fe6199SPekka Enberg 
5947118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
5957118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
5967118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
5977118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
5987118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
5997118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
6007118d2caSPekka Enberg 
6017118d2caSPekka Enberg 	printf("Registers:\n");
6022177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
603ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
6047118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
6057118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
6067118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
6077118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
60853602077SPekka Enberg 
60953602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
61053602077SPekka Enberg 		die("KVM_GET_REGS failed");
61153602077SPekka Enberg 
61253602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
61353602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
61453602077SPekka Enberg 
61553602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
61653602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
617ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
618ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
61953602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
62053602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
62153602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
62253602077SPekka Enberg 	print_segment("es ", &sregs.es);
62353602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
62453602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
625ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
626ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
6278351aaddSPekka Enberg 	print_dtable("gdt", &sregs.gdt);
6288351aaddSPekka Enberg 	print_dtable("idt", &sregs.idt);
6292049569dSPekka Enberg 	printf(" [ efer: %016lx  apic base: %016lx  nmi: %s ]\n", (uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
6302049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
631ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
632ce5e0ecbSPekka Enberg 	printf(" ");
633ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
634ce5e0ecbSPekka Enberg 		printf("%016lx ", (uint64_t) sregs.interrupt_bitmap[i]);
635ce5e0ecbSPekka Enberg 	printf("\n");
6367118d2caSPekka Enberg }
6377118d2caSPekka Enberg 
638ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
6396f10be05SPekka Enberg {
6406f10be05SPekka Enberg 	unsigned int code_bytes = 64;
6416f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
6426f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
6436f10be05SPekka Enberg 	unsigned char c;
644ae1fae34SPekka Enberg 	unsigned int i;
6456f10be05SPekka Enberg 	uint8_t *ip;
6466f10be05SPekka Enberg 
6472a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
6482a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
6492a601aafSPekka Enberg 
6502a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
6512a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
6522a601aafSPekka Enberg 
653f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
6546f10be05SPekka Enberg 
6556f10be05SPekka Enberg 	printf("Code: ");
6566f10be05SPekka Enberg 
6576f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
658*48cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, ip))
659*48cf3877SPekka Enberg 			break;
660*48cf3877SPekka Enberg 
6616e8abc38SPekka Enberg 		c = *ip;
6626e8abc38SPekka Enberg 
663f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
6646f10be05SPekka Enberg 			printf("<%02x> ", c);
6656f10be05SPekka Enberg 		else
6666f10be05SPekka Enberg 			printf("%02x ", c);
6676f10be05SPekka Enberg 	}
6686f10be05SPekka Enberg 
6696f10be05SPekka Enberg 	printf("\n");
6702a7d39a4SPekka Enberg 
6712a7d39a4SPekka Enberg 	printf("Stack:\n");
6722a7d39a4SPekka Enberg 	kvm__dump_mem(self, self->regs.rsp, 32);
6736f10be05SPekka Enberg }
674090f898eSCyrill Gorcunov 
675f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self)
676f01944c8SPekka Enberg {
677f01944c8SPekka Enberg 	uint64_t *pte1;
678f01944c8SPekka Enberg 	uint64_t *pte2;
679f01944c8SPekka Enberg 	uint64_t *pte3;
680f01944c8SPekka Enberg 	uint64_t *pte4;
681f01944c8SPekka Enberg 
682f01944c8SPekka Enberg 	if (!is_in_protected_mode(self))
683f01944c8SPekka Enberg 		return;
684f01944c8SPekka Enberg 
685f01944c8SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
686f01944c8SPekka Enberg 		die("KVM_GET_SREGS failed");
687f01944c8SPekka Enberg 
688f01944c8SPekka Enberg 	pte4	= guest_flat_to_host(self, self->sregs.cr3);
689*48cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte4))
690*48cf3877SPekka Enberg 		return;
691*48cf3877SPekka Enberg 
692f01944c8SPekka Enberg 	pte3	= guest_flat_to_host(self, (*pte4 & ~0xfff));
693*48cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte3))
694*48cf3877SPekka Enberg 		return;
695*48cf3877SPekka Enberg 
696f01944c8SPekka Enberg 	pte2	= guest_flat_to_host(self, (*pte3 & ~0xfff));
697*48cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte2))
698*48cf3877SPekka Enberg 		return;
699*48cf3877SPekka Enberg 
700f01944c8SPekka Enberg 	pte1	= guest_flat_to_host(self, (*pte2 & ~0xfff));
701*48cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte1))
702*48cf3877SPekka Enberg 		return;
703f01944c8SPekka Enberg 
704f01944c8SPekka Enberg 	printf("Page Tables:\n");
705f01944c8SPekka Enberg 	if (*pte2 & (1 << 7))
706f01944c8SPekka Enberg 		printf(" pte4: %016lx   pte3: %016lx   pte2: %016lx\n", *pte4, *pte3, *pte2);
707f01944c8SPekka Enberg 	else
708f01944c8SPekka Enberg 		printf(" pte4: %016lx   pte3: %016lx   pte2: %016lx   pte1: %016lx\n", *pte4, *pte3, *pte2, *pte1);
709f01944c8SPekka Enberg }
710f01944c8SPekka Enberg 
711090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
712090f898eSCyrill Gorcunov {
713090f898eSCyrill Gorcunov 	unsigned char *p;
714090f898eSCyrill Gorcunov 	unsigned long n;
715090f898eSCyrill Gorcunov 
716090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
717090f898eSCyrill Gorcunov 	if (!size)
718090f898eSCyrill Gorcunov 		return;
719090f898eSCyrill Gorcunov 
7202a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
721090f898eSCyrill Gorcunov 
722*48cf3877SPekka Enberg 	for (n = 0; n < size; n+=8) {
723*48cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
724*48cf3877SPekka Enberg 			break;
725*48cf3877SPekka Enberg 
726090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
727090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
728090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
729090f898eSCyrill Gorcunov 	}
730*48cf3877SPekka Enberg }
731