xref: /kvmtool/kvm.c (revision 839051d949218096876641d2db9bf1e9bf1f56bb)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3c78b8713SAsias He #include "kvm/cpufeature.h"
4ce79f1caSPekka Enberg #include "kvm/interrupt.h"
5b3594ec7SCyrill Gorcunov #include "kvm/boot-protocol.h"
6f3150089SPekka Enberg #include "kvm/util.h"
7eda03319SPekka Enberg 
86c7d8514SPekka Enberg #include <linux/kvm.h>
9f5ab5f67SPekka Enberg 
10f5ab5f67SPekka Enberg #include <asm/bootparam.h>
11f5ab5f67SPekka Enberg 
12ae1fae34SPekka Enberg #include <sys/ioctl.h>
131f9cff23SPekka Enberg #include <inttypes.h>
141f9cff23SPekka Enberg #include <sys/mman.h>
15ce79f1caSPekka Enberg #include <sys/stat.h>
162da26a59SPekka Enberg #include <stdbool.h>
176e5e8b8dSPekka Enberg #include <assert.h>
1806e41eeaSPekka Enberg #include <limits.h>
19ce79f1caSPekka Enberg #include <signal.h>
20f5ab5f67SPekka Enberg #include <stdarg.h>
21b8f6afcdSPekka Enberg #include <stdlib.h>
22f5ab5f67SPekka Enberg #include <string.h>
230d1f17ecSPekka Enberg #include <unistd.h>
241f9cff23SPekka Enberg #include <stdio.h>
25b8f6afcdSPekka Enberg #include <fcntl.h>
26ce79f1caSPekka Enberg #include <time.h>
27b8f6afcdSPekka Enberg 
28ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
290d1f17ecSPekka Enberg 
30ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
31ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
32ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
33ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
34ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
499b1fb1c3SPekka Enberg };
509b1fb1c3SPekka Enberg 
5155e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
5255e19624SCyrill Gorcunov 	.name = #ext,			\
5355e19624SCyrill Gorcunov 	.code = ext
5455e19624SCyrill Gorcunov 
5555e19624SCyrill Gorcunov struct {
5655e19624SCyrill Gorcunov 	const char *name;
5755e19624SCyrill Gorcunov 	int code;
5855e19624SCyrill Gorcunov } kvm_req_ext[] = {
5955e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
6055e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
6155e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
6255e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
6355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
6455e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
657c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
6655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
67d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
6855e19624SCyrill Gorcunov };
6955e19624SCyrill Gorcunov 
70ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
71b8f6afcdSPekka Enberg {
7228fa19c0SPekka Enberg 	int ret;
73b8f6afcdSPekka Enberg 
7473ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
754076b041SPekka Enberg 	if (ret < 0)
764076b041SPekka Enberg 		return false;
774076b041SPekka Enberg 
784076b041SPekka Enberg 	return ret;
794076b041SPekka Enberg }
804076b041SPekka Enberg 
8155e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self)
8255e19624SCyrill Gorcunov {
8355e19624SCyrill Gorcunov 	unsigned int i;
8455e19624SCyrill Gorcunov 
8555e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
8655e19624SCyrill Gorcunov 		if (!kvm__supports_extension(self, kvm_req_ext[i].code)) {
8755e19624SCyrill Gorcunov 			error("Unsuppored KVM extension detected: %s",
8855e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
8955e19624SCyrill Gorcunov 			return (int)-i;
9055e19624SCyrill Gorcunov 		}
9155e19624SCyrill Gorcunov 	}
9255e19624SCyrill Gorcunov 
9355e19624SCyrill Gorcunov 	return 0;
9455e19624SCyrill Gorcunov }
9555e19624SCyrill Gorcunov 
964076b041SPekka Enberg static struct kvm *kvm__new(void)
974076b041SPekka Enberg {
984076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
994076b041SPekka Enberg 
1004076b041SPekka Enberg 	if (!self)
1014076b041SPekka Enberg 		die("out of memory");
1024076b041SPekka Enberg 
1034076b041SPekka Enberg 	return self;
1044076b041SPekka Enberg }
1054076b041SPekka Enberg 
1069ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
1079ef4c68eSPekka Enberg {
108fbfe68b7SSasha Levin 	kvm__stop_timer(self);
109fbfe68b7SSasha Levin 
110*839051d9SSasha Levin 	munmap(self->ram_start, self->ram_size);
1119ef4c68eSPekka Enberg 	free(self);
1129ef4c68eSPekka Enberg }
1139ef4c68eSPekka Enberg 
114c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
115c78b8713SAsias He {
116c78b8713SAsias He 	struct cpuid_regs regs;
117831fbf23SPekka Enberg 	uint32_t eax_base;
118831fbf23SPekka Enberg 	int feature;
119c78b8713SAsias He 
120c78b8713SAsias He 	regs	= (struct cpuid_regs) {
121831fbf23SPekka Enberg 		.eax		= 0x00,
122c78b8713SAsias He 	};
123c78b8713SAsias He 	host_cpuid(&regs);
124c78b8713SAsias He 
125ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
126ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
127831fbf23SPekka Enberg 		eax_base	= 0x00;
128831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_VMX;
129ae87afbfSCyrill Gorcunov 		break;
13034649df9SPekka Enberg 
131ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
132831fbf23SPekka Enberg 		eax_base	= 0x80000000;
133831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_SVM;
134ae87afbfSCyrill Gorcunov 		break;
13534649df9SPekka Enberg 
13634649df9SPekka Enberg 	default:
13734649df9SPekka Enberg 		return false;
138ae87afbfSCyrill Gorcunov 	}
139ae87afbfSCyrill Gorcunov 
140831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
141831fbf23SPekka Enberg 		.eax		= eax_base,
142831fbf23SPekka Enberg 	};
143831fbf23SPekka Enberg 	host_cpuid(&regs);
144831fbf23SPekka Enberg 
145831fbf23SPekka Enberg 	if (regs.eax < eax_base + 0x01)
146831fbf23SPekka Enberg 		return false;
147831fbf23SPekka Enberg 
148831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
149831fbf23SPekka Enberg 		.eax		= eax_base + 0x01
150831fbf23SPekka Enberg 	};
151831fbf23SPekka Enberg 	host_cpuid(&regs);
152831fbf23SPekka Enberg 
153831fbf23SPekka Enberg 	return regs.ecx & (1 << feature);
154c78b8713SAsias He }
155c78b8713SAsias He 
156*839051d9SSasha Levin void kvm__init_ram(struct kvm *self)
1574076b041SPekka Enberg {
1582b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
159*839051d9SSasha Levin 	int ret;
160*839051d9SSasha Levin 
161*839051d9SSasha Levin 	mem = (struct kvm_userspace_memory_region) {
162*839051d9SSasha Levin 		.slot			= 0,
163*839051d9SSasha Levin 		.guest_phys_addr	= 0x0UL,
164*839051d9SSasha Levin 		.memory_size		= self->ram_size,
165*839051d9SSasha Levin 		.userspace_addr		= (unsigned long) self->ram_start,
166*839051d9SSasha Levin 	};
167*839051d9SSasha Levin 
168*839051d9SSasha Levin 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
169*839051d9SSasha Levin 	if (ret < 0)
170*839051d9SSasha Levin 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
171*839051d9SSasha Levin }
172*839051d9SSasha Levin 
173*839051d9SSasha Levin struct kvm *kvm__init(const char *kvm_dev, unsigned long ram_size)
174*839051d9SSasha Levin {
1759687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
1764076b041SPekka Enberg 	struct kvm *self;
1774076b041SPekka Enberg 	int ret;
1784076b041SPekka Enberg 
179c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
180c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
181c78b8713SAsias He 
1824076b041SPekka Enberg 	self = kvm__new();
1834076b041SPekka Enberg 
1846d7c36ceSPekka Enberg 	self->sys_fd = open(kvm_dev, O_RDWR);
1856d7c36ceSPekka Enberg 	if (self->sys_fd < 0) {
1866d7c36ceSPekka Enberg 		if (errno == ENOENT)
187e907b83fSPekka Enberg 			die("'%s' not found. Please make sure your kernel has CONFIG_KVM enabled and that the KVM modules are loaded.", kvm_dev);
188f8334800SIngo Molnar 		if (errno == ENODEV)
189f8334800SIngo Molnar 			die("'%s' KVM driver not available.\n  # (If the KVM module is loaded then 'dmesg' may offer further clues about the failure.)", kvm_dev);
1906d7c36ceSPekka Enberg 
191f8334800SIngo Molnar 		fprintf(stderr, "  Fatal, could not open %s: ", kvm_dev);
192f8334800SIngo Molnar 		perror(NULL);
193f8334800SIngo Molnar 		exit(1);
1946d7c36ceSPekka Enberg 	}
195b8f6afcdSPekka Enberg 
19673ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1976c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
198f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1996c7d8514SPekka Enberg 
20073ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
20173ac60e6SPekka Enberg 	if (self->vm_fd < 0)
202f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
20328fa19c0SPekka Enberg 
20455e19624SCyrill Gorcunov 	if (kvm__check_extensions(self))
20555e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
2069687927dSAsias He 
2079687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
2089687927dSAsias He 	if (ret < 0)
2099687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
2109687927dSAsias He 
2119687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config);
2129687927dSAsias He 	if (ret < 0)
2139687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
2149687927dSAsias He 
215192a99d1SCyrill Gorcunov 	self->ram_size		= ram_size;
2160d1f17ecSPekka Enberg 
217*839051d9SSasha Levin 	self->ram_start = mmap(NULL, ram_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE, -1, 0);
218*839051d9SSasha Levin 	if (self->ram_start == MAP_FAILED)
2190d1f17ecSPekka Enberg 		die("out of memory");
2200d1f17ecSPekka Enberg 
2219687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP);
222895c2fefSPekka Enberg 	if (ret < 0)
2239687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
2249687927dSAsias He 
2254076b041SPekka Enberg 	return self;
2264076b041SPekka Enberg }
2274076b041SPekka Enberg 
2285f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
229b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
230dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
2312dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
2322dd4a4edSCyrill Gorcunov 
2339a4ecdc5SPekka Enberg #define BOOT_PROTOCOL_REQUIRED	0x206
234a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
235009b0758SPekka Enberg 
236edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
237009b0758SPekka Enberg {
238009b0758SPekka Enberg 	void *p;
239009b0758SPekka Enberg 	int nr;
240009b0758SPekka Enberg 
241009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
242009b0758SPekka Enberg 		die_perror("lseek");
243009b0758SPekka Enberg 
2446753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
245009b0758SPekka Enberg 
246009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
247009b0758SPekka Enberg 		p += nr;
248009b0758SPekka Enberg 
249dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
250edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
251dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
252edc8a14dSPekka Enberg 
2537fb218bdSPekka Enberg 	return true;
254009b0758SPekka Enberg }
255009b0758SPekka Enberg 
256ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
257ae1fae34SPekka Enberg 
2582065a6f7SCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd_kernel,
2592065a6f7SCyrill Gorcunov 			int fd_initrd, const char *kernel_cmdline)
260ae1fae34SPekka Enberg {
261b9271160SPekka Enberg 	struct boot_params *kern_boot;
2624b62331fSPekka Enberg 	unsigned long setup_sects;
263b9271160SPekka Enberg 	struct boot_params boot;
2642dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
2657fb218bdSPekka Enberg 	ssize_t setup_size;
26622489bb0SCyrill Gorcunov 	void *p;
267ae1fae34SPekka Enberg 	int nr;
268ae1fae34SPekka Enberg 
2695d67eaf6SPekka Enberg 	/*
2705d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2715d67eaf6SPekka Enberg 	 * memory layout.
2725d67eaf6SPekka Enberg 	 */
2735d67eaf6SPekka Enberg 
2742065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
275009b0758SPekka Enberg 		die_perror("lseek");
276009b0758SPekka Enberg 
2770b62d2bbSPekka Enberg 	if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot))
2782346d461SPekka Enberg 		return false;
279ae1fae34SPekka Enberg 
2800b62d2bbSPekka Enberg 	if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)))
2817fb218bdSPekka Enberg 		return false;
282ae1fae34SPekka Enberg 
2830ea58e5bSPekka Enberg 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED)
2840b62d2bbSPekka Enberg 		die("Too old kernel");
285ad681038SCyrill Gorcunov 
2862065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
287e93ab78aSPekka Enberg 		die_perror("lseek");
288e93ab78aSPekka Enberg 
2894cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
2904cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
29110943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
29210943d14SPekka Enberg 
29354d4a626SPekka Enberg 	setup_size = setup_sects << 9;
2946753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
295ae1fae34SPekka Enberg 
2962065a6f7SCyrill Gorcunov 	/* copy setup.bin to mem*/
2972065a6f7SCyrill Gorcunov 	if (read(fd_kernel, p, setup_size) != setup_size)
2987fb218bdSPekka Enberg 		die_perror("read");
2997fb218bdSPekka Enberg 
3002065a6f7SCyrill Gorcunov 	/* copy vmlinux.bin to BZ_KERNEL_START*/
3016753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
302ae1fae34SPekka Enberg 
3032065a6f7SCyrill Gorcunov 	while ((nr = read(fd_kernel, p, 65536)) > 0)
304ae1fae34SPekka Enberg 		p += nr;
305ae1fae34SPekka Enberg 
306a43f6460SCyrill Gorcunov 	p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET);
307debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
308debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
309debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
310debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
311ad681038SCyrill Gorcunov 
3122dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
3132dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
314debcfac0SCyrill Gorcunov 	}
315debcfac0SCyrill Gorcunov 
316b9271160SPekka Enberg 	kern_boot	= guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x00);
317a43f6460SCyrill Gorcunov 
318b9271160SPekka Enberg 	kern_boot->hdr.cmd_line_ptr	= BOOT_CMDLINE_OFFSET;
319b9271160SPekka Enberg 	kern_boot->hdr.type_of_loader	= 0xff;
320b9271160SPekka Enberg 	kern_boot->hdr.heap_end_ptr	= 0xfe00;
321b9271160SPekka Enberg 	kern_boot->hdr.loadflags	|= CAN_USE_HEAP;
322a43f6460SCyrill Gorcunov 
3232065a6f7SCyrill Gorcunov 	/*
3242065a6f7SCyrill Gorcunov 	 * Read initrd image into guest memory
3252065a6f7SCyrill Gorcunov 	 */
3262065a6f7SCyrill Gorcunov 	if (fd_initrd >= 0) {
3272065a6f7SCyrill Gorcunov 		struct stat initrd_stat;
3282065a6f7SCyrill Gorcunov 		unsigned long addr;
3292065a6f7SCyrill Gorcunov 
3302065a6f7SCyrill Gorcunov 		if (fstat(fd_initrd, &initrd_stat))
3312065a6f7SCyrill Gorcunov 			die_perror("fstat");
3322065a6f7SCyrill Gorcunov 
3332065a6f7SCyrill Gorcunov 		addr = boot.hdr.initrd_addr_max & ~0xfffff;
3342065a6f7SCyrill Gorcunov 		for (;;) {
3352065a6f7SCyrill Gorcunov 			if (addr < BZ_KERNEL_START)
3362065a6f7SCyrill Gorcunov 				die("Not enough memory for initrd");
3372065a6f7SCyrill Gorcunov 			else if (addr < (self->ram_size - initrd_stat.st_size))
3382065a6f7SCyrill Gorcunov 				break;
3392065a6f7SCyrill Gorcunov 			addr -= 0x100000;
3402065a6f7SCyrill Gorcunov 		}
3412065a6f7SCyrill Gorcunov 
3422065a6f7SCyrill Gorcunov 		p = guest_flat_to_host(self, addr);
3432065a6f7SCyrill Gorcunov 		nr = read(fd_initrd, p, initrd_stat.st_size);
3442065a6f7SCyrill Gorcunov 		if (nr != initrd_stat.st_size)
3452065a6f7SCyrill Gorcunov 			die("Failed to read initrd");
3462065a6f7SCyrill Gorcunov 
3472065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_image	= addr;
3482065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_size	= initrd_stat.st_size;
3492065a6f7SCyrill Gorcunov 	}
3502065a6f7SCyrill Gorcunov 
351dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
352edc8a14dSPekka Enberg 	/*
353edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
354edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
355edc8a14dSPekka Enberg 	 */
356edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
357dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
358edc8a14dSPekka Enberg 
3597fb218bdSPekka Enberg 	return true;
360ae1fae34SPekka Enberg }
361ae1fae34SPekka Enberg 
3626d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
3632065a6f7SCyrill Gorcunov 		const char *initrd_filename, const char *kernel_cmdline)
364ae1fae34SPekka Enberg {
3657fb218bdSPekka Enberg 	bool ret;
3662065a6f7SCyrill Gorcunov 	int fd_kernel = -1, fd_initrd = -1;
367ae1fae34SPekka Enberg 
3682065a6f7SCyrill Gorcunov 	fd_kernel = open(kernel_filename, O_RDONLY);
3692065a6f7SCyrill Gorcunov 	if (fd_kernel < 0)
3700b62d2bbSPekka Enberg 		die("Unable to open kernel %s", kernel_filename);
371ae1fae34SPekka Enberg 
3722065a6f7SCyrill Gorcunov 	if (initrd_filename) {
3732065a6f7SCyrill Gorcunov 		fd_initrd = open(initrd_filename, O_RDONLY);
3742065a6f7SCyrill Gorcunov 		if (fd_initrd < 0)
3750b62d2bbSPekka Enberg 			die("Unable to open initrd %s", initrd_filename);
3762065a6f7SCyrill Gorcunov 	}
3772065a6f7SCyrill Gorcunov 
3782065a6f7SCyrill Gorcunov 	ret = load_bzimage(kvm, fd_kernel, fd_initrd, kernel_cmdline);
37928972750SCyrill Gorcunov 
38028972750SCyrill Gorcunov 	if (initrd_filename)
38128972750SCyrill Gorcunov 		close(fd_initrd);
38228972750SCyrill Gorcunov 
383009b0758SPekka Enberg 	if (ret)
384009b0758SPekka Enberg 		goto found_kernel;
385ae1fae34SPekka Enberg 
3860b62d2bbSPekka Enberg 	warning("%s is not a bzImage. Trying to load it as a flat binary...", kernel_filename);
3870b62d2bbSPekka Enberg 
3882065a6f7SCyrill Gorcunov 	ret = load_flat_binary(kvm, fd_kernel);
389009b0758SPekka Enberg 	if (ret)
390009b0758SPekka Enberg 		goto found_kernel;
391009b0758SPekka Enberg 
3925a6ac675SSasha Levin 	close(fd_kernel);
3935a6ac675SSasha Levin 
394009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
395009b0758SPekka Enberg 
396009b0758SPekka Enberg found_kernel:
3975a6ac675SSasha Levin 	close(fd_kernel);
3985a6ac675SSasha Levin 
399ae1fae34SPekka Enberg 	return ret;
400ae1fae34SPekka Enberg }
401ae1fae34SPekka Enberg 
402b3594ec7SCyrill Gorcunov /**
403b3594ec7SCyrill Gorcunov  * kvm__setup_bios - inject BIOS into guest system memory
404b3594ec7SCyrill Gorcunov  * @self - guest system descriptor
405b3594ec7SCyrill Gorcunov  *
406b3594ec7SCyrill Gorcunov  * This function is a main routine where we poke guest memory
407b3594ec7SCyrill Gorcunov  * and install BIOS there.
408b3594ec7SCyrill Gorcunov  */
409b3594ec7SCyrill Gorcunov void kvm__setup_bios(struct kvm *self)
4102f3976eeSPekka Enberg {
411b3594ec7SCyrill Gorcunov 	/* standart minimal configuration */
412b3594ec7SCyrill Gorcunov 	setup_bios(self);
4132f3976eeSPekka Enberg 
414b3594ec7SCyrill Gorcunov 	/* FIXME: SMP, ACPI and friends here */
4152f3976eeSPekka Enberg }
4162f3976eeSPekka Enberg 
417ce79f1caSPekka Enberg #define TIMER_INTERVAL_NS 1000000	/* 1 msec */
418ce79f1caSPekka Enberg 
419ce79f1caSPekka Enberg /*
420ce79f1caSPekka Enberg  * This function sets up a timer that's used to inject interrupts from the
421ce79f1caSPekka Enberg  * userspace hypervisor into the guest at periodical intervals. Please note
422ce79f1caSPekka Enberg  * that clock interrupt, for example, is not handled here.
423ce79f1caSPekka Enberg  */
424ce79f1caSPekka Enberg void kvm__start_timer(struct kvm *self)
425ce79f1caSPekka Enberg {
426ce79f1caSPekka Enberg 	struct itimerspec its;
427ce79f1caSPekka Enberg 	struct sigevent sev;
428ce79f1caSPekka Enberg 
429ce79f1caSPekka Enberg 	memset(&sev, 0, sizeof(struct sigevent));
430ce79f1caSPekka Enberg 	sev.sigev_value.sival_int	= 0;
431ce79f1caSPekka Enberg 	sev.sigev_notify		= SIGEV_SIGNAL;
432ce79f1caSPekka Enberg 	sev.sigev_signo			= SIGALRM;
433ce79f1caSPekka Enberg 
434ce79f1caSPekka Enberg 	if (timer_create(CLOCK_REALTIME, &sev, &self->timerid) < 0)
435ce79f1caSPekka Enberg 		die("timer_create()");
436ce79f1caSPekka Enberg 
437ce79f1caSPekka Enberg 	its.it_value.tv_sec		= TIMER_INTERVAL_NS / 1000000000;
438ce79f1caSPekka Enberg 	its.it_value.tv_nsec		= TIMER_INTERVAL_NS % 1000000000;
439ce79f1caSPekka Enberg 	its.it_interval.tv_sec		= its.it_value.tv_sec;
440ce79f1caSPekka Enberg 	its.it_interval.tv_nsec		= its.it_value.tv_nsec;
441ce79f1caSPekka Enberg 
442ce79f1caSPekka Enberg 	if (timer_settime(self->timerid, 0, &its, NULL) < 0)
443ce79f1caSPekka Enberg 		die("timer_settime()");
444ce79f1caSPekka Enberg }
445ce79f1caSPekka Enberg 
446fbfe68b7SSasha Levin void kvm__stop_timer(struct kvm *self)
447fbfe68b7SSasha Levin {
448fbfe68b7SSasha Levin 	if (self->timerid)
449fbfe68b7SSasha Levin 		if (timer_delete(self->timerid) < 0)
450fbfe68b7SSasha Levin 			die("timer_delete()");
451fbfe68b7SSasha Levin 
452fbfe68b7SSasha Levin 	self->timerid = 0;
453fbfe68b7SSasha Levin }
454fbfe68b7SSasha Levin 
4558b1ff07eSPekka Enberg void kvm__irq_line(struct kvm *self, int irq, int level)
4568b1ff07eSPekka Enberg {
4578b1ff07eSPekka Enberg 	struct kvm_irq_level irq_level;
4588b1ff07eSPekka Enberg 
4598b1ff07eSPekka Enberg 	irq_level	= (struct kvm_irq_level) {
4608b1ff07eSPekka Enberg 		{
4618b1ff07eSPekka Enberg 			.irq		= irq,
4628b1ff07eSPekka Enberg 		},
4638b1ff07eSPekka Enberg 		.level		= level,
4648b1ff07eSPekka Enberg 	};
4658b1ff07eSPekka Enberg 
4668b1ff07eSPekka Enberg 	if (ioctl(self->vm_fd, KVM_IRQ_LINE, &irq_level) < 0)
4678b1ff07eSPekka Enberg 		die_perror("KVM_IRQ_LINE failed");
4688b1ff07eSPekka Enberg }
4698b1ff07eSPekka Enberg 
470090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
471090f898eSCyrill Gorcunov {
472090f898eSCyrill Gorcunov 	unsigned char *p;
473090f898eSCyrill Gorcunov 	unsigned long n;
474090f898eSCyrill Gorcunov 
475090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
476090f898eSCyrill Gorcunov 	if (!size)
477090f898eSCyrill Gorcunov 		return;
478090f898eSCyrill Gorcunov 
4792a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
480090f898eSCyrill Gorcunov 
48148cf3877SPekka Enberg 	for (n = 0; n < size; n += 8) {
48248cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
48348cf3877SPekka Enberg 			break;
48448cf3877SPekka Enberg 
485090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
486090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
487090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
488090f898eSCyrill Gorcunov 	}
48948cf3877SPekka Enberg }
490