xref: /kvmtool/kvm.c (revision ae87afbf83fc1d13734f5ea45ff7005bcd77dfcb)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3eda03319SPekka Enberg #include "kvm/interrupt.h"
4c78b8713SAsias He #include "kvm/cpufeature.h"
5f3150089SPekka Enberg #include "kvm/util.h"
6eda03319SPekka Enberg 
76c7d8514SPekka Enberg #include <linux/kvm.h>
8f5ab5f67SPekka Enberg 
9f5ab5f67SPekka Enberg #include <asm/bootparam.h>
10f5ab5f67SPekka Enberg 
11ae1fae34SPekka Enberg #include <sys/ioctl.h>
121f9cff23SPekka Enberg #include <inttypes.h>
131f9cff23SPekka Enberg #include <sys/mman.h>
142da26a59SPekka Enberg #include <stdbool.h>
156e5e8b8dSPekka Enberg #include <assert.h>
1606e41eeaSPekka Enberg #include <limits.h>
17f5ab5f67SPekka Enberg #include <stdarg.h>
18b8f6afcdSPekka Enberg #include <stdlib.h>
19f5ab5f67SPekka Enberg #include <string.h>
200d1f17ecSPekka Enberg #include <unistd.h>
211f9cff23SPekka Enberg #include <stdio.h>
22b8f6afcdSPekka Enberg #include <fcntl.h>
23b8f6afcdSPekka Enberg 
241f9cff23SPekka Enberg /*
251f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
261f9cff23SPekka Enberg  */
271f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
281f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
291f9cff23SPekka Enberg #endif
301f9cff23SPekka Enberg 
31ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
320d1f17ecSPekka Enberg 
33ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
34ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
35ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
36ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
37ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
51ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
529b1fb1c3SPekka Enberg };
539b1fb1c3SPekka Enberg 
5455e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
5555e19624SCyrill Gorcunov 	.name = #ext,			\
5655e19624SCyrill Gorcunov 	.code = ext
5755e19624SCyrill Gorcunov 
5855e19624SCyrill Gorcunov struct {
5955e19624SCyrill Gorcunov 	const char *name;
6055e19624SCyrill Gorcunov 	int code;
6155e19624SCyrill Gorcunov } kvm_req_ext[] = {
6255e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
6355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
6455e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
6555e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
6655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
6755e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
687c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
6955e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
70d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
7155e19624SCyrill Gorcunov };
7255e19624SCyrill Gorcunov 
7348cf3877SPekka Enberg static inline bool host_ptr_in_ram(struct kvm *self, void *p)
7448cf3877SPekka Enberg {
7548cf3877SPekka Enberg 	return self->ram_start <= p && p < (self->ram_start + self->ram_size);
7648cf3877SPekka Enberg }
7748cf3877SPekka Enberg 
786753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset)
796753ed2fSPekka Enberg {
806753ed2fSPekka Enberg 	return ((uint32_t)selector << 4) + (uint32_t) offset;
816753ed2fSPekka Enberg }
826753ed2fSPekka Enberg 
836753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset)
84ae1fae34SPekka Enberg {
85ae1fae34SPekka Enberg 	return self->ram_start + offset;
86ae1fae34SPekka Enberg }
87ae1fae34SPekka Enberg 
886753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset)
896753ed2fSPekka Enberg {
906753ed2fSPekka Enberg 	unsigned long flat = segment_to_flat(selector, offset);
916753ed2fSPekka Enberg 
926753ed2fSPekka Enberg 	return guest_flat_to_host(self, flat);
936753ed2fSPekka Enberg }
946753ed2fSPekka Enberg 
95ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
96b8f6afcdSPekka Enberg {
9728fa19c0SPekka Enberg 	int ret;
98b8f6afcdSPekka Enberg 
9973ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
1004076b041SPekka Enberg 	if (ret < 0)
1014076b041SPekka Enberg 		return false;
1024076b041SPekka Enberg 
1034076b041SPekka Enberg 	return ret;
1044076b041SPekka Enberg }
1054076b041SPekka Enberg 
10655e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self)
10755e19624SCyrill Gorcunov {
10855e19624SCyrill Gorcunov 	unsigned int i;
10955e19624SCyrill Gorcunov 
11055e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
11155e19624SCyrill Gorcunov 		if (!kvm__supports_extension(self, kvm_req_ext[i].code)) {
11255e19624SCyrill Gorcunov 			error("Unsuppored KVM extension detected: %s",
11355e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
11455e19624SCyrill Gorcunov 			return (int)-i;
11555e19624SCyrill Gorcunov 		}
11655e19624SCyrill Gorcunov 	}
11755e19624SCyrill Gorcunov 
11855e19624SCyrill Gorcunov 	return 0;
11955e19624SCyrill Gorcunov }
12055e19624SCyrill Gorcunov 
1214076b041SPekka Enberg static struct kvm *kvm__new(void)
1224076b041SPekka Enberg {
1234076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
1244076b041SPekka Enberg 
1254076b041SPekka Enberg 	if (!self)
1264076b041SPekka Enberg 		die("out of memory");
1274076b041SPekka Enberg 
1284076b041SPekka Enberg 	return self;
1294076b041SPekka Enberg }
1304076b041SPekka Enberg 
1319ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
1329ef4c68eSPekka Enberg {
1339ef4c68eSPekka Enberg 	free(self->ram_start);
1349ef4c68eSPekka Enberg 	free(self);
1359ef4c68eSPekka Enberg }
1369ef4c68eSPekka Enberg 
137c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
138c78b8713SAsias He {
139c78b8713SAsias He 	struct cpuid_regs regs;
140*ae87afbfSCyrill Gorcunov 	bool ret = false;
141c78b8713SAsias He 
142c78b8713SAsias He 	regs	= (struct cpuid_regs) {
143*ae87afbfSCyrill Gorcunov 		.eax		= 0,
144c78b8713SAsias He 	};
145c78b8713SAsias He 	host_cpuid(&regs);
146c78b8713SAsias He 
147*ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
148*ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
149*ae87afbfSCyrill Gorcunov 		if (regs.eax < 1)
150*ae87afbfSCyrill Gorcunov 			return false;
151*ae87afbfSCyrill Gorcunov 		regs = (struct cpuid_regs) { .eax = 1 };
152*ae87afbfSCyrill Gorcunov 		host_cpuid(&regs);
153*ae87afbfSCyrill Gorcunov 		if (regs.ecx & (1 << KVM__X86_FEATURE_VMX))
154*ae87afbfSCyrill Gorcunov 			ret = true;
155*ae87afbfSCyrill Gorcunov 		break;
156*ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
157*ae87afbfSCyrill Gorcunov 		regs = (struct cpuid_regs) { .eax = 0x80000000 };
158*ae87afbfSCyrill Gorcunov 		host_cpuid(&regs);
159*ae87afbfSCyrill Gorcunov 		if (regs.eax < 0x80000001)
160*ae87afbfSCyrill Gorcunov 			return false;
161*ae87afbfSCyrill Gorcunov 		regs = (struct cpuid_regs) { .eax = 0x80000001 };
162*ae87afbfSCyrill Gorcunov 		host_cpuid(&regs);
163*ae87afbfSCyrill Gorcunov 		if (regs.ecx & (1 << KVM__X86_FEATURE_SVM))
164*ae87afbfSCyrill Gorcunov 			ret = true;
165*ae87afbfSCyrill Gorcunov 		break;
166*ae87afbfSCyrill Gorcunov 	}
167*ae87afbfSCyrill Gorcunov 
168*ae87afbfSCyrill Gorcunov 	return ret;
169c78b8713SAsias He }
170c78b8713SAsias He 
1716d7c36ceSPekka Enberg struct kvm *kvm__init(const char *kvm_dev)
1724076b041SPekka Enberg {
1732b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1749687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
1754076b041SPekka Enberg 	struct kvm *self;
1760d1f17ecSPekka Enberg 	long page_size;
1771f9cff23SPekka Enberg 	int mmap_size;
1784076b041SPekka Enberg 	int ret;
1794076b041SPekka Enberg 
180c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
181c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
182c78b8713SAsias He 
1834076b041SPekka Enberg 	self = kvm__new();
1844076b041SPekka Enberg 
1856d7c36ceSPekka Enberg 	self->sys_fd = open(kvm_dev, O_RDWR);
1866d7c36ceSPekka Enberg 	if (self->sys_fd < 0) {
1876d7c36ceSPekka Enberg 		if (errno == ENOENT)
1886d7c36ceSPekka Enberg 			die("'%s' not found. Please make sure you have CONFIG_KVM enabled.", kvm_dev);
1896d7c36ceSPekka Enberg 
190f5ab5f67SPekka Enberg 		die_perror("open");
1916d7c36ceSPekka Enberg 	}
192b8f6afcdSPekka Enberg 
19373ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1946c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
195f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1966c7d8514SPekka Enberg 
19773ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
19873ac60e6SPekka Enberg 	if (self->vm_fd < 0)
199f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
20028fa19c0SPekka Enberg 
20155e19624SCyrill Gorcunov 	if (kvm__check_extensions(self))
20255e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
2039687927dSAsias He 
2049687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
2059687927dSAsias He 	if (ret < 0)
2069687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
2079687927dSAsias He 
2089687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config);
2099687927dSAsias He 	if (ret < 0)
2109687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
2119687927dSAsias He 
2120d1f17ecSPekka Enberg 	self->ram_size		= 64UL * 1024UL * 1024UL;
2130d1f17ecSPekka Enberg 
2140d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
2150d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
2160d1f17ecSPekka Enberg 		die("out of memory");
2170d1f17ecSPekka Enberg 
2182b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
2192b0e3342SPekka Enberg 		.slot			= 0,
2202b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
2210d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
2220d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
2232b0e3342SPekka Enberg 	};
2242b0e3342SPekka Enberg 
225b6e68186SAsias He 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
2262b0e3342SPekka Enberg 	if (ret < 0)
227f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
2282b0e3342SPekka Enberg 
2299687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP);
230895c2fefSPekka Enberg 	if (ret < 0)
2319687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
2329687927dSAsias He 
23373ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
2342b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
235f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
2362b0e3342SPekka Enberg 
2371f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
2381f9cff23SPekka Enberg 	if (mmap_size < 0)
239f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
2401f9cff23SPekka Enberg 
2411f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
2421f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
2431f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
2441f9cff23SPekka Enberg 
2454076b041SPekka Enberg 	return self;
2464076b041SPekka Enberg }
2474076b041SPekka Enberg 
248ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
249aee6632eSPekka Enberg {
250aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
251aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
252aee6632eSPekka Enberg 	};
253aee6632eSPekka Enberg 
254aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
255b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
256aee6632eSPekka Enberg }
257aee6632eSPekka Enberg 
2585f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
259b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
260dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
2612dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
2622dd4a4edSCyrill Gorcunov 
2632dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED	0x202
264a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
265009b0758SPekka Enberg 
266edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
267009b0758SPekka Enberg {
268009b0758SPekka Enberg 	void *p;
269009b0758SPekka Enberg 	int nr;
270009b0758SPekka Enberg 
271009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
272009b0758SPekka Enberg 		die_perror("lseek");
273009b0758SPekka Enberg 
2746753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
275009b0758SPekka Enberg 
276009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
277009b0758SPekka Enberg 		p += nr;
278009b0758SPekka Enberg 
279dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
280edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
281dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
282edc8a14dSPekka Enberg 
2837fb218bdSPekka Enberg 	return true;
284009b0758SPekka Enberg }
285009b0758SPekka Enberg 
2867fb218bdSPekka Enberg /*
2877fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
2887fb218bdSPekka Enberg  * default.
2897fb218bdSPekka Enberg  */
2907fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
291ae1fae34SPekka Enberg 
292ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
293ae1fae34SPekka Enberg 
29410943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS		4
29510943d14SPekka Enberg 
2966d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline)
297ae1fae34SPekka Enberg {
298bc75b0aeSCyrill Gorcunov 	struct real_intr_desc intr;
29922489bb0SCyrill Gorcunov 	struct boot_params boot;
3004b62331fSPekka Enberg 	unsigned long setup_sects;
301305d9054SCyrill Gorcunov 	unsigned int intr_addr;
3022dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
3037fb218bdSPekka Enberg 	ssize_t setup_size;
30422489bb0SCyrill Gorcunov 	void *p;
305ae1fae34SPekka Enberg 	int nr;
306ae1fae34SPekka Enberg 
3075d67eaf6SPekka Enberg 	/*
3085d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
3095d67eaf6SPekka Enberg 	 * memory layout.
3105d67eaf6SPekka Enberg 	 */
3115d67eaf6SPekka Enberg 
312009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
313009b0758SPekka Enberg 		die_perror("lseek");
314009b0758SPekka Enberg 
315ae1fae34SPekka Enberg 	read(fd, &boot, sizeof(boot));
316ae1fae34SPekka Enberg 
317ae1fae34SPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0)
3187fb218bdSPekka Enberg 		return false;
319ae1fae34SPekka Enberg 
3202dd4a4edSCyrill Gorcunov 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) {
321ad681038SCyrill Gorcunov 		warning("Too old kernel");
322ad681038SCyrill Gorcunov 		return false;
323ad681038SCyrill Gorcunov 	}
324ad681038SCyrill Gorcunov 
325e93ab78aSPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
326e93ab78aSPekka Enberg 		die_perror("lseek");
327e93ab78aSPekka Enberg 
3284cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
3294cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
33010943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
33110943d14SPekka Enberg 
33254d4a626SPekka Enberg 	setup_size = setup_sects << 9;
3336753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
334ae1fae34SPekka Enberg 
3357fb218bdSPekka Enberg 	if (read(fd, p, setup_size) != setup_size)
3367fb218bdSPekka Enberg 		die_perror("read");
3377fb218bdSPekka Enberg 
3386753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
339ae1fae34SPekka Enberg 
340ae1fae34SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
341ae1fae34SPekka Enberg 		p += nr;
342ae1fae34SPekka Enberg 
343a43f6460SCyrill Gorcunov 	p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET);
344debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
345debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
346debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
347debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
348ad681038SCyrill Gorcunov 
3492dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
3502dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
351debcfac0SCyrill Gorcunov 	}
352debcfac0SCyrill Gorcunov 
353a43f6460SCyrill Gorcunov #define hdr_offset(member)			\
354a43f6460SCyrill Gorcunov 	offsetof(struct boot_params, hdr) +	\
355a43f6460SCyrill Gorcunov 	offsetof(struct setup_header, member)
356a43f6460SCyrill Gorcunov #define guest_hdr(kvm, member)			\
357a43f6460SCyrill Gorcunov 	guest_real_to_host(kvm,			\
358a43f6460SCyrill Gorcunov 		BOOT_LOADER_SELECTOR,		\
359a43f6460SCyrill Gorcunov 		hdr_offset(member))
360a43f6460SCyrill Gorcunov 
361a43f6460SCyrill Gorcunov 	/* some fields in guest header have to be updated */
362a43f6460SCyrill Gorcunov 	p = guest_hdr(self, cmd_line_ptr);
363a43f6460SCyrill Gorcunov 	*(uint32_t *)p = BOOT_CMDLINE_OFFSET;
364a43f6460SCyrill Gorcunov 
365a43f6460SCyrill Gorcunov 	p = guest_hdr(self, type_of_loader);
366a43f6460SCyrill Gorcunov 	*(uint8_t *)p = 0xff;
367a43f6460SCyrill Gorcunov 
368a43f6460SCyrill Gorcunov 	p = guest_hdr(self, heap_end_ptr);
369a43f6460SCyrill Gorcunov 	*(uint16_t *)p = 0xfe00;
370a43f6460SCyrill Gorcunov 
371a43f6460SCyrill Gorcunov 	p = guest_hdr(self, loadflags);
372a43f6460SCyrill Gorcunov 	*(uint8_t *)p |= CAN_USE_HEAP;
373a43f6460SCyrill Gorcunov 
374dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
375edc8a14dSPekka Enberg 	/*
376edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
377edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
378edc8a14dSPekka Enberg 	 */
379edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
380dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
381edc8a14dSPekka Enberg 
382ea684828SCyrill Gorcunov 	/*
38322489bb0SCyrill Gorcunov 	 * Setup a *fake* real mode vector table, it has only
38422489bb0SCyrill Gorcunov 	 * one real hadler which does just iret
38522489bb0SCyrill Gorcunov 	 *
386305d9054SCyrill Gorcunov 	 * This is where the BIOS lives -- BDA area
387ea684828SCyrill Gorcunov 	 */
388305d9054SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + 0, 16);
389305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
3908b8fb6c7SCyrill Gorcunov 	memcpy(p, intfake, intfake_end - intfake);
391bc75b0aeSCyrill Gorcunov 	intr = (struct real_intr_desc) {
392305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
39322489bb0SCyrill Gorcunov 		.offset		= 0,
394ea684828SCyrill Gorcunov 	};
395bc75b0aeSCyrill Gorcunov 	interrupt_table__setup(&self->interrupt_table, &intr);
396305d9054SCyrill Gorcunov 
3978b8fb6c7SCyrill Gorcunov 	intr_addr = BIOS_INTR_NEXT(BDA_START + (intfake_end - intfake), 16);
398305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, intr_addr);
3998b8fb6c7SCyrill Gorcunov 	memcpy(p, int10, int10_end - int10);
400305d9054SCyrill Gorcunov 	intr = (struct real_intr_desc) {
401305d9054SCyrill Gorcunov 		.segment	= REAL_SEGMENT(intr_addr),
402305d9054SCyrill Gorcunov 		.offset		= 0,
403305d9054SCyrill Gorcunov 	};
404305d9054SCyrill Gorcunov 	interrupt_table__set(&self->interrupt_table, &intr, 0x10);
405305d9054SCyrill Gorcunov 
406305d9054SCyrill Gorcunov 	p = guest_flat_to_host(self, 0);
407bc75b0aeSCyrill Gorcunov 	interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE);
408ea684828SCyrill Gorcunov 
4097fb218bdSPekka Enberg 	return true;
410ae1fae34SPekka Enberg }
411ae1fae34SPekka Enberg 
4126d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
4136d1f350dSCyrill Gorcunov 			const char *kernel_cmdline)
414ae1fae34SPekka Enberg {
4157fb218bdSPekka Enberg 	bool ret;
416ae1fae34SPekka Enberg 	int fd;
417ae1fae34SPekka Enberg 
418ae1fae34SPekka Enberg 	fd = open(kernel_filename, O_RDONLY);
419ae1fae34SPekka Enberg 	if (fd < 0)
420ae1fae34SPekka Enberg 		die("unable to open kernel");
421ae1fae34SPekka Enberg 
4226d1f350dSCyrill Gorcunov 	ret = load_bzimage(kvm, fd, kernel_cmdline);
423009b0758SPekka Enberg 	if (ret)
424009b0758SPekka Enberg 		goto found_kernel;
425ae1fae34SPekka Enberg 
426009b0758SPekka Enberg 	ret = load_flat_binary(kvm, fd);
427009b0758SPekka Enberg 	if (ret)
428009b0758SPekka Enberg 		goto found_kernel;
429009b0758SPekka Enberg 
430009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
431009b0758SPekka Enberg 
432009b0758SPekka Enberg found_kernel:
433ae1fae34SPekka Enberg 	return ret;
434ae1fae34SPekka Enberg }
435ae1fae34SPekka Enberg 
43606e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
43706e41eeaSPekka Enberg {
43806e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
43906e41eeaSPekka Enberg 
44006e41eeaSPekka Enberg 	return ip - (cs << 4);
44106e41eeaSPekka Enberg }
44206e41eeaSPekka Enberg 
443f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self)
444f01944c8SPekka Enberg {
445f01944c8SPekka Enberg 	return self->sregs.cr0 & 0x01;
446f01944c8SPekka Enberg }
447f01944c8SPekka Enberg 
448f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
44906e41eeaSPekka Enberg {
450f326512aSPekka Enberg 	uint64_t cs;
451f326512aSPekka Enberg 
452f326512aSPekka Enberg 	/*
453f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
454f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
455f326512aSPekka Enberg 	 */
456f01944c8SPekka Enberg 	if (is_in_protected_mode(self))
457f326512aSPekka Enberg 		return ip;
458f326512aSPekka Enberg 
459f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
46006e41eeaSPekka Enberg 
46106e41eeaSPekka Enberg 	return ip + (cs << 4);
46206e41eeaSPekka Enberg }
46306e41eeaSPekka Enberg 
464dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
465dbdb74c2SPekka Enberg {
466dbdb74c2SPekka Enberg 	/*
467dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
468dbdb74c2SPekka Enberg 	 */
469dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
470dbdb74c2SPekka Enberg }
471dbdb74c2SPekka Enberg 
47253d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs)
47353d48714SPekka Enberg {
47453d48714SPekka Enberg 	struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs));
47553d48714SPekka Enberg 
47653d48714SPekka Enberg 	if (!self)
47753d48714SPekka Enberg 		die("out of memory");
47853d48714SPekka Enberg 
47953d48714SPekka Enberg 	return self;
48053d48714SPekka Enberg }
48153d48714SPekka Enberg 
48253d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER	0x10
48353d48714SPekka Enberg 
48453d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS		0x174
48553d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP		0x175
48653d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP		0x176
48753d48714SPekka Enberg 
48853d48714SPekka Enberg #define MSR_IA32_STAR			0xc0000081
48953d48714SPekka Enberg #define MSR_IA32_LSTAR			0xc0000082
49053d48714SPekka Enberg #define MSR_IA32_CSTAR			0xc0000083
49153d48714SPekka Enberg #define MSR_IA32_FMASK			0xc0000084
49253d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE		0xc0000102
49353d48714SPekka Enberg 
49453d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data)	\
49553d48714SPekka Enberg 	(struct kvm_msr_entry) { .index = _index, .data = _data }
49653d48714SPekka Enberg 
49753d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self)
49853d48714SPekka Enberg {
49953d48714SPekka Enberg 	unsigned long ndx = 0;
50053d48714SPekka Enberg 
50153d48714SPekka Enberg 	self->msrs = kvm_msrs__new(100);
50253d48714SPekka Enberg 
50353d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS,	0x0);
50453d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP,	0x0);
50553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP,	0x0);
5068b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64
50753d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR,		0x0);
50853d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR,		0x0);
50953d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE,	0x0);
51053d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK,		0x0);
51153d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR,		0x0);
51244069a9dSCyrill Gorcunov #endif
51353d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER,	0x0);
51453d48714SPekka Enberg 
51553d48714SPekka Enberg 	self->msrs->nmsrs	= ndx;
51653d48714SPekka Enberg 
51753d48714SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0)
51853d48714SPekka Enberg 		die_perror("KVM_SET_MSRS failed");
51953d48714SPekka Enberg }
52053d48714SPekka Enberg 
5213d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self)
5223d78d3a5SPekka Enberg {
5233d78d3a5SPekka Enberg 	self->fpu = (struct kvm_fpu) {
5243d78d3a5SPekka Enberg 		.fcw		= 0x37f,
5253d78d3a5SPekka Enberg 		.mxcsr		= 0x1f80,
5263d78d3a5SPekka Enberg 	};
5273d78d3a5SPekka Enberg 
5283d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
5293d78d3a5SPekka Enberg 		die_perror("KVM_SET_FPU failed");
5303d78d3a5SPekka Enberg }
5313d78d3a5SPekka Enberg 
5323d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self)
5333d78d3a5SPekka Enberg {
5343d78d3a5SPekka Enberg 	self->regs = (struct kvm_regs) {
5353d78d3a5SPekka Enberg 		/* We start the guest in 16-bit real mode  */
5363d78d3a5SPekka Enberg 		.rflags		= 0x0000000000000002ULL,
5373d78d3a5SPekka Enberg 
5383d78d3a5SPekka Enberg 		.rip		= self->boot_ip,
5393d78d3a5SPekka Enberg 		.rsp		= self->boot_sp,
5403d78d3a5SPekka Enberg 		.rbp		= self->boot_sp,
5413d78d3a5SPekka Enberg 	};
5423d78d3a5SPekka Enberg 
5433d78d3a5SPekka Enberg 	if (self->regs.rip > USHRT_MAX)
5443d78d3a5SPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
5453d78d3a5SPekka Enberg 
5463d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
5473d78d3a5SPekka Enberg 		die_perror("KVM_SET_REGS failed");
5483d78d3a5SPekka Enberg }
5493d78d3a5SPekka Enberg 
5503d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self)
551ae1fae34SPekka Enberg {
55253602077SPekka Enberg 
5530ed849e6SAsias He 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
5540ed849e6SAsias He 		die_perror("KVM_GET_SREGS failed");
5554a7c140aSAsias He 
5560ed849e6SAsias He 	self->sregs.cs.selector	= self->boot_selector;
5570ed849e6SAsias He 	self->sregs.cs.base	= selector_to_base(self->boot_selector);
5584e42cf94SAsias He 	self->sregs.ss.selector	= self->boot_selector;
5594e42cf94SAsias He 	self->sregs.ss.base	= selector_to_base(self->boot_selector);
5604e42cf94SAsias He 	self->sregs.ds.selector	= self->boot_selector;
5614e42cf94SAsias He 	self->sregs.ds.base	= selector_to_base(self->boot_selector);
5624e42cf94SAsias He 	self->sregs.es.selector	= self->boot_selector;
5634e42cf94SAsias He 	self->sregs.es.base	= selector_to_base(self->boot_selector);
5644e42cf94SAsias He 	self->sregs.fs.selector	= self->boot_selector;
5654e42cf94SAsias He 	self->sregs.fs.base	= selector_to_base(self->boot_selector);
5664e42cf94SAsias He 	self->sregs.gs.selector	= self->boot_selector;
5674e42cf94SAsias He 	self->sregs.gs.base	= selector_to_base(self->boot_selector);
5684a7c140aSAsias He 
56953602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
57053602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
5713d78d3a5SPekka Enberg }
57206e41eeaSPekka Enberg 
5733d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self)
5743d78d3a5SPekka Enberg {
5753d78d3a5SPekka Enberg 	kvm__setup_sregs(self);
576dbdb74c2SPekka Enberg 
5773d78d3a5SPekka Enberg 	kvm__setup_regs(self);
57806e41eeaSPekka Enberg 
5793d78d3a5SPekka Enberg 	kvm__setup_fpu(self);
58053d48714SPekka Enberg 
58153d48714SPekka Enberg 	kvm__setup_msrs(self);
582ae1fae34SPekka Enberg }
583ae1fae34SPekka Enberg 
584ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
585ae1fae34SPekka Enberg {
586ae1fae34SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0)
587ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
588ae1fae34SPekka Enberg }
589ae1fae34SPekka Enberg 
5908351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable)
5918351aaddSPekka Enberg {
5928351aaddSPekka Enberg 	printf(" %s                 %016" PRIx64 "  %08" PRIx16 "\n",
5938351aaddSPekka Enberg 		name, (uint64_t) dtable->base, (uint16_t) dtable->limit);
5948351aaddSPekka Enberg }
5958351aaddSPekka Enberg 
59653602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
59753602077SPekka Enberg {
598ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
59953602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
600ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
60153602077SPekka Enberg }
60253602077SPekka Enberg 
603ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
6047118d2caSPekka Enberg {
60553602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
60653602077SPekka Enberg 	unsigned long cr4, cr8;
6077118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
6087118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
6097118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
6107118d2caSPekka Enberg 	unsigned long r10, r11, r12;
6117118d2caSPekka Enberg 	unsigned long r13, r14, r15;
6127118d2caSPekka Enberg 	unsigned long rip, rsp;
61353602077SPekka Enberg 	struct kvm_sregs sregs;
614a2fe6199SPekka Enberg 	unsigned long rflags;
6157118d2caSPekka Enberg 	struct kvm_regs regs;
616ce5e0ecbSPekka Enberg 	int i;
6177118d2caSPekka Enberg 
6187118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
6197118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
6207118d2caSPekka Enberg 
621a2fe6199SPekka Enberg 	rflags = regs.rflags;
622a2fe6199SPekka Enberg 
6237118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
6247118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
6257118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
6267118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
6277118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
6287118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
6297118d2caSPekka Enberg 
6307118d2caSPekka Enberg 	printf("Registers:\n");
6312177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
632ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
6337118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
6347118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
6357118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
6367118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
63753602077SPekka Enberg 
63853602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
63953602077SPekka Enberg 		die("KVM_GET_REGS failed");
64053602077SPekka Enberg 
64153602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
64253602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
64353602077SPekka Enberg 
64453602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
64553602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
646ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
647ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
64853602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
64953602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
65053602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
65153602077SPekka Enberg 	print_segment("es ", &sregs.es);
65253602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
65353602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
654ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
655ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
6568351aaddSPekka Enberg 	print_dtable("gdt", &sregs.gdt);
6578351aaddSPekka Enberg 	print_dtable("idt", &sregs.idt);
6580f9983b2SCyrill Gorcunov 	printf(" [ efer: %016" PRIx64 "  apic base: %016" PRIx64 "  nmi: %s ]\n",
6590f9983b2SCyrill Gorcunov 		(uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
6602049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
661ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
662ce5e0ecbSPekka Enberg 	printf(" ");
663ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
6640f9983b2SCyrill Gorcunov 		printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]);
665ce5e0ecbSPekka Enberg 	printf("\n");
6667118d2caSPekka Enberg }
6677118d2caSPekka Enberg 
668ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
6696f10be05SPekka Enberg {
6706f10be05SPekka Enberg 	unsigned int code_bytes = 64;
6716f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
6726f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
6736f10be05SPekka Enberg 	unsigned char c;
674ae1fae34SPekka Enberg 	unsigned int i;
6756f10be05SPekka Enberg 	uint8_t *ip;
6766f10be05SPekka Enberg 
6772a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
6782a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
6792a601aafSPekka Enberg 
6802a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
6812a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
6822a601aafSPekka Enberg 
683f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
6846f10be05SPekka Enberg 
6856f10be05SPekka Enberg 	printf("Code: ");
6866f10be05SPekka Enberg 
6876f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
68848cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, ip))
68948cf3877SPekka Enberg 			break;
69048cf3877SPekka Enberg 
6916e8abc38SPekka Enberg 		c = *ip;
6926e8abc38SPekka Enberg 
693f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
6946f10be05SPekka Enberg 			printf("<%02x> ", c);
6956f10be05SPekka Enberg 		else
6966f10be05SPekka Enberg 			printf("%02x ", c);
6976f10be05SPekka Enberg 	}
6986f10be05SPekka Enberg 
6996f10be05SPekka Enberg 	printf("\n");
7002a7d39a4SPekka Enberg 
7012a7d39a4SPekka Enberg 	printf("Stack:\n");
7022a7d39a4SPekka Enberg 	kvm__dump_mem(self, self->regs.rsp, 32);
7036f10be05SPekka Enberg }
704090f898eSCyrill Gorcunov 
705f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self)
706f01944c8SPekka Enberg {
707f01944c8SPekka Enberg 	uint64_t *pte1;
708f01944c8SPekka Enberg 	uint64_t *pte2;
709f01944c8SPekka Enberg 	uint64_t *pte3;
710f01944c8SPekka Enberg 	uint64_t *pte4;
711f01944c8SPekka Enberg 
712f01944c8SPekka Enberg 	if (!is_in_protected_mode(self))
713f01944c8SPekka Enberg 		return;
714f01944c8SPekka Enberg 
715f01944c8SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
716f01944c8SPekka Enberg 		die("KVM_GET_SREGS failed");
717f01944c8SPekka Enberg 
718f01944c8SPekka Enberg 	pte4	= guest_flat_to_host(self, self->sregs.cr3);
71948cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte4))
72048cf3877SPekka Enberg 		return;
72148cf3877SPekka Enberg 
722f01944c8SPekka Enberg 	pte3	= guest_flat_to_host(self, (*pte4 & ~0xfff));
72348cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte3))
72448cf3877SPekka Enberg 		return;
72548cf3877SPekka Enberg 
726f01944c8SPekka Enberg 	pte2	= guest_flat_to_host(self, (*pte3 & ~0xfff));
72748cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte2))
72848cf3877SPekka Enberg 		return;
72948cf3877SPekka Enberg 
730f01944c8SPekka Enberg 	pte1	= guest_flat_to_host(self, (*pte2 & ~0xfff));
73148cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte1))
73248cf3877SPekka Enberg 		return;
733f01944c8SPekka Enberg 
734f01944c8SPekka Enberg 	printf("Page Tables:\n");
735f01944c8SPekka Enberg 	if (*pte2 & (1 << 7))
7360f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64
7370f9983b2SCyrill Gorcunov 			"   pte2: %016" PRIx64 "\n",
7380f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2);
739f01944c8SPekka Enberg 	else
7400f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64 "   pte2: %016"
7410f9983b2SCyrill Gorcunov 			PRIx64 "   pte1: %016" PRIx64 "\n",
7420f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2, *pte1);
743f01944c8SPekka Enberg }
744f01944c8SPekka Enberg 
745090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
746090f898eSCyrill Gorcunov {
747090f898eSCyrill Gorcunov 	unsigned char *p;
748090f898eSCyrill Gorcunov 	unsigned long n;
749090f898eSCyrill Gorcunov 
750090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
751090f898eSCyrill Gorcunov 	if (!size)
752090f898eSCyrill Gorcunov 		return;
753090f898eSCyrill Gorcunov 
7542a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
755090f898eSCyrill Gorcunov 
75648cf3877SPekka Enberg 	for (n = 0; n < size; n+=8) {
75748cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
75848cf3877SPekka Enberg 			break;
75948cf3877SPekka Enberg 
760090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
761090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
762090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
763090f898eSCyrill Gorcunov 	}
76448cf3877SPekka Enberg }
765