1ae1fae34SPekka Enberg #include "kvm/kvm.h" 2ae1fae34SPekka Enberg 3eda03319SPekka Enberg #include "kvm/interrupt.h" 4c78b8713SAsias He #include "kvm/cpufeature.h" 5f3150089SPekka Enberg #include "kvm/util.h" 6eda03319SPekka Enberg 76c7d8514SPekka Enberg #include <linux/kvm.h> 8f5ab5f67SPekka Enberg 9f5ab5f67SPekka Enberg #include <asm/bootparam.h> 10f5ab5f67SPekka Enberg 11ae1fae34SPekka Enberg #include <sys/ioctl.h> 121f9cff23SPekka Enberg #include <inttypes.h> 131f9cff23SPekka Enberg #include <sys/mman.h> 142da26a59SPekka Enberg #include <stdbool.h> 156e5e8b8dSPekka Enberg #include <assert.h> 1606e41eeaSPekka Enberg #include <limits.h> 17f5ab5f67SPekka Enberg #include <stdarg.h> 18b8f6afcdSPekka Enberg #include <stdlib.h> 19f5ab5f67SPekka Enberg #include <string.h> 200d1f17ecSPekka Enberg #include <unistd.h> 211f9cff23SPekka Enberg #include <stdio.h> 22b8f6afcdSPekka Enberg #include <fcntl.h> 23b8f6afcdSPekka Enberg 241f9cff23SPekka Enberg /* 251f9cff23SPekka Enberg * Compatibility code. Remove this when we move to tools/kvm. 261f9cff23SPekka Enberg */ 271f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR 281f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR 17 291f9cff23SPekka Enberg #endif 301f9cff23SPekka Enberg 31ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason 320d1f17ecSPekka Enberg 33ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = { 34ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN), 35ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION), 36ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO), 37ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL), 38ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG), 39ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT), 40ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO), 41ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN), 42ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN), 43ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY), 44ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR), 45ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR), 46ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS), 47ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC), 48ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET), 49ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR), 50ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI), 51ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR), 529b1fb1c3SPekka Enberg }; 539b1fb1c3SPekka Enberg 5455e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext) \ 5555e19624SCyrill Gorcunov .name = #ext, \ 5655e19624SCyrill Gorcunov .code = ext 5755e19624SCyrill Gorcunov 5855e19624SCyrill Gorcunov struct { 5955e19624SCyrill Gorcunov const char *name; 6055e19624SCyrill Gorcunov int code; 6155e19624SCyrill Gorcunov } kvm_req_ext[] = { 6255e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) }, 6355e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) }, 6455e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_PIT2) }, 6555e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) }, 6655e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) }, 6755e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) }, 687c0ec28fSCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_HLT) }, 6955e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) }, 70d38ad31aSCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) }, 7155e19624SCyrill Gorcunov }; 7255e19624SCyrill Gorcunov 7348cf3877SPekka Enberg static inline bool host_ptr_in_ram(struct kvm *self, void *p) 7448cf3877SPekka Enberg { 7548cf3877SPekka Enberg return self->ram_start <= p && p < (self->ram_start + self->ram_size); 7648cf3877SPekka Enberg } 7748cf3877SPekka Enberg 786753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset) 796753ed2fSPekka Enberg { 806753ed2fSPekka Enberg return ((uint32_t)selector << 4) + (uint32_t) offset; 816753ed2fSPekka Enberg } 826753ed2fSPekka Enberg 836753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset) 84ae1fae34SPekka Enberg { 85ae1fae34SPekka Enberg return self->ram_start + offset; 86ae1fae34SPekka Enberg } 87ae1fae34SPekka Enberg 886753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset) 896753ed2fSPekka Enberg { 906753ed2fSPekka Enberg unsigned long flat = segment_to_flat(selector, offset); 916753ed2fSPekka Enberg 926753ed2fSPekka Enberg return guest_flat_to_host(self, flat); 936753ed2fSPekka Enberg } 946753ed2fSPekka Enberg 95ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension) 96b8f6afcdSPekka Enberg { 9728fa19c0SPekka Enberg int ret; 98b8f6afcdSPekka Enberg 9973ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension); 1004076b041SPekka Enberg if (ret < 0) 1014076b041SPekka Enberg return false; 1024076b041SPekka Enberg 1034076b041SPekka Enberg return ret; 1044076b041SPekka Enberg } 1054076b041SPekka Enberg 10655e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self) 10755e19624SCyrill Gorcunov { 10855e19624SCyrill Gorcunov unsigned int i; 10955e19624SCyrill Gorcunov 11055e19624SCyrill Gorcunov for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) { 11155e19624SCyrill Gorcunov if (!kvm__supports_extension(self, kvm_req_ext[i].code)) { 11255e19624SCyrill Gorcunov error("Unsuppored KVM extension detected: %s", 11355e19624SCyrill Gorcunov kvm_req_ext[i].name); 11455e19624SCyrill Gorcunov return (int)-i; 11555e19624SCyrill Gorcunov } 11655e19624SCyrill Gorcunov } 11755e19624SCyrill Gorcunov 11855e19624SCyrill Gorcunov return 0; 11955e19624SCyrill Gorcunov } 12055e19624SCyrill Gorcunov 1214076b041SPekka Enberg static struct kvm *kvm__new(void) 1224076b041SPekka Enberg { 1234076b041SPekka Enberg struct kvm *self = calloc(1, sizeof *self); 1244076b041SPekka Enberg 1254076b041SPekka Enberg if (!self) 1264076b041SPekka Enberg die("out of memory"); 1274076b041SPekka Enberg 1284076b041SPekka Enberg return self; 1294076b041SPekka Enberg } 1304076b041SPekka Enberg 1319ef4c68eSPekka Enberg void kvm__delete(struct kvm *self) 1329ef4c68eSPekka Enberg { 1339ef4c68eSPekka Enberg free(self->ram_start); 1349ef4c68eSPekka Enberg free(self); 1359ef4c68eSPekka Enberg } 1369ef4c68eSPekka Enberg 137c78b8713SAsias He static bool kvm__cpu_supports_vm(void) 138c78b8713SAsias He { 139c78b8713SAsias He struct cpuid_regs regs; 140*ae87afbfSCyrill Gorcunov bool ret = false; 141c78b8713SAsias He 142c78b8713SAsias He regs = (struct cpuid_regs) { 143*ae87afbfSCyrill Gorcunov .eax = 0, 144c78b8713SAsias He }; 145c78b8713SAsias He host_cpuid(®s); 146c78b8713SAsias He 147*ae87afbfSCyrill Gorcunov switch (regs.ebx) { 148*ae87afbfSCyrill Gorcunov case CPUID_VENDOR_INTEL_1: 149*ae87afbfSCyrill Gorcunov if (regs.eax < 1) 150*ae87afbfSCyrill Gorcunov return false; 151*ae87afbfSCyrill Gorcunov regs = (struct cpuid_regs) { .eax = 1 }; 152*ae87afbfSCyrill Gorcunov host_cpuid(®s); 153*ae87afbfSCyrill Gorcunov if (regs.ecx & (1 << KVM__X86_FEATURE_VMX)) 154*ae87afbfSCyrill Gorcunov ret = true; 155*ae87afbfSCyrill Gorcunov break; 156*ae87afbfSCyrill Gorcunov case CPUID_VENDOR_AMD_1: 157*ae87afbfSCyrill Gorcunov regs = (struct cpuid_regs) { .eax = 0x80000000 }; 158*ae87afbfSCyrill Gorcunov host_cpuid(®s); 159*ae87afbfSCyrill Gorcunov if (regs.eax < 0x80000001) 160*ae87afbfSCyrill Gorcunov return false; 161*ae87afbfSCyrill Gorcunov regs = (struct cpuid_regs) { .eax = 0x80000001 }; 162*ae87afbfSCyrill Gorcunov host_cpuid(®s); 163*ae87afbfSCyrill Gorcunov if (regs.ecx & (1 << KVM__X86_FEATURE_SVM)) 164*ae87afbfSCyrill Gorcunov ret = true; 165*ae87afbfSCyrill Gorcunov break; 166*ae87afbfSCyrill Gorcunov } 167*ae87afbfSCyrill Gorcunov 168*ae87afbfSCyrill Gorcunov return ret; 169c78b8713SAsias He } 170c78b8713SAsias He 1716d7c36ceSPekka Enberg struct kvm *kvm__init(const char *kvm_dev) 1724076b041SPekka Enberg { 1732b0e3342SPekka Enberg struct kvm_userspace_memory_region mem; 1749687927dSAsias He struct kvm_pit_config pit_config = { .flags = 0, }; 1754076b041SPekka Enberg struct kvm *self; 1760d1f17ecSPekka Enberg long page_size; 1771f9cff23SPekka Enberg int mmap_size; 1784076b041SPekka Enberg int ret; 1794076b041SPekka Enberg 180c78b8713SAsias He if (!kvm__cpu_supports_vm()) 181c78b8713SAsias He die("Your CPU does not support hardware virtualization"); 182c78b8713SAsias He 1834076b041SPekka Enberg self = kvm__new(); 1844076b041SPekka Enberg 1856d7c36ceSPekka Enberg self->sys_fd = open(kvm_dev, O_RDWR); 1866d7c36ceSPekka Enberg if (self->sys_fd < 0) { 1876d7c36ceSPekka Enberg if (errno == ENOENT) 1886d7c36ceSPekka Enberg die("'%s' not found. Please make sure you have CONFIG_KVM enabled.", kvm_dev); 1896d7c36ceSPekka Enberg 190f5ab5f67SPekka Enberg die_perror("open"); 1916d7c36ceSPekka Enberg } 192b8f6afcdSPekka Enberg 19373ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0); 1946c7d8514SPekka Enberg if (ret != KVM_API_VERSION) 195f5ab5f67SPekka Enberg die_perror("KVM_API_VERSION ioctl"); 1966c7d8514SPekka Enberg 19773ac60e6SPekka Enberg self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0); 19873ac60e6SPekka Enberg if (self->vm_fd < 0) 199f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VM ioctl"); 20028fa19c0SPekka Enberg 20155e19624SCyrill Gorcunov if (kvm__check_extensions(self)) 20255e19624SCyrill Gorcunov die("A required KVM extention is not supported by OS"); 2039687927dSAsias He 2049687927dSAsias He ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000); 2059687927dSAsias He if (ret < 0) 2069687927dSAsias He die_perror("KVM_SET_TSS_ADDR ioctl"); 2079687927dSAsias He 2089687927dSAsias He ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config); 2099687927dSAsias He if (ret < 0) 2109687927dSAsias He die_perror("KVM_CREATE_PIT2 ioctl"); 2119687927dSAsias He 2120d1f17ecSPekka Enberg self->ram_size = 64UL * 1024UL * 1024UL; 2130d1f17ecSPekka Enberg 2140d1f17ecSPekka Enberg page_size = sysconf(_SC_PAGESIZE); 2150d1f17ecSPekka Enberg if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0) 2160d1f17ecSPekka Enberg die("out of memory"); 2170d1f17ecSPekka Enberg 2182b0e3342SPekka Enberg mem = (struct kvm_userspace_memory_region) { 2192b0e3342SPekka Enberg .slot = 0, 2202b0e3342SPekka Enberg .guest_phys_addr = 0x0UL, 2210d1f17ecSPekka Enberg .memory_size = self->ram_size, 2220d1f17ecSPekka Enberg .userspace_addr = (unsigned long) self->ram_start, 2232b0e3342SPekka Enberg }; 2242b0e3342SPekka Enberg 225b6e68186SAsias He ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem); 2262b0e3342SPekka Enberg if (ret < 0) 227f5ab5f67SPekka Enberg die_perror("KVM_SET_USER_MEMORY_REGION ioctl"); 2282b0e3342SPekka Enberg 2299687927dSAsias He ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP); 230895c2fefSPekka Enberg if (ret < 0) 2319687927dSAsias He die_perror("KVM_CREATE_IRQCHIP ioctl"); 2329687927dSAsias He 23373ac60e6SPekka Enberg self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0); 2342b0e3342SPekka Enberg if (self->vcpu_fd < 0) 235f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VCPU ioctl"); 2362b0e3342SPekka Enberg 2371f9cff23SPekka Enberg mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0); 2381f9cff23SPekka Enberg if (mmap_size < 0) 239f5ab5f67SPekka Enberg die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl"); 2401f9cff23SPekka Enberg 2411f9cff23SPekka Enberg self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0); 2421f9cff23SPekka Enberg if (self->kvm_run == MAP_FAILED) 2431f9cff23SPekka Enberg die("unable to mmap vcpu fd"); 2441f9cff23SPekka Enberg 2454076b041SPekka Enberg return self; 2464076b041SPekka Enberg } 2474076b041SPekka Enberg 248ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self) 249aee6632eSPekka Enberg { 250aee6632eSPekka Enberg struct kvm_guest_debug debug = { 251aee6632eSPekka Enberg .control = KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP, 252aee6632eSPekka Enberg }; 253aee6632eSPekka Enberg 254aee6632eSPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0) 255b625d4b6SCyrill Gorcunov warning("KVM_SET_GUEST_DEBUG failed"); 256aee6632eSPekka Enberg } 257aee6632eSPekka Enberg 2585f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR 0x1000 259b08e9ec4SPekka Enberg #define BOOT_LOADER_IP 0x0000 260dbdb74c2SPekka Enberg #define BOOT_LOADER_SP 0x8000 2612dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET 0x20000 2622dd4a4edSCyrill Gorcunov 2632dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED 0x202 264a43f6460SCyrill Gorcunov #define LOAD_HIGH 0x01 265009b0758SPekka Enberg 266edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd) 267009b0758SPekka Enberg { 268009b0758SPekka Enberg void *p; 269009b0758SPekka Enberg int nr; 270009b0758SPekka Enberg 271009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 272009b0758SPekka Enberg die_perror("lseek"); 273009b0758SPekka Enberg 2746753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 275009b0758SPekka Enberg 276009b0758SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 277009b0758SPekka Enberg p += nr; 278009b0758SPekka Enberg 279dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 280edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP; 281dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 282edc8a14dSPekka Enberg 2837fb218bdSPekka Enberg return true; 284009b0758SPekka Enberg } 285009b0758SPekka Enberg 2867fb218bdSPekka Enberg /* 2877fb218bdSPekka Enberg * The protected mode kernel part of a modern bzImage is loaded at 1 MB by 2887fb218bdSPekka Enberg * default. 2897fb218bdSPekka Enberg */ 2907fb218bdSPekka Enberg #define BZ_KERNEL_START 0x100000UL 291ae1fae34SPekka Enberg 292ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC = "HdrS"; 293ae1fae34SPekka Enberg 29410943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS 4 29510943d14SPekka Enberg 2966d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline) 297ae1fae34SPekka Enberg { 298bc75b0aeSCyrill Gorcunov struct real_intr_desc intr; 29922489bb0SCyrill Gorcunov struct boot_params boot; 3004b62331fSPekka Enberg unsigned long setup_sects; 301305d9054SCyrill Gorcunov unsigned int intr_addr; 3022dd4a4edSCyrill Gorcunov size_t cmdline_size; 3037fb218bdSPekka Enberg ssize_t setup_size; 30422489bb0SCyrill Gorcunov void *p; 305ae1fae34SPekka Enberg int nr; 306ae1fae34SPekka Enberg 3075d67eaf6SPekka Enberg /* 3085d67eaf6SPekka Enberg * See Documentation/x86/boot.txt for details no bzImage on-disk and 3095d67eaf6SPekka Enberg * memory layout. 3105d67eaf6SPekka Enberg */ 3115d67eaf6SPekka Enberg 312009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 313009b0758SPekka Enberg die_perror("lseek"); 314009b0758SPekka Enberg 315ae1fae34SPekka Enberg read(fd, &boot, sizeof(boot)); 316ae1fae34SPekka Enberg 317ae1fae34SPekka Enberg if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0) 3187fb218bdSPekka Enberg return false; 319ae1fae34SPekka Enberg 3202dd4a4edSCyrill Gorcunov if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) { 321ad681038SCyrill Gorcunov warning("Too old kernel"); 322ad681038SCyrill Gorcunov return false; 323ad681038SCyrill Gorcunov } 324ad681038SCyrill Gorcunov 325e93ab78aSPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 326e93ab78aSPekka Enberg die_perror("lseek"); 327e93ab78aSPekka Enberg 3284cf542bbSCyrill Gorcunov if (!boot.hdr.setup_sects) 3294cf542bbSCyrill Gorcunov boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS; 33010943d14SPekka Enberg setup_sects = boot.hdr.setup_sects + 1; 33110943d14SPekka Enberg 33254d4a626SPekka Enberg setup_size = setup_sects << 9; 3336753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 334ae1fae34SPekka Enberg 3357fb218bdSPekka Enberg if (read(fd, p, setup_size) != setup_size) 3367fb218bdSPekka Enberg die_perror("read"); 3377fb218bdSPekka Enberg 3386753ed2fSPekka Enberg p = guest_flat_to_host(self, BZ_KERNEL_START); 339ae1fae34SPekka Enberg 340ae1fae34SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 341ae1fae34SPekka Enberg p += nr; 342ae1fae34SPekka Enberg 343a43f6460SCyrill Gorcunov p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET); 344debcfac0SCyrill Gorcunov if (kernel_cmdline) { 345debcfac0SCyrill Gorcunov cmdline_size = strlen(kernel_cmdline) + 1; 346debcfac0SCyrill Gorcunov if (cmdline_size > boot.hdr.cmdline_size) 347debcfac0SCyrill Gorcunov cmdline_size = boot.hdr.cmdline_size; 348ad681038SCyrill Gorcunov 3492dd4a4edSCyrill Gorcunov memset(p, 0, boot.hdr.cmdline_size); 3502dd4a4edSCyrill Gorcunov memcpy(p, kernel_cmdline, cmdline_size - 1); 351debcfac0SCyrill Gorcunov } 352debcfac0SCyrill Gorcunov 353a43f6460SCyrill Gorcunov #define hdr_offset(member) \ 354a43f6460SCyrill Gorcunov offsetof(struct boot_params, hdr) + \ 355a43f6460SCyrill Gorcunov offsetof(struct setup_header, member) 356a43f6460SCyrill Gorcunov #define guest_hdr(kvm, member) \ 357a43f6460SCyrill Gorcunov guest_real_to_host(kvm, \ 358a43f6460SCyrill Gorcunov BOOT_LOADER_SELECTOR, \ 359a43f6460SCyrill Gorcunov hdr_offset(member)) 360a43f6460SCyrill Gorcunov 361a43f6460SCyrill Gorcunov /* some fields in guest header have to be updated */ 362a43f6460SCyrill Gorcunov p = guest_hdr(self, cmd_line_ptr); 363a43f6460SCyrill Gorcunov *(uint32_t *)p = BOOT_CMDLINE_OFFSET; 364a43f6460SCyrill Gorcunov 365a43f6460SCyrill Gorcunov p = guest_hdr(self, type_of_loader); 366a43f6460SCyrill Gorcunov *(uint8_t *)p = 0xff; 367a43f6460SCyrill Gorcunov 368a43f6460SCyrill Gorcunov p = guest_hdr(self, heap_end_ptr); 369a43f6460SCyrill Gorcunov *(uint16_t *)p = 0xfe00; 370a43f6460SCyrill Gorcunov 371a43f6460SCyrill Gorcunov p = guest_hdr(self, loadflags); 372a43f6460SCyrill Gorcunov *(uint8_t *)p |= CAN_USE_HEAP; 373a43f6460SCyrill Gorcunov 374dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 375edc8a14dSPekka Enberg /* 376edc8a14dSPekka Enberg * The real-mode setup code starts at offset 0x200 of a bzImage. See 377edc8a14dSPekka Enberg * Documentation/x86/boot.txt for details. 378edc8a14dSPekka Enberg */ 379edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP + 0x200; 380dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 381edc8a14dSPekka Enberg 382ea684828SCyrill Gorcunov /* 38322489bb0SCyrill Gorcunov * Setup a *fake* real mode vector table, it has only 38422489bb0SCyrill Gorcunov * one real hadler which does just iret 38522489bb0SCyrill Gorcunov * 386305d9054SCyrill Gorcunov * This is where the BIOS lives -- BDA area 387ea684828SCyrill Gorcunov */ 388305d9054SCyrill Gorcunov intr_addr = BIOS_INTR_NEXT(BDA_START + 0, 16); 389305d9054SCyrill Gorcunov p = guest_flat_to_host(self, intr_addr); 3908b8fb6c7SCyrill Gorcunov memcpy(p, intfake, intfake_end - intfake); 391bc75b0aeSCyrill Gorcunov intr = (struct real_intr_desc) { 392305d9054SCyrill Gorcunov .segment = REAL_SEGMENT(intr_addr), 39322489bb0SCyrill Gorcunov .offset = 0, 394ea684828SCyrill Gorcunov }; 395bc75b0aeSCyrill Gorcunov interrupt_table__setup(&self->interrupt_table, &intr); 396305d9054SCyrill Gorcunov 3978b8fb6c7SCyrill Gorcunov intr_addr = BIOS_INTR_NEXT(BDA_START + (intfake_end - intfake), 16); 398305d9054SCyrill Gorcunov p = guest_flat_to_host(self, intr_addr); 3998b8fb6c7SCyrill Gorcunov memcpy(p, int10, int10_end - int10); 400305d9054SCyrill Gorcunov intr = (struct real_intr_desc) { 401305d9054SCyrill Gorcunov .segment = REAL_SEGMENT(intr_addr), 402305d9054SCyrill Gorcunov .offset = 0, 403305d9054SCyrill Gorcunov }; 404305d9054SCyrill Gorcunov interrupt_table__set(&self->interrupt_table, &intr, 0x10); 405305d9054SCyrill Gorcunov 406305d9054SCyrill Gorcunov p = guest_flat_to_host(self, 0); 407bc75b0aeSCyrill Gorcunov interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE); 408ea684828SCyrill Gorcunov 4097fb218bdSPekka Enberg return true; 410ae1fae34SPekka Enberg } 411ae1fae34SPekka Enberg 4126d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename, 4136d1f350dSCyrill Gorcunov const char *kernel_cmdline) 414ae1fae34SPekka Enberg { 4157fb218bdSPekka Enberg bool ret; 416ae1fae34SPekka Enberg int fd; 417ae1fae34SPekka Enberg 418ae1fae34SPekka Enberg fd = open(kernel_filename, O_RDONLY); 419ae1fae34SPekka Enberg if (fd < 0) 420ae1fae34SPekka Enberg die("unable to open kernel"); 421ae1fae34SPekka Enberg 4226d1f350dSCyrill Gorcunov ret = load_bzimage(kvm, fd, kernel_cmdline); 423009b0758SPekka Enberg if (ret) 424009b0758SPekka Enberg goto found_kernel; 425ae1fae34SPekka Enberg 426009b0758SPekka Enberg ret = load_flat_binary(kvm, fd); 427009b0758SPekka Enberg if (ret) 428009b0758SPekka Enberg goto found_kernel; 429009b0758SPekka Enberg 430009b0758SPekka Enberg die("%s is not a valid bzImage or flat binary", kernel_filename); 431009b0758SPekka Enberg 432009b0758SPekka Enberg found_kernel: 433ae1fae34SPekka Enberg return ret; 434ae1fae34SPekka Enberg } 435ae1fae34SPekka Enberg 43606e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip) 43706e41eeaSPekka Enberg { 43806e41eeaSPekka Enberg uint64_t cs = self->sregs.cs.selector; 43906e41eeaSPekka Enberg 44006e41eeaSPekka Enberg return ip - (cs << 4); 44106e41eeaSPekka Enberg } 44206e41eeaSPekka Enberg 443f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self) 444f01944c8SPekka Enberg { 445f01944c8SPekka Enberg return self->sregs.cr0 & 0x01; 446f01944c8SPekka Enberg } 447f01944c8SPekka Enberg 448f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip) 44906e41eeaSPekka Enberg { 450f326512aSPekka Enberg uint64_t cs; 451f326512aSPekka Enberg 452f326512aSPekka Enberg /* 453f326512aSPekka Enberg * NOTE! We should take code segment base address into account here. 454f326512aSPekka Enberg * Luckily it's usually zero because Linux uses flat memory model. 455f326512aSPekka Enberg */ 456f01944c8SPekka Enberg if (is_in_protected_mode(self)) 457f326512aSPekka Enberg return ip; 458f326512aSPekka Enberg 459f326512aSPekka Enberg cs = self->sregs.cs.selector; 46006e41eeaSPekka Enberg 46106e41eeaSPekka Enberg return ip + (cs << 4); 46206e41eeaSPekka Enberg } 46306e41eeaSPekka Enberg 464dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector) 465dbdb74c2SPekka Enberg { 466dbdb74c2SPekka Enberg /* 467dbdb74c2SPekka Enberg * KVM on Intel requires 'base' to be 'selector * 16' in real mode. 468dbdb74c2SPekka Enberg */ 469dbdb74c2SPekka Enberg return (uint32_t)selector * 16; 470dbdb74c2SPekka Enberg } 471dbdb74c2SPekka Enberg 47253d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs) 47353d48714SPekka Enberg { 47453d48714SPekka Enberg struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs)); 47553d48714SPekka Enberg 47653d48714SPekka Enberg if (!self) 47753d48714SPekka Enberg die("out of memory"); 47853d48714SPekka Enberg 47953d48714SPekka Enberg return self; 48053d48714SPekka Enberg } 48153d48714SPekka Enberg 48253d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER 0x10 48353d48714SPekka Enberg 48453d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS 0x174 48553d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP 0x175 48653d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP 0x176 48753d48714SPekka Enberg 48853d48714SPekka Enberg #define MSR_IA32_STAR 0xc0000081 48953d48714SPekka Enberg #define MSR_IA32_LSTAR 0xc0000082 49053d48714SPekka Enberg #define MSR_IA32_CSTAR 0xc0000083 49153d48714SPekka Enberg #define MSR_IA32_FMASK 0xc0000084 49253d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE 0xc0000102 49353d48714SPekka Enberg 49453d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data) \ 49553d48714SPekka Enberg (struct kvm_msr_entry) { .index = _index, .data = _data } 49653d48714SPekka Enberg 49753d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self) 49853d48714SPekka Enberg { 49953d48714SPekka Enberg unsigned long ndx = 0; 50053d48714SPekka Enberg 50153d48714SPekka Enberg self->msrs = kvm_msrs__new(100); 50253d48714SPekka Enberg 50353d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS, 0x0); 50453d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP, 0x0); 50553d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP, 0x0); 5068b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64 50753d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR, 0x0); 50853d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR, 0x0); 50953d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE, 0x0); 51053d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK, 0x0); 51153d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR, 0x0); 51244069a9dSCyrill Gorcunov #endif 51353d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER, 0x0); 51453d48714SPekka Enberg 51553d48714SPekka Enberg self->msrs->nmsrs = ndx; 51653d48714SPekka Enberg 51753d48714SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0) 51853d48714SPekka Enberg die_perror("KVM_SET_MSRS failed"); 51953d48714SPekka Enberg } 52053d48714SPekka Enberg 5213d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self) 5223d78d3a5SPekka Enberg { 5233d78d3a5SPekka Enberg self->fpu = (struct kvm_fpu) { 5243d78d3a5SPekka Enberg .fcw = 0x37f, 5253d78d3a5SPekka Enberg .mxcsr = 0x1f80, 5263d78d3a5SPekka Enberg }; 5273d78d3a5SPekka Enberg 5283d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0) 5293d78d3a5SPekka Enberg die_perror("KVM_SET_FPU failed"); 5303d78d3a5SPekka Enberg } 5313d78d3a5SPekka Enberg 5323d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self) 5333d78d3a5SPekka Enberg { 5343d78d3a5SPekka Enberg self->regs = (struct kvm_regs) { 5353d78d3a5SPekka Enberg /* We start the guest in 16-bit real mode */ 5363d78d3a5SPekka Enberg .rflags = 0x0000000000000002ULL, 5373d78d3a5SPekka Enberg 5383d78d3a5SPekka Enberg .rip = self->boot_ip, 5393d78d3a5SPekka Enberg .rsp = self->boot_sp, 5403d78d3a5SPekka Enberg .rbp = self->boot_sp, 5413d78d3a5SPekka Enberg }; 5423d78d3a5SPekka Enberg 5433d78d3a5SPekka Enberg if (self->regs.rip > USHRT_MAX) 5443d78d3a5SPekka Enberg die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip); 5453d78d3a5SPekka Enberg 5463d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0) 5473d78d3a5SPekka Enberg die_perror("KVM_SET_REGS failed"); 5483d78d3a5SPekka Enberg } 5493d78d3a5SPekka Enberg 5503d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self) 551ae1fae34SPekka Enberg { 55253602077SPekka Enberg 5530ed849e6SAsias He if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 5540ed849e6SAsias He die_perror("KVM_GET_SREGS failed"); 5554a7c140aSAsias He 5560ed849e6SAsias He self->sregs.cs.selector = self->boot_selector; 5570ed849e6SAsias He self->sregs.cs.base = selector_to_base(self->boot_selector); 5584e42cf94SAsias He self->sregs.ss.selector = self->boot_selector; 5594e42cf94SAsias He self->sregs.ss.base = selector_to_base(self->boot_selector); 5604e42cf94SAsias He self->sregs.ds.selector = self->boot_selector; 5614e42cf94SAsias He self->sregs.ds.base = selector_to_base(self->boot_selector); 5624e42cf94SAsias He self->sregs.es.selector = self->boot_selector; 5634e42cf94SAsias He self->sregs.es.base = selector_to_base(self->boot_selector); 5644e42cf94SAsias He self->sregs.fs.selector = self->boot_selector; 5654e42cf94SAsias He self->sregs.fs.base = selector_to_base(self->boot_selector); 5664e42cf94SAsias He self->sregs.gs.selector = self->boot_selector; 5674e42cf94SAsias He self->sregs.gs.base = selector_to_base(self->boot_selector); 5684a7c140aSAsias He 56953602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0) 57053602077SPekka Enberg die_perror("KVM_SET_SREGS failed"); 5713d78d3a5SPekka Enberg } 57206e41eeaSPekka Enberg 5733d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self) 5743d78d3a5SPekka Enberg { 5753d78d3a5SPekka Enberg kvm__setup_sregs(self); 576dbdb74c2SPekka Enberg 5773d78d3a5SPekka Enberg kvm__setup_regs(self); 57806e41eeaSPekka Enberg 5793d78d3a5SPekka Enberg kvm__setup_fpu(self); 58053d48714SPekka Enberg 58153d48714SPekka Enberg kvm__setup_msrs(self); 582ae1fae34SPekka Enberg } 583ae1fae34SPekka Enberg 584ae1fae34SPekka Enberg void kvm__run(struct kvm *self) 585ae1fae34SPekka Enberg { 586ae1fae34SPekka Enberg if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0) 587ae1fae34SPekka Enberg die_perror("KVM_RUN failed"); 588ae1fae34SPekka Enberg } 589ae1fae34SPekka Enberg 5908351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable) 5918351aaddSPekka Enberg { 5928351aaddSPekka Enberg printf(" %s %016" PRIx64 " %08" PRIx16 "\n", 5938351aaddSPekka Enberg name, (uint64_t) dtable->base, (uint16_t) dtable->limit); 5948351aaddSPekka Enberg } 5958351aaddSPekka Enberg 59653602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg) 59753602077SPekka Enberg { 598ce556636SPekka Enberg printf(" %s %04" PRIx16 " %016" PRIx64 " %08" PRIx32 " %02" PRIx8 " %x %x %x %x %x %x %x\n", 59953602077SPekka Enberg name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit, 600ce556636SPekka Enberg (uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl); 60153602077SPekka Enberg } 60253602077SPekka Enberg 603ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self) 6047118d2caSPekka Enberg { 60553602077SPekka Enberg unsigned long cr0, cr2, cr3; 60653602077SPekka Enberg unsigned long cr4, cr8; 6077118d2caSPekka Enberg unsigned long rax, rbx, rcx; 6087118d2caSPekka Enberg unsigned long rdx, rsi, rdi; 6097118d2caSPekka Enberg unsigned long rbp, r8, r9; 6107118d2caSPekka Enberg unsigned long r10, r11, r12; 6117118d2caSPekka Enberg unsigned long r13, r14, r15; 6127118d2caSPekka Enberg unsigned long rip, rsp; 61353602077SPekka Enberg struct kvm_sregs sregs; 614a2fe6199SPekka Enberg unsigned long rflags; 6157118d2caSPekka Enberg struct kvm_regs regs; 616ce5e0ecbSPekka Enberg int i; 6177118d2caSPekka Enberg 6187118d2caSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, ®s) < 0) 6197118d2caSPekka Enberg die("KVM_GET_REGS failed"); 6207118d2caSPekka Enberg 621a2fe6199SPekka Enberg rflags = regs.rflags; 622a2fe6199SPekka Enberg 6237118d2caSPekka Enberg rip = regs.rip; rsp = regs.rsp; 6247118d2caSPekka Enberg rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx; 6257118d2caSPekka Enberg rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi; 6267118d2caSPekka Enberg rbp = regs.rbp; r8 = regs.r8; r9 = regs.r9; 6277118d2caSPekka Enberg r10 = regs.r10; r11 = regs.r11; r12 = regs.r12; 6287118d2caSPekka Enberg r13 = regs.r13; r14 = regs.r14; r15 = regs.r15; 6297118d2caSPekka Enberg 6307118d2caSPekka Enberg printf("Registers:\n"); 6312177ec43SPekka Enberg printf(" rip: %016lx rsp: %016lx flags: %016lx\n", rip, rsp, rflags); 632ea2e4ea0SCyrill Gorcunov printf(" rax: %016lx rbx: %016lx rcx: %016lx\n", rax, rbx, rcx); 6337118d2caSPekka Enberg printf(" rdx: %016lx rsi: %016lx rdi: %016lx\n", rdx, rsi, rdi); 6347118d2caSPekka Enberg printf(" rbp: %016lx r8: %016lx r9: %016lx\n", rbp, r8, r9); 6357118d2caSPekka Enberg printf(" r10: %016lx r11: %016lx r12: %016lx\n", r10, r11, r12); 6367118d2caSPekka Enberg printf(" r13: %016lx r14: %016lx r15: %016lx\n", r13, r14, r15); 63753602077SPekka Enberg 63853602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0) 63953602077SPekka Enberg die("KVM_GET_REGS failed"); 64053602077SPekka Enberg 64153602077SPekka Enberg cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3; 64253602077SPekka Enberg cr4 = sregs.cr4; cr8 = sregs.cr8; 64353602077SPekka Enberg 64453602077SPekka Enberg printf(" cr0: %016lx cr2: %016lx cr3: %016lx\n", cr0, cr2, cr3); 64553602077SPekka Enberg printf(" cr4: %016lx cr8: %016lx\n", cr4, cr8); 646ce5e0ecbSPekka Enberg printf("Segment registers:\n"); 647ce556636SPekka Enberg printf(" register selector base limit type p dpl db s l g avl\n"); 64853602077SPekka Enberg print_segment("cs ", &sregs.cs); 64953602077SPekka Enberg print_segment("ss ", &sregs.ss); 65053602077SPekka Enberg print_segment("ds ", &sregs.ds); 65153602077SPekka Enberg print_segment("es ", &sregs.es); 65253602077SPekka Enberg print_segment("fs ", &sregs.fs); 65353602077SPekka Enberg print_segment("gs ", &sregs.gs); 654ce5e0ecbSPekka Enberg print_segment("tr ", &sregs.tr); 655ce5e0ecbSPekka Enberg print_segment("ldt", &sregs.ldt); 6568351aaddSPekka Enberg print_dtable("gdt", &sregs.gdt); 6578351aaddSPekka Enberg print_dtable("idt", &sregs.idt); 6580f9983b2SCyrill Gorcunov printf(" [ efer: %016" PRIx64 " apic base: %016" PRIx64 " nmi: %s ]\n", 6590f9983b2SCyrill Gorcunov (uint64_t) sregs.efer, (uint64_t) sregs.apic_base, 6602049569dSPekka Enberg (self->nmi_disabled ? "disabled" : "enabled")); 661ce5e0ecbSPekka Enberg printf("Interrupt bitmap:\n"); 662ce5e0ecbSPekka Enberg printf(" "); 663ce5e0ecbSPekka Enberg for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++) 6640f9983b2SCyrill Gorcunov printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]); 665ce5e0ecbSPekka Enberg printf("\n"); 6667118d2caSPekka Enberg } 6677118d2caSPekka Enberg 668ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self) 6696f10be05SPekka Enberg { 6706f10be05SPekka Enberg unsigned int code_bytes = 64; 6716f10be05SPekka Enberg unsigned int code_prologue = code_bytes * 43 / 64; 6726f10be05SPekka Enberg unsigned int code_len = code_bytes; 6736f10be05SPekka Enberg unsigned char c; 674ae1fae34SPekka Enberg unsigned int i; 6756f10be05SPekka Enberg uint8_t *ip; 6766f10be05SPekka Enberg 6772a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0) 6782a601aafSPekka Enberg die("KVM_GET_REGS failed"); 6792a601aafSPekka Enberg 6802a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 6812a601aafSPekka Enberg die("KVM_GET_SREGS failed"); 6822a601aafSPekka Enberg 683f326512aSPekka Enberg ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue); 6846f10be05SPekka Enberg 6856f10be05SPekka Enberg printf("Code: "); 6866f10be05SPekka Enberg 6876f10be05SPekka Enberg for (i = 0; i < code_len; i++, ip++) { 68848cf3877SPekka Enberg if (!host_ptr_in_ram(self, ip)) 68948cf3877SPekka Enberg break; 69048cf3877SPekka Enberg 6916e8abc38SPekka Enberg c = *ip; 6926e8abc38SPekka Enberg 693f326512aSPekka Enberg if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip))) 6946f10be05SPekka Enberg printf("<%02x> ", c); 6956f10be05SPekka Enberg else 6966f10be05SPekka Enberg printf("%02x ", c); 6976f10be05SPekka Enberg } 6986f10be05SPekka Enberg 6996f10be05SPekka Enberg printf("\n"); 7002a7d39a4SPekka Enberg 7012a7d39a4SPekka Enberg printf("Stack:\n"); 7022a7d39a4SPekka Enberg kvm__dump_mem(self, self->regs.rsp, 32); 7036f10be05SPekka Enberg } 704090f898eSCyrill Gorcunov 705f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self) 706f01944c8SPekka Enberg { 707f01944c8SPekka Enberg uint64_t *pte1; 708f01944c8SPekka Enberg uint64_t *pte2; 709f01944c8SPekka Enberg uint64_t *pte3; 710f01944c8SPekka Enberg uint64_t *pte4; 711f01944c8SPekka Enberg 712f01944c8SPekka Enberg if (!is_in_protected_mode(self)) 713f01944c8SPekka Enberg return; 714f01944c8SPekka Enberg 715f01944c8SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 716f01944c8SPekka Enberg die("KVM_GET_SREGS failed"); 717f01944c8SPekka Enberg 718f01944c8SPekka Enberg pte4 = guest_flat_to_host(self, self->sregs.cr3); 71948cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte4)) 72048cf3877SPekka Enberg return; 72148cf3877SPekka Enberg 722f01944c8SPekka Enberg pte3 = guest_flat_to_host(self, (*pte4 & ~0xfff)); 72348cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte3)) 72448cf3877SPekka Enberg return; 72548cf3877SPekka Enberg 726f01944c8SPekka Enberg pte2 = guest_flat_to_host(self, (*pte3 & ~0xfff)); 72748cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte2)) 72848cf3877SPekka Enberg return; 72948cf3877SPekka Enberg 730f01944c8SPekka Enberg pte1 = guest_flat_to_host(self, (*pte2 & ~0xfff)); 73148cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte1)) 73248cf3877SPekka Enberg return; 733f01944c8SPekka Enberg 734f01944c8SPekka Enberg printf("Page Tables:\n"); 735f01944c8SPekka Enberg if (*pte2 & (1 << 7)) 7360f9983b2SCyrill Gorcunov printf(" pte4: %016" PRIx64 " pte3: %016" PRIx64 7370f9983b2SCyrill Gorcunov " pte2: %016" PRIx64 "\n", 7380f9983b2SCyrill Gorcunov *pte4, *pte3, *pte2); 739f01944c8SPekka Enberg else 7400f9983b2SCyrill Gorcunov printf(" pte4: %016" PRIx64 " pte3: %016" PRIx64 " pte2: %016" 7410f9983b2SCyrill Gorcunov PRIx64 " pte1: %016" PRIx64 "\n", 7420f9983b2SCyrill Gorcunov *pte4, *pte3, *pte2, *pte1); 743f01944c8SPekka Enberg } 744f01944c8SPekka Enberg 745090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size) 746090f898eSCyrill Gorcunov { 747090f898eSCyrill Gorcunov unsigned char *p; 748090f898eSCyrill Gorcunov unsigned long n; 749090f898eSCyrill Gorcunov 750090f898eSCyrill Gorcunov size &= ~7; /* mod 8 */ 751090f898eSCyrill Gorcunov if (!size) 752090f898eSCyrill Gorcunov return; 753090f898eSCyrill Gorcunov 7542a7d39a4SPekka Enberg p = guest_flat_to_host(self, addr); 755090f898eSCyrill Gorcunov 75648cf3877SPekka Enberg for (n = 0; n < size; n+=8) { 75748cf3877SPekka Enberg if (!host_ptr_in_ram(self, p + n)) 75848cf3877SPekka Enberg break; 75948cf3877SPekka Enberg 760090f898eSCyrill Gorcunov printf(" 0x%08lx: %02x %02x %02x %02x %02x %02x %02x %02x\n", 761090f898eSCyrill Gorcunov addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3], 762090f898eSCyrill Gorcunov p[n + 4], p[n + 5], p[n + 6], p[n + 7]); 763090f898eSCyrill Gorcunov } 76448cf3877SPekka Enberg } 765