1ae1fae34SPekka Enberg #include "kvm/kvm.h" 2ae1fae34SPekka Enberg 3eda03319SPekka Enberg #include "kvm/interrupt.h" 4f3150089SPekka Enberg #include "kvm/util.h" 5eda03319SPekka Enberg 66c7d8514SPekka Enberg #include <linux/kvm.h> 7f5ab5f67SPekka Enberg 8f5ab5f67SPekka Enberg #include <asm/bootparam.h> 9f5ab5f67SPekka Enberg 10ae1fae34SPekka Enberg #include <sys/ioctl.h> 111f9cff23SPekka Enberg #include <inttypes.h> 121f9cff23SPekka Enberg #include <sys/mman.h> 132da26a59SPekka Enberg #include <stdbool.h> 1406e41eeaSPekka Enberg #include <limits.h> 15f5ab5f67SPekka Enberg #include <stdarg.h> 16b8f6afcdSPekka Enberg #include <stdlib.h> 17f5ab5f67SPekka Enberg #include <string.h> 180d1f17ecSPekka Enberg #include <unistd.h> 191f9cff23SPekka Enberg #include <stdio.h> 20b8f6afcdSPekka Enberg #include <fcntl.h> 21b8f6afcdSPekka Enberg 221f9cff23SPekka Enberg /* 231f9cff23SPekka Enberg * Compatibility code. Remove this when we move to tools/kvm. 241f9cff23SPekka Enberg */ 251f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR 261f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR 17 271f9cff23SPekka Enberg #endif 281f9cff23SPekka Enberg 29ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason 300d1f17ecSPekka Enberg 31ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = { 32ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN), 33ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION), 34ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO), 35ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL), 36ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG), 37ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT), 38ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO), 39ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN), 40ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN), 41ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY), 42ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR), 43ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR), 44ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS), 45ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC), 46ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET), 47ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR), 48ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI), 49ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR), 509b1fb1c3SPekka Enberg }; 519b1fb1c3SPekka Enberg 526753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset) 536753ed2fSPekka Enberg { 546753ed2fSPekka Enberg return ((uint32_t)selector << 4) + (uint32_t) offset; 556753ed2fSPekka Enberg } 566753ed2fSPekka Enberg 576753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset) 58ae1fae34SPekka Enberg { 59ae1fae34SPekka Enberg return self->ram_start + offset; 60ae1fae34SPekka Enberg } 61ae1fae34SPekka Enberg 626753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset) 636753ed2fSPekka Enberg { 646753ed2fSPekka Enberg unsigned long flat = segment_to_flat(selector, offset); 656753ed2fSPekka Enberg 666753ed2fSPekka Enberg return guest_flat_to_host(self, flat); 676753ed2fSPekka Enberg } 686753ed2fSPekka Enberg 69ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension) 70b8f6afcdSPekka Enberg { 7128fa19c0SPekka Enberg int ret; 72b8f6afcdSPekka Enberg 7373ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension); 744076b041SPekka Enberg if (ret < 0) 754076b041SPekka Enberg return false; 764076b041SPekka Enberg 774076b041SPekka Enberg return ret; 784076b041SPekka Enberg } 794076b041SPekka Enberg 804076b041SPekka Enberg static struct kvm *kvm__new(void) 814076b041SPekka Enberg { 824076b041SPekka Enberg struct kvm *self = calloc(1, sizeof *self); 834076b041SPekka Enberg 844076b041SPekka Enberg if (!self) 854076b041SPekka Enberg die("out of memory"); 864076b041SPekka Enberg 874076b041SPekka Enberg return self; 884076b041SPekka Enberg } 894076b041SPekka Enberg 90ae1fae34SPekka Enberg struct kvm *kvm__init(void) 914076b041SPekka Enberg { 922b0e3342SPekka Enberg struct kvm_userspace_memory_region mem; 934076b041SPekka Enberg struct kvm *self; 940d1f17ecSPekka Enberg long page_size; 951f9cff23SPekka Enberg int mmap_size; 964076b041SPekka Enberg int ret; 974076b041SPekka Enberg 984076b041SPekka Enberg self = kvm__new(); 994076b041SPekka Enberg 10073ac60e6SPekka Enberg self->sys_fd = open("/dev/kvm", O_RDWR); 10173ac60e6SPekka Enberg if (self->sys_fd < 0) 102f5ab5f67SPekka Enberg die_perror("open"); 103b8f6afcdSPekka Enberg 10473ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0); 1056c7d8514SPekka Enberg if (ret != KVM_API_VERSION) 106f5ab5f67SPekka Enberg die_perror("KVM_API_VERSION ioctl"); 1076c7d8514SPekka Enberg 10873ac60e6SPekka Enberg self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0); 10973ac60e6SPekka Enberg if (self->vm_fd < 0) 110f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VM ioctl"); 11128fa19c0SPekka Enberg 1124076b041SPekka Enberg if (!kvm__supports_extension(self, KVM_CAP_USER_MEMORY)) 113f5ab5f67SPekka Enberg die("KVM_CAP_USER_MEMORY is not supported"); 1142da26a59SPekka Enberg 1150d1f17ecSPekka Enberg self->ram_size = 64UL * 1024UL * 1024UL; 1160d1f17ecSPekka Enberg 1170d1f17ecSPekka Enberg page_size = sysconf(_SC_PAGESIZE); 1180d1f17ecSPekka Enberg if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0) 1190d1f17ecSPekka Enberg die("out of memory"); 1200d1f17ecSPekka Enberg 1212b0e3342SPekka Enberg mem = (struct kvm_userspace_memory_region) { 1222b0e3342SPekka Enberg .slot = 0, 1232b0e3342SPekka Enberg .guest_phys_addr = 0x0UL, 1240d1f17ecSPekka Enberg .memory_size = self->ram_size, 1250d1f17ecSPekka Enberg .userspace_addr = (unsigned long) self->ram_start, 1262b0e3342SPekka Enberg }; 1272b0e3342SPekka Enberg 12873ac60e6SPekka Enberg ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem, 1); 1292b0e3342SPekka Enberg if (ret < 0) 130f5ab5f67SPekka Enberg die_perror("KVM_SET_USER_MEMORY_REGION ioctl"); 1312b0e3342SPekka Enberg 132895c2fefSPekka Enberg if (!kvm__supports_extension(self, KVM_CAP_SET_TSS_ADDR)) 133f5ab5f67SPekka Enberg die("KVM_CAP_SET_TSS_ADDR is not supported"); 134895c2fefSPekka Enberg 13573ac60e6SPekka Enberg ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000); 136895c2fefSPekka Enberg if (ret < 0) 137f5ab5f67SPekka Enberg die_perror("KVM_SET_TSS_ADDR ioctl"); 138895c2fefSPekka Enberg 13973ac60e6SPekka Enberg self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0); 1402b0e3342SPekka Enberg if (self->vcpu_fd < 0) 141f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VCPU ioctl"); 1422b0e3342SPekka Enberg 1431f9cff23SPekka Enberg mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0); 1441f9cff23SPekka Enberg if (mmap_size < 0) 145f5ab5f67SPekka Enberg die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl"); 1461f9cff23SPekka Enberg 1471f9cff23SPekka Enberg self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0); 1481f9cff23SPekka Enberg if (self->kvm_run == MAP_FAILED) 1491f9cff23SPekka Enberg die("unable to mmap vcpu fd"); 1501f9cff23SPekka Enberg 1514076b041SPekka Enberg return self; 1524076b041SPekka Enberg } 1534076b041SPekka Enberg 154ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self) 155aee6632eSPekka Enberg { 156aee6632eSPekka Enberg struct kvm_guest_debug debug = { 157aee6632eSPekka Enberg .control = KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP, 158aee6632eSPekka Enberg }; 159aee6632eSPekka Enberg 160aee6632eSPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0) 161b625d4b6SCyrill Gorcunov warning("KVM_SET_GUEST_DEBUG failed"); 162aee6632eSPekka Enberg } 163aee6632eSPekka Enberg 1645f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR 0x1000 165b08e9ec4SPekka Enberg #define BOOT_LOADER_IP 0x0000 166dbdb74c2SPekka Enberg #define BOOT_LOADER_SP 0x8000 167009b0758SPekka Enberg 168edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd) 169009b0758SPekka Enberg { 170009b0758SPekka Enberg void *p; 171009b0758SPekka Enberg int nr; 172009b0758SPekka Enberg 173009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 174009b0758SPekka Enberg die_perror("lseek"); 175009b0758SPekka Enberg 1766753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 177009b0758SPekka Enberg 178009b0758SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 179009b0758SPekka Enberg p += nr; 180009b0758SPekka Enberg 181dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 182edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP; 183dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 184edc8a14dSPekka Enberg 1857fb218bdSPekka Enberg return true; 186009b0758SPekka Enberg } 187009b0758SPekka Enberg 1887fb218bdSPekka Enberg /* 1897fb218bdSPekka Enberg * The protected mode kernel part of a modern bzImage is loaded at 1 MB by 1907fb218bdSPekka Enberg * default. 1917fb218bdSPekka Enberg */ 1927fb218bdSPekka Enberg #define BZ_KERNEL_START 0x100000UL 193ae1fae34SPekka Enberg 194ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC = "HdrS"; 195ae1fae34SPekka Enberg 19610943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS 4 19710943d14SPekka Enberg 1986d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline) 199ae1fae34SPekka Enberg { 200*bc75b0aeSCyrill Gorcunov struct real_intr_desc intr; 2014b62331fSPekka Enberg struct boot_params boot, *t; 2024b62331fSPekka Enberg unsigned long setup_sects; 2037fb218bdSPekka Enberg ssize_t setup_size; 20460489bb9SCyrill Gorcunov void *p, *v; 205ae1fae34SPekka Enberg int nr; 206ae1fae34SPekka Enberg 2075d67eaf6SPekka Enberg /* 2085d67eaf6SPekka Enberg * See Documentation/x86/boot.txt for details no bzImage on-disk and 2095d67eaf6SPekka Enberg * memory layout. 2105d67eaf6SPekka Enberg */ 2115d67eaf6SPekka Enberg 212009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 213009b0758SPekka Enberg die_perror("lseek"); 214009b0758SPekka Enberg 215ae1fae34SPekka Enberg read(fd, &boot, sizeof(boot)); 216ae1fae34SPekka Enberg 217ae1fae34SPekka Enberg if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0) 2187fb218bdSPekka Enberg return false; 219ae1fae34SPekka Enberg 220e93ab78aSPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 221e93ab78aSPekka Enberg die_perror("lseek"); 222e93ab78aSPekka Enberg 2234cf542bbSCyrill Gorcunov if (!boot.hdr.setup_sects) 2244cf542bbSCyrill Gorcunov boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS; 22510943d14SPekka Enberg setup_sects = boot.hdr.setup_sects + 1; 22610943d14SPekka Enberg 22754d4a626SPekka Enberg setup_size = setup_sects << 9; 2286753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 229ae1fae34SPekka Enberg 2307fb218bdSPekka Enberg if (read(fd, p, setup_size) != setup_size) 2317fb218bdSPekka Enberg die_perror("read"); 2327fb218bdSPekka Enberg 2336753ed2fSPekka Enberg p = guest_flat_to_host(self, BZ_KERNEL_START); 234ae1fae34SPekka Enberg 235ae1fae34SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 236ae1fae34SPekka Enberg p += nr; 237ae1fae34SPekka Enberg 238dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 239edc8a14dSPekka Enberg /* 240edc8a14dSPekka Enberg * The real-mode setup code starts at offset 0x200 of a bzImage. See 241edc8a14dSPekka Enberg * Documentation/x86/boot.txt for details. 242edc8a14dSPekka Enberg */ 243edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP + 0x200; 244dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 245edc8a14dSPekka Enberg 246ea684828SCyrill Gorcunov /* 247ea684828SCyrill Gorcunov * Setup a *fake* real mode IVT, it has only one real 248ea684828SCyrill Gorcunov * hadler which does just iret 249ea684828SCyrill Gorcunov */ 25060489bb9SCyrill Gorcunov /* 25160489bb9SCyrill Gorcunov * we need a place for 2 bytes so lets do 25260489bb9SCyrill Gorcunov * a hack and use spare place in bootparams 25360489bb9SCyrill Gorcunov */ 2544b62331fSPekka Enberg t = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 25560489bb9SCyrill Gorcunov v = guest_flat_to_host(self, 0); 25660489bb9SCyrill Gorcunov t->hdr._pad2[0] = 0xfb; /* sti */ 25760489bb9SCyrill Gorcunov t->hdr._pad2[1] = 0xcf; /* iret */ 25860489bb9SCyrill Gorcunov nr = (void *)&t->hdr._pad2[0] - v; 259*bc75b0aeSCyrill Gorcunov intr = (struct real_intr_desc) { 26060489bb9SCyrill Gorcunov .segment = nr >> 4, 26160489bb9SCyrill Gorcunov .offset = (nr - (nr & ~0xf)), 262ea684828SCyrill Gorcunov }; 263ea684828SCyrill Gorcunov p = guest_flat_to_host(self, 0); 264*bc75b0aeSCyrill Gorcunov interrupt_table__setup(&self->interrupt_table, &intr); 265*bc75b0aeSCyrill Gorcunov interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE); 266ea684828SCyrill Gorcunov 2677fb218bdSPekka Enberg return true; 268ae1fae34SPekka Enberg } 269ae1fae34SPekka Enberg 2706d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename, 2716d1f350dSCyrill Gorcunov const char *kernel_cmdline) 272ae1fae34SPekka Enberg { 2737fb218bdSPekka Enberg bool ret; 274ae1fae34SPekka Enberg int fd; 275ae1fae34SPekka Enberg 276ae1fae34SPekka Enberg fd = open(kernel_filename, O_RDONLY); 277ae1fae34SPekka Enberg if (fd < 0) 278ae1fae34SPekka Enberg die("unable to open kernel"); 279ae1fae34SPekka Enberg 2806d1f350dSCyrill Gorcunov ret = load_bzimage(kvm, fd, kernel_cmdline); 281009b0758SPekka Enberg if (ret) 282009b0758SPekka Enberg goto found_kernel; 283ae1fae34SPekka Enberg 284009b0758SPekka Enberg ret = load_flat_binary(kvm, fd); 285009b0758SPekka Enberg if (ret) 286009b0758SPekka Enberg goto found_kernel; 287009b0758SPekka Enberg 288009b0758SPekka Enberg die("%s is not a valid bzImage or flat binary", kernel_filename); 289009b0758SPekka Enberg 290009b0758SPekka Enberg found_kernel: 291ae1fae34SPekka Enberg return ret; 292ae1fae34SPekka Enberg } 293ae1fae34SPekka Enberg 29406e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip) 29506e41eeaSPekka Enberg { 29606e41eeaSPekka Enberg uint64_t cs = self->sregs.cs.selector; 29706e41eeaSPekka Enberg 29806e41eeaSPekka Enberg return ip - (cs << 4); 29906e41eeaSPekka Enberg } 30006e41eeaSPekka Enberg 30106e41eeaSPekka Enberg static inline uint64_t ip_real_to_flat(struct kvm *self, uint64_t ip) 30206e41eeaSPekka Enberg { 30306e41eeaSPekka Enberg uint64_t cs = self->sregs.cs.selector; 30406e41eeaSPekka Enberg 30506e41eeaSPekka Enberg return ip + (cs << 4); 30606e41eeaSPekka Enberg } 30706e41eeaSPekka Enberg 308dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector) 309dbdb74c2SPekka Enberg { 310dbdb74c2SPekka Enberg /* 311dbdb74c2SPekka Enberg * KVM on Intel requires 'base' to be 'selector * 16' in real mode. 312dbdb74c2SPekka Enberg */ 313dbdb74c2SPekka Enberg return (uint32_t)selector * 16; 314dbdb74c2SPekka Enberg } 315dbdb74c2SPekka Enberg 3167fb218bdSPekka Enberg void kvm__reset_vcpu(struct kvm *self) 317ae1fae34SPekka Enberg { 31853602077SPekka Enberg self->sregs = (struct kvm_sregs) { 31953602077SPekka Enberg .cr0 = 0x60000010ULL, 32053602077SPekka Enberg .cs = (struct kvm_segment) { 321dbdb74c2SPekka Enberg .selector = self->boot_selector, 322dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 32353602077SPekka Enberg .limit = 0xffffU, 32453602077SPekka Enberg .type = 0x0bU, 32553602077SPekka Enberg .present = 1, 32653602077SPekka Enberg .dpl = 0x03, 32753602077SPekka Enberg .s = 1, 32853602077SPekka Enberg }, 32953602077SPekka Enberg .ss = (struct kvm_segment) { 330dbdb74c2SPekka Enberg .selector = self->boot_selector, 331dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 33253602077SPekka Enberg .limit = 0xffffU, 33353602077SPekka Enberg .type = 0x03U, 33453602077SPekka Enberg .present = 1, 33553602077SPekka Enberg .dpl = 0x03, 33653602077SPekka Enberg .s = 1, 33753602077SPekka Enberg }, 33853602077SPekka Enberg .ds = (struct kvm_segment) { 339dbdb74c2SPekka Enberg .selector = self->boot_selector, 340dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 34153602077SPekka Enberg .limit = 0xffffU, 34253602077SPekka Enberg .type = 0x03U, 34353602077SPekka Enberg .present = 1, 34453602077SPekka Enberg .dpl = 0x03, 34553602077SPekka Enberg .s = 1, 34653602077SPekka Enberg }, 34753602077SPekka Enberg .es = (struct kvm_segment) { 348dbdb74c2SPekka Enberg .selector = self->boot_selector, 349dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 35053602077SPekka Enberg .limit = 0xffffU, 35153602077SPekka Enberg .type = 0x03U, 35253602077SPekka Enberg .present = 1, 35353602077SPekka Enberg .dpl = 0x03, 35453602077SPekka Enberg .s = 1, 35553602077SPekka Enberg }, 35653602077SPekka Enberg .fs = (struct kvm_segment) { 357dbdb74c2SPekka Enberg .selector = self->boot_selector, 358dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 35953602077SPekka Enberg .limit = 0xffffU, 36053602077SPekka Enberg .type = 0x03U, 36153602077SPekka Enberg .present = 1, 36253602077SPekka Enberg .dpl = 0x03, 36353602077SPekka Enberg .s = 1, 36453602077SPekka Enberg }, 36553602077SPekka Enberg .gs = (struct kvm_segment) { 366dbdb74c2SPekka Enberg .selector = self->boot_selector, 367dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 36853602077SPekka Enberg .limit = 0xffffU, 36953602077SPekka Enberg .type = 0x03U, 37053602077SPekka Enberg .present = 1, 37153602077SPekka Enberg .dpl = 0x03, 37253602077SPekka Enberg .s = 1, 37353602077SPekka Enberg }, 37453602077SPekka Enberg .tr = (struct kvm_segment) { 37553602077SPekka Enberg .limit = 0xffffU, 37653602077SPekka Enberg .present = 1, 37753602077SPekka Enberg .type = 0x03U, 37853602077SPekka Enberg }, 37953602077SPekka Enberg .ldt = (struct kvm_segment) { 38053602077SPekka Enberg .limit = 0xffffU, 38153602077SPekka Enberg .present = 1, 3827085d935SPekka Enberg .type = 0x02U, 38353602077SPekka Enberg }, 38453602077SPekka Enberg .gdt = (struct kvm_dtable) { 38553602077SPekka Enberg .limit = 0xffffU, 38653602077SPekka Enberg }, 38753602077SPekka Enberg .idt = (struct kvm_dtable) { 38853602077SPekka Enberg .limit = 0xffffU, 38953602077SPekka Enberg }, 39053602077SPekka Enberg }; 39153602077SPekka Enberg 39253602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0) 39353602077SPekka Enberg die_perror("KVM_SET_SREGS failed"); 39406e41eeaSPekka Enberg 39506e41eeaSPekka Enberg self->regs = (struct kvm_regs) { 39606e41eeaSPekka Enberg /* We start the guest in 16-bit real mode */ 39706e41eeaSPekka Enberg .rflags = 0x0000000000000002ULL, 398dbdb74c2SPekka Enberg 399dbdb74c2SPekka Enberg .rip = self->boot_ip, 400dbdb74c2SPekka Enberg .rsp = self->boot_sp, 401dbdb74c2SPekka Enberg .rbp = self->boot_sp, 40206e41eeaSPekka Enberg }; 40306e41eeaSPekka Enberg 40406e41eeaSPekka Enberg if (self->regs.rip > USHRT_MAX) 40506e41eeaSPekka Enberg die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip); 40606e41eeaSPekka Enberg 40706e41eeaSPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0) 40806e41eeaSPekka Enberg die_perror("KVM_SET_REGS failed"); 40906e41eeaSPekka Enberg 410ae1fae34SPekka Enberg } 411ae1fae34SPekka Enberg 412ae1fae34SPekka Enberg void kvm__run(struct kvm *self) 413ae1fae34SPekka Enberg { 414ae1fae34SPekka Enberg if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0) 415ae1fae34SPekka Enberg die_perror("KVM_RUN failed"); 416ae1fae34SPekka Enberg } 417ae1fae34SPekka Enberg 418ae1fae34SPekka Enberg static void kvm__emulate_io_out(struct kvm *self, uint16_t port, void *data, int size, uint32_t count) 419ae1fae34SPekka Enberg { 420ae1fae34SPekka Enberg fprintf(stderr, "%s port=%x, size=%d, count=%" PRIu32 "\n", __func__, port, size, count); 421ae1fae34SPekka Enberg } 422ae1fae34SPekka Enberg 423ae1fae34SPekka Enberg static void kvm__emulate_io_in(struct kvm *self, uint16_t port, void *data, int size, uint32_t count) 424ae1fae34SPekka Enberg { 425ae1fae34SPekka Enberg fprintf(stderr, "%s port=%x, size=%d, count=%" PRIu32 "\n", __func__, port, size, count); 426ae1fae34SPekka Enberg } 427ae1fae34SPekka Enberg 428ae1fae34SPekka Enberg void kvm__emulate_io(struct kvm *self, uint16_t port, void *data, int direction, int size, uint32_t count) 429ae1fae34SPekka Enberg { 430ae1fae34SPekka Enberg if (direction == KVM_EXIT_IO_IN) 431ae1fae34SPekka Enberg kvm__emulate_io_in(self, port, data, size, count); 432ae1fae34SPekka Enberg else 433ae1fae34SPekka Enberg kvm__emulate_io_out(self, port, data, size, count); 434ae1fae34SPekka Enberg } 435ae1fae34SPekka Enberg 43653602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg) 43753602077SPekka Enberg { 438ce556636SPekka Enberg printf(" %s %04" PRIx16 " %016" PRIx64 " %08" PRIx32 " %02" PRIx8 " %x %x %x %x %x %x %x\n", 43953602077SPekka Enberg name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit, 440ce556636SPekka Enberg (uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl); 44153602077SPekka Enberg } 44253602077SPekka Enberg 443ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self) 4447118d2caSPekka Enberg { 44553602077SPekka Enberg unsigned long cr0, cr2, cr3; 44653602077SPekka Enberg unsigned long cr4, cr8; 4477118d2caSPekka Enberg unsigned long rax, rbx, rcx; 4487118d2caSPekka Enberg unsigned long rdx, rsi, rdi; 4497118d2caSPekka Enberg unsigned long rbp, r8, r9; 4507118d2caSPekka Enberg unsigned long r10, r11, r12; 4517118d2caSPekka Enberg unsigned long r13, r14, r15; 4527118d2caSPekka Enberg unsigned long rip, rsp; 45353602077SPekka Enberg struct kvm_sregs sregs; 454a2fe6199SPekka Enberg unsigned long rflags; 4557118d2caSPekka Enberg struct kvm_regs regs; 456ce5e0ecbSPekka Enberg int i; 4577118d2caSPekka Enberg 4587118d2caSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, ®s) < 0) 4597118d2caSPekka Enberg die("KVM_GET_REGS failed"); 4607118d2caSPekka Enberg 461a2fe6199SPekka Enberg rflags = regs.rflags; 462a2fe6199SPekka Enberg 4637118d2caSPekka Enberg rip = regs.rip; rsp = regs.rsp; 4647118d2caSPekka Enberg rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx; 4657118d2caSPekka Enberg rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi; 4667118d2caSPekka Enberg rbp = regs.rbp; r8 = regs.r8; r9 = regs.r9; 4677118d2caSPekka Enberg r10 = regs.r10; r11 = regs.r11; r12 = regs.r12; 4687118d2caSPekka Enberg r13 = regs.r13; r14 = regs.r14; r15 = regs.r15; 4697118d2caSPekka Enberg 4707118d2caSPekka Enberg printf("Registers:\n"); 4712177ec43SPekka Enberg printf(" rip: %016lx rsp: %016lx flags: %016lx\n", rip, rsp, rflags); 472ea2e4ea0SCyrill Gorcunov printf(" rax: %016lx rbx: %016lx rcx: %016lx\n", rax, rbx, rcx); 4737118d2caSPekka Enberg printf(" rdx: %016lx rsi: %016lx rdi: %016lx\n", rdx, rsi, rdi); 4747118d2caSPekka Enberg printf(" rbp: %016lx r8: %016lx r9: %016lx\n", rbp, r8, r9); 4757118d2caSPekka Enberg printf(" r10: %016lx r11: %016lx r12: %016lx\n", r10, r11, r12); 4767118d2caSPekka Enberg printf(" r13: %016lx r14: %016lx r15: %016lx\n", r13, r14, r15); 47753602077SPekka Enberg 47853602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0) 47953602077SPekka Enberg die("KVM_GET_REGS failed"); 48053602077SPekka Enberg 48153602077SPekka Enberg cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3; 48253602077SPekka Enberg cr4 = sregs.cr4; cr8 = sregs.cr8; 48353602077SPekka Enberg 48453602077SPekka Enberg printf(" cr0: %016lx cr2: %016lx cr3: %016lx\n", cr0, cr2, cr3); 48553602077SPekka Enberg printf(" cr4: %016lx cr8: %016lx\n", cr4, cr8); 486ce5e0ecbSPekka Enberg printf("Segment registers:\n"); 487ce556636SPekka Enberg printf(" register selector base limit type p dpl db s l g avl\n"); 48853602077SPekka Enberg print_segment("cs ", &sregs.cs); 48953602077SPekka Enberg print_segment("ss ", &sregs.ss); 49053602077SPekka Enberg print_segment("ds ", &sregs.ds); 49153602077SPekka Enberg print_segment("es ", &sregs.es); 49253602077SPekka Enberg print_segment("fs ", &sregs.fs); 49353602077SPekka Enberg print_segment("gs ", &sregs.gs); 494ce5e0ecbSPekka Enberg print_segment("tr ", &sregs.tr); 495ce5e0ecbSPekka Enberg print_segment("ldt", &sregs.ldt); 496ce5e0ecbSPekka Enberg printf(" [ efer: %016lx apic base: %016lx ]\n", (uint64_t) sregs.efer, (uint64_t) sregs.apic_base); 497ce5e0ecbSPekka Enberg printf("Interrupt bitmap:\n"); 498ce5e0ecbSPekka Enberg printf(" "); 499ce5e0ecbSPekka Enberg for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++) 500ce5e0ecbSPekka Enberg printf("%016lx ", (uint64_t) sregs.interrupt_bitmap[i]); 501ce5e0ecbSPekka Enberg printf("\n"); 5027118d2caSPekka Enberg } 5037118d2caSPekka Enberg 504ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self) 5056f10be05SPekka Enberg { 5066f10be05SPekka Enberg unsigned int code_bytes = 64; 5076f10be05SPekka Enberg unsigned int code_prologue = code_bytes * 43 / 64; 5086f10be05SPekka Enberg unsigned int code_len = code_bytes; 5096f10be05SPekka Enberg unsigned char c; 510ae1fae34SPekka Enberg unsigned int i; 5116f10be05SPekka Enberg uint8_t *ip; 5126f10be05SPekka Enberg 5132a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0) 5142a601aafSPekka Enberg die("KVM_GET_REGS failed"); 5152a601aafSPekka Enberg 5162a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 5172a601aafSPekka Enberg die("KVM_GET_SREGS failed"); 5182a601aafSPekka Enberg 5196753ed2fSPekka Enberg ip = guest_flat_to_host(self, ip_real_to_flat(self, self->regs.rip) - code_prologue); 5206f10be05SPekka Enberg 5216f10be05SPekka Enberg printf("Code: "); 5226f10be05SPekka Enberg 5236f10be05SPekka Enberg for (i = 0; i < code_len; i++, ip++) { 5246e8abc38SPekka Enberg c = *ip; 5256e8abc38SPekka Enberg 5266753ed2fSPekka Enberg if (ip == guest_flat_to_host(self, ip_real_to_flat(self, self->regs.rip))) 5276f10be05SPekka Enberg printf("<%02x> ", c); 5286f10be05SPekka Enberg else 5296f10be05SPekka Enberg printf("%02x ", c); 5306f10be05SPekka Enberg } 5316f10be05SPekka Enberg 5326f10be05SPekka Enberg printf("\n"); 5336f10be05SPekka Enberg } 534