1ae1fae34SPekka Enberg #include "kvm/kvm.h" 2ae1fae34SPekka Enberg 3c78b8713SAsias He #include "kvm/cpufeature.h" 4*ce79f1caSPekka Enberg #include "kvm/interrupt.h" 52f3976eeSPekka Enberg #include "kvm/e820.h" 6f3150089SPekka Enberg #include "kvm/util.h" 7eda03319SPekka Enberg 86c7d8514SPekka Enberg #include <linux/kvm.h> 9f5ab5f67SPekka Enberg 10f5ab5f67SPekka Enberg #include <asm/bootparam.h> 11f5ab5f67SPekka Enberg 12ae1fae34SPekka Enberg #include <sys/ioctl.h> 131f9cff23SPekka Enberg #include <inttypes.h> 141f9cff23SPekka Enberg #include <sys/mman.h> 15*ce79f1caSPekka Enberg #include <sys/stat.h> 162da26a59SPekka Enberg #include <stdbool.h> 176e5e8b8dSPekka Enberg #include <assert.h> 1806e41eeaSPekka Enberg #include <limits.h> 19*ce79f1caSPekka Enberg #include <signal.h> 20f5ab5f67SPekka Enberg #include <stdarg.h> 21b8f6afcdSPekka Enberg #include <stdlib.h> 22f5ab5f67SPekka Enberg #include <string.h> 230d1f17ecSPekka Enberg #include <unistd.h> 241f9cff23SPekka Enberg #include <stdio.h> 25b8f6afcdSPekka Enberg #include <fcntl.h> 26*ce79f1caSPekka Enberg #include <time.h> 27b8f6afcdSPekka Enberg 281f9cff23SPekka Enberg /* 291f9cff23SPekka Enberg * Compatibility code. Remove this when we move to tools/kvm. 301f9cff23SPekka Enberg */ 311f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR 321f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR 17 331f9cff23SPekka Enberg #endif 341f9cff23SPekka Enberg 35ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason 360d1f17ecSPekka Enberg 37ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = { 38ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN), 39ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION), 40ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO), 41ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL), 42ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG), 43ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT), 44ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO), 45ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN), 46ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN), 47ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY), 48ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR), 49ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR), 50ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS), 51ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC), 52ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET), 53ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR), 54ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI), 55ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR), 569b1fb1c3SPekka Enberg }; 579b1fb1c3SPekka Enberg 5855e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext) \ 5955e19624SCyrill Gorcunov .name = #ext, \ 6055e19624SCyrill Gorcunov .code = ext 6155e19624SCyrill Gorcunov 6255e19624SCyrill Gorcunov struct { 6355e19624SCyrill Gorcunov const char *name; 6455e19624SCyrill Gorcunov int code; 6555e19624SCyrill Gorcunov } kvm_req_ext[] = { 6655e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) }, 6755e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) }, 6855e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_PIT2) }, 6955e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) }, 7055e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) }, 7155e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) }, 727c0ec28fSCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_HLT) }, 7355e19624SCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) }, 74d38ad31aSCyrill Gorcunov { DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) }, 7555e19624SCyrill Gorcunov }; 7655e19624SCyrill Gorcunov 77ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension) 78b8f6afcdSPekka Enberg { 7928fa19c0SPekka Enberg int ret; 80b8f6afcdSPekka Enberg 8173ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension); 824076b041SPekka Enberg if (ret < 0) 834076b041SPekka Enberg return false; 844076b041SPekka Enberg 854076b041SPekka Enberg return ret; 864076b041SPekka Enberg } 874076b041SPekka Enberg 8855e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self) 8955e19624SCyrill Gorcunov { 9055e19624SCyrill Gorcunov unsigned int i; 9155e19624SCyrill Gorcunov 9255e19624SCyrill Gorcunov for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) { 9355e19624SCyrill Gorcunov if (!kvm__supports_extension(self, kvm_req_ext[i].code)) { 9455e19624SCyrill Gorcunov error("Unsuppored KVM extension detected: %s", 9555e19624SCyrill Gorcunov kvm_req_ext[i].name); 9655e19624SCyrill Gorcunov return (int)-i; 9755e19624SCyrill Gorcunov } 9855e19624SCyrill Gorcunov } 9955e19624SCyrill Gorcunov 10055e19624SCyrill Gorcunov return 0; 10155e19624SCyrill Gorcunov } 10255e19624SCyrill Gorcunov 1034076b041SPekka Enberg static struct kvm *kvm__new(void) 1044076b041SPekka Enberg { 1054076b041SPekka Enberg struct kvm *self = calloc(1, sizeof *self); 1064076b041SPekka Enberg 1074076b041SPekka Enberg if (!self) 1084076b041SPekka Enberg die("out of memory"); 1094076b041SPekka Enberg 1104076b041SPekka Enberg return self; 1114076b041SPekka Enberg } 1124076b041SPekka Enberg 1139ef4c68eSPekka Enberg void kvm__delete(struct kvm *self) 1149ef4c68eSPekka Enberg { 1159ef4c68eSPekka Enberg free(self->ram_start); 1169ef4c68eSPekka Enberg free(self); 1179ef4c68eSPekka Enberg } 1189ef4c68eSPekka Enberg 119c78b8713SAsias He static bool kvm__cpu_supports_vm(void) 120c78b8713SAsias He { 121c78b8713SAsias He struct cpuid_regs regs; 122831fbf23SPekka Enberg uint32_t eax_base; 123831fbf23SPekka Enberg int feature; 124c78b8713SAsias He 125c78b8713SAsias He regs = (struct cpuid_regs) { 126831fbf23SPekka Enberg .eax = 0x00, 127c78b8713SAsias He }; 128c78b8713SAsias He host_cpuid(®s); 129c78b8713SAsias He 130ae87afbfSCyrill Gorcunov switch (regs.ebx) { 131ae87afbfSCyrill Gorcunov case CPUID_VENDOR_INTEL_1: 132831fbf23SPekka Enberg eax_base = 0x00; 133831fbf23SPekka Enberg feature = KVM__X86_FEATURE_VMX; 134ae87afbfSCyrill Gorcunov break; 13534649df9SPekka Enberg 136ae87afbfSCyrill Gorcunov case CPUID_VENDOR_AMD_1: 137831fbf23SPekka Enberg eax_base = 0x80000000; 138831fbf23SPekka Enberg feature = KVM__X86_FEATURE_SVM; 139ae87afbfSCyrill Gorcunov break; 14034649df9SPekka Enberg 14134649df9SPekka Enberg default: 14234649df9SPekka Enberg return false; 143ae87afbfSCyrill Gorcunov } 144ae87afbfSCyrill Gorcunov 145831fbf23SPekka Enberg regs = (struct cpuid_regs) { 146831fbf23SPekka Enberg .eax = eax_base, 147831fbf23SPekka Enberg }; 148831fbf23SPekka Enberg host_cpuid(®s); 149831fbf23SPekka Enberg 150831fbf23SPekka Enberg if (regs.eax < eax_base + 0x01) 151831fbf23SPekka Enberg return false; 152831fbf23SPekka Enberg 153831fbf23SPekka Enberg regs = (struct cpuid_regs) { 154831fbf23SPekka Enberg .eax = eax_base + 0x01 155831fbf23SPekka Enberg }; 156831fbf23SPekka Enberg host_cpuid(®s); 157831fbf23SPekka Enberg 158831fbf23SPekka Enberg return regs.ecx & (1 << feature); 159c78b8713SAsias He } 160c78b8713SAsias He 161192a99d1SCyrill Gorcunov struct kvm *kvm__init(const char *kvm_dev, unsigned long ram_size) 1624076b041SPekka Enberg { 1632b0e3342SPekka Enberg struct kvm_userspace_memory_region mem; 1649687927dSAsias He struct kvm_pit_config pit_config = { .flags = 0, }; 1654076b041SPekka Enberg struct kvm *self; 1660d1f17ecSPekka Enberg long page_size; 1671f9cff23SPekka Enberg int mmap_size; 1684076b041SPekka Enberg int ret; 1694076b041SPekka Enberg 170c78b8713SAsias He if (!kvm__cpu_supports_vm()) 171c78b8713SAsias He die("Your CPU does not support hardware virtualization"); 172c78b8713SAsias He 1734076b041SPekka Enberg self = kvm__new(); 1744076b041SPekka Enberg 1756d7c36ceSPekka Enberg self->sys_fd = open(kvm_dev, O_RDWR); 1766d7c36ceSPekka Enberg if (self->sys_fd < 0) { 1776d7c36ceSPekka Enberg if (errno == ENOENT) 178e907b83fSPekka Enberg die("'%s' not found. Please make sure your kernel has CONFIG_KVM enabled and that the KVM modules are loaded.", kvm_dev); 1796d7c36ceSPekka Enberg 180f5ab5f67SPekka Enberg die_perror("open"); 1816d7c36ceSPekka Enberg } 182b8f6afcdSPekka Enberg 18373ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0); 1846c7d8514SPekka Enberg if (ret != KVM_API_VERSION) 185f5ab5f67SPekka Enberg die_perror("KVM_API_VERSION ioctl"); 1866c7d8514SPekka Enberg 18773ac60e6SPekka Enberg self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0); 18873ac60e6SPekka Enberg if (self->vm_fd < 0) 189f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VM ioctl"); 19028fa19c0SPekka Enberg 19155e19624SCyrill Gorcunov if (kvm__check_extensions(self)) 19255e19624SCyrill Gorcunov die("A required KVM extention is not supported by OS"); 1939687927dSAsias He 1949687927dSAsias He ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000); 1959687927dSAsias He if (ret < 0) 1969687927dSAsias He die_perror("KVM_SET_TSS_ADDR ioctl"); 1979687927dSAsias He 1989687927dSAsias He ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config); 1999687927dSAsias He if (ret < 0) 2009687927dSAsias He die_perror("KVM_CREATE_PIT2 ioctl"); 2019687927dSAsias He 202192a99d1SCyrill Gorcunov self->ram_size = ram_size; 2030d1f17ecSPekka Enberg 2040d1f17ecSPekka Enberg page_size = sysconf(_SC_PAGESIZE); 2050d1f17ecSPekka Enberg if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0) 2060d1f17ecSPekka Enberg die("out of memory"); 2070d1f17ecSPekka Enberg 2082b0e3342SPekka Enberg mem = (struct kvm_userspace_memory_region) { 2092b0e3342SPekka Enberg .slot = 0, 2102b0e3342SPekka Enberg .guest_phys_addr = 0x0UL, 2110d1f17ecSPekka Enberg .memory_size = self->ram_size, 2120d1f17ecSPekka Enberg .userspace_addr = (unsigned long) self->ram_start, 2132b0e3342SPekka Enberg }; 2142b0e3342SPekka Enberg 215b6e68186SAsias He ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem); 2162b0e3342SPekka Enberg if (ret < 0) 217f5ab5f67SPekka Enberg die_perror("KVM_SET_USER_MEMORY_REGION ioctl"); 2182b0e3342SPekka Enberg 2199687927dSAsias He ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP); 220895c2fefSPekka Enberg if (ret < 0) 2219687927dSAsias He die_perror("KVM_CREATE_IRQCHIP ioctl"); 2229687927dSAsias He 22373ac60e6SPekka Enberg self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0); 2242b0e3342SPekka Enberg if (self->vcpu_fd < 0) 225f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VCPU ioctl"); 2262b0e3342SPekka Enberg 2271f9cff23SPekka Enberg mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0); 2281f9cff23SPekka Enberg if (mmap_size < 0) 229f5ab5f67SPekka Enberg die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl"); 2301f9cff23SPekka Enberg 2311f9cff23SPekka Enberg self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0); 2321f9cff23SPekka Enberg if (self->kvm_run == MAP_FAILED) 2331f9cff23SPekka Enberg die("unable to mmap vcpu fd"); 2341f9cff23SPekka Enberg 2354076b041SPekka Enberg return self; 2364076b041SPekka Enberg } 2374076b041SPekka Enberg 238ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self) 239aee6632eSPekka Enberg { 240aee6632eSPekka Enberg struct kvm_guest_debug debug = { 241aee6632eSPekka Enberg .control = KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP, 242aee6632eSPekka Enberg }; 243aee6632eSPekka Enberg 244aee6632eSPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0) 245b625d4b6SCyrill Gorcunov warning("KVM_SET_GUEST_DEBUG failed"); 246aee6632eSPekka Enberg } 247aee6632eSPekka Enberg 2485f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR 0x1000 249b08e9ec4SPekka Enberg #define BOOT_LOADER_IP 0x0000 250dbdb74c2SPekka Enberg #define BOOT_LOADER_SP 0x8000 2512dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET 0x20000 2522dd4a4edSCyrill Gorcunov 2532dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED 0x202 254a43f6460SCyrill Gorcunov #define LOAD_HIGH 0x01 255009b0758SPekka Enberg 256edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd) 257009b0758SPekka Enberg { 258009b0758SPekka Enberg void *p; 259009b0758SPekka Enberg int nr; 260009b0758SPekka Enberg 261009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 262009b0758SPekka Enberg die_perror("lseek"); 263009b0758SPekka Enberg 2646753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 265009b0758SPekka Enberg 266009b0758SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 267009b0758SPekka Enberg p += nr; 268009b0758SPekka Enberg 269dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 270edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP; 271dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 272edc8a14dSPekka Enberg 2737fb218bdSPekka Enberg return true; 274009b0758SPekka Enberg } 275009b0758SPekka Enberg 2767fb218bdSPekka Enberg /* 2777fb218bdSPekka Enberg * The protected mode kernel part of a modern bzImage is loaded at 1 MB by 2787fb218bdSPekka Enberg * default. 2797fb218bdSPekka Enberg */ 2807fb218bdSPekka Enberg #define BZ_KERNEL_START 0x100000UL 2812065a6f7SCyrill Gorcunov #define INITRD_START 0x1000000UL 2822065a6f7SCyrill Gorcunov #define BZ_DEFAULT_SETUP_SECTS 4 283ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC = "HdrS"; 284ae1fae34SPekka Enberg 2852065a6f7SCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd_kernel, 2862065a6f7SCyrill Gorcunov int fd_initrd, const char *kernel_cmdline) 287ae1fae34SPekka Enberg { 288b9271160SPekka Enberg struct boot_params *kern_boot; 2894b62331fSPekka Enberg unsigned long setup_sects; 290b9271160SPekka Enberg struct boot_params boot; 2912dd4a4edSCyrill Gorcunov size_t cmdline_size; 2927fb218bdSPekka Enberg ssize_t setup_size; 29322489bb0SCyrill Gorcunov void *p; 294ae1fae34SPekka Enberg int nr; 295ae1fae34SPekka Enberg 2965d67eaf6SPekka Enberg /* 2975d67eaf6SPekka Enberg * See Documentation/x86/boot.txt for details no bzImage on-disk and 2985d67eaf6SPekka Enberg * memory layout. 2995d67eaf6SPekka Enberg */ 3005d67eaf6SPekka Enberg 3012065a6f7SCyrill Gorcunov if (lseek(fd_kernel, 0, SEEK_SET) < 0) 302009b0758SPekka Enberg die_perror("lseek"); 303009b0758SPekka Enberg 3040b62d2bbSPekka Enberg if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot)) 3052346d461SPekka Enberg return false; 306ae1fae34SPekka Enberg 3070b62d2bbSPekka Enberg if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC))) 3087fb218bdSPekka Enberg return false; 309ae1fae34SPekka Enberg 3102dd4a4edSCyrill Gorcunov if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) { 3110b62d2bbSPekka Enberg die("Too old kernel"); 312ad681038SCyrill Gorcunov } 313ad681038SCyrill Gorcunov 3142065a6f7SCyrill Gorcunov if (lseek(fd_kernel, 0, SEEK_SET) < 0) 315e93ab78aSPekka Enberg die_perror("lseek"); 316e93ab78aSPekka Enberg 3174cf542bbSCyrill Gorcunov if (!boot.hdr.setup_sects) 3184cf542bbSCyrill Gorcunov boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS; 31910943d14SPekka Enberg setup_sects = boot.hdr.setup_sects + 1; 32010943d14SPekka Enberg 32154d4a626SPekka Enberg setup_size = setup_sects << 9; 3226753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 323ae1fae34SPekka Enberg 3242065a6f7SCyrill Gorcunov /* copy setup.bin to mem*/ 3252065a6f7SCyrill Gorcunov if (read(fd_kernel, p, setup_size) != setup_size) 3267fb218bdSPekka Enberg die_perror("read"); 3277fb218bdSPekka Enberg 3282065a6f7SCyrill Gorcunov /* copy vmlinux.bin to BZ_KERNEL_START*/ 3296753ed2fSPekka Enberg p = guest_flat_to_host(self, BZ_KERNEL_START); 330ae1fae34SPekka Enberg 3312065a6f7SCyrill Gorcunov while ((nr = read(fd_kernel, p, 65536)) > 0) 332ae1fae34SPekka Enberg p += nr; 333ae1fae34SPekka Enberg 334a43f6460SCyrill Gorcunov p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET); 335debcfac0SCyrill Gorcunov if (kernel_cmdline) { 336debcfac0SCyrill Gorcunov cmdline_size = strlen(kernel_cmdline) + 1; 337debcfac0SCyrill Gorcunov if (cmdline_size > boot.hdr.cmdline_size) 338debcfac0SCyrill Gorcunov cmdline_size = boot.hdr.cmdline_size; 339ad681038SCyrill Gorcunov 3402dd4a4edSCyrill Gorcunov memset(p, 0, boot.hdr.cmdline_size); 3412dd4a4edSCyrill Gorcunov memcpy(p, kernel_cmdline, cmdline_size - 1); 342debcfac0SCyrill Gorcunov } 343debcfac0SCyrill Gorcunov 344b9271160SPekka Enberg kern_boot = guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x00); 345a43f6460SCyrill Gorcunov 346b9271160SPekka Enberg kern_boot->hdr.cmd_line_ptr = BOOT_CMDLINE_OFFSET; 347b9271160SPekka Enberg kern_boot->hdr.type_of_loader = 0xff; 348b9271160SPekka Enberg kern_boot->hdr.heap_end_ptr = 0xfe00; 349b9271160SPekka Enberg kern_boot->hdr.loadflags |= CAN_USE_HEAP; 350a43f6460SCyrill Gorcunov 3512065a6f7SCyrill Gorcunov /* 3522065a6f7SCyrill Gorcunov * Read initrd image into guest memory 3532065a6f7SCyrill Gorcunov */ 3542065a6f7SCyrill Gorcunov if (fd_initrd >= 0) { 3552065a6f7SCyrill Gorcunov struct stat initrd_stat; 3562065a6f7SCyrill Gorcunov unsigned long addr; 3572065a6f7SCyrill Gorcunov 3582065a6f7SCyrill Gorcunov if (fstat(fd_initrd, &initrd_stat)) 3592065a6f7SCyrill Gorcunov die_perror("fstat"); 3602065a6f7SCyrill Gorcunov 3612065a6f7SCyrill Gorcunov addr = boot.hdr.initrd_addr_max & ~0xfffff; 3622065a6f7SCyrill Gorcunov for (;;) { 3632065a6f7SCyrill Gorcunov if (addr < BZ_KERNEL_START) 3642065a6f7SCyrill Gorcunov die("Not enough memory for initrd"); 3652065a6f7SCyrill Gorcunov else if (addr < (self->ram_size - initrd_stat.st_size)) 3662065a6f7SCyrill Gorcunov break; 3672065a6f7SCyrill Gorcunov addr -= 0x100000; 3682065a6f7SCyrill Gorcunov } 3692065a6f7SCyrill Gorcunov 3702065a6f7SCyrill Gorcunov p = guest_flat_to_host(self, addr); 3712065a6f7SCyrill Gorcunov nr = read(fd_initrd, p, initrd_stat.st_size); 3722065a6f7SCyrill Gorcunov if (nr != initrd_stat.st_size) 3732065a6f7SCyrill Gorcunov die("Failed to read initrd"); 3742065a6f7SCyrill Gorcunov 3752065a6f7SCyrill Gorcunov kern_boot->hdr.ramdisk_image = addr; 3762065a6f7SCyrill Gorcunov kern_boot->hdr.ramdisk_size = initrd_stat.st_size; 3772065a6f7SCyrill Gorcunov } 3782065a6f7SCyrill Gorcunov 379dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 380edc8a14dSPekka Enberg /* 381edc8a14dSPekka Enberg * The real-mode setup code starts at offset 0x200 of a bzImage. See 382edc8a14dSPekka Enberg * Documentation/x86/boot.txt for details. 383edc8a14dSPekka Enberg */ 384edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP + 0x200; 385dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 386edc8a14dSPekka Enberg 387ea684828SCyrill Gorcunov /* 3889292f776SCyrill Gorcunov * Drum roll, BIOS is coming to live, oh dear... 389ea684828SCyrill Gorcunov */ 3909292f776SCyrill Gorcunov setup_bios(self); 391ea684828SCyrill Gorcunov 3927fb218bdSPekka Enberg return true; 393ae1fae34SPekka Enberg } 394ae1fae34SPekka Enberg 3956d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename, 3962065a6f7SCyrill Gorcunov const char *initrd_filename, const char *kernel_cmdline) 397ae1fae34SPekka Enberg { 3987fb218bdSPekka Enberg bool ret; 3992065a6f7SCyrill Gorcunov int fd_kernel = -1, fd_initrd = -1; 400ae1fae34SPekka Enberg 4012065a6f7SCyrill Gorcunov fd_kernel = open(kernel_filename, O_RDONLY); 4022065a6f7SCyrill Gorcunov if (fd_kernel < 0) 4030b62d2bbSPekka Enberg die("Unable to open kernel %s", kernel_filename); 404ae1fae34SPekka Enberg 4052065a6f7SCyrill Gorcunov if (initrd_filename) { 4062065a6f7SCyrill Gorcunov fd_initrd = open(initrd_filename, O_RDONLY); 4072065a6f7SCyrill Gorcunov if (fd_initrd < 0) 4080b62d2bbSPekka Enberg die("Unable to open initrd %s", initrd_filename); 4092065a6f7SCyrill Gorcunov } 4102065a6f7SCyrill Gorcunov 4112065a6f7SCyrill Gorcunov ret = load_bzimage(kvm, fd_kernel, fd_initrd, kernel_cmdline); 41228972750SCyrill Gorcunov 41328972750SCyrill Gorcunov if (initrd_filename) 41428972750SCyrill Gorcunov close(fd_initrd); 41528972750SCyrill Gorcunov 416009b0758SPekka Enberg if (ret) 417009b0758SPekka Enberg goto found_kernel; 418ae1fae34SPekka Enberg 4190b62d2bbSPekka Enberg warning("%s is not a bzImage. Trying to load it as a flat binary...", kernel_filename); 4200b62d2bbSPekka Enberg 4212065a6f7SCyrill Gorcunov ret = load_flat_binary(kvm, fd_kernel); 422009b0758SPekka Enberg if (ret) 423009b0758SPekka Enberg goto found_kernel; 424009b0758SPekka Enberg 425009b0758SPekka Enberg die("%s is not a valid bzImage or flat binary", kernel_filename); 426009b0758SPekka Enberg 427009b0758SPekka Enberg found_kernel: 428ae1fae34SPekka Enberg return ret; 429ae1fae34SPekka Enberg } 430ae1fae34SPekka Enberg 43106e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip) 43206e41eeaSPekka Enberg { 43306e41eeaSPekka Enberg uint64_t cs = self->sregs.cs.selector; 43406e41eeaSPekka Enberg 43506e41eeaSPekka Enberg return ip - (cs << 4); 43606e41eeaSPekka Enberg } 43706e41eeaSPekka Enberg 438f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self) 439f01944c8SPekka Enberg { 440f01944c8SPekka Enberg return self->sregs.cr0 & 0x01; 441f01944c8SPekka Enberg } 442f01944c8SPekka Enberg 443f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip) 44406e41eeaSPekka Enberg { 445f326512aSPekka Enberg uint64_t cs; 446f326512aSPekka Enberg 447f326512aSPekka Enberg /* 448f326512aSPekka Enberg * NOTE! We should take code segment base address into account here. 449f326512aSPekka Enberg * Luckily it's usually zero because Linux uses flat memory model. 450f326512aSPekka Enberg */ 451f01944c8SPekka Enberg if (is_in_protected_mode(self)) 452f326512aSPekka Enberg return ip; 453f326512aSPekka Enberg 454f326512aSPekka Enberg cs = self->sregs.cs.selector; 45506e41eeaSPekka Enberg 45606e41eeaSPekka Enberg return ip + (cs << 4); 45706e41eeaSPekka Enberg } 45806e41eeaSPekka Enberg 459dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector) 460dbdb74c2SPekka Enberg { 461dbdb74c2SPekka Enberg /* 462dbdb74c2SPekka Enberg * KVM on Intel requires 'base' to be 'selector * 16' in real mode. 463dbdb74c2SPekka Enberg */ 464dbdb74c2SPekka Enberg return (uint32_t)selector * 16; 465dbdb74c2SPekka Enberg } 466dbdb74c2SPekka Enberg 46753d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs) 46853d48714SPekka Enberg { 46953d48714SPekka Enberg struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs)); 47053d48714SPekka Enberg 47153d48714SPekka Enberg if (!self) 47253d48714SPekka Enberg die("out of memory"); 47353d48714SPekka Enberg 47453d48714SPekka Enberg return self; 47553d48714SPekka Enberg } 47653d48714SPekka Enberg 47753d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER 0x10 47853d48714SPekka Enberg 47953d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS 0x174 48053d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP 0x175 48153d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP 0x176 48253d48714SPekka Enberg 48353d48714SPekka Enberg #define MSR_IA32_STAR 0xc0000081 48453d48714SPekka Enberg #define MSR_IA32_LSTAR 0xc0000082 48553d48714SPekka Enberg #define MSR_IA32_CSTAR 0xc0000083 48653d48714SPekka Enberg #define MSR_IA32_FMASK 0xc0000084 48753d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE 0xc0000102 48853d48714SPekka Enberg 48953d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data) \ 49053d48714SPekka Enberg (struct kvm_msr_entry) { .index = _index, .data = _data } 49153d48714SPekka Enberg 49253d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self) 49353d48714SPekka Enberg { 49453d48714SPekka Enberg unsigned long ndx = 0; 49553d48714SPekka Enberg 49653d48714SPekka Enberg self->msrs = kvm_msrs__new(100); 49753d48714SPekka Enberg 49853d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS, 0x0); 49953d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP, 0x0); 50053d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP, 0x0); 5018b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64 50253d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR, 0x0); 50353d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR, 0x0); 50453d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE, 0x0); 50553d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK, 0x0); 50653d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR, 0x0); 50744069a9dSCyrill Gorcunov #endif 50853d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER, 0x0); 50953d48714SPekka Enberg 51053d48714SPekka Enberg self->msrs->nmsrs = ndx; 51153d48714SPekka Enberg 51253d48714SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0) 51353d48714SPekka Enberg die_perror("KVM_SET_MSRS failed"); 51453d48714SPekka Enberg } 51553d48714SPekka Enberg 5163d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self) 5173d78d3a5SPekka Enberg { 5183d78d3a5SPekka Enberg self->fpu = (struct kvm_fpu) { 5193d78d3a5SPekka Enberg .fcw = 0x37f, 5203d78d3a5SPekka Enberg .mxcsr = 0x1f80, 5213d78d3a5SPekka Enberg }; 5223d78d3a5SPekka Enberg 5233d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0) 5243d78d3a5SPekka Enberg die_perror("KVM_SET_FPU failed"); 5253d78d3a5SPekka Enberg } 5263d78d3a5SPekka Enberg 5273d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self) 5283d78d3a5SPekka Enberg { 5293d78d3a5SPekka Enberg self->regs = (struct kvm_regs) { 5303d78d3a5SPekka Enberg /* We start the guest in 16-bit real mode */ 5313d78d3a5SPekka Enberg .rflags = 0x0000000000000002ULL, 5323d78d3a5SPekka Enberg 5333d78d3a5SPekka Enberg .rip = self->boot_ip, 5343d78d3a5SPekka Enberg .rsp = self->boot_sp, 5353d78d3a5SPekka Enberg .rbp = self->boot_sp, 5363d78d3a5SPekka Enberg }; 5373d78d3a5SPekka Enberg 5383d78d3a5SPekka Enberg if (self->regs.rip > USHRT_MAX) 5393d78d3a5SPekka Enberg die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip); 5403d78d3a5SPekka Enberg 5413d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0) 5423d78d3a5SPekka Enberg die_perror("KVM_SET_REGS failed"); 5433d78d3a5SPekka Enberg } 5443d78d3a5SPekka Enberg 5453d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self) 546ae1fae34SPekka Enberg { 54753602077SPekka Enberg 5480ed849e6SAsias He if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 5490ed849e6SAsias He die_perror("KVM_GET_SREGS failed"); 5504a7c140aSAsias He 5510ed849e6SAsias He self->sregs.cs.selector = self->boot_selector; 5520ed849e6SAsias He self->sregs.cs.base = selector_to_base(self->boot_selector); 5534e42cf94SAsias He self->sregs.ss.selector = self->boot_selector; 5544e42cf94SAsias He self->sregs.ss.base = selector_to_base(self->boot_selector); 5554e42cf94SAsias He self->sregs.ds.selector = self->boot_selector; 5564e42cf94SAsias He self->sregs.ds.base = selector_to_base(self->boot_selector); 5574e42cf94SAsias He self->sregs.es.selector = self->boot_selector; 5584e42cf94SAsias He self->sregs.es.base = selector_to_base(self->boot_selector); 5594e42cf94SAsias He self->sregs.fs.selector = self->boot_selector; 5604e42cf94SAsias He self->sregs.fs.base = selector_to_base(self->boot_selector); 5614e42cf94SAsias He self->sregs.gs.selector = self->boot_selector; 5624e42cf94SAsias He self->sregs.gs.base = selector_to_base(self->boot_selector); 5634a7c140aSAsias He 56453602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0) 56553602077SPekka Enberg die_perror("KVM_SET_SREGS failed"); 5663d78d3a5SPekka Enberg } 56706e41eeaSPekka Enberg 5683d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self) 5693d78d3a5SPekka Enberg { 5703d78d3a5SPekka Enberg kvm__setup_sregs(self); 571dbdb74c2SPekka Enberg 5723d78d3a5SPekka Enberg kvm__setup_regs(self); 57306e41eeaSPekka Enberg 5743d78d3a5SPekka Enberg kvm__setup_fpu(self); 57553d48714SPekka Enberg 57653d48714SPekka Enberg kvm__setup_msrs(self); 577ae1fae34SPekka Enberg } 578ae1fae34SPekka Enberg 5792f3976eeSPekka Enberg void kvm__setup_mem(struct kvm *self) 5802f3976eeSPekka Enberg { 5812f3976eeSPekka Enberg struct e820_entry *mem_map; 5822f3976eeSPekka Enberg unsigned char *size; 5832f3976eeSPekka Enberg 5842f3976eeSPekka Enberg size = guest_flat_to_host(self, E820_MAP_SIZE); 5852f3976eeSPekka Enberg mem_map = guest_flat_to_host(self, E820_MAP_START); 5862f3976eeSPekka Enberg 5872f3976eeSPekka Enberg *size = 4; 5882f3976eeSPekka Enberg 5892f3976eeSPekka Enberg mem_map[0] = (struct e820_entry) { 5902f3976eeSPekka Enberg .addr = REAL_MODE_IVT_BEGIN, 591b6542188SCyrill Gorcunov .size = EBDA_START - REAL_MODE_IVT_BEGIN, 5922f3976eeSPekka Enberg .type = E820_MEM_USABLE, 5932f3976eeSPekka Enberg }; 594b6542188SCyrill Gorcunov mem_map[1] = (struct e820_entry) { 595b6542188SCyrill Gorcunov .addr = EBDA_START, 596b6542188SCyrill Gorcunov .size = VGA_RAM_BEGIN - EBDA_START, 597b6542188SCyrill Gorcunov .type = E820_MEM_RESERVED, 598b6542188SCyrill Gorcunov }; 5992f3976eeSPekka Enberg mem_map[2] = (struct e820_entry) { 600b6542188SCyrill Gorcunov .addr = MB_BIOS_BEGIN, 601b6542188SCyrill Gorcunov .size = MB_BIOS_END - MB_BIOS_BEGIN, 6022f3976eeSPekka Enberg .type = E820_MEM_RESERVED, 6032f3976eeSPekka Enberg }; 6042f3976eeSPekka Enberg mem_map[3] = (struct e820_entry) { 6052f3976eeSPekka Enberg .addr = BZ_KERNEL_START, 6062f3976eeSPekka Enberg .size = self->ram_size - BZ_KERNEL_START, 6072f3976eeSPekka Enberg .type = E820_MEM_USABLE, 6082f3976eeSPekka Enberg }; 6092f3976eeSPekka Enberg } 6102f3976eeSPekka Enberg 611*ce79f1caSPekka Enberg #define TIMER_INTERVAL_NS 1000000 /* 1 msec */ 612*ce79f1caSPekka Enberg 613*ce79f1caSPekka Enberg static void alarm_handler(int sig) 614*ce79f1caSPekka Enberg { 615*ce79f1caSPekka Enberg } 616*ce79f1caSPekka Enberg 617*ce79f1caSPekka Enberg /* 618*ce79f1caSPekka Enberg * This function sets up a timer that's used to inject interrupts from the 619*ce79f1caSPekka Enberg * userspace hypervisor into the guest at periodical intervals. Please note 620*ce79f1caSPekka Enberg * that clock interrupt, for example, is not handled here. 621*ce79f1caSPekka Enberg */ 622*ce79f1caSPekka Enberg void kvm__start_timer(struct kvm *self) 623*ce79f1caSPekka Enberg { 624*ce79f1caSPekka Enberg struct itimerspec its; 625*ce79f1caSPekka Enberg struct sigaction sa; 626*ce79f1caSPekka Enberg struct sigevent sev; 627*ce79f1caSPekka Enberg 628*ce79f1caSPekka Enberg sigfillset(&sa.sa_mask); 629*ce79f1caSPekka Enberg sa.sa_flags = 0; 630*ce79f1caSPekka Enberg sa.sa_handler = alarm_handler; 631*ce79f1caSPekka Enberg 632*ce79f1caSPekka Enberg sigaction(SIGALRM, &sa, NULL); 633*ce79f1caSPekka Enberg 634*ce79f1caSPekka Enberg memset(&sev, 0, sizeof(struct sigevent)); 635*ce79f1caSPekka Enberg sev.sigev_value.sival_int = 0; 636*ce79f1caSPekka Enberg sev.sigev_notify = SIGEV_SIGNAL; 637*ce79f1caSPekka Enberg sev.sigev_signo = SIGALRM; 638*ce79f1caSPekka Enberg 639*ce79f1caSPekka Enberg if (timer_create(CLOCK_REALTIME, &sev, &self->timerid) < 0) 640*ce79f1caSPekka Enberg die("timer_create()"); 641*ce79f1caSPekka Enberg 642*ce79f1caSPekka Enberg its.it_value.tv_sec = TIMER_INTERVAL_NS / 1000000000; 643*ce79f1caSPekka Enberg its.it_value.tv_nsec = TIMER_INTERVAL_NS % 1000000000; 644*ce79f1caSPekka Enberg its.it_interval.tv_sec = its.it_value.tv_sec; 645*ce79f1caSPekka Enberg its.it_interval.tv_nsec = its.it_value.tv_nsec; 646*ce79f1caSPekka Enberg 647*ce79f1caSPekka Enberg if (timer_settime(self->timerid, 0, &its, NULL) < 0) 648*ce79f1caSPekka Enberg die("timer_settime()"); 649*ce79f1caSPekka Enberg } 650*ce79f1caSPekka Enberg 651ae1fae34SPekka Enberg void kvm__run(struct kvm *self) 652ae1fae34SPekka Enberg { 6538bb34e0dSPekka Enberg int err; 6548bb34e0dSPekka Enberg 6558bb34e0dSPekka Enberg err = ioctl(self->vcpu_fd, KVM_RUN, 0); 6568bb34e0dSPekka Enberg if (err && (errno != EINTR && errno != EAGAIN)) 657ae1fae34SPekka Enberg die_perror("KVM_RUN failed"); 658ae1fae34SPekka Enberg } 659ae1fae34SPekka Enberg 6608b1ff07eSPekka Enberg void kvm__irq_line(struct kvm *self, int irq, int level) 6618b1ff07eSPekka Enberg { 6628b1ff07eSPekka Enberg struct kvm_irq_level irq_level; 6638b1ff07eSPekka Enberg 6648b1ff07eSPekka Enberg irq_level = (struct kvm_irq_level) { 6658b1ff07eSPekka Enberg { 6668b1ff07eSPekka Enberg .irq = irq, 6678b1ff07eSPekka Enberg }, 6688b1ff07eSPekka Enberg .level = level, 6698b1ff07eSPekka Enberg }; 6708b1ff07eSPekka Enberg 6718b1ff07eSPekka Enberg if (ioctl(self->vm_fd, KVM_IRQ_LINE, &irq_level) < 0) 6728b1ff07eSPekka Enberg die_perror("KVM_IRQ_LINE failed"); 6738b1ff07eSPekka Enberg } 6748b1ff07eSPekka Enberg 6758351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable) 6768351aaddSPekka Enberg { 6778351aaddSPekka Enberg printf(" %s %016" PRIx64 " %08" PRIx16 "\n", 6788351aaddSPekka Enberg name, (uint64_t) dtable->base, (uint16_t) dtable->limit); 6798351aaddSPekka Enberg } 6808351aaddSPekka Enberg 68153602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg) 68253602077SPekka Enberg { 683ce556636SPekka Enberg printf(" %s %04" PRIx16 " %016" PRIx64 " %08" PRIx32 " %02" PRIx8 " %x %x %x %x %x %x %x\n", 68453602077SPekka Enberg name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit, 685ce556636SPekka Enberg (uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl); 68653602077SPekka Enberg } 68753602077SPekka Enberg 688ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self) 6897118d2caSPekka Enberg { 69053602077SPekka Enberg unsigned long cr0, cr2, cr3; 69153602077SPekka Enberg unsigned long cr4, cr8; 6927118d2caSPekka Enberg unsigned long rax, rbx, rcx; 6937118d2caSPekka Enberg unsigned long rdx, rsi, rdi; 6947118d2caSPekka Enberg unsigned long rbp, r8, r9; 6957118d2caSPekka Enberg unsigned long r10, r11, r12; 6967118d2caSPekka Enberg unsigned long r13, r14, r15; 6977118d2caSPekka Enberg unsigned long rip, rsp; 69853602077SPekka Enberg struct kvm_sregs sregs; 699a2fe6199SPekka Enberg unsigned long rflags; 7007118d2caSPekka Enberg struct kvm_regs regs; 701ce5e0ecbSPekka Enberg int i; 7027118d2caSPekka Enberg 7037118d2caSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, ®s) < 0) 7047118d2caSPekka Enberg die("KVM_GET_REGS failed"); 7057118d2caSPekka Enberg 706a2fe6199SPekka Enberg rflags = regs.rflags; 707a2fe6199SPekka Enberg 7087118d2caSPekka Enberg rip = regs.rip; rsp = regs.rsp; 7097118d2caSPekka Enberg rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx; 7107118d2caSPekka Enberg rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi; 7117118d2caSPekka Enberg rbp = regs.rbp; r8 = regs.r8; r9 = regs.r9; 7127118d2caSPekka Enberg r10 = regs.r10; r11 = regs.r11; r12 = regs.r12; 7137118d2caSPekka Enberg r13 = regs.r13; r14 = regs.r14; r15 = regs.r15; 7147118d2caSPekka Enberg 7157118d2caSPekka Enberg printf("Registers:\n"); 7162177ec43SPekka Enberg printf(" rip: %016lx rsp: %016lx flags: %016lx\n", rip, rsp, rflags); 717ea2e4ea0SCyrill Gorcunov printf(" rax: %016lx rbx: %016lx rcx: %016lx\n", rax, rbx, rcx); 7187118d2caSPekka Enberg printf(" rdx: %016lx rsi: %016lx rdi: %016lx\n", rdx, rsi, rdi); 7197118d2caSPekka Enberg printf(" rbp: %016lx r8: %016lx r9: %016lx\n", rbp, r8, r9); 7207118d2caSPekka Enberg printf(" r10: %016lx r11: %016lx r12: %016lx\n", r10, r11, r12); 7217118d2caSPekka Enberg printf(" r13: %016lx r14: %016lx r15: %016lx\n", r13, r14, r15); 72253602077SPekka Enberg 72353602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0) 72453602077SPekka Enberg die("KVM_GET_REGS failed"); 72553602077SPekka Enberg 72653602077SPekka Enberg cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3; 72753602077SPekka Enberg cr4 = sregs.cr4; cr8 = sregs.cr8; 72853602077SPekka Enberg 72953602077SPekka Enberg printf(" cr0: %016lx cr2: %016lx cr3: %016lx\n", cr0, cr2, cr3); 73053602077SPekka Enberg printf(" cr4: %016lx cr8: %016lx\n", cr4, cr8); 731ce5e0ecbSPekka Enberg printf("Segment registers:\n"); 732ce556636SPekka Enberg printf(" register selector base limit type p dpl db s l g avl\n"); 73353602077SPekka Enberg print_segment("cs ", &sregs.cs); 73453602077SPekka Enberg print_segment("ss ", &sregs.ss); 73553602077SPekka Enberg print_segment("ds ", &sregs.ds); 73653602077SPekka Enberg print_segment("es ", &sregs.es); 73753602077SPekka Enberg print_segment("fs ", &sregs.fs); 73853602077SPekka Enberg print_segment("gs ", &sregs.gs); 739ce5e0ecbSPekka Enberg print_segment("tr ", &sregs.tr); 740ce5e0ecbSPekka Enberg print_segment("ldt", &sregs.ldt); 7418351aaddSPekka Enberg print_dtable("gdt", &sregs.gdt); 7428351aaddSPekka Enberg print_dtable("idt", &sregs.idt); 7430f9983b2SCyrill Gorcunov printf(" [ efer: %016" PRIx64 " apic base: %016" PRIx64 " nmi: %s ]\n", 7440f9983b2SCyrill Gorcunov (uint64_t) sregs.efer, (uint64_t) sregs.apic_base, 7452049569dSPekka Enberg (self->nmi_disabled ? "disabled" : "enabled")); 746ce5e0ecbSPekka Enberg printf("Interrupt bitmap:\n"); 747ce5e0ecbSPekka Enberg printf(" "); 748ce5e0ecbSPekka Enberg for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++) 7490f9983b2SCyrill Gorcunov printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]); 750ce5e0ecbSPekka Enberg printf("\n"); 7517118d2caSPekka Enberg } 7527118d2caSPekka Enberg 753ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self) 7546f10be05SPekka Enberg { 7556f10be05SPekka Enberg unsigned int code_bytes = 64; 7566f10be05SPekka Enberg unsigned int code_prologue = code_bytes * 43 / 64; 7576f10be05SPekka Enberg unsigned int code_len = code_bytes; 7586f10be05SPekka Enberg unsigned char c; 759ae1fae34SPekka Enberg unsigned int i; 7606f10be05SPekka Enberg uint8_t *ip; 7616f10be05SPekka Enberg 7622a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0) 7632a601aafSPekka Enberg die("KVM_GET_REGS failed"); 7642a601aafSPekka Enberg 7652a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 7662a601aafSPekka Enberg die("KVM_GET_SREGS failed"); 7672a601aafSPekka Enberg 768f326512aSPekka Enberg ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue); 7696f10be05SPekka Enberg 7706f10be05SPekka Enberg printf("Code: "); 7716f10be05SPekka Enberg 7726f10be05SPekka Enberg for (i = 0; i < code_len; i++, ip++) { 77348cf3877SPekka Enberg if (!host_ptr_in_ram(self, ip)) 77448cf3877SPekka Enberg break; 77548cf3877SPekka Enberg 7766e8abc38SPekka Enberg c = *ip; 7776e8abc38SPekka Enberg 778f326512aSPekka Enberg if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip))) 7796f10be05SPekka Enberg printf("<%02x> ", c); 7806f10be05SPekka Enberg else 7816f10be05SPekka Enberg printf("%02x ", c); 7826f10be05SPekka Enberg } 7836f10be05SPekka Enberg 7846f10be05SPekka Enberg printf("\n"); 7852a7d39a4SPekka Enberg 7862a7d39a4SPekka Enberg printf("Stack:\n"); 7872a7d39a4SPekka Enberg kvm__dump_mem(self, self->regs.rsp, 32); 7886f10be05SPekka Enberg } 789090f898eSCyrill Gorcunov 790f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self) 791f01944c8SPekka Enberg { 792f01944c8SPekka Enberg uint64_t *pte1; 793f01944c8SPekka Enberg uint64_t *pte2; 794f01944c8SPekka Enberg uint64_t *pte3; 795f01944c8SPekka Enberg uint64_t *pte4; 796f01944c8SPekka Enberg 797f01944c8SPekka Enberg if (!is_in_protected_mode(self)) 798f01944c8SPekka Enberg return; 799f01944c8SPekka Enberg 800f01944c8SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 801f01944c8SPekka Enberg die("KVM_GET_SREGS failed"); 802f01944c8SPekka Enberg 803f01944c8SPekka Enberg pte4 = guest_flat_to_host(self, self->sregs.cr3); 80448cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte4)) 80548cf3877SPekka Enberg return; 80648cf3877SPekka Enberg 807f01944c8SPekka Enberg pte3 = guest_flat_to_host(self, (*pte4 & ~0xfff)); 80848cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte3)) 80948cf3877SPekka Enberg return; 81048cf3877SPekka Enberg 811f01944c8SPekka Enberg pte2 = guest_flat_to_host(self, (*pte3 & ~0xfff)); 81248cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte2)) 81348cf3877SPekka Enberg return; 81448cf3877SPekka Enberg 815f01944c8SPekka Enberg pte1 = guest_flat_to_host(self, (*pte2 & ~0xfff)); 81648cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte1)) 81748cf3877SPekka Enberg return; 818f01944c8SPekka Enberg 819f01944c8SPekka Enberg printf("Page Tables:\n"); 820f01944c8SPekka Enberg if (*pte2 & (1 << 7)) 8210f9983b2SCyrill Gorcunov printf(" pte4: %016" PRIx64 " pte3: %016" PRIx64 8220f9983b2SCyrill Gorcunov " pte2: %016" PRIx64 "\n", 8230f9983b2SCyrill Gorcunov *pte4, *pte3, *pte2); 824f01944c8SPekka Enberg else 8250f9983b2SCyrill Gorcunov printf(" pte4: %016" PRIx64 " pte3: %016" PRIx64 " pte2: %016" 8260f9983b2SCyrill Gorcunov PRIx64 " pte1: %016" PRIx64 "\n", 8270f9983b2SCyrill Gorcunov *pte4, *pte3, *pte2, *pte1); 828f01944c8SPekka Enberg } 829f01944c8SPekka Enberg 830090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size) 831090f898eSCyrill Gorcunov { 832090f898eSCyrill Gorcunov unsigned char *p; 833090f898eSCyrill Gorcunov unsigned long n; 834090f898eSCyrill Gorcunov 835090f898eSCyrill Gorcunov size &= ~7; /* mod 8 */ 836090f898eSCyrill Gorcunov if (!size) 837090f898eSCyrill Gorcunov return; 838090f898eSCyrill Gorcunov 8392a7d39a4SPekka Enberg p = guest_flat_to_host(self, addr); 840090f898eSCyrill Gorcunov 84148cf3877SPekka Enberg for (n = 0; n < size; n+=8) { 84248cf3877SPekka Enberg if (!host_ptr_in_ram(self, p + n)) 84348cf3877SPekka Enberg break; 84448cf3877SPekka Enberg 845090f898eSCyrill Gorcunov printf(" 0x%08lx: %02x %02x %02x %02x %02x %02x %02x %02x\n", 846090f898eSCyrill Gorcunov addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3], 847090f898eSCyrill Gorcunov p[n + 4], p[n + 5], p[n + 6], p[n + 7]); 848090f898eSCyrill Gorcunov } 84948cf3877SPekka Enberg } 850