xref: /kvmtool/kvm.c (revision ce79f1ca45eedcdb890db2e0c4fe85aad0171898)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3c78b8713SAsias He #include "kvm/cpufeature.h"
4*ce79f1caSPekka Enberg #include "kvm/interrupt.h"
52f3976eeSPekka Enberg #include "kvm/e820.h"
6f3150089SPekka Enberg #include "kvm/util.h"
7eda03319SPekka Enberg 
86c7d8514SPekka Enberg #include <linux/kvm.h>
9f5ab5f67SPekka Enberg 
10f5ab5f67SPekka Enberg #include <asm/bootparam.h>
11f5ab5f67SPekka Enberg 
12ae1fae34SPekka Enberg #include <sys/ioctl.h>
131f9cff23SPekka Enberg #include <inttypes.h>
141f9cff23SPekka Enberg #include <sys/mman.h>
15*ce79f1caSPekka Enberg #include <sys/stat.h>
162da26a59SPekka Enberg #include <stdbool.h>
176e5e8b8dSPekka Enberg #include <assert.h>
1806e41eeaSPekka Enberg #include <limits.h>
19*ce79f1caSPekka Enberg #include <signal.h>
20f5ab5f67SPekka Enberg #include <stdarg.h>
21b8f6afcdSPekka Enberg #include <stdlib.h>
22f5ab5f67SPekka Enberg #include <string.h>
230d1f17ecSPekka Enberg #include <unistd.h>
241f9cff23SPekka Enberg #include <stdio.h>
25b8f6afcdSPekka Enberg #include <fcntl.h>
26*ce79f1caSPekka Enberg #include <time.h>
27b8f6afcdSPekka Enberg 
281f9cff23SPekka Enberg /*
291f9cff23SPekka Enberg  * Compatibility code. Remove this when we move to tools/kvm.
301f9cff23SPekka Enberg  */
311f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR
321f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR		17
331f9cff23SPekka Enberg #endif
341f9cff23SPekka Enberg 
35ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
360d1f17ecSPekka Enberg 
37ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
38ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
39ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
40ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
51ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
52ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
53ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
54ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
55ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
569b1fb1c3SPekka Enberg };
579b1fb1c3SPekka Enberg 
5855e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
5955e19624SCyrill Gorcunov 	.name = #ext,			\
6055e19624SCyrill Gorcunov 	.code = ext
6155e19624SCyrill Gorcunov 
6255e19624SCyrill Gorcunov struct {
6355e19624SCyrill Gorcunov 	const char *name;
6455e19624SCyrill Gorcunov 	int code;
6555e19624SCyrill Gorcunov } kvm_req_ext[] = {
6655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
6755e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
6855e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
6955e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
7055e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
7155e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
727c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
7355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
74d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
7555e19624SCyrill Gorcunov };
7655e19624SCyrill Gorcunov 
77ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension)
78b8f6afcdSPekka Enberg {
7928fa19c0SPekka Enberg 	int ret;
80b8f6afcdSPekka Enberg 
8173ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension);
824076b041SPekka Enberg 	if (ret < 0)
834076b041SPekka Enberg 		return false;
844076b041SPekka Enberg 
854076b041SPekka Enberg 	return ret;
864076b041SPekka Enberg }
874076b041SPekka Enberg 
8855e19624SCyrill Gorcunov static int kvm__check_extensions(struct kvm *self)
8955e19624SCyrill Gorcunov {
9055e19624SCyrill Gorcunov 	unsigned int i;
9155e19624SCyrill Gorcunov 
9255e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
9355e19624SCyrill Gorcunov 		if (!kvm__supports_extension(self, kvm_req_ext[i].code)) {
9455e19624SCyrill Gorcunov 			error("Unsuppored KVM extension detected: %s",
9555e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
9655e19624SCyrill Gorcunov 			return (int)-i;
9755e19624SCyrill Gorcunov 		}
9855e19624SCyrill Gorcunov 	}
9955e19624SCyrill Gorcunov 
10055e19624SCyrill Gorcunov 	return 0;
10155e19624SCyrill Gorcunov }
10255e19624SCyrill Gorcunov 
1034076b041SPekka Enberg static struct kvm *kvm__new(void)
1044076b041SPekka Enberg {
1054076b041SPekka Enberg 	struct kvm *self = calloc(1, sizeof *self);
1064076b041SPekka Enberg 
1074076b041SPekka Enberg 	if (!self)
1084076b041SPekka Enberg 		die("out of memory");
1094076b041SPekka Enberg 
1104076b041SPekka Enberg 	return self;
1114076b041SPekka Enberg }
1124076b041SPekka Enberg 
1139ef4c68eSPekka Enberg void kvm__delete(struct kvm *self)
1149ef4c68eSPekka Enberg {
1159ef4c68eSPekka Enberg 	free(self->ram_start);
1169ef4c68eSPekka Enberg 	free(self);
1179ef4c68eSPekka Enberg }
1189ef4c68eSPekka Enberg 
119c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
120c78b8713SAsias He {
121c78b8713SAsias He 	struct cpuid_regs regs;
122831fbf23SPekka Enberg 	uint32_t eax_base;
123831fbf23SPekka Enberg 	int feature;
124c78b8713SAsias He 
125c78b8713SAsias He 	regs	= (struct cpuid_regs) {
126831fbf23SPekka Enberg 		.eax		= 0x00,
127c78b8713SAsias He 	};
128c78b8713SAsias He 	host_cpuid(&regs);
129c78b8713SAsias He 
130ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
131ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
132831fbf23SPekka Enberg 		eax_base	= 0x00;
133831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_VMX;
134ae87afbfSCyrill Gorcunov 		break;
13534649df9SPekka Enberg 
136ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
137831fbf23SPekka Enberg 		eax_base	= 0x80000000;
138831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_SVM;
139ae87afbfSCyrill Gorcunov 		break;
14034649df9SPekka Enberg 
14134649df9SPekka Enberg 	default:
14234649df9SPekka Enberg 		return false;
143ae87afbfSCyrill Gorcunov 	}
144ae87afbfSCyrill Gorcunov 
145831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
146831fbf23SPekka Enberg 		.eax		= eax_base,
147831fbf23SPekka Enberg 	};
148831fbf23SPekka Enberg 	host_cpuid(&regs);
149831fbf23SPekka Enberg 
150831fbf23SPekka Enberg 	if (regs.eax < eax_base + 0x01)
151831fbf23SPekka Enberg 		return false;
152831fbf23SPekka Enberg 
153831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
154831fbf23SPekka Enberg 		.eax		= eax_base + 0x01
155831fbf23SPekka Enberg 	};
156831fbf23SPekka Enberg 	host_cpuid(&regs);
157831fbf23SPekka Enberg 
158831fbf23SPekka Enberg 	return regs.ecx & (1 << feature);
159c78b8713SAsias He }
160c78b8713SAsias He 
161192a99d1SCyrill Gorcunov struct kvm *kvm__init(const char *kvm_dev, unsigned long ram_size)
1624076b041SPekka Enberg {
1632b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
1649687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
1654076b041SPekka Enberg 	struct kvm *self;
1660d1f17ecSPekka Enberg 	long page_size;
1671f9cff23SPekka Enberg 	int mmap_size;
1684076b041SPekka Enberg 	int ret;
1694076b041SPekka Enberg 
170c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
171c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
172c78b8713SAsias He 
1734076b041SPekka Enberg 	self = kvm__new();
1744076b041SPekka Enberg 
1756d7c36ceSPekka Enberg 	self->sys_fd = open(kvm_dev, O_RDWR);
1766d7c36ceSPekka Enberg 	if (self->sys_fd < 0) {
1776d7c36ceSPekka Enberg 		if (errno == ENOENT)
178e907b83fSPekka Enberg 			die("'%s' not found. Please make sure your kernel has CONFIG_KVM enabled and that the KVM modules are loaded.", kvm_dev);
1796d7c36ceSPekka Enberg 
180f5ab5f67SPekka Enberg 		die_perror("open");
1816d7c36ceSPekka Enberg 	}
182b8f6afcdSPekka Enberg 
18373ac60e6SPekka Enberg 	ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0);
1846c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
185f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
1866c7d8514SPekka Enberg 
18773ac60e6SPekka Enberg 	self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0);
18873ac60e6SPekka Enberg 	if (self->vm_fd < 0)
189f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
19028fa19c0SPekka Enberg 
19155e19624SCyrill Gorcunov 	if (kvm__check_extensions(self))
19255e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
1939687927dSAsias He 
1949687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
1959687927dSAsias He 	if (ret < 0)
1969687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
1979687927dSAsias He 
1989687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_PIT2, &pit_config);
1999687927dSAsias He 	if (ret < 0)
2009687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
2019687927dSAsias He 
202192a99d1SCyrill Gorcunov 	self->ram_size		= ram_size;
2030d1f17ecSPekka Enberg 
2040d1f17ecSPekka Enberg 	page_size	= sysconf(_SC_PAGESIZE);
2050d1f17ecSPekka Enberg 	if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0)
2060d1f17ecSPekka Enberg 		die("out of memory");
2070d1f17ecSPekka Enberg 
2082b0e3342SPekka Enberg 	mem = (struct kvm_userspace_memory_region) {
2092b0e3342SPekka Enberg 		.slot			= 0,
2102b0e3342SPekka Enberg 		.guest_phys_addr	= 0x0UL,
2110d1f17ecSPekka Enberg 		.memory_size		= self->ram_size,
2120d1f17ecSPekka Enberg 		.userspace_addr		= (unsigned long) self->ram_start,
2132b0e3342SPekka Enberg 	};
2142b0e3342SPekka Enberg 
215b6e68186SAsias He 	ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
2162b0e3342SPekka Enberg 	if (ret < 0)
217f5ab5f67SPekka Enberg 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
2182b0e3342SPekka Enberg 
2199687927dSAsias He 	ret = ioctl(self->vm_fd, KVM_CREATE_IRQCHIP);
220895c2fefSPekka Enberg 	if (ret < 0)
2219687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
2229687927dSAsias He 
22373ac60e6SPekka Enberg 	self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0);
2242b0e3342SPekka Enberg 	if (self->vcpu_fd < 0)
225f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VCPU ioctl");
2262b0e3342SPekka Enberg 
2271f9cff23SPekka Enberg 	mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0);
2281f9cff23SPekka Enberg 	if (mmap_size < 0)
229f5ab5f67SPekka Enberg 		die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl");
2301f9cff23SPekka Enberg 
2311f9cff23SPekka Enberg 	self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0);
2321f9cff23SPekka Enberg 	if (self->kvm_run == MAP_FAILED)
2331f9cff23SPekka Enberg 		die("unable to mmap vcpu fd");
2341f9cff23SPekka Enberg 
2354076b041SPekka Enberg 	return self;
2364076b041SPekka Enberg }
2374076b041SPekka Enberg 
238ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self)
239aee6632eSPekka Enberg {
240aee6632eSPekka Enberg 	struct kvm_guest_debug debug = {
241aee6632eSPekka Enberg 		.control	= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP,
242aee6632eSPekka Enberg 	};
243aee6632eSPekka Enberg 
244aee6632eSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0)
245b625d4b6SCyrill Gorcunov 		warning("KVM_SET_GUEST_DEBUG failed");
246aee6632eSPekka Enberg }
247aee6632eSPekka Enberg 
2485f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
249b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
250dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
2512dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
2522dd4a4edSCyrill Gorcunov 
2532dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED	0x202
254a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
255009b0758SPekka Enberg 
256edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd)
257009b0758SPekka Enberg {
258009b0758SPekka Enberg 	void *p;
259009b0758SPekka Enberg 	int nr;
260009b0758SPekka Enberg 
261009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
262009b0758SPekka Enberg 		die_perror("lseek");
263009b0758SPekka Enberg 
2646753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
265009b0758SPekka Enberg 
266009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
267009b0758SPekka Enberg 		p += nr;
268009b0758SPekka Enberg 
269dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
270edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP;
271dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
272edc8a14dSPekka Enberg 
2737fb218bdSPekka Enberg 	return true;
274009b0758SPekka Enberg }
275009b0758SPekka Enberg 
2767fb218bdSPekka Enberg /*
2777fb218bdSPekka Enberg  * The protected mode kernel part of a modern bzImage is loaded at 1 MB by
2787fb218bdSPekka Enberg  * default.
2797fb218bdSPekka Enberg  */
2807fb218bdSPekka Enberg #define BZ_KERNEL_START			0x100000UL
2812065a6f7SCyrill Gorcunov #define INITRD_START			0x1000000UL
2822065a6f7SCyrill Gorcunov #define BZ_DEFAULT_SETUP_SECTS		4
283ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
284ae1fae34SPekka Enberg 
2852065a6f7SCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd_kernel,
2862065a6f7SCyrill Gorcunov 			int fd_initrd, const char *kernel_cmdline)
287ae1fae34SPekka Enberg {
288b9271160SPekka Enberg 	struct boot_params *kern_boot;
2894b62331fSPekka Enberg 	unsigned long setup_sects;
290b9271160SPekka Enberg 	struct boot_params boot;
2912dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
2927fb218bdSPekka Enberg 	ssize_t setup_size;
29322489bb0SCyrill Gorcunov 	void *p;
294ae1fae34SPekka Enberg 	int nr;
295ae1fae34SPekka Enberg 
2965d67eaf6SPekka Enberg 	/*
2975d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
2985d67eaf6SPekka Enberg 	 * memory layout.
2995d67eaf6SPekka Enberg 	 */
3005d67eaf6SPekka Enberg 
3012065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
302009b0758SPekka Enberg 		die_perror("lseek");
303009b0758SPekka Enberg 
3040b62d2bbSPekka Enberg 	if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot))
3052346d461SPekka Enberg 		return false;
306ae1fae34SPekka Enberg 
3070b62d2bbSPekka Enberg         if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)))
3087fb218bdSPekka Enberg 		return false;
309ae1fae34SPekka Enberg 
3102dd4a4edSCyrill Gorcunov 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) {
3110b62d2bbSPekka Enberg 		die("Too old kernel");
312ad681038SCyrill Gorcunov 	}
313ad681038SCyrill Gorcunov 
3142065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
315e93ab78aSPekka Enberg 		die_perror("lseek");
316e93ab78aSPekka Enberg 
3174cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
3184cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
31910943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
32010943d14SPekka Enberg 
32154d4a626SPekka Enberg 	setup_size = setup_sects << 9;
3226753ed2fSPekka Enberg 	p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
323ae1fae34SPekka Enberg 
3242065a6f7SCyrill Gorcunov 	/* copy setup.bin to mem*/
3252065a6f7SCyrill Gorcunov 	if (read(fd_kernel, p, setup_size) != setup_size)
3267fb218bdSPekka Enberg 		die_perror("read");
3277fb218bdSPekka Enberg 
3282065a6f7SCyrill Gorcunov 	/* copy vmlinux.bin to BZ_KERNEL_START*/
3296753ed2fSPekka Enberg 	p = guest_flat_to_host(self, BZ_KERNEL_START);
330ae1fae34SPekka Enberg 
3312065a6f7SCyrill Gorcunov 	while ((nr = read(fd_kernel, p, 65536)) > 0)
332ae1fae34SPekka Enberg 		p += nr;
333ae1fae34SPekka Enberg 
334a43f6460SCyrill Gorcunov 	p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET);
335debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
336debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
337debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
338debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
339ad681038SCyrill Gorcunov 
3402dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
3412dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
342debcfac0SCyrill Gorcunov 	}
343debcfac0SCyrill Gorcunov 
344b9271160SPekka Enberg 	kern_boot	= guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x00);
345a43f6460SCyrill Gorcunov 
346b9271160SPekka Enberg 	kern_boot->hdr.cmd_line_ptr	= BOOT_CMDLINE_OFFSET;
347b9271160SPekka Enberg 	kern_boot->hdr.type_of_loader	= 0xff;
348b9271160SPekka Enberg 	kern_boot->hdr.heap_end_ptr	= 0xfe00;
349b9271160SPekka Enberg 	kern_boot->hdr.loadflags	|= CAN_USE_HEAP;
350a43f6460SCyrill Gorcunov 
3512065a6f7SCyrill Gorcunov 	/*
3522065a6f7SCyrill Gorcunov 	 * Read initrd image into guest memory
3532065a6f7SCyrill Gorcunov 	 */
3542065a6f7SCyrill Gorcunov 	if (fd_initrd >= 0) {
3552065a6f7SCyrill Gorcunov 		struct stat initrd_stat;
3562065a6f7SCyrill Gorcunov 		unsigned long addr;
3572065a6f7SCyrill Gorcunov 
3582065a6f7SCyrill Gorcunov 		if (fstat(fd_initrd, &initrd_stat))
3592065a6f7SCyrill Gorcunov 			die_perror("fstat");
3602065a6f7SCyrill Gorcunov 
3612065a6f7SCyrill Gorcunov 		addr = boot.hdr.initrd_addr_max & ~0xfffff;
3622065a6f7SCyrill Gorcunov 		for (;;) {
3632065a6f7SCyrill Gorcunov 			if (addr < BZ_KERNEL_START)
3642065a6f7SCyrill Gorcunov 				die("Not enough memory for initrd");
3652065a6f7SCyrill Gorcunov 			else if (addr < (self->ram_size - initrd_stat.st_size))
3662065a6f7SCyrill Gorcunov 				break;
3672065a6f7SCyrill Gorcunov 			addr -= 0x100000;
3682065a6f7SCyrill Gorcunov 		}
3692065a6f7SCyrill Gorcunov 
3702065a6f7SCyrill Gorcunov 		p = guest_flat_to_host(self, addr);
3712065a6f7SCyrill Gorcunov 		nr = read(fd_initrd, p, initrd_stat.st_size);
3722065a6f7SCyrill Gorcunov 		if (nr != initrd_stat.st_size)
3732065a6f7SCyrill Gorcunov 			die("Failed to read initrd");
3742065a6f7SCyrill Gorcunov 
3752065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_image	= addr;
3762065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_size	= initrd_stat.st_size;
3772065a6f7SCyrill Gorcunov 	}
3782065a6f7SCyrill Gorcunov 
379dbdb74c2SPekka Enberg 	self->boot_selector	= BOOT_LOADER_SELECTOR;
380edc8a14dSPekka Enberg 	/*
381edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
382edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
383edc8a14dSPekka Enberg 	 */
384edc8a14dSPekka Enberg 	self->boot_ip		= BOOT_LOADER_IP + 0x200;
385dbdb74c2SPekka Enberg 	self->boot_sp		= BOOT_LOADER_SP;
386edc8a14dSPekka Enberg 
387ea684828SCyrill Gorcunov 	/*
3889292f776SCyrill Gorcunov 	 * Drum roll, BIOS is coming to live, oh dear...
389ea684828SCyrill Gorcunov 	 */
3909292f776SCyrill Gorcunov 	setup_bios(self);
391ea684828SCyrill Gorcunov 
3927fb218bdSPekka Enberg 	return true;
393ae1fae34SPekka Enberg }
394ae1fae34SPekka Enberg 
3956d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
3962065a6f7SCyrill Gorcunov 		const char *initrd_filename, const char *kernel_cmdline)
397ae1fae34SPekka Enberg {
3987fb218bdSPekka Enberg 	bool ret;
3992065a6f7SCyrill Gorcunov 	int fd_kernel = -1, fd_initrd = -1;
400ae1fae34SPekka Enberg 
4012065a6f7SCyrill Gorcunov 	fd_kernel = open(kernel_filename, O_RDONLY);
4022065a6f7SCyrill Gorcunov 	if (fd_kernel < 0)
4030b62d2bbSPekka Enberg 		die("Unable to open kernel %s", kernel_filename);
404ae1fae34SPekka Enberg 
4052065a6f7SCyrill Gorcunov 	if (initrd_filename) {
4062065a6f7SCyrill Gorcunov 		fd_initrd = open(initrd_filename, O_RDONLY);
4072065a6f7SCyrill Gorcunov 		if (fd_initrd < 0)
4080b62d2bbSPekka Enberg 			die("Unable to open initrd %s", initrd_filename);
4092065a6f7SCyrill Gorcunov 	}
4102065a6f7SCyrill Gorcunov 
4112065a6f7SCyrill Gorcunov 	ret = load_bzimage(kvm, fd_kernel, fd_initrd, kernel_cmdline);
41228972750SCyrill Gorcunov 
41328972750SCyrill Gorcunov 	if (initrd_filename)
41428972750SCyrill Gorcunov 		close(fd_initrd);
41528972750SCyrill Gorcunov 
416009b0758SPekka Enberg 	if (ret)
417009b0758SPekka Enberg 		goto found_kernel;
418ae1fae34SPekka Enberg 
4190b62d2bbSPekka Enberg 	warning("%s is not a bzImage. Trying to load it as a flat binary...", kernel_filename);
4200b62d2bbSPekka Enberg 
4212065a6f7SCyrill Gorcunov 	ret = load_flat_binary(kvm, fd_kernel);
422009b0758SPekka Enberg 	if (ret)
423009b0758SPekka Enberg 		goto found_kernel;
424009b0758SPekka Enberg 
425009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
426009b0758SPekka Enberg 
427009b0758SPekka Enberg found_kernel:
428ae1fae34SPekka Enberg 	return ret;
429ae1fae34SPekka Enberg }
430ae1fae34SPekka Enberg 
43106e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip)
43206e41eeaSPekka Enberg {
43306e41eeaSPekka Enberg 	uint64_t cs = self->sregs.cs.selector;
43406e41eeaSPekka Enberg 
43506e41eeaSPekka Enberg 	return ip - (cs << 4);
43606e41eeaSPekka Enberg }
43706e41eeaSPekka Enberg 
438f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self)
439f01944c8SPekka Enberg {
440f01944c8SPekka Enberg 	return self->sregs.cr0 & 0x01;
441f01944c8SPekka Enberg }
442f01944c8SPekka Enberg 
443f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip)
44406e41eeaSPekka Enberg {
445f326512aSPekka Enberg 	uint64_t cs;
446f326512aSPekka Enberg 
447f326512aSPekka Enberg 	/*
448f326512aSPekka Enberg 	 * NOTE! We should take code segment base address into account here.
449f326512aSPekka Enberg 	 * Luckily it's usually zero because Linux uses flat memory model.
450f326512aSPekka Enberg 	 */
451f01944c8SPekka Enberg 	if (is_in_protected_mode(self))
452f326512aSPekka Enberg 		return ip;
453f326512aSPekka Enberg 
454f326512aSPekka Enberg 	cs = self->sregs.cs.selector;
45506e41eeaSPekka Enberg 
45606e41eeaSPekka Enberg 	return ip + (cs << 4);
45706e41eeaSPekka Enberg }
45806e41eeaSPekka Enberg 
459dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector)
460dbdb74c2SPekka Enberg {
461dbdb74c2SPekka Enberg 	/*
462dbdb74c2SPekka Enberg 	 * KVM on Intel requires 'base' to be 'selector * 16' in real mode.
463dbdb74c2SPekka Enberg 	 */
464dbdb74c2SPekka Enberg 	return (uint32_t)selector * 16;
465dbdb74c2SPekka Enberg }
466dbdb74c2SPekka Enberg 
46753d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs)
46853d48714SPekka Enberg {
46953d48714SPekka Enberg 	struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs));
47053d48714SPekka Enberg 
47153d48714SPekka Enberg 	if (!self)
47253d48714SPekka Enberg 		die("out of memory");
47353d48714SPekka Enberg 
47453d48714SPekka Enberg 	return self;
47553d48714SPekka Enberg }
47653d48714SPekka Enberg 
47753d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER	0x10
47853d48714SPekka Enberg 
47953d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS		0x174
48053d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP		0x175
48153d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP		0x176
48253d48714SPekka Enberg 
48353d48714SPekka Enberg #define MSR_IA32_STAR			0xc0000081
48453d48714SPekka Enberg #define MSR_IA32_LSTAR			0xc0000082
48553d48714SPekka Enberg #define MSR_IA32_CSTAR			0xc0000083
48653d48714SPekka Enberg #define MSR_IA32_FMASK			0xc0000084
48753d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE		0xc0000102
48853d48714SPekka Enberg 
48953d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data)	\
49053d48714SPekka Enberg 	(struct kvm_msr_entry) { .index = _index, .data = _data }
49153d48714SPekka Enberg 
49253d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self)
49353d48714SPekka Enberg {
49453d48714SPekka Enberg 	unsigned long ndx = 0;
49553d48714SPekka Enberg 
49653d48714SPekka Enberg 	self->msrs = kvm_msrs__new(100);
49753d48714SPekka Enberg 
49853d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS,	0x0);
49953d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP,	0x0);
50053d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP,	0x0);
5018b334abcSCyrill Gorcunov #ifdef CONFIG_X86_64
50253d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR,		0x0);
50353d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR,		0x0);
50453d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE,	0x0);
50553d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK,		0x0);
50653d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR,		0x0);
50744069a9dSCyrill Gorcunov #endif
50853d48714SPekka Enberg 	self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER,	0x0);
50953d48714SPekka Enberg 
51053d48714SPekka Enberg 	self->msrs->nmsrs	= ndx;
51153d48714SPekka Enberg 
51253d48714SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0)
51353d48714SPekka Enberg 		die_perror("KVM_SET_MSRS failed");
51453d48714SPekka Enberg }
51553d48714SPekka Enberg 
5163d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self)
5173d78d3a5SPekka Enberg {
5183d78d3a5SPekka Enberg 	self->fpu = (struct kvm_fpu) {
5193d78d3a5SPekka Enberg 		.fcw		= 0x37f,
5203d78d3a5SPekka Enberg 		.mxcsr		= 0x1f80,
5213d78d3a5SPekka Enberg 	};
5223d78d3a5SPekka Enberg 
5233d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0)
5243d78d3a5SPekka Enberg 		die_perror("KVM_SET_FPU failed");
5253d78d3a5SPekka Enberg }
5263d78d3a5SPekka Enberg 
5273d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self)
5283d78d3a5SPekka Enberg {
5293d78d3a5SPekka Enberg 	self->regs = (struct kvm_regs) {
5303d78d3a5SPekka Enberg 		/* We start the guest in 16-bit real mode  */
5313d78d3a5SPekka Enberg 		.rflags		= 0x0000000000000002ULL,
5323d78d3a5SPekka Enberg 
5333d78d3a5SPekka Enberg 		.rip		= self->boot_ip,
5343d78d3a5SPekka Enberg 		.rsp		= self->boot_sp,
5353d78d3a5SPekka Enberg 		.rbp		= self->boot_sp,
5363d78d3a5SPekka Enberg 	};
5373d78d3a5SPekka Enberg 
5383d78d3a5SPekka Enberg 	if (self->regs.rip > USHRT_MAX)
5393d78d3a5SPekka Enberg 		die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip);
5403d78d3a5SPekka Enberg 
5413d78d3a5SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0)
5423d78d3a5SPekka Enberg 		die_perror("KVM_SET_REGS failed");
5433d78d3a5SPekka Enberg }
5443d78d3a5SPekka Enberg 
5453d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self)
546ae1fae34SPekka Enberg {
54753602077SPekka Enberg 
5480ed849e6SAsias He 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
5490ed849e6SAsias He 		die_perror("KVM_GET_SREGS failed");
5504a7c140aSAsias He 
5510ed849e6SAsias He 	self->sregs.cs.selector	= self->boot_selector;
5520ed849e6SAsias He 	self->sregs.cs.base	= selector_to_base(self->boot_selector);
5534e42cf94SAsias He 	self->sregs.ss.selector	= self->boot_selector;
5544e42cf94SAsias He 	self->sregs.ss.base	= selector_to_base(self->boot_selector);
5554e42cf94SAsias He 	self->sregs.ds.selector	= self->boot_selector;
5564e42cf94SAsias He 	self->sregs.ds.base	= selector_to_base(self->boot_selector);
5574e42cf94SAsias He 	self->sregs.es.selector	= self->boot_selector;
5584e42cf94SAsias He 	self->sregs.es.base	= selector_to_base(self->boot_selector);
5594e42cf94SAsias He 	self->sregs.fs.selector	= self->boot_selector;
5604e42cf94SAsias He 	self->sregs.fs.base	= selector_to_base(self->boot_selector);
5614e42cf94SAsias He 	self->sregs.gs.selector	= self->boot_selector;
5624e42cf94SAsias He 	self->sregs.gs.base	= selector_to_base(self->boot_selector);
5634a7c140aSAsias He 
56453602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0)
56553602077SPekka Enberg 		die_perror("KVM_SET_SREGS failed");
5663d78d3a5SPekka Enberg }
56706e41eeaSPekka Enberg 
5683d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self)
5693d78d3a5SPekka Enberg {
5703d78d3a5SPekka Enberg 	kvm__setup_sregs(self);
571dbdb74c2SPekka Enberg 
5723d78d3a5SPekka Enberg 	kvm__setup_regs(self);
57306e41eeaSPekka Enberg 
5743d78d3a5SPekka Enberg 	kvm__setup_fpu(self);
57553d48714SPekka Enberg 
57653d48714SPekka Enberg 	kvm__setup_msrs(self);
577ae1fae34SPekka Enberg }
578ae1fae34SPekka Enberg 
5792f3976eeSPekka Enberg void kvm__setup_mem(struct kvm *self)
5802f3976eeSPekka Enberg {
5812f3976eeSPekka Enberg 	struct e820_entry *mem_map;
5822f3976eeSPekka Enberg 	unsigned char *size;
5832f3976eeSPekka Enberg 
5842f3976eeSPekka Enberg 	size		= guest_flat_to_host(self, E820_MAP_SIZE);
5852f3976eeSPekka Enberg 	mem_map		= guest_flat_to_host(self, E820_MAP_START);
5862f3976eeSPekka Enberg 
5872f3976eeSPekka Enberg 	*size		= 4;
5882f3976eeSPekka Enberg 
5892f3976eeSPekka Enberg 	mem_map[0]	= (struct e820_entry) {
5902f3976eeSPekka Enberg 		.addr		= REAL_MODE_IVT_BEGIN,
591b6542188SCyrill Gorcunov 		.size		= EBDA_START - REAL_MODE_IVT_BEGIN,
5922f3976eeSPekka Enberg 		.type		= E820_MEM_USABLE,
5932f3976eeSPekka Enberg 	};
594b6542188SCyrill Gorcunov 	mem_map[1]	= (struct e820_entry) {
595b6542188SCyrill Gorcunov 		.addr		= EBDA_START,
596b6542188SCyrill Gorcunov 		.size		= VGA_RAM_BEGIN - EBDA_START,
597b6542188SCyrill Gorcunov 		.type		= E820_MEM_RESERVED,
598b6542188SCyrill Gorcunov 	};
5992f3976eeSPekka Enberg 	mem_map[2]	= (struct e820_entry) {
600b6542188SCyrill Gorcunov 		.addr		= MB_BIOS_BEGIN,
601b6542188SCyrill Gorcunov 		.size		= MB_BIOS_END - MB_BIOS_BEGIN,
6022f3976eeSPekka Enberg 		.type		= E820_MEM_RESERVED,
6032f3976eeSPekka Enberg 	};
6042f3976eeSPekka Enberg 	mem_map[3]	= (struct e820_entry) {
6052f3976eeSPekka Enberg 		.addr		= BZ_KERNEL_START,
6062f3976eeSPekka Enberg 		.size		= self->ram_size - BZ_KERNEL_START,
6072f3976eeSPekka Enberg 		.type		= E820_MEM_USABLE,
6082f3976eeSPekka Enberg 	};
6092f3976eeSPekka Enberg }
6102f3976eeSPekka Enberg 
611*ce79f1caSPekka Enberg #define TIMER_INTERVAL_NS 1000000	/* 1 msec */
612*ce79f1caSPekka Enberg 
613*ce79f1caSPekka Enberg static void alarm_handler(int sig)
614*ce79f1caSPekka Enberg {
615*ce79f1caSPekka Enberg }
616*ce79f1caSPekka Enberg 
617*ce79f1caSPekka Enberg /*
618*ce79f1caSPekka Enberg  * This function sets up a timer that's used to inject interrupts from the
619*ce79f1caSPekka Enberg  * userspace hypervisor into the guest at periodical intervals. Please note
620*ce79f1caSPekka Enberg  * that clock interrupt, for example, is not handled here.
621*ce79f1caSPekka Enberg  */
622*ce79f1caSPekka Enberg void kvm__start_timer(struct kvm *self)
623*ce79f1caSPekka Enberg {
624*ce79f1caSPekka Enberg 	struct itimerspec its;
625*ce79f1caSPekka Enberg 	struct sigaction sa;
626*ce79f1caSPekka Enberg 	struct sigevent sev;
627*ce79f1caSPekka Enberg 
628*ce79f1caSPekka Enberg 	sigfillset(&sa.sa_mask);
629*ce79f1caSPekka Enberg 	sa.sa_flags			= 0;
630*ce79f1caSPekka Enberg 	sa.sa_handler			= alarm_handler;
631*ce79f1caSPekka Enberg 
632*ce79f1caSPekka Enberg 	sigaction(SIGALRM, &sa, NULL);
633*ce79f1caSPekka Enberg 
634*ce79f1caSPekka Enberg 	memset(&sev, 0, sizeof(struct sigevent));
635*ce79f1caSPekka Enberg 	sev.sigev_value.sival_int	= 0;
636*ce79f1caSPekka Enberg 	sev.sigev_notify		= SIGEV_SIGNAL;
637*ce79f1caSPekka Enberg 	sev.sigev_signo			= SIGALRM;
638*ce79f1caSPekka Enberg 
639*ce79f1caSPekka Enberg 	if (timer_create(CLOCK_REALTIME, &sev, &self->timerid) < 0)
640*ce79f1caSPekka Enberg 		die("timer_create()");
641*ce79f1caSPekka Enberg 
642*ce79f1caSPekka Enberg 	its.it_value.tv_sec		= TIMER_INTERVAL_NS / 1000000000;
643*ce79f1caSPekka Enberg 	its.it_value.tv_nsec		= TIMER_INTERVAL_NS % 1000000000;
644*ce79f1caSPekka Enberg 	its.it_interval.tv_sec		= its.it_value.tv_sec;
645*ce79f1caSPekka Enberg 	its.it_interval.tv_nsec		= its.it_value.tv_nsec;
646*ce79f1caSPekka Enberg 
647*ce79f1caSPekka Enberg 	if (timer_settime(self->timerid, 0, &its, NULL) < 0)
648*ce79f1caSPekka Enberg 		die("timer_settime()");
649*ce79f1caSPekka Enberg }
650*ce79f1caSPekka Enberg 
651ae1fae34SPekka Enberg void kvm__run(struct kvm *self)
652ae1fae34SPekka Enberg {
6538bb34e0dSPekka Enberg 	int err;
6548bb34e0dSPekka Enberg 
6558bb34e0dSPekka Enberg 	err = ioctl(self->vcpu_fd, KVM_RUN, 0);
6568bb34e0dSPekka Enberg 	if (err && (errno != EINTR && errno != EAGAIN))
657ae1fae34SPekka Enberg 		die_perror("KVM_RUN failed");
658ae1fae34SPekka Enberg }
659ae1fae34SPekka Enberg 
6608b1ff07eSPekka Enberg void kvm__irq_line(struct kvm *self, int irq, int level)
6618b1ff07eSPekka Enberg {
6628b1ff07eSPekka Enberg 	struct kvm_irq_level irq_level;
6638b1ff07eSPekka Enberg 
6648b1ff07eSPekka Enberg 	irq_level	= (struct kvm_irq_level) {
6658b1ff07eSPekka Enberg 		{
6668b1ff07eSPekka Enberg 			.irq		= irq,
6678b1ff07eSPekka Enberg 		},
6688b1ff07eSPekka Enberg 		.level		= level,
6698b1ff07eSPekka Enberg 	};
6708b1ff07eSPekka Enberg 
6718b1ff07eSPekka Enberg 	if (ioctl(self->vm_fd, KVM_IRQ_LINE, &irq_level) < 0)
6728b1ff07eSPekka Enberg 		die_perror("KVM_IRQ_LINE failed");
6738b1ff07eSPekka Enberg }
6748b1ff07eSPekka Enberg 
6758351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable)
6768351aaddSPekka Enberg {
6778351aaddSPekka Enberg 	printf(" %s                 %016" PRIx64 "  %08" PRIx16 "\n",
6788351aaddSPekka Enberg 		name, (uint64_t) dtable->base, (uint16_t) dtable->limit);
6798351aaddSPekka Enberg }
6808351aaddSPekka Enberg 
68153602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg)
68253602077SPekka Enberg {
683ce556636SPekka Enberg 	printf(" %s       %04" PRIx16 "      %016" PRIx64 "  %08" PRIx32 "  %02" PRIx8 "    %x %x   %x  %x %x %x %x\n",
68453602077SPekka Enberg 		name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit,
685ce556636SPekka Enberg 		(uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl);
68653602077SPekka Enberg }
68753602077SPekka Enberg 
688ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self)
6897118d2caSPekka Enberg {
69053602077SPekka Enberg 	unsigned long cr0, cr2, cr3;
69153602077SPekka Enberg 	unsigned long cr4, cr8;
6927118d2caSPekka Enberg 	unsigned long rax, rbx, rcx;
6937118d2caSPekka Enberg 	unsigned long rdx, rsi, rdi;
6947118d2caSPekka Enberg 	unsigned long rbp,  r8,  r9;
6957118d2caSPekka Enberg 	unsigned long r10, r11, r12;
6967118d2caSPekka Enberg 	unsigned long r13, r14, r15;
6977118d2caSPekka Enberg 	unsigned long rip, rsp;
69853602077SPekka Enberg 	struct kvm_sregs sregs;
699a2fe6199SPekka Enberg 	unsigned long rflags;
7007118d2caSPekka Enberg 	struct kvm_regs regs;
701ce5e0ecbSPekka Enberg 	int i;
7027118d2caSPekka Enberg 
7037118d2caSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &regs) < 0)
7047118d2caSPekka Enberg 		die("KVM_GET_REGS failed");
7057118d2caSPekka Enberg 
706a2fe6199SPekka Enberg 	rflags = regs.rflags;
707a2fe6199SPekka Enberg 
7087118d2caSPekka Enberg 	rip = regs.rip; rsp = regs.rsp;
7097118d2caSPekka Enberg 	rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx;
7107118d2caSPekka Enberg 	rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi;
7117118d2caSPekka Enberg 	rbp = regs.rbp; r8  = regs.r8;  r9  = regs.r9;
7127118d2caSPekka Enberg 	r10 = regs.r10; r11 = regs.r11; r12 = regs.r12;
7137118d2caSPekka Enberg 	r13 = regs.r13; r14 = regs.r14; r15 = regs.r15;
7147118d2caSPekka Enberg 
7157118d2caSPekka Enberg 	printf("Registers:\n");
7162177ec43SPekka Enberg 	printf(" rip: %016lx   rsp: %016lx flags: %016lx\n", rip, rsp, rflags);
717ea2e4ea0SCyrill Gorcunov 	printf(" rax: %016lx   rbx: %016lx   rcx: %016lx\n", rax, rbx, rcx);
7187118d2caSPekka Enberg 	printf(" rdx: %016lx   rsi: %016lx   rdi: %016lx\n", rdx, rsi, rdi);
7197118d2caSPekka Enberg 	printf(" rbp: %016lx   r8:  %016lx   r9:  %016lx\n", rbp, r8,  r9);
7207118d2caSPekka Enberg 	printf(" r10: %016lx   r11: %016lx   r12: %016lx\n", r10, r11, r12);
7217118d2caSPekka Enberg 	printf(" r13: %016lx   r14: %016lx   r15: %016lx\n", r13, r14, r15);
72253602077SPekka Enberg 
72353602077SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0)
72453602077SPekka Enberg 		die("KVM_GET_REGS failed");
72553602077SPekka Enberg 
72653602077SPekka Enberg 	cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3;
72753602077SPekka Enberg 	cr4 = sregs.cr4; cr8 = sregs.cr8;
72853602077SPekka Enberg 
72953602077SPekka Enberg 	printf(" cr0: %016lx   cr2: %016lx   cr3: %016lx\n", cr0, cr2, cr3);
73053602077SPekka Enberg 	printf(" cr4: %016lx   cr8: %016lx\n", cr4, cr8);
731ce5e0ecbSPekka Enberg 	printf("Segment registers:\n");
732ce556636SPekka Enberg 	printf(" register  selector  base              limit     type  p dpl db s l g avl\n");
73353602077SPekka Enberg 	print_segment("cs ", &sregs.cs);
73453602077SPekka Enberg 	print_segment("ss ", &sregs.ss);
73553602077SPekka Enberg 	print_segment("ds ", &sregs.ds);
73653602077SPekka Enberg 	print_segment("es ", &sregs.es);
73753602077SPekka Enberg 	print_segment("fs ", &sregs.fs);
73853602077SPekka Enberg 	print_segment("gs ", &sregs.gs);
739ce5e0ecbSPekka Enberg 	print_segment("tr ", &sregs.tr);
740ce5e0ecbSPekka Enberg 	print_segment("ldt", &sregs.ldt);
7418351aaddSPekka Enberg 	print_dtable("gdt", &sregs.gdt);
7428351aaddSPekka Enberg 	print_dtable("idt", &sregs.idt);
7430f9983b2SCyrill Gorcunov 	printf(" [ efer: %016" PRIx64 "  apic base: %016" PRIx64 "  nmi: %s ]\n",
7440f9983b2SCyrill Gorcunov 		(uint64_t) sregs.efer, (uint64_t) sregs.apic_base,
7452049569dSPekka Enberg 		(self->nmi_disabled ? "disabled" : "enabled"));
746ce5e0ecbSPekka Enberg 	printf("Interrupt bitmap:\n");
747ce5e0ecbSPekka Enberg 	printf(" ");
748ce5e0ecbSPekka Enberg 	for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++)
7490f9983b2SCyrill Gorcunov 		printf("%016" PRIx64 " ", (uint64_t) sregs.interrupt_bitmap[i]);
750ce5e0ecbSPekka Enberg 	printf("\n");
7517118d2caSPekka Enberg }
7527118d2caSPekka Enberg 
753ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self)
7546f10be05SPekka Enberg {
7556f10be05SPekka Enberg 	unsigned int code_bytes = 64;
7566f10be05SPekka Enberg 	unsigned int code_prologue = code_bytes * 43 / 64;
7576f10be05SPekka Enberg 	unsigned int code_len = code_bytes;
7586f10be05SPekka Enberg 	unsigned char c;
759ae1fae34SPekka Enberg 	unsigned int i;
7606f10be05SPekka Enberg 	uint8_t *ip;
7616f10be05SPekka Enberg 
7622a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0)
7632a601aafSPekka Enberg 		die("KVM_GET_REGS failed");
7642a601aafSPekka Enberg 
7652a601aafSPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
7662a601aafSPekka Enberg 		die("KVM_GET_SREGS failed");
7672a601aafSPekka Enberg 
768f326512aSPekka Enberg 	ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue);
7696f10be05SPekka Enberg 
7706f10be05SPekka Enberg 	printf("Code: ");
7716f10be05SPekka Enberg 
7726f10be05SPekka Enberg 	for (i = 0; i < code_len; i++, ip++) {
77348cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, ip))
77448cf3877SPekka Enberg 			break;
77548cf3877SPekka Enberg 
7766e8abc38SPekka Enberg 		c = *ip;
7776e8abc38SPekka Enberg 
778f326512aSPekka Enberg 		if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip)))
7796f10be05SPekka Enberg 			printf("<%02x> ", c);
7806f10be05SPekka Enberg 		else
7816f10be05SPekka Enberg 			printf("%02x ", c);
7826f10be05SPekka Enberg 	}
7836f10be05SPekka Enberg 
7846f10be05SPekka Enberg 	printf("\n");
7852a7d39a4SPekka Enberg 
7862a7d39a4SPekka Enberg 	printf("Stack:\n");
7872a7d39a4SPekka Enberg 	kvm__dump_mem(self, self->regs.rsp, 32);
7886f10be05SPekka Enberg }
789090f898eSCyrill Gorcunov 
790f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self)
791f01944c8SPekka Enberg {
792f01944c8SPekka Enberg 	uint64_t *pte1;
793f01944c8SPekka Enberg 	uint64_t *pte2;
794f01944c8SPekka Enberg 	uint64_t *pte3;
795f01944c8SPekka Enberg 	uint64_t *pte4;
796f01944c8SPekka Enberg 
797f01944c8SPekka Enberg 	if (!is_in_protected_mode(self))
798f01944c8SPekka Enberg 		return;
799f01944c8SPekka Enberg 
800f01944c8SPekka Enberg 	if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0)
801f01944c8SPekka Enberg 		die("KVM_GET_SREGS failed");
802f01944c8SPekka Enberg 
803f01944c8SPekka Enberg 	pte4	= guest_flat_to_host(self, self->sregs.cr3);
80448cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte4))
80548cf3877SPekka Enberg 		return;
80648cf3877SPekka Enberg 
807f01944c8SPekka Enberg 	pte3	= guest_flat_to_host(self, (*pte4 & ~0xfff));
80848cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte3))
80948cf3877SPekka Enberg 		return;
81048cf3877SPekka Enberg 
811f01944c8SPekka Enberg 	pte2	= guest_flat_to_host(self, (*pte3 & ~0xfff));
81248cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte2))
81348cf3877SPekka Enberg 		return;
81448cf3877SPekka Enberg 
815f01944c8SPekka Enberg 	pte1	= guest_flat_to_host(self, (*pte2 & ~0xfff));
81648cf3877SPekka Enberg 	if (!host_ptr_in_ram(self, pte1))
81748cf3877SPekka Enberg 		return;
818f01944c8SPekka Enberg 
819f01944c8SPekka Enberg 	printf("Page Tables:\n");
820f01944c8SPekka Enberg 	if (*pte2 & (1 << 7))
8210f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64
8220f9983b2SCyrill Gorcunov 			"   pte2: %016" PRIx64 "\n",
8230f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2);
824f01944c8SPekka Enberg 	else
8250f9983b2SCyrill Gorcunov 		printf(" pte4: %016" PRIx64 "   pte3: %016" PRIx64 "   pte2: %016"
8260f9983b2SCyrill Gorcunov 			PRIx64 "   pte1: %016" PRIx64 "\n",
8270f9983b2SCyrill Gorcunov 			*pte4, *pte3, *pte2, *pte1);
828f01944c8SPekka Enberg }
829f01944c8SPekka Enberg 
830090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size)
831090f898eSCyrill Gorcunov {
832090f898eSCyrill Gorcunov 	unsigned char *p;
833090f898eSCyrill Gorcunov 	unsigned long n;
834090f898eSCyrill Gorcunov 
835090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
836090f898eSCyrill Gorcunov 	if (!size)
837090f898eSCyrill Gorcunov 		return;
838090f898eSCyrill Gorcunov 
8392a7d39a4SPekka Enberg 	p = guest_flat_to_host(self, addr);
840090f898eSCyrill Gorcunov 
84148cf3877SPekka Enberg 	for (n = 0; n < size; n+=8) {
84248cf3877SPekka Enberg 		if (!host_ptr_in_ram(self, p + n))
84348cf3877SPekka Enberg 			break;
84448cf3877SPekka Enberg 
845090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
846090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
847090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
848090f898eSCyrill Gorcunov 	}
84948cf3877SPekka Enberg }
850