xref: /kvmtool/kvm.c (revision dd188f9f6b961b3d9e240f4dd47d4b29287426d4)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3b3594ec7SCyrill Gorcunov #include "kvm/boot-protocol.h"
472811558SPekka Enberg #include "kvm/cpufeature.h"
572811558SPekka Enberg #include "kvm/read-write.h"
672811558SPekka Enberg #include "kvm/interrupt.h"
70c7c14a7SCyrill Gorcunov #include "kvm/mptable.h"
872811558SPekka Enberg #include "kvm/util.h"
94298ddadSSasha Levin #include "kvm/mutex.h"
104298ddadSSasha Levin #include "kvm/kvm-cpu.h"
114b1addaeSSasha Levin #include "kvm/kvm-ipc.h"
12eda03319SPekka Enberg 
136c7d8514SPekka Enberg #include <linux/kvm.h>
14f5ab5f67SPekka Enberg 
15f5ab5f67SPekka Enberg #include <asm/bootparam.h>
16f5ab5f67SPekka Enberg 
174b1addaeSSasha Levin #include <sys/un.h>
184b1addaeSSasha Levin #include <sys/types.h>
194b1addaeSSasha Levin #include <sys/socket.h>
20ae1fae34SPekka Enberg #include <sys/ioctl.h>
211f9cff23SPekka Enberg #include <sys/mman.h>
22ce79f1caSPekka Enberg #include <sys/stat.h>
232da26a59SPekka Enberg #include <stdbool.h>
246e5e8b8dSPekka Enberg #include <assert.h>
2506e41eeaSPekka Enberg #include <limits.h>
26ce79f1caSPekka Enberg #include <signal.h>
27f5ab5f67SPekka Enberg #include <stdarg.h>
28b8f6afcdSPekka Enberg #include <stdlib.h>
29f5ab5f67SPekka Enberg #include <string.h>
300d1f17ecSPekka Enberg #include <unistd.h>
311f9cff23SPekka Enberg #include <stdio.h>
32b8f6afcdSPekka Enberg #include <fcntl.h>
33ce79f1caSPekka Enberg #include <time.h>
344298ddadSSasha Levin #include <sys/eventfd.h>
35c7828731SSasha Levin #include <asm/unistd.h>
3663bc8503SSasha Levin #include <dirent.h>
37b8f6afcdSPekka Enberg 
38ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
390d1f17ecSPekka Enberg 
40ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
51ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
52ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
53ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
54ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
55ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
56ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
57ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
58ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
599b1fb1c3SPekka Enberg };
609b1fb1c3SPekka Enberg 
6155e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
6255e19624SCyrill Gorcunov 	.name = #ext,			\
6355e19624SCyrill Gorcunov 	.code = ext
6455e19624SCyrill Gorcunov 
6555e19624SCyrill Gorcunov struct {
6655e19624SCyrill Gorcunov 	const char *name;
6755e19624SCyrill Gorcunov 	int code;
6855e19624SCyrill Gorcunov } kvm_req_ext[] = {
6955e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
7055e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
7155e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
7255e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
7355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
7455e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
757c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
7655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
77d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
7855e19624SCyrill Gorcunov };
7955e19624SCyrill Gorcunov 
804298ddadSSasha Levin extern struct kvm *kvm;
814298ddadSSasha Levin extern struct kvm_cpu *kvm_cpus[KVM_NR_CPUS];
824298ddadSSasha Levin static int pause_event;
834298ddadSSasha Levin static DEFINE_MUTEX(pause_lock);
844298ddadSSasha Levin 
859667701cSPekka Enberg static char kvm_dir[PATH_MAX];
869667701cSPekka Enberg 
879667701cSPekka Enberg static void set_dir(const char *fmt, va_list args)
889667701cSPekka Enberg {
89*dd188f9fSPekka Enberg 	char tmp[PATH_MAX];
90*dd188f9fSPekka Enberg 
91*dd188f9fSPekka Enberg 	vsnprintf(tmp, sizeof(tmp), fmt, args);
92*dd188f9fSPekka Enberg 
93*dd188f9fSPekka Enberg 	if (!realpath(tmp, kvm_dir))
94*dd188f9fSPekka Enberg 		die("Unable to set KVM tool directory");
959667701cSPekka Enberg }
969667701cSPekka Enberg 
979667701cSPekka Enberg void kvm__set_dir(const char *fmt, ...)
989667701cSPekka Enberg {
999667701cSPekka Enberg 	va_list args;
1009667701cSPekka Enberg 
1019667701cSPekka Enberg 	va_start(args, fmt);
1029667701cSPekka Enberg 	set_dir(fmt, args);
1039667701cSPekka Enberg 	va_end(args);
1049667701cSPekka Enberg }
1059667701cSPekka Enberg 
1069667701cSPekka Enberg const char *kvm__get_dir(void)
1079667701cSPekka Enberg {
1089667701cSPekka Enberg 	return kvm_dir;
1099667701cSPekka Enberg }
1109667701cSPekka Enberg 
11143835ac9SSasha Levin static bool kvm__supports_extension(struct kvm *kvm, unsigned int extension)
112b8f6afcdSPekka Enberg {
11328fa19c0SPekka Enberg 	int ret;
114b8f6afcdSPekka Enberg 
11543835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, extension);
1164076b041SPekka Enberg 	if (ret < 0)
1174076b041SPekka Enberg 		return false;
1184076b041SPekka Enberg 
1194076b041SPekka Enberg 	return ret;
1204076b041SPekka Enberg }
1214076b041SPekka Enberg 
12243835ac9SSasha Levin static int kvm__check_extensions(struct kvm *kvm)
12355e19624SCyrill Gorcunov {
12455e19624SCyrill Gorcunov 	unsigned int i;
12555e19624SCyrill Gorcunov 
12655e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
12743835ac9SSasha Levin 		if (!kvm__supports_extension(kvm, kvm_req_ext[i].code)) {
1284542f276SCyrill Gorcunov 			pr_error("Unsuppored KVM extension detected: %s",
12955e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
13055e19624SCyrill Gorcunov 			return (int)-i;
13155e19624SCyrill Gorcunov 		}
13255e19624SCyrill Gorcunov 	}
13355e19624SCyrill Gorcunov 
13455e19624SCyrill Gorcunov 	return 0;
13555e19624SCyrill Gorcunov }
13655e19624SCyrill Gorcunov 
1374076b041SPekka Enberg static struct kvm *kvm__new(void)
1384076b041SPekka Enberg {
13943835ac9SSasha Levin 	struct kvm *kvm = calloc(1, sizeof *kvm);
1404076b041SPekka Enberg 
14143835ac9SSasha Levin 	if (!kvm)
1424076b041SPekka Enberg 		die("out of memory");
1434076b041SPekka Enberg 
14443835ac9SSasha Levin 	return kvm;
1454076b041SPekka Enberg }
1464076b041SPekka Enberg 
1474b1addaeSSasha Levin static int kvm__create_socket(struct kvm *kvm)
1485358b0e6SSasha Levin {
1494b1addaeSSasha Levin 	char full_name[PATH_MAX];
1504b1addaeSSasha Levin 	unsigned int s;
1514b1addaeSSasha Levin 	struct sockaddr_un local;
1524b1addaeSSasha Levin 	int len, r;
1535358b0e6SSasha Levin 
1545358b0e6SSasha Levin 	if (!kvm->name)
1554b1addaeSSasha Levin 		return -1;
1565358b0e6SSasha Levin 
1579667701cSPekka Enberg 	sprintf(full_name, "%s", kvm__get_dir());
158c71efd96SSasha Levin 	mkdir(full_name, 0777);
1594b1addaeSSasha Levin 	sprintf(full_name, "%s/%s.sock", kvm__get_dir(), kvm->name);
1604b1addaeSSasha Levin 	s = socket(AF_UNIX, SOCK_STREAM, 0);
1614b1addaeSSasha Levin 	if (s < 0)
1624b1addaeSSasha Levin 		return s;
1634b1addaeSSasha Levin 	local.sun_family = AF_UNIX;
1644b1addaeSSasha Levin 	strcpy(local.sun_path, full_name);
1654b1addaeSSasha Levin 	unlink(local.sun_path);
1664b1addaeSSasha Levin 	len = strlen(local.sun_path) + sizeof(local.sun_family);
1674b1addaeSSasha Levin 	r = bind(s, (struct sockaddr *)&local, len);
1684b1addaeSSasha Levin 	if (r < 0)
1694b1addaeSSasha Levin 		goto fail;
1704b1addaeSSasha Levin 
1714b1addaeSSasha Levin 	r = listen(s, 5);
1724b1addaeSSasha Levin 	if (r < 0)
1734b1addaeSSasha Levin 		goto fail;
1744b1addaeSSasha Levin 
1754b1addaeSSasha Levin 	return s;
1764b1addaeSSasha Levin 
1774b1addaeSSasha Levin fail:
1784b1addaeSSasha Levin 	close(s);
1794b1addaeSSasha Levin 	return -1;
1805358b0e6SSasha Levin }
1815358b0e6SSasha Levin 
1824b1addaeSSasha Levin void kvm__remove_socket(const char *name)
1835358b0e6SSasha Levin {
1845358b0e6SSasha Levin 	char full_name[PATH_MAX];
1855358b0e6SSasha Levin 
1864b1addaeSSasha Levin 	sprintf(full_name, "%s/%s.sock", kvm__get_dir(), name);
1875358b0e6SSasha Levin 	unlink(full_name);
1885358b0e6SSasha Levin }
1895358b0e6SSasha Levin 
1904b1addaeSSasha Levin int kvm__get_sock_by_instance(const char *name)
1915358b0e6SSasha Levin {
1924b1addaeSSasha Levin 	int s, len, r;
1934b1addaeSSasha Levin 	char sock_file[PATH_MAX];
1944b1addaeSSasha Levin 	struct sockaddr_un local;
1955358b0e6SSasha Levin 
1964b1addaeSSasha Levin 	sprintf(sock_file, "%s/%s.sock", kvm__get_dir(), name);
1974b1addaeSSasha Levin 	s = socket(AF_UNIX, SOCK_STREAM, 0);
1985358b0e6SSasha Levin 
1994b1addaeSSasha Levin 	local.sun_family = AF_UNIX;
2004b1addaeSSasha Levin 	strcpy(local.sun_path, sock_file);
2014b1addaeSSasha Levin 	len = strlen(local.sun_path) + sizeof(local.sun_family);
2025358b0e6SSasha Levin 
2034b1addaeSSasha Levin 	r = connect(s, &local, len);
2044b1addaeSSasha Levin 	if (r < 0)
2054b1addaeSSasha Levin 		die("Failed connecting to instance");
2065358b0e6SSasha Levin 
2074b1addaeSSasha Levin 	return s;
2085358b0e6SSasha Levin }
2095358b0e6SSasha Levin 
2104b1addaeSSasha Levin int kvm__enumerate_instances(int (*callback)(const char *name, int fd))
21163bc8503SSasha Levin {
21263bc8503SSasha Levin 	char full_name[PATH_MAX];
2134b1addaeSSasha Levin 	int sock;
21463bc8503SSasha Levin 	DIR *dir;
21563bc8503SSasha Levin 	struct dirent entry, *result;
216886af5f2SLiming Wang 	int ret = 0;
21763bc8503SSasha Levin 
2189667701cSPekka Enberg 	sprintf(full_name, "%s", kvm__get_dir());
21963bc8503SSasha Levin 	dir = opendir(full_name);
22063bc8503SSasha Levin 
221f2e556f3SKonstantin Khlebnikov 	while (dir != NULL) {
22263bc8503SSasha Levin 		readdir_r(dir, &entry, &result);
22363bc8503SSasha Levin 		if (result == NULL)
22463bc8503SSasha Levin 			break;
2254b1addaeSSasha Levin 		if (entry.d_type == DT_SOCK) {
2264b1addaeSSasha Levin 			entry.d_name[strlen(entry.d_name)-5] = 0;
2274b1addaeSSasha Levin 			sock = kvm__get_sock_by_instance(entry.d_name);
2284b1addaeSSasha Levin 			ret = callback(entry.d_name, sock);
2294b1addaeSSasha Levin 			close(sock);
230886af5f2SLiming Wang 			if (ret < 0)
231886af5f2SLiming Wang 				break;
23263bc8503SSasha Levin 		}
23363bc8503SSasha Levin 	}
23463bc8503SSasha Levin 
2351a0ef251SSasha Levin 	closedir(dir);
2361a0ef251SSasha Levin 
237886af5f2SLiming Wang 	return ret;
23863bc8503SSasha Levin }
23963bc8503SSasha Levin 
24043835ac9SSasha Levin void kvm__delete(struct kvm *kvm)
2419ef4c68eSPekka Enberg {
24243835ac9SSasha Levin 	kvm__stop_timer(kvm);
243fbfe68b7SSasha Levin 
24443835ac9SSasha Levin 	munmap(kvm->ram_start, kvm->ram_size);
245c733c80bSSasha Levin 	kvm_ipc__stop();
2464b1addaeSSasha Levin 	kvm__remove_socket(kvm->name);
24743835ac9SSasha Levin 	free(kvm);
2489ef4c68eSPekka Enberg }
2499ef4c68eSPekka Enberg 
250c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
251c78b8713SAsias He {
252c78b8713SAsias He 	struct cpuid_regs regs;
2533fdf659dSSasha Levin 	u32 eax_base;
254831fbf23SPekka Enberg 	int feature;
255c78b8713SAsias He 
256c78b8713SAsias He 	regs	= (struct cpuid_regs) {
257831fbf23SPekka Enberg 		.eax		= 0x00,
258c78b8713SAsias He 	};
259c78b8713SAsias He 	host_cpuid(&regs);
260c78b8713SAsias He 
261ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
262ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
263831fbf23SPekka Enberg 		eax_base	= 0x00;
264831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_VMX;
265ae87afbfSCyrill Gorcunov 		break;
26634649df9SPekka Enberg 
267ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
268831fbf23SPekka Enberg 		eax_base	= 0x80000000;
269831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_SVM;
270ae87afbfSCyrill Gorcunov 		break;
27134649df9SPekka Enberg 
27234649df9SPekka Enberg 	default:
27334649df9SPekka Enberg 		return false;
274ae87afbfSCyrill Gorcunov 	}
275ae87afbfSCyrill Gorcunov 
276831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
277831fbf23SPekka Enberg 		.eax		= eax_base,
278831fbf23SPekka Enberg 	};
279831fbf23SPekka Enberg 	host_cpuid(&regs);
280831fbf23SPekka Enberg 
281831fbf23SPekka Enberg 	if (regs.eax < eax_base + 0x01)
282831fbf23SPekka Enberg 		return false;
283831fbf23SPekka Enberg 
284831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
285831fbf23SPekka Enberg 		.eax		= eax_base + 0x01
286831fbf23SPekka Enberg 	};
287831fbf23SPekka Enberg 	host_cpuid(&regs);
288831fbf23SPekka Enberg 
289831fbf23SPekka Enberg 	return regs.ecx & (1 << feature);
290c78b8713SAsias He }
291c78b8713SAsias He 
29296feb589SPekka Enberg /*
29396feb589SPekka Enberg  * Note: KVM_SET_USER_MEMORY_REGION assumes that we don't pass overlapping
29496feb589SPekka Enberg  * memory regions to it. Therefore, be careful if you use this function for
29596feb589SPekka Enberg  * registering memory regions for emulating hardware.
29696feb589SPekka Enberg  */
29796feb589SPekka Enberg void kvm__register_mem(struct kvm *kvm, u64 guest_phys, u64 size, void *userspace_addr)
2984076b041SPekka Enberg {
2992b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
300839051d9SSasha Levin 	int ret;
301839051d9SSasha Levin 
302839051d9SSasha Levin 	mem = (struct kvm_userspace_memory_region) {
30396feb589SPekka Enberg 		.slot			= kvm->mem_slots++,
304874467f8SSasha Levin 		.guest_phys_addr	= guest_phys,
305874467f8SSasha Levin 		.memory_size		= size,
306c4acb611SIngo Molnar 		.userspace_addr		= (unsigned long)userspace_addr,
307839051d9SSasha Levin 	};
308839051d9SSasha Levin 
309874467f8SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
310839051d9SSasha Levin 	if (ret < 0)
311839051d9SSasha Levin 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
312839051d9SSasha Levin }
313839051d9SSasha Levin 
314874467f8SSasha Levin /*
315874467f8SSasha Levin  * Allocating RAM size bigger than 4GB requires us to leave a gap
316874467f8SSasha Levin  * in the RAM which is used for PCI MMIO, hotplug, and unconfigured
317874467f8SSasha Levin  * devices (see documentation of e820_setup_gap() for details).
318874467f8SSasha Levin  *
319874467f8SSasha Levin  * If we're required to initialize RAM bigger than 4GB, we will create
320874467f8SSasha Levin  * a gap between 0xe0000000 and 0x100000000 in the guest virtual mem space.
321874467f8SSasha Levin  */
322874467f8SSasha Levin 
32343835ac9SSasha Levin void kvm__init_ram(struct kvm *kvm)
324874467f8SSasha Levin {
325874467f8SSasha Levin 	u64	phys_start, phys_size;
326874467f8SSasha Levin 	void	*host_mem;
327874467f8SSasha Levin 
32843835ac9SSasha Levin 	if (kvm->ram_size < KVM_32BIT_GAP_START) {
329874467f8SSasha Levin 		/* Use a single block of RAM for 32bit RAM */
330874467f8SSasha Levin 
331874467f8SSasha Levin 		phys_start = 0;
33243835ac9SSasha Levin 		phys_size  = kvm->ram_size;
33343835ac9SSasha Levin 		host_mem   = kvm->ram_start;
334874467f8SSasha Levin 
33596feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
336874467f8SSasha Levin 	} else {
337874467f8SSasha Levin 		/* First RAM range from zero to the PCI gap: */
338874467f8SSasha Levin 
339874467f8SSasha Levin 		phys_start = 0;
340874467f8SSasha Levin 		phys_size  = KVM_32BIT_GAP_START;
34143835ac9SSasha Levin 		host_mem   = kvm->ram_start;
342874467f8SSasha Levin 
34396feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
344874467f8SSasha Levin 
345874467f8SSasha Levin 		/* Second RAM range from 4GB to the end of RAM: */
346874467f8SSasha Levin 
347874467f8SSasha Levin 		phys_start = 0x100000000ULL;
34843835ac9SSasha Levin 		phys_size  = kvm->ram_size - phys_size;
34943835ac9SSasha Levin 		host_mem   = kvm->ram_start + phys_start;
350874467f8SSasha Levin 
35196feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
352874467f8SSasha Levin 	}
353874467f8SSasha Levin }
354874467f8SSasha Levin 
3558259b8ccSSasha Levin int kvm__recommended_cpus(struct kvm *kvm)
356384922b3SPekka Enberg {
357384922b3SPekka Enberg 	int ret;
358384922b3SPekka Enberg 
35943835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
3608259b8ccSSasha Levin 	if (ret <= 0)
361384922b3SPekka Enberg 		die_perror("KVM_CAP_NR_VCPUS");
362384922b3SPekka Enberg 
363384922b3SPekka Enberg 	return ret;
364384922b3SPekka Enberg }
365384922b3SPekka Enberg 
3664b1addaeSSasha Levin static void kvm__pid(int fd, u32 type, u32 len, u8 *msg)
3674b1addaeSSasha Levin {
3684b1addaeSSasha Levin 	pid_t pid = getpid();
3694b1addaeSSasha Levin 	int r = 0;
3704b1addaeSSasha Levin 
3714b1addaeSSasha Levin 	if (type == KVM_IPC_PID)
3724b1addaeSSasha Levin 		r = write(fd, &pid, sizeof(pid));
3734b1addaeSSasha Levin 
3744b1addaeSSasha Levin 	if (r < 0)
3754b1addaeSSasha Levin 		pr_warning("Failed sending PID");
3764b1addaeSSasha Levin }
3774b1addaeSSasha Levin 
3788259b8ccSSasha Levin /*
3798259b8ccSSasha Levin  * The following hack should be removed once 'x86: Raise the hard
3808259b8ccSSasha Levin  * VCPU count limit' makes it's way into the mainline.
3818259b8ccSSasha Levin  */
3828259b8ccSSasha Levin #ifndef KVM_CAP_MAX_VCPUS
3838259b8ccSSasha Levin #define KVM_CAP_MAX_VCPUS 66
3848259b8ccSSasha Levin #endif
3858259b8ccSSasha Levin 
3868259b8ccSSasha Levin int kvm__max_cpus(struct kvm *kvm)
3878259b8ccSSasha Levin {
3888259b8ccSSasha Levin 	int ret;
3898259b8ccSSasha Levin 
3908259b8ccSSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS);
3918259b8ccSSasha Levin 	if (ret <= 0)
3928259b8ccSSasha Levin 		ret = kvm__recommended_cpus(kvm);
3938259b8ccSSasha Levin 
3948259b8ccSSasha Levin 	return ret;
3958259b8ccSSasha Levin }
3968259b8ccSSasha Levin 
3975358b0e6SSasha Levin struct kvm *kvm__init(const char *kvm_dev, u64 ram_size, const char *name)
398839051d9SSasha Levin {
3999687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
40043835ac9SSasha Levin 	struct kvm *kvm;
4014076b041SPekka Enberg 	int ret;
4024076b041SPekka Enberg 
403c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
404c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
405c78b8713SAsias He 
40643835ac9SSasha Levin 	kvm = kvm__new();
4074076b041SPekka Enberg 
40843835ac9SSasha Levin 	kvm->sys_fd = open(kvm_dev, O_RDWR);
40943835ac9SSasha Levin 	if (kvm->sys_fd < 0) {
4106d7c36ceSPekka Enberg 		if (errno == ENOENT)
411e907b83fSPekka Enberg 			die("'%s' not found. Please make sure your kernel has CONFIG_KVM enabled and that the KVM modules are loaded.", kvm_dev);
412f8334800SIngo Molnar 		if (errno == ENODEV)
413f8334800SIngo Molnar 			die("'%s' KVM driver not available.\n  # (If the KVM module is loaded then 'dmesg' may offer further clues about the failure.)", kvm_dev);
4146d7c36ceSPekka Enberg 
415f8334800SIngo Molnar 		fprintf(stderr, "  Fatal, could not open %s: ", kvm_dev);
416f8334800SIngo Molnar 		perror(NULL);
417f8334800SIngo Molnar 		exit(1);
4186d7c36ceSPekka Enberg 	}
419b8f6afcdSPekka Enberg 
42043835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_GET_API_VERSION, 0);
4216c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
422f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
4236c7d8514SPekka Enberg 
42443835ac9SSasha Levin 	kvm->vm_fd = ioctl(kvm->sys_fd, KVM_CREATE_VM, 0);
42543835ac9SSasha Levin 	if (kvm->vm_fd < 0)
426f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
42728fa19c0SPekka Enberg 
42843835ac9SSasha Levin 	if (kvm__check_extensions(kvm))
42955e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
4309687927dSAsias He 
43143835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
4329687927dSAsias He 	if (ret < 0)
4339687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
4349687927dSAsias He 
43543835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_CREATE_PIT2, &pit_config);
4369687927dSAsias He 	if (ret < 0)
4379687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
4389687927dSAsias He 
43943835ac9SSasha Levin 	kvm->ram_size		= ram_size;
4400d1f17ecSPekka Enberg 
44143835ac9SSasha Levin 	if (kvm->ram_size < KVM_32BIT_GAP_START) {
44237c34ca8SSasha Levin 		kvm->ram_start = mmap(NULL, ram_size, PROT_RW, MAP_ANON_NORESERVE, -1, 0);
443874467f8SSasha Levin 	} else {
44437c34ca8SSasha Levin 		kvm->ram_start = mmap(NULL, ram_size + KVM_32BIT_GAP_SIZE, PROT_RW, MAP_ANON_NORESERVE, -1, 0);
44543835ac9SSasha Levin 		if (kvm->ram_start != MAP_FAILED) {
446874467f8SSasha Levin 			/*
447874467f8SSasha Levin 			 * We mprotect the gap (see kvm__init_ram() for details) PROT_NONE so that
448874467f8SSasha Levin 			 * if we accidently write to it, we will know.
449874467f8SSasha Levin 			 */
45043835ac9SSasha Levin 			mprotect(kvm->ram_start + KVM_32BIT_GAP_START, KVM_32BIT_GAP_SIZE, PROT_NONE);
451874467f8SSasha Levin 		}
452874467f8SSasha Levin 	}
45343835ac9SSasha Levin 	if (kvm->ram_start == MAP_FAILED)
4540d1f17ecSPekka Enberg 		die("out of memory");
4550d1f17ecSPekka Enberg 
4567f4f39a4SSasha Levin 	madvise(kvm->ram_start, kvm->ram_size, MADV_MERGEABLE);
4577f4f39a4SSasha Levin 
45843835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_CREATE_IRQCHIP);
459895c2fefSPekka Enberg 	if (ret < 0)
4609687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
4619687927dSAsias He 
4625358b0e6SSasha Levin 	kvm->name = name;
4635358b0e6SSasha Levin 
4644b1addaeSSasha Levin 	kvm_ipc__start(kvm__create_socket(kvm));
4654b1addaeSSasha Levin 	kvm_ipc__register_handler(KVM_IPC_PID, kvm__pid);
46643835ac9SSasha Levin 	return kvm;
4674076b041SPekka Enberg }
4684076b041SPekka Enberg 
4695f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
470b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
471dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
4722dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
4732dd4a4edSCyrill Gorcunov 
4749a4ecdc5SPekka Enberg #define BOOT_PROTOCOL_REQUIRED	0x206
475a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
476009b0758SPekka Enberg 
47743835ac9SSasha Levin static int load_flat_binary(struct kvm *kvm, int fd)
478009b0758SPekka Enberg {
479009b0758SPekka Enberg 	void *p;
480009b0758SPekka Enberg 	int nr;
481009b0758SPekka Enberg 
482009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
483009b0758SPekka Enberg 		die_perror("lseek");
484009b0758SPekka Enberg 
48543835ac9SSasha Levin 	p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
486009b0758SPekka Enberg 
487009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
488009b0758SPekka Enberg 		p += nr;
489009b0758SPekka Enberg 
49043835ac9SSasha Levin 	kvm->boot_selector	= BOOT_LOADER_SELECTOR;
49143835ac9SSasha Levin 	kvm->boot_ip		= BOOT_LOADER_IP;
49243835ac9SSasha Levin 	kvm->boot_sp		= BOOT_LOADER_SP;
493edc8a14dSPekka Enberg 
4947fb218bdSPekka Enberg 	return true;
495009b0758SPekka Enberg }
496009b0758SPekka Enberg 
497ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
498ae1fae34SPekka Enberg 
49943835ac9SSasha Levin static bool load_bzimage(struct kvm *kvm, int fd_kernel,
50053861c74SJohn Floren 			int fd_initrd, const char *kernel_cmdline, u16 vidmode)
501ae1fae34SPekka Enberg {
502b9271160SPekka Enberg 	struct boot_params *kern_boot;
5034b62331fSPekka Enberg 	unsigned long setup_sects;
504b9271160SPekka Enberg 	struct boot_params boot;
5052dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
5067fb218bdSPekka Enberg 	ssize_t setup_size;
50722489bb0SCyrill Gorcunov 	void *p;
508ae1fae34SPekka Enberg 	int nr;
509ae1fae34SPekka Enberg 
5105d67eaf6SPekka Enberg 	/*
5115d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
5125d67eaf6SPekka Enberg 	 * memory layout.
5135d67eaf6SPekka Enberg 	 */
5145d67eaf6SPekka Enberg 
5152065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
516009b0758SPekka Enberg 		die_perror("lseek");
517009b0758SPekka Enberg 
5180b62d2bbSPekka Enberg 	if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot))
5192346d461SPekka Enberg 		return false;
520ae1fae34SPekka Enberg 
5210b62d2bbSPekka Enberg 	if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)))
5227fb218bdSPekka Enberg 		return false;
523ae1fae34SPekka Enberg 
5240ea58e5bSPekka Enberg 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED)
5250b62d2bbSPekka Enberg 		die("Too old kernel");
526ad681038SCyrill Gorcunov 
5272065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
528e93ab78aSPekka Enberg 		die_perror("lseek");
529e93ab78aSPekka Enberg 
5304cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
5314cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
53210943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
53310943d14SPekka Enberg 
53454d4a626SPekka Enberg 	setup_size = setup_sects << 9;
53543835ac9SSasha Levin 	p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
536ae1fae34SPekka Enberg 
5372065a6f7SCyrill Gorcunov 	/* copy setup.bin to mem*/
5382065a6f7SCyrill Gorcunov 	if (read(fd_kernel, p, setup_size) != setup_size)
5397fb218bdSPekka Enberg 		die_perror("read");
5407fb218bdSPekka Enberg 
5412065a6f7SCyrill Gorcunov 	/* copy vmlinux.bin to BZ_KERNEL_START*/
54243835ac9SSasha Levin 	p = guest_flat_to_host(kvm, BZ_KERNEL_START);
543ae1fae34SPekka Enberg 
5442065a6f7SCyrill Gorcunov 	while ((nr = read(fd_kernel, p, 65536)) > 0)
545ae1fae34SPekka Enberg 		p += nr;
546ae1fae34SPekka Enberg 
54743835ac9SSasha Levin 	p = guest_flat_to_host(kvm, BOOT_CMDLINE_OFFSET);
548debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
549debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
550debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
551debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
552ad681038SCyrill Gorcunov 
5532dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
5542dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
555debcfac0SCyrill Gorcunov 	}
556debcfac0SCyrill Gorcunov 
55743835ac9SSasha Levin 	kern_boot	= guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, 0x00);
558a43f6460SCyrill Gorcunov 
559b9271160SPekka Enberg 	kern_boot->hdr.cmd_line_ptr	= BOOT_CMDLINE_OFFSET;
560b9271160SPekka Enberg 	kern_boot->hdr.type_of_loader	= 0xff;
561b9271160SPekka Enberg 	kern_boot->hdr.heap_end_ptr	= 0xfe00;
562b9271160SPekka Enberg 	kern_boot->hdr.loadflags	|= CAN_USE_HEAP;
56353861c74SJohn Floren 	kern_boot->hdr.vid_mode		= vidmode;
564a43f6460SCyrill Gorcunov 
5652065a6f7SCyrill Gorcunov 	/*
5662065a6f7SCyrill Gorcunov 	 * Read initrd image into guest memory
5672065a6f7SCyrill Gorcunov 	 */
5682065a6f7SCyrill Gorcunov 	if (fd_initrd >= 0) {
5692065a6f7SCyrill Gorcunov 		struct stat initrd_stat;
5702065a6f7SCyrill Gorcunov 		unsigned long addr;
5712065a6f7SCyrill Gorcunov 
5722065a6f7SCyrill Gorcunov 		if (fstat(fd_initrd, &initrd_stat))
5732065a6f7SCyrill Gorcunov 			die_perror("fstat");
5742065a6f7SCyrill Gorcunov 
5752065a6f7SCyrill Gorcunov 		addr = boot.hdr.initrd_addr_max & ~0xfffff;
5762065a6f7SCyrill Gorcunov 		for (;;) {
5772065a6f7SCyrill Gorcunov 			if (addr < BZ_KERNEL_START)
5782065a6f7SCyrill Gorcunov 				die("Not enough memory for initrd");
57943835ac9SSasha Levin 			else if (addr < (kvm->ram_size - initrd_stat.st_size))
5802065a6f7SCyrill Gorcunov 				break;
5812065a6f7SCyrill Gorcunov 			addr -= 0x100000;
5822065a6f7SCyrill Gorcunov 		}
5832065a6f7SCyrill Gorcunov 
58443835ac9SSasha Levin 		p = guest_flat_to_host(kvm, addr);
5852065a6f7SCyrill Gorcunov 		nr = read(fd_initrd, p, initrd_stat.st_size);
5862065a6f7SCyrill Gorcunov 		if (nr != initrd_stat.st_size)
5872065a6f7SCyrill Gorcunov 			die("Failed to read initrd");
5882065a6f7SCyrill Gorcunov 
5892065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_image	= addr;
5902065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_size	= initrd_stat.st_size;
5912065a6f7SCyrill Gorcunov 	}
5922065a6f7SCyrill Gorcunov 
59343835ac9SSasha Levin 	kvm->boot_selector	= BOOT_LOADER_SELECTOR;
594edc8a14dSPekka Enberg 	/*
595edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
596edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
597edc8a14dSPekka Enberg 	 */
59843835ac9SSasha Levin 	kvm->boot_ip		= BOOT_LOADER_IP + 0x200;
59943835ac9SSasha Levin 	kvm->boot_sp		= BOOT_LOADER_SP;
600edc8a14dSPekka Enberg 
6017fb218bdSPekka Enberg 	return true;
602ae1fae34SPekka Enberg }
603ae1fae34SPekka Enberg 
60472811558SPekka Enberg /* RFC 1952 */
60572811558SPekka Enberg #define GZIP_ID1		0x1f
60672811558SPekka Enberg #define GZIP_ID2		0x8b
60772811558SPekka Enberg 
60872811558SPekka Enberg static bool initrd_check(int fd)
60972811558SPekka Enberg {
61072811558SPekka Enberg 	unsigned char id[2];
61172811558SPekka Enberg 
61272811558SPekka Enberg 	if (read_in_full(fd, id, ARRAY_SIZE(id)) < 0)
61372811558SPekka Enberg 		return false;
61472811558SPekka Enberg 
61572811558SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
61672811558SPekka Enberg 		die_perror("lseek");
61772811558SPekka Enberg 
61872811558SPekka Enberg 	return id[0] == GZIP_ID1 && id[1] == GZIP_ID2;
61972811558SPekka Enberg }
62072811558SPekka Enberg 
6216d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
62253861c74SJohn Floren 		const char *initrd_filename, const char *kernel_cmdline, u16 vidmode)
623ae1fae34SPekka Enberg {
6247fb218bdSPekka Enberg 	bool ret;
6252065a6f7SCyrill Gorcunov 	int fd_kernel = -1, fd_initrd = -1;
626ae1fae34SPekka Enberg 
6272065a6f7SCyrill Gorcunov 	fd_kernel = open(kernel_filename, O_RDONLY);
6282065a6f7SCyrill Gorcunov 	if (fd_kernel < 0)
6290b62d2bbSPekka Enberg 		die("Unable to open kernel %s", kernel_filename);
630ae1fae34SPekka Enberg 
6312065a6f7SCyrill Gorcunov 	if (initrd_filename) {
6322065a6f7SCyrill Gorcunov 		fd_initrd = open(initrd_filename, O_RDONLY);
6332065a6f7SCyrill Gorcunov 		if (fd_initrd < 0)
6340b62d2bbSPekka Enberg 			die("Unable to open initrd %s", initrd_filename);
63572811558SPekka Enberg 
63672811558SPekka Enberg 		if (!initrd_check(fd_initrd))
63772811558SPekka Enberg 			die("%s is not an initrd", initrd_filename);
6382065a6f7SCyrill Gorcunov 	}
6392065a6f7SCyrill Gorcunov 
64053861c74SJohn Floren 	ret = load_bzimage(kvm, fd_kernel, fd_initrd, kernel_cmdline, vidmode);
64128972750SCyrill Gorcunov 
64228972750SCyrill Gorcunov 	if (initrd_filename)
64328972750SCyrill Gorcunov 		close(fd_initrd);
64428972750SCyrill Gorcunov 
645009b0758SPekka Enberg 	if (ret)
646009b0758SPekka Enberg 		goto found_kernel;
647ae1fae34SPekka Enberg 
6484542f276SCyrill Gorcunov 	pr_warning("%s is not a bzImage. Trying to load it as a flat binary...", kernel_filename);
6490b62d2bbSPekka Enberg 
6502065a6f7SCyrill Gorcunov 	ret = load_flat_binary(kvm, fd_kernel);
651009b0758SPekka Enberg 	if (ret)
652009b0758SPekka Enberg 		goto found_kernel;
653009b0758SPekka Enberg 
6545a6ac675SSasha Levin 	close(fd_kernel);
6555a6ac675SSasha Levin 
656009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
657009b0758SPekka Enberg 
658009b0758SPekka Enberg found_kernel:
6595a6ac675SSasha Levin 	close(fd_kernel);
6605a6ac675SSasha Levin 
661ae1fae34SPekka Enberg 	return ret;
662ae1fae34SPekka Enberg }
663ae1fae34SPekka Enberg 
664b3594ec7SCyrill Gorcunov /**
665b3594ec7SCyrill Gorcunov  * kvm__setup_bios - inject BIOS into guest system memory
66643835ac9SSasha Levin  * @kvm - guest system descriptor
667b3594ec7SCyrill Gorcunov  *
668b3594ec7SCyrill Gorcunov  * This function is a main routine where we poke guest memory
669b3594ec7SCyrill Gorcunov  * and install BIOS there.
670b3594ec7SCyrill Gorcunov  */
67143835ac9SSasha Levin void kvm__setup_bios(struct kvm *kvm)
6722f3976eeSPekka Enberg {
673b3594ec7SCyrill Gorcunov 	/* standart minimal configuration */
67443835ac9SSasha Levin 	setup_bios(kvm);
6752f3976eeSPekka Enberg 
676b3594ec7SCyrill Gorcunov 	/* FIXME: SMP, ACPI and friends here */
6770c7c14a7SCyrill Gorcunov 
6780c7c14a7SCyrill Gorcunov 	/* MP table */
67943835ac9SSasha Levin 	mptable_setup(kvm, kvm->nrcpus);
6802f3976eeSPekka Enberg }
6812f3976eeSPekka Enberg 
682ce79f1caSPekka Enberg #define TIMER_INTERVAL_NS 1000000	/* 1 msec */
683ce79f1caSPekka Enberg 
684ce79f1caSPekka Enberg /*
685ce79f1caSPekka Enberg  * This function sets up a timer that's used to inject interrupts from the
686ce79f1caSPekka Enberg  * userspace hypervisor into the guest at periodical intervals. Please note
687ce79f1caSPekka Enberg  * that clock interrupt, for example, is not handled here.
688ce79f1caSPekka Enberg  */
68943835ac9SSasha Levin void kvm__start_timer(struct kvm *kvm)
690ce79f1caSPekka Enberg {
691ce79f1caSPekka Enberg 	struct itimerspec its;
692ce79f1caSPekka Enberg 	struct sigevent sev;
693ce79f1caSPekka Enberg 
694ce79f1caSPekka Enberg 	memset(&sev, 0, sizeof(struct sigevent));
695ce79f1caSPekka Enberg 	sev.sigev_value.sival_int	= 0;
696c7828731SSasha Levin 	sev.sigev_notify		= SIGEV_THREAD_ID;
697ce79f1caSPekka Enberg 	sev.sigev_signo			= SIGALRM;
698c7828731SSasha Levin 	sev._sigev_un._tid		= syscall(__NR_gettid);
699ce79f1caSPekka Enberg 
70043835ac9SSasha Levin 	if (timer_create(CLOCK_REALTIME, &sev, &kvm->timerid) < 0)
701ce79f1caSPekka Enberg 		die("timer_create()");
702ce79f1caSPekka Enberg 
703ce79f1caSPekka Enberg 	its.it_value.tv_sec		= TIMER_INTERVAL_NS / 1000000000;
704ce79f1caSPekka Enberg 	its.it_value.tv_nsec		= TIMER_INTERVAL_NS % 1000000000;
705ce79f1caSPekka Enberg 	its.it_interval.tv_sec		= its.it_value.tv_sec;
706ce79f1caSPekka Enberg 	its.it_interval.tv_nsec		= its.it_value.tv_nsec;
707ce79f1caSPekka Enberg 
70843835ac9SSasha Levin 	if (timer_settime(kvm->timerid, 0, &its, NULL) < 0)
709ce79f1caSPekka Enberg 		die("timer_settime()");
710ce79f1caSPekka Enberg }
711ce79f1caSPekka Enberg 
71243835ac9SSasha Levin void kvm__stop_timer(struct kvm *kvm)
713fbfe68b7SSasha Levin {
71443835ac9SSasha Levin 	if (kvm->timerid)
71543835ac9SSasha Levin 		if (timer_delete(kvm->timerid) < 0)
716fbfe68b7SSasha Levin 			die("timer_delete()");
717fbfe68b7SSasha Levin 
71843835ac9SSasha Levin 	kvm->timerid = 0;
719fbfe68b7SSasha Levin }
720fbfe68b7SSasha Levin 
72143835ac9SSasha Levin void kvm__irq_line(struct kvm *kvm, int irq, int level)
7228b1ff07eSPekka Enberg {
7238b1ff07eSPekka Enberg 	struct kvm_irq_level irq_level;
7248b1ff07eSPekka Enberg 
7258b1ff07eSPekka Enberg 	irq_level	= (struct kvm_irq_level) {
7268b1ff07eSPekka Enberg 		{
7278b1ff07eSPekka Enberg 			.irq		= irq,
7288b1ff07eSPekka Enberg 		},
7298b1ff07eSPekka Enberg 		.level		= level,
7308b1ff07eSPekka Enberg 	};
7318b1ff07eSPekka Enberg 
73243835ac9SSasha Levin 	if (ioctl(kvm->vm_fd, KVM_IRQ_LINE, &irq_level) < 0)
7338b1ff07eSPekka Enberg 		die_perror("KVM_IRQ_LINE failed");
7348b1ff07eSPekka Enberg }
7358b1ff07eSPekka Enberg 
736bfaed61cSSasha Levin void kvm__irq_trigger(struct kvm *kvm, int irq)
737bfaed61cSSasha Levin {
738bfaed61cSSasha Levin 	kvm__irq_line(kvm, irq, 1);
739bfaed61cSSasha Levin 	kvm__irq_line(kvm, irq, 0);
740bfaed61cSSasha Levin }
741bfaed61cSSasha Levin 
74243835ac9SSasha Levin void kvm__dump_mem(struct kvm *kvm, unsigned long addr, unsigned long size)
743090f898eSCyrill Gorcunov {
744090f898eSCyrill Gorcunov 	unsigned char *p;
745090f898eSCyrill Gorcunov 	unsigned long n;
746090f898eSCyrill Gorcunov 
747090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
748090f898eSCyrill Gorcunov 	if (!size)
749090f898eSCyrill Gorcunov 		return;
750090f898eSCyrill Gorcunov 
75143835ac9SSasha Levin 	p = guest_flat_to_host(kvm, addr);
752090f898eSCyrill Gorcunov 
75348cf3877SPekka Enberg 	for (n = 0; n < size; n += 8) {
75443835ac9SSasha Levin 		if (!host_ptr_in_ram(kvm, p + n))
75548cf3877SPekka Enberg 			break;
75648cf3877SPekka Enberg 
757090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
758090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
759090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
760090f898eSCyrill Gorcunov 	}
76148cf3877SPekka Enberg }
7624298ddadSSasha Levin 
7634298ddadSSasha Levin void kvm__pause(void)
7644298ddadSSasha Levin {
7654298ddadSSasha Levin 	int i, paused_vcpus = 0;
7664298ddadSSasha Levin 
7674298ddadSSasha Levin 	/* Check if the guest is running */
7684298ddadSSasha Levin 	if (!kvm_cpus[0] || kvm_cpus[0]->thread == 0)
7694298ddadSSasha Levin 		return;
7704298ddadSSasha Levin 
7714298ddadSSasha Levin 	mutex_lock(&pause_lock);
7724298ddadSSasha Levin 
7734298ddadSSasha Levin 	pause_event = eventfd(0, 0);
7744298ddadSSasha Levin 	if (pause_event < 0)
7754298ddadSSasha Levin 		die("Failed creating pause notification event");
7764298ddadSSasha Levin 	for (i = 0; i < kvm->nrcpus; i++)
7774298ddadSSasha Levin 		pthread_kill(kvm_cpus[i]->thread, SIGKVMPAUSE);
7784298ddadSSasha Levin 
7794298ddadSSasha Levin 	while (paused_vcpus < kvm->nrcpus) {
7804298ddadSSasha Levin 		u64 cur_read;
7814298ddadSSasha Levin 
7824298ddadSSasha Levin 		if (read(pause_event, &cur_read, sizeof(cur_read)) < 0)
7834298ddadSSasha Levin 			die("Failed reading pause event");
7844298ddadSSasha Levin 		paused_vcpus += cur_read;
7854298ddadSSasha Levin 	}
7864298ddadSSasha Levin 	close(pause_event);
7874298ddadSSasha Levin }
7884298ddadSSasha Levin 
7894298ddadSSasha Levin void kvm__continue(void)
7904298ddadSSasha Levin {
7914298ddadSSasha Levin 	/* Check if the guest is running */
7924298ddadSSasha Levin 	if (!kvm_cpus[0] || kvm_cpus[0]->thread == 0)
7934298ddadSSasha Levin 		return;
7944298ddadSSasha Levin 
7954298ddadSSasha Levin 	mutex_unlock(&pause_lock);
7964298ddadSSasha Levin }
7974298ddadSSasha Levin 
7984298ddadSSasha Levin void kvm__notify_paused(void)
7994298ddadSSasha Levin {
8004298ddadSSasha Levin 	u64 p = 1;
8014298ddadSSasha Levin 
8024298ddadSSasha Levin 	if (write(pause_event, &p, sizeof(p)) < 0)
8034298ddadSSasha Levin 		die("Failed notifying of paused VCPU.");
8044298ddadSSasha Levin 
8054298ddadSSasha Levin 	mutex_lock(&pause_lock);
8064298ddadSSasha Levin 	mutex_unlock(&pause_lock);
8074298ddadSSasha Levin }
808