xref: /kvmtool/kvm.c (revision f76a328537d792429da73e0e75d0a8a21432a2d9)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3b3594ec7SCyrill Gorcunov #include "kvm/boot-protocol.h"
472811558SPekka Enberg #include "kvm/cpufeature.h"
572811558SPekka Enberg #include "kvm/read-write.h"
672811558SPekka Enberg #include "kvm/interrupt.h"
70c7c14a7SCyrill Gorcunov #include "kvm/mptable.h"
872811558SPekka Enberg #include "kvm/util.h"
94298ddadSSasha Levin #include "kvm/mutex.h"
104298ddadSSasha Levin #include "kvm/kvm-cpu.h"
114b1addaeSSasha Levin #include "kvm/kvm-ipc.h"
12eda03319SPekka Enberg 
136c7d8514SPekka Enberg #include <linux/kvm.h>
14f5ab5f67SPekka Enberg 
15f5ab5f67SPekka Enberg #include <asm/bootparam.h>
16f5ab5f67SPekka Enberg 
174b1addaeSSasha Levin #include <sys/un.h>
184b1addaeSSasha Levin #include <sys/types.h>
194b1addaeSSasha Levin #include <sys/socket.h>
20ae1fae34SPekka Enberg #include <sys/ioctl.h>
211f9cff23SPekka Enberg #include <sys/mman.h>
22ce79f1caSPekka Enberg #include <sys/stat.h>
232da26a59SPekka Enberg #include <stdbool.h>
246e5e8b8dSPekka Enberg #include <assert.h>
2506e41eeaSPekka Enberg #include <limits.h>
26ce79f1caSPekka Enberg #include <signal.h>
27f5ab5f67SPekka Enberg #include <stdarg.h>
28b8f6afcdSPekka Enberg #include <stdlib.h>
29f5ab5f67SPekka Enberg #include <string.h>
300d1f17ecSPekka Enberg #include <unistd.h>
311f9cff23SPekka Enberg #include <stdio.h>
32b8f6afcdSPekka Enberg #include <fcntl.h>
33ce79f1caSPekka Enberg #include <time.h>
344298ddadSSasha Levin #include <sys/eventfd.h>
35c7828731SSasha Levin #include <asm/unistd.h>
3663bc8503SSasha Levin #include <dirent.h>
37b8f6afcdSPekka Enberg 
38ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
390d1f17ecSPekka Enberg 
40ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
51ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
52ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
53ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
54ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
55ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
56ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
57ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
58ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
599b1fb1c3SPekka Enberg };
609b1fb1c3SPekka Enberg 
6155e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
6255e19624SCyrill Gorcunov 	.name = #ext,			\
6355e19624SCyrill Gorcunov 	.code = ext
6455e19624SCyrill Gorcunov 
6555e19624SCyrill Gorcunov struct {
6655e19624SCyrill Gorcunov 	const char *name;
6755e19624SCyrill Gorcunov 	int code;
6855e19624SCyrill Gorcunov } kvm_req_ext[] = {
6955e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
7055e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
7155e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
7255e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
7355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
7455e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
757c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
7655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
77d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
7855e19624SCyrill Gorcunov };
7955e19624SCyrill Gorcunov 
804298ddadSSasha Levin extern struct kvm *kvm;
814298ddadSSasha Levin extern struct kvm_cpu *kvm_cpus[KVM_NR_CPUS];
824298ddadSSasha Levin static int pause_event;
834298ddadSSasha Levin static DEFINE_MUTEX(pause_lock);
844298ddadSSasha Levin 
859667701cSPekka Enberg static char kvm_dir[PATH_MAX];
869667701cSPekka Enberg 
879667701cSPekka Enberg static void set_dir(const char *fmt, va_list args)
889667701cSPekka Enberg {
89dd188f9fSPekka Enberg 	char tmp[PATH_MAX];
90dd188f9fSPekka Enberg 
91dd188f9fSPekka Enberg 	vsnprintf(tmp, sizeof(tmp), fmt, args);
92dd188f9fSPekka Enberg 
932bc995fbSPekka Enberg 	mkdir(tmp, 0777);
942bc995fbSPekka Enberg 
95dd188f9fSPekka Enberg 	if (!realpath(tmp, kvm_dir))
96dd188f9fSPekka Enberg 		die("Unable to set KVM tool directory");
97*f76a3285SPekka Enberg 
98*f76a3285SPekka Enberg 	strcat(kvm_dir, "/");
999667701cSPekka Enberg }
1009667701cSPekka Enberg 
1019667701cSPekka Enberg void kvm__set_dir(const char *fmt, ...)
1029667701cSPekka Enberg {
1039667701cSPekka Enberg 	va_list args;
1049667701cSPekka Enberg 
1059667701cSPekka Enberg 	va_start(args, fmt);
1069667701cSPekka Enberg 	set_dir(fmt, args);
1079667701cSPekka Enberg 	va_end(args);
1089667701cSPekka Enberg }
1099667701cSPekka Enberg 
1109667701cSPekka Enberg const char *kvm__get_dir(void)
1119667701cSPekka Enberg {
1129667701cSPekka Enberg 	return kvm_dir;
1139667701cSPekka Enberg }
1149667701cSPekka Enberg 
11543835ac9SSasha Levin static bool kvm__supports_extension(struct kvm *kvm, unsigned int extension)
116b8f6afcdSPekka Enberg {
11728fa19c0SPekka Enberg 	int ret;
118b8f6afcdSPekka Enberg 
11943835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, extension);
1204076b041SPekka Enberg 	if (ret < 0)
1214076b041SPekka Enberg 		return false;
1224076b041SPekka Enberg 
1234076b041SPekka Enberg 	return ret;
1244076b041SPekka Enberg }
1254076b041SPekka Enberg 
12643835ac9SSasha Levin static int kvm__check_extensions(struct kvm *kvm)
12755e19624SCyrill Gorcunov {
12855e19624SCyrill Gorcunov 	unsigned int i;
12955e19624SCyrill Gorcunov 
13055e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
13143835ac9SSasha Levin 		if (!kvm__supports_extension(kvm, kvm_req_ext[i].code)) {
1324542f276SCyrill Gorcunov 			pr_error("Unsuppored KVM extension detected: %s",
13355e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
13455e19624SCyrill Gorcunov 			return (int)-i;
13555e19624SCyrill Gorcunov 		}
13655e19624SCyrill Gorcunov 	}
13755e19624SCyrill Gorcunov 
13855e19624SCyrill Gorcunov 	return 0;
13955e19624SCyrill Gorcunov }
14055e19624SCyrill Gorcunov 
1414076b041SPekka Enberg static struct kvm *kvm__new(void)
1424076b041SPekka Enberg {
14343835ac9SSasha Levin 	struct kvm *kvm = calloc(1, sizeof *kvm);
1444076b041SPekka Enberg 
14543835ac9SSasha Levin 	if (!kvm)
1464076b041SPekka Enberg 		die("out of memory");
1474076b041SPekka Enberg 
14843835ac9SSasha Levin 	return kvm;
1494076b041SPekka Enberg }
1504076b041SPekka Enberg 
1514b1addaeSSasha Levin static int kvm__create_socket(struct kvm *kvm)
1525358b0e6SSasha Levin {
1534b1addaeSSasha Levin 	char full_name[PATH_MAX];
1544b1addaeSSasha Levin 	unsigned int s;
1554b1addaeSSasha Levin 	struct sockaddr_un local;
1564b1addaeSSasha Levin 	int len, r;
1575358b0e6SSasha Levin 
1585358b0e6SSasha Levin 	if (!kvm->name)
1594b1addaeSSasha Levin 		return -1;
1605358b0e6SSasha Levin 
1619667701cSPekka Enberg 	sprintf(full_name, "%s", kvm__get_dir());
162c71efd96SSasha Levin 	mkdir(full_name, 0777);
1634b1addaeSSasha Levin 	sprintf(full_name, "%s/%s.sock", kvm__get_dir(), kvm->name);
164fa0022d2SSasha Levin 	if (access(full_name, F_OK) == 0)
165fa0022d2SSasha Levin 		die("Socket file %s already exist", full_name);
166fa0022d2SSasha Levin 
1674b1addaeSSasha Levin 	s = socket(AF_UNIX, SOCK_STREAM, 0);
1684b1addaeSSasha Levin 	if (s < 0)
1694b1addaeSSasha Levin 		return s;
1704b1addaeSSasha Levin 	local.sun_family = AF_UNIX;
1714b1addaeSSasha Levin 	strcpy(local.sun_path, full_name);
1724b1addaeSSasha Levin 	unlink(local.sun_path);
1734b1addaeSSasha Levin 	len = strlen(local.sun_path) + sizeof(local.sun_family);
1744b1addaeSSasha Levin 	r = bind(s, (struct sockaddr *)&local, len);
1754b1addaeSSasha Levin 	if (r < 0)
1764b1addaeSSasha Levin 		goto fail;
1774b1addaeSSasha Levin 
1784b1addaeSSasha Levin 	r = listen(s, 5);
1794b1addaeSSasha Levin 	if (r < 0)
1804b1addaeSSasha Levin 		goto fail;
1814b1addaeSSasha Levin 
1824b1addaeSSasha Levin 	return s;
1834b1addaeSSasha Levin 
1844b1addaeSSasha Levin fail:
1854b1addaeSSasha Levin 	close(s);
1864b1addaeSSasha Levin 	return -1;
1875358b0e6SSasha Levin }
1885358b0e6SSasha Levin 
1894b1addaeSSasha Levin void kvm__remove_socket(const char *name)
1905358b0e6SSasha Levin {
1915358b0e6SSasha Levin 	char full_name[PATH_MAX];
1925358b0e6SSasha Levin 
1934b1addaeSSasha Levin 	sprintf(full_name, "%s/%s.sock", kvm__get_dir(), name);
1945358b0e6SSasha Levin 	unlink(full_name);
1955358b0e6SSasha Levin }
1965358b0e6SSasha Levin 
1974b1addaeSSasha Levin int kvm__get_sock_by_instance(const char *name)
1985358b0e6SSasha Levin {
1994b1addaeSSasha Levin 	int s, len, r;
2004b1addaeSSasha Levin 	char sock_file[PATH_MAX];
2014b1addaeSSasha Levin 	struct sockaddr_un local;
2025358b0e6SSasha Levin 
2034b1addaeSSasha Levin 	sprintf(sock_file, "%s/%s.sock", kvm__get_dir(), name);
2044b1addaeSSasha Levin 	s = socket(AF_UNIX, SOCK_STREAM, 0);
2055358b0e6SSasha Levin 
2064b1addaeSSasha Levin 	local.sun_family = AF_UNIX;
2074b1addaeSSasha Levin 	strcpy(local.sun_path, sock_file);
2084b1addaeSSasha Levin 	len = strlen(local.sun_path) + sizeof(local.sun_family);
2095358b0e6SSasha Levin 
2104b1addaeSSasha Levin 	r = connect(s, &local, len);
2114b1addaeSSasha Levin 	if (r < 0)
2124b1addaeSSasha Levin 		die("Failed connecting to instance");
2135358b0e6SSasha Levin 
2144b1addaeSSasha Levin 	return s;
2155358b0e6SSasha Levin }
2165358b0e6SSasha Levin 
2174b1addaeSSasha Levin int kvm__enumerate_instances(int (*callback)(const char *name, int fd))
21863bc8503SSasha Levin {
21963bc8503SSasha Levin 	char full_name[PATH_MAX];
2204b1addaeSSasha Levin 	int sock;
22163bc8503SSasha Levin 	DIR *dir;
22263bc8503SSasha Levin 	struct dirent entry, *result;
223886af5f2SLiming Wang 	int ret = 0;
22463bc8503SSasha Levin 
2259667701cSPekka Enberg 	sprintf(full_name, "%s", kvm__get_dir());
22663bc8503SSasha Levin 	dir = opendir(full_name);
22763bc8503SSasha Levin 
228f2e556f3SKonstantin Khlebnikov 	while (dir != NULL) {
22963bc8503SSasha Levin 		readdir_r(dir, &entry, &result);
23063bc8503SSasha Levin 		if (result == NULL)
23163bc8503SSasha Levin 			break;
2324b1addaeSSasha Levin 		if (entry.d_type == DT_SOCK) {
2334b1addaeSSasha Levin 			entry.d_name[strlen(entry.d_name)-5] = 0;
2344b1addaeSSasha Levin 			sock = kvm__get_sock_by_instance(entry.d_name);
2354b1addaeSSasha Levin 			ret = callback(entry.d_name, sock);
2364b1addaeSSasha Levin 			close(sock);
237886af5f2SLiming Wang 			if (ret < 0)
238886af5f2SLiming Wang 				break;
23963bc8503SSasha Levin 		}
24063bc8503SSasha Levin 	}
24163bc8503SSasha Levin 
2421a0ef251SSasha Levin 	closedir(dir);
2431a0ef251SSasha Levin 
244886af5f2SLiming Wang 	return ret;
24563bc8503SSasha Levin }
24663bc8503SSasha Levin 
24743835ac9SSasha Levin void kvm__delete(struct kvm *kvm)
2489ef4c68eSPekka Enberg {
24943835ac9SSasha Levin 	kvm__stop_timer(kvm);
250fbfe68b7SSasha Levin 
25143835ac9SSasha Levin 	munmap(kvm->ram_start, kvm->ram_size);
252c733c80bSSasha Levin 	kvm_ipc__stop();
2534b1addaeSSasha Levin 	kvm__remove_socket(kvm->name);
25443835ac9SSasha Levin 	free(kvm);
2559ef4c68eSPekka Enberg }
2569ef4c68eSPekka Enberg 
257c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
258c78b8713SAsias He {
259c78b8713SAsias He 	struct cpuid_regs regs;
2603fdf659dSSasha Levin 	u32 eax_base;
261831fbf23SPekka Enberg 	int feature;
262c78b8713SAsias He 
263c78b8713SAsias He 	regs	= (struct cpuid_regs) {
264831fbf23SPekka Enberg 		.eax		= 0x00,
265c78b8713SAsias He 	};
266c78b8713SAsias He 	host_cpuid(&regs);
267c78b8713SAsias He 
268ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
269ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
270831fbf23SPekka Enberg 		eax_base	= 0x00;
271831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_VMX;
272ae87afbfSCyrill Gorcunov 		break;
27334649df9SPekka Enberg 
274ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
275831fbf23SPekka Enberg 		eax_base	= 0x80000000;
276831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_SVM;
277ae87afbfSCyrill Gorcunov 		break;
27834649df9SPekka Enberg 
27934649df9SPekka Enberg 	default:
28034649df9SPekka Enberg 		return false;
281ae87afbfSCyrill Gorcunov 	}
282ae87afbfSCyrill Gorcunov 
283831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
284831fbf23SPekka Enberg 		.eax		= eax_base,
285831fbf23SPekka Enberg 	};
286831fbf23SPekka Enberg 	host_cpuid(&regs);
287831fbf23SPekka Enberg 
288831fbf23SPekka Enberg 	if (regs.eax < eax_base + 0x01)
289831fbf23SPekka Enberg 		return false;
290831fbf23SPekka Enberg 
291831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
292831fbf23SPekka Enberg 		.eax		= eax_base + 0x01
293831fbf23SPekka Enberg 	};
294831fbf23SPekka Enberg 	host_cpuid(&regs);
295831fbf23SPekka Enberg 
296831fbf23SPekka Enberg 	return regs.ecx & (1 << feature);
297c78b8713SAsias He }
298c78b8713SAsias He 
29996feb589SPekka Enberg /*
30096feb589SPekka Enberg  * Note: KVM_SET_USER_MEMORY_REGION assumes that we don't pass overlapping
30196feb589SPekka Enberg  * memory regions to it. Therefore, be careful if you use this function for
30296feb589SPekka Enberg  * registering memory regions for emulating hardware.
30396feb589SPekka Enberg  */
30496feb589SPekka Enberg void kvm__register_mem(struct kvm *kvm, u64 guest_phys, u64 size, void *userspace_addr)
3054076b041SPekka Enberg {
3062b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
307839051d9SSasha Levin 	int ret;
308839051d9SSasha Levin 
309839051d9SSasha Levin 	mem = (struct kvm_userspace_memory_region) {
31096feb589SPekka Enberg 		.slot			= kvm->mem_slots++,
311874467f8SSasha Levin 		.guest_phys_addr	= guest_phys,
312874467f8SSasha Levin 		.memory_size		= size,
313c4acb611SIngo Molnar 		.userspace_addr		= (unsigned long)userspace_addr,
314839051d9SSasha Levin 	};
315839051d9SSasha Levin 
316874467f8SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
317839051d9SSasha Levin 	if (ret < 0)
318839051d9SSasha Levin 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
319839051d9SSasha Levin }
320839051d9SSasha Levin 
321874467f8SSasha Levin /*
322874467f8SSasha Levin  * Allocating RAM size bigger than 4GB requires us to leave a gap
323874467f8SSasha Levin  * in the RAM which is used for PCI MMIO, hotplug, and unconfigured
324874467f8SSasha Levin  * devices (see documentation of e820_setup_gap() for details).
325874467f8SSasha Levin  *
326874467f8SSasha Levin  * If we're required to initialize RAM bigger than 4GB, we will create
327874467f8SSasha Levin  * a gap between 0xe0000000 and 0x100000000 in the guest virtual mem space.
328874467f8SSasha Levin  */
329874467f8SSasha Levin 
33043835ac9SSasha Levin void kvm__init_ram(struct kvm *kvm)
331874467f8SSasha Levin {
332874467f8SSasha Levin 	u64	phys_start, phys_size;
333874467f8SSasha Levin 	void	*host_mem;
334874467f8SSasha Levin 
33543835ac9SSasha Levin 	if (kvm->ram_size < KVM_32BIT_GAP_START) {
336874467f8SSasha Levin 		/* Use a single block of RAM for 32bit RAM */
337874467f8SSasha Levin 
338874467f8SSasha Levin 		phys_start = 0;
33943835ac9SSasha Levin 		phys_size  = kvm->ram_size;
34043835ac9SSasha Levin 		host_mem   = kvm->ram_start;
341874467f8SSasha Levin 
34296feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
343874467f8SSasha Levin 	} else {
344874467f8SSasha Levin 		/* First RAM range from zero to the PCI gap: */
345874467f8SSasha Levin 
346874467f8SSasha Levin 		phys_start = 0;
347874467f8SSasha Levin 		phys_size  = KVM_32BIT_GAP_START;
34843835ac9SSasha Levin 		host_mem   = kvm->ram_start;
349874467f8SSasha Levin 
35096feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
351874467f8SSasha Levin 
352874467f8SSasha Levin 		/* Second RAM range from 4GB to the end of RAM: */
353874467f8SSasha Levin 
354874467f8SSasha Levin 		phys_start = 0x100000000ULL;
35543835ac9SSasha Levin 		phys_size  = kvm->ram_size - phys_size;
35643835ac9SSasha Levin 		host_mem   = kvm->ram_start + phys_start;
357874467f8SSasha Levin 
35896feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
359874467f8SSasha Levin 	}
360874467f8SSasha Levin }
361874467f8SSasha Levin 
3628259b8ccSSasha Levin int kvm__recommended_cpus(struct kvm *kvm)
363384922b3SPekka Enberg {
364384922b3SPekka Enberg 	int ret;
365384922b3SPekka Enberg 
36643835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
3678259b8ccSSasha Levin 	if (ret <= 0)
368384922b3SPekka Enberg 		die_perror("KVM_CAP_NR_VCPUS");
369384922b3SPekka Enberg 
370384922b3SPekka Enberg 	return ret;
371384922b3SPekka Enberg }
372384922b3SPekka Enberg 
3734b1addaeSSasha Levin static void kvm__pid(int fd, u32 type, u32 len, u8 *msg)
3744b1addaeSSasha Levin {
3754b1addaeSSasha Levin 	pid_t pid = getpid();
3764b1addaeSSasha Levin 	int r = 0;
3774b1addaeSSasha Levin 
3784b1addaeSSasha Levin 	if (type == KVM_IPC_PID)
3794b1addaeSSasha Levin 		r = write(fd, &pid, sizeof(pid));
3804b1addaeSSasha Levin 
3814b1addaeSSasha Levin 	if (r < 0)
3824b1addaeSSasha Levin 		pr_warning("Failed sending PID");
3834b1addaeSSasha Levin }
3844b1addaeSSasha Levin 
3858259b8ccSSasha Levin /*
3868259b8ccSSasha Levin  * The following hack should be removed once 'x86: Raise the hard
3878259b8ccSSasha Levin  * VCPU count limit' makes it's way into the mainline.
3888259b8ccSSasha Levin  */
3898259b8ccSSasha Levin #ifndef KVM_CAP_MAX_VCPUS
3908259b8ccSSasha Levin #define KVM_CAP_MAX_VCPUS 66
3918259b8ccSSasha Levin #endif
3928259b8ccSSasha Levin 
3938259b8ccSSasha Levin int kvm__max_cpus(struct kvm *kvm)
3948259b8ccSSasha Levin {
3958259b8ccSSasha Levin 	int ret;
3968259b8ccSSasha Levin 
3978259b8ccSSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS);
3988259b8ccSSasha Levin 	if (ret <= 0)
3998259b8ccSSasha Levin 		ret = kvm__recommended_cpus(kvm);
4008259b8ccSSasha Levin 
4018259b8ccSSasha Levin 	return ret;
4028259b8ccSSasha Levin }
4038259b8ccSSasha Levin 
4045358b0e6SSasha Levin struct kvm *kvm__init(const char *kvm_dev, u64 ram_size, const char *name)
405839051d9SSasha Levin {
4069687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
40743835ac9SSasha Levin 	struct kvm *kvm;
4084076b041SPekka Enberg 	int ret;
4094076b041SPekka Enberg 
410c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
411c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
412c78b8713SAsias He 
41343835ac9SSasha Levin 	kvm = kvm__new();
4144076b041SPekka Enberg 
41543835ac9SSasha Levin 	kvm->sys_fd = open(kvm_dev, O_RDWR);
41643835ac9SSasha Levin 	if (kvm->sys_fd < 0) {
4176d7c36ceSPekka Enberg 		if (errno == ENOENT)
418e907b83fSPekka Enberg 			die("'%s' not found. Please make sure your kernel has CONFIG_KVM enabled and that the KVM modules are loaded.", kvm_dev);
419f8334800SIngo Molnar 		if (errno == ENODEV)
420f8334800SIngo Molnar 			die("'%s' KVM driver not available.\n  # (If the KVM module is loaded then 'dmesg' may offer further clues about the failure.)", kvm_dev);
4216d7c36ceSPekka Enberg 
422f8334800SIngo Molnar 		fprintf(stderr, "  Fatal, could not open %s: ", kvm_dev);
423f8334800SIngo Molnar 		perror(NULL);
424f8334800SIngo Molnar 		exit(1);
4256d7c36ceSPekka Enberg 	}
426b8f6afcdSPekka Enberg 
42743835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_GET_API_VERSION, 0);
4286c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
429f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
4306c7d8514SPekka Enberg 
43143835ac9SSasha Levin 	kvm->vm_fd = ioctl(kvm->sys_fd, KVM_CREATE_VM, 0);
43243835ac9SSasha Levin 	if (kvm->vm_fd < 0)
433f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
43428fa19c0SPekka Enberg 
43543835ac9SSasha Levin 	if (kvm__check_extensions(kvm))
43655e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
4379687927dSAsias He 
43843835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
4399687927dSAsias He 	if (ret < 0)
4409687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
4419687927dSAsias He 
44243835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_CREATE_PIT2, &pit_config);
4439687927dSAsias He 	if (ret < 0)
4449687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
4459687927dSAsias He 
44643835ac9SSasha Levin 	kvm->ram_size		= ram_size;
4470d1f17ecSPekka Enberg 
44843835ac9SSasha Levin 	if (kvm->ram_size < KVM_32BIT_GAP_START) {
44937c34ca8SSasha Levin 		kvm->ram_start = mmap(NULL, ram_size, PROT_RW, MAP_ANON_NORESERVE, -1, 0);
450874467f8SSasha Levin 	} else {
45137c34ca8SSasha Levin 		kvm->ram_start = mmap(NULL, ram_size + KVM_32BIT_GAP_SIZE, PROT_RW, MAP_ANON_NORESERVE, -1, 0);
45243835ac9SSasha Levin 		if (kvm->ram_start != MAP_FAILED) {
453874467f8SSasha Levin 			/*
454874467f8SSasha Levin 			 * We mprotect the gap (see kvm__init_ram() for details) PROT_NONE so that
455874467f8SSasha Levin 			 * if we accidently write to it, we will know.
456874467f8SSasha Levin 			 */
45743835ac9SSasha Levin 			mprotect(kvm->ram_start + KVM_32BIT_GAP_START, KVM_32BIT_GAP_SIZE, PROT_NONE);
458874467f8SSasha Levin 		}
459874467f8SSasha Levin 	}
46043835ac9SSasha Levin 	if (kvm->ram_start == MAP_FAILED)
4610d1f17ecSPekka Enberg 		die("out of memory");
4620d1f17ecSPekka Enberg 
4637f4f39a4SSasha Levin 	madvise(kvm->ram_start, kvm->ram_size, MADV_MERGEABLE);
4647f4f39a4SSasha Levin 
46543835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_CREATE_IRQCHIP);
466895c2fefSPekka Enberg 	if (ret < 0)
4679687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
4689687927dSAsias He 
4695358b0e6SSasha Levin 	kvm->name = name;
4705358b0e6SSasha Levin 
4714b1addaeSSasha Levin 	kvm_ipc__start(kvm__create_socket(kvm));
4724b1addaeSSasha Levin 	kvm_ipc__register_handler(KVM_IPC_PID, kvm__pid);
47343835ac9SSasha Levin 	return kvm;
4744076b041SPekka Enberg }
4754076b041SPekka Enberg 
4765f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
477b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
478dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
4792dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
4802dd4a4edSCyrill Gorcunov 
4819a4ecdc5SPekka Enberg #define BOOT_PROTOCOL_REQUIRED	0x206
482a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
483009b0758SPekka Enberg 
48443835ac9SSasha Levin static int load_flat_binary(struct kvm *kvm, int fd)
485009b0758SPekka Enberg {
486009b0758SPekka Enberg 	void *p;
487009b0758SPekka Enberg 	int nr;
488009b0758SPekka Enberg 
489009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
490009b0758SPekka Enberg 		die_perror("lseek");
491009b0758SPekka Enberg 
49243835ac9SSasha Levin 	p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
493009b0758SPekka Enberg 
494009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
495009b0758SPekka Enberg 		p += nr;
496009b0758SPekka Enberg 
49743835ac9SSasha Levin 	kvm->boot_selector	= BOOT_LOADER_SELECTOR;
49843835ac9SSasha Levin 	kvm->boot_ip		= BOOT_LOADER_IP;
49943835ac9SSasha Levin 	kvm->boot_sp		= BOOT_LOADER_SP;
500edc8a14dSPekka Enberg 
5017fb218bdSPekka Enberg 	return true;
502009b0758SPekka Enberg }
503009b0758SPekka Enberg 
504ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
505ae1fae34SPekka Enberg 
50643835ac9SSasha Levin static bool load_bzimage(struct kvm *kvm, int fd_kernel,
50753861c74SJohn Floren 			int fd_initrd, const char *kernel_cmdline, u16 vidmode)
508ae1fae34SPekka Enberg {
509b9271160SPekka Enberg 	struct boot_params *kern_boot;
5104b62331fSPekka Enberg 	unsigned long setup_sects;
511b9271160SPekka Enberg 	struct boot_params boot;
5122dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
5137fb218bdSPekka Enberg 	ssize_t setup_size;
51422489bb0SCyrill Gorcunov 	void *p;
515ae1fae34SPekka Enberg 	int nr;
516ae1fae34SPekka Enberg 
5175d67eaf6SPekka Enberg 	/*
5185d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
5195d67eaf6SPekka Enberg 	 * memory layout.
5205d67eaf6SPekka Enberg 	 */
5215d67eaf6SPekka Enberg 
5222065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
523009b0758SPekka Enberg 		die_perror("lseek");
524009b0758SPekka Enberg 
5250b62d2bbSPekka Enberg 	if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot))
5262346d461SPekka Enberg 		return false;
527ae1fae34SPekka Enberg 
5280b62d2bbSPekka Enberg 	if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)))
5297fb218bdSPekka Enberg 		return false;
530ae1fae34SPekka Enberg 
5310ea58e5bSPekka Enberg 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED)
5320b62d2bbSPekka Enberg 		die("Too old kernel");
533ad681038SCyrill Gorcunov 
5342065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
535e93ab78aSPekka Enberg 		die_perror("lseek");
536e93ab78aSPekka Enberg 
5374cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
5384cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
53910943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
54010943d14SPekka Enberg 
54154d4a626SPekka Enberg 	setup_size = setup_sects << 9;
54243835ac9SSasha Levin 	p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
543ae1fae34SPekka Enberg 
5442065a6f7SCyrill Gorcunov 	/* copy setup.bin to mem*/
5452065a6f7SCyrill Gorcunov 	if (read(fd_kernel, p, setup_size) != setup_size)
5467fb218bdSPekka Enberg 		die_perror("read");
5477fb218bdSPekka Enberg 
5482065a6f7SCyrill Gorcunov 	/* copy vmlinux.bin to BZ_KERNEL_START*/
54943835ac9SSasha Levin 	p = guest_flat_to_host(kvm, BZ_KERNEL_START);
550ae1fae34SPekka Enberg 
5512065a6f7SCyrill Gorcunov 	while ((nr = read(fd_kernel, p, 65536)) > 0)
552ae1fae34SPekka Enberg 		p += nr;
553ae1fae34SPekka Enberg 
55443835ac9SSasha Levin 	p = guest_flat_to_host(kvm, BOOT_CMDLINE_OFFSET);
555debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
556debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
557debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
558debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
559ad681038SCyrill Gorcunov 
5602dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
5612dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
562debcfac0SCyrill Gorcunov 	}
563debcfac0SCyrill Gorcunov 
56443835ac9SSasha Levin 	kern_boot	= guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, 0x00);
565a43f6460SCyrill Gorcunov 
566b9271160SPekka Enberg 	kern_boot->hdr.cmd_line_ptr	= BOOT_CMDLINE_OFFSET;
567b9271160SPekka Enberg 	kern_boot->hdr.type_of_loader	= 0xff;
568b9271160SPekka Enberg 	kern_boot->hdr.heap_end_ptr	= 0xfe00;
569b9271160SPekka Enberg 	kern_boot->hdr.loadflags	|= CAN_USE_HEAP;
57053861c74SJohn Floren 	kern_boot->hdr.vid_mode		= vidmode;
571a43f6460SCyrill Gorcunov 
5722065a6f7SCyrill Gorcunov 	/*
5732065a6f7SCyrill Gorcunov 	 * Read initrd image into guest memory
5742065a6f7SCyrill Gorcunov 	 */
5752065a6f7SCyrill Gorcunov 	if (fd_initrd >= 0) {
5762065a6f7SCyrill Gorcunov 		struct stat initrd_stat;
5772065a6f7SCyrill Gorcunov 		unsigned long addr;
5782065a6f7SCyrill Gorcunov 
5792065a6f7SCyrill Gorcunov 		if (fstat(fd_initrd, &initrd_stat))
5802065a6f7SCyrill Gorcunov 			die_perror("fstat");
5812065a6f7SCyrill Gorcunov 
5822065a6f7SCyrill Gorcunov 		addr = boot.hdr.initrd_addr_max & ~0xfffff;
5832065a6f7SCyrill Gorcunov 		for (;;) {
5842065a6f7SCyrill Gorcunov 			if (addr < BZ_KERNEL_START)
5852065a6f7SCyrill Gorcunov 				die("Not enough memory for initrd");
58643835ac9SSasha Levin 			else if (addr < (kvm->ram_size - initrd_stat.st_size))
5872065a6f7SCyrill Gorcunov 				break;
5882065a6f7SCyrill Gorcunov 			addr -= 0x100000;
5892065a6f7SCyrill Gorcunov 		}
5902065a6f7SCyrill Gorcunov 
59143835ac9SSasha Levin 		p = guest_flat_to_host(kvm, addr);
5922065a6f7SCyrill Gorcunov 		nr = read(fd_initrd, p, initrd_stat.st_size);
5932065a6f7SCyrill Gorcunov 		if (nr != initrd_stat.st_size)
5942065a6f7SCyrill Gorcunov 			die("Failed to read initrd");
5952065a6f7SCyrill Gorcunov 
5962065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_image	= addr;
5972065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_size	= initrd_stat.st_size;
5982065a6f7SCyrill Gorcunov 	}
5992065a6f7SCyrill Gorcunov 
60043835ac9SSasha Levin 	kvm->boot_selector	= BOOT_LOADER_SELECTOR;
601edc8a14dSPekka Enberg 	/*
602edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
603edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
604edc8a14dSPekka Enberg 	 */
60543835ac9SSasha Levin 	kvm->boot_ip		= BOOT_LOADER_IP + 0x200;
60643835ac9SSasha Levin 	kvm->boot_sp		= BOOT_LOADER_SP;
607edc8a14dSPekka Enberg 
6087fb218bdSPekka Enberg 	return true;
609ae1fae34SPekka Enberg }
610ae1fae34SPekka Enberg 
61172811558SPekka Enberg /* RFC 1952 */
61272811558SPekka Enberg #define GZIP_ID1		0x1f
61372811558SPekka Enberg #define GZIP_ID2		0x8b
61472811558SPekka Enberg 
61572811558SPekka Enberg static bool initrd_check(int fd)
61672811558SPekka Enberg {
61772811558SPekka Enberg 	unsigned char id[2];
61872811558SPekka Enberg 
61972811558SPekka Enberg 	if (read_in_full(fd, id, ARRAY_SIZE(id)) < 0)
62072811558SPekka Enberg 		return false;
62172811558SPekka Enberg 
62272811558SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
62372811558SPekka Enberg 		die_perror("lseek");
62472811558SPekka Enberg 
62572811558SPekka Enberg 	return id[0] == GZIP_ID1 && id[1] == GZIP_ID2;
62672811558SPekka Enberg }
62772811558SPekka Enberg 
6286d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
62953861c74SJohn Floren 		const char *initrd_filename, const char *kernel_cmdline, u16 vidmode)
630ae1fae34SPekka Enberg {
6317fb218bdSPekka Enberg 	bool ret;
6322065a6f7SCyrill Gorcunov 	int fd_kernel = -1, fd_initrd = -1;
633ae1fae34SPekka Enberg 
6342065a6f7SCyrill Gorcunov 	fd_kernel = open(kernel_filename, O_RDONLY);
6352065a6f7SCyrill Gorcunov 	if (fd_kernel < 0)
6360b62d2bbSPekka Enberg 		die("Unable to open kernel %s", kernel_filename);
637ae1fae34SPekka Enberg 
6382065a6f7SCyrill Gorcunov 	if (initrd_filename) {
6392065a6f7SCyrill Gorcunov 		fd_initrd = open(initrd_filename, O_RDONLY);
6402065a6f7SCyrill Gorcunov 		if (fd_initrd < 0)
6410b62d2bbSPekka Enberg 			die("Unable to open initrd %s", initrd_filename);
64272811558SPekka Enberg 
64372811558SPekka Enberg 		if (!initrd_check(fd_initrd))
64472811558SPekka Enberg 			die("%s is not an initrd", initrd_filename);
6452065a6f7SCyrill Gorcunov 	}
6462065a6f7SCyrill Gorcunov 
64753861c74SJohn Floren 	ret = load_bzimage(kvm, fd_kernel, fd_initrd, kernel_cmdline, vidmode);
64828972750SCyrill Gorcunov 
64928972750SCyrill Gorcunov 	if (initrd_filename)
65028972750SCyrill Gorcunov 		close(fd_initrd);
65128972750SCyrill Gorcunov 
652009b0758SPekka Enberg 	if (ret)
653009b0758SPekka Enberg 		goto found_kernel;
654ae1fae34SPekka Enberg 
6554542f276SCyrill Gorcunov 	pr_warning("%s is not a bzImage. Trying to load it as a flat binary...", kernel_filename);
6560b62d2bbSPekka Enberg 
6572065a6f7SCyrill Gorcunov 	ret = load_flat_binary(kvm, fd_kernel);
658009b0758SPekka Enberg 	if (ret)
659009b0758SPekka Enberg 		goto found_kernel;
660009b0758SPekka Enberg 
6615a6ac675SSasha Levin 	close(fd_kernel);
6625a6ac675SSasha Levin 
663009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
664009b0758SPekka Enberg 
665009b0758SPekka Enberg found_kernel:
6665a6ac675SSasha Levin 	close(fd_kernel);
6675a6ac675SSasha Levin 
668ae1fae34SPekka Enberg 	return ret;
669ae1fae34SPekka Enberg }
670ae1fae34SPekka Enberg 
671b3594ec7SCyrill Gorcunov /**
672b3594ec7SCyrill Gorcunov  * kvm__setup_bios - inject BIOS into guest system memory
67343835ac9SSasha Levin  * @kvm - guest system descriptor
674b3594ec7SCyrill Gorcunov  *
675b3594ec7SCyrill Gorcunov  * This function is a main routine where we poke guest memory
676b3594ec7SCyrill Gorcunov  * and install BIOS there.
677b3594ec7SCyrill Gorcunov  */
67843835ac9SSasha Levin void kvm__setup_bios(struct kvm *kvm)
6792f3976eeSPekka Enberg {
680b3594ec7SCyrill Gorcunov 	/* standart minimal configuration */
68143835ac9SSasha Levin 	setup_bios(kvm);
6822f3976eeSPekka Enberg 
683b3594ec7SCyrill Gorcunov 	/* FIXME: SMP, ACPI and friends here */
6840c7c14a7SCyrill Gorcunov 
6850c7c14a7SCyrill Gorcunov 	/* MP table */
68643835ac9SSasha Levin 	mptable_setup(kvm, kvm->nrcpus);
6872f3976eeSPekka Enberg }
6882f3976eeSPekka Enberg 
689ce79f1caSPekka Enberg #define TIMER_INTERVAL_NS 1000000	/* 1 msec */
690ce79f1caSPekka Enberg 
691ce79f1caSPekka Enberg /*
692ce79f1caSPekka Enberg  * This function sets up a timer that's used to inject interrupts from the
693ce79f1caSPekka Enberg  * userspace hypervisor into the guest at periodical intervals. Please note
694ce79f1caSPekka Enberg  * that clock interrupt, for example, is not handled here.
695ce79f1caSPekka Enberg  */
69643835ac9SSasha Levin void kvm__start_timer(struct kvm *kvm)
697ce79f1caSPekka Enberg {
698ce79f1caSPekka Enberg 	struct itimerspec its;
699ce79f1caSPekka Enberg 	struct sigevent sev;
700ce79f1caSPekka Enberg 
701ce79f1caSPekka Enberg 	memset(&sev, 0, sizeof(struct sigevent));
702ce79f1caSPekka Enberg 	sev.sigev_value.sival_int	= 0;
703c7828731SSasha Levin 	sev.sigev_notify		= SIGEV_THREAD_ID;
704ce79f1caSPekka Enberg 	sev.sigev_signo			= SIGALRM;
705c7828731SSasha Levin 	sev._sigev_un._tid		= syscall(__NR_gettid);
706ce79f1caSPekka Enberg 
70743835ac9SSasha Levin 	if (timer_create(CLOCK_REALTIME, &sev, &kvm->timerid) < 0)
708ce79f1caSPekka Enberg 		die("timer_create()");
709ce79f1caSPekka Enberg 
710ce79f1caSPekka Enberg 	its.it_value.tv_sec		= TIMER_INTERVAL_NS / 1000000000;
711ce79f1caSPekka Enberg 	its.it_value.tv_nsec		= TIMER_INTERVAL_NS % 1000000000;
712ce79f1caSPekka Enberg 	its.it_interval.tv_sec		= its.it_value.tv_sec;
713ce79f1caSPekka Enberg 	its.it_interval.tv_nsec		= its.it_value.tv_nsec;
714ce79f1caSPekka Enberg 
71543835ac9SSasha Levin 	if (timer_settime(kvm->timerid, 0, &its, NULL) < 0)
716ce79f1caSPekka Enberg 		die("timer_settime()");
717ce79f1caSPekka Enberg }
718ce79f1caSPekka Enberg 
71943835ac9SSasha Levin void kvm__stop_timer(struct kvm *kvm)
720fbfe68b7SSasha Levin {
72143835ac9SSasha Levin 	if (kvm->timerid)
72243835ac9SSasha Levin 		if (timer_delete(kvm->timerid) < 0)
723fbfe68b7SSasha Levin 			die("timer_delete()");
724fbfe68b7SSasha Levin 
72543835ac9SSasha Levin 	kvm->timerid = 0;
726fbfe68b7SSasha Levin }
727fbfe68b7SSasha Levin 
72843835ac9SSasha Levin void kvm__irq_line(struct kvm *kvm, int irq, int level)
7298b1ff07eSPekka Enberg {
7308b1ff07eSPekka Enberg 	struct kvm_irq_level irq_level;
7318b1ff07eSPekka Enberg 
7328b1ff07eSPekka Enberg 	irq_level	= (struct kvm_irq_level) {
7338b1ff07eSPekka Enberg 		{
7348b1ff07eSPekka Enberg 			.irq		= irq,
7358b1ff07eSPekka Enberg 		},
7368b1ff07eSPekka Enberg 		.level		= level,
7378b1ff07eSPekka Enberg 	};
7388b1ff07eSPekka Enberg 
73943835ac9SSasha Levin 	if (ioctl(kvm->vm_fd, KVM_IRQ_LINE, &irq_level) < 0)
7408b1ff07eSPekka Enberg 		die_perror("KVM_IRQ_LINE failed");
7418b1ff07eSPekka Enberg }
7428b1ff07eSPekka Enberg 
743bfaed61cSSasha Levin void kvm__irq_trigger(struct kvm *kvm, int irq)
744bfaed61cSSasha Levin {
745bfaed61cSSasha Levin 	kvm__irq_line(kvm, irq, 1);
746bfaed61cSSasha Levin 	kvm__irq_line(kvm, irq, 0);
747bfaed61cSSasha Levin }
748bfaed61cSSasha Levin 
74943835ac9SSasha Levin void kvm__dump_mem(struct kvm *kvm, unsigned long addr, unsigned long size)
750090f898eSCyrill Gorcunov {
751090f898eSCyrill Gorcunov 	unsigned char *p;
752090f898eSCyrill Gorcunov 	unsigned long n;
753090f898eSCyrill Gorcunov 
754090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
755090f898eSCyrill Gorcunov 	if (!size)
756090f898eSCyrill Gorcunov 		return;
757090f898eSCyrill Gorcunov 
75843835ac9SSasha Levin 	p = guest_flat_to_host(kvm, addr);
759090f898eSCyrill Gorcunov 
76048cf3877SPekka Enberg 	for (n = 0; n < size; n += 8) {
76143835ac9SSasha Levin 		if (!host_ptr_in_ram(kvm, p + n))
76248cf3877SPekka Enberg 			break;
76348cf3877SPekka Enberg 
764090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
765090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
766090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
767090f898eSCyrill Gorcunov 	}
76848cf3877SPekka Enberg }
7694298ddadSSasha Levin 
7704298ddadSSasha Levin void kvm__pause(void)
7714298ddadSSasha Levin {
7724298ddadSSasha Levin 	int i, paused_vcpus = 0;
7734298ddadSSasha Levin 
7744298ddadSSasha Levin 	/* Check if the guest is running */
7754298ddadSSasha Levin 	if (!kvm_cpus[0] || kvm_cpus[0]->thread == 0)
7764298ddadSSasha Levin 		return;
7774298ddadSSasha Levin 
7784298ddadSSasha Levin 	mutex_lock(&pause_lock);
7794298ddadSSasha Levin 
7804298ddadSSasha Levin 	pause_event = eventfd(0, 0);
7814298ddadSSasha Levin 	if (pause_event < 0)
7824298ddadSSasha Levin 		die("Failed creating pause notification event");
7834298ddadSSasha Levin 	for (i = 0; i < kvm->nrcpus; i++)
7844298ddadSSasha Levin 		pthread_kill(kvm_cpus[i]->thread, SIGKVMPAUSE);
7854298ddadSSasha Levin 
7864298ddadSSasha Levin 	while (paused_vcpus < kvm->nrcpus) {
7874298ddadSSasha Levin 		u64 cur_read;
7884298ddadSSasha Levin 
7894298ddadSSasha Levin 		if (read(pause_event, &cur_read, sizeof(cur_read)) < 0)
7904298ddadSSasha Levin 			die("Failed reading pause event");
7914298ddadSSasha Levin 		paused_vcpus += cur_read;
7924298ddadSSasha Levin 	}
7934298ddadSSasha Levin 	close(pause_event);
7944298ddadSSasha Levin }
7954298ddadSSasha Levin 
7964298ddadSSasha Levin void kvm__continue(void)
7974298ddadSSasha Levin {
7984298ddadSSasha Levin 	/* Check if the guest is running */
7994298ddadSSasha Levin 	if (!kvm_cpus[0] || kvm_cpus[0]->thread == 0)
8004298ddadSSasha Levin 		return;
8014298ddadSSasha Levin 
8024298ddadSSasha Levin 	mutex_unlock(&pause_lock);
8034298ddadSSasha Levin }
8044298ddadSSasha Levin 
8054298ddadSSasha Levin void kvm__notify_paused(void)
8064298ddadSSasha Levin {
8074298ddadSSasha Levin 	u64 p = 1;
8084298ddadSSasha Levin 
8094298ddadSSasha Levin 	if (write(pause_event, &p, sizeof(p)) < 0)
8104298ddadSSasha Levin 		die("Failed notifying of paused VCPU.");
8114298ddadSSasha Levin 
8124298ddadSSasha Levin 	mutex_lock(&pause_lock);
8134298ddadSSasha Levin 	mutex_unlock(&pause_lock);
8144298ddadSSasha Levin }
815