xref: /kvmtool/kvm.c (revision fa0022d2762f0da34d08b09de4100ffcc6fbef74)
1ae1fae34SPekka Enberg #include "kvm/kvm.h"
2ae1fae34SPekka Enberg 
3b3594ec7SCyrill Gorcunov #include "kvm/boot-protocol.h"
472811558SPekka Enberg #include "kvm/cpufeature.h"
572811558SPekka Enberg #include "kvm/read-write.h"
672811558SPekka Enberg #include "kvm/interrupt.h"
70c7c14a7SCyrill Gorcunov #include "kvm/mptable.h"
872811558SPekka Enberg #include "kvm/util.h"
94298ddadSSasha Levin #include "kvm/mutex.h"
104298ddadSSasha Levin #include "kvm/kvm-cpu.h"
114b1addaeSSasha Levin #include "kvm/kvm-ipc.h"
12eda03319SPekka Enberg 
136c7d8514SPekka Enberg #include <linux/kvm.h>
14f5ab5f67SPekka Enberg 
15f5ab5f67SPekka Enberg #include <asm/bootparam.h>
16f5ab5f67SPekka Enberg 
174b1addaeSSasha Levin #include <sys/un.h>
184b1addaeSSasha Levin #include <sys/types.h>
194b1addaeSSasha Levin #include <sys/socket.h>
20ae1fae34SPekka Enberg #include <sys/ioctl.h>
211f9cff23SPekka Enberg #include <sys/mman.h>
22ce79f1caSPekka Enberg #include <sys/stat.h>
232da26a59SPekka Enberg #include <stdbool.h>
246e5e8b8dSPekka Enberg #include <assert.h>
2506e41eeaSPekka Enberg #include <limits.h>
26ce79f1caSPekka Enberg #include <signal.h>
27f5ab5f67SPekka Enberg #include <stdarg.h>
28b8f6afcdSPekka Enberg #include <stdlib.h>
29f5ab5f67SPekka Enberg #include <string.h>
300d1f17ecSPekka Enberg #include <unistd.h>
311f9cff23SPekka Enberg #include <stdio.h>
32b8f6afcdSPekka Enberg #include <fcntl.h>
33ce79f1caSPekka Enberg #include <time.h>
344298ddadSSasha Levin #include <sys/eventfd.h>
35c7828731SSasha Levin #include <asm/unistd.h>
3663bc8503SSasha Levin #include <dirent.h>
37b8f6afcdSPekka Enberg 
38ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason
390d1f17ecSPekka Enberg 
40ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = {
41ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN),
42ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION),
43ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO),
44ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL),
45ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG),
46ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT),
47ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO),
48ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN),
49ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN),
50ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY),
51ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR),
52ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR),
53ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS),
54ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC),
55ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET),
56ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR),
57ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI),
58ae1fae34SPekka Enberg 	DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR),
599b1fb1c3SPekka Enberg };
609b1fb1c3SPekka Enberg 
6155e19624SCyrill Gorcunov #define DEFINE_KVM_EXT(ext)		\
6255e19624SCyrill Gorcunov 	.name = #ext,			\
6355e19624SCyrill Gorcunov 	.code = ext
6455e19624SCyrill Gorcunov 
6555e19624SCyrill Gorcunov struct {
6655e19624SCyrill Gorcunov 	const char *name;
6755e19624SCyrill Gorcunov 	int code;
6855e19624SCyrill Gorcunov } kvm_req_ext[] = {
6955e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_COALESCED_MMIO) },
7055e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_SET_TSS_ADDR) },
7155e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_PIT2) },
7255e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_USER_MEMORY) },
7355e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_ROUTING) },
7455e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQCHIP) },
757c0ec28fSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_HLT) },
7655e19624SCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_IRQ_INJECT_STATUS) },
77d38ad31aSCyrill Gorcunov 	{ DEFINE_KVM_EXT(KVM_CAP_EXT_CPUID) },
7855e19624SCyrill Gorcunov };
7955e19624SCyrill Gorcunov 
804298ddadSSasha Levin extern struct kvm *kvm;
814298ddadSSasha Levin extern struct kvm_cpu *kvm_cpus[KVM_NR_CPUS];
824298ddadSSasha Levin static int pause_event;
834298ddadSSasha Levin static DEFINE_MUTEX(pause_lock);
844298ddadSSasha Levin 
859667701cSPekka Enberg static char kvm_dir[PATH_MAX];
869667701cSPekka Enberg 
879667701cSPekka Enberg static void set_dir(const char *fmt, va_list args)
889667701cSPekka Enberg {
89dd188f9fSPekka Enberg 	char tmp[PATH_MAX];
90dd188f9fSPekka Enberg 
91dd188f9fSPekka Enberg 	vsnprintf(tmp, sizeof(tmp), fmt, args);
92dd188f9fSPekka Enberg 
93dd188f9fSPekka Enberg 	if (!realpath(tmp, kvm_dir))
94dd188f9fSPekka Enberg 		die("Unable to set KVM tool directory");
959667701cSPekka Enberg }
969667701cSPekka Enberg 
979667701cSPekka Enberg void kvm__set_dir(const char *fmt, ...)
989667701cSPekka Enberg {
999667701cSPekka Enberg 	va_list args;
1009667701cSPekka Enberg 
1019667701cSPekka Enberg 	va_start(args, fmt);
1029667701cSPekka Enberg 	set_dir(fmt, args);
1039667701cSPekka Enberg 	va_end(args);
1049667701cSPekka Enberg }
1059667701cSPekka Enberg 
1069667701cSPekka Enberg const char *kvm__get_dir(void)
1079667701cSPekka Enberg {
1089667701cSPekka Enberg 	return kvm_dir;
1099667701cSPekka Enberg }
1109667701cSPekka Enberg 
11143835ac9SSasha Levin static bool kvm__supports_extension(struct kvm *kvm, unsigned int extension)
112b8f6afcdSPekka Enberg {
11328fa19c0SPekka Enberg 	int ret;
114b8f6afcdSPekka Enberg 
11543835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, extension);
1164076b041SPekka Enberg 	if (ret < 0)
1174076b041SPekka Enberg 		return false;
1184076b041SPekka Enberg 
1194076b041SPekka Enberg 	return ret;
1204076b041SPekka Enberg }
1214076b041SPekka Enberg 
12243835ac9SSasha Levin static int kvm__check_extensions(struct kvm *kvm)
12355e19624SCyrill Gorcunov {
12455e19624SCyrill Gorcunov 	unsigned int i;
12555e19624SCyrill Gorcunov 
12655e19624SCyrill Gorcunov 	for (i = 0; i < ARRAY_SIZE(kvm_req_ext); i++) {
12743835ac9SSasha Levin 		if (!kvm__supports_extension(kvm, kvm_req_ext[i].code)) {
1284542f276SCyrill Gorcunov 			pr_error("Unsuppored KVM extension detected: %s",
12955e19624SCyrill Gorcunov 				kvm_req_ext[i].name);
13055e19624SCyrill Gorcunov 			return (int)-i;
13155e19624SCyrill Gorcunov 		}
13255e19624SCyrill Gorcunov 	}
13355e19624SCyrill Gorcunov 
13455e19624SCyrill Gorcunov 	return 0;
13555e19624SCyrill Gorcunov }
13655e19624SCyrill Gorcunov 
1374076b041SPekka Enberg static struct kvm *kvm__new(void)
1384076b041SPekka Enberg {
13943835ac9SSasha Levin 	struct kvm *kvm = calloc(1, sizeof *kvm);
1404076b041SPekka Enberg 
14143835ac9SSasha Levin 	if (!kvm)
1424076b041SPekka Enberg 		die("out of memory");
1434076b041SPekka Enberg 
14443835ac9SSasha Levin 	return kvm;
1454076b041SPekka Enberg }
1464076b041SPekka Enberg 
1474b1addaeSSasha Levin static int kvm__create_socket(struct kvm *kvm)
1485358b0e6SSasha Levin {
1494b1addaeSSasha Levin 	char full_name[PATH_MAX];
1504b1addaeSSasha Levin 	unsigned int s;
1514b1addaeSSasha Levin 	struct sockaddr_un local;
1524b1addaeSSasha Levin 	int len, r;
1535358b0e6SSasha Levin 
1545358b0e6SSasha Levin 	if (!kvm->name)
1554b1addaeSSasha Levin 		return -1;
1565358b0e6SSasha Levin 
1579667701cSPekka Enberg 	sprintf(full_name, "%s", kvm__get_dir());
158c71efd96SSasha Levin 	mkdir(full_name, 0777);
1594b1addaeSSasha Levin 	sprintf(full_name, "%s/%s.sock", kvm__get_dir(), kvm->name);
160*fa0022d2SSasha Levin 	if (access(full_name, F_OK) == 0)
161*fa0022d2SSasha Levin 		die("Socket file %s already exist", full_name);
162*fa0022d2SSasha Levin 
1634b1addaeSSasha Levin 	s = socket(AF_UNIX, SOCK_STREAM, 0);
1644b1addaeSSasha Levin 	if (s < 0)
1654b1addaeSSasha Levin 		return s;
1664b1addaeSSasha Levin 	local.sun_family = AF_UNIX;
1674b1addaeSSasha Levin 	strcpy(local.sun_path, full_name);
1684b1addaeSSasha Levin 	unlink(local.sun_path);
1694b1addaeSSasha Levin 	len = strlen(local.sun_path) + sizeof(local.sun_family);
1704b1addaeSSasha Levin 	r = bind(s, (struct sockaddr *)&local, len);
1714b1addaeSSasha Levin 	if (r < 0)
1724b1addaeSSasha Levin 		goto fail;
1734b1addaeSSasha Levin 
1744b1addaeSSasha Levin 	r = listen(s, 5);
1754b1addaeSSasha Levin 	if (r < 0)
1764b1addaeSSasha Levin 		goto fail;
1774b1addaeSSasha Levin 
1784b1addaeSSasha Levin 	return s;
1794b1addaeSSasha Levin 
1804b1addaeSSasha Levin fail:
1814b1addaeSSasha Levin 	close(s);
1824b1addaeSSasha Levin 	return -1;
1835358b0e6SSasha Levin }
1845358b0e6SSasha Levin 
1854b1addaeSSasha Levin void kvm__remove_socket(const char *name)
1865358b0e6SSasha Levin {
1875358b0e6SSasha Levin 	char full_name[PATH_MAX];
1885358b0e6SSasha Levin 
1894b1addaeSSasha Levin 	sprintf(full_name, "%s/%s.sock", kvm__get_dir(), name);
1905358b0e6SSasha Levin 	unlink(full_name);
1915358b0e6SSasha Levin }
1925358b0e6SSasha Levin 
1934b1addaeSSasha Levin int kvm__get_sock_by_instance(const char *name)
1945358b0e6SSasha Levin {
1954b1addaeSSasha Levin 	int s, len, r;
1964b1addaeSSasha Levin 	char sock_file[PATH_MAX];
1974b1addaeSSasha Levin 	struct sockaddr_un local;
1985358b0e6SSasha Levin 
1994b1addaeSSasha Levin 	sprintf(sock_file, "%s/%s.sock", kvm__get_dir(), name);
2004b1addaeSSasha Levin 	s = socket(AF_UNIX, SOCK_STREAM, 0);
2015358b0e6SSasha Levin 
2024b1addaeSSasha Levin 	local.sun_family = AF_UNIX;
2034b1addaeSSasha Levin 	strcpy(local.sun_path, sock_file);
2044b1addaeSSasha Levin 	len = strlen(local.sun_path) + sizeof(local.sun_family);
2055358b0e6SSasha Levin 
2064b1addaeSSasha Levin 	r = connect(s, &local, len);
2074b1addaeSSasha Levin 	if (r < 0)
2084b1addaeSSasha Levin 		die("Failed connecting to instance");
2095358b0e6SSasha Levin 
2104b1addaeSSasha Levin 	return s;
2115358b0e6SSasha Levin }
2125358b0e6SSasha Levin 
2134b1addaeSSasha Levin int kvm__enumerate_instances(int (*callback)(const char *name, int fd))
21463bc8503SSasha Levin {
21563bc8503SSasha Levin 	char full_name[PATH_MAX];
2164b1addaeSSasha Levin 	int sock;
21763bc8503SSasha Levin 	DIR *dir;
21863bc8503SSasha Levin 	struct dirent entry, *result;
219886af5f2SLiming Wang 	int ret = 0;
22063bc8503SSasha Levin 
2219667701cSPekka Enberg 	sprintf(full_name, "%s", kvm__get_dir());
22263bc8503SSasha Levin 	dir = opendir(full_name);
22363bc8503SSasha Levin 
224f2e556f3SKonstantin Khlebnikov 	while (dir != NULL) {
22563bc8503SSasha Levin 		readdir_r(dir, &entry, &result);
22663bc8503SSasha Levin 		if (result == NULL)
22763bc8503SSasha Levin 			break;
2284b1addaeSSasha Levin 		if (entry.d_type == DT_SOCK) {
2294b1addaeSSasha Levin 			entry.d_name[strlen(entry.d_name)-5] = 0;
2304b1addaeSSasha Levin 			sock = kvm__get_sock_by_instance(entry.d_name);
2314b1addaeSSasha Levin 			ret = callback(entry.d_name, sock);
2324b1addaeSSasha Levin 			close(sock);
233886af5f2SLiming Wang 			if (ret < 0)
234886af5f2SLiming Wang 				break;
23563bc8503SSasha Levin 		}
23663bc8503SSasha Levin 	}
23763bc8503SSasha Levin 
2381a0ef251SSasha Levin 	closedir(dir);
2391a0ef251SSasha Levin 
240886af5f2SLiming Wang 	return ret;
24163bc8503SSasha Levin }
24263bc8503SSasha Levin 
24343835ac9SSasha Levin void kvm__delete(struct kvm *kvm)
2449ef4c68eSPekka Enberg {
24543835ac9SSasha Levin 	kvm__stop_timer(kvm);
246fbfe68b7SSasha Levin 
24743835ac9SSasha Levin 	munmap(kvm->ram_start, kvm->ram_size);
248c733c80bSSasha Levin 	kvm_ipc__stop();
2494b1addaeSSasha Levin 	kvm__remove_socket(kvm->name);
25043835ac9SSasha Levin 	free(kvm);
2519ef4c68eSPekka Enberg }
2529ef4c68eSPekka Enberg 
253c78b8713SAsias He static bool kvm__cpu_supports_vm(void)
254c78b8713SAsias He {
255c78b8713SAsias He 	struct cpuid_regs regs;
2563fdf659dSSasha Levin 	u32 eax_base;
257831fbf23SPekka Enberg 	int feature;
258c78b8713SAsias He 
259c78b8713SAsias He 	regs	= (struct cpuid_regs) {
260831fbf23SPekka Enberg 		.eax		= 0x00,
261c78b8713SAsias He 	};
262c78b8713SAsias He 	host_cpuid(&regs);
263c78b8713SAsias He 
264ae87afbfSCyrill Gorcunov 	switch (regs.ebx) {
265ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_INTEL_1:
266831fbf23SPekka Enberg 		eax_base	= 0x00;
267831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_VMX;
268ae87afbfSCyrill Gorcunov 		break;
26934649df9SPekka Enberg 
270ae87afbfSCyrill Gorcunov 	case CPUID_VENDOR_AMD_1:
271831fbf23SPekka Enberg 		eax_base	= 0x80000000;
272831fbf23SPekka Enberg 		feature		= KVM__X86_FEATURE_SVM;
273ae87afbfSCyrill Gorcunov 		break;
27434649df9SPekka Enberg 
27534649df9SPekka Enberg 	default:
27634649df9SPekka Enberg 		return false;
277ae87afbfSCyrill Gorcunov 	}
278ae87afbfSCyrill Gorcunov 
279831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
280831fbf23SPekka Enberg 		.eax		= eax_base,
281831fbf23SPekka Enberg 	};
282831fbf23SPekka Enberg 	host_cpuid(&regs);
283831fbf23SPekka Enberg 
284831fbf23SPekka Enberg 	if (regs.eax < eax_base + 0x01)
285831fbf23SPekka Enberg 		return false;
286831fbf23SPekka Enberg 
287831fbf23SPekka Enberg 	regs	= (struct cpuid_regs) {
288831fbf23SPekka Enberg 		.eax		= eax_base + 0x01
289831fbf23SPekka Enberg 	};
290831fbf23SPekka Enberg 	host_cpuid(&regs);
291831fbf23SPekka Enberg 
292831fbf23SPekka Enberg 	return regs.ecx & (1 << feature);
293c78b8713SAsias He }
294c78b8713SAsias He 
29596feb589SPekka Enberg /*
29696feb589SPekka Enberg  * Note: KVM_SET_USER_MEMORY_REGION assumes that we don't pass overlapping
29796feb589SPekka Enberg  * memory regions to it. Therefore, be careful if you use this function for
29896feb589SPekka Enberg  * registering memory regions for emulating hardware.
29996feb589SPekka Enberg  */
30096feb589SPekka Enberg void kvm__register_mem(struct kvm *kvm, u64 guest_phys, u64 size, void *userspace_addr)
3014076b041SPekka Enberg {
3022b0e3342SPekka Enberg 	struct kvm_userspace_memory_region mem;
303839051d9SSasha Levin 	int ret;
304839051d9SSasha Levin 
305839051d9SSasha Levin 	mem = (struct kvm_userspace_memory_region) {
30696feb589SPekka Enberg 		.slot			= kvm->mem_slots++,
307874467f8SSasha Levin 		.guest_phys_addr	= guest_phys,
308874467f8SSasha Levin 		.memory_size		= size,
309c4acb611SIngo Molnar 		.userspace_addr		= (unsigned long)userspace_addr,
310839051d9SSasha Levin 	};
311839051d9SSasha Levin 
312874467f8SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem);
313839051d9SSasha Levin 	if (ret < 0)
314839051d9SSasha Levin 		die_perror("KVM_SET_USER_MEMORY_REGION ioctl");
315839051d9SSasha Levin }
316839051d9SSasha Levin 
317874467f8SSasha Levin /*
318874467f8SSasha Levin  * Allocating RAM size bigger than 4GB requires us to leave a gap
319874467f8SSasha Levin  * in the RAM which is used for PCI MMIO, hotplug, and unconfigured
320874467f8SSasha Levin  * devices (see documentation of e820_setup_gap() for details).
321874467f8SSasha Levin  *
322874467f8SSasha Levin  * If we're required to initialize RAM bigger than 4GB, we will create
323874467f8SSasha Levin  * a gap between 0xe0000000 and 0x100000000 in the guest virtual mem space.
324874467f8SSasha Levin  */
325874467f8SSasha Levin 
32643835ac9SSasha Levin void kvm__init_ram(struct kvm *kvm)
327874467f8SSasha Levin {
328874467f8SSasha Levin 	u64	phys_start, phys_size;
329874467f8SSasha Levin 	void	*host_mem;
330874467f8SSasha Levin 
33143835ac9SSasha Levin 	if (kvm->ram_size < KVM_32BIT_GAP_START) {
332874467f8SSasha Levin 		/* Use a single block of RAM for 32bit RAM */
333874467f8SSasha Levin 
334874467f8SSasha Levin 		phys_start = 0;
33543835ac9SSasha Levin 		phys_size  = kvm->ram_size;
33643835ac9SSasha Levin 		host_mem   = kvm->ram_start;
337874467f8SSasha Levin 
33896feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
339874467f8SSasha Levin 	} else {
340874467f8SSasha Levin 		/* First RAM range from zero to the PCI gap: */
341874467f8SSasha Levin 
342874467f8SSasha Levin 		phys_start = 0;
343874467f8SSasha Levin 		phys_size  = KVM_32BIT_GAP_START;
34443835ac9SSasha Levin 		host_mem   = kvm->ram_start;
345874467f8SSasha Levin 
34696feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
347874467f8SSasha Levin 
348874467f8SSasha Levin 		/* Second RAM range from 4GB to the end of RAM: */
349874467f8SSasha Levin 
350874467f8SSasha Levin 		phys_start = 0x100000000ULL;
35143835ac9SSasha Levin 		phys_size  = kvm->ram_size - phys_size;
35243835ac9SSasha Levin 		host_mem   = kvm->ram_start + phys_start;
353874467f8SSasha Levin 
35496feb589SPekka Enberg 		kvm__register_mem(kvm, phys_start, phys_size, host_mem);
355874467f8SSasha Levin 	}
356874467f8SSasha Levin }
357874467f8SSasha Levin 
3588259b8ccSSasha Levin int kvm__recommended_cpus(struct kvm *kvm)
359384922b3SPekka Enberg {
360384922b3SPekka Enberg 	int ret;
361384922b3SPekka Enberg 
36243835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
3638259b8ccSSasha Levin 	if (ret <= 0)
364384922b3SPekka Enberg 		die_perror("KVM_CAP_NR_VCPUS");
365384922b3SPekka Enberg 
366384922b3SPekka Enberg 	return ret;
367384922b3SPekka Enberg }
368384922b3SPekka Enberg 
3694b1addaeSSasha Levin static void kvm__pid(int fd, u32 type, u32 len, u8 *msg)
3704b1addaeSSasha Levin {
3714b1addaeSSasha Levin 	pid_t pid = getpid();
3724b1addaeSSasha Levin 	int r = 0;
3734b1addaeSSasha Levin 
3744b1addaeSSasha Levin 	if (type == KVM_IPC_PID)
3754b1addaeSSasha Levin 		r = write(fd, &pid, sizeof(pid));
3764b1addaeSSasha Levin 
3774b1addaeSSasha Levin 	if (r < 0)
3784b1addaeSSasha Levin 		pr_warning("Failed sending PID");
3794b1addaeSSasha Levin }
3804b1addaeSSasha Levin 
3818259b8ccSSasha Levin /*
3828259b8ccSSasha Levin  * The following hack should be removed once 'x86: Raise the hard
3838259b8ccSSasha Levin  * VCPU count limit' makes it's way into the mainline.
3848259b8ccSSasha Levin  */
3858259b8ccSSasha Levin #ifndef KVM_CAP_MAX_VCPUS
3868259b8ccSSasha Levin #define KVM_CAP_MAX_VCPUS 66
3878259b8ccSSasha Levin #endif
3888259b8ccSSasha Levin 
3898259b8ccSSasha Levin int kvm__max_cpus(struct kvm *kvm)
3908259b8ccSSasha Levin {
3918259b8ccSSasha Levin 	int ret;
3928259b8ccSSasha Levin 
3938259b8ccSSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS);
3948259b8ccSSasha Levin 	if (ret <= 0)
3958259b8ccSSasha Levin 		ret = kvm__recommended_cpus(kvm);
3968259b8ccSSasha Levin 
3978259b8ccSSasha Levin 	return ret;
3988259b8ccSSasha Levin }
3998259b8ccSSasha Levin 
4005358b0e6SSasha Levin struct kvm *kvm__init(const char *kvm_dev, u64 ram_size, const char *name)
401839051d9SSasha Levin {
4029687927dSAsias He 	struct kvm_pit_config pit_config = { .flags = 0, };
40343835ac9SSasha Levin 	struct kvm *kvm;
4044076b041SPekka Enberg 	int ret;
4054076b041SPekka Enberg 
406c78b8713SAsias He 	if (!kvm__cpu_supports_vm())
407c78b8713SAsias He 		die("Your CPU does not support hardware virtualization");
408c78b8713SAsias He 
40943835ac9SSasha Levin 	kvm = kvm__new();
4104076b041SPekka Enberg 
41143835ac9SSasha Levin 	kvm->sys_fd = open(kvm_dev, O_RDWR);
41243835ac9SSasha Levin 	if (kvm->sys_fd < 0) {
4136d7c36ceSPekka Enberg 		if (errno == ENOENT)
414e907b83fSPekka Enberg 			die("'%s' not found. Please make sure your kernel has CONFIG_KVM enabled and that the KVM modules are loaded.", kvm_dev);
415f8334800SIngo Molnar 		if (errno == ENODEV)
416f8334800SIngo Molnar 			die("'%s' KVM driver not available.\n  # (If the KVM module is loaded then 'dmesg' may offer further clues about the failure.)", kvm_dev);
4176d7c36ceSPekka Enberg 
418f8334800SIngo Molnar 		fprintf(stderr, "  Fatal, could not open %s: ", kvm_dev);
419f8334800SIngo Molnar 		perror(NULL);
420f8334800SIngo Molnar 		exit(1);
4216d7c36ceSPekka Enberg 	}
422b8f6afcdSPekka Enberg 
42343835ac9SSasha Levin 	ret = ioctl(kvm->sys_fd, KVM_GET_API_VERSION, 0);
4246c7d8514SPekka Enberg 	if (ret != KVM_API_VERSION)
425f5ab5f67SPekka Enberg 		die_perror("KVM_API_VERSION ioctl");
4266c7d8514SPekka Enberg 
42743835ac9SSasha Levin 	kvm->vm_fd = ioctl(kvm->sys_fd, KVM_CREATE_VM, 0);
42843835ac9SSasha Levin 	if (kvm->vm_fd < 0)
429f5ab5f67SPekka Enberg 		die_perror("KVM_CREATE_VM ioctl");
43028fa19c0SPekka Enberg 
43143835ac9SSasha Levin 	if (kvm__check_extensions(kvm))
43255e19624SCyrill Gorcunov 		die("A required KVM extention is not supported by OS");
4339687927dSAsias He 
43443835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000);
4359687927dSAsias He 	if (ret < 0)
4369687927dSAsias He 		die_perror("KVM_SET_TSS_ADDR ioctl");
4379687927dSAsias He 
43843835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_CREATE_PIT2, &pit_config);
4399687927dSAsias He 	if (ret < 0)
4409687927dSAsias He 		die_perror("KVM_CREATE_PIT2 ioctl");
4419687927dSAsias He 
44243835ac9SSasha Levin 	kvm->ram_size		= ram_size;
4430d1f17ecSPekka Enberg 
44443835ac9SSasha Levin 	if (kvm->ram_size < KVM_32BIT_GAP_START) {
44537c34ca8SSasha Levin 		kvm->ram_start = mmap(NULL, ram_size, PROT_RW, MAP_ANON_NORESERVE, -1, 0);
446874467f8SSasha Levin 	} else {
44737c34ca8SSasha Levin 		kvm->ram_start = mmap(NULL, ram_size + KVM_32BIT_GAP_SIZE, PROT_RW, MAP_ANON_NORESERVE, -1, 0);
44843835ac9SSasha Levin 		if (kvm->ram_start != MAP_FAILED) {
449874467f8SSasha Levin 			/*
450874467f8SSasha Levin 			 * We mprotect the gap (see kvm__init_ram() for details) PROT_NONE so that
451874467f8SSasha Levin 			 * if we accidently write to it, we will know.
452874467f8SSasha Levin 			 */
45343835ac9SSasha Levin 			mprotect(kvm->ram_start + KVM_32BIT_GAP_START, KVM_32BIT_GAP_SIZE, PROT_NONE);
454874467f8SSasha Levin 		}
455874467f8SSasha Levin 	}
45643835ac9SSasha Levin 	if (kvm->ram_start == MAP_FAILED)
4570d1f17ecSPekka Enberg 		die("out of memory");
4580d1f17ecSPekka Enberg 
4597f4f39a4SSasha Levin 	madvise(kvm->ram_start, kvm->ram_size, MADV_MERGEABLE);
4607f4f39a4SSasha Levin 
46143835ac9SSasha Levin 	ret = ioctl(kvm->vm_fd, KVM_CREATE_IRQCHIP);
462895c2fefSPekka Enberg 	if (ret < 0)
4639687927dSAsias He 		die_perror("KVM_CREATE_IRQCHIP ioctl");
4649687927dSAsias He 
4655358b0e6SSasha Levin 	kvm->name = name;
4665358b0e6SSasha Levin 
4674b1addaeSSasha Levin 	kvm_ipc__start(kvm__create_socket(kvm));
4684b1addaeSSasha Levin 	kvm_ipc__register_handler(KVM_IPC_PID, kvm__pid);
46943835ac9SSasha Levin 	return kvm;
4704076b041SPekka Enberg }
4714076b041SPekka Enberg 
4725f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR	0x1000
473b08e9ec4SPekka Enberg #define BOOT_LOADER_IP		0x0000
474dbdb74c2SPekka Enberg #define BOOT_LOADER_SP		0x8000
4752dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET	0x20000
4762dd4a4edSCyrill Gorcunov 
4779a4ecdc5SPekka Enberg #define BOOT_PROTOCOL_REQUIRED	0x206
478a43f6460SCyrill Gorcunov #define LOAD_HIGH		0x01
479009b0758SPekka Enberg 
48043835ac9SSasha Levin static int load_flat_binary(struct kvm *kvm, int fd)
481009b0758SPekka Enberg {
482009b0758SPekka Enberg 	void *p;
483009b0758SPekka Enberg 	int nr;
484009b0758SPekka Enberg 
485009b0758SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
486009b0758SPekka Enberg 		die_perror("lseek");
487009b0758SPekka Enberg 
48843835ac9SSasha Levin 	p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
489009b0758SPekka Enberg 
490009b0758SPekka Enberg 	while ((nr = read(fd, p, 65536)) > 0)
491009b0758SPekka Enberg 		p += nr;
492009b0758SPekka Enberg 
49343835ac9SSasha Levin 	kvm->boot_selector	= BOOT_LOADER_SELECTOR;
49443835ac9SSasha Levin 	kvm->boot_ip		= BOOT_LOADER_IP;
49543835ac9SSasha Levin 	kvm->boot_sp		= BOOT_LOADER_SP;
496edc8a14dSPekka Enberg 
4977fb218bdSPekka Enberg 	return true;
498009b0758SPekka Enberg }
499009b0758SPekka Enberg 
500ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC	= "HdrS";
501ae1fae34SPekka Enberg 
50243835ac9SSasha Levin static bool load_bzimage(struct kvm *kvm, int fd_kernel,
50353861c74SJohn Floren 			int fd_initrd, const char *kernel_cmdline, u16 vidmode)
504ae1fae34SPekka Enberg {
505b9271160SPekka Enberg 	struct boot_params *kern_boot;
5064b62331fSPekka Enberg 	unsigned long setup_sects;
507b9271160SPekka Enberg 	struct boot_params boot;
5082dd4a4edSCyrill Gorcunov 	size_t cmdline_size;
5097fb218bdSPekka Enberg 	ssize_t setup_size;
51022489bb0SCyrill Gorcunov 	void *p;
511ae1fae34SPekka Enberg 	int nr;
512ae1fae34SPekka Enberg 
5135d67eaf6SPekka Enberg 	/*
5145d67eaf6SPekka Enberg 	 * See Documentation/x86/boot.txt for details no bzImage on-disk and
5155d67eaf6SPekka Enberg 	 * memory layout.
5165d67eaf6SPekka Enberg 	 */
5175d67eaf6SPekka Enberg 
5182065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
519009b0758SPekka Enberg 		die_perror("lseek");
520009b0758SPekka Enberg 
5210b62d2bbSPekka Enberg 	if (read(fd_kernel, &boot, sizeof(boot)) != sizeof(boot))
5222346d461SPekka Enberg 		return false;
523ae1fae34SPekka Enberg 
5240b62d2bbSPekka Enberg 	if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)))
5257fb218bdSPekka Enberg 		return false;
526ae1fae34SPekka Enberg 
5270ea58e5bSPekka Enberg 	if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED)
5280b62d2bbSPekka Enberg 		die("Too old kernel");
529ad681038SCyrill Gorcunov 
5302065a6f7SCyrill Gorcunov 	if (lseek(fd_kernel, 0, SEEK_SET) < 0)
531e93ab78aSPekka Enberg 		die_perror("lseek");
532e93ab78aSPekka Enberg 
5334cf542bbSCyrill Gorcunov 	if (!boot.hdr.setup_sects)
5344cf542bbSCyrill Gorcunov 		boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS;
53510943d14SPekka Enberg 	setup_sects = boot.hdr.setup_sects + 1;
53610943d14SPekka Enberg 
53754d4a626SPekka Enberg 	setup_size = setup_sects << 9;
53843835ac9SSasha Levin 	p = guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP);
539ae1fae34SPekka Enberg 
5402065a6f7SCyrill Gorcunov 	/* copy setup.bin to mem*/
5412065a6f7SCyrill Gorcunov 	if (read(fd_kernel, p, setup_size) != setup_size)
5427fb218bdSPekka Enberg 		die_perror("read");
5437fb218bdSPekka Enberg 
5442065a6f7SCyrill Gorcunov 	/* copy vmlinux.bin to BZ_KERNEL_START*/
54543835ac9SSasha Levin 	p = guest_flat_to_host(kvm, BZ_KERNEL_START);
546ae1fae34SPekka Enberg 
5472065a6f7SCyrill Gorcunov 	while ((nr = read(fd_kernel, p, 65536)) > 0)
548ae1fae34SPekka Enberg 		p += nr;
549ae1fae34SPekka Enberg 
55043835ac9SSasha Levin 	p = guest_flat_to_host(kvm, BOOT_CMDLINE_OFFSET);
551debcfac0SCyrill Gorcunov 	if (kernel_cmdline) {
552debcfac0SCyrill Gorcunov 		cmdline_size = strlen(kernel_cmdline) + 1;
553debcfac0SCyrill Gorcunov 		if (cmdline_size > boot.hdr.cmdline_size)
554debcfac0SCyrill Gorcunov 			cmdline_size = boot.hdr.cmdline_size;
555ad681038SCyrill Gorcunov 
5562dd4a4edSCyrill Gorcunov 		memset(p, 0, boot.hdr.cmdline_size);
5572dd4a4edSCyrill Gorcunov 		memcpy(p, kernel_cmdline, cmdline_size - 1);
558debcfac0SCyrill Gorcunov 	}
559debcfac0SCyrill Gorcunov 
56043835ac9SSasha Levin 	kern_boot	= guest_real_to_host(kvm, BOOT_LOADER_SELECTOR, 0x00);
561a43f6460SCyrill Gorcunov 
562b9271160SPekka Enberg 	kern_boot->hdr.cmd_line_ptr	= BOOT_CMDLINE_OFFSET;
563b9271160SPekka Enberg 	kern_boot->hdr.type_of_loader	= 0xff;
564b9271160SPekka Enberg 	kern_boot->hdr.heap_end_ptr	= 0xfe00;
565b9271160SPekka Enberg 	kern_boot->hdr.loadflags	|= CAN_USE_HEAP;
56653861c74SJohn Floren 	kern_boot->hdr.vid_mode		= vidmode;
567a43f6460SCyrill Gorcunov 
5682065a6f7SCyrill Gorcunov 	/*
5692065a6f7SCyrill Gorcunov 	 * Read initrd image into guest memory
5702065a6f7SCyrill Gorcunov 	 */
5712065a6f7SCyrill Gorcunov 	if (fd_initrd >= 0) {
5722065a6f7SCyrill Gorcunov 		struct stat initrd_stat;
5732065a6f7SCyrill Gorcunov 		unsigned long addr;
5742065a6f7SCyrill Gorcunov 
5752065a6f7SCyrill Gorcunov 		if (fstat(fd_initrd, &initrd_stat))
5762065a6f7SCyrill Gorcunov 			die_perror("fstat");
5772065a6f7SCyrill Gorcunov 
5782065a6f7SCyrill Gorcunov 		addr = boot.hdr.initrd_addr_max & ~0xfffff;
5792065a6f7SCyrill Gorcunov 		for (;;) {
5802065a6f7SCyrill Gorcunov 			if (addr < BZ_KERNEL_START)
5812065a6f7SCyrill Gorcunov 				die("Not enough memory for initrd");
58243835ac9SSasha Levin 			else if (addr < (kvm->ram_size - initrd_stat.st_size))
5832065a6f7SCyrill Gorcunov 				break;
5842065a6f7SCyrill Gorcunov 			addr -= 0x100000;
5852065a6f7SCyrill Gorcunov 		}
5862065a6f7SCyrill Gorcunov 
58743835ac9SSasha Levin 		p = guest_flat_to_host(kvm, addr);
5882065a6f7SCyrill Gorcunov 		nr = read(fd_initrd, p, initrd_stat.st_size);
5892065a6f7SCyrill Gorcunov 		if (nr != initrd_stat.st_size)
5902065a6f7SCyrill Gorcunov 			die("Failed to read initrd");
5912065a6f7SCyrill Gorcunov 
5922065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_image	= addr;
5932065a6f7SCyrill Gorcunov 		kern_boot->hdr.ramdisk_size	= initrd_stat.st_size;
5942065a6f7SCyrill Gorcunov 	}
5952065a6f7SCyrill Gorcunov 
59643835ac9SSasha Levin 	kvm->boot_selector	= BOOT_LOADER_SELECTOR;
597edc8a14dSPekka Enberg 	/*
598edc8a14dSPekka Enberg 	 * The real-mode setup code starts at offset 0x200 of a bzImage. See
599edc8a14dSPekka Enberg 	 * Documentation/x86/boot.txt for details.
600edc8a14dSPekka Enberg 	 */
60143835ac9SSasha Levin 	kvm->boot_ip		= BOOT_LOADER_IP + 0x200;
60243835ac9SSasha Levin 	kvm->boot_sp		= BOOT_LOADER_SP;
603edc8a14dSPekka Enberg 
6047fb218bdSPekka Enberg 	return true;
605ae1fae34SPekka Enberg }
606ae1fae34SPekka Enberg 
60772811558SPekka Enberg /* RFC 1952 */
60872811558SPekka Enberg #define GZIP_ID1		0x1f
60972811558SPekka Enberg #define GZIP_ID2		0x8b
61072811558SPekka Enberg 
61172811558SPekka Enberg static bool initrd_check(int fd)
61272811558SPekka Enberg {
61372811558SPekka Enberg 	unsigned char id[2];
61472811558SPekka Enberg 
61572811558SPekka Enberg 	if (read_in_full(fd, id, ARRAY_SIZE(id)) < 0)
61672811558SPekka Enberg 		return false;
61772811558SPekka Enberg 
61872811558SPekka Enberg 	if (lseek(fd, 0, SEEK_SET) < 0)
61972811558SPekka Enberg 		die_perror("lseek");
62072811558SPekka Enberg 
62172811558SPekka Enberg 	return id[0] == GZIP_ID1 && id[1] == GZIP_ID2;
62272811558SPekka Enberg }
62372811558SPekka Enberg 
6246d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename,
62553861c74SJohn Floren 		const char *initrd_filename, const char *kernel_cmdline, u16 vidmode)
626ae1fae34SPekka Enberg {
6277fb218bdSPekka Enberg 	bool ret;
6282065a6f7SCyrill Gorcunov 	int fd_kernel = -1, fd_initrd = -1;
629ae1fae34SPekka Enberg 
6302065a6f7SCyrill Gorcunov 	fd_kernel = open(kernel_filename, O_RDONLY);
6312065a6f7SCyrill Gorcunov 	if (fd_kernel < 0)
6320b62d2bbSPekka Enberg 		die("Unable to open kernel %s", kernel_filename);
633ae1fae34SPekka Enberg 
6342065a6f7SCyrill Gorcunov 	if (initrd_filename) {
6352065a6f7SCyrill Gorcunov 		fd_initrd = open(initrd_filename, O_RDONLY);
6362065a6f7SCyrill Gorcunov 		if (fd_initrd < 0)
6370b62d2bbSPekka Enberg 			die("Unable to open initrd %s", initrd_filename);
63872811558SPekka Enberg 
63972811558SPekka Enberg 		if (!initrd_check(fd_initrd))
64072811558SPekka Enberg 			die("%s is not an initrd", initrd_filename);
6412065a6f7SCyrill Gorcunov 	}
6422065a6f7SCyrill Gorcunov 
64353861c74SJohn Floren 	ret = load_bzimage(kvm, fd_kernel, fd_initrd, kernel_cmdline, vidmode);
64428972750SCyrill Gorcunov 
64528972750SCyrill Gorcunov 	if (initrd_filename)
64628972750SCyrill Gorcunov 		close(fd_initrd);
64728972750SCyrill Gorcunov 
648009b0758SPekka Enberg 	if (ret)
649009b0758SPekka Enberg 		goto found_kernel;
650ae1fae34SPekka Enberg 
6514542f276SCyrill Gorcunov 	pr_warning("%s is not a bzImage. Trying to load it as a flat binary...", kernel_filename);
6520b62d2bbSPekka Enberg 
6532065a6f7SCyrill Gorcunov 	ret = load_flat_binary(kvm, fd_kernel);
654009b0758SPekka Enberg 	if (ret)
655009b0758SPekka Enberg 		goto found_kernel;
656009b0758SPekka Enberg 
6575a6ac675SSasha Levin 	close(fd_kernel);
6585a6ac675SSasha Levin 
659009b0758SPekka Enberg 	die("%s is not a valid bzImage or flat binary", kernel_filename);
660009b0758SPekka Enberg 
661009b0758SPekka Enberg found_kernel:
6625a6ac675SSasha Levin 	close(fd_kernel);
6635a6ac675SSasha Levin 
664ae1fae34SPekka Enberg 	return ret;
665ae1fae34SPekka Enberg }
666ae1fae34SPekka Enberg 
667b3594ec7SCyrill Gorcunov /**
668b3594ec7SCyrill Gorcunov  * kvm__setup_bios - inject BIOS into guest system memory
66943835ac9SSasha Levin  * @kvm - guest system descriptor
670b3594ec7SCyrill Gorcunov  *
671b3594ec7SCyrill Gorcunov  * This function is a main routine where we poke guest memory
672b3594ec7SCyrill Gorcunov  * and install BIOS there.
673b3594ec7SCyrill Gorcunov  */
67443835ac9SSasha Levin void kvm__setup_bios(struct kvm *kvm)
6752f3976eeSPekka Enberg {
676b3594ec7SCyrill Gorcunov 	/* standart minimal configuration */
67743835ac9SSasha Levin 	setup_bios(kvm);
6782f3976eeSPekka Enberg 
679b3594ec7SCyrill Gorcunov 	/* FIXME: SMP, ACPI and friends here */
6800c7c14a7SCyrill Gorcunov 
6810c7c14a7SCyrill Gorcunov 	/* MP table */
68243835ac9SSasha Levin 	mptable_setup(kvm, kvm->nrcpus);
6832f3976eeSPekka Enberg }
6842f3976eeSPekka Enberg 
685ce79f1caSPekka Enberg #define TIMER_INTERVAL_NS 1000000	/* 1 msec */
686ce79f1caSPekka Enberg 
687ce79f1caSPekka Enberg /*
688ce79f1caSPekka Enberg  * This function sets up a timer that's used to inject interrupts from the
689ce79f1caSPekka Enberg  * userspace hypervisor into the guest at periodical intervals. Please note
690ce79f1caSPekka Enberg  * that clock interrupt, for example, is not handled here.
691ce79f1caSPekka Enberg  */
69243835ac9SSasha Levin void kvm__start_timer(struct kvm *kvm)
693ce79f1caSPekka Enberg {
694ce79f1caSPekka Enberg 	struct itimerspec its;
695ce79f1caSPekka Enberg 	struct sigevent sev;
696ce79f1caSPekka Enberg 
697ce79f1caSPekka Enberg 	memset(&sev, 0, sizeof(struct sigevent));
698ce79f1caSPekka Enberg 	sev.sigev_value.sival_int	= 0;
699c7828731SSasha Levin 	sev.sigev_notify		= SIGEV_THREAD_ID;
700ce79f1caSPekka Enberg 	sev.sigev_signo			= SIGALRM;
701c7828731SSasha Levin 	sev._sigev_un._tid		= syscall(__NR_gettid);
702ce79f1caSPekka Enberg 
70343835ac9SSasha Levin 	if (timer_create(CLOCK_REALTIME, &sev, &kvm->timerid) < 0)
704ce79f1caSPekka Enberg 		die("timer_create()");
705ce79f1caSPekka Enberg 
706ce79f1caSPekka Enberg 	its.it_value.tv_sec		= TIMER_INTERVAL_NS / 1000000000;
707ce79f1caSPekka Enberg 	its.it_value.tv_nsec		= TIMER_INTERVAL_NS % 1000000000;
708ce79f1caSPekka Enberg 	its.it_interval.tv_sec		= its.it_value.tv_sec;
709ce79f1caSPekka Enberg 	its.it_interval.tv_nsec		= its.it_value.tv_nsec;
710ce79f1caSPekka Enberg 
71143835ac9SSasha Levin 	if (timer_settime(kvm->timerid, 0, &its, NULL) < 0)
712ce79f1caSPekka Enberg 		die("timer_settime()");
713ce79f1caSPekka Enberg }
714ce79f1caSPekka Enberg 
71543835ac9SSasha Levin void kvm__stop_timer(struct kvm *kvm)
716fbfe68b7SSasha Levin {
71743835ac9SSasha Levin 	if (kvm->timerid)
71843835ac9SSasha Levin 		if (timer_delete(kvm->timerid) < 0)
719fbfe68b7SSasha Levin 			die("timer_delete()");
720fbfe68b7SSasha Levin 
72143835ac9SSasha Levin 	kvm->timerid = 0;
722fbfe68b7SSasha Levin }
723fbfe68b7SSasha Levin 
72443835ac9SSasha Levin void kvm__irq_line(struct kvm *kvm, int irq, int level)
7258b1ff07eSPekka Enberg {
7268b1ff07eSPekka Enberg 	struct kvm_irq_level irq_level;
7278b1ff07eSPekka Enberg 
7288b1ff07eSPekka Enberg 	irq_level	= (struct kvm_irq_level) {
7298b1ff07eSPekka Enberg 		{
7308b1ff07eSPekka Enberg 			.irq		= irq,
7318b1ff07eSPekka Enberg 		},
7328b1ff07eSPekka Enberg 		.level		= level,
7338b1ff07eSPekka Enberg 	};
7348b1ff07eSPekka Enberg 
73543835ac9SSasha Levin 	if (ioctl(kvm->vm_fd, KVM_IRQ_LINE, &irq_level) < 0)
7368b1ff07eSPekka Enberg 		die_perror("KVM_IRQ_LINE failed");
7378b1ff07eSPekka Enberg }
7388b1ff07eSPekka Enberg 
739bfaed61cSSasha Levin void kvm__irq_trigger(struct kvm *kvm, int irq)
740bfaed61cSSasha Levin {
741bfaed61cSSasha Levin 	kvm__irq_line(kvm, irq, 1);
742bfaed61cSSasha Levin 	kvm__irq_line(kvm, irq, 0);
743bfaed61cSSasha Levin }
744bfaed61cSSasha Levin 
74543835ac9SSasha Levin void kvm__dump_mem(struct kvm *kvm, unsigned long addr, unsigned long size)
746090f898eSCyrill Gorcunov {
747090f898eSCyrill Gorcunov 	unsigned char *p;
748090f898eSCyrill Gorcunov 	unsigned long n;
749090f898eSCyrill Gorcunov 
750090f898eSCyrill Gorcunov 	size &= ~7; /* mod 8 */
751090f898eSCyrill Gorcunov 	if (!size)
752090f898eSCyrill Gorcunov 		return;
753090f898eSCyrill Gorcunov 
75443835ac9SSasha Levin 	p = guest_flat_to_host(kvm, addr);
755090f898eSCyrill Gorcunov 
75648cf3877SPekka Enberg 	for (n = 0; n < size; n += 8) {
75743835ac9SSasha Levin 		if (!host_ptr_in_ram(kvm, p + n))
75848cf3877SPekka Enberg 			break;
75948cf3877SPekka Enberg 
760090f898eSCyrill Gorcunov 		printf("  0x%08lx: %02x %02x %02x %02x  %02x %02x %02x %02x\n",
761090f898eSCyrill Gorcunov 			addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3],
762090f898eSCyrill Gorcunov 				  p[n + 4], p[n + 5], p[n + 6], p[n + 7]);
763090f898eSCyrill Gorcunov 	}
76448cf3877SPekka Enberg }
7654298ddadSSasha Levin 
7664298ddadSSasha Levin void kvm__pause(void)
7674298ddadSSasha Levin {
7684298ddadSSasha Levin 	int i, paused_vcpus = 0;
7694298ddadSSasha Levin 
7704298ddadSSasha Levin 	/* Check if the guest is running */
7714298ddadSSasha Levin 	if (!kvm_cpus[0] || kvm_cpus[0]->thread == 0)
7724298ddadSSasha Levin 		return;
7734298ddadSSasha Levin 
7744298ddadSSasha Levin 	mutex_lock(&pause_lock);
7754298ddadSSasha Levin 
7764298ddadSSasha Levin 	pause_event = eventfd(0, 0);
7774298ddadSSasha Levin 	if (pause_event < 0)
7784298ddadSSasha Levin 		die("Failed creating pause notification event");
7794298ddadSSasha Levin 	for (i = 0; i < kvm->nrcpus; i++)
7804298ddadSSasha Levin 		pthread_kill(kvm_cpus[i]->thread, SIGKVMPAUSE);
7814298ddadSSasha Levin 
7824298ddadSSasha Levin 	while (paused_vcpus < kvm->nrcpus) {
7834298ddadSSasha Levin 		u64 cur_read;
7844298ddadSSasha Levin 
7854298ddadSSasha Levin 		if (read(pause_event, &cur_read, sizeof(cur_read)) < 0)
7864298ddadSSasha Levin 			die("Failed reading pause event");
7874298ddadSSasha Levin 		paused_vcpus += cur_read;
7884298ddadSSasha Levin 	}
7894298ddadSSasha Levin 	close(pause_event);
7904298ddadSSasha Levin }
7914298ddadSSasha Levin 
7924298ddadSSasha Levin void kvm__continue(void)
7934298ddadSSasha Levin {
7944298ddadSSasha Levin 	/* Check if the guest is running */
7954298ddadSSasha Levin 	if (!kvm_cpus[0] || kvm_cpus[0]->thread == 0)
7964298ddadSSasha Levin 		return;
7974298ddadSSasha Levin 
7984298ddadSSasha Levin 	mutex_unlock(&pause_lock);
7994298ddadSSasha Levin }
8004298ddadSSasha Levin 
8014298ddadSSasha Levin void kvm__notify_paused(void)
8024298ddadSSasha Levin {
8034298ddadSSasha Levin 	u64 p = 1;
8044298ddadSSasha Levin 
8054298ddadSSasha Levin 	if (write(pause_event, &p, sizeof(p)) < 0)
8064298ddadSSasha Levin 		die("Failed notifying of paused VCPU.");
8074298ddadSSasha Levin 
8084298ddadSSasha Levin 	mutex_lock(&pause_lock);
8094298ddadSSasha Levin 	mutex_unlock(&pause_lock);
8104298ddadSSasha Levin }
811