mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-12-26 13:10:56 +00:00
d4eaa4056f
Add a module for accessing guest memory. This module will replace all the slices that are used to access it currently as those slices aren't valid because the memory is volatile and a volatile slice doesn't exist in rust. Modify the existing users so they no longer depend on the deprecated slice access. Change-Id: Ic0e86dacf66f68bd88ed9cc197cb14e45ada891d Signed-off-by: Dylan Reid <dgreid@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/509919
73 lines
2.3 KiB
Rust
73 lines
2.3 KiB
Rust
// Copyright 2017 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#![cfg(any(target_arch = "x86", target_arch = "x86_64"))]
|
|
|
|
extern crate sys_util;
|
|
extern crate kvm_sys;
|
|
extern crate kvm;
|
|
|
|
use kvm::*;
|
|
use kvm_sys::kvm_regs;
|
|
use sys_util::{GuestAddress, GuestMemory};
|
|
|
|
#[test]
|
|
fn test_run() {
|
|
// This example based on https://lwn.net/Articles/658511/
|
|
let code = [
|
|
0xba, 0xf8, 0x03, /* mov $0x3f8, %dx */
|
|
0x00, 0xd8, /* add %bl, %al */
|
|
0x04, '0' as u8, /* add $'0', %al */
|
|
0xee, /* out %al, (%dx) */
|
|
0xb0, '\n' as u8, /* mov $'\n', %al */
|
|
0xee, /* out %al, (%dx) */
|
|
0x2e, 0xc6, 0x06, 0xf1, 0x10, 0x13, /* movb $0x13, %cs:0xf1 */
|
|
0xf4, /* hlt */
|
|
];
|
|
|
|
let mem_size = 0x1000;
|
|
let load_addr = GuestAddress(0x1000);
|
|
let mem = GuestMemory::new(&vec![(load_addr, mem_size)]).unwrap();
|
|
|
|
let kvm = Kvm::new().expect("new kvm failed");
|
|
let vm = Vm::new(&kvm, mem).expect("new vm failed");
|
|
let vcpu = Vcpu::new(0, &kvm, &vm).expect("new vcpu failed");
|
|
|
|
vm.get_memory()
|
|
.write_slice_at_addr(&code, load_addr)
|
|
.expect("Writing code to memory failed.");
|
|
|
|
let mut vcpu_sregs = vcpu.get_sregs().expect("get sregs failed");
|
|
assert_ne!(vcpu_sregs.cs.base, 0);
|
|
assert_ne!(vcpu_sregs.cs.selector, 0);
|
|
vcpu_sregs.cs.base = 0;
|
|
vcpu_sregs.cs.selector = 0;
|
|
vcpu.set_sregs(&vcpu_sregs).expect("set sregs failed");
|
|
|
|
let mut vcpu_regs: kvm_regs = unsafe { std::mem::zeroed() };
|
|
vcpu_regs.rip = 0x1000;
|
|
vcpu_regs.rax = 2;
|
|
vcpu_regs.rbx = 7;
|
|
vcpu_regs.rflags = 2;
|
|
vcpu.set_regs(&vcpu_regs).expect("set regs failed");
|
|
|
|
let mut out = String::new();
|
|
loop {
|
|
match vcpu.run().expect("run failed") {
|
|
VcpuExit::IoOut(0x3f8, data) => {
|
|
assert_eq!(data.len(), 1);
|
|
out.push(data[0] as char);
|
|
},
|
|
VcpuExit::Hlt => break,
|
|
r => panic!("unexpected exit reason: {:?}", r),
|
|
}
|
|
}
|
|
|
|
assert_eq!(out, "9\n");
|
|
let result: u8 =
|
|
vm.get_memory()
|
|
.read_obj_from_addr(load_addr.checked_add(0xf1).unwrap())
|
|
.expect("Error reading the result.");
|
|
assert_eq!(result, 0x13);
|
|
}
|