1ae1fae34SPekka Enberg #include "kvm/kvm.h" 2ae1fae34SPekka Enberg 3eda03319SPekka Enberg #include "kvm/interrupt.h" 4f3150089SPekka Enberg #include "kvm/util.h" 5eda03319SPekka Enberg 66c7d8514SPekka Enberg #include <linux/kvm.h> 7f5ab5f67SPekka Enberg 8f5ab5f67SPekka Enberg #include <asm/bootparam.h> 9f5ab5f67SPekka Enberg 10ae1fae34SPekka Enberg #include <sys/ioctl.h> 111f9cff23SPekka Enberg #include <inttypes.h> 121f9cff23SPekka Enberg #include <sys/mman.h> 132da26a59SPekka Enberg #include <stdbool.h> 146e5e8b8dSPekka Enberg #include <assert.h> 1506e41eeaSPekka Enberg #include <limits.h> 16f5ab5f67SPekka Enberg #include <stdarg.h> 17b8f6afcdSPekka Enberg #include <stdlib.h> 18f5ab5f67SPekka Enberg #include <string.h> 190d1f17ecSPekka Enberg #include <unistd.h> 201f9cff23SPekka Enberg #include <stdio.h> 21b8f6afcdSPekka Enberg #include <fcntl.h> 22b8f6afcdSPekka Enberg 231f9cff23SPekka Enberg /* 241f9cff23SPekka Enberg * Compatibility code. Remove this when we move to tools/kvm. 251f9cff23SPekka Enberg */ 261f9cff23SPekka Enberg #ifndef KVM_EXIT_INTERNAL_ERROR 271f9cff23SPekka Enberg # define KVM_EXIT_INTERNAL_ERROR 17 281f9cff23SPekka Enberg #endif 291f9cff23SPekka Enberg 30ae1fae34SPekka Enberg #define DEFINE_KVM_EXIT_REASON(reason) [reason] = #reason 310d1f17ecSPekka Enberg 32ae1fae34SPekka Enberg const char *kvm_exit_reasons[] = { 33ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_UNKNOWN), 34ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_EXCEPTION), 35ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IO), 36ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HYPERCALL), 37ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DEBUG), 38ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_HLT), 39ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_MMIO), 40ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_IRQ_WINDOW_OPEN), 41ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SHUTDOWN), 42ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_FAIL_ENTRY), 43ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTR), 44ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_SET_TPR), 45ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_TPR_ACCESS), 46ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_SIEIC), 47ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_S390_RESET), 48ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_DCR), 49ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_NMI), 50ae1fae34SPekka Enberg DEFINE_KVM_EXIT_REASON(KVM_EXIT_INTERNAL_ERROR), 519b1fb1c3SPekka Enberg }; 529b1fb1c3SPekka Enberg 5348cf3877SPekka Enberg static inline bool host_ptr_in_ram(struct kvm *self, void *p) 5448cf3877SPekka Enberg { 5548cf3877SPekka Enberg return self->ram_start <= p && p < (self->ram_start + self->ram_size); 5648cf3877SPekka Enberg } 5748cf3877SPekka Enberg 586753ed2fSPekka Enberg static inline uint32_t segment_to_flat(uint16_t selector, uint16_t offset) 596753ed2fSPekka Enberg { 606753ed2fSPekka Enberg return ((uint32_t)selector << 4) + (uint32_t) offset; 616753ed2fSPekka Enberg } 626753ed2fSPekka Enberg 636753ed2fSPekka Enberg static inline void *guest_flat_to_host(struct kvm *self, unsigned long offset) 64ae1fae34SPekka Enberg { 65ae1fae34SPekka Enberg return self->ram_start + offset; 66ae1fae34SPekka Enberg } 67ae1fae34SPekka Enberg 686753ed2fSPekka Enberg static inline void *guest_real_to_host(struct kvm *self, uint16_t selector, uint16_t offset) 696753ed2fSPekka Enberg { 706753ed2fSPekka Enberg unsigned long flat = segment_to_flat(selector, offset); 716753ed2fSPekka Enberg 726753ed2fSPekka Enberg return guest_flat_to_host(self, flat); 736753ed2fSPekka Enberg } 746753ed2fSPekka Enberg 75ae1fae34SPekka Enberg static bool kvm__supports_extension(struct kvm *self, unsigned int extension) 76b8f6afcdSPekka Enberg { 7728fa19c0SPekka Enberg int ret; 78b8f6afcdSPekka Enberg 7973ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_CHECK_EXTENSION, extension); 804076b041SPekka Enberg if (ret < 0) 814076b041SPekka Enberg return false; 824076b041SPekka Enberg 834076b041SPekka Enberg return ret; 844076b041SPekka Enberg } 854076b041SPekka Enberg 864076b041SPekka Enberg static struct kvm *kvm__new(void) 874076b041SPekka Enberg { 884076b041SPekka Enberg struct kvm *self = calloc(1, sizeof *self); 894076b041SPekka Enberg 904076b041SPekka Enberg if (!self) 914076b041SPekka Enberg die("out of memory"); 924076b041SPekka Enberg 934076b041SPekka Enberg return self; 944076b041SPekka Enberg } 954076b041SPekka Enberg 969ef4c68eSPekka Enberg void kvm__delete(struct kvm *self) 979ef4c68eSPekka Enberg { 989ef4c68eSPekka Enberg free(self->ram_start); 999ef4c68eSPekka Enberg free(self); 1009ef4c68eSPekka Enberg } 1019ef4c68eSPekka Enberg 102ae1fae34SPekka Enberg struct kvm *kvm__init(void) 1034076b041SPekka Enberg { 1042b0e3342SPekka Enberg struct kvm_userspace_memory_region mem; 1054076b041SPekka Enberg struct kvm *self; 1060d1f17ecSPekka Enberg long page_size; 1071f9cff23SPekka Enberg int mmap_size; 1084076b041SPekka Enberg int ret; 1094076b041SPekka Enberg 1104076b041SPekka Enberg self = kvm__new(); 1114076b041SPekka Enberg 11273ac60e6SPekka Enberg self->sys_fd = open("/dev/kvm", O_RDWR); 11373ac60e6SPekka Enberg if (self->sys_fd < 0) 114f5ab5f67SPekka Enberg die_perror("open"); 115b8f6afcdSPekka Enberg 11673ac60e6SPekka Enberg ret = ioctl(self->sys_fd, KVM_GET_API_VERSION, 0); 1176c7d8514SPekka Enberg if (ret != KVM_API_VERSION) 118f5ab5f67SPekka Enberg die_perror("KVM_API_VERSION ioctl"); 1196c7d8514SPekka Enberg 12073ac60e6SPekka Enberg self->vm_fd = ioctl(self->sys_fd, KVM_CREATE_VM, 0); 12173ac60e6SPekka Enberg if (self->vm_fd < 0) 122f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VM ioctl"); 12328fa19c0SPekka Enberg 1244076b041SPekka Enberg if (!kvm__supports_extension(self, KVM_CAP_USER_MEMORY)) 125f5ab5f67SPekka Enberg die("KVM_CAP_USER_MEMORY is not supported"); 1262da26a59SPekka Enberg 1270d1f17ecSPekka Enberg self->ram_size = 64UL * 1024UL * 1024UL; 1280d1f17ecSPekka Enberg 1290d1f17ecSPekka Enberg page_size = sysconf(_SC_PAGESIZE); 1300d1f17ecSPekka Enberg if (posix_memalign(&self->ram_start, page_size, self->ram_size) != 0) 1310d1f17ecSPekka Enberg die("out of memory"); 1320d1f17ecSPekka Enberg 1332b0e3342SPekka Enberg mem = (struct kvm_userspace_memory_region) { 1342b0e3342SPekka Enberg .slot = 0, 1352b0e3342SPekka Enberg .guest_phys_addr = 0x0UL, 1360d1f17ecSPekka Enberg .memory_size = self->ram_size, 1370d1f17ecSPekka Enberg .userspace_addr = (unsigned long) self->ram_start, 1382b0e3342SPekka Enberg }; 1392b0e3342SPekka Enberg 14073ac60e6SPekka Enberg ret = ioctl(self->vm_fd, KVM_SET_USER_MEMORY_REGION, &mem, 1); 1412b0e3342SPekka Enberg if (ret < 0) 142f5ab5f67SPekka Enberg die_perror("KVM_SET_USER_MEMORY_REGION ioctl"); 1432b0e3342SPekka Enberg 144895c2fefSPekka Enberg if (!kvm__supports_extension(self, KVM_CAP_SET_TSS_ADDR)) 145f5ab5f67SPekka Enberg die("KVM_CAP_SET_TSS_ADDR is not supported"); 146895c2fefSPekka Enberg 14773ac60e6SPekka Enberg ret = ioctl(self->vm_fd, KVM_SET_TSS_ADDR, 0xfffbd000); 148895c2fefSPekka Enberg if (ret < 0) 149f5ab5f67SPekka Enberg die_perror("KVM_SET_TSS_ADDR ioctl"); 150895c2fefSPekka Enberg 15173ac60e6SPekka Enberg self->vcpu_fd = ioctl(self->vm_fd, KVM_CREATE_VCPU, 0); 1522b0e3342SPekka Enberg if (self->vcpu_fd < 0) 153f5ab5f67SPekka Enberg die_perror("KVM_CREATE_VCPU ioctl"); 1542b0e3342SPekka Enberg 1551f9cff23SPekka Enberg mmap_size = ioctl(self->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0); 1561f9cff23SPekka Enberg if (mmap_size < 0) 157f5ab5f67SPekka Enberg die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl"); 1581f9cff23SPekka Enberg 1591f9cff23SPekka Enberg self->kvm_run = mmap(NULL, mmap_size, PROT_READ|PROT_WRITE, MAP_SHARED, self->vcpu_fd, 0); 1601f9cff23SPekka Enberg if (self->kvm_run == MAP_FAILED) 1611f9cff23SPekka Enberg die("unable to mmap vcpu fd"); 1621f9cff23SPekka Enberg 1634076b041SPekka Enberg return self; 1644076b041SPekka Enberg } 1654076b041SPekka Enberg 166ae1fae34SPekka Enberg void kvm__enable_singlestep(struct kvm *self) 167aee6632eSPekka Enberg { 168aee6632eSPekka Enberg struct kvm_guest_debug debug = { 169aee6632eSPekka Enberg .control = KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP, 170aee6632eSPekka Enberg }; 171aee6632eSPekka Enberg 172aee6632eSPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_GUEST_DEBUG, &debug) < 0) 173b625d4b6SCyrill Gorcunov warning("KVM_SET_GUEST_DEBUG failed"); 174aee6632eSPekka Enberg } 175aee6632eSPekka Enberg 1765f6772b8SCyrill Gorcunov #define BOOT_LOADER_SELECTOR 0x1000 177b08e9ec4SPekka Enberg #define BOOT_LOADER_IP 0x0000 178dbdb74c2SPekka Enberg #define BOOT_LOADER_SP 0x8000 179*2dd4a4edSCyrill Gorcunov #define BOOT_CMDLINE_OFFSET 0x20000 180*2dd4a4edSCyrill Gorcunov 181*2dd4a4edSCyrill Gorcunov #define BOOT_PROTOCOL_REQUIRED 0x202 182009b0758SPekka Enberg 183edc8a14dSPekka Enberg static int load_flat_binary(struct kvm *self, int fd) 184009b0758SPekka Enberg { 185009b0758SPekka Enberg void *p; 186009b0758SPekka Enberg int nr; 187009b0758SPekka Enberg 188009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 189009b0758SPekka Enberg die_perror("lseek"); 190009b0758SPekka Enberg 1916753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 192009b0758SPekka Enberg 193009b0758SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 194009b0758SPekka Enberg p += nr; 195009b0758SPekka Enberg 196dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 197edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP; 198dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 199edc8a14dSPekka Enberg 2007fb218bdSPekka Enberg return true; 201009b0758SPekka Enberg } 202009b0758SPekka Enberg 2037fb218bdSPekka Enberg /* 2047fb218bdSPekka Enberg * The protected mode kernel part of a modern bzImage is loaded at 1 MB by 2057fb218bdSPekka Enberg * default. 2067fb218bdSPekka Enberg */ 2077fb218bdSPekka Enberg #define BZ_KERNEL_START 0x100000UL 208ae1fae34SPekka Enberg 209ae1fae34SPekka Enberg static const char *BZIMAGE_MAGIC = "HdrS"; 210ae1fae34SPekka Enberg 21110943d14SPekka Enberg #define BZ_DEFAULT_SETUP_SECTS 4 21210943d14SPekka Enberg 2136d1f350dSCyrill Gorcunov static bool load_bzimage(struct kvm *self, int fd, const char *kernel_cmdline) 214ae1fae34SPekka Enberg { 215bc75b0aeSCyrill Gorcunov struct real_intr_desc intr; 21622489bb0SCyrill Gorcunov struct boot_params boot; 2174b62331fSPekka Enberg unsigned long setup_sects; 218305d9054SCyrill Gorcunov unsigned int intr_addr; 219*2dd4a4edSCyrill Gorcunov size_t cmdline_size; 2207fb218bdSPekka Enberg ssize_t setup_size; 22122489bb0SCyrill Gorcunov void *p; 222ae1fae34SPekka Enberg int nr; 223ae1fae34SPekka Enberg 2245d67eaf6SPekka Enberg /* 2255d67eaf6SPekka Enberg * See Documentation/x86/boot.txt for details no bzImage on-disk and 2265d67eaf6SPekka Enberg * memory layout. 2275d67eaf6SPekka Enberg */ 2285d67eaf6SPekka Enberg 229009b0758SPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 230009b0758SPekka Enberg die_perror("lseek"); 231009b0758SPekka Enberg 232ae1fae34SPekka Enberg read(fd, &boot, sizeof(boot)); 233ae1fae34SPekka Enberg 234ae1fae34SPekka Enberg if (memcmp(&boot.hdr.header, BZIMAGE_MAGIC, strlen(BZIMAGE_MAGIC)) != 0) 2357fb218bdSPekka Enberg return false; 236ae1fae34SPekka Enberg 237*2dd4a4edSCyrill Gorcunov if (boot.hdr.version < BOOT_PROTOCOL_REQUIRED) { 238ad681038SCyrill Gorcunov warning("Too old kernel"); 239ad681038SCyrill Gorcunov return false; 240ad681038SCyrill Gorcunov } 241ad681038SCyrill Gorcunov 242e93ab78aSPekka Enberg if (lseek(fd, 0, SEEK_SET) < 0) 243e93ab78aSPekka Enberg die_perror("lseek"); 244e93ab78aSPekka Enberg 2454cf542bbSCyrill Gorcunov if (!boot.hdr.setup_sects) 2464cf542bbSCyrill Gorcunov boot.hdr.setup_sects = BZ_DEFAULT_SETUP_SECTS; 24710943d14SPekka Enberg setup_sects = boot.hdr.setup_sects + 1; 24810943d14SPekka Enberg 24954d4a626SPekka Enberg setup_size = setup_sects << 9; 2506753ed2fSPekka Enberg p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, BOOT_LOADER_IP); 251ae1fae34SPekka Enberg 2527fb218bdSPekka Enberg if (read(fd, p, setup_size) != setup_size) 2537fb218bdSPekka Enberg die_perror("read"); 2547fb218bdSPekka Enberg 2556753ed2fSPekka Enberg p = guest_flat_to_host(self, BZ_KERNEL_START); 256ae1fae34SPekka Enberg 257ae1fae34SPekka Enberg while ((nr = read(fd, p, 65536)) > 0) 258ae1fae34SPekka Enberg p += nr; 259ae1fae34SPekka Enberg 260debcfac0SCyrill Gorcunov if (kernel_cmdline) { 261debcfac0SCyrill Gorcunov cmdline_size = strlen(kernel_cmdline) + 1; 262debcfac0SCyrill Gorcunov if (cmdline_size > boot.hdr.cmdline_size) 263debcfac0SCyrill Gorcunov cmdline_size = boot.hdr.cmdline_size; 264ad681038SCyrill Gorcunov 265*2dd4a4edSCyrill Gorcunov p = guest_flat_to_host(self, BOOT_CMDLINE_OFFSET); 266*2dd4a4edSCyrill Gorcunov memset(p, 0, boot.hdr.cmdline_size); 267*2dd4a4edSCyrill Gorcunov memcpy(p, kernel_cmdline, cmdline_size - 1); 268ad681038SCyrill Gorcunov 269*2dd4a4edSCyrill Gorcunov p = guest_real_to_host(self, BOOT_LOADER_SELECTOR, 0x228); 270*2dd4a4edSCyrill Gorcunov *(unsigned long *)p = BOOT_CMDLINE_OFFSET; 271debcfac0SCyrill Gorcunov } 272debcfac0SCyrill Gorcunov 273dbdb74c2SPekka Enberg self->boot_selector = BOOT_LOADER_SELECTOR; 274edc8a14dSPekka Enberg /* 275edc8a14dSPekka Enberg * The real-mode setup code starts at offset 0x200 of a bzImage. See 276edc8a14dSPekka Enberg * Documentation/x86/boot.txt for details. 277edc8a14dSPekka Enberg */ 278edc8a14dSPekka Enberg self->boot_ip = BOOT_LOADER_IP + 0x200; 279dbdb74c2SPekka Enberg self->boot_sp = BOOT_LOADER_SP; 280edc8a14dSPekka Enberg 281ea684828SCyrill Gorcunov /* 28222489bb0SCyrill Gorcunov * Setup a *fake* real mode vector table, it has only 28322489bb0SCyrill Gorcunov * one real hadler which does just iret 28422489bb0SCyrill Gorcunov * 285305d9054SCyrill Gorcunov * This is where the BIOS lives -- BDA area 286ea684828SCyrill Gorcunov */ 287305d9054SCyrill Gorcunov intr_addr = BIOS_INTR_NEXT(BDA_START + 0, 16); 288305d9054SCyrill Gorcunov p = guest_flat_to_host(self, intr_addr); 289305d9054SCyrill Gorcunov memcpy(p, intfake, intfake_size); 290bc75b0aeSCyrill Gorcunov intr = (struct real_intr_desc) { 291305d9054SCyrill Gorcunov .segment = REAL_SEGMENT(intr_addr), 29222489bb0SCyrill Gorcunov .offset = 0, 293ea684828SCyrill Gorcunov }; 294bc75b0aeSCyrill Gorcunov interrupt_table__setup(&self->interrupt_table, &intr); 295305d9054SCyrill Gorcunov 296305d9054SCyrill Gorcunov intr_addr = BIOS_INTR_NEXT(BDA_START + intfake_size, 16); 297305d9054SCyrill Gorcunov p = guest_flat_to_host(self, intr_addr); 298305d9054SCyrill Gorcunov memcpy(p, int10, int10_size); 299305d9054SCyrill Gorcunov intr = (struct real_intr_desc) { 300305d9054SCyrill Gorcunov .segment = REAL_SEGMENT(intr_addr), 301305d9054SCyrill Gorcunov .offset = 0, 302305d9054SCyrill Gorcunov }; 303305d9054SCyrill Gorcunov interrupt_table__set(&self->interrupt_table, &intr, 0x10); 304305d9054SCyrill Gorcunov 305305d9054SCyrill Gorcunov p = guest_flat_to_host(self, 0); 306bc75b0aeSCyrill Gorcunov interrupt_table__copy(&self->interrupt_table, p, REAL_INTR_SIZE); 307ea684828SCyrill Gorcunov 3087fb218bdSPekka Enberg return true; 309ae1fae34SPekka Enberg } 310ae1fae34SPekka Enberg 3116d1f350dSCyrill Gorcunov bool kvm__load_kernel(struct kvm *kvm, const char *kernel_filename, 3126d1f350dSCyrill Gorcunov const char *kernel_cmdline) 313ae1fae34SPekka Enberg { 3147fb218bdSPekka Enberg bool ret; 315ae1fae34SPekka Enberg int fd; 316ae1fae34SPekka Enberg 317ae1fae34SPekka Enberg fd = open(kernel_filename, O_RDONLY); 318ae1fae34SPekka Enberg if (fd < 0) 319ae1fae34SPekka Enberg die("unable to open kernel"); 320ae1fae34SPekka Enberg 3216d1f350dSCyrill Gorcunov ret = load_bzimage(kvm, fd, kernel_cmdline); 322009b0758SPekka Enberg if (ret) 323009b0758SPekka Enberg goto found_kernel; 324ae1fae34SPekka Enberg 325009b0758SPekka Enberg ret = load_flat_binary(kvm, fd); 326009b0758SPekka Enberg if (ret) 327009b0758SPekka Enberg goto found_kernel; 328009b0758SPekka Enberg 329009b0758SPekka Enberg die("%s is not a valid bzImage or flat binary", kernel_filename); 330009b0758SPekka Enberg 331009b0758SPekka Enberg found_kernel: 332ae1fae34SPekka Enberg return ret; 333ae1fae34SPekka Enberg } 334ae1fae34SPekka Enberg 33506e41eeaSPekka Enberg static inline uint64_t ip_flat_to_real(struct kvm *self, uint64_t ip) 33606e41eeaSPekka Enberg { 33706e41eeaSPekka Enberg uint64_t cs = self->sregs.cs.selector; 33806e41eeaSPekka Enberg 33906e41eeaSPekka Enberg return ip - (cs << 4); 34006e41eeaSPekka Enberg } 34106e41eeaSPekka Enberg 342f01944c8SPekka Enberg static inline bool is_in_protected_mode(struct kvm *self) 343f01944c8SPekka Enberg { 344f01944c8SPekka Enberg return self->sregs.cr0 & 0x01; 345f01944c8SPekka Enberg } 346f01944c8SPekka Enberg 347f326512aSPekka Enberg static inline uint64_t ip_to_flat(struct kvm *self, uint64_t ip) 34806e41eeaSPekka Enberg { 349f326512aSPekka Enberg uint64_t cs; 350f326512aSPekka Enberg 351f326512aSPekka Enberg /* 352f326512aSPekka Enberg * NOTE! We should take code segment base address into account here. 353f326512aSPekka Enberg * Luckily it's usually zero because Linux uses flat memory model. 354f326512aSPekka Enberg */ 355f01944c8SPekka Enberg if (is_in_protected_mode(self)) 356f326512aSPekka Enberg return ip; 357f326512aSPekka Enberg 358f326512aSPekka Enberg cs = self->sregs.cs.selector; 35906e41eeaSPekka Enberg 36006e41eeaSPekka Enberg return ip + (cs << 4); 36106e41eeaSPekka Enberg } 36206e41eeaSPekka Enberg 363dbdb74c2SPekka Enberg static inline uint32_t selector_to_base(uint16_t selector) 364dbdb74c2SPekka Enberg { 365dbdb74c2SPekka Enberg /* 366dbdb74c2SPekka Enberg * KVM on Intel requires 'base' to be 'selector * 16' in real mode. 367dbdb74c2SPekka Enberg */ 368dbdb74c2SPekka Enberg return (uint32_t)selector * 16; 369dbdb74c2SPekka Enberg } 370dbdb74c2SPekka Enberg 37153d48714SPekka Enberg static struct kvm_msrs *kvm_msrs__new(size_t nmsrs) 37253d48714SPekka Enberg { 37353d48714SPekka Enberg struct kvm_msrs *self = calloc(1, sizeof(*self) + (sizeof(struct kvm_msr_entry) * nmsrs)); 37453d48714SPekka Enberg 37553d48714SPekka Enberg if (!self) 37653d48714SPekka Enberg die("out of memory"); 37753d48714SPekka Enberg 37853d48714SPekka Enberg return self; 37953d48714SPekka Enberg } 38053d48714SPekka Enberg 38153d48714SPekka Enberg #define MSR_IA32_TIME_STAMP_COUNTER 0x10 38253d48714SPekka Enberg 38353d48714SPekka Enberg #define MSR_IA32_SYSENTER_CS 0x174 38453d48714SPekka Enberg #define MSR_IA32_SYSENTER_ESP 0x175 38553d48714SPekka Enberg #define MSR_IA32_SYSENTER_EIP 0x176 38653d48714SPekka Enberg 38753d48714SPekka Enberg #define MSR_IA32_STAR 0xc0000081 38853d48714SPekka Enberg #define MSR_IA32_LSTAR 0xc0000082 38953d48714SPekka Enberg #define MSR_IA32_CSTAR 0xc0000083 39053d48714SPekka Enberg #define MSR_IA32_FMASK 0xc0000084 39153d48714SPekka Enberg #define MSR_IA32_KERNEL_GS_BASE 0xc0000102 39253d48714SPekka Enberg 39353d48714SPekka Enberg #define KVM_MSR_ENTRY(_index, _data) \ 39453d48714SPekka Enberg (struct kvm_msr_entry) { .index = _index, .data = _data } 39553d48714SPekka Enberg 39653d48714SPekka Enberg static void kvm__setup_msrs(struct kvm *self) 39753d48714SPekka Enberg { 39853d48714SPekka Enberg unsigned long ndx = 0; 39953d48714SPekka Enberg 40053d48714SPekka Enberg self->msrs = kvm_msrs__new(100); 40153d48714SPekka Enberg 40253d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_CS, 0x0); 40353d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_ESP, 0x0); 40453d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_SYSENTER_EIP, 0x0); 40553d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_STAR, 0x0); 40653d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_CSTAR, 0x0); 40753d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_KERNEL_GS_BASE, 0x0); 40853d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_FMASK, 0x0); 40953d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_LSTAR, 0x0); 41053d48714SPekka Enberg self->msrs->entries[ndx++] = KVM_MSR_ENTRY(MSR_IA32_TIME_STAMP_COUNTER, 0x0); 41153d48714SPekka Enberg 41253d48714SPekka Enberg self->msrs->nmsrs = ndx; 41353d48714SPekka Enberg 41453d48714SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_MSRS, self->msrs) < 0) 41553d48714SPekka Enberg die_perror("KVM_SET_MSRS failed"); 41653d48714SPekka Enberg } 41753d48714SPekka Enberg 4183d78d3a5SPekka Enberg static void kvm__setup_fpu(struct kvm *self) 4193d78d3a5SPekka Enberg { 4203d78d3a5SPekka Enberg self->fpu = (struct kvm_fpu) { 4213d78d3a5SPekka Enberg .fcw = 0x37f, 4223d78d3a5SPekka Enberg .mxcsr = 0x1f80, 4233d78d3a5SPekka Enberg }; 4243d78d3a5SPekka Enberg 4253d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_FPU, &self->fpu) < 0) 4263d78d3a5SPekka Enberg die_perror("KVM_SET_FPU failed"); 4273d78d3a5SPekka Enberg } 4283d78d3a5SPekka Enberg 4293d78d3a5SPekka Enberg static void kvm__setup_regs(struct kvm *self) 4303d78d3a5SPekka Enberg { 4313d78d3a5SPekka Enberg self->regs = (struct kvm_regs) { 4323d78d3a5SPekka Enberg /* We start the guest in 16-bit real mode */ 4333d78d3a5SPekka Enberg .rflags = 0x0000000000000002ULL, 4343d78d3a5SPekka Enberg 4353d78d3a5SPekka Enberg .rip = self->boot_ip, 4363d78d3a5SPekka Enberg .rsp = self->boot_sp, 4373d78d3a5SPekka Enberg .rbp = self->boot_sp, 4383d78d3a5SPekka Enberg }; 4393d78d3a5SPekka Enberg 4403d78d3a5SPekka Enberg if (self->regs.rip > USHRT_MAX) 4413d78d3a5SPekka Enberg die("ip 0x%" PRIx64 " is too high for real mode", (uint64_t) self->regs.rip); 4423d78d3a5SPekka Enberg 4433d78d3a5SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_REGS, &self->regs) < 0) 4443d78d3a5SPekka Enberg die_perror("KVM_SET_REGS failed"); 4453d78d3a5SPekka Enberg } 4463d78d3a5SPekka Enberg 4473d78d3a5SPekka Enberg static void kvm__setup_sregs(struct kvm *self) 448ae1fae34SPekka Enberg { 44953602077SPekka Enberg self->sregs = (struct kvm_sregs) { 45053602077SPekka Enberg .cr0 = 0x60000010ULL, 45153602077SPekka Enberg .cs = (struct kvm_segment) { 452dbdb74c2SPekka Enberg .selector = self->boot_selector, 453dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 45453602077SPekka Enberg .limit = 0xffffU, 45553602077SPekka Enberg .type = 0x0bU, 45653602077SPekka Enberg .present = 1, 45753602077SPekka Enberg .dpl = 0x03, 45853602077SPekka Enberg .s = 1, 45953602077SPekka Enberg }, 46053602077SPekka Enberg .ss = (struct kvm_segment) { 461dbdb74c2SPekka Enberg .selector = self->boot_selector, 462dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 46353602077SPekka Enberg .limit = 0xffffU, 46453602077SPekka Enberg .type = 0x03U, 46553602077SPekka Enberg .present = 1, 46653602077SPekka Enberg .dpl = 0x03, 46753602077SPekka Enberg .s = 1, 46853602077SPekka Enberg }, 46953602077SPekka Enberg .ds = (struct kvm_segment) { 470dbdb74c2SPekka Enberg .selector = self->boot_selector, 471dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 47253602077SPekka Enberg .limit = 0xffffU, 47353602077SPekka Enberg .type = 0x03U, 47453602077SPekka Enberg .present = 1, 47553602077SPekka Enberg .dpl = 0x03, 47653602077SPekka Enberg .s = 1, 47753602077SPekka Enberg }, 47853602077SPekka Enberg .es = (struct kvm_segment) { 479dbdb74c2SPekka Enberg .selector = self->boot_selector, 480dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 48153602077SPekka Enberg .limit = 0xffffU, 48253602077SPekka Enberg .type = 0x03U, 48353602077SPekka Enberg .present = 1, 48453602077SPekka Enberg .dpl = 0x03, 48553602077SPekka Enberg .s = 1, 48653602077SPekka Enberg }, 48753602077SPekka Enberg .fs = (struct kvm_segment) { 488dbdb74c2SPekka Enberg .selector = self->boot_selector, 489dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 49053602077SPekka Enberg .limit = 0xffffU, 49153602077SPekka Enberg .type = 0x03U, 49253602077SPekka Enberg .present = 1, 49353602077SPekka Enberg .dpl = 0x03, 49453602077SPekka Enberg .s = 1, 49553602077SPekka Enberg }, 49653602077SPekka Enberg .gs = (struct kvm_segment) { 497dbdb74c2SPekka Enberg .selector = self->boot_selector, 498dbdb74c2SPekka Enberg .base = selector_to_base(self->boot_selector), 49953602077SPekka Enberg .limit = 0xffffU, 50053602077SPekka Enberg .type = 0x03U, 50153602077SPekka Enberg .present = 1, 50253602077SPekka Enberg .dpl = 0x03, 50353602077SPekka Enberg .s = 1, 50453602077SPekka Enberg }, 50553602077SPekka Enberg .tr = (struct kvm_segment) { 50653602077SPekka Enberg .limit = 0xffffU, 50753602077SPekka Enberg .present = 1, 50853602077SPekka Enberg .type = 0x03U, 50953602077SPekka Enberg }, 51053602077SPekka Enberg .ldt = (struct kvm_segment) { 51153602077SPekka Enberg .limit = 0xffffU, 51253602077SPekka Enberg .present = 1, 5137085d935SPekka Enberg .type = 0x02U, 51453602077SPekka Enberg }, 51553602077SPekka Enberg .gdt = (struct kvm_dtable) { 51653602077SPekka Enberg .limit = 0xffffU, 51753602077SPekka Enberg }, 51853602077SPekka Enberg .idt = (struct kvm_dtable) { 51953602077SPekka Enberg .limit = 0xffffU, 52053602077SPekka Enberg }, 52153602077SPekka Enberg }; 52253602077SPekka Enberg 52353602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_SET_SREGS, &self->sregs) < 0) 52453602077SPekka Enberg die_perror("KVM_SET_SREGS failed"); 5253d78d3a5SPekka Enberg } 52606e41eeaSPekka Enberg 5273d78d3a5SPekka Enberg void kvm__reset_vcpu(struct kvm *self) 5283d78d3a5SPekka Enberg { 5293d78d3a5SPekka Enberg kvm__setup_sregs(self); 530dbdb74c2SPekka Enberg 5313d78d3a5SPekka Enberg kvm__setup_regs(self); 53206e41eeaSPekka Enberg 5333d78d3a5SPekka Enberg kvm__setup_fpu(self); 53453d48714SPekka Enberg 53553d48714SPekka Enberg kvm__setup_msrs(self); 536ae1fae34SPekka Enberg } 537ae1fae34SPekka Enberg 538ae1fae34SPekka Enberg void kvm__run(struct kvm *self) 539ae1fae34SPekka Enberg { 540ae1fae34SPekka Enberg if (ioctl(self->vcpu_fd, KVM_RUN, 0) < 0) 541ae1fae34SPekka Enberg die_perror("KVM_RUN failed"); 542ae1fae34SPekka Enberg } 543ae1fae34SPekka Enberg 5448351aaddSPekka Enberg static void print_dtable(const char *name, struct kvm_dtable *dtable) 5458351aaddSPekka Enberg { 5468351aaddSPekka Enberg printf(" %s %016" PRIx64 " %08" PRIx16 "\n", 5478351aaddSPekka Enberg name, (uint64_t) dtable->base, (uint16_t) dtable->limit); 5488351aaddSPekka Enberg } 5498351aaddSPekka Enberg 55053602077SPekka Enberg static void print_segment(const char *name, struct kvm_segment *seg) 55153602077SPekka Enberg { 552ce556636SPekka Enberg printf(" %s %04" PRIx16 " %016" PRIx64 " %08" PRIx32 " %02" PRIx8 " %x %x %x %x %x %x %x\n", 55353602077SPekka Enberg name, (uint16_t) seg->selector, (uint64_t) seg->base, (uint32_t) seg->limit, 554ce556636SPekka Enberg (uint8_t) seg->type, seg->present, seg->dpl, seg->db, seg->s, seg->l, seg->g, seg->avl); 55553602077SPekka Enberg } 55653602077SPekka Enberg 557ae1fae34SPekka Enberg void kvm__show_registers(struct kvm *self) 5587118d2caSPekka Enberg { 55953602077SPekka Enberg unsigned long cr0, cr2, cr3; 56053602077SPekka Enberg unsigned long cr4, cr8; 5617118d2caSPekka Enberg unsigned long rax, rbx, rcx; 5627118d2caSPekka Enberg unsigned long rdx, rsi, rdi; 5637118d2caSPekka Enberg unsigned long rbp, r8, r9; 5647118d2caSPekka Enberg unsigned long r10, r11, r12; 5657118d2caSPekka Enberg unsigned long r13, r14, r15; 5667118d2caSPekka Enberg unsigned long rip, rsp; 56753602077SPekka Enberg struct kvm_sregs sregs; 568a2fe6199SPekka Enberg unsigned long rflags; 5697118d2caSPekka Enberg struct kvm_regs regs; 570ce5e0ecbSPekka Enberg int i; 5717118d2caSPekka Enberg 5727118d2caSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, ®s) < 0) 5737118d2caSPekka Enberg die("KVM_GET_REGS failed"); 5747118d2caSPekka Enberg 575a2fe6199SPekka Enberg rflags = regs.rflags; 576a2fe6199SPekka Enberg 5777118d2caSPekka Enberg rip = regs.rip; rsp = regs.rsp; 5787118d2caSPekka Enberg rax = regs.rax; rbx = regs.rbx; rcx = regs.rcx; 5797118d2caSPekka Enberg rdx = regs.rdx; rsi = regs.rsi; rdi = regs.rdi; 5807118d2caSPekka Enberg rbp = regs.rbp; r8 = regs.r8; r9 = regs.r9; 5817118d2caSPekka Enberg r10 = regs.r10; r11 = regs.r11; r12 = regs.r12; 5827118d2caSPekka Enberg r13 = regs.r13; r14 = regs.r14; r15 = regs.r15; 5837118d2caSPekka Enberg 5847118d2caSPekka Enberg printf("Registers:\n"); 5852177ec43SPekka Enberg printf(" rip: %016lx rsp: %016lx flags: %016lx\n", rip, rsp, rflags); 586ea2e4ea0SCyrill Gorcunov printf(" rax: %016lx rbx: %016lx rcx: %016lx\n", rax, rbx, rcx); 5877118d2caSPekka Enberg printf(" rdx: %016lx rsi: %016lx rdi: %016lx\n", rdx, rsi, rdi); 5887118d2caSPekka Enberg printf(" rbp: %016lx r8: %016lx r9: %016lx\n", rbp, r8, r9); 5897118d2caSPekka Enberg printf(" r10: %016lx r11: %016lx r12: %016lx\n", r10, r11, r12); 5907118d2caSPekka Enberg printf(" r13: %016lx r14: %016lx r15: %016lx\n", r13, r14, r15); 59153602077SPekka Enberg 59253602077SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &sregs) < 0) 59353602077SPekka Enberg die("KVM_GET_REGS failed"); 59453602077SPekka Enberg 59553602077SPekka Enberg cr0 = sregs.cr0; cr2 = sregs.cr2; cr3 = sregs.cr3; 59653602077SPekka Enberg cr4 = sregs.cr4; cr8 = sregs.cr8; 59753602077SPekka Enberg 59853602077SPekka Enberg printf(" cr0: %016lx cr2: %016lx cr3: %016lx\n", cr0, cr2, cr3); 59953602077SPekka Enberg printf(" cr4: %016lx cr8: %016lx\n", cr4, cr8); 600ce5e0ecbSPekka Enberg printf("Segment registers:\n"); 601ce556636SPekka Enberg printf(" register selector base limit type p dpl db s l g avl\n"); 60253602077SPekka Enberg print_segment("cs ", &sregs.cs); 60353602077SPekka Enberg print_segment("ss ", &sregs.ss); 60453602077SPekka Enberg print_segment("ds ", &sregs.ds); 60553602077SPekka Enberg print_segment("es ", &sregs.es); 60653602077SPekka Enberg print_segment("fs ", &sregs.fs); 60753602077SPekka Enberg print_segment("gs ", &sregs.gs); 608ce5e0ecbSPekka Enberg print_segment("tr ", &sregs.tr); 609ce5e0ecbSPekka Enberg print_segment("ldt", &sregs.ldt); 6108351aaddSPekka Enberg print_dtable("gdt", &sregs.gdt); 6118351aaddSPekka Enberg print_dtable("idt", &sregs.idt); 6122049569dSPekka Enberg printf(" [ efer: %016lx apic base: %016lx nmi: %s ]\n", (uint64_t) sregs.efer, (uint64_t) sregs.apic_base, 6132049569dSPekka Enberg (self->nmi_disabled ? "disabled" : "enabled")); 614ce5e0ecbSPekka Enberg printf("Interrupt bitmap:\n"); 615ce5e0ecbSPekka Enberg printf(" "); 616ce5e0ecbSPekka Enberg for (i = 0; i < (KVM_NR_INTERRUPTS + 63) / 64; i++) 617ce5e0ecbSPekka Enberg printf("%016lx ", (uint64_t) sregs.interrupt_bitmap[i]); 618ce5e0ecbSPekka Enberg printf("\n"); 6197118d2caSPekka Enberg } 6207118d2caSPekka Enberg 621ae1fae34SPekka Enberg void kvm__show_code(struct kvm *self) 6226f10be05SPekka Enberg { 6236f10be05SPekka Enberg unsigned int code_bytes = 64; 6246f10be05SPekka Enberg unsigned int code_prologue = code_bytes * 43 / 64; 6256f10be05SPekka Enberg unsigned int code_len = code_bytes; 6266f10be05SPekka Enberg unsigned char c; 627ae1fae34SPekka Enberg unsigned int i; 6286f10be05SPekka Enberg uint8_t *ip; 6296f10be05SPekka Enberg 6302a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_REGS, &self->regs) < 0) 6312a601aafSPekka Enberg die("KVM_GET_REGS failed"); 6322a601aafSPekka Enberg 6332a601aafSPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 6342a601aafSPekka Enberg die("KVM_GET_SREGS failed"); 6352a601aafSPekka Enberg 636f326512aSPekka Enberg ip = guest_flat_to_host(self, ip_to_flat(self, self->regs.rip) - code_prologue); 6376f10be05SPekka Enberg 6386f10be05SPekka Enberg printf("Code: "); 6396f10be05SPekka Enberg 6406f10be05SPekka Enberg for (i = 0; i < code_len; i++, ip++) { 64148cf3877SPekka Enberg if (!host_ptr_in_ram(self, ip)) 64248cf3877SPekka Enberg break; 64348cf3877SPekka Enberg 6446e8abc38SPekka Enberg c = *ip; 6456e8abc38SPekka Enberg 646f326512aSPekka Enberg if (ip == guest_flat_to_host(self, ip_to_flat(self, self->regs.rip))) 6476f10be05SPekka Enberg printf("<%02x> ", c); 6486f10be05SPekka Enberg else 6496f10be05SPekka Enberg printf("%02x ", c); 6506f10be05SPekka Enberg } 6516f10be05SPekka Enberg 6526f10be05SPekka Enberg printf("\n"); 6532a7d39a4SPekka Enberg 6542a7d39a4SPekka Enberg printf("Stack:\n"); 6552a7d39a4SPekka Enberg kvm__dump_mem(self, self->regs.rsp, 32); 6566f10be05SPekka Enberg } 657090f898eSCyrill Gorcunov 658f01944c8SPekka Enberg void kvm__show_page_tables(struct kvm *self) 659f01944c8SPekka Enberg { 660f01944c8SPekka Enberg uint64_t *pte1; 661f01944c8SPekka Enberg uint64_t *pte2; 662f01944c8SPekka Enberg uint64_t *pte3; 663f01944c8SPekka Enberg uint64_t *pte4; 664f01944c8SPekka Enberg 665f01944c8SPekka Enberg if (!is_in_protected_mode(self)) 666f01944c8SPekka Enberg return; 667f01944c8SPekka Enberg 668f01944c8SPekka Enberg if (ioctl(self->vcpu_fd, KVM_GET_SREGS, &self->sregs) < 0) 669f01944c8SPekka Enberg die("KVM_GET_SREGS failed"); 670f01944c8SPekka Enberg 671f01944c8SPekka Enberg pte4 = guest_flat_to_host(self, self->sregs.cr3); 67248cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte4)) 67348cf3877SPekka Enberg return; 67448cf3877SPekka Enberg 675f01944c8SPekka Enberg pte3 = guest_flat_to_host(self, (*pte4 & ~0xfff)); 67648cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte3)) 67748cf3877SPekka Enberg return; 67848cf3877SPekka Enberg 679f01944c8SPekka Enberg pte2 = guest_flat_to_host(self, (*pte3 & ~0xfff)); 68048cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte2)) 68148cf3877SPekka Enberg return; 68248cf3877SPekka Enberg 683f01944c8SPekka Enberg pte1 = guest_flat_to_host(self, (*pte2 & ~0xfff)); 68448cf3877SPekka Enberg if (!host_ptr_in_ram(self, pte1)) 68548cf3877SPekka Enberg return; 686f01944c8SPekka Enberg 687f01944c8SPekka Enberg printf("Page Tables:\n"); 688f01944c8SPekka Enberg if (*pte2 & (1 << 7)) 689f01944c8SPekka Enberg printf(" pte4: %016lx pte3: %016lx pte2: %016lx\n", *pte4, *pte3, *pte2); 690f01944c8SPekka Enberg else 691f01944c8SPekka Enberg printf(" pte4: %016lx pte3: %016lx pte2: %016lx pte1: %016lx\n", *pte4, *pte3, *pte2, *pte1); 692f01944c8SPekka Enberg } 693f01944c8SPekka Enberg 694090f898eSCyrill Gorcunov void kvm__dump_mem(struct kvm *self, unsigned long addr, unsigned long size) 695090f898eSCyrill Gorcunov { 696090f898eSCyrill Gorcunov unsigned char *p; 697090f898eSCyrill Gorcunov unsigned long n; 698090f898eSCyrill Gorcunov 699090f898eSCyrill Gorcunov size &= ~7; /* mod 8 */ 700090f898eSCyrill Gorcunov if (!size) 701090f898eSCyrill Gorcunov return; 702090f898eSCyrill Gorcunov 7032a7d39a4SPekka Enberg p = guest_flat_to_host(self, addr); 704090f898eSCyrill Gorcunov 70548cf3877SPekka Enberg for (n = 0; n < size; n+=8) { 70648cf3877SPekka Enberg if (!host_ptr_in_ram(self, p + n)) 70748cf3877SPekka Enberg break; 70848cf3877SPekka Enberg 709090f898eSCyrill Gorcunov printf(" 0x%08lx: %02x %02x %02x %02x %02x %02x %02x %02x\n", 710090f898eSCyrill Gorcunov addr + n, p[n + 0], p[n + 1], p[n + 2], p[n + 3], 711090f898eSCyrill Gorcunov p[n + 4], p[n + 5], p[n + 6], p[n + 7]); 712090f898eSCyrill Gorcunov } 71348cf3877SPekka Enberg } 714