]> Git Repo - qemu.git/blame - linux-user/main.c
lretq, lcall and ljmp tests in 64 bit mode
[qemu.git] / linux-user / main.c
CommitLineData
31e31b8a 1/*
93ac68bc 2 * qemu user main
31e31b8a
FB
3 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19 */
20#include <stdlib.h>
21#include <stdio.h>
22#include <stdarg.h>
04369ff2 23#include <string.h>
31e31b8a 24#include <errno.h>
0ecfa993 25#include <unistd.h>
31e31b8a 26
3ef693a0 27#include "qemu.h"
31e31b8a 28
3ef693a0 29#define DEBUG_LOGFILE "/tmp/qemu.log"
586314f2 30
83fb7adf
FB
31#ifdef __APPLE__
32#include <crt_externs.h>
33# define environ (*_NSGetEnviron())
34#endif
35
74cd30b8 36static const char *interp_prefix = CONFIG_QEMU_PREFIX;
586314f2 37
3a4739d6 38#if defined(__i386__) && !defined(CONFIG_STATIC)
f801f97e
FB
39/* Force usage of an ELF interpreter even if it is an ELF shared
40 object ! */
41const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2";
4304763b 42#endif
74cd30b8 43
93ac68bc 44/* for recent libc, we add these dummy symbols which are not declared
74cd30b8 45 when generating a linked object (bug in ld ?) */
fbf59244 46#if (__GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3)) && !defined(CONFIG_STATIC)
c6981055
FB
47long __preinit_array_start[0];
48long __preinit_array_end[0];
74cd30b8
FB
49long __init_array_start[0];
50long __init_array_end[0];
51long __fini_array_start[0];
52long __fini_array_end[0];
53#endif
54
9de5e440
FB
55/* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so
56 we allocate a bigger stack. Need a better solution, for example
57 by remapping the process stack directly at the right place */
58unsigned long x86_stack_size = 512 * 1024;
31e31b8a
FB
59
60void gemu_log(const char *fmt, ...)
61{
62 va_list ap;
63
64 va_start(ap, fmt);
65 vfprintf(stderr, fmt, ap);
66 va_end(ap);
67}
68
61190b14 69void cpu_outb(CPUState *env, int addr, int val)
367e86e8
FB
70{
71 fprintf(stderr, "outb: port=0x%04x, data=%02x\n", addr, val);
72}
73
61190b14 74void cpu_outw(CPUState *env, int addr, int val)
367e86e8
FB
75{
76 fprintf(stderr, "outw: port=0x%04x, data=%04x\n", addr, val);
77}
78
61190b14 79void cpu_outl(CPUState *env, int addr, int val)
367e86e8
FB
80{
81 fprintf(stderr, "outl: port=0x%04x, data=%08x\n", addr, val);
82}
83
61190b14 84int cpu_inb(CPUState *env, int addr)
367e86e8
FB
85{
86 fprintf(stderr, "inb: port=0x%04x\n", addr);
87 return 0;
88}
89
61190b14 90int cpu_inw(CPUState *env, int addr)
367e86e8
FB
91{
92 fprintf(stderr, "inw: port=0x%04x\n", addr);
93 return 0;
94}
95
61190b14 96int cpu_inl(CPUState *env, int addr)
367e86e8
FB
97{
98 fprintf(stderr, "inl: port=0x%04x\n", addr);
99 return 0;
100}
101
a541f297 102int cpu_get_pic_interrupt(CPUState *env)
92ccca6a
FB
103{
104 return -1;
105}
106
28ab0e2e
FB
107/* timers for rdtsc */
108
109#if defined(__i386__)
110
111int64_t cpu_get_real_ticks(void)
112{
113 int64_t val;
114 asm volatile ("rdtsc" : "=A" (val));
115 return val;
116}
117
118#elif defined(__x86_64__)
119
120int64_t cpu_get_real_ticks(void)
121{
122 uint32_t low,high;
123 int64_t val;
124 asm volatile("rdtsc" : "=a" (low), "=d" (high));
125 val = high;
126 val <<= 32;
127 val |= low;
128 return val;
129}
130
131#else
132
133static uint64_t emu_time;
134
135int64_t cpu_get_real_ticks(void)
136{
137 return emu_time++;
138}
139
140#endif
141
a541f297
FB
142#ifdef TARGET_I386
143/***********************************************************/
144/* CPUX86 core interface */
145
28ab0e2e
FB
146uint64_t cpu_get_tsc(CPUX86State *env)
147{
148 return cpu_get_real_ticks();
149}
150
f4beb510
FB
151static void write_dt(void *ptr, unsigned long addr, unsigned long limit,
152 int flags)
6dbad63e 153{
f4beb510 154 unsigned int e1, e2;
6dbad63e
FB
155 e1 = (addr << 16) | (limit & 0xffff);
156 e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000);
f4beb510
FB
157 e2 |= flags;
158 stl((uint8_t *)ptr, e1);
159 stl((uint8_t *)ptr + 4, e2);
160}
161
162static void set_gate(void *ptr, unsigned int type, unsigned int dpl,
163 unsigned long addr, unsigned int sel)
164{
165 unsigned int e1, e2;
166 e1 = (addr & 0xffff) | (sel << 16);
167 e2 = (addr & 0xffff0000) | 0x8000 | (dpl << 13) | (type << 8);
6dbad63e
FB
168 stl((uint8_t *)ptr, e1);
169 stl((uint8_t *)ptr + 4, e2);
170}
171
172uint64_t gdt_table[6];
f4beb510
FB
173uint64_t idt_table[256];
174
175/* only dpl matters as we do only user space emulation */
176static void set_idt(int n, unsigned int dpl)
177{
178 set_gate(idt_table + n, 0, dpl, 0, 0);
179}
31e31b8a 180
89e957e7 181void cpu_loop(CPUX86State *env)
1b6b029e 182{
bc8a22cc 183 int trapnr;
80a9d035 184 target_ulong pc;
9de5e440 185 target_siginfo_t info;
851e67a1 186
1b6b029e 187 for(;;) {
bc8a22cc 188 trapnr = cpu_x86_exec(env);
bc8a22cc 189 switch(trapnr) {
f4beb510
FB
190 case 0x80:
191 /* linux syscall */
192 env->regs[R_EAX] = do_syscall(env,
193 env->regs[R_EAX],
194 env->regs[R_EBX],
195 env->regs[R_ECX],
196 env->regs[R_EDX],
197 env->regs[R_ESI],
198 env->regs[R_EDI],
199 env->regs[R_EBP]);
200 break;
201 case EXCP0B_NOSEG:
202 case EXCP0C_STACK:
203 info.si_signo = SIGBUS;
204 info.si_errno = 0;
205 info.si_code = TARGET_SI_KERNEL;
206 info._sifields._sigfault._addr = 0;
207 queue_signal(info.si_signo, &info);
208 break;
1b6b029e 209 case EXCP0D_GPF:
851e67a1 210 if (env->eflags & VM_MASK) {
89e957e7 211 handle_vm86_fault(env);
1b6b029e 212 } else {
f4beb510
FB
213 info.si_signo = SIGSEGV;
214 info.si_errno = 0;
215 info.si_code = TARGET_SI_KERNEL;
216 info._sifields._sigfault._addr = 0;
217 queue_signal(info.si_signo, &info);
1b6b029e
FB
218 }
219 break;
b689bc57
FB
220 case EXCP0E_PAGE:
221 info.si_signo = SIGSEGV;
222 info.si_errno = 0;
223 if (!(env->error_code & 1))
224 info.si_code = TARGET_SEGV_MAPERR;
225 else
226 info.si_code = TARGET_SEGV_ACCERR;
970a87a6 227 info._sifields._sigfault._addr = env->cr[2];
b689bc57
FB
228 queue_signal(info.si_signo, &info);
229 break;
9de5e440 230 case EXCP00_DIVZ:
bc8a22cc 231 if (env->eflags & VM_MASK) {
447db213 232 handle_vm86_trap(env, trapnr);
bc8a22cc
FB
233 } else {
234 /* division by zero */
235 info.si_signo = SIGFPE;
236 info.si_errno = 0;
237 info.si_code = TARGET_FPE_INTDIV;
238 info._sifields._sigfault._addr = env->eip;
239 queue_signal(info.si_signo, &info);
240 }
9de5e440 241 break;
447db213
FB
242 case EXCP01_SSTP:
243 case EXCP03_INT3:
244 if (env->eflags & VM_MASK) {
245 handle_vm86_trap(env, trapnr);
246 } else {
247 info.si_signo = SIGTRAP;
248 info.si_errno = 0;
249 if (trapnr == EXCP01_SSTP) {
250 info.si_code = TARGET_TRAP_BRKPT;
251 info._sifields._sigfault._addr = env->eip;
252 } else {
253 info.si_code = TARGET_SI_KERNEL;
254 info._sifields._sigfault._addr = 0;
255 }
256 queue_signal(info.si_signo, &info);
257 }
258 break;
9de5e440
FB
259 case EXCP04_INTO:
260 case EXCP05_BOUND:
bc8a22cc 261 if (env->eflags & VM_MASK) {
447db213 262 handle_vm86_trap(env, trapnr);
bc8a22cc
FB
263 } else {
264 info.si_signo = SIGSEGV;
265 info.si_errno = 0;
b689bc57 266 info.si_code = TARGET_SI_KERNEL;
bc8a22cc
FB
267 info._sifields._sigfault._addr = 0;
268 queue_signal(info.si_signo, &info);
269 }
9de5e440
FB
270 break;
271 case EXCP06_ILLOP:
272 info.si_signo = SIGILL;
273 info.si_errno = 0;
274 info.si_code = TARGET_ILL_ILLOPN;
275 info._sifields._sigfault._addr = env->eip;
276 queue_signal(info.si_signo, &info);
277 break;
278 case EXCP_INTERRUPT:
279 /* just indicate that signals should be handled asap */
280 break;
1fddef4b
FB
281 case EXCP_DEBUG:
282 {
283 int sig;
284
285 sig = gdb_handlesig (env, TARGET_SIGTRAP);
286 if (sig)
287 {
288 info.si_signo = sig;
289 info.si_errno = 0;
290 info.si_code = TARGET_TRAP_BRKPT;
291 queue_signal(info.si_signo, &info);
292 }
293 }
294 break;
1b6b029e 295 default:
970a87a6 296 pc = env->segs[R_CS].base + env->eip;
bc8a22cc
FB
297 fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n",
298 (long)pc, trapnr);
1b6b029e
FB
299 abort();
300 }
66fb9763 301 process_pending_signals(env);
1b6b029e
FB
302 }
303}
b346ff46
FB
304#endif
305
306#ifdef TARGET_ARM
307
6f1f31c0
FB
308/* XXX: find a better solution */
309extern void tb_invalidate_page_range(target_ulong start, target_ulong end);
310
311static void arm_cache_flush(target_ulong start, target_ulong last)
312{
313 target_ulong addr, last1;
314
315 if (last < start)
316 return;
317 addr = start;
318 for(;;) {
319 last1 = ((addr + TARGET_PAGE_SIZE) & TARGET_PAGE_MASK) - 1;
320 if (last1 > last)
321 last1 = last;
322 tb_invalidate_page_range(addr, last1 + 1);
323 if (last1 == last)
324 break;
325 addr = last1 + 1;
326 }
327}
328
b346ff46
FB
329void cpu_loop(CPUARMState *env)
330{
331 int trapnr;
332 unsigned int n, insn;
333 target_siginfo_t info;
334
335 for(;;) {
336 trapnr = cpu_arm_exec(env);
337 switch(trapnr) {
338 case EXCP_UDEF:
c6981055
FB
339 {
340 TaskState *ts = env->opaque;
341 uint32_t opcode;
342
343 /* we handle the FPU emulation here, as Linux */
344 /* we get the opcode */
345 opcode = ldl_raw((uint8_t *)env->regs[15]);
346
347 if (EmulateAll(opcode, &ts->fpa, env->regs) == 0) {
348 info.si_signo = SIGILL;
349 info.si_errno = 0;
350 info.si_code = TARGET_ILL_ILLOPN;
351 info._sifields._sigfault._addr = env->regs[15];
352 queue_signal(info.si_signo, &info);
353 } else {
354 /* increment PC */
355 env->regs[15] += 4;
356 }
357 }
b346ff46
FB
358 break;
359 case EXCP_SWI:
360 {
361 /* system call */
362 insn = ldl((void *)(env->regs[15] - 4));
363 n = insn & 0xffffff;
6f1f31c0
FB
364 if (n == ARM_NR_cacheflush) {
365 arm_cache_flush(env->regs[0], env->regs[1]);
366 } else if (n >= ARM_SYSCALL_BASE) {
b346ff46
FB
367 /* linux syscall */
368 n -= ARM_SYSCALL_BASE;
369 env->regs[0] = do_syscall(env,
370 n,
371 env->regs[0],
372 env->regs[1],
373 env->regs[2],
374 env->regs[3],
375 env->regs[4],
376 0);
377 } else {
378 goto error;
379 }
380 }
381 break;
43fff238
FB
382 case EXCP_INTERRUPT:
383 /* just indicate that signals should be handled asap */
384 break;
68016c62
FB
385 case EXCP_PREFETCH_ABORT:
386 case EXCP_DATA_ABORT:
387 {
388 info.si_signo = SIGSEGV;
389 info.si_errno = 0;
390 /* XXX: check env->error_code */
391 info.si_code = TARGET_SEGV_MAPERR;
392 info._sifields._sigfault._addr = env->cp15_6;
393 queue_signal(info.si_signo, &info);
394 }
395 break;
1fddef4b
FB
396 case EXCP_DEBUG:
397 {
398 int sig;
399
400 sig = gdb_handlesig (env, TARGET_SIGTRAP);
401 if (sig)
402 {
403 info.si_signo = sig;
404 info.si_errno = 0;
405 info.si_code = TARGET_TRAP_BRKPT;
406 queue_signal(info.si_signo, &info);
407 }
408 }
409 break;
b346ff46
FB
410 default:
411 error:
412 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
413 trapnr);
7fe48483 414 cpu_dump_state(env, stderr, fprintf, 0);
b346ff46
FB
415 abort();
416 }
417 process_pending_signals(env);
418 }
419}
420
421#endif
1b6b029e 422
93ac68bc
FB
423#ifdef TARGET_SPARC
424
060366c5
FB
425//#define DEBUG_WIN
426
2623cbaf
FB
427/* WARNING: dealing with register windows _is_ complicated. More info
428 can be found at http://www.sics.se/~psm/sparcstack.html */
060366c5
FB
429static inline int get_reg_index(CPUSPARCState *env, int cwp, int index)
430{
431 index = (index + cwp * 16) & (16 * NWINDOWS - 1);
432 /* wrap handling : if cwp is on the last window, then we use the
433 registers 'after' the end */
434 if (index < 8 && env->cwp == (NWINDOWS - 1))
435 index += (16 * NWINDOWS);
436 return index;
437}
438
2623cbaf
FB
439/* save the register window 'cwp1' */
440static inline void save_window_offset(CPUSPARCState *env, int cwp1)
060366c5 441{
2623cbaf 442 unsigned int i;
060366c5
FB
443 uint32_t *sp_ptr;
444
060366c5
FB
445 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
446#if defined(DEBUG_WIN)
447 printf("win_overflow: sp_ptr=0x%x save_cwp=%d\n",
448 (int)sp_ptr, cwp1);
449#endif
2623cbaf
FB
450 for(i = 0; i < 16; i++) {
451 put_user(env->regbase[get_reg_index(env, cwp1, 8 + i)], sp_ptr);
452 sp_ptr++;
453 }
060366c5
FB
454}
455
456static void save_window(CPUSPARCState *env)
457{
2623cbaf
FB
458 unsigned int new_wim;
459 new_wim = ((env->wim >> 1) | (env->wim << (NWINDOWS - 1))) &
460 ((1LL << NWINDOWS) - 1);
461 save_window_offset(env, (env->cwp - 2) & (NWINDOWS - 1));
462 env->wim = new_wim;
060366c5
FB
463}
464
465static void restore_window(CPUSPARCState *env)
466{
467 unsigned int new_wim, i, cwp1;
2623cbaf 468 uint32_t *sp_ptr, reg;
060366c5
FB
469
470 new_wim = ((env->wim << 1) | (env->wim >> (NWINDOWS - 1))) &
471 ((1LL << NWINDOWS) - 1);
472
473 /* restore the invalid window */
474 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
475 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
476#if defined(DEBUG_WIN)
477 printf("win_underflow: sp_ptr=0x%x load_cwp=%d\n",
478 (int)sp_ptr, cwp1);
479#endif
2623cbaf
FB
480 for(i = 0; i < 16; i++) {
481 get_user(reg, sp_ptr);
482 env->regbase[get_reg_index(env, cwp1, 8 + i)] = reg;
483 sp_ptr++;
484 }
060366c5
FB
485 env->wim = new_wim;
486}
487
488static void flush_windows(CPUSPARCState *env)
489{
490 int offset, cwp1;
2623cbaf
FB
491
492 offset = 1;
060366c5
FB
493 for(;;) {
494 /* if restore would invoke restore_window(), then we can stop */
2623cbaf 495 cwp1 = (env->cwp + offset) & (NWINDOWS - 1);
060366c5
FB
496 if (env->wim & (1 << cwp1))
497 break;
2623cbaf 498 save_window_offset(env, cwp1);
060366c5
FB
499 offset++;
500 }
2623cbaf
FB
501 /* set wim so that restore will reload the registers */
502 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
503 env->wim = 1 << cwp1;
504#if defined(DEBUG_WIN)
505 printf("flush_windows: nb=%d\n", offset - 1);
80a9d035 506#endif
2623cbaf 507}
060366c5 508
93ac68bc
FB
509void cpu_loop (CPUSPARCState *env)
510{
060366c5 511 int trapnr, ret;
61ff6f58 512 target_siginfo_t info;
060366c5
FB
513
514 while (1) {
515 trapnr = cpu_sparc_exec (env);
516
517 switch (trapnr) {
518 case 0x88:
519 case 0x90:
520 ret = do_syscall (env, env->gregs[1],
521 env->regwptr[0], env->regwptr[1],
522 env->regwptr[2], env->regwptr[3],
523 env->regwptr[4], env->regwptr[5]);
524 if ((unsigned int)ret >= (unsigned int)(-515)) {
525 env->psr |= PSR_CARRY;
526 ret = -ret;
527 } else {
528 env->psr &= ~PSR_CARRY;
529 }
530 env->regwptr[0] = ret;
531 /* next instruction */
532 env->pc = env->npc;
533 env->npc = env->npc + 4;
534 break;
535 case 0x83: /* flush windows */
2623cbaf 536 flush_windows(env);
060366c5
FB
537 /* next instruction */
538 env->pc = env->npc;
539 env->npc = env->npc + 4;
540 break;
541 case TT_WIN_OVF: /* window overflow */
542 save_window(env);
543 break;
544 case TT_WIN_UNF: /* window underflow */
545 restore_window(env);
546 break;
61ff6f58
FB
547 case TT_TFAULT:
548 case TT_DFAULT:
549 {
550 info.si_signo = SIGSEGV;
551 info.si_errno = 0;
552 /* XXX: check env->error_code */
553 info.si_code = TARGET_SEGV_MAPERR;
554 info._sifields._sigfault._addr = env->mmuregs[4];
555 queue_signal(info.si_signo, &info);
556 }
557 break;
e80cfcfc
FB
558 case 0x100: // XXX, why do we get these?
559 break;
1fddef4b
FB
560 case EXCP_DEBUG:
561 {
562 int sig;
563
564 sig = gdb_handlesig (env, TARGET_SIGTRAP);
565 if (sig)
566 {
567 info.si_signo = sig;
568 info.si_errno = 0;
569 info.si_code = TARGET_TRAP_BRKPT;
570 queue_signal(info.si_signo, &info);
571 }
572 }
573 break;
060366c5
FB
574 default:
575 printf ("Unhandled trap: 0x%x\n", trapnr);
7fe48483 576 cpu_dump_state(env, stderr, fprintf, 0);
060366c5
FB
577 exit (1);
578 }
579 process_pending_signals (env);
580 }
93ac68bc
FB
581}
582
583#endif
584
67867308 585#ifdef TARGET_PPC
9fddaa0c
FB
586
587static inline uint64_t cpu_ppc_get_tb (CPUState *env)
588{
589 /* TO FIX */
590 return 0;
591}
592
593uint32_t cpu_ppc_load_tbl (CPUState *env)
594{
595 return cpu_ppc_get_tb(env) & 0xFFFFFFFF;
596}
597
598uint32_t cpu_ppc_load_tbu (CPUState *env)
599{
600 return cpu_ppc_get_tb(env) >> 32;
601}
602
603static void cpu_ppc_store_tb (CPUState *env, uint64_t value)
604{
605 /* TO FIX */
606}
607
608void cpu_ppc_store_tbu (CPUState *env, uint32_t value)
609{
610 cpu_ppc_store_tb(env, ((uint64_t)value << 32) | cpu_ppc_load_tbl(env));
611}
612
613void cpu_ppc_store_tbl (CPUState *env, uint32_t value)
614{
615 cpu_ppc_store_tb(env, ((uint64_t)cpu_ppc_load_tbl(env) << 32) | value);
616}
617
618uint32_t cpu_ppc_load_decr (CPUState *env)
619{
620 /* TO FIX */
621 return -1;
622}
623
624void cpu_ppc_store_decr (CPUState *env, uint32_t value)
625{
626 /* TO FIX */
627}
628
67867308
FB
629void cpu_loop(CPUPPCState *env)
630{
67867308 631 target_siginfo_t info;
61190b14
FB
632 int trapnr;
633 uint32_t ret;
67867308
FB
634
635 for(;;) {
636 trapnr = cpu_ppc_exec(env);
61190b14
FB
637 if (trapnr != EXCP_SYSCALL_USER && trapnr != EXCP_BRANCH &&
638 trapnr != EXCP_TRACE) {
639 if (loglevel > 0) {
7fe48483 640 cpu_dump_state(env, logfile, fprintf, 0);
61190b14
FB
641 }
642 }
67867308
FB
643 switch(trapnr) {
644 case EXCP_NONE:
67867308 645 break;
61190b14
FB
646 case EXCP_SYSCALL_USER:
647 /* system call */
648 /* WARNING:
649 * PPC ABI uses overflow flag in cr0 to signal an error
650 * in syscalls.
651 */
67867308 652#if 0
61190b14
FB
653 printf("syscall %d 0x%08x 0x%08x 0x%08x 0x%08x\n", env->gpr[0],
654 env->gpr[3], env->gpr[4], env->gpr[5], env->gpr[6]);
67867308 655#endif
61190b14
FB
656 env->crf[0] &= ~0x1;
657 ret = do_syscall(env, env->gpr[0], env->gpr[3], env->gpr[4],
658 env->gpr[5], env->gpr[6], env->gpr[7],
659 env->gpr[8]);
660 if (ret > (uint32_t)(-515)) {
661 env->crf[0] |= 0x1;
662 ret = -ret;
663 }
664 env->gpr[3] = ret;
665#if 0
666 printf("syscall returned 0x%08x (%d)\n", ret, ret);
667#endif
668 break;
669 case EXCP_RESET:
670 /* Should not happen ! */
671 fprintf(stderr, "RESET asked... Stop emulation\n");
672 if (loglevel)
673 fprintf(logfile, "RESET asked... Stop emulation\n");
67867308 674 abort();
61190b14
FB
675 case EXCP_MACHINE_CHECK:
676 fprintf(stderr, "Machine check exeption... Stop emulation\n");
677 if (loglevel)
678 fprintf(logfile, "RESET asked... Stop emulation\n");
679 info.si_signo = TARGET_SIGBUS;
67867308 680 info.si_errno = 0;
61190b14
FB
681 info.si_code = TARGET_BUS_OBJERR;
682 info._sifields._sigfault._addr = env->nip - 4;
683 queue_signal(info.si_signo, &info);
684 case EXCP_DSI:
685 fprintf(stderr, "Invalid data memory access: 0x%08x\n", env->spr[DAR]);
686 if (loglevel) {
687 fprintf(logfile, "Invalid data memory access: 0x%08x\n",
688 env->spr[DAR]);
689 }
690 switch (env->error_code & 0xF) {
691 case EXCP_DSI_TRANSLATE:
692 info.si_signo = TARGET_SIGSEGV;
693 info.si_errno = 0;
694 info.si_code = TARGET_SEGV_MAPERR;
695 break;
696 case EXCP_DSI_NOTSUP:
697 case EXCP_DSI_EXTERNAL:
698 info.si_signo = TARGET_SIGILL;
699 info.si_errno = 0;
700 info.si_code = TARGET_ILL_ILLADR;
701 break;
702 case EXCP_DSI_PROT:
703 info.si_signo = TARGET_SIGSEGV;
704 info.si_errno = 0;
705 info.si_code = TARGET_SEGV_ACCERR;
706 break;
707 case EXCP_DSI_DABR:
708 info.si_signo = TARGET_SIGTRAP;
709 info.si_errno = 0;
710 info.si_code = TARGET_TRAP_BRKPT;
711 break;
712 default:
713 /* Let's send a regular segfault... */
714 fprintf(stderr, "Invalid segfault errno (%02x)\n",
715 env->error_code);
716 if (loglevel) {
717 fprintf(logfile, "Invalid segfault errno (%02x)\n",
718 env->error_code);
719 }
720 info.si_signo = TARGET_SIGSEGV;
721 info.si_errno = 0;
722 info.si_code = TARGET_SEGV_MAPERR;
723 break;
724 }
67867308
FB
725 info._sifields._sigfault._addr = env->nip;
726 queue_signal(info.si_signo, &info);
727 break;
61190b14 728 case EXCP_ISI:
67867308 729 fprintf(stderr, "Invalid instruction fetch\n");
61190b14
FB
730 if (loglevel)
731 fprintf(logfile, "Invalid instruction fetch\n");
732 switch (env->error_code) {
733 case EXCP_ISI_TRANSLATE:
734 info.si_signo = TARGET_SIGSEGV;
67867308 735 info.si_errno = 0;
61190b14
FB
736 info.si_code = TARGET_SEGV_MAPERR;
737 break;
738 case EXCP_ISI_GUARD:
739 info.si_signo = TARGET_SIGILL;
740 info.si_errno = 0;
741 info.si_code = TARGET_ILL_ILLADR;
742 break;
743 case EXCP_ISI_NOEXEC:
744 case EXCP_ISI_PROT:
745 info.si_signo = TARGET_SIGSEGV;
746 info.si_errno = 0;
747 info.si_code = TARGET_SEGV_ACCERR;
748 break;
749 default:
750 /* Let's send a regular segfault... */
751 fprintf(stderr, "Invalid segfault errno (%02x)\n",
752 env->error_code);
753 if (loglevel) {
754 fprintf(logfile, "Invalid segfault errno (%02x)\n",
755 env->error_code);
756 }
757 info.si_signo = TARGET_SIGSEGV;
758 info.si_errno = 0;
759 info.si_code = TARGET_SEGV_MAPERR;
760 break;
761 }
762 info._sifields._sigfault._addr = env->nip - 4;
67867308
FB
763 queue_signal(info.si_signo, &info);
764 break;
61190b14
FB
765 case EXCP_EXTERNAL:
766 /* Should not happen ! */
767 fprintf(stderr, "External interruption... Stop emulation\n");
768 if (loglevel)
769 fprintf(logfile, "External interruption... Stop emulation\n");
67867308 770 abort();
61190b14
FB
771 case EXCP_ALIGN:
772 fprintf(stderr, "Invalid unaligned memory access\n");
773 if (loglevel)
774 fprintf(logfile, "Invalid unaligned memory access\n");
775 info.si_signo = TARGET_SIGBUS;
67867308 776 info.si_errno = 0;
61190b14
FB
777 info.si_code = TARGET_BUS_ADRALN;
778 info._sifields._sigfault._addr = env->nip - 4;
67867308
FB
779 queue_signal(info.si_signo, &info);
780 break;
61190b14
FB
781 case EXCP_PROGRAM:
782 switch (env->error_code & ~0xF) {
783 case EXCP_FP:
784 fprintf(stderr, "Program exception\n");
785 if (loglevel)
786 fprintf(logfile, "Program exception\n");
787 /* Set FX */
788 env->fpscr[7] |= 0x8;
789 /* Finally, update FEX */
790 if ((((env->fpscr[7] & 0x3) << 3) | (env->fpscr[6] >> 1)) &
791 ((env->fpscr[1] << 1) | (env->fpscr[0] >> 3)))
792 env->fpscr[7] |= 0x4;
793 info.si_signo = TARGET_SIGFPE;
794 info.si_errno = 0;
795 switch (env->error_code & 0xF) {
796 case EXCP_FP_OX:
797 info.si_code = TARGET_FPE_FLTOVF;
798 break;
799 case EXCP_FP_UX:
800 info.si_code = TARGET_FPE_FLTUND;
801 break;
802 case EXCP_FP_ZX:
803 case EXCP_FP_VXZDZ:
804 info.si_code = TARGET_FPE_FLTDIV;
805 break;
806 case EXCP_FP_XX:
807 info.si_code = TARGET_FPE_FLTRES;
808 break;
809 case EXCP_FP_VXSOFT:
810 info.si_code = TARGET_FPE_FLTINV;
811 break;
812 case EXCP_FP_VXNAN:
813 case EXCP_FP_VXISI:
814 case EXCP_FP_VXIDI:
815 case EXCP_FP_VXIMZ:
816 case EXCP_FP_VXVC:
817 case EXCP_FP_VXSQRT:
818 case EXCP_FP_VXCVI:
819 info.si_code = TARGET_FPE_FLTSUB;
820 break;
821 default:
822 fprintf(stderr, "Unknown floating point exception "
823 "(%02x)\n", env->error_code);
824 if (loglevel) {
825 fprintf(logfile, "Unknown floating point exception "
826 "(%02x)\n", env->error_code & 0xF);
827 }
828 }
829 break;
67867308 830 case EXCP_INVAL:
61190b14
FB
831 fprintf(stderr, "Invalid instruction\n");
832 if (loglevel)
833 fprintf(logfile, "Invalid instruction\n");
834 info.si_signo = TARGET_SIGILL;
835 info.si_errno = 0;
836 switch (env->error_code & 0xF) {
837 case EXCP_INVAL_INVAL:
838 info.si_code = TARGET_ILL_ILLOPC;
839 break;
840 case EXCP_INVAL_LSWX:
67867308 841 info.si_code = TARGET_ILL_ILLOPN;
61190b14
FB
842 break;
843 case EXCP_INVAL_SPR:
844 info.si_code = TARGET_ILL_PRVREG;
845 break;
846 case EXCP_INVAL_FP:
847 info.si_code = TARGET_ILL_COPROC;
848 break;
849 default:
850 fprintf(stderr, "Unknown invalid operation (%02x)\n",
851 env->error_code & 0xF);
852 if (loglevel) {
853 fprintf(logfile, "Unknown invalid operation (%02x)\n",
854 env->error_code & 0xF);
855 }
856 info.si_code = TARGET_ILL_ILLADR;
857 break;
858 }
859 break;
860 case EXCP_PRIV:
861 fprintf(stderr, "Privilege violation\n");
862 if (loglevel)
863 fprintf(logfile, "Privilege violation\n");
864 info.si_signo = TARGET_SIGILL;
865 info.si_errno = 0;
866 switch (env->error_code & 0xF) {
867 case EXCP_PRIV_OPC:
868 info.si_code = TARGET_ILL_PRVOPC;
869 break;
870 case EXCP_PRIV_REG:
871 info.si_code = TARGET_ILL_PRVREG;
872 break;
873 default:
874 fprintf(stderr, "Unknown privilege violation (%02x)\n",
875 env->error_code & 0xF);
876 info.si_code = TARGET_ILL_PRVOPC;
877 break;
878 }
879 break;
880 case EXCP_TRAP:
881 fprintf(stderr, "Tried to call a TRAP\n");
882 if (loglevel)
883 fprintf(logfile, "Tried to call a TRAP\n");
884 abort();
885 default:
886 /* Should not happen ! */
887 fprintf(stderr, "Unknown program exception (%02x)\n",
888 env->error_code);
889 if (loglevel) {
890 fprintf(logfile, "Unknwon program exception (%02x)\n",
891 env->error_code);
892 }
893 abort();
894 }
895 info._sifields._sigfault._addr = env->nip - 4;
67867308
FB
896 queue_signal(info.si_signo, &info);
897 break;
61190b14
FB
898 case EXCP_NO_FP:
899 fprintf(stderr, "No floating point allowed\n");
900 if (loglevel)
901 fprintf(logfile, "No floating point allowed\n");
902 info.si_signo = TARGET_SIGILL;
67867308 903 info.si_errno = 0;
61190b14
FB
904 info.si_code = TARGET_ILL_COPROC;
905 info._sifields._sigfault._addr = env->nip - 4;
67867308
FB
906 queue_signal(info.si_signo, &info);
907 break;
61190b14
FB
908 case EXCP_DECR:
909 /* Should not happen ! */
910 fprintf(stderr, "Decrementer exception\n");
911 if (loglevel)
912 fprintf(logfile, "Decrementer exception\n");
913 abort();
67867308 914 case EXCP_RESA: /* Implementation specific */
61190b14
FB
915 /* Should not happen ! */
916 fprintf(stderr, "RESA exception should never happen !\n");
917 if (loglevel)
918 fprintf(logfile, "RESA exception should never happen !\n");
919 abort();
67867308 920 case EXCP_RESB: /* Implementation specific */
61190b14
FB
921 /* Should not happen ! */
922 fprintf(stderr, "RESB exception should never happen !\n");
923 if (loglevel)
924 fprintf(logfile, "RESB exception should never happen !\n");
67867308 925 abort();
61190b14
FB
926 case EXCP_TRACE:
927 /* Do nothing: we use this to trace execution */
67867308 928 break;
61190b14
FB
929 case EXCP_FP_ASSIST:
930 /* Should not happen ! */
931 fprintf(stderr, "Floating point assist exception\n");
932 if (loglevel)
933 fprintf(logfile, "Floating point assist exception\n");
934 abort();
935 case EXCP_MTMSR:
936 /* We reloaded the msr, just go on */
9fddaa0c 937 if (msr_pr == 0) {
61190b14
FB
938 fprintf(stderr, "Tried to go into supervisor mode !\n");
939 if (loglevel)
940 fprintf(logfile, "Tried to go into supervisor mode !\n");
941 abort();
67867308 942 }
61190b14
FB
943 break;
944 case EXCP_BRANCH:
945 /* We stopped because of a jump... */
946 break;
947 case EXCP_RFI:
948 /* Should not occur: we always are in user mode */
949 fprintf(stderr, "Return from interrupt ?\n");
950 if (loglevel)
951 fprintf(logfile, "Return from interrupt ?\n");
952 abort();
953 case EXCP_INTERRUPT:
954 /* Don't know why this should ever happen... */
955 break;
1fddef4b
FB
956 case EXCP_DEBUG:
957 {
958 int sig;
959
960 sig = gdb_handlesig (env, TARGET_SIGTRAP);
961 if (sig)
962 {
963 info.si_signo = sig;
964 info.si_errno = 0;
965 info.si_code = TARGET_TRAP_BRKPT;
966 queue_signal(info.si_signo, &info);
967 }
968 }
969 break;
67867308 970 default:
67867308
FB
971 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
972 trapnr);
61190b14
FB
973 if (loglevel) {
974 fprintf(logfile, "qemu: unhandled CPU exception 0x%02x - "
975 "0x%02x - aborting\n", trapnr, env->error_code);
976 }
67867308
FB
977 abort();
978 }
979 process_pending_signals(env);
980 }
981}
982#endif
983
31e31b8a
FB
984void usage(void)
985{
4606bb3f 986 printf("qemu-" TARGET_ARCH " version " QEMU_VERSION ", Copyright (c) 2003-2004 Fabrice Bellard\n"
1fddef4b 987 "usage: qemu-" TARGET_ARCH " [-h] [-g] [-d opts] [-L path] [-s size] program [arguments...]\n"
b346ff46 988 "Linux CPU emulator (compiled for %s emulation)\n"
d691f669 989 "\n"
54936004 990 "-h print this help\n"
1fddef4b 991 "-g wait gdb connection to port %d\n"
b346ff46
FB
992 "-L path set the elf interpreter prefix (default=%s)\n"
993 "-s size set the stack size in bytes (default=%ld)\n"
54936004
FB
994 "\n"
995 "debug options:\n"
c6981055
FB
996#ifdef USE_CODE_COPY
997 "-no-code-copy disable code copy acceleration\n"
998#endif
6f1f31c0 999 "-d options activate log (logfile=%s)\n"
54936004 1000 "-p pagesize set the host page size to 'pagesize'\n",
b346ff46 1001 TARGET_ARCH,
1fddef4b 1002 DEFAULT_GDBSTUB_PORT,
d691f669 1003 interp_prefix,
54936004
FB
1004 x86_stack_size,
1005 DEBUG_LOGFILE);
74cd30b8 1006 _exit(1);
31e31b8a
FB
1007}
1008
9de5e440 1009/* XXX: currently only used for async signals (see signal.c) */
b346ff46 1010CPUState *global_env;
59faf6d6
FB
1011/* used only if single thread */
1012CPUState *cpu_single_env = NULL;
1013
851e67a1
FB
1014/* used to free thread contexts */
1015TaskState *first_task_state;
9de5e440 1016
31e31b8a
FB
1017int main(int argc, char **argv)
1018{
1019 const char *filename;
01ffc75b 1020 struct target_pt_regs regs1, *regs = &regs1;
31e31b8a 1021 struct image_info info1, *info = &info1;
851e67a1 1022 TaskState ts1, *ts = &ts1;
b346ff46 1023 CPUState *env;
586314f2 1024 int optind;
d691f669 1025 const char *r;
1fddef4b 1026 int use_gdbstub = 0;
d691f669 1027
31e31b8a
FB
1028 if (argc <= 1)
1029 usage();
f801f97e 1030
cc38b844
FB
1031 /* init debug */
1032 cpu_set_log_filename(DEBUG_LOGFILE);
1033
586314f2 1034 optind = 1;
d691f669
FB
1035 for(;;) {
1036 if (optind >= argc)
1037 break;
1038 r = argv[optind];
1039 if (r[0] != '-')
1040 break;
586314f2 1041 optind++;
d691f669
FB
1042 r++;
1043 if (!strcmp(r, "-")) {
1044 break;
1045 } else if (!strcmp(r, "d")) {
e19e89a5
FB
1046 int mask;
1047 CPULogItem *item;
6f1f31c0
FB
1048
1049 if (optind >= argc)
1050 break;
e19e89a5 1051
6f1f31c0
FB
1052 r = argv[optind++];
1053 mask = cpu_str_to_log_mask(r);
e19e89a5
FB
1054 if (!mask) {
1055 printf("Log items (comma separated):\n");
1056 for(item = cpu_log_items; item->mask != 0; item++) {
1057 printf("%-10s %s\n", item->name, item->help);
1058 }
1059 exit(1);
1060 }
1061 cpu_set_log(mask);
d691f669
FB
1062 } else if (!strcmp(r, "s")) {
1063 r = argv[optind++];
1064 x86_stack_size = strtol(r, (char **)&r, 0);
1065 if (x86_stack_size <= 0)
1066 usage();
1067 if (*r == 'M')
1068 x86_stack_size *= 1024 * 1024;
1069 else if (*r == 'k' || *r == 'K')
1070 x86_stack_size *= 1024;
1071 } else if (!strcmp(r, "L")) {
1072 interp_prefix = argv[optind++];
54936004 1073 } else if (!strcmp(r, "p")) {
83fb7adf
FB
1074 qemu_host_page_size = atoi(argv[optind++]);
1075 if (qemu_host_page_size == 0 ||
1076 (qemu_host_page_size & (qemu_host_page_size - 1)) != 0) {
54936004
FB
1077 fprintf(stderr, "page size must be a power of two\n");
1078 exit(1);
1079 }
1fddef4b
FB
1080 } else if (!strcmp(r, "g")) {
1081 use_gdbstub = 1;
c6981055
FB
1082 } else
1083#ifdef USE_CODE_COPY
1084 if (!strcmp(r, "no-code-copy")) {
1085 code_copy_enabled = 0;
1086 } else
1087#endif
1088 {
d691f669
FB
1089 usage();
1090 }
586314f2 1091 }
d691f669
FB
1092 if (optind >= argc)
1093 usage();
586314f2
FB
1094 filename = argv[optind];
1095
31e31b8a 1096 /* Zero out regs */
01ffc75b 1097 memset(regs, 0, sizeof(struct target_pt_regs));
31e31b8a
FB
1098
1099 /* Zero out image_info */
1100 memset(info, 0, sizeof(struct image_info));
1101
74cd30b8
FB
1102 /* Scan interp_prefix dir for replacement files. */
1103 init_paths(interp_prefix);
1104
83fb7adf
FB
1105 /* NOTE: we need to init the CPU at this stage to get
1106 qemu_host_page_size */
b346ff46 1107 env = cpu_init();
92ccca6a 1108
74cd30b8 1109 if (elf_exec(filename, argv+optind, environ, regs, info) != 0) {
31e31b8a 1110 printf("Error loading %s\n", filename);
74cd30b8 1111 _exit(1);
31e31b8a
FB
1112 }
1113
4b74fe1f 1114 if (loglevel) {
54936004
FB
1115 page_dump(logfile);
1116
4b74fe1f
FB
1117 fprintf(logfile, "start_brk 0x%08lx\n" , info->start_brk);
1118 fprintf(logfile, "end_code 0x%08lx\n" , info->end_code);
1119 fprintf(logfile, "start_code 0x%08lx\n" , info->start_code);
1120 fprintf(logfile, "end_data 0x%08lx\n" , info->end_data);
1121 fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack);
1122 fprintf(logfile, "brk 0x%08lx\n" , info->brk);
b346ff46 1123 fprintf(logfile, "entry 0x%08lx\n" , info->entry);
4b74fe1f 1124 }
31e31b8a
FB
1125
1126 target_set_brk((char *)info->brk);
1127 syscall_init();
66fb9763 1128 signal_init();
31e31b8a 1129
9de5e440 1130 global_env = env;
0ecfa993 1131
851e67a1
FB
1132 /* build Task State */
1133 memset(ts, 0, sizeof(TaskState));
1134 env->opaque = ts;
1135 ts->used = 1;
59faf6d6 1136 env->user_mode_only = 1;
851e67a1 1137
b346ff46 1138#if defined(TARGET_I386)
2e255c6b
FB
1139 cpu_x86_set_cpl(env, 3);
1140
3802ce26 1141 env->cr[0] = CR0_PG_MASK | CR0_WP_MASK | CR0_PE_MASK;
1bde465e
FB
1142 env->hflags |= HF_PE_MASK;
1143 if (env->cpuid_features & CPUID_SSE) {
1144 env->cr[4] |= CR4_OSFXSR_MASK;
1145 env->hflags |= HF_OSFXSR_MASK;
1146 }
1147
415e561f
FB
1148 /* flags setup : we activate the IRQs by default as in user mode */
1149 env->eflags |= IF_MASK;
1150
6dbad63e 1151 /* linux register setup */
0ecfa993
FB
1152 env->regs[R_EAX] = regs->eax;
1153 env->regs[R_EBX] = regs->ebx;
1154 env->regs[R_ECX] = regs->ecx;
1155 env->regs[R_EDX] = regs->edx;
1156 env->regs[R_ESI] = regs->esi;
1157 env->regs[R_EDI] = regs->edi;
1158 env->regs[R_EBP] = regs->ebp;
1159 env->regs[R_ESP] = regs->esp;
dab2ed99 1160 env->eip = regs->eip;
31e31b8a 1161
f4beb510 1162 /* linux interrupt setup */
80a9d035 1163 env->idt.base = (long)idt_table;
f4beb510
FB
1164 env->idt.limit = sizeof(idt_table) - 1;
1165 set_idt(0, 0);
1166 set_idt(1, 0);
1167 set_idt(2, 0);
1168 set_idt(3, 3);
1169 set_idt(4, 3);
1170 set_idt(5, 3);
1171 set_idt(6, 0);
1172 set_idt(7, 0);
1173 set_idt(8, 0);
1174 set_idt(9, 0);
1175 set_idt(10, 0);
1176 set_idt(11, 0);
1177 set_idt(12, 0);
1178 set_idt(13, 0);
1179 set_idt(14, 0);
1180 set_idt(15, 0);
1181 set_idt(16, 0);
1182 set_idt(17, 0);
1183 set_idt(18, 0);
1184 set_idt(19, 0);
1185 set_idt(0x80, 3);
1186
6dbad63e 1187 /* linux segment setup */
80a9d035 1188 env->gdt.base = (long)gdt_table;
6dbad63e 1189 env->gdt.limit = sizeof(gdt_table) - 1;
f4beb510
FB
1190 write_dt(&gdt_table[__USER_CS >> 3], 0, 0xfffff,
1191 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
1192 (3 << DESC_DPL_SHIFT) | (0xa << DESC_TYPE_SHIFT));
1193 write_dt(&gdt_table[__USER_DS >> 3], 0, 0xfffff,
1194 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
1195 (3 << DESC_DPL_SHIFT) | (0x2 << DESC_TYPE_SHIFT));
6dbad63e
FB
1196 cpu_x86_load_seg(env, R_CS, __USER_CS);
1197 cpu_x86_load_seg(env, R_DS, __USER_DS);
1198 cpu_x86_load_seg(env, R_ES, __USER_DS);
1199 cpu_x86_load_seg(env, R_SS, __USER_DS);
1200 cpu_x86_load_seg(env, R_FS, __USER_DS);
1201 cpu_x86_load_seg(env, R_GS, __USER_DS);
92ccca6a 1202
b346ff46
FB
1203#elif defined(TARGET_ARM)
1204 {
1205 int i;
1206 for(i = 0; i < 16; i++) {
1207 env->regs[i] = regs->uregs[i];
1208 }
1209 env->cpsr = regs->uregs[16];
1210 }
93ac68bc 1211#elif defined(TARGET_SPARC)
060366c5
FB
1212 {
1213 int i;
1214 env->pc = regs->pc;
1215 env->npc = regs->npc;
1216 env->y = regs->y;
1217 for(i = 0; i < 8; i++)
1218 env->gregs[i] = regs->u_regs[i];
1219 for(i = 0; i < 8; i++)
1220 env->regwptr[i] = regs->u_regs[i + 8];
1221 }
67867308
FB
1222#elif defined(TARGET_PPC)
1223 {
1224 int i;
61190b14 1225 for (i = 0; i < 32; i++) {
4c2e770f 1226 if (i != 12 && i != 6 && i != 13)
61190b14
FB
1227 env->msr[i] = (regs->msr >> i) & 1;
1228 }
67867308
FB
1229 env->nip = regs->nip;
1230 for(i = 0; i < 32; i++) {
1231 env->gpr[i] = regs->gpr[i];
1232 }
1233 }
b346ff46
FB
1234#else
1235#error unsupported target CPU
1236#endif
31e31b8a 1237
1fddef4b
FB
1238 if (use_gdbstub) {
1239 gdbserver_start (DEFAULT_GDBSTUB_PORT);
1240 gdb_handlesig(env, 0);
1241 }
1b6b029e
FB
1242 cpu_loop(env);
1243 /* never exits */
31e31b8a
FB
1244 return 0;
1245}
This page took 0.262416 seconds and 4 git commands to generate.