]> git.proxmox.com Git - mirror_qemu.git/blame - disas.c
s390x/skeys: Fix instance and class size
[mirror_qemu.git] / disas.c
CommitLineData
b9adb4a6 1/* General "disassemble this chunk" code. Used for debugging. */
5bbe9299 2#include "config.h"
37b9de46 3#include "qemu-common.h"
76cad711 4#include "disas/bfd.h"
b9adb4a6 5#include "elf.h"
aa0aa4fa 6#include <errno.h>
b9adb4a6 7
c6105c0a 8#include "cpu.h"
76cad711 9#include "disas/disas.h"
c6105c0a 10
f4359b9f
BS
11typedef struct CPUDebug {
12 struct disassemble_info info;
d49190c4 13 CPUState *cpu;
f4359b9f
BS
14} CPUDebug;
15
b9adb4a6 16/* Filled in by elfload.c. Simplistic, but will do for now. */
e80cfcfc 17struct syminfo *syminfos = NULL;
b9adb4a6 18
aa0aa4fa
FB
19/* Get LENGTH bytes from info's buffer, at target address memaddr.
20 Transfer them to myaddr. */
21int
3a742b76
PB
22buffer_read_memory(bfd_vma memaddr, bfd_byte *myaddr, int length,
23 struct disassemble_info *info)
aa0aa4fa 24{
c6105c0a
FB
25 if (memaddr < info->buffer_vma
26 || memaddr + length > info->buffer_vma + info->buffer_length)
27 /* Out of bounds. Use EIO because GDB uses it. */
28 return EIO;
29 memcpy (myaddr, info->buffer + (memaddr - info->buffer_vma), length);
30 return 0;
aa0aa4fa
FB
31}
32
c6105c0a
FB
33/* Get LENGTH bytes from info's buffer, at target address memaddr.
34 Transfer them to myaddr. */
35static int
c27004ec
FB
36target_read_memory (bfd_vma memaddr,
37 bfd_byte *myaddr,
38 int length,
39 struct disassemble_info *info)
c6105c0a 40{
f4359b9f
BS
41 CPUDebug *s = container_of(info, CPUDebug, info);
42
d49190c4 43 cpu_memory_rw_debug(s->cpu, memaddr, myaddr, length, 0);
c6105c0a
FB
44 return 0;
45}
c6105c0a 46
aa0aa4fa
FB
47/* Print an error message. We can assume that this is in response to
48 an error return from buffer_read_memory. */
49void
3a742b76 50perror_memory (int status, bfd_vma memaddr, struct disassemble_info *info)
aa0aa4fa
FB
51{
52 if (status != EIO)
53 /* Can't happen. */
54 (*info->fprintf_func) (info->stream, "Unknown error %d\n", status);
55 else
56 /* Actually, address between memaddr and memaddr + len was
57 out of bounds. */
58 (*info->fprintf_func) (info->stream,
26a76461 59 "Address 0x%" PRIx64 " is out of bounds.\n", memaddr);
aa0aa4fa
FB
60}
61
a31f0531 62/* This could be in a separate file, to save minuscule amounts of space
aa0aa4fa
FB
63 in statically linked executables. */
64
65/* Just print the address is hex. This is included for completeness even
66 though both GDB and objdump provide their own (to print symbolic
67 addresses). */
68
69void
3a742b76 70generic_print_address (bfd_vma addr, struct disassemble_info *info)
aa0aa4fa 71{
26a76461 72 (*info->fprintf_func) (info->stream, "0x%" PRIx64, addr);
aa0aa4fa
FB
73}
74
636bd289
PM
75/* Print address in hex, truncated to the width of a host virtual address. */
76static void
77generic_print_host_address(bfd_vma addr, struct disassemble_info *info)
78{
79 uint64_t mask = ~0ULL >> (64 - (sizeof(void *) * 8));
80 generic_print_address(addr & mask, info);
81}
82
aa0aa4fa
FB
83/* Just return the given address. */
84
85int
3a742b76 86generic_symbol_at_address (bfd_vma addr, struct disassemble_info *info)
aa0aa4fa
FB
87{
88 return 1;
89}
90
903ec55c
AJ
91bfd_vma bfd_getl64 (const bfd_byte *addr)
92{
93 unsigned long long v;
94
95 v = (unsigned long long) addr[0];
96 v |= (unsigned long long) addr[1] << 8;
97 v |= (unsigned long long) addr[2] << 16;
98 v |= (unsigned long long) addr[3] << 24;
99 v |= (unsigned long long) addr[4] << 32;
100 v |= (unsigned long long) addr[5] << 40;
101 v |= (unsigned long long) addr[6] << 48;
102 v |= (unsigned long long) addr[7] << 56;
103 return (bfd_vma) v;
104}
105
aa0aa4fa
FB
106bfd_vma bfd_getl32 (const bfd_byte *addr)
107{
108 unsigned long v;
109
110 v = (unsigned long) addr[0];
111 v |= (unsigned long) addr[1] << 8;
112 v |= (unsigned long) addr[2] << 16;
113 v |= (unsigned long) addr[3] << 24;
114 return (bfd_vma) v;
115}
116
117bfd_vma bfd_getb32 (const bfd_byte *addr)
118{
119 unsigned long v;
120
121 v = (unsigned long) addr[0] << 24;
122 v |= (unsigned long) addr[1] << 16;
123 v |= (unsigned long) addr[2] << 8;
124 v |= (unsigned long) addr[3];
125 return (bfd_vma) v;
126}
127
6af0bf9c
FB
128bfd_vma bfd_getl16 (const bfd_byte *addr)
129{
130 unsigned long v;
131
132 v = (unsigned long) addr[0];
133 v |= (unsigned long) addr[1] << 8;
134 return (bfd_vma) v;
135}
136
137bfd_vma bfd_getb16 (const bfd_byte *addr)
138{
139 unsigned long v;
140
141 v = (unsigned long) addr[0] << 24;
142 v |= (unsigned long) addr[1] << 16;
143 return (bfd_vma) v;
144}
145
c46ffd57
RH
146static int print_insn_objdump(bfd_vma pc, disassemble_info *info,
147 const char *prefix)
148{
149 int i, n = info->buffer_length;
150 uint8_t *buf = g_malloc(n);
151
152 info->read_memory_func(pc, buf, n, info);
153
154 for (i = 0; i < n; ++i) {
155 if (i % 32 == 0) {
156 info->fprintf_func(info->stream, "\n%s: ", prefix);
157 }
158 info->fprintf_func(info->stream, "%02x", buf[i]);
159 }
160
161 g_free(buf);
162 return n;
163}
164
165static int print_insn_od_host(bfd_vma pc, disassemble_info *info)
166{
167 return print_insn_objdump(pc, info, "OBJD-H");
168}
169
170static int print_insn_od_target(bfd_vma pc, disassemble_info *info)
171{
172 return print_insn_objdump(pc, info, "OBJD-T");
173}
174
e91c8a77 175/* Disassemble this for me please... (debugging). 'flags' has the following
c2d551ff 176 values:
e99722f6 177 i386 - 1 means 16 bit code, 2 means 64 bit code
e13951f8
TM
178 ppc - bits 0:15 specify (optionally) the machine instruction set;
179 bit 16 indicates little endian.
c2d551ff
FB
180 other targets - unused
181 */
d49190c4 182void target_disas(FILE *out, CPUState *cpu, target_ulong code,
f4359b9f 183 target_ulong size, int flags)
b9adb4a6 184{
37b9de46 185 CPUClass *cc = CPU_GET_CLASS(cpu);
c27004ec 186 target_ulong pc;
b9adb4a6 187 int count;
f4359b9f 188 CPUDebug s;
b9adb4a6 189
f4359b9f 190 INIT_DISASSEMBLE_INFO(s.info, out, fprintf);
b9adb4a6 191
d49190c4 192 s.cpu = cpu;
f4359b9f
BS
193 s.info.read_memory_func = target_read_memory;
194 s.info.buffer_vma = code;
195 s.info.buffer_length = size;
9504c544 196 s.info.print_address_func = generic_print_address;
c27004ec
FB
197
198#ifdef TARGET_WORDS_BIGENDIAN
f4359b9f 199 s.info.endian = BFD_ENDIAN_BIG;
c27004ec 200#else
f4359b9f 201 s.info.endian = BFD_ENDIAN_LITTLE;
c27004ec 202#endif
37b9de46
PC
203
204 if (cc->disas_set_info) {
205 cc->disas_set_info(cpu, &s.info);
206 }
207
c27004ec 208#if defined(TARGET_I386)
f4359b9f
BS
209 if (flags == 2) {
210 s.info.mach = bfd_mach_x86_64;
211 } else if (flags == 1) {
212 s.info.mach = bfd_mach_i386_i8086;
213 } else {
214 s.info.mach = bfd_mach_i386_i386;
215 }
2de295c5 216 s.info.print_insn = print_insn_i386;
c27004ec 217#elif defined(TARGET_PPC)
e13951f8 218 if ((flags >> 16) & 1) {
f4359b9f
BS
219 s.info.endian = BFD_ENDIAN_LITTLE;
220 }
237c0af0 221 if (flags & 0xFFFF) {
e13951f8 222 /* If we have a precise definition of the instruction set, use it. */
f4359b9f 223 s.info.mach = flags & 0xFFFF;
237c0af0 224 } else {
a2458627 225#ifdef TARGET_PPC64
f4359b9f 226 s.info.mach = bfd_mach_ppc64;
a2458627 227#else
f4359b9f 228 s.info.mach = bfd_mach_ppc;
a2458627 229#endif
237c0af0 230 }
88770fec 231 s.info.disassembler_options = (char *)"any";
2de295c5 232 s.info.print_insn = print_insn_ppc;
c6105c0a 233#endif
2de295c5
PC
234 if (s.info.print_insn == NULL) {
235 s.info.print_insn = print_insn_od_target;
c46ffd57 236 }
c6105c0a 237
7e000c2e 238 for (pc = code; size > 0; pc += count, size -= count) {
fa15e030 239 fprintf(out, "0x" TARGET_FMT_lx ": ", pc);
2de295c5 240 count = s.info.print_insn(pc, &s.info);
c27004ec
FB
241#if 0
242 {
243 int i;
244 uint8_t b;
245 fprintf(out, " {");
246 for(i = 0; i < count; i++) {
f4359b9f 247 target_read_memory(pc + i, &b, 1, &s.info);
c27004ec
FB
248 fprintf(out, " %02x", b);
249 }
250 fprintf(out, " }");
251 }
252#endif
253 fprintf(out, "\n");
254 if (count < 0)
255 break;
754d00ae 256 if (size < count) {
257 fprintf(out,
258 "Disassembler disagrees with translator over instruction "
259 "decoding\n"
260 "Please report this to qemu-devel@nongnu.org\n");
261 break;
262 }
c27004ec
FB
263 }
264}
265
266/* Disassemble this for me please... (debugging). */
267void disas(FILE *out, void *code, unsigned long size)
268{
b0b0f1c9 269 uintptr_t pc;
c27004ec 270 int count;
f4359b9f 271 CPUDebug s;
c46ffd57 272 int (*print_insn)(bfd_vma pc, disassemble_info *info) = NULL;
c27004ec 273
f4359b9f
BS
274 INIT_DISASSEMBLE_INFO(s.info, out, fprintf);
275 s.info.print_address_func = generic_print_host_address;
c27004ec 276
f4359b9f
BS
277 s.info.buffer = code;
278 s.info.buffer_vma = (uintptr_t)code;
279 s.info.buffer_length = size;
b9adb4a6 280
e2542fe2 281#ifdef HOST_WORDS_BIGENDIAN
f4359b9f 282 s.info.endian = BFD_ENDIAN_BIG;
b9adb4a6 283#else
f4359b9f 284 s.info.endian = BFD_ENDIAN_LITTLE;
b9adb4a6 285#endif
5826e519
SW
286#if defined(CONFIG_TCG_INTERPRETER)
287 print_insn = print_insn_tci;
288#elif defined(__i386__)
f4359b9f 289 s.info.mach = bfd_mach_i386_i386;
c27004ec 290 print_insn = print_insn_i386;
bc51c5c9 291#elif defined(__x86_64__)
f4359b9f 292 s.info.mach = bfd_mach_x86_64;
c27004ec 293 print_insn = print_insn_i386;
e58ffeb3 294#elif defined(_ARCH_PPC)
66d4f6a3 295 s.info.disassembler_options = (char *)"any";
c27004ec 296 print_insn = print_insn_ppc;
999b53ec
CF
297#elif defined(__aarch64__) && defined(CONFIG_ARM_A64_DIS)
298 print_insn = print_insn_arm_a64;
a993ba85 299#elif defined(__alpha__)
c27004ec 300 print_insn = print_insn_alpha;
aa0aa4fa 301#elif defined(__sparc__)
c27004ec 302 print_insn = print_insn_sparc;
f4359b9f 303 s.info.mach = bfd_mach_sparc_v9b;
5fafdf24 304#elif defined(__arm__)
c27004ec 305 print_insn = print_insn_arm;
6af0bf9c
FB
306#elif defined(__MIPSEB__)
307 print_insn = print_insn_big_mips;
308#elif defined(__MIPSEL__)
309 print_insn = print_insn_little_mips;
48024e4a
FB
310#elif defined(__m68k__)
311 print_insn = print_insn_m68k;
8f860bb8
TS
312#elif defined(__s390__)
313 print_insn = print_insn_s390;
f54b3f92
AJ
314#elif defined(__hppa__)
315 print_insn = print_insn_hppa;
903ec55c
AJ
316#elif defined(__ia64__)
317 print_insn = print_insn_ia64;
b9adb4a6 318#endif
c46ffd57
RH
319 if (print_insn == NULL) {
320 print_insn = print_insn_od_host;
321 }
b0b0f1c9
SW
322 for (pc = (uintptr_t)code; size > 0; pc += count, size -= count) {
323 fprintf(out, "0x%08" PRIxPTR ": ", pc);
f4359b9f 324 count = print_insn(pc, &s.info);
b9adb4a6
FB
325 fprintf(out, "\n");
326 if (count < 0)
327 break;
328 }
329}
330
331/* Look up symbol for debugging purpose. Returns "" if unknown. */
c27004ec 332const char *lookup_symbol(target_ulong orig_addr)
b9adb4a6 333{
49918a75 334 const char *symbol = "";
e80cfcfc 335 struct syminfo *s;
3b46e624 336
e80cfcfc 337 for (s = syminfos; s; s = s->next) {
49918a75
PB
338 symbol = s->lookup_symbol(s, orig_addr);
339 if (symbol[0] != '\0') {
340 break;
341 }
b9adb4a6 342 }
49918a75
PB
343
344 return symbol;
b9adb4a6 345}
9307c4c1
FB
346
347#if !defined(CONFIG_USER_ONLY)
348
83c9089e 349#include "monitor/monitor.h"
3d2cfdf1 350
9307c4c1
FB
351static int monitor_disas_is_physical;
352
353static int
a5f1b965
BS
354monitor_read_memory (bfd_vma memaddr, bfd_byte *myaddr, int length,
355 struct disassemble_info *info)
9307c4c1 356{
f4359b9f
BS
357 CPUDebug *s = container_of(info, CPUDebug, info);
358
9307c4c1 359 if (monitor_disas_is_physical) {
54f7b4a3 360 cpu_physical_memory_read(memaddr, myaddr, length);
9307c4c1 361 } else {
d49190c4 362 cpu_memory_rw_debug(s->cpu, memaddr, myaddr, length, 0);
9307c4c1
FB
363 }
364 return 0;
365}
366
1c38f843
TM
367/* Disassembler for the monitor.
368 See target_disas for a description of flags. */
d49190c4 369void monitor_disas(Monitor *mon, CPUState *cpu,
6a00d601 370 target_ulong pc, int nb_insn, int is_physical, int flags)
9307c4c1 371{
37b9de46 372 CPUClass *cc = CPU_GET_CLASS(cpu);
9307c4c1 373 int count, i;
f4359b9f 374 CPUDebug s;
9307c4c1 375
f4359b9f 376 INIT_DISASSEMBLE_INFO(s.info, (FILE *)mon, monitor_fprintf);
9307c4c1 377
d49190c4 378 s.cpu = cpu;
9307c4c1 379 monitor_disas_is_physical = is_physical;
f4359b9f 380 s.info.read_memory_func = monitor_read_memory;
9504c544 381 s.info.print_address_func = generic_print_address;
9307c4c1 382
f4359b9f 383 s.info.buffer_vma = pc;
9307c4c1
FB
384
385#ifdef TARGET_WORDS_BIGENDIAN
f4359b9f 386 s.info.endian = BFD_ENDIAN_BIG;
9307c4c1 387#else
f4359b9f 388 s.info.endian = BFD_ENDIAN_LITTLE;
9307c4c1 389#endif
37b9de46
PC
390
391 if (cc->disas_set_info) {
392 cc->disas_set_info(cpu, &s.info);
393 }
394
9307c4c1 395#if defined(TARGET_I386)
f4359b9f
BS
396 if (flags == 2) {
397 s.info.mach = bfd_mach_x86_64;
398 } else if (flags == 1) {
399 s.info.mach = bfd_mach_i386_i8086;
400 } else {
401 s.info.mach = bfd_mach_i386_i386;
402 }
2de295c5 403 s.info.print_insn = print_insn_i386;
9307c4c1 404#elif defined(TARGET_PPC)
1c38f843
TM
405 if (flags & 0xFFFF) {
406 /* If we have a precise definition of the instruction set, use it. */
407 s.info.mach = flags & 0xFFFF;
408 } else {
a2458627 409#ifdef TARGET_PPC64
1c38f843 410 s.info.mach = bfd_mach_ppc64;
a2458627 411#else
1c38f843 412 s.info.mach = bfd_mach_ppc;
a2458627 413#endif
1c38f843
TM
414 }
415 if ((flags >> 16) & 1) {
416 s.info.endian = BFD_ENDIAN_LITTLE;
417 }
2de295c5 418 s.info.print_insn = print_insn_ppc;
9307c4c1 419#endif
37b9de46
PC
420 if (!s.info.print_insn) {
421 monitor_printf(mon, "0x" TARGET_FMT_lx
422 ": Asm output not supported on this arch\n", pc);
423 return;
424 }
9307c4c1
FB
425
426 for(i = 0; i < nb_insn; i++) {
376253ec 427 monitor_printf(mon, "0x" TARGET_FMT_lx ": ", pc);
2de295c5 428 count = s.info.print_insn(pc, &s.info);
376253ec 429 monitor_printf(mon, "\n");
9307c4c1
FB
430 if (count < 0)
431 break;
432 pc += count;
433 }
434}
435#endif