]> git.proxmox.com Git - mirror_qemu.git/blame - linux-user/qemu.h
bFLT 64-bit host fix.
[mirror_qemu.git] / linux-user / qemu.h
CommitLineData
e88de099
FB
1#ifndef QEMU_H
2#define QEMU_H
31e31b8a
FB
3
4#include "thunk.h"
5
9de5e440 6#include <signal.h>
edf779ff 7#include <string.h>
9de5e440 8#include "syscall_defs.h"
31e31b8a 9
6180a181
FB
10#include "cpu.h"
11#include "syscall.h"
1fddef4b 12#include "gdbstub.h"
66fb9763 13
31e31b8a
FB
14/* This struct is used to hold certain information about the image.
15 * Basically, it replicates in user space what would be certain
16 * task_struct fields in the kernel
17 */
18struct image_info {
19 unsigned long start_code;
20 unsigned long end_code;
e5fe0c52 21 unsigned long start_data;
31e31b8a
FB
22 unsigned long end_data;
23 unsigned long start_brk;
24 unsigned long brk;
25 unsigned long start_mmap;
26 unsigned long mmap;
27 unsigned long rss;
28 unsigned long start_stack;
31e31b8a 29 unsigned long entry;
978efd6a
PB
30 target_ulong code_offset;
31 target_ulong data_offset;
31e31b8a
FB
32 int personality;
33};
34
b346ff46 35#ifdef TARGET_I386
851e67a1
FB
36/* Information about the current linux thread */
37struct vm86_saved_state {
38 uint32_t eax; /* return code */
39 uint32_t ebx;
40 uint32_t ecx;
41 uint32_t edx;
42 uint32_t esi;
43 uint32_t edi;
44 uint32_t ebp;
45 uint32_t esp;
46 uint32_t eflags;
47 uint32_t eip;
48 uint16_t cs, ss, ds, es, fs, gs;
49};
b346ff46 50#endif
851e67a1 51
28c4f361
FB
52#ifdef TARGET_ARM
53/* FPU emulator */
54#include "nwfpe/fpa11.h"
28c4f361
FB
55#endif
56
851e67a1
FB
57/* NOTE: we force a big alignment so that the stack stored after is
58 aligned too */
59typedef struct TaskState {
60 struct TaskState *next;
28c4f361
FB
61#ifdef TARGET_ARM
62 /* FPA state */
63 FPA11 fpa;
a4f81979
FB
64 /* Extra fields for semihosted binaries. */
65 uint32_t stack_base;
66 uint32_t heap_base;
67 uint32_t heap_limit;
68 int swi_errno;
28c4f361 69#endif
b346ff46 70#ifdef TARGET_I386
53a5960a 71 target_ulong target_v86;
851e67a1 72 struct vm86_saved_state vm86_saved_regs;
b333af06 73 struct target_vm86plus_struct vm86plus;
631271d7
FB
74 uint32_t v86flags;
75 uint32_t v86mask;
b346ff46 76#endif
851e67a1 77 int used; /* non zero if used */
978efd6a 78 struct image_info *info;
851e67a1
FB
79 uint8_t stack[0];
80} __attribute__((aligned(16))) TaskState;
81
82extern TaskState *first_task_state;
c5937220 83extern const char *qemu_uname_release;
851e67a1 84
e5fe0c52
PB
85/* ??? See if we can avoid exposing so much of the loader internals. */
86/*
87 * MAX_ARG_PAGES defines the number of pages allocated for arguments
88 * and envelope for the new program. 32 should suffice, this gives
89 * a maximum env+arg of 128kB w/4KB pages!
90 */
91#define MAX_ARG_PAGES 32
92
93/*
94 * This structure is used to hold the arguments that are
95 * used when loading binaries.
96 */
97struct linux_binprm {
98 char buf[128];
99 void *page[MAX_ARG_PAGES];
100 unsigned long p;
101 int fd;
102 int e_uid, e_gid;
103 int argc, envc;
104 char **argv;
105 char **envp;
106 char * filename; /* Name of binary */
107};
108
109void do_init_thread(struct target_pt_regs *regs, struct image_info *infop);
110target_ulong loader_build_argptr(int envc, int argc, target_ulong sp,
111 target_ulong stringp, int push_ptr);
112int loader_exec(const char * filename, char ** argv, char ** envp,
01ffc75b 113 struct target_pt_regs * regs, struct image_info *infop);
31e31b8a 114
e5fe0c52
PB
115int load_elf_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
116 struct image_info * info);
117int load_flt_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
118 struct image_info * info);
119
120void memcpy_to_target(target_ulong dest, const void *src,
121 unsigned long len);
53a5960a
PB
122void target_set_brk(target_ulong new_brk);
123long do_brk(target_ulong new_brk);
31e31b8a 124void syscall_init(void);
6dbad63e 125long do_syscall(void *cpu_env, int num, long arg1, long arg2, long arg3,
31e31b8a
FB
126 long arg4, long arg5, long arg6);
127void gemu_log(const char *fmt, ...) __attribute__((format(printf,1,2)));
b346ff46
FB
128extern CPUState *global_env;
129void cpu_loop(CPUState *env);
32ce6337
FB
130void init_paths(const char *prefix);
131const char *path(const char *pathname);
6977fbfd
FB
132
133extern int loglevel;
631271d7
FB
134extern FILE *logfile;
135
b346ff46
FB
136/* signal.c */
137void process_pending_signals(void *cpu_env);
138void signal_init(void);
139int queue_signal(int sig, target_siginfo_t *info);
140void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info);
141void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo);
142long do_sigreturn(CPUState *env);
143long do_rt_sigreturn(CPUState *env);
144
145#ifdef TARGET_I386
631271d7
FB
146/* vm86.c */
147void save_v86_state(CPUX86State *env);
447db213 148void handle_vm86_trap(CPUX86State *env, int trapno);
631271d7 149void handle_vm86_fault(CPUX86State *env);
53a5960a 150int do_vm86(CPUX86State *env, long subfunction, target_ulong v86_addr);
b346ff46 151#endif
631271d7 152
54936004 153/* mmap.c */
53a5960a
PB
154int target_mprotect(target_ulong start, target_ulong len, int prot);
155long target_mmap(target_ulong start, target_ulong len, int prot,
156 int flags, int fd, target_ulong offset);
157int target_munmap(target_ulong start, target_ulong len);
158long target_mremap(target_ulong old_addr, target_ulong old_size,
159 target_ulong new_size, unsigned long flags,
160 target_ulong new_addr);
161int target_msync(target_ulong start, target_ulong len, int flags);
54936004 162
edf779ff
FB
163/* user access */
164
165#define VERIFY_READ 0
166#define VERIFY_WRITE 1
167
168#define access_ok(type,addr,size) (1)
169
53a5960a 170/* NOTE get_user and put_user use host addresses. */
edf779ff
FB
171#define __put_user(x,ptr)\
172({\
173 int size = sizeof(*ptr);\
174 switch(size) {\
175 case 1:\
53a5960a 176 *(uint8_t *)(ptr) = (typeof(*ptr))(x);\
edf779ff
FB
177 break;\
178 case 2:\
53a5960a 179 *(uint16_t *)(ptr) = tswap16((typeof(*ptr))(x));\
edf779ff
FB
180 break;\
181 case 4:\
53a5960a 182 *(uint32_t *)(ptr) = tswap32((typeof(*ptr))(x));\
edf779ff
FB
183 break;\
184 case 8:\
53a5960a 185 *(uint64_t *)(ptr) = tswap64((typeof(*ptr))(x));\
edf779ff
FB
186 break;\
187 default:\
188 abort();\
189 }\
190 0;\
191})
192
193#define __get_user(x, ptr) \
194({\
195 int size = sizeof(*ptr);\
196 switch(size) {\
197 case 1:\
53a5960a 198 x = (typeof(*ptr))*(uint8_t *)(ptr);\
edf779ff
FB
199 break;\
200 case 2:\
53a5960a 201 x = (typeof(*ptr))tswap16(*(uint16_t *)(ptr));\
edf779ff
FB
202 break;\
203 case 4:\
53a5960a 204 x = (typeof(*ptr))tswap32(*(uint32_t *)(ptr));\
edf779ff
FB
205 break;\
206 case 8:\
53a5960a 207 x = (typeof(*ptr))tswap64(*(uint64_t *)(ptr));\
edf779ff
FB
208 break;\
209 default:\
210 abort();\
211 }\
212 0;\
213})
214
edf779ff
FB
215#define put_user(x,ptr)\
216({\
217 int __ret;\
218 if (access_ok(VERIFY_WRITE, ptr, sizeof(*ptr)))\
219 __ret = __put_user(x, ptr);\
220 else\
221 __ret = -EFAULT;\
222 __ret;\
223})
224
225#define get_user(x,ptr)\
226({\
227 int __ret;\
228 if (access_ok(VERIFY_READ, ptr, sizeof(*ptr)))\
229 __ret = __get_user(x, ptr);\
230 else\
231 __ret = -EFAULT;\
232 __ret;\
233})
234
53a5960a
PB
235/* Functions for accessing guest memory. The tget and tput functions
236 read/write single values, byteswapping as neccessary. The lock_user
237 gets a pointer to a contiguous area of guest memory, but does not perform
238 and byteswapping. lock_user may return either a pointer to the guest
239 memory, or a temporary buffer. */
240
241/* Lock an area of guest memory into the host. If copy is true then the
242 host area will have the same contents as the guest. */
243static inline void *lock_user(target_ulong guest_addr, long len, int copy)
edf779ff 244{
53a5960a
PB
245#ifdef DEBUG_REMAP
246 void *addr;
247 addr = malloc(len);
248 if (copy)
249 memcpy(addr, g2h(guest_addr), len);
edf779ff 250 else
53a5960a
PB
251 memset(addr, 0, len);
252 return addr;
253#else
254 return g2h(guest_addr);
255#endif
edf779ff
FB
256}
257
53a5960a
PB
258/* Unlock an area of guest memory. The first LEN bytes must be flushed back
259 to guest memory. */
260static inline void unlock_user(void *host_addr, target_ulong guest_addr,
261 long len)
edf779ff 262{
53a5960a
PB
263#ifdef DEBUG_REMAP
264 if (host_addr == g2h(guest_addr))
265 return;
266 if (len > 0)
267 memcpy(g2h(guest_addr), host_addr, len);
268 free(host_addr);
269#endif
edf779ff
FB
270}
271
53a5960a
PB
272/* Return the length of a string in target memory. */
273static inline int target_strlen(target_ulong ptr)
edf779ff 274{
53a5960a
PB
275 return strlen(g2h(ptr));
276}
277
278/* Like lock_user but for null terminated strings. */
279static inline void *lock_user_string(target_ulong guest_addr)
280{
281 long len;
282 len = target_strlen(guest_addr) + 1;
283 return lock_user(guest_addr, len, 1);
edf779ff
FB
284}
285
53a5960a
PB
286/* Helper macros for locking/ulocking a target struct. */
287#define lock_user_struct(host_ptr, guest_addr, copy) \
288 host_ptr = lock_user(guest_addr, sizeof(*host_ptr), copy)
289#define unlock_user_struct(host_ptr, guest_addr, copy) \
290 unlock_user(host_ptr, guest_addr, (copy) ? sizeof(*host_ptr) : 0)
291
292#define tget8(addr) ldub(addr)
293#define tput8(addr, val) stb(addr, val)
294#define tget16(addr) lduw(addr)
295#define tput16(addr, val) stw(addr, val)
296#define tget32(addr) ldl(addr)
297#define tput32(addr, val) stl(addr, val)
298#define tget64(addr) ldq(addr)
299#define tput64(addr, val) stq(addr, val)
300#if TARGET_LONG_BITS == 64
301#define tgetl(addr) ldq(addr)
302#define tputl(addr, val) stq(addr, val)
303#else
304#define tgetl(addr) ldl(addr)
305#define tputl(addr, val) stl(addr, val)
306#endif
307
e88de099 308#endif /* QEMU_H */