]> git.proxmox.com Git - mirror_qemu.git/blame - linux-user/qemu.h
ColdFire target.
[mirror_qemu.git] / linux-user / qemu.h
CommitLineData
e88de099
FB
1#ifndef QEMU_H
2#define QEMU_H
31e31b8a
FB
3
4#include "thunk.h"
5
9de5e440 6#include <signal.h>
edf779ff 7#include <string.h>
9de5e440 8#include "syscall_defs.h"
31e31b8a 9
6180a181
FB
10#include "cpu.h"
11#include "syscall.h"
1fddef4b 12#include "gdbstub.h"
66fb9763 13
31e31b8a
FB
14/* This struct is used to hold certain information about the image.
15 * Basically, it replicates in user space what would be certain
16 * task_struct fields in the kernel
17 */
18struct image_info {
19 unsigned long start_code;
20 unsigned long end_code;
e5fe0c52 21 unsigned long start_data;
31e31b8a
FB
22 unsigned long end_data;
23 unsigned long start_brk;
24 unsigned long brk;
25 unsigned long start_mmap;
26 unsigned long mmap;
27 unsigned long rss;
28 unsigned long start_stack;
31e31b8a 29 unsigned long entry;
978efd6a
PB
30 target_ulong code_offset;
31 target_ulong data_offset;
31e31b8a
FB
32 int personality;
33};
34
b346ff46 35#ifdef TARGET_I386
851e67a1
FB
36/* Information about the current linux thread */
37struct vm86_saved_state {
38 uint32_t eax; /* return code */
39 uint32_t ebx;
40 uint32_t ecx;
41 uint32_t edx;
42 uint32_t esi;
43 uint32_t edi;
44 uint32_t ebp;
45 uint32_t esp;
46 uint32_t eflags;
47 uint32_t eip;
48 uint16_t cs, ss, ds, es, fs, gs;
49};
b346ff46 50#endif
851e67a1 51
28c4f361
FB
52#ifdef TARGET_ARM
53/* FPU emulator */
54#include "nwfpe/fpa11.h"
28c4f361
FB
55#endif
56
851e67a1
FB
57/* NOTE: we force a big alignment so that the stack stored after is
58 aligned too */
59typedef struct TaskState {
60 struct TaskState *next;
28c4f361
FB
61#ifdef TARGET_ARM
62 /* FPA state */
63 FPA11 fpa;
a4f81979
FB
64 /* Extra fields for semihosted binaries. */
65 uint32_t stack_base;
66 uint32_t heap_base;
67 uint32_t heap_limit;
68 int swi_errno;
28c4f361 69#endif
b346ff46 70#ifdef TARGET_I386
53a5960a 71 target_ulong target_v86;
851e67a1 72 struct vm86_saved_state vm86_saved_regs;
b333af06 73 struct target_vm86plus_struct vm86plus;
631271d7
FB
74 uint32_t v86flags;
75 uint32_t v86mask;
e6e5906b
PB
76#endif
77#ifdef TARGET_M68K
78 int sim_syscalls;
b346ff46 79#endif
851e67a1 80 int used; /* non zero if used */
978efd6a 81 struct image_info *info;
851e67a1
FB
82 uint8_t stack[0];
83} __attribute__((aligned(16))) TaskState;
84
85extern TaskState *first_task_state;
c5937220 86extern const char *qemu_uname_release;
851e67a1 87
e5fe0c52
PB
88/* ??? See if we can avoid exposing so much of the loader internals. */
89/*
90 * MAX_ARG_PAGES defines the number of pages allocated for arguments
91 * and envelope for the new program. 32 should suffice, this gives
92 * a maximum env+arg of 128kB w/4KB pages!
93 */
94#define MAX_ARG_PAGES 32
95
96/*
97 * This structure is used to hold the arguments that are
98 * used when loading binaries.
99 */
100struct linux_binprm {
101 char buf[128];
102 void *page[MAX_ARG_PAGES];
103 unsigned long p;
104 int fd;
105 int e_uid, e_gid;
106 int argc, envc;
107 char **argv;
108 char **envp;
109 char * filename; /* Name of binary */
110};
111
112void do_init_thread(struct target_pt_regs *regs, struct image_info *infop);
113target_ulong loader_build_argptr(int envc, int argc, target_ulong sp,
114 target_ulong stringp, int push_ptr);
115int loader_exec(const char * filename, char ** argv, char ** envp,
01ffc75b 116 struct target_pt_regs * regs, struct image_info *infop);
31e31b8a 117
e5fe0c52
PB
118int load_elf_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
119 struct image_info * info);
120int load_flt_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
121 struct image_info * info);
122
123void memcpy_to_target(target_ulong dest, const void *src,
124 unsigned long len);
53a5960a
PB
125void target_set_brk(target_ulong new_brk);
126long do_brk(target_ulong new_brk);
31e31b8a 127void syscall_init(void);
6dbad63e 128long do_syscall(void *cpu_env, int num, long arg1, long arg2, long arg3,
31e31b8a
FB
129 long arg4, long arg5, long arg6);
130void gemu_log(const char *fmt, ...) __attribute__((format(printf,1,2)));
b346ff46
FB
131extern CPUState *global_env;
132void cpu_loop(CPUState *env);
32ce6337
FB
133void init_paths(const char *prefix);
134const char *path(const char *pathname);
6977fbfd
FB
135
136extern int loglevel;
631271d7
FB
137extern FILE *logfile;
138
b346ff46
FB
139/* signal.c */
140void process_pending_signals(void *cpu_env);
141void signal_init(void);
142int queue_signal(int sig, target_siginfo_t *info);
143void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info);
144void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo);
145long do_sigreturn(CPUState *env);
146long do_rt_sigreturn(CPUState *env);
147
148#ifdef TARGET_I386
631271d7
FB
149/* vm86.c */
150void save_v86_state(CPUX86State *env);
447db213 151void handle_vm86_trap(CPUX86State *env, int trapno);
631271d7 152void handle_vm86_fault(CPUX86State *env);
53a5960a 153int do_vm86(CPUX86State *env, long subfunction, target_ulong v86_addr);
b346ff46 154#endif
631271d7 155
54936004 156/* mmap.c */
53a5960a
PB
157int target_mprotect(target_ulong start, target_ulong len, int prot);
158long target_mmap(target_ulong start, target_ulong len, int prot,
159 int flags, int fd, target_ulong offset);
160int target_munmap(target_ulong start, target_ulong len);
161long target_mremap(target_ulong old_addr, target_ulong old_size,
162 target_ulong new_size, unsigned long flags,
163 target_ulong new_addr);
164int target_msync(target_ulong start, target_ulong len, int flags);
54936004 165
edf779ff
FB
166/* user access */
167
168#define VERIFY_READ 0
169#define VERIFY_WRITE 1
170
171#define access_ok(type,addr,size) (1)
172
53a5960a 173/* NOTE get_user and put_user use host addresses. */
edf779ff
FB
174#define __put_user(x,ptr)\
175({\
176 int size = sizeof(*ptr);\
177 switch(size) {\
178 case 1:\
53a5960a 179 *(uint8_t *)(ptr) = (typeof(*ptr))(x);\
edf779ff
FB
180 break;\
181 case 2:\
53a5960a 182 *(uint16_t *)(ptr) = tswap16((typeof(*ptr))(x));\
edf779ff
FB
183 break;\
184 case 4:\
53a5960a 185 *(uint32_t *)(ptr) = tswap32((typeof(*ptr))(x));\
edf779ff
FB
186 break;\
187 case 8:\
53a5960a 188 *(uint64_t *)(ptr) = tswap64((typeof(*ptr))(x));\
edf779ff
FB
189 break;\
190 default:\
191 abort();\
192 }\
193 0;\
194})
195
196#define __get_user(x, ptr) \
197({\
198 int size = sizeof(*ptr);\
199 switch(size) {\
200 case 1:\
53a5960a 201 x = (typeof(*ptr))*(uint8_t *)(ptr);\
edf779ff
FB
202 break;\
203 case 2:\
53a5960a 204 x = (typeof(*ptr))tswap16(*(uint16_t *)(ptr));\
edf779ff
FB
205 break;\
206 case 4:\
53a5960a 207 x = (typeof(*ptr))tswap32(*(uint32_t *)(ptr));\
edf779ff
FB
208 break;\
209 case 8:\
53a5960a 210 x = (typeof(*ptr))tswap64(*(uint64_t *)(ptr));\
edf779ff
FB
211 break;\
212 default:\
213 abort();\
214 }\
215 0;\
216})
217
edf779ff
FB
218#define put_user(x,ptr)\
219({\
220 int __ret;\
221 if (access_ok(VERIFY_WRITE, ptr, sizeof(*ptr)))\
222 __ret = __put_user(x, ptr);\
223 else\
224 __ret = -EFAULT;\
225 __ret;\
226})
227
228#define get_user(x,ptr)\
229({\
230 int __ret;\
231 if (access_ok(VERIFY_READ, ptr, sizeof(*ptr)))\
232 __ret = __get_user(x, ptr);\
233 else\
234 __ret = -EFAULT;\
235 __ret;\
236})
237
53a5960a
PB
238/* Functions for accessing guest memory. The tget and tput functions
239 read/write single values, byteswapping as neccessary. The lock_user
240 gets a pointer to a contiguous area of guest memory, but does not perform
241 and byteswapping. lock_user may return either a pointer to the guest
242 memory, or a temporary buffer. */
243
244/* Lock an area of guest memory into the host. If copy is true then the
245 host area will have the same contents as the guest. */
246static inline void *lock_user(target_ulong guest_addr, long len, int copy)
edf779ff 247{
53a5960a
PB
248#ifdef DEBUG_REMAP
249 void *addr;
250 addr = malloc(len);
251 if (copy)
252 memcpy(addr, g2h(guest_addr), len);
edf779ff 253 else
53a5960a
PB
254 memset(addr, 0, len);
255 return addr;
256#else
257 return g2h(guest_addr);
258#endif
edf779ff
FB
259}
260
53a5960a
PB
261/* Unlock an area of guest memory. The first LEN bytes must be flushed back
262 to guest memory. */
263static inline void unlock_user(void *host_addr, target_ulong guest_addr,
264 long len)
edf779ff 265{
53a5960a
PB
266#ifdef DEBUG_REMAP
267 if (host_addr == g2h(guest_addr))
268 return;
269 if (len > 0)
270 memcpy(g2h(guest_addr), host_addr, len);
271 free(host_addr);
272#endif
edf779ff
FB
273}
274
53a5960a
PB
275/* Return the length of a string in target memory. */
276static inline int target_strlen(target_ulong ptr)
edf779ff 277{
53a5960a
PB
278 return strlen(g2h(ptr));
279}
280
281/* Like lock_user but for null terminated strings. */
282static inline void *lock_user_string(target_ulong guest_addr)
283{
284 long len;
285 len = target_strlen(guest_addr) + 1;
286 return lock_user(guest_addr, len, 1);
edf779ff
FB
287}
288
53a5960a
PB
289/* Helper macros for locking/ulocking a target struct. */
290#define lock_user_struct(host_ptr, guest_addr, copy) \
291 host_ptr = lock_user(guest_addr, sizeof(*host_ptr), copy)
292#define unlock_user_struct(host_ptr, guest_addr, copy) \
293 unlock_user(host_ptr, guest_addr, (copy) ? sizeof(*host_ptr) : 0)
294
295#define tget8(addr) ldub(addr)
296#define tput8(addr, val) stb(addr, val)
297#define tget16(addr) lduw(addr)
298#define tput16(addr, val) stw(addr, val)
299#define tget32(addr) ldl(addr)
300#define tput32(addr, val) stl(addr, val)
301#define tget64(addr) ldq(addr)
302#define tput64(addr, val) stq(addr, val)
303#if TARGET_LONG_BITS == 64
304#define tgetl(addr) ldq(addr)
305#define tputl(addr, val) stq(addr, val)
306#else
307#define tgetl(addr) ldl(addr)
308#define tputl(addr, val) stl(addr, val)
309#endif
310
e88de099 311#endif /* QEMU_H */