]>
git.proxmox.com Git - mirror_qemu.git/blob - linux-user/i386/cpu_loop.c
4 * Copyright (c) 2003-2008 Fabrice Bellard
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
20 #include "qemu/osdep.h"
22 #include "qemu/timer.h"
23 #include "user-internals.h"
24 #include "cpu_loop-common.h"
25 #include "signal-common.h"
26 #include "user-mmap.h"
28 /***********************************************************/
29 /* CPUX86 core interface */
31 uint64_t cpu_get_tsc(CPUX86State
*env
)
33 return cpu_get_host_ticks();
36 static void write_dt(void *ptr
, unsigned long addr
, unsigned long limit
,
41 e1
= (addr
<< 16) | (limit
& 0xffff);
42 e2
= ((addr
>> 16) & 0xff) | (addr
& 0xff000000) | (limit
& 0x000f0000);
49 static uint64_t *idt_table
;
51 static void set_gate64(void *ptr
, unsigned int type
, unsigned int dpl
,
52 uint64_t addr
, unsigned int sel
)
55 e1
= (addr
& 0xffff) | (sel
<< 16);
56 e2
= (addr
& 0xffff0000) | 0x8000 | (dpl
<< 13) | (type
<< 8);
60 p
[2] = tswap32(addr
>> 32);
63 /* only dpl matters as we do only user space emulation */
64 static void set_idt(int n
, unsigned int dpl
)
66 set_gate64(idt_table
+ n
* 2, 0, dpl
, 0, 0);
69 static void set_gate(void *ptr
, unsigned int type
, unsigned int dpl
,
70 uint32_t addr
, unsigned int sel
)
73 e1
= (addr
& 0xffff) | (sel
<< 16);
74 e2
= (addr
& 0xffff0000) | 0x8000 | (dpl
<< 13) | (type
<< 8);
80 /* only dpl matters as we do only user space emulation */
81 static void set_idt(int n
, unsigned int dpl
)
83 set_gate(idt_table
+ n
, 0, dpl
, 0, 0);
88 static bool write_ok_or_segv(CPUX86State
*env
, abi_ptr addr
, size_t len
)
91 * For all the vsyscalls, NULL means "don't write anything" not
92 * "write it at address 0".
94 if (addr
== 0 || access_ok(env_cpu(env
), VERIFY_WRITE
, addr
, len
)) {
98 env
->error_code
= PG_ERROR_W_MASK
| PG_ERROR_U_MASK
;
99 force_sig_fault(TARGET_SIGSEGV
, TARGET_SEGV_MAPERR
, addr
);
104 * Since v3.1, the kernel traps and emulates the vsyscall page.
105 * Entry points other than the official generate SIGSEGV.
107 static void emulate_vsyscall(CPUX86State
*env
)
114 * Validate the entry point. We have already validated the page
115 * during translation to get here; now verify the offset.
117 switch (env
->eip
& ~TARGET_PAGE_MASK
) {
119 syscall
= TARGET_NR_gettimeofday
;
122 syscall
= TARGET_NR_time
;
125 syscall
= TARGET_NR_getcpu
;
132 * Validate the return address.
133 * Note that the kernel treats this the same as an invalid entry point.
135 if (get_user_u64(caller
, env
->regs
[R_ESP
])) {
140 * Validate the pointer arguments.
143 case TARGET_NR_gettimeofday
:
144 if (!write_ok_or_segv(env
, env
->regs
[R_EDI
],
145 sizeof(struct target_timeval
)) ||
146 !write_ok_or_segv(env
, env
->regs
[R_ESI
],
147 sizeof(struct target_timezone
))) {
152 if (!write_ok_or_segv(env
, env
->regs
[R_EDI
], sizeof(abi_long
))) {
156 case TARGET_NR_getcpu
:
157 if (!write_ok_or_segv(env
, env
->regs
[R_EDI
], sizeof(uint32_t)) ||
158 !write_ok_or_segv(env
, env
->regs
[R_ESI
], sizeof(uint32_t))) {
163 g_assert_not_reached();
167 * Perform the syscall. None of the vsyscalls should need restarting.
169 ret
= do_syscall(env
, syscall
, env
->regs
[R_EDI
], env
->regs
[R_ESI
],
170 env
->regs
[R_EDX
], env
->regs
[10], env
->regs
[8],
172 g_assert(ret
!= -QEMU_ERESTARTSYS
);
173 g_assert(ret
!= -QEMU_ESIGRETURN
);
174 if (ret
== -TARGET_EFAULT
) {
177 env
->regs
[R_EAX
] = ret
;
179 /* Emulate a ret instruction to leave the vsyscall page. */
181 env
->regs
[R_ESP
] += 8;
185 force_sig(TARGET_SIGSEGV
);
189 static bool maybe_handle_vm86_trap(CPUX86State
*env
, int trapnr
)
191 #ifndef TARGET_X86_64
192 if (env
->eflags
& VM_MASK
) {
193 handle_vm86_trap(env
, trapnr
);
200 void cpu_loop(CPUX86State
*env
)
202 CPUState
*cs
= env_cpu(env
);
208 trapnr
= cpu_exec(cs
);
210 process_queued_cpu_work(cs
);
214 /* linux syscall from int $0x80 */
215 ret
= do_syscall(env
,
224 if (ret
== -QEMU_ERESTARTSYS
) {
226 } else if (ret
!= -QEMU_ESIGRETURN
) {
227 env
->regs
[R_EAX
] = ret
;
232 /* linux syscall from syscall instruction */
233 ret
= do_syscall(env
,
242 if (ret
== -QEMU_ERESTARTSYS
) {
244 } else if (ret
!= -QEMU_ESIGRETURN
) {
245 env
->regs
[R_EAX
] = ret
;
251 emulate_vsyscall(env
);
256 force_sig(TARGET_SIGBUS
);
259 /* XXX: potential problem if ABI32 */
260 if (maybe_handle_vm86_trap(env
, trapnr
)) {
263 force_sig(TARGET_SIGSEGV
);
266 force_sig_fault(TARGET_SIGSEGV
,
267 (env
->error_code
& PG_ERROR_P_MASK
?
268 TARGET_SEGV_ACCERR
: TARGET_SEGV_MAPERR
),
272 if (maybe_handle_vm86_trap(env
, trapnr
)) {
275 force_sig_fault(TARGET_SIGFPE
, TARGET_FPE_INTDIV
, env
->eip
);
278 if (maybe_handle_vm86_trap(env
, trapnr
)) {
281 force_sig_fault(TARGET_SIGTRAP
, TARGET_TRAP_BRKPT
, env
->eip
);
284 if (maybe_handle_vm86_trap(env
, trapnr
)) {
287 force_sig(TARGET_SIGTRAP
);
291 if (maybe_handle_vm86_trap(env
, trapnr
)) {
294 force_sig(TARGET_SIGSEGV
);
297 force_sig_fault(TARGET_SIGILL
, TARGET_ILL_ILLOPN
, env
->eip
);
300 /* just indicate that signals should be handled asap */
303 force_sig_fault(TARGET_SIGTRAP
, TARGET_TRAP_BRKPT
, env
->eip
);
306 cpu_exec_step_atomic(cs
);
309 EXCP_DUMP(env
, "qemu: unhandled CPU exception 0x%x - aborting\n",
313 process_pending_signals(env
);
317 void target_cpu_copy_regs(CPUArchState
*env
, struct target_pt_regs
*regs
)
319 env
->cr
[0] = CR0_PG_MASK
| CR0_WP_MASK
| CR0_PE_MASK
;
320 env
->hflags
|= HF_PE_MASK
| HF_CPL_MASK
;
321 if (env
->features
[FEAT_1_EDX
] & CPUID_SSE
) {
322 env
->cr
[4] |= CR4_OSFXSR_MASK
;
323 env
->hflags
|= HF_OSFXSR_MASK
;
326 /* enable 64 bit mode if possible */
327 if (!(env
->features
[FEAT_8000_0001_EDX
] & CPUID_EXT2_LM
)) {
328 fprintf(stderr
, "The selected x86 CPU does not support 64 bit mode\n");
331 env
->cr
[4] |= CR4_PAE_MASK
;
332 env
->efer
|= MSR_EFER_LMA
| MSR_EFER_LME
;
333 env
->hflags
|= HF_LMA_MASK
;
336 /* flags setup : we activate the IRQs by default as in user mode */
337 env
->eflags
|= IF_MASK
;
339 /* linux register setup */
341 env
->regs
[R_EAX
] = regs
->rax
;
342 env
->regs
[R_EBX
] = regs
->rbx
;
343 env
->regs
[R_ECX
] = regs
->rcx
;
344 env
->regs
[R_EDX
] = regs
->rdx
;
345 env
->regs
[R_ESI
] = regs
->rsi
;
346 env
->regs
[R_EDI
] = regs
->rdi
;
347 env
->regs
[R_EBP
] = regs
->rbp
;
348 env
->regs
[R_ESP
] = regs
->rsp
;
349 env
->eip
= regs
->rip
;
351 env
->regs
[R_EAX
] = regs
->eax
;
352 env
->regs
[R_EBX
] = regs
->ebx
;
353 env
->regs
[R_ECX
] = regs
->ecx
;
354 env
->regs
[R_EDX
] = regs
->edx
;
355 env
->regs
[R_ESI
] = regs
->esi
;
356 env
->regs
[R_EDI
] = regs
->edi
;
357 env
->regs
[R_EBP
] = regs
->ebp
;
358 env
->regs
[R_ESP
] = regs
->esp
;
359 env
->eip
= regs
->eip
;
362 /* linux interrupt setup */
364 env
->idt
.limit
= 511;
366 env
->idt
.limit
= 255;
368 env
->idt
.base
= target_mmap(0, sizeof(uint64_t) * (env
->idt
.limit
+ 1),
369 PROT_READ
|PROT_WRITE
,
370 MAP_ANONYMOUS
|MAP_PRIVATE
, -1, 0);
371 idt_table
= g2h_untagged(env
->idt
.base
);
394 /* linux segment setup */
397 env
->gdt
.base
= target_mmap(0, sizeof(uint64_t) * TARGET_GDT_ENTRIES
,
398 PROT_READ
|PROT_WRITE
,
399 MAP_ANONYMOUS
|MAP_PRIVATE
, -1, 0);
400 env
->gdt
.limit
= sizeof(uint64_t) * TARGET_GDT_ENTRIES
- 1;
401 gdt_table
= g2h_untagged(env
->gdt
.base
);
403 write_dt(&gdt_table
[__USER_CS
>> 3], 0, 0xfffff,
404 DESC_G_MASK
| DESC_B_MASK
| DESC_P_MASK
| DESC_S_MASK
|
405 (3 << DESC_DPL_SHIFT
) | (0xa << DESC_TYPE_SHIFT
));
407 /* 64 bit code segment */
408 write_dt(&gdt_table
[__USER_CS
>> 3], 0, 0xfffff,
409 DESC_G_MASK
| DESC_B_MASK
| DESC_P_MASK
| DESC_S_MASK
|
411 (3 << DESC_DPL_SHIFT
) | (0xa << DESC_TYPE_SHIFT
));
413 write_dt(&gdt_table
[__USER_DS
>> 3], 0, 0xfffff,
414 DESC_G_MASK
| DESC_B_MASK
| DESC_P_MASK
| DESC_S_MASK
|
415 (3 << DESC_DPL_SHIFT
) | (0x2 << DESC_TYPE_SHIFT
));
417 cpu_x86_load_seg(env
, R_CS
, __USER_CS
);
418 cpu_x86_load_seg(env
, R_SS
, __USER_DS
);
420 cpu_x86_load_seg(env
, R_DS
, __USER_DS
);
421 cpu_x86_load_seg(env
, R_ES
, __USER_DS
);
422 cpu_x86_load_seg(env
, R_FS
, __USER_DS
);
423 cpu_x86_load_seg(env
, R_GS
, __USER_DS
);
424 /* This hack makes Wine work... */
425 env
->segs
[R_FS
].selector
= 0;
427 cpu_x86_load_seg(env
, R_DS
, 0);
428 cpu_x86_load_seg(env
, R_ES
, 0);
429 cpu_x86_load_seg(env
, R_FS
, 0);
430 cpu_x86_load_seg(env
, R_GS
, 0);