]> git.proxmox.com Git - mirror_qemu.git/blob - linux-user/main.c
fixed handling of sparc register window exceptions
[mirror_qemu.git] / linux-user / main.c
1 /*
2 * qemu user main
3 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19 */
20 #include <stdlib.h>
21 #include <stdio.h>
22 #include <stdarg.h>
23 #include <string.h>
24 #include <errno.h>
25 #include <unistd.h>
26
27 #include "qemu.h"
28
29 #define DEBUG_LOGFILE "/tmp/qemu.log"
30
31 #ifdef __APPLE__
32 #include <crt_externs.h>
33 # define environ (*_NSGetEnviron())
34 #endif
35
36 static const char *interp_prefix = CONFIG_QEMU_PREFIX;
37
38 #if defined(__i386__) && !defined(CONFIG_STATIC)
39 /* Force usage of an ELF interpreter even if it is an ELF shared
40 object ! */
41 const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2";
42 #endif
43
44 /* for recent libc, we add these dummy symbols which are not declared
45 when generating a linked object (bug in ld ?) */
46 #if (__GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3)) && !defined(CONFIG_STATIC)
47 long __preinit_array_start[0];
48 long __preinit_array_end[0];
49 long __init_array_start[0];
50 long __init_array_end[0];
51 long __fini_array_start[0];
52 long __fini_array_end[0];
53 #endif
54
55 /* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so
56 we allocate a bigger stack. Need a better solution, for example
57 by remapping the process stack directly at the right place */
58 unsigned long x86_stack_size = 512 * 1024;
59
60 void gemu_log(const char *fmt, ...)
61 {
62 va_list ap;
63
64 va_start(ap, fmt);
65 vfprintf(stderr, fmt, ap);
66 va_end(ap);
67 }
68
69 void cpu_outb(CPUState *env, int addr, int val)
70 {
71 fprintf(stderr, "outb: port=0x%04x, data=%02x\n", addr, val);
72 }
73
74 void cpu_outw(CPUState *env, int addr, int val)
75 {
76 fprintf(stderr, "outw: port=0x%04x, data=%04x\n", addr, val);
77 }
78
79 void cpu_outl(CPUState *env, int addr, int val)
80 {
81 fprintf(stderr, "outl: port=0x%04x, data=%08x\n", addr, val);
82 }
83
84 int cpu_inb(CPUState *env, int addr)
85 {
86 fprintf(stderr, "inb: port=0x%04x\n", addr);
87 return 0;
88 }
89
90 int cpu_inw(CPUState *env, int addr)
91 {
92 fprintf(stderr, "inw: port=0x%04x\n", addr);
93 return 0;
94 }
95
96 int cpu_inl(CPUState *env, int addr)
97 {
98 fprintf(stderr, "inl: port=0x%04x\n", addr);
99 return 0;
100 }
101
102 int cpu_get_pic_interrupt(CPUState *env)
103 {
104 return -1;
105 }
106
107 /* timers for rdtsc */
108
109 #if defined(__i386__)
110
111 int64_t cpu_get_real_ticks(void)
112 {
113 int64_t val;
114 asm volatile ("rdtsc" : "=A" (val));
115 return val;
116 }
117
118 #elif defined(__x86_64__)
119
120 int64_t cpu_get_real_ticks(void)
121 {
122 uint32_t low,high;
123 int64_t val;
124 asm volatile("rdtsc" : "=a" (low), "=d" (high));
125 val = high;
126 val <<= 32;
127 val |= low;
128 return val;
129 }
130
131 #else
132
133 static uint64_t emu_time;
134
135 int64_t cpu_get_real_ticks(void)
136 {
137 return emu_time++;
138 }
139
140 #endif
141
142 #ifdef TARGET_I386
143 /***********************************************************/
144 /* CPUX86 core interface */
145
146 uint64_t cpu_get_tsc(CPUX86State *env)
147 {
148 return cpu_get_real_ticks();
149 }
150
151 static void write_dt(void *ptr, unsigned long addr, unsigned long limit,
152 int flags)
153 {
154 unsigned int e1, e2;
155 e1 = (addr << 16) | (limit & 0xffff);
156 e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000);
157 e2 |= flags;
158 stl((uint8_t *)ptr, e1);
159 stl((uint8_t *)ptr + 4, e2);
160 }
161
162 static void set_gate(void *ptr, unsigned int type, unsigned int dpl,
163 unsigned long addr, unsigned int sel)
164 {
165 unsigned int e1, e2;
166 e1 = (addr & 0xffff) | (sel << 16);
167 e2 = (addr & 0xffff0000) | 0x8000 | (dpl << 13) | (type << 8);
168 stl((uint8_t *)ptr, e1);
169 stl((uint8_t *)ptr + 4, e2);
170 }
171
172 uint64_t gdt_table[6];
173 uint64_t idt_table[256];
174
175 /* only dpl matters as we do only user space emulation */
176 static void set_idt(int n, unsigned int dpl)
177 {
178 set_gate(idt_table + n, 0, dpl, 0, 0);
179 }
180
181 void cpu_loop(CPUX86State *env)
182 {
183 int trapnr;
184 target_ulong pc;
185 target_siginfo_t info;
186
187 for(;;) {
188 trapnr = cpu_x86_exec(env);
189 switch(trapnr) {
190 case 0x80:
191 /* linux syscall */
192 env->regs[R_EAX] = do_syscall(env,
193 env->regs[R_EAX],
194 env->regs[R_EBX],
195 env->regs[R_ECX],
196 env->regs[R_EDX],
197 env->regs[R_ESI],
198 env->regs[R_EDI],
199 env->regs[R_EBP]);
200 break;
201 case EXCP0B_NOSEG:
202 case EXCP0C_STACK:
203 info.si_signo = SIGBUS;
204 info.si_errno = 0;
205 info.si_code = TARGET_SI_KERNEL;
206 info._sifields._sigfault._addr = 0;
207 queue_signal(info.si_signo, &info);
208 break;
209 case EXCP0D_GPF:
210 if (env->eflags & VM_MASK) {
211 handle_vm86_fault(env);
212 } else {
213 info.si_signo = SIGSEGV;
214 info.si_errno = 0;
215 info.si_code = TARGET_SI_KERNEL;
216 info._sifields._sigfault._addr = 0;
217 queue_signal(info.si_signo, &info);
218 }
219 break;
220 case EXCP0E_PAGE:
221 info.si_signo = SIGSEGV;
222 info.si_errno = 0;
223 if (!(env->error_code & 1))
224 info.si_code = TARGET_SEGV_MAPERR;
225 else
226 info.si_code = TARGET_SEGV_ACCERR;
227 info._sifields._sigfault._addr = env->cr[2];
228 queue_signal(info.si_signo, &info);
229 break;
230 case EXCP00_DIVZ:
231 if (env->eflags & VM_MASK) {
232 handle_vm86_trap(env, trapnr);
233 } else {
234 /* division by zero */
235 info.si_signo = SIGFPE;
236 info.si_errno = 0;
237 info.si_code = TARGET_FPE_INTDIV;
238 info._sifields._sigfault._addr = env->eip;
239 queue_signal(info.si_signo, &info);
240 }
241 break;
242 case EXCP01_SSTP:
243 case EXCP03_INT3:
244 if (env->eflags & VM_MASK) {
245 handle_vm86_trap(env, trapnr);
246 } else {
247 info.si_signo = SIGTRAP;
248 info.si_errno = 0;
249 if (trapnr == EXCP01_SSTP) {
250 info.si_code = TARGET_TRAP_BRKPT;
251 info._sifields._sigfault._addr = env->eip;
252 } else {
253 info.si_code = TARGET_SI_KERNEL;
254 info._sifields._sigfault._addr = 0;
255 }
256 queue_signal(info.si_signo, &info);
257 }
258 break;
259 case EXCP04_INTO:
260 case EXCP05_BOUND:
261 if (env->eflags & VM_MASK) {
262 handle_vm86_trap(env, trapnr);
263 } else {
264 info.si_signo = SIGSEGV;
265 info.si_errno = 0;
266 info.si_code = TARGET_SI_KERNEL;
267 info._sifields._sigfault._addr = 0;
268 queue_signal(info.si_signo, &info);
269 }
270 break;
271 case EXCP06_ILLOP:
272 info.si_signo = SIGILL;
273 info.si_errno = 0;
274 info.si_code = TARGET_ILL_ILLOPN;
275 info._sifields._sigfault._addr = env->eip;
276 queue_signal(info.si_signo, &info);
277 break;
278 case EXCP_INTERRUPT:
279 /* just indicate that signals should be handled asap */
280 break;
281 default:
282 pc = env->segs[R_CS].base + env->eip;
283 fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n",
284 (long)pc, trapnr);
285 abort();
286 }
287 process_pending_signals(env);
288 }
289 }
290 #endif
291
292 #ifdef TARGET_ARM
293
294 /* XXX: find a better solution */
295 extern void tb_invalidate_page_range(target_ulong start, target_ulong end);
296
297 static void arm_cache_flush(target_ulong start, target_ulong last)
298 {
299 target_ulong addr, last1;
300
301 if (last < start)
302 return;
303 addr = start;
304 for(;;) {
305 last1 = ((addr + TARGET_PAGE_SIZE) & TARGET_PAGE_MASK) - 1;
306 if (last1 > last)
307 last1 = last;
308 tb_invalidate_page_range(addr, last1 + 1);
309 if (last1 == last)
310 break;
311 addr = last1 + 1;
312 }
313 }
314
315 void cpu_loop(CPUARMState *env)
316 {
317 int trapnr;
318 unsigned int n, insn;
319 target_siginfo_t info;
320
321 for(;;) {
322 trapnr = cpu_arm_exec(env);
323 switch(trapnr) {
324 case EXCP_UDEF:
325 {
326 TaskState *ts = env->opaque;
327 uint32_t opcode;
328
329 /* we handle the FPU emulation here, as Linux */
330 /* we get the opcode */
331 opcode = ldl_raw((uint8_t *)env->regs[15]);
332
333 if (EmulateAll(opcode, &ts->fpa, env->regs) == 0) {
334 info.si_signo = SIGILL;
335 info.si_errno = 0;
336 info.si_code = TARGET_ILL_ILLOPN;
337 info._sifields._sigfault._addr = env->regs[15];
338 queue_signal(info.si_signo, &info);
339 } else {
340 /* increment PC */
341 env->regs[15] += 4;
342 }
343 }
344 break;
345 case EXCP_SWI:
346 {
347 /* system call */
348 insn = ldl((void *)(env->regs[15] - 4));
349 n = insn & 0xffffff;
350 if (n == ARM_NR_cacheflush) {
351 arm_cache_flush(env->regs[0], env->regs[1]);
352 } else if (n >= ARM_SYSCALL_BASE) {
353 /* linux syscall */
354 n -= ARM_SYSCALL_BASE;
355 env->regs[0] = do_syscall(env,
356 n,
357 env->regs[0],
358 env->regs[1],
359 env->regs[2],
360 env->regs[3],
361 env->regs[4],
362 0);
363 } else {
364 goto error;
365 }
366 }
367 break;
368 case EXCP_INTERRUPT:
369 /* just indicate that signals should be handled asap */
370 break;
371 case EXCP_PREFETCH_ABORT:
372 case EXCP_DATA_ABORT:
373 {
374 info.si_signo = SIGSEGV;
375 info.si_errno = 0;
376 /* XXX: check env->error_code */
377 info.si_code = TARGET_SEGV_MAPERR;
378 info._sifields._sigfault._addr = env->cp15_6;
379 queue_signal(info.si_signo, &info);
380 }
381 break;
382 default:
383 error:
384 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
385 trapnr);
386 cpu_dump_state(env, stderr, fprintf, 0);
387 abort();
388 }
389 process_pending_signals(env);
390 }
391 }
392
393 #endif
394
395 #ifdef TARGET_SPARC
396
397 //#define DEBUG_WIN
398
399 /* WARNING: dealing with register windows _is_ complicated. More info
400 can be found at http://www.sics.se/~psm/sparcstack.html */
401 static inline int get_reg_index(CPUSPARCState *env, int cwp, int index)
402 {
403 index = (index + cwp * 16) & (16 * NWINDOWS - 1);
404 /* wrap handling : if cwp is on the last window, then we use the
405 registers 'after' the end */
406 if (index < 8 && env->cwp == (NWINDOWS - 1))
407 index += (16 * NWINDOWS);
408 return index;
409 }
410
411 /* save the register window 'cwp1' */
412 static inline void save_window_offset(CPUSPARCState *env, int cwp1)
413 {
414 unsigned int i;
415 uint32_t *sp_ptr;
416
417 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
418 #if defined(DEBUG_WIN)
419 printf("win_overflow: sp_ptr=0x%x save_cwp=%d\n",
420 (int)sp_ptr, cwp1);
421 #endif
422 for(i = 0; i < 16; i++) {
423 put_user(env->regbase[get_reg_index(env, cwp1, 8 + i)], sp_ptr);
424 sp_ptr++;
425 }
426 }
427
428 static void save_window(CPUSPARCState *env)
429 {
430 unsigned int new_wim;
431 new_wim = ((env->wim >> 1) | (env->wim << (NWINDOWS - 1))) &
432 ((1LL << NWINDOWS) - 1);
433 save_window_offset(env, (env->cwp - 2) & (NWINDOWS - 1));
434 env->wim = new_wim;
435 }
436
437 static void restore_window(CPUSPARCState *env)
438 {
439 unsigned int new_wim, i, cwp1;
440 uint32_t *sp_ptr, reg;
441
442 new_wim = ((env->wim << 1) | (env->wim >> (NWINDOWS - 1))) &
443 ((1LL << NWINDOWS) - 1);
444
445 /* restore the invalid window */
446 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
447 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
448 #if defined(DEBUG_WIN)
449 printf("win_underflow: sp_ptr=0x%x load_cwp=%d\n",
450 (int)sp_ptr, cwp1);
451 #endif
452 for(i = 0; i < 16; i++) {
453 get_user(reg, sp_ptr);
454 env->regbase[get_reg_index(env, cwp1, 8 + i)] = reg;
455 sp_ptr++;
456 }
457 env->wim = new_wim;
458 }
459
460 static void flush_windows(CPUSPARCState *env)
461 {
462 int offset, cwp1;
463
464 offset = 1;
465 for(;;) {
466 /* if restore would invoke restore_window(), then we can stop */
467 cwp1 = (env->cwp + offset) & (NWINDOWS - 1);
468 if (env->wim & (1 << cwp1))
469 break;
470 save_window_offset(env, cwp1);
471 offset++;
472 }
473 /* set wim so that restore will reload the registers */
474 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
475 env->wim = 1 << cwp1;
476 #if defined(DEBUG_WIN)
477 printf("flush_windows: nb=%d\n", offset - 1);
478 #endif
479 }
480
481 void cpu_loop (CPUSPARCState *env)
482 {
483 int trapnr, ret;
484 target_siginfo_t info;
485
486 while (1) {
487 trapnr = cpu_sparc_exec (env);
488
489 switch (trapnr) {
490 case 0x88:
491 case 0x90:
492 ret = do_syscall (env, env->gregs[1],
493 env->regwptr[0], env->regwptr[1],
494 env->regwptr[2], env->regwptr[3],
495 env->regwptr[4], env->regwptr[5]);
496 if ((unsigned int)ret >= (unsigned int)(-515)) {
497 env->psr |= PSR_CARRY;
498 ret = -ret;
499 } else {
500 env->psr &= ~PSR_CARRY;
501 }
502 env->regwptr[0] = ret;
503 /* next instruction */
504 env->pc = env->npc;
505 env->npc = env->npc + 4;
506 break;
507 case 0x83: /* flush windows */
508 flush_windows(env);
509 /* next instruction */
510 env->pc = env->npc;
511 env->npc = env->npc + 4;
512 break;
513 case TT_WIN_OVF: /* window overflow */
514 save_window(env);
515 break;
516 case TT_WIN_UNF: /* window underflow */
517 restore_window(env);
518 break;
519 case TT_TFAULT:
520 case TT_DFAULT:
521 {
522 info.si_signo = SIGSEGV;
523 info.si_errno = 0;
524 /* XXX: check env->error_code */
525 info.si_code = TARGET_SEGV_MAPERR;
526 info._sifields._sigfault._addr = env->mmuregs[4];
527 queue_signal(info.si_signo, &info);
528 }
529 break;
530 case 0x100: // XXX, why do we get these?
531 break;
532 default:
533 printf ("Unhandled trap: 0x%x\n", trapnr);
534 cpu_dump_state(env, stderr, fprintf, 0);
535 exit (1);
536 }
537 process_pending_signals (env);
538 }
539 }
540
541 #endif
542
543 #ifdef TARGET_PPC
544
545 static inline uint64_t cpu_ppc_get_tb (CPUState *env)
546 {
547 /* TO FIX */
548 return 0;
549 }
550
551 uint32_t cpu_ppc_load_tbl (CPUState *env)
552 {
553 return cpu_ppc_get_tb(env) & 0xFFFFFFFF;
554 }
555
556 uint32_t cpu_ppc_load_tbu (CPUState *env)
557 {
558 return cpu_ppc_get_tb(env) >> 32;
559 }
560
561 static void cpu_ppc_store_tb (CPUState *env, uint64_t value)
562 {
563 /* TO FIX */
564 }
565
566 void cpu_ppc_store_tbu (CPUState *env, uint32_t value)
567 {
568 cpu_ppc_store_tb(env, ((uint64_t)value << 32) | cpu_ppc_load_tbl(env));
569 }
570
571 void cpu_ppc_store_tbl (CPUState *env, uint32_t value)
572 {
573 cpu_ppc_store_tb(env, ((uint64_t)cpu_ppc_load_tbl(env) << 32) | value);
574 }
575
576 uint32_t cpu_ppc_load_decr (CPUState *env)
577 {
578 /* TO FIX */
579 return -1;
580 }
581
582 void cpu_ppc_store_decr (CPUState *env, uint32_t value)
583 {
584 /* TO FIX */
585 }
586
587 void cpu_loop(CPUPPCState *env)
588 {
589 target_siginfo_t info;
590 int trapnr;
591 uint32_t ret;
592
593 for(;;) {
594 trapnr = cpu_ppc_exec(env);
595 if (trapnr != EXCP_SYSCALL_USER && trapnr != EXCP_BRANCH &&
596 trapnr != EXCP_TRACE) {
597 if (loglevel > 0) {
598 cpu_dump_state(env, logfile, fprintf, 0);
599 }
600 }
601 switch(trapnr) {
602 case EXCP_NONE:
603 break;
604 case EXCP_SYSCALL_USER:
605 /* system call */
606 /* WARNING:
607 * PPC ABI uses overflow flag in cr0 to signal an error
608 * in syscalls.
609 */
610 #if 0
611 printf("syscall %d 0x%08x 0x%08x 0x%08x 0x%08x\n", env->gpr[0],
612 env->gpr[3], env->gpr[4], env->gpr[5], env->gpr[6]);
613 #endif
614 env->crf[0] &= ~0x1;
615 ret = do_syscall(env, env->gpr[0], env->gpr[3], env->gpr[4],
616 env->gpr[5], env->gpr[6], env->gpr[7],
617 env->gpr[8]);
618 if (ret > (uint32_t)(-515)) {
619 env->crf[0] |= 0x1;
620 ret = -ret;
621 }
622 env->gpr[3] = ret;
623 #if 0
624 printf("syscall returned 0x%08x (%d)\n", ret, ret);
625 #endif
626 break;
627 case EXCP_RESET:
628 /* Should not happen ! */
629 fprintf(stderr, "RESET asked... Stop emulation\n");
630 if (loglevel)
631 fprintf(logfile, "RESET asked... Stop emulation\n");
632 abort();
633 case EXCP_MACHINE_CHECK:
634 fprintf(stderr, "Machine check exeption... Stop emulation\n");
635 if (loglevel)
636 fprintf(logfile, "RESET asked... Stop emulation\n");
637 info.si_signo = TARGET_SIGBUS;
638 info.si_errno = 0;
639 info.si_code = TARGET_BUS_OBJERR;
640 info._sifields._sigfault._addr = env->nip - 4;
641 queue_signal(info.si_signo, &info);
642 case EXCP_DSI:
643 fprintf(stderr, "Invalid data memory access: 0x%08x\n", env->spr[DAR]);
644 if (loglevel) {
645 fprintf(logfile, "Invalid data memory access: 0x%08x\n",
646 env->spr[DAR]);
647 }
648 switch (env->error_code & 0xF) {
649 case EXCP_DSI_TRANSLATE:
650 info.si_signo = TARGET_SIGSEGV;
651 info.si_errno = 0;
652 info.si_code = TARGET_SEGV_MAPERR;
653 break;
654 case EXCP_DSI_NOTSUP:
655 case EXCP_DSI_EXTERNAL:
656 info.si_signo = TARGET_SIGILL;
657 info.si_errno = 0;
658 info.si_code = TARGET_ILL_ILLADR;
659 break;
660 case EXCP_DSI_PROT:
661 info.si_signo = TARGET_SIGSEGV;
662 info.si_errno = 0;
663 info.si_code = TARGET_SEGV_ACCERR;
664 break;
665 case EXCP_DSI_DABR:
666 info.si_signo = TARGET_SIGTRAP;
667 info.si_errno = 0;
668 info.si_code = TARGET_TRAP_BRKPT;
669 break;
670 default:
671 /* Let's send a regular segfault... */
672 fprintf(stderr, "Invalid segfault errno (%02x)\n",
673 env->error_code);
674 if (loglevel) {
675 fprintf(logfile, "Invalid segfault errno (%02x)\n",
676 env->error_code);
677 }
678 info.si_signo = TARGET_SIGSEGV;
679 info.si_errno = 0;
680 info.si_code = TARGET_SEGV_MAPERR;
681 break;
682 }
683 info._sifields._sigfault._addr = env->nip;
684 queue_signal(info.si_signo, &info);
685 break;
686 case EXCP_ISI:
687 fprintf(stderr, "Invalid instruction fetch\n");
688 if (loglevel)
689 fprintf(logfile, "Invalid instruction fetch\n");
690 switch (env->error_code) {
691 case EXCP_ISI_TRANSLATE:
692 info.si_signo = TARGET_SIGSEGV;
693 info.si_errno = 0;
694 info.si_code = TARGET_SEGV_MAPERR;
695 break;
696 case EXCP_ISI_GUARD:
697 info.si_signo = TARGET_SIGILL;
698 info.si_errno = 0;
699 info.si_code = TARGET_ILL_ILLADR;
700 break;
701 case EXCP_ISI_NOEXEC:
702 case EXCP_ISI_PROT:
703 info.si_signo = TARGET_SIGSEGV;
704 info.si_errno = 0;
705 info.si_code = TARGET_SEGV_ACCERR;
706 break;
707 default:
708 /* Let's send a regular segfault... */
709 fprintf(stderr, "Invalid segfault errno (%02x)\n",
710 env->error_code);
711 if (loglevel) {
712 fprintf(logfile, "Invalid segfault errno (%02x)\n",
713 env->error_code);
714 }
715 info.si_signo = TARGET_SIGSEGV;
716 info.si_errno = 0;
717 info.si_code = TARGET_SEGV_MAPERR;
718 break;
719 }
720 info._sifields._sigfault._addr = env->nip - 4;
721 queue_signal(info.si_signo, &info);
722 break;
723 case EXCP_EXTERNAL:
724 /* Should not happen ! */
725 fprintf(stderr, "External interruption... Stop emulation\n");
726 if (loglevel)
727 fprintf(logfile, "External interruption... Stop emulation\n");
728 abort();
729 case EXCP_ALIGN:
730 fprintf(stderr, "Invalid unaligned memory access\n");
731 if (loglevel)
732 fprintf(logfile, "Invalid unaligned memory access\n");
733 info.si_signo = TARGET_SIGBUS;
734 info.si_errno = 0;
735 info.si_code = TARGET_BUS_ADRALN;
736 info._sifields._sigfault._addr = env->nip - 4;
737 queue_signal(info.si_signo, &info);
738 break;
739 case EXCP_PROGRAM:
740 switch (env->error_code & ~0xF) {
741 case EXCP_FP:
742 fprintf(stderr, "Program exception\n");
743 if (loglevel)
744 fprintf(logfile, "Program exception\n");
745 /* Set FX */
746 env->fpscr[7] |= 0x8;
747 /* Finally, update FEX */
748 if ((((env->fpscr[7] & 0x3) << 3) | (env->fpscr[6] >> 1)) &
749 ((env->fpscr[1] << 1) | (env->fpscr[0] >> 3)))
750 env->fpscr[7] |= 0x4;
751 info.si_signo = TARGET_SIGFPE;
752 info.si_errno = 0;
753 switch (env->error_code & 0xF) {
754 case EXCP_FP_OX:
755 info.si_code = TARGET_FPE_FLTOVF;
756 break;
757 case EXCP_FP_UX:
758 info.si_code = TARGET_FPE_FLTUND;
759 break;
760 case EXCP_FP_ZX:
761 case EXCP_FP_VXZDZ:
762 info.si_code = TARGET_FPE_FLTDIV;
763 break;
764 case EXCP_FP_XX:
765 info.si_code = TARGET_FPE_FLTRES;
766 break;
767 case EXCP_FP_VXSOFT:
768 info.si_code = TARGET_FPE_FLTINV;
769 break;
770 case EXCP_FP_VXNAN:
771 case EXCP_FP_VXISI:
772 case EXCP_FP_VXIDI:
773 case EXCP_FP_VXIMZ:
774 case EXCP_FP_VXVC:
775 case EXCP_FP_VXSQRT:
776 case EXCP_FP_VXCVI:
777 info.si_code = TARGET_FPE_FLTSUB;
778 break;
779 default:
780 fprintf(stderr, "Unknown floating point exception "
781 "(%02x)\n", env->error_code);
782 if (loglevel) {
783 fprintf(logfile, "Unknown floating point exception "
784 "(%02x)\n", env->error_code & 0xF);
785 }
786 }
787 break;
788 case EXCP_INVAL:
789 fprintf(stderr, "Invalid instruction\n");
790 if (loglevel)
791 fprintf(logfile, "Invalid instruction\n");
792 info.si_signo = TARGET_SIGILL;
793 info.si_errno = 0;
794 switch (env->error_code & 0xF) {
795 case EXCP_INVAL_INVAL:
796 info.si_code = TARGET_ILL_ILLOPC;
797 break;
798 case EXCP_INVAL_LSWX:
799 info.si_code = TARGET_ILL_ILLOPN;
800 break;
801 case EXCP_INVAL_SPR:
802 info.si_code = TARGET_ILL_PRVREG;
803 break;
804 case EXCP_INVAL_FP:
805 info.si_code = TARGET_ILL_COPROC;
806 break;
807 default:
808 fprintf(stderr, "Unknown invalid operation (%02x)\n",
809 env->error_code & 0xF);
810 if (loglevel) {
811 fprintf(logfile, "Unknown invalid operation (%02x)\n",
812 env->error_code & 0xF);
813 }
814 info.si_code = TARGET_ILL_ILLADR;
815 break;
816 }
817 break;
818 case EXCP_PRIV:
819 fprintf(stderr, "Privilege violation\n");
820 if (loglevel)
821 fprintf(logfile, "Privilege violation\n");
822 info.si_signo = TARGET_SIGILL;
823 info.si_errno = 0;
824 switch (env->error_code & 0xF) {
825 case EXCP_PRIV_OPC:
826 info.si_code = TARGET_ILL_PRVOPC;
827 break;
828 case EXCP_PRIV_REG:
829 info.si_code = TARGET_ILL_PRVREG;
830 break;
831 default:
832 fprintf(stderr, "Unknown privilege violation (%02x)\n",
833 env->error_code & 0xF);
834 info.si_code = TARGET_ILL_PRVOPC;
835 break;
836 }
837 break;
838 case EXCP_TRAP:
839 fprintf(stderr, "Tried to call a TRAP\n");
840 if (loglevel)
841 fprintf(logfile, "Tried to call a TRAP\n");
842 abort();
843 default:
844 /* Should not happen ! */
845 fprintf(stderr, "Unknown program exception (%02x)\n",
846 env->error_code);
847 if (loglevel) {
848 fprintf(logfile, "Unknwon program exception (%02x)\n",
849 env->error_code);
850 }
851 abort();
852 }
853 info._sifields._sigfault._addr = env->nip - 4;
854 queue_signal(info.si_signo, &info);
855 break;
856 case EXCP_NO_FP:
857 fprintf(stderr, "No floating point allowed\n");
858 if (loglevel)
859 fprintf(logfile, "No floating point allowed\n");
860 info.si_signo = TARGET_SIGILL;
861 info.si_errno = 0;
862 info.si_code = TARGET_ILL_COPROC;
863 info._sifields._sigfault._addr = env->nip - 4;
864 queue_signal(info.si_signo, &info);
865 break;
866 case EXCP_DECR:
867 /* Should not happen ! */
868 fprintf(stderr, "Decrementer exception\n");
869 if (loglevel)
870 fprintf(logfile, "Decrementer exception\n");
871 abort();
872 case EXCP_RESA: /* Implementation specific */
873 /* Should not happen ! */
874 fprintf(stderr, "RESA exception should never happen !\n");
875 if (loglevel)
876 fprintf(logfile, "RESA exception should never happen !\n");
877 abort();
878 case EXCP_RESB: /* Implementation specific */
879 /* Should not happen ! */
880 fprintf(stderr, "RESB exception should never happen !\n");
881 if (loglevel)
882 fprintf(logfile, "RESB exception should never happen !\n");
883 abort();
884 case EXCP_TRACE:
885 /* Do nothing: we use this to trace execution */
886 break;
887 case EXCP_FP_ASSIST:
888 /* Should not happen ! */
889 fprintf(stderr, "Floating point assist exception\n");
890 if (loglevel)
891 fprintf(logfile, "Floating point assist exception\n");
892 abort();
893 case EXCP_MTMSR:
894 /* We reloaded the msr, just go on */
895 if (msr_pr == 0) {
896 fprintf(stderr, "Tried to go into supervisor mode !\n");
897 if (loglevel)
898 fprintf(logfile, "Tried to go into supervisor mode !\n");
899 abort();
900 }
901 break;
902 case EXCP_BRANCH:
903 /* We stopped because of a jump... */
904 break;
905 case EXCP_RFI:
906 /* Should not occur: we always are in user mode */
907 fprintf(stderr, "Return from interrupt ?\n");
908 if (loglevel)
909 fprintf(logfile, "Return from interrupt ?\n");
910 abort();
911 case EXCP_INTERRUPT:
912 /* Don't know why this should ever happen... */
913 break;
914 case EXCP_DEBUG:
915 break;
916 default:
917 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
918 trapnr);
919 if (loglevel) {
920 fprintf(logfile, "qemu: unhandled CPU exception 0x%02x - "
921 "0x%02x - aborting\n", trapnr, env->error_code);
922 }
923 abort();
924 }
925 process_pending_signals(env);
926 }
927 }
928 #endif
929
930 void usage(void)
931 {
932 printf("qemu-" TARGET_ARCH " version " QEMU_VERSION ", Copyright (c) 2003-2004 Fabrice Bellard\n"
933 "usage: qemu-" TARGET_ARCH " [-h] [-d opts] [-L path] [-s size] program [arguments...]\n"
934 "Linux CPU emulator (compiled for %s emulation)\n"
935 "\n"
936 "-h print this help\n"
937 "-L path set the elf interpreter prefix (default=%s)\n"
938 "-s size set the stack size in bytes (default=%ld)\n"
939 "\n"
940 "debug options:\n"
941 #ifdef USE_CODE_COPY
942 "-no-code-copy disable code copy acceleration\n"
943 #endif
944 "-d options activate log (logfile=%s)\n"
945 "-p pagesize set the host page size to 'pagesize'\n",
946 TARGET_ARCH,
947 interp_prefix,
948 x86_stack_size,
949 DEBUG_LOGFILE);
950 _exit(1);
951 }
952
953 /* XXX: currently only used for async signals (see signal.c) */
954 CPUState *global_env;
955 /* used only if single thread */
956 CPUState *cpu_single_env = NULL;
957
958 /* used to free thread contexts */
959 TaskState *first_task_state;
960
961 int main(int argc, char **argv)
962 {
963 const char *filename;
964 struct target_pt_regs regs1, *regs = &regs1;
965 struct image_info info1, *info = &info1;
966 TaskState ts1, *ts = &ts1;
967 CPUState *env;
968 int optind;
969 const char *r;
970
971 if (argc <= 1)
972 usage();
973
974 /* init debug */
975 cpu_set_log_filename(DEBUG_LOGFILE);
976
977 optind = 1;
978 for(;;) {
979 if (optind >= argc)
980 break;
981 r = argv[optind];
982 if (r[0] != '-')
983 break;
984 optind++;
985 r++;
986 if (!strcmp(r, "-")) {
987 break;
988 } else if (!strcmp(r, "d")) {
989 int mask;
990 CPULogItem *item;
991
992 if (optind >= argc)
993 break;
994
995 r = argv[optind++];
996 mask = cpu_str_to_log_mask(r);
997 if (!mask) {
998 printf("Log items (comma separated):\n");
999 for(item = cpu_log_items; item->mask != 0; item++) {
1000 printf("%-10s %s\n", item->name, item->help);
1001 }
1002 exit(1);
1003 }
1004 cpu_set_log(mask);
1005 } else if (!strcmp(r, "s")) {
1006 r = argv[optind++];
1007 x86_stack_size = strtol(r, (char **)&r, 0);
1008 if (x86_stack_size <= 0)
1009 usage();
1010 if (*r == 'M')
1011 x86_stack_size *= 1024 * 1024;
1012 else if (*r == 'k' || *r == 'K')
1013 x86_stack_size *= 1024;
1014 } else if (!strcmp(r, "L")) {
1015 interp_prefix = argv[optind++];
1016 } else if (!strcmp(r, "p")) {
1017 qemu_host_page_size = atoi(argv[optind++]);
1018 if (qemu_host_page_size == 0 ||
1019 (qemu_host_page_size & (qemu_host_page_size - 1)) != 0) {
1020 fprintf(stderr, "page size must be a power of two\n");
1021 exit(1);
1022 }
1023 } else
1024 #ifdef USE_CODE_COPY
1025 if (!strcmp(r, "no-code-copy")) {
1026 code_copy_enabled = 0;
1027 } else
1028 #endif
1029 {
1030 usage();
1031 }
1032 }
1033 if (optind >= argc)
1034 usage();
1035 filename = argv[optind];
1036
1037 /* Zero out regs */
1038 memset(regs, 0, sizeof(struct target_pt_regs));
1039
1040 /* Zero out image_info */
1041 memset(info, 0, sizeof(struct image_info));
1042
1043 /* Scan interp_prefix dir for replacement files. */
1044 init_paths(interp_prefix);
1045
1046 /* NOTE: we need to init the CPU at this stage to get
1047 qemu_host_page_size */
1048 env = cpu_init();
1049
1050 if (elf_exec(filename, argv+optind, environ, regs, info) != 0) {
1051 printf("Error loading %s\n", filename);
1052 _exit(1);
1053 }
1054
1055 if (loglevel) {
1056 page_dump(logfile);
1057
1058 fprintf(logfile, "start_brk 0x%08lx\n" , info->start_brk);
1059 fprintf(logfile, "end_code 0x%08lx\n" , info->end_code);
1060 fprintf(logfile, "start_code 0x%08lx\n" , info->start_code);
1061 fprintf(logfile, "end_data 0x%08lx\n" , info->end_data);
1062 fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack);
1063 fprintf(logfile, "brk 0x%08lx\n" , info->brk);
1064 fprintf(logfile, "entry 0x%08lx\n" , info->entry);
1065 }
1066
1067 target_set_brk((char *)info->brk);
1068 syscall_init();
1069 signal_init();
1070
1071 global_env = env;
1072
1073 /* build Task State */
1074 memset(ts, 0, sizeof(TaskState));
1075 env->opaque = ts;
1076 ts->used = 1;
1077 env->user_mode_only = 1;
1078
1079 #if defined(TARGET_I386)
1080 cpu_x86_set_cpl(env, 3);
1081
1082 env->cr[0] = CR0_PG_MASK | CR0_WP_MASK | CR0_PE_MASK;
1083 env->hflags |= HF_PE_MASK;
1084 if (env->cpuid_features & CPUID_SSE) {
1085 env->cr[4] |= CR4_OSFXSR_MASK;
1086 env->hflags |= HF_OSFXSR_MASK;
1087 }
1088
1089 /* flags setup : we activate the IRQs by default as in user mode */
1090 env->eflags |= IF_MASK;
1091
1092 /* linux register setup */
1093 env->regs[R_EAX] = regs->eax;
1094 env->regs[R_EBX] = regs->ebx;
1095 env->regs[R_ECX] = regs->ecx;
1096 env->regs[R_EDX] = regs->edx;
1097 env->regs[R_ESI] = regs->esi;
1098 env->regs[R_EDI] = regs->edi;
1099 env->regs[R_EBP] = regs->ebp;
1100 env->regs[R_ESP] = regs->esp;
1101 env->eip = regs->eip;
1102
1103 /* linux interrupt setup */
1104 env->idt.base = (long)idt_table;
1105 env->idt.limit = sizeof(idt_table) - 1;
1106 set_idt(0, 0);
1107 set_idt(1, 0);
1108 set_idt(2, 0);
1109 set_idt(3, 3);
1110 set_idt(4, 3);
1111 set_idt(5, 3);
1112 set_idt(6, 0);
1113 set_idt(7, 0);
1114 set_idt(8, 0);
1115 set_idt(9, 0);
1116 set_idt(10, 0);
1117 set_idt(11, 0);
1118 set_idt(12, 0);
1119 set_idt(13, 0);
1120 set_idt(14, 0);
1121 set_idt(15, 0);
1122 set_idt(16, 0);
1123 set_idt(17, 0);
1124 set_idt(18, 0);
1125 set_idt(19, 0);
1126 set_idt(0x80, 3);
1127
1128 /* linux segment setup */
1129 env->gdt.base = (long)gdt_table;
1130 env->gdt.limit = sizeof(gdt_table) - 1;
1131 write_dt(&gdt_table[__USER_CS >> 3], 0, 0xfffff,
1132 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
1133 (3 << DESC_DPL_SHIFT) | (0xa << DESC_TYPE_SHIFT));
1134 write_dt(&gdt_table[__USER_DS >> 3], 0, 0xfffff,
1135 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
1136 (3 << DESC_DPL_SHIFT) | (0x2 << DESC_TYPE_SHIFT));
1137 cpu_x86_load_seg(env, R_CS, __USER_CS);
1138 cpu_x86_load_seg(env, R_DS, __USER_DS);
1139 cpu_x86_load_seg(env, R_ES, __USER_DS);
1140 cpu_x86_load_seg(env, R_SS, __USER_DS);
1141 cpu_x86_load_seg(env, R_FS, __USER_DS);
1142 cpu_x86_load_seg(env, R_GS, __USER_DS);
1143
1144 #elif defined(TARGET_ARM)
1145 {
1146 int i;
1147 for(i = 0; i < 16; i++) {
1148 env->regs[i] = regs->uregs[i];
1149 }
1150 env->cpsr = regs->uregs[16];
1151 }
1152 #elif defined(TARGET_SPARC)
1153 {
1154 int i;
1155 env->pc = regs->pc;
1156 env->npc = regs->npc;
1157 env->y = regs->y;
1158 for(i = 0; i < 8; i++)
1159 env->gregs[i] = regs->u_regs[i];
1160 for(i = 0; i < 8; i++)
1161 env->regwptr[i] = regs->u_regs[i + 8];
1162 }
1163 #elif defined(TARGET_PPC)
1164 {
1165 int i;
1166 for (i = 0; i < 32; i++) {
1167 if (i != 12 && i != 6)
1168 env->msr[i] = (regs->msr >> i) & 1;
1169 }
1170 env->nip = regs->nip;
1171 for(i = 0; i < 32; i++) {
1172 env->gpr[i] = regs->gpr[i];
1173 }
1174 }
1175 #else
1176 #error unsupported target CPU
1177 #endif
1178
1179 cpu_loop(env);
1180 /* never exits */
1181 return 0;
1182 }