]> git.proxmox.com Git - mirror_qemu.git/blob - linux-user/main.c
arm nwfpe support - added code no-code-copy option - __preinit_array_start bug fix...
[mirror_qemu.git] / linux-user / main.c
1 /*
2 * qemu user main
3 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19 */
20 #include <stdlib.h>
21 #include <stdio.h>
22 #include <stdarg.h>
23 #include <string.h>
24 #include <errno.h>
25 #include <unistd.h>
26
27 #include "qemu.h"
28
29 #define DEBUG_LOGFILE "/tmp/qemu.log"
30
31 static const char *interp_prefix = CONFIG_QEMU_PREFIX;
32
33 #if defined(__i386__) && !defined(CONFIG_STATIC)
34 /* Force usage of an ELF interpreter even if it is an ELF shared
35 object ! */
36 const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2";
37 #endif
38
39 /* for recent libc, we add these dummy symbols which are not declared
40 when generating a linked object (bug in ld ?) */
41 #if __GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3)
42 long __preinit_array_start[0];
43 long __preinit_array_end[0];
44 long __init_array_start[0];
45 long __init_array_end[0];
46 long __fini_array_start[0];
47 long __fini_array_end[0];
48 #endif
49
50 /* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so
51 we allocate a bigger stack. Need a better solution, for example
52 by remapping the process stack directly at the right place */
53 unsigned long x86_stack_size = 512 * 1024;
54
55 void gemu_log(const char *fmt, ...)
56 {
57 va_list ap;
58
59 va_start(ap, fmt);
60 vfprintf(stderr, fmt, ap);
61 va_end(ap);
62 }
63
64 void cpu_outb(CPUState *env, int addr, int val)
65 {
66 fprintf(stderr, "outb: port=0x%04x, data=%02x\n", addr, val);
67 }
68
69 void cpu_outw(CPUState *env, int addr, int val)
70 {
71 fprintf(stderr, "outw: port=0x%04x, data=%04x\n", addr, val);
72 }
73
74 void cpu_outl(CPUState *env, int addr, int val)
75 {
76 fprintf(stderr, "outl: port=0x%04x, data=%08x\n", addr, val);
77 }
78
79 int cpu_inb(CPUState *env, int addr)
80 {
81 fprintf(stderr, "inb: port=0x%04x\n", addr);
82 return 0;
83 }
84
85 int cpu_inw(CPUState *env, int addr)
86 {
87 fprintf(stderr, "inw: port=0x%04x\n", addr);
88 return 0;
89 }
90
91 int cpu_inl(CPUState *env, int addr)
92 {
93 fprintf(stderr, "inl: port=0x%04x\n", addr);
94 return 0;
95 }
96
97 #ifdef TARGET_I386
98 /***********************************************************/
99 /* CPUX86 core interface */
100
101 int cpu_x86_get_pic_interrupt(CPUState *env)
102 {
103 return -1;
104 }
105
106 static void write_dt(void *ptr, unsigned long addr, unsigned long limit,
107 int flags)
108 {
109 unsigned int e1, e2;
110 e1 = (addr << 16) | (limit & 0xffff);
111 e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000);
112 e2 |= flags;
113 stl((uint8_t *)ptr, e1);
114 stl((uint8_t *)ptr + 4, e2);
115 }
116
117 static void set_gate(void *ptr, unsigned int type, unsigned int dpl,
118 unsigned long addr, unsigned int sel)
119 {
120 unsigned int e1, e2;
121 e1 = (addr & 0xffff) | (sel << 16);
122 e2 = (addr & 0xffff0000) | 0x8000 | (dpl << 13) | (type << 8);
123 stl((uint8_t *)ptr, e1);
124 stl((uint8_t *)ptr + 4, e2);
125 }
126
127 uint64_t gdt_table[6];
128 uint64_t idt_table[256];
129
130 /* only dpl matters as we do only user space emulation */
131 static void set_idt(int n, unsigned int dpl)
132 {
133 set_gate(idt_table + n, 0, dpl, 0, 0);
134 }
135
136 void cpu_loop(CPUX86State *env)
137 {
138 int trapnr;
139 uint8_t *pc;
140 target_siginfo_t info;
141
142 for(;;) {
143 trapnr = cpu_x86_exec(env);
144 switch(trapnr) {
145 case 0x80:
146 /* linux syscall */
147 env->regs[R_EAX] = do_syscall(env,
148 env->regs[R_EAX],
149 env->regs[R_EBX],
150 env->regs[R_ECX],
151 env->regs[R_EDX],
152 env->regs[R_ESI],
153 env->regs[R_EDI],
154 env->regs[R_EBP]);
155 break;
156 case EXCP0B_NOSEG:
157 case EXCP0C_STACK:
158 info.si_signo = SIGBUS;
159 info.si_errno = 0;
160 info.si_code = TARGET_SI_KERNEL;
161 info._sifields._sigfault._addr = 0;
162 queue_signal(info.si_signo, &info);
163 break;
164 case EXCP0D_GPF:
165 if (env->eflags & VM_MASK) {
166 handle_vm86_fault(env);
167 } else {
168 info.si_signo = SIGSEGV;
169 info.si_errno = 0;
170 info.si_code = TARGET_SI_KERNEL;
171 info._sifields._sigfault._addr = 0;
172 queue_signal(info.si_signo, &info);
173 }
174 break;
175 case EXCP0E_PAGE:
176 info.si_signo = SIGSEGV;
177 info.si_errno = 0;
178 if (!(env->error_code & 1))
179 info.si_code = TARGET_SEGV_MAPERR;
180 else
181 info.si_code = TARGET_SEGV_ACCERR;
182 info._sifields._sigfault._addr = env->cr[2];
183 queue_signal(info.si_signo, &info);
184 break;
185 case EXCP00_DIVZ:
186 if (env->eflags & VM_MASK) {
187 handle_vm86_trap(env, trapnr);
188 } else {
189 /* division by zero */
190 info.si_signo = SIGFPE;
191 info.si_errno = 0;
192 info.si_code = TARGET_FPE_INTDIV;
193 info._sifields._sigfault._addr = env->eip;
194 queue_signal(info.si_signo, &info);
195 }
196 break;
197 case EXCP01_SSTP:
198 case EXCP03_INT3:
199 if (env->eflags & VM_MASK) {
200 handle_vm86_trap(env, trapnr);
201 } else {
202 info.si_signo = SIGTRAP;
203 info.si_errno = 0;
204 if (trapnr == EXCP01_SSTP) {
205 info.si_code = TARGET_TRAP_BRKPT;
206 info._sifields._sigfault._addr = env->eip;
207 } else {
208 info.si_code = TARGET_SI_KERNEL;
209 info._sifields._sigfault._addr = 0;
210 }
211 queue_signal(info.si_signo, &info);
212 }
213 break;
214 case EXCP04_INTO:
215 case EXCP05_BOUND:
216 if (env->eflags & VM_MASK) {
217 handle_vm86_trap(env, trapnr);
218 } else {
219 info.si_signo = SIGSEGV;
220 info.si_errno = 0;
221 info.si_code = TARGET_SI_KERNEL;
222 info._sifields._sigfault._addr = 0;
223 queue_signal(info.si_signo, &info);
224 }
225 break;
226 case EXCP06_ILLOP:
227 info.si_signo = SIGILL;
228 info.si_errno = 0;
229 info.si_code = TARGET_ILL_ILLOPN;
230 info._sifields._sigfault._addr = env->eip;
231 queue_signal(info.si_signo, &info);
232 break;
233 case EXCP_INTERRUPT:
234 /* just indicate that signals should be handled asap */
235 break;
236 default:
237 pc = env->segs[R_CS].base + env->eip;
238 fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n",
239 (long)pc, trapnr);
240 abort();
241 }
242 process_pending_signals(env);
243 }
244 }
245 #endif
246
247 #ifdef TARGET_ARM
248
249 void cpu_loop(CPUARMState *env)
250 {
251 int trapnr;
252 unsigned int n, insn;
253 target_siginfo_t info;
254
255 for(;;) {
256 trapnr = cpu_arm_exec(env);
257 switch(trapnr) {
258 case EXCP_UDEF:
259 {
260 TaskState *ts = env->opaque;
261 uint32_t opcode;
262
263 /* we handle the FPU emulation here, as Linux */
264 /* we get the opcode */
265 opcode = ldl_raw((uint8_t *)env->regs[15]);
266
267 if (EmulateAll(opcode, &ts->fpa, env->regs) == 0) {
268 info.si_signo = SIGILL;
269 info.si_errno = 0;
270 info.si_code = TARGET_ILL_ILLOPN;
271 info._sifields._sigfault._addr = env->regs[15];
272 queue_signal(info.si_signo, &info);
273 } else {
274 /* increment PC */
275 env->regs[15] += 4;
276 }
277 }
278 break;
279 case EXCP_SWI:
280 {
281 /* system call */
282 insn = ldl((void *)(env->regs[15] - 4));
283 n = insn & 0xffffff;
284 if (n >= ARM_SYSCALL_BASE) {
285 /* linux syscall */
286 n -= ARM_SYSCALL_BASE;
287 env->regs[0] = do_syscall(env,
288 n,
289 env->regs[0],
290 env->regs[1],
291 env->regs[2],
292 env->regs[3],
293 env->regs[4],
294 0);
295 } else {
296 goto error;
297 }
298 }
299 break;
300 case EXCP_INTERRUPT:
301 /* just indicate that signals should be handled asap */
302 break;
303 default:
304 error:
305 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
306 trapnr);
307 cpu_arm_dump_state(env, stderr, 0);
308 abort();
309 }
310 process_pending_signals(env);
311 }
312 }
313
314 #endif
315
316 #ifdef TARGET_SPARC
317
318 //#define DEBUG_WIN
319
320 /* WARNING: dealing with register windows _is_ complicated */
321 static inline int get_reg_index(CPUSPARCState *env, int cwp, int index)
322 {
323 index = (index + cwp * 16) & (16 * NWINDOWS - 1);
324 /* wrap handling : if cwp is on the last window, then we use the
325 registers 'after' the end */
326 if (index < 8 && env->cwp == (NWINDOWS - 1))
327 index += (16 * NWINDOWS);
328 return index;
329 }
330
331 static inline void save_window_offset(CPUSPARCState *env, int offset)
332 {
333 unsigned int new_wim, i, cwp1;
334 uint32_t *sp_ptr;
335
336 new_wim = ((env->wim >> 1) | (env->wim << (NWINDOWS - 1))) &
337 ((1LL << NWINDOWS) - 1);
338 /* save the window */
339 cwp1 = (env->cwp + offset) & (NWINDOWS - 1);
340 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
341 #if defined(DEBUG_WIN)
342 printf("win_overflow: sp_ptr=0x%x save_cwp=%d\n",
343 (int)sp_ptr, cwp1);
344 #endif
345 for(i = 0; i < 16; i++)
346 stl_raw(sp_ptr + i, env->regbase[get_reg_index(env, cwp1, 8 + i)]);
347 env->wim = new_wim;
348 }
349
350 static void save_window(CPUSPARCState *env)
351 {
352 save_window_offset(env, 2);
353 }
354
355 static void restore_window(CPUSPARCState *env)
356 {
357 unsigned int new_wim, i, cwp1;
358 uint32_t *sp_ptr;
359
360 new_wim = ((env->wim << 1) | (env->wim >> (NWINDOWS - 1))) &
361 ((1LL << NWINDOWS) - 1);
362
363 /* restore the invalid window */
364 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
365 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
366 #if defined(DEBUG_WIN)
367 printf("win_underflow: sp_ptr=0x%x load_cwp=%d\n",
368 (int)sp_ptr, cwp1);
369 #endif
370 for(i = 0; i < 16; i++)
371 env->regbase[get_reg_index(env, cwp1, 8 + i)] = ldl_raw(sp_ptr + i);
372 env->wim = new_wim;
373 }
374
375 static void flush_windows(CPUSPARCState *env)
376 {
377 int offset, cwp1;
378 #if defined(DEBUG_WIN)
379 printf("flush_windows:\n");
380 #endif
381 offset = 2;
382 for(;;) {
383 /* if restore would invoke restore_window(), then we can stop */
384 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
385 if (env->wim & (1 << cwp1))
386 break;
387 #if defined(DEBUG_WIN)
388 printf("offset=%d: ", offset);
389 #endif
390 save_window_offset(env, offset);
391 offset++;
392 }
393 }
394
395 void cpu_loop (CPUSPARCState *env)
396 {
397 int trapnr, ret;
398
399 while (1) {
400 trapnr = cpu_sparc_exec (env);
401
402 switch (trapnr) {
403 case 0x88:
404 case 0x90:
405 ret = do_syscall (env, env->gregs[1],
406 env->regwptr[0], env->regwptr[1],
407 env->regwptr[2], env->regwptr[3],
408 env->regwptr[4], env->regwptr[5]);
409 if ((unsigned int)ret >= (unsigned int)(-515)) {
410 env->psr |= PSR_CARRY;
411 ret = -ret;
412 } else {
413 env->psr &= ~PSR_CARRY;
414 }
415 env->regwptr[0] = ret;
416 /* next instruction */
417 env->pc = env->npc;
418 env->npc = env->npc + 4;
419 break;
420 case 0x83: /* flush windows */
421 // flush_windows(env);
422 /* next instruction */
423 env->pc = env->npc;
424 env->npc = env->npc + 4;
425 break;
426 case TT_WIN_OVF: /* window overflow */
427 save_window(env);
428 break;
429 case TT_WIN_UNF: /* window underflow */
430 restore_window(env);
431 break;
432 default:
433 printf ("Unhandled trap: 0x%x\n", trapnr);
434 cpu_sparc_dump_state(env, stderr, 0);
435 exit (1);
436 }
437 process_pending_signals (env);
438 }
439 }
440
441 #endif
442
443 #ifdef TARGET_PPC
444
445 void cpu_loop(CPUPPCState *env)
446 {
447 target_siginfo_t info;
448 int trapnr;
449 uint32_t ret;
450
451 for(;;) {
452 trapnr = cpu_ppc_exec(env);
453 if (trapnr != EXCP_SYSCALL_USER && trapnr != EXCP_BRANCH &&
454 trapnr != EXCP_TRACE) {
455 if (loglevel > 0) {
456 cpu_ppc_dump_state(env, logfile, 0);
457 }
458 }
459 switch(trapnr) {
460 case EXCP_NONE:
461 break;
462 case EXCP_SYSCALL_USER:
463 /* system call */
464 /* WARNING:
465 * PPC ABI uses overflow flag in cr0 to signal an error
466 * in syscalls.
467 */
468 #if 0
469 printf("syscall %d 0x%08x 0x%08x 0x%08x 0x%08x\n", env->gpr[0],
470 env->gpr[3], env->gpr[4], env->gpr[5], env->gpr[6]);
471 #endif
472 env->crf[0] &= ~0x1;
473 ret = do_syscall(env, env->gpr[0], env->gpr[3], env->gpr[4],
474 env->gpr[5], env->gpr[6], env->gpr[7],
475 env->gpr[8]);
476 if (ret > (uint32_t)(-515)) {
477 env->crf[0] |= 0x1;
478 ret = -ret;
479 }
480 env->gpr[3] = ret;
481 #if 0
482 printf("syscall returned 0x%08x (%d)\n", ret, ret);
483 #endif
484 break;
485 case EXCP_RESET:
486 /* Should not happen ! */
487 fprintf(stderr, "RESET asked... Stop emulation\n");
488 if (loglevel)
489 fprintf(logfile, "RESET asked... Stop emulation\n");
490 abort();
491 case EXCP_MACHINE_CHECK:
492 fprintf(stderr, "Machine check exeption... Stop emulation\n");
493 if (loglevel)
494 fprintf(logfile, "RESET asked... Stop emulation\n");
495 info.si_signo = TARGET_SIGBUS;
496 info.si_errno = 0;
497 info.si_code = TARGET_BUS_OBJERR;
498 info._sifields._sigfault._addr = env->nip - 4;
499 queue_signal(info.si_signo, &info);
500 case EXCP_DSI:
501 fprintf(stderr, "Invalid data memory access: 0x%08x\n", env->spr[DAR]);
502 if (loglevel) {
503 fprintf(logfile, "Invalid data memory access: 0x%08x\n",
504 env->spr[DAR]);
505 }
506 switch (env->error_code & 0xF) {
507 case EXCP_DSI_TRANSLATE:
508 info.si_signo = TARGET_SIGSEGV;
509 info.si_errno = 0;
510 info.si_code = TARGET_SEGV_MAPERR;
511 break;
512 case EXCP_DSI_NOTSUP:
513 case EXCP_DSI_EXTERNAL:
514 info.si_signo = TARGET_SIGILL;
515 info.si_errno = 0;
516 info.si_code = TARGET_ILL_ILLADR;
517 break;
518 case EXCP_DSI_PROT:
519 info.si_signo = TARGET_SIGSEGV;
520 info.si_errno = 0;
521 info.si_code = TARGET_SEGV_ACCERR;
522 break;
523 case EXCP_DSI_DABR:
524 info.si_signo = TARGET_SIGTRAP;
525 info.si_errno = 0;
526 info.si_code = TARGET_TRAP_BRKPT;
527 break;
528 default:
529 /* Let's send a regular segfault... */
530 fprintf(stderr, "Invalid segfault errno (%02x)\n",
531 env->error_code);
532 if (loglevel) {
533 fprintf(logfile, "Invalid segfault errno (%02x)\n",
534 env->error_code);
535 }
536 info.si_signo = TARGET_SIGSEGV;
537 info.si_errno = 0;
538 info.si_code = TARGET_SEGV_MAPERR;
539 break;
540 }
541 info._sifields._sigfault._addr = env->nip;
542 queue_signal(info.si_signo, &info);
543 break;
544 case EXCP_ISI:
545 fprintf(stderr, "Invalid instruction fetch\n");
546 if (loglevel)
547 fprintf(logfile, "Invalid instruction fetch\n");
548 switch (env->error_code) {
549 case EXCP_ISI_TRANSLATE:
550 info.si_signo = TARGET_SIGSEGV;
551 info.si_errno = 0;
552 info.si_code = TARGET_SEGV_MAPERR;
553 break;
554 case EXCP_ISI_GUARD:
555 info.si_signo = TARGET_SIGILL;
556 info.si_errno = 0;
557 info.si_code = TARGET_ILL_ILLADR;
558 break;
559 case EXCP_ISI_NOEXEC:
560 case EXCP_ISI_PROT:
561 info.si_signo = TARGET_SIGSEGV;
562 info.si_errno = 0;
563 info.si_code = TARGET_SEGV_ACCERR;
564 break;
565 default:
566 /* Let's send a regular segfault... */
567 fprintf(stderr, "Invalid segfault errno (%02x)\n",
568 env->error_code);
569 if (loglevel) {
570 fprintf(logfile, "Invalid segfault errno (%02x)\n",
571 env->error_code);
572 }
573 info.si_signo = TARGET_SIGSEGV;
574 info.si_errno = 0;
575 info.si_code = TARGET_SEGV_MAPERR;
576 break;
577 }
578 info._sifields._sigfault._addr = env->nip - 4;
579 queue_signal(info.si_signo, &info);
580 break;
581 case EXCP_EXTERNAL:
582 /* Should not happen ! */
583 fprintf(stderr, "External interruption... Stop emulation\n");
584 if (loglevel)
585 fprintf(logfile, "External interruption... Stop emulation\n");
586 abort();
587 case EXCP_ALIGN:
588 fprintf(stderr, "Invalid unaligned memory access\n");
589 if (loglevel)
590 fprintf(logfile, "Invalid unaligned memory access\n");
591 info.si_signo = TARGET_SIGBUS;
592 info.si_errno = 0;
593 info.si_code = TARGET_BUS_ADRALN;
594 info._sifields._sigfault._addr = env->nip - 4;
595 queue_signal(info.si_signo, &info);
596 break;
597 case EXCP_PROGRAM:
598 switch (env->error_code & ~0xF) {
599 case EXCP_FP:
600 fprintf(stderr, "Program exception\n");
601 if (loglevel)
602 fprintf(logfile, "Program exception\n");
603 /* Set FX */
604 env->fpscr[7] |= 0x8;
605 /* Finally, update FEX */
606 if ((((env->fpscr[7] & 0x3) << 3) | (env->fpscr[6] >> 1)) &
607 ((env->fpscr[1] << 1) | (env->fpscr[0] >> 3)))
608 env->fpscr[7] |= 0x4;
609 info.si_signo = TARGET_SIGFPE;
610 info.si_errno = 0;
611 switch (env->error_code & 0xF) {
612 case EXCP_FP_OX:
613 info.si_code = TARGET_FPE_FLTOVF;
614 break;
615 case EXCP_FP_UX:
616 info.si_code = TARGET_FPE_FLTUND;
617 break;
618 case EXCP_FP_ZX:
619 case EXCP_FP_VXZDZ:
620 info.si_code = TARGET_FPE_FLTDIV;
621 break;
622 case EXCP_FP_XX:
623 info.si_code = TARGET_FPE_FLTRES;
624 break;
625 case EXCP_FP_VXSOFT:
626 info.si_code = TARGET_FPE_FLTINV;
627 break;
628 case EXCP_FP_VXNAN:
629 case EXCP_FP_VXISI:
630 case EXCP_FP_VXIDI:
631 case EXCP_FP_VXIMZ:
632 case EXCP_FP_VXVC:
633 case EXCP_FP_VXSQRT:
634 case EXCP_FP_VXCVI:
635 info.si_code = TARGET_FPE_FLTSUB;
636 break;
637 default:
638 fprintf(stderr, "Unknown floating point exception "
639 "(%02x)\n", env->error_code);
640 if (loglevel) {
641 fprintf(logfile, "Unknown floating point exception "
642 "(%02x)\n", env->error_code & 0xF);
643 }
644 }
645 break;
646 case EXCP_INVAL:
647 fprintf(stderr, "Invalid instruction\n");
648 if (loglevel)
649 fprintf(logfile, "Invalid instruction\n");
650 info.si_signo = TARGET_SIGILL;
651 info.si_errno = 0;
652 switch (env->error_code & 0xF) {
653 case EXCP_INVAL_INVAL:
654 info.si_code = TARGET_ILL_ILLOPC;
655 break;
656 case EXCP_INVAL_LSWX:
657 info.si_code = TARGET_ILL_ILLOPN;
658 break;
659 case EXCP_INVAL_SPR:
660 info.si_code = TARGET_ILL_PRVREG;
661 break;
662 case EXCP_INVAL_FP:
663 info.si_code = TARGET_ILL_COPROC;
664 break;
665 default:
666 fprintf(stderr, "Unknown invalid operation (%02x)\n",
667 env->error_code & 0xF);
668 if (loglevel) {
669 fprintf(logfile, "Unknown invalid operation (%02x)\n",
670 env->error_code & 0xF);
671 }
672 info.si_code = TARGET_ILL_ILLADR;
673 break;
674 }
675 break;
676 case EXCP_PRIV:
677 fprintf(stderr, "Privilege violation\n");
678 if (loglevel)
679 fprintf(logfile, "Privilege violation\n");
680 info.si_signo = TARGET_SIGILL;
681 info.si_errno = 0;
682 switch (env->error_code & 0xF) {
683 case EXCP_PRIV_OPC:
684 info.si_code = TARGET_ILL_PRVOPC;
685 break;
686 case EXCP_PRIV_REG:
687 info.si_code = TARGET_ILL_PRVREG;
688 break;
689 default:
690 fprintf(stderr, "Unknown privilege violation (%02x)\n",
691 env->error_code & 0xF);
692 info.si_code = TARGET_ILL_PRVOPC;
693 break;
694 }
695 break;
696 case EXCP_TRAP:
697 fprintf(stderr, "Tried to call a TRAP\n");
698 if (loglevel)
699 fprintf(logfile, "Tried to call a TRAP\n");
700 abort();
701 default:
702 /* Should not happen ! */
703 fprintf(stderr, "Unknown program exception (%02x)\n",
704 env->error_code);
705 if (loglevel) {
706 fprintf(logfile, "Unknwon program exception (%02x)\n",
707 env->error_code);
708 }
709 abort();
710 }
711 info._sifields._sigfault._addr = env->nip - 4;
712 queue_signal(info.si_signo, &info);
713 break;
714 case EXCP_NO_FP:
715 fprintf(stderr, "No floating point allowed\n");
716 if (loglevel)
717 fprintf(logfile, "No floating point allowed\n");
718 info.si_signo = TARGET_SIGILL;
719 info.si_errno = 0;
720 info.si_code = TARGET_ILL_COPROC;
721 info._sifields._sigfault._addr = env->nip - 4;
722 queue_signal(info.si_signo, &info);
723 break;
724 case EXCP_DECR:
725 /* Should not happen ! */
726 fprintf(stderr, "Decrementer exception\n");
727 if (loglevel)
728 fprintf(logfile, "Decrementer exception\n");
729 abort();
730 case EXCP_RESA: /* Implementation specific */
731 /* Should not happen ! */
732 fprintf(stderr, "RESA exception should never happen !\n");
733 if (loglevel)
734 fprintf(logfile, "RESA exception should never happen !\n");
735 abort();
736 case EXCP_RESB: /* Implementation specific */
737 /* Should not happen ! */
738 fprintf(stderr, "RESB exception should never happen !\n");
739 if (loglevel)
740 fprintf(logfile, "RESB exception should never happen !\n");
741 abort();
742 case EXCP_TRACE:
743 /* Do nothing: we use this to trace execution */
744 break;
745 case EXCP_FP_ASSIST:
746 /* Should not happen ! */
747 fprintf(stderr, "Floating point assist exception\n");
748 if (loglevel)
749 fprintf(logfile, "Floating point assist exception\n");
750 abort();
751 case EXCP_MTMSR:
752 /* We reloaded the msr, just go on */
753 if (msr_pr) {
754 fprintf(stderr, "Tried to go into supervisor mode !\n");
755 if (loglevel)
756 fprintf(logfile, "Tried to go into supervisor mode !\n");
757 abort();
758 }
759 break;
760 case EXCP_BRANCH:
761 /* We stopped because of a jump... */
762 break;
763 case EXCP_RFI:
764 /* Should not occur: we always are in user mode */
765 fprintf(stderr, "Return from interrupt ?\n");
766 if (loglevel)
767 fprintf(logfile, "Return from interrupt ?\n");
768 abort();
769 case EXCP_INTERRUPT:
770 /* Don't know why this should ever happen... */
771 break;
772 default:
773 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
774 trapnr);
775 if (loglevel) {
776 fprintf(logfile, "qemu: unhandled CPU exception 0x%02x - "
777 "0x%02x - aborting\n", trapnr, env->error_code);
778 }
779 abort();
780 }
781 if (trapnr < EXCP_PPC_MAX)
782 env->exceptions &= ~(1 << trapnr);
783 process_pending_signals(env);
784 if (env->exceptions != 0) {
785 check_exception_state(env);
786 }
787 }
788 }
789 #endif
790
791 void usage(void)
792 {
793 printf("qemu-" TARGET_ARCH " version " QEMU_VERSION ", Copyright (c) 2003 Fabrice Bellard\n"
794 "usage: qemu-" TARGET_ARCH " [-h] [-d] [-L path] [-s size] program [arguments...]\n"
795 "Linux CPU emulator (compiled for %s emulation)\n"
796 "\n"
797 "-h print this help\n"
798 "-L path set the elf interpreter prefix (default=%s)\n"
799 "-s size set the stack size in bytes (default=%ld)\n"
800 "\n"
801 "debug options:\n"
802 #ifdef USE_CODE_COPY
803 "-no-code-copy disable code copy acceleration\n"
804 #endif
805 "-d activate log (logfile=%s)\n"
806 "-p pagesize set the host page size to 'pagesize'\n",
807 TARGET_ARCH,
808 interp_prefix,
809 x86_stack_size,
810 DEBUG_LOGFILE);
811 _exit(1);
812 }
813
814 /* XXX: currently only used for async signals (see signal.c) */
815 CPUState *global_env;
816 /* used only if single thread */
817 CPUState *cpu_single_env = NULL;
818
819 /* used to free thread contexts */
820 TaskState *first_task_state;
821
822 int main(int argc, char **argv)
823 {
824 const char *filename;
825 struct target_pt_regs regs1, *regs = &regs1;
826 struct image_info info1, *info = &info1;
827 TaskState ts1, *ts = &ts1;
828 CPUState *env;
829 int optind;
830 const char *r;
831
832 if (argc <= 1)
833 usage();
834
835 /* init debug */
836 cpu_set_log_filename(DEBUG_LOGFILE);
837
838 optind = 1;
839 for(;;) {
840 if (optind >= argc)
841 break;
842 r = argv[optind];
843 if (r[0] != '-')
844 break;
845 optind++;
846 r++;
847 if (!strcmp(r, "-")) {
848 break;
849 } else if (!strcmp(r, "d")) {
850 cpu_set_log(CPU_LOG_ALL);
851 } else if (!strcmp(r, "s")) {
852 r = argv[optind++];
853 x86_stack_size = strtol(r, (char **)&r, 0);
854 if (x86_stack_size <= 0)
855 usage();
856 if (*r == 'M')
857 x86_stack_size *= 1024 * 1024;
858 else if (*r == 'k' || *r == 'K')
859 x86_stack_size *= 1024;
860 } else if (!strcmp(r, "L")) {
861 interp_prefix = argv[optind++];
862 } else if (!strcmp(r, "p")) {
863 host_page_size = atoi(argv[optind++]);
864 if (host_page_size == 0 ||
865 (host_page_size & (host_page_size - 1)) != 0) {
866 fprintf(stderr, "page size must be a power of two\n");
867 exit(1);
868 }
869 } else
870 #ifdef USE_CODE_COPY
871 if (!strcmp(r, "no-code-copy")) {
872 code_copy_enabled = 0;
873 } else
874 #endif
875 {
876 usage();
877 }
878 }
879 if (optind >= argc)
880 usage();
881 filename = argv[optind];
882
883 /* Zero out regs */
884 memset(regs, 0, sizeof(struct target_pt_regs));
885
886 /* Zero out image_info */
887 memset(info, 0, sizeof(struct image_info));
888
889 /* Scan interp_prefix dir for replacement files. */
890 init_paths(interp_prefix);
891
892 /* NOTE: we need to init the CPU at this stage to get the
893 host_page_size */
894 env = cpu_init();
895
896 if (elf_exec(filename, argv+optind, environ, regs, info) != 0) {
897 printf("Error loading %s\n", filename);
898 _exit(1);
899 }
900
901 if (loglevel) {
902 page_dump(logfile);
903
904 fprintf(logfile, "start_brk 0x%08lx\n" , info->start_brk);
905 fprintf(logfile, "end_code 0x%08lx\n" , info->end_code);
906 fprintf(logfile, "start_code 0x%08lx\n" , info->start_code);
907 fprintf(logfile, "end_data 0x%08lx\n" , info->end_data);
908 fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack);
909 fprintf(logfile, "brk 0x%08lx\n" , info->brk);
910 fprintf(logfile, "entry 0x%08lx\n" , info->entry);
911 }
912
913 target_set_brk((char *)info->brk);
914 syscall_init();
915 signal_init();
916
917 global_env = env;
918
919 /* build Task State */
920 memset(ts, 0, sizeof(TaskState));
921 env->opaque = ts;
922 ts->used = 1;
923 env->user_mode_only = 1;
924
925 #if defined(TARGET_I386)
926 cpu_x86_set_cpl(env, 3);
927
928 env->cr[0] = CR0_PG_MASK | CR0_WP_MASK | CR0_PE_MASK;
929 env->hflags |= HF_PE_MASK;
930
931 /* flags setup : we activate the IRQs by default as in user mode */
932 env->eflags |= IF_MASK;
933
934 /* linux register setup */
935 env->regs[R_EAX] = regs->eax;
936 env->regs[R_EBX] = regs->ebx;
937 env->regs[R_ECX] = regs->ecx;
938 env->regs[R_EDX] = regs->edx;
939 env->regs[R_ESI] = regs->esi;
940 env->regs[R_EDI] = regs->edi;
941 env->regs[R_EBP] = regs->ebp;
942 env->regs[R_ESP] = regs->esp;
943 env->eip = regs->eip;
944
945 /* linux interrupt setup */
946 env->idt.base = (void *)idt_table;
947 env->idt.limit = sizeof(idt_table) - 1;
948 set_idt(0, 0);
949 set_idt(1, 0);
950 set_idt(2, 0);
951 set_idt(3, 3);
952 set_idt(4, 3);
953 set_idt(5, 3);
954 set_idt(6, 0);
955 set_idt(7, 0);
956 set_idt(8, 0);
957 set_idt(9, 0);
958 set_idt(10, 0);
959 set_idt(11, 0);
960 set_idt(12, 0);
961 set_idt(13, 0);
962 set_idt(14, 0);
963 set_idt(15, 0);
964 set_idt(16, 0);
965 set_idt(17, 0);
966 set_idt(18, 0);
967 set_idt(19, 0);
968 set_idt(0x80, 3);
969
970 /* linux segment setup */
971 env->gdt.base = (void *)gdt_table;
972 env->gdt.limit = sizeof(gdt_table) - 1;
973 write_dt(&gdt_table[__USER_CS >> 3], 0, 0xfffff,
974 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
975 (3 << DESC_DPL_SHIFT) | (0xa << DESC_TYPE_SHIFT));
976 write_dt(&gdt_table[__USER_DS >> 3], 0, 0xfffff,
977 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
978 (3 << DESC_DPL_SHIFT) | (0x2 << DESC_TYPE_SHIFT));
979 cpu_x86_load_seg(env, R_CS, __USER_CS);
980 cpu_x86_load_seg(env, R_DS, __USER_DS);
981 cpu_x86_load_seg(env, R_ES, __USER_DS);
982 cpu_x86_load_seg(env, R_SS, __USER_DS);
983 cpu_x86_load_seg(env, R_FS, __USER_DS);
984 cpu_x86_load_seg(env, R_GS, __USER_DS);
985
986 #elif defined(TARGET_ARM)
987 {
988 int i;
989 for(i = 0; i < 16; i++) {
990 env->regs[i] = regs->uregs[i];
991 }
992 env->cpsr = regs->uregs[16];
993 }
994 #elif defined(TARGET_SPARC)
995 {
996 int i;
997 env->pc = regs->pc;
998 env->npc = regs->npc;
999 env->y = regs->y;
1000 for(i = 0; i < 8; i++)
1001 env->gregs[i] = regs->u_regs[i];
1002 for(i = 0; i < 8; i++)
1003 env->regwptr[i] = regs->u_regs[i + 8];
1004 }
1005 #elif defined(TARGET_PPC)
1006 {
1007 int i;
1008 for (i = 0; i < 32; i++) {
1009 if (i != 12 && i != 6)
1010 env->msr[i] = (regs->msr >> i) & 1;
1011 }
1012 env->nip = regs->nip;
1013 for(i = 0; i < 32; i++) {
1014 env->gpr[i] = regs->gpr[i];
1015 }
1016 }
1017 #else
1018 #error unsupported target CPU
1019 #endif
1020
1021 cpu_loop(env);
1022 /* never exits */
1023 return 0;
1024 }