X-Git-Url: https://git.proxmox.com/?a=blobdiff_plain;f=linux-user%2Fmain.c;h=5b751541ee35de522deb87cb647a26f5a57fc3f9;hb=3a4739d651cb69acfb23f7f8ec83784c24bc6e48;hp=825c0b264a1447d5a563542aa0e2a669bffccdfc;hpb=b689bc57d62dca9c48d8be15914d3dd53e33443e;p=qemu.git diff --git a/linux-user/main.c b/linux-user/main.c index 825c0b264..5b751541e 100644 --- a/linux-user/main.c +++ b/linux-user/main.c @@ -1,5 +1,5 @@ /* - * qemu main + * qemu user main * * Copyright (c) 2003 Fabrice Bellard * @@ -26,20 +26,17 @@ #include "qemu.h" -#include "cpu-i386.h" - #define DEBUG_LOGFILE "/tmp/qemu.log" -FILE *logfile = NULL; -int loglevel; static const char *interp_prefix = CONFIG_QEMU_PREFIX; -#ifdef __i386__ +#if defined(__i386__) && !defined(CONFIG_STATIC) /* Force usage of an ELF interpreter even if it is an ELF shared object ! */ const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2"; +#endif -/* for recent libc, we add these dummies symbol which are not declared +/* for recent libc, we add these dummy symbols which are not declared when generating a linked object (bug in ld ?) */ #if __GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3) long __init_array_start[0]; @@ -48,8 +45,6 @@ long __fini_array_start[0]; long __fini_array_end[0]; #endif -#endif - /* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so we allocate a bigger stack. Need a better solution, for example by remapping the process stack directly at the right place */ @@ -64,6 +59,7 @@ void gemu_log(const char *fmt, ...) va_end(ap); } +#ifdef TARGET_I386 /***********************************************************/ /* CPUX86 core interface */ @@ -100,148 +96,42 @@ int cpu_x86_inl(CPUX86State *env, int addr) return 0; } -void write_dt(void *ptr, unsigned long addr, unsigned long limit, - int seg32_bit) +int cpu_x86_get_pic_interrupt(CPUX86State *env) { - unsigned int e1, e2, limit_in_pages; - limit_in_pages = 0; - if (limit > 0xffff) { - limit = limit >> 12; - limit_in_pages = 1; - } + return -1; +} + +static void write_dt(void *ptr, unsigned long addr, unsigned long limit, + int flags) +{ + unsigned int e1, e2; e1 = (addr << 16) | (limit & 0xffff); e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000); - e2 |= limit_in_pages << 23; /* byte granularity */ - e2 |= seg32_bit << 22; /* 32 bit segment */ + e2 |= flags; stl((uint8_t *)ptr, e1); stl((uint8_t *)ptr + 4, e2); } -uint64_t gdt_table[6]; - -//#define DEBUG_VM86 - -static inline int is_revectored(int nr, struct target_revectored_struct *bitmap) +static void set_gate(void *ptr, unsigned int type, unsigned int dpl, + unsigned long addr, unsigned int sel) { - return (tswap32(bitmap->__map[nr >> 5]) >> (nr & 0x1f)) & 1; -} - -static inline uint8_t *seg_to_linear(unsigned int seg, unsigned int reg) -{ - return (uint8_t *)((seg << 4) + (reg & 0xffff)); -} - -static inline void pushw(CPUX86State *env, int val) -{ - env->regs[R_ESP] = (env->regs[R_ESP] & ~0xffff) | - ((env->regs[R_ESP] - 2) & 0xffff); - *(uint16_t *)seg_to_linear(env->segs[R_SS], env->regs[R_ESP]) = val; -} - -static inline unsigned int get_vflags(CPUX86State *env) -{ - unsigned int eflags; - eflags = env->eflags & ~(VM_MASK | RF_MASK | IF_MASK); - if (eflags & VIF_MASK) - eflags |= IF_MASK; - return eflags; -} - -void save_v86_state(CPUX86State *env) -{ - TaskState *ts = env->opaque; -#ifdef DEBUG_VM86 - printf("save_v86_state\n"); -#endif - - /* put the VM86 registers in the userspace register structure */ - ts->target_v86->regs.eax = tswap32(env->regs[R_EAX]); - ts->target_v86->regs.ebx = tswap32(env->regs[R_EBX]); - ts->target_v86->regs.ecx = tswap32(env->regs[R_ECX]); - ts->target_v86->regs.edx = tswap32(env->regs[R_EDX]); - ts->target_v86->regs.esi = tswap32(env->regs[R_ESI]); - ts->target_v86->regs.edi = tswap32(env->regs[R_EDI]); - ts->target_v86->regs.ebp = tswap32(env->regs[R_EBP]); - ts->target_v86->regs.esp = tswap32(env->regs[R_ESP]); - ts->target_v86->regs.eip = tswap32(env->eip); - ts->target_v86->regs.cs = tswap16(env->segs[R_CS]); - ts->target_v86->regs.ss = tswap16(env->segs[R_SS]); - ts->target_v86->regs.ds = tswap16(env->segs[R_DS]); - ts->target_v86->regs.es = tswap16(env->segs[R_ES]); - ts->target_v86->regs.fs = tswap16(env->segs[R_FS]); - ts->target_v86->regs.gs = tswap16(env->segs[R_GS]); - ts->target_v86->regs.eflags = tswap32(env->eflags); - - /* restore 32 bit registers */ - env->regs[R_EAX] = ts->vm86_saved_regs.eax; - env->regs[R_EBX] = ts->vm86_saved_regs.ebx; - env->regs[R_ECX] = ts->vm86_saved_regs.ecx; - env->regs[R_EDX] = ts->vm86_saved_regs.edx; - env->regs[R_ESI] = ts->vm86_saved_regs.esi; - env->regs[R_EDI] = ts->vm86_saved_regs.edi; - env->regs[R_EBP] = ts->vm86_saved_regs.ebp; - env->regs[R_ESP] = ts->vm86_saved_regs.esp; - env->eflags = ts->vm86_saved_regs.eflags; - env->eip = ts->vm86_saved_regs.eip; - - cpu_x86_load_seg(env, R_CS, ts->vm86_saved_regs.cs); - cpu_x86_load_seg(env, R_SS, ts->vm86_saved_regs.ss); - cpu_x86_load_seg(env, R_DS, ts->vm86_saved_regs.ds); - cpu_x86_load_seg(env, R_ES, ts->vm86_saved_regs.es); - cpu_x86_load_seg(env, R_FS, ts->vm86_saved_regs.fs); - cpu_x86_load_seg(env, R_GS, ts->vm86_saved_regs.gs); + unsigned int e1, e2; + e1 = (addr & 0xffff) | (sel << 16); + e2 = (addr & 0xffff0000) | 0x8000 | (dpl << 13) | (type << 8); + stl((uint8_t *)ptr, e1); + stl((uint8_t *)ptr + 4, e2); } -/* return from vm86 mode to 32 bit. The vm86() syscall will return - 'retval' */ -static inline void return_to_32bit(CPUX86State *env, int retval) -{ -#ifdef DEBUG_VM86 - printf("return_to_32bit: ret=0x%x\n", retval); -#endif - save_v86_state(env); - env->regs[R_EAX] = retval; -} +uint64_t gdt_table[6]; +uint64_t idt_table[256]; -/* handle VM86 interrupt (NOTE: the CPU core currently does not - support TSS interrupt revectoring, so this code is always executed) */ -static void do_int(CPUX86State *env, int intno) +/* only dpl matters as we do only user space emulation */ +static void set_idt(int n, unsigned int dpl) { - TaskState *ts = env->opaque; - uint32_t *int_ptr, segoffs; - - if (env->segs[R_CS] == TARGET_BIOSSEG) - goto cannot_handle; /* XXX: I am not sure this is really useful */ - if (is_revectored(intno, &ts->target_v86->int_revectored)) - goto cannot_handle; - if (intno == 0x21 && is_revectored((env->regs[R_EAX] >> 8) & 0xff, - &ts->target_v86->int21_revectored)) - goto cannot_handle; - int_ptr = (uint32_t *)(intno << 2); - segoffs = tswap32(*int_ptr); - if ((segoffs >> 16) == TARGET_BIOSSEG) - goto cannot_handle; -#ifdef DEBUG_VM86 - printf("VM86: emulating int 0x%x. CS:IP=%04x:%04x\n", - intno, segoffs >> 16, segoffs & 0xffff); -#endif - /* save old state */ - pushw(env, get_vflags(env)); - pushw(env, env->segs[R_CS]); - pushw(env, env->eip); - /* goto interrupt handler */ - env->eip = segoffs & 0xffff; - cpu_x86_load_seg(env, R_CS, segoffs >> 16); - env->eflags &= ~(VIF_MASK | TF_MASK); - return; - cannot_handle: -#ifdef DEBUG_VM86 - printf("VM86: return to 32 bits int 0x%x\n", intno); -#endif - return_to_32bit(env, TARGET_VM86_INTx | (intno << 8)); + set_gate(idt_table + n, 0, dpl, 0, 0); } -void cpu_loop(struct CPUX86State *env) +void cpu_loop(CPUX86State *env) { int trapnr; uint8_t *pc; @@ -249,64 +139,35 @@ void cpu_loop(struct CPUX86State *env) for(;;) { trapnr = cpu_x86_exec(env); - pc = env->seg_cache[R_CS].base + env->eip; switch(trapnr) { + case 0x80: + /* linux syscall */ + env->regs[R_EAX] = do_syscall(env, + env->regs[R_EAX], + env->regs[R_EBX], + env->regs[R_ECX], + env->regs[R_EDX], + env->regs[R_ESI], + env->regs[R_EDI], + env->regs[R_EBP]); + break; + case EXCP0B_NOSEG: + case EXCP0C_STACK: + info.si_signo = SIGBUS; + info.si_errno = 0; + info.si_code = TARGET_SI_KERNEL; + info._sifields._sigfault._addr = 0; + queue_signal(info.si_signo, &info); + break; case EXCP0D_GPF: if (env->eflags & VM_MASK) { -#ifdef DEBUG_VM86 - printf("VM86 exception %04x:%08x %02x %02x\n", - env->segs[R_CS], env->eip, pc[0], pc[1]); -#endif - /* VM86 mode */ - switch(pc[0]) { - case 0xcd: /* int */ - env->eip += 2; - do_int(env, pc[1]); - break; - case 0x66: - switch(pc[1]) { - case 0xfb: /* sti */ - case 0x9d: /* popf */ - case 0xcf: /* iret */ - env->eip += 2; - return_to_32bit(env, TARGET_VM86_STI); - break; - default: - goto vm86_gpf; - } - break; - case 0xfb: /* sti */ - case 0x9d: /* popf */ - case 0xcf: /* iret */ - env->eip++; - return_to_32bit(env, TARGET_VM86_STI); - break; - default: - vm86_gpf: - /* real VM86 GPF exception */ - return_to_32bit(env, TARGET_VM86_UNKNOWN); - break; - } + handle_vm86_fault(env); } else { - if (pc[0] == 0xcd && pc[1] == 0x80) { - /* syscall */ - env->eip += 2; - env->regs[R_EAX] = do_syscall(env, - env->regs[R_EAX], - env->regs[R_EBX], - env->regs[R_ECX], - env->regs[R_EDX], - env->regs[R_ESI], - env->regs[R_EDI], - env->regs[R_EBP]); - } else { - /* XXX: more precise info */ - info.si_signo = SIGSEGV; - info.si_errno = 0; - info.si_code = TARGET_SI_KERNEL; - info._sifields._sigfault._addr = 0; - queue_signal(info.si_signo, &info); - } + info.si_signo = SIGSEGV; + info.si_errno = 0; + info.si_code = TARGET_SI_KERNEL; + info._sifields._sigfault._addr = 0; + queue_signal(info.si_signo, &info); } break; case EXCP0E_PAGE: @@ -316,12 +177,12 @@ void cpu_loop(struct CPUX86State *env) info.si_code = TARGET_SEGV_MAPERR; else info.si_code = TARGET_SEGV_ACCERR; - info._sifields._sigfault._addr = env->cr2; + info._sifields._sigfault._addr = env->cr[2]; queue_signal(info.si_signo, &info); break; case EXCP00_DIVZ: if (env->eflags & VM_MASK) { - do_int(env, trapnr); + handle_vm86_trap(env, trapnr); } else { /* division by zero */ info.si_signo = SIGFPE; @@ -331,10 +192,27 @@ void cpu_loop(struct CPUX86State *env) queue_signal(info.si_signo, &info); } break; + case EXCP01_SSTP: + case EXCP03_INT3: + if (env->eflags & VM_MASK) { + handle_vm86_trap(env, trapnr); + } else { + info.si_signo = SIGTRAP; + info.si_errno = 0; + if (trapnr == EXCP01_SSTP) { + info.si_code = TARGET_TRAP_BRKPT; + info._sifields._sigfault._addr = env->eip; + } else { + info.si_code = TARGET_SI_KERNEL; + info._sifields._sigfault._addr = 0; + } + queue_signal(info.si_signo, &info); + } + break; case EXCP04_INTO: case EXCP05_BOUND: if (env->eflags & VM_MASK) { - do_int(env, trapnr); + handle_vm86_trap(env, trapnr); } else { info.si_signo = SIGSEGV; info.si_errno = 0; @@ -354,6 +232,7 @@ void cpu_loop(struct CPUX86State *env) /* just indicate that signals should be handled asap */ break; default: + pc = env->segs[R_CS].base + env->eip; fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n", (long)pc, trapnr); abort(); @@ -361,25 +240,115 @@ void cpu_loop(struct CPUX86State *env) process_pending_signals(env); } } +#endif + +#ifdef TARGET_ARM + +void cpu_loop(CPUARMState *env) +{ + int trapnr; + unsigned int n, insn; + target_siginfo_t info; + + for(;;) { + trapnr = cpu_arm_exec(env); + switch(trapnr) { + case EXCP_UDEF: + info.si_signo = SIGILL; + info.si_errno = 0; + info.si_code = TARGET_ILL_ILLOPN; + info._sifields._sigfault._addr = env->regs[15]; + queue_signal(info.si_signo, &info); + break; + case EXCP_SWI: + { + /* system call */ + insn = ldl((void *)(env->regs[15] - 4)); + n = insn & 0xffffff; + if (n >= ARM_SYSCALL_BASE) { + /* linux syscall */ + n -= ARM_SYSCALL_BASE; + env->regs[0] = do_syscall(env, + n, + env->regs[0], + env->regs[1], + env->regs[2], + env->regs[3], + env->regs[4], + 0); + } else { + goto error; + } + } + break; + case EXCP_INTERRUPT: + /* just indicate that signals should be handled asap */ + break; + default: + error: + fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n", + trapnr); + cpu_arm_dump_state(env, stderr, 0); + abort(); + } + process_pending_signals(env); + } +} + +#endif + +#ifdef TARGET_SPARC + +void cpu_loop (CPUSPARCState *env) +{ + int trapnr; + + while (1) { + trapnr = cpu_sparc_exec (env); + + switch (trapnr) { + case 0x8: case 0x10: + env->regwptr[0] = do_syscall (env, env->gregs[1], + env->regwptr[0], env->regwptr[1], env->regwptr[2], + env->regwptr[3], env->regwptr[4], env->regwptr[13]); + if (env->regwptr[0] >= 0xffffffe0) + env->psr |= PSR_CARRY; + break; + default: + printf ("Invalid trap: %d\n", trapnr); + exit (1); + } + process_pending_signals (env); + } +} + +#endif void usage(void) { - printf("qemu version " QEMU_VERSION ", Copyright (c) 2003 Fabrice Bellard\n" - "usage: qemu [-h] [-d] [-L path] [-s size] program [arguments...]\n" - "Linux x86 emulator\n" + printf("qemu-" TARGET_ARCH " version " QEMU_VERSION ", Copyright (c) 2003 Fabrice Bellard\n" + "usage: qemu-" TARGET_ARCH " [-h] [-d] [-L path] [-s size] program [arguments...]\n" + "Linux CPU emulator (compiled for %s emulation)\n" "\n" - "-h print this help\n" - "-d activate log (logfile=%s)\n" - "-L path set the x86 elf interpreter prefix (default=%s)\n" - "-s size set the x86 stack size in bytes (default=%ld)\n", - DEBUG_LOGFILE, + "-h print this help\n" + "-L path set the elf interpreter prefix (default=%s)\n" + "-s size set the stack size in bytes (default=%ld)\n" + "\n" + "debug options:\n" + "-d activate log (logfile=%s)\n" + "-p pagesize set the host page size to 'pagesize'\n", + TARGET_ARCH, interp_prefix, - x86_stack_size); + x86_stack_size, + DEBUG_LOGFILE); _exit(1); } /* XXX: currently only used for async signals (see signal.c) */ -CPUX86State *global_env; +CPUState *global_env; +/* used only if single thread */ +CPUState *cpu_single_env = NULL; + /* used to free thread contexts */ TaskState *first_task_state; @@ -389,14 +358,16 @@ int main(int argc, char **argv) struct target_pt_regs regs1, *regs = ®s1; struct image_info info1, *info = &info1; TaskState ts1, *ts = &ts1; - CPUX86State *env; + CPUState *env; int optind; const char *r; if (argc <= 1) usage(); - loglevel = 0; + /* init debug */ + cpu_set_log_filename(DEBUG_LOGFILE); + optind = 1; for(;;) { if (optind >= argc) @@ -409,7 +380,7 @@ int main(int argc, char **argv) if (!strcmp(r, "-")) { break; } else if (!strcmp(r, "d")) { - loglevel = 1; + cpu_set_log(CPU_LOG_ALL); } else if (!strcmp(r, "s")) { r = argv[optind++]; x86_stack_size = strtol(r, (char **)&r, 0); @@ -421,6 +392,13 @@ int main(int argc, char **argv) x86_stack_size *= 1024; } else if (!strcmp(r, "L")) { interp_prefix = argv[optind++]; + } else if (!strcmp(r, "p")) { + host_page_size = atoi(argv[optind++]); + if (host_page_size == 0 || + (host_page_size & (host_page_size - 1)) != 0) { + fprintf(stderr, "page size must be a power of two\n"); + exit(1); + } } else { usage(); } @@ -429,16 +407,6 @@ int main(int argc, char **argv) usage(); filename = argv[optind]; - /* init debug */ - if (loglevel) { - logfile = fopen(DEBUG_LOGFILE, "w"); - if (!logfile) { - perror(DEBUG_LOGFILE); - _exit(1); - } - setvbuf(logfile, NULL, _IOLBF, 0); - } - /* Zero out regs */ memset(regs, 0, sizeof(struct target_pt_regs)); @@ -448,34 +416,44 @@ int main(int argc, char **argv) /* Scan interp_prefix dir for replacement files. */ init_paths(interp_prefix); + /* NOTE: we need to init the CPU at this stage to get the + host_page_size */ + env = cpu_init(); + if (elf_exec(filename, argv+optind, environ, regs, info) != 0) { printf("Error loading %s\n", filename); _exit(1); } if (loglevel) { + page_dump(logfile); + fprintf(logfile, "start_brk 0x%08lx\n" , info->start_brk); fprintf(logfile, "end_code 0x%08lx\n" , info->end_code); fprintf(logfile, "start_code 0x%08lx\n" , info->start_code); fprintf(logfile, "end_data 0x%08lx\n" , info->end_data); fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack); fprintf(logfile, "brk 0x%08lx\n" , info->brk); - fprintf(logfile, "esp 0x%08lx\n" , regs->esp); - fprintf(logfile, "eip 0x%08lx\n" , regs->eip); + fprintf(logfile, "entry 0x%08lx\n" , info->entry); } target_set_brk((char *)info->brk); syscall_init(); signal_init(); - env = cpu_x86_init(); global_env = env; /* build Task State */ memset(ts, 0, sizeof(TaskState)); env->opaque = ts; ts->used = 1; + env->user_mode_only = 1; +#if defined(TARGET_I386) + cpu_x86_set_cpl(env, 3); + + env->cr[0] = CR0_PG_MASK | CR0_WP_MASK | CR0_PE_MASK; + /* linux register setup */ env->regs[R_EAX] = regs->eax; env->regs[R_EBX] = regs->ebx; @@ -487,11 +465,40 @@ int main(int argc, char **argv) env->regs[R_ESP] = regs->esp; env->eip = regs->eip; + /* linux interrupt setup */ + env->idt.base = (void *)idt_table; + env->idt.limit = sizeof(idt_table) - 1; + set_idt(0, 0); + set_idt(1, 0); + set_idt(2, 0); + set_idt(3, 3); + set_idt(4, 3); + set_idt(5, 3); + set_idt(6, 0); + set_idt(7, 0); + set_idt(8, 0); + set_idt(9, 0); + set_idt(10, 0); + set_idt(11, 0); + set_idt(12, 0); + set_idt(13, 0); + set_idt(14, 0); + set_idt(15, 0); + set_idt(16, 0); + set_idt(17, 0); + set_idt(18, 0); + set_idt(19, 0); + set_idt(0x80, 3); + /* linux segment setup */ env->gdt.base = (void *)gdt_table; env->gdt.limit = sizeof(gdt_table) - 1; - write_dt(&gdt_table[__USER_CS >> 3], 0, 0xffffffff, 1); - write_dt(&gdt_table[__USER_DS >> 3], 0, 0xffffffff, 1); + write_dt(&gdt_table[__USER_CS >> 3], 0, 0xfffff, + DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK | + (3 << DESC_DPL_SHIFT) | (0xa << DESC_TYPE_SHIFT)); + write_dt(&gdt_table[__USER_DS >> 3], 0, 0xfffff, + DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK | + (3 << DESC_DPL_SHIFT) | (0x2 << DESC_TYPE_SHIFT)); cpu_x86_load_seg(env, R_CS, __USER_CS); cpu_x86_load_seg(env, R_DS, __USER_DS); cpu_x86_load_seg(env, R_ES, __USER_DS); @@ -499,6 +506,21 @@ int main(int argc, char **argv) cpu_x86_load_seg(env, R_FS, __USER_DS); cpu_x86_load_seg(env, R_GS, __USER_DS); +#elif defined(TARGET_ARM) + { + int i; + for(i = 0; i < 16; i++) { + env->regs[i] = regs->uregs[i]; + } + env->cpsr = regs->uregs[16]; + } +#elif defined(TARGET_SPARC) + env->pc = regs->u_regs[0]; + env->regwptr[6] = regs->u_regs[1]-0x40; +#else +#error unsupported target CPU +#endif + cpu_loop(env); /* never exits */ return 0;