Statistics
| Branch: | Revision:

root / linux-user / main.c @ 2623cbaf

History | View | Annotate | Download (36.5 kB)

1
/*
2
 *  qemu user main
3
 * 
4
 *  Copyright (c) 2003 Fabrice Bellard
5
 *
6
 *  This program is free software; you can redistribute it and/or modify
7
 *  it under the terms of the GNU General Public License as published by
8
 *  the Free Software Foundation; either version 2 of the License, or
9
 *  (at your option) any later version.
10
 *
11
 *  This program is distributed in the hope that it will be useful,
12
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14
 *  GNU General Public License for more details.
15
 *
16
 *  You should have received a copy of the GNU General Public License
17
 *  along with this program; if not, write to the Free Software
18
 *  Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19
 */
20
#include <stdlib.h>
21
#include <stdio.h>
22
#include <stdarg.h>
23
#include <string.h>
24
#include <errno.h>
25
#include <unistd.h>
26

    
27
#include "qemu.h"
28

    
29
#define DEBUG_LOGFILE "/tmp/qemu.log"
30

    
31
#ifdef __APPLE__
32
#include <crt_externs.h>
33
# define environ  (*_NSGetEnviron())
34
#endif
35

    
36
static const char *interp_prefix = CONFIG_QEMU_PREFIX;
37

    
38
#if defined(__i386__) && !defined(CONFIG_STATIC)
39
/* Force usage of an ELF interpreter even if it is an ELF shared
40
   object ! */
41
const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2";
42
#endif
43

    
44
/* for recent libc, we add these dummy symbols which are not declared
45
   when generating a linked object (bug in ld ?) */
46
#if (__GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3)) && !defined(CONFIG_STATIC)
47
long __preinit_array_start[0];
48
long __preinit_array_end[0];
49
long __init_array_start[0];
50
long __init_array_end[0];
51
long __fini_array_start[0];
52
long __fini_array_end[0];
53
#endif
54

    
55
/* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so
56
   we allocate a bigger stack. Need a better solution, for example
57
   by remapping the process stack directly at the right place */
58
unsigned long x86_stack_size = 512 * 1024;
59

    
60
void gemu_log(const char *fmt, ...)
61
{
62
    va_list ap;
63

    
64
    va_start(ap, fmt);
65
    vfprintf(stderr, fmt, ap);
66
    va_end(ap);
67
}
68

    
69
void cpu_outb(CPUState *env, int addr, int val)
70
{
71
    fprintf(stderr, "outb: port=0x%04x, data=%02x\n", addr, val);
72
}
73

    
74
void cpu_outw(CPUState *env, int addr, int val)
75
{
76
    fprintf(stderr, "outw: port=0x%04x, data=%04x\n", addr, val);
77
}
78

    
79
void cpu_outl(CPUState *env, int addr, int val)
80
{
81
    fprintf(stderr, "outl: port=0x%04x, data=%08x\n", addr, val);
82
}
83

    
84
int cpu_inb(CPUState *env, int addr)
85
{
86
    fprintf(stderr, "inb: port=0x%04x\n", addr);
87
    return 0;
88
}
89

    
90
int cpu_inw(CPUState *env, int addr)
91
{
92
    fprintf(stderr, "inw: port=0x%04x\n", addr);
93
    return 0;
94
}
95

    
96
int cpu_inl(CPUState *env, int addr)
97
{
98
    fprintf(stderr, "inl: port=0x%04x\n", addr);
99
    return 0;
100
}
101

    
102
int cpu_get_pic_interrupt(CPUState *env)
103
{
104
    return -1;
105
}
106

    
107
/* timers for rdtsc */
108

    
109
#if defined(__i386__)
110

    
111
int64_t cpu_get_real_ticks(void)
112
{
113
    int64_t val;
114
    asm volatile ("rdtsc" : "=A" (val));
115
    return val;
116
}
117

    
118
#elif defined(__x86_64__)
119

    
120
int64_t cpu_get_real_ticks(void)
121
{
122
    uint32_t low,high;
123
    int64_t val;
124
    asm volatile("rdtsc" : "=a" (low), "=d" (high));
125
    val = high;
126
    val <<= 32;
127
    val |= low;
128
    return val;
129
}
130

    
131
#else
132

    
133
static uint64_t emu_time;
134

    
135
int64_t cpu_get_real_ticks(void)
136
{
137
    return emu_time++;
138
}
139

    
140
#endif
141

    
142
#ifdef TARGET_I386
143
/***********************************************************/
144
/* CPUX86 core interface */
145

    
146
uint64_t cpu_get_tsc(CPUX86State *env)
147
{
148
    return cpu_get_real_ticks();
149
}
150

    
151
static void write_dt(void *ptr, unsigned long addr, unsigned long limit, 
152
                     int flags)
153
{
154
    unsigned int e1, e2;
155
    e1 = (addr << 16) | (limit & 0xffff);
156
    e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000);
157
    e2 |= flags;
158
    stl((uint8_t *)ptr, e1);
159
    stl((uint8_t *)ptr + 4, e2);
160
}
161

    
162
static void set_gate(void *ptr, unsigned int type, unsigned int dpl, 
163
                     unsigned long addr, unsigned int sel)
164
{
165
    unsigned int e1, e2;
166
    e1 = (addr & 0xffff) | (sel << 16);
167
    e2 = (addr & 0xffff0000) | 0x8000 | (dpl << 13) | (type << 8);
168
    stl((uint8_t *)ptr, e1);
169
    stl((uint8_t *)ptr + 4, e2);
170
}
171

    
172
uint64_t gdt_table[6];
173
uint64_t idt_table[256];
174

    
175
/* only dpl matters as we do only user space emulation */
176
static void set_idt(int n, unsigned int dpl)
177
{
178
    set_gate(idt_table + n, 0, dpl, 0, 0);
179
}
180

    
181
void cpu_loop(CPUX86State *env)
182
{
183
    int trapnr;
184
    target_ulong pc;
185
    target_siginfo_t info;
186

    
187
    for(;;) {
188
        trapnr = cpu_x86_exec(env);
189
        switch(trapnr) {
190
        case 0x80:
191
            /* linux syscall */
192
            env->regs[R_EAX] = do_syscall(env, 
193
                                          env->regs[R_EAX], 
194
                                          env->regs[R_EBX],
195
                                          env->regs[R_ECX],
196
                                          env->regs[R_EDX],
197
                                          env->regs[R_ESI],
198
                                          env->regs[R_EDI],
199
                                          env->regs[R_EBP]);
200
            break;
201
        case EXCP0B_NOSEG:
202
        case EXCP0C_STACK:
203
            info.si_signo = SIGBUS;
204
            info.si_errno = 0;
205
            info.si_code = TARGET_SI_KERNEL;
206
            info._sifields._sigfault._addr = 0;
207
            queue_signal(info.si_signo, &info);
208
            break;
209
        case EXCP0D_GPF:
210
            if (env->eflags & VM_MASK) {
211
                handle_vm86_fault(env);
212
            } else {
213
                info.si_signo = SIGSEGV;
214
                info.si_errno = 0;
215
                info.si_code = TARGET_SI_KERNEL;
216
                info._sifields._sigfault._addr = 0;
217
                queue_signal(info.si_signo, &info);
218
            }
219
            break;
220
        case EXCP0E_PAGE:
221
            info.si_signo = SIGSEGV;
222
            info.si_errno = 0;
223
            if (!(env->error_code & 1))
224
                info.si_code = TARGET_SEGV_MAPERR;
225
            else
226
                info.si_code = TARGET_SEGV_ACCERR;
227
            info._sifields._sigfault._addr = env->cr[2];
228
            queue_signal(info.si_signo, &info);
229
            break;
230
        case EXCP00_DIVZ:
231
            if (env->eflags & VM_MASK) {
232
                handle_vm86_trap(env, trapnr);
233
            } else {
234
                /* division by zero */
235
                info.si_signo = SIGFPE;
236
                info.si_errno = 0;
237
                info.si_code = TARGET_FPE_INTDIV;
238
                info._sifields._sigfault._addr = env->eip;
239
                queue_signal(info.si_signo, &info);
240
            }
241
            break;
242
        case EXCP01_SSTP:
243
        case EXCP03_INT3:
244
            if (env->eflags & VM_MASK) {
245
                handle_vm86_trap(env, trapnr);
246
            } else {
247
                info.si_signo = SIGTRAP;
248
                info.si_errno = 0;
249
                if (trapnr == EXCP01_SSTP) {
250
                    info.si_code = TARGET_TRAP_BRKPT;
251
                    info._sifields._sigfault._addr = env->eip;
252
                } else {
253
                    info.si_code = TARGET_SI_KERNEL;
254
                    info._sifields._sigfault._addr = 0;
255
                }
256
                queue_signal(info.si_signo, &info);
257
            }
258
            break;
259
        case EXCP04_INTO:
260
        case EXCP05_BOUND:
261
            if (env->eflags & VM_MASK) {
262
                handle_vm86_trap(env, trapnr);
263
            } else {
264
                info.si_signo = SIGSEGV;
265
                info.si_errno = 0;
266
                info.si_code = TARGET_SI_KERNEL;
267
                info._sifields._sigfault._addr = 0;
268
                queue_signal(info.si_signo, &info);
269
            }
270
            break;
271
        case EXCP06_ILLOP:
272
            info.si_signo = SIGILL;
273
            info.si_errno = 0;
274
            info.si_code = TARGET_ILL_ILLOPN;
275
            info._sifields._sigfault._addr = env->eip;
276
            queue_signal(info.si_signo, &info);
277
            break;
278
        case EXCP_INTERRUPT:
279
            /* just indicate that signals should be handled asap */
280
            break;
281
        default:
282
            pc = env->segs[R_CS].base + env->eip;
283
            fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n", 
284
                    (long)pc, trapnr);
285
            abort();
286
        }
287
        process_pending_signals(env);
288
    }
289
}
290
#endif
291

    
292
#ifdef TARGET_ARM
293

    
294
/* XXX: find a better solution */
295
extern void tb_invalidate_page_range(target_ulong start, target_ulong end);
296

    
297
static void arm_cache_flush(target_ulong start, target_ulong last)
298
{
299
    target_ulong addr, last1;
300

    
301
    if (last < start)
302
        return;
303
    addr = start;
304
    for(;;) {
305
        last1 = ((addr + TARGET_PAGE_SIZE) & TARGET_PAGE_MASK) - 1;
306
        if (last1 > last)
307
            last1 = last;
308
        tb_invalidate_page_range(addr, last1 + 1);
309
        if (last1 == last)
310
            break;
311
        addr = last1 + 1;
312
    }
313
}
314

    
315
void cpu_loop(CPUARMState *env)
316
{
317
    int trapnr;
318
    unsigned int n, insn;
319
    target_siginfo_t info;
320
    
321
    for(;;) {
322
        trapnr = cpu_arm_exec(env);
323
        switch(trapnr) {
324
        case EXCP_UDEF:
325
            {
326
                TaskState *ts = env->opaque;
327
                uint32_t opcode;
328

    
329
                /* we handle the FPU emulation here, as Linux */
330
                /* we get the opcode */
331
                opcode = ldl_raw((uint8_t *)env->regs[15]);
332
                
333
                if (EmulateAll(opcode, &ts->fpa, env->regs) == 0) {
334
                    info.si_signo = SIGILL;
335
                    info.si_errno = 0;
336
                    info.si_code = TARGET_ILL_ILLOPN;
337
                    info._sifields._sigfault._addr = env->regs[15];
338
                    queue_signal(info.si_signo, &info);
339
                } else {
340
                    /* increment PC */
341
                    env->regs[15] += 4;
342
                }
343
            }
344
            break;
345
        case EXCP_SWI:
346
            {
347
                /* system call */
348
                insn = ldl((void *)(env->regs[15] - 4));
349
                n = insn & 0xffffff;
350
                if (n == ARM_NR_cacheflush) {
351
                    arm_cache_flush(env->regs[0], env->regs[1]);
352
                } else if (n >= ARM_SYSCALL_BASE) {
353
                    /* linux syscall */
354
                    n -= ARM_SYSCALL_BASE;
355
                    env->regs[0] = do_syscall(env, 
356
                                              n, 
357
                                              env->regs[0],
358
                                              env->regs[1],
359
                                              env->regs[2],
360
                                              env->regs[3],
361
                                              env->regs[4],
362
                                              0);
363
                } else {
364
                    goto error;
365
                }
366
            }
367
            break;
368
        case EXCP_INTERRUPT:
369
            /* just indicate that signals should be handled asap */
370
            break;
371
        case EXCP_PREFETCH_ABORT:
372
        case EXCP_DATA_ABORT:
373
            {
374
                info.si_signo = SIGSEGV;
375
                info.si_errno = 0;
376
                /* XXX: check env->error_code */
377
                info.si_code = TARGET_SEGV_MAPERR;
378
                info._sifields._sigfault._addr = env->cp15_6;
379
                queue_signal(info.si_signo, &info);
380
            }
381
            break;
382
        default:
383
        error:
384
            fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n", 
385
                    trapnr);
386
            cpu_dump_state(env, stderr, fprintf, 0);
387
            abort();
388
        }
389
        process_pending_signals(env);
390
    }
391
}
392

    
393
#endif
394

    
395
#ifdef TARGET_SPARC
396

    
397
//#define DEBUG_WIN
398

    
399
/* WARNING: dealing with register windows _is_ complicated. More info
400
   can be found at http://www.sics.se/~psm/sparcstack.html */
401
static inline int get_reg_index(CPUSPARCState *env, int cwp, int index)
402
{
403
    index = (index + cwp * 16) & (16 * NWINDOWS - 1);
404
    /* wrap handling : if cwp is on the last window, then we use the
405
       registers 'after' the end */
406
    if (index < 8 && env->cwp == (NWINDOWS - 1))
407
        index += (16 * NWINDOWS);
408
    return index;
409
}
410

    
411
/* save the register window 'cwp1' */
412
static inline void save_window_offset(CPUSPARCState *env, int cwp1)
413
{
414
    unsigned int i;
415
    uint32_t *sp_ptr;
416
    
417
    sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
418
#if defined(DEBUG_WIN)
419
    printf("win_overflow: sp_ptr=0x%x save_cwp=%d\n", 
420
           (int)sp_ptr, cwp1);
421
#endif
422
    for(i = 0; i < 16; i++) {
423
        put_user(env->regbase[get_reg_index(env, cwp1, 8 + i)], sp_ptr);
424
        sp_ptr++;
425
    }
426
}
427

    
428
static void save_window(CPUSPARCState *env)
429
{
430
    unsigned int new_wim;
431
    new_wim = ((env->wim >> 1) | (env->wim << (NWINDOWS - 1))) &
432
        ((1LL << NWINDOWS) - 1);
433
    save_window_offset(env, (env->cwp - 2) & (NWINDOWS - 1));
434
    env->wim = new_wim;
435
}
436

    
437
static void restore_window(CPUSPARCState *env)
438
{
439
    unsigned int new_wim, i, cwp1;
440
    uint32_t *sp_ptr, reg;
441
    
442
    new_wim = ((env->wim << 1) | (env->wim >> (NWINDOWS - 1))) &
443
        ((1LL << NWINDOWS) - 1);
444
    
445
    /* restore the invalid window */
446
    cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
447
    sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
448
#if defined(DEBUG_WIN)
449
    printf("win_underflow: sp_ptr=0x%x load_cwp=%d\n", 
450
           (int)sp_ptr, cwp1);
451
#endif
452
    for(i = 0; i < 16; i++) {
453
        get_user(reg, sp_ptr);
454
        env->regbase[get_reg_index(env, cwp1, 8 + i)] = reg;
455
        sp_ptr++;
456
    }
457
    env->wim = new_wim;
458
}
459

    
460
static void flush_windows(CPUSPARCState *env)
461
{
462
    int offset, cwp1;
463

    
464
    offset = 1;
465
    for(;;) {
466
        /* if restore would invoke restore_window(), then we can stop */
467
        cwp1 = (env->cwp + offset) & (NWINDOWS - 1);
468
        if (env->wim & (1 << cwp1))
469
            break;
470
        save_window_offset(env, cwp1);
471
        offset++;
472
    }
473
    /* set wim so that restore will reload the registers */
474
    cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
475
    env->wim = 1 << cwp1;
476
#if defined(DEBUG_WIN)
477
    printf("flush_windows: nb=%d\n", offset - 1);
478
#endif
479
}
480

    
481
void cpu_loop (CPUSPARCState *env)
482
{
483
    int trapnr, ret;
484
    target_siginfo_t info;
485
    
486
    while (1) {
487
        trapnr = cpu_sparc_exec (env);
488
        
489
        switch (trapnr) {
490
        case 0x88: 
491
        case 0x90:
492
            ret = do_syscall (env, env->gregs[1],
493
                              env->regwptr[0], env->regwptr[1], 
494
                              env->regwptr[2], env->regwptr[3], 
495
                              env->regwptr[4], env->regwptr[5]);
496
            if ((unsigned int)ret >= (unsigned int)(-515)) {
497
                env->psr |= PSR_CARRY;
498
                ret = -ret;
499
            } else {
500
                env->psr &= ~PSR_CARRY;
501
            }
502
            env->regwptr[0] = ret;
503
            /* next instruction */
504
            env->pc = env->npc;
505
            env->npc = env->npc + 4;
506
            break;
507
        case 0x83: /* flush windows */
508
            flush_windows(env);
509
            /* next instruction */
510
            env->pc = env->npc;
511
            env->npc = env->npc + 4;
512
            break;
513
        case TT_WIN_OVF: /* window overflow */
514
            save_window(env);
515
            break;
516
        case TT_WIN_UNF: /* window underflow */
517
            restore_window(env);
518
            break;
519
        case TT_TFAULT:
520
        case TT_DFAULT:
521
            {
522
                info.si_signo = SIGSEGV;
523
                info.si_errno = 0;
524
                /* XXX: check env->error_code */
525
                info.si_code = TARGET_SEGV_MAPERR;
526
                info._sifields._sigfault._addr = env->mmuregs[4];
527
                queue_signal(info.si_signo, &info);
528
            }
529
            break;
530
        case 0x100: // XXX, why do we get these?
531
            break;
532
        default:
533
            printf ("Unhandled trap: 0x%x\n", trapnr);
534
            cpu_dump_state(env, stderr, fprintf, 0);
535
            exit (1);
536
        }
537
        process_pending_signals (env);
538
    }
539
}
540

    
541
#endif
542

    
543
#ifdef TARGET_PPC
544

    
545
static inline uint64_t cpu_ppc_get_tb (CPUState *env)
546
{
547
    /* TO FIX */
548
    return 0;
549
}
550
  
551
uint32_t cpu_ppc_load_tbl (CPUState *env)
552
{
553
    return cpu_ppc_get_tb(env) & 0xFFFFFFFF;
554
}
555
  
556
uint32_t cpu_ppc_load_tbu (CPUState *env)
557
{
558
    return cpu_ppc_get_tb(env) >> 32;
559
}
560
  
561
static void cpu_ppc_store_tb (CPUState *env, uint64_t value)
562
{
563
    /* TO FIX */
564
}
565

    
566
void cpu_ppc_store_tbu (CPUState *env, uint32_t value)
567
{
568
    cpu_ppc_store_tb(env, ((uint64_t)value << 32) | cpu_ppc_load_tbl(env));
569
}
570
 
571
void cpu_ppc_store_tbl (CPUState *env, uint32_t value)
572
{
573
    cpu_ppc_store_tb(env, ((uint64_t)cpu_ppc_load_tbl(env) << 32) | value);
574
}
575
  
576
uint32_t cpu_ppc_load_decr (CPUState *env)
577
{
578
    /* TO FIX */
579
    return -1;
580
}
581
 
582
void cpu_ppc_store_decr (CPUState *env, uint32_t value)
583
{
584
    /* TO FIX */
585
}
586
 
587
void cpu_loop(CPUPPCState *env)
588
{
589
    target_siginfo_t info;
590
    int trapnr;
591
    uint32_t ret;
592
    
593
    for(;;) {
594
        trapnr = cpu_ppc_exec(env);
595
        if (trapnr != EXCP_SYSCALL_USER && trapnr != EXCP_BRANCH &&
596
            trapnr != EXCP_TRACE) {
597
            if (loglevel > 0) {
598
                cpu_dump_state(env, logfile, fprintf, 0);
599
            }
600
        }
601
        switch(trapnr) {
602
        case EXCP_NONE:
603
            break;
604
        case EXCP_SYSCALL_USER:
605
            /* system call */
606
            /* WARNING:
607
             * PPC ABI uses overflow flag in cr0 to signal an error
608
             * in syscalls.
609
             */
610
#if 0
611
            printf("syscall %d 0x%08x 0x%08x 0x%08x 0x%08x\n", env->gpr[0],
612
                   env->gpr[3], env->gpr[4], env->gpr[5], env->gpr[6]);
613
#endif
614
            env->crf[0] &= ~0x1;
615
            ret = do_syscall(env, env->gpr[0], env->gpr[3], env->gpr[4],
616
                             env->gpr[5], env->gpr[6], env->gpr[7],
617
                             env->gpr[8]);
618
            if (ret > (uint32_t)(-515)) {
619
                env->crf[0] |= 0x1;
620
                ret = -ret;
621
            }
622
            env->gpr[3] = ret;
623
#if 0
624
            printf("syscall returned 0x%08x (%d)\n", ret, ret);
625
#endif
626
            break;
627
        case EXCP_RESET:
628
            /* Should not happen ! */
629
            fprintf(stderr, "RESET asked... Stop emulation\n");
630
            if (loglevel)
631
                fprintf(logfile, "RESET asked... Stop emulation\n");
632
            abort();
633
        case EXCP_MACHINE_CHECK:
634
            fprintf(stderr, "Machine check exeption...  Stop emulation\n");
635
            if (loglevel)
636
                fprintf(logfile, "RESET asked... Stop emulation\n");
637
            info.si_signo = TARGET_SIGBUS;
638
            info.si_errno = 0;
639
            info.si_code = TARGET_BUS_OBJERR;
640
            info._sifields._sigfault._addr = env->nip - 4;
641
            queue_signal(info.si_signo, &info);
642
        case EXCP_DSI:
643
            fprintf(stderr, "Invalid data memory access: 0x%08x\n", env->spr[DAR]);
644
            if (loglevel) {
645
                fprintf(logfile, "Invalid data memory access: 0x%08x\n",
646
                        env->spr[DAR]);
647
            }
648
            switch (env->error_code & 0xF) {
649
            case EXCP_DSI_TRANSLATE:
650
                info.si_signo = TARGET_SIGSEGV;
651
                info.si_errno = 0;
652
                info.si_code = TARGET_SEGV_MAPERR;
653
                break;
654
            case EXCP_DSI_NOTSUP:
655
            case EXCP_DSI_EXTERNAL:
656
                info.si_signo = TARGET_SIGILL;
657
                info.si_errno = 0;
658
                info.si_code = TARGET_ILL_ILLADR;
659
                break;
660
            case EXCP_DSI_PROT: 
661
                info.si_signo = TARGET_SIGSEGV;
662
                info.si_errno = 0;
663
                info.si_code = TARGET_SEGV_ACCERR;
664
                break;
665
            case EXCP_DSI_DABR:
666
                info.si_signo = TARGET_SIGTRAP;
667
                info.si_errno = 0;
668
                info.si_code = TARGET_TRAP_BRKPT;
669
                break;
670
            default:
671
                /* Let's send a regular segfault... */
672
                fprintf(stderr, "Invalid segfault errno (%02x)\n",
673
                        env->error_code);
674
                if (loglevel) {
675
                    fprintf(logfile, "Invalid segfault errno (%02x)\n",
676
                            env->error_code);
677
                }
678
                info.si_signo = TARGET_SIGSEGV;
679
                info.si_errno = 0;
680
                info.si_code = TARGET_SEGV_MAPERR;
681
                break;
682
            }
683
            info._sifields._sigfault._addr = env->nip;
684
            queue_signal(info.si_signo, &info);
685
            break;
686
        case EXCP_ISI:
687
            fprintf(stderr, "Invalid instruction fetch\n");
688
            if (loglevel)
689
                fprintf(logfile, "Invalid instruction fetch\n");
690
            switch (env->error_code) {
691
            case EXCP_ISI_TRANSLATE:
692
                info.si_signo = TARGET_SIGSEGV;
693
            info.si_errno = 0;
694
                info.si_code = TARGET_SEGV_MAPERR;
695
                break;
696
            case EXCP_ISI_GUARD:
697
                info.si_signo = TARGET_SIGILL;
698
                info.si_errno = 0;
699
                info.si_code = TARGET_ILL_ILLADR;
700
                break;
701
            case EXCP_ISI_NOEXEC:
702
            case EXCP_ISI_PROT:
703
                info.si_signo = TARGET_SIGSEGV;
704
                info.si_errno = 0;
705
                info.si_code = TARGET_SEGV_ACCERR;
706
                break;
707
            default:
708
                /* Let's send a regular segfault... */
709
                fprintf(stderr, "Invalid segfault errno (%02x)\n",
710
                        env->error_code);
711
                if (loglevel) {
712
                    fprintf(logfile, "Invalid segfault errno (%02x)\n",
713
                            env->error_code);
714
                }
715
                info.si_signo = TARGET_SIGSEGV;
716
                info.si_errno = 0;
717
                info.si_code = TARGET_SEGV_MAPERR;
718
                break;
719
            }
720
            info._sifields._sigfault._addr = env->nip - 4;
721
            queue_signal(info.si_signo, &info);
722
            break;
723
        case EXCP_EXTERNAL:
724
            /* Should not happen ! */
725
            fprintf(stderr, "External interruption... Stop emulation\n");
726
            if (loglevel)
727
                fprintf(logfile, "External interruption... Stop emulation\n");
728
            abort();
729
        case EXCP_ALIGN:
730
            fprintf(stderr, "Invalid unaligned memory access\n");
731
            if (loglevel)
732
                fprintf(logfile, "Invalid unaligned memory access\n");
733
            info.si_signo = TARGET_SIGBUS;
734
            info.si_errno = 0;
735
            info.si_code = TARGET_BUS_ADRALN;
736
            info._sifields._sigfault._addr = env->nip - 4;
737
            queue_signal(info.si_signo, &info);
738
            break;
739
        case EXCP_PROGRAM:
740
            switch (env->error_code & ~0xF) {
741
            case EXCP_FP:
742
            fprintf(stderr, "Program exception\n");
743
                if (loglevel)
744
                    fprintf(logfile, "Program exception\n");
745
                /* Set FX */
746
                env->fpscr[7] |= 0x8;
747
                /* Finally, update FEX */
748
                if ((((env->fpscr[7] & 0x3) << 3) | (env->fpscr[6] >> 1)) &
749
                    ((env->fpscr[1] << 1) | (env->fpscr[0] >> 3)))
750
                    env->fpscr[7] |= 0x4;
751
                info.si_signo = TARGET_SIGFPE;
752
                info.si_errno = 0;
753
                switch (env->error_code & 0xF) {
754
                case EXCP_FP_OX:
755
                    info.si_code = TARGET_FPE_FLTOVF;
756
                    break;
757
                case EXCP_FP_UX:
758
                    info.si_code = TARGET_FPE_FLTUND;
759
                    break;
760
                case EXCP_FP_ZX:
761
                case EXCP_FP_VXZDZ:
762
                    info.si_code = TARGET_FPE_FLTDIV;
763
                    break;
764
                case EXCP_FP_XX:
765
                    info.si_code = TARGET_FPE_FLTRES;
766
                    break;
767
                case EXCP_FP_VXSOFT:
768
                    info.si_code = TARGET_FPE_FLTINV;
769
                    break;
770
                case EXCP_FP_VXNAN:
771
                case EXCP_FP_VXISI:
772
                case EXCP_FP_VXIDI:
773
                case EXCP_FP_VXIMZ:
774
                case EXCP_FP_VXVC:
775
                case EXCP_FP_VXSQRT:
776
                case EXCP_FP_VXCVI:
777
                    info.si_code = TARGET_FPE_FLTSUB;
778
                    break;
779
                default:
780
                    fprintf(stderr, "Unknown floating point exception "
781
                            "(%02x)\n", env->error_code);
782
                    if (loglevel) {
783
                        fprintf(logfile, "Unknown floating point exception "
784
                                "(%02x)\n", env->error_code & 0xF);
785
                    }
786
                }
787
            break;
788
        case EXCP_INVAL:
789
                fprintf(stderr, "Invalid instruction\n");
790
                if (loglevel)
791
                    fprintf(logfile, "Invalid instruction\n");
792
                info.si_signo = TARGET_SIGILL;
793
                info.si_errno = 0;
794
                switch (env->error_code & 0xF) {
795
                case EXCP_INVAL_INVAL:
796
                    info.si_code = TARGET_ILL_ILLOPC;
797
                    break;
798
                case EXCP_INVAL_LSWX:
799
            info.si_code = TARGET_ILL_ILLOPN;
800
                    break;
801
                case EXCP_INVAL_SPR:
802
                    info.si_code = TARGET_ILL_PRVREG;
803
                    break;
804
                case EXCP_INVAL_FP:
805
                    info.si_code = TARGET_ILL_COPROC;
806
                    break;
807
                default:
808
                    fprintf(stderr, "Unknown invalid operation (%02x)\n",
809
                            env->error_code & 0xF);
810
                    if (loglevel) {
811
                        fprintf(logfile, "Unknown invalid operation (%02x)\n",
812
                                env->error_code & 0xF);
813
                    }
814
                    info.si_code = TARGET_ILL_ILLADR;
815
                    break;
816
                }
817
                break;
818
            case EXCP_PRIV:
819
                fprintf(stderr, "Privilege violation\n");
820
                if (loglevel)
821
                    fprintf(logfile, "Privilege violation\n");
822
                info.si_signo = TARGET_SIGILL;
823
                info.si_errno = 0;
824
                switch (env->error_code & 0xF) {
825
                case EXCP_PRIV_OPC:
826
                    info.si_code = TARGET_ILL_PRVOPC;
827
                    break;
828
                case EXCP_PRIV_REG:
829
                    info.si_code = TARGET_ILL_PRVREG;
830
                break;
831
                default:
832
                    fprintf(stderr, "Unknown privilege violation (%02x)\n",
833
                            env->error_code & 0xF);
834
                    info.si_code = TARGET_ILL_PRVOPC;
835
                    break;
836
                }
837
                break;
838
            case EXCP_TRAP:
839
                fprintf(stderr, "Tried to call a TRAP\n");
840
                if (loglevel)
841
                    fprintf(logfile, "Tried to call a TRAP\n");
842
                abort();
843
            default:
844
                /* Should not happen ! */
845
                fprintf(stderr, "Unknown program exception (%02x)\n",
846
                        env->error_code);
847
                if (loglevel) {
848
                    fprintf(logfile, "Unknwon program exception (%02x)\n",
849
                            env->error_code);
850
                }
851
                abort();
852
            }
853
            info._sifields._sigfault._addr = env->nip - 4;
854
            queue_signal(info.si_signo, &info);
855
            break;
856
        case EXCP_NO_FP:
857
            fprintf(stderr, "No floating point allowed\n");
858
            if (loglevel)
859
                fprintf(logfile, "No floating point allowed\n");
860
            info.si_signo = TARGET_SIGILL;
861
            info.si_errno = 0;
862
            info.si_code = TARGET_ILL_COPROC;
863
            info._sifields._sigfault._addr = env->nip - 4;
864
            queue_signal(info.si_signo, &info);
865
            break;
866
        case EXCP_DECR:
867
            /* Should not happen ! */
868
            fprintf(stderr, "Decrementer exception\n");
869
            if (loglevel)
870
                fprintf(logfile, "Decrementer exception\n");
871
            abort();
872
        case EXCP_RESA: /* Implementation specific          */
873
            /* Should not happen ! */
874
            fprintf(stderr, "RESA exception should never happen !\n");
875
            if (loglevel)
876
                fprintf(logfile, "RESA exception should never happen !\n");
877
            abort();
878
        case EXCP_RESB: /* Implementation specific          */
879
            /* Should not happen ! */
880
            fprintf(stderr, "RESB exception should never happen !\n");
881
            if (loglevel)
882
                fprintf(logfile, "RESB exception should never happen !\n");
883
            abort();
884
        case EXCP_TRACE:
885
            /* Do nothing: we use this to trace execution */
886
            break;
887
        case EXCP_FP_ASSIST:
888
            /* Should not happen ! */
889
            fprintf(stderr, "Floating point assist exception\n");
890
            if (loglevel)
891
                fprintf(logfile, "Floating point assist exception\n");
892
            abort();
893
        case EXCP_MTMSR:
894
            /* We reloaded the msr, just go on */
895
            if (msr_pr == 0) {
896
                fprintf(stderr, "Tried to go into supervisor mode !\n");
897
                if (loglevel)
898
                    fprintf(logfile, "Tried to go into supervisor mode !\n");
899
                abort();
900
        }
901
            break;
902
        case EXCP_BRANCH:
903
            /* We stopped because of a jump... */
904
            break;
905
        case EXCP_RFI:
906
            /* Should not occur: we always are in user mode */
907
            fprintf(stderr, "Return from interrupt ?\n");
908
            if (loglevel)
909
                fprintf(logfile, "Return from interrupt ?\n");
910
            abort();
911
        case EXCP_INTERRUPT:
912
            /* Don't know why this should ever happen... */
913
            break;
914
        case EXCP_DEBUG:
915
            break;
916
        default:
917
            fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n", 
918
                    trapnr);
919
            if (loglevel) {
920
                fprintf(logfile, "qemu: unhandled CPU exception 0x%02x - "
921
                        "0x%02x - aborting\n", trapnr, env->error_code);
922
            }
923
            abort();
924
        }
925
        process_pending_signals(env);
926
    }
927
}
928
#endif
929

    
930
void usage(void)
931
{
932
    printf("qemu-" TARGET_ARCH " version " QEMU_VERSION ", Copyright (c) 2003-2004 Fabrice Bellard\n"
933
           "usage: qemu-" TARGET_ARCH " [-h] [-d opts] [-L path] [-s size] program [arguments...]\n"
934
           "Linux CPU emulator (compiled for %s emulation)\n"
935
           "\n"
936
           "-h           print this help\n"
937
           "-L path      set the elf interpreter prefix (default=%s)\n"
938
           "-s size      set the stack size in bytes (default=%ld)\n"
939
           "\n"
940
           "debug options:\n"
941
#ifdef USE_CODE_COPY
942
           "-no-code-copy   disable code copy acceleration\n"
943
#endif
944
           "-d options   activate log (logfile=%s)\n"
945
           "-p pagesize  set the host page size to 'pagesize'\n",
946
           TARGET_ARCH,
947
           interp_prefix, 
948
           x86_stack_size,
949
           DEBUG_LOGFILE);
950
    _exit(1);
951
}
952

    
953
/* XXX: currently only used for async signals (see signal.c) */
954
CPUState *global_env;
955
/* used only if single thread */
956
CPUState *cpu_single_env = NULL;
957

    
958
/* used to free thread contexts */
959
TaskState *first_task_state;
960

    
961
int main(int argc, char **argv)
962
{
963
    const char *filename;
964
    struct target_pt_regs regs1, *regs = &regs1;
965
    struct image_info info1, *info = &info1;
966
    TaskState ts1, *ts = &ts1;
967
    CPUState *env;
968
    int optind;
969
    const char *r;
970
    
971
    if (argc <= 1)
972
        usage();
973

    
974
    /* init debug */
975
    cpu_set_log_filename(DEBUG_LOGFILE);
976

    
977
    optind = 1;
978
    for(;;) {
979
        if (optind >= argc)
980
            break;
981
        r = argv[optind];
982
        if (r[0] != '-')
983
            break;
984
        optind++;
985
        r++;
986
        if (!strcmp(r, "-")) {
987
            break;
988
        } else if (!strcmp(r, "d")) {
989
            int mask;
990
            CPULogItem *item;
991

    
992
            if (optind >= argc)
993
                break;
994
            
995
            r = argv[optind++];
996
            mask = cpu_str_to_log_mask(r);
997
            if (!mask) {
998
                printf("Log items (comma separated):\n");
999
                for(item = cpu_log_items; item->mask != 0; item++) {
1000
                    printf("%-10s %s\n", item->name, item->help);
1001
                }
1002
                exit(1);
1003
            }
1004
            cpu_set_log(mask);
1005
        } else if (!strcmp(r, "s")) {
1006
            r = argv[optind++];
1007
            x86_stack_size = strtol(r, (char **)&r, 0);
1008
            if (x86_stack_size <= 0)
1009
                usage();
1010
            if (*r == 'M')
1011
                x86_stack_size *= 1024 * 1024;
1012
            else if (*r == 'k' || *r == 'K')
1013
                x86_stack_size *= 1024;
1014
        } else if (!strcmp(r, "L")) {
1015
            interp_prefix = argv[optind++];
1016
        } else if (!strcmp(r, "p")) {
1017
            qemu_host_page_size = atoi(argv[optind++]);
1018
            if (qemu_host_page_size == 0 ||
1019
                (qemu_host_page_size & (qemu_host_page_size - 1)) != 0) {
1020
                fprintf(stderr, "page size must be a power of two\n");
1021
                exit(1);
1022
            }
1023
        } else 
1024
#ifdef USE_CODE_COPY
1025
        if (!strcmp(r, "no-code-copy")) {
1026
            code_copy_enabled = 0;
1027
        } else 
1028
#endif
1029
        {
1030
            usage();
1031
        }
1032
    }
1033
    if (optind >= argc)
1034
        usage();
1035
    filename = argv[optind];
1036

    
1037
    /* Zero out regs */
1038
    memset(regs, 0, sizeof(struct target_pt_regs));
1039

    
1040
    /* Zero out image_info */
1041
    memset(info, 0, sizeof(struct image_info));
1042

    
1043
    /* Scan interp_prefix dir for replacement files. */
1044
    init_paths(interp_prefix);
1045

    
1046
    /* NOTE: we need to init the CPU at this stage to get
1047
       qemu_host_page_size */
1048
    env = cpu_init();
1049
    
1050
    if (elf_exec(filename, argv+optind, environ, regs, info) != 0) {
1051
        printf("Error loading %s\n", filename);
1052
        _exit(1);
1053
    }
1054
    
1055
    if (loglevel) {
1056
        page_dump(logfile);
1057
    
1058
        fprintf(logfile, "start_brk   0x%08lx\n" , info->start_brk);
1059
        fprintf(logfile, "end_code    0x%08lx\n" , info->end_code);
1060
        fprintf(logfile, "start_code  0x%08lx\n" , info->start_code);
1061
        fprintf(logfile, "end_data    0x%08lx\n" , info->end_data);
1062
        fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack);
1063
        fprintf(logfile, "brk         0x%08lx\n" , info->brk);
1064
        fprintf(logfile, "entry       0x%08lx\n" , info->entry);
1065
    }
1066

    
1067
    target_set_brk((char *)info->brk);
1068
    syscall_init();
1069
    signal_init();
1070

    
1071
    global_env = env;
1072

    
1073
    /* build Task State */
1074
    memset(ts, 0, sizeof(TaskState));
1075
    env->opaque = ts;
1076
    ts->used = 1;
1077
    env->user_mode_only = 1;
1078
    
1079
#if defined(TARGET_I386)
1080
    cpu_x86_set_cpl(env, 3);
1081

    
1082
    env->cr[0] = CR0_PG_MASK | CR0_WP_MASK | CR0_PE_MASK;
1083
    env->hflags |= HF_PE_MASK;
1084
    if (env->cpuid_features & CPUID_SSE) {
1085
        env->cr[4] |= CR4_OSFXSR_MASK;
1086
        env->hflags |= HF_OSFXSR_MASK;
1087
    }
1088

    
1089
    /* flags setup : we activate the IRQs by default as in user mode */
1090
    env->eflags |= IF_MASK;
1091
    
1092
    /* linux register setup */
1093
    env->regs[R_EAX] = regs->eax;
1094
    env->regs[R_EBX] = regs->ebx;
1095
    env->regs[R_ECX] = regs->ecx;
1096
    env->regs[R_EDX] = regs->edx;
1097
    env->regs[R_ESI] = regs->esi;
1098
    env->regs[R_EDI] = regs->edi;
1099
    env->regs[R_EBP] = regs->ebp;
1100
    env->regs[R_ESP] = regs->esp;
1101
    env->eip = regs->eip;
1102

    
1103
    /* linux interrupt setup */
1104
    env->idt.base = (long)idt_table;
1105
    env->idt.limit = sizeof(idt_table) - 1;
1106
    set_idt(0, 0);
1107
    set_idt(1, 0);
1108
    set_idt(2, 0);
1109
    set_idt(3, 3);
1110
    set_idt(4, 3);
1111
    set_idt(5, 3);
1112
    set_idt(6, 0);
1113
    set_idt(7, 0);
1114
    set_idt(8, 0);
1115
    set_idt(9, 0);
1116
    set_idt(10, 0);
1117
    set_idt(11, 0);
1118
    set_idt(12, 0);
1119
    set_idt(13, 0);
1120
    set_idt(14, 0);
1121
    set_idt(15, 0);
1122
    set_idt(16, 0);
1123
    set_idt(17, 0);
1124
    set_idt(18, 0);
1125
    set_idt(19, 0);
1126
    set_idt(0x80, 3);
1127

    
1128
    /* linux segment setup */
1129
    env->gdt.base = (long)gdt_table;
1130
    env->gdt.limit = sizeof(gdt_table) - 1;
1131
    write_dt(&gdt_table[__USER_CS >> 3], 0, 0xfffff,
1132
             DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK | 
1133
             (3 << DESC_DPL_SHIFT) | (0xa << DESC_TYPE_SHIFT));
1134
    write_dt(&gdt_table[__USER_DS >> 3], 0, 0xfffff,
1135
             DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK | 
1136
             (3 << DESC_DPL_SHIFT) | (0x2 << DESC_TYPE_SHIFT));
1137
    cpu_x86_load_seg(env, R_CS, __USER_CS);
1138
    cpu_x86_load_seg(env, R_DS, __USER_DS);
1139
    cpu_x86_load_seg(env, R_ES, __USER_DS);
1140
    cpu_x86_load_seg(env, R_SS, __USER_DS);
1141
    cpu_x86_load_seg(env, R_FS, __USER_DS);
1142
    cpu_x86_load_seg(env, R_GS, __USER_DS);
1143

    
1144
#elif defined(TARGET_ARM)
1145
    {
1146
        int i;
1147
        for(i = 0; i < 16; i++) {
1148
            env->regs[i] = regs->uregs[i];
1149
        }
1150
        env->cpsr = regs->uregs[16];
1151
    }
1152
#elif defined(TARGET_SPARC)
1153
    {
1154
        int i;
1155
        env->pc = regs->pc;
1156
        env->npc = regs->npc;
1157
        env->y = regs->y;
1158
        for(i = 0; i < 8; i++)
1159
            env->gregs[i] = regs->u_regs[i];
1160
        for(i = 0; i < 8; i++)
1161
            env->regwptr[i] = regs->u_regs[i + 8];
1162
    }
1163
#elif defined(TARGET_PPC)
1164
    {
1165
        int i;
1166
        for (i = 0; i < 32; i++) {
1167
            if (i != 12 && i != 6)
1168
                env->msr[i] = (regs->msr >> i) & 1;
1169
        }
1170
        env->nip = regs->nip;
1171
        for(i = 0; i < 32; i++) {
1172
            env->gpr[i] = regs->gpr[i];
1173
        }
1174
    }
1175
#else
1176
#error unsupported target CPU
1177
#endif
1178

    
1179
    cpu_loop(env);
1180
    /* never exits */
1181
    return 0;
1182
}