4 * Copyright (c) 2003 Fabrice Bellard
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 #define DEBUG_LOGFILE "/tmp/qemu.log"
32 #include <crt_externs.h>
33 # define environ (*_NSGetEnviron())
36 static const char *interp_prefix = CONFIG_QEMU_PREFIX;
38 #if defined(__i386__) && !defined(CONFIG_STATIC)
39 /* Force usage of an ELF interpreter even if it is an ELF shared
41 const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2";
44 /* for recent libc, we add these dummy symbols which are not declared
45 when generating a linked object (bug in ld ?) */
46 #if (__GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3)) && !defined(CONFIG_STATIC)
47 long __preinit_array_start[0];
48 long __preinit_array_end[0];
49 long __init_array_start[0];
50 long __init_array_end[0];
51 long __fini_array_start[0];
52 long __fini_array_end[0];
55 /* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so
56 we allocate a bigger stack. Need a better solution, for example
57 by remapping the process stack directly at the right place */
58 unsigned long x86_stack_size = 512 * 1024;
60 void gemu_log(const char *fmt, ...)
65 vfprintf(stderr, fmt, ap);
69 void cpu_outb(CPUState *env, int addr, int val)
71 fprintf(stderr, "outb: port=0x%04x, data=%02x\n", addr, val);
74 void cpu_outw(CPUState *env, int addr, int val)
76 fprintf(stderr, "outw: port=0x%04x, data=%04x\n", addr, val);
79 void cpu_outl(CPUState *env, int addr, int val)
81 fprintf(stderr, "outl: port=0x%04x, data=%08x\n", addr, val);
84 int cpu_inb(CPUState *env, int addr)
86 fprintf(stderr, "inb: port=0x%04x\n", addr);
90 int cpu_inw(CPUState *env, int addr)
92 fprintf(stderr, "inw: port=0x%04x\n", addr);
96 int cpu_inl(CPUState *env, int addr)
98 fprintf(stderr, "inl: port=0x%04x\n", addr);
102 int cpu_get_pic_interrupt(CPUState *env)
107 /* timers for rdtsc */
109 #if defined(__i386__)
111 int64_t cpu_get_real_ticks(void)
114 asm volatile ("rdtsc" : "=A" (val));
118 #elif defined(__x86_64__)
120 int64_t cpu_get_real_ticks(void)
124 asm volatile("rdtsc" : "=a" (low), "=d" (high));
133 static uint64_t emu_time;
135 int64_t cpu_get_real_ticks(void)
143 /***********************************************************/
144 /* CPUX86 core interface */
146 uint64_t cpu_get_tsc(CPUX86State *env)
148 return cpu_get_real_ticks();
151 static void write_dt(void *ptr, unsigned long addr, unsigned long limit,
155 e1 = (addr << 16) | (limit & 0xffff);
156 e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000);
158 stl((uint8_t *)ptr, e1);
159 stl((uint8_t *)ptr + 4, e2);
162 static void set_gate(void *ptr, unsigned int type, unsigned int dpl,
163 unsigned long addr, unsigned int sel)
166 e1 = (addr & 0xffff) | (sel << 16);
167 e2 = (addr & 0xffff0000) | 0x8000 | (dpl << 13) | (type << 8);
168 stl((uint8_t *)ptr, e1);
169 stl((uint8_t *)ptr + 4, e2);
172 uint64_t gdt_table[6];
173 uint64_t idt_table[256];
175 /* only dpl matters as we do only user space emulation */
176 static void set_idt(int n, unsigned int dpl)
178 set_gate(idt_table + n, 0, dpl, 0, 0);
181 void cpu_loop(CPUX86State *env)
185 target_siginfo_t info;
188 trapnr = cpu_x86_exec(env);
192 env->regs[R_EAX] = do_syscall(env,
203 info.si_signo = SIGBUS;
205 info.si_code = TARGET_SI_KERNEL;
206 info._sifields._sigfault._addr = 0;
207 queue_signal(info.si_signo, &info);
210 if (env->eflags & VM_MASK) {
211 handle_vm86_fault(env);
213 info.si_signo = SIGSEGV;
215 info.si_code = TARGET_SI_KERNEL;
216 info._sifields._sigfault._addr = 0;
217 queue_signal(info.si_signo, &info);
221 info.si_signo = SIGSEGV;
223 if (!(env->error_code & 1))
224 info.si_code = TARGET_SEGV_MAPERR;
226 info.si_code = TARGET_SEGV_ACCERR;
227 info._sifields._sigfault._addr = env->cr[2];
228 queue_signal(info.si_signo, &info);
231 if (env->eflags & VM_MASK) {
232 handle_vm86_trap(env, trapnr);
234 /* division by zero */
235 info.si_signo = SIGFPE;
237 info.si_code = TARGET_FPE_INTDIV;
238 info._sifields._sigfault._addr = env->eip;
239 queue_signal(info.si_signo, &info);
244 if (env->eflags & VM_MASK) {
245 handle_vm86_trap(env, trapnr);
247 info.si_signo = SIGTRAP;
249 if (trapnr == EXCP01_SSTP) {
250 info.si_code = TARGET_TRAP_BRKPT;
251 info._sifields._sigfault._addr = env->eip;
253 info.si_code = TARGET_SI_KERNEL;
254 info._sifields._sigfault._addr = 0;
256 queue_signal(info.si_signo, &info);
261 if (env->eflags & VM_MASK) {
262 handle_vm86_trap(env, trapnr);
264 info.si_signo = SIGSEGV;
266 info.si_code = TARGET_SI_KERNEL;
267 info._sifields._sigfault._addr = 0;
268 queue_signal(info.si_signo, &info);
272 info.si_signo = SIGILL;
274 info.si_code = TARGET_ILL_ILLOPN;
275 info._sifields._sigfault._addr = env->eip;
276 queue_signal(info.si_signo, &info);
279 /* just indicate that signals should be handled asap */
285 sig = gdb_handlesig (env, TARGET_SIGTRAP);
290 info.si_code = TARGET_TRAP_BRKPT;
291 queue_signal(info.si_signo, &info);
296 pc = env->segs[R_CS].base + env->eip;
297 fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n",
301 process_pending_signals(env);
308 /* XXX: find a better solution */
309 extern void tb_invalidate_page_range(target_ulong start, target_ulong end);
311 static void arm_cache_flush(target_ulong start, target_ulong last)
313 target_ulong addr, last1;
319 last1 = ((addr + TARGET_PAGE_SIZE) & TARGET_PAGE_MASK) - 1;
322 tb_invalidate_page_range(addr, last1 + 1);
329 void cpu_loop(CPUARMState *env)
332 unsigned int n, insn;
333 target_siginfo_t info;
336 trapnr = cpu_arm_exec(env);
340 TaskState *ts = env->opaque;
343 /* we handle the FPU emulation here, as Linux */
344 /* we get the opcode */
345 opcode = ldl_raw((uint8_t *)env->regs[15]);
347 if (EmulateAll(opcode, &ts->fpa, env->regs) == 0) {
348 info.si_signo = SIGILL;
350 info.si_code = TARGET_ILL_ILLOPN;
351 info._sifields._sigfault._addr = env->regs[15];
352 queue_signal(info.si_signo, &info);
363 insn = lduw((void *)(env->regs[15] - 2));
366 insn = ldl((void *)(env->regs[15] - 4));
370 if (n == ARM_NR_cacheflush) {
371 arm_cache_flush(env->regs[0], env->regs[1]);
372 } else if (n == ARM_NR_semihosting
373 || n == ARM_NR_thumb_semihosting) {
374 env->regs[0] = do_arm_semihosting (env);
375 } else if (n >= ARM_SYSCALL_BASE
376 || (env->thumb && n == ARM_THUMB_SYSCALL)) {
381 n -= ARM_SYSCALL_BASE;
383 env->regs[0] = do_syscall(env,
397 /* just indicate that signals should be handled asap */
399 case EXCP_PREFETCH_ABORT:
400 case EXCP_DATA_ABORT:
402 info.si_signo = SIGSEGV;
404 /* XXX: check env->error_code */
405 info.si_code = TARGET_SEGV_MAPERR;
406 info._sifields._sigfault._addr = env->cp15_6;
407 queue_signal(info.si_signo, &info);
414 sig = gdb_handlesig (env, TARGET_SIGTRAP);
419 info.si_code = TARGET_TRAP_BRKPT;
420 queue_signal(info.si_signo, &info);
426 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
428 cpu_dump_state(env, stderr, fprintf, 0);
431 process_pending_signals(env);
441 /* WARNING: dealing with register windows _is_ complicated. More info
442 can be found at http://www.sics.se/~psm/sparcstack.html */
443 static inline int get_reg_index(CPUSPARCState *env, int cwp, int index)
445 index = (index + cwp * 16) & (16 * NWINDOWS - 1);
446 /* wrap handling : if cwp is on the last window, then we use the
447 registers 'after' the end */
448 if (index < 8 && env->cwp == (NWINDOWS - 1))
449 index += (16 * NWINDOWS);
453 /* save the register window 'cwp1' */
454 static inline void save_window_offset(CPUSPARCState *env, int cwp1)
459 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
460 #if defined(DEBUG_WIN)
461 printf("win_overflow: sp_ptr=0x%x save_cwp=%d\n",
464 for(i = 0; i < 16; i++) {
465 put_user(env->regbase[get_reg_index(env, cwp1, 8 + i)], sp_ptr);
470 static void save_window(CPUSPARCState *env)
472 unsigned int new_wim;
473 new_wim = ((env->wim >> 1) | (env->wim << (NWINDOWS - 1))) &
474 ((1LL << NWINDOWS) - 1);
475 save_window_offset(env, (env->cwp - 2) & (NWINDOWS - 1));
479 static void restore_window(CPUSPARCState *env)
481 unsigned int new_wim, i, cwp1;
482 uint32_t *sp_ptr, reg;
484 new_wim = ((env->wim << 1) | (env->wim >> (NWINDOWS - 1))) &
485 ((1LL << NWINDOWS) - 1);
487 /* restore the invalid window */
488 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
489 sp_ptr = (uint32_t *)(env->regbase[get_reg_index(env, cwp1, 6)]);
490 #if defined(DEBUG_WIN)
491 printf("win_underflow: sp_ptr=0x%x load_cwp=%d\n",
494 for(i = 0; i < 16; i++) {
495 get_user(reg, sp_ptr);
496 env->regbase[get_reg_index(env, cwp1, 8 + i)] = reg;
502 static void flush_windows(CPUSPARCState *env)
508 /* if restore would invoke restore_window(), then we can stop */
509 cwp1 = (env->cwp + offset) & (NWINDOWS - 1);
510 if (env->wim & (1 << cwp1))
512 save_window_offset(env, cwp1);
515 /* set wim so that restore will reload the registers */
516 cwp1 = (env->cwp + 1) & (NWINDOWS - 1);
517 env->wim = 1 << cwp1;
518 #if defined(DEBUG_WIN)
519 printf("flush_windows: nb=%d\n", offset - 1);
523 void cpu_loop (CPUSPARCState *env)
526 target_siginfo_t info;
529 trapnr = cpu_sparc_exec (env);
534 ret = do_syscall (env, env->gregs[1],
535 env->regwptr[0], env->regwptr[1],
536 env->regwptr[2], env->regwptr[3],
537 env->regwptr[4], env->regwptr[5]);
538 if ((unsigned int)ret >= (unsigned int)(-515)) {
539 env->psr |= PSR_CARRY;
542 env->psr &= ~PSR_CARRY;
544 env->regwptr[0] = ret;
545 /* next instruction */
547 env->npc = env->npc + 4;
549 case 0x83: /* flush windows */
551 /* next instruction */
553 env->npc = env->npc + 4;
555 case TT_WIN_OVF: /* window overflow */
558 case TT_WIN_UNF: /* window underflow */
564 info.si_signo = SIGSEGV;
566 /* XXX: check env->error_code */
567 info.si_code = TARGET_SEGV_MAPERR;
568 info._sifields._sigfault._addr = env->mmuregs[4];
569 queue_signal(info.si_signo, &info);
572 case 0x100: // XXX, why do we get these?
578 sig = gdb_handlesig (env, TARGET_SIGTRAP);
583 info.si_code = TARGET_TRAP_BRKPT;
584 queue_signal(info.si_signo, &info);
589 printf ("Unhandled trap: 0x%x\n", trapnr);
590 cpu_dump_state(env, stderr, fprintf, 0);
593 process_pending_signals (env);
601 static inline uint64_t cpu_ppc_get_tb (CPUState *env)
607 uint32_t cpu_ppc_load_tbl (CPUState *env)
609 return cpu_ppc_get_tb(env) & 0xFFFFFFFF;
612 uint32_t cpu_ppc_load_tbu (CPUState *env)
614 return cpu_ppc_get_tb(env) >> 32;
617 static void cpu_ppc_store_tb (CPUState *env, uint64_t value)
622 void cpu_ppc_store_tbu (CPUState *env, uint32_t value)
624 cpu_ppc_store_tb(env, ((uint64_t)value << 32) | cpu_ppc_load_tbl(env));
627 void cpu_ppc_store_tbl (CPUState *env, uint32_t value)
629 cpu_ppc_store_tb(env, ((uint64_t)cpu_ppc_load_tbl(env) << 32) | value);
632 uint32_t cpu_ppc_load_decr (CPUState *env)
638 void cpu_ppc_store_decr (CPUState *env, uint32_t value)
643 void cpu_loop(CPUPPCState *env)
645 target_siginfo_t info;
650 trapnr = cpu_ppc_exec(env);
651 if (trapnr != EXCP_SYSCALL_USER && trapnr != EXCP_BRANCH &&
652 trapnr != EXCP_TRACE) {
654 cpu_dump_state(env, logfile, fprintf, 0);
660 case EXCP_SYSCALL_USER:
663 * PPC ABI uses overflow flag in cr0 to signal an error
667 printf("syscall %d 0x%08x 0x%08x 0x%08x 0x%08x\n", env->gpr[0],
668 env->gpr[3], env->gpr[4], env->gpr[5], env->gpr[6]);
671 ret = do_syscall(env, env->gpr[0], env->gpr[3], env->gpr[4],
672 env->gpr[5], env->gpr[6], env->gpr[7],
674 if (ret > (uint32_t)(-515)) {
680 printf("syscall returned 0x%08x (%d)\n", ret, ret);
684 /* Should not happen ! */
685 fprintf(stderr, "RESET asked... Stop emulation\n");
687 fprintf(logfile, "RESET asked... Stop emulation\n");
689 case EXCP_MACHINE_CHECK:
690 fprintf(stderr, "Machine check exeption... Stop emulation\n");
692 fprintf(logfile, "RESET asked... Stop emulation\n");
693 info.si_signo = TARGET_SIGBUS;
695 info.si_code = TARGET_BUS_OBJERR;
696 info._sifields._sigfault._addr = env->nip - 4;
697 queue_signal(info.si_signo, &info);
699 fprintf(stderr, "Invalid data memory access: 0x%08x\n", env->spr[DAR]);
701 fprintf(logfile, "Invalid data memory access: 0x%08x\n",
704 switch (env->error_code & 0xF) {
705 case EXCP_DSI_TRANSLATE:
706 info.si_signo = TARGET_SIGSEGV;
708 info.si_code = TARGET_SEGV_MAPERR;
710 case EXCP_DSI_NOTSUP:
711 case EXCP_DSI_EXTERNAL:
712 info.si_signo = TARGET_SIGILL;
714 info.si_code = TARGET_ILL_ILLADR;
717 info.si_signo = TARGET_SIGSEGV;
719 info.si_code = TARGET_SEGV_ACCERR;
722 info.si_signo = TARGET_SIGTRAP;
724 info.si_code = TARGET_TRAP_BRKPT;
727 /* Let's send a regular segfault... */
728 fprintf(stderr, "Invalid segfault errno (%02x)\n",
731 fprintf(logfile, "Invalid segfault errno (%02x)\n",
734 info.si_signo = TARGET_SIGSEGV;
736 info.si_code = TARGET_SEGV_MAPERR;
739 info._sifields._sigfault._addr = env->nip;
740 queue_signal(info.si_signo, &info);
743 fprintf(stderr, "Invalid instruction fetch\n");
745 fprintf(logfile, "Invalid instruction fetch\n");
746 switch (env->error_code) {
747 case EXCP_ISI_TRANSLATE:
748 info.si_signo = TARGET_SIGSEGV;
750 info.si_code = TARGET_SEGV_MAPERR;
753 info.si_signo = TARGET_SIGILL;
755 info.si_code = TARGET_ILL_ILLADR;
757 case EXCP_ISI_NOEXEC:
759 info.si_signo = TARGET_SIGSEGV;
761 info.si_code = TARGET_SEGV_ACCERR;
764 /* Let's send a regular segfault... */
765 fprintf(stderr, "Invalid segfault errno (%02x)\n",
768 fprintf(logfile, "Invalid segfault errno (%02x)\n",
771 info.si_signo = TARGET_SIGSEGV;
773 info.si_code = TARGET_SEGV_MAPERR;
776 info._sifields._sigfault._addr = env->nip - 4;
777 queue_signal(info.si_signo, &info);
780 /* Should not happen ! */
781 fprintf(stderr, "External interruption... Stop emulation\n");
783 fprintf(logfile, "External interruption... Stop emulation\n");
786 fprintf(stderr, "Invalid unaligned memory access\n");
788 fprintf(logfile, "Invalid unaligned memory access\n");
789 info.si_signo = TARGET_SIGBUS;
791 info.si_code = TARGET_BUS_ADRALN;
792 info._sifields._sigfault._addr = env->nip - 4;
793 queue_signal(info.si_signo, &info);
796 switch (env->error_code & ~0xF) {
798 fprintf(stderr, "Program exception\n");
800 fprintf(logfile, "Program exception\n");
802 env->fpscr[7] |= 0x8;
803 /* Finally, update FEX */
804 if ((((env->fpscr[7] & 0x3) << 3) | (env->fpscr[6] >> 1)) &
805 ((env->fpscr[1] << 1) | (env->fpscr[0] >> 3)))
806 env->fpscr[7] |= 0x4;
807 info.si_signo = TARGET_SIGFPE;
809 switch (env->error_code & 0xF) {
811 info.si_code = TARGET_FPE_FLTOVF;
814 info.si_code = TARGET_FPE_FLTUND;
818 info.si_code = TARGET_FPE_FLTDIV;
821 info.si_code = TARGET_FPE_FLTRES;
824 info.si_code = TARGET_FPE_FLTINV;
833 info.si_code = TARGET_FPE_FLTSUB;
836 fprintf(stderr, "Unknown floating point exception "
837 "(%02x)\n", env->error_code);
839 fprintf(logfile, "Unknown floating point exception "
840 "(%02x)\n", env->error_code & 0xF);
845 fprintf(stderr, "Invalid instruction\n");
847 fprintf(logfile, "Invalid instruction\n");
848 info.si_signo = TARGET_SIGILL;
850 switch (env->error_code & 0xF) {
851 case EXCP_INVAL_INVAL:
852 info.si_code = TARGET_ILL_ILLOPC;
854 case EXCP_INVAL_LSWX:
855 info.si_code = TARGET_ILL_ILLOPN;
858 info.si_code = TARGET_ILL_PRVREG;
861 info.si_code = TARGET_ILL_COPROC;
864 fprintf(stderr, "Unknown invalid operation (%02x)\n",
865 env->error_code & 0xF);
867 fprintf(logfile, "Unknown invalid operation (%02x)\n",
868 env->error_code & 0xF);
870 info.si_code = TARGET_ILL_ILLADR;
875 fprintf(stderr, "Privilege violation\n");
877 fprintf(logfile, "Privilege violation\n");
878 info.si_signo = TARGET_SIGILL;
880 switch (env->error_code & 0xF) {
882 info.si_code = TARGET_ILL_PRVOPC;
885 info.si_code = TARGET_ILL_PRVREG;
888 fprintf(stderr, "Unknown privilege violation (%02x)\n",
889 env->error_code & 0xF);
890 info.si_code = TARGET_ILL_PRVOPC;
895 fprintf(stderr, "Tried to call a TRAP\n");
897 fprintf(logfile, "Tried to call a TRAP\n");
900 /* Should not happen ! */
901 fprintf(stderr, "Unknown program exception (%02x)\n",
904 fprintf(logfile, "Unknwon program exception (%02x)\n",
909 info._sifields._sigfault._addr = env->nip - 4;
910 queue_signal(info.si_signo, &info);
913 fprintf(stderr, "No floating point allowed\n");
915 fprintf(logfile, "No floating point allowed\n");
916 info.si_signo = TARGET_SIGILL;
918 info.si_code = TARGET_ILL_COPROC;
919 info._sifields._sigfault._addr = env->nip - 4;
920 queue_signal(info.si_signo, &info);
923 /* Should not happen ! */
924 fprintf(stderr, "Decrementer exception\n");
926 fprintf(logfile, "Decrementer exception\n");
928 case EXCP_RESA: /* Implementation specific */
929 /* Should not happen ! */
930 fprintf(stderr, "RESA exception should never happen !\n");
932 fprintf(logfile, "RESA exception should never happen !\n");
934 case EXCP_RESB: /* Implementation specific */
935 /* Should not happen ! */
936 fprintf(stderr, "RESB exception should never happen !\n");
938 fprintf(logfile, "RESB exception should never happen !\n");
941 /* Do nothing: we use this to trace execution */
944 /* Should not happen ! */
945 fprintf(stderr, "Floating point assist exception\n");
947 fprintf(logfile, "Floating point assist exception\n");
950 /* We reloaded the msr, just go on */
952 fprintf(stderr, "Tried to go into supervisor mode !\n");
954 fprintf(logfile, "Tried to go into supervisor mode !\n");
959 /* We stopped because of a jump... */
962 /* Should not occur: we always are in user mode */
963 fprintf(stderr, "Return from interrupt ?\n");
965 fprintf(logfile, "Return from interrupt ?\n");
968 /* Don't know why this should ever happen... */
974 sig = gdb_handlesig (env, TARGET_SIGTRAP);
979 info.si_code = TARGET_TRAP_BRKPT;
980 queue_signal(info.si_signo, &info);
985 fprintf(stderr, "qemu: unhandled CPU exception 0x%x - aborting\n",
988 fprintf(logfile, "qemu: unhandled CPU exception 0x%02x - "
989 "0x%02x - aborting\n", trapnr, env->error_code);
993 process_pending_signals(env);
1000 printf("qemu-" TARGET_ARCH " version " QEMU_VERSION ", Copyright (c) 2003-2004 Fabrice Bellard\n"
1001 "usage: qemu-" TARGET_ARCH " [-h] [-g] [-d opts] [-L path] [-s size] program [arguments...]\n"
1002 "Linux CPU emulator (compiled for %s emulation)\n"
1004 "-h print this help\n"
1005 "-g wait gdb connection to port %d\n"
1006 "-L path set the elf interpreter prefix (default=%s)\n"
1007 "-s size set the stack size in bytes (default=%ld)\n"
1010 #ifdef USE_CODE_COPY
1011 "-no-code-copy disable code copy acceleration\n"
1013 "-d options activate log (logfile=%s)\n"
1014 "-p pagesize set the host page size to 'pagesize'\n",
1016 DEFAULT_GDBSTUB_PORT,
1023 /* XXX: currently only used for async signals (see signal.c) */
1024 CPUState *global_env;
1025 /* used only if single thread */
1026 CPUState *cpu_single_env = NULL;
1028 /* used to free thread contexts */
1029 TaskState *first_task_state;
1031 int main(int argc, char **argv)
1033 const char *filename;
1034 struct target_pt_regs regs1, *regs = ®s1;
1035 struct image_info info1, *info = &info1;
1036 TaskState ts1, *ts = &ts1;
1040 int use_gdbstub = 0;
1046 cpu_set_log_filename(DEBUG_LOGFILE);
1057 if (!strcmp(r, "-")) {
1059 } else if (!strcmp(r, "d")) {
1067 mask = cpu_str_to_log_mask(r);
1069 printf("Log items (comma separated):\n");
1070 for(item = cpu_log_items; item->mask != 0; item++) {
1071 printf("%-10s %s\n", item->name, item->help);
1076 } else if (!strcmp(r, "s")) {
1078 x86_stack_size = strtol(r, (char **)&r, 0);
1079 if (x86_stack_size <= 0)
1082 x86_stack_size *= 1024 * 1024;
1083 else if (*r == 'k' || *r == 'K')
1084 x86_stack_size *= 1024;
1085 } else if (!strcmp(r, "L")) {
1086 interp_prefix = argv[optind++];
1087 } else if (!strcmp(r, "p")) {
1088 qemu_host_page_size = atoi(argv[optind++]);
1089 if (qemu_host_page_size == 0 ||
1090 (qemu_host_page_size & (qemu_host_page_size - 1)) != 0) {
1091 fprintf(stderr, "page size must be a power of two\n");
1094 } else if (!strcmp(r, "g")) {
1097 #ifdef USE_CODE_COPY
1098 if (!strcmp(r, "no-code-copy")) {
1099 code_copy_enabled = 0;
1108 filename = argv[optind];
1111 memset(regs, 0, sizeof(struct target_pt_regs));
1113 /* Zero out image_info */
1114 memset(info, 0, sizeof(struct image_info));
1116 /* Scan interp_prefix dir for replacement files. */
1117 init_paths(interp_prefix);
1119 /* NOTE: we need to init the CPU at this stage to get
1120 qemu_host_page_size */
1123 if (elf_exec(filename, argv+optind, environ, regs, info) != 0) {
1124 printf("Error loading %s\n", filename);
1131 fprintf(logfile, "start_brk 0x%08lx\n" , info->start_brk);
1132 fprintf(logfile, "end_code 0x%08lx\n" , info->end_code);
1133 fprintf(logfile, "start_code 0x%08lx\n" , info->start_code);
1134 fprintf(logfile, "end_data 0x%08lx\n" , info->end_data);
1135 fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack);
1136 fprintf(logfile, "brk 0x%08lx\n" , info->brk);
1137 fprintf(logfile, "entry 0x%08lx\n" , info->entry);
1140 target_set_brk((char *)info->brk);
1146 /* build Task State */
1147 memset(ts, 0, sizeof(TaskState));
1150 env->user_mode_only = 1;
1152 #if defined(TARGET_I386)
1153 cpu_x86_set_cpl(env, 3);
1155 env->cr[0] = CR0_PG_MASK | CR0_WP_MASK | CR0_PE_MASK;
1156 env->hflags |= HF_PE_MASK;
1157 if (env->cpuid_features & CPUID_SSE) {
1158 env->cr[4] |= CR4_OSFXSR_MASK;
1159 env->hflags |= HF_OSFXSR_MASK;
1162 /* flags setup : we activate the IRQs by default as in user mode */
1163 env->eflags |= IF_MASK;
1165 /* linux register setup */
1166 env->regs[R_EAX] = regs->eax;
1167 env->regs[R_EBX] = regs->ebx;
1168 env->regs[R_ECX] = regs->ecx;
1169 env->regs[R_EDX] = regs->edx;
1170 env->regs[R_ESI] = regs->esi;
1171 env->regs[R_EDI] = regs->edi;
1172 env->regs[R_EBP] = regs->ebp;
1173 env->regs[R_ESP] = regs->esp;
1174 env->eip = regs->eip;
1176 /* linux interrupt setup */
1177 env->idt.base = (long)idt_table;
1178 env->idt.limit = sizeof(idt_table) - 1;
1201 /* linux segment setup */
1202 env->gdt.base = (long)gdt_table;
1203 env->gdt.limit = sizeof(gdt_table) - 1;
1204 write_dt(&gdt_table[__USER_CS >> 3], 0, 0xfffff,
1205 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
1206 (3 << DESC_DPL_SHIFT) | (0xa << DESC_TYPE_SHIFT));
1207 write_dt(&gdt_table[__USER_DS >> 3], 0, 0xfffff,
1208 DESC_G_MASK | DESC_B_MASK | DESC_P_MASK | DESC_S_MASK |
1209 (3 << DESC_DPL_SHIFT) | (0x2 << DESC_TYPE_SHIFT));
1210 cpu_x86_load_seg(env, R_CS, __USER_CS);
1211 cpu_x86_load_seg(env, R_DS, __USER_DS);
1212 cpu_x86_load_seg(env, R_ES, __USER_DS);
1213 cpu_x86_load_seg(env, R_SS, __USER_DS);
1214 cpu_x86_load_seg(env, R_FS, __USER_DS);
1215 cpu_x86_load_seg(env, R_GS, __USER_DS);
1217 #elif defined(TARGET_ARM)
1220 for(i = 0; i < 16; i++) {
1221 env->regs[i] = regs->uregs[i];
1223 env->cpsr = regs->uregs[16];
1224 ts->stack_base = info->start_stack;
1225 ts->heap_base = info->brk;
1226 /* This will be filled in on the first SYS_HEAPINFO call. */
1229 #elif defined(TARGET_SPARC)
1233 env->npc = regs->npc;
1235 for(i = 0; i < 8; i++)
1236 env->gregs[i] = regs->u_regs[i];
1237 for(i = 0; i < 8; i++)
1238 env->regwptr[i] = regs->u_regs[i + 8];
1240 #elif defined(TARGET_PPC)
1243 for (i = 0; i < 32; i++) {
1244 if (i != 12 && i != 6 && i != 13)
1245 env->msr[i] = (regs->msr >> i) & 1;
1247 env->nip = regs->nip;
1248 for(i = 0; i < 32; i++) {
1249 env->gpr[i] = regs->gpr[i];
1253 #error unsupported target CPU
1257 gdbserver_start (DEFAULT_GDBSTUB_PORT);
1258 gdb_handlesig(env, 0);