blob: 2331c419d86b8f68acfde96c1dec18f8f9dbaace [file] [log] [blame]
bellard31e31b82003-02-18 22:55:36 +00001#ifndef GEMU_H
2#define GEMU_H
3
4#include "thunk.h"
5
bellard9de5e442003-03-23 16:49:39 +00006#include <signal.h>
bellardedf779f2004-02-22 13:40:13 +00007#include <string.h>
bellard9de5e442003-03-23 16:49:39 +00008#include "syscall_defs.h"
9
bellard6180a182003-09-30 21:04:53 +000010#include "cpu.h"
11#include "syscall.h"
bellard66fb9762003-03-23 01:06:05 +000012
bellard31e31b82003-02-18 22:55:36 +000013/* This struct is used to hold certain information about the image.
14 * Basically, it replicates in user space what would be certain
15 * task_struct fields in the kernel
16 */
17struct image_info {
18 unsigned long start_code;
19 unsigned long end_code;
20 unsigned long end_data;
21 unsigned long start_brk;
22 unsigned long brk;
23 unsigned long start_mmap;
24 unsigned long mmap;
25 unsigned long rss;
26 unsigned long start_stack;
27 unsigned long arg_start;
28 unsigned long arg_end;
29 unsigned long env_start;
30 unsigned long env_end;
31 unsigned long entry;
32 int personality;
33};
34
bellardb346ff42003-06-15 20:05:50 +000035#ifdef TARGET_I386
bellard851e67a2003-03-29 16:53:14 +000036/* Information about the current linux thread */
37struct vm86_saved_state {
38 uint32_t eax; /* return code */
39 uint32_t ebx;
40 uint32_t ecx;
41 uint32_t edx;
42 uint32_t esi;
43 uint32_t edi;
44 uint32_t ebp;
45 uint32_t esp;
46 uint32_t eflags;
47 uint32_t eip;
48 uint16_t cs, ss, ds, es, fs, gs;
49};
bellardb346ff42003-06-15 20:05:50 +000050#endif
bellard851e67a2003-03-29 16:53:14 +000051
bellard28c4f362004-02-16 21:47:43 +000052#ifdef TARGET_ARM
53/* FPU emulator */
54#include "nwfpe/fpa11.h"
55#undef put_user
56#undef get_user
57#endif
58
bellard851e67a2003-03-29 16:53:14 +000059/* NOTE: we force a big alignment so that the stack stored after is
60 aligned too */
61typedef struct TaskState {
62 struct TaskState *next;
bellard28c4f362004-02-16 21:47:43 +000063#ifdef TARGET_ARM
64 /* FPA state */
65 FPA11 fpa;
66#endif
bellardb346ff42003-06-15 20:05:50 +000067#ifdef TARGET_I386
bellard851e67a2003-03-29 16:53:14 +000068 struct target_vm86plus_struct *target_v86;
69 struct vm86_saved_state vm86_saved_regs;
bellardb333af02003-05-14 21:48:51 +000070 struct target_vm86plus_struct vm86plus;
bellard631271d2003-05-10 13:14:52 +000071 uint32_t v86flags;
72 uint32_t v86mask;
bellardb346ff42003-06-15 20:05:50 +000073#endif
bellard851e67a2003-03-29 16:53:14 +000074 int used; /* non zero if used */
75 uint8_t stack[0];
76} __attribute__((aligned(16))) TaskState;
77
78extern TaskState *first_task_state;
79
bellard32ce6332003-04-11 00:16:16 +000080int elf_exec(const char * filename, char ** argv, char ** envp,
bellard01ffc752003-02-18 23:00:51 +000081 struct target_pt_regs * regs, struct image_info *infop);
bellard31e31b82003-02-18 22:55:36 +000082
83void target_set_brk(char *new_brk);
84void syscall_init(void);
bellard6dbad632003-03-16 18:05:05 +000085long do_syscall(void *cpu_env, int num, long arg1, long arg2, long arg3,
bellard31e31b82003-02-18 22:55:36 +000086 long arg4, long arg5, long arg6);
87void gemu_log(const char *fmt, ...) __attribute__((format(printf,1,2)));
bellardb346ff42003-06-15 20:05:50 +000088extern CPUState *global_env;
89void cpu_loop(CPUState *env);
bellard32ce6332003-04-11 00:16:16 +000090void init_paths(const char *prefix);
91const char *path(const char *pathname);
bellard6977fbf2003-04-29 20:39:23 +000092
93extern int loglevel;
bellard631271d2003-05-10 13:14:52 +000094extern FILE *logfile;
95
bellardb346ff42003-06-15 20:05:50 +000096/* signal.c */
97void process_pending_signals(void *cpu_env);
98void signal_init(void);
99int queue_signal(int sig, target_siginfo_t *info);
100void host_to_target_siginfo(target_siginfo_t *tinfo, const siginfo_t *info);
101void target_to_host_siginfo(siginfo_t *info, const target_siginfo_t *tinfo);
102long do_sigreturn(CPUState *env);
103long do_rt_sigreturn(CPUState *env);
104
105#ifdef TARGET_I386
bellard631271d2003-05-10 13:14:52 +0000106/* vm86.c */
107void save_v86_state(CPUX86State *env);
bellard447db212003-05-10 15:10:36 +0000108void handle_vm86_trap(CPUX86State *env, int trapno);
bellard631271d2003-05-10 13:14:52 +0000109void handle_vm86_fault(CPUX86State *env);
110int do_vm86(CPUX86State *env, long subfunction,
111 struct target_vm86plus_struct * target_v86);
bellardb346ff42003-06-15 20:05:50 +0000112#endif
bellard631271d2003-05-10 13:14:52 +0000113
bellard54936002003-05-13 00:25:15 +0000114/* mmap.c */
115int target_mprotect(unsigned long start, unsigned long len, int prot);
116long target_mmap(unsigned long start, unsigned long len, int prot,
117 int flags, int fd, unsigned long offset);
118int target_munmap(unsigned long start, unsigned long len);
119long target_mremap(unsigned long old_addr, unsigned long old_size,
120 unsigned long new_size, unsigned long flags,
121 unsigned long new_addr);
122int target_msync(unsigned long start, unsigned long len, int flags);
123
bellardedf779f2004-02-22 13:40:13 +0000124/* user access */
125
126#define VERIFY_READ 0
127#define VERIFY_WRITE 1
128
129#define access_ok(type,addr,size) (1)
130
131#define __put_user(x,ptr)\
132({\
133 int size = sizeof(*ptr);\
134 switch(size) {\
135 case 1:\
136 stb(ptr, (typeof(*ptr))(x));\
137 break;\
138 case 2:\
139 stw(ptr, (typeof(*ptr))(x));\
140 break;\
141 case 4:\
142 stl(ptr, (typeof(*ptr))(x));\
143 break;\
144 case 8:\
145 stq(ptr, (typeof(*ptr))(x));\
146 break;\
147 default:\
148 abort();\
149 }\
150 0;\
151})
152
153#define __get_user(x, ptr) \
154({\
155 int size = sizeof(*ptr);\
156 switch(size) {\
157 case 1:\
bellardd69d1fa2004-06-19 16:57:17 +0000158 x = (typeof(*ptr))ldub((void *)ptr);\
bellardedf779f2004-02-22 13:40:13 +0000159 break;\
160 case 2:\
bellardd69d1fa2004-06-19 16:57:17 +0000161 x = (typeof(*ptr))lduw((void *)ptr);\
bellardedf779f2004-02-22 13:40:13 +0000162 break;\
163 case 4:\
bellardd69d1fa2004-06-19 16:57:17 +0000164 x = (typeof(*ptr))ldl((void *)ptr);\
bellardedf779f2004-02-22 13:40:13 +0000165 break;\
166 case 8:\
bellardd69d1fa2004-06-19 16:57:17 +0000167 x = (typeof(*ptr))ldq((void *)ptr);\
bellardedf779f2004-02-22 13:40:13 +0000168 break;\
169 default:\
170 abort();\
171 }\
172 0;\
173})
174
175static inline unsigned long __copy_to_user(void *dst, const void *src,
176 unsigned long size)
177{
178 memcpy(dst, src, size);
179 return 0;
180}
181
182static inline unsigned long __copy_from_user(void *dst, const void *src,
183 unsigned long size)
184{
185 memcpy(dst, src, size);
186 return 0;
187}
188
189static inline unsigned long __clear_user(void *dst, unsigned long size)
190{
191 memset(dst, 0, size);
192 return 0;
193}
194
195#define put_user(x,ptr)\
196({\
197 int __ret;\
198 if (access_ok(VERIFY_WRITE, ptr, sizeof(*ptr)))\
199 __ret = __put_user(x, ptr);\
200 else\
201 __ret = -EFAULT;\
202 __ret;\
203})
204
205#define get_user(x,ptr)\
206({\
207 int __ret;\
208 if (access_ok(VERIFY_READ, ptr, sizeof(*ptr)))\
209 __ret = __get_user(x, ptr);\
210 else\
211 __ret = -EFAULT;\
212 __ret;\
213})
214
215static inline unsigned long copy_to_user(void *dst, const void *src,
216 unsigned long size)
217{
218 if (access_ok(VERIFY_WRITE, dst, size))
219 return __copy_to_user(dst, src, size);
220 else
221 return size;
222}
223
224static inline unsigned long copy_from_user(void *dst, const void *src,
225 unsigned long size)
226{
227 if (access_ok(VERIFY_READ, src, size))
228 return __copy_from_user(dst, src, size);
229 else
230 return size;
231}
232
233static inline unsigned long clear_user(void *dst, unsigned long size)
234{
235 if (access_ok(VERIFY_WRITE, dst, size))
236 return __clear_user(dst, size);
237 else
238 return size;
239}
240
bellard31e31b82003-02-18 22:55:36 +0000241#endif