]> git.ipfire.org Git - thirdparty/qemu.git/blame - disas.c
Update version for 2.8.1.1 release
[thirdparty/qemu.git] / disas.c
CommitLineData
b9adb4a6 1/* General "disassemble this chunk" code. Used for debugging. */
d38ea87a 2#include "qemu/osdep.h"
37b9de46 3#include "qemu-common.h"
76cad711 4#include "disas/bfd.h"
b9adb4a6
FB
5#include "elf.h"
6
c6105c0a 7#include "cpu.h"
76cad711 8#include "disas/disas.h"
c6105c0a 9
f4359b9f
BS
10typedef struct CPUDebug {
11 struct disassemble_info info;
d49190c4 12 CPUState *cpu;
f4359b9f
BS
13} CPUDebug;
14
b9adb4a6 15/* Filled in by elfload.c. Simplistic, but will do for now. */
e80cfcfc 16struct syminfo *syminfos = NULL;
b9adb4a6 17
aa0aa4fa
FB
18/* Get LENGTH bytes from info's buffer, at target address memaddr.
19 Transfer them to myaddr. */
20int
3a742b76
PB
21buffer_read_memory(bfd_vma memaddr, bfd_byte *myaddr, int length,
22 struct disassemble_info *info)
aa0aa4fa 23{
c6105c0a
FB
24 if (memaddr < info->buffer_vma
25 || memaddr + length > info->buffer_vma + info->buffer_length)
26 /* Out of bounds. Use EIO because GDB uses it. */
27 return EIO;
28 memcpy (myaddr, info->buffer + (memaddr - info->buffer_vma), length);
29 return 0;
aa0aa4fa
FB
30}
31
c6105c0a
FB
32/* Get LENGTH bytes from info's buffer, at target address memaddr.
33 Transfer them to myaddr. */
34static int
c27004ec
FB
35target_read_memory (bfd_vma memaddr,
36 bfd_byte *myaddr,
37 int length,
38 struct disassemble_info *info)
c6105c0a 39{
f4359b9f
BS
40 CPUDebug *s = container_of(info, CPUDebug, info);
41
d49190c4 42 cpu_memory_rw_debug(s->cpu, memaddr, myaddr, length, 0);
c6105c0a
FB
43 return 0;
44}
c6105c0a 45
aa0aa4fa
FB
46/* Print an error message. We can assume that this is in response to
47 an error return from buffer_read_memory. */
48void
3a742b76 49perror_memory (int status, bfd_vma memaddr, struct disassemble_info *info)
aa0aa4fa
FB
50{
51 if (status != EIO)
52 /* Can't happen. */
53 (*info->fprintf_func) (info->stream, "Unknown error %d\n", status);
54 else
55 /* Actually, address between memaddr and memaddr + len was
56 out of bounds. */
57 (*info->fprintf_func) (info->stream,
26a76461 58 "Address 0x%" PRIx64 " is out of bounds.\n", memaddr);
aa0aa4fa
FB
59}
60
a31f0531 61/* This could be in a separate file, to save minuscule amounts of space
aa0aa4fa
FB
62 in statically linked executables. */
63
64/* Just print the address is hex. This is included for completeness even
65 though both GDB and objdump provide their own (to print symbolic
66 addresses). */
67
68void
3a742b76 69generic_print_address (bfd_vma addr, struct disassemble_info *info)
aa0aa4fa 70{
26a76461 71 (*info->fprintf_func) (info->stream, "0x%" PRIx64, addr);
aa0aa4fa
FB
72}
73
636bd289
PM
74/* Print address in hex, truncated to the width of a host virtual address. */
75static void
76generic_print_host_address(bfd_vma addr, struct disassemble_info *info)
77{
78 uint64_t mask = ~0ULL >> (64 - (sizeof(void *) * 8));
79 generic_print_address(addr & mask, info);
80}
81
aa0aa4fa
FB
82/* Just return the given address. */
83
84int
3a742b76 85generic_symbol_at_address (bfd_vma addr, struct disassemble_info *info)
aa0aa4fa
FB
86{
87 return 1;
88}
89
903ec55c
AJ
90bfd_vma bfd_getl64 (const bfd_byte *addr)
91{
92 unsigned long long v;
93
94 v = (unsigned long long) addr[0];
95 v |= (unsigned long long) addr[1] << 8;
96 v |= (unsigned long long) addr[2] << 16;
97 v |= (unsigned long long) addr[3] << 24;
98 v |= (unsigned long long) addr[4] << 32;
99 v |= (unsigned long long) addr[5] << 40;
100 v |= (unsigned long long) addr[6] << 48;
101 v |= (unsigned long long) addr[7] << 56;
102 return (bfd_vma) v;
103}
104
aa0aa4fa
FB
105bfd_vma bfd_getl32 (const bfd_byte *addr)
106{
107 unsigned long v;
108
109 v = (unsigned long) addr[0];
110 v |= (unsigned long) addr[1] << 8;
111 v |= (unsigned long) addr[2] << 16;
112 v |= (unsigned long) addr[3] << 24;
113 return (bfd_vma) v;
114}
115
116bfd_vma bfd_getb32 (const bfd_byte *addr)
117{
118 unsigned long v;
119
120 v = (unsigned long) addr[0] << 24;
121 v |= (unsigned long) addr[1] << 16;
122 v |= (unsigned long) addr[2] << 8;
123 v |= (unsigned long) addr[3];
124 return (bfd_vma) v;
125}
126
6af0bf9c
FB
127bfd_vma bfd_getl16 (const bfd_byte *addr)
128{
129 unsigned long v;
130
131 v = (unsigned long) addr[0];
132 v |= (unsigned long) addr[1] << 8;
133 return (bfd_vma) v;
134}
135
136bfd_vma bfd_getb16 (const bfd_byte *addr)
137{
138 unsigned long v;
139
140 v = (unsigned long) addr[0] << 24;
141 v |= (unsigned long) addr[1] << 16;
142 return (bfd_vma) v;
143}
144
c46ffd57
RH
145static int print_insn_objdump(bfd_vma pc, disassemble_info *info,
146 const char *prefix)
147{
148 int i, n = info->buffer_length;
149 uint8_t *buf = g_malloc(n);
150
151 info->read_memory_func(pc, buf, n, info);
152
153 for (i = 0; i < n; ++i) {
154 if (i % 32 == 0) {
155 info->fprintf_func(info->stream, "\n%s: ", prefix);
156 }
157 info->fprintf_func(info->stream, "%02x", buf[i]);
158 }
159
160 g_free(buf);
161 return n;
162}
163
164static int print_insn_od_host(bfd_vma pc, disassemble_info *info)
165{
166 return print_insn_objdump(pc, info, "OBJD-H");
167}
168
169static int print_insn_od_target(bfd_vma pc, disassemble_info *info)
170{
171 return print_insn_objdump(pc, info, "OBJD-T");
172}
173
e91c8a77 174/* Disassemble this for me please... (debugging). 'flags' has the following
c2d551ff 175 values:
e99722f6 176 i386 - 1 means 16 bit code, 2 means 64 bit code
e13951f8
TM
177 ppc - bits 0:15 specify (optionally) the machine instruction set;
178 bit 16 indicates little endian.
c2d551ff
FB
179 other targets - unused
180 */
d49190c4 181void target_disas(FILE *out, CPUState *cpu, target_ulong code,
f4359b9f 182 target_ulong size, int flags)
b9adb4a6 183{
37b9de46 184 CPUClass *cc = CPU_GET_CLASS(cpu);
c27004ec 185 target_ulong pc;
b9adb4a6 186 int count;
f4359b9f 187 CPUDebug s;
b9adb4a6 188
f4359b9f 189 INIT_DISASSEMBLE_INFO(s.info, out, fprintf);
b9adb4a6 190
d49190c4 191 s.cpu = cpu;
f4359b9f
BS
192 s.info.read_memory_func = target_read_memory;
193 s.info.buffer_vma = code;
194 s.info.buffer_length = size;
9504c544 195 s.info.print_address_func = generic_print_address;
c27004ec
FB
196
197#ifdef TARGET_WORDS_BIGENDIAN
f4359b9f 198 s.info.endian = BFD_ENDIAN_BIG;
c27004ec 199#else
f4359b9f 200 s.info.endian = BFD_ENDIAN_LITTLE;
c27004ec 201#endif
37b9de46
PC
202
203 if (cc->disas_set_info) {
204 cc->disas_set_info(cpu, &s.info);
205 }
206
c27004ec 207#if defined(TARGET_I386)
f4359b9f
BS
208 if (flags == 2) {
209 s.info.mach = bfd_mach_x86_64;
210 } else if (flags == 1) {
211 s.info.mach = bfd_mach_i386_i8086;
212 } else {
213 s.info.mach = bfd_mach_i386_i386;
214 }
2de295c5 215 s.info.print_insn = print_insn_i386;
c27004ec 216#elif defined(TARGET_PPC)
e13951f8 217 if ((flags >> 16) & 1) {
f4359b9f
BS
218 s.info.endian = BFD_ENDIAN_LITTLE;
219 }
237c0af0 220 if (flags & 0xFFFF) {
e13951f8 221 /* If we have a precise definition of the instruction set, use it. */
f4359b9f 222 s.info.mach = flags & 0xFFFF;
237c0af0 223 } else {
a2458627 224#ifdef TARGET_PPC64
f4359b9f 225 s.info.mach = bfd_mach_ppc64;
a2458627 226#else
f4359b9f 227 s.info.mach = bfd_mach_ppc;
a2458627 228#endif
237c0af0 229 }
88770fec 230 s.info.disassembler_options = (char *)"any";
2de295c5 231 s.info.print_insn = print_insn_ppc;
c6105c0a 232#endif
2de295c5
PC
233 if (s.info.print_insn == NULL) {
234 s.info.print_insn = print_insn_od_target;
c46ffd57 235 }
c6105c0a 236
7e000c2e 237 for (pc = code; size > 0; pc += count, size -= count) {
fa15e030 238 fprintf(out, "0x" TARGET_FMT_lx ": ", pc);
2de295c5 239 count = s.info.print_insn(pc, &s.info);
c27004ec
FB
240#if 0
241 {
242 int i;
243 uint8_t b;
244 fprintf(out, " {");
245 for(i = 0; i < count; i++) {
f4359b9f 246 target_read_memory(pc + i, &b, 1, &s.info);
c27004ec
FB
247 fprintf(out, " %02x", b);
248 }
249 fprintf(out, " }");
250 }
251#endif
252 fprintf(out, "\n");
253 if (count < 0)
254 break;
754d00ae 255 if (size < count) {
256 fprintf(out,
257 "Disassembler disagrees with translator over instruction "
258 "decoding\n"
259 "Please report this to qemu-devel@nongnu.org\n");
260 break;
261 }
c27004ec
FB
262 }
263}
264
265/* Disassemble this for me please... (debugging). */
266void disas(FILE *out, void *code, unsigned long size)
267{
b0b0f1c9 268 uintptr_t pc;
c27004ec 269 int count;
f4359b9f 270 CPUDebug s;
c46ffd57 271 int (*print_insn)(bfd_vma pc, disassemble_info *info) = NULL;
c27004ec 272
f4359b9f
BS
273 INIT_DISASSEMBLE_INFO(s.info, out, fprintf);
274 s.info.print_address_func = generic_print_host_address;
c27004ec 275
f4359b9f
BS
276 s.info.buffer = code;
277 s.info.buffer_vma = (uintptr_t)code;
278 s.info.buffer_length = size;
b9adb4a6 279
e2542fe2 280#ifdef HOST_WORDS_BIGENDIAN
f4359b9f 281 s.info.endian = BFD_ENDIAN_BIG;
b9adb4a6 282#else
f4359b9f 283 s.info.endian = BFD_ENDIAN_LITTLE;
b9adb4a6 284#endif
5826e519
SW
285#if defined(CONFIG_TCG_INTERPRETER)
286 print_insn = print_insn_tci;
287#elif defined(__i386__)
f4359b9f 288 s.info.mach = bfd_mach_i386_i386;
c27004ec 289 print_insn = print_insn_i386;
bc51c5c9 290#elif defined(__x86_64__)
f4359b9f 291 s.info.mach = bfd_mach_x86_64;
c27004ec 292 print_insn = print_insn_i386;
e58ffeb3 293#elif defined(_ARCH_PPC)
66d4f6a3 294 s.info.disassembler_options = (char *)"any";
c27004ec 295 print_insn = print_insn_ppc;
999b53ec
CF
296#elif defined(__aarch64__) && defined(CONFIG_ARM_A64_DIS)
297 print_insn = print_insn_arm_a64;
a993ba85 298#elif defined(__alpha__)
c27004ec 299 print_insn = print_insn_alpha;
aa0aa4fa 300#elif defined(__sparc__)
c27004ec 301 print_insn = print_insn_sparc;
f4359b9f 302 s.info.mach = bfd_mach_sparc_v9b;
5fafdf24 303#elif defined(__arm__)
c27004ec 304 print_insn = print_insn_arm;
6af0bf9c
FB
305#elif defined(__MIPSEB__)
306 print_insn = print_insn_big_mips;
307#elif defined(__MIPSEL__)
308 print_insn = print_insn_little_mips;
48024e4a
FB
309#elif defined(__m68k__)
310 print_insn = print_insn_m68k;
8f860bb8
TS
311#elif defined(__s390__)
312 print_insn = print_insn_s390;
903ec55c
AJ
313#elif defined(__ia64__)
314 print_insn = print_insn_ia64;
b9adb4a6 315#endif
c46ffd57
RH
316 if (print_insn == NULL) {
317 print_insn = print_insn_od_host;
318 }
b0b0f1c9
SW
319 for (pc = (uintptr_t)code; size > 0; pc += count, size -= count) {
320 fprintf(out, "0x%08" PRIxPTR ": ", pc);
f4359b9f 321 count = print_insn(pc, &s.info);
b9adb4a6
FB
322 fprintf(out, "\n");
323 if (count < 0)
324 break;
325 }
326}
327
328/* Look up symbol for debugging purpose. Returns "" if unknown. */
c27004ec 329const char *lookup_symbol(target_ulong orig_addr)
b9adb4a6 330{
49918a75 331 const char *symbol = "";
e80cfcfc 332 struct syminfo *s;
3b46e624 333
e80cfcfc 334 for (s = syminfos; s; s = s->next) {
49918a75
PB
335 symbol = s->lookup_symbol(s, orig_addr);
336 if (symbol[0] != '\0') {
337 break;
338 }
b9adb4a6 339 }
49918a75
PB
340
341 return symbol;
b9adb4a6 342}
9307c4c1
FB
343
344#if !defined(CONFIG_USER_ONLY)
345
83c9089e 346#include "monitor/monitor.h"
3d2cfdf1 347
9307c4c1
FB
348static int monitor_disas_is_physical;
349
350static int
a5f1b965
BS
351monitor_read_memory (bfd_vma memaddr, bfd_byte *myaddr, int length,
352 struct disassemble_info *info)
9307c4c1 353{
f4359b9f
BS
354 CPUDebug *s = container_of(info, CPUDebug, info);
355
9307c4c1 356 if (monitor_disas_is_physical) {
54f7b4a3 357 cpu_physical_memory_read(memaddr, myaddr, length);
9307c4c1 358 } else {
d49190c4 359 cpu_memory_rw_debug(s->cpu, memaddr, myaddr, length, 0);
9307c4c1
FB
360 }
361 return 0;
362}
363
1c38f843
TM
364/* Disassembler for the monitor.
365 See target_disas for a description of flags. */
d49190c4 366void monitor_disas(Monitor *mon, CPUState *cpu,
6a00d601 367 target_ulong pc, int nb_insn, int is_physical, int flags)
9307c4c1 368{
37b9de46 369 CPUClass *cc = CPU_GET_CLASS(cpu);
9307c4c1 370 int count, i;
f4359b9f 371 CPUDebug s;
9307c4c1 372
f4359b9f 373 INIT_DISASSEMBLE_INFO(s.info, (FILE *)mon, monitor_fprintf);
9307c4c1 374
d49190c4 375 s.cpu = cpu;
9307c4c1 376 monitor_disas_is_physical = is_physical;
f4359b9f 377 s.info.read_memory_func = monitor_read_memory;
9504c544 378 s.info.print_address_func = generic_print_address;
9307c4c1 379
f4359b9f 380 s.info.buffer_vma = pc;
9307c4c1
FB
381
382#ifdef TARGET_WORDS_BIGENDIAN
f4359b9f 383 s.info.endian = BFD_ENDIAN_BIG;
9307c4c1 384#else
f4359b9f 385 s.info.endian = BFD_ENDIAN_LITTLE;
9307c4c1 386#endif
37b9de46
PC
387
388 if (cc->disas_set_info) {
389 cc->disas_set_info(cpu, &s.info);
390 }
391
9307c4c1 392#if defined(TARGET_I386)
f4359b9f
BS
393 if (flags == 2) {
394 s.info.mach = bfd_mach_x86_64;
395 } else if (flags == 1) {
396 s.info.mach = bfd_mach_i386_i8086;
397 } else {
398 s.info.mach = bfd_mach_i386_i386;
399 }
2de295c5 400 s.info.print_insn = print_insn_i386;
9307c4c1 401#elif defined(TARGET_PPC)
1c38f843
TM
402 if (flags & 0xFFFF) {
403 /* If we have a precise definition of the instruction set, use it. */
404 s.info.mach = flags & 0xFFFF;
405 } else {
a2458627 406#ifdef TARGET_PPC64
1c38f843 407 s.info.mach = bfd_mach_ppc64;
a2458627 408#else
1c38f843 409 s.info.mach = bfd_mach_ppc;
a2458627 410#endif
1c38f843
TM
411 }
412 if ((flags >> 16) & 1) {
413 s.info.endian = BFD_ENDIAN_LITTLE;
414 }
2de295c5 415 s.info.print_insn = print_insn_ppc;
9307c4c1 416#endif
37b9de46
PC
417 if (!s.info.print_insn) {
418 monitor_printf(mon, "0x" TARGET_FMT_lx
419 ": Asm output not supported on this arch\n", pc);
420 return;
421 }
9307c4c1
FB
422
423 for(i = 0; i < nb_insn; i++) {
376253ec 424 monitor_printf(mon, "0x" TARGET_FMT_lx ": ", pc);
2de295c5 425 count = s.info.print_insn(pc, &s.info);
376253ec 426 monitor_printf(mon, "\n");
9307c4c1
FB
427 if (count < 0)
428 break;
429 pc += count;
430 }
431}
432#endif