blob: d7c68a9cd132158eb8ad8dc6ad8c233730503fa4 [file] [log] [blame]
bellard31e31b82003-02-18 22:55:36 +00001/*
bellard3ef693a2003-03-23 20:17:16 +00002 * qemu main
bellard31e31b82003-02-18 22:55:36 +00003 *
4 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19 */
20#include <stdlib.h>
21#include <stdio.h>
22#include <stdarg.h>
bellard04369ff2003-03-20 22:33:23 +000023#include <string.h>
bellard31e31b82003-02-18 22:55:36 +000024#include <errno.h>
bellard0ecfa992003-03-03 14:32:43 +000025#include <unistd.h>
bellardf801f972003-04-07 21:31:06 +000026#if __GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 3)
27#include <sys/personality.h>
28#endif
bellard31e31b82003-02-18 22:55:36 +000029
bellard3ef693a2003-03-23 20:17:16 +000030#include "qemu.h"
bellard31e31b82003-02-18 22:55:36 +000031
bellard0ecfa992003-03-03 14:32:43 +000032#include "cpu-i386.h"
bellard31e31b82003-02-18 22:55:36 +000033
bellard3ef693a2003-03-23 20:17:16 +000034#define DEBUG_LOGFILE "/tmp/qemu.log"
bellard586314f2003-03-03 15:02:29 +000035
36FILE *logfile = NULL;
37int loglevel;
bellardd691f662003-03-24 21:58:34 +000038const char *interp_prefix = CONFIG_QEMU_PREFIX "/qemu-i386";
bellard586314f2003-03-03 15:02:29 +000039
bellardf801f972003-04-07 21:31:06 +000040#ifdef __i386__
41/* Force usage of an ELF interpreter even if it is an ELF shared
42 object ! */
43const char interp[] __attribute__((section(".interp"))) = "/lib/ld-linux.so.2";
44#endif
45
bellard9de5e442003-03-23 16:49:39 +000046/* XXX: on x86 MAP_GROWSDOWN only works if ESP <= address + 32, so
47 we allocate a bigger stack. Need a better solution, for example
48 by remapping the process stack directly at the right place */
49unsigned long x86_stack_size = 512 * 1024;
bellard31e31b82003-02-18 22:55:36 +000050unsigned long stktop;
51
52void gemu_log(const char *fmt, ...)
53{
54 va_list ap;
55
56 va_start(ap, fmt);
57 vfprintf(stderr, fmt, ap);
58 va_end(ap);
59}
60
bellard31e31b82003-02-18 22:55:36 +000061/***********************************************************/
bellard0ecfa992003-03-03 14:32:43 +000062/* CPUX86 core interface */
bellard367e86e2003-03-01 17:13:26 +000063
bellardba1c6e32003-03-03 11:58:28 +000064void cpu_x86_outb(int addr, int val)
bellard367e86e2003-03-01 17:13:26 +000065{
66 fprintf(stderr, "outb: port=0x%04x, data=%02x\n", addr, val);
67}
68
bellardba1c6e32003-03-03 11:58:28 +000069void cpu_x86_outw(int addr, int val)
bellard367e86e2003-03-01 17:13:26 +000070{
71 fprintf(stderr, "outw: port=0x%04x, data=%04x\n", addr, val);
72}
73
bellardba1c6e32003-03-03 11:58:28 +000074void cpu_x86_outl(int addr, int val)
bellard367e86e2003-03-01 17:13:26 +000075{
76 fprintf(stderr, "outl: port=0x%04x, data=%08x\n", addr, val);
77}
78
bellardba1c6e32003-03-03 11:58:28 +000079int cpu_x86_inb(int addr)
bellard367e86e2003-03-01 17:13:26 +000080{
81 fprintf(stderr, "inb: port=0x%04x\n", addr);
82 return 0;
83}
84
bellardba1c6e32003-03-03 11:58:28 +000085int cpu_x86_inw(int addr)
bellard367e86e2003-03-01 17:13:26 +000086{
87 fprintf(stderr, "inw: port=0x%04x\n", addr);
88 return 0;
89}
90
bellardba1c6e32003-03-03 11:58:28 +000091int cpu_x86_inl(int addr)
bellard367e86e2003-03-01 17:13:26 +000092{
93 fprintf(stderr, "inl: port=0x%04x\n", addr);
94 return 0;
95}
96
bellard6dbad632003-03-16 18:05:05 +000097void write_dt(void *ptr, unsigned long addr, unsigned long limit,
98 int seg32_bit)
99{
100 unsigned int e1, e2, limit_in_pages;
101 limit_in_pages = 0;
102 if (limit > 0xffff) {
103 limit = limit >> 12;
104 limit_in_pages = 1;
105 }
106 e1 = (addr << 16) | (limit & 0xffff);
107 e2 = ((addr >> 16) & 0xff) | (addr & 0xff000000) | (limit & 0x000f0000);
108 e2 |= limit_in_pages << 23; /* byte granularity */
109 e2 |= seg32_bit << 22; /* 32 bit segment */
110 stl((uint8_t *)ptr, e1);
111 stl((uint8_t *)ptr + 4, e2);
112}
113
114uint64_t gdt_table[6];
bellard31e31b82003-02-18 22:55:36 +0000115
bellard851e67a2003-03-29 16:53:14 +0000116//#define DEBUG_VM86
117
bellardbc8a22c2003-03-30 21:02:40 +0000118static inline int is_revectored(int nr, struct target_revectored_struct *bitmap)
119{
120 return (tswap32(bitmap->__map[nr >> 5]) >> (nr & 0x1f)) & 1;
121}
122
123static inline uint8_t *seg_to_linear(unsigned int seg, unsigned int reg)
124{
125 return (uint8_t *)((seg << 4) + (reg & 0xffff));
126}
127
128static inline void pushw(CPUX86State *env, int val)
129{
130 env->regs[R_ESP] = (env->regs[R_ESP] & ~0xffff) |
131 ((env->regs[R_ESP] - 2) & 0xffff);
132 *(uint16_t *)seg_to_linear(env->segs[R_SS], env->regs[R_ESP]) = val;
133}
134
135static inline unsigned int get_vflags(CPUX86State *env)
136{
137 unsigned int eflags;
138 eflags = env->eflags & ~(VM_MASK | RF_MASK | IF_MASK);
139 if (eflags & VIF_MASK)
140 eflags |= IF_MASK;
141 return eflags;
142}
143
144void save_v86_state(CPUX86State *env)
145{
146 TaskState *ts = env->opaque;
147#ifdef DEBUG_VM86
148 printf("save_v86_state\n");
149#endif
150
151 /* put the VM86 registers in the userspace register structure */
152 ts->target_v86->regs.eax = tswap32(env->regs[R_EAX]);
153 ts->target_v86->regs.ebx = tswap32(env->regs[R_EBX]);
154 ts->target_v86->regs.ecx = tswap32(env->regs[R_ECX]);
155 ts->target_v86->regs.edx = tswap32(env->regs[R_EDX]);
156 ts->target_v86->regs.esi = tswap32(env->regs[R_ESI]);
157 ts->target_v86->regs.edi = tswap32(env->regs[R_EDI]);
158 ts->target_v86->regs.ebp = tswap32(env->regs[R_EBP]);
159 ts->target_v86->regs.esp = tswap32(env->regs[R_ESP]);
160 ts->target_v86->regs.eip = tswap32(env->eip);
161 ts->target_v86->regs.cs = tswap16(env->segs[R_CS]);
162 ts->target_v86->regs.ss = tswap16(env->segs[R_SS]);
163 ts->target_v86->regs.ds = tswap16(env->segs[R_DS]);
164 ts->target_v86->regs.es = tswap16(env->segs[R_ES]);
165 ts->target_v86->regs.fs = tswap16(env->segs[R_FS]);
166 ts->target_v86->regs.gs = tswap16(env->segs[R_GS]);
167 ts->target_v86->regs.eflags = tswap32(env->eflags);
168
169 /* restore 32 bit registers */
170 env->regs[R_EAX] = ts->vm86_saved_regs.eax;
171 env->regs[R_EBX] = ts->vm86_saved_regs.ebx;
172 env->regs[R_ECX] = ts->vm86_saved_regs.ecx;
173 env->regs[R_EDX] = ts->vm86_saved_regs.edx;
174 env->regs[R_ESI] = ts->vm86_saved_regs.esi;
175 env->regs[R_EDI] = ts->vm86_saved_regs.edi;
176 env->regs[R_EBP] = ts->vm86_saved_regs.ebp;
177 env->regs[R_ESP] = ts->vm86_saved_regs.esp;
178 env->eflags = ts->vm86_saved_regs.eflags;
179 env->eip = ts->vm86_saved_regs.eip;
180
181 cpu_x86_load_seg(env, R_CS, ts->vm86_saved_regs.cs);
182 cpu_x86_load_seg(env, R_SS, ts->vm86_saved_regs.ss);
183 cpu_x86_load_seg(env, R_DS, ts->vm86_saved_regs.ds);
184 cpu_x86_load_seg(env, R_ES, ts->vm86_saved_regs.es);
185 cpu_x86_load_seg(env, R_FS, ts->vm86_saved_regs.fs);
186 cpu_x86_load_seg(env, R_GS, ts->vm86_saved_regs.gs);
187}
188
189/* return from vm86 mode to 32 bit. The vm86() syscall will return
190 'retval' */
191static inline void return_to_32bit(CPUX86State *env, int retval)
192{
193#ifdef DEBUG_VM86
194 printf("return_to_32bit: ret=0x%x\n", retval);
195#endif
196 save_v86_state(env);
197 env->regs[R_EAX] = retval;
198}
199
200/* handle VM86 interrupt (NOTE: the CPU core currently does not
201 support TSS interrupt revectoring, so this code is always executed) */
202static void do_int(CPUX86State *env, int intno)
203{
204 TaskState *ts = env->opaque;
205 uint32_t *int_ptr, segoffs;
206
207 if (env->segs[R_CS] == TARGET_BIOSSEG)
208 goto cannot_handle; /* XXX: I am not sure this is really useful */
209 if (is_revectored(intno, &ts->target_v86->int_revectored))
210 goto cannot_handle;
211 if (intno == 0x21 && is_revectored((env->regs[R_EAX] >> 8) & 0xff,
212 &ts->target_v86->int21_revectored))
213 goto cannot_handle;
214 int_ptr = (uint32_t *)(intno << 2);
215 segoffs = tswap32(*int_ptr);
216 if ((segoffs >> 16) == TARGET_BIOSSEG)
217 goto cannot_handle;
218#ifdef DEBUG_VM86
219 printf("VM86: emulating int 0x%x. CS:IP=%04x:%04x\n",
220 intno, segoffs >> 16, segoffs & 0xffff);
221#endif
222 /* save old state */
223 pushw(env, get_vflags(env));
224 pushw(env, env->segs[R_CS]);
225 pushw(env, env->eip);
226 /* goto interrupt handler */
227 env->eip = segoffs & 0xffff;
228 cpu_x86_load_seg(env, R_CS, segoffs >> 16);
229 env->eflags &= ~(VIF_MASK | TF_MASK);
230 return;
231 cannot_handle:
232#ifdef DEBUG_VM86
233 printf("VM86: return to 32 bits int 0x%x\n", intno);
234#endif
235 return_to_32bit(env, TARGET_VM86_INTx | (intno << 8));
236}
237
bellard1b6b0292003-03-22 17:31:38 +0000238void cpu_loop(struct CPUX86State *env)
239{
bellardbc8a22c2003-03-30 21:02:40 +0000240 int trapnr;
bellard9de5e442003-03-23 16:49:39 +0000241 uint8_t *pc;
242 target_siginfo_t info;
bellard851e67a2003-03-29 16:53:14 +0000243
bellard1b6b0292003-03-22 17:31:38 +0000244 for(;;) {
bellardbc8a22c2003-03-30 21:02:40 +0000245 trapnr = cpu_x86_exec(env);
bellard1b6b0292003-03-22 17:31:38 +0000246 pc = env->seg_cache[R_CS].base + env->eip;
bellardbc8a22c2003-03-30 21:02:40 +0000247 switch(trapnr) {
bellard1b6b0292003-03-22 17:31:38 +0000248 case EXCP0D_GPF:
bellard851e67a2003-03-29 16:53:14 +0000249 if (env->eflags & VM_MASK) {
bellard851e67a2003-03-29 16:53:14 +0000250#ifdef DEBUG_VM86
bellardbc8a22c2003-03-30 21:02:40 +0000251 printf("VM86 exception %04x:%08x %02x %02x\n",
252 env->segs[R_CS], env->eip, pc[0], pc[1]);
bellard851e67a2003-03-29 16:53:14 +0000253#endif
254 /* VM86 mode */
bellard851e67a2003-03-29 16:53:14 +0000255 switch(pc[0]) {
256 case 0xcd: /* int */
257 env->eip += 2;
bellardbc8a22c2003-03-30 21:02:40 +0000258 do_int(env, pc[1]);
259 break;
260 case 0x66:
261 switch(pc[1]) {
262 case 0xfb: /* sti */
263 case 0x9d: /* popf */
264 case 0xcf: /* iret */
265 env->eip += 2;
266 return_to_32bit(env, TARGET_VM86_STI);
267 break;
268 default:
269 goto vm86_gpf;
270 }
271 break;
272 case 0xfb: /* sti */
273 case 0x9d: /* popf */
274 case 0xcf: /* iret */
275 env->eip++;
276 return_to_32bit(env, TARGET_VM86_STI);
bellard851e67a2003-03-29 16:53:14 +0000277 break;
278 default:
bellardbc8a22c2003-03-30 21:02:40 +0000279 vm86_gpf:
bellard851e67a2003-03-29 16:53:14 +0000280 /* real VM86 GPF exception */
bellardbc8a22c2003-03-30 21:02:40 +0000281 return_to_32bit(env, TARGET_VM86_UNKNOWN);
bellard851e67a2003-03-29 16:53:14 +0000282 break;
283 }
bellard1b6b0292003-03-22 17:31:38 +0000284 } else {
bellard851e67a2003-03-29 16:53:14 +0000285 if (pc[0] == 0xcd && pc[1] == 0x80) {
286 /* syscall */
287 env->eip += 2;
288 env->regs[R_EAX] = do_syscall(env,
289 env->regs[R_EAX],
290 env->regs[R_EBX],
291 env->regs[R_ECX],
292 env->regs[R_EDX],
293 env->regs[R_ESI],
294 env->regs[R_EDI],
295 env->regs[R_EBP]);
296 } else {
297 /* XXX: more precise info */
298 info.si_signo = SIGSEGV;
299 info.si_errno = 0;
300 info.si_code = 0;
301 info._sifields._sigfault._addr = 0;
302 queue_signal(info.si_signo, &info);
303 }
bellard1b6b0292003-03-22 17:31:38 +0000304 }
305 break;
bellard9de5e442003-03-23 16:49:39 +0000306 case EXCP00_DIVZ:
bellardbc8a22c2003-03-30 21:02:40 +0000307 if (env->eflags & VM_MASK) {
308 do_int(env, trapnr);
309 } else {
310 /* division by zero */
311 info.si_signo = SIGFPE;
312 info.si_errno = 0;
313 info.si_code = TARGET_FPE_INTDIV;
314 info._sifields._sigfault._addr = env->eip;
315 queue_signal(info.si_signo, &info);
316 }
bellard9de5e442003-03-23 16:49:39 +0000317 break;
318 case EXCP04_INTO:
319 case EXCP05_BOUND:
bellardbc8a22c2003-03-30 21:02:40 +0000320 if (env->eflags & VM_MASK) {
321 do_int(env, trapnr);
322 } else {
323 info.si_signo = SIGSEGV;
324 info.si_errno = 0;
325 info.si_code = 0;
326 info._sifields._sigfault._addr = 0;
327 queue_signal(info.si_signo, &info);
328 }
bellard9de5e442003-03-23 16:49:39 +0000329 break;
330 case EXCP06_ILLOP:
331 info.si_signo = SIGILL;
332 info.si_errno = 0;
333 info.si_code = TARGET_ILL_ILLOPN;
334 info._sifields._sigfault._addr = env->eip;
335 queue_signal(info.si_signo, &info);
336 break;
337 case EXCP_INTERRUPT:
338 /* just indicate that signals should be handled asap */
339 break;
bellard1b6b0292003-03-22 17:31:38 +0000340 default:
bellardbc8a22c2003-03-30 21:02:40 +0000341 fprintf(stderr, "qemu: 0x%08lx: unhandled CPU exception 0x%x - aborting\n",
342 (long)pc, trapnr);
bellard1b6b0292003-03-22 17:31:38 +0000343 abort();
344 }
bellard66fb9762003-03-23 01:06:05 +0000345 process_pending_signals(env);
bellard1b6b0292003-03-22 17:31:38 +0000346 }
347}
348
bellard31e31b82003-02-18 22:55:36 +0000349void usage(void)
350{
bellard3ef693a2003-03-23 20:17:16 +0000351 printf("qemu version " QEMU_VERSION ", Copyright (c) 2003 Fabrice Bellard\n"
bellardd691f662003-03-24 21:58:34 +0000352 "usage: qemu [-h] [-d] [-L path] [-s size] program [arguments...]\n"
bellard31e31b82003-02-18 22:55:36 +0000353 "Linux x86 emulator\n"
bellardd691f662003-03-24 21:58:34 +0000354 "\n"
355 "-h print this help\n"
356 "-d activate log (logfile=%s)\n"
357 "-L path set the x86 elf interpreter prefix (default=%s)\n"
358 "-s size set the x86 stack size in bytes (default=%ld)\n",
359 DEBUG_LOGFILE,
360 interp_prefix,
361 x86_stack_size);
bellard31e31b82003-02-18 22:55:36 +0000362 exit(1);
363}
364
bellard9de5e442003-03-23 16:49:39 +0000365/* XXX: currently only used for async signals (see signal.c) */
366CPUX86State *global_env;
bellard851e67a2003-03-29 16:53:14 +0000367/* used to free thread contexts */
368TaskState *first_task_state;
bellard9de5e442003-03-23 16:49:39 +0000369
bellard31e31b82003-02-18 22:55:36 +0000370int main(int argc, char **argv)
371{
372 const char *filename;
bellard01ffc752003-02-18 23:00:51 +0000373 struct target_pt_regs regs1, *regs = &regs1;
bellard31e31b82003-02-18 22:55:36 +0000374 struct image_info info1, *info = &info1;
bellard851e67a2003-03-29 16:53:14 +0000375 TaskState ts1, *ts = &ts1;
bellard0ecfa992003-03-03 14:32:43 +0000376 CPUX86State *env;
bellard586314f2003-03-03 15:02:29 +0000377 int optind;
bellardd691f662003-03-24 21:58:34 +0000378 const char *r;
379
bellard31e31b82003-02-18 22:55:36 +0000380 if (argc <= 1)
381 usage();
bellardf801f972003-04-07 21:31:06 +0000382
383 /* Set personality to X86_LINUX. May fail on unpatched kernels:
384 if so, they need to have munged paths themselves (eg. chroot,
385 hacked ld.so, whatever). */
386 if (personality(0x11) >= 0)
387 interp_prefix = "";
388
bellard586314f2003-03-03 15:02:29 +0000389 loglevel = 0;
390 optind = 1;
bellardd691f662003-03-24 21:58:34 +0000391 for(;;) {
392 if (optind >= argc)
393 break;
394 r = argv[optind];
395 if (r[0] != '-')
396 break;
bellard586314f2003-03-03 15:02:29 +0000397 optind++;
bellardd691f662003-03-24 21:58:34 +0000398 r++;
399 if (!strcmp(r, "-")) {
400 break;
401 } else if (!strcmp(r, "d")) {
402 loglevel = 1;
403 } else if (!strcmp(r, "s")) {
404 r = argv[optind++];
405 x86_stack_size = strtol(r, (char **)&r, 0);
406 if (x86_stack_size <= 0)
407 usage();
408 if (*r == 'M')
409 x86_stack_size *= 1024 * 1024;
410 else if (*r == 'k' || *r == 'K')
411 x86_stack_size *= 1024;
412 } else if (!strcmp(r, "L")) {
413 interp_prefix = argv[optind++];
414 } else {
415 usage();
416 }
bellard586314f2003-03-03 15:02:29 +0000417 }
bellardd691f662003-03-24 21:58:34 +0000418 if (optind >= argc)
419 usage();
bellard586314f2003-03-03 15:02:29 +0000420 filename = argv[optind];
421
422 /* init debug */
423 if (loglevel) {
424 logfile = fopen(DEBUG_LOGFILE, "w");
425 if (!logfile) {
426 perror(DEBUG_LOGFILE);
427 exit(1);
428 }
429 setvbuf(logfile, NULL, _IOLBF, 0);
430 }
bellard31e31b82003-02-18 22:55:36 +0000431
432 /* Zero out regs */
bellard01ffc752003-02-18 23:00:51 +0000433 memset(regs, 0, sizeof(struct target_pt_regs));
bellard31e31b82003-02-18 22:55:36 +0000434
435 /* Zero out image_info */
436 memset(info, 0, sizeof(struct image_info));
437
bellardd691f662003-03-24 21:58:34 +0000438 if(elf_exec(interp_prefix, filename, argv+optind, environ, regs, info) != 0) {
bellard31e31b82003-02-18 22:55:36 +0000439 printf("Error loading %s\n", filename);
440 exit(1);
441 }
442
bellard4b74fe12003-03-03 23:23:09 +0000443 if (loglevel) {
444 fprintf(logfile, "start_brk 0x%08lx\n" , info->start_brk);
445 fprintf(logfile, "end_code 0x%08lx\n" , info->end_code);
446 fprintf(logfile, "start_code 0x%08lx\n" , info->start_code);
447 fprintf(logfile, "end_data 0x%08lx\n" , info->end_data);
448 fprintf(logfile, "start_stack 0x%08lx\n" , info->start_stack);
449 fprintf(logfile, "brk 0x%08lx\n" , info->brk);
450 fprintf(logfile, "esp 0x%08lx\n" , regs->esp);
451 fprintf(logfile, "eip 0x%08lx\n" , regs->eip);
452 }
bellard31e31b82003-02-18 22:55:36 +0000453
454 target_set_brk((char *)info->brk);
455 syscall_init();
bellard66fb9762003-03-23 01:06:05 +0000456 signal_init();
bellard31e31b82003-02-18 22:55:36 +0000457
bellard0ecfa992003-03-03 14:32:43 +0000458 env = cpu_x86_init();
bellard9de5e442003-03-23 16:49:39 +0000459 global_env = env;
bellard31e31b82003-02-18 22:55:36 +0000460
bellard851e67a2003-03-29 16:53:14 +0000461 /* build Task State */
462 memset(ts, 0, sizeof(TaskState));
463 env->opaque = ts;
464 ts->used = 1;
465
bellard6dbad632003-03-16 18:05:05 +0000466 /* linux register setup */
bellard0ecfa992003-03-03 14:32:43 +0000467 env->regs[R_EAX] = regs->eax;
468 env->regs[R_EBX] = regs->ebx;
469 env->regs[R_ECX] = regs->ecx;
470 env->regs[R_EDX] = regs->edx;
471 env->regs[R_ESI] = regs->esi;
472 env->regs[R_EDI] = regs->edi;
473 env->regs[R_EBP] = regs->ebp;
474 env->regs[R_ESP] = regs->esp;
bellarddab2ed92003-03-22 15:23:14 +0000475 env->eip = regs->eip;
bellard31e31b82003-02-18 22:55:36 +0000476
bellard6dbad632003-03-16 18:05:05 +0000477 /* linux segment setup */
478 env->gdt.base = (void *)gdt_table;
479 env->gdt.limit = sizeof(gdt_table) - 1;
480 write_dt(&gdt_table[__USER_CS >> 3], 0, 0xffffffff, 1);
481 write_dt(&gdt_table[__USER_DS >> 3], 0, 0xffffffff, 1);
482 cpu_x86_load_seg(env, R_CS, __USER_CS);
483 cpu_x86_load_seg(env, R_DS, __USER_DS);
484 cpu_x86_load_seg(env, R_ES, __USER_DS);
485 cpu_x86_load_seg(env, R_SS, __USER_DS);
486 cpu_x86_load_seg(env, R_FS, __USER_DS);
487 cpu_x86_load_seg(env, R_GS, __USER_DS);
bellard31e31b82003-02-18 22:55:36 +0000488
bellard1b6b0292003-03-22 17:31:38 +0000489 cpu_loop(env);
490 /* never exits */
bellard31e31b82003-02-18 22:55:36 +0000491 return 0;
492}