target_siginfo_t info;
for(;;) {
+ cpu_exec_start(cs);
trapnr = cpu_x86_exec(env);
+ cpu_exec_end(cs);
switch(trapnr) {
case 0x80:
/* linux syscall from int $0x80 */
target_siginfo_t info;
while (1) {
+ cpu_exec_start(cs);
trapnr = cpu_sparc_exec (env);
+ cpu_exec_end(cs);
/* Compute PSR before exposing state. */
if (env->cc_op != CC_OP_FLAGS) {
int trapnr, gdbsig;
for (;;) {
+ cpu_exec_start(cs);
trapnr = cpu_exec(env);
+ cpu_exec_end(cs);
gdbsig = 0;
switch (trapnr) {
target_siginfo_t info;
while (1) {
+ cpu_exec_start(cs);
trapnr = cpu_sh4_exec (env);
+ cpu_exec_end(cs);
switch (trapnr) {
case 0x160:
target_siginfo_t info;
while (1) {
+ cpu_exec_start(cs);
trapnr = cpu_cris_exec (env);
+ cpu_exec_end(cs);
switch (trapnr) {
case 0xaa:
{
target_siginfo_t info;
while (1) {
+ cpu_exec_start(cs);
trapnr = cpu_mb_exec (env);
+ cpu_exec_end(cs);
switch (trapnr) {
case 0xaa:
{
TaskState *ts = cs->opaque;
for(;;) {
+ cpu_exec_start(cs);
trapnr = cpu_m68k_exec(env);
+ cpu_exec_end(cs);
switch(trapnr) {
case EXCP_ILLEGAL:
{
abi_long sysret;
while (1) {
+ cpu_exec_start(cs);
trapnr = cpu_alpha_exec (env);
+ cpu_exec_end(cs);
/* All of the traps imply a transition through PALcode, which
implies an REI instruction has been executed. Which means
target_ulong addr;
while (1) {
+ cpu_exec_start(cs);
trapnr = cpu_s390x_exec(env);
+ cpu_exec_end(cs);
switch (trapnr) {
case EXCP_INTERRUPT:
/* Just indicate that signals should be handled asap. */