blob: 6bec51c9837581d60f3b73cc32c094346840f90e [file] [log] [blame]
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +00001#include "defs.h"
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +00002
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +00003#include "xlat/kexec_load_flags.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +00004#include "xlat/kexec_arch_values.h"
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +00005
6#ifndef KEXEC_ARCH_MASK
7# define KEXEC_ARCH_MASK 0xffff0000
8#endif
9#ifndef KEXEC_SEGMENT_MAX
10# define KEXEC_SEGMENT_MAX 16
11#endif
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000012
13static void
14print_kexec_segments(struct tcb *tcp, unsigned long addr, unsigned long len)
15{
16#if SUPPORTED_PERSONALITIES > 1
17 union {
18 struct { u_int32_t buf, bufsz, mem, memsz; } seg32;
19 struct { u_int64_t buf, bufsz, mem, memsz; } seg64;
20 } seg;
21# define sizeof_seg \
22 (current_wordsize == 4 ? sizeof(seg.seg32) : sizeof(seg.seg64))
23# define seg_buf \
24 (current_wordsize == 4 ? (uint64_t) seg.seg32.buf : seg.seg64.buf)
25# define seg_bufsz \
26 (current_wordsize == 4 ? (uint64_t) seg.seg32.bufsz : seg.seg64.bufsz)
27# define seg_mem \
28 (current_wordsize == 4 ? (uint64_t) seg.seg32.mem : seg.seg64.mem)
29# define seg_memsz \
30 (current_wordsize == 4 ? (uint64_t) seg.seg32.memsz : seg.seg64.memsz)
31#else
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +000032 struct {
33 void *buf;
34 size_t bufsz;
35 void *mem;
36 size_t memsz;
37 } seg;
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000038# define sizeof_seg sizeof(seg)
Dmitry V. Levin900ec1b2014-02-06 21:13:36 +000039# define seg_buf seg.buf
40# define seg_bufsz seg.bufsz
41# define seg_mem seg.mem
42# define seg_memsz seg.memsz
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000043#endif
44 unsigned int i, failed;
45
46 if (!len) {
47 tprints("[]");
48 return;
49 }
50
51 if (len > KEXEC_SEGMENT_MAX) {
52 tprintf("%#lx", addr);
53 return;
54 }
55
56 failed = 0;
57 tprints("[");
58 for (i = 0; i < len; ++i) {
59 if (i)
60 tprints(", ");
Denys Vlasenko7e69ed92015-03-21 19:50:53 +010061 if (umoven(tcp, addr + i * sizeof_seg, sizeof_seg, &seg) < 0) {
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000062 tprints("?");
63 failed = 1;
64 break;
65 }
66 tprintf("{%#lx, %lu, %#lx, %lu}",
67 (long) seg_buf, (unsigned long) seg_bufsz,
68 (long) seg_mem, (unsigned long) seg_memsz);
69 }
70 tprints("]");
71 if (failed)
72 tprintf(" %#lx", addr);
73}
74
75int
76sys_kexec_load(struct tcb *tcp)
77{
78 unsigned long n;
79
80 if (exiting(tcp))
81 return 0;
82
83 /* entry, nr_segments */
84 tprintf("%#lx, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
85
86 /* segments */
87 print_kexec_segments(tcp, tcp->u_arg[2], tcp->u_arg[1]);
88 tprints(", ");
89
90 /* flags */
91 n = tcp->u_arg[3];
92 printxval(kexec_arch_values, n & KEXEC_ARCH_MASK, "KEXEC_ARCH_???");
93 n &= ~KEXEC_ARCH_MASK;
94 if (n) {
95 tprints("|");
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +000096 printflags(kexec_load_flags, n, "KEXEC_???");
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000097 }
98
99 return 0;
100}