blob: e277668d62e25c1d24eae2fb891c610eebee0286 [file] [log] [blame]
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +00001#include "defs.h"
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +00002
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +00003#include "xlat/kexec_load_flags.h"
Dmitry V. Levin0ed617b2014-04-25 23:30:54 +00004#include "xlat/kexec_arch_values.h"
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +00005
6#ifndef KEXEC_ARCH_MASK
7# define KEXEC_ARCH_MASK 0xffff0000
8#endif
9#ifndef KEXEC_SEGMENT_MAX
10# define KEXEC_SEGMENT_MAX 16
11#endif
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000012
13static void
14print_kexec_segments(struct tcb *tcp, unsigned long addr, unsigned long len)
15{
16#if SUPPORTED_PERSONALITIES > 1
17 union {
18 struct { u_int32_t buf, bufsz, mem, memsz; } seg32;
19 struct { u_int64_t buf, bufsz, mem, memsz; } seg64;
20 } seg;
21# define sizeof_seg \
22 (current_wordsize == 4 ? sizeof(seg.seg32) : sizeof(seg.seg64))
23# define seg_buf \
24 (current_wordsize == 4 ? (uint64_t) seg.seg32.buf : seg.seg64.buf)
25# define seg_bufsz \
26 (current_wordsize == 4 ? (uint64_t) seg.seg32.bufsz : seg.seg64.bufsz)
27# define seg_mem \
28 (current_wordsize == 4 ? (uint64_t) seg.seg32.mem : seg.seg64.mem)
29# define seg_memsz \
30 (current_wordsize == 4 ? (uint64_t) seg.seg32.memsz : seg.seg64.memsz)
31#else
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +000032 struct {
33 void *buf;
34 size_t bufsz;
35 void *mem;
36 size_t memsz;
37 } seg;
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000038# define sizeof_seg sizeof(seg)
Dmitry V. Levin900ec1b2014-02-06 21:13:36 +000039# define seg_buf seg.buf
40# define seg_bufsz seg.bufsz
41# define seg_mem seg.mem
42# define seg_memsz seg.memsz
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000043#endif
44 unsigned int i, failed;
45
46 if (!len) {
47 tprints("[]");
48 return;
49 }
50
51 if (len > KEXEC_SEGMENT_MAX) {
52 tprintf("%#lx", addr);
53 return;
54 }
55
56 failed = 0;
57 tprints("[");
58 for (i = 0; i < len; ++i) {
59 if (i)
60 tprints(", ");
61 if (umoven(tcp, addr + i * sizeof_seg, sizeof_seg,
62 (char *) &seg) < 0) {
63 tprints("?");
64 failed = 1;
65 break;
66 }
67 tprintf("{%#lx, %lu, %#lx, %lu}",
68 (long) seg_buf, (unsigned long) seg_bufsz,
69 (long) seg_mem, (unsigned long) seg_memsz);
70 }
71 tprints("]");
72 if (failed)
73 tprintf(" %#lx", addr);
74}
75
76int
77sys_kexec_load(struct tcb *tcp)
78{
79 unsigned long n;
80
81 if (exiting(tcp))
82 return 0;
83
84 /* entry, nr_segments */
85 tprintf("%#lx, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
86
87 /* segments */
88 print_kexec_segments(tcp, tcp->u_arg[2], tcp->u_arg[1]);
89 tprints(", ");
90
91 /* flags */
92 n = tcp->u_arg[3];
93 printxval(kexec_arch_values, n & KEXEC_ARCH_MASK, "KEXEC_ARCH_???");
94 n &= ~KEXEC_ARCH_MASK;
95 if (n) {
96 tprints("|");
Dmitry V. Levinff6a55d2015-02-19 21:16:45 +000097 printflags(kexec_load_flags, n, "KEXEC_???");
Dmitry V. Levin90aa9f42014-02-05 13:48:26 +000098 }
99
100 return 0;
101}