diff options
Diffstat (limited to 'arch/um/kernel')
-rw-r--r-- | arch/um/kernel/exitcode.c | 2 | ||||
-rw-r--r-- | arch/um/kernel/helper.c | 14 | ||||
-rw-r--r-- | arch/um/kernel/process.c | 83 | ||||
-rw-r--r-- | arch/um/kernel/process_kern.c | 2 | ||||
-rw-r--r-- | arch/um/kernel/skas/process.c | 2 | ||||
-rw-r--r-- | arch/um/kernel/skas/syscall_user.c | 4 | ||||
-rw-r--r-- | arch/um/kernel/skas/trap_user.c | 1 | ||||
-rw-r--r-- | arch/um/kernel/time_kern.c | 5 | ||||
-rw-r--r-- | arch/um/kernel/um_arch.c | 19 |
9 files changed, 84 insertions, 48 deletions
diff --git a/arch/um/kernel/exitcode.c b/arch/um/kernel/exitcode.c index 0ea87f24b36f..d21ebad666b4 100644 --- a/arch/um/kernel/exitcode.c +++ b/arch/um/kernel/exitcode.c | |||
@@ -48,7 +48,7 @@ static int make_proc_exitcode(void) | |||
48 | 48 | ||
49 | ent = create_proc_entry("exitcode", 0600, &proc_root); | 49 | ent = create_proc_entry("exitcode", 0600, &proc_root); |
50 | if(ent == NULL){ | 50 | if(ent == NULL){ |
51 | printk("make_proc_exitcode : Failed to register " | 51 | printk(KERN_WARNING "make_proc_exitcode : Failed to register " |
52 | "/proc/exitcode\n"); | 52 | "/proc/exitcode\n"); |
53 | return(0); | 53 | return(0); |
54 | } | 54 | } |
diff --git a/arch/um/kernel/helper.c b/arch/um/kernel/helper.c index 13b1f5c2f7ee..f83e1e8e2392 100644 --- a/arch/um/kernel/helper.c +++ b/arch/um/kernel/helper.c | |||
@@ -13,6 +13,7 @@ | |||
13 | #include "user.h" | 13 | #include "user.h" |
14 | #include "kern_util.h" | 14 | #include "kern_util.h" |
15 | #include "user_util.h" | 15 | #include "user_util.h" |
16 | #include "helper.h" | ||
16 | #include "os.h" | 17 | #include "os.h" |
17 | 18 | ||
18 | struct helper_data { | 19 | struct helper_data { |
@@ -149,7 +150,7 @@ int run_helper_thread(int (*proc)(void *), void *arg, unsigned int flags, | |||
149 | return(pid); | 150 | return(pid); |
150 | } | 151 | } |
151 | 152 | ||
152 | int helper_wait(int pid, int block) | 153 | int helper_wait(int pid) |
153 | { | 154 | { |
154 | int ret; | 155 | int ret; |
155 | 156 | ||
@@ -160,14 +161,3 @@ int helper_wait(int pid, int block) | |||
160 | } | 161 | } |
161 | return(ret); | 162 | return(ret); |
162 | } | 163 | } |
163 | |||
164 | /* | ||
165 | * Overrides for Emacs so that we follow Linus's tabbing style. | ||
166 | * Emacs will notice this stuff at the end of the file and automatically | ||
167 | * adjust the settings for this buffer only. This must remain at the end | ||
168 | * of the file. | ||
169 | * --------------------------------------------------------------------------- | ||
170 | * Local variables: | ||
171 | * c-file-style: "linux" | ||
172 | * End: | ||
173 | */ | ||
diff --git a/arch/um/kernel/process.c b/arch/um/kernel/process.c index c45a60e9c92d..67acd92c5322 100644 --- a/arch/um/kernel/process.c +++ b/arch/um/kernel/process.c | |||
@@ -131,7 +131,7 @@ int start_fork_tramp(void *thread_arg, unsigned long temp_stack, | |||
131 | return(arg.pid); | 131 | return(arg.pid); |
132 | } | 132 | } |
133 | 133 | ||
134 | static int ptrace_child(void) | 134 | static int ptrace_child(void *arg) |
135 | { | 135 | { |
136 | int ret; | 136 | int ret; |
137 | int pid = os_getpid(), ppid = getppid(); | 137 | int pid = os_getpid(), ppid = getppid(); |
@@ -160,16 +160,20 @@ static int ptrace_child(void) | |||
160 | _exit(ret); | 160 | _exit(ret); |
161 | } | 161 | } |
162 | 162 | ||
163 | static int start_ptraced_child(void) | 163 | static int start_ptraced_child(void **stack_out) |
164 | { | 164 | { |
165 | void *stack; | ||
166 | unsigned long sp; | ||
165 | int pid, n, status; | 167 | int pid, n, status; |
166 | 168 | ||
167 | pid = fork(); | 169 | stack = mmap(NULL, PAGE_SIZE, PROT_READ | PROT_WRITE | PROT_EXEC, |
168 | if(pid == 0) | 170 | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); |
169 | ptrace_child(); | 171 | if(stack == MAP_FAILED) |
170 | 172 | panic("check_ptrace : mmap failed, errno = %d", errno); | |
173 | sp = (unsigned long) stack + PAGE_SIZE - sizeof(void *); | ||
174 | pid = clone(ptrace_child, (void *) sp, SIGCHLD, NULL); | ||
171 | if(pid < 0) | 175 | if(pid < 0) |
172 | panic("check_ptrace : fork failed, errno = %d", errno); | 176 | panic("check_ptrace : clone failed, errno = %d", errno); |
173 | CATCH_EINTR(n = waitpid(pid, &status, WUNTRACED)); | 177 | CATCH_EINTR(n = waitpid(pid, &status, WUNTRACED)); |
174 | if(n < 0) | 178 | if(n < 0) |
175 | panic("check_ptrace : wait failed, errno = %d", errno); | 179 | panic("check_ptrace : wait failed, errno = %d", errno); |
@@ -177,6 +181,7 @@ static int start_ptraced_child(void) | |||
177 | panic("check_ptrace : expected SIGSTOP, got status = %d", | 181 | panic("check_ptrace : expected SIGSTOP, got status = %d", |
178 | status); | 182 | status); |
179 | 183 | ||
184 | *stack_out = stack; | ||
180 | return(pid); | 185 | return(pid); |
181 | } | 186 | } |
182 | 187 | ||
@@ -184,12 +189,12 @@ static int start_ptraced_child(void) | |||
184 | * just avoid using sysemu, not panic, but only if SYSEMU features are broken. | 189 | * just avoid using sysemu, not panic, but only if SYSEMU features are broken. |
185 | * So only for SYSEMU features we test mustpanic, while normal host features | 190 | * So only for SYSEMU features we test mustpanic, while normal host features |
186 | * must work anyway!*/ | 191 | * must work anyway!*/ |
187 | static int stop_ptraced_child(int pid, int exitcode, int mustexit) | 192 | static int stop_ptraced_child(int pid, void *stack, int exitcode, int mustpanic) |
188 | { | 193 | { |
189 | int status, n, ret = 0; | 194 | int status, n, ret = 0; |
190 | 195 | ||
191 | if(ptrace(PTRACE_CONT, pid, 0, 0) < 0) | 196 | if(ptrace(PTRACE_CONT, pid, 0, 0) < 0) |
192 | panic("stop_ptraced_child : ptrace failed, errno = %d", errno); | 197 | panic("check_ptrace : ptrace failed, errno = %d", errno); |
193 | CATCH_EINTR(n = waitpid(pid, &status, 0)); | 198 | CATCH_EINTR(n = waitpid(pid, &status, 0)); |
194 | if(!WIFEXITED(status) || (WEXITSTATUS(status) != exitcode)) { | 199 | if(!WIFEXITED(status) || (WEXITSTATUS(status) != exitcode)) { |
195 | int exit_with = WEXITSTATUS(status); | 200 | int exit_with = WEXITSTATUS(status); |
@@ -200,24 +205,40 @@ static int stop_ptraced_child(int pid, int exitcode, int mustexit) | |||
200 | printk("check_ptrace : child exited with exitcode %d, while " | 205 | printk("check_ptrace : child exited with exitcode %d, while " |
201 | "expecting %d; status 0x%x", exit_with, | 206 | "expecting %d; status 0x%x", exit_with, |
202 | exitcode, status); | 207 | exitcode, status); |
203 | if (mustexit) | 208 | if (mustpanic) |
204 | panic("\n"); | 209 | panic("\n"); |
205 | else | 210 | else |
206 | printk("\n"); | 211 | printk("\n"); |
207 | ret = -1; | 212 | ret = -1; |
208 | } | 213 | } |
209 | 214 | ||
215 | if(munmap(stack, PAGE_SIZE) < 0) | ||
216 | panic("check_ptrace : munmap failed, errno = %d", errno); | ||
210 | return ret; | 217 | return ret; |
211 | } | 218 | } |
212 | 219 | ||
213 | static int force_sysemu_disabled = 0; | 220 | static int force_sysemu_disabled = 0; |
214 | 221 | ||
222 | int ptrace_faultinfo = 1; | ||
223 | int proc_mm = 1; | ||
224 | |||
225 | static int __init skas0_cmd_param(char *str, int* add) | ||
226 | { | ||
227 | ptrace_faultinfo = proc_mm = 0; | ||
228 | return 0; | ||
229 | } | ||
230 | |||
215 | static int __init nosysemu_cmd_param(char *str, int* add) | 231 | static int __init nosysemu_cmd_param(char *str, int* add) |
216 | { | 232 | { |
217 | force_sysemu_disabled = 1; | 233 | force_sysemu_disabled = 1; |
218 | return 0; | 234 | return 0; |
219 | } | 235 | } |
220 | 236 | ||
237 | __uml_setup("skas0", skas0_cmd_param, | ||
238 | "skas0\n" | ||
239 | " Disables SKAS3 usage, so that SKAS0 is used, unless you \n" | ||
240 | " specify mode=tt.\n\n"); | ||
241 | |||
221 | __uml_setup("nosysemu", nosysemu_cmd_param, | 242 | __uml_setup("nosysemu", nosysemu_cmd_param, |
222 | "nosysemu\n" | 243 | "nosysemu\n" |
223 | " Turns off syscall emulation patch for ptrace (SYSEMU) on.\n" | 244 | " Turns off syscall emulation patch for ptrace (SYSEMU) on.\n" |
@@ -228,11 +249,12 @@ __uml_setup("nosysemu", nosysemu_cmd_param, | |||
228 | 249 | ||
229 | static void __init check_sysemu(void) | 250 | static void __init check_sysemu(void) |
230 | { | 251 | { |
252 | void *stack; | ||
231 | int pid, syscall, n, status, count=0; | 253 | int pid, syscall, n, status, count=0; |
232 | 254 | ||
233 | printk("Checking syscall emulation patch for ptrace..."); | 255 | printk("Checking syscall emulation patch for ptrace..."); |
234 | sysemu_supported = 0; | 256 | sysemu_supported = 0; |
235 | pid = start_ptraced_child(); | 257 | pid = start_ptraced_child(&stack); |
236 | 258 | ||
237 | if(ptrace(PTRACE_SYSEMU, pid, 0, 0) < 0) | 259 | if(ptrace(PTRACE_SYSEMU, pid, 0, 0) < 0) |
238 | goto fail; | 260 | goto fail; |
@@ -250,7 +272,7 @@ static void __init check_sysemu(void) | |||
250 | panic("check_sysemu : failed to modify system " | 272 | panic("check_sysemu : failed to modify system " |
251 | "call return, errno = %d", errno); | 273 | "call return, errno = %d", errno); |
252 | 274 | ||
253 | if (stop_ptraced_child(pid, 0, 0) < 0) | 275 | if (stop_ptraced_child(pid, stack, 0, 0) < 0) |
254 | goto fail_stopped; | 276 | goto fail_stopped; |
255 | 277 | ||
256 | sysemu_supported = 1; | 278 | sysemu_supported = 1; |
@@ -258,7 +280,7 @@ static void __init check_sysemu(void) | |||
258 | set_using_sysemu(!force_sysemu_disabled); | 280 | set_using_sysemu(!force_sysemu_disabled); |
259 | 281 | ||
260 | printk("Checking advanced syscall emulation patch for ptrace..."); | 282 | printk("Checking advanced syscall emulation patch for ptrace..."); |
261 | pid = start_ptraced_child(); | 283 | pid = start_ptraced_child(&stack); |
262 | while(1){ | 284 | while(1){ |
263 | count++; | 285 | count++; |
264 | if(ptrace(PTRACE_SYSEMU_SINGLESTEP, pid, 0, 0) < 0) | 286 | if(ptrace(PTRACE_SYSEMU_SINGLESTEP, pid, 0, 0) < 0) |
@@ -283,7 +305,7 @@ static void __init check_sysemu(void) | |||
283 | break; | 305 | break; |
284 | } | 306 | } |
285 | } | 307 | } |
286 | if (stop_ptraced_child(pid, 0, 0) < 0) | 308 | if (stop_ptraced_child(pid, stack, 0, 0) < 0) |
287 | goto fail_stopped; | 309 | goto fail_stopped; |
288 | 310 | ||
289 | sysemu_supported = 2; | 311 | sysemu_supported = 2; |
@@ -294,17 +316,18 @@ static void __init check_sysemu(void) | |||
294 | return; | 316 | return; |
295 | 317 | ||
296 | fail: | 318 | fail: |
297 | stop_ptraced_child(pid, 1, 0); | 319 | stop_ptraced_child(pid, stack, 1, 0); |
298 | fail_stopped: | 320 | fail_stopped: |
299 | printk("missing\n"); | 321 | printk("missing\n"); |
300 | } | 322 | } |
301 | 323 | ||
302 | void __init check_ptrace(void) | 324 | void __init check_ptrace(void) |
303 | { | 325 | { |
326 | void *stack; | ||
304 | int pid, syscall, n, status; | 327 | int pid, syscall, n, status; |
305 | 328 | ||
306 | printk("Checking that ptrace can change system call numbers..."); | 329 | printk("Checking that ptrace can change system call numbers..."); |
307 | pid = start_ptraced_child(); | 330 | pid = start_ptraced_child(&stack); |
308 | 331 | ||
309 | if (ptrace(PTRACE_OLDSETOPTIONS, pid, 0, (void *)PTRACE_O_TRACESYSGOOD) < 0) | 332 | if (ptrace(PTRACE_OLDSETOPTIONS, pid, 0, (void *)PTRACE_O_TRACESYSGOOD) < 0) |
310 | panic("check_ptrace: PTRACE_SETOPTIONS failed, errno = %d", errno); | 333 | panic("check_ptrace: PTRACE_SETOPTIONS failed, errno = %d", errno); |
@@ -331,7 +354,7 @@ void __init check_ptrace(void) | |||
331 | break; | 354 | break; |
332 | } | 355 | } |
333 | } | 356 | } |
334 | stop_ptraced_child(pid, 0, 1); | 357 | stop_ptraced_child(pid, stack, 0, 1); |
335 | printk("OK\n"); | 358 | printk("OK\n"); |
336 | check_sysemu(); | 359 | check_sysemu(); |
337 | } | 360 | } |
@@ -359,22 +382,22 @@ void forward_pending_sigio(int target) | |||
359 | kill(target, SIGIO); | 382 | kill(target, SIGIO); |
360 | } | 383 | } |
361 | 384 | ||
362 | int ptrace_faultinfo = 0; | ||
363 | int proc_mm = 1; | ||
364 | |||
365 | extern void *__syscall_stub_start, __syscall_stub_end; | 385 | extern void *__syscall_stub_start, __syscall_stub_end; |
366 | 386 | ||
367 | #ifdef UML_CONFIG_MODE_SKAS | 387 | #ifdef UML_CONFIG_MODE_SKAS |
388 | |||
368 | static inline void check_skas3_ptrace_support(void) | 389 | static inline void check_skas3_ptrace_support(void) |
369 | { | 390 | { |
370 | struct ptrace_faultinfo fi; | 391 | struct ptrace_faultinfo fi; |
392 | void *stack; | ||
371 | int pid, n; | 393 | int pid, n; |
372 | 394 | ||
373 | printf("Checking for the skas3 patch in the host..."); | 395 | printf("Checking for the skas3 patch in the host..."); |
374 | pid = start_ptraced_child(); | 396 | pid = start_ptraced_child(&stack); |
375 | 397 | ||
376 | n = ptrace(PTRACE_FAULTINFO, pid, 0, &fi); | 398 | n = ptrace(PTRACE_FAULTINFO, pid, 0, &fi); |
377 | if (n < 0) { | 399 | if (n < 0) { |
400 | ptrace_faultinfo = 0; | ||
378 | if(errno == EIO) | 401 | if(errno == EIO) |
379 | printf("not found\n"); | 402 | printf("not found\n"); |
380 | else { | 403 | else { |
@@ -382,12 +405,14 @@ static inline void check_skas3_ptrace_support(void) | |||
382 | } | 405 | } |
383 | } | 406 | } |
384 | else { | 407 | else { |
385 | ptrace_faultinfo = 1; | 408 | if (!ptrace_faultinfo) |
386 | printf("found\n"); | 409 | printf("found but disabled on command line\n"); |
410 | else | ||
411 | printf("found\n"); | ||
387 | } | 412 | } |
388 | 413 | ||
389 | init_registers(pid); | 414 | init_registers(pid); |
390 | stop_ptraced_child(pid, 1, 1); | 415 | stop_ptraced_child(pid, stack, 1, 1); |
391 | } | 416 | } |
392 | 417 | ||
393 | int can_do_skas(void) | 418 | int can_do_skas(void) |
@@ -396,13 +421,13 @@ int can_do_skas(void) | |||
396 | if (os_access("/proc/mm", OS_ACC_W_OK) < 0) { | 421 | if (os_access("/proc/mm", OS_ACC_W_OK) < 0) { |
397 | proc_mm = 0; | 422 | proc_mm = 0; |
398 | printf("not found\n"); | 423 | printf("not found\n"); |
399 | goto out; | 424 | } else { |
400 | } | 425 | if (!proc_mm) |
401 | else { | 426 | printf("found but disabled on command line\n"); |
402 | printf("found\n"); | 427 | else |
428 | printf("found\n"); | ||
403 | } | 429 | } |
404 | 430 | ||
405 | out: | ||
406 | check_skas3_ptrace_support(); | 431 | check_skas3_ptrace_support(); |
407 | return 1; | 432 | return 1; |
408 | } | 433 | } |
diff --git a/arch/um/kernel/process_kern.c b/arch/um/kernel/process_kern.c index d4036ed680bc..c23d8a08d0ff 100644 --- a/arch/um/kernel/process_kern.c +++ b/arch/um/kernel/process_kern.c | |||
@@ -412,7 +412,7 @@ int __init make_proc_sysemu(void) | |||
412 | 412 | ||
413 | if (ent == NULL) | 413 | if (ent == NULL) |
414 | { | 414 | { |
415 | printk("Failed to register /proc/sysemu\n"); | 415 | printk(KERN_WARNING "Failed to register /proc/sysemu\n"); |
416 | return(0); | 416 | return(0); |
417 | } | 417 | } |
418 | 418 | ||
diff --git a/arch/um/kernel/skas/process.c b/arch/um/kernel/skas/process.c index ba671dab8878..6dd9e5bf18ed 100644 --- a/arch/um/kernel/skas/process.c +++ b/arch/um/kernel/skas/process.c | |||
@@ -64,7 +64,7 @@ void wait_stub_done(int pid, int sig, char * fname) | |||
64 | (WSTOPSIG(status) == SIGVTALRM)); | 64 | (WSTOPSIG(status) == SIGVTALRM)); |
65 | 65 | ||
66 | if((n < 0) || !WIFSTOPPED(status) || | 66 | if((n < 0) || !WIFSTOPPED(status) || |
67 | (WSTOPSIG(status) != SIGUSR1 && WSTOPSIG(status != SIGTRAP))){ | 67 | (WSTOPSIG(status) != SIGUSR1 && WSTOPSIG(status) != SIGTRAP)){ |
68 | panic("%s : failed to wait for SIGUSR1/SIGTRAP, " | 68 | panic("%s : failed to wait for SIGUSR1/SIGTRAP, " |
69 | "pid = %d, n = %d, errno = %d, status = 0x%x\n", | 69 | "pid = %d, n = %d, errno = %d, status = 0x%x\n", |
70 | fname, pid, n, errno, status); | 70 | fname, pid, n, errno, status); |
diff --git a/arch/um/kernel/skas/syscall_user.c b/arch/um/kernel/skas/syscall_user.c index 2828e6e37721..6b0664970147 100644 --- a/arch/um/kernel/skas/syscall_user.c +++ b/arch/um/kernel/skas/syscall_user.c | |||
@@ -15,7 +15,7 @@ | |||
15 | void handle_syscall(union uml_pt_regs *regs) | 15 | void handle_syscall(union uml_pt_regs *regs) |
16 | { | 16 | { |
17 | long result; | 17 | long result; |
18 | #if UML_CONFIG_SYSCALL_DEBUG | 18 | #ifdef UML_CONFIG_SYSCALL_DEBUG |
19 | int index; | 19 | int index; |
20 | 20 | ||
21 | index = record_syscall_start(UPT_SYSCALL_NR(regs)); | 21 | index = record_syscall_start(UPT_SYSCALL_NR(regs)); |
@@ -27,7 +27,7 @@ void handle_syscall(union uml_pt_regs *regs) | |||
27 | REGS_SET_SYSCALL_RETURN(regs->skas.regs, result); | 27 | REGS_SET_SYSCALL_RETURN(regs->skas.regs, result); |
28 | 28 | ||
29 | syscall_trace(regs, 1); | 29 | syscall_trace(regs, 1); |
30 | #if UML_CONFIG_SYSCALL_DEBUG | 30 | #ifdef UML_CONFIG_SYSCALL_DEBUG |
31 | record_syscall_end(index, result); | 31 | record_syscall_end(index, result); |
32 | #endif | 32 | #endif |
33 | } | 33 | } |
diff --git a/arch/um/kernel/skas/trap_user.c b/arch/um/kernel/skas/trap_user.c index 0dee1d95c806..9950a6716fe5 100644 --- a/arch/um/kernel/skas/trap_user.c +++ b/arch/um/kernel/skas/trap_user.c | |||
@@ -58,7 +58,6 @@ void user_signal(int sig, union uml_pt_regs *regs, int pid) | |||
58 | int segv = ((sig == SIGFPE) || (sig == SIGSEGV) || (sig == SIGBUS) || | 58 | int segv = ((sig == SIGFPE) || (sig == SIGSEGV) || (sig == SIGBUS) || |
59 | (sig == SIGILL) || (sig == SIGTRAP)); | 59 | (sig == SIGILL) || (sig == SIGTRAP)); |
60 | 60 | ||
61 | regs->skas.is_user = 1; | ||
62 | if (segv) | 61 | if (segv) |
63 | get_skas_faultinfo(pid, ®s->skas.faultinfo); | 62 | get_skas_faultinfo(pid, ®s->skas.faultinfo); |
64 | info = &sig_info[sig]; | 63 | info = &sig_info[sig]; |
diff --git a/arch/um/kernel/time_kern.c b/arch/um/kernel/time_kern.c index a8b4ef601f59..4e08f7545d63 100644 --- a/arch/um/kernel/time_kern.c +++ b/arch/um/kernel/time_kern.c | |||
@@ -137,7 +137,10 @@ long um_stime(int __user *tptr) | |||
137 | void timer_handler(int sig, union uml_pt_regs *regs) | 137 | void timer_handler(int sig, union uml_pt_regs *regs) |
138 | { | 138 | { |
139 | local_irq_disable(); | 139 | local_irq_disable(); |
140 | update_process_times(CHOOSE_MODE(user_context(UPT_SP(regs)), (regs)->skas.is_user)); | 140 | irq_enter(); |
141 | update_process_times(CHOOSE_MODE(user_context(UPT_SP(regs)), | ||
142 | (regs)->skas.is_user)); | ||
143 | irq_exit(); | ||
141 | local_irq_enable(); | 144 | local_irq_enable(); |
142 | if(current_thread->cpu == 0) | 145 | if(current_thread->cpu == 0) |
143 | timer_irq(regs); | 146 | timer_irq(regs); |
diff --git a/arch/um/kernel/um_arch.c b/arch/um/kernel/um_arch.c index 8736d098f0ee..ca2bb6f09a7d 100644 --- a/arch/um/kernel/um_arch.c +++ b/arch/um/kernel/um_arch.c | |||
@@ -38,6 +38,9 @@ | |||
38 | #include "choose-mode.h" | 38 | #include "choose-mode.h" |
39 | #include "mode_kern.h" | 39 | #include "mode_kern.h" |
40 | #include "mode.h" | 40 | #include "mode.h" |
41 | #ifdef UML_CONFIG_MODE_SKAS | ||
42 | #include "skas.h" | ||
43 | #endif | ||
41 | 44 | ||
42 | #define DEFAULT_COMMAND_LINE "root=98:0" | 45 | #define DEFAULT_COMMAND_LINE "root=98:0" |
43 | 46 | ||
@@ -318,6 +321,7 @@ int linux_main(int argc, char **argv) | |||
318 | unsigned long avail, diff; | 321 | unsigned long avail, diff; |
319 | unsigned long virtmem_size, max_physmem; | 322 | unsigned long virtmem_size, max_physmem; |
320 | unsigned int i, add; | 323 | unsigned int i, add; |
324 | char * mode; | ||
321 | 325 | ||
322 | for (i = 1; i < argc; i++){ | 326 | for (i = 1; i < argc; i++){ |
323 | if((i == 1) && (argv[i][0] == ' ')) continue; | 327 | if((i == 1) && (argv[i][0] == ' ')) continue; |
@@ -338,6 +342,21 @@ int linux_main(int argc, char **argv) | |||
338 | exit(1); | 342 | exit(1); |
339 | } | 343 | } |
340 | #endif | 344 | #endif |
345 | |||
346 | #ifndef CONFIG_MODE_SKAS | ||
347 | mode = "TT"; | ||
348 | #else | ||
349 | /* Show to the user the result of selection */ | ||
350 | if (mode_tt) | ||
351 | mode = "TT"; | ||
352 | else if (proc_mm && ptrace_faultinfo) | ||
353 | mode = "SKAS3"; | ||
354 | else | ||
355 | mode = "SKAS0"; | ||
356 | #endif | ||
357 | |||
358 | printf("UML running in %s mode\n", mode); | ||
359 | |||
341 | uml_start = CHOOSE_MODE_PROC(set_task_sizes_tt, set_task_sizes_skas, 0, | 360 | uml_start = CHOOSE_MODE_PROC(set_task_sizes_tt, set_task_sizes_skas, 0, |
342 | &host_task_size, &task_size); | 361 | &host_task_size, &task_size); |
343 | 362 | ||