summaryrefslogtreecommitdiffstats
path: root/kernel/kexec_file.c
diff options
context:
space:
mode:
authorPhilipp Rudo <prudo@linux.vnet.ibm.com>2018-04-13 18:36:39 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2018-04-13 20:10:28 -0400
commit8da0b724959ccd3f8435214ebdaf1aef548967bb (patch)
tree5614e73eb78981992032e7523bed4691b31c5a5a /kernel/kexec_file.c
parent620f697cc27a6d9b09268f47cd13620488ec67af (diff)
kernel/kexec_file.c: remove mis-use of sh_offset field during purgatory load
The current code uses the sh_offset field in purgatory_info->sechdrs to store a pointer to the current load address of the section. Depending whether the section will be loaded or not this is either a pointer into purgatory_info->purgatory_buf or kexec_purgatory. This is not only a violation of the ELF standard but also makes the code very hard to understand as you cannot tell if the memory you are using is read-only or not. Remove this misuse and store the offset of the section in pugaroty_info->purgatory_buf in sh_offset. Link: http://lkml.kernel.org/r/20180321112751.22196-10-prudo@linux.vnet.ibm.com Signed-off-by: Philipp Rudo <prudo@linux.vnet.ibm.com> Acked-by: Dave Young <dyoung@redhat.com> Cc: AKASHI Takahiro <takahiro.akashi@linaro.org> Cc: Eric Biederman <ebiederm@xmission.com> Cc: Heiko Carstens <heiko.carstens@de.ibm.com> Cc: Ingo Molnar <mingo@kernel.org> Cc: Martin Schwidefsky <schwidefsky@de.ibm.com> Cc: Michael Ellerman <mpe@ellerman.id.au> Cc: Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com> Cc: Vivek Goyal <vgoyal@redhat.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'kernel/kexec_file.c')
-rw-r--r--kernel/kexec_file.c37
1 files changed, 7 insertions, 30 deletions
diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c
index 7b63de8a89b6..269116fd932c 100644
--- a/kernel/kexec_file.c
+++ b/kernel/kexec_file.c
@@ -790,6 +790,10 @@ static int kexec_purgatory_setup_sechdrs(struct purgatory_info *pi,
790 Elf_Shdr *sechdrs; 790 Elf_Shdr *sechdrs;
791 int i; 791 int i;
792 792
793 /*
794 * The section headers in kexec_purgatory are read-only. In order to
795 * have them modifiable make a temporary copy.
796 */
793 sechdrs = vzalloc(pi->ehdr->e_shnum * sizeof(Elf_Shdr)); 797 sechdrs = vzalloc(pi->ehdr->e_shnum * sizeof(Elf_Shdr));
794 if (!sechdrs) 798 if (!sechdrs)
795 return -ENOMEM; 799 return -ENOMEM;
@@ -797,28 +801,6 @@ static int kexec_purgatory_setup_sechdrs(struct purgatory_info *pi,
797 pi->ehdr->e_shnum * sizeof(Elf_Shdr)); 801 pi->ehdr->e_shnum * sizeof(Elf_Shdr));
798 pi->sechdrs = sechdrs; 802 pi->sechdrs = sechdrs;
799 803
800 /*
801 * We seem to have multiple copies of sections. First copy is which
802 * is embedded in kernel in read only section. Some of these sections
803 * will be copied to a temporary buffer and relocated. And these
804 * sections will finally be copied to their final destination at
805 * segment load time.
806 *
807 * Use ->sh_offset to reflect section address in memory. It will
808 * point to original read only copy if section is not allocatable.
809 * Otherwise it will point to temporary copy which will be relocated.
810 *
811 * Use ->sh_addr to contain final address of the section where it
812 * will go during execution time.
813 */
814 for (i = 0; i < pi->ehdr->e_shnum; i++) {
815 if (sechdrs[i].sh_type == SHT_NOBITS)
816 continue;
817
818 sechdrs[i].sh_offset = (unsigned long)pi->ehdr +
819 sechdrs[i].sh_offset;
820 }
821
822 offset = 0; 804 offset = 0;
823 bss_addr = kbuf->mem + kbuf->bufsz; 805 bss_addr = kbuf->mem + kbuf->bufsz;
824 kbuf->image->start = pi->ehdr->e_entry; 806 kbuf->image->start = pi->ehdr->e_entry;
@@ -847,17 +829,12 @@ static int kexec_purgatory_setup_sechdrs(struct purgatory_info *pi,
847 kbuf->image->start += kbuf->mem + offset; 829 kbuf->image->start += kbuf->mem + offset;
848 } 830 }
849 831
850 src = (void *)sechdrs[i].sh_offset; 832 src = (void *)pi->ehdr + sechdrs[i].sh_offset;
851 dst = pi->purgatory_buf + offset; 833 dst = pi->purgatory_buf + offset;
852 memcpy(dst, src, sechdrs[i].sh_size); 834 memcpy(dst, src, sechdrs[i].sh_size);
853 835
854 sechdrs[i].sh_addr = kbuf->mem + offset; 836 sechdrs[i].sh_addr = kbuf->mem + offset;
855 837 sechdrs[i].sh_offset = offset;
856 /*
857 * This section got copied to temporary buffer. Update
858 * ->sh_offset accordingly.
859 */
860 sechdrs[i].sh_offset = (unsigned long)dst;
861 offset += sechdrs[i].sh_size; 838 offset += sechdrs[i].sh_size;
862 } 839 }
863 840
@@ -1067,7 +1044,7 @@ int kexec_purgatory_get_set_symbol(struct kimage *image, const char *name,
1067 return -EINVAL; 1044 return -EINVAL;
1068 } 1045 }
1069 1046
1070 sym_buf = (char *)sec->sh_offset + sym->st_value; 1047 sym_buf = (char *)pi->purgatory_buf + sec->sh_offset + sym->st_value;
1071 1048
1072 if (get_value) 1049 if (get_value)
1073 memcpy((void *)buf, sym_buf, size); 1050 memcpy((void *)buf, sym_buf, size);