diff options
author | Philipp Rudo <prudo@linux.vnet.ibm.com> | 2018-04-13 18:36:39 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2018-04-13 20:10:28 -0400 |
commit | 8da0b724959ccd3f8435214ebdaf1aef548967bb (patch) | |
tree | 5614e73eb78981992032e7523bed4691b31c5a5a /kernel/kexec_file.c | |
parent | 620f697cc27a6d9b09268f47cd13620488ec67af (diff) |
kernel/kexec_file.c: remove mis-use of sh_offset field during purgatory load
The current code uses the sh_offset field in purgatory_info->sechdrs to
store a pointer to the current load address of the section. Depending
whether the section will be loaded or not this is either a pointer into
purgatory_info->purgatory_buf or kexec_purgatory. This is not only a
violation of the ELF standard but also makes the code very hard to
understand as you cannot tell if the memory you are using is read-only
or not.
Remove this misuse and store the offset of the section in
pugaroty_info->purgatory_buf in sh_offset.
Link: http://lkml.kernel.org/r/20180321112751.22196-10-prudo@linux.vnet.ibm.com
Signed-off-by: Philipp Rudo <prudo@linux.vnet.ibm.com>
Acked-by: Dave Young <dyoung@redhat.com>
Cc: AKASHI Takahiro <takahiro.akashi@linaro.org>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'kernel/kexec_file.c')
-rw-r--r-- | kernel/kexec_file.c | 37 |
1 files changed, 7 insertions, 30 deletions
diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c index 7b63de8a89b6..269116fd932c 100644 --- a/kernel/kexec_file.c +++ b/kernel/kexec_file.c | |||
@@ -790,6 +790,10 @@ static int kexec_purgatory_setup_sechdrs(struct purgatory_info *pi, | |||
790 | Elf_Shdr *sechdrs; | 790 | Elf_Shdr *sechdrs; |
791 | int i; | 791 | int i; |
792 | 792 | ||
793 | /* | ||
794 | * The section headers in kexec_purgatory are read-only. In order to | ||
795 | * have them modifiable make a temporary copy. | ||
796 | */ | ||
793 | sechdrs = vzalloc(pi->ehdr->e_shnum * sizeof(Elf_Shdr)); | 797 | sechdrs = vzalloc(pi->ehdr->e_shnum * sizeof(Elf_Shdr)); |
794 | if (!sechdrs) | 798 | if (!sechdrs) |
795 | return -ENOMEM; | 799 | return -ENOMEM; |
@@ -797,28 +801,6 @@ static int kexec_purgatory_setup_sechdrs(struct purgatory_info *pi, | |||
797 | pi->ehdr->e_shnum * sizeof(Elf_Shdr)); | 801 | pi->ehdr->e_shnum * sizeof(Elf_Shdr)); |
798 | pi->sechdrs = sechdrs; | 802 | pi->sechdrs = sechdrs; |
799 | 803 | ||
800 | /* | ||
801 | * We seem to have multiple copies of sections. First copy is which | ||
802 | * is embedded in kernel in read only section. Some of these sections | ||
803 | * will be copied to a temporary buffer and relocated. And these | ||
804 | * sections will finally be copied to their final destination at | ||
805 | * segment load time. | ||
806 | * | ||
807 | * Use ->sh_offset to reflect section address in memory. It will | ||
808 | * point to original read only copy if section is not allocatable. | ||
809 | * Otherwise it will point to temporary copy which will be relocated. | ||
810 | * | ||
811 | * Use ->sh_addr to contain final address of the section where it | ||
812 | * will go during execution time. | ||
813 | */ | ||
814 | for (i = 0; i < pi->ehdr->e_shnum; i++) { | ||
815 | if (sechdrs[i].sh_type == SHT_NOBITS) | ||
816 | continue; | ||
817 | |||
818 | sechdrs[i].sh_offset = (unsigned long)pi->ehdr + | ||
819 | sechdrs[i].sh_offset; | ||
820 | } | ||
821 | |||
822 | offset = 0; | 804 | offset = 0; |
823 | bss_addr = kbuf->mem + kbuf->bufsz; | 805 | bss_addr = kbuf->mem + kbuf->bufsz; |
824 | kbuf->image->start = pi->ehdr->e_entry; | 806 | kbuf->image->start = pi->ehdr->e_entry; |
@@ -847,17 +829,12 @@ static int kexec_purgatory_setup_sechdrs(struct purgatory_info *pi, | |||
847 | kbuf->image->start += kbuf->mem + offset; | 829 | kbuf->image->start += kbuf->mem + offset; |
848 | } | 830 | } |
849 | 831 | ||
850 | src = (void *)sechdrs[i].sh_offset; | 832 | src = (void *)pi->ehdr + sechdrs[i].sh_offset; |
851 | dst = pi->purgatory_buf + offset; | 833 | dst = pi->purgatory_buf + offset; |
852 | memcpy(dst, src, sechdrs[i].sh_size); | 834 | memcpy(dst, src, sechdrs[i].sh_size); |
853 | 835 | ||
854 | sechdrs[i].sh_addr = kbuf->mem + offset; | 836 | sechdrs[i].sh_addr = kbuf->mem + offset; |
855 | 837 | sechdrs[i].sh_offset = offset; | |
856 | /* | ||
857 | * This section got copied to temporary buffer. Update | ||
858 | * ->sh_offset accordingly. | ||
859 | */ | ||
860 | sechdrs[i].sh_offset = (unsigned long)dst; | ||
861 | offset += sechdrs[i].sh_size; | 838 | offset += sechdrs[i].sh_size; |
862 | } | 839 | } |
863 | 840 | ||
@@ -1067,7 +1044,7 @@ int kexec_purgatory_get_set_symbol(struct kimage *image, const char *name, | |||
1067 | return -EINVAL; | 1044 | return -EINVAL; |
1068 | } | 1045 | } |
1069 | 1046 | ||
1070 | sym_buf = (char *)sec->sh_offset + sym->st_value; | 1047 | sym_buf = (char *)pi->purgatory_buf + sec->sh_offset + sym->st_value; |
1071 | 1048 | ||
1072 | if (get_value) | 1049 | if (get_value) |
1073 | memcpy((void *)buf, sym_buf, size); | 1050 | memcpy((void *)buf, sym_buf, size); |