Received: by 10.223.185.116 with SMTP id b49csp2083882wrg; Mon, 12 Feb 2018 04:07:52 -0800 (PST) X-Google-Smtp-Source: AH8x226f5OjiL2ijryviG0EaI9Xix5rS0ZUsOI9pYEsHZQ0P8BGH2jXWLL7Nzgrx81IOqBj4PBMf X-Received: by 10.99.137.195 with SMTP id v186mr8524403pgd.90.1518437272153; Mon, 12 Feb 2018 04:07:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518437272; cv=none; d=google.com; s=arc-20160816; b=zCDssX4zGfe1DcYFqtNyNvD1C9HC60z6wwkv1K7l8RaA40ZbLULPhYR7Z40yw7c7u9 u3GnBVs5DoQrajKrxYi8giqqHYcRcb8FMWfkk1S4Fs9Y8kPZ37ZXI9xrqJ2ohhkxntcr T7fAE0+QnKcfwMxRpeWNv4Cq1FnCbseIHlIeCx+I/yHnQJfaYccIp0VDI9w/jlPnLL9H k3XYKGdBC5w98IuHeXPp/cgP4HnQohHvsw9hGXJ5g0NL1qY4k+BJrl00qOOt3te+JfsX WCc79zOPUFccVAGJJVQaHgvBDXxJPDJAsy72RRCMTmpxZc/82samUJzlVNou28wJwhX7 5h2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from:arc-authentication-results; bh=SCUfRAHGaClnOVjDVO5qEHa4RPhQHHsFOWh0Ea+sMr8=; b=m5inZcYcotjfIe3o4GfzWkRNgFdUulncRJM0mJ6XTgHa/GP1XJAt9EdzTMtgEwpxRV 4vq1GwNzC6PyNmCWI6N6OoQXxw/mUGFz1hcoh0YwdQuhl9++Vy3wPFYRgLeK9Jl/luO1 4ObQHxTqvJfWVJsH9d5i7dk56Tywe7lDqornhEIFee17mQJTqc7r19MwIMO23mKPL3bB 0DEYncAo39M+PnQvOz+DnS6LUwhJyuEGzJ6l05C7xs/5gb3wrMYshtWkR96qX9+Tsydm 95cWoGtzo+9JvP7X6K56CIjpUxSdqyDfjqexGT1i2CSrZ4k3fQn2peiUHpbv4nA8rIN4 y0Yw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z8-v6si3948554plh.559.2018.02.12.04.07.36; Mon, 12 Feb 2018 04:07:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933502AbeBLKIK (ORCPT + 99 others); Mon, 12 Feb 2018 05:08:10 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:52792 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933488AbeBLKIH (ORCPT ); Mon, 12 Feb 2018 05:08:07 -0500 Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w1CA4Bgw082366 for ; Mon, 12 Feb 2018 05:08:07 -0500 Received: from e06smtp13.uk.ibm.com (e06smtp13.uk.ibm.com [195.75.94.109]) by mx0b-001b2d01.pphosted.com with ESMTP id 2g30dy0msg-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Mon, 12 Feb 2018 05:08:06 -0500 Received: from localhost by e06smtp13.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 12 Feb 2018 10:08:02 -0000 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp13.uk.ibm.com (192.168.101.143) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Mon, 12 Feb 2018 10:07:59 -0000 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w1CA7xBR46006356; Mon, 12 Feb 2018 10:07:59 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D3E3FAE04D; Mon, 12 Feb 2018 09:59:04 +0000 (GMT) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7D511AE045; Mon, 12 Feb 2018 09:59:04 +0000 (GMT) Received: from tuxmaker.boeblingen.de.ibm.com (unknown [9.152.85.9]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Mon, 12 Feb 2018 09:59:04 +0000 (GMT) From: Philipp Rudo To: kexec@lists.infradead.org, linux-s390@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Eric Biederman , Vivek Goyal , Michael Ellerman , Thiago Jung Bauermann , Martin Schwidefsky , Heiko Carstens , Andrew Morton , x86@kernel.org Subject: [PATCH 03/17] kexec_file: Make purgatory_info->ehdr const Date: Mon, 12 Feb 2018 11:07:40 +0100 X-Mailer: git-send-email 2.13.5 In-Reply-To: <20180212100754.55121-1-prudo@linux.vnet.ibm.com> References: <20180212100754.55121-1-prudo@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 18021210-0012-0000-0000-000005ADCAFD X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18021210-0013-0000-0000-000019298DBD Message-Id: <20180212100754.55121-4-prudo@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-02-12_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1802120131 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The kexec_purgatory buffer is read-only. Thus all pointers into kexec_purgatory are read-only, too. Point this out by explicitly marking purgatory_info->ehdr as 'const' and update the comments in purgatory_info. Signed-off-by: Philipp Rudo --- include/linux/kexec.h | 17 +++++++++++------ kernel/kexec_file.c | 4 ++-- 2 files changed, 13 insertions(+), 8 deletions(-) diff --git a/include/linux/kexec.h b/include/linux/kexec.h index 7bae5e87bf0d..10842eece180 100644 --- a/include/linux/kexec.h +++ b/include/linux/kexec.h @@ -99,14 +99,19 @@ struct compat_kexec_segment { #ifdef CONFIG_KEXEC_FILE struct purgatory_info { - /* Pointer to elf header of read only purgatory */ - Elf_Ehdr *ehdr; - - /* Pointer to purgatory sechdrs which are modifiable */ + /* + * Pointer to elf header at the beginning of kexec_purgatory. + * Note: kexec_purgatory is read only + */ + const Elf_Ehdr *ehdr; + /* + * Temporary, modifiable buffer for sechdrs used for relocation. + * This memory can be freed post image load. + */ Elf_Shdr *sechdrs; /* - * Temporary buffer location where purgatory is loaded and relocated - * This memory can be freed post image load + * Temporary, modifiable buffer for stripped purgatory used for + * relocation. This memory can be freed post image load. */ void *purgatory_buf; diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c index 0f044457b40c..06fc9fdd2474 100644 --- a/kernel/kexec_file.c +++ b/kernel/kexec_file.c @@ -880,7 +880,7 @@ int kexec_load_purgatory(struct kimage *image, unsigned long min, if (kexec_purgatory_size <= 0) return -EINVAL; - pi->ehdr = (Elf_Ehdr *)kexec_purgatory; + pi->ehdr = (const Elf_Ehdr *)kexec_purgatory; ret = __kexec_load_purgatory(image, min, max, top_down); if (ret) @@ -904,9 +904,9 @@ int kexec_load_purgatory(struct kimage *image, unsigned long min, static Elf_Sym *kexec_purgatory_find_symbol(struct purgatory_info *pi, const char *name) { + const Elf_Ehdr *ehdr; Elf_Sym *syms; Elf_Shdr *sechdrs; - Elf_Ehdr *ehdr; int i, k; const char *strtab; -- 2.13.5