Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3413579pxf; Mon, 29 Mar 2021 01:18:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy7gGl3F45HsGxM0oYsUOSCfV5/zxnwF1PePjyE7mIhm7u7BjMcZI7c/cQ61Mpkl95xAlKM X-Received: by 2002:a17:907:e8f:: with SMTP id ho15mr28040225ejc.541.1617005896173; Mon, 29 Mar 2021 01:18:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617005896; cv=none; d=google.com; s=arc-20160816; b=I6c8NRlWj6IPwQX8Q5yvv2ROv5favqMFOwX3UfUDkvqb7gxWtE3QObvc0r+9NS7Vfv QAAQ6b9VLnG8xDln0XqKp7AIIO4E3PhA3mDP6d9uy2HtaU8W7EwfqmAi5aaLA0gMqNxQ yngxYUJg3J3bCSIPZBgbkXxREkcU4tTm9HWM8B6LVRL7WaBRhcG/VGunP5zoqMPgJH14 DmLN5XEBi63ZXuHgdKTnbwfD+yhxV2CkKTyysSX9DsQNaqtGT+FznPz98FKuUk3zW3J/ 5BJw+SyDg23PZZ3KcaPTGfIa/c0/UY/YfAV/M3+/up6ng34PU0foRii6BHG9ivu08o/F Gsig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=z9KGBomPaYDtoPbHrlfrluSs25+YE9nD2d/rKIFKDoY=; b=FPVloNLYEuuHqyEf1HdBb3vnrnIs5gtnUN/TyRUwlYDhBsiLQXf8Jvyi3tA6PaOUG5 waFD7jUHUz+Azaq2+por0BLnmYYZQCIhxhAav99OMYJxTLKhcKn10hM6nfMXZJSXSPGP 6uCmkszZm8vwBUeIxhaI1plX5TeSeFgXUwR+AFyGTScYkLOrPrFe3gjzcycoJr/pRaz/ 2xXaNPGx9Ia+faPh0pLFg107WzIS9nhyZRttqRQnr/b7wplhbmVJIkVWSGhh9S1+cS2/ YuewJnBAcvopNpMWneD9iVDyscOd72mBy7oVYC6KCGSah8/Ab9io1YzJRopSjMsum89u qN4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pFM0FgJm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a14si11811189ejk.698.2021.03.29.01.17.51; Mon, 29 Mar 2021 01:18:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pFM0FgJm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231533AbhC2IPC (ORCPT + 99 others); Mon, 29 Mar 2021 04:15:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:51820 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232496AbhC2IJQ (ORCPT ); Mon, 29 Mar 2021 04:09:16 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3C1016196B; Mon, 29 Mar 2021 08:09:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617005355; bh=9MQyLpCails/PN83xj+HAIVPTBA/Vb/18ZlIJRwSNJk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pFM0FgJmPS8PzGlgEnv0+hetvBm5WhGb8v16yU0+iYJ3AQR/X/lX57VoYd1cygxOK UJ578Z1Zo036rZzvpP0Gakl26r8naGtOwbbibF8wC0FeK5a1MRP5V7e1QHR5GBrtFO 2t+5RPxvaRHqazL0IugVqtpXTOzaLW2faGnbVFBs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Tatashin , Tyler Hicks , Will Deacon , Sasha Levin Subject: [PATCH 4.19 52/72] arm64: kdump: update ppos when reading elfcorehdr Date: Mon, 29 Mar 2021 09:58:28 +0200 Message-Id: <20210329075611.989762642@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210329075610.300795746@linuxfoundation.org> References: <20210329075610.300795746@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Tatashin [ Upstream commit 141f8202cfa4192c3af79b6cbd68e7760bb01b5a ] The ppos points to a position in the old kernel memory (and in case of arm64 in the crash kernel since elfcorehdr is passed as a segment). The function should update the ppos by the amount that was read. This bug is not exposed by accident, but other platforms update this value properly. So, fix it in ARM64 version of elfcorehdr_read() as well. Signed-off-by: Pavel Tatashin Fixes: e62aaeac426a ("arm64: kdump: provide /proc/vmcore file") Reviewed-by: Tyler Hicks Link: https://lore.kernel.org/r/20210319205054.743368-1-pasha.tatashin@soleen.com Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/crash_dump.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c index f46d57c31443..76905a258550 100644 --- a/arch/arm64/kernel/crash_dump.c +++ b/arch/arm64/kernel/crash_dump.c @@ -67,5 +67,7 @@ ssize_t copy_oldmem_page(unsigned long pfn, char *buf, ssize_t elfcorehdr_read(char *buf, size_t count, u64 *ppos) { memcpy(buf, phys_to_virt((phys_addr_t)*ppos), count); + *ppos += count; + return count; } -- 2.30.1