Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3416673pxf; Mon, 29 Mar 2021 01:24:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/Jej0eSOrPEiKUVCaLC0HnVZQ4vTIISK1zSP21LR2RmFrJlnd3rS+1oua+yAIC0mVeiHE X-Received: by 2002:a17:906:4c56:: with SMTP id d22mr28338508ejw.426.1617006286500; Mon, 29 Mar 2021 01:24:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617006286; cv=none; d=google.com; s=arc-20160816; b=LthmTuYMMwpd7PsRUMgDpR3QEfDUULUepkbdL7UdBFsqkvzYCuzWJ/jj3kmz+ZJA6d I9wtiaP/dYRZdXrE+RNAiL6QiZTtXk6I8T74dGXftWMobb4+AsP2H5ywbU8l69YZMQ2J oDhKn7OyUXHoLCDdFEeQK/NtD+q5mWfH6cZXa2ic0KmP4B8H48FfpwPqObEQkU/hKjtU VPMB2pK3PPXUCQMF89JKIsnIz3lfpCCoDjT+DYlpq8f0Gj+zbLMDqahjWmNvZMX6hTXI Gqnjf1/eoNSxd1y0NkuySh3Zui2xP7lMIuF7lb30pmEMp9XT0Ka0YfpZxsVq5arioi6N 5c/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ethXS107T/0Ry25kCSu4ECMMGhf+v5g6kJBQbn/8O58=; b=j/Po6274Z4QdTlRPp5vEW3h7mCctmMUw7966q/Lwj9flgNvUMoLIP+GYtECc0vk22v YfBv739+Bbwk3K5I+e4BSzjbxed+y+Ql6CNACp33SCVhE90W7oXu4gqdG54RrJ+yCADN TZGWjbhfA1/k+YkU1Yg3Bu5NbQTER7VJWBCssb4yh6/fkKlZFL4eKmfiG51WS6h8rJp4 KNvHNRV0uW6DEYfYJ1ZBEjSeHfPmx1L+Nfis7qsTUKlyzszvNOtqyPnaiTDKMdaPLNEh t1hRIlWjOB7wejrtjIhaXn6CqOuxX7jK4Xvn9Obh/hgoy/kB1Ut0xGLpS12mUfhcPXHi K0QA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jKJ56Y40; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jg8si12979585ejc.657.2021.03.29.01.24.23; Mon, 29 Mar 2021 01:24:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jKJ56Y40; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233537AbhC2IXe (ORCPT + 99 others); Mon, 29 Mar 2021 04:23:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:58450 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232900AbhC2IPT (ORCPT ); Mon, 29 Mar 2021 04:15:19 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9F44561964; Mon, 29 Mar 2021 08:15:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617005705; bh=X37DBp6Ormim7xfW0XxjlYmJjt/SCXjIhAHFNaJKq0A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jKJ56Y40XZDQSMQXCCuqQs0g5kTGVFx8RxosjYp/sGhLGHsTaFMv+s+5W1cjFSGJa qbTQN/ZO/8jGUduVB4pgR1Au1kXzbRGpmNL7aGXcs6OjKcoxXlOIXN/3gyEDrCkBza QkDH8AnbFxuFgT5f4r2zEn+y87oDUNoUni8Ago+Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Tatashin , Tyler Hicks , Will Deacon , Sasha Levin Subject: [PATCH 5.4 088/111] arm64: kdump: update ppos when reading elfcorehdr Date: Mon, 29 Mar 2021 09:58:36 +0200 Message-Id: <20210329075618.142259406@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210329075615.186199980@linuxfoundation.org> References: <20210329075615.186199980@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Tatashin [ Upstream commit 141f8202cfa4192c3af79b6cbd68e7760bb01b5a ] The ppos points to a position in the old kernel memory (and in case of arm64 in the crash kernel since elfcorehdr is passed as a segment). The function should update the ppos by the amount that was read. This bug is not exposed by accident, but other platforms update this value properly. So, fix it in ARM64 version of elfcorehdr_read() as well. Signed-off-by: Pavel Tatashin Fixes: e62aaeac426a ("arm64: kdump: provide /proc/vmcore file") Reviewed-by: Tyler Hicks Link: https://lore.kernel.org/r/20210319205054.743368-1-pasha.tatashin@soleen.com Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/crash_dump.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c index e6e284265f19..58303a9ec32c 100644 --- a/arch/arm64/kernel/crash_dump.c +++ b/arch/arm64/kernel/crash_dump.c @@ -64,5 +64,7 @@ ssize_t copy_oldmem_page(unsigned long pfn, char *buf, ssize_t elfcorehdr_read(char *buf, size_t count, u64 *ppos) { memcpy(buf, phys_to_virt((phys_addr_t)*ppos), count); + *ppos += count; + return count; } -- 2.30.1