Baoquan He
2017-02-24 10:38:52 UTC
Otherwise it will print false positve message as below. So add
a check when do the search.
"Cannot get kernel page_offset_base symbol address"
Signed-off-by: Baoquan He <***@redhat.com>
---
kexec/arch/i386/crashdump-x86.c | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/kexec/arch/i386/crashdump-x86.c b/kexec/arch/i386/crashdump-x86.c
index 88aeee3..b2c1be5 100644
--- a/kexec/arch/i386/crashdump-x86.c
+++ b/kexec/arch/i386/crashdump-x86.c
@@ -150,8 +150,6 @@ static int get_kernel_vaddr_and_size(struct kexec_info *UNUSED(info),
off_t size;
uint32_t elf_flags = 0;
uint64_t stext_sym;
- const unsigned long long pud_mask = ~((1 << 30) - 1);
- unsigned long long vaddr, lowest_vaddr = 0;
if (elf_info->machine != EM_X86_64)
return 0;
@@ -181,8 +179,11 @@ static int get_kernel_vaddr_and_size(struct kexec_info *UNUSED(info),
end_phdr = &ehdr.e_phdr[ehdr.e_phnum];
+#ifdef CONFIG_RANDOMIZE_MEMORY
/* Search for the real PAGE_OFFSET when KASLR memory randomization
* is enabled */
+ const unsigned long long pud_mask = ~((1 << 30) - 1);
+ unsigned long long vaddr, lowest_vaddr = 0;
if (get_kernel_sym("page_offset_base") != 0) {
for(phdr = ehdr.e_phdr; phdr != end_phdr; phdr++) {
if (phdr->p_type == PT_LOAD) {
@@ -194,6 +195,7 @@ static int get_kernel_vaddr_and_size(struct kexec_info *UNUSED(info),
if (lowest_vaddr != 0)
elf_info->page_offset = lowest_vaddr;
}
+#endif
/* Traverse through the Elf headers and find the region where
* _stext symbol is located in. That's where kernel is mapped */
a check when do the search.
"Cannot get kernel page_offset_base symbol address"
Signed-off-by: Baoquan He <***@redhat.com>
---
kexec/arch/i386/crashdump-x86.c | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/kexec/arch/i386/crashdump-x86.c b/kexec/arch/i386/crashdump-x86.c
index 88aeee3..b2c1be5 100644
--- a/kexec/arch/i386/crashdump-x86.c
+++ b/kexec/arch/i386/crashdump-x86.c
@@ -150,8 +150,6 @@ static int get_kernel_vaddr_and_size(struct kexec_info *UNUSED(info),
off_t size;
uint32_t elf_flags = 0;
uint64_t stext_sym;
- const unsigned long long pud_mask = ~((1 << 30) - 1);
- unsigned long long vaddr, lowest_vaddr = 0;
if (elf_info->machine != EM_X86_64)
return 0;
@@ -181,8 +179,11 @@ static int get_kernel_vaddr_and_size(struct kexec_info *UNUSED(info),
end_phdr = &ehdr.e_phdr[ehdr.e_phnum];
+#ifdef CONFIG_RANDOMIZE_MEMORY
/* Search for the real PAGE_OFFSET when KASLR memory randomization
* is enabled */
+ const unsigned long long pud_mask = ~((1 << 30) - 1);
+ unsigned long long vaddr, lowest_vaddr = 0;
if (get_kernel_sym("page_offset_base") != 0) {
for(phdr = ehdr.e_phdr; phdr != end_phdr; phdr++) {
if (phdr->p_type == PT_LOAD) {
@@ -194,6 +195,7 @@ static int get_kernel_vaddr_and_size(struct kexec_info *UNUSED(info),
if (lowest_vaddr != 0)
elf_info->page_offset = lowest_vaddr;
}
+#endif
/* Traverse through the Elf headers and find the region where
* _stext symbol is located in. That's where kernel is mapped */
--
2.5.5
2.5.5