Hi Atsushi,
Thanks a lot for testing it.
On Tuesday 23 May 2017 08:39 AM, Atsushi Kumagai wrote:
Thanks for your report, I have received this.
I'm on vacation until Mar 8, I'll review it when I return from vacation.
Any further comment on it?
Otherwise, I will send a v2 after accommodating concern from Xunlei.
Unfortunately, it doesn't seem like I can make time anymore for review this
week,
but at least this patch doesn't seem to work in my environment (linux 4.8
without kaslr).
Do you have any ideas ?
I see, why it would have caused. I have not tested this case, but I hope my v2
should not have this issue.
Umm, v2 still doesn't work in my environment...
It seems that I have to investigate this deeper.
Hummm, I thought we would see file_vmcoreinfo as NULL in
get_kaslr_offset_x86_64() in your case. However, it's not true.
I think, it will have to be initialized with NULL in main().
Can you please try following fixup on top of this series:
I found the cause, please see below:
initial()
+ find_kaslr_offsets()
+ open_vmcoreinfo()
+ get_kaslr_offset() // set info->kaslr_offset
+ close_vmcoreinfo()
gather_filter_info()
(snip)
+ resolve_config_entry()
+ get_kaslr_offset() // occur SIGSEGV since info->file_vmcoreinfo is
closed
Since info->file_vmcoreinfo is closed,therefore it should be NULL. But
currently, close_vmcoreinfo() does not set it to NULL. We should also set
info->file_vmcoreinfo to NULL in close_vmcoreinfo() apart from main().
The cause code is in [PATCH v2 1/2],
diff --git a/erase_info.c b/erase_info.c
index f2ba914..60abfa1 100644
--- a/erase_info.c
+++ b/erase_info.c
@@ -1088,6 +1088,7 @@ resolve_config_entry(struct config_entry *ce, unsigned
long long base_vaddr,
ce->line, ce->name);
return FALSE;
}
+ ce->sym_addr += get_kaslr_offset(ce->sym_addr);
ce->type_name = get_symbol_type_name(ce->name,
DWARF_INFO_GET_SYMBOL_TYPE,
&ce->size, &ce->type_flag);
I think we should use info->kaslr_offset instead of get_kaslr_offset(),
how about you ?
Actually, we are not sure at this point that ce->sym_addr is a kernel linear
address. It could be a module address and that can have different
randomization offset.
My intention is to calculate all types of kaslr offsets in
find_kaslr_offsets() very early and then store them in different "info"
elements. Now, whenever we call get_kaslr_offset() we would return right
offset as per the input address.
I have very little idea about x86. So, I have left a TODO to calculate offset
for non-linear addresses.
BTW, I'm not sure why you didn't meet this issue...
Because, I tested with kaslr kernel, so when get_kaslr_offset(ce->sym_addr)
was called, I already had a valid info->kaslr_offset.
So, what about following fixup
diff --git a/makedumpfile.c b/makedumpfile.c
index 57235690569e..4986d098d69a 100644
--- a/makedumpfile.c
+++ b/makedumpfile.c
@@ -8685,6 +8685,7 @@ close_vmcoreinfo(void)
if(fclose(info->file_vmcoreinfo) < 0)
ERRMSG("Can't close the vmcoreinfo file(%s). %s\n",
info->name_vmcoreinfo, strerror(errno));
+ info->file_vmcoreinfo = NULL;
}
void
@@ -11076,6 +11077,7 @@ main(int argc, char *argv[])
strerror(errno));
goto out;
}
+ info->file_vmcoreinfo = NULL;
info->fd_vmlinux = -1;
info->fd_xen_syms = -1;
info->fd_memory = -1;
~Pratyush
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec