kdump, vmcoreinfo: report memory sections virtual addresses
KASLR memory randomization can randomize the base of the physical memory mapping (PAGE_OFFSET), vmalloc (VMALLOC_START) and vmemmap (VMEMMAP_START). Adding these variables on VMCOREINFO so tools can easily identify the base of each memory section. Link: http://lkml.kernel.org/r/1471531632-23003-1-git-send-email-thgarnie@google.com Signed-off-by: Thomas Garnier <thgarnie@google.com> Acked-by: Baoquan He <bhe@redhat.com> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Ingo Molnar <mingo@redhat.com> Cc: "H . Peter Anvin" <hpa@zytor.com> Cc: Eric Biederman <ebiederm@xmission.com> Cc: Xunlei Pang <xlpang@redhat.com> Cc: HATAYAMA Daisuke <d.hatayama@jp.fujitsu.com> Cc: Kees Cook <keescook@chromium.org> Cc: Eugene Surovegin <surovegin@google.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
Родитель
2a1613a586
Коммит
0549a3c02e
|
@ -337,6 +337,9 @@ void arch_crash_save_vmcoreinfo(void)
|
|||
#endif
|
||||
vmcoreinfo_append_str("KERNELOFFSET=%lx\n",
|
||||
kaslr_offset());
|
||||
VMCOREINFO_PAGE_OFFSET(PAGE_OFFSET);
|
||||
VMCOREINFO_VMALLOC_START(VMALLOC_START);
|
||||
VMCOREINFO_VMEMMAP_START(VMEMMAP_START);
|
||||
}
|
||||
|
||||
/* arch-dependent functionality related to kexec file-based syscall */
|
||||
|
|
|
@ -259,6 +259,12 @@ phys_addr_t paddr_vmcoreinfo_note(void);
|
|||
vmcoreinfo_append_str("NUMBER(%s)=%ld\n", #name, (long)name)
|
||||
#define VMCOREINFO_CONFIG(name) \
|
||||
vmcoreinfo_append_str("CONFIG_%s=y\n", #name)
|
||||
#define VMCOREINFO_PAGE_OFFSET(value) \
|
||||
vmcoreinfo_append_str("PAGE_OFFSET=%lx\n", (unsigned long)value)
|
||||
#define VMCOREINFO_VMALLOC_START(value) \
|
||||
vmcoreinfo_append_str("VMALLOC_START=%lx\n", (unsigned long)value)
|
||||
#define VMCOREINFO_VMEMMAP_START(value) \
|
||||
vmcoreinfo_append_str("VMEMMAP_START=%lx\n", (unsigned long)value)
|
||||
|
||||
extern struct kimage *kexec_image;
|
||||
extern struct kimage *kexec_crash_image;
|
||||
|
|
Загрузка…
Ссылка в новой задаче