Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted
On 07/01/16 at 12:06pm, Baoquan He wrote: > On 06/30/16 at 05:24pm, Yinghai Lu wrote: > > On Wed, Jun 29, 2016 at 11:58 PM, Ye Xiaolong wrote: > > > On Wed, Jun 29, 2016 at 09:49:12PM -0700, Yinghai Lu wrote: > > >>On Wed, Jun 29, 2016 at 1:29 PM, Huang, Ying wrote: > > >>> If you could provide a git branch for that, that will be easier for us > > >>> to test and more accurate for you to get the right patch to be tested. > > >>> > > >> > > >>Please check > > >> > > >>git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git > > >>for-x86-v4.8-kaslr-debug > > > > > > Hi, yinghai > > > > > > Attached is the dmesg for the kernel which is built based on your > > > for-x86-v4.8-kaslr-debug branch. > > > > Thanks for capturing the boot log. > > > > early console in setup code > > early console in extract_kernel > > decompress_kernel: > >input: [0x0008fba276-0x000a8818ed] > > output: [0x000100-0x000a867c97] 0x09867c98: output_len > > [0x000100-0x0009768fff] 0x08769000: run_size > > [0x000100-0x000a867c97] 0x09867c98: output_run_size > > [0x000100-0x000a8a] 0x098b: init_size > > ZO text/data: [0x000a8818ee-0x000a8a] > > ZO heap: [0x000a888400-0x000a8983ff] > > VO bss/brk: [0x0009674000-0x0009768fff] > > booted via startup_32() > > Physical KASLR using RDTSC... > > Virtual KASLR using RDTSC... > > new output: [0x000660-0x000fe67c97] 0x09867c98: output_run_size > >virt_addr: 0x002400 > > decompress: [0x000660-0x000fe67c97] <=== [0x0008fba276-0x000a8818ed] > > > > Decompressing Linux... > > > > XZ-compressed data is corrupt > > > > -- System halted > > > > Hi Kees/Baoquan, > > > > Looks like > > > > commit ed9f007ee68478f6a50ec9971ade25a0129a5c0e > > Author: Kees Cook > > Date: Wed May 25 15:45:33 2016 -0700 > > > > x86/KASLR: Extend kernel image physical address randomization to > > addresses l > > arger than 4G > > I know why it happened, making patch. will reply soon. Sorry, I didn't get it, continue checking. > > > > > > > cause choose_random_location() return new output buffer > > new output: [0x000660-0x000fe67c97] 0x09867c98: output_run_size > > > > that is overlapped with input data. > >input: [0x0008fba276-0x000a8818ed] > > -0x000a8a] 0x098b: init_size > > > > and input already is in mem_avoid.
Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted
On 06/30/16 at 05:24pm, Yinghai Lu wrote: > On Wed, Jun 29, 2016 at 11:58 PM, Ye Xiaolong wrote: > > On Wed, Jun 29, 2016 at 09:49:12PM -0700, Yinghai Lu wrote: > >>On Wed, Jun 29, 2016 at 1:29 PM, Huang, Ying wrote: > >>> If you could provide a git branch for that, that will be easier for us > >>> to test and more accurate for you to get the right patch to be tested. > >>> > >> > >>Please check > >> > >>git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git > >>for-x86-v4.8-kaslr-debug > > > > Hi, yinghai > > > > Attached is the dmesg for the kernel which is built based on your > > for-x86-v4.8-kaslr-debug branch. > > Thanks for capturing the boot log. > > early console in setup code > early console in extract_kernel > decompress_kernel: >input: [0x0008fba276-0x000a8818ed] > output: [0x000100-0x000a867c97] 0x09867c98: output_len > [0x000100-0x0009768fff] 0x08769000: run_size > [0x000100-0x000a867c97] 0x09867c98: output_run_size > [0x000100-0x000a8a] 0x098b: init_size > ZO text/data: [0x000a8818ee-0x000a8a] > ZO heap: [0x000a888400-0x000a8983ff] > VO bss/brk: [0x0009674000-0x0009768fff] > booted via startup_32() > Physical KASLR using RDTSC... > Virtual KASLR using RDTSC... > new output: [0x000660-0x000fe67c97] 0x09867c98: output_run_size >virt_addr: 0x002400 > decompress: [0x000660-0x000fe67c97] <=== [0x0008fba276-0x000a8818ed] > > Decompressing Linux... > > XZ-compressed data is corrupt > > -- System halted > > Hi Kees/Baoquan, > > Looks like > > commit ed9f007ee68478f6a50ec9971ade25a0129a5c0e > Author: Kees Cook > Date: Wed May 25 15:45:33 2016 -0700 > > x86/KASLR: Extend kernel image physical address randomization to > addresses l > arger than 4G I know why it happened, making patch. will reply soon. > > > cause choose_random_location() return new output buffer > new output: [0x000660-0x000fe67c97] 0x09867c98: output_run_size > > that is overlapped with input data. >input: [0x0008fba276-0x000a8818ed] > -0x000a8a] 0x098b: init_size > > and input already is in mem_avoid.
Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted
On Wed, Jun 29, 2016 at 11:58 PM, Ye Xiaolong wrote: > On Wed, Jun 29, 2016 at 09:49:12PM -0700, Yinghai Lu wrote: >>On Wed, Jun 29, 2016 at 1:29 PM, Huang, Ying wrote: >>> If you could provide a git branch for that, that will be easier for us >>> to test and more accurate for you to get the right patch to be tested. >>> >> >>Please check >> >>git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git >>for-x86-v4.8-kaslr-debug > > Hi, yinghai > > Attached is the dmesg for the kernel which is built based on your > for-x86-v4.8-kaslr-debug branch. Thanks for capturing the boot log. early console in setup code early console in extract_kernel decompress_kernel: input: [0x0008fba276-0x000a8818ed] output: [0x000100-0x000a867c97] 0x09867c98: output_len [0x000100-0x0009768fff] 0x08769000: run_size [0x000100-0x000a867c97] 0x09867c98: output_run_size [0x000100-0x000a8a] 0x098b: init_size ZO text/data: [0x000a8818ee-0x000a8a] ZO heap: [0x000a888400-0x000a8983ff] VO bss/brk: [0x0009674000-0x0009768fff] booted via startup_32() Physical KASLR using RDTSC... Virtual KASLR using RDTSC... new output: [0x000660-0x000fe67c97] 0x09867c98: output_run_size virt_addr: 0x002400 decompress: [0x000660-0x000fe67c97] <=== [0x0008fba276-0x000a8818ed] Decompressing Linux... XZ-compressed data is corrupt -- System halted Hi Kees/Baoquan, Looks like commit ed9f007ee68478f6a50ec9971ade25a0129a5c0e Author: Kees Cook Date: Wed May 25 15:45:33 2016 -0700 x86/KASLR: Extend kernel image physical address randomization to addresses l arger than 4G cause choose_random_location() return new output buffer new output: [0x000660-0x000fe67c97] 0x09867c98: output_run_size that is overlapped with input data. input: [0x0008fba276-0x000a8818ed] -0x000a8a] 0x098b: init_size and input already is in mem_avoid.
Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted
On Wed, Jun 29, 2016 at 09:49:12PM -0700, Yinghai Lu wrote: >On Wed, Jun 29, 2016 at 1:29 PM, Huang, Ying wrote: >> If you could provide a git branch for that, that will be easier for us >> to test and more accurate for you to get the right patch to be tested. >> > >Please check > >git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git >for-x86-v4.8-kaslr-debugy Hi, yinghai Attached is the dmesg for the kernel which is built based on your for-x86-v4.8-kaslr-debug branch. Thanks, Xiaolong > >Thanks > >Yinghai dmesg-debug.xz Description: Binary data
Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted
On Wed, Jun 29, 2016 at 1:29 PM, Huang, Ying wrote: > If you could provide a git branch for that, that will be easier for us > to test and more accurate for you to get the right patch to be tested. > Please check git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git for-x86-v4.8-kaslr-debug Thanks Yinghai
Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted
Hi, Yinghai, Yinghai Lu writes: > On Tue, Jun 28, 2016 at 12:49 PM, Yinghai Lu wrote: >> On Mon, Jun 27, 2016 at 10:43 PM, Ye Xiaolong wrote: >>> On Mon, Jun 27, 2016 at 11:59:37AM -0700, Yinghai Lu wrote: output is: early console in setup code early console in extract_kernel input_data: 0x08fbb276 input_len: 0x018c6e00 output: 0x0100 output_len: 0x09867c98 kernel_total_size: 0x08769000 booted via startup_32() Physical KASLR using RDTSC... Virtual KASLR using RDTSC... Decompressing Linux... XZ-compressed data is corrupt -- System halted Can you apply attached debug patch and send out dmesg? >>> >>> There are 4 patches you attached, do you mean to apply them all based on >>> commit ed9f007ee6? I tried and seemed they can't apply clearly on it. >> > > Please check attached updated debug patches. > > You should apply them after ed9f007ee6 in following sequence > > revert_79063a7.patch > early_console_more_2_2x.patch > early_console_more_2_2x_add_0.patch > early_console_more_2_2x_add_1.patch If you could provide a git branch for that, that will be easier for us to test and more accurate for you to get the right patch to be tested. Best Regards, Huang, Ying