From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752689AbcGAEq6 (ORCPT ); Fri, 1 Jul 2016 00:46:58 -0400 Received: from mx1.redhat.com ([209.132.183.28]:51131 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752652AbcGAEq5 (ORCPT ); Fri, 1 Jul 2016 00:46:57 -0400 Date: Fri, 1 Jul 2016 12:46:52 +0800 From: Baoquan He To: Yinghai Lu Cc: Ye Xiaolong , Kees Cook , "Huang, Ying" , LKP ML , Linux Kernel Mailing List Subject: Re: [LKP] [x86/KASLR] ed9f007ee6: -- System halted Message-ID: <20160701044652.GA10467@x1.redhat.com> References: <57712812.r6MdDSquaCRYkMnh%xiaolong.ye@intel.com> <20160628054354.GA9620@yexl-desktop> <87y45nyc0n.fsf@yhuang-mobile.sh.intel.com> <20160630065837.GH8951@yexl-desktop> <20160701040618.GA3372@x1.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160701040618.GA3372@x1.redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Fri, 01 Jul 2016 04:46:56 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/01/16 at 12:06pm, Baoquan He wrote: > On 06/30/16 at 05:24pm, Yinghai Lu wrote: > > On Wed, Jun 29, 2016 at 11:58 PM, Ye Xiaolong wrote: > > > On Wed, Jun 29, 2016 at 09:49:12PM -0700, Yinghai Lu wrote: > > >>On Wed, Jun 29, 2016 at 1:29 PM, Huang, Ying wrote: > > >>> If you could provide a git branch for that, that will be easier for us > > >>> to test and more accurate for you to get the right patch to be tested. > > >>> > > >> > > >>Please check > > >> > > >>git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git > > >>for-x86-v4.8-kaslr-debug > > > > > > Hi, yinghai > > > > > > Attached is the dmesg for the kernel which is built based on your > > > for-x86-v4.8-kaslr-debug branch. > > > > Thanks for capturing the boot log. > > > > early console in setup code > > early console in extract_kernel > > decompress_kernel: > > input: [0x0008fba276-0x000a8818ed] > > output: [0x0001000000-0x000a867c97] 0x09867c98: output_len > > [0x0001000000-0x0009768fff] 0x08769000: run_size > > [0x0001000000-0x000a867c97] 0x09867c98: output_run_size > > [0x0001000000-0x000a8affff] 0x098b0000: init_size > > ZO text/data: [0x000a8818ee-0x000a8affff] > > ZO heap: [0x000a888400-0x000a8983ff] > > VO bss/brk: [0x0009674000-0x0009768fff] > > booted via startup_32() > > Physical KASLR using RDTSC... > > Virtual KASLR using RDTSC... > > new output: [0x0006600000-0x000fe67c97] 0x09867c98: output_run_size > > virt_addr: 0x0024000000 > > decompress: [0x0006600000-0x000fe67c97] <=== [0x0008fba276-0x000a8818ed] > > > > Decompressing Linux... > > > > XZ-compressed data is corrupt > > > > -- System halted > > > > Hi Kees/Baoquan, > > > > Looks like > > > > commit ed9f007ee68478f6a50ec9971ade25a0129a5c0e > > Author: Kees Cook > > Date: Wed May 25 15:45:33 2016 -0700 > > > > x86/KASLR: Extend kernel image physical address randomization to addresses l > > arger than 4G > > I know why it happened, making patch. will reply soon. Sorry, I didn't get it, continue checking. > > > > > > > cause choose_random_location() return new output buffer > > new output: [0x0006600000-0x000fe67c97] 0x09867c98: output_run_size > > > > that is overlapped with input data. > > input: [0x0008fba276-0x000a8818ed] > > ....-0x000a8affff] 0x098b0000: init_size > > > > and input already is in mem_avoid.