Hi, i tried the latest grsec patch (
http://grsecurity.org/test/grsecurity-2 ... 1758.patch) with 2.6.31. However i'm not able to boot the resulting image as guest in xen (Debian Lenny, xen 3.2.1, X86_64). I don't have to enable grsec/pax, its enough to patch the source tree. The domU crashes immediately after start:
#xm create -c /etc/xen/vms/xyz
Using config file "/etc/xen/vms/xyz".
Started domain toronly
#
from /var/log/xen/xend.log:
[2009-09-20 09:47:21 3531] INFO (XendDomain:1165) Domain xyz (211) unpaused.
[2009-09-20 09:47:21 3531] WARNING (XendDomainInfo:1258) Domain has crashed: name=xyz id=211.
[2009-09-20 09:47:21 3531] DEBUG (XendDomainInfo:1897) XendDomainInfo.destroy: domid=211
xm dmesg:
(XEN) Unhandled page fault in domain 211 on VCPU 0 (ec=0002)
(XEN) Pagetable walk from 0000000000004018:
(XEN) L4[0x000] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 211 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-3.2-1 x86_64 debug=n Not tainted ]----
(XEN) CPU: 0
(XEN) RIP: e033:[<ffffffff816f0a5f>]
(XEN) RFLAGS: 0000000000000202 CONTEXT: guest
(XEN) rax: 0000000000004018 rbx: ffffffff81a51000 rcx: ffffffff8177a410
(XEN) rdx: 0000000000000000 rsi: ffffffff81625fdc rdi: 0000000000001d01
(XEN) rbp: 0000000000000000 rsp: ffffffff81625fa0 r8: 0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000000000 r11: 0000000000000000
(XEN) r12: 0000000000000000 r13: 0000000000000000 r14: 0000000000000000
(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0
(XEN) cr3: 0000000092dfa000 cr2: 0000000000004018
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033
(XEN) Guest stack trace from rsp=ffffffff81625fa0:
(XEN) ffffffff8177a410 0000000000000000 0000000000000002 ffffffff816f0a5f
(XEN) 000000010000e030 0000000000010002 ffffffff81625fe8 000000000000e02b
(XEN) ffffffff816f0a4a 0000000000000000 0000000000000000 0000000000000000
(XEN) ffffffff81a00000 ffffffff81a01000 ffffffff81a02000 ffffffff81a03000
(XEN) ffffffff81a04000 ffffffff81a05000 ffffffff81a06000 ffffffff81a07000
(XEN) ffffffff81a08000 ffffffff81a09000 ffffffff81a0a000 ffffffff81a0b000
(XEN) ffffffff81a0c000 ffffffff81a0d000 ffffffff81a0e000 ffffffff81a0f000
(XEN) ffffffff81a10000 ffffffff81a11000 ffffffff81a12000 ffffffff81a13000
(XEN) ffffffff81a14000 ffffffff81a15000 ffffffff81a16000 ffffffff81a17000
(XEN) ffffffff81a18000 ffffffff81a19000 ffffffff81a1a000 ffffffff81a1b000
(XEN) ffffffff81a1c000 ffffffff81a1d000 ffffffff81a1e000 ffffffff81a1f000
(XEN) ffffffff81a20000 ffffffff81a21000 ffffffff81a22000 ffffffff81a23000
(XEN) ffffffff81a24000 ffffffff81a25000 ffffffff81a26000 ffffffff81a27000
(XEN) ffffffff81a28000 ffffffff81a29000 ffffffff81a2a000 ffffffff81a2b000
(XEN) ffffffff81a2c000 ffffffff81a2d000 ffffffff81a2e000 ffffffff81a2f000
(XEN) ffffffff81a30000 ffffffff81a31000 ffffffff81a32000 ffffffff81a33000
(XEN) ffffffff81a34000 ffffffff81a35000 ffffffff81a36000 ffffffff81a37000
(XEN) ffffffff81a38000 ffffffff81a39000 ffffffff81a3a000 ffffffff81a3b000
(XEN) ffffffff81a3c000 ffffffff81a3d000 ffffffff81a3e000 ffffffff81a3f000
(XEN) ffffffff81a40000 ffffffff81a41000 ffffffff81a42000 ffffffff81a43000
It would be great if someone could look into that, so maybe it will work with the next releases of the kernel. Getting it to work with 2.6.31 isn't that important, since spender found a way to exploit it, too. I'm happy to provide more information if you tell me what you need.
And sorry for the bad formatting, but somehow bbcode is off and i can't find a way to turn it on.
Regards, amos